{"report": "In our prior work, we have found that technological innovation involves not only creating new ideas but also translating those ideas into a new product or service. Innovation, and the research driving it, is inherently risky because the likelihood that research can be translated into a product or service and the ultimate value of that product or service are unknown. The Department of Commerce’s National Institute of Standards and Technology describes the path from innovation to commercialization as comprised of three overarching stages: inventing, transitioning to making, and selling. (See fig. 1 for a description of the path from innovation to commercialization.) FDA and USDA have responsibility for overseeing the safety of the food supply. In general, FDA is responsible for ensuring the safety of virtually all domestic and imported food products except those regulated by USDA. USDA is responsible for ensuring the safety of meat, poultry, processed egg products, and catfish. FDA and USDA cooperate with states, tribes, and local food safety and public health agencies to carry out their federal responsibilities. FDA and USDA carry out their responsibilities in part through inspections of facilities where food is produced. The frequency of inspections the agencies conduct varies, as follows: FDA. FDA’s authority requires a risk-based approach, in which inspection rates vary depending on the level of risk associated with a food product. FDA conducts risk-based inspections of high-risk and non-high-risk food facilities. For example, the FDA Food Safety Modernization Act, signed into law in 2011, specified that FDA had to inspect all high-risk domestic facilities at least every 3 years. USDA. Depending on the type of facility, USDA conducts inspections at least once per operating shift or maintains a constant presence. Specifically, USDA conducts carcass-by-carcass inspection at all federally inspected meat and poultry slaughter facilities and verifies that these establishments follow all food safety and humane handling requirements. At facilities that process meat and poultry products, USDA conducts inspections at least once per production shift, following the agency’s longstanding interpretation of its statutes requiring it to do so. Among other things, the Federal Food, Drug, and Cosmetic Act requires that food additives be approved by FDA before they can be lawfully used in foods. Substances added to food are considered unsafe unless the agency establishes that the use of the food additive, under specific conditions for use, will be safe, or unless the substance is generally recognized as safe (GRAS) under the conditions of its intended use among qualified experts. As we reported in 2010, the Federal Food, Drug, and Cosmetic Act exempts GRAS substances from the act’s general requirement that companies obtain FDA approval before marketing food containing a new additive. GRAS substances include hundreds of spices and artificial flavors, emulsifiers and binders, vitamins and minerals, and preservatives that manufacturers add to enhance a food’s taste, texture, nutritional content, or shelf life. The GRAS exemption allows companies, without notice to or approval from FDA, to determine whether there is enough support to claim a substance is GRAS. For a company to claim a substance is GRAS, it must conclude that there is common knowledge about the safety of the substance among experts qualified by scientific training and experience to evaluate its safety. In addition, as part of their oversight of the food supply, FDA and USDA oversee food labeling of the products under their respective jurisdictions. USDA, by statute, is charged with assuring that products under its jurisdiction, including meat, poultry, and catfish, in interstate or foreign commerce are properly marked, labeled, and packaged. USDA develops and applies the labeling requirements for these products, and food manufacturers are responsible for complying with the USDA labeling rules and adhering to the process maintained by USDA for the evaluation and approval of these product labels. Consistent with its statutes, USDA requires preapproval of all labels before manufacturers can market their products. The Federal Food, Drug, and Cosmetic Act prohibits the misbranding of food, which includes food labeling that is false or misleading. Consistent with its statutes, FDA ensures that foods within its jurisdiction are not misbranded by focusing on the labels of products already in the market. FDA establishes regulations for the enforcement of these provisions and issues guidance. Food manufacturers are responsible for compliance with misbranding provisions in the Federal Food, Drug, and Cosmetic Act and its implementing regulations. From time to time, new technologies, such as those used to make cell- cultured meat, generate challenges for FDA’s and USDA’s regulatory structure. Other examples of new food technologies to which federal agencies have needed to adapt include the genetic modification of plants and irradiation of foods. In the case of genetically modified plants, there are no specific regulations addressing products resulting from the manipulation of the genetic material of living seeds. However, under FDA policy, new genetically engineered crop varieties are treated like other foods (including their conventional counterparts) under the Federal Food Drug and Cosmetic Act and may not contain either unapproved food additives or contaminants that would adulterate the food. In 1995, FDA established a voluntary pre-market consultation process through which companies are encouraged to notify the agency before marketing a food produced from a genetically modified crop and voluntarily submit a summary of the developer-performed safety assessment. FDA evaluates the safety assessment for any issues that need to be addressed and works with the developer to resolve those issues. In the case of irradiated foods, companies seeking approval for a source of radiation used to treat a food may submit a food additive petition to FDA demonstrating the safety of the proposed use. FDA grants approval only after agency scientists have determined that the proposed use is safe, then the process can be employed commercially. General information about the process of making cell-cultured meat is available, but specific information about the technology being used and the eventual commercial production methods as well as the final products is not yet known. While firms may vary in how they make cell-cultured meat, the general process they use can be described in five phases. However, the technology and methods to commercially produce cell- cultured meat are still in development, and producers, regulators, and consumers do not yet have clarity on what these will entail. The composition of the final product is also not yet known. The general process for making cell-cultured meat contains five phases: biopsy, cell banking, growth, harvest, and food processing. (See fig. 2.) The five-phase process is generally as follows: 1. Biopsy. A biopsy is taken by collecting rice-sized tissue samples from an animal, such as livestock, chicken, or fish. During this and subsequent phases, specific laboratory sanitation procedures are followed, and antibiotics may be used in order to avoid or minimize contamination from bacteria. Growth Media According to researchers and representatives from cell-cultured meat firms, the growth media for cell-cultured meat often contains fetal bovine serum, which is obtained from blood drawn from a bovine fetus at slaughter. However, researchers and representatives from cell-culturing firms we spoke with said they are working to develop growth media that do not contain fetal bovine serum. Representatives from some of these firms also told us that the composition of the growth media, including the exact ingredients and their proportions, can vary based on the specific needs of the cells and the variety of serum used. For example, cell-cultured seafood may have different growth media and environmental requirements than cell-cultured livestock and poultry. 2. Cell banking. Biopsied cells with the most desirable traits are selected and either used immediately for cell growth or frozen to create a cell bank for later use. These desirable traits can be obtained by either selecting existing cells or using genetic engineering methods to insert, delete, or edit the DNA to target desired traits in cells. Examples of desirable traits may include cells that divide quickly, cells that divide a greater number of times, cells that result in a reduced cholesterol or fat content or other desirable nutritional traits, or cells that are more resilient to environmental factors, such as temperature, than other cells. According to agency officials and representatives from cell-cultured meat firms, this phase represents an important opportunity to ensure that the source cells used to initiate commercial production are free of pathogens or other contaminants. 3. Growth. During the cell growth phase, cells are placed in a bioreactor and begin to divide and differentiate. A bioreactor is a container that creates an environment that can sustain the growth of cells and includes the ability to control factors such as temperature, pH, and oxygen and carbon dioxide concentrations. Bioreactors can vary in size, including microwave-sized and refrigerator-sized units, but could be as large as 20 to 30 feet tall in commercial production. Bioreactors contain a growth medium, which may include ingredients such as glucose, amino acids, hormones and other growth factors, and other basic nutrients that cells need to consume in order to thrive. In addition to the medium needed for growth, the cells may need to be attached to a structure, referred to as a scaffold, to properly develop into cell-cultured meat. 4. Harvest. Once the cells have divided to form a sufficiently large amount of cell-cultured meat, producers remove—or harvest—it from the growth medium and bioreactor. If a scaffold was used to provide a structure for cells to grow on, then the cell-cultured meat would either be separated from the scaffold during harvesting or left attached to an edible scaffold. 5. Food processing. The harvested cell-cultured meat is then prepared into a product such as meatballs or chicken nuggets. In the future, products similar to intact cuts of meat such as steak or chicken breast may be produced. The technology to produce cell-cultured meat at a commercial scale is still in development, and information about the methods to be used for commercial production and the composition of the final product are not yet known. In the continuum of moving a technology from innovation to commercialization, cell-cultured meat firms are in the middle stage of building and testing their prototypes, based on our discussions with representatives from these firms. Consequently, they have not finalized aspects of the technology and eventual commercial production methods to be used or the composition of the final product. As a result, certain information is not yet available to stakeholders—including cell-cultured meat firms themselves, regulators, and the public—about specific aspects of the technology and commercial production methods that will be used, such as the composition of the growth medium and of the final products. In addition to technology development, the scarcity of publicly available research on cell-cultured meat production limits information available to agency officials and the public. Each cell-cultured meat firm is developing detailed information on its own eventual commercial production methods for making cell-cultured meat. However, the firms, similar to other technology start-ups, are reluctant to disclose intellectual property and business-sensitive information due to concerns about competition. For example, one firm told us that they can reverse engineer parts of another company’s commercial production method by seeing pictures of the equipment the other company is using. In addition, cell-cultured meat firms compete with other firms for funding from sources such as venture capitalists, foreign governments, and conventional meat companies. This competition for funding contributes to firms being reluctant to share information they consider important intellectual property, such as parts of their production processes. As a result, agency officials and other stakeholders told us that they must largely rely on whatever information the cell-cultured meat firms are willing to provide to understand details of the companies’ prototype processes and products. This limitation can affect agencies’ ability to make regulatory and other decisions. Specifically, FDA and USDA officials said they have limited information on cell-cultured meat production methods and products and need more in order to regulate this new food. One USDA official explained that the agency cannot establish labeling requirements if the agency does not know the nutritional profile of the final product. For example, if the scaffold on which the cell-cultured meat is grown is not edible, the agencies may require firms to disclose certain aspects of their commercial production methods, such as how they removed the cell- cultured meat from the scaffold. However, if the scaffold is edible, it will affect the final composition of the product, which may require different labeling than a product that was developed without edible scaffolding. This lack of information results in unanswered questions about cell- cultured meat as it relates to the eventual technology and commercial production methods to be used and the composition of the final products. Among other things, this lack of information creates challenges for industry and federal regulatory agencies as cell-cultured meat nears commercialization. The sources we reviewed and stakeholders we talked to identified a number of open questions, including the following: Tissue collection. How often will producers need to collect biopsy samples from animals, and what animals will be used? Some stakeholders have stated concerns about whether, and how, regulators will ensure that biopsies are collected from healthy animals. For example, one cell-cultured meat firm stated that tissue samples would be taken from slaughtered donor animals that met federal standards for conventional processing at the time of slaughter. However, USDA and FDA have not indicated whether they would require cell-cultured meat firms to do so. Additionally, representatives from cell-cultured meat firms stated that they did not yet know how frequently they would need to collect biopsies from animals for commercial-level production. Additionally, according to researchers, there are too many unknowns to accurately estimate how much cell- cultured meat could be produced from a single biopsy of animal tissue. Genetic engineering. Will commercial production methods involve genetic engineering? Some stakeholders expressed concern that the use of genetic engineering in cell-cultured meat production could cause the product to experience a lengthy wait for regulatory approval, similar to that for genetically engineered salmon, which took approximately 20 years. One representative from a cell-cultured meat firm noted that uncertainty about pending government regulations could negatively affect firms’ ability to attract and retain investors. Representatives from some firms said understanding what regulatory requirements will look like might influence which scientific pathways they pursue as they continue to develop their commercial production methods. According to FDA officials and representatives from one cell-cultured meat firm, it is likely that some firms will use genetic engineering in their commercial cell-cultured meat production methods. However, representatives from two other cell-cultured meat firms told us they were undecided as to whether they would use genetic engineering in their commercial production methods. Antibiotics. Will antibiotics be used to make cell-cultured meat, and will residues be present in the final product? According to agency officials, the presence of antibiotics in commercial production and the potential for residues in the resulting product would represent a significant potential concern for food safety and public health. Officials stated that they would not expect antibiotics to be used past the cell- banking phase. Representatives from cell-cultured meat firms we spoke to differed on whether they planned to use antibiotics in their commercial production process, but they had not finalized their decisions. According to one firm, if antibiotics are used, the use would be limited both in quantity and duration. Growth medium. What type of growth medium will producers use, and how might variations in the media affect the final product? According to agency officials and other stakeholders, the ingredients used in the growth medium could affect the end product’s composition and raise potential safety concerns. For example, FDA officials stated that residual growth factors, such as hormones, in the final product would be something they would likely evaluate in premarket consultations. However, representatives from cell-cultured meat firms stated that their firms have not finalized the medium they plan to use. In addition, the formulation of the medium firms use could be an important piece of intellectual property or confidential business information. Scaffold. What type of scaffold will producers use, if any, and will it be edible or inedible? The use of edible or food-grade scaffolds, where they are used, will affect the composition of the product and may need to be evaluated by federal agencies for safety. According to USDA officials, the composition of edible scaffolding may also create labeling and jurisdictional concerns. For example, USDA officials stated that the addition of edible scaffolding may require significant additional aspects of production to be subject to USDA jurisdiction. Additionally, researchers have commented that a chemical separation technique needed to separate some inedible scaffolds may also need to be evaluated for potential safety concerns. Point of harvest. How will FDA and USDA define the point of harvest? The point of harvest is the point at which FDA will transfer oversight responsibilities, including inspections, to USDA. Stakeholders have raised concerns that not having a clear definition of the point of harvest could lead to challenges such as overlapping inspection requirements or a gap in inspection. Representatives from several cell-cultured meat firms we spoke to in the spring of 2019 said it was ambiguous how FDA and USDA intended to define the point of harvest. These representatives also said it is unclear how often each agency plans to conduct inspections during the phases for which it is responsible. Agency officials stated that they are working to develop a detailed process for the transfer of jurisdiction, including defining the point of harvest. Scaling up production. How will firms scale up production to commercial levels? One 2018 study conducted by researchers in the United Kingdom stated that to produce one pound of cell-cultured meat, firms would need bioreactors at least 2 1/2 times larger than what is currently available. Similarly, a senior FDA official stated that the capacity of existing production equipment is a challenge for firms seeking to produce cell-cultured meat products at a commercial scale. As a result, the firms themselves may have to develop the equipment or custom order such equipment. Representatives from one cell- cultured meat firm told us that they are interacting with equipment providers to identify commercial-scale production equipment. Production cost. How will firms sell their product at a price point that is both profitable to the firms and affordable to the consumer? Some studies and stakeholders we interviewed, including representatives from cell-cultured meat firms, said that the high production cost of cell- cultured meat is a key industry challenge. For example, in the last two years, one firm reported that it cost $600 to make a cell-cultured meat hamburger patty and reported that it cost about $1,200 to produce a single cell-cultured meatball. One of the biggest cost drivers in the production of cell-cultured meat is the growth medium, according to some studies and some cell-cultured meat firms. To address issues of cost and scale, some firms may develop their own, less expensive growth media. Safety considerations. Are potential safety hazards in commercial production methods for cell-cultured meat different from those for conventional meat, and how will eventual commercial production methods affect the overall safety of the product? According to agency officials, cell-cultured meat may present different safety challenges compared to conventional meat. For example, according to agency officials, residues and constituents in harvested cell-cultured meat would be expected to be different from those in conventional meat, depending on the details of the production process. Representatives from one cell-cultured meat firm told us that they likely will use food processing techniques similar to those used for conventional meat, abide by similar health and safety standards, and possibly share food processing facilities. However, because specific information about commercial production methods and final products is not yet known, it is unclear whether cell-cultured meat produced on a commercial scale will pose any hazards not present in conventional meat. Product composition. What will be the composition of any eventual products? Agency officials told us that without knowing the composition of a cell-cultured meat product, it is impossible to predict how food safety and labeling requirements will apply. According to representatives from some cell-cultured meat firms, initial cell-cultured meat products most likely will not be composed entirely of cell- cultured meat but, rather, a mixture of cell-cultured meat and other ingredients such as binding, flavoring ingredients, and plant-based materials used in conventional food products. Some firms have developed prototypes of cell-cultured meat products as part of their research and development. In April 2019, representatives from one firm told us that their prototype included about 90 percent plant-based ingredients and 10 percent cell-cultured meat. However, representatives from cell-cultured meat firms stated that they aim to produce products that contain more cell-cultured meat than other ingredients. For example, some cell-cultured meat firms have stated that a long-term goal is to commercially produce cell-cultured meat products that are similar to intact cuts of meat, such as steaks. As of December 2019, these firms had not provided regulators with specific information detailing the composition of their cell-cultured meat prototypes, according to FDA and USDA officials. Environmental, animal welfare, and health impacts. How will cell- cultured meat impact the environment, animal welfare, or human health, if at all? Cell-cultured meat firms and researchers have made various claims about the potential environmental, animal welfare, and health advantages of cell-cultured meat over conventionally produced meat. For example, some cell-cultured meat firms have claimed that cell-cultured meat production would use less water and emit less greenhouse gases than conventional meat production. Some cell- cultured meat firms have also claimed that cell-cultured meat will improve animal welfare because slaughter will be unnecessary. Additionally, some stakeholders stated that because there is less opportunity for contamination from animal feces—a potential source of contamination for conventional meat—cell-cultured meat would be less likely than conventional meat to contain foodborne pathogens. However, there are disagreements regarding the accuracy of these claims. Stakeholders told us that until commercial production methods and final products are established, these claims about impacts on the environment, animal welfare, and human health will remain unsubstantiated. Timeline to market. When will cell-cultured meat products reach consumers? As of December 2019, no cell-cultured meat products were available for retail sale in the United States. Stakeholders give varying estimates for when cell-cultured meat may be commercially available. Some estimates suggest that firms may be able to commercially produce some form of cell-cultured meat product as soon as 2020, while others estimate that such products may not be available for 2 to 4 years. Labeling. How will cell-cultured meat be labeled? Labeling was an area of concern for representatives from both conventional and cell- cultured meat firms who explained that the specific terminology, such as “clean meat” or “lab-grown meat,” can sometimes reflect bias for, or against, certain products, potentially affecting consumer acceptance of these products. Additionally, stakeholders, as well as agency officials, have emphasized the importance of labeling to ensure consumers have accurate information about what they are buying. For example, in February 2018 the United States Cattlemen’s Association submitted a petition to USDA requesting that the agency limit the term “beef” to products “born, raised, and harvested in a traditional manner” and “meat” to mean the “tissue or flesh of animals that have been harvested in the traditional manner.” USDA received over 6,000 comments on the petition, and the agency had not responded to the petition as of December 2019. However, according to agency officials, USDA has committed to a public process, likely rulemaking, for the development of labeling requirements for cell- cultured meat and poultry. In addition, in recent years, a number of states have passed laws that could affect the labeling of cell-cultured meat when it comes to market. For example, in 2018, Missouri enacted a law to prohibit plant-based products and cell-cultured meat from being labeled as “meat.” Consumer Acceptance How will consumers respond to cell-cultured meat? It remains unclear whether consumers will embrace and purchase cell-cultured meat products. Stakeholders we interviewed and studies we reviewed cited consumer acceptance as a challenge for commercializing cell-cultured meat. One study noted that consumers have both positive and negative views toward cell-cultured meat, which could impact their willingness to purchase and consume such products. FDA and USDA have established multiple mechanisms to collaborate on regulatory oversight of cell-cultured meat. Specifically, the agencies have collaborated through a joint public meeting, an interagency agreement, and three working groups. However, the interagency agreement and working groups, which are ongoing mechanisms, do not fully incorporate leading practices for interagency collaboration. In addition, FDA and USDA have not documented which agency will oversee cell-cultured seafood not covered by the interagency agreement. In 2018, FDA and USDA began taking steps to collaborate on the regulatory oversight of cell-cultured meat through several mechanisms: a joint public meeting, an interagency agreement, and three working groups. The agencies held the joint meeting in October 2018 to discuss the use of cell-culture technology to develop products derived from livestock and poultry, and topics included potential hazards, oversight considerations, and labeling. As part of this meeting, FDA and USDA held an open public comment period from September through December 2018, gathered 315 written comments, and offered interested parties the opportunity to offer comments in person. The agencies received public comments from members of the public, as well as from representatives from cell-cultured meat and conventional meat industries, food and consumer safety groups, animal welfare groups, and environmental organizations, among others. The written comments the agencies received focused on such topics as environmental considerations, labeling, potential health and safety implications, and potential regulatory and inspection processes. Stakeholders also presented multiple perspectives on these issues at the meeting. For example, stakeholders expressed different views as to whether cell-cultured meat should be regulated as a food additive, considered a GRAS substance, or whether new regulations were needed. In March 2019, FDA and USDA issued a formal interagency agreement that describes the intended roles and responsibilities of each agency in overseeing cell-cultured meat. The agreement establishes the following: Oversight. FDA will oversee the early phases of growing cell-cultured meat through the point of harvest. During harvest, FDA will work with USDA to transfer regulatory oversight to USDA. USDA will then assume oversight of cell-cultured meat through the food processing phase, including labeling, as shown in figure 3. Types of meat covered. The agreement covers cell-cultured meat derived from species overseen by USDA, such as livestock, poultry, and catfish. Future actions. The agreement also details future actions the agencies plan to take, such as developing a more detailed regulatory framework or standard operating procedures and developing joint principles for product labeling. Reviewing and updating the agreement. The agreement states that the agencies have the ability to modify it as needed and will review the agreement every 3 years to determine whether they should modify or terminate it. In June 2019, FDA and USDA created three working groups to carry out the terms of the interagency agreement. The working groups are comprised of FDA and USDA officials and operate independently, though some individuals are members of multiple groups. The groups are as follows: Pre-market assessment working group. Led by FDA, this group was created to clarify the process FDA will use for pre-market reviews of cell-cultured meat. Labeling working group. Led by USDA, this group will focus on developing joint principles for product labeling and claims. Transfer of jurisdiction working group. Co-led by FDA and USDA, this group will develop procedures for the transfer of inspection at harvest, among other things. According to agency officials, the working groups are still in the initial phases of development, though some have progressed further than others. For example, as of December 2019, the pre-market assessment and labeling groups had met and begun to address various areas, while the transfer of jurisdiction working group was still in discussions to outline the roles, responsibilities, and outcomes for the group and had not held a formal meeting. FDA and USDA could more fully incorporate leading practices for collaboration in their interagency agreement and working groups. We have previously reported that interagency mechanisms or strategies to coordinate programs that address crosscutting issues may reduce potentially duplicative, overlapping, and fragmented efforts. In addition, while collaborative mechanisms may differ in complexity and scope, they all benefit from certain leading practices, which raise issues to consider when implementing these mechanisms. We compared the agencies’ interagency agreement and working groups with the seven leading practices to enhance and sustain interagency collaboration that we previously identified. These leading practices, and examples of the associated issues to consider, are as follows: Defining outcomes and monitoring accountability. Is there a way to track and monitor progress toward short-term and long-term outcomes? Do participating agencies have collaboration-related competencies or performance standards against which individual performance can be evaluated? Bridging organizational cultures. What are the commonalities between the participating agencies’ missions and cultures, and what are some potential challenges? Have participating agencies developed ways for operating across agency boundaries? Have participating agencies agreed on common terminology and definitions? Identifying and sustaining leadership. How will leadership be sustained over the long term? If leadership is shared, have roles and responsibilities been clearly identified and agreed upon? Clarifying roles and responsibilities. Have participating agencies clarified roles and responsibilities? Have participating agencies articulated and agreed to a process for making and enforcing decisions? Including relevant participants. Have all relevant participants been included? Do participants have appropriate knowledge, skills, and abilities to contribute? Identifying and leveraging resources. How will the collaborative mechanism be funded and staffed? Developing and updating written guidance and agreements. If appropriate, have the participating agencies documented their agreement regarding how they will collaborate? (A written document can incorporate agreements reached in any or all of the following areas: leadership, accountability, roles and responsibilities, and resources.) Have participating agencies developed ways to continually update or monitor written agreements? See appendix II for a full list of the associated issues to consider for each leading practice. We found that the interagency agreement for oversight of cell-cultured meat partially incorporates all seven leading practices for collaboration. For example: Defining outcomes and monitoring accountability. The interagency agreement partially incorporates the leading practice of defining outcomes and monitoring progress toward these outcomes. Specifically, the agreement identifies broad outcomes such as the development of labeling principles. However, the agreement does not describe how the agencies will track and monitor progress toward outcomes. Identifying and sustaining leadership. The agreement partially incorporates the leading practice of clarifying leadership structures. For example, it assigns each agency as the lead, or designates shared leadership, for different phases of the cell-cultured meat production process. However, the interagency agreement does not identify how the agencies will sustain leadership over the long term, including through succession planning. We have previously reported that given the importance of leadership to any collaborative effort, transitions and inconsistent leadership can weaken the effectiveness of any collaborative mechanism. Developing and updating written guidance and agreements. The agreement partially incorporates the leading practice of documenting how the agencies will collaborate. For example, the agreement includes a method for updating the document by including a provision that requires a review of the document every 3 years. This is consistent with our leading collaboration practice to continually update or monitor written agreements. However, the interagency agreement does not document how the agencies will track and monitor progress toward short-term and long-term outcomes. Table 1 provides more detail about the agencies’ incorporation of these leading collaboration practices in their interagency agreement. FDA and USDA officials told us that the interagency agreement was intended to be an initial, general outline for their collaboration. They also said that as the technology to produce cell-cultured meat develops and they implement the agreement, including developing the content of a regulatory program, they will consider incorporating leading practices for interagency collaboration. For example: Clarifying roles and responsibilities. FDA and USDA officials said in December 2019 that through the working groups the agencies would continue to explore and define the specific details of how they will manage their shared oversight responsibility. Including relevant participants. FDA officials said in December 2019 that the agency would like to engage many more stakeholders as it continues to develop its oversight of cell-cultured meat. Identifying and leveraging resources. As of December 2019, the pre-market assessment working group and the labeling working group were working to identify any human resources, physical, or financial resources they might need, according to FDA and USDA officials. The federal food safety system is on our High Risk List due to concerns about fragmentation, which we have reported has caused inconsistent oversight, ineffective coordination, and inefficient use of resources. As the agencies continue to collaborate on their shared oversight of cell- cultured meat, by more fully incorporating all seven leading practices for collaboration into their interagency agreement, they will be better positioned to address potential fragmentation in their efforts to ensure the safety of the food supply as cell-cultured meat products near commercialization and entry into the marketplace. We found that the pre-market assessment, labeling, and transfer of jurisdiction working groups that FDA and USDA created to carry out the terms of the interagency agreement either partially incorporate or do not incorporate the seven leading practices for interagency collaboration. Specifically, all three working groups have partially incorporated three of the seven leading practices for collaboration, but none of the working groups have incorporated the four remaining leading practices. For example: Defining outcomes and monitoring accountability. The working groups have all defined and agreed upon their general purposes. However, FDA and USDA have not established methods, such as milestones and metrics, to evaluate the progress of any of the working groups. For example, FDA officials said in December 2019 that their next steps are to conduct a general and qualitative risk assessment of animal cell culture food technology to systematically identify particular areas of interest from a food safety perspective and prepare detailed procedural guidelines for cell-cultured meat firms to follow. However, the officials did not have time frames or a method to evaluate progress towards completing these actions. Including relevant participants. While the working groups have included relevant FDA and USDA officials, none of the groups have included state or tribal officials in initial discussions and planning. According to the state officials we spoke with, being excluded from these federal-level discussions may hinder their ability to align their safety and labeling requirements, among other things, with federal standards. Developing and updating written guidance and agreements. None of the working groups have documented how they will collaborate. For example, the working groups have not documented leadership, accountability, roles and responsibilities, or resources needed for working groups. Table 2 provides more detail about FDA and USDA’s incorporation of leading collaboration practices in the three working groups. In December 2019, FDA and USDA officials said that as they continued to stand up these working groups, they were considering leading practices for collaboration. For example: Defining outcomes and monitoring accountability. FDA and USDA officials said they were considering means to monitor, evaluate, or report on the results of the pre-market assessment working group. Including relevant participants. FDA and USDA officials said that they were working to determine what knowledge participants in the pre-market assessment working group and the labeling working group needed to perform the work of the working group. Developing and updating written guidance and agreements. FDA and USDA officials said they were considering documenting how they will collaborate in the pre-market assessment working group, including potentially creating a charter for the working group. We have previously reported that fragmentation has caused inconsistent oversight and inefficient use of resources in the federal food safety oversight system. The agencies’ 2019 agreement to share oversight of cell-cultured meat creates a new relationship between FDA and USDA, since the agencies will oversee different stages of the production of the same food and hand off oversight at a certain point in that production. These factors contribute to an already complicated system in which the two agencies must coordinate on food safety oversight. In this context, some industry representatives and other stakeholders have expressed concerns about potential fragmentation or overlap in oversight of cell-cultured meat, such as could occur during the harvest phase of cell-cultured meat production when FDA hands off its oversight to USDA. Additionally, representatives from one cell-cultured meat firm stated that avoiding overlap in federal oversight whenever possible was important to them. For example, representatives from one firm pointed to inspection, record-keeping requirements, and regulations as potential areas at risk of overlap. They stated that potential overlap would add unnecessary, burdensome requirements and create an uneven playing field with the conventional meat industry. By more fully incorporating all seven leading practices for interagency collaboration early in the development of the three working groups, FDA and USDA could proactively minimize potential fragmentation and overlap in their oversight of cell-cultured meat, ensure consistency and efficient use of resources, and provide clarity to key stakeholders. While FDA and USDA officials told us they have decided who will oversee cell-cultured seafood, they have not formally announced or documented this decision, and some stakeholders have reported confusion or ambiguity about which agency will oversee cell-cultured seafood other than catfish. Specifically, FDA and USDA’s interagency agreement regarding cell-cultured meat states that it covers all cell-cultured meat derived from USDA-amenable species required to bear a USDA mark of inspection, which in the agreement includes livestock, poultry, and catfish. However, the agreement does not mention cell-cultured meat made from the cells of other fish, such as tuna and shellfish. FDA and USDA officials told us that FDA will have sole oversight responsibility for cell-cultured seafood other than catfish. According to FDA officials, they have verbally communicated this decision in various meetings with stakeholders. However, FDA and USDA officials told us that formally documenting FDA’s sole oversight of most cell- cultured seafood in their interagency agreement was unnecessary because FDA currently oversees most conventional seafood. According to cell-cultured meat firms, some firms are working on developing cell- cultured versions of seafood, such as bluefin tuna. However, stakeholders from two cell-cultured meat firms, including representatives of a cell- cultured seafood firm we spoke with in April 2019, stated that they did not know who in the federal government would oversee cell-cultured seafood. Representatives from one cell-cultured seafood firm said that not being able to rule out oversight by USDA prevented them from making key decisions regarding what direction to pursue in developing their commercial production method. While FDA and USDA officials told us they had agreed that FDA would oversee cell-cultured seafood other than catfish, as of December 2019, the agencies had not formally announced or documented this agreement. Developing and updating written guidance and agreements is a leading practice for collaboration, as we have previously reported. In addition, standards for internal control in the federal government state that agency management should externally communicate the necessary quality information to achieve its objectives and should select appropriate methods of communication, such as a written document or a face-to-face meeting. Management should also periodically evaluate the entity’s methods of communication so that the organization has the appropriate tools to communicate quality information throughout and outside of the entity on a timely basis. While FDA and USDA officials have informally communicated to some stakeholders that FDA will have sole oversight of most cell-cultured seafood, FDA has not communicated this information formally or in a method readily available to all relevant stakeholders, such as in their interagency agreement or other publicly available written document. FDA and USDA officials told us that they wanted to communicate this information through outreach to individual firms, but FDA or USDA officials said they did not think that revising their interagency agreement was necessary. By taking steps to document which agency will oversee cell-cultured seafood other than catfish, FDA and USDA will better ensure the public, including key stakeholders such as cell-cultured meat firms, have clarity about the agencies’ oversight responsibilities in this area. Cell-cultured meat is a new food product that raises many questions. FDA and USDA’s shared oversight of cell-cultured meat poses various challenges for these agencies, as well as stakeholders such as industry. Compounding this challenge is that specific information about key aspects of cell-cultured meat, such as the technology and production methods to be used as well as the composition of the products, is not yet known. FDA and USDA have taken steps to collaborate on their shared regulatory oversight of cell-cultured meat, including establishing an interagency agreement and three working groups. However, the interagency agreement only partially incorporates the seven leading collaboration practices that can enhance and sustain agencies’ collaborative efforts, and the working groups either partially incorporate or do not incorporate these leading practices, which has raised concerns about potential fragmentation or overlap in oversight. By more fully incorporating all seven leading practices for collaboration into their interagency agreement, FDA and USDA could build on their existing efforts and be better positioned to sustain and enhance their collaborative efforts. Moreover, by more fully incorporating all seven leading practices for interagency collaboration early in the development of the working groups, FDA and USDA could proactively minimize potential fragmentation and overlap in their oversight of cell-cultured meat and ensure they are utilizing resources efficiently or effectively. Furthermore, the interagency agreement states that it covers USDA- amenable species required to bear a USDA mark of inspection, which in the agreement includes livestock, poultry, and catfish but does not include cell-cultured seafood other than catfish. FDA and USDA officials told us they have decided FDA will oversee most cell-cultured seafood, but the agencies have not formally documented this decision. By taking steps to document in their interagency agreement, or other publicly available document, which agency will oversee cell-cultured seafood other than catfish, FDA and USDA could better ensure that members of the public and other key stakeholders such as cell-cultured meat firms have clarity about the agencies’ oversight responsibilities in this area. We are making a total of six recommendations, three to FDA and three to USDA: The Commissioner of the Food and Drug Administration, in coordination with the Secretary of Agriculture, should more fully incorporate the seven leading practices for effective collaboration in the agencies’ interagency agreement for the joint oversight of cell-cultured meat. (Recommendation 1) The Secretary of Agriculture, in coordination with the Commissioner of the Food and Drug Administration, should more fully incorporate the seven leading practices for effective collaboration in the agencies’ interagency agreement for the joint oversight of cell-cultured meat. (Recommendation 2) As the three cell-cultured meat working groups move forward, the Commissioner of the Food and Drug Administration, in coordination with the Secretary of Agriculture, should more fully incorporate the seven leading practices for effective collaboration, such as identifying specific outcomes and a way to monitor and evaluate progress toward outcomes. (Recommendation 3) As the three cell-cultured meat working groups move forward, the Secretary of Agriculture, in coordination with the Commissioner of the Food and Drug Administration, should more fully incorporate the seven leading practices for effective collaboration, such as identifying specific outcomes and a way to monitor and evaluate progress toward outcomes. (Recommendation 4) The Commissioner of the Food and Drug Administration, in coordination with the Secretary of Agriculture, should clearly document in their interagency agreement, or other publicly available document, which agency will oversee cell-cultured seafood other than catfish. (Recommendation 5) The Secretary of Agriculture, in coordination with the Commissioner of the Food and Drug Administration, should clearly document in their interagency agreement, or other publicly available document, which agency will oversee cell-cultured seafood other than catfish. (Recommendation 6) We provided a draft of this report to the Department of Health and Human Services’ (HHS) Food and Drug Administration (FDA) and the U.S. Department of Agriculture (USDA) for review and comment. In FDA’s comments, reproduced in appendix III, the agency stated that it values GAO’s recognition of the importance of collaborative mechanisms that facilitate coordination and affirmed its commitment to coordinate closely with USDA to ensure the regulatory framework for cell-cultured meat is clear and transparent to stakeholders. In USDA’s comments, reproduced in appendix IV, the department stated that the report put too much focus on best practices for interagency collaboration and not enough emphasis on industry’s role in providing the agencies with the information they need to move their processes forward to effectively regulate cell-cultured meat. USDA stated that it is difficult to review a developing technology and its future regulatory oversight when so little detailed information about the technology is known. We agree that the technology to produce cell-cultured meat is still in development and that information about the commercial production methods and composition of the final product are not yet known, as we state in our report. We also acknowledge in our report that having limited information can affect the agencies’ ability to make regulatory and other decisions. We recognize that cell-cultured meat is a new food product that raises many new questions and that specific information about key aspects of cell-cultured meat is not yet known. In light of this challenging context, it is all the more important that FDA and USDA more fully incorporate leading practices for collaboration into their joint efforts in order to ensure they are in the best possible position to oversee this new food product. FDA concurred with two recommendations and partially concurred with one. USDA also concurred with two recommendations and partially concurred with one. Specifically, both agencies agreed with our recommendations regarding (1) more fully incorporating the seven leading practices for effective collaboration in the three cell-cultured meat working groups as they move forward and (2) clearly documenting which agency will oversee cell-cultured seafood other than catfish. FDA and USDA partially concurred with our recommendation, directed to each agency, to more fully incorporate the seven leading practices for effective collaboration into the agencies’ interagency agreement for the joint oversight of cell-cultured meat. FDA stated that it concurred with the intent of incorporating the seven leading practices into the interagency agreement, and both agencies said that they are open to incorporating the practices into their development of the structure for joint oversight of cell-cultured meat. However, the agencies stated that they did not agree to revise the agreement at this time. FDA and USDA stated that the agreement is a general framework and that incorporating the leading practices would constitute an inappropriate level of detail. Instead, the agencies stated that they believe it would be most valuable to incorporate the leading practices into a more detailed joint framework or standard operating procedure they plan to issue. We appreciate the agencies’ willingness to incorporate the leading practices for effective collaboration into their efforts. The March 2019 interagency agreement states that the agencies have the ability to modify it as needed and will review the agreement every 3 years to determine whether they should modify or terminate it. Therefore, the agencies are due to revisit the agreement in March 2022, if not sooner. Regarding the agencies’ concern that incorporating the leading practices in the interagency agreement would add an inappropriate level of detail, we note that, as we state in our report, the existing agreement already partially incorporates each of the seven leading practices. We continue to believe that FDA and USDA should more fully incorporate the seven leading practices for effective collaboration into their interagency agreement for the joint oversight of cell-cultured meat. Developing a more detailed joint framework or standard operating procedure in accordance with the existing interagency agreement that incorporates those leading practices would meet the intent of our recommendation to improve the effectiveness of the agencies’ collaboration. FDA and USDA also provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days from its issue date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, the Secretary of Agriculture, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact me at (202) 512-3841 or morriss@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Our report (1) describes what is known about methods for commercially producing cell-cultured meat and (2) examines the extent to which the Food and Drug Administration (FDA) and U.S. Department of Agriculture (USDA) are collaborating to provide regulatory oversight of cell-cultured meat. For both objectives, we conducted a literature review of journal and media articles from 2016 through 2019 to inform our understanding of cell- cultured meat, as well as regulatory activity related to cell-cultured meat in the United States and in other countries. Specifically, we conducted a review of scholarly and trade news from 2016 through July 2019 for specific terms related to cell-cultured meat and regulatory approaches. We conducted searches in more than 30 different academic and trade databases—such as SCOPUS, Foodline, and ProQuest’s Environmental Science Collection—and identified studies relevant to our research objectives. In addition to these formal literature searches, we also asked agency officials and stakeholders to refer us to research articles and publications on cell-cultured meat. We also reviewed documentation from FDA and USDA, including the 2019 interagency agreement, existing memoranda of understanding between the two agencies, Federal Register notices about relevant public meetings, and press releases. We also reviewed documentation such as letters to regulators, presentation slides, and information on organizations’ websites from the cell-cultured meat industry, conventional meat industry, and consumer safety groups, among others. We also interviewed officials from FDA and USDA and representatives of stakeholders from the cell-cultured meat industry and industry associations, conventional meat firms and industry associations, academia, food and consumer safety groups, and state and tribal public health associations, among others. We identified stakeholders to interview through consultation with agency officials and nonfederal stakeholders and through our review of literature. We conducted 17 interviews with representatives or researchers from: six cell-cultured meat firms or industry associations, four conventional meat firms or industry associations, two food and consumer safety groups, one state and tribal public health association, and one food law policy firm. Because this is a nongeneralizable sample, the results of these interviews do not represent the views of all stakeholders involved in or with an interest in the cell-cultured or conventional meat industries or federal regulation of cell-cultured meat. However, they illustrate the range of perspectives on these topics. We also attended public meetings and conferences and conducted site visits to several locations. Specifically, we attended FDA and USDA’s public meeting in October 2018 and four conferences in 2019 that included content pertaining to food safety or cell-cultured meat. We conducted site visits to two conventional meat-processing facilities in Georgia, three cell-cultured meat firms in California, an academic cell- culturing laboratory in California, and a medical cell-culturing facility in Maryland. We identified facilities and laboratories to visit through our literature review, online research, and the assistance of agency officials and stakeholders, such as representatives from the cell-cultured meat and conventional meat industry. To describe what is known about the process for producing cell-cultured meat and potential commercial production methods, we also reviewed two sets of public comments submitted to FDA and USDA in association with the two 2018 public meetings pertaining to cell-cultured meat. These meetings were “Foods Produced Using Animal Cell Culture Technology” in July 2018 and “Use of Cell Culture Technology to Develop Products Derived from Livestock and Poultry” in October 2018. Public comments were submitted by members of the public; representatives from cell- cultured meat firms and industry associations, conventional meat companies and industry associations, food and consumer safety groups, and animal welfare groups; and environmental organizations, among others. We reviewed and analyzed all comments submitted to (1) FDA related to the July 2018 meeting and (2) FDA and USDA related to the October 2018 meeting. We also attended the October 2018 meeting and listened to agency officials’ presentations and oral remarks made by stakeholders and members of the public. We shared our description of the process for making cell-cultured meat, and associated questions, with representatives from three cell-cultured meat firms and academic researchers at two universities for their technical review and incorporated revisions as appropriate. To examine the extent to which FDA and USDA are coordinating to provide regulatory oversight of cell-cultured meat, we identified actions they took to coordinate from July 2018 through April 2020. To identify these actions, we interviewed agency officials, emailed agency officials written questions, reviewed agency documentation and public announcements, and attended public events such as the October 2018 public meeting. We compared the agencies’ interagency agreement and working groups with seven leading practices to enhance and sustain interagency collaboration. Specifically, two independent GAO reviewers assessed the degree to which agencies’ actions incorporated these leading practices. A description of these leading practices and the associated issues to consider is in appendix II. We also assessed the agencies’ actions against standards for internal control in the federal government, including standards related to communicating quality information. In this report, and in our past work, we define collaboration as any joint activity that is intended to produce more public value than could be produced when organizations act alone. We use the terms “coordination” and “collaboration” interchangeably in this report. For the purposes of our report, we define cell-cultured meat as food derived from animal cells that were grown in a controlled environment outside of the animal. We define cell-cultured seafood as a subcategory of cell-cultured meat. When referencing conventional meat, we are referring to food produced from the traditional method of slaughtering an animal, such as a cow, hog, chicken, or fish. When referencing seafood, we are referring to shellfish, sea fish, and freshwater fish served as food. We conducted this performance audit from October 2018 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Key Issues to Consider for Implementing Interagency Collaborative Mechanisms Issues to consider Have short-term and long-term outcomes been clearly defined? Is there a way to track and monitor progress toward the short-term and long-term outcomes? Do participating agencies have collaboration-related competencies or performance standards against which individual performance can be evaluated? Do participating agencies have the means to recognize and reward accomplishments related to collaboration? What are the missions and organizational cultures of the participating agencies? What are the commonalities between the participating agencies’ missions and cultures and what are some potential challenges? Have participating agencies developed ways for operating across agency boundaries? Have participating agencies agreed on common terminology and definitions? Has a lead agency or individual been identified? If leadership will be shared between one or more agencies, have roles and responsibilities been clearly identified and agreed upon? How will leadership be sustained over the long term? Have participating agencies clarified the roles and responsibilities of the participants? Have participating agencies articulated and agreed to a process for making and enforcing decisions? Have all relevant participants been included? Do the participants have: Full knowledge of the relevant resources in their agency? The ability to commit these resources? The ability to regularly attend activities of the collaborative mechanism? The appropriate knowledge, skills, and abilities to contribute? Developing and updating written guidance and agreements How will the collaborative mechanism be funded? If interagency funding is needed, is it permitted? If interagency funding is needed and permitted, is there a means to track funds in a standardized manner? How will the collaborative mechanism be staffed? Are there incentives available to encourage staff or agencies to participate? If relevant, do agencies have compatible technological systems? Have participating agencies developed online tools or other resources that facilitate joint interactions? If appropriate, have the participating agencies documented their agreement regarding how they will be collaborating? A written document can incorporate agreements reached in any or all of the following areas: Leadership Accountability Roles and responsibilities Resources Have participating agencies developed ways to continually update or monitor written agreements? Steve D. Morris, (202) 512-3841 or morriss@gao.gov In addition to the contact named above, Nico Sloss (Assistant Director), Angela Miles (Analyst-in-Charge), Sahar Angadjivand, Tim Bober, Kevin Bray, Colleen Candrl, Pin En Annie Chou, Tara Congdon, Heather Dowey, Kim Gianopoulos, Gina Hoover, Hayden Huang, Robert Lepzler, Serena Lo, David Lysy, Marc Meyer, Michael Polak, Danny Royer, Sara Sullivan, and Sarah Veale made key contributions to this report.", "summary": "Multiple firms have produced cell-cultured meat as part of their research and development. These products appear likely to become available to consumers in coming years. FDA and USDA are the primary agencies responsible for overseeing the safety of the nation's food supply. However, some stakeholders have expressed concern about the agencies' oversight of cell-cultured meat amidst a fragmented federal food safety oversight system. GAO was asked to review federal oversight of cell-cultured meat. This report (1) describes what is known about methods for commercially producing cell-cultured meat, and (2) examines the extent to which FDA and USDA are collaborating to provide regulatory oversight of cell-cultured meat. GAO conducted a literature review; reviewed documentation from FDA, USDA, and stakeholder groups; analyzed public comments submitted to the agencies; compared agency efforts with leading practices for interagency collaboration; and conducted site visits to selected cell-cultured meat firms. General information about the process of making cell-cultured meat—food products grown from the cells of livestock, poultry, and seafood—is available. However, no company is commercially producing cell-cultured meat. Specific information about the technology being used, eventual commercial production methods, and composition of the final products is not yet known. The general process contains five phases: biopsy, cell banking, growth, harvest, and food processing (see figure). The technology and methods to be used for commercial production are still in development, and producers, regulators, and consumers do not have clarity about many specifics about the process and final product. For example, it is unclear whether production methods and products will use or contain genetically-engineered cells or medications such as antibiotics. The Food and Drug Administration (FDA) and U.S. Department of Agriculture (USDA) have begun collaborating on regulatory oversight of cell-cultured meat. For example, in 2019, the agencies signed an interagency agreement and created three working groups to carry out the terms of the agreement. However, the agreement and working groups could more fully incorporate practices to enhance and sustain collaboration, such as defining outcomes. For example, the agreement identifies the development of labeling principles as an outcome, but does not describe how the agencies will track and monitor progress toward this outcome, and the working groups identify a lead agency but not members' roles. Also, agency officials said they decided FDA would oversee cell-cultured seafood other than catfish, but they have not formally announced or documented this decision. Developing and updating written guidance and agreements is also a leading practice for interagency collaboration. By fully incorporating leading practices into their efforts to collaborate, the agencies could minimize potential overlap and fragmentation, use resources in a more efficient manner, and better ensure the public and other key stakeholders have clarity about the agencies' oversight responsibilities. GAO recommends that FDA and USDA more fully incorporate leading practices for effective collaboration in the agencies' interagency agreement. FDA and USDA partially concurred and indicated a willingness to incorporate these practices in a more detailed agreement, which would also meet the intent of the recommendations. The agencies concurred with the four other recommendations.", "document_type": "gao"}
{"report": "A variety of federal laws, regulations, and policies establish requirements and guidance for EPA to follow when appointing members to serve on advisory committees. For example, one purpose of FACA is to ensure that uniform procedures govern the establishment and operation of advisory committees. Also under FACA, an agency establishing an advisory committee must, among other things, require the committee’s membership to be balanced in terms of the points of view represented and the functions to be performed by the committee. In addition, federal ethics regulations establish when and how federal officials should review financial disclosure forms to identify and prevent conflicts of interest prohibited by federal law for any prospective committee members required to file these forms in connection with their appointments to advisory committees. GSA has provided additional guidance regarding the implementation of ethics requirements under FACA. Various EPA offices and officials are responsible for helping the agency follow these requirements. For example, EPA’s Federal Advisory Committee Management Division—which has overall responsibility for committee management and ensuring that EPA’s advisory committees comply with FACA—developed the Federal Advisory Committee Handbook to clarify roles and responsibilities for complying with relevant requirements. The handbook was written primarily for EPA employees assigned as designated federal officers for committees. These officers are responsible for the day-to-day management of advisory committees and play a central role in identifying and recommending candidates who can help the committees meet their goals. EPA employees assigned as designated federal officers also are responsible for maintaining committee records. According to EPA’s Federal Advisory Committee Handbook, one of the primary reasons that Congress passed FACA was to ensure public access to the records and documents of advisory committees, and that this fosters greater transparency and accountability of agencies’ use of advisory committees. EPA’s Ethics Office is responsible for helping the agency follow federal ethics requirements. Housed within the agency’s Office of General Counsel in headquarters, the Ethics Office oversees all aspects of the agency’s ethics program, including financial disclosure reporting. The Designated Agency Ethics Official coordinates and manages the program. The Designated Agency Ethics Official delegates authority to more than 100 deputy ethics officials located throughout the agency— including in headquarters and regional offices—to carry out most elements of EPA’s ethics program. For example, deputy ethics officials are to review financial disclosure reports for prospective committee members to identify and prevent conflicts of interest. Deputy assistant administrators, deputy regional administrators, office directors, and other EPA managers may be appointed to serve as deputy ethics officials for their offices as ancillary duties to their other responsibilities. EPA can establish two kinds of advisory committees—non-discretionary and discretionary committees. The agency establishes non- discretionary committees when required to by statute or directed to by the President. For example, the Clean Air Act requires EPA to establish an advisory committee to, among other things, help EPA review standards for national ambient air quality every 5 years. EPA also can establish discretionary committees at the Administrator’s direction if, for example, these committees provide an important and unique perspective on EPA programs or operations. An example of a discretionary committee is the Pesticide Program Dialogue Committee, which was formed to help EPA perform its duties under the Federal Insecticide, Fungicide and Rodenticide Act and related laws. See appendix II for a list of EPA’s 22 advisory committees as of March 31, 2018. EPA must approve the establishment of any subcommittees formed to assist committees with their work. EPA also can appoint different types of members to its advisory committees, depending on the needs of its committees and other considerations. For instance, EPA may appoint a committee member as a federal government employee under an appropriate hiring authority. If EPA expects a federal employee to serve no more than 130 days in any 365-day period, guidance from the U.S. Office of Government Ethics (OGE), which oversees the executive branch’s ethics program, states that the employee should be designated as a special government employee (SGE). If EPA decides not to appoint the committee member as a federal employee, that committee member would be a non-employee representative. EPA decides whether to appoint committee members as federal employees. To help federal agencies such as EPA determine whether to designate committee members as SGEs or representatives, OGE has developed guidance on factors to consider when agencies make these determinations. For example, OGE guidance states that SGEs are expected to provide independent expert advice and provide their best judgment free from conflicts of interest. They are generally subject to federal ethics regulations placed on other federal employees—including the requirement to file financial disclosure forms. In addition, OGE guidance states that representatives serve as the voice of groups or entities with a financial or other stake in a particular matter before an advisory committee. Federal ethics regulations generally do not apply to representative members on FACA committees. GSA has certain government-wide responsibilities for implementing FACA, including maintaining the government-wide FACA database that tracks certain characteristics of advisory committees. Specifically, FACA requires GSA to comprehensively review the activities and responsibilities of each advisory committee annually, including the committees for which EPA officials are responsible. In turn, GSA requires federal agencies responsible for advisory committees to enter data about those committees into the database. GSA and the responsible agency (e.g., EPA) review the data on a fiscal year basis for accuracy and completeness. These reviews are typically completed by February or March of the following year. GSA’s database is accessible by the general public. It includes data on committee members and committee activities from more than 50 agencies going back to 1997. The information on EPA committees includes: whether a committee member is designated as an SGE or representative; the occupation or affiliation of a committee member; state or other geographic information associated with a committee member’s occupation or affiliation; the appointment’s start and end date for each committee member; and the dates that committees held meetings. Based on our review of EPA’s Federal Advisory Committee Handbook, the agency’s established process for appointing advisory committee members includes three main phases. These phases are soliciting nominations, evaluating candidates, and obtaining approvals from relevant EPA offices, such as the Federal Advisory Committee Management Division, before the Administrator or Deputy Administrator makes final appointment decisions. As shown in figure 1, each of the three main phases in EPA’s process involves several smaller steps. Unless noted otherwise, explanations of these steps can be found in the handbook, which documents the agency’s established process. Soliciting nominations involves six basic steps, which are carried out by a committee’s designated federal officer. The steps are as follows: Develop selection criteria. This step involves identifying the specific perspectives or points of view that should be represented by members on the committee, such as specific scientific perspectives or understandings of environmental justice. This step applies to both discretionary and non-discretionary committees. In addition, federal laws establish membership requirements for the agency’s non- discretionary committees that designated federal officers must consider when developing selection criteria. For example, the Clean Air Act requires EPA to appoint seven members—including at least one member of the National Academy of Sciences, one physician, and one person representing state air-pollution control agencies—to an independent scientific advisory committee, known as CASAC. The selection criteria developed in this step should be reflected in the notice soliciting nominations. Develop an outreach plan. This plan should: (1) describe in detail how committees intend to solicit a diverse set of nominees and (2) discuss the specific forms of solicitation. For example, one outreach plan we reviewed specified that EPA staff would solicit nominations from the American Academy of Pediatrics, American Chemical Society, and other organizations that can help EPA review the quality, relevance, and performance of its research programs. Develop membership balance plans for discretionary committees. GSA guidance states that membership balance plans for discretionary committees should describe the process used to ensure that committee membership is balanced in terms of the points of view represented and functions to be performed by the committee. For example, one membership balance plan we reviewed stated that EPA staff would consider candidates from farm worker organizations; pesticide industry and trade associations; state, local and tribal governments; and public health and other organizations. According to that membership balance plan, EPA staff also would consider prospective committee members’ geographic location to help achieve balanced membership. Solicit nominations. During this step, the designated federal officer can solicit nominations via Federal Register notices and other means, such as emails to professional associations and specific EPA email distribution lists. In response to these notices, organizations can nominate individuals, or individuals can nominate themselves or other individuals. Contact nominees after receiving nominations. During this step, the designated federal officer confirms nominees’ qualifications and experience as well as their interest in and availability to serve on the committee. Assess the diversity of the pool of nominees and conduct additional outreach, if needed, to increase the diversity of the pool. EPA’s Federal Advisory Committee Handbook provides illustrative examples of how to follow this step. In one example, the handbook explains that a committee needs a representative from local government. For the past several years, the position has been filled by someone from an affluent suburban county. To increase diversity, the handbook recommends that the designated federal officer broaden outreach to other parts of the country, especially local governments that serve low-income, rural, urban, medically underserved, or vulnerable populations. Evaluating candidates similarly involves several steps. The committee’s designated federal officer is primarily responsible for taking these steps for his or her assigned committee. In addition, a deputy ethics official is to review financial disclosure forms for any prospective members who are required to file these forms. In general, the steps for evaluating candidates are as follows: Evaluate candidates against selection criteria. During this step, the designated federal officer identifies the specific point of view that each candidate would bring to the committee—as well as each candidate’s ability to meet the selection criteria after interviewing candidates and reviewing their curriculum vitae, publications, and other relevant information. EPA’s Federal Advisory Committee Handbook notes that having the best people who represent key interests and balanced viewpoints enables the committee to provide EPA with recommendations that the agency can rely on as collective advice representing diverse stakeholder views. Identifying the best candidates may involve reviewing many more nominees than can be appointed. For example, EPA received approximately 100 nominations for 18 positions on the Science Advisory Committee on Chemicals in fiscal year 2017. Prepare a draft membership grid document with staff- recommended candidates and alternates. After evaluating individual candidates, the handbook directs the designated federal officer to recommend at least one primary and alternate candidate for each point of view and consolidate his or her short-list of recommended candidates into a draft membership grid document. The handbook indicates that this is a key step in the agency’s appointment process. It is intended to help designated federal officers identify gaps as they seek to meet FACA requirements for balanced committee membership. The handbook also directs the designated federal officer to submit the draft membership grid to EPA’s Federal Advisory Committee Management Division, EPA’s Office of General Counsel, and the Assistant Administrator for review and approval before submitting final recommendations to the Administrator. Therefore, the draft membership grid, which documents EPA staff’s rationale for recommending specific candidates, is intended to serve as the basis for discussions with EPA management as final decisions about the committee’s composition are made, according to EPA’s Federal Advisory Committee Handbook. Recommending at least one alternate for each point of view is intended to provide the EPA Administrator or Deputy Administrator—who officially selects committee members based on staff recommendations—with flexibility in appointing members, according to the handbook. Review financial disclosure forms for conformance with applicable conflict-of-interest statutes, regulations issued by OGE including any supplemental agency requirements, and other federal ethics rules, which state, among other things, that: SGEs appointed to serve on federal advisory committees generally must file financial disclosure forms within 30 days of assuming their new positions and either before providing advice to the agency or before the first committee meeting if they are eligible to file confidentially. The designated ethics official from each executive branch agency generally is to review financial disclosure reports within 60 days after receiving them and is to certify by signature and date that the filer is in compliance with federal ethics rules, and this official generally may delegate this responsibility. Obtaining approvals involves several steps and numerous EPA officials. The steps for obtaining approvals generally are as follows: EPA’s Federal Advisory Committee Management Division reviews the proposed membership for balance. EPA guidance states that designated federal officers are to obtain written concurrence from the division before preparing the final membership package for the Administrator to sign. EPA’s Office of General Counsel conducts a legal review of the proposed membership. EPA guidance states that designated federal officers are to obtain written concurrence from the Office of General Counsel prior to appointment. Assistant Administrator or Regional Administrator approves the list of recommended candidates that will be presented to the Administrator’s office. Administrator or Deputy Administrator makes final appointment decisions and signs appointment letters. From fiscal year 2017 through the first two quarters of fiscal year 2018, EPA generally followed its established process for most advisory committees; however, in fiscal year 2018, EPA did not follow a key step in its process for appointing 20 committee members to the SAB and CASAC. SAB is the agency’s largest committee and CASAC is responsible for, among other things, reviewing national ambient air-quality standards. In addition, when reviewing the step in EPA’s appointment process related specifically to financial disclosure reporting, we found that EPA did not consistently ensure that SGEs appointed to advisory committees met federal financial disclosure requirements. Our review of agency documents that supported appointment decisions for the 17 committees that appointed or reappointed committee members from fiscal year 2017 through the first two quarters of fiscal year 2018 found that EPA generally followed its process for most committees. All 14 of the discretionary committees that appointed or reappointed members during this time period developed membership balance plans, as required by GSA’s FACA regulations. In addition, 15 committees followed the step in EPA’s appointment process related to draft membership grid documents. That is, 20 of the 22 appointment packets we reviewed had draft membership grid documents reflecting EPA staff input on the best qualified and most appropriate candidates for achieving balanced committee membership. Additionally, 21 of the 22 appointment packets we reviewed contained documentation showing that EPA’s Office of General Counsel reviewed the proposed membership prior to appointment, as recommended by EPA’s Federal Advisory Committee Handbook. Figure 2 shows EPA’s established process and the steps we reviewed. For additional information about the extent to which EPA followed its process for appointing committee members, see appendix III. However, EPA did not follow a key step in its established process for appointing 20 members in fiscal year 2018 to the SAB and CASAC, which advise the agency on environmental regulatory matters, among other things. Specifically, the fiscal year 2018 appointment packets for the SAB and CASAC did not include draft membership grid documents reflecting EPA staff rationales for recommending the candidates EPA’s staff deem best qualified and most appropriate for achieving balanced committee membership. EPA officials told us in March 2019 that they did not prepare draft membership grids, as recommended by EPA’s Federal Advisory Committee Handbook, because EPA management requested a series of briefings instead. EPA officials also told us that during these briefings, EPA staff presented options for management to consider that reflected staff evaluations and summaries of public comments on candidates. EPA management then decided whom to appoint after reviewing the entire list of personnel nominated for membership—not a short-list of staff-recommended candidates, as called for by EPA’s handbook. During previous appointment cycles, EPA documents indicate and officials told us that EPA followed its established process when appointing committee members to SAB and CASAC. Specifically, documents from SAB’s and CASAC’s fiscal year 2017 appointment cycles indicate that both committees prepared draft membership grids in fiscal year 2017 in accordance with EPA’s established process. In addition, SAB and CASAC staff we interviewed told us that the process they used for filling vacancies prior to the fiscal year 2018 appointments involved vetting candidates before documenting in draft membership grids the candidates they deemed best qualified and most appropriate for achieving balanced committees. EPA officials stated that the briefing process they used in fiscal year 2018 was considered better than the use of draft membership grids, as it allowed EPA management to have in-depth discussions with SAB staff, resulting in better knowledge and a greater understanding of the SAB’s and CASAC’s membership needs. In written comments on the draft report, EPA stated that the vetting of candidates for SAB and CASAC occurred in a different manner than in previous years with a process more robust than membership grids. In addition, EPA stated that the public comment process was more robust, going beyond what was prescribed in the traditional membership process. There may be benefits to such discussions and solicitation of input. However, under EPA’s established process, agency staff are to document in draft membership grids and include in appointment packets their rationales for recommending the candidates they deem best qualified and most appropriate for achieving balanced committees. EPA developed guidance to implement FACA, one purpose of which is to encourage the establishment of uniform committee appointment and administration procedures. In written comments on the draft report, EPA noted that agency staff documented evaluations of advisory committee candidates in briefing documents. However, EPA did not provide these documents along with its comments. Moreover, neither these evaluations nor summaries of public comments were included in the packets that EPA’s Federal Advisory Committee Handbook indicates are to contain committee appointment information, impeding EPA’s ability to ensure that it consistently meets—across all of its advisory committees—FACA’s purpose of encouraging uniform committee appointment procedures. In addition, Federal Standards for Internal Control call for management to design control activities to achieve objectives and respond to risks, such as by clearly documenting all transactions and other significant events in a manner that allows the documentation to be readily available for examination. By directing officials responsible for appointing committee members to follow a key step in EPA’s appointment process—developing draft membership grids to document staff rationales for proposed membership—the agency would also have better assurance that it could show how it made appointment decisions to achieve the best qualified and most appropriate candidates for balanced membership. When reviewing the steps in EPA’s appointment process related specifically to financial disclosure reporting, we found that from fiscal year 2017 through the first two quarters of fiscal year 2018, EPA did not consistently ensure that 74 SGEs appointed or reappointed to serve on EPA advisory committees met federal financial-disclosure requirements. Of the 74 disclosure forms we reviewed, an ethics official signed and dated that the filer was in compliance with federal ethics rules for 77 percent, or 57 of the forms. However, for about 23 percent, or 17 of the 74 financial disclosure forms we reviewed, an ethics official had not signed and dated that the filer was in compliance with federal ethics rules. In addition, for about 57 percent, or 42 of the 74 forms we reviewed, we were unable to determine whether an ethics official had reviewed the financial disclosure forms within 60 days after they were filed because the forms did not indicate when EPA had received them. Table 1 illustrates the extent to which EPA took steps to ensure compliance with federal financial-disclosure-reporting requirements relevant to SGEs during this time period. In 2017, OGE found similar weaknesses in EPA’s ethics program. For example, when OGE reviewed a sample of EPA advisory committees’ ethics documents from 2015, it found that none of the financial disclosure forms for one committee had been reviewed—or signed and dated—by an ethics official to indicate that filers were in conformance with federal ethics rules. For two other committees, OGE found that EPA had not received in 2015 certain financial-disclosure forms that were due that year. We also found that EPA’s Ethics Office had not periodically evaluated, through audits or spot-checks, the quality of financial disclosure reviews conducted by its deputy ethics officials for SGEs appointed to advisory committees, as part of the periodic review of its ethics program called for by OGE regulations. An official we interviewed from EPA’s Ethics Office told us that the office did not have the staffing levels necessary to audit or spot-check financial disclosure reviews for SGEs. In addition, in a June 2018 correspondence to OGE about OGE’s review of EPA’s ethics program, EPA’s Designated Agency Ethics Official stated that EPA’s Ethics Office had fewer than three full-time equivalent positions at times during 2017. The correspondence also stated that the agency’s Office of General Counsel is committed to doubling the Ethics Office’s staffing levels in the future to increase oversight of its deputy ethics officials. Federal regulations and guidance specify that EPA has certain oversight responsibilities for its programs—including its ethics program. For example, OGE regulations: state that designated agency ethics officials, acting directly or through other officials, are responsible for carrying out effective financial disclosure programs by, among other things, using information in financial disclosure reports to prevent and resolve potential conflicts of interest; specify actions the official must take if the reviewing official concludes that information disclosed in the report may reveal a violation of applicable laws and regulations; and state that designated agency ethics officials are responsible for periodically evaluating their agencies’ ethics programs. Standards for Internal Control in the Federal Government also states that management should design control activities to achieve objectives and respond to risks, such as by comparing actual performance to planned or expected results and analyzing significant differences. Because EPA had not periodically evaluated through audits or spot- checks the quality of financial disclosure reviews for SGEs appointed to advisory committees, the agency was not well positioned to compare the program’s actual performance with planned results or address instances of noncompliance with federal ethics requirements. Until EPA’s Ethics Office, as part of its periodic review of its ethics program, evaluates—for example, through audits or spot-checks—the quality of financial disclosure reviews conducted for SGEs appointed to EPA advisory committees, it will not have reasonable assurance that it is addressing noncompliance with federal ethics requirements and preventing conflicts of interest among SGEs appointed to EPA advisory committees. EPA officials acknowledged that taking this additional oversight measure could enhance the agency’s ethics program. Of the four characteristics we reviewed—committee composition, regional affiliation, membership turnover, and number of committee meetings— one or more of the first three characteristics changed notably for four of 18 of EPA’s advisory committees after January 2017. There were no notable changes in the four characteristics we reviewed for the other 14 committees for which we reviewed at least one of the characteristics. The committee composition, regional affiliation, or membership turnover of four of EPA’s advisory committees changed notably after January 2017 compared to the period after January 2009. There was no notable change in the fourth characteristic we reviewed—that is, the number of meetings committees held. Each change identified as notable had at least a 20 percentage point difference in the change to the characteristic after January 2017 compared to the period after January 2009. See appendix I for additional information about our methodology. There was a notable decrease in the percentage of members affiliated with academic institutions on the SAB and EPA Board of Scientific Counselors (BOSC) committees after January 2017 compared to the period after January 2009. Our analysis shows that the percentage of committee members with an academic affiliation serving on the SAB decreased by 27 percentage points, or from 77 percent (36 of 47 members) on January 19, 2017, to 50 percent (22 of 44 members) about 15 months later on March 31, 2018. There was little change in the period after January 2009, when the percentage of academic members serving on the SAB remained stable at 83 percent (33 of 40 members) on January 19, 2009, and 82 percent (32 of 39 members) about 15 months later on March 31, 2010. Regarding 2013, academic members serving on the SAB decreased from 82 percent (40 of 49 members) on January 20, 2013 to 73 percent (37 of 51 members) about 15 months later. In addition to academic members, other members serving on the SAB are (1) affiliated with government (federal, local, state, or tribal) or with industry or non-government organizations (NGO); (2) are consultants; or (3) are others we could not assign to one of the above categories. See figure 3. BOSC also experienced a notable decrease in the percentage of members with an academic affiliation serving on the committee after January 2017 compared to the period after January 2009. Our analysis shows that the percentage of committee members with an academic affiliation serving on BOSC decreased by 45 percentage points, or from 65 percent (11 of 17 members) on January 19, 2017, to 20 percent (3 of 15 members) about 15 months later on March 31, 2018. There was little change in the percentage of academic members serving on BOSC after either January 2009 or January 2013. The percentage of members with an academic affiliation serving on BOSC was 55 percent (6 of 11 members) on January 19, 2009, and 56 percent (5 of 9 members) about 15 months later on March 31, 2010. Seven of 12 members were affiliated with academic institutions on January 20, 2013, and 5 of 9 members were similarly affiliated about 15 months later. See table 2. The regional affiliation of SAB committee members also changed notably after January 2017 compared to the period after January 2009. Our analysis shows that members affiliated with the southern region—which spans from Texas to Delaware—increased by about 25 percentage points, or from 28 percent (13 of 47 members) on January 19, 2017, to 52 percent (23 of 44 members) about 15 months later on March 31, 2018. There was little change in the period after January 2009, when the percentage of members affiliated with the southern region increased from 30 percent (12 of 40 members) on January 19, 2009, to 33 percent (13 of 39 members) about 15 months later on March 31, 2009. Regarding 2013, members affiliated with the southern region decreased from 33 percent (16 of 49 members) on January 20, 2013, to 27 percent (14 of 51 members) about 15 months later. Figure 4 shows the regional affiliation of SAB members using U.S. Census regions after January 2017 and January 2009. There was also a notable change in the number of members who left three committees after January 2017 compared to the number of members who left those committees after January 2009. Our analysis shows that of the members serving on January 19, 2017, 71 percent (12 of 17 members) of BOSC, 62 percent (23 of 37 members) of the Clean Air Act Advisory Committee, and 63 percent (25 of 40 members) of the Pesticide Program Dialogue Committee were no longer serving about 15 months later on March 31, 2018. There was little change in the period after January 2009, when 18 percent (2 of 11 members) of the members of BOSC and 3 percent (one of 35 members) of the members serving on the Clean Air Act Advisory Committee on January 19, 2009, were no longer serving on the committees about 15 months later on March 31, 2010. All of the members serving on the Pesticide Program Dialogue Committee (34 members) on January 19, 2009, were also serving about 15 months later on March 31, 2010. Regarding 2013, 25 percent (3 of 12 members) serving on BOSC on January 20, 2013, were not serving about 15 months later. All members serving on the other two committees on January 20, 2013, were also serving about 15 months later. In most instances, the four characteristics that we analyzed—committee composition, regional affiliation, membership turnover, and number of committee meetings held—did not change notably for the committees we reviewed from January 2017 to about 15 months later compared to the same time frame after January 2009. In many of these instances, the characteristics we analyzed had changed, but these changes were not large enough to be considered notable based on the approach we used to identify notable changes. Other than the SAB and BOSC, there were no notable changes after January 2017 in the composition of the five committees for which we analyzed this characteristic. We analyzed the committee composition of the three other committees combined because they did not have enough members to make individual analysis meaningful. Our analysis shows that the largest change after January 2017 that we did not identify as notable also occurred with BOSC. The percentage of members serving on BOSC with a government affiliation increased by 22 percentage points, or from 18 percent (3 of 17 members) on January 19, 2017, to 40 percent (6 of 15 members) about 15 months later on March 31, 2018. This compares to 2009 when the percentage of members serving on BOSC with a government affiliation remained at zero percent on January 19, 2009, (11 members) and about 15 months later on March 31, 2010, (9 members). Other than the SAB, there were no notable changes after January 2017 in the regional affiliation of members of the 10 committees for which we analyzed this characteristic. In addition to the SAB, we analyzed the regional affiliation of three other committees individually and the remaining six committees combined. The largest change in regional affiliation after January 2017 that we did not identify as notable also occurred with the SAB. Members affiliated with the northeast region decreased by more than 14 percentage points, or from 28 percent (13 of 47 members) on January 19, 2017, to 14 percent (6 of 44 members) about 15 months later on March 31, 2018. This compares to 2009 when the percentage of members affiliated with the northeast region stayed about the same, changing from 20 percent (8 of 40 members) on January 19, 2009, to 18 percent (7 of 39 members) about 15 months later on March 31, 2010. Other than BOSC, the Clean Air Act Advisory Committee, and the Pesticide Program Dialogue Committee, there were no notable changes after January 2017 to membership turnover for the 14 committees for which we analyzed this characteristic. In addition to these three committees, we analyzed the membership turnover of six other committees individually and the remaining five committees combined. Our analysis shows that the largest change in membership turnover after January 2017 that we did not identify as notable occurred with the SAB. Of the members serving on this committee on January 19, 2017, 45 percent (21 of 47 members) were no longer serving about 15 months later on March 31, 2018. This compares to 2009 when 35 percent (14 of 40 members) serving on January 19, 2009, were not serving about 15 months later on March 31, 2010. There was no notable change in the percentage decrease of meetings held before and after January 2017 compared to a similar time frame before and after January 2009. We analyzed the number of meetings held by 18 committees. Our analysis shows that for the 18 committees combined, the number of meetings decreased by 40 percent (from 90 to 54 meetings) from the approximately 15 month period before January 2017 to the approximately 15 month period after January 2017. This compares to a 27 percent decrease in meetings (from 164 to 120 meetings) from the approximately 15-month period before January 2009 to the approximately 15-month period after January 2009. Overall, there was a decrease in the number of meetings from before January 2009 to after January 2017. The number of meetings held by the 18 committees combined decreased 67 percent (from 164 to 54 meetings) from the approximately 15-month period before January 2009 to the approximately 15-month period after January 2017. Figure 5 illustrates the decrease in the number of meetings held during this time frame. The figure shows the number of meetings held by SAB separately because of the relatively large number of meetings that it held relative to the other committees. EPA’s federal advisory committees play an important role in advising the agency. EPA generally followed its established process for 15 of the 17 advisory committees that appointed or reappointed committee members during the time period we reviewed. However, EPA did not follow a key step in its process for appointing 20 members to two committees that advise the agency on environmental regulatory matters, among other things. The agency did not prepare draft membership grids with staff rationales for proposed membership, the documents intended to reflect EPA staff input on the best qualified and most appropriate candidates for achieving balanced committee membership before appointing these members. EPA officials told us in March 2019 that they did not prepare draft membership grids, as recommended by EPA’s Federal Advisory Committee Handbook, because EPA management requested a series of briefings instead. There may be benefits to following different procedures; however, under EPA’s established process, agency staff are to document in draft membership grids and include in appointment packets their rationales for recommending the candidates they deem best qualified and most appropriate for achieving balanced committees. By directing officials responsible for appointing committee members to prepare draft membership grids and include them in appointment packets for all committees, the agency would have better assurance that it could show how it made appointment decisions to achieve the best qualified and most appropriate candidates for balanced committee membership. EPA also did not consistently ensure that committee members appointed as SGEs met federal ethics requirements, and as part of its periodic review of its ethics program, EPA did not evaluate through audits or spot- checks the quality of financial disclosure reviews conducted by deputy ethics officials for these committee members. Until EPA’s Ethics Office periodically evaluates—for example, through audits or spot-checks—the quality of financial disclosure reviews conducted for SGEs appointed to EPA advisory committees, it will not have reasonable assurance that it will address noncompliance with federal ethics requirements and prevent conflicts of interest among SGEs appointed to EPA advisory committees. We are making the following two recommendations to EPA: The EPA Administrator should direct EPA officials responsible for appointing advisory committee members to follow a key step in its appointment process—developing and including draft membership grids in appointment packets with staff rationales for proposed membership— for all committees. (Recommendation 1) EPA’s Designated Agency Ethics Official should direct EPA’s Ethics Office, as part of its periodic review of EPA’s ethics program, to evaluate—for example, through audits or spot-checks—the quality of financial disclosure reviews for special government employees appointed to EPA advisory committees. (Recommendation 2) We provided a draft of this report to EPA for review and comment. In its written comments, reproduced in appendix IV, EPA disagreed with a key finding related to the first recommendation, with how we conducted some of our data analyses, and with some of the data points we presented. EPA agreed with the findings and conclusions related to the second recommendation. EPA also provided other comments, which we incorporated as appropriate. EPA stated that it believed a key finding related to the draft report’s first recommendation—that EPA follow, for all committees, the key step in its appointment process related to developing draft membership grids—was in error and should be removed from the final version of the report. EPA also stated that it followed all membership steps outlined in agency guidance with the exception of two committees, SAB and CASAC, who substituted the development of a membership grid with what the agency states was a more rigorous examination of the candidates (a series of briefings with senior management discussing the strengths and weaknesses of potential candidates). EPA stated that this is within the discretion of the EPA Administrator and that the vetting of candidates for SAB and CASAC occurred in a different manner than in previous years with a process more robust than membership grids. In addition, EPA stated that the public comment process was more robust, going beyond what was prescribed in the traditional membership process. According to EPA, for SAB and CASAC, the public was offered additional opportunity to provide input on all nominated candidates under consideration. We agree that conducting such briefings is within the discretion of the EPA Administrator, and we did not assess the outcomes of the membership appointment process. However, it remains that for SAB and CASAC, EPA did not follow a key step in its established appointment process—as documented in its agency-wide handbook—in which agency staff are to document in draft membership grids their rationales for recommending the candidates they deem best qualified and most appropriate for achieving balanced committees. While there may be benefits to following any number of alternative processes for appointing committee members, as EPA stated in its Federal Advisory Committee Advisory Handbook, EPA developed the handbook to help agency officials comply with FACA requirements. For these two advisory committees, EPA did not follow its established committee appointment process, impeding EPA’s ability to ensure that it consistently meets— across all of its advisory committees—FACA’s purpose of encouraging uniform committee appointment procedures. Furthermore, EPA did not provide documentation of the “more rigorous examination” of candidates it conducted in briefings. In its written comments, EPA stated that the SAB Staff Office documented staff evaluations in briefing documents and that we did not request such documents. However, we requested all appointment packets for the 17 committees that appointed or reappointed committee members from fiscal year 2017 through the first two quarters of fiscal year 2018. These appointment packets were to contain the documents used by EPA management to make appointment and reappointment decisions. EPA did not include the briefing documents in their packets for the SAB or CASAC, impeding EPA’s ability to ensure that it consistently meets— across all of its advisory committees—FACA’s purpose of encouraging uniform committee appointment procedures. Nor did the agency provide any such documentation in subsequent discussions about the extent to which the agency followed its established process. Our most recent meeting with EPA took place on March 19, 2019. As appropriate, we modified the report to further clarify our specific finding. Moreover, EPA disagreed with how we conducted some of our data analyses and with some of the data points we presented. We took numerous steps to ensure the accuracy of the data points presented in this report. In some instances, we identified missing or inconsistent data and shared this information with EPA officials. EPA provided some corrected data for members with missing or inconsistent appointment- date data from October 1, 2015 to March 31, 2018. We also asked EPA staff to confirm that the data had been updated in the FACA database, discussing the data with individual EPA staff members, conducting logic tests and spot-checking the data to identify errors and inconsistencies, and providing EPA with an opportunity to review and correct in writing the data presented prior to preparing our draft report. Also, in its written comments, EPA stated that we did not review data for BOSC subcommittees. Our methodology focused on the composition of committees and not their subcommittees. We continue to believe that the methodology we employed to analyze data was appropriate. We outline our rationale in appendix I, which includes the steps we took to ensure data reliability. For these reasons, we do not plan to make any further changes based on the additional data EPA provided. Lastly, EPA did not dispute our findings and conclusions related to the second recommendation that the agency evaluate, for example, through audits or spot checks, the quality of financial disclosure reviews for special government employees appointed to EPA advisory committees. EPA noted that at the time of our audit, its Ethics Office was understaffed. In its written comments, EPA said that it has now resolved these staffing issues and is engaged in a full and thorough review of all employees’ (including special government employees serving on federal advisory committees) ethics forms to ensure they meet all ethics requirements. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Administrator of the U.S. Environmental Protection Agency, the Administrator of the U.S. General Services Administration, and the Director of the U.S. Office of Government Ethics. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made major contributions to this report are listed in appendix V. To describe the U.S. Environmental Protection Agency’s (EPA) established process for appointing members to serve on EPA advisory committees, we identified and reviewed the federal laws, regulations, and policies that are relevant to EPA’s process for appointing advisory committee members. To ensure that we correctly identified all relevant laws, regulations, and guidance, we consulted with: (1) the Committee Management Secretariat at the U.S. General Services Administration (GSA), which issues regulations and guidance for Federal Advisory Committee Act (FACA) committees government-wide; (2) the U.S. Office of Government Ethics, which develops ethics-related regulations for executive branch employees; and (3) EPA. Examples of EPA guidance that we reviewed include EPA’s Federal Advisory Committee Handbook, Strengthening and Improving Membership on EPA Federal Advisory Committees, and EPA Ethics Advisory 2008-02. To evaluate the extent to which EPA followed its established process for appointing members from fiscal year 2017 through the first two quarters of fiscal year 2018, we reviewed pertinent documentation from the 17 committees that appointed or reappointed advisory committee members during this time frame. The remaining committees did not appoint any committee members during the time frame we reviewed. For the above- mentioned 17 committees, we reviewed all advisory committee appointment packets—each of which can contain appointment documents for numerous appointees or reappointees—produced during this time. We also reviewed the first section (Section 1: Identifying Information and Record of Agency Review) of the Confidential Financial Disclosure Form for EPA Special Government Employees (EPA Form 3110-48) for 74 individuals who were required to submit them to EPA to determine if they met federal financial-disclosure-reporting requirements. We reviewed all 74 of the forms provided by the 8 committees that appointed or reappointed special government employees (SGE) to serve on a committee from fiscal year 2017 through the first two quarters of fiscal year 2018. Additionally, we interviewed EPA officials involved with appointing committee members to understand the steps these officials took. We then compared the steps they described taking with selected steps in EPA’s established process for appointing members to evaluate the extent to which the agency followed its process. We focused on steps in the appointment process that were to be documented in the appointment packets, which EPA used to support appointment decisions. Specifically, we reviewed those aspects of the process for which EPA had documentary evidence, and we evaluated the implementation of ethics oversight requirements that are relevant to EPA’s committee-member appointment process. To determine whether the agency followed selected steps in its established process, two senior analysts reviewed the appointment packets. Specifically, one senior analyst conducted the primary analysis for about half of the 22 appointment packets we received, while the other conducted the primary analysis for the remaining packets. Afterwards, each analyst reviewed the other’s conclusions and noted agreement or disagreement based on the evidence provided. In some cases, discussion was necessary to resolve differences of opinion between the two analysts. Those discussions were documented. If additional documentation was necessary to resolve differences of opinion, we obtained additional information from the agency. The two analysts reached agreement on all of the packets. To describe how, if at all, selected characteristics of EPA’s advisory committees changed after January 2017, we analyzed information from the FACA database, a publically-available database maintained by GSA. The database contains information about FACA advisory committees that agencies, including EPA, are required to provide. The initial scope of our review was the 22 committees in existence on March 31, 2018. Of these 22 committees, we excluded from all of our analyses the four committees that were established after November 2007 because this is the earliest date of one of our analyses. We also excluded four other committees from the three analyses that rely on member appointment start and end dates (committee composition, membership turnover, and regional affiliation) because of missing or inconsistent data. Additionally, we excluded some other committees from some of our analyses because of other types of data reliability issues or because of the nature of the characteristic. To assess the reliability of the committee data, we reviewed database technical documentation and interviewed GSA and EPA officials to identify any potential issues with our planned analysis of the data, among other things, and determined that overall the data were sufficiently reliable for conducting analysis to describe changes in selected member and committee characteristics for our selected time periods. We discuss additional steps we took to assess the reliability of the data and data reliability issues with the FACA database at the end of this appendix. Additionally, appendix II identifies which committees we excluded from which analyses and the reasons why. Primarily using information available in the FACA database, we compared changes in four committee characteristics across committees and changes in presidential administrations. Specifically, we measured the characteristics before and after January 20, 2017, and compared them to similar periods before and after January 20, 2009. Additionally, we also compared the characteristics to those before and after January 21, 2013, to provide context to our findings and identify any patterns over time in the data. The four characteristics we measured and compared across committees and changes in presidential administrations were: Number of committee meetings For the first two characteristics, we compared across committees the percentage of members in the characteristics’ categories on either January 19, 2017, or January 19, 2009, to a day about 15 months later (either March 31, 2010, or March 31, 2018). For membership turnover, we compared across committees the percentage of members on either January 19, 2017, or January 19, 2009, who left a committee by about 15 months later (either March 31, 2010, or March 31, 2018). We chose March 31, 2018, to allow for a period of time after January 2017 for changes to occur in committee characteristics, and the fiscal year 2018 data file we received from GSA was updated as of March 31, 2018. For the fourth characteristic, we compared across committees the number of meetings held in the 15 months before January 20, 2009 and January 20, 2017, to a similar period after those dates (November 12, 2007, to March 31, 2010, or November 12, 2015, to March 31, 2018). To identify changes to a characteristic that were notable, we used the following methodology. First we identified any changes after January 2017 that were large relative to other changes to that characteristic after January 2017. If we identified a relatively large change, we then compared it to changes to the characteristic after January 2009 to assess whether it was large relative to those changes. If it was, we would identify the change as notable. The committees we analyzed individually had at least 10 members (or 10 meetings) in the relevant time periods being measured, with the exception of two committees which had nine members on March 31, 2010. We analyzed the other committees combined since relatively small changes in counts would have a relatively large impact on percentages. We measured the committee composition of 5 of 18 committees. We excluded 4 of the 18 committees because of data reliability issues and 9 committees because they were not staffed primarily with SGEs. We limited the committee composition analysis to SGEs because SGEs are expected to provide their best judgement free from conflicts of interest, rather than represent a particular viewpoint. We analyzed two of the five committees individually and the other three committees combined. To measure the composition of the five committees, we first categorized each member’s occupation from the “occupation/affiliation” field in the FACA database into one of six categories. The categories were: non-government organization (NGO); or other. To assign the categories, one GAO analyst reviewed the occupation/affiliation data for each member and assigned one of five categories (academic, consultant, government, industry, or NGO) to each member. In instances where it was unclear what category to assign, the analyst conducted online searches regarding the occupation/affiliation information to identify the type of entity and assign a category. We assigned the category “other” in 30 instances where the member was affiliated with more than one of the other categories, not affiliated with any of the other categories (for example, retired), or for which the FACA database did not provide sufficient information to assign one of the other categories. A second analyst reviewed the reasonableness of the categories assigned by the first analyst—including the additional research. The two analysts reached consensus on the categories for each member. We then applied the methodology described above to identify notable changes in committee composition after January 2017. We measured the regional affiliation of 10 of 18 committees. We excluded 8 committees because of data reliability issues. We analyzed 4 of the 10 committees individually and the other 6 committees combined. To measure the regional affiliation of the 10 committees, we assigned one of four U.S. Census regions (as defined by the U.S. Census Bureau) to each committee member based on data in the “occupation/affiliation” field in the FACA database for that member—in most instances, state information is included in this field. We then applied the methodology described above to identify notable changes in regional affiliation to the period after January 2017. The regions were: Western. We measured membership turnover in 14 of 18 committees. We excluded 4 committees because of data reliability issues. We analyzed 9 of the committees individually and the other 5 committees combined. To measure membership turnover of the 14 committees, we used date fields indicating when committee members began and ended their terms to determine the percentages of members on a committee on January 19, 2017, and January 19, 2009, who were not members about 15 months later. We then applied the methodology described above to identify notable changes in membership turnover after January 2017. We measured the change in the number of meetings for 18 committees. We analyzed two of the committees individually and the other 16 committees combined. To measure this characteristic, we used data on the date that meetings were held (we used the date that the meeting began if it was a multi-day meeting). We then applied the methodology described above to identify notable changes in the number of meetings after January 2017. We assessed the reliability of the data provided to us by GSA and took certain steps to prepare the data for analysis. GSA provided us with data files downloaded to Excel from its FACA database from October 1, 2005, to March 31, 2018, for our analysis. GSA maintains the FACA database on a fiscal year basis. During the fiscal year, staff in each agency, including EPA, are to enter data to reflect any changes about the agency’s FACA committees. At the end of each fiscal year, GSA is to perform, in conjunction with each agency, an annual comprehensive review of the data entered into the database by the agency for that fiscal year. According to GSA officials, these reviews constitute the agency’s main process for ensuring the reliability of the database. Once the review is complete, the data are locked down, meaning they can no longer be changed. We received data through the 2017 fiscal year after GSA completed the 2017 review. Because this latest GSA review was the end of fiscal year 2017 and we wanted to include data into 2018, we requested that EPA update the database to March 31, 2018, for each committee for certain data fields relevant to our analyses. We asked that for each committee, the EPA staff member responsible for entering a committee’s data in the FACA database provide confirmation to us that the data had been updated through March 31, 2018. After we received confirmation that data for the 22 committees in existence on March 31, 2018, had been updated, GSA staff provided us the data update for EPA committees from October 1, 2017, through March 31, 2018. To further assess the reliability of these data, we reviewed the database’s technical documentation and interviewed GSA and EPA officials to identify any potential issues with our planned analysis of the data. We conducted logic tests and spot-checked the data to identify errors and inconsistences. For example, we scanned committee member’s names to identify potential duplicates of the same person in the same committee and made corrections where appropriate. If a person served on more than one committee, we included that person separately for each committee on which he or she served. For each member, we also checked the appointment start and end dates indicated in each fiscal year for inconsistencies across fiscal years. In some instances, we identified missing or inconsistent data in these dates and shared this information with EPA officials. EPA was able to provide some corrected data for members with missing or inconsistent appointment-date data from October 1, 2015, to March 31, 2018. We excluded from our analyses four committees for which over 30 percent of members had appointment date issues we were not able to resolve, as well as individual members with unresolved date issues for the committees we included in the analysis. We also checked the 2018 data that GSA provided to us against the data posted to EPA’s website. We determined that overall the data were sufficiently reliable for conducting analysis to describe changes in selected member and committee characteristics for our selected time periods. Finally, we took steps to structure the data provided by GSA in the format needed for our analyses. Specifically, because GSA maintains its data on a fiscal year basis, the data we received from GSA contained a separate row in the database for each committee member for each fiscal year that he or she was a member. To facilitate our analyses, we transposed the dataset so there was one row for each member (for each committee, if a member was in more than one committee) that contained the data from all of the fiscal year records for that member. We conducted this performance audit from October 2017 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 3 provides information about each of the 22 advisory committees managed by the U.S. Environmental Protection Agency (EPA) as of March 31, 2018. For each of these committees, the table also identifies whether we included it in one or more of our analyses. If we excluded a committee from certain analyses, we also explain why. Table 4 summarizes the number of advisory-committee appointment packets for which the U.S. Environmental Protection Agency (EPA) did or did not follow the steps we evaluated for appointing members to serve on EPA advisory committees. In addition to the individuals named above, Joseph Thompson (Assistant Director), John Delicath, Charles Egan, Chad Gorman, Richard Johnson, Yvonne Jones, Mary Koenen, James Lager, Amber Sinclair, and Kiki Theodoropoulos made important contributions to this report.", "summary": "Federal advisory committees provide advice to federal agencies on many topics. As of March 31, 2018, EPA managed 22 such committees. They advise the agency on such issues as developing regulations and managing research programs. Questions have been raised about EPA's process for appointing committee members after recent policy changes affecting who serves on the advisory committees. GAO was asked to review issues related to how EPA appoints advisory committee members. This report examines: (1) EPA's process for appointing advisory committee members, (2) the extent to which EPA followed its process for selecting members from October 2016 through March 2018, and (3) how, if at all, selected characteristics of EPA advisory committees changed after January 2017. GAO reviewed relevant federal laws, regulations, and guidance; reviewed documents from committees that appointed members over this period; analyzed information from the GSA's FACA database; and interviewed agency officials. Based on GAO's review of U.S. Environmental Protection Agency's (EPA) guidance, the agency's established process for appointing advisory committee members involves three main phases: soliciting nominations, evaluating candidates, and obtaining approvals. Each phase involves several steps. For example, a key step for evaluating candidates involves EPA staff's preparing documents that reflect staff recommendations on the best qualified and most appropriate candidates for achieving balanced committee membership, according to EPA guidance. EPA generally followed its established process for most of its 22 advisory committees; however, in fiscal year 2018, EPA did not follow a key step for appointing 20 committee members to two committees GAO reviewed: the EPA Science Advisory Board and Clean Air Scientific Advisory Committee, which advise the agency on environmental regulatory matters, among other things. The 2018 appointment packets for these two committees did not contain documents reflecting EPA staff rationales for proposed membership, as called for by EPA's established process. EPA developed guidance to implement the Federal Advisory Committee Act (FACA). By directing officials responsible for appointing committee members to follow a key step in its process to document staff rationales for proposed membership, the agency would have better assurance that it will (1) consistently meet FACA's purpose of encouraging uniform appointment procedures and (2) show how it made appointment decisions to achieve the best qualified and most appropriate candidates for balanced committee membership. EPA also did not consistently ensure that members appointed as special government employees (SGE)—who are expected to provide their best judgment free from conflicts of interest and are required by federal regulations to disclose their financial interests—met federal ethics requirements. For about 23 percent, or 17 of the 74 financial disclosure forms GAO reviewed, an ethics official had not signed and dated that the SGE filing the form was in compliance with federal ethics rules. EPA also did not periodically review its ethics program, as called for by federal regulations, such as through audits or spot-checks, to evaluate the quality of financial disclosure reviews for SGEs. Until EPA's Ethics Office evaluates the quality of financial disclosure reviews of SGEs as part of its periodic review of its ethics program, it will not have reasonable assurance that it will address noncompliance with federal ethics requirements and prevent conflicts of interest on its advisory committees. Based on GAO's review of the U.S. General Services Administration's (GSA) FACA database, there were notable changes to selected characteristics of EPA advisory committees (i.e. at least a 20 percentage point difference in the change to a characteristic after January 2017 compared to the period after January 2009). Of the four characteristics GAO reviewed—committee composition, regional affiliation, membership turnover, and number of meetings committees held—one or more of the first three changed notably for four of 18 EPA advisory committees after January 2017. GAO is recommending that EPA direct (1) officials responsible for appointing committee members to follow a key step in its appointment process to document staff rationales for proposed membership and (2) EPA's Ethics Office to evaluate the quality of financial disclosure reviews of SGEs appointed to advisory committees. EPA disagreed with the first and agreed with the second recommendation. GAO continues to believe that both are valid, as discussed in the report.", "document_type": "gao"}
{"report": "According to the National Research Council, although the exact details cannot be predicted with certainty, climate change poses serious risks to many of the physical and ecological systems on which society depends. Moreover, according to key scientific assessments, the effects and costs of extreme weather events such as floods and droughts will increase in significance as what are considered rare events become more common and intense because of climate change. According to the National Academies of Sciences, Engineering, and Medicine, extreme weather events are directly traceable to loss of life, rising food and energy prices, increasing costs of disaster relief and insurance, fluctuations in property values, and concerns about national security. Table 1 shows seven effects commonly associated with climate change that DOD has documented. According to a 2010 National Research Council report on making informed decisions about climate change and our October 2009 report on climate change adaptation, most decision makers need a basic set of information to understand and make choices about how to adapt to the effects of climate change. This set of information includes information and analysis about observed climate conditions, information about observed climate effects and vulnerabilities, and projections of what climate change might mean for the local area. In November 2015, we found that in order for climate information to be useful, it must be tailored to meet the needs of each decision maker, such as an engineer responsible for building a bridge in a specific location, a county planner responsible for managing development over a larger region, or a federal official managing a national-scale program. Agencies across the federal government collect and manage many types of climate information, including observational records from satellites and weather monitoring stations on temperature and precipitation, among other things; projections from complex climate models; and tools to make this information more meaningful to decision makers. For example, the Fourth National Climate Assessment, completed in November 2018 by the U.S. Global Change Research Program, references various sources of climate information, including projected temperature and precipitation data. Likewise, in 2016, a multi-agency group led by the Strategic Environmental Research and Development Program (SERDP) developed a report and accompanying database of future sea level projections and extreme water levels, which as of May 2019 contained sea level change projections for 1,813 DOD sites worldwide. Climate projections are typically a range of possible future scenarios for particular time frames. Multiple future scenarios allow for planners and engineers to see a range of possible conditions that could occur at various points in time. For example, a planner or engineer could consider four different future scenarios occurring over the course of 20, 40, or 60 years or over the service life of the project being designed. Figure 1 shows an example of sea level change projections provided by the National Oceanic and Atmospheric Administration (NOAA). Specifically, the chart shows historical mean sea levels and multiple scenarios of projected relative sea level rise in Norfolk, Virginia. The chart shows the historical annual mean sea level from 1960 to 2018 through the bold black line. The projections use 2000 as a starting point, and so overlap with the historical data. Relative sea level rise takes into account changes in land levels—in the Norfolk area the land is generally subsiding over time. Each scenario is based on different assumptions about future greenhouse gas emissions, according to an official from NOAA’s National Ocean Service. Planners and engineers can use the multiple scenarios to evaluate when potential effects could occur and determine their risk tolerances to inform their planning or design choices. Figure 2 similarly shows the same historical mean sea levels at Norfolk, Virginia, as well as the very likely range of projections of future relative sea levels, according to the National Ocean Service. This chart shows the range of possibilities considered very likely—those between the low and intermediate scenarios in figure 1—according to an official from NOAA’s National Ocean Service. Master planning for military installations involves the evaluation of factors affecting the present and future physical development and operation of a military installation. DOD requires all installations to develop master plans. DOD’s instruction on real property management states that plans must be based on a strategic assessment of the operational mission and expected use of the installation. The plans must cover at least a 10-year period and be updated every 5 years, or more often if necessary. The plans must include lists, by year, of all construction projects, major repair and sustainment projects, and restoration and modernization projects needed within the time period covered by the plan. Individual DOD facilities projects within installations must be designed in accordance with DOD’s facilities design standards, which are defined in the Unified Facilities Criteria. Unified Facilities Criteria are technical manuals and specifications used for planning, design, construction, maintenance, and operations of all DOD facilities projects. The U.S. Army Corps of Engineers, Naval Facilities Engineering Command, and the Air Force Civil Engineer Center are responsible for administering and updating the Unified Facilities Criteria. The Unified Facilities Criteria include a core group of 27 standards that apply to building systems found in most DOD facility construction projects, and include standards such as architecture, roofing, and civil engineering. Engineers and planners apply the criteria that are most appropriate for their individual facilities projects to their project proposals and designs. Table 2 shows excerpts from requirements and guidance to project designers in the Unified Facilities Criteria relevant to the consideration of climate. Table 2. Excerpts from Unified Facilities Criteria Requirements and Guidance on Consideration of Climate Excerpt consider site-specific, long-term, climate change impacts such as drought, flood, wind, and wildfire risks. Knowing the probable wind speed and direction in a particular month can be helpful in construction and mission planning as well as in designing structures that experience severe wind-driven rain or drifting snow. Pumps, piping, and equipment must be protected from the weather. In cold climates pumps and piping must be protected from freezing temperatures. The pump station building must comply with 1-200-01 , be constructed of noncombustible materials and meet applicable building standoff distances. In new construction, the roof system selection is an integral part of the overall building design and must take into account interior building usage and climate. For example, the building can be designed to prevent outward moisture drive, support heavy roof systems (such as garden roofs or paver systems), or sloped for the desired durability (life cycle cost benefit) and aesthetic considerations. Building shape, orientation, and design must utilize the site seasonal environmental factors to minimize annual facility energy use and to optimize daylighting. Coordinate building and glazing orientation and architectural shading with seasonal solar angles and prevailing winds to enhance energy performance of the building within the site-specific micro climate. Streets, paved parking lots, roofs, and other impermeable surfaces allow no infiltration of runoff and provide little resistance to flow. Runoff draining from these surfaces can be highly concentrated and move at a velocity greater than runoff flowing over an unpaved surface. Soils must be protected from this erosive force, particularly at the edges of impermeable surfaces and soils. 11988 directs all Federal agencies to avoid floodplain development wherever there is a practicable alternative. When development within the floodplain is considered, evaluate alternative site locations to avoid or minimize adverse impacts to the floodplain. When mission needs require siting a building within or partially within the 100-year floodplain, indicate…the base flood elevation…and the minimum design flood elevation…. Extreme weather and climate change effects can damage infrastructure, requiring repairs and resulting in budgetary risks (i.e., costs) to DOD. While no individual weather event can be definitively linked to climate change, particular weather events can demonstrate the vulnerability of military facilities. For example, in October 2018, Hurricane Michael devastated Tyndall Air Force Base in Florida, shutting down most base operations until December; causing severe damage to the flight line, drone runway, and other base facilities including family housing; and destroying the base’s marina. The Air Force estimates that repairs at the base will cost about $3 billion and take 5 or more years to complete. Camp Lejeune and Marine Corps Air Stations Cherry Point and New River in North Carolina sustained heavy damage to facilities, housing, and training locations from Hurricane Florence in September 2018. The Marine Corps estimates that the recovery from the hurricane damage will cost about $3.6 billion and take years to complete. In 2014, we reported that more frequent and more severe extreme weather events and climate change effects may result in increased fiscal exposure for DOD. In the same report, officials provided examples of costs associated with extreme weather and climate change effects at DOD facilities. For example, officials from a Navy shipyard we visited stated that the catastrophic damage that could result from the flooding of a submarine in dry dock could cause substantial repair costs. In 2017, we found that DOD installations overseas face operational and budgetary risks posed by weather events and climate change effects at the military services’ installations in each of DOD’s geographic combatant commands. We recommended that the Secretaries of the Army, Navy, and Air Force work with the Office of the Secretary of Defense to issue a requirement to their installations to systematically track the costs associated with extreme weather events and climate change effects. DOD did not concur with this recommendation. In its response, DOD stated that tracking impacts and costs associated with extreme weather is important, but that the science of attributing these events to a changing climate is not supported by previous GAO reports. DOD also stated that associating a single event with climate change is difficult and does not warrant the time and money expended in doing so. However, as we stated in our response to DOD’s comments, installations generally have the capability to track the costs associated with extreme weather events, which are projected to become more frequent and intense as a result of climate change. There is substantial budgetary risk resulting from weather effects associated with climate change, and these types of repairs are neither budgeted for nor clearly represented in the federal budget process. As of April 2019, the military departments have not implemented this recommendation. Fifteen of the 23 installations we visited or contacted had integrated some considerations of extreme weather or climate change effects into their plans. For example, Langley Air Force Base, Virginia, partnered with the City of Hampton, Virginia, to study the effects of sea level rise. A 2018 addendum to the installation’s 2010 joint land use study with the City of Hampton outlined climate vulnerabilities and identified recommendations for actions to increase installation resilience. Separately, after sustaining damage from Hurricane Isabel in 2003, the installation required all new development to be constructed to a minimum elevation of 10.5 feet above sea level, higher than the flooding associated with the hurricane and one foot higher than the flooding anticipated from a storm with a 1-in-500 chance of occurring in any given year. As DOD noted in its January 2019 report to Congress on climate-related vulnerabilities, Joint Base Langley-Eustis, of which Langley Air Force Base is a part, has experienced 14 inches in relative sea level rise since 1930, due in part to land subsidence, and has experienced more frequent and severe flooding as a result. The 611th Civil Engineer Squadron, based at Joint Base Elmendorf- Richardson in Alaska, partnered with the University of Alaska, Anchorage, to develop site-specific predictive models of coastal erosion for two radar sites on the North Slope of Alaska. The squadron plans to use this information in the future to develop possible alternative facilities projects to address the erosion risks. Squadron officials told us they consulted with the military users of the radars to determine the length of time to plan for their continued use and that they intend to use this information to develop plans to address this coastal erosion. The North Slope radar sites are experiencing greater than anticipated coastal erosion rates, which have begun to threaten the infrastructure supporting the sites. Fort Irwin, California, in response to severe flash flooding in 2013 that caused loss of power and significant damage to base infrastructure, worked with the U.S. Army Corps of Engineers to develop a plan to improve stormwater drainage. The 2014 plan recommended a series of infrastructure projects, some of which Fort Irwin has implemented; others remain to be implemented, depending on the availability of funding. Figure 2 depicts flooding damage in 2013 at Fort Irwin and a stormwater diversion channel subsequently built by the installation. The flash flooding on the installation caused damage to roads and other facilities throughout the installation, according to officials. The installation subsequently raised berms and built other structures, such as the diversion channel shown in figure 3, to divert stormwater from installation facilities. Marine Corps Recruit Depot Parris Island, South Carolina, reported that the installation plans to award a contract to study sea level rise at the installation and incorporate the results into the next iteration of its master plan. The installation stated that incorporating the study’s results is included in the scope of work for the contract that has been awarded for the master plan update. Naval Station Norfolk, Virginia, noted in its 2017 master plan that climate change and sea level rise are expected to exacerbate effects to the installation from tidal flooding and storm surge, increasing risks to installation assets and capabilities. The plan established a goal of identifying measures that could minimize the effect of sea level rise on the installation. With the majority of the installation near mean sea level, Naval Station Norfolk is vulnerable to frequent flooding that is disruptive to operations. Figure 4 depicts flooding at Naval Station Norfolk. Installation officials told us that such floods can interfere with traffic on base, thus reducing the ability of those working on the installation to transit within, to, and from the base. Naval Base San Diego, California, noted in its most recent master plan that local climate change effects include water and energy shortages, loss of beaches and coastal property, and higher average temperatures, among others. The plan also stated that Naval Base San Diego should be funded to conduct a study to determine installation-specific effects of sea level rise. Navy Region Southwest subsequently partnered with the Port of San Diego to study local effects of sea level rise, which installation officials said will help them understand the effects of sea level rise on the base. Camp Lejeune, North Carolina, participated in a study of the effects of sea level rise on the installation and on certain other DOD installations in North Carolina and Florida. An installation official stated that installation officials have used the results of the study to make planning decisions, in particular by feeding the study data into the installation’s mapping of potential flood zones. The 10-year study, which concluded in 2017, was funded by SERDP and was based at Camp Lejeune to, among other things, understand the effects of climate change at Camp Lejeune. Camp Lejeune officials and one of the scientists involved in the study told us that installation officials have used the study’s results to make decisions about where to site buildings so as to take into account the possible future condition of marshes on the base. However, 8 of the 23 installations we visited or contacted had not integrated considerations of extreme weather or climate change effects into their master plans or related installation planning documents. For example, Joint Base Pearl Harbor Hickam, Hawaii, did not consider extreme weather and climate change effects in its most recent master plan, although it is located in an area that has been subject to tropical storms and where, according to projections in the DOD database of sea level change scenarios, further sea level rise is anticipated. Specifically, under the highest scenario in the database, sea level at Naval Station Pearl Harbor, part of the joint base, could rise more than 3 feet by 2065. The lowest elevation point on the base is 0.6 feet below sea level. The installation stated that it plans to incorporate the effects of climate change into the next update to its facilities master plan. Pearl Harbor Naval Shipyard, Hawaii, did not consider extreme weather or climate change effects in its most recent master plan, although it is co-located with Joint Base Pearl Harbor Hickam and therefore shares the same weather and climate conditions noted previously. Fort Wainwright, Alaska, officials told us they had not considered climate change as part of the installation’s master planning. Officials noted that the majority of the base is on thaw-stable permafrost that would be unlikely to be significantly affected by rising temperatures, but some areas of the base are on less stable permafrost. DOD noted in its January 2019 report to Congress that thawing permafrost can decrease the structural stability of buildings and other infrastructure that is built on it. Camp Pendleton, California, officials told us that although they are aware of a variety of climate-related challenges to their installation and have taken or plan to take some steps to address them, an example of which we discuss later in this report, the installation has not yet considered extreme weather and climate change effects in its master plan. The officials stated that they are still planning based on historical conditions rather than considering possible future conditions. DOD’s Unified Facilities Criteria standard specific to master planning states that where changing external conditions affect planning decisions, master planners should seek to understand, monitor, and adapt to these changes, including changes in climatic conditions such as temperature, rainfall patterns, storm frequency and intensity, and water levels. DOD’s directive on climate change adaptation further states that military departments should integrate climate change considerations into their plans. The directive also states that the Assistant Secretary of Defense for Energy, Installations, and Environment should consider climate change adaptation and resilience in the installation planning process, including the effects of climate change on both built and natural infrastructure. Our findings based on the 23 installations we reviewed for this report are consistent with our prior reports on extreme weather and climate change effects at military installations. Specifically, installations have not consistently integrated these considerations into their master plans or related installation planning documents. In May 2014, we reported that some domestic installations had integrated considerations of changing climatic conditions into their installation planning documents, but DOD had not provided key information—such as how to use climate change projections—to help ensure that efficient and consistent actions would be taken across installations. We recommended that DOD further clarify the planning actions that should be taken in installation master plans to account for climate change, to include further information about changes in applicable building codes and design standards that account for potential climate change effects and further information about potential projected climate change effects on individual installations. However, as of January 2019, DOD had not fully implemented this recommendation. For example, as we discuss later in this report, DOD’s updates to its facilities design standards lacked guidance on the use of climate projections. DOD also had not provided information on a range of potential effects of climate change on individual installations. DOD has taken some positive steps in this area, such as making available to the military services a database of sea level change scenarios for 1,774 DOD sites worldwide. However, DOD has not provided other specific types of climate projections, which we discuss in more depth later in this report. Moreover, in November 2017 we reported that about a third of the installations in our sample of overseas installations had integrated climate change adaptation into their installation plans, but the lack of key guidance and updated design standards to reflect climate change concerns hampered their ability to consistently incorporate climate change adaptation into their plans. We recommended, among other things, that the military departments integrate climate change data and projections into DOD’s facilities criteria and periodically revise those standards based on any new projections, as appropriate. DOD partially concurred, and as of January 2019, an official from the Office of the Assistant Secretary of Defense for Sustainment stated that the office was continuing to work with the military departments to evaluate how to effectively translate the latest climate data into a form usable by installation planners and facilities project designers. Based on our findings for this review, we continue to believe that DOD should take all necessary steps to implement these recommendations. While 15 of the 23 installations we visited or contacted had integrated some consideration of extreme weather or climate change effects into their planning documents, only two of these installations had taken steps to fully assess the weather and climate risks to the installation or develop plans to address identified risks. DOD has taken some broad actions to assess risk to installations from extreme weather and climate change effects. For example, in January 2018, DOD issued a report to Congress on the results of its survey of installations on the extent to which they faced a variety of extreme weather or climate effects. However, the survey responses constituted a preliminary assessment and were based on installations’ reporting of negative effects they had already experienced from extreme weather effects, rather than assessments of all future vulnerabilities based on climate projections. DOD noted that the information in the survey responses is highly qualitative and is best used as an initial indicator of where a more in-depth assessment may be warranted. However, except for two of the installations in our sample, the installations’ master plans and related installation planning documents did not (1) identify a range of possible extreme weather events and climate change effects that could affect the installation, (2) assess the likelihood of each event occurring and the possible effect on the installation, and (3) identify potential responses to these events. For example, Naval Air Station Key West, Florida, included discussion of the effects of sea level rise and storm surge on the installation in its master plan, as well as steps it could take to mitigate these effects. However, although the installation experienced drought conditions rated severe in 2011 and extreme in 2015, its master plan does not discuss effects on the installation of drought, which, according to a DOD report to Congress, can pose significant risks to an installation, including implications for base infrastructure. All of the Air Force installations in our sample rated their degree of vulnerability to a range of climatic conditions—such as flood, temperature rise, and precipitation pattern changes—in their master plans, thereby identifying a range of possible climate events and the likelihood of each event. However, of those installations that identified a range of possible extreme weather and climate change effects that could affect the installation, most did not consistently identify potential responses to these events. The two exceptions—Eglin Air Force Base, Florida, and Joint Base Langley-Eustis, Virginia—took the additional step of identifying possible actions to address these climate events. For example, Eglin Air Force Base rated itself as having a high vulnerability to storm surge, but a low vulnerability from rising temperatures, and identified steps the installation could take in facilities planning and design to mitigate the identified risks. The DOD directive on climate adaptation states that military departments should assess and manage risks to both built and natural infrastructure, including changes as appropriate to installation master planning, and should assess, incorporate, and manage the risks and effects of altered operating environments on capabilities and capacity, including basing. Moreover, Standards for Internal Control in the Federal Government states that management should identify, analyze, and respond to risks related to achieving defined objectives. Risk assessment is the identification and analysis of risks related to achieving defined objectives in order to form a basis for designing responses to these risks. Our prior work has shown that assessing risks includes assessing both the likelihood of an event occurring and the effect the event would have. Agency leaders and subject matter experts should assess each risk by assigning the likelihood of the event’s occurrence and the potential effect if the event occurs. Despite a DOD directive requiring that the military departments assess and manage risks to both built and natural infrastructure, DOD has not required in the Unified Facilities Criteria standard that guides master planning that installations assess risks posed by extreme weather and climate change effects as part of their master plans or develop plans to address identified risks. Officials in the Office of the Assistant Secretary of Defense for Sustainment acknowledged that the Unified Facilities Criteria standard on master planning does not explicitly require a risk assessment specifically for extreme weather or climate change as part of the master planning process. Because installations have not consistently assessed the risks from extreme weather and climate change effects as part of their master plans or identified potential responses to identified risks, they may formulate plans and make planning decisions without consideration of those risks. By assessing and developing actions to address these risks in their master plans, installations could better anticipate exposure of the facilities to greater than anticipated damage or degradation as a result of extreme weather events or climate change effects. Eight of the 23 installations we visited or contacted, as well as the Air Force unit responsible for the North Slope radar facilities, had made some use of climate projections to incorporate consideration of extreme weather and climate change effects into their master plans or related installation planning documents. For example, as noted previously, the 611th Civil Engineer Squadron was developing its own site-specific projections of coastal erosion affecting the North Slope radar sites in Alaska, and Norfolk Naval Shipyard considered local sea level rise projections in a study on mitigating flooding at its docks. However, officials from 11 of the 23 installations in our sample—including some from installations that had made some use of climate projections—cited the need for additional guidance from DOD or their military department headquarters on which projections to use in planning or on how to use them. This is consistent with our prior findings on DOD’s installation-level efforts to increase climate resilience. Our May 2014 report noted that installation officials told us they did not have the installation-level climate data from their military departments or from other DOD sources that they would need to understand the potential effects of climate change on their installations. We recommended, among other things, that DOD provide further direction on planning actions to account for climate change, including information about changes in applicable building codes and design standards and the projected effects of climate change on individual installations. DOD concurred but as of January 2019 had not fully implemented this recommendation, as noted previously. In December 2018, an official in the Office of the Assistant Secretary of Defense for Sustainment stated that DOD plans to develop a policy on the use of sea level rise projections by some time in 2019 and eventually to incorporate these projections into the Unified Facilities Criteria. However, DOD has no current time table for incorporating guidance on the use of other types of climate projections into its Unified Facilities Criteria. The official stated that the department is working toward eventually incorporating the use of other types of climate projections into guidance but that these types of projections would have to be vetted by DOD subject matter experts and approved prior to adoption. DOD intends to move in this direction, according to the official, but DOD has not yet developed a defined process for evaluating and incorporating the use of additional climate projections into guidance. Our prior work has found that using the best available climate information, including forward-looking projections, can help an organization to manage climate-related risks. Until November 2018, DOD’s Unified Facilities Criteria on master planning stated that changes in climate conditions are to be determined from reliable and authorized sources of existing data but that to anticipate conditions during the design life of existing or planned new facilities and infrastructure, installations could also consider climate projections from reliable and authorized sources, such as, among others, the U.S. Global Change Research Office and the National Climate Assessment. In November 2018, in response to a statutory requirement in the John S. McCain National Defense Authorization Act for Fiscal Year 2019, DOD updated the Unified Facilities Criteria on master planning to specify that climate projections from reliable and authorized sources, such the U.S. Global Change Research Office and the National Climate Assessment, shall be considered and incorporated into military construction designs and modifications. DOD guidance states that the Assistant Secretary of Defense for Energy, Installations, and Environment provides guidance and direction on relevant technologies, engineering standards, tools, development and use of scenarios, and other approaches to enable prudent climate change adaptation and resilience. The guidance also states that military departments are to leverage authoritative environmental prediction sources for appropriate data and analysis products to assess the effects of weather and climate. Installations have not consistently used climate projections in their master plans because DOD has not provided detailed guidance on how to do so. Simply updating the language of the Unified Facilities Criteria on master planning in November 2018 to require the use of climate projections does not provide guidance to installations on how to use climate projections, such as what future time periods to consider and how to incorporate projections involving multiple future scenarios, nor does it identify the specific types of projections to use. The absence of guidance has hindered the ability of some installations to effectively apply the best available climate projections to their installation master planning. If they do not use climate projections in their master plans, installations risk failing to plan for changing climate and weather conditions and, as a result, could expose their facilities to greater risk of damage or degradation from extreme weather events and climate change effects. Incorporating such data into planning would help installation master planners better anticipate changing climate and weather conditions and increase the effectiveness of the installation’s long-term investments in its facilities. Eleven of the 23 installations we visited or contacted had designed or constructed one or more individual facilities projects to increase the resilience of the facilities themselves, or to increase the resilience of the installation more broadly, to extreme weather and climate change effects. For example, Joint Base Langley-Eustis, Virginia. In 2018, officials designed a project to build a maintenance hangar with a special foundation that would elevate the floor to 10 feet above the average high-water level at the project site and protect it against coastal storm flooding. Joint Base Langley-Eustis has experienced severe flooding in the past because of its low-lying geographical elevations in the Chesapeake Bay. The installation stated in its draft encroachment management action plan that the effects of climate change may exacerbate flooding issues through sea level rise or the increasing frequency and severity of storms. Norfolk Naval Shipyard, Virginia. In 2018, shipyard officials designed a project to increase the installation’s resilience to storm-induced flooding, including building a floodwall to protect the dry docks that are used to perform maintenance on ships and submarines. Norfolk Naval Shipyard experiences extreme high tides three to five times a year on average and a significant hurricane on average once a year, according to an installation presentation, and flooding has been increasing over time in the area as relative sea levels have risen. The floodwall will enclose the dry docks, providing protection to critical assets and electrical utilities while they are in dry dock, among other things. Figure 5 depicts a flooded dry dock at Norfolk Naval Shipyard, Virginia. Installation officials told us that flooding into dry docks poses risks to the ships being serviced there and to the performance of the base’s mission of servicing and maintaining Navy ships and submarines. Camp Pendleton, California. In 2018, as part of a project to construct a new aircraft landing zone, officials included protection of the nearby coastline, which had been rapidly eroding from the impact of ocean waves and rain storms. According to officials, the erosion has accelerated in recent years and has threatened not only landing zones along the coast, but also beaches that are used for amphibious assault training. Figure 6 depicts coastal erosion near a landing zone at Camp Pendleton, California. According to officials, the erosion leading to the gulley shown in the photograph has accelerated in recent years and advances further inland every year; it is now within feet of the landing zone. The officials told us that the erosion can threaten the function of the landing zone if it reaches that site. Fort Shafter, Hawaii. In 2016, officials constructed flood mitigation structures, including a flood control levee, to protect maintenance facilities being built in a flood zone. At the time, there were no adequate permanent maintenance facilities for units stationed at the base, and the only available land big enough to support the proposed maintenance facilities was located within a flood zone. Despite limited efforts to increase the resilience of facilities to extreme weather and climate change effects, officials from 17 of the military installations in our sample said that their individual facilities project designs generally did not consider climate projections. Of the installations that stated that they considered climate projections in facilities project designs, one military installation said it uses a study on sea level rise at the installation as a tool that incorporates forward-looking projections, and another installation said it uses a NOAA web-based tool, Sea Level Rise Viewer, for graphical representations of projected sea level rise. One installation noted that it had considered sea level rise projections in a pier design, which we discuss further below. A fourth installation said it plans to use a draft Navy study on the vulnerability of coastal Navy installations to sea level rise to inform an upcoming facilities project design. However, another installation said it has used energy consumption projections, which are not climate projections, and another installation cited a Navy climate adaptation handbook, which does not include climate projections for individual Navy installations. Moreover, over the course of our review of 23 installations, we were able to identify only one project as having a design informed by climate projections. Specifically, in 2018, officials from Naval Base San Diego, California, designed a project to demolish and replace an existing pier. The project’s design was informed by the expectation of sea level rise over the 75-year lifespan of the pier. An installation official told us that the consideration of rising sea levels was not part of the original project proposal, but when a contractor provided the sea level rise projections, installation officials decided to raise the pier by one foot. Figure 7 depicts a notional example of a pier—not specific to San Diego or any other particular location—raised to account for sea level rise. The Unified Facilities Criteria on piers and wharves states that the bottom elevation of the deck slab should be kept at least one foot above the extreme high water level. In this notional example, the pier is raised to account for an anticipated one-foot sea level rise, so that the bottom of the deck slab remains one foot above the extreme high water level, as shown in the figure. DOD guidance requires the military departments to assess and manage risks to both built and natural infrastructure, including making changes, as appropriate, to design and construction standards. The guidance also requires the military departments to leverage authoritative environmental prediction sources for appropriate data and analysis products to assess weather and climate effects. However, DOD’s Unified Facilities Criteria pertaining to project design, with the exception of the standard on high performance and sustainable building requirements, do not require consideration of climate projections as part of facilities project designs. The Unified Facilities Criteria standard on high performance and sustainable building requirements requires engineers to provide building design solutions that are responsive to any government-provided projections of climate change and determination of acceptable risk. We analyzed 27 core Unified Facilities Criteria, as well as 3 other Unified Facilities Criteria, Installation Master Planning, Design: Engineering Weather Data, DOD Building Code (General Building Requirements), and one facility criteria standard on Navy and Marine Corps Design Procedures. Our analysis showed that as of March 2019 these criteria, other than the Unified Facilities Criteria standard on installation master planning, do not identify authoritative sources of climate projections for use in facilities project designs. The Unified Facilities Criteria standard on installation master planning states that climate projections from the U.S. Global Change Research Program and the National Climate Assessment as well as the National Academy of Sciences shall be considered and incorporated into military construction designs and modifications. However, an official in the Office of the Assistant Secretary of Defense for Sustainment acknowledged that this requirement in the standard on installation master planning is not sufficient on its own to apply to all facility project designs. Additionally, the standard on installation master planning does not identify the specific types of climate projections to use or how to locate them. Our analysis showed that the Unified Facilities Criteria do not provide guidance on how to incorporate projections into facilities project designs, such as how to use projections involving multiple future scenarios and what future time periods to consider. We found that while some Unified Facilities Criteria direct project designers to climate data, these are historical climate data rather than projections. For example, the following standards do not direct project designers to sources of climate projections: 2015) (change 1, Feb. 1, 2016). This guidance directs project designers to use long-term rainfall records, such as those from regional weather stations, and directs engineers toward a table that provides rainfall data for selected locations. However, information included in the guidance is historical and does not include or refer to projections. Unified Facilities Criteria 3-400-02, Design: Engineering Weather Data (Sept. 20, 2018). This guidance directs project designers toward instructions for accessing climate data for use in designing facilities and in mission planning. However, the guidance does not discuss the use of or specifically reference climate projections. Unified Facilities Criteria 3-201-01, Civil Engineering (Apr. 1, 2018) (change 1, Mar. 19, 2019). This guidance requires project designers to plan for flood hazard areas and, if the project is constructed within the 100-year floodplain, requires that the project design document include flood mitigation measures as part of the project’s scope of work. However, the guidance does not include or reference projections that would help engineers design for various potential flooding scenarios. As previously noted, in response to a statutory requirement, DOD updated its Unified Facilities Criteria on master planning in November 2018 to require installations to consider and incorporate reliable and authorized sources of data on changing environmental conditions. However, simply including this language does not provide guidance to installations on what sources of climate projections to consider and how to use them in designing facilities projects, such as what future time periods to consider and how to incorporate projections involving multiple future scenarios. In addition, the Unified Facilities Criteria standard on master planning provides requirements and guidance for installation master planning but not for the design of individual facilities projects. An official of the Office of the Assistant Secretary of Defense for Sustainment stated that his office plans to develop a policy on the use of sea level rise projections by some time in 2019 and eventually to incorporate guidance on how to use sea level rise projections into the Unified Facilities Criteria or other guidance. This official added that there is currently no defined DOD process for vetting authoritative sources of climate projections, but that DOD plans to continue vetting sources for possible use, as appropriate. Furthermore, officials of 10 of the 23 military installations we reviewed stated that in order to incorporate such projections into project designs, they would need additional guidance from DOD or their military departments identifying authoritative sources of such projections or how to use climate projections that involve multiple future scenarios and different time periods. Ultimately, installations that do not consider climate projections in the design of their facilities projects may be investing in facilities projects without considering potential risks, such as potential future damage and degradation, which are associated with additional costs and reductions in capability. If DOD does not provide guidance on the use of climate projections in facilities designs, including what sources of climate projections to use, how to use projections involving multiple future scenarios, and what future time periods to consider, installation project designers will continue to lack direction on how to use climate projections. Further, if DOD does not update the Unified Facilities Criteria to require installations to consider climate projections in project designs and incorporate the department’s guidance on how to use climate projections in project designs, installation project designers may continue to exclude consideration of climate projections from facilities project designs. Considering climate projections in facilities projects would help DOD to reduce the climate-related risks to its facilities investments. DOD has a global real estate portfolio that supports the department’s global workforce and its readiness to execute its national security missions. The department has repeatedly acknowledged the threats of extreme weather and climate change effects to its installations, and as we have previously reported, has begun taking steps to increase the resilience of its infrastructure to these threats. We found that 15 of the 23 the installations we visited or contacted had considered some type of extreme weather or climate change effects in their plans, a positive step toward increasing resilience to these climate risks. However, not all had done so and most of the installations we visited or contacted did not fully assess the risks associated with extreme weather and climate change effects—including the likelihood of the threat, potential effects on the installation, and possible responses to mitigate such effects. Likewise, many of the installations did not consider climate projections in planning. Without fully assessing the risks of extreme weather and climate change effects, and without considering climate projections as part of the planning process, installations may make planning decisions that do not fully anticipate future climate conditions. By seeking to anticipate future climate conditions, DOD may be able to reduce climate-related risks to its facilities and the corresponding budgetary risks. Eleven of the 23 installations we visited or contacted had designed or implemented one or more construction projects that incorporated resilience to extreme weather or climate change effects. These projects illustrate some of the steps that can be taken to increase an installation’s resilience to climate risks. However, most of the installations had not considered climate projections in project design. Considering climate projections in facilities projects would help DOD to reduce the climate- related risks to its facilities investments. By updating its facilities project design standards to require installations to consider climate projections in project designs, identifying authoritative sources of climate projections, and providing guidance on how to use climate projections, DOD can aid installations to better position themselves to be resilient to the risks of extreme weather and climate change effects. We are making eight recommendations, including two to DOD and two to each of the military departments. Specifically, The Secretary of the Army should ensure that the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers works with the Assistant Secretary of Defense for Sustainment; the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command; and the Director of the Air Force Civil Engineer Center to update the Unified Facilities Criteria standard on installation master planning to require that master plans include (1) an assessment of the risks from extreme weather and climate change effects that are specific to the installation and (2) plans to address those risks as appropriate. (Recommendation 1) The Secretary of the Navy should ensure that the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command works with the Assistant Secretary of Defense for Sustainment, the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers, and the Director of the Air Force Civil Engineer Center to update the Unified Facilities Criteria standard on installation master planning to require that master plans include (1) an assessment of the risks from extreme weather and climate change effects that are specific to the installation and (2) plans to address those risks as appropriate. (Recommendation 2) The Secretary of the Air Force should ensure that the Director of the Air Force Civil Engineer Center works with the Assistant Secretary of Defense for Sustainment; the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers; and the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command to update the Unified Facilities Criteria standard on installation master planning to require that master plans include (1) an assessment of the risks from extreme weather and climate change effects that are specific to the installation and (2) plans to address those risks as appropriate. (Recommendation 3) The Secretary of Defense should issue guidance on incorporating climate projections into installation master planning, including—at a minimum— what sources of climate projections to use, how to use projections involving multiple future scenarios, and what future time periods to consider. (Recommendation 4) The Secretary of Defense should issue guidance on incorporating climate projections into facilities project designs, including—at a minimum—what sources of climate projections to use, how to use projections involving multiple future scenarios, and what future time periods to consider. (Recommendation 5) The Secretary of the Army should ensure that the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers works with the Assistant Secretary of Defense for Sustainment; the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command; and the Director of the Air Force Civil Engineer Center to update relevant Unified Facilities Criteria to require that installations consider climate projections in designing facilities projects and incorporate, as appropriate, DOD guidance on the use of climate projections in facilities project designs—including identification of authoritative sources of such projections, use of projections involving multiple future scenarios, and what future time periods to consider. (Recommendation 6) The Secretary of the Navy should ensure that the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command works with the Assistant Secretary of Defense for Sustainment, the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers, and the Director of the Air Force Civil Engineer Center to update relevant Unified Facilities Criteria to require that installations consider climate projections in designing facilities projects and incorporate, as appropriate, DOD guidance on the use of climate projections in facilities project designs— including identification of authoritative sources of such projections, use of projections involving multiple future scenarios, and what future time periods to consider. (Recommendation 7) The Secretary of the Air Force should ensure that the Director of the Air Force Civil Engineer Center works with the Assistant Secretary of Defense for Sustainment; the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers; and the Chief of Civil Engineers and Commander, Naval Facilities Engineering Command to update relevant Unified Facilities Criteria to require that installations consider climate projections in designing facilities projects and incorporate, as appropriate, DOD guidance on the use of climate projections in facilities project designs—including identification of authoritative sources of such projections, use of projections involving multiple future scenarios, and what future time periods to consider. (Recommendation 8) We provided a draft of this report for review and comment to DOD and NOAA. In written comments, DOD concurred with all eight of our recommendations and identified actions it plans to take to address two of them. DOD’s comments are reprinted in their entirety in appendix II. DOD also provided technical comments, which we incorporated as appropriate. NOAA did not provide any comments on the draft. We are sending copies of this report to the appropriate congressional addressees; the Secretary of Defense; the Secretaries of the Departments of the Army, Navy, and Air Force; and the Secretary of Commerce (for NOAA). In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Diana Maurer at (202) 512-9627 or at maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Senate Report 115-130, accompanying a bill for fiscal year 2018 appropriations for military construction, the Department of Veterans Affairs, and related agencies, cited concerns with the frequency and costs of extreme weather events and the potential effects of climate change, and included a provision for us to review the Department of Defense’s (DOD) progress in developing a means to account for potentially damaging weather in its project designs. In response to this provision, we examined the extent to which DOD has taken steps to incorporate resilience to extreme weather and climate change effects into (1) installation master plans and related planning documents, and (2) individual installation facilities projects. For both of our objectives, we visited or requested information from a sample of domestic military installations. We focused on domestic installations because our November 2017 report focused on foreign installations. To develop this sample, we selected installations in the continental United States, Alaska, Hawaii, and U.S. territories that had identified one or more climate-related vulnerabilities, based on their past experiences, in a DOD-administered survey of climate vulnerabilities, or installations that were referenced in a prior GAO report on weather and climate risks at DOD installations. In addition to these criteria, we selected sites that represented both a diversity in types of climate vulnerabilities and geographic diversity among the military services, as well as installations involved in any climate change-related pilot studies. From these criteria, we developed a non-generalizable sample of 23 installations. We also included in the sample one Air Force unit (not an installation) with responsibilities for particular facilities of interest in Alaska, because these facilities presented a climatic vulnerability (accelerating coastal erosion) that was not necessarily included elsewhere in the sample. We visited 10 of these installations, as well as the Air Force unit in Alaska, in person. Within the sample, we selected installations to visit based on geographic diversity and installations in proximity to each other, allowing us to visit multiple installations on each trip. For the remaining 13 installations, we developed and administered a questionnaire and document request. We received responses from 12 of these installations. One installation—Camp Lejeune—sustained significant damage from Hurricane Florence in September 2018, and to minimize the burden on installation officials’ time to respond, we met with them by phone. Results from our nongeneralizable sample cannot be used to make inferences about all DOD locations. However, the information from these installations provides valuable insights. We asked similar questions to installations on our site visits and in the questionnaires, and we collected similar documents—such as installation master plans and individual facilities project documents— allowing us to report on similar information, such as the extent to which extreme weather and climate change considerations were integrated into installation master plans and individual facilities projects. For objective one, we reviewed DOD policies, guidance, and standards related to increasing climate resilience and conducting installation master planning. These documents included, among others, DOD Directive 4715.21, which establishes policy and assigns responsibilities for DOD to assess and manage risks associated with climate change; DOD’s Unified Facilities Criteria standard on installation master planning, which establishes the requirements for installation master plans; and a memorandum from the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics on floodplain management on DOD installations. We interviewed officials in the Office of the Assistant Secretary of Defense for Sustainment and the Strategic Environmental Research and Development Program. We also interviewed officials in each of the military departments, including officials involved with installation policy, as well as officials from the engineering organizations of each military department and officials in the National Oceanic and Atmospheric Administration to discuss climate science and the data potentially available for planners to use. We reviewed documents from each of the 23 installations and the one Air Force unit in our sample, including master plans, and used interviews with installation officials and questionnaires received from installations to determine the extent to which the installations had incorporated consideration of extreme weather and climate change effects into their installation plans. We compared DOD’s actions to take steps in installation planning to increase resilience to extreme weather and climate change effects with DOD guidance on climate change adaptation and resilience, Unified Facilities Criteria standards, federal internal control standards, and best practices for enterprise risk management. For objective two, we reviewed DOD guidance, including DOD Directive 4715.21, requiring DOD components to integrate climate change considerations into DOD plans. We also reviewed DOD’s facilities project design standards—the Unified Facilities Criteria—to determine the extent to which installations incorporated requirements for climate resilience and to identify any required or recommended climate data sources for facilities project design. Specifically, we reviewed the 27 core Unified Facilities Criteria standards, as well as 3 other Unified Facilities Criteria standards outside of the core 27—because of their broad relevance to project design—and one facility criteria on Navy and Marine Corps design procedures. Additionally, we performed a content analysis of these criteria for references to climate, weather, environment, and any climate data to be used as a basis for facilities design. We also identified any required or recommended climate data sources or tools for facilities design by searching for references, web links, or tables related to climate data within the criteria. Where climate data sources were identified, we reviewed them to determine the extent to which the sources and tools involved historical data or climate projections that anticipate future climate conditions. We interviewed officials from the U.S. Army Corps of Engineers, Naval Facilities Engineering Command, and the Air Force Civil Engineer Center to understand the extent to which the Unified Facilities Criteria include guidance or data sources for adapting DOD facilities to extreme weather and climate change effects. In addition, we used interviews with installation officials and questionnaires we received from installations to determine the extent to which the installations had planned or executed any military construction or sustainment, restoration, and modernization facilities projects since 2013 that included any elements for building resilience to extreme weather or climate change effects. We then reviewed project documentation for proposed or approved facilities projects to identify the resilience measures taken. We also observed some facilities-related climate resilience measures adopted by these installations. In addition, we interviewed officials from the Office of the Assistant Secretary of Defense for Sustainment to determine what plans, if any, the office had to update Unified Facilities Criteria with climate resilience requirements. We also interviewed officials from the Office of the Assistant Secretary of the Army for Installations, Energy and Environment; the Office of the Assistant Secretary of the Navy for Energy, Installations and Environment; and the Office of the Assistant Secretary of the Air Force, Installations, Environment and Energy to identify any actions, policies, or processes related to adapting facilities to extreme weather and climate change effects. Moreover, we interviewed officials from the American Society of Civil Engineers to understand what efforts, if any, had been made to incorporate climate projections into industry standards. Finally, we compared the extent to which DOD took steps in its facilities projects and its project design standards to increase resilience with DOD guidance on climate change resilience. Table 3 lists the locations we visited or contacted during this review, including the installations receiving our questionnaire. Diana Maurer at (202) 512-9627 or maurerd@gao.gov. In addition to the contact named above, Brian J. Lepore (Director, retired), Kristy Williams (Assistant Director), Michael Armes, Kendall Childers, Simon Hirschfeld, Joanne Landesman, Amie Lesser, Grace Meany, Shahrzad Nikoo, Samantha Piercy, Monica Savoy, Benjamin Sclafani, Joseph Dean Thompson, and Jack Wang made key contributions to this report. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas, GAO-19-157SP. Washington, D.C.: March 6, 2019. Climate Change: Analysis of Reported Federal Funding. GAO-18-223. Washington, D.C.: April 30, 2018. Climate Change Adaptation: DOD Needs to Better Incorporate Adaptation into Planning and Collaboration at Overseas Installations. GAO-18-206. Washington, D.C.: November 13, 2017. Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720. Washington, D.C.: September 28, 2017. High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others. GAO-17-317. Washington, D.C.: February 15, 2017. Climate Change: Improved Federal Coordination Could Facilitate Use of Forward-Looking Climate Information in Design Standards, Building Codes, and Certifications. GAO-17-3. Washington, D.C.: November 30, 2016. Defense Infrastructure: DOD Efforts to Prevent and Mitigate Encroachment at Its Installations. GAO-17-86. Washington, D.C.: November 14, 2016. Climate Information: A National System Could Help Federal, State, Local, and Private Sector Decision Makers Use Climate Information. GAO-16-37. Washington, D.C.: November 23, 2015. High-Risk Series: An Update. GAO-15-290. Washington, D.C.: February 11, 2015. Budget Issues: Opportunities to Reduce Federal Fiscal Exposures Through Greater Resilience to Climate Change and Extreme Weather. GAO-14-504T. Washington, D.C.: July 29, 2014. Climate Change Adaptation: DOD Can Improve Infrastructure Planning and Processes to Better Account for Potential Impacts. GAO-14-446. Washington, D.C.: May 30, 2014. Extreme Weather Events: Limiting Federal Fiscal Exposure and Increasing the Nation’s Resilience. GAO-14-364T. Washington, D.C.: February 12, 2014. Climate Change: Energy Infrastructure Risks and Adaptation Efforts. GAO-14-74. Washington, D.C.: January 31, 2014. Climate Change: Federal Efforts Under Way to Assess Water Infrastructure Vulnerabilities and Address Adaptation Challenges. GAO-14-23. Washington, D.C.: November 14, 2013. Climate Change: State Should Further Improve Its Reporting on Financial Support to Developing Countries to Meet Future Requirements and Guidelines. GAO-13-829. Washington, D.C.: September 19, 2013. Climate Change: Various Adaptation Efforts Are Under Way at Key Natural Resource Management Agencies. GAO-13-253. Washington, D.C.: May 31, 2013. Climate Change: Future Federal Adaptation Efforts Could Better Support Local Infrastructure Decision Makers. GAO-13-242. Washington, D.C.: April 12, 2013. High-Risk Series: An Update. GAO-13-283. Washington, D.C.: February 14, 2013. International Climate Change Assessments: Federal Agencies Should Improve Reporting and Oversight of U.S. Funding. GAO-12-43. Washington, D.C.: November 17, 2011. Climate Change Adaptation: Federal Efforts to Provide Information Could Help Government Decision Making. GAO-12-238T. Washington, D.C.: November 16, 2011.", "summary": "DOD manages a global real-estate portfolio with an almost $1.2 trillion estimated replacement value. Since 2010, DOD has identified climate change as a threat to its operations and installations. In January 2019, DOD stated that the effects of a changing climate are a national security issue with potential impacts to the department's missions, operational plans, and installations. GAO was asked to assess DOD's progress in developing a means to account for potentially damaging weather in its facilities project designs. GAO examined the extent to which DOD has taken steps to incorporate resilience to extreme weather and climate change effects into (1) selected installation master plans and related planning documents, and (2) selected individual installation facilities projects. GAO reviewed DOD documents related to increasing climate resilience, conducting installation master planning, and designing facilities projects. GAO visited or contacted a non-generalizable sample of 23 installations that had been associated with one or more climate vulnerabilities. Department of Defense (DOD) installations have not consistently assessed risks from extreme weather and climate change effects or consistently used projections to anticipate future climate conditions. For example, DOD's 2018 preliminary assessment of extreme weather and climate effects at installations was based on the installations' reported past experiences with extreme weather rather than an analysis of future vulnerabilities based on climate projections. Fifteen of the 23 installations GAO visited or contacted had considered some extreme weather and climate change effects in their plans as required by DOD guidance, but 8 had not. For example, Fort Irwin, California, worked with the U.S. Army Corps of Engineers to improve stormwater drainage after intense flash flooding caused significant damage to base infrastructure. By contrast, Joint Base Pearl Harbor-Hickam, Hawaii, did not include such considerations in its plans, although it is located in an area subject to tropical storms and where further sea level rise is anticipated. GAO also found that most of the installations had not used climate projections, because they lack guidance on how to incorporate projections into their master plans. Not assessing risks or using climate projections in installation planning may expose DOD facilities to greater-than-anticipated damage or degradation as a result of extreme weather or climate-related effects. Eleven of the 23 installations we reviewed had designed one or more individual facilities projects to increase the resilience of the facilities to extreme weather and climate change effects. However, project designs generally did not consider climate projections, according to installation officials. These officials told us that DOD lacks guidance on how to use climate projections that involve multiple future scenarios and different time periods. Until DOD updates its facilities design standards to require installations to consider climate projections in project designs, identify authoritative sources for them to use, and provide guidance on how to use projections, installation project designers may continue to exclude consideration of climate projections from facilities project designs, potentially making investments that are planned without consideration of climate-related risks. GAO is making eight recommendations, including that the military departments work together to update master planning criteria to require an assessment of extreme weather and climate change risks and to incorporate DOD guidance on the use of climate projections into facilities design standards. GAO also recommends that DOD issue guidance on incorporating climate projections into installation master planning and facilities project designs. DOD concurred with all eight of GAO's recommendations.", "document_type": "gao"}
{"report": "Nursing homes are required to keep residents safe from harm, but when abuse is alleged, a combination of federal, state, and local agencies—as well as the nursing homes themselves—play a role in investigating. Federal laws establish minimum requirements nursing homes must meet to participate in the Medicare and Medicaid programs, including standards for the quality of care. These standards cover a variety of categories, such as resident rights, quality of care, and quality of life. In 2016, CMS finalized a comprehensive update to its nursing home standards to reflect new requirements and align requirements with current clinical practices, among other things. The changes were implemented in three phases, starting November 28, 2016. The federal government and the states share oversight responsibility for the nation’s nursing homes, with specific activities occurring at the national, regional, and state levels. CMS central office. At the national level, the CMS central office oversees the federal standards nursing homes must meet to participate in the Medicare and Medicaid programs. Primarily through its State Operations Manual, the office establishes the responsibilities of CMS’s regional offices and state survey agencies in ensuring that federal quality standards for nursing homes are met. CMS regional offices. CMS’s 10 regional offices oversee state activities and report back to the CMS central office the results of their efforts. Specifically, regional offices use the State Performance Standards System to evaluate state surveyors’ performance on factors such as the frequency and quality of state surveys. State survey agencies. Under agreement with CMS, a state survey agency in each state assesses whether nursing homes meet CMS’s standards, allowing them to participate in the Medicare and Medicaid programs. State survey agencies assess nursing homes using (1) recurring standard surveys and (2) as-needed investigations. Standard surveys. State survey agencies are required by federal law to perform unannounced, on-site standard surveys of every nursing home receiving Medicare or Medicaid payment at least every 15 months, with a statewide average frequency of every 12 months. These surveys are a comprehensive assessment designed to determine whether nursing homes are complying with Medicare and Medicaid quality standards. Investigations. In addition to standard surveys, state survey agencies are required by federal law to investigate (1) complaints submitted by residents, family members, friends, physicians, and nursing home staff; and (2) “facility-reported incidents,” including incidents involving abuse of residents, that are self-reported by the nursing homes. State survey agencies review the information provided through these complaints and incidents and determine if an on-site investigation is required. During this unannounced investigation, the state surveyors assess available evidence to determine whether the allegation can be substantiated. These investigations offer the state survey agency the opportunity to identify and correct care problems in a more timely manner than through the standard surveys. If a surveyor determines that a nursing home violated a federal standard during a survey or investigation, then a deficiency code specific to that standard is cited. For instance, one deficiency code for abuse of residents encompasses mental/verbal, sexual, or physical abuse; while a few additional deficiency codes encompass abuse-related issues, such as a failure by the nursing home to train staff on issues related to abuse. Cited deficiencies are then classified into categories according to scope (the number of residents potentially affected) and severity (the potential for or occurrence of harm to residents). (See table 1.) State survey agencies are required to enter data about deficiencies into CMS’s survey database. For most deficiencies, the nursing home is required to prepare a plan of correction, and, depending on the scope and severity of the deficiency, surveyors may re-visit the facility to ensure that the nursing home has implemented its plan and corrected the deficiency. In any instances where surveyors substantiate the occurrence of resident abuse, the state survey agency is required to refer the case to three entities: 1) local law enforcement; 2) the MFCU, if appropriate; and 3) the state’s nurse aide registry or other applicable professional licensure authority. When nursing homes are cited with deficiencies, federal enforcement actions—or penalties—can be imposed to encourage homes to make corrections. In general, enforcement actions: (1) may be initially recommended by the state survey agency, (2) are transferred to the CMS regional office for review, (3) are imposed by the same CMS regional office, and (4) are implemented—that is, put into effect. Depending on the scope and severity of the deficiency cited, the CMS regional office may impose certain enforcement actions so that they are implemented immediately. However, for other enforcement actions, the regional office may provide the nursing home with an opportunity to correct the deficiencies, which, if corrected before the scheduled effective date, can result in the penalty not being implemented. Penalties include directed in- service training, fines known as civil money penalties, denial of payment, and termination from the Medicare and Medicaid programs, among others. (See fig. 1.) When a nursing home becomes aware of an incident of alleged resident abuse, the home must: immediately report the allegation to the state survey agency and then conduct an investigation of the alleged incident. Specifically, the process is as follows: The nursing home must immediately report alleged abuse to the state survey agency. After notifying the state survey agency, the nursing home is also required to conduct its own investigation and submit its findings in a written report to the state survey agency within 5 working days of the incident. Depending on the severity of the circumstances, the state survey agency may visit the nursing home to investigate the incident or wait until the nursing home submits its report. Depending on the content of the report, the state survey agency may request the home conduct additional work or the state survey agency may investigate further on its own. If the state survey agency opts not to investigate further, it may still review the manner in which the home conducted its investigation during the state survey agency’s next scheduled standard survey. If a state survey agency determines that a nurse aide is responsible for abuse, the agency must add this finding to the state’s nurse aide registry—a registry that each state is required to maintain that lists all individuals who have satisfactorily completed approved nurse aide training and a competency evaluation program in that state. Nursing homes are prohibited from employing a nurse aide with a finding of abuse on the nurse aide registry. Further, if there is a reasonable suspicion that a crime has occurred that results in serious bodily injury, federal law requires certain covered individuals at the nursing home to immediately report to law enforcement in addition to the state survey agency. Before employing a nurse aide, nursing homes are required to check each relevant state’s registry to verify that the nurse aide has passed a competency evaluation. All nursing homes must also verify with the relevant state board of licensing the professional credentials of the licensed personnel, such as registered nurses, whom they hire. In addition to state survey agencies, there are other state and local agencies that may be involved in investigating abuse in nursing homes. These other state and local agencies that investigate abuse in nursing homes are generally focused on the different aspects of the specific alleged abuse incident, in contrast to the state survey agency, which focuses on the safety of individual residents, as well as on the facility’s policies and procedures for preventing and effectively addressing abuse. These other state and local agencies include: Adult Protective Services. In some states, Adult Protective Services’ investigators are trained to provide protection and intervention for older adults in nursing homes and can play a valuable role in helping to protect residents from abuse. Ombudsmen. Long-term care ombudsmen, who serve as advocates for nursing home residents, may also investigate abuse complaints made by or on behalf of residents. Local law enforcement. Law enforcement may also play a role in investigating alleged nursing home resident abuse. Specifically, local police departments may learn of suspected instances of resident abuse and conduct criminal investigations. MFCU. The state MFCUs typically learn of abuse allegations through referrals from state survey agencies, which CMS requires if abuse is substantiated. If, after investigating an allegation, the MFCU decides that there is sufficient evidence to press criminal charges, it may prosecute the case itself or refer the matter to the state’s attorney general or a local prosecutor. Our analysis of CMS data found that from 2013 through 2017, abuse deficiencies cited in nursing homes became more frequent, with the largest increase in severe cases. While abuse deficiencies are relatively rare—they comprise less than 1 percent of the total deficiencies in each of the years we examined—they became more common over the 5-year period. Specifically, the number of abuse deficiencies cited more than doubled—from 430 in 2013 to 875 in 2017 (a 103.5 percent increase). This trend for the abuse deficiencies is in contrast to the trend for all deficiencies, which decreased about 1 percent between 2013 and 2017. At the state level, 32 states had more abuse deficiencies cited in 2017 than 2013, six states had a consistent number, and the remaining 13 had fewer. (See app. III for additional data on abuse deficiencies by state.) Furthermore, abuse deficiencies cited in 2017 were more likely to be categorized at the highest levels of severity—deficiencies causing actual harm to residents or putting residents in immediate jeopardy—than they were in 2013. Specifically, 42.6 percent of the 875 abuse deficiencies were categorized as causing actual harm or posing immediate jeopardy to residents in 2017, compared to 31.9 percent of the 430 abuse deficiencies in 2013. (See fig. 2.) In examining the types of survey or investigations conducted to identify abuse deficiencies, we found that, from 2013 to 2017, the majority (about two-thirds in each year) were identified through either a complaint investigation or facility-reported incident investigation. In contrast, for all types of deficiencies, we found the inverse—the vast majority were identified through a standard survey. This demonstrates the unique and significant role that complaint and facility-reported incident investigations have in identifying abuse deficiencies, because they allow for the identification and correction of abuse in a more timely manner than a standard survey. In fact, for the deficiencies for which we were able to identify the source, the percentage of abuse deficiencies identified through facility-reported incident investigations increased from 42.3 percent of the 430 abuse deficiencies in 2013 to 47.4 percent of the 875 abuse deficiencies in 2017. Conversely, for all types of deficiencies, a very small percentage resulted from facility-reported incident investigations—about 5 percent or less each year. (See fig. 3.) We found that enforcement actions—or penalties—were imposed and implemented by CMS infrequently each year in response to abuse deficiencies, and that fines were the most common type of implemented penalty. Specifically, for each year from 2013 through 2017, we found that about one-third of abuse deficiencies had an enforcement action imposed but not implemented, and less than 8 percent of abuse deficiencies had enforcement actions that were implemented against the nursing home. This was fairly consistent over the 5-year period. For example, in 2017, of the 875 abuse deficiencies cited, 275 (31.4 percent) resulted in enforcement actions that were imposed but not implemented and 65 (7.4 percent) had enforcement actions that were implemented against the nursing home. Furthermore, for abuse deficiencies cited at the most severe levels—that is, those causing actual harm or immediate jeopardy to residents—a smaller percentage of the deficiencies had an enforcement action imposed but not implemented compared to all abuse deficiencies, but a larger percentage were implemented. For example, in 2017, 373 of the 875 abuse deficiencies were cited at the most severe levels; of those, 81 (21.7 percent) resulted in enforcement actions that were imposed but not implemented, and 51 (13.7 percent) were implemented against the nursing home. Regardless of the severity, the predominant reason that CMS did not implement imposed enforcement actions was because the nursing home came into compliance prior to the implementation date of the penalty. For implemented enforcement actions, fines—known as civil money penalties—were overwhelmingly the most common type of penalty implemented against nursing homes with abuse deficiencies, increasing from 69.6 percent of the 23 abuse deficiencies with implemented enforcement actions in 2013 to 83.1 percent of the 65 in 2017. Denial of payments for new Medicare and Medicaid admissions—another financial penalty—was the second most common type of implemented enforcement action, but decreased from 34.8 percent in 2013 to 13.8 percent in 2017. Mandatory termination is the most severe enforcement action as it ends all payments for Medicare and Medicaid residents; it is implemented very rarely, with only one abuse deficiency resulting in mandatory termination of the nursing home across all 5 years. (See fig. 4.) In addition, we found the number of nursing homes with abuse deficiencies also more than doubled over the 5-year period. In 2013, 394 nursing homes (2.7 percent of all surveyed nursing homes) had at least one abuse deficiency compared to 821 nursing homes (5.6 percent of all surveyed nursing homes) in 2017. A nursing home may have more than one abuse deficiency cited in a single year, such as from a standard survey early in the year and then a complaint investigation later in the year. We found that in 2013, of the 394 nursing homes that had a total of 430 abuse deficiencies cited, 85 of the homes had two or more abuse deficiencies that year. In 2017, of the 821 nursing homes that had 875 total abuse deficiencies cited, 155 had two or more that year. Further, across the 5-year period, we found that a small proportion of all nursing homes with abuse deficiencies had them in multiple consecutive years. Specifically, across all years, 2,214 total unique nursing homes (13.6 percent of all surveyed nursing homes) had at least one abuse deficiency. A small portion of these nursing homes had at least one abuse deficiency in multiple consecutive years, indicating potential patterns in abuse at these nursing homes. Specifically, 185 of the 2,214 nursing homes with abuse deficiencies over the 5-year period—8.4 percent—had an abuse deficiency in any 2 consecutive years. In addition, 25 of the nursing homes—1.1 percent—had an abuse deficiency in 3 or more consecutive years. (See fig. 5.) Finally, we analyzed a selection of characteristics, including ownership type and bed size, for these nursing homes that had abuse deficiencies cited in multiple years and compared them to homes that had abuse deficiencies cited in a single year and surveyed homes that did not have any abuse deficiencies. We found that the nursing homes differed. For example, while for-profit organizations—the largest ownership group accounting for 67.9 percent of all surveyed nursing homes—owned 66.9 percent of nursing homes without any abuse deficiencies cited over the 5- year period, they accounted for 78.6 percent of nursing homes that had abuse deficiencies cited in 2 or more years. In addition, nursing homes designated as Special Focus Facilities—a CMS program that provides increased oversight to homes with consistent poor performance— constituted 2.5 percent of all surveyed nursing homes compared to 1.9 percent of nursing homes without abuse deficiencies and 10.1 percent of nursing homes with abuse deficiencies cited in 2 or more years. (See table 2.) Our analysis of a representative sample of CMS narrative descriptions— written by state surveyors—associated with abuse deficiencies cited in 2016 and 2017 found that physical and mental/verbal abuse occurred most often in nursing homes, followed by sexual abuse. Further, staff were more often the perpetrators of the deficiencies cited as abuse than were residents or others. (See fig. 6.) Physical abuse, which CMS defines as hitting, slapping, punching, biting and kicking residents, was present in about 46 percent (+/- 5 percent) of the abuse deficiency narratives. Mental/verbal abuse, which CMS defines as verbal or nonverbal conduct that can cause a resident to experience humiliation and fear, among other things, was present in about 44 percent (+/- 5 percent) of the abuse deficiency narratives. Sexual abuse, which CMS defines as non-consensual sexual contact with a resident, was present in about 18 percent (+/- 5 percent) of the abuse deficiency narratives. Staff, which includes those working in any part of the nursing home, were perpetrators in 58 percent (+/- 5 percent) of abuse deficiency narratives, followed by resident perpetrators (30 percent +/- 5 percent) and other types of perpetrators (2 percent +/- 5 percent). Other types of perpetrators can include family members of residents or other visitors. Further, our analysis of the narratives found that sexual abuse perpetrated by residents (39 percent) occurred more frequently within our sample than sexual abuse perpetrated by staff (10 percent) or others (17 percent). When staff were the perpetrators of abuse, we found within our sample that mental/verbal abuse was the most common type of abuse (60 percent), while physical abuse was most common in situations where residents (59 percent) or others (67 percent) were the perpetrators. For examples of the different types of abuse and perpetrators from our analysis, see table 3 below. Within our sample of narratives, mental/verbal abuse was less likely to be categorized by surveyors as severe compared to physical and sexual abuse. Specifically, we found in our sample that the proportion of mental/verbal abuse (30 percent) categorized by state surveyors as severe—defined as actual harm or immediate jeopardy—was smaller than the proportion of physical (40 percent) and sexual abuse (58 percent) categorized as severe. In addition, we found that most of the mental/verbal (88 percent), physical (91 percent), and sexual abuse (77 percent) narratives in our sample were categorized by surveyors as “isolated” in scope. Stakeholder groups in most of the five states we interviewed—including state survey agencies, Adult Protective Services, law enforcement, MFCUs, ombudsmen, and nursing home administrators and clinical staff—identified risk factors for abuse in nursing homes that included resident characteristics, such as residents with infrequent visitors, and nursing home staffing characteristics, such as insufficient staffing levels. (See table 4 for a description of these risk factors.) Officials we interviewed from national organizations with knowledge of abuse in nursing homes also noted some of these same risk factors. Resident characteristics. Stakeholders in each of our five selected states noted that residents who do not have frequent visitors, are cognitively impaired, or mixed with widely different age groups may be at an increased risk for abuse. Residents who do not have frequent visitors. Stakeholders in four of the five states said that residents without regular visitors, such as family, may be at an increased risk for abuse because regular visitors could notice and report potential warning signs of abuse, such as changes in their behavior or physical appearance. Residents who are cognitively impaired. Stakeholders in each of the five states said that cognitively impaired residents may be especially vulnerable to abuse because they often cannot speak or may have difficulty recalling recent events, and they are therefore less likely to be able to remember or describe what happened. In addition to noting that cognitively impaired residents may be at an increased risk of abuse, some stakeholders said that some cognitively impaired residents may be more likely to be perpetrators of abuse as their condition can have behavioral symptoms, such as physical aggressiveness. Residents mixed with widely different age groups. Stakeholders in four of the five states also noted that elderly nursing home residents who are mixed with widely differing age groups, such as young adults with mental illness, may be at a higher risk for incidents of abuse due to the different characteristics of these groups. Combining these two populations, which have differing needs, can also be challenging for staff. For example, staff may have more experience caring for elderly residents with complex needs, such as dementia, and they may not have the necessary skills or training to care for needs of younger residents, who require other types of complex care. This can create a stressful environment for staff, which is a risk factor for staff as potential perpetrators of abuse. Two stakeholders noted that younger residents who may have mental illness can have conflicts with older and frailer residents, potentially leading to abusive incidents between residents. Nursing home staffing characteristics. Stakeholders we interviewed in each of our five selected states noted that nursing homes with insufficient staffing, inadequate staff training, and inadequate staff screening may be at risk for abuse. Nursing homes with insufficient staff. Stakeholders in each of the five states said that nursing homes with insufficient staff may be at risk for abuse because there may not be enough staff attending to the needs of residents. Stakeholders noted that nursing homes have faced challenges hiring and retaining qualified staff and that, as a result, existing staff can feel overworked, stressed, or exhausted, which can lead to abusive behaviors. Staffing issues are not just risk factors for staff as perpetrators of abuse, but they can also limit a staff member’s ability to identify and report abuse. For example, insufficient staffing may mean that there are not enough available staff to notice signs of abuse in a timely fashion, such as noticing a resident’s bruises before they heal. Nursing homes with inadequate staff training on abuse. Inadequate staff training on abuse was noted by stakeholders we interviewed in four of the five states as a risk factor for abuse because; for example, staff may not know how to diffuse challenging situations with residents and identify and report abuse. As previously noted, recognizing abuse can be challenging and, even when abuse is identified, it is often not reported. Officials from all of the nursing homes that we visited said that they provide training to their staff on abuse, including on defining abuse, identifying or detecting different types of abuse, and reporting abuse. Staff members we spoke with at one nursing home said that, not only are they trained to look for physical signs of abuse, such as bruising, but they are also trained to observe changes in behavior that may be warning signs for abuse, such as a resident suddenly withdrawing from group activities. Staff at another nursing home said that they are also taught to ask another staff member for assistance when they are feeling frustrated or stressed by caring for a particular resident. In contrast, staff at another nursing home noted the challenges of not having these types of resources and said they are needed at their facility. Nursing homes with inadequate staff screening. Stakeholders in three of our five states said that inadequate staff screening can be a risk factor for abuse. Some stakeholders said that a thorough background screening can be time consuming. Further, because staff screening through background checks and the nurse aide registry is not coordinated across the country, there are gaps that could enable individuals who committed crimes in one state to obtain employment at a nursing home in another state, a concern that we previously reported. Staff from a nursing home we visited said the prevention of abuse “starts with hiring the right staff” and noted the importance of conducting background checks and checking references for prospective employees. The key challenges for abuse investigations most frequently identified by stakeholder groups in the five states we reviewed were underreporting of abuse, cognitive impairment of victims, lack of cooperation from nursing homes, and lack of agency coordination. (See table 5 for a description of these challenges.) Officials we interviewed from national organizations with knowledge of abuse in nursing homes also noted some of these same challenges. Underreporting of abuse. Stakeholders in each of the five states in our review noted that abuse in nursing homes may be underreported because residents or their families feel uncomfortable or fear retaliation from nursing home staff. For example, residents who were sexually abused may feel ashamed or embarrassed to report these incidents. In addition, residents may fear retaliation by the nursing home staff on whom they depend, which might include substandard care, exclusion from activities, or even eviction from the home. A fear of retaliation can also extend to nursing home staff, who may witness abuse by another staff member, but may be afraid to report it out of fear that they will lose their jobs or that they will face retaliation from co-workers. This underreporting creates challenges for investigators, who are unable to investigate if they do not know that abuse has occurred. Cognitive impairment of victims. Stakeholders in each of the five states in our review said that victims with cognitive impairment may not be able to give statements regarding the abuse or may not be considered reliable witnesses. For example, residents with dementia may not be able to remember the details of an abusive incident, and their memory of the details may deteriorate over the course of an investigation. Or, residents with dementia may report abuse that stems from traumatic memories from an incident that occurred earlier in their lives. One stakeholder said this can be a challenge for investigations because they do not know how much they can rely on a cognitively impaired resident’s statement, making it difficult for them to corroborate an abuse allegation. However, one stakeholder noted that, while it can be difficult to interview abuse victims with cognitive impairment, it is important to treat their allegations seriously and with credibility. One law enforcement stakeholder noted that interviews with these victims require special training. Lack of cooperation from some nursing homes. Stakeholders in each of the five states in our review said that some nursing homes may withhold, alter, or make it difficult for investigatory agencies to gain access to necessary, timely, or accurate information about alleged abuse. This may be, for example, because they may fear adverse publicity, litigation, or penalties from the state or CMS. In addition, as noted previously, nursing home staff may be fearful of losing their jobs. Stakeholders said that nursing home staff who witnessed abuse may be intentionally vague when interviewed by investigators; for example, by saying they cannot recall an incident. Some stakeholders also noted that nursing homes may delay investigators’ access to patient records, or they may even alter patient records in order to fill in information that should have been documented but was not at the time of the incident. One stakeholder we interviewed noted that the problem is not necessarily widespread—that some nursing homes are open about sharing information while others can be more difficult. Another stakeholder noted that a nursing home’s cooperation can sometimes depend on the seriousness of the allegation. Lack of agency coordination. Stakeholders in three of the five states in our review said that having multiple agencies involved in investigations, such as the state survey agency, law enforcement, the ombudsman, and, in some states, Adult Protective Services, can create challenges, including coordinating investigations and notifying one another about investigation outcomes. One stakeholder said they sometimes begin an investigation without realizing another investigatory agency has already started its own investigation. Further, stakeholders in two of the five states in our review said that CMS does not allow state survey agencies to share important investigatory information with law enforcement. (We discuss this issue in more detail later in this report.) We found that CMS: (1) cannot readily access data on the type of abuse or type of perpetrator, (2) has not provided guidance on what information nursing homes should include in facility-reported incidents, and (3) has numerous gaps in its referral process that can result in delayed and missed referrals to other entities. Together, these gaps affect critical points in CMS’s oversight of abuse in nursing homes including the prevention, identification, and timely investigation of abuse. CMS cannot readily access information on abuse or perpetrator type in its datasets and, as a result, lacks key information critical to understanding and appropriately addressing nursing home abuse with its oversight. Specifically, in two of CMS’s datasets—complaints/facility-reported incidents and deficiencies—agency officials told us they do not require the state survey agencies to record abuse and perpetrator type. As a result, we found that CMS’s data do not readily support CMS’s understanding of the types of abuse and perpetrators that are most prevalent in nursing homes. CMS officials told us they believe that the majority of abuse is committed by nursing home residents, and that physical and sexual abuse were the most common types; officials said they based this current understanding of abuse and perpetrator types on professional experience, literature, and ad hoc analyses of deficiency narrative descriptions. However, our review of a representative sample of abuse deficiency narratives from 2016 and 2017 found that staff were more often the perpetrators of deficiencies cited as abuse than residents or others, and that physical and mental/verbal abuse occurred most often in nursing homes, followed by sexual abuse. CMS officials noted that some incidents resulting from resident altercations—particularly those that do not show a willful intent to harm—may not have been cited as an abuse deficiency by some state survey agencies and may have been cited as other deficiencies not specified as abuse. This may have contributed to the difference between CMS’s understanding of the prevalence of resident to resident abuse and what their abuse deficiency data show. If CMS required information on abuse and perpetrator type to be recorded, the agency would have a better understanding of abuse in nursing homes. However, CMS officials told us they do not currently require the state survey agencies to specify abuse and perpetrator type because they consider the surveyor’s job to be identification and documentation of noncompliance. Additionally, CMS officials told us they have not conducted a systematic review to gather information on abuse and perpetrator type. This is inconsistent with federal internal control standards directing management to use quality information to achieve program objectives. Without the systematic collection and monitoring of specific abuse and perpetrator data, CMS lacks key information and, therefore, cannot take actions—such as tailoring prevention and investigation activities—to address the most prevalent types of abuse or perpetrators. All of the state survey agencies we spoke to told us that facility-reported incidents can lack key information that can cause potential delays in abuse investigations. Specifically, officials from each of the five state survey agencies told us that the facility-reported incidents they receive from nursing homes can lack key information that affects their ability to effectively triage incidents and determine whether an investigation should occur and how soon. Two state survey agencies we spoke with said they sometimes have to conduct significant follow-up with the nursing homes to obtain the information they need to prioritize the incident for investigation—follow-up that delays and potentially negatively affects investigations. For example, one state survey agency told us that a facility reported abuse involving two residents but did not initially report that the residents were injured, and that the facility did not file an addendum to the facility-reported incident to indicate resident injury. As a result of this incomplete information, the state survey agency did not properly prioritize this incident response. Despite federal law requiring nursing homes to self-report allegations of abuse, and covered individuals to report reasonable suspicions of crimes against residents, CMS has not provided guidance on what information should be included in these reports. Our review of CMS’s State Operations Manual found that CMS does not have guidance related to the information that nursing homes or covered individuals should report to the state survey agencies or local law enforcement; in contrast, it does contain guidance on the type of information members of the public should include in a complaint about nursing home quality to the state survey agency—and CMS makes a standardized complaint template form available on its website. The lack of guidance on the information that state survey agencies should collect on facility-reported incidents is inconsistent with federal internal control standards directing management to use quality information to achieve program objectives. CMS could outline basic information requirements that states must include on incident forms used by nursing homes and covered individuals to ensure the state survey agency is receiving the information it needs to accurately and quickly triage these incidents. CMS officials told us in November 2018 that they have efforts underway to examine guidance related to the information state survey agencies need to appropriately triage these facility-reported incidents and are developing a facility-reported incident template. Until the guidance and template are in place, these facility-reported incidents may lack key information that can cause potential delays in abuse investigations. CMS requires state survey agencies to make referrals to law enforcement and, if appropriate, to MFCUs when abuse is substantiated; however, we found numerous gaps in CMS’s referral process that can result in delayed and missed referrals. (See table 6.) Timing of abuse referrals. We found CMS’s requirements for when state survey agencies should report abuse to law enforcement and MFCUs lag behind the federal requirements for when covered individuals should make such referrals, and, as a result, referrals may be significantly delayed. Specifically, federal law requires covered individuals to immediately report reasonable suspicions of a crime against a resident that results in serious bodily injury to law enforcement and the state survey agency. Conversely, state survey agencies do not have to report suspicions of crime identified on complaints submitted to, and surveys conducted by, the state survey agency until the abuse has been substantiated—a process that can often take weeks or months. Officials from one law enforcement agency and two MFCUs that we interviewed told us the delay in receiving referrals limits their ability to collect evidence and prosecute cases—for example, bedding associated with potential sexual abuse may have been washed and wounds may have healed. This is consistent with the findings of our 2002 report, where we recommended that CMS should ensure that state survey agencies immediately notify law enforcement or MFCUs when nursing homes report allegations of physical or sexual abuse. One state survey agency in our review established more stringent guidelines than CMS by requiring the surveyors to notify law enforcement and the MFCU promptly upon receiving a complaint of abuse. CMS officials told us their state survey agency reporting requirements are based on a March 2002 policy. This is inconsistent with standards for internal control, which state that management should communicate quality information externally so that external parties can help the entity achieve its objectives. Tracking of abuse referrals. In addition to delays in referring cases to law enforcement and MFCUs, CMS officials also told us that CMS does not conduct oversight to ensure that state survey agency referrals to law enforcement and the MFCUs are occurring as required for substantiated abuse, and, as a result, CMS cannot ensure that state survey agencies are complying with reporting obligations. For example, an official from one of the five state survey agencies we interviewed said they had never made a referral to law enforcement or the MFCU, despite having substantiated allegations of abuse. The state survey agency official told us that they do not refer cases to law enforcement, and that law enforcement referrals are the responsibility of the nursing home. This is incompatible with CMS guidelines requiring that substantiated abuse be referred to law enforcement; however, CMS officials told us that they do not track whether state survey agencies make referrals to law enforcement and the MFCUs. This is inconsistent with federal standards for internal control, which state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. Definition of substantiated abuse. We found confusion among some state survey agencies about CMS’s definition of what it means to substantiate an allegation of abuse—a challenge because substantiation is a trigger in the investigation process, and CMS requires state survey agencies to make referrals to law enforcement and staff registries when abuse is substantiated by evidence. As a result, there is a potential for substantiated abuse to not be reported and, subsequently, not referred to law enforcement or MFCUs for criminal investigation. Two of the five state survey agencies in our review told us they believed they could not substantiate an allegation unless they could also cite a federal deficiency. This is inconsistent with CMS’s guidance, which says that state survey agencies can substantiate that an allegation occurred without citing a federal deficiency and that, subsequently, these substantiated allegations must be referred to law enforcement and staff registries. For example, according to CMS guidance, if the state survey agency investigated and found evidence that a resident was abused, but the nursing home had taken preventive actions against the deficient practice, the state survey agency would then substantiate that the abuse occurred, but not cite a deficiency. However, state survey agencies may decide not to substantiate an abuse allegation verified by evidence if they believe no deficiency should be cited, such as if the nursing home had taken preventive action against the deficient practice, which could result in that abuse going unreported and not referred to law enforcement, MFCUs, or staff registries. Because substantiation of abuse is a critical trigger in abuse investigations, confusion around its interpretation could prevent these important next steps. CMS officials told us they are aware that the state survey agencies have varying interpretations of what it means to substantiate abuse. According to federal standards for internal control, management should internally communicate quality information to achieve the entity’s objectives. Information sharing. We also found that CMS’s guidance on state survey agency referrals contained in its State Operations Manual does not specify what incident information can be shared with local law enforcement, either in response to local law enforcement’s request for information or when the state survey agency refers substantiated findings of abuse to local law enforcement. As a result, both state survey and law enforcement agencies expressed confusion and frustration about what information can be shared and said delays have occurred that can impede law enforcement investigations. Officials from two state survey agencies told us that CMS does not allow them to share any information with law enforcement without a written request. For example, officials from one state survey agency said that they cannot share the name of the resident abused or the time when the incident occurred. One state survey agency said that information sharing can be uneven, and told us that law enforcement is required to share information with the state survey agencies, but the state survey agencies do not share their investigatory information with law enforcement. Officials from another state survey agency wrote to CMS notifying CMS of a change in their state survey agency protocol that would make the referral process timelier by providing un-redacted survey records of substantiated abuse to local law enforcement. However, in CMS’s 2017 written response to the survey agency, CMS told them that all written requests for these records must continue to be forwarded to CMS for processing in accordance with the federal Privacy Act. When we asked CMS officials what information state survey agencies can share with law enforcement in a referral, CMS explained that scenarios for requesting information can vary, and that CMS does not prescribe a specific method as it depends on the needs of the investigation. This lack of guidance is inconsistent with federal standards for internal control, which state that management should internally communicate quality information to achieve the entity’s objectives. While nursing home abuse is relatively rare, our review shows that abuse deficiencies cited in nursing homes are becoming more frequent, with the largest increase in severe cases. As such, it is imperative that CMS have key information critical to understanding abuse and that the agency’s oversight of nursing homes is strong. We found weaknesses in both CMS’s understanding of abuse and in its oversight that need to be addressed. Specifically, because CMS cannot readily access information on abuse or perpetrator types in its data, it lacks key information critical to taking appropriate actions to address the most prevalent types of abuse and perpetrators. In addition, CMS has not provided guidance on what information should be included in facility-reported incidents, contributing to a lack of information for state survey agencies and, subsequently, delays in their investigations. This lack of guidance related to facility- reported incidents is important in light of our findings that abuse deficiencies are identified most commonly through facility-reported incidents. We also found other gaps in CMS’s process related to ensuring timely referrals of abuse to law enforcement, tracking abuse referrals, defining abuse substantiation, and sharing information with law enforcement. These gaps affect CMS’s oversight of abuse in nursing homes—including the prevention, identification and timely investigation of abuse—and may limit CMS’s ability to ensure that nursing homes meet federal requirements for residents to be free from abuse. We are making the following six recommendations to the administrator of CMS: Require that abuse and perpetrator type be submitted by state survey agencies in CMS’s databases for deficiency, complaint, and facility- reported incident data, and that CMS systematically assess trends in these data. (Recommendation 1) Develop and disseminate guidance—including a standardized form—to all state survey agencies on the information nursing homes and covered individuals should include on facility-reported incidents. (Recommendation 2) Require state survey agencies to immediately refer complaints and surveys to law enforcement (and, when applicable, to MFCUs) if they have a reasonable suspicion that a crime against a resident has occurred when the complaint is received. (Recommendation 3) Conduct oversight of state survey agencies to ensure referrals of complaints, surveys, and substantiated incidents with reasonable suspicion of a crime are referred to law enforcement (and, when applicable, to MFCUs) in a timely fashion. (Recommendation 4) Develop guidance for state survey agencies clarifying that allegations verified by evidence should be substantiated and reported to law enforcement and state registries in cases where citing a federal deficiency may not be appropriate. (Recommendation 5) Provide guidance on what information should be contained in the referral of abuse allegations to law enforcement. (Recommendation 6) We provided a draft of this product to HHS for review and comment. In its comments, reproduced in appendix IV, HHS concurred with our six recommendations and identified actions it is taking to implement them. Specifically, HHS said that it will: (1) look into options for requiring state survey agencies to record data on abuse and perpetrator type so that HHS may assess trends in these data; (2) develop guidance that includes a list of standardized data elements to be included when nursing homes report facility-reported incidents and guidance specific to the reporting and tracking of facility-reported incidents involving abuse; (3) require state survey agencies to immediately refer complaints to law enforcement if a reasonable suspicion of a crime against a resident has occurred and share relevant survey information; (4) consider how to implement mechanisms for tracking law enforcement referrals; (5) identify opportunities to clarify in guidance situations where citing a federal deficiency may not be appropriate, but reporting the abuse is still required; and (6) develop a list of standardized elements that should be included when reporting an abuse allegation to law enforcement. HHS also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of HHS and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This appendix describes our scope and methodology for determining the trends and types of abuse occurring in nursing homes in recent years. For this examination, we reviewed CMS guidance and analyzed data from 2013 through 2017, which represented the most recent data for a 5-year period at the time of our review. Specifically, we first reviewed the CMS State Operations Manual’s Appendix PP that was in effect during our period of review to determine which federal standards and deficiency codes were relevant to resident abuse. We focused our analysis on the deficiency code to be used by state surveyors when a nursing home fails to keep a resident free from abuse, which encompasses mental/verbal, sexual, or physical abuse. Surveyors can also use other deficiency codes for abuse-related issues, such as a failure by the nursing home to train staff on issues related to abuse, either in conjunction with an abuse deficiency or without an abuse deficiency. Since these abuse-related deficiency codes do not necessarily represent incidents of abuse, but do represent situations where a nursing home’s inadequate policies could leave residents vulnerable to abuse, we conducted a limited analysis on the trends of these deficiencies, which is described in appendix II. For our analysis, we identified abuse deficiencies cited by surveyors in all 50 states and Washington, D.C., between 2013 and 2017, using data provided by CMS from its Certification and Survey Provider Enhanced Reports system. Specifically, we calculated the number of abuse deficiencies cited each year and determined how many of these abuse deficiencies were at each level of severity—no actual harm with a potential for minimal harm, no actual harm with a potential for more than minimal harm, actual harm, and immediate jeopardy—for each year. We compared the results for abuse deficiencies with the results for all types of deficiencies in each year. To avoid over-counting deficiencies, deficiencies that were for the same violation on the same day for the same facility were counted as a single deficiency. We then tracked (1) the origin of these abuse deficiencies and (2) enforcement actions implemented against nursing homes with these abuse deficiencies. Origin of abuse deficiencies. To identify trends in the origin of those abuse deficiencies—that is, whether the deficiency originated from a standard survey, complaint investigation, or a facility-reported incident investigation—we analyzed data provided by CMS from its Automated Survey Processing Environment Complaint/Incident Tracking System. Specifically, we matched the deficiencies with the complaint/incident data using provider number, survey date, and deficiency code. We found that some deficiencies were the result of a combination of complaints, facility-reported incidents, surveys, or all three. We counted those deficiencies as originating from each relevant category. Enforcement actions. To identify trends in the enforcement actions imposed and implemented against nursing homes with abuse deficiencies, we analyzed data provided by CMS from its Automated Survey Processing Environment Enforcement Manager. Specifically, we matched the deficiencies with the enforcement data using provider number, survey date, case identification number, and deficiency code. To avoid over-counting, deficiencies that share the same code and case identification number were counted as a single deficiency. For each year, we determined how many of the abuse deficiencies resulted in enforcement actions imposed or implemented, the severity of the abuse deficiencies with enforcement actions, and the types of enforcement actions implemented. We then examined these abuse deficiencies to determine the number of nursing homes that had abuse deficiencies, as well as the number of homes with repeated abuse deficiencies cited across the 5 years and the characteristics of those homes. We also determined the proportion of surveyed nursing homes in a given year that had an abuse deficiency. Nursing homes that had repeated abuse deficiencies. Since a nursing home can have more than one abuse deficiency cited in a given year, we determined the number of surveyed nursing homes each year that had at least one abuse deficiency, both nationally and by state. For each of those nursing homes, we determined if the home had an abuse deficiency repeated in multiple years and in two or more consecutive years. Nursing home characteristics. We attempted to identify commonalities among homes with multiple years of abuse deficiencies, homes with only a single year with an abuse deficiency, and surveyed homes without any abuse deficiencies throughout the 5- year period. Specifically, we matched deficiency data to CMS’s publicly available Provider of Services files and the Nursing Home Compare Provider Information files for each nursing home; and we examined bed size, non-profit or for-profit status, Five-Star Quality Rating System overall rating, Special Focus Facility designation, and urban or rural location. Finally, because abuse and perpetrator type are not readily identifiable in CMS’s data, we identified this information by reviewing the narratives written by surveyors that describe the substantiated abuse. Specifically, we obtained 1,557 narrative descriptions written by state surveyors for abuse deficiencies cited in 2016 and 2017 provided by CMS from its Automated Survey Processing Environment database. From that universe of abuse deficiency narratives, we selected a randomly selected representative sample of 400 narratives, and each narrative was reviewed by two separate reviewers who independently analyzed the text of each narrative to determine the abuse and perpetrator type according to the definitions that CMS implemented on November 28, 2017, in its State Operations Manual. Any disagreements between the two reviewers were resolved by a third independent reviewer. (See table 7.) For those narratives where the abuse type could not reasonably be categorized under an existing CMS definition, reviewers had the option to mark narratives as “other.” Furthermore, we analyzed the scope and severity for each narrative within our sample. CMS’s abuse deficiency code also included involuntary seclusion in the time period we examined and is defined in its November 22, 2017, guidance as “separation of a resident from other residents or from her/his room or confinement to her/his room (with or without roommates) against the resident’s will, or the will of the resident representative.” Our analysis of the narrative descriptions found that 3 percent of the abuse deficiency narratives in our sample were attributable to involuntary seclusion. We were unable to categorize the abuse and perpetrator type for about 11 percent of the deficiency narratives in our sample, because we determined the narrative description did not meet CMS’s abuse definition. We assessed the reliability of each of the datasets by checking for missing values and obvious errors and discussed them with CMS officials who were knowledgeable about the data. In the course of this assessment, we found some data limitations. Specifically, CMS officials told us that some state survey agencies may not have entered all facility- reported incidents into the Automated Survey Processing Environment Complaint/Incident Tracking System, while other state survey agencies did. We also found underreporting, as noted in our 2019 report, where the Oregon state survey agency was not entering all abuse-related complaints or facility-reported incidents into this same database—a problem that could exist in other states. In addition, CMS officials told us that it is possible there are additional incidents that may not have been represented in the abuse deficiency data during the period of our review. Specifically, CMS officials noted that some incidents resulting from resident altercations—particularly those that do not show a willful intent to harm—may not be cited as an abuse deficiency by some state survey agencies. We therefore consider the number of abuse deficiencies that resulted from complaints or facility-reported incidents to be a conservative estimate. After reviewing the possible limitations of these data, we determined the data were sufficiently reliable for the purposes of this reporting objective. This appendix describes trends in abuse-related deficiencies over the 5- year period from 2013 through 2017. We reviewed Centers for Medicare & Medicaid Services (CMS) guidance that was in effect during this period of review to determine which federal standards and deficiency codes were relevant to resident abuse. For the report, we focused our analysis on the deficiency code cited when state surveyors substantiate incidents of abuse, but there are also deficiencies that surveyors can cite for abuse-related issues, such as a failure by the nursing home to train staff on issues related to abuse, either in conjunction with an abuse deficiency or without an abuse deficiency. Since these abuse-related deficiencies do not necessarily represent incidents of abuse, but do represent situations where a nursing home’s inadequate policies could leave residents vulnerable to abuse, we also conducted a limited analysis on the trends of these deficiencies. Specifically, we analyzed CMS data to identify the number of abuse-related deficiencies cited in each year in all 50 states and Washington, D.C., and determined how many were cited at each level of severity—no actual harm with a potential for minimal harm, no actual harm with a potential for more than minimal harm, actual harm, and immediate jeopardy. We also tracked the source of these abuse-related deficiencies—that is, whether the deficiency originated from a standard survey, complaint investigation, or a facility-reported incident investigation. Finally, we compared the results for abuse-related deficiencies with the results for all types of deficiencies cited by surveyors in each year. From 2013 to 2017, we found that abuse-related deficiencies became slightly more common with a resulting increase in severity. Specifically, abuse-related deficiencies increased by about 9.9 percent over the 5-year period, from 4,899 deficiencies cited in 2013 to 5,383 deficiencies cited in 2017, but peaked in 2016 with 5,687 deficiencies. This increasing trend for abuse-related deficiencies is in contrast to the slight decrease in all deficiencies cited over the same period, but not nearly as high as the 103.5 percent increase in abuse deficiencies. In addition, the proportion of abuse-related deficiencies cited at the highest levels of severity— deficiencies causing actual harm to residents or putting residents in immediate jeopardy—fluctuated throughout the 5-year period. Specifically, about 6.1 percent of the 4,899 abuse-related deficiencies in 2013, about 5.6 percent of the 5,278 abuse-related deficiencies in 2015, and about 7.8 percent of the 5,383 abuse-related deficiencies in 2017 caused actual harm or immediate jeopardy. (See fig. 7.) We also found that over half of the abuse-related deficiencies each year were cited by surveyors as a result of standard surveys, and the rest were cited by surveyors as a result of either complaint or facility-reported incident investigations. This falls between what we found for abuse deficiencies—the majority were a result of either complaint or facility- reported incident investigations—and all types of deficiencies—the vast majority were a result of standard surveys. Over the 5 years, similar to abuse deficiencies and all types of deficiencies, the percentage of abuse- related deficiencies that resulted from standard surveys decreased while the percentage that resulted from both complaint and facility-reported incident investigations increased. Specifically, over the 5-year period, the percentage of abuse-related deficiencies resulting from standard surveys decreased by about 8.8 percentage points, complaint investigations increased by about 3.6 percentage points, and facility-reported incident investigations increased by about 5.3 percentage points. (See fig. 8.) Tables 8 and 9 provide state-level data on abuse deficiencies and the nursing homes that had abuse deficiencies cited in consecutive years. John E. Dicken, (202) 512-7114 or dickenj@gao.gov. In addition to the contact named above, Karin Wallestad (Assistant Director); Sarah-Lynn McGrath and Kathryn Richter (Analysts-in-Charge); Luke Baron; Summar Corley; Zosha Kandel; and Julianne Flowers made key contributions to this report. Also contributing were Laurie Pachter, Jennifer Whitworth, and Vikki Porter.", "summary": "Nursing homes provide care to about 1.4 million nursing home residents—a vulnerable population of elderly and disabled individuals. CMS, an agency within the Department of Health and Human Services (HHS), defines standards nursing homes must meet to participate in the Medicare and Medicaid programs. GAO was asked to review abuse of residents in nursing homes. Among other objectives, this report: (1) determines the trends and types of abuse in recent years, and (2) evaluates CMS oversight intended to ensure residents are free from abuse. GAO reviewed CMS's policies, analyzed CMS data on abuse deficiencies from 2013 through 2017, the most recent data at the time of our review, and interviewed officials from CMS and state survey agencies in five states, as well as other key stakeholders in those states such as ombudsmen and law enforcement officials. The states were selected for variation in factors such as number of nursing homes and role of other state agencies in abuse investigations. The Centers for Medicare & Medicaid Services (CMS) is responsible for ensuring nursing homes meet federal quality standards, including that residents are free from abuse. CMS enters into agreements with state survey agencies to conduct surveys of the state's homes and to investigate complaints and incidents. GAO analysis of CMS data found that, while relatively rare, abuse deficiencies cited in nursing homes more than doubled, increasing from 430 in 2013 to 875 in 2017, with the largest increase in severe cases. GAO also reviewed a representative sample of abuse deficiency narratives from 2016 through 2017. Physical and mental/verbal abuse occurred most often in nursing homes, followed by sexual abuse, and staff were more often the perpetrators of the abuse deficiencies cited. CMS cannot readily access information on abuse or perpetrator type in its data and, therefore, lacks key information critical to taking appropriate actions. GAO also found gaps in CMS oversight, including: Gaps in CMS processes that can result in delayed and missed referrals. Federal law requires nursing home staff to immediately report to law enforcement and the state survey agency reasonable suspicions of a crime that results in serious bodily injury to a resident. However, there is no equivalent requirement that the state survey agency make a timely referral for complaints it receives directly or through surveys it conducts. CMS also does not conduct oversight to ensure that state survey agencies are correctly referring abuse cases to law enforcement. Insufficient information collected on facility-reported incidents. CMS has not issued guidance on what nursing homes should include when they self-report abuse incidents to the state survey agencies. Officials from all of the state survey agencies in GAO's review said the facility-reported incidents can lack information needed to prioritize investigations and may result in state survey agencies not responding as quickly as needed. GAO is making six recommendations, including that CMS: require state survey agencies to submit data on abuse and perpetrator type; require state survey agencies to immediately refer to law enforcement any suspicion of a crime; and develop guidance on what abuse information nursing homes should self-report. HHS concurred with all of GAO's recommendations and identified actions it will take to implement them.", "document_type": "gao"}
{"report": "This section provides an overview of (1) the legal framework governing mixed HLW, (2) the status of EM’s IWTU reengineering project, (3) EM’s requirements for capital asset projects and operations activities, (4) DOE’s policy for the review of projects with start-up risks, and (5) our best practices for assessing cost and schedule estimates. The treatment and disposal of mixed HLW at INL is governed by a number of federal laws that define the roles of federal agencies and states in managing mixed HLW, as well as cleanup agreements among DOE, the state of Idaho, and other parties. DOE primarily regulates radioactive components of HLW under the Atomic Energy Act of 1954, as amended, and the Nuclear Waste Policy Act of 1982, as amended. These acts define HLW as (1) the highly radioactive waste material resulting from the reprocessing of spent nuclear fuel, including liquid waste produced directly in reprocessing and any solid material derived from such liquid waste that contains fission products in sufficient concentrations, and (2) other highly radioactive material that the Nuclear Regulatory Commission determines by rule, consistent with existing law, requires permanent isolation. DOE considers calcine waste HLW because it is solidified liquid waste produced during the reprocessing of spent nuclear fuel. EM manages the SBW as mixed HLW because, according to reports from DOE and National Academies, (1) the SBW was produced in the later stages of spent nuclear fuel reprocessing, (2) the tanks in which the SBW is stored previously held HLW, (3) the SBW is stored in a location at INL where waste is managed as HLW, and (4) the waste contains hazardous chemicals subject to RCRA and EPA’s implementing regulations or authorized state programs that operate in lieu of the federal program. HLW must be disposed of in a geologic repository unless the Nuclear Regulatory Commission approves an alternative disposal site. DOE Order 435.1 and Manual 435.1-1 describe the department’s policy and requirements for managing DOE’s radioactive waste, including HLW, to ensure that it is managed in a manner that is protective of worker and public health and safety and the environment. Manual 435.1-1 also established processes to determine whether waste resulting from reprocessing spent nuclear fuel can be managed as transuranic waste or low-level waste if certain criteria are met, which is referred to as a determination that the waste is incidental to reprocessing. According to the manual, HLW is waste incidental to reprocessing if, among other things, the waste has been processed, or will be processed, to remove key radionuclides to the maximum extent technically and economically practicable. Hazardous components of mixed HLW are regulated by EPA or authorized states under RCRA. EPA’s regulations require hazardous waste to meet certain treatment standards before land disposal of the waste unless a variance is granted. The regulations specify that the treatment standard (i.e., the required method for treatment) for Idaho’s mixed HLW is vitrification—the immobilization of waste in glass. Where EPA has authorized states to implement hazardous waste management programs, those state programs operate instead of the federal program. EPA, under RCRA, has authorized the state of Idaho to administer its own hazardous waste management program. EPA has also authorized New Mexico to administer its own hazardous waste management program. Pursuant to such authorization, New Mexico’s Environment Department issues the permit for hazardous waste storage and disposal at WIPP under the New Mexico Hazardous Waste Act. As of March 2019, EM’s IWTU reengineering project was in phase two of the four-phased approach to get the facility operational, according to EM Idaho Cleanup Project officials. According to project reports, phase one focused on identifying fixes to resolve problems with the facility’s equipment and waste treatment process, for example, by performing engineering analyses and chemistry studies. Phase two has focused on implementing these fixes, for example, by modifying a piece of equipment that separates solidified waste before it is moved to storage canisters, according to the contractor’s project plan. Figure 1 summarizes the four- phased approach for the IWTU reengineering project. According to EM documents, as of February 2019 total expenditures on phases one and two were approximately $150 million, about $64 million more than original costs estimated for those two phases combined, and the project was over 1 year behind schedule. Phase two has taken longer and cost more than initially estimated because of additional problems and required modifications to the facility as the work has progressed, according to EM Idaho Cleanup Project officials. Appendix II provides information on the actual costs of phases one and two compared to estimated costs. As previously noted, EM officials with the Idaho Cleanup Project estimated in March 2019 that phase three may begin in summer 2019. Further, these officials stated that phase three will involve a 6- month outage to continue implementing changes to the facility prior to the start of a 60-day performance test using a simulated waste form. EM Idaho Cleanup Project officials stated that phase four could begin in early 2020 and that EM and Fluor Idaho had yet to determine whether an outage would need to occur before starting testing with a small amount of the SBW. EM divides its cleanup work into capital asset projects and operations activities, two types of activities governed by different applicable project management policies: Capital asset projects. DOE Order 413.3B governs EM’s program and project management activities for the acquisition of capital assets, with the stated goal of delivering fully capable projects within the planned cost, schedule, and performance baseline. The order establishes five critical decision points of project development that each end with a major approval milestone that cover the life of a project. The order specifies requirements that must be met, including developing and managing project cost and schedule estimates to move a project past each critical decision milestone. EM capital asset projects include construction projects and cleanup projects, such as soil and water remediation and facility decommissioning and demolition. Operations activities. Operations activities are recurring facility or environmental operations, as well as activities that are project-like, with defined start and end dates, according to EM policy. EM operations activities include operating waste processing facilities and the stabilization, packaging, transportation, and disposition of nuclear waste. EM manages operations activities based on requirements listed in a cleanup policy that it issued in July 2017. In February 2019, we found that EM cleanup site managers have discretion in how to classify cleanup work because DOE and EM have not established requirements on what work should be managed as an operations activity under EM’s cleanup policy or as a capital asset project under DOE Order 413.3B. Further, we found that operations activities have less stringent management requirements than capital asset projects. We recommended that EM establish requirements for classifying work as an operations activity and revise its cleanup policy to follow program and project management leading practices. DOE generally agreed with our recommendations. Beginning in January 2005, EM managed the development and construction of the IWTU facility as a capital asset project. Once EM determined that construction on the facility was complete in April 2012, the project exited the capital asset oversight process established in DOE Order 413.3B and has since been managed as an operations activity, according to EM Idaho Cleanup Project officials. DOE officials also told us that the IWTU reengineering project has been managed as an operations activity because the facility has been constructed and is now in a period of maintenance and repair. Figure 2 shows a picture of the exterior of the IWTU facility. In August 2016, DOE’s Deputy Secretary of Energy issued a memorandum establishing a new oversight requirement for selected projects for which an extended period of transition to operations is likely— the phase after construction is complete but before full operational capability is attained—called the operational release milestone. According to the memorandum, DOE created the operational release milestone in the department’s project life cycle to provide additional oversight after the completion of the project under DOE’s Order 413.3B. DOE officials from the Office of Project Management stated that the operational release milestone was largely created in response to EM’s experience with the IWTU facility not operating as expected. Under these new requirements, program offices are to provide DOE’s Project Management Risk Committee (PMRC) with regular updates on selected projects until full operational capability of each facility is attained. Specifically, program offices are required to (1) develop and execute a plan that describes how the program will reach operational capability, which is referred to as an operational release plan, and (2) provide progress updates to the PMRC on the project, as described below. Operational release plan. Officials from DOE’s Office of Project Management—which serves as the secretariat for the PMRC—stated that the purpose of the operational release plan is for the program office to describe what steps are required for the project to reach its operational capability. According to EM’s guidance, the operational release plan should present the key processes, activities, interrelationships, risks, management and oversight, decision milestones and approvals, and overall schedule to achieve operational release. Progress updates. According to the memorandum and the PMRC’s standard operating procedures, program offices are to provide the PMRC with quarterly progress updates on selected projects, including lessons learned, until full operational capability is attained. The GAO’s cost guide and schedule guide compiled best practices corresponding to the characteristics of high-quality and reliable cost and schedule estimates. According to the cost guide, a high-quality, reliable cost estimate has four characteristics: comprehensive, well-documented, accurate, and credible. A comprehensive cost estimate has enough detail to ensure that cost elements are neither omitted nor double-counted. If a cost estimate is not comprehensive (that is, complete), then it cannot fully meet the other characteristics (i.e., well-documented, accurate, or credible). In addition, according to the schedule guide, a high-quality, reliable schedule has four characteristics: comprehensive, well- constructed, controlled, and credible. A comprehensive schedule captures all government and contractor activities necessary to accomplish a project’s objectives, and a well-constructed schedule sequences all activities using the most straightforward logic possible. If a schedule is not comprehensive, with all activities accounted for, it is uncertain whether all activities are scheduled in the correct order, resources are properly allocated, missing activities will appear on the critical path, or a schedule risk analysis can account for all risk. If a schedule is not well-constructed, it will not be able to properly calculate dates and predict changes in the future, among other things. EM has not fully followed selected project management best practices for cost and schedule estimates for the IWTU reengineering project. EM generally followed best practices for a reliable EVM system to measure the performance of the reengineering project. However, in analyzing IWTU reengineering project data from March 2017 through February 2018, we found that the system is producing unreliable data, which may limit EM’s ability to measure the project’s performance. Further, EM has taken some steps toward meeting requirements under DOE’s process for monitoring projects with start-up risks. EM has not fully followed (i.e., has partially met) selected best practices in developing the cost and schedule estimates we reviewed for phases one and two of the IWTU reengineering project and future planned IWTU operations. We made the following observations based on our analysis of these cost estimating documents and a March 2018 project schedule: Comprehensive cost estimate (partially met): EM partially met best practices for a comprehensive cost estimate. According to our cost guide, a comprehensive cost estimate should reflect the project’s technical requirements and current schedule and account for all possible costs. While the cost estimate was based on documented technical information, it was not based on a standardized work breakdown structure. Without a standard, product-oriented work breakdown structure to facilitate the tracking of resource allocations and expenditures, EM may not be able to reliably estimate the cost of future similar programs. While assumptions are listed in EM’s documents describing the cost estimates, no document discusses whether the assumptions came from inputs from technical subject matter experts or whether the assumptions are associated with specific risks. Since assumptions are best guesses, best practices state that the risk associated with any of these assumptions changing need to be identified and assessed. Further, the IWTU reengineering project’s cost estimate was not complete because it did not account for all possible costs. According to our cost guide, a life cycle cost estimate provides an exhaustive and structured accounting of all resources and associated cost elements required to develop, produce, deploy, and sustain a particular program. The project’s cost estimate did not reflect all life cycle costs, in part because estimates for phases three and four of the project had not been developed at the time of our review. Best practices state that all costs be included in an estimate, even in early stages, such as at a rough order of magnitude. EM officials from the Idaho Cleanup Project said that a cost estimate was not developed for the total cost of the IWTU reengineering project because of the approach for negotiating the cost and schedule baseline prior to the start of each phase. Without developing a cost estimate for the IWTU reengineering project that is comprehensive (e.g., accounts for all possible costs), EM will not have reasonable assurance that it can successfully plan program resource requirements. Well-constructed schedule estimate (partially met): EM partially met best practices for a well-constructed schedule. According to our schedule guide, a well-constructed schedule includes activities that are logically sequenced; a valid critical path; and a reasonable amount of total float, meaning an accurate reflection of the schedule’s flexibility. EM’s March 2018 schedule had minimal sequencing issues and a continuous critical path, with the exception of an external dependency, and the critical path was free of lags and constraints. However, there were long duration activities on the critical path that should be reevaluated to determine if they can be broken into more manageable pieces. Without a valid critical path, management cannot focus on activities that will detrimentally affect the key program milestones and deliveries if they slip. Additionally, the schedule estimate included unreasonably large values of positive and negative float. According to best practices, a schedule should identify reasonable values of float so that the schedule’s flexibility can be determined to help accommodate for delays. EM officials from the Idaho Cleanup Project explained that the amount of total float was a result of the methods they used to structure the logic of the schedule estimate, which according to our best practices may have caused the schedule to be overly optimistic. According to scheduling best practices, without accurate values of total float, the schedule cannot be used to identify activities that could be permitted to slip and thus release and reallocate resources to activities that require more resources to be completed on time. Inaccurate values of total float also falsely depict true program status, which could lead to decisions that may jeopardize the program. In addition, the March 2018 schedule contained 14 activities with large amounts of negative float, meaning that these activities were behind schedule. Without fully developing a well-constructed schedule estimate for the IWTU reengineering project, EM will not have reasonable assurance that it can successfully achieve its plans to reengineer the IWTU and begin treatment of the SBW without further delays. Comprehensive schedule estimate (substantially met): EM substantially met best practices for a comprehensive schedule. According to our schedule guide, a comprehensive schedule includes all activities for both the government and its contractors to accomplish their objective, assigns resources (e.g., labor and materials) to all activities, and establishes how long each activity will take. EM’s March 2018 schedule substantially captured all activities, but it may not have been planned to the level of detail for the work necessary to accomplish a program’s objectives as defined in the program’s work breakdown structure. For example, the schedule had activities that were described as level of effort but were not assigned the level of effort activity type. Level of effort activities represent effort that has no measurable output and, according to best practices, should be clearly marked so they do not interfere with the critical path. Further, the schedule substantially met the best practice of assigning resources to all activities. For example, the schedule assigned resources to specific materials and equipment as well as to travel, training, and labor. Appendix II contains the full results of our analysis of selected best practices for the cost and schedule of the IWTU reengineering project. As previously noted, EM is managing the IWTU reengineering project as an operations activity. We reported in February 2019 that EM manages operations activities using less stringent requirements than those used for capital asset projects, posing cost and schedule risks. For example, under EM’s 2017 cleanup policy, there is no requirement for operations activities to follow best practices for cost estimates developed during contract execution. We recommended that EM review and revise its 2017 cleanup policy to include project management leading practices related to scope, cost, schedule performance, and independent reviews. DOE concurred with our recommendation and stated that EM was already in the process of reviewing its policy for necessary updates, revisions, and modifications, and that EM would consider our recommendation, as appropriate, during this process. EM officials with the Idaho Cleanup Project acknowledged that they do not have an estimate for the total cost or a completion date for the IWTU reengineering project or a schedule for when waste treatment operations will begin and be completed. An EM Idaho Cleanup Project official told us that Fluor Idaho submitted cost and schedule estimates for phases three and four of the reengineering project in January 2019 and that EM requested an independent cost estimate for this work from the Defense Contract Audit Agency, with contract negotiations between EM and Fluor Idaho for these phases estimated to begin in spring 2019. In addition, EM officials from the Idaho Cleanup Project acknowledged that a schedule for waste treatment operations at the project has not been developed. Further, these officials noted that design modifications to the IWTU are expected to reduce its operating capability, lengthening the time needed to treat the SBW. As a result, EM and Fluor Idaho plan to renegotiate the cost of their contract related to the treatment of the waste in the project, according to EM Idaho Cleanup Project officials. Specifically, because of the modifications to the project, the rate at which the SBW is treated will be slower than initially estimated, according to EM officials from the Idaho Cleanup Project. Treatment of all 900,000 gallons of the SBW was originally estimated to be completed in 10 months, but agency officials now estimate that treatment may take from 3 to 7 years— as much as eight times longer than originally planned. As previously noted, EM has already experienced approximately $64 million in added costs and, as of February 2019, a delay of over 1 year. Without fully following best practices for a comprehensive cost estimate and well- constructed schedule estimate for SBW waste treatment operations, EM cannot be assured that it has reliable cost and schedule estimates for decision-making, placing it at risk of continued cost overruns and delays in achieving its plans to reengineer the IWTU and begin treatment of the SBW. We analyzed IWTU reengineering project data for March 2017 through February 2018 from EM’s EVM system and found that while EM has followed (i.e., fully met or substantially met) some best practices for a reliable EVM system, the system is producing unreliable data. These unreliable data may limit EM’s ability to measure the project’s performance. EVM is a management tool used to measure the value of work accomplished in a given period and compare it with the planned value of work scheduled for the same period and with the actual cost of the work accomplished. EVM data can alert project managers to potential problems sooner than expenditures alone can, and EVM’s use as a management tool is considered a best practice for conducting cost and schedule performance analysis for projects, according to our cost guide. EM requires the use of an EVM system under its contract with Fluor Idaho for the Idaho Cleanup Project. Overall, we found that EM followed best practices to ensure that its EVM data for the IWTU reengineering project were (1) comprehensive and (2) used by leadership for decision-making. However, EM did not follow (i.e., partially met) best practices to ensure that the data resulting from the EVM system are reliable. Specifically: EM substantially met best practices for a comprehensive EVM system by, for example, requiring the contractor’s EVM system to comply with the guidelines established by the Earned Value Management Systems EIA-748-D Intent Guide; EM conducted a compliance review of Fluor Idaho’s EVM system in March 2017 and found some areas in need of improvement. In addition, EM has an EVM surveillance system in place under its contract with Fluor Idaho, and EM officials from the Idaho Cleanup Project stated that they review data from the EVM system each month. EM substantially met best practices ensuring that leadership uses the EVM data for decision-making. For example, Fluor Idaho updated data in its EVM system monthly during the period we reviewed, and EM reported issues in a monthly review briefing between EM and the contractor, according to EM Idaho Cleanup Project officials. Agency management also tracked the causes of cost and schedule variances in the data. However, the monthly reports did not contain all the information that best practices recommended. Specifically, the performance measurement baseline was not included in the contractor performance reports provided, so we could not determine how the performance measurement baseline changed as the project evolved. EM partially met best practices ensuring that the EVM system provides reliable data because, for instance, the system contained numerous anomalies, leading the system to produce unreliable data. Specifically, we found one or more anomalies present in all months of data reviewed, such as missing or negative values. While EM was able to explain the causes for most of these anomalies, negative values should occur rarely, if ever, in EVM reporting because they imply the undoing of previously scheduled or performed work. According to best practices, all anomalies should also be identified and the reason for each should be fully explained in EM’s monthly EVM reports. However, EM did not document the reasons for these anomalies in its monthly reports. EM officials from the Idaho Cleanup Project said that most of the anomalies in the data were due to the phase two estimate including authorized unpriced work—that is, additional work that EM agreed to let the contractor perform without first negotiating or independently verifying the costs. If errors in EVM reports are not detected, then EVM data will be skewed, resulting in bad decision-making and limiting EM’s ability to use the EVM system to measure project performance. Appendix III provides detailed information on EM’s performance on each EVM best practice. An EVM system that produces unreliable data may contribute to EM’s challenges in measuring the performance of its operations activities. Our findings in this regard are consistent with our prior reports examining EM’s use of EVM systems in other contracts. For example, in February 2019 we reviewed the use of EVM systems in the 21 contracts EM uses to execute its operations activities, including Fluor Idaho’s contract for the cleanup at INL, and found that EM has not followed best practices to ensure that these systems (1) are comprehensive, (2) provide reliable data, and (3) are used by EM leadership for decision-making. We recommended that EM update its cleanup policy to require that EVM systems be maintained and used in a way that follows EVM best practices, such as ensuring the reliability of the data in the system. Without following best practices for ensuring EVM data reliability for the IWTU reengineering project’s EVM system, EM leadership may not have access to reliable performance data with which to make informed decisions as it manages billions of dollars’ worth of cleanup work and provides information to Congress and other stakeholders on the cleanup work every year. In 2016, DOE instituted independent review requirements to monitor facilities with commissioning or start-up risks, and EM has taken some steps toward meeting those requirements for the IWTU reengineering project. As previously noted, DOE’s policy requires program offices to (1) develop and execute an operational release plan and (2) provide progress updates to the PMRC on the project each quarter. We made the following observations on EM’s actions to meet these requirements for the reengineering of the IWTU project: EM developed an operational release plan for the IWTU project in December 2016, which preceded EM’s developing guidance for these plans. We found that the operational release plan included the majority of elements that EM’s guidance later required. EM has provided five progress update briefings to the PMRC on the IWTU reengineering project, according to DOE documents, but these briefings have not occurred each quarter as required by DOE’s policy. Officials from DOE’s Office of Project Management told us that briefings generally occur when progress has been made on a project. EM’s guidance for operational release plans also states, with regard to progress update briefings, that an alternate reporting schedule may be proposed for PMRC approval. The PMRC made recommendations in three of these five briefings. For example, the PMRC recommended that EM revisit and review documents to ensure that the delegated authority is clear, current, and appropriate prior to facility start-up and the introduction of radioactive materials. According to documentation prepared following EM’s most recent briefing to the PMRC in February 2019, the PMRC recommended an update on the project in July 2019. Based on our review of EM documentation and plans, the agency does not have a strategy or timeline to address its three main challenges for disposing of the SBW or for identifying an alternative disposal pathway. EM identified WIPP as its preferred disposal site for the SBW in a 2005 Record of Decision document, but in March 2019 EM officials told us that a final decision on the disposal path for the SBW had not been made. The three main challenges EM faces in its plan to dispose of the SBW at its preferred disposal site are: (1) the permit for WIPP prohibits the SBW from being disposed of at WIPP, (2) federal law prohibits HLW from being disposed of at WIPP, and (3) there are existing capacity limitations to disposal at the WIPP facility. EM has taken some steps to address these challenges, as discussed further below. WIPP permit’s prohibition of the disposal of certain tank waste. New Mexico amended its permit for WIPP in 2004 to prohibit waste that has ever been managed as HLW, including the SBW at INL, from being disposed at WIPP unless the disposal of such waste is specifically approved through a permit modification. In 2013, DOE and its contractor responsible for operating and managing the facility filed a request with the state of New Mexico to modify the WIPP permit to remove this prohibition, which could allow the SBW to be disposed of at WIPP if EM determined that the SBW is waste incidental to reprocessing. However, the process was put on hold following the suspension of operations at WIPP in 2014, according to officials from DOE’s Carlsbad Field Office and New Mexico’s Environment Department. In April 2019, officials from New Mexico’s Environment Department said that they anticipated holding discussions with DOE and its contractor for the facility regarding the prohibition after the renewal of the WIPP permit in July 2020. However, a representative from a New Mexico environmental organization said that this proposed modification would likely face strong public opposition. This representative noted that previous DOE attempts to expand the types of waste that could be disposed of at WIPP caused significant public concern in New Mexico. Further, New Mexico Environment Department officials told us that processing permit modifications of this nature would likely require public hearings and opportunities for input and may take as long as 2 years or more to complete. Federal statutory prohibition on HLW disposal at WIPP. The Waste Isolation Pilot Plant Land Withdrawal Act prohibits disposal of HLW at WIPP. Therefore, to enable EM to dispose of the SBW at WIPP, the SBW would need to be classified as non-HLW, or the act would need to be amended to remove the prohibition. DOE has a process for determining that certain waste resulting from reprocessing spent nuclear fuel, such as the SBW and calcine waste, could be managed as either transuranic waste or low-level waste, which are not HLW. Under DOE Order 435.1 and Manual 435.1-1, DOE may determine that waste is incidental to reprocessing and therefore manage the waste as transuranic waste or low-level waste if it meets certain criteria. EM began developing documentation supporting a waste incidental to reprocessing determination for the SBW in 2001. For example, in September 2001, EM requested consultation from the Nuclear Regulatory Commission, which oversees the nuclear power industry, on a draft waste incidental to reprocessing determination so that the SBW could be managed as transuranic waste and disposed of at WIPP rather than in an HLW repository. DOE’s Authority to Determine That Certain Waste Is Not HLW In 2002, while litigation over the Department of Energy’s (DOE) authority to use DOE Order 435.1 and Manual 435.1-1 was pending, DOE sought enactment of legislation clarifying its authority to manage portions of tank waste that have low levels of radioactivity as low- level waste. In response, Congress enacted section 3116 of the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 in October 2004. Under section 3116, radioactive waste resulting from the reprocessing of spent nuclear fuel is not high- level waste (HLW) if the Secretary of Energy, in consultation with the Nuclear Regulatory Commission, determines that it meets specified conditions. These conditions include that the waste does not require disposal in a deep geologic repository and has had highly radioactive radionuclides removed to the maximum extent practical. However, section 3116 only applies to waste stored at DOE sites in Idaho and South Carolina that is not transported from those states. Therefore, DOE cannot use section 3116 to classify the sodium-bearing waste (SBW) as transuranic waste for disposal as DOE’s agreements with Idaho require the SBW to be removed from the state. However, DOE’s authority to use Order 435.1 and Manual 435.1-1 to classify the SBW and other waste from reprocessing as non-HLW was challenged in a federal lawsuit in 2001, resulting in EM suspending its development of the waste incidental to reprocessing determination. Following the dismissal of the lawsuit on procedural grounds, EM restarted the internal process for developing the waste incidental to reprocessing determination for the SBW, according to EM officials and documents. For example, EM identified the waste incidental to reprocessing determination for the SBW as a priority item for executive decision-making in a 2017 EM study on mission operations. Internal discussions about this determination continued between EM and DOE into 2018, but the waste incidental to reprocessing determination was not finalized, according to EM officials. In October 2018, EM published a notice in the Federal Register seeking public comment on its proposed interpretation of the statutory definition of HLW, which EM officials said could help the agency make a decision about the classification of the SBW. EM also published a supplemental notice in June 2019 to modify the interpretation and provide additional information to the public, such as on the role of the Nuclear Regulatory Commission and states. Table 1 presents the statutory definition, the proposed interpretation from the October 2018 Federal Register notice, and the modified interpretation from the June 2019 Federal Register notice. EM officials told us that under the new interpretation, waste would be disposed of in accordance with its characteristics (which determines risk) instead of solely based on the source of the waste (which does not determine risk). Stakeholders, including members of the public, state and local governments, tribes, and the Nuclear Regulatory Commission, expressed a range of perspectives about EM’s proposed interpretation in public comments. For example, some stakeholders submitted comments expressing concern about the Nuclear Regulatory Commission being excluded from the determination of what is HLW under the interpretation. These comments also stated that the interpretation is contrary to federal law and that the interpretation will elicit legal challenges. Other stakeholders expressed support for the interpretation in comments submitted to EM stating, for example, that the proposed interpretation could accelerate the cleanup of tank waste at DOE sites and result in cost savings. According to an EM document, potential benefits of the interpretation, if implemented, include a more risk-based approach to waste classification, which could provide a more cost-effective and timely approach to DOE’s cleanup mission. However, EM officials stated that it was premature to discuss the administrative actions, such as revising orders or regulations that would be required to implement the new interpretation. The June 2019 Federal Register notice states that DOE will consider what actions may be needed and appropriate to update applicable DOE directives, such as Order 435.1 and Manual 435.1-1, in light of this interpretation and address any revisions in future actions. EM officials also told us that they did not have a timeline for implementing the new interpretation. Further, EM officials stated that if the HLW interpretation is implemented, alternative disposal options could also be considered for the SBW, but they declined to specify what those options could be. Limitations on disposal at WIPP. Further, existing limitations in the disposal space at WIPP could affect the disposal of the SBW at the facility. We reported in September 2017 that DOE does not currently have sufficient disposal space at WIPP for the waste identified in its 2016 annual inventory report—a document that tracks waste intended to be disposed of at the facility. Specifically, DOE will need to expand the repository to accommodate this waste as well as other potential waste, such as the SBW, for which DOE has yet to determine if it meets all of WIPP’s waste acceptance criteria. In March 2019, DOE officials stated that WIPP could be expanded within the current Waste Isolation Pilot Plant Land Withdrawal Act boundary for the site to accommodate the current planned waste and additional waste inventories. Specifically, DOE officials said that mining for a new disposal panel and design work for additional disposal panels was under way, and mining of the additional panel was scheduled to commence in 2021. Further, in September 2017 we also reported that additional potential waste beyond what is captured in the inventory could exceed WIPP’s statutory capacity. However, in December 2018, New Mexico’s Environment Department approved a modification to the WIPP permit—which was requested by DOE and its contractor that operates and manages WIPP—that will change the way waste volume is calculated to exclude empty space inside waste packing. According to DOE officials, this means that additional waste can be disposed of at WIPP under the existing statutory limit. Further, DOE officials stated that the revised counting methodology will reduce an overstatement in the volume of record for emplaced waste by about 30 percent. However, in January 2019 three environmental organizations filed lawsuits challenging the modification, which the court consolidated and, in May 2019, stayed pending mediation. EM officials said that if the office is not able to dispose of the SBW at WIPP, its plan is to dispose of the SBW—once it is treated to a solid form in the IWTU—with the calcine waste in an HLW geologic repository. However, there is still no HLW disposal site in the United States. In 2008, DOE submitted a license application to the Nuclear Regulatory Commission for an HLW repository at Yucca Mountain, Nevada, about 100 miles northwest of Las Vegas. In 2010, however, DOE terminated its efforts to obtain a license for the Yucca Mountain repository. Under the 1995 settlement agreement with the state of Idaho, DOE is required to treat the SBW so that it is ready for disposal outside of the state by a target date of 2035. An EM official responsible for the disposition of the SBW at INL told us that EM has not developed a strategy, including a timeline, for addressing challenges, including the WIPP permit prohibition, the federal law prohibition, and existing capacity limitations, that could affect EM’s ability to meet this target date. According to standards for internal control, federal agency management should identify, analyze, and respond to risks related to achieving a defined objective. Until it develops such a strategy, including a timeline, to implement the actions required to achieve its preferred disposal pathway, or an alternative, for the SBW, EM will not have reasonable assurance that it can achieve its preferred plan for disposal or begin identifying an alternative. Moreover, if EM implements its new interpretation of HLW and uses this definition to classify the SBW as non- HLW, there is significant risk for extended litigation, which may delay to EM’s plans to dispose of the SBW at its preferred disposal site. EM faces challenges implementing its selected treatment technology for calcine waste and faces uncertainties with a waste disposal pathway. As a result, the agency is suspending further development of its plan to treat calcine waste for land disposal, according to EM documents and officials. EM Idaho Cleanup Project officials told us that the agency is continuing to make progress toward its milestones for calcine waste disposal by considering alternatives for processing the waste for land disposal and conducting a pilot project to remove it from the oldest storage vessel. However, EM does not have a strategy or timeline for determining its next steps for the ultimate treatment and disposal of calcine waste. Because of challenges with implementing its chosen treatment technology as well as selecting a potential waste disposal pathway, EM is suspending further development of its plan to treat calcine waste for land disposal, according to EM documents and officials. In December 2009 EM identified hot isostatic pressing as its preferred treatment technology for preparing the calcine waste for land disposal outside of Idaho. Hot isostatic pressing is a manufacturing process that applies elevated temperatures and pressurized gas to materials in a containment vessel, resulting in a ceramic waste form. EM officials from the Idaho Cleanup Project told us that while hot isostatic pressing is a technology used in other industries, such as in industrial manufacturing, it has not been used before to treat HLW. Further, hot isostatic pressing would require a variance or an EPA regulation establishing a new treatment standard prior to land disposal. According to EM Idaho Cleanup Project officials and agency documents, EM selected hot isostatic pressing as the treatment technology because EM’s analyses assumed it would result in significant cost savings for disposal at Yucca Mountain compared to other methods. In February 2011, an independent DOE review team issued a preliminary technology readiness assessment for using hot isostatic pressing for calcine waste treatment as part of DOE’s process for managing capital asset projects. The review team identified several concerns, such as whether components of the technology would be mature enough to meet EM’s planned milestones and challenges with EM’s decision to retrofit and reuse the IWTU for the calcine waste treatment mission. EM officials from the Idaho Cleanup Project said that the decision to retrofit and reuse the IWTU for the calcine waste after treating the SBW resulted from reluctance within DOE to build another “first-of-a-kind” treatment facility. However, the review team’s report stated that the decision to retrofit the facility may result in logistical and physical maintenance challenges because of space limitations and height requirements. Based on the results of an independent analysis of alternatives for calcine waste disposition, published in April 2016, EM decided to suspend developing the hot isostatic pressing technology, according to EM officials from the Idaho Cleanup Project. DOE initiated this analysis of alternatives in response to a new requirement from the Secretary of Energy and because hot isostatic pressing is not a mature technology for HLW, according to EM’s summary report for the analysis. The report identified uncertainties and challenges with the use of hot isostatic pressing when compared to other potential treatment options given, including that hot isostatic pressing is significantly different than vitrification and would require the development and acceptance of testing protocols to validate that it produces a robust waste form, hot isostatic pressing had the second greatest estimated cost (more than $2 billion) of the options assessed in the analysis of alternatives, hot isostatic pressing represented the highest operational safety risk of all of the options assessed given its use of high pressures and temperatures, and other treatment options may perform better for managing the waste because of significant advances in technology since the selection of hot isostatic pressing in 2009. The independent team performing this analysis also concluded that uncertainties regarding plans for an HLW geologic repository also affect EM’s ability to move forward with selecting a treatment technology. According to EM officials from the Idaho Cleanup Project and documents, EM’s selection of hot isostatic pressing was based on assumptions developed based on sending the waste to the Yucca Mountain disposal facility. Specifically, an important factor in the selection of hot isostatic pressing as the treatment technology was its ability to provide the lowest volume of final waste, while producing a robust waste form, which would reduce disposal costs at Yucca Mountain. As previously noted, the licensing for developing the Yucca Mountain facility was terminated in 2010. The team performing the analysis of alternatives concluded that because selecting an appropriate treatment technology greatly depends on the calcine waste’s disposal path and associated waste form performance requirements, EM should defer making a final decision on the treatment technology until the performance objectives of the disposal path are better defined. While further decisions regarding a treatment technology for the calcine waste are suspended, EM officials from the Idaho Cleanup Project said that they are taking steps to demonstrate to regulators from Idaho’s Department of Environmental Quality that they are making progress to prepare the calcine waste for disposal outside the state. Under DOE’s 1995 settlement agreement with Idaho, treatment of all calcine waste is to be completed by a target date of December 31, 2035. Further, DOE is required to meet interim milestones for the cleanup of the waste under a site treatment plan that DOE developed for the Idaho Department of Environmental Quality. EM officials from the Idaho Cleanup Project told us that they planned to work with the Idaho Department of Environmental Quality to make changes to milestones specific to calcine waste in the site treatment plan, and Idaho Department of Environmental Quality officials stated in December 2018 that preliminary discussions on this topic occurred in September 2018. Further, EM Idaho Cleanup Project officials identified actions that EM is taking at the site to study alternatives to treatment and aspects of the disposal process. EM officials from the Idaho Cleanup Project stated that with the suspension of developing hot isostatic pressing, they are studying the potential packaging of the calcine waste for disposal without additional treatment, or “direct disposal.” The analysis of alternatives report identified direct disposal as having significant cost savings over other technologies. However, the team performing the analysis of alternatives also found that this method has a high degree of regulatory uncertainty and it is not clear whether it would be accepted by stakeholders, such as state regulators and the public. EPA officials told us that if EM wanted to proceed with plans for the direct disposal of the calcine waste in a geologic repository, EM would need, among other things, to seek a no-migration variance from EPA. A petition for a no-migration variance must demonstrate, to a reasonable degree of certainty, that the hazardous components would not leak or escape once the HLW is buried underground for as long as the waste remains hazardous. EPA officials added that there is a very high bar for such variances; only one such request has been approved since 1984, and it was later rescinded. In February 2019, an EM Idaho Cleanup Project official told us that EM has met with officials from the Idaho Department of Environmental Quality and EPA to receive their preliminary input on this approach. EM Idaho Cleanup Project officials said that they are focusing in the near term on developing and testing a system to retrieve the calcine waste from its storage vessels, called bin sets. According to EM documents, retrieval of the calcine waste from the bin sets is a precursor to treating or packaging the waste for disposal, and there are several challenges to address in developing an effective retrieval system. As a result, EM directed its contractor to conduct a project to retrieve calcine waste from the oldest bin set and move it to a partially empty bin set under EM’s contract for hazardous waste cleanup at INL. The project serves to both test different forms of technologies and also to cease use of the older bin set, which does not have the same structural integrity as the other bin set because of its design, according to EM officials from the Idaho Cleanup Project and documents. The project is estimated to cost $50 million over 5 years, according to these officials. Fluor Idaho’s plan for the calcine waste retrieval project involves developing a full-scale mock-up of the retrieval process for testing in fiscal years 2019 and 2020, with the commissioning and start-up of the full-scale system and transfer of the waste to occur in fiscal year 2021. In February 2019, an EM official told us that $6 million was obligated to the pilot project in fiscal year 2019 in part because of increased costs for the IWTU reengineering project and cleanup of transuranic waste at INL. Despite these efforts, EM officials from the Idaho Cleanup Project acknowledged that the agency has no plan to issue a new Record of Decision or amend the 2010 Record of Decision selecting the treatment option for calcine waste. Although EM identified challenges with using hot isostatic pressing for the treatment of the calcine waste in its technical readiness assessment in 2011 and analysis of alternatives in 2016, an EM official told us that the agency does not have a strategy for determining its next steps in treating this waste for land disposal. According to standards for internal control, federal agency management should identify, analyze, and respond to risks related to achieving a defined objective. Without developing a strategy, including a timeline, to identify and develop a treatment approach for the calcine waste, EM does not have reasonable assurance that it will meet milestones for the completion of treatment of all calcine by a target date of December 31, 2035. EM has been working since 2005 to construct and operate the IWTU to treat the SBW and calcine waste at INL. Despite declaring construction complete in 2012 at a cost of $571 million, EM is still working to repair and reengineer the IWTU following the discovery of facility problems during testing, with expenditures surpassing $416 million. EM has made progress in identifying the engineering problems plaguing the facility and implementing technical changes and expects to complete the second of the four phases of the reengineering project in mid-2019, with its next series of system testing to begin in early 2020. However, EM has experienced significant cost increases and schedule delays in phase two of the IWTU project, and additional engineering and testing remains to be completed before beginning a multiyear effort to treat the SBW. EM’s ability to achieve the project’s estimated cost and schedule in phase two may have been hampered because EM has not fully followed best practices for ensuring that the cost estimate is complete and the schedule estimate is well-constructed. By ensuring that the cost estimate for future phases of the IWTU reengineering project and the SBW treatment operations is comprehensive (e.g., account for all possible costs), EM will have greater assurance that it can successfully plan program resource requirements. Moreover, by developing a well-constructed schedule estimate for the IWTU reengineering project and the SBW treatment operations, EM will have greater assurance that it can successfully achieve its plans to reengineer the IWTU and begin treatment of the SBW without further delays. Further, while EM is using an EVM system to measure the performance of the project and generally followed best practices for EVM systems, the system produces unreliable data. By following best practices for ensuring EVM data reliability for the IWTU reengineering project’s EVM system, EM leadership will have better access to reliable performance data as it manages billions of dollars’ worth of cleanup work and provides information to Congress and other stakeholders on the cleanup work every year. EM faces long-standing challenges to implementing its preferred alternative for disposing of the treated SBW at WIPP. Key among these challenges are provisions in federal law and the WIPP permit that prevent EM from disposing of the SBW at WIPP. EM has taken some steps toward addressing these challenges, such as seeking public comment on its new interpretation of the statutory definition of HLW that according to EM could allow the waste to be disposed of at WIPP or an alternative to an HLW geologic repository. However, EM has no strategy or timeline for making any changes to DOE policies and regulations that may be required to implement its new interpretation or for making decisions regarding disposing of the SBW. Until it develops such a strategy, including a timeline, to implement the actions required to achieve its preferred disposal pathway, or an alternative, for the SBW, EM will not have reasonable assurance that it can achieve its preferred plan for disposal or begin the process of identifying an alternative. Further, if EM implements its new interpretation of HLW and uses this definition to classify the SBW as non-HLW, there is significant risk for extended litigation, which may delay EM’s plans to dispose of the SBW at its preferred disposal site. Moreover, EM faces challenges in completing treatment of the calcine waste by a target date of December 31, 2035, in light of its decision to suspend development of the selected treatment technology, hot isostatic pressing, and the absence of an HLW geologic repository. Even though EM is studying alternatives to using hot isostatic pressing to prepare the calcine waste for disposal, it has not developed a strategy or a timeline for determining its plans for treating this waste for disposal. Without developing such a strategy, including a timeline, for the treatment and disposal of the calcine waste to ensure that EM meets the milestone for completing the treatment of the waste by December 31, 2035, EM does not have reasonable assurance that it can meet its milestones. We are making five recommendations to DOE: The Secretary of Energy should direct the Assistant Secretary of EM to develop cost estimates for the IWTU reengineering project and the SBW treatment operations that meet best practices for being comprehensive (e.g., account for all costs). (Recommendation 1) The Secretary of Energy should direct the Assistant Secretary of EM to develop schedule estimates for the IWTU reengineering project and the SBW treatment operations that meet best practices for being well- constructed. (Recommendation 2) The Secretary of Energy should direct the Assistant Secretary of EM to follow best practices for ensuring the reliability for the IWTU reengineering project’s EVM system. (Recommendation 3) The Secretary of Energy should direct the Assistant Secretary of EM to develop a strategy, including a timeline, for implementing the actions required to achieve its preferred disposal pathway, or an alternative, for the SBW. (Recommendation 4) The Secretary of Energy should direct the Assistant Secretary of EM to develop a strategy, including a timeline, to identify and develop a treatment approach for the disposal of the calcine waste to ensure that EM meets the milestone for completing the treatment of this waste by the target date of December 31, 2035. (Recommendation 5) We provided a draft of this report for review and comment to the Secretary of Energy and the Administrator of the EPA. DOE provided written comments on the draft report, which are presented in appendix IV. EPA did not provide written comments. DOE and EPA both provided technical comments that we incorporated in the report as appropriate. DOE agreed with our recommendations related to the management of the IWTU reengineering project, including developing cost and schedule estimates that meet best practices and ensuring the reliability of the EVM system for the project. Regarding the cost estimate, DOE committed to developing cost estimates that meet best practices and stated that cost estimates for phases three and four of the IWTU reengineering project have been developed and reviewed by the Defense Contract Audit Agency. For the schedule estimate, DOE stated that the schedules for phases three and four have been developed and that the inclusion of these phases in the schedule is in accordance with best practices for the well-constructed characteristic. With regard to the EVM system, DOE stated that cost and performance data will be included in the EVM system in accordance with EVM best practices once contract negotiations are completed, which the agency estimated would conclude by December 31, 2019. DOE also agreed with our recommendations to develop a strategy, including a timeline, for the disposal of the SBW and calcine waste. DOE further stated that EM is in the process of developing a site options analysis for INL and other EM sites to identify opportunities to complete cleanup work through more efficient and innovative approaches over the next decade. This analysis is expected to be completed in fiscal year 2020, according to DOE. DOE stated that EM’s HLW interpretation issued in June 2019 could potentially open new disposal pathways for some reprocessing waste, such as SBW and calcine, while noting that decisions about whether and how this interpretation will apply to existing wastes have yet to be made. In its written comments, DOE disagreed with our recommendation to seek clarification from Congress on DOE’s authority to classify the SBW as other than HLW if such clarification is necessary to avoid extended litigation. DOE stated the agency does not require additional clarification from Congress to classify reprocessing waste as other than HLW. We are deleting our recommendation but continue to believe that there is significant risk for extended litigation if EM implements its new interpretation of HLW and uses this definition to classify the SBW as non- HLW. Extended litigation may delay EM’s plans to dispose of the SBW at its preferred disposal site. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of the Environmental Protection Agency, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix V. Our report examines (1) the extent to which the Department of Energy’s (DOE) Office of Environmental Management’s (EM) management of the Integrated Waste Treatment Unit (IWTU) reengineering project follows selected project management best practices; (2) challenges EM faces in the disposal of the sodium-bearing waste (SBW); and (3) challenges EM faces in the treatment and disposal of the calcine waste. To address these three objectives, we conducted a site visit to DOE’s Idaho National Laboratory (INL) in December 2017. During the site visit, we obtained documentation and interviewed officials from EM, which is responsible for hazardous waste cleanup at INL through its Idaho Cleanup Project. We also interviewed representatives from Fluor Idaho, LLC, which is the private contractor that manages hazardous waste cleanup at INL for EM, including the cleanup of the SBW and calcine waste. In addition, we conducted a site visit to Hazen Research, Inc., a subcontractor to Fluor Idaho, to observe pilot testing facilities for the IWTU reengineering project and discuss the status of the project with an EM official from the Idaho Cleanup Project and representatives from Hazen Research, Inc., and Fluor Idaho. To assess the extent to which EM’s management of the IWTU reengineering project meets selected project management best practices, we first identified areas deemed to be important to project management based on our previous work on DOE projects and leading practices from the Project Management Institute, which are generally recognized as leading practices for project management. Specifically, we reviewed the project management leading practices identified in the Project Management Institute’s A Guide to the Project Management Body of Knowledge—Sixth Edition. From this review, we selected project management practices related to developing cost and schedule estimates and conducting project monitoring through the use of earned value management (EVM) and independent reviews. We then conducted assessments of these best practices, as discussed below. Cost. To determine the extent to which the cost estimate for the IWTU reengineering project is reliable, we conducted an abridged analysis of the IWTU reengineering project’s cost estimate, focusing on its comprehensiveness. Typically, in analyzing a cost estimate against best practices in GAO’s Cost Estimating and Assessment Guide (cost guide), we examine four characteristics, each defined by multiple criteria: credible. For this review, we assessed the cost estimate for the IWTU reengineering project against the comprehensive characteristic, in part because EM officials told us that they had yet to develop a cost estimate for the program beyond phases one and two at the time of our review. Specifically, we reviewed the cost estimate for the operation of the IWTU and the IWTU reengineering project, which, at the time of our review, was only developed for phases one and two of the project. If a cost estimate is not comprehensive (that is, complete), then it cannot fully meet the well- documented, accurate, or credible best practice characteristics. For instance, if the cost estimate is missing some cost elements, then the documentation will be incomplete, the estimate will be inaccurate, and the result will not be credible because of the potential underestimating of costs and the absence of a full risk and uncertainty analysis. See appendix II for a summary assessment of the IWTU reengineering project’s cost estimate compared to selected best practices. Schedule. To assess EM’s schedule for the IWTU reengineering project, we conducted an abridged analysis of the IWTU reengineering project’s schedule, focusing on comprehensiveness and the degree to which it is well-constructed. Typically, in analyzing a schedule estimate against best practices in GAO’s Schedule Assessment Guide (schedule guide), we examine four characteristics, each defined by multiple criteria: controlled. For this review, we assessed the IWTU reengineering project schedule that EM provided in March 2018 against the well-constructed characteristic, in part because EM officials told us that they had yet to develop a schedule estimate for the totality of the reengineering project because of Fluor Idaho’s phased approach. If a schedule estimate is not well-constructed, it will not be able to properly calculate dates and predict changes in the future. When activities are missing logic links, the schedule will not be able to automatically transmit these delays to future activities that depend on them. When this happens, the schedule will not allow a sufficient understanding of the program as a whole, and users of the schedule will not have confidence in the dates and the critical path. In addition, we evaluated the comprehensive characteristic because it contributed to our analysis of EM’s EVM system, as described below. See appendix II for a summary assessment of the IWTU reengineering project’s schedule estimate compared to selected best practices. EVM. In addition, we analyzed EM’s use of EVM as a way to assess its monitoring of the IWTU reengineering project’s cost and schedule. EVM measures the value of work accomplished in a given period and compares it with the planned value of work scheduled for the period and with the actual cost of the work accomplished. It is an industry standard and is considered a best practice for conducting cost and schedule performance analysis for projects. Our EVM analysis focused on Fluor Idaho’s EVM data for the IWTU reengineering project contained in cost performance reports from March 2017 to February 2018 and the project schedule that EM provided in March 2018. Specifically, we compared this project documentation with EVM best practices as identified in our cost guide. Our research has identified a number of best practices that are the basis of effective EVM and should result in reliable and valid data that can be used for making informed decisions. These best practices have been collapsed into three high-level characteristics of a reliable EVM system, which are establish a comprehensive EVM system, ensure that the data resulting from the EVM system are reliable, and ensure that the program management team is using EVM data for decision-making purposes. See appendix III for our summary assessment of the IWTU reengineering project’s EVM data compared to best practices. EVM data are considered reliable if the overall assessment ratings for each of the three characteristics are substantially or fully met. If any of the characteristics are not met, minimally met, or partially met, then the EVM data cannot be considered reliable. Independent reviews. To assess the extent to which DOE has conducted independent reviews of the IWTU reengineering project, we examined DOE and EM policies to identify requirements for conducting reviews of operations activities. Specifically, we reviewed a 2016 DOE memorandum that established that DOE’s Project Management Risk Committee (PMRC) would provide independent review of selected projects in the operational release phase, the PMRC’s standard operating procedures, and EM’s guidance for projects in the operational release milestone. We examined documentation from the PMRC’s reviews of the IWTU reengineering project, including documentation that EM officials from the Idaho Cleanup Project prepared for these reviews and recommendations that the PMRC made to EM for the project. In addition, we spoke with officials from DOE’s Office of Project Management, which serves as the secretariat of the PMRC; EM’s Office of Acquisition & Project Management; and EM’s Idaho Cleanup Project about independent reviews of projects in the operational release phase. To examine challenges EM faces in the disposal of the SBW, we reviewed federal laws, regulations, and DOE policies on radioactive waste management, including those described in DOE Order 435.1 on radioactive waste management and its implementation manual. In addition, we examined EM’s October 2018 and June 2019 Federal Register notices, which provide DOE’s new interpretation of the statutory definition of high-level radioactive waste (HLW). We also reviewed documentation related to EM’s plans for disposing of the SBW at DOE’s Waste Isolation Pilot Plant (WIPP) in New Mexico, such as Record of Decision documents for proposed actions that require development of environmental impact statements, and the hazardous waste facility permit for WIPP that the New Mexico Environment Department issued. We interviewed DOE officials from the Office of the General Counsel; officials from EM’s Idaho Cleanup Project and Carlsbad Field Office, which is responsible for DOE’s oversight of WIPP; and officials from EM’s Office of Regulatory Compliance, Office of Nuclear Materials, and Office of Waste and Materials Management. We also interviewed officials from Idaho’s Department of Environmental Quality and New Mexico’s Environment Department, as well as representatives from two environmental advocacy groups in Idaho and New Mexico, to obtain their perspectives on the challenges facing EM’s SBW disposal efforts. To examine challenges EM faces in the treatment and disposal of the calcine waste, we reviewed federal laws, regulations, and documents that DOE and EM’s contractors for the Idaho Cleanup Project prepared related to the calcine waste cleanup mission. For example, we reviewed documents assessing treatment and disposal alternatives for calcine waste, including a 2016 analysis of alternatives report that EM prepared and a 2015 contractor-prepared report assessing the feasibility of the direct disposal of calcine waste. We interviewed officials from EM’s Idaho Cleanup Project and Office of Nuclear Materials; EM’s Chief Engineer; and representatives from EM’s contractor, Fluor Idaho, about plans for treating and disposing of the calcine waste and the retrieval pilot project. In addition, we reviewed Environmental Protection Agency (EPA) Resource Conservation and Recovery Act, as amended (RCRA) regulations, guidance, and documents concerning land disposal requirements. We also interviewed officials from EPA’s Office of Land and Emergency Management and Region 10 about EPA’s responsibilities for implementing RCRA. Lastly, we interviewed officials from the Idaho Department of Environmental Quality about how EM’s calcine waste treatment and disposal efforts address milestones in the Idaho Settlement Agreement. We conducted this performance audit from September 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 2 describes the initial cost and schedule estimates for the four phases of the Integrated Waste Treatment Unit reengineering project compared to actual expenditures and schedule as of February 2019. Table 3 details our assessment of the Office of Environmental Management’s (EM) cost estimate for phases one and two of the Integrated Waste Treatment Unit (IWTU) reengineering project compared to selected best practices for cost estimating published in GAO’s Cost Estimating and Assessment Guide (cost guide). For this review, we assessed the cost estimate for the IWTU reengineering project against the comprehensive characteristic, in part because EM officials told us that they had yet to develop a cost estimate for the program beyond phases one and two, at the time of our review of these documents. We assessed the comprehensive characteristic for the IWTU reengineering cost estimate because if a cost estimate is not comprehensive—that is, complete—then it cannot fully meet the other best practice characteristics. According to our analysis, EM’s cost estimate for the IWTU reengineering project partially met best practices for a comprehensive cost estimate. Table 4 details our assessment of EM’s schedule for the IWTU reengineering project compared to selected best practices for project schedules published in GAO’s Schedule Assessment Guide (schedule guide). For this review, we assessed the schedule against the well- constructed characteristic, in part because EM officials told us that they had yet to develop a schedule for the totality of the reengineering project because of the contractor’s phased approach. We assessed the well- constructed characteristic because, among other reasons, if a schedule is not well-constructed, it will not be able to properly calculate dates and predict changes in the future. In addition, we evaluated the comprehensive characteristic as it is needed to evaluate an earned value management system. According to our assessment, EM’s schedule for the reengineering project partially met best practices related to the well- constructed characteristic and substantially met best practices related to the comprehensive characteristic. Table 5 details our assessment of March 2017 to February 2018 data from the Department of Energy’s (DOE) Office of Environmental Management’s (EM) earned value management (EVM) system for the Integrated Waste Treatment Unit (IWTU) reengineering project. EVM measures the value of work accomplished in a given period and compares it with the planned value of work scheduled for that period and with the actual cost of work accomplished. By using the metrics derived from these values to understand performance status and to estimate cost and time to complete, EVM can alert program managers to potential problems sooner than expenditures alone can. Our research has identified a number of best practices that are the basis of effective EVM and should result in reliable and valid EVM data that can be used for making informed decisions. Specifically, EM followed (i.e., substantially met) best practices to ensure that its EVM system is (1) comprehensive and (2) used by leadership for decision-making, but did not follow (i.e., partially met) best practices to ensure that the data resulting from the EVM system are reliable. In addition to the contact named above, Casey L. Brown (Assistant Director), Emily Ryan (Analyst in Charge), Juaná Collymore, Jennifer Echard, Richard P. Johnson, Jason Lee, Eli Lewine, Katrina Pekar- Carpenter, Karen Richey, Jeanette Soares, Sheryl Stein, Farrah M. Stone, Paul Sturm, and Sara Sullivan made key contributions to this report.", "summary": "Decades of defense activities at DOE's Idaho National Laboratory produced two forms of waste that EM has managed as HLW: liquid SBW and granular calcine waste. Under an agreement with the state, DOE must treat the waste to prepare it for removal from Idaho by 2035. Construction on the IWTU, EM's facility to treat such waste, was completed in 2012, but initial testing of the SBW treatment process revealed design problems. EM has since been working to reengineer the IWTU. Total project construction and reengineering expenditures have reached nearly $1 billion as of February 2019. GAO was asked to review EM's efforts to treat and dispose of the SBW and calcine waste. This report examines (1) the extent to which EM's management of the IWTU follows selected project management best practices; (2) challenges EM faces in disposing of the SBW; and (3) challenges EM faces in treating and disposing of the calcine waste. GAO reviewed agency documents and IWTU project data from March 2017 through February 2018, analyzed EM project management efforts against selected project management best practices for cost and schedule, and interviewed DOE officials. The Department of Energy's (DOE) Office of Environmental Management (EM) has not fully followed selected project management best practices in managing the reengineering of the Integrated Waste Treatment Unit (IWTU), shown in the figure, to treat 900,000 gallons of liquid sodium-bearing waste (SBW) that must be solidified for disposal. EM's cost and schedule estimates for IWTU reengineering did not fully meet selected best practices for cost (i.e., did not account for all costs) and schedule estimates (e.g., did not have a valid critical path). For example, EM did not follow best practices for a comprehensive cost estimate because EM did not include both government and contractor costs over the entire project. As of February 2019, EM has experienced approximately $64 million in added costs and a more than 1-year delay in IWTU reengineering. Without fully following best practices for cost and schedule estimates, EM is at risk of future cost overruns and delays in meeting its target disposal milestones. Based on GAO's review of EM documents, EM faces challenges with its plans for SBW disposal at its preferred disposal site, the Waste Isolation Pilot Plant (WIPP), an underground repository for waste contaminated by nuclear elements, near Carlsbad, New Mexico. These challenges include a statutory prohibition on the disposal of high-level waste (HLW) at WIPP. Further, EM does not have a strategy or timeline to address these challenges or to identify an alternative disposal pathway. Without such a strategy or timeline, EM risks not meeting its commitments with Idaho to prepare the SBW for removal from the state by 2035. EM faces challenges implementing its selected technology to further treat 1.2 million gallons of granular calcine waste and selecting a potential waste disposal pathway. For example, DOE has identified challenges with retrofitting the IWTU for calcine waste treatment. As a result, EM is deferring further development of its plans to treat the calcine waste. EM officials said that the agency is making progress toward calcine waste disposal by testing options for removing the waste from its storage bins, a precursor to treating or packaging the waste for disposal. However, EM does not have a strategy or timeline for determining its next steps for the treatment and disposal of calcine waste. Such a strategy could help EM in seeking alternatives to its selected treatment technology and provide assurance that it will meet its commitments with Idaho for removing calcine waste from the state by the end of 2035. GAO is making five recommendations, including that DOE develop a strategy for the disposal of the waste. DOE generally agreed with all of these recommendations.", "document_type": "gao"}
{"report": "Consistent with the discretion afforded by the APA, Regulations.gov and agency-specific comment websites use required and optional fields on comment forms to collect some identity information from commenters. In addition to the text of the comment, agencies may choose to collect identity information by requiring commenters to fill in other fields, such as name, address, and email address before they are able to submit a comment. Regardless of the fields required by the comment form, the selected agencies all accept anonymous comments in practice. Specifically, in the comment forms on Regulations.gov and agency- specific comment websites, a commenter can submit under a fictitious name, such as “Anonymous Anonymous,” enter a single letter in each required field, or provide a fabricated address. In each of these scenarios, as long as a character or characters are entered into the required fields, the comment will be accepted. Further, because the APA does not require agencies to authenticate submitted identity information, neither Regulations.gov nor the agency-specific comment websites contain mechanisms to check the validity of identity information that commenters submit through comment forms. Regulations.gov and agency-specific comment websites also collect some information about public users’ interaction with their websites through application event logs and proxy server logs, though the APA does not require agencies to collect or verify it as part of the rulemaking process. This information, which can include a public user’s Internet Protocol (IP) address, browser type and operating system, and the time and date of webpage visits, is collected separately from the comment submission process as part of routine information technology management for system security and performance, and cannot be reliably connected to specific comments. Seven of the 10 selected agencies have documented some internal guidance associated with the identity of commenters during the three phases of the public comment process: intake, analysis, and response to comments. However, the focus and substance of this guidance varies by agency and phase of the comment process. As shown in Table 1, for selected agencies that have guidance associated with the identity of commenters, it most frequently relates to the comment intake or response to comment phases of the public comment process. The guidance for these phases addresses activities such as managing duplicate comments (those with identical or near-identical comment text but varied identity information) or referring to commenters in a final rule. Agencies are not required by the APA to develop internal guidance associated with the public comment process generally, or identity information specifically. Within the discretion afforded by the APA, the 10 selected agencies’ treatment of identity information varies during the three phases of the public comment process. Selected agencies differ in how they treat identity information during the comment intake phase, particularly in terms of how they post duplicate comments, which can lead to identity information being inconsistently presented to public users of comment systems. Generally, officials told us that their agencies either (1) maintain all comments within the comment system, or (2) maintain some duplicate comment records outside of the comment system, for instance, in email file archives. When an agency chooses to post a sample of duplicate comments, the identity information and unique comment contents for all duplicate comments may not be present on the public website. For example, for all duplicate comments received, Securities and Exchange Commission (SEC) posts a single example for each set of duplicate comments and indicates the total number of comments received. As a result, the identity information and any unique comment content beyond the first example are not present on the public website. (See fig. 1.) Selected agencies’ treatment of identity information during the comment analysis phase also varies. Specifically, program offices with the responsibility for analyzing comments place varied importance on identity information during the analysis phase. Finally, all agencies draft a response to comments with their final rule, but the extent to which the agencies identify commenters or commenter types in their response also varies across the selected agencies. Our analysis of Regulations.gov and agency-specific comment websites shows that the varied comment posting practices of the 10 selected agencies are not always documented or clearly communicated to public users of the websites. The E-Government Act of 2002 requires that all public comments and other materials associated with a given rulemaking should be made “publicly available online to the extent practicable.” In addition to the requirements of the E-Government Act, key practices for transparently reporting open government data state that federal government websites—like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. We found that the selected agencies we reviewed do not effectively communicate the limitations and inconsistencies in how they post identity information associated with public comments. As a result, public users of the comment websites lack information related to data availability and limitations that could affect their ability to use and make informed decisions about the comment data and effectively participate in the rulemaking process themselves. Public users of Regulations.gov seeking to submit a comment are provided with a blanket disclosure statement related to how their identity information may be disclosed, and are generally directed to individual agency websites for additional detail about submitting comments. While additional information is provided in the Privacy Notice, User Notice, and Privacy Impact Assessment for Regulations.gov, public users are not provided any further detail on Regulations.gov regarding what information, including identity information, they should expect to find in the comment data. Additionally, there is not enough information to help public users determine whether all of the individual comments and associated identity information are posted. Available resources on Regulations.gov direct public users to participating agencies’ websites for additional information about agency-specific review and posting policies. Seven of the eight participating agencies’ websites direct public users back to Regulations.gov and the Federal Register, either on webpages that are about the public comment process in general, or on pages containing information about specific NPRMs. Three of these participating agencies – the Environmental Protection Agency (EPA), the Fish and Wildlife Service (FWS), and the Food and Drug Administration (FDA) – do provide public users with information beyond directing them back to Regulations.gov or the Federal Register, but only FDA provides users with details about posting practices that are not also made available on Regulations.gov. The eighth participating agency – the Employee Benefits Security Administration (EBSA) – does not direct public users back to Regulations.gov, and instead recreates all rulemaking materials for each NPRM on its own website, including individual links to each submitted comment. However, these links go directly to comment files, and do not link to Regulations.gov. While EBSA follows departmental guidance associated with posting duplicate comments, which allows some discretion in posting practices, the agency does not have a policy for how comments are posted to Regulations.gov or its own website. Further, in the examples we reviewed, the content of the NPRM-specific pages on EBSA’s website does not always match what is posted to Regulations.gov. Because participating agencies are not required to adhere to standardized posting practices, Regulations.gov directs public users to participating agency websites for additional information about posting practices and potential data limitations. However, these websites do not describe the limitations associated with the identity information contained in publicly posted comments. As allowed for under the APA, all of the participating agencies in our review vary in the way in which they post identity information associated with comments—particularly duplicate comments. However, the lack of accompanying disclosures may potentially lead users to assume, for example, that only one entity has weighed in on an issue when, actually, that comment represents 500 comments. Without better information about the posting process, the inconsistency in the way in which duplicate comments are presented to public users of Regulations.gov limits public users’ ability to explore and use the data and could lead users to draw inaccurate conclusions about the public comments that were submitted and how agencies considered them during the rulemaking process. Both nonparticipating agencies use comment systems other than Regulations.gov and follow standardized posting processes associated with public comments submitted to their respective comment systems, but SEC has not clearly communicated these practices to the public. Although it appears to users of the SEC website that the agency follows a consistent process for posting duplicate comments, at the time of our June 2019 report, this practice had not been documented or communicated to public users of its website. In contrast, FCC identifies its policies for posting comments and their associated identity information in a number of places on the FCC.gov website, and on its Electronic Comment Filing System (ECFS) web page within the general website. Regarding comments submitted to rulemaking proceedings through ECFS, public users are informed that all information submitted with comments, including identity information, will be made public. Our review of ECFS comment data did not identify discrepancies with this practice. Although the public comment process allows interested parties to state their views about prospective rules, the lack of communication with the public about the way in which agencies treat identity information during the posting process, particularly for duplicate comments, may inhibit users’ meaningful participation in the rulemaking process. While the APA does not include requirements for commenters to provide identity information, or for agency officials to include commenters identity as part of their consideration of comments, key practices for transparently reporting open government data state that federal government websites— like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. As shown in Table 2, we recommended in our June 2019 report that five of the selected agencies establish a policy for posting comments, and that eight selected agencies take action to more clearly communicate their policies for posting comments, particularly with regard to identity information and duplicate comments. These agencies generally agreed with our recommendations and identified actions they planned to take in response, such as developing policies for posting duplicate comments and communicating those in various ways to public users. Since issuing our June 2019 report, all of the agencies to which we made recommendations have provided us with additional updates. Specifically, SEC completed actions that are responsive to the recommendation we made to it. In this regard, in September 2019, SEC issued a memorandum that reflects SEC’s internal policies for posting duplicate comments and associated identity information. SEC has also communicated these policies to public users on the SEC.gov website by adding a disclaimer on the main comment posting page that describes how the agency posts comments. These measures will help public users better determine whether and how they can use the data associated with public comments. The other seven agencies have provided updates, but have not yet implemented the recommendations. In December 2019 and January 2020, the Bureau of Land Management (BLM), Consumer Financial Protection Bureau (CFPB), EPA, and FWS notified us that they are in the process of developing or updating policies for posting public comments as well as statements for their websites to communicate these policies to the public. Similarly, in January 2020, the Department of Health and Human Services (HHS) stated that the Centers for Medicare and Medicaid Services (CMS) would update its comment posting policy and communicate it on the CMS website. However, the excerpt of the policy language provided does not include information about how the agency posts duplicate comments. Further, CMS did not provide us with the finalized policy, and our review of the website does not indicate any changes have been made. HHS officials stated they would provide additional follow up actions by July 2020. In September 2019, EBSA also stated that it will develop a written policy regarding posting of comments, including duplicate comments, which will be available on its website. However, the agency did not provide evidence that a formal evaluation of its current practice of replicating rulemaking dockets had been conducted, and did not identify plans to do so. The Wage and Hour Division (WHD) indicated that it will add text to each webpage for any rulemaking that invites public comments that states any personal information included in the comments (including duplicate) will be posted to Regulations.gov without change. However, the preliminary text provided by officials in August 2019 does not explain WHD’s policy of posting duplicate comments as a group under a single document ID, and therefore does not clearly communicate the agency’s posting practices to the public. Chairman Green, Ranking Member Barr, and Members of the Subcommittee, this concludes my prepared remarks. I would be happy to answer any questions you may have at this time. For further information regarding this testimony, please contact Seto J. Bagdoyan, (202) 512-6722 or bagdoyans@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony are David Bruno (Assistant Director), Allison Gunn (Analyst in Charge), Elizabeth Kowalewski, and Roger Gildersleeve. Individuals who contributed to the report on which this testimony is based include Enyinnaya David Aja, Gretel Clarke, Lauren Kirkpatrick, James Murphy, Alexandria Palmer, Carl Ramirez, Shana Wallace, and April Yeaney. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal agencies publish on average 3,700 proposed rules yearly and are generally required to provide interested persons (commenters) an opportunity to comment on these rules. In recent years, some high-profile rulemakings have received extremely large numbers of comments, raising questions about how agencies manage the identity information associated with comments. While the APA does not require the disclosure of identifying information from a commenter, agencies may choose to collect this information. This testimony summarizes GAO's June 2019 report on public comment posting practices (GAO-19-483). In that report, GAO examined (1) the identity information collected by comment websites; (2) the guidance agencies have related to the identity of commenters; (3) how 10 selected agencies treat identity information; and (4) the extent to which the selected agencies clearly communicate their practices associated with identity information. The 10 agencies were selected on the basis of the volume of public comments they received on rulemakings. For this testimony, GAO obtained updates on the status of recommendations made to the selected agencies. The Administrative Procedure Act (APA) governs the process by which many federal agencies develop and issue regulations, which includes the public comment process (see figure below). In June 2019, GAO found that Regulations.gov and agency-specific comment websites collect some identity information—such as name, email, or address—from commenters who choose to provide it during the public comment process. The APA does not require commenters to disclose identity information when submitting comments. In addition, agencies have no obligation under the APA to verify the identity of such parties during the rulemaking process, and all selected agencies accept anonymous comments in practice. GAO found in the June 2019 report that seven of 10 selected agencies have some internal guidance associated with the identity of commenters, but the substance of this guidance varies. This reflects the differences in the way that the selected agencies handle commenter identity information internally. GAO also found that the selected agencies' practices for posting public comments to comment websites vary considerably, particularly for duplicate comments (identical or near-identical comment text but varied identity information). For example, one agency posts a single example of duplicate comments and indicates the total number of comments received, but only the example is available to public users of Regulations.gov. In contrast, other agencies post all comments individually. As a result, identity information submitted with comments is inconsistently presented on public websites. The APA allows agencies discretion in how they post comments, but GAO found that some of the selected agencies do not clearly communicate their practices for how comments and identity information are posted. GAO's key practices for transparently reporting government data state that federal government websites should disclose data sources and limitations to help public users make informed decisions about how to use the data. If not, public users of the comment websites could reach inaccurate conclusions about who submitted a particular comment, or how many individuals commented on an issue. In June 2019, GAO made recommendations to eight of the selected agencies regarding implementing and communicating public comment posting policies. The agencies generally agreed with the recommendations and identified actions they planned to take in response. Since the June 2019 report, one agency has implemented GAO's recommendation and seven agencies have identified additional planned actions.", "document_type": "gao"}
{"report": "To be eligible for the Medicare hospice benefit, an individual must be eligible for Medicare Part A (which covers inpatient care) and be medically certified as having a terminal illness with a life expectancy of 6 months or less if the illness runs it normal course. For individuals to receive care from a Medicare-approved hospice program, they must elect the hospice benefit by signing a statement indicating they are waiving their rights to Medicare payment for services related to curative treatment of their terminal illness. When enrolling in Medicare hospice care, beneficiaries can receive several different types of services in various settings. Most hospice beneficiaries receive hospice care in their own home, but they can also receive care in other settings, such as a nursing home, assisted living facility, hospice facility, or hospital. The Medicare hospice benefit covers a variety of services and supplies for the palliation and management of the terminal illness, including physician and nursing services, medical equipment and supplies including drugs for pain and symptom management, hospice aide and homemaker services, physical and occupational therapy, and spiritual and grief and loss counseling. A hospice interdisciplinary team (in collaboration with the beneficiary’s primary care provider, if any) works with the beneficiary, family, and caregiver(s) to develop a plan of care that addresses the physical, psychosocial, spiritual, and emotional needs of the beneficiary, family members, and caregiver(s). The hospice provider must make all services under the Medicare hospice benefit available to beneficiaries as needed, 24 hours a day, 7 days a week. Although hospice care is designed for beneficiaries with a life expectancy of 6 months or less, beneficiaries can receive hospice care beyond 6 months if they continue to meet hospice eligibility requirements. In addition, beneficiaries can disenroll from the hospice benefit at any time and re-enroll in hospice care at a later time. CMS pays hospices based on the level of hospice care provided to beneficiaries on a given day. There are four levels of hospice care, which are paid at either a daily rate or an hourly rate depending on the location and intensity of services provided. (See table 1.) Each care level has a payment rate that is adjusted for geographic differences in wages, and CMS updates these payment rates annually. The most common level of care is called routine home care (accounting for 98 percent of all Medicare hospice care in 2017), and hospices receive the routine home care payment daily rate regardless of whether beneficiaries receive any services on a given day. In addition, CMS imposes two payment limitations (referred to as caps) on Medicare payment for hospice services—one that limits a hospice’s number of inpatient days and one that limits a hospice’s total Medicare payments in a given year. In response to requirements in the Patient Protection and Affordable Care Act, CMS established the Hospice Quality Reporting Program, which currently includes two sets of data to assess the quality of hospice providers’ care; CMS publishes these data on its Hospice Compare website. Medicare hospice providers are required to submit these data to CMS for all patients regardless of payer source (e.g., Medicare, Medicaid, or private insurance). The two data sets are the following: Provider-reported quality measure data. This set of data (which CMS refers to as the Hospice Item Set) is used to calculate a hospice provider’s performance on quality measures, which include seven measures that reflect the percentage of all hospice patients’ stays where the provider completed various key care processes, such as screening patients for pain and shortness of breath. CMS also recently implemented an eighth measure, called the composite measure, which calculates the percentage of patients’ hospice stays in which the hospice provider completed all seven care process quality measures. Caregivers’ experience survey data. This set of data (referred to as the Consumer Assessment of Healthcare Providers and Systems (CAHPS®) Hospice Survey) is a national survey that captures, from the caregiver’s (family member or friend) perspective, the patient’s experience with hospice care. The survey includes questions that are used to calculate eight quality measures based on survey responses. For example, one measure scores how well the hospice communicated with the patient’s family. CMS oversees the quality of Medicare hospice care primarily through inspections—referred to as surveys—which are conducted by state survey agencies contracted by CMS or CMS-approved national private accrediting organizations. These surveys are used to determine whether the hospice is in compliance with federal health and safety requirements detailed in Medicare’s hospice conditions of participation. A hospice must be in compliance with these conditions to participate in the Medicare program. Medicare’s hospice conditions of participation include requirements related to patient care and organizational environment (e.g., the hospice must organize, manage, and administer its resources to provide necessary care). Each condition of participation is composed of standards associated with the condition, and a standard may have associated sub-components. For example, the “patient’s rights” condition includes standards such as “notice of rights and responsibilities” and “rights of the patient.” The “rights of the patient” standard includes sub- components, such as the patient has the right to receive effective pain management and symptom control. There are three main types of survey inspections—an initial certification survey when a provider first seeks to participate in Medicare; a re- certification survey to ensure ongoing compliance; and surveys to investigate complaints or incidents related to federal requirements. If a hospice is found to be out of compliance with hospice health and safety requirements during a survey, CMS cites the provider for non- compliance—referred to as a deficiency. These deficiencies are categorized at one of two levels: Condition-level deficiencies. These deficiencies are the most serious. A condition-level deficiency is one in which the provider violates one or more standards and the deficiencies are of such character as to substantially limit the provider’s capacity to furnish adequate care or which adversely affect the health and safety of patients. When a hospice provider is cited for a condition-level deficiency, CMS places the provider on a 90-day termination track (or 23 days if the situation is determined to pose “immediate jeopardy” to beneficiaries) within which the provider must correct the issue(s) and the correction must be confirmed via a follow-up survey visit. If this does not happen within 90 days of the survey date, CMS terminates the hospice’s Medicare provider agreement; termination is an enforcement remedy CMS uses to ensure compliance. Standard-level deficiencies. These deficiencies are less serious. A hospice provider that has a standard-level deficiency can be certified or re-certified only if the provider has submitted an acceptable plan of correction for achieving compliance within a reasonable period of time. According to CMS officials, standard-level deficiencies must also have follow-up to ensure correction, although the type of follow-up depends on the nature of the deficiency. If a standard-level deficiency is very minor and does not place any beneficiaries at risk, the follow-up may be handled through email or telephone instead of a follow-up visit. According to CMS officials, if a provider fails to submit or implement an acceptable plan of correction within a reasonable period of time acceptable to CMS, the provider is placed on the 90-day termination track noted above. For-profit and non-profit hospices served roughly the same percentage of the approximately 1.5 million Medicare hospice beneficiaries in 2017, even though for-profit hospices make up about two-thirds of all hospice providers. According to our analysis of CMS data, for-profit providers treated about 50 percent of those beneficiaries and non-profit providers treated about 48 percent in 2017. This distribution has been about the same in each year from 2014 through 2017. For example, for these years, the percentages of beneficiaries treated by for-profit providers ranged from 48.7 percent to 50.2 percent (see additional details in app. I, table 7). When comparing the beneficiary populations treated by for-profit and non- profit hospice providers, we found that they generally had similar demographic characteristics. We identified two primary exceptions to this general finding: (1) non-profit hospices had slightly higher percentages of white beneficiaries, and (2) for-profit hospices had a greater proportion of patients enrolled in both Medicare and Medicaid. See table 2 (for more detailed data, see app. I, table 8). While beneficiary demographic characteristics were generally similar, we found differences in beneficiary diagnoses between for-profit and non- profit hospices. Specifically, for-profit hospices had, on average, a greater percentage of patients with non-cancer diagnoses—77 percent of for-profit hospice beneficiaries compared to 69 percent of non-profit hospice beneficiaries in 2017. Our analysis found that for-profit providers received a higher proportion of Medicare hospice payments than did non-profit providers. For 2017, about $10.4 billion (58 percent) of the $17.9 billion dollars in Medicare payments were made to for-profit providers and $7.2 billion (40 percent) of payments were to non-profit providers. Our analysis found this same pattern in each year from 2014 through 2017. One reason for-profit hospices received a higher portion of Medicare hospice payments for the period we reviewed is because (as previously noted) they had, on average, a greater percentage of beneficiaries with non-cancer diagnoses, and we found non-cancer beneficiaries, on average, had longer lengths of stay. (See table 3.) Since hospices are typically paid a set amount per day of a hospice stay, longer stays generally result in higher payments. Beneficiaries with non-cancer diagnoses can often have longer lengths of stay compared to other beneficiaries because the progression of these diseases (such as dementia) can be harder to predict; this may result in beneficiaries being enrolled in hospice earlier than appropriate (meaning that their projected life expectancy may actually be longer than 6 months). For instance, one study noted that dementia beneficiaries’ decline may include periods of stabilization where their health stays the same or even improves, which differs from a constant and predictable decline in most beneficiaries with terminal cancer. There are likely other factors beyond a greater percentage of beneficiaries with non-cancer diagnoses that contributed to for-profit providers’ higher portion of Medicare hospice payments. We found that for-profit providers had, on average, longer lengths of stay for both cancer and non-cancer beneficiaries compared to non-profit providers. (See table 3.) For example, non-cancer beneficiaries at for-profit providers had an average length of stay of 108 days, while non-cancer beneficiaries at non- profit providers had an average length of stay of 67 days. This suggests other factors besides beneficiary diagnosis contributed to longer average length of stay for for-profit providers. (For more detailed beneficiary diagnosis data from 2014 to 2017, see app. I, table 9.) For-profit and non-profit hospice providers had similar scores on CMS’s current quality measures (provider-reported measures and caregivers’ experience measures assessed through a survey of the beneficiaries’ caregiver). CMS uses these measures to assess the quality of care provided by hospices. In addition to CMS’s current quality measures, researchers we interviewed noted that there are other care indicators that can also be used to assess the quality of care provided by hospices. According to CMS documents, CMS is working to account for other care indicators by developing additional quality measures. We assessed hospice providers’ performance on these indicators and found that performance varied between for-profit and non-profit hospices. Our review of CMS data found that for 2017, both for-profit and non-profit hospices, on average, had similar scores on the seven quality measures that are provider-reported and that CMS currently uses to assess the quality of hospice care. (See table 4.) For six of the seven measures, for-profit and non-profit hospices had average scores of 94.7 percent or better. We also found that for-profits and non-profits had similar scores (83.6 percent and 87.0 percent, respectively) on a new composite measure that CMS implemented in 2017. This composite measure was designed to provide a more comprehensive evaluation of the hospice’s care by determining whether the hospice provider completed all of the applicable parts of hospice care that are measured by the seven quality measures. When looking at the subset of providers with the lowest scores on the composite quality measure, we found that for-profit hospices were more often in this subset, even when accounting for differences in the number of for-profit and non-profit providers: For the composite measure, there were 329 providers (261 for-profits and 68 non-profits) in the 10th percentile of scores or lower, meaning that the providers had a composite measure score of 64.3 percent or lower. Among these providers, we found that for-profits were more likely to be within this grouping, with about 12 percent of all for-profit providers having scores in the 10th percentile or lower compared to 6 percent of all non-profit providers. We also assessed the subset of these 329 providers that had composite measure scores below 50 percent, meaning that they only completed all of CMS’s seven quality measures for half or fewer of the beneficiaries they treated. We found that 130 providers (112 for-profits and 18 non-profits) had scores below 50 percent on this measure. These providers treated over 24,000 beneficiaries. In addition to the provider-reported quality measures, CMS also uses the caregivers’ experience survey to assess quality of care. We analyzed CMS data on caregivers’ experience surveys for 2016 to 2017 and found that caregivers’ reported experience with hospice care was generally similar for both for-profits and non-profits. The survey assesses care in a number of areas, such as communication, training, and help with pain and symptoms. See table 5 (for more detailed data, see app. I, table 10). Although for-profit and non-profit providers’ average scores on the caregivers’ experience survey were generally similar, we found that for- profit providers were more often among those providers with the lowest scores on certain caregivers’ experience measures than were non-profit providers. For example, on the rating measure that asks caregivers to give an overall rating of the hospice, 290 providers (248 for-profit providers and 42 non-profits) had scores at the 10th percentile or lower, meaning that their score was 72 percent or lower. For this measure, lower scores mean that fewer caregivers provided a rating of 9 or 10 on a 10- point scale, with 10 being the highest possible rating. We found that 15 percent of for-profit providers were among providers with scores in the 10th percentile or lower compared to 4 percent of non-profit providers. We used Medicare claims data to calculate certain measures researchers told us could be indicators of quality of care in hospice settings. (As noted previously, CMS is working to account for other care indicators by developing additional quality measures.) These indicators fall into two categories: (1) the number of beneficiaries discharged prior to death (often referred to as the live discharge rate) and (2) provider visits to provide medical and emotional support to the beneficiary and caregivers near the end of a beneficiary’s life. Researchers told us that such measures can fill gaps in assessing the quality of care provided by hospices, and show greater variability across hospices than CMS’s current quality measures; as previously noted, our data analysis found that providers’ quality measure scores were generally very high. According to researchers we interviewed and studies we reviewed, some discharges from hospice care prior to death should be expected because, for example, patients change their mind about receiving hospice care or their condition improves and they are no longer eligible for hospice care. However, a high live discharge rate could in some cases be an indicator of poor quality of care provided or of provider misuse of the benefit, in that they may be enrolling beneficiaries who are not eligible for hospice. See text box. Live Discharges In some cases, a beneficiary may be discharged alive from hospice care prior to their death. This could be for reasons unrelated to the quality of care provided. For example, beneficiaries may reconsider their decision to start palliative treatment, and therefore leave hospice care to re-start curative treatments. In other instances, a live discharge may indicate quality of care issues. For example, a beneficiary may be unhappy with the quality of care she is receiving from her hospice provider and therefore she leaves that hospice provider to seek treatment from a different hospice provider. Given the various reasons for live discharges, we expect that hospices will have some live discharges, but interpret a high rate of live discharges as potentially suggestive of quality of care issues. We found that for-profits had higher rates of live discharges than non- profits, with 22.1 percent of beneficiaries served by for-profits being discharged alive compared to 12.0 percent of beneficiaries served by non-profits in 2017. This disparity remained true after accounting for whether beneficiaries had a cancer or non-cancer diagnosis. (See table 6; for more detailed data from 2014 to 2017, see app. I, table 11.) We found that 472 hospice providers (462 for-profit and 10 non-profit providers) had live discharge rates of 50 percent or more in 2017, meaning that half or more of their beneficiaries were discharged from hospice care prior to death. These providers provided care to about 6 percent of all beneficiaries discharged alive in 2017. According to researchers we interviewed and one of the studies we reviewed, provider visits near the end of a hospice beneficiary’s life are critical to providing quality care, including for emotional support and for training the beneficiary’s family members or other caregivers on the signs and process of dying. Assessing the number of visits near the end of life may provide insight into the quality of a hospice provider’s care; fewer visits in that time period could indicate poor quality of hospice care. CMS is currently developing a quality measure that assesses the frequency of provider visits at the beneficiary’s end of life. When analyzing CMS claims data, we found that for-profit and non-profit hospices, on average, provided a similar number of provider visits (such as nurse, doctor, social worker, or hospice aide visits) within the last 7 days of a beneficiary’s life. Specifically, in 2017, for-profits and non-profits both averaged about 6 provider visits within the last 7 days of life. We also looked at the average percentage of hospice beneficiaries who received different types of provider visits either within the last 3 days of life or last 7 days of life (consistent with CMS’s new quality measure) and found performance varied among for-profit and non-profit providers: 77 percent of for-profit beneficiaries and 85 percent of non-profit beneficiaries received at least one visit from registered nurses, physicians, or nurse practitioners in the last 3 days of life. 68 percent of for-profit beneficiaries and 57 percent of non-profit beneficiaries received at least two visits from medical social workers, chaplains or spiritual counselors, licensed practical nurses, or hospice aides in the last 7 days of life. We also found more for-profits than non-profits among a subset of hospices that did not provide any visits during the last 3 or 7 days of life in 2017. Specifically, our analysis shows that 83 hospice providers (80 for- profits and 3 non-profits) did not provide any visits in 2017 from registered nurses, physicians, or nurse practitioners in the beneficiaries’ last 3 days of life. This means that all of the 800 hospice beneficiaries treated by these providers did not receive these types of provider visits at the end of life. In addition, we found that 58 providers (55 for-profits and 3 non- profits) did not provide any visits from medical social workers, chaplains or spiritual counselors, licensed practical nurses, or hospice aides in the last 7 days of life in 2017; all of the 613 beneficiaries treated by these providers did not receive these specific provider visits at the end of life. In our review of CMS’s oversight of hospice providers, we found CMS does not instruct surveyors to review, prior to surveying hospice providers, providers’ performance on CMS quality measures (those based on provider-reported quality data or caregivers’ experience surveys) or other indicators of quality that could identify potential areas of concern. CMS issues guidance that surveyors use when conducting surveys to assess a hospice provider’s compliance with federal health and safety requirements. According to this guidance, surveyors are to prepare for hospice surveys by reviewing documents of record including licensure records, previous survey findings and complaints, media reports, and other publicly available information about the provider. A representative for an association representing state surveyors confirmed that this is the type of information surveyors typically review prior to a hospice provider survey. However, according to CMS officials and the surveyor association, CMS does not instruct surveyors to review other information such as providers’ performance on CMS quality measures or other indicators of quality that surveyors could use to identify potential areas of concern that they could focus on more closely during a survey. For example, it might be helpful for surveyors to know if a hospice provided no visits during beneficiaries’ last days of life. According to CMS officials, CMS does not use such information to target hospices for additional survey review. Several studies we reviewed and researchers we interviewed noted CMS could strengthen its survey process by incorporating additional information into the survey process, such as information on how hospice providers perform on CMS quality measures or other potential indicators of quality. For example, one study suggested that hospices with poor reported beneficiary experiences based on caregivers’ experience survey data could be identified for more frequent surveys and that such information could be used to identify care processes for closer review during surveys. Another study we reviewed concluded that claims- based measures could help guide surveyors to more closely review key processes of care to ensure Medicare beneficiaries receive high quality hospice care. In addition, a researcher we interviewed suggested when claims data show no visits during the last 2 days of life, the survey team could interview the deceased patients’ families to see if there was any harm done by the lack of visits at the end of life. And, in July 2019, the Department of Health and Human Services’ Office of the Inspector General (HHS OIG) reiterated recommendations from prior HHS OIG work that CMS analyze claims and deficiency data to identify specific patterns identified by the HHS OIG that could indicate potential issues— such as hospices that infrequently provide physician services—and that CMS instruct surveyors to pay special attention to these areas during surveys. In contrast to hospice surveys, home health agency surveyors utilize information in addition to survey findings and complaints to identify potential areas of concern. According to CMS officials and the surveyor association we interviewed, home health surveyors review certain CMS quality measures to focus the survey on specific areas of concern or to identify beneficiaries who experienced potential care issues for a more detailed survey review. According to CMS officials, the agency is considering making changes to the survey process but has not yet made any decisions. CMS officials told us they last updated the survey process in 2010, and since then, they have implemented quality measures for hospice providers (provider- reported measures in 2014 and caregivers’ experience survey measures in 2015). They also said that CMS is “currently monitoring the implementation of these programs and considering the potential benefit of incorporating review of the data into the survey process.” According to federal standards of internal control, agencies must identify, analyze, and respond to risks related to achieving objectives. By not utilizing additional information in the survey process that would allow it to identify providers and areas where risk of noncompliance is greatest, CMS is missing an opportunity to strengthen its ability to identify and respond to such risks and ensure the quality of care that hospice beneficiaries receive. CMS is limited to one hospice enforcement remedy—termination of the Medicare provider agreement. By law, to qualify for payment under the Medicare program, hospice providers must meet the program’s conditions of participation. If the agency finds a provider is not complying with the program’s conditions of participation, CMS may terminate the provider’s participation in the program. In the Medicare program, termination of a provider is the most significant action CMS can take to address provider non-compliance. As a result, CMS generally only terminates a hospice provider on the basis of a deficiency when the provider fails to correct a condition-level deficiency (the most severe) within the required time frame. Our review of CMS hospice survey data found termination happens rarely. Specifically, 19 hospices were involuntarily terminated from 2014 through 2017. This is less than half of 1 percent of the total number of hospices operating during this time period. In contrast to hospice care, where CMS’s enforcement authority is limited to termination, Congress has given the agency authority to impose additional enforcement remedies for other provider types. Additional statutory and regulatory penalties for home health agencies and nursing homes include civil money penalties, denial of payment for all new Medicare and Medicaid admissions, and imposition of training requirements for situations where it is determined that education will likely lead to provider compliance (referred to as directed in-service training). Such remedies, if available, could enable the agency to more effectively address a broader range of hospice risks. For example, additional remedies could be used in situations that warrant a remedy other than termination or that could further incentivize providers to comply with health and safety requirements or improve their quality of care. According to federal standards of internal control, agencies must identify, analyze, and respond to risks related to achieving objectives. Because CMS lacks the authority to establish such additional remedies, the agency’s ability to respond to risks and ensure quality of care for beneficiaries is limited. The HHS OIG and one researcher we interviewed have recommended CMS seek statutory authority to establish additional enforcement remedies for hospices, explaining that less severe remedies could help address performance problems that may not merit termination and incentivize agencies to improve quality of care. CMS agreed with this recommendation in March 2016 and stated it would consider submitting a request that would seek legislative authority to establish additional enforcement remedies through the President’s annual budget proposal to Congress. In a July 2018 HHS OIG report, the HHS OIG again recommended CMS seek this authority. CMS neither agreed nor disagreed with this recommendation and stated again that it would consider this recommendation when developing the agency’s proposals for the President’s annual budget. However, a request for such legislative authority was not included in the President’s fiscal year 2017, 2018, or 2019 budget proposals. The HHS OIG reiterated this recommendation in two July 2019 reports. Since 2000, the number of Medicare hospice beneficiaries has almost tripled to nearly 1.5 million in fiscal year 2017. In addition, the number of hospice providers has doubled. Given this growth, it is imperative that CMS’s oversight of the quality of Medicare hospice care keeps pace with changes so that the agency can ensure the health and safety of these terminally ill beneficiaries. While recent steps have been taken to strengthen CMS’s hospice quality oversight, including the requirement that hospices be re-certified every 3 years and CMS’s ongoing development of new quality measures, we identified additional opportunities to strengthen CMS’s oversight. Specifically, our review found that CMS could strengthen oversight by using additional information—based on currently available data—to identify potential quality issues that could focus and enhance the survey process. We also found that CMS’s lack of authority to establish additional enforcement remedies before termination, which CMS rarely uses, limits its ability to ensure hospice providers’ compliance with health and safety requirements and quality of care for beneficiaries. Congress should consider giving CMS authority to establish additional enforcement remedies for hospices that do not meet federal health and safety requirements. (Matter for Consideration 1) The Administrator of CMS should incorporate the use of additional information, such as quality measures or other information that could identify potential quality of care issues, into its survey process for overseeing hospice providers. (Recommendation 1) We provided a draft of this report to HHS for review and comment. HHS provided written comments, which are reprinted in appendix II. HHS concurred with our recommendation. HHS stated that it recognizes that meaningful quality measures can also serve as key indicators of provider quality and it will look into ways to incorporate the use of these data into the hospice survey process. In its comment letter, HHS also noted the importance of monitoring patient safety and quality of care to HHS’s hospice oversight efforts and the agency provided an overview of the key efforts it has in place to perform such monitoring. For example, in addition to survey and quality measure requirements, HHS requires hospices to implement a data-driven quality assessment and performance improvement program, intended to have hospices take a proactive approach in improving their performance using objective data. HHS also provided technical comments, which we incorporated into the report as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the CMS administrator, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Hospice team treated patient with respect Amount of emotional and religious support provided by the hospice team The patient got the help they needed for pain and symptoms Caregiver received the training they needed Caregiver rating of hospice agency on 10-point scale with 10 being the best hospice care possible Caregiver would recommend the hospice Non-profit hospice providers’ average scores Hospice team treated patient with respect Amount of emotional and religious support provided by the hospice team The patient got the help they needed for pain and symptoms Caregiver received the training they needed Caregiver rating of hospice agency on 10-point scale with 10 being the best hospice care possible Caregiver would recommend the hospice Government-owned hospice providers’ average scores Hospice team treated patient with respect Amount of emotional and religious support provided by the hospice team The patient got the help they needed for pain and symptoms Caregiver received the training they needed Caregiver rating of hospice agency on 10-point scale with 10 being the best hospice care possible Caregiver would recommend the hospice 2.5 survey within three categories (top scores, middle scores, and bottom scores). These data were not available for all hospice providers; our analysis of CMS caregivers’ experience survey quality measure data was for the 2,832 hospice providers that had data for the caregivers’ survey. In general, the top-box scores represent the percentage of caregivers that selected the response of “always” for the particular measure. For the rating measure, the top-box score represents caregivers that rated the hospice provider as a 9 or 10 on a 10-point scale with 10 being the highest rating. For the recommendation measure, the top-box score represents caregivers that responded that they “would definitely recommend the hospice provider.” In general, the middle-box scores represent the percentage of caregivers that selected the response of “usually” for the particular measure. For the rating measure, the middle-box score represents caregivers that rated the hospice provider as a 7 or 8 on a 10-point scale with 10 being the highest rating. For the recommendation measure, the middle-box score represents caregivers that responded that they “would probably recommend the hospice provider.” In addition to the contact named above, Gregory Giusto, Assistant Director; Christie Enders, Analyst-in-Charge; Todd Anderson, Leia Dickerson, Rob Dougherty, Krister Friday, Barbara Hansen, Jennifer Whitworth, and Chris Wickham made key contributions to this report.", "summary": "Since 2000, there has been substantial growth in Medicare payments for hospice services and the number of Medicare beneficiaries using hospice. This growth has been accompanied by an increase in the number of providers (primarily an increase in for-profit providers), reaching approximately 4,500 providers by 2017. GAO was asked to review aspects of Medicare's hospice program. This report, among other things, (1) compares quality scores and other potential indicators of quality for for-profit and non-profit hospices; and (2) examines opportunities for strengthening CMS's oversight of hospice providers. GAO analyzed CMS data on hospice care for 2014 through 2017—the latest years for which full-year data were available at the time of GAO's analysis—and reviewed research on hospice care. GAO interviewed CMS officials, researchers, provider associations, a survey agency association, and a non-generalizable sample of hospice providers selected in part through referrals from other stakeholders. GAO also reviewed relevant statutes, regulations, documents, and enforcement data. Medicare's hospice benefit provides palliative care to beneficiaries with terminal illnesses and a life expectancy of 6 months or less. GAO's review of 2017 data from the Centers for Medicare & Medicaid Services (CMS) found that for-profit and non-profit hospices had, on average, similar scores on CMS's current quality measures that indicate hospice performance in areas such as pain assessment and discussion of beneficiary treatment preferences. However, for-profits were more often among the subset of providers with the lowest scores on certain quality measures GAO reviewed. In addition to analyzing providers' scores on CMS quality measures, GAO analyzed provider performance on other indicators, identified by researchers, that could signal quality issues and found performance varied among for-profit and non-profit hospices. One of the other quality indicators GAO analyzed was the rate of beneficiaries discharged from hospice prior to death, which in some cases could indicate dissatisfaction with care leading to the beneficiary's decision to leave the hospice provider. In addition, GAO examined the number of provider visits to give medical and emotional support within the last few days of a beneficiary's life. With regard to these indicators, for 2017, GAO found the following, among other things: 472 hospice providers (462 for-profits and 10 non-profits) had a high rate of discharging beneficiaries prior to death (50 percent or more were discharged). According to research, a high discharge rate could, in some cases, be an indicator of poor quality of care or of provider misuse of the benefit, in that the hospice may be enrolling beneficiares who are not eligible for hospice care. 83 providers (80 for-profits and 3 non-profits) did not have hospice staff (such as nurses, physicians, or nurse practitioners) visit beneficiaries within the last 3 days of their life—a critical time in providing quality care, according to researchers GAO interviewed. CMS's oversight of the quality of care provided by hospice providers consists primarily of inspections—called surveys—of hospice providers. GAO found that, while CMS instructs surveyors to review previous survey findings and complaints, CMS does not instruct surveyors to use information on providers' performance on quality measures or other potential indicators of quality as part of the survey process. For example, CMS does not instruct surveyors to consider whether a hospice provided staff visits during beneficiaries' last week of life. According to research, this information could be used to enhance the survey process. GAO also found that CMS is limited to one enforcement option—termination of the Medicare provider agreement—which CMS uses rarely and generally only when providers fail to correct within the required time frame the most serious violations of federal health and safety requirements. According to two researchers, additional remedies, such as civil monetary penalties, could enhance CMS's oversight by addressing performance problems that do not merit termination and incentivize agencies to improve quality of care. CMS uses a range of remedies for other provider types, such as home health agencies and nursing homes, but lacks authority to impose such additional sanctions on hospices. CMS should incorporate the use of additional information that could be used to identify quality of care issues into its survey process for hospice oversight. Congress should consider giving CMS authority to establish additional enforcement remedies for hospices that do not meet federal health and safety requirements. The Department of Health and Human Services concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Federal agencies are dependent on computerized (cyber) information systems and electronic data to carry out operations and to process, maintain, and report essential information. Cybersecurity—the security of these systems and data—is vital to public confidence. Ensuring the cybersecurity of the nation, including protecting privacy and sensitive data, and IRS’s efforts to address tax refund fraud due to identity theft are issues included in our High Risk List. IRS relies on information system security controls to protect the confidentiality, integrity, and availability of the sensitive financial and taxpayer information that resides on its systems. Federal law and guidance specify requirements for protecting federal information and systems. The Federal Information Security Modernization Act of 2014 (FISMA) is intended to provide a comprehensive framework for ensuring the effectiveness of information system security controls over information resources that support federal operations and assets. To accomplish this, FISMA requires each agency to develop, document, and implement an agency-wide information security program to provide security for the information and systems that support the operations and assets of the agency, using a risk-based approach. However, taxpayer information held by third-party providers is generally outside of these requirements, according to IRS officials. Fraudsters may target third parties, such as paid preparers and tax software providers, to steal taxpayer data—defined for our purposes as personally identifiable information and other personal, financial, or federal tax data—which can then be used to commit identity theft refund fraud or other types of financial crimes. Viewed broadly, identity theft tax refund fraud consists of two crimes: (1) stealing or compromising taxpayer data and (2) using stolen (or otherwise compromised) taxpayer data to file a fraudulent tax return and collect a fraudulent refund. Figure 1 presents an example of how this crime can work. In this example, a taxpayer may alert IRS of identity theft refund fraud. Alternatively, IRS can detect identity theft refund fraud through its automated filters that search for specific characteristics, as well as through other reviews of taxpayer returns. Third-party providers retain a large amount of electronic tax information, which makes them targets of various types of data theft incidents. Five common types of security incidents are shown in table 1. The number of electronically filed (e-filed) tax returns, and therefore the amount of electronically available data that are vulnerable to security incidents, has been increasing over the past several decades from 4.2 million in 1990 to 135.5 million in 2018. In 2018, approximately 90 percent of the 150.5 million filed individual income tax returns were filed with IRS electronically (see figure 2). Paid preparers prepared more than half of the e-filed returns in 2018. Multiple IRS offices have discrete responsibilities in overseeing how third- party providers secure taxpayer information, as depicted in figure 3. Oversight responsibilities are as follows: Stakeholder Liaison works with the paid preparer community to educate preparers about information security risks and guide them through the process of resolving security issues when security incidents are reported. This office is also the intake point for security incident information for paid preparers. Cybersecurity works to protect taxpayer information and IRS’s electronic systems, services, and data from internal and external cybersecurity threats—such as damage to computers, electronic communications systems, or information contained in those systems—by implementing security practices. Criminal Investigation (CI) reviews security incident reports to determine whether criminal action has occurred and investigates any potential criminal violations of applicable laws. It also investigates large-scale tax schemes and fraud. The Return Preparer Office is responsible for matters relating to the registration and the program compliance of tax return preparers who prepare returns for compensation. The office also engages in outreach and education programs and administers IRS’s Annual Filing Season program, a voluntary program to encourage noncredentialed preparers to participate in continuing education courses. Small Business/Self-Employed (SB/SE) Examination revenue agents visit e-file providers to ensure they are complying with the Authorized e-file Provider program’s requirements. Electronic Products and Services Support (EPSS) administers the Authorized e-file Provider program. It is also responsible for updating IRS Publications 1345 and 3112, which outline the requirements of the program. EPSS officials reported that they must coordinate with other business units to update individual references in the publications. EPSS is the intake point for security incident information for online providers and e-Services users, according to officials. Return Integrity and Compliance Services (RICS) monitors taxpayer accounts for potential fraud to protect revenue. RICS also manages the security incident data reports that are submitted by tax software providers. RICS is the intake point for security incident information for Security Summit and Identity Theft Tax Refund Fraud - Information Sharing and Analysis Center (ISAC) members, as described below, and actively monitors ISAC alerts from the online platform for new information that may not have been reported elsewhere. While the Office of Professional Responsibility (OPR) does not have oversight responsibilities over the security of tax information at third parties, it administers the regulations that govern the practice of tax professionals who interact with IRS on behalf of taxpayers, including attorneys, certified public accountants, and enrolled agents, among others. Treasury Department Circular 230, which incorporates the regulations, directed the Commissioner to establish OPR and any other offices within IRS to administer and enforce the regulations. However, Circular 230 does not include a requirement for practitioners concerning the security of taxpayer information. In recent years, IRS has taken a number of steps to help battle identity theft refund fraud. In 2015, IRS formed the Security Summit, a public-private partnership to protect the nation’s taxpayers and the tax system from identity theft refund fraud. The summit has representatives from IRS, state tax administrators, and industry partners including the software industry, tax professional associations, and payroll and tax financial product processors. IRS launched ISAC in the 2017 filing season. It aims to allow IRS, states, and tax preparation industry partners to quickly share information on identity theft refund fraud. It includes two components: an online platform controlled by IRS to communicate data on suspected fraud, and a collaborative organization governance structure comprising IRS, states, and industry. IRS uses a Rapid Response Team in partnership with states and industry members to coordinate responses to identity theft refund fraud incidents. The team aims to respond to significant threats within 24 to 72 hours of their discovery. The Rapid Response Team was deployed for six incidents in 2016, one in 2017, and was not deployed for any incidents in 2018. IRS seeks to help safeguard taxpayers’ information and the electronic filing system by prescribing requirements for various types of third-party providers through its Authorized e-file Provider program. These requirements are outlined in Revenue Procedure 2007-40 and Publication 1345, Handbook for Authorized IRS e-file Providers of Individual Income Tax Returns. IRS Revenue Procedure 2007-40 states that the security of taxpayer accounts and personal information is a top priority for the agency. Further, the Revenue Procedure states that it is the responsibility of each IRS Authorized e-file Provider to have security systems in place to prevent unauthorized access to taxpayer information by third parties. Some of the requirements included in this program are applicable to all types of Authorized e-file Providers, while others are applicable to one group or another. Businesses—including sole proprietors—that wish to e-file tax returns on behalf of clients must apply to IRS’s Authorized e-file Provider program and choose a provider type, as described in table 2. According to IRS, in 2018 there were more than 325,000 Authorized e-file Providers, some of which were paid preparers. More than 790,000 paid preparers had registered with IRS as of 2018; accordingly, not all paid preparers are Authorized e-file Providers and are therefore not covered by the requirements of the Authorized e-file Provider program. However, a business that has been approved as an electronic return originator (ERO) may employ multiple paid preparers who are not Authorized e-file Providers. Those paid preparers would be allowed to e-file returns under the supervision of their ERO employer. According to IRS Publication 3112, the activities and responsibilities for return preparation and e-filing are distinct and different from each other. Tax software providers, which IRS refers to as software developers in its Authorized e-file Provider program, develop tax return software that individuals and businesses can use to file their own returns, or that paid preparers can use when filing returns on behalf of clients. Online providers are the subset of tax software providers that allow individual taxpayers to self-prepare returns and file them with IRS. Providers that develop software for paid preparers’ use do not fall under the definition of an online provider. IRS has not fully incorporated the Federal Trade Commission (FTC) Safeguards Rule into its requirements for all provider types under the Authorized e-file Provider program. The Gramm-Leach-Bliley Act provided FTC with the authority to require that financial institutions subject to its jurisdiction ensure the security and confidentiality of customer records and nonpublic personal information; protect against any anticipated threats or hazards to the security of such records; and protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer. FTC, in turn, issued a regulation known as the “FTC Safeguards Rule.” The FTC Safeguards Rule applies to financial institutions including third- party providers that help taxpayers file tax returns, such as paid preparers and providers of software that allows individuals to prepare their own tax returns. The FTC Safeguards Rule requires those institutions to develop, implement, and maintain a comprehensive written information security program. The program must contain administrative, technical, and physical safeguards that are appropriate to the provider’s size and complexity, the nature and scope of the provider’s activities, and the sensitivity of any customer information at issue. IRS addresses the FTC Safeguards Rule through its Revenue Procedure 2007-40. This Revenue Procedure provides the procedures for the Authorized e-file Provider program, and clearly states that violations of the provisions of the Gramm-Leach-Bliley Act and the implementing rules and regulations promulgated by FTC are considered violations of the Revenue Procedure. It also states that violations may subject an Authorized e-file Provider to penalties or sanctions, including suspension or expulsion from the Authorized e-file Provider program. However, the IRS publications that provide further information on the Authorized e-file Provider program only briefly discuss the FTC Safeguards Rule, and do not provide details on the required elements of an information security program. For example: Publication 3112, IRS e-file Application and Participation, states that providers should become familiar with the Privacy and Security Rules that implement the Gramm-Leach-Bliley Act, and with other important information regarding the safeguarding of personal information available on the FTC website. The publication does not detail each of the required elements of an information security program. Publication 1345, Handbook for Authorized IRS e-file Providers of Individual Income Tax Returns, which was updated in February 2019, notes FTC’s role in protecting taxpayer data and generally describes the requirement of implementing and maintaining a comprehensive information security program, including the requirement that administrative, technical, and physical safeguards be appropriate to the business’s size, nature and scope of its activities, and the sensitivity of the customer information. The publication does not detail each of the required elements of an information security program. We identified other IRS publications that are not exclusively related to the Authorized e-file Provider program that discuss the requirements of the FTC Safeguards Rule, as well as other information security measures that serve as leading practices for the broader population of tax professionals. For example, in 2018, IRS updated Publication 4557, Safeguarding Taxpayer Data: A Guide for Your Business. The publication aims to help tax professionals understand basic security steps, recognize signs of data theft, respond to data losses, and understand and comply with the FTC Safeguards Rule. This publication refers to the FTC rule and tax professionals’ responsibilities to create and enact security plans, and provides a checklist from FTC to help third-party providers implement the information security plans. IRS Publication 4600, Tips for Safeguarding Taxpayer Data, also discusses elements of the FTC Safeguards Rule. However, while IRS references these documents in Publications 3112 and 1345, Authorized e-file Providers are not obligated to consult or follow these documents. In addition, most paid preparers do not know about the FTC Safeguards Rule and likely do not have information security plans for their places of business, according to officials from several tax preparation industry groups. Industry group officials also told us that there are misconceptions about who should be responsible for implementing information security. For example, one industry group official said that paid preparers and EROs often think that their tax software providers will provide security services or that their computer firewall or antivirus software will be enough protection. Modifying the Authorized e-file Provider program requirements to explicitly incorporate the FTC Safeguards Rule’s elements of an information security program would be consistent with Internal Control Standards. The standards call for management to consider the external requirements—such as laws, regulations, and standards—and incorporate these requirements into an agency’s objectives when setting the standards for the compliance of other entities. IRS officials told us that they do not believe that federal law provides IRS with any authority to enforce the FTC Safeguards Rule. However, IRS has already stated in Revenue Procedure 2007-40 that compliance with the FTC Safeguards Rule is required for participation in the Authorized e- file Provider program. Modifying its requirements to explicitly state the elements of an information security program as required under the FTC Safeguards Rule would help IRS ensure that all types of Authorized e-file Providers are aware of, and comply with, the FTC Safeguards Rule, which could help them better protect taxpayers’ information. While modifying the Authorized e-file Provider program may not reach paid preparers who are not part of the Authorized e-file Provider program, it will strengthen the controls for EROs, tax software providers, and online providers. IRS’s Authorized e-file Provider program does not outline a set of minimum information security standards for systems used by paid preparers or Authorized e-file Providers. When we reviewed IRS’s publications for Authorized e-file Providers, we found that specific information security standards were outlined for online providers, but there were no specific standards for other types of Authorized e-file Providers or paid preparers. Officials from tax preparation groups we interviewed and IRS raised issues that relate to paid preparers’ system risks. First, the tax preparation industry groups that we spoke with stated that most paid preparers, especially small firms or individual preparers, did not know the steps that they should take to protect taxpayer information on their systems. IRS officials reported that paid preparers often do not know that they experienced a security incident until IRS informs them something is wrong with their filing patterns. Second, according to officials from several tax preparation industry groups, paid preparers often have several misconceptions as to what is required of them in protecting taxpayer data, causing confusion. Industry group officials we interviewed told us that IRS’s current publications are not clear about requirements versus leading practices. For example, IRS publication 4557, Safeguarding Taxpayer Data, provides paid preparers with some leading practices to protect taxpayer data, but the leading practices are not legal requirements, with the exception of the FTC Safeguards Rule. An official from the Return Preparer Office explained that imposing any standards for paid preparers, whether related to competency or information security, without explicit authority would leave IRS vulnerable to legal challenges because of a recent court case that found that IRS does not have the authority to regulate the competency of paid preparers. According to IRS’s Office of Chief Counsel, this ruling, combined with the lack of explicit statutory authority, prevents IRS from establishing system standards for paid preparers, because while 31 U.S.C. § 330 authorizes the Secretary of the Treasury to regulate the practice of practitioners before the Department of the Treasury, mere return preparation, including through systems practitioners use to prepare and transmit tax returns, is not considered practice before IRS. In contrast to paper filing of tax returns, certain security measures need to be taken for e-filing returns to protect the integrity of the e-file system; thus, IRS has implicit authority to regulate e-file providers insofar as their activities relate to electronically filing returns with IRS, according to IRS Office of Chief Counsel officials. These officials also noted that no single provision of the Internal Revenue Code provides IRS explicit authority to regulate the standards for e-file providers. Instead, Internal Revenue Code § 7803 gives the Commissioner of Internal Revenue broad authority to administer and supervise the internal revenue laws, and § 6011 authorizes IRS to require returns and regulate the form of such returns. When taken as a whole, these provisions of the Internal Revenue Code show congressional intent to provide the Secretary of the Treasury with broad authority to administer the method for, and requirements surrounding, the e-filing of federal tax returns, according to IRS officials. Nevertheless, having explicit authority to establish security standards for the systems of Authorized e-file Providers may help IRS better ensure the protection of taxpayers’ information and mitigate the risk of legal challenges to IRS’s ability to do so. IRS Office of Chief Counsel officials also noted that for several years the Department of the Treasury has sought additional authority for IRS to regulate all tax return preparers. For example, this request was included in the most recent (fiscal year 2020) Congressional Budget Justification. The justification for this additional authority specifically refers to the competency of tax return preparers, but does not mention security standards for the systems that those preparers use. Similarly, we have previously suggested that Congress consider granting IRS the authority to regulate the competency of paid preparers (that suggestion did not cover regulating the security of paid preparers’ systems). As of April 2019, Congress had not provided such authority. Without Congress providing IRS with explicit authority to regulate the security requirements for the systems of paid preparers or Authorized e- file Providers, Congress and IRS have limited assurance that the processes used by paid preparers or Authorized e-file Providers are adequately protecting taxpayers’ information against electronic data breaches and potential identity theft tax refund fraud. Having such explicit authority would enable IRS to establish minimum security requirements and help ensure improved taxpayer information security by paid preparers and Authorized e-file Providers. IRS does not have a robust set of information security requirements for all tax software providers in the Authorized e-file Provider program. Instead, IRS has limited security requirements for the subset of tax software providers designated as online providers outlined in IRS Publication 1345, as we discuss in the next section. In Publication 4164, Modernized e-File Guide for Software Developers and Transmitters, IRS also provides some information on “security directive rules of behavior for accessing IRS business systems” while transmitting returns to IRS. However, this document does not provide a specific list of controls to for these providers to follow. IRS has been working with the Security Summit to implement a subset of the NIST Special Publication 800-53 security and privacy controls for the industry members of the Security Summit, which represents a subset of all tax software providers. The Security Summit partners agreed voluntarily to implement about 140 tax-related controls over a 3-year period and provide self-assessments related to the implementation of those controls. IRS reported in October 2018 that 15 of the 21 Security Summit industry partners had voluntarily certified that they implemented the NIST controls in years 1 and 2 of the rollout schedule. IRS officials reported that they later determined three of the other 21 industry partners are financial institutions that do not handle taxpayer data; thus the standards are not applicable to them. IRS officials told us that they are actively following up with the remaining three providers to determine why they have not completed and submitted the self-assessment, and to what degree they have implemented the subset of NIST security controls. While this is an important and significant first step, the 15 industry partners in the Security Summit that are voluntarily adhering to the NIST security controls represent about a third of all of the tax software providers that IRS has approved to be a part of the Authorized e-file Provider program. According to IRS, these 15 Security Summit partners transmitted about 132.6 million (98.8 percent) of all of the electronically filed returns in 2018; the other two-thirds of tax software providers in the Authorized e-file Provider program transmitted about 1.6 million (1.2 percent) electronically filed returns. A Security Summit membership criterion states that only those providers that filed more than 50,000 returns with IRS during a filing season can be members, but not all tax software providers meet this threshold. Internal Control Standards state that managers consider external requirements when defining objectives, such as those set by standard- setting bodies designed to comply with laws, regulations or standards. Management should incorporate those requirements into its objectives and sets those requirements through the established standards of conduct, oversight structure, organizational structure and expectations of competence. By statue, NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems. According to Special Publication 800-53, the controls outlined provide a holistic approach to information security and risk management by providing organizations with the breadth and depth of security controls necessary to fundamentally strengthen their information systems and the environments in which those systems operate—contributing to systems that are more resilient in the face of cyber attacks and other threats. While the guidelines in this publication are applicable to all federal information systems, other organizations are encouraged to consider using the guidelines, as appropriate. The applicability of the selected NIST controls is evidenced by the adoption of those controls by the Security Summit partners. While most returns are filed through tax software providers that are voluntarily adhering to the security controls, these controls are not required and do not apply to all tax software providers. Additionally, IRS officials that are a part of the Security Summit stated that they cannot enforce the subset of NIST controls with the remaining Security Summit partners because the controls were set up in a voluntary program. IRS officials from multiple offices did not have a clear reason as to why this subset of NIST controls has not been incorporated into the requirements for the entire population of tax software providers in the Authorized e-file Provider program, even though some security standards had been incorporated into the Authorized e-file Provider program for a limited set of providers (online providers) as discussed in the next section. In addition, as previously discussed, IRS can prescribe the requirements to which Authorized e-file Providers must adhere when e-filing returns for taxpayers. Incorporating fundamental security controls into its Authorized e-file Provider program would give IRS greater assurance that tax software providers have identified and addressed information security risks consistent with professional standards. This missed opportunity to update the requirements for tax software providers by adopting the subset of NIST controls is due, in part, to IRS’s lack of a centralized leadership over the security of taxpayer information collected by paid preparers and tax software providers. As previously discussed, multiple IRS offices have discrete responsibilities for overseeing the security of taxpayer information while at third parties; however, no one office is responsible for, or has the authority to provide, the strategic vision, oversight, or coordination over all aspects. Further, while IRS offices coordinate to some extent, there is not a formalized governance structure, such as a steering committee, that would help provide this level of leadership, coordination, and collaboration to the agency. According to Internal Control Standards, an agency’s organizational structure provides management’s framework for planning, directing, and controlling operations to achieve agency objectives. Management develops an organizational structure with an understanding of overall responsibilities, and assigns these responsibilities to discrete units to enable the organization to operate in an efficient and effective manner and reliably report quality information. A sound internal control environment requires that the agency’s organizational structure clearly defines key areas of authority and responsibility, and establishes appropriate lines of reporting. Without setting and requiring the same security standards for all tax software providers, IRS does not have assurance that these providers have an equivalent level of standards in place to adequately protect taxpayer information. Further, in continuing to operate a voluntary security controls program, IRS does not have assurance that those software providers who are currently adhering to the standards will continue to do so in the future. Finally, without centralized leadership in this area, it is unclear how IRS will adapt to changing security threats in the future and ensuring those threats are mitigated. Online providers—tax software providers that allow individuals to prepare their own tax returns—have additional requirements for security and privacy that they must follow, as outlined in Publication 1345. IRS established six security, privacy, and business standards for online providers, including requirements for developing information privacy and security policies and reporting security incidents. Compliance with these six standards for online providers became mandatory on January 1, 2010; however, IRS has not substantially updated them since then (see appendix II for the text of the six security, privacy, and business standards). These additional requirements do not apply to paid preparers, EROs, or providers of tax software used by paid preparers. Without updating standards regularly, the standards can become outdated and lose their ability to protect information from known vulnerabilities as technology changes. For example, IRS’s current guidance refers to an outdated encryption standard. Specifically, IRS requires online providers to use, at minimum, Secure Sockets Layer 3.0 and Transport Layer Security (TLS) 1.0. However, NIST Special Publication 800-52 and industry leading practices recommend the use of TLS 1.1 as the minimum level of encryption due to known weaknesses of using TLS 1.0 to encrypt data in transmission. While the standard allows for use of later encryption versions, it refers to a minimum encryption standard that has known weaknesses. As a result, IRS and taxpayers have limited assurance that their taxpayer data are protected according to NIST guidelines and industry leading practices. Recommended controls outlined in NIST Special Publication 800-53 and our Fraud Risk Framework call for continuous monitoring and regular fraud risk assessments, respectively, to help determine the effectiveness of controls in a program. Internal Controls Standards also calls for management to periodically review the policies, procedures, and related activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. When we asked why the six standards in Publication 1345 had not been updated since 2010, a senior Wage and Investment Division official stated that the publication is subject to an annual review by multiple IRS offices, but no office had identified the need to update the standards as part of these reviews. An Electronic Products and Support Services (EPSS) official told us that the standards were initially developed based on the latest technology at the time. However, according to this official, technology can become obsolete quickly, and adapting standards to keep pace with technological changes can require a lot of resources. Not updating the requirements for online providers again points to a missed opportunity due to IRS’s lack of a centralized leadership over the security of taxpayer information at paid preparers and tax software providers. In this case, centralized leadership may have identified the need to update the standards. Without periodically reviewing and updating the standards themselves, IRS has limited assurance that the standards have kept pace with technological changes, and therefore, that the online providers are protecting the taxpayer’s data. IRS uses a variety of outreach tools to communicate with third-party providers, such as paid preparers and tax software providers, about information security risks. IRS tries to educate these tax professionals about ways to improve information security practices and the benefits of doing so. For example, IRS informs paid preparers, tax software providers, and others about the importance of reporting security incidents in a timely manner to help ensure that action can be taken quickly to help protect their clients and avoid fraudulent returns being filed. Similarly, Stakeholder Liaison advises paid preparers about the steps to take to ensure that their systems are no longer vulnerable to compromise, according to Stakeholder Liaison officials. Below are examples of IRS’s recent communication efforts. IRS and the Security Summit collaborated on tax professional outreach campaigns. For example, in 2018, they launched the Tax Security 101 campaign, which provided tax professionals with basic information on how to protect taxpayer data. Each year, IRS sponsors nationwide tax forums largely targeted toward paid preparers such as enrolled agents, certified public accountants, and noncredentialed preparers. The 2018 forum included five seminars focused on securing taxpayer information, such as “Data Privacy and Cybersecurity for Tax Professionals” and “Data Compromises—It’s Not a Matter of ‘If’ but ‘When.’” IRS hosts webinars throughout the year to inform tax professionals and taxpayers about various topics, including information security. For instance, in October 2018, IRS hosted a webinar called “Protect Your Clients, Protect Yourself: Tax Security 101.” The webinar covered common security threats, signs of data theft, ways to report taxpayer data theft to IRS, and tax preparers’ obligations to create a written information security plan consistent with the FTC Safeguards Rule. Stakeholder Liaison has participated in over 1,000 virtual and in- person events since June 2015 where data security was a primary topic or featured message, according to Stakeholder Liaison officials. Further, the officials reported that there were over 165,000 attendees at these events. IRS uses social media outlets such as YouTube and Twitter to provide information to tax professionals. For example, in July and October 2017, IRS released two YouTube videos about information security for tax professionals titled “Why Tax Professionals Need a Security Plan” and “What to Do After a Tax Professional Data Compromise.” Similarly, IRS’s tax professional Twitter account, @IRStaxpros, releases information about information security (see figure 4). Though IRS has various ways to disseminate information to tax professionals, it faces a challenge reaching paid preparers who are not affiliated with larger industry groups or who do not visit the IRS.gov website, according to both IRS officials and industry group officials. According to Return Preparer Office officials, many paid preparers are not linked to standard tax communication channels, such as direct communications from IRS through news releases or email alerts. IRS and industry group officials told us one barrier to reaching these paid preparers is preparers’ belief that their businesses are too small to be a target for fraudsters. IRS officials recognize the challenges and said that they continue to address them by speaking with tax professionals about how to increase paid preparers’ awareness of information security risks, such as by making materials easy for preparers to read. IRS’s monitoring program is primarily focused on EROs’ adherence with multiple aspects of the Authorized e-file Provider program, such as requirements for Earned Income Tax Credit due diligence, advertising, and electronic signatures. The monitoring program also calls for monitoring of physical information security, which is not required as part of the Authorized e-file Provider program. The Internal Revenue Manual (IRM) details mechanisms and practices for monitoring Authorized e-file Providers, including EROs and online providers. As part of this monitoring, Small Business/Self-Employed (SB/SE) conducts field visits, the number of which more than doubled in the past few years, from almost 300 in 2015 to about 650 in 2018. SB/SE revenue agents visit providers to monitor their operations and to advise providers of any program violations. IRS uses monitoring visits to investigate allegations, complaints, and warnings against Authorized e-file Providers, as well as to determine general compliance with program requirements. While any provider type could undergo a monitoring visit, IRS officials informed us that they primarily conduct field monitoring visits for EROs, which are selected using risk-based criteria. According to these officials, SB/SE coordinates with other IRS offices to provide field monitoring on an as-needed referral basis for other types of Authorized e-file Providers. IRS officials reported that they were unable to confirm the specific number of recent referral monitoring visits but said there were likely fewer than five referrals in the past couple of years. However, the IRM section detailing the monitoring visits provides little direction for monitoring of information security standards from IRS Publication 1345. The IRM lists monitoring techniques for security, but they focus largely on physical security rather than cybersecurity controls for the electronic aspects of information security. For example, the IRM suggests that agents ask about access to physical files or office keys rather than about how providers send emails containing taxpayer information. According to our Fraud Risk Framework, agencies should use a risk- based approach to evaluate outcomes and adapt activities to improve fraud risk management. As fraudsters increasingly target paid preparers and tax software providers through cybersecurity attacks, risk-based monitoring and evaluation of cybersecurity controls could help IRS identify fraud risks and potential control deficiencies among third-party providers. IRS officials said that the SB/SE revenue agents who conduct monitoring visits do not have the technical expertise to effectively monitor information security or cybersecurity controls. For example, an IRS official stated that the IRM monitoring techniques ask about physical security instead of cybersecurity because revenue agents can verify whether filing cabinets are locked or whether computer passwords are visible, but they cannot verify cybersecurity controls, such as whether a provider’s information security policies are consistent with government and industry guidelines. Further, an SB/SE official said that, while SB/SE is responsible for monitoring Authorized e-file Providers, cybersecurity is not part of SB/SE’s role. However, we believe there are opportunities for revenue agents to ask basic cybersecurity questions and, at a minimum, use monitoring visits to help promote awareness of leading practices designed to help protect taxpayer information. For example, revenue agents could ask providers if they have secured their office’s wireless capabilities, use encryption for sensitive business information, have a designated official in case of a security incident, or know their assigned stakeholder liaison, among other things. Additionally, opportunities exist to leverage resources across IRS to monitor cybersecurity controls. For instance, Cybersecurity has technical expertise that SB/SE could leverage to help monitor these requirements, according to a Cybersecurity official. Without effective monitoring of information security standards or cybersecurity controls, IRS has limited assurance that EROs’ systems are adequately protecting taxpayers’ information. If these third parties do not adequately protect that information, taxpayers will face increased risk of both tax-related and non-tax-related identity theft. Improved monitoring could help IRS ensure that it is more effectively detecting and responding to changing fraud risks among providers. Additionally, updating documentation of monitoring activities, as needed, such as the IRM and internal guidance, along with staff training, would provide IRS with better assurance that the greatest risk areas are addressed appropriately. IRS conducts limited monitoring of the online provider subset of tax software providers enrolled in the Authorized e-file Provider program. However, these monitoring efforts are not part of the systematic Authorized e-file Provider monitoring program for EROs described above, nor are they documented in the IRM or relevant job aids. According to EPSS officials, IRS does not currently monitor all of the standards for online providers. IRS staff can remotely monitor three of the six security, privacy, and business standards for online providers through electronic means, according to EPSS officials (see table 3). EPSS officials stated that the other three standards cannot be monitored remotely (see appendix II for the full text of the six security, privacy, and business standards). For two of the three standards that cannot be monitored remotely, EPSS officials said it would be feasible for online providers to send the results of vulnerability scans (standard 2 in table 3) and privacy seal vendor certifications (standard 3 in table 3) to IRS for monitoring purposes. However, according to these officials, EPSS does not have dedicated staff who could review these results. Similarly, SB/SE, which conducts Authorized e-file Provider monitoring, does not have the technical expertise to review these results, as previously discussed. In addition, IRS cannot monitor the requirement to report security incidents, according to officials, because there is no way for the agency to know whether security incidents have occurred but were not reported. However, every fiscal year, IRS asks online providers to self-certify that they are meeting all six of the security, privacy, and business standards in IRS Publication 1345, according to an EPSS official. To self-certify, providers answer “yes” or “no” questions about whether they have complied with each standard. According to this official, companies generally indicate that they are meeting all of the standards. In addition to inconsistent monitoring of online provider requirements, IRS has not recently assessed the information security risks among all third- party provider types. IRS initially implemented the Authorized e-file Provider monitoring program described above only for EROs because they presented the greatest risk for fraud, according to an EPSS official. However, IRS’s monitoring practices and the associated IRM section have not been updated since 2011, and still reflect IRS’s initial assumption that EROs present the greatest risk for fraud among the different provider types. Additionally, while IRS assessed the security and privacy risks of tax software providers, the assessment did not compare these risks to those presented by EROs. In 2009, we recommended that IRS assess the extent to which the reliance on tax software creates significant risks to tax administration, including the security and privacy of taxpayer information. IRS agreed with our recommendation and in 2011 received the results of a third-party risk assessment to determine, in part, the security and privacy risks presented by large and small software providers. The assessment found that security presented the biggest overall risk among the areas reviewed—security of information, privacy of information, accuracy of returns, and reliability of systems—due, in part, to security being the least adequately controlled risk area by small software providers. This assessment was not designed to review the risks for other Authorized e-file Provider types, such as EROs. Our Fraud Risk Framework requires agencies to plan regular fraud risk assessments and suggests tailoring those assessments to the program. Effective managers plan to conduct such assessments at regular intervals and when there are changes to the program or operating environment, such as changes in technology that could result in increased security incidents. As part of a risk assessment, managers may examine the suitability of existing fraud controls. Such examination can help managers identify areas where existing control activities are not suitably designed or implemented to reduce risks to a tolerable level. By conducting a risk assessment for the Authorized e-file Provider program and identifying the provider types that present the greatest risks for fraud, IRS can better determine whether changes to the monitoring program are needed for each provider type. If the agency determines that changes are needed, updating documentation of monitoring activities— such as the IRM, internal guidance, and job aids, along with staff training—would provide IRS with better assurance that the greatest risk areas are addressed appropriately. Multiple offices within IRS use information on security incidents to track trends in fraud schemes, which helps them to protect taxpayer information and to prevent the filing of fraudulent tax returns. For example, when Stakeholder Liaison receives reports about a security incident involving a paid preparer, staff collect additional information about the incident, including the cause of the incident and whether taxpayer information was compromised. Stakeholder Liaison can analyze the data to show geographical information, like the states most affected by breaches; the paid preparer types most affected by incidents; and the method of attack of incidents; among other things, according to a Stakeholder Liaison official. This official said that Stakeholder Liaison also uses this information to produce daily management reports to keep leadership apprised of the number of incidents reported daily, as well as the cumulative number of affected preparers and taxpayers during the year and a comparison to data from the previous year. Return Integrity and Compliance Services (RICS) officials use a risk- based method to determine the necessary mitigation and treatment plans following a security incident. For example, RICS officials might assess a security incident as high risk, meaning that a taxpayer’s personal, financial, and tax data were compromised. For such an incident, RICS officials place the affected Taxpayer Identification Numbers (TIN) on Dynamic Selection Lists—lists of TINs affected in breaches and at risk of tax-related identity theft—to monitor future tax return filings for potential fraud. On the other hand, for low-risk incidents—incidents where fraudsters may have accessed information like street address or date of birth but not Social Security numbers—RICS may compare victims’ current tax returns with prior returns to look for differences that could indicate possible identity theft. According to RICS officials, the office also runs individuals’ information through fraud filters to help identify returns with a high likelihood of identity theft. Criminal Investigation’s (CI) Cybercrimes unit shares security incident information with the field offices where the incident occurred, according to CI officials. Area coordinators evaluate the incident information and determine whether a criminal case should be developed. If so, coordinators develop a fraud scheme package and provide it to the agent assigned to the case to help identify other potential incidents resulting from similar schemes, according to CI officials. IRS has primarily tracked information on security incidents in its RICS Incident Management Database since December 2016, according to RICS officials. Security incidents can be categorized in a number of ways, such as when hackers infiltrate third-party providers’ systems. Between 2017 and 2018, there was an overall decrease in the number of reported high-risk security incidents that led to confirmed identity theft victims across all types of security incidents. However, the number of reported security incidents from third-party providers increased about 50 percent during this same period, as shown in table 4. In turn, the number of taxpayers affected by the security incidents at third-party providers also increased. However, IRS does not have comprehensive information about the incidents because, in part, its reporting requirements do not apply to all third-party providers. For example, the Authorized e-file Provider program requires only online providers to report security incidents to IRS as soon as possible but no later than the next business day after confirmation of the incident. The information that online providers are to report includes details about the security incident and the affected taxpayers’ accounts. If paid preparers or EROs experience a security incident at their place of business, they are not required to report any information to IRS about the incident; instead, IRS encourages paid preparers to share security incident information with IRS through Stakeholder Liaison. Additionally, IRS cannot track incidents that third-party providers do not report, according to IRS officials. IRS officials and industry representatives stated that some third-party providers may not report security incidents for fear of punishment from IRS (e.g., penalties, sanctions, or removal from the Authorized e-file Provider program) or negative impacts to their business reputation. IRS has other voluntary reporting mechanisms for tax software providers or other members of the tax preparation industry. For example, members of the Security Summit can use a voluntary reporting mechanism to submit information to RICS. Some members of the Security Summit can use an additional voluntary reporting system in the ISAC online platform, which sends alerts about security incidents to others in the platform. IRS also recently revised some of its requirements that could affect paid preparers’ reporting of security incidents while using other IRS services. For example, in October 2018, the agency updated its user agreement for e-Services, a suite of web-based tools that allow paid preparers, among others, to complete transactions online with IRS. This update included a requirement to report any unauthorized use of the e-Services account or any other breach of security as soon as users become aware of the incident. According to Internal Control Standards, agencies should use quality information, both internal and external, to achieve objectives. For example, agencies should obtain data on a timely basis so that they can be used for effective monitoring. Additionally, recommended controls in NIST Special Publication 800-53 require reporting of suspected security incidents by federal agencies and their subordinate organizations. Though IRS conducts a yearly review of requirements for Authorized e- file Providers to find needed updates, the incident reporting requirement has not been identified as needing updates since 2010, according to a senior Wage and Investment official. This is another instance where centralized leadership could have identified a need to update the incident reporting requirements. According to an EPSS official, IRS originally applied this incident reporting requirement to only online providers because these providers stored a large amount of data and carried the highest risk of data loss. Similarly, IRS officials said the reporting requirement for online providers does not apply to providers of tax software used by paid preparers because those software providers do not collect or store taxpayer information on their systems. Instead, the taxpayer information is stored on a paid preparer’s hard drive. If a security incident occurred at the business of a paid preparer who uses tax software, then the preparer, not the tax software provider, would report that incident to IRS, according to IRS officials. While voluntary reporting mechanisms and updating of user agreements for IRS’s website are important steps, without a clear and standardized reporting requirement for all types of providers, IRS will not have assurance that third-party providers consistently report their security incidents in a timely manner. IRS needs this information to better understand the size and scope of information security incidents, which it uses to protect compromised individual taxpayer accounts and prevent identity theft refund fraud. Security incident information can be reported to IRS through various channels from the public to IRS offices, and the data are ultimately stored in the RICS Incident Management Database regardless of the office that initially received the information. Figure 5 depicts the flow of information from the public to IRS offices, as well as the flow of information between the offices and to IRS databases. While RICS has documented its information intake, tracking, and storage processes in the RICS Incident Management Plan, IRS does not have a comprehensive document that describes these processes across the different IRS offices. For example, incident information submitted to EPSS and Stakeholder Liaison eventually moves to RICS to be tracked in the Incident Management Database. Additionally, RICS officials told us that they track each of these reported incidents separately and that the main repository should not contain duplicate reports of the same incidents, though multiple databases may contain information about the same incident. RICS officials added that, before a new incident is added to the Incident Management Database, staff conduct a query in the database to ensure that the incident was not already added. However, IRS has not documented how the security incident data processes should flow, relying instead on informal communication efforts of the staff and the assumption that staff know where the data belong and will provide that information to the appropriate offices. Internal Control Standards state that management should develop and maintain documentation of its internal control system and implement control activities through policies. The standards also state that documentation of responsibilities through policies and periodic review of activities can contribute to the effectiveness of implementation. This limited nature of the documentation may be due to the newness of some of these data processes. For example, a Stakeholder Liaison official told us that the data intake process for Stakeholder Liaison and entry into the Return Preparers Database started at the beginning of 2018. Prior to that, a Stakeholder Liaison manager stored information about security incidents in an individual email account because there was no mechanism for storing the data in a systematic manner. Further, a senior Wage and Investment Division official stated that the processes to intake, store, and share the data among the different IRS offices continue to evolve, and that documents describing these practices may quickly become obsolete. While these processes may still be evolving, documenting them can help IRS combat identity theft by helping to ensure that security incidents are properly recorded and monitored in the IRS systems. Documenting the processes may also allow for more complete data, as the data would follow a specific routing and review process. This would reduce the risk of the data not following the various channels they go through now. Such documentation can also help IRS retain organizational knowledge, mitigate the risk of having that knowledge limited to a few personnel, and ensure that the agency implements these processes effectively in the future. Tens of millions of taxpayers use third-party providers, such as paid preparers or tax software providers, to comply with their federal income tax obligations. It is critical that taxpayers’ information, which includes personally identifiable and other sensitive information, be kept secure to maintain public confidence and avoid data breaches that expose that information for use by fraudsters. Identity theft is a constantly evolving crime, but IRS’s information security standards for third-party providers’ systems have not kept pace with the changing environment. One reason for this is that IRS lacks the explicit authority to require minimum standards for the systems of paid preparers and Authorized e-file Providers. Without this authority, Congress and IRS have limited assurance that the processes used to collect, store, and submit taxpayers’ returns adequately protect taxpayers’ information against electronic data breaches and potential tax refund fraud. Modifying its Authorized e-file Provider program requirements to explicitly state the elements of an information security program as required under the FTC Safeguards Rule would help IRS ensure that Authorized e-file Providers are aware of, and comply with, the rule. Doing so could also help these providers better protect taxpayers’ information. Additionally, IRS is missing an opportunity to capitalize on the achievements of Security Summit members to help ensure that tax software providers have an equivalent level of standards in place to adequately protect taxpayer information. The lack of centralized leadership at IRS with responsibility for coordinating all aspects of protecting taxpayer information held by third- party providers has enabled missed opportunities. Such designated leadership could help ensure greater collaboration between the various IRS offices that have roles to play in this area. This leadership could have also ensured that security standards for online providers in the Authorized e-file Provider program would have been updated. Instead, IRS introduced these standards in 2010 and has not subsequently updated them. Incorporating cybersecurity into its monitoring visits for EROs would provide IRS with greater assurance that EROs’ systems are adequately protecting taxpayers’ information from an increased risk of both tax- related and non-tax-related identity theft. Further, ensuring that IRS is using a risk-based approach to review all types of Authorized e-file Providers would provide assurance that the greatest risk areas of fraud are addressed appropriately. Finally, IRS’s efforts to protect taxpayer information at third-party providers would also be strengthened by greater consistency in requirements across provider types for reporting security incidents. Greater consistency would help to ensure IRS is obtaining timely and reliable information from third-party providers so IRS can better understand the size and scope of security incidents—data it uses to protect compromised individual taxpayer accounts and prevent identity theft refund fraud. Documenting the intake, storage, and sharing of the security incident data would also help IRS ensure that the security incidents are properly recorded and monitored. Congress should consider providing IRS with explicit authority to establish security requirements for the information systems of paid preparers and Authorized e-file Providers. (Matter for Consideration 1) We are making the following eight recommendations to IRS. The Commissioner of Internal Revenue should develop a governance structure or other form of centralized leadership, such as a steering committee, to coordinate all aspects of IRS’s efforts to protect taxpayer information while at third-party providers. (Recommendation 1) The Commissioner of Internal Revenue should modify the Authorized e- file Provider program’s requirements to explicitly state the required elements of an information security program as provided by the FTC Safeguards Rule. (Recommendation 2) The Commissioner of Internal Revenue should require that all tax software providers that participate in the Authorized e-file Provider program follow the subset of NIST Special Publication 800-53 controls that were agreed upon by the Security Summit participants. (Recommendation 3) The Commissioner of Internal Revenue should regularly review and update the security requirements that apply to tax software providers and other Authorized e-file Providers. (Recommendation 4) The Commissioner of Internal Revenue should update IRS’s monitoring programs for electronic return originators to include techniques to monitor basic information security and cybersecurity issues. Further, IRS should make the appropriate revisions to internal guidance, job aids, and staff training, as necessary. (Recommendation 5) The Commissioner of Internal Revenue should conduct a risk assessment to determine whether different monitoring approaches are appropriate for all of the provider types in the IRS’s Authorized e-file Provider program. If changes are needed, IRS should make appropriate revisions to the monitoring program, internal guidance, job aids, and staff training, as necessary. (Recommendation 6) The Commissioner of Internal Revenue should standardize the incident reporting requirements for all types Authorized e-file Providers. (Recommendation 7) The Commissioner of Internal Revenue should document intake, storage, and sharing of the security incident data across IRS offices. (Recommendation 8) We provided a draft of this report to the Commissioner of Internal Revenue for review and comment. In its written comments, which are summarized below and reproduced in appendix III, IRS agreed with three of the recommendations and disagreed with five of the recommendations. IRS also provided technical comments, which we incorporated as appropriate. IRS agreed with our recommendations to regularly review and update the security requirements that apply to the tax software provider and other Authorized e-file Providers; standardize the incident reporting requirements for all types of Authorized e-file Providers; and document intake, storage, and sharing of the security incident data across IRS offices. IRS did not provide additional detail on the actions it plans to take to address these recommendations. IRS disagreed with five of our recommendations, generally citing for all of them the lack of clear and explicit authority it would need to establish security requirements for the information systems of paid preparers and others who electronically file returns. For our recommendation to develop a governance structure or other form of centralized leadership, IRS stated it would require statutory authority that clearly communicates its authority to establish security requirements for the information systems of paid preparers and others who electronically file tax returns. Further, IRS stated that without such authority, implementing the recommendation would be an inefficient, ineffective, and costly use of resources. We disagree that convening a governance structure or other centralized form of leadership would require additional statutory authority or be inefficient, ineffective, and costly. As discussed in the report, IRS has seven different offices across the agency working on information security-related activities that could benefit from centralized oversight and coordination, such as updating existing standards, monitoring Authorized e-file Provider program compliance, and tracking security incident reports. We continue to believe that establishing a governance structure would help provide this level of leadership, coordination, and collaboration to IRS’s current efforts and therefore help alleviate the missed opportunities that we identified in the report, such as updating outdated security standards. Further, IRS could choose a leadership mechanism that it determines to be low cost and most efficient to gain a higher degree of coordination. Without this structure, it is unclear how IRS will adapt to changing security threats in the future and ensure those threats are mitigated. In our draft report, we made a recommendation that IRS modify the Authorized e-file Provider program to be consistent with the FTC Safeguards Rule. In its response, IRS stated that it did not have explicit authority to establish policy consistent with the FTC Safeguards Rule or enforce compliance with it. However, IRS clearly states in its Revenue Procedure 2007-40 that violations of the provisions of the Gramm-Leach- Bliley Act and the implementing rules and regulations promulgated by FTC are considered violations of the revenue procedure and may subject an Authorized e-file Provider to penalties or sanctions. Therefore, we believe IRS has already incorporated compliance with the FTC Safeguards Rule as part of its Authorized e-file Provider program. The intent of this recommendation is not to suggest that IRS develop new policies related to the elements of the Safeguards Rule. Instead, we believe IRS has the opportunity to explicitly state in its requirements for Authorized e-file Providers the elements of an information security program, as listed in the Safeguards Rule. This action will help third party providers become aware of their specific legal obligations to protect taxpayer data under the Gramm-Leach-Bliley Act. As such, we clarified text in the body of the report and the text of the recommendation to better reflect our intent. For our recommendation to require all tax software providers that participate in the Authorized e-file Provider program to follow the subset of NIST Special Publication 800-53 controls that were agreed upon by the Security Summit participants, IRS stated that it does not have the statutory authority for such a requirement. However, under its existing authority, IRS has already established some information security requirements for a portion of tax software providers—those that are online providers. IRS has the opportunity to further establish standards for all tax software providers by incorporating the subset of NIST controls into its Authorized e-file Provider program, which would capitalize on the work it has completed with the Security Summit members. We continue to believe that without setting and requiring the same security standards for all tax software providers, IRS does not have assurance that these providers have an equivalent level of standards in place to adequately protect taxpayer information. For our recommendation that IRS update its monitoring programs for electronic return originators, IRS stated it does not have the statutory authority to establish policy on information security and cybersecurity issues, nor to enforce compliance if noncompliance is observed. However, as we reported, IRS already monitors physical aspects of information security, which goes beyond existing Authorized e-file Provider program requirements. Since most individuals now file tax returns electronically, having checks for physical security without comparable checks for cybersecurity does not address current risks, as cyber criminals and fraudsters are increasingly attacking third-party providers, as IRS has noted. We believe that incorporating some basic cybersecurity monitoring into the visits would provide IRS the opportunity to help inform the most vulnerable third-party providers of additional guidance and resources. For our recommendation to conduct a risk assessment to determine whether different monitoring approaches are appropriate for all of the provider types in the Authorized e-file Provider program, IRS stated that changes to the monitoring program would not have value to the overall program performance absent statutory authority. We disagree with this conclusion. As discussed in the report, IRS does not currently systematically monitor the existing security requirements for online providers, nor does it conduct information security or cybersecurity monitoring for all types of Authorized e-file Providers. We believe that IRS could conduct a risk assessment of its current monitoring program within existing statutory authority and make necessary changes that would provide better assurance that all types of providers are receiving some level of oversight and that IRS is addressing the greatest risk areas appropriately. We are sending copies to the Chairmen and Ranking Members of other Senate and House committees and subcommittees that have appropriation, authorization, and oversight responsibilities for IRS. We are also sending copies of the report to the Commissioner of Internal Revenue and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or Lucasjudyj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives were to (1) assess what is known about the taxpayer information security requirements for the systems used by third-party providers, (2) describe Internal Revenue Service’s (IRS) outreach efforts to third-party providers on the requirements, (3) assess IRS’s monitoring processes for ensuring third-party providers’ compliance with the requirements, and (4) assess IRS’s requirements for third-party provider security incident reporting and how IRS uses that information. To assess what is known about the taxpayer information security requirements for the systems used by third-party providers, such as paid preparers and tax software providers, we reviewed applicable laws and regulations such as the Gramm-Leach-Bliley Act and relevant portions of the Internal Revenue Code, including 26 U.S.C. § 6011. This section of the Internal Revenue Code prescribes the filing of income tax returns, as well as the electronic filing requirements for returns prepared by paid preparers. We reviewed 26 U.S.C. §7803, which provides that the IRS Commissioner has the authority to administer and manage the execution and application of tax laws, while balancing the rights of, among other things, confidentiality and privacy of the taxpayer. We also reviewed the Federal Trade Commission’s (FTC) Safeguards Rule, which requires financial institutions, including tax return preparers, affiliates, and service providers, to ensure the security and confidentiality of customer records and information. This rule applies to those who are significantly engaged in providing financial products or services that include preparation and filing of tax returns. We reviewed IRS Revenue Procedure 2007-40, which informs Authorized e-file Providers of their obligations to IRS, taxpayers, and other participants in the Authorized e-file Provider program and outlines the rules governing filing electronically with IRS. We reviewed IRS publications describing the obligations in IRS’s Revenue Procedure 2007-40 and the requirements of the Authorized e- file Provider program, including IRS Publication 3112, IRS e-file Application and Participation, and IRS Publication 1345, Handbook for Authorized IRS e-file Providers of Individual Income Tax Returns. We assessed these documents to determine if the requirements for third- party providers were incorporating the laws and following leading practices as outlined by Standards for Internal Control in the Federal Government (Internal Control Standards) and A Framework for Managing Fraud Risk in Federal Programs (Fraud Risk Framework). The Fraud Reduction and Data Analytics Act of 2015, and Office of Management and Budget guidance implementing its provisions, affirm that agencies should adhere to the leading practices identified in our Fraud Risk Framework. We also compared the standards published in Publication 1345 for online providers to the National Institute of Standards and Technology (NIST) Special Publication 800-52: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations to determine if the standards were following leading practices. We reviewed the subset of NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations controls that the Security Summit members agreed to voluntarily implement. We also reviewed other IRS publications that provide third-party providers with descriptions of leading practices in keeping taxpayer information safe, including IRS Publication 4557, Safeguarding Taxpayer Data: A Guide for Your Business; IRS Publication 4600, Tips for Safeguarding Taxpayer Data; IRS Publication 5293, Protect Your Clients; Protect Yourself: Data Security Resource Guide for Tax Professionals; and IRS Publication 5294, Protect Your Clients; Protect Yourself: Data Security Tips for Tax Professionals. In assessing these documents, we identified the extent of consistency among publications. We interviewed IRS officials who were responsible for various aspects of IRS’s security requirements for paid preparers and tax software providers. We conducted semistructured interviews with the following 10 industry groups and related organizations that represented a cross section of the tax preparation industry to determine their knowledge about existing information security requirements. American Coalition for Taxpayer Rights American Institute of Certified Public Accountants Council for Electronic Revenue Communication Advancement Electronic Tax Administration Advisory Committee Federation of Tax Administrators National Association of Tax Professionals National Society of Tax Professionals We reviewed IRS organization documents, including organizational charts and associated Internal Revenue Manual (IRM) provisions for the offices that have responsibilities for securing taxpayer information. We reviewed the stated missions of the offices of Electronic Products and Services Support (EPSS); Small Business/Self-Employed; Return Integrity and Compliance Services (RICS); Criminal Investigation (CI); Return Preparer Office; Office of Professional Responsibility; Cybersecurity; and Stakeholder Liaison. We also interviewed officials from these offices to determine how they coordinated the responsibilities for overseeing the security of taxpayer data among the offices. We compared IRS activities to the Internal Control Standards that identify controls that help an entity adapt to shifting environments, evolving demands, changing risks, and new priorities. To describe the outreach efforts IRS takes for third-party providers, we reviewed IRS outreach documents such as publications, news releases, social media posts, emails, webinars, and online education campaigns. We interviewed IRS officials and conducted semistructured interviews with 10 industry groups and related organizations to determine IRS’s communication efforts related to security standard enforcement and identify potential challenges that IRS faces in its outreach. To assess IRS’s monitoring processes for ensuring third-party providers’ compliance with information security requirements, we reviewed the agency’s monitoring procedures for the Authorized e-file Provider program per Rev. Proc. 2007- 40; IRS Publication 3112, IRS e-file Application and Participation; and IRS Publication 1345, Handbook for Authorized IRS e-file Providers of Individual Income Tax Returns. We reviewed the IRM section related to Monitoring the IRS e-file Program, monitoring checklists, and related job aides to determine the extent to which monitoring practices address security requirements in IRS Publication 1345. We assessed IRS’s monitoring efforts against our Fraud Risk Framework’s principles to combat fraud in a strategic, risk- based manner. We also interviewed the IRS officials responsible for overseeing the monitoring program. To assess IRS’s requirements for third-party provider reporting of security incidents and how IRS uses that information, we reviewed IRS guidance about security incident reporting requirements. We analyzed IRS data on the number and type of security incidents tracked in the RICS Incident Management Database from 2017 and 2018, the only data available following its creation in December 2016. We interviewed RICS officials about the quality of data in this database and determined that the data were sufficiently reliable to describe a minimum count of security incidents. Specifically, we asked about the responsibilities of officials collecting and using the data, the procedures in place to capture all reported data, and controls for ensuring the accuracy of the data and resolving any errors, among other things. We reviewed IRS guidance and program user agreements to determine security incident reporting requirements for third-party providers. We reviewed IRS process documentation and interviewed IRS officials from EPSS, RICS, CI, Return Preparer Office, Cybersecurity, and Stakeholder Liaison to determine the collection, routing, and storage processes for security incident information. We assessed IRS’s processes and documentation practices against leading practices outlined in NIST Special Publication 800-53 and Internal Control Standards. We interviewed IRS officials to identify ways that IRS uses this security incident information. We conducted semistructured interviews with the 10 industry groups and related organizations listed above to determine their knowledge about existing security incident reporting requirements. We conducted this performance audit from November 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Internal Revenue Service (IRS) mandated that online providers adhere to six privacy, security, and business standards as part of the Authorized e-file Provider program, as listed in table 6. These standards have not been updated since they were developed in 2010. In addition to the contact named above, Jeff Arkin (Assistant Director), Robyn Trotter (Analyst-in-Charge), Christina Bixby, Alyssia Borsella, Mark Canter, Jehan Chase, Larry Crosland, Ann Czapiewski, James Andrew Howard, Michele Fejfar, and Robert Gebhart made key contributions to this report.", "summary": "Third-party providers, such as paid tax return preparers and tax preparation software providers, greatly impact IRS’s administration of the tax system. If these third parties do not properly secure taxpayers’ personal and financial information, taxpayers will be vulnerable to identity theft refund fraud and their sensitive personal information will be at risk of unauthorized disclosure. IRS estimates that it paid out at least $110 million in identity theft tax refund fraud during 2017, and at least $1.6 billion in identity theft tax refund fraud during 2016. GAO was asked to review IRS’s efforts to track, monitor, and deter theft of taxpayer information from third parties. Among other things, this report assesses what is known about the taxpayer information security requirements for the systems used by third-party providers, IRS’s processes for monitoring compliance with these requirements, and IRS’s requirements for third-party security incident reporting. GAO analyzed IRS’s information security requirements, standards, and guidance for third-party providers and compared them to relevant laws, regulations, and leading practices, such as NIST guidance and Standards for Internal Control in the Federal Government . GAO reviewed IRS’s monitoring procedures and its requirements and processes for third-party reporting of security incidents, and compared them to Internal Control Standards and GAO’s A Framework for Managing Fraud Risk in Federal Programs . GAO also interviewed IRS and tax industry group officials. Federal law and guidance require that the Internal Revenue Service (IRS) protect the confidentiality, integrity, and availability of the sensitive financial and taxpayer information that resides on its systems. However, taxpayer information held by third-party providers—such as paid tax return preparers and tax preparation software providers—generally falls outside of these requirements, according to IRS officials. In 2018, about 90 percent of individual taxpayers had their tax returns electronically filed by paid preparers or used tax preparation software to prepare and file their own returns. IRS seeks to help safeguard electronic tax return filing for various types of third-party providers through requirements under its Authorized e-file Provider program. However, IRS’s efforts do not provide assurance that taxpayers’ information is being adequately protected. Paid Preparers. IRS has not developed minimum information security requirements for the systems used by paid preparers or Authorized e-file Providers. According to IRS’s Office of Chief Counsel, IRS does not have the explicit authority to regulate security for these systems. Instead, the Internal Revenue Code gives IRS broad authority to administer and supervise the internal revenue laws. The Department of the Treasury has previously requested additional authority to regulate the competency of all paid preparers; GAO has also suggested that Congress consider granting IRS this authority. Congress has not yet provided such authority. Neither the Department of the Treasury request nor the GAO suggestion included granting IRS authority to regulate the security of paid preparers’ systems. Having such authority would enable IRS to establish minimum requirements. Further, having explicit authority to establish security standards for Authorized e-file Providers’ systems may help IRS better ensure the protection of taxpayers’ information. Tax Software Providers. As part of a public-private partnership between IRS and the tax preparation industry, 15 tax software providers voluntarily adhere to a set of about 140 information security controls developed using guidance from the National Institute of Standards and Technology (NIST). However, these controls are not required, and these providers represent only about one-third of all tax software providers. Additionally, IRS established six security, privacy, and business standards for providers of software that allows individuals to prepare their own tax returns (as opposed to software that paid preparers use). However, IRS has not substantially updated these standards since 2010, and they are, at least in part, outdated. For example, IRS cites an outdated encryption standard that NIST recommends not using due to its many known weaknesses. A key factor contributing to missed opportunities to address third-party cybersecurity is IRS’s lack of centralized leadership. Consequently, IRS is less able to ensure that third-party providers adequately protect taxpayers’ information, which may result in identity theft refund fraud. IRS monitors compliance with its electronic tax return filing program requirements for those paid preparers who electronically file returns; however, IRS’s monitoring has a limited focus on cybersecurity issues. For example, the monitoring techniques largely focus on physical security (e.g., locked filing cabinets) rather than verifying that preparers have an information security policy consistent with NIST-recommended controls. Without effective monitoring of cybersecurity controls, IRS has limited assurance that those paid preparers’ systems have adequate controls in place to protect clients’ data. IRS recently began collecting information on high-risk security incidents, such as hackers infiltrating third-party provider systems. Reported incidents increased from 2017 to 2018, the only years for which IRS has data. However, IRS does not have a full picture of the scope of incidents because of inconsistent reporting requirements, including no reporting requirements for paid preparers. GAO suggests that Congress consider providing IRS with explicit authority to establish security requirements for paid preparers’ and Authorized e-file Providers’ systems. GAO is also making eight recommendations, including that the Commissioner of Internal Revenue Develop a governance structure or other form of centralized leadership to coordinate all aspects of IRS’s efforts to protect taxpayer information while at third-party providers. Require all tax software providers to adhere to prescribed information security controls. Regularly review and update security standards for tax software providers. Update IRS’s monitoring programs to include basic cybersecurity issues. Standardize incident reporting requirements for all types of third-party providers. IRS agreed with three recommendations, including the above recommendations to regularly review and update security standards for tax software providers, and standardize incident reporting requirements. IRS disagreed with five recommendations—including the other three listed above—generally citing the lack of clear and explicit authority it would need to establish security requirements for the information systems of paid preparers and Authorized e-file Providers. GAO believes that IRS can implement these recommendations without additional statutory authority.", "document_type": "gao"}
{"report": "The Child Care and Development Block Grant (CCDBG) Act, as amended, is the main federal law governing state child-care programs for low-income working families. The act was reauthorized in 2014, and the reauthorization included a focus on improving the overall quality of child- care services and development of participating children. In September 2016, OCC published new rules (CCDF regulations) to provide clarity to states on how to implement this law and administer the program in a way that best meets the needs of children, child-care providers, and families. The CCDBG Act and CCDF regulations allow states flexibility in developing CCDF programs and policies that best suit the needs of children and parents within that state. According to OCC, these new rules also align child-care requirements with new Head Start regulations, including certain requirements for background checks, annual monitoring, and prelicensure inspections for some CCDF providers. OCC also added regulatory requirements for state lead agencies to describe in their State Plans effective internal controls that are in place to ensure integrity and accountability including 1. processes to ensure sound fiscal management, 2. processes to identify areas of risk, 3. processes to train child-care providers and staff of the lead agency and other agencies engaged in the administration of the CCDF about program requirements and integrity, and 4. regular evaluation of internal control activities. Lead agencies are also required to describe in their State Plans the processes that are in place to identify fraud or other program violations, and to investigate and recover fraudulent payments and to impose sanctions in response to fraud. OCC is a program office within ACF that works with the states to administer the CCDF program. OCC and states each have responsibility for overseeing and protecting the integrity of the CCDF program. Each state must develop, and submit to OCC for approval, a State Plan that identifies the purposes for which CCDF funds will be spent for a 3-year grant period and designates a lead agency responsible for administering child-care programs. To administer CCDF funds, federal law and regulations require that states report their CCDF expenditures and data on the number of children served by CCDF subsidies. The current reporting structure as described by OCC and ACF officials is shown in figure 1. To request funding from the CCDF, states submit a State Plan for administering their CCDF programs to OCC. OCC provides states with a Plan Preprint, which serves as a template and includes instructions and guidance on developing the State Plans and providing information required by law and regulations. Further, OCC has used the Plan Preprint to request additional information from the states. The Plan Preprint developed for fiscal years 2019–2021 State Plans consists of eight sections and is the first to include the new CCDF regulatory requirements, added in September 2016 as required by the 2014 reauthorization. One of the new requirements is for state lead agencies to describe in their State Plans effective internal controls that are in place to ensure integrity and accountability. In addition, OCC modified the Plan Preprint for fiscal years 2019–2021 State Plans to add the instruction requesting states to report information about the results of their program-integrity and fraud- fighting activities, in addition to providing descriptions of the activities themselves. The Secretary of Health and Human Services, through OCC, has the responsibility to approve State Plans that satisfy the requirements, and review and monitor state compliance with the approved State Plan. According to OCC officials, the Program Operations Division within OCC, in partnership with the OCC regional program unit staff (regional offices), reviews the State Plans and approves those that they determine have satisfied the requirements of the CCDBG Act and CCDF regulations. The CCDF has been designated as a high-priority program, as defined by OMB, under the Improper Payments Elimination and Recovery Improvement Act of 2012 (IPERIA), meaning that it is a program susceptible to significant improper payments. Federal statutes require federal agencies to evaluate programs for improper-payment risk and, for programs susceptible to significant improper payments, to report on actions taken to reduce improper payments. CCDF regulations implement these requirements by requiring states to calculate and report estimates of their improper payments, including proposed actions to address sources of error. These reports are developed by the states on a 3-year rotational cycle, and HHS reports the aggregate results in its Agency Financial Report. The CCDF gross improper payment estimate for fiscal year 2019 is approximately $325 million, and the estimated improper payment rate is 4.53 percent. OCC oversees states’ compliance with the prescribed procedures for estimating improper-payment error rates by approving the preliminary documents, approving any changes to the case samples, conducting the Joint Case Reviews, and reviewing and approving the final State Improper Payments Report and CAP submissions. If a state reports an error rate at or above 10 percent, it must also submit a CAP, which includes detailed descriptions of specific activities planned to reach a targeted reduction in errors. It must then submit an update on its progress and a new CAP the following year if it has not completed the proposed corrective actions or if the error rate is still at or above 10 percent. The improper-payment reporting process is illustrated in figure 2. In fiscal year 2019, OCC launched a formal Monitoring System to review a selection of states annually over the course of the 3-year State Plan period. According to OCC officials, the three main purposes of the Monitoring System are to: (1) ensure compliance with the CCDBG Act, CCDF regulations, and the approved State Plans; (2) identify state technical-assistance needs; and (3) identify promising practices to inform continuous quality improvement. The Monitoring System focuses on 11 topic areas, which include program integrity and accountability. In addition, other topic areas include disaster preparedness, consumer education, and health and safety requirements. OCC officials told us that monitoring is completed on a rolling basis, and that they plan to monitor one-third of states each fiscal year, from fiscal years 2019 to 2021. According to OCC officials, they scheduled the monitoring to ensure that a state will not be submitting an improper- payment report in the same year that it participates in the monitoring. Figure 3 provides additional details regarding the OCC Monitoring System process, which includes an on-site visit to monitored states. Fraud and “fraud risk” are distinct concepts. Fraud risk exists when individuals have an opportunity to engage in fraudulent activity, have an incentive or are under pressure to commit fraud, or are able to rationalize committing fraud. Although the occurrence of fraud indicates there is a fraud risk, a fraud risk can exist even if fraud has not yet been identified or occurred. For example, suspicious billing patterns or complexities in program design may indicate a risk of fraud even though fraud has not been identified or occurred. When fraud risks can be identified and mitigated, fraud may be less likely to occur. According to federal standards and guidance, executive-branch agency managers are responsible for managing fraud risks and implementing practices for combating those risks. Specifically, federal internal control standards state that management should consider the potential for fraud when identifying, analyzing, and responding to risks. As part of these standards, management assesses risks the entity faces from both external and internal sources. In addition, in July 2015, GAO issued the Fraud Risk Framework, which provides a comprehensive set of key components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The Fraud Risk Framework describes leading practices in four components, as shown in figure 4. The Fraud Reduction and Data Analytics Act of 2015, enacted in June 2016, required OMB to establish guidelines for federal agencies to create controls to identify and assess fraud risks, and design and implement antifraud control activities. The act further required OMB to incorporate the leading practices from the Fraud Risk Framework in the guidelines. In July 2016, OMB published guidance about enterprise risk management and internal controls in federal executive departments and agencies. Among other things, this guidance affirms that managers should adhere to the leading practices identified in the Fraud Risk Framework. As part of its oversight of states’ CCDF programs, OCC reviewed and approved State Plans for the current grant period (fiscal years 2019– 2021). However, OCC has not established written policies to guide staff review and approval of these State Plans, a process that occurs every 3 years. OCC’s lack of established policies limits its ability to ensure that staff follow appropriate protocols for consistency when reviewing and approving State Plans and to retain organizational knowledge in the event of staff turnover, which OCC noted as occurring during each review period. Further, OCC requested that states report information about the results of states’ program-integrity activities. However, most of the State Plans that it approved did not provide the results of states’ program- integrity activities as requested. OCC officials told us that they plan to continue to request that states report on the results of their program- integrity activities, but OCC has not identified what it considers to be “results” of program-integrity activities. Without taking additional steps to define its informational needs and encourage states to report the results of their program-integrity activities, OCC will not have this information to help determine whether states are effectively ensuring the integrity of the CCDF program. To provide oversight of states’ CCDF program-integrity activities, OCC reviewed and approved State Plans for the current grant period, covering fiscal years 2019–2021. To do so, OCC officials described to us a process that began with a high-level review of the draft State Plans submitted through an electronic system. After an initial review for completeness, OCC staff focused on the contents of the State Plans including states’ responsiveness to each requirement. For example, one requirement is to describe the processes that the state will use to identify risk in its CCDF program. OCC officials also stated that they consider clarity, consistency, and compliance when assessing State Plans. OCC officials also explained that they reviewed the responses to determine whether they were sufficiently detailed, and sought clarification from the states when necessary. OCC officials stated that, prior to the final approval of the State Plans, staff completed a validation form that consists of a table listing the State Plan subsections with checkboxes next to each subsection. Figure 5 outlines the timeline for review and approval of State Plans. OCC has developed a draft procedure for the State Plan review and approval process, but had neither finalized written policies before beginning its review of the fiscal years 2019–2021 State Plans, nor finalized written policies for future review periods that occur every 3 years. Instead, OCC officials told us that for the review and approval process completed in 2018, they provided their staff a variety of training materials and draft documents that encouraged discussion among those involved. These documents contained information and guidance on the process, such as explaining the overall operational processes for reviewing and approving State Plans and general roles and responsibilities. However, none of the documents were finalized as OCC’s written policies for staff to follow when implementing the fiscal years 2019–2021 State Plan review and approval process, or for subsequent review periods. In response to our request for finalized policies pertaining to how OCC reviewed and approved State Plans, OCC provided documents that have substantial limitations for explaining to OCC staff how they should review and approve State Plans. For example, OCC provided what it characterized as a three-page summary protocol, which, in part, contained a historical record of what occurred during the recently completed review period rather than guidance that would help OCC achieve its State Plan review objectives on a continuous basis. Specifically, the protocol describes the regular internal meetings and interactions that OCC staff had from September 2018 to December 2018. As such, the protocol does not describe the process that OCC staff should follow, or the meetings that should occur, when reviewing and approving State Plans in future years (i.e., on a continuous basis). OCC also developed in August 2018 a more-detailed draft procedure for reviewing and approving State Plans. The draft procedure contains information on the communication process between the central and regional offices, recognizes that there may be variation in internal processes among regional offices and from one review period to the next, and includes guidance on steps for resolving questions about State Plans, among other guidance. Unlike the three-page summary protocol, the draft procedure explicitly states its applicability to future review periods as well as the current State Plan review period, and therefore would have provided guidance for staff on a continuous basis had a finalized version been shared with staff and established as OCC’s written policies. However, because of the volume of work and differences in caseloads among regional offices, OCC officials stated that they did not share a finalized procedure with staff and that staff were neither expected nor required to use the draft procedure when conducting their review of State Plans for the fiscal years 2019–2021 review period. As such, this draft procedure did not represent the formal policies for staff to follow in performing their roles. In explaining why it relies on the three-page summary protocol and draft procedure rather than finalized written policies to guide its State Plan review and approval process, OCC officials stated that OCC needs flexibility in its policies during the review period. Specifically, there are staffing changes in both the central and regional offices for each State Plan review period, and having flexibility within the framework provided by the three-page summary protocol allows them to accommodate those changes. OCC officials noted that some of the processes are unique to each of the 10 regional offices because of differences in their structure, staffing, and caseloads. Likewise, OCC officials stated that the regional offices need flexibility to continuously adjust processes and timelines so that they can accommodate varying responsiveness from states, and evaluate the State Plans without undermining the flexibility afforded to states through the block grant. However, it is possible for OCC to establish written policies to guide processes that are common from one review period to the next, and across all regions, while still maintaining the necessary flexibility to accommodate staffing changes and regional differences, as it had already begun to do by developing its August 2018 draft procedure. In this regard, Standards for Internal Control in the Federal Government states that management should implement control activities through policies. In doing so, management communicates the policies to personnel so that personnel can implement the control activities for their assigned responsibilities. Further, Standards for Internal Control in the Federal Government includes minimum documentation requirements, such as that management develop and maintain documentation of its internal control system. An internal control system is a continuous built-in component of operations that provides reasonable assurance that an entity’s objectives will be achieved. Internal control is not one event, but a series of actions that occur throughout an entity’s operations. Further, internal control is recognized as an integral part of the operational processes management uses to guide its operations, and internal control is built into the entity as a part of the organizational structure to help managers achieve the entity’s objectives on an ongoing basis. As such, documentation of the internal control system should reflect a continuous, built-in component of operations rather than a historical record of a past event. Documentation also provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. OCC’s lack of established written policies limits its ability to ensure that staff follow appropriate protocols on a continuous basis when implementing the State Plan review and approval process, and limits its ability to provide a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. Without finalizing written policies, an effort that could include leveraging its previously developed August 2018 draft procedure, OCC risks losing that knowledge each time there are staffing changes among central and regional offices. In response to a 2016 HHS OIG report, OCC has attempted to collect information about the results of states’ program-integrity and fraud- fighting activities by adding a new instruction to the fiscal years 2019– 2021 Plan Preprint requesting states to report such information in their State Plans. Specifically, the HHS OIG recommended that collecting data on program-integrity and fraud-fighting results would be an important step in monitoring states’ efforts to safeguard the CCDF program. Additionally, OCC officials told us that obtaining information on the results of program-integrity activities is important for understanding national trends and helping to inform OCC’s technical assistance to states and ensure states’ accountability over their program-integrity activities. However, our review of 51 approved State Plans found that 43 State Plans (about 84 percent) did not report the results of program-integrity activities as requested (see fig. 6). The other eight states (about 16 percent) reported the results of program-integrity activities. State Plans must meet the requirements set forth in the law and the CCDF regulations to be approved. OCC officials told us that the State Plans were approved without the information on the results of program- integrity activities because, although there are instructions in the Plan Preprint for states to report this information, the CCDF regulations do not require it. Further, OCC officials told us that when OCC submitted the Plan Preprint to OMB for approval under the Paperwork Reduction Act, OCC had indicated that the program-integrity results would be collected on an informational basis, and states would not be required to provide this information. According to an OCC official, only portions of the Plan Preprint with instructions for states to report on the results of program- integrity activities were requested on an informational basis, and all other information in that section was required for approval of the State Plans. OCC officials also told us that OCC will continue to request that states report on the results of their program-integrity activities in the State Plans, but OCC has not defined what information it needs regarding the “results” of states’ program-integrity activities and has not communicated the need to states or its staff. OCC officials told us that they will ensure that states submit this information by providing guidance to states on the purpose of collecting this information. However, OCC was not able to provide us with a definition or examples of what it considers to be “results” of program- integrity activities that would be helpful for ensuring states’ accountability over their program-integrity activities. In addition, OCC officials said that OCC did not communicate to states that the information about the results of program-integrity activities was being requested on an informational basis only. According to OCC officials, OCC did not specifically communicate its intention to states because it wanted states to provide a response, if possible. Similarly, OCC had not developed any specific internal criteria for its staff to use when reviewing State Plans to determine whether certain responses were sufficient for their informational needs, such as to better understand national trends. OCC officials also stated that there was no internal written guidance explaining to OCC staff that such information was not required for State Plan approval. Rather, this standard was communicated to staff during weekly meetings. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. In doing so, management identifies the information requirements needed and defines the information requirements at the relevant level and requisite specificity for appropriate personnel. Further, Standards for Internal Control in the Federal Government states that management should internally and externally communicate the necessary quality information to achieve the entity’s objectives. In this context, after defining its informational needs regarding the results of program-integrity activities, OCC’s internal and external communication could include communication to the states, which are requested to include this information in the State Plans, and to its staff who will be responsible for analyzing this information. Until OCC defines what information it needs regarding program-integrity activity results, it will be limited in its ability to obtain quality information. By not communicating informational needs to states and staff, OCC will continue to lack quality information about the results of states’ program-integrity efforts and will not be able to use that information to analyze national trends and help ensure states’ accountability over their program-integrity activities, as described. Since 2013, seven states with improper-payment rates at 10 percent or above have submitted 14 corrective action plans (CAP) to OCC for review. However, OCC does not have any documented criteria to guide the review of the CAPs submitted by states to ensure the proposed actions are aimed at root causes of improper payments and are effectively implemented. OCC also has not documented the procedures it uses to follow up with states subject to CAPs, but said it is planning to. Federal improper-payment statutes require federal agencies to review programs susceptible to significant improper-payment risks and develop actions to reduce improper payments. For example, the Improper Payments Elimination and Recovery Act of 2010 (IPERA) specifically requires agencies administering programs that are susceptible to significant improper payments, such as the CCDF, to report on actions the agency is taking to reduce improper payments. Because the CCDF is administered by states, this requirement is implemented in CCDF regulations by requiring states reporting improper-payment error rates at or above 10 percent to develop and implement CAPs. The OMB guidance implementing IPERA states that agencies should ensure that each corrective action is specifically aimed at a root cause of improper payments and that the actions are effectively implemented to prevent and reduce improper payments. According to this guidance, a root cause is something that would directly lead to an improper payment and, if corrected, would prevent the improper payment. In the proposed rulemaking in which OCC introduced the CAPs, OCC stated that the CAPs are intended to be comprehensive and detailed, so as to improve upon the descriptions of corrective actions already reported on a 3-year cycle, which sometimes lack detail or specificity. OCC officials told us that OCC reviewers use their CAP Review Tool to evaluate the CAPs for approval, which also lays out the protocol for conducting reviews. However, the CAP Review Tool does not require reviewers to document whether the corrective actions proposed by states are aimed at root causes of improper payments, or effectively implemented. Further, the written review procedure that accompanies the CAP Review Tool does not contain guidance for reviewers on evaluating whether corrective actions are aimed at root causes and are effectively implemented. OCC officials explained to us that, in their view, states are in the best position to identify the most-feasible approach to corrective actions based on their individual circumstances. We acknowledge that states should have flexibility to identify corrective actions based on their individual circumstances. However, according to OMB guidance, it is federal agencies that are to ensure that corrective actions are aimed at root causes of improper payments and effectively implemented. Further, in the proposed rulemaking in which OCC introduced the CAPs, OCC stated that it intended the CAPs to be used for OCC to hold states accountable as part of its compliance with IPERA. Accordingly, without providing additional guidance to its reviewers, OCC will lack assurance that states’ proposed corrective actions are aimed at root causes and effectively implemented. OCC officials also stated that the majority of the seven states subject to CAPs reduced their error rates over time, specifically to below 10 percent. OCC officials explained that this determination is based on the submission of the State Improper Payment Report for the next required reporting cycle or on states’ voluntarily conducting a review of a sample of cases and submitting the results to OCC to demonstrate they had reduced their error rate to below 10 percent. We did not independently corroborate OCC’s determination because assessing the reliability of the self-attested internal error-rate reviews conducted by certain states and reviewing this information was outside the scope of our work. However, as part of our review of the 14 CAPs that have been submitted to OCC in response to OCC’s improper-payment reviews since 2013, we found that one state was required to submit CAPs for 3 consecutive years and consistently proposed the same error-rate reduction targets, with different dates. This observation underscores the need to ensure the corrective actions a state proposes are specifically aimed at root causes of improper payments and are effectively implemented. OCC does not have guidance in place for its reviewers to determine whether the ongoing corrective actions a state proposes to reduce improper payments will be specifically aimed at root causes of improper payments and effectively implemented. This could leave the CCDF program at continued risk of improper payments. OCC does not have written policies for its CAP follow-up process or documentation that follow-up has been completed for past CAPs. OCC officials told us that they plan to develop such written policies, but officials did not specify a timeline for completion. OCC officials described their process used to monitor states while they are subject to a CAP, which includes additional contact when the same state has been subject to CAPs for consecutive years. This CAP follow-up process is illustrated in figure 7. According to OCC officials, OCC intends to develop written policies for the CAP follow-up process but did not provide a time frame for completion. This will include, at a minimum, a written protocol for the activities illustrated above, which will be included in the next revision of the instructions given to states for improper-payment reporting. According to OCC officials, each region currently has its own process for documenting discussions with CAP states. Having established written policies for the CAP follow-up process will help ensure that OCC’s oversight and monitoring of CAPs is carried out consistently. OCC officials told us that their Monitoring System, initiated in fiscal year 2019, plays a part in OCC’s role to ensure that states’ program-integrity activities are effective. According to OCC officials, OCC uses two tools as part of its Monitoring System—a Compliance Demonstration Packet and Data Collection Tool. States complete the Compliance Demonstration Packet to outline how they propose to demonstrate compliance with regulatory requirements and implementation of the approved State Plans throughout the Monitoring System’s phases. For example, to show effective internal controls are in place to ensure integrity and accountability, states may provide OCC with state or local policies and manuals (previsit phase), and may submit to interviews or provide system demonstrations (on-site visit phase). OCC staff use the Data Collection Tool to record comments about the evidence observed, and to note whether additional follow-up is needed. Both of these tools contain language indicating that the effectiveness of states’ program-integrity and fraud-fighting activities are evaluated by OCC staff. For purposes of the Monitoring System, OCC officials said that states have broad flexibility to propose, in the Compliance Demonstration Packet, what documents and evidence to provide. In addition, states have the flexibility to propose how the state will demonstrate compliance with regulatory requirements. This includes the requirement to describe in its State Plan effective program-integrity control activities, which includes fraud-fighting activities. OCC officials further told us that OCC does not collect the same set of information or evidence across the country. Rather, OCC collects state-specific information based on what each individual state proposes. For example, the Compliance Demonstration Packet allows states to propose an approach for demonstrating their compliance with the requirement to describe in their State Plans effective internal controls that are in place to ensure integrity and accountability. OCC officials said the primary purpose of the Monitoring System is to ensure that states are in compliance with CCDF regulations and implementing the State Plans as approved, rather than to make an assessment of the efficacy of the State Plans. When we asked OCC officials how they determine whether a state has provided appropriate and adequate documentation for the purposes of the Monitoring System, these officials told us that staff develop specific questions for each state and look for evidence showing that states are implementing the State Plans as approved. For example, OCC officials might look for evidence of a state’s implementation of certain program-integrity activities described in its approved State Plan to verify that the activities described are in place. OCC officials also stated that staff decide what is acceptable through consensus and attempt to build consistency through internal discussions regarding the appropriateness of the material that states provide. However, there are no specific criteria to guide OCC staff’s assessment of the effectiveness of states’ program-integrity activities during these discussions. For example, there are no specific criteria to help OCC staff assess whether states’ implemented control activities are effective at identifying areas of risk. OCC officials stated that the CCDF regulations and the approved State Plans are the most-detailed criteria that they use to assess data collected for the Monitoring System. However, neither the CCDF regulations nor the State Plans include specific criteria for assessing whether the control activities are effective. OCC is responsible for monitoring states’ compliance with the CCDF regulations, and these regulations explicitly require that states describe in their State Plans “effective internal controls that are in place to ensure integrity and accountability.” According to Standards for Internal Control in the Federal Government, an effective internal control system has a monitoring component that is effectively designed, implemented, and operating. Additionally, a leading practice of the Fraud Risk Framework is to examine the suitability of existing fraud controls. Managers who effectively implement an antifraud strategy monitor and evaluate the effectiveness of preventive activities in this strategy and take steps to help ensure external parties with responsibility over fraud control activities effectively implement those activities. Without developing and using criteria to assess whether states’ program-integrity control activities are effective, OCC cannot ensure that states’ internal controls for program integrity are effective. Likewise, without examining the suitability of, and monitoring the effectiveness of, the states’ fraud control activities, OCC will be challenged in effectively implementing an antifraud strategy to minimize the risk of fraud in the CCDF program. OCC developed the Grantee Internal Controls Self-Assessment Instrument (Self-Assessment Instrument) in 2010 and makes the technical-assistance tool available to the states through its website. In response to a 2016 HHS OIG report, ACF officials said that OCC would use the Self-Assessment Instrument to address the report’s recommendations to request that states examine the effectiveness of their program-integrity and fraud-fighting activities, and examine with states the benefits of expanding such activities. The Self-Assessment Instrument contains five sections: (1) Eligibility Determination and Review; (2) Improper Payment Case Review Process; (3) Fraud and Overpayment Prevention, Detection, and Recovery; (4) Federal Reporting; and (5) Audits and Monitoring. According to OCC officials, as of August 2019, 19 states have completed the Self-Assessment Instrument since its inception. OCC officials stated that use of the Self-Assessment Instrument is based entirely on states’ self-identified risks, and states are free to choose which, if any, of the sections to complete. OCC officials have noted benefits as a result of states completing the Self-Assessment Instrument. Specifically, OCC officials said that states have improved their implementation processes and policies, and improper-payment error rates have decreased. In addition to making the tool available to states, OCC officials told us that OCC also provides technical assistance in completing the Self-Assessment Instrument, which may include an on-site facilitated discussion. The facilitated discussion may cover areas including control activities to identify and prevent fraud, and strategies to investigate and collect improper payments. Following the on-site facilitated discussion, an OCC contractor compiles a report summarizing state-identified issues to address in states’ policies and procedures, according to one OCC official. However, OCC officials told us that states are not required to act on this report. In addition to the Self-Assessment Instrument, OCC has recently coordinated on the development of the Fraud Toolkit, which is a series of electronic spreadsheets that states can use to respond to questions about their fraud risk management activities—such as staff training, procedures for addressing suspected fraud, and program administration. The tools assign risk levels to these areas based on the state’s responses, and will also include recommended next steps for each of those areas and generate a report to summarize overall risk. For example, data from these tools would indicate whether states’ CCDF program staff are trained to identify forms, such as wage stubs or employer letters that may have been forged or altered. The data would also indicate whether the state has a fraud referral process in place to expedite investigations. OCC makes the Fraud Toolkit available for states to use upon request. However, other than making the tool available, OCC officials said that OCC does not usually have any further involvement in states’ use of the tool. OCC officials told us that they do not plan to use either the Self- Assessment Instrument or the Fraud Toolkit to collect data about states’ CCDF programs because both the Self-Assessment Instrument and the Fraud Toolkit are intended as primarily technical-assistance tools rather than monitoring tools or data-collection instruments. OCC officials also told us that, to formally collect information from states’ use of such tools, they would need to seek approval from OMB. OCC officials stated that OCC’s goal is to develop technical assistance that best meets the needs of the states, and not to impose additional reporting requirements on the states. Officials also noted a concern that states could cease to participate in or accept technical assistance if such assistance is seen as increasing reporting requirements. However, according to OCC officials, OCC has not conducted a cost-benefit analysis of collecting such information. Leading practices in the Fraud Risk Framework are to monitor and evaluate the effectiveness of preventive activities; collect and analyze data; and adapt activities to improve fraud risk management. Further, although external parties—in this case, the state lead agencies—may be responsible for specific fraud control activities, Standards for Internal Control in the Federal Government states that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. As part of these standards, management retains responsibility for monitoring the effectiveness of internal control over the assigned processes performed by external parties. Management is responsible for meeting internal control objectives, and may decide how the entity evaluates the costs versus benefits of various approaches to implementing an effective internal control system. However, cost alone is not an acceptable reason to avoid implementing internal controls, and cost-benefit considerations support management’s ability to effectively design, implement, and operate an internal control system that balances the allocation of resources and other factors relevant to achieving the entity’s objectives. By not evaluating the feasibility of collecting information from the Self-Assessment Instrument or the Fraud Toolkit— such as evaluating the feasibility of doing so during its Monitoring System process—OCC may be missing an opportunity to monitor the effectiveness of the internal control system to help states adapt control activities to improve fraud risk management. As described above, OCC has developed several program-integrity activities that could help assess and manage fraud risk if they were part of an antifraud strategy. For example, the improper-payment reporting process and Monitoring System are not specific to fraud but may generate information relevant to fraud risks. However, according to OCC officials, ACF has not completed a fraud risk assessment for the CCDF, which would provide a basis for the development of an antifraud strategy that describes the program’s approach for addressing prioritized fraud risks identified, as described in the Fraud Risk Framework. The Assess component of the Fraud Risk Framework calls for federal managers to plan regular fraud risk assessments and to assess risks to determine a fraud risk profile. Furthermore, Standards for Internal Control in the Federal Government states that management should consider the potential for fraud when identifying, analyzing, and responding to risks. Leading practices for planning fraud risk assessments include tailoring the fraud risk assessment to the program and planning to conduct the assessment at regular intervals and when there are changes to the program or operating environment. The leading practices also include identifying the tools, methods, and sources for gathering information about fraud risks and involving relevant stakeholders in the assessment process. The Fraud Risk Framework also identifies leading practices for conducting fraud risk assessments and documenting the program’s fraud risk profile, as illustrated in figure 8. As discussed in the Fraud Risk Framework, the fraud risk profile provides a basis for managers to develop and document an antifraud strategy that describes the program’s approach for addressing prioritized fraud risks identified. According to ACF, there is currently a process in place at the ACF level that will lead to the development of a Fraud Risk Assessment. Specifically, ACF is in the process of developing a Fraud Risk Assessment template, which will include a program fraud risk profile. The CCDF will be part of the pilot program for this effort. The Fraud Risk Assessment template will consider the Fraud Risk Framework as well as guidance contained in OMB Circular A-123, Management’s Responsibility for Enterprise Risk Management and Internal Control, according to OCC officials. These officials also stated that ACF will leverage its previously developed and implemented risk assessments, including the Program Risk Assessment that was completed for the CCDF between fiscal years 2011 and 2016 as part of the HHS Program Integrity Initiative. However, according to ACF, the development of a Fraud Risk Assessment template is currently on hold due to competing priorities. The ACF stated the agency expects to resume the process by December 2019, and OCC expects that the draft template will be completed by the end of the first quarter of fiscal year 2020. Because the CCDF is serving as the pilot for the new template, OCC expects that the initial assessment of the program will be complete by the end of the third quarter of fiscal year 2020. Until ACF finalizes its template and conducts a risk assessment for the CCDF, ACF will not be able to develop a fraud risk profile for the CCDF. The fraud risk profile is an essential piece of the antifraud strategy and informs the specific control activities managers design and implement. Although there is currently a process in place for ACF to develop a fraud risk assessment template, until ACF carries out the assessment of the CCDF and develops an associated fraud risk strategy, it will lack assurance that OCC’s program-integrity activities are suitable and targeted at prioritized fraud risks. Both state lead agencies and OCC play an important role in overseeing and protecting the integrity of the CCDF program. However, OCC has not finalized written policies that describes how staff should implement or document the State Plan review and approval process, which is an important part of OCC’s oversight of the CCDF program. OCC’s lack of established written policies limits its ability to ensure that staff follow appropriate protocols when implementing the State Plan review and approval process, and limits its ability to retain organizational knowledge in the event of staff turnover, which OCC noted as occurring during each review period. In addition, most of the State Plans submitted to OCC for the fiscal years 2019–2021 grant period did not contain information on the results of their states’ program-integrity activities. OCC also has not defined or communicated what it considers to be the “results” of program- integrity activities for states, which are requested to include this information in State Plans, or for its staff who will be responsible for analyzing this information. Until OCC defines its informational needs regarding program-integrity activity results and communicates this information to the states and its own staff, OCC may continue to lack quality information to help ensure states’ accountability of their program- integrity activities. Further, OCC does not have documented criteria to guide the review of the CAPs to ensure the proposed corrective actions are aimed at root causes of improper payments and are effectively implemented to prevent and reduce improper payments. Without criteria for its staff to use in reviewing the CAPs, OCC does not have assurance that the corrective actions a state proposes to reduce improper payments will be specifically aimed at root causes of improper payments and effectively implemented, leaving the CCDF program at continued risk of improper payments. OCC also does not have written policies for its CAP follow-up process or documentation that follow-up has been completed for past CAPs. In addition, OCC officials told us that they plan to develop a written protocol for this process, but did not specify a timeline for completion. Having established written policies for the CAP follow-up process will help ensure that OCC’s oversight and monitoring of CAPs is carried out consistently. OCC’s Monitoring System process does not currently contain criteria to assess the effectiveness of states’ program-integrity control activities, including fraud-fighting activities. Without developing and documenting criteria to assess whether states’ program-integrity control activities are effective, OCC cannot ensure that such program-integrity control activities are effective. In addition, OCC does not plan to collect any data from its technical-assistance tools that could potentially help it to monitor and evaluate the effectiveness of states’ program-integrity activities. However, OCC has not evaluated the benefits of using these tools to collect information on program-integrity activities against any costs of doing so— such as the cost of seeking OMB approval to do so. By not evaluating the feasibility of collecting information from technical-assistance tools to monitor the effectiveness of states’ program-integrity control activities, OCC may be missing an opportunity to help states adapt control activities to improve their fraud risk management. All of the foregoing program-integrity oversight and monitoring activities could contribute to a strategy for managing fraud risks in the CCDF. However, OCC has not completed a fraud risk assessment or risk profile for the program. Although there is currently a process in place for ACF to develop a fraud risk assessment template, until ACF completes this template and carries out the assessment of the CCDF, it will lack a robust antifraud strategy and assurance that OCC’s current program-integrity activities are suitable and targeted at prioritized risk. We are making the following nine recommendations, eight to the Director of OCC and one to the Assistant Secretary for ACF: The Director of OCC should establish internal written policies to effectively implement and document the State Plan review and approval process for future review and approval periods. (Recommendation 1) The Director of OCC should define the informational needs related to the results of program-integrity activities. (Recommendation 2) The Director of OCC should communicate externally to the states its informational needs related to the results of states’ program-integrity activities. (Recommendation 3) The Director of OCC should communicate internally to staff its informational needs related to the results of states’ program-integrity activities. (Recommendation 4) The Director of OCC should develop documented criteria to guide the review of CAPs submitted by states to ensure that proposed corrective actions are aimed at root causes of improper payments and are effectively implemented. (Recommendation 5) The Director of OCC should timely complete its effort to develop established written policies for the CAP follow-up process to ensure that OCC’s oversight and monitoring of CAPs is carried out consistently. (Recommendation 6) The Director of OCC should develop and document criteria to assess the effectiveness of states’ program-integrity control activities. (Recommendation 7) The Director of OCC should evaluate the feasibility of collecting information from the Grantee Internal Controls Self-Assessment Instrument (Self-Assessment Instrument) and Fraud Toolkit, such as during its Monitoring System process, to monitor the effectiveness of states’ program-integrity control activities. (Recommendation 8) The Assistant Secretary for ACF should ensure that ACF conducts a fraud risk assessment to provide a basis for the documentation and development of an antifraud strategy that describes the CCDF program’s approach to address prioritizing fraud risks identified. (Recommendation 9) We provided a draft of this report to HHS for review and comment. In its comments, reproduced in appendix I, HHS concurred with our recommendations. HHS also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services and appropriate congressional committees. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Jonathon Oldmixon (Assistant Director), Erica Varner (Analyst in Charge), Yue Pui Chin, and Daniel Dye made key contributions to this report. Other contributors include James Ashley, Maria McMullen, George Ogilvie, and Sabrina Streagle.", "summary": "The CCDF is administered as a block grant to the states by OCC, an agency within the Department of Health and Human Services (HHS). Recent reports by the HHS Office of the Inspector General show that OCC's monitoring of CCDF state program-integrity efforts remains a challenge. CCDF has also been designated as a program susceptible to significant improper payments, as defined by the Office of Management and Budget. GAO was asked to review CCDF program-integrity efforts. This report discusses, among other things, the extent to which OCC provides oversight of (1) states' CCDF program-integrity activities, including encouraging that all requested information is included within State Plans; and (2) improper-payment risks and relevant corrective actions in states' CCDF programs. GAO analyzed 51 approved CCDF State Plans, including from the District of Columbia, for the fiscal years 2019–2021 grant period. GAO also reviewed OCC policies and procedures and compared them to relevant laws, regulations, and Standards for Internal Control in the Federal Government , and interviewed relevant federal officials. The Child Care and Development Fund (CCDF) provided states more than $8 billion in federal funds in fiscal year 2019. The Office of Child Care (OCC) oversees the integrity of the CCDF, which subsidizes child care for low-income families. A key part of OCC's oversight includes reviewing and approving State Plans. OCC requested but did not require states to describe in their State Plans the results of their program-integrity activities, which describe the processes that states use to identify fraud risk. Further, OCC has not defined or communicated what information it considers to be the “results” of program-integrity activities to the states and its own staff. Without defining and communicating its informational needs, OCC may continue to lack quality information that could help ensure states' accountability over their program-integrity activities. OCC oversees states' improper payment risks through a process that includes a requirement for states to submit corrective action plans (CAP) when they estimate their annual payment error rates are at or above 10 percent. Since 2013, seven states have submitted 14 CAPs. These CAPs describe states' proposed actions for reducing improper payments. However, OCC does not have documented criteria to guide its review and approval of the CAPs to ensure the proposed corrective actions are aimed at root causes of improper payments and are effectively implemented. Without developing this guidance, OCC does not have assurance that proposed corrective actions are specifically aimed at root causes of improper payments, leaving the CCDF program at continued risk of improper payments. GAO is making nine recommendations, including that OCC define and communicate its informational needs on the results of states' program-integrity activities, and that OCC develop criteria to guide the review of CAPs to ensure that proposed corrective actions are aimed at root causes of improper payments and are effectively implemented. HHS concurred with our recommendations and provided technical comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "According to the Senate Committee on Homeland Security and Governmental Affairs report concerning PMIAA, the purpose of PMIAA is to improve program and project management in certain larger federal agencies. The act includes requirements for OMB, OPM, and the 24 agencies listed in the CFO Act. PMIAA requires OMB’s Deputy Director for Management or the designee to, among other things: adopt government-wide standards, policies, and guidelines for program and project management for executive agencies; engage with the private sector to identify best practices in program and project management that would improve federal program and project management; conduct portfolio reviews of agency programs not less than annually, to assess the quality and effectiveness of program management, in coordination with Program Management Improvement Officers (PMIO); establish a 5-year strategic plan for program and project conduct portfolio reviews of programs on our High-Risk List. The two types of portfolio reviews required by PMIAA—the portfolio reviews of agency programs and the portfolio reviews of programs identified as high risk on our High-Risk List—are separate requirements. For purposes of this report, we define programs, projects, and portfolios consistent with how those terms are defined in OMB’s PMIAA strategic plan. OMB defines program as the functions or activities which agencies are authorized and funded by statute to administer and enforce. Programs typically involve broad objectives. OMB views projects as temporary efforts with defined scopes to create products or services to improve the efficient and effective implementation of programs. Because programs are comprised of projects, programs inherently address the projects subsumed within them. Consequently, our discussions of programs throughout this report also pertain to projects. Finally, OMB defines portfolios as organized groupings of programs whose coordination in implementation enables agencies to achieve their objectives. The act also established the Program Management Policy Council (PMPC), an interagency forum for improving agency practices related to program management. OMB’s Deputy Director for Management chairs the PMPC. The PMPC responsibilities include advising OMB on the development and applicability of government-wide standards for program management transparency. Furthermore, the act requires PMPC members “to discuss topics of importance to the workforce,” such as workforce development needs and major challenges across agencies in managing programs. As chair of the PMPC, OMB’s Deputy Director is required to preside at meetings, determine agendas, direct the work, and establish and direct its subgroups, as appropriate. The act requires the PMPC to meet not less than twice per fiscal year. Additionally, OPM’s Director, in consultation with OMB’s Director, is required to issue regulations that: identify key skills and competencies needed for a program and a project manager in an agency; establish a new job series, or update and improve an existing job series, for program and project management within agencies; and establish a new career path for program and project managers within an agency. Overall, OPM’s role in implementing PMIAA is to establish a new job series or update an existing job series by providing the occupational standards that agencies will need to develop a trained and competent workforce with the program and project management experience, knowledge, and expertise to solve management challenges and support agency decision-making. The act requires OPM to establish new—or revise existing—occupational standards in consultation with OMB. Occupational standards are included within OPM’s classification guidance, which is provided to agencies to assist in classifying positions. This guidance helps agencies to determine the proper occupational series, position title, and grade of each position. The act requires OMB’s Deputy Director of Management to oversee implementation of the standards, policies, and guidelines for executive agencies. OMB implemented some PMIAA requirements using existing processes put in place to implement GPRAMA. We previously reported that GPRAMA provides important tools that can help decision makers address challenges facing the federal government, such as the annual reviews of progress on agency strategic objectives conducted during strategic reviews and the implementation of federal government priority goals. Federal government priority goals, also known as cross-agency priority (CAP) goals, are written by OMB in partnership with agencies. GPRAMA requires OMB to coordinate with agencies to develop CAP goals, which are 4-year outcome-oriented goals covering a number of complex or high-risk management and mission issues. For example, OMB directed agencies to align their noninformation technology major acquisition programs with relevant strategic objectives so they could assess progress for the PMIAA required program portfolio reviews concurrent with required GPRAMA strategic reviews. GPRAMA also requires OMB to present a program inventory of all federal programs by making information available about each federal program on a website. Finally, GPRAMA required OMB to establish a number of CAP goals intended to cover areas where increased cross-agency collaboration is needed to improve progress towards shared, complex policy or management objectives across the federal government. OMB uses CAP goals to address issues outlined in the President’s Management Agenda. For example, OMB wrote a CAP goal to improve management of major acquisitions across the government which complements PMIAA and its required activities. PMIAA requires the OMB Deputy Director, as chair of the PMPC, to conduct portfolio reviews of programs from our High-Risk List. The PMPC is also required to review programs we identify as high risk and to make recommendations for actions to be taken by the Deputy Director for Management of OMB or a designee. See figure 1 below for an overview of roles and responsibilities of OMB, OPM, the PMPC, and agencies. Agencies responsible for PMIAA implementation have taken steps to complete some requirements, but actions remain to fully implement the law (see Table 1). OMB met the PMIAA requirement “to establish a five-year strategic plan for program and project management.” The plan OMB developed details three key strategies to implement PMIAA: (1) coordinated governance, (2) regular OMB and agency engagement reviews, and (3) strengthening program management capacity to build a capable program management workforce. The three strategies focus on areas such as clarifying key roles and responsibilities, identifying principles-based standards, and identifying plans for enhancing workforce capabilities. The plan describes the roles and functions of the PMIOs, the PMPC, and the requirements of the agency implementation plans. It outlines a phased approach for implementing PMIAA actions with milestones occurring throughout the 5- year period. We found that OMB followed several strategic planning leading practices in the creation of the PMIAA strategic plan. First, the plan incorporates general goals and objectives for agencies’ implementation of PMIAA with three corresponding strategies explaining OMB’s overall approach. OMB followed a second leading practice by gathering input from stakeholders. OMB staff told us they solicited input from congressional staff, and members of external organizations like the Federal Program and Project Management Community of Practice (FedPM CoP). Agencies’ staff also confirmed to us that they had input into the OMB plan. Third, OMB demonstrated interagency collaboration in its efforts to establish and lead the PMPC and its efforts to work with the FedPM CoP to address any issues identified by agencies. Finally, the plan included a timeline with quarterly milestones to track completion of PMIAA’s activities and to gauge progress toward achieving the desired results of PMIAA. PMIAA required OMB to establish standards and policies for executive agencies consistent with widely accepted standards for program and project management planning and delivery. A consistent set of government-wide program management standards and policies is important because it helps ensure that agencies utilize key program management practices to improve the outcomes of government programs. OMB published in June 2018 a set of standards for program and project management as part of OMB’s PMIAA strategic plan. OMB’s strategic plan directed agencies to apply these 15 standards to internal management processes for planning, implementing, and reviewing the performance of programs and activities. OMB staff told us they decided to develop this set of standards rather than adopt an existing set of consensus-based standards, such as the widely accepted standards for program and project management from the Project Management Institute (PMI). PMI is a not-for-profit association that provides global standards for, among other things, project and program management. The PMI standards are utilized worldwide and provide guidance on how to manage various aspects of projects, programs, and portfolios and are approved by the American National Standards Institute (ANSI). OMB staff told us that they decided not to specifically adopt the PMI standards because they wanted to allow agencies to use a range of standards that agencies had already developed and were using to manage their programs, such as standards developed in-house by NASA for their space flight programs. OMB further directed CFO Act agencies that the 15 standards and application of them should be incorporated or aligned with existing agency-specific program management policies and practices, and tailored to reflect program characteristics. OMB staff told us that they chose the approach to provide more principle-based standards, as opposed to specific standards, to be flexible enough for a range of government agencies to apply them. OMB’s standards are similar in definition to PMI standards, but they are less detailed by comparison. Our analysis of OMB’s standards shows that OMB uses similar definitions for all 10 of PMI’s program management standards and nine out of 10 of PMI’s project management standards, such as risk management and change management. However, OMB program and project management standards are less detailed when compared to PMI’s standards in the following ways: OMB standards do not provide a minimum threshold against which agencies can gauge to what extent they have met each standard. PMI’s Standard for Program Management provides the definition of a standard but also what components are required for an entity to confirm that the standard has been met. For example, meeting the program financial management standard in PMI requires a financial management plan to be developed, along with its related activities. This plan allows entities applying the standard to confirm whether they have met the standard for program financial management or not. OMB’s standards do not distinguish between how the standards apply differently to programs and projects while PMI has separate detailed standards for program management and for project management. The project management standards from PMI provide details on how the standards apply to more granular tasks, such as establishing a quality management or communication plan for a specific project. OMB’s standards do not distinguish between how the standards relate to each other during a program or project while PMI’s Standard for Program Management details how project standards help build on each other during a program. For example, a program scope management plan is needed to determine the type of schedule management planning that is necessary to accomplish the delivery of the program’s outputs and benefits. OMB provides minimal guidance on how standards apply differently across the life cycle of a program or project while PMI’s Standard for Program Management provides information detailing when a specific standard should be utilized in different ways during the life cycle of a program. For example, in the beginning of a program, risk management should be planned and an initial risk assessment created. Later, during program implementation, risk management tasks focus on monitoring, analyzing risk, and responding to risk. If the standards had the additional detail, it would be possible to determine if agencies are meeting them and properly applying them to programs and projects. Our work on the Digital Accountability and Transparency Act of 2014 (DATA Act) standards has emphasized the necessity for a governance structure with a clear set of policies and procedures for developing and maintaining standards over time that are consistent with leading practices. A governance structure is important because it helps ensure that the standards are developed, maintained, adjusted, and monitored over time. The DATA Act is similar to PMIAA because PMIAA gives OMB responsibility to develop standards for program management, and the DATA Act gives OMB and the Department of the Treasury responsibility for establishing data standards for the reporting of federal funds. These standards specify the data to be reported under the DATA Act and define and describe what is to be included in each element with the aim of ensuring that information will be consistent and comparable. Several governance models exist that could inform OMB’s efforts to help ensure that the standards are developed, maintained, adjusted, and monitored over time. These models define governance as an institutionalized system of decision rights and accountabilities for planning, overseeing, and managing standards. Many of these models promote having a common set of key practices that include establishing clear policies and procedures for developing, managing, and enforcing standards. A common set of key practices endorsed by standards setting organizations including the National Institute of Standards and Technology, ANSI, and the American Institute of Certified Public Accountants recommend that governance structures should include the key practices shown in the text box below. Key Practices for Governance Structures 1. Delineating roles and responsibilities for decision-making and accountability, including roles and responsibilities for stakeholder input on key decisions. 2. Obtaining input from stakeholders and involving them in key decisions, as appropriate. 3. Developing and approving standards. 4. Making decisions about changes to existing standards and resolving conflicts related to the application of standards. 5. Managing, controlling, monitoring, and enforcing consistent application of standards. OMB staff told us they did not have any additional documentation about the governance structure used to develop the program management standards and how OMB will further develop and maintain them. We compared available information about OMB’s governance structure for developing and maintaining program management standards to the five key practices on governance structures and found OMB’s governance structure is incomplete in each of the five key practices. OMB has not delineated roles and responsibilities for decision-making and accountability, including responsibilities for stakeholder input on key decisions. OMB’s strategic plan notes that one role of the PMPC is to help further develop the program management standards. However, OMB has not provided information on how roles and responsibilities will be assigned to continue developing standards in the future. Without clearly delineated roles and responsibilities, there is a risk of confusion which could impede action and accountability for future improvements to program management standards. Further, having clearly delineated roles and responsibilities is particularly important during periods of transition when administrations change. OMB has an incomplete plan for how it will obtain input from stakeholders and involve them in decision-making. OMB received input from stakeholders on the standards it developed in 2018, though the strategic plan states that standards will be further developed with the PMPC in the fourth quarter of fiscal year 2020. However, the strategic plan does not give details on how the PMPC and others will further develop standards. Without robust and comprehensive outreach to individuals who will use or otherwise be affected by the standards, the opportunity to learn from stakeholder experience and perspectives, or anyone who will use or otherwise be affected by the standards, may be diminished. OMB has an incomplete process for developing and approving program management standards. OMB developed and approved the existing standards by obtaining stakeholder input and releasing their approved standards in its strategic plan. However, the strategic plan does not provide documentation on how that process was structured and how it will function in the future. Thus, it is unclear how OMB plans to further develop the standards and what responsibilities and resources will be required from OMB, the PMPC, and agencies under the leadership of the agency PMIOs. OMB has not defined a process for making decisions about changes to existing standards and describing how conflicts related to the application of standards would be resolved. Therefore, it is unclear if or how the standards will be periodically reassessed and updated as circumstances change and leading practices in program and project management are identified. Also, lack of consensus on standards and conflict over how to use them can lead to weakened acceptance and inconsistent application. OMB has not defined a process for managing, controlling, monitoring, and enforcing consistent application of standards. OMB has not developed or directed any type of review or oversight process to determine the adequacy of existing or newly developed standards agency use to manage programs. Having such a process could help agencies to achieve a balance between consistent application of standards and flexible application to account for differences in programs, agency missions, and other factors. However, OMB staff told us that they consider the PMIAA program portfolio review process as a way to help monitor and enforce program standards, as they have a view into how each agency is applying standards for their particular portfolio of programs. Additionally, OMB has given agencies flexibility in using existing agency standards and flexibility to adopt or develop new ones. Without a review mechanism, OMB lacks reasonable assurance that agencies’ efforts to use existing standards or develop new ones will align with government-wide efforts to improve program and project management. Also, establishing an approach to monitoring agencies’ efforts would help identify opportunities to improve program management standards. Without having a governance structure for the program standards, the potential exists that standards will develop in an ad hoc manner, may be applied inconsistently or not at all, and may not be updated to reflect new developments in program management. Further, having a governance structure for managing efforts going forward better positions OMB to sustain progress on program standards as they change over time. PMIAA requires agencies and OMB to regularly review portfolios of programs to assess the quality and effectiveness of program management and identify opportunities for performance improvement. To conduct these portfolio reviews, OMB Circular A-11 notes that agencies and OMB are to use a set of broadly applicable program management principles, practices, and standards associated with successful program outcomes, in addition to more specific standards based on the type of program under review. As a way to help agencies acclimate to the requirements of PMIAA, OMB leveraged two components of the GPRA Modernization Act of 2010 (GPRAMA): the strategic review and a cross-agency priority (CAP) goal. OMB guidance stated that agencies’ portfolio reviews of programs would be conducted and integrated to the extent practical with strategic reviews. Furthermore, OMB staff told us that the implementation of PMIAA and the CAP goal for improving management of major acquisitions (CAP Goal 11) shared complementary goals and strategies. For example, the CAP Goal 11 action plan includes the routine monitoring of federal program management progress. Consequently, OMB staff said they decided that the first PMIAA program portfolio reviews would focus on major acquisitions. Excerpt from OMB Cross-agency Priority Goal 11 from 2018 President’s Management Agenda: Improve Management of Major Acquisitions Federal agencies will ensure that contracts supporting transformative and priority projects meet or beat delivery schedules, provide exceptional customer service, and achieve savings or cost avoidance for the taxpayer. The Challenge: Major acquisitions—which vary in size by agency but often exceed $50 million—account for approximately one-third of annual federal spend on contracts. These large contracts frequently support projects meant to transform areas of critical need. Yet major acquisitions often fail to achieve their goals because many federal managers lack the program management and acquisition skills required to successfully manage and integrate large and complex acquisitions into their projects. These short- comings are compounded by complex acquisition rules that reward compliance over creativity and results. The Strategies: Agencies will pursue three strategies: 1) strengthen program management capabilities in the acquisition workforce; 2) use modern and innovative acquisition flexibilities; and 3) track investments using portfolio, program, and project management principles. In 2018, OMB conducted a pilot project involving program portfolio review focused on noninformation technology (IT) major acquisition programs. According to OMB staff, the pilot project gave agencies the opportunity to complete “dry runs” for the PMIAA-required portfolio reviews and to provide lessons learned in anticipation of the fiscal year 2019 portfolio reviews. OMB planned for the results from the pilot to provide information for internal dialogue and decision-making about subsequent portfolio reviews. Further, according to OMB’s strategic plan, the purpose of the pilot was (1) to determine how well agency program portfolios of non-IT major acquisitions were performing throughout the life cycle of the investment using a set of standards and practices, and (2) to refine the process of coordinating program portfolio reviews as a component of OMB agency strategic reviews. For the pilot, OMB staff directed agencies to assess the cost, schedule, and performance of agency-selected acquisition portfolios. One result from the pilot was that agencies demonstrated a range of maturity in their abilities to collect data for these required program portfolio measures from their various departments and program types. OMB staff told us pilot agencies found it easier to compile data on major construction projects compared to service contracts. Consequently, an agency doing many of these projects might be more advanced than an agency for which major acquisitions focus on services. Department of Veterans Affairs (VA) staff shared their lessons learned from their participation in pilot portfolio reviews, as seen in the text box below. OMB staff said that they determined that the portfolio review process worked sufficiently well for the pilot agencies and continued their planned strategy of focusing solely on non-IT major acquisition programs for fiscal year 2019 portfolio reviews. Example of Department of Veteran Affairs (VA) Lessons Learned from Pilot Portfolio Review The VA looked at the effectiveness of portfolio management during the Office of Management and Budget noninformation technology major acquisition pilot portfolio review by focusing on the agency’s adherence to best practices in assessing project performance and progress. VA officials said this pilot informed their decision-making and was successful in the following ways: 1. The pilot helped VA determine logical ways to manage a portfolio by showing what data were helpful to make impactful decisions. 2. VA learned how best to display the data on cost, schedule, scope, and quality of outcomes on a dashboard to make it accessible and comparable across the agency. 3. VA learned that it needs to collect better quality data so that project management principles can be instituted and aligned across the agency. A well-developed and documented pilot program can help ensure that agency assessments produce information needed to make effective program and policy decisions. Such a process enhances the quality, credibility, and usefulness of evaluations in addition to helping to ensure the effective use of time and resources. We have identified five leading practices that, taken together, form a framework for effective pilot design, as seen in the text box below. OMB fulfilled the first leading practice of establishing objectives in its design of the PMIAA pilot program portfolio review. OMB’s PMIAA strategic plan and the CAP Goal 11 Action Plan stated the objectives of the pilot. In addition to the two objectives listed in the PMIAA strategic plan, the CAP Goal 11 Action Plan lists seven pilot objectives, as seen in the text box below. PMIAA Pilot Program Portfolio Review Objectives 1. Perform portfolio management preparation activities 2. Identify first portfolio of major acquisitions 3. Align portfolio with agency strategic goals 4. Collect performance data for each item in the portfolio 5. OMB officials said that they did not structure the pilot to follow the remaining four leading practices for effective pilot design. However, OMB said that it learned that the pilot agencies demonstrated several program management capabilities. They also learned that it would be important to tailor portfolio reviews to the agency and the program to account for significant differences in the types of acquisitions and the level of program management maturity. Despite identifying lessons learned from its pilot program portfolio review, in neglecting to fully follow leading practices, OMB may have missed opportunities to make additional improvements for fiscal year 2019 portfolio reviews. Going forward, as OMB expands the portfolio reviews to other types of program areas beyond non-IT major acquisitions, it has the opportunity to develop and learn from additional pilots. Although OMB staff have not yet determined if they will do additional pilots for program management in the future, they could decide to pilot the portfolio reviews of grants that they plan to initiate in fiscal year 2020. For fiscal year 2019, OMB directed all agencies to select portfolios of non-IT acquisition programs and align them with relevant strategic objectives as part of their internal agency strategic review processes. In spring 2019, OMB expected agencies to discuss one to two of these major-acquisition portfolio reviews during their strategic reviews with OMB. OMB expected agencies to track the cost, schedule, and performance of their selected major acquisition programs. However, OMB reports that not all agency program portfolio reviews were completed because OMB was behind in scheduling the reviews due to the partial government shutdown. According to documents we reviewed and what OMB staff told us, in October 2019 OMB completed agency program portfolio reviews with ten agencies: the Departments of Commerce, Homeland Security, Housing and Urban Development, Labor, and Transportation; the General Services Administration, the Social Security Administration, NASA, the National Science Foundation, and the US Agency for International Development. OMB staff also told us that they also held preparatory meetings with agencies to set expectations for future portfolio reviews. OMB reported that these one-on-one meetings were held with 12 agencies as of October 2019 to discuss their initial portfolio structures and other transformative initiatives. Portfolio reviews in 2020 are to expand in scope to include grants, and also will continue acquisition portfolio reviews as part of the agency’s routine management processes. However, OMB has not yet identified other program areas, such as research and development or benefit programs, to be included in future portfolio reviews. Standards for Internal Control in the Federal Government states that effective information and communication are vital for an entity to achieve its objectives. Specifically, management should externally communicate necessary quality information to achieve its objectives. Increasing communication to agencies about specific program areas, portfolio review procedures, and expectations beyond 2020 could help ensure continued progress to implement PMIAA more broadly. Furthermore, communicating such procedures with specific time frames could help agencies better direct their efforts to improve the portfolio review processes. GPRAMA requires OMB to make a list of all federal programs identified by agencies publicly available, on a central government-wide website. The implementation of the program inventory is a critical tool to help decision makers better identify and manage programs across the federal government. Among other things, the completion of the program inventory would provide agencies and Congress with a comprehensive list of programs, so it would be clear how many programs agencies are managing and how they relate to their strategic objectives and portfolios of programs at each agency. Having a program inventory could also help ensure a match between the number of agency programs and needed program manager resources. Agencies continue to struggle with challenges defining their programs. Officials from three of the five selected agencies we spoke with told us that they have not yet identified all of their programs and projects. In our first report on the program inventory in October 2014, we noted similar issues. For example, agencies were not using the same program definition approach across their subcomponents or offices, which limited comparability of their own programs. We made eight recommendations in that report to the Director of OMB to update relevant guidance to help develop a more coherent picture of all federal programs and to better ensure information is useful for decision makers. As of October 2019, OMB had not taken any actions in response to the eight recommendations. While OMB has provided a timetable for action in its June 2019 A-11 guidance, this does not complete the recommendation. In September 2017, we made two recommendations to OMB to make progress on the federal program inventory. First, we recommended that OMB consider using a systematic approach for the program inventory, such as the one we developed from principles of information architecture. Information architecture—a discipline focused on organizing and structuring information—offers an approach for developing a program inventory to support a variety of uses, including increased transparency for federal programs. OMB staff told us that they considered our information architecture approach and noted that a structured information architecture format is used on USASpending.gov. However, OMB staff told us they had not yet determined how the information architecture format of USASpending.gov—which is focused on spending data—could be used to meet additional information reporting requirements and our past recommendations related to the inventory. We made a second recommendation that OMB should revise and publicly issue OMB guidance—through an update to its Circular A-11, a memorandum, or other means—to provide time frames and associated milestones for implementing the federal program inventory. As mentioned above, OMB did provide a timetable but it does not have milestones. According to the timetable, beginning with the 2021 budget cycle, agencies’ program activities will be used for the inventory’s program-level reporting requirements. This will allow OMB and agencies to present program-level spending data by leveraging what is reported on USASpending.gov as required by the DATA Act. However, OMB’s guidance does not cover other inventory information reporting requirements, or the actions we recommended in October 2014. We will continue to monitor progress. We continue to believe it is important for OMB to implement our program inventory recommendations. Such an inventory could be a critical tool to help decision makers better identify and manage fragmentation, overlap, and duplication across the federal government. Additionally, fully taking action on these recommendations would assist agencies in identifying programs, better prepare for future PMIAA portfolio reviews, and help match resources to agencies’ program management needs. Further, OMB developed three different definitions for what constitutes a “program” or “program activity” that it provided to agencies in its PMIAA, GPRAMA, and DATA Act guidance, respectively. OMB developed each of these definitions independently and in response to three different statutory requirements. OMB staff told us that these three requirements differ in their legislative intent. The definitions and their associated guidance are in the table below. OMB has not reconciled these overlapping, yet divergent, definitions of what constitutes a “program” or “program activity.” According to Standards for Internal Control in the Federal Government, management should ensure that specific terms are fully and clearly set forth so they can be easily understood. Standards for Internal Control in the Federal Government also states that management should design processes that use entities’ objectives and related risks to identify information requirements needed to achieve objectives and address risks. OMB has defined what constitutes a “program” or “program activity” in PMIAA, GPRAMA, and the DATA Act each, but its three different program definitions and approaches to determining what is a “program,” could cause confusion for agencies. Agency officials from the Department of Energy told us they are already experiencing confusion over how to appropriately apply the applicable program definition to identify their programs for PMIAA. Agency officials from Treasury told us that different definitions for programs could contribute to confusion as they work to implement PMIAA within the Department. The inconsistent approaches may increase the burden on agencies as they work to identify, maintain, and report on three sets of differently defined programs. Conversely, clarifying the definitions could help agencies and OMB identify synergies across the three laws and increase transparency. For example, providing explanations of how the term “program” or “program activity” is used across the three statutory definitions and developing a crosswalk to show similarities and differences could provide more clarity for agencies. Then, spending and performance data can be aligned with agency strategic goals, which could be monitored, reviewed, and reported in a streamlined manner. OPM followed PMIAA requirements to create policy and guidance. Specifically, according to documents we reviewed, OPM (1) worked with subject matter experts to develop program and project management skills and competencies, (2) updated the program management 0340 job series and created guidance for identifying project management positions, (3) plans to release a career path for program and project managers by the end of calendar year 2019, and (4) plans to create a unique job identifier code that can be used to pinpoint program and project managers in any job series. These efforts will form the foundation needed by agencies to strengthen resource and talent management. Competency modeling. Since enactment of PMIAA, OPM identified skills and competencies which will be required for program and project managers. According to documents we reviewed, OPM met with subject matter experts and human capital staff in agencies to help identify the skills needed to develop the competency model. OPM also conducted a literature review looking at prior competency studies and industry practices to help identify and support program and project management competencies. OPM also drew from Project Management Institute resources, such as the Project Management Body of Knowledge and the Standard for Program Management, as part of identifying its competencies. The resulting competencies are in two categories: general and technical. General competencies focus on interpersonal or general on-the-job skills such as teamwork and problem solving. Technical competencies more narrowly focus on particular skills needed to run programs and projects, such as risk management and cost-benefit analysis. OPM documents stated that agencies will need to determine the applicability of these competencies to positions within their agency. Agencies must determine if staff meet the competencies, and if not, staff will have the opportunity to develop them or must move to a different job series, according to OPM staff. OPM staff also said additional competency assessment steps are needed to finalize the model. Agencies will be given time to consider the competency model. In addition, OPM will use subject matter expert panels to further develop the model, according to OPM documents we reviewed. Updated job series. To implement job series requirements in PMIAA, OPM staff conducted an occupational study and determined that pre- existing classification policy was sufficient for classifying program management work rather than creating a new job series classifying program management positions, according to OPM staff. Prior to OPM updating the program management 0340 job series for PMIAA, the classification standard was not developed, as it did not contain competencies describing what qualifications staff were required to meet as a program manager. In May 2019, OPM released the updated job series classification guidance designed to assist agencies in determining which employees fit in the job series. OPM also released guidance for classifying project managers to help agencies specifically identify project managers in any occupational job series. According to the memorandum sent by the Acting Director of OPM to agencies with the OPM classification guidance, agencies are required to implement the policy and guidance to covered positions by May 1, 2020. Career path. OPM staff told us that they have developed a career path for program and project managers that is currently in internal review. They said that the value of the updated career path is that it will highlight training and skills needed to progress in a program management career. According to the presentation given by OPM at the 2019 April PMPC meeting, the career path will contain: (1) a career progression outline for employees to move among and across jobs in program and project management, (2) help for employees and supervisors to plan and sequence appropriate career training and development for each general and technical competency, and (3) a list of common degrees and certifications completed by program and project managers, among other things. Staff told us they plan to release the program and project management career path for agency comment by the end of calendar year 2019. Job identifier for program managers and project managers. Because program and project managers are found in other job series outside the 0340 program management series, OPM is developing a job identifier code that can be attached to any job series for the purposes of identifying program and project managers. OPM staff told us that program managers classified to the 0340 series means that the position does not have a specialization. If the position requires specialized expertise, the position would be classified to a specialized occupational series but would also have a program management job identifier code. For example, since a grants managers is also a program manager, “grants manager (program management)” would be his or her official title. Project management positions will also use a job identifier to identify project managers in any occupational series. The job identifier will allow employees with a specialization to be designated program and project managers, while still maintaining their original career path. OPM staff told us they plan to complete this project in 2020. Our analysis of OPM Enterprise Human Resources Integration data shows that the 0340 job series included about 15,000 employees across all 24 CFO Act agencies in fiscal year 2018. However, OPM reported that not all employees in this job series are actually program and project managers; conversely, many program and project managers are working outside of the 0340 job series. Selected agencies reported varying degrees of difficulty identifying program and project managers. For example, NASA staff reported that they were able to identify almost all their program and project managers. In contrast, the Department of the Treasury reported that it faces challenges identifying the number of program and project managers outside of the program management job series, as this would require a resource-intensive manual effort, made more challenging by the agency’s large, complex, and decentralized structure. The Department of Energy (DOE) staff said they have not completed the count of their program managers. The Departments of Commerce and Veterans Affairs also report they do not know the number of program and project managers in their departments, respectively. The Department of Commerce staff told us that they cannot accurately identify the number of program and project managers until they can use the job identifier that they expect OPM to release in 2020. Further, Commerce officials told us they are also continuing to work to identify program managers and engaged the Project Management Institute (PMI) to request a list of those within Commerce who have the Project Management Professional (PMP) certification. PMI was able to provide Commerce details about the numbers of PMPs at Commerce, but PMI declined to share the names of those individuals with the PMP certification. In OPM’s 2018 Federal Workforce Priorities report, OPM recognizes that not all agencies have adequately analyzed workload demands, staffing levels, or current and future skills needs—all steps in workforce planning. As part of the OPM human capital framework, agencies are required to develop a human capital operating plan which is an agency’s human capital implementation document. These plans are to describe how agencies will execute the human capital strategies needed to implement the agency’s strategic plan and Annual Performance Plan (APP). Agencies are also required to include program specific strategies (e.g., hiring, closing skills gaps, etc.) in the APPs as appropriate. Effective workforce planning can help agencies focus on determining how many program and project managers they have, how many they may need, what skills gaps exist, and what training and other strategies can help address skills gaps. OPM’s workforce planning model is comprised of five steps: 1. Set strategic direction; 2. Analyze workforce, identify skills gaps, and conduct workforce 3. Develop action plan; 4. Implement action plans; and 5. Monitor, evaluate, and revise. The discussion below describes how OPM and agencies are working to strengthen the program management workforce in the context of OPM’s workforce planning model. Some activities may span more than one phase of workforce planning. Set strategic direction. The PMIAA strategic plan establishes direction for agencies to build its program management capacity and capability with its third strategy, “Strengthening Program Management Capacity to Build a Capable Program Management Workforce.” Setting strategic direction also involves linking work activities to the objectives of a strategic plan. OPM’s planned activities, such as updating the classification standards and creating a job identifier, are critical to executing this strategy so agencies can identify their workforce and build program management capacity through training, career paths, and mentorship opportunities. Analyze workforce, identify skills gaps, and conduct workforce analysis. OPM and agencies are in the early stages of identifying who their program and project managers are and what human capital strategies might be needed to address agencies’ needs. Documents we reviewed showed that OPM also worked with the Chief Human Capital Officers Council, the Chief Administrative Officers Council and others to develop competencies. These competencies provide a foundation for the subsequent assessment of program and project manager skills. Develop action plan. In their PMIAA implementation plans, some agencies have identified available training and possible recruitment and hiring strategies. In OPM’s model, agencies need to complete their workforce analysis before they can develop their action plans. Implement plan. This step is dependent on agencies developing action plans. However, OPM and agencies have already started to develop staff in the absence of plans. For example, OPM is working with agencies to identify program management training matching desired competencies to be placed in an online training repository that will be accessible to all agencies. OPM staff told us that agencies would provide the trainings from their learning management systems and offer them for interagency access. OPM is developing this training and development repository which will house agency-owned courses and also identify mentors in project and program management, according to OPM staff. OPM will house the repository on its training and development policy wiki at https://www.opm.gov/wiki/training/index.aspx. Each PMIO is to also establish a website with agency-specific program management tools and resources. Additionally, OMB recognized that the Federal Program and Project Management Community of Practice (FedPM CoP), scaled up from a community of practice housed in DOE, could be an important partner in supporting PMIAA implementation. As of April 2019, more than 1,000 managers had joined the FedPM CoP as indicated in its briefing to the PMPC. The FedPM CoP has identified several project management-related documents that are now available on the PMIAA portal. To further develop program managers, OMB is working with agencies to improve mentoring and recognition efforts. To improve mentoring government-wide, OMB reports that PMIOs will work with agency chief human capital offices to develop and implement a mentoring strategy for agency program managers. OMB also plans to take existing mentorship programs established in more functionally aligned-management fields (e.g., information technology, acquisition) and expand them to include a broader range of management career paths. To improve recognition efforts in acquisitions, the Chief Acquisition Officer Council plans to establish an annual award to recognize federal program manager excellence. Monitor, evaluate, and revise. This step cannot begin until agencies develop and implement their workforce action plans. As agencies begin to monitor their implementation of these plans, they will need to determine if any skills gaps exist in the program and project manager occupational series. OPM regulations require agencies to describe in their human capital operating plans agency-specific skills and competency gaps that must be closed through the use of agency selected human capital strategies. Agencies must also have policies and programs that monitor and address skills gaps within government wide and agency-specific mission-critical occupations. OPM has not yet determined if program and project management occupations are experiencing mission-critical skills gaps across the government, and OPM staff noted that agencies are not specifically required to report program and project manager skills gaps in their annual human capital operating plans. OMB and OPM both missed statutory deadlines to fulfill requirements in PMIAA. In June 2018, OMB issued the required PMIAA agency implementation guidance in the PMIAA strategic plan, 6 months after the statutory deadline of December 2017. According to OMB staff, this delay was due to their own research project to (1) build sufficient knowledge in program and project management; and (2) increase stakeholder support in Congress and with agencies for its approach. Specifically, OMB met with experts from PMI, academics, consulting firms, federal chief senior level officer (CXO) councils, and other agency officials to increase its own understanding of program and project management principles. OMB staff told us that they used the collected information to draft initial guidance, which they then shared with congressional stakeholders and executive branch agency officials to obtain feedback and incorporate changes. OMB staff also told us that it was a transition year from one administration to another administration, and this transition was an additional factor in delaying completion of the guidance. None of the selected agencies’ staff identified an impact from the delayed guidance. OPM officials told us they missed the statutory deadline to complete their required activities after the issuance of OMB guidance. The release of the policy and guidance was due to the partial government shutdown from December 22, 2018 to January 25, 2019, along with a 3-month delay due to OPM’s own internal review and clearance process. As a result, OPM released the key skills and competencies needed for program and project management on April 5, 2019, and the classification guidance for the program manager job series 0340 and project manager interpretative guidance on May 2, 2019. OPM officials told us that agencies have 1 year from the date of issuance to comment on any language in the guidance. None of the selected agencies’ staff identified an impact from OPM’s delays, although one agency expressed concern that the pace of their efforts to identify program and project managers is dependent on OPM completing the job identifier. Figure 2 shows the delays in releasing OMB and OPM guidance. OMB officials established the PMPC in 2018 and fulfilled requirements that it meet at least twice per year. By September 2018, the 24 CFO Act agencies had all appointed a PMIO and held three PMPC meetings, in September 2018, April 2019, and September 2019. Selected agenda items for these PMPC meetings included: status updates on OPM completing program and project manager competencies, job series, and career path; breakout sessions to discuss PMIAA implementation approaches with discussion of PMPC priorities and focus for 2020. At the April 2019 PMPC meeting, for example, staff from the Department of Veterans Affairs and the National Science Foundation shared some best practices, such as how to improve the tracking performance of portfolios, programs, and projects. According to OMB documents we reviewed, OMB plans to: convene the PMPC in the first quarter of each calendar year to prepare for upcoming OMB and agency strategic review meetings; use the PMPC meeting in the third quarter of the calendar year to review findings and outcomes from the most recent strategic review; update program and project management standards based on its findings and feedback at the PMPC meeting in the fourth quarter of 2020; use the PMPC to develop revised strategies, initiatives, and priorities to be reflected in an updated 5-year strategic plan at the PMPC meeting in the fourth quarter of 2021; and use the PMPC to focus on improving our high-risk areas at some future point. At the September 2019 PMPC meeting, OMB informed agencies of PMIAA implementation resources placed on OMB’s online portal for PMIAA and discussed OMB’s observations on portfolio reviews completed in 2019. One observation was the need to reinforce better visualization of performance data. In addition, OPM updated the PMPC on the status of its required PMIAA workforce efforts. The PMPC decided its primary focus for the year 2020 should be on the third strategy of the PMIAA strategic plan to build a capable workforce. Officials from the selected agencies that we interviewed provided us some suggestions on how OMB can improve the functionality of the PMPC. Table 3 illustrates the range of these suggestions: The PMPC met twice in 2019, as required by PMIAA, and has not established any working groups to help execute its significant responsibilities to share leading practices, develop standards, and help improve the workforce. Agencies have taken initial steps to incorporate requirements into program efforts. According to OMB guidance, agencies were to report in implementation plans how they are institutionalizing PMIAA efforts— especially PMIO responsibilities—into existing program and project management practices. OMB requested that agencies include 10 specific elements in their implementation plans, such as: identification of the agency PMIO, identification of major acquisition portfolios, and strategies and actions for enhancing training and improving recruitment and retention of program and project managers. These plans were due to OMB by November 30, 2018. We reviewed PMIAA draft implementation plans for 22 of the 24 CFO Act agencies and determined the extent to which agencies included the required elements in their plans. In its PMPC meeting in April 2019, OMB reported that a majority of agencies only partially included OMB requirements in their draft implementation plans. OMB told us they have not directed agencies to address missing requirements nor have they required agencies to finalize their draft implementation plans. They told us that they view the implementation plans as an opportunity for each agency to engage with OMB and discuss how they will implement PMIAA. OMB staff told us that their view is that if implementation plans provide value to agencies, they may stay in draft form and do not need to be final. Overall, draft implementation plans for these agencies provided some but not all information required to fully meet the directives from OMB. Our analysis of the plans shows that on average, agencies fully met six out of 10 requirements for their implementation plans. For example, almost all agencies met the requirements for identifying the PMIO (21 out of 22). However, 11 out of 22 agencies did not provide complete information on major acquisition portfolios. Table 4 shows how agencies’ implementation plans varied in meeting the requirements. Seven of 24 agencies reported in our questionnaire that they were creating either task forces or new or restructured offices to direct PMIAA implementation within their agencies. For example, DOE reported establishing a new office to support its PMIO. The Department of the Treasury and NASA reported creating an intra-agency cross-functional core team to discuss and design PMIAA implementation strategies. OPM reported establishing an enterprise program management office to drive the standardization of program and project management processes internally. Agencies selected PMIOs in existing leadership positions to leverage resources and agency processes to implement PMIAA. All agency PMIOs reported having additional leadership responsibilities beyond their PMIO roles. OMB documentation and information gathered from CFO Act agencies shows: every PMIO has at least one additional CXO role within its agency; thirty-eight percent of PMIOs have an additional performance management role; eight of 24 PMIOs have an additional budgetary role; and four of the 24 PMIOs have an explicit additional program or acquisition role. In the past, we have met with senior management officials from OMB and applicable agencies to discuss where additional management attention could be beneficial to addressing high-risk areas identified on our High- Risk List. We also reported that these trilateral meetings, which began in 2007 and pre-dated PMIAA’s 2016 enactment, have continued across administrations and have been critical for progress that has been made in addressing high-risk areas. According to PMIAA, OMB’s Deputy Director of Management is to conduct annual portfolio reviews of the most at-risk agency programs, as designated by our High-Risk List. OMB officials view the trilateral meetings as their method for holding the portfolio review meetings for high-risk areas as required under PMIAA. Our High-Risk List is comprised of programs as well as functions and operations. Consequently, in our assessment of OMB’s implementation of PMIAA, we consider programs, functions, and operations on our High-Risk List as relevant for OMB’s portfolio review of areas on our High-Risk List. OMB used three strategies intended to meet PMIAA’s high-risk requirements. OMB (1) expanded its strategic reviews in 2018 to include a review of some high-risk areas, (2) continued to use the long-standing trilateral meetings to review high-risk areas with agency leaders and with us, and (3) held ad hoc meetings with agencies outside of the strategic review and trilateral meetings. In preparation for the 2018 strategic reviews, OMB issued Memorandum M-18-15 directing agencies to provide several items in advance of their strategic review meetings with OMB. Requested items included updates from agencies on areas identified on our High-Risk List in which agencies disagreed with our recommendations or faced implementation barriers preventing progress. These materials were to be discussed during strategic review meetings. Thirteen CFO Act agencies reported submitting high-risk updates to OMB prior to these meetings, and eight agencies reported discussing their high-risk areas with OMB during the meetings. OMB guidance from June 2019, communicated in OMB’s Circular No. A- 11, did not include the statement from Memorandum M-18-15 that high- risk areas would be discussed during strategic review meetings. OMB staff felt that a broader approach could yield better results for addressing high-risk areas. Guidance in Circular No. A-11 maintained that agencies should submit updates about high-risk programs to OMB for the Deputy Director’s high-risk portfolio review, but it did not specify what should comprise agency updates about high-risk programs. Also, OMB staff told us that they requested that agencies provide topics for discussion at strategic review meetings, and that agencies could provide agenda items related to our High-Risk List. OMB staff said they addressed only a few of the high-risk issues during strategic reviews, both during the review process and the strategic review meetings. Discussions about high-risk issues during strategic review meetings generally focused on government-wide high-risk areas, if relevant, such as “Ensuring the Cybersecurity of the Nation” and “Improving the Management of Information Technology (IT) Acquisitions and Operations.” However, OMB and agencies also discussed high-risk areas in instances when agencies provided strategic review meeting agenda topics related to our High-Risk List. For example, Treasury staff told us they spoke with OMB this year about high-risk areas as part of the strategic review process. Treasury is directly responsible for the Enforcement of Tax Laws high-risk area and shares responsibility with other agencies for other high-risk areas, such as the government-wide areas on cybersecurity and strategic human capital. OMB has held a limited number of trilateral meetings with agencies and us about high-risk areas as part of the high-risk portfolio reviews. Between March 2018 and October 2019, OMB addressed the following five high-risk areas in trilateral meetings with applicable agencies and us: 2020 Decennial Census, Managing Federal Real Property, Government-wide Personnel Security Clearance Process, Ensuring the Cybersecurity of the Nation, and NASA Acquisition Management. OMB has not held meetings to address the remaining 30 high-risk areas on our High-Risk List. OMB staff told us they plan to hold additional meetings in the next year but that they are unlikely to be able to schedule all remaining meetings within our 2-year cycle for updating the High-Risk List. OMB staff said that it is sometimes challenging to coordinate and convene trilateral meetings given the high-ranking officials who must attend and finding available times across schedules. OMB also told us that they plan to meet with agencies for all high-risk areas eventually, but that they prioritize meetings aligned with our priority areas and the President’s Management Agenda. We evaluate progress made on high-risk areas every 2 years to determine if new areas should be added to our High-Risk List and if areas on the list should be removed due to progress to address the risks. Top leadership commitment is one of the five criteria we use to assess whether progress is being made to address and ultimately remove areas from our high-risk list. As we have reported in our March 2019 High-Risk Series report, leadership commitment is the critical element for initiating and sustaining progress, and leaders provide needed support and accountability for managing risks. Leadership commitment is vital if agencies are to adequately address high-risk areas, and trilateral meetings have been critical in focusing leadership attention in the past. Because OMB officials have met on only five of 35 high-risk areas, it remains to be seen if they will meet on all high-risk areas in the future. Convening the trilateral meetings on all high-risk areas in the 2-year reporting cycle, would better position OMB to enhance the leadership commitment needed to make greater progress on the remaining high-risk areas. Staff from OMB said that they sometimes have briefings related to agencies’ high-risk areas separate from the annual strategic review meetings and high-risk trilateral meetings. These meetings happen on an ad hoc basis and are typically initiated by agency officials. Officials from some of our selected agencies corroborated that the discussion at the strategic review meetings and trilateral meetings is not the full extent of OMB’s interaction with agencies about high-risk areas throughout the year. For example, VA officials said that high-risk areas are frequently agenda items in meetings with OMB. NASA officials said they spoke with OMB about NASA’s high-risk areas after submitting material as part of the strategic review process. The PMPC, chaired by the Deputy Director for Management of OMB, did not address our High-Risk List during its three meetings nor did it make recommendations to OMB about addressing high-risk areas, as required. The PMPC meetings have lasted 60 to 90 minutes each and the High-Risk List has not appeared as an item on any of the PMPC meeting agendas. OMB staff said PMPC meetings at this point in PMIAA implementation primarily act as forums in which agencies can share program management practices. Rather than focusing meeting time on high-risk areas, OMB staff asserted that the best use of the PMPC is primarily as a forum for agencies to share program and project management best practices. Consequently, the PMPC has not satisfied all PMPC requirements as delineated in PMIAA, including for high-risk areas to be addressed. OMB created a dashboard to identify measures of cost, schedule, and performance that agencies should use to track their selected non-IT major acquisition programs for the first PMIAA program portfolio review. OMB partnered with the General Services Administration to complete a prototype of a dashboard to show cost, schedule, and performance data from each program or project within a portfolio of programs. The dashboard also provides a short description of each program or project and its strategic alignment to the agency’s relevant strategic goal. Staff from OMB’s Office of Federal Procurement Policy said the dashboard could provide them with some visibility and improved transparency for major acquisitions programs. According to the PMIAA strategic plan, the dashboard would display the agency portfolio and summarize performance for each item in the portfolio, similar to the portfolio reviews of IT programs required by the Federal Information Technology Acquisition Reform Act. Initially, according to OMB, it plans to request summary information for each portfolio, and restrict the dashboard to authorized government employees. Moving forward, OMB staff said that as the portfolio management process matures, a portion of the dashboard may be available to the public, similar to the IT dashboard. OMB staff told us they are in conversation with agencies about how to overcome difficulties in collecting data for the dashboard. According to OMB, the results from the pilot portfolio review showed that agencies experienced challenges with collecting high-quality data. OMB staff said there will likely be more metrics for large construction projects because management practices for them are more mature than for other types of programs, such as services. OMB is working with agencies to see how they can retrieve cost, schedule, and performance data that could provide early warning indicators of potential problems with programs. Agencies reported in our questionnaire they are considering various ways to measure implementation of PMIAA. A little more than half of agencies responding to our PMIAA questionnaire provided ideas on how to measure implementation of PMIAA, such as tracking completion of their identified PMIAA milestones, developing their own survey as a baseline measure, or using their agency implementation plan outcomes to measure results. Six agencies’ questionnaire responses noted that they are planning to use existing metrics to assess program performance, either through internal processes or their annual strategic review process. For example, Treasury plans to focus in the near term on tracking completion of milestones of PMIAA implementation, such as major program and project alignment to department strategic objectives, development of an information-sharing site for program and project management resources, and workforce capabilities, among other things. VA anticipates developing outcome measures associated with successful program execution and is leveraging measures from existing plans, such as their Acquisition Human Capital Plan. OMB staff told us that they have no plans to identify measures to assess outcomes of PMIAA because it is too early and agencies are in the early stages of implementation. Rather than tracking anything specific, they told us that OMB looks at whether agencies’ PMIOs are engaged, if agencies are using training material and mentorship programs, the involvement of chief senior level officers, and if there is funding in the budget for program management certificate programs. However, OMB has not identified specific measures to track any of these areas. In collaboration with OMB, VA developed a program management maturity model survey identify capability gaps, obtain insights, and enable benchmarking of program management capabilities. It surveyed agencies’ level of maturity on a range of program management capabilities, such as talent management, governance, and portfolio management. Maturity assessment surveys can be useful tools for measuring progress to develop capacity in areas such as program management, according to subject matter specialists. Periodically measuring maturity can help agencies institutionalize continuous assessment and improvement. PMI also supports using such tools to identify trends that can help pinpoint actions needed and opportunities to learn from more mature organizations. We have found that ongoing performance measurement can serve as an early warning system to management and as a vehicle for improving accountability to the public. We have previously reported that providing baseline and trend data can help to assess an agency’s performance more fully because the data show progress over time and decision makers can use historical data to assess performance. As OMB and agencies move forward with PMIAA implementation, it will be critical to measure how agencies are maturing or building their capacity in the areas of program and project management. Such measures could include showing how OMB’s program management standards and principles are integrated into agencies’ programs and policies, the improvement of data quality used to track agency program outcomes in the program portfolio reviews, and improvement in program manager skills. Although not required by PMIAA, it is a good practice for OMB and agencies to consider ways to measure the effects of the act. Without establishing such measures to assess PMIAA outcomes, it will be challenging to gauge how agencies are making progress to identify trends, or to help agencies improve data quality. The program and project management standards OMB developed are less detailed than accepted standards and are missing several elements that would have made them more useful. For example, the OMB standards do not provide a minimum threshold against which agencies can gauge to what extent they have met each standard. Further, OMB’s current governance structure is insufficient for further developing and maintaining program management standards. Although OMB received input from stakeholders to develop the standards and plans to update them in partnership with the PMPC in 2020, OMB does not have a governance structure that assigns roles and responsibilities to further develop, approve, maintain, or monitor standards. Having such a governance structure for managing efforts going forward could help sustain the program standards as they change over time. OMB did not follow most leading practices for designing pilots and may have missed opportunities to make improvements for fiscal year 2019 portfolio reviews. OMB has not determined if it plans to conduct additional pilot efforts. Going forward, as OMB expands the portfolio reviews to other types of program areas beyond non-IT major acquisitions, it has the opportunity to develop and learn from additional pilots. Although OMB staff have not yet determined if they will do additional pilots for program management in the future, they could decide to pilot the portfolio reviews of grants that they plan to initiate in fiscal year 2020. OMB has not identified other program areas beyond non-IT major acquisitions and grants to be included in future portfolio reviews. Communicating to agencies about specific program areas, portfolio review procedures, time frames, and expectations beyond 2020 could help agencies better direct their efforts to improve the portfolio review processes and help ensure continued progress to implement PMIAA more broadly. As of October 2019, OMB had not taken any actions in response to the recommendations in our September 2017 report and has not yet fully established an inventory of federal programs. Such an inventory of programs could be a critical tool to help agency officials identify and manage programs across the federal government. Furthermore, if OMB were to fully implement our recommendations and complete the required inventory of federal programs, it would assist agencies to match resources to agencies’ program management needs and assist agencies in preparing for future PMIAA portfolio reviews. Furthermore, OMB provides three different definitions for a “program” in its guidance for PMIAA, GPRAMA, and the DATA Act. Having different definitions of what constitutes a program could lead to confusion among agencies. It could also cause increased burden on agencies as they work to identify, maintain, and report on three sets of differently defined programs. Meetings between OMB, relevant agencies, and us have been critical for past progress on high-risk areas. However, OMB has held these trilateral meetings to address only five of 35 high-risk areas since it began implementing PMIAA. These meetings could both demonstrate and improve the commitment of agency leadership to high-risk areas across the federal government. As we have reported, leadership commitment is a key tenet in agencies’ ability to address high-risk areas. Without convening trilateral meetings on each high-risk area, OMB might miss opportunities to make progress toward addressing high-risk areas by improving leadership commitment to addressing them. The PMPC did not address our High-Risk List during its meetings nor has it made recommendations to OMB about high-risk areas. The High-Risk List has not appeared as an item on any of the PMPC meeting agendas. OMB staff asserted that the best use of the PMPC’s limited meeting time is as a forum for agencies to share program management best practices. In choosing to focus on program management practices rather than high- risk areas, the PMPC has not satisfied all PMPC requirements as delineated in PMIAA. Having measures to assess outcomes of PMIAA, such as establishing a baseline of information on programs or collecting trend data, can help OMB ensure that it has established a framework to effectively guide and assess PMIAA’s implementation. Assessment measures would also allow OMB to better target efforts to improve project management and the capabilities of managers. We are making a total of eight recommendations to OMB. Specifically: The Deputy Director for Management of OMB, in conjunction with the PMPC, should develop program and project management standards to include (1) a minimum threshold for determining the extent to which agencies have met the standards, (2) how standards apply differently at the program and project levels, (3) how standards are interrelated to work in a synchronized way, and (4) how standards should be applied across the life cycle of a program or project. (Recommendation 1) The Deputy Director for Management of OMB, in conjunction with the PMPC, should create a governance structure to further develop and maintain program and project management standards that fully aligns with key practices for governance structures. (Recommendation 2) The Deputy Director for Management of OMB should, when expanding PMIAA to additional program types, design pilot efforts to follow leading practices so that OMB can optimize its efforts to improve and broaden portfolio reviews across a full range of program types. (Recommendation 3) The Deputy Director for Management of OMB should communicate program areas and timeframes, and expectations pertinent to annual program portfolio reviews, to be reviewed in future program portfolio reviews. (Recommendation 4) The Deputy Director for Management of OMB should clarify for agencies how the different definitions of a “program” relate to each other in OMB guidance. (Recommendation 5) The Deputy Director for Management of OMB should convene trilateral meetings between OMB, relevant agencies, and us for addressing all high-risk areas during each two-year high-risk cycle (Recommendation 6). The Deputy Director for Management of OMB, in conjunction with PMPC, should ensure PMPC meeting agendas include time for discussing high- risk areas during meetings and provide time for the PMPC to make recommendations to OMB about addressing high-risk areas. (Recommendation 7) The Deputy Director for Management of OMB, in conjunction with PMPC, should establish measures to assess outcomes of PMIAA, such as establishing a baseline of information on programs or collecting trend data. (Recommendation 8) We provided a draft of this product for comment to OMB, OPM, and the five selected agencies. OMB neither agreed nor disagreed with the recommendations and stated that it would take them into consideration when making future updates to its policies and guidance for agencies for improving program and service delivery. In addition, OMB, OPM, Commerce, NASA, Treasury, and Veterans Affairs provided technical comments which we incorporated as appropriate. Energy responded that it had no comments. We are sending copies of this report to congressional committees, the Acting Director of OMB and Director of OPM, The Secretaries of the Departments of Commerce, Energy, Treasury, and Veterans Affairs, the Administrator of NASA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or Jonesy@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. This report examines: (1) the steps taken by the Office of Management and Budget (OMB), the Office of Personnel Management (OPM), and the Chief Financial Officer Act of 1990 (CFO Act) agencies to implement the Program Management Improvement Accountability Act (PMIAA); (2) the extent to which OMB is using or planning to use portfolio reviews required in PMIAA to address issues on our High-Risk List; and (3) the extent to which OMB provided methods for agencies to assess the results of PMIAA. To examine the steps taken by OMB, OPM, and CFO Act agencies to implement PMIAA, we reviewed agency documents, designed and disseminated a questionnaire to the 24 CFO Act agencies, and analyzed their responses. We also selected five PMIAA CFO Act agencies as case studies. We reviewed documentation from OMB, including the OMB PMIAA strategic plan and actions taken, as well as Cross Agency Priority goal 11 quarterly reports, and screen shots of PMIAA documents on OMB Max portal. We interviewed OMB staff to gain insight into their approach to implementing PMIAA. To examine the OMB standards for program and project management, we used criteria from the Project Management Institute (PMI) for Standard for Program Management and the Project Management Body of Knowledge. In addition, we reviewed documentation from OPM regarding their PMIAA plans and documents for the update of the 0340 job series. We further analyzed Enterprise Human Resources Integration (EHRI) data from fiscal year 2018 from OPM to identify employees in current program management 0340 occupational series. We also interviewed OPM officials regarding their role in implementing PMIAA. We interviewed outside subject matter specialists to provide their views on federal program and project management. Specifically, we met with staff from PMI and Professor Janet Weiss from the University of Michigan—who had conducted a study on how to improve federal program management—as she had been recommended by the Congressional Research Service, OMB, and the IBM Center for the Business of Government. To examine the steps agencies had taken, we requested PMIAA implementation plans from all 24 CFO Act agencies. CFO Act agencies were to submit PMIAA implementation plans to OMB by November 30, 2018. We collected implementation plans between November 29, 2018, and April 16, 2019. We received 22 out of 24 implementation plans. We did not review plans from the Department of Health and Human Services or the Environmental Protection Agency because they had not completed their plans at the time of our review. Two analysts independently reviewed separate implementation plans. These reviews were then verified by another analyst. Implementation plans were evaluated on whether they fully met, partially met, or did not meet the 10 requirements provided in the OMB implementation guidance, such as how the major acquisition portfolios aligned to relevant strategic objectives, or whether the agency had existing training for program and project managers. We also disseminated a questionnaire to all CFO Act agencies to collect information on PMIAA implementation. This questionnaire was pre-tested by two CFO Act agencies and two members of the Federal Program and Project Management Community of Practice and revised for clarity. The questionnaire was sent to all 24 CFO Act agencies on February 4, 2019, and responses collected between February 11 and April 22, 2019. All 24 agencies responded to the questionnaire. Agency officials were asked questions on: 1. the steps their agency has taken to implement PMIAA, 2. the challenges their agency faces in implementing PMIAA, 3. efforts to address high-risk issues, and 4. plans to measure PMIAA outcomes, if any. We selected five agencies for case studies and analyzed further documentation and interviewed agency officials to provide illustrative examples of PMIAA implementation at the agency level. We assessed whether: agencies had responsibility for a program, function, or operation on our 2019 High-Risk List; OMB considered them further along in PMIAA implementation compared to other agencies; the agency reported it was selected for the OMB pilot of noninformation technology acquisition program portfolio reviews; agency officials reported actions taken to direct internal program management training or workforce development in their questionnaire responses or OMB required implementation plans; and agency officials reported any actions to implement PMIAA beyond the requirements listed in the OMB PMIAA strategic plan. To achieve of a range of PMIAA experiences, we selected five agencies that met varying numbers of the criteria. The Department of Commerce was chosen because all four selection criteria were met, the Department of Energy met three, the Department of Veterans Affairs met two, and the Department of the Treasury and the National Aeronautics and Space Administration each met one. We interviewed and reviewed documents from each of the agencies. We asked questions about steps agencies were taking and their interactions with OMB and OPM to help them implement PMIAA. We also asked these agencies to suggest any ways in which OMB and OPM could improve implementation. To assess the OMB PMIAA strategic plan, we reviewed leading practices on strategic planning from our body of work. We also considered testimonial evidence from OMB staff. Specifically, we reviewed prior reports on leading strategic planning practices and requirements for agencies to use in strategic planning. We selected relevant criteria from the Government Performance and Results Act of 1993 (GPRA) and the GPRA Modernization Act, that not only pertained to agency strategic plans, but also were relevant as for strategic planning principles. Specifically, we selected criteria from the following categories: (1) mission statement; (2) general goals and objectives; (3) strategies for accomplishing goals and objectives; (4) input from stakeholders; (5) interagency collaboration; 6) milestones and metrics to gauge progress. To determine the extent to which the leading practice was included in the strategic plan, we assessed documentary evidence from the PMIAA strategic plan and testimonial evidence from OMB staff as defined below: A practice was categorized as fully met if the evidence fulfilled all aspects of the definition. A practice was categorized as partially met if the evidence fulfilled some, but not all, aspects of the definition, or if the evidence was judged to fulfill the general meaning of the definition, while not technically meeting it fully. A practice was categorized as not met if no evidence was found relevant to the criterion, or if evidence did not fulfill any aspects of the definition. In addition, we reviewed documents from and interviewed selected agencies on what measures OMB was developing for evaluating PMIAA implementation. We also asked these agency officials what kinds of evaluative measures would be useful to monitor the successful implementation of PMIAA from their perspective. In addition, we assessed the pilot of the required PMIAA program portfolio reviews against the five leading practices we identified from our work on designing pilots. We determined that the design fully met the criteria when we saw evidence that all aspects of a leading practice were met. When we were unable to assess whether all aspects of a leading practice were met without additional information, we determined that the design partially met the criteria. Finally, when we saw no evidence of a leading practice, we determined that the criteria were not met. To examine OMB’s standards for program and project management, we selected two sets of criteria for program and project management criteria from PMI. PMI standards are generally recognized as leading practices for program and project management. To select program management standards, we identified 10 PMI program management activities. To select project management standards, we identified 10 project management knowledge areas. Further, PMI’s leading practices were selected to explain how program and project management standards apply differently, and how both set of standards relate to the lifecycle of a program or project. We then compared the definition of these 10 PMI program and 10 PMI project management standards to the definition of OMB’s initial 15 program and project standards released for PMIAA implementation. In addition, OMB’s initial standards were compared to PMI leading practices that distinguish the relationship between programs and projects and leading practices on applying standards across the life cycle of a program or project. We also applied leading practices we identified from our previous work on data governance standards to assess the governance process OMB used to develop, maintain, and monitor program management standards. Our past work identified common key practices for establishing effective data governance structures. This work selected a range of organizations, including domestic and international standards-setting organizations, industry groups or associations, and federal agencies, to ensure we had comprehensive perspectives of data governance key practices across several domains. Two analysts compared the five key practices on the data governance structures to OMB plans and documented practices. We assessed the reliability of OPM’s EHRI data through electronic testing to identify missing data, out of range values, and logical inconsistencies for employees classified as 0340s. We believe the EHRI data we used are sufficiently reliable for the purpose of this report. To examine the extent to which OMB is using or planning to use portfolio reviews to address our High-Risk-List, we reviewed documentation from OMB and 24 CFO Act Agencies. As part of our questionnaire, we asked 24 CFO Act agencies to provide any of our High-Risk List summary and detailed analyses that the agencies were required to submit to OMB as part of the 2018 strategic review process. We analyzed this information to determine the extent to which agencies provided information to OMB during their 2018 strategic review process. We also selected criteria from the Standards for Internal Control in the Federal Government on maintaining documentation of the internal control system to assess steps that OMB had taken related to its responsibilities for conducting high-risk portfolio reviews and the management of the Program Management Policy Council. Specifically, we selected information and communication which states that management should externally communicate the necessary quality information that an entity needs to achieve its objectives. We conducted this performance audit from June 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Yvonne D. Jones, (202) 512-6806, or jonesy@gao.gov. In addition to the contact named above, William Reinsberg (Assistant Director), Carole J. Cimitile (Analyst in Charge), Jacqueline Chapin, Martin J. De Alteriis, Emily Gamelin, Jaeyung Kim, Matthew L. McKnight, Robert Robinson, Dylan Stagner, Andrew J. Stephens, and John Villecco made key contributions to this report.", "summary": "PMIAA requires OMB to adopt program management standards and guidelines government-wide; OPM is to establish new—or revise existing—occupational standards for program and project management. PMIAA includes a provision for GAO, no later than 3 years after the enactment of the act, to issue a report examining the implementation and effectiveness of certain provisions of the act on federal program and project management. This report (1) describes steps taken by OMB, OPM, and agencies to implement PMIAA; (2) assesses OMB's efforts to address issues on GAO's High-Risk List using PMIAA; and (3) examines the extent to which OMB provided methods for agencies to measure and assess the results of PMIAA. GAO reviewed documents from and conducted interviews with OMB and OPM. GAO surveyed all 24 CFO Act agencies, and selected five agencies to illustrate implementation efforts. GAO also interviewed subject matter specialists from academia and the private sector regarding their views on how program and project management practices applied to PMIAA. The Office of Management and Budget (OMB) has begun to implement all requirements of the Program Management Improvement Accountabilitiy Act of 2016 (PMIAA), but further efforts are needed to fully implement the law. OMB released its 5-year strategic plan for PMIAA and developed program management standards. However, the standards are not detailed compared with accepted program and project management standards, and OMB's governance structure is insufficient for developing and maintaining these standards over time. In 2019, OMB conducted ten reviews of agency program portfolios—organized groupings of programs whose coordination in implementation enables agencies to achieve their objectives. Each review addressed one or two portfolios per agency. Further, OMB's required portfolio reviews of high-risk areas were limited to only five out of 35 areas on GAO's High-Risk List. OMB could establish measures to track agencies' progress. Although not required by PMIAA, this is a good practice for demonstrating improvement. As required by PMIAA, the Office of Personnel Management (OPM) developed competencies for program and project managers and updated the program management job series. Further, OPM is developing a career path for program and project managers by the end of 2019. OPM also plans to create a unique job identifier code in 2020 so that agencies can more completely identify their program management workforce. The Program Management Policy Council (PMPC), established by PMIAA and chaired by OMB's Deputy Director for Management, met for the first time in September 2018 and met twice in 2019 to discuss PMIAA implementation with Chief Financial Officers (CFO) Act agencies. All CFO Act agencies designated a Program Management Improvement Officer to participate in the PMPC. However, the PMPC has neither addressed GAO high-risk areas nor advised OMB on how to address high-risk areas, as required by the PMIAA. GAO is making eight recommendations that OMB further develop the standards to include more detail, create a governance structure for program management standards, hold meetings on all High-Risk List areas, and establish measures to track agencies' progress in program management. OMB neither agreed nor disagreed with the recommendations and stated that it would consider them when making future updates to its program management policies and guidance.", "document_type": "gao"}
{"report": "In our June 2019 report, we found that, while abuse deficiencies cited in nursing homes were relatively rare from 2013 through 2017, they became more frequent during that time, with the largest increase in severe cases. Specifically, abuse deficiencies comprised less than 1 percent of the total deficiencies in each of the years we examined, which is likely conservative. Abuse in nursing homes is often underreported by residents, family, staff, and the state survey agency, according to CMS officials and stakeholders we interviewed. However, abuse deficiencies more than doubled—from 430 in 2013 to 875 in 2017—over the 5-year period. (See appendix II.) In addition, abuse deficiencies cited in 2017 were more likely to be categorized at the highest levels of severity— deficiencies causing actual harm to residents or putting residents in immediate jeopardy—than they were in 2013. In light of the increased number and severity of abuse deficiencies, it is imperative that CMS have strong nursing home oversight in place to protect residents from abuse; however, we found oversight gaps that may limit the agency’s ability to do so. Specifically, we found that CMS: (1) cannot readily access data on the type of abuse or type of perpetrator, (2) has not provided guidance on what information nursing homes should include in facility-reported incidents, and (3) has numerous gaps in its referral process that can result in delayed and missed referrals to law enforcement. In our June 2019 report, we found that CMS’s data do not allow for the type of abuse or perpetrator to be readily identified by the agency. Specifically, CMS does not require the state survey agencies to record abuse and perpetrator type and, when this information is recorded, it cannot be easily analyzed by CMS. Therefore, we reviewed a representative sample of 400 CMS narrative descriptions—written by state surveyors—associated with abuse deficiencies cited in 2016 and 2017 to identify the most common types of abuse and perpetrators. From this review, we found that physical abuse (46 percent) and mental/verbal abuse (44 percent) occurred most often in nursing homes, followed by sexual abuse (18 percent). Furthermore, staff, which includes those working in any part of the nursing home, were more often the perpetrators (58 percent) of abuse in deficiency narratives, followed by resident perpetrators (30 percent) and other types of perpetrators (2 percent). (See appendix III for examples from our abuse deficiency narrative review.) CMS officials told us they have not conducted a systematic review to gather information on abuse and perpetrator type. Further, based on professional experience, literature, and ad hoc analyses of deficiency narrative descriptions, CMS officials told us they believe the majority of abuse is committed by nursing home residents and that physical and sexual abuse were the most common types. This understanding does not align with our findings on the most common types of abuse and perpetrators represented in CMS’s data on deficiencies cited as abuse. Without the systematic collection and monitoring of specific abuse and perpetrator data, CMS lacks key information and, therefore, cannot take actions—such as tailoring prevention and investigation activities—to address the most prevalent types of abuse or perpetrators. To address this, we recommended that CMS require state survey agencies to report abuse and perpetrator type in CMS’s databases for deficiency, complaint, and facility-reported incident data and that CMS systematically assess trends in these data. HHS concurred with our recommendation and stated that it plans to implement changes in response. As of November 2019, HHS had not implemented the recommendation. Despite federal law requiring nursing homes to self-report allegations of abuse and covered individuals to report reasonable suspicions of crimes against residents, in June 2019 we reported that CMS had not provided guidance to nursing homes on what information they should include in facility-reported incidents, contributing to a lack of information for state survey agencies and delays in their investigations. Specifically, officials from each of the five state survey agencies told us that the documentation they receive from nursing homes for facility-reported incidents can lack key information that affects their ability to triage incidents and determine whether an investigation should occur and, if so, how soon. For example, officials from two state survey agencies we interviewed said they sometimes have to conduct significant follow-up with the nursing homes to obtain the information they need to prioritize the incident for investigation—follow-up that delays and potentially negatively affects investigations. Incomplete incident reports from nursing homes are particularly problematic given that nearly half of abuse deficiencies cited between 2013 and 2017 were identified through facility-reported incidents, which is dramatically different than the approximately 5 percent of all types of deficiencies that were identified in this manner. Therefore, facility-reported incidents play a unique and significant role in identifying abuse deficiencies in nursing homes, making it critical that incident reports provided by nursing homes include the information necessary for state survey agencies to prioritize and investigate. To address this issue, we recommended that CMS develop and disseminate guidance— including a standardized form—to all state survey agencies on the information nursing homes and covered individuals should include on facility-reported incidents. HHS concurred with our recommendation and stated that it plans to implement changes in response. As of November 2019, HHS had not implemented the recommendation. In June 2019, we identified gaps in CMS’s process for referring incidents of abuse to law enforcement and, if appropriate, to MFCUs. These gaps may limit CMS’s ability to ensure that nursing homes meet federal requirements for residents to be free from abuse. Specifically, we identified issues related to (1) referring abuse to law enforcement in a timely manner, (2) tracking abuse referrals, (3) defining what it means to substantiate an allegation of abuse—that is, the determination by the state survey agency that evidence supports the abuse allegation, and (4) sharing information with law enforcement. We made recommendations that CMS address each of these four gaps in the referral process, and HHS concurred with each recommendation and stated that it plans to implement changes in response. As of November 2019, HHS had not implemented these recommendations. One of the gaps in CMS’s process is related to referring abuse to law enforcement in a timely manner. For example, law enforcement investigations can be significantly delayed because CMS requires a state survey agency to make referrals to law enforcement only after abuse is substantiated—a process that can often take weeks or months. Officials from one law enforcement agency and two MFCUs we interviewed told us the delay in receiving referrals limits their ability to collect evidence and prosecute cases—for example, bedding associated with potential sexual abuse may have been washed, and a victim’s wounds may have healed. As such, we recommended that CMS require state survey agencies to immediately refer to law enforcement any reasonable suspicion of a crime against a resident. HHS concurred with our recommendation and stated that it plans to implement changes in response. As of November 2019, HHS had not implemented this recommendation. In conclusion, while nursing home abuse is relatively rare, our June 2019 report shows that abuse deficiencies cited in nursing homes are becoming more frequent, with the largest increase in severe cases. It is imperative that CMS have more complete and readily available information on abuse to improve its oversight of nursing homes. It is also essential that CMS require state survey agencies to immediately report incidents to law enforcement if they have a reasonable suspicion that a crime against a resident has occurred in order to ensure a prompt investigation of these incidents. Chairman Neal, Ranking Member Brady, and Members of the Committee, this concludes GAO’s statement for the record. For further information about this statement, please contact John E. Dicken at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact named above, key contributors to this statement were Karin Wallestad (Assistant Director), Sarah-Lynn McGrath (Analyst-in-Charge) and Summar C. Corley. Also contributing to the underlying report for this statement were Luke Baron, Julianne Flowers, Laurie Pachter, Vikki Porter, Kathryn Richter, and Jennifer Whitworth. We have issued a number of reports reviewing the health and welfare of the elderly in multiple settings. For example, since January 2015, we have issued reports on the incidence of abuse in nursing homes and what is known about the incidence of abuse in assisted living facilities. Reports often included key recommendations. (See table 1.) Appendix II: Severity of Abuse Deficiencies Cited in Nursing Homes, 2013 through 2017 CMS restructured its deficiency code system beginning on November 28, 2017. Due to these coding changes, we did not analyze CMS data cited by surveyors after the implementation of that change. Percentages may not add to 100 due to rounding. Elder Abuse: Federal Requirements for Oversight in Nursing Homes and Assisted Living Facilities Differ. GAO-19-599. Washington, D.C.: August 19, 2019. Nursing Homes: Improved Oversight Needed to Better Protect Residents from Abuse. GAO-19-433. Washington, D.C.: June 13, 2019. Elder Justice: Goals and Outcome Measures Would Provide DOJ with Clear Direction and a Means to Assess Its Efforts. GAO-19-365. Washington, D.C.: June 7, 2019. Management Report: CMS Needs to Address Gaps in Federal Oversight of Nursing Home Abuse Investigations That Persisted in Oregon for at Least 15 Years. GAO-19-313R. Washington, D.C.: April 15, 2019. Medicaid Assisted Living Services: Improved Federal Oversight of Beneficiary Health and Welfare is Needed. GAO-18-179. Washington, D.C.: January 5, 2018. Medicaid Managed Care: CMS Should Improve Oversight of Access and Quality in States’ Long-Term Services and Supports Programs. GAO-17- 632. Washington, D.C.: August 14, 2017. Medicaid Personal Care Services: CMS Could Do More to Harmonize Requirements across Programs. GAO-17-28. Washington, D.C.: November 23, 2016. Nursing Homes: Consumers Could Benefit from Improvements to the Nursing Home Compare Website and Five-Star Quality Rating System. GAO-17-61. Washington, D.C.: November 18, 2016. Elder Abuse: The Extent of Abuse by Guardians is Unknown, but Some Measures Exist to Help Protect Older Adults. GAO-17-33. Washington, D.C.: November 16, 2016. Skilled Nursing Facilities: CMS Should Improve Accessibility and Reliability of Expenditure Data. GAO-16-700. Washington, D.C.: September 7, 2016. Nursing Home Quality: CMS Should Continue to Improve Data and Oversight. GAO-16-33. Washington, D.C.: October 30, 2015. Antipsychotic Drug Use: HHS Has Initiatives to Reduce Use among Older Adults in Nursing Homes, but Should Expand Efforts to Other Settings. GAO-15-211. Washington, D.C.: January 30, 2015. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Nationwide, about 1.4 million elderly or disabled individuals receive care in more than 15,500 nursing homes. CMS, an agency within the Department of Health and Human Services (HHS), defines standards nursing homes must meet to participate in the Medicare and Medicaid programs. Nursing home residents often have physical or cognitive limitations that can leave them particularly vulnerable to abuse. Abuse of nursing home residents can occur in many forms—including physical, mental, verbal, and sexual—and can be committed by staff, residents, or others in the nursing home. Any incident of abuse is a serious occurrence and can result in potentially devastating consequences for residents, including lasting mental anguish, serious injury, or death. This statement summarizes GAO's June 2019 report, GAO-19-433 . Specifically, it describes: (1) the trends and types of abuse in recent years, and (2) CMS's oversight intended to ensure residents are free from abuse. It also includes a brief summary of findings and recommendations from this June 2019 report and prior GAO reports that examined the health and welfare of the elderly in multiple settings, and the status, as of November 2019, of HHS's efforts to implement the recommendations GAO made. The Centers for Medicare & Medicaid Services (CMS) is responsible for ensuring nursing homes meet federal quality standards, including that residents are free from abuse. CMS enters into agreements with state survey agencies to conduct surveys of the state's homes and to investigate complaints and incidents. GAO's June 2019 report found that, while abuse deficiencies cited in nursing homes were relatively rare from 2013 through 2017, they more than doubled during that time, increasing from 430 in 2013 to 875 in 2017, with the largest increase in severe cases. In light of the increased number and severity of abuse deficiencies, it is imperative that CMS have strong nursing home oversight in place to protect residents from abuse. However, GAO found oversight gaps that may limit the agency's ability to do so. Specifically, GAO found: (1) Information on abuse and perpetrator types is not readily available. CMS's data do not allow for the type of abuse or perpetrator to be readily identified by the agency. Specifically, CMS does not require the state survey agencies to record abuse and perpetrator type and, when this information is recorded, it cannot be easily analyzed by CMS. GAO made a recommendation that CMS require state survey agencies to submit data on abuse and perpetrator type and HHS concurred. As of November 2019, HHS had not implemented the recommendation. (2) Facility-reported incidents lack key information. Despite federal law requiring nursing homes to self-report allegations of abuse and covered individuals to report reasonable suspicions of crimes against residents, CMS has not provided guidance to nursing homes on what information they should include in facility-reported incidents, contributing to a lack of information for state survey agencies and delays in their investigations. GAO made a recommendation that CMS develop guidance on what abuse information nursing homes should self-report and HHS concurred. As of November 2019, HHS had not implemented the recommendation. (3) Gaps exist in the CMS process for state survey agency referrals to law enforcement. GAO found gaps in CMS's process for referring incidents of abuse to law enforcement. These gaps may limit CMS's ability to ensure that nursing homes meet federal requirements for residents to be free from abuse. Specifically, GAO identified issues related to (1) referring abuse to law enforcement in a timely manner, (2) tracking abuse referrals, (3) defining what it means to substantiate an allegation of abuse—that is, the determination by the state survey agency that evidence supports the abuse allegation, and (4) sharing information with law enforcement. GAO made four recommendations to address these gaps and HHS concurred. As of November 2019, HHS had not implemented these recommendations.", "document_type": "gao"}
{"report": "VA pays monthly disability compensation to veterans with disabling conditions caused or aggravated by their military service. The benefit is based on an average reduction in earning capacity across a group of individuals with similar physical or mental impairments. Disability compensation is generally paid according to the severity of the service- connected condition and is awarded in 10 percent increments, based on criteria in the VA Schedule for Rating Disabilities (VASRD or rating schedule). Veterans may claim more than one medical condition, and VBA assigns a rating percentage for each condition determined to be connected to the veteran’s service. For veterans with multiple service-connected conditions, VA calculates a rating (combined disability rating) using a table that applies a formula for combining multiple ratings into a single rating. The rating affects the amount of monthly compensation received by a veteran. Unlike some private-sector disability programs, the employment status, earnings, and ability to work generally are not factored into the disability rating and subsequent base payment. Moreover, unlike typical workers’ compensation programs for permanent impairments, no limits are generally placed on the length of time veterans can receive payments. Obligations for disability compensation have increased by 45 percent in the last 5 years, from about $54 billion in fiscal year 2013 to about $78 billion in fiscal year 2018. According to VA, this increase is due to several factors, including more beneficiaries (for example, as veterans of more recent conflicts leave military service and seek compensation), as well as rising average disability ratings that lead to higher average payments. VA reported that growth in the number of veterans with a service-connected condition is concentrated among those rated 50 percent or higher. VBA’s Compensation Service sets policy and oversees the process for determining eligibility for disability compensation. VBA staff in the regional offices process disability compensation claims. These claims processors include Rating Veterans Service Representatives (RVSR or rater), who decide on benefit entitlement and the rating percentage, and Veterans Service Representatives (VSR), who gather evidence needed for the raters to make their decisions and later authorize payment, if any. Claims processors use the Veterans Benefits Management System (VBMS)—an electronic, paperless system—to maintain, review, and make rating decisions for veterans’ claims. VBA’s reevaluation process determines whether veterans’ service- connected conditions may have changed, due to treatment or other factors, in the years following an initial evaluation for disability compensation. This process helps ensure that veterans’ service- connected conditions are being rated and compensated correctly. A first step in the process is deciding whether a condition may need to be reevaluated at a future date. As part of an evaluation for disability compensation, claims processors review medical evidence and consider whether to schedule a future review date (see fig.1). When the scheduled review date arrives, VBA revisits the case to determine whether a reevaluation of the disabling condition is still appropriate. This pre-exam review involves reviewing the veteran’s records to determine if the veteran is still experiencing similar symptoms. After this review, VBA may conduct, postpone, or cancel a reevaluation. If the reevaluation is conducted, a medical exam may be ordered, after which the rater will rate the condition based on exam results and other medical evidence. VBA regulations specify certain conditions that require reevaluation. In other instances, VA has discretion in whether to conduct reevaluations, determined upon review of a veteran’s medical record. For example, the medical record may suggest that a veteran with limited range of motion will be continuing physical rehabilitation and is expected to improve. Whether the reevaluation is required or discretionary, VBA’s regulations outline several exclusions that place limits on when VBA conducts reevaluations, such as if the veteran’s combined disability rating would not change as a result of a reduced evaluation for one or more conditions. Veterans may generally obtain health care through (1) VA medical facilities, (2) non-VA health care providers in the community for which VA pays (called community care), or (3) providers paid through veterans’ own health insurance. For VA medical facilities, VHA determines eligibility and priority for VA health care, enrolls veterans, and oversees 172 VA medical centers and over 1,000 outpatient facilities. In response to the Veterans’ Health Care Eligibility Reform Act of 1996, VHA developed a priority system to balance demand for health care with available resources. The system has eight priority groups, and first priority is generally given to veterans with service-connected conditions rated 50 percent or more and to veterans deemed unemployable because of service-connected conditions. Priority groups 2 and 3 include veterans with service-connected conditions rated 30 or 40 percent, or 10 or 20 percent, respectively, according to VHA. Veterans may be eligible for community care if, for example, VA does not offer the care or service the veteran requires, or when a VA medical facility is unable to provide the care or services consistent with the agency’s access standards. Before receiving health care through VA community care programs, veterans must generally obtain authorization from VA. The total number of veterans enrolled in VA’s health care system rose from 7.9 million to over 9 million from fiscal years 2006 through 2017. During that period, VHA’s budget more than doubled, from $37.8 billion to $92.3 billion, as health care costs were rising and its community care programs were expanding. In fiscal year 2017, VA obligated $13.6 billion of its budget for community care, and in fiscal year 2018, this increased to $14.9 billion. For health care services delivered outside of VHA medical facilities that are not funded by VA, veterans may use private health insurance. A 2018 VA survey of veterans enrolled in VA’s health care system found that about 28 percent reported being covered by private insurance. VBA tracks its performance in providing timely and accurate disability compensation decisions to veterans. VBA considers a decision to be timely if a veteran’s claim is processed within 125 days. As part of its quality assurance efforts, VBA conducts national and individual reviews of the accuracy of claims decisions, and periodic consistency studies to assess claims processors’ knowledge of regulations and guidance on specific claims processing issues, such as when to conduct reevaluations. At the VBA central office level, procedures call for VA to assess the accuracy of a random sample of completed claims from each regional office using its Systematic Technical Accuracy Review (STAR) method. STAR reviewers use a standardized checklist to review all actions taken in processing a claim and record any errors they find. VA reports national and regional office performance data for claim- based accuracy (based on the entirety of the claim) and issue-based accuracy (based on each of the individual medical conditions rated). In fiscal year 2018, VBA reported claim-based rating accuracy of about 90 percent and issue-based accuracy of about 95 percent. At the VBA regional office level, quality review teams conduct Individual Quality Reviews of individual claims processors’ work. For example, VA’s procedures call for reviews to be performed on five claims for every rater per month. The reviews are used to help assess individual claims processors’ performance. In addition to accuracy reviews, VBA’s national quality assurance efforts include periodic consistency studies on specific claims processing issues. These studies are intended to assess how consistently claims processors are making decisions across all regional offices by testing select claims processors on their knowledge of VBA’s regulations and procedures. Improvements in a veteran’s service-connected conditions and improvements in a veteran’s health outcomes have important differences. Federal law requires disability compensation to be based upon an average reduction in earning capacity across a group of individuals with a similar physical or mental impairment. In addition, for certain service- connected conditions such as amputations, VA evaluates the condition based on loss or loss of function of a body part or system, without considering assistive devices or prosthetics. As such, some service- connected conditions, such as hearing loss, are generally not expected to improve for purposes of disability compensation. In contrast, according to VHA research, a veteran’s use of a hearing aid is an example of a successful health outcome because this assistive technology can treat the symptoms of hearing loss and increase the functioning of a person. For health care delivered at VA medical facilities, our analysis of fiscal year 2018 VA data shows that more than half of veterans receiving disability compensation used VA health care for a service-connected condition. Specifically, we determined that about 54 percent of veterans, or about 2.6 million, who received disability compensation had at least one VA outpatient visit related to a service-connected condition. Veterans with higher combined disability ratings had more outpatient visits related to their service-connected conditions, on average. (See fig. 2.) Veterans using VA health care for service-connected conditions had an average of four such conditions, and the median age was 63. For veterans with the most prevalent service-connected conditions, in fiscal year 2018 the average number of visits ranged from about 6 to 11 (see table 1). The highest average number of visits was for veterans with service-connected post traumatic stress disorder (PTSD) and diabetes. For the same year, veterans receiving disability compensation had an average of nearly eight outpatient health care visits for service-connected conditions. In fiscal year 2018, about 13 percent of VA inpatient hospital stays for veterans receiving disability compensation were to treat a service- connected condition; about 87 percent of the stays for this population were to treat non-service-connected conditions. Nearly 2.1 million, or about 44 percent of veterans receiving disability compensation, had no VA outpatient visits or inpatient stays for their service-connected conditions. These veterans may have received treatment paid for through private insurance, from community care, or received no treatment for their service-connected conditions in fiscal year 2018. Veterans who did not use VA health care had an average of about four service-connected conditions, and the median age was 57. For community care (VA-funded health care delivered by non-VA providers), we could not determine the extent to which veterans receiving VA disability compensation used these health providers for their service- connected conditions because this area is not a focus of analysis for the program, according to VHA Office of Community Care officials. These officials told us that, other than for emergency care claims, information on service-connected conditions is not used to process authorizations and payments for the program because program eligibility is based on other factors, such as the availability of needed services. Veterans also receive health care outside of VHA facilities that is not funded by VA, such as through their private health insurance, and the number and types of these services for service-connected conditions are largely unknown. According to a statutorily mandated study of the use of VA’s health care system, these data are limited. The authors of this study recommended that VA consider expanding data collection efforts. VA has since worked with the Department of Health and Human Services’ Agency for Healthcare Research and Quality to expand its data collection regarding veterans, including veterans receiving disability compensation, specifically regarding veterans’ use of non-VA care and coordinating such care with VA providers. Data from this effort will be available beginning in fiscal year 2020, according to Agency for Healthcare Research and Quality researchers conducting the study. Health outcomes of veterans with service-connected conditions who receive VA health care services are not well understood, as they have not been specifically studied outside of veterans receiving disability compensation for PTSD. Based on a review of peer-reviewed literature and interviews with VA health research officials, we identified two studies on the health outcomes of veterans, both of which specifically focused on health outcomes for veterans receiving disability compensation for PTSD. One study published in 2011 found that receiving disability compensation benefits for PTSD was associated with clinically meaningful reductions in PTSD symptoms and reductions in poverty and homelessness. Another study published in 2017 found that 10 percent of men and 20 percent of women who applied for disability compensation for PTSD had a persistent serious mental illness, and over time, consistently reported more severe PTSD symptoms and poorer functioning in comparison to other study participants without severe mental illness. The study authors noted that serious mental illness was more prevalent in this population than in the VA health care system overall. They concluded that more information is needed about the characteristics of those receiving disability compensation to better understand their challenges and long-term outcomes. VA’s Health Services Research and Development office sponsors research on health conditions common in the veteran population, such as traumatic brain injury and Gulf War Illness, among others. According to an official from this office, data used for these studies generally do not include veterans’ receipt of disability compensation or their specific service-connected conditions. Several health care researchers within VA and a VA official we spoke with cited various reasons for limited research on health outcomes for veterans with service-connected conditions. According to these officials, a key challenge is that VBA and VHA data do not use the same identifiers for medical conditions that are needed to link the two information sources. VA health care researchers acknowledged benefits to including veterans’ VBA disability codes in their studies to analyze health information for veterans with service-connected conditions. A 2007 report on the options for improving the disability program also noted that the use of common diagnostic categories would allow VA program managers and researchers to compare populations and trends that would help in program planning and in epidemiological and health services research. However, VBA’s diagnostic codes are unique and do not allow comparisons of trends in disabilities in populations served by VHA or the Department of Defense. According to a VA health care researcher and a VHA official, also contributing to these challenges are the lack of data use agreements, which could better facilitate linking VBA and VHA administrative data for VA to further study health outcomes for this population. For example, according to a VA researcher, linking these data sources could allow researchers to investigate causal relationships between disability compensation and veterans’ health outcomes. We previously reported that such agreements can specify which data can be accessed and for what purpose, the duration of access, and requirements for safeguarding the data and ensuring confidentiality. VBA officials said that while they routinely share data with VHA for operational purposes, obtaining access to VBA data for research purposes has special requirements and is more cumbersome. Agency health care data are stored in VHA’s Corporate Data Warehouse, while benefits data are stored in VBA’s data warehouse. Both VHA and VBA officials noted that their data contain sensitive information and that access is carefully monitored. VA’s fiscal year 2018-2024 Strategic Plan includes goals and objectives for data-driven decision making, which include having comprehensive data to identify and meet veterans’ needs, as well as to understand the outcomes VA provides veterans and focus VA’s improvement efforts. In addition, we have previously reported that agencies can enhance and sustain their collaborative efforts by defining common outcomes, leveraging resources, and establishing compatible policies, among others. These practices include articulating agreements in formal documents, which can strengthen the commitment to working collaboratively, as well as establishing compatible policies and other means (including compatible standards and data systems) to operate across agency boundaries. VA has begun to consider ways to analyze health care services received by veterans with service-connected conditions. VA’s Office of Enterprise Integration (OEI) is tasked with providing analysis to inform VA decision- making, as well as to align planning and implementation across VA programs and initiatives. According to an OEI official, it plans to convene subject matter experts from VBA and VHA to determine options and pilot strategies to link available data, but has not yet determined the scope, specific activities, or timeframes for this effort. Until VA develops and implements a plan to address challenges that have hindered analysis thus far and enhance collaboration between VBA and VHA with regard to such analysis, VA will not be positioned to understand the characteristics, needs, and health outcomes of veterans with service-connected conditions, which available research suggests may be different from other veterans. VBA uses some information on conditions identified as potentially needing reevaluations; however, it is not analyzing and using trend and outcome information from completed reevaluations to inform which service-connected conditions to reevaluate in the future. Reevaluations of veterans’ service-connected conditions can serve as a proxy to gauge change, including improvement, in health. VBA assesses changes in veterans’ disabling conditions from reevaluations it conducts for various reasons, including evidence of potential improvement or when required by the rating schedule. A reevaluation showing a change in a given condition may result in one of three possible outcomes: an increase, decrease, or no change in the veteran’s associated disability rating. VBA developed a report to help identify unnecessary reevaluations, which included information on veterans’ conditions that are initially flagged by raters for potentially needing reevaluations in the future. Developed in 2017, VBA’s report identified potential reevaluations deemed unnecessary per VA’s regulations. For example, regulations state that veterans older than 55 are generally exempt from reevaluation, according to the VA Office of Inspector General (OIG). As part of this process, potential reevaluations identified as unwarranted by VBA’s report would be cancelled before their scheduled review dates arrived. This report also includes information on specific conditions identified for potential reevaluation, including the subset of conditions required by regulation to be reevaluated. For example, according to the data generated by the report in June 2019, PTSD was the most common condition identified for potential reevaluation, and of the conditions requiring reevaluation, prostate cancer was most common. However, VBA officials explained that if the report were to find that any of the cases were for veterans older than 55, the reevaluation would be deemed unwarranted and the scheduled review date for considering reevaluation would be cancelled. According to VBA officials, using this report helped VBA identify and cancel about 70,000 potential reevaluations deemed unnecessary, saving about $29 million. VBA plans to run similar reports as needed to identify more reevaluations that could be cancelled, according to officials. Additionally, VBA officials said that they have data on the specific conditions for which medical exams are ordered as part of the reevaluation process. Ordering exams for reevaluations occurs after a condition identified for potential reevaluation has been reviewed and a decision has been made to proceed with a reevaluation. In particular, VBA’s Exam Management System tracks exams ordered, including exams for reevaluations, and provides information about the associated conditions. However, this system does not provide information on the outcome of a reevaluation decision based on the information from these exams. While VBA has some insight into conditions set to be reevaluated, management lacks information on completed reevaluations, including (1) trends and comparisons of certain reevaluated conditions and (2) rating outcomes of reevaluation decisions for individual service-connected conditions. Reevaluation trends. VBA officials told us that they analyze trends on the numbers of veterans who have had reevaluations. However, they said they do not analyze reevaluation data to identify trends on whether certain conditions are frequently or infrequently reevaluated, including for conditions requiring reevaluation under VBA regulation. Further, although VBA has a mechanism to identify potential reevaluations for veterans with conditions requiring them, it is not analyzing the broader universe of veterans with these conditions, according to VBA officials. Such information could determine the extent to which conditions are being identified for reevaluation as required as well as the outcomes or results of these reevaluations. This trend information could also help VBA determine whether claims processors are conducting reevaluations as needed or required. Reevaluation outcomes. VBA officials said that they do not analyze information on the outcomes of reevaluation decisions for individual conditions (i.e., whether a reevaluation resulted in an increase, decrease, or no change to the rating of a particular condition). According to our analysis of VBA data, reevaluations rarely result in changes to veterans’ combined ratings. Specifically, from fiscal years 2013 through 2018, about 95 percent of reevaluations resulted in no changes to combined ratings for veterans, with about 3 percent resulting in an increase and less than 1 percent resulting in a decrease. Combined ratings alone do not offer insight into what impact reevaluations may have on ratings for individual conditions, including which ones are improving as a result of treatment. Most veterans have multiple conditions that contribute to a combined disability rating. VA reported that in 2018 veterans receiving disability compensation had an average of about five service-connected conditions. For those receiving reevaluations, this circumstance means that although the rating of one condition may decrease as a result of a reevaluation, the rating of another condition may increase based on the claims processor’s review of the medical evidence. As a result, the combined rating may not decrease despite a decrease in the rating of an individual condition. A recent report examining reevaluations for veterans with PTSD had similar findings. In its review of a sample of veterans, the study found that these veterans rarely saw a reduction in their individual rating for PTSD. In cases where an individual rating was reduced, most saw no reduction in their overall combined rating due to the fact that they had other conditions whose ratings increased and thereby offset any reduction. According to VBA officials, the agency does not analyze data on trends in reevaluated conditions or the outcomes of reevaluation decisions for specific conditions because management has not expressed interest in doing so. Further, officials said that these data are not stored together in the database. Although analyzing these data and developing a report on types of conditions reevaluated and their outcomes is feasible, according to officials, doing so would require additional steps, including analyzing the text of rating decisions. According to VA regulation, reevaluations are intended to verify the continued existence or the current severity of a disability. Federal standards for internal control state that management should establish and operate monitoring activities to evaluate the results of activities and ensure that objectives are met with minimum wasted resources. Moreover, they state that management should design a process that uses the entity’s objectives and related risks to identify the information requirements needed to achieve the objectives and address risks. These standards also state that management should use quality information to achieve the entity’s objectives. Identifying the extent to which VBA is meeting these program objectives and effectively managing resources is difficult without analyzing information about the outcomes of reevaluations for specific conditions. Such analysis could also identify trends indicating conditions with little or no potential for a rating change or missed opportunities to target other conditions likely to change as a result of reevaluations. In recent years, VBA has focused its procedures on reducing the number of unnecessary reevaluations and generally limiting the number of reevaluations conducted overall. Using outcome information could allow the agency to better target the agency’s resources and avoid the risk of unnecessary reevaluations and burdening veterans. Analyzing reevaluation trends and outcomes could also inform existing VBA policy. For example, VA is updating the rating schedule with current medical and earnings loss information, including adding conditions requiring reevaluations. Analyzing information on which conditions are reevaluated and identifying any trends in conditions that improve could help inform future updates to the rating schedule or improve the policies or practices for how the reevaluation process is implemented. VBA uses information to help gauge the timeliness and quality of reevaluation decisions, but has not fully used information related to the consistency of raters’ decisions to address potential training needs, among other issues. VBA tracks its performance in providing veterans with timely and accurate decisions on their disability compensation benefits, and uses such information—including information on reevaluations—to manage the claims process. VBA holds its claims processing staff accountable for their timeliness and accuracy through performance standards for regional office managers and individual claims processors. Timeliness. VBA measures and reports to Congress and the public its total number of claims awaiting completion, including those that have been backlogged (awaiting completion for more than 125 days). According to VA, at of the end of fiscal year 2018 it had about 364,000 disability compensation rating claims awaiting completion. Of this total, about 19,000 were reevaluations, of which fewer than 5 percent were in the backlog. VBA uses additional timeliness measures to hold regional offices accountable by tracking the timeliness of their work in each of five steps or cycles in the claims process, as managed under the National Work Queue (VBA’s system for distributing the claims workload). For example, in fiscal year 2018, preparing a rating decision for a reevaluation took an average of 1.76 days. Quality. VA uses national, regional office, and individual-level data from its accuracy reviews to oversee the quality of rating claims decisions, including reevaluations. Each regional office is to meet the national STAR issue-based target of 96 percent accuracy for the year. For reevaluations, VBA reported both claim-based and issue-based accuracy of about 95 percent for fiscal year 2018. According to VBA officials, in response to a recommendation in the VA OIG’s report on unwarranted reevaluations, in October 2018 VBA updated the STAR national quality review checklist with additional questions on (1) the need for a reevaluation, and (2) the timeframe for future reevaluation. At the individual claims processor level, VA measures accuracy using the results of Individual Quality Reviews as part of claims processors’ performance evaluations. For example, a rater is considered fully successful by achieving 92 to 96 percent accuracy on Individual Quality Reviews for a month, depending on the rater’s experience. In fiscal year 2018, VBA reported that for Individual Quality Reviews, claims processors had a 98.4 percent accuracy rate for reevaluations. Overall, few reevaluations are reviewed because reevaluations are a small proportion of VA’s claims workload. Specifically, of about 102,000 reevaluations completed in fiscal year 2018, about 1,500 were reviewed under STAR and about 10,000 were reviewed in Individual Quality Reviews. In addition to using accuracy information to measure regional office and individual performance, VBA holds regional offices and individual claims processors responsible for correcting their errors. According to VBA officials, the agency uses information from its quality reviews to provide additional guidance and training to regional offices. VBA discusses quality review information, including trends in claims processing errors, through newsletters and periodic conference calls with regional office managers and quality review teams. For example, VBA officials noted that they discussed reevaluation policies and guidance with regional office staff on three occasions between May 2017 and May 2018. Officials at the four regional offices we visited indicated that they disseminated information on reevaluations to claims processors. For example, one office’s quality review team provided additional training on reevaluations to members of the claims processing teams. Quality review team officials in each of the regional offices we visited told us that they disseminate and reinforce guidance to claims processors through periodic meetings, newsletters, or other mechanisms. VBA, however, has not fully used available information about quality to oversee and improve the reevaluation process. Specifically, VBA did not use the results of a study it conducted to further identify and correct gaps in raters’ knowledge of reevaluation processing guidance. This May 2018 study—part of VBA’s quality assurance efforts that include periodic consistency reviews of specific claims processing issues—assessed how consistently raters across regional offices understood VBA’s policies on ordering reevaluations (see table 2). The study team recommended VBA take two actions: 1. Consider having experienced quality review team staff at regional offices provide additional training on reevaluation guidance to raters. 2. Consider reviewing reevaluation decisions at the seven lowest-scoring offices because they were at high risk of inaccuracies. While VBA provided regional offices with results of the May 2018 consistency study, the agency did not implement either recommendation. VBA officials told us that they did not direct regional offices to provide additional training because the agency expected the offices to use the results of the consistency study to plan training on reevaluations for their staff. However, VBA officials told us that not all regional offices provided additional training on reevaluations. Quality review officials at the four offices we visited—which included two of the seven offices the study team identified for further review—told us that they did not provide additional training. Officials at two offices said they had previously provided guidance and training to claims processors on reevaluations. VA’s goals are to ensure timely and accurate claims decisions for veterans. Federal standards for internal control state that management should establish monitoring activities, evaluate the results, and remediate any deficiencies on a timely basis. Consistent with these standards, GAO has previously reported that a key use of performance information is to identify problems and take corrective actions, for example, by changing agency guidance or by providing training. By not implementing the study’s recommendations, VBA is missing an opportunity to identify problems and their root causes as a guide to corrective actions, including training or the improvement of training. Many raters who are trained to make these decisions did not perform well on the consistency study’s initial test. Exploring deficiencies associated with this poor performance could position VA to better manage the reevaluation process. In addition, resources spent in developing the study and analyzing its results were not used as effectively as they could have been. VBA has recently updated its procedures manual to clarify who can determine whether a reevaluation is needed, but has not outlined guidance for the knowledge, skills, and abilities needed to perform these tasks. As part of the reevaluation process to assess veterans’ conditions, VBA procedures require claims processors in regional offices to conduct a pre-exam review to determine whether a reevaluation is still appropriate when its scheduled review date arrives (see fig. 3). For the reevaluation process to work effectively, proper procedures must be in place to ensure that claims processors can make informed decisions on whether to reevaluate these conditions. Until its recent update, VBA’s procedures manual stated that staff deemed part of “the rating activity” (defined in the manual as staff including raters who specialize in rating claims) were the only claims processors who were permitted to conduct a pre-exam review to determine whether a reevaluation is warranted. In February 2019, VBA updated its procedures manual to clarify that raters or “locally designated claims processors” may conduct this review. Officials said that Veterans Service Representatives (VSR) may fill this role in some offices. Although VBA’s procedures permit VSRs to conduct pre-exam reviews, VSRs may not be qualified to do so, according to the OIG’s July 2018 report and VBA regional staff we interviewed in 2019. The OIG found that VSRs were ordering exams without raters’ pre-exam reviews, resulting in an estimated 15,500 unwarranted exams (about 29 percent of the cases from the study’s review period). These exams were determined to be unwarranted based primarily on exclusions identified in VA’s procedures that exempt certain veterans from reevaluation (see text box). The report found that, rather than sending claims to raters for pre-exam review, VSRs were ordering exams despite not having the proper training and experience to decide on whether a reevaluation was warranted, such as the specialized knowledge needed to review medical evidence. Officials in regional offices we visited expressed concern about VSRs performing this role. Specifically, staff in three of the four regional offices we spoke with—including raters, supervisors, quality assurance staff, and managers—told us that raters do the pre-exam review in their respective offices because they are the only staff qualified to perform this duty. For example, raters have more experience and training than VSRs in reviewing medical evidence to determine the need for a reevaluation, according to officials from one office. In contrast, supervisors we spoke with at another regional office told us they have opted to have VSRs do the pre-exam review as a way to manage the claims workload and enable raters to focus exclusively on rating claims. However, these supervisors expressed concern that VSR reviews could have a negative impact on quality. VBA officials said they have not outlined guidance for the skills needed to perform the pre-exam review. Rather, VBA officials said that they believe it is most effective to allow the regional offices, which vary widely in size and scope, to have discretion to identify staff to fill this role. Further, VBA officials told us that the recent update to the agency’s procedures did not reflect a policy change broadening which staff can do pre-exam reviews, but rather clarified existing practice under which VSRs were already permitted to perform this task. However, given the OIG findings that VSRs performing this task resulted in many unwarranted exams, defining the knowledge, skills, and abilities needed for the pre-exam review could provide assurance that staff who do so are qualified. Federal standards for internal control call for management to clearly assign responsibilities and document internal controls, including who should carry out which roles. Identifying the knowledge, skills and abilities needed by qualified staff to carry out their responsibilities can also help management ensure the entity’s objectives are met. Providing flexibility for regional offices can ease implementation and management of workloads, especially for offices with varied situations. However, providing flexibility does not preclude VBA from outlining the basic knowledge, skills, and abilities required to perform the pre-exam review. Further, in our prior work we found that VBA has faced challenges in defining roles for its staff, which has led to inconsistencies in the way regional offices operate. We have also found that ambiguous policies provided by other VA programs can pose risks to the quality of the process. Without clarifying in VBA’s procedures manual which knowledge, skills, and abilities are needed to fill roles in the reevaluation process, VBA may be at risk of having unqualified staff continue to order unwarranted reevaluations. This risk, in turn, could result in wasted resources and an undue burden on veterans. Despite recent changes to its procedures manual, VBA has not ensured that its training program reflects the knowledge, skills, and abilities needed for relevant staff to conduct pre-exam reviews. VBA oversees national training requirements, including training related to reevaluations, but defers to regional offices to manage other training needs. As entry- level staff, claims processors receive national training from VBA related to their job duties. For raters, this initial training covers reevaluations, including instruction on when and when not to schedule reevaluations, and case studies exploring how to make reevaluation decisions based on medical and other evidence, among other topics. VSRs may also receive general training on reviewing and evaluating evidence and are introduced to reevaluations as they learn about general claim development and ordering exams. In addition to initial training, claims processors must complete 40 hours of training per year consisting of 15 hours of training mandated by VBA and 25 hours determined by each regional office. VBA officials told us that regional offices vary in what training and when delivered to their staff. In addition to this general training, VBA officials told us that VA added controls to the Veterans Benefits Management System (VBMS) system to restrict claims processors’ ability to schedule potential reevaluations, which could reduce the possibility of unqualified staff ordering unwarranted exams during the pre-exam review. Specifically, these controls prevent claims processors from scheduling review dates for potential reevaluations when certain exclusions apply (such as that outlined in VA regulation exempting from reevaluation veterans with the minimum rating for a given condition). Further, claims processors have the ability to request to override the restrictions when they believe a reevaluation is warranted based on the circumstances of the case. These override requests are reviewed by quality assurance staff, who may approve or deny the requests. Although these controls may impose some limits on ordering unwarranted exams, they may not affect the ability of claims processors to order reevaluations in circumstances where these exclusions do not apply and for which they must use their discretion. For example, for veterans who have migraine headaches and who do not fit any of the exclusion criteria, no VBMS controls would restrict claims processors from ordering a reevaluation even if it is not appropriate based on the medical evidence or other circumstances of the case. For these controls and VBA’s procedures to be effective, providing proper training to claims processors making these decisions remains important. VBA officials told us that they did not update training requirements as a result of the recent update to procedures because this update did not constitute a policy change. Rather, they said they revised the procedures to align with the existing practice before the update, in which VSRs were permitted to do pre-exam reviews. Further, officials said that each regional office can designate qualified claims processors to perform the pre-exam review and provide training as necessary. VBA officials also said that they do not believe additional training is necessary for VSRs who may be performing this role because the procedure for ordering exams—a skill for which they have been trained—is the same for all types of exams, including those for reevaluations. Although VSRs receive training on the process of ordering an exam, VBA officials confirmed that VSR coursework does not specifically cover the pre-exam review in the reevaluation process. In contrast, raters receive training on the process of deciding whether a reevaluation is warranted, including reviewing medical evidence and applying exclusions in VBA’s procedures. Further, staff in three of the four regional offices we spoke with, including supervisors, quality assurance staff, and managers, said that VSRs do not have the proper training for this task. For example, they are not trained to review medical evidence to make an informed decision about whether a reevaluation is still warranted, according to officials. Similarly, the OIG found in its 2018 report, which reviewed a sample of claims from March through August 2017, that VSRs were unfamiliar with criteria used to determine whether or not an exam is necessary. Federal standards for internal control highlight the importance of training to develop the relevant knowledge, skills, and abilities needed for key roles. We also have previously identified key practices for training and development that suggest that agencies should have a strategy that includes tracking and other control mechanisms to ensure that the relevant employees receive training in line with their responsibilities. Without ensuring that training reflects the relevant knowledge, skills, and abilities needed by claims processors in VBA regional offices, VBA may find these staff continue to make uninformed and incorrect reevaluation decisions that are not aligned with VBA policy, guidance, and procedures. VA spends substantial time, effort, and billions of dollars per year providing disability compensation, health care, and other forms of assistance that promote the wellness of veterans with service-connected conditions. However, VA does not know whether these efforts improve the health of these veterans on several fronts. While we are encouraged by VA’s interest in considering ways to analyze health outcomes, VA has not yet established a plan for addressing the identified research challenges. Without a plan, VA will not be positioned to understand the characteristics, needs, and health outcomes of veterans with service- connected conditions or how disability compensation and health care work together to help them. Disability reevaluations can shed light on whether veterans’ service- connected conditions have changed. However, the agency could take additional steps to analyze outcome and other data on completed reevaluations. Importantly, tracking and analyzing trends and outcomes could shed light on an apparent contradiction: why the majority of recent reevaluations resulted in no change in veterans’ combined ratings when the regulations state that reevaluations generally should not be conducted in these cases. Without these analyses, VA may be unaware of any reevaluation trends, possible explanations for them, or need to recalibrate guidance or resources to address these issues. Reevaluations represent an investment of resources for VA and the veterans who undergo them. Insights into the effectiveness of the reevaluation process are thus critical for managing VBA’s workload and informing agency policy. Specifically, while VBA tested raters’ knowledge of reevaluation policies in its May 2018 consistency study, it missed opportunities to review reevaluation decisions in the offices at greatest risk of making incorrect decisions, as recommended in the consistency study report. Following up on the report’s findings could also provide insights into root causes of errors in reevaluation decisions, which could inform decisions about additional targeted training or improved guidance. For veterans who show health improvements, VBA’s reevaluation process can ensure they have the correct disability rating and associated benefit payment. However, VBA could better mitigate the risks of making unwarranted reevaluation decisions by clarifying guidance in its procedures manual about the knowledge, skills, and abilities regional office staff need to determine whether a reevaluation should be conducted. Moreover, defining training requirements would help ensure that claims processors who conduct reevaluations have the needed skill sets and that their decisions are aligned with VBA policy and guidance. Ultimately, by enhancing and linking existing information about service- connected conditions and health care and from the results of reevaluations, VA could better understand the health outcomes of veterans who have incurred or aggravated disabling conditions during military service. We are making the following five recommendations to VA: The Secretary of Veterans Affairs should ensure that the Office of Enterprise Integration develops a plan—including milestones and roles and responsibilities for OEI, VBA, and VHA—to address identified challenges that have hindered research on the health care outcomes for service-connected conditions of veterans receiving disability compensation. To align VA’s efforts with the goals of its 2018-2024 Strategic Plan, VA’s development of this plan should be completed and ready for implementation by June 1, 2020. (Recommendation 1) The Under Secretary for Benefits should develop and implement a periodic analysis of program management data for trends in the individual service-connected conditions being reevaluated as well as data on the outcomes of reevaluations. (Recommendation 2) The Under Secretary for Benefits should implement the two recommendations in VBA’s May 2018 consistency study to provide training on how to determine when a reevaluation is needed and review reevaluation decisions for accuracy at the lowest-scoring offices and take corrective action as needed. (Recommendation 3) The Under Secretary for Benefits should clarify guidance in its procedures manual regarding the knowledge, skills, and abilities needed to make decisions on whether to reevaluate veterans for changes in their service- connected conditions. (Recommendation 4) The Under Secretary for Benefits should align training requirements with the knowledge, skills, and abilities needed for reviewing claims to decide whether to conduct a reevaluation. (Recommendation 5) We provided a draft of this report to the Department of Veterans Affairs (VA) for review and comment. VA provided written comments that are reproduced in appendix I. VA agreed with recommendations 1 and 2, and concurred in principle with our other three recommendations. The comment letter described steps the Veterans Benefits Administration (VBA) plans to take, or is in the process of taking, to address the recommendations. However, except for recommendations 1 and 2, VA’s proposed actions would not fully address the underlying issues we identified. With regard to recommendation 1 to develop a plan to address challenges to studying health outcomes, VA stated that the Office of Enterprise Integration (OEI) will coordinate with VBA and the Veterans Health Administration (VHA) to create an operational plan that addresses challenges that have hindered research on health care outcomes for service-connected conditions of veterans receiving disability compensation. VA anticipates completing this plan by June 2020. With regard to recommendation 2 to use information on reevaluations to improve program management, VA stated that VBA plans to expand its review of existing data and reports to analyze trends regarding which service-connected conditions are identified for reevaluation, and review the outcomes or results of these reevaluations. VBA plans to develop and implement this effort by the end of June 2020. With regard to recommendation 3 to implement the recommendations from the 2018 consistency study, VA stated that VBA provided a reminder to all regional offices about the availability of training resources on how to determine when a reevaluation is needed. VA also stated that VBA conducted another consistency study on this issue in August 2019 and plans to inspect claims at the two lowest-scoring regional offices identified in that study by January 15, 2020. We are encouraged by VBA’s plans to use the results of the 2019 study by inspecting claims at the lowest- scoring offices. However, using the results of both the 2018 and 2019 studies would allow VBA to more fully identify and correct root causes of any deficiencies, such as through additional training or the improvement of training. With regard to recommendation 4 to clarify guidance regarding the specific knowledge, skills, and abilities staff need to determine when to reevaluate disability claims, VA recognized the importance of having appropriately skilled and trained employees to process reevaluations and other claims. VA stated that each regional office identifies which employees complete these reviews based on their staff expertise. Further, VA stated that its Systematic Technical Accuracy Review (STAR) results of 95 percent for reevaluations indicate that further action is not needed. We continue to believe that flexibility for regional offices can be balanced with assurance that staff with the appropriate knowledge, skills, and abilities are conducting this work across regional offices. In addition, the STAR accuracy rate provides limited information about the accuracy of decisions to reevaluate claims, as discussed below. As noted in the report, identifying the knowledge, skills and abilities needed by qualified staff to carry out their responsibilities can help management ensure the program’s objectives are met. With regard to recommendation 5 to improve training for reevaluations, VA stated that additional training on reevaluations is not needed because its STAR accuracy rate for reevaluations is 95 percent. As noted in the report, VBA’s STAR reviews a small percentage of all completed reevaluations, and errors related to improperly ordered reevaluations are not reflected in STAR accuracy scores. We believe that additional action is needed to address our recommendation by ensuring staff are trained appropriately on these procedures to correctly determine whether reevaluations are needed. This additional training or guidance is particularly needed given the results of VBA’s May 2018 and August 2019 consistency studies, the views of regional staff we talked with, and the large volume of unwarranted exams. We are sending copies of this report to the appropriate congressional committees, the Secretary of Veterans Affairs, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, James Whitcomb (Assistant Director), Dana Hopings (Analyst-in-Charge), Rachel Pittenger, and Greg Whitney made key contributions to this report. Also contributing to this report were Steven Campbell, Debra Draper, Alex Galuten, Sarah Gilliland, Alison Grantham, Amber Gray, Gina Hoover, Aaron Karty, Diona Martyn, Mimi Nguyen, Jessica Orr, Claudine Pauselli, Almeta Spencer, Srinidhi Vijaykumar, and Erin Wurtemberger.", "summary": "VA receives billions of dollars per year to provide health care and disability compensation to promote the wellness of veterans with service-connected conditions. VA studies veterans' health through research and assesses changes in service-connected conditions through its reevaluation process. GAO was asked to review VA's efforts to study and gauge the health outcomes of veterans with service-connected conditions. This report examines the extent to which (1) veterans used VA health care services to treat service-connected conditions, and what is known about their health outcomes; (2) VA uses information on reevaluations to help manage the program; and (3) VA's procedures position it to determine when to conduct a reevaluation. GAO reviewed fiscal year 2018 VA health care data; selected studies; VA data on completed reevaluations from fiscal years 2013-2018; and relevant federal laws, regulations, and program guidance. GAO also interviewed staff at four VA regional offices (selected for variation in claims workload and location) and VA officials at the agency's central office. In fiscal year 2018, about 54 percent of veterans receiving Department of Veterans Affairs (VA) disability compensation had at least one VA outpatient visit to treat an injury or illness that VA deemed was incurred or aggravated during military service (i.e., a service-connected condition). However, the health outcomes of veterans with service-connected conditions, such as changes in the severity of symptoms or the incidence of mortality, are not well understood. Information about health outcomes is central to ensuring veterans' wellness and assessing improvement in their disability status. According to VA researchers GAO spoke with and academic studies GAO reviewed, various challenges have limited research on this population. For example, data reside in different VA systems and use different identifiers for medical conditions, hindering use of the data. While VA has begun to consider ways to analyze health outcomes, it has not yet established a plan for this effort, including the scope, specific activities, and timeframes for addressing the identified research challenges. VA does not glean information from the results of reevaluations to help manage its disability compensation program. Disability reevaluations help VA gauge whether veterans' service-connected conditions have changed, and whether disability compensation should be modified to reflect those changes (see figure). However, VA does not fully use key management information, such as: trends in how frequently certain conditions are reevaluated, including those required by VA regulations to be reevaluated; and outcomes of reevaluation decisions for individual conditions (i.e., whether conditions worsened or improved). Both trend and outcome information could help VA better target its resources toward reevaluating conditions more likely to change. VA recently updated its procedures manual to specify which staff may determine whether a veteran's condition should be reevaluated, but has not clearly defined skill sets and training needed to consistently implement these procedures. Specifically, the updated procedures do not indicate the knowledge, skills, and abilities staff need to determine when to conduct reevaluations. Further, VA has not ensured that training aligns with these needed skillsets. Without improving procedures and training, VA is at risk of conducting unnecessary reevaluations and burdening veterans. GAO is making five recommendations, including that VA develop a plan to address challenges to studying health outcomes, use information on reevaluations to improve program management, and improve procedures and training for reevaluations. VA agreed with two recommendations and agreed in principle with the other three, but its proposed actions do not fully address GAO's concerns.", "document_type": "gao"}
{"report": "Foreign students interested in studying in the United States must first be admitted to an SEVP-certified school or university before applying for a nonimmigrant visa at a U.S. embassy or consulate overseas to authorize travel to the United States. A visa holder must present himself or herself for inspection at a U.S. port of entry by an officer with DHS’s U.S. Customs and Border Protection to determine admissibility. Nonimmigrants, including foreign students, are permitted to enter the United States for an authorized period of stay. Schools seeking to enroll foreign students on F and M visas must pay an application fee and petition for SEVP certification by submitting an electronic certification petition and supporting documentation to ICE through SEVIS. Among other things, SEVIS assists ICE in tracking and providing oversight of foreign students—while they are approved to study in SEVP-certified U.S. educational institutions—and their accompanying dependents. Figure 1 outlines the steps required for schools seeking to obtain and maintain SEVP certification and the process for foreign nationals to pursue a course of study in the United States. More specifically, during the initial certification process, a school must provide ICE, specifically SEVP’s School Certification Unit (Certification Unit), with evidence of the school’s legitimacy (or bona fides) and eligibility. Such evidence includes the following: proof of any requisite licensure or approval by an appropriate state- level licensing or approving agency; proof of accreditation by an accrediting agency recognized by the Department of Education, if accreditation is required or otherwise claimed; DSO’s attestation statement that he or she is familiar, and intends to comply, with program rules and regulations for admission under, and maintenance and change of, nonimmigrant student status; and confirmation by the school that it is eligible for certification, among other things (willful misstatements in a school certification petition may constitute perjury); and DSOs’ proof of U.S. citizenship or lawful permanent residency. In addition, petitioning schools must generally submit a school catalog or written statement including certain information with respect to the qualifications of teaching staff, and attendance and grading policies, among other things. However, the requirement for a school catalog or written statement is not applicable to a public school or school system, a school accredited by a Department of Education–recognized accrediting agency, or a secondary school operated by or as part of such an accredited school. Moreover, an institution of higher education that is not a public educational institution or system, or not accredited by a recognized accrediting body, must provide evidence “in lieu of” meeting those criteria. Such evidence must show either that the school of higher learning confers recognized degrees upon its graduates or its credits have been and are unconditionally accepted by at least three public or accredited institutions of higher education. Schools nominate individuals to serve as DSOs, who act as liaisons between foreign students, the DSOs’ employing school, and federal government agencies. DSOs support school compliance with record- keeping, reporting, and other requirements, and provide recommendations to foreign students regarding the maintenance of their immigration status. In addition to entering and maintaining complete information on students in SEVIS in a timely manner, DSOs are responsible for using SEVIS to submit their school’s certification petition and update the information, as necessary. To demonstrate eligibility, DSOs must, among other things, provide to ICE statements certifying their familiarity and intent to comply with the program rules and regulations relating to the requirements for nonimmigrant students’ admission, maintenance of status, and change of status, and requirements for school approval. ICE’s regulations provide that willful misstatements in certification and recertification submissions may constitute perjury. Once ICE has received a complete petition from a school seeking SEVP certification, staff from SEVP’s Field Representative Unit are to conduct a site visit to the school, including each instructional site foreign students will attend, to interview school officials and review the facilities. After receiving all necessary evidence and a site-visit report from the field representatives, ICE staff in the Certification Unit analyze the documentation, determine the school’s eligibility, and certify those schools that they determine meet all of the program’s requirements. Further, DHS is required to conduct a review, every 2 years, of certified schools’ continued eligibility and compliance with the program’s requirements. To be eligible for recertification, an SEVP-certified school must demonstrate at the time of filing that it remains eligible for certification and has complied during its previous period of certification or recertification with record-keeping, retention, reporting, and other program requirements. During the recertification process, the Certification Unit requires schools to submit the same type of evidence that was required for certification, including, among other things, proof of state licensing and accreditation and DSO attestation statements and citizenship documentation. The Certification Unit also evaluates how the school has ensured that its foreign-student records are accurate and in compliance with statutory record-keeping requirements. However, site visits are not required for recertification. The Enhanced Border Security and Visa Entry Reform Act of 2002 states that a material failure of an SEVP-certified school to comply with the record-keeping and reporting requirements to receive foreign students shall result in the suspension for at least 1 year, or termination, of the school’s approval to receive such students. SEVP’s Analysis and Operations Center (Compliance Unit) conducts ongoing monitoring of SEVP-certified schools for compliance with these regulatory record- keeping and reporting requirements, as well as schools’ continued eligibility for certification. Under federal regulation, SEVP can deny an SEVP-certified school’s recertification petition or, subsequent to out-of- cycle review, withdraw certification if the school or its programs are no longer eligible for certification. Denial of recertification or withdrawal on notice as a result of out-of-cycle review may be for any valid and substantive reason, including failure to comply with record-keeping and reporting requirements, willful issuance by a DSO of a false statement, or not operating as a bona fide institution of learning, among other bases. According to federal standards and guidance, executive-branch agency managers are responsible for managing fraud risks and implementing practices for combating those risks. Federal internal control standards call for agency management officials to assess the internal and external risks their entities face as they seek to achieve their objectives. The standards state that, as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks. Risk management is a formal and disciplined practice for addressing risk and reducing it to an acceptable level. In July 2015, we issued the Fraud Risk Framework, which provides a comprehensive set of key components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The Fraud Risk Framework describes leading practices in four components: commit, assess, design and implement, and evaluate and adapt, as depicted in figure 2. The Fraud Reduction and Data Analytics Act of 2015, enacted in June 2016, requires the Office of Management and Budget (OMB), in consultation with the Comptroller General of the United States, to establish guidelines for federal agencies to create controls to identify and assess fraud risks and design and implement antifraud control activities. The act further requires OMB to incorporate the leading practices from the Fraud Risk Framework in the guidelines. In July 2016, OMB published guidance about enterprise risk management and internal controls in federal executive departments and agencies. Among other things, this guidance affirms that managers should adhere to the leading practices identified in the Fraud Risk Framework. Further, the act requires federal agencies to submit to Congress a progress report each year for 3 consecutive years on the implementation of the controls established under OMB guidelines, among other things. ICE developed a risk-assessment framework and other tools to assist in its efforts to manage fraud risks to SEVP. For example, in 2014, ICE began developing an SEVP Risk Assessment Model and Framework, which provides an overview of how SEVP identifies, assesses, responds to, and reports on identified internal and external risks to the program. Specifically, SEVP’s Risk Assessment Model and Framework—which was updated several times between 2014 and 2017—discusses categories of fraud risks to the program, including fraud associated with schools, DSOs, and students. Moreover, in 2014, ICE developed a Risk Assessment Tool for SEVP that uses data from SEVIS records to identify potential fraud and other noncompliance issues among certified schools. The tool prioritizes different risk indicators—such as the proportion of the school that consists of foreign students—and ranks schools by risk level. SEVP officials stated that schools identified as high risk receive additional administrative review by the Compliance Unit. According to SEVP officials and documentation we reviewed, ICE has continued to update and refine the tool since 2014 to improve its effectiveness in helping to identify program risks, including fraud risks. Through these and its oversight efforts, ICE has identified various fraud risks in SEVP; such risks may take various forms, including immigration benefit fraud, which involves the willful or knowing misrepresentation of material facts for the purpose of obtaining an immigration benefit, such as a nonimmigrant student status, without lawful entitlement. According to ICE documentation we reviewed and officials we spoke to, the fraud risks to the program generally fall into four broad categories: schools, students, DSOs, and third-party brokers, who are individuals engaged in the fee- or commission-based recruitment of foreign students, among other activities. Figure 3 illustrates the types of fraud that may occur in these four categories during different stages of a certified school’s involvement in the program, as we identified in ICE documentation and through our interviews with ICE officials. For specific examples of fraud risks that ICE has identified in SEVP, see figure 4. ICE has also taken steps since 2012 to strengthen its fraud risk- management efforts in response to our prior recommendations. For example, in our 2012 report on SEVP risks, we found that, among other things, ICE did not have a process to assess risks in SEVP and did not consistently implement existing internal controls for determining school eligibility. To address this and other findings, we made eight recommendations to enhance ICE’s ability to assess program risks, prevent and detect school certification fraud, and improve the controls over SEVP. ICE took action that addressed these eight recommendations and has developed various tools designed to strengthen its fraud risk- management efforts (see app. I). Further, ICE has taken steps to improve collaboration and coordination to enhance fraud risk management between SEVP and CTCEU, the unit within ICE responsible for managing criminal investigations. More specifically, ICE has embedded agents within SEVP’s Compliance Unit, and these agents help provide law-enforcement expertise within the unit and act as liaisons with ICE agents located in the field to provide information and support ongoing criminal investigations. According to a senior ICE official with CTCEU, the embedded agents have helped streamline processes and provide expertise to aid administrative and investigative efforts. Figure 5 shows the process for coordination between CTCEU and SEVP. Further, ICE officials with CTCEU stated they have acquired specialized software tools to manage fraud tips and to conduct open-source and related research on certified schools suspected of acting fraudulently. To help identify and prioritize leads, ICE officials stated that they use a software tool to efficiently help review and prioritize tips received through ICE’s tip line, which gathers tips from the general public on suspicious or potential criminal activity. To aid investigations of schools, ICE explored the use of another specialized software to aid the review of online social media associated with schools or individuals, among other things. In addition, changes to SEVIS have aided ICE’s efforts to manage fraud risks in the program. In 2008, ICE initiated an effort to modernize SEVIS to address identified system vulnerabilities, such as the inability to capture detailed school data that would allow the detection of patterns and anomalies that could indicate fraud. Although SEVIS modernization is not yet complete, changes made in the system have helped to improve system usability and the ability to identify suspected fraud in the program, according to program officials. For example, system edit checks implemented in 2015 and 2016 to verify user-entered names and addresses have enhanced data quality by helping to identify and prevent likely data-entry errors. SEVP officials also stated that improved data quality can help make it easier to distinguish potential fraud from unintentional data-entry errors. ICE officials we spoke to and related documentation we reviewed stated that SEVIS modernization efforts may include additional functionality, such as the ability to create person-centric records for each student. Although ICE has developed a Risk Assessment Model and Framework and taken other action to improve fraud risk management in SEVP, ICE has not fully developed and implemented a “fraud risk profile” that would help guide its efforts. According to our Fraud Risk Framework, an effective antifraud entity tailors the approach for carrying out fraud risk assessments to its programs. This approach allows an agency to, among other things, develop a fraud risk profile that identifies the inherent fraud risks affecting the program, assesses the likelihood and effect of each type of fraud risk that the determines the agency’s tolerance for certain types or levels of fraud risks in the program, examines the suitability of existing controls for each fraud risk, and documents the program’s fraud risk profile. Effective managers of fraud risks use this profile to help decide how to allocate resources to respond to fraud risks. Further, Federal Internal Control Standards require managers to respond to identified risks. Appendix III provides additional information on the key elements in the fraud risk-assessment process including the development of a fraud risk profile. Our assessment of SEVP’s Risk Assessment Model and Framework found that while it describes the program’s approach for managing fraud risks, it does not include all of the key elements of a fraud risk profile: First, SEVP’s Risk Assessment Model and Framework identifies three broad categories of inherent fraud risks that affect the program (those posed by schools, DSOs, and students), but does not include all risks that the program or its stakeholders have identified, such as the risk of third-party brokers. As noted previously, ICE agents and program officials identified brokers as a risk to the program because brokers have helped facilitate school and student fraud and misused or stolen student funds in the past. However, according to ICE officials with SEVP, SEVP’s Risk Assessment Model and Framework was not designed to define all of the risks posed to SEVP. Second, while SEVP’s Risk Assessment Model and Framework assesses the potential effect of its risk posed by students, schools, and DSOs, it does not discuss the likelihood of the risk’s occurrence. For example, the Risk Assessment Model and Framework contains a narrative outlining the potential negative consequences of each of the three broad risk categories but does not address the likelihood of those risks occurring. According to SEVP officials, SEVP’s Risk Register helps identify and determine the likelihood of identified program risks. However, our review of the Risk Register found that it is used to track program-wide risks and does not identify or discuss specific fraud risks. Further, these officials stated that many of the components in a fraud risk profile are included in SEVP’s Risk Assessment Tool, but this tool was developed to prioritize the review of SEVP-certified schools that have potential compliance issues and was not designed to address all SEVP fraud risks such as the risks posed by students or brokers. Using information on the likelihood of risk occurrence can help managers decide how to allocate resources. For example, managers can use this information to make decisions to allocate resources to addressing fraud risks that are most likely to occur or have relatively high impact. Third, SEVP’s Risk Assessment Model and Framework does not assess the agency’s tolerance for all fraud risks to the program. For example, while SEVP officials stated that students represent a significant risk to the program, they have not fully assessed the extent of risks associated with student fraud or the agencies’ tolerance for it. In October 2017, the SEVP Director stated that SEVP was just beginning to get a better understanding of student risks, but had not done an assessment of their likelihood and tolerance. However, SEVP officials acknowledged the importance of fully assessing student risks because of the challenges that can be associated with detecting, preventing, and responding to student fraud. Fourth, SEVP’s Risk Assessment Model and Framework does not examine the suitability of existing fraud controls or prioritize all residual risks that remain after inherent risks have been mitigated by existing control activities. We found that, while the Risk Assessment Model and Framework discusses different internal controls and tools used to prioritize and address risks in the school certification and recertification process, such as the Risk Assessment Tool, it does not explicitly identify any internal controls or tools used to prioritize or address student risks. In addition, the Risk Assessment Model and Framework does not identify and prioritize residual fraud risks that ICE has flagged as being vulnerabilities to the program. According to ICE agents in four field offices and officials in the Compliance Unit, limitations to SEVP’s ability to prevent some schools that present fraud risks from obtaining certification or continuing to participate in the program after fraud risks have been identified represent residual risks to the program. For example, officials in the Compliance Unit stated that certified schools that have been accredited through an accrediting body recognized by the Department of Education generally represent a lower fraud risk, but ICE has still experienced noncompliance and cases of fraud with these schools. At one point several fraud cases were tied to the same accrediting body. In another example of a potential residual risk to the program, ICE field agents stated that potentially fraudulent schools may continue to operate during criminal investigations, which can take several years to investigate and prosecute. During the investigation, schools may remain in operation and continue to enroll foreign students, provided their certification is not withdrawn through other administrative actions. As one example, ICE’s investigation into Prodee University—a case that involved hundreds of students—began in 2011, but warrants were not issued until 2015. The school continued to operate and accept foreign students during the 4-year investigation, creating residual risk to the program during these years. According to SEVP’s Director, the program has not developed a fraud risk profile that fully addresses all identified risks because the program has not yet developed the maturity needed to manage its risks in this way, but she noted that doing so could be a good next step in the process. Without a fraud risk profile consistent with leading practices—which identifies all fraud risks, discusses the likelihood of those risks, assesses the agency’s risk tolerance, and determines the suitability of related controls—ICE cannot ensure it has taken all necessary actions to address SEVP risks. ICE is exploring the use of better data analytics to help detect fraud in SEVP but has not yet employed techniques, like network analysis, to help detect and prevent fraud prior to certification. ICE officials with SEVP stated that they are exploring the use of additional data-analytics tools to help mitigate fraud in the program, including tools that can perform network analysis. However, these efforts are in their early stages and have been limited to conversations between program staff. While previously noted efforts to improve SEVIS may also include additional data analytics to mitigate fraud, these efforts have remained underway since 2008. Agency officials told us they recognize that better analytic tools can help them detect and prevent fraud in the certification process and are seeking additional resources to support this effort. According to agency documentation, SEVP awarded a contract in September 2018 to help establish a data-governance framework within SEVP. Among other things, the contract will examine the tools, skill sets, and number of people needed to support the data-related needs for SEVP, to include operational data and analytics. According to agency officials, SEVP plans to award a contract in the first quarter of fiscal year 2019 to provide better data-analytics support. Data-analytics approaches, such as network analysis, have the potential to enable ICE to identify high-risk schools prior to initial certification, thus allowing SEVP to apply increased oversight, as needed, during the adjudication process. Network analysis involves a quantitative approach for analyzing, summarizing, and graphically representing complex patterns of relationships among individuals or organizations. Such a technique is useful for identifying associations, such as between schools with current or past administrative and criminal concerns and those schools seeking certification. Information about the connections and relationships among schools—developed through network analysis—may then provide leads in reviews and investigations in the certification and recertification processes, which are important controls for preventing fraudulent schools from entering and remaining in the SEVP program. ICE field agents with two of five field offices we visited stated that it can be challenging to identify fraudulent schools as compared to legitimate ones during the initial certification of schools. For example, agents familiar with one investigation stated that after ICE began investigating a school for suspected fraud, the owner tried to establish another school, which was only identified because of a lead provided through interviews conducted during the investigation. Further, because tools such as the Risk Assessment Tool use data analytics, but rely on information collected from current SEVP-certified schools, it can be difficult to identify schools with fraud concerns before they are certified to participate in the program. Using a network approach in our analysis of 2,439 SEVP-certified schools, we identified 11 connections that could raise fraud concerns. Specifically, we conducted a network analysis utilizing both public and proprietary information associated with certified schools as of September 2017. We obtained basic information on these schools from ICE, such as school names and addresses. We also used public records associated with these schools related to businesses and people, such as past and current executives. Using this information and freely available public software, we identified relationships among certified schools that ICE had previously identified as having potential compliance or fraud concerns and other certified schools that did not have such concerns. For example, in 11 connections, we identified instances in which an executive appeared to have been employed by a school under active criminal investigation or administrative review who was either previously or later employed by a different school not under investigation or review. Moreover, for 2 of the 11 connections, we found additional derogatory information associated with executives tied to SEVP-certified schools that could raise fraud concerns. For instance, one executive had employment terminated from a previous school and was under investigation for misappropriating school funds for personal use. While these connections do not prove fraud or noncompliance, they do provide information about potential risks, which can inform the prioritization of administrative and investigative resources during certification. ICE currently has limited ability to identify associations among schools with potential fraud concerns before they are certified to participate in the program. According to our Fraud Risk Framework, federal managers should design and implement specific control activities to prevent and detect fraud. These control activities can include data analytics, among other things, and should emphasize fraud prevention to the extent possible. A network approach provides the capability to better prevent and detect fraud by identifying potentially fraudulent schools before they are certified by SEVP and by detecting associations that pose a fraud risk among those already certified. ICE has processes in place for school certification, recertification, and ongoing compliance monitoring, and has taken steps to improve school certification controls since our 2012 report. We also found that ICE followed its established procedures and specifically identified GAO’s fraudulent petitions or otherwise took appropriate steps to prevent the petitions from moving forward in the process during our three independent covert tests of SEVP internal controls over the school certification process. However, the agency continues to face long- standing delays in conducting recertification reviews every 2 years to ensure that SEVP-certified schools continue to meet program requirements—one of its important fraud risk controls. As a result of these delays, ICE has a queue of recertification petitions awaiting adjudication, which creates additional fraud risks to the program if higher-risk schools continue to operate pending recertification. However, the agency has not assessed the magnitude of these risks. ICE’s certification and recertification processes are designed to assess schools’ initial and continued eligibility to enroll foreign students and, as previously discussed, once a school is certified, ICE is to monitor its continued program eligibility. SEVP-certified schools are to undergo recertification reviews every 2 years (see fig. 6). Initial certification: As previously discussed, to be eligible for SEVP certification, a petitioning school must establish at the time of filing that it is a bona fide institution of learning or other recognized place of study that possesses the necessary facilities, personnel, and finances to conduct, and is in fact engaged in, instruction in recognized courses. SEVP officials stated that they address potential fraud risks during the initial certification process by verifying the schools’ information and documentation through web-based research and a site visit to interview the school’s DSO and observe the school’s facilities. According to SEVP officials and guidance, as of October 2016, field representatives are responsible for conducting and documenting site visits for certifications. When conducting the visits, field representatives are to gather evidence on school eligibility for certification, review the facilities, and interview personnel nominated on the petition to become DSOs. They may also report back any anomalies or areas of concerns they may notice for further vetting by the compliance unit. SEVP received approximately 2,000 certification petitions from fiscal years 2013 through 2017. See figure 7 for details on the number of approved and denied petitions during this period. ICE has implemented several controls to address fraud risks in the school certification process since our 2012 report on SEVP program risks, but long-standing delays in the recertification process create additional fraud risks. In particular, ICE strengthened its processes for verifying and monitoring schools’ accreditation and states’ licensing statuses. For example, since December 2012, SEVP adjudicators are to verify all “in lieu of” letters during the school’s initial-certification and recertification processes. In May 2015, SEVP developed a continuous process for verifying schools’ state licensing and accreditation status and updated its Adjudicator’s Manual with specific actions adjudicators must take to consistently verify evidence provided by schools, including “in lieu of” letters and states’ licensing documentation. In addition, SEVP took steps to ensure that all flight schools had the appropriate Federal Aviation Administration certification. Recertification: To be eligible for recertification, an SEVP-certified school must demonstrate at the time of filing that it remains eligible for certification and has complied during its previous period of certification or recertification with record-keeping, retention, reporting, and other program requirements. SEVP received approximately 14,000 recertification petitions from fiscal years 2013 through 2017. See figure 8 for details on the number of approved and denied petitions during this period. The recertification process is an important fraud risk control, according to ICE officials, since they may determine that some certified schools are potentially noncompliant during the recertification process. For example, SEVP denied 105 recertification petitions from fiscal year 2013 through fiscal year 2017. On the basis of our review of recertification denial data, the majority of denials were due to the school’s abandoning its petition for recertification by not responding to SEVP’s request for further information. Appendix IV provides additional details on the withdrawal and denial of certification and recertification petitions as outlined in federal statute and regulation. For the remaining schools, SEVP issued a formal recertification denial notice for a variety of reasons, including those that highlight fraud risks in the program, such as improper issuance of Forms I-20, including the issuance of forms to foreign students who will not be enrolled in or carry a full course of study; DSO conduct did not comply with program regulations; willful issuance by a DSO of a false statement; failure to timely report school or course of study information, including material changes; and failure to maintain the accreditation or licensing necessary to qualify graduates as represented in the school’s Form I-17. Ongoing compliance monitoring: The Enhanced Border Security and Visa Entry Reform Act of 2002 provides that SEVP-certified schools are to comply with record-keeping and reporting requirements to enroll nonimmigrant students. Between schools’ initial certifications and their subsequent recertification reviews, ICE uses a variety of mechanisms to monitor ongoing compliance with program requirements and mitigate fraud risks. For example: SEVP deployed its first group of field representatives in 2014. As of June 2018, ICE had 57 field representatives across 60 different geographic areas of responsibility nationwide. According to SEVP guidance, field representatives are to act as direct liaisons between SEVP and certified schools and are to try to meet with all certified schools in their territory at least once per year if the school has foreign students enrolled, or once every 2 years if no foreign students are enrolled. According to SEVP officials, the field representatives are to have a customer-service focus and assist DSOs in adhering to program requirements and, as a result, do not have law-enforcement or investigative responsibilities. However, if field representatives learn of potential fraud while visiting a school, they are to document and send this information to SEVP headquarters. All of the eight field representatives we interviewed reported that they primarily have a customer-service role but have also identified and reported suspected fraud to SEVP headquarters. For instance, one representative stated that she reported a language school because its stated level of student enrollment did not appear to correspond with the number of students in class during her visits to the school. SEVP adjudicators are to verify and adjudicate changes that occur at an SEVP-certified school that require an update to the school’s Form I-17 petition information in SEVIS. These changes include the school’s name, location, or new areas of study offered, among others. According to Certification Unit officials, adjudicators review information from both SEVP’s risk tools and field-representative school-visit reports when adjudicating updates to identify any indications of noncompliance or fraud that need to be further reviewed and researched by the Compliance Unit. Compliance Unit staff are to vet tips provided by external parties (such as DSOs from other schools) or internal stakeholders (such as field representatives or Certification Unit adjudicators) to determine whether they indicate the need to open an administrative or criminal investigation on the school. Compliance Unit staff may also identify schools for additional monitoring. The Compliance Unit is also responsible for extracting and analyzing data from SEVIS on an ongoing basis, including data related to certified schools and foreign students suspected of noncompliance and fraud, among other things. According to ICE officials, staff are responsible for researching schools with high-risk scores provided by the Risk Assessment Tool. ICE may conduct an out-of-cycle review of a school at any time to help determine whether the school is complying with its reporting and record-keeping requirements and to ensure the school’s continued eligibility for SEVP certification. ICE may initiate an out-of-cycle review as a result of receiving information regarding potential noncompliance or fraud. The out-of-cycle review process may include a review of student records, a request for the submission of documentation to verify accreditation, a request for proof of state licensure, or a request for any other required evidence that establishes a school’s continued eligibility for SEVP certification. ICE officials stated that they may, pending the result of this review, issue a remedial action plan to the school describing the areas of noncompliance, such as correcting student records, that the school is required to address to maintain its program eligibility. If, upon completion of an out-of-cycle review, SEVP determines that a certified school has failed to sustain eligibility or has failed to comply with the record-keeping, retention, reporting, and other requirements, SEVP will institute withdrawal proceedings by serving the school a notice of intent to withdraw SEVP certification. At the conclusion of withdrawal proceedings, a school found to be ineligible for continued SEVP certification as a result of an out-of-cycle review will receive a notice of withdrawal (see app. IV for additional information on the withdrawal process). ICE followed established procedures during our three covert tests of the internal controls over the SEVP school certification process by either successfully identifying GAO’s fraudulent petitions or by taking appropriate steps to prevent the petitions from moving forward in the process. Therefore, we did not identify any significant deficiencies during our testing of these controls. We submitted certification petitions and conducted other covert investigative work for three fictitious schools, all of which have differing certification requirements. Using these schools, GAO agents applied for SEVP certification. For one of the fictitious schools, we tested SEVP certification controls that require schools to submit complete documentation by submitting an application for the school that was missing several of the required documents. Consistent with its procedures, ICE flagged our petition as incomplete and sent us a notification stating that our petition was canceled because we failed to submit all supporting evidence as outlined in the regulations. For our second school, we tested SEVP controls requiring schools to schedule and complete a site visit conducted by an SEVP field representative, by submitting a completed petition, but avoiding the site visit and requesting that our paperwork move forward without it. SEVP’s field representative subsequently notified us that our petition would not move forward until a site visit was performed. For our third fictitious school, we submitted an application, and participated in a site visit with SEVP officials. We tested SEVP controls related to verifying application documentation, and whether SEVP site- visit officials followed established procedures for the site visit. The field representative toured the facilities and interviewed GAO agents posing as school officials. During its review of our petition, ICE took steps to verify our school’s information and discovered that documentation we submitted was fictitious. As a result, SEVP officials subsequently referred our school to ICE agents for further investigation, consistent with ICE policies and procedures. Upon learning that ICE followed its documented internal control processes, we concluded our covert testing. ICE faces long-standing challenges in conducting school recertification on a 2-year basis consistent with statute and regulation, which may allow potentially fraudulent schools to operate for a longer period without detection. The Enhanced Border Security and Visa Entry Reform Act of 2002 states that DHS must conduct compliance reviews every 2 years, during which ICE reviews a school’s records to verify that it continues to comply with program-eligibility requirements. ICE began the first recertification cycle in May 2010—8 years after the enactment of the statutory requirement for periodic review of SEVP-certified schools. As of March 2012—nearly 10 years after statutory enactment—ICE reported that it had recertified approximately 19 percent of certified schools. In October 2016, ICE reported that it had completed its first round of recertification (in other words, all existing certified schools had been recertified at least one time) and had used recertification to address a number of issues, including gathering missing data for some school records. ICE has continued to recertify schools. However, Certification Unit officials told us that, while recertification should be conducted every 2 years, ICE has been unable to meet a 2-year time frame for all certified schools. ICE has been extending schools’ certification expiration dates since officials began recertifying schools in 2010, according to Certification Unit officials, to provide additional time for adjudicating recertification petitions. According to ICE regulations, schools should be notified 180 days before their certification expiration date and must file a completed petition for recertification by such date, which is 2 years from the date of their previous SEVP certification or the recertification expiration date. However, as described in figure 9, SEVP has been extending schools’ certification expiration dates by 180 days beyond the 2-year mark as defined in ICE’s regulation. Under this process, schools must submit their complete petition and supporting documentation to SEVP within 180 days after the 2-year mark. Extending certification expiration dates increases the period between each recertification review, resulting in a decrease in the number of recertification reviews conducted in a given time frame, as shown in the hypothetical example of two schools in figure 10. For instance, if SEVP initially certified a school in January 2016, by providing an extension SEVP is setting the school’s certification expiration date to July 2018—2 years and 180 days after the initial certification—as opposed to 2 years after the initial certification, which would be consistent with ICE regulations. After receiving the school’s documentation, Certification Unit staff need time to review and adjudicate the petition. If this school submits a complete petition to SEVP in June 2018—1 month before its revised expiration date—SEVP staff may and do take additional time, depending on the facts and circumstances of the specific petition, beyond the revised expiration date to adjudicate the petition. SEVP officials stated that, if necessary, they can further extend the certification expiration date to accommodate the time needed for their review. For instance, SEVP may not adjudicate this school’s petition until December 2018. Once SEVP completes its adjudication in December 2018, the school’s new certification expiration date would be June 2021 (2 years and 180 days after December 2018). Thus, rather than potentially being able to complete two rounds of recertification during this 5-year period consistent with ICE regulation, SEVP would recertify the school only once. As we reported in 2012, according to SEVP officials, ICE delayed the recertification process until after SEVIS was deployed in 2003 and the program fee was increased in 2008 to support hiring additional staff. Further, with regard to resources, ICE officials stated that they are cross- training adjudicative staff across all of their program areas to help address the recertification workload, and creating regional adjudication teams with assigned territories similar to the field representatives’ territories to allow the adjudicators to work with the same schools throughout the school’s participation in the program. In addition, in February 2018, SEVP’s Director stated that ICE was expecting to hire additional adjudicators for a total of 10. In July 2018, ICE identified the need to increase initial certification fees and add a new recertification fee to, among other things, hire additional adjudicators to address longer recertification processing times. Specifically, ICE stated that, at present staffing levels, SEVP is able to process 1,939, or 44 percent, of the required annual projected 4,400 recertification cases. ICE’s actions to allocate additional resources to the recertification process are a step in the right direction toward addressing its recertification delays. However, it is unclear whether these actions alone will be adequate to address the delays. As of June 2018, ICE officials told us that there were 3,281 recertification petitions that needed to be adjudicated. As previously discussed, recertification reviews are an important fraud risk control because they are one of ICE’s primary means of reviewing each school’s data and identifying potential school noncompliance and fraud, especially since an out-of-cycle review may not be conducted for each school. As Federal Internal Control Standards state, management should: (1) establish and operate activities to monitor the internal control system and evaluate the results, and (2) identify, analyze, and respond to risks related to achieving the defined objectives. By not requiring schools to submit their petitions within the 180-day period prior to the 2-year expiration date, as required by regulation, ICE has limited assurance it is leveraging the recertification process effectively to identify and respond to potential fraud risks to the program, including those risks associated with allowing a fraudulent school to operate for a longer period. ICE’s plan to increase the number of SEVP adjudicators may help it meet the 2-year recertification requirement, but without monitoring and evaluating the efficacy of these actions, ICE will not have reasonable assurance it can effectively manage the recertification process and associated fraud risks. As previously discussed, ICE’s queue of recertification petitions awaiting adjudication creates additional fraud risks to the program if higher-risk schools continue to operate pending recertification. However, ICE has not assessed the magnitude of such risks. As of June 26, 2018, ICE had 3,281 recertification petitions in a queue for review, according to SEVP officials, petitions that ICE adjudicates in the order in which they were filed. As discussed, ICE uses a variety of mechanisms to monitor schools’ ongoing compliance with program requirements and mitigate fraud risks. In addition, ICE assesses and considers schools’ risks during the adjudication process for recertification. Specifically, according to SEVP’s recertification standard operating procedures, case analysts in the Certification Unit are to review the recertification packages once submitted to determine whether they are complete and prepare them for adjudication. Further, SEVP officials stated that the Certification Unit staff use an assessment of the school’s risk to help prioritize further analysis and review efforts. When adjudicating recertification petitions, adjudicators are to confirm that they have assessed the school’s risk and whether any identified risks have previously led to any further action, according to Certification Unit officials. If case analysts determine that compliance issues are present (e.g., the school has closed or the school has made updates to the Form I-17 that are awaiting adjudication), they are to notify their supervisors. For higher-risk schools, Certification Unit officials stated that adjudicators may request more detailed evidence from schools as part of recertification, consistent with their standard operating procedures, than they would for lower-risk schools to help make more efficient use of the resources in this unit. These processes have helped SEVP consider and address potential risks during the recertification process. However, SEVP has not determined risks posed by schools in its recertification queue and, according to Certification Unit officials, does not prioritize the review of schools’ recertification petitions in its queue based on risk. As previously noted, ICE is required to conduct periodic reviews every 2 years to determine SEVP-certified schools’ continued program eligibility and compliance. The statute governing recertification does not, by its terms, preclude ICE from considering a school’s relative risk as part of the compliance review process. However, SEVP’s Director and Certification Unit officials stated that a recertification process that prioritizes reviews based on school risk would not be particularly helpful or add value in addressing school compliance concerns because the officials already have a number of mechanisms they can use, as previously discussed, to address potential noncompliance, including conducting out-of-cycle reviews of high-risk schools. Although ICE considers schools’ risk-related information during the adjudication process and may identify noncompliant or potentially fraudulent schools through ongoing monitoring activities, ICE has not determined the extent to which there are residual fraud risks posed by schools in the recertification queue that ICE has identified as higher-risk than other schools awaiting recertification. According to GAO’s Fraud Risk Framework, managers should rank residual fraud risks in order of priority, using the likelihood and impact analysis, as well as risk tolerance, to help decide how to allocate resources to respond to residual fraud risks, all of which is documented in a fraud risk profile. As previously discussed, a fraud risk profile (1) identifies the inherent fraud risks affecting the program, (2) assesses the likelihood and effect of each type of fraud risk that it has identified, (3) determines the agency’s tolerance for certain types or levels of fraud risks in the program, and (4) examines the suitability of existing controls for each fraud risk. Given SEVP’s long- standing delays in recertifying schools, without an assessment of residual risks posed by the recertification queue—as part of its fraud risk profile, as previously noted—ICE cannot ensure that it is effectively addressing the risks posed by higher-risk schools awaiting recertification, a situation that does not help further strengthen ICE’s fraud risk-management efforts in SEVP. ICE has identified fraud risks related to DSOs and implemented controls to mitigate these risks, but weaknesses exist in four key areas: (1) verification of information provided by DSOs in support of their eligibility, (2) background checks, (3) mandatory compliance training, and (4) fraud- risk training. Prior to approval of schools’ nomination of individuals to serve as DSOs, these nominees must meet eligibility requirements and pass a criminal-background check, but weaknesses exist in both of these controls. In addition, once ICE approves prospective DSOs, it has controls for oversight and training; however, this training is not mandatory and does not address fraud risks. ICE has eligibility requirements for school employees seeking to serve as DSOs at SEVP-certified schools, as discussed earlier, but does not routinely verify DSO-submitted eligibility information in support of their immigration or citizenship status. According to ICE regulations, to be eligible to participate as a DSO, an individual must be a regularly employed member of the school administration whose office is located at the school and must meet two primary eligibility criteria. First, a DSO’s compensation may not include commissions for recruitment of foreign students. To verify that requirement, a field representative is to interview a school’s principal DSO during an initial certification site visit, and ask whether any prospective DSOs receive compensation from commissions for recruitment of foreign students. In addition, a field representative is to review the school’s website for recruitment-related activities and evaluate the DSO’s job title and position description, according to ICE officials. Second, DSOs must be U.S. citizens or lawful permanent residents, but the Certification Unit does not routinely verify the evidence provided to meet this eligibility requirement. Specifically, DSOs are to submit documentation during the school’s certification or recertification process— such as a passport, birth certificate, Permanent Resident Card or Alien Registration Receipt Card, or copy of naturalization/citizenship certificate—as evidence of their U.S. citizenship or lawful permanent resident status. The Certification Unit is to review this documentation to verify that the biographic details match the information provided on the school’s Form I-17. According to ICE officials, if the Certification Unit suspects that a prospective DSO’s documentation may not be valid, it will send the information to the Compliance Unit for additional review. However, neither the Certification Unit nor the Compliance Unit routinely verify the information reported by DSOs in support of their immigration or citizenship status because they do not have access to the type of information needed to independently verify this information for all prospective DSOs, according to ICE officials. Certification Unit officials told us that verifying information on naturalized U.S. citizens and lawful permanent residents would be beneficial. They said that they have previously asked for access to information, such as other DHS databases that contain information on naturalized U.S. citizens or lawful permanent residents, to strengthen their process for determining the eligibility of prospective DSOs. However, they have yet to receive access to this information. In addition, verifying eligibility information for U.S.-born citizens would also be valuable, but is more difficult than for naturalized U.S. citizens or lawful permanent residents, according to ICE officials. This is because ICE does not collect DSOs’ Social Security numbers— key information necessary to verify U.S. citizenship—in part because SEVIS does not have the necessary security features needed to collect and house those data, and adding those features would be costly. In June 2018, ICE management officials stated that they were reviewing databases that may be useful to verify DSOs’ self-reported eligibility information but did not provide any additional support or documentation of those plans or a time frame for completing this review. As outlined in our Fraud Risk Framework, as part of an effective antifraud strategy, managers should take steps to verify reported information, particularly self-reported data. Specifically, managers can benefit from conducting data matching to verify key information, including self-reported data and information necessary to determine eligibility, using government or third-party sources to verify data electronically. Until ICE routinely verifies the eligibility information submitted by prospective DSOs in support of their immigration or citizenship status, particularly for naturalized U.S. citizens and lawful permanent residents, ICE will not be able to ensure that it is preventing ineligible individuals, including those who represent a fraud risk, from becoming DSOs and providing them with access to SEVIS to maintain student records. ICE has taken some initial steps to strengthen the process for vetting prospective DSOs but has not implemented comprehensive background checks on DSO nominees prior to approving them to carry out the DSOs’ reporting, record-keeping, and other functions. ICE officials told us that they have been working since December 2016 to develop a plan to conduct comprehensive background checks on prospective DSOs to address past concerns about DSO vetting. Specifically, in 2011, ICE expressed concerns that DSOs, who were not required to undergo background checks, were responsible for maintaining updated information of foreign students in SEVIS. According to ICE officials, they have taken initial steps to address these concerns by implementing criminal-background checks on prospective DSOs. Specifically, in May 2017, ICE started conducting background checks on all school employees nominated to be DSOs at the time of petitioning for initial SEVP certification or whenever a school requests to add a new DSO. For these types of checks, ICE officials within CTCEU are to review the prospective DSO’s biographic information from both the Form I-17 and the proof of U.S. citizenship or immigration status documentation received by the school. After ICE officials in CTCEU complete this check, they are to forward the findings to SEVP for review. If SEVP determines that a prospective DSO is unsuitable for participation in the program, ICE officials in SEVP are to send a notice of rejection to the nominating school. From April 2017 to March 2018, ICE screened approximately 4,750 prospective DSOs and identified 68 individuals with a criminal history. ICE rejected the nomination of 15 of these prospective DSOs, because, for example, they had criminal histories that included instances of identity theft, fraud in obtaining U.S. citizenship, and conspiracy, among other crimes. ICE officials stated that certain crimes will not necessarily disqualify a candidate, such as misdemeanors, traffic- related infractions, or other lesser crimes. As of June 2018, ICE officials told us that they are developing a more- comprehensive background-check process to screen prospective DSOs against additional government data sources. Specifically, ICE officials told us that they are seeking to partner with DHS’s Transportation Security Administration (TSA) to collect biometric information (e.g., fingerprints) on prospective DSOs at TSA’s enrollment provider locations nationwide during the school certification process. ICE officials stated that they intend to provide the biometric information they collect through TSA’s enrollment provider to ICE’s Office of Professional Responsibility (OPR), and OPR officials will review such information to determine DSOs’ suitability. According to agency documentation, ICE’s OPR would vet such information against data sources to screen these individuals for prior criminal histories such as sexual misconduct, terrorist activities, and immigration violations. According to ICE officials, they also intend to use this process to periodically review the suitability of incumbent DSOs. While ICE officials have told us they intend to expand the screening of prospective DSOs, ICE does not have a documented implementation plan that outlines how the project will be executed. The Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK® Guide) identifies standards related to project-management processes, including the need to have documented implementation plans describing how the project will be executed, monitored, and controlled, as well as requirements and techniques for communication and establishing agreements among stakeholders. In addition, GAO’s Schedule Assessment Guide identifies best practices associated with developing and maintaining a reliable, high-quality schedule. ICE provided us with a draft of its revised background-check policy, talking points on its plans for these checks, and draft requirements it shared with TSA in December 2016. However, these documents do not provide a detailed project- implementation plan to guide ICE’s effort. As of June 2018, ICE and TSA officials have met twice in the last 2 years, and ICE officials do not have any documents or other written details on their planned coordination with TSA. SEVP’s Director acknowledged that SEVP will need to develop a project plan to help guide its coordination with TSA and ICE’s OPR. Without a documented implementation plan for this effort that outlines how the project will be executed, monitored, and controlled, ICE does not have reasonable assurance that it will be able to implement a more- comprehensive DSO background-check process. ICE has established mechanisms for monitoring SEVIS usage by approved DSOs and providing support to DSOs to help them ensure their schools comply with SEVP requirements but does not mandate training for DSOs. Once DSOs are approved by SEVP, they are authorized to make changes to student records in SEVIS and to create Forms I-20, which enable students to apply for nonimmigrant student status. To detect noncompliance and fraud that may be committed by DSOs during this process, ICE has established mechanisms to monitor information entered and identify data for computers used by DSOs through SEVIS compliance checks, among other things. For example, according to agency officials, ICE monitors DSO actions in SEVIS to help prevent noncompliance and fraud. In addition to monitoring DSOs’ use of SEVIS, ICE provides support and training to DSOs to help ensure they can effectively update and maintain student records in SEVIS and provide recommendations to students regarding the maintenance of their status, according to our review of ICE documentation and interviews with ICE and school officials. According to program rules, DSOs are responsible for understanding SEVP regulations related to the requirements for foreign students’ admission, maintenance of status, and change of status and requirements for school approval. To assist them, ICE officials and DSOs that we interviewed told us that SEVP uses its field representatives to provide DSOs with a point of contact for questions related to the program. According to SEVP’s internal guidance, field representatives are expected to visit the schools within their areas of responsibility at least once a year to provide in-person guidance and training to DSOs. DSOs at 15 of the 17 schools we visited stated that the field representatives were helpful, including with providing guidance on how to comply with SEVP rules and regulations. In addition, SEVP internal guidance encourages DSOs to take its web- based training course on the responsibilities and obligations for both DSOs and foreign students in SEVIS. However, this course is voluntary. According to ICE officials and field representatives, the extent to which DSOs take the voluntary training varies—some DSOs receive additional training beyond the voluntary SEVP training, but other DSOs do not complete any training. ICE officials noted that the voluntary online training may be perceived as cumbersome and that, since it is not required, many DSOs instead reach out to field representatives or call the SEVP Response Center to get answers to questions that are covered by existing training materials. ICE officials also stated that they do not know the extent to which DSOs have completed the online training because they do not track this information. Further, the officials acknowledged that since training is voluntary, some DSOs may not complete it before assuming their responsibilities and gaining access to SEVIS. ICE officials we interviewed told us they encounter problems with DSOs complying with record-keeping requirements; however, they believe most of these issues are a result of DSOs not understanding program rules or their own responsibilities within the program. According to agency documentation, in 2014 SEVP found that some DSOs were inconsistently reporting school information in several SEVIS data fields. In addition, SEVP’s Risk Assessment Tool includes a number of high-risk indicators that may stem from DSO record-keeping errors within SEVIS, including students listed as enrolled in an academic program not available at that school (e.g., doctoral students at schools without doctorate degrees available) and students listed as active who have long exceeded their program’s end date or authorized employment’s end date. Errors such as these make it difficult for ICE officials to know whether the information in SEVIS is inaccurate due to unintentional mistakes by the DSO or whether the school or its employees may be engaged in potential fraud. For additional examples of potential noncompliance or fraud, see the box below. Potential Designated School Official Noncompliance or Fraud Student and Exchange Visitor Program officials cited the following examples of potential noncompliance or fraud that they have encountered, among others: the reported foreign-student enrollment listed in the Student and Exchange Visitor Information System (SEVIS) does not seem to correspond with the number of students attending class or the size of the school’s physical space, all enrolled foreign students listed in SEVIS are living at the same address, and students repeatedly transfer to several different schools. Field representatives at one location we visited noted that DSOs with multiple job responsibilities may not have time to keep up with SEVP rules and policy updates. Similarly, DSOs at 7 of the 17 schools we spoke with mentioned that they have multiple job responsibilities beyond their DSO duties. In addition, SEVP officials indicated that DSOs have a high rate of turnover, especially at small schools, and may lack the expertise to effectively follow program requirements. SEVP officials acknowledged that mandatory training could help reduce the number of unintentional violations by DSOs who may not adequately understand the program’s regulations, thus allowing SEVP staff to focus their monitoring efforts on schools and individuals who may be engaged in intentional noncompliance and fraud. In June 2018, ICE officials told us that they recently received internal agreement to require all new DSOs to complete training prior to gaining full access to SEVIS once the officials release a new version of their DSO training program. However, SEVP officials could not provide documentation on their plans, including time frames for completing the revised DSO-training program, whether to require DSO training, or how they will track DSO compliance. Federal Internal Control Standards calls for agencies to demonstrate a commitment to competence, including recruiting, developing, and retaining competent individuals. Further, it recommends that agencies establish expectations of competence for key roles, including possessing the necessary knowledge, skills, and abilities, and training individuals appropriately. Without mandatory training and a process to verify that training is completed, SEVP does not have reasonable assurance that DSOs are familiar with, and understand, their roles and responsibilities as outlined in program regulation. SEVP’s voluntary DSO training emphasizes student and school compliance with program rules and the DSOs’ responsibilities to enter and maintain complete and accurate information in SEVIS in a timely manner but does not address fraud risks to the program, including previously identified fraud schemes or trends. According to ICE officials, some DSOs may receive fraud-specific training from ICE agents through the Project Campus Sentinel initiative; however, these visits are limited to a small portion of certified schools each year. During a Project Campus Sentinel visit, ICE guidance states that an ICE agent will meet with DSOs and provide information on how to detect potential fraud, including student visa exploitation and national security vulnerabilities. In addition, ICE guidance encourages ICE agents to remind DSOs to contact them when they encounter these instances. In fiscal year 2017, ICE officials reported that ICE agents visited 400 of the more than 18,000 SEVP- certified school campuses in existence at that time. According to ICE officials, the agency can only conduct a limited number of Project Campus Sentinel visits to schools each year due to competing investigative priorities. The DSOs we spoke with varied in their understanding of the role they should play in identifying and reporting fraud to SEVP. Specifically, DSOs at 8 of 17 schools told us they did not receive training on SEVP-related fraud risks or could not identify SEVP-provided, fraud-specific training. For example, DSOs at one school told us that there is confusion among DSOs about their role to prevent and report fraud and that this issue has been discussed at past training events and conferences. Specifically, they stated that there is some confusion over the difference between fraud and noncompliance. According to these DSOs, they are responsible for addressing issues of noncompliance, but they do not actively look for SEVP-related fraud. A DSO from another school told us she interprets the DSO role as providing program oversight, including oversight related to fraud, and that she previously reported an instance of potential student fraud to ICE when she encountered suspicious immigration paperwork. In addition, DSOs at another school told us that they were not aware of any training related to fraud risks within SEVP but noted that guidance about fraud trends or potential red-flag indicators could be useful. The Fraud Risk Framework identifies training as one way of demonstrating an agency’s commitment to combating fraud. Training and education intended to increase fraud awareness among stakeholders, managers, and employees serves as a preventive measure to help create a culture of integrity and compliance within the agency. Specifically, the Fraud Risk Framework discusses leading practices for training and education, including communicating responsibilities for implementing fraud controls and details on how and where to report fraud. In addition, increasing awareness of fraud schemes, including red flags and risk indicators, through training and education can serve a preventive purpose by helping create a culture of integrity and compliance within the program and can enable managers, employees, and stakeholders with responsibility for implementing aspects of the program to better detect potential fraud. According to ICE officials, DSOs can serve as the front line against SEVP-related fraud, and they provide a significant portion, if not the majority, of fraud-related tips. In June 2018, ICE officials told us that, in response to discussions that we had during our review, they plan to incorporate fraud training into the revised DSO training. However, because ICE officials just recently made that decision, they had not yet developed documented plans for this training or timelines for when it would be completed. While agreeing to incorporate fraud training into the revised DSO training is a good first step, the development and execution of those plans will be needed to strengthen fraud controls. Until ICE develops and implements a plan for fraud-specific DSO training, ICE will not have reasonable assurance that this training will be delivered and DSOs will have the information they need to address fraud within the program. Through SEVP, ICE oversees over 1.2 million foreign students at nearly 9,000 SEVP-certified schools across more than 18,000 campuses. Past instances of fraud and noncompliance in the program have resulted in ICE taking some steps to address fraud risks in the program, such as developing a Risk Assessment Model and Framework. However, ICE does not have a fraud risk profile that identifies all of SEVP’s fraud risks, discusses the likelihood of those risks, assesses related controls, and identifies the agency’s tolerance for risk. Such a fraud risk profile would help ICE more effectively assess whether additional internal controls or changes to policies or regulations are needed. Moreover, ICE has not yet fully employed the use of data analytics, such as network analysis, to help it identify potentially fraudulent schools before they become certified to enroll foreign students and help it better use its administrative and investigative resources. ICE has also made improvements to its processes for certifying and recertifying SEVP schools and monitoring DSOs—all of which can help reduce the risk of fraud in the program. However, ICE continues to delay the recertification process by initiating the school recertification reviews after the 2-year certification expiration date, which is not consistent with ICE regulations. Further, ICE has not included an assessment of residual risks posed by the current recertification queue—as a part of the fraud risk profile previously noted—and as a result does not have a full understanding of the risks associated with schools awaiting recertification. Although DSOs play an important role in helping ICE oversee students in the program, ICE has recognized they can pose fraud risks to the program. However, ICE does not routinely verify DSO-submitted eligibility information and DSO suitability for participation in SEVP, and therefore does not have reasonable assurance that only eligible and suitable DSOs are participating in the program. Finally, ICE has not developed or implemented mandatory and fraud-specific training to improve DSOs’ compliance with program requirements and aid its efforts to detect fraud in the program. We are making the following seven recommendations to ICE: The Director of ICE should develop a fraud risk profile that aligns with identifies inherent fraud risks affecting the program, assesses the likelihood and impact of inherent fraud risks, determines fraud risk tolerance, and examines the suitability of existing fraud controls and prioritizes residual fraud risks, including residual risks posed by the recertification queue. (Recommendation 1) The Director of ICE should build on existing efforts to use data analytics by employing techniques, such as network analysis, to identify potential fraud indicators in schools petitioning for certification. (Recommendation 2) As ICE works to complete its efforts to hire additional SEVP adjudicators, the Director of ICE should begin notifying certified schools 180 days prior to, and requiring submission of complete recertification petitions by, the 2-year certification expiration date, consistent with regulation, and evaluate whether additional resources are needed. (Recommendation 3) The Director of ICE should, as practicable, verify the eligibility information provided to establish the immigration or citizenship status of lawful permanent residents and naturalized U.S. citizens, as well as U.S.-born citizens, who have been nominated or renominated to serve as DSOs. (Recommendation 4) The Director of ICE should develop an implementation plan for the project aimed at strengthening background checks for DSOs; that plan should outline how the project will be executed, monitored, and controlled. (Recommendation 5) The Director of ICE should implement mandatory DSO training and verify that the training is completed. (Recommendation 6) The Director of ICE should complete the development and implementation of its plans for mandatory fraud-specific training for DSOs. (Recommendation 7) We provided a draft of this report to DHS for its review and comment. In its written comments, reproduced in appendix V, DHS concurred with our recommendations and described specific steps it plans to take in response to all seven of our recommendations. DHS also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Rebecca Shea at (202) 512-6722 or shear@gao.gov or Rebecca Gambler at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Table 1 contains information on the eight recommendations that we made to U.S. Immigration and Customs Enforcement (ICE) in our 2012 report, and ICE’s actions to address them. We closed each of these recommendations as implemented. This report is a public version of a sensitive report that we issued on November 20, 2018, which examined the efforts that U.S. Immigration and Customs Enforcement (ICE) has taken since our 2012 report to address fraud risks, including the extent to which ICE has (1) taken steps to strengthen its management of fraud risks in the Student and Exchange Visitor Program (SEVP), (2) implemented controls to address fraud risks in the school certification and recertification processes, and (3) implemented fraud risk controls related to the eligibility, suitability, and training of Designated School Officials (DSO).The sensitive report included information related to SEVP internal controls used to help prevent and identify noncompliance or fraud in the program. The sensitive report also discussed some planned actions to improve these internal controls, some of which the Department of Homeland Security (DHS) deemed to be sensitive and must be protected from public disclosure. This public report omits the information that DHS deemed to be sensitive including details associated with (1) the oversight of schools during the certification and recertification process, (2) our covert testing of SEVP certification internal controls, and (3) current and planned actions to oversee DSOs. Although the information provided in this report is more limited, it addresses the same objectives and uses the same methodology as the sensitive report. For our first objective, to evaluate the extent to which ICE has taken steps to strengthen its management of fraud risks in SEVP, we assessed actions ICE, particularly SEVP and the Counterterrorism and Criminal Exploitation Unit (CTCEU), have taken since 2012 to design and implement controls to address fraud in the postsecondary, vocational, and English language school certification and recertification process. We reviewed documents including regulations, processes and procedures, and guidance related to fraud risk management, school certification, and recertification processes, and the role of DSOs. We evaluated the extent to which ICE’s practices were consistent with Standards for Internal Control in the Federal Government and GAO’s A Framework for Managing Fraud Risks in Federal Programs. In particular, we analyzed ICE documentation, such as standard operating procedures, policy statements, and guidance for adjudicators to determine how ICE’s processes and systems identify and assess risk in SEVP, including the SEVP Risk Assessment Model and Framework, Risk Assessment Tool, Risk Register, and other internal guidance. In addition, we reviewed information from ICE’s current SEVP administrative, watch, and criminal investigative cases and analyzed information on past cases of SEVP fraud, including indictments. Also, we interviewed ICE officials within SEVP to evaluate the extent to which the program has taken steps to strengthen its management of fraud risks since 2012. We met with senior officials from SEVP, including SEVP’s Director and management of the Risk Management Support Team, School Certification Unit (Certification Unit), Analysis and Operations Center (Compliance Unit), Policy Team, and Field Representative Unit. We interviewed officials from ICE’s Office of the Principal Legal Advisor to discuss regulatory priorities and legal authorities related to fraud prevention and detection. We also interviewed officials from ICE’s Identity Benefit Fraud Unit and Domestic Operations to discuss their roles in SEVP-related fraud prevention. In addition, we met with officials from CTCEU headquarters, including the Student and Exchange Visitor Information System Exploitation Section and criminal investigators from 5 of the 26 ICE field offices to discuss past cases of SEVP-related fraud and steps taken to identify and prioritize fraud risk. We visited ICE field offices in Washington, D.C.; Los Angeles and San Francisco, California; Newark, New Jersey; and New York, New York. We selected these locations based on a mix of criteria, including the following characteristics: (1) number of ongoing investigations of certified schools; (2) reported previous and current experience investigating SEVP-related fraud; (3) number of field representatives assigned to or located near the field office; and (4) number of schools that were located proximate to the field office and that were either pending recertification, as of July 2017, or have been recertified since August 2016. As we did not select a probability sample of ICE field offices to interview, the results of these interviews cannot be generalized to all of ICE’s 26 field offices. However, the interviews provided us with perspectives of ICE officials responsible for conducting school fraud investigations, including their views on the process SEVP has established for certifying and monitoring schools, fraud, and national security vulnerabilities related to foreign students, and any challenges field offices have faced in their investigations. We conducted a network analysis utilizing both public and proprietary information associated with currently certified schools to determine the potential to utilize additional data analytics to aid fraud risk-management efforts in SEVP. To develop this analysis, we identified a list of schools that, as of July 2017, had been identified by ICE as either being under active criminal investigation or subject to additional oversight or administrative action due to compliance concerns. We also selected a list of SEVP-certified postsecondary schools without such identified concerns as of September 2017. We restricted our set of schools to those with at least 20 foreign students as of September 2017. In total, 2,439 schools comprising 170 with concerns and 2,269 without such concerns were analyzed. We then used an outside vendor to provide public and proprietary information such as descriptive information associated with these schools including addresses, businesses, and past executives. Using these data, we used network-analysis techniques to identify connections between both those schools with criminal or compliance concerns and schools without such identified concerns. We determined whether each of the postsecondary schools without compliance concerns were linked to any of those with compliance concerns via executive employment. Specifically, we identified instances in which an official associated with a school with criminal or compliance concerns was associated with another school not identified as having those concerns. The underlying logic behind this focus was that schools associated with an official linked to a school of concern may potentially indicate the need for further review of possible criminal or compliance concerns. To further validate this information, we conducted additional research using investigative databases and the Internet to try to verify the instances identified in our analysis such as by ensuring the time frames of the connection appeared relevant or to verify the identity of individuals and schools involved. While such connections are not proof of criminal or compliance problems, they may potentially be indicative of them. This is a diagnostic that has been used in other fraud-related network research. For our second objective, to evaluate the extent to which ICE has implemented controls to address fraud risks in the school certification and recertification processes, we assessed documentation describing SEVP’s school certification and recertification controls, interviewed headquarters and selected field-office ICE officials, and analyzed agency-provided recertification data. Specifically, we assessed SEVP’s standard operating procedures, including its Adjudicator’s Manual, training materials, and other guidance to determine whether the certification and recertification controls described in these documents addressed the high-risk indicators ICE identified in its Risk Assessment Tool. We used this analysis to determine any potential noncompliance and fraud vulnerabilities in these controls. We also assessed SEVP’s controls in these areas against Standards for Internal Control in the Federal Government related to risk management, as well as principles of the Framework for Managing Fraud Risks in the Federal Government. Additionally, we interviewed ICE officials in SEVP’s Certification Unit, which is responsible for adjudicating certification and recertification petitions, and the Compliance Unit, which is charged with monitoring schools for ongoing compliance with regulatory record-keeping and reporting requirements. To understand how ICE Homeland Security Investigations agents in the field offices work with officials in SEVP and the CTCEU to investigate school fraud, we conducted semistructured interviews with ICE agents in five field offices. We also interviewed ICE officials from SEVP’s Field Representative Unit as well as eight field representatives assigned to or located near the selected field offices to gather information on the representatives’ roles and activities in identifying and reporting potential school fraud. Further, we conducted covert testing of SEVP’s internal control activities related to the school certification process. Specifically, we submitted certification petitions and conducted other covert investigative work for three fictitious schools, each of which are subject to particular petition requirements. For one of the fictitious schools, we tested SEVP certification controls that require schools to submit complete documentation by submitting a petition for the school that was missing several of the required documents. For our second school, we tested SEVP controls requiring schools to schedule and complete a site visit conducted by an SEVP field representative, by submitting a completed petition for the accredited business school, but avoiding the site visit and requesting that our paperwork move forward without it. For our third fictitious school, we submitted a petition and participated in a site visit with SEVP officials, using a rented space as a fictitious school location. We tested SEVP controls related to verifying petition documentation, and whether SEVP site-visit officials followed established procedures for the site visit. For all three petitions, we used publicly available information to construct our scenarios. We then documented any actions taken by SEVP on the submitted petitions, such as completeness checks, investigative steps, adjudication decisions or requests to provide additional supporting documentation, among other things. Results for all three covert tests, while illustrative, cannot be generalized to the full population of petitions. For our third objective, to determine the extent to which ICE implemented fraud risk controls related to the eligibility and suitability of DSOs, we assessed guidance, training, and policies related to DSOs. Specifically, we reviewed regulations for DSO eligibility and SEVP guidance and standard operating procedures to determine whether supporting evidence provided to meet these requirements is being verified, including the Field Representative Unit’s Site Visit Standard Operation Procedure and the Certification Unit’s Adjudicator’s Manual. We evaluated the extent to which ICE’s practices for verifying eligibility were consistent with the Framework for Managing Fraud Risks in the Federal Government. In addition, we reviewed the current and planned documentation and procedures on ICE’s existing and planned background checks, including the existing documentation for DSO vetting against relevant databases, initial requirements for planned biometric screening, and a draft policy document for the planned checks. To gather additional perspectives, we interviewed ICE officials in headquarters and selected field offices. We also interviewed selected DSOs in the field. We identified leading practices for project planning in the Project Management Institute’s A Guide to the Project Management Body of Knowledge. In addition, we reviewed the best practices associated with developing and maintaining a reliable, high-quality schedule in the GAO Schedule Assessment Guide. In assessing current training and oversight for DSOs, we examined guidance, policies, and procedures for the SEVP Field Representative Unit and CTCEU’s Project Campus Sentinel. We assessed the implementation of these controls against criteria in Standards for Internal Control in the Federal Government and A Framework for Managing Fraud Risks in Federal Programs. We reviewed DSO training materials, including the Online Training for DSOs and the Study in the States website. To determine how ICE identifies fraud risk associated with DSOs, the controls in place for addressing and mitigating these risks, and its efforts to identify potential vulnerabilities in its controls, we met with ICE officials at headquarters and five selected field offices, as discussed above. To identify the extent to which they have DSO training and antifraud responsibilities and requirements, we interviewed selected field representatives. Furthermore, we interviewed DSOs at 17 selected certified postsecondary schools on their roles and responsibilities and training resources. We selected these officials because, as of September 2017, they constituted a group of representatives from certified schools of various types and sizes and were located in proximity to our previously selected ICE field-office locations. As we did not select a probability sample of DSOs to interview, the information we obtained from these school officials cannot be generalized. These interviews provided us with the perspectives of DSOs on their roles and responsibilities, training, and fraud risks within the program. Further, we interviewed officials from NAFSA, an association of international educators, to discuss the organization’s views on fraud risks within SEVP, and we reviewed an extract from the NAFSA Advisor’s Manual of federal regulations affecting foreign students and scholars. GAO’s A Framework for Managing Fraud Risks in Federal Programs states that, in planning the fraud risk assessment, effective managers tailor the assessment to the program by, among other things, identifying appropriate tools, methods, and sources for gathering information about fraud risks and involving relevant stakeholders in the assessment process (see fig. 11). On the basis of our analysis of U.S. Immigration and Customs Enforcement (ICE) data, the Student and Exchange Visitor Program (SEVP) withdrew certification for approximately 2,600 schools during the period of fiscal years 2013 through 2017 (see fig. 12). The Enhanced Border Security and Visa Entry Reform Act of 2002 states that a material failure of an SEVP-certified school to comply with the record-keeping and reporting requirements to receive nonimmigrant students shall result in the suspension for at least 1 year, or termination, of the school’s approval to receive such students. Under federal regulation, SEVP can deny an SEVP-certified school’s recertification petition or, as a result of a subsequent out-of-cycle review, can withdraw certification, if the school or its programs are no longer eligible for certification. Denial of recertification or withdrawal on notice as a result of out-of-cycle review may be for any valid and substantive reason, including failure to comply with record-keeping and reporting requirements, willful issuance by a DSO of a false statement, or not operating as a legitimate institution, among other bases. According to SEVP officials, denials resulting from recertification reviews are often based on historical discrepancies in the DSO’s data entry, record-maintenance and Form I-20 issuance issues, or a negative change in the school’s operating status, such as a loss of state licensure. By regulation, an appeal of a notice of denial or withdrawal must be made within 15 days after service of the decision. Schools denied recertification must, according to regulations, wait at least 1 calendar year from the date of denial of recertification or withdrawal notice before being eligible to petition again for certification. If, upon the completion of an out-of-cycle review, SEVP determines that a school has failed to sustain eligibility or has failed to comply with the record-keeping, retention, reporting, or other requirements, SEVP will institute withdrawal proceedings by serving the school a notice of intent to withdraw SEVP certification. Failure of a school to respond to a notice of intent to withdraw within 30 days will result in an unappealable withdrawal of the school’s certification. At the conclusion of withdrawal proceedings, a school found to be ineligible for continued SEVP certification as a result of an out-of-cycle review will receive a notice of withdrawal. SEVP withdrew on notice approximately 211 certifications from fiscal years 2013 through 2017 (see fig. 12). If SEVP staff identify an issue during an out- of-cycle review that seems to be an error not warranting withdrawal, SEVP could issue a Remedial Action Plan to the school describing the issues it needs to address to retain its program eligibility. According to SEVP officials, once they have gathered enough evidence and made the decision to withdraw the school’s certification, SEVP can temporarily terminate the school’s ability to issue Forms I-20 to students. For example, SEVP officials explained that if a school that is otherwise in compliance lets its accreditation lapse, SEVP may revoke its authority to issue Forms I-20 until it renews its accreditation. Regarding automatic withdrawals, SEVP will serve a notice of intent to withdraw SEVP certification to the school 30 days prior to its certification expiration date if, up until that point the school has failed to file a complete petition for recertification. From fiscal year 2013 through fiscal year 2017, SEVP automatically withdrew 1,763 certifications (see fig. 12). SEVP will not accept a petition for recertification and the school will be automatically withdrawn immediately if such school has effectively relinquished its SEVP certification by not petitioning for recertification, abandoning its petition, or not submitting a complete recertification package by the certification expiration date. Certified schools can also voluntarily withdraw their certification at any time. In addition to the contacts named above, Latesha Love (Assistant Director), Kathryn Bernet (Assistant Director), Nick Weeks (Analyst-in- Charge), David Aja, David Dornisch, Gabrielle Fagan, April Gamble, Gina Hoover, Lauren Kirkpatrick, Kirsten Lauber, Barbara Lewis, Sasan J. “Jon” Najmi, Robin Nye, George Ogilvie, Ramon Rodriguez, Constance Satchell, Sabrina Streagle, Shana Wallace, and Helina Wong made key contributions to this report.", "summary": "As of March 2018, more than 1.2 million foreign students in the United States were enrolled in 8,774 schools certified by SEVP. ICE is responsible for managing SEVP, which certifies schools to enroll foreign students. Various ICE offices have a role in preventing, detecting, and responding to potential fraud in the program. GAO was asked to review potential vulnerabilities to fraud in SEVP. GAO examined, among other things, the extent to which ICE (1) implemented controls to address fraud risks in the school certification and recertification processes and (2) implemented fraud risk controls related to DSO training. GAO analyzed ICE policies and documentation, including fraud risk guidance and procedures for school certification and recertification; analyzed 2013 through 2017 recertification data; and interviewed officials from five ICE field offices that GAO selected based on their experience investigating program fraud. GAO also interviewed officials from 17 selected schools located near these ICE field offices. This is a public version of a sensitive report that GAO issued in November 2018. Information that DHS deemed sensitive has been omitted. The Department of Homeland Security's (DHS) U.S. Immigration and Customs Enforcement (ICE) has identified several fraud risks to the Student and Exchange Visitor Program (SEVP). As shown in the figure below, these include risks associated with school owners and designated school officials (DSO) who help ICE oversee students in the program. These fraud risks may occur as schools apply to become SEVP-certified, accept foreign students, and apply for recertification every 2 years. ICE has implemented controls to address fraud risks related to school certification, but long-standing delays in recertifying these schools exacerbate fraud risks. By statute and regulation, ICE must conduct recertification reviews every 2 years to ensure that schools continue to meet program requirements—an important fraud risk control. Between 2013 and 2017, ICE recertified about 12,900 schools. However, according to ICE officials, they have been unable to meet the 2-year time frame and, as of June 2018, had 3,281 recertification petitions waiting for review. To help manage its queue, ICE has lengthened the period between recertification reviews by extending schools' certification expiration dates by 180 days, which is inconsistent with its regulation and may allow fraudulent schools to operate longer without detection. Although ICE is taking steps to increase resources for recertification, it is unclear whether these steps will ensure recertification is conducted consistently with ICE regulations. ICE relies on DSOs to, among other things, update and maintain foreign-student data in ICE's foreign-student information system and report suspected fraud to ICE. However, ICE does not provide DSOs with training that addresses fraud risks to the program. In June 2018, ICE officials stated that they plan to develop this fraud training for DSOs, but do not have documented plans or timelines for when it would be completed. By developing these plans, the agency would be better positioned to ensure that DSOs receive the training needed to address potential fraud in the program. GAO is making seven recommendations, including that ICE (1) notify schools 180 days prior to the 2-year certification expiration date, as required, and evaluate whether additional resources for recertification are needed, and (2) develop a plan to implement fraud-specific training for DSOs. ICE concurred with all of GAO's recommendations.", "document_type": "gao"}
{"report": "Zika is spread to people primarily through the bite of an infected mosquito but can also be transmitted from mother to child during pregnancy or from person to person through sexual contact or blood transfusion. The disease can cause symptoms that include fever, rash, conjunctivitis (“pink eye” where the eyes appear red or pink), and joint and muscle pain. Although most people with Zika have only mild symptoms or none at all, Zika in pregnant women has been linked to adverse pregnancy outcomes, such as miscarriage and stillbirth, and severe birth defects. Zika can be passed to the fetus and cause a birth defect of the brain called microcephaly and other severe brain defects, according to CDC. Zika is also linked to other problems such as Guillain-Barré syndrome, an uncommon condition of the nervous system. Although at present no vaccine has been approved by the U.S. Food and Drug Administration to prevent Zika, several vaccines are in different phases of development. Zika was first identified in the Zika Forest in Uganda in 1947 and caused only sporadic human disease until 2007. In 2007, Zika was detected in Yap State, Federated States of Micronesia, and subsequent outbreaks occurred in Southeast Asia and the Western Pacific. In 2014, Zika spread east across the Pacific Ocean to French Polynesia, then to Easter Island. In May 2015, Brazil documented the first case of locally acquired Zika transmission in the Americas. See figure 1 for a timeline of the Zika outbreak and the U.S. Zika response overseas. According to WHO, in November 2015, Suriname, El Salvador, Guatemala, Mexico, Paraguay, and Venezuela reported cases of locally acquired Zika, followed by Panama, Honduras, French Guiana, Martinique, and Puerto Rico in December 2015. Zika continued to spread throughout the region, and on February 1, 2016, WHO declared that the recent association of Zika with clusters of microcephaly and other neurological disorders constituted a public health emergency of international concern. In November 2016, WHO declared an end of the public health emergency of international concern regarding microcephaly, other neurological disorders, and Zika. However, WHO announced that Zika and the associated health outcomes remained a significant public health challenge requiring intense action. Zika spread to multiple countries throughout the globe but primarily affected countries in Latin America and the Caribbean region. According to WHO, as of March 2017, transmission of the Zika virus was occurring in 79 countries or territories, most of which are located in the Western Hemisphere. According to WHO, from 2015 to 2017, there were approximately 583,000 suspected and 223,000 confirmed cases of Zika virus transmission in the Western Hemisphere. See figure 2 for the cumulative Zika incidence rates in each country in Latin America and the Caribbean from 2015 to 2017. In February 2016, the President submitted a request to Congress for emergency funding to enhance ongoing U.S. efforts to prepare for and respond to Zika, including a request for funding for USAID and State to respond to the outbreak overseas. In addition, in April 2016, USAID and State notified Congress of their intent to repurpose $215 million of fiscal year 2015 supplemental Economic Support Fund Ebola funding for the U.S. Zika response overseas, which included $78 million for CDC international Zika activities. In September 2016, Congress appropriated about $175.1 million in supplemental funding to USAID and State in the Zika Response and Preparedness Appropriations Act, 2016, for the U.S. Zika response overseas. USAID activities initially began in five countries—Haiti, Honduras, Guatemala, El Salvador, and Dominican Republic—based on an assessment of their Zika risk and limited host government capacity to prevent the spread and respond to the impact of the virus. USAID ultimately supported activities in 26 countries in the Latin America and Caribbean region. As of September 30, 2018, USAID and State had obligated about $385 million (99 percent) of the total $390 million available for the U.S. Zika response overseas and had disbursed approximately $264 million (68 percent). Specifically, USAID had obligated all of its funds available for the Zika response and disbursed about two-thirds, and State had obligated and disbursed more than three-quarters of its funding for Zika. USAID and State had disbursed a higher proportion of the repurposed Ebola funds than the funds appropriated in the Zika Response and Preparedness Appropriations Act, 2016. See figure 3 for USAID and State Zika response funding appropriations, obligations, and disbursements as of September 30, 2018. Of the $215 million in repurposed Ebola funds, USAID and State had obligated $215 million (100 percent) and had disbursed almost $201 million (93 percent) as of September 30, 2018. Of the approximately $175 million appropriated in the Zika Response and Preparedness Appropriations Act, 2016, USAID and State had obligated about $170 million (about 97 percent) and had disbursed about $63 million (36 percent) as of September 30, 2018. As of September 30, 2018, USAID had obligated all funds available for the Zika response and had disbursed about two-thirds, from three accounts. USAID has two sources of funding for Zika response activities: $211 million of fiscal year 2015 supplemental Economic Support Fund Ebola funding repurposed for the Zika response and about $155.5 million provided in the Zika Response and Preparedness Appropriations Act, 2016—including $145.5 million and $10.0 million through the Global Health Programs and Operating Expenses accounts, respectively—for a total of $366.5 million. As of September 30, 2018, USAID had obligated approximately $366.5 million (100 percent) and had disbursed approximately $245 million (67 percent), from the Economic Support Fund, Global Health Programs, and Operating Expenses appropriations accounts. See figure 4 for USAID Zika response funding obligations and disbursements by account. USAID obligated all funding for Zika response activities within a year after it was repurposed or appropriated. As of September 30, 2018, USAID had disbursed a higher proportion of repurposed fiscal year 2015 supplemental Economic Support Fund Ebola funding (93 percent) compared with Global Health Programs and Operating Expenses funding (28 percent and 72 percent, respectively), which was appropriated in the Zika Response and Preparedness Appropriations Act, 2016, in September 2016. The $211 million in Economic Support Fund obligations supported 56 USAID activities, as well as a $78 million interagency transfer to CDC. The $145.5 million in Global Health Programs obligations supported 25 activities and program support. Obligations for USAID-supported activities ranged from $12,000 to $37 million and included support for activities such as the procurement of insect repellent to assist pregnant women in avoiding Zika infection and strengthening the ability of civil society and community networks to disseminate information related to Zika. CDC supported 25 activities that ranged from $276,000 to $13.6 million, including activities such as collecting and analyzing public health data, conducting epidemiological studies to better understand the prevalence of Zika and related risk factors, building laboratory capacity, and providing training to conduct Zika virus testing. As of September 30, 2018, State had obligated and disbursed more than three-quarters of funding available for the Zika response, from two accounts. State has two sources of funding for Zika response activities: $4 million from a fiscal year 2015 supplemental Economic Support Fund appropriation for the Ebola response that was repurposed for the Zika response and about $19.6 million provided in the Zika Response and Preparedness Appropriations Act, 2016, the majority of which was provided through the Diplomatic and Consular Programs account, for a total of about $23.6 million. As of September 30, 2018, State had obligated and disbursed about $18.3 million (almost 78 percent) from the Economic Support Fund and Diplomatic and Consular Programs accounts. See figure 5 for State Zika response funding obligations and disbursements by account. Under the Zika Response and Preparedness Appropriations Act, 2016, State was provided almost $14.6 million through the Diplomatic and Consular Programs account, $4 million through the Emergencies in Diplomatic and Consular Services account, and $1 million through the Repatriation Loans Program account, for a total of almost $19.6 million. In September 2017, State notified Congress of its intent to transfer the $4 million from the Emergencies in Diplomatic and Consular Services account and $870,000 from the Repatriation Loans Program account to the Diplomatic and Consular Programs account. These transfers resulted in a total of $19.5 million available under the Diplomatic and Consular Programs account and $130,000 under the Repatriation Loans Program account. The $4 million in Economic Support Fund obligations supported research and development activities by the International Atomic Energy Agency to control disease-carrying mosquito populations. The $14.3 million in Diplomatic and Consular Programs obligations supported activities including medical evacuations to protect the health of pregnant U.S. government personnel and eligible family members, mosquito abatement training and other measures to reduce Zika risk to overseas staff, as well as public diplomacy efforts to further inform journalists and the public about the U.S. response to Zika. In their reporting to Congress on the uses of Zika funds, USAID and State included some country information but did not track or provide information on funding uses broken down on a country basis. In October 2016, USAID and State submitted a consolidated report to the appropriations committees on the anticipated uses of funds made available to USAID and State by the Zika Response and Preparedness Appropriations Act, 2016, in response to a reporting requirement in Section 203 of the act. After the initial submission, the act required the agencies to update and submit the report to the committees on appropriations every 60 days until September 30, 2017. The initial report described ongoing Zika response activities in five countries as well as planned activities in additional countries. Subsequent reports listed specific countries where USAID and State supported Zika response activities. However, USAID and State did not provide information to Congress on the uses of funding appropriated by the Zika Response and Preparedness Appropriations Act, 2016, broken down by country. The reports also included obligation and disbursement information for the fiscal year 2015 supplemental Economic Support Fund Ebola funding that was repurposed for the international Zika response; however, similar to the information provided regarding the funds appropriated by the Zika Response and Preparedness Appropriations Act, 2016, the reports’ information on the use of the repurposed Ebola funds was also not broken down by country. USAID officials told us that Zika activities were designed to be implemented on a regional and multicountry basis. While over 95 percent of all U.S. government funds available for the Zika response overseas were obligated by USAID, and the agency had a number of financial tracking systems in place, the agency did not take steps to record its funding by country at the outset of Zika response programming. Specifically, USAID officials noted that the contracts and grants the agency had signed with its implementing partners did not include provisions requiring partners to provide information to USAID that broke down their use of funds by country. Consequently, USAID was unable to track the uses of Zika funds on a country basis. Federal internal control standards state that management should use and communicate the necessary quality information both internally and externally to achieve the entity’s objectives and address related risks. According to USAID officials, tracking information on the uses of Zika response funding broken down by country would be helpful in the future for mission directors, chiefs of missions, and partner-country ministries of health, some of whom have requested this information. Moreover, data on USAID funding to address future infectious disease outbreaks if broken down by uses in each country could provide additional useful information to decision makers in assessing risks and planning responses. The ability to compile funding by country when responding to future infectious disease outbreaks would enable USAID to provide key decision makers, including Congress and agency officials, with additional information to better support spending oversight and inform budgetary and planning decisions. As part of the U.S. Zika response overseas, USAID provided assistance to several countries in the Caribbean, Central America, and South America and conducted a variety of activities related to mosquito control, public awareness, capacity building, and research. In support of mosquito control, USAID’s Zika AIRS Project (ZAP) conducted activities that included Entomological monitoring: collecting and reporting information on the location and population of mosquitoes; Larviciding: placing agents that kill mosquito eggs in likely breeding sites, such as water receptacles; Source reduction interventions: facilitating the removal or mitigation of likely breeding sites, such as tires, pots, barrels, or anything that may allow for standing water; and Indoor residual spraying: spraying insecticide that has a lasting effect in houses. We observed mosquito control activities during our fieldwork. For example, in Honduras we followed a team as they went house to house to implement and facilitate mosquito control activities. They collected information from mosquito egg traps, which serve as indicator of breeding activity, and recorded it for monitoring purposes. They also examined the premises for potential mosquito breeding sites, treated susceptible areas such as wash basins with larvicide, and spoke with residents about picking up trash and covering outdoor plant pots to reduce potential breeding sites. To support raising public awareness of the risk of Zika virus and to promote behavior change to reduce the spread of the disease, USAID implementing partners such as the Red Cross and CARE told us that they collaborated with communities, local government, and schools to communicate information about Zika. For example, in Trinidad, the Red Cross conducted educational campaigns at schools to improve students’ awareness. During our fieldwork, we observed a session led by adult volunteers during which children played games and engaged in discussions designed to teach Zika prevention and response methods. Implementing partners told us that the impact of such efforts extends beyond those reached directly; for example, they said the children who learned about Zika risks and prevention also conveyed the knowledge to their families, who in turn may pass it on to friends or others in the community. In Peru, CARE worked with schools to develop written education guides for application in the classroom and conducted communication campaigns. During our fieldwork, we went to schools and observed students delivering oral presentations on Zika risks and prevention. In addition, we witnessed other student activities, such as classroom discussions and art projects focused on Zika, designed to demonstrate understanding, raise awareness, and promote behavior change. To support capacity building, the Applying Science to Strengthen and Improve Systems (ASSIST) activity, which USAID funding supported, focused on improving Zika-related health services. Specific efforts included conducting a baseline assessment of the quality of care, improving clinical guidelines, training health care providers, and implementing a quality improvement program. During our fieldwork in Honduras, we visited a hospital and met with ASSIST-supported health workers who told us that they applied new guidance in their practice, and as a result, improved care in areas including counseling, screening, diagnosis, and follow-up of those affected by Zika. We also visited a hospital in Dominican Republic, where health care workers stated that they collaborated with ASSIST in responding to Zika by training staff and producing guidance materials. These activities raised awareness, increased prevention efforts, and improved care, according to health care workers. USAID supported research, training, and innovation activities through its “Grand Challenge” program as well as its interagency agreement with CDC. USAID launched a series of Grand Challenge efforts, providing $30 million in grants to foster innovation on new methods and technologies to respond to Zika. One grant, for example, supported the World Mosquito Program’s research into the feasibility and effectiveness of infecting mosquitoes with bacteria to hinder transmission of the Zika virus. We visited the program’s operations in Colombia, met with scientists, and observed the breeding lab. Program scientists told us that initial efforts have been promising and that if more tests prove successful, the potential for reducing Zika transmission could be significant. Another USAID Grand Challenge grant supports research into the possible use of genetically modified yeast to prevent mosquito eggs from hatching. We spoke with scientists, lab technicians, and viewed facilities supported by this grant in Trinidad during our field work. Scientists stated that yeast attracts mosquitoes and is inexpensive, commonly available, and environmentally friendly. Testing is ongoing, but if successful, the approach could help reduce populations of mosquitoes in critical areas, according to the scientists. The USAID–CDC interagency agreement identifies a range of activities that involve technical assistance to help strengthen surveillance, emergency operations and management, and epidemiological investigations and research. One CDC activity, for example, focuses on supporting public health surveillance and epidemiological studies to better understand the prevalence and risk factors for severe health outcomes related to Zika. Another activity aims to build laboratory capacity in areas such as Zika diagnostic test production and distribution. In addition, the objectives of CDC’s Field Epidemiology Training Program are to train qualified professionals, build sustainable capacity for detecting and responding to health threats, and develop in-country expertise so that disease outbreaks can be detected locally and prevented from spreading. In Dominican Republic, CDC officials told us that this program delivers 3 months of classroom and field project training, and that as of August 2018, four cohorts of approximately 80 students each had completed the training. CDC officials told us that in addition to implementing various activities, CDC’s Central America Regional Office in Guatemala played an important role in facilitating U.S. government cooperation with Colombia, which had the second largest outbreak of Zika after Brazil. We reviewed status reports for six USAID activities that received among the highest amounts of funding, and each identified various results. Below, we describe the activities and examples of reported results. For more information, see appendix II. ASSIST: This activity sought to strengthen Zika-related health services and systems in Latin America and the Caribbean with a focus on pregnant women, newborns, and women of reproductive age. ASSIST reported that it conducted virtual and in-person training, courses, and workshops on Zika prevention, diagnosis, and care. ASSIST also reported that 8,133 health care workers had been trained as of March 2017, and that its efforts had supported the development of Zika care protocols and guidelines with a new emphasis on clinical care and support for affected infants and families. ASSIST further reported that through March 2018, 75 percent of children affected by Zika in Dominican Republic received specialized care at Hospital Infantil Robert Reid Cabral, an ASSIST- supported hospital in the capital, Santo Domingo. Red Cross: This activity aimed to reduce risks associated with Zika infection through community involvement, sharing lessons learned, and improving practices. The Red Cross reported that its communication efforts reached approximately 3,000 students, 29 communities, and almost 140,000 people via TV, radio, and social media engagement, providing them with information on risk and protection methods. Zika AIRS Project (ZAP): This is a mosquito control activity focused on reducing Zika transmission in Latin America and the Caribbean. Specific activities supported by USAID funding included entomological monitoring, larviciding, source reduction interventions, and indoor residual spraying. ZAP reported that five countries (El Salvador, Guatemala, Haiti, Honduras, and Jamaica) implemented comprehensive mosquito control activities. Population Services International: The purpose of this activity was to improve the capacity and raise awareness of people in countries affected by and at risk of Zika and other vector-borne diseases. Population Services International reported that through March 2018, 35 health providers in Dominican Republic, El Salvador, and Guatemala had been trained in raising awareness about Zika prevention and the use of printed educational materials. In addition, 1,006 pregnant women received counseling on Zika prevention, and 967 received prevention kits containing condoms, mosquito repellent, and printed educational materials. Additionally, 227 pharmacy attendants from 195 pharmacies received information on Zika prevention. Save the Children’s Community Action on Zika (CAZ): The goal of this project was to reduce Zika transmission and minimize the risk of Zika-related microcephaly and other neurological disorders. The project focused on helping the most vulnerable through community- based prevention strategies in Colombia, Dominican Republic, and three Central American countries. CAZ reported that it had reached approximately 65,000 students and trained 3,838 community agents and volunteers who supported efforts to strengthen the capacity to prevent Zika in 921 communities. United Nations Children’s Fund (UNICEF): This activity focused primarily on four countries: Guatemala, El Salvador, Honduras, and Dominican Republic. UNICEF worked to promote the adoption of prevention behaviors among at-risk populations through actions to raise awareness at multiple levels: individual, interpersonal, community, institutional, and national policy levels. UNICEF reported that these efforts reached more than 5.5 million people with key risk- communication messages and more than 150,000 people through coordinated social mobilization and person-to-person communication. For example, in Guatemala, UNICEF worked with a local partner to train young people and adolescents in schools and social groups to lead prevention activities in their communities. Moreover, around 25,000 pregnant women benefited from counseling sessions on Zika- prevention behaviors. In response to Zika, State conducted public awareness and communication initiatives, medical evacuations for overseas staff, and other activities. According to a State official, State conducted Zika-related public outreach to U.S. citizens abroad through social media and the Smart Traveler Enrollment Program, a service that provides information from U.S. embassies about local safety conditions. According to a State official, State also implemented public diplomacy activities related to Zika awareness and communication. For example, one activity aimed to raise awareness of vector-borne diseases such as Zika and collect information on insect breeding grounds. Another supported the addition of a science envoy who focused specifically on Zika and mosquito-borne diseases. In addition, according to a State official, State conducted Zika-related medical evacuations as part of those normally offered to female staff who became pregnant while serving abroad. State’s medical services division also supported overseas posts by purchasing and distributing mosquito repellent. State officials also told us that they coordinated Zika response efforts internally and externally. For example, State participated in a U.S. government interagency group led by CDC to exchange information on Zika and coordinated with other agencies on the response effort. Over the course of our fieldwork, USAID and implementing partner officials identified two key challenges to the implementation of Zika response activities. The first was the long-term sustainability of Zika response activities. The second was the timely implementation of Zika response activities in countries without bilateral USAID health programs. While USAID took steps to address the challenge related to sustainability, it only partially mitigated the challenge to timely implementation of Zika response activities in countries without bilateral USAID health programs. Agency and implementing partner officials identified the sustainability of Zika response efforts as a key challenge. While USAID did not intend to continue U.S. Zika response activities after the one-time emergency funding, sustainability was a consideration and posed a challenge due to the short implementation time frame, according to agency and implementing partner officials. One official further elaborated that Zika funding efforts occurred during the acute phase of the outbreak, which made it difficult to focus on long-term needs. For example, an implementing partner said that Zika-affected children require long-term care that host country governments may not be able to support after U.S. assistance ends. In addition, host country government officials, U.S. government officials, and implementing partners said that some Zika activities may not be sustainable after U.S. assistance is finished due to a lack of funds and limited capacity to continue the work. To address this challenge and support the long-term continuation of Zika response activities, implementing partners aligned their activities with those of host country governments and other organizations. Implementing partners reported working with governments and other organizations to incorporate Zika activities into their plans and practices so they could continue over the long term. One implementing partner and the Dominican Republic’s Ministry of Health, for example, planned mosquito control efforts together, and a Ministry of Health official said they intend to continue those control efforts after the end of Zika funding. Implementing partners in various countries also stated that Zika activities brought broader benefits to mosquito control, disability services, maternal health care, surveillance efforts, and emergency preparedness, which facilitated partners’ efforts to align their Zika response activities. For example, an implementing partner reported using Zika funding to develop organizational guidelines for treating Zika-affected children, which will be used by the health care system in Dominican Republic to treat children with related disabilities in the long term. According to some implementing partners in countries we visited, they developed Zika protocols and guidelines in response to new scientific information, trained government and other personnel on the protocols, and worked with officials of host country governments and other organizations to encourage adoption of Zika activities. For example, according to an agency official, an implementing partner in Peru developed a curriculum for epidemiologists and trained them on how to detect and contain mosquito-borne diseases, such as Zika. The agency official said that the implementing partner shared the training curriculum and materials with Peru’s Ministry of Health so it could continue the trainings after the end of Zika funding. According to implementing partners, they also involved local communities in activities to increase community ownership and address sustainability. For example, an implementing partner official said they trained a cadre of community volunteers in Guatemala and El Salvador on behavior change practices so that they can continue activities after the end of Zika funding. In addition, implementing partner officials said that engaging with communities to learn about needs and resources is important to continued community interest in activities. For example, an implementing partner that works with communities on health priorities developed an approach that includes a toolkit for identifying a community’s specific risks for Zika and the efforts best suited to helping the community eradicate mosquito breeding sites. In places affected by violence, some implementing partners engaged with communities to better understand how to prioritize community worker and volunteer safety to enable the continuation of activities. For example, an implementing partner in Guatemala engaged with local communities to understand areas they recommended health workers avoid due to safety concerns. Agency and implementing partner officials described timely implementation of activities in some countries without bilateral USAID health programs as a second key challenge. Twenty-two out of the 26 countries where USAID implemented its Zika response activities were countries without bilateral USAID health programs. USAID officials stated that, as a result, there were no USAID health program officials present in these countries to build on relationships with host country health officials and help facilitate the start of implementing partners’ activities during the Zika response. USAID officials noted two reasons that working with host country governments took time. First, some U.S. Zika response activities started after a decline in Zika cases, when some host country governments were no longer as focused on countering the disease. Implementing partners responded to this situation by identifying related health service improvements that could stem from implementing a Zika response and were of interest to the host country governments. Second, agency and implementing partner officials said that in some countries without bilateral USAID health programs it also took time to identify the appropriate points of contact and establish relationships—preliminary steps needed to obtain approval from the host country government before activities could get underway. According to USAID officials, these relationships are critical to navigating bureaucratic systems and assist in designing activities that meet the needs of host country governments and communities, which are needed for timely implementation. USAID took some steps to address the timely implementation challenge in countries without bilateral health programs. For example, according to USAID officials, USAID worked with multilateral partners that had a health presence in those countries and relied on regional field-based Zika coordinators to build relationships with in-country points of contact. As noted above, however, agency officials indicated that Zika response activities took additional time to deploy in some of the countries without bilateral USAID health programs. Further, implementing partners reported it took additional time to start up activities in those countries because of the time it took to obtain approval for them from the ministries of health. For example, one implementing partner reported that activity startup was postponed for nearly 3 months until it received approval from the host country government. Another implementing partner said it was a challenge to get information on Zika from the host country government or establish dialogue until USAID officials became involved. USAID officials also said that efforts to start and integrate Zika response activities in countries with ongoing USAID health programs did not face a number of the obstacles to timely implementation experienced in countries without bilateral USAID health programs. According to federal internal control standards, agencies should design control activities, such as a plan, to achieve their objectives and address related risks, such as the challenge related to timely implementation. In an effort to enhance its planning for outbreaks, USAID developed an infectious disease response plan in July 2018 during the time frame of our review. However, the plan does not provide specific guidance on how to address the challenge of initiating emergency response activities in countries without bilateral USAID health programs, such as by noting particular practices that implementing partners and other officials can use to address that challenge. For example, our fieldwork and interviews with USAID officials indicate that the following may be helpful practices for infectious disease response: Immediately establish an in-country working group that includes implementing partners, host country government officials, and U.S. government officials to help initiate and coordinate outbreak response. Communicate a current list of health ministry and other relevant government officials to implementing partners and other officials so they can quickly identify the appropriate points of contact. According to USAID officials, USAID missions maintain regular contact with host country governments, maintain contact lists, and participate in coordination meetings. However, in the case of overseas Zika response, some implementing partner officials in the field told us that they did not initially know who to contact in the host country government. Likewise, a host country government official told us that a working group on Zika outbreak response was not established until after officials recognized that implementing partner and host country government officials did not have regular channels of communication. By taking steps to improve planning for countries without bilateral USAID health programs—such as by adding specific guidance for initiating emergency response activities in such countries to its July 2018 plan—USAID would be better positioned to quickly build relationships with health ministry and other key government officials in host countries and thus be better able to provide a timely infectious disease response to future outbreaks. The Zika virus quickly spread to dozens of countries in 2015 and 2016, prompting WHO to declare the virus and associated health risks an international public health emergency. As future infectious disease outbreaks arise, Congress will be called on to fund overseas response efforts, as it did with the Zika outbreak, and USAID is likely once again to play a vital role in those efforts. Because USAID did not provide key decision makers with information on how Zika funding was distributed across the various countries where it conducted response activities, decision makers lack visibility into a key aspect of the overall U.S. Zika response overseas. The ability to compile this information by country when responding to future infectious disease outbreaks would enable USAID to provide key decision makers, including Congress and agency officials, with additional information to better support spending oversight and inform budgetary and planning decisions. Further, while USAID took steps to address the challenge of sustaining Zika response activities over the long term, it did not fully mitigate the challenge of timely implementation of activities in countries without bilateral USAID health programs. As a result, the agency’s response to Zika took additional time in some countries without bilateral USAID health programs. Infectious disease response planning that addresses countries without bilateral USAID health programs would better position USAID to quickly respond to infectious disease outbreaks, such as Zika, whenever the need arises. We are making the following two recommendations to USAID: The Administrator of USAID should take steps to ensure that, in responding to future public health emergencies of international concern, the agency is able to compile funding information broken down by country. (Recommendation 1) The Administrator of USAID should take steps to improve its infectious disease response planning to address the challenge of initiating response activities in countries without bilateral USAID health programs in a timely manner. (Recommendation 2) We provided a draft of this report to USAID, State, and CDC for review and comment. USAID provided written comments, which we have reproduced in appendix III. In its comments, USAID agreed with our findings and recommendations and identified a number of actions it plans to take in response. Specifically, USAID stated that in responding to future public health emergencies of international concern, it plans to compile and report on funding by country. USAID also outlined the steps it plans to take to develop additional guidance for USAID officials in countries without bilateral health programs. State and CDC did not provide formal responses. CDC provided technical comments, which we incorporated throughout the report, as appropriate. We are sending copies of this report to the appropriate congressional committees, the Administrator of USAID, the Secretaries of State and of Health and Human Services, and to other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The Zika Response and Preparedness Appropriations Act, 2016, included a provision for us to review the status of U.S. Agency for International Development (USAID) and Department of State (State) actions to respond to Zika. In this report, we examine (1) the status of USAID and State funding for the U.S. Zika response overseas, (2) activities supported by these funds, and (3) challenges, if any, to implementing Zika response activities and actions taken to address any challenges. To examine the status of funding for U.S. Zika response overseas, we reviewed USAID and State’s reports to the Senate and House Committees on Appropriations mandated by Section 203 of the Zika Response and Preparedness Appropriations Act, 2016. We reviewed agency reporting submitted to Congress and discussed the reports with agency officials. We also reviewed USAID and State’s reports to the Senate and House Committees on Appropriations mandated by the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2015. We obtained additional funding and activity information from USAID covering a period beyond that included in the reports to Congress. We reviewed the interagency agreement between USAID and the Centers for Disease Control and Prevention (CDC), outlining the CDC’s Zika response activities supported by $78 million in funds USAID obligated to CDC. We also obtained additional funding data from CDC and interviewed CDC officials to discuss the status of the agencies’ obligations and disbursements for Zika response activities. We analyzed USAID’s and State’s obligations and disbursements that the agencies reported as supporting the U.S. Zika response overseas, as of September 30, 2018. We analyzed agency obligations and disbursements across agency bureaus, funding accounts, and activities for the Zika response. Additionally, we interviewed officials from USAID and State to discuss the agencies’ obligations and disbursements for Zika response activities. We then reviewed the funding data and related documentation and consulted with USAID and State officials on the accuracy and completeness of the data. In the small number of instances where we identified potential issues or inconsistencies in the data, we contacted relevant agency officials and obtained information from them necessary to resolve the discrepancies. We assessed USAID’s tracking of funding data against federal internal control standards related to using quality information. We also utilized information from data reliability assessments for two recent GAO reports that utilized funding data from the same USAID and State systems. We determined that the data we used were sufficiently reliable for our purposes of examining USAID’s and State’s obligations and disbursements of the funds. To examine activities that USAID and State implemented in response to Zika overseas, we conducted fieldwork, analyzed agency documents, and interviewed officials. We examined the status and progress related to Zika response activities. We conducted a teleconference with officials in Haiti and El Salvador and conducted fieldwork in Barbados, Colombia, Dominican Republic, Guatemala, Honduras, Peru, and Trinidad and Tobago. We selected these countries based on the following criteria: (1) geographic diversity to include the Caribbean, Central America, and South America; (2) coverage of the main lines of effort (mosquito control, public awareness, capacity building, and research); and (3) the presence of activities under way that accounted for a significant portion of funding. During our fieldwork, we interviewed agency officials who played a role in Zika response activities, which included officials from State, USAID, and CDC. We also interviewed host government officials, implementing partners, health care workers, community volunteers, and researchers. In addition, we visited offices, toured facilities, and observed operations. We also attended a conference in Guatemala that addressed topics including status, successes, challenges, and lessons learned related to USAID’s Zika response. We reviewed agency documents describing the plans and goals of activities. We also analyzed progress reports of six activities to provide illustrative examples of results. We selected activities from those with among with the highest amounts of funding and that together represented approximately 33 percent of all USAID funding for Zika response and a range of countries, lines of effort, and types of implementing partners (such as nongovernmental organizations and international organizations). The sample is not generalizable to all of USAID’s Zika response activities. To examine challenges, if any, to implementing Zika response activities and actions taken to address any challenges, we interviewed U.S. government officials, USAID implementing partners, and host government officials, and we analyzed progress reports from selected USAID-funded Zika response activities. We identified key challenges based on the nature of the description and the degree to which a diversity of interviewees and documents made mention of them. We reviewed USAID policy, USAID’s infectious disease response plan, federal internal controls, implementing partner progress reports, and interviews with officials to determine what agencies did to address these challenges. We assessed USAID’s infectious disease response plan against relevant federal internal control standards. We conducted this performance audit from December 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate, evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To provide illustrative examples of the results of Zika response activities funded by the U.S. Agency for International Development (USAID), we analyzed implementing partners’ progress reports for a sample of six activities. We selected activities from those with among the highest amounts of funding and that together represented approximately 33 percent of all USAID funding for Zika response and a range of countries, lines of effort, and types of implementing partners (such as nongovernmental organizations and international organizations). Quantitative figures related to individual indicators listed below reflect the targeted population of the activity. Start dates and funding information provided below reflect the date of the report to Congress in which the activity first appeared and the associated funds obligated. The sample is not generalizable to all USAID’s Zika response activities. Table 1 presents the progress on key indicators as of March 2018 reported to USAID by the Applying Science to Strengthen and Improve Systems activity. The aim of the activity was to strengthen Zika-related health services and systems in Latin America and the Caribbean with a focus on pregnant women, newborns, and women of reproductive age. Table 2 presents the progress on key indicators as of May 2018 reported to USAID by the International Federation of Red Cross and Red Crescent Societies Global Health activity. The activity aimed to reduce risks associated with Zika infection through promoting community involvement, sharing lessons learned, and improving practices. Table 3 presents the progress on key indicators as of March 2018 reported to USAID by the United Nations International Children’s Emergency Fund activity. The activity aimed to promote the adoption of prevention behaviors among at-risk populations through actions targeting multiple levels of their environment: individual, interpersonal, community, institutional, and national policy levels. Table 4 presents the progress on key indicators as of September 2017 reported to USAID by the Save the Children Community Action on Zika project. The goal of the project was to reduce Zika transmission and minimize the risk of Zika-related microcephaly and other neurological disorders among the most vulnerable through community-based prevention strategies. Table 5 presents the progress on an illustrative selection of key indicators, by objective, as of March 2018 reported to USAID by the Population Services International activity. The purpose of the activity was to improve the capacity and raise awareness of people in countries affected by and at risk of Zika and other vector-borne diseases. Table 6 presents illustrative examples of accomplishments as of March 2018 reported to USAID by the Zika AIRS Project (ZAP). This was a mosquito control project focused on reducing Zika transmission in Latin America and the Caribbean. Specific activities included entomological monitoring, larviciding, source reduction interventions, and indoor residual spraying. In addition to the contact named above, Joyee Dasgupta (Assistant Director), Marc Castellano (Analyst-in-Charge), Diana Blumenfeld, Alana Miller, Fatima Sharif, David Dayton, Francisco Enriquez, Christopher Keblitis, Amber Sinclair, and K. Nicole Willems made key contributions to this report.", "summary": "The World Health Organization (WHO) declared the Zika virus a public health emergency of international concern in February 2016. According to WHO, as of March 2017, 79 countries and territories—including 48 in the Western Hemisphere—reported evidence of ongoing Zika transmission. In April 2016, USAID and State repurposed $215 million for Zika from funds appropriated for Ebola. Subsequently, the Zika Response and Preparedness Appropriations Act, 2016, provided over $175 million in supplemental funding to USAID and State to support Zika response efforts overseas. The act also included a provision for GAO to review the status of USAID and State actions to respond to Zika. In March 2019, the Centers for Disease Control and Prevention downgraded its international travel warning for Zika. This report examines (1) the status of USAID and State funding for U.S. Zika response overseas, (2) activities supported by these funds, and (3) implementation challenges, if any, and responses to any challenges. GAO reviewed information from U.S. agencies and met with U.S. and host country officials in Washington, D.C. GAO also conducted fieldwork in a nongeneralizable sample of countries in Latin America and the Caribbean where agencies implemented key response activities. The U.S. Agency for International Development (USAID) and the Department of State (State) obligated $385 million of the total $390 million available for international Zika response and disbursed $264 million as of September 2018. USAID obligated 95 percent of the total funding. USAID and State provided some country information to Congress but did not provide, or take steps to track, funding on a country basis. According to USAID officials, tracking funding information by country would be helpful in the future. The ability to compile funding by country when responding to future infectious disease outbreaks would enable USAID to provide additional information to key decision makers to better support spending oversight and inform budgetary and planning decisions. In response to the Zika outbreak, USAID and State supported a broad range of activities overseas, including mosquito control, research efforts, and medical evacuations. In one activity, USAID implementing partners monitored mosquito populations; in another, they researched methods to reduce Zika virus transmission rates. USAID implementing partners reported various outputs from selected activities. For example, an implementing partner reported that its awareness campaign on Zika prevention reached more than 5 million people. USAID faced sustainability and timeliness challenges in implementing its Zika response. According to agency and other officials, one-time funding and a short time frame posed a challenge related to sustainability of Zika response activities. In response, USAID worked to align activities with those of host governments and other organizations so they could continue in the long term. However, USAID's emergency response planning did not fully address the challenge of timely implementation of response activities in countries without bilateral USAID health programs. Twenty-two of 26 countries with Zika response activities did not have bilateral USAID health programs when the Zika outbreak began. As a result, response activities took additional time to deploy in some countries where USAID first had to establish relationships with key host country officials. Although USAID developed an infectious disease response plan in 2018, the plan does not provide guidance on how to address the timely implementation challenge in countries without bilateral health programs. By improving its planning, such as by adding such guidance in its 2018 plan, USAID would be better positioned to respond quickly to future disease outbreaks. USAID should (1) take steps to ensure it is able to compile funding information by country for future infectious disease emergency responses and (2) take steps to improve its infectious disease response planning. USAID concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Prevalence of Forced Labor in Thailand A 2020 report by the United Nation’s International Labor Organization included research on hundreds of Thai workers employed on seafood vessels or in processing facilities. The report found that nearly 10 percent of interviewees shared circumstances of involuntary work and coercion that, taken together, constituted forced labor. The report concluded that if its selection of interviewees is representative of workers employed across the Thai seafood industry, it would indicate that tens of thousands of workers in Thai fishing and seafood processing are working in forced labor conditions. Fishing activities are vulnerable to a number of illicit practices, including illegal, unreported, and unregulated (IUU) fishing and forced labor. IUU fishing is a broad term that includes a variety of fishing activities with social, economic, and environmental impacts and concerns all aspects and stages of the capture and marketing of fish, according to the United Nations’ Food and Agriculture Organization. Examples of IUU activities include fishing without a license or in excess of quota for certain species; failing to report catches or making false reports on catches; and conducting unauthorized transshipments, such as transfers of fish to cargo vessels at sea or port, according to NOAA. IUU fishing poses a threat to food security and socioeconomic stability in many parts of the world, according to NOAA documents, and many crew members on fishing vessels that engage in IUU fishing are from poor or underdeveloped areas. In addition, the Food and Agriculture Organization has noted that activities of those engaging in IUU fishing can constitute, lead to, or be associated with organized crime or other crimes, such as human trafficking, that may include forced labor. The International Labor Organization—an agency within the United Nations that, among other things, sets labor standards—has identified common indicators of forced labor in any work sector, as shown in figure 1. The presence of a single indicator in a given situation may, in some cases, indicate the existence of forced labor; in other cases, several indicators taken together may point to forced labor, according to an International Labor Organization document. Forced labor can occur at various points along the seafood supply chain—which can be long and complex—with limited visibility at various points, making it difficult to detect (see fig. 2). For example, forced labor may occur if workers are held on fishing vessels for long durations without adequate breaks or the ability to return to land. It may also occur in later stages of seafood processing, such as during filleting and canning the fish for export and sale to consumer, according to an NGO report. Additionally, various NGO reports indicate that during the harvesting and processing stages, seafood caught with forced labor may be combined with legally caught seafood, making illegal shipments more difficult to identify. For example, companies may combine catches from several smaller boats onto a bigger vessel before transporting it to shore for processing. Moreover, some seafood supply chains have an additional layer of complexity because low-value fish may not be directly exported but, rather, used as feed for farm-raised seafood that could eventually be imported into the United States. Forced labor related to this type of situation can be difficult to detect because the source of feed for farm- raised fish is an early step in a supply chain that occurs well before the seafood is imported into the United States, according to CBP officials. Federal law prohibits the import of goods made with forced labor. In particular, section 307 of the Tariff Act of 1930 prohibits the importation of goods, wares, articles, and merchandise mined, produced, or manufactured, wholly or in part, in any foreign country by convict labor, forced labor, or indentured labor under penal sanctions. TFTEA, enacted in February 2016, among other things, amended section 307 of the Tariff Act of 1930 by repealing an exception referred to as the consumptive demand clause. The consumptive demand clause permitted the importation of certain forced labor-produced goods if they were not produced “in such quantities in the United States as to meet the consumptive demands of the United States.” determination that merchandise was produced with forced labor in violation of section 307, the Commissioner will publish a formal finding. Various other laws and regulations are also relevant to IUU fishing and the importation of illegally harvested seafood into the United States. For example, under the High Seas Driftnet Fishing Moratorium Act, among other things, the Secretary of Commerce is charged with identifying and certifying countries that have fishing vessels engaged in IUU. According to NOAA officials, a negative certification may result in restrictions on the importation of some fish and fish products at a port of entry. NOAA also administers and enforces a number of statutes that include prohibitions on the importation of illegally harvested seafood, most notably the Magnuson-Stevens Fishery Conservation and Management Act and the Lacey Act. Under these authorities and others, NOAA enforces a number of trade monitoring programs. For example, NOAA administers the Seafood Import Monitoring Program (SIMP), which establishes permitting, data reporting, and recordkeeping procedures for the importation of 13 species of fish and fish products identified as being at particular risk of IUU fishing or seafood fraud. NOAA also implements the Tuna Tracking and Verification Program, which monitors domestic cannery production and importation of all frozen and processed tuna products to ensure compliance with federal requirements regarding dolphin-safe certification. A number of federal agencies and stakeholders are involved in or have an interest in forced labor and seafood-related efforts. In particular, CBP is responsible for enforcing violations of section 307 as part of its overall efforts to deter and detect violations of U.S. customs and trade laws at the more than 300 ports of entry into the United States. CBP’s enforcement efforts include, but are not limited to, actions to identify, detain, seize or exclude illegitimate imports, including imports produced by forced labor, counterfeits, and goods evading customs duties. After passage of TFTEA in 2016, CBP initiated new efforts to emphasize and focus on enforcement of section 307. Specifically, CBP formally established its Forced Labor Division in March 2018, within its Office of Trade. Since its inception, the Forced Labor Division has grown in size, according to CBP officials, with about 12 staff onboard as of the end of 2019, mainly comprised of analysts and international trade specialists. The Forced Labor Division does not have staff in other countries, but CBP can leverage foreign attachés from other CBP offices, to the extent they are available, to assist with enforcement of section 307, according to CBP officials. Staff in the Forced Labor Division also collaborate with others throughout CBP, including the Office of Field Operations, which, among other things, oversees operations at U.S. ports. Other federal agencies, such as the Department of State and the Department of Labor, conduct activities and collect information related to forced labor. According to CBP officials, CBP may use information from these federal agencies to help support its enforcement of section 307 for particular cases, including those involving seafood. Also, since the enactment of TFTEA in 2016, a number of working groups or task forces have been established, primarily involving U.S. federal agencies, to share information collected related to forced labor and imports, in general, as well as illegal activities involving fishing more specifically, in some cases (see app. II). In addition, numerous stakeholders, such as NGOs, also have an interest in combating forced labor, including forced labor related to the seafood industry. Often stakeholders’ interests in forced labor include other human rights issues or are broader than specific commodities such as seafood. Stakeholders may provide a variety of services to advocate for workers and identify potential forced labor. For example, some NGOs investigate potential human rights abuses of workers in the seafood industry while others focus on collecting data to help other interested stakeholders identify cases of forced labor. Other NGOs may work with importers who have interests in corporate social responsibility by helping them identify potential issues in their supply chain and comply with U.S. laws, including section 307. CBP enforces section 307 involving seafood imports generally following the same process it uses for any other goods suspected of being produced with forced labor imported into the United States, such as apparel, electronics, or consumer products. CBP carries out its process through its Forced Labor Division, in collaboration with other offices across CBP. According to CBP documents and officials, the process CBP uses to enforce section 307 generally includes four phases: (1) assessing leads to determine whether to initiate a case; (2) investigating cases; (3) reviewing information for legal sufficiency to propose a WRO; and (4) implementing the WRO and detaining shipments (see fig. 3). An importer has several options if CBP detains its shipment, including contesting the WRO or deciding not to enter the good into U.S. commerce. Phase 1: Initiation. CBP analysts within the Forced Labor Division assess leads for credibility when deciding whether to initiate cases involving potential forced labor at any point in the supply chain for a particular good. According to CBP officials, an analyst would examine, for example, whether an allegation made by an external party is credible, the goods in question are being imported into the United States, and sufficient information is available on potential forced labor to initiate and build a case. CBP officials told us that they do not have the resources to gather firsthand information on labor practices such as on fishing vessels or processing operations overseas, but that they can initiate cases based on information obtained from external sources. For example, CBP may receive information through its e- allegations system, which is CBP’s online mechanism for the public to report any suspected violations of trade laws or regulations related to the importation of goods into the United States. In addition, CBP may receive an allegation directly from external entities, such as NGOs; letters from industry or other concerned parties; and information from other U.S. government agencies. Publicly available information, such as media reports or NGO publications, can also serve as leads for CBP to self-initiate a case. If CBP’s initial evaluation shows further evaluation is warranted, CBP initiates a case and moves to the next phase. Phase 2: Investigation. CBP analysts investigate cases by collecting information from various sources to help determine whether the evidence “reasonably but not conclusively” indicates that goods being imported into the United States were produced with forced labor, according to CBP officials. For example, analysts may ask other federal agencies for information, such as import data, or speak with NGOs that may have information about a particular good or supply chain overseas. CBP officials also said they may investigate the strength of the information collected as part of their case development. In doing so, they said the Forced Labor Division uses the International Labor Organization’s forced labor indicators, among other standards, to help evaluate the sufficiency of evidence for forced labor conditions. If there is insufficient evidence to continue investigating a case, the Forced Labor Division may either close or suspend it pending further information, according to CBP officials. If there is sufficient evidence to propose a WRO, the case moves to the next phase. Phase 3: Legal review. CBP’s Forced Labor Division prepares a package, which includes an assessment of evidence and a justification for a proposed WRO for the goods suspected to be produced with forced labor, and submits it to CBP’s Office of Chief Counsel for legal review. To propose a WRO, CBP officials said that the package must provide sufficient evidence to reasonably but not conclusively indicate a violation of section 307. This entails having sufficient supply chain information showing importation of a good harvested, produced, or otherwise manufactured with forced labor, according to CBP officials. During its legal review, the Office of Chief Counsel may request additional information or have discussions with the Forced Labor Division. If the Office of Chief Counsel determines there is insufficient evidence to proceed with a WRO, then the Forced Labor Division may choose to close the case or suspend it and consider whether to seek additional information for the case. If the Office of Chief Counsel determines there is sufficient evidence to proceed with a WRO, then the Forced Labor Division prepares a WRO package to be presented to the CBP Commissioner for review and approval. Phase 4: Implementation. Once the CBP Commissioner issues a WRO, CBP is responsible for implementing the parameters of the WRO. According to CBP officials, numerous officials within CBP, including those at U.S. ports and the Centers of Excellence and Expertise, are responsible for implementation. CBP officials located at U.S. ports screen import data to identify, hold, and detain shipments associated with a WRO. When CBP detains a shipment subject to a WRO at a port of entry, the importer has the option to reexport the shipment to a different country. Alternatively, officials said the importer can contest the detention and provide additional information to show that the shipment did not contain forced labor elements. If CBP determines the importer has provided sufficient evidence, it allows the shipment to enter into U.S. commerce. Should the importer not provide additional information, the shipment can be excluded (not admitted into U.S. commerce) and/or seized and destroyed in certain circumstances, according to CBP officials. A WRO remains in place until the circumstances surrounding the original WRO change to indicate that forced labor is no longer part of the production or manufacturing process, and the CBP Commissioner revokes the order, according to CBP documents. CBP officials said the agency can also issue civil penalties to importers for forced labor violations for importing goods in violation of section 307, where appropriate. CBP’s Forced Labor Division tracks its cases of suspected forced labor violations, including seafood cases, in a case-tracking spreadsheet throughout the various phases of the enforcement process. The spreadsheet notes the status of each case as (1) open and active, (2) suspended, or (3) closed/inactive. At any given time, the Forced Labor Division may be working on a number of seafood cases that are in various phases of the enforcement process, according to CBP officials. Further, officials said the status of these cases changes as new information becomes available. Data CBP provided to us showed a small number of open and active cases as well as suspended cases that were related to seafood. CBP officials stated that they suspended these seafood cases partly because they lacked personnel to obtain additional information to further investigate the cases. In other instances, they said they may suspend cases while waiting for additional information, which may take significant time to obtain. From February 2016—when TFTEA was enacted—through March 2020, CBP issued 13 WROs for goods suspected of violating section 307, of which one involved seafood, according to CBP data (see table 1). The seafood-related WRO was for all seafood imports caught by the fishing vessel Tunago No. 61, registered in Vanuatu, an island nation in Oceania. After issuing the WRO in February 2019, CBP detained multiple shipments of seafood, according to CBP data, but revoked the order at the end of March 2020. CBP’s other WROs cover a variety of goods such as cotton, toys, food, and agricultural products. Six of the 13 WROs included imports from China, while several WROs included goods from African countries. As of March 2020, CBP officials said they had not issued any civil penalties for forced labor violations involving seafood imports. CBP officials told us they obtain and use information from a variety of external sources, including media reports, other federal agencies, and stakeholders, that can help them initiate new forced labor-related cases or advance existing ones. CBP officials said that media reports can be a catalyst for its Forced Labor Division to initiate or investigate a case. For example, CBP officials noted that forced labor in Thailand’s shrimp industry had been in the news since 2015, and in response, CBP collected additional information from companies importing shrimp from Thailand. Additionally, the Forced Labor Division initiated the case that resulted in the seafood-related WRO based partially on news reporting, according to CBP officials. CBP officials also told us that they have formed working relationships with journalists that can be helpful in obtaining information to initiate or investigate cases. CBP also uses information on an as-needed basis from a variety of federal agencies to initiate and investigate cases, according to CBP officials. NOAA. CBP can use certain data collected through NOAA’s trade monitoring programs to help the agency support specific forced labor cases for seafood, according to CBP officials. For example, in the case of the seafood-related WRO, CBP officials told us they used vessel names collected through NOAA’s Tuna Tracking and Verification Program to link specific shipments of tuna to the vessel in question, which CBP officials said was essential information to confirm imports were being made to the United States. This information was available because the seafood in question was one of the species of fish subject to NOAA trade monitoring programs that generate data CBP can access; however, not all species of fish are included in these programs. Through its trade monitoring programs, NOAA collects harvest-related data, such as the name of the fishing vessel and the species of fish caught, but NOAA officials told us the agency does not collect data specific to labor conditions. NOAA officials and other stakeholders said that there have been discussions regarding potentially expanding the scope of data collected through NOAA’s trade-monitoring programs, such as SIMP, to collect labor-related data. However, the officials noted some potential difficulties in doing so. For example, NOAA officials said that they would need to determine what specific information would be feasible to collect from importers and how it would collect, review, and validate such information. Some NOAA officials raised concern that collecting data on labor conditions may be outside NOAA’s mission; as such, the agency may not have a clear use for the data once collected. The Department of Labor. CBP officials told us they may use reports published by the Department of Labor for context to inform section 307 investigations, including those involving seafood. CBP officials also said they may reach out to the department on an as-needed basis to seek additional information. According to Department of Labor officials, the department also contacts other U.S. government agencies, including CBP, on an ad-hoc basis to share information. The Department of State. CBP officials said they may use reports published by the Department of State for contextual information in their enforcement of section 307, including investigation of cases involving seafood. CBP officials also said that the Department of State may include CBP in official communications from embassies discussing potential instances of forced labor. Department of State officials also said that they may reach out to CBP on a case-by-case basis regarding issues of potential forced labor detected in the course of their work overseas. CBP officials said they may use information from stakeholders to initiate or investigate cases. For example, CBP officials stated that they have reached out to NGOs to obtain clarification on sources used in NGOs’ reports for specific cases. Stakeholders can also submit information or allegations proactively to the agency. CBP officials said that firsthand information collected in-country, including victim accounts, can be beneficial for initiating or investigating forced labor cases. We found many stakeholders collect such information. For example, a representative from one NGO told us that its organization conducts interviews with laborers from fishing vessels once the vessels dock to gather information on labor payment practices, which can serve as an indicator of potential forced labor. However, CBP officials said they also face challenges using information provided by stakeholders because information is often insufficient to initiate or investigate a forced labor case. For example, CBP officials said that information they receive from NGOs might not provide sufficient detail on the supply chain that includes the alleged forced labor, including the manufacturer or vessel committing forced labor, or the connection to a U.S. importer. Additionally, these officials told us that information from stakeholders may conflate poor working conditions with forced labor. Firsthand Account of Abuse and Potential Forced Labor Involving Workers on Fishing Vessels In its 2019 Seabound report, Greenpeace included testimonials of migrant fishers that detailed abuse and violent conditions on fishing vessels: “I witnessed horrible torture. We were working even on midnights. When the Fishing Master was angry, he hit my friend’s head near his left ear. After that he was forced to continue working until the work was finished and only then was he allowed to rest. In the morning when we woke up for breakfast, we found him dead in his room. The Captain wrapped up my dead friend’s body with a blanket and then stored him in the freezer.” According to stakeholders we interviewed and our review of information on CBP’s website, CBP has not clearly communicated its information needs externally. Representatives from 14 of the 18 NGOs we interviewed indicated that they had some uncertainty about the types and level of information CBP needs to investigate forced labor cases in the seafood industry. For example, representatives from one NGO said it was not clear what constituted a credible allegation for CBP, or what information CBP needs to make a section 307 determination. Additionally, representatives from two NGOs managing a grant program designed to support nonprofit organizations collecting firsthand evidence of forced labor said that they were unable to obtain specific guidance from CBP on the types of information the agency needs. As a result, these representatives said they could not communicate to potential grantees the specific kinds of information that would be most useful to submit to CBP. In asking CBP officials about this, CBP confirmed that the NGOs had reached out but they misunderstood the goals of the grant program at the time. CBP could improve the quality of information it receives from stakeholders, including NGOs, by better communicating what information is most useful to initiate and investigate forced labor cases, including those involving seafood, according to stakeholders. Of the 14 stakeholders that told us there was uncertainty, 11 indicated that additional or clearer information about the agency’s information needs could result in more reporting of information to CBP. For example, representatives from one NGO said there was reluctance among stakeholders that may have limited resources to develop an allegation without knowing whether it is helpful, and that they would be more likely to do so with a better understanding of CBP’s needs. Similarly, representatives from another NGO said it is not worth dedicating the time and resources to develop an allegation without a clear sense of the types of information CBP is looking for to investigate its forced labor cases. Many of these stakeholders indicated that they are collecting firsthand information about potential forced labor in seafood supply chains in countries where labor violations are prevalent, which is information CBP officials told us could benefit forced labor investigations. CBP officials said they have communicated in general about their information needs for forced labor cases, and that requisite information varies by case, including for seafood cases. The agency’s website contains some information, including a reference to a regulation identifying information individuals are to submit to CBP when making a forced labor allegation. However, CBP does not indicate what specific information to submit such as the timing or location of alleged forced labor activities. Similarly, CBP does not provide examples of the type of information—such as photos or testimonials from victims—that could be useful information for initiating or investigating cases. In addition, CBP officials said that their e-allegations system provides a means for stakeholders to submit allegations of potential forced labor, among other things, to the agency. However, as of April 2020, the instructions for submitting an allegation do not include specifics on the types of information CBP needs to initiate or investigate cases, such as whether photographs or firsthand accounts of forced labor could be helpful. CBP officials agreed with the need to better communicate to stakeholders the types of information that are helpful for initiating or investigating forced labor cases. They said that the Forced Labor Division had begun considering how it might do so but, to date, had yet to identify further details such as the approach it might take. Federal standards for internal control establish that management should externally communicate the necessary quality information to achieve an agency’s objectives. For example, an agency should use appropriate methods to communicate quality information so that external parties can help the agency achieve its objectives. With better communication to stakeholders about the types of information it needs to initiate and investigate forced labor cases, CBP may be able to improve its enforcement efforts through enhanced information from stakeholders. The exploitation of labor in the seafood supply chain is a global issue that, according to a recent United Nations report, affects millions of people working in the fishing sector. With the United States importing billions of dollars’ worth of seafood in 2018 and reliant on those imports for much of the seafood it consumes, it is important that CBP take action to detect and prevent imports produced with forced labor from entering the country. Following the enactment of TFTEA in February 2016, CBP created the Forced Labor Division and placed an increased emphasis on detecting forced labor in imports, including seafood. CBP officials told us they do not have the resources to gather firsthand information on labor practices. To this end, CBP uses information from a variety of sources, including external stakeholders such as NGOs, to initiate and investigate cases. However, stakeholders are unclear about the types of information CBP needs to initiate and investigate cases because CBP has not clearly communicated this information. As a result, CBP may be missing opportunities to obtain key information that stakeholders collect specific to forced labor in the seafood industry—information that could enhance CBP’s enforcement efforts. The Acting Commissioner of CBP should better communicate to stakeholders the types of information stakeholders could collect and submit to CBP to help the agency initiate and investigate forced labor cases related to seafood and, as appropriate, other goods. (Recommendation 1) We provided a draft of this report to the Departments of Commerce, Homeland Security, Justice, Labor, State, and the U.S. Agency for International Development for review and comment. We received written comments from the Department of Homeland Security and the U.S. Agency for International Development, which are reproduced in appendixes III and IV, respectively. The Department of Homeland Security concurred with our recommendation and noted that CBP is committed to continued collaboration and communication with stakeholders about the types of information needed to develop forced labor cases and improve enforcement efforts of section 307 of the Tariff Act of 1930, as amended. CBP described the actions it plans to take to address the recommendation, including steps to improve collaboration and information sharing during meetings with working groups. In addition, the Departments of Commerce, Homeland Security, Justice, Labor, and State provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Commerce, Homeland Security, Justice, Labor, and State; and the Administrator of the U.S. Agency for International Development. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Anne-Marie Fennell at (202) 512-3841 or fennella@gao.gov or Kimberly Gianopoulos at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. The objectives of this report are to examine (1) the process U.S. Customs and Border Protection (CBP) uses to enforce section 307 for seafood imports and the results of its civil enforcement actions and (2) the external sources of information CBP uses to help carry out enforcement of section 307 specific to seafood imports and stakeholder perspectives on CBP’s communication of information needs. To examine the process the Department of Homeland Security’s CBP uses to enforce section 307 for seafood imports, we reviewed laws, regulations, and CBP documents and data pertaining to section 307 enforcement. These laws included section 307 of the Tariff Act of 1930 and the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA). We interviewed CBP officials from the Office of Trade and Office of Field Operations, in both Washington, D.C., and the field, who are involved in forced labor detection and enforcement about the steps in CBP’s process to enforce section 307. In addition, we interviewed officials from U.S. Immigration and Customs Enforcement to learn about their involvement in addressing section 307. We examined CBP’s efforts to enforce section 307 since TFTEA was enacted, in February 2016, through March 2020, the most currently available information at the time of our review. We examined CBP’s enforcement of section 307 but did not include other forced labor laws in the scope of our review. To describe the results of CBP’s civil enforcement actions, we looked at enforcement actions CBP took from February 2016—when TFTEA was enacted—through March 2020. We reviewed CBP’s list of civil enforcement actions pertaining to all commodities it published on its website. In addition, we collected and analyzed information specific to seafood from a spreadsheet that CBP uses to track cases, which contains information on all of its active, suspended, and inactive forced labor investigations pertaining to section 307. CBP provided us with updated versions of this case-tracking spreadsheet in July 2019, November 2019, and March 2020. To assess the reliability of the data, we interviewed CBP officials about the accuracy and completeness of the data and discussed each seafood case to understand the data represented in the various fields, such as how the seafood case originated and what the outcome of the case was. We also discussed in detail the information that led to the one seafood withhold release order (WRO) CBP issued in February 2019. Based on our interviews with CBP officials, we determined that the seafood case data were sufficiently reliable for the purposes of describing CBP’s enforcement actions. To describe the external sources of information CBP uses to help carry out enforcement of section 307 for seafood, we conducted interviews with CBP officials, including officials in the Office of Trade, which includes the Forced Labor Division, and the Office of Field Operations, to learn about the types of information they gather from external sources and how they might use that information. In addition, we interviewed various other federal agencies and stakeholders that collect information that could be relevant to CBP’s enforcement of section 307. We identified these agencies by interviewing CBP officials about the external sources of information they use to help enforce section 307 cases. Federal agencies. We interviewed the following agencies: Department of Commerce’s National Oceanic and Atmospheric Administration (NOAA), Department of Justice, Department of Labor, Department of State, U.S. Immigration and Customs Enforcement, and U.S. Agency for International Development. We also interviewed officials from NOAA about the Seafood Import Monitoring Program and other trade-related programs that collect data aimed at preventing illegal, unreported, and unregulated seafood from entering the United States. In addition, we reviewed documents provided by NOAA that focused on trade programs that CBP could use as a source of information to help carry out enforcement of section 307. We interviewed officials from the Departments of State and Labor about each agency’s reports on human trafficking and forced labor and obtained copies of and reviewed their reports. Stakeholders. We interviewed current and former representatives from 18 nongovernmental organizations (NGOs) that have interests in forced labor in the seafood industry. Our original scope included 19 NGOs, but we eliminated one NGO from our scope since an official from this organization told us its responses would not vary from those we received from a larger parent NGO, and officials we interviewed did not have separate viewpoints on the extent to which they understood CBP’s information needs. We identified NGOs using internet searches for groups focused on seafood and forced labor and the recommendations of officials from federal agencies and NGOs we interviewed. We also selected NGOs that represented a variety of goals and missions, including those focused on helping U.S. importers remain compliant with section 307 and those focused on assistance to survivors of forced labor overseas. We asked representatives from each NGO a standard set of questions that addressed, among other things, information they may share with CBP. Statements these stakeholders made are not generalizable to all stakeholders but provide perspectives on information for enforcing section 307. To describe stakeholder perspectives on CBP’s communication of information needs, we interviewed stakeholders about their perspectives of CBP’s information needs. Specifically, we asked about the extent to which they understood CBP’s information needs for enforcement of section 307, the extent to which they have shared information with CBP about potential forced labor they have identified, and factors that may affect their sharing information with CBP. In some cases, NGO representatives we interviewed told us their organizations were unable to share information with CBP because of external factors, such as nondisclosure agreements or differing information collection objectives, but they noted that CBP actions could affect the likelihood of other stakeholders sharing information. Statements these stakeholders made are not generalizable to all stakeholders but provide perspectives on information sources. We also interviewed CBP officials about the extent to which information stakeholders provided was sufficient to use in initiating and investigating section 307 cases. To evaluate CBP’s communication of its information needs to initiate or investigate forced labor cases as part of its section 307 enforcement process, we interviewed CBP officials about how the agency communicates its information needs to initiate or investigate forced labor cases as part of its section 307 enforcement process. We also reviewed CBP documents and the agency’s website to identify what information CBP provided to the public about its information needs. We compared the agency’s existing communication efforts to federal standards for internal control, as appropriate. We assessed the agency’s procedures to determine whether CBP communicated information to external parties through appropriate methods. We also assessed the quality of available information to ensure it was appropriate, current, complete, and accessible, among other things. We conducted this performance audit from February 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Since the enactment of the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA), a number of working groups or task forces have been established, primarily involving U.S. federal agencies, to focus on forced labor and imports in general as well as combating illegal activities in the seafood supply chain more specifically in some cases. Interagency Working Group on Forced Labor. The Department of Homeland Security established this working group in 2017. According to U.S. Customs and Border Protection (CBP) officials, the group’s purpose is information sharing and collaboration on forced labor topics with interagency partners, which include officials from the Departments of Labor, State, and Justice and the National Oceanic and Atmospheric Administration (NOAA), among other federal agencies. CBP officials stated that the group generally meets monthly. Task Force on Human Trafficking in Fishing in International Waters. In 2017, the Senate Appropriations Committee directed the Department of Justice to lead a multi-agency task force to examine the issue of human trafficking in seafood supply chains and report to Congress on the status of such issues, along with any related funding, policy recommendations, and legal decisions. Department of Justice officials said they launched the task force in October 2018, and it includes officials from NOAA; the Departments of Homeland Security, Justice, State, Labor, and Treasury; and the Office of the United States Trade Representative. Department of Justice officials said they drafted a report that identified relevant legal and jurisdictional issues, with recommendations to help further efforts to limit human trafficking in fishing in international waters. As of March 2020, the draft was undergoing interagency review and no publication date had been specified, according to the officials. Commercial Customs Operations Advisory Committee Forced Labor Working Group. The Commercial Customs Operations Advisory Committee is a longstanding public-private partnership between the federal government and the private sector. It advises the Department of Homeland Security on matters involving commercial operations, including significant changes that are proposed to CBP regulations, policies, or practices. After the enactment of TFTEA, a working group within the committee’s Intelligent Enforcement Subcommittee—the Forced Labor Working Group—began discussing a variety of issues related to the implementation of section 307, according to CBP officials. The officials said that in 2017 the Forced Labor Working Group sought information from several nongovernmental organizations knowledgeable about labor and human rights in sectors involving seafood and other goods to obtain their insights that could then be shared with CBP. In addition to the contacts named above, Alyssa M. Hundrup (Assistant Director), Christine Broderick (Assistant Director), Christina Werth (Assistant Director), Andrea Riba Miller (Analyst in Charge), and Emily Norman made key contributions to this report. Martin De Alteriis, Patricia Moye, Sheryl Stein, Sara Sullivan, and Nicole Willems also contributed to the report.", "summary": "The United States, which relies on imports for most of the seafood it consumes, imported about $40 billion in fishery products in 2018. Seafood imports often involve complex supply chains, which may include forced labor. A 2017 United Nations report estimated that there are 24.9 million people in forced labor around the world, 12 percent of whom work in the agriculture and fishing sectors. Section 307 of the Tariff Act of 1930, as amended in 2016, prohibits the importation of goods, including seafood, produced or manufactured, wholly or in part, in any foreign country by forced labor, among other things. GAO was asked to review CBP's enforcement of section 307. This report examines (1) the process CBP uses to enforce section 307 for seafood imports and the results of its civil enforcement actions; and (2) the external sources of information CBP uses to help carry out enforcement of section 307 for seafood imports and stakeholder perspectives on CBP's communication of its information needs. GAO reviewed laws and CBP documents pertaining to section 307 enforcement and interviewed officials from CBP, other federal agencies, and 18 NGO stakeholders. GAO selected NGOs with various goals and missions related to seafood and forced labor. The Department of Homeland Security's U.S. Customs and Border Protection (CBP) uses a four-phase process to enforce section 307 of the Tariff Act of 1930, which prohibits imports produced with forced labor, including seafood. CBP's Forced Labor Division, established in 2018, largely carries out this process. In phase 1, CBP assesses leads when deciding to initiate a case involving potential forced labor. In phase 2, CBP investigates cases using a variety of information to determine whether evidentiary standards have been met. In phase 3, CBP reviews information for legal sufficiency and, in phase 4, may take action at a port of entry to detain imports in violation by issuing a withhold release order. Between 2016 and March 2020, CBP issued one order for seafood, prohibiting tuna shipments from a specific fishing vessel from entering U.S. commerce. CBP uses information from external sources to help enforce section 307 for seafood imports but may miss opportunities to obtain key information from stakeholders. CBP officials said they use media reports and information from federal agencies and stakeholders to develop forced labor cases. For example, CBP initiated the case that resulted in the seafood order based partly on media reports and investigated it using vessel data from the Department of Commerce. CBP officials said that stakeholders such as nongovernmental organizations (NGOs) often have firsthand accounts of forced labor—valuable information for investigations. However, most stakeholders told GAO that they do not have a clear understanding of the information CBP needs to investigate seafood cases because CBP has not communicated such information. For example, CBP's website provides general information about what individuals can submit if forced labor is suspected but does not provide specific types of information that could be useful. With better communication to stakeholders about the types of information it needs to develop forced labor cases, CBP may be able to improve its enforcement efforts. GAO recommends that CBP better communicate to stakeholders the types of information stakeholders could collect and submit to CBP to help the agency initiate and investigate forced labor cases related to seafood and, as appropriate, other goods. CBP agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "SOCOM has a unique structure and responsibilities in that it has both combatant command responsibilities and military service-like functions for organizing, training, and equipping SOF. Under sections 164 and 167 of Title 10, United States Code, the SOCOM commander is responsible for training and ensuring the combat readiness of assigned forces and monitoring the preparedness to carry out assigned missions of SOF assigned to unified combatant commands. In addition, SOCOM is responsible for developing special operations strategy, doctrine, and tactics; the employment of forces of the command to carry out assigned missions; requirements validation; acquisition of special operations- peculiar equipment; and formulating and submitting requirements for intelligence support, among other things. In its combatant command function, the commander of SOCOM is responsible for and has the authority to conduct the following special operations activities: (1) direct action, (2) strategic reconnaissance, (3) unconventional warfare, (4) foreign internal defense, (5) civil affairs, (6) military information support operations, (7) counterterrorism, (8) humanitarian assistance, (9) theater search and rescue, and (10) other activities such as may be specified by the President or the Secretary of Defense. Congress initially established the position of the ASD-SO/LIC in the NDAA for Fiscal Year 1987. As previously discussed, in 2016 Congress enhanced the role of the ASD-SO/LIC in section 922, which is codified in section 138(b) of Title 10, United States Code. The ASD-SO/LIC’s current statutory responsibilities include overall supervision, including policy and resources, of special operations activities listed above; exercising authority, direction, and control of all special operations-peculiar administrative matters relating to the organization, training, and equipping of SOF; and assisting the Secretary of Defense and USD (P) in the development and supervision of policy, program planning and execution, and allocation and use of resources for irregular warfare, combating terrorism, and special operations activities. DOD Directive 5111.10, Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict (SO/LIC), first issued in 1995 and most recently updated in 2011, also prescribes the roles and responsibilities for the ASD-SO/LIC. Among other things, the ASD- SO/LIC serves as the principal staff assistant to the USD (P) and the Secretary of Defense on special operations and low-intensity conflict matters and counterdrug policy, among others. DOD Directive 5111.10 also establishes responsibilities, functions, relationships, and authorities for the ASD-SO/LIC on issues such as the coordination and oversight of policy for humanitarian assistance, refugee affairs, and foreign disaster relief activities (e.g., emergency relief for Ebola). Prior to the enactment of section 922, OASD-SO/LIC coordinated regularly with SOCOM on administrative matters, such as reviewing SOCOM’s budget materials. Specifically, the administrative chain of command for SOF-related matters was formally changed by section 922 to give the ASD-SO/LIC more oversight over SOCOM through direct interaction with the Secretary of Defense. Section 922 provided the ASD-SO/LIC with the statutory authority to exercise authority, direction, and control of all special operations-peculiar administrative matters relating to organizing, training, and equipping SOF. Section 922 did not alter SOCOM’s operational chain of command as a combatant command. Section 1074 of the NDAA for Fiscal Year 2018 directed DOD to submit a report on the progress the department had made in implementing the requirements identified in section 922. Section 1074 specified seven reporting elements, such as the accounting of personnel currently assigned, that DOD’s report should address. DOD submitted its report on March 12, 2018, wherein it identified a high-level summary of actions taken, as shown in table 1 below. In 2018, DOD identified 166 recommendations to address the reforms required by section 922 that are aimed at increasing the ASD-SO/LIC’s role in the management of SOF and special operations. To identify these recommendations and support the implementation of service secretary- like responsibilities under section 922, OASD-SO/LIC and SOCOM created a “tiger team” to review broad functional areas typically performed by the military service secretariats and determine the need for potential changes to the roles and responsibilities of OASD-SO/LIC and SOCOM related to addressing requirements in section 922. The tiger team included five working groups to review potential roles and responsibilities for budget, special access programs, personnel and readiness, program and requirements, and acquisition functions. Two officials, respectively representing OASD-SO/LIC and SOCOM, co-led each of these working groups. OASD-SO/LIC established design principles to help the working groups identify new roles and responsibilities for OASD-SO/LIC and SOCOM under section 922. These principles included the following three broad categories of authorities that OASD-SO/LIC could be expected to take on: Monitor: This role requires that OASD-SO/LIC be informed, observe, and check the progress or quality of an activity throughout the lifetime of the activity. This includes, for example, monitoring SOCOM’s submission of its presidential budget justification material to Congress. Review and coordinate: This role requires that OASD-SO/LIC review, analyze, and coordinate throughout the lifetime of an activity to ensure compliance with authoritative policy and with statutory and other regulatory issuances, and to ensure achievement of broad program goals. Coordination does not imply authority to compel agreement, however. An example of the review and coordinate role is that OASD-SO/LIC liaises with the military departments on military personnel issues. Approve: This role requires OASD-SO/LIC’s concurrence to give explicit or official sanction, permission, or ratification of an activity. An example of approval authority is that ASD-SO/LIC approves SOCOM’s Program Objective Memorandum (POM). We found the largest share of the 166 recommendations made by the working groups strengthened OASD-SO/LIC’s roles related to monitor and to review and coordinate, as shown in figure 1. Specifically, 80 out of 166 recommendations (48 percent) would strengthen OASD-SO/LIC’s role regarding monitor or review and coordinate. Twenty-two out of 166 recommendations (13 percent) would give OASD-SO/LIC approval authority—requiring OASD-SO/LIC’s concurrence to give explicit or official sanction, permission, or ratification of an activity. Of these 22 recommendations, 16 involved either joint approval—requiring both OASD-SO/LIC and SOCOM to jointly approve the action—or partial approval—that is, OASD-SO/LIC would have approval authority on certain aspects of an action item. Sixty-four out of 166 recommendations (39 percent) did not recommend any change to OASD-SO/LIC’s role. In addition, the majority of the recommendations, about 156 out of 166 (about 94 percent) would not change SOCOM’s roles. OASD-SO/LIC used the 166 recommendations to inform the development of 87 actions in OASD-SO/LIC’s monthly reports to Congress. We found that with regard to the 87 actions identified in OASD-SO/LIC’s February 2019 monthly report, 49 percent of the action items (43 out of 87) focused on OASD-SO/LIC’s participation in meetings. For example, prior to the implementation of section 922, OASD-SO/LIC attended Joint Resources Management Board meetings. After implementing section 922, OASD- SO/LIC exercised its review and coordinate responsibility by attending Joint Resources Management Board meetings, thereby formalizing OASD-SO/LIC’s prior role. According to DOD officials, there is a value in adding OASD-SO/LIC as a participant in key meetings and formalizing OASD-SO/LIC’s review and coordinate role. For example, officials explained that, by participating in meetings, OASD-SO/LIC can have more situational awareness about key topics and can better advocate for the SOF enterprise. DOD, through OASD-SO/LIC, has taken various actions, including changes in roles and responsibilities, related to addressing requirements in section 922. According to OASD-SO/LIC officials, its actions reflect an incremental approach to strengthening OASD-SO/LIC’s roles and responsibilities. In February 2019 OASD-SO/LIC reported to Congress that it had completed 56 of its 87 actions. For example, one of the actions identified in the February 2019 monthly report was the need to enhance OASD-SO/LIC’s role in the development and approval of SOF-related program and budget matters. The report further identified a number of actions, including having OASD-SO/LIC approve SOCOM’s POM. According to the report, OASD-SO/LIC was briefed on and approved SOCOM’s POM for fiscal years 2020-2024. As another example, the report identified the need to enhance OASD-SO/LIC’s oversight of SOF- related military construction activities and contingency basing. This included a requirement that OASD-SO/LIC co-chair SOCOM’s Military Construction Summit, which according to officials deals with acquisition- related issues regarding military construction and is used to inform the POM. According to the February 2019 report, OASD-SO/LIC co-chaired the summit for fiscal year 2019, and its formal role as co-chair will be reflected in future updates to SOCOM guidance. The February report also explained that the Deputy Secretary of Defense approved a new Special Operations Policy and Oversight Council directive that identified the ASD- SO/LIC as the lead for that council. The Deputy Secretary of Defense also delegated the ASD-SO/LIC with authority to approve waivers to hire civilian personnel during a civilian hiring freeze. Many of the actions taken thus far formalize pre-existing, informal relationships between OASD-SO/LIC and SOCOM. According to OASD- SO/LIC officials, a formalization of a pre-existing role occurs when OASD- SO/LIC identifies a role that OASD-SO/LIC performed informally before addressing requirements under section 922 and continues to maintain the role officially under its section 922 responsibilities. Based on the February 2019 report to Congress, we found that 26 out of 56 implemented action items (about 50 percent) formalize ongoing OASD- SO/LIC roles and responsibilities that were previously conducted informally. Officials stated that all of the actions relating to budget execution are formalizations of previously existing informal roles and responsibilities. For example, according to OASD-SO/LIC and SOCOM officials, OASD-SO/LIC had an informal role in reviewing SOCOM’s POM prior to section 922, such as participating in the review of the POM without formal approval authority. According to DOD officials familiar with the POM process, giving OASD-SO/LIC approval authority for SOCOM’s POM essentially formalized what had been done in the past, while allowing OASD-SO/LIC to perform a more thorough review. Similarly, officials stated that OASD-SO/LIC had an informal role in developing SOCOM’s budget justification books prior to the passage of section 922. Another action identified in DOD’s February 2019 monthly report is OASD-SO/LIC’s role in budget submission. Officials explained that, in an effort to enhance OASD-SO/LIC’s role in budget submission, OASD- SO/LIC has formalized this role. According to the officials, the benefit of this formalization is that OASD-SO/LIC has greater access to the process of producing justification books. There have been similar examples of formalization of pre-existing roles in other areas as well. For example, prior to section 922, SOCOM’s public affairs requirements were coordinated with USD (P)’s public affairs office. Rather than duplicate SOCOM’s existing public affairs role with an additional public affairs office for the ASD-SO/LIC, OASD-SO/LIC coordinates with the USD (P)’s public affairs office. Most of the actions remaining to be implemented do not have clear time frames for implementation. Based on our analysis of the February 2019 monthly report, we found that 31 out of 87 identified actions remain unimplemented. Of these 31 actions, three have clear time frames for implementation. For example, one of the remaining actions involves enhancing the ASD-SO/LIC’s role in SOF military personnel-related issues. Among other things, this includes liaising with the military departments on relevant military personnel issues and coordinating on related policy issues. The February 2019 monthly report includes an action related to OASD-SO/LIC’s plans to coordinate a process to monitor promotions of SOF personnel and communicate issues with military departments. The report specifies that the ASD-SO/LIC expected to implement this process in 2019. As another example, documenting and funding for the Secretariat for Special Operations was expected to be resolved by the first quarter of fiscal year 2019. However, the remaining 28 actions do not have time frames for implementation. For example, some of the actions associated with implementing the ASD-SO/LIC’s key functions, such as acquisitions and legislative affairs, do not have clear time frames for implementation. Regarding acquisitions, OASD-SO/LIC is developing standard operating procedures, such as regular coordination and meetings, but it has not established time frames for the creation or implementation of these procedures. Similarly, OASD-SO/LIC and SOCOM are prescribing roles with regard to legislative affairs pending further departmental guidance, but they have not established time frames within which these roles will be defined. DOD officials identified some reasons for not having identified time frames for the remaining actions. First, according to OASD-SO/LIC officials, their initial efforts were focused on identifying and prioritizing the list of actions needed to implement section 922, as reflected in the March 2018 report required by law. Since then, according to OASD-SO/LIC and SOCOM officials, OASD-SO/LIC has taken an incremental approach to implementing these actions, addressing items on a case-by-case basis as they occur. For example, OASD-SO/LIC initially placed a higher priority on implementing its fiscal roles and responsibilities, partly because the POM cycle included deadlines associated with the President’s Budget for Fiscal Year 2020. Throughout the cycle, OASD-SO/LIC determined its specific role in each step of the POM process as the step arose. Second, OASD-SO/LIC officials stated that they had not established clear time frames linked to action items because the ASD-SO/LIC was new in that role and they were waiting for him to determine OASD-SO/LIC’s broader strategy and goals, which they could use to inform implementation time frames. However, we note that the ASD-SO/LIC has been in that position since December 2017, and OASD-SO/LIC has hired new personnel who could help develop and track time frames. Standards for Internal Control in the Federal Government emphasizes the need to establish time frames to implement actions effectively, and as we reported in June 2018, establishing time frames with key milestones and deliverables to track implementation progress are important for agency reform efforts. Failure to do so can have significant consequences. For example, by not establishing clear time frames for updating guidance that defines the ASD-SO/LIC’s acquisition roles, the ASD-SO/LIC is at risk for having unclear roles and responsibilities that may overlap between SOCOM and the Office of the Secretary of Defense on functions related to acquisitions. According SOCOM officials, having clearer time frames to update DOD guidance could enable OASD-SO/LIC and SOCOM to operate more efficiently and effectively. Without establishing clear time frames for the implementation of key oversight functions and other actions, the ASD-SO/LIC may not be able to fully execute OASD- SO/LIC’s service secretary-like authority, and DOD decision-makers may not be well positioned to track progress and evaluate whether or how the ASD-SO/LIC’s completed and pending actions support the full implementation of section 922. While the ASD- SO/LIC’s responsibilities, functions, relationships, and authorities are established in DOD Directive 5111.10, Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict (ASD SO/LIC) (Mar. 22, 1995) (incorporating Change 2, Oct. 21, 2011), this directive is outdated and does not reflect the ASD- SO/LIC’s statutory roles under section 922 and codified at 10 U.S.C. § 138. For example, DOD Directive 5111.10 states that the ASD- SO/LIC shall serve under the authority, direction, and control of the USD (P). However, section 922 states that the ASD- SO/LIC’s exercise of authority of all special operations-peculiar administrative matters related to the organization, training, and equipping of SOF shall be subject to the authority, direction, and control of the Secretary of Defense. According to DOD officials, while there is other guidance that broadly lays out DOD roles and responsibilities, this guidance lacks details concerning operationalizing ASD- SO/LIC’s roles and responsibilities under the new administrative chain of command, creating potential confusion regarding the ASD- SO/LIC’s roles and responsibilities on some key SOF-related issues. For example: SOF personnel issues: SOF personnel activities include readiness reporting, training, education, warrior care, awards, decorations, and death notification. Support for SOF personnel issues is generally dispersed among different components, including the military services, SOCOM, the office of the Under Secretary of Defense for Personnel and Readiness (USD (P&R)), and OASD- SO/LIC. Although DOD Directive 5111.10 states that the ASD- SO/LIC “shall advise and coordinate with the Under Secretary of Defense for Personnel and Readiness on manpower” issues, it does not define whether manpower issues include SOF career management, such as special pay and promotion. According to DOD officials, DOD lacks overarching guidance that would clarify ASD-SO/LIC’s role on manpower issues. DOD Directive 5111.10 also does not provide specific information about the extent of the ASD- SO/LIC’s coordination role as it relates, for example, to issues such as career management, retirement, pay, or promotion with regard to USD (P&R) responsibilities on SOF personnel management. As a result, according to DOD officials, the lack of clear and updated guidance has caused some confusion among DOD components. According to OASD-SO/LIC officials, after section 922 was implemented, OASD- SO/LIC’s initial attempts to provide strategic outreach for SOF personnel faced some challenges because officials were not included in key personnel meetings. For example, OASD-SO/LIC officials told us they were not included in some meetings that discussed delegating civilian hiring waivers. By not participating in some key SOF personnel-related meetings, OASD-SO/LIC could have missed the opportunity to advocate for similar waiver authority. According to DOD officials, USD (P&R) officials did not fully understand the ASD- SO/LIC’s authorities under section 922 when OASD-SO/LIC officials attended some meetings. Despite this confusion, the ASD-SO/LIC has taken some steps to strengthen its role on SOF personnel issues. For example, according to DOD officials, during the federal government civilian employee hiring freeze, DOD delegated civilian employee hiring waivers to the secretaries of the military departments but did not include waivers for the ASD-SO/LIC or SOCOM. Without the waiver authority to re-instate SOF personnel, SOCOM would have to request a waiver separately through the military services. OASD-SO/LIC officials told us that by ensuring the ASD-SO/LIC was granted a similar waiver authority, OASD-SO/LIC officials streamlined the process and supported SOCOM’s efforts to hire additional SOF civilian personnel. However, the ASD-SO/LIC’s authority on SOF personnel matters remains unclear and SOF personnel issues are generally dispersed among the authorities of USD (P&R), military services, and SOCOM. Overall, it remains unclear what, if any, authorities the ASD-SO/LIC has with respect to leading and coordinating the department’s SOF personnel issues. Budgetary authority: SOF-related budgetary issues include the SOCOM special operations–specific–funding budget materials, the POM, acquisition, and congressional requests for information, among other things. DOD officials told us that before section 922 was enacted, the ASD-SO/LIC reviewed SOF-peculiar budget materials (generally linked to major force program funding) prior to submission of the POM, and the ASD-SO/LIC was notified of SOF-related congressional unfunded priority list submissions. The ASD-SO/LIC did not have principal staff assistant authority to approve the POM. DOD Directive 5111.10 states that the ASD-SO/LIC will provide overall supervision of the preparation and justification of the SOF budget and programs and will review the SOCOM POM. However, the DOD directive has not been updated to provide the ASD-SO/LIC with clear oversight and approval authority over special operations– specific funding, which traditionally has been controlled by SOCOM. DOD Directive 5111.10 also states that the ASD-SO/LIC will advise and coordinate with the Under Secretary of Defense for Acquisition and Technology on acquisition priorities, but this does not provide the ASD-SO/LIC with oversight of the SOF acquisition process. In addition, DOD does not have any guidance that gives ASD-SO/LIC clear oversight roles regarding the SOF acquisition process. By comparison, SOCOM is responsible for the development and acquisition of special operations-peculiar equipment, materiel, supplies, and services in accordance with section 167(e) of Title 10, U.S. Code, and it executes funding in operation and maintenance, procurement, and military construction accounts, among other things. According to OASD-SO/LIC senior officials, the ASD-SO/LIC has some authority over special operations–specific funding through the POM process. According to OASD-SO/LIC officials, after implementing section 922, the ASD-SO/LIC established a new principal staff assistant authority to approve the POM in 2018. However, DOD officials familiar with SOF-related budgetary issues stated that it is unclear how much authority the ASD-SO/LIC has over funding issues to adjudicate potential disagreements between the services and SOCOM on either SOF-specific or common funding issues. Special Access Programs (SAP): SAPs are programs established for a specific class of classified information that impose safeguarding and access requirements that exceed those normally required for information at the same classification level. Given the sensitive nature of these programs, DOD has established different levels of authorities to create and manage SAPs. According to DOD Directive 5205.07, Special Access Program (SAP) Policy, the Deputy Secretary of Defense designates certain DOD component heads, or DOD agency heads—for example, the secretary of a military department or the Commander, SOCOM—as cognizant authorities to manage and execute their respective SAPs. While the ASD-SO/LIC has always played a role in SOF-related SAPs, DOD officials stated that the role is expected to evolve as part of the implementation of section 922. OASD-SO/LIC’s February 2019 monthly report includes several actions intended to enhance the ASD-SO/LIC’s role in the management of SAPs, and OASD-SO/LIC has already begun participating in various SAP-related conferences and meetings. However, according to DOD officials, the ASD-SO/LIC’s future role related to SAPs remains unclear in existing guidance. For example, DOD Directive 5111.10 states that the ASD-SO/LIC will provide oversight over all special operations and low-intensity conflict related sensitive SAPs. Although the ASD-SO/LIC and SOCOM officials told us that they are currently further defining these roles, the DOD directive has not been updated to clarify whether the ASD-SO/LIC should be included in the SAP governance process, which includes designating the ASD-SO/LIC as a cognizant authority with service secretary-like SAP responsibilities. DOD officials expressed some concerns that until these matters are clarified in guidance, it will remain unclear whether the ASD-SO/LIC and SOCOM should work together on SAP issues, and how their relationships with the various Under Secretaries of Defense with oversight authority will be managed. Standards for Internal Control in the Federal Government states that management should define objectives clearly and assign responsibility for key roles throughout the organization. Specifically, the standards call for management to define objectives in specific terms so that they are understood at all levels of the entity. This involves clearly defining what is to be achieved, who is to achieve it, how it will be achieved, and time frames for its achievement. We have also previously reported that management practices key to program success include clearly identifying organizational roles and responsibilities and clarifying program objectives. OASD-SO/LIC and SOCOM officials stated that updated guidance is needed to help clarify the ASD-SO/LIC’s roles and responsibilities under section 922. In December 2018 OASD-SO/LIC officials told us that they were starting to update guidance on the ASD- SO/LIC’s roles and responsibilities under section 922 in DOD directive 5111.10. However, OASD-SO/LIC officials did not provide details about the information that would be updated, and did not provide a copy of that draft guidance. In addition, OASD-SO/LIC officials did not have clear time frames regarding when the guidance will be updated. As DOD updates the ASD-SO/LIC’s roles and responsibilities either in DOD Directive 5111.10 or through new guidance, it has an opportunity to clarify changes in its relationship with DOD components involved in overseeing SOF administrative matters related to personnel, budgetary authority, and SAPs. The SOF enterprise is a complex system, and without clearly identified roles and responsibilities for a service secretary- like role for the ASD-SO/LIC, other DOD components—such as the military departments, USD (P), and USD (P&R) —may not know the extent of the ASD-SO/LIC’s and SOCOM’s authorities in key issues where they have vested interests. For example, it will remain unclear what authorities the ASD-SO/LIC has with regard to SOF-related administrative matters, and which entities will have visibility over any problems or resourcing decisions related to the SOF enterprise. By clarifying the ASD-SO/LIC’s roles and responsibilities with regard to its relationship with SOCOM and other DOD components, DOD can more effectively implement the intent of section 922. OASD-SO/LIC has taken steps to develop a hiring plan to identify personnel requirements and an approach to hiring additional personnel. DOD’s efforts began in 2017, when OASD-SO/LIC commissioned the Army Office of Manpower and Reserve Affairs to conduct a manpower study to provide an analysis of manpower requirements based on unconstrained resources that are necessary to satisfy the service secretary-like responsibilities under section 922. The Army’s manpower study was based on nine functions, including budget, acquisitions, and legislative activities. For each function, the study identified corresponding tasks and the average man hours, or time needed, to complete each task. The study, which was included in DOD’s March 2018 report to Congress, ultimately estimated that up to 64 full-time equivalent (FTE) positions might be needed to implement the ASD-SO/LIC’s section 922 responsibilities. According to OASD-SO/LIC officials, the study provided an initial framework for OASD-SO/LIC to determine its staffing needs, but the study was not comprehensive and OASD-SO/LIC’s hiring needs will likely continue to change in the future. Over the past 2 years, according to OASD-SO/LIC officials, OASD- SO/LIC has begun to hire personnel to fulfill various roles and responsibilities. Specifically, the number of FTEs hired to support OASD- SO/LIC’s implementation of section 922 increased from 14 in March 2018 to 24 as of December 2018. In addition, section 361 of the John S. McCain NDAA for Fiscal Year 2019 gave the ASD-SO/LIC additional flexibility to hire staff in fiscal year 2019. For example, section 361 directed that not less than $4 million in fiscal year 2019 shall be used to fund additional civilian personnel to help implement section 922. Section 361 also provided the OASD-SO/LIC an exemption from the statutory civilian personnel limitation in the Office of the Secretary of Defense imposed by 10 U.S.C. § 143. Figure 2 shows OASD-SO/LIC’s hiring actions to date, along with key events related to the implementation of section 922. In December 2018 OASD-SO/LIC officials completed a basic hiring plan to guide future personnel growth as OASD-SO/LIC continues to implement actions related to section 922. The plan—documented in a 10 slide presentation—includes OASD-SO/LIC’s short-term hiring goals through the start of fiscal year 2020, a hiring approach involving a mix of permanent and temporary staff, and the identification of targeted skillsets for personnel hired. For example, the plan includes targets related to achieving key skills, such as force planning and shaping the President’s Budget for Fiscal Year 2021. The plan also calls for OASD-SO/LIC to grow from 27 current FTEs to a total of 55 FTEs in fiscal year 2020. While OASD-SO/LIC’s current hiring plan represents a first step toward developing a broad overview of its hiring goals and some key hiring considerations, it does not fully incorporate some leading practices for strategic workforce-planning. As we have previously reported, strategic workforce planning addresses two critical needs: (1) aligning an organization’s human capital program with its current and emerging mission and programmatic goals; and (2) developing long-term strategies for acquiring, developing, and retaining staff to achieve programmatic goals. While agencies’ approaches to workforce planning will vary, we have previously identified several key principles that strategic workforce planning should address, irrespective of the context in which the planning is done. GAO’s prior work on workforce planning identified the following five key principles: involve top management, employees, and other stakeholders in developing the strategic workforce plan; determine the critical skills and competencies needed to achieve long-term goals; develop strategies that are tailored to address critical competency gaps; build the capacity needed to address requirements important to supporting workforce strategies; and monitor and evaluate the agency’s progress toward its human capital goals. However, we found that as of December 2018, the OASD-SO/LIC’s hiring plan had not fully incorporated several of these key strategic workforce-planning principles, as described below: The hiring plan was not fully aligned with long-term goals. A key principle in strategic workforce planning is strategic alignment, which occurs when an agency’s human capital program is linked with its mission and goals. However, we found that OASD-SO/LIC has not clearly linked its hiring plan with its overall mission and goals. For example, the hiring plan mentions short-term goals, such as analyzing the budget for fiscal year 2021 and long-term goals, such as strategic assessment and aligning the organization with National Defense Strategy requirements. However, the plan does not define strategic assessment, and it lacks detail about how newly hired personnel in fiscal year 2019 will help OASD-SO/LIC meet long-term goals related to strategic assessment. For example, OASD-SO/LIC recently hired seven personnel, but it is not clear whether the newly hired personnel have skills that match competencies, such as the ability to work with Special Access Programs, identified in OASD-SO/LIC’s hiring plan. We have previously reported that unless hiring needs are clearly linked with long-term goals, the hiring plan may be incomplete or premature. OASD-SO/LIC’s approach did not fully involve stakeholders. While stakeholder involvement is not statutorily required, another key principle of effective strategic workforce planning is to involve top management, employees, and other stakeholders in developing, communicating, and implementing strategic workforce plans. We found several cases in which OASD-SO/LIC did not involve stakeholders in its key efforts. For example, although OASD-SO/LIC senior officials shared information about the hiring plan with one senior official at SOCOM, several OASD-SO/LIC and SOCOM officials stated that OASD-SO/LIC did not communicate the hiring plan’s expectations or strategies more broadly, to involve a full range of OASD-SO/LIC and SOCOM officials and other stakeholders, such as USD (P). In another example, when OASD-SO/LIC hired personnel from September 2018 through December 2018, several OASD- SO/LIC and SOCOM officials were unclear about the specific roles and responsibilities of new personnel hired. The hiring plan did not include strategies to address critical competency gaps and identify related personnel requirements. Leading principles of effective strategic workforce planning hold that agencies should develop strategies to address critical skill gaps and systematic personnel requirements processes, which are considered a good human capital practice across government. However, we found that OASD-SO/LIC’s hiring plan did not include completed competency-gap assessments or have procedures in place to periodically reassess personnel requirements. Without a systematic process to periodically assess personnel requirements, OASD-SO/LIC could not determine whether the Army study’s initial estimates were the most efficient choice for the workforce. For example with regard to the legislative affairs positions, OASD-SO/LIC and SOCOM officials told us that the Army manpower study’s initial estimate of eight FTEs was too high. OASD-SO/LIC officials eventually hired two FTEs for the legislative affairs office, but the hiring plan did not include a methodology to analyze the workforce and explain why two FTEs would fit within the Army study’s framework. According to OASD- SO/LIC officials, OASD-SO/LIC also did not use a standardized process to assess whether two FTEs would meet its requirements. According to OASD-SO/LIC officials, the hiring plan is the first step in developing an initial framework, and they stated that it lacked implementation details. OASD-SO/LIC officials stated that they anticipate building upon the hiring plan as the current workforce plan evolves over time. In addition, OASD-SO/LIC officials stated that key priorities include strengthening OASD-SO/LIC’s participation and oversight of SOF resources through the POM and fiscal guidance processes. As a result, the hiring plan includes information about new personnel focused on fiscal oversight, such as analyzing the budget in fiscal years 2020 through 2021, but it does not clarify long-term goals, competency gaps, and program results tied to other priorities, such as legislative and acquisition- related functions. Officials from OASD-SO/LIC and SOCOM agreed that incorporating key principles in the strategic workforce plan would help them determine the most appropriate size and composition of OASD- SO/LIC’s workforce. Until OASD-SO/LIC completes a comprehensive strategic workforce plan that includes key principles as outlined above, OASD-SO/LIC may not know what gaps exist in skills and competencies, and what their workforce strategies to fill those gaps should be. These issues could put OASD-SO/LIC at risk of hiring personnel who may not adequately meet its needs as defined by section 922. As DOD increasingly relies on SOF, the department has taken steps to implement section 922. Given the expanded statutory authority under section 922, the ASD-SO/LIC has greater authority to oversee and advocate for the SOF enterprise. The ASD-SO/LIC has implemented several actions to clarify and strengthen its oversight roles and responsibilities, and it has many additional planned actions underway. However, without time frames to implement action items and revised or new guidance that clearly articulates the ASD-SO/LIC’s roles and responsibilities with regard to SOCOM and the wider SOF enterprise, these changes may not be fully effective. In addition, without a strategic workforce plan that fully incorporates leading practices to ensure that the department has the right people, in the right place, at the right time, OASD-SO/LIC may not be well prepared to respond to future workload changes and manage its human capital strategically. As OASD-SO/LIC makes progress in its hiring plan, it is important for OASD-SO/LIC to develop a strategic workforce plan to ensure that it appropriately addresses the human-capital challenges of the future and better contributes to the agency’s efforts to meet its missions and goals. We are making three recommendations to the Secretary of Defense: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict defines time frames for completing action items necessary to implement the Assistant Secretary of Defense for SO/LIC’s expanded section 922 responsibilities. (Recommendation 1) The Secretary of Defense should ensure that the Assistant Secretary of Defense for the Special Operations and Low-Intensity Conflict updates existing guidance or develops new guidance to clarify the roles and responsibilities of the Assistant Secretary of Defense for SO/LIC and relationships with DOD components that have vested interests in the SOF enterprise—such as the military services, SOCOM, the Under Secretary of Defense for Personnel and Readiness, and the Under Secretary of Defense for Policy. (Recommendation 2) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict builds upon its hiring plan by developing a strategic workforce plan that incorporates key principles, such as aligning the plan with long-term mission goals; fully involving stakeholders in developing the plan; and including strategies to address critical competency gaps and identify related personnel requirements. (Recommendation 3) In written comments on the draft of this report, DOD partially concurred with our recommendations. Comments from DOD are summarized below and reprinted in appendix I. DOD also provided technical comments, which we incorporated as appropriate. DOD partially concurred with the first recommendation that the ASD- SO/LIC define time frames for completing action items necessary to implement the ASD-SO/LIC‘s expanded section 922 responsibilities. In its response, DOD stated that most time frames have been established or the action completed. Additionally, DOD noted that some actions may not be completed because they depend on events, actions or leadership decisions that are outside of OASD-SO/LIC’s control. We agree that some DOD leadership decisions have yet to be made. However, 28 out of 31 already identified actions do not have clear time frames for implementation. Further, time frames can be modified as events change or better information becomes available. As we discuss in the report, establishing time frames with key milestones to track implementation progress are important for agency reform efforts. Without clear time frames, ASD-SO/LIC may not be able to fully execute its service secretary-like authority. DOD partially concurred with the second recommendation that the ASD- SO/LIC update DOD Directive 5111.10 to clarify the roles and responsibilities of the ASD-SO/LIC and relationships with DOD components that have vested interests in the SOF enterprise. DOD is in the process of revising this directive, but DOD noted that the purpose of DOD Directive 5111.10 is to define only specific Department-wide roles and missions for ASD-SO/LIC and is not the appropriate issuance to define ASD-SO/LIC’s relationship with other DOD components in the SOF enterprise. Given that DOD does not believe DOD Directive 5111.10 is the appropriate issuance to clarify ASD-SO/LIC’s relationships with DOD components, we modified our recommendation from focusing solely on updating DOD Directive 5111.10 to updating existing guidance and/or developing new guidance. Updating or developing guidance that clarifies ASD SO/LIC’s relationship with DOD components, such as the military departments, USD (P), and USD (P&R) would likely allow for improved oversight of and collaboration on SOF matters related to personnel, budgetary authority and SAPs. DOD partially concurred with the third recommendation that the ASD- SO/LIC build upon its hiring plan by developing a strategic workforce plan that incorporates key principles, such as aligning the plan with long- term mission goals; fully involving stakeholders in developing the plan; and including strategies to address critical competency gaps and identify related personnel requirements. In its response, DOD agreed that there is room to improve the involvement of stakeholders. In addition, DOD stated that it developed a strategic workforce plan that aligns with long-term mission goals and has identified strategies to address critical competency gaps, including target skillsets. However, as noted in our report, the 10 slide presentation that constitutes the hiring plan lacks details that would be included in a comprehensive workforce plan. For example, the hiring plan did not explain how the hiring needs would be specifically tied to long-term goals, such as National Defense Strategy requirements. Although the hiring plan mentions some skillsets, it does not include a competency gap assessment or assess personnel requirements. As noted in our report, OASD-SO/LIC and SOCOM officials stated that the initial personnel requirements developed by the Army study were inaccurate for several reasons, including the lack of a standardized process to assess personnel requirements. Accordingly, we continue to believe that until OASD-SO/LIC develops a comprehensive strategic workforce plan that includes key principles outlined in our report, OASD- SO/LIC could be at risk of hiring personnel who may not adequately meet its needs to perform the roles and responsibilities of section 922. We are sending copies of this report to other interested congressional committees and the Acting Secretary of Defense. In addition, this report will be available at no charge on the GAO Web site at http://www.gao.gov. If you have any questions regarding this report, please contact me at (202) 512-5431 or at russellc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors are listed in appendix II. In addition to the contact named above, Jim Reynolds (Assistant Director), Tracy Barnes, Mikey Erb, Amie Lesser, Mike Silver, Cheryl Weissman, and Yee Wong (Analyst-in-Charge) made key contributions to this report.", "summary": "As DOD increased its reliance on special operations forces, SOCOM's budget has increased from $5.2 billion in 2005 to $12.3 billion in 2018. Section 922 of the NDAA for Fiscal Year 2017 included provisions to enhance the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict's responsibilities to be similar to those of a military department secretary regarding the organization, training, and equipping of special operations forces. The Joint Explanatory Statement accompanying the fiscal year 2018 NDAA included a provision for GAO to assess DOD's actions in response to section 922. This report assesses (1) the extent to which DOD has identified and taken actions to implement section 922; (2) what, if any, challenges it faces in completing implementation; and (3) the extent to which its hiring approach for the office of the ASD-SO/LIC has incorporated strategic workforce planning principles. GAO reviewed relevant documents and interviewed DOD officials. Since 2017 the Department of Defense (DOD) has made recommendations, developed actions, and taken steps to address requirements in section 922 of the National Defense Authorization Act (NDAA) for Fiscal Year 2017 to expand the Assistant Secretary of Defense for Special Operations and Low-Intensity Conflict's (ASD-SO/LIC) roles and responsibilities. DOD officials noted that they have taken an incremental implementation approach to addressing section 922. In 2018, DOD identified 166 recommendations to change the ASD-SO/LIC's oversight of special operations forces (SOF). These recommendations were used to develop 87 actions that were necessary to implement section 922. Since February 2019, DOD has implemented 56 of these actions. For example, the Deputy Secretary of Defense approved a new Special Operations Policy and Oversight Council directive that identified the ASD-SO/LIC as the lead for that council. The Deputy Secretary of Defense also delegated the ASD-SO/LIC with authority to approve waivers to hire civilian personnel during a civilian hiring freeze. Although the office of the ASD-SO/LIC has taken many actions to implement section 922, DOD faces two key challenges in completing its implementation of the ASD-SO/LIC's new roles and responsibilities: Lack of time frames . As of February 2019, 28 out of 31 unimplemented actions associated with section 922 did not have clear time frames for implementation. According to ASD-SO/LIC and U.S. Special Operations Command (SOCOM) officials, they did not prioritize establishing time frames because they took an incremental approach to implementing actions and addressed them on a case-by-case basis. Without clear time frames for implementation, ASD-SO/LIC and SOCOM may be less effective in implementing section 922. Unclear guidance . Current guidance about ASD-SO/LIC responsibilities is outdated: for example, it states that the ASD-SO/LIC shall report directly to the Under Secretary of Defense for Policy. However, section 922 states that special operation forces-related administrative matters are managed directly by the Secretary of Defense to the ASD-SO/LIC. The special operations force enterprise is a complex system, and unless roles and responsibilities are clarified in guidance, other DOD stakeholders, such as the military services, may not know the extent of the ASD-SO/LIC's and SOCOM's authorities and responsibilities. DOD officials expressed some concerns that until these matters are clarified in guidance, it will remain unclear whether the ASD-SO/LIC and SOCOM should work together—for example, on personnel issues—and how their relationships with stakeholders with oversight authority will be managed. DOD partially concurred, and based on its comments, GAO modified one recommendation. The office of the ASD-SO/LIC has made efforts to develop a workforce plan, including commissioning a manpower study and taking steps to develop a hiring plan; however, these efforts do not fully incorporate some leading principles for a strategic workforce plan. For example, ASD-SO/LIC did not share the hiring plan with its staff, including key officials from the office of the ASD-SO/LIC and SOCOM. Without completing a comprehensive strategic workforce plan that includes key principles, the office of the ASD-SO/LIC may not know what gaps exist in skills and competencies in order to develop effective workforce strategies to fill those gaps. These issues could put the office of the ASD-SO/LIC at risk of hiring personnel who may not adequately meet its needs as defined by section 922. GAO is making three recommendations to DOD to establish time frames for section 922 actions; update applicable guidance to clarify roles and responsibilities for the ASD-SO/LIC and SOCOM; and develop a strategic workforce plan that incorporates key principles. DOD partially concurred with the recommendations and GAO continues to believe the recommendations are valid, as discussed in the report. GAO also modified one recommendation to address DOD concerns regarding its applicability.", "document_type": "gao"}
{"report": "Two State entities play key roles in education assistance in the West Bank and Gaza—State’s Bureau of Population, Refugees, and Migration (State/PRM) and State’s U.S. Consulate General in Jerusalem (State/ConGen). State/PRM has an important role in funding and overseeing education assistance provided by UNRWA in the West Bank and Gaza. State contributes funds to and manages the institutional relationship with UNRWA on behalf of the U.S. government, while recognizing UNRWA’s independence and commitment to upholding humanitarian principles, including neutrality. This relationship is guided by the U.S.-UNRWA Framework for Cooperation, annually negotiated between State/PRM and UNRWA. The framework includes UNRWA’s commitment to meet the condition on U.S. contributions to UNRWA that U.S. funds do not support terrorism, pursuant to section 301(c) of the Foreign Assistance Act of 1961, as amended. The framework also sets forth the activities used to evaluate UNRWA’s conformance with this condition. According to State/PRM officials, some educational materials fit into the framework’s section involving broader U.S. priorities for UNRWA’s education sector. For example, continuing support for mutually identified special projects such as UNRWA’s Human Rights, Conflict Resolution, and Tolerance education program in all of UNRWA’s five fields of operation fit into the latter category. UNRWA’s five fields of operations are the West Bank (including East Jerusalem), Gaza, Jordan, Lebanon, and Syria. The framework also defines U.S. priorities for UNRWA’s education sector. The frameworks for fiscal years 2016 and 2017 state, “The United States is particularly interested in ongoing curriculum review process, which enables UNRWA’s educators to use consistent criteria in analyzing and enriching local textbooks, in order to promote UN values and principles in UNRWA classrooms.” The Secretary of State is required under Section 7048(d) of the Department of State, Foreign Operations, and Related Programs Appropriations Acts for fiscal years 2015 and 2016 to submit a report in writing to the Committees on Appropriations not less than, and for fiscal year 2016 no later than, 45 days after enactment. Section 7048(d) of the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2017 states that this report must be submitted prior to initial obligation of funds. This report is to cover seven topics. One of the required topics in the report is whether UNRWA is taking steps to ensure that the content of all educational materials currently taught in UNRWA-administered schools and summer camps is consistent with the values of human rights, dignity, and tolerance, and does not induce incitement. State/ConGen also has a key role in funding and overseeing U.S. educational assistance. State/ConGen is responsible for the U.S. bilateral relationship with the Palestinian Authority, including efforts to combat incitement to violence and address problematic content in textbooks. In addition, according to the Consulate General’s Education Statement of Purpose, State/ConGen funds and implements education projects to improve the quality of education to equip Palestinians with the skills to grow their economy and build a democratic, secular, politically moderate, and outward-focused Palestinian civil society as a driver for peace. USAID funds education projects that support Palestinian Authority- administered schools, teacher and administrator training in the West Bank, and scholarships. USAID did not identify or address potentially problematic content in Palestinian Authority textbooks between fiscal years 2015 and 2017 because, according to USAID and State officials, reviewing textbooks is outside the scope of the work of USAID’s partners, including nongovernmental organizations, that implement projects in the West Bank and Gaza. USAID officials told us that they defer discussion of any potentially problematic content in textbooks to State as a bilateral policy issue. UNRWA is to provide humanitarian assistance to Palestine refugees in accordance with its mandate provided by the UN General Assembly. UNRWA provides education, health care, social services, microfinance, and emergency assistance to Palestine refugees; infrastructure and camp improvement within Palestine refugee camps; and protection. When UNRWA began operations in 1950, it was responding to the needs of about 860,000 Palestine refugees. UNRWA reports that over 5 million Palestine refugees are registered with UNRWA in the West Bank, Gaza, Jordan, Lebanon, and Syria and are currently eligible for its services. UNRWA administers its education system of more than 700 schools across its five fields of operation, educating approximately 526,000 children, according to UNRWA officials. This includes 370 schools in the West Bank and Gaza for grades 1 through 9 (and grade 10 in two East Jerusalem schools) serving over 300,000 children. UNRWA uses the curricula and textbooks of host governments. In keeping with this practice, UNRWA schools in the West Bank and Gaza use the Palestinian Authority curriculum and textbooks. This practice helps to ensure that UNRWA students can continue their education at government secondary schools and universities and can take national exams. According to UNRWA officials, using the host country curricula is also in line with good practice—affirmed by other UN agencies, such as United Nations High Commissioner for Refugees. The Palestinian Authority provides all textbooks used in UNRWA and Palestinian Authority schools in the West Bank and Gaza except for English language textbooks. Figure 1 shows an UNRWA girls’ school in Shufat refugee camp, located in East Jerusalem. Prior to the release of the first set of Palestinian Authority textbooks developed by the Palestinian Authority in 2000, schools in Gaza used Egyptian textbooks, and schools in the West Bank used Jordanian textbooks. The Palestinian Authority developed its first curriculum in the mid-1990s in cooperation with the United Nations Educational, Scientific and Cultural Organization. Since then, the Palestinian Authority has developed multi-year strategies to improve its educational system, including by modernizing its curriculum and improving its textbooks. The Palestinian Authority worked to implement its early strategies but could not fully do so because responding to other events took priority, according to Palestinian Authority documents. These events included the second Palestinian Intifada (uprising) that began in 2000, the government of Israel’s subsequent tightening of security, the rise of Hamas to power in the Palestinian government in 2006, and the resulting delays in donor funding. After donors resumed their support, the Palestinian Authority developed an education strategy for 2008 through 2012. This strategy’s stated goals include improving the quality of education by reviewing the curriculum and revising textbooks, among other things. Beginning in 2013 the Palestinian Authority undertook a multi-year effort to revise its curriculum and issue new textbooks to provide students with skills such as problem solving and analysis. As a result, the Palestinian Authority Ministry of Education and Higher Education issued new pilot textbooks for grades 1 through 4 in 2016 and 2017. The Palestinian Authority issued textbooks for the first semester of these grades in summer 2016 and textbooks for the second semester later in the year with the start of that semester. The Palestinian Authority issued the final textbooks for grades 1 through 4 and new pilot textbooks for grades 5 through 10 in 2017. As of August 2017, Palestinian Authority public schools and UNRWA schools in the West Bank and Gaza use these textbooks, according to State and UNRWA officials. Figure 2 shows examples of the pilot textbooks for grades 1 through 3. The U.S. government provided an estimated $243 million for education assistance in the West Bank and Gaza—State provided an estimated $193 million, and USAID provided about $50 million—for fiscal years 2015 through 2017, according to State and USAID data and UNRWA- provided information. Of State’s estimated $193 million contributions to education assistance in the West Bank and Gaza, UNRWA estimated that about $187 million went to its education assistance. State provided the remaining approximately $6 million to non-UNRWA education programs. UNRWA reported expending about $877 million for education in the West Bank and Gaza for fiscal years 2015 through 2017, including contributions from the United States and other donors. According to UNRWA officials, UNRWA used some of these funds to purchase English language textbooks that were used in UNRWA schools in the West Bank and Gaza. State, UNRWA, and USAID funds were not used to purchase or produce other textbooks used in the West Bank or Gaza, according to officials from these agencies. Of the estimated $243 million that the United States provided for education assistance in the West Bank and Gaza for fiscal years 2015 through 2017, State funded an estimated $193 million for UNRWA and non-UNRWA projects, according to State and UNRWA information. For UNRWA, State contributed an estimated $187 million for education in the West Bank and Gaza for fiscal years 2015 through 2017, out of a total contribution to UNRWA of about $1 billion for that timeframe. U.S. contributions support UNRWA’s core programs of education, health, relief and social services, microfinance, and infrastructure and camp improvement across its five fields of operation. State does not earmark the majority of its contributions to UNRWA’s program budget by either program area or field of operation. Rather, State contributes funds to UNRWA’s program budget, which UNRWA pools with contributions from other donors to provide general support to UNRWA’s core programs, according to State and UNRWA officials. State earmarks a small portion of its contributions to the program budget to support special projects of mutual priority to State and UNRWA, according to State officials. For each fiscal year from 2015 through 2017, State earmarked funds for the Human Rights, Conflict Resolution, and Tolerance project, an agency-wide, education-related project implemented in all five of UNRWA’s fields of operations, including in the West Bank and Gaza. UNRWA officials stated that UNRWA aims to support teachers in integrating human rights, conflict resolution, and tolerance into the regular curriculum. As part of its education reform, UNRWA developed a Human Rights, Conflict Resolution, and Tolerance Policy and Teacher Toolkit to further strengthen human rights education in UNRWA. According to UNRWA officials, UNRWA has built on international best practices to better integrate human rights education in all UNRWA schools. The United States exclusively funds the Human Rights, Conflict Resolution, and Tolerance project activities, according to State officials. UNRWA estimated expending about $0.3 million on the Human Rights, Conflict Resolution, and Tolerance project in the West Bank and Gaza for fiscal years 2015 through 2017. In addition to State’s funding for UNRWA, State’s U.S. Consulate General in Jerusalem (ConGen) officials said that State/ConGen provided about $6 million in funding for three non-UNRWA education programs focused on youth in grades 1 through 10 in the West Bank and Gaza for fiscal years 2015 through 2017. These three education programs include (1) a program that provides secondary school students in the West Bank and Gaza an opportunity to study at American high schools and live with American host families; (2) an afterschool English language program that targets academically gifted and economically disadvantaged high school students; and (3) a 2-week summer camp program for at-risk Palestinian youth ages 8 through 14 residing in refugee camps and other marginalized areas throughout the West Bank, Gaza, and Jerusalem. Of the estimated $243 million that the United States provided for education assistance in the West Bank and Gaza for fiscal years 2015 through 2017, USAID obligated about $50 million for active non- construction education projects for this timeframe, and it did not fund textbooks, according to USAID officials. USAID funds supported six education projects, of which four were scholarship projects. Two projects—the School Support Program and the Leadership and Teacher Development program—provided support directly to Palestinian Authority public schools in the West Bank. The School Support Program offers assistance to 50 schools, including infrastructure rehabilitation of schools, in-kind assistance (e.g., science lab equipment and school supplies), extracurricular activities (sports, arts and music, career counseling, and psychosocial support), and leadership and teacher development for the school administration. The Leadership and Teacher Development program supports teacher, principal, and supervisor training to make teaching and learning practices more learner-centered, in addition to the introduction of information technology in education (e.g., internet connectivity, equipment, teaching of coding), classroom assessment and testing methods, and administrative reform at the school, district, and central levels. According to UNRWA-provided information, UNRWA expended about $877 million on education for fiscal years 2015 through 2017 in the West Bank and Gaza with funds from the United States and other donors. These funds were expended for UNRWA’s education program, including the purchase of English language textbooks and other educational materials. Of the approximately $877 million UNRWA reported expending on education, it expended about $671 million for education in Gaza and $206 million for education in the West Bank. UNRWA’s expenditures for Gaza are significantly higher because, as of June 30, 2017, UNRWA operated 275 schools in Gaza serving approximately 270,000 students compared to 95 schools in the West Bank serving approximately 48,000 students. UNRWA’s largest reported expenditure within the education sector in fiscal years 2015 and 2016 was personnel-related expenditures, which represented about 85 percent of all education expenditures, according to UNRWA. Between fiscal years 2015 and 2017, including estimated expenditures in 2017, UNRWA reported that it expended about $2 million on educational materials—including about $1 million on English language textbooks for fiscal years 2015 through 2017 for UNRWA schools in the West Bank and Gaza. Of the approximately $1 million expended on English language textbooks, UNRWA estimates that the U.S. contributions totaled about $587,369, with about $28,763 for the West Bank and about $558,606 for Gaza. Educational materials made up less than one percent of UNRWA’s reported education expenditures in the West Bank and Gaza in part because UNRWA does not purchase or fund textbooks for use in its schools in the West Bank and Gaza, with the exception of English language textbooks. The Palestinian Authority provides UNRWA with textbooks for all but one academic subject (English) as an in-kind contribution, according to UNRWA officials. As such, U.S. funds do not contribute to the textbooks that are published by the Palestinian Authority, according to UNRWA information. However, to purchase English language textbooks used in Gaza, UNRWA sent payment from its program budget, which includes commingled donor funds, directly to the Palestinian Authority Ministry of Education and Higher Education, for which they subsequently paid a private publisher. According to information provided by UNRWA, doing so lowered the per unit cost through bulk ordering. According to UNRWA, UNRWA staff work on complementary teaching materials—educational materials that UNRWA develops to use alongside host government textbooks, as part of their regular course of work. They also work on student summer learning materials based on the textbooks. Therefore, the expenditures for these materials cannot be disaggregated from staff wages and salaries and are not included in UNRWA’s expenditures for educational materials. UNRWA has reviewed Palestinian Authority textbooks for the first semester of grades 1 through 10 to identify content it deemed not aligned with UN values and has developed complementary teaching materials to address this content when considered necessary. However, UNRWA did not train teachers on the materials or distribute materials to classrooms; as a result, these materials were not used in UNRWA classrooms. Since at least 2015, State has used several means to identify and address Palestinian Authority textbook content it deemed problematic, including examining nongovernmental organizations’ allegations about problematic Palestinian Authority textbook content, engaging with Palestinian Authority officials, and monitoring UNRWA’s efforts. UNRWA reported that it had reviewed 111 textbooks used in its West Bank and Gaza schools during three sessions since 2016 to identify content it deemed not aligned with UN values. UNRWA reported that it had developed specific complementary teaching materials for any page identified to address this content following each of the reviews. In addition, UNRWA reported that it had trained some field-level education staff but had not trained teachers on the materials or distributed materials to classrooms for several reasons including staff refusal to attend training and workshops. UNRWA reported that it reviewed the Palestinian Authority and English language textbooks in part based on the values contained in its Framework for the Analysis and Quality Implementation of the Curriculum (Curriculum Framework), through which UNRWA aims to ensure that the curricula taught in its schools reflect UN values, such as neutrality, tolerance, equality, and nondiscrimination, and human rights with regard to race, gender, language, and religion. However, UNRWA explained that, given the urgency of reviewing any newly issued textbooks, it developed a “rapid review” process. Appendix II provides an overview of the Curriculum Framework and rapid review processes. UNRWA reported conducting three rapid reviews of all newly released Palestinian Authority textbooks since 2016, in each case using the rapid review criteria as a guide: beginning in October 2016, for textbooks for the first semester of grades 1 through 4; beginning in January 2017, for textbooks for the second semester of grades 1 through 4; and beginning in August 2017, for all textbooks used in UNRWA schools for the first semester of grades 1 through 10. UNRWA slightly revised the criteria used over the course of its three rapid reviews. UNRWA officials noted that for the first rapid review, they reviewed textbooks to determine if the textbooks were aligned with UN values and the UN commitment to neutrality. For the second rapid review, UNRWA developed three criteria: (1) neutrality/bias, (2) gender, and (3) aggressiveness. For the third rapid review, UNRWA renamed the criterion of aggressiveness to age-appropriateness to better reflect the types of issues it was intended to capture. The criteria for the third rapid review are 1. neutrality/bias: taking sides or engaging in controversies of a political, racial, religious, or ideological nature 2. gender: gender stereotypes 3. age-appropriateness (formerly aggressiveness): content that is violent, frightening, or inappropriate for the student’s age. Appendixes II and III provide more detail on UNRWA’s textbook reviews. In fall 2017, UNRWA reported to donors that, based on its rapid review criteria, its August 2017 review identified issues on 3.1 percent of the pages in the 75 textbooks for the first semester of grades 1 through 10 used during the school year 2017-2018. In particular, UNRWA identified 203 issues covering a total of 229 pages (out of a total of 7,498 pages reviewed), the majority of which they identified as related to neutrality/bias. According to UNRWA-provided information, UNRWA found no cases of incitement to violence in the Palestinian Authority grades 1 through 10 textbooks during the August 2017 rapid review. More than half of the neutrality/bias issues it found were related to one of the following three categories—maps, Jerusalem, and cities—for example, regional maps that exclude Israel and refer to Israeli cities as Palestinian. Additional details about the issues UNRWA identified and the complementary teaching materials it developed have been omitted from this report because the information is classified. In addition to issues UNRWA identified using the three rapid review criteria, it identified positive attributes in the textbooks newly issued by the Palestinian Authority, such as promoting active learning, life skills, gender equality, higher-order thinking, and problem-solving skills, according to UNRWA officials. For the content that UNRWA identified as not aligned with UN values during all three rapid reviews, UNRWA officials reported that they developed specific complementary teaching materials for any page with issues identified, such as alternate photos, examples, and guidance for teachers, as needed, to use with the textbooks in UNRWA schools. UNRWA also developed training guides and presentations to support training on the complementary teaching materials for each of the reviews. According to UNRWA, it developed these materials to ensure that the lessons taught in UNRWA schools adhere to UN core values, such as neutrality. In addition, UNRWA officials reported that they trained some field-level education officials but were not able to train teachers or distribute materials to classrooms. UNRWA officials told us that UNRWA did not change the content of Palestinian Authority textbooks and that they do not have the authority or mandate to do so. UNRWA developed complementary teaching materials to address the following issues it identified, among others, during its rapid review process of pilot textbooks for the second semester of grades 1 through 4 textbooks. Details about these complementary teaching materials were omitted because the information is classified. For details about the issues UNRWA addressed, see appendix IV. UNRWA officials told us that as of April 2018 they have reviewed all textbooks for the second semester of grades 1 through 10. UNRWA did not train teachers or complete distributing complementary teaching materials after its first rapid review for several reasons. In a January 2017 briefing note to the United States and other donors, UNRWA reported that it had completed training for professional support staff on the complementary teaching materials for the pilot textbooks for the first semester of grades 1 through 4. However, UNRWA officials told us that UNRWA was not able to deliver the training for school staff, including principals or teachers, or disseminate these materials to classrooms before the end of the first semester of the 2016-2017 school year. They noted that this was due to collective employment actions between August 2016 and January 2017, including staff walkouts and a refusal to attend training and workshops, that were unrelated to the curriculum reform and having to complete the school exam period immediately following the resolution of these collective employment actions. For similar reasons, UNRWA was unable to distribute materials or train teachers after the second rapid review of pilot textbooks for the second semester of the 2016-2017 school year. UNRWA reported to the United States and other donors in March 2017 that it anticipated completing training on the complementary teaching materials for all professional support staff and teachers by the end of that month in the West Bank and by the end of the following month in Gaza, according to State/PRM officials. However, UNRWA officials told us that UNRWA halted the training following a Palestinian Authority announcement of suspension of ties with UNRWA in response to UNRWA’s use of complementary teaching materials, and the UNRWA staff union reactions. UNRWA then determined that these materials would be outdated because the Palestinian Authority planned to issue revised textbooks in August 2017, before the start of the new school year. UNRWA’s efforts to train teachers and issue complementary teaching materials as a result of the third rapid review were ongoing as of December 2017. As of that date, UNRWA officials told us that UNRWA had finalized the complementary teaching materials for the final textbooks for the first semester of grades 1 through 4 and pilot textbooks for grades 5 through 10, as well as the English Language textbooks for the first semester of grades 1 through 10, all of which are being used during the 2017-2018 school year. UNRWA officials told us that UNRWA has developed training materials for the final textbooks for first semester grades 1 through 4 and pilot textbooks for grades 5 through 10 and planned to begin training of all relevant professional support staff, who will, in turn, train teachers using a cascaded training model. In addition, UNRWA officials reported sharing the complementary teaching materials in PDF format with field education staff in the West Bank and Gaza for distribution to all teachers. However, in commenting on a draft report, UNRWA officials told us in April 2018 that they did not disseminate the training or the complementary teaching materials for the third rapid review for various reasons. For example, some UNRWA staff opposed the use of these materials in classrooms while other staff boycotted the training. In addition, UNRWA faced deteriorating operational and political environments during that time period, such as financial shortfalls, as well as an increased number of violent confrontations between Palestinians and Israeli Security forces in the West Bank and Gaza. According to UNRWA, these factors heightened sensitivities and risks associated with the training and curriculum enrichment materials. As a result, these materials were not used in UNRWA classrooms. To promote appropriate content in Palestinian Authority textbooks, State/ConGen officials have examined nongovernmental organizations’ studies and allegations about potentially problematic Palestinian Authority textbook content and confirmed instances of problematic material since fiscal year 2015. State/ConGen officials told us that the studies they reviewed raised concerns with a range of content, and they will continue their reviews of these studies in the future. In examining Palestinian Authority textbooks, State/ConGen has found material that ignores Israeli narratives, includes militaristic and adversarial imagery, and preaches the values of resistance, according to State officials. Although according to State officials there has been a general agreement in these studies on the absence of anti-Semitic content or explicit incitement to violence in Palestinian Authority textbooks, State/ConGen nonetheless has confirmed instances of inappropriate language, content, and imagery based on the grade level of certain textbooks. State/ConGen also noted that the textbooks do not mention Israel or Judaism, and they continue to include regional maps that exclude Israel. In response to allegations that two textbooks in particular—the National and Social Education (civics) textbooks for grades 3 and 4—contained problematic content, State/ConGen officials reported that they translated them into English and then analyzed two new pilot civics textbooks for grade 4 for the first and second semesters as well as previous versions of the same books and contracted for an external review of the textbooks. State/ConGen officials selected these textbooks for translation and analysis to examine a smaller subset of material reviewed in one independent study. State/ConGen officials told us in September 2017 that they had received the results of the external review and that these results informed their advocacy efforts and provided external perspective on additional material. To address incitement to violence, such as the inclusion of problematic content in textbooks, State/ConGen officials have engaged the highest levels of the Palestinian Authority officials, according to State officials. State/ConGen officials reported that, since 2015, they have encouraged Palestinian officials during these meetings to address incitement to violence in textbooks, and Palestinian officials have done so. Officials also noted that the Palestinian Authority President has publicly condemned incitement to violence and vowed to combat it. A case study of a particularly problematic lesson illustrates State/ConGen’s role and approach. State/ConGen officials reported that a specific math problem using the number of Palestinian casualties in the First and Second Intifadas (uprisings) was clearly objectionable even if it did not demonstrate a call for violence against Israel. The Consulate and Consul General subsequently raised this concern with Palestinian officials, including the Minister of Education. To discuss the Palestinian Authority’s ongoing textbook reform and address potential concerns, State/ConGen officials reported that they also convened a meeting in April 2017 of international donor groups and members of the international community that participate in the Palestinian-led Education Sector Working Group. A State official said that the group conducted a wide-ranging discussion about incitement to violence and agreed to discuss incitement bilaterally with the Palestinian Authority as appropriate. State/ConGen continued to raise the issue with the Palestinian Authority following the meeting. In accordance with State/PRM’s role in monitoring UNRWA’s efforts to identify and address potentially problematic content in Palestinian Authority textbooks, State/PRM reports that it engages regularly with UNRWA. It does so through reviews of UNRWA reports, site visits to UNRWA schools and classrooms when and where security permits, regular communication with UNRWA staff at UNRWA headquarters and in the field, and by attending UNRWA’s briefings on the status of its textbook reviews. In addition, State/PRM officials aim to ensure that UNRWA takes adequate steps to ensure neutrality in UNRWA’s operations. To do so, State/PRM meets regularly with UNRWA officials to ensure that UNRWA operates in a fully neutral way in line with UN standards across all sectors of operation, including education and content of textbooks. State/PRM submitted annual reports to Congress in response to provisions in the annual appropriations acts for fiscal years 2015, 2016, and 2017; however, these reports have several limitations regarding educational assistance. First, we found that State/PRM’s 2017 report inaccurately described certain UNRWA actions to address textbook content not aligned with UN values. Inaccurate information about UNRWA’s actions could limit the transparency of State’s and UNRWA’s activities and the usefulness of State’s reports as tools for congressional decision making and oversight. Second, while State’s reports explain generally how UNRWA is taking steps to ensure that educational materials in UNRWA schools are consistent with certain values, we found that the reports did not include some information about UNRWA’s textbook review that could be useful for congressional oversight. Specifically, State’s reports did not specify whether the educational materials are consistent with the value of dignity or not inducing incitement. In addition, we found that in its 2017 report, State did not include information provided by UNRWA about the nature and extent of content that UNRWA identified in Palestinian Authority textbooks as not aligned with UN values. This information, while not required by law to be included in State’s reports, could be useful to congressional decision- makers. State submitted reports to Congress each year in a timely manner in accordance with the requirements of the appropriations acts. In the annual appropriations acts for fiscal years 2015 through 2017, Congress required State to report on seven different topics, including whether UNRWA is taking steps to ensure that the content of all educational materials taught in UNRWA schools and summer camps is consistent with the values of human rights, dignity, and tolerance, and does not induce incitement. State’s reports explain that UNRWA applied its Curriculum Framework in reviewing textbook content and that the Curriculum Framework will help ensure all materials used in UNRWA classrooms reflect UN values and principles. These UN values address issues related to neutrality, human rights, tolerance, and non-discrimination. These values are aligned with the ones that are included in the laws, according to State officials. However, we found that State’s 2017 report to Congress inaccurately described some of UNRWA’s actions to address content that is not aligned with UN values. State correctly reported that UNRWA completed several actions related to its second rapid review, including that UNRWA reviewed 18 new Palestinian Authority pilot textbooks, with a particular focus on the issues of neutrality and bias, gender, and aggressiveness. However, State reported that UNRWA trained teachers on the application of the complementary teaching materials they developed and disseminated the materials to classrooms, actions that UNRWA officials told us they did not complete. State/PRM officials stated they became aware that UNRWA’s classroom training and dissemination of complementary teaching materials had been delayed in June 2017, after the school year ended and after submitting the report to Congress in May 2017. State/PRM officials stated that, based on conversations they had with UNRWA during tense discussions between UNRWA and the Palestinian Authority in March and April 2017, they believed UNRWA would train teachers and disseminate complementary teaching materials after the tensions dissipated. These officials said they did not provide the congressional report to UNRWA for it to review because it is considered an internal U.S. government document. While State/PRM officials stated they verified facts related to other aspects of the reporting requirement, they did not verify the implementation of training and dissemination of complementary teaching materials because they believed this information to be current given ongoing dialogue with UNRWA. In addition, State/PRM officials told us that they were not aware of the inaccuracy in their report to Congress until we brought it to their attention, although they were aware that the trainings had not been implemented in June 2017. In November 2017—about 6 months after the 2016-2017 school year ended—State/PRM officials told us that their understanding remained that UNRWA had trained some education staff on the application of the complementary teaching materials, though not all teachers, and that UNRWA had disseminated the materials to some education staff and schools, though not to all classrooms. From State’s perspective, the statement in its report to Congress about UNRWA training teachers and disseminating complementary teaching material was partly accurate. However, UNRWA officials confirmed that they did not disseminate the training or the complementary teaching materials related to the second rapid review to any school staff, including principals and teachers. In October 2017, State noted that it has taken, or plans to take, action to address the accuracy of reporting in the future. First, subsequent to learning that the training had been halted in June 2017, State/PRM officials reiterated to UNRWA the need to keep them informed in a timely manner when the situation in the field shifts with regard to textbooks and other issues. State/PRM officials also said that they would likely avoid misreporting facts in the future by taking additional actions, such as including specific dates of the actions taken in their reports and verifying key facts with UNRWA. Further, they said they plan to address the issue of inaccuracy in the fiscal year 2018 report, if needed. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. Incomplete and inaccurate information about UNRWA’s actions could limit the transparency of UNRWA’s activities and usefulness of State’s reports as tools for congressional decisionmaking and oversight. Our analysis also showed that State’s required reports did not include some information that could be useful for congressional oversight of whether UNRWA is taking steps to ensure that all the content of all educational materials currently taught in UNRWA schools and summer camps is consistent with the values of human rights, dignity, and tolerance, and does not induce incitement. In particular, our analysis showed that while State’s reports partly explain how certain educational materials are consistent with two elements included in the law (human rights and tolerance), they do not address the other two elements (dignity and not inducing incitement). In addition, State’s reports do not include details about the nature and extent of content UNRWA identified in Palestinian Authority textbooks as not aligned with UN values. State’s reports for all 3 years partly explain how certain educational materials are consistent with the values of human rights and tolerance but do not specifically say whether the Palestinian Authority textbooks are consistent with these values. In particular, the reports discuss the U.S.- funded Human Rights, Conflict Resolution, and Tolerance project and accompanying teacher toolkit. The toolkit aims to ensure that teachers have the skills and resources to implement human rights education across UNRWA classrooms. The reports note that in Gaza, UNRWA students use a dedicated human rights curriculum anchored in the Universal Declaration of Human Rights. While the Human Rights, Conflict Resolution, and Tolerance project is relevant to the congressional reporting requirement, it is supplemental to the Palestinian Authority textbooks—the core educational materials used in UNRWA’s schools. State’s reports do not discuss whether these Palestinian Authority textbooks are consistent with the values of human rights and tolerance. Moreover, none of State’s reports for these 3 years explicitly state that the UN values UNRWA applied in reviewing textbooks encompass the value of dignity or not inducing incitement. State/PRM officials said that these topics are addressed implicitly, in that the value of “dignity” is encompassed by the concepts of human rights and non-discrimination, which are among the elements encapsulated by the “UN values” applied as part of the Curriculum Framework. State/PRM officials further assert that reporting to Congress on UNRWA’s application of “UN values” via the Curriculum Framework necessarily encompasses the concept of non- inducement of incitement. In State’s view, materials reviewed through the lens of UN values and principles as defined by the UN imply that such review is taking into consideration whether the materials include incitement to violence. However, State did not include language about dignity or not inducing incitement explicitly in its reports to Congress. Regarding the nature and extent of content UNRWA identified in Palestinian Authority textbooks as not aligned with UN values, State did not include details provided by UNRWA about UNRWA’s reviews of Palestinian Authority textbooks in its May 2017 report to Congress that, while not required by law to be included in State’s reports, could be helpful for congressional oversight. The May 2017 report states that UNRWA reviewed pilot textbooks for the first and second semesters of grades 1 through 4 and identified a “limited amount of problematic content in the Palestinian Authority materials.” However, State’s report did not cite the percentage of all pages UNRWA deemed as including content not aligned with UN values, the percentage of issues UNRWA identified in relation to each of the three rapid review criteria, or examples of such content (e.g., frightening pictures that they considered inappropriate for children), which UNRWA had reported to State/PRM and other donors at least 2 months earlier. We have previously reported that agencies should consider the differing information needs of various users to ensure that performance information will be useful in decision making. Standards for Internal Control in the Federal Government states that information should be communicated in a way that is useful to internal and external users. Less thorough information in State’s annual reporting could limit its usefulness as a tool for congressional oversight. In addition, the lack of certain relevant information may limit Congress’ ability to fully assess the nature and extent of material that may not be aligned with UN values in Palestinian Authority textbooks. The United States has funded education for Palestinian children for decades, including an estimated $243 million for fiscal years 2015 through 2017. State funds education projects to improve the quality of education to equip Palestinians with the skills to grow their economy and build a democratic, secular, politically moderate, and outward-focused Palestinian civil society as a driver for peace, according to the Consulate General’s Education Statement of Purpose. Congress remains interested in the role UNRWA plays in educating children under its purview, requiring State to report on steps UNRWA is taking to ensure that the content of all educational materials currently taught in UNRWA- administered schools is consistent with the values of human rights, dignity, and tolerance, and that those materials do not induce incitement. State’s 2017 report inaccurately describes certain UNRWA actions to address content not aligned with UN values. In addition, State’s reports to Congress did not specify whether the educational materials used in UNRWA schools are consistent with the value of dignity or not inducing incitement. Although State’s reports generally discuss whether UNRWA is taking certain steps, the lack of certain relevant information in State’s reports could limit their usefulness as a tool for congressional decision making and oversight. Accurate and complete information would help Congress more fully understand and assess the nature and extent of content in textbooks that is not aligned with UN values, as well as UNRWA’s actions to address this content. We are making the following four recommendations that could further enhance State’s annual reports to Congress: The Secretary of State should direct the Assistant Secretary for Population, Refugees, and Migration to establish a process to ensure that State’s reporting to Congress on the actions UNRWA has taken is accurate. (Recommendation 1) The Secretary of State should direct the Assistant Secretary for Population, Refugees, and Migration to provide information in its reports to Congress that could be useful for congressional oversight, including information that: discusses whether Palestinian Authority textbooks used in UNRWA schools are found to be consistent by UNRWA with the values of human rights and tolerance. (Recommendation 2) explicitly states whether the UN values UNRWA applied as part of the Curriculum Framework encompass dignity and do not induce incitement. (Recommendation 3) describes the nature and extent of textbook content that UNRWA identified as not aligned with UN values, including in the English language textbooks purchased by UNRWA. (Recommendation 4) We provided a draft of our April 2018 classified report to State and USAID for comment. We also provided UNRWA with relevant information for comment. In response, State and UNRWA provided written comments on the classified report. We have reprinted State’s updated written comments in appendix V and UNRWA’s original written comments in appendix VI. All three also provided technical comments, which we incorporated as appropriate throughout our report. In its written comments on this report, State noted that it has implemented all four of our recommendations contained in the classified report we issued in April 2018. To ensure the accuracy of information in its reports, State has developed standard operating procedures for drafting and verifying the information contained in its annual report to Congress on UNRWA, including clearly sourcing all information contained in the report and seeking written verification from UNRWA on any information previously obtained via oral communication. State implemented our recommendation that it discuss whether Palestinian Authority textbooks used in UNRWA schools are found to be consistent by UNRWA with the values of human rights and tolerance. State included additional qualitative details from UNRWA on its evaluation of the Palestinian Authority materials, and the degree to which UNRWA assesses that these materials are consistent with human rights and tolerance. State implemented the recommendation to explicitly state in its reports to Congress whether the UN values UNRWA applied as part of the Curriculum Framework encompass dignity and do not induce incitement. In addition, State implemented the recommendation to describe the nature and extent of textbook content that UNRWA identified as not aligned with UN values, including in the English language textbooks purchased by UNRWA. State provided additional qualitative and quantitative details from UNRWA’s evaluation of Palestinian Authority textbooks in its fiscal year 2018 report based on information provided by UNRWA. In its written comments, UNRWA said, among other things, that while using the curricula and textbooks of host nations, UNRWA’s education program strives to realize the potential of all its Palestine refugee students, to help them develop into confident, innovative, questioning, thoughtful, tolerant and open-minded critical thinkers, who uphold human values and tolerance, and contribute positively to the development of their society and the global community. In addition, UNRWA noted that it appreciates our understanding of the role of the Curriculum Framework and how UNRWA takes specific measures to rapidly review newly issued textbooks, including the large number of new textbooks released by the Palestinian Authority Ministry of Education and Higher Education throughout 2016 and 2017. UNRWA also commented that while it does not have authority to determine or alter national curricula, UNRWA is committed to taking all measures within its control to ensure that the delivery of its educational services is fully aligned with the values of the United Nations. UNRWA did not comment on our recommendations, since they were not directed to UNRWA. We are sending copies of this product to the appropriate congressional committees, as well as the Secretary of State, the Administrator of USAID, the Commissioner-General of UNRWA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9601 or melitot@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. This report examines (1) the amount of funding Department of State (State) and U.S. Agency for International Development (USAID) provided for education assistance to the West Bank and Gaza for fiscal years 2015 through 2017 and how it was used; (2) how the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) and State have identified and addressed potentially problematic content in educational materials used by schools in the West Bank and Gaza; and (3) whether State has submitted required annual reports to Congress including information on whether UNRWA is taking steps to ensure that the content of all educational materials currently taught in UNRWA- administered schools is consistent with the values of human rights, dignity, and tolerance, and do not induce incitement. To determine which U.S. government agencies provide education assistance for the West Bank and Gaza, we reviewed documents and conducted interviews with State, USAID, and the Overseas Private Investment Corporation (OPIC). We initially conducted an interview with OPIC because it was included in a previous report we issued on a similar topic. We excluded OPIC from the scope of this engagement because they did not provide relevant education assistance to the West Bank or Gaza between fiscal years 2015 and 2017. We focused our review on State and USAID because these agencies provided education assistance to the West Bank and Gaza during this timeframe. For this review, we refer to State and USAID when we refer to the U.S. government. To examine the amounts of funding State and USAID provided for education assistance to the West Bank and Gaza and how it was used for fiscal years 2015 through 2017, we took the following steps. We examined actual funding where it was available and estimated funding where it was not. We obtained and analyzed financial data from State and USAID and expenditure data from UNRWA for education assistance to the West Bank and Gaza in fiscal years 2015 through 2017. We used these data to describe how much and for what types of activities State contributed funds to UNRWA. We also obtained and analyzed expenditure and contributions data from State and obligations data from USAID to describe non-UNRWA education programs that they administered in the West Bank and Gaza. We reported the amount of funds UNRWA expended in general on education in the West Bank and Gaza, including the amounts that UNRWA expended on educational materials and specifically on textbooks. We define educational materials to primarily include curriculum, textbooks, select videos and web-based tools, and any complementary teaching materials, including those developed by UNRWA that aim to supplement, replace, or mitigate materials that UNRWA deems not aligned with UN values. We exclude posters, library books, educational technology, education administration materials, extracurricular materials, handouts and worksheets, and teacher training materials, with limited exceptions, from materials produced by UNRWA and used to mitigate material that UNRWA deemed not aligned with UN values or to supplement the curriculum. According to UNRWA officials, the financial information they provided pertains to educational materials, including textbooks, complementary teaching materials, and costs related to an interactive learning portal in Gaza and UNRWA TV. Finally, we reported the amount of funds USAID obligated for education programs in the West Bank and Gaza during this timeframe. To analyze these data, we reviewed State-UNRWA contribution agreements, State reports on UNRWA emergency appeals expenditures, and USAID award documents. We examined the two types of funding that State contributed to UNRWA—program budget funding and emergency appeals. We also examined the three ways in which UNRWA expends that funding—through program budget expenditures, emergency appeals expenditures, and special project expenditures. We supplemented these data by interviewing State, UNRWA, and USAID officials about funding. While the majority of UNRWA data are actual expenditures, some UNRWA data are estimates. According to UNRWA officials, they estimated all UNRWA expenditure data for fiscal year 2017 because, as of December 2017, when we finished collecting data, UNRWA’s 2017 fiscal year was ongoing. In addition, UNRWA estimated its education expenditures provided by the United States because U.S. contributions to UNRWA are generally not earmarked. Rather, UNRWA’s core budget, its program budget, pools funding from all UNRWA donors. For this reason, we reported all UNRWA expenditure data on education assistance based on information UNRWA officials provided us. To make these estimates, UNRWA officials informed us that they calculated U.S. funding as a proportion of all UNRWA funding, and applied that proportion to their educational expenditures. Data on State’s contributions to UNRWA and USAID’s funding to education programs in the West Bank and Gaza active between fiscal years 2015 and 2017 are obligations; according to State, all funds disbursed to UNRWA were through contributions. Data on State’s funding for non-UNRWA education programs are expenditures. For the purposes of this report, we use the U.S. fiscal year (October 1 through September 30) for all State and USAID contributions data, while we use UNRWA’s fiscal year (January 1 through December 31) for all UNRWA expenditure data. In addition, State and USAID awarded several grants for additional years not included in our scope. For example, the USAID’s first obligation to the Leadership and Teacher Development program occurred in fiscal year 2011 and the latest obligation to that program occurred in fiscal year 2017. As a result, the data presented in this report may include additional contributions of funds beyond what State and USAID obligated for fiscal years 2015 through 2017. To determine the reliability of the obligations and expenditure data, we requested information from State, UNRWA, and USAID officials regarding the processes they used to collect and verify data, and we checked the data for reasonableness and completeness. When we found discrepancies or missing data fields, we worked with relevant agency officials to correct the discrepancies and missing fields. We compared State’s contribution data with UNRWA’s expenditure data to ensure consistency. We discussed UNRWA’s financial data for educational expenditures with knowledgeable officials, reviewed audited financial statements for confirmation, and reviewed vouchers they provided. However, we did not independently audit their financial data. To ensure completeness of the data, we reviewed initial grant documents or contribution agreements and all associated amendments for the (1) six education projects USAID funded in the West Bank and Gaza, and (2) annual UNRWA contributions State made between fiscal years 2015 and 2017. We discussed UNRWA’s procedures for estimating the proportion of U.S. funds that went to educational expenditures with knowledgeable officials. Based on our initial assessments of the data, we determined that the State and USAID funding data we collected were sufficiently reliable for the purposes of this report. In addition, we determined that the actual expenditure data we collected from UNRWA were sufficiently reliable for our purposes, and that the estimated expenditures it provided were reasonable for the purposes of this review. (To examine how UNRWA and State have identified and addressed potentially problematic content in educational materials used by schools in the West Bank and Gaza, we reviewed the policies and procedures that UNRWA and State have established and implemented. We focused on actions agencies took in response to the (1) pilot textbooks for grades 1 through 4 that the Palestinian Authority issued in 2016 and that UNRWA used during the 2016-2017 school year; (2) final textbooks for grades 1 through 4, and pilot textbooks for grades 5 through 10 the Palestinian Authority issued in in 2017 and used during the first semester of the 2017-2018 school year; and (3) English language textbooks that UNRWA and the Palestinian Authority purchased for grades 1 through 10 published in 2011 through 2014 and used during the 2017-2018 school year. According to UNRWA officials, these textbooks do not include the second semester Palestinian Authority textbooks for the 2017-2018 school year (released in late 2017) and the second semester English language textbooks, and therefore do not cover all the textbooks used in UNRWA and Palestinian Authority schools for grades 1 through 10. We examined how UNRWA and State have implemented their policies and procedures. We reviewed State’s cables and agencies’ policy documents and reports and met with officials from State, UNRWA, and USAID in Washington, D.C., and overseas. In addition, we interviewed international donors overseas and officials from the government of Israel, the Palestinian Authority, and Jerusalem municipality. We only interviewed official government entities and public international organizations and did not meet with non-governmental interest groups. We followed up with relevant officials on multiple occasions to assess the progress of textbook review and the status of implementation of other policies and procedures. We interviewed UNRWA officials about the methods they used to conduct the rapid reviews of textbook content and reviewed documents they provided that outline their procedures. While the methods and procedures described seemed generally reasonable, we did not independently review UNWRA’s underlying documents to fully assess the reliability of the rapid review results it reported because UNRWA is an international organization. Moreover, it was beyond the scope of our review to examine the underlying documents and textbooks themselves, most of which are written in Arabic. There can be a number of challenges to analyzing and coding content as UNRWA did in its rapid reviews, such as the need for those performing the review to exercise judgment, and while the overall process officials outlined generally appeared reasonable, we cannot comment on the extent to which it successfully overcame all of the potential challenges. We are presenting the results of the textbook reviews, attributed to UNRWA, to help support our finding that the agency has developed procedures to review textbooks, and that it found some concerns in its recent reviews. In addition, we are providing details about these reviews for context because the State Department summarized the results of the first two reviews in its May 2017 report to Congress, which we discuss in the third section of this report. This report is a public version of a classified report that we issued in April 2018. The Department of State deemed some of the information in our April 2018 report to be classified, which must be protected from loss, compromise, or inadvertent disclosure. Therefore, this report omits classified information about neutrality/bias, gender issues, and other textbook content identified in English language textbooks by UNRWA as not aligned with UN values. Although the information provided in this report is more limited, the report addresses the same objectives as the classified report and uses the same methodology. To examine whether State has submitted required annual reports to congressional committees, including information on whether UNRWA is taking steps to ensure that the content of all educational materials currently taught is consistent with the UN values of human rights, dignity, and tolerance, and do not induce incitement, we took the following steps. We reviewed the legal requirements for State to report on the steps UNRWA is taking to ensure that the content of all educational materials currently taught is consistent with the UN values. These requirements are found in the annual appropriations acts; for fiscal year 2017, the requirement is located in Section 7048(d)(5) of the Consolidated Appropriations Act, 2017. We reviewed State’s reports to Congress in 2015, 2016, and 2017, and compared data State reported regarding education assistance with data we gathered through meetings with State and UNRWA officials in in Washington, D.C., and overseas. We also reviewed UNRWA documents. The performance audit upon which this report is based was conducted from January 2017 to April 2018 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with State from February 2019 to June 2019 to prepare this unclassified version of the original classified report for public release. This public version was also prepared in accordance with these standards. UNRWA’s Framework for Analysis and Quality Implementation of the Curriculum (Curriculum Framework) provides the overarching structure for the review and enrichment of educational materials used in UNRWA schools in all of its fields of operation, including the West Bank and Gaza. The Curriculum Framework, developed as part of UNRWA’s education reform process, aims to ensure that the curricula taught in its schools support the development of skills and competencies that are considered important for individual development in the 21st century. In addition, the Curriculum Framework aims to ensure that the delivery of the host country’s curriculum reflects UN values, such as neutrality, tolerance, equality, and nondiscrimination, and human rights with regard to race, gender, language, and religion as well as the development of respect for a child’s own cultural identity, language, and values in line with UN values. According to UNRWA officials, neutrality is one of the four “humanitarian principles” formally adopted by the UN General Assembly and endorsed by UNRWA and is a core obligation and value of UN staff as spelled out in the UN’s regulatory framework. According to UN humanitarian principles, the concept of neutrality means that, irrespective of their personal beliefs and opinions, “umanitarian actors must not take sides in hostilities or engage in controversies of a political, racial, religious or ideological nature.” The Curriculum Framework includes 10 Curriculum Framework principles and five student competencies against which UNRWA reviews educational materials used in its schools: Principle 1—Focuses on understanding and application and not just memorization Principle 2—Is active, practical, and encourages independent thinking Principle 3—Is relevant to students’ lives and situation, particularly as Principle 4—Provides a variety of teaching and learning approaches Principle 5—Integrates learning and emphasizes connections to other Principle 6—Is inclusive and provides learning opportunities for Principle 7—Provides for students’ personal development and well- Principle 8—Is free of biases (such as gender, disabilities, and ethnicity) Principle 9—Enables students to value their Palestinian culture, Principle 10—Reflects UN values Curriculum Framework Student Competencies: 1. Critical and creative thinking 3. Communication and literacy UNRWA’s Curriculum Framework includes tools to guide the analysis and review of host country textbooks and other learning material at the school and field levels, and remains the overarching framework for the review and enrichment of educational materials used in UNRWA schools agency-wide. However, given the urgency of reviewing any newly issued textbooks for use during the 2016-2017 school year, UNRWA developed a rapid review process. The rapid review process does not replace the Curriculum Framework process, as the Palestinian Authority textbooks reviewed through the rapid review process are also subject to the regular Curriculum Framework review process at the field and school levels, as follows: At the field level, field education staff are to use the Field-Level Analysis Tool of the Curriculum Framework to review textbooks against all five student competencies and 10 principles of the Curriculum Framework. At the school level, all UNRWA teachers and school principals in the West Bank and Gaza and UNRWA’s other fields of operations are to use the School-Level Analysis Tool of the Curriculum Framework to review their own teaching programs and lessons, including curriculum materials they use, while considering their context and diversity of needs. The School-Level Analysis Tool focuses on the five Student Competencies and select Curriculum Framework Principles: (1) Principle 4—provides a variety of teaching and learning approaches; (2) Principle 6—is inclusive and provides learning opportunities for students of all abilities; (3) Principle 8—is free of biases (such as gender, disabilities, and ethnicity); (4) Principle 9—enables students to value their Palestinian culture, heritage, and identity; and (5) Principle 10—reflects UN values. The Curriculum Framework is a more comprehensive pedagogical review—one that relates more directly to the theory and practice of education—than the rapid review process, which focuses specifically on three rapid review criteria linked to the UN values in the Curriculum Framework. According to UNRWA documents, UNRWA employed a multi-stage rapid review process to identify textbook content not aligned with UN values, and its efforts to address this content were ongoing as of November 2017. Figure 3 summarizes UNRWA’s process. Complementary teaching materials are educational materials that UNRWA developed to use alongside host government textbooks to ensure that the lessons taught in UNRWA schools adhere to UN core values, such as neutrality, according to UNRWA officials. UNRWA’s Agency Task Force is composed of the Chief of Staff and headquarters officials from the departments of Education and Legal Affairs, according to UNRWA officials. The cascade training model involves training groups of individuals who in turn train other individuals. UNRWA has established strategic support units in the fields that train educational specialists who then train school principals and teachers using a cascade model, according to UNRWA officials. Professional support staff include field-level strategic support unit staff, education specialists, and Chiefs of the Field Education Programs, according to UNRWA officials. Appendix III: 2016-2017 Rapid Review, as Reported by the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) UNRWA reported that it has reviewed newly issued Palestinian Authority textbooks during three rapid review sessions since 2016 to identify content it deems not aligned with UN values and that it has developed complementary teaching materials to specifically address this content for any page with issues identified. Throughout the 2016-2017 school year, UNRWA reported reviewing pilot textbooks newly issued by the Palestinian Authority for grades 1 through 4 in two separate reviews. In August 2017, UNRWA reported reviewing the final textbooks for grades 1 through 4 for the first semester, pilot textbooks for grades 5 through 10 for the first semester, and English language textbooks funded with contributions from donor countries, including the United States, for grades 1 through 10 for the first semester. For the August 2017 review, UNRWA reported reviewing 75 textbooks (7,498 pages) in aggregate. Table 1 provides details on the number of textbooks and number of pages UNRWA reported reviewing between 2016 and 2017 for the textbooks used in its schools in the West Bank and Gaza. Table 2 provides detail on the academic subjects for which UNRWA reported reviewing Palestinian Authority textbooks in 2016 and 2017. Table 2. Select Academic Subjects for Which the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) Reported Reviewing Content of Palestinian Authority and English Language Textbooks, 2016-2017 recitation) Legend: =UNRWA reviewed textbook for this subject. N/A= Not applicable because Palestinian Authority and UNRWA schools do not use these textbooks for the grades listed. Appendix IV: Textbook Content Issues Identified by the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) Appendix IV: Textbook Content Issues Identified by the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) During its August 2017 review of textbooks for grades 1 through 10 for the first semester, UNRWA identified 203 issues covering a total of 229 pages (out of a total of 7,498 pages reviewed), the majority of which it identified as related to neutrality/bias. Specific details about the percentage of pages with issues UNRWA identified in relation to each of the three rapid review criteria subjects, as well as the types and percentages of neutrality/bias issues UNRWA reported finding were omitted because the information is classified. Of the 203 issues UNRWA identified in the textbooks for the first semester of grades 1 through 10 for the 2017-2018 school year, UNRWA officials reported that they identified the largest number of issues in social studies textbooks (105 issues), followed by Arabic grammar (30 issues), Islamic education (20 issues), mathematics (18 issues), science and life (15 issues), English language (14 issues), and vocational education (1 issue). The 14 issues that UNRWA identified in the English language textbooks purchased by UNRWA for the first semester of grades 1 through 10 cover a total of 22 pages out of 664 textbook pages (3.3 percent), according to UNRWA officials. Of the 14 issues, UNRWA officials identified 10 of the 14 as neutrality/bias issues and 4 as gender issues. The neutrality/bias issues that UNRWA identified include issues related to maps, Jerusalem, and the Islamic religion. Details about the neutrality/bias and gender issues that UNRWA identified and the complementary teaching materials it developed were omitted because the information is classified. UNRWA officials identified four examples in the English language textbooks for the first semester of grades 1 through 10 that show a lack of gender balance in sports, hobbies, and professions. In response, they developed complementary classroom discussion questions to discuss gender bias with UNRWA students. Details about the gender issues that UNRWA identified and the complementary teaching materials UNRWA developed were omitted from this report because they included classified information. Appendix VI: Comments from the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) Thomas Melito at (202) 512-9601 or melitot@gao.gov. In addition to the contact named above, Cheryl Goodman (Assistant Director), Jaime Allentuck (Analyst in Charge), Ashley Alley, Martin de Alteriis, and Lynn Cothern made key contributions to this report. Other contributors to this report include Neil Doherty, Mark Dowling, Aldo Salerno, and Mona Sehgal.", "summary": "The U.S. government has funded education assistance to Palestinians. The State Department oversees U.S. contributions to UNRWA, and USAID provides assistance to Palestinian Authority schools. UNRWA generally administers schools for Palestine refugees. The Palestinian Authority generally administers schools for non-refugee Palestinians who live in the WBG. During the 2016-2017 school year, it issued new pilot textbooks for grades 1 through 4 for use in both its and UNRWA's schools. GAO was asked to review issues related to U.S. education assistance to the WBG. This report examines (1) the funding the U.S. government provided for education assistance to the WBG for fiscal years 2015 through 2017, (2) how UNRWA and State have identified and addressed potentially problematic content in textbooks, and (3) whether State has submitted required annual reports to Congress including information on educational materials used in UNRWA schools. To address these objectives, GAO reviewed documents and interviewed U.S. government, UNRWA, and Palestinian Authority officials. For this report, GAO refers to potentially problematic content as that which State defined as inappropriate and that UNRWA defined as not aligned with UN values. The U.S. government funded an estimated $243 million for education assistance in the West Bank and Gaza (WBG) for fiscal years 2015 through 2017, including an estimated $193 million from the Department of State (State) and about $50 million from the U.S. Agency for International Development (USAID). Of State's contribution of approximately $193 million, the United Nations Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) estimated that about $187 million was provided for its education assistance. State provided the remaining approximately $6 million for non-UNRWA education projects. UNRWA purchased English language textbooks used in UNRWA schools with funds that consist of contributions from donor countries, including the United States. The U.S. government and UNRWA did not fund textbooks published by the Palestinian Authority because the Palestinian Authority provided these textbooks free of charge, according to agency officials. UNRWA and State have taken steps to identify and address potentially problematic content of textbooks used in UNRWA schools, such as maps that exclude Israel. UNRWA reviewed textbooks, including English language textbooks, and took actions to address content it deemed as not aligned with UN values. For example, UNRWA created complementary teaching materials, such as alternate photos, examples, and guidance for teachers to use with the textbooks in UNRWA schools. However, due to financial shortfalls and other constraints, UNRWA officials told GAO that UNRWA did not train teachers or distribute the complementary teaching materials to classrooms. As a result, these materials were not used in UNRWA classrooms. To address textbook content deemed problematic, State examined nongovernmental organizations' studies, encouraged Palestinian Authority officials to address the issue, and monitored UNRWA's efforts. The annual appropriations acts for fiscal years 2015 through 2017 require State to report to Congress on several topics, including steps UNRWA has taken to ensure that the content of all educational materials taught in UNRWA schools is consistent with the values of human rights, dignity, and tolerance, and do not induce incitement. Although State submitted its required reports to Congress on time, State included inaccurate information in the 2017 report and omitted potentially useful information in all three reports. In its 2017 report, State noted incorrectly that UNRWA had completed training teachers and distributed complementary teaching materials to address textbook content that UNRWA deemed as not complying with UN values. In all three of the reports, State omitted information concerning whether UNRWA found that any educational materials used in its schools do not comply with two of four elements, dignity and not inducing incitement. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity's objectives and communicate it in a way that is useful to users. Without a fuller explanation, Congress may not have the information it needs to oversee efforts to identify and address potentially problematic textbook content. GAO made four recommendations in our April 2018 report that State improve its reports to Congress, including to ensure the information presented is accurate and to provide additional information on the textbook content UNRWA identified as not aligned with UN values. State implemented all of GAO's recommendations.", "document_type": "gao"}
{"report": "Table 1 describes the activities that USDA’s mission areas and major staff offices perform as part of five types of administrative services that USDA business centers are to provide under the Secretary of Agriculture’s November 2017 memorandum. At USDA, eight mission areas and three of the 13 major department-level staff offices, including five sub-offices, are responsible for delivering or overseeing these five types of administrative services (see fig. 1). USDA’s eight mission areas carry out the department’s program responsibilities through 18 agencies. Five mission areas consist of multiple agencies, while three consist of a single agency, as shown below. In general, USDA’s eight mission areas deliver the administrative services, and the staff offices develop regulations, guidance, and policies describing how mission areas should deliver those services and oversee the mission areas’ performance. In addition, the staff offices deliver some administrative services on a department-wide or shared-services basis. According to USDA officials, the mission areas are to follow the regulations, guidance, and policies developed by the staff offices but are allowed considerable discretion in how they deliver administrative services based on their missions and program needs. According to USDA officials and documentation, service delivery is typically handled by a mission area’s field offices at the regional, state, or local level; however, with the establishment of the business centers, more service is being delivered at the mission area’s headquarters level. USDA has consolidated administrative services and established business centers in all of its eight mission areas in accordance with the Secretary’s November 2017 memorandum. The eight existing business centers vary in when they were established. As shown in figure 2, three mission areas had business centers before the Secretary’s memorandum. However, even the mission areas that had business centers before the Secretary’s November 2017 memorandum subsequently changed the way they provide administrative services, specifically with regard to information technology services. Two mission areas—Marketing and Regulatory Programs and Research, Education, and Economics—added information technology to their business centers during fiscal year 2019. In 2019, the Natural Resources and Environment mission area, which already included information technology in its business center, changed the position descriptions of certain employees to more accurately reflect that their major duties are considered to be information technology work. Of the five new business centers established since the Secretary’s memorandum, establishment of the FPAC Business Center entailed the most significant transformation. Typically, each business center is located within one of the mission area’s component agencies and the center’s leader reports directly to that agency’s leadership (see table 2). The FPAC Business Center is the only business center established as a separate agency within a mission area. Changes that occurred at other mission areas in transitioning to new business centers included modifying reporting structures for services that had already been consolidated. For example, according to Rural Development officials, the mission area had a business services entity prior to the Secretary’s memorandum. To establish a business center as envisioned by the Secretary’s memorandum, the mission area changed the reporting structure for administrative operations in the field. Previously, field employees associated with an administrative service reported directly to leadership in Rural Development’s state offices. These employees now report directly to headquarters leadership specific to their administrative service. However, according to Rural Development officials, no employees were physically moved. As of November 2019, most of the business centers were providing all five of the main administrative services that the Secretary’s November 2017 memorandum envisioned—specifically, financial management, human resources, information technology, procurement, and property management. Two business centers have chosen to provide financial management services differently from the other administrative services. Specifically: Food Safety. According to officials in the Food Safety mission area, as part of its reorganization, that mission area grouped all of the administrative services except financial management under the Chief Operating Officer. However, it grouped the budget office, which performs financial management services, under the agency’s Chief Financial Officer because it preferred to keep this office with mission- related program offices, which report directly to the Deputy Administrator. Natural Resources and Environment. Officials in the Natural Resources and Environment mission area said that unlike other administrative services, which are grouped under the business center, financial management responsibilities are divided between the business center’s Office of Strategic Planning, Budget, and Accountability and the Forest Service’s Office of the Chief Financial Officer. According to these officials, this arrangement strengthens internal controls by separating responsibility for allocating and spending financial resources from responsibility for accounting for how the resources are spent. One business center—in the Trade and Foreign Agricultural Affairs mission area—provides information technology and financial management services for Foreign Agricultural Service employees and has agreements in place with other USDA components to provide human resources, procurement, and property management services for the mission area. According to the Deputy Assistant Secretary for Administration, USDA accepted these mission areas’ decisions about financial management because they ensured accountability of field-level staff to the administrative service’s headquarters leadership. According to USDA’s Deputy Assistant Secretary for Administration, the department regularly reviews data on administrative services, including services provided by the business centers. However, the department does not use these or other data to assess the effectiveness and impact of its business centers and as of November 2019 did not plan to do so. Beginning in 2018, USDA created an online monitoring system to compile data from mission areas on the status of their administrative services. The system has “dashboards” displaying data specific to financial management, human resources, information technology, procurement, and property management, among other things. Each of the dashboards presents metrics gathered from various databases across mission areas. For example, the dashboards for human resources include the number of employees by organization, along with their geographic location, retirement eligibility, occupation, and any skills gaps. According to USDA officials, the dashboards allow department-level review of a large number of metrics on a range of administrative activities performed by the business centers—data that previously were available only to each mission area. USDA’s Deputy Secretary discusses performance on various dashboards with mission area and staff office leadership at quarterly review meetings. However, the department has not used dashboards or associated metrics to assess the effectiveness and impact of the business centers. Specifically, the department has not assessed the impact that the business centers have had on USDA’s customer service; human resources, including hiring; and overall functionality. According to the Deputy Assistant Secretary for Administration, creating new business centers and changing existing ones has contributed to positive results, such as savings from reducing the size of USDA’s vehicle fleet, but USDA’s Departmental Administration has not systematically compared USDA’s ability to deliver its administrative services before and after these reforms. For example, the department has not examined whether the reforms have enabled mission areas to reduce costs, reduce processing times, or identify previously unknown issues that need to be addressed. According to USDA officials, these business center reforms broadly addressed the first policy goal in USDA’s May 2018 strategic plan for fiscal years 2018 through 2022—namely that USDA programs be delivered efficiently, effectively, and with integrity and a focus on customer service. However, USDA officials told us that they have not yet attempted to measure how the business center reforms have met the three overarching policy goals identified in the Secretary of Agriculture’s November 2017 memorandum, which called for the business center reforms to (1) improve customer engagement, (2) maximize efficiency, and (3) improve agency collaboration. In addition, some stakeholders we interviewed expressed concern about progress toward these goals as USDA works to implement the business center reforms. For example: Staffing vacancies. Some stakeholders raised concerns about the impact of vacancy rates at business centers on customer engagement. The two largest business centers created since November 2017—in FPAC and Rural Development—had position vacancy rates above 27 percent as of September 30, 2019. Officials with one group representing farmers who are customers of the FPAC and Rural Development mission areas told us they were concerned that (1) vacancies in the business center may be leading to vacancies among program staff in the field, (2) complaints related to staffing have increased over the past few years, and (3) staffing vacancies in the field are negatively affecting customer service. An official from another group representing farmers told us that the group is hearing from its members that there have been a lot of changes within USDA lately and field offices seem to be understaffed and overwhelmed even after the creation of the business centers, which could be negatively affecting the quality of customer service. Vacancies at the FPAC and Rural Development business centers, particularly among staff responsible for hiring USDA program staff in the field, could therefore affect both access to and the quality of technical assistance. Employee concerns. In the FPAC Business Center, officials from one union representing employees told us that confusion among employees about their roles and responsibilities could affect both internal employee satisfaction and the overall ability of the business center to serve the FPAC mission and its customers. Specifically, these union officials noted employees’ confusion about how to reconcile differences among the work procedures that each of the three FPAC agencies used before the reorganization. Officials from this and one other union also stated that employees have reported that business center leadership has not taken action to address such employee concerns. As a result, according to officials from both unions, FPAC business center employees are experiencing low morale, confusion, frustration, and anxiety about the changes, affecting their ability to deliver services. In response, FPAC officials told us in November 2019 that the FPAC Business Center is working on empowering employees, hiring, establishing a culture of accountability, building trust and engagement, and addressing other issues that have arisen in the business center’s first year of operation. For example, these officials said they were reviewing the business center’s organizational structure to determine whether there is a need for adjustments to further streamline operations and improve service. USDA officials cited several reasons the department has not assessed the effect of the business center reform effort undertaken in response to the Secretary’s November 2017 memorandum. According to the Deputy Assistant Secretary for Administration, the absence of evaluation is partly attributable to the department’s strategy of delegating responsibility to the mission areas to implement business centers; this strategy aims to give the mission area leadership ownership of the reform effort and help ensure their buy-in. The Deputy Assistant Secretary for Administration also said that the department has focused on implementing the reforms called for in the memorandum rather than on evaluating the results. USDA officials also pointed out that the reform effort is relatively recent, with five of the business centers having been created since June 2018. However, the Deputy Assistant Secretary for Administration acknowledged the importance of evaluating and communicating any benefits derived from the business center reform effort as it moves forward. Our prior work has shown that a key practice to consider during agency reform efforts is the establishment of clear outcome-oriented goals and performance measures to assess the reform’s effectiveness and impact. As we have previously reported, a performance goal is a target level of performance expressed as a measurable objective; a performance measure includes an assessment of results compared with intended purpose that can be expressed quantitatively or in another way that indicates a level or degree of performance. Monitoring performance against goals allows agencies to assess progress and address problems as necessary. While USDA has not developed goals and measures to assess the effectiveness and impact of the business center reforms, the department has set goals for a limited number of administrative services, including hiring, the number of fleet vehicles, and travel and conference spending. In addition, parts of the department have developed goals and measures for the administrative services their business centers provide. For example, officials in the Research, Education, and Economics mission area reported nine key performance indicators for their administrative services, such as specific goals and measures for the timeliness of posting job opportunity announcements. Developing appropriate performance goals and measures and systematically assessing the effectiveness and impact of the business center reforms could help the department determine whether the reforms are meeting the Secretary’s overarching policy goals and improving the delivery of administrative services to support the department’s mission and program goals. USDA has established business centers in all of its eight mission areas, and, according to USDA’s Deputy Assistant Secretary for Administration, the department regularly reviews data on administrative services, including services provided by the business centers. However, the department has not systematically assessed whether USDA’s ability to deliver its administrative services has improved since the establishment of its business center reforms or whether the reforms are meeting the policy goals that the Secretary intended them to achieve. Importantly, the department has not assessed the impact that the business centers have had on USDA’s customer service; human resources, including hiring; and overall functionality. Our prior work has shown that a key practice to consider during agency reform efforts is the establishment of clear outcome-oriented goals and performance measures to assess the reform’s effectiveness and impact. The department has set goals for a limited number of administrative services, including hiring, the number of fleet vehicles, and travel and conference spending, but it has not developed goals and measures to more broadly assess the effectiveness and impact of the business center reforms. Developing such goals and measures and using them to assess the effectiveness and impact of the business center reforms could help the department (1) determine whether the reforms are meeting the Secretary’s overarching policy goals and (2) identify whether the reforms have enabled mission areas to improve the delivery of their administrative services by, for example, reducing costs, reducing processing times, or identifying previously unknown issues that need to be addressed. The Secretary of Agriculture should direct Departmental Administration to work with the mission areas to develop department-level outcome- oriented performance goals and related measures for the business centers, and use them to assess the effectiveness and impact of the business center reforms. (Recommendation 1) We provided a draft of this report to USDA for comment. In an email, a Senior Advisor in USDA’s Office of Operations stated that USDA agreed with our recommendation about assessing the effectiveness and impact of the business centers. In addition, in comments, reproduced in appendix II, USDA generally agreed with the findings in our draft report. USDA stated that to address our recommendation, the department is evaluating options for the development of performance metrics and inclusion of these metrics and related information as part of the regular and recurring reviews by the department’s Deputy Secretary who is identified as the Chief Operating Officer. We are sending copies of this report to the appropriate congressional committees, the Secretary of Agriculture, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact me at (202) 512-3841 or morriss@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Since the U.S. Department of Agriculture (USDA) established the Farm Production and Conservation (FPAC) Business Center in October 2018, Congress has appropriated a total of about $294 million to USDA for necessary expenses of the FPAC Business Center. USDA has also approved $1.1 million for efforts to modernize information technology at the center through fiscal year 2020. USDA has supported the FPAC Business Center with discretionary and mandatory appropriations. USDA budget documents and congressional report language indicate that these appropriations have been accompanied by corresponding reductions in funding to the other three agencies within the FPAC mission area—the Farm Services Agency (FSA), Natural Resources Conservation Service (NRCS), and Risk Management Agency (RMA). For fiscal year 2018, the Consolidated Appropriations Act, 2018, provided discretionary appropriations of about $1.0 million to the FPAC Business Center and further provided for the transfer into the FPAC Business Center account of another $145,000 in mandatory appropriations. Subsequent USDA budget justification documents state that the $145,000 included funds directed towards three NRCS programs—the Environmental Quality Incentives Program (EQIP), Conservation Stewardship Program (CSP), and Agricultural Conservation Easement Program (ACEP). As shown in table 3, for fiscal year 2019, the Consolidated Appropriations Act, 2019, provided for the FPAC Business Center to receive discretionary appropriations of about $216.4 million, an amount that an accompanying conference report states was offset by reductions to the appropriations for administrative functions in FSA, NRCS, and RMA; a transfer of about $16.1 million in discretionary appropriations from FSA’s Agricultural Credit Insurance Fund Program Account; and a transfer of about $60.2 million in mandatory appropriations that, according to USDA officials, came from the same three NRCS programs as in 2018 (EQIP, CSP, and ACEP). According to USDA officials, prior to the establishment of the FPAC Business Center, these funds were used to support the salaries of FSA, NRCS, and RMA personnel performing functions and tasks similar to those provided by the business center and for general operating costs such as rents, information technology, travel, and training expenses. The FPAC Business Center plans its spending and tracks its obligations using standard categories, including personnel compensation, benefits, travel, transportation, postage, contracts, supplies, and equipment. As shown in table 4, the FPAC Business Center planned to spend funds only for personnel compensation and benefits in fiscal year 2018. According to data provided by USDA, the business center obligated about $995,000 of the nearly $1.2 million in available funds, and those obligations were entirely for personnel compensation and benefits. In fiscal year 2019, the business center planned to obligate nearly 74 percent of the $292.7 million in available funds on personnel compensation and benefits, about 18 percent on contracts, about 8 percent on travel, and the rest on other activities. According to USDA officials, through the end of the fiscal year, the business center had obligated approximately $272 million, or about 93 percent, of its available funds. For fiscal years 2018 through 2020, USDA approved an investment of $10 million for information technology modernization across all FPAC agencies, including the following two efforts to modernize information technology in the FPAC Business Center at an estimated cost of $1.1 million: The Modernized Directives System, approved at a cost of $600,000. According to USDA officials, the FPAC Business Center is funding this project from its salaries and expenses budget. According to USDA documents, the business center’s Management Services Division wants to provide all FPAC employees an online tool to create, authorize, disseminate, and manage all of the agency’s policy directives in an FPAC Consolidated Directives Repository while minimizing the costs of operations. According to the agency, the tool would streamline the tasks performed by the division’s administrative staff. FPAC plans to gauge the success of the effort by measuring adoption of the new tool by employees, stakeholders, and the public. The National Office Information System, approved at a cost of $500,000. According to USDA officials, $41,000 of that amount is from the FPAC Business Center’s budget for salaries and expenses, while the remaining $459,000 is funded by the other three FPAC agencies. According to USDA documents, this operations support system would improve the agency’s ability to respond in a timely manner to congressional and departmental inquiries and meet reporting requirements from the Office of Management and Budget and other oversight organizations. According to FPAC Business Center officials, the business center obligated $600,000 and $41,000, respectively, toward these two projects in fiscal year 2019. In addition to the contact named above, Nico Sloss (Assistant Director), Stephen Cleary (Analyst in Charge), Ross Campbell, Caitlin Dardenne, Juan Garay, Scott Heacock, Serena Lo, Cynthia Norris, Lauren Ostrander, and Sara Sullivan made key contributions to this report.", "summary": "With budget authority of $146 billion in fiscal year 2018, USDA employs nearly 100,000 people organized into 13 major staff offices and eight mission areas comprising 18 agencies. In a November 2017 memorandum, the Secretary of Agriculture called for establishment of a business center in each mission area to provide consolidated administrative services. The memorandum identified three policy goals for these reforms: (1) improve customer engagement, (2) maximize efficiency, and (3) improve agency collaboration. The Agriculture Improvement Act of 2018 includes a provision for GAO to report on USDA's business centers. Among other things, this report examines the extent to which USDA has (1) established business centers and (2) assessed the effectiveness and impact of these business centers. GAO reviewed USDA documents and interviewed officials from USDA's Office of the Assistant Secretary for Administration, Office of Budget and Program Analysis, and eight mission areas about their efforts. GAO also interviewed representatives of USDA employee unions and USDA's external customers, such as farmers, for their perspectives on the establishment of the business centers. The U.S. Department of Agriculture (USDA) has established business centers to provide consolidated administrative services such as human resources and information technology in each of its eight mission areas, in keeping with reforms called for in a November 2017 memorandum from the Secretary of Agriculture. The business centers vary in when they were established; three preceded the Secretary's memorandum (see figure). Typically, each business center is located within one of the mission area's component agencies, and the center's leader reports directly to agency leadership. According to a USDA official, the department regularly reviews data on administrative services, including services provided by the business centers. However, the department has not assessed the effectiveness and impact of its business centers and as of November 2019, did not plan to do so. Beginning in 2018, USDA created an online monitoring system to compile data on the status of administrative services, with “dashboards” displaying data specific to different administrative services, among other things. However, the department has not used dashboards or associated metrics to assess the effectiveness and impact of the business centers, including their impact on USDA's customer service; human resources, including hiring; and overall functionality. GAO's prior work has shown that a key practice to consider during an agency's reform efforts is establishing clear outcome-oriented goals and performance measures to assess the reform's effectiveness and impact. Developing appropriate performance goals and systematically assessing the effectiveness and impact of the business center reforms could help the department determine whether the reforms are meeting the Secretary's overarching policy goals and improving the delivery of administrative services to support the department's mission and program goals. GAO recommends that USDA establish department-level outcome-oriented performance goals and related measures for the business centers, and use them to assess the effectiveness and impact of the business center reforms. USDA agreed with the recommendation.", "document_type": "gao"}
{"report": "TSA is the primary federal agency responsible for implementing and overseeing the security of the nation’s civil aviation system and is responsible for ensuring that all passengers and property transported by commercial passenger aircraft to, from, within, or overflying the United States are adequately screened. Specifically, TSA performs, or oversees the performance of, screening operations at about 440 TSA- regulated (i.e., commercial) airports nationwide. These airports range in size from smaller airports (category III and IV airports) to larger airports (categories X, I, and II airports). According to TSA policies and procedures in effect at these airports, all passengers, their accessible property, and their checked baggage are to be screened prior to entering the airport sterile area—the portion of an airport beyond the security screening checkpoint that provides passengers access to boarding aircraft. Among other things, these policies and procedures generally provide that passengers must pass through security checkpoints where their person, identification documents, and accessible property are to be screened by TSOs, and that all checked baggage must be screened by TSOs. Checkpoint Screening. The checkpoint screening process, as set forth in TSA’s procedures, is intended to deter and prevent passengers from carrying any unauthorized or prohibited items into the airport’s sterile area and onboard an aircraft. Upon entering the airport terminal security checkpoint, passengers provide travel document checkers their boarding passes for review. Based on the printed boarding pass result, travel document checkers are to direct passengers to designated areas for standard, enhanced, or expedited screening. Standard screening is generally applied to all passengers with boarding passes that are not marked for enhanced or expedited screening. This screening typically includes passing through either a walk-through metal detector or advanced imaging technology (the latter of which identifies objects or anomalies concealed on the person) and using X-ray equipment to screen the passenger’s accessible property. In the event that any of these screening devices identify a potential item of concern, additional security measures are to result as part of the alarm resolution process. These measures may include pat downs, explosives trace detection searches (which involve a device to detect explosive particles), and colorimetric testing to identify the concentration of certain chemical elements. Enhanced screening is generally required for passengers TSA identifies as high risk, such as passengers that have been matched to federal government lists of known or suspected terrorists. Enhanced screening involves the same procedures applied during a typical standard screening experience, as well as a pat down and an explosives trace detection search or physical search of the interior of the passenger’s accessible property, electronics, and footwear. Expedited screening is allowed for passengers TSA believes to be low risk. One group of passengers who routinely receive expedited screening are those enrolled in TSA’s Pre✓®—a program through which individuals vetted and approved by TSA are eligible for this level of screening. At airports with dedicated TSA Pre✓® lanes, expedited screening includes walk-through metal detector screening and X-ray screening of the passenger’s accessible property, and travelers do not have to remove their belts, shoes, or light outerwear, or remove items such as laptops from carry-on baggage. Checked Baggage Screening. TSA procedures for checked baggage screening establish a process intended to deter, detect, and prevent the transport of any unauthorized explosive, incendiary, or weapon aboard an aircraft. Checked baggage screening generally entails the use of explosives detection systems—which use X-rays and other technology to automatically measure the physical characteristics of objects in baggage and trigger an alarm when objects that exhibit the physical characteristics of explosives are detected. Inspection’s tests are intended to identify vulnerabilities related to any aspect of TSA’s checkpoint and checked baggage screening systems, to include the procedures for screening, the TSOs who implement these procedures, and the technology for screening (e.g., X-ray machines and advanced imaging technology). Security Operations’ testing focuses entirely on TSO performance of existing standard operating procedures for checkpoint and checked baggage screening, and unlike Inspection’s testing, does not test other aspects of screening, such as the performance of screening equipment. To carry out covert testing, both Inspection and Security Operations create test scenarios that describe the overall intent of the test, the threat item, the method of execution (e.g., an explosive device concealed in a shoe carried through the checkpoint), and other pertinent details. Generally, Security Operations’ scenarios have tested TSOs’ performance of procedures pertaining to one of three different paths travelers must follow to have either their persons or property screened (i.e., screening paths): checkpoint on-person—the tester travels through the checkpoint with the threat item concealed on his or her person; checkpoint in-property—the tester travels through the checkpoint with the threat item concealed in a carry-on bag; and checked baggage—the threat item is concealed in checked baggage. For both offices, covert tests begin when program managers notify an airport’s FSD and local law enforcement agency that testing is scheduled to begin. Testers typically pose as passengers and attempt to smuggle a threat object, concealed either on their person or in their property, through one or more layers of the checkpoint or checked baggage screening process (see fig. 1). These layers of screening include the travel document checker and the walk-through metal detector or the advanced imaging technology machine, among others. In general, TSA’s covert tests conclude with a meeting between either Inspection or Security Operations staff and the TSOs and their supervisors who were tested to discuss the results. These meetings, known as post-test reviews, allow officials to reinforce actions resulting in test successes, review the correct procedures for any failures, and collect additional data relating to factors contributing to success and failure. In addition, documented test results are reported to local TSA airport officials, so that they may schedule and track TSO participation in the remedial training that is required by law when screeners fail a test. More broadly, Inspection and Security Operations report test results to certain internal and external stakeholders. Historically, Inspection has reported its test results directly to TSA management to inform executive leadership about the aviation screening system’s potential vulnerabilities to new and evolving threats. In addition, Security Operations has reported test results for its prior testing program to the Office of Management and Budget quarterly and has also briefed TSA senior leadership on results periodically. DHS policy requires that its components, including TSA, use risk information and analysis to inform decision making. A risk-informed approach helps decision makers identify and evaluate potential risks so that actions can be taken to mitigate those risks. DHS defines risk as a calculation of threat, vulnerability, and consequence. These elements are defined as follows: Threat likelihood is estimated based on intent and capability of an adversary. Vulnerability is a physical feature or operational attribute that renders an entity open to exploitation or susceptible to a given hazard. In calculating risk, vulnerability is based on the likelihood that an attack is successful, given that it is attempted. Consequence refers to the negative effect of an event, incident, or occurrence. According to the 2010 DHS Risk Lexicon, which defines key risk- management terms for DHS agencies and components, risk-based decision making uses the assessment of risk as the primary decision driver, while risk-informed decision making may consider other relevant factors in addition to risk assessment information, for decision making. To guide agency efforts to make risk-based decisions, TSA issues annually its Transportation Sector Security Risk Assessment—a report on transportation security that assesses risk by establishing risk scores for various attack scenarios within different transportation sectors, including domestic aviation. These scenarios are continuously refined to reflect evolving threats to the various transportation modes and feedback from subject matter experts. In scoring risk scenarios for the Transportation Sector Security Risk Assessment, TSA considers the three elements of risk (threat likelihood, vulnerability, and consequence). In 2016, Inspection redesigned its process to conduct covert tests more consistently across airports, and began using quantitative methods to design tests and analyze results so that its findings might be applied more broadly across airports nationwide. Inspection officials explained that, prior to redesigning their process, Inspection’s findings could not be applied more broadly because of how tests were designed and executed. In addition, officials noted that some prior test practices risked diminishing the quality of testing. For example, some testers consistently ran tests at the same airports, increasing the likelihood that they might be recognized by TSOs and compromise the covertness of tests. As part of its new testing effort, Inspection recruited a technical team of employees with expertise in statistics and engineering to enhance the design, execution, analysis, and reporting of its covert tests. Inspection also documented its new covert test process and rationales for key program decisions, including its approach to performing quantitative analysis of test results, in overarching guidance issued in October 2016. These documents set forth a framework for conducting tests that includes the creation of detailed scenarios that specify Inspection’s covert test objectives and scope of testing. For example, for one Inspection test scenario conducted in fiscal year 2016, Inspection conducted 280 tests at larger airports to assess whether certain types of assembled explosive devices contained in carry-on luggage could evade detection at the checkpoint. Under new guidance, Inspection’s testers may not conduct tests at the same airport within a predetermined period, to limit the potential of being recognized by airport staff. In addition, under its new process, Inspection selects airports for testing so that it may apply its findings more broadly across airports nationwide. Once Inspection testers complete all tests for a given scenario, Inspection develops classified reports containing results of its quantitative analysis (including detection rates for specific threat items) and suggested actions aimed at addressing any identified vulnerabilities. Inspection uses a risk-informed approach to select locations and scenarios for covert tests, but has not fully documented this approach. According to Inspection officials, to select airport locations for tests, they use a tool to randomly select airports from various regions and of various sizes to ensure appropriate representation. According to our review of the locations Inspection tested in fiscal years 2016 and 2017, Inspection predominantly conducted testing at the larger airports. As previously discussed, this is consistent with a risk-informed approach, as TSA’s analysis has shown that larger airports face an increased threat of a terrorist attack. In addition, Inspection officials said that they use a risk-informed approach to select scenarios for their covert tests that takes into consideration all three aspects of a comprehensive risk assessment— threat, vulnerability, and consequence. According to officials, Inspection’s approach to each of the three components of risk is described below. Efforts to Consider Threats. According to Inspection leadership officials, Inspection has developed close working relationships with key intelligence community agencies to obtain current and specific intelligence information about threats to commercial aviation. Inspection uses this information to create test scenarios involving threat items and attack methods that correspond with the most current threat intelligence. Inspection officials explained that they also consult risk assessments such as the Transportation Sector Security Risk Assessment to help determine which scenarios to test, but do not rely solely on this information. Officials said this is because such assessments can lack specificity about the type and placement of threat items along different screening paths. For example, the Transportation Sector Security Risk Assessment may not convey the specific type of device or the mechanism by which an explosive device will be presented at the checkpoint (e.g., in a laptop). Inspection’s approach, which uses both current intelligence and risk assessments, is consistent with a risk-informed approach, which allows agencies to utilize resources beyond risk assessments to inform decision making. Efforts to Consider Vulnerability. Inspection officials told us they have considered vulnerability as a factor for making risk-informed decisions, and have found that it is not useful when deciding which scenarios to test for two reasons. First, their covert testing is intended to identify the existence of vulnerabilities in the aviation security system. Second, officials explained that vulnerabilities at some airports are well-documented and understood; therefore, they would generally not use their limited resources to test a vulnerability that is well-known. Efforts to Consider Consequence. Inspection officials explained that when selecting among possible scenarios to test, considering the consequences that might result from a scenario is less important than the likelihood of a given threat. However, Inspection officials explained that they require that any scenario tested is one that would result in the loss of life if the attack were actually to occur. Although Inspection program officials could articulate the risk-informed approach used to select scenarios for testing, they had not sufficiently documented this approach. Specifically, we found that Inspection documents its process for making risk-informed selections of scenarios in formal work plans. This documentation includes general criteria that Inspection leadership is to consider when developing threat scenarios, one of which is threat likelihood. However, the work plans we reviewed did not identify selection criteria that address the vulnerability or consequence components of risk. DHS’s Risk Management Fundamentals (2011) requires that agency documentation include transparent assumptions about the rationale behind risk management decisions. In addition, according to Standards for Internal Control in the Federal Government, agencies should document key decisions in a way that is complete and accurate. According to Inspection officials, they have not fully documented their risk-based process for selecting scenarios because their decision making is often informed by unforeseen events associated with the most exigent threats. Nevertheless, without documenting in its work plans how consequence and vulnerability are considered when determining which scenarios to test, current Inspection program managers may not be able to ensure that their scenario selection decisions are appropriately accounting for risk as called for by DHS and TSA guidance. Furthermore, although vulnerability and consequence are less important criteria for Inspection’s current risk-informed selections, documentation of its approach toward each would serve as a baseline for how Inspection makes risk-informed decisions for selecting scenarios to test. This baseline could inform future program managers and agency leadership seeking to make changes. In 2016, Security Operations replaced its Aviation Screening Assessment Program with a new covert test program. Security Operations issued guidance for this new program that, among other things, established a parallel test process carried out by headquarters staff to validate (i.e., determine the quality of) local covert test results from airports. In conjunction with this process, Security Operations also developed and launched a new web-based tool to collect more detailed information on covert tests. According to Security Operations officials, the new program is intended to address problems with its covert testing process identified by an independent contractor in 2015. Specifically, the contractor performed the same covert tests that TSA personnel at local airports conducted, and the contractor’s test results showed that screeners performed more poorly on its tests. In September 2016, we reported that, based on the results of the contractor’s study, TSA had determined that prior-year tests conducted by TSA officials at airports likely showed a higher level of performance than was actually the case. Further, TSA attributed these higher detection rates, in part, to local airport difficulties in successfully maintaining the covert nature of their tests. To address deficiencies identified by the TSA-contracted study, Security Operations issued test guidance in December 2016 and January 2017 that provides more structure to the planning and execution of tests and is intended to help ensure the quality of test results, among other things. For example, the guidance directs local test coordinators to schedule covert tests at varying times of day and varying days of the month, to prevent TSOs from becoming accustomed to testing at particular times. Also, to help ensure that testers are not recognizable by TSOs, the guidance states that airports must not recruit testers from the airport in which the test is to be conducted. Additionally, Security Operations’ guidance expands opportunities for recruiting testers at airports. Security Operations’ new covert test program also features a headquarters-based covert test effort, known as Headquarters Evaluation Team (HET) testing, to help validate the results of covert tests conducted by TSA officials at airports, known as Field Evaluation Team (FET) testing. Under the new process, FET teams, which are composed of TSA staff at airports and locally recruited testers, oversee testing at airports where FSDs are located and at any smaller airports under the FSD’s authority. FET teams perform tests of three different screening paths—checkpoint in-property, checkpoint on-person, and checked baggage—using a variety of scenarios assigned by Security Operations program managers every 6 months. FET teams test scenarios for a designated number of times over the 6-month period, after which, program managers are to select and assign a new set of scenarios for testing for the next 6-month period. For its HET tests, Security Operations is to select, on a quarterly basis, three scenarios to test from among the current set of scenarios assigned for FET testing. HET teams are to travel to airports quarterly to conduct these tests and help validate the FET testing results. Security Operations’ validation process involves comparing detection rates—the percentage of tests in which TSA screening recognized and prohibited a threat item from entering the sterile area of an airport—for similar scenarios from both groups of testers. To assist HET and FET teams in collecting more detailed information from its new test program, in April 2016, Security Operations developed a web-based data collection instrument called the Task Process Factor (TPF) tool that TSA officials use to record more detailed information on covert tests. According to program officials, collecting more detailed information about test failures was part of the agency’s effort to improve screener performance following the DHS Inspector General’s 2015 covert test findings that identified vulnerabilities in TSA’s checkpoint screening. The tool defines the key TSO activities for conducting checkpoint and checked baggage screening as tasks (e.g., interpret the X-ray image). The tool also identifies the various processes associated with a given task (e.g., move property into the X-ray scanner and stop when a full image appears). For any task in which a TSO fails, testers are to use the TPF tool to record the task and process associated with the failure—so that Security Operations may identify points of failure for tests with greater specificity. Furthermore, for all test failures, the tool requires HET and FET testers to identify the factor, or root cause, for failure. Although Security Operations considers some TSA risk information when selecting airport locations to test, we found that Security Operations does not fully consider this information when determining which scenarios to use for its covert tests, and also does not document its rationale for choosing the scenarios it selects. According to its planning documents for conducting HET and FET tests, Security Operations conducts more tests at larger airports than smaller airports. According to TSA officials, this is because larger airports generally have more TSOs who are subject to covert testing. TSA’s decision to allocate more testing resources to larger airports is based on its own risk analysis and, therefore, is consistent with a risk-informed approach. However, Security Operations has not taken steps to incorporate known risks—such as those documented in TSA’s annual Transportation Sector Security Risk Assessment, TSA’s primary risk assessment of threats for all transportation modes—into its process for selecting covert test scenarios. As our prior work has shown, implementing a risk-informed approach involves using risk assessments or other risk information to determine the most pressing security needs and developing strategies to address them. In reviewing TSA’s 2016 Transportation Sector Security Risk Assessment—the version that would have informed Security Operations’ selection of tests for fiscal year 2017—we identified numerous attack scenarios that could have been incorporated into Security Operations’ selection of scenarios to test. Specifically, the 2016 risk assessment included 20 scenarios that involved attacks that could be carried out through expedited screening conducted in dedicated TSA Pre✓® screening lanes. We reviewed all scenarios Security Operations selected to test in fiscal year 2017, but found that only one involved a test of the TSA Pre✓® lane. More generally, we also found that TSA’s selection of threat items to test at the checkpoint in fiscal year 2017 did not reflect threats identified in TSA’s 2016 Transportation Sector Security Risk Assessment. Security Operations officials acknowledged that they do not use formal TSA risk assessments to determine what threat scenarios or items to test. They also do not work with intelligence agencies or review classified information when developing covert test scenarios. Instead, Security Operations officials said they rely mainly on professional judgment regarding which areas of checkpoint and checked baggage procedures TSOs frequently overlook or may not perform correctly (e.g., pat downs). Officials explained that their judgment is informed by monitoring covert test results; unclassified media reports on threats; and requests from agency leadership, such as from TSA’s Administrator. Security Operations’ program managers further explained that because their tests are intended to assess TSO performance of screening procedures and identify any gaps, their selection of scenarios for testing is intended to cover the breadth of checkpoint and checked baggage screening procedures. However, as previously discussed, using a risk-informed approach would allow program managers to balance other goals of testing, such as the need to test a variety of screening procedures, with risk information, when making decisions on what to test. DHS’s Policy for Integrated Risk Management (2010) states that DHS components should use risk information and analysis to inform decision making. Additionally, the TSA Strategy 2018–2026 prioritizes structuring programs to manage risk and optimize resource allocation. Formal risk assessments such as the Transportation Sector Security Risk Assessment identify the most significant risks to checkpoint and checked baggage screening, and accordingly identify some of the most critical skills TSOs need to detect or prevent possible attack scenarios. Using a risk-informed approach to select scenarios that more fully account for known risks—such as those identified in the Transportation Sector Security Risk Assessment or a similar risk assessment—could better ensure that TSA is using its finite testing resources to target screening activities that will counter the most likely threats. Additionally, DHS’s Risk Management Fundamentals (2011) requires that agency documentation include transparent assumptions about the rationale behind risk management decisions. However, Security Operations has not documented its rationales for selecting covert test scenarios in any of its overarching guidance or planning documentation. Such rationales would delineate Security Operations’ framework for determining what screening activities to test, and specify how Security Operations officials balance a risk-informed selection of scenarios with their need to test scenarios that cover the breadth of requirements within existing screening procedures. Security Operations officials said they do not document their scenario selection process because they review covert test data on a frequent enough basis to identify which processes have low detection rates and, thus, are in need of testing. However, documenting a risk-informed rationale for its selection of scenarios would better enable Security Operations or an external party to assess TSA’s covert test programs and ensure that decisions are appropriately accounting for risk as called for by DHS and TSA guidance. It would also allow Security Operations to demonstrate how it balances its goal of promoting a risk-informed culture, as required by DHS, with program goals to ensure that TSOs are following all required screening procedures correctly. Inspection has established a new process and principles for conducting covert tests, as well as collecting and analyzing test data, intended to result in quality information on screening vulnerabilities. We reviewed two reports on results of Inspection’s covert testing that were completed using its new processes, and found they resulted in quality information on screening vulnerabilities. With respect to its new processes Inspection has implemented guidance to ensure a standardized process for developing and executing tests. Specifically, Inspection guidance requires that headquarters staff with expertise in relevant fields (including physical security, explosives, and intelligence analysis) develop all threat items used for testing and conceal these items within test bags or on testers in the same manner across tests. In addition, Inspection program managers require that testers have detailed background stories to explain the purpose(s) of their travel. Inspection now employs multiple standard practices to ensure test covertness. We observed several of these practices during four Inspection tests conducted at one airport. These four tests consisted of two scenarios that were each tested at two different checkpoints within the airport. First, we observed that Inspection teams notified the FSD of their presence only immediately prior to beginning tests, to limit the potential for local airport staff to be forewarned. We also observed that Inspection conducted tests simultaneously across checkpoints, and concluded testing at the airport after an initial round of testing. According to Inspection program managers, conducting tests simultaneously and leaving after the initial round of testing are necessary because once TSOs at a tested checkpoint become aware of testing, there is no reliable way to prevent this knowledge from spreading to other checkpoints. Inspection now integrates its technical operations team (technical team) into all aspects of test design and data collection and analysis. Inspection officials recruited staff with expertise in research and test design, statistics, and systems engineering, among other relevant fields, to analyze this information. Inspection has integrated these staff into all aspects of its test process to ensure the quality of test information collected and analyses performed. For example, according to TSA documentation, Inspection technical team members are to oversee the selection of airports for testing by first conducting an analysis to determine the number of airports to be tested, and then ensuring the selection of airports for testing is made using a random process—a requirement, given that Inspection intends to use test results to understand and describe screening activities at airports nationwide. Inspection now identifies data to be collected for each scenario and monitors this data as it is being collected for quality assurance. According to TSA documentation, Inspection’s technical team develops the data collection forms used to record test information for every scenario. Such data elements are specific to each scenario and can include, for example, the time when the tester entered the checkpoint, whether the TSO running the X-ray machine stopped the belt to review the tester’s bag, and the brand of X-ray machine. According to TSA documentation, the technical team is also to monitor incoming data from scenarios on a regular basis to address any problems as they arise. Inspection now uses guidance to ensure consistency in analysis and reporting. This includes requirements for reviewing all test data and applying rules about which data should be excluded. Inspection also developed guidance to specify the types of statistical analyses that may be used to draw conclusions about test results and how to report on the results to ensure that its analysis of test results is appropriate and transparent. For example, Inspection guidance identifies what technical information should be included in the report to help readers interpret Inspection’s conclusions that are based on statistical analysis of results. We reviewed the two full reports that Inspection issued using this new guidance and found that Inspection generally followed the guidance for using statistical analysis and reporting final results in these reports. As previously discussed, the primary method by which Security Operations tries to ensure that quality covert test results are generated at airports is by having HET and FET testers conduct the same test scenarios at airports, and then comparing detection rates identified by the two teams. Security Operations program managers explained that this method presupposes that test results collected by HET and FET (following Security Operations’ overarching guidance for conducting tests and using the same test scenarios) should produce similar detection rates at the national level. Security Operations program managers further explained that, because HET testers are unaffiliated with the airports they test, they can more easily maintain test covertness. According to program managers, this aspect of HET testing, along with additional training HET testers receive in conducting covert tests, gives them greater assurance that HET tests accurately reflect screener performance at airports. Therefore, program managers generally consider large disparities between HET and FET detection rates to indicate problems with the quality of local airport covert test results. According to our analysis of Security Operations national covert test data for fiscal years 2017 and 2018, checked baggage tests consistently met the Security Operations criterion for quality test results, but checkpoint tests did not. In fiscal year 2018, TSA included a new criterion for quality test results for Regional Director and FSD annual performance evaluations. The criterion requires that HET and FET covert test detection rates at airports under their supervision be within a designated percentage point difference for the three types of tests (checkpoint in- property, checkpoint on-person, and checked baggage). According to our analysis of Security Operations national covert test data for fiscal year 2017 and the first half of fiscal year 2018, checked baggage tests consistently met the criterion for quality test results, however, checkpoint on-person and in-property tests did not. Specifically, we calculated HET and FET detection rates for the three kinds of Security Operations tests (checkpoint on-person, checkpoint in-property, and checked baggage tests) for three 6-month periods from fiscal year 2017 through the first half of fiscal year 2018. We found that, for each 6-month period, HET detection rates for checkpoint tests were lower than FET detection rates, and the differences exceeded TSA’s established criterion for quality test information. Security Operations officials acknowledged the differences between HET and FET rates, but noted that the differences generally decreased from the last 6-month cycle of testing for fiscal year 2017 through the first 6-month cycle of 2018, and program managers are working to address them further. Nevertheless, our analysis showed that for the first half of fiscal year 2018 (the most recent cycle’s data available for our analysis) differences between HET and FET test detection rates for checkpoint on-person and checkpoint in-property remained greater than Security Operations’ criterion for quality test information. In our observations of FET tests, we identified practices in local airport testing that impact the covertness of tests, and thus may contribute to differences between HET and FET detection rates. First, in our observations of local airport FET tests in which TSOs correctly identified the threat items, at one airport the TSA airport official in charge of FET testing was present at the checkpoint, and his presence may have provided advance notice to the TSOs that testing was in progress. Further, we learned from airport testing officials that having the FET test coordinator present at the checkpoint was a routine practice when testing was in progress. At another airport visit, one TSO told us that TSOs often know a FET test is in progress because TSA airport officials use the same test bag to conceal threat items across all tests performed at the airport. According to TSA documentation, potential lapses in the covertness of covert tests, similar to those we observed and were told about, can make TSOs aware that they are being tested and lead to results on tests that overstate actual TSO performance. In addition, we found that the level of potential variability in how TSA airport officials build threat items and test bags for FET tests may affect the quality of the test results used for comparison purposes. Security Operations requires that FET personnel build the threat items, such as explosive devices, that are used for scenarios according to specifications included within TSA headquarters-disseminated scenarios. These scenarios provide a description of the test scenario, a list of materials needed for the threat item, assembly instructions, and directions on how to conceal the threat item within checked or carry-on baggage. TSA provides standard kits to local airports that contain some of the materials FET teams need to build threat items (e.g., an explosive simulant), but TSA staff at the airport must independently procure a number of items needed for each scenario. Given that approximately 80 different teams of FET testers use non-standardized items to build and conceal threat items for tests, the test bags used by teams of FET testers vary to a certain extent across test programs nationwide. According to TSA officials, variations in the construction of test bags (including the simulated explosive devices and test bag assembly) can affect how easy or difficult it is to detect a threat item. The program manager for the HET-FET testing program agreed there is a need for greater assurance of the quality of covert test results, but stated that Security Operations has not taken action on this issue due to resource constraints. However, quality assurance is critical to ensure that the resources TSA has invested in covert testing will yield valid and usable information. Moreover, given its resource constraints, Security Operations’ actions to improve local airport test results could encompass less resource-intensive undertakings, such as providing more standardized items for FET tests or improving guidance to address issues that impact the covertness and consistency of tests. Standards for Internal Control in the Federal Government states that management should use quality information to achieve an entity’s objectives, and that reliable internal sources should provide data that are reasonably free from error and bias and faithfully represent what they purport to represent. By assessing its current FET testing processes— including factors that may compromise the covertness and consistency of tests—Security Operations could identify opportunities to improve the quality of its testing. Further, making changes to its testing process based on its assessment of the current FET testing process could help improve the quality of test results. This, in turn, would better position those who use these results (including agency leadership and TSA airport officials) to reliably identify and address vulnerabilities based on TSO performance. In addition, we found that issues we identified with the quality of FET test results also affect Security Operations’ reporting to external stakeholders. As previously discussed, officials internal and external to TSA use Security Operations test results to assess the effectiveness of TSO performance. Currently, Security Operations reports quarterly FET detection rates as a performance measure to the Office of Management and Budget. The measure identifies the percent of time that TSOs correctly detect threat items at the checkpoint (concealed in carry-on baggage and on the passenger’s body) and within checked baggage. However, as previously discussed, we found that airport testers were not generating quality covert test information on checkpoint screening because their FET detection rates were higher than the HET rates used for comparison, and the difference between the rates exceeded the criterion TSA established for quality covert test information. TSA management officials acknowledged that the agency needs to use more reliable covert test results for measures reported to the Office of Management and Budget. In October 2018, TSA notified the Office of Management Budget that it is in the process of assessing the quality of covert test results it uses to report on TSO performance, and expects to develop new measures by fiscal year 2020. In addition to issues with the overall quality of airport test results, we found that Security Operations faced challenges with the quality of information it collected on the root cause of tests failures. For each test failure, HET and FET testers are to use the TPF tool to identify and record the factor, or root cause, leading to a covert test failure. The TPF tool groups test failure factors into three main categories—(1) failures characterized by the screener’s lack of knowing what is required to effectively accomplish a task or job (a knowledge deficiency); (2) failures caused by incorrectly performing a procedure (a skill deficiency); or (3) failures due to the TSO not assigning the correct level of importance to performing a specific screening procedure (a value deficiency). Although Security Operations has provided some guidance on when to apply a particular factor as a root cause for a covert test failure, this guidance may not be adequate and some testers may not be selecting factors appropriately as a root cause. In our analysis of the factors assigned by both Security Operations HET and FET testers for all covert test failures in fiscal year 2017, we found that testers assigned one factor more than the other two. To assist HET and FET testers in conducting root cause analyses for test failures, Security Operations provides definitions of the three root causes (knowledge, skills, and value). It also requires that all testers (HET or FET) complete three online exercises for using the TPF tool to record results, but the exercises do not provide additional guidance on how to appropriately select root causes. In addition, Security Operations provides in-person training to all HET testers that includes a practice case on selecting from among the factors, and the training course material indicates that the process can be subjective. In our observation of HET tests, we observed numerous failures in which HET testers had to assign a root cause. In a majority of these failures, the tester attributed the same factor as the root cause. HET testers who completed the root cause analyses for these failures all told us they assigned this particular factor by default, once they ruled out the other two causes. Our observations were consistent with a 2017 independent evaluation of the TPF tool performed by the DHS Science and Technology Directorate. Among other things, subject matter experts conducting the 2017 evaluation found that testers they spoke with were not clear on the meaning of the three root causes, and the evaluation recommended that Security Operations provide better guidance to testers on how to select the root cause of a test failure. Security Operations’ program managers concurred with the DHS Science and Technology Directorate’s recommendation that testers need better guidance on how to select among the factors as the root cause for test failures. They also stated they are working on guidance to assist testers in selecting the appropriate root cause for failures. However, in September 2018, program managers told us they had suspended these efforts to address the recommendation as a result of TSA efforts to transfer program operations to Inspection and in anticipation of broader changes to the Security Operations testing program. Inspection officials, who will assume responsibility for HET and FET testing once the transfer of the program to Inspection is complete, stated that they were unsure what changes they would make to Security Operations’ legacy testing process with respect to HET and FET tests at local airports, but stated both types of testing will continue to use their respective legacy testing processes in fiscal year 2019 until final decisions are made. Standards for Internal Control in the Federal Government states that management should use quality information to achieve an entity’s objectives, and that reliable internal sources should provide data that are reasonably free from error and bias and faithfully represent what they purport to represent. As long as Security Operations’ legacy testing process is in use, testers will continue to inconsistently and potentially incorrectly identify the root cause for test failures, and in doing so, will diminish the usefulness of root cause information for addressing TSO performance problems. Reviewing existing guidance and training and providing, where appropriate, additional clarification on applying the factors as a root cause would allow TSA to collect more reliable information on the factors leading to test failures. This, in turn, would better position those who use this information (including agency leadership and TSA airport officials) to address root causes of screener failures at individual airports and across the entire system. Security Operations has not fully documented its methodology for using HET testing as a quality assurance process for FET test results. While Security Operations has documented some aspects of the HET test process, such as training for HET testers on how to conduct tests and post-test reviews with TSOs, we found that Security Operations has not documented its methodology for using HET tests to ensure the quality of FET test results in either its program guidance or other internal documentation. For example, Security Operations has no documentation on how program managers should select airports (e.g., by airport category) and scenarios for HET testing, as well as how they should analyze, compare, and report on HET test results against FET test results. Security Operations officials described some aspects of how they calculate HET and FET test detection rates for comparison purposes, but they did not have a documented methodology for this quality assurance process. For example, Security Operations officials said that they only use data from the largest airports that receive both HET and FET tests (approximately 120 of the about 440 commercial airports) for comparison purposes. Security Operations officials also explained they exclude all HET and FET tests involving enhanced screening from the rates used for comparison purposes because enhanced screening involves a more detailed inspection of the subject that tends to result in the screeners identifying threat items at a higher rate. In addition to these explanations, program managers provided a document explaining Security Operations’ rationale for selecting each of the HET test scenarios used for the last half of fiscal year 2017. While these explanations and the accompanying documentation helped clarify aspects of Security Operations’ process, Security Operations has not developed a policy that provides a comprehensive description (and therefore understanding) of the quality assurance process that its program managers are to use for program planning purposes. Such a policy would describe Security Operations’ approach to selecting HET test scenarios used for ongoing covert testing, how it calculates and compares test results, and how it reports and uses the results. Security Operations program managers agreed that more transparent information regarding the use of HET test results to assess FET test results would be beneficial, but, given that the program was established in late 2016, they acknowledged that they have not had time to document this process. Standards for Internal Control in the Federal Government states that all transactions and other significant events need to be clearly documented, and this documentation should be readily available for examination. The documentation should appear in management directives, administrative policies, or operating manuals. By fully describing its methodology for comparing the results of HET testing with FET test results as a quality assurance process within its program guidance, Security Operations can better ensure that all aspects of this process are clear and available for assessment and validation by third party users of HET and FET test information, such as TSA senior leadership officials. Doing so can also ensure that future program managers for the HET-FET test program can continue to use this quality assurance method appropriately by following the guidance. Inspection submits its covert test findings that it determines to be security vulnerabilities to TSA’s Security Vulnerability Management Process. TSA established this agency-wide process in 2015 to review and address any systemic vulnerability facing TSA (including those related to checkpoint and checked baggage screening). However, it is unclear if vulnerabilities reviewed through this process are being addressed in a timely manner because the process lacks clear timeframes and milestones for mitigation steps, as well as an established method for monitoring the achievement of such timeframes and milestones. In 2015, before establishing the Security Vulnerability Management Process, TSA conducted a review of then-existing processes for evaluating and managing identified vulnerabilities, and found that they were not centralized and did not ensure the level of visibility and accountability needed to adequately mitigate and resolve (or close) the vulnerabilities. Consequently, TSA determined that its processes for tracking and managing the closure of identified security vulnerabilities represented an organizational deficiency that should be addressed. In addition, Inspection officials stated that, under the prior processes, they lacked complete knowledge of all agency resources that could be leveraged to develop mitigation strategies, as well as the necessary authority to compel offices to share these resources, which made it difficult to ensure identified vulnerabilities were addressed. As a result, TSA created the Security Vulnerability Management Process to better ensure the cooperation of various program offices within TSA that had the expertise needed to address vulnerabilities identified by Inspection or other offices within TSA. This process is intended to centralize agency efforts to mitigate vulnerabilities by ensuring that they receive agency- wide visibility and are evaluated, resourced, and managed by appropriate TSA program offices until fully addressed. TSA’s Strategy, Policy Coordination, and Innovation office is responsible for managing and overseeing the Security Vulnerability Management Process, as well as enforcing deadlines for vulnerability mitigation. The Strategy, Policy Coordination, and Innovation office submits vulnerabilities for review by one of two groups of TSA stakeholders—the Executive Risk Steering Committee or the Risk Assessment Integrated Project Team. These two groups are responsible for identifying all TSA program offices affected by the vulnerability in question and working with those program offices to determine whether and how vulnerabilities can be mitigated and formally closed (see fig. 2). According to TSA Strategy, Policy Coordination, and Innovation office officials, to close a given vulnerability, one of the two groups will assess whether the risk posed by the vulnerability aligns to the identified amount of risk that TSA is willing to accept. TSA officials told us that the agency is risk averse to any vulnerability that could cause catastrophic consequences, such as the loss of an airplane. The Strategy, Policy Coordination, and Innovation office has responsibility for enforcing deadlines for mitigating identified vulnerabilities, but our review of TSA documentation found that the office does not establish timeframes and milestones to ensure measured progress toward mitigation of those vulnerabilities. Moreover, we found that although the Security Vulnerability Management Process charter establishes a broad framework for developing and implementing mitigation strategies, it does not establish a method for how the Strategy, Policy Coordination, and Innovation office is to monitor mitigation activities to ensure that TSA program offices are meeting identified timeframes and milestones, such as by identifying a person or entity responsible for escalating cases when these requirements are not being met. Specifically, we found that Inspection has submitted nine vulnerabilities for consideration. With one exception, as of September 2018, none of the vulnerabilities have been formally closed as a result of mitigation steps taken via the vulnerability management process. Under the process, a vulnerability owner has responsibility for developing and leading mitigation efforts for a specific vulnerability. TSA closed one of the nine vulnerabilities 2 years after submission to this process because the relevant program office made policy changes that addressed Inspection’s interim findings. The remaining vulnerabilities have been in progress from 4 months to 2.5 years. Of these eight vulnerabilities, five have had TSA offices assigned as vulnerability owners, and three of these five have mitigation efforts in progress. The three remaining open vulnerabilities that did not yet have vulnerability owners assigned at the time of our review had been waiting for vulnerability owners for a period of 4, 5, and 7 months, respectively; however, TSA officials told us that these three open vulnerabilities had owners assigned in September 2018. TSA officials told us that timeframes for vulnerability mitigation can vary due to the number of stakeholders required to address the situation. They also explained that the complexity of certain threats affect the timeliness of final mitigation solutions (e.g., those requiring technology solutions can involve multiple TSA offices); and before such solutions are developed, Inspection works with program offices to help them develop interim mitigation procedures. Additionally, they cited factors beyond TSA’s control that can delay mitigation efforts, such as changes to agency leadership or in staff within a particular office. For example, mitigation has been delayed for one of the vulnerabilities under review for over 2 years, due to changes in agency leadership in 2016, among other things. In another example, TSA officials told us that mitigation for a vulnerability under review had been delayed for over two years due to personnel changes within the office tasked with developing and leading mitigation efforts. Inspection officials told us that while officials are working on mitigation solutions for identified vulnerabilities, Inspection will assist TSA program offices with implementing interim mitigation procedures before formal mitigation plans are developed. For example, Inspection officials stated that they worked with Security Operations to provide interim guidance to TSA airport officials to address an identified vulnerability that involved Transportation Security Specialists for Explosives using screening equipment incorrectly to clear passengers through the checkpoint. Although TSA has implemented interim mitigation steps for some vulnerabilities while its program offices develop long-term solutions, in some cases Inspection’s findings represent system-wide vulnerabilities to commercial aviation that could result in potentially serious consequences for TSA and the traveling public. For this reason, it is important that TSA make timely progress on formal mitigation solutions. Moreover, tracking progress for a given vulnerability against timeframes and milestones would not necessarily preclude TSA program managers from accounting for complex mitigation efforts. Program managers could, for example, establish longer timeframes at a mitigation effort’s onset and adjust these as needed, should challenges arise. The Standard for Program Management states that the governance of programs includes establishing minimum acceptable criteria for success and the standards by which they are measured and communicated to achieve desired outcomes. Additionally, programs should include the concept of time and incorporate schedules through which specific milestone achievements are measured to ensure that appropriate progress is made toward achieving a defined set of outcomes. In TSA’s case, this would mean the mitigation of identified vulnerabilities. The Standard for Program Management further states that program governance plans are to describe the systems and methods to be used to monitor a given program, and the responsibilities of specific roles for ensuring the timely and effective use of those systems and methods. TSA officials agreed that their vulnerability management process lacks a clear set of deadlines for the timely completion of mitigation steps, as well as a method for monitoring completion of these steps to ensure vulnerabilities are closed. By establishing timeframes and milestones for vulnerability mitigation, TSA would better ensure that progress toward addressing vulnerabilities continues, despite internal challenges, such as personnel changes, or external factors. In addition, by establishing the methods by which TSA’s Strategy, Policy Coordination, and Innovation office will monitor milestones for completion, and the steps it will take when mitigation is not progressing as planned, TSA will be better positioned to ensure that the agency is making measured progress toward addressing the vulnerabilities managed through this process. Security Operations program managers said that they continuously monitor covert test results to identify potential vulnerabilities and to assess progress at airports in addressing vulnerabilities identified through covert tests. Security Operations primarily monitors TSO performance by reviewing information within its TPF tool. Specifically, program officials said that they monitor the database each month to identify gaps between HET and FET detection rates at an individual airport and regional level. Security Operations officials said that they will alert TSA officials at airports if they detect anomalies or large disparities between their HET and FET test rates, and suggest strategies for conducting tests. While reviewing the data, Security Operations officials told us they may also identify specific test scenarios that TSOs are experiencing difficulties with, and sometimes develop strategies to improve performance. For example, officials said that when TSOs demonstrated difficulty with a scenario involving colorimetric testing, Security Operations developed a pamphlet for TSOs to clarify those procedures. Security Operations’ monitoring has also resulted in changes to processes and procedures. For example, according to TSA documentation, in early 2016 Security Operations officials conducted an ad hoc analysis of relevant covert test data. This analysis led to the implementation of Enhanced Accessible Property Screening procedures for personal property screened at airport checkpoints. According to TSA documentation, these new procedures are intended to help TSA officers obtain a clearer X-ray image to enhance screening effectiveness. Among other things, they involve advising passengers to remove organic materials from carry-on bags for X-ray screening, requiring that electronics larger than a cell phone be removed from carry-on bags and placed in bins for X-ray screening, and more targeted property search protocols. In addition to periodic monitoring of test data within the TPF tool’s database, Security Operations officials also told us they monitor Threat Detection Improvement Plans, which are based on recommended actions stemming from each airport’s covert testing results. TSA officials told us that these plans can include test-specific action plans and high-level improvement strategies. Security Operations now monitors airport progress against these plans in order to ensure that airports are taking the necessary actions to improve TSO performance deficiencies identified in covert testing. Security Operations officials told us they use covert test results as the basis for feedback and periodic reporting on TSO performance and the quality of covert test programs or results to headquarters, regional, and local TSA officials and other stakeholders. According to Security Operations officials, this feedback and reporting includes the following. HET reports and feedback: Security Operations directly communicates with TSA officials at airports on HET test performance. For example, in our observations of HET tests at airports, testers conducted an equal number of post-test reviews, during which they reviewed with TSOs and their supervisors the intent and results of the HET tests, reinforced actions resulting in test successes, and reviewed the correct procedures for any failures. In addition to post- test reviews, at the conclusion of each HET test at an airport, Security Operations program managers provide TSA management at the airport a report compiling the results of the recent HET test and statistics on the quality of the covert test program at the airport. According to TSA documentation, these reports include a comparison of local FET test results against the results of HET tests that were conducted during that visit. TPF Report: On a monthly basis, according to TSA documentation, Security Operations also provides a classified spreadsheet report to FSDs that contains a high-level analysis of HET and FET covert test data collected for the fiscal year to date, as well as a copy of the most current test results in the TPF tool’s database. Security Operations program managers stated that allowing airports access to the entire database allows FSDs to compare their airport’s performance against counterparts in other regions and address any areas in which they are lagging. In our interviews with FSDs, we found that officials from all of the airports we spoke with used the TPF data to help manage TSOs. For example five FSDs told us they download the raw test data into local systems for use in their local processes for monitoring TSO performance. Classified monthly conference calls: According to TSA officials, Security Operations hosts monthly classified conference calls with local and regional TSA officials to discuss issues related to covert testing. Security Operations officials told us these discussions typically include the results of specific covert test rounds, methods for using covert tests results, and FSDs’ beneficial practices for carrying out covert testing at their airports. Reporting to senior leadership and other stakeholders: Security Operations officials said they continue to use covert test results for monthly briefings to FSDs and TSA senior leadership. According to TSA documentation, these briefings include high-level analysis of regional covert test performance, as well as overall comparisons of detection rates for on-person, in-property, and checked baggage tests against the national averages. As previously discussed, TSA also uses FET test results as the basis of a performance measure reported quarterly to the Office of Management and Budget. FSDs we spoke with told us they find the feedback and reporting they receive from Security Operations program managers to be helpful. In particular, all 10 FSDs we spoke with told us they find both the HET test reports and accessibility to TPF data in the monthly spreadsheet report to be beneficial and useful. FSDs also noted that the HET reports help inform their assessments on individual and airport workforce performance and efforts to improve their airport’s screening operations overall. While Security Operations program officials perform some high-level analysis of TPF data for periodic reporting, they do not analyze all Security Operations-collected covert test data to identify potential national trends in screener performance that could constitute system-wide vulnerabilities. For example, according to officials and TSA documentation, Security Operations officials use FET and HET covert test data to describe broad trends in screening performance in monthly briefings to TSA management. However, the briefings do not include a breakdown of the different screening tasks and processes that may be most often associated with TSO failures nationally. In addition, although the TPF tool’s database contains information on the task, process, and factors associated with each TSO test failure, Security Operations does not typically include a comprehensive analysis of this information within the monthly covert test reports it provides to TSA leadership at airports. For example, based on our review of Security Operations’ monthly TPF reports, they identify which processes have resulted in the most failures, but do not identify which factors—knowledge, skill, or value—were the root cause of these failures. Moreover, none of this reporting reflects a broader analysis to identify whether failures or causes were associated with a certain size of airport or reflected across one or more regions. Standards for Internal Control in the Federal Government states that an agency should design its information systems to respond to the entity’s objectives and risks. Furthermore, agencies may use information from these systems to evaluate the agency’s performance in achieving key objectives. As discussed previously, Security Operations officials have performed similar types of analysis in the past with positive results. For example, when TSA developed the Enhanced Accessible Property Screening procedures in 2017, these actions were based (in part) on ad hoc analysis Security Operations conducted with national covert test data. At the time, Security Operations’ analysis showed that X-ray operators at checkpoints had problems determining the threat nature of certain categories of objects. This led to repeated failures in detection given the time and cognitive load requirements for interpreting those types of X-ray images. In response, TSA created or adjusted specific procedures based on the analysis of root causes of testing failures and the results of piloting new screening procedures at multiple sites to ensure effectiveness and efficiency could be sustained. Security Operations officials agreed that conducting a more comprehensive, national-level analysis, and utilizing more of the covert test data currently within the TPF tool’s database, would be useful in identifying system-wide vulnerabilities that could inform efforts to improve TSO performance. Security Operations officials told us that at present, they do not have a standard process to comprehensively analyze and report trends in TPF data across all airports. This is because the intent of the current program has been to make test data available to TSA airport and regional officials so they can identify factors affecting screener performance and take actions to remediate and improve any deficiencies. In addition, Security Operations officials cited a lack of resources available to dedicate to this activity, given that headquarters officials have been more focused on revising and improving their current covert test program. However, Security Operations’ TPF tool and database has enabled it to document and communicate detailed information on TSO performance, such as the different screening tasks (e.g., advanced imaging technology operation) and processes (e.g., resolving advanced imaging technology anomalies) where screeners encounter difficulties. Given the breadth of testing conducted and information collected, more comprehensive analysis of TPF data could help TSA identify and communicate important potential trends in the vulnerabilities that TSOs face across all airports. A comprehensive analysis of TSO performance at the national level beyond calculation of overall detection rates would provide Security Operations greater knowledge about the reasons for, and factors associated with, system-wide vulnerabilities due to TSO performance of checkpoint and checked baggage screening, which would better position TSA to address these security gaps. For example, having this information could allow Security Operations to provide more focused training and testing for these functions at the airport level. The information could also position TSA to allocate resources for high-priority issues across all airports. TSA officials at individual airports reported using different tools, techniques, and processes for conducting covert tests and using test data, but Security Operations does not document and disseminate this information. In our discussions with 10 FSDs and their management teams, officials identified a variety of tools, processes, and methods that were developed based on their experiences with covert tests and the resulting actions they took to utilize test data to improve TSO performance. Specifically, 5 of the 10 FSDs we spoke with said their teams developed some type of customized internal databases to aggregate all of their airports’ covert test results, other performance- related data, and any additional Inspection information. FSDs and their staff said such a tool helped present a holistic picture of TSO performance for training and development purposes. Likewise, 5 of the 10 FSDs we spoke with said that they use test results to develop TSO performance baselines and training plans with requirements that exceed TSA’s minimum standards for remediation. Additionally, 5 of 10 FSDs stated that they now include supervisory TSOs and/or TSA leadership officials at airports in remediation discussions with individual TSOs after covert tests take place to provide leadership officials with experience on how best to coach and develop staff. TSA officials we spoke with at airports and at the regional level said that individual airports are often a source for innovation with respect to executing covert tests and using test results, which has at times led to pilot efforts that were adopted at other airports either regionally or nationally. For example, officials from one TSA region told us that they were the first to develop and use performance scorecards (which incorporate covert test results) as an additional tool for improving screener performance. These scorecards were eventually adopted nationwide. Most of the FSDs we spoke with said they communicate with their counterparts at other airports to discuss covert test practices and beneficial methods for using test results at their respective airports. For example, officials from one airport we spoke with reported traveling to an airport in a different region to learn more about the team’s TSO remediation process, which involved using the results of covert testing, Threat Image Projections, and other assessments to create tailored corrective action plans for TSOs. The officials said that this process was an improvement from the one they used previously because it incorporated a greater variety of remediation actions, such as training courses or shadowing opportunities. As discussed previously, Security Operations officials communicate with TSA officials at airports on their covert test programs during a monthly classified call with all FSDs and their teams. This allows Security Operations program managers to provide FSDs with an update on results from recent HET and FET tests, among other things. Security Operations program managers stated that during these calls, they encourage TSA officials not only to discuss particular issues or challenges they have faced with respect to covert testing at their airports, but also to highlight beneficial practices for conducting tests and using test results to improve TSO performance that they and their teams have self-identified and implemented. Therefore, these calls also serve as a forum for FSDs to discuss successful techniques for running covert tests and using test results. In our discussions with 10 FSDs, 8 out of 10 told us they have independently adopted beneficial practices used by other airports. Security Operations program managers are privy to beneficial practices discussed during their teleconferences with local and regional TSA officials, but they told us that they do not regularly document or disseminate this information to TSA officials at airports. Security Operations program managers explained that the call itself is adequate for TSA airport officials to share information, and that local or regional officials can follow up with one another if they want to discuss them further. However, while a monthly conference call may be helpful for informal sharing of practices, it does not capture the breadth of methods or practices used by some TSA airport officials. Moreover, according to headquarters officials, while conference calls provide an opportunity for FSDs to discuss beneficial practices, sharing is ad hoc and the level of detail provided about methods and practices can vary. Systematically documenting and disseminating these practices would provide TSA officials at airports more accurate and complete information about beneficial practices in use at airports nationwide, so that they could be more readily implemented at other airports. The National Infrastructure Protection Plan states that in order to ensure that situational awareness capabilities keep pace with a dynamic and evolving risk environment, officials should improve practices for sharing information and applying the knowledge gained through changes in policy, process, and culture based on shared understanding of efforts to improve security and resilience. This plan also states that documenting and building upon beneficial practices is a key part of information sharing within a critical infrastructure risk management framework. Our interviews with FSDs revealed an array of tools, techniques, and processes for covert testing that TSA officials at airports developed to address local and regional needs. A process to systematically document and disseminate more accurate and complete information on these tools, techniques, and processes that captures the breadth of methods or practices used by some TSA airport officials could help TSA conduct better covert tests and more successfully use test results to improve TSO performance, as well as inform revisions to TSA’s national covert test program. Given the persistent threats to the aviation system, TSA must ensure that its covert testing program operates as effectively as possible to identify and address potential vulnerabilities in the checkpoint and checked baggage screening systems across the nation’s airports. TSA has strengthened the quality and rigor of its covert test programs since 2016, but additional steps are needed to better ensure that TSA targets the areas of highest risk in selecting attack scenarios for testing. Without using a risk-informed approach to selecting screening activities to test, TSA cannot ensure that it is targeting those aspects of TSA screening that pose the greatest known risks. In addition, without documenting its rationales behind how and why certain scenarios are selected for covert testing, TSA cannot demonstrate how its selections reflect identified risks in the aviation environment. New processes for covert testing implemented by Security Operations and Inspection have identified important vulnerabilities in checkpoint and checked baggage screening for fiscal years 2016 and 2017. However, these results can only be useful if they meet internal standards for quality test results. While Inspection’s new process generally produced quality test results on screening vulnerabilities, Security Operations continues to face challenges with the quality of test results collected by TSA staff at local airports. Without taking steps to ensure that Security Operations collects more valid and usable information on vulnerabilities, including the root cause of test failures, TSA will not be positioned to reliably identify and address important security vulnerabilities. In addition, without documenting its methodology for comparing the results of covert tests, TSA cannot ensure that its quality assurance process is consistently applied and transparent. Once vulnerabilities have been identified through covert testing, it is paramount that they are effectively and efficiently mitigated or addressed. Establishing the Security Vulnerability Management Process was a good step toward better tracking the vulnerabilities identified through covert tests and deploying resources to mitigate them, but key identified vulnerabilities have been stalled in the process and none have been closed using this process. This has largely been caused by the absence of timeframes and milestones for achieving mitigation and monitoring key activities in the process. Unless TSA incorporates these aspects into its vulnerability management guidance, it cannot ensure that it is effectively addressing security vulnerabilities that could result in potentially serious consequences for the traveling public. Additionally, while TSA shares some covert test information with TSA officials at airports, more comprehensive analysis of covert test information is needed to enhance TSA’s knowledge about the reasons for, and the factors associated with, TSO performance vulnerabilities that exist system-wide. Furthermore, although TSA officials at individual airports informally share information about beneficial practices they use to conduct covert tests and how they use test information, without systematically documenting and disseminating these practices, TSA cannot ensure that airport officials are fully informed about the different tools, techniques, and processes used by their colleagues. We are making the following nine recommendations to TSA: The Administrator of TSA should document its rationale for key decisions related to its risk-informed approach for selecting covert test scenarios, for both the Security Operations’ and the Inspection’s testing process. (Recommendation 1) The Administrator of TSA should incorporate a more risk-informed approach into Security Operations’ process for selecting the covert test scenarios that are used for tests conducted by TSA officials at airports. (Recommendation 2) The Administrator of TSA should assess the current covert testing process used by TSA officials at airports—including factors that may affect the covertness and consistency of the tests—to identify opportunities to improve the quality of test data, and make changes as appropriate. (Recommendation 3) The Administrator of TSA should assess Security Operations guidance for applying root causes for test failures, and identify opportunities to clarify how they should be applied. (Recommendation 4) The Administrator of TSA should document the methodology for using the results of covert testing conducted by headquarters staff as a quality assurance process for covert testing conducted by TSA officials at airports. (Recommendation 5) The Administrator of TSA should establish timeframes and milestones for key steps in its Security Vulnerability Management Process that are appropriate for the level of effort required to mitigate identified vulnerabilities. (Recommendation 6) The Administrator of TSA should revise existing guidance for the Security Vulnerability Management Process to establish procedures for monitoring vulnerability owners’ progress against timeframes and milestones for vulnerability mitigation, including a defined process for escalating cases when milestones are not met. (Recommendation 7) The Administrator of TSA should develop processes for conducting and reporting to relevant stakeholders a comprehensive analysis of covert test results collected by TSA headquarters officials and TSA officials at airports to identify vulnerabilities in screener performance and common root causes contributing to screener test passes and failures. (Recommendation 8) The Administrator of TSA should develop a standard process for systematically documenting and disseminating to airport Federal Security Directors beneficial practices for conducting covert tests and using test results. (Recommendation 9) We provided a draft of this report to DHS and TSA for review and comment. DHS provided written comments which are reprinted in appendix II. In its comments, DHS concurred with all 9 recommendations and described actions planned to address them. TSA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. This report addresses the Transportation Security Administration’s (TSA) covert testing for checkpoint and checked baggage screening. More specifically, the report (1) describes how TSA has changed its covert test processes since 2016 and analyzes the extent to which these processes are risk-informed; (2) analyzes the extent to which TSA covert tests for fiscal years 2016 through March 2018 produced quality information; and (3) analyzes the extent to which TSA has used the results of covert tests to address any identified security vulnerabilities. To understand how both the Security Operations and Inspection offices changed their respective covert test processes since 2016, we reviewed agency documentation, interviewed agency officials, and observed 22 Security Operations and 4 Inspection covert tests at 5 different airports. In addition to Inspection testing, our observations included two types of testing overseen by Security Operations—Headquarters Evaluation Team (HET) testing and Field Evaluation Team (FET) testing. To gather information on how covert tests are carried out in different airport environments, we observed tests at four category X and one category I airports. We selected airports for observations on the basis of airport category and screener workforce (private vs. TSA-employed screeners). For all observations, we were able to observe TSOs performing checkpoint or checked baggage screening activities during tests. Following all observations, we observed post-test reviews and, when appropriate, interviewed TSA airport officials, including the Transportation Security Officers (TSO) and private sector screeners (collectively referred to as TSOs in this report) who were tested, about their experience with these tests. To determine the extent to which Security Operations and Inspection testing is risk-informed, we reviewed program documentation and spoke with agency officials. Specifically, we reviewed operational guidance and test scenarios, which describe the overall intent of the test, the threat item, and method of execution (e.g., an explosive device concealed in a shoe carried through the checkpoint) to identify how program officials incorporated the components of risk—threat, vulnerability, and consequence—in their selection of threats and airports to test. We also reviewed the TSA risk assessments that would have been available to Inspection and Security Operations when planning which threats and airports to test for fiscal year 2017, namely TSA’s 2016 Transportation Sector Security Risk Assessment and TSA’s 2012 Current Airports Threat Assessment. The 2016 Transportation Security Sector Risk Assessment contained attack scenarios for the five transportation modes for which TSA is responsible, including domestic and international commercial aviation, as well as other mass transit systems, such highway and mass transit. For our analysis, we used those scenarios relevant to our scope— domestic commercial checkpoint and checked baggage screening. We compared the results of these assessments to the threat items and locations that Security Operations selected for tests in fiscal year 2017 and Inspection selected for tests in fiscal years 2016 and 2017. We evaluated each office’s process for making risk-informed decisions with Department of Homeland Security (DHS) risk management policies, which require that agencies use risk information and analysis to inform decision making, and that risk management methodologies should be transparent and properly documented. To assess the quality of Security Operations data, we reviewed program guidance and interviewed program officials to understand how Security Operations uses HET test results to validate the quality of FET testing at local airports. We also reviewed a 2016 validation study of Security Operations’ test process conducted by the DHS Office of Science and Technology, and spoke with subject matter experts who conducted the study about their findings and recommendations related to improving the quality of test information. We concluded the study’s findings were reasonably sufficient to use as additional support for patterns we also observed during site visits. We were also informed by our HET and FET test observations, which included observations of 19 HET tests at 3 different airports, and 3 FET tests at 1 airport. We supplemented our understanding of how airports conduct FET tests through semi-structured telephone interviews with 10 different Federal Security Directors (FSD) and their staff. To select FSDs for interviews, we identified the airports at which TSA conducted more than the average number of HET covert tests in fiscal year 2017. We focused on the number of HET (as opposed to FET) tests because they are Security Operations’ quality assurance method for airport covert test programs, and we wanted to ensure FSDs had sufficient experience with these tests to provide us perspectives. From this group, we identified the airports with the highest and lowest pass rates for HET tests, and selected among these to reflect variation in several factors, including airport category, difference between HET and FET detection rates, and whether the airport had been tested by Inspection in fiscal years 2016 and 2017. Finally, to assess the quality of Security Operations’ testing, we calculated detection rates for its two types of testing—Headquarters Evaluations Team (HET) tests, in which Security Operations headquarters staff travel to airports to conduct tests, and Field Evaluations Team (FET) tests, which are conducted by staff at local airports. We assessed FET test results against Security Operations’ criterion stating that differences in HET and FET detection rates must be within a designated number of percentage points. We made these comparisons analyzing complete test results for fiscal year 2017 and the first 6 months of fiscal year 2018, over three 6-month periods in order to identify trends. We used for our analysis the12,000 fiscal year 2017 Security Operations TPF records documenting the results of individual covert tests, and an additional 3,600 records from fiscal year 2018. For our analysis, we calculated HET and FET detection rates (i.e., number of items successfully detected) for three screening paths: a checkpoint test with the item concealed on the tester, a checkpoint test with the item concealed in a carry-on bag, and a checked baggage test with the item concealed in the checked bag. In calculating these detection rates, we included only results for scenarios tested within the 18-month period that had both HET and FET tests, and we excluded any test results for scenarios involving enhanced screening. Also, in our calculation of the FET detection rate, we included FET test results for all airports, including those from smaller (category III and IV) airports, which HET teams generally do not visit. We chose to include FET results from all airports in our analysis because it better reflected the overall performance of airports on covert tests. In addition to comparing Security Operations’ quality assurance process against the program’s criteria, we assessed it against federal internal control criteria for documenting processes. To assess the quality of Inspection testing, we reviewed program guidance to identify testing requirements, methods, and limitations. We also observed four different tests conducted at a Category X airport. In addition, we reviewed Inspection guidance to identify and assess requirements for analyzing and reporting covert test results, and reviewed completed reports to identify the extent to which Inspection followed these requirements. We met with Inspection technical experts to discuss Inspection processes for selecting a sample of airports for tests and for analyzing and compiling covert test findings. To assess the extent to which Inspection and Security Operations address security vulnerabilities, we reviewed their efforts separately because each office utilized a different approach. To assess Inspection’s efforts, we focused on its use of the Security Vulnerability Management Process, an agency-wide process that Inspection designated in 2016 as the principal means by which it addresses its identified vulnerabilities. To obtain a more complete understanding of the extent to which this process has addressed Inspection vulnerabilities, we reviewed documentation related to the process (such as its charter) and other information pertaining to all vulnerabilities Inspection has submitted to the process, including those that were unrelated to checkpoint and checked baggage screening (e.g., cargo screening). We analyzed timeframes associated with the vulnerabilities reviewed under the process and the progress made toward closing nine Inspection-identified vulnerabilities. We assessed the vulnerability management process against standards for program management issued by the Project Management Institute, a not-for-profit association that provides global standards for, among other things, project and program management. Given the focus of Security Operations’ testing on screener performance, the vulnerabilities it identified involved TSO failures on tests of specific procedures. To determine how Security Operations headquarters officials address vulnerabilities involving screener performance, we reviewed program documentation, including program guidance and periodic reporting of results, and interviewed program managers. To understand how the results of covert testing are used at the airport level to improve TSO performance and address other identified vulnerabilities, we conducted semi-structured interviews with 10 TSA FSDs stationed at airports across the United States, and with three TSA Regional Directors. We selected the latter based on whether the Regional Director had under his or her direction at least 1 of 10 FSDs we selected for interviews, and to reflect variety in geographic location. We assessed Security Operations’ and TSA officials at airports’ efforts to use covert test results to address vulnerabilities against federal internal control standards and criteria within the National Infrastructure Protection Plan. This is the public version of a classified report that we issued on January 10, 2019. The classified report included an objective related to identifying the results of covert testing for fiscal years 2016 and 2017 and assessing the quality of this test information. DHS deemed covert testing results (including detection rates and identified vulnerabilities) to be classified information, which must be protected from loss, compromise, or inadvertent disclosure. Consequently, this report omits part of an objective identifying the results of covert testing. DHS also deemed some of information in our January report to be sensitive security information. Therefore, this report omits information describing TSA screening procedures, the results of agency risk assessments, and airport-level covert test results. The performance audit upon which this report is based was conducted from September 2017 to January 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient and appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained from this work provides a reasonable basis for our findings and conclusions based on our audit objectives. We worked with DHS from February 2019 through April 2019 to prepare this unclassified, non- sensitive version of the original classified report for public release. This public version was also prepared in accordance with these standards. William Russell (202) 512-8777 or RussellW@gao.gov. In addition to the contact named above, Ellen Wolfe (Assistant Director), Mona Nichols Blake (Analyst in Charge), James Ashley, Chuck Bausell, Jason Blake, Michele Fejfar, Eric Hauswirth, Susan Hsu, Tom Lombardi, Minette Richardson, and Nina Thomas-Diggs made significant contributions to this report.", "summary": "TSA uses covert testing to identify potential vulnerabilities in checkpoint and checked baggage screening systems at U.S. airports. In 2015, TSA identified deficiencies in its covert testing process, and in 2017, the Department of Homeland Security Office of Inspector General's covert testing identified deficiencies in screener performance. Since these findings, TSA has taken steps intended to improve its covert test processes and to use test results to better address vulnerabilities. GAO was asked to review TSA's covert test programs, including how the results are used to address vulnerabilities. This report analyzes the extent to which (1) TSA covert tests are risk-informed, (2) TSA covert tests for fiscal years 2016 through March 2018 produced quality information, and (3) TSA uses covert test results to address any identified security vulnerabilities. GAO observed 26 TSA covert tests, reviewed TSA guidance, analyzed test data for fiscal years 2016, 2017, and through March 2018, and interviewed TSA officials. Two offices within the Transportation Security Administration (TSA) conduct covert tests at U.S. airports—Inspection and Security Operations. The Department of Homeland Security requires that agencies use risk information to make decisions, and TSA issues annual risk assessments of threats that its program offices should consult when making risk-based decisions, such as what covert tests to conduct. Of the two TSA offices that conduct covert tests, Inspection officials used TSA's risk assessment to guide their efforts. However, Security Operations officials relied largely on their professional judgment in making decisions about what scenarios to consider for covert testing. By not using a risk-informed approach, TSA has limited assurance that Security Operations is targeting the most likely threats. Both Inspection and Security Operations have implemented processes to ensure that their covert tests produce quality results. However, GAO found that only Inspection has established a new process that has resulted in quality test results. Specifically, for the two reports Inspection completed for testing conducted in fiscal years 2016 and 2017 using its new process, GAO found that the results were generally consistent with quality analysis and reporting practices. On the other hand, Security Operations has not been able to ensure the quality of its covert test results, and GAO identified a number of factors that could be compromising the quality of these results. Unless TSA assesses the current practices used at airports to conduct tests, and identifies the factors that may be impacting the quality of covert testing conducted by TSA officials at airports, it will have limited assurance about the reliability of the test results it is using to address vulnerabilities. In 2015, TSA established the Security Vulnerability Management Process to leverage agency-wide resources to address systemic vulnerabilities; however, this process has not yet resolved any identified security vulnerabilities. Since 2015, Inspection officials submitted nine security vulnerabilities identified through covert tests for mitigation, and as of September 2018, none had been formally resolved through this process. GAO found that in some cases, it took TSA officials overseeing the process up to 7 months to assign an office responsible to begin mitigation efforts. In part, this is because TSA has not established time frames and milestones for this process or established procedures to ensure milestones are met, in accordance with best practices for program management. Without doing so, TSA cannot ensure efficient and effective progress in addressing security vulnerabilities. This is a public version of a classified report that GAO issued in January 2019. Information that TSA deemed classified or sensitive security information, such as the results of TSA's covert testing and details about TSA's screening procedures, have been omitted. GAO is making nine recommendations, including that TSA use a risk-informed approach for selecting covert test scenarios, take steps to improve the quality of airport covert test results, and establish time frames and milestones for the key steps in its vulnerability management process. TSA concurred with all nine GAO recommendations.", "document_type": "gao"}
{"report": "Of the eight coal mine operator bankruptcies we identified, three resulted in a transfer of estimated benefit liability from the coal operator to the Trust Fund and five did not, according to DOL. Figure 1 shows how many operators were self-insured or commercially insured at the time of bankruptcy, and if responsibility for benefits was shifted from the bankrupt operator to the Trust Fund. Federal law generally requires coal mine operators to secure their black lung benefit liability. A self-insured coal mine operator assumes the financial responsibility for providing black lung benefits to its eligible employees by paying claims as they are incurred. Operators are allowed to self-insure if they meet certain DOL conditions. For instance, operators applying to self-insure must obtain collateral in the form of an indemnity bond, deposit or trust, or letter of credit in an amount deemed necessary and sufficient by DOL to secure their liability. Operators that do not self-insure are generally required to obtain coverage from commercial insurance companies, state workers’ compensation insurance funds, or other entities authorized under state law to insure workers’ compensation. From 2014 through 2016, three self-insured coal mine operator bankruptcies resulted in a transfer of $865 million of benefit liabilities from the coal operators to the Trust Fund, according to DOL estimates (see table 1). DOL estimates for how these bankruptcies will affect the Trust Fund have considerably increased from what DOL had previously reported. In June 2019, we reported that DOL estimated that between $313 million to $325 million in benefit liabilities would transfer to the Trust Fund as a result of these bankruptcies. In January 2020, however, DOL provided updated estimates stating that $865 million in benefit liabilities would transfer to the Trust Fund as a result of these bankruptcies. According to DOL, their estimates increased, among other reasons, to account for higher black lung benefit award rates that occurred from fiscal years 2016 through 2019, and higher medical treatment cost inflation in recent years. Additionally, DOL’s prior estimate for the Patriot Coal (Patriot) bankruptcy did not account for future claims and their effect on the Trust Fund. The amount of collateral DOL required from these operators to self-insure did not fully cover their estimated benefit liabilities. When this occurs, benefit liabilities in excess of the collateral can be transferred to the Trust Fund. For example, the collateral DOL required from Alpha Natural Resources (Alpha) was about $12 million and approximately $494 million of estimated benefit liability transferred to the Trust Fund, according to DOL. The three other self-insured coal mine operator bankruptcies we identified did not affect the Trust Fund. Specifically, Arch Coal, Peabody Energy, and Walter Energy were also self-insured operators, but DOL officials said that their federal black lung benefit liabilities were assumed by a reorganized company or by a purchaser, and therefore did not transfer to the Trust Fund. Insurance contracts or policies to secure operators’ benefit liabilities are required by law to include a provision that insolvency or bankruptcy of an operator does not release the insurer from the obligation to make benefit payments. Additionally, state insurance regulation, insurer underwriting, risk management practices, and state guaranty funds help to protect the Trust Fund from having to assume responsibility for paying black lung benefits on behalf of bankrupt coal operators. Thus, by being commercially insured, the two operators we identified that filed for bankruptcy between 2014 and 2016—Energy Future Holdings and Xinergy Ltd—did not affect the Trust Fund, according to DOL (see fig. 1). Since 2016, several other self-insured operators have also filed for bankruptcy, according to DOL officials, including Cambrian Coal, Cloud Peak Energy, Murray Energy, and Westmoreland Coal. DOL officials said that about $17.4 million in estimated black lung benefit liability will transfer to the Trust Fund as a result of Westmoreland Coal’s bankruptcy. Given the uncertainty of the bankruptcy process in terms of whether liabilities will or will not transfer to the Trust Fund, however, DOL officials said that they could not speculate on how these other bankruptcies may affect the Trust Fund. In overseeing coal mine operator self-insurance in the past, DOL did not estimate future benefit liability when setting collateral or regularly review operators to monitor their changing financial conditions. DOL regulations require that collateral be obtained from operators in an amount deemed necessary and sufficient to secure the payment of the operators’ liability. To determine collateral amounts under the former process, agency procedures stated that an operator’s net worth be assessed by reviewing, among other factors, the operator’s audited financial statements and black lung claims information. The amount of collateral was to be equal to 3, 5, or 10 years of the operator’s annual black lung benefit payments made at the time of a coal operator’s self-insurance application depending on its net worth. Specifically, if net worth was $1 billion or greater, agency procedures set collateral equal to 3 years of benefit payments. If net worth ranged from $500 million to $1 billion, collateral was equal to 5 years of benefit payments. If net worth ranged from $10 million to $500 million, DOL set collateral equal to 10 years of benefit payments. Agency procedures did not permit operators with net worth less than $10 million to self-insure. DOL’s former process for determining collateral did not routinely consider potential future claims for which an operator could be responsible. The agency periodically reauthorized coal operators to self-insure by reviewing an operator’s most recent audited financial statement and claims information, among other things. DOL prepared memos documenting these reviews, and communicated with coal operators about whether their financial circumstances warranted increasing or decreasing their collateral. Regulations state that DOL may adjust the amount of collateral required from self-insured operators when experience or changed conditions so warrant, but regular monitoring of self-insured operators was not conducted. In reviewing the most recent reauthorization memos for each of the self-insured operators, we found that while some of these operators had been reauthorized more recently, others had not been in decades. One operator in particular had not been reauthorized since 1988. There were no written procedures that specified how often reauthorizations should occur after an operator’s initial 18-month reauthorization. DOL has other tools available to mitigate financial losses to the Trust Fund. These include revoking an operator’s ability to self-insure; fining mine operators for operating without insurance; and placing liens on operator assets. Based on our review of agency documentation, however, we found instances when officials did not use these tools to protect the Trust Fund, or were hindered from doing so because of an operator’s ongoing appeal or bankruptcy. James River. In September 2001, DOL required $5 million in additional collateral from James River Coal (James River), which would have increased its collateral from $0.4 million to $5.4 million. Although DOL did not receive the additional collateral, it did not revoke the operator’s authority to self-insure, which is a potential option under agency regulations. Further, DOL had not reauthorized James River at any point from August 2001 until it filed for bankruptcy in April 2014. If James River’s ability to self-insure had been revoked, DOL could have potentially prevented the Trust Fund from being responsible for claims based on a miner’s employment from 2001 through 2016, when James River liquidated. Additionally, if the operator had been unable to obtain commercial insurance, the agency could have potentially fined the operator for each day it operated without insurance. Instead, no action was taken during these years and estimated benefit liability of $141 million was shifted to the Trust Fund, according to DOL. DOL officials stated that they do not have records explaining why James River did not provide the additional collateral or why they did not revoke its authority to self-insure. Patriot. In August 2014, DOL required an additional $65 million in collateral from Patriot, increasing its collateral from $15 million to $80 million. Patriot appealed this decision and, in the 8 months that followed before Patriot filed for bankruptcy in May 2015, DOL did not obtain additional collateral, or revoke Patriot’s ability to self-insure because the appeal was still pending. DOL officials said they would not typically revoke an operator’s authority to self-insure during an ongoing appeal. As a result, DOL was hindered from using this enforcement tool. Liens on operator assets can be an effective tool to protect the Trust Fund if an operator defaults on its benefit liability, but DOL officials said they are hindered from using this tool if an operator files for bankruptcy. DOL can place a lien on a coal operator’s assets under federal law if they refuse the demand to pay the black lung benefit payments for which they are liable. In the event of bankruptcy or insolvency, federal law states that the lien imposed shall be treated in the same manner as a lien for taxes due and owing to the United States under certain laws. However, DOL officials said that operators rarely stop paying benefits until after they file for bankruptcy. Once a bankruptcy occurs, DOL officials said that they are generally prevented by the court from placing a lien and taking an operator’s assets in lieu of payment of current and future benefit liability. Under bankruptcy law, DOL officials said that they have no special status over other creditors with outstanding financial claims. DOL officials said that obtaining sufficient collateral is a better way to protect the Trust Fund. In July 2019, DOL began implementing a new process for coal mine operator self-insurance that may help to address some past deficiencies, if implemented effectively. Among other things, DOL will require operators to periodically submit financial and claims information, including an actuarial estimate of the operator’s current and future benefit liability. DOL plans to use this information to assess the insolvency risk of each operator. Depending on the results of their analysis, DOL plans to categorize the risk-level of each applicant as low, medium, or high. DOL will then set the amount of collateral required to self-insure by linking the operator’s risk category to a corresponding percentage of the operator’s actuarial estimated benefit liability. DOL policies state that they would require a high-risk operator to secure with collateral 90 percent of estimated benefit liability, a medium-risk operator to secure 45 percent, and a low-risk operator to secure 15 percent. However, in February 2020, DOL officials said they plan to revise these percentages to 100 percent, 85 percent, and 70 percent for high-risk, medium-risk, and low-risk operators, respectively. Coal mine operators that are already authorized to self-insure will be required to submit, among other things, an annual renewal application. DOL plans to use this information to update their insolvency risk analysis. If an operator’s risk category changes (e.g., from low-to medium-risk), DOL plans to send a form to the operator requiring an additional amount or type of collateral. Upon receiving the completed form, and proof that the collateral has been obtained, DOL stated that they will notify the operator that its authority to self-insure has been reauthorized. DOL’s new self-insurance process made important changes, but overlooked other key internal control improvements that are needed to protect the financial interests of the Trust Fund. DOL’s new requirements for setting collateral and for the more frequent review of self-insured operators are key components of internal controls, which call for agency management to implement control activities through policy. However, DOL’s new self-insurance procedures do not specify (1) the duration of an operator’s self-insurance authority, (2) the time frames for submitting renewal applications and supporting documentation, and (3) the conditions under which an operator’s self-insurance authority would not be renewed. Our report recommends that DOL implement procedures for coal mine operator self-insurance renewal that clarifies how long an operator is authorized to self-insure; when an operator must submit its renewal application and supporting documentation; and the conditions under which an operator’s self-insurance authority would not be renewed. DOL agreed with this recommendation and stated that it will ensure letters granting or renewing self-insurance authority will inform operators that their authorization expires in one year and that they must submit renewal information three months in advance of the expiration date. DOL staff are hindered from taking enforcement action during an operator’s ongoing appeal, as previously mentioned. DOL policies state that an operator may request reconsideration if its self-insurance application has been denied or if it believes the collateral required by DOL is too high to secure its benefit liability. However, DOL lacks procedures that specify, among other things, the length of time that operators have to submit supporting information. Further, DOL does not specify a goal for how much time DOL appeals decisions should take. For example, in October 2015, DOL recommended revoking Murray Energy’s (Murray) authority to self-insure due to deteriorating financial conditions. Murray appealed this decision, and DOL officials said they postponed responding to the appeal until their new self-insurance process was implemented. However, Murray filed for bankruptcy in October 2019 and DOL had not revoked its authority to self-insure or requested additional collateral because Murray’s appeal was still pending and DOL was still evaluating how much collateral it would require from the operator under its new self- insurance process. Our report recommends that DOL develop and implement procedures for self-insured coal mine operator appeals that identify time lines for self- insured operators to submit documentation supporting their appeals and that identify a goal for how much time DOL should take to make appeals decisions. DOL agreed with this recommendation and stated that they will ensure letters denying self-insurance will inform operators that they have a 30-day appeal period (limited to one extension), and that DOL has set a goal of resolving all appeals within 90 days of the denial letter. We found that DOL does not monitor coal mine operators that do not self- insure and, thus, must commercially insure their federal black lung liabilities to make certain they maintain adequate and continuous coverage as required by law. In the absence of effective DOL monitoring, we evaluated the potential risk that uninsured operators could pose to the Trust Fund. Specifically, in examining the 13 largest coal mine operators that do not self-insure, we found that some insurers erred in reporting black lung policies and in one instance an operator did not have adequate coverage. We found six operators (parent or subsidiary) that were not insured for the entire 3-year period from 2016 through 2018, according to our review of DOL data. When we discussed our findings with DOL, agency officials had to research each operator individually and in some cases contact the operator or their insurer to find out whether or not they had been covered. DOL concluded that these entities were insured. However, the insurers had not properly reported the federal black lung endorsement on new policies or subsequent renewals, in addition to other reporting issues. One of these six operators also had, inadvertently, not maintained adequate commercial coverage for its mining operations in Texas, and had not self-insured those operations. In this instance, the operator obtained an excess loss policy that only pays claims once they exceed a high threshold and, therefore, is not sufficient by itself to secure the payment of the operator’s benefit liability. Designing processes to achieve agency objectives and respond to risks is a principle of effective internal controls. Without a process to monitor operator compliance with program insurance requirements, DOL risks not identifying a lapse or cancellation of operator coverage. This could result in the Trust Fund having to assume responsibility for paying benefits that would otherwise have been paid by an insurer. Our report recommends that DOL should develop and implement a process to monitor operator compliance with commercial insurance requirements and periodically evaluate the effectiveness of this process. DOL agreed with this recommendation and stated that it will modify existing computer systems to identify lapses or cancellations of commercial insurance coverage, and require operators identified as having lapsed or cancelled coverage to obtain or provide proof of coverage within 30 days. Chairwoman Adams, Ranking Member Byrne, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staffs have any questions concerning this testimony, please contact Cindy Brown Barnes at (202) 512-7215 or brownbarnesc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Alicia Puente Cackley, (Director), Blake Ainsworth (Assistant Director), Patrick Ward (Assistant Director), Justin Dunleavy (Analyst-in-Charge), Alex Galuten, Rosemary Torres Lerma, Olivia Lopez, Scott McNulty, and Almeta Spencer. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In May 2018, GAO reported that the Trust Fund, which pays disability benefits to certain coal miners, faced financial challenges. The Trust Fund has borrowed from the U.S. Treasury's general fund almost every year since 1979 to make needed expenditures. GAO's June 2019 testimony included preliminary observations that coal operator bankruptcies were further straining Trust Fund finances because, in some cases, benefit responsibility was transferred to the Trust Fund. This testimony is based on GAO's report being released today, and describes (1) how coal mine operator bankruptcies have affected the Trust Fund, and (2) how DOL managed coal mine operator insurance to limit financial risk to the Trust Fund. In producing this report, GAO identified coal operators that filed for bankruptcy from 2014 through 2016. GAO analyzed information on commercially-insured and self-insured coal operators, and examined workers' compensation insurance practices in four of the nation's top five coal producing states. GAO also interviewed DOL officials, coal mine operators, and insurance company representatives, among others. Coal mine operator bankruptcies have led to the transfer of about $865 million in estimated benefit responsibility to the federal government's Black Lung Disability Trust Fund (Trust Fund), according to DOL estimates. The Trust Fund pays benefits when no responsible operator is identified, or when the liable operator does not pay. GAO previously testified in June 2019 that it had identified three bankrupt, self-insured operators for which benefit responsibility was transferred to the Trust Fund. Since that time, DOL's estimate of the transferred benefit responsibility has grown—from a prior range of $313 million to $325 million to the more recent $865 million estimate provided to GAO in January 2020. According to DOL, this escalation was due, in part, to recent increases in black lung benefit award rates and higher medical treatment costs, and to an underestimate of one company's (Patriot Coal) future benefit claims. Trust Fund, Filed from 2014 through 2016 DOL's limited oversight of coal mine operator insurance has exposed the Trust Fund to financial risk, though recent changes, if implemented effectively, can help address these risks. In overseeing self-insurance in the past, DOL did not: estimate future benefit liability when setting the amount of collateral required to self-insure; regularly review operators to assess whether the required amount of collateral should change; or always take action to protect the Trust Fund by revoking an operators' ability to self-insure as appropriate. In July 2019, DOL began implementing a new self-insurance process that could help address past deficiencies in estimating collateral and regularly reviewing self-insured operators. However, DOL's new process still lacks procedures for its planned annual renewal of self-insured operators and for resolving coal operator appeals should operators dispute DOL collateral requirements. This could hinder DOL from revoking operators' ability to self-insure should they not comply with DOL requirements. Further, for those operators that do not self-insure, DOL does not monitor them to ensure they maintain adequate and continuous commercial coverage as appropriate. As a result, the Trust Fund may in some instances assume responsibility for paying benefits that otherwise would have been paid by insurers. GAO made three recommendations to DOL to establish procedures for self-insurance renewals and coal operator appeals, and to develop a process to monitor whether commercially-insured operators maintain adequate and continuous coverage. DOL agreed with these recommendations.", "document_type": "gao"}
{"report": "State and local governments rely on a range of revenue sources to support their activities, including federal grants, user charges, and taxes. The share of revenue generated from different types of state and local taxes and user charges—also referred to as own-source revenue—varies by state or local government. State and local governments face fiscal pressures when, taken as a whole, spending exceeds revenues. Fiscal pressures may reflect growth in selected expenditure categories without corresponding revenue growth or other spending reductions. To alleviate fiscal pressures and comply with balanced budget requirements, state and local governments may seek to reduce spending, increase revenues, or both. For example, state and local governments may offset increased costs in one program by making cuts to other programs where they have more flexibility to adjust certain types of spending. Alternatively, if their ability to adjust spending is limited, they may seek additional revenue by increasing existing taxes or user charges or imposing new ones. For example, some programs may have spending that is defined or required in state law and must be funded annually, regardless of broader economic circumstances. Other spending may not be subject to legal or other requirements and is thus subject to decisions influenced by current fiscal pressures. Changes in the makeup of state and local government services, spending, and revenues may reflect economic or demographic changes, a change in spending priorities, or changes in federal policy. Fiscal pressures can result from spending growth or revenue declines that are not the direct result of current state and local policy choices. These choices may instead reflect automatic spending growth (for example, in response to population shifts or an increase in the number of people eligible for government programs) or declines in revenue due to changes in the economy (for example, a shift from goods to services without a corresponding shift in the tax base). Individual expenditure categories can also face fiscal pressures. For example, employee pension funds can experience investment returns below the rates of return assumed in budget forecasts, which can then become underfunded liabilities. From 1998 to 2018, state and local government expenditures increased from about $1.7 trillion in 1998 to about $2.8 trillion in 2018. Figure 1 shows that most state and local government expenditure categories experienced slight shifts during this period. While some categories declined as a share of total spending, inflation-adjusted spending increased in all expenditure categories. Health expenditures reflected the largest increase in inflation-adjusted spending, increasing from $288 billion in 1998 to $670 billion in 2018. As a share of total expenditures, health spending increased by 7 percentage points, from 17 percent in 1998 to 24 percent in 2018. Inflation-adjusted spending on education—the largest share of state and local expenditures—increased by more than $300 billion from 1998 to 2018. However, as a share of total spending, education expenditures decreased by 2 percentage points during the period, in large part, because of the sizable growth in health expenditures during this time period. From 1998 to 2018, state and local government revenues increased from about $1.6 trillion in 1998 to about $2.6 trillion in 2018 (see figure 2). In every year between 1998 and 2018, state and local government taxes (i.e., personal income, sales, excise, property, corporate, and other taxes) comprised the largest category of receipts for the sector, providing about $1.8 trillion or 69 percent of total revenues in 2018. With the exception of interest receipts, all revenue categories increased in inflation-adjusted dollars from 1998 to 2018. Interest receipts decreased from $108 billion or 7 percent of total revenues in 1998 to $72 billion or 3 percent of total revenues in 2018. Federal grants comprised the second largest category of state and local government revenues in both 1998 and 2018 (see figure 2). As a share of total revenues, federal grants increased from $288 billion or 17 percent of total revenues in 1998 to $569 billion or 22 percent in 2018, an increase of $281 billion or 5 percentage points. Figure 3 provides a more detailed breakdown of federal grants to state and local governments from 1998 to 2018. Compared to other grant categories, health grants reflected the only increase in state and local government federal grants, increasing from 53 percent in 1998 to 70 percent in 2018. Most of this growth occurred after 2010, following the enactment of the Patient Protection and Affordable Care Act (PPACA), which offered federal Medicaid funding for states choosing to expand their programs to low-income adults. As a share of total federal grants, income security grants reflected the largest decrease—from 26 percent in 1998 to 17 percent in 2018. However, income security grants increased in inflation-adjusted dollars, from $75 billion in 1998 to $96 billion in 2018. The decline in income security grants, as a share of total federal grants, reflects shifts in federal grants to state and local governments resulting from faster growth in health grants during the 20-year time period. In most states, growth in both state and local government expenditures and revenues exceeded growth in state gross domestic product (GDP) from 1997 to 2017. As shown in table 1, growth in expenditures equaled or exceeded growth in state GDP in each of the 5-year periods from 1997 to 2017. Revenues grew faster than state GDP, on average, during the 20-year period, though they grew somewhat slower than state GDP from 2008 to 2012. Table 1 also shows that state and local government expenditures, revenues, and state GDP all experienced more robust growth during the first half of the 20-year period (1997 to 2007) than in the second half of the period (2008 to 2017). On average, growth in state and local government expenditures outpaced growth in state and local government revenues by about 0.3 percentage points per year. As shown in figure 4, expenditures grew faster than revenues in 43 states from 1997 to 2017. We have previously reported on state and local government expenditure growth trending in excess of revenue growth and its implications for increasing state and local government fiscal pressures. For example, our most recent simulations suggest that the state and local government sector could continue to face a gap between expenditures and revenues during the next 50 years. Because many state and local governments are required to balance their operating budgets, they will most likely need to make policy changes involving some combination of reduced spending and increased revenue. Spending in most expenditure categories grew faster than or at the same rate as state GDP in a majority of states from 1997 to 2017 (see table 2). State and local government expenditures, as a whole, grew at an average annual rate of 2.8 percent from 1997 to 2017 and faster than state GDP in 43 states. Public welfare spending showed the fastest growth among all state and local government expenditure categories, growing at an average annual rate of 4.9 percent per year during the period. Public welfare. Public welfare—which includes Medicaid and welfare programs, such as Temporary Assistance to Needy Families—grew faster than all other spending categories from 1997 to 2017. Public welfare grew faster than state GDP in all but two states at an average annual rate of 4.9 percent during the period. The Centers for Medicare & Medicaid Services (CMS) Office of the Actuary projected that Medicaid spending would grow at an average rate of 5.7 percent per year, from fiscal years 2017 to 2026, with projected Medicaid expenditures reaching more than $1 trillion by fiscal year 2026. Since Medicaid is a matching formula grant program, the projected growth rate reflects expected increased Medicaid expenditures that will be shared by state governments. Furthermore, our long-term simulations of the state and local government sector’s fiscal outlook have shown that health expenditures are expected to continue to increase faster than the economy during the next 50 years. Hospitals and health. Expenditures on hospitals and health—which include state and local government spending on public health and hospitals, but not Medicaid—grew at an average rate of 2.6 percent per year from 1997 to 2017. Across all states, average annual growth in spending on hospitals and health ranged from -2.8 percent per year to 7.8 percent per year, reflecting the largest spread of any spending category. Further, growth in spending on hospitals and health was not distributed evenly across this range. In eight states, hospital and health expenditures grew at an average annual rate of less than 1 percent, while the average annual growth rate exceeded 3 percent in 20 states. Education services. Spending on education services (i.e., schools, colleges, other educational institutions, educational programs for adults, veterans, and other special classes) grew at an average rate of 2.6 percent per year and faster than state GDP in 36 states from 1997 to 2017. This average annual growth rate reflects faster growth of 4.1 percent per year, on average, from 1997 to 2007 and slower growth of 0.7 percent per year, on average, from 2008 to 2017. During the second half of the 20-year period, from 2008 to 2017, spending on education services grew more slowly than state GDP in 39 states. Public safety. Spending on public safety, which includes state and local government services, such as police, fire protection, and corrections, grew in all states at an average rate of 2.5 percent per year from 1997 to 2017. In 34 states, public safety spending grew faster than state GDP during the period. Further, public safety expenditures grew faster than 3 percent in 13 states and slower than 1 percent in three states during the same period. Transportation. Spending on transportation grew at an average annual rate between -1.4 percent and 7.2 percent from 1997 to 2017. In 35 states, transportation spending grew between 1 percent and 3 percent per year, on average, during this period. Transportation spending grew slower than 1 percent per year on average in seven states, while in nine states, transportation spending grew faster than 3 percent, on average, per year. Environment and housing. Expenditures on environment and housing, which include functions related to natural resources and housing and community development programs, grew, on average, at a rate equal to state GDP from 1997 to 2017 and ranged from a low of 0.3 percent to a high of 6.4 percent. Environment and housing spending exceeded state GDP growth in 24 states, while these expenditures grew more slowly than state GDP in 27 states. From 1997 to 2007, environment and housing spending grew at an average rate of 4.3 percent per year. From 2008 to 2017, this spending category grew at an average annual rate of .03 percent. Government administration. Government administration includes functions related to managing the government’s day-to-day work, such as financial administration, judicial and legal costs, and central staff services and personnel agencies. Spending in this category grew slightly slower than state GDP at an average rate of 2.1 percent per year from 1997 to 2017. Government administration spending grew faster from 1997 to 2007 (at an average rate of 3.6 percent per year) than from 2008 to 2017 (at an average rate of 0.4 percent per year). Other selected expenditures. Interest on debt spending (i.e., all spending on borrowed money except utility debt) grew slower than state GDP in 48 states, while annual growth ranged from -5.1 to 2.5 percent across states. From 2008 to 2017, spending on debt interest decreased by an average annual rate of 2.1 percent from 2008 to 2017. Insurance benefits and repayment expenditures, which include retirement benefits, was the fastest growing category of selected expenditures. Average annual growth in interest paid to finance debt equaled -0.1 percent. Salaries and wages for state and local government employees grew slower than state GDP in 46 states and slower than 1 percent per year in seven states. General revenues, as a whole, grew faster than state GDP in 35 states from 1997 to 2017 with the fastest growth in federal grants (3.5 percent per year) and user charges (3.1 percent per year). Table 3 shows state and local government revenue broken down into two larger categories: (1) federal grants, which include all federal fiscal aid to state and local governments; and (2) own-source revenue, which includes all general revenue state and local governments generate from their own sources, such as taxes and user charges. In the following section, we discuss trends in selected revenue categories identified in table 3. These selected revenue categories—federal grants, user charges, and property taxes—represent the three largest categories of revenue for the state and local government sector. Federal grants. Federal grants were the fastest growing source of revenue for the sector from 1997 to 2017, growing in every state and faster than state GDP in 45 states at an average annual rate of 3.5 percent. During the same period, state and local governments’ own- source revenue (i.e., taxes and user charges) grew at an average rate of 2.2 percent per year and ranged from -1.7 percent to 3.9 percent per year. However, state and local governments’ own-source revenue grew faster than state GDP in about half of the states. At the same time, this revenue growth varied among grant categories and across states. User charges. State and local government user charges comprised the second fastest growing revenue category for the sector from 1997 to 2017. User charges grew faster than state GDP in 40 states, at an average rate of 3.1 percent per year. In addition, user charges grew in every state, at an average rate between 0.9 percent and 6.2 percent per year. Total taxes. State and local government taxes, the largest category of own-source revenue, grew slower than state GDP from 1997 to 2017. Specifically, state and local government total tax revenues grew at a rate of about 2.1 percent per year, on average. As shown below, for the three major tax categories—property, sales, and individual income—growth varied overall and across states. Property taxes. Property taxes were the fastest growing category for the sector—growing in nearly all states at an average rate of 2.6 percent per year from 1997 to 2017. Property taxes grew faster than state GDP in 36 states and faster than 3 percent per year in 17 states. Property taxes drove own-source revenue growth during this time period. Compared to other tax revenue categories, property taxes have been a relatively stable revenue source for local governments. In addition, property taxes grew at an average rate of 1.4 percent per year from 2008 to 2012, while both sales and income taxes showed negative growth during the period. Sales taxes. Sales taxes grew at an average rate of 2 percent per year from 1997 to 2017, ranging from a low of -0.6 percent to a high of 4.1 percent. Revenue from sales taxes grew slower than state GDP in 28 states and slower than 1 percent per year in six states. Slower sales tax growth could reflect a shrinking sales tax base for state and local governments. Many states do not levy a tax on services—which represents more than two-thirds of all consumption. These states must therefore raise sales tax revenue from a smaller base. Individual income taxes. From 1997 to 2017, growth in individual income taxes showed greater variation across states and over time than either property or sales taxes. Similar to the growth in sales taxes, individual income taxes grew at an average rate of 2 percent per year, but reflected a wider range of growth from 1997 to 2017. Individual income taxes grew slower than state GDP in 26 states and slower than 1 percent per year in six states. From 2008 to 2017, growth in individual income taxes slowed to an average rate of 0.3 percent per year—representing a more than 3-percentage- point slower growth rate compared to the period from 1997 to 2007. Table 4 shows that public welfare grants to state and local governments—which include Medicaid—grew faster than state GDP in 47 states. Public welfare grants grew faster than 3 percent per year in 45 states from 1997 to 2017. During this period, public welfare grants grew in all states at an average rate of 4.6 percent per year, ranging from 1.8 percent to 9.5 percent per year. Grant funding for education and highways grew faster than state GDP at an average annual rate of 2.6 percent and 2.4 percent, respectively. Although a relatively small share of federal grants, natural resources grants had the largest average annual growth rate—4.9 percent—and grew faster than state GDP in 37 states from 1997 to 2017. Federal grants grew faster than own-source revenue overall and in a majority of states from 1997 to 2017. Figure 5 compares the rate of growth in own-source revenue to the rate of growth in federal grant revenue during the period. Figure 5 shows that, for the majority of states, revenue from federal grants grew faster than own-source revenue. State rainy day fund balances fluctuated as a median percentage of general fund expenditures from 1998 to 2018 and experienced consistent increases since 2010. Rainy day funds include state budget stabilization or reserve funds that state governments may use to supplement general fund spending during a revenue downturn or other unanticipated shortfall. Every state has some type of rainy day fund, though deposit and withdrawal rules vary considerably. Robust rainy day fund balances alone do not necessarily indicate strong fiscal positions, but they are one of the primary mechanisms available to states to offset a budget gap, along with spending reductions or tax increases. However, these funds will not necessarily relieve longer-term structural fiscal pressures. Median state rainy day fund balances as a percentage of total general fund expenditures increased to their highest level in the last 20 years in 2018. Figure 6 shows that states’ median rainy day fund balances increased from 1.6 percent of general fund expenditures in 2010 to 6.4 percent in 2018. Further, the median balance of state rainy day funds declined significantly after each of the last two recessions, while states gradually restored their balances each time. From 2016 to 2018, the majority of states maintained rainy day fund balances in excess of 5 percent of their general fund expenditures. The number of states with rainy day fund balances that exceeded 5 percent of their general fund expenditures doubled from 1998 to 2018, from 16 states in 1998 to 32 states in 2018 (see figure 7). Specifically, nearly half of the states maintained rainy day fund balances greater than 5 percent and less than 10 percent of their general fund expenditures in 2018. Six states had rainy day fund balances equal to 1 percent or less of their general fund expenditures, down from 11 states in 1998. Experts we interviewed identified a range of federal policies and other considerations that could affect the fiscal condition of state and local governments. While there are other issues that affect the state and local sector’s fiscal condition, this section focuses on the issues that emerged most frequently during the interviews related to the effects of federal policies on the sector’s fiscal condition, and the fiscal pressures facing states and localities that could require a federal policy response to ensure effective delivery of federal programs implemented by these governments. Those issues include: health care, federal budget uncertainty, physical infrastructure, tax policy, and natural disasters. Health care. Most experts agreed that health care costs and, in particular, Medicaid, have placed fiscal stress on state and local governments. A number of experts expressed concerns about the long- term sustainability of Medicaid and the states’ ability to meet future demand, given current demographic trends and expectations for escalating enrollment. As we discussed earlier, Medicaid has been the fastest growing category of state spending and, based on our simulations, is expected to rise faster than GDP during the next 50 years. Some experts noted that growth in Medicaid affects states’ fiscal conditions as it has become a larger portion of states’ budgets. They pointed out that even though states have experienced a recent leveling off in Medicaid enrollment, states have also experienced a faster rate of growth in spending. Two experts attributed this growth largely to the aged and disabled enrollment groups that account for a larger share of program spending. A number of experts said that states that expanded their Medicaid programs have seen the largest increases in enrollment—driven by adults who are newly eligible for the program. CMS’s Office of the Actuary projected that Medicaid enrollment is expected to grow by as many as 13.3 million newly eligible adults by 2026—as additional states may expand their Medicaid programs to cover certain low-income adults under the Patient Protection and Affordable Care Act (PPACA). The Congressional Budget Office also reported that Medicaid spending increased 36 percent from fiscal years 2015 to 2019, largely because of state Medicaid expansions. As of January 2020, 36 states and the District of Columbia expanded eligibility for their Medicaid programs under PPACA. Some experts noted that, while enrollment has grown for the expansion states, the federal government bears responsibility for a large portion of the costs. Specifically, the federal government reimbursed 100 percent of the costs of the expanded population beginning in 2014. The federal reimbursement then decreased to 94 percent in 2018, and to 90 percent in 2020. One expert told us that states had the benefit of anticipating the decrease in funding and the corresponding increase in the state share of the costs. At the same time, a number of experts generally agreed that states are not financially positioned to meet the future demands of Medicaid during a recession or economic downturn, given projected increases in enrollment. In particular, experts pointed to the costs of recession-related Medicaid enrollment increases and the resulting fiscal pressures this would place on federal and state governments to fund Medicaid obligations. One expert shared concerns related to the uncertainty of federal funding should a recession occur. Two experts also pointed to the pressures local governments, and more specifically, county governments, face from implementation of certain federal health care policies. Specifically, these experts pointed to the health care costs that county governments must incur as a result of local jails housing pretrial inmates who have medical needs and require treatment. Federal law prohibits the use of federal health benefits by inmates who are pending trial. Thus, to the extent that an inmate cannot afford to pay the costs of health care services, counties must assume the related health care expenses for providing the necessary treatment for the inmate without reimbursement for those expenses. Federal budget uncertainty. A number of experts told us that states continue to grapple with uncertainty stemming from unpredictability in the amount of federal assistance and timing of federal appropriations— including continuing resolutions and federal government shutdowns—and effects on states’ ability to plan and implement programs. Some experts raised concerns related to the federal government’s current fiscal condition and the potential effects on state and local governments. Specifically, experts noted that states are aware of the federal government’s current fiscal condition—including federal debt and deficit levels—and the level of support the federal government may or may not choose to provide in the event of an economic downturn or recession, as it has during past recessions. In light of the uncertainty, some states have engaged in “stress tests” of their own budgets using various revenue and expenditure scenarios to determine if they are in sufficient fiscal health to weather a mild-to-severe recession. Moody’s Analytics reported in 2019 that, based on the results of stress tests it performed on all fifty states, 28 states have the level of cash reserves necessary to manage a moderate recession without having to raise taxes or cut spending. Some experts further noted that state and local governments that have not been able to strengthen their cash reserves could undergo more severe fiscal stress in an economic downturn and require a greater level of assistance. Some experts also raised concerns related to the effects of federal government shutdowns and continuing resolutions on state and local governments and their ability to plan for and implement federally-funded programs. In all but 4 of the last 42 years, Congress has passed continuing resolutions to keep government services in operation until an agreement is reached on final appropriations bills. In some years, when new appropriations or a continuing resolution have not been enacted on time, this lapse in appropriations—or funding gap—caused the government to partially shut down, which halted some activities at federal agencies until appropriations were passed. A number of experts told us that interruptions in appropriations and subsequent delays in federal grants caused by shutdowns, for example, may require states to spend additional unbudgeted funds to ensure continuity of services in certain federally-funded programs, such as food and nutrition and transportation. According to one expert, not all state or local governments are in a position to access those funds in a timely manner. Furthermore, one expert noted the impacts of continuing resolutions on local governments by compressing the time available for federal grant applications. As a result, some applicants (e.g., cities or other localities) may not apply or miss deadlines for certain federal grant programs. We and others have reported on the effects of government shutdowns and its impact on some states. For example, we reported on the partial shutdown of the federal government in October 2013, which lasted for a period of 16 days due to a lapse in appropriations. Our report showed that even if a state wanted to use its funds to continue services for a federally-funded program, it might not have had sufficient liquid assets to do so quickly. At that time, at least 12 states publicly reported that funding for certain grant programs was only confirmed through October, meaning the funding may not have been available if the shutdown had continued into November. Some of these states expected to discontinue certain federally-funded programs or services if the shutdown had extended into November, while others expressed uncertainty regarding how they would have proceeded if the shutdown had been longer. Physical infrastructure. Physical infrastructure at the state and local government level includes a broad range of systems—including highways, mass transit, rail, water, and sewer systems. A number of experts pointed to concerns related to an aging infrastructure and the fiscal pressures that infrastructure demands place on state and local governments. The cost of repairing and upgrading the nation’s surface transportation infrastructure to meet current and future demands is estimated in the hundreds of billions of dollars. Further, our 2017 report noted that estimates from the Environmental Protection Agency put drinking water and wastewater infrastructure needs at approximately $655 billion nationwide during the next 20 years. State and local governments own a large portion of the nation’s physical infrastructure, while the federal government provides support to the sector in the form of grants, bonds, and loans. Funds made available from the Highway Trust Fund are distributed to states in the form of grants for eligible projects. The federal government also supports additional infrastructure spending through tax-exempt or tax-credit bonds, which provide a tax exclusion or tax credit to owners of municipal bonds issued by state and local governments. Further, through various loan programs, such as the Transportation Infrastructure Finance and Innovation Act program, the government supports project financing. State and local governments also generate revenues for transportation projects through their own sources including user fees and taxes. A number of experts shared concerns about the future of federal funding for state and local surface transportation needs. One expert acknowledged the benefits of highway grant programs provided through the Fixing America’s Surface Transportation Act. However, this expert also recognized that the act is set to expire in 2020 and its future, along with other sources of federal funding through the Highway Trust Fund, remains uncertain. We have also reported that traditional federal funding sources for surface transportation, such as the Highway Trust Fund, are eroding and the federal government lacks a long-term sustainable strategy for funding surface transportation. Moreover, experts noted that physical infrastructure needs represent only one among many competing priorities for state and local government spending. One expert expressed concern that the availability of state and local discretionary spending on infrastructure needs and maintenance will increasingly be affected by growing pressures from other mandatory spending categories, such as Medicaid. Many states have looked to modify or enhance other sources of revenue, such as the gas tax, to help meet highway transportation costs. According to the National Conference of State Legislatures (NCSL), since 2013, 31 states and the District of Columbia have enacted legislation that will or may increase their motor fuel tax to support surface transportation costs. Even so, two experts raised concerns about the viability of the gas tax as a reliable revenue source since gasoline consumption has declined. Further, NCSL reported that many states have received federal funding to study and pilot user-based alternative mechanisms through the Surface Transportation System Funding Alternative Program. We and others have also reported that some states have recognized the need for an alternative funding mechanism to meet future revenue demands. Some options that states have considered or implemented include tying gas tax rates to inflation or population, taxes based on the price of fuel, and taxing miles traveled instead of gas purchased—also referred to as mileage-based user fees. Further, experts pointed to the lack of a clearly articulated federal highway infrastructure policy and the implications for state and local governments. For example, one expert noted that states need the ability to plan multiyear programs for large-scale transportation projects and that an open dialogue about federal program implementation or renewal with all three levels of government could help state and local governments better plan for the future. This expert added that the uncertainty that state and local governments experience could be reduced if the federal government could better inform and communicate with state and local governments regarding legislative policy developments and was willing to engage in conversations with state and local governments. Tax policy. Experts discussed selected provisions of the law commonly known as the Tax Cuts and Jobs Act (TCJA) and other tax-related issues that could exacerbate or help ease fiscal pressures for state and local governments. Enacted in December 2017, TCJA included significant changes to corporate and individual tax law, with implications for state and local government tax collections. In particular, for individual taxpayers, for tax years 2018 through 2025, tax rates were lowered for nearly all income levels, some deductions from taxable income were changed (personal exemptions were eliminated, while the standard deduction was increased), and certain credits, such as the child tax credit, were expanded. A number of experts agreed that with just over 2 years since its passage, it is still too early to fully assess the effect of TCJA’s provisions on state and local government revenues. States are continuing to incorporate some of the provisions of TCJA into their own tax codes. Some states have adopted the federal definition of taxable income as a starting point for state tax calculations, while other states use the federal definition of adjusted gross income as a starting point. The choices states make regarding their linkage to these definitions have implications for their state tax revenues. Further, because TCJA placed a $10,000 annual cap on the federal deduction for taxpayers’ state and local taxes (SALT) from taxable income beginning on January 1, 2018, some high-income taxpayers prepaid their personal income and property taxes to take advantage of the uncapped SALT deduction in 2017. As a result, some states experienced an increase in revenues in late 2017. According to S&P Global Ratings, the imposition of SALT caps incentivized many taxpayers to accelerate their income tax payments into December 2017, but consequently made December 2018 tax payments look smaller by comparison. It also further reduced December 2018 payments by lessening the incentive for many taxpayers to make early income tax payments. Most experts raised the TCJA’s elimination of advance refunding for tax- exempt municipal bonds as a potential source of fiscal stress for the state and local government sector. State and local governments use these tax- exempt bonds to finance a broad range of projects and activities, including public infrastructure. Prior to its elimination, the provision allowed state and local governments to take advantage of favorable interest rates to reduce borrowing costs, restructure debt, and free up resources for other projects or investments. A number of experts explained that the elimination of the provision could result in increasing project costs—ultimately increasing infrastructure and debt costs over time. Some experts highlighted overall concerns about states’ eroding sales tax base. For example, the country has transitioned to a more service-based economy, due to changes in consumption. As services have begun to represent a larger and growing share of GDP, there has been an erosion of states’ sales tax bases. In contrast, a number of experts pointed to the outcome of the U.S. Supreme Court’s ruling in South Dakota v. Wayfair, Inc. and its potential for stimulating growth in sales tax revenue. The Court in South Dakota v. Wayfair, Inc. held that states could require out-of-state sellers to collect and remit sales taxes on purchases made from those out-of-state sellers, even if the seller does not have a substantial physical presence in the taxing state. A number of experts noted that remote sales taxes will likely increase state and local sales tax revenues, but that states are still realizing the effects of the ruling on their revenues. Following the U.S. Supreme Court’s decision, numerous states that levy a sales tax and the District of Columbia have taken some kind of action to enforce remote sales tax collections. According to NCSL, as of January 2020, 43 states and the District of Columbia currently require remote sales tax collection. Some states have taken legislative action to change their state laws in response to the outcome of the Wayfair case, while some collection efforts have been led by departments of revenue if statutory authority was already provided. However, it is too soon to determine the full effects of the Wayfair case on states’ sales tax revenue. Natural disasters. A number of experts pointed to the increasing fiscal pressure that state and local governments are under and will continue to face, given the increasing frequency, severity, and cost of natural disasters. We and others have reported on the increasing trend in the number of natural disasters and related costs. For example, in 2018 alone, there were 14 weather and climate disaster events with losses exceeding $1 billion each across the United States with total costs of at least $91 billion, according to the National Oceanic and Atmospheric Administration. Further, disaster costs are projected to increase as extreme weather events become more frequent and intense because of climate change as observed and projected by the U.S. Global Change Research Program and the National Academies. A number of experts acknowledged that the federal government plays a critical role in providing disaster assistance to state and local governments and stressed the need for continued financial support. Some experts discussed the importance of federal assistance since states may need to pay for immediate disaster costs, such as debris removal, out of current expenditures and may not have the funds available to cover those costs. Local governments in particular are generally the first responders in the event of a disaster, often times using their own personnel and funding in these circumstances. Some experts noted that these localities and communities may lack the available cash reserves needed for disaster response-related resources, such as public safety overtime and other types of public assistance. One expert underscored the federal government’s role as an economic stabilizer in providing assistance to local governments during disasters. Given the increase in federal disaster spending, we and others have underscored the importance of finding ways to address the growing costs of natural disasters, citing investment in mitigation as one approach. Some experts we interviewed also pointed to the importance of states’ adoption of mitigation strategies as a way to help states and localities reduce the environmental and fiscal effects of natural disasters. For example, the Pew Charitable Trusts reported in 2020 that a number of states and localities are looking to invest in infrastructure projects that will help mitigate the potential effects of disasters before they occur. For example, according to Pew Charitable Trusts, one state plans to limit development and move residents out of areas most prone to flooding, while improving infrastructure in communities on higher ground that are likely to receive displaced populations from neighboring towns. Another state plans to invest its federal funds in flood control, removing homes from high-risk areas and helping local governments pay for projects. Further, one locality plans to spend $500 million on infrastructure upgrades over the next few years, after its residents voted to authorize a bond to address flooding and other concerns. Further, one expert stressed the importance of the Disaster Recovery Reform Act of 2018 (DRRA) in developing state and local mitigation programs, in addition to strengthening federal, state, and local relationships in disaster response and recovery efforts. Among other things, the act increases the federal investment in predisaster mitigation, increases reimbursement caps for state and local governments on a range of disaster costs, and allows state and local governments to administer housing assistance grants. We reported in 2019 that it is too early to tell what effect implementation of DRRA will have on state and local resilience. In addition, economic literature we reviewed highlighted the potential long-term implications of natural disasters and climate change on state and local governments’ municipal bond ratings. For example, credit rating firms—Fitch Ratings, Moody’s Investors Service, and S&P Global Ratings—indicated that they are considering the effects of climate change in their credit analyses of state and local governments. Specifically, S&P Global Ratings has identified risk factors related to the environment, among other credit risk factors, such as extreme weather events and flooding that can affect an issuer’s ability to meet full and timely debt service. We are sending copies of this report to the appropriate congressional committees and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-6806 or sagerm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. This report examines fiscal pressures for state and local governments. Specifically, the objectives of our review were to (1) examine recent trends in state and local government expenditures and revenues; and (2) synthesize expert views regarding the effect of federal policy on state and local government fiscal pressures. To describe recent trends in state and local government expenditures and revenues, we analyzed categories of aggregate data on state and local expenditures and revenues using inflation-adjusted data from the Bureau of Economic Analysis’s (BEA) National Income and Product Accounts (NIPA) from 1998 to 2018. We analyzed changes in the shares of state and local expenditures and revenues as a percent of total expenditures and revenues respectively from 1998 to 2018. We determined that the NIPA data were the most recent available data for the purpose of examining aggregate state and local government revenue and expenditure trends. The NIPA data do not always match state and local government budget data due to methodological differences between how BEA calculates NIPA data and how state and local governments compute their budget data. We also reviewed our prior reports and those of others to identify what is known about these trends and the factors that affect them. To analyze trends in state and local government revenues and expenditures among states, we used the U.S. Census Bureau (Bureau) government finance data and gross domestic product (GDP) price index data from BEA to calculate inflation-adjusted values of selected expenditure and revenue categories for each state (including the District of Columbia) and for the United States for 1997 to 2017. Data for 1997, 2002, 2007, 2012, and 2017 are based on the Bureau’s Census of Governments, which surveys all state and local governments in the United States. Data for the other years are based on the Bureau’s Annual Survey of Government Finances. In these years, local government finance statistics are based in part on a sample of local governments in the United States. We determined that the Bureau’s data were the most comprehensive for the purpose of examining trends in state and local government expenditures and revenues. However, due in part to definitional differences among the states, such as those of coverage (what constitutes a government entity) or measurement (cash or accrual accounting), the data cannot be used as financial statements to measure a government’s fiscal condition or to calculate a surplus or deficit. We assessed the reliability of the data we used for this analysis and determined that BEA NIPA and the Bureau’s data were sufficiently reliable for our purposes. Our data reliability assessment included reviewing relevant documentation, interviewing knowledgeable BEA and Bureau officials, and reviewing the data to identify obvious errors or outliers. We examined patterns between state and local government revenue growth and growth in overall state and local government spending using data from the Bureau. For each state and the District of Columbia, we assessed how fast each expenditure and revenue category grew between 1997 and 2017 and calculated the average annualized growth rate based on year-to-year changes for each selected expenditure and revenue category. For each expenditure and revenue growth rate calculation, we identified the U.S. average annualized growth rate and the minimum and maximum growth rates across states. Because changes in the levels of expenditure and revenue categories can be affected by changes in state fiscal capacity—such as increased tax revenues due to population growth—we compared the average annual compound growth rate for each category of spending and revenues to the average annual compound growth rate in state gross domestic product (GDP). We chose state GDP as a proxy for each state’s resources or fiscal capacity. We determined state GDP to be the most appropriate representation of a state’s total resources or fiscal capacity. To compare the growth in these categories relative to growth in each state’s resources, we compared the growth rate for each selected expenditure and revenue category to the growth rate in each state’s GDP resources from 1997 to 2017. When expenditures in a state are growing faster than GDP, the share of the state’s resources that are dedicated to state and local government services is growing. Over the long run, such growth could create a fiscal pressure. This analysis also identified the number of states where growth in a category was (1) greater than GDP for that state or (2) less than GDP for that state. We also examined patterns between state and local revenue growth and growth in state and local spending and federal grants using data from the Bureau. For each state and the District of Columbia, we plotted the average annual growth rate in general revenues against the average annual growth rate in general expenditures from 1997 to 2017. We then counted the number of states in which spending grew faster, slower, and at the same rate as general revenues. We also analyzed growth in own- source revenues against growth in federal grant revenues using the same approach. We then counted the number of states in which own-source revenue grew faster, slower, and at the same rate as federal grants. To identify expenditure categories in the Bureau’s data, we selected all of the Bureau’s general expenditure categories. We included other expenditure categories, such as interest on debt and salaries and wages to document their low growth rates. We included insurance benefits and repayments because of its high growth rate and its inclusion of pension benefits, which experts identified as a growing expense in some states. As part of our analysis of trends in state and local government expenditures, we analyzed data from the National Association of State Budget Officers (NASBO) on state rainy day fund balances and general fund expenditures. NASBO’s Fiscal Survey of States surveys state budget officers in 50 states on general fund receipts, expenditures, annual tax and revenue changes, and balance data, which includes rainy day fund balances. We calculated state rainy day fund balances as a percentage of state general fund expenditures among states from 1998 to 2018. We then plotted the median state rainy day fund balances for each year from 1998 to 2018. We assessed the reliability of the data we used for this analysis and determined that NASBO’s data were sufficiently reliable for our purposes. Our data reliability assessment included reviewing relevant documentation and consulting knowledgeable officials about the data. To obtain expert views regarding the effect of federal policy on state and local government fiscal pressures, we conducted a series of structured interviews by telephone or in person with a nongeneralizable sample of individuals representing organizations with recognized expertise in state and local budgeting and finance economics, public policy, and intergovernmental issues. To select these experts, we reviewed their published or other publicly available work, professional affiliations, or recommendations by other experts. These considerations informed whether the experts we selected would be knowledgeable or have expertise related to state and local government fiscal and intergovernmental issues. We identified three categories of experts and selected individuals within each category. These three categories included: (1) officials representing state and local government organizations; (2) providers of financial and credit risk information, such as credit rating agencies; and (3) researchers representing think tanks with expertise in state and local government finance, including taxes, budgeting, and intergovernmental relations. We spoke with representatives from the following 17 organizations as part of our structured interviews: 1. The Council of State Governments 2. Federal Funds Information for States 4. International City/County Management Association 5. Moody’s Analytics 6. National Association of Counties 7. National Association of State Auditors, Comptrollers, and Treasurers 8. National Association of State Budget Officers 9. National Conference of State Legislatures 10. National Governors Association 11. National League of Cities 12. Pew Charitable Trusts 13. S&P Global Ratings 15. Urban-Brookings Tax Policy Center 16. The United States Conference of Mayors The results from the structured interviews are not generalizable and represent the opinions of the individuals from the 17 organizations we interviewed. However, we took steps to obtain opinions from experts with different types of expertise and perspectives. For each question in the structured interview, we coded, organized, and analyzed the responses to develop common themes among the responses, based on the issues that emerged most frequently. We use the terms “a number of,” “some,” and “most” to describe the number of experts who responded on a particular issue. We defined “a number of” or “some” as three or more experts and “most” as nine or more experts. To provide context on these themes and supplement our understanding of this information, we reviewed related research, literature from those interviewed and other organizations, including ourselves, and included relevant examples as appropriate. We conducted this performance audit from January 2019 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Brenda Rabinowitz (Assistant Director), Keith O’Brien (Analyst-in-Charge), Colin Ashwood, and Dylan Stagner made key contributions to this report. David Dornisch, J. Andrew Howard, Courtney LaFountain, Silda Nikaj, Robert Robinson, Ardith Spence, and Frank Todisco also provided support.", "summary": "State and local governments work together with the federal government to deliver a broad range of public services. GAO's prior work has shown that the state and local government sector will likely face fiscal pressures during the next 50 years due to a gap between spending and revenues. The fiscal sustainability of the state and local government sector is essential to effectively implement intergovernmental programs. GAO was asked to review recent trends in state and local government expenditures and revenues, fiscal pressures for state and local governments with intergovernmental implications, and the implications of federal policy for these pressures. This report (1) examines trends in state and local government expenditures and revenues during the past two decades; and (2) synthesizes expert views regarding the effects of federal policy on state and local government fiscal conditions. GAO analyzed data from the Bureau of Economic Analysis National Income and Product Accounts, the U.S. Census Bureau and the National Association of State Budget Officers. GAO also interviewed a nongeneralizable sample of experts from organizations that represent state and local governments, professionals who provide financial and credit risk information (credit rating agencies), and researchers from think tanks to better understand how federal policies affect state and local government fiscal conditions. During the past two decades, the state and local government sector experienced overall growth in spending and revenue. Specifically, inflation-adjusted spending increased from about $1.7 trillion in 1998 to about $2.8 trillion in 2018. Health spending accounted for the largest increase. Inflation-adjusted revenues increased from about $1.6 trillion in 1998 to about $2.6 trillion in 2018. Taxes comprised the largest revenue category. From 1997 to 2017, state and local government expenditures and revenues grew faster than state gross domestic product in most states. On average, growth in expenditures outpaced growth in revenues by 0.3 percentage points per year during the period. Increases in public welfare spending drove spending growth (spending largely for states' share of Medicaid), while federal grants and user charges drove revenue growth. Domestic Product (GDP) in Most States from 1997 to 2017 Source: GAO analysis of U.S. Census Bureau and Bureau of Economic Analysis data. | GAO 20-437 Experts identified a range of issues facing state and local governments that could affect the sector's fiscal condition. Those most frequently mentioned included: Health care. Experts expressed concerns regarding their ability to meet future Medicaid enrollment demands in an economic downturn. Federal budget uncertainty. Uncertainty in the future of federal assistance as well as the timing of federal appropriations, including federal government shutdowns, affected state and local governments' program planning. Physical infrastructure. Aging infrastructure costs and uncertainty in federal funding sources placed pressure on the sector to identify alternative revenue sources for transportation projects. Tax policy . Provisions of the law known as the Tax Cuts and Jobs Act had varied effects on the sector, but most experts agreed it is still too early to assess the act's full effects on state and local government revenues. Natural disasters . Experts acknowledged the important contribution of federal financial support for disaster response and recovery and noted some states' mitigation efforts to address the increasing frequency and cost of disasters. Credit rating firms are considering the effects of climate change in their credit analyses of state and local governments.", "document_type": "gao"}
{"report": "The number of AI/AN veterans eligible for both VA and IHS services is unknown. The U.S. Census Bureau estimates that in 2017 approximately 141,000 AI/AN individuals identified themselves as veterans. This estimate includes only individuals who identified as AI/AN alone and not in combination with another racial group. IHS and VA do not have an administrative mechanism for determining the number of AI/AN veterans who are users of both systems. Instead, each agency separately relies on individuals to identify either as veterans, or as AI/AN, resulting in different counts. Specifically, according to IHS, in fiscal year 2017, 48,169 active IHS users self-identified as veterans. According to VA, in fiscal year 2017, 80,507 VA-enrolled veterans self-identified as AI/AN. VA is charged with providing health care services to the nation’s eligible veterans, and served 6.8 million veterans in fiscal year 2017 with a total health care budget of about $69 billion. VA’s health care system includes 18 regional networks—Veterans Integrated Service Networks—to which each of VA’s facilities is assigned. VA has 170 medical centers, which offer a variety of inpatient and outpatient services, ranging from routine examinations to complex surgical procedures. VA’s health care system also includes community-based outpatient clinics and other facilities that generally limit services to primary care and some specialty care. When needed services are not available at VA facilities or within required driving distances or time frames, VA may purchase care from non-VA providers through its community care programs, such as the Veterans Choice Program. Eligibility for VA health care is based on several factors, including the veteran’s period of active service, discharge status, the presence of service connected disabilities or exposures, income, and other factors. VA uses factors such as these to categorize eligible veterans into eight enrollment priority groups—established to manage the provision of care. Some veterans qualify for free health care services based on service connected disabilities, income, or other special eligibilities, while others may be responsible for co-payments. IHS was established to provide health services to members of AI/AN tribes, and its facilities are primarily in rural areas on or near reservations. IHS’s fiscal year 2017 budget was approximately $5 billion, and the agency served about 1.6 million individuals. The agency is organized into 12 federally designated geographic areas. IHS provides services directly through a federally operated network of 25 hospitals, 53 health centers, and 30 health stations in 37 U.S. states. In addition, about 54 percent of IHS’s funds are provided to THPs to operate about 580 of their own facilities such as hospitals, health centers, clinics and health stations. IHS also provides funding to 41 nonprofit organizations through the Urban Indian Health program to provide health care services to AI/AN individuals living in urban areas. IHS and THP facilities are often limited to providing primary and emergency care services. When needed health care services are not available at IHS or THP facilities, in certain circumstances the facilities may pay external providers to provide these services through IHS’s Purchased/Referred Care (PRC) program. Before the PRC program can provide payment, patients must exhaust all health care resources available to them from private insurance, state health programs, and other federal programs, including VA. Furthermore, eligibility for PRC payment is not automatic, and IHS has reported that PRC funds are not sufficient to pay for all necessary care and, therefore, generally pay for only the highest priority costs, such as emergency care and transportation to that care. To be eligible for IHS health care services, an individual must generally be a member or descendant of one of the current 573 federally recognized Indian tribes, as evidenced by such factors as tribal membership, enrollment, residence on tax-exempt land, ownership of restricted property, active participation in tribal affairs, or other relevant factors. In instances where an AI/AN veteran is eligible for a particular health care service from both VA and IHS, VA is the primary payer. The 2010 MOU between VA and IHS set mutual goals and objectives to facilitate coordinating and resource-sharing between the two agencies. Specifically, the five MOU goals are as follows: 1. Increase access to and improve quality of health care and services to the mutual benefit of both agencies. Effectively leverage the strengths of the VA and IHS at the national and local levels to afford the delivery of optimal clinical care. 2. Promote patient-centered collaboration and facilitate communication among VA, IHS, AI/AN veterans, tribal facilities, and Urban Indian clinics. 3. In consultation with tribes at the regional and local levels, establish effective partnerships and sharing agreements among VA headquarters and facilities, IHS headquarters and facilities, tribal facilities, and Urban Indian Health Programs in support of AI/AN veterans. 4. Ensure that appropriate resources are identified and available to support programs for AI/AN veterans. 5. Improve health promotion and disease prevention services to AI/AN veterans to address community-based wellness. In accordance with these five goals, the MOU contains specific areas in which VA and IHS agreed to collaborate and coordinate, including: Reimbursement: development of payment and reimbursement policies and mechanisms to support care delivered to dually eligible AI/AN veterans. Sharing staff: sharing of specialty services, joint credentialing and privileging of health care staff, and arranging for temporary assignment of IHS Public Health Service commissioned officers to VA. Staff training: providing systematic training for VA, IHS, THP, and Urban Indian Health Program staff on VA and IHS eligibility requirements to assist them with appropriate referrals for services. Information Technology Interoperability: interoperability of systems to facilitate sharing of information on common patients, and establishment of standard mechanisms for VA, IHS, and THP providers to access records for patients receiving care in multiple systems. VA and IHS each designated certain staff to oversee and implement the MOU, but VA is generally responsible for administering the MOU. For example, VA’s Office of Community Care provides oversight of the reimbursement agreements—which are a key part of the MOU. Within that office, VA established the IHS/THP Reimbursement Agreements Program to carry out portions of the MOU related to the development of payment and reimbursement policies. Under these policies, in instances where an AI/AN veteran is eligible for a particular health care service from a VA facility, that veteran can instead receive the eligible service at an IHS or THP facility without prior VA approval and, under a reimbursement agreement, VA will reimburse the facility for the service. Some key aspects of the reimbursement agreement program are as follows: All IHS facilities are covered under one national reimbursement agreement between VA and IHS. THPs each negotiate their own separate reimbursement agreements with VA. While VA uses a reimbursement agreement template based on the agreement with IHS, the terms of each THP agreement may deviate from those in IHS’s national agreement. Urban Indian Health Programs are generally not eligible for reimbursement agreements. VA provides reimbursement for outpatient and inpatient direct care services provided at IHS and THP facilities. VA also reimburses IHS and THP facilities for costs of outpatient prescriptions for AI/AN veterans, as well as filling prescriptions for AI/AN veterans served at IHS and THP facilities through VA’s Consolidated Mail Outpatient Pharmacy program. VA does not provide reimbursement for those services from external providers paid for by IHS or THP PRC programs. VA reports that the process of establishing reimbursement agreements with THPs has multiple phases. The process begins with initial communication between the THP and VA, followed by an orientation briefing. The THP then begins to draft the agreement (based on VA’s template) and prepare required VA paperwork (e.g., an implementation plan and proof of certification or accreditation). Once drafted, the THP submits the draft agreement and paperwork for review by VA’s IHS/THP Reimbursement Agreements Program, followed by review by a VA contracting officer and legal team. The agreement is complete once it is signed by VA and the THP. A joint leadership team of VA and IHS officials continues to oversee the implementation of the 2010 MOU through meetings, regular reporting, and the establishment of goals and measures to assess performance— but these measures lack targets for assessing progress toward the goals. VA and IHS officials also told us they are drafting a revised MOU to be broader and more flexible than the existing MOU and are updating the performance measures. However, officials have not indicated that any revised measures will include targets. Since our last report in 2014, a joint national leadership team comprised of VA and IHS officials has continued to use quarterly meetings, routine reporting, and MOU goals and measures to oversee MOU implementation and help facilitate collaboration. VA and IHS officials told us that the leadership team consists of officials in VA’s Office of Rural Health and Office of Tribal Government Relations, and the IHS Deputy Director for Intergovernmental Affairs. Specifically, the leadership team has met to discuss the progress and status of the MOU, develop implementation policy and procedures, create performance measures and timelines, and evaluate progress on those measures. The leadership team also compiles annual reports on progress in MOU implementation that includes information about activities and challenges on meeting MOU goals using established measures, and information on the reimbursement agreements and outpatient pharmacy program. In addition, VA and IHS issue monthly data reports on the reimbursement agreements, including the total amount disbursed, the number of veterans receiving services reimbursed by VA, and the number of claims processed for IHS and THP facilities. The leadership team receives input from workgroups tasked with the responsibility for implementing and developing strategies to address the goals of the MOU. The workgroups primarily consist of VA and IHS staff who meet periodically to discuss goals and report quarterly to the leadership team. Tribal officials have participated in some MOU workgroups, though they are not a part of the MOU leadership team. Since our last report in 2014, the number of workgroups decreased from 12 to three groups. (See table 1.) VA and IHS officials said that there were a number of reasons why the number of workgroups had decreased over time, such as consolidation into broader groups because the missions of some groups were similar. VA officials noted that the 12 original workgroups reflected the structure of the MOU, but over time they realized that there was not a need for workgroups in some of these areas. With the establishment of the MOU, VA and IHS have been able to share resources and collaborate on activities to improve access of care for AI/AN veterans. VA and IHS reported that the MOU has helped both agencies develop an outpatient pharmacy program for AI/AN veterans, hold joint training and recruitment events, and establish the reimbursement agreement program, among other accomplishments. The VA, IHS, and THP facility officials we spoke with noted activities related to the reimbursement agreements and a few noted improvements in areas such as training and telehealth as a result of the MOU. However, most of the facility officials generally reported they had not observed improvements in national-level VA and IHS collaboration and coordination in other areas identified by the MOU. Additionally, these facility officials told us that their facilities have not implemented any new policies, procedures, or any specific facility performance goals or targets that were linked to the MOU. VA and IHS headquarters officials acknowledged that all areas of the MOU have not been implemented at all facilities, and noted that while improvements have been made in many areas, organizational challenges remain, such as in the area of information technology. One IHS headquarters official added that even though VA and IHS have not fully implemented all parts of the MOU, they have addressed each area of the MOU in some manner. For example, one of the goals of the MOU is to improve coordination of care by developing and testing innovative approaches and disseminating best practices. IHS headquarters officials indicated that the agency has addressed this goal in part by creating an Improving Patient Care program that was informed by using VA curriculum and utilizing lessons learned from VA’s Patient Aligned Care Teams. VA and IHS leadership said they are currently in the process of revising the MOU to be broader and more flexible to better meet the care needs of AI/AN veterans. Regularly monitoring and updating written agreements on collaboration, such as the MOU, is consistent with our key collaboration practices. IHS officials said that in contrast to the current MOU, in the new MOU, they are not looking to delineate every area of coordination and instead are grouping topics into broader areas of coordination. In the fiscal year 2017 MOU annual report, VA and IHS noted they were removing outdated language from the MOU and planned to create a more comprehensive, flexible MOU that would serve both agencies well into the future. VA and IHS officials indicated that these revisions will address some areas in the current MOU that they have not yet been able to implement. In June 2018, VA officials said that the leadership team had decided upon a revised set of MOU goals and associated objectives. In February 2019, VA and IHS reported that the target completion date for the new MOU was spring 2020. VA and IHS have improved their efforts to measure progress towards meeting the five MOU goals since 2014. In response to a recommendation made in our April 2013 report, VA and IHS revised their MOU performance measures in 2015—better aligning the measures with the MOU goals. In addition, as a result of our work in 2013, the agencies revised an existing data collection reporting template used to gather information for each measure—such as the measurable objective, rationale and intent of the measures, action plan, milestones, and barriers—to help determine whether MOU goals were being met. While we found that the three existing MOU workgroups had since stopped using this template, a VA official confirmed that they believe relevant information is still captured through its monthly and quarterly reports. Nonetheless, while VA and IHS improved their performance measurement efforts since our 2013 report, we found that the revised MOU performance measures still do not have quantitative and measurable targets to assess agency progress toward the goals. We have previously reported that performance measures should have numerical targets or other measurable values, which help assess whether overall goals and objectives were achieved by easily comparing projected performance and actual results. Besides having measureable targets, other key attributes of successful performance measures include linkage to an agency’s goals and mission, clarity, objectivity, and balance. None of the 15 revised measures have targets against which performance can be measured to assess progress and evaluate effectiveness. (The results of our assessment are shown in table 2.) For example, while the number of shared VA-IHS trainings and webinars is a performance measure, there is no target for the number of shared trainings VA and IHS hope to complete each year. VA officials we spoke with stated VA has not considered adding targets to these measures, noting that the nature of the measures and MOU work against establishing targets. For example, officials said that the measures related to the reimbursement agreements are dictated by the needs of the population seeking health care and the providers at the IHS and THP facilities. VA officials we spoke with said instead of targets, they assess success or failure by whether they see incremental growth in the measures. Officials added that they examine these measures quarterly to determine if they have increased, decreased, or remained stable. If the measures are stable or decrease, officials said they consider if these trends can be reversed. However, the absence of targets limits the ability of VA and IHS to use these measures to assess performance. Without defined measurable targets or goals, VA and IHS lack a clear basis for objectively and strategically evaluating how and where improvements should be made. For example, while it is helpful to count the number of tribal outreach activities conducted, setting an annual target for such activities would allow the agencies to better assess whether they are meeting their goals in this area. In addition, some of these measures also lacked other attributes important for assessing performance. Specifically, five of the measures listed the completion of an annual metric review, which is a task to execute rather than a desired performance outcome to be measured. VA and IHS also are not using two measures. Specifically, they have not collected any data to track results on the number of VA and IHS employees who attend training and on the quality of health care provided. Relatedly, for the measure on health care quality, VA and IHS have not developed a clear definition against which to measure performance, as specific quality measures have not been determined and data are not being collected. VA and IHS have documented challenges related to confusion and difficulty in tracking some measures; for example, at a meeting in March 2017, the MOU leadership team discussed that measures were not well tailored to the workgroup structure at that time. IHS officials also acknowledged that the measures currently in place are counting activities, but not necessarily always measuring performance—such as whether trainings held were effective. VA officials said that revising the MOU will give them an opportunity to revisit the performance measures used, and that they are looking to apply lessons learned to do a better job in the future at defining the measures. Similarly, IHS officials noted that the agencies are engaged in conversation about the performance measures to make them more useful. However, as previously noted, VA officials said that they have not considered establishing targets for the measures. THP facilities’ use of reimbursement agreements with VA increased from 2014 through 2018. The selected IHS and THP facilities we spoke with viewed the reimbursement agreements as beneficial, but also identified some concerns. The use of VA’s reimbursement agreements with THPs increased from 2014 through 2018, as measured by the number of agreements, claims reimbursed, and veterans served. In addition, there was also an increase in payments made for prescriptions filled through the VA’s Consolidated Mail Outpatient Pharmacy program for AI/AN veterans receiving services at IHS and THP facilities. As all IHS facilities are covered under a single national agreement that was instituted prior to 2014, there was less change in the use of reimbursement agreements by these facilities. Reimbursement agreements entered. The number of reimbursement agreements with THPs more than doubled from 2014 to 2018, increasing about 113 percent. We previously reported, as of May 16, 2014, that VA had 53 reimbursement agreements with THPs. VA data showed that as of December 2018 it had 113 reimbursement agreements with THPs, representing about 34 percent of the 337 total IHS-funded THPs. (See fig. 1.) VA also reported that there were 42 additional pending reimbursement agreements with THPs that were in varying phases of submission, processing, and review. In addition, as in 2014, IHS facilities are covered under a single national agreement, and the number of IHS facilities covered by it has remained similar. In 2014, we reported that VA officials had conducted outreach through tribal letters and events to educate THPs about the option of establishing reimbursement agreements, and officials told us this outreach has continued. As we reported previously, there are several reasons a THP might decide not to have an agreement with VA, such as deciding it was not worth the time and resources needed to establish an agreement. Officials from a national tribal organization we spoke with said that smaller tribes without many veterans or resources may not be interested. IHS officials also noted that if a THP’s veteran population has alternate payment resources (e.g., Medicaid or private insurance), it may not be worth the steps to implement a reimbursement agreement if the THP will not be billing VA for veterans’ services. Amount of claims reimbursed. In fiscal year 2014, VA paid IHS and THP facilities $11.5 million for services provided to AI/AN veterans, which grew to $20.1 million in fiscal year 2018. This increase mainly represents the growth in reimbursement to THP facilities—which grew 181 percent, from $4.3 million in fiscal year 2014 to $12.1 in fiscal year 2018. During this same time period, reimbursements to IHS facilities remained relatively stable, reflecting the stable number of IHS facilities receiving reimbursements. (See fig. 2.) Veterans served. Between fiscal year 2014 and fiscal year 2018, according to VA data, the number of unique AI/AN veterans receiving services reimbursed by VA each year has increased from about 3,800 in 2014 to a high of nearly 5,300. (See fig. 3.) While IHS facilities accounted for a larger percentage of veterans with reimbursed services compared to THPs, the number of veterans receiving services reimbursed by VA at THPs increased significantly. For fiscal year 2014, 2,965 AI/AN veterans received services reimbursed by VA at IHS facilities, which decreased slightly to 2,829 in fiscal year 2018. In comparison, 885 veterans received services reimbursed by VA at THP facilities in fiscal year 2014, which nearly tripled to 2,531 veterans in fiscal year 2018. Prescriptions filled. Similar to increases in the numbers of AI/AN veterans served under the reimbursement agreements, AI/AN veterans’ utilization of VA’s Consolidated Mail Outpatient Pharmacy program has also increased. Prescriptions filled through this program more than doubled—from more than 440,000 prescriptions in fiscal year 2014 to nearly 886,000 prescriptions in fiscal year 2018. (See fig. 4.) VA and IHS annual reports indicate that the pharmacy program has been one of the most successful collaborations between VA and IHS for AI/AN veterans, providing more than 2 million prescriptions for VA-IHS patients since the pharmacy program collaboration began in 2010. While this program was originally limited to AI/AN veterans served at IHS facilities, in December 2016, VA and IHS entered into an Interagency Agreement that extended the program to THPs. Officials from the majority of IHS and THP facilities we contacted said they were generally pleased with the reimbursement agreements. Among those, officials from one THP noted that the revenue received from their reimbursement agreement freed up other resources that allowed them to hire an additional part-time worker to conduct VA outreach activities. Additionally, a representative of a national tribal organization noted that IHS and THP facilities’ funding is limited and this revenue helps them extend services to eligible AI/AN veterans. However, officials from a number of IHS and THP facilities also had concerns about the agreements, including the lack of reimbursement for PRC program services provided by IHS and THP facilities, the length of time it took to enter into the agreements, and the time frames of the agreements: Lack of reimbursement for PRC program services. Officials at most IHS and THP facilities we contacted said they believed VA should reimburse facilities for services from external providers paid through the PRC program. Officials at some facilities said they have had to deny PRC services due to a lack of program funds. According to some facility and IHS area office officials, this issue is particularly relevant in states where Medicaid was not expanded under the Patient Protection and Affordable Care Act (PPACA). In states where Medicaid eligibility was expanded, more AI/AN individuals may therefore be eligible for Medicaid—potentially freeing up PRC funds. For example, an IHS official noted that prior to Medicaid expansion in his state they would have to limit PRC funds to be used only in life or death scenarios after May or June of each year, but that currently his facility was not limiting any PRC services. Given the limitations in PRC program funds, officials from a national tribal organization and some THPs noted they have raised the possibility of including the PRC program in the reimbursement agreements with VA, although the program was ultimately not included. VA officials noted that there is no statutory requirement for them to include the PRC program in the reimbursement agreements and also identified several other reasons for not including it. For example, they said that VA does not want to pay for services externally that it already offers internally and that it would prefer to coordinate the patient’s care within VA’s existing programs, such as VA’s own programs for purchasing care from external providers—like the Veterans Choice Program. The length of time to enter into an agreement. Officials from a few THP facilities and one national tribal organization we spoke with noted concerns about the amount of time it took to enter into reimbursement agreements. Our analysis of VA reimbursement agreement data shows that the median amount of time that it took to enter an agreement with THPs was over 1 year (about 403 days). We found that the number of days from the first contact by a THP to the actual signing of the agreement ranged from 96 days (over 3 months) to 1,878 days (more than 5 years). According to VA records and interviews, there were reasons for delays in completing reimbursement agreements, including lengthy negotiations, incomplete submission of information from the THPs, lapses in communication between VA and the THP, and a THP’s lack of medical certification or accreditation. VA officials explained that the amount of time increases if the THP does not want to use the VA-approved reimbursement agreement template or wants to change the terms of the agreement. For example, an official from one THP facility said that it took 2.5 years to finalize its reimbursement agreement due, in part, to internal challenges with their legal counsel and external challenges with negotiating the terms of the agreement during a time when the VA was developing a national reimbursement agreement template. VA officials also explained that entering the agreement with IHS was simpler than entering agreements with THPs because it was a national agreement between two federal agencies and, for example, did not require having a contracting officer review the agreement—an extra step needed for agreements with non-federal agencies. The length of time reimbursement agreements are in effect. Officials from a few THP facilities expressed a desire for longer reimbursement agreements that would permit greater planning ability. The agreement between VA and IHS was initially set for 3 years. It was then extended twice, once for 2 years and once for 1.5 years. The time frames for THP agreements have generally been extended consistent with extensions to the national agreement. Officials from one THP we spoke with said that having short-term reimbursement agreements causes problems with internal organizational planning and it would be beneficial to have a longer term non-expiring agreement that can be cancelled so that THPs do not continue to expend resources to complete new agreements or amendments every 2 years. In June 2018, VA and IHS signed an amendment to extend the terms of the national reimbursement agreement through June 30, 2022. VA officials said they are currently in the process of working with THPs to similarly extend their agreements. In speaking to officials at selected VA, IHS, and THP facilities about key issues related to coordinating care for AI/AN veterans, we found that the extent of coordination they reported varied widely. For example, three IHS and THP facilities said they had little to no care coordination with their local VA partners; noting, for example, that they rarely refer veterans to VA since they offer more services than the closest VA facilities. Other facilities described more extensive and formalized care coordination, including shared funding of certain VA and THP employees, or VA employees on site at THP facilities to manage veterans’ care and referrals to and from VA. In Alaska, for example, where services offered by VA are very limited, VA instead has formal sharing and reimbursement agreements established with 26 THPs, which provide the majority of services to AI/AN veterans, as well as some non-Native veterans. Two of the THP facilities we spoke with in Alaska have VA employees working on site to help coordinate veterans’ care. VA and IHS headquarters officials indicated that the MOU was intended to allow for variation in the level of coordination at the local, facility level not to create demands or obligations on facilities. One VA official noted that as the new MOU is developed, both VA and IHS want to continue to allow VA, IHS, and THP facilities to engage in whatever level of coordination makes sense. Despite variation in the extent of coordination, officials identified several common challenges regarding coordination between local VA, IHS, and THP facilities: Referring patients to VA facilities. Officials from 9 of the 15 VA, IHS, and THP facilities we contacted reported conflicting information about the process for referring AI/AN veterans from IHS and THP facilities to VA facilities for specialty care. For example, 4 of the IHS and THP facilities we spoke with said that AI/AN veterans generally could not be referred directly to VA specialty care by IHS or THP providers without first being seen and referred by a provider at VA. These facility officials indicated that this practice was a barrier to care. These officials also noted that this could result in the patient receiving, and the federal government paying for, duplicative tests. However, officials at another IHS facility indicated that IHS and THP facilities should be able to refer patients directly to VA specialty care. Additionally, during an interview at a VA facility, local and regional officials had differing understandings of whether IHS and THP facilities could refer patients directly to VA specialty care. VA and IHS headquarters officials both reported that in general, IHS or THP facilities cannot refer a patient to VA specialty care without that patient first being seen in VA primary care. However, VA officials reported that there is no national policy or written guidance on how to refer patients from an IHS or THP facility to a VA facility. VA officials said that the coordination process is left to the local VA facility and the respective IHS or THP facilities and the process can vary from one facility to another— explaining why differing information was reported by facility officials. Our past work on interagency collaborative mechanisms identifies that it is a leading collaboration practice to have written guidance and agreements to document how agencies will collaborate. Without a written policy or guidance about how referrals of AI/AN veterans from IHS and THP facilities to VA facilities may be managed, VA and IHS cannot ensure that VA, IHS, and THP facilities have a consistent understanding of the options available for these referrals. Information technology interoperability and access. Officials at 10 of the 15 VA, IHS, and THP facilities we contacted cited challenges related to accessing each other’s health information technology systems. Most stated that a lack of interoperability of their electronic health records caused challenges, while a few IHS and THP facilities also mentioned that the lack of access to VA systems makes it difficult to verify a veteran’s eligibility or determine the services for which VA will reimburse. For example, one THP noted that if an AI/AN veteran was sent to VA for a service, the THP provider would not receive the veteran’s follow-up records as quickly as if they had access to each other’s systems. Improving systems’ interoperability was a focus area identified in the MOU, and an IHS official indicated that while the agencies had some initial work on the topic, no systematic solutions were identified. We have previously identified VA’s lack of systems interoperability—particularly with the Department of Defense—as a contributor to the agency’s challenges related to health care. VA and IHS officials identified some potential workarounds to this lack of interoperability, although they noted that some of the described workarounds could be time consuming and may not be feasible for all facilities: An IHS headquarters official said that IHS and VA each have the ability to request the sharing of information from an individual electronic health record held by the other agency through secure emails—although the official noted that this is not as fast or efficient as being able to log in to each other’s systems. VA officials also reported that VA belongs to the eHealth Exchange— a national health information exchange—and said that IHS or THPs could join that, through which they would be able to access information about common veteran patients. However, IHS reported that although the agency explored connecting to the eHealth Exchange several years ago, testing and onboarding costs to participate were prohibitive. IHS noted that several individual facilities across the IHS system have elected to invest in connections with regional health information exchanges. Similarly, two THPs we spoke with reported being a part of other, more locally-based health information exchanges, but noted that VA was not part of these exchanges. A VA official noted that there is an enrollment guide that details how enrollment and eligibility verification will be managed between IHS, THP, and VA facilities. This guide describes how IHS or THP facilities can request veterans’ enrollment and eligibility information from the VA Health Eligibility Center using a templated spreadsheet that sends requests via email through a secure data transfer service. VA’s Health Eligibility Center verifies the list and returns the completed enrollment/eligibility excel spreadsheet to the IHS or THP facility securely. IHS and THP facilities can also contact the VA Health Eligibility Center directly by telephone for fewer than five veterans per call, or their local VA medical center by telephone to verify one AI/AN veteran’s enrollment and eligibility per call. IHS or THP facilities could also enter an arrangement with a local VA facility to have VA employees or co-funded employees on site at IHS or THP facilities, or to have VA-credentialed employees that can access VA systems to share information. However, these options may not be systemic solutions that work at all facilities. An IHS headquarters official noted, for example, that not all IHS or THP facilities have the type of relationship with their local VA facility that would lead to the establishment of such arrangements. In terms of the potential for improving interoperability in the future, VA is in the process of implementing a new electronic health record system, and we have previously reported that VA has identified increased interoperability as a key expected outcome of its decision to switch systems. Officials from two VA and THP facilities were hopeful that this new system will help improve interoperability since some THPs use an electronic health record system from the same company that VA has a contract with. Additionally, an IHS headquarters official said that IHS is also reevaluating its information technology platform and one requirement of any new IHS system will be to enhance interoperability with VA, pending the funding to do so. IHS also reported that the agency will consider health information exchange participation as part of the agency’s information technology modernization efforts. Staff turnover. Officials from 9 of 15 facilities identified staff turnover at VA, IHS, and THP facilities as an impediment to having better or consistent coordination. VA, IHS, and THP facility officials described situations in which the coordination between facilities was dependent on specific staff or facility leadership. According to officials, when there was turnover among these staff or positions went unfilled, or were eliminated, the coordination decreased or came to a halt. For example, officials at one VA facility said that they have found that if a sitting tribal government expresses interest in VA collaboration, they have to act quickly and work with the tribe before there is turnover and new tribal leadership comes in with different priorities. Additionally, officials from one IHS facility described a situation in which they had previously coordinated with their local VA facility through that facility’s AI/AN liaison. However, the coordination lapsed when the liaison left VA and the position went unfilled. Similarly, a THP official stated that coordination with VA was previously led by a nurse case manager on site who was a joint VA and THP employee. The official said that since that person’s retirement, she did not know who to contact at VA to coordinate veterans’ care. Officials at one IHS facility noted that due to turnover and attrition they would like to see more education for front line staff at both IHS and VA, so they can more efficiently obtain care for patients at the VA. VA headquarters officials acknowledged that staff turnover and retraining is a challenge that they will need to continually address as the MOU is carried out. In our prior work related to IHS and VA, we have found that both agencies face challenges related to staff turnover and training. VA Co-Payments. Officials at 3 of the 11 IHS and THP facilities we contacted, as well as IHS headquarters officials and representatives of two national tribal organizations said that the copayments that VA charges veterans represented a barrier to AI/AN veterans receiving care. While AI/AN veterans do not have any cost-sharing for care provided at IHS or THP facilities, they are subject to the same copayments as other veterans when they receive care from VA facilities. VA data shows, for example, that of the 80,507 VA-enrolled self-identified AI/AN veterans in in fiscal year 2017, about 30 percent were charged copayments, averaging about $281.56 billed per veteran. Officials from one THP noted that this kind of financial liability may discourage AI/AN veterans from getting care at VA, or lead them to return to the THP after they realize they will have to pay for care at VA. While some of our interviewees suggested that VA should waive copayments for AI/AN veterans, a VA official said they do not have the legal authority to do this. The official said that their statute specifies the categories of veterans for which they must charge copayments and VA is not authorized to waive the copayments for AI/AN veterans on the basis of their AI/AN status without statutory exemptions. While certain AI/AN veterans may qualify for waived copayments based on their inclusion in other statutory categories, AI/AN veterans are not specifically listed as a category for which copayments can otherwise be waived. VA officials also cautioned that because AI/AN veterans may qualify for waived copayments through these other categories, the possibility of copays should not discourage IHS or THP facilities from referring AI/AN veterans to VA. Since 2014, VA and IHS have continued to work together to oversee and implement their MOU aimed at improving the health care provided to dually eligible AI/AN veterans. While the agencies have made progress in certain areas of the MOU, especially those related to reimbursement, other parts have seen less attention. VA and IHS are now updating the MOU, and plan to revisit the related performance measures. This gives the agencies an opportunity to evaluate how well their existing oversight mechanisms have been working, and to improve these mechanisms accordingly in the future. Regardless of these updates, the agencies need to have effective performance measures. While the agencies took steps to improve MOU performance measures in response to one of our prior reports, these steps were not sufficient and the measures they set lack important attributes, including measurable targets. VA and IHS have indicated that they plan to reevaluate performance measures as they update the MOU, but have not indicated that these new measures will identify targets. Absent targets, VA and IHS are limited in their ability to measure progress towards MOU goals and ultimately make strategic decisions about how and where improvements should be made. At the local level, care for AI/AN veterans relies on coordination among individual VA, IHS, and THP facilities. However, variations in relationships among these many facilities and staff turnover creates challenges, which heightens the importance of clear and consistent guidance from the national level. Yet no written guidance exists related to referring AI/AN veterans to VA facilities for specialty care. Without such guidance, VA and IHS cannot ensure that facilities have a consistent understanding of the available referral options for AI/AN veterans. Enhancing their guidance in this area will help VA and IHS ensure that AI/AN veterans have access to needed care. We are making a total of three recommendations, including two to VA and one to IHS. Specifically: As VA and IHS revise the MOU and related performance measures, the Secretary of Veterans Affairs should ensure these measures are consistent with the key attributes of successful performance measures, including having measurable targets. (Recommendation 1) The Secretary of Veterans Affairs should, in consultation with IHS and tribes, establish and distribute a written policy or guidance on how referrals from IHS and THP facilities to VA facilities for specialty care can be managed. (Recommendation 2) As VA and IHS revise the MOU and related performance measures, the Director of IHS should ensure these measures are consistent with the key attributes of successful performance measures, including having measurable targets. (Recommendation 3) We provided a draft of this report to VA and the Department of Health and Human Services for review and comment. We have reprinted the comments from VA in appendix I and the comments from the Department of Health and Human Services in appendix II. Both departments concurred with our recommendations. The Department of Health and Human Services also provided technical comments, which we incorporated as appropriate. In response to our recommendations to ensure revised performance measures include key attributes of successful performance measures, VA and the Department of Health and Human Services provided information about the process for finalizing the new MOU, including conducting tribal consultation. They noted that VA and IHS will work together to ensure that performance measures under the new MOU include appropriate measurable targets. Regarding our recommendation to VA about establishing and distributing a written policy or guidance on how referrals from IHS and THP facilities to VA facilities for specialty care can be managed, VA noted the Office of Community Care is working on a process to enhance care coordination among all VA and non-VA providers—including IHS and THP providers. VA noted that for IHS and THPs, this will include establishing forms and procedures to refer patients to VA for specialty care, and that VA will provide training to applicable staff once the process and procedures are finalized. VA also noted that it is in the process of establishing an advisory group that will include tribal, IHS, and VA representation, and will make recommendations related to care coordination guidance and policies. The target completion date for establishing this group is spring 2020. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretaries of VA and the Department of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov/. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix III. In addition to the contact named above, Kathleen M. King (Director), William Hadley (Assistant Director), Christina Ritchie (Analyst-in-Charge), Jennie Apter, Shaunessye D. Curry, Jacquelyn Hamilton, and Vikki Porter made key contributions to this report.", "summary": "A 2010 MOU set mutual goals for VA and IHS collaboration and coordination related to serving AI/AN veterans. Under this MOU, VA has established reimbursement agreements with IHS and tribal health programs to pay for care provided to AI/AN veterans. In 2013 and 2014, GAO issued two reports on VA and IHS implementation and oversight of the MOU. GAO was asked to provide updated information related to the agencies' MOU oversight. This report examines (1) VA and IHS oversight of MOU implementation since 2014, (2) the use of reimbursement agreements to pay for AI/AN veterans' care since 2014, and (3) key issues identified by selected VA, IHS, and tribal health program facilities related to coordinating AI/AN veterans' care. To conduct this work, GAO reviewed VA and IHS documents, reports, and reimbursement data from 2014 through 2018. GAO interviewed VA and IHS officials at the headquarters level, and officials at 15 VA, IHS, and tribal facilities in four states—Alaska, New Mexico, North Carolina, and Oklahoma—selected based on factors including the number of reported AI/AN veterans served, and geographic diversity. GAO also interviewed organizations representing tribes and tribal health programs. The Department of Veterans Affairs (VA) and the Department of Health and Human Services' (HHS) Indian Health Service (IHS) established a memorandum of understanding (MOU) to improve the health status of American Indian and Alaska Native (AI/AN) veterans through coordination and resource sharing among VA, IHS, and tribes. Since GAO's last report on the topic in 2014, VA and IHS have continued to jointly oversee the implementation of their MOU—for example, through joint workgroups and quarterly meetings and reports—but they lack sufficient measures for assessing progress towards MOU goals. Specifically, while the agencies established 15 performance measures, they did not establish targets against which performance could be measured. For example, while the number of shared VA-IHS trainings and webinars is a performance measure, there is no target for the number of shared trainings VA and IHS plan to complete each year. GAO's work on best practices for measuring program performance has found that measures should have quantifiable targets to help assess whether goals and objectives were achieved by comparing projected performance and actual results. VA and IHS officials said they are currently in the process of revising the MOU and updating the performance measures used. However, officials have not indicated that any revised measures will include targets. Total reimbursements by VA for care provided to AI/AN veterans increased by about 75 percent from fiscal year 2014 to fiscal year 2018. This increase mainly reflects the growth in reimbursement from VA to tribal health program facilities—facilities that receive funding from IHS, but are operated by tribes or tribal organizations. Similarly, the number of VA's reimbursement agreements with tribal health programs and the number of AI/AN veterans served under the reimbursement agreements also increased during this period. The VA, IHS, and tribal facility officials GAO spoke with described several key challenges related to coordinating care for AI/AN veterans. For example, facilities reported conflicting information about the process for referring AI/AN veterans from IHS or tribal facilities to VA, and VA headquarters officials confirmed that there is no national policy or guide on this topic. One of the leading collaboration practices identified by GAO is to have written guidance and agreements to document how agencies will collaborate. Without a written policy or guidance about how referrals from IHS and tribal facilities to VA facilities should be managed, the agencies cannot ensure that VA, IHS, and tribal facilities have a consistent understanding of the options available for referrals of AI/AN veterans to VA specialty care. This could result in an AI/AN veteran receiving, and the federal government paying for, duplicative tests if the veteran is reassessed by VA primary care before being referred to specialty care. GAO is making three recommendations—one each to VA and IHS to establish measurable targets for performance measures and one to VA to establish written guidance for referring AI/AN veterans to VA facilities for specialty care. VA and HHS concurred with these recommendations.", "document_type": "gao"}
{"report": "The Kingpin Act authorizes Treasury to identify and apply sanctions to significant foreign narcotics traffickers and their organizations worldwide to protect the national security and economy of the United States. According to officials from OFAC and other partner agencies, key goals of the Kingpin Act include disrupting and dismantling drug trafficking organizations and blocking designees’ access to the U.S. financial system. The Kingpin Act mandates the participation of certain agencies in the Kingpin designation process. The Secretary of the Treasury, after consulting with partner agencies, is authorized to designate a foreign national or entity as a Specially Designated Narcotics Trafficker. The partner agencies participating in Kingpin Act designations are the Department of Justice (DOJ), State, DHS, DOD, CIA, FBI, and DEA. For Treasury to designate a foreign individual or entity under the Kingpin Act, it must identify that individual or entity as either a significant foreign narcotics trafficker or part of a designee’s network. The following offices in Treasury are involved in identifying designation targets, and managing and assessing the impact of sanctions: The Office of Terrorism and Financial Intelligence (TFI) has the twin aims of safeguarding the U.S. financial system against illicit use and combatting national security threats, including drug kingpins. TFI includes OFAC, the Office of Intelligence and Analysis (OIA) and the Office of Terrorist Financing and Financial Crimes (TFFC). OFAC is Treasury’s primary office for sanctions implementation and enforcement. OIA is responsible for TFI’s intelligence functions and performs some assessment of the impact of Treasury’s sanctions programs. TFFC works across the national security community and with the private sector and foreign governments to identify and address the threats presented by illicit finance to the international financial system. Treasury can designate a foreign individual or entity under the Kingpin Act if it identifies an individual or entity as either a significant foreign narcotics trafficker or part of a designee’s network. OFAC and its partner agencies have grouped these Kingpin Act designation categories into two tiers, Tier 1 and Tier 2, based on the procedures required for identification and designation under the act. (See tab. 1.) All identifications and designations under the Kingpin Act are subject to the same asset blockings and penalties. The names of persons and entities designated are published in the Federal Register and incorporated into Treasury’s Specially Designated Nationals and Blocked Persons List (SDN List). The majority of Tier 1 Kingpin Act designations are individuals and entities from countries in the Western Hemisphere, as shown in figure 1. Treasury is authorized to block assets of and prohibit transactions with designated individuals and entities and to impose penalties on individuals and entities that engage with designees. Blocking assets. Treasury blocks (i.e., denies access to) a designated individual or entity’s property and interests in property within the United States, or within the possession or control of any United States individuals or entities that are owned or controlled by the blocked individual or entity. Prohibiting transactions. Treasury generally prohibits United States individuals and entities from engaging in transactions in property or interests in property of designees. Denying visas. Treasury provides information to State so it can decide whether to cancel existing visas and deny visa applications of Kingpin Act designees. Penalties for nondesignees. Treasury may enforce criminal and civil penalties for any U.S. person who willfully violates the prohibitions in the Kingpin Act, associated regulations, or license rules. Penalties for violations of the Kingpin Act range from civil penalties of up to $1.5 million per violation to more severe criminal penalties. Criminal penalties for corporate officers in violation may include up to 30 years in prison and fines up to $5 million for individuals and $10 million for corporations. Treasury is required to report to Congress on the status of sanctions imposed under the Kingpin Act, including the personnel and resources directed toward imposing such sanctions during the preceding fiscal year. On July 1st of each year, the OFAC Director, as delegated by the Secretary of the Treasury, is required to submit a report to the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate on the status of sanctions imposed under the Kingpin Act, the personnel and resources directed toward imposing sanctions under the Kingpin Act during the preceding fiscal year, and background information with respect to the newly identified significant foreign narcotics traffickers and their activities. Treasury is also required to report on foreign persons who are sanctioned under the Kingpin Act to the Director of the Office of National Drug Control Policy (ONDCP); ONDCP is the Executive Branch office responsible for issuing an annual National Drug Control Strategy and coordinating the efforts of the National Drug Control Program agencies implementing any aspects of the strategy. Treasury’s OFAC leads a process generally involving six steps to designate Kingpin Act targets. This process allows OFAC to coordinate its investigations and designations with U.S. partner agencies and foreign governments. (See fig. 2.) We determined the designation process through interviews with OFAC and partner agency officials, and selected nine cases to review the implementation of the designation process. OFAC’s Kingpin Act designation process includes the following six steps: 1. Identify potential targets. OFAC first identifies potential targets for investigation and Kingpin Act designation. OFAC’s partner agencies can submit recommendations for potential targets. According to OFAC officials, they consider information provided about potential Tier 1 targets from the recommending agency, such as whether the targets are on the U.S. multiagency list of priority drug trafficking targets, what unique identifiers the recommending agency can provide to minimize the chance of investigating the wrong target, and which drug(s) and quantities the targets traffic and to which markets. Additionally, OFAC considers (1) the likelihood that the target would meet the legal criteria for designation and have an impact, (2) the expectation that designation would complement rather than hinder law enforcement and foreign counterpart investigations and operations, (3) any unintended negative consequences on third parties, and (4) the current availability of OFAC resources. According to OFAC officials, Tier 2 targets are generally identified as part of the investigation of a Tier 1 target or designee. Officials said the decision to pursue designation depends on whether there is sufficient evidence to demonstrate that the target satisfies the designation criteria in the act. As early as at this step, but at some point before designation, OFAC coordinates with partner agencies to ensure that they do not have an ongoing investigation or other diplomatic interactions that will be adversely affected by a Kingpin Act designation. 2. Gather evidence. OFAC gathers evidence on the identified target to determine whether it meets the criteria for identification or designation and whether there is a network associated with the target. OFAC requests information on the target from other partner agencies. According to OFAC officials, they do not request information from all of OFAC’s partner agencies during the investigation of each target if they deem the information provided by a subset of the partner agencies to be sufficient evidence. OFAC also conducts its own research and uses all sources—including public and classified—to develop an evidentiary package. OFAC works with partner agency headquarters, and domestic and international field offices (as needed for each case) to collect information on either a person’s drug trafficking activities or activities that support drug trafficking organizations. OFAC and partner agency officials said they also collect information about targets from their foreign government partners and counterparts, as appropriate. OFAC also ensures that the derogatory information collected is linked to the target and not, for example, another person with the same name. 3. Assemble evidentiary package. OFAC compiles the collected information into an evidentiary package maintained in its electronic case management system. According to OFAC officials, the case management system documents the date when each step is completed and contains sign off by an approving official. In addition, OFAC officials said the case management system contains a summary of the evidence OFAC gathered to justify designating an individual or entity, and links to the source documents provided by partner agencies. Because the information in the evidentiary package may be sensitive, classified, and compiled from multiple sources, OFAC typically does not share the evidentiary packages with its partner agencies, with the exception of DOJ for legal review purposes. However, under certain circumstances, OFAC may allow partner agencies to review portions of an evidentiary package after ensuring that there is a specific need to know and that there is adherence to rules for disclosure to another agency. 4. Legal review. OFAC provides the evidentiary package first to Treasury’s Office of General Counsel and then to DOJ’s Civil Division for legal review. Treasury’s Office of General Counsel reviews the package for legal sufficiency, while DOJ assesses the risks associated with potential future litigation resulting from the identification or designation. According to OFAC and DOJ officials, attorneys often seek clarification or additional evidence from OFAC at this stage. In those cases where Treasury’s Office of General Counsel deems the basis for designation or identification to be legally sufficient and DOJ determines that the identification or designation presents an acceptable level of litigation risk, they give OFAC clearance to finalize the evidentiary package and proceed with the action. 5. Consult with partner agencies. Once the evidentiary package passes legal sufficiency, OFAC consults with all of its partner agencies to obtain concurrence. OFAC presents the names of individuals or entities it has decided to designate and a high-level summary of the reasons for designation to its partner agencies for final consultation and concurrence. According to officials from each of the partner agencies, this allows them the opportunity to identify if OFAC’s plan to designate a target will damage any of their operations or ongoing investigations or cause unacceptable damage to diplomatic relations with the host government in the country where the target resides or maintains citizenship. This consultation phase also allows for OFAC and other Treasury offices, such as the Office of Terrorist Financing and Financial Crimes (TFFC), as well as partner agencies to develop an engagement plan for outreach with relevant parties, including foreign governments and the press, as appropriate. While partner agencies at the U.S. embassy in the country of the proposed designation are given the opportunity to concur with OFAC’s decision to designate, agency representatives in headquarters give final agency concurrence. OFAC does not designate anyone unless all partner agencies concur. If an agency tells OFAC at any point during the process that designating a target would damage the agency’s investigation or operations, OFAC officials said they coordinate with the partner agency to determine how to proceed. For example, OFAC may delay the Kingpin Act designation until the partner agency has completed its investigation and can take simultaneous action against the target. 6. Designate the target(s). If all partner agencies concur with OFAC’s designation proposal, OFAC takes action to identify the Kingpins and designate any affiliated targets. The evidentiary package is provided to the OFAC Director who, if concurring with the designation, signs a memorandum that identifies or designates the targets. At this time, OFAC also adds the individuals and entities to the SDN List. OFAC announces the actions publicly and records them in the Federal Register. Figure 3 provides an example of an OFAC announcement of a Kingpin Act designation. According to Treasury officials, OFAC also coordinates with other Treasury offices and partner agencies at headquarters and U.S. embassies to execute an outreach and engagement plan. Once OFAC has taken these steps, it begins to monitor and enforce compliance with the sanctions it imposes against Kingpin Act designees. OFAC and U.S. partner agency officials said flexibility built into the process can affect the length of time it takes to investigate a target and the sequence of steps taken. For example, OFAC’s coordination with multiple U.S. partner agencies and foreign governments throughout the process may influence the sequence of steps taken. In addition, drug traffickers often change their organizations and operations in an attempt to evade investigators, which can contribute to the length of time to complete an investigation. According to OFAC officials, the process is intended to ensure that: designations do not jeopardize other agencies’ ongoing investigations, OFAC’s actions are coordinated with other planned civil or criminal actions against each target to maximize the disruption to the drug trafficking organization, and investigators can collect sufficient evidence to designate targets despite targets’ constantly changing efforts to evade detection. Coordination with partner agencies. Multiple U.S. agencies may have concurrent investigations of a Kingpin Act target, requiring coordination between OFAC and U.S. partner agencies to include decisions about how sharing information could affect their own investigations. When agencies withhold information about a target to ensure that their own investigation of the target is not compromised, it may take longer for OFAC to develop an evidentiary package that satisfies the Kingpin Act’s designation criteria. In addition, the length of the designation process and the sequence of steps also depend on how far along other agencies’ investigations of a target are. For example, if a law enforcement agency is able to provide enough evidence when the potential target is first identified and OFAC officials think little additional investigation is needed to further develop an evidentiary package, they may complete more than one of the designation steps concurrently in order to designate the target as quickly as possible. According to OFAC and partner agency officials, the coordination allows them to agree to and plan the civil and criminal actions to be taken to maximize the U.S. government’s efforts to disrupt the drug trafficking organization. Coordination with foreign government officials. According to OFAC and U.S. partner agency officials at headquarters, in Mexico, and in Colombia, foreign government officials determine whether to share derogatory information about Kingpin Act targets on a case-by-case basis. OFAC and partner agency officials in Colombia credited host government information sharing as a primary factor in OFAC’s ability to complete evidentiary packages for Colombian targets and one reason why OFAC has been able to investigate and designate more individuals and entities in Colombia than in other countries. Coordination with foreign partners also allows OFAC to time designations strategically to coincide with civil and criminal actions against the target by foreign governments. For example, on May 17, 2019, the Under Secretary for TFI and a Mexican government official announced coordinated, sanctions-related actions. The Under Secretary announced the Kingpin Act designation of seven individuals and six entities affiliated with the Cartel de Jalisco Nueva Generacion (CJNG) and its close ally, the Los Cuinis drug trafficking organizations. Treasury coordinated closely for months with the Mexican Financial Intelligence Unit, the Mexican Attorney General’s Office, and the Mexican Federal Police on this action. The Mexican Financial Intelligence Unit froze the Mexican bank accounts held by all of the designees, according to Treasury officials. Although actions like this sometimes require them to delay a designation, OFAC officials noted that the results of coordination can increase the impact of Kingpin Act designations. Changes to drug trafficking organizations. According to OFAC and partner agency officials, drug traffickers attempt to evade investigators by being unpredictable and making changes to their organizational structure and operations. Changes to the organization may result in the need for longer investigations if information gathered about an individual trafficker or a trafficking organization becomes outdated or irrelevant. Operational changes include such things as using shell companies or virtual assets, which several OFAC and partner agency officials said complicate their attempts to gather evidence of proceeds from drug trafficking, and can also lengthen the designation process. Based on our analysis of nine Kingpin Act designations, we found that the duration and sequence of steps leading to designations varied. According to OFAC officials, each investigation includes a unique set of circumstances that affect the length and sequence of steps. From initiation to designation, the nine cases we reviewed ranged from 6 months to 38 months (See fig. 4.) Time spent preparing the evidentiary packages for the cases ranged from 3 months to 31 months. Although OFAC got partner agency concurrence for seven cases after attorneys had begun the legal review of evidentiary packages, OFAC documented completion of this step before legal review had begun for two cases. The timing for submitting the case to partner agencies for initial designation consideration varied, including one case that OFAC did not submit until the month that attorneys completed legal reviews of the evidentiary package. For one case, OFAC followed most of the steps twice before designating the target. OFAC officials told us that if the decision is made to delay a designation after they have completed all of the steps leading up to designation, it may be necessary to go through the steps again to determine whether there is new derogatory information about the target and whether the information in the evidentiary package is still current and legally sufficient before designating the target. OFAC officials reported that they disseminate information about the designation process and agencies’ roles and responsibilities for the process in several ways. Treasury’s website includes Frequently Asked Questions that explain how agencies should interact with OFAC and each other and a hotline number that agencies can use if they need additional information. OFAC has provided presentations and memos to its partner agencies that further explain the Kingpin Act designation process. Treasury has also issued Kingpin Act regulations, which, among other things, define key terms related to the act and clarify prohibited activities. Because DEA is involved in the majority of OFAC’s Kingpin Act investigations, OFAC and DEA have signed a memorandum of understanding that further clarifies how they work together and share information related to Kingpin Act cases. Among other things, it establishes the terms for OFAC to have a staff person co-located at DEA and to have access to DEA files that support Kingpin Act investigations. According to OFAC officials, it does not have a similar formal collaboration mechanism with its other partner agencies. OFAC’s partner agencies reported that they generally understand their responsibilities under the Kingpin Act and how to find answers to their questions about the Kingpin Act designation process. Several officials stated that their responsibilities include recommending potential targets, participating in interagency group meetings, deciding whether to concur with OFAC’s decisions to investigate or designate persons, and responding to specific requests for information from OFAC. Officials from the headquarters of each of the Kingpin Act partner agencies said they found the information available from OFAC about the designation process sufficient to help them understand their roles. Most partner agencies in Colombia and Mexico, where the majority of Kingpin Act designations have taken place, reported that the presence of an OFAC Attaché in those countries made it easy for them to ask for clarification on the process as needed. OFAC monitors and enforces financial sanctions against Kingpin Act designees implemented by U.S. financial institutions. OFAC regulations and a memorandum of understanding with Federal Banking Agencies (FBA)—such as the Federal Reserve and the Office of the Comptroller of the Currency (OCC)—establish sanctions compliance and information sharing responsibilities. For example, OFAC regulations require banks to report all blockings of designee property to OFAC within 10 days of the occurrence and recommend that banks designate a Compliance Officer responsible for monitoring compliance with its programs, and an officer responsible for overseeing blocked funds. According to the memorandum, each FBA will provide OFAC the following types of information to help OFAC monitor bank compliance with sanctions programs, including Kingpin Act sanctions: Notification of any apparent unreported sanctions violations discovered during their examinations of financial institutions. Information on their examinations into a bank’s OFAC compliance policies, procedures, and processes. Notification of any deficiencies in a bank’s compliance programs, such as cases when a bank failed to respond to supervisory warnings concerning OFAC compliance violations. FBAs have established a schedule for regular examinations of U.S. banks, which generally include their OFAC compliance programs. Federal Reserve and OCC officials stated that their legal and bank examiner staff address sanctions compliance regimes as part of their general examination duties. They are not responsible for determining sanctions violations, but assess the bank’s compliance program as a whole for soundness. Both FBAs said they perform bank examinations every 12 to 18 months, and determine the extent to which they should review the bank’s OFAC compliance program during the examination. For example, OCC officials said that, in accordance with the guidelines, they review banks’ internal testing of their OFAC compliance programs. According to OCC and Federal Reserve officials, banks have compliance programs to identify and block OFAC designees, including Kingpin Act designees, from accessing the U.S. financial system. According to OFAC and FBA officials, the U.S. banks with the most international branches and non-U.S. clients are most likely to hold assets or facilitate financial transactions of foreign nationals. FBA examinations confirm that bank programs include procedures for ensuring compliance with OFAC sanctions, including Kingpin Act sanctions. We met with officials from the five U.S. banks that FBA officials said have the largest presence in Latin American countries, and bank officials reported that their compliance programs check daily for evidence they are maintaining any customer relationship or allowing any transactions involving designated individuals. OFAC has imposed a range of penalties on banks that have violated the terms of Kingpin Act sanctions. OFAC and bank officials said that a bank is noncompliant when it either fails to freeze a Kingpin Act designee’s assets at that bank or processes a transaction involving a Kingpin Act designee. According to Treasury officials, Treasury makes public any civil monetary penalties it imposes and OFAC has imposed monetary penalties on banks for Kingpin Act compliance violations in 12 cases for a total of $17 million since 2000. Officials from the five banks we spoke with said they self-report cases of noncompliance with OFAC sanctions against Kingpin Act designees as required. For example, one of the banks stated that they identify and report between six and 12 cases of noncompliance to OFAC each year. OFAC officials said when a bank self-reports a violation OFAC often issues them a cautionary letter. According to OFAC officials, they issue this as a warning when they have no reason to believe that the bank committed the violation intentionally or that it is evidence of a systematic problem that the bank has not taken steps to address. The OFAC officials said the letter may or may not include a required response from the bank. State has denied visa applications and revoked visas of Kingpin designees, prohibiting them from traveling to the United States after they were designated. According to both OFAC and State’s Consular Affairs officials, State contacts OFAC whenever a visa adjudicator finds information in State’s Consular Affairs database regarding a possible OFAC concern about a visa applicant. State’s officials use their Consular Lookout and Support System database to identify any information entered by U.S. government agencies, including OFAC, to indicate that an individual does not qualify for a U.S. visa. Although the consular database does not specify that OFAC’s concern is specifically related to a Kingpin Act designation, they do not issue a visa without discussing with OFAC whether the applicant’s designation disqualifies them from a visa. The consular database does not specify which OFAC flags are related to the Kingpin Act, and State was unable to provide us the number of visas that have been revoked or denied under the program. OFAC has also blocked (or denied access to) designees’ U.S. property as part of Kingpin Act sanctions. According to OFAC officials, they seek to identify U.S. property that designees own or control as part of their investigation of designees both before and after they are designated. As a result of those investigations, OFAC officials said they have blocked 15 U.S.-incorporated companies, nine real estate properties, and 21 other “tangible” properties (such as automobiles, aircraft, and boats), which remained blocked as of August 2019. An individual’s property is no longer blocked if that individual is removed from the SDN list. U.S. citizens, corporations, and financial institutions are not permitted to do business with blocked companies. OFAC has met the mandated requirement to report to Congress on agencies’ personnel and resources expended on the imposition of Kingpin Act sanctions, but provided limited guidance to partner agencies that has resulted in inconsistent data on Kingpin Act–related expenditures. Furthermore, OFAC has not disclosed limitations to the consistency or reliability of the expenditure data in its reports. The Kingpin Act requires Treasury, no later than July 1 each year, to provide the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate a report describing the status of sanctions imposed, including the personnel and resources directed towards the imposition of such sanctions during the preceding fiscal year, and providing background information with respect to newly-identified significant foreign narcotics traffickers and their activities. OFAC has submitted annual reports to Congress since 2003. Each report includes information from OFAC on both agencies’ expenditures and on designations announced during the year. To prepare the report, OFAC requests partner agency expenditures. OFAC sends annual emails requesting the amount agencies spent on personnel and resources for their Kingpin Act activities. For at least the last 3 years, OFAC has sent the partner agencies a memo stating that for personnel expenses, agencies could estimate the percentage of time spent by staff members on activities directly attributable to implementing the Kingpin Act during the year covered in the report and multiply by the staff members’ salaries during the year. However, the guidance does not clarify or provide examples of types of personnel expenditures that agencies should consider as attributable to implementing the Kingpin Act. As a result, agencies must interpret for themselves what to include in their estimated personnel expenditure submissions to OFAC. The memo listed some examples of what agencies could include as resource expenditures related to the implementation of the Kingpin Act, such as research materials and information access, travel, equipment, supplies, outside services, and security. OFAC officials said they are not more prescriptive with their guidance because the Kingpin Act is not specific about which expenses to report. Agencies reported different methods for determining expenditure amounts and the information on agency personnel expenditures varied substantially from year to year. Officials from some of the partner agencies reported calculating estimates of personnel expenditures based on the paygrades of personnel engaged in Kingpin Act investigations or interagency meetings, while others stated that they did not report expenditures because they determined that their level of engagement was minor and did not warrant reporting. According to DEA officials, they do not report on personnel expenditures for the time they spend investigating Kingpin Act targets because the investigations simultaneously support their own cases against the targets. According to officials from some agencies, such as DHS, they only reported personnel expenditures for cases on which they were the lead investigative agency. As a result, DHS reported $2.4 million in personnel expenditures in fiscal year 2015, $0 between fiscal years 2016 and 2018, and then about $2 million in fiscal year 2019. Other partner agencies, such as DOD and State, report personnel expenditures even though they do not lead specific Kingpin Act investigations. As a result, the reported expenditures of agencies may not be consistent and may not represent a reliable total for Kingpin Act activities across the U.S. government. See figure 5 for the Kingpin Act–related personnel expenditures reported by Treasury and its partner agencies. Agencies’ determinations of what they include as resource expenditures vary as well. For example, several agencies have reported no resource expenditures for the last 3 years, but State has reported a small resource expenditure that, according to State officials, accounts for transportation expenses for Kingpin Act interagency meetings. OFAC officials said they do not know what agencies are including in their annual expenditure reports because OFAC does not seek information from agencies explaining their annual expenditure submissions and OFAC reports them as submitted. Moreover, OFAC officials said they did not verify the amounts reported to confirm, for example, why DHS and DOD reported personnel expenditures in some years many times greater than DOJ personnel expenditures, even though DOJ is the lead investigative agency for the majority of Kingpin Act cases. The Kingpin Act requires OFAC to report on the personnel and resources expended on the imposition of Kingpin Act sanctions each year. Additionally, federal internal control standards require entities to ensure that they are using quality information to achieve their objectives. Although Treasury reported in the most recent annual report from July 2019 that OFAC’s significant increase in resource expenditures was due to the addition of overseas costs and database contracts, the annual reports do not account for significant changes in agencies’ expenditures from year to year. Because OFAC does not provide guidance that clarifies what agencies are required to include in their annual expenditure submissions or disclose the limitations in the consistency and reliability of expenditure data from partner agencies, OFAC cannot provide assurance that its annual reports to Congress on Kingpin Act interagency expenditures contain quality information that is transparent and consistent across all reporting agencies. As a result, Congress may not be able to provide informed oversight of personnel and resources expended on implementing the Kingpin Act. OFAC and partner agency officials identified challenges that make it difficult—or impossible—to assess the overall effectiveness of the Kingpin Act sanctions in achieving U.S. policy goals to reduce illicit narcotics within the United States. These officials noted that the primary challenge in assessing the effectiveness of Kingpin Act sanctions is that they cannot isolate the impact of Kingpin Act sanctions from those of multiple other efforts and factors. For example, whether the estimates of the amount of drugs entering the United States is increasing or decreasing depends upon the sum total of activities of counternarcotics programs managed by organizations in the United States, other countries, and the international community. In addition, we have previously reported other challenges that agency officials have stated can make it difficult to assess the effectiveness of economic sanctions, including frequent shifts in policy goals and objectives, and a lack of reliable data. Treasury officials noted that sanctions are often used in conjunction with other policy tools, such as diplomatic engagement and export controls. According to Treasury officials, distinguishing the impact of each tool leveraged is exceedingly difficult due to the limited information available via intelligence and law enforcement channels. Moreover, while Treasury’s partner agencies said Kingpin Act designations contribute to their counternarcotics goals, these agencies’ are unable to quantify contributions specifically related to the Kingpin Act in measuring progress toward their own agencies’ goals. Partner agency officials said they do not consider the Kingpin Act to be a government program for which effectiveness can be assessed; rather, they stated that the Kingpin Act is one tool among many that U.S. government agencies can use where appropriate in their efforts to combat drug trafficking. According to partner agency officials, effectiveness of sanctions in achieving policy goals is often discussed at an interagency level, which allows the U.S. government to consider these issues in the larger policy context, because sanctions are often only one element of broader government-wide strategies to achieve U.S. policy goals. Treasury conducts some assessment of both the potential and observed impacts of specific Kingpin Act designations. The Office of Intelligence and Analysis (OIA), Treasury’s intelligence component, conducts both predesignation and postdesignation assessments. OIA officials noted that they consider it part of their mission to inform Treasury policymakers of potential impact before a designation occurs. According to OIA officials, OIA’s predesignation assessments are narrowly focused and can be delivered in any number of formats, including emails, spreadsheets, and briefings. OFAC officials said they provide OIA with name and summary evidentiary information on a potential target. According to OIA officials, they use the information to assess the potential level of impact (e.g., negligible or significant) a Kingpin Act designation may have on the target, its network, or other third parties, based on a variety of factors. For example, OIA may determine that a Kingpin Act designation can result in significant impact if evidence indicates that a designation will impose high costs and obstacles for a target to continue drug trafficking activity. According to OIA officials, such assessments have been required by the Under Secretary since 2018 and OIA has completed predesignation assessments on all Kingpin Act designations during that time period for senior Treasury officials’ consideration. Additionally, since 2018, OIA has completed two postdesignation assessments. OIA officials said they share these assessments with OFAC so it can incorporate the lessons learned into future investigations or to develop new designations. OIA officials said that the decision to conduct postdesignation assessments of Kingpin Act designations is based on resources and the availability of information to assess impact. OFAC officials said they have not undertaken formal, systematic assessments on the impact of Kingpin Act designations because OFAC’s staffing resources are primarily assigned to designation investigations and reviewing of petitions for Kingpin Act designation reconsideration. OFAC and its U.S. partner agencies reported on various results related to Kingpin Act sanctions. OFAC reported that it had designated more than 2,000 individuals and entities under the Kingpin Act as of June 2019. (See fig. 6 for the number of individuals and entities designated by year.) These designations are about evenly split between designations of individuals and designations of entities across the four designation classifications. OFAC reported 195 Tier 1 designations (B1 and B4 classification), and 2,033 Tier 2 designations (B2 and B3 classification). OFAC also reported that it has frozen more than half a billion dollars of sanctioned individuals’ or entities’ assets under the Kingpin Act between 2000 and 2019. According to OFAC data, almost 80 percent of the total assets frozen were from one individual in 2017. For the remaining years, the amount frozen fluctuated between $1.7 million and $36.4 million without a clear upward or downward trend. Further, law enforcement partner agencies cited the Kingpin Act as an important tool in aiding their investigations that may result in actions such as indictment or arrest of designees. For example, in one of our nine cases, a federal grand jury indicted Raul Flores Hernandez—the suspected leader of a Guadalajara-based drug trafficking organization—in August 2017 for moving large quantities of cocaine from South America to Mexico for distribution and further transportation into the United States. OFAC designated him (as well as 21 of his alleged criminal associates and 42 businesses and other entities affiliated with his drug trafficking organization) under the Kingpin Act concurrent with the indictment. According to OFAC and DEA officials, sharing information about Flores Hernandez was essential to both the designations and the indictment. According to these officials, disrupting the access of significant narcotics traffickers and their networks to the U.S. financial system and barring them from travel to the United States has been helpful in motivating several designees to cooperate with law enforcement investigations. Moreover, U.S. agencies report that the ability to sanction entire drug trafficking networks increases pressure on traffickers to cease involvement with illicit narcotics. OFAC officials stated that removing designees from the OFAC list is, in some cases, evidence of disruption of drug trafficking organization or other positive behavior change. To be removed, designees must petition OFAC and demonstrate that they no longer meet the criteria to be designated under the Kingpin Act. As of June 2019, OFAC had removed 399 individuals and entities previously designated under the Kingpin Act, of which five were Tier 1 designations (B1 and B4 classification), and 394 were Tier 2 designations (B2 or B3 classification). Foreign government officials also reported that Kingpin Act sanctions have assisted them in imposing penalties on drug traffickers. Foreign government officials we met with in Colombia reported that their Supreme Court issued a ruling that permits their countries’ banks to terminate accounts of, and deny service to, Kingpin Act designees because of the risk the banks would face if they continued those business relationships. According to Mexican government officials, a bankers’ association, the Financial Intelligence Unit, and the bank regulator in Mexico issued guidance supporting Mexican banks’ rights to deny service to Kingpin Act designees. Mexican government officials also stated that once the United States publicly identifies a Mexican national as a drug trafficker by designating him or her under the Kingpin Act, Mexican law enforcement entities face less public opposition when they arrest, imprison, or extradite the individual. According to government officials we met with in Colombia, information that OFAC and other U.S. agencies share as part of their Kingpin Act investigations help them justify seizing designees’ assets. For example, according to OFAC officials, OFAC, DEA, and Colombian authorities led a joint investigation that led to the October 2018 Colombian asset seizure of 202 assets of two individuals in Colombia valued at over USD $500 million. The Colombian seizure included farms, land, houses, hotels, apartments, businesses, commercial properties, emerald mines, horses and vehicles. Some Kingpin Act designations have had unintended consequences for foreign persons other than those targeted by the sanctions. The Congressional Research Service has reported that some designations have been associated with significant economic losses and unemployment by individuals not involved in illicit narcotics when large companies are liquidated in the process. Treasury officials stated that foreign drug trafficking organizations often attempt to integrate their illicit proceeds into the legitimate economy by owning or controlling businesses that may employ individuals who are not associated with drug trafficking activities. According to Treasury officials, it is imperative that Treasury designate businesses that are owned or controlled by drug trafficking organizations, despite the employment of individuals who may not have knowledge of the illicit activities. They said that prior to designating such foreign businesses, Treasury coordinates closely with other U.S. government agencies, the relevant U.S. embassy, and with the relevant foreign counterparts to minimize the impact on employees who lack knowledge of the illicit activities. According to the Congressional Research Service, some designations have also been associated with upticks in drug trafficking–related violence when, in combination with law enforcement action, drug trafficking organizations are dismantled and competing groups vie for abandoned territory. Furthermore, some designations have negatively affected public perceptions of the United States within the designee’s country of residence, according to OFAC and partner agency officials. For example, OFAC and State officials stated that there was significant public criticism of U.S. intervention when OFAC designated a Mexican celebrity in conjunction with a significant narcotics trafficker. OFAC officials said it can be difficult to address public opposition to a Kingpin Act designation because the information in the evidentiary package is sensitive and cannot be revealed publicly. The Kingpin Act enables the U.S. government to sanction significant international narcotics traffickers and their networks worldwide by designating foreign individuals and entities, resulting in the freezing of their U.S. assets and an inability to conduct transactions, including financial transactions, with U.S. businesses. OFAC and its partner agencies consider the Kingpin Act a valuable tool as part of U.S. counternarcotics strategy, but have noted that the plethora of counternarcotics efforts make it difficult to isolate the effects of the Kingpin Act. OFAC has reported on personnel and resources directed toward imposing Kingpin Act sanctions annually to Congress. However, OFAC provided limited guidance to agencies about what expenditure data to report. As such, we observed considerable inconsistencies in resource expenditures reported by various partner agencies, and also determined that methods for determining expenditures varied by agency. Moreover, OFAC does not disclose agency data limitations, such as explaining why the data may vary from year to year, before reporting the information to Congress. Without consistent agency data and disclosure of data limitations regarding information on agency resources devoted to Kingpin Act activities, Congress may be limited in its ability to conduct oversight of implementation of the Kingpin Act. We are making the following 2 recommendations to the Department of the Treasury: The Secretary of the Treasury should ensure that the Office of Foreign Assets Control provides its partner agencies more specific guidance regarding Kingpin Act–related expenditure data to improve the consistency of data submitted by these agencies. This could include, for example, how agencies account for expenditures that support Kingpin Act investigations when they are not the lead and for what types of activities resource expenditure data are required. (Recommendation 1) The Secretary of the Treasury should ensure that the Office of Foreign Assets Control discloses information about limitations in the consistency and reliability of the agency expenditure data in its annual reports to Congress. (Recommendation 2) We provided a draft of this report to Treasury, DHS, State, DOD, DOJ, CIA, the Federal Reserve, and ONDCP for comment. We received technical comments from Treasury, DHS, and the Federal Reserve, which we incorporated as appropriate. The remaining agencies informed us that they had no comments. Treasury did not agree or disagree with our recommendations. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of the Treasury, the Acting Secretary of Homeland Security, the Secretary of State, the Secretary of Defense, the Assistant Attorney General for Administration, the Director of the Central Intelligence Agency, the Chair of the Board of Governors of the Federal Reserve System, and the Deputy Director of the Office of National Drug Control Policy. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2964 or GurkinC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Our objectives were to examine (1) how U.S. agencies designate individuals and entities under the Foreign Narcotics Kingpin Designation Act (Kingpin Act); (2) the extent to which U.S. agencies monitor, enforce, and report on sanctions under the Kingpin Act; and (3) what agencies have done to assess the effectiveness of the Kingpin Act. To examine the process for designating individuals and entities under the Kingpin Act, we interviewed officials from the mandated partner agencies—the Departments of the Treasury (Treasury), State, Homeland Security (DHS), and Defense; the Federal Bureau of Investigation (FBI); and the Drug Enforcement Administration (DEA)—and reviewed documents, including the statutes that comprise the Kingpin Act. We also reviewed documentation on collaboration and information-sharing agreements between Treasury’s Office of Foreign Assets Control (OFAC) and its partner agencies to determine the ways in which agency participation has been formalized in the designation process. In addition, we received responses from the Central Intelligence Agency to questions we sent. We selected and reviewed a nongeneralizable sample of Kingpin Act designations made since 2015 to understand OFAC’s designation process and the extent of the variation in the timing and sequence of the steps leading to the designations. From the countries with the most designations, we considered only B1 and B4 designations. Additionally, we only considered designations that occurred after May 2015, when the authority to designate was delegated from the President to the Secretary of the Treasury, so that the process followed for designation would most closely resemble the current process. We considered cases with a range in number of B2 and B3 designations affiliated with the B1 or B4 designee. Furthermore, we ensured that we selected cases from both Western Hemisphere countries where most of the designations have occurred (including cases in Colombia and Mexico where we performed fieldwork), and non–Western Hemisphere countries to learn whether the process differs geographically. To account for those criteria, we selected nine cases to review. OFAC provided data on the milestone dates and results associated with the cases from its electronic case management system. We were unable to independently assess the data provided against the system, but we were able to corroborate some dates, such as designation dates, with public documents such as press releases. In addition, OFAC officials answered our questions about the variance in case data they provided by explaining factors that contributed to the length or sequence of investigative steps of each case. As a result, we deem the case study data provided by OFAC to be sufficiently reliable for the purposes of this report. To examine the extent to which U.S. agencies monitor, enforce, and report on Kingpin Act sanctions, we interviewed officials from OFAC and its partner agencies regarding their roles in sanctions implementation. We also interviewed officials from some of the Federal Banking Agencies (FBA) that OFAC officials said had responsibilities to help monitor bank programs for compliance with OFAC sanctions, including the Kingpin Act financial sanctions—the Office of the Comptroller of the Currency and the Board of Governors of the Federal Reserve System—and five U.S. banks recommended by the FBAs as having the largest presence in Latin American countries to assess implementation of economic sanctions, including any penalties incurred for sanctions violations. In addition, we met with officials from financial regulator agencies and the national banking associations in Colombia and Mexico to understand how U.S. enforcement of Kingpin Act sanctions affected their operations. To assess the extent to which OFAC included information required by the Kingpin Act for Treasury’s reports to Congress, we also reviewed the annual reports OFAC submitted to Congress from 2003 to 2019 and OFAC guidance sent to partner agencies from 2017 through 2019 seeking their input into the reports. We interviewed officials from each partner agency about the methodology they used to calculate their annual resource and personnel expenditures. Because we found that the agencies calculate their personnel expenditures differently and OFAC does not verify the amounts reported, we did not find the data reliable and are presenting the data to illustrate the problems with their reliability. To examine what agencies have done to assess the effectiveness of the Kingpin Act, we interviewed OFAC and U.S. partner agency officials in Washington, D.C., Colombia, and Mexico, regarding their efforts to assess effectiveness and results of Kingpin Act designations and any challenges in measuring effectiveness. We also held telephone interviews with U.S. partner agency officials in Panama. We interviewed OFAC and Office of Intelligence and Analysis (OIA) officials regarding the type of assessments being done on the Kingpin Act. We reviewed strategic planning documents from the partner agencies to identify their counternarcotics objectives and, if available, related performance measures they track. We also used information from the nine designation cases we selected and interviewed U.S. partner agency officials as well as host government, financial industry, international organization, and nonprofit officials in Colombia and Mexico, to get perspectives on the results of Kingpin Act designations. To report on designations and removals of the Kingpin Act, we used OFAC’s official brochure detailing the complete listing of Kingpin designations as of June 11, 2019. The data in the brochure are taken from OFAC’s Specially Designated Nationals and Blocked Persons (SDN) List. The data include designations from years 2000-2019 categorized by type of designation. We compared the data in the brochure against the SDN List for accuracy and asked OFAC officials about their efforts to ensure the reliability of the SDN List data. We determined the data were sufficiently reliable for the purposes of our report. To report the amount of foreign designees’ assets frozen, we collected available data from OFAC for calendar years 2008-2018. To obtain the types and number of U.S. assets that have been blocked under the Kingpin Act, we interviewed OFAC officials and reviewed their published data. It was beyond the scope of this engagement to independently verify the number of U.S. assets blocked. We conducted this performance audit from May 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jennifer Grover, Mona Sehgal (Assistant Director), Jeffrey Baldwin-Bott (Analyst in Charge), Travis Cady, Marisela Perez, and Barbara Shields made key contributions to this report. Ashley Alley, Martin De Alteriis, Neil J. Doherty, Toni Gillich, Jeff Harner, John Hussey, and Triana McNeil also contributed to this report.", "summary": "Drug deaths in the United States have been rising for years. According to the Centers for Disease Control and Prevention, in 2017 there were over 70,000 U.S. drug overdose deaths. This national emergency results in part from the activities of international narcotics traffickers and their organizations. The Kingpin Act, enacted in 1999, allows Treasury to designate and sanction individuals and entities that contribute to illicit narcotics trafficking. Sanctions and other consequences include blocking a designee's property and assets, denying U.S. travel visas to designees, and penalizing U.S. persons who violate the prohibitions in the Kingpin Act. Treasury is required to submit an annual report to Congress on agencies' Kingpin Act–related personnel and resource expenditures and sanctions activities. This report examines (1) how U.S. agencies designate individuals and entities under the Kingpin Act; (2) the extent to which U.S. agencies monitor, enforce, and report on sanctions under the Kingpin Act; and (3) what agencies have done to assess the effectiveness of the Kingpin Act. GAO reviewed documents from and interviewed officials at Treasury, the Department of State, and other partner agencies. GAO also performed fieldwork in Colombia and Mexico. Under the Foreign Narcotics Kingpin Designation Act (Kingpin Act), the Department of the Treasury's (Treasury) Office of Foreign Assets Control (OFAC) leads a flexible interagency process to designate and sanction foreign individuals and entities that contribute to illicit narcotics trafficking. OFAC identifies potential Kingpin Act designees, compiles evidence, submits it for legal review, and seeks concurrence from partner agencies on designation decisions. OFAC and U.S. partner agencies monitor and enforce Kingpin Act sanctions, but OFAC has not ensured consistency and transparency of the expenditure data it has reported to Congress. Federal Banking Agencies monitor the OFAC compliance programs of U.S. banks through regular bank examinations. Additionally, OFAC handles enforcement through warnings, monetary penalties, and other methods. As required, OFAC reports annually to Congress on Kingpin Act designations and corresponding agency expenditures, but it has provided limited guidance to partner agencies on expenditure data they report. As a result, agencies use different methods to calculate the personnel and resource costs associated with their Kingpin activities. For example, the Department of Homeland Security said it only reports personnel expenditures when it is the lead investigative agency, but the Department of Defense reports personnel expenditures when it is not the lead. Furthermore, OFAC has not reported the limitations in agency data in its congressional reports. This lack of clear expenditure information could hinder oversight of the Kingpin Act. OFAC officials noted challenges to assessing the overall effectiveness of the Kingpin Act, but they and their U.S. and international partners track and report a range of results. The primary challenge cited is the difficulty of isolating the effect of the Kingpin Act from multiple other programs combating drug trafficking organizations. Results reported by OFAC and its partners include, for example, from 2000-2019, OFAC reported that it had designated more than 2,000 Kingpins and their supporters, and frozen more than half a billion dollars in assets under the act. In addition, host government officials reported that Kingpin Act sanctions assist them in imposing penalties on drug traffickers. GAO is recommending that Treasury ensure that OFAC (1) improve guidance to partner agencies on their Kingpin Act–related expenditures and (2) disclose expenditure data limitations in its annual Kingpin Act reports to Congress. Treasury did not agree or disagree with the recommendations.", "document_type": "gao"}
{"report": "USPS has the mission of providing prompt, reliable, and efficient universal postal service, and federal law requires USPS to “provide postal services to bind the Nation together through the personal, educational, literary, and business correspondence of the people.” USPS is required to serve, as nearly as practicable, the entire population of the United States. USPS has a number of key stakeholders, each with different interests in USPS and its operations (see fig. 1). USPS is a key part of the mailing industry, and over time, it has become both a competitor and partner to private companies that also operate in the broader mail and delivery industries. For example, although United Parcel Service (UPS) and FedEx both pay USPS to deliver packages that they enter into USPS’s system at local post offices where carriers pick up their mail, they also compete with USPS for end-to-end package delivery business, such as moving packages from the retailer to the purchaser. Similarly, FedEx is USPS’s largest contractor, providing air transportation for Priority Mail Express (formerly Express Mail), Priority Mail, and First-Class Mail. UPS is also one of USPS’s largest contractors, providing long-distance mail transportation. Over the years, legislation has changed key aspects of the business model used to provide the nation’s postal services. Until 1970, the federal government provided postal services via the U.S. Post Office Department, a government agency that received annual appropriations from Congress. At that time, Congress was involved in many aspects of the department’s operations, such as selecting postmasters and setting postal rates and wages. In addition, the President controlled the hiring and firing of Postmasters General, as it was a cabinet-level position. By the late 1960s, the department had several major problems including financial losses, management problems, service breakdowns, and low productivity. Because key postal business decisions were made by Congress through the legislative process, postal management had limited ability to plan and finance department operations and capital investments in accordance with postal needs. In order to improve and modernize postal services, the Postal Reorganization Act (PRA) was enacted in 1970 and replaced the U.S. Post Office Department with USPS, an independent establishment of the executive branch of the government of the United States. Congress designed USPS to be a self-sustaining, business-like entity headed by a Board of Governors that would cover its operating costs primarily with revenues generated through the sales of postage and postal-related products and services. However, by the early 2000s, USPS faced a bleak financial outlook that put its mission of providing universal postal service at risk, according to the 2003 Presidential Commission on the United States Postal Service. The Commission evaluated USPS’s business model and concluded that USPS must have greater flexibility to operate in a business-like fashion, but that this latitude required enhanced transparency to enable effective management and congressional oversight. The Postal Accountability and Enhancement Act (PAEA) was enacted in 2006. PAEA provided USPS additional pricing flexibility for mail products, but with provisions for increased transparency, oversight, and accountability, among other things. Specifically, PAEA gave USPS broader latitude to change postal rates in a more streamlined process that included review by the newly created Postal Regulatory Commission (PRC). The PRC, which replaced the former Postal Rate Commission, is an independent establishment of the executive branch responsible for regulating USPS. PRC is required to make annual determinations of USPS’s compliance with mail delivery standards and postal rate requirements. If PRC finds noncompliance, it is required to specify USPS actions to restore compliance. USPS’s current business model is not financially sustainable due to declining mail volumes, increased compensation and benefits costs, and increased unfunded liabilities and debt. USPS’s costs continue to rise faster than its revenues, and although USPS has made changes over the years to address these challenges, its efforts have been limited by stakeholder opposition and statutory requirements. As online communication and payments have expanded, USPS continues to face decreases in mail volume, its primary revenue source. First-Class Mail volume has declined 44 percent since fiscal year 2006, the year that total mail volume peaked. The long-term decline of First-Class Mail volume, which USPS has stated was exacerbated by the Great Recession and expects to continue for the foreseeable future, has fundamental implications for USPS’s business model because First-Class Mail is USPS’s most profitable class of mail. USPS Marketing Mail— which comprises most other mail volume—declined 27 percent from fiscal year 2007 to fiscal year 2019, in part due to electronic advertising alternatives. The volume of USPS competitive products more than tripled since fiscal year 2007. This volume, however, began to decline in the second half of fiscal year 2019 due to growing competition for package delivery. USPS has taken steps to right size its operations in response to declining mail volumes. For example, in both 2009 and 2011, USPS announced plans to close several thousand USPS retail facilities. However, due to stakeholder opposition—including from members of Congress, postal unions, and local communities, among others—USPS instead closed a few hundred retail facilities. USPS also expanded the alternative options for customers to access retail postal products and services outside of USPS-operated postal facilities—such as self-service kiosks and partnerships with other retailers such as contract postal units. According to USPS, as a compromise effort to right size the retail network and due in part to USPS’s efforts to expand retail alternatives, USPS began reducing retail hours at selected post offices in 2012, ultimately decreasing retail hours at approximately 13,000 post offices. Another major cost-cutting effort was its 2011 Network Rationalization Initiative, a multi-part plan to consolidate its mail processing network. USPS consolidated more than 160 mail processing facilities, but did not fully implement this initiative following opposition from various stakeholders. In addition to stakeholder opposition to changing postal services, federal laws also factor into USPS’s limited ability to respond to declining mail volumes. For example, federal laws define the level of postal services USPS is to provide, postal products, and pricing. Postal services to be provided: USPS has limited ability to make changes in the postal services it provides. Specifically, USPS is required to provide 6-days-a-week delivery and to operate postal facilities across the country. Federal law requires USPS to provide the maximum degree of effective and regular postal services to rural areas, communities, and small towns where post offices are not self- sustaining. Federal law also limits USPS’s ability to close retail facilities. For example, USPS cannot close a small post office solely because it is unprofitable. As of the end of fiscal year 2019, there were approximately 34,600 postal retail outlets nationwide, including approximately 31,300 USPS-managed post offices, branches, and stations, and, as we recently reported, USPS’s analysis showed that about 36 percent of its retail facilities were unprofitable in fiscal year 2018. Postal products and pricing: USPS’s pricing flexibility is limited by a price cap on market-dominant products that generally limits rate increases for these products to a common measure of inflation. Each competitive product is required to cover its attributable costs; competitive products collectively are required to recover their attributable costs; and competitive products collectively are required to cover a PRC-specified minimum of USPS’s institutional costs. In addition, USPS is prohibited from providing new nonpostal products and services. Such requirements affect USPS’s ability to increase revenues. While mail volumes have decreased, USPS’s compensation and benefits costs for current employees have been increasing since 2014, despite USPS’s efforts to control these costs. Although USPS reduced its total workforce (career and non-career employees) from 785,900 in fiscal year 2007, to 617,700 in fiscal year 2013, its workforce increased to about 630,000 in fiscal year 2019. Similarly, as we previously reported, recent trends show total work hours increased from a combination of new hiring and increased work hours for current employees. Specifically, we reported that from fiscal years 2014 through 2018, work hours increased by 5.4 percent. The number of work hours associated with higher costs— overtime and penalty overtime—have also been increasing. According to USPS, total compensation and benefits costs increased by almost $1 billion in fiscal year 2019 alone. USPS has implemented changes to help control employee compensation and benefits costs, including lowering pay for new career employees and increasing use of non-career employees. For example, as we previously reported, starting about 10 years ago, USPS’s collective bargaining agreements have included the ability to hire up to 20 percent of the workforce as non-career employees. Non-career employees are less costly because they generally have lower pay rates and are not entitled to the full federal benefits received by career employees. According to USPS officials, non-career employees are also “more flexible” because there are fewer restrictions on their tasks and schedules. We recently reported that our analysis estimated that USPS likely saved about $6.6 billion from fiscal years 2016 through 2018 from increased use of non- career employees. USPS has recognized trade-offs in increasing the use of non-career employees in entry-level positions, such as a high turnover rate, as would be expected for almost any entry-level position in the private sector. With respect to benefits costs for current postal employees, we have recently reported that USPS has also achieved savings by gradually decreasing its contribution percentage for employee health insurance premiums over the past decade, with corresponding increases in the contribution percentage paid by employees. These changes were negotiated with the four major postal labor unions and were included in successive collective bargaining agreements, each of which covered a multi-year period. We found that the reduction in USPS health insurance contributions generated estimated savings of about $1.4 billion for fiscal years 2016 through 2018. A number of restrictions limit USPS’s ability to control employee compensation and benefits costs. As we recently reported, USPS compensation and benefits costs—which represent about three-fourths of its total costs—are driven by a mix of USPS contracts and policies, including collective bargaining agreements negotiated with unions representing 92 percent of USPS employees, and statutory requirements governing USPS employee pay and benefits. When USPS and its unions are unable to agree, the parties are required to enter into binding arbitration by a third-party panel. USPS’s collective bargaining agreements with these labor unions, some of which were established through binding arbitration, have established salary increases and cost- of-living adjustments and, as mentioned above, have also capped the number of non-career employees at approximately 20 percent of the number of employees covered by the agreements. Federal law requires USPS to participate in the Federal Employees Health Benefits Program (FEHBP), which covers current employees and retirees, as well as federal pension and workers’ compensation programs. Further, USPS must provide fringe benefits that, as a whole, are no less favorable than those in effect when the Postal Reorganization Act of 1970 was enacted. USPS’s unfunded liabilities and debt, which consist mostly of unfunded liabilities for retiree health and pension benefits, have become a significant financial burden, increasing from 99 percent of USPS’s annual revenues at the end of fiscal year 2007 to 226 percent of its fiscal year 2019 revenues. At the end of fiscal year 2019, USPS’s unfunded liabilities and debt totaled approximately $161 billion. However, it has begun paying down this debt in recent years, leaving a balance of $11 billion at the end of fiscal year 2019 (see fig. 2). Total unfunded liabilities have risen in part due to USPS not making payments to fund its retiree health and pension benefits. USPS has stated that it prioritizes its “primary universal service mission” when it is unable to fulfill all of its financial obligations, and that it therefore did not make payments to fund its postal retiree health benefits and pensions to minimize the risk of running out of cash. In doing so, USPS cited its precarious financial condition and the need to cover current and anticipated costs and any contingencies. It has not paid $55.4 billion in required payments for funding these benefits through fiscal year 2019, including $47.2 billion in missed funding payments for retiree health benefits since fiscal year 2010, and $8.2 billion for funding pension benefits since fiscal year 2014. In addition, for many years, USPS had been at its statutory debt limit of $15 billion; however, it has begun paying down this debt in recent years, leaving a balance of $11 billion at the end of fiscal year 2019. A number of federal laws define the requirements for USPS’s retiree health and pension benefits that comprise most of its unfunded liabilities. Retiree health benefits: Federal law establishes certain requirements for postal retiree health benefits, including basic requirements for coverage eligibility and contributions. In administering the FEHBP, the Office of Personnel Management (OPM) negotiates with the insurance providers to establish the level of benefits provided to beneficiaries. USPS is required to prefund its share of health benefits for its retirees. Under PAEA, the first 10 years of prefunding payments were fixed—ranging from $5.4 billion to $5.8 billion annually from fiscal years 2007 to 2016. From fiscal years 2007 through 2016, USPS was also required to continue “pay-as-you-go” payments for its share of premiums for current retirees. The permanent schedule for USPS payments to prefund postal retiree health benefits under PAEA required USPS to make annual payments starting in fiscal year 2017. Currently, USPS no longer makes payments for retiree health benefits premiums. Starting in 2016, these premiums are paid out of the RHB Fund until it is depleted, whereupon USPS will resume paying premiums on a pay-as-you-go basis. As we previously reported, survey data we reviewed indicated that most companies do not offer retiree health benefits and that the number of companies providing such benefits is decreasing over time. Many companies that have retained their retiree health benefits have done so by making changes to control costs, including tightening eligibility and restructuring benefits. However, all approaches we identified have different potential effects and would require congressional action. Pension benefits: Federal law also requires USPS to finance its pension benefits under the Federal Employees Retirement System (FERS) and the Civil Service Retirement System (CSRS) and contains specific provisions defining USPS’s required contribution level to fund these benefits. USPS’s payments consist of a rolling 30-year amortization schedule to address unfunded FERS liabilities, an amortization schedule to address unfunded CSRS liabilities by 2043, and the normal costs of FERS benefits for current employees. The large domestic companies we selected in the airline, auto, and railroad industries took actions over a number of years to address major business challenges. Airlines such as Delta, American, and United faced competition from low-cost airlines, downward pressure on airfares, and rising compensation, benefits, and volatile fuel costs. These challenges were exacerbated by the economic downturn that began in 2000, the terrorist attacks of September 11, 2001, and the Great Recession that began in December 2007, all of which temporarily depressed demand for airline travel. Similarly, General Motors (GM) and Ford Motor Company (Ford) faced competition from lower cost competitors, the Great Recession, a workforce and networks too large to be supported by smaller sales volumes, and other changes in the market. Likewise, large U.S. railroads competed for freight and passengers from other transportation modes, such as the trucking and airline industries that operated over publicly provided infrastructure, while railroads had to invest in their own infrastructure. Based on our review of the selected companies’ annual reports and statements to the SEC as well as selected federal laws, and GAO, CRS, and other organizations’ reports, books, and academic articles, among other sources, we found that selected companies made changes to (1) products and services, (2) financial self-sustainment, and (3) use of the bankruptcy process. While some of the selected businesses restructured through a bankruptcy proceeding, other businesses took similar actions outside of the bankruptcy process. Mergers also played an important role for the airlines and railroads. The selected companies made multiple changes to their products and services. Specifically: Airlines: Selected airlines altered pricing by changing route structure to focus on more profitable routes and adding fees, such as for checked baggage. In addition, all three selected airlines merged with other major airlines, thereby broadening their routes and revenues. Automakers: Selected automakers focused on producing more profitable brands and models, discontinuing some models and introducing others. For example, during its financial difficulties about a decade ago, GM discontinued a number of unprofitable brands. In 2018, after years of declining car sales, Ford said it would eliminate some of its most well-known cars in North America, allowing it to devote more resources to sport utility vehicles and trucks. Railroads: Large railroads focused on more profitable routes and abandoned unprofitable routes or sold them to other railroads. For example, the federal government created a new freight railroad, Conrail, by merging several bankrupt railroads in the Northeast and Midwest. As we have reported previously, federal government deregulation of railroad pricing and contracts after 1980 also helped Conrail to reach profitability and increase capital investment. Cost reduction was a major theme for the selected businesses in the airline, automotive, and rail industries, particularly with respect to compensation, benefits, and infrastructure costs. Specifically: Airlines: The three selected airlines negotiated wage cuts and work rule changes with their unions; made workforce reductions, in part by outsourcing work; and cut pension and retiree health benefit programs. Wage cuts included all levels of employees, such as management, pilots, flight attendants, and mechanics. Benefit cuts involved reducing the level of pensions and retiree health benefits and transitioning pension programs from defined benefits plans to defined contribution plans that were structured to be less costly. Airlines also reduced infrastructure costs by eliminating some hubs, reducing the total number of aircraft, and changing the mix of aircraft in their fleet to save on maintenance and fuel costs. The airlines further cut costs by restructuring debt, reducing facility leasing costs, and renegotiating aircraft leases and vendor contracts. While in bankruptcy, the airlines took major actions to reduce their costs. For example, United implemented steep pay cuts, cut retiree health benefits, and terminated its defined benefit pension plans, resulting in the Pension Benefit Guaranty Corporation (PBGC) assuming responsibility for some of its pension payments, and a reduction in benefits for the plan’s participants. United also cut its workforce size by 31 percent, reduced the number of airplanes by 19 percent, and reduced the total number of flights by 13 percent. Delta and American also reduced pay and pension benefits while in bankruptcy, and the PBGC assumed responsibility for some of Delta’s pension liabilities. Automakers: The two selected automakers negotiated pay cuts, lower wages for entry-level employees, and changes to work rules designed to increase competitiveness; cut the workforce size in about half; made changes to employee benefits; closed many auto plants and dealerships; eliminated some vehicle brands and models; and changed the production process to increase efficiency. Specifically, The International Union, United Automobile, Aerospace and Agricultural Implement Workers of America (UAW) agreed to cuts in compensation for the automakers’ employees to levels paid by GM and Ford’s competitors. UAW also agreed to move retiree health care benefits into a private Voluntary Employee Beneficiary Association (VEBA) for current and former UAW-represented employees in 2007; the VEBA took over health benefits for retirees starting in 2010. The automakers also closed defined benefit pension plans to new participants and moved to defined contribution pension plans for eligible new employees. Railroads: The Staggers Rail Act of 1980 was enacted to improve the financial stability of the railroad system. Subsequently, railroads improved their financial health through, among other things, cost reduction measures such as reducing their workforce through layoffs and federal buyouts agreed to by unions, and abandoned or sold off unprofitable rail lines to reduce infrastructure and operating costs. Overall railroad employment fell greatly as railroads consolidated, reduced service, and changed work rules. For example, Conrail reduced its workforce from about 82,000 employees in 1977 to about 21,000 in 1996. Congress specifically facilitated Conrail’s downsizing by passing the Northeast Rail Service Act of 1981, which among other things, directed a $200 million a year reduction in labor costs and authorized Conrail to terminate employees. The U.S. government provided assistance to selected companies in various forms, including appropriated funds, loans, and other actions that helped enable companies to reduce their expenses. For example: Automakers: The federal government committed $49.5 billion in funding to help GM continue to operate while restructuring. After the government became the majority owner of the GM that emerged from bankruptcy, the Administration laid out core principles that included managing its ownership in a hands-off manner and voting as a shareholder only on core governance issues. Airlines: Under the 2001 Air Transportation Safety and System Stabilization Act, the federal government provided nearly $5 billion in compensation to airlines for losses due to the September 11, 2001 terrorist attacks, including $856 million for American, $668 million for Delta, and $782 million for United. Additionally, under the Emergency Wartime Supplemental Appropriations Act, $2.4 billion was appropriated to the Transportation Security Administration to compensate airlines for certain security expenses and fees, including $358 million to American, $411 million to Delta, and $300 million to United. Railroads: The federal government spent about $8 billion creating, subsidizing, and preparing Conrail for sale to the private sector. This funding included $7 billion through 1988 for purchasing properties of bankrupt railroads, operating subsidies, and capital improvements and employee buyouts. Amtrak, the national passenger railroad, took over money-losing intercity and commuter passenger rail services and funded federal payments of up to $25,000 for each laid-off employee as authorized by legislation. Some airlines, automakers, and railroads made changes through the bankruptcy process. Specifically: Airlines: All three selected airlines went through bankruptcy proceedings—United in December 2002, Delta in September 2005, and American in November 2011. The actions these airlines took to reduce costs while in bankruptcy are discussed above. Automakers: GM declared bankruptcy in June 2009 to implement its restructuring plan. The federal government became GM’s majority shareholder and continued to provide financial assistance while GM was in bankruptcy. The bankruptcy court approved the sale of substantially all of old GM’s assets to a newly formed company (“new GM”) in June 2009 as well the old GM’s amended bankruptcy plan in March 2011, and its assets and liabilities were transferred to liquidating trusts. These actions and the restructuring—which included major cost reductions described above—helped enable GM to report positive net income in every year from 2010 through 2019. Railroads: In 1970, the Penn Central Railroad, one of the largest in the country at the time, filed for bankruptcy. As Penn Central’s losses continued while in bankruptcy, the value of whatever assets that might have been available to satisfy its creditors’ claims was further eroded. Therefore, the bankruptcy proceeding was initiated to liquidate the railroad to meet the demands of its creditors. Faced with the potential cessation of railroad service for an entire section of the country, the federal government created Conrail to take over and operate specified portions of Penn Central as well as several other bankrupt railroads in the Northeast United States. Legislation was enacted that, combined with Conrail actions described above, enabled Conrail to become profitable. In the countries we selected, foreign governments also took actions to develop goals for their postal operators that enabled changes in the postal operators’ institutional structures and actions to address competitive pressures, economic downturns, and market changes. Based on our review of the selected countries’ government reports, including summaries of postal reform legislation, annual reports from foreign posts, and interviews with foreign government officials and representatives of foreign posts, we found that changes were made to foreign posts’: (1) products and services; (2) financial self-sustainment; and (3) institutional structure. Some of these actions were authorized by legislation that changed the status and duties of the postal operators; others were taken over a lengthy period that predated passage of key legislation. Some foreign posts also diversified into nonpostal products and services; however, postal-specific challenges and changes are the focus of this discussion. The selected foreign posts made multiple changes to their products and services. We found that, when transforming their postal operations, selected countries determined the level of postal services they deemed necessary to adequately serve the public. The main product changes involved expansion of their package delivery business by enhancing service and investing in facilities and sorting equipment dedicated to handling packages. Large increases in their package volumes and revenues helped offset declining letter mail volume and revenues. Two of the selected foreign posts reduced service levels to help control costs. For example, according to New Zealand Post officials, in response to reduced mail volume, New Zealand Post reduced its required frequency of mail delivery in urban areas from 5 to 3 days while maintaining 5-day delivery in rural areas with the stated goal of ensuring that postal service remained viable without government subsidization. Australia Post revised the service standards it provided for delivery of letter mail in 2016, resulting in slower delivery of some mail. In addition, the main pricing changes have involved price increases for all mail, as well as the introduction of discounted postal rates for letter mail entered at processing facilities that generally were closer to the final destination of the mail. For example, Royal Mail raised postal rates above the rate of inflation after relaxation of its price cap. In France, the postal regulator established a price cap in 2015 of 3.5 percent per year (in addition to inflation) and established a new cap in 2018 of 5 percent annual rate increases (including inflation) for 2019 through 2022 for letter mail and packages considered part of universal postal service. The 2018 price cap allows La Poste more price flexibility than the previous one. Likewise, Australia Post implemented an above-inflation rate increase in January 2020, citing the need to generate revenues to offset growing financial pressures from declining letter mail volume. Cost reduction was a major theme for the selected foreign posts, particularly with respect to compensation, benefits, and infrastructure costs. These actions were stimulated in part by reductions in mail volume and the associated revenues and workload, and in part by legislative or regulatory changes that allowed greater competition and created incentives, such as privatization, which resulted in shareholder pressure to enhance or encourage organizational profitability and efficiency. Because postal operations are labor-intensive, actions to address workforce costs were particularly important to improving financial results. These often went hand in hand with outsourcing, network restructuring, reductions in service levels to better align service with demand, and other changes to increase productivity and achieve cost savings. The governments and the postal operators of selected countries also considered the effects on stakeholders when making postal reform decisions. Specific changes varied from one foreign post to another. Workforce: In Germany, Deutsche Post officials told us that its employees hired after 1990 were designated private sector employees with lower pay and benefits than postal employees who were previously hired as civil servants. In France, La Poste officials told us that La Poste likewise transitioned its workforce in the 1990s from civil servants to private employees and ended recruitment of civil servants in 2000. They also said that this transition provided La Poste with a more flexible workforce and reduced its pension liability. Australia Post closed its defined benefit pension plan to new employees in 2012, while Royal Mail is transitioning to a defined contribution pension plan that it introduced in 2018. Royal Mail and New Zealand Post also have reduced the size of their workforce in recent years. Infrastructure: Some selected foreign posts consolidated their mail processing networks to reduce costs. For example, following the reunification of Germany, Deutsche Post replaced more than 320 mail processing facilities with 82 such facilities. Royal Mail and La Poste reduced the number of mail sorting centers by about 40 percent over the past two decades. In addition, all five selected postal operators have made changes to reduce retail network costs. As we reported in 2011, some foreign posts reduced the number of postal operator-owned and -operated facilities and in some cases closed facilities in an effort to reduce costs. At the same time, some minimized this disruption by expanding retail access through alternatives such as Internet sales and partnerships with retail businesses such as grocery stores or pharmacies. We reported that these changes either reduced operating and labor costs or improved customer service, in some cases because the partner retail facility stays open longer, or both. This trend continues. Deutsche Post, Post Office Limited in the United Kingdom, La Poste, Australia Post, and New Zealand Post have outsourced or franchised most of their postal retail functions to private nonpostal operators. For example, Deutsche Post franchised its postal retail outlets to local businesses to not only reduce expenses, but also increase the availability of postal retail services nationwide by putting retail counters in stores that were open longer than traditional post offices. Deutsche Post representatives stated that while there was some initial resistance to these changes, these concerns abated after a few months as customers realized they received better service and longer hours. The representatives also said the number of retail outlets has increased in recent years in response to increased demand for e-commerce package returns. La Poste has a substantial and growing proportion of retail facilities operated by private providers (in partnership with small shops, especially in rural areas) or co- located in local government-owned buildings (in partnership with local town halls in rural areas). In addition, Australia Post combined its letter and parcel delivery networks in 2018 to obtain efficiencies. Productivity: All of the postal operators in the selected countries took actions to enhance productivity, such as improving automation of mail processing, modernizing and streamlining operations, and changing work processes. For example, Deutsche Post officials stated they had streamlined their parcel sorting process and went from 140 parcel sorting centers in 1990 to 34 in 2019. Deutsche Post officials stated that this streamlining improved service performance for parcels; previously, most parcels were delivered within 3 or 4 days; by 2019, 93 percent of parcels were delivered within 1 day. Royal Mail officials also stated that they increased their level of automation and introduced new methods of parcel delivery, such as new high-capacity equipment for mail carriers, to increase efficiency as well. Government Assistance: The governments of some of the selected countries provided assistance to their postal operators in various forms, including assuming pension costs, granting tax exemptions, and providing subsidies to postal retail operations. For example, the governments of France and the United Kingdom assumed costs of defined benefit pensions for postal employees who are civil servants, while the government of Germany assumed these costs to the extent that they exceed the costs of private sector pensions. While all new employees are employed as private sector employees, German audit officials stated that the government’s pension obligation for postal employees who are or were civil servants and their dependents will last until 2079 and cost the government about €306 billion. The assumption of these pension plans was important in facilitating the privatization of these postal operators, according to Royal Mail and Deutsche Post officials, because without the reduced unfunded pension liabilities, the stock offerings for the newly created companies would have been much less attractive to private investors. France also provides subsidies for certain postal activities. In addition, the United Kingdom split off the postal retail network from Royal Mail into Post Office Limited, a separate entity owned and subsidized by the national government. Each of the five foreign countries we selected changed their institutional structure following the development of goals for postal transformation that were tailored to national needs and priorities. Each of these countries had definitions of universal postal services including provisions for nationwide delivery and access to postal retail services. As the following examples illustrate, the national context of each country has been of central importance to shaping these goals. In addition, postal transformation in the three selected European countries—Germany, the United Kingdom, and France—also had an international context in the broader effort to create and promote a single European internal market. Germany: In the 1990s, the German government changed its postal operator, Deutsche Post, from a government agency to a government- owned corporation. In 2000, the government changed Deutsche Post to a privately owned company so it could raise capital, modernize, and create a sustainable infrastructure. Goals for the newly created Deutsche Post were to maintain the high level of postal services, increase efficiency, and enhance profit. The legislation that created Deutsche Post also gave it more flexibility to respond to changes in the market. Currently, Deutsche Post remains a private company with the government holding a minority of its shares. United Kingdom: In 1969, the government of the United Kingdom changed the Post Office, its postal operator, from a government department to Royal Mail, a government-owned corporation prior to changing it to a privately owned company. It began privatizing Royal Mail in 2013 so Royal Mail could become more modern and competitive by raising private capital, operating with more flexibility, and be subject to shareholder scrutiny to drive efficiency. As mentioned above, the government of the United Kingdom also split off postal retail units into a new government-owned entity called “Post Office Limited” that is separate from Royal Mail. France: In 1991, the government of France changed La Poste, the postal service of France, from a government department to a public industrial and commercial establishment. In 2010, the government of France converted La Poste into a state-owned public limited company. This step allowed La Poste to raise additional public capital for investments to maintain and modernize its network, build a European parcel and express network, allow acquisitions outside Europe, and add nonpostal products and services, such as expanding its banking services. Australia: In 1989, the government of Australia changed its postal operator, Australia Post, from a government department to a government-owned corporation. It is required to earn a reasonable rate of return on its assets, maintain its equity, pay a reasonable dividend to the government, and be liable for the same taxes and charges as its competitors. New Zealand: According to a recent report, New Zealand Post began as a government department and became a state-owned enterprise in 1987, when legislation (State-Owned Enterprises Act 1986) created several such entities to address challenges in the national economy. Such corporations are required to be as profitable and efficient as a comparable business not owned by the state. Congress will face difficult choices in fundamentally reassessing the three critical foundational elements of USPS’s business model—level of universal postal service, financial sustainability, and institutional structure. These choices are likely to require changes in laws and will have differing effects on postal stakeholders. While the specific impacts will depend on the changes made, some or all of USPS’s stakeholders could be affected and these impacts should be considered as part of any reassessment. All three key areas are interrelated and significant changes in one area may affect another. For example, we have testified that Congress faces a tradeoff between the level of postal services the nation needs and the level of postal services the nation is willing to pay for. Based on our prior work, a starting point for a fundamental reassessment of USPS’s business model should be determining the level of postal services the nation needs. While mail volumes have declined since fiscal year 2006, businesses, governments, and households still pay USPS billions of dollars annually to deliver more than 140 billion of pieces of mail, demonstrating a continued nationwide demand for postal services. We and others—such as USPS, PRC, and USPS OIG—have called for a fundamental reexamination of what postal services the nation needs now and may need in the future. In particular, we have testified that USPS’s growing financial difficulties, combined with changing demand for postal services, have provided Congress with an opportunity to examine and potentially redefine what postal services should be provided on a universal basis and how they should be provided. As mentioned above, there are numerous federal laws and requirements related to the provision of universal postal service. For example, 6-day delivery has long been required by annual USPS appropriations acts. Over the past decade, legislation has been introduced, and USPS and others have proposed reducing the frequency of delivery. However, no legislation has been enacted that would allow USPS to reduce delivery frequency. There is also no consensus on the level of postal services the nation needs. Changes in service levels face opposition from some stakeholders, such as labor unions, affected communities, and the general public. Currently, legislation has been introduced that supports the preservation of both 6-day and door-to-door delivery for addresses that have it, and some mailer groups support one or both of these positions. Representatives from postal labor unions we spoke with stated that universal postal service is appropriate as currently defined and could be expanded to provide more products and services. Stakeholders have also expressed differing views on whether the frequency of delivery should be reduced to help USPS address its financial problems. USPS and PRC have estimated that eliminating Saturday delivery would reduce USPS’s costs but also would likely affect mail volume sent by business mailers, although USPS and PRC disagreed on the degree to which it would do so. USPS estimated that it could save $1.4 billion to $1.8 billion a year by reducing the frequency of mail delivery to 5 days while maintaining 7-day package delivery. To put these potential savings into context, delivery is USPS’s most costly operation. We reported, however, that USPS would face challenges in, among other things, how efficiently USPS would absorb the additional volume delivered in the remaining delivery days and its potential effect on mail volume. We also described potential trade-offs, such as possibly reducing the demand and value of USPS products if customers are not getting their delivery needs met. Further, key postal stakeholders hold opposing views on many other options that have been proposed. For example, to raise revenues, USPS and some postal labor unions favor eliminating or raising the price cap on market-dominant products, which would enable USPS to raise rates more than the rate of inflation but would require changing the current regulatory system. Mailers, however, have expressed opposition to increasing postage rates higher than the rate of inflation. Postal labor unions also favor increasing revenues by introducing new postal and nonpostal products and services. We have recently found, however, that USPS’s nonpostal revenues generated at postal retail facilities are small and that there are limited opportunities to generate revenues from nonpostal products and services from USPS’s delivery network. For example, we reported that nonpostal products and services offered through USPS’s postal retail facilities generated about $431 million in fiscal year 2018, accounting for less than 1 percent of USPS’s total revenue. In addition, we reported several potential limitations to USPS adding nonpostal services to USPS’s mail carrier activities, such as checking in on homebound and older residents and reporting signs of blighted properties. These limitations included, among other things, limited net revenue potential and a potential adverse effect on mail service delivery. A fundamental reassessment of USPS’s business model would include determining the degree to which USPS should be financially self- sustaining, i.e., the degree to which USPS’s operating costs and liabilities should be covered by ratepayers (such as businesses and individuals who pay USPS to send mail). If a reassessment concluded that USPS should be fully self-sustaining, past legislative proposals that would change elements of USPS’s costs and revenues may be worth congressional consideration. Stakeholders, however, have not reached a consensus on any of these proposals and none has been enacted. Another avenue is to focus on reducing costs. As we have also reported, compensation and benefits costs, which comprise about three-quarters of USPS’s operating costs, are driven by a mix of USPS contracts and policies, including collective bargaining agreements negotiated with unions representing 92 percent of USPS employees and statutory requirements governing USPS employee pay and benefits. USPS compensation and benefits costs for its active employees increased by almost $1 billion in fiscal year 2019 despite a slight decrease in the size of the workforce and declining workload from reduced mail volume. While USPS has been able to make some reductions in pay and benefits, its ability to control compensation costs is significantly inhibited by the collective bargaining process, which results in binding arbitration if an impasse is reached. According to USPS, all negotiations take place against the backdrop of binding arbitration (and the arbitrators have historically been reluctant to deviate from the status quo), resulting in only incremental changes. We have long supported changing the laws regarding collective bargaining to require that USPS’s financial condition be considered in binding arbitration. We have also reported that the collective bargaining structure, which was established many years ago, should be reexamined considering the dramatic changes in USPS’s competitive environment and rising personnel costs that have contributed to USPS’s losses. Multiple bills have been proposed changing the process and/or criteria for collective bargaining to a different standard. The 2018 report from the Task Force on the United States Postal System recommended that collective bargaining over compensation should be eliminated for postal employees. While eliminating or revising the collective bargaining process could potentially provide USPS greater flexibility in employee pay, there would be trade-offs. For example, we recently found that the potential annual cost savings associated with USPS implementing cuts for all current employee pay by 1 percent would be about $321 million; a 10 percent cut would potentially save $3.2 billion. However, we also reported that while USPS could reduce its compensation costs through efforts such as reducing mail delivery frequency, USPS would face challenges in realizing these savings, such as the extent to which workhours could be reduced. Furthermore, these savings could be offset by other factors including service or morale issues. With respect to benefits, we recently reported on a wide range of possible changes that would reduce or limit costs for postal retiree health benefits, nearly all of which would require a legislative change. Some approaches would shift costs to the federal government; some would reduce benefits or increase costs to postal retirees or employees; and some approaches would change how benefits are funded. Similar types of legislative changes could be considered with respect to postal pension benefits. In addition, if Congress decides that USPS should be financially self- sustaining but makes no changes to improve USPS’s financial condition, USPS will be unable to address unfunded liabilities for postal retiree health and pension benefits, an inability that could eventually translate into higher costs for future postal ratepayers. Ultimately, if USPS’s expenses continue to exceed its revenues, USPS is likely to continue to miss required payments, reduce operations, or seek federal appropriations through the annual appropriations process to cover its operating costs. If Congress determines that USPS should no longer be expected to be financially self-sustaining or if actions taken do not restore financial self- sustainability, Congress could provide financial assistance—not unlike what happened in other countries or for selected domestic business—to enable USPS to cover its costs, and to fulfill its obligation to provide federal health and pension benefits to postal employees and retirees. Federal financial assistance could be provided in various forms, such as: Appropriating funds to help cover USPS’s operating costs, essentially the same arrangement that was used to finance the former U.S. Post Office Department. Appropriating funds to supplement USPS’s payment of certain costs, such as to help fund its capital investments. For example, the federal government provides Amtrak, which is operated as a for-profit corporation with annual grants to operate and make capital investments in passenger rail service to supplement the revenues it generates. Assuming some or all of USPS’s unfunded liabilities for retiree health benefits. This could take different forms, such as direct assumption of responsibility for unfunded liabilities or, more indirectly, requiring postal retirees to participate in Medicare which would decrease USPS’s costs but increase Medicare’s costs. Assuming some or all of USPS’s unfunded liabilities for pension benefits. Writing off some or all of USPS’s debts to the U.S. Treasury. Options regarding the federal government providing ongoing financial assistance to USPS could have effects on both USPS and the federal government as a whole. Notably, this assistance would have to be funded in some way—either through offsetting reductions in federal expenditures in other areas, through tax increases, or through an increase in federal deficits. Moreover, reliance on federal funding could mean that USPS would be exposed to the uncertainty inherent in the annual appropriations process. In addition, access to annual appropriations to cover financial shortfalls could have an unintended consequence of reducing USPS’s incentives to become more cost-efficient. At present, there is no consensus on USPS’s level of financial self- sustainability should be. For example, representatives of labor unions we spoke with stated that Congress should address issues regarding postal retiree benefits before any reassessment of USPS’s financial self- sufficiency can occur. Increased federal financial support of USPS might also face political opposition, due to concerns about minimizing federal deficits and ensuring fair competition between USPS and the private sector. The final area of consideration in any reassessment of USPS’s business model is identifying what institutional structure could best deliver the level of postal services at the level of financial sustainability that Congress has determined. As an independent establishment of the executive branch, USPS must provide universal postal service while being expected to be financially self-sustaining. Thus, there may be a tension between attempting to fulfill public service missions while operating in an efficient, business-like and financially self-sustaining manner. USPS officials told us that as an entity of the federal government, its primary purpose is the achievement of its statutory universal service mission, and it has no incentive to seek to maximize profits at the expense of achieving its public service mission over the long term. Therefore, according to USPS, if it were maintained as an independent establishment of the executive branch or converted into a more typical government agency, it could continue to prioritize this public service mission. Additionally, there is widespread support for USPS’s institutional status as an independent establishment of the executive branch. Congressional resolutions have been introduced stating that “Congress should take all appropriate measures to ensure that the United States Postal Service remains an independent establishment of the Federal Government and is not subject to privatization.” Likewise, all four of the largest USPS unions, both of its management organizations, and a number of mailer groups and mailers support keeping USPS an independent establishment of the executive branch. Nonetheless, considering the depth of USPS’s financial problems and its poor financial outlook, now may be an appropriate time for Congress to reconsider what institutional structure will be most appropriate for USPS in the 21st century. However, any substantial change to USPS’s institutional status would require changing federal law. Based on our past work and options identified by USPS and others, Congress has a range of options it could consider in reassessing USPS’s structure (see table 1). The potential advantages and disadvantages of placing USPS into alternative institutional structures for USPS have long been debated. Several options have been discussed: USPS could revert to a traditional federal agency. USPS and its governance would be more consistent with other federal activities that are dependent on federal appropriations provided through the annual appropriations process. Many postal stakeholders, however, do not support such a change. For example, USPS told us that if it became a typical government agency reliant on federal appropriations to fill any operating gap, the political constraints that typically apply to government agencies could reduce USPS’s adaptability. Furthermore, changing USPS to a typical government agency could reduce its incentives to increase revenues or reduce costs in response to changing communication technologies and patterns. Consistent with this point, the 1968 presidential commission found that when it operated as a federal agency, the former U.S. Post Office Department had a lack of innovation, cost-control, and capital investment with major managerial decisions made through the legislative process. These and other issues led to persistent operational deficits, low productivity, and poor mail service. USPS could remain an independent establishment of the federal government with additional authority—relative to the status quo—over certain aspects of its business model. For example, USPS could be provided more flexibility to raise postal rates, introduce new nonpostal products, and make various changes to reduce its costs such as reducing the frequency of delivery or further consolidating its retail, transportation, and processing networks. USPS has long advocated for additional flexibility under its current institutional structure—such as to eliminate the price cap on market-dominant products and have greater flexibility to offer nonpostal products. Representatives from postal unions also stated that USPS should be provided additional flexibility, such as to expand into nonpostal products, which some representatives stated could help preserve its public service mission to provide universal postal services. Consensus does not, however, exist as to what flexibility should be given to USPS. For example, some mailer groups favor keeping the price cap unchanged, stating the cap is sufficient and provides incentives for increased efficiency. In addition, some stakeholders have supported further limiting USPS’s flexibility to reduce service standards, close retail outlets, or consolidate processing facilities, while other stakeholders noted that greater flexibilities in these areas would reduce USPS’s costs and enhance its efficiency. If USPS were to become a government-owned corporation or a government-sponsored enterprise, USPS could be incentivized to increase efficiency as a federally chartered entity providing a public service with a predominantly business nature. For example, three of the four third-party experts we spoke with stated that USPS should retain its current mission of universal postal service but become more like a private company with greater freedom to operate in a business- like manner. The new structure could promote greater incentives toward cost control and financial success. Government-owned corporations are federally chartered entities that provide a public service with a predominantly business nature. These corporations can have a board of directors that is appointed by the President. Government-sponsored enterprises are federally chartered entities that are privately owned and, typically, have a board of directors appointed by private sector owners. If USPS were to be a private company it would become accountable to the shareholders of that company. USPS told us that as a private company, its primary incentive could be to maximize profits and that, in USPS’s view, private shareholders would be most focused on short-term financial outcomes. Thus, any such design of a private USPS would need to balance its profit motive with the nation’s needs for universal postal service and the affordability of that service. For example, while Royal Mail is a private corporation owned by shareholders, the government of the United Kingdom still mandates 6- day delivery for letter mail (and 5-day delivery for packages) with specified delivery standards, and some mail types are subject to price controls. In addition, the United Kingdom monitors the provision of universal postal service and can take enforcement actions regarding regulatory conditions and competition law. Similarly, Germany has legal instruments to enforce the provision of universal postal services, although according to German government officials these instruments have not been used. Although some of the domestic businesses we examined reduced their costs through bankruptcy, this is likely not an option for USPS. As detailed in its report (see appendix I), National Bankruptcy Conference (NBC) found that USPS is not eligible to become a “debtor” under chapters 11 or 9 of the current Bankruptcy Code. According to NBC, a court likely would deem USPS to be a “governmental unit”—meaning it could not file for relief under chapter 11—and a court would deem USPS not to be a “municipality”—meaning it could not file for relief under chapter 9. Therefore, legislation amending the Code would be required to make USPS eligible for relief. According to NBC, however, even if the Bankruptcy Code were amended to allow USPS to file as a chapter 11 or 9 debtor, the Code would still not currently authorize a bankruptcy court to discharge the ongoing statutory obligations that have led to USPS’s current financial situation, and amending the Code to authorize such court action could raise constitutional (separation of powers) concerns. Moreover, NBC noted the bankruptcy process is designed to address obligations that have already accrued, not to override or amend statutes that apply to a debtor’s post- bankruptcy operations and obligations. In NBC’s opinion, because USPS’s pension and health care obligations are imposed by statute instead of by contract as in most bankruptcy reorganization proceedings, the bankruptcy process is not an effective or appropriate mechanism to address USPS’s obligations or potential transformation. NBC thus concluded that “although the bankruptcy process and bankruptcy tools raise interesting ideas for restructuring USPS’s existing and future obligations…all roads for doing so lead back to Congress.” Any changes that Congress makes to USPS’s business model will take time to implement and will need to be reevaluated as market conditions evolve. We have reported that fully implementing major transformations of government agencies can take years, and we also found that to be the case for the selected domestic businesses and foreign posts noted in this report, regardless of the changes needed. For example, railroads in the Northeast, airlines, and automakers took many years to implement a series of changes to their businesses. It took Germany more than a decade to fully liberalize and then privatize its postal operator, and the United Kingdom’s effort to privatize its postal operator took about 5 years. All of these organizations continue to adapt as they address ongoing challenges in a changing and highly competitive business environment. For example, GM recently stated that years after exiting bankruptcy and restoring profitability, it is closing some factories and focusing on developing electric and self-driving cars. Several freight railroads facing a downturn in freight traffic have also decided to run longer trains less frequently to reduce labor costs and increase efficiencies. Similarly, changes in the use of postal services will continue for the foreseeable future, necessitating continued adaptation. Some of the countries we selected are anticipating the need to be prepared for possible future changes. For example: In August 2019, German government officials said they would consider reducing postal delivery frequency from 6 to 5 days a week as part of an ongoing review to adapt Germany’s 20-year old postal law to changing market conditions and customer demands. In the United Kingdom, the postal regulator assessed postal users’ needs in 2020 in light of the changes in the postal market and to prepare for its regulatory review, which is to be concluded by 2022. A 2018 consultant’s report to the European Union (EU) recommended that the EU relax its universal service obligations to accommodate future changes in the postal market. The EU is currently studying how postal users’ needs are changing to determine if it needs to change its framework to allow member states to change their definitions of universal service obligations. In November 2019, the Australian government ordered a review of Australia Post’s long-term strategy to operate as a sustainable postal service provider, considering market conditions such as e-commerce, the regulatory environment and changes in business and consumer service needs. The government of New Zealand is scheduled to revise its memorandum of understanding with New Zealand Post defining universal service obligations by 2021. PAEA required GAO to evaluate strategies and options for the long-term structural and operational reform of USPS by December 2011. As USPS continued to face financial challenges, we accelerated this evaluation, which we issued in April 2010. However, we found that USPS’s business model, which was to provide universal postal service through self-supporting, business-like operations as an independent establishment of the executive branch, was not viable due to USPS’s inability to reduce costs sufficiently to respond to continuing declines in mail volume and revenue. In particular, we identified strategies to reduce compensation and benefit costs, reduce other operations and network costs, improve efficiency, and generate revenues through product and pricing flexibility. We also stated that while USPS may be able to improve its financial viability if it took more aggressive action to reduce costs, it was unlikely that those actions alone would fully resolve USPS’s problems unless Congress also took action. Therefore, we stated that Congress should consider, among other things, any and all options available to reduce USPS’s costs. While bills on these issues were introduced and in some cases passed congressional committees, postal reform legislation to address these considerations has not been enacted. In addition, in our most recent update to our High Risk List in 2019, we reiterated the basic elements of our 2010 matter for congressional consideration by stating that Congress should consider various options to better align USPS’s costs with its revenues. We stated that Congress should consider addressing constraints and legal restrictions that limit USPS’s ability to reduce costs and improve efficiency through considering a comprehensive package of legislative actions. To date, such a legislative package has not been enacted. Furthermore, we reported in 2018 that the financial outlook for the Postal Service’s Retiree Health Benefits Fund was poor, as USPS had not made any payments into it since 2010. OPM then forecasted the fund would be depleted by 2030 if USPS continued to not make payments. Therefore, we stated that Congress should consider passing legislation to put postal retiree health benefits on a more sustainable financial footing. However, legislation has not yet been enacted to address this issue. We have often reported over the past 10 years that USPS’s ability to take actions taken under its current authority is insufficient to fully address its financial situation. Absent congressional action on critical foundational elements of the USPS business model, USPS’s mission and financial solvency are increasingly in peril. USPS’s growing difficulties to provide universal postal service in a financially self-sustaining matter provide Congress with the need to consider fundamental reform of the entire framework of postal services in the United States. In so doing, we continue to believe that as we stated in 2010, Congress should consider any and all available options. Comprehensive postal reform has not taken place in part because of the difficulty in obtaining compromise among various stakeholders with divergent views. Comprehensive, effective, and successful reform cannot occur until there is leadership and clarity around: what services should be provided, whether USPS is to be fully financially self-sustaining or the extent of federal financial support, and what institutional structure best supports these changes. Congressional leadership is critical in transforming USPS because consensus on policy decisions involving value judgments, trade-offs, and effects on postal stakeholders will be difficult to achieve. In addressing these issues, while all stakeholders’ interests should be understood and taken into consideration, the fundamental needs of the nation must take precedence. Continued inaction will result in deepening financial problems—putting USPS’s mission to provide universal postal service at greater risk and minimizing the ability to make the most appropriate or sustainable policy decisions. We are making the following three matters for congressional consideration: Congress should consider reassessing and determining the level of universal postal service the nation requires. (Matter for Consideration 1) Congress should consider determining the extent to which USPS should be financially self-sustaining and what changes to law would be appropriate to enable USPS to meet this goal. (Matter for Consideration 2) Congress should consider determining the most appropriate institutional structure for USPS. (Matter for Consideration 3) We provided a draft of this report to USPS and PRC. USPS and PRC provided written responses which are reproduced in appendixes IV and V, respectively. In its response, USPS concurred with our first two matters to reassess and determine the level of universal postal services the nation requires and to determine the extent to which USPS should be financially self- sustaining. USPS noted that the recent COVID-19 pandemic has both highlighted USPS’s essential role in the nation’s infrastructure and has caused a significant and sudden decline in mail volume, leading to a short-term liquidity crisis. USPS stated that while action by Congress is critical to ensure its ability to operate in the short-term, its financial situation has long been unsustainable due to statutory and regulatory structures that limit their ability to increase revenues and decrease costs. USPS noted that these changes require Congress to adopt reforms to secure USPS’s long-term financial viability. In addition, USPS concurred with the National Bankruptcy Conference’s legal analysis that Federal bankruptcy laws do not apply to USPS and that all roads for USPS restructuring lead back to Congress. USPS generally agreed with our third matter, stating that determining the institutional structure could logically be a part of a comprehensive congressional examination of its business model. USPS stated that it does not believe that corporatization or privatization would unlock new efficiency potential in USPS and that sustainable postal service does not hinge on the provider’s institutional form. However, as we and USPS have stated, its current legal and regulatory structure does not provide flexibility in some key areas. While our report states that a corporate or privatized institutional structure could provide both the flexibility and a greater incentive to operate in a more business-like manner than USPS’s current structure, we also recognize there are advantages and disadvantages to any institutional structure. As a result, we are not recommending any particular institutional structure for USPS, but are urging that Congress identify what institutional structure could best deliver the level of postal services at the level of financial sustainability that Congress determines. In its response, PRC agreed with all of our matters for congressional consideration. Particularly, PRC noted that the matter to reassess and determine the level of universal postal service the nation requires must be addressed as soon as possible. The PRC noted that given USPS’s severe and worsening financial situation (even before the impacts of the current pandemic crisis), a clear and specific definition of universal postal service and how that obligation can be funded must be provided. The PRC stated that Congress may want to consider mandating that PRC define and update the universal service definition by regulation. Both USPS and PRC provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Postmaster General, the Chairman of PRC, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff making key contributions to this report are listed in appendix VI. Appendix II: Selected Legal Requirements Applicable to the U.S. Postal Service (USPS) Legal requirements USPS is required to provide prompt, reliable, and efficient services to patrons in all areas, render postal services to all communities, and serve as nearly as practicable the entire population of the United States. USPS is specifically required to receive, transmit, and deliver written and printed matter, parcels, and like matter throughout the United States, its territories and possessions, and pursuant to certain agreements, throughout the world. USPS is required to provide a maximum degree of effective and regular postal services to rural areas, communities, and small towns where post offices are not self-sustaining. No small post office can be closed solely for operating at a deficit, it being the specific intent of the Congress that effective postal services be insured to residents of both urban and rural communities. Statutory and regulatory requirements specify the process and criteria for post office closings, including appellate review by the Postal Regulatory Commission (PRC). In determining all policies for postal services, USPS is required to give the highest consideration to the requirement for the most expeditious collection, transportation, and delivery of important letter mail. In selecting modes of transportation, USPS is required to give the highest consideration to the prompt and economical delivery of all mail. Service standards 39 U.S.C. § 3691, 39 C.F.R. Pt. 121 Letter mail monopoly 18 U.S.C. §§ 1693-99; 39 U.S.C. §§ 601-06 Mailbox monopoly 18 U.S.C. § 1725 Collective bargaining 39 U.S.C. §§1004,1206-07 Benefit programs 39 U.S.C. § 1005; 5 U.S.C. §§ 8348(h), 8423, 8909a Level of benefits 39 U.S.C. § 1005(f) Comparability 39 U.S.C. §§ 101(c), 1003(a) Workers’ compensation 39 U.S.C. § 1005(c) For many years, provisions in annual appropriations acts have stated “hat 6-day delivery and rural delivery of mail shall continue at not less than the 1983 level.” USPS is required to establish modern service standards for each market-dominant product (e.g., delivery of First-Class Mail within the continental United States in 2-3 delivery days); these service standards are defined in the Code of Federal Regulations. USPS’s letter delivery monopoly is codified in criminal and civil laws known as the Private Express Statutes. These laws generally prohibit anyone from establishing, operating, or using a private company to carry letters for compensation on regular trips or at stated periods over postal routes or between places where mail regularly is carried. Restricts access to mailboxes by prohibiting anyone from knowingly and willingly placing mailable matter without postage in any mailbox, providing USPS exclusive access to mailboxes. USPS negotiates collective bargaining agreements with its labor unions. If the parties are unable to reach an agreement, binding arbitration by a third-party panel will ultimately be used to establish agreement. USPS is also required to consult with postal supervisory and managerial organizations concerning changes in pay, benefits, and other programs that affect their membership. USPS is required to participate in federal pension and health benefit programs, with specific provisions regarding the required level of USPS’s funding of these programs. For example, USPS is required to prefund both postal pension benefits and postal retiree health benefits, each with payments that fully cover USPS’s share of future benefit costs. The law requires USPS’s fringe benefits to be at least as favorable as those in effect when the Postal Reorganization Act of 1970 was enacted, unless variation of benefits is collectively bargained. Compensation for USPS officers and employees is required to be comparable to the rates and types of compensation paid in the private sector of the U.S. economy. USPS policy also is required to maintain compensation and benefits for all officers and employees on a standard of comparability to comparable levels of work in the private sector. USPS is required to participate in the federal workers’ compensation program, which covers postal and other federal employees and provides compensation to federal employees, as well as dependents, in the event of an employee’s death. Citation(s) Access to facilities 39 U.S.C. § 403(b) Legal requirements USPS is required to establish and maintain postal facilities of such character and in such locations, that postal patrons throughout the Nation will, consistent with reasonable economies of postal operations, have ready access to essential postal services. Generally, annual appropriations prohibit USPS from using funding to consolidate or close small rural or other small post offices. Appropriations restrictions See, e.g., Pub. L. 116-6, 133 Stat. 180 (2019) Processing/logistics facilities Pub. L. 109–435 § 302(c)(5), (2006), 120 Stat. 3219, codified at 39 U.S.C. § 3691 note Price cap 39 U.S.C. § 3622(d) The law requires USPS to provide public information and opportunities for public input and comment before closing or consolidating any mail processing or logistics facilities, and take comments into account when making a final decision. An inflation-based price cap generally limits rate increases for market-dominant products, including First-Class Mail, USPS Marketing Mail, Periodicals and Package Services such as Bound Printed Matter, Media Mail, and Library Mail. The PRC, an independent establishment of the executive branch, must review USPS proposals to change domestic postal rates and fees. Debt limits 39 U.S.C. § 2005 Restriction on nonpostal lines of business 39 U.S.C. §§ 404(e), 102(5) Investment of postal retiree funds 5 U.S.C. §§ 8348(c), 8909a(c) Whenever USPS proposes a change in the nature of postal services that will have an effect on a substantially nationwide basis, it must request an advisory opinion from the PRC on the proposal. USPS has the authority to borrow up to $15 billion from the U.S. Treasury. The annual net increase of obligations for capital improvements and defraying operating expenses is limited to $3 billion. USPS is limited to providing nonpostal services to those offered as of January 1, 2006 that PRC has authorized USPS to continue. Nonpostal service is defined to mean any service that is not a postal service. A postal service is defined as the delivery of letters, printed matter, or mailable packages, including acceptance, collection, sorting, transportation, or other function ancillary thereto. Funds set aside for postal pensions and retiree health benefits are required by law to be invested in U.S. Treasury securities. Lori Rectanus, (202) 512-2834 or rectanusl@gao.gov. In addition to the individual named above, Derrick Collins (Assistant Director); Greg Hanna (Analyst-in-Charge); Amy Abramowitz; Kenneth John; Hannah Laufe; Serena Lo; Michael Mgebroff; Joshua Ormond; Joshua Parr; Susan Sawtelle; Crystal Wesco; and Laurel Voloder made key contributions to this report.", "summary": "An independent establishment of the executive branch, USPS is required to provide prompt, reliable, and efficient services to the public. While USPS is to be self-sustaining, it lost about $78 billion from fiscal years 2007 through 2019 due primarily to declining mail volumes and increased costs. Given USPS’s poor financial condition, in 2009 GAO identified USPS’s financial viability as a high-risk area, a designation it retains today. GAO was asked to explore issues related the transformation of USPS and potential implications for stakeholders. This report (1) examines major challenges facing USPS, (2) identifies how selected domestic businesses and foreign posts reportedly have addressed serious challenges, (3) examines critical foundational elements of USPS’s current business model, and (4) identifies key previously issued GAO matters for congressional consideration regarding USPS and actions taken in response. GAO reviewed its prior reports and related matters for congressional consideration, analyzed laws and regulations, and assessed USPS documents on financial and operational performance. It also reviewed reports by the USPS Office of Inspector General, the Postal Regulatory Commission, and other selected groups such as the 2018 Task Force on the United States Postal Service. To identify how domestic businesses and foreign posts addressed similar serious challenges, GAO selected for review (1) six domestic organizations in the airline, automobile, and railroad industries and (2) five foreign posts in five countries—Australia, France, Germany, New Zealand, and the United Kingdom. The businesses and countries had characteristics similar to USPS, such as large unionized work forces, and had reportedly made significant changes to their business models. For each of these businesses and countries, GAO analyzed public reports on financial and operational performance, as well as institutional structure and requirements. GAO also interviewed government and postal officials from three selected countries and officials from the National Audit Offices of two of the selected countries. Because questions were raised regarding the application of the U.S. Bankruptcy Code to USPS, GAO also requested the National Bankruptcy Conference to assess whether USPS could use bankruptcy or other restructuring processes. To examine critical USPS business model elements, GAO reviewed its prior reports and reports from numerous other organizations, and obtained the views of stakeholders. Since GAO's 2009 high-risk designation, the U.S. Postal Service's (USPS) financial viability has progressively worsened due to declining mail volume, increased employee compensation and benefit costs, and increased unfunded liabilities and debt. First-Class Mail volume has declined 44 percent since fiscal year 2006. Additionally, employee compensation and benefits costs have been increasing. Although USPS's work force declined from about 786,000 in fiscal year 2007 to about 617,000 in fiscal year 2013, USPS's work force increased to about 630,000 in fiscal year 2019. Finally, total unfunded liabilities and debt continue their steady upward trend (see figure). To address these challenges, USPS has taken a variety of actions such as providing increased self-service options and reducing facility hours. Statutory requirements, however, limit USPS's ability to make changes in areas such as certain service offerings, pricing, and its employee compensation and benefits. In confronting similar types of challenges that are facing USPS, GAO selected large domestic businesses (companies) and foreign postal entities (widely known as “foreign posts”) that have seen significant change in foundational elements of their business models. Specifically, according to GAO's analysis of publicly available reports and interviews of cognizant officials, these organizations have had major changes in services and products, financial self-sustainment, and institutional structure: Companies and foreign posts have modified services and products to focus on profitable offerings, and two countries’ posts reduced postal service levels. For example, New Zealand Post reduced its mail delivery’s frequency from 5 to 3 days per week in urban areas. Companies have reduced their workforce, infrastructure, and operational costs, and some accepted government financial assistance to help remain financially viable. Cost reduction has also been a priority for all countries’ posts, especially in compensation and benefits, while three countries’ governments provided financial assistance to their posts. Four of the selected companies declared bankruptcy leading to restructured corporations; some merged with other companies to increase their revenues. Two countries privatized their posts, and three others restructured their posts from government departments into government-owned corporations. Regarding USPS, reassessing its business model should start with the level of required postal services. For example, delivery is USPS’s most costly operation; USPS officials estimate annual savings of $1.4 billion to $1.8 billion if delivery of mail were reduced to 5 days rather than 6 days per week. Second, USPS is to function as a financially self-sustaining entity; however, it does not. A reassessment could include determining whether some of USPS’s costs and liabilities should be borne by taxpayers. Third, alternative institutional structures for USPS range from a federal agency to a private company. A bankruptcy proceeding is not an effective or appropriate means to address the issues associated with a potential USPS restructuring, according to the National Bankruptcy Conference. Prior GAO reports have included suggestions for Congress to address USPS’s financial viability. For example, GAO’s 2010 report identified strategies to reduce compensation, benefits, and operational costs. GAO stated that Congress, among other things, consider all options available to reduce costs. While bills in this area were introduced and in some cases passed congressional committees, legislation was not enacted. In 2018, GAO reported that the financial outlook for the Postal Service Retiree Health Benefits Fund was poor—the Office of Personnel Management forecasted the fund would be depleted by 2030 if USPS continued not making payments into it. Legislation has not been enacted to place postal retiree health benefits on a more sustainable financial footing. Postal reform legislation has not taken place in part because of the difficulty in obtaining compromise among various stakeholders with divergent views (see figure below). However, since GAO’s 2010 report, USPS’s financial condition has significantly worsened raising fundamental questions about key elements of USPS’s business model. Such questions warrant congressional action. Congress should consider reassessing and determining the (1) level of postal services the nation requires, (2) extent to which USPS should be financially self-sustaining, and (3) appropriate institutional structure for USPS. Both USPS and the Postal Regulatory Commission (PRC) generally concurred with the matters.", "document_type": "gao"}
{"report": "The MESA Complex at Sandia comprises multiple production facilities and buildings, which total approximately 400,000 square feet (see fig. 1). In particular, the SiFab Facility, completed in 1988, is the primary production facility for microelectronics integrated into nuclear weapons. The SiFab Facility produces application-specific integrated circuits (ASIC) that are custom-designed to control certain nuclear weapon arming, fuzing, and firing functions. The MESA Complex also includes other buildings, such as the Micro Fabrication Facility, which was completed in 2006 and produces strategic radiation-hardened devices for manipulating electronic signals and electrical power. The physical layouts of these two production facilities center around a series of clean rooms that are designed to maintain an extremely low level of dust and other particulates, which can harm microelectronic functionality. The two facilities contain about 375 pieces of specialized production equipment, some of which cost millions of dollars, and have acid exhaust and liquid waste management systems for handling the byproducts of the production processes. The SiFab Facility produces all of the strategic radiation-hardened ASICs currently used in nuclear weapons. ASICs are produced on wafers—a thin slice of semiconductor material such as silicon—using what is referred to as a complementary metal-oxide semiconductor (CMOS) process technology. The production of ASICs requires hundreds of processing steps, which are completed over multiple weeks. For example, according to Sandia documentation, the production of a specific type of ASIC requires over 600 processing steps over an approximately 26-week period. Microelectronics are produced with characteristic dimensions (or “feature sizes”) measured in nanometers (nm), or one-billionth of one meter. The process technology together with an associated feature size is known as a technology “node.” In general, smaller nodes represent more advanced technologies. The SiFab Facility produces microelectronics at the 350 nm node, and NNSA and Sandia refer to the CMOS production process technology at the 350 nm node as “CMOS7.” Currently, state-of-the-art microelectronics are produced at the 32 nm or below node. For example, the Intel Corporation produces commercial microelectronics at the 14 nm node for use in personal computers and servers. However, such smaller nodes are more challenging to produce and have not been proven to perform at the strategic radiation-hardened level, according to Sandia contractor representatives. Figure 2 shows commercially produced microelectronics on a wafer (left photo) and diced into individual microelectronics parts next to a U.S. dime (right photo). As shown in table 1, NNSA is undertaking multiple LEPs and weapon modernization efforts, in which Sandia is participating. In addition, the 2018 Nuclear Posture Review calls for NNSA to consider additional weapon programs—specifically, a program to develop a modern nuclear- armed sea-launched cruise missile, and another to develop a new submarine-launched ballistic missile warhead (now referred to as the W93). To develop and produce microelectronics for these efforts, Sandia must (1) conduct research and development activities, (2) finalize the design of microelectronics to meet military requirements specific to the weapon program into which the microelectronics will be integrated, and (3) produce the microelectronics. Sandia must conduct all of these activities years before NNSA delivers a weapon program’s first production unit to DOD. According to Sandia documents and contractor representatives, microelectronics research and development efforts generally begin 10 to 15 years before a weapon program’s first production unit date, while microelectronics production generally begins 3 to 5 years before a first production unit date. DOD is also undertaking modernization efforts related to nuclear weapon delivery platforms, and Sandia is producing microelectronics to support those efforts. Specifically, DOD is responsible for designing and producing the arming and fuzing components on delivery platforms for certain types of nuclear weapons, and Sandia produces some of these components for DOD at the MESA Complex. For example, according to Air Force and Sandia documentation, the Air Force contracted with Sandia to design and produce microelectronics for its Intercontinental Ballistic Missile Fuze Modernization, which will provide a new fuze for use on both the current Minuteman III missile and its replacement, the Ground Based Strategic Deterrent missile. DOE and NNSA distinguish between projects and programs, and the agencies use different management approaches for each: Projects. DOE’s project management order governs NNSA’s management of capital asset acquisition projects with a total cost greater than $50 million. The order states that capital assets projects have a defined start and end point. Capital assets include land, structures, equipment and intellectual property that are used by the federal government and have an estimated useful life of 2 years or more. The order’s goal includes delivering projects within their original performance baselines (on time and within budget) and fully capable of meeting mission performance and other requirements, such as environmental, safety, and health standards. Programs. As we reported in 2018, DOE has not established a program management policy. However, NNSA issued its own program management policy in February 2019. The policy applies to all NNSA elements and requires them to establish additional program management requirements for respective NNSA programs based on needs, risk, complexity, and stakeholder involvement, among other things. The NNSA policy defines a program in part as an organized set of activities directed toward a common purpose or goal, undertaken or proposed in support of an assigned mission area. In addition, some NNSA offices have issued their own program management directives that are more specific than the NNSA policy. For example, NNSA’s Office of Defense Programs—which is responsible for, among other things, weapon modernization programs, including LEPs, and associated materials and components, such as microelectronics—issued a program management directive in June 2019 that establishes requirements and processes for managing the office’s programs. This directive establishes four program management categories and execution requirements for these categories. These management categories are risk-based and apply different execution requirements commensurate with program risk. The MESA Complex’s estimated fiscal year 2020 budget is $283 million, according to Sandia documentation. As shown in figure 3, this funding comes from a variety of sources, because Sandia uses the MESA Complex to meet both NNSA’s and DOD’s nuclear weapon production missions as well as for research and development for those and other federal entities through strategic partnership programs. Sandia documentation states that a portion of the MESA Complex’s budget is obtained from other, non-NNSA federal entities that pay Sandia directly to produce microelectronics for, among other thing, research and development purposes, and this amount of funding fluctuates annually. According to Sandia contractor representatives, the laboratory presents MESA’s budget as an estimate for this reason. Specific funding sources are discussed in greater detail below: NNSA provides about 60 percent (or $168 million) of the MESA Complex’s total estimated budget for fiscal year 2020. Two NNSA offices account for most of the agency’s funding: The Office of Defense Programs accounts for 42 percent (or about $71 million) and is responsible for ensuring the United States maintains a safe, secure, and reliable nuclear stockpile through the application of science, technology, engineering, and manufacturing activities. This funding comes from multiple sub- offices. For example, the Office of Research, Development, Test, and Evaluation provides funding for microelectronics research and development; the Office of Production Modernization provides funding for, among other things, refurbishing microelectronics processing capabilities; and the Office of Stockpile Management provides funding for microelectronics production, according to an NNSA official and NNSA documentation. The Office of Safety, Infrastructure and Operations accounts for 46 percent (or about $78 million), and this office is responsible for ensuring existing facilities are safely operated, effectively managed, and maintained to meet mission needs. DOE’s Strategic Partnership Programs account for about 13 percent (or $36 million) of the MESA Complex’s fiscal year 2020 budget. These programs include research and development projects sponsored by the Air Force and the Defense Advanced Research Projects Agency. DOE’s Laboratory Directed Research and Development work accounts for about 10 percent (or $28 million) of the MESA Complex’s fiscal year 2020 budget. Each of DOE’s 16 contractor-operated laboratories—including Sandia—may direct a portion of the funding they receive from DOE to scientists who conduct independent research. The statutory limit on this laboratory-directed research and development work is between five to seven percent of funds provided by DOE to the laboratories for national security activities. DOD provides about 6 percent (or $17 million) of the MESA Complex’s fiscal year 2020 budget through Strategic Partnership Programs. According to Sandia documentation, this funding comes directly from the Air Force and Navy to support the production of microelectronics that are integrated into nuclear weapon delivery platforms. Other sources account for about 12 percent (or $34 million) of the MESA Complex’s fiscal year 2020 budget. Among other things, this funding comes from indirect rates applied to all Sandia programs to support the MESA Complex’s management and operations. Over the past decade, NNSA completed several actions to sustain its existing strategic radiation-hardened microelectronics facilities at Sandia through 2025 while simultaneously identifying future alternatives for its microelectronics capability beyond 2025. In particular, during fiscal years 2012 through 2019, NNSA engaged in a $150 million effort at Sandia to sustain operations at the SiFab Facility through 2025. NNSA pursued this effort in response to a 2010 study conducted by Sandia that identified the need for millions of dollars in funding to sustain the SiFab Facility through 2025. NNSA’s sustainment efforts focused on the following two areas: Infrastructure. NNSA spent about $27 million to complete approximately 25 infrastructure projects that support microelectronics production. For example, NNSA installed two new 20,000-gallon tanks for water storage to improve the facility’s deionized water system, which provides ultra-high purity water for use in certain processing steps. NNSA also replaced a portion of the facility’s acid exhaust system. Equipment. NNSA spent about $123 million on production equipment for two main purposes: (1) to replace aging equipment that Sandia classified as being at high risk of failure; and (2) to refurbish existing equipment and procure equipment that will be used to produce microelectronics once Sandia completes its ongoing effort to convert the production process from using 6-inch silicon wafers to 8-inch wafers. Prior to these equipment investments, the SiFab Facility relied on aging equipment to perform certain processing steps using a manual process. In fiscal year 2018, Sandia refurbished existing equipment and purchased new equipment that is more automated and is intended to increase process reliability. In addition, according to Sandia documentation, Sandia needed to convert its production process to use 8-inch silicon wafers because the commercial sector had increasingly limited maintenance support and service for equipment that processed 6-inch wafers. While NNSA was working with Sandia to sustain the SiFab Facility through 2025, the agency also began identifying and evaluating options for producing microelectronics after 2025, such as constructing a new multibillion-dollar production facility at Sandia. However, because of changes to key assumptions, NNSA decided in November 2018 not to pursue any of the identified alternatives and instead stated that the agency was going to assess options to sustain its current capability at Sandia beyond 2025. See figure 4 for a summary of NNSA’s actions to sustain the SiFab facility and consider alternatives. More specifically, NNSA took the following actions during the past decade to identify alternatives for producing microelectronics beyond 2025: In 2011, NNSA’s Deputy Administrator for Defense Programs requested proposals from the agency’s three nuclear weapons laboratories for flagship experimental science, technology, and engineering facilities to help ensure that NNSA will have the capabilities to address future national security needs. In response, Sandia submitted a proposal to NNSA in 2012 to construct a new, multibillion-dollar microelectronics production facility, called the Center for Heterogeneous Integration, Packaging, and Processes (CHIP2). The Sandia proposal estimated that CHIP2 would take 14 years to design and build at an estimated cost of $2.5 billion. The proposal indicated that the facility would increase microelectronics functionality and trustworthiness by creating a trusted supply chain into the future for design, fabrication, testing, and packaging activities. As a result of the time needed to design and construct CHIP2, investment would still be needed to sustain the MESA SiFab Facility through 2025. NNSA commissioned two studies by The Aerospace Corporation, a federally funded research and development center sponsored by the Air Force, to help the agency evaluate Sandia’s CHIP2 proposal against other potential alternatives, such as contracting with commercial entities to produce microelectronics. These studies, completed in August and September 2014, generally ranked the CHIP2 proposal at or near the top of the alternatives but also stated that CHIP2 did not stand out as a decidedly better option. Nonetheless, in early 2015, NNSA’s Deputy Administrator for Defense Programs issued a memorandum recommending that NNSA pursue the CHIP2 proposal as a formal capital asset project, subject to DOE’s project management order on acquisition of capital assets. In 2016, in accordance with DOE’s project management order, NNSA developed two key documents during the initiation phase of its capital asset project supporting the CHIP2 proposal, which NNSA referred to as the Trusted Microelectronics Capability (TMC) project. NNSA first developed a mission need statement, which is a formal document that identifies a credible performance gap between current capabilities and those needed to achieve the goals stated in the agency’s strategic plan. The mission need should be stated in a way that is solution-neutral. The project’s mission need statement stated that, among other things, after 2025 the SiFab Facility faced a severe risk of equipment and facility failures that could have detrimental impacts on future microelectronics production schedules. The statement noted that continued refurbishment of the SiFab Facility beyond 2025 could result in significant downtime during critical weapon development and production cycles, as the facility was constructed in the 1980s and was not sized for modern microelectronics production equipment and supporting infrastructure. NNSA next developed a requirements document, which describes the ultimate goals the project must satisfy while also identifying key assumptions and constraints. The requirements document identified several key requirements, including that the TMC project must be able to provide NNSA with trusted access to produce microelectronics in support of the agency’s nuclear weapons mission. Between 2016 and 2017, in accordance with DOE’s project management order, NNSA conducted an analysis of alternatives for the TMC project based on achieving NNSA’s mission need statement. Such an analysis identifies, analyzes, and selects a preferred alternative to best meet the mission need by comparing the operational effectiveness, costs, and risks of potential alternatives, according to DOE documentation. During this process, NNSA considered 21 alternatives for meeting the mission need statement, among them the CHIP2 proposal as well as several alternatives that included partnerships with commercial industry and other government production facilities. The final TMC analysis of alternatives report, dated January 2018, did not identify the CHIP2 proposal as a preferred alternative because of the proposal’s high life-cycle costs, high total project cost, and long project schedule. Instead, the report identified two preferred alternatives as best meeting NNSA’s needs: (1) partnering with an existing, government-owned, contractor- operated production facility other than Sandia; and (2) entering into an interagency agreement with DOD and at least one member of the intelligence community, as well as a commercial entity, to design, build, and operate a state-of-the-art production facility. Ultimately, NNSA decided not to pursue either preferred alternative because of changing assumptions. For example, one of NNSA’s key assumptions for the TMC analysis of alternatives was that the SiFab Facility could not remain operational beyond 2025. However, NNSA tasked The Aerospace Corporation to validate this assumption, and in January 2018, The Aerospace Corporation completed a study concluding that the SiFab Facility could remain viable until 2040 with prioritized and well-planned infrastructure repairs and equipment replacements. Another example of changing assumptions concerned the preferred alternative under which NNSA would enter into an interagency agreement with DOD and at least one member of the intelligence community to design, build, and operate a state-of-the-art production facility. This preferred alternative assumed that DOD, the intelligence community, or both, would pay to develop and build the production facility (estimated to cost from $350 million up to $1.2 billion), while NNSA would pay to equip its portion of the production process. The TMC analysis of alternatives report stated that commitment from DOD and the intelligence community would be vital, and that this alternative carried significant execution risks. In January 2018, NNSA documentation stated that this interagency alternative was no longer viable because other agencies stated they were no longer interested in a potential partnership. Partly as a result of these changes in key assumptions, in November 2018, NNSA wrote in a letter to Congress that it was no longer requesting funding for the TMC and was assessing what investments were needed to extend the operational life of the SiFab Facility to 2040. As part of NNSA’s ongoing approach to managing its strategic radiation- hardened microelectronics activities, the agency plans to upgrade and sustain its microelectronics capability at Sandia through 2040, which it estimates will cost about $1 billion over the next 20 years. NNSA is also in the preliminary stages of identifying and evaluating options for a microelectronics capability beyond 2040. In addition, NNSA is starting to implement a revised management approach, including appointing a coordinator to guide certain aspects of its microelectronics activities. However, NNSA’s approach does not fully incorporate key management controls, such as developing an overarching management plan, which the agency has applied to other important activities. In 2019, NNSA made three key decisions related to upgrading and sustaining its microelectronics capability at Sandia through 2040. First, NNSA approved plans to further upgrade its process for producing microelectronics. This upgraded process, called CMOS8, contains some features of the currently employed CMOS7 process, but is a more advanced technology node that also includes many new features, according to Sandia documentation. Second, NNSA approved plans to produce and integrate into future nuclear weapons a more advanced type of microelectronics component called a field programmable gate array (FPGA). According to Sandia documentation, strategic radiation- hardened FPGAs can be produced using the CMOS8 process but not the CMOS7 process. Third, Sandia developed and NNSA approved a plan to identify, prioritize, and provide budget estimates to sustain Sandia’s microelectronics infrastructure and equipment at the MESA Complex over the next 20 years. This plan incorporates NNSA’s decisions to develop the CMOS8 process and produce FPGAs. According to NNSA and Sandia documents, the rationale behind and expected benefits of these three key decisions are as follows: The CMOS8 process will allow Sandia to produce microelectronics at a smaller, more advanced technology node (180nm) compared with the current CMOS7 technology node (350nm). NNSA documentation states that, among other things, the CMOS8 process is expected to produce microelectronics that have twice the processing speed compared with those produced using the CMOS7 process. Such advances are needed to help ensure that future nuclear weapons remain safe, secure, and reliable while operating in increasingly hostile threat environments and that the weapons meet increased performance requirements, according to Sandia documentation. According to NNSA officials, the agency agreed with Sandia’s assessment on implementing the CMOS8 production process based, in part, on findings and recommendations contained in an independent study commissioned by NNSA and completed by multiple entities including The Aerospace Corporation. According to Sandia documentation, while FPGAs have never been used before in a nuclear weapon, they may significantly reduce the cycle time for microelectronics research, development, and production compared with cycle times for ASICs used in nuclear weapons. This reduction may be possible because the ASICs currently used in nuclear weapons are uniquely designed and produced to carry out specific functions, whereas FPGAs can be produced using a common design and then programmed after production (but before insertion into a nuclear weapon) to carry out different functions, according to NNSA officials. Reduced cycle time from FPGAs could alleviate schedule pressure on future weapon modernization programs because cycle times for designing and producing ASICs for LEPs have historically been about 10 years before production of the first weapon, according to Sandia documentation. Sandia’s plan will provide NNSA with the basis for the investment profile needed to sustain the MESA Complex’s infrastructure and equipment through 2040. Because the sustainment effort will last at least 20 years, NNSA officials said that having a long-term planning document that provides a current baseline for the condition of Sandia’s microelectronics infrastructure and equipment, identifies challenges, and recommends specific sustainment activities will be a useful management tool. The plan for extending the life of the MESA Complex at Sandia provides cost and schedule estimates related to sustainment of existing facilities and equipment, as well as installation of new equipment for CMOS8 and development and maturation of the FPGA technology. Overall, the plan calls for spending about $1 billion over the next 20 years. Specifically, the plan identifies spending for the following activities: Sustainment of existing facilities and equipment. The plan identifies about $900 million in spending from fiscal years 2020 through 2040—or about $45 million a year for the next 20 years—to complete identified infrastructure and equipment projects. The plan calls for spending roughly half of the $900 million on projects to upgrade existing infrastructure within the MESA Complex. In particular, Sandia plans to spend about $120 million from fiscal years 2020 through 2024 on projects to improve or upgrade infrastructure within the SiFab Facility that is considered to be in “poor condition” based on information contained in NNSA’s infrastructure condition database. The SiFab Facility is to be the physical location for the majority of production tools for CMOS8. Two of these projects would replace electrical power and distribution equipment at an estimated cost of about $50 million, while another project would replace the facility’s chemical distribution system at an estimated cost of about $5 million. Sandia plans to spend the other half of the $900 million on equipment-related projects. For example, Sandia plans to spend about $85 million from fiscal years 2021 through 2026 on projects to support existing, non-CMOS8 production processes—such as producing transistors in the Micro Fabrication Facility—as well as activities that support microelectronics production, such as laboratory analysis, testing, and packaging. For example, Sandia plans to spend $1.5 million on a computerized tomography machine to support microelectronics testing. Development of CMOS8 and production of FPGAs. The MESA Complex extended life plan identifies about $170 million in spending from fiscal years 2020 through 2027 related to developing, maturing, installing, and implementing the CMOS8 process and the FPGA technology. Sandia contractor representatives told us that the CMOS8 process relies on newer and more advanced equipment to complete critical individual processing steps compared with the current CMOS7 process. As a result, the plan identifies about $70 million (out of the $170 million total) to acquire approximately 30 pieces of equipment, which Sandia will need to install and then qualify their performance. In addition, the plan identifies almost $90 million (out of the $170 million total) for developing and maturing the CMOS8 production process and the FPGA technology. According to Sandia documentation, Sandia plans to begin using the CMOS8 process to produce FPGAs for integration into a future nuclear weapon program at the end of fiscal year 2027. In addition to upgrading and sustaining Sandia’s microelectronics capabilities through 2040, NNSA is in the preliminary stages of identifying and evaluating options to ensure a continued microelectronics capability beyond 2040, according to NNSA officials and documentation. In particular, NNSA has identified the following two key options: NNSA is in the initial stages of identifying and evaluating options to construct a new facility for producing microelectronics by 2040 and beyond. In December 2019, NNSA officials provided us with documentation stating that the agency plans to begin evaluating options for a new microelectronics facility in 2021 with the goal of completing construction in 2030, installing needed equipment in the completed facility by 2033, and qualifying the production process and begin producing microelectronics for integration into nuclear weapons no later than 2035. In NNSA’s fiscal year 2021 budget request, which was released in February 2020, the agency requested funds to begin evaluation and early planning activities for this new microelectronics facility. NNSA is also evaluating whether the agency might be able to leverage a recent investment by DOD in a U.S. commercial microelectronics production facility to help meet NNSA’s microelectronics production needs after 2040. Specifically, DOD announced in October 2019 that it had awarded a contract to a U.S.- owned-and-operated microelectronics commercial production facility to, among other things, enhance its radiation-hardened microelectronics production process to meet DOD’s microelectronic needs for systems (such as satellites) that operate in environments with increased radiation levels. Over the next two years, the U.S. commercial microelectronics production facility plans to adapt its current production process and develop a new process that will produce microelectronics at a smaller node, according to DOD documentation. According to NNSA officials we interviewed in February 2020, NNSA and DOD are in preliminary discussions to determine if NNSA could make additional investments in this same facility to potentially produce strategic radiation-hardened microelectronics for integration into nuclear weapons. NNSA officials said that there was no firm timeframe for making an investment decision because such a decision would need to be made after the microelectronics facility begins producing microelectronics at the smaller node. NNSA is starting to implement a revised approach to managing its microelectronics activities. During our initial interviews with NNSA officials in early 2019, they stated that NNSA had not established a formal management structure to oversee the agency’s microelectronics activities. Instead, they said that NNSA had delegated primary responsible for overseeing such activities to two officials within NNSA’s Office of Defense Programs, who both served in multiple positions and had other duties within the office. According to these officials, once NNSA formally canceled the TMC project in November 2018, management efforts were focused on making initial determinations on the actions and budget estimates needed to sustain NNSA’s existing microelectronics capability at Sandia until 2040. These efforts included coordinating with multiple NNSA offices—such as the Office of Safety, Infrastructure and Operations—to understand their future microelectronics needs and requirements and to review draft MESA Complex sustainment documentation prepared by Sandia. However, officials from NNSA’s Office of Defense Programs told us that in late 2019 they determined that a more coordinated management approach would better position NNSA to oversee microelectronics activities and make informed budgetary and programmatic decisions. Specifically, NNSA officials stated that in November 2019 the Office of Defense Programs created and filled a new full-time microelectronics coordinator position within a sub-office, the Office of Research, Development, Test, and Evaluation. The microelectronics coordinator told us that NNSA has not yet finalized an official position description for the coordinator role. However, the coordinator said that the position will primarily be responsible for developing the CMOS8 process and the FPGA technology and integrating the research and development activities of the Office of Research, Development, Test, and Evaluation with another sub-office, the Office of Production Modernization. In addition, officials from NNSA’s Office of Defense Programs and Office of Safety, Infrastructure and Operations told us that they continue to use other existing processes to manage microelectronics activities at Sandia. For example, these officials said that they use the annual planning, programming, budgeting, and evaluation process, along with the annual work authorization process, to coordinate across NNSA offices on budgetary matters and work activities associated with microelectronics activities at Sandia. As part of these processes, agency officials told us that they issue annual implementation plans to direct the work of Sandia contractors related to microelectronics activities. NNSA officials then monitor the contractors’ progress toward completing the identified scope of work and work activities. For example, NNSA officials said that they conduct monthly meetings with contractor representatives to review status and financial reports. They also said that they hold mid-year and end-of-year program reviews with contractor representatives. To help management achieve desired results—such as ensuring a continued microelectronics capability—federal agencies design, implement, and operate internal controls, which comprise the plans, methods, policies, and procedures used to fulfill an entity’s mission, goals, and objectives. Federal standards for internal control state that management should, among other things: design control activities, such as by developing policies, procedures, techniques, and mechanisms that enforce management’s directives, to achieve objectives and respond to risk; and establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. NNSA has implemented internal controls at the agency level, in part, by developing and implementing directives that provide an organizational structure for the agency to plan, execute, control, and assess its programs and projects while also assigning responsibility and delegating authority for key management roles. For example, one purpose of NNSA’s 2019 program management directives is to increase management efficiency and effectiveness by, among other things, clearly defining management responsibilities and authorities. In addition, DOE’s project management order for the acquisition of capital assets lists principles for successful project execution such as disciplined, up-front planning; line management accountability; and effective implementation of all management systems (such as risk and performance management) supporting the project. In particular and as applicable to front-end planning, NNSA’s and DOE’s directives related to program and project management both include the following controls: Appointment of a federal manager, who is vested with the authority to carry out assigned responsibilities to meet program or project milestones on schedule and on budget, who manages the coordination of deliverables between the multiple entities (such as different program offices) involved, and who is responsible and accountable for planning, implementing, and executing a program or project, which includes responsibility for developing an overarching management plan; An overarching management plan, which establishes the procedures to define, execute, and monitor a program or project, as well as establishing specific requirements in a variety of areas—such as cost estimating, an integrated schedule, performance management, and risk management—to use to develop a baseline and against which to measure and monitor; A mission need statement, which identifies a credible gap between current capabilities and those needed to achieve the goals stated in the strategic plan; and A requirements document that describes the ultimate goals the program or project must satisfy while also identifying key assumptions and constraints. However, while some in NNSA and at Sandia have recognized the need to coordinate microelectronics activities to effectively carry them out and meet specific goals by specific dates, as evidenced by the hiring of a coordinator, Office of Defense Programs leadership have not fully developed controls to better manage and coordinate its microelectronics activities. Specifically, NNSA does not have or has not fully developed the following: Federal manager with coordination or oversight authority. NNSA has not established a federal management position with the authority and accountability to better coordinate or oversee NNSA’s microelectronics activities. Instead, as described above, agency officials told us that NNSA’s Office of Defense Programs established a coordinator position—within a sub-office, the Office of Research, Testing, Development and Evaluation—in November 2019 to help guide the agency’s efforts to develop the CMOS8 process and the FPGA technology, among other things. Moreover, in May 2020, NNSA stated that senior leadership within the Office of Defense Programs have not endorsed the formal role of a microelectronics coordinator and that the coordinator’s role and responsibilities are currently under review. NNSA also stated that the coordinator has not been given authority to manage an annual budget for microelectronics activities and that it was unlikely that such authority would be granted. This statement stands in contrast to earlier statements made to us that the coordinator would have responsibility for an annual budget of about $50 million, subject to future appropriations. Management plan. NNSA has not developed an overarching management plan to guide and coordinate the agency’s microelectronics activities. Instead, NNSA officials from the Office of Defense Programs and the Office of Safety, Infrastructure and Operations told us that the agency is in the very early stages of developing a NNSA plan that will incorporate key decisions and approaches outlined in the Sandia’s 20-year MESA sustainment plan, among other things. While NNSA officials are still evaluating the specific contents of this plan, they said that the plan may outline specific roles and responsibilities for each NNSA office involved in microelectronics, describe how these offices will interact with the microelectronics coordinator, and provide options for future microelectronics technology development efforts. However, it is unclear whether the document will define the planning approach, procedures, and processes that NNSA will use to ensure coordinated management in multiple areas and across multiple offices, such as developing cost estimates, an integrated schedule, and performance metrics. Agency officials said that this plan, when finalized, will provide a useful tool for coordinating various aspects of NNSA’s microelectronics activities, but they did not provide an estimated date for when the plan will be completed. Mission need statement and requirements document. NNSA has not developed a current mission need statement or a current program requirement document. In 2016, as required by DOE’s project management order on the acquisition of capital assets, NNSA issued a formal mission need statement and a requirements document to guide its assessment of the cancelled TMC project (as described earlier in this report). However, agency officials told us that these 2016 documents are no longer applicable to NNSA’s current approach to sustaining its microelectronics capability and evaluating options to ensure a continued capability after 2040. NNSA officials said that they intend to establish an updated set of requirements to guide the agency’s future microelectronics capability, and that they will consider these requirements in establishing a future mission need statement. However, NNSA officials did not provide a timeframe for finalizing these documents. NNSA officials acknowledged the importance of using management controls and that the controls described above would be useful, but they could not identify any specific DOE or NNSA directives, government-wide guidance, or best practices that they follow to manage their microelectronics activities. Instead, they offered three reasons why the agency has not implemented a more coordinated and robust set of management controls to oversee the agency’s microelectronics activities: Microelectronics production has historically been managed as a component production effort by an LEP, which is led by an NNSA program manager within the Office of Defense Programs who coordinates directly with other NNSA offices and Sandia contractors. Because NNSA has not designed microelectronics as a formal program, the requirements contained in the agency’s program management directives are not binding on microelectronics activities. NNSA officials said that the multiple projects (identified in the MESA Complex extended life plan) to upgrade and sustain the microelectronics capabilities at Sandia through 2040—at an estimated cost of over $1 billion over 20 years—will not be subject to DOE’s project management order, as these projects are for sustainment and not for new facility construction. According to officials from NNSA’s Office of Safety, Infrastructure, and Operations, infrastructure investments are being planned and managed as maintenance and repair efforts. NNSA officials told us that the agency’s current efforts provide the necessary structure for NNSA to oversee and manage its microelectronics capability. However, NNSA has recognized the importance of implementing a more coordinated and robust set of management controls for other important activities within its nuclear security mission that similarly have not been treated in the past as specific programs. For example, as we reported in June 2019, while NNSA historically managed its high-explosive capability without a formal mechanism to coordinate activities across multiple programs, it recently implemented a more robust set of management controls to oversee its high-explosive activities. Specifically, in 2018 NNSA appointed an enterprise manager to help coordinate these activities. NNSA also encouraged the enterprise manager to adopt, where appropriate, the program management controls contained in an NNSA directive on managing nuclear weapon life extension and strategic materials programs. Subsequently, the enterprise manager issued a strategic plan that provided an organizational structure for the agency’s high explosives capability. By taking a similar approach to its management of microelectronics activities and incorporating a more coordinated and robust set of management controls, the agency would have increased assurance that its planned microelectronics activities are clearly defined, efficiently executed, and effectively monitored. NNSA’s ability to produce unique microelectronics for nuclear weapons is essential to ensuring a credible U.S. nuclear deterrent. Producing such microelectronics is a complex task, and NNSA is limited in its ability to partner with the commercial sector for such production. Over the next two decades, NNSA will undertake an expensive and ambitious approach to upgrade and sustain its existing microelectronics production facilities and capabilities. Specifically, NNSA plans to spend about $1 billion over the next 20 years to, among other things, upgrade its process to produce a new type of microelectronic component that has never been integrated into a nuclear weapon. In addition, NNSA officials said that the agency will need to identify and analyze options for a continued capability after 2040, and that effort could begin as early as 2021. To increase its management and oversight of the agency’s microelectronics activities, NNSA has taken some positive steps such as appointing a microelectronics coordinator within the Office of Defense Programs and approving certain long-term planning documents. However, in contrast to other NNSA activities, including programs and projects, NNSA has not fully developed a coordinated and robust set of management controls to oversee its microelectronics activities. For example, NNSA has not established an overarching management plan to manage and coordinate the cost, schedule, and risks associated with its microelectronics activities. By incorporating a more coordinated and robust set of management controls, NNSA would have increased assurance that its planned microelectronics activities are clearly defined, efficiently executed, and effectively monitored. The NNSA Administrator should incorporate additional management controls to better oversee and coordinate NNSA’s microelectronics activities. Such management controls could include investing the microelectronics coordinator with increased responsibility and authority, developing an overarching management plan, and developing a mission need statement and a microelectronics requirements document. (Recommendation 1) We provided a draft of this report to DOD and NNSA for review and comment. DOD did not provide any comments. In its written comments, reproduced in appendix I, NNSA neither agreed nor disagreed with our recommendation but provided three main comments. First, NNSA stated that by December 2020 the agency plans to complete a strategic management plan that will more clearly articulate the integration of management controls for the various components of its microelectronics activities. NNSA stated that it believes this action is consistent with our recommendation. We are encouraged by this planned action and will evaluate the completed strategic management plan to determine if it meets the intent of our recommendation. Second, NNSA stated that our report did not clearly convey the differences between the management of microelectronics and other weapons or materials programs and did not include all aspects of its microelectronics activities (such as the procurement of commercial off the shelf components) in our audit’s scope. In response, we added references to the various aspects of NNSA’s microelectronics activities and clarified that our report focuses on NNSA’s strategic radiation- hardened microelectronics activities at Sandia’s MESA Complex. As stated in the report, we focused on this specific aspect of NNSA’s microelectronics mission because of the language in the Senate committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019, which included a provision for us to review NNSA’s efforts to recapitalize its strategic radiation-hardened microelectronics design and production capacity. We also focused on this specific aspect of NNSA’s mission because the fiscal year 2020 Stockpile Stewardship and Management Plan lists the continued production of strategic radiation-hardened microelectronics as one of four key challenges to the agency’s nuclear stockpile mission. Third, NNSA stated that our audit did not include an assessment of management controls for the range of activities that work together to ensure the effectiveness of microelectronics planning and execution. However, our report identifies and describes these management controls, and as part of our work we considered how these controls work together. In addition and as stated above, NNSA intends to complete a strategic management plan to more clearly articulate the integration of its various microelectronics management controls, which is especially important as the agency invests about $1 billion dollars over the next 20 years while simultaneously needing to meet microelectronics production deliverables for multiple nuclear weapon modernization programs. NNSA also provided technical comments, which we incorporated in our report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Secretary of Defense, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or at bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Allison B. Bawden at (202) 512-3841 or bawdena@gao.gov In addition to the contact named above, Jason Holliday (Assistant Director), Patrick Bernard (Analyst in Charge), and Alisa Carrigan made key contributions to this report. Also contributing to this report were Jonathan Felbinger, Juan Garay, Lisa Gardner, Cindy Gilbert, Cynthia Norris, and Dan C. Royer.", "summary": "Microelectronics (see figure) form the basis of nearly all electronic products, including nuclear weapons. U.S. nuclear weapons use a unique supply of “strategic radiation-hardened” microelectronics that must function properly when exposed to high levels of radiation. NNSA's facilities at Sandia are the only source for these unique microelectronics, and the age of the facilities may pose significant risk to NNSA's capability after 2025. A Senate committee report accompanying the National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review NNSA's strategic radiation- hardened microelectronics activities. This report (1) describes NNSA's actions over the past decade to sustain existing facilities and identify future alternatives; and (2) examines NNSA's ongoing approach to managing its microelectronics activities and the extent to which this approach incorporates key management controls. GAO reviewed documents and interviewed officials and contractor representatives from NNSA and Sandia, toured Sandia's microelectronics facilities, and reviewed NNSA program and project management controls. Over the past decade, the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) completed several actions to sustain the condition of its existing microelectronics facilities at Sandia National Laboratories (Sandia), which are NNSA's only source for producing strategic radiation- hardened microelectronics that can operate in environments with extreme exposure to radiation. In particular, during fiscal years 2012 through 2019, NNSA carried out a multiyear, $150-million effort at Sandia to replace or refurbish infrastructure and equipment in its primary microelectronics production facility to ensure continued operations through 2025. While NNSA was working with Sandia to sustain current facilities, the agency also began identifying and evaluating options for producing microelectronics after 2025, including constructing a new multi-billion dollar production facility at Sandia. However, because of changes to key assumptions, including longer-term viability of existing facilities, NNSA decided in November 2018 not to pursue any of the identified alternatives and instead stated that the agency was going to assess options to sustain its current capability at Sandia. NNSA's ongoing approach to managing its strategic radiation-hardened microelectronics activities includes two key efforts. First, the agency decided in October 2019 to invest about $1 billion over the next 20 years to upgrade and sustain its microelectronics capability at Sandia through 2040. Specifically, NNSA plans to upgrade its production process as well as complete identified infrastructure (such as electrical distribution) and equipment projects. Second, in November 2019 NNSA created and filled a new full-time microelectronics coordinator position that, among other things, will have responsibility for certain aspects of the agency's microelectronics activities, according to agency officials. However, NNSA's approach does not fully incorporate key management controls that NNSA applies to other important activities. For example, DOE and NNSA require their programs and projects to establish an overarching management plan that describes the procedures to define, execute, and monitor a program or project as well as establishing specific requirements in a variety of areas such as cost estimating and performance management. NNSA has not established a similar management plan to oversee and coordinate its microelectronics activities. By incorporating these key management controls, NNSA would have increased assurance that its planned microelectronics activities are clearly defined, efficiently executed, and effectively monitored. GAO recommends that NNSA incorporate additional management controls, such as developing an overarching management plan, to better oversee and coordinate its microelectronics activities. NNSA neither agreed nor disagreed with this recommendation.", "document_type": "gao"}
{"report": "Generally, Congress provides budget authority to agencies through the passage of appropriations acts each fiscal year. Appropriations allow agencies to incur obligations and make payments for specified purposes. When an appropriation expires, and a new one is not enacted, a lapse in appropriations, also called a funding gap, results and the affected agency or program may lack sufficient budget authority to continue operations. Funding gaps can occur at the beginning of a fiscal year when new appropriations, or a continuing resolution, have not yet been enacted. Funding gaps also can occur any time during the year when a continuing resolution expires and may affect a few agencies or all agencies across the federal government. We have previously reported that funding gaps, actual or threatened, are both disruptive and costly. The ADA prohibits agencies from obligating or expending funds in excess or in advance of an available appropriation unless otherwise authorized by law as well as from accepting voluntary services for the United States except in cases of emergency involving the safety of human life or the protection of property. During a lapse in appropriations, employees may continue working if they are exempt from the lapse in appropriations or if an exception to the ADA applies (see figure 1). Exempt and excepted employees are defined as follows. Exempt employees are those who perform activities funded with budget authority that remains available despite the lapse in appropriations, such as multiple-year or no-year carryover balances. Available balances can also come from other authorities such as fee income that Congress made available for obligation. For the purpose of this report, we call employees who perform such functions exempt employees. Excepted employees are those who perform activities pursuant to a statutory authority that expressly authorizes an agency to enter into an obligation in advance of an appropriation, or to address emergencies involving the safety of human life or the protection of property, as described under the ADA. We have also recognized, in our prior legal opinions, other limited exceptions that may, under some circumstances, allow functions to continue during a lapse in appropriations. For example, Congress and the Executive branch may incur obligations to carry out core constitutional powers. Agencies also may incur those limited obligations that are incidental to executing an orderly shutdown of agency activity. Over the past 29 years, there have been six lapses in appropriations that led to government shutdowns, ranging in duration from 2 days to 35 days (see figure 2). Three shutdowns occurred in the past 7 years and two of these shutdowns were prolonged in that they lasted longer than 5 days (in fiscal years 2014 and 2019). In the event of a government shutdown, OMB is responsible for ensuring that agencies have addressed the essential actions needed to effectively manage the government shutdown. OMB does so by providing policy guidance and shutdown-related instructions. Specifically, OMB Circular A- 11 directs federal agencies to develop contingency plans for use in the event of a government shutdown and to update these plans on a recurring basis. These plans are key documents that help ensure an orderly shutdown following a lapse in appropriations, as well as continuity of appropriate agency operations. These plans also communicate policies and procedures to employees and external stakeholders that could be affected by the shutdown of operations. OMB’s Circular A-11 directs agencies to prepare contingency plans in anticipation of a lapse in appropriations. According to the guidance, contingency plans are to include information such as: (1) summaries of activities that will continue and those that will cease; (2) the amount of time needed to complete the shutdown activities; (3) the number of employees on-board prior to the shutdown; and (4) the number of employees to be retained during the shutdown. Agencies are also to explain the legal basis for each of their determinations to retain employees, including a description of the nature of the agency activities in which these employees will be engaged. Additionally, agencies’ contingency plans are to explicitly describe any changes in operations that would be necessary should a lapse in appropriations extend past 5 days. According to OMB officials, OMB reviews agencies’ contingency plans, but it does not formally approve plans. Agencies are ultimately responsible for determining which activities will continue during a lapse in appropriations and which activities will cease. Using OMB Circular A-11, we identified 14 key information elements for agencies’ contingency plans and used these as criteria to assess the selected agencies’ plans. Of the selected agency components, ITA and CBP operated under the contingency plans of their respective agencies. Similarly, USTR officials said that the component operated under EOP’s contingency plan. IRS, in contrast, had its own contingency plan for the fiscal year 2019 shutdown because Treasury did not have a department- wide plan. Agency contingency plans governing the shutdown operations of CBP, IRS, and ITA included most of the key information elements described in OMB Circular A-11. EOP did not address a majority of the key information elements in its contingency plan, which governed USTR’s shutdown operations. Figure 3 shows how selected agencies’ contingency plans aligned with OMB’s guidance. Three of our four selected agencies—Commerce, IRS, and DHS— provided summary information at the beginning of their contingency plans about activities that would and would not continue during a lapse in appropriations. EOP’s contingency plan did not include any information on activities that would and would not continue. The following table shows examples of exempt and excepted work activities from our selected agencies’ contingency plans (see table 2). All four agencies provided the total number of employees on-board before the shutdown and how many would continue to work during the government shutdown. However, EOP’s contingency plan did not break down these employees by ADA exception categories that may include addressing emergencies involving the safety of human life or the protection of property or carrying out core constitutional powers, as specified in OMB guidance. While the break out of employees by ADA exception category was not in the DHS department-wide plan, CBP’s component-level portion of the plan, which is not publically available because of law enforcement sensitivities, contained these details. This information is important for an agency to ensure it has proper oversight of operations and the right personnel performing excepted work to be in compliance with the ADA. None of the agencies we reviewed provided a complete description of potential changes to their activities and operations in the case of a prolonged lapse in appropriations—one lasting longer than 5 days—within their contingency plans. Officials at some of the selected agencies told us that the purpose of their contingency plans was only to document operations for the first 5 days of a shutdown, contrary to what is required in OMB’s Circular A-11 for planning and documenting operations in the anticipation of a potential prolonged shutdown. While three of the four agency contingency plans that we reviewed— Commerce, IRS, and DHS—provided some minimal details on how operational changes would be made in the event of a prolonged shutdown, such as designating personnel responsible, none provided the level of detail called for in OMB guidance. As discussed later, three of four selected agency components—ITA, IRS, and USTR—did have internal discussions on changes to operations in the event of a prolonged shutdown, according to officials. However, these discussions were not documented in the agency contingency plans. Given that shutdowns longer than 5 days have occurred in the past, it is important for agencies to consider and document the effects that a potential prolonged shutdown would have on operations in their contingency plans. Planning for potential prolonged shutdowns may assist the agencies with effectively managing changes in operations, and documenting these plans in public contingency plans may provide transparency to agency actions as a shutdown continues. OMB’s guidance states that if an agency anticipates changes during a potential prolonged shutdown, contingency plans should include information such as points in time when the furlough status of an employee may change, how many employees would be affected, and the legal basis for the changes. This information element is mentioned in two separate sections of Circular A-11 rather than in one consolidated location. Contingency plans for all selected agencies did not include complete information about (1) flexibilities available to supervisors if furloughed employees were unable to return to work on the day specified by the agency, including use of annual leave, compensatory time off, or credit hours; and (2) procedures for resuming program activities, including steps to ensure appropriate oversight and disbursement of funds upon the end of a shutdown, as specified in OMB’s guidance. Officials at selected agencies said that this information was available in internal guidance and fact sheets for employees, but that they did not include it in contingency plans, which are accessible to all employees during a shutdown. Including this information in contingency plans is important because it helps clarify agencies’ expectations for returning employees, and its inclusion may help agencies experience a more timely resumption of activities following a shutdown. As previously mentioned, USTR, as a component of EOP, operated under EOP’s contingency plan and did not have a separate plan for the fiscal year 2019 shutdown. While EOP’s contingency plan contained some information on USTR such as total number of employees on-board before the shutdown and employees to be retained during the shutdown, the plan did not fully address 10 of the 14 information elements outlined in OMB’s Circular A-11. Information that was not provided includes: (1) a breakout of exempt and excepted positions by category (e.g., available budget authority, emergencies involving safety of human life or protection of property, etc.); (2) summaries of activities that would or would not continue during a lapse; (3) designation of personnel responsible for implementing and adjusting the contingency plan if conditions change; and (4) methods for notifying employees that the shutdown has ended and when to return to work. Formal contingency plans that address the information elements specified in OMB guidance help agencies prepare for and oversee shutdown operations, and provide transparency to agency actions during a lapse in appropriations. Without a plan that covers these elements, USTR risks miscommunication with employees and other stakeholders that could negatively impact an orderly shutdown and the effective resumption of activities at the end of a lapse. Officials at IRS, ITA, and USTR discussed anticipated operational changes in the event of a prolonged shutdown internally while planning for the fiscal year 2019 shutdown. In one instance, an agency component documented these discussions in planning documents separate from agency contingency plans under which the component operated. However, as mentioned previously, potential operational changes were not documented in any of the contingency plans of our selected agencies. Potential operational changes generally involved recalling additional employees who had been furloughed at the beginning of the shutdown to carry out activities that the agencies categorized as excepted from the ADA or exempt due to other funding sources. IRS: IRS officials said that their initial planning was for a shutdown lasting 5 days or less. Within their contingency plan IRS noted that it would amend the plan if the shutdown lasted longer. On December 27, 2018, 6 days into the shutdown, IRS issued an updated contingency plan. According to IRS officials, this updated plan was assembled by contacting each of IRS’s 23 organizational offices to find any new activity requirements that would lead to changes in the contingency plan. In its amended plan, IRS added approximately 60 positions as excepted or exempt. Examples of activities that employees in these positions would support included: (1) communications efforts through IRS websites, (2) end-of-month financial operations, and (3) managing on-boarding for employees hired under Public Law 115-97, commonly referred to as the Tax Cuts and Jobs Act. IRS officials said they knew about these operational changes at the time of initial shutdown planning, but did not document all these operational needs. IRS program officials told us that being informed of anticipated operational changes as early as possible would have helped them prepare for the shift in workload. For its fiscal year 2020 contingency plan, IRS asked plan contributors to identify “as needed” positions that could be activated during a potential prolonged shutdown. Plan contributors also identified positions that would be needed if a shutdown lasting more than 5 days were to occur as IRS approached the tax filing season. ITA: Prior to the shutdown, ITA officials prepared a list of upcoming activities for the next 30 to 60 days to determine the potential scope of activities affected by a government shutdown. Activities included trade shows, meetings, and other critical operational deadlines. According to officials, ITA worked with their General Counsel to determine if activities could continue as excepted from the ADA or exempted because funding was available from another source. For those activities that could not be deemed excepted or exempt, ITA officials said that they were prepared to notify affected parties of the cancellation or postponement of the activities. For upcoming activities, ITA established dates when preparation would need to begin. In addition, ITA officials prepared temporary exception requests for employees to be recalled from furlough status in time to conduct needed preparation and carry out scheduled activities. ITA officials told us that they used and updated a tracker daily during the shutdown to ensure that all information remained current. Prior to the shutdown, ITA officials also said that they collected information on official travel planned for around the anticipated time of the shutdown. They said that it was important to gather this information because once employees were furloughed it becomes more difficult to gather complete and timely information on these travel plans. USTR: Prior to the shutdown, USTR officials asked offices to provide lists of positions that would need to be excepted during the first 2 weeks of a potential shutdown. This allowed USTR to anticipate operational needs if a shutdown lasted longer than 5 days. USTR officials said that flexibility was important as the potential shutdown approached because it allowed offices to adjust excepted position lists based on additional excepted activities or postponement of activities. USTR officials said that, in their experience, it is difficult to anticipate all the operational changes needed in the event of a shutdown longer than 2 weeks, especially as the agency component relies on partners at other agencies that may or may not be affected by the shutdown. CBP: Although the non-public portion of the DHS plan for CBP included sections that describe functions that may resume in the event of a prolonged shutdown, CBP officials said that these sections were not used in anticipation of the fiscal year 2019 shutdown. Specifically, the sections provide the opportunity for officials to indicate how many employees would be recalled to perform functions, but in the fiscal year 2019 plan almost every section indicates zero employees. Despite OMB guidance on prolonged shutdowns, officials said they believe that OMB guidance was exclusively for the first 5 days of a shutdown. Use of these sections of the CBP plan would help provide clearer expectations to the agency component’s workforce about who may be recalled to perform work activities during a shutdown. For the fiscal year 2020 contingency plan, CBP officials said that they asked offices to analyze and communicate what, if any, additional employees would be needed to work if a shutdown were to extend past 5 days. However, our review of the 2020 CBP plan found that, similar to the plan for fiscal year 2019, it largely does not indicate how many employees would be recalled to perform functions in the event of a prolonged shutdown. During the fiscal year 2019 shutdown, each agency component that we reviewed determined that changes needed to occur that affected the number of excepted employees working during the shutdown. According to agency component officials, these changes were due to the length of the shutdown, external events, and changes to the determination of excepted work. The length of the fiscal year 2019 shutdown was the most common reason cited by officials for operational changes. CBP: During the fiscal year 2019 shutdown, CBP responded to an increase in foreign nationals arriving at the southern U.S. border. In response to this external event, CBP officials told us that they identified a need to train additional law enforcement officers and agents to perform excepted activities. According to the DHS contingency plan, new hire training for law enforcement officers may be an excepted activity if the requesting agency component establishes a reasonable likelihood that a delay in new hire training would compromise the safety of human life or protection of property. According to DHS documents, this was a change from previous shutdowns, when new hire training was not an activity excepted from the ADA. CBP officials told us that they discussed this issue internally before the shutdown, but processing the change through DHS’s Chief Financial Officer, DHS General Counsel, and OMB occurred after the shutdown began. CBP has incorporated this change into its updated, non-public portion of DHS’s contingency plan. IRS: As the length of the shutdown increased, IRS identified mission requirements that it determined necessitated the recall of additional employees. For example, as it transitioned to its filing season operations, IRS recalled mail center employees to oversee the collection of taxes and protection of statute expiration. IRS’s updated fiscal year 2019 filing season contingency plan, published on January 15, 2019, incorporated this activity along with the additional 560 employees recalled for one division to perform the work. IRS said in the updated plan that the ADA exception for this work was the protection of life and property. According to IRS documents, Treasury officials evaluated plan updates for compliance with the ADA, and then shared the plan with OMB prior to implementing changes. IRS also made operational changes during the fiscal year 2019 shutdown that were based on changes to the determination of which work activities were excepted from the ADA. During the shutdown IRS announced that it would process tax returns beginning January 28, 2019, and refund taxpayers as scheduled. In 2011, OMB directed IRS not to pay tax refunds in the event of a lapse in appropriations. However, at the request of Treasury and IRS, OMB revisited this position and, on January 7, 2019, OMB informed Treasury that tax refunds may be paid during a lapse in appropriations. As a result of this determination, IRS added approximately 16,000 additional excepted positions to its filing season contingency plan for the purpose of issuing refunds. This change was documented in its updated contingency plan, published on January 15, 2019. In October 2019, we determined that the agency violated the ADA by processing tax returns and issuing refunds to taxpayers because it lacked available budget authority to support these activities and no exception to the ADA permitted IRS to incur these obligations. ITA: According to ITA officials, they updated ITA’s activity list during the course of the fiscal year 2019 shutdown. They said the update was needed to help determine which preparation activities could continue for future events, such as trade shows that bring international delegations, and which activities or events would have to be cancelled if the shutdown continued. ITA officials said they had to evaluate cancellation clauses in its contracts with these trade shows to decide whether and when to cancel. ITA recalled employees on a temporary basis, as needed, to perform these tasks. ITA officials told us that they followed departmental guidance in requesting employee recalls during the shutdown. ITA submitted proposed changes to Commerce’s Office of the Deputy Assistant Secretary for Administration, which coordinated department-level review and approval. Commerce officials told us that senior leadership discussed changes to the contingency plan with OMB officials over the course of the shutdown. Despite changes to the number of excepted employees, Commerce did not publish an updated contingency plan during the fiscal year 2019 shutdown. Commerce officials told us that, through discussions with OMB, they determined that publishing an updated plan was not necessary due to the relatively small number of changes to the total number of excepted and exempt employees. USTR: Prior to the beginning of the shutdown, USTR estimated that it could continue full operations for 3 to 4 weeks with available funding. Because the shutdown lasted beyond 3 weeks, USTR furloughed a majority of its employees on January 14, 2019, once those funds were no longer available. In the absence of available funding, USTR officials decided that some functions were excepted from the ADA under the justification that the agency component works to discharge the president’s constitutional duty and power to conduct foreign relations. USTR officials stated that component leaders identified the highest priority mission activities to continue during the shutdown, such as trade negotiations with China and work related to the North American Free Trade Agreement. Officials decided not to continue other activities, such as preparations for the 2019 Group of 20 Summit. USTR officials told us that, in consultation with OMB, USTR excepted more than 74 employees, the number listed in the EOP contingency plan published December 21, 2018. According to USTR documents, between 88 and 101 excepted employees were working during the last 2 weeks of the shutdown. Officials told us that these changes were made to carry out critical, excepted activities and that changes were communicated daily to EOP. Agency preparation for a government shutdown can require extensive changes in day-to-day operations. Having established policies and procedures prior to a shutdown can help agencies implement these changes successfully. Establishing these policies and procedures requires timely and transparent planning and communication to ensure that agencies function as effectively as possible during a shutdown. Internal controls related to planning for a government shutdown include designating roles and responsibilities, establishing processes for planning activities that help meet objectives, and documenting said processes. Internal controls related to communication prior to and during a government shutdown include ensuring that information communicated is timely, sufficient, and delivered to all appropriate individuals. Figure 4 summarizes the extent to which selected agency components incorporated applicable internal controls into their planning and operations prior to and during the fiscal year 2019 shutdown, as discussed in detail in the following sections. The agency components we reviewed identified staff needed to plan for the fiscal year 2019 shutdown and tasked each with certain responsibilities. According to Standards for Internal Control in the Federal Government (Internal Control Standards), agency component management should implement its control activities—processes, procedures, techniques, and mechanisms—through policies. Documenting roles and responsibilities for implementing the policies can help agencies meet their objectives related to managing a government shutdown. The following examples illustrate the roles and responsibilities of staff who helped determine which activities would continue during the fiscal year 2019 shutdown. CBP: CBP’s non-public portion of the DHS contingency plan described the key responsibilities and accountable parties for shutdown preparation. For instance, heads of offices determined which of their employees would remain at work to perform exempt or excepted functions during the shutdown. The CBP Hiatus Coordinator communicated daily with Hiatus Points of Contact within each CBP office who managed the offices’ shutdown processes. For instance, the Hiatus Points of Contact determined what functions would continue during the shutdown to help ensure activities aligned with OMB guidance. Officials said that CBP’s Office of Chief Counsel reviewed each excepted function to help ensure they met the legal standard for each ADA exception category. IRS: IRS internal process documents outlined the steps needed to prepare for a shutdown and the accountable parties for implementation. For example, IRS had a Lapse Program Manager who coordinated shutdown activities and helped develop the contingency plan, including identifying and evaluating excepted roles and aligning them with people, positions, and exception categories. IRS Chief Counsel was then responsible for reviewing the contingency plan for compliance with the ADA, followed by a review from Treasury’s General Counsel. According to the process documents, Treasury ultimately approves IRS’s contingency plan. ITA: ITA employed a “bottom-up” shutdown planning process, according to ITA officials. As part of this process, ITA officials said they identified activities to continue during a shutdown, as well as the ADA exceptions to justify the activities, before submitting plans to General Counsel for review. However, ITA did not document its roles and responsibilities because the component relied on the planning processes documented in Commerce’s shutdown contingency plan, according to ITA officials. The agency’s plan provided instructions for submitting component shutdown plans to Commerce’s Office of the General Counsel and Office of Human Resources Management. Commerce’s contingency plan did not, however, contain information about component-specific roles and responsibilities related to planning for a potential government shutdown. Without documenting roles and responsibilities, ITA cannot ensure that the appropriate officials take the necessary steps to effectively prepare and execute plans for any future potential government shutdowns. USTR: USTR instructed Assistant U.S. Trade Representatives to indicate which employees would perform excepted work based on the highest priority initiatives and activities. Two weeks prior to the shutdown, the Office of Administration and General Counsel used this information to develop a plan for the shutdown, followed by senior leadership approval, according to USTR officials. While USTR described the roles and responsibilities of its officials in planning for the shutdown, USTR did not document these roles and responsibilities because it used this same process in previous shutdowns, and responsible parties were accustomed to the process and knew their roles well, according to USTR officials. Documenting roles and responsibilities would help USTR ensure that the appropriate officials take the necessary steps to effectively prepare and execute plans for future potential government shutdowns, especially when officials currently familiar with the process no longer work for USTR. Internal Control Standards states that agency component management should implement its control activities through policies. Agency components can effectively do so, in part, by documenting processes for implementing policies related to government shutdowns. Shutdown preparation process documents at selected agency components included descriptions of activities to complete prior to the shutdown, such as updating and reviewing contingency plans, and preparing guidance and communication for managers and employees, among other steps. CBP: CBP’s non-public portion of the DHS contingency plan contained actions necessary to prepare for an impending shutdown, in addition to the roles and responsibilities discussed above. For example, CBP officials would need to identify executive points of contact who would continue working during the shutdown, prepare employee communications such as furlough notices, and prepare and distribute guidance for employee training during the shutdown, according to CBP’s shutdown guidance. This guidance also included descriptions of services, such as facilities maintenance, mail operations, and use of information technology equipment that would remain available and how, if at all, that work would be accomplished during a shutdown. IRS: IRS developed detailed process maps for its shutdown processes to document its planning and implementation activities and help improve understanding of the roles and responsibilities of staff at each step, according to IRS officials. IRS’s planning process map showed the order in which staff should perform certain tasks, a description of each task, and the responsible party for each task. For instance, the document showed who should draft, review, revise, and approve the shutdown contingency plan, and when each step should occur by each party. Figure 5 shows a streamlined version of IRS’s process map for the shutdown planning phase. Similarly, IRS’s implementation process map detailed steps for communicating with employees prior to a shutdown and updating contingency plans during a shutdown. During the shutdown, IRS distributed tools and guidance with instructions for implementing each step, according to an IRS official. ITA: ITA prepared a list of activities scheduled for the first 80 days of the fiscal year 2019 shutdown and determined the activities that would continue during the shutdown. While ITA officials described the process of assembling this list to us, they did not provide evidence to show that they had documented the process. According to ITA officials, ITA performed a similar exercise during the fiscal year 2014 government shutdown. Additionally, ITA officials said that they followed Commerce’s contingency plan to plan for the fiscal year 2019 shutdown. However, that document provided general information at the agency level. It did not provide information on the shutdown planning processes used by ITA, such as ITA-specific actions to take in the planning process. ITA did not provide documents showing these processes. Documentation of shutdown planning procedures would help ITA ensure that officials take the necessary steps to effectively prepare for future potential government shutdowns. USTR: USTR officials described the agency component’s shutdown processes but did not have the processes fully documented. Instead, USTR relied on the institutional knowledge of its officials to prepare for the fiscal year 2019 government shutdown. USTR officials told us that staff implementing shutdown processes for the fiscal year 2019 government shutdown also did so during the fiscal year 2014 shutdown. These officials told us that they used the same processes for both shutdowns, and that the staff involved were familiar enough with the processes to implement them effectively in fiscal year 2019. USTR communicated through email the steps for employees to take prior to furloughs, such as providing personal contact information to supervisors. USTR also provided EOP’s shutdown guidance to employees, which included additional information for employees, such as limitations to work site access and seeking outside employment while furloughed. However, EOP’s guidance did not contain details about USTR’s shutdown preparation process. USTR provided guidance to Assistant U.S. Trade Representatives about identifying excepted employees, but this guidance did not include information about other planning processes. Without documentation of all shutdown planning procedures, USTR cannot ensure that officials take the necessary steps to effectively prepare for future potential government shutdowns. Internal Control Standards states that management should communicate sufficient information, such as policies and procedures for implementing shutdown processes, to all appropriate individuals in a timely manner. We found that selected agency components used a variety of methods to communicate shutdown-related plans with employees in a timely manner prior to or at the beginning of the fiscal year 2019 shutdown. Methods included distributing policies through managers, referring employees to internal websites, and component-wide emails. Additionally, all selected agency components communicated individual furlough decisions to employees once the shutdown began. Representatives from employee organizations whose members worked at CBP and IRS said that, despite minor communication challenges between components and employees, they generally found shutdown-related communication to employees to be adequate. CBP: CBP encouraged supervisors to communicate to employees what could be expected of them should a shutdown occur, according to CBP officials from the Office of Field Operations. DHS directed CBP to email furlough notices to affected employees once the shutdown began, according to CBP officials, and CBP received email read receipts to help ensure the notices reached all employees. Each office confirmed with CBP that notices were sent to all affected employees, according to CBP officials. CBP held daily meetings with management during the shutdown to answer questions and share information, including information about travel, pay, contract actions, review and approval of employee recalls, and updates to the CBP contingency plan, according to CBP officials. Organizational points of contact then shared this information with managers, who provided appropriate information to employees. Furloughed employees did not have permission to access internal online resources as CBP had instructed them not to use CBP systems during the shutdown except in limited circumstances. In response, CBP developed a mobile application so that furloughed employees could see such updates on their personal cell phones in the event of a future shutdown, according to CBP officials. Representatives of CBP bargaining unit employees told us that, aside from limited instances of inaccurate or delayed information, CBP effectively communicated shutdown information to employees using multiple communication channels. IRS: IRS hosted internal training sessions prior to the shutdown to clarify roles and responsibilities for managers and excepted, exempt, and furloughed employees. IRS also made resources available to employees on its website, according to IRS officials, including shutdown checklists and a Frequently Asked Questions document with information on preparing for an orderly shutdown, among other things. Two days prior to the shutdown, OMB authorized IRS to direct managers to verbally inform employees of their furlough or excepted status in the event of a shutdown, according to IRS officials. These officials told us that IRS directed managers to not distribute status letters until December 22, 2018, the first day of the partial government shutdown. IRS’s implementation process map also shows that officials were to send status letters at the start of a shutdown. A representative of IRS bargaining unit employees told us IRS was responsive to employee questions during the shutdown and tried to address all issues raised. The representative noted that IRS had some challenges communicating with recalled employees as the shutdown continued but also said that IRS did the best it could, given its limitations, and did not identify ways to improve employee communication. ITA: Commerce directed ITA to distribute notices to employees explaining individuals’ furlough or excepted status after the shutdown began, according to ITA officials. On December 26, 2018, the first working day of the shutdown, ITA officials said they issued these notices along with a fact sheet about tasks for employees to complete that day. The fact sheet also communicated policies regarding scheduled leave and workspace access during the shutdown, among other things. ITA asked employees to confirm receipt of the notices during the orderly shutdown period, after which ITA certified to Commerce that it had issued all notices, according to ITA officials. A representative for bargaining unit Foreign Service Officers at ITA suggested that employees might benefit from receiving some information prior to a shutdown, including standard processes that ITA has established in policy and that remain the same between government shutdowns. USTR: Prior to furloughing employees, USTR instructed employees to visit its public website daily to verify USTR’s operating status. The website provided information on transit benefits, unemployment compensation, and an employee assistance program, among other things. USTR also communicated changes in operating status through notifications to employees’ personal telephone numbers and email accounts during the shutdown, according to USTR officials. These officials told us that in-person communication worked well to convey information to staff due to the small size of the agency component, approximately 250 staff. USTR officials said they emailed all employees about furloughs that would begin on January 14, 2019, updated the operating status on its phone line and website, and directed employees to stay apprised of USTR’s shutdown status. Before furloughs began, USTR instructed employees to provide managers with personal contact information, which, according to officials, managers used to recall employees during the shutdown. USTR officials said that managers also communicated with individual employees regarding whether they would continue to work after January 14, 2019. USTR employees were not represented by an employee organization. Internal Control Standards states that agency component management should design and implement control activities, such as shutdown processes, through policy. Agencies can effectively do so, in part, by documenting processes and roles and responsibilities for staff implementing those processes. During the fiscal year 2019 government shutdown, agencies recalled employees who were previously furloughed to return to work as the shutdown continued and circumstances changed. While each agency component had processes to recall employees back to work during the shutdown, not all components documented these processes. CBP: CBP’s non-public portion of the DHS contingency plan for fiscal year 2019 documented the employee recall process for government shutdowns. According to the plan, offices were to send a written request for a recall to the Executive Assistant Commissioner, Enterprise Services, specifying the number of employees to recall and the justification for doing so. DHS’s Budget Division and Office of the General Counsel also reviewed these recall requests, according to a DHS official. As with its initial excepted and furloughed employee notices, CBP used email read receipts to determine whether employees received updates to their furlough or excepted statuses and CBP recall processes. Additionally, each office had to verify with the CBP Hiatus Coordinator that updated status notices were sent to employees. IRS: IRS documented its procedures for recalling newly excepted employees during the shutdown in its implementation process map. IRS communicated these procedures to employees during the shutdown via its emergency web page and hotline, an updated Frequently Asked Questions document, and engagement with the employee organization representing IRS employees in the bargaining unit, according to IRS officials. IRS delegated the process of recalling employees to its 23 organizational offices. During the recall process, IRS managers contacted excepted employees to discuss duties and the date to report to work, according to IRS officials. IRS had many instances where the component recalled furloughed employees for a period of time and furloughed the employees again when needed, according to an IRS official. This official told us that IRS issued new furlough letters to employees each time this occurred. Similarly, IRS offices used an intermittent furlough letter when excepted employees planned to be away from work. According to the IRS official, doing so provided documentation of whether those excepted employees worked or were furloughed on a given day. ITA: According to ITA officials, once Commerce approved a temporary exception during the shutdown, ITA’s shutdown coordinator issued a recall letter to employees. ITA issued recall notices for temporary exceptions during the shutdown to perform specific work activities. Once employees completed those activities, ITA issued another furlough notice to those employees, according to ITA officials. ITA had a daily employee tracking document that showed exception start and end dates, and whether recall letters and subsequent furlough letters were issued to each employee. However, ITA did not document its recall process. Similar to its shutdown planning processes, ITA officials said they relied on Commerce’s employee recall processes instead of documenting its own specific processes. However, Commerce’s guidance did not contain information about how ITA developed temporary exception requests or how ITA processed the recalls. Without documentation of employee recall processes, ITA cannot ensure that officials are effectively implementing their processes during a potential future shutdown. Furthermore, officials who previously implemented shutdown-related processes may not be available during future shutdowns. Documentation ensures that processes that have been deemed to be effective can be replicated by others in the future. USTR: USTR recalled additional employees to perform excepted work during the shutdown. On each day after furloughs began, USTR recalled up to 30 employees beyond the 74 excepted employees in the Executive Office of the President’s (EOP) shutdown contingency plan. The Chief of Staff and Deputy Chief of Staff reviewed a list of excepted employees each day to identify adjustments to the number of excepted employees needed, according to USTR officials. These officials told us that when USTR offices requested employee recalls, the Chief of Staff and Deputy Chief of Staff consulted with the responsible Deputy U.S. Trade Representatives to make necessary changes. USTR officials did not have a documented process for recalling these employees. As with its preshutdown contingency planning processes, USTR officials said that they rely on institutional knowledge to carry out its recall procedures. Documentation of employee recall processes would help USTR ensure that officials effectively implement these processes during future shutdowns, especially given that officials who previously implemented shutdown-related processes may not be available during future shutdowns. All agency components we reviewed said that they had reviewed or planned to review their shutdown processes and incorporate any identified solutions into their internal planning documents or into agency contingency plans. CBP: CBP incorporated changes to its policies on employee leave and absences into its non-public portion of the DHS fiscal year 2020 contingency plan for a potential shutdown. For example, CBP’s fiscal year 2020 plan now contains examples of when supervisors may approve absences for excepted employees, such as for previously approved and ongoing requests under the Family and Medical Leave Act of 1993. IRS: Following the fiscal year 2019 shutdown, IRS reviewed its processes, requesting input from offices about ways to improve those processes in the case of future government shutdowns. Some improvements identified by offices included modifying current lapse plans to incorporate a medium- and long-term view, hosting training that focuses on frequently asked questions and managerial and employee responsibilities, and creating user-friendly access to information. ITA: ITA planned to cooperate with partner agencies on planned excepted activities going forward, according to ITA officials. These officials said they were in contact with their interagency partners at the time of our review and would work with them prior to a potential future shutdown to determine whether to submit requests for excepted work for certain activities. USTR: USTR reviewed its processes for the fiscal year 2019 shutdown and determined that it operated effectively and would not require changes for future shutdowns, according to USTR officials. Internal Control Standards states that agency component management should implement control activities through policies. During a government shutdown, agencies must limit the work performed to only exempt or excepted activities. Establishing limits for the number of employees working during a shutdown can help achieve this goal, and agencies can document these limits in their shutdown contingency plans. Tracking the number of employees working during a shutdown can help agencies ensure that they operate in accordance with their established contingency plans and prevent violations of the ADA. CBP: According to officials, CBP did not direct program offices to perform daily head counts of employees working and did not track the number of employees who worked during the shutdown. CBP officials told us that it would have been difficult to track employees because it did not have the systems or data to match the number of planned excepted employees with the number of employees who actually worked during the shutdown. Instead, CBP relied on managers to ensure that individual offices did not exceed their approved number of excepted positions during the shutdown. While individual offices could have opted to track the number of employees working each day for this purpose, CBP officials said that they did not direct all offices to do so. Tracking the number of employees who worked during the shutdown would help CBP ensure that controls to limit who can perform work during a shutdown function as intended. It would also ensure that its operations are consistent with contingency plans. IRS: IRS tracked the number of employees who worked each day during the shutdown but faced challenges in doing so. IRS directed managers to ensure that the number of excepted employees in each office did not exceed the number of approved positions in the contingency plan, according to IRS officials. An IRS official told us that each office had discretion for how it complied with this requirement, such as by requiring a daily headcount of employees. For example, during the shutdown, IRS’s Wage and Investment Division documented the office or function under which employees worked and the number of employees who worked in each. However, as headcounts proved to be time consuming for offices—Wage and Investment tracked up to 11,000 employees on one day—IRS officials told us they plan to move to an automatic tracking system in the future. According to IRS officials, IRS hosted daily calls with senior executives and Lapse Program Managers for each office to discuss the daily implementation of the shutdown contingency plan. IRS officials told us that the Heads of Office and Lapse Program Managers oversaw daily operations in each of their offices to help ensure operations were consistent with contingency plans. For example, Wage and Investment officials told us that the Wage and Investment Commissioner met daily with teams to discuss activities performed to help ensure that employees performed only the work in the contingency plan approved prior to the shutdown. ITA: ITA maintained a daily tracker of excepted employees who were scheduled to work each day. ITA used this tracker to record excepted employee names, projects and tasks, exception start and end dates, exception categories, and travel information as appropriate. Officials used this information to determine whether employees received the appropriate furlough or excepted status notice during the shutdown. USTR: USTR tracked which employees worked during the shutdown after January 14, 2019, in accordance with EOP guidance. EOP guidance says that “all EOP components are required to compile and report daily the name of each excepted employee and certify the hours worked that week for the duration of a lapse in appropriations to the group responsible for payroll.” USTR provided to EOP daily lists of excepted staff during the shutdown. These lists helped account for those who were guaranteed pay for work performed during the shutdown, according to USTR officials. Internal Control Standards states that agency component management should design and implement control activities through policies to help meet objectives. Effective implementation includes determining the policies necessary to operate a process based on objectives, such as limiting physical and virtual employee access to agency component workspaces and networks. CBP: In its notices provided to furloughed employees at the start of the fiscal year 2019 government shutdown, CBP advised employees that they must remain away from their workplace unless and until recalled. These furlough notices and CBP’s non-public portion of the DHS contingency plan also stated that employees could not use their government-issued devices for any purpose other than receiving updates and emergency notification from their supervisors. However, CBP did not have additional controls to limit employee access to physical or virtual workspaces, according to CBP officials, such as removing furloughed employees’ ability to logon to CBP networks or devices. DHS officials indicated that it would be difficult to monitor access for all excepted employees during a shutdown, especially given that most CBP employees continued to work during the fiscal year 2019 shutdown. IRS: IRS did not have sufficient controls to limit building access or virtual workspace access during the shutdown. While IRS developed lists of excepted and exempt employees who could work during the shutdown, IRS did not use these lists to grant or deny access to facilities, according to IRS officials. They told us IRS primarily used these lists to ensure it could provide sufficient services to each building based on the number of employees expected to work during the shutdown. IRS’s guidance to furloughed employees stated that employees should not use government-issued mobile phones or login to their government accounts remotely, and managers discussed this requirement with employees, according to IRS officials. IRS also directed employees not to use other government-furnished equipment such as computers, according to IRS officials. However, we found no additional controls to limit virtual network access during the shutdown. During the shutdown, IRS frequently substituted which excepted employees performed excepted functions, resulting in a rotating workforce, according to IRS officials. IRS officials believed it would be difficult to control physical or virtual access for all excepted employees in future shutdowns since access needs changed as frequently as each hour depending on which employees worked. ITA: ITA followed Commerce procedures to develop building access security lists to help ensure building access for excepted and exempt employees during the shutdown, according to ITA officials. Prior to the shutdown, Commerce directed agency components to prepare and submit building access security lists to the department’s Office of Security each day. If an employee tried to enter the headquarters building during the shutdown, the Office of Security would contact an ITA official to verify whether that employee could enter, according to ITA officials. These officials told us that employees not on the building access security list were not granted access to the headquarters building during the shutdown. While ITA had controls to limit physical workspace access during the shutdown, it did not have sufficient controls in place to limit virtual access. According to ITA officials, all furloughed employees were instructed not to use their government devices or access the ITA network virtually, and furlough notices stated that furloughed employees could not work at an alternative worksite during the shutdown. However, ITA officials believed that implementing additional controls, such as turning off network access for furloughed employees, would complicate its process for granting temporary exceptions for employees during a shutdown. USTR: USTR provided employees with EOP guidance prior to implementing furloughs on January 14, 2019. This guidance instructs furloughed employees not to access their place of work or use government-issued cell phones or computers. USTR officials told us they did not have controls in place to monitor employee building access or prevent furloughed employees from entering physical USTR workspaces. These officials told us they provided adequate communications, instructions, and guidance to employees about who can access physical and virtual workspaces. USTR officials also told us that they did not have controls in place to monitor or limit employee access to virtual USTR workspaces. According to these officials, USTR does not maintain or monitor the EOP-provided mobile communications devices and information technology network. Instead, provision and control of telecommunications and information technology, such as the ones identified, is the responsibility of the Presidential Information Technology Community. While agency components may face challenges implementing workspace access controls, such as limiting network access for a large number of employees, these steps are nevertheless important to take. Having sufficient controls to limit who can perform work during a shutdown would help agency components ensure that they operate consistently with the ADA and with contingency plans that are designed to help them operate effectively and avoid misuse of government resources during a shutdown. Agency component management can tailor controls to meet the component’s unique needs. Specific controls used by an agency component may be different than those used by other components based on a number of factors, such as differences in mission, size, or operational environment of the component. Government shutdowns are disruptive events that have spanned multiple weeks in recent years. Given the length of some shutdowns, it is important for agencies to have robust plans and established internal controls to effectively communicate, plan for potential changes, and manage operations prior to and during a shutdown. In addition, documentation of these plans and controls helps ensure that agencies can replicate their actions in the event of future shutdowns. According to OMB, agencies should have detailed contingency plans in place prior to a potential lapse in funding to ensure an orderly shutdown of operations. While three of four agencies’ contingency plans that we reviewed addressed most elements laid out in OMB’s guidance, we identified three elements for which all selected agencies had missing or incomplete information in their contingency plans. When asked about these deficiencies, agency officials often cited internal documents or discussions as addressing these information elements. Internal documentation and guidance can be useful in planning for a potential shutdown, but they do not provide the level of transparency of contingency plans, which are generally available to the public and furloughed employees. Contingency plans that address all information elements specified in OMB guidance ensure that agencies are prepared for potential shutdown scenarios, and provide transparency to agency actions during a lapse in appropriations. In addition to contingency plans, the agency components we reviewed all had internal processes related to planning for and managing operations during a shutdown. However, not all agency components documented these processes. Without documentation of shutdown operations, agencies may not be able to cease operations in a timely manner, and agencies’ actions may not be transparent to OMB, Congress, and the public during future shutdowns. Additionally, proper documentation of processes can help preserve institutional knowledge that might otherwise be lost. During a lapse in funding, agencies must ensure that they do not violate the ADA, which prohibits agencies from obligating or expending funds in the absence of appropriations unless otherwise authorized by law, and from accepting voluntary services for the United States except in cases of emergency involving the safety of human life or the protection of property. Contingency plans are one control that agencies use in this effort. Agencies must have assurance that the contingency plan is being followed daily during a shutdown. This assurance can be verified through controls that (1) track and document the number of employees who actually worked daily during the shutdown, and (2) limit physical and virtual workspace access to appropriate employees. Three of four agency components we reviewed tracked employees who worked, one had sufficient controls on physical access to workspaces, and none had sufficient controls to limit virtual access. Without these controls, agencies are at an increased risk that contingency plans will not be followed, thus diminishing their value as a mechanism to ensure ADA compliance. We are making a total of 14 recommendations, including four to USTR, three each to CBP and IRS, two to ITA, and one each to the Departments of Commerce and Homeland Security. The Secretary of Commerce should align the agency’s contingency plan with OMB guidance by including (1) plans for a potential prolonged shutdown; (2) flexibilities available to supervisors if furloughed employees were unable to return to work after the end of the shutdown; and (3) procedures for resuming program activities, including steps to ensure appropriate oversight and disbursement of funds upon the end of a shutdown. (Recommendation 1) The Secretary of Homeland Security should align the agency’s contingency plan with OMB guidance by including (1) plans for a potential prolonged shutdown; (2) flexibilities available to supervisors if furloughed employees were unable to return to work after the end of the shutdown; and (3) procedures for resuming program activities, including steps to ensure appropriate oversight and disbursement of funds upon the end of a shutdown. (Recommendation 2) The Commissioner of Internal Revenue should align the agency’s contingency plan with OMB guidance by including (1) plans for a potential prolonged shutdown; (2) flexibilities available to supervisors if furloughed employees were unable to return to work after the end of the shutdown; and (3) procedures for resuming program activities, including steps to ensure appropriate oversight and disbursement of funds upon the end of a shutdown. (Recommendation 3) The U.S. Trade Representative, in consultation with EOP as appropriate, should align the component’s contingency plan with OMB guidance. This could be accomplished through (1) revisions to the EOP contingency plan; or (2) by creating a separate USTR plan. (Recommendation 4) The Under Secretary for International Trade should document the component’s shutdown processes, including roles and responsibilities, planning processes for potential shutdowns, and recall processes for furloughed employees during a shutdown. (Recommendation 5) The U.S. Trade Representative should document the component’s shutdown processes, including roles and responsibilities, planning processes for potential shutdowns, and recall processes for furloughed employees during a shutdown. (Recommendation 6) The Commissioner of CBP should develop internal controls to track and document which employees worked and what work was performed daily during a government shutdown. (Recommendation 7) The Commissioner of CBP should develop internal controls to limit access to physical workspaces to appropriate employees during a government shutdown. (Recommendation 8) The Commissioner of Internal Revenue should develop internal controls to limit access to physical workspaces to appropriate employees during a government shutdown. (Recommendation 9) The U.S. Trade Representative should develop internal controls to limit access to physical workspaces to appropriate employees during a government shutdown. (Recommendation 10) The Commissioner of CBP should develop internal controls to limit access to virtual workspaces to appropriate employees during a government shutdown. (Recommendation 11) The Commissioner of Internal Revenue should develop internal controls to limit access to virtual workspaces to appropriate employees during a government shutdown. (Recommendation 12) The Under Secretary for International Trade should develop internal controls to limit access to virtual workspaces to appropriate employees during a government shutdown. (Recommendation 13) The U.S. Trade Representative should, in consultation with EOP, develop internal controls to limit access to virtual workspaces to appropriate employees during a government shutdown. (Recommendation 14) We provided a draft of this report to Commerce, DHS, EOP, IRS, OMB, and USTR for review and comment. We received written comments from Commerce, DHS, and IRS, summarized below and reproduced in appendixes II, III, and IV. USTR provided comments via email, also summarized below. OMB did not provide comments, citing its focused efforts on addressing the national emergency response to the coronavirus pandemic. DHS, EOP, IRS, and USTR provided technical comments, which we incorporated as appropriate. Commerce agreed with all three recommendations directed to it and ITA, and stated that ITA has taken steps to address two of the recommendations. Commerce stated that ITA has documented its shutdown planning processes and recall processes for furloughed employees during a shutdown (recommendation 5). According to Commerce, ITA has also established and documented internal controls to limit virtual workspace access to excepted or exempt employees during a government shutdown (recommendation 13). In addition, Commerce stated that it will develop an action plan to address the recommendation to better align its contingency plan with OMB guidance (recommendation 1). DHS agreed with all four recommendations directed to it and CBP, and stated that it has begun to take steps to better address OMB guidance on contingency plans (recommendation 2). In addition, DHS stated that CBP plans to analyze existing systems to determine which is best suited to track and document employee work during a government shutdown and will ensure that the chosen system is available should a future shutdown occur (recommendation 7). For the recommendation on developing controls for physical workspaces (recommendation 8), DHS stated that because CBP does not have systems capable of efficiently restoring physical access for furloughed employees, it would have to reinstate employee access individually and the cost would be substantial. DHS stated that CBP plans to update procedures to ensure more comprehensive workspace access guidance for furloughed employees. With regard to the recommendation on developing controls for virtual workspace access (recommendation 11), DHS stated that CBP believes that furloughed employees must be able to passively monitor the status of the government shutdown and access important agency communications using DHS-issued electronic devices. Additionally, disabling and reactivating thousands of employee user accounts during a shutdown posed a significant burden. DHS said that CBP plans to update shutdown procedures to clarify allowed use of DHS-issued electronic devices by furloughed employees. We agree that CBP should update procedures on workspace access as suggested, and continue to believe that physical and virtual access controls are important during shutdowns in order to prevent misuse of government resources. We encourage CBP to improve their systems to be able to efficiently implement such controls. IRS partially agreed with one recommendation addressed to it and disagreed with two others. IRS agreed with one element of our recommendation to include additional detail in its agency contingency plan (recommendation 3) and stated that it is in the process of adding procedures for resuming program activities following a government shutdown into its contingency plan. IRS did not agree with the other elements of the recommendation because it believes it has already addressed plans for a potential prolonged shutdown and flexibilities for supervisors if employees are unable to return to work at the end of a shutdown in its contingency plans. We agree that while IRS has included some details on these elements in its plans, we continue to believe that it should provide more detail, such as points in time when the furlough status of an employee may change, how many employees would be affected, and the legal basis for the changes, within its publically available contingency plan to fully address these elements. IRS disagreed with our recommendations on developing controls for physical and virtual workspace access during a shutdown (recommendations 9 and 12). For both recommendations, IRS stated that it believes that it has effective controls in place to manage physical and virtual workspace access during a shutdown. In addition, IRS said that it believes that implementing additional access controls do not justify the corresponding resource investments. We continue to believe that IRS should improve its access controls, which currently rely on managers and furlough letters to communicate limits on workspace access. While we recognize the costs of increased access controls, government shutdowns are unique events that require additional access controls in order to prevent potential misuse of government resources. In USTR’s emailed comments, its Assistant U.S. Trade Representative for Administration neither agreed nor disagreed with the four recommendations addressed to it. The official, however, stated that USTR has already begun addressing our recommendations on aligning its contingency plan with OMB guidance (recommendation 4) and documenting its shutdown processes (recommendation 6), and has made EOP aware of the recommendations on developing controls for physical and virtual workspace access during a shutdown (recommendations 10 and 14). As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Commerce, the Acting Commissioner of U.S. Customs and Border Protection, the Acting Secretary of Homeland Security, the Commissioner of the Internal Revenue Service, the Acting Under Secretary for International Trade, the Director of the Office of Management and Budget, the U.S. Trade Representative, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. James R. McTigue, Jr. Director, Strategic Issues. This report assesses the extent to which (1) selected agencies’ contingency plans were consistent with applicable Office of Management and Budget (OMB) guidance, (2) selected agency components planned for a potential prolonged shutdown and changed operations during the shutdown, and (3) selected agency components’ shutdown policies and procedures were consistent with relevant internal control principles. We selected four agency components under the jurisdiction of the Senate Committee on Finance that were affected by the fiscal year 2019 shutdown. When more than one agency component at an agency met these criteria, we selected the component that had the largest budget and the greatest planned number of employees performing excepted work during the shutdown. While the four components we selected are not generalizable to other agency components, they do reflect variation in size, funding type, and justification for excepted work that serve as illustrative examples of a range of experiences. These selected agency components are U.S. Customs and Border Protection (CBP), Department of Homeland Security (DHS); Internal Revenue Service (IRS), Department of the Treasury (Treasury); International Trade Administration (ITA), Department of Commerce (Commerce); and Office of the United States Trade Representative (USTR), Executive Office of the President (EOP). To address our first objective, we compared information in selected agencies’ government shutdown contingency plans to key information elements described in OMB guidance. Specifically, we identified 14 key information elements in the 2018 OMB Circular No. A-11 Section 124— Agency Operations in the Absence of Appropriations (Circular A-11), the applicable guidance, at the beginning of the partial government shutdown that began on December 22, 2018. This document details the information agencies should include in their contingency plans, such as significant agency activities that will continue or cease during a shutdown, the number of employees who will continue to work during a shutdown, and necessary actions for resuming orderly operations after a shutdown. Three of our four selected agency components—CBP, ITA, and USTR— operated under an agency-wide plan. Therefore, we evaluated the fiscal year 2019 contingency plans for Commerce, DHS, and EOP. Each component of DHS has a non-public, for official use only, portion of the agency-wide plan, and we included CBP’s non-public portion in our evaluation. Because Treasury’s contingency plan did not cover IRS, we evaluated IRS’s contingency plans for this objective. We also reviewed written responses from OMB and interviewed officials at selected agencies to understand the reasons for any discrepancies between the contingency plans and OMB guidance. To address our second objective, we assessed the extent to which selected agency components planned for a potential prolonged shutdown—one longer than 5 days—as outlined by Circular A-11, and changed operations during the shutdown. We reviewed shutdown contingency plans and other planning documents at CBP, IRS, ITA, and USTR to determine agency component processes for proposing, reviewing, and approving operational changes during a government shutdown. We interviewed officials at these agency components to determine what operational changes components made during the fiscal year 2019 shutdown and the key factors that led to these changes. To address our third objective, we assessed selected agency components’ shutdown processes to determine the extent to which the components followed relevant internal control principles in planning for the fiscal year 2019 government shutdown. We reviewed our Standards for Internal Control in the Federal Government (Internal Control Standards) and identified key principles related to agency components’ shutdown processes. Relevant internal control standards include designing and implementing appropriate policies and procedures and effectively communicating this information to stakeholders. This would include policies and procedures to ensure an orderly shutdown process and compliance with applicable laws such as the Antideficiency Act (ADA). We developed a questionnaire for selected agency components based on these internal control principles that reflected practices we determined to be associated with effectively implementing the controls in the context of a government shutdown, such as documentation of shutdown processes or employee communication. We reviewed the results of this questionnaire, reviewed agency component contingency plans and other internal planning documents, and interviewed component officials to determine the extent to which components followed these internal control principles. We assessed the sufficiency of selected agency components’ internal controls based on whether the evidence gathered contained relevant details about a component’s shutdown processes that demonstrated the component would have reasonable assurance of achieving its shutdown objectives. While we assessed agency components’ shutdown processes, we did not assess the results of those processes, such as whether components correctly or appropriately categorized activities as excepted from the ADA. We interviewed officials at selected agency components to understand the reasons for any inconsistencies between component planning and decision-making processes and internal control principles. We also interviewed representatives of employee organizations at the agency components we reviewed to determine if communication of shutdown- related policies and procedures was timely, sufficient, and transparent. In addition, we selected one program office within each reviewed agency component to identify illustrative examples of how components operationalized their shutdown processes. For CBP, IRS, and ITA, we selected the program offices with the largest budget based on available budget data. Based on this criterion, we selected CBP’s Office of Field Operations, IRS’s Wage and Investment division, and ITA’s Global Markets office. Selection of these program offices provided for a variety of justifications for excepted work and number of planned excepted employees. Due to the size of USTR, the agency component does not manage based on program offices, according to USTR officials. Because of this, we did not select a program office within USTR. We reviewed documents and interviewed officials in these program offices to determine how they planned for the fiscal year 2019 government shutdown, communicated with employees, and recalled furloughed employees back to work, among other things. We conducted this performance audit from March 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. James R. McTigue, Jr. at (202) 512-9110 or mctiguej@gao.gov. In addition to the individual named above, Danielle Novak, Assistant Director; Shelby Kain, Analyst-in-Charge; Alyssia Borsella; Kendall Chan; Jacqueline Chapin; Ann Czapiewski; Kristine Hassinger; J. Andrew Howard; Ulyana Panchishin; Steven Putansu; and Melissa Wolf made major contributions to this report. Ted Hu and Triana McNeil also contributed to the report.", "summary": "A lapse in appropriations resulted in the federal government partially shutting down from December 22, 2018, to January 25, 2019. GAO was asked to evaluate agency contingency plans and operations during the FY 2019 shutdown. This report assesses the extent to which selected agencies and selected components (1) had contingency plans that were consistent with applicable OMB guidance, (2) planned for a potential prolonged shutdown and changed operations during the shutdown, and (3) had shutdown policies and procedures consistent with relevant internal control principles. GAO selected CBP, IRS, ITA, and USTR as agency components for review because they are under the jurisdiction of the Senate Committee on Finance and were affected by the FY 2019 shutdown. GAO reviewed OMB's guidance, agencies' contingency plans, and other documentation. GAO interviewed agency and component officials. The Office of Management and Budget (OMB) issues shutdown guidance for agencies in Circular A-11. Of four selected agency components, three—U.S. Customs and Border Protection (CBP), the Internal Revenue Service (IRS), and the International Trade Administration (ITA)—operated in fiscal year (FY) 2019 under contingency plans that included most of the key information elements specified in Circular A-11 . The plan that the fourth one—Office of the U.S. Trade Representative (USTR)—operated under, authored by the Executive Office of the President, did not include a majority of the key information elements. OMB guidance instructs agencies to have plans in place for both short and prolonged—longer than 5 days—shutdowns. None of the four selected agencies' FY 2019 contingency plans fully addressed anticipated changes in the event of a prolonged shutdown. GAO found that IRS, ITA, and USTR internally discussed and planned for anticipated operational changes in the event of a prolonged FY 2019 shutdown. CBP officials said they only focused on short-term operational needs. Having a comprehensive plan for a potential prolonged shutdown would help provide clearer workforce expectations during any future shutdowns. Having sufficient internal controls, such as documented policies and procedures, in place prior to a shutdown can help agencies implement changes in day-to-day operations during a shutdown. Selected agency components all incorporated some internal controls in their shutdown-related activities, as shown in the table below. However, none of the agency components had controls for limiting both physical and virtual workspace access for employees during a shutdown, each citing the difficulty of implementing such controls. Having these controls in place would help components ensure that they operate consistently with their contingency plans and avoid misuse of government resources. GAO is making 14 recommendations, including that certain agency components improve contingency plans, document shutdown procedures, and improve controls for physical and virtual workspace access during a shutdown. CBP and ITA agreed with the recommendations directed to them; IRS partially agreed with one and disagreed with two; and USTR did not state whether it agreed or disagreed, but has begun taking steps to implement two recommendations.", "document_type": "gao"}
{"report": "Several entities are involved with, and pay different prices for, prescription drugs as they move from the manufacturer to the beneficiary (a system referred to as the prescription drug supply chain). In general, manufacturers develop and sell their drugs to wholesalers, and wholesalers then sell the drugs to pharmacies. In the Part D program, CMS pays Part D plan sponsors to provide drug coverage, and plan sponsors may charge beneficiaries monthly premiums in exchange for coverage. Plan sponsors and PBMs negotiate reimbursement rates for the drugs provided to beneficiaries. When the beneficiary purchases a drug, the pharmacy is paid by the Part D plan sponsor, or through the PBM on the sponsor’s behalf, and by the beneficiary through any applicable cost-sharing. (See fig. 1 for a flow chart showing the relationship between certain entities in the prescription drug supply chain when a Part D plan sponsor uses a PBM.) Services associated with developing and managing a prescription drug plan performed by PBMs, Part D plan sponsors, or both, include: Formulary development. Determining the list of drugs covered under the plan (the formulary), including assignment of covered drugs to tiers that correspond to different levels of beneficiary cost sharing and placing restrictions on drugs included in the formulary. Part D plan sponsors submit formularies for their plans to CMS for review and approval annually. Pharmacy network development. Creating a network of pharmacies where beneficiaries may fill their prescriptions and negotiating drug prices and reimbursement rates with those pharmacies. This can also include developing “preferred networks,” whereby beneficiaries pay lower cost-sharing and pharmacies agree to receive lower prices for drugs in exchange for increased volume of prescriptions purchased. Utilization management services. Utilization management services include processes such as: Prior authorization. A requirement that beneficiaries obtain approval for a drug by the PBM or plan sponsor before obtaining the drug if it is to be covered by the plan. Step therapy. A requirement where more expensive drugs are covered only if beneficiaries try less expensive alternatives first and find them not to be effective. Medication therapy management. A program required by CMS designed to improve medication adherence and reduce the risk of adverse drug events through discussion with targeted beneficiaries and prescriber intervention. Drug utilization review. A concurrent examination by the PBM or plan sponsor of prescriptions at the time of purchase by the beneficiary to assess safety considerations, such as potential adverse interactions, and compliance with clinical guidelines (including quantity and dose). These reviews can also occur retrospectively to analyze beneficiaries’ drug utilization and physicians’ prescribing patterns. Negotiation of rebates from manufacturers. Negotiating rebates for Part D plan sponsors with manufacturers in exchange for driving more utilization of a manufacturer’s drug. This can include more favorable placement on the sponsor’s formulary. The rebate terms do not have to be disclosed to the public, but plan sponsors must report rebate amounts to CMS. PBMs may earn revenue from providing drug benefit management services to Part D plan sponsors in a number of ways, including: (1) payments from plan sponsors for administering services, such as drug benefits claim processing; (2) retention of a portion of drug rebates that PBMs negotiate on behalf of the plan sponsor and fees for managing and distributing those rebates; (3) spread pricing; and (4) payments from manufacturers for various services. PBMs may provide drug benefit management services to Part D plan sponsors and commercial plans, such as employer-sponsored health plans. Commercial plans may pay PBMs in ways similar to Part D plans (e.g., rebate retention and claims processing fees). Part D plan sponsors are also required to provide access to all or substantially all drugs covered under certain therapeutic classes of drugs, known as Medicare protected classes: (1) anticonvulsants, (2) antidepressants, (3) antineoplastics, (4) antipsychotics, (5) antiretrovirals, and (6) immunosuppressants for the treatment of transplant. Plans are limited in the formulary restrictions they can apply to these drugs. Additionally, CMS generally requires Part D plan sponsors to provide coverage for at least two drugs in each class. CMS makes payments prospectively to Part D plan sponsors for beneficiary drug coverage. CMS pays plan sponsors monthly, and these payments are determined through annual bids submitted in June of the preceding program year, which runs from January 1 through December 31. Those bids reflect the plan sponsors’ estimates of program costs and rebates and other price concessions that the sponsor expects to receive during the ensuing program year. At the end of the program year, CMS reviews cost data submitted by plan sponsors through PDE records and their submission of rebate and other price concession data and compares estimated payments with actual costs incurred, with CMS either reclaiming some funds or making additional payments. Thus, the final plan payments by CMS are based on the costs actually incurred by Part D plan sponsors minus rebates and other price concessions that are either passed along to the plan sponsors or retained by the PBMs. Rebates and other price concessions reduce the cost of the Part D program to beneficiaries and the federal government. In developing their bids, Part D plan sponsors may subtract rebates and other price concessions that are passed along to them from their estimated drug costs. When they do, rebates and other price concessions reduce a plan sponsor’s estimate of liability that is reflected in bid amounts, which, in turn, reduce beneficiary premiums because they are based, in part, on the bid amount. This downward pressure on premiums is one reason that premiums remained relatively unchanged between 2010 and 2015, according to CMS, even though total gross Part D drug costs grew about 12 percent per year in that period. Rebates have additional implications for Part D beneficiaries and the Part D program more generally. Since beneficiary cost sharing is calculated based on the price of the drug at the time of purchase (i.e., before rebates are paid), beneficiaries pay higher cost sharing than they would if rebates were paid at the point of sale. In addition, higher pre-rebate drug prices may result in beneficiaries more quickly reaching the catastrophic coverage phase, where the federal government’s share of drug costs increases, and the plan sponsors’ share decreases. Seventy-four percent of the drug benefit management services provided under 624 Part D plan sponsor contracts were performed by a PBM alone or in conjunction with a Part D plan sponsor in 2016. We found that plan sponsors performed the remaining 26 percent of services themselves. In addition, a PBM was used to provide one or more of the 10 key drug benefit management services under nearly all of the 624 Part D plan sponsor contracts (99.7 percent), and the manner in which they used them varied, as summarized below: Number of drug benefit management services provided. Part D plan sponsor contracts varied by the number of services provided by PBMs. Eighty-nine percent of Part D plan sponsor contracts used a PBM alone or in conjunction with a plan sponsor for at least half of the 10 drug benefit management services; 15 percent of contracts used a PBM alone or with a plan sponsor for all 10 services. Number of PBMs used. Part D plan sponsor contracts varied in the number of PBMs used to provide one or more of the 10 drug benefit management services. Fifty-four percent of contracts used one PBM, 35 percent used two or three PBMs, and 11 percent used four or more PBMs. Types of drug benefit management services provided. Part D plan sponsor contracts varied by the drug benefit management services they used a PBM to provide. PBMs alone or with the plan sponsor more frequently provided claims adjudication (99 percent of Part D plan sponsor contracts), pharmacy network development (92 percent), and rebate and other price concession negotiations (83 percent). In contrast, PBMs alone or with the plan sponsor less frequently provided a pharmacy and therapeutics committee (45 percent), enrollee appeals and grievance process-management (30 percent), and enrollment processing (34 percent). Part D plan sponsors mainly used five PBMs in 2016. Of the 103 PBMs that provided at least one drug benefit management service to the 624 Part D plan sponsor contracts in 2016, the following five provided at least one service to 528 (85 percent) plan sponsor contracts in 2016: CVS Caremark, OptumRx, Express Scripts, Medimpact, and Argus. These five PBMs also provided the largest number of services to Part D plan contracts in 2016. For example, CVS Caremark, by itself or with another PBM or plan sponsor, provided 17 percent of services that PBMs provided to Part D plan sponsors’ contracts in 2016, the most of any PBM. See appendix II for more information on variation in Part D plan sponsor contracts’ use of PBMs, factors that influence sponsors’ decision to use a PBM, and additional information on the PBMs used by Part D plan sponsors. Our review of 20 service agreements between Part D plan sponsors and PBMs found that the primary revenue source for PBMs from services they provided to Part D plans was (1) a volume-based fee paid by plan sponsors based on the number of paid claims that the PBM processed; (2) a flat monthly per-member, per-month fee paid by plan sponsors; or (3) a combination of the two. Nineteen of the 20 service agreements that we reviewed stated that PBMs were to be paid in one of these ways. None of the service agreements tied these fees to the price of a drug paid to the pharmacy. Representatives we interviewed from all seven of the PBMs confirmed that a Part D plan sponsor-paid fee for the PBM’s services was the primary way they earned revenue from their Part D clients. We also examined PBM revenue reported to CMS by Part D plan sponsors in their rebates and other price concession data—also referred to as direct and indirect remuneration (DIR)—in 2016, the most recent data available at the time of our analysis. These data show that PBMs passed nearly all rebates received from manufacturers through to Part D plan sponsors in 2016. Part D plan sponsors reported to CMS that, of the approximately $18 billion in rebates that PBMs negotiated with pharmaceutical manufacturers that year, PBMs retained $74.3 million, or about 0.4 percent, and passed through the remaining 99.6 percent to plan sponsors. The small amount of PBM rebate retention in the Part D program was also reflected in the service agreements we examined and in our interviews with PBM representatives. Sixteen of the 20 service agreements that we reviewed included provisions that required the PBM to pass through all rebates to the Part D plan sponsor; one other agreement required at least 95 percent to be passed through to the plan sponsor. The other three service agreements that we reviewed either did not include provisions related to rebate retention or redacted such information. Officials we interviewed from four of the seven PBMs told us their PBMs passed through to Part D plan sponsors all rebates obtained from manufacturers. Representatives of one PBM noted that plan sponsors, in turn, may use rebates to help offset the growth in drug costs, helping lower premiums for beneficiaries. Representatives from the other three PBMs noted that the amount of retained rebates was relatively small, consistent with the data reported to CMS. PBMs and Part D plan sponsors may earn non-rebate revenue from manufacturers for providing certain services. The service agreements we examined included examples of this revenue, including fees for rebate program administration, prescriber education programs, and programs designed to ensure patients adhere to, and comply with, recommendations regarding a particular prescription. The full amount that PBMs and Part D plan sponsors earned from manufacturers for non- rebate services in 2016 was $516.5 million. Although CMS requires these fees to be reported to the agency by plan sponsors, CMS does not break out how much of the money was received by PBMs and how much was received by plan sponsors. PBMs earned little Part D revenue from spread pricing—keeping the difference between the amount the PBM paid the pharmacy for a drug and the amount the PBM charged the plan for the drug, from 2014 through 2016. PBMs earned about $300,000 from spread pricing in 2016, according to CMS rebate and other price concession data. CMS data also show that PBMs earned no revenue from spread pricing in either 2014 or 2015. PBMs generally earn more from spread pricing and rebate retention from commercial plans than they do from Part D, according to officials from three PBMs. Officials from two of these PBMs said CMS reporting requirements have removed much of the incentive in Part D for PBMs to earn revenue from spread pricing because of the complexity of the requirements and the criticism from health care providers when reports to CMS containing these amounts are publicized. See appendix III for more information on Part D plan sponsor reporting to CMS of the amounts of revenue—other than rebates and discounts—that manufacturers provide to their PBMs; and on PBM and Part D plan sponsor perspectives on PBM revenue earned from spread pricing, the effect of CMS requirements on spread pricing revenue, and differences between PBMs’ Part D and commercial business lines. Growth in the amount of rebates and other price concessions provided by manufacturers and others to Part D plan sponsors and PBMs outpaced growth in gross and net Part D expenditures for all brand-name and generic drugs from 2014 through 2016. Gross expenditures reflect what was paid to the pharmacy by the Part D plan sponsor—or the PBM on the sponsor’s behalf—and by the beneficiary for a given drug. Net expenditures reflect any rebates and discounts obtained by plan sponsors and PBMs after a beneficiary receives a drug. During this time, gross Part D expenditures increased 20 percent, from $120.7 billion in 2014 to $145.1 billion in 2016. The amount of rebates and other price concessions obtained for these drugs increased 66 percent during the same period, from $17.5 billion to $29 billion. As a result, rebates and other price concessions as a proportion of gross expenditures increased from 14 percent of gross expenditures in 2014 to 20 percent in 2016. This resulted in an increase in net Part D expenditures of 13 percent, from $103.2 billion in 2014 to $116.1 billion in 2016 (see fig. 2). Rebates accounted for most of the total of rebates and other price concessions obtained for Part D drugs from 2014 through 2016. Rebates are generally paid by manufacturers to Part D plan sponsors, or PBMs on sponsors’ behalf, after a drug is purchased from a pharmacy. In 2016, rebates accounted for 92 percent ($27 billion) of the $29.1 billion in rebates and other price concessions. The proportion was generally consistent in 2014 and 2015, with rebates accounting for 93 and 91 percent of total rebates and other price concessions, respectively. Pharmacy-related price concessions, which include any monies obtained by plan sponsors and PBMs from a pharmacy after a beneficiary purchases a drug, accounted for nearly all the rest of rebates and other price concessions—7 percent—in 2016. The amount of pharmacy- related price concessions increased 295 percent from 2014 through 2016 ($538 million to $2.1 billion). The 444 highest expenditure, highest utilization brand-name drugs accounted for the majority of expenditures and received the vast majority of rebates and other price concessions in 2016. These drugs accounted for 65 percent of the $145 billion in Part D expenditures and received 90 percent of the $29.1 billion in rebates and other price concessions obtained for Part D drugs. Of the 444 highest expenditure, highest utilization brand-name drugs in 2016, the 200 highest utilization and the 200 highest expenditure drugs received a greater amount of rebates and other price concessions than the 200 highest expenditure per utilization drugs. (See table 1.) Furthermore we found that brand-name drugs received greater amounts of rebates and other price concessions than generic drugs. Specifically, among the 444 highest expenditure, highest utilization brand-name drugs and the 476 highest expenditure, highest utilization generic drugs, brand-name drugs received 98 percent of rebates and other price concessions in 2016. Consistent with the results for all Part D drugs, from 2014 through 2016 rebates and other price concessions outpaced growth in gross and net expenditures for the three groups of highest expenditure, highest utilization brand-name drugs in our analysis (see table 2 for information on these brand-name drugs). The three groups of brand-name drugs generally had higher percent changes in rebates and other prices concessions and in gross and net expenditures than did all Part D drugs, which includes generics. For example, from 2014 through 2016, net expenditures for the 200 highest expenditure brand-name drugs increased 27 percent compared to a 13 percent increase for all Part D drugs. Of the three groups, the 200 drugs with the highest expenditure per utilization had the largest percentage increases in expenditures and rebates and other price concessions. However, these drugs had relatively low gross expenditures, rebates and other price concessions, and utilization compared with the other two groups. Increases in expenditures for the three groups of drugs in our analysis were primarily accounted for by increases in the price per drug rather than changes in utilization, as indicated by the growth in expenditures exceeded growth in their utilization. Net expenditures per beneficiary were similar if a Part D plan sponsor used a PBM for rebate negotiations or if it conducted its own negotiations. Specifically, in 2016, median net expenditures per enrollee were similar for plan sponsors using a PBM and those that did not at $2,557 and $2,570, respectively. Rebates and other price concessions accounted for a median of 12 percent of gross Part D expenditures for plan sponsors using a PBM for their negotiations and a median of 10 percent for plan sponsors that did not. The majority—82 percent—of plan sponsors used a PBM to obtain rebates and other price concessions on their behalf. The plan sponsors that performed their own negotiations generally had higher enrollment than those that used a PBM—a median of approximately 47,000 beneficiaries, compared to approximately 13,000 beneficiaries (see table 3). See appendix IV for additional information on expenditures and rebates and other price concessions obtained for the 444 highest expenditure, highest utilization brand-name Part D drugs in 2016. The appendix also contains information on expenditures and rebates and other price concessions obtained by the Part D plan sponsors whose representatives we interviewed. In 2016, the highest expenditure, highest utilization brand-name drugs sold in retail pharmacies received discounts off of manufacturer list prices that were significantly higher than those sold in specialty pharmacies. Of the 444 highest expenditure, highest utilization brand-drugs in our analysis, 244 were sold in retail pharmacies. For this group, gross Part D prices—those paid to the pharmacy by the Part D plan sponsor, PBMs on the sponsor’s behalf, and the beneficiary—were 17 percent lower than manufacturer list prices for these drugs. When rebates and other price concessions were accounted for, net Part D prices were 41 percent lower than manufacturer list prices. In contrast, the 200 drugs sold in specialty pharmacies received fewer discounts off of manufacturer list prices. For these drugs, median gross and net prices were 15 percent and 16 percent, respectively, lower than manufacturer list prices (see fig. 3). As a result, drugs sold in retail pharmacies received median discounts (41 percent) that were 2.5 times larger than those sold in specialty pharmacies (16 percent). See appendix V for more information on prices for the highest expenditure, highest utilization brand-name drugs and for information on prices for selected generic drugs. Our review of 52 peer-reviewed studies indicates that utilization management services were associated with financial savings or improved beneficiary health indicators. However, the effects on ensuring that beneficiaries take their medication as prescribed (adherence) and access to clinically appropriate prescriptions were less clear. The studies examined the effects of 10 different types of utilization management services in three areas: (1) financial savings; (2) beneficiary health indicators; and (3) beneficiary medication adherence and access: Financial savings. Twenty-seven of the 36 studies we reviewed that examined financial savings found that utilization management services were associated with savings for the Medicare program, Part D plans, or beneficiaries. For example, all eight studies that examined the relationship between generic substitution and financial savings found savings. Of the 10 studies that did not find financial savings, five found no statistically significant impact of the utilization management service on savings, three found the utilization management service was associated with a decrease in savings, and two found both an increase and decrease in savings for different types of utilization management services. Beneficiary health indicators. Twelve of the 20 studies that examined beneficiary health indicators found that utilization management services were associated with improvement, such as a reduction in adverse drug events. Ten of the 12 studies that found improvement examined either medication therapy management programs or comprehensive medication reviews. The other two studies that found improvement looked at drug utilization reviews, which examine a beneficiary’s prescriptions to identify safety considerations, such as potential adverse interactions with other drugs and compliance with clinical guidelines. Of the eight studies that found no improvement, one found that a health indicator worsened, and four found improvement in at least one health indicator and a decline in at least one other indicator. Beneficiary medication adherence and access. Of the 15 studies that examined the effect of utilization management services on beneficiaries’ medication adherence or access to clinically appropriate drugs, 10 examined medication therapy management programs or comprehensive medication reviews. Seven of these 10 found improvement in medication adherence. In contrast, the other five studies that examined adherence and access found negative, mixed, or no effects associated with prior authorization and step therapy. For example, two studies examined the effect of prior authorization and step therapy and found that these utilization management services resulted in increased access problems. Two other studies examined the relationship of prior authorization and step therapy adherence and found a mixed impact. The remaining study examined the relationship of only prior authorization with the time needed to access medications and found no clinically significant impact. Stakeholders we interviewed generally agreed that utilization management services resulted in financial savings but differed in their views regarding the effect of utilization management services on beneficiaries’ medication adherence and access to clinically appropriate drugs. In interviews with representatives from PBMs, Part D plan sponsors, and a manufacturer trade association, these stakeholders generally agreed that utilization management services resulted in financial savings. While representatives from most Part D plan sponsors and PBMs told us that utilization management services have resulted in no adverse impact on medication adherence and access to prescriptions, representatives of the three drug manufacturers we interviewed told us that utilization management services limit medication adherence and access to medications by, for example, delaying therapy to needed drugs. See appendix VI for more information about the effects of utilization management services from the peer-reviewed studies we examined and the stakeholders we interviewed. See appendix VII for the articles included in our literature review. The Department of Health and Human Services provided technical comments on a draft copy of this report, which GAO incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees and the Secretary of Health and Human Services. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@dickenj@gao.gov.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VIII. This appendix provides details on our scope and methodology in addressing each of our five reporting objectives: (1) the extent to which Part D plan sponsors contract with pharmacy benefit managers (PBM) to deliver drug benefit management services to Medicare beneficiaries; (2) how PBMs earn revenue from the services they provide to Part D plan sponsors; (3) trends in rebates and other price concessions obtained by Part D plan sponsors and PBMs from manufacturers and others for Part D drugs; (4) the extent to which prices for Part D drugs are discounted off of manufacturer list prices; and (5) what is known about savings and other effects from utilization management services commonly used in Part D. In addition, the appendix describes the steps we took to assure the reliability of the data we analyzed. For all our objectives, we obtained the perspectives of stakeholders on Part D plan sponsors’ use of PBMs as well as information on sponsors’ efforts to control Part D expenditures and drug utilization. We spoke to representatives from 17 small, mid-sized, and large Part D plan sponsors: Aetna, Anthem, Banner Health, Cambia Health, Cigna, CVS, Express Scripts, Kaiser, Health Care Service Corp, Health Plan of San Mateo, Henry Ford Health System, Humana, Missouri Highways and Transportation Commission, Rite Aid, United Health Care, University of Pittsburgh Medical Center, and WellCare. We spoke with seven PBMs: Argus, CVS Caremark, EnvisionRx, Express Scripts, MedImpact, Prime Therapeutics, and OptumRx. To obtain other drug industry perspectives, we spoke with representatives from three drug manufacturers: Eli Lilly, Gilead, and Amgen. We also spoke with one entity that is both a wholesaler and pharmacy services administrative organization: AmerisourceBergen. Additionally, we spoke with other industry and advocacy organizations, including groups representing drug manufacturers, Part D plan sponsors, pharmacies, and PBMs: America’s Health Insurance Plans, Biotechnology Innovation Organization, Community Oncology Alliance, National Association of Chain Drug Stores, National Association of Specialty Pharmacies, National Community Pharmacists Association, Patients for Affordable Drugs, Pharmacy Benefit Management Institute, Pharmaceutical Care Management Association, and Pharmaceutical Research and Manufacturers of America. To determine the extent to which PBMs provided services to Part D plan sponsors, we analyzed the Centers for Medicare & Medicaid Services’ (CMS) Health Plan Management System (HPMS) data that identified the entity or entities responsible for performing each of 10 key drug benefit management services for plan sponsors’ Part D contracts in 2016, the most recent available expenditure and rebate and other price concession data at the time of our analysis. CMS provided HPMS data for the 624 Part D plan sponsor contracts that were effective in 2016. The data contained the entity or entities reported by each plan sponsor as performing each service. Using this information, we identified for each contract whether the plan sponsor performed a service itself; contracted with a PBM to perform the service; or performed the service in coordination with a PBM. For a given contract, we counted as being a PBM any entity that was not the plan sponsor that performed one or more drug benefit management services. We manually reviewed those PBMs against a list of PBM members from a PBM trade organization. We used internet searches to confirm the entity was not the plan sponsor in instances when it was not listed in the trade organization’s member directory. In doing so, we also identified whether the plan sponsor shared common ownership with the PBM responsible for providing the drug benefit management service. For example, there were instances where the plan sponsor and PBM were sister organizations owned by the same parent company. In this situation, we counted the PBM as a separate entity from the plan. In addition, we analyzed PBM use by plan sponsor contract enrollment size using CMS contract enrollment information from June 2016. Additionally, we used HPMS data to examine plan sponsor contracts’ variation in the number of PBMs used, the types of services that PBMs provided, and the use of PBMs by contract enrollment size. We also identified the PBMs that provided the most services and described the services they provided. Last, we interviewed Part D plan sponsor representatives to understand the considerations that influenced their decision about how and whether to use a PBM. To determine how PBMs earned revenue from services they provide to Part D plan sponsors, we relied on four information sources. First, we reviewed selected service agreements between PBMs and Part D plan sponsors. The service agreements generally contain detailed information on the services that the PBM will provide, how the plan sponsor will pay the PBM for those services, and the rates that pharmacies will be paid for Part D drugs. We asked CMS for a list of all service agreements it approved between January 2016 and May 2018 that were in effect as of June 2018. CMS provided us with a list of 119 service agreements. Using June 2018 Part D publicly available enrollment data from CMS, we obtained from CMS the 20 service agreements for Part D plans sponsors with the largest enrollment in June 2018. While most of the service agreements included sufficient information to determine how the PBMs were paid, some did not, and, where appropriate, we noted these instances in our findings. Second, we examined PBM revenue reported to CMS by Part D plan sponsors in their rebates and other price concession data—also referred to as direct and indirect remuneration (DIR)—for 2014, 2015, and 2016. These rebate and other price concession submissions contain information on the various sources of revenue and expenses incurred by PBMs and plan sponsors. Third, we reviewed applicable CMS regulations and guidance on the reporting of PBM and Part D plan sponsor revenue and expenses. Fourth, we interviewed PBM representatives about the extent to which PBMs retained rebates or passed them through to plan sponsors and, in some cases, the reasons for this decision. We also asked certain PBM representatives whether their revenue sources for Part D, specifically rebate retention and spread pricing, differed from PBMs’ and plan sponsors’ commercial business and, if so, the reasons for any differences. To examine rebates and other price concessions obtained by Part D plan sponsors and PBMs from manufacturers and others for Part D drugs, relative to overall Part D expenditures, we analyzed plan sponsors’ gross and net expenditures for Part D drugs for 2014 through 2016, the most recent data available at the time of our analysis. Gross expenditures reflect what was paid to the pharmacy by the plan sponsor, PBMs on the sponsor’s behalf, and the beneficiary for a given drug. Net expenditures reflect any rebates and other price concessions obtained by Part D plan sponsors and PBMs after a beneficiary receives a drug. To calculate gross expenditures, we used Medicare prescription drug event (PDE) data to calculate gross brand-name and generic drug expenditure and utilization information for all Part D plan sponsors’ contracts. We used Red Book, a compendium published by Truven Health Analytics, to determine whether drugs were brand-name or generic. We then identified individual brand-name and generic drugs by grouping expenditure claims with the same active ingredient, strength, dosage form, and route of administration (known as ISDR). We calculated brand- name and generic drug expenditures based on a drug’s ingredient cost, dispensing fees, sales tax, and applicable vaccine administration fees. We used PDE data to calculate gross expenditures for all Part D plan sponsors at both the contract and plan sponsor level. We used DIR data to determine the amount of rebates and other price concessions and subtracted this amount from this data to calculate net expenditures. We also obtained plan sponsor enrollment data using publicly available CMS data for June 2016, which allowed us to calculate gross per beneficiary expenditures. We also examined differences in the amount of rebate and other price concessions obtained relative to expenditures for Part D plan sponsors that used a PBM relative to those that did not. We determined PBM involvement in rebate and other price concession negotiations for individual plan sponsors using 2016 HPMS data. We specifically looked at each entity listed in HMPS as negotiating rebates and other price concessions with drug manufacturers and others. We were able to determine whether a PBM or plan sponsor performed this service for 197 plans sponsors. However, there were 20 Part D plan sponsors where a PBM or plan was not solely listed as performing the rebate and other price concession service. In these instances, we could not identify which entity negotiated rebates and other price concessions and therefore excluded them from this analysis. To obtain more information on drugs that have the greatest fiscal impact on the Part D program and beneficiaries, we calculated gross and net expenditures for the brand-name and generic drugs with the highest expenditures, highest utilization, and highest expenditure per utilization in 2016. For both brand-name and generic drugs, we identified the following: the 200 brand-name and 200 generic drugs with the highest expenditures in 2016; the 200 brand-name and generic drugs with the highest utilization in 2016 (based on number of 30-day prescriptions); and the 200 brand-name and generic drugs with the highest expenditures per utilization (i.e., highest expenditure per number of 30-day prescriptions). As a result of overlap in the groups of drugs, these criteria yielded two groups: the 444 highest expenditure, highest utilization brand-name drugs and the 476 unique highest expenditure, highest utilization generic drugs. These 920 drugs accounted for 81 percent of total Part D expenditures in 2016. We used drug-level rebate and other price concessions data to calculate net drug prices for these drugs by subtracting rebate and other price concessions for each drug from gross expenditures. To determine the extent to which Part D drug prices are discounted off of manufacturer list prices, we compared the median gross and net prices for the 444 brand-name and 476 generic highest expenditure, highest utilization drugs to (1) list prices established by manufacturers, and (2) the cost to pharmacies of acquiring these drugs. For list prices, we used 2016 average wholesale price (AWP) data from Truven Health Analytics’ Red Book. AWP is a common benchmark drug price used in the negotiation of payment rates between Part D plan sponsors and pharmacies. Because AWP is updated on an ongoing basis, we calculated a day-weighted per unit price that takes into account the number of days that the reported price was in effect in 2016. We then determined the median AWP price for each drug product based on the ISDR. We refer to the median price as the manufacturer list price. For pharmacy acquisition costs, which reflect the price pharmacies paid to obtain the drug, we used retail community pharmacy acquisition cost data from National Average Drug Acquisition Cost (NADAC) data. NADAC does not contain data from non-retail pharmacies, such as mail- order or specialty pharmacies. For our groups of 444 brand-name and 476 generic drugs, we separated drugs sold in retail community pharmacies from those sold in specialty pharmacies. If a drug did not have pharmacy acquisition cost data from NADAC, we considered that drug to be sold in specialty pharmacies and, thus, a specialty drug. We used 2016 PDE data to determine the gross per unit Part D price for a drug by dividing the gross expenditures for the drug by the total quantity dispensed of it. For example, a drug that had 1,000 units prescribed to Medicare beneficiaries and $5,000 in gross expenditures would have a gross per unit price of $5. We determined net per unit Part D prices for the drugs in our two study groups by dividing the amount of rebates and other price concessions for each drug by the quantity dispensed of it and then subtracting the amount of rebates and other price concessions per quantity from the gross Part D price for each drug. For each drug, we then determined the median pharmacy acquisition cost (if available), median gross Part D price, and median net Part D price as a proportion of median manufacturer list price by dividing each price by the median manufacturer list price. We then reported the median value for these pricing points for the highest expenditure, highest utilization drugs in our analysis. To determine what is known about the impact of utilization management services that PBMs commonly provide to Part D plan sponsors, or that plan sponsors may perform themselves, we conducted a literature search for studies that examined the effect of utilization management services in Part D (regardless of whether they were provided by a PBM or another entity) on the following outcomes: (1) financial costs or savings, (2) beneficiaries’ health indicators, and (3) beneficiaries’ access to clinically appropriate medications or taking their medications as prescribed (adherence). The literature search was performed from April 2018 to July 2018 using keyword searches in bibliographic databases, including ProQuest, EBSCO, and Scopus. We limited our search to studies published beginning in 2006—the year the Part D program began. For our searches, we developed a list of search terms for our literature review by reviewing relevant background documentation and several database searches. The search terms included: “utilization management,” “prior authorization,” “quantity limits,” “step therapy,” “generic substitution,” “drug utilization review,” “quantity edit,” “medication therapy management,” and “comprehensive medication review,” combined with “access,” “adherence,” “health benefit,” “clinical outcome,” “generic use,” “cost effectiveness,” “savings,” “costs,” and “Medicare.” The literature search generated 700 studies. We reviewed this list by examining the abstracts for those studies that addressed the effects of utilization management services in Part D and were published in peer- reviewed journals. We identified 48 studies that met our criteria then added four more that met the criteria from several literature reviews we examined, resulting in a final group of 52 peer-reviewed studies that we analyzed. We analyzed these studies to group them by type of utilization management service evaluated and type of outcome measured. We documented any methodological limitations of these studies but did not exclude any of them on this basis. See the bibliography in Appendix VII for a list of the 52 studies in our review. We also interviewed PBMs, plan sponsors, and drug manufacturers to obtain their views regarding the impact of utilization management services in Part D plans and asked them to recommend additional studies on utilization management services. We did not assess the methodology or data reliability of the studies provided to us by these drug supply chain stakeholders; none of them met our criterion of being published in peer- reviewed journals. We used these studies to better understand stakeholder perspectives. To ensure the data used to produce this report were sufficiently reliable, we took several steps. We performed data reliability checks on the HPMS data by reviewing the data for missing values and errors, checking the information against other publicly available sources, and interviewing knowledgeable agency officials. We performed data reliability checks on the PDE and DIR data by reviewing relevant documentation, checking the data for outliers and errors, and interviewing knowledgeable agency officials. We performed data reliability checks of the AWP and NADAC data sets by testing the data for missing data and outliers and reviewing relevant documentation. After taking these steps, we determined the data were sufficiently reliable for the purposes of our reporting objectives. We conducted this performance audit from May 2017 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings based on our audit objectives. Appendix II: Medicare Part D Plan Sponsors’ Use of Pharmacy Benefit Managers (PBM) This appendix provides additional detail on the use of PBMs by Part D plan sponsors to provide prescription drug benefit management services to Medicare beneficiaries. We examined Centers for Medicare & Medicaid Services’ (CMS) data to identify the 10 key drug benefit management services provided by PBMs under 624 Part D plan sponsor contracts in 2016, the most recent available expenditure and rebate and other price concession data at the time of our analysis, and found the following variation in plan sponsor use of PBMs: Services provided by PBMs. Part D plan sponsors’ contracts varied by the services provided by PBMs in 2016. Plan sponsors’ use of a PBM for drug benefit services—either alone or with the plan sponsor—for their 624 contracts varied from 30 percent for enrollee appeals and grievance process-management to 99 percent for claims adjudication. For seven of the 10 drug benefit management services, PBMs—either alone or in conjunction with the plan sponsor—provided services to more than half the sponsor contracts (see fig. 4). Number of PBMs used. Part D plan sponsor contracts varied in the number of PBMs used to provide one or more of the 10 drug benefit management services. For example, 54 percent of plan sponsors’ contracts used a single PBM, while 11 percent used four or more PBMs (see fig. 5). Use of PBMs by enrollment. Smaller Part D contracts—those with contract enrollment below the median enrollment of all Part D contracts—used a PBM more often than larger contracts—those with enrollment at or above the median. For instance, 87 percent of smaller Part D plan sponsor contracts used a PBM alone or with the plan sponsor for rebate and price concession negotiations, compared to 77 percent of larger contracts. Similarly, 54 percent of smaller Part D contracts used a PBM alone or with a plan for a pharmacy and therapeutics committee, compared to 35 percent of larger contracts. Use of financially related PBMs. Part D plan sponsors’ contracts varied by their use of PBMs with which they were related by common ownership—either as a subsidiary or a sister company. In 2016, plan sponsors used a PBM with which they were related by common ownership for 17 percent of the 624 Part D plan sponsors contracts. Larger contracts—those with enrollment at or above the median— were more likely to use a PBM related by common ownership than smaller contracts. Larger contracts used a financially related PBM for 24 percent of drug benefit management services, compared to 10 percent of drug benefit management services provided to smaller contracts. The Part D plan sponsor representatives with whom we spoke noted several considerations that influenced their decision about how and whether to use a PBM. One plan sponsor noted that small plans may lack the resources to conduct their own rebate negotiations and, therefore, may use a PBM instead. Three other plan sponsors noted they switched from conducting their own rebate negotiation with manufacturers to using a PBM. Two plan sponsors said this switch was due to PBMs’ ability to obtain larger rebates than the plan sponsor could, and the third determined a PBM would help it achieve the best value and quality, while meeting Part D’s regulatory requirements. In contrast, representatives of three other Part D plan sponsors noted advantages of performing drug benefit management services themselves. For example, one plan sponsor noted that it performs almost all drug benefit management services internally, as it believes doing so improves quality through better communication and care coordination with pharmacies. Another plan sponsor noted the decision not to contract out certain services to a PBM may be influenced by a desire for more customization over formulary management and greater control over prior authorization. Representatives of one plan sponsor noted that their plan does not use a PBM because they believe they are more effective in developing formularies with better utilization management and greater use of generic drugs than are PBMs. Our analysis of CMS data for the 624 Part D plan sponsor contracts found that the five PBMs that provided the largest number of services to Part D plan sponsors’ contracts in 2016 also generally provided a full range of PBM services to them. Four of the top five PBMs provided all 10 drug benefit management services to plan sponsors’ contracts while the fifth PBM conducted claims adjudication but used an intermediary to conduct rebate negotiations. (See table 4). Furthermore, the top five PBMs provided a high proportion of the services that Part D plan sponsors most commonly used a PBM to provide. For example, CVS Caremark provided claims adjudication to 144 (23 percent) of Part D plan sponsor contracts, and OptumRx provided this service to 138 (22 percent). In contrast, we found that Part D plan sponsors used a large number of PBMs to provide a limited range of drug benefit management services. For example, 48 percent of PBMs provided only one type of drug benefit management service to plan sponsors’ contracts, and 22 percent of PBMs provided only one service to only one plan sponsor contract. For instance, there were 10 unique entities counted as PBMs in our analysis that provided only customer service support to one plan sponsor contract. One PBM representative noted in an interview that it is relatively common for plan sponsors and PBMs to contract with other vendors to provide additional assistance with drug benefit management services. One plan sponsor told us, for example, that its PBM uses a vendor to manage customer service calls. This appendix provides additional detail on (1) non-rebate revenue that PBMs may earn for services provided to manufacturers and Medicare Part D plan sponsors, and (2) PBM perspectives on Centers for Medicare & Medicaid Services (CMS) policies relating to spread pricing in Part D. PBMs and Part D plan sponsors may earn non-rebate revenue from manufacturers for providing certain services. Even though this money is reported to CMS as part of the rebate and other price concession submission, not all of it is considered rebates or other price concessions, which will lower plan liability in determining bids and thereby lower premiums. Of the $516.5 million in non-rebate revenue paid by manufacturers in 2016, $440 million, or about 85 percent, represented the amount paid for the services that exceeded the fair market value of the service and is considered rebates and other price concessions. These may be used to reduce the drug costs incurred by the plan sponsor. Therefore, this revenue factors into bid determinations and may be used to reduce premiums. The remaining $78.6 million in payments from manufacturers were considered “bona fide service fees”—fees paid by manufacturers to Part D plan sponsors and PBMs for services that the manufacturer would otherwise perform, or contract for, and that represented the fair market value of those services. Such fees do not reduce the plan sponsor’s drug costs and, therefore, could not factor into reducing premiums. The determination of a bona fide service fee as reported to CMS is made by the drug manufacturer and the Part D plan sponsor and is not routinely evaluated by CMS, agency officials told us. However, CMS requires that the PBM and manufacturer have information documenting the fair market value of the service. CMS requires Part D plan sponsors to report revenue earned from rebates retained by the PBM. This revenue increases the plan’s liability, which increases the amount of plan bids and, therefore, result in higher premiums. In contrast, rebate revenue passed through by PBMs to Part D plan sponsors lowers the plan’s liability, reduces plans bids, and, therefore, lowers beneficiary premiums. Some PBMs earn more revenue from spread pricing in their commercial business than in Part D, officials from three PBMs told us. Officials from two of these PBMs noted that CMS requirements create a disincentive to engage in spread pricing that is not present in the commercial sector. Beginning in 2010, CMS required that plan sponsors base the amount of beneficiary cost-sharing on the amount received by the pharmacy for a drug—known as the “pass-through price.” CMS also required that an estimate of rebates or other price concessions be included in the administrative costs submitted by the plan sponsor for bid determinations. Part D plan sponsors can still agree to pay the PBM based on the higher price of the drug without accounting for rebates, known as the lock-in price. However, the difference between that amount and the pass-through price would increase the bid determination and ultimately increase the premiums that plans charge beneficiaries. Because there are no similar requirements pertaining to the commercial prescription drug benefit market, spread pricing is more common there, CMS officials told us. This appendix provides information on (1) pharmacy-related price concessions for all Medicare Part D drugs and (2) expenditure and rebate and other price concession information for the 444 highest expenditure, highest utilization brand-name Part D drugs in 2016. The appendix also contains additional information on expenditures and rebates and other price concessions obtained by the 16 Part D plan sponsors whose representatives we interviewed. The amount of pharmacy-related price concessions obtained by Part D plan sponsors, or pharmacy benefit managers (PBM) on plan sponsors’ behalf, increased 295 percent from 2014 through 2016, from $538 million to $2.1 billion (see fig. 6). These monies account for any adjustments to the price of the drug paid to the pharmacy after the point sale, such as a pharmacy returning money that was overpaid by the plan sponsor or vice versa. It can also include monies paid based on pharmacies’ performance in meeting agreed-upon performance metrics—for example, fees a pharmacy pay plan sponsors, or bonuses pharmacies receive from plan sponsors, based on their performance. In 2016, Part D plan sponsors received $2.3 billion from pharmacies and paid out $211 million, for a net of $2.1 billion in pharmacy-related price concessions. Five of the seven PBMs and seven of the 12 Part D plan sponsors whose representatives we interviewed said they have performance-based arrangements with pharmacies. One plan sponsor noted that its performance agreement involves paying bonuses to pharmacies that exceed performance measures, while charging fees to pharmacies that did not meet the measures. The sponsor said this is part of an attempt to move from paying for volume to paying for value. Another plan sponsor told us there has been an improvement in pharmacy performance as a result of the program. Representatives from pharmacy industry groups said these pharmacy- related fees have put increasing pressure on pharmacies. For example, one group noted there is no standardization across measures with each plan sponsor using its own measures, and it is difficult for pharmacies to tie a fee to a specific pharmacy location or claim. Another group noted that fees may be imposed on pharmacies for performance measures not directly applicable to the pharmacy. For example, the group said specialty pharmacies have been assessed fees for beneficiary lack of adherence to maintenance medications, such as blood pressure medications, that these pharmacies do not commonly provide. PBMs and Part D plan sponsors obtained rebates and other price concessions for 441 (99 percent) of the 444 highest-expenditure, highest- utilization brand-name drugs in 2016. The amount of rebates and other price concessions for each drug ranged from $1,300 to $1.8 billion in 2016, with a median of $3.3 million. Rebates accounted for $24.5 billion of the $26 billion in rebates and other price concessions (94 percent) obtained by plan sponsors and PBMs for these 444 drugs. As a proportion of gross Part D expenditures—the amount paid by plan sponsors, or the PBM on the sponsors’ behalf, and by beneficiaries—for the 444 drugs ranged from -0.5 percent to 70.5 percent. (See fig. 7.) Expenditures and rebates and other price concessions varied by therapeutic class for the 444 highest expenditure, highest utilization drugs in 2016. Among those with 10 or more drugs in their class, gross expenditures ranged from $2.9 billion to $21.2 billion, and rebates and other price concessions ranged from $170 million to $8.7 billion (see table 5). Four classes—endocrine metabolic agents, anti-infective agents, respiratory agents, and central nervous system agents—accounted for 54 percent of the gross Part D expenditures, and 62 percent of rebates and other price concessions for the 444 highest expenditure, highest utilization drugs. When accounting for rebates and other price concessions, these drugs accounted for 51 percent of net Part D expenditures. Rebates and other price concessions as a proportion of gross expenditures varied from 4 percent to 27 percent in 2016 for the 17 Part D plan sponsors whose representatives we interviewed. Gross Part D expenditures per beneficiary ranged from $1,772 to $5,583, and net Part D expenditures per beneficiary ranged from $1,687 to $4,837 (see table 6). This appendix contains additional information on the gross and net discounts for the highest expenditure, highest utilization brand-name and generic Medicare Part D drugs in 2016. The amount of discounts in 2016 for the 444 highest expenditure, highest utilization brand-name drugs varied by whether they were sold in retail or specialty pharmacies. Discounts also varied by whether the brand-name drugs were highest expenditure, highest utilization or highest expenditure per utilization drugs. Of the 444 highest expenditure, highest utilization brand-name drugs, 244 were sold in retail pharmacies and 200 were sold in specialty pharmacies. Brand-name retail drugs. The three groups of drugs all had pharmacy acquisition costs that were 81 percent of manufacturer list prices and gross Part D prices that were between 83 and 84 percent of manufacturer list prices in 2016. However, the net prices varied, ranging from 55 percent of manufacturer list price for the highest utilization drugs to 77 percent for the highest expenditure per utilization drugs (see table 7). Brand-name specialty drugs. The 38 highest expenditure drugs and 187 highest expenditure per utilization drugs sold in specialty pharmacies had median gross prices that were between 84 and 85 percent of manufacturer list price and net prices that were 84 percent of manufacturer list price in 2016. We also found variation in brand-name prices across therapeutic classes for the 244 highest expenditure, highest utilization Part D drugs sold in retail pharmacies. In 2016, median gross Part D prices for the brand- name drugs sold in retail pharmacies were similar across the nine therapeutic classes we analyzed, ranging from 81 percent to 84 percent of the manufacturer list price. However, there was a much wider range among median net prices, from 43 percent to 83 percent of manufacturer list price. Anti-infective agents had the lowest percentage point changes in their prices from gross to net (1 percentage point), while endocrine metabolic agents, cardiovascular agents, respiratory agents, ophthalmologic agents, and genitourinary agents had the largest changes, with declines from gross to net of greater than 30 or more percentage points (see table 8). In contrast, there was little variation in both median gross and net prices across all therapeutic classes for brand-name drugs sold in specialty pharmacies. The range in median gross prices as a proportion of manufacturer list prices across the six therapeutic classes was 83 percent to 86 percent, and the range in median net prices as a proportion of manufacturer list prices was 80 percent to 84 percent. In 2016, discounts off of the manufacturer list price varied by whether the generic drug was sold in retail pharmacies or in specialty pharmacies. Of the 476 highest expenditure, highest utilization generic drugs in our analysis, the 367 sold in retail pharmacies had a median gross and net Part D price that were 66 percentage points lower than the manufacturer list price, and 13 percentage points higher than the pharmacy’s cost of acquiring the drugs. The 109 generic drugs sold in specialty pharmacies received far fewer discounts off of manufacturer list price than drugs sold in retail pharmacies. Median gross and net prices for those drugs sold in specialty pharmacies were both 26 percentage points lower than manufacturer list prices (see fig. 8). Therefore, generic drugs sold in retail pharmacies received median discounts (66 percent below manufacturer list prices) that were 2.5 times larger than those generic drugs sold in specialty pharmacies (26 percent below manufacturer list prices). We also found pricing variation by whether the generic drugs were in the 200 highest expenditure, 200 highest utilization group, or the 200 highest expenditures per utilization group. Generic retail drugs. Of the 367 generic drugs sold in retail pharmacies, 200 were in the group of the 200 highest utilization generic drugs, 198 were in the group of the 200 highest expenditure generic drugs, and 91 were in the group of the 200 generic drugs with the highest expenditure per utilization. We found that the gross Part D price for the highest utilization drugs was 14 percent of the manufacturer list price, while the gross price for the highest expenditure drugs was 34 percent of the manufacturer list price. However, the Part D gross price for the highest expenditure per utilization drugs was 63 percent of the manufacturer list price. The difference in gross and net Part D price as a percentage of manufacturer list price was one percentage point or less for all three groups of drugs (see table 9). Generic specialty drugs. Of the 109 generic drugs sold in specialty pharmacies, none was in the group of the 200 highest utilization generic drugs, two were in the group of the 200 highest expenditure generic drugs, and all 109 were in the group of the 200 highest expenditure per utilization generic drugs. The gross Part D price for the highest expenditure per utilization drugs sold in specialty pharmacies was 74 percent of the manufacturer list price, and these drugs received no additional rebates and other price concessions. There was variation in generic drug pricing across the eight therapeutic classes for generic drugs sold in retail pharmacies. Median gross Part D prices for generic retail drugs ranged from 14 percent of manufacturer list prices for cardiovascular agents to 56 percent of manufacturer list prices for dermatological agents (see table 10). However, there was little difference between in median gross and net Part D prices as a percentage of manufacturer list price for generic retail drugs in any therapeutic class, with the percentage difference ranging from 0 percent to 2 percent. There was little variation in median gross and net prices across the therapeutic classes for generic drugs sold in specialty pharmacies. The range in median gross prices as a percentage of manufacturer list prices was 73 to 75 percent (see table 11). There was little difference between median gross and Part D net prices as a percentage of manufacturer list price, with the percentage difference between median gross and net prices 1 percent or less for all classes. This appendix contains additional details on our review of 52 peer- reviewed studies on the effects of utilization management services on (1) financial savings, (2) beneficiary health indicators, and (3) beneficiary medication adherence and access, as well as stakeholders’ views on these effects. Of the 36 studies that examined the effect of utilization management services on financial savings, 18 examined medication therapy management programs and eight examined generic substitution. The two groups of studies found the following: Medication therapy management programs or comprehensive medical reviews. Thirteen of the 18 studies that examined the relationship between a medication therapy management program or comprehensive medical review and financial savings found an increase in savings. For example, one study found that a medication therapy management program conducted by telephone decreased beneficiary drug costs by $682 per beneficiary for participants, compared to an increase of $119 for those not in the program. Generic and therapeutic substitution and generic dispensing rate. Of the 8 studies that examined the relationship between generic and therapeutic substitution and financial savings, all found an increase in savings. For example, a 2013 study examined the potential financial savings to beneficiaries and Part D plan sponsors of generic and therapeutic substitution of commonly prescribed drugs. The study estimated that in 2007, generic and therapeutic substitutions could have resulted in an average annual savings of $127 and $389 per person, respectively. Additionally, eight of these 36 studies examined the generic dispensing rate, and all eight found that utilization management led to an increase in the rate. The generic dispensing rate—the percent of prescriptions dispensed with a generic drug instead of a brand-name drug—represents a source of financial savings through a reduction in the use of brand- name drugs, which are generally more expensive than generics. For example, a 2017 study analyzed 2012 Part D data to examine the impact of prior authorization and step therapy on generic use among low-income subsidy beneficiaries. This study found that those randomly assigned to a plan using both prior authorization and step therapy had an increased generic dispensing rate of 3 to 15 percentage points for all three classes of drugs examined. Twelve of the 20 studies that examined beneficiary health indicators found that utilization management services were associated with improved indicators, while the other eight found a mixed impact, no impact, or a decline. Examples of studies that looked at the association of utilization management services with beneficiary health indicators include: A study analyzing data from three Part D plan sponsors, which found there was a nearly 50 percent reduction in the use of potentially harmful drugs by beneficiaries 6 months after the implementation of a retrospective drug utilization review program. A randomized trial of medication therapy management for Part D beneficiaries found a nearly 60 percent reduction in beneficiaries’ drug therapy problems over time among two groups after the medication therapy management intervention. Fifteen studies examined the effect of utilization management services on beneficiary medication adherence and access. Seven of the 10 studies that examined the effect of either medication therapy management programs or comprehensive medication reviews on beneficiaries’ medication adherence (taking medication as prescribed) found improvement. For example, a 2016 study used data from Part D and the U.S. Renal Data System to examine the relationship of medication therapy management eligibility with immunosuppressant drug adherence 12 months after beneficiaries received a kidney transplant. The study found that medication therapy management-eligible transplant recipients were 14 percent more likely to have improved adherence than transplant recipients who were not eligible. The other three studies that examined medication therapy management programs or comprehensive medication reviews found no statistically significant impact on adherence. The effect of two other utilization management services—prior authorization and step therapy—on beneficiary medication adherence and access (the ability to obtain clinically indicated prescriptions) is unclear, according to the studies we reviewed. The two studies that examined the relationship of prior authorization and step therapy with adherence both found a mixed impact. For example, one study examined the impact of a health plan requiring either prior authorization or step therapy on medication use among dual-eligible nursing home residents. The study found that some residents whose new plan required prior authorization or step therapy for their current medication were more likely to have gaps in medication use than those without for two of six classes of drugs in 2006, but no gaps for any of the classes for in 2007 and 2008. The two studies that examined the relationship of prior authorization and step therapy with access found an increase in medication access problems, but they did not focus exclusively on the Medicare population. For example, one study used 2006 data from a random sample of psychiatrists surveyed about their patients to examine the relationship of prior authorization and step therapy with medication access problems among dual-eligible psychiatric patients. The study found that patients in plans with prior authorization and step therapy requirements were 2.8 and 1.8 times more likely, respectively, to have experienced medication access problems than patients in plans without these requirements. This study examined the transition of dual-eligible beneficiaries from Medicaid drug coverage to Medicare Part D when the program began in 2006, so the results may not be generalizable to the entire Medicare population at present. Most representatives of pharmacy benefit managers (PBM), Part D plan sponsors, and a manufacturer trade association we interviewed generally agreed that utilization management services resulted in financial savings by requiring the use of generic drugs. Representatives of 10 of 14 plan sponsors and six of eight PBMs we interviewed stated that utilization management services generally resulted in financial savings. Representatives of one Part D plan sponsor stated that its utilization management services resulted in annual savings of approximately 3 percent. However, representatives of one Part D plan sponsor and one PBM noted that not all utilization management services result in savings. For example, they noted that improving care with medication therapy management programs may increase drug costs through increased utilization. Additionally, representatives of one Part D plan sponsor noted the savings from utilization management services in commercial plans may be greater than in Part D because the use of manufacturers’ copay coupons are prohibited in federal health care programs, including Part D. While the coupons reduce or eliminate beneficiaries’ out-of-pocket co-payments for certain brand-name drugs, thereby encouraging their use, the coupons do not affect the amount that the plans pay for drugs. Therefore, to the extent that beneficiaries in their commercial plans use coupons, Part D plan sponsors have a greater incentive to employ utilization management services in these plans to reduce the use of more expensive brand-name drugs. Representatives of Part D plan sponsors and PBMs we interviewed differed with manufacturers and, in some cases, with each other on the effects of utilization management services on various non-financial aspects of drug utilization: Beneficiary health. Representatives from all three manufacturers we interviewed stated that utilization management services negatively affected beneficiary health by reducing their access to necessary medications. In contrast, seven of the 11 Part D plan sponsors and four of the five PBMs that discussed the effect of utilization management services on beneficiary health stated that utilization management services generally resulted in improved beneficiary health. Representatives of certain PBMs and one Part D plan sponsor provided us examples of the ways utilization management services have improved their beneficiaries’ health, such as through opioid quantity limits. One Part D plan sponsor noted that point-of-sale utilization management services warn pharmacies of therapeutic duplications, toxicities across multiple prescriptions, or interactions of certain drugs with health conditions. Medication access. Representatives from all three drug manufacturers noted that utilization management services impose limits on beneficiaries’ access to drugs, while seven of nine Part D plan sponsors and three of the four PBMs who discussed this stated utilization management services had no significant restrictions on beneficiaries’ access to necessary medications. Representatives from one plan sponsor noted there are appeals processes to ensure beneficiaries’ access is not adversely impacted by utilization management services. Medication adherence. Representatives from all three manufacturers told us that utilization management services limit beneficiaries’ adherence to their medications, such as by causing delays in therapy, while seven of eight Part D plan sponsors and all four PBMs who discussed this stated utilization management services had no adverse impact on beneficiaries’ adherence to their medications. Representatives from one plan sponsor and two PBMs stated that utilization management services may have a positive impact on adherence, such as by lowering copays through generic substitution. Medicare protected classes and utilization management. Representatives from Part D plan sponsors, PBMs, and manufacturers differed in their views on the effect of Part D utilization management services restrictions on protected class drugs on beneficiary health. Representatives of two PBMs told us the effect was positive, as beneficiaries who use these drugs do not experience disruptions in therapy. Representatives of two other PBMs said there was no effect, and one said there was a negative effect—as plan sponsors were required to cover certain less effective drugs. Representatives of one PBM said that, for example, patients in commercial health plans do not have any problems accessing protected class drugs that are subject to utilization management. These representatives noted that the Centers for Medicare & Medicaid Services provides for adequate access. However, one manufacturer told us that utilization management services for HIV drugs are rightly restricted in Part D, as these services may cause disruptions in therapy, which can lead to drug resistance and poorer health outcomes. Representatives of five Part D plan sponsors said Medicare’s restrictions on the use of utilization management services for protected class drugs have had a negative impact on beneficiary health because, for example, they limit plans’ ability to ensure that a prescribed drug is appropriate, such as ensuring that a cancer drug is appropriate for a beneficiary’s weight. Another plan sponsor representative told us the restrictions may have a positive impact by reducing increases in medical costs, while another plan sponsor said the restrictions have had no impact. Abbass, I. M., E. O. Caplan, D. B. Ng, R. Kristy, C. R. Schermer, P. Bradt, J. M. Collins, W. Man, M. Chan, and B. T. Suehs. “Impact of Overactive Bladder Step Therapy Policies on Medication Utilization and Expenditures among Treated Medicare Members.” Journal of Managed Care & Specialty Pharmacy, vol. 23, no. 1 (2017): 27-37. Agarwal, A., R. A. Freedman, F. Goicuria, C. Rhinehart, K. Murphy, E. Kelly, E. Mullaney, M. St. Amand, P. Nguyen, and N. U. Lin. “Prior Authorization for Medications in a Breast Oncology Practice: Navigation of a Complex Process.” Journal of Oncology Practice, vol. 13, no. 4 (2017): e273-e282. Almodovar, A. S., D. R. Axon, A. M. Coleman, T. Warholak, and M. C. Nahata. “The Effect of Plan Type and Comprehensive Medication Reviews on High-Risk Medication Use.” Journal of Managed Care & Specialty Pharmacy, vol. 24, no. 5 (2018): 416-422. Alston, G., and C. Hanrahan. “Can a Pharmacist Reduce Annual Costs for Medicare Part D Enrollees?” The Consultant Pharmacist, vol. 26, no. 3 (2011): 182-189. Ben-Joseph, R., C.C. Chen, A. P. De, R.L. Wade, and D. Shah. “Consequences of Patient Access Restrictions to Branded Oxycodone Hydrochloride Extended-Release Tablets on Healthcare Utilization and Costs in US Health Plans.” Journal of Medical Economics, vol. 17, no. 10 (2014): 708-718. Bergeson, J. G., K. Worley, A. Louder, M. Ward, and J. Graham. “Retrospective Database Analysis of the Impact of Prior Authorization for Type 2 Diabetes Medications on Health Care Costs in a Medicare Advantage Prescription Drug Plan Population.” Journal of Managed Care Pharmacy, vol. 19, no. 5 (2013): 374-384. Bloudek, L. M., D. Makenbaeva, and M. Eaddy. “Anticipated Impact of Generic Imatinib Market Entry on the Costs of Tyrosine Kinase Inhibitors.” American Health & Drug Benefits, vol. 8, no. 9 (2015): 472-480. Branham, A., J. Moose, and S. Ferrari. “Retrospective Analysis of Medication Adherence and Cost Following Medication Therapy Management.” Innovation in Pharmacy, vol. 1, no. 1 (2010): 1-8. Branham, A. R., A. J. Katz, J. S. Moose, S. P. Ferreri, J. F. Farley, and M. W. Marciniak. “Retrospective Analysis of Estimated Cost Avoidance Following Pharmacist-Provided Medication Therapy Management Services.” Journal of Pharmacy Practice, vol. 26, no. 4 (2013): 420-427. Buhl, A., J. Augustine, A. M. Taylor, R. Martin, and T. L. Warholak. “Positive Medication Changes Resulting from Comprehensive and Noncomprehensive Medication Reviews in a Medicare Part D Population.” Journal of Managed Care & Specialty Pharmacy, vol. 23, no. 3 (2017): 388-394. Caffiero, N., T. Delate, M. D. Ehizuelen, and K. Vogel. “Effectiveness of a Clinical Pharmacist Medication Therapy Management Program in Discontinuation of Drugs to Avoid in the Elderly.” Journal of Managed Care & Specialty Pharmacy, vol. 23, no. 5 (2017): 525-531. Caplan, E. O., M. C. Guy, J. Chang, and K. Boesen. “Telephone-Based Cardiovascular Medication Therapy Management in Medicare Part D Enrollees with Diabetes.” The American Journal of Pharmacy Benefits, vol. 9, no. 2 (2017): 47-54. Chinthammit, C., E. P. Armstrong, K. Boesen, R. Martin, A. M. Taylor, and T. Warholak. “Cost-Effectiveness of Comprehensive Medication Reviews Versus Noncomprehensive Medication Review Interventions and Subsequent Successful Medication Changes in a Medicare Part D Population.” Journal of Managed Care & Specialty Pharmacy, vol. 21, no. 5 (2015): 381-389. Chisholm-Burns, M. A., C. A. Spivey, E. A. Tolley, and E. K. Kaplan. “Medication Therapy Management and Adherence among US Renal Transplant Recipients.” Patient Preference and Adherence, vol.10 (2016): 703-709. Corsi, K., V. Lemay, K. K. Orr, and L. Cohen. “Pharmacist Medication Therapy Management in Home Health Care: Investigation of a Sustainable Practice Model.” Journal of the American Pharmacists Association, vol. 58, no. 4S (2018): S64-S68. Dai, R. and J. Robst. “The Relationship between Plan Characteristics and Medicare Prescription Drug Plan Bids.” Applied Economics Letters, vol. 19, no. 1 (2012): 99-104. De Lott, L. B., J. F. Burke, K. A. Kerber, L. E. Skolarus, and B. C. Callaghan. “Medicare Part D Payments for Neurologist-Prescribed Drugs.” Neurology, vol. 86, no. 16 (2016): 1491-1498. Dodson, S. E., J. F. Ruisinger, P. A. Howard, S. E. Hare, and B. J. Barnes. “Community Pharmacy-Based Medication Therapy Management Services: Financial Impact for Patients.” Pharmacy Practice, vol. 10, no. 3 (2012): 119-124. Duru, O. K., S. L. Ettner, N. Turk, C. M. Mangione, A. F. Brown, J. Fu, L. Simien, and C.W. Tseng. “Potential Savings Associated with Drug Substitution in Medicare Part D: The Translating Research Into Action for Diabetes (TRIAD) Study.” Journal of General Internal Medicine, vol. 29, no. 1 (2014): 230-236. Egilman, A. C., J. D. Wallach, J. S. Ross, and S. S. Dhruva. “Medicare Spending and Potential Savings on Brand-Name Drugs with Available Generic Substitutes Excluded by 2 Large Pharmacy Benefit Managers, 2012 through 2015.” JAMA Internal Medicine, vol. 178, no. 4 (2018): 567- 569. Fox, D., L. D. Ried, G. E. Klein, W. Myers, and K. Foli. “A Medication Therapy Management Program’s Impact on Low-Density Lipoprotein Cholesterol Goal Attainment in Medicare Part D Patients with Diabetes.” Journal of the American Pharmacists Association, vol. 49, no. 2 (2009): 192-199. Gellad, W. F., J. M. Donohue, X. Zhao, M. K. Mor, C. T. Thorpe, J. Smith, C. B. Good, M. J. Fine, and N. E. Morden. “Brand-Name Prescription Drug Use among Veterans Affairs and Medicare Part D Patients with Diabetes: A National Cohort Comparison.” Annals of Internal Medicine, vol. 159, no. 2 (2013): 105-114. Gernant, S. A., M. E. Snyder, H. Jaynes, J. M. Sutherland, and A. J. Zillich. “The Effectiveness of Pharmacist-Provided Telephonic Medication Therapy Management on Emergency Department Utilization in Home Health Patients.” Journal of Pharmacy Technology, vol. 32, no. 5 (2016): 179-184. Gold, J. A., B. French, and L. C. Vermeulen. “Reduction of Use of Potentially Inappropriate Medications in the Elderly.” Wisconsin Medical Journal, vol. 107, no. 4 (2008): 213-214. Hoadley, J. F., K. Merrell, E. Hargrave, and L. Summer. “In Medicare Part D Plans, Low or Zero Copays and Other Features to Encourage the Use of Generic Statins Work, Could Save Billions.” Health Affairs, vol. 31, no. 10 (2012): 2266-75. Hui, R. L., B. D. Yamada, M. M. Spence, E. W. Jeong, and J. Chan. “Impact of a Medicare MTM Program: Evaluating Clinical and Economic Outcomes.” The American Journal of Managed Care, vol. 20, no. 2 (2014): e43-e51. Huskamp, H. A., D. G. Stevenson, A. J. O’Malley, S. B. Dusetzina, S. L. Mitchell, B. J. Zarowitz, M. E. Chernew, and J. P. Newhouse. “Medicare Part D Plan Generosity and Medication Use among Dual-Eligible Nursing Home Residents.” Medical Care, vol. 51, no. 10 (2013): 894-900. Moczygemba, L. R., J. C. Barner, J. C. Brannier, and E. R. Gabrillo. “Outcomes of a Medicare Part D Telephone Medication Therapy Management Program.” Journal of the American Pharmacists Association, vol. 52, no. 6 (2012): e144-e152. Moczygemba, L. R., J. C. Barner, K. A. Lawson, C. M. Brown, E. R. Gabrillo, P. Godley, and M. Johnsrud. “Impact of Telephone Medication Therapy Management on Medication and Health-Related Problems, Medication Adherence, and Medicare Part D Drug Costs: A 6-Month Follow Up.” The American Journal of Geriatric Pharmacotherapy, vol. 9, no. 5 (2011): 328-338. Moore, J. M., D. Shartle, L. Faudskar, O.S. Matlin, and T.A. Brennan. Impact of a Patient-Centered Pharmacy Program and Intervention in a High-Risk Group. Journal of Managed Care Pharmacy, vol. 19, no. 3 (2013): 228-236. Newman-Casey, P. A., M. A. Woodward, L. M. Niziol, P. P. Lee, and L. B. De Lott. “Brand Medications and Medicare Part D: How Eye Care Providers’ Prescribing Patterns Influence Costs.” Ophthalmology, vol. 125, no. 3 (2018): 332-339. Null, K. D., K. Moll, A. Sadosky, M. K. Pasquale, J. C. Cappelleri, and B. Parsons. “Trends Associated with Implementing and Lifting a Pregabalin Step Therapy Policy.” American Journal of Pharmacy Benefits, vol. 8, no. 2 (2016): e17-e24. Olvey, E. L., M. C. Guy, J. Chang, and G. H. Skrepnek. “Cost- Effectiveness of Medication Therapy Management in Part D Diabetic Enrollees.” American Journal of Pharmacy Benefits, vol. 6, no. 5 (2014): e147-e156. Pai, A.B., A. Boyd, J. Depczynski, I.M. Chavez, N. Khan, and H. Manley. Reduced Drug Use and Hospitalization Rates in Patients Undergoing Hemodialysis Who Received Pharmaceutical Care: A 2-Year, Randomized, Controlled Study. Pharmacotherapy, vol. 29, no. 12 (2009): 1433-1440. Patel, R. A., M. P. Walberg, E. Tong, F. Tan, A. E. Rummel, J. A. Woelfel, S. M. Carr-Lopez, and S. M. Galal. “Cost Variability of Suggested Generic Treatment Alternatives under the Medicare Part D Benefit.” Journal of Managed Care Pharmacy, vol. 20, no. 3 (2014): 283-290. Pindolia, V. K., L. Stebelsky, T. M. Romain, L. Luoma, S. N. Nowak, and F. Gillanders. “Mitigation of Medication Mishaps via Medication Therapy Management.” The Annals of Pharmacotherapy, vol. 43, no. 4 (2009): 611-620. Shen, X., B. C. Stuart, C. A. Powers, S. E. Tom, L. S. Magder, and E. M. Perfetto. “Impact of Formulary Restrictions on Medication Use and Costs.” The American Journal of Managed Care, vol. 23, no. 8 (2017): e265-e274. Starner, C. I., S. A. Norman, R. G. Reynolds, and P. P. Gleason. “Effect of a Retrospective Drug Utilization Review on Potentially Inappropriate Prescribing in the Elderly.” The American Journal of Geriatric Pharmacotherapy, vol. 7, no. 1 (2009): 11-19. Stebbins, M.R., D.J. Kaufman, and H.L. Lipton. “The PRICE Clinic for Low-Income Elderly: A Managed Care Model for Implementing Pharmacist-Directed Services.” Journal of Managed Care Pharmacy, vol. 11, no. 4 (2005): 333–341. Steele, K. M., J. F. Ruisinger, J. Bates, E. S. Prohaska, B. L. Melton, and S. Hipp. “Home-Based Comprehensive Medication Reviews: Pharmacist’s Impact on Drug Therapy Problems in Geriatric Patients.” The Consultant Pharmacist, vol. 31, no. 10 (2016): 598-605. Stockl, K. M., D. Tjioe, S. Gong, J. Stroup, A. S. M. Harada, and H. C. Lew. “Effect of an Intervention to Increase Statin Use in Medicare Members Who Qualified for a Medication Therapy Management Program.” Journal of Managed Care Pharmacy, vol. 14, no. 6 (2008): 532-540. Suehs, B. T., A. Louder, M. Udall, J. C. Cappelleri, A. V. Joshi, and N. C. Patel. 2014. “Impact of a Pregabalin Step Therapy Policy among Medicare Advantage Beneficiaries.” Pain Practice, vol. 14 (5): 419-426. Tang, Y., W. F. Gellad, A. Men, and J. M. Donohue. “Impact of Medicare Part D Plan Features on Use of Generic Drugs.” Medical Care, vol. 52, no. 6 (2014): 541-548. Thatcher, E. E., E. M. Vanwert, and S. R. Erickson. “Potential Impact of Pharmacist Interventions to Reduce Cost for Medicare Part D Beneficiaries.” Journal of Pharmacy Practice, vol. 26, no. 3 (2013): 248- 252. Touchette, D. R., A. L. Masica, R. J. Dolor, G. T. Schumock, Y. K. Choi, Y. Kim, and S. R. Smith. “Safety-Focused Medication Therapy Management: A Randomized Controlled Trial.” Journal of the American Pharmacists Association, vol. 52, no. 5 (2012): 603-612. Ward, M. A., and Y. Xu. “Pharmacist-Provided Telephonic Medication Therapy Management in an MAPD Plan.” The American Journal of Managed Care, vol. 17, no. 10 (2011): e399-e409. Welch, E. K., T. Delate, E. A. Chester, and T. Stubbings. “Assessment of the Impact of Medication Therapy Management Delivered to Home-Based Medicare Beneficiaries.” The Annals of Pharmacotherapy, vol. 43, no. 4 (2009): 603-610. West, J. C., J. E. Wilk, I. L. Muszynski, D. S. Rae, M. Rubio-Stipec, C. L. Alter, W. E. Narrow, and D. A. Regier. “Medication Access and Continuity: The Experiences of Dual-Eligible Psychiatric Patients during the First 4 Months of the Medicare Prescription Drug Benefit.” The American Journal of Psychiatry, vol. 164, no. 5 (2007): 789-796. West, J. C., J. E. Wilk, D. S. Rae, I. L. Muszynski, M. Rubio-Stipec, C. L. Alter, K. E. Sanders, S. Crystal, and D. A. Regier. “First-Year Medicare Part D Prescription Drug Benefits: Medication Access and Continuity among Dual Eligible Psychiatric Patients.” The Journal of Clinical Psychiatry, vol. 71, no. 4 (2010): 400-410. Winston, S., and Y.S. Lin. “Impact on Drug Cost and Use of Medicare Part D of Medication Therapy Management Services Delivered in 2007.” Journal of the American Pharmacists Association, vol. 49, no. 6 (2009): 813-820. Woelfel, J. A., S. M. Carr-Lopez, M. D. Santos, A. Bui, R. A. Patel, M. P. Walberg, and S. M. Galal. “Assessing Medicare Beneficiaries’ Willingness-to-Pay for Medication Therapy Management Services.” The Consultant Pharmacist, vol. 29, no. 2 (2014): 104-109. Zillich, A. J., M. E. Snyder, C. K. Frail, J. L. Lewis, D. Deshotels, P. Dunham, H. A. Jaynes, and J. M. Sutherland. “A Randomized, Controlled Pragmatic Trial of Telephonic Medication Therapy Management to Reduce Hospitalization in Home Health Patients.” Health Services Research, vol. 49, no. 5 (2014): 1537-1554. In addition to the contact named above, Robert Copeland, Assistant Director; William A. Crafton, Analyst-in-Charge; Britt Carlson, Kaitlin Dunn, Andrew Emmons, Michael Rose, and Dan Ries made key contributions to this report. Also contributing were George Bogart, Yesook Merrill, Laurie Pachter, and Vikki Porter.", "summary": "Total expenditures for the Medicare Part D drug program exceeded $100 billion in 2016. Part D plan sponsors may use a PBM to provide drug benefit management services for Part D coverage, such as negotiating drug rebates and other price concessions and paying pharmacy claims. Policymakers have sought a better understanding of PBMs' roles in the drug supply chain and plans' and PBMs' efforts to manage Part D drug spending and use. GAO was asked to examine the role of PBMs in the Part D program. This report examines, among other objectives, (1) the extent to which Part D plan sponsors use PBMs, (2) trends in rebates and other price concessions obtained by both PBMs and plan sponsors for Part D drugs, and (3) how PBMs earn revenue for services provided to Part D plans. GAO analyzed Centers for Medicare & Medicaid Services (CMS) data on Part D plan sponsors' use of PBMs in 2016 as well as CMS drug expenditure, pricing, and rebate and other price concession data for all Part D drugs from 2014 through 2016 (the most recent available data at the time of our analysis). GAO reviewed service agreements between Part D plan sponsors and PBMs that were approved by CMS from January 2016 through May 2018 and had the highest enrollment as of June 2018. GAO spoke with CMS officials and 38 stakeholder groups including PBMs, Part D plan sponsors, pharmacy representatives and drug manufacturers. Medicare Part D plan sponsors used pharmacy benefit managers (PBM) to provide 74 percent of drug benefit management services and performed the remaining 26 percent of services themselves in 2016—the most recent year of data at the time of our analysis. Plan sponsors are private entities that operate drug plans; PBMs are organizations that help manage drug benefits. Rebates and other price concessions—discounts generally paid by manufacturers to Part D plan sponsors and PBMs after the sale of a drug at the pharmacy—grew faster than Part D expenditures from 2014 through 2016. Specifically, gross expenditures (the amount paid to pharmacies by plan sponsors, or by the PBM on the sponsor's behalf, and by the beneficiary) increased 20 percent, to $145.1 billion. During this period, rebates and other price concessions increased 66 percent, to $29 billion—20 percent of 2016 gross expenditures. Consequently, net expenditures (gross expenditures less rebates and other price concessions) increased only 13 percent, to $116.1 billion. PBMs primarily earned Part D revenue through a volume-based fee paid by plan sponsors based on PBM-processed claims; a per-member, per-month fee paid by plan sponsors; or a combination of the two. PBMs also earned revenue from the rebates they negotiated with manufacturers for Part D drugs, which accounted for $18 billion of the $26.7 billion in rebates in 2016. PBMs retained less than 1 percent of these rebates, passing the rest to plan sponsors. Plan sponsors in turn may use rebates to help offset the growth in drug costs, helping control premiums for beneficiaries. The Department of Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "Cultivating a strong biological defense requires an understanding of a multitude of biological threats. The nature of these threats can be intentional, naturally occurring, or accidental and can be exacerbated by changes in behavior and environment. The vast and evolving biological threat landscape includes threats of biological warfare, bioterrorism, infectious disease threats to humans and animals, crop failure, and safety and security lapses at facilities that house biological threat agents. The use of biological weapons or their proliferation by state or non-state actors presents a significant challenge to our national security, our population, our agriculture, the economy, and the environment. Despite ratification of the Biological Weapons Convention in 1975 and the end of the Cold War decades later, the threat of biological warfare persists today. For example, the State Department reported in 2019 that China, Iran, North Korea, Russia, and Syria continue to engage in dual-use or biological weapons-specific activities. Additionally, the biotechnology revolution presents opportunities to advance the life sciences, yet that same technology in the wrong hands could be used to catastrophic effect. For example, synthetic biology may lead to advances in public health, such as the development of biosensors that can permanently reside in the body to detect and treat abnormalities such as cancer. However, if used to create and combine agents to create biological weapons, synthetic biology poses a significant threat. Finally, non-state actors such as terrorist organizations, domestic militia groups, and “lone wolves” have both the interest and, in some cases, the limited capacity to develop biological weapons. Biological threats can be unpredictable, as humans, animals, and plants are vulnerable to a variety of naturally occurring infectious disease and pest threats. Urbanization, habitat encroachment, and increased and faster travel, coupled with weak health systems, increase the risk of infectious diseases to spread rapidly across the globe. Pandemic influenza presents a constant threat to global public health and exemplifies the susceptibility of humans to diseases with animal origins. For example, in 2009 when an H1N1 influenza virus emerged with a new combination of genes from swine, avian, and human influenza viruses, it demonstrated how the genetic compositions of some viruses naturally change, meaning most people have little or no immunity to the new virus. In 2009, this led to a global pandemic with a novel H1N1 influenza virus (see fig.1). Other examples of zoonotic disease threats—infectious diseases that are transmissible from animals to humans—include Ebola, Zika, and Eastern Equine Encephalitis. Biological threats may also arise from changes in human behaviors. Habitat loss and human encroachment on rural and wildlife environments are bringing populations of humans and animals into closer and more frequent contact. These changing relationships with animals increase the risk of disease transmission among people, pets, livestock, and wildlife. Other changes in human behavior—such as vaccine hesitancy, mass migration, and conflict—put stress on health care systems around the world. In an ever increasing interconnected world, building biological defenses globally can help maintain health security domestically, because a disease threat anywhere is a disease threat everywhere. Biodefense capabilities are also needed to address changes in the environment which have the potential to negatively affect human health and the agriculture industry. As we reported in October 2015, climate change may contribute to the spread of vector-borne diseases that are transmitted to humans by animals, including invertebrate animals such as mosquitoes and ticks. Additionally, extreme climate conditions, such as sustained drought and heat waves can affect crops and livestock, and excess precipitation can also increase flooding events and erosion, and decrease soil quality. Losses of livestock and crops from the biological threats of disease, pests, or extreme climate conditions could have devastating effects on trade and the national economy. Finally, in many countries around the world, pathogens are stored in laboratories that lack appropriate biosecurity measures where they could be diverted by actors who wish to do harm. Advances in science and technology bring revolutionary cures and progress, but they also have the potential to facilitate intentional misuse. As we reported in 2016, some laboratories do not have appropriate biocontainment or biosafety protocols. These shortfalls could lead to outbreaks through laboratory acquired infections or pathogens accidently being released into the environment. We have previously reported on a wide range of biodefense-related efforts carried out by multiple federal departments and agencies. Since 2009, we have identified broad, cross-cutting issues in leadership, coordination, and collaboration that arise from fragmentation throughout the complex interagency, intergovernmental, and intersectoral biodefense enterprise. For example, our past work has identified a number of key challenges related to the nation’s ability to detect and respond to biological incidents that transcend what any one agency can address on its own. They include: (1) assessing enterprise-wide threats, (2) determining optimal biodetection technologies, (3) building and maintaining emerging infectious disease surveillance, (4) establishing situational awareness and data integration, and (5) enhancing biological laboratory safety and security. (Additional detail on these challenges and our related reports is presented in appendix II.) The complexity and fragmentation of roles and responsibilities across numerous federal and nonfederal entities presents challenges to ensuring efficiency and effectiveness across the entire biodefense enterprise. We called for a national biodefense strategy and focused leadership because addressing these issues is a difficult and complex challenge that crosses mission areas, federal departments, and sectors. Additionally, we have reported on enterprise risk management principles that can support enterprise-wide decision-making under complex and uncertain conditions. Enterprise risk management is a strategy for helping policymakers make decisions about assessing risks, allocating resources, and taking actions under conditions of uncertainty. While often applied at an agency level, we have also recognized that the size and complexity of certain issues, such as homeland security, involves multiple partners which can add another degree of difficulty to enterprise risk management. For certain areas, like biodefense, where activities cut across multiple federal and nonfederal entities, applying enterprise risk management principles becomes more challenging, but equally important to help ensure the responsible parties can make decisions that help to ensure effectiveness and maximize opportunities to better manage risk. Enterprise risk management in the larger interagency and intergovernmental context does not replace what each agency needs to do to pursue its own core missions. Rather, it allows agency decision makers to consider their missions and the alternatives they have to meet them from an enterprise-wide perspective. In this manner, decision makers can consider the risk-reduction contributions their actions make to the larger enterprise—for example by selecting alternatives that meet their immediate needs and provide collateral benefits to some other part of the enterprise—as one of many factors in individual agency decision- making. On September 18, 2018, the White House released the National Biodefense Strategy and characterized it as a new direction to protect the nation against biological threats and that its implementation would promote a more efficient, coordinated, and accountable biodefense enterprise. The Strategy’s five high-level goals are to help enable the efficient assessment, prevention, preparation, response, and recovery from natural, accidental, or deliberate biological threats. When the National Biodefense Strategy was released, the White House issued NSPM-14: Presidential Memorandum on the Support for National Biodefense. According to the Strategy, NSPM-14 “creates a dedicated mechanism, housed within the U.S. Department of Health and Human Services, to coordinate federal biodefense activities and assess the effectiveness with which the National Biodefense Strategy’s goals and objectives are being met.” NSPM-14 details a governance structure and implementation process to achieve the Strategy’s goals. The governance structure includes the creation of a Biodefense Steering Committee chaired by the Secretary of HHS, and includes seven other agency heads as members: the Attorney General, the Secretaries from the Departments of State and VA, DOD, USDA, and DHS, and the Administrator of the EPA. Additionally, NSPM- 14 required the formation of a Biodefense Coordination Team to assist the Biodefense Steering Committee in carrying out its responsibilities. Administratively located within HHS, the Biodefense Coordination Team consists of staff from multiple agencies with biodefense responsibilities and is designed to assist the Biodefense Steering Committee in monitoring and coordinating implementation of the Strategy (see fig.2). The Biodefense Coordination Team may convene working groups and maintain awareness of biodefense activities across the biodefense enterprise and has responsibility for establishing policies, processes, and procedures to govern its activities, subject to the approval from the Biodefense Steering Committee. NSPM-14 also establishes that the Assistant to the President for National Security Affairs will serve as the lead for policy coordination and review, providing strategic input and policy integration for federal biodefense efforts. NSPM-14 also outlines an implementation process, which sets requirements and deadlines for the interagency group to achieve the Strategy’s goals and also requires the heads of agencies identified by the Biodefense Steering Committee as having responsibilities pertaining to biodefense to review the Strategy every 2 years, and revise as appropriate. The National Biodefense Strategy and associated plans bring together all the key elements of federal biodefense capabilities, which presents an opportunity to identify gaps and consider enterprise-wide risk and resources for investment trade-off decisions. However, challenges with planning to manage change, limited guidance and methods for analyzing capabilities, and lack of clarity about decision-making processes, roles, and responsibilities while adapting to a new enterprise-wide approach could limit the success of the Strategy’s implementation. The National Biodefense Strategy and its associated plans bring together the efforts of federal agencies with significant biodefense roles, responsibilities, and resources to address intentional, accidental, and naturally-occurring threats. The Strategy and plans also provide processes for collecting and analyzing comprehensive information across the enterprise, an important step toward the kind of enterprise-wide strategic decision-making we have called for. For example, our prior work identified the need for a strategy to help ensure efficiency and effectiveness across the entire biodefense enterprise by connecting strategic approaches and investment decisions across disparate but interrelated functions within the biodefense enterprise. These functions are (1) understanding and defining threats, (2) taking action to prevent and protect against attacks and significant national and international infectious disease outbreaks, (3) employing new and existing techniques and technologies to more quickly detect biological events, and (4) preparing to respond and recover. Consistent with characteristics of national strategies and leading practices for interagency collaboration, the National Biodefense Strategy clearly articulates the purpose of the Strategy and the scope of the problem, as well as high-level goals and objectives to guide implementation. As shown in Figure 3, the Strategy’s five high-level goals comprise a new framework that incorporates the distinct biodefense functional areas and includes the different sources of biological threat—accidental, intentional, and naturally occurring. It is within this framework that national biodefense capabilities will be assessed across the enterprise. According to the Strategy, its aim is to bring together a single, coordinated effort to orchestrate activities across the United States Government to protect the American people from biological threats. The Strategy defines the term “biothreat” broadly to include all sources of major catastrophic risk, including naturally occurring biological threats, the accidental release of pathogens, and the deliberate use of biological weapons. Officials from three of the eight participating agencies that we interviewed noted that this is the first time that the federal government has identified activities across the whole biodefense enterprise and assessed resources and gaps to address multiple sources of threat regardless of source (naturally occurring, accidental, or intentional). The Strategy also established common terminology, giving the agencies a shared basis for identifying biodefense-related programs and activities, which is consistent with our national strategy criteria and our leading collaboration practices. Developing common terminology can help to bridge organizational cultures when multiple agencies with varying missions work together for a common purpose. The Strategy also contains goals, objectives, and over 240 separate activities that cover the range of actions that comprise national biodefense capabilities, which provides a high-level framework to begin to guide agencies toward a shared vision for outcomes. While the Strategy outlined high-level goals and objectives to help define priorities, NSPM-14 established a structure and process by which the federal agencies can assess enterprise-wide biodefense capabilities and needs, and subsequently develop guidance to help inform agency budget submissions. NSPM-14 lays out, in broad strokes, a process to identify biodefense efforts and assess how current resources support the Strategy, how existing programs and resources could better align with the Strategy, and how additional resources, if available, could be applied to support the goals of the Strategy. As shown in figure 4, this process begins through a data call with participating agencies documenting all biodefense programs, projects, and activities within their purview in a biodefense memorandum. As part of this process, NSPM-14 calls for the Biodefense Coordination Team, in coordination with NSC staff through the NSPM-4 process, to develop and collectively agree on metrics, milestones, and end-states and roles and responsibilities. For each of the objectives within the Strategy where agencies have roles and responsibilities, HHS directed participating agencies, as part of a data call, to identify any resource, authority, policy, science and technology, or coordination gaps against those end states and propose solutions where needed. As outlined in NSPM-14, the Biodefense Coordination Team is then to use the information submitted by the individual agencies to identify gaps, shortfalls, redundancies, and challenges across the enterprise. Finally, NSPM-14 directs officials with biodefense responsibilities to create joint policy guidance in coordination with the Assistant to the President for National Security Affairs through the NSPM-4 process—to be updated on an annual basis—that can help guide individual agency budget submissions. The process outlined in NSPM-14 is intended to lead to a cross- government assessment of federal biodefense capabilities and is consistent with our past calls for a strategy that can guide investment across the whole enterprise and with leading practices for interagency collaboration and enterprise risk management. We have previously reported that defining shared outcomes—and processes by which to achieve them—and developing mechanisms to monitor and evaluate results can reinforce accountability for collaborative efforts. Working together to develop a set of draft metrics, milestones, and end-states requires interagency participants to establish a shared vision for outcomes, and metrics and milestones serve as accountability mechanisms. NSPM-14 describes how agencies will consider the agreed upon joint policy guidance developed by agencies with biodefense responsibilities and the White House when developing their budgets. Specifically, according to NSPM-14, these agencies shall include in their respective annual budget requests to OMB information on the programs within the budget requests that support the implementation of the Strategy and conform to budget formulation requirements established by OMB, including specified funding levels. Establishing goals, objectives, and desired end states that cut across the federal government also create a foundation for effective enterprise risk management. As we have previously reported, a shared understanding of the scope of the risks enables leaders across the enterprise to align agency goals and objectives and consider their own missions and purposes within a more expansive and comprehensive understanding of threats and opportunities. In our interviews, officials from participating agencies stated that the NSPM-14 processes constitute a new approach to identifying gaps and setting budget priorities for biodefense, and that they viewed the approach as generally well designed. Specifically, officials from six of the eight participating agencies said that the process for identifying gaps was somewhat well-designed. Officials from the other two participating agencies said that this process was very well-designed. Agency officials provided several reasons for optimism about the Strategy and the processes outlined in NSPM-14, including that: They provide a holistic picture of current biodefense programs and activities, which creates government-wide visibility so that gaps can be identified. They create a forum to discuss potential gaps and biodefense responsibilities, which has not existed previously. They contain a strong overarching architecture to map existing efforts, identify gaps, and inform future revisions (as necessary). Additionally, agency officials said that the assessment and joint policy guidance development process outlined in NSPM-14 offered some promise for helping agencies identify the resources necessary to achieve the Strategy’s goals, which is consistent with our national strategy criteria. Specifically, officials from five of the eight agencies said the process is somewhat well-designed to accomplish these goals. Officials from the other three agencies said the process is very well-designed to ensure the appropriate identification of resources and investments necessary to achieve the goals outlined in the Strategy. For example, officials from three agencies said it would help the implementation of the Strategy succeed where previous efforts failed because it is designed to allow the Strategy’s priorities to drive budget decisions. However, officials from all of the agencies we interviewed, even those with the most optimistic views on the leadership and governance structure design, tempered their responses with the caveat that implementation is in such early stages that it remains to be seen how effective these structures will actually be once tested. Although the Strategy and associated plans establish the foundation for enterprise risk management, in particular by bringing together all of the functional biodefense areas across different sources of threat, we and biodefense agency officials identified multiple challenges that could affect the Strategy’s implementation. These include challenges individual agencies faced during the initial data collection process as well as a lack of planning and guidance to support an enterprise-wide approach. In our analyses and interviews, we found that parts of the process in the first year were underdeveloped, raising questions about (1) the plans to support change management practices and ensure that early- implementation limitations do not become institutionalized in future years’ efforts; (2) guidance and methods for meaningfully analyzing the data; and (3) the clarity of decision-making processes, roles, and responsibilities. During our interviews, agency officials reported challenges they faced in the first-year’s data collection effort with (1) staffing and organizational resources within individual agencies, (2) quantifying biodefense activities, and (3) technology glitches. These challenges may have led to incomplete data collection, but are not wholly unexpected given they occurred in the context of adapting to cultural change that this kind of enterprise-wide approach to managing risk represents, while implementing new processes and procedures. We have previously reported that leaders of successful transformations seek to learn from best practices and create a set of systems and processes that are tailored to the specific needs and circumstances of the new organization. However, the agencies involved in implementing the Strategy do not have a plan that includes change management practices that can help prevent these challenges from being carried forward into future efforts, and help reinforce enterprise-wide approaches, among other things. Staffing and organizational resources. During our interviews, one challenge that arose involved having the personnel and expertise needed to complete the initial effort to document biodefense programs, projects, and activities. For example, officials from one agency told us that this data collection effort was especially challenging because policy and program managers were responsible for determining both programmatic and budgetary information, which exceeded their expertise. This agency ultimately had to bring in non-biodefense personnel—including from the comptroller’s office—to identify programs and resources to complete the information request. Officials from three of the eight agencies stated that staffing and organizational resource limitations also posed a challenge to the data collection process. For example, officials from one agency said that the agency does not have full-time staff assigned to the effort. Instead, it was seen as a collateral duty competing with regular priorities, which reduced the time devoted to identifying the necessary information. Quantifying biodefense activities. Officials we interviewed also highlighted the challenge of quantifying biodefense-related activities. Specifically, officials from four agencies noted that agencies without specific biodefense line items in their budgets have had difficulty fully quantifying how much their agency invests in biodefense-related activities. To help agencies attempt to capture and quantify this information in a consistent way, the Biodefense Coordination Team developed guidance to assist agencies in estimating the percentage of their chemical-biological-radiological-nuclear (CBRN) defense, all- hazards preparedness, and agriculture programs and activities, among others, that are specifically related to biodefense. Nevertheless, officials from two agencies said that distinguishing the biodefense-specific activities within their CBRN defense or all-hazards activities and budgets was inherently challenging, which in turn required officials to invest additional staff and time into the effort. Technology glitches. Officials we interviewed also cited challenges with the technology used to collect data. For example, officials from two agencies said that they had experienced glitches with the OMB Max Information System, which the Biodefense Coordination Team guidance directed them to use for the data collection effort. They stated that the technology issues prevented them from entering biodefense budget numbers in a timely manner. Officials noted that an integrated platform dedicated to biodefense enterprise needs would enhance their collaboration, which is consistent with our work on interagency collaboration that states technology is one means of establishing compatible processes for working across interagency boundaries. HHS officials are aware of the technology challenges and said they are collecting feedback and identifying ways to improve the data collection and analytical tool for future data collection efforts. These challenges with resources, identification of budget activities, and technology occurred in the context of the individual agencies and officials adapting to new procedures and a broader cultural shift from how they have approached their biodefense missions in the past. Officials told us that because of the learning involved the first time through the process and the 2018 government shutdown, coupled with the tight time frames set forth in NSPM-14, agencies may not have submitted complete or detailed information about their biodefense programs. For example, officials at one large agency told us they treated the first year as a learning experience and that in the coming years, when agencies have sufficient time to respond to the data call, the quality of the data submitted should improve. Some officials we interviewed voiced concern that this first-year effort could set a poor precedent for these activities in future years if the challenges are not acknowledged and addressed. For example, an official noted that committing to the first-year’s results as the “baseline” for future years of the Strategy’s implementation could compound or institutionalize the issues encountered in the first year. Officials cautioned against a “garbage in, garbage out” situation, meaning the output of any analysis would only be as good as the quality of the data fed into that analysis. As agency officials described their data collection efforts, it was clear to them that the focus was on meeting the time frames established in NSPM-14 to identify existing biodefense efforts in this first year and that not all processes had been fully developed prior to the data collection effort. OMB staff acknowledged that there were challenges in the first year’s data collection effort, and said data quality would likely improve in future years as agencies adjust their internal structures to suit the demands of the NSPM-14 process. Officials from HHS and OMB staff stressed that this process will be iterative, with the first year being primarily about outlining the existing biodefense landscape. Our prior work on organizational transformations states that incorporating change management practices improves the likelihood of successful reforms and notes that it is important to recognize agency cultural factors that can either help or inhibit reform efforts. We have also reported that identifying cultural features of the originating components, prior to, or early on, in the transformation process, can help leadership gain a better understanding of their beliefs and values. Incorporating this type of change management practice can help educate agencies to better understand the varying missions and how those missions support the broader enterprise-wide effort. We have also noted the importance of communication and obtaining feedback from participants to help promote ownership for the transformation. This type of approach to managing risk across a multi-agency, multi-sectoral enterprise like biodefense is complex and novel. During our interviews, agency officials recognized a need for change management practices to support this effort in future years. Agency officials we interviewed noted that the process for the identification of biodefense resources and activities across the federal government outlined by NSPM-14 could be “transformational” for the biodefense enterprise and approached the data collection process in good faith, but said that it will take time to get right. The biodefense agencies are currently assessing the activities and challenges of the first year of implementation, and they plan to develop an after action report on lessons learned. HHS has conducted a survey and interviews to collect information and the material is being analyzed, but the lessons learned document is not yet final. HHS has not worked with the other biodefense agencies, however, to undertake an intentional effort to manage key cultural aspects of the enterprise-wide approach—such as communication and education mechanisms to help bridge organizational cultures, promote ownership of the transformation, and emphasize awareness of joint national security responsibilities. Further, HHS has not worked with the other biodefense agencies to establish feedback and monitoring mechanisms or processes, that can help identify implementation challenges and develop solutions to address those challenges, particularly early implementation issues that might threaten the efficacy of the effort if they are institutionalized going forward. A systematically developed plan for managing change could help ensure effective planning to sustain and advance transformation in the early years. Such a plan could address (1) institutionalizing learning and feedback mechanisms that allow for corrective action and ensure that issues that arise in early implementation—for example, incomplete or unreliable data—do not become entrenched in a way that plagues the future years’ efforts; and (2) establishing a communication and education strategy to reinforce collaborative behaviors, enterprise-wide approaches, and to emphasize accountability for shared national security missions, outcomes, and procedures. We found a lack of clear procedures and planning to help ensure that the Biodefense Coordination Team is prepared to analyze the data, once it has been collected, in a way that that leads to recognition of meaningful opportunities to leverage resources in efforts to maintain and advance national biodefence capabilities. In particular, HHS (1) has not documented guidance and methods for analyzing the data, including but not limited to methods and guidance for how to account for the contribution of nonfederal capabilities; and (2) does not have a resource plan for staffing and sustaining ongoing efforts. Methods and guidance for analyzing data. We found that the processes for the Biodefense Coordination Team to analyze the results of all the individual agency data submissions and identify priorities to guide resource allocation were not agreed upon or documented prior to the agency efforts and continue to lack specificity and transparency. At the time of our interviews, agency officials were in the midst of compiling and assigning budget numbers to their programs, projects, and activities. Officials we spoke with expressed uncertainty about how the information would be used. For example, officials from four agencies said they were uncertain about fundamental elements of the implementation process, including how information gathered will be used to identify gaps and set priorities. The overarching purpose of the analysis described in NSPM-14 is identification of gaps, shortfalls, and redundancies to support the goals and objectives of the Strategy. However, NSPM-14 does not specifically articulate what is meant by these terms. In response to our question about how the analysis was to be conducted, the Office of the Assistant Secretary for Preparedness and Response—the HHS office responsible for leading the Biodefense Coordination Team—described a general process that reflects the high-level description laid out in NSPM-14. HHS officials also stated that the Biodefense Coordination Team had consulted with experts in budget, planning, and evaluation while developing the methodology. However, HHS has not documented specific guidance and methodologies to help ensure transparency and accountability across the interagency and consistency in the Biodefense Coordination Team’s analysis. Additionally, the initial effort to collect information on all programs, projects, and activities focused on existing federal activities did not include a complete assessment of biodefense capabilities at the nonfederal level. Processes for soliciting nonfederal capabilities that contribute to the biodefense enterprise and are necessary to support the Strategy’s implementation are not articulated in NSPM-14. Moreover, the guidance document that agencies used for the data call stated that the Biodefense Coordination Team—in coordination with National Security Council and OMB staff—was to, among other things, use the information provided by the agencies to analyze the extent to which current U.S. Government resources support the goals and objectives of the Strategy. Officials from two agencies also said that not gathering information from the private sector and other existing biodefense working groups was a limitation in the information gathering process for this first year. Officials said these entities provide valuable subject matter expertise and including input from them in the future could help identify gaps across the biodefense enterprise. Some agencies included information about their work to support nonfederal stakeholders in their data collection effort, for example, by listing their grant programs or cooperative agreements. In addition, during our interviews, officials from all eight agencies described efforts to involve nonfederal partners when developing the Strategy and many described outreach efforts to obtain information since the Strategy’s release. For example, HHS issued a notice in the Federal Register and the Biodefense Coordination Team held a summit related to the implementation of the National Biodefense Strategy to engage nonfederal stakeholders. However, the Biodefense Coordination Team was not explicitly required to analyze nonfederal resources and there was no guidance that would help ensure agencies consistently and systematically included the contributions of nonfederal capabilities. In 2011, we reported that few of the resources required to support national biosurveillance capabilities are wholly owned by the federal government. Effective response to significant national biological incidents also relies heavily on nonfederal resources and capabilities. Because nonfederal entities own many of the resources and capabilities needed to achieve the goals and objectives outlined in the Strategy, assessing the baseline and identifying investment needs for a national biodefense capability necessarily involves assessing nonfederal entities’ ability to support a national capability. Officials from one of the agencies initially tasked with developing the biodefense strategy said the Biodefense Coordination Team needs to develop engagement structures with nonfederal partners, because currently, there is not a system in place to get everyone’s views or learn of what is going on outside the federal government. Our enterprise risk management work calls for agencies to identify and assess risks to be able to select among risk reduction alternatives. Enterprise risk management requires good information and analysis to enable officials to make informed trade off decisions across alternatives. Although the NSPM-14 process is designed to enable this kind of assessment and selection, it will not be as effective without complete information at the risk identification stage. Effective enterprise risk management implementation starts with agencies establishing a customized program that fits their specific organizational mission, culture, operating environment, and business processes. In our guide for designing evaluations, we called for plans to analyze data in ways that allow for valid conclusions to be drawn. Although the NSPM-14 guidance provides a high-level process that serves as a solid foundation for an effort as complex as managing risk across the entire biodefense enterprise, it does not provide the kind of specific guidance that can help all the involved agencies ensure they are operating off a common set of procedures that fits the particular needs of this effort. Furthermore, an analysis that cannot consistently account for the contribution of nonfederal capabilities does not reflect the true enterprise operating environment and limits the selection of alternatives available for managing risk. Clear and specific documentation of methodologies and procedures for analysis—including guidance on the methods to account for nonfederal capabilities—would provide better guidance for agencies that submit information for the assessment, assurance of more complete information to assess the state of national capabilities, and better overall transparency, accountability, and consistency. Staffing, supporting, and sustaining ongoing efforts. Officials we interviewed expressed concern about the resources that the Biodefense Coordination Team had available to it, both in the first year and on an ongoing basis. According to officials from five of the eight agencies, in order for the team to be most successful, it would need to be staffed by detailees from the participating agencies. However, officials we spoke with told us that not all agencies were able to provide a full-time detailee to help support the office. Without a dedicated liaison to the Biodefense Coordination Team, agencies may have less access to information and more limited influence over the iterative process. We have previously reported that agencies need to identify how interagency groups will be funded and staffed. HHS, which serves a leadership role on the Biodefense Steering Committee, identified in its fiscal year 2020 budget request $5 million for the resources necessary to help carry out its administrative functions for implementing the National Biodefense Strategy. However, HHS appropriations for fiscal year 2020 did not include the $5 million HHS requested. In addition, in our work on leading practices for agency reform efforts we stated that having a dedicated implementation team that has the capacity—including staffing and resources—can help ensure successful transformation. However, officials from multiple agencies reported that the initial planning for the staffing and responsibilities for the Biodefense Coordination Team had not been finalized. Without a plan to help ensure resources and mitigate resource challenges for ongoing efforts, the Biodefense Coordination Team risks not having the capacity it needs to conduct meaningful analysis, which would undermine the vision created by the Strategy and NSPM-14. The governing bodies overseeing the National Biodefense Strategy’s implementation—the Biodefense Steering Committee and Biodefense Coordination Team—did not clearly document key components of the assessment process and roles and responsibilities for joint decision- making in the first year of NSPM-14 implementation. This raises questions about how these bodies will move from an effort to catalog all existing activities to decision-making that accounts for enterprise-wide needs and opportunities. For example, officials from multiple agencies were not certain how the group would make joint decisions regarding priority setting and the allocation of resources, how the group would assign new biodefense responsibilities if gaps were identified, and to what extent the Biodefense Steering Committee could enforce budgetary priorities, if at all. Process for leveraging or directing resources. We found a lack of shared understanding and agreement about how the interagency process would work to align resources toward any identified gaps and reconfigure resources for any identified redundancies or inefficiencies. To address needs for new appropriations, NSPM-14 lays out a process to identify the need for additional resources to support the goals of the Strategy and how agencies will consider the joint policy guidance in their budget requests to Congress, but this coordination process also remains ambiguous and untested. OMB staff said the 2022 budget cycle would be the first year that agencies consider the joint policy guidance to inform their budget submissions, as envisioned by the Strategy and NSPM-14 process, as that guidance is still being developed. Officials from four agencies expressed reluctance to redirect resources away from their core missions to better support any enterprise-wide identified needs. When asked about the process outlined in NSPM-14, officials from only one of the eight agencies we interviewed said that the governing bodies were well-positioned to assign new responsibilities in response to identified gaps. Further, officials we interviewed noted that new responsibilities or activities may be difficult to implement without additional appropriations or authorities approved by Congress, or they would compete with an agency’s other priorities. When discussing their understanding of the process for prioritization and determining which agencies require what resources to help implement the Strategy, officials from four agencies referenced the NSPM-4 process (within the White House) to help guide this process. NSPM-14 also references NSPM-4, as noted above, and states the Biodefense Steering Committee seeks to reach consensus on decisions, and should any disagreements arise, the issue will be addressed through the NSPM-4 process. Through this process, the Assistant to the President for National Security Affairs serves as the lead for policy coordination and review to provide strategic input and facilitate policy integration for federal biodefense efforts. When we asked HHS officials for more specific decision-making guidance, they continued to cite the existing processes and directives for interagency decision-making. However, we found that neither of these Presidential memorandums detailed specific decision-making principles or steps for reaching consensus or even for raising decision points about how to best leverage or direct resources across the enterprise in response to gaps and inefficiencies. Similarly, agency officials we interviewed were not clear how this process would work, how decisions would be made, or how agencies would agree to take on new responsibilities to bridge gaps to achieve the Strategy’s goals. Roles and responsibilities. Similarly, the governing bodies have not fully defined the roles and responsibilities for making enterprise-wide decisions that affect individual agency budgets and for enforcing enterprise-wide budget priorities. NSPM-14 directs the heads of agencies to monitor, evaluate, and hold accountable their agencies for implementation of the Strategy, and describes how agencies will develop their budgets with consideration of the agreed upon joint policy guidance developed by the agencies and the White House. However, as with other parts of the NSPM-14 implementation process, the details regarding specific roles and responsibilities for directing and enforcing budget decisions lack detail and specificity. Additionally, officials from four agencies stated that the charter for the Biodefense Coordination Team has not been finalized, further delaying the articulation of roles and responsibilities and the ability to establish a shared agenda and common operating picture. As a result, some officials remain skeptical of the effectiveness of any decisions made. For example, officials from four agencies said the Biodefense Steering Committee does not have the authority to decide how individual agencies in the broader biodefense enterprise should allocate resources or prioritize programs. Officials we spoke with also provided examples of how this part of the implementation process requires attention and will from stakeholders outside the Biodefense Steering Committee, including the National Security Council staff, OMB, and the Congress. For example, officials from two agencies said turnover within the National Security Council staff had contributed to a lack of consistent leadership from the White House, which created a “lapse in momentum” and disrupted the implementation process. Additionally, officials said that key parts of the implementation process, such as the finalization of metrics, milestones and end states, as well as agreement on the federal agency roles and responsibilities for the biodefense activities articulated in the Strategy, had not been approved by the National Security Council staff. As of January 2020, these documents had not received National Security Council staff approval as the process for the development of metrics, milestones and end states is considered ongoing, which could lead to inefficiencies and delay effective implementation of the Strategy’s goals. Finally, officials we interviewed also discussed Congress’s key role as part of the regular federal budget process in determining agency appropriations. For example, officials from two agencies said it will be hard to predict whether the budget component expressed in NSPM-14 to assess and prioritize biodefense programs and activities will achieve its intended outcome. Some agency officials also believed the process to use joint policy guidance to inform annual budget submissions would not be entirely dissimilar to the annual budgetary process, as agencies will continue to submit their proposed budgets and wait for Congress to make appropriation decisions. However, we have previously reported that sustained congressional attention helps ensure that agencies continue to achieve progress resolving complex issues. We previously reported that determining the sources and types of resources needed and where those resources should be targeted are key decisions that effective national strategies should support. We also reported that effective national strategies should help clarify implementing organizations’ relationships in terms of leading, supporting, and partnering—in the context of the Strategy, that includes how enterprise- wide decisions about leveraging or directing resources to fill gaps and reduce inefficiency will be made and by whom. These could include gaps in policy, programming, or funding. Similarly, our previous work has found that articulating and agreeing to a process for making and enforcing decisions can improve the clarity surrounding a shared outcome, and that articulating these agreements in formal documents can strengthen agency commitment to working collaboratively and provide the overall framework for accountability and oversight. Moreover, a key aspect of enterprise risk management is creating a foundation that will enable participants to consider and prioritize alternatives. This prioritization can be based on a number of factors, such as the degree of risk reduction alternatives afford and the cost and difficulty to implement them. However, to do this at the enterprise level, the interagency participants need to agree on processes, roles, and responsibilities for enterprise-wide decision-making. This is particularly important in the context of enhancing efficiency and effectiveness in a broad mission space like biodefense where there is a wide array of threats and the threat landscape continually evolves. Uncertainty around the mechanisms to identify enterprise-wide priorities along with the lack of clearly documented and agreed upon processes, roles, and responsibilities for joint decision-making jeopardize the Strategy’s ability to enhance efficiency and effectiveness of the nation’s biodefense capabilities. In the absence of clearly articulated and agreed upon processes and procedures for joint decision-making to leverage or direct resources across agency boundaries in order to enhance efficiencies, agencies run the risk of continuing to work in stovepiped mission spaces and collecting information that does not serve its intended purpose. Full development and documentation of the processes, roles, and responsibilities for leveraging or directing resources across the enterprise in response to identified gaps and inefficiencies would enhance transparency and clarity for future year’s efforts and help establish a common operating picture that enables trade-offs across agency missions. The National Biodefense Strategy, released in September 2018, and the establishment of interagency governance and budgeting mechanisms to help implement the Strategy constitute a promising new approach to establishing a transformational enterprise-wide endeavor that meaningfully enhances the effectiveness and efficiency of government- wide biodefense efforts. These efforts include establishing a framework to collect and compare biodefense programs, projects, and activities across the federal government, which could facilitate enterprise-wide decision- making and budget tradeoff decisions to help ensure the most efficient use of the nation’s biodefense resources. However, these efforts represent a start to a process and a cultural shift that may take years to fully develop. During the first year of implementation, agencies have faced numerous challenges that must be overcome to ensure long-term implementation success. While agencies remain optimistic about the potential benefits of this new approach, it is imperative that additional steps be taken to ensure the challenges experienced early on are not institutionalized and that there is an intentional communication, education, and feedback effort to reinforce collaborative behaviors and enterprise-wide accountability for national security missions. A plan that includes change management practices to help bridge agency cultures and missions, such as efforts to reinforce collaborative behaviors and enterprise-wide approaches, can help ensure agencies continue to refine their interagency efforts and adapt to changes and respond effectively to challenges along the way. In addition, without clear methods and guidance that articulate how all relevant information should be analyzed, including ensuring nonfederal roles, responsibilities, and resources are accounted for in the assessment, the Biodefense Coordination Team’s ability to effectively use the information to support enterprise risk management will be limited. Moreover, without a plan to help ensure resources for sustaining ongoing institutional support, the Biodefense Coordination Team risks not having the capacity it needs to conduct meaningful analysis and decision making processes. Finally, without the development and documentation of the processes, roles, and responsibilities for joint decision making regarding the identification of priorities and for raising decisions about resource alignment across agencies, it will be difficult to sustain an enterprise-wide approach to managing risk across the biodefense enterprise. These actions could help guide agencies towards a common operating picture and shared understanding of the efforts needed beyond their individual missions. The intersection of human, animal, plant, and environmental health, as well as the nexus to the national security and economic sectors, represent challenges that no single agency can address alone. The National Biodefense Strategy was written to help link these efforts and additional planning and guidance would help enable the agencies to achieve the Strategy’s goals. We are making the following four recommendations to the Secretary of HHS: The Secretary of HHS should direct the Biodefense Coordination Team to establish a plan that includes change management practices—such as strategies for feedback, communication, and education—to reinforce collaborative behaviors and enterprise-wide approaches and to help prevent early implementation challenges from becoming institutionalized. (Recommendation 1) The Secretary of HHS should direct the Biodefense Coordination Team to clearly document guidance and methods for analyzing the data collected from the agencies, including ensuring that nonfederal resources and capabilities are accounted for in the analysis. (Recommendation 2) The Secretary of HHS should direct the Biodefense Coordination Team to establish a resource plan to staff, support, and sustain its ongoing efforts. (Recommendation 3) The Secretary of HHS should direct the Biodefense Coordination Team to clearly document agreed upon processes, roles, and responsibilities for making and enforcing enterprise-wide decisions. (Recommendation 4) We provided a draft of this report to HHS, USDA, DOD, DHS, State, VA, Justice, EPA, the National Security Council staff, and OMB for review and comment. In its written comments, which are reproduced in appendix III, HHS concurred with our four recommendations and provided additional information on the steps the agency has taken or plans to take to address our recommendations. To address recommendation 1 for the Biodefense Coordination Team to establish a plan that includes change management practices, HHS reported that it had implemented change management practices to include strategies for feedback, communication, and education. Specifically, the letter describes plans to institutionalize an after-action survey following the interagency data collection effort each year and a communications and outreach plan that was informed by multiple sources of stakeholder input. In technical comments, officials also described meetings across different components of the participating agencies that the Biodefense Coordination Team has held to help bridge organizational cultures and promote ownership. These actions, if implemented effectively, are important steps toward addressing the intent of our recommendation. At the same time, it is important to recognize the extent to which the enterprise-wide approach—making resource decisions in the context not only of each agency’s separate mission and authorities, but also to further a shared national security mission—represents a cultural shift. In technical comments, HHS officials acknowledged that opportunities exist to continue to enhance cultural aspects of the enterprise-wide approach and noted that the participation of all the agencies will be important. In addition VA, State, and EPA—in technical comments and written responses—commented on the ability of the Biodefense Steering Committee and Biodefense Coordination Team to drive enterprise-wide decision-making. They noted challenges like the limitations in these bodies’ authority to direct action and the difficulty of achieving consensus across so many actors. (See Department of Veterans Affairs’ letter reproduced in appendix IV.) HHS also concurred with recommendation 2 about clear documentation of guidance and methods for analyzing the data collected from the agencies, including ensuring that nonfederal resources and capabilities are accounted for in the analysis. However, in its written response, HHS reiterated the assessment steps it already described during our review, but it did not provide additional documentation containing more concrete and detailed methods for the analysis. HHS noted the Biodefense Coordination Team’s limited responsibilities to address nonfederal resources in the annual assessment, as described in NSPM-14. HHS also expressed in its technical comments that NSPM-14 does not charge the Biodefense Coordination Team with analyzing or accounting for nonfederal capabilities in any formal or specific way. We recognize the challenges involved with assessing nonfederal capabilities, but disagree with HHS’s characterization of the Biodefense Coordination Team’s responsibilities. According to NSPM-14, the foundation for the United States Government’s role in the biodefense enterprise is the National Biodefense Strategy and its implementation plan. The memorandum further states that agency biodefense activities shall be conducted consistent with the National Defense Authorization Act for Fiscal Year 2017 (NDAA), which provides that the strategy is to include an articulation of related whole-of-government activities required to support the strategy. We have previously reported that parts of the biodefense enterprise, such as the resources that support surveillance capabilities, are heavily reliant on nonfederal resources. Moreover, the National Biodefense Strategy states that it is broader than a federal government strategy, rather a call to action for various nonfederal entities. Therefore, to fully address our recommendation, we continue to believe that NSPM-14 notwithstanding, HHS should develop and document clear guidance for the data collection and analytical methods that will support the NDAA’s call for articulation of the capabilities that support national biodefense and recommendations for strengthening those capabilities. Regarding recommendation 3 for the Biodefense Coordination Team to establish a resource plan to staff, support, and sustain its ongoing efforts, HHS concurred, and said it requested $5 million in no-year funding in its fiscal year 2020 budget request to support the administrative management of the National Biodefense Strategy. However, as we reported, the HHS appropriations for fiscal year 2020 did not include the $5 million HHS requested and officials from multiple agencies reported that the initial planning for the staffing and responsibilities for the Biodefense Coordination Team had not been finalized. To fully address our recommendations, HHS will need to establish a resource plan that would describe how the Biodefense Coordination Team plans to staff, support, and sustain its efforts. Finally, HHS concurred with recommendation 4, for the Biodefense Coordination Team to clearly document agreed upon processes, roles, and responsibilities for making and enforcing enterprise-wide decisions. In its response, HHS points to the authority NSPM-14 gives the Biodefense Coordination Team to establish governance, policies, and procedures, subject to the approval of the Biodefense Steering Committee. HHS stated that the Biodefense Coordination Team had developed charters and guidance to govern its activities, but said that these documents were still pending the approval of the Biodefense Steering Committee. We will continue to evaluate these actions to determine the extent to which they fully address our recommendation. To fully address our recommendation, HHS in partnership with other participating federal agencies should agree upon and document clear guidance, roles, and responsibilities for addressing shared national security concerns with interagency resources and solutions that transcend the mission and capabilities of the individual agencies. Irrespective of NSPM-14, clarifying decision making processes should help the agencies identify the recommendations for improved capabilities, authorities, command structures, and interagency coordination called for by the NDAA and make incremental progress over time toward implementing those recommendations. We are sending copies of this report to the appropriate congressional committees; the Secretaries of the Departments of Health and Human Services, Agriculture, Defense, Homeland Security, State, and Veterans Affairs; the Attorney General; the Administrator of the Environmental Protection Agency; and the Director of the Office of Management and Budget. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact Chris Currie at (404) 679-1875 or CurrieC@gao.gov, and Mary Denigan- Macauley at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. The National Defense Authorization Act for Fiscal Year 2017 (NDAA) articulated eight elements to include in the required National Biodefense Strategy (Strategy). The NDAA also included a provision that we review the Strategy. As part of our analysis, we assessed the extent to which the Strategy and its associated plans incorporated the elements listed in the NDAA. On March 14, 2019, we briefed the committees of concern (as identified in the NDAA) on our findings, which we present here. To determine the extent to which the National Biodefense Strategy incorporated the elements established in the NDAA, three analysts and an attorney independently evaluated the Strategy and NSPM-14 against each NDAA element, recording scores on separate matrices. The reviewers used the following descriptors to assess the extent to which the Strategy included an element: Great Extent – explicitly cites all elements, even if specificity and detail is lacking and thus could be improved upon; Some Extent – explicitly cites some, but not all, elements; No Extent – does not explicitly cite or discuss any elements, or any implicit references are either too vague or general. The analysts and attorney then convened as a panel to reconcile any differences in scoring to reach consensus. We also interviewed officials from the agencies which comprise the Biodefense Steering Committee to gain contextual information regarding the Strategy’s development as well to help identify any challenges that agencies faced in addressing any of the statutory elements during the development process. As of the date of our briefing in March 2019, the National Biodefense Strategy and associated plans generally addressed most of the elements in the NDAA, and agencies continued to develop additional key components. Specifically, for five of the eight NDAA elements, the Strategy and associated plans addressed the major parts of the elements with few or no omissions. For the other three NDAA elements, some parts were still under development. We found in March 2019 that the National Biodefense Strategy and its associated plans generally addressed five out of eight elements listed in the NDAA, even if some of these elements lack specificity and detail. For example, where we determined the Strategy and associated plans included an element to a great extent, we recognize that these documents reflect the intent of the required element, even if improvement could be made in future revisions. Figure 5 identifies the eight elements required by the NDAA and our assessment on the extent to which those elements were included in the Strategy and associated plans. Specifically, the Strategy and related documents include a description of biological threats and the capabilities necessary to address threats, as well as recommendations for improving current biodefense capabilities, authorities, structures and interagency coordination. Description of biological threats. The NDAA provides that one element to be addressed in the strategy is a description of various biological threats. The Strategy includes a description of biological threats, as well as additional contextual information about those threats and their place within the overall threat environment. For example, the Strategy describes biological warfare, bioterrorism, naturally occurring infectious diseases, and accidental exposures as significant threats. Articulation of necessary capabilities. One element listed in the NDAA is an articulation of related or required interagency capabilities and whole- of-Government activities required to support the Strategy’s priorities. The Strategy provides a list of five goals, with associated objectives and activities that articulate the capabilities necessary to fulfill the aims of the Strategy, such as the need to improve interagency capabilities. For example, one such activity describes the need to improve state, local, tribal, territorial, private sector, federal, regional, and international surveillance systems and networks to contain, control and respond to biological incidents. Another activity involves strengthening the ability to detect zoonotic diseases and incorporating forecasting into intelligence collection by federal agencies. This articulation of necessary capabilities addresses the NDAA element to a great extent, even though we noted that additional steps to include nonfederal capabilities in the annual assessment of programs, projects, and activities would enhance implementation efforts. Recommendations for improving current biodefense capabilities. Another element listed in the NDAA is to identify recommendations for strengthening and improving current biodefense capabilities, authorities, and command structures. The Strategy contains descriptions of activities necessary to improve upon current biodefense efforts and to help agencies establish new means to fulfill the goals of the Strategy. NSPM- 14 establishes a new governance structure (command structure) to help implement the Strategy and also includes a mechanism for continual revision of the Strategy, including recommendations for strengthening biodefense activities, based on identified needs. Recommendations for interagency coordination. The NDAA also provided that the Strategy include recommendations for improving and formalizing interagency coordination and support mechanisms with respect to a strong national biodefense. The Strategy and associated plans address this element by establishing collaborative interagency structures—the Biodefense Steering Committee and the Biodefense Coordination Team—intended to work continually on improving biodefense. NSPM-14 also identifies a focal point for coordination among agencies—the Secretary of HHS. Other matters identified by agencies. The final element is to include any other matters deemed necessary by the secretaries of Defense, Health and Human Services, Homeland Security, and Agriculture. According to officials from all eight agencies, the agencies originally tasked with authoring the Strategy opened the process up to all agencies with a stake in the biodefense enterprise because they recognized those four agencies could not develop a comprehensive biodefense strategy if all partners were not included. Officials from all of the agencies on the Biodefense Steering Committee cited the inclusive nature of the drafting process as contributing to a conceptually robust Strategy. Additionally, NSPM-14 includes a requirement for the development of metrics, milestones, and end states for implementing the Strategy, and officials from all eight agencies we interviewed said the interagency group drafted them and officials from 6 of the 8 agencies said they are under review by the National Security Council staff. As of March 2019, three of 8 elements listed in the NDAA were only included to some extent because agencies implicitly addressed the element through their work, or have started addressing parts of the elements but not yet completed them. The main body of the report discusses some of the ongoing challenges related to the Strategy’s implementation. Inventory and assessment of doctrine. To some extent, the Strategy addresses the element related to an inventory and assessment of all existing strategies, plans, policies, laws, and interagency agreements related to biodefense. The agencies implicitly addressed this element by incorporating existing doctrine in the process of drafting the Strategy. For example, officials at a majority of the 8 agencies said that agencies deliberately wrote the Strategy in a way that reflects their ongoing priorities in the area of biodefense or takes into account existing agency policies or strategies. The Strategy and NSPM-14 explicitly reference some existing executive orders, presidential directives, and international treaties related to biodefense, though it excludes reference to many relevant agency-level strategies, plans, policies, laws, and interagency agreements. For example, the Strategy reinforces obligations under the Convention on the Prohibition of the Development, Production, and Stockpiling of Bacteriological and Toxin Weapons and on their Destruction (Biological Weapons Convention) (1975), but does not mention the HHS’s National Health Security Strategy, which informs a number of HHS programs that contribute to the biodefense enterprise. According to HHS officials, an inventory of doctrine was completed and submitted to Congress along with the transmittal of the Strategy, when it was released. However, not all officials we spoke to believe this work is fully completed, and officials from several agencies said they are currently evaluating their internal policies and strategies to determine how they align with the new Strategy. Catalogue of current activities. The NDAA also included an element related to a description of the current programs, projects, or activities of the United States Government with respect to biodefense. While the Strategy itself does not include a catalogue of such activities, the NSPM- 14 process requires agencies to create this catalogue, and efforts to do so are described in the body of this report. NSPM-14 requires the Chair of the Biodefense Steering Committee to send written requests for information to agencies with biodefense responsibilities, including 17 agencies mentioned in the NSPM. According to HHS officials agencies completed this collection of information in June 2019. NSPM-14 directs the Biodefense Coordination Team to use the information gathered to produce an overall assessment of federal biodefense programs and coordinate the assessment with National Security Council staff and OMB prior to its finalization and approval by the Biodefense Steering Committee. Under NSPM-14, this process will occur annually as part of the budget cycle. We characterized this element as included to some extent because efforts to complete it were underway at the time of our briefing in March 2019. Additionally, as we describe in the body of the report, we identified areas of this process to be clarified for future years’ efforts. Agency roles and responsibilities. The Strategy and associated plans did not include a description of the roles and responsibilities of the Executive Agencies, including internal and external coordination procedures, in identifying and sharing information, as described in the NDAA. The Strategy’s implementation plan includes over 240 activities, but it does not assign roles and responsibilities for performing those activities. However, NSPM-14 includes a requirement to establish these roles and responsibilities, and officials from all of the 8 agencies said agencies drafted a document assigning roles and responsibilities to each agency. This document was submitted for review to the National Security Council staff. Agency officials also discussed their engagement with nonfederal partners on the Strategy, as they play a vital role in the Strategy’s implementation. However, as we describe in the body of the report, more can be done to articulate the nonfederal role in implementing the Strategy. Additionally, NSPM-14 describes a governance structure and initial responsibilities for executive agencies, such as identification of a senior-level official as the focal point for all federal biodefense efforts. However, as described in the body of this report, additional clarity is needed on specific roles and responsibilities regarding decision-making and leadership. Therefore, we consider this element addressed to some extent. As of October 2019, the agencies took additional steps to address the elements listed in the NDAA. For example, the data collection of the programs, projects, and activities was complete, and the assessment of those data submissions was in draft form. Additionally, the agencies drafted metrics, milestones, and end states, as well as roles and responsibilities for the over 240 activities outlined in the Strategy’s Implementation Plan. However, both of these documents had not received final approval from the National Security Council staff, and the charter outlining roles and responsibilities for the Biodefense Coordination Team had not been finalized. Since 2009, we have identified broad, cross-cutting issues in leadership, coordination, and collaboration that arise from fragmentation throughout the complex interagency, intergovernmental, and intersectoral biodefense enterprise. The biodefense enterprise is the whole combination of systems at every level of government and the private sector that contribute to protecting the nation and its citizens. It is composed of a complex collection of federal, state, local, tribal, territorial, and private resources, programs, and initiatives designed for different purposes and dedicated to mitigating both natural and intentional risk. In June 2019, we testified before the Subcommittee on National Security, Committee on Oversight and Reform, House of Representatives on our past work, which has identified a number of key challenges related to the nation’s ability to detect and respond to biological incidents that transcend what any one agency can address on its own. They include: (1) enterprise-wide threat determination, (2) biodetection technologies, (3) emerging infectious disease surveillance, (4) situational awareness and data integration, and (5) biological laboratory safety and security. Agencies have taken steps to address many of the recommendations we and others have made in these areas, and we continue to monitor ongoing efforts. Enterprise-Wide Threat Determination Needed to Help Leverage Resources and Inform Resource Tradeoffs. We reported in October 2017 that opportunities remain to enhance threat awareness across the entire biodefense enterprise, leverage shared resources, and inform budgetary tradeoffs among various threats and agency programs. Key biodefense agencies, including DHS, DOD, HHS, USDA, and EPA carry out activities within their own mission spaces to better understand threats and help make decisions about biodefense investments. Additionally, federal agencies in our October 2017 review had mechanisms to support specific federal activities and individual programs, or in response to specific biological incidents after they begin to unfold. However, there was no existing mechanism that could leverage threat awareness information to direct resources and set budgetary priorities across all agencies for biodefense. Without a mechanism that is able to assess the relative risk from biological threats across all sources and domains, we found that the nation may be limited in its ability to prioritize resources, defenses, and countermeasures against the most pressing threats. In June 2019, we said implementation of the National Biodefense Strategy offers the potential for the nation to progress toward more integrated and enterprise-wide threat awareness and to use that information to identify opportunities to leverage resources, but this will take time and entails a change in the way participating agencies have traditionally operated. Challenges Determining Optimal Biodetection Technology Solutions. We have previously reported on the challenges of determining and then implementing technologies capable of identifying biological threats in the environment. Since 2012 we have reported that DHS has faced challenges in clearly justifying the need for the BioWatch program and its ability to reliably fulfill its primary task of detecting aerosolized biological attacks. According to DHS officials, DHS is in the early stages of Biodefense 21 (BD21), a multi-year acquisition effort. DHS plans to develop requirements based on collected environmental data and input from first responders, public health officials, and other partners determine what the replacement to BioWatch needs to be. As part of the early acquisition cycle for BD21, DHS is currently conducting a technology demonstration for trigger and sensor technology; therefore we cannot yet determine how it will be implemented in the future or what decisions DHS will ultimately make regarding the existing BioWatch system. Additionally, in August 2017 we reported that from a homeland security and public health perspective, threats of bioterrorism, such as anthrax attacks, and high-profile disease outbreaks, such as Ebola and emerging viruses like dengue, chikungunya, and Zika, highlight the continued need for diagnostic tests that provide early detection and warning about biological threats to humans. One option being explored is multiplex point-of-care technologies which can simultaneously test (in minutes to a few hours) for more than one type of human infectious disease pathogen from a single patient sample (such as blood, urine, or sputum) in one run at or near the site of a patient. These technologies may be used for diagnosing different diseases, including more common diseases such as influenza, emerging infectious diseases, or diseases caused by weaponized biological agents. Advances in biological detection technologies present opportunities to provide early detection and warning of catastrophic biological incidents, and in June 2019 we said the agencies responsible for implementing the National Biodefense Strategy will need to engage on this issue in a way that helps to drive informed investment tradeoff decisions about technology alternatives. We also recognized that the National Biodefense Strategy and its interagency governing leadership offer the potential for the nation to better define the role of detection technologies in a layered national biodefense capability to help those that pursue these technologies better articulate the mission needs and align requirements and concepts of operation accordingly. Challenges Building and Maintaining Emerging Infectious Disease Surveillance. We have reported that establishing and sustaining biosurveillance capabilities can be difficult for a myriad of reasons. For example, maintaining expertise in a rapidly changing field is difficult, as is the challenge of accurately recognizing the signs and symptoms of rare or emerging diseases. We reported in October 2011 that funding targeted for specific diseases does not allow for focus on a broad range of causes of morbidity and mortality, and federal officials have said that the disease- specific nature of funding is a challenge to states’ ability to invest in core biosurveillance capabilities. According to federal, state, and local officials, early detection of potentially serious disease indications nearly always occurs first at the local level, making the personnel, training, systems, and equipment that support detection at the state and local level a cornerstone of our nation’s biodefense posture. In May 2018, we reported that officials from HHS told us that their grant awards funded by annual appropriations are intended to establish and strengthen emergency preparedness and capacity building, but may not fully support the need for surge capacity that states and other jurisdictions require to respond to an infectious disease threat. Further, we reported in May 2018 that although the awards funded by supplemental appropriations have allowed state and local public health departments, laboratories, and hospitals to surge during a threat—for example, the H1N1influenza and Zika virus outbreaks—most of the 10 non-federal stakeholders we interviewed, as well as HHS officials said that the timing of these awards can result in challenges to carrying out preparedness and response activities during infectious disease threats. In June 2019, we reported that how and to what extent implementation of the National Biodefense Strategy is able to efficiently leverage and effectively sustain capacity across both nonfederal and federal stakeholders will affect how prepared the nation is to more quickly gear up for whatever challenges emerge when outbreaks of previously non- endemic diseases threaten the nation. We also noted that the Strategy and its interagency governance structure offer the opportunity to design new approaches to identifying and building a core set of surveillance and response capabilities for emerging infectious diseases. Ongoing Challenges to Fulfill Enhanced Situational Awareness and Data Integration Requirements. Our prior work has identified challenges at DHS and HHS related to the sharing, collecting, and integration of data from various federal and nonfederal agencies for their public health situational awareness and data integration efforts. We have reported that DHS’s National Biosurveillance Integration Center (NBIC), which was created to integrate data across the federal government with the aim of enhancing detection and situational awareness of biological incidents, has suffered from long-standing issues related to its clarity of purpose. Since 2009, we have reported that NBIC was not fully equipped to carry out its mission because it lacked key resources—data and personnel— from its partner agencies, which may have been at least partially the result of collaboration challenges it faced. In September 2015, we reported that despite implementing our prior recommendations and NBIC’s efforts to collaborate with interagency partners to create and issue a strategic plan that would clarify its mission and efforts, a variety of challenges remained. In October 2019, officials acknowledged that situational awareness and data integration are still very challenging problems to solve, but overall the relationships between NBIC and partner agencies are improving. Similarly, in 2017, we reported on long-standing challenges faced by HHS—such as planning and implementation shortfalls—to create a public health situational awareness network, not unlike that envisioned for DHS. In June 2019 we observed that because the National Biodefense Strategy identified biosurveillance data integration among several information sharing activities that need to be enhanced, its implementation offers the potential for the nation to better define what kind of integrated situational awareness is possible, what it will take to effectively and efficiently achieve it, and what value it has. Continued Oversight Needed to Enhance Biological Safety and Security. We—along with congressional committees—have, for many years, identified challenges and areas for improvement related to the safety, security, and oversight of high-containment laboratories. For example, in response to reported lapses in laboratory safety at HHS and DOD in 2014 and 2015, we examined how federal departments oversee their high-containment laboratories and found that most of the 8 departments and 15 agencies that we reviewed had policies that were not comprehensive or were not up to date. Additionally, we found that while the departments and agencies we reviewed primarily used inspections to oversee their high-containment laboratories, some of them were not routinely reporting inspection results, laboratory incidents, and other oversight activities to senior officials. In October 2017, we found that the Federal Select Agent Program—jointly managed by HHS and USDA—oversees laboratories’ handling of certain hazardous pathogens known as select agents and toxins, but the program does not fully meet all key elements of effective oversight. For example, the Federal Select Agent Program was not independent from all laboratories it oversees, and it had not assessed risks posed by its current structure or the effectiveness of its mechanisms to reduce organizational conflicts of interest. In June 2019, we said the National Biodefense Strategy highlights the need for continuous improvement of biosafety and biosecurity for laboratories and other facilities, creating an opportunity for interagency partners to develop additional oversight or other practices to mitigate the risk of bioincidents at high containment laboratories. Chris P. Currie at (404) 679-1875 or CurrieC@gao.gov Mary Denigan-Macauley at (202) 512-7114 or DeniganMacauleyM@gao.gov. In addition to the contacts named above, Kathryn Godfrey (Assistant Director); Nick Bartine and Susanna Kuebler (Analysts-in-Charge); Jeff Cirillo; Michele Fejfar; Eric Hauswirth; Tracey King; Jan Montgomery; Matt Ray; and Adam Vogt made key contributions to this report.", "summary": "GAO has reported on the inherent fragmented nature of the federal and nonfederal resources needed to protect the nation from potentially catastrophic biological threats. GAO called for a strategic approach to help the federal government better leverage resources and manage risk The White House issued the National Biodefense Strategy and the Presidential Memorandum on the Support for National Biodefense to promote a more efficient and coordinated biodefense enterprise. The National Defense Authorization Act for Fiscal Year 2017 included a provision that GAO review the strategy. This report addresses the extent to which the Strategy and implementation efforts are designed to enhance national biodefense capabilities and any implementation challenges that exist. GAO analyzed the Strategy, plans, and NSPM-14, and compared them to selected characteristics of GAO's work on effective national strategies, enterprise risk management, organizational transformation, and interagency coordination. GAO interviewed officials from the eight federal agencies that comprised the Biodefense Steering Committee to learn about early implementation. Issued in September 2018, the National Biodefense Strategy (Strategy) and implementation plan, along with National Security Presidential Memorandum-14 (NSPM-14), are designed to enhance national biodefense capabilities. NSPM-14 established a governance structure composed of relevant federal agencies and chaired by the Secretary of Health and Human Services (HHS) to guide implementation. It also required federal agencies with biodefense responsibilities to collect and assess data on their biodefense activities to, among other things, identify gaps. The Strategy defined the scope of the biodefense enterprise (which includes partners at all levels of government and the private sector) and brought all of the biological threats—intentional, accidental, and naturally-occurring—together, establishing an overarching vision, goals, and objectives. There are a number of challenges, however, that could limit long-term implementation success. Among other things, there was no documented methodology or guidance for how data are to be analyzed to help the enterprise identify gaps and opportunities to leverage resources, including no guidance on how nonfederal capabilities are to be accounted for in the analysis. Many of the resources that compose national capbilities are not federal, so enterprise-wide assessment efforts should account for nonfederal capabilities. Agency officials were also unsure how decisions would be made, especially if addressing gaps or opportunties to leverage resources involved redirecting resources across agency boundaries. Although HHS officials pointed to existing processes and directives for interagency decision making, GAO found there are no clear, detailed processes, roles, and responsibilities for joint decision-making, including how agencies will identify opportunities to leverage resources or who will make and enforce those decisions. As a result, questions remain about how this first-year effort to catalogue all existing activities will result in a decision-making approach that involves jointly defining and managing risk at the enterprise level. Without clearly documented methods, guidance, processes, and roles and responsibilities for enterprise-wide decision-making, the effort runs the risk of failing to move away from traditional mission stovepipes toward a strategic enterprise-wide approach that meaningfuly enhances national capabilities. GAO is making four recommendations to the Secretary of HHS, including working with other agencies to document methods for analysis and the processes, roles, and responsibilities for enterprise-wide decision making. HHS concurred with all the recommendations and described steps to implement them.", "document_type": "gao"}
{"report": "Maintenance for the nuclear elements of the fleet (i.e., aircraft carriers and submarines) is generally performed at the four public Naval shipyards, while maintenance for the conventional elements of the fleet (e.g., cruisers, destroyers, amphibious assault ships, and Military Sealift Command ships) is generally performed at private shipyards and ship repair companies throughout the United States, as shown in figure 1. A number of organizations and commands within the Navy share responsibilities for setting maintenance policies and planning, scheduling, and executing ship maintenance, from the offices of the Secretary of the Navy and Chief of Naval Operations, to fleet commanders and ships’ crews. Naval Sea Systems Command is the primary Navy ship maintenance organization. It is charged with, among other things, maintaining ships to meet fleet requirements within defined cost and schedule parameters; managing critical modernization, maintenance, and inactivation programs; life-cycle management of maintenance requirements; and management and oversight of the public naval shipyards. Its offices also perform contract administration, program management, and planning for future maintenance periods informed by the historical maintenance needs of Navy ships. Our work has found that the Navy has been generally unable to complete ship and submarine maintenance on time, resulting in reduced time for training and operations and additional costs in a resource-constrained environment. The Navy’s readiness recovery is premised on the adherence to set deployment, training, and maintenance schedules. However, we reported in May 2016 on the difficulty that both the public and private shipyards were having in completing maintenance on time. We reported that, from 2011 through 2014, about 72 percent of scheduled maintenance for surface combatants, and 89 percent of scheduled maintenance for aircraft carriers, was completed late. We updated these data as of November 2019 to include ongoing and completed maintenance periods through the end of fiscal year 2019, and found that the Navy continues to struggle to complete maintenance on time, as we discuss below. The Navy was unable to complete scheduled ship maintenance on time about 75 percent of the time during fiscal years 2014 through 2019, which equates to about 33,700 days of maintenance delays (see figure 2). Furthermore, these delays have been growing longer and more frequent. In fiscal year 2014, about 20 percent of the Navy’s maintenance periods were more than 90 days late. However, in fiscal year 2019, more than 57 percent of its maintenance periods were similarly late (see figure 3). When maintenance is not completed on time, there are two primary effects. First, fewer ships are available to conduct training or operations, which can hinder readiness. For example, in fiscal year 2019, maintenance delays resulted in the Navy losing the equivalent of 19 surface ships. Second, maintenance delays are costly. In November 2018, we examined attack submarine maintenance delays and reported that the Navy incurred significant operating and support costs to crew and maintain attack submarines that are delayed during maintenance periods. We estimated that from 2008 to 2018, the Navy spent $1.5 billion to support attack submarines that provided no operational capability—attack submarines sitting idle no longer certified to conduct normal operations—while waiting to enter the shipyards and those delayed in completing their maintenance at the shipyards. We recommended that the Navy analyze how it allocates its maintenance workload across public and private shipyards. DOD concurred with our recommendation, and in December 2018, the Navy analyzed its workload allocation and moved two additional attack submarine maintenance availabilities to the private shipyards, with the possibility of moving additional availabilities to the private sector over the next 5 years. The Navy’s ability to successfully maintain its ships—completing all required maintenance on-time and within estimated cost—is affected by numerous factors that occur throughout a ship’s lifecycle (see figure 4). Some of these factors involve decisions made during the acquisition phase, years before a ship arrives at a shipyard for maintenance, while others manifest during operational use of the ship or during the maintenance process, as illustrated in figure 4. These decisions can be interrelated; for example, decisions to increase deployment lengths to meet the Navy’s operational demands can result in declining ship conditions and material readiness. The declining condition of the ships can increase the time that ships spend undergoing maintenance at the shipyards. Increased maintenance time at shipyards can lead to decisions to make further operational schedule changes to extend deployment lengths for other ships to compensate for ships experiencing maintenance delays. While our statement today focuses on factors occurring during operations and the maintenance process, we have previously reported that long-term sustainment costs can be affected by decisions made early in the acquisition process. The decisions made during the acquisition phase of a weapon system can affect maintenance strategies used throughout the lifecycle, as 80 percent of a program’s operating and support costs are fixed at the time a program’s requirements are set and the ship is designed. For example, the littoral combat ship (LCS) program initially planned to operate the ship with 40 sailors using contractors to complete all of the onboard maintenance tasks. After challenges with the first LCS deployments, the Navy began revising the ships maintenance strategy, including adding more sailors onboard the ship. In addition, decisions to acquire or not acquire rights to technical data can have far-reaching implications for DOD’s ability to sustain the systems and competitively procure parts and services. Furthermore, the Navy has shown a willingness to provide ships to the fleet that still have a number of unresolved construction and quality deficiencies, which add to its maintenance burden. For example, the Navy delivered the USS Somerset amphibious transport dock to the fleet with 52 significant defects, including an electronic system crucial to the ship’s mission effectiveness that the fleet had to replace shortly after it received the ship. We have ongoing work on the effect that acquisition decisions can have on maintenance that we expect to issue in early 2020. Some causes of delays are created or exacerbated during an operational deployment. Our work has shown that to meet heavy operational demands over the past decade with a smaller fleet, the Navy has increased ship deployment lengths and has reduced or deferred ship maintenance. Decisions to reduce crew sizes between 2003 and 2012 also left crews overburdened and contributed to deferred maintenance. These decisions have resulted in declining ship conditions across the fleet and have increased the amount of time that ships require to complete maintenance in the shipyards. Increased maintenance periods, in turn, have compressed the time during which ships are available for training and operations. Specifically, the Navy: Decreased crew levels. We reported in 2017 that the Navy’s effort to reduce crew sizes between 2003 through 2012 corresponded with increases in maintenance costs that outweighed the savings achieved through reduced personnel costs. Navy officials told us that shifts in maintenance workload from the organizational- and intermediate- levels to depot-level maintenance increased overall maintenance costs. This change occurred in part because reduced crew sizes resulted in minor maintenance being deferred, which developed into more costly issues that had to be addressed later at the depot level. Extended deployments. We have previously reported that Navy decisions to extend deployments can lead to maintenance challenges, as these decisions have resulted in declining ship conditions across the fleet, and have increased the amount of time that ships require to complete maintenance in the shipyards. Deferred maintenance. We reported in 2015, 2016, and 2017 that maintenance deferred while a ship is deployed can develop into more costly issues that must be addressed later, often during depot-level maintenance. Deferred maintenance can lead to new work at the shipyards, as the degraded ship conditions result in the need for additional maintenance. For example, maintenance officials told us that the focus for ships homeported overseas is on mission readiness, so overseas-homeported ships place priority on the maintenance of combat systems. This means that systems with the potential to reduce ship service life—such as fuel and ballast tanks that require extended in-port periods to properly maintain—can be subject to maintenance deferrals in order to allow the ship to sustain a high operational tempo. In our prior work, we identified numerous challenges that occur during the Navy’s planning and execution of a ship’s maintenance period that contribute to delays. For example: Difficulties in adhering to the maintenance planning process. We reported in 2016 that the Navy must accurately define the work for each ship’s maintenance period. To do this, the Navy’s maintenance planning process specifies planning milestones intended to ascertain the ship’s condition, identify the work needed, and plan for its execution. Missing or meeting planning milestones late can contribute to maintenance delays. However, the Navy does not always adhere to its own maintenance planning process due to high operational tempo, scheduling difficulties, or personnel shortages, among other factors, resulting in shipyards discovering the need for additional repairs after maintenance has begun and adding time to the schedule for planning, contracting, or waiting for parts. Navy shipyards have shortages of skilled personnel. The Navy has reported a variety of workforce challenges at the four public shipyards such as hiring personnel in a timely manner and providing personnel with the training necessary to gain proficiency in critical skills. The Navy has noted that some occupations require years of training before workers become proficient. According to Navy officials, a large portion of its workforce is inexperienced. For example, we reported in December 2018 that 45 percent of the Puget Sound and 30 percent of the Portsmouth Naval Shipyards’ skilled workforce had fewer than 5 years of experience. According to DOD officials, workforce shortages and inexperience contribute to maintenance delays. For example, at Pearl Harbor Naval Shipyard in 2014 and 2015, two submarines were delayed approximately 20 months each, in part because of shortages in ship fitters and welders, among other skilled personnel. Most of DOD’s depots, which include the naval shipyards, have taken actions to maintain critical skills through retention incentives, bonuses, and awards. However, we found that neither the depots, their higher-level service component commands, nor the services have conducted an assessment to determine the effectiveness of these actions. The condition of facilities and equipment at Navy shipyards is generally poor. We reported in September 2017 that poor condition of facilities and equipment at the shipyards contributed to maintenance delays for aircraft carriers and submarines, hindering the shipyards’ ability to support the Navy. Specifically, we found that the average condition of shipyard facilities was poor and that shipyard equipment was generally past its expected service life. For example, four of the five dry docks at Norfolk Naval Shipyard face flooding threats from extreme high tides and storm swells and average one major flooding event per year. In 2009 a dry dock at Norfolk Naval Shipyard required emergency repairs to prevent flooding while the USS Tennessee (SSBN-734) was undergoing maintenance. According to the Navy’s report on the incident, several days of high tides and winds, coupled with multiple leaks in the dry dock’s granite block joints, resulted in the dry dock flooding at an estimated rate of 3,000 gallons per minute before workers could repair it. In addition, at Puget Sound Naval Shipyard—located in an area identified by the U. S. Geological Survey as a “High Seismic Hazard Zone”—a 7.0 magnitude or greater earthquake could damage or ruin the only dry dock on the west coast that is capable of performing maintenance on aircraft carriers. We have also previously reported that the Navy shipyards do not track when facility problems leads to maintenance delays. Furthermore, the average age of equipment at the shipyards is beyond its average expected service life (see table 1). Equipment that is past its expected service life can pose an increased risk for maintenance delays or higher maintenance costs, affecting the depots’ ability to conduct work. As we have previously reported, aging equipment can present a number of challenges, such as more frequent breakdowns, less effective or efficient operation, and safety hazards. The Navy shipyards lack the capacity to conduct required maintenance in the future. We also reported in 2019 that the naval shipyards cannot support 68 of the 218—almost a third—of the maintenance periods that aircraft carriers and submarines will require through 2040, due to a lack of dry dock capacity. Specifically, several of the Navy’s 17 dry docks will become obsolete after the Los Angeles-class submarines are retired because they will be too small or lack the appropriate shore-side support for newer classes of submarines. For example, only 14 dry docks can support the early- flight Virginia-class submarines and only 11 dry docks can support the Virginia-class submarines outfitted with the longer Virginia Payload Module. In addition, no dry docks can currently support repairs to the Ford class aircraft carrier, even though the Navy accepted delivery of the first ship of that class in 2017. Private shipyards have told the Navy that they could have some additional capacity to conduct maintenance, but are hesitant to invest in creating this capacity without more certainty from the Navy. The Navy has begun to implement a major effort—the Shipyard Infrastructure Optimization Plan—that is intended to significantly improve the condition of shipyard facilities and equipment, but it will require significant time and resources to implement. This plan is designed to address the bulk of the Navy’s dry-dock capacity issues as well as identify the optimal placement of facilities and major equipment at each public shipyard. The Navy estimates these changes can ultimately increase its maintenance efficiency by reducing the distance that workers and material will have to travel around the shipyards during the maintenance period. According to the Navy, this equates to recovering about 328,000 labor days per year—an amount roughly equal to that of an additional submarine maintenance period annually. In addition, the Navy has created a program office to oversee its shipyard improvement effort, which we believe demonstrates leadership attention and commitment to the effort. However, the Navy estimated that the replacement of the facilities will take 20 years (see figure 5). Further, the Navy estimates that it will take 30 years to bring the average age of its equipment to within industry standards. The Navy estimated in 2018 that this effort will require $21 billion over 20 years to implement. However, this $21 billion estimate does not include inflation and other significant costs, such as those for utilities, roads, or environmental remediation. Our analysis of the Navy’s preliminary estimate is that it is understated due to a lack of inflation adjustments, which could add billions to the final cost. Navy officials stated that the $21 billion estimate is an initial indicator of the scope of the effort and is not intended as a cost estimate in its budget. However, even that $21 billion estimate would require funding levels beyond what the Navy has requested for shipyard infrastructure in recent years. We recommended in November 2019 that the Navy should prepare more accurate cost estimates using best practices so that the Navy can request accurate funding from Congress and avoid common pitfalls associated with inaccurate estimates such as cost overruns, missed deadlines, and performance shortfalls. We recommended that the Navy take steps to improve its cost estimate prior to the start of its primary facility improvement effort; the Navy has concurred with this recommendation. The Navy has additional efforts underway that should help reduce maintenance delays, though the results of these efforts likely will not be seen for several years. For example: Revising the size of ship crews. The Navy has taken steps to address some of our recommendations regarding the size of ship crews. Specifically, the Navy has begun reviewing and revising its ship crew levels—most notably adding 32 crewmembers to its DDG- 51 destroyers and 23 crewmembers to its LPD-17 fleet. However, officials noted that the process to update crew levels throughout the fleet would take about 4 years to complete. The Navy will also need to demonstrate that it actually can assign crew members to these ships to meet the higher crew levels. We have ongoing work examining this issue and plan to report on our findings in winter of 2020. Hiring additional workers at shipyards. Shipyards have increased hiring, going from about 30,600 workers in fiscal year 2014 to about 37,400 workers in fiscal year 2019. However, Navy officials have stated that it takes several years for workers to reach full productivity. In the past, officials expected that new hires would take about 5 years to become fully productive, although the Navy has testified that they hope to reduce that time through new training techniques. Performance to Plan. The Navy has begun an analytical effort to better understand maintenance challenges and its capacity needs for the future, called “Performance to Plan.” According to Navy officials and plans, this effort is intended to help the Navy improve full and timely completion of maintenance, including for aviation, surface ships, and submarines. For example, the effort for surface ship maintenance currently involves a pilot program looking at how to better plan and execute maintenance periods for DDG 51-class destroyers, including examining how to improve the accuracy of forecasted maintenance requirements and duration and better adhere to planning milestones, among other outcomes. We are encouraged by this effort, but note that it remains in the early stages, and it is not clear whether or when the pilot effort will be extended to examine the entire surface fleet. In sum, the Navy faces significant challenges in maintaining its current fleet and reaping full benefit of the ships it has in its inventory today due to persistent and substantial maintenance delays. The Navy has made progress identifying the causes of their maintenance challenges and has begun efforts to address them. However, delays continue to persist and these challenges will require years of continued management attention and substantial investment to be resolved. As part of this sustained management attention, the Navy would benefit from a continued focus on implementing our prior recommendations. Since 2015, we have made 17 recommendations to the Navy to address various concerns we identified with its maintenance process. The Navy agreed with 14 of those recommendations, partially concurred with 1 recommendation, and disagreed with 2 recommendations. However, as of November 2019, the Navy had fully implemented 6 of these recommendations. While the Navy has taken some additional action on the 11 remaining unimplemented recommendations, taking additional steps to fully address these recommendations could help the Navy address its maintenance challenges and better position it to sustain the current and future fleet. Looking to the future, the Navy is seeking to grow the fleet over the next 15 years. However, if it increases the size of the fleet before addressing its maintenance challenges, it is likely that the Navy will be faced with a growing number of both maintenance delays and ships that are unavailable for use. Even assuming the Navy’s efforts to improve shipyard operations succeed, it will be years before the Navy can maintain a significantly larger fleet. Chairmen Perdue and Sullivan, Ranking Members Hirono and Kaine, and Members of the Subcommittees, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have questions about this testimony, please contact Diana Maurer, Director, Defense Capabilities and Management at (202) 512-9627 or maurerd@gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Suzanne Wren (Assistant Director), James Lackey (Analyst-in-Charge), A. S. Bagley, Chris Cronin, Amie Lesser, Felicia Lopez, Tobin McMurdie, Carol Petersen, Clarice Ransom, Matt Thompson, and Sally Williamson. In recent years, we have issued a number of reports related to ship and submarine maintenance. Table 1 summarizes the recommendations in these reports. The Department of Defense (DOD) concurred with most of the 17 recommendations; however, to date DOD has fully implemented 6 of the recommendations. For each of the reports, the specific recommendations and any progress made in implementing them are summarized in tables 2 through 9. Report numbers with a C or RC suffix are classified. Report numbers with a SU suffix are sensitive but unclassified. Classified and sensitive but unclassified reports are available to personnel with the proper clearances and need to know, upon request. Report numbers with a T suffix are testimonies. Naval Shipyards: Key Actions Remain to Improve Infrastructure to Better Support Navy Operations. GAO-20-64. Washington, D.C.: November 25, 2019. Military Depots: Actions Needed to Improve Poor Conditions of Facilities and Equipment that Affect Maintenance Timeliness and Efficiency. GAO-19-242. Washington, D.C.: April 29, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Wil Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Affecting the Attack Submarine Fleet. GAO-19-192C. Washington, D.C.: October 31, 2018 Military Readiness: Update on DOD’s Progress in Developing a Readiness Rebuilding Plan. GAO-18-441RC. Washington, D.C.: August 10, 2018. (SECRET) Navy Shipbuilding: Past Performance Provides Valuable Lessons for Future Investments. GAO-18-238SP. Washington, D.C.: June 6, 2018. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: April 25, 2018. Columbia Class Submarine: Immature Technologies Present Risks to Achieving Cost Schedule and Performance Goals. GAO-18-158. Washington, D.C.: December 21, 2017. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Affecting the Fleet. GAO-17-809T. Washington, D.C.: September 19, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions that Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Facing the Fleet. GAO-17-798T. Washington, D.C.: September 7, 2017. Navy Shipbuilding: Policy Changes Needed to Improve the Post-Delivery Process and Ship Quality. GAO-17-418. Washington, D.C.: July 13, 2017. Department of Defense: Actions Needed to Address Five Key Mission Challenges. GAO-17-369. Washington, D.C.: June 13, 2017. Navy Force Structure: Actions Needed to Ensure Proper Size and Composition of Ship Crews. GAO-17-413. Washington, D.C.: May 18, 2017. Military Readiness: DOD’s Readiness Rebuilding Efforts May Be at Risk without a Comprehensive Plan. GAO-16-841. Washington, D.C.: September 7, 2016. Navy and Marine Corps: Services Face Challenges to Rebuilding Readiness. GAO-16-481RC. Washington, D.C.: May 25, 2016. (SECRET//NOFORN) Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Navy Force Structure: Sustainable Plan and Comprehensive Assessment Needed to Mitigate Long-Term Risks to Ships Assigned to Overseas Homeports. GAO-15-329. Washington, D.C.: May 29, 2015. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The 2018 National Defense Strategy emphasizes that restoring and retaining readiness is critical to success in the emerging security environment. The Navy is working to rebuild its readiness while also growing and modernizing its aging fleet of ships. A critical component of rebuilding Navy readiness is implementing sustainable operational schedules, which hinge on completing maintenance on time. We have reported that the Navy faces persistent challenges with completing required maintenance on time. This statement provides information on (1) the magnitude of maintenance delays for Navy ships and submarines, (2) factors contributing to maintenance delays, and (3) the Navy's efforts to address these factors. GAO also discusses its prior recommendations on the factors contributing to Navy maintenance delays and the Navy's progress in addressing the recommendations. This statement is based on previously published work from 2015 through 2019 on Navy maintenance, ship acquisition, crew size, ship maintenance and deployment schedules, the condition of Naval shipyards, and recruiting skilled maintenance personnel. The Navy continues to face persistent and substantial maintenance delays that affect the majority of its maintenance efforts and hinder its attempts to restore readiness. From fiscal year 2014 to the end of fiscal year 2019, Navy ships have spent over 33,700 more days in maintenance than expected. The Navy was unable to complete scheduled ship maintenance on time for about 75 percent of the maintenance periods conducted during fiscal years 2014 through 2019, with more than half of the delays in fiscal year 2019 exceeding 90 days. When maintenance is not completed on time, fewer ships are available for training or operations, which can hinder readiness. GAO identified multiple factors that contribute to maintenance delays, including insufficient shipyard capacity, shortage of skilled personnel, and deferred maintenance during operational deployments, among others. Ships awaiting or delayed in maintenance incur operating and support costs. For example, GAO estimated that the Navy spent more than $1.5 billion in support costs from fiscal years 2008 through 2018 due to delayed maintenance for attack submarines. The Navy has several efforts underway to improve its maintenance operations, but they will take years to implement, and will require sustained management attention and funding above current levels. For example, the Navy estimates it will take 20 years to improve the infrastructure at its shipyards, 4 years to restore ship crew levels, and several years to improve maintenance planning. Until the Navy addresses these challenges, it will be hindered in its ability to rebuild readiness and prepare for the future, particularly as it grows the size of the fleet. GAO made 17 recommendations in prior work cited in this statement. The Department of Defense generally concurred with most of GAO's recommendations, and has fully implemented 6. Continued attention is needed to ensure that the remainder of these recommendations are addressed.", "document_type": "gao"}
{"report": "Drawback refunds are a remittance of up to 99 percent of duties, taxes, or fees previously paid by an importer. CBP makes these refunds on imported goods on which the importer previously paid duties, taxes, or fees, and subsequently exported from the United States or destroyed. (See fig. 1.) According to CBP, the rationale for the drawback program was to encourage American commerce and manufacturing. It permits American manufacturers to compete in foreign markets without the handicap of including in their costs, and consequently in their sales price, the duty they paid on imported merchandise. Claimants can apply for and obtain the privilege of accelerated payment of drawback refunds. Accelerated payment allows estimated drawback refunds to be paid prior to liquidation of the drawback entry, provided that, among other things, claimants have acquired and posted with CBP a bond in an amount sufficient to cover the estimated amount of drawback to be claimed. There are three main categories of drawback refunds: (1) manufacturing drawback (direct identification and substitution), (2) unused merchandise drawback (direct identification and substitution), and (3) rejected merchandise drawback. Within each category, there are variations in drawback eligibility, such as the ability to substitute imported merchandise. a. Direct identification manufacturing drawback may be claimed on exported or destroyed articles that have been manufactured or produced in the United States with imported duty-paid merchandise, if those articles have not been used in the United States prior to export or destruction under CBP supervision. For example, a claimant could claim a drawback refund on exported pants made in the United States using imported foreign fabric. (See fig. 2.) b. Substitution manufacturing drawback may be claimed on exported or destroyed articles that have been manufactured or produced in the United States using domestic merchandise substituted for imported duty-paid merchandise meeting the statutory criteria, where the articles have not been used in the United States. As a result, domestic producers can select the most advantageous sources for their raw materials and components without regard to duties, saving them production costs. For example, a claimant could claim a drawback refund on exported pants made in the United States using domestic fabric substituted for imported foreign fabric. (See fig. 3.) a. Direct identification unused merchandise drawback may be claimed on imported merchandise that was exported or destroyed under CBP supervision, without having been used within the United States. For example, a claimant could claim a drawback refund on unused imported designer dresses upon their destruction. (See fig. 4.) b. Substitution unused merchandise drawback may be claimed on goods that were exported or destroyed under CBP supervision, without being used, and were substituted for imported merchandise meeting the appropriate criteria. For example, a claimant could claim a drawback refund on exported cars substituted for imported foreign-made cars. (See fig. 5.) 3. Rejected merchandise drawback may be claimed upon the exportation or destruction under CBP supervision of imported duty- paid merchandise entered or withdrawn for consumption, provided it meets the statutory criteria (i.e., not conforming to sample or specifications, shipped without consent, determined to be defective at the time of import, or ultimately sold at retail and returned). For example, a claimant could claim a drawback refund on foreign fabric it imported but returned to the seller because the fabric did not conform to the specification of the claimant’s order. (See fig. 6.) During calendar years 2009 through August 21, 2019, the total amount of drawback refunds claimed ranged from $631.6 million to $1.4 billion. The amount of drawback refunds claimed varied from year to year, but generally rose between 2011 and 2016. Overall, in dollar terms, substitution unused merchandise drawback remained the largest category of drawback refund, as shown in table 1. As originally enacted in 1789, the drawback program was limited to duties paid on certain imported merchandise if the merchandise was exported within a year. In the 1930s, drawback claimants could use substituted merchandise for imported merchandise in specified circumstances. Congress has continued to allow substitution for drawback refunds in various forms. (See fig. 7.) The U.S. International Trade Commission publishes and maintains the HTS. The HTS is used to determine tariff classifications for goods imported into the United States. Each item imported into the United States is classified in a category with an assigned 8-digit HTS subheading number. The category may be subdivided into 10-digit HTS subheading numbers for statistical purposes. The 4-digit and 6-digit nomenclature is consistent internationally. CBP is responsible for fixing the final classification. For unused merchandise substitution drawback claims, TFTEA also allows drawback using the U.S. Department of Commerce Schedule B commodity number. Pub. L. No. 114-125, § 906(e)(4). We do not discuss the use of the Schedule B commodity number in this report because, according to CBP, it is very rare that the Schedule B commodity number is not identical to the HTS number. stating that importers are now jointly and severally liable with claimants for refunds associated with their imported goods. Treasury and CBP had 2 years from the date of enactment of TFTEA to promulgate regulations implementing the TFTEA drawback provisions. TFTEA also provided for an additional 1-year transition period (February 24, 2018–February 23, 2019) during which drawback claimants could file under either the amended provisions or the drawback law as it previously existed. When the government did not meet the 2-year deadline for issuing regulations, which lapsed on February 24, 2018, a number of companies filed suit. Subsequently, Treasury and CBP published the Modernized Drawback Notice of Proposed Rulemaking in the Federal Register on August 2, 2018 and separately published the Regulatory Impact Analysis of the Modernized Drawback Notice of Proposed Rulemaking. In an October 12, 2018 order, the Court of International Trade ordered the United States to file the final rule developed pursuant to the Modernized Drawback Notice of Proposed Rulemaking with the Office of the Federal Register by December 17, 2018. The government met that deadline, publishing the Modernized Drawback Final Rule in the Federal Register and the Regulatory Impact Analysis of the Modernized Drawback Final Rule (RIA). In the final rule, CBP summarized and responded to public comments received on the Modernized Drawback Notice of Proposed Rulemaking and established new policies and procedures for the drawback program pursuant to TFTEA. In the RIA, CBP provided its predictions of the impact—primarily in terms of costs, benefits, and revenue transfers—of key changes to the drawback program on industry and the U.S. government. CBP did not make accelerated payments on or liquidate any TFTEA drawback claims until the final rule was issued. CBP also did not make any drawback payments during the partial federal government shutdown (December 22, 2018– January 25, 2019). Under drawback modernization, CBP transitioned its filing process for making claims for payment under the drawback program from its Automated Commercial System (ACS) to its Automated Commercial Environment (ACE). Previously, CBP required claimants to file a paper claim, and electronic transmission of a claim summary through ACS was optional. TFTEA required claimants to file all claims electronically on and after February 24, 2018, but also allowed for a 1-year transition period where claims could be filed under the existing drawback statute or under the statute as amended by TFTEA. CBP designated ACE as the electronic system for filing drawback claims. CBP initially partially deployed ACE for the drawback program on February 24, 2018, to allow electronic filing of claims. During the transition period, claimants could file claims under the existing drawback process (detailed in 19 C.F.R. part 191) or under the new drawback process (detailed in 19 C.F.R. part 190). CBP fully deployed ACE for the drawback program on February 24, 2019, the first day after the transition period when all drawback claims had to be filed under the amended statute and implementing regulations. After CBP mandated electronic filing in ACE, drawback entry summary data had to be filed at the more detailed line item level. ACE has expanded capabilities, such as accounting for line item reporting for drawback claims and automatically validating drawback claims against underlying import entries. Changes in the broader trade policy context may also impact CBP’s drawback program. In particular, 2018 witnessed a series of presidential and agency actions that resulted in higher tariffs on a range of goods. For example, in January 2018, the President issued Presidential Proclamation 9693 and Presidential Proclamation 9694, imposing tariff rate quotas and increased duties on imports of solar cells and panels, and washing machines and parts, effective February 7, 2018. Further, at the direction of the President, the United States Trade Representative has imposed additional duties on products of China in four tranches, in June 2018, August 2018, September 2018, and August 2019. According to the United States Trade Representative request for comments on a modification to the fourth tranche, the four tranches cover an annual aggregate trade value of approximately $550 billion. CBP has determined that the aforementioned tariffs (commonly referred to as section 201 and 301 duties, respectively) are eligible for drawback refunds and issued guidance on how to make such claims. For fiscal year 2019, Treasury reported that it collected $70.8 billion in customs duties, as compared to $41.3 billion in fiscal year 2018. Within the Department of Homeland Security, CBP’s Office of Trade is primarily responsible for managing the drawback program. CBP officials described the roles and responsibilities of the several offices within CBP that are involved, as follows: Trade Policy and Programs. The Office of Trade Policy and Programs provides policy and program oversight for the drawback program. Field Operations. The Office of Field Operations is responsible for implementing the drawback program, including ensuring that the Drawback Centers have the resources—allocations, staffing, equipment—to perform their duties and meet CBP’s trade mission. Drawback Centers. Drawback specialists located in one of the four Drawback Centers in Chicago, Houston, Newark, or San Francisco are responsible for reviewing and processing drawback claims. They review claims, in whole or in part, to determine eligibility for drawback refunds. (Appendix II describes CBP’s steps for filing and processing drawback claims.) They also review and make determinations concerning claimants’ (1) requests for drawback privileges for accelerated payment and waiver of prior notice, (2) applications for certain manufacturing rulings, and (3) protests of denied claims. Regulations and Rulings. The Office of Regulations and Rulings is responsible for issuing various types of binding rulings and decisions on drawback refunds. These include decisions on protest applications flagged for further review by the Drawback Centers as well as prospective ruling requests filed by drawback applicants, such as rulings on specific manufacturing drawback rulings and on the proper classification of merchandise for substitution manufacturing drawback. In addition to issuing binding rulings, the Office of Regulations and Rulings is responsible for drafting any regulatory changes involving the drawback program and provides technical advice for drawback policy and litigation. TFTEA generally expanded eligibility for drawback refunds, with some caveats, but CBP is not adequately managing its growing workload of claims resulting from the changes. The substitution standard for drawback claims under TFTEA generally allowed more merchandise to potentially qualify for drawback refunds. However, it also limited the eligibility of certain broadly categorized merchandise. TFTEA also expanded the scope of the refund of taxes and fees for manufacturing claims and standardized time limits to file claims. On balance, these changes, along with certain limitations in CBP’s Automated Commercial Environment (ACE), have led to an increase in the workload of drawback specialists. However, CBP did not anticipate the increased workload and does not have a plan to manage the increased workload, which has caused delays resulting in uncertainty for industry—potentially impeding trade. Change of substitution standard: According to CBP officials, the most significant change resulting from TFTEA is that it is now easier to substitute merchandise and still qualify for drawback refunds. TFTEA changed the substitution standard for certain drawback types, with new rules reflecting a shift from a subjective to a more objective standard. Previously, CBP applied a subjective ‘‘same kind and quality’’ standard for manufacturing substitution drawback and ‘‘commercially interchangeable’’ standard for unused merchandise drawback. For example, CBP did not permit a U.S.-based clothing manufacturer, Jockey, to substitute light blue underwear for dark blue underwear for an unused merchandise drawback claim before modernization. In 1995, Jockey submitted a request to CBP for a “commercially interchangeable” ruling to permit it to substitute underwear that is the same size, style, and specification, but different in color and part number—for example, substitute light blue underwear for dark blue underwear. CBP ruled that Jockey underwear was not “commercially interchangeable” for the purpose of the unused merchandise substitution drawback. Under the new substitution standard for manufacturing drawback and unused merchandise drawback, both the imported merchandise and the substituted merchandise generally must match at the 8-digit or 10-digit HTS classification to be eligible for drawback refunds. The new substitution standard has made more merchandise eligible for drawback refunds, such as the Jockey underwear that would now be eligible for unused merchandise substitution drawback, as shown in the example for one type of product in figure 8 below. It has also enabled automatic acceptance and verification of drawback claims in ACE. CBP officials told us that they had seen an increase in new claimants as a result of the changes to the substitution standard, among other factors. According to industry representatives we interviewed, the changes to the substitution standard have enabled new companies to file for drawback refunds and have expanded eligibility for existing clients. For example, they stated that the changes to the substitution standard have allowed the automotive industry to substitute domestic car exports for imported foreign-made cars, as mentioned earlier. One industry representative noted that as a result of the new substitution standard, an automotive company that had been recovering about $2 million in drawback refunds per year before TFTEA can now recover about $20 million a year. Drawback trading: The new substitution standard may also broaden the scope for “drawback trading,” according to industry representatives we interviewed. They described “drawback trading” as matching excess import and export activity through the use of a third-party special purpose entity that exists for the sole purpose of maximizing drawback refund recovery between currently unrelated importers and exporters with no existing commercial relationship. CBP officials we spoke to did not think the new substitution standard should have any bearing on the potential for “drawback trading.” CBP officials explained that although the substitution standard for certain drawback claims had changed, TFTEA should not significantly affect “drawback trading” because, as before TFTEA, the claimant would still need to fulfill the possession and assignment standards. Finished petroleum derivative drawback claims do not have a possession requirement. CBP has permitted drawback where a company set up relationships with the importer and exporter expressly to maximize drawback for finished petroleum derivatives. Limitation of basket provisions from unused merchandise substitution drawback: While TFTEA’s change to the use of HTS classifications generally expanded eligibility for certain drawback substitution claims, it concurrently limited eligibility in certain situations. Specifically, TFTEA prohibited eligibility for unused merchandise substitution of merchandise that is classified as “other” at both the 8-digit and 10-digit HTS subheadings for drawback refunds. Such classifications are considered basket provisions. For example, shrimps and prawns that fall under the HTS 1605.21.10.30 basket provision, as shown in figure 9, are not eligible for substitution unused merchandise drawback, as follows. If the shrimps and prawns are not in airtight containers, and are not products containing fish meat or prepared meals, they fall under “other” at the 8-digit HTS subheading (1605.21.10). If these shrimps and prawns are also frozen but not breaded, they fall under “other” at the 10-digit HTS statistical suffix (1605.21.10.30), categorizing them in a basket provision. According to CBP, the products most affected by the limitation on basket provisions from unused merchandise substitution drawback based solely on 2016 HTS counts will be screws, nuts, and bolts; motor vehicle parts and accessories; and transmission shafts. One company we spoke with had been able to claim over $1 million in unused merchandise substitution drawback a year prior to modernization, for an imported ceramic substrate used for cleaning emissions in cars. The company also makes domestically sourced ceramic substrate, which it exports. CBP considered these two products commercially interchangeable. However, according to the company, the ceramic substrate is classified as a basket provision and the company is no longer eligible for drawback refunds. from the same inventory. If the imported item is substituted for an exported item that is not fungible with the imported item, it does not qualify for direct identification. able to administer the new statistical reporting number. For example, the article description must be clear, the HTS classification must be correct, and the new number must not require difficult or prohibitively expensive laboratory or other testing. If merchandise is not eligible for direct identification drawback but is classified as a basket provision, it may still qualify for a drawback refund if a company can successfully petition the Committee for Statistical Annotation of Tariff Schedules for new 10-digit HTS statistical breakouts. However, such a workaround is time-intensive and not guaranteed, according to an industry representative. In one example, the representative explained that a chemical company with a product classified as a basket provision successfully petitioned for a new statistical breakout. The company produces chemical methanol and was unable to file a TFTEA drawback claim in 2018 because of the basket provision restriction. Such requests are generally considered by the committee twice a year. Standardizing time limits: TFTEA also expanded eligibility for drawback refunds by standardizing the drawback filing deadline. Previously, drawback claim filing deadlines varied based on type of claim and time between import and export or destruction, ranging from 3 years to 5 years from importation to exportation or destruction, followed by a 3-year window to file a claim. TFTEA generally standardized the timelines for the acceptance of claims to be up to 5 years from import. CBP expects the new eligibility time frames will give some drawback claimants more time to file for drawback and potentially increase drawback eligibility for some claimants. Expanding taxes and fees: TFTEA expanded the scope of drawback refunds by explicitly including taxes and fees for manufacturing drawback claims. Prior to TFTEA, the drawback statute did not specify that taxes and fees were eligible for manufacturing drawback. TFTEA extended drawback refunds to taxes and fees for manufacturing claims. Some industry representatives we spoke to told us they were benefiting from this expansion. For example, a representative from the U.S. oil industry noted that the new law is “much more lucrative” for oil companies that refine crude oil because they can now get drawback refunds on the oil spill tax and harbor maintenance fee. CBP has not adequately managed the growing workload drawback specialists have been experiencing since TFTEA. Drawback specialists told us that they had been experiencing increasing workloads since CBP implemented the changes from TFTEA. The largest Drawback Centers expect their backlog of old claims will take about 5 years to work through. This workload is the cumulative result of various factors that have caused delays with processing claims, rulings, and privileges applications. The workload of the Drawback Centers is growing because of a learning curve related to the switch from a paper-based to an electronic process, delays in processing claims, and an increase in the number of claims, as discussed below. Further, the Drawback Centers continue to face staffing shortages. Learning curve: According to CBP officials, drawback specialists face a learning curve as they become familiar with ACE and the new rules for drawback refunds. They explained that drawback specialists are still working through pre-TFTEA claims that were migrated into ACE. From January 1, 2019 to September 13, 2019, CBP Drawback Centers liquidated about 18 percent of the value of the remaining claims filed in CBP’s Automated Commercial System (ACS) and about 27 percent of the number of remaining claims filed in ACS. For TFTEA claims, CBP provided in-person training to drawback specialists before the final regulations were issued, as well as in May 2019 and September 2019. CBP has also been updating its guidance for processing claims, and, according to officials, plans to continue to offer trainings for drawback specialists as it finalizes the guidance. Nevertheless, adjusting to the changes has hampered the efficiency of drawback specialists. For example, drawback specialists explained that they had to learn to toggle between different systems that require separate logins to review event history, file uploads, and tax information within ACE in order to fully process a claim. Delays in processing claims: CBP faced a delay in processing drawback claims because of a hold relating to the issuance of the drawback final rule. Claimants could begin filing TFTEA claims on February 24, 2018, but CBP did not process any of these claims pending the final rule— which CBP issued on December 17, 2018. As a result, all 18,319 claims filed during this 10-month period were put on hold. CBP lifted the hold when the final rule was issued. CBP’s workload continued to grow because certain TFTEA manufacturing claims were on hold. Following TFTEA, the proposed and final rule required claimants who wanted to operate under an existing manufacturing ruling to file a supplemental application for a limited modification to the existing ruling, as previously discussed. According to CBP interim guidance, to ensure compliance with TFTEA drawback requirements, a limited modification must include a bill of materials or formula, annotated with the applicable HTS subheading numbers. Claimants who did not apply for a limited modification by February 23, 2019, would need to apply for a new manufacturing ruling. CBP received about 800 applications for limited modifications, which it began approving on September 16, 2019. Between February 2019 and July 2019, CBP also received about 50 applications for new manufacturing rulings, which it has not yet begun to process. These processes remain paper-based (see fig. 10). CBP officials explained that CBP generally does not process manufacturing drawback claims until claimants are issued up-to-date ruling numbers. Until the new or modified manufacturing rulings are approved, CBP officials explained, they will not provide accelerated payment or process manufacturing claims. Moreover, some manufacturing rulings can take years to finalize. For example, one chemical company noted that CBP’s lab analyzes every piece of the manufacturing process, and as a result, it is awaiting final decisions on new manufacturing rulings from 2013. Increase in number of claims: CBP has also seen an increase in the number of drawback claims because of TFTEA’s changes to the drawback program and limitations in ACE. Prior to TFTEA, the number of drawback claims per calendar year ranged from 11,690 to 13,291. CBP saw a large increase in the number of drawback claims in 2018 and 2019. (See table 2.) CBP limited the number of lines in a drawback claim in ACE, which increased the number of drawback claims filed. Prior to TFTEA, claims were not limited by line. Because of system constraints, claims filed in ACE are restricted to 10,000 lines per claim. CBP had predicted that this ACE line limitation would increase the number of claims by a factor of four. Evidence to date indicates a significant increase in workload for certain Drawback Centers. For example, the Chicago Drawback Center noted that two claimants had filed over 4,000 claims between February 24, 2018 and February 23, 2019, whereas these same claimants had filed less than 50 claims in the prior year. According to the industry representatives we spoke with, the line limit in ACE added more work for industry and CBP because it made it necessary for claimants to break up the volume of their claims into different applications. For example, one broker used to file drawback claims four times a year on behalf of one refinery, but now has to file 300 times per year to account for the line limit. Drawback specialists pointed out that each claim stands on its own. As a result, they explained that they must liquidate each claim in ACE, which involves a number of quality control steps such as verifying that the claim is ready to be liquidated, relevant rulings are valid, and all validation activities are complete. As discussed earlier, the changes to the substitution standard have also led to an increase in new drawback claimants, according to CBP officials. CBP has received applications from over 500 new claimants since February 24, 2018. New claimants require additional work, including drawback specialists’ manual reviews of claims, privilege applications, and ruling requests, as follows. Claims. Drawback specialists explained that drawback claims from new claimants are subject to a full desk review. The specialists will request supporting documentation to ensure that the appropriate statutory and regulatory requirements are met. They also determine drawback due on the basis of the completed drawback claim, the applicable general manufacturing drawback ruling or specific manufacturing drawback ruling, and any other relevant evidence or information. According to CBP, the time it takes a drawback specialist to conduct a full desk review varies by claim, based on the nature of the claim and the experience of the drawback specialist. CBP reported that it could take more than 3 years for CBP to conduct a full desk review and determine the final disposition of a drawback claim. Privilege applications. Claimants can also apply for privileges including accelerated payment privileges, a waiver of prior notice of intent to export or destroy, or a one-time waiver of prior notice of intent to export or destroy. Claimants must continue to submit paper applications for such privileges and drawback specialists must manually review the privilege applications. According to CBP, most claims are eligible for accelerated payment of drawback refunds. Manufacturing rulings. Lastly, if a claimant is seeking either a direct identification manufacturing drawback or a substitution manufacturing drawback, it must manually apply for a manufacturing ruling using a paper form submitted through email, which may require significant documentation and review, as discussed earlier. CBP maintains the manufacturing rulings as paper files. For example, the Drawback Center in Newark stores manufacturing rulings in rows of filing cabinets. (See fig. 11.) Additionally, CBP has not been able to respond to all privilege applications within 90 days, as set forth in the regulations. Between February 2018 and July 2019, CBP received almost 600 new privilege applications. CBP missed the 90-day deadline about 60 percent of the time. According to drawback specialists, they missed this deadline because of their workload. According to an industry representative, delays in processing privilege applications mean companies cannot receive their drawback money in a timely manner. Such delays cause uncertainty for industry, potentially impeding trade. Drawback specialists face new obstacles to managing automatic liquidation of drawback claims in ACE. According to CBP officials, previously, drawback specialists had at least 10 days of lead time to address an automatic liquidation. Now, Drawback Centers must continually monitor the automatic liquidation reports. Because of the way ACE operates, drawback specialists may only have 1 day of lead time before a claim automatically liquidates. According to drawback supervisors, such monitoring is significantly increasing their workload. Further, drawback specialists told us that one way they were managing their increased workload was by extending automatic liquidation, which can be done up to three times, as discussed in appendix II. This practice goes directly against CBP’s guidance. Moreover, if they continue this practice, specialists may be forced to liquidate claims at zero if they run out of extensions. Further, as the workload continues to grow, Drawback Centers continue to face staffing shortages. As of October 26, 2019, CBP met the congressionally mandated staffing level for drawback specialists of 37 for the first time in over 5 years. In CBP’s 2017 Resource Optimization Model, it reported an optimal staffing level of 40 to meet its drawback staffing needs. CBP’s staffing level of 37, as of October 2019, did not meet this target. According to CBP officials, although Drawback Centers are utilizing overtime, the drawback specialists are not able to keep up with the influx of work. CBP has not adequately managed its drawback workload because it did not anticipate the increase in workload and did not plan for the increase accordingly. Federal standards for internal control note that management should evaluate performance and hold individuals accountable for their internal control responsibilities, which include evaluating pressure on personnel to help personnel fulfill their assigned responsibilities in accordance with the entity’s standards of conduct. Management can adjust excessive pressures using many different tools, such as rebalancing workloads or increasing resource levels. However, CBP has not brought staffing to its optimal level, and has not adjusted the workload in Drawback Centers through ACE to account for the increase in claims, rulings, and privilege applications. Prior to TFTEA, CBP officials explained that CBP could not control the workload of the Drawback Centers because claimants mailed their paper-based claims to the Drawback Center of their choice. Now, CBP has greater visibility and flexibility to potentially control the work flow to the Drawback Centers through ACE, but has not done so. CBP officials said they had anticipated that ACE automation would reduce drawback specialists’ workload, but experience, to date, indicates that workload increased. Until CBP develops a plan for managing its increased workload, it risks further delays in drawback claim processing that result in uncertainty for industry, potentially impeding trade—which runs counter to its strategic goal of enhancing U.S. competitiveness by enabling lawful trade and travel, such as by reducing barriers to the efficient flow of trade and streamlining and unifying processes and procedures. CBP has taken steps to mitigate improper payment risks in the drawback program. Specifically, CBP expects three key changes to the drawback process under modernization will strengthen its ability to validate claims and recover inaccurately claimed drawback refunds: (1) requiring electronic filing in ACE, (2) extending the record retention period, and (3) broadening liability. However, CBP has not addressed several other risks for improper payments in the drawback program. These risks relate to (1) limitations in CBP’s existing desk review process, (2) establishing electronic proof of export, and (3) targeting a selection of claims for review. TFTEA contained provisions amending the drawback statute that CBP expects will help it to remediate certain internal control deficiencies over drawback claim processing. Prior independent audits identified significant or material internal control weaknesses related to CBP’s processing of drawback claims, including that CBP’s drawback system lacked effective automated controls to prevent the overpayment of drawback claims and that the record retention period was not appropriate to ensure that support for drawback claims was maintained for the length of the drawback claim lifecycle. CBP expects that three key changes to the drawback process under modernization will strengthen its ability to validate claims and recover inaccurately claimed drawback refunds, as follows. Requiring the electronic filing of drawback claims. On February 24, 2019, the drawback program fully transitioned to ACE. Specifically, all drawback claims are now required to be filed electronically in ACE and include drawback entry summary data at the more detailed line item level. Line item reporting requires claimants to provide certain relevant information for the designated imported merchandise on a drawback claim associated with the line item on an import entry summary, including the tariff classification, quantity, and value, as well as the duties, taxes, and fees assessed thereon. With electronic filing and line item reporting, CBP can now automatically compare and verify the amounts of duties, taxes, and fees claimed on the drawback claim against the amounts paid on the import entry summary, which CBP expects will help ensure that it does not overpay funds. CBP’s prior system for filing drawback claims did not have the capability to electronically compare and verify claims against underlying import entries upon which the drawback claim was based to determine whether an excessive amount had been claimed at the individual line item level, according to prior independent audits. CBP’s transition to ACE is intended to mitigate risks of improper payments on drawback-related imports, by helping to ensure through automated validations that the amount paid for drawback claims against a given import entry does not exceed 99 percent of the duties, taxes, and fees collected at the individual line item level. Extending the record retention period for certain drawback claims. For all TFTEA drawback claims, supporting records must now be maintained for a period of 3 years from the date of liquidation of the claim, rather than 3 years from the date CBP pays a drawback claimant. This new time frame requires claimants with accelerated payment privileges to maintain supporting records for a longer period than before modernization. Prior to modernization, the drawback record retention period sometimes fell short of the time in which CBP liquidated a drawback claim, preventing CBP from substantiating a claim with complete documentation. The extension of the record retention period provides CBP with more time to request documents needed to verify claims during desk reviews, which in turn should strengthen its ability to recoup over claimed drawback refunds. According to CBP officials, if a claimant fails to provide documents as directed, or if the documents do not support the claim as presented, CBP can liquidate the claim at $0, or other diminishment as appropriate, and ACE will then issue a bill for outstanding funds owed. Broadening liability for drawback claims. Following TFTEA, liability for the full amount of a drawback claim shifted from the claimant to both the claimant and the importer of the designated imported merchandise upon which drawback refunds are claimed. CBP expects that establishing joint and several liability, consistent with TFTEA, will help it to recoup over claimed drawback refunds by holding the importer of record, in addition to the claimant, responsible for payment of erroneous or false drawback claims. According to the industry representatives we spoke to, the impact of the joint and several liability change remains to be seen, but it could limit the incentive of importers to engage in drawback filing with exporters or claimants to avoid liability. In addition to implementing these statutory changes, CBP has been working with a statistician to develop a more robust basis for sampling and selecting claims for review. For example, CBP has determined that it will target higher-value claims for more frequent review. CBP lacks effective automated controls to prevent overpayment of drawback refunds related to export information. CBP guidance notes that a statutory prohibition on multiple drawback claims is set forth in 19 U.S.C. § 1313(v), which restricts the use of merchandise that is exported or destroyed to a single claim for drawback. Unlike import information, which is included in ACE to allow CBP to electronically compare and verify claims against underlying import entries, similar export information is not included in ACE. Therefore, CBP cannot perform electronic comparisons of export data within ACE to help ensure that it does not make overpayments on drawback-related exports. For example, if a claimant exported 10 widgets and filed one drawback claim for six exported widgets and another claim for five exported widgets, CBP would not be able to systematically verify that the second drawback claim was excessive and thus invalid. To compensate for the lack of automated controls, CBP designed an internal control for the drawback program that targets a selection of claims for a manual full desk review by drawback specialists. (See appendix II for an explanation of what such desk reviews involve). However, CBP has not addressed several other risks for improper payments in the drawback program. These risks relate to (1) limitations in CBP’s existing desk review process, (2) establishing electronic proof of export, and (3) targeting a selection of claims for review. CBP’s existing manual desk review process does not have the ability to systematically confirm the validity of export documentation and confirm that export documentation is accurately being used across multiple claims. CBP officials noted that, while export documentation could be used across multiple claims, by law, claimants cannot file multiple drawback claims based on the same exported merchandise, as discussed above. Under TFTEA, a person claiming drawback refunds based on the exportation of an item must provide proof of export. Such proof must establish fully the date and fact of exportation and the identity of the exporter and may be established through the use of records kept in the normal course of business or through an electronic export system, as determined by CBP. To comply with this requirement, CBP requires claimants to (1) provide summary data as part of the drawback claim in ACE that includes the date of export, name of exporter, description of the goods, quantity and unit of measure, tariff classification number, and country of ultimate destination; and (2) maintain actual proof of export, which can be records kept in the normal course of business, and provide such proof upon demand by CBP. However, CBP officials told us that claimants only provide proof of export upon request by the drawback specialist, and that such requests typically are made after the claim is accepted in ACE and only in the context of desk reviews. Drawback specialists do not routinely request, store, or compare export documentation except for claims selected for desk reviews. CBP has no way of tracking whether claimants are using their export information excessively, and, according to officials, CBP has not yet assessed the feasibility of doing so. CBP officials explained that having the ability to flag excessive export submissions across multiple claims would enhance CBP’s protection against over claiming, but that further review is needed to determine whether flagging is feasible with current system capabilities. CBP officials said that they intend to look further into the matter in fiscal year 2020. As a result, the drawback program remains at risk of improper payments on drawback related to export information as claimants could over claim drawback refunds by using non-existent, insufficient, or falsified export documentation, or by reusing export documentation across multiple claims for merchandise that was never exported. CBP has not taken any steps to establish electronic proof of export, although it has a longstanding goal to designate the Automated Export System as an electronic means of establishing proof of export. Federal standards for internal control call for agency management to design the entity’s information system and related control activities to achieve objectives and respond to risks. However, CBP has not yet deemed the Automated Export System as a reliable system of record for proof of export. At the time the final rule was issued in December 2018, CBP commented that the Automated Export System, as it stands, could not provide sufficient proof of export, and CBP would therefore continue to require documentary proof of export until further notice. Specifically, CBP determined that the Automated Export System does not establish the date and fact of exportation, or the identity of the exporter—information that can be relied upon to demonstrate drawback eligibility. CBP officials in headquarters told us that while being able to develop a reliable system of record for proof of export remains a goal, CBP does not have a plan or time frames for doing so as it intends to revisit the matter in fiscal year 2020. CBP officials explained that their focus has been on transitioning the drawback program to ACE, including by training staff and addressing industry concerns. Until CBP implements effective control activities for the drawback program, the government may be subject to revenue loss through duplicate or excessive claims for drawback related to export information. We cannot precisely estimate the potential savings that might result from CBP taking steps to prevent over-claims because the current rate of improperly claiming against the same export documentation multiple times is unknown. Further, the current number and amount of drawback claims improperly using export information is unknown. However, if these steps reduced drawback-related costs by even 1 percent of the over $1 billion in annual drawback refunds, this could equate to millions of dollars in savings. CBP has not targeted a selection of claims for a manual full desk review since it disabled the selection feature in ACE, and the number of claims not targeted for review continues to increase because CBP has not turned the selection feature back on. The lack of review increases the risks of improper payments for claims filed, which stood at over 35,000 as of August 23, 2019, and represented an estimated $2 billion. To mitigate risks of improper payments in the drawback program, CBP designed an internal control for the drawback program in which a selection of claims is targeted for a manual full desk review by drawback specialists. Prior to modernization, CBP officials told us that they would target 1 percent of the claims per claimant and 1 percent of the entries on a drawback claim for a full desk review. Drawback specialists provided examples of having conducted full desk reviews in which they discovered that the claimants had failed to substantiate the claim by, for example, providing insufficient proof of export. They explained that the claimants had to repay their drawback refund and had CBP target subsequent claims for a limited desk review. However, CBP officials explained that when CBP transitioned the drawback program to ACE starting on February 24, 2018, a system error forced CBP to disable the selection feature in ACE. Certain claims that have been submitted since the system error was discovered have not been targeted for a full desk review. Federal standards for internal control call for agency management to identify, analyze, and respond to risks related to achieving the defined objectives. These standards note that agency managers should comprehensively identify risks and analyze them for their possible effects, as well as design responses to these risks as necessary to mitigate them. CBP officials told us that they are working toward turning the selection feature back on as soon as CBP can address the system error. However, CBP did not expect the issue to persist as long as it has to date (22 months, as of December 2019). As a result, even when the selection feature is reactivated, it will only be applied to new claims filed after that point. CBP does not have a plan to retroactively target claims for review that had already been accepted in ACE during the system error, or to identify and analyze risks from targeting to adjust targeting in the future. For example, CBP has not determined whether specific claimant characteristics or claim types are more frequently associated with compliance problems. CBP officials explained that analyzing risks from targeting to identify non-compliance patterns across claimants is not something CBP has done in the past because CBP is account based and does not compare claims across claimants. However, CBP officials acknowledged the feasibility—with ACE’s new capabilities—of systematically pulling and analyzing non-compliance data input into ACE by the drawback specialists during limited or full desk reviews, and told us that they intend to explore this matter further in fiscal year 2020. These officials stated that taking these steps would be valuable for improving risk management in the drawback program and that doing so is likely to be feasible with current staff resources. Without finalizing or implementing procedures to retroactively target claims for review and taking steps to analyze non-compliance patterns to improve future compliance processes, CBP may miss opportunities to protect U.S. trade revenue from improper payments of drawback claims. We cannot precisely estimate the potential savings that might result from CBP pursuing claims from the period when the selection feature was disabled, because the amount of drawback recovery resulting from the review of this universe is unknown, and the actual amount would depend on the number of reviews conducted, amount of improper payments discovered, and ability to recover these payments. However, if these reviews recovered even half of 1 percent of the $2 billion in un-reviewed claims, this could equate to millions of dollars in additional recoveries. CBP published a required Regulatory Impact Analysis of the Modernized Drawback Final Rule (RIA) of new drawback regulations in 2018 to outline, prospectively, the anticipated consequences of this economically significant regulatory action. The RIA was to include a quantification and monetization of anticipated benefits and costs, to the best extent possible with information available at the time. As of December 2019, CBP’s RIA was the only formal analysis that had been conducted on the impact of changes to drawback eligibility under modernization on industry and government. We assessed three key portions of the RIA relating to impact on industry and changes to drawback eligibility against GAO’s standards for review of economic analysis, and found that CBP had not produced reliable estimates. Various factors limited the analyses that CBP could conduct. For example, because the RIA was published prospectively, post- modernization program data were, necessarily, not yet available. According to CBP officials, CBP also developed the RIA before it had transitioned to ACE, a database with enhanced capabilities. However, in some cases, we found that CBP was not transparent about the level of uncertainty in its assumptions resulting from these limitations. We did not comprehensively assess the entire RIA (a 251-page document containing more than 90 tables) or assess any of it against the Office of Management and Budget’s guidelines for an RIA. Therefore, the following discussion of the RIA is not an assessment of whether the RIA met the criteria for required regulatory analyses outlined in the Office of Management and Budget Circular A-4. Our assessment of each of the relevant portions of the RIA is based on GAO’s standards for review of economic analysis, and outlined below. Affected industries: CBP determined that a wide range of industries would be affected by modernization but did not determine whether the dollar impact of eligibility changes from modernization would be more concentrated in some industries than in others because of data limitations. To reach the conclusion that a wide range of industries would be affected by modernization, CBP took a sample of companies that had submitted drawback claims and examined these companies to determine their primary industry. According to GAO standards, an economic analysis should state its objective and the scope of the analysis should be designed to address this objective. According to CBP officials, CBP designed this sample to support statements about the number of companies affected but not the dollar size of the impact, although CBP did not explicitly state the intent of this design in the RIA. At the time of the RIA, according to these officials, designing a dollar-weighted sample—which could support statements about which industries were most affected in terms of financial costs and benefits—would have required a prohibitive amount of work with paper records. However, the officials noted that a dollar-weighted sample should now be feasible because most of the necessary information is now stored electronically in ACE. Expansion of substitution eligibility: CBP estimated that the expansion of substitution eligibility would account for $1 billion (98 percent) of the $1.02 billion estimated total 10-year amount of increased drawback refunds under modernization; however, we found that this estimate was not reliable because of the amount of uncertainty in key assumptions. According to GAO standards, an economic analysis should consider all relevant alternatives and describe and justify the analytical choices, assumptions, and data used. CBP’s estimate was based on assumptions about changes to the dollar amount per drawback claim and number of drawback claims as a result of modernization and system limitations in the number of lines per claim. Specifically, CBP assumed that claim values would remain equal to their historical average (adjusted for line limitations in ACE) and that the number of claims under modernization would grow primarily in the first year after modernization. However, CBP did not justify some key methodological assumptions about the amount and number of claims and did not take sufficient steps to inform on the extent to which the conclusions of the analysis would remain similar, even if it changed some of these assumptions. CBP estimated the dollar amount per claim based on a historical average of drawback claim amounts but did not explain in the RIA why the historical average is an appropriate assumption for drawback claim amount. CBP officials told us that they considered a range of different drawback claim amount values and growth rates as a result of significant annual variation in drawback claim amounts prior to TFTEA. However, CBP did not include variation in claim dollar amounts in its published sensitivity analyses for this table or otherwise discuss, within the scope of these analyses, whether its conclusions would have been affected by this variation in the assumed amount per claim. Additionally, CBP’s estimate of expected increase in the number of claims that would be filed under modernization contains several key assumptions that it justifies based on emails and discussions with industry representatives and CBP subject matter experts, the details of which are not transparent in the RIA. We reviewed these emails and found that the two industry representatives whom CBP cited expressed uncertainty about the effects of modernization and provided estimates of growth in substitution drawback claims that varied by 20 percentage points from one another. CBP also sought public comments on these estimates and did not receive any, according to officials. As the estimated effect of this change constitutes nearly all of the estimated increase in drawback refunds in the RIA, the uncertainty around key assumptions for this analysis means that the overall actual effects of modernization could differ widely from CBP’s estimate. Limitations on basket provisions: CBP estimated that eliminating claims with basket provisions would cost industry about $11 million over 10 years; however, we found that this estimate was not reliable because of the amount of uncertainty in key assumptions. According to GAO standards, an economic analysis should consider all relevant alternatives and describe and justify the analytical choices, assumptions, and data used. These standards further note that, when feasible, an economic analysis should adequately quantify how the statistical variability of the key data elements underlying the estimates of the economic analysis impacts these estimates. While CBP’s general methodology was reasonable, its sample design was too small to ensure reliable results and some assumptions were not fully explained or transparent. CBP sampled 50 out of 2,346 substitution unused merchandise claims from 2016, of which 16 contained lines classified under basket provisions in the HTS code, and used this sample to estimate the number of affected claims and lines, as well as average affected line value. CBP officials told us that CBP selected this sample size because of the labor-intensive process required to examine paper records from the relevant claims. However, in the RIA, CBP did not discuss how this small sample size caused imprecision in its estimates. Further, CBP did not establish that this time-limited sample was generalizable beyond 2016, either for the proportion of affected claims and lines or for the average affected line value. CBP officials said that, to alleviate these issues, CBP sought public comments on these estimates and did not receive any. According to CBP officials, at the time of their analysis, there was no evidence about the average dollar amount of future claims. However, CBP did not conduct a sensitivity analysis on these assumptions, for example, to determine how much its estimates would change if the number or dollar amount of claims utilizing basket provisions was larger or smaller than CBP had assumed. Beyond its RIA, CBP has not conducted economic impact analysis of the changes to drawback eligibility under modernization, including on industry, and does not have plans to do so in the near future. Because the changes are new and CBP has devoted many of its resources to rolling out modernization, CBP stated that, while it intends to follow relevant requirements for regulatory review, it has not yet prioritized developing a plan for further assessments of the economic impact of the regulation. CBP officials stated that any future plans for retrospective review would follow Treasury guidance. This guidance states that priorities for retrospective review projects of existing significant regulations should be based upon an understanding of the economic impact of the regulatory action on industry and the government, among other factors. According to the RIA, the drawback modernization regulations are an “economically significant regulatory action.” The Treasury guidance states that such an understanding can be achieved through an ex post analysis of the effects of the regulation on the public, industry, or the government, including increased revenue or costs. An ex post analysis of impact on industry and the impact of major changes to drawback eligibility would have fewer limitations than the RIA, which analyzed the changes prospectively (using historical data to predict future outcomes). For example, because of system updates, more detailed data about lines within claims are now stored electronically, which may reduce the need to conduct sampling in order to estimate the impact of changes. Additionally, because the regulation is now in effect, information such as the number of claims filed can be determined with actual data rather than by projection. According to CBP officials, within 3 to 5 years the agency will have sufficient data to conduct a reliable ex post analysis of the impact of the changes. Useful analysis might be possible sooner, as well. CBP assumed in the RIA that some of the most important effects of modernization would occur in the first year. According to GAO standards, the reliability of an ex post analysis will depend not only on the sufficiency of data, but also on whether the analysis has considered and properly dealt with elements such as objective and scope, methodology, analysis of effects, transparency, and documentation. At present, however, CBP has not prioritized developing a plan with time frames to conduct such an analysis when the data are available—a plan that could include identifying key areas of analysis, data sources, and appropriate methodologies. Without an ex post analysis, CBP cannot reliably determine the financial effects of changes to drawback refund eligibility on industry and the government. CBP disburses about $1 billion in drawback refunds per year and expects the amount of drawback refunds dispersed to continue growing. According to CBP, TFTEA modernized CBP’s system for processing drawback claims, transitioning it from a paper-based to an electronic system, in an attempt to mitigate longstanding risks in the program. Despite the expected increase in drawback claims, CBP did not anticipate and then adequately manage the increase in drawback specialists’ workload. As a result, CBP has delayed timely processing of some drawback claims, rulings, and privilege applications, which has resulted in uncertainty for industry—potentially impeding trade. Since modernization, drawback claims continue to be at risk of improper payments with vulnerabilities in CBP’s export verification and quality control system. While drawback modernization addressed longstanding risks associated with the program by automatically verifying import information, export information still creates a risk. CBP cannot systematically verify the validity and accuracy of a company’s proof of export. As a result, companies could still over claim drawback refunds by using non-existent, insufficient, or falsified export documentation, or by reusing export documentation across multiple claims. Additionally, while CBP established internal controls to mitigate improper payment risks in the program, such as by targeting a selection of claims for review, it disabled this quality control measure for claims submitted since drawback modernization began in February 2018. Over 35,000 claims accepted since drawback modernization—amounting to over $2 billion—remain at risk for noncompliance. Without CBP finalizing and implementing procedures to target claims retroactively and in the future, CBP will continue to miss opportunities to protect U.S. trade revenue. Further, if CBP does not design its targeting system to mitigate identified risks, future claims also are at risk of noncompliance. Prior to drawback modernization, CBP was not able to produce a reliable assessment of the economic impact of the changes to the drawback program on industry and government because of data availability constraints, systems limitations, and other factors. However, modernization has eliminated some of these constraints, and CBP estimates that within several years it will have sufficient data to conduct an ex post analysis. However, CBP has not prioritized developing a plan to do so. Without such an analysis, CBP cannot be certain about the economic impact of drawback modernization. We are making a total of six recommendations to CBP. Specifically: The Commissioner of CBP should ensure that the Office of Field Operations, in consultation with the Office of Trade, develops a plan for managing its increased workload. (Recommendation 1) The Commissioner of CBP should ensure that the Office of Trade assesses the feasibility of flagging excessive export submissions across multiple claims and takes cost-effective steps, based on the assessment, to prevent over claiming. (Recommendation 2) The Commissioner of CBP should ensure that the Office of Trade develops a plan, with time frames, to establish a reliable system of record for proof of export. (Recommendation 3) The Commissioner of CBP should ensure that the Office of Trade turns the claim selection feature in ACE back on and finalizes and implements procedures to target claims for review that were accepted into ACE during the period in which the selection feature was disabled. (Recommendation 4) The Commissioner of CBP should ensure that the Office of Trade analyzes the results of its targeting of claims for review and designs responses to mitigate identified risks. (Recommendation 5) The Commissioner of CBP should ensure that the Office of Trade prioritizes developing a plan to conduct an ex post analysis of the impact on industry and government of key changes to the drawback program, including time frames and methodology. (Recommendation 6) We provided a draft of this report to CBP and Treasury for comment. In its comments, reproduced in appendix III, CBP concurred with all six of our recommendations. CBP also provided technical comments, which we incorporated as appropriate. We requested comments from Treasury, but none were provided. We are sending copies of this report to the appropriate congressional committees, the Commissioner of CBP, and the Secretary of Treasury. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the extent to which modernization affects drawback refund eligibility and U.S. Customs and Border Protection’s (CBP) management of its workload, as well as the extent to which CBP has (2) taken steps to address risks of improper payments in the program and (3) analyzed the impact of the changes to the program on industry and government. To examine the extent to which modernization affects drawback refund eligibility and CBP’s management of its workload, we reviewed statutory, regulatory, and agency drawback documents to identify and describe expansions and limitations to drawback refund eligibility. Specifically, we reviewed the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA), the Modernized Drawback Notice of Proposed Rulemaking, and the Modernized Drawback Final Rule to identify key changes resulting from amendments made to the drawback statute and implementing regulations. We also reviewed CBP’s internal guidance, which defines the standards that drawback specialists must meet when processing claims for drawback refunds in the Automated Commercial Environment (ACE) and under TFTEA. To understand the regulations and policies for drawback modernization, we interviewed CBP officials with the Offices of Regulations and Rulings and Trade Policy and Programs within the Office of Trade. To gain insight into how drawback modernization is working, in practice, we interviewed CBP officials from the Office of Field Operations and the four Drawback Centers. We visited the largest Drawback Centers, located in Newark, New Jersey, and San Francisco, California, to observe how they manage their workload and process claims. As context for CBP’s increasing workload following drawback modernization, we also collected data on the following: The number of drawback claims filed in calendar years 2018 and 2019, as of August 21, 2019. We also compared these data against the historical number of drawback claims filed from 2009 through 2017, as reported by CBP in its Regulatory Impact Analysis of the Modernized Drawback Final Rule (RIA). In addition, we reported on the amount of drawback claimed during this period as context for the size of the drawback program. TFTEA (1) provided for a transition period, from February 24, 2018 to February 23, 2019, during which drawback claimants could file under either the amended provisions or the drawback law as it existed previously; and (2) thereafter required all claims to be filed under TFTEA starting on February 24, 2019. As such, claims filed between 2009 and 2017 reflect pre-TFTEA drawback claims. Claims filed in 2018 and 2019 reflect drawback claims filed under both the amended provisions and the drawback law as it existed previously. The number and value of claims migrated to ACE from the Automated Commercial System—CBP’s prior system for filing drawback claims— as well as the number and value of these claims liquidated in the first 9 months of 2019. The number of limited modifications to existing manufacturing rulings submitted between February 24, 2018 and February 23, 2019. Claimants who wanted to operate under an existing manufacturing ruling were required to file a supplemental application for a limited modification to the existing ruling by February 23, 2019. The number of new manufacturing rulings submitted between February 24, 2019 and July 22, 2019. Claimants who want to operate under a manufacturing ruling but did not apply for a limited modification by February 23, 2019, need to apply for a new manufacturing ruling. The number of privilege applications submitted between February 24, 2018 and July 22, 2019. Claimants can apply for and obtain drawback privileges for accelerated payment and waiver of prior notice. We incorporated data reliability questions in our interviews with agency officials, such as how the data are derived, maintained, and updated, and how CBP ensures their completeness and accuracy. Based on our interviews with agency officials, we found these data to be sufficiently reliable for providing context for CBP’s growing workload since modernization. We then discussed steps that CBP had taken to manage its workload, such as how it had updated its staffing models, managed processing privilege applications, and managed automatic liquidation. We assessed CBP’s responses against federal standards for internal control, which call for agency management to evaluate pressure on personnel to help personnel fulfill their assigned responsibilities in accordance with the entity’s standards for conduct. We reviewed staffing data covering fiscal years 2014 through 2019 for drawback specialists. We previously reported on staffing data from fiscal years 2014 through 2016. We incorporated data reliability questions in our interviews with agency officials for the fiscal years 2017 through 2019 staffing data. To determine staffing shortfalls, we compared actual staffing data against the minimum staffing level mandated by the Homeland Security Act and the optimal staffing level identified in CBP’s Resource Optimization Model for 2017. We determined these data to be sufficiently reliable for the purposes of comparing actual to optimal and mandated staffing levels. In addition, to understand how CBP is implementing the changes to the drawback program under modernization and the impact of the changes to the program, we interviewed a non-generalizable sample of 15 industry representatives from a variety of sectors who (a) had submitted public comments on the proposed rule, (b) were part of CBP’s Trade Support Network Drawback Subcommittee, or (c) met our criteria for both (a) and (b). According to CBP officials, this subcommittee was CBP’s primary forum through which officials obtained input on the modernized drawback regulations from industry. We developed a standard set of questions to ask industry representatives, for example, regarding their company’s involvement in the drawback program, how drawback modernization has impacted their company, what industries have been most impacted by the changes, and any unexpected or unintended results of the modernization. To examine the extent to which CBP has taken steps to address risks of improper payments in the program, we reviewed prior independent audits of the program, as well as statutory, regulatory, and agency documents delineating changes to the program, to understand how the changes are expected to remediate prior audit findings. These documents included TFTEA, as well as CBP’s proposed and final rules for modernized drawback, the RIA, and internal and external guidance for filing and processing drawback claims. We also interviewed agency officials in headquarters and in the field to discuss prior audit findings and the successes and challenges, if any, to drawback modernization addressing identified issues. We then assessed steps that CBP had taken to mitigate improper payment risks in the drawback program against federal standards for internal control, which call for agency management to identify, analyze, and respond to risks related to achieving the defined objectives. We collected data on the number of claims filed between February 24, 2018 and August 23, 2019, and the total amount claimed, that were not targeted for a full desk review. Based on our interviews with agency officials, we found the data to be sufficiently reliable for the purposes of reporting on the total number and value of claims that were not targeted for a full desk review during this period. To examine the extent to which CBP has analyzed the impact of the changes to the program on industry and government, we evaluated CBP’s RIA against GAO’s standards for review of economic analysis. We assessed those portions of the RIA that relate directly to the financial impact of changes to drawback eligibility, corresponding to three tables describing (1) affected industries, (2) expansion of substitution eligibility, and (3) limitation of basket provisions. We then compared our assessments against applicable Department of the Treasury standards to determine if a future assessment could overcome the prior data limitations, warranting a limited review of certain aspects of an existing rule. However, we did not comprehensively assess the RIA (a 251-page document containing more than 90 tables) or assess it against the Office of Management and Budget’s standards for regulatory impact analysis. Therefore, our discussion of the RIA is not an assessment of whether the RIA met the criteria for required regulatory analyses outlined in the Office of Management and Budget Circular A-4. We conducted this performance audit from February 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Drawback claim filing and processing generally follows three steps. Claims are (1) submitted for initial acceptance or rejection, (2) reviewed for drawback eligibility as applicable, and (3) liquidated with full, partial, or no payment. U.S. Customs and Border Protection (CBP) officials indicated that while the transition from the Automated Commercial System (ACS) to the Automated Commercial Environment (ACE) under drawback modernization has automated the initial intake of drawback claims, the review of claims to determine drawback eligibility, as presented, remains largely a manual process. 1. Claim submission. Prior to modernization, claimants had to file paper claims, including supporting documentation. CBP was required to accept or reject claims and authorize accelerated payment within 90 days of receiving the paper claim. However, claimants could also submit an electronic summary of the claim, known as a shell record, through ACS. For accelerated payment claims with a shell record, CBP was required to certify the approved claim for payment within 21 days of receiving the electronic summary of the claim. Under modernization, claims must be filed electronically. The drawback claim is transmitted electronically via ACE and supporting documentation, when required, is uploaded via the Document Image System component of ACE. CBP officials explained that the transition to ACE had automated the initial intake process of drawback claims. Instead of a drawback specialist having to manually validate the claim for completeness and mail a response back to the claimant, ACE is able to make that determination within seconds and provide immediate feedback to the claimant on whether the claim is accepted or, if rejected, what errors need to be addressed. 2. Claim review. CBP policy before and after modernization has been to require a full or limited desk review of selected claims, according to CBP officials. Claims necessitating a drawback specialist’s full desk review will undergo a more comprehensive verification of the complete drawback claim that often requires additional information from the claimant. If additional information is required to process the drawback claim, CBP will send a formal request for information to the claimant. Additionally, CBP officials said that before and after modernization, if CBP identified compliance issues during its review of a drawback claim, the drawback specialist could target any subsequent claims filed by the claimant for a limited desk review. According to CBP officials, the time it takes a drawback specialist to conduct a desk review varies by claim, based on the nature of the claim and the experience of the drawback specialist. CBP reported that it could take more than 3 years for CBP to conduct a full desk review and determine the final disposition of a drawback claim. 3. Claim liquidation and payment. Prior to modernization, CBP would manually verify that drawback claimants had the accelerated payment privilege on file. CBP stated that claimants with the privilege of accelerated payment of drawback generally received their refunds 14 days after CBP accepted claims and authorized accelerated payment. Now, under drawback modernization, a claimant can receive accelerated payment without a drawback specialist’s involvement. ACE is programmed to automatically make accelerated payment on claims that have on file the accelerated payment privilege and a drawback bond that equals or exceeds the amount of the claim(s). CBP stated that claimants with the privilege of accelerated payment generally receive their refunds within 21 days of claim acceptance. Before and after modernization, drawback claims are set to automatically liquidate if all the designated import entries within a claim are liquidated and final within 1 year of the claim date, according to CBP officials. CBP officials said that drawback specialists must extend the claim to prevent it from automatically liquidating before the necessary reviews have been completed. Drawback claims can be extended for three 1-year periods. CBP officials explained that liquidation extensions are intended to provide additional time to obtain information or documentation necessary to complete the review of a drawback claim. If the claimant fails to provide documents as directed, or if the documents do not support the claim as presented, the claim will be liquidated based on the information on file, which may result in liquidation at $0, or other diminishment, as appropriate. CBP officials described the liquidation and payment of drawback claims with and without accelerated payment privileges, as follows. At the time of liquidation, for claims with accelerated payment privileges, ACE issues an additional refund if the final claimed amount is greater than the accelerated payment amount, or a bill, if the accelerated payment amount is greater than the final claimed amount. If the accelerated payment amount is the same as the amount determined at liquidation, no further action is necessary. For claims without accelerated payment privileges, ACE will issue a refund for the drawback amount approved at liquidation. Claimants have 30 days from the issuance of a bill to repay CBP any amount due. Claims may be reliquidated up to 90 days from the date of an original liquidation. In addition to the contact named above, Kim Frankena (Assistant Director), Alana Miller (Analyst-in-Charge), Andrew Kurtzman, and Esther Toledo made key contributions to this report. The team benefited from the expert advice and assistance of Debbie Chung, Martin De Alteriis, Jeff Isaacs, Christopher Keblitis, Grace Lui, and Oliver Richard.", "summary": "The United States enacted the drawback program in 1789 to create jobs and encourage manufacturing and exports, according to CBP. CBP has primary responsibility for overseeing the drawback program. It disburses about $1 billion in drawback refunds per year. According to CBP, TFTEA modernized the drawback program, generally broadening the scope of potential claims and allowing electronic filing starting February 24, 2018. As of February 24, 2019, claimants could only file claims under the drawback statute as amended by TFTEA. TFTEA also included a provision for GAO to assess drawback modernization. This report examines the extent to which (1) modernization affects drawback refund eligibility and CBP's management of its workload, (2) CBP has taken steps to address risks of improper payments in the program, and (3) CBP has analyzed the impact of the changes to the program on industry and government. GAO reviewed statutory, regulatory, and agency documents, and interviewed agency officials and industry representatives. The Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) generally expanded eligibility for the drawback program, which provides refunds to claimants of up to 99 percent of certain customs duties, taxes, and fees. For example, a claimant could claim a drawback refund on exported pants made in the United States using imported foreign fabric. The expansion from TFTEA has resulted in Customs and Border Protection (CBP) facing a growing workload. According to CBP officials, the most significant change from TFTEA is that it is now easier to qualify for certain drawback refunds. Industry representatives explained that new claimants are seeking drawback refunds and existing claimants are able to increase claim amounts. However, CBP has not adequately managed the increased workload and has not developed a plan for doing so. As a result, CBP faces delays in processing drawback claims that could result in uncertainty for industry, potentially impeding trade. GAO Example of One Potential Drawback Claim CBP has taken some steps to address risks of improper payments in the drawback program, but several risks remain. To help ensure it does not overpay funds, CBP now electronically verifies drawback claims against underlying import information. However, CBP cannot verify drawback claims against underlying export information because it does not maintain detailed information about exports in its new electronic system. To compensate for this lack of automated controls, CBP requires manual full desk reviews of a selection of claims to mitigate improper payment risks. However, CBP has not targeted certain claims for a full desk review since switching to the new system on February 24, 2018. The lack of review for claims, which numbered over 35,000 and represented an estimated $2 billion in claims filed as of August 23, 2019, increases the risk of improper payments. CBP has not produced a reliable assessment of the economic impact of the changes to drawback refund eligibility because of data availability constraints, systems limitations, and other factors. CBP has not prioritized developing a plan to revisit its economic analysis, although new data and systems capabilities are becoming available. Without such a plan, CBP will not have a reliable assessment of the impact of the changes on industry and government. GAO is making six recommendations, including that CBP develop a plan for handling its drawback workload, improve its validation activities, and prioritize developing a plan for an economic analysis of the regulation to understand its impact. CBP concurred with all six recommendations.", "document_type": "gao"}
{"report": "Trauma or adverse childhood experiences may include physical and sexual abuse, neglect, bullying, community-based violence, extreme poverty, the loss of a parent or primary caretaker, or natural disasters, among other things. These experiences may overwhelm a child’s natural ability to cope and can cause stress reactions in children, including feelings of intense fear, terror, and helplessness. When children are exposed to chronic stressful events, their neurodevelopment can be disrupted. As a result, a child’s cognitive functioning or ability to cope with negative or disruptive emotions may be impaired, causing long-term harm to their physical, social, and emotional well-being. These adverse effects may include changes in a child’s emotional responses; ability to think, learn, and concentrate; impulse control; self-image; attachments to caregivers; and relationships with others. Traumatic experiences have been linked to a wide range of health-related conditions, including addiction, depression and anxiety, and risk-taking behavior, and may also increase the likelihood of chronic ill health conditions, such as obesity, diabetes, heart disease, cancer, and even early death. Not all children will experience all of these effects. Children’s responses to traumatic events are unique and affected by many factors, including their age at the time of the event, the frequency and perceived severity of trauma, and the child’s innate sensitivity, as well as protective factors such as the presence of positive relationships with healthy caregivers, physical health, and natural coping skills. While all children can be affected by trauma, trauma is common among children who enter the child welfare system. Many of these children have been abused or neglected, and involvement in the child welfare system, primarily through placements into a foster care home, may cause additional trauma due to the separation from family; changes in school placement, neighborhood, and community; as well as fear and uncertainty about the future. Child welfare experts generally believe that child welfare systems that use trauma-informed approaches are better able to address children’s safety, permanency, and well-being needs. Although trauma-informed frameworks may vary, they generally include interventions as well as a change in culture; thus if an agency or organization is taking a trauma-informed approach, it is incorporating knowledge of trauma and its effects into its policies, procedures, and practices. A trauma-informed child welfare system may offer services to help identify and mitigate the effects of trauma, including screening and assessing children for trauma, and providing or referring children to services. These approaches may produce improved outcomes for children in the child welfare system, including fewer children requiring crisis services, such as residential treatment, and fewer foster home placements, placement disruptions, and reentries into foster care. Other trauma-informed approaches may result in reduced lengths of stay in foster care and improved child functioning and increased well-being. In addition to child welfare agencies, school staff and members of the school community can play a key part in recognizing and responding to children who have experienced trauma. In a 2017 report on child well- being, GAO reported that an expert noted that health and human service agencies are not the only entities needed to address child well-being and suggested that community stakeholders work together to determine what resources are needed for the children in their community. A trauma- informed school, characterized by an understanding and a commitment of teachers and staff to an awareness of how trauma affects students, is an example of a coordinated approach to trauma. Trauma-informed teachers and staff are aware of trauma’s impact on students’ behavior, their relationships, their ability or inability to self-regulate behavior, and how it contributes to their classroom behavior. Specific elements of a trauma- informed school may include addressing and treating traumatic stress, developing partnerships with students and families, evaluating and revising school discipline policies and practices, and creating a trauma- informed learning environment. Federal agencies, academic institutions, and community-based treatment centers have generated evidence-based trauma treatments that clinicians and therapists can use when working with children and their families. See table 1 for examples of treatments. Recent studies have also found that trauma-informed approaches that are infused into the practices and work of child welfare and school staff can help children, their families, and others. While these studies are limited in terms of the number of participants, they indicate the positive effects of including trauma-informed approaches into the work of child welfare staff and educators. For example, one study that used child welfare administrative data for about 1,500 children from Kansas found that implementing a trauma-informed approach was associated with improved child well-being and placement stability for children in foster care. Another study of two public child welfare agencies that involved 52 children, as well as child welfare staff, mental health providers, and foster parents and kinship caregivers, suggests, among other things, that fewer children exited foster homes for negative reasons, such as running away or moving to a group home, when families were trained in a trauma- informed approach. In addition, a study of 126 female youths residing in two treatment centers in Massachusetts suggests that the youth at the center receiving the trauma-informed approach experienced a reduction in post-traumatic stress disorder symptoms compared with the youth in the residential center that did not offer this approach. A study of five schools that adopted a trauma-sensitive approach also reported positive outcomes. For example, the study found a decrease in disciplinary actions, and staff at one school reported that the school felt safer and calmer. School staff also reported improved relations among colleagues and with students, as well as better relations between students and increased parent engagement. HHS’s ACF and SAMHSA have awarded discretionary grants to states specifically to address childhood trauma. From 2011 to 2013, ACF awarded 20 state and local agencies and other organizations discretionary grants to address childhood trauma, according to ACF officials, totaling about $58 million. Each grantee, including two state child welfare agencies and a county agency as well as two universities in five of the six states we selected to review, received up to 5 years of funding. The grants were used to screen and refer children to treatment, implement or expand trauma-focused, evidence-based treatments, and bridge the gap between child welfare and mental health. According to HHS officials, funding for the last of these grants will end in September 2019. SAMHSA also awards discretionary grants specifically to address childhood trauma to state and local agencies, universities, and other organizations through an initiative to transform mental health care for children and adolescents affected by trauma. The National Child Traumatic Stress Network (NCTSN), a collaborative network of experts created through the National Child Traumatic Stress Initiative (NCTSI), conducts research on trauma treatment approaches and provides services to children affected by trauma. In fiscal year 2017, SAMHSA received over $48 million for the NCTSN, and it awarded four new grants and supported 82 5-year grant continuations through NCTSI. Officials that we spoke with from one state child welfare agency, three universities, and two nonprofits in four of the selected states received grants through this initiative. Several of these entities used these funds to train clinicians and educate other child serving professionals about trauma and mental health conditions. In addition to grants that were specifically meant to address childhood trauma, the selected states used other HHS discretionary grants to support children affected by trauma. For example, officials from five state education agencies in the selected states told us that they received SAMHSA’s Project Advancing Wellness and Resilience Education (Project AWARE) grant. Wisconsin officials also said they received Education’s School Climate Transformation Grant, which was used to create the state’s trauma-sensitive schools initiative. Washington officials credited SAMHSA’s Mental Health Transformation Grant with driving the state’s initial trauma-informed work, including its guide about trauma in schools. State agency officials also reported using formula funds, meant for broad purposes like mental health, substance abuse, child welfare, and education, to support their work with children affected by trauma. Officials from five agencies in the selected states reported using formula funding from Title IV-E of the Social Security Act to help children affected by trauma. According to Colorado officials, the state’s Title IV-E waiver has allowed child welfare workers to screen, assess, and provide interventions that are trauma-informed. Also, North Carolina officials told us that Title IV-E, combined with other funding sources, has helped pay for trauma-informed learning communities to help counties build trauma- informed programming. Two states reported using the Substance Abuse and Mental Health Block Grants. (See table 2 for additional grants states reported using to support children affected by trauma.) In addition to federal funding, officials in the six selected states reported receiving state funding to support children affected by trauma. For example, officials in North Carolina told us that, in 2013, the North Carolina General Assembly appropriated $1.8 million in annually recurring funds to train clinicians in evidence-based trauma treatments. Also, in Massachusetts, state funding may be used to create and support trauma- sensitive initiatives in schools, among other things. In addition to state funding, officials in three of the selected states reported using nonprofit funding to support their efforts. HHS offers information and funds training and technical assistance to help state and local agencies support children affected by trauma. For example, state and local child welfare officials in each of the six selected states cited the National Child Traumatic Stress Network (NCTSN) as an important resource for information, training, or technical assistance. State and local officials in four of the selected states told us that they use the NCTSN’s Child Welfare Trauma Training Toolkit curriculum to train their staff. The curriculum, designed to be completed in about 13 hours, covers topics such as the essential elements of a trauma-informed child welfare system, the impact of trauma on the brain and body, and the identification of trauma-related needs of children and families. Also, two state child welfare agencies told us that they use the Resource Parent Curriculum to train foster parents and others about trauma, and another used the Think Trauma curriculum to prepare trainers of group home and residential center staff; both curricula are provided through the NCTSN. In addition, the NCTSN makes other resources available to state and local communities on its website. For example, NCTSN offers fact sheets about various assessments and treatments, including those mentioned in table 1, as well as two evidence-based treatments for use in school settings. In addition to information and training provided through the NCTSN, in 2012, HHS’s ACF issued guidance to encourage state child welfare directors to focus on improving behavioral and social-emotional outcomes for children who have experienced abuse or neglect. In 2013, SAMHSA, in collaboration with ACF and CMS, issued joint guidance to encourage the integrated use of trauma-focused screening, functional assessments, and evidence-based practices in child-serving settings. Also, in 2014, SAMHSA, in an effort to help service sectors, such as child welfare, education, and juvenile justice, become more trauma-informed, released Concept of Trauma and Guidance for a Trauma-Informed Approach. This document included a framework of key assumptions and principles of a trauma-informed approach. SAMHSA intended that the trauma framework be relevant to its federal partners and their state and local system counterparts and to practitioners, researchers, and trauma survivors, families, and communities. (See table 3.) In addition to the information and training and technical assistance referenced above, HHS and Education fund technical assistance centers and make other resources available to states, including: SAMHSA’s National Center for Trauma-Informed Care and Alternatives to Seclusion and Restraint offers technical assistance to various publicly-funded systems and organizations on issues relating to trauma education, among other things. Education’s Readiness and Emergency Management for Schools Technical Assistance Center helps local education agencies before, during, and after emergency situations. Among its various activities, this technical assistance center offers information and technical assistance to local education agencies and others on Psychological First Aid for Schools, which is an intervention model to assist students, staff, and families in the immediate aftermath of an emergency. Education’s National Center on Safe Supportive Learning Environments as well as its Positive Behavioral Interventions and Supports Technical Assistance Center offer an array of materials about trauma and approaches to supporting children affected by it. ACF, through its Child Welfare Information Gateway website, provides information on building trauma-informed systems, assessing and treating trauma, and addressing secondary trauma in caseworkers. It also offers trauma resources for caseworkers, caregivers, and families, as well as information about trauma training. In some instances, the website directs users to SAMHSA or the NCTSN’s website. Officials we spoke with in the six selected states told us they used a variety of approaches to help staff understand trauma and its effects on children, identify children affected by trauma, and provide support to them. These approaches range from training child welfare workers, educators, and clinicians to screening children for symptoms caused by traumatic experiences. They also include developing support systems, including providing services, to children and their families who need more help. While we did not evaluate the effectiveness of the selected state and county initiatives, many of them incorporate key trauma principles and activities cited in the SAMHSA framework above. For additional information on examples of approaches taken in each selected state and in selected counties, see appendixes I and II. State and local child welfare and education agency officials in the six selected states use various approaches to train staff and birth and foster parents about trauma and its effects on children and families. Child welfare officials in two states, Wisconsin and North Carolina, told us that they use learning communities to train staff, and in some instances, foster parents. For example, North Carolina’s child welfare agency used a learning community approach—which included face-to-face training, as well as coaching and practice, over an extended period—to work with child welfare staff in 32 of the state’s 100 counties, according to a state official. In a 2016 agency report, state officials reported that the 9- to 12- month learning community process was designed to allow staff the time required to become steeped in trauma knowledge, to learn how to spread that knowledge into skills and practices, and to develop a sustainable program. Conversely, state and local education and child welfare officials in three states told us that they use online learning or university coursework to train staff. For example, Wisconsin education agency officials told us that they developed a three-tiered training, including online modules for educators and school staff. The modules are designed for self-study and, among other things, include guidance on making policies and procedures more trauma-sensitive, as well as information about the characteristics of safe, supportive learning environments. Also, Massachusetts state child welfare officials told us that they partnered with three universities to provide trauma-focused courses to child welfare workers, and local school officials told us that a university offers a graduate certificate in trauma and learning to area educators. corroborated, when possible, the information we received during our state and county interviews with relevant state documents. We provided officials the opportunity to review the content for accuracy and provide revisions or corrections. a 10-hour, self-paced webinar. According to Wisconsin’s child welfare website, clinicians who complete the training are eligible for certification as TF-CBT therapists and can be listed on a national website of certified clinicians. Similarly, North Carolina’s state child welfare agency, in partnership with a nonprofit organization, trains clinicians in four trauma- focused, evidence-based therapies, including TF-CBT and Parent-Child Interaction Therapy. Similar to the Wisconsin effort, over the course of a year, clinicians learn about these therapies and practice them with children and families. While training staff and parents is important to broaden understanding of trauma and its impact on affected children, identifying these children is also key to helping them receive needed support, including trauma- focused treatment. State and local child welfare and education officials in five of the six selected states told us that they screen certain children to determine whether they have experienced trauma, are exhibiting symptoms of trauma, or need to be referred for a trauma-informed mental health assessment. For example, North Carolina and Washington child welfare officials told us they screen children for trauma when they enter the child welfare system. North Carolina counties that participated in the state’s training efforts, described above, use two screening tools: one for children under age 6 and the other for those ages 6 through 21. The social worker, with input from the caregiver, completes the screening tool for children under age 6. Older children are asked questions about their exposure to trauma, including physical abuse, domestic violence, sexual abuse, and other traumatic events. According to the North Carolina child welfare agency, the trauma screen has a number of benefits for child welfare practice, including informing placement decisions for the youth, prioritizing children who might need to receive treatment quickly, and providing the mental health professional with a better understanding of a child’s issues. Child welfare officials in Washington also reported integrating trauma screening into the state’s child screening program, using a 2012 ACF trauma grant. Children and youth are screened within 30 days of placement in foster care if officials expect them to remain in care 30 days or more. With these grant funds, officials reported that Washington’s child welfare agency added a tool to screen for children’s trauma symptoms and developed a protocol that rescreens these children every 6 months. In addition, education agency officials from three states told us that schools have developed processes to identify students who may have experienced trauma. For example, one Wisconsin school district official told us that any staff member, family member, or student can refer a student for screening. This official explained that the school district formed school-based teams to review information, such as data on suspensions and class disruptions, to identify at-risk students. In addition to the screening process, the school district developed school-based and community mental health service partnerships at 23 schools where therapists provide mental health services, according to this official. State and local child welfare and education agency officials in five of six selected states told us they have developed support systems, which can include providing services, to try to help children affected by trauma. For example, Colorado and Ohio child welfare agencies have spearheaded efforts to provide services and support to children who may have experienced trauma. The Colorado child welfare agency, as part of its system of care, uses an evidence- and team-based planning model, referred to as high-fidelity wraparound services, to manage care for children with or at risk of serious emotional disturbance and who are involved in multiple systems, such as the child welfare and juvenile justice systems. As part of these wraparound services, county child welfare staff and local service providers and professionals work with the family to create a plan for them and their children. A coordinator sets up meetings, oversees the plan, and makes sure all team members participate in achieving the plan’s goals. In addition to the coordinator, a family advocate provides peer support, via weekly visits, to parents and caregivers of youth receiving wraparound services. In addition, depending on the needs of the child, wraparound services may include participating in a support group or meeting with a therapist or grief counselor, among other things. In Ohio, child welfare officials in two counties told us about a partnership that provides services to children and their families who have experienced trauma because of parents’ substance use disorder. As part of the program, children and parents are screened for trauma and may get referred for treatment and services. Families receive wraparound services that are provided by a caseworker and family peer mentor; the family peer mentor has personal experiences with addiction and is in recovery. In addition, state education agency officials in four selected states told us that they had at least one statewide effort administered by the state education agency to help support all children, including those affected by trauma. Colorado, Washington, and Wisconsin encourage schools to implement tiered systems of behavioral support, according to state officials. Tiered systems of support generally consist of three tiers of support: (1) universal supports that apply to all children; (2) specialized supports for smaller groups of children; and (3) supports for individual children who need intensive interventions. To implement the first tier, school staff support students in various ways, such as interacting with students and setting up a dedicated space in a classroom for students to regulate their behavior. The second tier may include convening small groups to help children with similar behavioral issues learn how to regulate their emotions, and the last tier may include intensive support for students who need more help, such as developing and implementing wraparound services plans. School district officials that we spoke with in Massachusetts told us that although they do not use tiered systems of behavioral support, they help children affected by trauma by employing practices to create safe classroom environments for all students, such as developing and building upon relationships and engaging students in structured conversations. Officials in all six selected states spoke of the importance of having engaged leadership in establishing and sustaining support for children affected by trauma. They cited a wide range of leaders, including state government officials; managers and supervisors; and those in partner agencies, such as schools or nonprofits, who supported these states’ trauma efforts. In some cases, these leaders helped establish new trauma initiatives. For example, Wisconsin’s former First Lady launched the work of a statewide, interagency trauma initiative. Additionally, Ohio county child welfare officials spoke about the value of obtaining management support for their plan to become a trauma-informed organization. In other cases, leaders were seen as important to sustaining trauma initiatives and ensuring their impact. In Massachusetts, university officials said that, to ensure the continued availability of evidence-based therapies, they train not only clinicians, but also the individuals who supervise them. Also, a county public health official in Washington, whose agency is implementing trauma initiatives in schools, told us that their efforts tend to be unsuccessful unless they first engage school leadership and align their health initiatives with the schools’ existing efforts. Federal officials and reports have also cited leadership as an important factor in the implementation of trauma initiatives, with some maintaining that leadership is necessary to support children affected by trauma because of the need to change an organization’s culture. In 2013, NCTSN reported on takeaways from a learning collaborative in which nine teams led by child welfare agencies developed, implemented, and tested trauma-informed child welfare practices. Based on the experiences of the teams, the NCTSN report stated that strong and consistent leadership is necessary to implement trauma-informed practice because it requires a shift in organizational culture. SAMHSA’s 2014 guidance for a trauma-informed approach similarly suggests that organizations consider the importance of leadership to initiate a systems- wide change. In addition, HHS officials, who worked with states on a series of trauma-related grants awarded between 2011 and 2013, also told us that leadership commitment was important for their grantees in building organizational and worker resiliency, acting upon data and evaluation, and sustaining initiatives. These documents and statements echo previous GAO work on organizational transformation; for example, in 2003 we reported on key practices found at the center of successful transformation efforts, noting that leadership must set the direction, pace, and tone and provide a clear, consistent rationale that brings everyone together behind a single mission. In addition to discussing the important role that leadership plays in establishing and sustaining support for children affected by trauma, officials in three states highlighted instances in which a lack of leadership hindered their efforts to support these children. The cases they described included delayed, incomplete, or unsuccessful implementation of trauma initiatives. Delayed implementation. Officials in one school district said they had developed policies around multi-tiered system of supports in 2009 but did not receive support from political leaders or funding for the initiative until 2016. They told us that this hindered the initiative’s implementation. Incomplete implementation. State education officials in that same state said that a lack of leadership hindered their ability to track school districts’ implementation of the state’s trauma initiatives. These officials said that a lack of requirements for districts to scale up trauma work was a barrier to collecting data on local activities. In another state, there was a county child welfare initiative to implement universal trauma screening which was conducted in partnership with a local university. The university reported that less than half of children with open cases were screened during the project period, which university officials attributed to some supervisors not supporting the screening initiative. Unsuccessful implementation. According to officials in a third state, turnover among high-level leaders contributed to difficulties integrating trauma-informed practices at the state’s child welfare agency, and the agency was not successful at implementing a trauma screening process. Officials in all six selected states talked about limitations on their agency’s or organization’s capacity to support children affected by trauma. Limitations included high rates of staff turnover, limited staff time to focus on trauma, insufficient numbers of clinicians trained in trauma-focused, evidence-based therapies, and insufficient funding for trauma initiatives. Some agencies and organizations had taken actions to address these challenges. Secondary Traumatic Stress According to the National Child Traumatic Stress Network (NCTSN), Secondary Traumatic Stress (STS) is the emotional duress experienced when hearing about another person’s traumatic experiences. Professionals working with children affected by trauma, such as child welfare workers, are commonly at risk of developing STS. STS can compromise these professionals’ ability to do their jobs and may drive them to leave their job or their professional field. NCTSN notes that several factors can increase the risk for developing STS, including heavy caseloads of children affected by trauma, social or organizational isolation, and feeling unprepared for the job due to lack of training. NCTSN suggests taking a multi- dimensional approach to STS, which includes both prevention and intervention. This could include strategies such as establishing self- care groups, helping workers maintain work- life balance, and training organizational leaders on STS. education agencies. Child welfare officials in all six states talked about high rates of staff turnover, while education officials did so in two states (Colorado and Wisconsin). Staff turnover resulted in difficulties maintaining staff trained in trauma-informed approaches and sustaining institutional trauma knowledge and trauma-related activities, according to officials. Colorado university officials partnering with a county child welfare agency said that staff turnover forced them to invest additional time in training replacement staff and made it more difficult for child welfare officials to conduct regular follow-ups. Similarly, one education official in another part of Colorado said that high turnover at many agencies, including education and child welfare, hindered the county’s efforts to maintain institutional knowledge about trauma-informed practices and sustain the services these agencies were providing to children affected by trauma. Some state and local officials in three states attributed high rates of staff turnover to fatigue and secondary traumatic stress, which is the emotional duress that staff may experience when they hear about children’s traumatic experiences (see sidebar). Some agencies said that they sought to address staff turnover by supporting employees through training on secondary traumatic stress; at least one agency in each of the six states offered such training. Officials from Ohio and Wisconsin told us that another way they were addressing the issue was by participating in an HHS-funded project to improve child welfare workforce outcomes. Many agencies also said they faced limitations on the time that staff could dedicate to trauma initiatives. This issue was more commonly raised by education agencies than by child welfare agencies. Education agency officials reported this limitation in three of four states that had education initiatives, whereas child welfare officials reported it in two of the six selected states. Some of these officials explained that lack of staff time to focus on trauma may have limited the implementation of their trauma initiatives. State education officials in Washington and local education officials in Massachusetts told us that they have the expertise to provide trauma training to schools and community groups, but time limitations restrict their ability to do so. A Colorado county child welfare official told us that some caseworkers see trauma screening as an additional burden due to their already large workload, and a child welfare official in another Colorado county told us that many caseworkers forget to do trauma screening because they are busy. At least one agency we interviewed in each of the six states has or had a staff position dedicated to trauma work, which could help address this limitation. Officials in all six selected states said that there were not enough clinicians trained in trauma-focused, evidence-based therapies to serve children affected by trauma. GAO has previously reported on difficulties finding specialty care for children. For example, in 2017 we found that limited access to mental health services was a challenge for several selected states due to a variety of factors, including insufficient numbers of providers in certain specialties, such as child psychiatrists. Some officials indicated that a shortage of clinicians trained in trauma-focused, evidence-based therapies can limit the ability of child welfare agencies to address trauma. For example, state child welfare officials in Massachusetts specifically noted that identifying children affected by trauma is not helpful if there are not enough clinicians trained in these therapies to treat them. County child welfare officials in Massachusetts and local healthcare partners in Ohio said that providers sometimes rely on interns to address the shortage of clinicians, but Massachusetts officials viewed this as problematic because interns have short tenures that prevent them from establishing relationships with the children. Officials in five of the six selected states told us about initiatives to address the shortage by training clinicians in trauma-focused, evidence- based therapies, and university officials in Massachusetts described an initiative to make trained clinicians more accessible. (See text box.) LINK-KID: A centralized trauma treatment referral service The Child Trauma Training Center at the University of Massachusetts Medical School trains clinicians and operates a centralized referral service called LINK-KID. The goal of LINK-KID is to facilitate connections between children in need of trauma-focused, evidence- based therapies and clinicians who have been trained to provide such therapies. LINK-KID maintains an active database of trained clinicians throughout the state of Massachusetts. University officials told us that anyone in Massachusetts with concerns about a child, including family, teachers, clinicians, and child welfare workers, may call the service. LINK-KID collects information about the child and family, works with them to decide which treatment is most appropriate, and ensures the child is referred for that treatment. University officials said that using LINK-KID is easier for families and child welfare workers, who otherwise might have to call multiple service providers to determine who offers the needed treatment and accepts their insurance. These officials also said they have seen a reduction in the time children must wait for treatment when using LINK-KID. They said that prior to LINK-KID, they saw many children waiting 6 months to a year to receive treatment after having been identified as having experienced trauma, whereas wait times are generally between 25 and 40 business days with LINK-KID. Finally, some agencies said they had difficulties getting or maintaining sufficient funding to support trauma initiatives. Officials in Washington, including, among others, state and local education officials and a local public health partner, reported this issue. In addition, local officials in four other states noted limited funding to support trauma initiatives. School district officials in Washington indicated that a lack of funding limited their implementation support for one major trauma initiative to approximately one-quarter of their schools. These schools were chosen based on need, as demonstrated by measures such as discipline and absenteeism rates. County child welfare officials in Ohio said they had to stop one of their trauma initiatives 3 years ago because the state funding supporting the initiative ran out. Those Ohio officials said they have relied on relationships and collaboration to address the issue of scarce funding. For example, they said that county organizations, including local government agencies, private healthcare providers, and nonprofits, share data extensively and pool funding to support various initiatives. One initiative they pointed to is a local interagency council which provides services to children affected by trauma. Child welfare and other officials in the six selected states, including officials with nonprofit partners, a state department of health, and a state interagency collaborative, also raised at least one other challenge. Challenges included sharing data while remaining in compliance with state and federal privacy laws; sharing data across incompatible systems; limitations on services billable to Medicaid; and Medicaid reimbursement rates. Some agencies had taken actions to address or avoid data sharing challenges. In the states where child welfare officials identified Medicaid- related challenges, state Medicaid officials offered a different perspective on perceived Medicaid challenges and cited alternative ways to support children affected by trauma. Officials in all six states talked about sharing data with other agencies for various purposes; however, privacy laws and regulations were sometimes cited by these officials as a barrier to sharing data about children affected by trauma. For example, officials in two Massachusetts school districts told us they are notified by police or child welfare workers when a child has been involved in an incident with those agencies. One official described the goal of this effort as making staff aware of incidents and events that may affect children’s learning and behavior and ensuring that children feel supported. However, child welfare officials in four of the six selected states and other officials in two states said that it was difficult to share data while remaining in compliance with state and federal privacy and confidentiality laws and regulations, though the reasons they cited for these difficulties varied. State child welfare officials in Massachusetts told us that the state has strict privacy laws in addition to federal laws such as the Health Insurance Portability and Accountability Act of 1996. These officials said that data sharing is possible but generally requires a specific memorandum of understanding because of privacy laws. In contrast, a state child welfare official in North Carolina said they had difficulties with counties not understanding what data they are allowed to share. That official told us that the state tries to mitigate this challenge by helping counties understand what they can share and encouraging them to share screening information with mental health and medical providers. Additionally, a North Carolina university has published state-specific guidance on sharing education, mental health, and other records. Systems incompatibility and technology issues were also sometimes seen as barriers to sharing data about children affected by trauma. Child welfare officials in three of the six selected states, and state health officials in a fourth state, said that incompatibility among various systems made data sharing very difficult or impossible. For example, county officials in Wisconsin said that the state’s child welfare and juvenile justice offices use one data reporting system while the state’s mental and behavioral health offices use another, and these two statewide data systems are unable to communicate. While state child welfare officials in Colorado also reported systems incompatibility issues, county child welfare officials in that state talked about efforts to make data systems more accessible to relevant partners. Officials in one county said that they have a database which is accessible by all members of the county’s multi- agency partnership, including child welfare, school districts, public health, and others. Those officials also said they use a universal release-of- information which includes all partner agencies, enabling them to share data at multi-agency meetings. Additionally, child welfare officials in Colorado, Ohio, and Massachusetts said that certain services for children affected by trauma or certain service providers were not billable to Medicaid, although Medicaid officials in these states offered a different perspective and cited alternative ways to support these children. Depending on the state, child welfare officials said they could not bill wraparound services, trauma assessments, transportation, or non-traditional therapies, such as animal therapy or community and relationship building. County child welfare officials in Ohio also mentioned restrictions on providers; they said that potential peer support specialists with a criminal background and interns could not bill Medicaid. However, Medicaid officials in these states generally said that such services were billable to Medicaid, and Ohio Medicaid officials said that interns and those with a criminal background could bill Medicaid, under certain circumstances. For example, they said that while certain severe criminal offenses, such as homicide, could exclude someone from providing services, those with lesser offenses could become eligible after a waiting period. Colorado and Ohio Medicaid officials we spoke with offered some alternative ways to use Medicaid to support children affected by trauma in cases where services could not be billed to Medicaid. For example, a Colorado Medicaid official and a child welfare official both said that Medicaid does not pay providers for travel time or mileage and that this can be a problem in rural areas; however, the state Medicaid official said that telehealth is available to address this issue and that reimbursement rates for services in rural areas can be higher to reflect the additional cost of travel. Finally, child welfare and Medicaid officials in Colorado and North Carolina also had different perspectives regarding Medicaid reimbursement rates. Child welfare and other officials in these states said that certain services for children affected by trauma, such as trauma assessments and trauma-focused, evidence-based therapies, are expensive, and that Medicaid reimbursement rates are too low to incentivize providers to offer these services. However, Colorado and North Carolina Medicaid officials explained that most children in Medicaid in their states receive mental health care through managed care, where the state pays a set rate per child to managed care organizations (MCOs) to provide or arrange for any mental health services a child may need, including trauma-related care. MCOs, in turn, reimburse providers for the services they deliver, and MCOs set the rates they pay providers for those services rather than the state. Medicaid officials in Colorado and North Carolina noted that MCOs have flexibility to negotiate rates with providers and may choose to reimburse at a higher rate. North Carolina Medicaid officials said that some MCOs in their state were reimbursing providers at a higher rate for comprehensive, trauma-informed mental health assessments, and a Colorado Medicaid official also noted that MCOs in their state may vary reimbursement rates based on provider availability, offering higher rates in areas where there are shortages. We provided a draft of this report to HHS and Education for review and comment. HHS did not provide written comments. Education provided technical comments, which were incorporated into the report as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretaries of HHS and Education, congressional committees, and other interested parties. In addition, this report will be available at no charge on the GAO website at https://www.gao.gov If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In addition to the contact named above, Elizabeth Morrison (Assistant Director), Ramona L. Burton (Analyst-In-Charge), Isabella Guyott, and Robin Marion made significant contributions to this report. Also contributing to this report were Luqman Abdullah, Susan Aschoff, Sarah Cornetto, Kelsey Kreider, Hannah S. Locke, Jean McSween, Mimi Nguyen, Stacy Ouellette, Michelle Rosenberg, Almeta Spencer, Daren K. Sweeney, Shelia L. Thorpe, and Carolyn Yocom.", "summary": "Trauma is a widespread, harmful, and costly public health problem, and its effects are especially detrimental to children. Any frightening, dangerous, or violent event that threatens a child or their loved ones can potentially be traumatic. While not every child who experiences trauma will suffer lasting effects, trauma significantly increases the risk of mental health problems, difficulties with social relationships and behavior, physical illness, and poor school performance. GAO was asked to review selected states' efforts to support children affected by trauma. This report describes (1) the assistance that HHS and Education provide to help state and local agencies support children affected by trauma; (2) how child welfare and education agencies in selected states support these children; and (3) the challenges these agencies have faced in selected states in supporting these children. GAO interviewed state and local officials in six states that were selected based on recommendations from subject-matter experts and federal officials, among other factors; administered a questionnaire to 16 state agencies in the selected states; interviewed federal officials from HHS and Education; and reviewed relevant federal, state, and local agency documents, such as reports and guidance. Although our findings cannot be generalized to all states, they provide insight into government support for children affected by trauma. GAO is not making recommendations in this report. The Department of Health and Human Services (HHS) and the Department of Education (Education) provide grants, disseminate information, and fund training and technical assistance to help state and local agencies support children affected by trauma. HHS's Administration for Children and Families and Substance Abuse and Mental Health Services Administration (SAMHSA) have awarded discretionary grants specifically to address childhood trauma. In addition, state and local officials reported making use of other discretionary grants from HHS and Education—as well as formula funds meant for broad purposes like mental health, substance abuse, child welfare, and education—to support their work with children affected by trauma. In terms of non-financial support, state and local officials in six selected states all referred to the National Child Traumatic Stress Network, which is funded by SAMHSA, as an important resource for information, training, and technical assistance. Both HHS and Education have also made other guidance and informational resources available to states. Officials in child welfare and education agencies in the six selected states reported using a range of approaches to help children affected by trauma, including training staff, screening children, and providing services and support systems. To train child welfare workers, educators, and birth and foster parents to understand trauma and its effects on children, agencies in the six selected states used various approaches, such as learning communities, which include in-person learning and coaching, and online courses. Several state child welfare agencies also used learning communities to train clinicians in trauma-focused therapies. In addition, child welfare and education agencies in five states used screening tools to identify children exposed to and exhibiting symptoms of trauma. Children identified as experiencing trauma are referred for a trauma-informed mental health assessment. Also, to help children affected by trauma, child welfare and education agencies in five of the six states provide support and services. For example, in one state, caseworkers provide specialized services, including weekly visits, to children and families. Officials in the six selected states reported facing various challenges in their efforts to support children affected by trauma, and they emphasized the importance of engaged leadership in establishing and sustaining support for these children. In three states, officials said that a lack of such leadership hindered their efforts, and they described cases that included delayed, incomplete, or unsuccessful implementation of initiatives. Officials in all six states also talked about limitations on their agency's capacity to support children affected by trauma, including: high rates of staff turnover, especially in child welfare; limited staff time to dedicate to trauma initiatives; lack of clinicians trained in trauma-focused therapies; and insufficient funding to support trauma initiatives. Officials in some states reported strategies they have used to help address these challenges, including providing additional support to employees and coordinating with partner agencies to jointly leverage resources, expertise, and data.", "document_type": "gao"}
{"report": "OSC is an independent federal investigative and prosecutorial agency. Its primary mission is to safeguard the merit system in federal employment by protecting employees and applicants for federal employment from prohibited personnel practices, especially reprisal for whistleblowing. OSC reviews disclosures of wrongdoing within the federal government from current federal employees, former employees, and applicants for federal employment. These individuals, known as whistleblowers, make disclosures of alleged wrongdoing to OSC that the employee reasonably believes evidences either (1) a violation of law, rule, or regulation; (2) gross mismanagement; (3) gross waste of funds; (4) abuse of authority; (5) a substantial and specific danger to public health or safety; or (6) censorship related to research, analysis, or technical information. If a whistleblower believes his or her agency took, threatened to take, or did not take a personnel action because of a protected disclosure, the whistleblower may file a retaliation complaint with OSC. An employee may file a retaliation complaint with OSC even if the protected disclosure was made to another body such as an Inspector General’s office rather than OSC. Various statutory provisions have established protections for federal employee whistleblowers over the years. The Civil Service Reform Act of 1978 provided the first statutory whistleblower protections for disclosures of violations of laws, mismanagement, or gross waste of funds for federal employees, former employees, and applicants for employment. The 1978 act established both the Merit Systems Protection Board (MSPB) and OSC and placed OSC within MSPB. Under the act, OSC was authorized to review allegations of wrongdoing within federal agencies, to investigate and obtain corrective action over allegations of prohibited personnel practices, including whistleblower retaliation, and to initiate disciplinary actions against employees who commit prohibited personnel practices, among other things. Later, to strengthen protections for those who claim whistleblower retaliation, Congress passed the Whistleblower Protection Act of 1989. The 1989 act separated OSC from MSPB, making OSC an independent agency. The act also created the individual right of action, allowing whistleblowers to bring their appeals to MSPB after exhausting remedies at OSC. In 2012, the Whistleblower Protection Enhancement Act clarified the scope of protected whistleblowing under the Whistleblower Protection Act and mandated broader outreach to inform federal employees of their whistleblower rights, among other things. Further, the Dr. Chris Kirkpatrick Whistleblower Protection Act of 2017, among other items, enhanced disciplinary penalties for supervisors who retaliate against whistleblowers. Federal employees in the civil service are required to serve a period of probation when they begin serving initial appointments. These periods are typically for 1 to 2 years, and they allow an agency to evaluate the employee before the appointment becomes final. Our prior work notes that the probationary period provides a way for agencies to dismiss poorly performing employees or those engaging in misconduct before the process to do so becomes more complex and lengthy. In particular, we concluded that the probationary period could be more effectively used by agencies, which in turn could help agencies deal with poor performers more effectively. According to MSPB, the probationary period, if used fully, is one of the most helpful assessment tools available for supervisors to determine an individual’s potential to fulfill the requirements of the specific position. During the probationary period, the employee is still technically considered an applicant for employment. As such, probationary employees do not have the same protections against adverse personnel actions as other employees. Prior to firing a probationary employee for poor job performance or misconduct, an agency does not need to afford the same procedural protections required before removing a non- probationary employee. Therefore, it is reasonable to expect that probationary employees will be terminated at higher rates than permanent employees. Probationary employees also lack the same rights to appeal adverse actions, such as demotions or removals, to the MSPB that other federal employees have. However, probationary employees do have some legal protections. For example, probationary employees may file a complaint with OSC if they believe a personnel action such as reassignment, demotion, or removal was retaliation for whistleblowing. If OSC determines there are reasonable grounds to believe that retaliation has occurred, it may seek corrective action, including filing a petition with the MSPB. Additionally, a probationary employee who has filed a complaint with OSC may subsequently file an individual right of action with MSPB. Probationary employees also may appeal to MSPB if they believe they have been fired for partisan political reasons or because of discrimination based on their marital status. Probationary employees also have the right to file a complaint of discrimination with their agencies and subsequently file an appeal of a final agency decision with the Equal Employment Opportunity Commission or a civil action in federal district court if they believe that they have been discriminated against based on their race, color, religion, sex, national origin, age, disability, or genetic information. The average annual total of probationary and permanent federal employees from fiscal years 2014 through 2018 was approximately 1.9 million. During the same time period, 14,043 federal employees filed whistleblower disclosures, whistleblower retaliation complaints, or both. That is, an average of roughly 2,800 employees—about 0.15 percent of the federal workforce—filed complaints each year. For whistleblower disclosure complaints, whistleblower retaliation complaints, or both over this 5-year period, we estimate that probationary employees filed between 6.6 percent and 18.2 percent of complaints, while permanent employees filed between 76.8 percent and 93.4 percent of complaints. Because existing data are insufficient to determine probationary status of employees for more than 18 percent of each year’s complaints, it is not possible to determine whether probationary employees file at lower, comparable, or higher rates than their prevalence (about 13.5 percent, on average, across this time period) in the overall employee population. Figure 1 shows how many employees we could determine through matching were in probationary and permanent status when they filed whistleblower disclosure or retaliation complaints, along with the numbers of unmatched complaints for fiscal year 2018. The pattern is similar for the other years we examined; estimates for each year are available in appendix II. Overall, probationary employees—whether or not they have filed a complaint with OSC—are terminated at a higher rate than permanent employees, which is consistent with expectations that determining the suitability of employees for the particular position is a major purpose of the probationary period. In fiscal year 2018, 1.1 percent of probationary employees were terminated, regardless of whether they filed a whistleblower disclosure or retaliation complaint. In the same year, 0.3 percent of permanent employees were terminated, regardless of filing status. These percentages were consistent across the years we studied. As discussed below, estimated termination rates for permanent and probationary employees who filed either or both types of complaints we examined consistently exceeded these government-wide rates. Specifically, among permanent employees who filed, estimated termination rates could be anywhere from 1.7 to 17.1 percentage points higher than the 0.4 percent average for all permanent employees over this period. Among probationary employees who filed, estimated termination rates could be from 5.3 to 72.6 percentage points higher than the 1.3% average for these employees government-wide. Whistleblower disclosures. Estimated termination rates among employees who filed whistleblower disclosures from fiscal years 2014 to 2018 were higher than termination rates among all federal employees. This applies to both probationary and permanent employees. Specifically, estimated termination rates for probationary employees who filed were higher than estimated termination rates for permanent employees who filed. For example, as shown in table 1, in fiscal year 2018: The lowest estimated rate (minimum) of termination among probationary employees who filed whistleblower disclosures was 10.1 percent, compared to the overall 1.1 percent termination rate for all probationary employees. The lowest estimated rate (minimum) of termination among permanent employees who filed whistleblower disclosures was 2.9 percent, compared to the overall 0.3 percent termination rate for all permanent employees. Taking unmatched complaints into account, we estimated that the termination rate for probationary employees who filed whistleblower disclosures could be any percentage from 10.1 to 46.9 percent. Taking unmatched complaints into account, we estimated that the termination rate for permanent employees who filed whistleblower disclosures could be any percentage from 2.9 to 5.2 percent. The minimum estimated termination rate for probationary employees (10.1 percent) who filed whistleblower disclosures exceeds the maximum estimated rate for permanent employees who filed whistleblower disclosures (5.2 percent). Whistleblower retaliation complaints. We found that the lowest possible rates (minimums) of termination for employees who filed whistleblower retaliation complaints were higher than termination rates among all federal employees, both for probationary and permanent employees. Specifically, estimated termination rates for probationary employees who filed were higher than estimated termination rates for permanent employees who filed. For example, as shown in table 2, in fiscal year 2018: The lowest estimated rate (minimum) of termination for probationary employees who filed retaliation complaints was 17.4 percent, compared to the overall 1.1 percent termination rate for all probationary employees. The lowest estimated rate (minimum) of termination for permanent employees who filed retaliation complaints was 5.5 percent, compared to the overall 0.3 percent termination rate for all permanent employees. Taking unmatched complaints into account, we estimated that the termination rate for probationary employees who filed whistleblower retaliation complaints could be any percentage from 17.4 to 69.4 percent. Taking unmatched complaints into account, we estimated that the termination rate for permanent employees who filed retaliation complaints could be any percentage from 5.5 to 9.9 percent. The minimum estimated termination rate for probationary employees who filed retaliation complaints (17.4 percent) exceeds the maximum estimated rate for permanent employees who filed retaliation complaints (9.9 percent). Both whistleblower disclosures and retaliation complaints. For the category of employees who filed both whistleblower disclosures and retaliation complaints, termination rates were higher than termination rates among all federal employees, both for probationary and permanent employees. Specifically, estimated termination rates for probationary employees who filed were higher than estimated termination rates for permanent employees who filed. For example, as shown in table 3, in fiscal year 2018: The lowest estimated rate (minimum) of terminations among probationary employees who filed both whistleblower disclosures and retaliation complaints was 14.1 percent, compared to the overall 1.1 percent termination rate for all probationary employees. The lowest estimated rate (minimum) of terminations among permanent employees who filed both types of complaints was 7.8 percent, compared to the overall 0.3 percent termination rate for all permanent employees. Taking unmatched complaints into account, we estimated that the termination rate for probationary employees who filed both types of complaints could be any percentage from 14.1 to 56.3 percent. Taking unmatched complaints into account, we estimated that the termination rate for permanent employees who filed both types of complaints could be any percentage from 7.8 to 13.2 percent. The minimum estimated termination rate for probationary employees who filed both a whistleblower disclosure and a retaliation complaint (14.1 percent) exceeds the maximum estimated rate for permanent employees who, filed both types of complaints (13.2 percent). As previously discussed, probationary employees being terminated at a higher rate than permanent employees is consistent with expectations, given that determining the suitability of employees for the particular position is a major purpose of the probationary period. However, the higher rate of termination for filers generally, and the higher estimated rates for probationary employees specifically, suggests a potential relationship between filing and terminations that may disproportionately impact probationary employees. As stated earlier, we did not determine whether the disclosures and complaints filed had merit, whether termination actions were justified, or whether the terminations occurred before or after the filing of the whistleblower disclosure or retaliation complaint. As such, further examination would be needed to fully understand these relationships. OSC requires federal employees to use OSC Form-14 to submit a complaint alleging a prohibited personnel practice or a disclosure. Complainants begin the process by selecting a checkbox based on their particular complaint or disclosure. Depending on their selections, complainants are asked to provide additional information. Data fields on the form that are marked with an asterisk are mandatory. OSC instructions state that the agency cannot process forms lacking necessary information. OSC Form-14 includes a non-mandatory data field that asks whether the complainant is currently a probationary employee. Because it is not a required field, complainants may choose not to provide that information. According to OSC, it has designated only a limited amount of requested information as mandatory. OSC officials said that to avoid creating impediments for employees to file complaints, mandatory fields are limited to the information that is necessary for processing a complaint. In August 2019, according to OSC officials, OSC transitioned to a new electronic Case Management System (eCMS). This new system’s electronic version of the complaint form includes a data field as part of the question about employee status. Here employees can check off probationary status for OSC to capture and input complainants’ probationary status. According to OSC, when complainants provide this information, the agency is able to track the information in eCMS. OSC officials estimated that a number of filers voluntarily provide information on probationary status; however, the officials could not specify to what extent filers provide that information in their initial filings, or the extent to which this data is collected during processing of the case. OSC’s mission is to “safeguard the merit system by protecting federal employees and applicants from prohibited personnel practices, especially reprisal for whistleblowing.” Additionally, OSC’s 2017-2022 strategic plan includes an objective to ensure agencies provide timely and appropriate outcomes for referred whistleblower disclosures. One of the agency’s strategies to help achieve that objective is to monitor all whistleblower disclosures and referrals to agencies to identify trends or systemic challenges. Further, Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. OSC officials stated that OSC’s routine administration of disclosures and complaints allow them to identify trends. However, this process does not consistently use standard, structured data to identify trends, but rather relies on the personal experience of investigators. Without consistent quality information, including information on probationary status, OSC cannot have reasonable assurance that it is adequately identifying trends and challenges. OSC told us that because of limited resources it currently has no plans to conduct data studies or analyses of employees in their probationary period who file whistleblower claims. As previously discussed, the higher rates of termination we found for complainants, and in particular for probationary employees, suggests a potential relationship that warrants further examination. However, without consistent identification of probationary employees who file whistleblower claims, OSC will continue to lack complete data that would enable this analysis and support OSC’s goal of identifying trends and systemic challenges. Collecting and maintaining such information on every claimant, which could now be more easily done under eCMS, would provide OSC or other entities the ability to analyze termination rates or other issues related to a whistleblower’s probationary status. Having more complete information on trends and challenges could help OSC to ensure that its current level of resources are being distributed to support its mission. Probationary employees, by definition, are relatively new to their positions and are thus uniquely vulnerable to retaliation from employers due to the limited protections afforded them. Our estimates demonstrate that employees who file whistleblower disclosures and complaints of retaliation are terminated at a higher rates than employees government- wide, and suggest that these differences may be more pronounced for probationary employees. OSC has roles and responsibilities related to understanding key trends and challenges for whistleblowers, and could potentially further investigate whether these differences indicate a particular risk for probationary employees. However, they are not collecting data on probationary status that would enable them to do so. Without consistent information on probationary status, OSC is unable to properly analyze the effect of that status on those who file whistleblower disclosures, retaliation complaints, or both; and thus, cannot have reasonable assurance there is equal treatment of probationary employees. The Office of Special Counsel should require federal employees who are filing whistleblower disclosures or retaliation complaints to identify on their complaint forms their status as a permanent or probationary employee. We provided a draft of this report to OSC for review and comment. In its written comments, reproduced in appendix III, OSC disagreed with our conclusions and recommendation. While we continue to believe that our conclusions and recommendation are fully supported by the evidence— as discussed below—we made minor clarifications to our report to more clearly state the nature of our findings in response to OSC’s comments. OSC also provided technical comments, which we incorporated as appropriate. In its written comments, OSC expressed a concern that our report overreaches. OSC stated that our report appears to draw its conclusions based on correlative instead of causative data. Specifically, OSC stated that our report appears to connect the expected greater rate of termination of probationary employees to whistleblower retaliation, based on correlative data and without taking into account key factors such as justification for the termination, timing in relation to the disclosure or the filing of a complaint, or the merit of the individual’s complaint. Absent this type of crucial, detailed analysis that could help determine causation, OSC stated that few, if any, conclusions can be drawn regarding alleged retaliation experienced by probationary employees. As stated in our draft report, and noted by OSC, our estimates demonstrate that employees who file whistleblower disclosures and complaints of retaliation are terminated at higher rates than employees government-wide, and the estimates suggest that these differences may be more pronounced for probationary employees. Our draft report acknowledged that we did not assess certain factors: (1) whether the disclosures and complaints filed had merit, (2) whether the termination actions were justified, or (3) whether the termination actions occurred before or after the filing of the whistleblower disclosure or retaliation complaint. Because we did not control for these factors, we did not speculate about what caused these differences to occur or make causal claims about the relationship between probationary status and whistleblower retaliation. Instead, we stated that further examination and analysis would be needed to fully understand this indicator of potential risk. As we noted in the report, such analysis would require complete and accurate data on probationary status—data which OSC does not currently collect. Therefore, we recommended that OSC collect more complete data so that OSC could, if it chose, do exactly the type of crucial, detailed analysis that it says could help determine causation. Accordingly, we continue to believe that our recommendation for OSC to collect complete and accurate data on probationary status is warranted as such analysis is not possible without it. OSC also expressed a concern that our report appears to suggest that it perhaps may not be doing enough to protect probationary employees. OSC asserted that it already has reasonable assurance that it is appropriately protecting probationary employees from unlawful retaliation. We did not assess OSC’s review of the filed disclosures and complaints, and we made no claims or implications about whether OSC’s protection of whistleblowers is adequate or appropriate. Our report uses one specific outcome (terminations) as an example of an adverse employment action that could potentially signal retaliation. We did not present any findings about whether terminations were warranted, whether employees were appropriately protected, or any other information related to OSC’s handling of cases. We continue to believe, however, that OSC’s ability to run relevant data reports is constrained when the necessary data are not collected for the total population of filers. Without consistent quality information, including information on probationary status of all filers, OSC cannot have reasonable assurance that it is adequately identifying trends and challenges. Lastly, OSC stated that making employment status fields mandatory is onerous and unnecessary and that singling out probationary status from the list seems arbitrary and incomplete. The agency stated that the form includes the option for the individual to self-identify as a probationary employee, which OSC believes is sufficient. We do not believe that changing a field from optional to mandatory would place an undue burden on filers or OSC. We are sending copies of this report to relevant congressional committees, the Special Counsel and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2717 or jonesy@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives were to (1) analyze the extent to which employees who filed whistleblower disclosures and retaliation complaints were in a probationary status, (2) analyze the extent to which these filings were associated with differences in termination rates, and (3) examine Office of Special Counsel (OSC) procedures related to probationary employees. We reviewed the Office of Special Counsel’s OSC 2000 database design documentation and submitted questions to OSC officials to determine what data were available. OSC does not collect or maintain data that identify whistleblowers and retaliation complaints filed by employees in probationary status in OSC 2000. In late August of 2019 OSC officials state that in late August of 2019 OSC launched a new system called the electronic Case Management System (eCMS) to replace OSC 2000. We submitted a series of questions pertaining to how OSC will collect and maintain probationary status information of employees filing complaints in eCMS. These questions pertained to the functionality of and reporting capability of eCMS in addition to OSC’s ability to conduct analysis of complainants who are in probationary status using eCMS. We obtained all closed whistleblower disclosure case data and closed prohibited personnel practices complaint data with allegations related to whistleblower retaliation from 2014 to 2018 from OSC’s previous electronic case management system (OSC 2000). We also requested and obtained 2014 to 2018 OPM Enterprise Human Resources Integration (EHRI) data. OSC 2000 is a case management system, so it was necessary to use combinations of variables associated with complaints filed, such as first name, last name, agency, email address, and job series to identify individual employees. We analyzed employees from federal agencies that submit human resources information to OPM. Factors such as complaints filed anonymously, name changes, and spelling variations could affect the precision of these counts of employees. However, because we are presenting these data in broad ranges throughout the report, these limitations do not likely affect our overall findings and message. After identifying employees in the OSC 2000 data, we then matched OSC 2000 data to OPM’s EHRI data. This was necessary because the OSC 2000 database does not include the probationary status of people filing complaints with OSC. We started by matching unique name and agency combinations. If that was not sufficient, we attempted to match using variables such as state, job series, and employee work email address. We matched OSC 2000 data to EHRI data using case data from OSC 2000 and federal probationary status as of the end of the fiscal year date from EHRI. We acknowledge that matching using these dates may not be precise, but because we present our results in ranges, we do not believe a more precise matching of dates would have resulted in substantive differences in the results overall. We matched 82 percent of the complaints in OSC 2000 to employees in EHRI. . Because it is not possible to determine the probationary status for unmatched cases, the rates of filing among matched cases may not precisely reflect the overall rates for all probationary employees. To account for this uncertainty, we estimated minimum and maximum rates of filing for permanent and probationary employees, and present these ranges in addition to the specific matched rates. Further, we calculated the number of instances in which matched employees who filed either a whistleblower disclosure or a retaliation complaint were terminated from federal employment. As we did with filing rates, we also estimated minimum and maximum termination rates to account for the uncertainty introduced by unmatched cases. Terminations were used because they represent adverse consequences for employees which could indicate retaliation. While other indicators, such as transfers could represent a potential retaliatory action, we focus on terminations because this is the most serious adverse action for which probationary employees have the little protection, and because OSC officials indicated that complaints with termination are prioritized. We did not determine (1) whether the disclosures or complaints had merit, (2) whether the termination actions were justified, or (3) whether the termination actions were before or after the filing of the whistleblower disclosure or retaliation complaint. Because these estimates do not consider the timing or merit of terminations, or other factors potentially associated with terminations, they do not represent proof of a causal relationship between filing and terminations, but rather one indicator of potential risk. To produce reasonably conservative estimates, we made certain assumptions in estimating the minimum and maximum rates in our ranges. Specifically, for unmatched cases we assumed that unknown characteristics, including probationary status and termination rate could be as much as 3.5 times their observed rate in known data. We believe these assumptions are reasonably conservative. While it is not impossible for this small group of unmatched complaints to be even more skewed, there is no evidence to suggest such an extreme assumption would be warranted. We assessed the reliability of the OSC 2000 and EHRI databases for the purposes of using limited data from these databases for our own analysis. We reviewed agency documents, electronically tested data for missing data and outliers, and submitted questions to agency officials about these databases. These two databases are the only sources of data that can be compared to determine the probationary status of individuals filing complaints with OSC. We determined that OSC’s data were sufficiently reliable to present the number of complaints filed by type. With regard to probationary status, the data were not available in OSC 2000. As a result, probationary status and termination rates were drawn from EHRI, which we found to be sufficiently reliable for this purpose. We conducted this performance audit from January 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The figure shown below details the distribution of probationary matched, permanent matched,and unmatched complaints for fiscal years 2014- 2018. In addition to the contact named above, Clifton G. Douglas Jr. (Assistant Director), Katherine Wulff (Analyst-In-Charge), Michael Bechetti, Karin Fangman, Steven Flint, Robert Gebhart, Steven Putansu and Wesley Sholtes made key contributions to this report.", "summary": "Federal employee whistleblowers—individuals who report allegations of wrongdoing—potentially help to safeguard the government from fraud, waste, and abuse. OSC was created to help protect whistleblowers. Probationary employees—generally those with less than 1 or 2 years of federal service—can be especially vulnerable to reprisal because they have fewer protections from adverse personnel actions, including termination. A 2017 law included a provision for GAO to examine retaliation against whistleblowers in their probationary period. This report examines (1) the extent to which probationary employees filed whistleblower disclosures or reprisal complaints, (2) termination rates of complainants, and (3) OSC procedures related to probationary employees. GAO used complaint data and workforce data to identify the probationary status of employees who filed claims with OSC from fiscal year 2014 to 2018 (the most recent full years of available data); estimated the number of instances where claimants were terminated; and reviewed OSC procedures. GAO found that existing data are not sufficient to determine if the rates of filing whistleblower disclosures, retaliation complaints, or both vary by probationary status. The average annual number of probationary and permanent federal employees from fiscal years 2014 to 2018 was approximately 1.9 million employees. Over this time frame, an average of approximately 2,800 employees—about 0.15 percent—filed complaints each year. Existing data were not sufficient to determine probationary status of employees for over 18 percent of each year's complaints. Therefore, it is not possible to determine whether probationary employees file at lower, comparable, or higher rates than their prevalence in the overall employee population. Specifically, probationary employees represented about 13.5 percent, on average, of the federal workforce, and GAO estimates that they filed from 6.6 percent to 18.2 percent of complaints. GAO estimates suggest that both permanent and probationary employees who filed complaints were consistently terminated at higher rates than federal employees government-wide. For example, in fiscal year 2018, the termination rate for probationary employees government-wide was 1.1 percent, while the lowest estimated rate of termination among probationary employees who filed a complaint was 10.1 percent. For permanent employees, the overall termination rate was 0.3 percent, while the lowest estimated rate for filers was 2.9 percent. GAO estimates also suggest that probationary employees who filed complaints were terminated at higher rates than permanent employees who did the same. For example, in fiscal year 2018: The lowest estimated termination rate for probationary employees who filed whistleblower disclosures (10.1 percent) exceeded the maximum estimated rate for permanent employees who did the same (5.2 percent). The lowest estimated termination rate for probationary employees who filed retaliation complaints (17.4 percent) exceeded the maximum estimated rate for permanent employees who did the same (9.9 percent). The lowest estimated termination rate for probationary employees who filed both types (14.1 percent) exceeded the maximum estimated rate for permanent employees who did the same (13.2 percent). The Office of Special Counsel's (OSC) complaint form allows but does not require complainants to identify whether they are probationary or permanent employees when filing a whistleblower disclosure or retaliation complaint. OSC officials said they try to limit mandatory data fields to the information that is necessary for processing a case, and that they have no plans to do any analysis of employees in their probationary period who file claims. However, the higher rates of termination GAO found for filers generally, and probationary employees specifically, suggests that there could be a risk of unequal treatment. Without first identifying probationary employees who file whistleblower claims, OSC would lack complete data should it decide at some point to analyze the effect of probationary status on filers. Collecting and maintaining such data on every claimant would provide OSC or other entities the ability to analyze termination rates or other issues related to a whistleblower's probationary status. GAO recommends that OSC require claimants to identify their status as permanent or probationary employees. OSC disagreed with GAO's recommendation. GAO continues to believe the recommendation is valid, as discussed in the report.", "document_type": "gao"}
{"report": "VHA manages one of the largest health care delivery systems in the United States and is responsible for overseeing the provision of health care at VA medical facilities. VA relies on its EHR system—VistA—to document the delivery of health care services to veterans. To facilitate care, clinical providers access patient medical records and document the care they provide in EHR systems. Patient information needs to be accessible and consistent to prevent risks to patients’ safety, particularly when shared between providers. Information that is electronically exchanged from one provider to another must adhere to the same standards to be consistently interpreted and used in EHRs. In our prior work, we found that EHR technology has the potential to improve the quality of care that patients receive and to reduce health care costs. VistA has served as VA’s EHR system for more than 30 years. Over the last several decades, it has evolved into a technically complex system that comprises about 170 modules that support health care delivery at more than 1,500 medical facilities. In addition, customization of VistA, such as changes to the modules by the various medical facilities, has resulted in approximately 130 versions of the system VA-wide. Furthermore, as we have reported, VistA is costly to maintain and does not fully support VA’s need to electronically exchange health records with other organizations, such as DOD and community providers. VA and DOD have historically operated separate EHR systems. In addition to patient data from its own EHR system, VA relies on patient data from DOD to help ensure that it has access to the necessary health information that could assist clinicians in making informed decisions to provide care to service members transitioning from DOD to VA’s health care system. We have previously reported on VA’s challenges in managing health information technology and modernizing VistA. In 2015, we designated VA health care as a high-risk area for the federal government, in part due to its information technology challenges. Specifically, we identified limitations in the capacity of VA’s existing information technology systems, including the outdated, inefficient nature of key systems and a lack of system interoperability, as contributors to the department’s challenges related to health care. In our 2019 update to the high-risk series, we stressed that VA should demonstrate commitment to addressing its information technology challenges by stabilizing senior leadership, building capacity, and finalizing its action plan for addressing our recommendations, and by establishing metrics and mechanisms for assessing and reporting progress. We also have issued numerous reports over the last decade that highlighted the challenges facing VA in modernizing VistA and improving EHR interoperability with DOD. VA created the Office of Electronic Health Record Modernization in 2018 to lead its EHRM program effort, which was intended to result in a more modern EHR system that would improve providers’ ability to deliver care, and share health data, including between VA and DOD and between VA and community providers. For example, with improved interoperability, medical providers would have the ability to query data from other sources while managing chronically ill patients, regardless of geography, or the network on which the data reside. In June 2017, the VA Secretary at the time announced that the department planned to acquire and configure the same EHR system that DOD is currently implementing across the military health system. According to the VA Secretary, the department decided to acquire the same system as DOD because it would allow all of VA’s and DOD’s patient data to reside in one system, thus assisting the departments in their goals of enabling seamless care between VA and DOD without the exchange and reconciliation of data between two separate systems. As VA planned to implement the same system DOD is implementing, experts recommended that VA and DOD coordinate to ensure that the departments could leverage efficiencies and minimize variation between the departments’ EHR system configurations when practical. DOD’s initial implementation of the Cerner EHR system occurred between February and October 2017 at four military treatment facilities in the state of Washington. In September 2019, the system was implemented at four additional military treatment facilities in California and Idaho. DOD plans to continue to implement the EHR system in 23 phases through 2023 with the next implementation expected to take place at eight additional military treatment facilities in California and Nevada. VA’s EHRM program originally planned to implement the Cerner EHR system at two VA medical facilities in spring 2020 with a phased implementation of the remaining facilities over the next decade. The EHRM program chose the Mann-Grandstaff VA Medical Center in Spokane, Wash. and the VA Puget Sound Health Care System in Seattle, Wash. as its initial operating capability sites. Information gathered from these sites will be used to help VA make EHR system configuration decisions and standardize work processes for future locations where the commercial EHR system will be implemented. In August 2019, the EHRM program adjusted its schedule to implement the commercial EHR system at these two sites in two phases, known as capability sets 1 and 2: Capability set 1 includes key EHR functionalities necessary to implement the system at the Mann-Grandstaff VA Medical Center, a level 3—that is, less complex—facility. Capability set 1 was originally scheduled for implementation in March 2020. Capability set 2 includes remaining functionalities necessary to implement the system at the VA Puget Sound Health Care System, a level 1—that is, highly complex—facility, in the fall of 2020. In February 2020, VA postponed the implementation of the Cerner EHR system at the Mann-Grandstaff VA Medical Center until July 2020. According to VA officials, the additional time will allow Cerner to develop and establish a more complete and robust training environment, as requested by VHA clinicians and other facility staff. In addition, according to VA EHRM program officials, the implementation delay will allow VA and Cerner to have time to develop additional interfaces between the Cerner EHR system and other VA systems, such as VA’s mail-order pharmacy system. These officials told us that the delayed implementation of the Cerner EHR system at the Mann-Grandstaff VA Medical Center was not expected to impact VA’s timeline for implementing the EHR system at the VA Puget Sound Health Care System in the fall of 2020. In April 2020, the VA Secretary announced that the department had shifted priorities to focus on caring for veterans in response to the pandemic created by the Coronavirus Disease 2019 (COVID-19). Further, the Secretary directed the EHRM program to allow clinicians who had been participating in EHRM program activities to focus on caring for veterans. According to program officials, they paused the implementation of the EHR system and were assessing the impact of the COVID-19 pandemic on VA’s planned implementation schedule. VA’s EHRM program used a multi-step process to make EHR system configuration decisions for the Cerner EHR system being implemented at the VA Mann-Grandstaff Medical Center and Puget Sound Health Care System. This process included forming EHR councils and convening these councils at national and local workshops to make configuration decisions used by VA’s contractor, Cerner, to configure the new EHR system. The EHR councils also assessed the compatibility of the EHR system with the processes VA clinicians and staff follow in delivering care. EHR councils. In fall 2018, VA’s EHRM program established 18 EHR councils, based upon specific clinical and administrative areas, to make VA-specific EHR system configuration decisions for these areas. Each EHR council included subject-matter experts from VA, such as health care providers in various clinical areas and other staff, as well as non-VA participants from DOD and Cerner. According to VA EHRM program officials, Cerner’s typical process for configuring its EHR system was modified to accommodate VA’s needs, which VA officials stated were more complex than those of Cerner’s commercial clients. According to Cerner officials, Cerner does not typically establish councils as part of its EHR system configuration process. National workshops. VA’s EHRM program planned and held eight national workshops from November 2018 to October 2019, during which members of all 18 EHR councils met to make standardized EHR system configuration decisions for the VA health care system. VA’s EHRM program utilized DOD’s version of the Cerner EHR system—MHS Genesis—as its starting point for the EHR system configuration process. During the workshops, Cerner assigned consultants to facilitate these workshops, who highlighted Cerner’s commercial best practices and prepared workflow designs, according to VA EHRM program and Cerner officials; facilitated EHR system configuration decision discussions and noted input from EHR council members and other session participants such as DOD representatives; held sessions that involved members from different EHR councils for system configuration decisions that required coordination between councils. For example, the Business Operations Council and the Ambulatory Council held joint sessions to address scheduling appointments for oncology patients; was responsible for identifying and documenting recommendations for EHR system configuration decision differences between VA sites, and each medical facility specialty/department; and provided weekly progress updates to VA that reflected overall progress of expected decisions to be completed compared to the actual approved EHR system configuration decisions during national workshops. Over the course of the eight national workshops, EHR council members were responsible for making EHR system configuration decisions in given clinical and administrative areas and communicating them to Cerner; providing progress updates to VA’s EHRM program and VA leadership; and notifying appropriate governing bodies (e.g., VHA program offices— such as the Office of Primary Care) of any local, state, federal, VISN, and department policies that impact configuration decisions. More specifically, each council discussed VA’s work processes and documented relevant information that informed the configuration of the EHR system, including: (1) “workflows”—”process maps” that capture the start-to-finish sequence and interactions of related steps, activities, or tasks for each work process that VA medical facilities follow. For example, VA has a medication administration workflow for describing the sequence of tasks needed for scanning a patient’s wristband and administering medication. (See fig. 1.) (2) “design decision matrices,” which are compilations of decisions and discussion topics that identify and resolve workflow questions to inform configuration decisions and support implementation of the EHR system. For example, the medication administration design decision matrix documents that clinicians should not be prevented from proceeding with medication administration if a patient’s wristband cannot be scanned. (See fig. 2.) (3) “data collection workbooks,” which capture all of the data needed to inform how the EHR system should be configured to support each workflow, such as user privileges and preferences. For example, a data collection workbook for medication administration includes data on user preferences and prescribing privileges. (See fig. 3.) The EHR system configuration decisions each council needed to make varied significantly in quantity and topic. For example, the Ambulatory Council, charged with focusing on primary care decisions, had over 200 EHR system configuration decisions to make, while the Behavioral Health Council had about 100. Once configuration decisions were made, the EHR councils assessed the compatibility of the configuration of the Cerner EHR system with VA work processes. To do so, VA’s EHR councils reviewed the capabilities of the system and identified work processes that the Cerner EHR system did not support (or only partially supported). For example, according to VA Mann- Grandstaff Medical Center staff, the Cerner EHR system did not originally interface with VA’s Patient Centered Management Module, which supports VA’s work processes for establishing provider-patient relationships. However, in March 2020, VA EHRM officials told us that the interface between the two systems would be available when the Cerner EHR system is implemented at the Mann-Grandstaff VA Medical Center, which was planned for July 2020. In addition, according to VA EHRM officials, Cerner is in the process of developing EHR system capabilities for prosthetics to support VA work processes. Furthermore, according to VA EHRM officials, Cerner has been documenting and tracking needed capabilities for EHR implementation and updating VA’s EHRM program accordingly. According to EHRM program officials, Cerner plans to include functionalities not available in capability set 1 in either capability set 2 or future capability sets, although the development of these capabilities is an ongoing process. Although the eight national workshops have concluded, since October 2019, these EHR councils have continued to meet as necessary, virtually, and in person, to complete capability set 1 and 2 configuration decisions. According to Mann-Grandstaff VA Medical Center staff, as of February 2020, VA still needed to make EHR system configuration decisions to address online prescription refills and assigning patients to primary care panels. Local Workshops. After standardized EHR system configuration decisions were made at the national workshops, they were reviewed at local workshops for site-specific needs. To do this, from December 2018 to October 2019, VA’s EHRM program held eight local workshops at each of the initial operating capability sites—the Mann-Grandstaff VA Medical Center and the VA Puget Sound Health Care System. Local workshops allowed VA and Cerner to identify variances from standardized EHR system configuration decisions made at the national workshops as well as manual processes that needed to be accounted for at local medical facilities. If variances were identified, Cerner reported them to the appropriate EHR councils. While VA tried to minimize the variances in system configuration decisions, in certain cases, necessary alternatives to these configuration decisions were approved for local medical facilities if practicable. For example, according to a Cerner official, the national emergency room triage workflow originally called for an emergency department registrar to register a patient; in response to input from a local workshop, VA developed an alternative workflow, in which an emergency department registered nurse completes the step if a VA facility does not have an emergency department registrar. If there were no variances, EHR system configuration decisions were approved and reported to Cerner to configure the EHR system. According to EHRM program officials, VA plans to hold local workshops in advance of the Cerner EHR system implementation at future VA medical facilities to focus on site-specific configuration decisions. Cerner will continue to facilitate these future local workshop sessions and configure the EHR system based on decisions made at these sessions. Figure 4 provides an overview of the EHR councils’ process for making system configuration decisions. VA met its schedule for making EHR system configuration decisions for capability set 1, which was scheduled for initial implementation at the Mann-Grandstaff VA Medical Center in July 2020. In addition, VA has formulated a schedule for remaining EHR system configuration decisions for capability set 2, which it planned to implement at the VA Puget Sound Health Care System in the fall of 2020. Our review of VA progress data shows that VA met the schedule for making EHR system configuration decisions it had established, which required VA’s 18 EHR councils to make at least 70 percent of decisions needed for capability set 1 by October 18, 2019. An EHRM program official stated that this threshold was required to enable Cerner to configure the EHR system for the Mann-Grandstaff VA Medical Center in anticipation of the system’s initial implementation. According to VA’s progress data, collectively, the 18 EHR councils met the requirement to make at least 70 percent of their total expected EHR system configuration decisions for capability set 1. Specifically, as of early November 2019, VA data for EHR configuration decisions needed for capability set 1 indicated that the EHRM program had developed: 877 of 966 (or 91 percent) of workflows; 1,397 of 1,412 (or 99 percent) of design decision matrices; and 1,364 of 1,610 (or 90 percent) of data collection workbooks. After the EHR councils collectively met VA’s goal to make 70 percent of EHR system configuration decisions by October 18, 2019, efforts continued to make the remaining decisions for capability set 1. In March 2020, VA data indicated that, combined, the EHR councils had developed an additional: 9 percent of workflows—874 of 878 (or nearly 100 percent); 1 percent of design decision matrices—1,459 of 1,467 (or nearly 100 10 percent of data collection workbooks—1,746 of 1,751 (or nearly 100 percent). (See Appendix I for additional details on specific changes from November 2019 to March 2020 by EHR councils.) As noted earlier, though the workshop process has concluded, a VA EHRM program official stated that they had plans to hold virtual—over teleconference or videoconference—meetings to allow the EHR councils to make remaining EHR system configuration decisions for capability set 1 at the Mann-Grandstaff VA Medical Center, by March 2020. VA’s EHRM program has formulated a schedule for making EHR system configuration decisions for capability set 2, which are necessary to support the implementation of the Cerner EHR system at the VA Puget Sound Health Care System planned for the fall of 2020. Specifically, VA’s EHRM program is continuing to make EHR system configuration decisions outside of the workshop process, which concluded in October 2019. Currently, EHRM program officials have plans to hold smaller meetings, about a fourth of the size of the national workshops, to make EHR configuration decisions that require input from multiple councils for capability set 2. According to EHRM program officials, the program set a goal of developing capability set 2 workflows, design decision matrices, and data collection workbooks by May 2020 so that the EHR councils could start validating the system configuration decisions at that time. EHRM program officials anticipate that this schedule for capability set 2 gives Cerner enough time to configure the EHR system and establish a training environment to enable implementation of the EHR system at the VA Puget Sound Health Care System planned for the fall of 2020. According to program officials, capability set 2 is composed of about 90 percent of configuration decisions for capability set 1 and 10 percent of additional workflows and data collection workbooks. These officials also told us that, as part of the process of making capability set 2 configuration decisions, they would determine the effectiveness of these decisions based on the implementation of capability set 1 at the Mann-Grandstaff VA Medical Center and make any necessary changes. VA’s EHRM program established EHR council decision-making procedures that were generally effective. In addition, the councils included a wide range of stakeholders, in terms of geographic representation and representation from VA central office, VISNs, and medical facilities. However, according to EHR council participants, VA did not always ensure adequate representation at local workshops. VA’s EHRM program’s decision-making procedures for the EHR councils were generally effective as demonstrated by adherence to applicable federal standards for internal control. According to these standards, management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. In addition, according to our leading collaboration practices, clarity can come from agencies working together to define and agree on their respective roles and responsibilities and participating agencies should document their agreement. VA’s EHRM program established the organizational structure, assigned responsibility, and delegated authority for system configuration decisions to the EHR councils. Specifically, the EHRM program developed a charter for the councils that outlined each council chair’s responsibility for managing council membership and ensuring it is consistent with guidelines for broad representation; outlined council member roles and responsibilities, such as participating in face-to-face meetings and conferences, providing subject matter expertise, and guiding EHR system configuration decisions; and delegated authority for EHR system configuration decisions from the EHRM Chief Medical Officer to the council chair and members. According to EHRM program documentation, VA established decision- making authority at the lowest level possible, beginning with the EHR councils, to ensure timely and appropriate decision-making. Based on our observations of national council workshop meetings, if a council had questions that involved coordination with another council, the Cerner consultant present would take note of the issue and coordinate a meeting with the relevant councils to discuss the issue. For example, participants from the Ambulatory Council met with participants from the Rehabilitation and Acute Clinical Ancillaries Council to discuss the EHR system configuration decisions for ordering glasses and contacts. Based on our review of the Functional Governance Board charter and meeting minutes, when a decision required coordination and could not be made at the EHR council level, it was identified and escalated to the Functional Governance Board. The Functional Governance Board provided guidance on addressing issues or, in turn, escalated unresolved issues to the higher-level Governance Integration Board, or if appropriate, to a joint VA and DOD coordination process. According to EHRM program officials, as of February 2020, there were no issues escalated from the Functional Governance Board to the Governance Integration Board because the council governance structure strived to make decisions at the lowest level possible. Figure 5 provides an overview of the EHRM program’s decision-making procedures. With respect to collaboration, because VA is using the same system as DOD, VA has had to coordinate with DOD on some decisions. Although both departments have procedures for configuring the Cerner EHR system for their individual needs, VA EHRM program officials noted the importance of coordinating to design a system that would allow sharing of information and tasks between VA and DOD. According to VA EHRM program officials, for example, VA and DOD coordination is necessary for workflows pertaining to durable orders for life-sustaining treatments—medical treatments intended to prolong the life of a patient who would die soon without the treatment (e.g., artificial nutrition and hydration, and mechanical ventilation). VA and DOD’s practices differed on how to address such treatment, and Cerner’s process did not accommodate VA’s need to maintain durable orders across patient encounters, so they would not need to be re-written every time a patient changed care setting or location. VA requested changes to the Cerner EHR system to allow it to continue to follow its current process for documenting life-sustaining treatments, but according to DOD officials, the proposed changes did not align with DOD’s position on such treatments, specifically resuscitation statuses. After multiple discussions between the VA and DOD clinicians, the two departments plan to adopt an interim solution. According to VA and DOD officials, VA and DOD’s joint decision-making body, the Functional Decision Group, has met weekly to address coordination issues since early 2019. These officials said that the joint Functional Decision Group determined whether it could make a decision, or whether additional information was needed and a team should be established to work on dispute resolution between the departments. VA EHRM program officials said that the coordination procedures for the joint Functional Decision Group would be formalized and that the roles and responsibilities for coordination between VA and DOD would be clearly defined, in response to a recommendation we made in a previous report. Specifically, VA and DOD have developed a charter for the joint Functional Decision Group, which was signed in April 2020. According to EHR council participants, VA and DOD had been developing their coordination procedures as system configuration decisions were made, and decisions that required input from both departments may not have been as timely as they could have been. According to EHRM program officials, the departments ultimately were able to address most decisions and coordination on remaining decisions was ongoing as of March 2020. VA’s EHRM Program Largely Met EHR Council Charter Goals for Representation VA generally included a wide range of stakeholders in its 18 EHR councils. Specifically, VA was largely in line with its EHR councils’ charter goals to include about 60 percent of council members from the field, with the remainder from the central office, and to have representatives from a range of geographic locations and with sufficient experience and expertise: VA data show that EHR councils had about 58 percent (607 of 1,039) of its members representing the field and about 40 percent (415 of 1,039) representing VA’s central office, roughly in line with VA’s goals. The councils included participants from a variety of geographic regions, including each of its 18 VISNs, with the most participants representing VISN 20, which oversees the two medical facilities where the new EHR system is scheduled to be initially implemented. Participants primarily represented the most complex level of VA medical facilities. Specifically, VA data show that about 83 percent (861 of 1,039) of participants represented level 1 VA medical facilities, whereas about 3 percent (33 of 1,039) and 7 percent (75 of 1,039) represented medium (level 2) and low (level 3) complexity VA medical facilities, respectively. EHRM program officials said that the majority of participants represented higher-complexity facilities because participants were drawn from national experts and published authors, and often performed VA-specific processes. Furthermore, smaller medical centers had fewer resources so clinicians were more likely to be needed to continue providing patient care at those facilities and less likely to be available to serve on councils. According to a voluntary questionnaire VA asked council participants to complete, about 37 percent of the 304 participants who completed the survey had at least 6 years of experience at VA; 29 percent had at least 16 years of experience; and, 19 percent had more than 25 years of experience. In addition to participants from the VA, we observed that EHR council national workshop meetings included participants from outside of the department—such as clinicians from DOD sites and commercial health care systems that had already implemented Cerner’s EHR system. These participants provided support for discussions and insight into industry best practices. While the EHR councils included a wide range of participants, in September and October 2019, council participants from both of the initial operating capability sites raised concerns that the councils did not include adequate representation from specialty areas at national workshop meetings. Specifically, these officials said that an insufficient number of specialty physicians, including pulmonologists and gastroenterologists, were included. In addition, VA’s summary from the last workshop, national workshop 8, observed that additional subject matter experts representing medical specialties should be included in the EHR system configuration decision process to enhance collaboration and decision- making. EHRM program officials, including the Chief Medical Officer and Ambulatory Council chairs, said they had not included certain specialists and scheduled workshops on specialty areas, such as pulmonology and gastroenterology as they decided to focus first on more foundational decisions, such as those for primary care. Starting in November 2019, following the completion of the eight national workshops, VA EHR councils continued to meet, as necessary, to complete capability set 1 and 2 configuration decisions and had begun to include clinicians from specialty areas in these meetings. VA plans to continue these meetings through September 2020. VA’s approach of including clinicians from specialty areas in ongoing configuration decision meetings is generally consistent with our leading collaboration practice that agencies should ensure that all relevant participants be included in any collaborative effort they undertake. By including relevant participants, the program increases the likelihood that it has considered input from participants with unique knowledge, skills, and abilities. Further, including relevant participants increases the likelihood that when implemented, the EHR system will be properly configured to meet the needs of clinicians, and effectively support their efforts to deliver care. VA’s EHRM Program Did Not Always Include Key Stakeholders at Its Local Workshops Local workshops at the Mann-Grandstaff VA Medical Center and VA Puget Sound Health Care System did not always include representation from relevant stakeholders, including facility clinicians and staff. Specifically, multiple participants in the local workshop meetings, including clinicians and department leads, at these facilities said that VA’s EHRM program did not always effectively communicate information about local workshop meetings to facility clinicians and staff to facilitate the designation of staff to participate and ensure relevant representation at local workshops. Local workshop participants stated that they did not always know which local workshop meetings they needed to attend, because they did not receive adequate information about the session topics. This is inconsistent with key collaboration practices identified in our prior work to ensure that relevant participants be included in any collaborative effort and that participating entities have agreed on common terminology. Furthermore, standards for internal control in the federal government call for effective communication and information sharing. Local workshop participants, including clinicians and department leads from medical facilities said that differences in the use of terminology between VA and Cerner sometimes made it challenging to identify the clinicians and staff that should attend local workshop meetings. For example, some officials reported that they did not believe that a meeting on “charge services” would be relevant to their work given that VA does not typically bill veterans for services. However, they later learned that the meeting actually covered topics beyond billing, such as capturing workload data that was relevant to their work. Because Cerner and VA did not always effectively communicate regarding workshop content for local workshops, local workshops did not always include all relevant stakeholders. As previously stated, VA plans to hold local workshops in advance of the Cerner EHR system implementation at future VA medical facilities. However, VA has not indicated how it will improve the ways in which it describes the topics of these workshops, including providing sufficient detail and defining key terms. If VA improves communication on workshop meeting topics, the EHRM program can increase the likelihood that it will obtain appropriate input from facility clinicians and staff at local workshops to consider in design decisions for the implementation of the EHR system. VA met its schedule for making the needed system configuration decisions that would enable the department to implement its new EHR system at the first VA medical facility, which was planned for July 2020. In addition, VA has formulated a schedule for making the remaining EHR system configuration decisions before implementing the system at additional facilities planned for fall 2020. VA’s EHRM program was generally effective in establishing decision- making procedures that were consistent with applicable federal standards for internal control. However, VA did not always ensure the involvement of relevant stakeholders, including medical facility clinicians and staff, in the system configuration decisions. Specifically, VA did not always clarify terminology and include adequate detail in descriptions of local workshop sessions to medical facility clinicians and staff to ensure relevant representation at local workshop meetings. Participation of such stakeholders is critical to ensuring that the EHR system is configured to meet the needs of clinicians and support the delivery of clinical care. We are making the following recommendation to VA: For implementation of the EHR system at future VA medical facilities, we recommend that the Secretary of VA direct the EHRM Executive Director to clarify terminology and include adequate detail in descriptions of local workshop sessions to facilitate the participation of all relevant stakeholders including medical facility clinicians and staff. (Recommendation 1) We provided a draft of this report to VA and DOD for comment. In its comments, reproduced in appendix II, VA concurred with our recommendation and described steps that it planned to take to address it. Specifically, VA noted that it planned and designed its workshops to enable collaboration between clinical and administrative experts and end- users so that the EHR system is designed, validated, and configured to promote interoperability and quality care for veterans. VA stated that it is further refining local workshop agendas and descriptions to facilitate VA subject matter expert identification and participation. VA also provided technical comments on the report, which we incorporated as appropriate. DOD provided technical comments on the report, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretaries of VA and DOD, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact Debra A. Draper at (202) 512-7114 or DraperD@gao.gov or Carol C. Harris at (202) 512-4456 or HarrisCC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the individuals named above, Mark Bird (Assistant Director), Michael Zose (Assistant Director), Merry Woo (Analyst-in-Charge), Bianca Eugene, and Paris Hawkins made key contributions to this report. Also contributing were Jennie F. Apter, Giselle Hicks, Monica Perez- Nelson, and Ethiene Salgado-Rodriguez.", "summary": "VA's existing EHR system is antiquated, costly to maintain, and does not fully support VA's need to exchange health records with other organizations, such as the Department of Defense. As a result, VA has undertaken a modernization effort to replace it. As VA prepares to transition from its existing EHR system to a commercial system, it has the opportunity to design standardized work processes to support the delivery of care and ensure information on veterans' care is consistently captured, regardless of site of care. GAO was asked to review VA's EHR system configuration process. This report examines, among other objectives: (1) how VA made EHR system configuration decisions and assessed the compatibility of the commercial EHR system with its work processes; and (2) the effectiveness of VA's decision-making procedures, including ensuring key stakeholder involvement. GAO observed national and local workshop meetings; visited planned initial implementation sites; reviewed documentation on the processes and schedule; and interviewed VA, DOD, and contractor officials. The Department of Veterans Affairs (VA) used a multi-step process to help ensure that its future commercial electronic health record (EHR) system is configured appropriately for, and is compatible with, its clinical work processes. To configure the EHR system, which VA planned to implement initially at the Mann-Grandstaff VA Medical Center, in Spokane, Washington, in July 2020, and at the Puget Sound Health Care System in the fall of 2020, VA established 18 EHR councils comprising VA clinicians, staff, and other experts in various clinical areas and held eight national workshops between November 2018 and October 2019. At these workshops, the councils decided how to design the functionality of the EHR software to help clinicians and other staff deliver care and complete tasks such as administering medication. VA also held eight local workshops at both medical centers to help ensure that the EHR configuration supported local practices. As of March 2020, the EHR councils were continuing to meet to complete configuration decisions. Furthermore, VA plans to hold local workshops in advance of the EHR system implementation at future VA medical facilities. In April 2020, the VA Secretary announced that the department had shifted priorities to focus on caring for veterans in response to the pandemic created by COVID-19. According to program officials, at that time, they paused the implementation of the EHR system and were assessing the impact of the COVID-19 pandemic on VA's planned implementation schedule. GAO found that VA's decision-making procedures were generally effective as demonstrated by adherence to applicable federal internal control standards for establishing structure, responsibility, and authority, and communicating internally and externally, but that VA did not always ensure key stakeholder involvement. Specifically, the councils included a wide range of stakeholders from various geographic regions. However, according to clinicians from the two initial medical facilities for implementation, VA did not always effectively communicate information to stakeholders, including medical facility clinicians and staff to ensure relevant representation at local workshop meetings. As a result, local workshops did not always include all relevant stakeholders. VA has not indicated how it plans to describe these future sessions and define key terms to ensure key stakeholder participation in local workshops. By ensuring that all relevant stakeholders are included, VA will increase the likelihood that it is obtaining input from a wide range of clinicians and staff who will use the EHR system and will increase the likelihood that when it is implemented, the EHR system will effectively support the delivery of care at VA medical centers. GAO is recommending that VA ensure the involvement of all relevant medical facility stakeholders in the EHR system configuration decision process. VA concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Dual-eligible beneficiaries qualify for both Medicare and Medicaid, and may enroll in and receive benefits covered by each program. Individuals ages 65 or older can qualify for Medicare based on age, and individuals ages 18 to 64 can qualify for Medicare based on disability. Medicaid eligibility varies by state, but beneficiaries may qualify based on having a low level of income, a need for nursing home care, high medical expenses, or other criteria. For dual-eligible beneficiaries, Medicare is the primary payer for any benefits covered by both programs. As a result, Medicare is the primary payer for acute and post-acute care, such as physician services, hospitalizations, prescription drugs, and skilled nursing facility care. For many dual-eligible beneficiaries, Medicaid covers benefits not covered by Medicare. This includes long-term services and supports, which may include nursing home care, personal care services, or adult day care. Whether Medicaid covers these benefits varies between the two main categories of dual-eligible beneficiaries. Those in the first category are known as full-benefit, dual-eligible beneficiaries, because they may receive all Medicaid benefits, in addition to Medicare benefits. Medicaid also pays for their Medicare premiums and, in some cases, the cost- sharing for their Medicare benefits. Those in the second category are known as partial-benefit, dual-eligible beneficiaries, because Medicaid assistance is limited to payment of their Medicare premiums and, in some cases, the cost-sharing for their Medicare benefits. Partial-benefit, dual- eligible beneficiaries have limited income and assets, but their income and assets are not low enough to qualify them for full Medicaid benefits in their state. For Medicare, dual-eligible beneficiaries can choose to receive their Medicare services from either traditional Medicare or from MA plans. These options differ in key ways. For example, traditional Medicare may have a more extensive provider network than MA plans. However, MA plans may cover additional benefits, such as vision or dental care, which are generally not covered under traditional Medicare. If dual-eligible beneficiaries choose to enroll in MA plans, they may also have the choice between regular MA plans and D-SNPs, which offer certain services targeted at the needs of dual-eligible beneficiaries. For example, D-SNPs are required to perform health risk assessments, create individualized care plans, and provide an interdisciplinary care team for each beneficiary enrolled. They may also cover transportation services, home modifications, or other specialized services that are more likely to be used by dual-eligible beneficiaries. For Medicaid, states may allow or require Medicaid beneficiaries, including dual-eligible beneficiaries, to receive their Medicaid benefits through an MCO. In this managed care model, Medicaid MCOs are responsible for arranging for and paying providers’ claims for a specific set of Medicaid benefits provided to beneficiaries. More recently, some states have created new Medicaid managed care programs or expanded the benefits covered by existing Medicaid managed care programs in order to include additional populations previously covered through Medicaid fee-for-service. The new populations include seniors, persons with disabilities, and those who need long-term services and supports— many of whom may be dually eligible. A dual-eligible beneficiary may be able to enroll in a D-SNP and Medicaid MCO that are offered by the same or related companies, an arrangement known as aligned enrollment. In states with MLTSS, aligned enrollment means the same or related companies provide a beneficiary’s Medicare benefits, such as primary and acute care, through a D-SNP and Medicaid benefits, such as long-term services and supports, through a Medicaid MCO. State Medicaid agencies enter into contracts with both D-SNPs and Medicaid MCOs, and these contracts may include provisions to facilitate and encourage aligned enrollment. Since January 2013, all D-SNPs have been required to have an executed contract with the Medicaid agency in each state in which it operates. A state can enter into contracts with all, some, or none of the D-SNPs seeking to operate in the state, and any D- SNPs that the state declines to contract with cannot operate in the state. Each year, CMS reviews D-SNPs’ contracts with states to ensure that they include eight required elements, including the D-SNP’s responsibility for providing or arranging the provision of Medicaid benefits, among other things. According to CMS officials, in these reviews, CMS does not collect information regarding whether states are imposing requirements pertaining to aligned enrollment. States also have contracts with Medicaid MCOs, which can include requirements that could facilitate or encourage aligned enrollment. As shown in table 1, CMS’s Integrated Care Resource Center has identified five types of approaches that states can use to encourage aligned enrollment. For example, states can manage which D-SNPs operate in the state, such as only allowing D-SNPs with an aligned Medicaid MCO (that is, a MCO offered by the same company or a related company). This gives dual-eligible beneficiaries greater options for choosing aligned enrollment. As another example, states can allow the automatic assignment of certain dual-eligible beneficiaries to a D-SNP aligned with a Medicaid MCO, a process known as default enrollment. Default enrollment, which requires CMS approval, can directly increase the number of dual-eligible beneficiaries with aligned enrollment. In addition to D-SNPs with aligned enrollment, two other types of Medicare plans—Medicare-Medicaid plans and Program of All-Inclusive Care for the Elderly plans—exclusively or primarily serve dual-eligible beneficiaries and are responsible for both Medicare and Medicaid benefits. These three types of Medicare plans jointly served approximately 818,000 dual-eligible beneficiaries as of January 2019. Aligned enrollment in D-SNPs: As of January 2019, approximately 386,000 dual-eligible beneficiaries enrolled in D-SNPs had aligned enrollment, according to a report by the Medicare Payment Advisory Commission. This includes beneficiaries in a subset of D-SNPs that have been designated as fully integrated D-SNPs, which must meet additional specific requirements. For example, they must provide both Medicare and Medicaid benefits through a single managed care plan. In addition, the Medicaid benefits provided by the fully integrated D- SNPs must include long-term services and supports. Medicare-Medicaid plans: As of January 2019, approximately 388,000 dual-eligible beneficiaries in nine states were enrolled in these types of plans. These plans, which were established through CMS’s Financial Alignment Initiative, provide all Medicare benefits and all or almost all Medicaid benefits, and have some administrative processes that have been combined. In April 2019, CMS sent a letter to state Medicaid directors inviting additional states to express interest in the use of Medicare-Medicaid plans. Program of All-Inclusive Care for the Elderly plans: As of January 2019, approximately 44,000 beneficiaries in 31 states were enrolled in these types of plans. Most, but not all, are full-benefit, dual-eligible beneficiaries, and they are ages 55 or older and need the level of care provided in a nursing home. The plans are provider-sponsored and provide all Medicare and Medicaid benefits. In addition, each plan is required to have a physical site to provide adult day services. As of July 2019, of the 19 states with MLTSS and where aligned enrollment of dual-eligible beneficiaries in D-SNPs is possible, 16 have implemented at least one of the five approaches to encourage aligned enrollment identified by CMS’s Integrated Care Resource Center. (See fig. 1.) Of those 16 states, 11 managed which D-SNPs operate in the state, which is the foundation for promoting aligned enrollment, according to officials from the Integrated Care Resource Center. Of our seven selected states, all of them had implemented at least one of the five approaches to encourage aligned enrollment in 2019. The three most common approaches among our selected states were (1) managing which D-SNPs operate in the state; (2) limiting D-SNP enrollment to full- benefit, dual-eligible beneficiaries; and (3) encouraging D-SNP marketing to better support informed beneficiary decision-making. The details of the approaches implemented in each state varied widely. Managing which D-SNPs operate in the state. Five of the seven selected states (Arizona, New Jersey, Pennsylvania, Tennessee, and Virginia) managed which D-SNPs operated in 2019, but they varied in how they implemented this approach. For example, when Virginia established its Medicaid MLTSS program in 2017, only one D-SNP operated in the state, and Virginia required the companies with Medicaid MLTSS contracts to also start offering D-SNPs within 3 years. In contrast, when Pennsylvania and Tennessee implemented this approach, multiple D-SNPs already operated in each state. Pennsylvania and Tennessee required new D-SNPs to have aligned Medicaid MCOs, but allowed existing D-SNPs to continue operating. As a result, beneficiaries had the choice between D-SNPs that had aligned Medicaid MCOs and D-SNPs that did not have aligned Medicaid MCOs. Medicaid officials in these two states told us they chose not to cancel existing D-SNPs that did not have aligned Medicaid MCOs, as doing so could have disrupted beneficiary- provider relationships. As a result of the selected states’ differing approaches to managing which D-SNPs operated, the proportion of aligned to unaligned D-SNPs in each state varied. (See fig. 2.) Limiting D-SNP enrollment to full-benefit, dual-eligible beneficiaries. Five of the selected states (Arizona, Kansas, New Jersey, Pennsylvania, and Virginia) limited D-SNP enrollment in some or all of their D-SNPs to full-benefit, dual-eligible beneficiaries in 2019. In particular, Arizona and New Jersey Medicaid officials said that limiting D-SNP enrollment to full- benefit, dual-eligible beneficiaries allowed D-SNPs to provide a more straightforward benefit package. In turn, this can be more easily described in D-SNP materials and communications, which may help beneficiaries to make more informed decisions around aligned enrollment. Encouraging D-SNP marketing to better support informed beneficiary decision-making. Five of the selected states (Arizona, New Jersey, Pennsylvania, Tennessee, and Virginia) took steps to encourage D-SNP marketing to support informed beneficiary decision-making in 2019. For example, Arizona and Pennsylvania encouraged D-SNPs to directly market themselves to beneficiaries in the D-SNP’s aligned Medicaid MCO, in order to promote aligned enrollment. In addition, New Jersey Medicaid officials told us they review D-SNP marketing and work directly with D-SNPs to develop standard marketing language. In particular, the officials said some D-SNPs had marketed themselves as offering certain extra benefits, but those benefits were already a standard part of the state’s Medicaid package. The officials said they worked with the D-SNPs to correct the marketing, and they also developed standard language for marketing in the state. This can help reduce beneficiary confusion when making enrollment decisions. Automatically assigning certain beneficiaries to plans with aligned enrollment. Four selected states (Arizona, Florida, Pennsylvania, and Tennessee) allowed automatic assignment of certain beneficiaries to plans with aligned enrollment in 2019. For example, Arizona, Pennsylvania, and Tennessee allowed default enrollment by which certain Medicaid beneficiaries were automatically assigned to aligned D- SNPs. Under federal rules, beneficiaries have the opportunity to opt out prior to being default enrolled and select a different source of Medicare coverage; they also have the opportunity to disenroll within the first 90 days after default enrollment and select a different source of Medicare coverage. In addition, Florida and Pennsylvania automatically assigned certain dual- eligible beneficiaries to aligned Medicaid MCOs. For example, Florida law requires the state Medicaid agency to automatically assign certain D-SNP enrollees to aligned MLTSS plans when beneficiaries become eligible for long-term services and supports and have not voluntarily chosen an MLTSS plan. Engaging counselors to assist beneficiaries with aligned enrollment decisions. Two of the seven selected states (Arizona and Pennsylvania) engaged enrollment counselors to encourage aligned enrollment in 2019. For example, Arizona’s state Medicaid office works with the state’s Aging and Disability Resource Center and State Health Insurance Assistance Program counselors to increase beneficiary understanding of aligned enrollment and options to enroll in aligned plans. In 2019, Pennsylvania’s contracts with D-SNPs required collaboration between the D-SNPs and the state’s independent enrollment broker that assists beneficiaries with Medicaid enrollment. In addition to there being variation in the selected states’ use of approaches to encourage aligned enrollment, the proportion of D-SNP enrollees with aligned enrollment varied from 20 percent in Pennsylvania to 100 percent in New Jersey among the selected states that were able to provide data for 2019. (See fig. 3.) There can be multiple reasons for the varied levels of aligned enrollment between D-SNPs and MLTSS. For example, Arizona recently entered into new Medicaid MCO contracts, and this resulted in changes to the parts of the state served by each Medicaid MCO. According to state Medicaid officials, these new contracts somewhat reduced the extent of aligned enrollment. Medicaid officials in the seven selected states described various challenges with aligned enrollment. The most common challenge mentioned was difficulty using D-SNP data to implement and evaluate aligned enrollment policies. Medicaid officials in the selected states told us many of these challenges require ongoing monitoring and collaboration with CMS and the companies offering D-SNPs. Difficulty using data to implement and evaluate aligned enrollment. Medicaid officials in six of the selected states (Florida, Kansas, New Jersey, Pennsylvania, Tennessee, and Virginia) told us that using D-SNP and Medicare data to implement and evaluate aligned enrollment policies can be difficult. For example, Tennessee Medicaid officials told us that getting the data from CMS needed for default enrollment was a challenge. In particular, they said that, when the state was first starting to implement default enrollment, they had challenges with getting data from CMS in a timely fashion to identify which Medicaid beneficiaries were about to become dually eligible for Medicare, particularly those with eligibility due to disability. This meant that the state could not provide D-SNPs with the information needed by the D-SNPs to send notices to those beneficiaries in the required time frame. CMS officials also acknowledged that its data do not always identify individuals becoming eligible for Medicare early enough for D-SNPs to send notices in the required time frame. Tennessee Medicaid officials told us that CMS has worked with the state on this issue and it has now become easier for the state to receive the needed data. Furthermore, CMS and its Integrated Care Resource Center have also developed materials and, according to CMS officials, provided ongoing technical assistance for states on accessing data for default enrollment and other aspects of implementation of aligned enrollment. Medicaid officials in Virginia and New Jersey described related challenges with using D-SNP data to determine whether their policies work. Virginia Medicaid officials told us that it can be difficult to evaluate the health benefits of aligned enrollment, because data on quality measures can span multiple states. Specifically, one of the state’s D- SNPs operates in multiple states and therefore reports health outcome data to CMS for its entire service area. Virginia Medicaid officials told us they are not able to separate data for Virginia residents from those of other states. As a result, they said they currently cannot determine the effect of their aligned enrollment policies, and they plan to require the D- SNP to report Virginia-specific quality data in the future. New Jersey Medicaid officials described a challenge with receiving the relevant data to evaluate health outcomes for dual-eligible beneficiaries with aligned enrollment. The state has CMS approval to receive Medicare data directly from CMS. However, as of November 2019, the state’s data vendor was not in compliance with federal Medicare data security requirements for storing certain data, which meant that the state could not accept the Medicare data. The Bipartisan Budget Act of 2018 encourages CMS to require reporting of MA quality measures, including D-SNP quality measures, at the plan level. However, CMS has identified several challenges to developing such a requirement. One challenge CMS has identified is that about two- thirds to three-quarters of D-SNPs would not have reliable ratings, for example, because those plans had too few participants in the survey. Another challenge CMS has identified is the additional complexity and administrative burden for plans completing this reporting. As of December 2019, CMS officials told us they are continuing to work to determine the best reporting level for each quality measure. They also plan to collect additional feedback from stakeholders and a technical expert panel. Difficulties with information dual-eligible beneficiaries receive about Medicare enrollment choices. Medicaid officials in five of the selected states (Kansas, New Jersey, Pennsylvania, Tennessee, and Virginia) told us they have experienced challenges in ensuring that beneficiaries receive quality information about their Medicare enrollment choices. For example, in 2019, Pennsylvania’s contracts with D-SNPs required collaboration between the D-SNPs and the state’s independent enrollment broker that assists beneficiaries with Medicaid enrollment. However, Pennsylvania Medicaid officials told us the state’s independent enrollment broker did not have the capacity to provide this type of assistance in addition to its primary responsibility of assisting beneficiaries with Medicaid enrollment. As another example, Virginia Medicaid officials told us they have faced challenges using state D-SNP contracts to regulate D-SNP marketing. They told us that certain provisions in the state’s contracts with D-SNPs were intended to regulate the extent of D-SNP marketing in 2019. In particular, each D-SNP was supposed to only market to beneficiaries enrolled in that D-SNP’s aligned Medicaid MCO, which was intended to increase the extent of aligned enrollment in the state. However, state Medicaid officials told us that D-SNPs had different interpretations of the contract provisions, and one D-SNP had billboards and television advertisements available to the general public. Due to the difficulty of enforcement, among other reasons, Virginia Medicaid officials told us they chose to not include these provisions in the D-SNP contracts for 2020. Through the Integrated Care Resource Center, CMS has developed materials describing how states can regulate D-SNP marketing in their contracts with D-SNPs, and the agency reviews and may disapprove D- SNP marketing materials that do not follow federal requirements. CMS officials also told us they make themselves available to states to explain how to include marketing restrictions in the contracts that states have with D-SNPs. Limits of staff knowledge. Medicaid officials in four of the selected states (Florida, Kansas, New Jersey, and Pennsylvania) told us that limited staff knowledge of Medicare presents a challenge. For example, Medicaid officials in Kansas told us only one or two staff in the state’s Medicaid agency are knowledgeable about Medicare and would have the knowledge to implement aligned enrollment approaches. Similarly, Medicaid officials in Florida said they only recently learned about one of the approaches for encouraging aligned enrollment, which is that the state can decline to contract with certain D-SNPs. In addition, New Jersey and Pennsylvania Medicaid officials told us staff knowledge of Medicare is limited and that they would like to increase their level of knowledge as they continue to foster aligned enrollment. Competition from look-alike MA plans targeted to dual-eligible beneficiaries. Medicaid officials in four of our selected states (Arizona, Pennsylvania, Tennessee, and Virginia) identified certain MA plans that are so-called “look-alike” plans to the D-SNPs, which create a potential challenge to fostering aligned enrollment. According to CMS, look-alike plans are MA plans that are designed for and marketed exclusively to dual-eligible beneficiaries, but that are not D-SNPs. Therefore, look-alike plans do not need a contract with the state to operate and do not have to comply with state approaches that foster aligned enrollment. Medicaid officials from our selected states and the Medicare Payment Advisory Commission gave examples of the impact of look-alike plans. For example, Tennessee Medicaid officials told us that dual-eligible beneficiaries in look-alike plans do not receive care coordination between Medicare and Medicaid, in contrast with dual-eligible beneficiaries in D- SNPs, which are required to provide such coordination. In addition, Arizona Medicaid officials told us that look-alike plans have affected levels of aligned enrollment in the state. Similarly, according to the Medicare Payment Advisory Commission, look-alike plans can undermine states’ efforts to develop D-SNPs that integrate Medicare and Medicaid by encouraging dual-eligible beneficiaries to instead enroll in look-alike plans. CMS has also identified look-alike plans as a challenge and is considering some steps in response. In 2018, CMS revised its marketing guidelines to prohibit look-alike plans from marketing themselves as designed for dual-eligible beneficiaries and as having a relationship with the state Medicaid agency. In its April 2019 policy update for MA plans, CMS said that look-alike plans enable companies to offer plans that circumvent state and federal requirements for D-SNPs, which undermines efforts to improve the quality of care. In February 2020, CMS published a proposed rule that, if finalized, would prohibit the offering of MA plans whose enrollment of dual-eligible beneficiaries exceeds specific projected or actual enrollment thresholds in states with a D-SNP. According to CMS, this would prevent look-alikes from undermining the statutory and regulatory framework for D-SNPs. Extent of overlapping provider networks. Medicaid officials in two of our selected states (Pennsylvania and Tennessee) reported challenges with aligned D-SNPs and Medicaid MCOs that do not have completely overlapping networks of relevant providers. That is, even though the D- SNP and Medicaid MCO are offered by the same or related companies, certain providers may be in only the D-SNP network or only the Medicaid MCO network—but not both. For example, representatives from a beneficiary group in Pennsylvania told us that a dual-eligible beneficiary’s provider may be in the Medicaid MCO network, but not the D-SNP network. This can disrupt that beneficiary’s continuity of care if he or she is default enrolled into the D-SNP. There are no requirements for the state or D-SNP to ensure that a beneficiary’s primary care provider is in the D-SNP into which he or she is default enrolled. CMS’s model for the notice sent to beneficiaries identified for default enrollment suggests (but does not require) that the D-SNP include information on whether or not the beneficiary’s primary care provider is in the D-SNP’s network. CMS officials said they did not know of any complaints the agency has received on the issue. They also said they have not analyzed how the provider network of a D-SNP compares to the provider network of its aligned Medicaid MCO. Furthermore, in the preamble to the default enrollment final rule issued in April 2018, CMS said that it did not include any criteria related to provider networks, but that network adequacy requirements would apply and states can use their contracts with D-SNPs to create requirements for continuity of care. One state that does this is Tennessee, which specifically requires D-SNPs to develop provider networks that have substantial overlap with the provider network of their aligned Medicaid MCOs. The state also requires D-SNPs to ensure continuity of care for beneficiaries who have been default enrolled. For example, Tennessee Medicaid officials said that if a beneficiary who has been default enrolled has a long-standing primary care provider with the D-SNP’s aligned Medicaid MCO, the state requires the D-SNP to continue covering services by that provider for at least 30 days and to attempt to contract with the provider. CMS has assisted states with aligned enrollment. In particular, CMS has provided technical assistance to states on implementing the various approaches that encourage aligned enrollment. One way that CMS has done this is through its Integrated Care Resource Center, which has developed materials on how states can use their contracts with D-SNPs to align enrollment and promote integration. The Integrated Care Resource Center has also facilitated peer-to-peer assistance between states. For example, Integrated Care Resource Center officials said they facilitated conversations and assistance between state Medicaid officials in New Jersey and Pennsylvania on D-SNP marketing. Medicaid officials in six of our selected states said they had utilized CMS’s technical assistance, and they had overall positive views of CMS’s assistance. CMS reviews some aspects of the contracts between states and D-SNPs, including checking that the contracts include the eight required elements. According to CMS officials, in these reviews, CMS does not collect information regarding whether states are imposing requirements pertaining to aligned enrollment. CMS’s program audits of MA plans similarly do not include reviews of such state requirements pertaining to aligned enrollment. CMS has a direct role with one aspect of aligned enrollment: default enrollment. In particular, CMS approves D-SNPs to receive beneficiaries through default enrollment, and it processes the enrollment transactions of beneficiaries being default enrolled. D-SNPs’ approval for default enrollment: Before a D-SNP can receive beneficiaries through default enrollment, it must submit a proposal to CMS for approval. CMS reviews the D-SNP’s proposal and checks that the D-SNP meets an established list of requirements outlined in regulation. Among other requirements, the D-SNP must demonstrate it has the state’s support for default enrollment and that the required elements have been included in its template for the notice that is sent to beneficiaries identified for default enrollment. CMS also checks that the D-SNP is not facing any CMS enrollment sanctions and that the D-SNP has a quality rating of three or more stars. CMS grants approval for up to 5 years if it determines the D- SNP meets these requirements. Default enrollment transactions: CMS processes the enrollment transactions of dual-eligible beneficiaries being default enrolled, and it tracks these transactions in a monthly report. The monthly report lists the total number of beneficiaries identified for default enrollment for each applicable D-SNP, and the report lists numbers for certain subsets of beneficiaries who were ultimately not default enrolled. These subsets include beneficiaries who opted out prior to being default enrolled and beneficiaries whose default enrollment was not allowed by CMS for various reasons. Despite its direct role in default enrollment, CMS lacks quality information on the experiences of dual-eligible beneficiaries after they are default enrolled. This is inconsistent with federal internal control standards on information and communication, which state that management should use quality information to achieve the agency’s objectives. In particular, the monthly reports on enrollment transactions do not include data on the extent to which dual-eligible beneficiaries choose to disenroll after being default enrolled. Although the reports include data on the number of beneficiaries who opt out prior to being default enrolled (which CMS officials said was low), they do not include data on beneficiaries who choose to disenroll in the first 90 days after being default enrolled. This 90-day time frame for disenrollment is specified by federal regulation, and beneficiaries may choose to disenroll for various reasons. For example, one reason for disenrollment given by one beneficiary group we interviewed is that some beneficiaries may not realize they have been default enrolled into a D-SNP until they next see their provider, and that provider may not be in the D-SNP’s provider network. They said that beneficiaries may not have seen the notice or other information about being default enrolled, or they may not have understood the information. In addition, CMS cannot systematically review beneficiary complaints for trends or concerns related to default enrollment. Dual-eligible beneficiaries, like other Medicare beneficiaries, can submit complaints to CMS. These complaints are entered in the agency’s complaint tracking module, and D-SNP account managers, like other MA plan account managers, are responsible for monitoring complaints. CMS officials said that the D-SNP account managers have not identified any trends or concerns about default enrollment. However, CMS officials said default enrollment is not tracked as a distinct category in the complaint tracking module, and the guidance on monitoring complaints that is provided to the D-SNP account managers does not direct them to look for issues explicitly related to default enrollment. Quality information on the experiences of dual-eligible beneficiaries after they are default enrolled would allow CMS to better identify the extent to which these beneficiaries face challenges as a result of default enrollment and to determine how, if at all, to address the challenges. Future studies may provide CMS with additional information on beneficiaries in D-SNPs with aligned enrollment, but that information will not be available until 2022 or later. In particular, federal law directs the Medicare Payment Advisory Commission, in consultation with the Medicaid and CHIP Payment and Access Commission, to compare the quality of the different types of D-SNPs, including those with aligned enrollment, as well as comparing them to other types of plans. The commission is to develop an initial report by 2022 with subsequent reports afterward. Better care for dual-eligible beneficiaries is one of CMS’s strategic initiatives, and the agency has supported states’ decisions to encourage aligned enrollment in order to encourage better coordination of care. However, CMS lacks quality information on the experiences of beneficiaries who have aligned enrollment as the result of the use of default enrollment. For example, CMS’s monthly reports on default enrollment do not include data on beneficiaries who choose to disenroll after being default enrolled. CMS lacks this information even though selected states and others have reported challenges that could affect the care received by those beneficiaries. Quality information on the experiences of these dual-eligible beneficiaries would allow CMS to better identify the extent to which beneficiaries are facing challenges as a result of default enrollment and to determine how, if at all, to address those challenges. We are making the following recommendation to CMS: The Administrator of CMS should take steps to obtain quality information on the experiences of dual-eligible beneficiaries who have been default enrolled into D-SNPs, such as by obtaining information about the extent to which and reasons that beneficiaries disenroll from a D-SNP after being default enrolled. (Recommendation 1) We provided a draft of this report to the Department of Health and Human Services (HHS) for comment. In its comments, reproduced in appendix I, HHS concurred with our recommendation. HHS stated that it is committed to increasing the number of dual-eligible beneficiaries in integrated care and that it supports states with these efforts, such as the use of aligned enrollment. HHS also said that it has not identified any trends or areas of concern in its monitoring of beneficiaries who opted out prior to being default enrolled. In response to our recommendation, HHS stated it will evaluate opportunities to obtain more information on dual-eligible beneficiaries who disenroll from a D-SNP after being default enrolled. HHS also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Administrator of the Centers for Medicare & Medicaid Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Martin T. Gahart (Assistant Director), Corissa Kiyan-Fukumoto (Analyst-in-Charge), Jason Coates, Kelly Krinn, Virginia Lefever, Drew Long, Jennifer Rudisill, and Ethiene Salgado-Rodriguez made key contributions to this report. Medicare and Medicaid: Additional Oversight Needed of CMS’s Demonstration to Coordinate the Care of Dual-Eligible Beneficiaries. GAO-16-31. Washington, D.C.: December 18, 2015. Disabled Dual-Eligible Beneficiaries: Integration of Medicare and Medicaid Benefits May Not Lead to Expected Medicare Savings. GAO-14-523. Washington, D.C.: August 29, 2014. Medicare and Medicaid: Consumer Protection Requirements Affecting Dual-Eligible Beneficiaries Vary across Programs, Payment Systems, and States. GAO-13-100. Washington, D.C.: December 5, 2012. Medicare Special Needs Plans: CMS Should Improve Information Available about Dual-Eligible Plans’ Performance. GAO-12-864. Washington, D.C.: September 13, 2012. Medicare and Medicaid: Implementing State Demonstrations for Dual Eligibles Has Proven Challenging. GAO/HEHS-00-94. Washington, D.C.: August 18, 2000.", "summary": "Congress authorized the establishment of D-SNPs in 2003 to address the unique needs of dual-eligible beneficiaries. For example, D-SNPs are required to provide certain specialized services targeted at the needs of dual-eligible beneficiaries, such as health risk assessments. D-SNPs must have approval of state Medicaid agencies to operate, and states can require D-SNPs to coordinate with Medicaid. Congress included a provision in statute for GAO to review D-SNPs’ integration with state Medicaid programs. This report, among other objectives, (1) describes what is known about selected states’ experiences with aligned enrollment in D-SNPs, and (2) examines CMS’s oversight of aligned enrollment. GAO reviewed relevant federal guidance and internal control standards. GAO also interviewed Medicaid officials in seven selected states and reviewed available documentation. The states (Arizona, Florida, Kansas, New Jersey, Pennsylvania, Tennessee, and Virginia) were selected, in part, for variation in experiences with aligned enrollment. GAO also interviewed officials from CMS, beneficiary groups, and companies that offered D-SNPs and Medicaid MCOs. Dual-eligible beneficiaries are Medicare beneficiaries who are also enrolled in the Medicaid program in their state. In certain states, they may receive both types of benefits through private managed care plans. As of January 2019, about 386,000 such individuals were enrolled in both a private Medicare plan known as a dual-eligible special needs plan (D-SNP) and a Medicaid managed care organization (MCO) that were offered by the same or related companies. This arrangement, known as aligned enrollment, may create opportunities for better coordination between Medicare's acute care services and Medicaid's long-term services and supports, such as nursing facility care or personal care services. Medicaid officials in seven selected states described challenges with aligned enrollment. One challenge cited by officials in six of the states was using D-SNP and Medicare data to implement and evaluate aligned enrollment. For example, officials in one state said they cannot separate D-SNP quality data for just their state, because some D-SNPs report data spanning multiple states to the Centers for Medicare & Medicaid Services (CMS). As of December 2019, CMS officials said they are determining the best way for D-SNPs to report these quality data. CMS has assisted states with aligned enrollment, but lacks quality information on the experiences of dual-eligible beneficiaries who have aligned enrollment through a process known as default enrollment. With default enrollment, states allow automatic assignment of beneficiaries who are enrolled in a Medicaid MCO and are about to become eligible for Medicare to the D-SNP aligned with that MCO. However, CMS's monthly reports on default enrollment do not include information on beneficiaries who choose to disenroll in the first 90 days after being default enrolled, a time frame specified in regulation. According to one beneficiary group, some beneficiaries may disenroll, because they did not realize they were default enrolled and their provider is not in the D-SNP's network. Quality information on the experiences of dual-eligible beneficiaries after default enrollment would allow CMS to better identify the extent to which beneficiaries face challenges and to determine how, if at all, to address the challenges. GAO recommends that CMS take steps to obtain quality information on the experiences of dual-eligible beneficiaries who have been default enrolled into D-SNPs. The Department of Health and Human Services concurred with the recommendation.", "document_type": "gao"}
{"report": "In addition to retirement benefits to older individuals and their families, SSA administers the nation’s largest disability benefit program, the Disability Insurance (DI) program. DI generally pays benefits to individuals if they are unable to work due to qualifying impairments that are expected to last at least 1 year or result in death. In fiscal year 2018, SSA paid DI benefits to more than 10 million beneficiaries each month for a total of about $144 billion that year. In addition to monthly financial benefits, which averaged about $1,234 per disabled worker in 2018, those eligible for DI also gain access to Medicare after a 2-year waiting period, which can help pay for their medical costs, including prescription opioids. Disabled workers claiming DI benefits must meet work and other requirements to be considered eligible for DI. First, they must have worked for a specified amount of time covered by Social Security as well as worked within a specified timeframe before becoming disabled, based on their age. If these work requirements are met, SSA will assess a number of medical and vocational requirements, including whether the claimant earned more than a set monthly amount, the severity of any impairments they have, and whether they are able to continue working in a similar or other capacity given their age, education, and prior work history (see fig. 1). DI claimants may also apply concurrently for SSA’s Supplemental Security Income (SSI) program, which provides income to individuals who are aged, blind, or disabled with limited income and resources. Such claimants may be deemed eligible for both programs if they meet certain income and resource requirements in addition to those for DI. Under SSI, they may receive additional financial benefits as well as access to Medicaid. Several different program staff are involved in processing DI claims. First, staff in SSA field offices receive applications and determine whether claimants meet nonmedical eligibility requirements, such as having a sufficient work history. Claims for those who meet these requirements are then forwarded to state government Disability Determination Services (DDS) offices, where DDS staff review the claimant’s eligibility based on the medical and vocational requirements outlined in figure 1 above. Specifically, DDS examiners assemble any medical and vocational information for the claim. This can involve contacting a claimant’s treatment providers, and third parties such as family members, friends, and employers, and referring the claimant for consultative exams, such as with physicians or psychologists if recent treatment records are unavailable. DDS examiners then confer with DDS medical consultants, such as in-house or contracted physicians and psychologists, to determine whether the claimant meets the law’s requirements for having a disability. DDS examiners use all of this information to decide whether claimants are eligible for DI. Claimants who are dissatisfied with the initial DDS decision have several opportunities to appeal. First, they generally may request a “reconsideration” of the claim, which is conducted by a DDS examiner who was not involved in the original decision. Next, they may request a hearing before an SSA administrative law judge, who may collect new evidence and ask other witnesses, such as medical and vocational experts, to testify at the hearing. If their claim is denied at this hearings level, claimants may request that it be reviewed by the Appeals Council, which is comprised of SSA administrative appeals judges and appeals officers. Beyond the Appeals Council, the claimant may appeal to a federal district court. Staff at each level of the process must document their decision in a claimant’s case file, in accordance with the agency’s policies. For example, staff are generally required to document the medical evidence they reviewed, any assessments regarding the claimant’s severity of impairments and vocational abilities, and the rationale for their decisions. For allowed DI claims, federal law requires beneficiaries’ cases to be periodically reviewed within specified timeframes to ensure the beneficiary continues to meet DI requirements. DDS examiners conduct such reviews, called continuing disability reviews, conferring with medical consultants and making a decision regarding a beneficiary’s disability in comparison to the evidence from when the claim was allowed to determine if medical improvement has occurred. According to SSA, benefits typically continue unless evidence exists that a beneficiary’s impairment has medically improved and that they are able to return to work. Musculoskeletal conditions, which are pain-related, make up the largest proportion of impairments allowed by SSA for DI benefits. Specifically, these conditions, such as back and joint impairments, made up nearly 33 percent of impairments for disabled workers in 2018. Treatments for pain-related symptoms can include prescription opioids. Nationwide data show that trends in the numbers of opioid prescriptions and DI claims have followed a similar pattern, with both peaking between 2010 and 2014 and then declining. From 2006 through 2017, total opioid prescriptions peaked at about 255 million prescriptions in 2012, and then decreased in each of the following years (see fig. 2). Similarly, DI claims peaked at a maximum of about 1.1 million claims in 2014 and have steadily declined since (see fig. 3). Claims in which individuals applied concurrently for DI and the SSI program (i.e., DI/SSI concurrent claims) peaked a little earlier—at about 1.3 million claims in 2010—before also steadily declining. While trends in opioid prescriptions and DI claims have moved in the same general direction over time, few studies and data sources provide information on the relationship between these trends. For example, we identified two studies, both funded by SSA, that examined the relationship between prescription opioids and disability. One preliminary study in 2017 found a positive correlation between prescription opioids and DI claims, but noted that this correlation was not statistically significant in every model. Researchers for this study noted that additional data and analysis are needed to refine the results. A second study in 2018 did not identify a direct relationship between opioid misuse and disability, but found that they may have an indirect relationship because of other factors such as having poor health, which may lead to unemployment due to disability. Other studies have examined the relationship between prescription opioids and employment, but not DI claims specifically. One such study noted that, based on available data, it is difficult to separate the effects of prescription opioid use and disability on employment outcomes. The study noted further that disentangling the relationship between prescription opioid use and disability is an area in need of additional work. In addition to funding research, SSA collects some administrative data on substance use among DI claimants, including use of prescription opioids. However, these data have limitations for analyzing prescription opioid use. Specifically, SSA collects administrative data on the medications claimants report using when filing their claim, which may include prescription opioids. However, these data may be incomplete because claimants may not report all substances they use. Further, researchers working on a study funded by SSA said analyzing these data is challenging because many claimants manually enter the names of their medications into an optional free-text field on their electronic applications rather than selecting from a dropdown menu, and that these entries often include misspellings or alternative names. SSA also collects administrative data on whether its staff evaluated a substance use disorder while processing a DI claim. However, SSA headquarters officials told us that staff are not required to record this information in the administrative data unless substance use disorders are the basis for a denial. Further, these data only indicate whether a substance use disorder involved alcohol or other drugs. They do not include additional details on the types of drugs involved (e.g., opioids versus methamphetamines). According to SSA headquarters officials, these details are not necessary for evaluating the claim or managing the process for DI eligibility decisions. Given the limitations with the claimant-level data described above, we analyzed county-level data for 2006 through 2017 and found that rates of opioid prescriptions and DI claims varied widely across counties. Specifically, the rate of opioid prescriptions ranged from nearly 0 to 396 opioid prescriptions per 100 people per year across all counties in 2017. Likewise, the rate of DI claims ranged from nearly 0 to 16.4 DI claims per 1,000 people. Most counties, however, were clustered around the median of 65 opioid prescriptions per 100 people and 3.7 DI claims per 1,000 people (see fig. 4). In examining counties with the highest rates of opioid prescriptions and DI claims (i.e., counties in the top third of the distributions for each rate), we found that those with the highest rates of both were generally concentrated in the Southeast (see fig. 5). Specifically, almost 30 percent of counties in the Southeast were among the highest for rates of both in 2017. In comparison, many counties in the West were among the highest for rates of opioid prescriptions, but not for DI claims. Conversely, many counties in the Northeast were among the highest for rates of DI claims, but not for opioid prescriptions. We also observed that these geographic differences were generally consistent over a 10-year period we analyzed. Our analysis shows a positive correlation between rates of opioid prescriptions and DI claims, as well as correlations between these rates and other factors (see fig. 6). Specifically, we conducted regression analyses to examine the relationship between rates of opioid prescriptions and DI claims at the county level from 2010 through 2017, taking into account economic, demographic, and other factors. However, we were unable to determine whether there is a causal relationship between rates of prescription opioids and DI claims or other factors, given readily available data. Further, given the small numbers of DI claims in most counties, we would not expect differences in the rate of DI claims to fully explain differences in the rate of opioid prescriptions. Correlation between opioid prescriptions and DI claims. We found that rates of opioid prescriptions and DI claims were positively correlated before and after accounting for other factors. Specifically, counties with higher rates of opioid prescriptions tended to have higher rates of DI claims and vice versa from 2010 through 2017. We would expect this correlation, given that many DI claimants experience pain, and prescription opioids are intended to help manage pain. Correlations between opioid prescriptions and other factors. Our analysis showed that rates of opioid prescriptions were correlated with poverty rates, population size, and access to health insurance. In particular, counties with higher rates of opioid prescriptions tended to have higher poverty, be less urban and with small- to mid-size populations, and have more people with health insurance from 2010 through 2017. Correlations between DI claims and other factors. Our analysis showed that rates of DI claims were also correlated with poverty rates, as well as unemployment, age, and race. In particular, counties with higher rates of DI claims tended to have higher unemployment and poverty from 2010 through 2017. Those with higher rates of DI claims also tended to have higher percentages of older adult and white populations. SSA’s policies require staff to deny DI benefits to claimants if substance use disorders (including opioids not taken as prescribed) are “material” to the impairments that preclude the claimant from work. For example, substance use disorders would be considered material to the claimant’s impairment if (1) they are the claimant’s only impairment, or (2) the claimant would not be considered disabled if they stopped using drugs or alcohol. To illustrate, program staff described an example, under SSA’s policies, in which they would deny a claimant with a mental health condition, such as depression, who also has a substance use disorder. In particular, if staff determined that substance use was affecting the claimant’s depression, and their mental health would improve to the point of non-disability in the absence of drugs or alcohol, SSA would deny the claim. In contrast, they may allow a claimant with permanent liver damage, even if caused by drug or alcohol use, because the damage is irreversible and would continue to be disabling even if the claimant were to stop using these substances. SSA uses a six-step process, referred to as the Drug Addiction and Alcoholism (DAA) evaluation, to determine whether substance use disorders are material to a claimant’s impairments. In the first two steps of this process, SSA determines whether a claimant is disabled and whether one of the claimant’s “medically determinable impairments” is a substance use disorder. Medically determinable impairments include physical or psychological abnormalities identified through medically acceptable diagnostic techniques and documented in objective evidence from an acceptable medical source, such as a physician or psychologist. If the answer is “yes” to both questions in the first two steps of the DAA evaluation, program staff use the remaining steps to help determine whether the substance use disorder is material to the claimant’s disability (see fig. 7). In conducting DAA evaluations, program staff can involve medical experts to assist them. At the initial level, DDS examiners confer with DDS medical consultants, such as in-house or contracted physicians and psychologists. At the hearings level, administrative law judges can also seek opinions from medical experts during the claimant’s hearing. Substance use disorders are seldom the key factor in DI eligibility decisions, according to SSA data and staff. Specifically, SSA data show that DAA evaluations of substance use disorders—aside from those that involved alcohol only—were the reason for a denial in about 0.1 percent of all decisions at the initial level and 0.3 percent of all decisions at the hearings level in 2017. Staff in our three selected states cited these potential reasons for why substance use disorders are seldom the key factor in DI eligibility decisions: Claimants with substance use disorders may not have qualifying impairments. Staff explained that those who do not have any impairment severe enough to meet SSA’s disability standards can be denied without a DAA evaluation. Medical records do not include enough evidence of a substance use disorder to warrant a DAA evaluation. Staff said some claimants may not have any evidence of a substance use disorder in their file because they may not report all substances they are taking or lack past medical treatment. In addition, staff said those with suspected substance use disorders may not have enough evidence of a disorder in their medical records to warrant a DAA evaluation. For example, they said pain clinics will often discharge a claimant from the clinic (i.e., stop providing services) due to drug-seeking behaviors. However, these pain clinics may not always document the reasons why the claimant was discharged. Further, staff said isolated instances of drug-seeking behaviors or discharges from pain clinics documented in medical records may not necessarily mean that a DAA evaluation is warranted. Some claimants have qualifying impairments, despite having substance use disorders. Staff said substance use disorders may not be the reason a claimant cannot work and may have little or no effect on a claimant’s impairments. For example, in one case file we reviewed, an administrative law judge conducted a DAA evaluation because of the claimant’s substance use disorders, likely involving alcohol and prescription medications, including opioids. The judge allowed the claim after determining that the claimant’s back issues were disabling, independent of the substance use disorders. Use of substances as prescribed by a treatment provider, including opioids, is not considered a substance use disorder. Program staff explained that, per SSA’s policies, they would not consider the use of opioids as prescribed to be a substance use disorder warranting a DAA evaluation, even if they thought the claimant was using unusually high amounts. SSA headquarters officials added that the use of prescription opioids could be considered a substance use disorder and result in a denial if medical records from an acceptable medical source included information about excessive or inappropriate use. Staff told us that making DI eligibility decisions for claims involving substance use disorders, including prescription opioids not taken as prescribed, can be complex. For example, staff in our three selected states noted challenges with subjectivity in conducting DAA evaluations, particularly when the claim involves mental health conditions. They said that certain conditions, such as depression or psychosis, can be exacerbated by substance use disorders. Thus, they said evaluating whether these conditions would continue to be disabling in the absence of drug or alcohol use can be difficult and subjective. We found that program staff faced challenges understanding or following SSA’s policies, based on our interviews with staff in three selected states and our review of 30 case files for DI beneficiaries, which included 15 in which a DAA evaluation had been conducted. Specifically, we found challenges with two aspects of the DAA evaluation process: Determining when to conduct a DAA evaluation. SSA headquarters officials told us that their policies do not require an official diagnosis of a substance use disorder from a treatment provider to conduct a DAA evaluation. Rather, they said a DAA evaluation is required if the potential disorder is considered a medically determinable impairment as defined by the current edition of the American Psychiatric Association’s Diagnostic and Statistical Manual of Mental Disorders—which includes descriptions of many types of substance use disorders—and documented by an acceptable medical source. However, program staff in five of the six offices we visited in the three selected states, including DDS managers and examiners participating in group interviews and three administrative law judges, told us they believed they should not conduct a DAA evaluation unless they see an official diagnosis documented in the medical evidence. SSA headquarters officials discussed why staff may be confused about when to conduct a DAA evaluation, and acknowledged the potential effects. Specifically, they said staff may be confused about the policies for determining what is considered a medically determinable impairment for substance use disorders. Officials said there must be evidence of substance use that is consistent with the general definition of a substance use disorder as defined in the Diagnostic and Statistical Manual of Mental Disorders. They said staff may mistakenly interpret this requirement to mean that they need an official diagnosis to conduct a DAA evaluation. In fact, SSA’s operations manual for determining DI eligibility may also cause confusion. Though officials told us that SSA’s policies do not require an official diagnosis, the operations manual states that staff should only conduct a DAA evaluation when “an acceptable medical source establishes that a claimant is diagnosed with a substance use disorder.” SSA headquarters officials acknowledged that confusion about when to conduct a DAA evaluation could result in evaluations not being done when they should be, as well as claims being evaluated for substance use disorders unnecessarily when they do not meet the standards for being a medically determinable impairment. Documenting the rationale for why substance use disorders did not affect the claimant’s impairment. SSA’s policies for the DAA evaluation process generally require staff to document sufficient information about their evaluations so that a subsequent reviewer can understand the rationale for the decision, which is in keeping with federal standards for internal control. These policies also indicate that a single statement documenting that “DAA is not material” to the claimant’s impairments is not sufficient, and that documentation should be included in the determination and decision, or in other appropriate documents for DDS staff. In the 15 case files in which SSA had conducted a DAA evaluation, nine did not include a documented rationale. For example, in one case file we reviewed, a DDS examiner initially denied a claim for mental health issues after determining that these issues would not be disabling in the absence of the claimant’s substance use disorders, which involved benzodiazepines. An administrative law judge at the hearings level later allowed the claim, but did not document a rationale for why the claimant’s substance use disorders did not affect the claimant’s impairments. SSA headquarters officials agreed that a documented rationale was inappropriately missing in four of the nine case files mentioned above, although they did not indicate why the documentation was missing. For the remaining case files, while they agreed that there was no documented rationale, they asserted that neither a DAA evaluation nor a documented rationale was required. For example, for four of these five case files, officials stated that the substance use disorder was not established as a medically determinable impairment, that the claimant’s impairments were disabling by themselves regardless of whether there was any history of substance use disorders, and that the impairments were irreversible or could not improve to the point of non-disability. Nonetheless, a DAA evaluation was conducted in these case files, underscoring staff’s confusion about when an evaluation is necessary. Furthermore, regardless of whether a documented rationale was required in these case files, such documentation, if included, would ensure the rationale for the decision is clear to a subsequent reviewer, a recommended practice in federal internal control standards. SSA headquarters officials acknowledged that a poorly documented rationale could lead to reversals or remands if staff conducting appeals or quality reviews are unable to understand the decision. This could result in increased processing time for those conducting appeals and quality reviews, as well as for staff who may be required to revisit their decision. For example, in one case file we reviewed, an administrative law judge allowed a claim for mental health issues that had previously been denied at the initial level as a result of the claimant’s substance use disorders involving prescription opioids, alcohol, and marijuana. The case file was later randomly selected for quality review by the Appeals Council, which remanded the case back to the administrative law judge due, in part, to the lack of documented rationale regarding the claimant’s substance use disorders. As a result of the remand, the administrative law judge held a new hearing and issued a new decision that still allowed the claim, but provided a rationale for the DAA decision. SSA headquarters officials told us about efforts that could help ensure staff understand and follow policies for the DAA evaluation process. For example, they discussed training on DAA evaluation and documentation requirements. For DDS examiners, they said this training includes presentation slides and videos on these topics. Similarly, for new administrative law judges and other hearings-level staff, they said mandatory trainings include a module on the DAA policies. While SSA headquarters officials said they generally do not offer additional training beyond this, they noted that DDS examiners and administrative law judges are able to revisit the training materials and receive more local, ongoing training and resource materials as needed. We found examples of local, ongoing training and resource materials on the DAA evaluation process during our interviews in our three selected states. For example, one DDS office we visited had developed a DAA flowchart for its internal website, as well as a question and answer section derived from existing SSA information. Another DDS office had developed its own guidance specifically on documentation requirements for DAA evaluations. DDS managers and examiners in this office said they had sought clarification from the SSA office overseeing their region in developing the guidance, which was used during a local training for disability examiners in January 2019. In addition to training and guidance, SSA headquarters officials told us that compliance with policies for the DAA evaluation process is examined as part of the agency’s larger quality review processes. These processes are designed to ensure that cases are decided accurately. They include national and local reviews of randomly selected decisions at the initial level, as well as national reviews at the hearings level. Identified errors are reported back to the respective offices for correction. However, these reviews do not target claims involving substance use disorders. SSA headquarters officials said the agency does not track how often they review such claims at the initial level. DDS managers in the three selected states who are involved in local quality reviews also told us that such claims are not targeted for review. Despite SSA’s efforts to train staff on the DAA requirements, provide guidance, and conduct quality reviews that may cover DAA evaluations, we found that confusion about implementing the policies remains and staff are not always documenting the rationale for their evaluations as required. If SSA does not clarify its policies regarding when to conduct a DAA evaluation, as well as ensure that staff document the rationale for these evaluations, staff may not be in compliance with the policies. Further, if SSA does not take action, staff conducting subsequent appeals and quality reviews may not have the information needed to effectively examine prior evaluations of substance use disorders. Thus, the agency may expend resources re-working cases and, in turn, delay benefits to individuals eligible for assistance. The DI program helps people with eligible impairments even if they are also struggling with substance use disorders, including opioids not taken as prescribed, if the impairments would continue to be disabling in the absence of drugs or alcohol. Many people with disabilities have chronic pain for which prescription opioids are used as a legitimate treatment option. Thus, it is not surprising that many people who apply for DI benefits have opioid prescriptions, or that we would observe a positive correlation between these rates. Though SSA data show that substance use disorders are seldom the key factor in denying benefits, the agency nonetheless has a responsibility to show accountability for the decisions made by staff. Evaluating substance use disorders can be complex. However, without clarification to help staff better understand the policies for evaluating such disorders and ensuring staff document the rationale for their decisions, SSA likely cannot know whether claims are thoroughly assessed and efficiently examined as they move through subsequent reviews. Such inefficiencies can result in delayed benefits to those eligible for assistance. Further, while our review focused on prescription opioids, any improvements SSA makes to this process could help the agency stay ahead of shifting trends in the broader opioid epidemic. We are making the following two recommendations to SSA: The Commissioner of the Social Security Administration should clarify policies and procedures to remind staff that a diagnosis of a substance use disorder is not necessary to conduct a Drug Addiction and Alcoholism evaluation. (Recommendation 1) The Commissioner of the Social Security Administration should ensure that staff document their rationale for decisions involving the Drug Addiction and Alcoholism evaluation process. (Recommendation 2) We provided a draft of this report to SSA and HHS for review and comment. SSA provided technical comments, which we incorporated as appropriate, and formal comments. As part of its technical comments, SSA suggested that we revise the language of Recommendation 1 to focus more directly on the cause of staff’s confusion about when to conduct a DAA evaluation (i.e., staff’s misconception that a diagnosis of a substance use disorder is required). We agreed with this suggestion, and revised the recommendation accordingly. A letter conveying SSA’s formal comments is reproduced in appendix IV. SSA agreed with our recommendations. Regarding both recommendations, SSA stated that it will continue to train staff on the agency’s policies and procedures related to substance use disorders and the DAA evaluation process, as well as the importance of fully documenting these evaluations. HHS did not provide any comments. We are sending copies to the appropriate congressional committees, the Commissioner of the Social Security Administration, the Secretary of Health and Human Services, and other interested parties. The report will also be available at no charge on the GAO website at www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. We examined (1) what is known about the relationship between trends in prescription opioids and Disability Insurance (DI) claims, and (2) how the Social Security Administration (SSA) considers potential prescription opioid misuse in its DI eligibility decisions. This appendix provides a detailed account of the information and methods we used to answer these objectives. Section 1 provides an overview of our methods and key data sources. Sections 2 through 4 provide additional details on the three main methods we used to answer our objectives. To answer our first objective on the relationship between trends in prescription opioids and DI claims, we reviewed relevant literature and analyzed data from the Department of Health and Human Services’ (HHS) Centers for Disease Control and Prevention (CDC) and SSA. Specifically, we reviewed existing studies and interviewed several researchers currently examining the relationship between prescription opioids and DI claims. We also reviewed available data from SSA on prescription opioid use among DI claimants. In addition, we analyzed county-level data on the rates of opioid prescriptions from CDC and number of DI claims from SSA from 2006 through 2017, the most recent year of data available at the time of our review. We used aggregate data to illustrate nationwide trends over time. We also examined variation among counties, including differences among those with the highest rates of opioid prescriptions and DI claims. Lastly, we used these data to conduct multiple regression analyses to examine the relationship between opioid prescriptions and DI claims, taking into account economic, demographic, and other factors. We discuss these analyses in greater detail in Section 2. To answer our second objective on how SSA considers potential prescription opioid misuse in its DI eligibility decisions, we reviewed relevant information, interviewed program staff, and reviewed DI case files. We reviewed relevant federal laws, regulations, and SSA policies, as well as federal standards for internal control. We also interviewed SSA headquarters officials and staff involved in DI eligibility decisions in six offices in Alabama, Kentucky, and West Virginia. We discuss the criteria we used to select these states in Section 3. Lastly, we selected and reviewed 30 case files for DI beneficiaries who had been identified by the Centers for Medicare & Medicaid Services (CMS) as being at risk for prescription opioid misuse or abuse in 2017. We discuss the data and criteria we used to select these case files in Section 4. To answer our objectives, we used a variety of electronic data from data sources administered by CDC, SSA, and other federal agencies. Tables 1 and 2 summarize the key data sources and how they were used for each objective. For each data source, we conducted a reliability assessment by completing two or more of these steps: conduct electronic tests for completeness and accuracy, review relevant documentation, and interview knowledgeable officials about how the data are collected and maintained. We found that the data we used were sufficiently reliable for the purposes of our analyses. However, our analytical approach was limited by the availability of data, as discussed below and in appendix II. To answer our first objective on what is known about the relationship between trends in prescription opioids and DI claims, we conducted three sets of analyses using county-level data on the rates of opioid prescriptions and number of DI claims from 2006 through 2017. The data on opioid prescriptions are from CDC and represent the number of opioid prescriptions filled by retail (i.e., non-hospital) pharmacies per 100 people per year in each county. Though other datasets on prescription opioids exist, we chose to use CDC data because they show the actual number of prescriptions filled in each county, were publicly available at the time of our study, and included data through 2017. SSA provided data on the number of DI claims, which we used to calculate rates. We chose to include claims from individuals who are generally subject to a disability determination, such as disabled workers, widow(er)s, and adult children. We excluded individuals who are generally not subject to these determinations, such as dependent spouses and children under age 18. We examined DI only claims separately from DI/Supplemental Security Income (SSI) concurrent claims, and also examined similar data for DI allowances. We calculated rates of DI claims per 1,000 people per year in each county using population data from the U.S. Census Bureau. We used county-level data because claimant-level data, such as prescription opioid use by DI claimants, were not readily available. Our three sets of analyses examined: Nationwide trends. We used aggregate data from CDC on opioid prescriptions and data on DI claims from SSA to examine trends nationwide from 2006 through 2017. County variation. We used the data to examine variation among counties in their rates of opioid prescriptions and DI claims. Specifically, we examined the distribution of these rates among all counties. We had data available on both rates of opioid prescriptions and DI claims for 2,953 out of 3,142 counties nationwide. We then examined counties with the highest rates of opioid prescriptions and DI claims. We defined counties with the highest rates as those in the top third of the statistical distributions for each rate (i.e., at least 984 counties for each rate in 2017). Of these counties, 527 were in the top third of the statistical distribution for both rates. We plotted these counties with the highest rates on a U.S. map to observe any geographic differences across the Midwest, Southeast, Northeast, and West. In addition, we identified two counties to feature as illustrative examples. To select these counties, we first calculated the number of years from 2010 through 2017 a given county ranked in the top 10 for rates of opioid prescriptions and DI claims in each geographic region. We then selected two of these high-rate counties to serve as examples from different geographic regions and with different major industries. Regressions on the relationship between opioid prescriptions and DI claims. We used the county-level data to conduct regression analyses to examine the relationship between rates of opioid prescriptions and DI claims. In our regression models, we analyzed rates of opioid prescriptions and DI claims. In addition, we used data from a variety of sources to control for other county-level factors. Specifically, economic factors we accounted for included unemployment and poverty rates; demographic factors included sex, age, and race; and other factors included state, year, population size/degree of urbanization, and access to health insurance (i.e., uninsured rates). See table 1 above for additional information on the sources of these data, as well as appendix II for a detailed discussion of our regression analyses, including our models and limitations. To answer our second objective on how SSA considers potential prescription opioid misuse in its DI eligibility decisions, we conducted site visits to Alabama, Kentucky, and West Virginia. We selected these three states primarily because of their high rates of opioid prescriptions in 2016 and drug overdose deaths in 2017, and because a high percentage of their adult population received DI benefits in 2015. In each state, we visited one Disability Determination Services (DDS) office and one Hearing Office. These six offices included the Birmingham DDS and Birmingham Hearing Office in Alabama, the Frankfort DDS and Louisville Hearing Office in Kentucky, and the Charleston DDS and Charleston Hearing Office in West Virginia. We selected offices that were relatively larger, were nearest to or in counties with the highest rates of opioid prescriptions in the state in 2016, and where the DDS and Hearing Office were in close proximity, among other reasons. At each office, we interviewed a range of staff involved in making DI eligibility decisions. Specifically, for each DDS, we conducted group interviews with managers, disability examiners, and medical consultants. We initially conducted an exploratory site visit to the Frankfort DDS in Kentucky, where we met with all available managers, disability examiners, and medical consultants. In the remaining visits, we met with all available managers, but randomly selected five disability examiners and five medical consultants for the group interviews. Each group included between 5 and 15 participants. For each Hearing Office, we conducted individual interviews with three randomly selected administrative law judges, as well as the chief administrative law judge. For the purposes of our report, we include state government DDS staff in our general references to “program staff.” We used semi-structured interview protocols for all interviews that included open-ended questions about SSA’s processes for making decisions on claims involving potential prescription opioid misuse and any challenges doing so, among other topics. Because those we interviewed provided answers in response to open-ended questions, not all respondents commented on every process or challenge. In addition, because we visited a non-probability sample of DDS and Hearing Offices in three selected states, the results of our review cannot be generalized to all offices and states. To gain a deeper understanding of how SSA considers potential prescription opioid misuse in its DI eligibility decisions, we selected and reviewed 30 case files from SSA involving DI beneficiaries who had been identified by CMS as being at risk of opioid misuse or abuse. To select case files, we used a dataset from CMS on Medicare Part D beneficiaries that we matched with SSA data on DI beneficiaries. The CMS dataset contained information on Medicare Part D beneficiaries who CMS identified as being at risk of prescription opioid misuse or abuse in 2017. CMS identifies beneficiaries as being at risk of prescription opioid misuse or abuse if they received high amounts of opioids (had an average daily morphine dose equivalent of 90 mg or more) and appeared to have coordination of care issues (either had three or more opioid prescribers and three or more opioid dispensing pharmacies, or five or more prescribers regardless of the number of pharmacies) during a 6-month period. We identified DI beneficiaries within this larger dataset of Medicare Part D beneficiaries using an identifier in CMS’s data. This identifier signified that DI eligibility was a beneficiary’s reason for Medicare enrollment, since those eligible for DI may gain access to Medicare after a 2-year waiting period. We then worked with SSA to match these data on DI beneficiaries within CMS’s dataset with SSA data. Specifically, we obtained information for analysis from SSA’s database on various demographic characteristics of this population of DI beneficiaries, including their sex, age, race, and impairments. We also obtained administrative data on beneficiaries’ claims. Using the CMS dataset on Medicare Part D beneficiaries that we matched with SSA’s data on DI beneficiaries, we identified 30,273 DI beneficiaries who had been identified by CMS as being at risk of prescription opioid misuse or abuse in 2017. See appendix III for additional demographic and other information on this population. From the DI beneficiaries we identified, we selected 30 case files to review based on a number of claims characteristics related to potential prescription opioid misuse and SSA’s processing of the claim. First, we only selected case files for individuals who had been allowed benefits during or after 2013, when SSA formalized its policies for evaluating substance use disorders, including prescription opioids. In addition, we randomly selected 15 case files where the beneficiary had been evaluated by SSA for an identified substance use disorder and 15 where they had not. As part of the selection of 30 case files, we also randomly selected 16 case files where the beneficiary had self-reported the use of a prescription opioid and 14 where they had not, and 14 case files where the beneficiary had their case reviewed for potential medical improvement (called a continuing disability review) and 16 where they had not (these characteristics were not mutually exclusive). To systematically collect information on how or whether SSA considered potential prescription opioid misuse in each case file, we developed a data collection instrument to conduct our review of them. We designed the instrument to examine SSA’s implementation of its process for making DI eligibility decisions for claims involving substance use disorders, including opioids not taken as prescribed. For example, the instrument included questions about how SSA identifies and evaluates such disorders when making decisions, any documentation of this process, and how SSA reviews case files for potential medical improvement after allowing benefits. The instrument was not intended to examine the accuracy of decisions. In addition, we shared the instrument with SSA officials in advance, who provided notes on where the needed information could be found in the case files. Two GAO analysts independently reviewed each case file using the instrument, then met to review coding decisions and reconcile any differences between their reviews. We also discussed the results of our review with SSA headquarters officials. These officials provided comments on our observations for each case file, which we took into consideration. Though we examined information on all of the case file characteristics described above, we ultimately focused on SSA’s implementation of its process for evaluating the beneficiary for an identified substance use disorder. We did not focus on SSA’s implementation of its process for examining whether the beneficiary had self-reported the use of a prescription opioid. This is because the use of opioids as prescribed is not considered a substance use disorder under SSA’s policies. In addition, we learned during our case file review that beneficiaries had multiple opportunities to self-report such use that would not be captured in SSA’s administrative data, and that program staff also had multiple opportunities to examine such use when collecting and reviewing medical evidence. In addition, we did not focus on SSA’s implementation of its process for reviewing the beneficiary for potential medical improvement because we learned during our case file review that substance use disorders seldom factor into SSA decisions about whether to continue or cease DI benefits. According to SSA, benefits typically continue unless evidence exists that a beneficiaries’ impairment has medically improved and that they are able to return to work. SSA headquarters officials told us that staff would not evaluate a substance use disorder during the continuing disability review unless the beneficiary has medically improved and a new impairment that may be affected by a substance use disorder is to be assessed. Several limitations exist with our review of case files. Because we selected from a population of DI beneficiaries, the sample did not include case files for claimants who were ultimately denied. However, we did not see this as a significant limitation because SSA’s policies regarding the DAA evaluation are the same regardless of whether a claim is ultimately allowed or denied. In addition, 16 of the 30 case files we reviewed had been denied at the initial level before being allowed on appeal at later adjudicative levels. In addition, the case files may not have contained any evidence of prescription opioid misuse or abuse because of the timeframes we used to select them. Specifically, we selected case files for DI beneficiaries who had been allowed during or after 2013, but who were identified as being at risk of prescription opioid misuse or abuse in 2017. Because these beneficiaries may have been allowed benefits as early as 2013, they may not have had any issues with prescription opioids at the time SSA evaluated their claim (i.e., they may have developed potential issues after being allowed benefits). Lastly, because we reviewed a non-probability sample of 30 case files, the results of our review cannot be generalized to the larger population of DI beneficiaries. We conducted this performance audit from June 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We used regression models and other data analyses to address our first objective on the relationship between opioid prescriptions and Disability Insurance (DI) claims. This technical appendix outlines the data, methodology, limitations, and results for the regression analyses in our report. We used county-level data from data sources administered by the Department of Health and Human Services’ Centers for Disease Control and Prevention (CDC) and other federal agencies from 2010 through 2017. These data included the rates of opioid prescriptions from CDC. We also used ZIP code-level data from the Social Security Administration (SSA) on the number of DI claims, which we transformed into county-level data using ZIP code-to-county crosswalk data from the Department of Housing and Urban Development. Similarly, we examined the numbers of DI allowances and DI/Supplemental Security Income (SSI) concurrent claims and allowances from SSA as well. In addition, we used data on a number of economic, demographic, and other factors. Economic factors included unemployment and poverty rates; demographic factors included sex, age, and race; and other factors included state, year, population size/degree of urbanization, and access to health insurance (i.e., uninsured rates). We used data from 2010 through 2017 because those were the years in which we had data for all of our factors, with the exception of degree of urbanization. We had data on degree of urbanization for 2013, and assumed that this factor was consistent from 2010 through 2017. For a list of the county-level data that we used in our analyses and their sources, see table 1 in appendix I. Table 3 provides summary statistics for factors included in our regression models. These include the mean, median, standard deviation, and range for the factors among counties from 2010 through 2017. We used linear regression models to analyze the relationship between rates of opioid prescriptions and DI claims, and controlled for the economic, demographic, and other factors described above at the county level. Our unit of analysis was the county-year, meaning that the observations are for each county each year. We had 22,789 observations, since there are over 2,977 counties and we used data from 2010 through 2017. Some of the factors we controlled for, such as unemployment rates, sex, age, race, and access to health insurance (i.e., uninsured rates), were similar to what other researchers used in examining the relationship between prescription opioids and employment variables. We included state and year fixed effects in our models to help account for additional factors that could vary across states or over time and national time trends. For example, differences in prescribing practices and increased law enforcement strategies across states could affect rates of opioid prescriptions. Further, factors that have previously been identified as possibly affecting the DI population include changes in the characteristics of the working-age population, federal policies (e.g., DI eligibility criteria), and employment opportunities. The results should be interpreted as changes in the dependent variable (i.e., rate of opioid prescriptions or rate of DI claims) associated with a change in the independent variables, within states. Compared to the previous model, the main dependent and independent variables are switched, but all other elements of the model are as described above. Though our primary focus was the relationship between rates of opioid prescriptions and DI claims, we also examined the relationship between rates of opioid prescriptions and DI allowances, as well as concurrent DI/SSI claims and allowances. We found that the data we reported on were sufficiently reliable for the purposes of our analyses. However, our analytical approach was limited by the availability of data. Consequently, our results should be interpreted with caution. Specifically, we were unable to establish whether there is a causal relationship between rates of opioid prescriptions and DI claims (e.g., whether higher rates of opioid prescriptions could have contributed to higher rates of DI claims or vice versa), in part because of potential reverse causality between these variables. While we could have potentially used an instrumental variable approach to establish a causal relationship, we did not identify an appropriate instrument to conduct that analysis. Moreover, individual-level data on opioid use among DI claimants were not readily available. Though we used county-level data, we were unable to account for variations within counties, also due to data not being readily available. Other researchers have noted similar limitations in their studies on prescription opioids. In addition, the opioid prescriptions data we analyzed only count the number of prescriptions filled, which could vary by number of pills, dosage, and potency (i.e., the morphine dose equivalent). The data also do not account for any potential diversion, or illicit transfer, of prescription opioids from one county to another. Further, we did not include county-fixed effects in our models. Though there may be constant or long-term characteristics of counties that are related to rates of opioid prescriptions and DI claims, we did not find enough variation in these rates within counties in the timeframe we analyzed to include county fixed effects in our models. In sensitivity analyses, we did include county fixed effects in our models and found that there was not a statistically significant relationship between rates of opioid prescriptions and DI claims with these effects included. However, this may be due to the large number of fixed effects introduced in the model (our analyses included about 3,000 counties) and the relatively short timeframe of 2010 through 2017. Lastly, we analyzed DI claims separately from DI/SSI concurrent claims in our models due to limitations with the units of analyses for these claims. Specifically, the number of DI claims represents the total number of claims an individual may have, rather than the number of individuals. For example, one individual may have five different DI claims and all five would be counted in the number of DI claims. On the other hand, the number of DI/SSI concurrent claims represents the number of individuals who had filed at least one DI and one SSI claim within a given year. The individual may have filed two DI claims and three SSI claims that year, but are counted as one DI/SSI concurrent claim. Though we were unable to determine whether there is a causal relationship between rates of opioid prescriptions and DI claims (e.g., whether higher rates of opioid prescriptions could have contributed to higher rates of DI claims or vice versa), as discussed above, we did find a significantly positive correlation between these rates across our models, on average, from 2010 through 2017. These results were consistent before and after accounting for the economic, demographic, and other factors described above. We also found correlations between rates of opioid prescriptions and some of the other factors. These correlations are detailed in figure 6 of our report. Table 4 also provides additional results from our regression analyses for rates of opioid prescriptions. In addition, we found correlations between rates of DI claims and other factors. Similarly, these correlations are detailed in figure 6 of our report. Table 5 provides additional results. We also examined the relationship between rates of opioid prescriptions and DI allowances, as well as DI/SSI concurrent claims and allowances, and found similar results. In various sensitivity analyses to check our results, we found that the positive correlation between rates of opioid prescriptions and DI claims remained consistent. For example, these results were consistent in models that: Included labor force participation rates instead of unemployment or poverty rates. Examined each year of data. Given that we did not find much variation in rates of opioid prescriptions and DI claims within counties from 2010 through 2017, we also ran our models for each year separately to explain variations across counties. Accounted for counties with small populations. There were eight counties that were omitted from our regression models because they had no DI claims. To ensure we accounted for all counties in our sensitivity analyses, we took an approach similar to other researchers and aggregated counties with less than 100,000 people in each state for each year. We ran our models when treating these counties with small populations as one county and found similar qualitative results. Using data from the Centers for Medicare & Medicaid Services (CMS) and the Social Security Administration (SSA), we identified 30,273 Disability Insurance (DI) beneficiaries who had been identified by CMS as being at risk of prescription opioid misuse or abuse in 2017. Figures 8 and 9 describe the demographics of this population, including beneficiaries’ sex, age, and race, as well as the primary impairments for which they were allowed DI benefits. In addition to the contact named above, the following staff members made key contributions to this report: Erin Godtland (Assistant Director), Nhi Nguyen (Analyst-in-Charge), Justin Gordinas, Kathleen McQueeney, and Paul Wright. Also contributing to this report were James Bennett, Joy Booth, Mari Calderón, Breanne Cave, Jessica Farb, Justin Fisher, Alex Galuten, Melissa Jaynes, Lorin Obler, Jessica Orr, Oliver Richard, William Simerl, Almeta Spencer, Shana Wallace, and Eric Wedum.", "summary": "The United States is in the midst of an unprecedented opioid epidemic. Opioids are prescribed to treat conditions such as chronic pain. However, opioid misuse can lead to addiction, disability, overdose, and death. Prior GAO and other reports have discussed the use of prescription opioids within federal programs, particularly Medicare. Less is known about the use of opioids in relation to SSA's DI program. GAO was asked to review any correlation between prescription opioids and rates of DI claims, and any related challenges for SSA. This report examines (1) what is known about the relationship between trends in prescription opioids and DI claims, and (2) how SSA considers potential prescription opioid misuse in its DI eligibility decisions. GAO analyzed county-level data on opioid prescriptions and DI claims from 2006 through 2017; interviewed program staff involved in DI eligibility decisions in Alabama, Kentucky, and West Virginia, selected because of their high rates of opioid prescriptions and percentage of the adult population on DI; and reviewed case files for DI beneficiaries identified by the Centers for Medicare & Medicaid Services as being at risk for prescription opioid misuse or abuse. The numbers of opioid prescriptions and claims for the Social Security Administration's (SSA) Disability Insurance (DI) program have each declined nationally in recent years, but rates vary widely across the country. National trends show both peaking between 2010 and 2014 and then declining. GAO's analysis shows counties with the highest rates of both were concentrated in the Southeast (see figure). After accounting for economic, demographic, and other factors, GAO found that counties with higher rates of opioid prescriptions tended to have higher rates of DI claims from 2010 through 2017. These rates were also correlated with other factors. For example, counties with higher rates of each tended to have higher poverty rates. However, GAO was unable to determine whether there is a causal relationship between rates of opioid prescriptions and DI claims or other factors, given readily available data. Program staff are required to evaluate and document substance use disorders (including opioids not taken as prescribed) when making certain DI eligibility decisions. Specifically, staff are required to evaluate potential substance use disorders for certain DI claims and deny benefits, for example, if the claimant would not be considered disabled if they stopped using drugs or alcohol. In addition, staff are generally required to document the rationale for their decision so that another reviewer can understand how they made the decision. However, staff in five of the six offices GAO visited in three states were confused about when to evaluate substance use disorders, and nine of 15 case files that GAO reviewed in which an evaluation was conducted did not have a documented rationale. SSA officials acknowledged the need to clarify policies on when to evaluate substance use disorders, and that a poorly documented rationale could lead to reversals or remands of decisions. Without ensuring that SSA's policies are understood and that staff document their rationale, the agency may expend resources re-working cases and, in turn, delay benefits to individuals eligible for assistance. GAO recommends that SSA 1) clarify policies and procedures to help staff better evaluate substance use disorders, and 2) ensure staff document their rationale. SSA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "As described in figure 1, to support U.S. exports, EXIM offers four major types of financing products: direct loans, loan guarantees, export-credit insurance, and working capital guarantees. Regardless of type, EXIM’s financing products generally have one of three maturity periods: Short- term transactions are for less than 1 year; medium-term transactions are from 1 to 7 years long; and long-term transactions are more than 7 years. As we reported in July 2018, for all financing types, EXIM currently conducts a number of preauthorization and postauthorization antifraud activities. See the examples shown in figure 2. Fraud and “fraud risk” are distinct concepts. Fraud—obtaining something of value through willful misrepresentation—can be challenging to detect and adjudicate because of its deceptive nature. Fraud risk exists when individuals have an opportunity to engage in fraudulent activity, have an incentive or are under pressure (e.g., financial pressures) to commit fraud, or are able to rationalize committing fraud. When fraud risks can be identified and mitigated, fraud may be less likely to occur. Although the occurrence of fraud indicates there is a fraud risk, a fraud risk can exist even if actual fraud has not yet been identified or adjudicated. According to the Standards for Internal Control in the Federal Government, executive-branch agency managers are responsible for managing fraud risks and implementing practices for combating those risks. Specifically, federal internal control standards call for agency management officials to assess the internal and external risks (including fraud risks) their entities face as they seek to achieve their objectives. The standards state that as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks. Risk management is a formal and disciplined practice for addressing risk and reducing it to an acceptable level. The leading practices in the Fraud Risk Framework call for agencies to identify inherent fraud risks affecting the program, examine the suitability of existing fraud controls, and then prioritize mitigating “residual” fraud risks—that is, risks remaining after antifraud controls are adopted. Specifically, according to the assess component of the Fraud Risk Framework, managers who effectively assess fraud risks attempt to fully consider the specific fraud risks the agency or program faces, analyze the potential likelihood and impact of fraud schemes, and then ultimately document prioritized fraud risks. Moreover, managers can use the fraud risk assessment process to determine the extent to which controls may no longer be relevant or cost-effective. Leading practices that are consistent with this component include conducting quantitative or qualitative fraud risk assessments at regular intervals, or both, of the likelihood and impact of inherent risks on the program’s objectives, and determining the agency’s risk tolerance for the inherent fraud risks; identifying specific sources for gathering information about fraud risks, including information on fraud schemes that are reflected in adjudicated cases of fraud; examining the suitability of existing fraud controls for preventing fraud and mitigating fraud risks identified; and documenting in the program’s fraud risk profile the analysis of the types of inherent fraud risks assessed, their perceived likelihood and impact, managers’ risk tolerance, and the prioritization of the inherent fraud risks and any residual fraud risks. As we reported in July 2018, the Fraud Reduction and Data Analytics Act of 2015 requires the Office of Management and Budget (OMB) to establish guidelines that incorporate the leading practices of GAO’s Fraud Risk Framework. The act also requires federal agencies to submit to Congress a progress report each year, for 3 consecutive years, on implementation of the risk management and internal controls established under the OMB guidelines. OMB published guidance under OMB Circular A-123 in 2016 affirming that federal managers should adhere to the leading practices identified in the Fraud Risk Framework. As we reported in December 2018, EXIM identifies itself as subject to the act, and, as such, follows it. The Fraud Risk Framework is also aligned with federal internal control standards, specifically Principle 8 (“Assess Fraud Risk”) of the Green Book. Federal internal control standards also state that excessive pressures, such as financial pressures (e.g., delinquent federal debt), can pose a fraud risk factor to agency programs as these pressures can provide an incentive or motive to commit fraud. Although the existence of financial pressure alone does not necessarily indicate that fraud exists or will occur, financial pressure is often present when fraud does occur. Applicants for EXIM programs who have delinquent federal debt may not be able to obtain certain types of financing until they resolve their debts. Specifically, under 31 U.S.C. § 3720B, applicants who are delinquent on federal nontax debts may not receive federal financial assistance, including such assistance provided by EXIM, until they satisfactorily resolve the delinquency (e.g., pay in full or negotiate a new repayment plan). However, 31 U.S.C. § 3720B also provides that an agency head may waive this restriction. Additionally, OMB’s Circular No. A-129, Policies for Federal Credit Programs and Non-Tax Receivables, prescribes to agencies the policies, procedures, and standards for screening program participants to determine whether they are delinquent on any federal debt when applying to federal credit programs. We identified fraud risks—generally involving four overall fraud risk factors—by examining EXIM-associated court cases of fraud adjudicated from calendar year 2012 through calendar year 2017. We then communicated these fraud risks to EXIM, and EXIM officials reported examples of existing controls it uses to help detect and mitigate these fraud risks. EXIM also provided documentation reflecting its efforts to conduct a fraud risk assessment that considered various fraud risks affecting its major financing product lines, including fraud risks we identified during this review. We identified fraud risks—generally involving four overall fraud risk factors—by examining 44 EXIM-associated closed court cases of fraud adjudicated from calendar year 2012 through calendar year 2017. Specifically, the various fraud risks we identified overall involved one or more of the fraud risk factors illustrated in figure 3 below: opportunities to falsify self-reported information on applications or financial pressures that potentially incentivized participants or employees to commit fraud; opportunities to circumvent or take advantage of EXIM or lender opportunities to circumvent the intent of EXIM’s programs by diverting loan proceeds and other EXIM financing for personal use or benefit instead of for the export of U.S. goods. See appendix I for a summary of these 44 cases we reviewed. These 44 cases illustrate the financial risks associated with fraud against EXIM. Federal and state courts combined have ordered restitution of $82.4 million in the 44 adjudicated cases, but much of that restitution has not yet been paid. For example, as of October 2018, the total remaining unpaid restitution amount is $71.6 million, or over 80 percent. In one fraud case we reviewed, which was adjudicated in 2013, a federal court ordered a convicted U.S. exporter to pay EXIM $8.6 million in restitution for the fraud that he committed in a loan guarantee program. Since 2013, the participant has paid back $25.00 of this amount. EXIM reported having existing antifraud controls to mitigate the fraud risks we identified. Specifically, we communicated to EXIM the fraud risks we identified from our review of the 44 adjudicated cases. In response, EXIM officials described general antifraud controls the agency currently uses to help detect and mitigate each of the fraud risks we identified. The officials stated that EXIM has experience with all the fraud risks we identified and stated that they were generally confident that EXIM’s antifraud controls were appropriate for mitigating the risks. EXIM officials consider many of the fraud risks that we identified as risks that could impact any of the agency’s financing programs (i.e., credit insurance, loan guarantees, direct loans, or working capital guarantee programs). EXIM officials provided examples of the general antifraud controls that they said EXIM uses to mitigate the fraud risks we identified across all agency financing products. According to EXIM officials and as illustrated in figure 4 below, these controls include: fraud prevention and detection procedures; due diligence standards; and a list of “red flags” that EXIM staff should be aware of and is used to identify indicators of potential fraud and corruption that may appear on EXIM transaction documents. Officials said that their confidence in the controls stems from seeing a reduction in fraud cases since the early 2000s after these antifraud controls were put in place. EXIM officials clarified that this confidence does not stem from completing a comprehensive fraud risk assessment of fraud risks impacting all of its financing products consistent with the leading practices in the Fraud Risk Framework. EXIM also provided documentation reflecting its efforts to conduct a fraud risk assessment that considered various fraud risks affecting its major financing product lines, including fraud risks we identified during this review. EXIM officials said that the fraud risks we identified were generally already known to EXIM as they relate to or are very similar to those fraud risk factors contained in EXIM’s list of red flags. EXIM officials acknowledged that assessing its fraud risks and evaluating the agency’s existing antifraud controls may indicate opportunities for EXIM to further adapt EXIM’s antifraud controls to mitigate any residual fraud risks within its tolerance level. Such assessments can further help EXIM mitigate fraud and the resulting effects across all product lines before they occur, which includes the length of time it can take for EXIM to fully recover from restitution losses after fraud has been perpetrated, as illustrated in the 44 cases presented in appendix I. EXIM has procedures for detecting delinquent federal debt owed by EXIM applicants and participants. However, EXIM is missing additional opportunities to use readily available SAM data to identify ineligible applicants or participants that may have delinquent federal debt, and to use such data to determine eligibility or assess repayment fraud risk. EXIM has procedures to detect delinquent federal debt owed by applicants and participants that include reviewing their credit reports and requiring applicants to certify that they and other participants do not have such delinquent debt. Under 31 U.S.C. § 3720B, applicants who are delinquent on federal nontax debts may not receive federal financial assistance, including direct loans, loan guarantees, or loan insurance until they satisfactorily resolve the delinquency (e.g., pay in full or negotiate a new repayment plan). 31 U.S.C. § 3720B does not address delinquent federal tax debt; however, such delinquent federal debt may also pose a fraud risk or repayment fraud risk to EXIM’s financing programs. Additionally, OMB Circular No. A-129 prescribes to agencies the policies, procedures, and standards for screening program participants to determine whether they are delinquent on any federal debt when applying to federal credit programs, including recommending that agencies ask applicants to self-certify on their applications that they have no delinquencies; requiring agencies to obtain and review applicants’ credit reports; and encouraging agencies to use appropriate databases, such as the Department of the Treasury’s Do Not Pay portal sources to identify delinquent federal debtors during the application screening process. According to EXIM officials, the agency employs procedures to ensure its policies and processes meet these requirements for applicable financing products. Specifically, and as illustrated in figure 5 below, these procedures include reviewing the following: Self-certifications: EXIM applications for relevant financing programs include a self-certification by the applicant that the applicant does not have delinquent federal debt. However, as we have reported in the past, relying on applicants to self-report adverse actions on their applications, instead of verifying such information, could cause an agency to miss opportunities to develop a more-complete picture of the applicants. Credit reports: EXIM obtains credit reports for applicants and participants in some financing products. In particular, EXIM’s internal Loan Guarantee and Credit Insurance Manual of 2015 communicates the 31 U.S.C. § 3720B restriction to loan officers and instructs them to review the borrower’s credit report to check whether the borrower is delinquent on any federal debt. If the loan officer finds that the credit report reflects such delinquent federal debt, the manual further instructs the loan officer to advise and request guidance from EXIM’s Trade Finance Director and the Office of General Counsel. However, as we have reported in the past, some delinquent federal tax debt may not appear on the credit reports unless the Internal Revenue Service has filed a lien on the delinquent federal tax debt. World Check: EXIM, through the assistance of a third-party vendor, also makes use of some data sources listed in the Do Not Pay sources as part of its prescreening application process and possibly during postauthorization risk-based reviews. Specifically, EXIM officials told us that EXIM uses Thomson Reuters’s World Check database to identify federal debts owed by applicants as part of its Character, Reputational, and Transaction Integrity (CRTI) review process that is managed by EXIM’s Credit Review and Compliance Division. The World Check database currently checks over 20 different watch lists and other databases, including lists of entities excluded from doing business with the federal government maintained in GSA’s SAM. According to EXIM, other sources in the World Check database that reveal such federal debts could also lead indirectly to the discovery of delinquent federal debt. However, as discussed below, this check of SAM does not involve a check of delinquent federal debt. This CRTI review process is conducted during the underwriting (i.e., the preauthorization review) phase and may occur throughout the life cycle of transactions, such as during EXIM’s postauthorization risk-based reviews. EXIM officials told us that, as part of this process, loan officers or other EXIM officials send the names of applicants to EXIM librarians, who perform a manual search of the World Check database, review results, and return relevant results to EXIM officials for their consideration. EXIM officials noted that this process can be challenging, particularly when librarians perform searches on applicants with common names, which produce many results that are not useful. EXIM officials told us that EXIM does not track information on instances in which an applicant’s delinquent federal debt prevents a transaction from moving forward or prevents a specific applicant’s participation in a transaction. Consequently, EXIM officials told us that EXIM has no records of this happening. However as described in greater detail below, EXIM does not make use of readily available SAM data to identify delinquent federal debts owed by applicants and participants, which could limit its ability to detect instances in which applicants and participants owe these debts. EXIM is missing additional opportunities to use readily available SAM registration data to identify potentially ineligible applicants and participants that may have delinquent federal debt or may otherwise pose a repayment fraud risk. Specifically, while EXIM employs procedures that may reveal applicants’ delinquent federal debts, as described above, EXIM’s procedures for identifying applicants and participants with delinquent federal debt do not include a search of a specific data element in the SAM database that can be used to detect delinquent federal debtors. The data element we refer to here is the Debt Subject to Offset flag, which may reflect both nontax and tax delinquent federal debts owed. As mentioned previously, SAM is a government-wide information system that federal agencies can use to obtain information on businesses that do business with the federal government, including an entity’s Debt Subject to Offset status. The Debt Subject to Offset data element in SAM indicates that the entity potentially has a delinquent federal debt subject to collection under the Treasury Offset Program. The GSA officials who maintain the SAM database told us that all federal agencies have the legal authority to use the SAM registration database free of charge. Specifically, all federal agencies can use this database to manually search by an entity’s name, Data Universal Numbering System number, or Tax Identification Number for the purpose of detecting whether the entity potentially has delinquent federal debt, such as by identifying whether an entity’s SAM record contains the Debt Subject to Offset flag. Further, GSA officials also told us that all federal agencies are able to request batches of SAM registration data free of charge, for the purpose of matching these data to agency data by entities’ names, Data Universal Numbering System numbers, or Tax Identification Numbers for the purpose of identifying entities that may have the Debt Subject to Offset flag in SAM, among other available data. Performing data analytics, such as batch matching, on available data is a leading practice cited in the Fraud Risk Framework that we have reported can help improve agency efforts to combat fraud. In particular, we have found in prior work that using available data to verify that EXIM’s transaction applicants are not delinquent on federal debt can help EXIM assure applicant eligibility is consistent with federal guidance, provide reasonable assurance of repayment, and help prevent fraud. We have also found that using available data to independently verify self-reported delinquent federal debt information, such as self-reported information on delinquent federal tax debt owed, is a key detection and monitoring component of fraud prevention. We identified additional opportunities for EXIM to manually use SAM’s online database or data-matching approaches to identify applicants or participants with potential delinquent federal debt. Specifically, we registered in SAM to conduct several manual searches (by entities’ Data Universal Numbering System numbers, Tax Identification Numbers, and names) and confirmed that it can be used to conduct such searches without incurring any external costs charged by GSA. For example, we conducted two Data Universal Numbering System number searches and found two active EXIM participants appearing in SAM’s registration database with a Debt Subject to Offset flag. We also obtained historical SAM data from GSA and EXIM transaction data and confirmed that these data sources could be used to identify EXIM applicants and participants with potentially delinquent federal debt in a batch match (rather than manual, case-by-case searches). As illustrated in our batch-matching results below, we found this data-matching process can provide an opportunity to match these data sets using the Tax Identification Numbers and Data Universal Numbering System numbers for the entities in both data sets. Our batch-matching analyses indicated that, from calendar year 2014 through calendar year 2016, EXIM authorized transactions that had an aggregate authorization value of approximately $34.3 billion. Of that amount, we found the following: An aggregate authorization value of about $1.7 billion was associated with 32 U.S.-based companies that had a delinquent federal debt indicator in SAM in the same month that these transactions were authorized. The transactions mostly involved U.S.-based applicants and exporters. As mentioned above, associated parties we reviewed included not only the applicant, but also participants involved, including the borrower, buyer, and exporter, which may or may not be the applicant. While the results of this analysis do not mean that EXIM should have suspended these transactions in accordance with 31 U.S.C. § 3720B, these results nonetheless indicate that the data in SAM that indicate delinquent federal debt could provide an opportunity for EXIM to identify important indicators of applicants or other transaction participants with potential delinquent federal debt when determining their program eligibility and assessing any related fraud risks or repayment risks they present during EXIM’s preauthorization CRTI reviews. Because the Debt Subject to Offset flag may indicate either nontax debts or tax debts, it is possible that some of these entities owed delinquent federal nontax debts that are applicable under 31 U.S.C. § 3720B, indicating EXIM should have considered suspending these transactions. However, it is also possible that some of these entities owed delinquent federal tax debts that are not applicable under 31 U.S.C. § 3720B, but that may pose a fraud risk or repayment risk nonetheless. By using the Debt Subject to Offset flag as an indicator of these delinquent federal debts and gathering additional information on the specific facts and circumstances of each case, EXIM would be better positioned to assess the relevant compliance, fraud, and repayment risks an applicant’s or participant’s delinquent federal debt may pose. An aggregate authorization value of about $4.1 billion was associated with 97 U.S.-based companies that had a delinquent federal debt indicator in SAM during the transaction maturity period (i.e., after the month they were approved, but before the transactions’ maturity date). These transactions mostly involved U.S.-based applicants and exporters. As mentioned above, associated parties we reviewed included not only the applicant, but also participants involved, including the borrower, buyer, and exporter, which may or may not be the applicant. 31 U.S.C. § 3720B may prevent applicants with federal financial debts from obtaining loans, guarantees, and insurance; thus, it does not apply to any delinquent federal debt accrued after loan approval. However, we looked at potential delinquent debt accrued after approval because delinquent debt accrued after approval and during the transaction maturity period might affect EXIM’s view of a financing product’s repayment risk. Further, EXIM already conducts similar postauthorization monitoring to identify such risks through its use of World Check as part of its CRTI process described above. Thus, these results nonetheless illustrate that EXIM can use SAM data during EXIM’s postauthorization CRTI reviews to identify transaction participants with potential delinquent federal debt and determine the extent to which they may pose a repayment fraud risk. Prior to sharing our results with EXIM, EXIM officials told us that they have access to SAM entity registration records, but they believe searching the SAM registration database is a time-consuming process that should be reserved for rare circumstances. Further, EXIM officials also told us that using the SAM registration database to identify applicants or participants that have the Debt Subject to Offset flag in SAM would yield few results because the vast majority of their financing program participants are foreign-based entities, and thus would not also be contractors for the U.S. government and registered in SAM. However, we identified many U.S.-based entities that had a delinquent federal debt indicator either in the month a transaction was approved, or during the transaction’s maturity period, by searching in the SAM database and analyzing SAM data for EXIM applicant and participants, as described above. Further, it is not clear whether performing manual searches or batch matches with SAM data to identify delinquent federal debtors would be any more time-consuming than EXIM’s current procedures for doing so, which include manual searches of World Check and obtaining and reviewing credit reports, as described above. When we met with EXIM officials to communicate our batch-matching results above, they expressed concern that these results could imply that EXIM is doing business with applicants or participants with delinquent federal debt. They then indicated that they were interested in obtaining SAM registration data so that they could determine whether it would be feasible for them to perform the same type of analysis that we performed. In a subsequent meeting, EXIM officials informed us that they were also able to obtain current SAM registration data, analyze the SAM data against active EXIM participant data, and find dozens of active EXIM participants with the Debt Subject to Offset flag in SAM. The results of our analyses, as well as EXIM’s own experience with the SAM data, suggest EXIM also has an additional and practical opportunity to incorporate searches of SAM entity registration data as part of its postapproval monitoring of transactions to enhance its monitoring of and response to risks in ongoing transactions. Standards for Internal Control in the Federal Government state that management should use quality data to achieve agency objectives. For example, this could include agencies obtaining relevant operational, financial, or compliance-related data from reliable internal and external sources in a timely manner based on identified information requirements, and then using such data to make informed decisions and evaluate performance in achieving program objectives and addressing risks. Without also pursuing available debt data in SAM’s registration database, as an additional layer of due diligence, to identify applicants with delinquent federal debt during underwriting and compliance reviews, EXIM is potentially forgoing practical opportunities to use such data when determining applicants’ program eligibility and to adopt leading practices for managing repayment fraud risks across EXIM’s financing programs. In particular, such available SAM data can provide opportunities to verify independently the applicants’ self-certification of delinquent federal debts they owe and assess whether the applicants may have misrepresented their delinquent federal debt status on their applications, which is a fraud risk in the application process; detect potential delinquent federal debts that are not apparent in credit make informed eligibility decisions during preauthorization CRTI reviews and assess repayment fraud risk during postauthorization CRTI reviews. EXIM assumes the credit and country risks that the private sector is unable or unwilling to accept, including the risk of losses due to fraud. EXIM’s financing products face various fraud risks, and EXIM has begun to take steps to consider these fraud risks as part of a full fraud risk assessment, as we recommended in July 2018. However, because it remains unclear whether EXIM’s actions fully respond to the recommendations of our July 2018 report, we will continue to monitor EXIM’s progress in fully assessing its fraud risks. EXIM also employs procedures to detect delinquent federal debt owed by EXIM applicants and participants. However, EXIM is missing opportunities to use readily available SAM data to identify applicants or participants that may misrepresent their delinquent federal debt status and pose a repayment fraud risk to EXIM financing programs. Applicants or participants with delinquent federal debt could be one of many repayment fraud risks that could indicate an increased risk of nonrepayment and incentives to commit fraud against EXIM. EXIM officials believe searching SAM is a time-consuming process that would yield few results. However, manually searching SAM’s online registration database for the purpose of determining whether an applicant or participant may have a Debt Subject to Offset flag may not be any more time-consuming than what EXIM currently performs through its preauthorization or postauthorization CRTI reviews. Nevertheless, we demonstrate in this report the practicality and illustrate results of using such data through multiple approaches, such as batch matching, without incurring any external costs charged by GSA. By assessing the practicality of searching SAM data, EXIM may determine that this source of data provides an additional tool for combating fraud. Implementing these antifraud activities could further help EXIM verify program eligibility, identify repayment fraud risk, and provide EXIM with reasonable assurance that it is effectively and efficiently carrying out its mission of supporting U.S. jobs and the export of U.S. goods. We are making the following two recommendations to EXIM: EXIM’s chief operating officer should direct EXIM’s Credit Review and Compliance Division to assess and document the practicality of incorporating into its preauthorization CRTI reviews searches of data elements in SAM that indicate delinquent federal debts owed by applicants, and, if practical, implement relevant approaches—such as manual searches or batch matching. (Recommendation 1) EXIM’s chief operating officer should direct EXIM’s Credit Review and Compliance Division to assess and document the practicality of incorporating into its postauthorization CRTI reviews searches of data elements in SAM that indicate delinquent federal debts owed by applicants and participants, and, if practical, implement relevant approaches—such as manual searches or batch matching. (Recommendation 2) We provided a draft of this report to EXIM for review and comment. In its written comments, reproduced in appendix II, EXIM concurred with our recommendations and stated that it will move forward to implement them. EXIM also provided technical comments, which we incorporated as appropriate. In its written comments, EXIM noted a number of points it referred to as “key concerns.” These points do not disagree with our findings, conclusions, or recommendations. Specifically, EXIM stated that the 44 cases we reviewed involved transactions that were approved between 2002 and 2012 and that it will continue to work with the Department of Justice to collect restitution payments. Additionally, EXIM stated that it is in full compliance with 31 U.S.C. § 3720B and the related provisions of OMB Circular A-129 guidance regarding restrictions on doing business with delinquent federal debtors. However, assessing EXIM’s compliance with 31 U.S.C. § 3720B or OMB Circular A-129 was outside the scope of this report. Finally, for the purpose of implementing our recommendations, EXIM requested the data pertaining to the U.S.-based companies that we found to have a delinquent federal debt indicator in SAM. To identify those companies, we used (1) an extract of data that EXIM provided to us, and (2) GSA SAM data, which EXIM told us it can and has already obtained directly from GSA. We will provide EXIM with a copy of the EXIM data it requested. However, we believe EXIM will be better positioned to assess the practicality of checking the SAM delinquent federal debt flag by continuing to obtain the SAM data directly from GSA. We are sending copies of this report to the appropriate congressional committees, the president and board chairman of EXIM, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The table below summarizes the information we reviewed during our review of the 44 Export-Import Bank of the United States (EXIM)- associated cases of alleged fraud that we were able to identify and determine were adjudicated from calendar years 2012 through 2017. Such information includes financing product types, dates adjudicated, fraud schemes, fraud risk factors involved, and the amount of EXIM restitution owed and paid to EXIM. As mentioned earlier, the fraud risks we identified in these 44 cases related to one or more of the following four fraud risk factors: (1) opportunities to falsify self-reported information on applications or transaction documents, (2) financial pressures that potentially incentivized participants or employees to commit fraud, (3) opportunities to circumvent or take advantage of EXIM or lender controls, or (4) opportunities to circumvent the intent of EXIM’s financing programs by diverting loan proceeds and other EXIM financing for personal use or benefit instead of for the export of U.S. goods. In addition to the contact named above, Jonathon Oldmixon (Assistant Director), Flavio Martinez (Analyst in Charge), Mason Calhoun, Marcus Corbin, Anthony Costulas, Adam Cowles, David Dornisch, Heather Dunahoo, Paulissa Earl, Colin Fallon, Dennis Fauber, Jennifer Felder, Dragan Matic, Maria McMullen, Christopher H. Schmitt, Albert Sim, Sabrina Streagle, and Steve Westley made key contributions to this report.", "summary": "As the export credit agency of the United States, EXIM's mission is to help support U.S. jobs by facilitating the export of U.S. goods and services through direct loans, loan guarantees, working capital guarantees, and credit insurance. In September 2018, the total outstanding and undisbursed amount of these products and unrecovered default claims was about $60.5 billion, according to EXIM. The Export-Import Bank Reform Reauthorization Act of 2015 included a provision for GAO to review EXIM's antifraud controls. This report (1) describes key antifraud controls EXIM says it has for mitigating fraud risks identified by GAO, and describes EXIM's efforts to perform a fraud risk assessment that considers these fraud risks; and (2) identifies EXIM's procedures to detect delinquent federal debt owed by applicants and participants, and assesses additional opportunities to use readily available data to do so. GAO analyzed 44 EXIM-associated court cases of fraud adjudicated from calendar years 2012 through 2017, examined EXIM transaction data, and interviewed EXIM and GSA officials. GAO also analyzed data identifying delinquent federal debt as well as EXIM's procedures for doing so. The Export-Import Bank of the United States (EXIM) reported having antifraud controls in place for mitigating the fraud risks that GAO identified and communicated to EXIM officials. GAO reviewed 44 EXIM-associated court cases involving fraud and identified fraud risks involving the four fraud risk factors illustrated in the figure below. GAO communicated these fraud risks to EXIM officials, and they provided examples of antifraud controls they use to help mitigate these fraud risks for their major financing products. In February 2019, EXIM also provided documentation reflecting its efforts to conduct a fraud risk assessment that considered various fraud risks affecting its major financing product lines, including fraud risks GAO identified during this review. EXIM has procedures to identify applicants and participants with delinquent federal debt, such as obtaining applicants' credit reports that may indicate these debts when they apply to EXIM's financing programs. However, EXIM is missing additional opportunities to use readily available data containing delinquent federal debt indicators from the General Services Administration's (GSA) System for Award Management (SAM) to detect applicants and participants that may have delinquent federal debt. Federal law states that applicants who are delinquent on federal nontax debts may not receive federal direct loans, loan guarantees, or loan insurance until the delinquent debt is satisfactorily resolved. Using data from SAM, GAO found that, from calendar years 2014 through 2016, EXIM authorized transactions that had an aggregate authorization value of about $1.7 billion and were associated with 32 U.S.-based companies that had a delinquent federal debt indicator in SAM in the same month EXIM authorized these transactions . While these results alone do not mean EXIM should have suspended these transactions, they do indicate that there is a practical opportunity to use SAM data to help determine applicants' eligibility. Without assessing the practicality of pursuing such readily available data, EXIM is potentially forgoing opportunities to perform additional due diligence that would help inform its decisions about applicants' and participants' program eligibility and fraud risks. GAO is recommending that EXIM assess the practicality of using available SAM data and data-analytical approaches to detect applicants and participants with potential delinquent federal debt. EXIM concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Our report found that SBA’s STEP grants management process does not provide reasonable assurance that STEP grant recipients meet two of the three TFTEA requirements we reviewed before the grant is closed out. TFTEA contains specific requirements for STEP, including: Proportional distribution requirement. SBA must distribute grant funds in a way that caps the amount of grant funds distributed to the 10 states with the largest numbers of eligible small businesses at 40 percent of the total amount awarded each year. This requirement ensures that states with fewer eligible small businesses receive funding, and is known as the “proportion of amounts” clause in the law. Total match requirement. States must provide either a 25 percent or 35 percent nonfederal total match to the federal grant amount. Cash match requirement. A state’s match cannot be less than 50 percent cash. First, we found that OIT has established a process for ensuring compliance with the TFTEA requirement outlined in the “proportion of amounts” clause of the statute. OIT officials told us they review data from the Department of Commerce’s Census Bureau that show the number of exporting small and medium-sized businesses in each state, and then use these data to determine the top 10 states. According to OIT officials, they use the most recent data available, with an approximately 2- to 3- year lag. OIT officials told us that they planned to use available 2016 Census data to determine the top 10 states for the fiscal year 2018 award cycle and then, after receiving applications, determine award amounts that would comply with this requirement. Second, we found SBA’s process did not document that states met TFTEA’s total match requirement before grant closeout. TFTEA requires that states provide matching funds, and the total match is typically 25 percent of the combined state-federal amount. At least half of the total match must be cash. Matching share requirements are often intended to ensure local financial participation, and may serve to hold down federal costs. If SBA determines that a state is not providing sufficient matching funds, it can withhold reimbursement for expenses incurred under the grant. Figure 1 illustrates the STEP funding proportions described above. In our report, we identified four instances where, according to OIT’s documentation, states reported insufficient total matches—one in fiscal year 2015 and three in fiscal year 2016. OIT’s documentation showed that these four states failed to meet the required total matching funds by about $76,000 combined over these 2 years of the program. SBA told us they nevertheless had closed these grants. OIT officials provided several explanations for their actions. First, OIT officials told us that of these four states, two submitted additional information after the grant had closed, indicating that the states had met the matching requirement. OIT officials stated that they did not verify the accuracy of the total match information before grant closure because of OIT staff error. With respect to the other two states, OIT initially stated that it was working with OGM to verify that the total match requirement had not been met, and how best to recover the funds. Subsequently, OIT reported OGM’s determination that one state had in fact met the match requirement, but that the other had not. In the case of the state that did not meet the requirement, OGM determined that SBA had overpaid federal funds to that state by about $19,600. However, after contacting the state and looking into the matter further, OGM conducted a review of quarterly reporting documentation for this state, and determined that the state had in fact exceeded its required match by about $3,800. Though all four of the states initially identified were eventually determined to have met the total match requirement, SBA did not have an adequate process in place to ensure documentation of a full match before grant closeout. Federal internal control standards state that management should design control activities. By designing and executing appropriate control activities, management helps fulfill its responsibilities and address identified risks in the internal control system. Without a process for effectively documenting that the total match requirement has been met and reviewing this documentation before grant closeout, SBA does not have reasonable assurance that states have complied with TFTEA’s total match requirement, and risks overpayment of federal funds. Third, we found that OIT’s process does not provide reasonable assurance that states have complied with the TFTEA cash match requirement. As previously noted, TFTEA requires that states provide at least half of their total match in the form of cash. TFTEA allows for the remaining half to be any mixture of cash, in-kind contributions, and indirect costs. OIT collects information about the types of expended matching funds, including the proportion provided in cash; however, OIT does not have a process in place to use this information to monitor states’ compliance with this requirement. OIT documents show that while proposed cash match amounts are recorded, OIT does not track or analyze states’ expended cash matching funds during or at the close of the grant cycle. OIT officials told us that this information is included in the states’ quarterly detailed expenditure worksheets, and therefore can be reviewed for compliance on a case-by- case basis. However, OIT program officials told us that they do not regularly analyze this information to determine what proportion of the total match the cash portion constitutes. The program’s authorizing legislation does not define “cash,” and neither does the Uniform Guidance. OIT considers the salaries of state trade office staff who work on administering the grant to be a form of cash and, according to OIT officials, most states use state staff salaries as their total match, including the required cash portion. In addition, we found that OIT does not have a process for ensuring that states reporting staff salaries as their required cash match are not also using grant funds from STEP to pay for portions of these same salaries. As such, SBA cannot consistently determine whether states are meeting the TFTEA cash match requirement, and risks closing out grants for which states have not met the cash match requirement. Using part of the grant to cover the cost of the state’s matching requirement in this way could have the effect of reducing the match below the thresholds mandated by TFTEA. In our discussions with officials from 12 low-use states that received STEP grants in fiscal year 2015, 2 states reported using the grant to offset state staff salaries. When we asked OIT officials what process they had in place to determine whether states were using staff salaries paid for with STEP funds as part of their match amount, OIT officials told us that they were not aware that STEP grantees had engaged in this practice, and therefore did not monitor for it. SBA’s grants management standard operating procedure states that the agency should monitor grantees for compliance with the terms and conditions of the awards, which includes compliance with applicable federal law. Further, according to federal standards for internal control, management should design and execute control activities, and use quality information to achieve the entity’s objectives. Management should process reliable data into quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. Without processes to review whether states are meeting the cash match requirement, OIT is not implementing its responsibilities under SBA’s standard operating procedure because it cannot consistently determine whether states are meeting this requirement. Without making such a determination, SBA does not have reasonable assurance that states are contributing to the program as required by STEP’s authorizing statute. In our report, we recommended that the SBA Administrator should establish a process that ensures documentation of states’ compliance with the total match requirement before grant closeout, and develop a process to determine states’ compliance with the cash match requirement. SBA agreed with these recommendations. Next, we looked at STEP’s grant use rate. In our report, we found that nearly 20 percent of grant funds go unused each year, despite OIT officials stating that they seek 100 percent use of grant funds. Specifically: 2015. Across all 40 recipient states, combined grant use was 81 percent, leaving 19 percent, or nearly $3.4 million, unused. This included one state that left 77 percent, or over $432,000, of its funds unused that year. 2016. Across 41 of the 43 recipient states, combined grant use was 82 percent, leaving 18 percent, or nearly $3.2 million, unused. This included one state that left nearly 95 percent, or nearly $184,000, of its funds unused that year. We found that OIT made some changes to the program that could improve states’ ability to use all their grant funds. Changes included: (1) Extending funds usage period to 2 years. This change allows an additional 4 quarters to conduct program activities, which, in turn, may help enable states to use the full amount of their grant funding and achieve performance targets. (2) Eliminating travel preauthorization requirement. This change may reduce the administrative burden on state trade office staff and allow greater flexibility to use grant funds when opportunities that require travel arise with limited notice. (3) Reducing the length of the technical proposal. This change may help to streamline the program’s application paperwork. We interviewed officials from low-use states to identify the continuing challenges they faced. We grouped the most commonly reported challenges into the following categories: (1) Timing of the application and award processes. State officials discussed the variable and short application timeframes, and said that the award announcement happening close to the start of the grant period can make it difficult to use funds during the 1st quarter of the period. (2) Administrative burden. State officials described challenges due to inflexible application requirements, a difficult process for repurposing funds, and burdensome and changing reporting requirements. (3) Communication. State officials told us this was a challenge because of delays and inconsistent communication of requirements from OIT. In our report, we found that OIT had not assessed and fully addressed the risk posed by some states’ low use of funds. OIT officials told us that while they informally collect feedback from states, there is no systematic process to collect states’ perspectives on challenges with the program, including obstacles to their ability to use funds. Officials said that they seek 100 percent use for each state that receives an award, as well as for the program as a whole. Federal internal control standards specify that agency leadership should define program objectives clearly to enable the identification of risks and define risk tolerances in order to meet the goals of the program’s authorizing legislation. In addition, OIT has no systematic process to share best practices with sufficient detail that states struggling to use their STEP funds might apply those practices to improve their own programs. TFTEA requires SBA to publish an annual report regarding STEP, including the best practices of those states that achieve the highest returns on investment and significant progress in helping eligible small businesses. While 12 states used 75 percent or less of their grant funds in the fiscal year 2015 cycle, 19 states used all or almost all of their funds. SBA publishes high-level information on what it deems to be notable state activities in its annual report to Congress. OIT officials told us that, when possible, they share best practices with states that may have difficulty accessing external markets. However, OIT officials told us that they do not formally facilitate the sharing of best practices among the states, saying that best practices for promoting exports in one state might not be transferable to another state because each state is unique. According to the Uniform Guidance, grant recipients’ performance should be measured in a way that helps the federal awarding agency and other nonfederal entities improve program outcomes, share lessons learned, and spread the adoption of promising practices. We have also previously reported on the importance of collecting and sharing best practices, as well as the processes for doing so. By sharing detailed information with all participating states about the approaches that some grant recipients are using to successfully achieve STEP’s goals, SBA could encourage all grant recipients to improve the effectiveness of their state STEP programs, including increasing fund use rates in pursuit of OIT’s stated aim of 100 percent grant fund use. In our report, we recommended that the SBA Administrator assess the risk to achieving program goals posed by some states’ low grant fund use rates, and that assessing this risk could include examining the challenges that states reported related to the program’s application and award processes, administrative burden, and communication. We also recommended that SBA enhance collection and sharing of best practices among states that receive STEP grant funds. SBA agreed with these recommendations. Chairwoman Finkenauer, Ranking Member Joyce, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this statement, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contacts for our Offices of Congressional Relations and Public Affairs are on the last page of this testimony. GAO staff who made key contributions to this statement are Adam Cowles (Assistant Director), Cristina Ruggiero (Analyst in Charge), Martin de Alteriis, Mark Dowling, Jesse Elrod, John Hussey, and Christopher Keblitis. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Small Business Administration's (SBA) management of the State Trade Expansion Program (STEP) does not provide reasonable assurance of compliance with some legal requirements. Specifically, the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) requirements for STEP include: Proportional distribution requirement. SBA's Office of International Trade (OIT) must distribute grant funds so that the total amount awarded to the 10 states with the highest percentage of eligible small businesses does not exceed 40 percent of the program's appropriation that year. Total match requirement. States must provide a 25 or 35 percent non-federal match to the federal grant amount. Cash match requirement. A state's match cannot be less than 50 percent cash. GAO found that, while OIT has a process to meet the distribution requirement, it does not have a process for documenting that states have met the total match requirement before grant closeout, and does not have a process to determine whether states are meeting the cash match requirement. Without such processes, SBA cannot be reasonably assured that states are contributing per the law's requirements. GAO found that, while OIT has made changes to STEP in response to states' feedback, officials from states with low grant use described ongoing challenges with the program that affect their ability to fully use funds. These challenges include compressed application and award timelines, administrative burden, and poor communication. SBA has not adequately assessed risks to the program, including the risk to achieving program goals posed by some states' low grant fund use rates. Without such an assessment, OIT's ability to support U.S. exporters may be diminished. Further, SBA has not effectively facilitated sharing best practices among states. By doing this, SBA could help states make full use of funds to achieve the program's goals.", "document_type": "gao"}
{"report": "NASA awarded firm-fixed-price contracts in 2014 to Boeing and SpaceX, valued at up to $4.2 billion and $2.6 billion, respectively, for the development of crew transportation systems that meet NASA requirements and for the initial service missions to the ISS. Figure 1 shows the spacecraft and launch vehicles for Boeing and SpaceX’s crew transportation systems. These contracts encompass the firm-fixed-price design, development, test, and evaluation work needed to support NASA’s certification of the contractors’ spacecraft, launch vehicle, and ground support systems and begin operational missions to the ISS. The Commercial Crew Program manages two processes in order to support the contractors’ uncrewed test flight, crewed test flight, and certification milestone. The contractors must submit evidence, which the Commercial Crew Program must review and approve for both processes. A three-phased safety review process informs the program’s quality assurance activities and is intended to ensure that the contractors have identified all safety-critical hazards and implemented associated controls prior to the first crewed test flight. In phase one, the contractors identify risks in their designs and develop reports on potential hazards, the controls they put in place to mitigate them, and explanations for how the controls will mitigate the hazards. In phase two, the program reviews and approves the contractors’ hazard reports and develops strategies to verify and validate that the controls are effective. In phase three, the contractors will conduct the verification activities and submit the hazard reports to the program for approval. The verification closure notice process is used to verify that the ISS requirements, applicable to any spacecraft flying to the ISS, and Commercial Crew Program requirements. After the contractor has successfully completed its uncrewed and crewed test flights and the above processes, the program determines at the contractor’s certification milestone whether the crew transportation system meets NASA’s requirements for human spaceflight. Following this contract milestone is an agency certification review, which authorizes the use of a contractor’s system to transport NASA crew to and from the ISS. It is at this point that the contractors can begin operational missions. Figure 2 shows the path leading to operational missions. Both contractors have made progress building and testing hardware, including SpaceX’s uncrewed test flight. But continued schedule delays and remaining work for the contractors and the program create continued uncertainty about when either contractor will be certified to begin conducting operational missions to the ISS. The program has made progress reviewing the contractors’ certification paperwork, but contractor delays in submitting evidence for NASA approval may compound a ‘bow wave’ of work, which creates uncertainty about when either contractor will be certified. NASA acknowledged the schedule uncertainty in February 2019, when it announced plans to purchase two additional Soyuz seats from Russia, citing concerns about the difficulties associated with achieving first flights in the final year of development. Both contractors are building several spacecraft, some of which are near completion. Each contractor’s spacecraft includes two main modules: Boeing’s spacecraft—CST-100 Starliner—is composed of a crew module and a service module. The crew module will carry the crew and cargo. It also includes communication systems, docking mechanisms, and return systems for Earth landing. The service module provides propulsion on-orbit and, if needed, in abort scenarios—when a failure prevents continuation of the mission and a return is required for crew survival—as well as radiators for thermal control. SpaceX’s spacecraft—Dragon 2—is composed of a capsule, which we refer to as the crew module, and a trunk, which we refer to as the support module. The crew module will carry the crew and cargo. It also includes avionics, docking mechanisms, and return systems for a water landing. The support module includes solar arrays for on-orbit power and guidance fins for escape abort scenarios. Different spacecraft will be used for the uncrewed test flight and the crewed test flight, as well as to support other test events. See table 1 for a description of each contractor’s hardware builds, current status, and upcoming events. Additional details on select hardware testing follow. In June 2018, Boeing experienced an anomaly while testing its launch abort engines. During a test firing, four of the eight total valves in the four launch abort engines failed to close after a shutdown command was sent. In response to this event, Boeing initiated an investigation to identify the root cause. According to Boeing officials, Boeing plans to replace components on all of its service modules except for the uncrewed test flight service module. This is because the abort system will not be active for the uncrewed test flight. Boeing plans to resume testing its launch abort engines in May 2019. A NASA official told us that addressing this anomaly and identifying its root cause resulted in a 12-month schedule delay to launch abort propulsion system testing. In March 2019, SpaceX conducted its uncrewed test flight, which demonstrated that the capsule could dock with the ISS and return to Earth. NASA officials described SpaceX’s uncrewed test flight as a success with key systems such as the guidance, navigation, and control and the parachutes performing as expected. A SpaceX official told us that this was a very successful test and represented significant risk reduction from a schedule and technical perspective. Subsequently, the spacecraft used in the uncrewed test flight was destroyed in a testing anomaly. The anomaly occurred during a test that SpaceX was conducting in advance of an in-flight abort test scheduled for this summer. As of May 2019, SpaceX was investigating the anomaly. Continued schedule delays create uncertainty about when NASA will certify either contractor to begin conducting operational missions to the ISS. We have previously found that the contractors’ schedules regularly changed, and this pattern continues. As of May 2019, both contractors have delayed their certification milestone nine times since establishing dates in their original contracts. In the span of less than a year, since our July 2018 report, Boeing has again delayed its certification milestone four times and by 12 months, while SpaceX has again delayed its certification milestone three times and by 7 months. Both contractors are now planning for certification to occur more than 2 years beyond the original dates in their contracts–Boeing in January 2020 and SpaceX in September 2019, though this date is under review and could further slip (see figure 3). Over time, both program and contractor officials have told us that they struggle to establish stable schedules. In 2018, the Commercial Crew Program manager told us that she relied on her previous experience to estimate schedule time frames as opposed to relying on the contractors’ schedules, which were overly optimistic. In March 2019, a senior NASA official told us that the agency has struggled to establish schedules with both contractors, often needing to negotiate dates with senior company officials. Further, SpaceX officials explained that they would not know the schedule for the crewed test flight until they conducted the uncrewed test flight. However, even having conducted the uncrewed test flight in March 2019 and before the April 2019 anomaly, SpaceX and NASA were still re- evaluating the schedule for the crewed test flight. Both contractors are continuing to mitigate technical risks identified by program officials that need to be addressed in order to reach certification. The program will close a risk when the contractor is able to fully mitigate it. If all mitigation activities are exhausted, but a risk still remains, the program will determine if the risk is acceptable as part of the agency’s rationale for flight. As the contractors address these technical risks and proceed through integration and testing, any issues that arise during testing or the test flights could further delay certification. Program risks for Boeing include: Parachute System Certification. Boeing is conducting five parachute system qualification tests to demonstrate that its system meets the Commercial Crew Program’s requirements, which will be validated on two spacecraft flight tests. However, in August 2018, Boeing identified a faulty release mechanism for its drogue parachute—which initially slows down the capsule—during its third parachute qualification test that successfully deployed all parachutes. Identifying and fixing the faulty mechanism delayed its fourth parachute qualification test. According to a NASA official, Boeing is conducting testing to qualify an alternative design, and Boeing must qualify this alternative design before the crewed test flight. Launch Vehicle Engine Anomaly. Boeing is addressing a safety risk related to a launch vehicle component. Specifically, during a 2018 launch, the launch vehicle engine position during ascent deviated from commands but the launch vehicle provider stated that it achieved all mission objectives. Program officials told us that they have insight into the launch vehicle manufacturer’s ongoing investigation and have participated in a separate independent review team. Boeing will implement a set of corrective actions for the uncrewed test flight, and will continue testing the engines for the crewed test flight. Spacecraft-Generated Debris. Boeing is addressing a risk that under normal operating procedures the initiators that trigger separation events, such as the separation of the crew and service module prior to re-entry, may generate debris and damage the spacecraft. These components function as expected, but Boeing plans to install hardware to contain debris generated when the initiators fire. Program officials told us that they believe Boeing has identified a solution that will be sufficient for the uncrewed and crewed test flights, but the program is continuing to explore a possible redesign for future operational missions. Spacecraft Forward Heat Shield. We had previously found that Boeing was addressing a risk that during descent a portion of the spacecraft’s forward heat shield may re-contact the spacecraft after it is jettisoned and damage the parachute system. Since our last report, Boeing tested the performance of the forward heat shield in worst-case scenarios and found there was no damage to the parachute system or the spacecraft. After reviewing test data, the program determined that Boeing had completed the mitigation activities and, as of February 2019, no additional steps were needed. Program risks for SpaceX include: Parachute System Certification. Like Boeing, SpaceX is conducting several parachute tests to demonstrate that its system meets the Commercial Crew Program’s requirements. However, SpaceX experienced two anomalies with its parachute system in August 2018. As a result, a SpaceX official told us they enhanced the parachute design to improve robustness. NASA officials told us SpaceX’s enhanced parachutes performed well on its uncrewed test flight. Prior to the crewed test flight, SpaceX must demonstrate the performance of its parachute system. SpaceX plans to continue to test its parachutes, and according to a SpaceX official, will take all steps necessary to ensure that the flight design meets or exceeds minimum performance levels. Propellant Loading Procedures. SpaceX is continuing to address a safety risk related to its plans to conduct launch vehicle propellant loading procedures after the astronauts are on board the spacecraft. SpaceX officials told us that this loading process has been used in other configurations for multiple SpaceX flights. The Commercial Crew program has approved SpaceX’s proposed loading procedures, including the agreed upon demonstration of the loading procedure five times from the launch site in the final crew configuration before the crewed test flight. The five events include the uncrewed test flight and in-flight abort test. As of March 2019, SpaceX had completed the first two events. Redesigned Composite Overwrap Pressure Vessel. SpaceX is continuing to address a risk that its launch vehicle’s redesigned composite overwrap pressure vessel, which is intended to contain helium under high pressure, may serve as an ignition source. The program and SpaceX conducted tests on the redesigned vessel and the program determined that all possible ignition sources, with one exception, have a low likelihood of creating ignition. The program continues to assess this ignition source. According to a NASA official, there were no indications of any issues during SpaceX’s uncrewed test flight. SpaceX officials also told us that the redesigned vessel has successfully flown on multiple flights. The program will need to determine whether to accept the risk associated with this technical issue prior to SpaceX’s crewed test flight. Engine Turbine Cracking. NASA continues to assess a SpaceX risk related to the design of its launch vehicle engines, which has previously resulted in the turbine wheel cracking. To mitigate the turbine cracking risk, SpaceX conducted additional qualification testing and developed an operational strategy that resulted in no cracks. Consequently, the program accepted this risk for SpaceX’s uncrewed test flight but levied a constraint on the crewed test flight. Specifically, SpaceX has agreed to conduct a follow-on test campaign of the engines to demonstrate that it meets NASA’s standards in order to launch its crewed test flight. Program officials said SpaceX plans to build the launch vehicle engines for its crewed test flight concurrently with this follow-on testing series. The Commercial Crew Program’s ability to process certification data packages for its two contractors continues to create uncertainty about the timing of certification. Specifically, the program is concurrently reviewing and approving both contractors’ phased safety reviews and verification closure notices. We previously reported that program officials, the contractors, and independent review organizations had concerns about a “bow wave” of work for the program. For example, at that time, the program’s safety and mission assurance office identified the upcoming bow wave of work in a shrinking time period as a top risk to achieving certification. Three-Phased Safety Reviews. The program continues to make progress conducting its phased safety reviews, but it has not yet completed them. In February 2017, we found that the program was behind schedule completing its phased safety reviews and, as of April 2019, it had yet to complete this process. As shown in Table 2, the program is near completion of phase two reviews and phase three reviews are in progress. Program officials told us that they have started work on many of the phase three safety reviews, but the data only reflect their efforts once they complete a phased safety report in its entirety. Any additional delays to complete this process, however, would delay the crewed test flights and create uncertainty about when NASA will certify the contractors to begin operational flights. Verification Closure Notices. NASA has made progress verifying that the contractors have met ISS and Commercial Crew Program requirements, but much work remains. When a contractor is ready for NASA to verify that it has met a requirement, such as that the contractor’s system can detect and alert the crew to critical faults that could result in a catastrophic event, the contractor submits data for NASA to review through a verification closure notice. Table 3 shows the agency’s progress approving verification closure notices for each contractor. Program officials told us that, because the contract solicitation did not require an uncrewed test flight, they had not previously determined the minimum number of Commercial Crew Program requirements that the contractors should meet prior to an uncrewed test flight. Subsequently, both contractors included an uncrewed test flight as part of their schedules. As these test flights approached, NASA determined that it must verify that the contractors met approximately 20 percent of the program’s requirements before the contractors’ uncrewed test flight and the remaining 80 percent before the contractors’ crewed test flights. The program made this determination based on ensuring the contractors met requirements related to the spacecraft safely approaching and docking to the ISS; ensuring the safety of the ISS and its crew; and meeting any mission-specific requirements for cargo. Both contractors originally planned for the program to verify they had met more than 20 percent of the Commercial Crew Program requirements before the uncrewed test flight but have subsequently changed their plans. For both contractors, the program is allowing the contractors to submit more verification closure notices between the uncrewed and crewed test flight than initially envisioned. Program officials told us that contractors proposed deferring the submission of verification closure notices because they were having difficulties meeting the original targets. Figure 4 includes SpaceX and Boeing’s original and current plans for verification of requirements compared to the Commercial Crew Program’s minimum level of requirements it determined was necessary for the uncrewed test flight. As reflected in the figure, these new plans, which defer submission of work to the crewed test flight, may compound the program’s bow wave of work and create uncertainty about the timing of certification. Further, the Commercial Crew Program will need to reassess a subset of requirements closed for the uncrewed test flight prior to the crewed test flight. For example, of the 78 requirements Boeing plans to close prior to the uncrewed test flight, the program will re-assess 16; for SpaceX’s 49 requirements, the program will re-assess 32. Program officials told us that some of this work is expected based on known changes to the contractors’ systems between the uncrewed and crewed test flight. For example, officials told us that they approved a verification closure notice for SpaceX’s air conditioning system in order to support the uncrewed test flight, but they know that they will need to re-assess it because SpaceX is making changes before its crewed test flight. While these types of changes and those that are identified through testing are not uncommon, they further add to the program’s workload and create uncertainty about the timing of certification. Among the requirements that must be closed before the crewed test flight is loss of crew, which is a metric that captures the probability of death or permanent disability to one or more crew members. According to program risk charts, the program’s top safety risk continues to be that neither contractor will meet the contractual requirement of a 1 in 270 probability of incurring loss of crew. We previously found that NASA lacked a consistent approach for how to assess loss of crew and recommended that key parties, including the program manager, collectively determine and document how the agency will determine its risk tolerance level prior to certifying either contractor. NASA partially concurred with that recommendation, stating that, if neither contractor can meet the loss of crew requirement, the program will request a waiver through the human rating certification process to ensure transparency. As of March 2019, NASA officials told us they have not taken steps to address this recommendation. Officials told us that the Commercial Crew Program is currently reviewing Boeing’s loss of crew verification closure notice and SpaceX’s draft verification closure notice in order to verify if the contractors have met the loss of crew requirement. According to program officials, one of the biggest challenges for the program is balancing its workload to support the two contractors, but officials are making an effort to review each contractor’s data products as they are submitted. For example, program officials told us that they were able to review SpaceX submissions during the summer of 2018, while Boeing’s submissions slowed as it focused on addressing the test anomaly with its launch abort engines. However, based on current schedules, the program must complete its reviews of certification paperwork while supporting uncrewed, crewed, and abort system test flights for both contractors before the end of 2019. Both contractors said they have concerns about NASA’s ability to maintain its pace of processing paperwork in order to support the contractors’ planned test flights and certification dates. The potential bow wave of work continues to create uncertainty about the timing of certification for either contractor, which could result in delays to the first operational mission to the ISS. In February 2019, NASA announced plans to buy two more Soyuz seats from Russia, thereby acknowledging that delays to certification of the Commercial Crew Program contractors could continue. These seats would extend U.S. access to the ISS from November 2019 through September 2020. According to a senior NASA official, NASA is not purchasing a new Soyuz spacecraft, which we have previously found requires a 3-year lead time. Instead, two additional seats became available on existing vehicles after changes to the Soyuz manifest. In 2015, NASA paid approximately $82 million per seat through its contract with the Russian Federal Space Agency (Roscomos). Program officials stated they could not publicly disclose the price NASA paid for these two new additional seats, but noted that the cost was 5 percent higher per seat than the previous contract modification to purchase Soyuz seats and is consistent with inflation. In addition, NASA plans to extend the duration of Boeing’s crewed test flight. In March 2018, NASA modified its contract with Boeing to allow NASA to add a third crew member and extend the length of the crewed test flight. In July 2018, we reported that NASA was considering this option as one way to maintain a U.S. presence on the ISS, but noted it had limited usefulness if Boeing’s crewed test flight slipped past the return date of the last Soyuz flight. NASA’s actions—purchasing the two additional Soyuz seats and implementing an extended duration crewed test flight for Boeing—do not fully address our July 2018 recommendation to develop and maintain a contingency plan for ensuring a presence on the ISS until a Commercial Crew Program contractor is certified. NASA concurred with this recommendation but, to fully implement it, NASA needs to provide additional support regarding planning efforts to ensure uninterrupted access to the ISS if delays with the Commercial Crew Program contractors continue beyond September 2020. Continued NASA attention on this issue is needed given the uncertainty associated with the final certification dates. We provided a draft of this product to NASA for comment. In its response, reproduced in appendix I, NASA generally agreed with our findings and included an update on the progress made by Boeing and SpaceX. NASA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to NASA Administrator and interested congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. Cristina T. Chaplain at (202) 512-4841 or chaplainc@gao.gov. In addition to the contact named above, Molly Traci, Assistant Director; Lorraine Ettaro; Laura Greifner; Kurt Gurka; Joy Kim; Christopher Lee; Katherine Pfeiffer; Roxanna T. Sun; Hai Tran; Kristin Van Wychen; and Alyssa Weir made significant contributions to this report.", "summary": "In 2014, NASA awarded two firm-fixed-price contracts to Boeing and SpaceX, worth a combined total of up to $6.8 billion, to develop crew transportation systems and conduct initial missions to the ISS. In July 2018, GAO found that both contractors continued to delay their certification dates and that further delays were likely. NASA must certify the contractors' crew transportation systems before the contractors can begin operational missions to the ISS. The contractors were originally required to provide NASA all the evidence it needed to certify that their systems met its requirements in 2017. The House Committee on Appropriations included a provision in its 2017 report for GAO to continue to review NASA's human space exploration programs. This is the latest in a series of reports addressing the mandate. This report examines the extent to which the Commercial Crew Program and its contractors have made progress towards certification. To do this work, GAO analyzed contracts, schedules, and other documentation and spoke with officials from the Commercial Crew Program, Boeing, and SpaceX. Both of the Commercial Crew Program's contractors, Boeing and SpaceX, have made progress on their crew transportation systems. However, neither is ready to begin carrying astronauts into space as both continue to experience delays to certification. Certification is a process that the National Aeronautics and Space Administration (NASA) will use to ensure that each contractor's spacecraft, launch vehicle, and ground support systems meet its requirements for human spaceflight before any operational missions to the International Space Station (ISS) can occur. Factors contributing to schedule uncertainty include: Fluctuating schedules. As the contractors continue to build and test hardware—including SpaceX's March 2019 uncrewed test flight— their schedules for certification change frequently. As of May 2019, both contractors had delayed certification nine times, equating to more than 2 years from their original contracts (see figure). This includes several delays since GAO last reported in July 2018. Program Workload. NASA's ability to process certification data packages for its two contractors continues to create uncertainty about the timing of certification. The program has made progress conducting these reviews but much work remains. In addition, the program allowed both contractors to delay submitting evidence that they have met some requirements. This deferral has increased the amount of work remaining for the program prior to certification. In February 2019, NASA acknowledged that delays to certification could continue, and announced plans to extend U.S. access to the ISS through September 2020 by purchasing seats on the Russian Soyuz vehicle. However, this arrangement does not fully address GAO's July 2018 recommendation to develop a contingency plan for ensuring access to the ISS until a Commercial Crew Program contractor is certified. NASA concurred with the recommendation but has not yet implemented it. Continued NASA attention on this issue is needed given the uncertainty associated with the final certification dates. GAO continues to believe that NASA should develop a contingency plan to ensure uninterrupted access to the ISS if delays persist beyond September 2020. NASA generally agreed with GAO's findings.", "document_type": "gao"}
{"report": "The Navy oversees the planning and execution of non-nuclear surface ship repair and maintenance through several organizations (see fig. 1), including the following: The Chief of Naval Operations is the senior military officer of the Department of the Navy and is responsible to the Secretary of the Navy for the command, utilization of resources, and operating efficiency of the operating forces of the Navy and of the Navy shore activities assigned by the Secretary. The Assistant Secretary of the Navy for Research, Development and Acquisition, as the Navy Acquisition Executive, has overall authority, responsibility, and accountability for all acquisition and sustainment functions and programs, including surface ship repair and maintenance. Naval Sea Systems Command (NAVSEA) and its subordinate organizations maintain ships to meet fleet requirements within cost and schedule parameters, among other duties for combat systems design and operation. The Navy contracts with private shipyards and other firms—collectively known as the ship repair industrial base—for the repair and maintenance of non-nuclear surface ships. This work may be performed in either government-owned or contractor-owned facilities, potentially including shipyards with piers, cranes or facilities for pipefitting and valve repair. Certain types of work, such as inspecting, repairing or otherwise maintaining a ship’s hull, might require placing a ship in the ship repair contractor’s dry dock. Ship repair availabilities can range from a few weeks to years depending on the extent of work required and degree of complexity. The types of availabilities include the following: Chief of Naval Operations (CNO) availabilities accomplish major repair work. This includes industrial maintenance requiring complex processes to complete restorative work, such as structural, mechanical, and electrical repairs. These may include modernization work to upgrade a ship’s capabilities along with repair work, and can last for over a year. Larger contractors typically execute these types of availabilities rather than small businesses. Continuous Maintenance availabilities (CMAV) accomplish non- major repair work, which includes routine maintenance work requiring relatively little time compared to CNO availabilities—typically only weeks to a few months in duration. Small business contractors commonly execute CMAVs, and, at some ports, larger companies that have contracts for CNO availabilities also take on this type of work. Within NAVSEA, several organizations oversee MAC-MO strategy implementation (see fig. 2), including key functions such as contract administration, program management, and planning for future availabilities. Prior to awarding a contract for ship repair work under MAC-MO, the Navy plans and defines requirements for upcoming availabilities as depicted in figure 3 below. Contracting for availability execution under the MAC-MO strategy differs from that under the Navy’s previous strategy, known as Multi-Ship, Multi- Option (MSMO), in several key ways, including by calling for: establishment of fixed contractual prices and completion time frames for an upcoming availability, rather than payment of contractors’ incurred costs; use of a third-party planning contractor under a cost-reimbursement contract to define contract specifications, rather than relying on planners employed by ship repair contractors; and award of indefinite delivery contracts to multiple contractors that can then compete for future availabilities, rather than all availabilities for a particular class of ships going to one contractor. Under the MAC-MO strategy, the Navy normally places fixed-price orders for availabilities with expected durations of 10 months or less using indefinite delivery/indefinite quantity (IDIQ) contracts. IDIQ contracts do not specify exact times for delivery of supplies or services at contract award; the Navy establishes those via orders placed during contract performance. With MAC-MO, the Navy generally solicits and awards contracts for five-year periods to a set of qualified contractors at specific home ports. These periods include an initial execution year and four additional option years. As a result, several qualified contractors are available to subsequently compete for availabilities in a specific home port under firm-fixed-price availability delivery orders until contract expiration. Availabilities that the Navy expects to last more than 10 months are not restricted to the ships’ home port. This allows for contractors outside the home port to compete for this work. The Navy then awards contracts for these coast-wide availabilities as stand-alone contracts to a single prime contractor, potentially at a port different from the home port of the ship. Shorter availabilities may be limited to the home port area provided there is adequate competition, which the Navy defines as the presence of two or more qualified bidders. If adequate competition is not available in the home port area, the geographic area for solicitation is expanded equally in all directions until adequate competition exists. Figure 4 below depicts contracting processes used for soliciting and awarding work under the MAC-MO strategy. In November 2016, we reviewed the Navy’s implementation of the MAC- MO strategy through pilot maintenance periods, including its potential benefits and effects on the industrial base. We found MAC-MO had some potential benefits compared to the previous MSMO contracting strategy, including increased opportunities for competition and control of costs through fixed-price contracts. We additionally found that some contractors saw uncertainty associated with the need to continually compete for work, which could result in decisions to reduce their workforce and facilities, and the stability of ship repair workloads in their ports, irrespective of contract type. The Navy has achieved some, but not all, of the goals it set under the MAC-MO strategy. Among the achievements, the Navy provides more opportunities for competition—and received more offers—under MAC-MO than under the prior strategy. Further, MAC-MO’s fixed-price contracts help enable the Navy to ensure quality of work, and we found no evidence of deficient work at availability completion in our review of four completed case studies. At the same time, the Navy also desired improved availability cost and schedule outcomes under the MAC-MO strategy. The Navy’s results in these two areas have been mixed. Through April 2019, the Navy had completed 41 CNO availabilities under its MAC-MO strategy with, on average, 5 percent cost growth and 30 percent schedule growth. Unplanned work, which can often be unavoidable in ship repair, has detracted from both cost and schedule performance. The MAC-MO strategy has provided more opportunities than MSMO for competition by awarding a delivery order for each ship repair availability. The Navy has competed over 500 delivery orders under the MAC-MO strategy from April 2015 to March 2019. This represents a departure from the MSMO strategy under which a single contract was awarded to one contractor to execute multiple availabilities for a class of ship. The MAC- MO strategy also allows small businesses in Norfolk and San Diego to compete for noncomplex maintenance. Previously, under the MSMO strategy, small businesses said that they were more likely to work as subcontractors for the businesses that held one of the MSMO contracts. Navy officials have since stated that small businesses are now acting as prime contractors. The Navy has also achieved competition for soliciting its delivery orders under the MAC-MO strategy. According to our analysis of data from the Federal Procurement Data System-Next Generation (FPDS-NG), from the start of the MAC-MO strategy (April 2015) through March 2019, at least 78 percent (435 of 554) of MAC-MO awards solicited within home ports received two or more offers. Further, in the 18 percent of instances when the Navy awarded a delivery order after receiving only a single offer, it may have attained the benefits of having solicited that delivery order in a competitive environment. Table 1 shows the number of offers for both complex and noncomplex MAC-MO awards through March 2019. The MAC-MO strategy also gives the Navy flexibility to ensure that a contract’s quality requirements are met under a fixed price by the time of availability completion. The Navy identified improving the quality of workmanship as a goal when it switched from MSMO to MAC-MO. The previous MSMO contracting strategy relied on use of cost-reimbursement contracts, which only require the government to reimburse the contractor its allowable incurred costs, regardless whether the contractor completed the work. The MAC-MO strategy uses firm-fixed-price contracts, which provide for a price that is not subject to any adjustment on the basis of the contractor’s cost experience in performing the contract. This contract type places upon the contractor maximum risk and full responsibility for all costs and performance, including meeting the quality requirements of the contract. NAVSEA officials stated that in the event that the contractor doesn’t meet the quality terms of the contract, the Navy has two options: (1) require the contractor to complete the deficient work, at the contractor’s cost, to meet the specifications or (2) reduce the contract price to reflect the reduced value of the services performed and descope the related work requirements from the existing contract for performance on a future availability. Our review of availability completion reports from the four case study availabilities that were complete at the time of our assessment, out of six total, showed no instances where the Navy accepted quality deficiencies at availability completion. Navy contracting officials stated that in a firm- fixed-price contracting environment, they would not agree to accept deficient work without first obtaining concessions from the performing contractor, which would require modifying the delivery order. In one of these availabilities, we found evidence that the Navy elected to descope a non-option work item and defer it to a future availability. The maintenance team stated that this decision followed poor planning of the work item, which would have caused delays in completing the availability if not deferred. We also discussed these four availabilities with the responsible Navy maintenance teams, and none of those teams reported to us any deficient work at the time each availability completed. Between April 2015, when the Navy implemented the MAC-MO strategy, and April 2019, the Navy completed 41 CNO availabilities with an average cost growth per availability of 5 percent, or $1.7 million in fiscal year 2020 dollars. However, more than half of these availabilities (21 of 41) were completed at a lower cost than the Navy initially estimated. The cost growth of the remaining CNO availabilities (20 of 41) ranged between 1 percent and 78 percent and drove the aggregate average increase. Figure 5 shows the variation in cost performance, or the actual cost compared to the Navy’s estimate, for the 41 CNO availabilities. Figure 6 shows the cost performance, or actual cost compared to the Navy’s estimate, for the 41 CNO availabilities grouped by their location. Figure 7 shows cost performance, or actual cost compared to the Navy’s estimate, for the 41 CNO availabilities grouped by ship class. Between the start of the MAC-MO strategy in April 2015 and April 2019, the Navy completed 41 CNO MAC-MO ship repair availabilities with an average schedule growth, or actual number of days from availability start to completion, compared to the Navy’s estimate, of 30 percent, or 64 days. Twelve of 41 availabilities finished on time, and none finished ahead of schedule. In addition, two availabilities more than doubled in length, with one finishing with 123 percent schedule growth. We discuss some factors that can contribute to schedule growth below. Figure 8 shows the schedule growth for individual CNO availabilities. Figure 9 shows the schedule growth for the 41 CNO availabilities grouped by location. Figure 10 shows the schedule growth for the 41 CNO availabilities grouped by ship class. Navy officials stated that one potential source of delays is unplanned work, which consists of both growth work and new work. The Navy defines growth work as additional work that is identified or authorized after contract award that is related to a work item included in the original contract. We previously found that growth work contributed to cost and schedule increases, and it remains a contributing factor. Navy officials stated they expect some growth work in availabilities, as officials stated that certain tasks are difficult to fully scope within the original contract. As an example, one official stated that they cannot fully inspect ballast tanks and accurately write work specifications for their repair until the ship is at the repair yard and the availability has begun. Alternatively, the Navy defines new work as any additional work that is identified or authorized after contract award that is not related to a work item included in the original contract. Maintenance team officials stated that new work can originate when an item that needs repair breaks or the maintenance team first discovers it after the Navy awards the contract. The Navy can also add new work to an availability whenever it sees fit. In our six case study availabilities, we found that five added growth work, including examples of growth items that the Navy considered unavoidable. Our analysis of RMC data showed that the USS Stout (DDG 55) CNO Availability had 60 instances of growth work that the Navy considered unidentifiable prior to the start of the availability, including welding for the fuel tanks and repair to the bulkheads. The maintenance team did not consider these growth items to be unusual. Some non-CNO availabilities, like Continuous Maintenance availabilities, are smaller in scope and less susceptible to growth work. Maintenance team officials at SERMC consequently stated that they can often complete CMAVs on schedule. We found that the Navy completed one of our case study availabilities, the USS Iwo Jima CMAV, on schedule, and maintenance team officials stated they had time to add three new work items to the availability. Figure 11 describes the USS Stout (DDG 55) case study. Figure 12 describes the USS Iwo Jima (LHD 7) case study. According to Navy officials, managing growth work under firm-fixed-price contracts has contributed to schedule delays. In our November 2016 report on the Navy’s transition to the MAC-MO strategy, we described the importance of contractors and RMC staff negotiating contract changes and agreeing on costs in a timely manner in order to minimize schedule impact. In our current review, Navy officials stated that negotiating change orders for unplanned work under MAC-MO is more difficult and time consuming than under the prior MSMO strategy because the Navy can no longer direct the contractor to continue to work without agreeing on the cost. In one of our case study availabilities, the USS Whidbey Island (LSD 41) CNO Availability, the maintenance team officials stated that they had difficulties negotiating contract changes. As a result, the officials stated that the Navy used unilateral modifications to direct the contractor to execute growth work items and avoid further schedule disruptions. See Figure 13 below for more detail on the USS Whidbey Island (LSD 41) case study. The Navy recognizes the negative schedule outcomes it currently faces with MAC-MO strategy implementation and has worked to mitigate them. It has implemented new contracting provisions and is moving key availability milestones to earlier in the process in an effort to better plan availabilities and facilitate their on-time completion. The Navy has also tried to better coordinate with the third-party planner to plan for availabilities and improve schedule performance. Statutory requirements and their implementation, however, have hindered the Navy’s ability to further mitigate schedule delays. Specifically, the Navy must obtain approval from the Under Secretary of Defense (Comptroller) before funding growth work that occurs in subsequent fiscal years and exceeds $4 million—an amount established under a 1990 law. Late last year, Congress established a pilot program in fiscal year 2020 that affords the Navy the ability to use procurement funds for availabilities, and these funds remain available for obligation for three years. A congressional statement accompanying the appropriations law that established the pilot program states that the Navy is to submit quarterly reports on the execution of ship availabilities funded through the pilot program. In our November 2016 report, we identified several key lessons learned stemming from MAC-MO pilot maintenance availabilities. When we revisited these lessons learned during interviews with Navy officials, they discussed two persistent MAC-MO strategy attributes that remain points of emphasis for lessons learned from 2016. These strategy attributes, namely the use of firm-fixed-price contracts and the use of a third-party planner, led to two new key lessons learned and another ongoing lesson learned from our 2016 report. Most of these center on the importance of the Navy accurately planning for and anticipating needs during availabilities in order to avoid schedule delays—a theme that was also evident in our November 2016 report. According to NAVSEA leadership officials, the Navy primarily relies on two activities to determine lessons learned and identify actions that NAVSEA needs to take to improve ship repair maintenance, including under the MAC-MO strategy. Surface Team One compiles lessons learned that the individual RMCs recommend and reviews the implementation and status of actions to address those lessons learned. Performance to Plan (P2P) is a data-centric, analytical approach the Navy uses for a variety of improvement initiatives, including ship maintenance, to clearly characterize availability performance goals and develop solutions to improve availability duration outcomes. As shown in Table 2 below, the Navy has developed new contracting provisions and milestones to respond to lessons learned the Navy has identified. Additional information on each action follows the table. In 2018, the Navy began implementing two new contract provisions originating from lessons learned regarding the MAC-MO strategy—Small Dollar Value Growth and Level of Effort to Completion—in an effort to mitigate schedule delays typically associated with growth work. The November 2018 SDVG provision specifically addressed schedule delays due to growth items that cost $25,000 or less. Under SDVG, during availability planning the Navy and contractor agree on a set price to be used anytime a growth work item equal to or under the $25,000 threshold is added to the work specification. This provision eliminates the need for the Navy and the contractor to engage in time-consuming negotiations on small dollar items during the availability. According to the Navy’s 2018 biennial assessment, small dollar growth work negotiations accounted for around 70 percent of all contract changes. According to Navy documentation, contract negotiations for small dollar growth work caused delays of up to a week. In our discussion with officials from the USS Whidbey Island maintenance team, they reported that the availability required 972 contract changes, which they suggested SDVG would have helped expedite. The Navy’s SDVG policy memo states that in using SDVG, the contractor can now typically begin work on the growth item 24 hours after discovery. Figure 14 describes the SDVG process. While it can expedite work on smaller dollar value items, the use of SDVG carries cost risk for the Navy and the executing contractors, which RMC leadership officials and contractor representatives acknowledged. According to these officials, under SDVG the Navy, at times, will likely pay more for growth items than it would if it devoted increased time to negotiate prices, with the same being true for the contractors. For example, the Navy awarded a contract delivery order for the USS Bulkeley (DDG 84) availability in February 2019 that included SDVG. The SDVG line item provided for up to 291 changes for growth during that availability at a firm-fixed-price of $7,144 per change based on historical needs of similar availabilities. This meant that the Navy could use SDVG up to 291 times during the availability, and each of those growth items would cost the Navy $7,144 regardless of whether the actual cost to the contractor underran or exceeded that amount. After the contractor identifies the in-scope growth item, the Navy only must determine that the cost is equal to or less than the $25,000 threshold in the contract. Nonetheless, Navy officials expressed that the benefit of significantly decreased negotiation time outweighs the potential cost risk. As reflected in table 2, the Navy implemented a second new contract change process, known as LOE to Completion, in November 2018. This process is used for growth work items when the price exceeds the SDVG threshold of $25,000. LOE to Completion allows the Navy, within the already awarded contract for the availability, to fund growth work that contractors regularly discover during availability execution without having to separately negotiate each item. Through LOE to Completion, RMC leadership officials stated they have decreased negotiations and schedule delays during availability execution. LOE to Completion allows the Navy to obligate funding for labor-hours and material costs for estimated growth work at the time of award, rather than having to obtain appropriate funds after repair work begins. The Navy can then use those labor-hours and materials for individual growth work items over the course of the availability. According to RMC leadership officials, this provision allows them to avoid incurring additional delays. To establish the amounts of funding, the Navy reviews historical cost for growth work by class type and whether the availability is a docking or non-docking availability. For example, the Navy provided up to 134,002 work hours and $1.4 million for materials under the LOE to Completion contract process for the USS Bulkeley (DDG 84) availability. Figure 15 describes the LOE to Completion process. Because the Navy just recently implemented this process in November 2018, it has collected only limited data to date on its effectiveness. However, as described in figure 16, an availability involving complex ship repair work for the USS Princeton (CG 59) included contract terms that Navy officials described as a precursor to LOE to Completion. In August 2019, the Navy began targeting award of delivery orders for individual availabilities 120 days prior to the scheduled work start date. Previously, the Navy awarded these delivery orders 60 days prior to the scheduled work start date. According to Navy supply officials, awarding the delivery orders 120 days prior to the start of scheduled work allows the officials involved in the planning process to procure long lead-time materials early enough so that material delays do not impact schedule—a challenge they cited under the 60-day schedule. Figure 17 shows how the change awarding delivery order 120 days before work is scheduled to begin will affect availability milestones. As reflected in figure 17, another change is that long lead time materials are now ordered 365 days ahead of the start of work, as opposed to the prior schedule of 170 days ahead. Navy supply officials said that some materials require lead times from 1 year to 18 months. Consequently, ordering these materials 170 days before an availability begins increased the likelihood that they would arrive too late to fulfill the Navy’s stated goal of procuring all materials 30 days prior to the start of repair work. Unless repair work requiring these materials is nonessential and can be deferred to a future availability, these material delays can delay completion of availabilities by several months. Several ship repair contractor representatives we interviewed with pointed to long lead-time materials as drivers for schedule growth. While noting the potentially positive effects of shifting award date to 120 days before the availability begins, Navy officials also raised some challenges. They said that locking ship repair requirements almost a full year before an availability actually begins means that the Navy could finalize a ship’s upcoming availability work specifications before a ship even begins its next deployment. During this deployment, equipment breakages or other deficiencies not anticipated and subsequently not included in the work package could arise on the ship, all of which would likely become growth work during the availability. This new time frame for delivery orders has only recently been implemented. The first MAC-MO delivery order awarded 120 days prior to the start of work occurred in January 2020, with another awarded since then. The Navy was scheduled to award availabilities 120 days prior to the start of work in November 2019, but, according to Navy officials, lacked necessary funds to award several availabilities due to the continuing resolution in place at the time. The Navy is not yet certain whether awarding delivery orders earlier will improve the Navy’s ability to provide long lead-time materials on time. Both the Navy and the third-party planner recognize the need for the two parties to work closely together to produce the best specifications and work packages possible under MAC-MO. As within the Navy, third party planner staff also seek to identify lessons learned, in order to improve the quality of ship repair specifications they produce. According to third-party planning contractor representatives, they monitor contract changes involving growth work, assess whether that growth is due to planning deficiencies or other causes, and then identify lessons learned, which they use to improve their specification writing process. For example, contractor representatives stated that they used lessons learned during the USS Bainbridge (DDG 96) availability to create a template for a section of the forecastle deck plate. This template could be used on future availabilities for ships of the same destroyer class, providing potential cost savings to future availabilities. However, RMC officials across the three ports implementing the MAC-MO strategy expressed concerns over the quality of third-party planning contractor specifications used in ship repair availability solicitations and contracts. They stated that the specifications developed by the third-party planning contractors have frequently included errors and discrepancies. As a result, the maintenance teams have had to work with the third-party planning contractor to resolve the issues prior to award. According to RMC officials, maintenance teams within a given port have their own preferences with regard to how the third-party planning contractor writes specifications. Consequently, a specification written and approved in one RMC is sometimes deemed inadequate within another RMC. Figure 18 describes how specification deficiencies and other events affected a USS Roosevelt (DDG 80) availability. Even with the issues that Navy maintenance teams have encountered with third-party planner-developed specifications, RMC officials stated that they continue to find ways to enhance their coordination with the third-party planning contractor. For instance, according to MARMC officials, they found that when availability maintenance teams physically worked alongside third-party planning contractor staff, the planning process went much more smoothly. After SWRMC officials learned of this practice, SWRMC’s maintenance teams were co-located with the third- party planning contractor staff in an effort to improve its process as well. According to RMC staff, they found that having all parties coordinating closely in the planning process to be an effective way to mitigate some of the specification writing issues. In contrast to RMC officials, from NAVSEA leadership officials’ perspective, the third-party planning contractor is currently accomplishing the goals the Navy has set forth and has provided accurate enough specifications to earn the incentive fees outlined in its contract. The NAVSEA officials noted that the contractor has also received annual incentive fees for providing recommendations to the Master Specification Catalog utilized by the Navy to incorporate lessons learned and improve specifications written at all RMCs. Historically the Navy has used its operation and maintenance account to pay for ship repair. By law, those funds have generally only been available for new obligations for one fiscal year—which corresponds with the fiscal year in which the availability contract is awarded– after which the funds expire. In order for the Navy to use any remaining expired funds in the subsequent fiscal year for an in-scope contract change, the executing RMC must request what is called an upward obligation. The Navy can request an upward obligation at the fleet level as long as the request for a specific availability is less than $4 million. RMC officials stated this type of request involves a short process. However, if the upward obligations request exceeds $4 million for an availability, the executing RMC must receive approval from the Office of the Under Secretary of Defense (OUSD) Comptroller. According to RMC leadership officials, this process can take several months. We found that the Navy has requested upward obligations from the OUSD Comptroller 25 times across 14 ship repair availabilities since implementing the MAC-MO strategy in April 2015. In November 2016, we reported that the Navy identified the need for training for staff on how to obtain upward obligations funding. In our interviews with RMC leadership officials and Navy financial officials, some said they now had experience with upward obligations because of their regular need to obtain funding for ship availabilities that crossed fiscal years. Nonetheless, in our discussions with the RMC commanding officers, they described the upward obligations process to obtain OUSD Comptroller approval for upward obligations as cumbersome and unnecessarily complicated. Other Navy officials and contractors echoed these views and highlighted the upward obligations request process as a significant impediment to schedule performance. According to the RMC commanders, it requires several months to successfully execute and complete the upward obligations process for many availabilities because of reviews required within the Navy and the Office of the Secretary of Defense before approval is granted. Navy officials said the process also results in significant delays to the availabilities, as work cannot proceed without funding. For example, of six availabilities for which the Navy provided data, the shortest upward obligations request took 26 days, with the longest request spanning 189 days. Figure 19 describes how for one of our case studies, the USS Chosin (CG 65), the Navy experienced several months of schedule delay due in part to the upward obligations process. Navy officials stated they have attempted to identify legislative solutions to reduce the frequency under which they must obtain upward obligations, given the negative schedule effects this process precipitates. In 2018, the Office of the Assistant Secretary of the Navy (Financial Management and Comptroller), in conjunction with the Office of the Under Secretary of Defense (Comptroller), proposed two legislative initiatives to Congress intended to accomplish this goal. The first of these proposals seeks to raise the legal threshold for ship repair upward obligations requiring Navy and Defense Comptroller approval from $4 million to $10 million. The proposal also provides for a pilot ship availability with these new thresholds, which would allow the Navy to determine the proposal’s effectiveness before fully implementing the new threshold. According to Navy and DOD comptroller officials, this proposal holds merit on several levels. First, the upward obligations threshold has not changed since 1990, when the law implementing the process first passed. The proposed increase to the threshold would account for inflation and subsequent increases in the cost of ship repair over the last 30 years. For example, the average maintenance availability for a DDG 51 Arleigh Burke class destroyer cost $6 million in 1991, but costs $36 million when the Navy proposed the legislative change. Additionally, the scope of the Operations and Maintenance, Navy (O&M) budget has increased by a factor of 2.5 since the law’s 1990 passage. Navy officials believe that increasing the threshold to $10 million would potentially raise this amount to a level corresponding to increases in Navy ship repair budgets since that time. The second proposal would permit Navy O&M funds—which the Navy uses to fund ship repair, among other sustainment-related activities—to be available for the Navy to obligate for up to 2 fiscal years following their appropriation by Congress. Currently, these funds are available to be obligated by the Navy for only 1 year. According to Navy financial officials, since most ship repairs extend into a second year, this proposal would allow ship availabilities to avoid using upward obligations. A senior official with the Office of the Under Secretary of Defense (Comptroller) said that the threshold change was more logical, as the thresholds are no longer practical, and that the logistics of implementing 2-year funding were likely to be more complicated because of the various DOD software systems that would be affected. In December 2019, Congress and the President enacted legislation that— although differing from the Navy’s legislative proposals—is responsive to the Navy’s concerns relating to the process of approving upward obligations more than $4 million in its MAC-MO availabilities. In the Fiscal Year 2020 Consolidated Appropriations Act, Congress established a pilot program that allows the Navy to use the Other Procurement, Navy (OPN) account to fund Pacific fleet surface ship repair availabilities for 2020. Our review of Navy budget documentation shows that the Navy plans to execute 16 pilot availabilities using fiscal year 2020 OPN funds, and it has requested funding for another 26 pilot availabilities in fiscal year 2021. Unlike the Operations and Maintenance, Navy account, which the Navy typically uses to fund ship repair availabilities in 1-year increments, the OPN account provides the Navy with funding that will not expire for 3 years. Consequently, for availabilities the Navy funds through the pilot program, any growth work that necessitates an availability stretching into a second or even third year will avoid upward obligations and the related approval processes, provided sufficient funding remains in the OPN appropriation to cover the work. The joint explanatory statement accompanying the enacted legislation further stated that the Secretary of the Navy is to provide quarterly reports to Congress on the execution of ship availabilities funded through the pilot program in the OPN account. In these quarterly reports, the Navy is to report on the estimated or actual start or end dates of pilot availabilities, as well as the actual funded amount and estimate to complete. The Navy already completes systematic, biennial assessments of MAC- MO implementation, in response to our November 2016 report. While the Navy recognized upward obligations as an issue in its 2018 biennial assessment, the Navy did not examine potential solutions to the schedule delays that these obligations cause. Further, according to NAVSEA officials, the Navy has yet to determine whether it will address schedule outcomes and lessons learned from its pilot program availabilities within future biennial assessments. Our prior work identified leading practices for designing a well-developed and documented pilot program. These leading practices include the following: Establish well-defined, appropriate, clear, and measurable objectives Clearly articulate assessment methodology and data gathering strategy that addresses all components of the pilot program and includes key features of a sound plan Identify criteria or standards for identifying lessons about the pilot to inform decisions about scalability and whether, how, and when to integrate pilot activities into overall efforts Develop a detailed data-analysis plan to track the pilot program’s implementation and performance and evaluate the final results of the project and draw conclusions on whether, how, and when to integrate pilot activities into overall efforts Ensure appropriate two-way stakeholder communication and input at all stages of the pilot project, including design, implementation, data gathering, and assessment These practices enhance the quality, credibility, and usefulness of evaluations and help ensure that time and resources are used effectively. As the Navy moves into implementation of the OPN-funded pilot program, establishing a plan for analysis of the pilot program would provide a means to identify opportunities to take the data on availability schedules, which Congress directed, and compare it to the schedule performance the Navy has attained in its other non-pilot, MAC-MO availabilities. Such evaluations would provide information to the Navy and Congress to determine if the pilot approach should be expanded to help address persistent schedule challenges. In addition, similar to the lessons the Navy has learned in implementing the MAC-MO strategy, the Navy is likely to learn lessons from its OPN-funded pilot availabilities, including ones that relate to schedule drivers currently overshadowed by delays cast by the upward obligations process. Unless the Navy documents within an analysis plan a process for evaluating lessons learned, it runs the risk of missing opportunities to improve its overall performance outcomes across availabilities executed under the MAC-MO strategy. Representatives of private ship repair contractors that the Navy relies on to execute availabilities under the MAC-MO strategy told us that their workforce and facilities investment decisions are driven by two key considerations. First, the contractors seek visibility on planned workload within a given port, which, under current law, the Navy must publicly report on a quarterly basis. Second, the contractors assess that planned workload to determine what share of the work they are most likely to receive. This assessment affects whether a contractor hires more or fewer people, recapitalizes or expands facilities, and, ultimately, elects to remain part of the Navy’s industrial base for ship repair. In recognition of these considerations, the Navy has taken recent steps to increase predictability of workloads at each port, for example by bundling contracts for both sequential and concurrent availabilities. The Navy anticipates that these steps will help further increase contractors’ confidence in their ability to forecast their share of future workloads. As we found in our November 2016 report, various factors regarding the Navy’s level of demand for maintenance and repair work at each of the three home ports implementing MAC-MO, including the deployment of ships, can affect the demand for work in each of the home ports. Based on our analysis of Navy data, this workload remains cyclical in nature, and at times fluctuates above and below what port capacities ordinarily support, as it was under the prior contracting strategy. In May 2016, we found that wide swings in port workload can have a negative effect on the private-sector industrial base, and various factors can affect those workloads. Subsequent to that report, Congress required the Navy to publicly release on a quarterly basis workload projections covering the three ports implementing MAC-MO. Navy’s forecasts indicate that ports implementing MAC-MO will, at times during the next 3 years, be assigned workloads beyond their current capacity, particularly for the Southeast Regional Maintenance Center in Mayport, Florida. Figures 20, 21, and 22 identify the Navy’s port workload projections for each of the three ports as of December 2019. Although the Navy projects that overall workload at the ports implementing MAC-MO will fluctuate with periodic increases, lack of certainty about company-specific workload is driving mixed views among contractors on their willingness to make facility and workforce investments. Multiple contractor representatives we interviewed stated they have always worked within an environment of peaks and valleys of workload regardless of the Navy’s contracting strategy. Representatives of large ship repair contractors we interviewed commented on challenges and changes they have made to remain competitive in the MAC-MO strategy’s competitive, firm-fixed-price contracting environment. Under MAC-MO, which requires competition for every availability within a home port, large contractor representatives stated that they do not have a high level of confidence or visibility into future work that the Navy will award to their companies. They have noted that this uncertainty has affected their planning for hiring and facilities investments. Specifically, contractor representatives cited the following: Of the eight large MAC-MO contractors in our review, four reported that they have increased their full-time workforce and the other four have reported a decreased workforce since 2015. Representatives of three contractors selected in our review noted that they have had to rely more heavily on temporary labor to conduct work on Navy availabilities because of inability to predict workloads. For example, a representative of one large contractor noted that their company retains a permanent core workforce, which it then supplements with temporary labor, as needed, depending on the number of contracts it is awarded by the Navy. Representatives of another large contractor noted that the company recently reinstated a training program for new ship repair workers. A representative from the third contractor stated that the company is considering reinstating its equivalent training program based on workload forecasts and confidence in their amount of workload, which underpins investments in workforce training. Representatives of multiple large contractors in our review also stated that they increasingly rely on their subcontractors to execute ship repair work. For example, a representative from one noted that although the company reduced its full time workforce, it is still able to execute availabilities through their use of subcontractor labor. A representative of another large contractor noted that their company staffed a recent availability with about 70 percent subcontracted labor, in part to help the contractor work within the contract’s price as agreed to with the Navy and to help the company make a profit. Representatives of another large contractor stated their company’s preference is to use subcontractors rather than to surge its permanent staff, especially given the contractor’s uncertainty about its portion of future Navy ship repair and maintenance workloads. Representatives of three of the large contractors we interviewed also stated that unstable workloads have limited their plans for significant capital investments in new or expanded facilities. However, representatives of two large contractors reported making new investments in facilities due to high volume of work at their ports. For example, representatives of one large contractor noted that their parent company invested $100 million into building a new dry dock as part of the company’s commitment to win new availabilities and complete them on schedule. The company reported that it was willing to make this investment, in part, because Navy forecasts show an increase in ships being homeported at that location. These contractor representatives further stated their company is considering additional facilities investments. Apart from the considerations that affect their hiring and facilities investments, representatives from all of the large companies we interviewed told us that they plan to continue competing for Navy ship repair work under the MAC-MO strategy. For seven out of the eight of these contractors, the Navy is their primary customer. A representative of one large contractor noted their company’s preference for the MAC-MO strategy, as compared to earlier Navy contracting strategies, especially as a means to increase its ability to propose on and compete for availabilities. Representatives of two additional large contractors also echoed the positive effect of increased opportunities to propose on Navy ship repair and maintenance contracts as a means to potentially grow their workloads. Representatives of the three small business contractors we interviewed told us that they have each increased their workforces since 2015, when the Navy began implementing the MAC-MO strategy. Under this strategy, small businesses are able to compete for noncomplex ship repair work as prime contractors. Overall, these small business contractor representatives stated they intend to further grow their workforces and facilities, correspondent with the amounts of ship repair work they receive. Specifically, representatives of these small business contractors told us the following: Representatives of one small business prime contractor reported that their company grew its workforce from 625 to 982 between December 2015 and March 2019 as they stated that MAC-MO provided additional opportunities to propose on ship repair contracts. A representative of another small business prime contractor we interviewed estimated that their company hired an additional 100 personnel at two locations because of new, increased workloads related to MAC-MO’s implementation. One small business prime contractor included in our review completed a major facilities expansion, including the addition of a dry dock intended to serve all lines of business, including commercial business customers. A representative of one small business prime contractor stated that their company is considering significant infrastructure upgrades and plans to aggressively compete for noncomplex Navy ship repair and maintenance work. The Navy has recently begun implementing two new contractual approaches—horizontal and vertical contract bundling—within its MAC- MO strategy, but has not yet had sufficient time to collect or assess results. These approaches are intended to increase contractors’ visibility into and confidence regarding future ship repair workloads. Navy leadership officials stated that by awarding multiple availabilities, industry receives a body of work that creates confidence in hiring and retaining a skilled workforce and investment in infrastructure. These approaches provide for contractors to propose on multiple ship repair availabilities that the Navy has bundled within a single request for proposal. Figure 23 illustrates these new contractual approaches. Horizontal Contract Bundling: Navy leadership officials testified to Congress in October 2019 that horizontal bundling helps them decide where to direct ship repair and maintenance work, especially as a means to not surpass capacity at a given port. A representative of one large contractor told us the company anticipates positive effects from horizontal bundling to include being awarded two availabilities from one proposal process and guarantees of work for a longer period than one availability. Another large business contractor representative noted that horizontal bundling would help in stabilizing workloads over a longer period of time, which would also help with its hiring planning. The Navy awarded its first horizontally bundled availabilities in September 2019, and the contractor is expected to complete work on the two ships at its shipyard in Seattle, Washington in June 2021 and May 2022, respectively. NAVSEA leadership officials noted that Navy intends to implement horizontal contract bundling at all of its ports in the future. Vertical Contract Bundling: This contract bundling approach has the potential to allow contractors to increase their workload through only one proposal process, as they may then have the possibility to work on two availabilities at one time. The Navy awarded its first vertically bundled availabilities in February 2019 to three contractors. The second award, in September 2019, resulted in one contractor receiving two simultaneous availabilities. Additionally, NAVSEA leadership officials state they are undertaking other initiatives intended to avoid (1) large fluctuations in ship repair work at individual ports, and (2) the need for contractor workforce layoffs and surge hiring. These initiatives are outlined in further detail below: Attempting to Level Port Workloads: Through its P2P initiative, the Navy intends to use historical timelines from recent availabilities to more accurately plan and forecast future availability time frames. This effort is using computer modeling to avoid either underutilizing or exceeding the available port loading capacity of the industrial base in any given timeframe. On average, NAVSEA leadership stated that they intend to lengthen planned availability timeframes by 56 days to more accurately reflect completion times. The officials assessed that this strategy will help ship repair contractors better manage their workforce planning. They further stated that if contractors have increased visibility in port loading, they will be more likely to hire an increased number of permanent staff in key ship repair trades. According to NAVSEA leadership officials, this could then allow for increased workload capacity at a given port, as those permanent— rather than temporary—staff would become more skilled over time and therefore would require less on-the-job training. Contractor Workforce Capacity Reporting: NAVSEA leadership officials also noted that the Navy is considering options for including language in future ship repair contracts requiring contractors to identify their workforce capacity, including by trade and skill set. NAVSEA leadership officials noted that the intention of such an initiative would be to obtain better workforce capacity data to better plan future port workloads. Although the MAC-MO strategy appears to have stabilized the cost and quality components, completing maintenance availabilities within allotted schedules continues to elude the Navy. The Navy has taken steps to more readily accommodate growth work needs as they emerge, however these likely cannot completely eliminate the Navy’s need for upward obligations. The Navy has pointed to the low cost threshold and upward obligations approval process, as provided for in statute, as not providing it with the agility it needs to fund growth work on a schedule that minimizes disruption to an availability. Recently, Congress enacted legislation, signed into law by the President, which establishes an OPN-funded pilot program and provides the Navy a platform to potentially demonstrate that it can meet its MAC-MO schedule goals when freed from the time intensive process of upward obligations. Nonetheless, every pilot program should be thought out before it starts, including consideration of what data need to be collected and how the data will be analyzed. Otherwise, the pilot could be poorly run or could miss opportunities to gain information and lessons learned. Such planning for the OPN-funded pilot could enhance the quality, credibility, and usefulness of the pilot program. The Secretary of the Navy should establish an analysis plan for the evaluation of OPN-funded pilot program availabilities, based on the leading practices for pilot programs. This analysis plan should identify opportunities to evaluate schedule outcomes of pilot program availabilities as compared to non-pilot program availabilities and document a process for evaluating lessons learned from the pilot program (Recommendation 1). We provided a draft of this report to the Navy for review and comment. In written comments provided by the Navy (reproduced in appendix II), the Navy concurred with our recommendation. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; and the Secretary of the Navy. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or at oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In 2015, the Navy transitioned to the Multiple Award Contract, Multi Order (MAC-MO) contract strategy for the maintenance and modernization of surface ships. This report (1) examines competition, cost, schedule, and quality outcomes under the strategy; (2) evaluates actions the Navy has taken related to recent lessons learned; and (3) describes considerations informing contractors’ plans for future hiring and facilities investments. To examine the competition outcomes of the MAC-MO strategy, as well as number of offers received, we analyzed delivery orders for all of the MAC-MO availabilities in Norfolk, Mayport, and San Diego from the start of the strategy in April 2015 through March 2019. Navy provided a list of MAC-MO Indefinite Delivery, Indefinite Quantity contracts and identified which were complex and noncomplex. We used the Federal Procurement Data System – Next Generation (FPDS-NG) to identify the delivery orders associated with these contracts, and the number of offers received for each order. To assess the reliability of the FPDS-NG data, we reviewed documentation, interviewed Navy officials, performed logic checks, and compared the FPDS-NG data to contract documents. To confirm that we had correctly identified orders related to MAC-MO availabilities, we reviewed the order description in FPDS-NG to confirm that it was a valid ship repair availability and the type of availability. For cases in which the FPDS-NG description did not contain the availability type, we obtained the contract to confirm that it was a valid ship repair availability. To assess the reliability of the number of offers, we performed a logic check to confirm the number of offers received for the delivery order was generally different from the number of offers received for the base contract. Documents reviewed included the FPDS-NG data dictionary, FPDS-NG data validation rules, and Fiscal Year 2013-2018 Federal Procurement Data Quality Summary, which contains results of agency testing of selected fields in FPDS-NG. We determined the FPDS-NG data were reliable for the purpose of assessing the competition outcomes of the MAC-MO strategy. To assess the quality outcomes of MAC-MO availabilities, we reviewed Federal Acquisition Regulations to identify differences between fixed- price and cost reimbursement contract types, and interviewed Navy officials regarding the steps the Navy takes to manage quality in a fixed- price environment. To examine the cost and schedule outcomes of the MAC-MO strategy, we collected ship maintenance availability data from NAVSEA and the Commander, Navy Regional Maintenance Center (CNRMC). This data contained the planned cost and schedule of Chief of Naval Operations (CNO) availabilities, as well as the actual cost and schedule for the availabilities that the Navy closed out between February 2, 2011 and January 15, 2019. While we were directed to assess the MAC-MO outcomes against the Multi-Ship, Multi-Option outcomes, differences in how the availability cost and schedule are estimated between the two strategies prevented us from comparing their cost and schedule outcomes. To assess the reliability of the data, we (1) gathered information from the Navy’s users of the data related to its reliability, (2) compared different snapshots of the data over time to check the consistency of completed entries, including the version that the Navy used to publish its first assessment of the MAC-MO strategy, and (3) compared availability documentation from our completed case study CNO availabilities. We determined the data were reliable for the purpose of assessing cost and schedule outcomes. To narrow our sample, we filtered the data to the ship classes and locations covered under the MAC-MO strategy and eliminated availabilities that had yet to report final cost and schedule entries. This yielded 41 closed out CNO availabilities since the start of the MAC-MO strategy in April 2015. We then adjusted all dollar values for inflation to fiscal year 2020 dollars by using the deflators for Operations and Maintenance funding found in table 5-9 of the Department of Defense budget estimates for fiscal year 2020. To calculate cost and schedule change, we determined the difference between the final cost and completion date, and the planned cost and completion date. The planned cost and schedule represents the Navy’s estimate at the time the Navy awarded the contract. We then calculated the average cost and schedule change for all 41 availabilities, as well as the availabilities at each of the three maintenance centers and classes of ships. To help examine the cost, schedule, and quality outcomes of the MAC- MO strategy, as well as to identify lessons learned, we selected six availabilities as non-generalizable case studies, four of which were completed at the time of our review. To select the availabilities, we used a list of MAC-MO Indefinite Delivery, Indefinite Quantity (IDIQ) contract numbers provided by the Naval Sea Systems Command. We used the Federal Procurement Data System, Next Generation (FPDS-NG) to collect the descriptions of contract actions to determine the ship and availability type, estimated cost, estimated completion dates, contractor, and place of performance. We selected a combination of six availabilities that provided a variety of the following characteristics: We selected two availabilities of each class of ship under the MAC- MO strategy, including destroyers, cruisers, and amphibious ships. We selected two availabilities from each maintenance center executing the strategy: Mid-Atlantic Regional Maintenance Center, Southeast Regional Maintenance Center, and Southwest Regional Maintenance Center. We selected availabilities awarded to a variety of ship repair contractors, including two from BAE Systems, two from General Dynamics NASSCO, one from Marine Hydraulics International, and one from Huntington Ingalls Industries. We selected a variety of availability types to describe different types of ship repair work, including two Selected Restricted Availabilities, a Special Selected Restricted Availability, Depot Modernization Period, Phased Maintenance Availability, and a Continuous Maintenance availability. For each of the case study availabilities, we collected and reviewed Navy availability documentation including the delivery order, correspondence between the maintenance teams and contractors, availability completion reports, weighted progress reports at the time of completion, and briefings containing lessons learned following completion of the availability. We reviewed the documents to: 1) confirm our selection criteria, 2) identify any deficiencies in quality of work and contract changes as a result, 3) identify the presence of growth work items, new work items, or deferred work items, 4) corroborate interview statements, and 5) identify any other issues during the availability and solutions that could be lessons learned for future availabilities. To evaluate the actions the Navy has taken related to recent MAC-MO strategy lessons learned, we analyzed Navy documentation containing lessons learned that aim to improve the Navy’s implementation of MAC- MO. We identified a total of three lessons learned as key based on our assessment of the Navy’s documentation of the MAC-MO contracting strategy. These three lessons learned were also identified as such in one or more interviews with NAVSEA officials knowledgeable about the challenges associated with MAC-MO implementation and the steps the Navy has taken to fix those issues. To evaluate the Navy’s progress in taking actions to address potential challenges posed by the key lessons learned, we reviewed Navy documents, including Navy assessments of the contracting strategy’s effectiveness, documents implementing revised planning milestones and contracting processes, strategy and planning documents, documents from availability completion meetings, case study contract file documents and other documentation related to lessons learned. To assess the extent to which the Navy has taken actions, we developed the following three-point scale: Not Complete—The Navy has not taken any action to respond to identified lessons learned. Partially Complete—The Navy has taken some action to respond to the identified lessons learned, but has not completed the action needed to address the identified risk. Complete—The Navy has completed the action needed to address the identified lesson learned. To describe considerations informing ship repair contractors’ plans for future hiring and facilities investments under the MAC-MO strategy, we conducted semi-structured interviews with and reviewed questionnaire responses from 11 non-nuclear surface ship repair contractors. This included all eight contractors responsible for executing major ship repair work under this strategy at the three home ports implementing it, including Mayport, Florida, Norfolk, Virginia and San Diego, California. We randomly selected a non-generalizable sample of three small business contractors performing noncomplex ship repair work at the three home ports implementing MAC-MO, to obtain the views of small businesses executing MAC-MO contracts. We used FPDS -NG data to identify those small businesses that have been awarded MAC-MO delivery orders. Further, we used a data collection instrument to gather information from each of the selected 11 contractors on their facilities, workforce, and sources of revenue. For example, we collected contractor-reported information on what types of facilities the contractor owned, such as a dry dock or a pier, the number of the contractor’s full-time staff, and the percentage of revenue from entities other than from the Navy. To identify the Navy’s projected workload for non-nuclear surface ships where the MAC-MO strategy is implemented, we obtained data from the Navy from fiscal years 2019 through the end of 2023. Since the purpose of our analysis was to show the Navy’s projections in anticipated port workload, we did not conduct our own assessment of the accuracy of this data. We also interviewed key Navy officials and reviewed statements from testimonies to Senate subcommittees, including of the NAVSEA Commander and of the Assistant Secretary of the Navy for Research, Development, and Acquisition, on their approaches to provide increased visibility and avoid large fluctuations of workloads at Navy ports, including the three home ports implementing the MAC-MO strategy. We collected documentation on these approaches, such as for the Performance to Plan initiative on how the Navy intends to use computer modeling to more accurately plan and forecast future availability timeframes, leveraging Navy historical datasets to provide more accurate and realistic planning forecasts. In addition, for all three objectives, we interviewed officials responsible for overseeing, planning, administering, and funding the Navy’s ship repair contracts, including representatives of the Office of the Under Secretary of Defense (Comptroller); Office of the Assistant Secretary of the Navy (Financial Management and Comptroller); the Office of the Chief of Naval Operations; Commander, Navy Regional Maintenance Center (CNRMC) and Deputy Commander, Surface Ship Maintenance and Modernization (SEA 21); Surface Maintenance Engineering Planning Program (SURFMEPP); Commander, Naval Surface Force, Atlantic; Commander, Naval Surface Force, Pacific; Mid-Atlantic Regional Maintenance Center (MARMC) in Norfolk, Virginia; the Southwest Regional Maintenance Center (SWRMC) in San Diego, California; and the Southeast Regional Maintenance Center (SERMC) in Mayport, Florida. We additionally interviewed management representatives of 11 ship repair contractors included in our review and the third party planning contractor. We conducted this performance audit from November 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, GAO staff who made key contributions to this report include Christopher R. Durbin (Assistant Director); Sean Seales (Analyst-in-Charge); Pete Anderson; Sonja Bensen, Lorraine Ettaro; Lori Fields; Suellen Foth, Kurt Gurka; Cale Jones; Ethan Kennedy; Sophia Payind; and Carol Petersen.", "summary": "The Navy relies on its fleet of over 150 surface ships to be ready to operate when needed for the defense of the United States. The Navy spends billions annually in maintaining this fleet. In 2015, the Navy changed how it contracts for such maintenance work, aiming to better control costs and improve quality. The new approach, called MAC-MO, generally uses firm-fixed-price contract delivery orders for individual ship availabilities competed among pre-qualified contractors at Navy regional maintenance centers. House Report 115-676 included a provision for GAO to review the Navy's implementation of the MAC-MO strategy. This report (1) examines outcomes under the strategy; (2) evaluates actions the Navy has taken related to recent lessons learned; and (3) describes contractors' considerations when planning for hiring and facilities. GAO analyzed data on ship repair under MAC-MO; reviewed six case studies involving different availability types, classes of ships, maintenance centers, and contractors; and interviewed Navy officials and contractors. Since shifting to the Multiple Award Contract-Multi Order (MAC-MO) contracting approach for ship maintenance work in 2015, the Navy has increased competition opportunities, gained flexibility to ensure quality of work, and limited cost growth, but schedule delays persist. During this period, 21 of 41 ship maintenance periods, called availabilities, for major repair work cost less than initially estimated, and average cost growth across the 41 availabilities was 5 percent. Schedule outcomes were less positive and Navy regional maintenance centers varied in their performance (see figure). To mitigate these delays, the Navy has identified and taken actions to implement lessons learned, including negotiating and funding undefined but expected increases in work at the time of contract award. However, these actions have not resolved the delays that result from the approval process the Navy often must use to obtain funds to complete this maintenance work. Namely, if an availability extends into a new fiscal year and needs more than $4 million in additional prior-year funding, both Navy and Defense Department approvals are required. GAO found this approval process took between 26 and 189 days based on Defense Department data. In December 2019, Congress established a pilot program that would potentially allow the Navy to avoid this process. Leading practices GAO identified for pilot programs call for development of an analysis plan to track implementation and performance and for evaluating final results. As the Navy moves into implementation of its pilot program, developing an analysis plan would provide it with a means to identify opportunities to evaluate schedule outcomes of pilot program availabilities, as compared to non-pilot program availabilities, and document a process for evaluating lessons learned from the pilot program. Such evaluations would provide information to determine if the pilot approach should expand to help address persistent schedule challenges. Ship repair contractors now operating in the MAC-MO environment told GAO that two key considerations drive their decisions on workforce and facilities investments: visibility regarding planned workloads within a given port and their assessment of the share of that work they are most likely to win. In recognition of these considerations, Navy officials have begun taking steps to increase predictability of workloads at each port. These officials anticipate that these steps, coupled with increasing workloads at the ports, will help increase contractors' confidence in their ability to forecast their share of future work. GAO recommends that the Navy establish an analysis plan for the evaluation of the pilot program. The Navy concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "We and others have identified challenges specific to VA’s management and oversight. These challenges have affected VA’s ability to accomplish its mission economically, efficiently, and effectively. For example, in April 2019, we summarized priority open recommendations from our previous reports to address these VA challenges. These recommendations cover areas affected by shortcomings in human capital management, such as veterans’ access to timely health care and reform of the appeals process for disability benefits. VA agreed or partially agreed with 28 of our 30 priority recommendations and is taking steps to implement them. We have also previously reported on human capital challenges across VA. For example, we reported in March 2017 that VA determined VBA staff resources have not sufficiently kept pace with increased pending appeals, and additional staff were needed to improve timeliness and reduce its appeals inventory. We found that VA’s written workforce plans—which cover recruiting, hiring, and training—were not consistent with sound workforce planning practices. We recommended that VBA ensure the development of a timely, detailed workforce plan for recruiting, hiring, and training new hires. As of October 2018, VA had taken steps to address this recommendation, but still needed to address risk mitigation strategies for ensuring it has appropriate capacity to manage appeals workloads and improve timeliness of appeals decisions. In addition, VA officials told us in August 2017 that VA had taken actions to hire more staff to update regulations on disability eligibility criteria. However, as of September 2018, the agency was still working to hire these staff. Furthermore, we reported in August 2018 that VHA’s Sterile Processing Services experienced workforce challenges such as lengthy hiring time frames and limited pay and professional growth potential. Officials told us that these challenges resulted in difficulty maintaining sufficient staffing. These challenges pose a potential risk to VA medical centers’ ability to ensure access to sterilized medical equipment. We recommended that VHA examine the services’ workforce needs and take actions based on the assessment. As of July 2019, this recommendation remained open. In 2018, VA’s Office of Inspector General identified leadership and workforce investment as a major management challenge. The Inspector General noted that the root cause for many of the issues it identified at VA was poor and unstable leadership and staffing shortages. Also, a 2015 Independent Assessment found that VHA’s leadership pipeline was not robust enough to meet its current and future needs. The report also concluded that VHA could not identify potential leaders and prepare them to assume their future roles. It stated that inadequate succession planning and unfocused leadership development efforts contributed to these problems. Finally, the report found that VHA may have difficulties meeting projected demand for services if it does not increase its total number of clinical employees, such as physicians, and their productivity. Effective succession planning can help agencies ensure they have a pipeline of talent to meet current and future mission requirements, according to OPM and our past work. Succession planning is a proactive and systematic process where organizations identify the positions they consider to be too critical to be left vacant or filled by any but the best qualified persons, according to OPM guidance. Organizations then develop a plan to fill those positions with qualified and capable employees. The guidance also states that organizations should take a planned, deliberate, and holistic approach to selecting, developing, and engaging their workforce. In our prior work, we noted that effective succession planning is more than filling existing vacancies with people with the same occupational skills and competencies. Rather, succession planning focuses on current and future needs, and develops pools of high-potential staff to meet the organization’s mission over the long term. Our assessment found that VA’s succession planning efforts partially met one leading practice and did not meet four. VHA met two and partially met three leading practices. VBA partially met three and did not meet two leading practices (see table 1). VA lacks a current, department-wide succession plan. It also has not met four of the key leading practices for succession planning, but has partially met one practice. VA Directive 5002 requires that VA use the administrations’ plans to develop a workforce and succession plan annually. However, VA has not produced a leadership-approved, department-wide succession plan since 2009. VA officials said the 2009 plan does not reflect their current succession planning efforts. Obtain active support and participation from leadership: Not met. According to VA officials, VA has tried to update its 2009 succession plan; however, leadership has not approved a revised plan because of leadership turnover. VA has developed a draft workforce plan, but as of July 2019, VA leadership had not approved the draft plan. Active leadership support for succession planning could help VA strengthen its current and future capacity to serve veterans. Develop succession plans aligned with strategic goals: Not met. VA officials did not provide evidence that VA’s succession planning process was aligned with strategic goals. OPM strategic human capital management regulations require an agency’s human capital policies and programs to align with its missions, goals, and strategic objectives. Developing an up-to-date succession plan aligned with the department’s strategic goals would help VA to establish a strategic process for meeting its current and future workforce needs. Analyze current and future workforce gaps: Not met. VA officials told us that they have conducted some analyses of workforce data for mission-critical occupations, but they did not provide evidence that VA analyzes or projects workforce gaps for leadership positions or for each mission-critical occupation. For example, in accordance with the VA MISSION Act of 2018 (MISSION Act), VA reported on the steps it is taking to achieve full staffing capacity. The report included data on VA’s onboard employees, turnover rates, and growth rates for the department’s total workforce, and growth and turnover rates for clinical positions and a limited number of other positions. VA also forecasted its overall hiring requirements for the current and upcoming fiscal year based on the budget and average turnover. However, the report, which VA produces to meet the specific requirements of the MISSION Act, does not include an analysis of workforce gaps for leadership positions or for specific mission-critical occupations. OPM’s strategic human capital management regulations require agency human capital policies and programs be based on comprehensive workforce planning and analysis, and use comprehensive data analytic methods and gap closure strategies to monitor and address skill gaps within mission-critical occupations. Further analyzing workforce gaps could help VA identify current and emerging workforce challenges and inform succession planning strategies. Identify strategies for closing workforce gaps: Partially met. VA has identified some strategies for addressing workforce gaps, though not within a succession planning process. VA’s Corporate Senior Executive Management Office (CSEMO) is responsible for managing the Senior Executive Service (SES) across the department and its administrations. CSEMO coordinates the hiring, placement, training, and development of VA’s SES employees. VA also has an SES Candidate Development Program, which identifies and develops talent to fill key SES positions. Further, in its MISSION Act report, VA identifies several strategies to achieve full staffing capacity. For example, the report discusses efforts to recruit and retain clinical staff through the VHA Education Debt Reduction Program and the VA Health Professional Scholarship Program. The report also discusses the Hire Right Hire Fast model initiated in 2017 that aims to fill open positions and reduce the time to hire for the medical support assistance occupation. VA officials have not provided evidence that they developed strategies for addressing future workforce gaps as part of the agency’s succession planning process. VA’s strategies are focused on closing current vacancies and achieving full staffing capacity. However, our prior work has found that leading organizations do more than just focus on replacing individuals; rather, they engage in broad, integrated succession planning and management efforts to strengthen both current and future organizational capacity. Additionally, OPM’s strategic human capital management regulations require agencies to plan for and manage current and future workforce needs, and to make progress towards closing any knowledge, skill, and competency gaps. Furthermore, because VA has not conducted a full analysis of its future workforce gaps, VA cannot identify strategies for closing those gaps. Monitor, evaluate, and update succession plans and strategies: Not met. VA provided limited evidence that it monitors and evaluates workforce planning strategies. For example, VHA and VBA produce action trackers to monitor the progress of some human capital initiatives at the administration level. However, because VA officials did not provide a current succession plan with strategies for closing workforce gaps, VA’s limited monitoring and evaluation efforts are not clearly linked to a succession planning process. Monitoring and evaluating the outcomes of strategies, policies, programs, and activities is one of the key systems established in OPM’s strategic human capital management regulations, and requires agencies to identify, implement, and monitor process improvements. Monitoring and evaluating activities as part of its succession planning process could help VA ensure that it is implementing effective strategies. Furthermore, regularly updating its succession plans would help VA identify and address current and emerging workforce gaps. VHA developed a succession plan in 2016, and its efforts have met two of the five succession planning leading practices for both leadership and mission-critical occupations. However, leadership has not ensured that VHA has complete workforce data. In addition, VHA’s monitoring and evaluation of its succession plans is limited. Obtain active support and participation from leadership: Partially met. VHA leadership has dedicated resources to succession planning. For example, VHA leadership dedicated staff and financial resources to develop a succession plan for VHA in 2016. VHA leadership also established the Healthcare Leadership Talent Institute (HLTI) in 2015 to strategically manage and develop VHA’s leadership talent. In addition, the former Undersecretary for Health approved the 2016 plan and encouraged staff to use the plan to develop talented staff, improve workplace culture and employee engagement, and address workforce challenges to improve the veteran experience. However, VHA leadership has not ensured that VHA’s plan incorporates leading practices and departmental requirements for succession planning, primarily related to analyzing workforce gaps and monitoring and evaluating its plan. VHA officials also told us that VHA does not provide leadership succession planning guidance to Veterans Integrated Service Networks (VISN) or medical centers because VHA has started to centralize leadership succession planning at the national level. Additional support and involvement from top leadership, such as providing additional oversight and guidance, could help to ensure VHA is meeting department-level succession planning requirements, and ensure that succession planning efforts achieve workforce goals. Develop succession plans aligned with strategic goals: Met. VHA has developed a succession plan and strategies that align with the administration’s and department’s strategic goals. The 2016 succession plan discusses VHA’s strategic direction—which includes strategic goals, major initiatives, and legislation that affect VHA’s workforce—and succession planning priorities. For example, the plan describes VHA’s strategies to adapt to a changing veteran population and to ensure it can provide sufficient, patient-driven primary and mental health care to meet the needs of veterans. Analyze current and future workforce gaps: Partially met. VHA’s 2016 succession plan analyzes current and projected workforce trends for both leadership and mission-critical occupations. For example, the plan presents the total number of executive leadership positions and the number of vacancies in those positions. In addition, the plan includes analyses of recent historical and projected workforce trends for mission- critical occupations, including prior and anticipated onboard, retirement, quit, and total loss rates. VHA collects workforce data from facilities annually and displays these data on its internal website, which is accessible to VHA staff who make human capital and workforce planning decisions. Although VHA tracks workforce data, our prior work has identified weaknesses with these data. For example, in October 2017, we found that VHA was unable to accurately count the total number of physicians in VA medical centers. Medical centers annually report data through a workforce planning tool; however, this tool does not include information on contract physicians, fee-basis physicians, and physician trainees. All of these arrangements help medical centers meet their demand for physicians, which have regularly been identified as one of VHA’s top shortage occupations. We recommended VHA develop and implement a process to accurately count all physicians providing care at each medical center. VA disagreed with this recommendation and, as of March 2019, had not implemented this recommendation. Improving the completeness and accuracy of its data would help VHA better address workforce gaps. Identify strategies for closing workforce gaps: Met. VHA’s 2016 plan identified strategies for closing workforce gaps. For leadership positions, HLTI offers training programs focused on developing future healthcare leaders. In addition to managing development programs, HLTI has implemented several initiatives to address specific gaps in leadership positions and build a succession pipeline of talent. For example, HLTI facilitates an annual talent review process by identifying and developing clinical and administrative leaders at medical centers who are interested in moving up into medical center director positions, the highest position in a VA medical center. VHA has also identified strategies to close gaps for its mission-critical occupations. For example, VHA requires facilities to develop action plans as part of the annual workforce planning cycle to reduce the risk of having critical staffing shortages. For instance, one VA medical center identified increasing human resources training and awareness of recruitment, retention, and relocation funding as an action to address shortages in dentist positions—the clinical occupation with the most severe shortage of candidates at that medical center. In addition, VHA established an initiative for hiring mental health providers, which involved hosting a virtual career event, partnering with professional organizations, and implementing other marketing and recruitment strategies. Monitor, evaluate, and update succession plans and strategies: Partially met. VHA has taken some steps to monitor, evaluate, and update its succession planning. VHA updates its succession plan approximately every 4 years and issues limited updates to the plan annually. VHA’s Office of Workforce Management and Consulting tracks workforce data nationally and provides data and risk scores by occupation to VISNs and medical centers so they can monitor workforce trends. VHA also uses these data to assess to what extent facilities’ efforts are achieving workforce goals. For leadership positions, VHA officials told us that HLTI evaluates its leadership development programs and that these evaluations are used to modify the programs to better meet VHA’s succession needs. However, VHA’s 2016 plan only included limited evaluations of previously identified strategies because VHA has not established a process for evaluating its succession planning efforts. While VHA tracks facility-level metrics for various occupations, VHA’s plan did not discuss specific methods for monitoring and evaluating its succession planning strategies. For example, VHA tracks the vacancy rates for medical center director positions; however, VHA has not identified a process to monitor and evaluate the effectiveness of the talent review process it has implemented for identifying and developing medical center director candidates. The plan also mentioned that subject matter experts within VHA suggested expanding monitoring efforts of certain recruitment and retention programs. As noted above, agencies are required to identify, implement, and monitor process improvements under the evaluation system established in OPM’s strategic human capital management regulations. Additional monitoring and evaluation of VHA’s succession plans and strategies could help VHA to assess the effectiveness of its strategies, and to identify and address emerging workforce challenges. VBA has partially met three key leading practices for succession planning and has not met two practices. Its strategic workforce plan, which VBA officials said is their primary succession planning document, only incorporates some key leading practices for mission-critical occupations. The plan does not address succession planning for leadership positions. Obtain active support and participation from leadership: Partially met. VBA’s leadership has taken some steps to promote succession planning, but has not fully incorporated departmental requirements or key leading practices. VBA officials told us that VBA’s leadership prioritizes filling vacancies for mission-critical occupations. For example, human capital staff brief VBA leadership monthly on vacancies and hiring initiatives. However, our prior work has found that leading organizations do more than simply backfill specific positions; rather, they engage in broad, integrated succession planning and management efforts to strengthen both current and future organizational capacity. As noted above, OPM’s strategic human capital management regulations require agencies to plan for and manage current and future workforce needs. In addition, VBA officials told us that VBA’s leadership reviewed and approved its strategic workforce plan. However, unlike VHA’s plan, VBA’s plan does not indicate that it was reviewed and approved by leadership. VBA leadership also has not ensured that VBA’s plan incorporates departmental requirements or key leading practices. Some of the missing leading practices discussed below—such as aligning plans with strategic goals, identifying strategies to close workforce gaps, and monitoring and evaluating those strategies—are also required by VA’s succession planning directive. VBA leadership also has not ensured that VBA is performing succession planning for leadership positions, which is required by VA’s succession planning directive and recommended by leading practices. In addition, strategic human capital management regulations require agencies to ensure leadership continuity by, in part, implementing and evaluating succession plans for leadership positions. According to VBA officials, VBA’s strategic workforce plan does not include succession planning for leadership positions because VBA plans Senior Executive Service (SES) development in coordination with the Corporate Senior Executive Management Office (CSEMO). While CSEMO manages SES development, VBA officials told us that VBA provides input to CSEMO on VBA’s SES needs. VBA officials did not provide evidence that they are identifying current and future leadership needs. Furthermore, VBA’s leadership also includes General Schedule (GS)-13 to GS-15 managers, who are below the SES level. Planning for those managers would not involve coordination with CSEMO. Therefore, incorporating leadership succession planning into its existing workforce planning processes could help VBA strategically identify and better meet current and future leadership needs. Develop succession plans aligned with strategic goals: Not met. Officials stated that VBA’s strategic workforce plan is the primary document that would discuss succession planning, but this document does not discuss strategic goals and how VBA’s plans align with those goals. As noted earlier, OPM strategic human capital management regulations require agency policies and programs to align with the agency’s mission, goals, and strategic objectives. Aligning plans with strategic goals could help VBA better achieve current and future mission requirements. For example, VBA does not clearly describe how succession plans and strategies for its veterans claims examining occupations—a mission-critical occupation series—will address VBA’s goal to provide veterans benefits and services in a timely manner. It can also help VBA officials create a clear and convincing case for agency leaders to dedicate resources―both budget and personnel―to succession planning. Analyze current and future workforce gaps: Partially met. VBA’s strategic workforce plan includes some analysis of current and future workforce gaps for mission-critical occupations, but not for leadership positions. For example, according to the plan, VBA has increased the number of employees in its veterans claims examining occupations. VBA also anticipates that it will need additional claims processors to meet future demand. However, the plan does not contain similar information for leadership positions, either at the SES level or at lower levels. As noted above, agency human capital policies and programs are to be based on comprehensive workforce planning and analysis. Analyzing workforce gaps in leadership could help VBA better understand its current and future workforce requirements to meet its evolving mission requirements. Identify strategies for closing workforce gaps: Partially met. VBA’s strategic workforce plan does not identify strategies or actions to close anticipated workforce gaps. VBA’s plan states that a forthcoming action plan will develop specific goals and corresponding targets, but VBA officials told us they are still developing this plan. As noted earlier, agencies are required to plan for and manage current and future workforce needs, and make progress towards closing knowledge, skill, and competency gaps. However, VBA does have training and development programs designed to ensure a pool of capable employees is available to take over leadership positions. For example, the Assistant Director Development Program helps prepare GS-14 and GS-15 employees for leadership positions within VBA. Nonetheless, identifying a coordinated set of strategies in its plan for filling leadership positions and closing mission-critical workforce gaps could help VBA address challenges in these areas. Monitor, evaluate, and update succession plans and strategies: Not met. VBA updates its strategic workforce plan every 4 years and issues limited updates to the plan annually. However, VBA’s plan does not provide any information on monitoring or evaluating strategies to close workforce gaps for mission-critical occupations or leadership positions. It also does not include updates to actions or strategies based on past performance. Monitoring and evaluating the outcomes of strategies, policies, programs, and activities is one of the key systems established in OPM’s strategic human capital management regulations, and requires agencies to identify, implement, and monitor process improvements. VA has not updated its succession planning directive since 2003 and VA officials told us that the directive does not incorporate legal requirements put in place since then. VA’s succession planning directive establishes the requirements and assigns the roles and responsibilities for succession planning across the department. VA’s directive identifies succession planning as an ongoing activity intended to best meet the needs of the department over time. According to VA officials, VA has attempted to update the directive twice since 2003, but has not completed the update due to leadership turnover. In addition, officials stated that they had to delay updating the directive to revise it to incorporate new regulatory and legislative changes that occurred during those past efforts to update the directive. A key update to legal requirements since 2003 is OPM’s strategic human capital regulations. These regulations establish the framework agencies are to use to plan, implement, evaluate, and improve human capital policies and programs. OPM originally issued the regulations in 2008 and then revised them in December 2016. In addition, the VA Choice and Quality Employment Act of 2017 requires VA, among other things, to establish a single database that lists each vacant position in VA that the Secretary determines is critical to the mission of VA, difficult to fill, or both. Updating the directive could help to ensure it reflects legal requirements put in place since 2003, such as OPM’s strategic human capital regulations. Updating the directive is also consistent with GAO’s Standards for Internal Control in the Federal Government, which requires management to identify and respond to significant changes, such as new laws and regulations. In addition, we found that VA, VHA, and VBA do not follow all of the requirements outlined in the directive. For example, the directive assigns responsibility to VA, VHA, and VBA for monitoring and evaluating their succession planning strategies, which is consistent with leading practices. However, as stated above, we found that VA, VHA, and VBA do not conduct sufficient monitoring and evaluation. Updating the directive could help VA clarify and recommunicate succession planning roles and responsibilities across the department and its administrations. We and others have previously identified leadership turnover and mission-critical vacancies that have affected VA’s ability to provide services to veterans. Addressing these challenges will require a planned and holistic approach to succession planning that focuses on current and future mission requirements over the long term rather than on filling existing vacancies with people with the same occupational skills and competencies. VA, VHA, and VBA have taken important steps to develop a pipeline of talent to fill leadership positions and mission-critical occupations. For example, each has developed training and development programs for aspiring leaders. However, VA lacks a current department-wide succession plan for leadership positions and mission-critical occupations, as required by its own directive. Establishing a department-wide succession plan and improving existing workforce plans would help VA identify and develop pools of high-potential staff to meet VA’s mission over the long term. Meanwhile, VHA and VBA could each take additional steps to fully incorporate key leading practices into their succession planning. Addressing VA’s challenges will require active leadership support and clear departmental guidance outlining VA’s and its administrations’ responsibilities for succession planning. However, VA has not updated its succession planning directive since 2003 due to leadership turnover, among other factors. Updating the directive could help ensure VA and its administrations are complying with relevant legal requirements—including OPM’s strategic human capital management regulations—and ensure they understand their roles and responsibilities for succession planning. We are making a total of four recommendations, including two to VA, one to VHA, and one to VBA: The Secretary of Veterans Affairs should develop a department-wide succession plan for leadership and mission-critical occupations that incorporates key leading practices for succession planning. (Recommendation 1) The Under Secretary for Health should incorporate key leading practices into VHA’s succession planning processes, including monitoring and evaluating VHA’s succession planning. (Recommendation 2) The Under Secretary for Benefits should develop a succession planning process for all leadership positions and incorporate key leading practices into VBA’s succession planning for leadership positions and mission- critical occupations. These practices include aligning the plans with strategic goals, identifying strategies to close workforce gaps, and monitoring and evaluating VBA’s succession planning. (Recommendation 3) The Secretary of Veterans Affairs should update VA’s 2003 directive on workforce and succession planning to incorporate relevant legal requirements, including OPM strategic human capital management regulation requirements. (Recommendation 4) We provided a draft of this report to the Secretary of Veterans Affairs for review and comment. VA provided written comments, which are reproduced in appendix III. VA concurred with all four recommendations. VA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of Veterans Affairs. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2757 or goldenkoffr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Table 2 summarizes leadership positions and mission-critical occupations at the Department of Veterans Affairs (VA), Veterans Health Administration (VHA), and Veterans Benefits Administration (VBA) as identified by the department and administrations. We reviewed our past reports and Office of Personnel Management guidance to identify the following key leading practices for succession planning. The list below explains the importance of the practices and provides examples of how agencies can demonstrate them. 1. Obtain active support and participation from leadership. Agencies’ top leadership actively participates in, regularly uses, and ensures the needed financial and staff resources for key succession planning and management initiatives. This leadership is important because it can provide (1) stability during plan development and implementation, (2) champions within the agency, and (3) integration with other key management planning efforts. This practice may be demonstrated by, for example, leadership participating in key succession planning meetings and ensuring succession planning policies are up-to-date. 2. Develop succession plans aligned with strategic goals. Agencies discuss how workforce knowledge, skills, and abilities for leadership and mission-critical occupations will contribute to the achievement of strategic and annual performance goals. This alignment helps ensure agencies’ plans provide the talent needed to meet their current and future mission requirements. This practice may be demonstrated by, for example, integrating succession planning into strategic planning and annual strategic objectives review assessments. 3. Analyze current and future workforce gaps. For leadership and mission-critical occupations, agencies identify the current talent state and critical skills in the workforce, future workforce needs, and current and future workforce gaps. This gap analysis is important for identifying the skills and competencies needed for achieving its missions and goals even as the agency’s operating environment changes. This practice may be demonstrated by, for example, conducting and documenting current and projected workforce analysis, including workforce gaps. 4. Identify strategies for closing workforce gaps. Agencies identify strategies for closing workforce gaps for leadership and mission- critical occupations, such as recruitment strategies, training, and developmental opportunities. This planning is important for aligning strategies to eliminate gaps, and tailoring workforce programs and processes to the agency’s needs. This practice may be demonstrated by, for example, developing and implementing action plans and training and development programs. 5. Monitor, evaluate, and update succession plans and strategies. Agencies identify and track performance measures and progress against goals to measure the effectiveness of succession management programs, and regularly update plans to reflect lessons learned. This performance monitoring is important for measuring both the outcomes of strategies and how the outcomes have helped accomplish the agencies’ missions and goals. This practice may be demonstrated by, for example, conducting progress assessments or revising programs based on past performance. Robert Goldenkoff, (202) 512-2757 or goldenkoffr@gao.gov. In addition to the contact named above, Shannon Finnegan (Assistant Director), Alexander Ray (Analyst-in-Charge), Colleen Corcoran, Karin Fangman, Robert Gebhart, and Sarah Green made key contributions to this report. Steven Flint, Shelby Kain, Christy Ley, Marcia Mann, Rachel Stoiko, and James Whitcomb also made contributions.", "summary": "VA operates one of the largest health care delivery systems in the nation and provides billions of dollars in benefits and services to veterans and their families. However, VA faces serious and long-standing problems with management challenges and veterans' access to care and disability benefits. For example, as of December 2018, VA reported an overall staff vacancy rate of 11 percent at VHA medical facilities, including vacancies of more than 24,000 medical and dental positions, and around 900 human resource positions. Ensuring VA, VHA, and VBA have a pipeline of talent to fill leadership positions and mission-critical occupations is key to addressing these challenges. The VA Choice and Quality Employment Act of 2017 includes a provision for GAO to review succession planning policies and guidance at VA and its administrations. This report addresses the extent to which succession planning policies and procedures at VA, VHA, and VBA are consistent with key leading practices. GAO reviewed agency documents related to succession planning for leadership positions and mission-critical occupations, and interviewed agency officials. To identify key leading practices, GAO reviewed GAO’s past work and Office of Personnel Management guidance. The Department of Veterans Affairs (VA), the Veterans Health Administration (VHA), and the Veterans Benefits Administration (VBA) have not fully incorporated key succession planning leading practices (see table). Legend: ● Met ◒ Partially Met ○ Not Met Source: GAO analysis of VA's, VHA's, and VBA's succession planning efforts. │ GA O-20-15 VA lacks a current, department-wide succession plan. According to VA officials, VA has not produced a department-wide succession plan since 2009 due to leadership turnover. VA officials said the 2009 plan does not reflect their current succession planning efforts. Establishing a succession plan would help VA identify and develop high-potential staff to meet VA's mission over the long term. VHA's succession plan is consistent with some leading practices, but our prior work found that VHA's physician staffing data are incomplete. Also, VHA performs limited monitoring and evaluation of its plans. Additional monitoring and evaluation could help VHA assess the effectiveness of its strategies in achieving its goals. VBA's plan includes some analysis of workforce gaps for mission-critical occupations. However, VBA's plan does not address leadership positions or fully incorporate key leading practices for mission-critical occupations, such as veterans claims examiners. Developing a succession planning process for leadership positions and fully incorporating key leading practices into its existing processes could help VBA better meet its current and future workforce needs. VA has not updated its succession planning directive since 2003 and VA officials told us that the directive does not incorporate legal requirements put in place since then. The directive establishes requirements and responsibilities for succession planning across VA. VA officials stated that they have not updated the directive because of leadership turnover and changes in legal requirements. Updating the directive could help to ensure it reflects relevant legal requirements. In addition, we found that VA, VHA, and VBA do not follow all of the requirements outlined in the directive. Updating the directive could help to clarify and recommunicate succession planning roles and responsibilities across the department. GAO is making four recommendations. VA should develop a department-wide succession plan and update its succession planning directive. VHA and VBA should fully incorporate key leading practices for succession planning. VA agreed with the recommendations.", "document_type": "gao"}
{"report": "The United States currently has two primary missions in Afghanistan: the U.S-led counterterrorism mission and the NATO-led Resolute Support mission to train, advise, and assist the ANDSF. For U.S. purposes, both of these missions are a part of Operation Freedom’s Sentinel, commanded by U.S. Forces-Afghanistan. Combined Security Transition Command-Afghanistan is the command under NATO’s Resolute Support mission that conducts the train, advise, and assist mission in Afghanistan. These efforts are carried out via the regional Train Advise Assist Commands (TAACs) that collectively cover all of Afghanistan. Specifically, Train Advise Assist Command–Air (TAAC-Air) focuses on developing and advising the Afghan Air Force. The ASFF is generally a 2-year appropriation that is used to provide assistance, with the concurrence of the Secretary of State, to the security forces of Afghanistan, including the provision of equipment, supplies, services, training, facility and infrastructure repair, renovation, construction, and funding. The ASFF presently comprises four budget activity groups: Afghan National Army, Afghan National Police, Afghan Air Force, and Afghan Special Security Forces. Each budget activity group includes four sub-activity groups: sustainment, infrastructure, equipment and transportation, and training and operations. According to officials, the training and operations sub-activity group encompasses most of CSTC- A’s efforts to train the ANDSF, including the Afghan National Army. CSTC-A has established processes to identify capability gaps within the ANDSF, develop and select training needed to address those gaps, and identify associated funding requirements. To do so, CSTC-A works with various requiring activities—partner organizations, such as the Train Advise Assist Commands—to identify ANDSF training needs. CSTC-A then incorporates these needs and associated funding requirements into the ASFF budget request, typically a year or more before the training is initiated. CSTC-A has established processes to identify capability gaps within the ANDSF, develop and select training needed to address those gaps, and identify associated funding requirements for inclusion in ASFF budget justification documentation. To help execute these processes, CSTC-A has developed standard operating procedures and other guidance for planning, resourcing, and executing the ASFF. These procedures and other guidance include information on processes to validate training requirements and associated resources. CSTC-A works with various partner organizations—referred to as “requiring activities”—to identify capability gaps and training needs for the ANDSF. Requiring activities are the organizations that request the resourcing of ANDSF capability needs through ASFF. They include CSTC-A, the TAACs, and other U.S. or NATO organizations partnered with the ANDSF. According to DOD officials, a partner organization can identify capability gaps in a number of ways. For example, Train Advise Assist Command– Air, which develops and advises the Afghan Air Force, works with subject matter experts from the relevant U.S. military services and other organizations to identify potential Afghan Air Force capability gaps. Additionally, according to DOD officials, in 2015 DOD tasked the MITRE Corporation to conduct a study of Afghan Air Force capabilities. According to DOD officials, MITRE’s November 2015 study highlighted capability gaps within the cadre of Afghan Air Force fixed- and rotary-wing pilots and maintenance personnel. Further, officials stated that the study concluded that the training of additional pilots constituted a critical need for the Afghan Air Force. Once a capability gap has been identified, the requiring activity develops potential courses of action to address it, such as proposals to train the ANDSF to develop needed capabilities. Through CSTC-A’s procedures these proposals are validated, along with associated resources. The validation process is intended to ensure that a transparent and accountable process is followed when allocating ASFF resources to emerging requirements. For example, as part of the fiscal year 2018 budget process, TAAC-Air identified a capability gap within the Afghan Air Force and then worked with various subject matter experts to develop courses of action to address the gap. Specifically, TAAC-Air worked with personnel from the Program Executive Office for Simulation, Training, and Instrumentation (PEO-STRI), which provides simulation, training, and testing solutions for the Army and joint community. Subject matter experts from PEO-STRI provided details regarding various options for addressing the capability gap. PEO-STRI officials noted that they also provided cost estimates for delivering the solution based on historical data. According to PEO-STRI officials, this was a highly interactive process entailing frequent formal and informal discussions among multiple organizations to develop the most effective solution for pilot training for the Afghan Air Force. Once details and cost estimates were solidified, the requirement owner presented them to a Council of Colonels, an officer group responsible for requirement validation for training needs, among other capability needs. The requirement was then taken to the General Officer Steering Committee, which votes to validate the requirement and approve the proposed solution. CSTC-A’s process incorporates validated training needs and their associated funding requirements as part of DOD’s annual budget process. DOD’s planning, programming, budgeting, and execution (PPBE) process, which is governed in part by DOD Directive 7045.14, along with other DOD guidance, is conducted under four phases (see figure 1). Specifically, DOD uses the PPBE process to determine and prioritize requirements and allocate resources to provide capabilities necessary to accomplish the department’s missions. According to officials, as part of this process, CSTC-A provides inputs, including training requirements and associated funding needs, and later works with various contracting commands to execute appropriated funds. In the case of ASFF, CSTC-A’s guidance indicates that a proposed activity (for example, fixed-wing pilot training classes) should generally be included in the ASFF budget justification book in order to later use ASFF funds for that activity. To do so, CSTC-A’s Program and Analysis Division develops and incorporates the requests from requirement owners for funding for the operations, sustainment, and development of the ANDSF into the ASFF budget request and associated budget justification materials. The Program and Analysis Division works with the requirement owners to write a narrative describing their proposed activity and associated cost estimate for delivering the activity. The division then works with the OUSD-Comptroller to consolidate requirements for all budget activities and sub-activity groups into a single draft budget justification book. One significant aspect of this process is that many of the key decisions, and associated cost assumptions, on how CSTC-A and TAAC-Air (in the case of Afghan pilot training) intend to carry out ASFF training efforts are proposed 18-24 months before the training will occur. For example, as shown in figure 2, preparation of the ASFF budget justification book for fiscal year 2019 began in the summer of 2017. In turn, the budget justification book was subsequently submitted to the OUSD-Comptroller in December 2017, and funds were not available for use until the start of the new fiscal year, in October 2018. These time frames can present a challenge in developing accurate cost estimates for CSTC-A, given that situations in Afghanistan can change significantly in the time between CSTC-A’s developing a proposed capability requirement and associated cost estimate for inclusion in the ASFF budget justification book and the execution of that requirement, according to officials. If conditions change, officials noted, the proposed actions and associated cost estimates for a given requirement may no longer be appropriate or accurate. For example, the Special Inspector General for Afghanistan Reconstruction reported in January 2019 that CTSC-A may have overestimated the cost for UH-60 Blackhawk rotary- wing pilot training by as much as $1 billion over a 7-year period— attributing the overestimation mainly to unrealistic assumptions regarding student or pilot attrition and the English language program. In the case of initial entry fixed-wing pilot training classes, CSTC-A’s original proposal, as reflected in its budget justification book was to have classes of 25 students. However, during the implementation of this training, the class size fell to 12 students because not all 25 students achieved the required English language proficiency, and one student had dropped out of the program. Consequently, the resulting class was half the projected size underlying the estimated funding requirement, which resulted in funds being excess to CSTC-A’s actual need. CSTC-A officials acknowledged the challenges they faced in filling classes with the expected number of students, adding that they had purposely built in significant flexibility in the training approach to be able to adjust to the realities of the ANDSF’s ability to generate qualified students. According to CSTC-A officials, the number of English-proficient Afghan student candidates varies from year to year. For cases like these, where CSTC-A requested more funding than it ultimately obligated, in some circumstances DOD may reprogram the unobligated amounts within the same appropriation account, or may transfer it to other appropriation accounts, if there is authority to do so. Otherwise, time-limited appropriations, such as the ASFF, expire after their period of availability and are unavailable for new obligations. According to CSTC-A officials, in cases where they have unobligated funding due to changing conditions such as smaller-than-expected class sizes, they try to reprogram that money for related needs within the same sub-activity group in the ASFF budget prior to expiration. For example, if certain Afghan Air Force training costs are lower than expected, the money could be reprogrammed for other efforts within the Afghan Air Force training and operations sub-activity group. ASFF-funded training contracts for the ANDSF are developed and executed through a process that is modeled on the U.S. government’s foreign military sales process. Until April 2019, ASFF-funded orders to train the Afghan National Army were generally filled under a contract with a single provider. At that point, DOD began to transition to an approach using several contracts, including one with multiple providers. ASFF-funded training contracts are developed and executed under a process modeled on the U.S. government’s foreign military sales (FMS) program, referred to as “pseudo-FMS.” As indicated by CSTC-A guidance, these pseudo-FMS procurements are FMS-like cases and use U.S. funds to purchase items, services, and training for ANDSF capability requirements. The process is outlined in the Security Assistance Management Manual, which provides DOD-wide guidance to DOD components engaged in the management or implementation of DOD security assistance and security cooperation programs over which the Defense Security Cooperation Agency has responsibility. We have previously reported that while the many steps of the process used for FMS and pseudo-FMS cases can be grouped in different ways, they fall into five general phases: assistance request, agreement development, acquisition, delivery, and case closure. First, CSTC-A works with the resource coordinator, requirement owner, and other elements to develop a Memorandum of Request, and it submits that memorandum to the implementing agency and the Defense Security Cooperation Agency, requesting assistance to contract for ANDSF needs using ASFF funds. For example, when developing the Memorandum of Request for initial entry fixed-wing pilot training, CSTC-A worked with TAAC-Air, the requirement owner, to identify details regarding the agreed- upon training solution. Officials noted that CSTC-A also worked with the subject matter experts from PEO-STRI to develop the independent government cost estimate. Second, as described by officials, the agreement development phase begins with the Defense Security Cooperation Agency’s receiving the Memorandum of Request. The Defense Security Cooperation Agency opens a case and assigns it to an implementing agency—that is, the military department or defense agency responsible for overall management of the actions that will result in the delivery of materials or services. According to contracting officials, the implementing agency for training foreign military ground and air forces outside of the United States—such as the Afghan National Army—is the U.S. Army Security Assistance Command. The implementing agency then works with the appropriate Program Executive Office to develop the Letter of Offer and Acceptance—which serves to document the transfer of articles and services to the U.S. government requesting authority. For example, for the out-of-country fixed-wing pilot training requirement, contractors delivered the training, and the appropriate implementing agency was PEO-STRI, according to officials. Once the Letter of Offer and Acceptance is completed and signed by the implementing and requesting agencies, it is reviewed and approved by the Defense Security Cooperation Agency and Department of State, as appropriate. Third, the Program Executive Office works with the appropriate contracting command to acquire the requested defense goods or services as part of the acquisition phase. According to contracting officials, the contracting command solicits and receives bids from contractors and selects the best value option (including price plus deliverables). Fourth, the contractor delivers the required good or service. According to officials, the relevant Program Executive Office is responsible for monitoring the contractor’s performance by ensuring compliance with applicable contract clauses. Fifth, following contract completion and payment of outstanding obligations, the implementing agency initiates case closure with the Defense Security Cooperation Agency. Prior to April 2019, ASFF-funded training requirements for the Afghan National Army, including out-of-country fixed- wing pilot training, were generally executed under a single award indefinite delivery, indefinite quantity contract known as the Warfighter Field Operations Customer Support (WFF) contract. The WFF contract provided integrated training system sustainment and training services world-wide for the U.S. Army, Marine Corps, Navy, Air Force, and Special Operations Command. According to Army contracting officials, WFF was the most expedient way to contract for various types of training for the Afghan National Army due to the contract’s broad scope and $11.2 billion ceiling. These officials said it provided the capacity and flexibility needed to fulfill the Afghan National Army’s requirements and time frames in a streamlined way because the competition and award process had already occurred, enabling officials to move directly to awarding task orders for support. However, while the single award indefinite delivery, indefinite quantity contract streamlined the process for contracting ANDSF training, it limited DOD’s ability to negotiate some costs. According to contracting officials, only certain types of costs could be negotiated, such as those associated with housing, travel, and the number of advisors supporting the training. The officials stated that other costs were established as a per-unit cost at the time of the contract award. In addition, various administrative fees were established when the WFF contract was awarded in 2007 and could not be renegotiated, according to contracting officials. As a result, any task orders under this contract, including those to train the Afghan National Army, had to include these administrative fees and established labor wages. To illustrate the various costs associated with the Afghan Air Force training program, we reviewed documentation associated with training provided under the WFF contract. One training program cost $12.1 million for the delivery of an 86-week fixed-wing pilot training course (from February 2018 through September 2019) for 13 Afghan Air Force students at the Fujairah Aviation Academy in the United Arab Emirates. The pilot training was conducted by contractors and comprised aviation English language training, theory of flight, basic and advanced instrument ground school, advanced flight instrumentation, and simulation training for the Afghan Air Force Cessna C-208 Caravan aircraft. The $12.1 million total included amounts paid to the contractor and administrative charges to cover the costs of entities within the U.S. government. The costs associated with the training are shown in figure 3 below. The largest cost factor in this task order was the cost of the flight school itself, which accounted for 68.4 percent (or $8.2 million) of the total cost, according to contracting officials. The flight school included ground school, simulation, advanced instruments, and flying hours training, and it represented a cost per each of the 13 students who actually attended the training. The flight school also included the cost of housing, electronic books / manuals, and campus security, some of which costs were negotiable, according to officials. Other costs, such as the Defense Security Cooperation Agency 3.5 percent surcharge and contract administration services 1.2 percent surcharge, were established based upon rates current at the time of the letter of offer and acceptance. According to officials, the contractor’s profit was established at the time of award of the contract in 2007. Officials stated that the costs that could be negotiated were limited and included costs associated with travel, lodging, and adding more advisors to augment the training. According to contracting officials, these limitations were not unique to this ASFF training but applied broadly to all ASFF training task orders they executed under WFF. In 2018 DOD decided to replace WFF, which was nearing expiration, with a series of new contracts. DOD has begun to transition work previously performed under WFF to these new contracts, the first of which was awarded in 2018. According to contracting officials, ASFF-funded training efforts are expected to be executed primarily under two of the new contracts – the Enterprise Training Services Contract and the Training, Instructor Operator Support Services Contract. The Enterprise Training Services Contract is a multiple award indefinite delivery, indefinite quantity contract with a total contract ceiling of $2.4 billion that was awarded to multiple contractors in June 2018. According to officials, the Training, Instructor Operator Support Services Contract is a single award indefinite delivery, indefinite quantity contract with a ceiling of $197.6 million that was awarded in July 2018. According to Army contracting officials, the contracting process for ASFF training services will include competition among multiple contractors for each task order under the Enterprise Training Services Contract. Army contracting officials stated that under a multiple-award contract, each contract holder is to be provided a fair opportunity to compete for each task order, in part to use competition to ensure that the proposed prices are fair and reasonable. According to Army contracting officials, the Enterprise Training Services Contract also affords the opportunity to negotiate more elements than previously under the WFF contract, such as labor rates or travel costs associated with training. The first training task order under the Enterprise Training Services Contract in support of Afghan forces was issued in April 2019. As this task order has only recently been issued, it is too early for us to comment on the efficacy of these contracts. DOD has varying degrees of visibility over ASFF-funded training contracts. At the broadest level, OUSD-Comptroller and contracting officials stated that they have visibility of the overall execution of the ASFF budget, including funding associated with Afghan National Army training. For example, OUSD-Comptroller tracks and reports ASFF obligations and disbursements in monthly status-of-funds reports, known as Defense Financial and Accounting Services 1002 Reports. In addition, the Special Inspector General for Afghanistan Reconstruction tracks and reports ASFF obligations and disbursements via its Overseas Contingency Operations quarterly reports to Congress. At the individual contract level, the military services’ contracting commands, such as PEO-STRI and Army Contracting Command, develop and maintain contract files for individual ASFF-funded contracts and task orders. However, according to officials, DOD does not have a centralized system or reporting mechanism for tracking all ASFF training contracts, because the systems used by the services for managing funding and those used for contract management do not interface with each other. According to OUSD-Comptroller officials, the systems used for financial management were not designed or intended to identify ASFF funds specifically obligated for training contracts because there is no requirement for them to do so. Officials said that consequently, in the single instance in which they have had to develop a comprehensive list of all ASFF-funded training contracts, they had to work with the contracting commands at the respective military services to gather this information. For example, to respond to congressional direction related to contracts funded with ASFF, OUSD-Policy contacted all of the military services to request a list of all training contracts funded through the ASFF under the respective services’ responsibilities, according to OUSD officials. In turn, Army contracting officials stated that they identified the requested information by using the lines of accounting fields in their contract management systems to identify those training contracts funded with ASFF. OUSD-Policy officials provided us with the resulting list of 40 contracts and task orders, totaling over $483 million in estimated contract value, but they acknowledged that the list was likely incomplete. OUSD-Policy officials who compiled the list of training contracts told us that the precision of the list was affected by inconsistent interpretations among the services of what constitutes a training contract. According to these officials, training for the Afghan National Army can also occur under procurement or maintenance contracts that have embedded training components. For example, according to officials, the Army’s National Maintenance Strategy contract provides logistic support to the Afghan National Army and includes a training component. Similarly, the Navy’s ASFF-funded ScanEagle unmanned aerial vehicle reconnaissance procurement contract includes a training component. Because these contracts are not primarily training-oriented, according to contracting officials, they were not identified under the training and operations subactivity group in the ASFF budget, and therefore would not be easily identifiable as ASFF training contracts. Despite these limitations, DOD officials stated that, given their existing systems and processes and their ability to reach out to contracting officials to obtain additional data when needed, they believe they have sufficient tools to identify most ASFF- funded training contracts. Additionally, DOD officials stated that the congressional direction associated with ASFF-funded training was a one- time request, not a recurring task. We provided a draft of this report to DOD, and DOD responded that it would not be providing formal comments. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and to the Secretary of Defense. In addition, the report is available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Cary Russell at (202) 512-5431 or russellc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in the appendix. In addition to the contact named above, James A. Reynolds, Assistant Director, and Jerome Brown, William Chatlos, Alfonso Garcia, Steve Pruitt, Michael Shaughnessy, McKenna Stahl, and Cheryl Weissman made key contributions to this report.", "summary": "The United States has made a commitment to building Afghanistan's security and governance structure in order to counter terrorist threats and create sustainable security and stability in Afghanistan. Since 2005 Congress has appropriated more than $78.8 billion for the ASFF to build, equip, train, and sustain the Afghan National Defense and Security Forces. Over that period, nearly $4.3 billion has been expended to support the training and operations of the Afghan National Army. Training requirements are primarily fulfilled through contracts. In recent years, concerns have been raised in Congress about the high costs of some of these training contracts. The Joint Explanatory Statement accompanying the Consolidated Appropriations Act, 2018, included a provision for GAO to examine the ASFF training contracts. This report describes DOD's processes to (1) identify Afghan National Army training needs and associated funding requirements; (2) develop and execute ASFF training contracts; and (3) provide visibility over ASFF training contracts. GAO reviewed DOD guidance for identifying and executing training needs, and interviewed DOD officials. GAO also reviewed documentation associated with task orders issued against an indefinite delivery, indefinite quantity contract for training completed in fiscal years 2017 through 2019 for the Afghan National Army. Combined Security Transition Command-Afghanistan (CSTC-A) has established processes to identify capability gaps within the Afghan National Defense and Security Forces (ANDSF), develop and select training needed to address those gaps, and identify associated funding requirements. CSTC-A generally includes these requirements in the Afghanistan Security Forces Fund (ASFF) budget justification book. Many of the key decisions and associated cost assumptions on how CSTC-A and Train Advise Assist Command–Air (in the case of Afghan pilot training) intend to carry out ASFF training efforts are proposed 18-24 months before the training will occur (see figure). ASFF-funded training contracts are developed and executed under a process modeled on the U.S. government's foreign military sales program. Prior to April 2019, most ASFF-funded training requirements were filled under a single-award indefinite delivery, indefinite quantity (IDIQ) contract that supported a wide range of DOD training needs. An IDIQ contract provides for an indefinite quantity, within stated limits, of supplies or services during a fixed period. The government places orders for individual requirements. According to an Army official, that contract's broad scope and high contract value ceiling made it a highly expedient way to contract for various types of training for the ANDSF. However, contracting officals stated that using a single-award contract limited DOD's ability to negotiate some costs. At that point, DOD began to transition to an approach using several contracts, including one with multiple providers. Given that DOD executed its first task order under these new contracts in April 2019, it is too early for GAO to comment on the efficacy of this new approach. DOD has varying degrees of visibility over ASFF-funded contracts. DOD officials stated that they have visibiliity at the broadest level of the overall execution of the ASFF budget, including funding associated with Afghan National Army training. At the individual contract level, the military services' contracting commands maintain contract files, but the services' systems do not interface with one another. According to DOD officials, although DOD can obtain visibility over ASFF training contracts in the aggregate, the department must work with the contracting commands at the respective military services to gather information specific to training contracts.", "document_type": "gao"}
{"report": "As SBA’s largest matching grant program, the SBDC Program provides funding to SBDCs to deliver business advising and technical assistance to prospective and existing small businesses. SBDC lead centers manage the program, including submitting annual funding applications. Approximately two-thirds of SBDCs are funded on a calendar-year basis and the rest on a fiscal-year basis. Universities, community colleges, or state governments host SBDC lead centers. SBA provides grants covering 50 percent or less of SBDC program costs. As a condition of the grant, SBDCs are required to provide 100 percent matching funds from nonfederal sources (one nonfederal dollar for each federal dollar provided by SBA), which are used to cover remaining program costs. At least 50 percent of the match must be in cash and the remaining amount can include combinations of additional cash, in-kind contributions, or waived indirect costs. Organizations that provide matching contributions include state legislatures, private-sector foundations, state and local chambers of commerce, economic development entities, and colleges or universities. SBA considers expenditures of nonfederal funds that an SBDC spends on the program in excess of the statutorily required match as “overmatch.” SBA generally reimburses SBDCs for allowable program costs, up to the amount of the federal award and provided such costs adhere to the budget approved by SBA. As with other federal programs, the President submits a budget request to Congress for the SBDC Program in or around February of each year, and Congress thereafter engages in its appropriations process. In or around July of each year, SBA publishes a funding opportunity announcement for the SBDC Program. This announcement includes a funding estimate (because the final appropriation is not known at this time) for awards to be made by SBA during the upcoming fiscal year, which begins on October 1. Each SBDC submits an initial application for funding based on its proportional share of the funding estimate. The application must include detailed budgets setting forth program costs, broken out separately for the SBDC and each of the service centers it oversees. If the appropriation were to match the initial funding estimate, SBDCs would be required to adhere to the budgets they initially submitted or request approval for a modification from SBA. If a continuing resolution is in place, SBA awards partial funding to the SBDCs based on amounts available under the continuing resolution and apportioned by OMB. According to SBA officials, SBDCs are required to submit revised budgets after a continuing resolution. After appropriations are enacted for the full year, the funding amounts for the SBDC Program are revised and SBDCs submit a final, revised budget. SBDCs are informed of funding decisions through a notice of award that includes the budget approved by SBA and the other terms and conditions under which the award is made. We previously reported on the effects of budget uncertainties and disruptions. In a February 2018 testimony, we noted that Congress annually faces difficult decisions on what to fund among competing priorities and interests, and often postpones final funding decisions to allow additional time for deliberations. Under a continuing resolution, agencies can continue to operate, but the funding expires on a certain date and therefore creates uncertainty about both the timing of final appropriations and the level of funding ultimately available. And when a lapse in appropriations—or funding gap—is possible, the affected agencies must prepare for an orderly shutdown of operations, even if a shutdown is ultimately averted. In the same testimony, we reported that continuing resolutions and lapses in appropriations leading to government shutdowns created inefficiencies and other management challenges for agencies, such as delayed hiring and additional work. The following are select statutes, guidance, and regulations that govern agency budgeting and obligation and expenditure of federal funds, including for the SBDC Program: Antideficiency Act. This act prohibits agencies from obligating or expending funds in excess or in advance of an available appropriation unless otherwise authorized by law and, with some exceptions, from accepting voluntary services for the United States. Impoundment Control Act. An impoundment is any action or inaction by an officer or employee of the federal government that precludes obligation or expenditure of budget authority. When Congress appropriates funds to the executive branch, the President, unless otherwise authorized to withhold such amounts, must prudently obligate them. The Impoundment Control Act is rooted in this principle, and grants the President strictly circumscribed authority to temporarily withhold funds from obligation by transmitting a special message pursuant to procedures established by the act. Transmission of a special message is the only mechanism through which an agency may withhold budget authority from obligation. OMB guidance. Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards, 2 CFR Part 200 (Uniform Guidance), is meant to provide a government-wide framework for grants management and to reduce administrative burden for nonfederal entities receiving federal awards while reducing the risk of waste, fraud, and abuse. To comply with the Uniform Guidance, federal agencies are responsible for developing requirements for grant applicants and recipients of their program awards, with consultation with OMB’s Office of Information and Regulatory Affairs. Under the Uniform Guidance, federal agencies must provide the projected total amount of funds available for programs providing federal financial assistance, and this amount is then made publically available. Estimates based on the previous year’s funding are acceptable if current appropriations are not yet available. In addition, federal agencies must publically announce specific funding opportunities. These announcements must include sufficient information to help an applicant make an informed decision about whether to apply, such as the total amount of funding the agency expects to award through the announcement. SBA has adopted the Uniform Guidance, thereby giving regulatory effect to the guidance with respect to SBA awards. Preparation, Submission, and Execution of the Budget, OMB Circular No. A-11, contains instructions and schedules for agency submission of budget requests and justification materials to OMB. It provides agencies with an overview of applicable budgetary laws, policies for the preparation and submission of agency budgets, and information on financial management and budget data systems. Statutory funding formula for SBDCs. The amount of an SBDC formula grant received by a state is determined by a statutory formula. The formula divides the annual amount made available for the entire SBDC Program—for the fiscal year the grant begins—on a pro rata basis, based on the population of each state and subject to minimum funding levels specified in statute. The maximum grant amount for each recipient (SBDC) is the greater of the minimum statutory amount, or their pro rata share of all SBDC grants as determined by the statutory formula. In fiscal year 2016, SBA changed the methodology it used for the estimate in the SBDC funding opportunity announcement. Before fiscal year 2016, SBA officials stated that the agency used the prior year’s appropriated amount for the program as the funding estimate in the funding opportunity announcement. However, we found that this was not always the case. The funding estimates in fiscal years 2012 through 2014 ranged from $2 million to $10 million lower than the prior year’s appropriation (see fig. 1). The officials were unable to provide information on the justification for the different pre-2016 practices, stating that no officials involved in such determinations during those years remained at the agency. Since fiscal year 2016, SBA has instructed SBDC grantees to submit their funding applications for the upcoming year based on the President’s budget request. In fiscal year 2016, the prior year’s appropriation and the President’s budget request were the same—$115 million—and the final appropriated amount was $117 million. In fiscal year 2017, the President’s budget request of $115 million was slightly lower than the prior year’s appropriation of $117 million, and the final appropriated amount increased to $125 million. Beginning in fiscal year 2018, the funding estimate and the prior year’s appropriation began to diverge significantly (funding estimates decreased, appropriations increased). In that year, SBDCs were required to submit funding applications based on a funding estimate of $110 million, which was 12 percent lower than the prior-year appropriation of $125 million. The final appropriated amount increased to $130 million. In fiscal year 2019, the funding estimate was $110 million, 15 percent lower than the prior-year’s appropriation of $130 million. The final appropriated amount increased to $131 million. By fiscal year 2020, SBDCs were required to submit funding applications based on the President’s budget request of $101 million, which was 23 percent lower than the prior year’s appropriation. The final appropriated amount increased to $135 million. If SBA continues this practice for fiscal year 2021, SBDCs will be required to submit funding applications at a level that is 35 percent lower than the 2020 appropriation, in order to match the President’s budget request of $87.9 million (13 percent lower than the President’s budget request for fiscal year 2020). SBA cited two reasons for changing the way it estimates funding in the annual funding opportunity announcement: to conform to federal financial management practices and to address concerns about violating the Antideficiency Act. SBA officials cited federal financial management practices as one reason for changing the funding estimate methodology. The officials stated that it was a management decision to use the only known amount, the number in the President’s budget, for the funding opportunity announcement. They noted that the difference between the Senate and House markups for fiscal year 2020 exceeded $20 million. SBA officials also told us that they rely on the lowest estimate available to be prudent with taxpayer dollars. According to a December 2019 letter from SBA to the Senate and House Small Business Committees, the change to the funding estimate methodology was adopted when the SBDC Program office identified areas requiring process improvements and stronger internal controls to help the program operate and plan more effectively and efficiently and in consistency with federal financial management standards. SBA’s letter also stated that it is standard federal financial management practice to plan to the lowest budget estimate in the absence of a full-year appropriation, and SBA therefore provided the President’s budget to SBDCs for planning purposes. Although SBA characterized its use of the President’s budget as a standard practice within the federal government, SBA officials did not point to a specific regulation or guidance to support this view, either in the letter or in our interviews. OMB’s Uniform Guidance does not advise federal agencies to use the lowest estimate (that is, the lowest among the House mark, Senate mark, President’s budget request, and the prior year’s appropriation) when reporting funding available under federal financial assistance programs. Rather, the guidance states that estimates based on the previous year’s funding are acceptable if the current appropriations are not yet available, as was the case when recent SBDC funding opportunity announcements were issued. Although OMB’s Uniform Guidance does not identify any other accepted practice in this regard, it does not expressly prohibit other practices. OMB staff told us that, in the absence of a full-year appropriation, it is permissible for agencies to use the lowest estimate as the funding estimate in a funding opportunity announcement. The staff said that from their perspective, SBA’s use of the figure in the President’s budget is consistent with OMB Circular A-11 and the Uniform Guidance. However, they also acknowledged that there is no requirement to use the lowest estimate in a funding opportunity announcement. They also said that practices vary across agencies. During our limited review of other SBA and federal award programs, we did not find other programs that had funding application practices similar to those for SBDCs. However, those programs may not be entirely comparable to the SBDC Program, which publishes its funding opportunity announcement before the annual appropriation is known, requires applicants to initially apply based on a funding estimate, and is subject to a statutory formula that calculates individual grant amounts based on the final appropriation. The following are examples of ways in which the programs we reviewed differed from the SBDC Program: According to SBA officials, the funding for its Women’s Business Centers is awarded at the end of the fiscal year, and thus the final appropriation is known during the application process. In a fiscal year 2018 funding opportunity announcement for SBA’s Veterans Business Outreach Center Program, the total amount of available funding was known at the time applicants submitted their proposals. Like the Veterans Business Outreach Center Program, a fiscal year 2018 funding opportunity announcement for SBA’s Federal and State Technology Partnership Program listed the amount of funding available. Applicants for the Defense Logistics Agency’s Procurement Technical Assistance Program (PTAP) can apply for specific amounts of funding based on their service areas. For example, in a fiscal year 2020 funding announcement for PTAP, applicants providing statewide coverage could apply for up to $1 million in funding and those providing less than statewide coverage could apply for up to $600,000. In addition, the funding announcement did not include a funding estimate for the program as a whole. SBDC Program officials also cited adherence to the Antideficiency Act as a reason for the change. SBA stated in its letter to the Senate and House Small Business Committees that its practice of providing SBDCs with the President’s annual budget request as the dollar amount for planning purposes ensures that SBA abides by the terms of the Antideficiency Act. In doing so, they noted the Antideficiency Act prohibits obligating or expending funds in excess of amounts available through appropriations. In interviews, SBA officials said that if they consistently took a conservative approach, they would be less likely to violate the Antideficiency Act when appropriations were enacted. However, OMB staff told us that SBA’s use of other estimates in a funding opportunity announcement would not violate the Antideficiency Act. SBA’s funding opportunity announcements make clear that funding awards will be based on the appropriated level of funding, not the estimate provided in the funding opportunity announcement. OMB staff told us that because SBA’s funding opportunity announcement does not obligate the federal government, it does not present the potential for a violation of the Antideficiency Act. They further stated that using a higher amount, such as the prior year’s appropriation, also would not violate the Antideficiency Act. Consistent with that position, SBA’s Office of General Counsel agreed that the Antideficiency Act does not apply to the SBDC funding opportunity announcement because it does not create an obligation on behalf of SBA. Counsel also stated that SBA’s decision to use the President’s budget as the funding estimate was a management decision and was not required by the Office of the General Counsel. Most SBDCs that responded to our survey told us that using the lowest budget estimate—the President’s budget request—as the funding estimate for fiscal year 2020 had created budgeting, operational, and performance burdens and challenges. The burdens and challenges largely stemmed from the large gap between the initial funding estimates and final appropriations. According to SBA officials, using the amount in the President’s budget as the funding estimate should not negatively affect SBDCs that are on a calendar-year budget cycle (approximately two-thirds of SBDCs) because they have approved funding through December 31 of each year. They stated that by January 1 of each year, there is either a budget or continuing resolution in place that eliminates uncertainty for these SBDCs. They also stated that SBDCs on a calendar-year cycle are not required to submit their initial applications based on the estimated funding amount in the funding opportunity announcement (that is, the amount in the President’s budget), and can instead use a higher amount under a continuing resolution or other approved budget. However, SBA did not provide any documentation authorizing SBDCs on a calendar-year budget cycle to submit initial applications using a higher estimated funding amount. Rather, the fiscal year 2020 Funding Opportunity Announcement states that the funding estimate will be based on the President’s budget, and the announcement applies to both fiscal-year and calendar-year SBDCs. Lastly, SBA’s view that calendar-year SBDCs should not be negatively affected by SBA’s use of the lowest budget estimate is not consistent with SBDC responses to our survey. Both fiscal-year and calendar-year SBDCs reported in their survey responses that using SBA’s funding estimate had hindered different aspects of their operations. In the following discussion of these and other survey results, we note the limited instances in which calendar-year SBDCs reported a different experience than fiscal-year SBDCs. The vast majority of SBDCs responding to our survey said the large gap between the initial funding estimates and final appropriations imposed an additional administrative burden for SBDCs as they developed their budgets. Fifty-one out of 58 SBDCs (88 percent) responding to our survey question estimated that staff time to prepare the initial and final 2020 funding applications was somewhat or greatly increased compared to previous years (when the estimated funding amount was approximately the same as the current year’s award). Many SBDCs noted that using SBA’s funding estimate for fiscal year 2020 had created an additional administrative burden in their responses to open-ended questions on our survey. For example, one SBDC said that requiring two budget justifications (an initial funding application and a revised application) added time, complexity, duplication of effort, and considerable paperwork to the budgeting process. Another SBDC said the process of submitting multiple budgets took extra time and increased the likelihood of human error. Survey comments help explain why the use of the lowest budget estimate made budgeting more burdensome. For example, one SBDC explained that the lower amount required more time for negotiations to assure their matching partners that the actual number would likely be higher. Another SBDC noted the lower funding estimate required more proposed budget cuts in the initial application. Most SBDCs said using the funding estimate in the 2020 Funding Opportunity Announcement (which was $30 million below the 2019 appropriation and $34 million below the 2020 appropriation) required them to propose cuts in their initial budgets. Forty of the 57 SBDCs (70 percent) that responded to the survey question said their initial budget proposals eliminated some salaries, fringe benefits, and travel; 34 of 57 (60 percent) reduced supplies; and 33 of 57 (58 percent) reduced their contractual obligations. See table 1 for a full breakdown. Our survey asked SBDCs to provide a brief description of how they made adjustments to account for the decrease in the estimated funding amount in 2020: Some SBDCs stated that they had zeroed out the lead center or one or more service centers. A few SBDCs said they eliminated all part-time staff. Some also told us they decreased travel and professional development. Some SBDCs moved contractual line items (such as rent and software licenses) off the budget or reduced use of service providers (such as business consultants and independent contractors). Other survey respondents provided insight on why they made certain proposed cuts. To limit the burden on its service centers, one SBDC budgeted zero federal funds for the lead center and budgeted its service centers at the prior year’s amount so that its service centers would only need to budget once. Another SBDC stated that it chose the largest single line item that could be quickly reduced to meet the funding estimate. It noted that this allowed it to quickly scale down the budget and would allow it to quickly scale the budget back up to “reality.” Some of the survey respondents and SBDCs we interviewed indicated that they did not expect to have to make the cuts they proposed in their initial budgets because they were confident that Congress would appropriate the same or more funding as the prior fiscal year. One SBDC surveyed said that it took all budget deductions from the lead office personnel, but that it would not do so in a final budget if the lower amount in the President’s budget was to be appropriated. Three SBDCs we interviewed said that to account for the decrease, they proposed cuts in their initial budget they did not think they would have to make, such as eliminating an entire service center or a core information technology system. One SBDC we interviewed described the process as putting together two budgets simultaneously: one budget using the President’s budget request and one budget that was based on a funding amount that it believed was more consistent with historical norms. Still other survey respondents reported that they actually reduced their expenditures after receiving the funding estimate, although the amounts ultimately appropriated for SBDCs in fiscal years 2019 and 2020 were higher than for prior years. In response to the same open-ended question asking for a brief description of how they made adjustments to account for the decrease in the estimated funding amount in 2020, SBDCs provided the following examples: One SBDC said that to maintain all of its full-time personnel within the constraints of the initial application, some of its service centers had to stop providing training classes or attending conferences. Another SBDC told us a key staff person was given a layoff notice. Another said that due to the budget uncertainty, the SBDC eliminated all travel, cancelled almost all of its business development software subscriptions, and delayed replacing old computer equipment. Thirty-eight of the 60 SBDCs that responded to our survey (63 percent) said that using the initial funding amount as the basis for their initial applications somewhat or greatly hindered their ability to obtain matching funds. As discussed previously, SBDCs are required to match SBA funding at a 1:1 ratio. Host institutions (often supplemented by local governments, higher education institutions, and private-sector groups) provide matching funding. In response to open-ended survey questions, SBDCs noted the following: Difficulty obtaining full matching funding. Some survey respondents said that submitting a funding application based on the initial estimate put the SBDC’s ability to secure 100 percent of matching funding at risk. For example, one SBDC stated that the initial funding amount was the basis for its host institution’s budget for the match and that once the host’s budget was approved, it was difficult to amend it to increase the match (to meet the 1:1 requirement). Another SBDC said that host institutions only contribute a match equal to the federal allocation and that if the final allocation amount is not known, the host may choose to invest in other initiatives. Negative effect on relationships. Most survey respondents expressed concern that the change to the funding estimate would create confusion or uncertainty with their hosts or service centers (partners). For example, one SBDC told us that its host institutions do not react well to ambiguity in planning. This SBDC described the change in amounts between the initial estimate and the final appropriation as an unwelcome surprise to its partners, which needed to match the difference. Another SBDC noted that the decrease in the initial funding amount in 2020 was so great that several funding partners indicated they would partner with other organizations that were better funded and supported. Many survey respondents stated they were able to mitigate the impacts of the lower funding estimate by using matching funds, either because their host provided the same amount it had provided the previous year or overmatched (provided funds in excess of the statutorily required match). For example, one SBDC told us it was fortunate to have strong support from its host to be able to temporarily fund program operations at full capacity, until the revised funding amount from SBA was released. Three survey respondents who reported that using the initial funding amount neither helped nor hindered their efforts to obtain matching funds either stated they did not share the estimated amount with their hosts or local partners or that the amount they shared was equal to their portion of the appropriated amount. Forty-two of 60 SBDCs that responded (70 percent) said using the initial funding amount as the basis for their initial applications somewhat or greatly hindered their ability to spend grant funds. In response to an open-ended survey question asking for examples of how using the initial funding amount had affected their ability to spend grant funds, SBDCs noted the following: Having to spend conservatively early in the year. Some SBDCs told us that the funding process requires them to spend conservatively at the beginning of the budget cycle, only to ultimately receive more than the prior year’s amount. As shown in figure 2, SBDCs did not receive the notice of award for their full fiscal year 2019 appropriation until April 2019. One SBDC noted the extreme pressure in the first half of the year to operate on a lean budget and then having to switch to increased activity in the second half of the year once the final, higher amount was awarded. Another SBDC required its service centers to propose special projects but did not fund them at the beginning of the year because it did not know what the funding level would be. Having to carry over funding to the next year. Some SBDCs said it has become common for them to have unexpended funding left at the end of the fiscal or calendar year. In these instances, they carry over their funding to the next year. For example, one SBDC said that the late-in-year increases in funding prevented certain activities from being completed within appropriate project dates and led them to carry over funds. While the ability to carry over funding for one additional fiscal year was considered helpful, some expressed concern that this was not the best use of federal dollars over the course of the year. For example, one SBDC said it was forced to carry over unspent funds partly as a result of difficulties in forecasting monthly spend rates and adjusting the rates midyear. A few survey respondents noted that operating under a continuing resolution at the beginning of the year made spending grant funds more difficult. For example, one SBDC stated that multiple continuing resolutions in one year meant that by the time its host rebudgeted, it had less than 3 months to spend the increase. Another noted that because the initial funding amount varied so greatly from the final amount, the shortened time frame for deploying funds can make it difficult to maximize use of grant funds. Two SBDCs that operate on a calendar-year budget cycle told us that they had not experienced the same challenges as SBDCs that operate on a fiscal-year budget cycle because there is either a continuing resolution or final award by January. A smaller proportion of calendar-year SBDCs responded that using the initial funding amount somewhat or greatly hindered their ability to spend grant funds compared to fiscal-year SBDCs. However, the majority of calendar-year SBDCs still responded that using the amount somewhat or greatly hindered their ability to spend grant funds. Forty-four of 60 SBDCs that responded to our survey (73 percent) said using the initial funding amount as the basis for their initial applications somewhat or greatly hindered their ability to hire personnel. As mentioned previously (see table 1), 40 of the 57 SBDCs (70 percent) that responded to the survey question about reducing budget items in their initial funding application reduced salaries in their initial funding application. In response to various open-ended questions in our survey, SBDCs noted the following: Hiring delays or freezes. Many SBDCs reported delays in hiring or hiring freezes. For example, one SBDC told us it had to leave vacant counseling positions unfilled, although it knew the funding for those positions almost certainly would materialize. Another SBDC noted that using SBA’s current funding estimate created a minimum of a 6-month delay in hiring a new adviser at a local center. Another SBDC said its host institution would not allow any staff to be hired in the period from SBA issuance of the funding estimate through the congressional appropriation. Thus, when consultants and staff retire or leave the program, there is a staffing gap, which results in less service to clients. Reliance on short-term or contractor positions. Some SBDCs told us that using the funding estimate already had forced them to rely on or might force them to rely on part-time staff, short-term contracts, or contractors to provide services. For example, one SBDC stated the initial funding estimate restricted its ability to hire full-time personnel and instead required it to hire part-time individuals. This SBDC also noted it had a difficult time finding qualified individuals, since it could not guarantee funding for the new position in 6 months. Another SBDC said it was forced to put all personnel on short-term contracts. Another SBDC opted to use contractors for specialized projects and subject matter experts, rather than making a long-term investment in a core business advisor, because those hires were more flexible in the face of budget uncertainty. In addition to difficulty in hiring personnel, 35 of 60 SBDCs that responded to our survey (58 percent) said that using the initial funding amount as the basis for their initial applications had somewhat or greatly hindered their ability to retain personnel. In response to various open- ended questions in our survey, SBDCs cited morale and retention issues: Staff morale. Some SBDCs said that using the lower funding estimate had affected staff morale. Some respondents attributed this decline in morale to the lack of job security and funding certainty. Two others told us they withheld personnel management information from their staff and other centers to minimize the impact on morale. Staff retention. Some SBDCs noted that staff members left the SBDC to seek employment elsewhere in response to the uncertainty created by the lower initial funding amount. For example, one SBDC said that for 6 months its staff heard about the uncertainty and lack of a stable budget, which led to staff members leaving for other jobs. In addition, a few SBDCs noted that they were unable to offer a competitive salary. For example, one SBDC said that the initial funding estimate dictates matching funding, which constricts its ability to raise salaries to a competitive level. Survey respondents provided examples of how using the lower estimate in the President’s budget as the basis for the SBDC funding estimate negatively affected their ability to plan for new operations and expand services. Some SBDCs said they were not able to plan and promote a program until far into the fiscal year when the final notice of award was released. For example, one SBDC said it was very difficult to plan for expansion because the initial funding amount was barely enough to sustain operations. Two SBDCs said they had delayed opening one or more centers. For example, one SBDC said it would not be able to expand to additional rural areas and instead only would be able to maintain existing operations. The SBDC noted that it would have been able to expand with the amount of funding it eventually received, if that funding had been received at the start of the budget cycle and made available in a predictable manner. Two SBDCs stated that the funding ambiguity affects their host institutions’ ability to plan their own budgets, which directly affects the amount of matching funding they are able to provide. Thirty-one of 59 SBDCs that responded to the survey question (53 percent) said that using the initial funding amount as the basis for their initial applications somewhat or greatly hindered their ability to meet performance goals. SBDCs have four performance goals against which they agree to be evaluated when applying for SBA funding—number of jobs supported, number of new business starts, number of clients served, and amount of capital infusion. In response to an open-ended question that asked for examples of how using the initial funding amount had affected their ability to meet performance goals, many SBDCs pointed to the staffing difficulties discussed earlier as a reason for the increased difficulty in meeting performance goals. Some SBDCs surveyed also mentioned that performance goals did not decrease when the initial funding estimate was lower than the prior year’s funding amount. One SBDC noted that its goals are based on the assumption that the full funding amount will be available over 12 months, rather than from 4 to 5 months after the start of the year. Thirty-five of 59 SBDCs that responded to the survey question (59 percent) said using the initial funding amount as the basis for their initial applications somewhat or greatly hindered their ability to provide services. As noted previously, the purpose of the SBDC Program is to deliver business advising and technical assistance to prospective and existing small businesses. In response to an open-ended question that asked for examples of how using the estimated funding amount affected their ability to provide services, a few SBDCs mentioned the budget process took time away from providing services. For example, one SBDC said that its time and energy was split between the core mission and addressing budget uncertainty. Similarly, another SBDC stated that the extensive funding application work took time away from providing direct services to clients. Two SBDCs also pointed to gaps in service created by the uncertain funding situation. For example, one SBDC noted gaps in service delivery in terms of geographic coverage and of expanding technology training for clients because of the inconsistent budget environment. In prior work, we described legislative authorities and agency actions that may mitigate challenges associated with budget uncertainties. For example, in a 2018 testimony, we noted that Congress may include specific provisions in continuing resolutions (called legislative anomalies) that provide some agencies or programs with funding or direction different from those specified in the standard provisions that require agencies to spend more conservatively. For example, programs that previously received a specific or additional amount of funding under a continuing resolution have included wildfire management, veterans healthcare and benefits, and disaster relief. In addition, agencies can take actions to mitigate challenges associated with continuing resolutions and shutdowns. For example, agencies may have the ability to shift grant cycles to later in the fiscal year when they are less likely to be under a continuing resolution. Shifting these cycles can help minimize disruption of services. In response to an open-ended survey question on how SBA could help mitigate any of the challenges posed by the funding application procedure, SBDCs offered a number of suggestions. Many recommended that SBA allow SBDCs to submit funding applications at the prior year’s appropriated amount, as generally had been the practice historically. As noted previously, OMB’s Uniform Guidance offers SBA the flexibility to use other estimates, such as the prior year’s appropriation. A few also suggested a more streamlined process that does not involve multiple funding applications (and budgets), but a process in which SBDCs submit budgets only once. A few recommended 5-year funding for the program. SBDCs face administrative burdens and operational challenges stemming from SBA’s current practice of using the lowest budget estimate—the amount in the President’s budget—as the funding estimate for SBDC funding applications. More specifically, because of the large gap in recent years between the President’s budget and appropriated amounts for the program, SBDCs told us they now spend more time on budgeting, have a harder time obtaining matching funds, and have difficulty hiring and retaining staff. This in turn affected their ability to meet their performance goals and program objectives of serving small businesses. The use of continuing resolutions in recent years also has put strains on SBDCs’ ability to effectively plan, budget, and operate throughout a year. And if the funding estimates continue to decrease (as is already the case for fiscal year 2021) and diverge from appropriations in such an environment, SBDCs will face increased challenges in the areas cited above. SBA could take actions to alleviate some of the burden on SBDCs, in particular by reevaluating its funding application requirements for the SBDC Program. For example, the agency could reconsider the amount it uses as the basis for the funding estimate. While SBA previously cited a desire to improve operational efficiencies as a reason for changing the funding estimate methodology, most SBDCs told us their operational efficiencies have decreased. SBA also cited a need to align with federal financial management standards, but OMB’s Uniform Guidance permits the use of other estimates, such as the prior year’s appropriation. Lastly, SBA cited concerns over violating the Antideficiency Act, but OMB staff and SBA’s Office of General Counsel confirmed that the Antideficiency Act does not present a barrier to using other estimates. SBA might also reconsider other aspects of the funding application process that cause burden, such as the timelines for submitting applications and the number of times SBDCs must submit detailed budgets. We are making the following recommendation to SBA: The Associate Administrator of the Office of Entrepreneurial Development should reevaluate the SBDC funding application requirements, including reexamining the funding estimate SBDCs are required to use and considering other changes that could reduce administrative burdens on SBDCs. (Recommendation 1) We provided a draft of this product to SBA and OMB for their review and comment. OMB did not provide comments. SBA provided written comments that are reprinted in appendix III. In its written comments, which are summarized below, SBA partially agreed with our recommendation and recognized room for improvement in how it sets the funding estimates for the SBDC Program. SBA did not explicitly state with which part of our recommendation it disagreed; rather, SBA reiterated its view that the agency’s practice of planning to the more conservative President’s annual budget request affects only fiscal-year SBDCs. In addition, SBA listed two changes it was considering to improve the funding application process. SBA first stated that it is exploring moving the program start date for fiscal-year SBDCs to January 1, which would make all SBDCs operate on a calendar-year basis. SBA also indicated that it is considering publishing the fiscal year 2021 Funding Opportunity Announcement later in the fall (for example, on the first day of October), by which time the agency would be operating on a continuing resolution or final appropriation and would no longer be working with funding estimates. These steps are promising, but we would need to evaluate their implementation to determine whether they fully address our recommendation. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Administrator of SBA, the Acting Director of OMB, and other interested parties. In addition, the report will be available at no charge on the GAO website at https://gao.gov. If you or your staff members have any questions about this report, please contact William B. Shear at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs maybe found on the last page of this report. Major contributors to this report are listed in appendix IV. This report discusses the (1) Small Business Administration’s (SBA) rationale for changing the way it estimates funding in the annual funding opportunity announcement for the Small Business Development Center (SBDC) Program and (2) views of SBDC grantees on the effect of that change on their budgeting and operations. To determine SBA’s rationale for changing the way it estimates funding in the annual SBDC funding opportunity announcement, we reviewed SBDC funding opportunity announcements for fiscal years 2012 through 2020 and program guidance that governs the SBDC funding application procedure. We compared the funding estimates in the funding opportunity announcements, appropriations, and Presidents’ budget requests from fiscal years 2012 through 2020. We also interviewed SBA officials in the SBDC program office and Office of General Counsel to obtain the agency’s rationale for changing the way it estimates the funding amount in its SBDC funding opportunity announcements. In addition, we examined select laws (such as the Antideficiency Act) and regulations (such as the Office of Management and Budget’s (OMB) Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards). We interviewed OMB staff and officials in SBA’s Office of General Counsel to obtain their views on the relevance of the Antideficiency Act and the extent to which SBA’s funding proposal procedure is consistent with that law. We also reviewed documentation on other selected programs to compare the funding application processes used: the Women’s Business Center, Veterans Business Outreach Center, Federal and State Technology Partnership, and Procurement Technical Assistance Programs. We selected these programs because they were other SBA grant programs or because SBDCs we interviewed mentioned them as federal grant programs that used different budget practices. (We discuss below how we selected the SBDCs to interview.) To gather the views of SBDC grantees on the effect of the funding estimate change on their planning and operations, we interviewed representatives of a nongeneralizable sample of eight SBDC lead centers, selected to achieve diversity in funding amount, budget cycle, and host institution. Their views are not generalizable to other SBDCs but offered important perspectives. We also reviewed funding application documentation from these eight lead centers to determine their funding timelines. We then focused on the fiscal year 2019 timeline for SBDCs that use a calendar-year budget cycle and SBDCs that use a fiscal-year budget cycle to identify any differences in their timelines. We selected fiscal year 2019 because it was the most current complete funding cycle at the time we conducted our work. In addition, we conducted a web-based survey of all 62 SBDC lead centers to obtain their perspectives on the effect on their operations of the change in how SBA estimates SBDC funding. In total, we obtained 60 responses (a 97 percent response rate). We conducted four pretests of our draft questionnaire by telephone with officials at four SBDC lead centers with varying characteristics, such as amount of funding, budget cycle, and host institution. We used these pretests to help refine our questions, develop new questions, clarify any ambiguous portions of the survey, and identify any potentially biased questions, and we made revisions as necessary. We launched our web-based survey on January 30, 2020, and emailed log-in information to the directors of the SBDC lead centers. The survey was available through February 7, 2020. From February 10, 2020, through February 14, 2020, we conducted follow-up with nonrespondents by telephone and email. See appendix II for the full set of survey results. The survey included both closed- and open-ended questions. To analyze open-ended comments provided by the SBDCs that responded to the survey, GAO analysts read the comments and developed categories for the responses. An initial coder assigned a category that best summarized the comments. A separate coder reviewed and verified the accuracy of the initial categorizations. The initial coder and reviewer discussed orally and in writing any disagreements about code assignments and documented consensus on the final analysis results. For purposes of this report, we used the following terms to describe the number of SBDCs (out of 60) that were assigned to categories: “few” to describe three to five SBDCs, “some” to describe six to 15, “many” to describe 16 to 30, “most” to describe 31 to 45, and “vast majority” to describe 46 and over. We conducted this performance audit from October 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To obtain the views of Small Business Development Centers (SBDC) on the Small Business Administration’s (SBA) change in the way it sets funding estimates, we conducted a web-based survey of all 62 lead SBDCs. Our survey comprised closed- and open-ended questions. This appendix includes all survey questions and results of each closed-ended question; it includes only the number of responses for each open-ended question. We received surveys from 60 lead SBDCs (a 97 percent response rate). The total number of responses to individual questions may be fewer than 60, depending upon how many lead centers chose to respond to a particular question. For a more detailed discussion of our survey methodology, see appendix I. For questions 7 through 13, the “initial funding amount” refers to your SBDC’s portion of the estimated funding of $101 million total available in the 2020 SBDC Funding Opportunity, which was ultimately below the $135 million later authorized under the Consolidated Appropriations Act, 2020, Pub. L. No. 116-93 (Dec. 20, 2019). (Question 7a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to obtain matching funds. We received 49 responses to this question. (Question 8a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to spend grant funds. We received 51 responses to this question. (Question 9a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to retain personnel. We received 49 responses to this question. (Question 10a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to hire personnel. We received 52 responses to this question. (Question 11a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to ensure continuous operations. We received 54 responses to this question. (Question 12a.) Please provide a specific example or examples of how using the initial funding amount has affected your SBDC’s ability to meet performance goals. We received 44 responses to this question. (Question 13a.) Please provide a specific example or examples of how using the initial funding amount has affected the ability of all your centers to provide services. We received 49 responses to this question. (Question 14a.) Please provide a brief description of how your SBDC made adjustments to account for the decrease in the estimated funding amount in 2020. We received 60 responses to this question. (Question 19) How could SBA help mitigate any of the challenges posed by the funding application procedure, if at all? We received 56 responses to this question. (Question 20) Is there anything else related to the current SBDC funding application procedure on which you would like to elaborate? We received 42 responses to this question. In addition to the contact name above, Paige Smith (Assistant Director), Meredith P. Graves (Analyst in Charge), Kristine Hassinger, Jill Lacey, Jason Marshall, Marc Molino, Kirsten Noethen, and Barbara Roesmann made significant contributions to this report.", "summary": "SBA's SBDC Program provides training and counseling to small businesses through a nationwide network of 62 lead centers and more than 900 service centers. Each year, SBDC lead centers submit grant applications based on an estimated amount in SBA's funding opportunity announcement. GAO was asked to review SBA's procedure for the SBDC funding estimate. This report discusses SBA's change to the way it estimates funding in the funding opportunity announcement, its rationale for the change, and views of SBDC grantees on the effect of the change on their budgeting and operations. GAO reviewed SBDC funding opportunity announcements, Presidents' budget requests, and appropriations for fiscal years 2012–2020; examined relevant laws and guidance; and interviewed SBA officials and OMB staff. GAO also reviewed documentation and interviewed officials from a nongeneralizable sample of eight SBDCs (selected to achieve diversity in funding amount, budget cycle, and host institution) and surveyed all 62 lead SBDCs. The Small Business Administration (SBA) annually issues a funding opportunity announcement with an estimate of total funding for the Small Business Development Center (SBDC) Program. Individual SBDCs are required to use this estimate to apply for their portion of the funding. In fiscal year 2016, SBA began using the lowest funding estimate—the amount in the President's budget—rather than an estimate reflecting historical funding levels. In fiscal year 2019, the amount in the President's budget was 15 percent lower than the prior-year appropriation and in 2020, 23 percent. If SBA continues its practice for fiscal year 2021, the funding estimate will be 35 percent lower than the 2020 appropriation. When appropriations are enacted for the program, the funding amount is revised and SBDCs submit a final budget. SBA officials said they changed how they set the funding estimate to conform to federal standards and appropriations law. In a 2019 letter to the House and Senate Small Business Committees, SBA said it adopted the change to help the program operate more effectively and be consistent with federal financial management standards. SBA officials could not point to specific regulations or guidance to support this statement. Office of Management and Budget (OMB) guidance for grants states that estimates based on the previous year's funding are acceptable if current appropriations are not yet available, as was the case when recent SBDC funding opportunity announcements were issued. SBA officials also cited the Antideficiency Act, which prohibits federal agencies from obligating or expending federal funds in advance or in excess of an appropriation. But staff from OMB and SBA's Office of General Counsel told GAO that the Antideficiency Act does not apply to a funding opportunity announcement because the announcement does not obligate federal funds. A majority of SBDCs that GAO surveyed said using the President's budget request for the initial funding estimate created budgeting, operational, and performance burdens and challenges—mostly stemming from the large gap between the initial estimate and appropriated amounts. For example, SBDCs surveyed said that they now spend more time on budgeting (determining what to cut from initial budgets to meet the lower estimate and then recalculating for final budgets); have a harder time obtaining matching funds (from state, local, or private-sector sources) or increasing the amounts from initial to final funding levels; have difficulty hiring or retaining staff; face challenges providing services to small businesses (particularly if SBDCs have staffing gaps); and thus also face challenges meeting performance goals (which include number of clients served). Under SBA's current practice for funding estimates, SBDCs will continue to experience (or may experience increasing) challenges given the growing divergence between the initial estimate and appropriated amounts. GAO is making one recommendation that SBA reevaluate its funding application requirements, including the initial funding estimate SBDCs are to use. SBA partially agreed and outlined steps it plans to take that could address the intent of the recommendation.", "document_type": "gao"}
{"report": "The United States historically has maintained close ties to Central America and played a role in the region’s political and economic development because of geographic proximity and common interests. The United States has provided assistance to the governments of Central America, including those of the Northern Triangle, under multiple initiatives over many years. In 2008, the United States began a multiyear assistance package to Central America under the Mérida Initiative to help address violence and criminal activity, especially from drug trafficking and other criminal organizations. In 2010, U.S. assistance continued under CARSI. CARSI was a collaborative partnership between the United States and Central American partner countries, including El Salvador, Guatemala, and Honduras, designed to improve citizen security within the region by taking a broad approach to security beyond traditional counternarcotics activities. Multiple U.S. agencies implemented projects in Central America, particularly in the Northern Triangle, to support and complement these initiatives. These projects focused on, among other things, improving law enforcement and criminal justice, promoting the rule of law and human rights, preventing youth violence in violence-prone areas, enhancing customs and border control, and encouraging economic and social development. Introduced in 2014, and updated in 2017, the Strategy is the latest U.S. government initiative in the region. The Strategy notes that prior U.S. assistance did not yield sustained, broad improvements in social or economic conditions and thus the Strategy intends to take a comprehensive, an integrated, and a whole-of-government approach that aligns activities and resources required to achieve systemic and lasting improvements. Under this approach, the Strategy promotes three mutually reinforcing objectives—prosperity, governance, and security. These three objectives seek to address challenges facing Central American countries, including the three Northern Triangle countries. For example: Prosperity Challenges: Northern Triangle countries have had high rates of poverty, low per capita income, and a lack of employment opportunities. The World Bank reported that, in 2014, over half of the population of Guatemala lived below the poverty line and, in 2017, almost one-third of the population of El Salvador and more than half of the population of Honduras lived below the poverty line. The World Bank also reported that El Salvador, Guatemala, and Honduras had among the lowest per capita incomes in Latin America in 2017. In addition, more than 27 percent of the population aged 15 to 24 in each of the Northern Triangle countries were not employed or seeking education or training in 2016, according to the World Bank. Governance Challenges: Northern Triangle countries have experienced widespread corruption, weak government institutions, and poor adherence to the rule of law. According to the 2018 Transparency International Corruption Perception Index, which ranks 180 countries by their perceived levels of public sector corruption, the Northern Triangle countries ranked among the bottom half. In addition, in 2018, Guatemala and Honduras ranked in the lowest 15 percent of countries in the World Justice Project’s Rule of Law Index, which measures countries’ adherence to the rule of law. Security Challenges: Northern Triangle countries have had weak security structures, high rates of crime and gang activity, and a lack of legitimate employment opportunities for youth susceptible to being drawn into criminal activity. While Northern Triangle countries experienced a decline in homicide rates from 2014 to 2017, the average homicide rate for El Salvador, Guatemala, and Honduras remains much higher than the averages for Latin America and the Caribbean for recent years and five to 12 times higher than the 10- year average for the United States. In addition, the percentage of people in the Northern Triangle who reported feeling safe walking in their neighborhoods at night was about 50 percent in 2017. Agencies reported implementing various assistance projects in the Northern Triangle to support the prosperity, governance, and security objectives from fiscal year 2013 through fiscal year 2018. We found that these projects generally correspond to 18 sectors that align with the three objectives of the current Strategy. Figure 1 shows the alignment of the 18 sectors with the objectives of the Strategy, including the six sectors we selected for an in-depth review. Table 1 shows the definitions for each of the 18 sectors we identified and the three objectives of the Strategy. Multiple agencies implemented assistance projects in the Northern Triangle to support the prosperity, governance, and security objectives from fiscal years 2013 through 2018. State, USAID, DOD, and USDA were the primary agencies that implemented such projects in the Northern Triangle during this period. In particular, State and USAID manage foreign assistance to support the Strategy’s objectives, and play key roles in monitoring and evaluating this assistance. According to agency officials, State’s Bureau of Western Hemisphere Affairs (WHA) is responsible for managing the implementation of the Strategy’s objectives among agencies. For example, WHA manages regular coordination meetings with USAID and State’s Bureau of International Narcotics and Law Enforcement Affairs (INL) as well as larger coordination meetings with other relevant agencies, including DOD and USDA, according to officials. In addition, WHA gathers information across agencies on a quarterly basis to produce and disseminate cables that discuss progress and challenges related to the Strategy’s objectives. WHA also collaborated with USAID to develop a plan to monitor and evaluate U.S. assistance and report results. Based on our review of agency funding data, we found that State, USAID, DOD, and USDA allocated about $2.4 billion in assistance to the Northern Triangle to support projects related to prosperity, governance, and security objectives from fiscal years 2013 through 2018. USAID reported the largest amount of allocations with approximately $1.44 billion, while State reported $464 million, and USDA and DOD each reported less than $235 million. For fiscal years 2013 through 2018, the four agencies reported allocating the largest amount of funding for projects in Guatemala, followed by Honduras and El Salvador. Specifically, the agencies reported allocating approximately $1.07 billion or 45 percent of total allocations to fund projects in Guatemala, approximately $749 million or 32 percent of total allocations to fund projects in Honduras, and approximately $496 million or about 21 percent of total allocations to fund projects in El Salvador. Some agencies also reported allocations for multi-country projects implemented in two or more countries, including at least one Northern Triangle country. For example, USAID funded a regional initiative to improve clean energy investment and reduce overall energy consumption throughout many Central American countries. The agencies reported allocating approximately $53 million for multi-country assistance projects implemented exclusively in two or three Northern Triangle countries, or about 2 percent of the total. See Table 2 for reported amounts of allocated funding by country and agency from fiscal years 2013 through 2018. State, USAID, DOD, and USDA implemented at least 370 technical assistance projects in the Northern Triangle to support prosperity, governance, and security objectives from fiscal years 2013 through 2018. The total number of projects that we report is lower than the actual number of projects implemented because some agencies and bureaus could not report data at the project level. Specifically, DOD and INL reported some broader assistance data that encompassed two or more projects and officials told us they were unable to disaggregate this data at the project level. Among the four agencies, USAID implemented the largest number of projects in the Northern Triangle during our time frame. Specifically, USAID reported that it implemented 218 projects or 59 percent of the projects reported across the four agencies. State reported that it implemented 124 projects or about one-third of the projects. DOD and USDA each reported 14 projects to support prosperity, governance, and security or about 4 percent each of the total projects. Collectively, the agencies reported they implemented the largest number of projects in Guatemala (126), followed by Honduras (106), and El Salvador (86). Agencies reported they implemented 52 multi-country projects that included at least one Northern Triangle country. See table 3 for the number of projects reported by country and agency. Agency officials typically reported implementing similar types of projects in each of the Northern Triangle countries, although there were some differences in the number of projects implemented for each objective and sector based on each country’s needs (see fig. 2). For example, officials told us that agencies implemented fewer agricultural development projects in El Salvador because its agriculture industry is small relative to Guatemala and Honduras and the majority of its population lives in urban rather than rural, agricultural areas. Instead, agency officials in El Salvador said agencies focused their prosperity assistance on projects in the economic growth sector that targeted more prominent business areas such as technology or manufacturing. For example, USAID supported a youth training center in El Salvador where students develop computer skills to work in the information technology fields (See fig. 3). Some agencies funded projects that supported multiple sectors and objectives, while others focused on a specific sector supporting one of the three objectives (see fig. 4). For example, USAID and State supported all three objectives by implementing projects in a variety of sectors. However, USDA supported only the prosperity objective by implementing projects primarily in the agricultural development sector and DOD supported the security objective by implementing projects primarily in the professionalize the military and develop defense capabilities sector. We also identified some specific assistance projects that supported more than one of the three objectives. For example, some of USAID’s workforce development projects targeted at-risk youth, which supported both the prosperity and security objectives. Other USAID projects worked with government officials in the Northern Triangle to improve health, environment, or economic growth, which supported both the prosperity and governance objectives. In addition, State’s rule of law projects, which trained police and other personnel in the judicial sector, supported both the governance and the security objectives. Below is an overview of the agencies’ general roles and responsibilities for supporting the three objectives: Prosperity: USAID, State, and USDA implemented projects supporting the prosperity objective. USAID implemented projects to assist populations to meet basic needs, help businesses access markets for goods and services, build a skilled workforce, and enhance health systems and education institutions. For example, one USAID economic growth project in El Salvador provided assistance to small enterprises through university-affiliated training centers where representatives of firms received training and advice to improve their business practices. State also implemented projects to assist businesses and entrepreneurs develop their capabilities. For example, State implemented a multi-country project to provide training to small and medium businesses on e-commerce platforms to access new markets and increase sales. USDA and USAID both implemented projects intended to help farmers improve agricultural management practices and increase their access to markets and capital. For example, a USAID agricultural development project in Honduras provided training to local farmers to increase their household incomes, strengthen access to food markets, and diversify their crops (see fig. 5). A USDA project provided schools in Honduras with food assistance, infrastructure improvements, and trainings to support school feeding, sought to improve educational outcomes (see fig. 6). Governance: USAID and State were the primary agencies supporting the governance objective. USAID projects provided technical assistance to governments to increase accountability, transparency, revenue collection, and provision of basic services. For example, a USAID project in Guatemala provided technical assistance to municipal governments to improve their financial management and increase the quality of government-provided services such as water and sanitation systems. State and USAID also supported this objective by supporting projects to strengthen justice institutions, combat corruption, improve democratic processes, and advocate for the protection of human rights. For example, we visited a morgue in Honduras where USAID and INL collaborated to provide forensic training and equipment and improve evidence collection and analysis capabilities, to better prosecute crimes (see fig. 7). Security: State, USAID, and DOD implemented projects to support the security objective. USAID and INL projects supported community based activities to prevent violence by supporting community youth centers, strengthening community policing, and implementing workforce development projects for at-risk youth. For example, a USAID project in Honduras provided technical training, mentorship, and job placement support for at-risk youth. INL also provided training and equipment to law enforcement to improve its capabilities and reputation in communities and to better identify and prevent crime, violence, and gang activity. For example, we visited the International Law Enforcement Academy in El Salvador, where U.S. assistance provides a variety of training courses to Central American and South American police, judges, and prosecutors, to increase capacity and coordination among law enforcement officials (see fig. 8). In addition, State funded and DOD funded and implemented projects to train and equip Northern Triangle militaries. DOD officials in Honduras, for example, told us they provide a range of trainings to Honduran military leaders at U.S. military schools. See appendix II for a summary of U.S. assistance projects in the Northern Triangle for our six selected sectors. State, USAID, DOD, and USDA reported mixed results, primarily focused on outputs, for the 190 projects in the six sectors we reviewed. While some projects in these sectors achieved the targets that agency officials established, others did not. We reviewed a variety of performance-related documents for the 190 projects that aligned with our six selected sectors—economic growth, agricultural development, good government service, justice reform, community based violence prevention, and professionalize the military and develop defense capabilities. Specifically, we reviewed State and USAID’s PPRs for fiscal years 2013 through 2018 for each Northern Triangle country, and State’s INCSRs for fiscal years 2013 through 2018. We also reviewed State and USAID’s Progress Report for the Strategy for fiscal years 2018 and 2019, and State’s quarterly country cables reporting on agencies’ progress in implementing projects that support the Strategy’s objectives in each of the Northern Triangle countries for available quarters of fiscal years 2016 through 2018. In addition, we reviewed implementer progress reports for a sample of 19 projects to obtain more detailed information on project-specific outputs and outcomes, as well as all available evaluations related to the six sectors completed from fiscal years 2013 through 2018. Examples of results for projects related to each of the six sectors include the following. Economic Growth: USAID implemented projects to assist workers improve their access to employment, and help firms improve their business practices and access markets. According to the PPRs we reviewed, USAID achieved 81 of 123 (66 percent) of its targets for performance indicators related to the economic growth sector for fiscal years 2013 through 2018. In addition, all nine evaluations in the sector reported generally positive project results. For example, according to the PPR, USAID assisted 176 firms to invest in improved technologies and 329 firms to improve their management practices in Guatemala in fiscal year 2017, exceeding the targets of 141 and 310, respectively. In addition, 5,067 individuals completed workforce development programs with U.S. assistance in the Northern Triangle countries in fiscal year 2018, according to the PPRs. USAID reported that 1,376 individuals completed workforce development programs in Guatemala, which exceeded the target of 1,000. However, USAID reported that 3,040 individuals in El Salvador and 651 individuals in Honduras completed such programs, which did not meet the fiscal year targets of 7,300 and 5,000, respectively. According to an evaluation of a USAID project in El Salvador that focused on providing training to individuals to improve their job opportunities, 3,585 individuals completed the training, which was 175 fewer than expected due, in part, to the project’s focus on training individuals for existing jobs and the scarcity of job opportunities for some individuals who completed the training. Agricultural Development: USAID and USDA implemented projects that provided assistance to apply improved agricultural technologies or management practices, and increase agricultural productivity and food security. According to the PPRs we reviewed, USAID achieved 58 of 86 (67 percent) of its targets for performance indicators related to this sector for fiscal years 2013 through 2018, and six of eight evaluations of agricultural development projects generally reported positive project results. For example, USAID reported in the PPR that 35,245 individuals in Honduras received short-term training with U.S. government support on agricultural productivity or food security in fiscal year 2018, exceeding the fiscal year target of 32,500, but 40,492 individuals received such training in Guatemala, which did not meet the target of 52,417. According to an implementer progress report, as of March 2017, an ongoing USDA school feeding project in Honduras had helped to construct and rehabilitate kitchens and food storage facilities at five of the 30 schools targeted by the project in 2017. An evaluation of a USDA project in El Salvador reported that the project issued 307 agricultural loans to improve agricultural production, which did not meet the target of 345 loans due, in part, to a delay in implementing the project. Good Government Service: USAID implemented projects to help create accountable and effective government institutions through improved provision of government services, increased citizen oversight, and greater ethics and transparency. According to the PPRs we reviewed, USAID achieved 22 of 30 (73 percent) of its targets for performance indicators related to this sector for fiscal years 2013 through 2018. Some of the projects achieved mixed results, according to an evaluation of projects in this sector. For example, USAID in the PPRs reported that in Honduras it exceeded targets in fiscal year 2018 by providing assistance to 94 local governments to improve public service and by training over 2,600 individuals in Guatemala in fiscal management to strengthen local government and foster decentralization. USAID met the target for fiscal year 2018 by having 81 public policies introduced, adopted, repealed, changed, or implemented with citizen input in Honduras. A USAID project in Guatemala designed to better manage public resources and government services reported in its fiscal year 2017 annual report that it helped 76 percent of the municipalities involved in the project increase their average monthly revenues following the project’s financial management training. However, an evaluation of two USAID projects in Honduras found that one project did not meet 70 percent of targets and struggled to successfully promote decentralization laws or increase municipal fiscal autonomy. Justice Reform: USAID and State provided technical assistance and equipment to help improve the efficiency of the courts and forensic laboratories, and strengthen the capabilities of prosecutors and judges. According to the PPRs we reviewed, USAID achieved 27 of 41 (66 percent) of its targets for performance indicators related to this sector for fiscal years 2013 through 2018. For example, according to the PPRs, 2,298 government officials in El Salvador received anti- corruption training with U.S. assistance in fiscal year 2018, surpassing the fiscal year target of 1,845. However, according to the PPRs, 150 individuals affiliated with nongovernmental organizations received such anti-corruption training in Guatemala in fiscal year 2017, which was below the fiscal year target of 550. The Progress Report for the Strategy for fiscal year 2019 reported that USAID assisted 244 courts in Guatemala to improve their case management systems in fiscal year 2018, which surpassed the target of 220. The Progress Report for the Strategy also reported that State and USAID trained 12,557 justice system personnel, including prosecutors and criminal investigators, in the Northern Triangle in fiscal year 2018; which surpassed the target of 2,275. Although State did not report targets, it provided data in its annual INCSR on U.S.-supported trainings, including training more than 1,000 police and justice sector personnel in El Salvador in 2016 and 2017, and 262 students in criminal investigations in Honduras in 2013. An evaluation of a USAID project in Guatemala noted the project helped improve prosecution practices and court management, but the evaluation also noted that continuous support would be required to preserve and consolidate reforms. Community Based Violence Prevention: USAID and State supported a number of efforts under the security objective to prevent violence in communities. According to the PPRs we reviewed, USAID achieved 7 of 18 (39 percent) of its targets for performance indicators related to this sector for fiscal years 2013 through 2018. For example, in El Salvador, 13 U.S. government-supported schools or other learning spaces met the criteria for the safe schools program in fiscal year 2018, surpassing the target of 10 schools. However, according to the PPR, in Honduras approximately 161,300 individuals participated in U.S.-funded gang prevention and education in fiscal year 2018, which did not meet the fiscal year target of 219,600. The Progress Report for the Strategy for fiscal year 2018 reported that State’s Gang Resistance Education and Training Program (GREAT) reached tens of thousands of youth and hundreds of police officers received instructor certifications to deliver anti-gang and crime prevention training through the program in the Northern Triangle in fiscal year 2017. However, State did not report targets for the program for the fiscal year. According to an implementer progress report, as of June 2018, an ongoing USAID project in Honduras that provides workforce development services for at-risk youth, had enrolled 2,528 of the project’s target of 6,500 youths for fiscal years 2017 and 2018. In addition, 440 of the project’s target of 2,488 youths for those fiscal years had completed the workforce development services as of June 2018, according to the report. Professionalize the Military and Develop Defense Capabilities: DOD and State supported efforts to professionalize the militaries of the Northern Triangle countries and develop their defense capabilities. While DOD and State reported positive output results for this sector, they also reported some limitations. According to the PPRs we reviewed, State achieved 48 of 71 (68 percent) of its targets for performance indicators for this sector for fiscal years 2013 through 2018. For example, in fiscal year 2018, State reported that 100 military personnel in Guatemala received technical or tactical training, which met the fiscal year target. State also reported that Guatemalan military personnel completed 12 exercises with U.S. or coalition personnel as a result of U.S. government assistance, which also met the target for fiscal year 2018. However, State reported that it supported the training of 44 fulltime peacekeeping staff in El Salvador in fiscal year 2017, which did not meet the target of 155. In its monitoring progress reports from fiscal years 2013 to 2018, DOD reported that it provided international military education and training to over 2,000 military personnel in the Northern Triangle, although DOD did not report targets. DOD personnel also engaged directly with Central American military personnel to improve their professionalism. For example, in Guatemala, DOD helped to establish a defense budget system designed to increase transparency and accountability of funds within the Ministry of Defense. However, DOD has reported ongoing challenges regarding the professionalism of Northern Triangle militaries and noted that public trust in the militaries remains low. Based on our review of various performance-related documents, we found limited information on progress toward improving prosperity, governance, and security in the Northern Triangle. Specifically, agencies generally reported more information about progress toward prosperity than toward governance and security. Some of the evidence about governance and security may be limited because evaluations were conducted unevenly across agencies and sectors. In addition, project implementers did not consistently collect key information to assess progress toward the Strategy’s objectives. Nevertheless, agency officials cited examples of important results from U.S. assistance as well as challenges to achieving progress toward the objectives. In addition, the Strategy’s monitoring and evaluation plan is not comprehensive because, while the plan specifies that State and USAID should track evaluations of their projects, it does not include a plan for evaluations of projects conducted by agencies other than State or USAID. For the sectors we reviewed, agencies generally reported more information on progress toward prosperity for projects related to economic growth and agricultural development, than toward governance and security. In addition, agencies generally reported positive information on progress toward prosperity for projects related to these sectors. For example, an evaluation of a USAID economic growth project in Guatemala reported the project supported 64 public-private partnerships that managed $39.1 million in investment, primarily from the business sector, for health, nutrition, and education activities to improve economic growth and development. In addition, USAID reported in the PPR that small and medium-sized firms assisted by its projects in El Salvador increased annual sales by approximately 40 percent in fiscal year 2016, which exceeded the target of 29 percent. In Guatemala, USAID also helped to increase crop yields by about $62 million and reduced household poverty by about 12.6 percent through two projects that trained agricultural producers in farm management practices and helped them access markets, according to an evaluation. Finally, an evaluation of a USDA agricultural development project in El Salvador reported that it helped generate approximately 12,930 new jobs, significantly exceeding the project’s goal of 900 jobs, in part, through increased access to credit and credit competency training. In general, however, little information was available from agency reports about progress toward the governance and security objectives. For example, an evaluation of a USAID project in good government service in Honduras that provided technical assistance to local governments to improve citizen satisfaction with services reported improvements in the quality of water and health services in most of the targeted municipalities, although the evaluation noted that the project had not developed appropriate indicators to measure results that were directly attributable to the project’s activities. Despite these improvements, the evaluation reported that the services remained largely unable to satisfy citizen needs adequately, and there was little evidence that municipalities would have the capabilities or resources to continue to improve the services without donor assistance. The evaluation also noted that the project promoted citizen advocacy by providing training to citizen oversight committees and establishing well-attended town halls in rural municipalities. However, it found no evidence such efforts were effective because the organizations remained too weak to advocate effectively for improved accountability and service. Another evaluation of a USAID project to prevent community based violence in Honduras reported significant reductions in homicide rates, ranging from 42 percent to 68 percent, in four of the six targeted communities, but also noted that these outcomes might not be attributable to the project’s activities. Although there were no evaluations of projects in the sector for professionalize the military and develop defense capabilities, DOD reported in its after action reports that it trained dozens of personnel who subsequently held positions of prominence within Northern Triangle militaries. The differences in results information for the three objectives are likely due, in part, to variations in the number of evaluations agencies conducted for their Northern Triangle projects. For example, we found that evaluations had been conducted unevenly across the agencies and six sectors we reviewed. Figure 9 shows the number of projects and completed evaluations of projects in the Northern Triangle that support the Strategy by agency and selected sector from fiscal years 2013 through 2018. From fiscal years 2013 through 2018, agencies completed 23 evaluations across the six sectors, which related to the 190 projects that agencies implemented in these sectors during this period. USAID completed 16 of these evaluations, with more than half of them in economic growth, although only 19 of the 116 projects USAID implemented in the sectors we reviewed related to economic growth. USDA completed six of these evaluations in agricultural development. State completed one evaluation in justice reform. DOD did not conduct any evaluations of its efforts to professionalize the military and develop defense capabilities in the Northern Triangle. In January 2017, DOD established agency-wide guidance for conducting assessment, monitoring, and evaluation of security cooperation programs and activities. We found that project implementers for State and USAID did not consistently collect key information to evaluate progress towards outcomes. Specifically, 12 of the 23 evaluations we reviewed from fiscal years 2013 through 2018 cited instances in which projects had not established measures or collected data to measure outcomes. Six of the 17 evaluations we reviewed for the sectors for economic growth and agricultural development noted that implementers had not collected sufficient data to measure the projects’ outcomes. For example, an evaluation of a USAID project that supported municipalities to mobilize financial resources for economic development noted that evaluators were unable to measure whether the project’s activities improved the municipalities’ competitiveness in providing services to businesses and investors. The evaluators could not perform this assessment because the project implementers did not consistently collect data to measure improvements in the local business climate. An evaluation of USAID projects in agricultural development in Guatemala noted that evaluators were unable to assess the total welfare impacts of the projects, such as changes in household incomes, because the projects had not collected information on household or farmer incomes from all sources with which to compare results following project activities. All four evaluations we reviewed in the sectors for good government service and justice reform noted that the projects did not sufficiently establish or measure the projects’ outcomes. For example, an evaluation of two USAID projects in Honduras for good government service found that one project did not incorporate indicators to measure outcomes. While the other project incorporated outcome indicators, the evaluation found most of these indicators to be poorly defined and inadequate to measure the project’s results. An evaluation of a State project in justice reform in Honduras also found that project indicators were focused on outputs and not outcomes. The evaluation also noted that the indicators were established after the project started and thus did not establish a true baseline or capture results from the beginning. As a result, evaluators reported that they lacked the data to evaluate key results. The two evaluations of projects to prevent community based violence we reviewed discussed deficiencies with progress indicators. For example, an evaluation of a project in Honduras that focused on reducing homicide rates noted that the implementing partner relied on the Honduran government to obtain data on homicides, although the government had limited capability to document and report such data. USAID officials noted that USAID and project implementers have made improvements to projects’ monitoring and evaluation plans in response to evaluation findings. For example, project implementers have added outcome indicators and USAID officials have provided technical assistance to implementers to help them design new methods for collecting data in response to evaluation findings and recommendations, according to USAID officials. Although our review of various performance-related documents related to the six sectors show that limited information from evaluations is available on progress toward prosperity, governance, and security, agency officials described some important results from U.S. assistance in the Northern Triangle related to these sectors. For example, USDA officials noted that technical assistance and training helped to enhance crop research and water and soil conservation, which contributed to increased agricultural production. USAID officials noted that the technical assistance the agency has provided to small and medium sized firms has helped them access markets and increase sales. State and USAID officials also described improvements in the use of forensic evidence through technical assistance and training provided to judges and prosecutors and enhanced court management, which contributed to timely criminal investigations and prosecutions. In addition, State officials explained that U.S. assistance along with support from other donors and host governments has contributed to positive results, including the passage of laws that prevent organized crime from donating to political campaigns, multiple anti-corruption investigations, as well as reductions in homicide rates through community based violence prevention projects. Furthermore, DOD officials noted that assistance in defense planning and management helped support oversight and accountability in the use of military funds and enhanced the capacity of security forces to respond to disaster relief and drug interdiction efforts. Agency officials also noted that from fiscal years 2013 through 2018 they achieved results toward enhanced prosperity, governance, and security for the 180 projects that corresponded to the 12 sectors outside of the scope of our review. In particular, USAID officials noted that environment sector projects increased incomes for thousands of individuals through improved management and conservation of natural resources, such as watershed management. State officials also described important results from projects in the human rights sector, including strengthening the capacity of labor union networks to monitor and document hundreds of incidents of violence against union activists in Guatemala and Honduras and increasing the number of investigations into such incidents. In addition, State officials identified results in the police reform sector, including passage of police reform legislation, professionalization of police academies, and sharing of information among law enforcement. Agency officials we interviewed also cited examples of challenges to achieving progress toward prosperity, governance, and security. For example, USDA and USAID officials noted that drought and coffee rust— a fungal disease that harms coffee plants—reduced agricultural production in affected areas. USAID officials also pointed out that the health of the economy and labor markets affect the results of economic growth projects, particularly with regard to firms’ sales and the placement of individuals in jobs following their completion of workforce development programs. In addition, State and USAID officials cited the importance of government officials’ willingness to implement reforms as an important factor that affects the achievement of results across sectors. Furthermore, high turnover of civil service and military professionals affects the achievement and sustainability of results in various sectors, according to State, USAID, and DOD officials. Agency officials also explained that they have taken steps to modify projects to address such challenges. For example, USAID and USDA projects have provided technical assistance and training to farmers on how to prevent coffee rust and cultivate coffee varietals resistant to the disease. In its coordinating role for the implementation of the Strategy, State has not created a comprehensive monitoring and evaluation plan that specifies an approach to evaluating progress across all agencies. Our prior work regarding effective foreign assistance strategies found that development of a monitoring and evaluation plan is a key element in terms of assessing agencies’ common goals and objectives, and mutually reinforcing results. Additionally, we found that foreign assistance involves the collaborative efforts of multiple agencies, and strategies that consistently address agencies’ roles and responsibilities and include interagency coordination mechanisms can guide effective collaboration among agencies and prevent fragmentation. In addition, Standards for Internal Control in the Federal Government indicates that managers should identify the information needed to achieve objectives and use such information to evaluate performance in achieving objectives. State, in coordination with USAID, has developed and updated a monitoring and evaluation plan for funds appropriated to them to implement the Strategy in response to direction contained in committee reports accompanying several State, Foreign Operations, and Related Programs appropriations acts. However, the plan that State and USAID developed for the Strategy, while consistent with the committee reports’ direction, is not comprehensive. In particular, it does not incorporate all the relevant agencies, sectors, and activities that support the Strategy’s objectives. The plan notes that State and USAID will monitor and evaluate foreign assistance supporting the Strategy. While the plan specifies that State and USAID should track completed, ongoing, and planned evaluations of their projects supporting the Strategy’s objectives, it does not include a plan for evaluations of projects conducted by agencies other than State or USAID, such as DOD and USDA. Additionally, the plan notes that each agency requires project monitoring, including progress indicators, baselines, targets, and expected outcomes of projects. The plan specifies that State will compile and report performance data, which will provide an important source of information to assess progress toward Strategy objectives. However, the plan does not specify how State and USAID would include reporting on many activities conducted by other agencies that support the Strategy’s objectives. As a result, State officials noted the monitoring and evaluation plan does not include indicators for DOD and USDA activities that contribute to the objectives of the Strategy, with the exception of DOD activities funded through State. For example, State, in addition to determining the scope of security assistance and funding level for each recipient of International Military Education and Training (IMET) programs, also identifies annual IMET goals and objectives for each country. DOD administers IMET in coordination with State. State and USAID’s monitoring and evaluation plan includes indicators to measure progress of these programs. DOD, however, conducts a number of other programs to professionalize the military that State and USAID have not included in the monitoring and evaluation plan. For example, DOD provides training to Northern Triangle militaries and Ministries of Defense that is outside of the IMET program, such as Defense Government Management and Training engagements. The Progress Report for the Strategy for fiscal year 2018 indicated that under the IMET program there were 13 U.S.-trained personnel in positions of prominence, or positions of military or government leadership, in the Northern Triangle in fiscal year 2017. DOD, though, in a separate report on these military training and education programs, noted there were over 100 U.S.-trained personnel in positions of prominence in the Northern Triangle in fiscal year 2017. In addition, the monitoring and evaluation plan does not include any of USDA’s activities or activities related to the health sector that support the Strategy’s objectives, despite the fact USDA completed six evaluations of its agricultural development projects that could be used to inform an understanding of progress toward the Strategy’s objectives. By not capturing information on DOD and USDA activities, State and USAID have limited ability to assess the progress made by all U.S. government agencies in the Northern Triangle. State officials stated that the monitoring and evaluation plan is not inclusive of DOD and USDA activities because the legislative direction for the plan did not require it. The Strategy, however, intends to take a comprehensive, integrated, and whole of government approach to engagement in Central America. DOD and USDA officials in headquarters and at the Missions in El Salvador, Guatemala, and Honduras told us that their activities also support the Strategy’s objectives. Given its coordinating role in the Strategy’s implementation and in foreign policy objectives in general, State is well positioned to work collaboratively with officials from other agencies to develop a comprehensive approach to monitoring the impact of all activities across all sectors that directly support the Strategy’s objectives. A comprehensive monitoring and evaluation plan that specifies an approach to evaluating progress across all agencies would help State and USAID to determine to what extent U.S. government activities in the Northern Triangle are achieving the Strategy’s desired results. The Northern Triangle, an area of strategic interest to the United States, faces high levels of poverty, weak governance, and widespread violence and insecurity. To respond to these challenges, the U.S. government has for many years provided assistance to the region. Multiple agencies have allocated billions of dollars to implement hundreds of projects that have provided technical assistance, equipment, and training to thousands of individuals and organizations. Agencies have reported mixed results from these projects, relative to targets set, yet little is known about progress on meeting broader objectives to improve prosperity, governance, and security in the region. Under the U.S. Strategy for Engagement in Central America, State and USAID developed a monitoring and evaluation plan, for their own projects, that is an important tool for assessing impact in the region. A more comprehensive approach to monitoring and evaluation of projects that may address the Strategy’s objectives to include all relevant agencies, sectors, and activities would enable the U.S. government to have a better understanding of progress under the Strategy and how U.S. assistance is addressing the underlying challenges that confront El Salvador, Guatemala, and Honduras. Given State’s coordinating role in the implementation of the Strategy among U.S. government agencies, including DOD and USDA, it is uniquely positioned to ensure that agencies collaborate effectively and that monitoring and evaluation are well coordinated and documented in a comprehensive plan. The Secretary of State, working with the Administrator of the U.S. Agency for International Development, should collaborate with the Departments of Defense and Agriculture and other Departments as necessary, to develop a comprehensive approach to the monitoring and evaluation of projects that directly support the objectives of prosperity, governance, and security, and incorporate this approach into the Strategy monitoring and evaluation plan. We provided a draft of this report to State, USAID, DOD, USDA, DOJ, and DHS. We received written comments from State, USAID, and DOD, which we reprinted in appendixes V through VII. We received technical comments from State, USAID, DOD, and DHS, which we incorporated as appropriate. USDA and DOJ informed us in writing that they had no comments. State and USAID did not concur with our recommendations, indicating that neither agency has the authority to direct DOD or USDA to design and implement programs. USAID indicated that while greater interagency coordination would be appropriate, it does not have the authority to direct DOD or USDA to monitor and evaluate their projects against objectives developed for the Strategy. DOD noted that while some of its programs enable progress toward the Strategy’s objectives, it is not appropriate for State to specify how to monitor and evaluate DOD-funded programs. State also asserted that our recommendation is not consistent with the explanatory statements accompanying the Department of State, Foreign Operations, and Related Programs Appropriations Act, which directs State and USAID to develop a monitoring and evaluation plan for the Strategy for programs funded by appropriations to them, but does not direct that the plan include monitoring and evaluation of programs funded by appropriations to DOD and USDA. We are not recommending that State and USAID direct DOD and USDA to monitor and evaluate projects, but rather that State collaborate with DOD and USDA to develop a more comprehensive approach to monitoring and evaluating projects that support the Strategy’s objectives and that State document the results of this collaboration in the Strategy’s monitoring and evaluation plan. We do not prescribe the format or content for how the Strategy’s monitoring and evaluation plan might be updated. We have modified relevant sections of our report and our recommendation to make this clearer and eliminated the recommendation to USAID, since State coordinates implementation of the Strategy by the various agencies of the U.S. government. We found that DOD and USDA have designed and implemented programs that directly support the objectives of the Strategy. While we acknowledge that some coordination among agencies occurs in Washington and in the Northern Triangle, we found that such coordination does not formally extend to monitoring and evaluation. We agree with USAID’s comment that interagency coordination on a comprehensive monitoring and evaluation plan for the Strategy would be appropriate. Consistent with USAID’s comment, we believe that our recommendation encourages greater coordination among agencies, including DOD and USDA, by ensuring that comprehensive monitoring and evaluation efforts of the entire U.S. government are in sync with the monitoring and evaluation plan for the Strategy. Excluding DOD and USDA projects from the monitoring and evaluation plan for the Strategy could result in an incomplete or unclear understanding of the results of U.S. assistance in the Northern Triangle. Without a complete and clear understanding of the results across all agencies involved, agencies may miss important lessons about the types of assistance that are most effective in achieving U.S. objectives in this region, potentially limiting overall progress. Furthermore, while the explanatory statement accompanying Pub. L. No. 114-113 directs State, in coordination with USAID, to develop a monitoring and evaluation plan for funds appropriated to them, we are recommending that State, as coordinator for the implementation of the Strategy, work with the other agencies to develop a more comprehensive approach to monitoring and evaluating projects that support the Strategy’s objectives. State should update the monitoring and evaluation plan that was created in response to the congressional direction to document the comprehensive approach to monitoring and evaluation. State indicated that the credibility of our report was limited by the following five methodological issues: (1) our inclusion of projects implemented by DOD and USDA; (2) our inclusion of projects implemented with funds appropriated prior to fiscal year 2016; (3) our use of inconsistent reporting methods for funding allocations among the four State bureaus providing data and among State, USAID, DOD, and USDA; (4) our classification of program sectors, which was not consistent with the sub-objectives used by State and USAID as part of the Strategy; and (5) our exclusion of several “primary” sectors for our in-depth review, such as police professionalization, reducing violence at the local level, and reducing the influence of organized crime and gangs. We believe that our methodology enhanced the credibility and reliability of our report. Overall, we designed our objectives, scope, and methodology, as outlined in detail in appendix I, to provide a reasonably comprehensive review of the results of U.S. assistance to the Northern Triangle toward achieving key U.S. objectives. First, we chose to review all agencies that have allocated a significant amount of funding from their appropriations to implement projects in the Northern Triangle from fiscal year 2013 through fiscal year 2018 to support prosperity, governance, and security. DOD and USDA officials confirmed that DOD and USDA projects support these objectives and we believe that the inclusion of these agencies significantly enhanced the accuracy and completeness of our reporting on the results that have been achieved from U.S. assistance as well as the gaps in the current monitoring and evaluation approach and implications for State’s ability to assess results comprehensively. Second, we believe our inclusion of projects implemented from fiscal years 2013 through 2018 provided a reasonable time frame for our review because it included projects that supported the objectives of improving prosperity, governance, and security— long standing objectives that predated appropriations for the Strategy, and even the Strategy itself. Including projects implemented between fiscal years 2013 and 2018 increased our ability to report on the results of agencies’ projects and their overall progress toward the Strategy’s objectives because projects funded since fiscal year 2016 were in too early a stage of implementation to report meaningfully on such results. However, we considered, as appropriate, any results information we were able to obtain on such projects. Third, we acknowledge that the precision of our estimates for reporting on funding allocations was limited due to the inconsistent nature of reporting of financial data by different bureaus and agencies. However, taking into consideration qualifications noted throughout our report, we believe that our reporting of funding allocations provides a reliable description of how agencies used allocated funding to support prosperity, governance, and security objectives. Fourth, we believe that our classification of projects under different sectors we identified provides a detailed, comprehensive, and meaningful analysis of projects and related results. Because some of the sub-objectives developed by State and USAID, such as “reduce poverty,” were very broad and did not lend themselves to an analysis of specific project sectors that supported the Strategy’s objectives, we identified more specific sectors, including health, economic growth, and agricultural development. State and USAID officials validated the accuracy of our definitions, and we revised them as appropriate, given input from agency officials. Fifth, our selection of six sectors for in-depth review of projects and results limits the generalizability of our findings to all sectors, which we note. Due to the large number of projects, sectors, and sub-objectives associated with U.S. assistance to the Northern Triangle, we determined that a case study approach was the most effective methodology for our review. We devised selection criteria to reflect a meaningful selection of projects across sectors, agencies, and countries. Moreover, two of the sectors we selected for in-depth review—community based violence prevention, and justice reform—encompass several projects classified as relating to “reducing violence at the local level,” and “reducing the influence of organized crime and gangs.” Thus our report addresses results in these sectors. We omitted certain sectors, such as police professionalization, in part, because we had ongoing work related to this sector. We acknowledge limitations with this case study approach and do not attempt to generalize results beyond the sectors we reviewed. We believe that this methodological approach provides a reasonable basis for our overall conclusion that projects in the sectors we reviewed achieved mixed results. USAID also raised several methodological concerns, some of which were similar to those raised by State. In particular, USAID (1) questioned the validity of our analysis, since it was based on a case study of six of the 18 sectors we identified, and commented that we did not discuss the limitation of this approach; (2) questioned the validity of our use of monitoring information relating to the achievement of annual targets to analyze results; and (3) asserted that we focused on negative evaluation findings to assess results and did not mention or analyze planned and ongoing evaluations or programmatic changes made in response to monitoring and evaluation information. We believe our methodological approach provides a reliable basis for our findings and conclusions, and concerns USAID raised do not limit the credibility of our report. First, we acknowledge the limitations of our case study approach and included statements throughout our report to make these limitations clear. Second, we believe that the use of data on the achievement of annual targets is a valid approach to assessing results, although the agencies collecting the data may also intend to use it in making decisions about ongoing projects. Furthermore, these data provided only one element of our analysis. We also analyzed State and USAID implementer progress reports, mid-point and final evaluations, and other performance reports, which provide a longer-term perspective on results. Collectively, we believe that this information provides meaningful insight into the successes and shortcomings of the projects in the sectors we reviewed. Third, we sought to present a balanced picture of results within the sectors we reviewed, highlighting both positive and negative outcomes described in the reviewed documents. We reviewed completed evaluations to provide insight into project results, but excluded ongoing and planned evaluations because conclusions about project results are not available until such evaluations are completed. Similarly, our report acknowledges that agency officials described progress and challenges to achieving the prosperity, governance, and security objectives, as well as the steps taken to modify projects to address such challenges. However, such modifications fell outside the scope of our analysis of results, absent documentation of their specific impact on the achievement of objectives. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Department of State, the Administrator of the U.S. Agency for International Development, the Secretary of the Department of Defense, the Secretary of the Department of Agriculture, the Secretary of the Department of Homeland Security, the Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7141 or groverj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. This report examines (1) the projects that the U.S. government has implemented in the Northern Triangle from fiscal year 2013 through fiscal year 2018 to support prosperity, governance, security, (2) what is known about the results of these projects, and (3) what is known about progress toward the U.S. Strategy for Central America’s (Strategy) objectives. To determine the projects that the U.S. government has implemented in the Northern Triangle, we collected and analyzed agency project and funding data concerning foreign assistance projects supporting prosperity, governance, and security objectives from the U .S. Agency for International Development (USAID), and the Departments of State (State), Justice (DOJ), Homeland Security (DHS), Defense (DOD), and Agriculture (USDA). We focused our analysis on State, USAID, DOD, and USDA because they allocated the largest amounts of funding for the largest number of projects in the Northern Triangle from fiscal years 2013 through 2018. We included projects from fiscal years 2013 to ensure we examined projects that had undergone sufficient implementation to assess results. We obtained the data and information from several bureaus at State that administer these projects and funds: International Narcotics and Law Enforcement Affairs; Western Hemisphere Affairs; Political-Military Affairs; and Democracy, Human Rights, and Labor. We also obtained data from DHS and DOJ concerning projects implemented through agreements with State, which we included under State’s project and funding counts. Although agencies use different terms to describe agencies’ assistance, including programs, projects, and activities, we use the term “projects” to refer to assistance funded by the key agencies that are implemented directly by the agencies or through awards made to the implementing partners. In general, the term project consists of a set of activities that are designed and executed over a time frame to achieve a specific aim. While agencies and bureaus typically provided us with project-level data, some agencies and bureaus were unable to report data at the project level, and instead provided us with data that combined multiple activities or awards to implementing partners to accomplish a broader aim. In addition, most agencies reported project and funding data by country, including separating funding data for multi-country projects that were implemented in two or more countries, including at least one Northern Triangle country. Some agencies were not able to report multi-country projects by country, which we included in the multi-country project category. Since most agencies and bureaus provided us with project-level data separated by country, we use the term “projects” to encompass all available data on agencies’ assistance in each of the three countries. We analyzed agencies’ data and information to identify the number of projects implemented by agency and country and the total funding agencies allocated for these projects from fiscal years 2013 through 2018. We excluded from our analysis those projects that encompassed solely administrative and monitoring and evaluation activities and costs that did not provide technical assistance, although we included the funds allocated for these projects in our analysis of funds allocated by each agency for projects that supported prosperity, governance, and security. We assessed the reliability of the data that agencies reported for these projects. We requested and reviewed information from agency officials regarding the underlying data systems and the checks and reviews used to generate the data and ensure its accuracy and reliability. We also conducted logical checks and analysis to confirm the accuracy of the data. When we found potential duplicate data and discrepancies, we contacted relevant agency officials in Washington, D.C. and obtained information from them necessary to resolve these data issues. As a result of these steps, we determined that the data were sufficiently reliable for the purposes of reporting the number of projects that supported prosperity, governance, and security in El Salvador, Guatemala, and Honduras and funding allocations for these projects from fiscal years 2013 through 2018. To select a subset of the projects to review, we reviewed agencies’ project information as well as Strategy documents to categorize all projects into 18 different sectors of assistance that generally aligned with the current objectives of the Strategy. Specifically, we grouped similar projects by sector such as economic growth, justice reform, and community based violence prevention, and aligned them according to the Strategy’s three objectives of prosperity, governance, and security. We requested that officials from State, USAID, DOD, and USDA review our analysis to confirm our alignment of projects to the sectors and the three objectives. We incorporated revisions from agency officials as appropriate. We then selected a judgmental, nongeneralizable sample of six of the 18 sectors for an in-depth review of performance-related documentation for projects supporting each of the objectives. The six sectors selected included agricultural development, economic growth, good government service, justice reform, community based violence prevention, and professionalize the military and develop defense capabilities. We selected these six sectors to achieve variation by agency, funding allocation amount, country, and to include projects supporting each of the three objectives. Specifically, we selected the six sectors to include two sectors supporting each objective, a distribution of projects across the three Northern Triangle countries, and the largest amounts of allocated funding and number of projects. We excluded from our sample selection the migration and police reform sectors because of our ongoing work in those sectors concerning the Northern Triangle. To determine what is known about project results, we reviewed agency performance-related documents corresponding to the 190 projects implemented from fiscal years 2013 through 2018 in the six sectors we reviewed. Specifically, we examined State and USAID’s Performance Plans and Reports for El Salvador, Guatemala, and Honduras for each of fiscal years 2013 through 2018; State’s International Narcotics Control Strategy Reports for fiscal years 2013 through 2018; State and USAID’s Progress Report for the U.S. Strategy for Central America’s Plan for Monitoring and Evaluation for fiscal years 2018 and 2019; and State’s quarterly country cables reporting on agencies’ progress in implementing projects in support of prosperity, governance, and security objectives in each of the Northern Triangle countries for the available quarters of fiscal years 2016 through 2018. We also requested and reviewed all 23 evaluations completed from fiscal years 2013 through 2018 by State, USAID, and USDA related to the six selected sectors in each Northern Triangle country. In addition, we selected a nongeneralizable sample of 19 projects within the six selected sectors to gain more in-depth information and context about project implementation and results. For the nongeneralizable sample of projects, we reviewed performance-related documentation, including, among other things, implementing partners’ quarterly, semi-annual, and annual progress reports, to examine project results. We selected the19 projects based on a variety of criteria, including the types of project activities and the objectives they supported, as well as to obtain a range of funding allocation amounts, countries, and agencies. We excluded from our sample selection those projects that encompassed solely administrative and monitoring and evaluation activities and costs, and those that agencies reported as pilot projects not yet implemented. To examine what is known about progress toward the Strategy’s objectives, we reviewed Strategy documents, including monitoring and evaluation plans, to assess if they included key elements of effective strategies that we have identified as related to assessment of progress toward strategic goals. We developed these elements on the basis of prior work related to U.S. government strategies and interagency collaboration as well as prior work on addressing fragmentation, overlap, and duplication in the federal government. Our prior work suggests that strategic documents offer an opportunity to consider the roles and responsibilities of various stakeholders involved in achieving those goals, and information on how progress toward those goals will be measured. The Strategy documents were reviewed and rated by two analysts to determine the extent the planning and reporting procedures aligned with the key elements for foreign assistance strategies in situations where multiple agencies work together to deliver foreign assistance. These elements related to (1) delineation of agencies’ roles and responsibilities and coordination mechanisms; and (2) assessment of progress toward strategic goals, including identifying activities to achieve results, performance indicators, and monitoring and evaluation plans. Additionally, in assessing the monitoring and evaluation plan, we considered the Standards for Internal Control in the Federal Government, which specify that managers should identify the information needed to achieve objectives and use such information to evaluate performance in achieving objectives. To determine State and USAID’s rationale for not including other agencies’ activities that support the objectives of the Strategy, we met with State and USAID officials in Washington, D.C. We also reviewed relevant Strategy documents and Congressional legislation, particularly Public Law 115-31, 131, the Consolidated Appropriations Act, 2017, which State and USAID cited as the basis for the creation of the Strategy’s results architecture and monitoring and evaluation plan. To support our work on all three objectives, we conducted fieldwork in El Salvador, Guatemala, and Honduras. During the fieldwork, we observed selected project activities, and interviewed agency officials, implementing partners, and project beneficiaries about the project activities and results, and factors that affected project results. We also interviewed agency officials in Washington, D.C. from relevant State bureaus, USAID, DOD, and USDA Foreign Agricultural Service as well as officials of the U.S. Southern Command in Doral, Florida about project activities, project results, factors affecting results and actions to address these factors, as well as efforts to monitor and evaluate project results. We conducted this performance audit from December 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate, evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides a summary of information on U.S. Agency for International Development (USAID), and the Departments of State (State), Defense (DOD), and Agriculture (USDA) assistance projects in the three Northern Triangle countries—El Salvador, Guatemala, and Honduras—to support the prosperity, governance, and security objectives of the U.S. Strategy for Central America (Strategy) from fiscal years 2013 through 2018. We provide a summary of information for the following sectors we selected by country, agency, funding allocation amount, and objective of the Strategy. The sectors include economic growth, agricultural development, good government service, justice reform, community based violence prevention, and professionalize the military and develop defense capabilities. For each sector, we provide an overview and examples of projects, including project objectives, activities, and results that State, USAID, DOD, and USDA reported toward improving prosperity, governance, and security in the Northern Triangle. The information about each sector also includes the following data, selected to illustrate the scope of U.S. assistance in each sector and the underlying conditions that impact prosperity, governance, and security in the Northern Triangle: Total number of projects: The total number of projects we identified that supported each sector in each country from fiscal years 2013 through 2018. Approximate Reported Funding: An estimate of the total allocated funding reported for the projects in each sector. Context Indicators: Data reported from various organizations relevant to each of the sectors, including the World Bank, and reported in State and USAID’s Progress Report for the Strategy for fiscal years 2018 and 2019. We did not independently verify these reported data. Economic growth projects are intended to assist populations living below the poverty line meet basic needs, help businesses improve their business practices and access markets and investment, and promote workforce development. USAID and State implemented 26 economic growth projects in the Northern Triangle from fiscal years 2013 through 2018. industries and higher education institutions to develop educational programs and research. The project trained 100 researchers at universities on how to complete applied research studies on the economy. This training, along with 26 applied research studies funded by the project, allowed for collaborative research between academia and the private sector that had not previously existed in El Salvador. The project also upgraded or created 28 new degree programs to align with industry demands. The project awarded 900 scholarships to students enrolled in these degree programs. A USAID project in Honduras provided assistance to rural micro- enterprises to improve their access to markets and competitiveness. The project helped 2,270 of these enterprises adopt new inputs, technologies, and practices for a range of entrepreneurial activities, such as installing solar panels and cultivating organically grown coffee, according to an evaluation. It also helped micro-enterprises achieve certifications from trade and business associations to help them access new markets with higher quality standards to obtain better prices for products, such as high quality chocolate. A USAID project in El Salvador encouraged public-private partnerships and provided funds to help municipalities mobilize financial resources for improving economic development. It also intended to help municipalities streamline their administrative procedures to improve the local business climate. The streamlined procedures reduced the time required to complete business processes and diminished the chances for bribery and other illegal practices, according to an evaluation. A USAID project in El Salvador targeted over 10,000 micro- enterprises and 20 local governments to strengthen the capacity of providers of business development services to help these micro- enterprises improve innovation and technology, access financing, and increase exports. According to an implementer progress report, the project provided trade capacity building assistance to at least 369 micro-enterprises to help them export. It also trained at least 491 entrepreneurs and 14 business consultants to develop export opportunities. A USAID project in El Salvador offered assistance to help workers obtain employment. It provided training to more than 5,600 individuals, including at-risk youth and disabled persons, to improve their job placement opportunities, according to an evaluation. The project also placed 4,886 participants in new or improved jobs. The evaluation also noted that the firms participating in the project reported that the project’s methods reduced their recruiting and hiring costs and risks and contributed to a decrease in employee turnover. A USAID project in Honduras installed irrigation systems to grow lettuce and other crops. Agricultural development projects are intended to assist farmers to increase the quantity and quality of crops through training, research, and better access to capital. They also sought to assist farmers to gain access to markets and address food security. USAID and USDA implemented 40 agricultural development projects in the Northern Triangle from fiscal years 2013 through 2018. Rural Population (Approximate percent of total population, 2017) Rural Poverty (Approximate percent of rural population, 2014) productivity and expand trade. The project provided training to more than 500 individuals, approximately 99 percent of whom reported using the lessons they learned to improve their farm management practices, according to an evaluation. In addition, approximately 97 percent of them reported that they made business decisions based on economic considerations or analysis following the training. The project provided 35,215 microfinance loans, valued at approximately $37.5 million. Approximately 82 percent of the beneficiaries reported an increase in agricultural production and approximately 88 percent reported an increase in business sales because of the loans, according to an evaluation. Although the evaluation noted that the loans had the potential to expand agricultural trade, the effects were mixed. A USDA project in Guatemala that provided school meals doubled the number of schools that reported having access to food in six municipalities and provided more than 40,400 school-age children with daily meals, according to an evaluation. The evaluation also reported that the reduction in hunger from the project contributed to a decline in absentee rates for students at the participating schools, from 20 percent before its implementation to 5 percent. The project also constructed or rehabilitated kitchens at 106 schools and provided utensils and equipment for preparing food. A USDA school feeding project in Honduras provided meals to more than 50,000 children in 1,047 schools. The project also conducted education campaigns using local media to inform the population about the importance of education and the steps for enrolling children in school. Following the project’s implementation, school attendance for boys increased by approximately 6 percent and for girls by approximately 2 percent, according to an evaluation. USAID projects in Guatemala that aimed to help small farmers improve their farming practices and gain access to markets had mixed results. For example, the evaluation noted that per capita incomes or household incomes of municipalities included in the projects fared worse than municipalities that were not. However, municipalities included in the projects fared better in access to electricity and rates of home ownership. Municipal watershed reforestation project in Guatemala supported by USAID. Good government service projects are intended to increase the effectiveness, efficiency, accountability, and transparency of government services and institutions. They do so by providing training and technical assistance to improve revenue collection and management, promote transparency and citizen oversight, and enhance the quality of government services. USAID funded 29 good government service projects from fiscal years 2013 through 2018. Government effectiveness (est.): (Percentage points changed 2013 to 2017) government services to better respond to citizen needs. An evaluation noted that the project helped draft stronger decentralization laws, but these were not passed due to lack of political will. The evaluation also reported the project provided technical assistance and training to municipal governments on revenue collection, fiscal management, and financial software systems intended to help raise revenue. However, the evaluation also found that 39 percent of municipalities reported decreases in fiscal autonomy. The evaluation also cited resource constraints, data inconsistencies in income records, and concerns about the sustainability of the training. A USAID project in Guatemala sought to strengthen select municipalities to better manage public resources and deliver services in a efficient and transparent manner in order to foster development. According to the project’s 2017 annual report, 76 percent of the target municipalities increased their average monthly revenues by 19 percent following finance management trainings. A USAID project in El Salvador aimed to improve government transparency and accountability. It did so by supporting citizen oversight and government compliance with regulations and standards related to transparency, professionalism, and ethics. According to a 2018 implementor monitoring report, the project met a majority of its expected performance goals. In addition, 11 of the targeted municipalities noted in their self-assessments an increased capacity to provide access to information and promote ethics in their institutions. US-provided forensic equipment at a criminal forensic lab in Honduras. Justice reform projects are intended to provide training, equipment, and technical assistance to the justice system to decrease impunity, combat corruption, improve prosecution and forensic capacities, and increase the efficiency and management of courts. USAID and State implemented 42 projects in justice reform from fiscal years 2013 through 2018. Percentage of the Population with Trust in the Courts: (Percentage points change, 2014 and 2018) transparency, accountability, and ethics, and increase civil society participation in government through technical assistance and training. An evaluation found that the project increased awareness of these topics, and led to some improvements in laws and regulations, such as improving the legal framework for anti-corruption efforts. However, the project was unable to achieve any significant changes intended due to lack of political will. A State project in Honduras implemented activities that sought to reduce violence and homicide by increasing access to justice, strengthening institutions and local organizations’ capacity to deliver legal and support services for victims of violence and rehabilitation and reintegration services for prisoners. A mid-term evaluation found that the project successfully convened stakeholders to discuss women and children’s access to justice and carried out a campaign to disseminate information on human rights and access to justice. The evaluation also found the project helped maintain, but not increase rehabilitation and reintegration services for prisoners. El Salvadoran police meeting with youth in a police athletic league. Community based violence prevention (CBVP) projects are intended to reduce the levels of crime and violence, including addressing some of the root causes of insecurity. USAID and State implemented 31 CBVP projects from fiscal years 2013 through 2018. These projects sought to support anti-gang education, employment opportunities for at-risk youth, and efforts to increase institutional capacity and citizen responsibility for crime prevention in municipalities plagued by violence. aimed at increasing access to comprehensive, long-term social, education, and health services for high-risk populations. As part of these efforts, 242,029 individuals participated in U.S. government- funded gang prevention and education programs in Honduras in fiscal year 2017. USAID projects in Honduras worked with civil society organizations to provide violence prevention services with a focus on vulnerable populations. In fiscal year 2018, USAID reported that 202 people received U.S. government-funded gender-based violence services, including health, legal, and counseling services. Percentage of the Population Who Feel Safe Walking in their Neighborhood at Night: (Difference in percentage points, 2014 and 2017) A USAID project in Honduras sought to lower rates of homicide and other violent crime through alliances of communities and government institutions, especially the police. A mid-term evaluation of the project reported significant decreases in homicide rates, ranging from 42 percent to 68 percent, in three of the six communities where USAID targeted its assistance. A USAID project aimed to improve educational options for out-of- school youth by offering them alternatives to criminal and gang activity. An evaluation of the project reported that more than 90 percent of the more than 15,000 individuals who enrolled in school did not pass exams to demonstrate competency at the end of courses. The evaluation further noted that 30 percent of the youth did not remain in school, which likely resulted in a small fraction of them meeting the goal of increasing their income. Honduran Special Forces demonstrate U.S. training. Projects to professionalize the military are intended to increase the acountability, competency, and capabilities of militaries in the Northern Triangle. DOD and State implemented a number of these activities from fiscal years 2013 through 2018. The projects provided military equipment and training to military personnel and technical assistance to Ministry of Defense personnel. Policy and a budgeting system for its Ministry of Defense that supports transparency and accountability. Total Number of US Trained Personnel at National Leadership Levels: (Fiscal year 2018) An After Action Report of a DOD Defense Governance workshop in Guatemala noted that DOD continued to support the Guatemalan Ministry of Defense to identify national policy and strategy priorities, determine capabilities, and develop a data-driven approach to problem solving and making decisions on resources. A DOD report noted that DOD training in El Salvador that focused on fighting corruption had improved relations between military and civilian institutions. Andrade Costa, Melissa, and Irene García Palud, Evaluation Report: Mid- term Evaluation of the Program, “Reducing Violence and Homicide Through Access to Justice in Chamalecón, Satelite, and Rivera Hernández Neighborhoods of San Pedro Sula, Honduras”, August 2018. USAID/El Salvador Monitoring, Evaluation and Learning Initiative. Final Performance Evaluation of the Higher Education for Economic Growth Activity, May 17, 2018. DevTech Systems, Inc. Programa de Monitoreo y Evaluación: Evaluación final del Poyecto Cadenas de Valor Rurales (PCVR), August 2017. Mendéz England and Associates, Evaluación de Desempeño de Medio Término de la Actividad de Educación para la Niñez y Joventud 2011- 2017, August 2017. Management Systems International, A Tetra Tech Company. Performance Evaluation of the Partnership for Growth in El Salvador, March 20, 2017 (Revised July 24, 2017). Asociación de Desarrollo Organizacional Comunitaria (ADOC). Mid-term Evaluation of the Investment for Educational Development of the Highlands (IDEA) Project, Save the Children/USDA, 2016. Advisem Services, Inc. Final Evaluation Report: Final Evaluation of FINCA’s Food for Progress (FFPr) in El Salvador, November 30, 2016. The Cadmus Group, Inc. Performance Evaluation of USAID/Honduras Proparque Program, June 2016. Boston College School of Social Work, Final Evaluation Report: Food for Education (FFE) Project – USDA Catholic Relief Services (CRS) Honduras, April 2016. Khanti, S.A. Project Concern International, Food for Education II, Mid- term Evaluation Final Report, December 2015. Boston College School of Social Work. Mid-term Evaluation Report: Food for Education “Learning for Life” Guatemala, October 2015. Social Impact, Inc. Honduras Convive! Mid-term Evaluation Report, July 10, 2015. DevTech Systems, Inc. Final Evaluation of the USAID/Alianzas Project, December 12, 2014. Optimal Solutions Group, LLC. Partnership for Growth: El Salvador– United States (2011-2015), Mid-term Evaluation Final Report, September 30, 2014. DevTech Systems, Inc. Informe final Evaluación del Proyecto Apoyo en Políticas y Regulaciones para el Crecimiento Económico de Guatemala (PRS), September 20, 2014. Optimal Solutions Group, LLC. Final Report: Does Assistance to Farmers Translate into Community Welfare Improvements? Non-Experimental Program Evaluation of USAID Assistance to Smallholder Farmers in Guatemala, August 18, 2014. Notre Dame Initiative for Global Development. Food for Education Mid- term Evaluation, July 2014. Democracy International, Inc. Final Report: Mid-term Performance Evaluation of the Transparent Local Governance and Improved Service Delivery Project (USAID/NEXOS) and the Decentralized Enabling Environment Project (USAID/DEE), May 2014. International Business and Technical Consultants, Inc. Evaluation Report: Final Performance Evaluation of the USAID Municipal Competitiveness Project in El Salvador, January 29, 2014. Development Training Services, Inc. Report on the Mid-term Performance Evaluation of the USAID Transparency and Governance Project El Salvador, December 24, 2012. Rivera Cira Consulting, Inc. USAID/Guatemala Final Performance Evaluation for the Project Against Violence and Impunity (PAVI), December 20, 2012. Amex International and DevTech Systems, Inc. USAID/Guatemala Mid- term Performance Evaluations for Two Economic Growth Office Projects, October 25, 2012. International Business and Technical Consultants, Inc. Performance Evaluation of the “Improving Access to Employment Program in El Salvador”. October 17, 2012. The Department of State (State) and the U.S. Agency for International Development (USAID) produced the results architecture for the U.S. Strategy for Central America (Strategy). The results architecture presents the desired end-state of the Strategy; the three primary objectives of prosperity, governance, and security; and sub-objectives that support each of the primary objectives. State and USAID defined the Strategy’s mission as to secure U.S. borders and protect U.S. citizens by addressing the economic, governance, and security drivers of illegal immigration and illicit trafficking, and to promote private sector investment in Central America. The result architecture’s overall objective is an economically integrated Central America that is fully democratic; provides economic opportunities to its people; enjoys more accountable, transparent, and effective public institutions; and ensures a safe environment for its citizens. The Strategy’s prosperity objective is to work with Central American governments to improve the business environment, create jobs, enhance food security, expand energy security, and increase U.S. investment and trade. The Strategy’s governance objective focuses on reducing impunity and corruption through the creation of more transparent, efficient governments that deliver services, including justice, effectively. The Strategy’s security objective includes enhancing citizen security, re-establishing state presence and security in communities at risk, scaling up violence prevention and law enforcement activities in communities, and targeting individuals most susceptible to gang recruitment. Figure 10 depicts the overall summary of the Strategy’s results architecture, which focuses on the objectives of prosperity, governance, and security. 1. We are not recommending that State direct DOD and USDA to monitor and evaluate projects, but rather that State collaborate with DOD and USDA to develop a more comprehensive approach to monitoring and evaluating projects that support the Strategy’s objectives and that State document the results of this collaboration in the Strategy’s monitoring and evaluation plan. We do not prescribe the format or content for how the Strategy’s monitoring and evaluation plan might be updated. We have modified relevant sections of our report and our recommendation to make this clearer and directed the recommendation to the Secretary of State, since State coordinates implementation of the Strategy by the various agencies of the U.S. government. We found that DOD and USDA have designed and implemented programs that directly support the objectives of the Strategy. While we acknowledge that some coordination among agencies occurs in Washington and in the Northern Triangle, we found that such coordination does not formally extend to monitoring and evaluation. We believe that our recommendation encourages greater coordination among agencies, including DOD and USDA, by ensuring that monitoring and evaluation efforts by U.S. government agencies are in sync with the monitoring and evaluation plan for the Strategy. Excluding DOD and USDA projects from the monitoring and evaluation plan for the Strategy will continue to result in an incomplete or unclear understanding of the results of U.S. assistance in the Northern Triangle. Without a complete and clear understanding of the results across all agencies involved, agencies may miss important lessons about the types of assistance that are effective in achieving U.S. objectives in the region, potentially limiting overall progress. 2. While the explanatory statement accompanying Pub. L. No. 114-113 directs State, in coordination with USAID, to develop a monitoring and evaluation plan for funds appropriated to them, we are recommending that State, as coordinator for the implementation of the Strategy, work with the other agencies to develop a more comprehensive approach to monitoring and evaluating projects that support the Strategy’s objectives, and that they utilize the monitoring and evaluation plan that they have already created in response to the congressional direction as a place to document the comprehensive approach to monitoring and evaluation. 3. We chose to review all agencies that have allocated a significant amount of funding from their appropriations to implement projects in support of prosperity, governance, and security objectives in the Northern Triangle. State, USAID, DOD, and USDA officials confirmed that DOD and USDA projects support the objectives of the Strategy, and we believe that the inclusion of these agencies enhanced the accuracy and completeness of our reporting on the results that have been achieved from U.S. assistance as well as the gaps in the current monitoring and evaluation approach and implications for State’s ability to assess results comprehensively. 4. We believe our inclusion of projects implemented from fiscal years 2013 through 2018 provided a reasonable time frame for our review because it includes projects that supported the objectives of improving prosperity, governance, and security—long standing objectives of U.S. assistance to the Northern Triangle that predated appropriations for the Strategy, and even the Strategy itself. Including projects implemented between fiscal years 2013 and 2018 increased our ability to report on the results of agencies’ projects and their overall progress toward the Strategy’s objectives because projects funded since fiscal year 2016 were in too early a stage of implementation to report meaningfully on such results. However, we considered, as appropriate, any results information we were able to obtain on such projects. 5. We acknowledge that the precision of our estimates for reporting on funding allocations was limited due to the inconsistent nature of reporting of financial data by different bureaus and agencies. However, taking into consideration qualifications noted throughout our report, we believe that our reporting of funding allocations provides a reliable description of how agencies used allocated funding from fiscal years 2013 through 2018 to support prosperity, governance, and security objectives in the Northern Triangle. 6. We believe that our classification of projects under the different sectors we identified enabled us to provide a more detailed, comprehensive, and meaningful analysis of projects and related results. Because some of the sub-objectives that State and USAID developed, such as “reduce poverty,” were very broad and did not lend themselves to an analysis of specific project sectors that supported the Strategy’s objectives, we identified more specific sectors, including health, economic growth, and agricultural development. State and USAID officials validated the accuracy of our definitions, and we revised them as appropriate, given input from agency officials. 7. Our selection of six sectors for in-depth review of projects and results limits the generalizability of our findings to all sectors, which we note. Due to the large number of projects, sectors, and sub-objectives associated with U.S. assistance to the Northern Triangle, we determined that a case study approach was the most effective methodology for our review. We devised selection criteria for our case study to reflect a meaningful selection of projects supporting each of the three objectives across a range of sectors, agencies, and countries. Moreover, two of the sectors we selected for in-depth review—community based violence prevention and justice reform— encompass several projects classified as relating to “reducing violence at the local level,” and “reducing the influence of organized crime and gangs.” Thus our report addresses results in these sectors. We omitted projects relating to police professionalization, in part, because we had ongoing work related to this sector. We acknowledge limitations with this case study approach and do not attempt to generalize results beyond the sectors we reviewed, but we believe our methodological approach provided a reasonable basis for our overall conclusions. 1. We eliminated the recommendation to USAID because State plays a coordinating role in the Strategy’s implementation and is well positioned to work collaboratively with officials of other agencies, including DOD and USDA. We believe our recommendation to State, in which we recommend that they work with USAID, encourages greater coordination among agencies, including DOD and USDA, to ensure that their efforts are included in a comprehensive monitoring and evaluation plan for the Strategy. 2. We believe our inclusion of projects implemented from fiscal years 2013 through 2018 provided a reasonable time frame for our review because it included projects agencies implemented to support the long standing objectives of prosperity, governance, and security in the Northern Triangle—objectives that the U.S. government has supported under various initiatives that predated the Strategy and appropriations for the Strategy. Furthermore, including projects implemented between fiscal years 2013 and 2018 increased our ability to report on the results of agencies’ projects and their overall progress toward prosperity, governance, and security because projects funded since fiscal year 2016 were in too early a stage of implementation to report meaningfully on results. However, we considered, as appropriate, any results information we were able to obtain on such projects. 3. We requested and reviewed all USAID evaluations completed during the time frame for our review—from fiscal years 2013 through 2018 or October 2012 through September 2018—to gain insight into the results of projects supporting the long standing U.S. assistance objectives of prosperity, governance, and security in the Northern Triangle. While we reviewed four evaluations that USAID completed at the beginning of fiscal year 2013, as shown in appendix III, three of these were mid-point evaluations of ongoing projects that continued implementation in fiscal years 2013 and 2014, during the time frame for our review. Although we reviewed one final evaluation of a project that had ended prior to the beginning of fiscal year 2013, the evaluation was a key aspect of the project’s implementation and lessons learned, which provided information pertinent to future USAID programming in the areas of justice reform and security. Furthermore, while our report noted examples of actions that agencies took in response to challenges to achieving progress toward prosperity, governance, and security, analysis of actions taken in the design of specific projects based on the findings and recommendations of the evaluations we reviewed was outside the scope of our review. 4. We believe that our classification of projects under different sectors we identified provides a detailed, comprehensive, and meaningful analysis of projects and related results. Because some of the sub- objectives developed by State and USAID, such as “reduce poverty,” were very broad and did not lend themselves to an analysis of specific project sectors that supported the Strategy’s objectives, we identified more specific sectors, including health, economic growth, and agricultural development. State and USAID validated the accuracy of our definitions, and we revised them as appropriate, given input from agency officials. We acknowledge that our selection of a judgmental sample of six sectors for in-depth review of projects and results limits the generalizability of our findings to all sectors, which we noted throughout our draft report. However, due to the large number of projects, sectors, and sub-objectives associated with U.S. assistance to the Northern Triangle and the extensive amount of documentation to obtain and analyze for each project, we determined that this case study approach was the most effective methodology for our review. We devised our selection criteria for our case study to reflect a meaningful selection of a significant number of projects across objectives, sectors, agencies, and countries. We do not believe that omitting some sectors from our in-depth review limited the credibility of the findings of our report. 5. We believe that the use of data on the achievement of annual targets is a valid approach to assessing project results, although the agencies collecting the data may also intend to use it in making decisions about the progress of ongoing projects. These data were only one element of our analysis. We also analyzed data and information from USAID implementer progress reports, mid-point and final evaluations, and other performance reports, which provided a longer-term perspective on results. Collectively, we believe that this information provided meaningful insight into the successes and shortcomings of the projects in the sectors we reviewed. Our report acknowledges that agency officials described progress and challenges to achieving the prosperity, governance, and security objectives, as well as the steps taken to modify projects to address such challenges. However, such modifications fell outside the scope of our analysis of results, absent documentation of the specific impact of such modifications on the achievement of objectives. 6. We reviewed completed evaluations to provide insight into project results, but excluded ongoing and planned evaluations because conclusions about project results are not available until such evaluations are completed. Similarly, our draft report acknowledged that agency officials described progress and challenges to achieving the prosperity, governance, and security objectives, as well as the steps taken to modify projects to address such challenges. However, such modifications fell outside the scope of our analysis of results, absent documentation of their specific impact on the achievement of prosperity, governance, and security objectives. 1. We believe that the inclusion of DOD projects significantly enhanced the accuracy and completeness of our reporting on the projects that the U.S. government has implemented in the Northern Triangle from fiscal years 2013 through 2018, and the important lessons learned from these projects on progress toward the Strategy’s objectives. State and DOD officials confirmed that DOD has designed and implemented projects from its appropriation that support the security objective of the Strategy in the Northern Triangle. Furthermore, we are not recommending that State and USAID specify how DOD monitors and evaluates such projects, but rather that State and USAID collaborate with DOD to specify a comprehensive approach to the monitoring and evaluation of projects across all agencies that directly support the Strategy’s objectives. Excluding DOD projects from the monitoring and evaluation plan for the Strategy could result in an incomplete or unclear understanding of the results of U.S. assistance in the Northern Triangle. Without a complete and clear understanding of the results across all agencies involved, including DOD, agencies may miss important lessons learned about the types of assistance that are most effective in this region, potentially limiting overall progress. In addition to the contact named above, James Michels (Assistant Director), Bradley Hunt (Analyst-in-Charge), Sophie Broach, Jon Fremont, Kayli Westling, Pedro Almoguera, Neil Doherty, Mark Dowling, Justin Fisher, Christopher Mulkins, Zamir Ruli, Aldo Salerno, and John Villecco made key contributions to this report.", "summary": "The United States has provided assistance to the Northern Triangle of Central America for many years to address poverty, weak governance, and insecurity. Introduced in 2014, and updated in 2017, the U.S. Strategy for Engagement in Central America (Strategy) supports the objectives of improving prosperity, governance, and security. State coordinates implementation of the Strategy's objectives among agencies. This report examines: (1) the projects the U.S. government has implemented from fiscal years 2013 through 2018 to support the Strategy's objectives in the Northern Triangle, (2) what is known about project results, and (3) what is known about progress toward the objectives. GAO reviewed results for a subset of 190 projects in a nongeneralizable sample of six sectors selected based on funding, country, and objective; analyzed Strategy documents and key elements of effective strategies; interviewed officials; and conducted fieldwork in the Northern Triangle. To support their prosperity, governance, and security objectives, the Departments of State (State), Defense (DOD), Agriculture (USDA), and the U.S. Agency for International Development (USAID) allocated about $2.4 billion from fiscal years 2013 through 2018 for 370 projects in the Northern Triangle—El Salvador, Guatemala, and Honduras. USAID and State implemented most of these projects, with some supporting more than one sector and objective. For example, USAID implemented projects to address poverty, while State trained prosecutors and police to address governance and security needs. State, USAID, and other agencies reported mixed results for the 190 projects in the six sectors GAO reviewed. For example, in fiscal year 2018, USAID assisted 1,376 individuals in workforce development programs in Guatemala, exceeding the target of 1,000, while it assisted 651 individuals in Honduras, falling short of the target of 5,000. State and USAID trained 12,557 justice system personnel in the Northern Triangle, exceeding the target of 2,275. USDA rehabilitated school kitchens in Honduras as part of its school feeding program. DOD helped Guatemala establish a budget system to increase accountability for military funds, but DOD reported persistently low public trust in Northern Triangle militaries. Limited information is available about how U.S. assistance improved prosperity, governance, and security in the Northern Triangle. Agencies generally reported more information about progress toward prosperity than toward governance and security, in part because evaluations were conducted unevenly across agencies and sectors. In addition, project implementers did not consistently collect key information needed to evaluate progress, but officials noted improvements. Nevertheless, agency officials described examples of progress through technical assistance, and noted challenges, such as drought. GAO has reported that development of a monitoring and evaluation plan is key to assessing agencies' common goals and objectives, and mutually reinforcing results. While State has a monitoring and evaluation plan for the Strategy, the plan does not include activities by DOD and USDA that support the Strategy's objectives and thus does not establish a comprehensive approach to assessing progress. GAO recommends that State collaborate with DOD and USDA to develop a comprehensive approach to monitoring and evaluation of projects that support Strategy objectives. State did not concur, citing lack of authority to direct other agencies' actions. GAO modified the recommendation to clarify that a collaborative effort would allow State to include information about all relevant projects as it evaluates progress under the Strategy as discussed in this report.", "document_type": "gao"}
{"report": "School-age children can access the internet in a number of ways. Their households may subscribe to in-home fixed internet, which is generally provided by cable television or telephone companies. School-age children, and other users, can connect a variety of devices to in-home fixed service through a wired connection or a Wi-Fi connection. They may also access the internet through mobile wireless service, which is provided through cell towers, with data transmitted over radio frequency spectrum. Mobile service providers usually sell internet access as an option in mobile telephone-service plans. A number of devices may connect to mobile wireless, such as smart phones, tablets, and mobile devices that enable laptops to connect to mobile wireless service. Finally, school-age children and others may access the internet outside the home through other ways, including publicly available Wi-Fi access at places such as libraries and coffee shops. FCC has found that Americans in lower-income areas are less likely to have access to both in-home fixed and mobile wireless internet than those in higher-income areas. Similarly, according to our analysis of data from the November 2017 CPS: Computer and Internet Use Supplement, among all school-age children, those in lower-income households are less likely to use the internet at home than those in higher-income households (see fig. 1). A number of factors explain the digital divide, or the varying levels of access among different populations. For example, as we have reported in the past, rural areas tend to have conditions such as low population density or difficult terrain that can increase the costs for internet providers to deploy and maintain internet networks. Furthermore, lower-income households with access to the necessary infrastructure for internet service may not be able to afford it. (See fig. 2.) While some in-home fixed internet providers offer low-cost service for lower-income households with school-age children, according to a 2016 survey, an estimated 5 percent of households with school-age children ages 6 to 13 and incomes at or below the federal poverty guidelines had ever signed up for such programs. Lower rates of internet access by lower-income households may make it more difficult for school-age children in those households to do homework. According to a 2018 Pew Research Center survey, a higher percentage of surveyed teens in lower-income households said that the lack of a dependable computer or internet connection sometimes prevents them from finishing their homework compared to teens in higher- income households. In addition, according to the Consortium for School Networking, the lack of in-home access makes it more difficult for parents to support their children academically. Specifically, as much communication between schools and parents has moved online, the lack of access may make it difficult for parents to stay connected to teachers and be informed about school notices, homework assignments, and other important information. FCC, which regulates commercial and other nonfederal spectrum, conducts activities that affect the ability of schools to address the homework gap. Specifically, it plays a role in expanding internet access by assigning licenses for Educational Broadband Service (EBS) spectrum, which permits schools and other eligible entities to transmit educational materials electronically. Currently, EBS license holders are allowed to lease excess capacity to others, including commercial wireless providers, for up to 30 years as long as the license holder has 20 hours of educational use per week per licensed channel and reserve the right to access 5 percent of the capacity for educational use. Schools that have such leases may need to wait years to regain full use of their EBS license. Furthermore, the last opportunity for school districts to apply for new EBS licenses was in 1995, and according to FCC, EBS licenses cover about half the geographic area of the United States, with rural areas west of the Mississippi River generally lacking licenses. However, FCC recently adopted a Report and Order with rules that, once effective, will change the eligibility requirements for EBS licenses, among other things. In addition, FCC supports internet investments at schools through the E- rate program, which provides discounts on telecommunications and internet access services, internal connections, and basic maintenance of internal connections. This program provides schools with higher percentages of lower-income students greater discounts on these services; for example, the most disadvantaged schools, where at least 75 percent of students are eligible for free or reduced price school lunch, receive a 90 percent discount. All services supported by the E-rate program must be used primarily for “educational purposes,” which FCC has defined as meaning “activities that are integral, immediate, and proximate to the education of students.” Education’s Office of Educational Technology also plays a role related to internet access for students by developing national educational- technology policies and providing guidance to schools and school districts on technology use in schools. For example, in January 2017 the office issued a letter to schools and school districts about Education grant funds that could be used to support the use of technology to improve instruction and student outcomes. It also issued a report in 2017 on the use of technology in schools; the report provided guidance on how to modernize the technology needed for digital learning, such as schools’ internet networks and internet-enabled devices. Education also collects, analyzes, and reports on a range of data from schools and school districts. For example, every year from 1994 to 2005 (except 2004 due to a lack of funding according to Education officials), the department collected data on internet access in schools and classrooms. In 2008, Education conducted three similar surveys at the district, school, and teacher levels on the availability and use of a range of educational technology resources, such as networks, computers, devices that enhance the capabilities of computers for instruction, and computer software. Due to a lack of funding, Education did not conduct additional similar surveys. However, the department recently finished administering a different survey effort, funded from different sources, that we discuss later in this report. According to our analysis of November 2017 CPS: Computer and Internet Use Supplement data, lower-income households with school-age children may be more likely than those in higher-income households to be reliant on mobile wireless service, such as through smart phones, for internet access. As seen in figure 3, among all households with school-age children, an estimated 22 percent with incomes of less than $25,000 per year use mobile wireless to access the internet but not in-home fixed high-speed internet service, in contrast to 8 percent with incomes of $75,000 or more per year. School-age children whose households only have mobile wireless internet access may face challenges in using it for homework, including: Device limitations. Students in mobile wireless-only households may have to rely on devices like smartphones that may not be well suited for academic tasks. A recent Pew survey found that an estimated 45 percent of teenagers in lower-income households say they sometimes have to do homework on a smartphone. However, most of the stakeholders we interviewed told us that smartphones are not adequate for doing homework for various reasons, including that they are too small for typing papers and that not all educational websites are compatible with smartphones. According to these stakeholders, other devices such as desktops or laptops are better suited for homework; however, among all school-age children, those in lower- income households are less likely than those in higher-income households to use these devices (see fig. 4). Data limitations. A majority of the stakeholders we interviewed said that wireless plans’ data caps—a limitation on the amount of data the subscriber can download and upload per month—could make it difficult for school-age children to do homework, because, for example, once the data cap is reached, the provider may decrease connection speeds or impose additional costs for further data use, which could hinder completion of homework. A 2016 survey found that an estimated 39 percent of lower-income households with school- age children—in this case those with incomes less than the federal poverty guidelines—had reached a data cap, compared to 25 percent of higher-income households. Varying service quality. Mobile wireless may be less reliable and slower than in-home fixed service, which can make doing homework more challenging. In 2018, FCC concluded that mobile wireless services are not full substitutes for in-home fixed service, because mobile wireless quality can be affected by user location, indoor obstructions, outdoor foliage, and weather, among other factors. In addition, we reported in 2015 that the availability and quality of mobile wireless service connections vary based on location and terrain. For example, according to officials with Albemarle County Public Schools in Virginia, while most students who participated in a recent survey indicate that they have mobile wireless internet access at home, that access may only offer poor quality connections and slow speeds due to mountainous terrain. As a result, mobile wireless access may have limited usefulness for homework purposes. A 2018 survey by the Pew Research Center found that about 20 percent of teens from lower-income households say that they sometimes have to use public Wi-Fi for homework given a lack of access at home. As shown in figure 5, stakeholders we interviewed and literature we reviewed identified a number of potential challenges students may encounter in using methods to access the internet outside the home to do their homework. The six selected school district projects we reviewed have taken various approaches to address the homework gap by providing wireless internet service to students who may lack access at home. Most of these projects provide wireless internet access to students who lack in-home fixed internet and do not necessarily limit it to students in lower-income households. In addition, all but one of these projects provide filtered access, meaning that students using these services are subject to the same usage restrictions as if they were on-site in school. Approaches included: Provide wireless hot-spot devices. The Green Bay Area Public School District in Wisconsin loans out mobile wireless hot-spot devices to students throughout the district who do not have access at home, providing them filtered internet access in their homes or elsewhere in the community. The hot-spot devices are available on loan from school libraries to any student who claims a need for one regardless of household income. Students may use district-issued Chromebooks or other internet-enabled devices, which then connect to the district’s internet resources via the hot-spot device using service provided by a commercial mobile-wireless provider. Build or use a private network. Some districts have built new or expanded existing networks to provide internet access to students using a variety of approaches. Albemarle County Public Schools in Virginia uses EBS spectrum to provide access to students in community centers in mobile home parks in this mountainous district where, according to school district officials, many students lack service at home. The district also plans to install wireless receiver devices in selected students’ homes through which those students will be able to connect internet-enabled devices via Wi-Fi. Desert Sands Unified School District in California also built out an EBS network to provide internet access to students who lack service at home. According to officials with that district, the benefit of this approach is that it involved only a one-time cost to build the network, rather than recurring annual payments to a commercial mobile-wireless provider for service. Two rural, low-income school districts in Virginia—Charlotte County Public Schools and Halifax County Public Schools—partnered with Microsoft to provide service through unlicensed white space devices (which operate on frequencies not being used by television broadcasters or 600 MHz wireless providers) to students who lack access at home, regardless of income . According to Microsoft, the use of unlicensed white space devices is a good solution to providing wireless access in rural areas where other technologies may be uneconomical and such frequencies tend to be available. Students who use this service receive a device that is installed in their home that wirelessly connects to the district’s network and transmits to other devices in the home via Wi-Fi. The Boulder Valley School District in Colorado allowed a local wireless provider to build antennas on some school buildings in order to serve its customers in exchange for providing free service to lower- income students, determined based on student eligibility for free or reduced price lunch. According to a school district official, the provider has installed antennas at three schools, providing access to students living within a 3-mile radius, and plans to install antennas at most remaining schools in the district. That official told us that this model may not work in many other school districts, as there may not be sufficient population density to make it economically beneficial for a commercial provider to agree to provide such service. Equip school buses with Wi-Fi. The Coachella Valley Unified School District, which covers a large geographic area in California where many students lack in-home fixed access, equipped its fleet of about 100 school buses with Wi-Fi in 2014, enabling students to do homework during long bus rides. A commercial mobile-wireless provider connected the Wi-Fi router on the bus to the district’s network. In order to access Wi-Fi on the buses, students had to use district-issued devices that they were allowed to bring home after school. The district also parked Wi-Fi-equipped school buses and other district vehicles overnight in neighborhoods with a high proportion of students who brought district-issued tablets home in order to provide access to students who likely lacked internet at home. However, the district stopped this initiative in 2017 due to limited funding and is now seeking out alternative funding sources to reactivate the program. While none of the projects described above used any funding from Education, the department has identified six existing grants that schools and districts could use under certain conditions to support internet investments, although not necessarily wireless investments specifically. While the purpose of each of these grant programs isn’t specific to internet investments, Education identified specific types of internet investments that these grant funds can be used for. We did not make a determination as to whether any of the grant funds could have supported the efforts we reviewed. Representatives of two of the school districts we met with stated that they would like to see additional information on Education grants that could be used to support internet investments. Education officials said the department has taken the first step to developing a strategy to share information about these grants by developing a coordinated communications strategy through its Office of Rural Engagement. They added that the department will then continue to build a broader strategy. Education is also finalizing data collection on a survey that will collect some data regarding the homework gap. As mentioned earlier, until 2008 Education collected survey data over a number of years about information technology and internet access in schools and classrooms. According to Education officials, the department stopped collecting such data due to a lack of funding. However, the department is now finalizing a survey that is collecting nationally representative data about public school teachers’ use of computers and the internet, and their knowledge of students’ access to computers and the internet outside the classroom. The survey is collecting data that pertain to the homework gap, including the extent to which schools provide wireless hot-spot devices to students to take home; the extent to which teachers think students access the internet outside of school, such as at home, libraries, or businesses; and the extent to which teachers think smartphones are useful for doing homework. According to Education, the department finished administering the survey in June 2019 and plans to release the results in April 2020. The survey data may provide Education and others, including FCC and Congress, with useful information that can inform policy and other decisions related to the homework gap, such as how best to support schools’ efforts to expand wireless access for underconnected students. FCC had a minor role in some of the school district projects by having previously granted EBS licenses to some districts that use EBS spectrum to provide wireless access. However, according to FCC documentation, many schools and school districts do not have EBS licenses—such as those in rural areas in the western United States—and some that have obtained a license now lease their capacity out on a long-term basis to commercial providers. As a result, school districts may be limited in using EBS to provide wireless access to students or have to take additional steps to use EBS. Desert Sands Unified School District officials said that the district did not have an EBS license and that the local license holder had leased it out to a commercial provider, so the district worked with that provider to build out its EBS network. Albemarle County Public Schools had leased out its EBS license to a commercial provider years ago, but because that provider was not utilizing that spectrum, the school district was able to reclaim it. FCC has taken recent steps that may affect the extent to which school districts are able to use EBS to provide wireless access. In May 2018, FCC issued a Notice of Proposed Rulemaking seeking comment on proposed changes to how it manages EBS to encourage and facilitate its efficient use. In July 2019, FCC adopted a Report and Order that makes a number of changes to the EBS spectrum and its use. Specifically, once effective, these rules will eliminate eligibility restrictions for EBS licenses and eliminate the educational use requirement of the spectrum. While FCC’s E-rate program supports schools’ connectivity by providing discounts for eligible services, program rules may limit the ability of schools and school districts to address the homework gap. Specifically, program rules specify that off-premises use of such services is not eligible for E-rate support and require that any off-premises traffic must be cost allocated out of school districts’ E-rate discounts. For example, any off- premises traffic supported by existing E-rate-supported products or services requires a reduction in the E-rate discount for those existing E- rate supported products and services. This reduction may increase costs for school districts as they would no longer receive all their potential E- rate discounts. Officials representing all six of the school district projects we reviewed suggested that program rules limiting eligibility for off- premises use and requiring cost-allocation may inhibit the ability of school districts to expand off-premises wireless access, and thus address the homework gap. For districts that do provide wireless access off-premises, E-rate program restrictions may still pose challenges. For example, according to an official with Desert Sands Unified School District, the district had to buy a separate line of internet access to avoid having that off-premises traffic travel through the district’s existing E-rate-supported network, which would have required cost-allocation and a reduction of the E-rate discount for that existing E-rate supported network. According to officials with Microsoft, Charlotte County Public Schools and Halifax County Public Schools had to separate their off-premises unlicensed white space device traffic from internet traffic that passed through E-rate-discounted access in the schools. An official with Boulder Valley School District said that the district had to terminate an earlier effort to extend access to students in a housing development after being told that it could not provide off- premises access with program-discounted equipment without cost- allocation. In September 2016, FCC issued a Public Notice requesting public comment on two petitions filed with the agency seeking to allow the petitioning school districts to use existing E-rate-program-supported services and equipment for off-premises access without having to cost- allocate that traffic out of their existing E-rate discounts. Cost allocating out that traffic would result in reduced E-rate discounts for school districts, and therefore higher costs, for existing services and equipment supported by E-rate. FCC rules allow parties to petition for waivers of rules if they can demonstrate that special circumstances warrant deviation from the existing rules and doing so serves the public interest. According to FCC officials, the petitions are pending and the agency has not yet taken further formal action on this Public Notice. The petitions are described in more detail below. In May 2016, the Boulder Valley School District filed a petition requesting a waiver of the cost allocation rules in order to use its E- rate-program-supported network to provide internet access to students at public housing facilities after school hours. In the petition, the district argued that because traffic on its E-rate program- supported network dramatically decreased after school hours, using that network to provide access during that time would not impose any additional costs on the E-rate program. Microsoft and others—including the school districts in Charlotte and Halifax counties—filed a petition in 2016 to obtain clarification that those school districts could provide wireless access to students’ homes for educational purposes by extending the districts’ existing E- rate-supported services using the districts’ unlicensed white space device network without cost allocating that traffic from the existing E- rate discounts. The petition stated that the infrastructure to provide service to unlicensed white space devices would not be funded with E-rate program funds, and that these districts were not well served by commercial internet providers. In comments filed with FCC, Microsoft argued that projects covered by both petitions would provide in-home access for students without imposing any additional costs to the E- rate program and that the projects would increase the productivity of E-rate by using existing resources more efficiently. Previously, FCC explored the possibility of making wireless off-premises access an allowable E-rate program expense—which would eliminate the requirement to cost-allocate such traffic—in a 2011 to 2012 pilot program. When establishing this pilot program, FCC noted commenter concerns regarding the potential administrative, legal, technological, and procedural challenges of expanding E-rate funding to off-campus premises. The pilot program provided funding from July 2011 to June 2012 and sought to “investigate the merits and challenges of wireless off- premises connectivity services” and to “gain a better understanding of operation and administrative issues associated with off-premises use and connectivity, as well as the financial impact on the E-rate program overall.” Furthermore, the pilot program sought to help FCC determine whether off-premises connectivity services “should ultimately be eligible for E-rate support.” FCC provided a total of $9 million in grants to 20 pilot-program participants—19 schools or school districts and one community library system—to implement projects enabling innovation in learning outside the boundaries of school buildings and the traditional school day, including those that provided off-premises wireless access and wireless devices to students. Recipients were not required to cost allocate the off-premises traffic as part of the pilot. FCC required all pilot participants to file interim and final reports that included information about project benefits, such as the extent to which students provided with wireless devices used them and the effect of increased internet access on academic outcomes; project costs; the effectiveness of measures to prevent project waste, fraud, and abuse, to filter content, and to ensure that students only used the devices for educational purposes; and lessons learned. According to FCC, those reports would allow it to assess the impact of selected pilot projects on the schools and to gather lessons learned that would help others implement similar projects in the future. In addition, FCC said it would evaluate the effectiveness of the pilot program to determine whether off- premises wireless access should be eligible for E-rate program support. While FCC received interim and final reports from most pilot participants, it did not determine a methodology for evaluating the data provided in those reports. Furthermore, FCC did not publish a report evaluating the effectiveness of the pilot program, including the potential costs, benefits, and challenges of off-premises wireless access to make a determination regarding whether off-premises access should be eligible for E-rate program support. Although the order establishing the pilot did not require FCC to determine an evaluation methodology and publish a formal analysis, according to FCC officials, staff reviewed the interim and final reports prior to the Commission adopting a 2013 Notice of Proposed Rulemaking that sought input on ways to modernize the E-rate program, including input on using E-rate-supported wireless hot-spots for community use. In two subsequent E-rate program modernization orders in 2014, the Commission did not expand the E-rate program’s support for off-premises access. FCC officials explained that given the changes in technology, costs, and student learning in recent years, the data collected from the pilot may have some limitations. FCC has not announced any plans to conduct another pilot program, and aside from its consideration of the petitions previously mentioned, FCC has not announced an intention to revisit whether off-premises wireless access should be eligible for E-rate support. Federal internal control standards state that agencies should use quality information to make decisions and communicate information to external parties. Specifically, agencies should collect data from reliable sources in a timely manner, process these data into quality information, and use that information to make informed decisions. Agencies should also communicate such information to external parties that can help the agencies achieve their objectives. Furthermore, in previous work we identified as pilot-program design best practices: determining a methodology for gathering and evaluating data, evaluating pilot results to make conclusions on whether to integrate pilot activities into broader efforts, and communicating with stakeholders—such as by publishing results. As discussed earlier, school districts we met with said that existing E-rate program rules that require cost-allocation of off-premises access to E-rate discounts limit their ability to address the homework gap and providing off-premises access remains a challenge for schools and school districts. Determining and executing a methodology for collecting and analyzing data on the potential costs, benefits, and challenges of making schools’ efforts to expand off-premises wireless access eligible for program funding could help inform FCC decisions regarding the two pending petitions and any future petitions. As petitions may only cover petitioning entities, determining and executing such a methodology could also help inform more widespread changes to E-rate rules regarding off-premises access that would affect all E-rate program recipients. FCC could collect such data through another pilot program or from school districts now providing off-premises wireless access. Publishing the results of this analysis could help FCC ensure that such information will be accessible to inform future related efforts and provide transparency to external stakeholders, including school districts. The differences in internet access—and therefore in the ease of doing homework—between school-age children in lower-income households and those in higher-income households that are more likely to be well connected has resulted in a “homework gap” that could inhibit the academic success of underconnected students. While school districts have made efforts to address the homework gap, such efforts may be inhibited by existing restrictions in FCC’s E-rate program. Although FCC explored the possibility of making wireless off-premises access an allowable E-rate program expense in a 2011 to 2012 pilot program, FCC’s lack of an analysis of the data it collected at the time or since then means that it may not have sufficient and relevant information to make a decision on pending petitions from local school districts regarding off-premises access. Determining the best way to collect and analyze data on the potential benefits, costs, and challenges of making off-premises wireless access eligible for E-rate program support; conducting such analysis; and publishing the results could provide relevant information and transparency to external stakeholders. Doing so could also enable FCC to make a determination on whether it would be appropriate to ease restrictions on off-premises access, a step that may give school districts more flexibility in addressing the homework gap. We are making the following recommendation to FCC: The Chairman of the Federal Communications Commission should determine and execute a methodology for collecting and analyzing data— such as conducting a new pilot program regarding off-premises wireless access or analyzing other data—to assess the potential benefits, costs, and challenges of making off-premises wireless access eligible for E-rate program support, and publish the results of this analysis. (Recommendation 1) We provided a draft of this report to FCC, Education, and the Department of Commerce for review and comment. FCC provided written comments, which are reproduced in appendix II. In these written comments, FCC stated that it agreed with our recommendation and noted steps it plans to take to assess the potential benefits, costs, and challenges of making off- premises broadband access eligible for E-Rate program support. FCC also provided technical comments, which we incorporated as appropriate. Education provided written comments, which are reproduced in appendix III and also provided technical comments that we incorporated as appropriate. The Department of Commerce reviewed our report and told us it did not have any comments. We are sending copies of this report to interested congressional committees, the Chairman of the FCC, the Secretary of Commerce, and the Secretary of Education. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives for this report were to examine: (1) challenges lower- income school-age children who lack in-home fixed internet face in doing homework that involves internet access and (2) what selected school districts are doing to expand wireless internet access for their students, and the federal role in such efforts. To examine challenges lower-income school-age children who lack in- home fixed internet face in doing homework that involves internet access, we analyzed data from the Census Bureau’s November 2017 Current Population Survey: Computer and Internet Use Supplement, which is sponsored by the National Telecommunications and Information Administration (NTIA). The Computer and Internet Use Supplement collected household information from all eligible Current Population Survey households, as well as personal information from household members age 3 and older. The supplement provided data about households’ computer and internet use, and about each household member’s use of the internet from any location during the previous six months. One member of a household was generally interviewed and answered questions on behalf of every other member. Interviews were conducted from November 12–18, 2017. The probability sample selected to represent the universe consisted of approximately 56,000 households. We included variables on ages of household members to determine if the household had one or more school-age children. We considered a household to have school-age children if it had any children between the ages of 6 and 17, an age range used in other analyses of internet use by school-age children, such as analyses by NTIA and Pew Research Center. We analyzed data on the use of in-home fixed and mobile- wireless internet, as well as of various computing devices. In our analysis we also included variables on household income, to allow us to report results based on different income ranges. When analyzing responses by household income, we grouped household income into similar ranges that NTIA publishes on its Data Explorer website, but we consolidated the top two ranges used by NTIA into one range. To determine the reliability of these data, we reviewed NTIA technical documentation on the survey, interviewed NTIA officials, and compared our estimates of selected variables with estimates presented by NTIA on its website. We found these data were sufficiently reliable for reporting on data on internet and computing device use by household income levels. In addition, we conducted a literature search to review challenges lower- income school-age children who lack in–home internet face in doing homework that involves internet access. We searched multidisciplinary databases using relevant terms such as “low-income,” “wireless,” “internet,” and “school-age children.” We searched for scholarly articles, including working and conference papers, government reports, think tank publications, and trade publications published between 2013 and 2018. We reviewed the abstracts of results from the search for publications most relevant to our work and fully reviewed publications that, based on their abstract, were most suited to this engagement. We used relevant publications to support findings we collected from other sources, including interviews. We also conducted semi-structured interviews with a range of stakeholders, including education industry associations, researchers, and advocacy organizations we selected based on literature, internet searches, and recommendations from those we interviewed. Specifically, we interviewed eight education or technology industry associations or advocacy organizations, one education researcher, one technology industry researcher, and representatives of one technology company that provides internet services and products to schools. In addition, we interviewed officials with the Federal Communications Commission (FCC) and Department of Education (Education). We also reviewed a non-generalizable sample of six projects involving seven local school districts taking steps to provide wireless internet access outside of school for students who may lack internet at home. We identified these projects based on keyword searches and recommendations from other interviewed associations and researchers, as well as officials with FCC, NTIA, and Education. From this list, we then selected those projects that were frequently cited in the press or by others we interviewed; that covered a variety of geographic locations, including those in both urban and rural areas; and that included a variety of approaches to addressing the homework gap. During these interviews, we asked interviewees about a range of topics, including the extent to which school-age children have access to in-home and wireless internet and challenges faced by students who may only have mobile wireless access. In total we interviewed 17 stakeholders, including the industry associations, researchers, and school districts detailed above. We analyzed the content of the interviews to identify key challenges identified by stakeholders. These interviews did not provide a complete list of all challenges, and the results of these interviews are not generalizable but do provide insight into a range of issues. To determine what selected school districts are doing to expand wireless internet access for their students and the federal role in such efforts, we conducted semi-structured interviews with officials at the school districts listed above and officials at Microsoft regarding its efforts to expand wireless access for students who may lack internet at home. During these interviews, we asked the districts about what steps they are taking to expand wireless access, the goals and challenges of the relevant project, and the federal role in the effort. We analyzed the content of the interviews to identify key themes. We also interviewed officials with FCC and Education to determine and review federal efforts related to school initiatives to expand wireless access for students. We reviewed documentation from FCC and Education regarding relevant federal efforts including rulemaking documents such as FCC’s 2018 Notice of Proposed Rulemaking and 2019 Report and Order regarding Educational Broadcast Service spectrum. We reviewed other relevant FCC documents related to the Schools and Libraries Universal Service Support Mechanism (also known as the E-rate program), which provides schools with discounts on telecommunications and internet services. E-rate documents we reviewed included reports related the 2011 E-rate pilot program exploring off- premises wireless access. We compared FCC efforts to federal internal control standards related to using quality information and communicating externally and pilot program design best practices. We reviewed information, provided to us by department officials, on existing Education grant programs that can be used by schools and school districts to support internet investments. We also reviewed information on Education’s relevant survey efforts. We conducted this performance audit from May 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Andrew Von Ah at (202) 512-2834 or vonaha@gao.gov. In addition to the contact above, Mark Goldstein (Director); Derrick Collins (Assistant Director); Matthew Rosenberg (Analyst in Charge); Dwayne Curry; Sherri Doughty; Rachel Frisk; Hayden Huang; Gina Hoover; Dan Luo; Josh Ormond; Cheryl Peterson; Matt Ray; Hai Tran; and Laurel Voloder made key contributions to this report.", "summary": "School-age children without internet access may have difficulty in completing homework. Those without in-home fixed access may go online wirelessly outside the home to do homework. A provision was included in statute for GAO to review wireless internet access for school-age children in lower-income households. This report examines (1) challenges lower-income school-age children who lack in-home fixed internet face in doing homework involving internet access, and (2) selected school district efforts to expand wireless access for students and the federal role in those efforts. GAO analyzed 2017 CPS data; reviewed six local projects that were selected based in part on education industry stakeholders' recommendations, that included a range of geographic locations, and that took steps to address the homework gap; compared FCC efforts to federal standards for internal controls and pilot-program design best practices; reviewed FCC and Department of Education documents; and interviewed 17 stakeholders, including school districts. According to GAO's analysis of 2017 Census Bureau Current Population Survey (CPS) data, children ages 6 to 17 in lower-income households are more likely than peers in higher-income households to lack high-speed in-home internet and rely on mobile wireless service. GAO found that students who use mobile wireless for homework may face challenges, including slower speeds and limitations smartphones present in completing tasks like typing papers. These “underconnected” students may seek out ways to access wireless internet outside of the home to do homework; however, these methods also pose challenges (see figure). The inequity in internet access—and therefore in the ease of doing homework involving access—between students of varying income levels is known as the “homework gap.” Efforts by six selected projects involving seven school districts expanding wireless access for students who may lack it at home varied. According to officials with most school district projects GAO reviewed, rules for the Federal Communications Commission's (FCC) E-rate program, which allows schools to purchase discounted internet equipment, may limit schools' ability to provide wireless access off-premises. Specifically, off-premises access is not eligible for E-rate support, and schools that provide such access using existing services supported by E-rate must reduce their E-rate discounts. FCC conducted a pilot project in 2011 and 2012 to help decide whether to make wireless off-premises access eligible for E-rate support, but FCC did not determine and execute a methodology to assess the potential costs, benefits, and challenges of doing so. In 2016, FCC received two requests from school districts seeking waivers of rules to allow them to use E-rate program support to provide off-premises access, but FCC has not made a decision on the waivers. Determining and executing a methodology to analyze data about the potential benefits, costs, and challenges of easing E-rate rules on off-premises use and publishing the results could provide transparency to stakeholders such as school districts. This step could also help FCC act on pending and future waiver-of-rule requests and broader changes to rules that may help schools address the homework gap. GAO recommends that FCC take steps to assess and publish the potential benefits, costs, and challenges of making off-premises wireless access eligible for E-rate support. FCC agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "When a disaster overwhelms the ability of state, local, or voluntary agencies to adequately provide essential services on their own, the federal government, when requested, supports disaster response and recovery, providing selected resources where they are needed. The federal government has provided significant funds for transit services following past catastrophic disasters. For example, Congress provided roughly $232 million in response to the 2005 Gulf Coast hurricanes and over $10 billion in response to Hurricane Sandy. FEMA is the federal government’s primary agency for disaster response. In addition to coordinating disaster response and recovery operations, FEMA’s Public Assistance Program provides funding to state and local governments and some nonprofit organizations for recovery efforts after a disaster, including removing debris, implementing emergency protective measures, and repairing or replacing damaged public equipment or facilities. Once the President has declared a disaster, FEMA; the state or territorial government (the recipient); and the local or territorial entities (the subrecipient) work together to develop damage assessments and formulate project worksheets for eligible projects. Project worksheets detail the scope of work and estimated cost for repairing or replacing disaster-damaged infrastructure. After a project has completed FEMA’s review process and is approved, funding is available to FEMA for obligation from the Disaster Relief Fund. The recipient draws down—or withdraws—funding to pay the subrecipient for eligible work upon completion. Because FTA’s Public Transportation Emergency Relief Program is focused on public transportation specifically—unlike FEMA’s more general program—FTA has primary responsibility for reimbursing emergency response and recovery costs after an emergency or major disaster affects a public transportation system if FTA receives funds for the program in an annual or supplemental appropriation or continuing resolution. The Public Transportation Emergency Relief program is a reimbursable grant program and allows FTA to make grants for capital projects to protect, repair, reconstruct, or replace equipment and facilities of a public transportation system as well as for eligible operating costs. Such costs include reestablishing, expanding, or relocating public- transportation route service in the event of a natural disaster that affects a wide area or a catastrophic failure from any external cause. Congress has not provided an annual appropriation for FTA’s Public Transportation Emergency Relief Program but has provided supplemental appropriations following a specific event. Eligible recipients (referred to in this report as “FTA grantees”) of FTA’s Public Transportation Emergency Relief funding are entities that receive funds directly from FTA. Following the appropriation for the 2017 hurricanes, FTA staff and contractors visited sites to develop damage assessments—these assessments provide information on, among other things, the specific location, type of facility or equipment, nature and extent of damage, and a preliminary cost estimate to restore, replace, or reconstruct the damaged system. FTA then uses the information in these damage assessments to determine how to allocate funding among the affected FTA grantees. After FTA announces the allocations, FTA grantees can submit an application for funding to FTA. After FTA has approved the application and obligated funds, recipients must execute the grant agreement to draw down funding for reimbursement of eligible expenses. As required by MAP-21, FTA and FEMA have entered into a memorandum of agreement (MOA) to delineate the roles and responsibilities of the two agencies and establish procedures to coordinate assistance for public transportation following a disaster. We reported in 2014 that because FTA’s Public Transportation Emergency Relief Program is inherently limited by its inability to fund any activities without specific congressional action (in contrast to the other emergency program we examined), FTA and FEMA face challenges clearly delineating the responsibilities and costs each agency will assume during future disasters. We recommended that FTA and FEMA establish specific guidelines to monitor, evaluate, and report the results of collaborative efforts for future disasters. FEMA concurred with this recommendation and FTA took no position. The agencies addressed the recommendation by: (1) implementing a communications protocol to coordinate the two agencies in providing funding to transit agencies and (2) committing to jointly monitoring, evaluating, and reporting on the effectiveness of agency collaboration following events in which both agencies provided funding. In August and September 2017, Hurricanes Harvey, Irma, and Maria made landfall in Texas, Florida, the U.S. Virgin Islands, and Puerto Rico, affecting over 28 million people and causing significant damage to public transit infrastructure (see fig. 1). FEMA funding was made available through presidential disaster declarations. In February 2018, 6 months after the first hurricane made landfall, Congress appropriated funds to FTA’s Public Transportation Emergency Relief Program for the 2017 hurricanes. FTA announced on May 31, 2018, that it would allocate about $233 million of appropriated emergency relief funds to 52 transit agencies for response, recovery, and rebuilding projects, with approximately 85 percent of the funds ($198 million) going to Puerto Rico. Most of Puerto Rico’s funds, and around half the funds FTA allocated for response, recovery, and rebuilding ($116 million), will be distributed to San Juan’s rail transit service provider, Tren Urbano (see fig. 2). FTA allocated emergency relief funding to transit agencies based on preliminary cost estimates that the agencies submitted to FTA in damage assessment reports. Transit agencies developed these preliminary cost estimates through field surveys, which are meant to determine the general type and extent of damages. As shown in table 1, FTA allocated funds for various purposes including repairs to rail stations and bus terminals, repair and replacement of vehicles, and repairs to transit buildings and facilities. As previously noted, after FTA allocates funds, transit agencies must submit grant applications with detailed information about each eligible project activity and expense. As of October 2019, 19 transit agencies had submitted grant applications to FTA, and FTA approved and obligated funding for each of the 19 applicants. FTA officials told us they are working with the remaining transit agencies on submitting and finalizing their grant applications. Uncertainty regarding whether FTA will receive an appropriation can lead to FTA grantees’ applying to FEMA for funding since FEMA is the federal government’s primary agency for disaster response and recovery and can fund transit. This situation increases the importance of FEMA and FTA coordination. FTA did not receive an appropriation until roughly 6 months after the first hurricane’s landfall. FTA grantees, unaware of when or whether FTA would receive an appropriation, could apply during this period to FEMA’s Public Assistance Program for funding. Indeed, more than half of FTA grantees that responded to our survey (25 of 44) reported some interaction with FEMA’s Public Assistance Program by the time of our survey (see fig. 3). Fourteen reported reaching the quality assurance step on a grant application—the final step before receiving funds from FEMA. Six transit agencies received FEMA funds. Once FTA received an appropriation, FTA and FEMA instructed transit agencies to work with FTA, rather than FEMA, on funding requests. As a result, some transit agencies that initially worked with FEMA had to begin a new application with FTA. Fourteen FTA grantees in our survey reported spending more than 3 months working on their FEMA application; however, 10 stated that they could use the work from the FEMA application toward their FTA emergency relief application. In addition, most of the transit agencies we interviewed anticipated this issue, noting that FTA or FEMA officials explained the situation to them before FTA received an allocation. After Congress appropriated funds to FTA for the 2017 hurricanes, FTA and FEMA initiated their communication and coordination agreements, including the MOA and the communications protocol, which define coordination activities between the two agencies. Federal agencies, such as FTA and FEMA, that administer programs as a result of a major disaster or emergency, cannot provide funding for losses that have been covered by insurance or other programs, but are not prohibited from awarding funds to any entity that could receive funding from another agency so long as that entity has not yet received these funds and promises to repay any duplicate assistance. FTA’s and FEMA’s communications protocol also states that it may be appropriate for an agency to receive funding from both FTA and FEMA in a situation where the grantee provides both public transportation services and services other than public transportation. Thus, FTA’s and FEMA’s MOA states that the agencies will coordinate to avoid duplicate funding and to ensure a streamlined reimbursement process. When implementing coordination activities such as FTA’s and FEMA’s MOA and communications protocol, federal internal control standards state that management should design control activities to achieve objectives and respond to risks, such as the risk of providing duplicate funding. FTA and FEMA officials informed us of, and provided documentation of, their coordination efforts, such as biweekly conference calls, and email correspondence among staff. For example, when Congress appropriated funds to FTA, FEMA provided FTA a list of agencies that had applied to FEMA for funding. In addition, when FTA reviewed grant applications, FTA staff emailed FEMA staff to inquire whether applicants had already requested funding from FEMA. To avoid delays in processing applications, FEMA and FTA established an agreement that if FEMA did not respond to such requests in 5 days, then FTA could proceed with processing the application. Based on our document reviews, we found that FTA staff also emailed FEMA staff a copy of the final award. Finally, transit agencies applying to FTA for funding were required to certify whether they had received any transit funding from FEMA and that they would reimburse FTA for any federal funds that duplicated funding provided by FEMA. While FTA and FEMA took steps to coordinate, both agencies approved about $35,000 in funding to one applicant for the same expenses. In June 2019, we found a case in which FEMA and FTA both approved roughly $6,000 to repair a light pole at a bus stop in Collier County, Florida. Specifically, although FEMA had obligated funds to Collier County for the light pole in January 2019, FTA awarded funds for the same light pole in April 2019. One month prior to FTA’s award to Collier County, we notified FTA that Collier County had indicated in our survey that it had been in contact with FEMA. Subsequently, FTA staff twice emailed FEMA staff to inquire as to whether Collier had requested funds from FEMA, but FEMA staff did not respond. Per their agreement, FTA moved the application forward after receiving no response from FEMA within the 5-day timeframe. FTA awarded the funding to Collier County in April 2019. After we notified FTA and FEMA that they both appeared to have awarded funds for the same expense, FEMA de-obligated the funds for Collier County. In addition, FEMA conducted an additional review and found that both agencies had also approved $29,000 in funding for repairs to a transit facility in Collier County. FEMA officials stated they were in the process of de-obligating those funds as well. Although both agencies awarded funds to Collier County, the County had not yet executed the FTA grant or drawn down any of the funds. FTA and FEMA officials noted that both agencies can face challenges in identifying transit expenses submitted to both agencies. For example, FTA may be unaware of transit agencies receiving FEMA funds if these agencies are not direct recipients of such funds, but rather receive funds through a larger entity such as a city, county, or state government. Thus, although FEMA provides FTA with a list of entities that applied for FEMA funds, the list may only show a county’s name, rather than the name of a transit agency. In addition, while FTA also asks applicants whether they have received FEMA funds, applicants may be unaware of the status of their FEMA reimbursement. For example, officials from Collier County’s public transit department told us they were unaware that FEMA had obligated funding for their transit expenses until May 2019 (one month after the FTA award), because it took several months for the funding from FEMA to be processed at the state and county level. While FTA officials shared proposed and final awards with FEMA, we identified 10 cases, including Collier County, in which FEMA officials did not respond within the established 5-day time frame. When we asked why FEMA did not respond within the 5-day time frame, FEMA regional staff stated that the responsible person had since left that office. However, officials noted challenges they face identifying transit expenses contained within applications sent to FEMA by larger entities that may contain hundreds of pages, while at the same time processing a large number of applications related to the hurricanes. Specifically, in order to identify transit expenses within an application, FEMA staff may need to search these hundreds of pages using various transit-related word searches. For example, according to FEMA officials, Collier County currently has a total of 126 active ongoing and obligated projects and 86 inactive projects that were either withdrawn or determined ineligible. After we notified FTA and FEMA that they had approved funding to Collier County for the same expense, both agencies took steps to limit the potential for duplicate funding in future awards. As noted above, FEMA conducted an additional review of applications for which FEMA had not responded to FTA’s inquiries within the 5-day time frame and identified the $29,000 for transit facility repairs that FTA and FEMA both approved for Collier County. In addition, FTA officials updated their internal grants guidance to indicate that FTA staff should not process an application if FEMA has not responded and FTA has reason to believe there may be a potential for duplicate funding (for example, the recipient notifies FTA that it had previously worked with FEMA to reimburse transit expenses). In such cases, FTA may only proceed after FEMA has replied in writing that they have not identified any expenses in the FTA grant that are also in a FEMA grant, or, if FEMA does identify duplicate funding, after one agency removes such expenses from their grant to the recipient. In 2014, we noted that evaluating and reporting the results of collaborative efforts can identify areas for improvement and recommended that FTA and FEMA establish specific guidelines to monitor, evaluate, and report the results of collaborative efforts. FTA and FEMA implemented this recommendation and committed to jointly monitoring, evaluating, and reporting on the effectiveness of the agencies’ collaboration following future events in which both agencies provide funding. In addition, FTA and FEMA took action to address the duplicate award of funding we identified in our review. Nonetheless, FEMA staff continue to face challenges identifying transit expenses within applications submitted by larger entities, and FTA may be unaware of whether transit entities are included in such applications. Without identifying and implementing systematic measures to detect duplicate expenses, FTA and FEMA are at risk of awarding funds for the same expenses. Given that FTA may not receive an appropriation until months after a disaster, transit agencies will continue to submit applications to FEMA when it is unclear whether Congress will provide funding to FTA. This underscores the importance of FTA’s and FEMA’s coordination to avoid providing duplicate funding. FTA and FEMA have taken important steps to coordinate, including establishing an MOA and communications protocol that outline how FTA and FEMA staff should share information. Although FEMA and FTA both approved a relatively small amount of funding for the same expenses in Collier County, the issues that contributed to this outcome involve a risk of providing duplicate funding in the future. FTA took steps to strengthen its processes after we identified this duplicate funding, and FEMA conducted additional retroactive reviews to identify any additional duplicate funding. However, FEMA will continue to face challenges in identifying transit expenses when they are included in the application of a larger entity such as a city, county, or state government. Moreover, FTA may continue to be unaware when transit entities are included in FEMA applications. FEMA and FTA have committed to monitor, evaluate, and report the results of collaborative efforts on an ongoing basis. Without identifying and addressing the factors that contributed to duplicate funding in the federal response to the 2017 hurricanes, FTA and FEMA will continue to face the risk that both agencies will approve funding for the same expense in the future. We are making two recommendations, including one to DOT and one to DHS. The Secretary of Transportation should direct the Administrator of FTA to identify and develop controls, such as methods to more easily identify transit expenses within applications submitted by larger entities, such as a city, county, or state government, to address the risk of duplicate funding. (Recommendation 1) The Secretary of Homeland Security should direct the Administrator of FEMA to identify and develop controls, such as methods to more easily identify transit expenses within applications submitted by larger entities such as a city, county, or state government, to address the risk of duplicate funding. (Recommendation 2) We provided a draft of this report to DOT and DHS for review and comment. We received written comments from DOT and DHS that are reproduced in appendixes I and II. In comments, reproduced in appendix I, DOT concurred with our recommendation. DOT described some of the steps that FTA has taken to coordinate with FEMA, which we note in our report, such as updating its procedures to ensure that an FTA grant does not contain any expenses for which the applicant may have previously requested reimbursement. We continue to believe FTA would benefit from identifying additional internal controls to address the risk of duplicate funding, particularly since FTA and FEMA may still face challenges identifying entities that have applied to both agencies for funding. In comments, reproduced in appendix II, DHS concurred with our recommendation. DHS stated that FEMA is enhancing its Public Assistance Grants Manager System to address the risk of duplicate funding we identified in our report. This includes implementing a new functionality for data exporting, sorting, and filtering to better identify transit-related damages and improved tracking to identify projects that have received FTA funding. DHS estimates these improvements will be completed September 30, 2020. DOT and DHS both provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, the Secretary of the Department of Homeland Security, the Administrator of FTA, the Administrator of FEMA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the contact named above, Steve Cohen (Assistant Director); Crystal Huggins (Analyst in Charge); Matt Cook; Christopher Currie; Danielle Ellingston; Susan Irving; Kathryn Godfrey; Janet McKelvey; Cheryl Peterson; Brenda Rabinowitz; Malika Rice; Amy Rosewarne; Rebecca Shea; Joe Thompson; Matthew Valenta; and Elizabeth Wood made key contributions to this report.", "summary": "In August and September 2017, Hurricanes Harvey, Irma, and Maria made landfall in Texas, Florida, the U.S. Virgin Islands, and Puerto Rico, causing hundreds of millions of dollars in damage to public transit facilities. Access to transit plays an important role in a community's post-disaster recovery. FTA has primary responsibility for providing disaster assistance funding to transit agencies if it receives an appropriation from Congress. If FTA does not receive an appropriation, transit agencies can apply to FEMA for funding. GAO was asked to evaluate the federal government's response and recovery efforts related to the 2017 hurricanes. This report provides information on FTA's emergency relief allocations and examines FTA's and FEMA's coordination. GAO reviewed FTA's allocation of emergency relief funds; conducted site visits to Texas, Florida, and Puerto Rico; obtained survey responses from 44 of 52 transit agencies; and interviewed and reviewed documentation from FTA and FEMA officials. In response to hurricanes in 2017, the Federal Transit Administration (FTA) announced in May 2018 that it would allocate about $233 million of appropriated emergency relief funds to 52 transit agencies for response, recovery, and rebuilding projects, with most of that funding going to Puerto Rico ($198 million). Most of Puerto Rico's funds, and around half the funds FTA allocated ($116 million), will be distributed to one transit system—Tren Urbano—San Juan's rail-transit service provider (see figure below). While FTA and the Federal Emergency Management Agency (FEMA) shared information and coordinated efforts, both agencies still approved about $35,000 to one applicant for the same expenses. GAO found that FTA awarded a grant in April 2019 that included expenses for which FEMA had already obligated funds in January 2019. Although FTA contacted FEMA prior to the award to inquire whether the applicant had received FEMA funding, FEMA did not respond within 5 days, and per an agreement between FTA and FEMA, FTA processed the application. After GAO identified the duplicate funding, FTA and FEMA took steps to limit the potential for duplicate funding; FTA, for example, changed its policy of moving applications forward after 5 days if FEMA does not respond. FTA and FEMA officials noted challenges they face in identifying transit expenses in the applications they receive. For example, they may be unaware that a transit agency received FEMA funds if it received those funds through a larger entity such as a city, county, or state government. Although the amount of funding FEMA and FTA approved for the same expenses was relatively small, without addressing these challenges, FTA and FEMA will continue to face the risk that both agencies will approve funding for the same expense in the future. GAO recommends that FTA and FEMA identify and develop controls, such as methods to more easily identify transit expenses within larger applications, to address the risk of duplicate funding. The Department of Transportation agreed with the recommendation and noted steps FTA has taken to address it. However, GAO believes FTA would benefit from identifying additional internal controls to address the risk of duplicate funding. The Department of Homeland Security agreed with the recommendation and outlined steps FEMA plans to complete in 2020.", "document_type": "gao"}
{"report": "The majority of Americans receive their health coverage through private health insurance, either by purchasing health coverage directly or receiving coverage through their employer. Many of those with private coverage are enrolled in plans purchased from state-licensed or state- regulated issuers. Others are covered by plans where their employer sets aside funds to pay for employee health care, known as self-funded plans. In general, those who obtain private health coverage do so in one of three market segments: individual, small group, or large group. Enrollees in the individual market purchase private health insurance plans directly from a state-regulated issuer—not in connection with a group health plan. In the small group and large group markets, enrollees generally obtain health insurance coverage through a group health plan offered through a plan sponsor (typically an employer). Health benefits commonly include plan design features that require enrollees to pay for a portion of their health care, limit the amount or number of treatments enrollees can receive, and limit the scope or duration of treatments that enrollees may receive. Prior to the implementation of the MHPAEA, health plans offered through employers covering MH/SU often used plan design features that were more restrictive or provided lower levels of coverage for MH/SU benefits than for medical/surgical benefits. For example, prior to MHPAEA, an employer’s plan could cover unlimited hospital days and outpatient office visits and require 20 percent coinsurance for outpatient office visits for medical/surgical treatment while, for MH/SU, that same plan could cover only 30 hospital days and 20 outpatient office visits per year and impose 50 percent coinsurance for outpatient office visits. Congress passed MHPAEA in 2008 to help address discrepancies in health care coverage between mental illnesses and physical illnesses. MHPAEA both strengthened and broadened federal parity requirements enacted in 1996, including extending parity to cover the treatment of substance use disorders. MHPAEA requires coverage for MH/SU services—when those services are offered by group health plans sponsored by large employers (generally employers with more than 50 employees)—be no more restrictive than coverage for medical/surgical services. PPACA extended MH/SU parity requirements to individual insurance plans and some small group health plans. See figure 1 for a timeline of the laws and regulations establishing federal parity requirements and the types of plans affected. In general, MHPAEA requires that the financial requirements and treatment limitations imposed on MH/SU benefits cannot be more restrictive than the predominant financial requirements and treatment limitations that apply to substantially all medical/surgical benefits. Financial requirements. The most common types of financial requirements include: (1) deductibles, which are required payments of a specified amount made by enrollees for services before the issuer begins to pay; (2) copayments, which are payments made by enrollees and are a specified flat dollar amount—usually on a per-unit-of-service basis—with the issuer reimbursing some portion of the remaining charges; (3) coinsurance, which is a percentage payment made by enrollees after the deductible is met and until an out-of-pocket maximum is reached; and (4) out-of-pocket maximums, which are the maximum amounts enrollees have to pay per year for all covered medical expenses. Quantitative treatment limitations (QTL). QTLs are treatment limitations that can be expressed numerically, such as annual, episode, and lifetime day and visit limits. For example, QTLs include annual limits on the number of office visits an enrollee can make for a certain condition and lifetime limits on the coverage of benefits for a certain type of treatment. Non-quantitative treatment limitations (NQTL). NQTLs are non- numerical limitations on the scope or duration of MH/SU services. Common NQTLs include (1) medical management standards that limit or exclude benefits based on medical necessity or medical appropriateness, or based on whether the treatment is experimental or investigative; (2) refusal to pay for higher-cost therapies until it can be shown that lower cost therapy is not effective—known as fail first or step therapy protocols; (3) exclusions based on failure to complete a course of treatment; (4) standards for providers to be admitted to participate in a network, including the factors used to set provider reimbursement rates; and (5) requiring pre-authorization of services—the requirement that an enrollee receives prior approval for care. The MH/SU parity regulations established a two-part analysis to determine if the financial requirements or QTLs in a plan are in compliance with MH/SU parity requirements. The first test determines if a particular type of financial requirement or QTL (such as a copay) applies to substantially all medical/surgical benefits in the relevant classification of benefits (e.g., inpatient in-network or outpatient out-of- network). Generally, a financial requirement or QTL is considered to apply to “substantially all” medical/surgical benefits if it applies to at least two- thirds of the medical/surgical benefits in the classification, according to the regulations. Once the first test is met, the second test checks for parity in the level or magnitude of the requirement (e.g., copay of $15 or $20 or treatment limit of 21 or 30 inpatient days per episode). Specifically, by regulation, the financial requirement or QTL cannot exceed the predominant level—that is, the level that applies to more than half of the medical/surgical benefits subject to the financial requirement or QTL in the classification. For example, if at least two-thirds of outpatient, in- network, medical/surgical benefits are subject to a copay, and 75 percent (i.e. more than half) of outpatient, in-network visits involving medical/surgical benefits are subject to a copay of $30, the copay for outpatient, in-network visits involving MH/SU benefits cannot exceed $30. The MH/SU parity regulations extended parity requirements to NQTLs and establish a different test for assessing parity of NQTLs between medical/surgical and MH/SU benefits. Under the regulations, a plan generally cannot apply an NQTL on an MH/SU benefit unless—both as written and in operation—it is comparable to and applied no more stringently than the NQTL applied to medical/surgical benefits. According to guidance issued by HHS, DOL, and Treasury, the NQTL analysis in the regulations focuses on the underlying factors (such as processes, strategies, and evidentiary standards) used to apply the NQTL and ensuring there are not arbitrary or discriminatory differences in how a plan or issuer applies those factors to MH/SU benefits as compared to medical/surgical benefits. HHS, DOL, and Treasury share joint oversight responsibilities for certain federal laws applicable to private health coverage, including MHPAEA. The oversight of plans and issuers for compliance with MHPAEA is split between the states, HHS, DOL, and Treasury, depending on the type of coverage and whether the plan is self-funded or fully insured. Individual and fully insured group plans sold by issuers. States have primary responsibility for regulating insurance, and health insurance products sold within a state must meet both federal and state requirements, including MH/SU parity requirements. States oversee health insurance sold by issuers (1) in the individual market, where individuals purchase private health insurance plans directly from an issuer or through an exchange; and (2) in the group market, where a plan sponsor (typically an employer) purchases coverage from an issuer. Of the estimated 216 million Americans who were enrolled in private health insurance in 2016, the estimated enrollment in these state-regulated markets was 17.3 million in the individual market, 14.2 million in the small group market, and 42.9 million in the large group market. State oversight of health insurance applies only to fully insured health plans offered by state-licensed issuers. Because self-funded plans are financed directly by the plan sponsor, these plans are generally not subject to state law or oversight. With respect to health insurance issuers selling products in the individual and fully insured group market, HHS has primary enforcement authority over MH/SU parity requirements in two instances: (1) when a state notifies HHS that it does not have the authority to enforce MH/SU parity requirements or the state notifies HHS that it is not otherwise enforcing the requirements, or (2) when HHS determines the state failed to substantially enforce MH/SU parity requirements. States falling into these categories are known as direct enforcement states, and, in these states, the Centers for Medicare & Medicaid Services (CMS) within HHS assumes the responsibility for directly enforcing federal MH/SU parity requirements and other federal health laws covered by PPACA with respect to issuers. CMS is currently responsible for enforcing MH/SU parity requirements against issuers in four states: Missouri, Oklahoma, Texas, and Wyoming. While CMS enforces MH/SU parity requirements and other PPACA requirements for these direct-enforcement states, these states maintain enforcement authority over issuers for state-level regulatory requirements. For the estimate of overall enrollment in private health plans in 2016, see U.S. Census Bureau, “Coverage Numbers and Rates by Type of Health Insurance: 2013 to 2016,” Current Population Survey, 2014 to 2017 Annual Social and Economic Supplements, table 1. products they offer, DOL oversees the plans themselves for compliance through its Employee Benefits Security Administration (see table 1). DOL does not have the authority to enforce MH/SU parity requirements directly against issuers to correct noncompliant health policies that are designed, marketed, and sold by the issuer to numerous employers for the purposes of offering health plans to their employees. DOL has primary authority for overseeing compliance with MH/SU parity requirements for self-funded, private employer-sponsored group plans, as states generally do not have authority over these plans. The Internal Revenue Service (IRS) within Treasury is authorized to impose an excise tax on employers that sponsor private group plans that are not in compliance with MH/SU parity requirements. Similarly, HHS has primary authority for MH/SU parity requirements over employer-sponsored plans for state and local governments—known as non-federal governmental plans. Within HHS, CMS oversees both fully insured and self-funded non-federal governmental plans. In 2017, an estimated 13 million state and local government employees enrolled in these plans. Sponsors of self-funded, non-federal governmental plans may elect an exemption from, or “opt-out” of, certain federal health care requirements, including MH/SU parity requirements. If a plan elects to opt-out of MH/SU parity requirements, CMS also reviews the plan’s election to ensure they meet requirements for doing so. Through our survey and interviews with officials from the three selected states, we found that nearly all states conduct some type of review for MH/SU parity compliance as part of their oversight of issuers selling fully insured large and small group plans and individual plans. The reported type and frequency of these reviews vary, particularly for the reviews conducted after consumers enroll in plans. A product is a discrete package of health insurance coverage benefits that are offered using a particular product network type (e.g., health maintenance organization or preferred provider organization) within a service area. Issuers then sell plans to consumers by pairing health insurance coverage benefits with a particular cost sharing structure, provider network, and service area. The only two states that did not report that they conduct reviews for MH/SU parity compliance before products are approved for sale in their states are Missouri and Wyoming, which are two of the four states where CMS is directly enforcing MH/SU parity requirements. In the four direct enforcement states, CMS conducts reviews of issuer policies and documentation for compliance with federal MH/SU parity requirements before products are approved for sale in the states. The two other states—Texas and Oklahoma—reported in our survey that they review products for state-level MH/SU parity compliance; however, CMS maintains primary authority for reviewing products for compliance with federal MH/SU parity requirements in those states. consumers enroll in a plan. Additionally, according to CMS officials, the HHS mental health parity tool is not designed to facilitate an evaluation of NQTLs due to the nature of reviewing NQTLs. State oversight after consumers enroll in plans. In addition to the review they conduct prior to consumers enrolling in plans, 27 states reported in our survey they have conducted some type of review related to MH/SU parity after consumers enroll. The types of reviews states conduct vary. These review types include: targeted reviews based on consumer complaints or other information, random audits, and conducting broad routine reviews of issuers’ compliance with state and federal health insurance laws—called market conduct examinations. Through our interviews of states and stakeholders we identified additional enforcement activities some states are using to assess the issuer compliance with MH/SU parity requirements after consumers enroll. These reviews and additional enforcement activities are described below: Conducting targeted reviews. Twenty states reported in our survey that they had conducted a targeted review that focused on specific issuers or particular MH/SU parity compliance concerns, while other states reported they had never performed such a review. Consumer complaints were most commonly identified as the reason—at least in part—that these 20 states conducted targeted reviews to assess compliance with MH/SU parity requirements. Thirty-eight states reported in our survey that they track MH/SU parity complaints, which can be submitted by consumers, providers, or advocates. For example, after receiving consumer complaints, Massachusetts examined the accuracy of the information on behavioral health services—services that address mental health or substance use issues—contained in issuers’ provider directories and compared this to the accuracy of medical/surgical provider information in a 2018 report. Officials from another state told us they frequently use targeted reviews in response to complaints because these focus on a specific issue, rely on more recent data, and are less time consuming than more comprehensive market conduct examinations that review an issuer’s compliance with all state health requirements. States reported additional reasons for starting targeted reviews related to MH/SU parity requirements, including reviews initiated after receiving referrals from other departments, reviews driven by predictive analytics or market analyses, and reviews in response to media attention. In 2017 and 2018, the frequency of receiving MH/SU parity-related complaints and conducting targeted reviews varied across states. (See table 2). Market conduct examinations. Nearly all states conduct market conduct examinations and states have not routinely included a review for MH/SU parity compliance as part of the examinations. Market conduct examinations are a review of an insurer’s marketplace practices. The examination is an opportunity for the state to verify data provided by the insurer and to confirm that companies’ internal controls and operational processes result in compliance with state laws and regulations. Eighteen states reported in our survey that they routinely conduct market conduct examinations (ranging from every 3 or 5 years), and, of those, nine states reported that they usually or always include a review of MH/SU parity compliance. Twenty-nine states reported that their market conduct examinations are not routine; they are conducted on an as-needed basis or in response to risk factors, such as market analysis or complaints. In order to assist states’ ongoing oversight of MH/SU parity compliance, NAIC developed guidance on MH/SU parity for its Market Regulation Handbook, which most states use to guide their market conduct examinations, an NAIC official told us. The guidance includes a data collection tool for mental health parity analysis. While the guidance was finalized in August 2019, an NAIC official told us most states were already using the guidance to conduct their market conduct examinations while it was in draft form. State-wide comprehensive reviews of issuers. Officials we interviewed from two of the three selected states told us they have conducted reviews of all issuers in their state as part of their oversight of MH/SU parity compliance after consumers enroll in plans. For example, as requested by its state legislature, Maryland conducted three annual MH/SU parity surveys with the state’s major issuers. Maryland officials told us the first two surveys focused on MH/SU parity compliance in the issuers’ plan documentation, and the last survey assessed compliance in plan practices and operations. Maryland officials told us the review of all issuers in the state will give them a baseline understanding of issuer compliance with MH/SU parity requirements reviewed. Officials from Washington told us they are using a CMS grant to evaluate issuer claims data and to understand issuers’ NQTLs in operation, which officials say will enable them to identify statewide MH/SU parity-related concerns. Annual compliance reporting. At least eight states have established annual requirements for issuers to demonstrate their MH/SU parity compliance through data reporting or self-certifications, according to officials from one of the three selected states in our review and a provider organization. To fulfill the states’ requirements, issuers submit information such as the percentage of claims paid for in- network and out-of-network MH/SU services compared to those paid for medical/surgical services and the number of consumers denied prior authorizations for MH/SU services. For example, in 2012, Massachusetts began requiring issuers to submit annual reports certifying that their plans comply with federal and state MH/SU parity requirements and instructing issuers to compare denials of care for MH/SU and medical/surgical services, among other things. These certifications must be signed by the issuer’s chief executive officer and chief medical officer, which Massachusetts officials told us ensures that issuer leadership is aware of the MH/SU parity requirements. Additionally, an official from NAIC told us that NAIC now includes data reporting requirements related to MH/SU parity, such as requiring information on prior authorizations and denials of care, in its annual nationwide collection of issuers’ post-enrollment information. An NAIC official told us states can use these data to compare information on MH/SU and medical/surgical services and examine issuers that operate in multiple states. In their survey responses, 47 states identified enforcement actions they can take if they find, through a review, that an issuer violated MH/SU parity requirements. States reported that these enforcement actions include: financial penalties, license termination, orders to pay claims or interest, and orders to pay restitution. However, an official from NAIC told us that in the majority of cases, issuers voluntarily come into compliance after state regulators identify an issue or parity violation. Both DOL and CMS oversee employer-sponsored group plans to ensure their compliance with MH/SU parity requirements. Specifically, the agencies conduct what are known as targeted reviews after consumers enroll in these plans. The agencies initiate these reviews after they receive complaints or other information regarding possible noncompliance with either MH/SU parity requirements or other, unrelated issues, such as a plan failing to provide a document explaining the health benefits covered. Unlike states, the agencies do not conduct any type of review of employer-sponsored plans before consumers enroll and do not have the authority to conduct such a review, according to DOL and CMS officials. DOL oversight. DOL’s targeted reviews are triggered by inquiries, including complaints, or other information that identifies possible noncompliance with MH/SU parity requirements or other applicable federal health care laws. These targeted reviews can also originate from additional techniques DOL uses to target plans for review, such as reviewing bankruptcy filings or financial and operational information filed annually by employers. According to DOL’s enforcement manual, DOL investigators generally identify the reasons for starting each review, obtain relevant information from the plan or issuer, and conduct a full review of compliance with applicable federal health care laws. These reviews which are performed by DOL’s 10 regional offices can focus on specific private, employer-sponsored group plans, service providers (such as third party administrators), or issuers; however, DOL does not have the authority to take direct enforcement actions against issuers for violations of MH/SU parity requirements. DOL reported that it completed 302 reviews of private, employer- sponsored group plans that included a review for compliance with MH/SU parity requirements in fiscal years 2017 and 2018. According to DOL officials, these reviews can take 2 to 3 years to complete and investigators follow an extensive compliance checklist to conduct these reviews. The checklist includes specific questions to help determine compliance with all applicable requirements, including a section with questions on MH/SU parity. Because investigators complete the compliance checklist for every plan level health investigation, reviews not triggered by a parity complaint may still uncover a parity violation. For example, DOL might review a private employer-sponsored group plan in response to a consumer complaint about how long the plan covered a hospital stay for a mother and her newborn. The review would include a review of compliance with the related law (the Newborns’ and Mothers’ Health Protection Act of 1996), MH/SU parity-related requirements, and all other applicable federal health care requirements. Nearly all DOL reviews that assess compliance with MH/SU parity requirements originate from sources unrelated to MH/SU parity, including complaints or other information about potential noncompliance with other federal health care laws and DOL reviews of the annual financial and operational information filed by employers, based on data provided by DOL on the reasons targeted reviews were opened. DOL received few MH/SU parity complaints and opened few reviews based on a potential MH/SU parity violation, compared to complaints related to other federal health requirements, in fiscal years 2017 and 2018 (see table 3). When DOL identifies a violation of MH/SU parity requirements through one of its reviews, investigators first seek to bring the private employer- sponsored group plan or issuer into compliance voluntarily, according to DOL officials. When that is not possible, DOL can sue the plan for equitable relief, which can result in the plan being required to reimburse members whose claims were improperly denied. DOL can also request that the Treasury levy an excise tax on the non-compliant private employer-sponsored group plan, but DOL officials noted that the excise tax goes to the Treasury rather than toward payment of claims for plan members, and DOL’s focus is on obtaining payment of claims. DOL officials told us they have never referred a plan to IRS to levy an excise tax based on an MH/SU parity violation. The 21st Century Cures Act requires DOL to conduct an audit of a private employer-sponsored group plan when DOL has identified five or more MH/SU parity violations; however, DOL officials told us the use of this authority has not been triggered, as of October 2019. DOL identified audit resources challenges faced by the agency given the universe of plans DOL oversees and reported that the agency is taking steps to better leverage its resources through targeted exams in its September 2019 enforcement report to Congress. Specifically, DOL reported that DOL has less than one investigator for every 12,500 employee benefit plans the agency oversees, including private health, pension, life, and disability insurance. In light of these challenges, DOL officials said they are focusing their targeted reviews on issuers and other service providers to obtain voluntary corrections whenever possible so they can address noncompliance across multiple private employer- sponsored group plans. To date, they have completed at least two investigations at the issuer level and brought an issuer into voluntary compliance after one investigation identified MH/SU parity noncompliance affecting over 4,000 private, employer-sponsored group plans and 7 million consumers. According to DOL officials, focusing on issuers will result in their opening fewer targeted reviews than in prior years, but will have more meaningful results. DOL officials also noted other efforts underway to assist in MH/SU parity oversight. For example, the DOL’s Kansas City Regional Office has convened a task force that focuses on parity in opioid use disorder treatment coverage. DOL officials told us they require senior advisors in each of the 10 regions to identify trends in the types of violations DOL identifies and to identify when a violation could be happening at the issuer level, rather than the individual employer-sponsored group plan level. CMS oversight. CMS oversight of employer-sponsored, non-federal governmental plans for compliance with MH/SU parity requirements consists of targeted reviews. Like DOL, these targeted reviews originate from complaints or information about noncompliance—about MH/SU parity or issues with other federal health care laws. The reviews are used to assess compliance with all applicable health requirements, and CMS officials told us CMS has broad authority to review or request information as a part of these reviews. However, according to CMS officials, CMS has limited authority to review or request information from these plans outside of these targeted reviews. Specifically, CMS officials said CMS does not have the authority to conduct random audits, reviews, or examinations of employer-sponsored, non-federal governmental plans, or to require the plans to provide documentation to demonstrate compliance with MH/SU parity requirements. CMS officials also said they do not have the authority to review employer-sponsored, non-federal governmental plans for compliance with MH/SU parity requirements prior to enrollment. While large, self-funded, employer-sponsored, non-federal governmental plans may opt-out of MH/SU parity requirements and certain other federal health requirements, CMS may identify MH/SU parity noncompliance if these plans did not properly opt-out. CMS officials told us that they review documentation for all plans that elect to opt out of MH/SU parity requirements to ensure it was properly submitted. If CMS finds a plan may have opted-out incorrectly, CMS officials said they can request additional information from the plan and can ultimately decide the opt-out was invalid. CMS reported that it closed five reviews related to MH/SU parity in fiscal years 2017 and 2018. Two targeted reviews originated from MH/SU parity complaints and three reviews were related to plans opting-out of MH/SU parity requirements. CMS officials told us that they received four complaints related to MH/SU parity in employer-sponsored, non-federal governmental plans in fiscal years 2017 and 2018. The officials told us all four complaints resulted in targeted reviews, two of which were ongoing as of September 2019. When CMS identifies MH/SU parity noncompliance through one of these targeted reviews, the agency takes one of several actions: working with the plan to implement a corrective action plan; initiating a full market conduct examination of the plan; or imposing civil money penalties. Like DOL, the 21st Century Cures Act requires CMS to audit an employer- sponsored, non-federal governmental plan or issuer when CMS has identified noncompliance five or more times. According to CMS officials, as of November 2019, the use of this audit authority has not been triggered. Under DOL’s and CMS’s oversight through targeted reviews, self-funded employer-sponsored group plans do not undergo review for compliance with MH/SU parity requirements unless the agencies receive complaints or other information about potential noncompliance with an applicable federal health care law, or the review is opened as a result of a targeting technique unrelated to MH/SU parity—such as bankruptcy filing review. Relying on the receipt of such information to trigger a targeted review of MH/SU parity is a concern given the low number of complaints DOL receives related to MH/SU parity when compared to other federal health requirements. For example, as we have noted, DOL received 129 complaints in fiscal year 2018, and most of the noncompliance with MH/SU parity requirements DOL identified was found through reviews triggered by complaints and information unrelated to MH/SU parity in fiscal years 2017 and 2018, based on our review of DOL data. Further, as discussed later in this report, consumer advocates have noted that there is a lack of consumer awareness about MH/SU parity requirements, which may result in fewer complaints than would otherwise be made if consumers understood the requirements. Federal internal control standards state that agencies should identify, analyze, and respond to risks related to achieving their defined objectives. DOL has stated that its defined objective is the full implementation of MH/SU parity requirements through vigorous compliance assistance and enforcement. HHS has stated that it is committed to enforcing MH/SU parity requirements through CMS and to providing the sponsors of employer-sponsored, non-federal governmental plans the information needed to ensure that the plans are fully compliant with MH/SU parity requirements. DOL and CMS officials told us they have not completed any statistical analysis or study regarding the effectiveness of their targeted review approach to MH/SU parity compliance, nor whether this approach increases the risk of noncompliance. Specifically, they have not analyzed whether relying on targeted reviews alone increases the risk of noncompliance with MH/SU parity requirements in employer-sponsored group plans. The risk of noncompliance may be increased because incentives for plans to comply are limited when investigations are initiated only after receiving complaints or information about noncompliance. DOL and CMS officials also said they have not analyzed whether additional strategies, such as the attestation or issuer documentation requirements used by some states, would reduce the risk of noncompliance. For example, such an evaluation could assess whether a sample of health plans reviewed for compliance identified similar types of noncompliance as those identified when plans were reviewed in response to MH/SU parity complaints. According to officials from a provider organization, one such strategy to improve compliance would be to require issuers or plans to affirm that (1) their plans comply with MH/SU parity requirements and (2) they have documentation showing that they analyzed their plans for compliance. According to these officials, requiring this documentation from plans and issuers can increase compliance, even if there is a low probability that a plan will be audited. DOL and CMS officials told us that they currently do not have the authority to conduct oversight activities of this type. Specifically, they told us that for self-funded private or non- federal governmental employer-sponsored group plans they do not currently have the authority to: (1) review plans for compliance with MH/SU parity requirements before coverage is offered to consumers, (2) require plans to develop documentation to demonstrate compliance with MH/SU parity requirements, and (3) monitor or examine plans for compliance with MH/SU parity requirements outside of an investigation. Without evaluating the effectiveness of their targeted review approach, DOL and CMS do not know whether their oversight is adequate for ensuring compliance with MH/SU parity requirements, or whether they need to adopt additional strategies and seek new authorities, if needed. States, DOL, and CMS identified some plan or issuer noncompliance with specific MH/SU parity requirements in 2017 and 2018 through their various oversight efforts. Specifically, after consumers enrolled in plans: Seventeen of the 51 states that responded to our survey reported identifying noncompliance a total of 254 times among issuers of individual plans and fully insured, employer-sponsored group plans. DOL reported identifying noncompliance 113 times among private, employer-sponsored group plans or the issuers of these plans. CMS reported identifying noncompliance two times among employer- sponsored, non-federal governmental plans. Both states and DOL most commonly identified noncompliance with MH/SU parity NQTL requirements. Eleven of the 14 states that provided information on the types of MH/SU parity noncompliance in our survey reported that the noncompliance they found was related to NQTLs half the time or more. Similarly, DOL reported that 55 percent of noncompliance the agency found in fiscal year 2018 was related to NQTLs, while 40 percent was related to financial requirements or QTLs. Through our review of DOL letters informing plans of noncompliance, we found that the most common types of noncompliance with MH/SU parity requirements were related to (1) copayments or coinsurance, such as a higher copayments for MH/SU treatment than those generally applied to equivalent medical/surgical treatment (a financial requirement); (2) prior authorizations, such as requiring approval in advance for MH/SU treatment but not requiring it for equivalent medical/surgical treatment (an NQTL); and (3) the total number of treatments allowed, such as a limit on inpatient hospital days for MH/SU treatment that is not applied to equivalent medical/surgical treatment (a QTL). The scope of noncompliance with MH/SU parity requirements identified by states, DOL, and CMS in 2017 and 2018 varied—both in terms of the number of consumers affected and the steps needed to come into compliance. While MH/SU parity requirements apply to plans, regulators may identify and seek to correct noncompliance in the underlying health policies that issuers use to design, market, and sell as health plans to numerous employers. For example, DOL letters show one particularly widespread violation affected more than 7 million enrollees. Most plans or issuers resolved the noncompliance identified by regulators voluntarily. For example, DOL officials told us that plans or issuers resolved all instances of noncompliance voluntarily. Nine states reported in our survey taking a total of 20 enforcement actions to bring plans or issuers into compliance in 2017 and 2018. See table 4 for examples of noncompliance and steps required to come into compliance. Additionally, while the literature we reviewed suggested that the individual, small group, and large group plans assessed by the studies were generally compliant with MH/SU parity requirements assessed by the studies, the studies identified some noncompliance or possible noncompliance. For example: One case study found that, in 25 percent of the total products offered on two state-based health insurance exchanges between October 2013 and March 2014—the first year of operation for the exchanges established by PPACA—the financial requirements and certain NQTLs reviewed appeared to be noncompliant with MH/SU parity requirements. The study also found variation in the types of noncompliance in each of the states. The case study concluded that on one exchange more than half the products appeared inconsistent with MH/SU parity requirements, particularly the NQTLs reviewed; on the other exchange, 11 percent of the products had a financial requirement that violated MH/SU parity requirements. One study found that 18 percent of benchmark plans were not compliant with MH/SU parity requirements for substance use disorder benefits specifically. For example, five plans had limits on the number of inpatient and/or outpatient visits for substance use disorder services only. (See app. II for additional information about the studies we reviewed.) Each of the studies we reviewed were limited because they evaluated only selected requirements, with the authors of four studies noting there was insufficient information in plan documents to evaluate additional MH/SU parity requirements. As such, none of the studies could determine the extent of issuer compliance with all MH/SU parity requirements. A 2018 survey of employer-sponsored group plans suggests that there could be employer-sponsored plans that have not come into compliance with MH/SU parity requirements. Specifically, this nationally representative survey of employers that offer employer-sponsored group plans found that 61 percent of large and midsized employers reported they had taken steps to address compliance with MH/SU parity requirements—such as reviewing plan documents. An additional 13 percent of large and midsized employers reported that they planned to take action to come into compliance and some plans may have already been in compliance. According to advocacy groups and state and federal officials we interviewed and some of the research we reviewed, the full extent of compliance with MH/SU parity requirements is not known. As NAIC and consumer advocacy stakeholders have reported, regulators often rely on both individual complaints and aggregate consumer complaint statistics to identify problem issuers and problem areas for additional oversight. However, stakeholders from eight consumer advocacy groups told us that complaints are not a good measure of whether MH/SU parity issues exist and do not accurately reflect the number of enrollees facing problems with parity. Further, CMS, DOL, and state officials, as well as stakeholders and researchers, also noted the complexity of assessing plans for MH/SU parity compliance for NQTLs in particular, which may result in inconsistent identification of MH/SU parity violations or the inability to fully assess compliance. Limitations of relying on complaints to trigger enforcement activities. Stakeholders and state officials reported on the limitations of relying on complaints to trigger enforcement activities—which contribute to the challenges in determining the full extent of compliance with parity requirements. Stakeholders from eight consumer advocacy groups told us that if regulators rely on complaints to identify possible noncompliance after consumers enroll in plans, they will not know the full extent of compliance with MH/SU parity requirements. These stakeholders identified several reasons complaints do not accurately reflect the number of consumers facing problems related to plan or issuer compliance with MH/SU parity requirements: Consumers may not be aware of MH/SU parity requirements, such as how to determine if the treatment challenge they are experiencing is a potential parity violation, how to file a parity-related complaint, or which entity they should contact to file a complaint, according to five consumer advocacy stakeholders we spoke to and one professional organization. For example, while a consumer would be aware of a denial for a particular treatment for a mental health condition because the issuer did not consider it to be medically necessary, the consumer could not easily determine if this standard was applied more stringently than to similar medical/surgical benefits and thus signaled a parity issue. Further, in our survey, officials from 21 states reported they do not provide any public information to consumers about MH/SU parity requirements, which may contribute to a general lack of consumer awareness in these states. Consumers may decide not to file a complaint due to the stigma associated with MH/SU treatment, three consumer advocacy stakeholders and state officials in one state told us. One stakeholder also noted that consumers expect substance use disorder services to be treated differently than medical services and are therefore less likely to file a complaint if they receive disparate treatment. Consumers may be hesitant to file a complaint that includes sensitive personal details, such as a mental illness diagnosis, two stakeholders told us. One of these stakeholders told us consumers in need of substance use disorder services in particular may not want to raise a complaint that documents their participation in illegal activities, such as drug misuse. In addition, two stakeholders and state officials in one state stated that individuals or families experiencing an immediate crisis associated with MH/SU conditions may not be well-equipped to navigate the complaint process or wait for a complaint resolution. Providers face barriers helping consumers file complaints or appeals related to MH/SU parity requirements, four consumer advocacy stakeholder groups and one professional organization told us. The barriers identified by these stakeholders include: providers being unable to file complaints on behalf of consumers in some states; the time consuming nature of the appeals or complaint processes; and provider fear that an issuer will drop them from their network if they file a complaint. Two consumer advocacy groups have identified that providers may be in a better position to understand a denial decision and justify a consumer’s need for treatment, but noted that barriers discourage providers from filing an appeal or complaint. One of these consumer advocacy groups reported that providers might be unaware of what issuer actions would violate MH/SU parity requirements. Officials from the three selected states provided examples of specific efforts taken that may address stakeholder identified challenges consumers face in understanding parity requirements and filing related complaints. For example, Maryland officials told us they developed a webinar to help consumers with filing complaints related to substance use disorder treatment. Officials from Massachusetts told us they review for parity violations any complaint related to coverage of mental health- related services, regardless of whether the consumer indicates that the complaint might be a parity violation. While this process is still dependent on a consumer to make a complaint, it does not rely on the consumer having an in-depth understanding of parity requirements for their complaint to be reviewed for potential noncompliance. In light of concerns about consumers not filing complaints, officials from Washington told us their statewide comprehensive review includes an assessment of how issuers implemented state and federal MH/SU parity requirements and aims to help them assist consumers who are not reaching out directly. Additionally, 30 states reported in our survey that they provide public information—such as frequently asked questions or brochures—for consumers about MH/SU parity requirements. Complexity of assessing NQTLs for MH/SU parity compliance. CMS, DOL, NAIC, and state officials, as well as some stakeholders and researchers, identified complexities in assessing NQTLs for compliance with MH/SU parity requirements. As a result, regulators may fail to identify noncompliance, or may not always identify noncompliance, making current numbers on noncompliance with MH/SU parity requirements an unreliable indicator of the extent of noncompliance. Difficult to assess plan implementation of NQTLs. Officials from three states reported in our survey or interviews that it is challenging to determine how an NQTL described in plan documents is actually being implemented and experienced by consumers in practice. This can make it difficult to determine both if noncompliance has occurred and the extent of any noncompliance. Further, some state regulators do not conduct the types of detailed analyses necessary to determine if an NQTL is in compliance with MH/SU parity requirements, according to one consumer advocacy group. Finally, four studies we reviewed identified that researchers were unable to observe the plans’ implementation of NQTLs. Thus, they were unable to draw conclusions about whether or not the way plans implemented the NQTLs complied with MH/SU parity requirements. To address the complexities of these analyses for their own reviews, DOL officials told us that for its targeted reviews of MH/SU parity compliance, DOL uses seasoned investigators, early litigation support, technical guidance from DOL’s regulations office, and outreach to other federal and state agencies. Lack of documentation on medical/surgical NQTLs. A lack of documentation on the factors used to apply NQTLs to medical/surgical benefits makes it difficult for issuers to demonstrate compliance with MH/SU parity requirements, according to two industry officials. They told us that information on NQTLs—such as when to require prior authorization—has to be created for medical/surgical benefits so that the information can then be compared to the application of NQTLs to MH/SU benefits to assess compliance with MH/SU parity requirements. One industry official noted that this poses an additional hurdle when MH/SU benefits are carved out or separately managed from the rest of a health plan. This lack of explicit information about medical/surgical benefits and difficulty drawing parallels between medical/surgical and MH/SU care also makes it difficult for regulators to determine parity compliance, officials from one of the three selected states told us. Lack of resources. Eight states reported in our survey that lack of staff resources, staff training, or clinical expertise are additional challenges to assessing compliance with MH/SU parity requirements. Further, states may hesitate to determine an issuer violated federal MH/SU parity requirements due to a lack of confidence or clarity in applying the federal laws and may cite state laws instead, according to officials from one of our three selected states and a provider organization. Officials from the provider organization told us this could result in an undercount of MH/SU parity violations if a state cites a potential violation of an MH/SU parity requirement as a violation of a state law unrelated to federal MH/SU parity requirements. One state official identified consumer protection laws as an alternative to pursuing possible MH/SU parity requirement violations. Officials from one state told us some state laws have more clear cut standards than federal MH/SU parity requirements, due to the lack of clarity regarding federal MH/SU parity requirements. However, different strategies were used in three states to obtain the needed clinical expertise to review NQTLs, including regular meetings with clinicians from the state mental health department and using grant money to contract with physicians with clinical expertise to help with compliance reviews. HHS, DOL, and Treasury have coordinated on oversight of MH/SU parity requirements by providing support and jointly developing guidance for state regulators, insurance industry officials, providers, and consumers. HHS described several recent and planned coordination activities in its public action plan to improve state and federal coordination of the oversight of MH/SU parity requirements. This plan was required by the 21st Century Cures Act. Recent and ongoing support and coordination activities include: Formal agreements with states. HHS and DOL officials told us they have established formal agreements—such as collaborative enforcement agreements—with states to help coordinate, share information about, or assist states with MH/SU parity enforcement activities. For example, DOL officials told us they have general enforcement and common interest agreements with nearly 40 states that allow them to share information related to MH/SU parity enforcement. HHS officials told us they have collaborative enforcement agreements with six states that allow HHS to intervene if a state’s efforts to bring an issuer into compliance with MH/SU parity requirements are unsuccessful. In response to our survey, state officials reported few formal referrals between the states and HHS or DOL. Informal communication with states. HHS and DOL officials told us that state regulators can contact regional coordinators and individuals in their respective headquarters for assistance with MH/SU parity enforcement outside of formal agreements. HHS and DOL officials told us that referrals of specific complaints are informal and infrequent, noting that if a complainant contacted their office by mistake they would provide the contact information for the appropriate state or federal agency. Technical assistance and outreach. HHS and DOL jointly conduct technical assistance for state regulators and have conducted outreach with stakeholders, including consumers, consumer advocates, providers, issuers, and employers, to improve compliance with MH/SU parity requirements. DOL officials told us that they meet regularly with state regulators and NAIC to provide technical assistance and foster implementation and enforcement coordination. For example, in 2017, HHS and DOL held a commercial market parity policy academy— technical assistance for teams of state officials on strategies to advance MH/SU parity compliance and lessons learned from other states’ implementation efforts. According to the HHS action plan, representatives from 20 states and territories attended. Additionally, DOL held a roundtable discussion with stakeholders to discuss NQTLs, disclosure, and federal-state coordination in January 2019. Grant funding. HHS has also awarded funding, provided by PPACA, to states to help improve oversight of MH/SU parity requirements. In 2016, CMS awarded $9.3 million to 20 states specifically for enforcement and oversight related to MH/SU parity. Maryland, for example, used these funds to create a position specific to MH/SU parity oversight, which the state made permanent after the funding period ended. In 2018, CMS awarded funding through the State Flexibility to Stabilize the Market Grant Program that focused on supporting state implementation and planning around several PPACA market reforms and consumer protections. Washington, for example, is using this grant to review issuer’s implementation of state and federal MH/SU parity requirements and to assess access to MH/SU treatment. HHS, DOL, and Treasury also coordinate with state regulators and NAIC to issue guidance for stakeholders in an effort to increase understanding of and compliance with MH/SU parity requirements. From December 2010 to September 2019, the three agencies issued 10 guidance documents that included 58 frequently asked questions and answers specific to MH/SU parity requirements. These guidance documents cover a range of topics, including describing the types of plans covered by MH/SU parity requirements, providing definitions of QTLs and NQTLs, and using specific scenarios to show if a practice—such as requiring prior authorization for certain medications to treat a substance use disorder—is permissible under the law. HHS, DOL, and Treasury have also developed guidance or support on MH/SU parity aimed specifically at consumers. For example, as part of HHS’s action plan, HHS developed a web-based portal to assist consumers in identifying, based on the consumer’s insurance type, the appropriate entity to contact for filing a parity-related complaint—HHS, DOL, or state insurance regulators. See appendix III for examples of guidance published by the agencies and the target audience. States have reported that existing guidance and support from the agencies helped states in their reviews of issuers for compliance with MH/SU parity requirements; however, some states and other stakeholders have identified a need for additional guidance. Specifically, officials from 43 states reported in our survey that guidance or other support from the agencies has helped inform state reviews of plans or issuers for compliance with MH/SU parity requirements, and officials from 24 states reported in our survey that additional guidance or support is needed. In written survey responses, state officials most commonly identified the need for additional guidance around reviewing NQTLs. In their comments for the 2017 HHS public listening session, some stakeholders identified the need for additional compliance information. Similarly, two industry stakeholders and one consumer advocacy organization also told us that additional guidance around NQTLs would be helpful to improve compliance with MH/SU parity requirements. HHS, DOL, and Treasury issued additional guidance after seeking public comment, as required by the 21st Century Cures Act. This guidance covers the types of information plans must release to consumers or providers related to MH/SU parity, known as disclosure requirements, and NQTL requirements. Specifically, the guidance document contains (1) answers to 11 additional frequently asked questions on NQTLs and disclosure requirements and (2) a disclosure template consumers can use to request MH/SU parity-related information from their employer- sponsored health plans and issuers of individual plans. Released in September 2019, the guidance may address the concerns identified by states and stakeholders. Employer-sponsored group plan and issuer compliance with federal MH/SU parity requirements is important to ensure that individuals seeking MH/SU treatment do not face discriminatory practices. DOL’s and CMS’s oversight of employer-sponsored group plan compliance with federal health care laws is driven by information and complaints they receive about potential noncompliance; however the agencies receive relatively few consumer complaints about MH/SU parity and DOL refers a small percentage of those complaints to its investigators. DOL’s and CMS’s reviews of compliance with relevant federal health care laws—including those related to MH/SU parity even when the origin of the investigation was unrelated to MH/SU parity concerns—has enabled the agencies to identify some plan and issuer violations of MH/SU parity requirements. However, the frequency with which compliance issues are identified in these reviews suggests that noncompliance with MH/SU parity requirements may be common. Given stakeholder-identified concerns with relying on complaints for MH/SU parity, the complexity of MH/SU parity requirements, and the limited complaints received in this area, DOL and CMS may not be identifying and responding to the risks posed by the agencies’ oversight approach. As a result, consumers may be enrolled in plans that fail to comply with MH/SU parity requirements. Until DOL and CMS evaluate whether the current approach of targeted oversight in response to information received is effective for identifying compliance issues with MH/SU parity, they will not know whether this approach is effective or whether additional strategies are needed to help ensure that their oversight meets their commitment to full implementation of MHPAEA. We are making a total of two recommendations, including one to DOL’s Employee Benefits Security Administration and one to HHS’s CMS. Specifically: The Assistant Secretary of Labor for the Employee Benefits Security Administration should evaluate whether targeted oversight in response to information received is effective for ensuring compliance with MH/SU parity requirements. If this evaluation determines the current targeted oversight approach results in significant program risks, the Employee Benefits Security Administration should develop a plan to more effectively enforce MH/SU parity requirements and if necessary seek additional oversight authority, as warranted. (Recommendation 1) The Administrator of CMS should evaluate whether targeted oversight in response to information received is effective for ensuring compliance with MH/SU parity requirements for non-federal governmental plans. If this evaluation determines the current targeted oversight approach results in significant program risks, CMS should develop a plan to more effectively enforce MH/SU parity requirements and if necessary seek additional oversight authority, as warranted. (Recommendation 2) We provided a draft of this report to DOL, HHS, and Treasury for review and comment. DOL and HHS both concurred with our recommendations. DOL’s comments are reproduced in appendix IV and discussed below. HHS’s comments are reproduced in appendix V and discussed below. DOL, HHS, and Treasury also provided technical comments, which we incorporated as appropriate. In its written comments, DOL elaborated on its current strategy to review its health enforcement program. Specifically, DOL noted that it reviews all MH/SU parity-related investigation findings and case closings, and all health plan investigations include a review of MH/SU parity requirement compliance, regardless of the source or reason for the investigation. DOL also stated that its current enforcement strategy to identify violations at the plan level and seek corrections of systemic violations at the service provider level has been successful. However, as explained in our report, DOL has not analyzed whether relying on targeted reviews alone increases the risk of noncompliance with MH/SU parity requirements in private, employer-sponsored group plans. Such an evaluation could help DOL identify and determine if additional enforcement strategies related to MH/SU parity requirements are needed. In its comments, DOL also noted its resource limitations. Specifically, DOL stated that despite the Employee Benefits Security Administration’s small size and limited resources, it is responsible for overseeing 2.4 million health plans, among other things. DOL noted that it will consider GAO’s recommendation in light of its resource constraints. Given these constraints, an evaluation could help ensure DOL’s resources are most efficiently targeted. In its comments, HHS stated that it is committed to enforcing MH/SU parity requirements. HHS described its responsibilities for enforcement and noted that it works with plans and issuers to help them understand and comply with MHPAEA. HHS also stated that it collaborates with state regulators, DOL, and Treasury in an effort to increase understanding and compliance. We are sending copies of this report to the appropriate congressional committees, the Secretaries of Health and Human Services, Labor, and Treasury, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or DickenJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Appendix I: Mental Health and Substance Use Disorder Parity Requirements in Medicaid and the State Children’s Health Insurance Program (CHIP) In 2016, the Centers for Medicare & Medicaid Services (CMS), an agency within the Department of Health and Human Services, issued a final rule addressing the application of the Paul Wellstone and Pete Domenici Mental Health Parity and Addiction Equity Act of 2008 (MHPAEA) to Medicaid managed care organizations (MCO), Medicaid Alternative Benefit Plans (ABP), and CHIP. Under this final rule, all beneficiaries enrolled in Medicaid MCOs, ABPs, and CHIP are entitled to mental health and substance use disorder (MH/SU) benefits that comply with certain MH/SU parity requirements of MHPAEA, which generally requires that MH/SU benefits be no more restrictive than medical or surgical benefits when MH/SU benefits are offered. The CMS final rule defines the role of the states in evaluating overall compliance of state Medicaid and CHIP programs with MH/SU parity requirements. The final rule establishes the processes by which states must assess and document that their Medicaid and CHIP programs comply with MH/SU parity requirements. CMS guidance provides detailed information to help states assess their compliance with MH/SU parity requirements. These processes vary by program type, as described below. Medicaid MCOs. The final rule requires either the state or the Medicaid MCO to complete a parity analysis, depending on how Medicaid benefits are provided. In general, CMS guidance requires states or MCOs to assess if a plan’s MH/SU benefits are no more restrictive than medical or surgical benefits for the following items: aggregate lifetime/annual dollar limits, financial requirements, quantitative treatment limitations (QTL), and non-quantitative treatment limitations (NQTL). The MCO must complete this analysis when it provides all Medicaid benefits—both medical and MH/SU benefits. The state must complete the parity analysis if the benefits are provided through multiple delivery systems, such as through multiple MCOs or the state’s fee-for-service Medicaid program, and provide the parity analysis to CMS for review. States are also required to make the documentation of compliance with the final rule available to the general public. The final rule also requires states to include contract provisions requiring compliance with MH/SU parity requirements in all MCO and other applicable contracts. CMS guidance encourages states to consider including provisions in their contracts with MCOs to ensure adequate oversight of the MCO’s parity-related monitoring and compliance activities, such as ensuring the state can see the MCO’s parity analysis. ABPs and CHIP. The final rule requires states to document that their ABP and CHIP plans comply with MH/SU parity requirements in the comprehensive state plans that describe the state’s Medicaid and CHIP programs. CMS guidance requires that states conduct a parity analysis demonstrating this compliance as part of the documentation the states submit to CMS to request a change to the state plan, known as a state plan amendment. In certain CHIP programs and ABPs, the state does not have to complete the full parity analysis, known as deemed compliance. A plan may be deemed to be in compliance with MH/SU parity requirements for plan members aged 20 and under if Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) benefits are provided to those individuals, because EPSDT benefits include MH/SU services. CMS guidance requires that states demonstrate that EPSDT benefits are covered by their CHIP plans through documents such as member handbooks. (The state or MCO would still be required to conduct a parity analysis to ensure that plan benefits for those not eligible for EPSDT benefits satisfy parity requirements.) To ensure state Medicaid and CHIP benefits comply with MH/SU parity requirements, CMS must review states’ documentation of compliance. For Medicaid managed care, CMS must review state contracts with managed care plans to ensure they are compliant with CMS requirements. CMS reviews the parity provisions in MCO contracts and the state’s parity analysis as part of the normal contract review process. Additionally, for states in which some but not all benefits are provided by an MCO, CMS reviews documentation of the state’s parity analysis to ensure the full scope of services being provided complies with MH/SU parity requirements. For ABP and CHIP, CMS staff are required to review the state plan amendments submitted by the states and supporting documentation for compliance with MH/SU parity requirements. See figure 2 for a map of the parity compliance review process by program type. We conducted a literature review to identify information about compliance with federal mental health/substance use disorder (MH/SU) parity requirements by individual and employer-sponsored small and large group health plans. We identified literature through keyword searches of several bibliographic databases, including ProQuest, MEDLINE, Scopus, and WorldCat. We focused our review on literature published between January 2011 and May 2019. Of the 828 study citations we identified, we reviewed 77 full studies; of those, we determined there were six relevant studies. We also identified four additional studies through web searches, interviews with stakeholders, and citations included in the literature we reviewed. Our review included studies that contained information collected about compliance by individual and employer-sponsored group health plans with federal MH/SU parity requirements by assessing compliance, comparing MH/SU plan benefits and requirements to medical/surgical benefits, or by assessing changes in MH/SU plan benefits over time. Our review excluded studies that focused on the effects of federal MH/SU parity requirements on consumer utilization of MH/SU services, consumer spending on MH/SU services, and plan spending on MH/SU services. The 10 studies are described in more detail below. Berry, Kelsey N., et al. “A Tale of Two States: Do Consumers See Mental Health Insurance Parity When Shopping on State Exchanges?” Psychiatric Services, vol. 66, no. 6 (2015): pp. 565–567. Methodology: The case study reviewed documents for all small group and individual health insurance products offered on two state health insurance exchanges between October 2013 and March 2014 and assessed compliance with observable quantitative treatment limitations (QTL) and non-quantitative treatment limitations (NQTL). Examples of key findings: The case study found that for 75 percent of products offered, the financial requirements and certain NQTLs reviewed appeared to be compliant with MH/SU parity requirements, but compliance varied by state. On one state health insurance exchange (with fewer products) more than half the products appeared inconsistent with the parity requirements reviewed, particularly the NQTLs. On the other state health insurance exchange, 11 percent of the products contained a financial requirement that violated MH/SU parity requirements. The case study was not able to assess all aspects of NQTL requirements because the available documents did not provide information about all NQTLs, such as whether or not a specific MH/SU treatment would be considered medical necessary. Cowell, Alexander J., et al. Changes in Individual and Small Group Behavioral Health Coverage Following the Enactment of Parity Requirements: Final Report. A report prepared for the United States Department of Health and Human Services, Office of the Assistant Secretary for Planning and Evaluation, Office of Disability, Aging and Long-Term Care Policy. January 2017. Methodology: The study reviewed plan documents for a sample of individual and small group plans and assessed changes in MH/SU and medical/surgical benefits before implementation of MH/SU parity requirements in 2013 and after implementation in 2014. Examples of key findings: The study found that in 2014 most plans’ financial requirements and QTLs were compliant with MH/SU parity requirements. However, the plans included different limits on the quantity of prescription drugs covered for medications used for MH/SU treatments and those used for other chronic health conditions. This difference indicated possible noncompliance with MH/SU parity requirements for NQTLs, and the study noted that differences in NQTLs between MH/SU and other health conditions is an issue in need of additional study. The study stated that plan documents did not contain all information necessary to fully assess NQTLs. Friedman, Sarah, et al. “The Mental Health Parity and Addiction Equity Act Evaluation Study: Impact on Mental Health Financial Requirements among Commercial ‘Carve-In’ Plans.” Health Services Research, vol.51, no. 1 (2018) pp.366-388. Methodology: The study analyzed a sample of health benefit design data from 2008 to 2013. This data on large group plans was obtained from a managed behavioral health organization and was analyzed for changes in cost-sharing requirements for plan members before and after parity requirements were implemented. Examples of key findings: The study found that there were both increases and decreases in cost-sharing after MH/SU parity requirements went into effect. For example, among plans that covered both in-network and out-of-network benefits and required coinsurance for inpatient stays, the likelihood of using coinsurance increased by 4 percentage points, and the coinsurance rate increased by .75 percentage points. However, outpatient copayments were reduced by $3.88 among plans that offered only in-network benefits. Goplerud, Eric. Consistency of Large Employer and Group Health Plan Benefits with Requirements of the Paul Wellstone and Pete Domenici Mental Health Parity and Addiction Equity Act of 2008. A report prepared for the United States Department of Health and Human Services, Office of the Assistant Secretary for Planning and Evaluation, Office of Disability, Aging and Long-Term Care Policy. November 2013. Methodology: The study summarized the results of multiple assessments of compliance with MH/SU parity between 2009 and 2011 based on both plan data available from private databases and the Department of Labor, and survey data and interviews with health plan representatives. Examples of key findings: The study found that between 2009 and 2011 large group health plans made substantial changes to their plan designs to meet the parity requirements. By 2011, most large group health plans had removed most financial requirements that did not meet MH/SU parity requirements, although 20 percent still had a non- compliant copayment for outpatient services. Nearly all had eliminated the use of separate deductibles for MH/SU treatment and medical/surgical treatment. The study also noted that assessing consistency with NQTLs was difficult based on document reviews. Hodgkin, Dominic, et al. “Federal Parity and Access to Behavioral Health Care in Private Health Plans.” Psychiatric Services, vol. 69, no. 4, (2018): pp. 396–402. Methodology: The study reported results of surveys of senior executives at commercial health plans regarding changes to MH/SU benefits over time. The surveys were conducted between September 2010 and June 2011, and again between August 2014 and April 2015. The study did not independently verify the self-reported data from senior executives. Examples of key findings: The study did not find significant noncompliance with MH/SU parity requirements. It found that fewer plans required prior authorization for outpatient MH/SU treatment than medical treatment. This suggests compliance with the requirement that NQTLs applied to MH/SU treatment be no more restrictive than those for medical/surgical treatment. The study also found that 6 percent of products used coinsurance for MH/SU treatment and copayments for other medical care. While this is not necessarily noncompliant, this could result in noncompliant higher cost-sharing for MH/SU treatment than other medical care in some cases, because coinsurance may result in higher cost-sharing than a copayment. Horgan, Constance M., et al. “Health Plans’ Early Response to Federal Parity Legislation for Mental Health and Addiction Services.” Psychiatric Services, vol. 67, no. 2 (2016): pp. 162–168. Methodology: The study reported results of surveys of senior executives at commercial health plans regarding changes to MH/SU benefits over time. The surveys were conducted between September 2010 and June 2011. The study did not independently verify the self- reported data from senior executives. Examples of key findings: The study found that plans complied with MH/SU parity requirements by lifting QTLs that only applied to MH/SU benefits, although 4 percent of plans had QTLs that applied to mental health treatment that did not apply to medical/surgical treatment. This study also found that fewer plans had prior authorization requirements for outpatient MH/SU treatment than outpatient medical treatment, which suggests compliance with the requirement that NQTLs applied to MH/SU treatment be no more restrictive than those for medical/surgical treatment. The study was not able to assess if prior authorization requirements were implemented differently between MH/SU and medical/surgical treatment. Huskamp, Haiden A., et al. “Coverage of Medications That Treat Opioid Use Disorder and Opioids for Pain Management in Marketplace Plans, 2017.” Medical Care, vol.56, no 6(2018) pp.505-509. Methodology: The study compared coverage for medications used to treat opioid use disorder (an MH/SU benefit) and opioids used to treatment pain management (a medical/surgical benefit) in 2017 health insurance marketplace exchange plans, using publicly available data for a sample of 100 plans. Examples of key findings: The study found that most plans covered at least one of the four primary medications intended for opioid use disorder treatment, while 100 percent of plans cover short-acting opioid pain medications. For example, 80 percent of plans cover a generic combination of buprenorphine and naloxone for treatment of opioid use disorder, while 100 percent of plans cover the generic version of Oxycodone and Fentanyl for treatment of pain disorder. The study states that additional monitoring is needed to ensure that plan coverage of MH/SU medications complies with MH/SU parity requirements. Thalmayer, Amber Gayle, et al. “The Mental Health Parity and Addiction Equity Act Evaluation Study: Impact on Nonquantitative Treatment Limits for Specialty Behavioral Health Care.” Health Services Research, vol. 53, no. 6 (2018): pp. 4584–4608. Methodology: The study analyzed a sample of health benefit design data from 2008 to 2013. This data on large group plans was obtained from a managed behavioral health organization and was analyzed for changes in NQTL requirements for plan members before and after parity requirements were implemented. Examples of key findings: The study found plans were less likely to require NQTLs, such as prior authorization and financial penalties for failure to obtain prior authorization for MH/SU treatments after MH/SU parity requirements were implemented, among plans that manage MH/SU benefits separately from other medical benefits. However, the study also found that plans were more likely to include a penalty for failing to obtain prior authorization for MH/SU treatments after MH/SU parity requirement implementation if the MH/SU benefits were managed by the same plan that managed other health benefits. The study was limited in that it did not assess how NQTLs were implemented by plans and so could not determine if there were differences in how MH/SU and medical requirements were applied. Thalmayer, Amber Gayle, et al. “The Mental Health Parity and Addiction Equity Act (MHPAEA) Evaluation Study: Impact on Quantitative Treatment Limits.” Psychiatric Services, vol. 68, no. 5 (2017): pp. 435–42. Methodology: The study analyzed a sample of health benefit design data from 2008 to 2013. This data on large group plans was obtained from behavioral health organizations and was analyzed for changes in QTL requirements for plan members before and after MH/SU parity requirements were implemented Examples of key findings: The study found that QTLs were nearly eliminated after MH/SU parity requirements were implemented. This suggests that plans became compliant with parity requirements because if a QTL does not exist it cannot be more stringent than a medical/surgical QTL. The study noted that plans that continued to have QTLs might be noncompliant with MH/SU parity requirements, but did not assess that. Center on Addiction, Uncovering Coverage Gaps II: A Review and Comparison of Addiction Benefits in ACA Plans, (New York: March 2019). Methodology: The study reviewed plan documents to assess compliance with MH/SU parity requirements from a sample of 2017 benchmark plans and plans sold on health insurance exchanges. Examples of key findings: The study identified nine benchmark plans and 10 states that sold plans that were not compliant with MH/SU parity requirements (where this could be identified through plan documents). The study was able to identify non-compliant financial requirements in three benchmark plans and non-compliant QTLs in six benchmark plans, and found one state that sold a plan to with a possible non-compliant QTL. The study also identified two benchmark plans that had possibly noncompliant NQTLs, and 21 states that had either NQTL violations or indications of possible NQTL violations that could not be fully assessed with the available information. The study noted that plan documentation did not contain sufficient information to fully assess compliance with MH/SU parity requirements related to NQTLs. Summary This October 2016 publication provides an overview of federal disclosure laws affecting private-sector, employer-sponsored group health plans and health insurers. Between December 2010 and September 2019, the three agencies issued 10 guidance documents with 58 frequently asked questions about MH/SU parity requirements. These frequently asked questions are designed to help people understand the law, and benefit from it as intended through examples that illustrate the requirements. Topics include the types of plans covered by MH/SU parity requirements and specific examples of how to determine if a practice or policy is permissible under the law. This June 2016 brochure gives a high-level overview of MH/SU parity requirements and lists common limits placed on MH/SU services that are subject to parity. This April 2018 action plan released by HHS covers recent and planned actions related to HHS, DOL, and Treasury’s implementation of MH/SU parity requirements. The plan, required by the 21st Century Cures Act, includes information about a public listening session the agencies held in July 2017. This February 2016 publication describes MH/SU parity requirements for people with employer-sponsored health plans who need MH/SU treatment. It describes why some MH/SU benefit claims are denied and how to file a claim, the denial of a claim, and the appeals process. Self-Compliance Tool for the Mental Health Parity and Addiction Equity Act (MHPAEA) DOL issued this self-compliance tool in April 2018 to help both issuers and regulators determine if a plan or issuer complies with MH/SU parity requirements and other related federal health care laws. In May 2016, DOL and HHS published this brief guide of examples of plan provisions that—absent similar restrictions on medical/surgical benefits—could be “red flags” that a plan or issuer may be imposing an NQTL that is out of compliance with MH/SU parity requirements and should be reviewed. In addition to the contact named above, Kristi Peterson (Assistant Director); Summar C. Corley (Analyst-in-Charge); Kerry Casey; and Eric J. Schwab made key contributions to this report. Also contributing were Leia Dickerson, Cynthia Khan, Laurie Pachter, Ethiene Salgado- Rodriguez, and Emily Wilson Schwark.", "summary": "MHPAEA requires large group health plans that offer MH/SU benefits to ensure parity between MH/SU and medical/surgical benefits. To meet the essential health benefits requirements of the Patient Protection and Affordable Care Act, certain issuers offering small group and individual plans must comply with MHPAEA's MH/SU parity requirements. The 21st Century Cures Act included a provision for GAO to review federal and state oversight of MH/SU parity requirements and the extent to which health plans comply with these requirements. This report, among other objectives, (1) examines how DOL, HHS, and states oversee health plan compliance with MH/SU parity requirements; and (2) describes what is known about the extent to which health plans are complying with MH/SU parity requirements. For this report, GAO reviewed DOL and HHS policies, guidance, and reports; conducted a survey and received responses from all 50 states and the District of Columbia about oversight practices; interviewed officials from DOL, HHS, and selected states; interviewed national and state stakeholders; and reviewed available research studies regarding health plan compliance with MH/SU parity. The Paul Wellstone and Pete Domenici Mental Health Parity and Addiction Equity Act of 2008 (MHPAEA) generally requires that coverage for mental health and substance use disorder (MH/SU) be no more restrictive than coverage for medical/surgical services. State agencies and the Departments of Labor (DOL) and Health and Human Services (HHS) share responsibility for overseeing compliance with these MH/SU parity requirements among group and individual health plans. These oversight practices vary. While nearly all of the state officials who responded to GAO's survey reported that they perform some review of group and individual insurance plans for compliance with MH/SU parity requirements before they are approved to be sold to consumers, states vary in the frequency and type of reviews they conduct after consumers enroll in plans. For example, officials from 12 states reported that they conducted a targeted review of specific MH/SU parity concerns in 2017 and 2018, with the number of reviews ranging from one to 22 reviews per state. DOL and HHS conduct targeted reviews of certain employer-sponsored group plans when they receive information—such as consumer complaints—about possible noncompliance with MH/SU parity requirements or other federal heatlh care requirements. Unlike states, these reviews only occur after consumers enroll in these plans. For example, in fiscal years 2017 and 2018, DOL completed 302 reviews that included a review of MH/SU parity compliance in its oversight of 2.2 million plans. Nearly all these reviews originated from complaints or other information about potential noncompliance with federal health care laws unrelated to MH/SU parity. According to DOL and HHS officials, the departments have not analyzed whether relying on targeted reviews alone increases the risk of noncompliance with MH/SU parity requirements in employer-sponsored group plans. Without such an evaluation, DOL and HHS do not know if their oversight is effective or whether they need to adopt additional strategies. While states, DOL, HHS, and the research GAO reviewed identified some instances of noncompliance with MH/SU parity requirements, the extent of compliance with these requirements is unknown. States, DOL, and HHS have identified some noncompliance with MH/SU parity requirements based on consumer complaints and other information about potential noncompliance. For example, DOL reported citing 113 violations of MH/SU parity requirements through its reviews in 2017 and 2018. The available research studies GAO reviewed also identified noncompliance with some of the requirements by reviewing plan documentation and benefit data, among other methods. However, according to stakeholders GAO interviewed, complaints are not a reliable indicator of the extent of noncompliance because consumers may not know about MH/SU parity requirements or may have privacy concerns related to submitting a complaint. GAO is recommending that DOL and HHS evaluate whether relying on targeted oversight is effective for ensuring compliance with MH/SU parity requirements or whether alternative approaches are needed. DOL and HHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "In 1903, the War Department under President Theodore Roosevelt established the National Board for the Promotion of Rifle Practice, today known as CMP, with the general purpose of promoting the development of marksmanship skills and preparing individuals in the event that they were called upon to serve in the military. For the next several decades, the Army managed and operated CMP. In 1990, we reported that CMP was of limited value to military preparedness because, among other things, CMP’s objectives and goals were not linked to Army mobilization and training plans and program-trained personnel were not tracked. The NDAA for Fiscal Year 1996 moved CMP out of the Army and established CMP as a federally chartered, nonprofit corporation. The act also required the Secretary of the Army to transfer all firearms, ammunition, and funds from sales previously under the control of the Army program to CMP. The governing statutes for CMP and Army support of CMP activities are generally found in chapter 407 of Title 36, U.S. Code. Among other things, these provisions provide for the organization, governance structure, and functions of CMP. These functions include instructing U.S. citizens in marksmanship, promoting practice and safety in the use of firearms, and conducting competitions. For purposes of training and competition, CMP may issue or loan certain rifles, ammunition, repair parts, and other supplies necessary for activities related to CMP to affiliated organizations that provide firearms training to youth, the Boy Scouts of America, 4-H Clubs, Future Farmers of America, and other youth-oriented organizations. CMP is required to give priority to activities that benefit firearms safety, training, and competition for youth and that reach as many youth participants as possible. As one of its functions, CMP conducts rifle and handgun marksmanship competitions such as the annual National Matches. The National Matches is open to members of the armed forces, the National Guard, the Reserve Officers’ Training Corps, and rifle clubs, among other entities, as well as to civilians. Additionally, CMP may sell certain surplus rifles and M1911 handguns to affiliated organizations that provide training in the use of firearms, such as gun clubs. Finally, CMP is authorized to sell to U.S. citizens who are members of affiliated gun clubs, at fair market value, surplus .22 caliber rimfire rifles, .30 caliber rifles, and .45 caliber M1911/M1911A1 handguns, as well as ammunition, repair parts, and other supplies necessary for target practice. The Army and CMP have entered into various agreements governing their relationship. An MOU from 2016 currently delineates Army and CMP responsibilities for, among other things, the transfer of surplus firearms and associated parts and ammunition. Appendixes to the MOU identify approximately 170 surplus rifles and handguns that may be transferred to CMP. These surplus firearms include the M1 Garand .30 caliber rifle and other rifles, such as the 1903 Springfield and 1917 Enfield. See figure 1 for a photograph of a surplus M1 .30 caliber rifle packed for shipment. The Army provides a variety of support to CMP, including identifying and reserving certain surplus firearms, ammunition, and parts. At CMP’s request, the Army can transfer these firearms, ammunition, and parts to CMP under procedures established in the MOU. TACOM is the executive agent for small arms. Per the MOU between the Army and CMP, TACOM provides various forms of support to CMP, including facilitating transfers of surplus firearms from U.S. sources and recovery of firearms from foreign countries before transfer to CMP. For surplus firearms transfers within the United States, CMP reimburses the Army for the cost of preparation and transportation, including for the Army’s standard depot operations costs. The costs of the recovery of firearms, ammunition, and parts from foreign countries are treated as incremental direct costs of Army logistical support, and are also to be reimbursed by CMP. The MOU contains further provisions related to Army and CMP responsibilities and procedures, such as provisions regarding Army support for competitions and the Small Arms Firing School, and CMP’s role in the Army’s Ceremonial Rifle Program. The MOU also contains procedures and responsibilities related to funding. Finally, the MOU specifies certain management internal controls to be undertaken by CMP, including those related to the sale of firearms and the accountability of transferred materiel. CMP’s implementation and management of these controls is to be assessed and documented in an audit report to the Army required by the agreement. To implement the transfer of surplus M1911 handguns, parts, and accessories, the Army and CMP entered into a Memorandum of Agreement in January 2018, and the Army began transferring the surplus M1911 handguns to CMP the same month. The Memorandum of Agreement establishes procedures and requirements for the Army and CMP additional to those in the 2016 MOU. Among other things, it requires CMP to provide the Army with transaction data for all surplus handguns received and sold on a quarterly basis, including the number transferred to CMP, the number sold, a listing of the serial numbers for handguns sold, and any information CMP has regarding crimes committed with a purchased M1911 handgun. The Memorandum of Agreement further required CMP to take certain actions with respect to security and accountability procedures for surplus M1911 handgun processing and storage. See figure 2 for a photograph of surplus M1911 handguns. Chapter 407 of Title 36, U.S. Code authorizes CMP to sell firearms to individuals who (1) are U.S. citizens, (2) are legally of age, and (3) are members of CMP-affiliated gun clubs. CMP’s sales of surplus firearms are generally subject to applicable federal, state, and local law. For example, the minimum age to purchase a rifle from a federal firearms licensee (FFL) is 18, while the minimum age to purchase a M1911 handgun from an FFL is 21. Additionally, CMP must establish procedures to obtain a criminal records check with federal and state law enforcement agencies. Certain federal requirements and restrictions related to the sale of firearms are contained in section 922 of Title 18, U.S. Code. Among other things, section 922 prohibits selling or otherwise disposing of firearms to certain prohibited persons. Generally, only FFLs may engage in the business of dealing in firearms. Additionally, FFLs generally may not sell firearms directly to out-of-state customers other than another FFL. However, these restrictions do not apply to CMP for the sale of surplus .22 caliber rimfire and .30 caliber rifles. Specifically, CMP may sell these rifles without operating as an FFL and ship these rifles directly to customers around the country, unless prohibited by that customer’s state or local law. With respect to the sale of the surplus M1911 handguns, CMP must obtain a license and operate as an FFL. The MOU between the Army and CMP delineates a number of responsibilities for both organizations regarding the transfer of surplus firearms. Furthermore, we found that both organizations have established procedures to carry out these responsibilities. Appendixes to the MOU list approximately 170 firearms that the Army has identified as surplus to its needs. If any of the surplus firearms described in the MOU are identified by the Army in a domestic location, the Army reserves those firearms for transfer to CMP pending a formal written request from CMP for the transfer of the surplus firearms in question. For example, in fiscal year 2017 the Army identified and reserved for transfer to CMP more than 1,000 surplus rifles that various Department of Defense museums found to be surplus to their needs. Under the MOU, once TACOM informs CMP it has reserved surplus firearms that may be transferred, CMP can submit a transfer request for the surplus firearms in writing to TACOM. CMP’s written request must acknowledge that the requested materiel is on the list of firearms approved for transfer; certify that CMP will provide all security, oversight, and accountability—as required by law—of the materiel; and describe how CMP will use the requested materiel. TACOM facilitates the transfer of surplus firearms to CMP as required by the MOU. In some instances, the Army directly ships surplus firearms within the United States to CMP. In other instances, TACOM relies on the Defense Logistics Agency (DLA) to ship the surplus firearms to CMP. If DLA transfers the surplus firearms, the firearms are either shipped directly to CMP or to the DLA facilities located in Anniston, Alabama, where they are released to CMP. Under the MOU, CMP reimburses the Army for certain costs associated with transportation, supply depot operations, and administrative support. Both CMP and DLA officials told us that surplus firearms located at DLA’s facilities in Anniston, Alabama, did not incur shipping cost to the Army because CMP arranges the transfer from the DLA facilities directly to CMP’s facilities also located in Anniston, Alabama. For example, according to TACOM and CMP officials the Army did not incur any transportation costs for transferring 8,000 surplus M1911 handguns to CMP in January 2018. According to an Army official, this was because CMP transported 6,736 M1911 handguns from the DLA facility, an additional 1,242 M1911 handguns from the Center of Military History Museum Support Center, and 22 M1911 handguns from TACOM facilities—all located in Anniston, Alabama—back to its own facility in Anniston for storage. In addition to firearms from domestic locations, the Secretary of the Army may also recover certain surplus firearms furnished to foreign countries on a grant basis under the Foreign Assistance Act and transfer them to CMP. If the Secretary of the Army decides to transfer surplus firearms from a foreign country, TACOM and the Office of the Administrative Assistant to the Secretary of the Army works with the State Department, Office of Defense Cooperation, representatives located in the respective foreign country to recover and facilitate the transfer and shipment of surplus firearms from these recipients to CMP. For example, according to Army officials, CMP received approximately 100,000 surplus M1 rifles in fiscal year 2018; more than 13,000 surplus M1 rifles were recovered and transferred from Turkey in addition to nearly 87,000 surplus M1 rifles from the Philippines. After CMP receives the surplus firearms, the MOU requires CMP to perform all accounting procedures required by the Army for inventory control, including compiling the surplus firearms’ serial numbers. According to CMP officials, CMP uses a commercial point of sale system to track inventory and performs an audit of firearms stored at its facilities annually. For example, according to CMP officials, to count and verify the inventory of incoming shipments of surplus firearms, CMP staff open and inspect each box of surplus firearms upon receipt of the firearms in their facilities in Anniston, Alabama. CMP staff then inventory each firearm by matching the unique serial number found on the receiver of each firearm to the manifest included with the shipment. CMP then enters these firearms into its inventory using each firearm’s unique serial number. After shipping firearms to CMP, the MOU requires TACOM to update the Army’s Unique Item Tracking database for tracking the firearms, which it does by serial number. By statute, title to a transferred firearm does not vest with CMP until immediately before CMP delivers the firearm to an eligible purchaser. CMP primarily uses sales procedures and the Federal Bureau of Investigation’s National Instant Criminal Background Check System (NICS) to address requirements related to the sale of surplus firearms. See figure 3 below for a description of several of the processes used by CMP to address the requirements related to the sale of surplus firearms. While various federal statutes and provisions from the agreements between the Army and CMP apply to selling both the surplus rifles and the surplus handguns, there are some differences. For example: Because section 40733 of Title 36, U.S. Code, exempts CMP from certain federal firearms requirements and restrictions, CMP can ship surplus rifles directly to a customer’s home, unless that would conflict with state or local laws applicable where the firearm is being shipped. In contrast, CMP must operate as an FFL for selling surplus M1911 handguns and will ship purchased handguns to an FFL, such as a certified gun shop, in the customer’s state. The local FFL repeats the background check before turning over the firearm to the customer. The MOU limits CMP’s sale of surplus rifles to eight per customer per calendar year, while the Memorandum of Agreement limits CMP’s sale of M1911 handguns to one per customer while it is in effect. The minimum age to purchase any rifle from CMP, including surplus rifles, is 18 while the minimum age for purchasing handguns, including surplus handguns, is 21. CMP is required to ship the surplus handguns with a security device such as a trigger lock, which it is not required to do for the sale of surplus rifles. CMP uses sales procedures to address federal requirements and agreements with the Army. According to CMP officials, the sales procedures, specifically the application to purchase the surplus firearms that customers are required to complete and have notarized, address some of the federal requirements and agreements between the Army and CMP for the sale of surplus firearms. According to CMP, customers are required to mail the original completed application package, including copies of substantiating documentation and notarization, to CMP in order to apply to purchase a surplus firearm. The application includes a form requiring potential customers to certify that they do not fall within any of the categories of individuals prohibited from being sold or receiving a firearm. The form must be signed and notarized, and specifically lists the prohibited categories, as well as certain CMP-unique categories. As part of the form, potential customers must also certify that by receipt or possession of the firearm they will not be in violation of any state law or published ordnance applicable where they reside. Additionally, applicants must provide proof of the following: Citizenship and age: Applicants must include a copy of a U.S. birth certificate; passport; proof of naturalization; a military identification card for certain ranks (active duty, reserve component, National Guard, or retired); or any official government document that shows that an individual was born in the United States or that otherwise identifies U.S. citizenship. According to the application procedures, a copy of a driver’s license is proof of age, but not of citizenship. Membership in CMP-affiliated organization: Applicants are required to provide a copy of their current membership card or another proof of membership in a CMP-affiliated organization. According to CMP, this requirement can also be satisfied by providing proof of membership in one of the federally chartered veterans’ organizations such as the Veterans of Foreign Wars or American Legion; proof of either current or retired military service; or proof of current or retired status in a law enforcement department, agency, or association. Marksmanship or other firearms-related activity: Applicants are required to show proof of participation in a marksmanship-related activity or otherwise show familiarity with the safe handling of firearms and range procedures. According to CMP, this can be accomplished by providing documentation of current or past military or law enforcement service, participation in a shooting competition, completion of a marksmanship clinic that included live-fire training, a concealed carry license, or a FFL license, among other things. Proof of license, permit, or firearms owner identification card: If the state or locality where the applicant resides requires a license, permit, firearms owner identification card, or other documentation, applicants are also required to include a photocopy of such a document with the application for purchase of the surplus firearm. Federal Firearms Licensee: Applicants purchasing surplus rifles who reside in states or localities where shipments must be made to an FFL and applicants purchasing surplus M1911 handguns must provide a copy of the license for the FFL that will be receiving the shipped firearm. According to CMP officials, CMP staff verifies the completeness of the application, including all required documentation while entering applicants’ information into CMP’s commercial point of sale and inventory system. According to CMP officials this involves staff entering the customer’s data into the point of sale and inventory system and verifying the customer’s name, address, proof of age, proof of citizenship, and membership in a CMP-affiliated organization, among other data. CMP uses a separate version of the same commercial point of sale and inventory system to enter and verify customers’ information for the purchase of surplus M1911 handguns. According to CMP officials this is due in part to the requirement to operate as an FFL in order to sell the surplus M1911 handguns. According to CMP, in addition to meeting additional record-keeping requirements required of FFLs, using two different systems helps CMP ensure it addresses certain sales requirements included in the agreements it has with the Army. For example, according to CMP officials, this helps them address the Memorandum of Understanding and Memorandum of Agreement provisions regarding the maximum number of sales of each type of firearm per customer. During our site visits to CMP’s southern headquarters in Anniston, Alabama in August 2018 and November 2018 we observed CMP officials processing applications from the public to purchase surplus firearms to better understand how CMP addressed certain federal requirements and agreements between the Army and CMP. Specifically, we observed 11 transactions from the receipt of an order through processing and packaging for shipment. Six of these transactions involved rifles and five involved handguns. The 11 transactions we observed were consistent with the sales procedures we identified above. For example, in all cases, we saw CMP staff verify and update customer information from the application packet for existing customers of surplus rifles and input customer information from the application packet for new customers of both the surplus rifles as well as the surplus handguns. We also observed that CMP staff could not move forward with the sale without entering and verifying the information supplied in the application. In one instance, we observed a CMP employee entering an application for the purchase of a surplus rifle that had not been notarized and signed. CMP employees stopped the process for this application and informed us the applicant would be contacted directly and requested to provide the required notarization in order for CMP to proceed with the sale. In another instance, CMP staff demonstrated what would occur if information pertaining to the documentation required to demonstrate membership in a CMP-affiliated gun club was not entered. We saw that CMP employees could not continue to the next screen without entering these data. CMP addresses various other federal requirements for the sale of firearms via background checks. Once the application procedures we described above are completed, CMP staff then enter the prospective customer’s information into the system used by the Federal Bureau of Investigation to perform background checks. CMP intends this National Instant Criminal Background Check System (NICS) to address certain federal requirements for the sale of firearms that we identified above. For example, the NICS background check analyzes various databases to determine whether a prospective customer falls into any of the categories of persons prohibited from being sold or receiving a firearm. The prohibitions involve sale to or receipt by a prospective customer who is under indictment for or has been convicted in any court of a crime punishable by imprisonment for a term exceeding 1 year; is a fugitive from justice; or has been convicted in any court of a misdemeanor crime of domestic violence, among other things. The NICS background check also searches databases to identify a prospective customer who has been discharged from the U.S. Armed Forces under dishonorable conditions, was a U.S. citizen but has since renounced his or her citizenship, or is an unlawful user of or addicted to any controlled substance. Additionally, CMP uses the NICS background check to confirm the applicant is of the minimum age necessary to purchase either a rifle or a handgun. Specifically, CMP uses the NICS background checks to ensure the applicant is at least 18 in order to purchase a surplus rifle or a minimum of 21 in order to purchase a surplus handgun. If an age is entered into NICS that is younger than the minimum age required for purchasing a firearm, the system will not continue performing the background check and will notify CMP staff that the buyer is not old enough to purchase the firearm(s). During our site visits to CMP’s southern headquarters in Anniston, Alabama in August 2018 and November 2018 we observed CMP employees performing the NICS background checks for 10 of 11 transactions, and we observed that the employees were unable to proceed with the background check without certain required information. Specifically, CMP employees demonstrated the result of a change to the birthdate while processing the sale of a surplus M1911 handgun so that the customer would be under 21 years of age. This resulted in the NICS system automatically not allowing the background check to proceed. As previously discussed, the MOU requires (1) CMP to reimburse the Army for certain costs associated with the transfer of firearms to CMP, and (2) TACOM to account for the funds reimbursed by CMP. Specifically, CMP is responsible for assuming or reimbursing TACOM for certain costs associated with transportation, standard depot operations, and administrative support. According to Army officials, these administrative support costs include TACOM’s annual cost of one full-time equivalent position to help administer the identification and shipment of surplus firearms to CMP. The MOU also requires TACOM to provide CMP with semi-annual reports identifying the reimbursable costs the Army incurred for any firearms transfers. According to TACOM and CMP officials, TACOM has met this requirement since at least fiscal year 2012 by providing briefings at CMP’s biannual Board of Director’s meetings. CMP reimburses TACOM by depositing funds into a TACOM-managed reimbursement account. TACOM uses the funds in this account to pay the costs associated with transferring firearms to CMP. According to the MOU, TACOM is also responsible for maintaining accountability of funds provided by CMP in support of certain transportation, supply depot operations, and administrative support. The MOU further provides that administrative funding will be evaluated at the end of each fiscal year. For fiscal years 2008 through 2015, TACOM did not have complete information on the reimbursable costs incurred by the Army and on the amounts CMP reimbursed the Army for those costs. This is because, according to TACOM officials, information on transactions involving the reimbursement account prior to fiscal year 2016 was maintained under a different accounting system and could no longer be accessed. According to TACOM officials, TACOM began using a new financial system in fiscal year 2016 to track the information used to maintain accountability including, among other things, the Army’s reimbursable costs and CMP’s payments for those costs. For fiscal years 2016 and 2017, TACOM officials provided us with examples of the documentation from the current system demonstrating that in addition to tracking CMP’s reimbursement payments TACOM tracks reimbursable costs for transportation, standard depot operations, and administrative support using five specific categories of information: travel, labor, commercial transportation, intra- Army purchases, and contract service. For example, these documents showed that CMP reimbursed the Army for a total of $5 million in fiscal year 2017. CMP’s primary source of revenue from fiscal years 2008 through 2017 was the sale of surplus firearms. During this time frame, according to CMP’s internal financial documents, CMP generated $196.8 million in revenue from the sales of surplus Army rifles. However, the profit that CMP realized from these sales could not be determined. CMP’s internal financial documents show that CMP incurred $84.7 million in costs for those sales, but CMP’s methodology for calculating costs associated with the transfer and sale of surplus rifles did not account for depreciation and administrative expenses. CMP officials anticipate generating additional revenue from the future sale of surplus M1911 handguns and surplus rifles that CMP currently has available to sell. We estimate these sales could generate as much as $104.9 million, or enough to fund CMP’s operations for several more years. Based on our analysis of CMP’s IRS filings and the corporation’s internal financial documents, we identified four primary sources of revenue, of which the sale of surplus Army rifles accounted for the largest share. Sale of surplus Army rifles. According to CMP’s internal financial documents, CMP generated $196.8 million in revenue from the sale of surplus Army rifles during fiscal years 2008 through 2017. The vast majority of these firearms were M1 rifles (see app. II for additional details on the specific types of rifles CMP sold during that time frame). Although the number of surplus rifles CMP sold varied from year to year, as shown in figure 4, except for fiscal years 2012 and 2013, the number of rifles sold has trended downward from fiscal years 2008 through 2017. Sale of ammunition and memorabilia. CMP purchases bulk quantities of commercially available ammunition at a discounted rate due to the size of the order, and then sells this ammunition to its affiliated groups. CMP also sells memorabilia such as T-shirts and hats. According to CMP’s fiscal years 2008 through 2017 internal financial documents, the sale of ammunition and memorabilia was CMP’s second largest source of revenue and generated $76.4 million. Figure 5 shows boxes of commercially purchased ammunition stored in CMP’s warehouse in Anniston, Alabama. Investment account income. CMP officials told us that CMP established an investment account to ensure it had the financial resources to continue to meet its mission should the transfer of surplus firearms from the Army cease. According to CMP’s fiscal years 2008 through 2017 IRS filings, CMP reported earning $49.8 million in interest and dividend income from the corporation’s investment account. As seen in figure 6, CMP’s investment account grew by approximately $88 million, from $100.3 million at the end of fiscal year 2008 to $188.6 million by the end of fiscal year 2017. Although CMP’s investment account grew over this 10-year period, in some years CMP made net deposits into the account, and in other years CMP had net withdrawals from the account. For example, CMP’s net deposits from fiscal years 2008 through 2013 were $73.5 million. However, CMP had net withdrawals of $21.5 million from fiscal years 2014 through 2017. CMP officials stated that they used withdrawals from the investment account in those years to expand marksmanship- related programs and to finance construction of the Talladega Marksmanship Park, completed in 2015, shown in figure 7. Marksmanship-related programs. CMP charges fees for individuals to participate in its marksmanship-related programs such as training programs, matches, youth camps, and competitions. According to CMP’s fiscal years 2008 through 2017 IRS filings, CMP generated approximately $9.2 million in revenue from these fees. CMP’s IRS filings for those years also indicate that CMP’s expenses associated with CMP’s marksmanship programs exceeded revenue by approximately $85.8 million. According to CMP officials, CMP heavily subsidizes participation fees for both matches and youth camps to help make the corporation’s programs as accessible as possible, and revenue generated from the sale of surplus firearms covered any program deficits. Figure 8 shows competitors during the National Matches event we observed in July 2018. Other revenue. According to CMP’s fiscal years 2008 through 2017 internal financial documents, CMP also generated some additional revenue from a variety of other sources. For example, CMP’s Talladega Marksmanship Park has generated over $1.5 million in revenue from range rental and match fees, among other things. CMP reported an overall profit of $125.9 million on its IRS filings for fiscal years 2008 through 2017, but this amount includes all categories of revenue and expense for business operations, not only those categories specific to surplus rifle sales. We were therefore unable to use CMP’s IRS filings to determine CMP’s profits from the sale of surplus rifles. The amount of profit specific to surplus rifle sales also could not be determined from CMP’s internal financial documents. CMP’s internal financial documents showed $84.7 million in expenses to sell surplus rifles in fiscal years 2008 through 2017, including costs associated with labor, shipping, and other expenses to prepare the surplus firearms for sale. This is less than the $196.8 million CMP’s internal financial documents show CMP generated in revenue from the sale of surplus Army rifles during fiscal years 2008 through 2017. However, in its internal financial documents, the methodology CMP used to calculate the expenses to sell surplus Army rifles did not include all of CMP’s expenses for these sales. Specifically, the methodology CMP used did not account for depreciation and administrative expenses. CMP did not begin selling surplus M1911 handguns until November 2018, and therefore had just begun generating revenue from these sales at the time of our report. CMP’s internal financial documents reported some costs associated with the surplus M1911 handguns. For example, in fiscal year 2018, in response to an Army requirement, CMP spent approximately $0.7 million upgrading a facility used to house CMP’s M1911 handgun operations. CMP also reported expenses specific to the M1911 handguns of just over $8,000 in fiscal year 2017. According to CMP officials, CMP anticipates selling most, if not all, of the M1911 handguns because there has been a higher demand for the surplus M1911 handguns than the quantity available to CMP for sale. For example, CMP officials reported that they received more than 19,000 orders for the 8,000 surplus M1911 handguns transferred from the Army in January 2018. How much CMP will sell each surplus handgun for depends on the quality, or grade, of the handguns as determined by CMP. Specifically, CMP officials told us CMP will sell service grade surplus M1911 handguns for $1,050, field grade handguns for $950, and rack grade handguns for $850 each. CMP officials reported that as of December 2018, CMP had sold 632 service grade surplus M1911 handguns for $1,050 each, which generated $663,600 in revenue. Further, CMP officials told us they had determined that 145 of the surplus M1911 handguns were in unsellable condition. As a result, as of December 2018, 7,223 surplus M1911 handguns remained from the original 8,000 CMP received from the Army. If CMP sold all of the remaining handguns, we estimate that CMP could generate from $6.14 million to $7.58 million in additional revenue, depending on the grade of each surplus M1911 handgun sold. As of December 2018, CMP officials told us they expected to complete the processing and sale of the surplus M1911 handguns in the spring of 2019. We estimate that by the time these sales are completed CMP could generate total revenue of from $6.8 million to $8.2 million from the sale of surplus M1911 handguns. CMP may also be able to continue to generate revenue from surplus rifles that are currently available for sale. Based on CMP’s reported sales of 304,233 surplus rifles from fiscal years 2008 through 2017 and revenue generated from these sales of $196.8 million, we determined the average sale of these surplus rifles to be approximately $650 per rifle. According to CMP, as of August 16, 2018 it had approximately 148,714 sellable surplus rifles. Based on our calculation of the average sales price of $650 per surplus rifle, we estimate CMP could generate approximately $96.7 million in revenue from selling surplus rifles currently available for sale. Combined with the potential revenue from the sale of M1911 handguns, we estimated CMP could generate from $103.5 million to $104.9 million from the future sale of surplus firearms. Given CMP’s fiscal year 2017 expenses of $15.8 million, and assuming a similar level of future annual expenses, we estimate CMP could fund a similar level of operations for several more years from the sale of all of the surplus firearms it currently has available for sale. Further, as discussed earlier, CMP has other sources of revenue. As of September 30, 2017, CMP reported having cash of $3.6 million and an investment account that was valued at $188.6 million, for a total of $192.2 million. This could also allow CMP to continue operations for several additional years if it did not receive any additional transfers of surplus firearms. In addition to CMP, we examined five other federally chartered corporations–the U.S. Naval Sea Cadet Corps, the Civil Air Patrol, Big Brothers Big Sisters of America, Future Farmers of America, and the Boy Scouts of America–that have a similar focus on the development, education, or training of youth. Four of the six corporations, including CMP, have received federal funding or resources, and each of the six corporations is governed by some form of a board of directors. However, CMP’s relationship with members, which CMP officials refer to as “affiliated groups” (e.g., gun clubs throughout the United States), differs from the other five corporations we selected for comparison. Organizational mission. All five of the other federally chartered corporations we examined have a focus on the development, education, or training of youth. The Naval Sea Cadet Corps identifies itself as a national youth leadership development organization that promotes interest and skill in naval disciplines while instilling strong moral character and life skills through leadership and technical programs modeled after the Navy’s professional development system. The Civil Air Patrol’s mission statement includes the development of youth and promotion of air, space, and cyber power. Further, the Civil Air Patrol identified that it promotes aviation and related fields through aerospace/science technology engineering and math education and by helping shape future leaders through its cadet program. Big Brothers Big Sisters of America’s overall mission includes providing children facing adversity with strong and enduring, professionally supported relationships that change their lives for the better, including helping children to achieve educational success. Future Farmers of America’s mission statement involves making a positive difference in the lives of students by developing their potential for premier leadership, personal growth and career success through agricultural education. The Boy Scouts of America identified that its goal is to train youth in responsible citizenship, character development, and self-reliance through participation in a wide range of outdoor activities, and educational programs, among other things. Federal funding or resources. CMP, the Naval Sea Cadet Corps, the Civil Air Patrol, and Big Brother Big Sisters of America received some form of federal funding or resources during fiscal years 2015 through 2017. CMP is the only one of these four corporations that relies on the transfer and sale of federally donated surplus firearms for the majority of its revenue. According to officials from the corporations, the Naval Sea Cadet Corps and the Civil Air Patrol rely on federal appropriations and federal grants from the Navy and the Air Force, respectively. For example, according to officials from the Naval Sea Cadet Corps, the corporation received approximately $5.1 million in federal grants from the Navy from fiscal years 2015 through 2017. Civil Air Patrol officials stated that federal funds were the largest source of revenue. According to officials from Big Brothers Big Sisters of America, the corporation received approximately $3.8 million in federal grants from the Department of Labor and $8.2 million in federal grants from the Department of Justice’s Office of Juvenile Justice and Delinquency Prevention from fiscal years 2015 through 2017. Officials from Big Brothers Big Sisters of America told us that these grants were the corporation’s largest source of funding. Officials at both Future Farmers of America and the Boy Scouts of America told us they raise funds through membership dues and merchandise sales, among other things, but do not receive any federal funding or resources. Organizational structure. The leadership structure of CMP and the five selected federally chartered corporations was similar. That is, officials from CMP and the five selected corporations told us that each corporation has a board of directors or board of governors that may or may not have term limits. For example, CMP’s Board of Directors includes 11 board members with repeatable 2-year term limits, for which the Chairman of the Board also serves as the Chief Executive Officer. According to Boy Scouts of America officials, the corporation’s National Council’s Board of Directors is elected through a nominating process and has no fixed term limits. The Board of Directors in turn elects representatives to the Executive Committee and there is also an Advisory Council. The Advisory Council, according to Boy Scouts of America officials, reports to the Board of Directors and comprises both former members of the board and members who may become future directors on the board. According to officials from Future Farmers of America, that corporation has a Board of Directors of which four members are designated by the Department of Education including a designated Chairperson, and these four members serve open-ended terms. According to these officials, the remaining members of the board not designated by the Secretary of Education serve 3-year terms. The Civil Air Patrol has an 11-member Board of Governors: four are appointed by the Secretary of the Air Force; four are from its volunteer force; and three are from outside the corporation. Organizational relationships. CMP’s relationship with what it refers to as affiliated groups (e.g., gun clubs) throughout the United States, differs when compared with the five federally chartered corporations we selected for review. CMP is located in two facilities: one in Anniston, Alabama, that, according to CMP officials, primarily handles sales and operations and one in Port Clinton, Ohio, that, according to CMP officials, manages mission-related programs, such as the National Matches. CMP also sells surplus firearms to members of groups affiliated with CMP from throughout the United States. But, while CMP officials identified 5,002 affiliated clubs throughout the United States and referred to them as being “affiliated” with CMP, none of these entities are actually part of CMP. According to CMP officials, the clubs pay a small annual fee to become affiliated with CMP, which allows them to participate in CMP- sanctioned marksmanship matches and so that their members are eligible to buy surplus firearms from CMP, among other things. In contrast, according to officials from the other five selected corporations, those corporations have members or affiliates throughout the United States— meaning that these members and affiliated groups are part of the organization as a whole. For example, officials from the Boy Scouts of America told us that they divide the country into regions, then local councils, local districts, counties or communities, and then to local sponsors of individual units or troops; all members are part of the Boy Scouts of America. Similarly, Naval Sea Cadet Corps officials told us the organization is comprised of regional and local units; there is open communication between headquarters and the local units, and a standardized training program is implemented at the local level. We provided copies of a draft of this report to the Secretary of the Army, the Civilian Marksmanship Program, and other interested parties for comment. The Secretary of the Army and Civilian Marksmanship Program provided technical comments, which we incorporated into this report as appropriate. We are sending copies of this report to appropriate congressional committees and the Secretary of the Army. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9627 or at maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. The National Defense Authorization Act for Fiscal Year 2018 required the Army to transfer surplus M1911 handguns to the Civilian Marksmanship Program (CMP) during fiscal years 2018 and 2019, including no fewer than 8,000 in fiscal year 2018 and no more than 10,000 in any fiscal year. The act also included a provision for us to review certain matters related to CMP. This report (1) examines the Army’s and CMP’s procedures to address requirements governing the transfer and sale of firearms; (2) examines CMP’s primary sources of revenue, costs and profits, and estimated future revenue associated with the sale of surplus firearms; and (3) compares certain aspects of CMP’s business operations with those of five selected youth-focused, federally chartered nonprofit corporations The scope of our review focused primarily on fiscal years 2008 through 2017. We compiled 10 years of the sale of surplus rifles from fiscal years 2008 through 2017 to understand the numbers of surplus rifles transferred as well as the revenue, costs, and profits associated with the sale of surplus rifles. To identify the requirements governing the transfer and sale of surplus firearms, we reviewed applicable federal statutes including relevant provisions from chapter 407 of Title 36, and section 922 of Title 18, U.S. Code, as well as agreements between the Army and CMP such as the 2016 Memorandum of Understanding and the 2018 Memorandum of Agreement. We also reviewed transfer and sales procedures from fiscal years 2018 and 2019 to provide a current status regarding CMP’s sale of surplus M1911 handguns, which CMP began selling in November 2018. To identify procedures put in place by the Army to address the requirements governing the transfer of firearms, we reviewed documentation of reimbursements CMP made to the Tank-automotive and Armaments Command (TACOM), the organization within the Army responsible for facilitating the transfer of surplus firearms to CMP as well as for managing the related reimbursement account. Our review of the procedures associated with the reimbursement account included obtaining cash collection vouchers submitted to the Army by CMP and TACOM briefings presented at CMP’s biannual Board of Director’s meetings. Further, we interviewed TACOM and Defense Logistics Agency (DLA) officials to gain an understanding of how reimbursable costs are identified and requested from CMP. We also compared multiple source documents related to transfers. To understand how TACOM identifies and reports costs associated with the transfer of surplus firearms, we reviewed documentation related to reimbursement for labor, transportation, and standard depot operation costs associated with the transfer of firearms from the Army to CMP. To identify procedures put in place by CMP to address the requirements governing the transfer and sale of firearms, we conducted site visits to CMP’s northern and southern headquarters in Port Clinton, Ohio and Anniston, Alabama, and observed the inventory and sales processes for rifles and handguns. During our site visits to CMP’s southern headquarters in Anniston, Alabama, in August 2018 and November 2018 we observed 11 examples of firearm transactions and compared the procedures with various federal requirements and the agreements between the Army and CMP. We also reviewed documentation of sale order forms, and of CMP’s sales operating system processing an order in order to identify how CMP enters and confirms certain information related to sales. In addition, we interviewed CMP officials to obtain further clarification on the organization’s sales processes. To determine CMP’s primary sources of revenue, as well as the costs and profits associated with the sale of surplus rifles, we reviewed financial information provided by CMP. Our review included an analysis of CMP’s IRS filings and internal financial documents for fiscal years 2008 through 2017. We used CMP’s IRS filings to provide information on revenue generated from overall sales, investments, and programs, as well as on the growth of CMP’s investment account. We relied on the internal financial documents for a more granular account of the revenue CMP generated specifically from the sale of surplus rifles as well as commercially purchased ammunition and memorabilia. CMP officials provided us with a methodology for determining which data within the organization’s internal financial documents are revenue and expenses specific to the sale of surplus rifles. We assessed the reliability of the data by interviewing CMP officials to gain an understanding of how CMP’s IRS filings and internal financial documents are produced and found it sufficiently reliable for our purposes. To assess the reliability of the surplus firearms transfer data provided by TACOM we spoke with TACOM officials for clarification and further explanation of the data provided, including firearm nomenclature and identification codes. The additional information TACOM provided allowed us to identify 17 different types of .22 or .30 caliber surplus rifles that could be grouped together based on make, model, and/or caliber. TACOM officials confirmed our groupings for the types of firearms transferred from fiscal years 2008 through 2017, and we used the results of our analysis to summarize the number and types of surplus rifles transferred to CMP during this time frame. We found the data to be sufficiently reliable for our purposes. To determine potential future revenue associated with the sale of surplus M1911 handguns we obtained current sales price information from CMP, and used this information to project a range of potential future revenue based on the number of surplus rifles and handguns CMP currently has on hand. Specifically, to determine the range of potential revenue for the sale of surplus handguns, we asked CMP to provide information on the sales prices for each of the three grades of preordered M1911 handguns. CMP reported that it had sold 632 surplus M1911 handguns as of December 13, 2018 and further that it had identified another 145 surplus handguns as unsellable. To determine the number of surplus handguns remaining to be sold, we subtracted both the 632 surplus handguns CMP reported as sold and the 145 surplus handguns CMP had determined to be unsellable from the total of 8,000 surplus M1911 handguns the Army originally transferred to CMP. To calculate the range of potential revenue from the remaining 7,223 surplus M1911 handguns, we then multiplied the 7,223 remaining surplus handguns by the lowest and the highest sales prices, $850 and $1,050 respectively. This gave us a range of revenue from the future sales of from $6.14 million to $7.58 million. We then added the known $663,600 in revenue from the sale of the 632 service grade handguns CMP identified to our low and high end calculations to determine the range of future revenue of from $6.8 million to $8.2 million from the sale of surplus M1911 handguns. To determine potential future revenue associated with the sale of surplus rifles, we reviewed inventory and sales data provided by CMP and used this information to estimate potential future revenue based on the average price of the surplus rifles CMP has sold from fiscal years 2008 through 2017. Based on CMPs reported sales of 304,233 surplus rifles from fiscal years 2008 through 2017 and revenue generated from these sales of $196.8 million, we determined the average sale of these surplus rifles to be approximately $650 per rifle. According to CMP, as of August 16, 2018, it had 228,791 rifles on hand, of which CMP identified 148,714 as being in sellable condition. We then multiplied the number of rifles available for sale as of August 2018 by $650, assuming the average sales price would remain the same going forward, to obtain the potential future revenue from the sale of surplus rifles. We then added the range of potential surplus M1911 handgun sales to determine a potential range of CMP’s future sales of surplus firearms. Given CMP’s fiscal year 2017 expenses of $15.8 million, and assuming those expenses remained the same, CMP could fund a similar level of operations for several years from the sale of all of the surplus firearms it currently has available to sell. In order to compare CMP’s business operations with those of other federally chartered nonprofit corporations, we focused on CMP’s youth- focused mission and identified eight other youth-focused, federally chartered nonprofit corporations. Specifically, we reviewed 93 federally chartered nonprofit corporations to identify corporations that focused on the education, training, or development of youth. We developed a set of relevant questions and interviewed officials from five of the eight federally chartered nonprofit corporations we identified—the Naval Sea Cadet Corps, the Civil Air Patrol, Big Brothers Big Sisters of America, Future Farmers of America, and the Boy Scouts of America. Of the remaining three corporations, two did not respond to our requests for meetings and the third declined to meet. We posed the same questions to all the corporations’ officials we met with and compared certain aspects of CMP’s business operations with the federally chartered nonprofit corporations regarding governance, organizational structure and relationships, and funding sources. We conducted this performance audit from May 2018 to February 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Army transferred 279,032 surplus rifles to the Civilian Marksmanship Program (CMP) from fiscal years 2008 through 2017. The surplus rifles transfer data characterized rifles with different descriptions for nomenclatures (e.g., M1903, Mossberg M144, and M1917 Enfield) and firearm identification codes. Our analysis determined that the different nomenclatures could be combined into 17 distinct groups because many of the rifles were variants of the same type of .30 caliber rifle or carbine, or .22 caliber rimfire rifle. The 17 types of rifles we identified were grouped together based on make, model, and/or caliber. Through our analysis, we determined that the majority of rifles transferred to CMP by the Army from fiscal years 2008 through 2017 have been surplus M1 rifles. Our analyses determined that 203,644 of the 279,032 surplus rifles transferred to CMP from fiscal years 2008 through 2017 were serviceable M1 rifles. The second largest type of surplus rifles transferred during this period were drill rifles—rifles not capable of firing live or blank rounds of ammunition—although CMP received nearly four times the number of M1s as it did drill rifles. See table 1 for a description of the surplus rifles transferred to CMP by the Army from fiscal years 2008 through 2017. In addition to the contact named above, Marilyn Wasleski, Assistant Director; Scott Behen, Analyst-in-Charge; Mae Jones; Richard Kusman; Amie Lesser; Rebecca Mendelsohn; Mike Shaughnessy; Mike Silver; Carter Stevens; and Roger Stoltz made key contributions to this report.", "summary": "Since 1996, the Army has transferred more than 700,000 surplus rifles and handguns to CMP. The National Defense Authorization Act (NDAA) for Fiscal Year 1996 authorized CMP to sell certain types of surplus Army firearms to U.S. citizens, including M1 .30 caliber rifles. CMP reimburses the Army for the costs to prepare and transport surplus firearms to CMP. The NDAA for Fiscal Year 2018 required the Army during fiscal years 2018 and 2019 to transfer to CMP surplus M1911 .45 caliber handguns, including not fewer than 8,000 in fiscal year 2018 and not more than 10,000 in any fiscal year, and included a provision for GAO to conduct a review of certain matters related to CMP. Among other things, GAO examined (1) the Army and CMP's procedures to address requirements governing the transfer and sale of firearms and (2) CMP's primary sources of revenue, costs and profits, and estimated future revenue associated with the sale of surplus firearms. GAO reviewed applicable federal statutes and agreements between the Army and CMP; analyzed firearms transfer data, and CMP's Internal Revenue Service filings and internal financial documents; and visited both CMP's northern headquarters in Port Clinton, Ohio and its southern headquarters in Anniston, Alabama. The Civilian Marksmanship Program (CMP) is a federally chartered, nonprofit corporation that, among other things, instructs U.S. citizens in marksmanship; promotes practice and safety in the use of firearms; and sells surplus Army firearms (see figure), ammunition, repair parts, and other supplies. CMP is required to give priority to activities that benefit firearms safety, training, and competition for youth and that reach as many youth participants as possible. CMP also charges fees for individuals to participate in some of its programs. The Army and CMP have established procedures to address federal requirements for the transfer and sale of surplus firearms. Both organizations established procedures to carry out the transfer of surplus Army firearms as identified in a 2016 Memorandum of Understanding (MOU) and a 2018 Memorandum of Agreement, both between the Army and CMP. To address requirements for selling surplus firearms, CMP uses a combination of procedures, including an application requiring prospective customers to provide proof of citizenship and age, among other things, and a check against the National Instant Criminal Background Check System. Per the MOU, the Army's Tank-automotive and Armaments Command oversees the Army's costs and reimbursements from CMP for certain costs associated with storing, transporting, and administering the transfer of surplus firearms. The primary source of CMP's revenues from fiscal years 2008 through 2017 was from the sale of surplus rifles, which, according to CMP's internal financial documents, generated $196.8 million in revenue. CMP also sold commercial ammunition and memorabilia, which, according to the same documents, generated $76.4 million in revenue. Further, according to its Internal Revenue Service filings for this time frame, CMP reported earning $49.8 million in interest and dividends from its investment account. CMP began selling surplus M1911 handguns in November 2018 and had just begun generating revenue from these sales at the time of GAO's review. The profit that CMP realized from the sales of surplus rifles could not be determined because CMP's methodology to calculate expenses did not account for all of CMP's costs associated with the sale of these rifles. GAO estimates future sales of CMP's surplus handgun and rifles currently available for sale could generate as much as $104.9 million, or enough to fund CMP's operations for several years. Further, as of September 30, 2017, CMP reported having cash of $3.6 million, and an investment account valued at $188.6 million. This could also allow CMP to continue operations for several years.", "document_type": "gao"}
{"report": "In 1999, DOE issued a report stating that, based on experience from a decade of planning and conducting cleanup work at the sites for which it is responsible, complete restoration to levels acceptable for unrestricted use could not be accomplished at many of its sites. According to the report, a variety of hazards would remain at many DOE sites after these sites had been cleaned up in accordance with applicable requirements. These hazards include long-lived radionuclides left in place in soils or contained in on-site disposal cells and residual contaminants in surface water and groundwater. The report cited technical challenges—such as lack of existing technology for completely removing some types of waste—and economic limitations—such as prohibitive costs to employ available technology—as reasons why these hazards would remain. As a result, DOE reported that long-term management would be needed at these sites to ensure that the cleanup remedies—i.e., the actions, systems, or other measures put in place to clean up a site—would protect human health and the environment from these hazards into the future. Several DOE organizations, including the Office of Environmental Management (EM), were responsible for long-term management of post- cleanup sites until the department established LM in 2003. As of the end of fiscal year 2019, LM had assumed responsibility for 100 sites across the United States, including sites in Alaska and Puerto Rico (see fig. 1). Several different entities conducted cleanup of sites before LM assumed responsibility for the sites. These different entities conducted cleanup under a variety of authorities: EM. Established in 1989, DOE’s EM is responsible for the cleanup of legacy waste that resulted from the development and production of nuclear weapons and government-sponsored nuclear energy research dating back to World War II and the Cold War. Such waste includes radioactive waste, spent nuclear fuel and nuclear material, and contaminated soil and water, among other things. EM cleaned up 83 of the 100 sites that are now within LM’s portfolio. Key laws that governed EM’s cleanup of these sites include the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 as amended (CERCLA); the Resource Conservation and Recovery Act of 1976 as amended (RCRA); and Title I of the Uranium Mill Tailings Radiation Control Act of 1978 (UMTRCA). Title I of UMTRCA authorizes a cleanup program for uranium mill tailings sites—which produced uranium for nuclear weapons and other defense purposes— that were no longer operational as of 1978, the year of the law’s enactment. DOE is generally responsible for financing the cleanup of these sites. EM also cleaned up sites that are now within LM’s portfolio under the Formerly Utilized Sites Remedial Action Program (FUSRAP). This program was established in 1974 to identify, investigate, and clean up sites where radioactive contamination remained from Manhattan Project and early Atomic Energy Commission operations. EM was responsible for cleaning up FUSRAP sites until 1997, when Congress directed the U.S. Army Corps of Engineers (USACE) to assume responsibility for the cleanup work of the remaining designated FUSRAP sites. USACE. USACE cleaned up 10 FUSRAP sites that are now within LM’s portfolio. Under a memorandum of understanding signed by DOE and USACE in 1999, DOE is responsible for the long-term management of FUSRAP sites after USACE completes cleanup. Key requirements that govern USACE’s cleanup of FUSRAP sites include CERCLA and the National Oil and Hazardous Substances Pollution Contingency Plan. Private licensees. LM’s portfolio includes seven sites cleaned up by private licensees, i.e., commercial operators who were permitted to operate uranium mills or other facilities under a license from the Nuclear Regulatory Commission (NRC). In all except one case, private licensees cleaned up these sites under Title II of UMTRCA, which assigned responsibility to the licensee for reclamation of uranium mill sites operating on or after the law’s enactment in 1978. When a private licensee has completed all cleanup requirements, NRC approves transfer of a site to LM for long-term management. Cleanup activities conducted by these entities included decontaminating, decommissioning, and demolishing buildings; containing and disposing of a variety of hazardous and radioactive wastes; excavating and stabilizing contaminated soil; constructing engineered disposal cells for contaminated materials; containing and treating contaminated surface water and groundwater; and preparing the land for future public, industrial, or commercial use. Depending on the legal and regulatory framework governing cleanup, other agencies or groups may have played a role in setting cleanup standards and helping to select a site’s cleanup remedy. For example, sites cleaned up under Title I of UMTRCA must meet regulatory cleanup standards established by the Environmental Protection Agency (EPA). For certain sites cleaned up under CERCLA and RCRA, DOE has entered into agreements with EPA and the relevant state regulator regarding the necessary cleanup actions, and EPA and the state have provided input in selecting the cleanup remedy. As cleanup of a site nears completion, LM works with the entity responsible for cleanup to prepare the site for transition into LM’s portfolio. The transition process for a given site may take up to 5 years, during which time LM and the cleanup entity develop a long-term surveillance and maintenance plan. Depending on the authority under which a site has undergone cleanup, this plan may require approval by regulators such as EPA or NRC. Other transition responsibilities include identifying and preserving records and checking that administrative institutional controls and other real property instruments are in place. DOE considers site cleanup to be complete when, among other things, short-term cleanup activities have been completed and long-term cleanup measures, such as groundwater treatment, are in place. According to a DOE document, ongoing groundwater remediation continues at many sites after the official completion of cleanup because of the long timeframes required to capture and remediate contaminated groundwater. Once LM acquires a site, it places each site into one of three categories based on the actual or anticipated long-term surveillance and maintenance activities associated with the site. LM has nine “category 3” sites, which require the most intensive surveillance and maintenance due to the extent of residual contamination, according to LM officials. These sites typically have an ongoing remediation system—such as a groundwater treatment system, according to officials—that LM must monitor and maintain. LM has 49 “category 2” sites, which require routine inspection, monitoring, and maintenance. LM has 42 “category 1” sites, which require management of records or stakeholder requests for information. LM also maintains a list of 52 sites that, as of September 2019, are expected to transition into its portfolio over the next three decades. Figure 2 illustrates sites’ transition from cleanup entities and their categorization. Appendix II provides additional details about the current sites in LM’s portfolio as of fiscal year 2019, and appendix III provides details about sites that, as of September 2019, are scheduled to transition to LM by 2050. According to LM officials, LM does not have a schedule or process for retiring sites from its portfolio. Depending on the sites’ clean- up standards and intended reuse, LM will likely be managing some sites for centuries. LM’s budget includes funding for other activities that are not directly associated with its 100 sites. These activities include conducting an inventory of abandoned defense-related uranium mines, overseeing pensions and post-retirement benefits for former contractor workers at closed DOE sites, and leading and coordinating DOE’s environmental justice activities. As of fiscal year 2019, LM’s overall budget was about $159 million. Federal accounting standards require agencies that are responsible for cleaning up contamination to estimate future cleanup and waste disposal costs and to report such costs in their annual financial statements as environmental liabilities. According to these standards, environmental liability estimates are to include probable and reasonably estimable costs of cleanup work. Environmental liability estimates do not include cost estimates for work for which reasonable estimates cannot currently be generated, such as cleanup costs at sites where no feasible remedy exists, according to the standards. In fiscal year 2019, DOE reported $505 billion in environmental cleanup and disposal liabilities, of which about $64 billion are categorized by DOE as “other legacy environment” costs. LM’s environmental liability is part of this category, along with several other types of environmental liability costs. LM estimated its environmental liability in fiscal year 2019 at $7.35 billion, an amount that has been relatively stable over the last 5 years. However, LM expects its environmental liability to increase as it acquires additional sites, according to LM officials. According to LM financial data, LM’s environmental liability estimate in fiscal year 2019 was $7.35 billion. LM’s guidance defines its environmental liability as an estimate of life-cycle costs associated with five main activities—determined by DOE—occurring over 75 years (see fig. 3). LM develops guidance on how its site managers should estimate their sites’ environmental liability. In accordance with this guidance, site managers are to develop estimates of the direct costs over the upcoming 75-year period. They are also to determine a certain amount of contingency to account for potential changes in LM’s project scope because of unknown and unpredictable events over the upcoming 75- year period. As shown in figure 4, LM activities related to long-term surveillance and maintenance of its sites accounted for about $3 billion—or 40 percent—of its fiscal year 2019 environmental liability. LM activities related to program direction and to archives and information management each accounted for about 23 percent and 22 percent, respectively, of LM’s fiscal year 2019 environmental liability, and activities related to asset management and to communication, education, and outreach combined for about 15 percent. Of LM’s approximately $3 billion in costs for long-term surveillance and maintenance, LM’s category 3 sites—the nine sites that require the most intensive level of management—accounted for almost half of these estimated costs (see fig. 5). The Rocky Flats site in Colorado accounted for the largest share of this portion of the liability (about $452 million), and the Fernald Preserve site in Ohio accounted for the second-largest share (about $308 million). Long-term surveillance and maintenance responsibilities for category 1 and category 2 sites, transition costs associated with sites that LM will acquire in future years, and other program-wide activities—such as exploring new technologies and operating a laboratory—accounted for the remaining share (about $1.5 billion) of LM’s environmental liability related to long-term surveillance and maintenance. LM’s total environmental liability has generally remained stable in recent years, although there have been some notable fluctuations at individual sites. In fiscal years 2015 through 2018, LM’s total environmental liability remained between $6 billion and $7 billion per year, and increased to slightly over $7 billion in fiscal year 2019 (see fig. 6). Most notably, LM’s total environmental liability increased by about $2 billion (about 41 percent) between fiscal years 2014 and 2015. LM officials attributed this increase to adopting a more thorough approach for estimating future costs associated with sites scheduled to be transferred from USACE under FUSRAP. LM officials said that, before fiscal year 2015, LM had used a standard cost estimate for all of USACE’s sites, which resulted in an underestimate of the associated liability. According to LM officials, in fiscal year 2015 LM began estimating costs based on individual sites’ specific conditions, which allowed LM to capture more potential costs. Similar to LM’s overall environmental liability, the long-term surveillance and maintenance portion of LM’s environmental liability has generally remained stable in recent years, though individual sites have seen some notable changes. From fiscal year 2015 through 2018, LM’s environmental liability related to long-term surveillance and maintenance remained between about $3 billion and $3.5 billion. Similar to LM’s overall environmental liability, the long-term surveillance and maintenance portion of LM’s liability saw a more significant increase between fiscal years 2014 and 2015, from about $2.2 billion to about $3.4 billion. At the site level, of LM’s nine category 3 sites, the Fernald Preserve and Mound sites in Ohio are examples of sites that have had mostly steady decreases from fiscal year 2014 to 2019, which LM officials attributed in part to adjustments to groundwater treatment strategies at Fernald Preserve as well as transferring ownership of most of the Mound site to another party. In contrast, several other sites (including Rocky Flats and Grand Junction in Colorado and Weldon Spring in Missouri) saw overall decreases from fiscal year 2014 to 2016 followed by steady increases from fiscal year 2016 to 2019, which LM officials generally attributed to costs of site maintenance at Rocky Flats, construction at Weldon Spring, and planning activities for the potential closure of the disposal cell at Grand Junction. LM officials provided additional details on specific factors driving sites’ changes in environmental liability. For example: At the Fernald Preserve site, the long-term surveillance and maintenance liability has decreased overall from about $367 million in fiscal year 2014 to about $308 million in fiscal year 2019 (about a 16 percent decrease). The site manager for Fernald attributed this decrease to improvements in the site’s groundwater treatment strategy. In 2014, LM made changes to optimize the site’s “pump-and- treat” system (which brings contaminated water above ground so that it can be treated and contaminants removed) by increasing pumping from the wells in the portion of the site with the most contamination, according to the site manager. Further, the site manager said that this change increased the amount of water coming from the more contaminated areas, making the water treatment more efficient and cost-effective in the long-term. At the Mound site, the long-term surveillance and maintenance liability has decreased from about $124 million in fiscal year 2014 to about $68 million in fiscal year 2019 (about a 45 percent decrease). According to LM officials, this decrease is in part due to a transfer in ownership. Specifically, LM transferred ownership of the majority of the site to the Mound Development Corporation to sell or lease parcels of the land to third parties for commercial use. Transferring ownership meant that LM gave up some of its responsibilities and their associated costs (such as maintenance and repairs at buildings that are now privately owned), although it continues to fulfill ongoing groundwater treatment and records management responsibilities. At the Rocky Flats site, the long-term surveillance and maintenance liability has increased substantially since fiscal year 2016, from about $269 million to about $452 million in fiscal year 2019 (about a 68 percent increase). According to the site manager for Rocky Flats, this increase can be attributed to additional costs needed to repair aging infrastructure. Specifically, a landfill on the site, which was constructed in the 1950s, has been damaged by erosion in recent years, and LM is currently undertaking a large-scale project to repair and stabilize it after previous repairs failed to provide a long-term fix. This project, which is due to be completed in the summer of 2020, includes installing about 260 steel anchors of up to 95 feet in length into the soil around the landfill. These anchors are intended to keep the soil intact while drains route groundwater away from the areas of the landfill that are particularly vulnerable to erosion. LM’s environmental liability is likely to grow as it acquires more sites in future years, even as LM takes steps to reduce the environmental liability associated with its current sites, according to LM officials. According to an LM document, as of September 2019, LM is scheduled to acquire 52 additional sites by 2050, including six category 3 sites, 45 category 2 sites, and one category 1 site. Since LM does not account for the environmental liability related to long-term surveillance and maintenance for a portion of its sites until it acquires them, LM officials could not tell us by how much its total environmental liability will increase as a result of acquiring these sites. However, officials said that some sites transitioning to LM in the future will be increasingly complex, which will likely mean increased long-term surveillance and maintenance costs. In particular, one official told us that the FUSRAP sites LM is set to acquire from USACE will be larger and have more extensive residual contamination than FUSRAP sites that LM had previously acquired. As a result, these sites will likely require LM to undertake more extensive and costly long-term surveillance and maintenance activities, according to this official. At the same time, LM officials said they are taking steps to help reduce the environmental liability at LM’s current sites, such as exploring ways to improve the cost-effectiveness of managing residual groundwater contamination. For example: At the Shiprock site in New Mexico, LM has initiated an environmental assessment to evaluate the impacts of removing an evaporation pond into which contaminated groundwater is being pumped, according to the site manager. The site manager also told us that removing this pond could mean reducing the scope of the site’s water pumping activities and ultimately adopting a different groundwater treatment strategy that could prove to be more efficient. Further, the site manager said that this removal would result in reduced long-term surveillance and maintenance costs associated with ongoing repairs to the pond. At the Tuba City site in Arizona, LM is conducting an environmental assessment to weigh options for a new groundwater treatment strategy. According to the site manager, the current strategy, which involves injecting clean water into the site’s contaminated aquifer to flush out contamination, does not cost-effectively address the root cause of the groundwater contamination. Among other options, LM may use its assessment to seek alternate concentration limits accompanied by restrictions to grazing and water use, which LM officials said could be a cost-effective way to manage residual contamination. LM officials we interviewed identified a number of challenges that LM faces in providing long-term surveillance and maintenance of sites. In particular, officials identified challenges related to three main areas: (1) the performance of remedies on its sites, (2) environmental conditions, and (3) new requirements and regulations. LM is taking some actions to address the challenges that officials identified. However, it has not planned for how to address challenges with remedies at some sites that may require additional cleanup work outside the scope of its expertise and resources, and it has not developed plans to assess and mitigate challenging environmental conditions that may become more frequent or intense because of climate change. According to LM officials, LM faces challenges with cleanup remedies not performing as predicted or intended at some sites. For example: At the L-Bar site in New Mexico, officials told us that the disposal cell, which was constructed by a private licensee under UMTRCA Title II and holds about 2.1 million tons of radioactive mill tailings, began experiencing erosion problems shortly after NRC transferred the site to LM in 2004. This erosion is threatening to undermine the disposal cell, according to LM officials (see fig. 7). At the Monticello site in Utah, monitored natural attenuation—the groundwater treatment remedy originally agreed to by DOE, EPA, and the Utah state regulator—proved ineffective in meeting cleanup goals within a few years of being implemented and of the site being transferred to LM. As a result, in 2015, LM implemented a pump-and- treat approach that reduced contamination; however, officials told us that the efficacy of this approach has declined over time, and LM is again seeking to change the remedy. To address challenges related to the performance of remedies, LM is currently undertaking a risk analysis effort to rank sites according to several types of risks, including the risk that a site will not attain compliance with cleanup goals or that compliance will not be maintained into the future. According to LM officials, LM plans to use the results of the risk analysis to inform decisions about where to focus resources, to identify systemic technical challenges, and to identify possible opportunities for reducing LM’s environmental liability, such as through technology development. LM is also addressing challenges related to remedy performance by updating some sites’ remedies. For example, LM has implemented an erosion monitoring program for the L-Bar site and, at the Monticello site, is collecting data that could allow it to seek regulatory approval for a new groundwater compliance strategy, according to LM officials. LM officials said that, in general, they consider such updates to be routine and to fall within LM’s mission to provide long-term surveillance and maintenance of these sites. Nonetheless, LM officials told us that as LM acquires additional sites and as remedies age, future challenges related to remedy performance could result in the need for more extensive work, including active cleanup work that is outside the scope of LM’s mission, capabilities, and resources. We found that LM has developed agreements and procedures for addressing such challenges at sites cleaned up by USACE, but has not developed such agreements and procedures for sites cleaned up by EM or by private licensees under Title II of UMTRCA. Specifically, regarding sites cleaned up by USACE under FUSRAP, under the 1999 memorandum of understanding between DOE and USACE, USACE is responsible for carrying out additional cleanup actions when it determines such actions are necessary. In addition, LM guidance related to transition and transfer of FUSRAP sites includes examples of situations in which LM would return a site to USACE for additional cleanup, such as situations in which routine monitoring identifies new areas of contamination. Conversely, for sites where EM was responsible for active cleanup, a 2005 memorandum co-signed by the leadership of LM and EM includes a brief statement about the need for LM and EM to coordinate in instances of “significant remedy failures.” LM officials told us that structural or engineering damage could signify evidence of a “significant remedy failure,” but said that such criteria have not been documented. They also said that LM has not defined a process by which such failures would be addressed. Finally, LM officials said that there is no mechanism in place under UMTRCA for LM to return a site to NRC or to seek recovery of costs from a private licensee for any additional cleanup that needs to be done. According to agency officials, LM has not developed agreements or procedures for addressing challenges that require active cleanup work at sites cleaned up by EM because LM has not yet encountered such instances at any of its sites. They also noted that LM has been more focused on long-term surveillance and maintenance and the process of transitioning sites into its portfolio from EM and private licensees, rather than a process for moving sites back to these entities if a cleanup remedy fails. However, under federal internal control standards, management is to design control activities to achieve objectives and respond to risks, such as by clearly documenting internal control in management directives, administrative policies, or operating manuals. By working with EM and NRC to develop agreements and procedures for identifying and addressing circumstances at LM sites that require new cleanup work beyond the scope of LM’s mission, capabilities, and resources, LM can help ensure mitigation by the most appropriate entity of the risks to human health and the environment that such instances would present. LM faces challenges with environmental conditions at the sites—some of which may become more frequent or intense—and, according to its mission, LM must react to these challenges to ensure the sites remain protective of human health and the environment. For example: At the Rocky Flats site in Colorado, officials told us that extreme rainfall events over the past few years have caused soils covering an on-site landfill to “slump,” or slip downhill. In particular, rainfall during 2015—the site’s wettest year on record, according to LM officials— caused a 20-foot slump in the landfill. The Boiling Nuclear Superheater site in Puerto Rico and the Pinellas County site in Florida were both in the path of Hurricane Irma in 2017, though neither site sustained substantial damage. At the Weldon Spring site in Missouri, the site manager said that tornadoes pose a risk to the site’s infrastructure, and that a strong tornado in 2013 damaged the site’s interpretive center. To address challenges related to environmental conditions, LM has been repairing damages caused by extreme weather events. For example, at the Rocky Flats site, LM is undertaking a major project to repair and stabilize its aging landfill, as discussed earlier. At the Weldon Spring site, LM installed a tornado shelter in 2014 and is currently building a new interpretive center. In addition, according to the 2020 LM Site Sustainability Plan, LM has taken a number of steps to implement emergency and security measures, such as completing emergency drills and tabletop exercises. The U.S. Global Change Research Program—which coordinates and integrates the activities of 13 federal agencies that research changes in the global environment and their implications for society—reported in its November 2018 Fourth National Climate Assessment that climate change is playing a role in the increasing frequency of some types of extreme weather, such as extremely heavy rainfall and hurricanes; these are environmental conditions that have presented challenges at LM sites. The assessment reported that climate models are consistent with temperature and precipitation extremes becoming more frequent, more intense, or longer in duration, which may make certain natural disasters more frequent or more intense. As a result of the significant risks posed by climate change and the nation’s fiscal condition, in February 2013, we added Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks to our list of areas at high risk for fraud, waste, abuse, and mismanagement, or most in need of transformation. In our March 2019 update to this high-risk area, we reported that the federal government needs to improve the resilience of facilities it owns and operates, and land it manages, against the effects of climate change. In addition, in October 2019, we found that EPA needs to improve management of risks from climate change at Superfund sites where remedies may need to be operational indefinitely (see sidebar). We Found That EPA Should Take Additional Actions to Manage Risks from Climate Change Superfund is the federal government’s principal program to address sites with hazardous substances. It was established by the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 and is administered by the Environmental Protection Agency (EPA). EPA lists some of the most seriously contaminated sites on the National Priorities List (NPL) and has recorded over 500 contaminants at those sites. Some NPL sites are located at federal facilities, where departments such as the Department of Energy are responsible for cleanup. However, most NPL sites are nonfederal, where EPA generally carries out or oversees the cleanup conducted by one or more potentially responsible parties. In October 2019, we reported that available federal data on flooding, storm surge, wildfires, and sea level rise suggest that about 60 percent of all nonfederal NPL sites are located in areas that may be impacted by these potential climate change effects. According to EPA officials, remedies at nonfederal NPL sites may have to be operational indefinitely, during which time the potential effects of climate change may become more extreme. We found that EPA has taken some actions to manage risks from the potential impacts of climate change effects at nonfederal NPL sites, but that its actions did not fully align with essential elements of enterprise risk management. For example, we found that EPA officials do not always have direction to ensure that they consistently integrate climate change information into site-level risk assessments and risk response decisions, according to EPA officials. Without providing such direction, EPA cannot ensure that remedies at nonfederal NPL sites will protect human health and the environment in the long-term. We made four recommendations to EPA, including that it provide direction on how to integrate information on the potential impacts of climate change effects into risk assessments and risk response decisions at nonfederal NPL sites. EPA agreed with one recommendation and disagreed with the other three. We continue to believe that all four are warranted. LM’s 2016-2025 Strategic Plan acknowledges the challenges posed by climate change. To support the objective of improving the long-term sustainability of environmental remedies, the plan includes a strategy to “assess the effect of climate change on environmental remedies and develop plans to mitigate significant impacts.” However, LM provided minimal information about ongoing or planned efforts to carry out this strategy. Specifically, the 2020 LM Site Sustainability Plan, which officials said provides information about LM’s future plans to adapt to changing climate conditions, includes the term “climate change” one time, in reference to sustainable buildings—not to remedies. The plan describes one pilot project conducted at the Monticello site to evaluate the site’s main climate stressors and capacity to adapt to those stressors, but it does not describe whether or how LM intends to use the results of the pilot project, such as any specific plans to roll out the project to other sites. Aside from the 2020 LM Site Sustainability Plan, LM officials said they have a goal to review sites’ conceptual models, which predict how remedies should perform under different conditions, with the aim of updating the assumptions in the models to better account for real-world conditions. However, LM did not provide details about how it intends to meet this goal, such as a schedule for implementing this review across its sites. According to LM officials, LM has not developed a plan or schedule for reviewing sites’ conceptual models because of competing priorities. In addition, LM officials told us they have not assessed the effects of climate change or developed plans to mitigate those effects because of a lack of concern about the risks posed by climate change. Specifically, site managers in charge of several of LM’s category 3 sites—including Rocky Flats, which has the highest environmental liability of LM’s 100 sites and is currently implementing the large-scale project described above to address erosion caused by extreme precipitation—told us that they have not assessed the potential effects of climate change on their sites because they do not believe climate change is a concern. Recognizing the federal government’s significant role in managing climate-related disaster impacts, GAO’s Disaster Resilience Framework provides three broad principles that those who oversee or manage federal efforts can consider when analyzing opportunities to enhance their contribution to national disaster resilience. For instance, under the information principle, the framework states that accessing authoritative, understandable information can help decision makers to identify current and future risk and the impact of risk-reduction strategies. In addition, the integration principle states that integrated analysis and planning can help decision makers take coherent and coordinated resilience actions. By developing plans to assess the effect of climate change on LM’s sites and to mitigate any significant impacts and, as part of these plans, incorporating principles from GAO’s Disaster Resilience Framework, as appropriate, LM could better ensure that its remedies will protect human health and the environment in the long term. According to LM officials, LM faces challenges when regulators update or adopt new requirements and regulations for contaminants, meaning that remedies in place when LM received a site may no longer meet standards. For example: At several sites, such as the Fernald Preserve and Mound sites in Ohio and the Rocky Flats site in Colorado, LM officials told us they are investigating for per- and polyfluoroalkyl substances (PFAS) or vapor-forming chemicals, which are emerging contaminants that EM was not required to address when cleaning up these sites. EPA has published information regarding potential impacts to human health and the environment from these and other emerging contaminants. Federal regulatory standards issued by EPA in the future could affect LM sites. At the Bluewater site in New Mexico, LM officials said that the state recently adopted an updated, more stringent uranium drinking water standard. Under the new standard, the area of groundwater that is considered contaminated is much larger than the area of groundwater considered contaminated under the standard in place when NRC approved transfer of the site to LM, according to officials. To address challenges related to new requirements and regulations, LM is monitoring changes to federal and state standards. For example, LM participates in interagency working groups, such as a PFAS working group led by DOE’s Office of Environment, Health, Safety, and Security. Participation in the working groups helps LM monitor the evolution of a federal PFAS regulatory standard, according to LM officials. In addition, LM officials told us that they routinely review state and federal regulatory changes, with the aim of providing sites time to prepare for any changes. LM also evaluates its surveillance and maintenance practices against current regulatory and best management requirements to identify any gaps. For instance, in 2018, the contractor that provides support services to LM reviewed site management practices listed in UMTRCA Title I and II sites’ site management plans against current regulatory requirements. The review identified a number of discrepancies between practices and requirements. For example, the review found that some site management plans were developed many years ago and had not been updated to reflect changes in remedy requirements. LM indicated it planned to take steps to address the discrepancies identified by this review. For example, LM is planning to update its site management plans to include the most current remedy requirements for each site. At many sites contaminated from nuclear weapons production and nuclear energy research dating back to World War II and the Cold War, completely eliminating risks to human health and the environment is unlikely. LM is responsible for protecting human health and the environment from the risks that remain after other entities have cleaned up these sites, and its mission is long-term—LM sites will require surveillance and maintenance for hundreds or even thousands of years. Over this period, the likelihood that cleanup remedies will experience performance challenges is high, and these challenges may exceed the scope of LM’s mission, capabilities, and resources. LM acquires sites from several cleanup entities, but has not developed agreements or procedures with EM or NRC for addressing challenges that require new, active cleanup work. By working with EM and NRC to develop agreements and procedures for identifying and addressing circumstances at LM sites that require new cleanup work beyond the scope of LM’s mission, capabilities, and resources, LM can help ensure mitigation by the most appropriate entity of the risks to human health and the environment that such instances would present. Environmental conditions also present challenges to LM’s sites, and some of these conditions may become more frequent or intense in the future, according to the 13-agency U.S. Global Change Research Program. To ensure the long-term protectiveness of remedies, it is important for LM to understand how climate change may affect its sites. LM’s strategic plan includes a strategy to assess the effects of climate change on its sites, but the agency provided minimal information about how it plans to carry out this strategy. GAO’s Disaster Resilience Framework outlines a set of principles that those who oversee or manage federal efforts can consider when analyzing opportunities to enhance their contribution to national disaster resilience. By developing plans to assess the effect of climate change on LM’s sites and to mitigate any significant impacts, and, as part of these plans, incorporating principles from GAO’s Disaster Resilience Framework, as appropriate, LM could better ensure that its remedies will protect human health and the environment in the long term. We are making three recommendations to DOE: The Secretary of Energy should direct the Director of LM and the Assistant Secretary of the Office of Environmental Management to develop agreements and procedures for identifying and addressing circumstances at LM sites that require new cleanup work beyond the scope of LM’s mission, capabilities, and resources. (Recommendation 1) The Secretary of Energy should direct the Director of LM to work with the Nuclear Regulatory Commission to develop agreements and procedures for identifying and addressing circumstances at LM sites that require new cleanup work beyond the scope of LM’s mission, capabilities, and resources. (Recommendation 2) The Secretary of Energy should direct the Director of LM to, as called for in LM’s strategic plan, develop plans to assess the effect of climate change on LM’s sites and to mitigate any significant impacts. These plans should incorporate principles from GAO’s Disaster Resilience Framework, as appropriate. (Recommendation 3) We provided a draft of this report to DOE for comment. In its comments, reproduced in appendix IV, DOE agreed with our three recommendations. In its letter, DOE officials stated that in response to our first two recommendations, it plans to work with DOE’s Office of Environmental Management and the Nuclear Regulatory Commission to develop agreements and procedures for identifying and addressing new cleanup work beyond LM’s mission scope of long-term stewardship. DOE officials also stated that in response to our third recommendation, LM will develop site assessment and mitigation plans, taking into account any significant effects of climate change and incorporating principles from GAO’s Disaster Resilience Framework, as appropriate. DOE also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committee, the Secretary of Energy, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Rocky Flats site (Colorado) Shiprock Disposal site (New Mexico) Tuba City Disposal site (Arizona) Weldon Spring site (Missouri) DOE considers site cleanup to be complete when, among other things, short-term cleanup activities have been completed and long-term cleanup measures, such and groundwater treatment, are in place. DOE Office of Environmental Management (EM) Planned transfer in FY 2022 Durita Disposal site East Tennessee Technology Park site Gas Hills East Disposal site Gas Hills North Disposal site Ray Point Disposal site Split Rock Disposal site Planned transfer in FY 2023 Bear Creek Disposal site Hazelwood site private licensee U.S. Army Corps of Engineers (USACE) David C. Trimble, (202) 512-3841 or trimbled@gao.gov. In addition to the contact named above, Amanda K. Kolling (Assistant Director), Katherine Killebrew (Analyst in Charge), and Rachel Pittenger made key contributions to this report. Also contributing to this report were Mark Braza, Ellen Fried, Susan J. Irving, Richard Johnson, Keegan Maguigan, Katrina Pekar-Carpenter, Dan Royer, and Doris Yanger.", "summary": "After over 70 years of nuclear weapons production and energy research at hundreds of sites across the country, DOE faces over $500 billion in environmental liabilities associated with cleanup of hazardous contamination and long-term management of these sites. LM is responsible for the portion of these liabilities associated with long-term management of sites after active cleanup has been completed. LM oversees 100 sites across the country. Depending on the sites' clean-up standards and intended reuse, LM will likely be managing some sites for centuries. Senate Report 116-48 accompanying the National Defense Authorization Act for fiscal year 2020 includes a provision for GAO to review LM's operations, including the nature of its environmental liability. This report examines (1) LM's environmental liability, and (2) any challenges LM faces in managing its sites and how it is addressing those challenges. GAO analyzed data on LM's environmental liability; interviewed officials at LM headquarters and those responsible for the nine sites requiring the most intensive level of management; and reviewed relevant policies, procedures, and guidance. The environmental liability of the Department of Energy's (DOE) Office of Legacy Management (LM) was estimated at $7.35 billion in fiscal year 2019 and, according to LM officials, is expected to grow as LM acquires more sites (see figure for LM's current sites). Long-term surveillance and maintenance activities associated with radioactive and hazardous waste, such as treating residual groundwater contamination, account for about 40 percent of the costs. LM's environmental liability has generally remained stable over the past 5 years. As of September 2019, LM is scheduled to receive 52 additional sites by 2050, and officials expect LM's environmental liability to grow as a result. Officials said LM is taking steps to reduce its environmental liability at its current sites, such as exploring alternative approaches for reducing residual contamination. LM officials identified challenges in providing long-term surveillance and maintenance of sites related to: (1) the performance of remedies that contain or reduce contamination, (2) environmental conditions, and (3) new regulatory requirements. LM is taking some actions to address these challenges. For example, at its Rocky Flats, Colorado, site, LM is repairing an aging landfill that was damaged by extreme rainfall events. However, LM has not yet planned for how to address challenges at some sites that may require new cleanup work that is not in the scope of LM's expertise and resources. By developing agreements and procedures with the entities that would be responsible for conducting this new cleanup work, LM can help mitigate risks to human health and the environment. In addition, LM has not made plans to assess the effects of climate change on its sites or to mitigate those effects, as called for in its strategic plan. By developing plans to assess the effect of climate change on its sites and to mitigate any significant impacts, LM could better ensure that its remedies will protect human health and the environment in the long term. GAO is making three recommendations, including that DOE develop agreements and procedures for circumstances that require new cleanup work and that it develop plans to assess and to mitigate the effects of climate change on its sites. DOE agreed with all three recommendations.", "document_type": "gao"}
{"report": "The Aviation and Transportation Security Act designated TSA as the primary federal agency responsible for security in all modes of transportation. Public and private transportation entities have the principal responsibility to carry out safety and security measures for their services. As such, TSA coordinates with these entities to identify vulnerabilities, share intelligence information, and work to mitigate security risks to the transportation modes. See table 1 for examples of the entities TSA works with to secure the various surface transportation modes. TSA’s Surface Programs’ Program, Project, or Activity (Surface Programs account) supports TSA programs that are to protect the surface transportation system. According to DHS’s Congressional Budget Justifications, this account received about $113 million on average annually from fiscal years 2009 through 2018, about 1.5 percent of TSA’s average annual appropriation of more than $7 billion. During that time, the appropriations directed to the Surface Programs account ranged from about $63 million to nearly $135 million annually. For example, in fiscal year 2018, TSA’s Surface Programs account received about $129 million, which was less than 2 percent of TSA’s appropriation (see figure 1). In addition, the Surface Programs account staff (full-time equivalents) ranged from 353 to 843 annually from fiscal years 2009 through 2018, consistently representing between 0.68 and 1.53 percent of TSA’s total staff. I-STEP was created in response to provisions in the Implementing Recommendations of the 9/11 Commission Act of 2007. According to PPE, the I-STEP program offers three main services: Exercise Management Services assist transportation operators, emergency responders, local law enforcement, and government officials in enhancing security preparedness and resilience; Training Support Services help partners improve security awareness, training gaps, security plans, emergency procedures, and incident management skills; and Security Planning Tools and Services help partners gain an understanding of transportation security lessons learned and best practices to inform risk-based decision-making. The program conducts multi-agency, multi-jurisdictional activities ranging from seminars to full-scale exercises. Seminars provide a starting point for industry stakeholders developing or making major changes to their plans and procedures. Full-scale exercises deploy personnel and resources for real-time scripted events that focus on implementing and analyzing plans, policies, and procedures. The voluntary exercises are conducted across surface transportation modes including mass transit, passenger and freight rail, highway, and pipeline. TSA’s Surface Programs account received $123 million in fiscal year 2017 and $129 million in fiscal year 2018, according to DHS. Surface activities are primarily carried out by three TSA offices—Security Operations; Law Enforcement/Federal Air Marshal Service; and Policy, Plans, and Engagement. TSA reported that these offices were collectively allocated about 99 percent of the funding in TSA’s Surface Programs account in fiscal year 2017 and 93 percent in fiscal year 2018. Security Operations (SO). This office is to provide risk-based security that includes regulatory compliance and other programs designed to secure transportation. Within SO, surface transportation security inspectors, known as surface inspectors, conduct a variety of activities to implement TSA’s surface transportation security mission. These activities are to include (1) regulatory inspections for freight and passenger rail systems, (2) regulatory Transportation Worker Identification Credential inspections, and (3) non-regulatory security assessments and training which surface transportation entities participate in on a voluntary basis. Law Enforcement/Federal Air Marshal Service (LE/FAMS). This office is to conduct protection, response, detection, and assessment activities in transportation systems. For example, LE/FAMS administers the Visible Intermodal Prevention and Response (VIPR) program. Since late 2005, TSA has deployed teams to conduct VIPR operations as a way to augment security of and promote confidence in surface transportation systems. These capabilities can include random bag searches and law enforcement patrols at mass transit and passenger rail systems to deter potential terrorist threats. Policy, Plans, and Engagement (PPE). This office is to develop and coordinate both domestic and international multimodal transportation security policies, programs, directives, strategies and initiatives, while overseeing engagement with industry stakeholders and associations. For example, each modal section within PPE—mass transit, passenger and freight rail, highway, pipeline, and maritime—is to be responsible for outreach to their respective industry and with federal security partners. Their primary role is to align industry interests and actions with the TSA mission. The modes are to share intelligence and information with the industry to develop a shared understanding of risks, conduct vulnerability gap analysis, develop security policy, share best practices, provide risk mitigation and training tools, and conduct drills and exercises. These TSA offices further allocate surface program resources within their respective offices to carry out surface transportation activities (see table 2). Within PPE’s Surface Division, PPE reported allocating six Surface Program account staff to each surface transportation mode office— mass transit and passenger rail, freight rail, highway and motor carrier, and pipeline—in fiscal years 2017 and 2018. TSA may realign funds within an appropriation account through reprogramming and also has limited authority to realign funds between appropriation accounts through transfers, pursuant to its appropriations acts and subject to notification provisions. According to TSA officials, TSA reprogrammed or transferred the following surface transportation resources enacted from fiscal years 2017 through 2019: In fiscal year 2018, TSA reprogramed $5 million from Surface Programs to Mission Support activities to address security requirements and increase hiring of transportation security officers. Transportation security officers conduct security screening of passengers, baggage, and cargo at airports to prevent any deadly or dangerous objects from being transported onto an aircraft. In fiscal year 2018, DHS transferred $100,000 from the Surface Program account to (1) the Immigration and Customs Enforcement’s Custody Operations account to provide adequate funding for detention beds, (2) Immigration and Customs Enforcement’s Transportation Removal Program account to support transportation and removal activities for migrants, and (3) the U.S. Secret Service’s Protection of Persons and Facilities account to support upgrading protections for the White House. In fiscal year 2019, DHS transferred over $6 million to the Immigration and Customs Enforcement’s Custody Operations and Transportation Removal Program accounts for the same purposes. In fiscal year 2019, TSA reprogrammed $200,000 from Mission Support and Secure Flight to Surface Programs to ensure sufficient funds were available to make payroll payments to employees during the fiscal year 2019 government shutdown. Staff funded from the Surface Programs account may be used for aviation-related activities. For example: TSA funds VIPR teams from the Surface Program account; however, VIPR teams are often used for aviation security activities. TSA’s program guidance stated they use a risk-based approach to prioritize and schedule VIPR program operations. According to TSA, in fiscal year 2017, 41 percent of VIPR program operations were conducted in surface modes and 59 percent were conducted in aviation security. In fiscal year 2018, TSA reported that 61 percent of VIPR program operations were conducted in surface modes and 39 percent were conducted in aviation security. TSA also funds surface inspectors and their supervisors from the Surface Program account; however, surface inspectors can assist with aviation-related activities, as we reported in 2017. At that time, we found that TSA had incomplete information on the total time surface inspectors spent on those activities because of limitations in TSA’s data system. Since then, TSA updated its system to include a field indicating whether the activity was conducted in the surface or aviation mode, demonstrating that TSA has visibility over all activities surface inspectors conduct. In fiscal year 2018, TSA reported that surface inspectors spent about 16 percent of hours on aviation-related activities. TSA’s 2016 Surface Division Internal Operating Procedure details the planning and implementation process of I-STEP, but does not fully identify the roles and responsibilities for key TSA offices or time frames for when those offices should coordinate to support training and exercise planning. PPE has primary responsibility for planning and implementing I-STEP under the procedure and coordinates with other TSA offices to facilitate exercises and accomplish the program’s goals. Specifically, PPE officials stated that SO and the Intelligence and Analysis (I&A) offices, have important roles in helping PPE to plan and conduct tabletop exercises using I-STEP’s online exercise tool to facilitate planning in the field. For example, PPE officials stated that SO conducts external outreach to surface transportation stakeholders to identify participants and exercise locations, and I&A provides intelligence briefings that give background context to participants. The roles and responsibilities of SO and I&A are not captured in the operating procedure in part because program responsibilities have changed since the procedure was issued in 2016. For example, the operating procedure describes PPE’s primary responsibility for industry engagement, but does not discuss SO’s surface inspectors’ role in stakeholder and industry outreach for I-STEP. Specifically, surface inspectors reach out to industry stakeholders to identify participants interested in conducting an exercise. Surface inspectors also help handle logistics, such as coordinating with local responders and stakeholders. However, the operating procedure has not been updated since 2016 to capture this transition of SO responsibilities. In the absence of a policy that clearly defines all current offices that should coordinate and when, PPE may also be missing consistent input and important information from relevant offices across TSA. For example, PPE officials indicated that I&A officials can support I-STEP exercises by providing intelligence briefings, when requested, and can assist at or before initial PPE planning meetings. However, I&A officials stated that they do not typically participate in the PPE planning meetings that help identify and prioritize exercises based on risk-based intelligence documents, because they are not consistently invited to attend. Further, according to I&A officials, they sometimes receive a few weeks’ notice, or no notice at all to prepare intelligence briefings for upcoming exercises. I&A officials explained that while they have supported exercise planning, there is no formal role for the office in the procedure or expected time frames for providing information. Our Standards for Internal Control in the Federal Government states management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. Management then develops the overall responsibilities from the entity’s objectives that enable the entity to achieve its objectives. TSA officials stated that they plan to revise the 2016 Surface Division’s Internal Operating Procedure. This planned revision presents an opportunity to identify and clarify roles and responsibilities for all offices involved in the coordination of the exercise, including when they should to coordinate. TSA allocates resources for surface transportation activities, including I- STEP voluntary training and exercises with system operators and governmental security partners. While PPE coordinates with several offices across TSA to accomplish the program’s goals, coordination guidance could be improved. Although PPE has discussed the roles and responsibilities for offices outside of PPE, how and when these offices should coordinate has not been clearly defined in its sole guidance document. As a result, TSA may be missing input and information from relevant offices. Formalizing planning responsibilities, specifically with I&A, would allow for consistent involvement in the planning process and give analysts more time to prepare intelligence briefings for exercises. Also, with surface inspectors performing stakeholder outreach in addition to PPE’s primary role for industry engagement, formalizing planning and external outreach roles and responsibilities for SO would ensure consistent outreach in the field. We are making the following recommendation to TSA: The TSA Administrator should clarify roles and responsibilities for all offices involved in the coordination of surface transportation exercises, including when these offices are to coordinate, as part of the planned revision of the Surface Division’s Internal Operating Procedure for I- STEP. (Recommendation 1) We provided a draft of this report for review and comment to DHS. DHS provided written comments, which are reproduced in Appendix I. In their comments, DHS concurred with the recommendation and described actions planned to address it, including an estimated timeframe for completion. If fully implemented, these actions should address the intent of the recommendation and better position TSA’s offices to execute roles and responsibilities for planning and implementing I-STEP. TSA also provided technical comments, which we incorporated as appropriate We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8777 or RussellW@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix II. In addition to the contact named above, Ellen Wolfe (Assistant Director), Amber Edwards (Analyst-in-Charge), Lilia Chaidez, Dominick Dale, Tracey King, Leah Nash, Natasha Oliver, and Michael Silver made key contributions to this report.", "summary": "The global terrorist threat to surface transportation–freight and passenger rail, mass transit, highway, maritime and pipeline systems–has increased in recent years, as demonstrated by a 2016 thwarted attack on mass transit in New Jersey and the 2017 London vehicle attacks. TSA is the primary federal agency responsible for securing surface transportation in the United States. The FAA Reauthorization Act of 2018 includes a provision that GAO review resources provided to TSA surface transportation programs and the coordination between relevant entities related to surface transportation security. This report addresses TSA's: (1) allocation of resources to surface transportation programs for fiscal years 2017 and 2018; and (2) coordination within TSA to implement the Intermodal Security Training and Exercise Program. GAO analyzed TSA data on surface program resources for fiscal years 2017 and 2018, reviewed TSA program guidance, and interviewed TSA officials responsible for implementing the Intermodal Security Training and Exercise Program. This program is intended to assist transportation operators and others in enhancing security through exercises and training. Transportation Security Administration (TSA) reported allocating most of its surface transportation program account, which was $123 million in fiscal year 2017 and $129 million in fiscal year 2018--to three offices (see figure). The surface program account represented about 1.6 percent of the agency's appropriation in both fiscal years, according to Department of Homeland Security data. Security Operations is to conduct regulatory inspections for freight and passenger rail systems, non-regulatory security assessments, and voluntary training. Law Enforcement/Federal Air Marshal Service is to administer the Visible Intermodal Prevention and Response (VIPR) Program to augment the security of and promote confidence in surface transportation systems. Policy, Plans, and Engagement (PPE) is to develop and coordinate security policies, programs, directives, strategies, and initiatives, while overseeing industry engagement. In fiscal years 2017 through 2019, TSA reported using surface program resources for non-surface activities. For example, in fiscal year 2018, TSA reprogrammed $5 million from the Surface Programs account to the Mission Support account to address security requirements and increase hiring of transportation security officers. In that same year, about 39 percent of VIPR operations were conducted in aviation security. TSA has not fully identified coordination roles and responsibilities for its training and exercise program for offices outside of PPE—the office with primary responsibility for the program. PPE coordinates with several other offices to accomplish the program's goals, including the Intelligence and Analysis (I&A) office that provides intelligence briefings that give background context during program exercises. I&A officials explained that while they have supported exercise planning, there is no formal role for the office in the procedure or expected time frames for providing information. As a result, I&A officials stated that they do not typically participate in the PPE planning meetings because they are not consistently invited to attend. In the absence of a policy that clearly defines all current offices that should coordinate and when, PPE may be missing consistent input and important information from relevant offices across TSA. GAO recommends that TSA clarify roles and responsibilities for all offices involved in the coordination of surface transportation exercises, including when these offices are to coordinate. DHS concurred with the recommendation.", "document_type": "gao"}
{"report": "The U.S. electric grid comprises three distinct functions: generation and storage, transmission, and distribution (see fig. 1). Generation and Storage. Power plants generate electric power by converting energy from other forms—chemical, mechanical (hydroelectric or wind), thermal, radiant energy (solar), or nuclear— into electric power. Energy storage, such as batteries or pumped hydroelectric, can improve the operating capabilities of the grid while also regulating the quality and reliability of power. Transmission. The power transmission system connects geographically distant power plants with areas where electric power is consumed. Substations are used to transmit electricity at varied voltages and generally contain a variety of equipment, including transformers, switches, relays, circuit breakers, and system operations instruments and controls. Distribution. The distribution system carries electric power out of the transmission system to industrial, commercial, residential, and other consumers. Three large electric grids, or interconnections, exist in the contiguous United States that collectively constitute the U.S. electric grid: the Eastern Interconnection, Western Interconnection, and Electric Reliability Council of Texas Interconnection (see fig. 2). These interconnections, which extend into parts of Canada and Mexico, operate independently with limited ability to move electric power between them; electric power is produced within an interconnection to meet demand in the same interconnection. The grid is generally considered to be resilient. Historically, grid operators have been able to respond quickly to the adverse consequences of an incident—whether it is damage from a major hurricane or a falling tree—and quickly restore service. In some cases, electricity may be restored long before utilities fully recover from an incident. For example, in instances with physical damage to grid components, such as an event that damages many substations, it could take months or years to fully restore the equipment. The electricity industry has refined its power restoration processes after decades of experience in responding to disaster-related events, but restoration from a cyber-related event may be more challenging. For example, disaster-related events—such as hurricanes—may involve significant lead time before the incident. This allows owners and operators to take preemptive measures to protect their systems, develop restoration plans, and activate personnel. In contrast, cyberattacks may occur without warning, leaving owners and operators no time to prepare for a response. In addition, cyberattacks could target and damage specific types of components or facilities across a dispersed geographic area. Responding to such an attack could be more difficult than to a localized disaster-related event since resources may be geographically distributed rather than concentrated in the same area. Industrial control systems are typically network-based systems that monitor and control sensitive processes and physical functions, such as the opening and closing of circuit breakers on the grid. These systems support the control of electric power generation, transmission, and distribution. System operators—which are sometimes affiliated with a particular utility or sometimes independent and responsible for multiple utility areas—manage electricity flows through these systems. Early industrial control systems operated in isolation, running proprietary control protocols using specialized hardware and software. In addition, many industrial control system components were in physically secured areas, and the components were not connected to IT systems or the internet. However, industrial control systems are changing in ways that offer advantages to system operators but that also make them more vulnerable to cyberattacks. In particular, proprietary devices in these systems are being replaced by cheaper and more widely available devices that use traditional IT networking protocols—including those that support remote access. These newer devices can provide the system operator with more detailed data on the conditions of the transmission and distribution systems and with better tools to observe and manage the grid. Remote access capabilities in the devices can also make them easier to maintain. Further, industrial control systems are being designed and implemented using traditional IT computers and operating systems, which allow corporate business and industrial control system networks to be connected more easily. Nonetheless, cyberattacks on industrial control systems supporting grid operations may require a degree of sophistication and knowledge beyond what is needed to conduct cyberattacks on IT systems. For example, industrial control systems often use operating systems and applications that may be considered unconventional to typical IT personnel. Federal policy and public-private plans establish roles and responsibilities for the protection of critical infrastructure, including the electric grid. Presidential Policy Directive 21, issued in February 2013, shifted the nation’s focus from protecting critical infrastructure against terrorism to protecting and securing critical infrastructure and increasing its resilience against all hazards, including natural disasters, terrorism, and cyber incidents. The directive identified 16 critical infrastructure sectors, such as the energy sector, which includes the grid. In addition, the directive identified energy and communications systems as uniquely critical because of the enabling functions they provide across all sectors. The directive also outlined roles and responsibilities for protecting these sectors. For example: The directive designated DOE as the sector-specific agency for the energy sector. According to the directive, DOE and other sector-specific agencies are responsible for, among other things, collaborating with critical infrastructure owners and operators, identifying vulnerabilities, and helping to mitigate incidents. In addition, the Fixing America’s Surface Transportation Act of 2015 codified DOE’s role as the sector-specific agency for the energy sector and gave DOE the authority to order emergency measures, following a Presidential declaration of a grid security emergency, to protect or restore the reliability of critical electric infrastructure. The Office of Cybersecurity, Energy Security, and Emergency Response is the lead for DOE’s energy sector cybersecurity efforts. The directive called for DHS to coordinate the overall federal effort to promote the security and resilience of the nation’s critical infrastructure. Within DHS, the Cybersecurity and Infrastructure Security Agency’s National Cybersecurity and Communications Integration Center is the lead for cyber and physical infrastructure security. Private-sector critical infrastructure owners and operators are encouraged, but not required, to report cybersecurity incidents to the center. The directive emphasized that critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets and to determine effective strategies to make them more secure and resilient. The National Infrastructure Protection Plan, updated by DHS in December 2013, among other things, further integrates critical infrastructure protection efforts between government and private sectors. It describes a voluntary partnership model as the primary means of coordinating government and private-sector efforts to protect critical infrastructure. As part of the partnership structure, the designated sector-specific agencies serve as the lead coordinators for the security programs of their respective sectors. The plan also called for each sector to have a government coordinating council, consisting of representatives from various levels of government, and many sectors have a coordinating council consisting of owner-operators of these critical assets or members of their respective trade associations. For example, the Energy Sector Government Coordinating Council has been established (comprising the electricity subsector, as well as the oil and natural gas subsectors), and an Electricity Subsector Coordinating Council has been established to represent electricity asset owners and operators. Cybersecurity, issued in 2013, among other things, addresses the need to improve cybersecurity through information sharing and collaboratively developing and implementing risk-based standards. It called for NIST to lead the development of a framework to reduce cybersecurity risks to critical infrastructure. It also called for sector- specific agencies to develop mechanisms to encourage adoption of the framework. NIST issued its Cybersecurity Framework in 2014 and updated it in April 2018. The framework provides a set of cybersecurity activities, desired outcomes, and applicable references that are common across all critical infrastructure sectors, including the energy sector. The executive branch has taken steps toward outlining a federal strategy for confronting cyber threats—including those facing critical infrastructure such as the grid. For example: Executive Order 13800: Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, issued in May 2017, required federal agencies to take a variety of actions aimed at improving the cybersecurity of federal networks and critical infrastructure. Among other things, the order required DOE and DHS to assess the potential scope and duration of a prolonged power outage associated with a significant cyber incident, the readiness of the United States to manage the consequences of such an incident, and any gaps or shortcomings in assets or capabilities required to mitigate the consequences of such an incident. The National Cyber Strategy, issued in September 2018, builds upon Executive Order 13800 and describes actions that federal agencies and the administration are to take to, among other things, secure critical infrastructure. For example, one of the strategy’s seven goals is protecting critical infrastructure. To achieve this goal, the strategy outlines a number of priority actions, such as prioritizing risk- reduction across seven key areas, including energy and power. The DHS Cybersecurity Strategy was released in May 2018 with the intent of providing the department with a framework to execute cybersecurity responsibilities during the next 5 years. The plan outlines seven goals the department plans to accomplish in support of its mission related to managing national cybersecurity risks. For example, for the goal of protecting critical infrastructure, the plan outlines a number of objectives and sub-objectives, such as expanding and improving the sharing of cyber threat indicators, defensive measures, and other cybersecurity information. In our 2018 and 2019 updates on government high-risk areas, we reported that these executive branch strategy documents did not include key elements of desirable characteristics that can enhance the usefulness of a national strategy as guidance for decision makers in allocating resources, defining policies, and helping to ensure accountability. Federal and state authorities play key roles in regulating the reliability of the grid, which can be impaired by cybersecurity attacks. FERC is the federal regulator of interstate transmission of electricity with responsibility to review and approve standards to provide for the reliable operation of the bulk power system. In addition, FERC oversees NERC, which is the federally designated U.S. electric reliability organization. NERC is responsible for conducting reliability assessments and enforcing mandatory standards to ensure the reliability of the bulk power system—a term that refers to (1) facilities and control systems necessary for operating the electric transmission network and (2) the output from certain generation facilities needed for reliability. NERC develops reliability standards collaboratively through a deliberative process involving utilities and others in the electricity industry. NERC then sends the standards to FERC, which can either approve them or remand them to NERC for revision. These reliability standards include critical infrastructure protection standards for protecting electric utility-critical and cyber-critical assets from cyberattacks. FERC has approved 11 such cybersecurity standards, 10 of which are currently enforced. The standards call for organizations to classify their cyber systems as low-, medium-, or high-impact based on the adverse impact that loss, compromise, or misuse of those systems could have on the reliable operation of the bulk electric system. The classifications are made based on criteria and associated thresholds for, among others, generation resources and transmission substation operations. In turn, the standards apply differently to cyber systems based on whether they are classified as low-, medium-, or high-impact systems. For example: Low-impact systems. Systems that affect net aggregate generation capacity of less than 1,500 megawatts at one power plant location within a single interconnection are classified as low-impact systems and are subject to the requirements in two of the 11 cybersecurity standards. Medium-impact systems. Systems that similarly affect net aggregate generation capacity of at least 1,500 megawatts are classified as medium-impact systems and are subject to requirements in the full set of cybersecurity standards. High-impact systems. Systems that are used by and located at certain control centers are classified as high-impact systems and are subject to the full set of cybersecurity standards. The standards generally require organizations to implement similar controls for medium- and high-impact systems, with more stringent variations of certain controls for high-impact systems. As of December 2017, at most about 20 percent of the nation’s generation capacity comes from power plants with medium-impact systems and therefore is subject to requirements in the full set of cybersecurity standards. Both NERC and FERC have authority to enforce reliability standards. In addition, FERC has the authority to oversee NERC’s enforcement of the FERC-approved reliability standards. Cyber incident reporting is also an important part of federal and nonfederal regulatory efforts. Federal law requires grid owners and operators to report bulk power system incidents to DOE when certain criteria are met, such as a cyber event that causes interruptions of electrical system operations or that could potentially affect power system reliability. In addition, FERC-approved reliability standards require certain registered grid owners and operators to report cybersecurity incidents—that is, cybersecurity events that have compromised or disrupted one or more reliability tasks—to NERC. State regulators generally oversee the reliability of distribution systems, and cybersecurity regulations related to the distribution grid may vary across states. In 2017, the National Association of Regulatory Utility Commissioners released an updated version of its cybersecurity primer for state utility regulators that aims to provide guidance to state regulators. The primer highlights the NIST Cybersecurity Framework as well as the FERC-approved cybersecurity standards as helpful tools for utilities and state regulators. The U.S. electric grid faces significant cybersecurity risks—that is, threats, vulnerabilities, and impacts—and grid owners and operators face significant challenges in addressing these risks. Threat actors are becoming increasingly capable of carrying out attacks on the grid. At the same time, the grid is becoming more vulnerable to attacks. With respect to the potential impacts of the threats and vulnerabilities, U.S. cybersecurity incidents reportedly have not caused a domestic power outage. In addition, federal agencies have performed three assessments of the potential impacts that cyberattacks could have on the grid, but the potential scale of any associated outages is uncertain due to limitations in the assessments. As grid owners and operators attempt to address cybersecurity risks, they face a number of challenges, such as difficulties in hiring a sufficient cybersecurity workforce and limited public-private information sharing. A variety of threat actors pose significant cybersecurity threats to the electric grid, and many of these threat actors are becoming increasingly adept at carrying out attacks on industrial control systems, such as those supporting grid operations. Relatedly, the skill needed to attack industrial control systems is decreasing, as tools for exploiting industrial control system vulnerabilities become more available. According to the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community, nations, criminal groups, and terrorists pose the most significant cyber threats to U.S. critical infrastructure. In addition, hackers and hacktivists, as well as insiders, pose significant cyber threats to the grid, according to officials and representatives of key federal and nonfederal entities whom we interviewed. Nations, including nation-state, state-sponsored, and state-sanctioned groups or programs, use cyber tools as part of their information-gathering and espionage activities. According to the 2019 Worldwide Threat Assessment, China and Russia pose the greatest cyberattack threats; of particular concern, they possess the ability to launch cyberattacks that could cause localized, temporary disruptive effects on critical infrastructure. For example, the assessment states that China has the ability to disrupt a natural gas pipeline for days to weeks (which could in turn disrupt grid operations), and Russia has the ability to disrupt an electrical distribution network for at least a few hours. The assessment also states that Russia is mapping U.S. critical infrastructure with the long-term goal of being able to cause substantial damage. Separately, DHS and the Federal Bureau of Investigation have described Russian activities as an intrusion campaign by actors on U.S. government entities and critical infrastructure organizations. In addition, a nation-state has successfully demonstrated its capability to disrupt the grid of another country. Specifically, according to the Office of the Director of National Intelligence, in December 2015 a state-sponsored actor conducted a cyberattack on the Ukrainian power grid that systematically disconnected substations, resulting in a power outage that lasted 3 hours. Officials and representatives of key federal and nonfederal entities we interviewed identified nations as the most capable threat actor but also noted that nations may not take action to disrupt the U.S. grid. For example, representatives from two utilities stated that nation-state actors are of the most concern because they have the resources to persist in their operations. However, officials from Los Alamos National Laboratory explained that nation-states may choose not to sponsor an attack because they could be easily identified. In addition, a representative from one of the utilities that we met with stated that nation-states may not pursue a cyberattack on the U.S. grid because they may be concerned about the potential response by the United States. Federal officials we interviewed noted that nation-states may be interested in gathering information about U.S. critical infrastructure with the intent of conducting a cyberattack at a later date. Criminal groups, including organized crime organizations, seek to use cyberattacks for monetary gain. According to the 2019 Worldwide Threat Assessment, financially motivated cyber criminals will likely expand their targets in the United States in the next few years, and their actions could disrupt critical infrastructure in non-energy sectors. The intelligence community does not identify criminal groups as a threat specifically to the energy sector, but these groups could still have a large impact on the grid. For example, criminal organizations often use ransomware—malicious software used to deny access to IT systems or data—to hold systems or data hostage until a ransom is paid. Criminal groups have not used ransomware to target industrial control systems, but ransomware has been used to infect IT systems tied to industrial control systems. For example, the Center for Internet Security reported in March 2019 that the LockerGoga ransomware disrupted industrial and manufacturing firms’ networks, including a Norwegian aluminum company, which had to temporarily move to manual production. According to DHS’s Industrial Control Systems Computer Emergency Response Team, ransomware continues to be a major threat to both IT and industrial control systems that support the grid. In addition, officials and representatives of key federal and nonfederal entities we interviewed suggested that nations could hire criminal groups to achieve their objectives. For example, an official from the National Renewable Energy Laboratory stated that criminal groups could be leveraged by other threat actors that have different incentives, such as nations focused on intelligence-gathering operations. Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, inflict mass casualties, weaken the economy, and damage public morale and confidence. Terrorist groups may be highly motivated to disrupt or damage the grid, but they do not currently have the sophisticated tools or skill necessary to execute a cyberattack that could cause a widespread outage or significantly damage the power system, according to the 2019 Worldwide Threat Assessment. However, terrorist groups could cause disruptive effects, such as defacing websites or executing denial-of-service attacks against poorly protected networks. Hackers break into networks for a challenge, revenge, stalking, or monetary gain, among other reasons. By contrast, hacktivists are ideologically motivated and use cyber exploits to further political goals, such as free speech or to make a point. Hackers and hacktivists no longer need a great amount of skill to compromise IT systems because they can download commonly available attack tools. Officials and representatives of key federal and nonfederal entities we interviewed told us that hackers and hacktivists may have less capability to do harm than the most significant threat actors identified by the intelligence community, but they still pose a threat to the grid. For example, officials from the National Energy Technology Laboratory explained that while hacktivists generally are less capable than nations, their intent to inflict harm or to damage operations is typically more immediate than nations’ longer-term goals. In addition, representatives from nonfederal entities stated that hacktivists may be capable of causing problems for electric utilities and systems supporting the delivery of power. Insiders are entities (e.g., employees, contractors, vendors) with authorized access to an information system or enterprise who have the potential to cause harm through destruction, disclosure, modification of data, or denial of service. Such destruction can occur wittingly or unwittingly. For example, in 2009, a disgruntled former IT employee of a Texas power plant allegedly disrupted the company’s energy forecast system when the company failed to deactivate the employee’s account access and confiscate his company-issued laptop after firing him two days earlier. By contrast, in another case in 2009, contractors were reported to have unwittingly introduced malware on a uranium enrichment facility’s workstations in Iran. Specifically, the attackers introduced malware on the contractor’s business network. The malware then reportedly spread to universal serial bus (USB) devices that were used to transfer information between the contractors’ business IT network and the uranium enrichment facility’s workstations. Officials and representatives of key federal and nonfederal entities that we interviewed stated that while the threat posed by insiders varies, they could cause damaging effects. For example, Sandia National Laboratories officials explained that insiders could include knowledgeable employees with privileged access to critical systems or contractors with limited system knowledge. Further, representatives from another nonfederal entity explained that insider threats are a concern because of the economically valuable information they could steal. The electric grid is becoming more vulnerable to cyberattacks via (1) industrial control systems, (2) consumer Internet of Things (IoT) devices connected to the grid’s distribution network, and (3) the global positioning system (GPS). As previously noted, cheaper and more widely available devices that use traditional IT networking protocols are being integrated into industrial control systems. The use of these protocols, as well as traditional IT computers and operating systems, has led to a larger cyberattack surface—the different points in a network where attackers can try to enter or extract information—for the grid’s systems. In particular, many industrial control system devices include remote access capabilities, and industrial control systems are increasingly connected to corporate business networks. Remote access capabilities. Vendors are increasingly including remote access capabilities, including modems and wireless networking, as part of industrial control system devices. These capabilities are susceptible to exploitation by malicious actors. For example, malicious actors could scan a range of potential telephone numbers common to an area or published on a company website to find open modem connections to these devices (referred to as “war dialing”). In addition, malicious actors could scan for unsecured wireless networks connected to industrial control system devices while in close proximity to the devices (referred to as “war driving”). If implemented effectively, modern cybersecurity practices often protect against techniques used to remotely access industrial control system devices, and only allow trusted connections. However, to circumvent these practices, a malicious actor could, for example, compromise a vendor’s network—which is often trusted by owners and operators—and use the trusted connection to remotely connect to industrial control system devices. Connections to corporate business networks. Industrial control systems, which were once largely isolated from the internet and business IT systems, are increasingly connected in modern energy systems, allowing cyberattacks to originate in business IT systems and migrate to industrial control systems. For example, malicious nation-state actors used spear phishing emails to deploy malware on business IT networks in the 2015 attack on Ukrainian electricity utilities. After gaining initial access to the business IT networks, the attackers reportedly used a variety of techniques to migrate to the industrial control system networks of the utilities. Moreover, even if industrial control systems are not physically connected to business IT systems, malicious actors can exploit the use of removable media between the two networks. For example, as previously mentioned, contractors were reported to have unwittingly introduced malware on uranium enrichment facility workstations in Iran by using USB devices that were infected with the malware on the contractors’ business IT network to transfer information to the uranium enrichment facility’s workstations. Figure 3 illustrates how malicious actors could leverage this increasing attack surface to compromise industrial control systems. Compounding the risk associated with the increased attack surface, many legacy industrial control systems were not designed with cybersecurity protections because they were not intended to be connected to networks, such as the internet. For example, many legacy devices are not able to authenticate commands to ensure that they have been sent from a valid user and may not be capable of running modern encryption protocols. In addition, some legacy devices do not have the capability to log commands sent to the devices, making it more difficult to detect malicious activity. Additionally, even in the case of more modern devices, the safety and efficiency goals of the grid and the supporting industrial control systems can conflict with the goal of security in the design and operation of industrial control systems. According to an Idaho National Laboratory analysis, grid owners and operators may not always be able to identify industrial control system vulnerabilities in a timely manner. Vulnerability scanning is often used in IT systems to validate proper system configuration and to identify any vulnerabilities that may be present. However, conventional IT vulnerability scanning can disable or shut down energy delivery systems, and testing may not always detect vulnerabilities deep within industrial control system software. Further, even if owners and operators are able to identify industrial control system cybersecurity vulnerabilities, they may not be able to address those vulnerabilities in a timely manner because certain industrial control system devices may have high availability requirements to support grid operations. These devices typically need to be taken offline to apply patches to fix cybersecurity vulnerabilities. In addition, grid owners and operators need to rigorously test the patches before applying them. Security patches are typically tested by vendors, but they can degrade or alter the functionality of industrial control systems, which can have serious consequences for grid operations. Consequently, there is increased risk that malicious actors may be able to exploit vulnerabilities in industrial control system devices before patches can be applied. According to DHS, the number of vulnerability advisories for industrial control systems devices has steadily increased, from 17 advisories in 2010 to 223 advisories in 2018 (see fig. 4). Moreover, supply chains for industrial control systems can introduce vulnerabilities that could be exploited for a cyberattack. For example, there is a potential for manufacturers and developers to—wittingly or unwittingly—include unauthorized code or malware in industrial control system devices and systems that provides a back door into the equipment or that allows the program to “call home” once installed. Further, manufacturers and software developers create their products in many different locations around the world, thus making them potentially susceptible to foreign-based threats. For example, a capable nation-state could gather useful information on the types of equipment used at a particular utility with the intent to undermine security controls at a later time. In addition, manufacturers and developers have made sensitive information publicly available regarding the operation of their hardware and software. For example, manufacturers and developers have published vendor manuals, which include information such as default passwords and operating instructions. These manuals often appear on the internet and can aid malicious actors in conducting cyberattacks on industrial control systems. Researchers and federal agencies have recently identified concerns about the potential introduction of cyber vulnerabilities to the grid through the connection of consumer IoT devices to the grid’s distribution network. For example, university researchers in 2018 used large, real-world grid models to simulate the feasibility and impact on the grid of a coordinated cyberattack on smart home appliances. Specifically, the researchers found that malicious threat actors could compromise a large number of high-wattage IoT devices (e.g., air conditioners and heaters) and turn them into a botnet—a network of devices infected with malicious software and controlled as a group without the owners’ knowledge. The malicious actors could then use the botnet to launch a coordinated attack aimed at manipulating the demand across distribution grids. For example, according to the researchers, one such attack could involve synchronously switching on all of the compromised devices. Such an attack could disrupt the balance of power generation and consumption and ultimately cause an outage. An official from the National Renewable Energy Laboratory explained that the likelihood of attacks on the distribution network using IoT devices is low but could increase in the future. In particular, the official explained that the wattage needed to create a significant disruption in the balance of supply and demand would require a botnet of tens of thousands of smart appliances. Botnets of this size have been created, but the laboratory official explained that it would be very difficult to manipulate all of those devices to turn on at precisely the same time. However, the official cautioned that such an attack could become more plausible in the future as additional high-wattage systems and devices, such as building energy management systems and electric vehicles, are connected to the internet. The grid is dependent on GPS timing to monitor and control generation, transmission, and distribution functions. According to DOE, the GPS signal is susceptible to exploitation by malicious actors. For example, a malicious actor could inject a counterfeit GPS signal (known as GPS spoofing) that could result in disruptions to grid operations. According to the three entities responsible for collecting information on cybersecurity incidents that affect the electric grid—DHS, DOE, and NERC—none of the cybersecurity incidents reported in the United States have disrupted the reliability or availability of the grid, and none have resulted in a power outage. Even though cyber incidents involving the grid reportedly have not caused power outages in the United States, cyberattacks on foreign industrial control systems have resulted in power outages. For example, in December 2015, malicious actors linked by Ukrainian officials to the Russian government conducted cyberattacks on three Ukrainian power distribution operators, resulting in a loss of power for about 225,000 customers. GAO did not find evidence that these attacks physically damaged grid components, but cyberattacks on industrial control systems in other sectors demonstrates that this is possible. For example, in 2014, malicious cyber actors compromised industrial control systems and caused failures that led to massive damage to a blast furnace at a German steel mill. Further, federal agencies have performed three assessments of the potential impacts of cyberattacks on the industrial control systems supporting the grid. Specifically, DOE and FERC have conducted three assessments of the potential impact of cyberattacks on the grid at the scale of multiple system operators through the scale of an interconnection. The two DOE assessments—which according to DOE officials are early drafts and have not gone through intra-agency review— focused on the impact of a cyberattack within a single interconnection and produced varying reports of the potential scale of power outages that could result from a cyberattack. The remaining assessment—which FERC conducted in 2013—reviewed the impact of a cyber or physical attack on all three interconnections and concluded that an attack could result in a widespread blackout spanning the contiguous United States. Table 1 below describes the three assessments. However, because of limitations in the three federal assessments, the scale of any power outages that may result from a cyberattack is uncertain. In particular: Federal agencies have conducted one study—FERC’s 2013 study— that assesses the potential impact of a coordinated attack in each of the three interconnections. However, in 2015, DOE officials raised concerns about the scenario and related assumptions used in that study that called into question the findings. Specifically, at that time, DOE officials reported that they found several of the scenario’s assumptions highly unlikely, including peak capabilities at all targeted generation stations at the time of an attack and the loss of all safety systems designed to prevent the consequences described in the analysis. Further, DOE officials reported that they found the study’s scenarios even more unlikely to result in a total loss of power or any other consequence that could be reasonably expected to result in damage to national security. The 2017 assessment conducted by DOE’s Argonne National Laboratory was limited in scope to a six-state region. In addition, the assessment focused on a single cyberattack scenario and noted that many other grid cyberattack methods and outcomes were possible. The 2017, 2018, and 2019 editions of DOE’s draft Electricity Subsector Risk Characterization Study have significant methodological limitations. Specifically, officials from Lawrence Livermore National Laboratory who were contracted to perform the analyses cautioned that they used a reduced model of the Western Interconnection as it existed around 1980 and emphasized that their methodology should not be used to predict the behavior of the actual bulk power system. For example, those researchers told us that their selected model of the Western Interconnection had less than a quarter of its actual capacity in 2018. The DOE official responsible for the studies said that the assumption for the worst-case scenario was from that official’s professional judgement, not a documented analysis. Later, officials at Sandia National Laboratories told us that the worst-case scenario in the DOE draft study was a point solution used as a proof of concept, that the study was not of a high level of rigor, and that the assumptions may not represent a vulnerability in the actual bulk power system. Further, the DOE methodology assumed that all assets removed from service were treated equally; accordingly, the researchers did not distinguish the loss of specific assets (such as a substation or transmission line) in the calculation of attack difficulty and likelihood. Because of these limitations, some of the draft studies’ conclusions may not be realistic. For example, one of DOE’s major conclusions in the 2017 Risk Characterization Study—that a cyberattack may result in a relatively small loss of load in the United States about 8 times per year—may not be plausible because there have not been any reported cyberattacks that have caused an outage in the United States. In addition, the three draft DOE studies have widely varying conclusions on the likelihood of cyberattacks across the selected range of loss of load. For example, the 2018 draft study concluded that a cyberattack resulting in a more substantial loss of load had an average likelihood of occurring nearly once every 10 years, while the 2019 draft study concluded that such an attack would occur about once every 100 years. According to a DOE official, there is no documentation of the technical basis for the significant changes in the assessment outcomes between the 2017 and 2018 draft studies and between the 2018 and 2019 draft studies. In addition, DOE officials told us that all three studies are early drafts and have not gone through intra-agency review. Moreover, none of the federal assessments reviewed the risk associated with a cyberattack involving a botnet of high-wattage consumer IoT devices. As previously mentioned, university researchers demonstrated that malicious actors could use a botnet of IoT devices to launch a coordinated attack aimed at manipulating the demand on distribution systems across the grid. A federal official we interviewed agreed that such an attack could occur and could disrupt grid distribution systems— especially as additional high-wattage systems become connected to the internet—but they said it is unclear what impact, if any, such attacks could have on the reliability of the bulk power system. Officials and representatives of key federal and nonfederal entities we interviewed generally identified five significant challenges grid owners and operators face in addressing cybersecurity risks: (1) difficulties in hiring a sufficient cybersecurity workforce, (2) limited public-private information sharing of classified information, (3) limited resources to invest in cybersecurity protections, (4) reliance on other critical infrastructure that may be vulnerable to cyberattacks, and (5) uncertainties about how to implement cybersecurity standards and guidance. Officials and representatives of key federal and nonfederal entities we interviewed identified difficulties in hiring a sufficient cybersecurity workforce as a significant challenge to addressing cybersecurity risks to the grid. For example, a representative of a nonfederal entity told us that there are a limited number of trained cybersecurity personnel interested in working in the energy sector. The representative added that there are a large number of vacancies for cybersecurity positions and that they are difficult to fill due to the limited amount of available talent and organizational resource constraints, such as providing salaries that are competitive with other sectors. A laboratory official commented that larger grid entities are able to attract the majority of skilled cybersecurity professionals, leaving smaller entities with less skilled personnel. Further, an asset owner explained that training personnel so that they have sufficient cybersecurity knowledge and skills is difficult, and the requisite knowledge of industrial control systems further complicates training these personnel. DOE has also identified difficulties in hiring a sufficient cybersecurity workforce as a challenge. Specifically, according to DOE’s Assessment of Electricity Disruption Incident Response Capabilities, the electricity subsector continues to face challenges in recruiting and maintaining experts with strong knowledge of cybersecurity practices as well as knowledge of industrial control systems supporting the grid. Officials and representatives of key federal and nonfederal entities we interviewed identified limited public-private sharing of classified information, including the sharing of threat intelligence, as a significant challenge to addressing cybersecurity risks to the grid. For example, a laboratory official told us that many grid owners and operators do not have security clearances. Consequently, the official explained, deeming information on certain cybersecurity threats to the grid to be “classified” leaves many utilities without the awareness to address those threats to the grid. The official added that when details are removed from classified threat intelligence in order to develop an unclassified alert, that alert often lacks the specific information utilities need to address the threat. Asset owners told us that, even for those grid owners and operators who are permitted to initiate the clearance process, it can take an extended period of time to complete the associated adjudication to obtain that clearance. In addition, two asset owners noted that, even after clearances have been received and fully adjudicated, it is often difficult to obtain access to secure locations to review classified information. DOE has also identified limited public-private information sharing as a challenge. Specifically, according to DOE’s Assessment of Electricity Disruption Incident Response Capabilities, the bidirectional flow of information and intelligence between industry and government has been highlighted by stakeholders as a continued challenge for the electricity subsector. The assessment explains that the sharing of information is impeded by the slow adoption of automated capabilities and the difficultly of sharing classified information between government and industry— particularly in real time during an incident. Officials and representatives of key federal and nonfederal entities identified limited resources for cybersecurity protections as a challenge to addressing cybersecurity risks to the grid. In particular, most of the asset owners that we met with stated that it can be costly to implement required cybersecurity protections. In addition, officials and representatives of key federal and nonfederal entities that we spoke with explained that costs— including those for cybersecurity protections—must be recovered through electric rates to customers. As a result, a laboratory official explained that many utilities prioritize cybersecurity protections that are the most cost- effective over protections that may be needed to address risks. Officials and representatives of key federal nonfederal entities we interviewed identified the grid’s reliance on other critical infrastructure (e.g., natural gas pipelines) that may be vulnerable to cyberattacks as a challenge to addressing cybersecurity risks to the grid. For example, a representative of a nonfederal entity stated that the electricity subsector inherits cybersecurity risks from other critical infrastructures, since the electricity subsector relies on those critical infrastructures for its own operations. As such, that representative added that it is difficult to holistically determine how vulnerable the grid may be to a cyberattack. In addition, as previously mentioned, according to the 2019 Worldwide Threat Assessment, China has the ability to disrupt a natural gas pipeline for days to weeks. Officials and representatives of key federal and nonfederal entities we interviewed identified uncertainties about how to implement cybersecurity standards and guidance as a challenge to addressing cybersecurity risks to the grid. In particular, several representatives noted that these uncertainties have led their organizations to devote additional resources to implementing the standards and guidance. For example, one asset owner explained that FERC-approved cybersecurity standards do not always include details that are needed to understand how they apply to that owner’s environment. In addition, another asset owner stated that significant time and effort is required to understand the standards and how they might be implemented. DOE, DHS, and other federal agencies have performed a variety of critical infrastructure protection activities aimed at addressing grid cybersecurity risks, including implementing programs that help protect grid systems from cybersecurity threats and vulnerabilities. In addition, FERC has performed a variety of regulatory activities aimed at addressing grid cybersecurity risks, such as approving mandatory cybersecurity standards for the bulk power system. DOE, DHS, and other federal agencies have performed a variety of critical infrastructure protection activities aimed at addressing grid cybersecurity risks. These activities generally align with the functions in the NIST Cybersecurity Framework, which include (1) protecting systems to mitigate cybersecurity threats and vulnerabilities; (2) identifying cybersecurity threats and vulnerabilities and detecting potential cybersecurity incidents; and (3) responding to and recovering from such incidents. Protecting systems to mitigate cybersecurity threats and vulnerabilities Federal agencies assist grid asset owners and operators in implementing protections that mitigate cybersecurity risks by providing capabilities aimed at preventing cybersecurity intrusions and offering training and guidance on cybersecurity practices. For example, DHS’s Enhanced Cybersecurity Services program provides intrusion-prevention capabilities to U.S.-based entities and to state, local, tribal, and territorial organizations. To carry out this voluntary program, DHS provides classified and unclassified threat information to designated commercial service providers. These providers use the information to block access to (1) specific malicious internet addresses and (2) email with specific malicious criteria. NIST, DHS, and DOE also provide cybersecurity training and guidance. For example, NIST has developed numerous special publications on cybersecurity protections for IT and industrial control systems, such as the previously mentioned Cybersecurity Framework and its Guide to Industrial Control Systems. In addition, DHS provides in-person and online training on leading cybersecurity practices for industrial control systems through its National Cybersecurity and Communications Integration Center. Lastly, DHS has taken initial steps to help grid entities manage supply chain cybersecurity risks. For example, in July 2018 DHS created a public-private partnership, known as the Supply Chain Risk Management Task Force. The task force aims to examine risks to the global information and communications technology supply chain and develop consensus recommendations to manage such risks. Identifying cybersecurity threats and vulnerabilities and detecting potential cybersecurity incidents Federal agencies help grid entities identify cybersecurity risks and detect incidents by providing threat and vulnerability information, performing risk assessments, performing forensic analysis, and conducting research. For example, DOE piloted and launched the Cybersecurity Risk Information Sharing Program, which is now managed by the Electricity Information Sharing and Analysis Center. It provides a voluntary, bi-directional public- private IT data sharing and analysis platform. Using both classified and unclassified sources, DOE’s Pacific Northwest National Laboratory analyzes the information to (1) identify threat patterns and attack indicators, and (2) deliver alerts to owners and operators. In addition, DHS’s Automated Indicator Sharing program provides a server housed at each participant’s location that can be used to exchange threat indicators with the department’s National Cybersecurity and Communications Integration Center. Further, the center provides asset owners with alerts, advisories, and situational reports, including information on threats, vulnerabilities, or activity that could affect IT or industrial control system networks. DOE and DHS also offer services aimed at helping grid owners and operators assess cybersecurity risks and perform forensic analysis. For example, DOE has an evaluation tool known as the Electricity Cybersecurity Capability Maturity Model that aims to help the electricity industry evaluate, prioritize, and improve its cybersecurity capabilities. In addition, DHS offers technical assessments through its National Cybersecurity and Assessment and Technical Services Team that can help identify vulnerabilities and simulate a malicious adversary. Further, DHS can review potential cybersecurity incident artifacts, such as malware, phishing emails, and network logs, at its National Cybersecurity and Communications Integration Center to determine the existence or extent of a cybersecurity threat or incident. Moreover, DOE’s Cybersecurity for Energy Delivery Systems program sponsors grid cybersecurity research through DOE’s national laboratories. For example: Oak Ridge National Laboratory has conducted research on mechanisms that could help critical infrastructure entities better detect vulnerabilities in software used in industrial control systems. Four national laboratories have engaged in a project that aims to improve the capability of grid entities to collect and analyze data from their industrial control system networks and detect cybersecurity incidents. Oak Ridge National Laboratory and Pacific Northwest National Laboratory have a joint project to develop mechanisms for more quickly detecting and eradicating malware on industrial control systems. Responding to and recovering from cybersecurity incidents Federal agencies have developed policies, strategies, and plans to define their roles and responsibilities for responding to and recovering from grid cybersecurity incidents. In particular, DHS has responsibility for leading the federal effort to mitigate or lessen the impact of such incidents, the Department of Justice has responsibility for the federal law enforcement response to the threats, and DOE has authority, in designated emergencies, to impose measures to restore the reliability of critical electric infrastructure. DOE is also responsible for coordinating the energy sector-specific response with DHS and the Department of Justice. Federal agencies have also taken steps to help prepare asset owners for cyber response and recovery efforts. For instance, DHS has worked with nonfederal entities to simulate response and recovery efforts to a cyberattack through exercises such as Cyber Storm. In addition, DOE, in conjunction with the National Association of State Energy Officials, has conducted regional energy assurance exercises. These exercises aim to promote state and local preparedness and resilience for future energy emergencies stemming from a cyber incident. FERC has performed a variety of regulatory activities aimed at addressing grid cybersecurity risks. These activities include (1) approving mandatory cybersecurity standards for the bulk power system, (2) enforcing regulatory requirements through imposition of civil penalties, (3) auditing the performance of the electric reliability organization—NERC— and its regional entities, and (4) auditing bulk power entities for compliance with the mandatory cybersecurity standards. Approve mandatory cybersecurity standards. FERC has approved mandatory reliability standards relating to cybersecurity protections. For example, in October 2018, FERC approved a new standard to bolster supply chain risk management protections for the nation’s bulk electric system. This new standard, which will become enforceable in July 2020, is intended to augment existing standards that aim to mitigate cybersecurity risks associated with the supply chain for grid- related cyber systems. Enforce regulatory requirements through imposition of civil penalties. FERC has referred violations of its approved cybersecurity standards to NERC to impose penalties on the bulk power entities that committed the violations. For example, such a notification occurred in January 2019 when NERC assessed a $10 million penalty based on 127 violations of the cybersecurity standards made by an undisclosed entity. Audit the performance of the electric reliability organization. FERC has audited NERC’s performance as the electric reliability organization. In this audit, which it completed in 2012, FERC evaluated NERC’s budget formulation, administration, and execution. With respect to cybersecurity, FERC recommended that NERC (1) assess its existing staffing levels to ensure adequate resources to accomplish critical infrastructure protection work related to cybersecurity and (2) devote greater resources to carrying out its oversight duties. In 2013, FERC closed these recommendations after reviewing NERC’s plans for evaluating its staffing levels and its commitment to add resources in its business plan. According to FERC officials, FERC continues to monitor the level of resources NERC devotes to cybersecurity oversight through its annual review of NERC’s budget Audit bulk power entities for compliance with standards. FERC has audited bulk power entities’ compliance with its approved cybersecurity standards. From 2016 through 2018, FERC conducted its own independent audits of eight bulk power entities for compliance with those standards and produced public lessons learned reports based on the results. According to FERC officials, the agency plans to conduct four such audits every fiscal year starting in fiscal year 2019 and to continue producing annual lessons learned reports based on the results. In addition, since the first of the cybersecurity standards became enforceable in 2009, FERC has observed eight NERC regional entity-led audits a year—one in each NERC region—focused on bulk power entity compliance with those standards. National strategies are critical tools used to help address longstanding and emerging issues that affect national security and economic stability. In 2004, we identified a set of desirable characteristics for effective national strategies. These characteristics include: Purpose, scope, and methodology. Addresses why the strategy was produced, the scope of its coverage, and the process by which it was developed. Problem definition and risk assessment. Addresses the particular national problems, assesses the risks to critical assets and operations—including the threats to, and vulnerabilities of, critical operations—and discusses the quality of data available regarding the risk assessment. Goals, subordinate objectives, activities, and performance measures. Addresses what the strategy is trying to achieve; steps to achieve those results; and the priorities, milestones, and performance measures that include measurable targets to gauge results and help ensure accountability. Discussion of needed resources and investments. Addresses what the strategy will cost and the types of resources and investments needed. Organizational roles, responsibilities, and coordination. Addresses who will implement the strategy, what their roles will be, and mechanisms to coordinate their efforts. As previously noted, the executive branch has taken steps toward outlining a federal strategy for confronting cyber threats—including threats to critical infrastructure such as the grid. In addition, as the sector- specific agency, DOE has led the development of approaches to implement the federal cybersecurity strategy for the energy sector, including the grid. Table 2 identifies and describes these approaches— specifically, two agency plans and an assessment—for addressing grid cybersecurity risks and challenges. The two plans and the assessment do not fully address all of the key characteristics needed for a national strategy. Collectively, the plans and assessment fully address one characteristic—purpose, scope, and methodology—and partially address the other four characteristics of a national strategy (see table 3). Purpose, scope, and methodology The plans and assessment fully address the characteristic of outlining their purpose, scope, and methodology. For example, the Energy Sector- Specific Plan explains that it was produced to help integrate and guide the sector’s continuing effort to improve the security and resilience of critical infrastructure. In addition, the plan explains that DOE worked closely with the Energy Sector Coordinating Council and the Energy Sector Government Coordinating Council, among others, to develop the plan. Problem definition and risk assessment The plans and the assessment partially address the characteristic of defining the problem and performing a risk assessment. Each defines the problems that it was intended to address and assesses cybersecurity risks to the grid. For example, DOE’s Assessment of Electricity Disruption Incident Response Capabilities states that it was developed in response to Executive Order 13800’s requirement that DOE examine the potential scope and duration of a prolonged power outage associated with a significant cyber incident. In addition, as previously mentioned, the assessment describes the potential range of load loss resulting from four cyberattack scenarios. However, the discussion of the quality of data available regarding DOE’s assessment is inaccurate. According to the assessment, the potential range of load loss resulting from four cyberattack scenarios was based on rigorous modeling and analysis from multiple DOE national laboratory experts. However, these results were based on the 2017 Electricity Subsector Risk Characterization Study, which as previously described, has significant limitations affecting the quality of data. In addition, neither the plans nor the assessment fully analyzed the cybersecurity risks and challenges to the grid. In particular, none of them analyzed the threat of, and vulnerabilities to, a cyberattack spanning all three interconnections. In addition, the initiatives did not assess the vulnerability of the grid to a cyberattack involving high-wattage consumer IoT devices connected to the grid’s distribution system. Goals, subordinate objectives, activities and performance measures The two plans partially address the characteristic of outlining goals, subordinate objectives, activities, priorities, milestones, and performance measures. Both plans outline the goals, objectives, and activities for addressing cybersecurity risks facing the electric grid. For example, the Energy Sector-Specific Plan describes five goals for the energy sector and three related priorities for the electricity subsector. However, the plans’ goals, objectives, and activities do not fully address the cybersecurity risks to the grid. For example, neither plan includes goals and activities that address the vulnerability of the grid to a cyberattack involving high-wattage consumer IoT devices connected to the grid’s distribution system. Further, in light of the previously identified gaps in the analysis of cybersecurity risks and challenges, the plans’ goals, objectives, and activities are likely not commensurate with grid cybersecurity risks and challenges. Moreover, only one of the plans—DOE’s Multiyear Plan for Energy Sector Cybersecurity—includes milestones and performance measures for achieving the goals, objectives, and activities. Additionally, this plan does not include performance measures with measurable targets for all objectives, including those aimed at providing timely cyber threat briefings to energy sector partners and developing cyber incident response processes and procedures. The two plans partially address the characteristic of describing resource and investment needs. Specifically, although the plans identify many resources and investments needed to achieve their goals and objectives, they do not fully identify resource and investment needs. For example, one of the objectives of DOE’s Multiyear Plan for Energy Sector Cybersecurity is to establish a coordinated national cyber incident response capability for the energy sector. However, the plan does not describe the resources or investments needed to meet this objective. This is of particular concern because, as previously mentioned, the Fixing America’s Surface Transportation Act of 2015 authorized DOE to order emergency measures, following a Presidential declaration of a grid security emergency, to protect or restore the reliability of critical electric infrastructure. In addition, the plans do not describe specific investment costs associated with carrying them out. For example, DOE’s Multiyear Plan for Energy Sector Cybersecurity describes the need to develop a laboratory for identifying and analyzing cybersecurity vulnerabilities to energy delivery systems. However, the plan does not identify the specific costs associated with this investment. Further, given the previously discussed gaps in risk analysis, goals, and objectives, it is unclear to what extent the identified resources and investment needs are sufficient to address electric grid cybersecurity risks and challenges. Roles, responsibilities, and coordination The two plans partially address the characteristic of describing roles, responsibilities, and coordination mechanisms for carrying out the goals, objectives, and activities. Specifically, the plans describe mechanisms for coordinating but do not always identify organizations responsible for achieving the goals, objectives, and activities. For example, DOE’s Multiyear Plan for Energy Sector Cybersecurity states that the department will partner with DOE’s national laboratories to carry out several activities in the plan. However, the plan does not indicate which of the 10 national laboratories DOE will partner with for each activity. In a written response, DOE explained that executive branch documents that outline the broader federal strategy for confronting cyber threats— such as the National Cyber Strategy and the DHS Cybersecurity Strategy—address the key characteristics of a national strategy not addressed in DOE’s plans and assessment. In addition, DOE stated that the department’s plans and assessment for addressing risks and challenges facing the grid support and fit within the context of that broader cybersecurity framework while allowing the agency flexibility to accomplish its goals. Although the broader executive branch strategy documents on confronting cyber threats provide a framework for addressing critical infrastructure cybersecurity risks and challenges, they do not address the specific risks and challenges facing the electric grid. In addition, as previously mentioned, we have reported that these broader executive branch strategy documents also do not include key characteristics of a national strategy. Until DOE ensures it has a plan aimed at implementing the federal cybersecurity strategy relating to the grid that addresses all of the key characteristics of a national strategy—including a full assessment of cybersecurity risks—the guidance the plan provides decision makers in allocating resources to address risks and challenges will likely be limited. FERC has not ensured that its approved grid cybersecurity standards fully address leading federal guidance for improving critical infrastructure cybersecurity—specifically, the NIST Cybersecurity Framework. In addition, FERC has not evaluated the risk of a coordinated cyberattack on geographically distributed targets in approving the threshold for which grid cyber systems must comply with requirements in the full set of grid cybersecurity standards. The NIST Cybersecurity Framework provides a set of cybersecurity activities, desired outcomes, and applicable references that are common across all critical infrastructure sectors. The framework also states that while it is not exhaustive, it is capable of being extended, allowing organizations, sectors, and other entities to use references that are most appropriate to enable them to manage their cybersecurity risk. NIST recommends that organizations use the Cybersecurity Framework functions, categories, and subcategories to identify the key controls needed to meet their security objectives (see Table 4 for the functions and categories). To promote widespread adoption of the framework, Executive Order 13636 called for sector-specific agencies to develop mechanisms to encourage the framework’s adoption. In addition, the order called for regulatory agencies to review the framework and determine if current cybersecurity regulatory requirements are sufficient given current and projected risks. However, the FERC-approved cybersecurity standards do not fully address the NIST Cybersecurity Framework’s five functions and associated categories and subcategories. More specifically, the cybersecurity standards substantially address two of the five functions and partially address the remaining three functions. Table 5 depicts the extent to which these standards address the framework’s five functions and 23 categories. (Appendix II contains more detailed information regarding the extent to which the standards address the framework’s 108 subcategories.) Legend: ●—Fully address: the standards address all of the related subcategories. ◕—Substantially address: the standards address at least two-thirds, but not all, of the related subcategories. ◑—Partially address: the standards address at least one-third, but less than two-thirds, of the related subcategories. ◔—Minimally address: the standards address less than one-third of the related subcategories.○—Do not address: the standards do not address any of the related subcategories. As shown in table 5, the FERC-approved cybersecurity standards either fully address or substantially address eight of the 23 categories. For example: The standards fully address the identity management, authentication, and access control category by fully addressing seven associated subcategories. For instance, the standards fully address the subcategories for credentials to be issued, managed, verified, revoked, and audited for authorized devices, users, and processes; network integrity to be protected; and physical access to assets to be managed and protected. The standards fully address the response planning category by fully addressing the associated subcategory—a response plan is to be executed during or after an incident. Conversely, the FERC-approved cybersecurity standards partially address or do not address the remaining 15 of 23 categories. For example: The standards partially address the category for supply chain risk management. In particular, the standards fully address associated subcategories for establishing supply chain risk management processes, security measures in contracts with suppliers and third- party partners, and evaluations of suppliers and third-party partners to ensure they meet their contractual obligations. However, the standards do not address subcategories for response and recovery planning and testing with suppliers and third-party providers, and for using the supply chain risk management process to identify, prioritize, and assess suppliers and third-party partners. The standards do not address the three subcategories associated with the risk management strategy category. Specifically, the standards do not call for risk management processes to be established, organizational risk tolerance to be determined, or for the risk tolerance to be informed by the organization’s role in critical infrastructure and sector-specific risk analysis. In a written response, FERC officials said that the agency did not conduct an assessment to determine how the leading practices identified in the NIST Cybersecurity Framework could be applied to the cybersecurity standards. In addition, FERC officials stated that, while the Commission uses the NIST Cybersecurity Framework as a resource and its approved standards incorporate certain facets of the framework, there is not a one- on-one alignment because the NIST Cybersecurity Framework is not industry specific. According to FERC officials, the framework addresses certain issues outside FERC’s jurisdiction. For example, FERC officials stated that the Commission does not have authority to directly impose obligations on suppliers, vendors, or entities outside its jurisdiction that provide products or services to electric industry stakeholders. However, full implementation of the NIST Cybersecurity Framework does not require regulatory agencies to impose obligations on entities over which the regulatory agencies do not have authority. Framework categories and subcategories that reference suppliers and vendors call for the organization responsible for implementing the framework to establish and implement processes for managing cybersecurity risks relating to those suppliers and vendors. In addition, in a written response, NERC officials disagreed with our assessment and stated that a separate comparison by NERC subject matter experts found substantially more overlap between the FERC- approved cybersecurity standards and the NIST Cybersecurity Framework. Moreover, NERC officials said that the intended purpose of the standards differs from the framework’s voluntary nature, and that NERC must ensure all mandatory standards are auditable and implemented by electric utilities nationwide. The officials noted the importance of the NIST Cybersecurity Framework and emphasized that NERC has considered the framework in developing and updating grid cybersecurity standards. However, we believe our analysis accurately reflects the extent that the FERC-approved standards address the NIST Cybersecurity Framework. Without a full consideration of how the FERC-approved cybersecurity standards address NIST’s Cybersecurity Framework, there is increased risk that bulk power entities will not fully implement leading cybersecurity practices intended to help critical infrastructure entities address cybersecurity risks. As previously mentioned, FERC requires cyber systems affecting a generation capacity of 1,500 megawatts or more to comply with requirements in the full set of approved cybersecurity standards since the loss, compromise, or misuse of those systems could have a medium to high impact on the reliable operation of the bulk electric system. FERC approved the 1,500-megawatt threshold based on the results of a NERC analysis. Specifically, NERC staff selected a threshold value based on the loss of one large electric grid asset from a single disruptive event and assumed a loss of power could be compensated, in part, by power from a neighboring region. However, the analysis did not evaluate the potential risk of a coordinated cyberattack on geographically distributed targets. A coordinated cyberattack could cause multiple power plants, transmission lines, or related grid components in different regions to disconnect from the grid. Such a cyberattack could target, for example, a combination of low- impact systems, each affecting a generation capacity below 1,500 megawatts that, in aggregate, might present a significant risk to the grid. FERC officials told us that the agency considered but did not evaluate the potential impact of a coordinated cyberattack on geographically distributed targets at the time it approved the threshold because the agency did not have the information it needed to develop a credible threat scenario. FERC officials said they anticipate that a future update to the approved cybersecurity standards may require the collection of relevant data on suspicious cyber activity that could inform a threat scenario for evaluating the potential impact of a coordinated cyberattack on geographically distributed targets. Further, NERC officials told us that, while NERC has not determined that a modification of the 1,500 megawatt threshold is warranted at this time, they continue to monitor the risk of a coordinated cyberattack against multiple low-impact systems and acknowledged that the FERC-approved standards must adapt with the evolving understanding of cyber threats. In addition, NERC officials explained in a written response that the intent of the 1,500-megawatt threshold is to ensure that industrial control systems with vulnerabilities that are attributable to a common cause (e.g., cybersecurity vulnerabilities in common hardware or software) that could result in the loss of 1,500 megawatts or more of generation capacity are adequately protected. Those officials added that NERC encourages entities to disaggregate their industrial control systems so that individual systems operate and maintain less than 1,500 megawatts of generation capacity. NERC officials noted that the systems associated with the disaggregated generation capacity are very diverse and are therefore less likely to provide any large single point of failure. NERC officials further explained that this disaggregation minimizes the risk to the grid by requiring a malicious actor to conduct a cyberattack on more facilities to achieve a similar loss of power. However, encouraging grid entities to design industrial control systems so that individual systems operate and maintain less than 1,500 megawatts of generation capacity could still leave the grid vulnerable to a cyberattack on those systems. For example, although a malicious actor may need to attack more systems that fall under the threshold at multiple locations to achieve the attacker’s objective for loss of power (when compared with systems that meet or exceed the threshold), the difficulty of carrying out an attack on additional systems could be less significant if the attacker identifies and exploits vulnerabilities common across the systems. In addition, as previously mentioned, systems that fall under the 1,500- megawatt threshold are not required to follow all of the requirements of the FERC-approved cybersecurity standards; as such, there is increased risk that important security controls have not been implemented for these systems. According to federal standards for internal control, management should identify, analyze, and respond to risks related to achieving organizational objectives. For example, management comprehensively identifies risks that affect its objectives and analyzes the identified risks to estimate their significance, which provides a basis for responding to the risks. Without information on the risk of a coordinated cyberattack on geographically distributed targets, FERC does not have assurance that its approved threshold for mandatory compliance with all cybersecurity standards adequately responds to that risk and sufficiently provides for the reliable operation of the grid. The U.S. electric grid faces an increasing array of cybersecurity risks, as well as significant challenges to addressing those risks. To their credit, federal agencies have performed a variety of critical infrastructure protection and regulatory activities aimed at addressing those risks. In particular, DOE has developed plans and an assessment aimed at implementing the federal strategy for confronting the cyber threats facing the grid. However, those documents do not fully address all of the key characteristics needed to implement a national strategy, including a full assessment of cybersecurity risks to the grid. Until DOE ensures it has a plan that does, the guidance the plan provides decision makers in allocating resources to address grid cybersecurity risks and challenges will likely be limited. Additionally, FERC has approved mandatory cybersecurity standards for bulk power entities, but those standards address some but not all of the leading cybersecurity practices identified in NIST’s Cybersecurity Framework. Without a full consideration of how the FERC-approved cybersecurity standards address NIST’s Cybersecurity Framework, there is increased risk that bulk power entities will not fully implement leading cybersecurity practices needed to address current and projected risks. Finally, the threshold for which entities must comply with requirements in the full set of FERC-approved standards is based on the results of an analysis that did not evaluate the potential risk of a coordinated cyberattack on geographically distributed targets. Without information on the risk of such an attack—particularly one that might target low-impact systems that are subject to fewer requirements but in aggregate could affect the grid—FERC does not have assurance that its approved threshold for mandatory compliance adequately responds to that risk and sufficiently provides for the reliable operation of the electric grid. We are making a total of three recommendations—one to DOE and two to FERC. Specifically: The Secretary of Energy, in coordination with DHS and other relevant stakeholders, should develop a plan aimed at implementing the federal cybersecurity strategy for the electric grid and ensure that the plan addresses the key characteristics of a national strategy, including a full assessment of cybersecurity risks to the grid. (Recommendation 1) FERC should consider our assessment and determine whether to direct NERC to adopt any changes to its cybersecurity standards to ensure those standards more fully address the NIST Cybersecurity framework and address current and projected risks. (Recommendation 2) FERC should (1) evaluate the potential risk of a coordinated cyberattack on geographically distributed targets and, (2) based on the results of that evaluation, determine whether to direct NERC to make any changes to the threshold for mandatory compliance with requirements in the full set of cybersecurity standards. (Recommendation 3) We provided a draft of this report for review and comment to DOE and FERC—the two agencies to which we made recommendations—as well as DHS, the Department of Commerce (on behalf of NIST), and NERC. DOE and FERC agreed with our recommendations, DHS and the Department of Commerce stated that they had no comments, and NERC disagreed with one of our findings. DOE and FERC agreed with our recommendations. In its written comments, reproduced in appendix III, DOE concurred with our recommendation and stated that it is working through an interagency process to develop a National Cyber Strategy Implementation Plan that will consider DOE’s Multiyear Plan for Energy Sector Cybersecurity. In its written comments, reproduced in appendix IV, FERC stated that our recommendations were constructive and that it would take steps to implement them. DOE and FERC also provided technical comments, which we incorporated as appropriate. In its written comments, reproduced in appendix V, NERC stated that it disagreed with our conclusion that the FERC-approved cybersecurity standards do not fully address the NIST Cybersecurity Framework. NERC recognized the importance of the NIST Cybersecurity Framework and emphasized that NERC has considered the framework in developing and updating its grid cybersecurity standards. However, NERC stated that a separate analysis by NERC subject matter experts found substantially more overlap between the standards and the framework than our analysis. In addition, NERC cited a 2011 GAO report that found that the FERC-approved standards, in combination with NERC supplementary guidance, mostly addressed the information security controls in certain NIST guidance at that time. We reviewed NERC’s analysis comparing the FERC-approved cybersecurity standards to the NIST Cybersecurity Framework and continue to believe our analysis accurately reflects the extent to which the standards address the framework. Further, in this report we assessed the extent to which the FERC-approved standards addressed the NIST Cybersecurity Framework, which is more recent and broader guidance than the NIST guidance that we examined in our 2011 report. In its comments, NERC also stated it has not determined that any changes are needed to the threshold for mandatory compliance with the full set of cybersecurity standards at this time, but it agrees with the concern that low-impact systems may be more vulnerable to a cyberattack and will continue to evaluate whether the current threshold is appropriate given evolving cybersecurity risks. For example, NERC explained that it is studying cybersecurity supply chain risks, including those associated with low-impact assets not currently subject to its supply chain standards. We believe that this effort could help to better position electric grid entities to address supply chain cybersecurity risks. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretaries of Commerce, Energy, and Homeland Security, the Chairman of FERC, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact Frank Rusco at (202) 512-3841 or ruscof@gao.gov, and Nick Marinos at (202) 512-9342 or marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. Our objectives were to (1) describe the cybersecurity risks and challenges facing the electric grid, (2) describe federal efforts to address grid cybersecurity risks, (3) assess the extent to which the Department of Energy (DOE) has a defined strategy for addressing grid cybersecurity risks and challenges, and (4) assess the extent to which Federal Energy Regulatory Commission (FERC)-approved cybersecurity standards address grid cybersecurity risks. To address our first objective, we developed a list of cyber actors that could pose a threat to the grid, identified vulnerable components and processes that could be exploited, reviewed the potential impact of cyberattacks on the grid, and identified key cybersecurity challenges facing the grid. To develop the list of cyber threat actors, we reviewed our prior work on cyber-based threats facing the grid as well as the threats identified by the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community. In addition, we interviewed officials or representatives from the following key federal and nonfederal entities to confirm, add, or remove cyber threat actors identified in our prior work based on their potential impact on grid operations: Federal agencies. We interviewed officials from DOE, the Department of Homeland Security (DHS), FERC, and the National Institute of Standards and Technology (NIST). Nonfederal regulatory organizations. We interviewed representatives of the North American Electric Reliability Corporation (NERC). Grid owners and operators. We interviewed five grid owners and operators. To select these grid owners and operators, we reviewed a membership list of the Electricity Subsector Coordinating Council as of May 2018, divided that list into three categories—investor-owned, municipal, and cooperative utilities—and then randomly selected entities from each of those three categories to interview. The views of the grid owners and operators we selected are not generalizable to the population of utilities in the United States but provide valuable insight into the cybersecurity risks and challenges grid owners and operators face. National associations. We interviewed representatives of national associations that represent various types of asset owners, entities with regulatory or state interests, and those with grid cybersecurity interests generally. Specifically, we interviewed representatives from the American Public Power Association, Edison Electric Institute, Electric Power Research Institute, Independent System Operator/Regional Transmission Operator Coordinating Council, National Rural Electric Cooperative Association, National Association of Regulatory Utility Commissioners, National Association of State Energy Officials, and North American Transmission Forum Association. The views of the association representatives are not generalizable to the industry but provide valuable insight into the cybersecurity risks and challenges facing the grid. To identify grid cybersecurity vulnerabilities, we reviewed reports developed by key federal and nonfederal entities and others related to grid vulnerabilities and met with the key federal and nonfederal entities to understand the scale and complexity of these vulnerabilities. We also compiled DHS-provided advisories from 2010 through 2018 related to industrial control system devices. We then summarized information from the DHS website to determine how many DHS issued per year. With respect to the potential impact of cyberattacks, we reviewed cybersecurity incidents reported to DOE, DHS, and NERC from 2014 through 2018. We also asked these agencies for information on any cybersecurity incidents that occurred prior to 2014 or after 2018 that affected the reliability or availability of the grid. In addition, we reviewed federal reports on cyberattacks that caused power outages in foreign countries and a report developed by the German government regarding a cyberattack on industrial control systems that damaged a German steel mill. Further, we reviewed federal studies assessing the potential for widespread power outages resulting from cyberattacks, and we met with federal officials to discuss the methodologies used to perform these studies. Finally, to identify key cybersecurity challenges facing the grid, we reviewed our prior reports on such challenges as well as federal and industry reports recommended by entities we met with. We also asked the key federal and nonfederal entities to identify challenges facing grid entities in addressing cybersecurity risks, and we compiled the challenges they most often cited. To address the second objective, we identified critical infrastructure protection and regulatory actions that federal agencies are taking to address grid cybersecurity risks by reviewing federal strategies, plans, and reports describing activities that have been conducted or that are under way and by interviewing the key federal and nonfederal entities to obtain additional details on these activities. We also reviewed FERC- approved cybersecurity standards for the bulk power system. We then categorized critical infrastructure protection activities using the functions in NIST’s Framework for Improving Critical Infrastructure Cybersecurity (commonly referred to as NIST’s Cybersecurity Framework). For our third objective, we reviewed two DOE-led plans and one assessment aimed at implementing the federal cybersecurity strategy for the energy sector, including the grid. We then compared those plans and assessment with leading practices identified by GAO on key characteristics for a national strategy. In doing so, we assessed each characteristic as follows: fully addresses—the plan or assessment addresses all aspects of the characteristic, partially addresses—the plan or assessment addresses some but not all of the characteristic, or does not address—the plan or assessment does not address any aspects of the characteristic. We also provided our analysis to DOE officials to review, comment, and provide additional information. For our fourth objective, we compared the FERC-approved cybersecurity standards with leading federal practices for addressing critical infrastructure cybersecurity risks identified in NIST’s Cybersecurity Framework. Specifically, a GAO analyst compared the FERC-approved cybersecurity standards with the subcategories in the Cybersecurity Framework, and another GAO analyst reviewed and confirmed the results of that analysis. We then summarized the results of these assessments for each of the framework’s five functions, 23 categories, and 108 subcategories as follows: fully address—the standards address all of the related subcategories; substantially address—the standards address at least two-thirds, but not all, of the related subcategories; partially address—the standards address at least one-third, but less than two-thirds, of the related subcategories; minimally address—the standards address less than one-third of the do not address—the standards do not address any of the related subcategories. We also provided our analysis to FERC and NERC officials to review, comment, and provide additional information. We also examined the applicability of the FERC-approved cybersecurity standards to non-nuclear power plants and reviewed FERC and NERC information on the analytical basis for that threshold. To calculate the number and aggregate capacity of plants that met the 1,500-megawatt threshold for complying with all FERC-approved cybersecurity standards, we used data from Form EIA-860, “Annual Electric Generator Report,” which includes U.S. plants with generators having nameplate capacity of 1 megawatt or greater. As a proxy for the net real power capability specified in the standards, we selected the generator’s net summer generating capacity. To calculate a total capacity for each individual power plant, we combined the data on the capacity of each plant’s individual operating electric power generators. We then filtered these data to identify plants whose primary purpose is generating electricity for sale as reported on the Form EIA-860. Ultimately, we compared the number and capacity of non-nuclear plants exceeding the 1,500-megawatt threshold to the total number and total U.S. capacity for plants. We used U.S. Energy Information Administration (EIA) data to estimate the number and capacity of non-nuclear plants exceeding the 1,500- megawatt threshold. To assess the reliability of these data, we reviewed EIA documentation, discussed the quality of the data with EIA officials, and electronically tested the data set for missing data, outliers, or obvious errors. Based on this assessment, we determined that the EIA data were sufficiently reliable for our purposes. We conducted this performance audit from January 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The table below provides additional detail on our assessment of the extent to which Federal Energy Regulatory Commission (FERC)- approved cybersecurity standards address the National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity’s (commonly known as the NIST Cybersecurity Framework) 23 categories and 108 subcategories. ID.AM-1: Physical devices and systems within the organization are inventoried. ID.AM-2: Software platforms and applications within the organization are inventoried. ID.AM-3: Organizational communication and data flows are mapped. ID.AM-4: External information systems are catalogued. ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value. ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, and partners) are established. ID.BE-1: The organization’s role in the supply chain is identified and communicated. ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated. ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated. ID.BE-4: Dependencies and critical functions for delivery of critical services are established. ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations). ID.GV-1: Organizational information security cybersecurity policy is established and communicated. ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners. ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed. ID.GV-4: Governance and risk management processes address cybersecurity risks. ID.RA-1: Asset vulnerabilities are identified and documented. ID.RA-2: Cyber threat intelligence is received from information-sharing forums and sources. ID.RA-3: Threats, both internal and external, are identified and documented. ID.RA-4: Potential business impacts and likelihoods are identified. ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk. ID.RA-6: Risk responses are identified and prioritized. Risk Management Strategy (ID.RM): The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions. ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders. ID.RM-2: Organizational risk tolerance is determined and clearly expressed. ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector-specific risk analysis. Supply Chain Risk Management (ID.SC): The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support risk decisions associated with managing supply chain risk. The organization has established and implemented the processes to identify, assess, and manage supply chain risks. ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders. ID.SC-2: Suppliers and third-party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process. ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan. ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers. Identity Management Authentication and Access Control (PR.AC): Access to physical and logical assets and associated facilities is limited to authorized users, processes, and devices and is managed consistent with the assessed risk of unauthorized access to authorized activities and transactions. PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes. PR.AC-2: Physical access to assets is managed and protected. PR.AC-3: Remote access is managed. PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties. PR.AC-5: Network integrity is protected (e.g. network segregation and network segmentation). PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions. PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks). Awareness and Training (PR.AT): The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related cybersecurity duties and responsibilities consistent with related policies, procedures, and agreements. PR.AT-1: All users are informed and trained. PR.AT-2: Privileged users understand their roles and responsibilities. PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, and partners) understand their roles and responsibilities. PR.AT-4: Senior executives understand their roles and responsibilities. PR.AT-5: Physical and information security cybersecurity personnel understand their roles and responsibilities. PR.DS-1: Data-at-rest is protected. PR.DS-2: Data-in-transit is protected. PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition. PR.DS-4: Adequate capacity to ensure availability is maintained. PR.DS-5: Protections against data leaks are implemented. PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity. PR.DS-7: The development and testing environment(s) are separate from the production environment. PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity. PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality). PR.IP-2: A System Development Life Cycle to manage systems is implemented. PR.IP-3: Configuration change control processes are in place. PR.IP-4: Backups of information are conducted, maintained, and tested periodically. PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met. PR.IP-6: Data are destroyed according to policy. PR.IP-7: Protection processes are continuously improved. PR.IP-8: Effectiveness of protection technologies is shared with appropriate parties. PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed. PR.IP-10: Response and recovery plans are tested. PR.IP-11: Cybersecurity is included in human resources practices (e.g., deprovisioning and personnel screening). PR.IP-12: A vulnerability management plan is developed and implemented. Maintenance (PR.MA): Maintenance and repairs of industrial control and information system components are performed consistent with policies and procedures. PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools. PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access. PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy. PR.PT-2: Removable media is protected and its use restricted according to policy. PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities. PR.PT-4: Communications and control networks are protected. PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations. Anomalies and Events (DE.AE): Anomalous activity is detected and the potential impact of events is understood. DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed. DE.AE-2: Detected events are analyzed to understand attack targets and methods. DE.AE-3: Event data are aggregated, collected, and correlated from multiple sources and sensors. DE.AE-4: Impact of events is determined. DE.AE-5: Incident alert thresholds are established. Security Continuous Monitoring (DE.CM): The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures. DE.CM-1: The network is monitored to detect potential cybersecurity events. DE.CM-2: The physical environment is monitored to detect potential cybersecurity events. DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events. DE.CM-4: Malicious code is detected. DE.CM-5: Unauthorized mobile code is detected. DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events. DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed. DE.CM-8: Vulnerability scans are performed. Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure awareness of anomalous events. DE.DP-1: Roles and responsibilities for detection are well defined to ensure accountability. DE.DP-2: Detection activities comply with all applicable requirements. DE.DP-3: Detection processes are tested. DE.DP-4: Event detection information is communicated to appropriate parties. DE.DP-5: Detection processes are continuously improved. Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure response to detected cybersecurity events. RS.RP-1: Response plan is executed during or after an event. RS.CO-1: Personnel know their roles and order of operations when a response is needed. RS.CO-2: Incidents are reported consistent with established criteria. RS.CO-3: Information is shared consistent with response plans. RS.CO-4: Coordination with stakeholders occurs consistent with response plans. RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness. Analysis (RS.AN): Analysis is conducted to ensure effective response and support recovery activities. RS.AN-1: Notifications from detection systems are investigated. RS.AN-2: The impact of the incident is understood. RS.AN-3: Forensics are performed. RS.AN-4: Incidents are categorized consistent with response plans. RS-AN-5: Processes are established to receive, analyze, and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers). RS.MI-1: Incidents are contained. RS.MI-2: Incidents are mitigated. RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks. Improvements (RS.IM): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities. RS.IM-1: Response plans incorporate lessons learned. RS.IM-2: Response strategies are updated. Recovery Planning (RC.RP): Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events. RC.RP-1: Recovery plan is executed during or after a cybersecurity event. Improvements (RC.IM): Recovery planning and processes are improved by incorporating lessons learned into future activities. RC.IM-1: Recovery plans incorporate lessons learned. RC.IM-2: Recovery strategies are updated. RC.CO-1: Public relations are managed. RC.CO-2: Reputation after an event is repaired. RC.CO-3: Recovery activities are communicated to internal and external stakeholders as well as to executive and management teams. Legend: ●—Fully address: the standards address all of the related subcategories. ◕—Substantially address: the standards address at least two-thirds, but not all, of the related subcategories. ◑—Partially address: the standards address at least one-third, but less than two-thirds, of the related subcategories. ◔—Minimally address: the standards address less than one-third of the related subcategories.○—Do not address: the standards do not address any of the related subcategories. In addition to the contact named above, Kaelin Kuhn (Assistant Director), David Marroni (Assistant Director), Andrew Moore (Analyst in Charge), Dino Papanastasiou (Analyst in Charge), David Aja, Christopher Businsky, Kendall Childers, Travis Conley, Rebecca Eyler, Philip Farah, Jonathan Felbinger, Quindi Franco, Wil Gerard, Cindy Gilbert, Mike Gilmore, Andrew Howard, Paul Kazemersky, Lisa Maine, Carlo Mozo, Cynthia Norris, Sukhjoot Singh, Adam Vodraska, and Jarrod West made key contributions to this report.", "summary": "The nation's electric grid—the commercial electric power generation, transmission, and distribution system comprising power lines and other infrastructure—delivers the electricity that is essential for modern life. As a result, the reliability of the grid—its ability to meet consumers' electricity demand at all times—has been of long-standing national interest. GAO was asked to review the cybersecurity of the grid. Among other things, this report (1) describes the cybersecurity risks facing the grid, (2) assesses the extent to which DOE has defined a strategy for addressing grid cybersecurity risks, and (3) assesses the extent to which FERC-approved standards address grid cybersecurity risks. To do so, GAO developed a list of cyber actors that could pose a threat to the grid; identified key vulnerable components and processes that could be exploited; and reviewed studies on the potential impact of cyberattacks on the grid by reviewing prior GAO and industry reports, as well as interviewing representatives from federal and nonfederal entities. GAO also analyzed DOE's approaches to implementing a federal cybersecurity strategy for the energy sector as it relates to the grid and assessed FERC oversight of cybersecurity standards for the grid. The electric grid faces significant cybersecurity risks: Threat actors . Nations, criminal groups, terrorists, and others are increasingly capable of attacking the grid. Vulnerabilities . The grid is becoming more vulnerable to cyberattacks—particularly those involving industrial control systems that support grid operations. (The figure below is a high-level depiction of ways in which an attacker could compromise industrial control systems.) The increasing adoption of high-wattage consumer Internet of Things devices—“smart” devices connected to the internet—and the use of the global positioning system to synchronize grid operations are also vulnerabilities. Impacts . Although cybersecurity incidents reportedly have not resulted in power outages domestically, cyberattacks on industrial control systems have disrupted foreign electric grid operations. In addition, while recent federal assessments indicate that cyberattacks could cause widespread power outages in the United States, the scale of power outages that may result from a cyberattack is uncertain due to limitations in those assessments. Although the Department of Energy (DOE) has developed plans and an assessment to implement a federal strategy for addressing grid cybersecurity risks, these documents do not fully address all of the key characteristics needed for a national strategy. For example, while DOE conducted a risk assessment, that assessment had significant methodological limitations and did not fully analyze grid cybersecurity risks. One such key limitation was that the assessment used a model that covered only a portion of the grid and reflected how that portion existed around 1980. Until DOE has a complete grid cybersecurity plan, the guidance the plan provides decision makers in allocating resources to address those risks will likely be limited. The Federal Energy Regulatory Commission (FERC)—the regulator for the interstate transmission of electricity—has approved mandatory grid cybersecurity standards. However, it has not ensured that those standards fully address leading federal guidance for critical infrastructure cybersecurity—specifically, the National Institute of Standards and Technology (NIST) Cybersecurity Framework. (See table below for an excerpt of GAO's analysis of two of the five framework functions.) Without a full consideration of the framework, there is increased risk that grid entities will not fully implement leading cybersecurity practices. In addition, FERC's approved threshold for which entities must comply with the requirements in the full set of grid cybersecurity standards is based on an analysis that did not evaluate the potential risk of a coordinated cyberattack on geographically distributed targets. Such an attack could target, for example, a combination of geographically dispersed systems that each fall below the threshold for complying with the full set of standards. Responding to such an attack could be more difficult than to a localized event since resources may be geographically distributed rather than concentrated in the same area. Without information on the risk of such an attack, FERC does not have assurance that its approved threshold for mandatory compliance adequately responds to that risk. GAO is making three recommendations—one to DOE and two to FERC. GAO is making a recommendation to DOE to develop a plan aimed at implementing the federal cybersecurity strategy for the grid and ensure that the plan addresses the key characteristics of a national strategy, including a full assessment of cybersecurity risks to the grid. GAO is also making the following two recommendations to FERC: 1. Consider adopting changes to its approved cybersecurity standards to more fully address the NIST Cybersecurity Framework. 2. Evaluate the potential risk of a coordinated cyberattack on geographically distributed targets and, based on the results of that evaluation, determine if changes are needed in the threshold for mandatory compliance with requirements in the full set of cybersecurity standards. DOE and FERC agreed with GAO’s recommendations.", "document_type": "gao"}
{"report": "A series of laws and policy directives dating back to 1904 require DOD to rely in large part on U.S.-flag commercial ships over government-owned or foreign-flag ships for its sealift needs. More recently, a 1989 National Security Directive reaffirmed the policy of relying on U.S.-flag commercial ships to provide sealift in times of peace, crisis, and war. These requirements and policies align with the following principles from the Merchant Marine Act of 1936, as amended: A fleet of commercial ships with military utility that are owned and operated by U.S. citizens and are able to provide reliable support during difficult wartime missions is necessary for national defense. According to testimony by the Commander of U.S. Transportation Command (USTRANSCOM), during Operation Desert Shield, 7 percent of foreign-flag ships refused to go into war zones, whereas U.S.-flag ships continued to deliver cargo as promised. DOD officials we interviewed also noted that U.S. mariners have a history of providing outstanding support to the nation, but cited several situations in which civilian mariners refused to complete a government mission due to security concerns. A pool of trained U.S. mariners is needed to crew the U.S.-flag fleet. According to USTRANSCOM and MARAD, U.S. mariners are necessary to crew not only the U.S.-flag commercial ships but also the U.S. government-owned reserve cargo ships. When put into full operating status—such as for a surge related to a wartime effort—the government needs additional trained and qualified mariners to operate these U.S. reserve cargo ships. U.S.-flag commercial ships, which are required to be staffed by U.S.-citizen mariners, provide a pool of mariners who can be used for this task. Because mariners work on ships for months at a time, commercial ships typically have at least two full sets of mariners to crew a single ship—one set of which is on the ship while the other is on leave. In times of crisis, one set of mariners could continue to work on the commercial ship, while some of those on leave could be called upon to voluntarily crew ships in the government-owned reserve fleet. A U.S. presence in international trade is needed to carry goods overseas. According to MARAD, a U.S. presence in international trade helps ensure that both commercial shippers and the military can access ships, and associated transportation networks, to carry their goods overseas at all times, both in times of peace and in times of war. The U.S. government financially supports oceangoing U.S.-flag ships in two key ways: (1) Maritime Security Program (MSP) stipends and (2) cargo preference requirements. Maritime Security Program: Since fiscal year 1996, the MSP has provided an annual stipend set by statute, subject to annual appropriations, to support a specific number of internationally trading U.S.-flag ships. In return for receiving the stipend, the MSP ship operator agrees to keep the ship or an equivalent ship under the U.S. flag for the life of the MARAD-issued operating agreement, and enrolled in a Voluntary Intermodal Sealift Agreement. By statute, the MSP is to enroll no more than 60 ships and provide each with a stipend of $5 million annually in fiscal years 2018-2020, subject to the availability of appropriations. The MSP was designed as a less costly replacement for the Operating Differential Subsidy that, since 1936, had subsidized the higher operating costs of the U.S.-flag fleet compared to foreign-flag ships operating on similar routes and trades. The MSP currently covers approximately 71 percent of the average annual operating cost differential between U.S. and foreign-flag ships, although this share varies across ships in the MSP, according to DOT’s estimates. The other key way that these ships can make up the operating cost differential is by carrying government cargo under cargo preference requirements. Cargo Preference: A series of laws requires federal agencies to transport some portion of their cargo on U.S.-flag ships, to the extent such ships are available at fair and reasonable rates. For example, current law requires that 100 percent of military cargo be transported on U.S.-flag ships, unless the rates are found by the President to be excessive or otherwise unreasonable. According to a 2015 MARAD report, DOD accounts for 59 percent of total government cargoes. For non-military cargo, including food aid, current law requires federal agencies to transport a minimum of 50 percent of their cargo on privately owned U.S.-flag commercial ships. Federal agencies can meet cargo preference requirements by transporting cargo on any privately owned U.S.-flag commercial ships, including those in the MSP. As we reported in 2018, federal stakeholders have differing views on cargo preference requirements. On the one hand, these requirements result in higher shipping costs for food aid agencies, costs that agency officials said negatively affect their missions. On the other hand, these requirements help support the financial viability of U.S.-flag ships by helping to offset the cost differential between U.S.-flag and foreign-flag ships. According to the 2015 MARAD report, the higher freight rates that DOD and other federal agencies pay to transport government cargo on U.S.-flag ships are critical to the financial viability of U.S.-flag ships in international trade, including MSP ships. In addition, the law commonly referred to as the Jones Act generally requires that maritime transport of cargo between points in the United States be carried by ships that are owned by U.S. citizens, registered under the U.S.-flag, and built in the United States. One of the purposes of the Jones Act is to provide the nation with a strong domestic maritime industry that can serve as a naval or military auxiliary in time of war or national emergency. As of August 2019, there were 99 oceangoing ships operating domestically (i.e., in the Jones Act fleet), according to MARAD data. We reported in 2013 that the effect of any potential modifications to the Jones Act on the U.S.-flag maritime industry would be uncertain. While repealing the Jones Act could increase competition with foreign-flag ships and reduce costs for shippers, it could also affect the reliability of the industry and have a negative effect on the U.S.-flag maritime industry and national security. DOT, DOD, and the Department of Homeland Security, among others, play a key role in federal policy related to the U.S.-flag maritime industry. Specifically: DOT, through MARAD, is the primary federal agency responsible for federal policy in support of the industry. DOT administers the MSP in consultation with DOD, provides funding to federal and state maritime academies, provides financial assistance to shipyards, and maintains a fleet of 56 government-owned cargo ships in reserve to provide sealift during war and national emergencies. DOD, through USTRANSCOM, jointly administers the MSP with DOT, and uses the U.S.-flag maritime industry to meet its sealift needs. DOD also maintains a fleet of 15 government-owned ships in reserve to provide sealift during war and national emergencies. We refer to DOT’s and DOD’s fleets together as the government-owned reserve fleet. The Department of Homeland Security, through the U.S. Coast Guard, oversees and regulates the U.S. maritime industry and marine transportation system. This includes overseeing and approving merchant mariner training programs, credentialing U.S. merchant mariners, documenting U.S.-flag ships, and maintaining the U.S, registry, among other functions. The Department of Agriculture and United States Agency for International Development administer multiple international food-aid programs. Under cargo preference requirements, they must use the U.S.-flag maritime industry to transport at least 50 percent of their government cargo when U.S.-flag ships are available at fair and reasonable rates. Since 2014, DOT has been required by law to develop two strategies: one to address industry challenges and the other to ensure the viability of U.S. sealift capability. First, the Howard Coble Coast Guard and Maritime Transportation Act of 2014 mandated that DOT, in consultation with U.S. Coast Guard, submit a national maritime strategy to Congress by February 2015. The law mandated that this strategy: Identify federal regulations and policies that reduce the competitiveness of the U.S.-flag maritime industry. Provide recommendations to make the fleet more competitive in international trade. Enhance U.S. shipbuilding capacity. In January 2018, the John S. McCain National Defense Authorization Act for Fiscal Year 2019 provided a new deadline of February 2020 for this strategy to be submitted. The second strategy, due in April 2014 and mandated by the Consolidated Appropriations Act of 2014, was to develop a national sealift strategy in collaboration with DOD to ensure the long-term viability of the U.S. Merchant Marine. This act additionally required DOT to identify the impact of reduced cargo preference requirements. DOT plans to submit a single maritime strategy to meet both these 2014 mandates. DOT completed a draft national maritime strategy that went through OMB interagency review in 2016. However, DOT did not finalize this strategy and submit it to Congress prior to the change in presidential administration. In August 2018, we recommended that DOT complete the strategy and publish a timeline for finalizing the strategy. DOT agreed to implement our recommendation. The U.S.-flag maritime industry faces an array of challenges that could negatively affect national defense. Federal assessments, as well as the federal officials we interviewed, underscored that the industry is critical to national defense, and that some potential sealift needs could be difficult for the U.S. industry to meet. All 10 of the industry stakeholders we interviewed identified at least one challenge related to each of the three broad sectors of the industry: (1) ships, (2) shipyards, and (3) mariners. Ships. Seven of the 10 stakeholders we interviewed expressed concern that declines in the size of the U.S.-flag fleet could lead to shortfalls in overall capacity or number of certain types of ships needed to carry defense cargo. Defense officials we interviewed and recent DOD needs assessments indicated that the current internationally trading U.S. fleet was generally sufficient to meet current needs but also raised some concerns about potential future gaps in certain situations. For example, the current U.S.-flag internationally trading fleet has 6 petroleum tankers—down from 36 in 1990—and USTRANSCOM has estimated potential needs for 86 tankers to fulfill DOD sealift requirements under the National Defense Strategy. Currently, according to USTRANSCOM officials we interviewed, U.S.-flag tankers and tankers flagged in other countries currently meet DOD needs, but these officials stated that access to allied foreign-flag petroleum tankers is increasingly uncertain in the current geo-political environment. Likewise, roll on/roll off ships (commonly referred to as Ro-Ros because it is possible to drive vehicles on and off the ships) are essential to move military vehicles, and DOD officials we interviewed stated they currently have assured access to roughly 3.5-million square feet of commercial capacity, which just meets current needs. A recent DOD analysis estimated 3.9 million square feet of Ro-Ro capacity will be needed in 2023. Seven of the stakeholders we interviewed raised concerns about limits in the overall capacity or a mismatch between the types of ships most needed for defense and those needed for commerce. Additionally, three stakeholders added that the Jones Act fleet—which is larger than the U.S.-flag fleet of internationally trading ships and also includes ships with sealift capabilities—would likely not be available in a time of crisis without significant disruption to U.S. domestic trade. Shipyards. Seven of the 10 stakeholders we interviewed expressed concerns about declines in U.S. shipyard capacity. According to MARAD and DOD officials, U.S. shipyards are an important part of ensuring government-owned cargo ships can be fully activated. According to a USTRANSCOM official, a shortage of shipyard capacity has contributed to increasing repair time for the government reserve fleet. In August 2017, we reported that incidents of degraded or out of service equipment in the government reserve fleet had increased over the previous 5 years. According to two stakeholders that operate U.S.-flag ships, U.S.-flag carriers are also experiencing maintenance delays at U.S. shipyards. For example, a representative of one U.S.-flag international carrier stated that it has difficulties scheduling needed work in a timely manner in the United States. In the face of these difficulties, as well as other business considerations, international ocean carriers may turn to foreign shipyards for repair services. Currently, according to MARAD, in April 2019, there were nine active shipyards in the United States with facilities capable of building large commercial ships. MARAD officials noted that while the domestic tug and barge industry is doing well, the side of the industry building large, self-propelled oceangoing ships is struggling due to declines in new orders. One stakeholder observed that U.S. shipyards are building very few new ships and noted that the industry could lose additional capacity in the coming years without a stream of new orders. Three stakeholders also expressed concern that shipyard workers have lost some of the necessary skills to support oceangoing commercial ships. Mariners. Nine of the 10 stakeholders we interviewed identified potential gaps in the skills or availability of U.S. citizen mariners. Likewise, federal officials we interviewed, as well as a recent government study, indicated there could be too few mariners to support sustained military sealift operations. When put into full operating status—such as for a surge related to a wartime effort—the government’s reserve fleet needs additional crew, and DOD counts on mariners working on oceangoing U.S.-flag ships to meet this need. MARAD and DOD have raised concerns about the sufficiency of U.S.- citizen mariners to meet this need. For example, in September 2017, in a statutorily mandated report, MARAD’s Maritime Workforce Working Group estimated a shortage of over 1,800 mariners in the event of a drawn-out military effort, although it also recommended data improvements to increase the accuracy of the count of available mariners. USTRANSCOM officials we interviewed added that they are concerned with not only the total number of mariners but also their specific mix of skills. Similarly, five stakeholders we interviewed identified potential mariner skills gaps because the U.S.-flag commercial fleet has modernized more quickly than the government- owned reserve fleet, so U.S.-citizen mariners in the commercial sector may lack experience with the technologies used on aging government-owned ships. Four stakeholders specifically noted potential shortages in mariners qualified to operate the 26 steam- powered ships that are in the government-owned reserve fleet, noting this older technology is no longer common on commercial ships. Seven stakeholders we spoke with stated that fleet and cargo reductions have led to fewer opportunities to crew ships, limiting career development paths for mariners. Current federal actions to address industry challenges and meet defense needs include administering long-standing policies and programs as well as studying underlying issues, rather than new efforts to confront these challenges. Established federal policies and programs—including the MSP, cargo preference requirements, and the Jones Act, among others— have not markedly changed in recent years. Officials explained that within the existing statutory framework, they have tried to better align the MSP fleet with defense needs. For example, within the last 2 years, they enrolled three roll on/roll off ships that provide a net increase in square- footage compared to the ships they replaced, among other improvements. Cargo preference requirements, also, have largely remained the same since 2012. MARAD has made efforts to better ensure these requirements are understood and followed by federal contracting officers, contractors, and sub-contractors who make shipping decisions and are supposed to abide by these requirements. Specifically, MARAD has developed training on cargo preference and conducted outreach to various agencies and industries. Further, agencies have taken other actions to improve existing programs in ways that could aid defense. These actions include initiatives to make it easier for veterans to earn merchant marine credentials and bureaucratic improvements to speed the process to flag a ship in the United States. Five of the 10 stakeholders we interviewed noted that these established policies and programs, collectively, are vital to the U.S.-flag maritime industry. Four stakeholders emphasized that the internationally trading U.S.-flag industry is supported by three sources of revenue—MSP stipends, government cargo, and commercial cargo—and stated that reductions in any of these three sources would likely cause further declines in the international-trading fleet. Similarly, an industry organization representing Jones Act carriers and a representative of a shipyard that builds ships for the fleet emphasized that the legal requirements for domestic shipping were essential to the viability of the fleet. In recent years, MARAD and other key federal agencies with maritime roles have focused on studying the industry and recent trends. DOT and DOD officials we interviewed identified several recent and ongoing efforts (see table 1). Currently, in response to a recommendation in the previously mentioned Maritime Workforce Working Group report, MARAD has begun a new effort to survey mariners to determine the number who are qualified, available, and willing to serve on short notice on U.S. government-owned sealift ships or commercial ships in times of national emergencies or to meet defense sealift needs. At this early date, DOT does not have specific plans for how to use the information gathered to change programs or practices. Likewise, USTRANSCOM regularly studies DOD’s sealift needs, through formal studies, ongoing cargo forecasts, and drills. For example, the Mobility Capabilities and Requirements Study of 2018 assessed the ability of mobility forces— including sealift capacity—to accomplish wartime missions as delineated in the 2018 National Defense Strategy based on anticipated fiscal year 2023 fleet capabilities and capacities. This study updated a similar study completed in 2010. Federal agencies have taken limited actions to address challenges industry stakeholders have identified, and the effects of those actions are unclear. For example, in addition to procuring or repairing ships as a customer, MARAD administers the small-shipyard grant program to provide cash support to sustain some shipyard capacity. MARAD officials we interviewed explained that while this grant program focuses on shipyards that tend to be too small to serve larger commercial ships needed to support defense sealift, it does help maintain the shipyard workforce. Similarly, the effect on carriers of U.S. food aid shipments is ambiguous in light of recent budget uncertainties. For example, officials we interviewed at the Department of Agriculture did not have estimates of food-aid cargo volumes beyond current appropriations because recent budget proposals from the administration have proposed eliminating much of the funding for these programs. According to 7 of the 10 stakeholders we interviewed, federal actions have not adequately addressed industry challenges, and many expressed concern that defense needs are at risk because of certain weaknesses in the federal approach. For example, four stakeholders noted that MARAD’s strategy to operate its fleet of government-owned reserve cargo ships in reduced operating status limits the opportunities for U.S.- citizen mariners to get experience on these ships, which may require distinct skills to operate (e.g., steam engines). Five stakeholders worried that federal actions were not working toward a common purpose or spurring industry innovation. Seven stakeholders stated that a comprehensive national strategy is needed to ensure, for example, that federal actions are working toward common goals to support the industry and are concerned that DOT had not yet submitted such a strategy, despite working on one since 2014. After a stalled strategy development process that did not include key stakeholders, in September 2019 DOT established a new interagency working group to finalize the strategy prior to the February 2020 deadline. Since 2017, the draft national maritime strategy, initially completed in 2016, has gone through three subsequent phases of development—DOT revision, OMB’s interagency review, and a renewed interagency working group. However, key federal agencies were omitted from DOT’s revisions and OMB’s interagency review. In September 2019, DOT formed a new interagency working group through the Committee on the Marine Transportation System (CMTS), an established interagency group for improving federal coordination and policies that affect the marine transportation system, as a way to bring key federal stakeholders together to finalize the strategy. DOT’s strategy revision. In 2017, the new administration instructed DOT to revise the existing draft strategy—which had been completed but not submitted to Congress under the prior administration—to align with its priorities. These priorities included DOD’s revised National Defense Strategy. Whereas DOT had held symposiums of maritime industry stakeholders and a broad array of federal agencies in 2014 when developing the initial draft strategy, DOT’s efforts to revise the strategy in 2017 and 2018 did not include substantive coordination activities with industry or other federal agencies. Subject matter experts within DOD reported to us in June 2019 that they had not seen a draft of the strategy since they provided comments during the OMB interagency review process that occurred in 2016. In addition, these DOD officials were unaware that the strategy was under revision. Similarly, in June and July 2019, officials at the Department of Homeland Security and subject matter experts within the U.S. Coast Guard told us they had not been consulted during the revision of the strategy since 2017. Accordingly, the largest government user of the U.S. flag fleet—DOD—and the agency overseeing credentialing of the U.S. Merchant Marine—the U.S. Coast Guard—were not able to provide input to DOT on revisions to the strategy mandated to ensure the long term viability of the U.S.-flag maritime industry. DOT officials we interviewed cited two main reasons for not engaging in new outreach and coordination specific to the revision of the strategy. First, they stated that the input they received in 2014 remained relevant as the challenges facing the industry have remained consistent. Moreover, DOT officials stated they are in regular contact with other federal agencies about maritime topics in general and, therefore, had a good understanding of these agencies’ positions. As a result, DOT officials told us they did not expect that the input they would receive from renewed outreach would be different from what they received in 2014. While DOT did not engage in substantive coordination during the strategy’s revision, it did provide status updates to some stakeholders on the progress of the strategy. For example, during a June 2018 meeting of the Marine Transportation System National Advisory Committee, DOT officials briefed industry representatives and participating federal agencies on the status of the strategy. During this briefing, DOT officials stated that the strategy had “undergone extensive revisions since 2015…but the vision, mission, and guiding principles are largely the same,” with the strategy refocused on areas where DOT plays a lead or major role. DOT officials stated this meeting afforded participants an opportunity to comment on topics germane to the strategy. DOT, however, did not circulate a draft of the strategy at this meeting, and so substantive reviews of the draft’s content were not possible. In August 2018, DOT completed its revisions and submitted the draft strategy to OMB for interagency review. OMB’s interagency review process. After receiving the revised strategy from DOT, OMB staff initiated the interagency review process. In August 2018, OMB staff sent the strategy to 12 federal agencies and 2 policy councils in the Executive Office of the President, according to OMB staff. DOT officials did not provide input to OMB on which agencies should review the strategy. According to DOT officials, they do not typically provide this type of input. We inquired with all 12 agencies and both councils whether they received the strategy from OMB and provided comments. As of September 2019, officials at six agencies or councils confirmed they had received the strategy in August 2018, and relevant officials at five agencies stated they did not have records of receiving the strategy. OMB staff we interviewed emphasized that it is the responsibility of each agency to make sure the strategy is provided to the right people within the agency. OMB did not include the Department of Agriculture, a major shipper of food aid, in the interagency review process, and Department of Agriculture subject matter experts told us they were not consulted by DOT during the revision of the strategy. Shortly after circulating the draft strategy, OMB suspended the interagency review process following a request from the EOP. According to OMB staff, in August 2018, an EOP policy council planned to convene a Policy Coordination Committee to address policy questions related to the strategy. As a result, OMB did not pass on the interagency comments it had already received to DOT, but instead provided those comments to the EOP policy council. According to DOT officials, OMB did not inform them that OMB had halted the interagency review process at the request of the EOP policy council. According to DOT officials, the process remained suspended until September 2019, when DOT officials learned from OMB staff that this committee had not and would not convene on the draft national maritime strategy. Furthermore, these DOT officials told us that until September 2019, when we informed them that OMB had suspended the process, they had been unaware that any such committee had been under consideration. Moreover, they indicated DOT had not worked with any EOP policy councils to resolve policy questions or concerns during that time. Likewise, DOD officials we interviewed also were unaware of any Policy Coordination Committee related to the strategy and had not worked with any EOP policy councils to resolve policy questions or concerns. As a result, from approximately September 2018 to September 2019, DOT was not working to advance the strategy, according to DOT officials we interviewed, nor did the OMB interagency process provide DOT with input from other agencies. Renewed interagency working group. Following our inquiries about both DOT’s and OMB’s interagency collaboration, in September 2019, DOT formed an interagency working group to finalize the strategy. According to DOT officials, following discussions with OMB, they understood that DOT could renew its efforts to finalize the strategy. According to DOT officials, DOT determined that the CMTS was the best forum for this finalization to occur. DOT officials explained the purpose of the working group is to receive substantive input from other agencies, fine tune the content of the strategy, and coordinate final edits. DOT officials told us the working group is open to any member of CMTS that elects to participate. Officials with CMTS we interviewed told us that it functions as an interagency forum for policy discussion and coordination, at the discretion of member agencies, and can help address issues that cut across multiple agencies. As of October 2019, participating agencies in the CMTS working group included DOT, OMB, DOD, and the Department of Homeland Security, among other agencies with maritime roles and responsibilities relevant to the strategy. DOT officials expected the working group to complete its work by the end of November 2019. After that time, DOT plans to send the strategy to OMB for an additional round of interagency review and clearance and to submit the finalized strategy to Congress. DOT officials stated the department remains committed to meeting the deadline to submit a finalized strategy by the February 2020 deadline. See figure 1 for the timeline of these three phases of development. Our previous work has found that national strategies are a mechanism for interagency collaboration, and that accordingly they can be used to address a range of purposes, including policy development and program implementation. We also found that collaborative mechanisms benefit from certain leading practices, including ensuring that all relevant participants have been included. These participants should have full knowledge of the relevant resources in their agency, the ability to commit those resources, and the knowledge, skills, and abilities to contribute to the collaborative effort. In addition, OMB guidance states that prior to submitting a document to OMB for interagency review, the submitting agency should make intensive efforts to reach agreement on policy issues in areas where there is overlapping interest between agencies. Since 2017, and throughout DOT’s revision of the strategy and the OMB interagency review initiated in 2018, key federal agencies and personnel were not included in the strategy’s development and lacked opportunities to provide their input on the strategy at that time. Without these agencies’ input, DOT did not have assurance that the strategy incorporated the agencies’ expertise or the most up-to-date information relevant to the strategy, including on DOD’s most recent sealift needs and priorities. Given the interconnected nature of maritime issues and the breadth of the statutory requirements for DOT to address in the strategy, including provisions that call for collaboration with DOD, interagency collaboration is an important step toward developing an effective national strategy. DOT’s work with the CMTS interagency working group should help ensure such collaboration and the input of key stakeholders that had previously not contributed to the revision of the strategy. In light of this new effort and our prior recommendation in 2018 that DOT complete and finalize the strategy, we are not making a new recommendation in this report. We provided a draft of this report to DOD, OMB, DOT, and the Department of Homeland Security for review and comment. DOD, DOT, and the Department of Homeland Security provided technical comments, which we incorporated as appropriate. OMB told us that they had no comments on the draft report. We are sending copies of this report to the appropriate congressional committees, Secretaries of Transportation, Defense, Homeland Security, and Director of OMB and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the individual named above, Alwynne Wilbur (Assistant Director); John Stambaugh (Analyst in Charge); David Blanding; Lilia Chaidez; Emil Friberg; Geoffrey Hamilton; Dawn Hoff; Diana Maurer; Jan Montgomery; Valerie Nowak; Josh Ormond; Molly Ryan; Travis Schwartz; Sarah Veale; Michelle Weathers; and Suzanne Wren made key contributions to this report.", "summary": "DOT's efforts related to a national maritime strategy aimed at helping to ensure the sustainability and competitiveness of the U.S.-flag fleet were first mandated in statute in 2014. In 2018, the due date for the national maritime strategy was extended to February 2020. A provision in statute directed GAO to identify the challenges facing the U.S. maritime industry and the status of the national maritime strategy. This report (1) identifies selected stakeholders' views on the key national defense implications of the challenges facing the U.S. maritime industry, among other things, and (2) examines the status of the national maritime strategy and the extent to which DOT coordinated the strategy's development with relevant federal agencies. GAO reviewed relevant laws and analyzed DOT and DOD documents related to the U.S. flag fleet. GAO also interviewed: (1) staff in the Executive Office of the President, including OMB, and (2) officials in DOT, DOD, and other federal agencies as well as selected industry stakeholders. Interview selections were based on a range of factors to gather different perspectives across the industry and results are not generalizable to all industry stakeholders. Selected stakeholders identified some key national defense implications of the challenges facing the U.S. maritime industry. This industry—which includes oceangoing U.S.-registered (i.e., U.S.-flag) ships and U.S. citizen mariners—provides global transportation capabilities to the Department of Defense (DOD) in times of peace, crisis, and war. The Department of Transportation (DOT), in cooperation with DOD and other federal agencies, is responsible for federal programs to ensure that this industry meets defense needs. Stakeholders, as well as DOD officials, cautioned that continued declines in the size and capabilities of the oceangoing U.S.-flag fleet could lead to inadequate capacity for DOD to transport military cargo during a national defense crisis. Likewise, a potential shortage of mariners could lead to DOD not having adequate crews to operate government-owned reserve ships that may be activated during a wartime surge. Seven of the 10 industry stakeholders GAO interviewed stated that a comprehensive national strategy could help address industry challenges. After a stalled strategy development process that did not include key stakeholders, DOT established a new interagency working group, in September 2019, to finalize the national maritime strategy. DOT has been working on a draft strategy since 2014 to address statutory mandates. In 2017, DOT began revising the draft strategy to align with the new administration's priorities. Interagency coordination, however, was limited as DOT did not include DOD or other key federal stakeholders. In August 2018, DOT submitted the revised draft to the Office of Management and Budget (OMB) for interagency review. OMB staff told GAO they circulated this draft to 12 agencies and two policy councils in the Executive Office of the President. However, according to OMB staff, OMB suspended this process shortly after it began at the request of the Executive Office of the President because of its plans to convene a committee to consider policy matters related to the strategy. According to DOT officials, the process remained suspended until DOT learned in September 2019 that the Executive Office of the President had not convened and no longer planned to convene such a committee. DOT then established a new interagency working group to revise and finalize the strategy, ending a year-long delay in the strategy's development (see figure). This working group includes DOD and other key agencies that were not previously consulted and should address gaps in interagency coordination. DOT officials told GAO that they intend to submit the strategy to Congress by February 2020, as required.", "document_type": "gao"}
{"report": "The NDAA requires DHS to develop and implement 43 border security metrics in four domains—between POEs, at POEs, the maritime border, and air and marine security in the land environment. Within DHS, CBP and the Coast Guard have primary responsibility for border security within these four domains. CBP and its subcomponents are to secure U.S. borders at and between POEs by preventing inadmissible people and illicit goods from entering the United States, among other responsibilities. Within CBP, the primary offices and components involved in border security are the Office of Field Operations at POEs, Border Patrol between POEs, and Air and Marine Operations for air and marine security in the land and maritime domains. The Coast Guard and CBP’s Air and Marine Operations share responsibility for security of the nation’s maritime borders. Table 1 shows examples of border security metrics by domain and responsible DHS component. According to DHS officials, within DHS, two subcomponents within the Office of Strategy, Policy, and Plans were responsible for coordinating the department’s effort to develop the fiscal year 2017 Border Security Metrics Report. A senior DHS official explained that the report was initially tasked to the Unity of Effort Integration Office, which was part of the Unity of Effort initiative started in 2014 to better understand border security efforts along the southwest border including exploring the development of border security metrics. OIS assumed responsibility for the report in 2017. According to OIS officials, to prepare the report, they obtained data and information related to each NDAA metric from the administrative records of the DHS components with primary responsibilities for border security in the four domains. For example, OIS requested data and information on “turn backs” and “got aways” from Border Patrol—the lead component for the between POE domain—which records sector estimates of turn backs and got aways based on direct and indirect observations. Of the 43 metrics the NDAA listed for inclusion in the Border Security Metrics Report, the majority were counts and rates of border security activities. The remaining metrics were estimates or were not specifically described. For example, the number of apprehensions in each Border Patrol sector is a count metric. In contrast, a rate metric compares one value or number against another. For example, the wait time ratio compares the average wait times to total commercial and private vehicular traffic volumes being processed at a land POE. An estimate is used for metrics of flows or activities that are largely undetected and therefore cannot be measured directly and must be estimated, such as the number of undetected unlawful entries. A few metrics are a combination of counts or rates with an estimate. For example, the metric for total inadmissible travelers at POEs counts known inadmissible travelers that are intercepted at POEs, and also requires an estimate of how many inadmissible travelers may have successfully entered at a POE without being detected, which cannot be directly measured. The NDAA did not specifically describe some metrics. For example, while the NDAA asked for an examination of each of the eight consequences under the Consequence Delivery System, it did not specify how this examination was to be carried out or what it was to include. While many of the metrics required by the NDAA can be addressed with data from DHS’s administrative records, certain metrics that rely on estimates necessitate the use of alternative methodologies and in some cases, specialized technical expertise. For example, DHS contracted with the Institute for Defense Analyses to assist with the development of a statistical model for estimating undetected unlawful entries. In its fiscal year 2017 Border Security Metrics Report, DHS provided information on its methodological approaches, such as how it estimated undetected unlawful entries. In its first Border Security Metrics Report, DHS reported information on 35 of the 43 metrics called for by the NDAA. The metrics DHS provided spanned the four domains outlined in the NDAA and included a mix of counts, rates, estimates, or a combination thereof as shown in figure 1. For 18 of the 35 border security metrics DHS included in its report, we found DHS generally included elements listed in the NDAA. For example, the NDAA asked for the number of detected unlawful entries between POEs, and in its report DHS provided information on the number of detected unlawful entries over a 10-year period. As another example, the NDAA asked for the number of cargo containers at sea ports that were identified to be potentially high-risk. In response, DHS provided information on the number of potentially high-risk containers from fiscal years 2013 through 2016 and also provided contextual information about trends in the volume of such containers over time. See table 2 for more information on these examples as well as other examples of the types of information included in DHS’s fiscal year 2017 Border Security Metrics Report. For some metrics, DHS also provided information in addition to the elements listed in the NDAA. For example, the NDAA described the “AMO apprehensions assisted” metric as a count of the number of apprehensions that were assisted by CBP’s AMO through the use of unmanned aerial systems and manned aircraft. In addition to the counts for such assists, DHS also provided data on the flight hours expended to assist with these apprehensions. For 17 of the 35 reported metrics, we identified differences between the metric as described by the NDAA and as reported by DHS. The differences we identified generally fell into two categories: Metric differed in scope or calculation. Some of the metrics DHS reported on differed in scope or in their calculation from what the NDAA described for reasons such as data availability, among other factors. For example, DHS’s fiscal year 2017 Border Security Metrics Report scoped three metrics on unlawful border crossings between POEs (the “attempted unlawful border crosser apprehension rate,” the “estimated undetected unlawful entries,” and the “probability of detection rate”) to only include data for the southwest border. In these instances, the report noted that a methodology for estimating data on unlawful crossings for the northern border had not yet been completed but that research was underway to do so. As an example of a difference in calculation, DHS presented the interdiction effectiveness rate for each southwest border sector as an alternative to the metric “unlawful border crossing effectiveness rate in each Border Patrol sector.” According to DHS’s report, the department used the interdiction effectiveness rate because it had not yet produced and validated sector-level estimates of unlawful entries required to calculate the unlawful border crossing effectiveness rate. In its report, DHS stated it expects these estimates to be available for the 2019 report. Alternative metric provided. For the situational awareness in the maritime environment metric, DHS stated that it is in a multi-year process to develop a metric that meets the intent of the NDAA. As an alternative, DHS instead provided data on the number of aircraft and vessel operational hours that contributed to maritime domain situational awareness. See appendix I for additional information about any differences we identified for each metric. The eight metrics on which DHS did not provide information spanned all four domains. In its report, DHS explained that the eight omitted metrics were either still in development, under review within the department, or officials were in the process of collecting data for them. Table 3 lists the eight metrics on which DHS did not provide information and the date DHS estimated it will report on each metric. In general, DHS components responsible for collecting the data used in the metrics DHS reported have processes to help ensure the reliability of the data and the quality of the information provided. DHS also identified and disclosed limitations with some of the data elements or methodologies used for the metrics in its report. However, DHS does not have a systematic process for reviewing the reliability of data to identify limitations related to the metrics, and we identified at least one additional limitation for 21 of the 35 metrics on which DHS reported where DHS did not disclose such limitations or could have been more transparent about the limitations or assumptions in its report. Data are considered reliable when they are reasonably free from error and bias. Quality information is derived from relevant and reliable data and is considered to be, among other things, complete, accurate, and timely. The specific processes DHS components use to ensure data reliability vary from metric to metric. Examples of processes DHS or its components have implemented to help ensure the reliability of the data and the quality of information provided include: Issuing guidance and monitoring implementation. In September 2012, Border Patrol headquarters officials issued guidance to help provide a more consistent, standardized approach for the collection and reporting of turn back and got away data by Border Patrol sectors. Each sector is individually responsible for monitoring adherence to the guidance. According to DHS’s report, command staff at Border Patrol stations ensure agents are aware of and utilize proper definitions for apprehensions, got aways, and turn backs at their respective stations and also ensure that the necessary communication takes place between and among sectors and stations to minimize double-counting when subjects cross over multiple areas of responsibility. Supervisory reviews of data entries. With regard to data on AMO vessel and aircraft missions, AMO guidance mandates that supervisors perform a review of all pre- and post-mission data entries to help ensure accurate entry of mission information. AMO officials confirmed that supervisors review the data being entered into the database. Additionally, officials said AMO data teams run monthly validation checks of data entered to check for completeness and accuracy, such as out-of-range values. Using built-in electronic safeguards. CBP’s databases for entering and maintaining data elements—including travelers or passengers seeking admission, known inadmissible aliens at POEs, referrals for secondary examinations, major infractions, and private vehicles processed at a POE—have built-in processes to detect and prevent potential data entry errors. More specifically, as an officer enters a record, the systems check for valid entries into relevant fields and provide an error message to the officer for entries that appear to be invalid (e.g., if an officer leaves a mandatory field blank or enters contradictory information such as charging an individual with a crime while also entering a request for expedited removal). In some cases, the systems will prevent a record from being saved if any required fields are blank. Comparing data against other sources. As part of the Coast Guard’s data reliability processes for data on maritime migrant interdictions used in the “known maritime migrant flow rate” metric, Coast Guard officials said that analysts cross-check the data entered into their database with other Coast Guard reporting documents, such as internal spreadsheets, to ensure accuracy. Independent assessment of performance measure data. Some border security metrics are similar to, or use the same data elements as, performance measures DHS reports annually in response to the Government Performance and Results Act Modernization Act (GPRAMA) of 2010. For those performance measures, DHS annually assesses a subset of measures and their data for completeness and reliability using independent review teams. For example, in May 2017 an independent review team assessed the “migrant interdiction effectiveness in the maritime environment” performance measure, which uses the same data as the border security metric, “known maritime migrant flow rate.” The review team found the measure to be complete and reliable and the data to be of good quality overall, but also recommended that the Coast Guard and DHS continue work on an improved database to enhance the consistency of data collection, among other things. In addition to the components having processes to help ensure the reliability of the data and the quality of the information used in the report, DHS took steps to be transparent in its presentation of the metrics by identifying and disclosing known limitations with some of the data elements or methodologies used for the metrics in its report. Communicating the extent to which such limitations exist and their potential impact is important to help facilitate the appropriate use and understanding of the data and the metrics. DHS identified and disclosed limitations related to the potential for misclassification of observations, the potential for cases not being entered or recorded correctly, and methodological limitations, among other things. For example, one of the key limitations DHS’s report identified for the data on turn backs and got aways is that they are based on potentially subjective observations of agents who have to make a determination on how to classify them based on what they observed or the available evidence (e.g., tracks, sensor activations, interviews with apprehended subjects, camera views, etc.). Further, DHS’s report explained that agents may face challenges in making that determination because some unlawful border crossers may enter the United States to drop off drug loads or to act as decoys to lure agents away from a certain area and then return to Mexico, and therefore may be misidentified as turn backs, for example. As another example, DHS identified limitations due to cases not being entered or recorded correctly. For the “known maritime migrant flow rate” metric, DHS used data on the total number of maritime migrants interdicted. In its report, DHS explained that a potential limitation of this data element is that the Coast Guard relies on international and domestic partners to report their interdictions for compilation in its database. Consequently, the accuracy and completeness of the data depend on whether those reports are made by those partners and the accuracy of their reports. See appendix I for additional information about the limitations identified for each metric. Even as DHS identified and disclosed limitations related to some of its metrics, we identified at least one additional limitation for 21 of the 35 metrics on which DHS reported where DHS did not disclose such limitations or could have been more transparent about the limitations in its report. Examples of such instances include: Potential for cases not being entered or recorded correctly. In our previous work we found that mission data for unmanned aerial systems were inconsistently collected across operation locations. Specifically, in February 2017 we reported that there were instances where no assist information was recorded in AMO’s data system even though such assets participated in investigations and operations. Because AMO’s data may not reflect all asset assists, we recommended that AMO update and maintain guidance for recording mission information in its data collection system and provide training to users of the system. For its fiscal year 2017 Border Security Metrics Report, DHS used asset assists data in metrics such as the “AMO individuals detected,” “AMO apprehensions assisted,” and “illicit drug seizures assisted by AMO,” but did not disclose this limitation in its report. Potential for data to be changed over time. Border Patrol officials told us that data on the apprehension of unaccompanied alien children may change over time because original apprehension records from a shared database have, in some instances, been updated by staff from U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO). Officials said that in January 2015 they noticed that ERO staff were inadvertently overwriting Border Patrol’s original data entries about the status of apprehended children when they made updates to those children’s records. For example, if a child was unaccompanied at the time of his or her apprehension and was recorded as such by Border Patrol in the initial record entry, ERO may have changed the “unaccompanied” status in the system after they matched the child with a family member or sponsor. As a result, data may not be reconcilable with initial apprehension counts over time. DHS did not fully disclose limitations for some metrics. We identified instances where DHS could improve transparency about the assumptions or limitations of the data presented in its report. For example, in 2014 Border Patrol implemented a standard, southwest border-wide methodology to improve reporting of turn backs and got aways. While DHS made mention of this change in the text of the report, the data for these metrics are presented in tables without any table notes or disclosures within the table about this change. Further, DHS’s report does not discuss how the change may affect comparability of the data. Consequently, a reader may not be aware that data for before 2014 in a table are not necessarily comparable to the data for 2014 and after in the same table. Without a comprehensive identification of the limitations of the metrics and their associated data, and without an adequate disclosure of those limitations, the value of DHS’s report as a source of information to Congress, policymakers, and the public may be diminished. The metrics in the report were specifically identified and requested by Congress in the NDAA, and provide Congress with important information about the outputs and outcomes of DHS’s border security policies and investments that could be used to inform decision-making. However, those reading the report may not be aware of important contextual information because DHS did not identify and disclose some limitations, thereby creating the potential for the data to be misinterpreted. According to DHS officials who prepared the report, while they took steps to identify methodological limitations of the metrics, no process currently exists to systematically review the reliability of operational data used for public reporting purposes, such as in the metrics report. Specifically, DHS officials within OIS told us that while they were responsible for leading and managing the preparation of the report, they largely relied on the DHS components from which they collected the data to assess the data’s reliability and communicate identified limitations. OIS officials explained that many of the data elements used, such as those from AMO or the Coast Guard, were ones with which they were not familiar or had not worked with previously in their area of immigration statistics. OIS officials also noted that in some cases, the data had previously been used in performance measures or had been collected and tracked for several years, so they trusted the components’ processes for ensuring their reliability and identifying limitations, but reviewed the data provided where possible and consulted with the components as needed. However, OIS officials said that while they included as much information in the report as was known about identified limitations with the existing operational data, no additional effort was made to systematically review the underlying reliability of the data to comprehensively identify limitations that should be acknowledged when publicly reported because no department-wide process exists to do so. Standards for Internal Control in the Federal Government state that management officials should evaluate data sources for reliability and communicate quality information, including relevant data from reliable sources, to achieve an agency’s objectives. The quality information can then be used by agency management and external stakeholders such as policymakers, to make informed decisions and evaluate performance, among other things. Further, DHS’s Management Directive on Information Quality states that data and information disseminated by the department should, among other things, have full, accurate, transparent documentation, and error sources affecting data quality should be identified and disclosed to users. Additionally, our previous work on approaches for verifying and validating performance information found that communicating significant data limitations and their implications allows stakeholders to judge the data’s credibility for their intended use and to use the data in appropriate ways. By developing and implementing a process to systematically review the reliability of the data or consider the results of assessments components have completed, comprehensively identify any limitations, and communicate the data or methodological limitations with the metrics, DHS would improve the quality of the information available to Congress, DHS leadership, and the public. Doing so would also facilitate a better understanding and appropriate interpretation and use of the data in the context of the Border Security Metrics Report, thereby enhancing the report’s value as a source of information for future decision-making. Based upon statistical modelling, DHS developed a Model-based Apprehension Rate to calculate the total number of unlawful border entries between land POEs, including entries both detected by Border Patrol and “estimated undetected unlawful entries.” DHS reported that in fiscal year 2016 there were about 624,000 detected entries (which include apprehensions, turn-backs, and got aways) and estimated that there were about 62,000 undetected unlawful entries. DHS also used the Model- based Apprehension Rate to develop two other metrics in the fiscal year 2017 Border Security Metrics Report: (1) A “probability of detection rate,” which is the estimated proportion of the number of detected unlawful border entries to the total number of unlawful entries between land POEs. DHS estimated that in fiscal year 2016, 91 percent of unlawful border crossers were detected and 9 percent were not detected. (2) The “attempted unlawful border crosser apprehension rate,” which is the estimated proportion of unlawful border entrants apprehended by Border Patrol to the total number of unlawful entrants between land POEs. DHS estimated that in fiscal year 2016, 65 percent of individuals were apprehended by Border Patrol and 35 percent of individuals attempting an unlawful border entry either got away or entered the United States undetected. DHS based its statistical model upon research conducted by the Institute for Defense Analyses that leveraged long-standing research using capture-recapture models. Originally developed and utilized in biological and ecological sciences, capture-recapture models have been applied to other disciplines, including social science. According to the Institute for Defense Analyses, capture-recapture models have been the core approach for academic efforts to model the process of unlawful entry into the United States across land borders for several decades. To develop its statistical model, DHS used a capture-recapture methodology to calculate a probability of apprehension by counting the number of unlawful border crossers that were apprehended multiple times. At a high-level, capture-recapture involves taking an initial sample of the population of interest, in this case individuals attempting to cross the border unlawfully. Then, separately, a second, independent sample of the same population is taken. The samples are then compared to determine the number of individuals who appear in both samples. When the number of individuals who appear in both samples (e.g., individuals who have been apprehended twice) is low, it can be inferred that the overall population of interest (e.g., total unlawful border crossers) is much larger than the total number of individuals in the two samples. On the other hand, if the recapture rate is high, then it can be inferred that the overall population of interest is not much larger than the total number of individuals in the two samples. In the context of unlawful border crossing, when an individual’s first attempt at unlawfully crossing the border is successful, the individual enters the United States and no apprehension is made. However, if an individual is apprehended, Border Patrol records an apprehension of this individual in a DHS data system and the individual is potentially subject to consequences for entering unlawfully, such as administrative enforcement and removal, criminal prosecution, or being barred from legally entering the United States in the future. The individual is then returned to his or her home country, where the individual can then choose whether or not to make another attempt to unlawfully cross the border. During a second attempt to unlawfully cross the border, the individual faces the same possible outcomes (enter the United States unlawfully or apprehension by Border Patrol). Figure 2 provides the framework for DHS’s Model-based Apprehension Rate. DHS modified the traditional capture-recapture methodology by calculating a deterrence rate of 60 percent in fiscal year 2016 to account for individuals who choose not to make another unlawful border crossing attempt. The deterrence rate accounts for an individual being deterred from attempting to unlawfully cross the border again; that is, DHS assumed that some percentage of apprehended individuals, once returned to their country, will remain in their home country. DHS calculated the deterrence rate based upon a survey of Mexican individuals who were apprehended and returned to the border region of Mexico by U.S. immigration authorities. DHS assumed the remaining 40 percent of individuals who were apprehended and removed to their home country in fiscal year 2016 remain undeterred and will attempt to unlawfully cross the border again. Historically, DHS (and its predecessor the Immigration and Naturalization Service) did not use statistical models to calculate an apprehension rate but relied on apprehensions as a proxy measure for all unlawful entries (both observed and unobserved) between POEs. DHS also included in its report information on the apprehension rate using this method. Specifically, DHS also calculated an Observational Apprehension Rate based on direct observations (unlawful border crossers observed by Border Patrol) and indirect observations (residual evidence of a border crosser, i.e., footprints) of attempted unlawful border crossers. Using the observational apprehension rate, DHS calculated that in fiscal year 2016, it apprehended 79 percent of unlawful border crossers. DHS made assumptions about border crossers to develop its statistical model and described these assumptions in its report; however, DHS did not validate some of these assumptions or determine how they potentially could affect the accuracy of the Model-based Apprehension Rate through the use of sensitivity analyses. More specifically, DHS’s model incorporates several assumptions related to border crossers. Among others, these assumptions include: the rate at which individuals will be deterred from crossing again remains the same, regardless of the number of attempts an individual has made; individuals who indicate an intent to stay near the U.S.-Mexico border will attempt re-entry; a single apprehension rate applies to diverse groups of border crossers, regardless of their nationality or the number of attempts an individual has made; and certain individuals will not evade Border Patrol. However, the validity of some of these assumptions—which affect the Model-based Apprehension Rate—is uncertain. For example, DHS’s model estimates the rate at which a diverse group of border crossers attempting to evade detection will be apprehended by Border Patrol. This group includes both Mexicans and non-Mexicans and individuals who attempt to cross again after varying amounts of time. Despite this diversity, the model assumes that all crossers have the same chance of apprehension on each attempt to cross the border. This assumption allows DHS to apply the estimated apprehension rate developed based on a sample of Mexicans re-apprehended within 90 days—the group for whom relevant data exist—to a broader population of individuals regardless of the number of attempts the border crossers have made or their nationality. However, DHS did not make efforts to determine the extent to which an apprehension rate based on Mexican citizens re- attempting entry within 90 days would reflect apprehension rates for non- Mexicans and individuals crossing again after longer periods. Additionally, DHS assumes that the apprehension rate never varies between an individual’s attempts at crossing the border. For example, DHS assumes that an individual making a first attempt at crossing the border faces the same odds of apprehension as an individual making a fourth or fifth attempt at crossing the border. However, DHS has not explored the possibility that, for example, individuals may gain experience and knowledge from border-crossing attempts that could help them better evade Border Patrol on subsequent attempts. Further, DHS’s model assumes that certain individuals unlawfully crossing the border, such as those seeking asylum, will not evade apprehension and will turn themselves in to Border Patrol. Specifically, in addition to individuals who ultimately do seek asylum, DHS also includes within this group and applies this assumption to individuals apprehended as a family unit and unaccompanied minors. Under this assumption, 100 percent of such individuals are apprehended. According to DHS’s fiscal year 2017 Border Security Metrics Report, these individuals have historically been released into the United States with a Notice to Appear in immigration court for legal proceedings on a future date, rather than being subject to immediate DHS enforcement consequences such as voluntary return. Therefore, DHS assumes that 100 percent of these individuals will self-present to Border Patrol because, in doing so, they are able to claim asylum or other protection and potentially remain in the United States. However, representatives from the Institute for Defense Analysis stated that while anecdotally self-presenting rates of these individuals are high, more rigorous analysis is needed to accurately estimate a self- presentation rate. For example, it is possible that not all families crossing the border unlawfully may seek to self-present to Border Patrol; some may attempt to evade capture and enter the United States undetected. In this case, DHS may be underestimating the number of individuals who unlawfully cross the border and enter the United States by assuming 100 percent of these individuals will self-present to Border Patrol agents. Additionally, DHS noted in its fiscal year 2017 Border Security Metrics Report that this assumption does not reflect the actual behavior of all border crossers in this group. OIS officials stated that they based this assumption on interviews with Border Patrol agents but had not done formal or quantitative analysis to support this assumption. Further, OIS officials stated that they did not have a strong alternative assumption to use instead and therefore assumed that 100 percent of individuals within this group are apprehended. DHS described these assumptions in its report but did not provide quantitative information on the extent to which these assumptions affected the Model-based Apprehension Rate through the use of sensitivity analyses. Sensitivity analyses help to convey the extent to which changing the values of variables, assumptions, data, or other input affects statistical estimates. For example, sensitivity analyses could provide information on how different assumptions about unlawful border crossers’ behavior and other inputs to the statistical model could have affected the Model-based Apprehension Rate. OIS officials stated that while they had started to run sensitivity analyses by modifying certain assumptions, they had not completed the analysis and did not include results of the sensitivity analyses in the report. The Office of Management and Budget’s (OMB) statistical standards for federal agencies include providing the results of sensitivity analyses for key methodological assumptions to ensure that these assumptions do not unduly affect the results of the model. By including the results of sensitivity analyses in its Border Security Metrics Report, DHS would allow Congress and the public to better understand the potential limitations associated with its model and make independent assessments on its accuracy. DHS used a statistical model to develop the Model-based Apprehension Rate but did not provide information on the level of uncertainty related to this estimate. Rather, the fiscal year 2017 DHS Border Security Metrics Report provided a single rate that does not fully convey the difficulty and uncertainty of estimating partially unobserved metrics, such as unlawful entries and the probability of detection. Specifically, using the Model- based Apprehension rate, DHS estimated that 65 percent of unlawful border crossers were apprehended in fiscal year 2016, and the remaining 35 percent entered the United States. However, like all statistical models, DHS’s estimate is based upon a limited sample of data and may be affected by random variation, meaning that DHS does not have complete certainty that its rate is accurate. DHS included a discussion of limitations in the report but did not quantify its degree of uncertainty. According to the OMB statistical standards for federal agencies, possible variation in estimates should be noted, such as by reporting the range of each estimate. Measures of statistical uncertainty, such as margins of error or confidence intervals, help to convey the amount by which estimates might vary due to randomness in the data and allows consumers of the estimates to evaluate their accuracy. OIS officials stated that they agree that providing measures of statistical uncertainty would help Congress and the public better understand the Model-based Apprehension Rate to evaluate border security. Officials told us that the office had begun to develop measures of statistical uncertainty but did not complete this effort because the staff member who was working on the analyses recently left the office. Further, OIS officials stated that they were unsure when they would be able to provide measures of statistical uncertainty in future reports. Including measures of statistical uncertainty in future reports would allow Congress, policy makers, and the public to more fully evaluate the extent to which the metrics that use the Model-based Apprehension Rate are valid. Further, while DHS may ultimately adopt a new, simulation-based model in the future, described later in this report, it plans to use the current Model- based Apprehension Rate for estimates in its Border Security Metrics Report for the foreseeable future. Therefore, providing this additional information about the estimates would allow DHS to more accurately convey how limitations in available data and methods could affect the results and provide more useful information about migration and border enforcement. Additionally, to the extent DHS adopts a new estimating metric, that estimate may have some level of uncertainty associated with it. DHS is developing another model because its current statistical model may not sufficiently reflect conditions at the southwest border. Specifically, DHS’s current statistical model does not fully account for the changing population of unlawful border crossers. The capture-recapture methodology, which underlies the Model-based Apprehension Rate, was developed to sample homogenous populations that behave in set, uniform ways. However, those crossing the border have become increasingly diverse in recent years. Our analysis of DHS data used to develop the Model-based Apprehension Rate shows that the number of unlawful border crossers whose characteristics and behavior are best reflected in the statistical model has declined. For example, our analysis illustrated that the population that conforms best to the model’s assumptions—adult Mexicans travelling without dependents who do not plan to claim asylum and who are returned to Mexico in a short amount of time—has fallen from over 60 percent of apprehensions in fiscal year 2000 to less than 25 percent of apprehensions in 2016, as shown in figure 3. Conversely, the number of individuals who are excluded from the statistical model such as non-Mexicans, and individuals whose behavior may not reflect the model’s assumptions, such as asylum-seekers or those who have not departed the United States (e.g., because they are awaiting immigration court proceedings) have increased over time, as shown in figure 4. For example, the percentage of individuals apprehended at the border who are excluded from the model because they await immigration court proceedings increased from 26 percent in fiscal year 2000 to almost 70 percent in fiscal year 2016. DHS acknowledged these trends in its fiscal year 2017 Border Security Metrics Report and noted them as a limitation to the effectiveness of its model. OIS officials further noted that some of these limitations are difficult to address within the bounds of the statistical model. For example, to properly account for non-Mexicans, OIS officials stated that they would need information on the rate at which non-Mexicans are deterred from crossing the border. However, it would be difficult and costly to obtain this information through the use of a survey and real-world data does not already exist, according to OIS officials. To help address limitations of its current statistical model, DHS has invested in another research project to estimate the number of unlawful border crossers between land POEs, including unknown border entries. Border Patrol contracted with Johns Hopkins Applied Physics Laboratory to undertake a project that aims to use a combination of statistical modeling and data from sensors along the border to estimate the total number of unlawful border entries between land POEs, including entries both detected by Border Patrol and those not detected by Border Patrol. According to project documentation we reviewed, the project plans to leverage the CBP Tactical Simulation, an agent-based simulation of tactical border operations. CBP Tactical Simulation incorporates information on terrain at the border based on geographic information systems and sensors along with probability models that reflect how Border Patrol agents and unlawful border crossers behave in given circumstances. Border Patrol and OIS officials told us that this project would be more adaptable to changing border conditions and could help the agency address limitations associated with the Model-based Apprehension rate. Specifically, according to OIS officials, a simulation-based estimate would rely upon fewer assumptions about the types of individuals who unlawfully cross the border as compared to the current Model-based Apprehension rate. However, Border Patrol officials noted that estimates of unobservable phenomena, such as unobserved border entries, always face some limitations in their accuracy and that the new model may still rely upon samples of data that would have associated uncertainty as well as assumptions that would need to be validated. Ultimately, though, Border Patrol officials stated that the simulation-based model may be an improvement upon the current Model-based Apprehension rate. Border Patrol officials stated that the first iteration of the model would be presented to Border Patrol leadership for their review at the end of fiscal year 2019 and if at that time Border Patrol leadership approves the model, the earliest the simulation-based estimate could potentially be incorporated into the DHS Border Security Metrics Report would be for fiscal year 2020. Exploring alternative models is a positive step for DHS, however given that the project is in the early stages, it is too early to tell if it will be able to address the limitations we identified associated with the current model. In addition to the NDAA metrics, we have identified other metrics that DHS could use to help measure the effectiveness of border security. In particular, based on the findings from our previous reviews of border security programs and efforts, we have recommended that DHS use metrics that are relevant to each of the four domains listed in the NDAA— between POEs, at POEs, the maritime border, and for air and marine security in the land domain. For example, Between POEs domain. In February 2017, we reported on the use of border fencing along the southwest border and found that CBP collects data that could help provide insight into how border fencing contributes to border security operations, including the location of illegal entries. For example, we found that CBP collects data it could potentially use to determine the extent to which border fencing diverts illegal entrants into more rural and remote environments, and border fencing’s impact, if any, on apprehension rates over time. However, CBP had not developed metrics that systematically use these data to assess the contributions of border fencing to its mission. To better position CBP to make resource allocation decisions with the best information available to inform competing mission priorities and investments, we recommended that the Chief of the Border Patrol develop metrics to assess the contributions of pedestrian and vehicle fencing to border security along the southwest border using CBP data. DHS agreed with the recommendation and stated that it planned to develop metrics for use in its operational control framework for southwest border security operations. As of October 2018, DHS stated that the department planned to test the metrics and implement them in the framework by September 2019. At POEs domain. In July 2017, we reported on the Importer Security Filing (ISF) program and found that while ISF rule data have improved the program’s ability to identify high-risk cargo shipments, CBP could collect additional performance information to better evaluate program effectiveness. While evaluating the direct impact of using ISF rule data to assess shipment risk is difficult, we identified examples of how CBP could better assess the ISF program’s effectiveness. For example, CBP could track the number of containers not listed on a manifest—which could pose a security risk—it identifies through reviewing vessel stow plans. Collecting this type of additional information would help CBP better assess whether the ISF program is improving its ability to identify high-risk shipments. Therefore, we recommended that CBP identify and collect additional performance information on the impact of the ISF rule data, such as the identification of shipments containing contraband, to better evaluate the effectiveness of the ISF program. DHS agreed with the recommendation and reported that it is working to assess additional performance metrics to evaluate the effectiveness of the ISF program and anticipates completing the assessment by end of December 2019. Maritime border domain. In October 2017, we reported on the Coast Guard’s performance goals and found that although the Coast Guard’s performance goals are generally aligned with its statutory missions, the Coast Guard does not explain why certain aspects of mission performance are measured while others are not. For example, we found that while the Coast Guard’s mission is to interdict all illegal drugs, the agency’s two performance goals related to that mission were for cocaine interdiction only, excluding many other substances. We recommended that the Coast Guard either develop new performance goals to address mission activity gaps, or explain in the Coast Guard’s Annual Performance Report why certain aspects of mission performance are measured while others are not. Developing new goals to address missions, or describing how existing goals sufficiently assess mission performance, could better convey the Coast Guard’s progress in achieving its missions. DHS agreed with the recommendation and in February 2018, the Coast Guard provided us with its updated fiscal year 2017 Annual Performance Report. We found that while the updated report explained why performance goals related to its drug interdiction mission focus solely on cocaine interdiction, for the four other performance goals we previously identified as not fully addressing all related mission activities, the updated report did not include additional goals or explain why certain aspects of mission performance are not measured. We continue to believe that in instances in which performance goals do not fully address all of the respective mission activities, the Coast Guard’s Annual Performance Report should include an explanation. Air and marine security in the land domain. In May 2017, we reviewed DHS’s efforts to address subterranean, aerial, and maritime smuggling of drugs and humans. We found that while DHS established high-level performance measures and collected data on smuggling by ultralight aircraft, it had not assessed its efforts specific to addressing this smuggling method. Additionally, we found that DHS had similarly not assessed smuggling methods such as tunnels, panga boats (a fishing vessel), and recreational vessels. We recommended that DHS direct CBP, ICE, and Coast Guard to establish and monitor performance measures and targets related to ultralight aircraft, cross-border tunnels, panga boats, and recreational vessel smuggling to help provide reasonable assurance that efforts to address these smuggling methods are effective. By establishing measures and monitoring performance against targets, managers could obtain valuable information on successful approaches and areas that could be improved to help ensure that technology investments and operational responses to address these smuggling methods are effective. DHS agreed with the recommendations for measures related to ultralight aircraft and cross-border tunnels. DHS reported that AMO and Border Patrol have drafted a performance measure for ultralight aircraft, however, reviews and approval of the measure will not be completed until November 2019. As of June 2018, DHS reported that ICE was leading the development of measures related to cross-border tunnels. DHS did not agree with the recommendation to establish measures and monitor performance against targets for smuggling by panga boats and recreational vessels because the department believed measures and targets would not provide the most useful strategic assessment of operations to prevent all illicit trafficking, regardless of area of operations or mode of transportation. We continue to believe that the recommendation is valid and recognize the value of high-level strategic performance measures. However, such high-level measures may not provide sufficiently detailed performance information to allow DHS to identify successful approaches to addressing smuggling by panga boats and recreational vessels and areas for improvement. Further, establishing performance measures and targets related to smuggling by panga boats and recreational vessels could, in turn, better position DHS to understand the overall smuggling threat. Appendix II provides additional information on these and other metrics we have previously recommended that DHS could use to help measure the effectiveness of border security in the four domains. Securing U.S. borders is a complex undertaking that spans multiple domains and locations. It is also a key part of DHS’s mission for which DHS has made significant investments over the years. Given the complexity and breadth of border security efforts, having data and information available on the state of border security is important for DHS as well as policymakers and the public to understand the effectiveness of those investments. DHS’s fiscal year 2017 Border Security Metrics Report makes an important contribution in providing such data and information. DHS components generally have processes to help ensure the reliability of the data used in the metrics report and DHS identified and disclosed some data and methodological limitations with the metrics. However, DHS did not systematically review the reliability of data used in all metrics to identify and disclose limitations and their potential implications for the metric. Without complete information about the limitations of the data or the metric methodologies used in the report, Congress, policymakers, and the public may not be aware of important context or information needed to fully and appropriately understand the data being presented. By developing and implementing a process to systematically review the reliability of the data, as well as comprehensively identify limitations and communicate limitations of the metrics, DHS would improve the quality of the data and information provided in the report which would facilitate a better understanding and appropriate interpretation of the data and information provided. To develop three metrics in the report, DHS used a statistical model that incorporated untested assumptions about the behavior of unlawful border crossers that may not reflect real-world conditions. DHS was transparent about the limitations of its model, but providing the results of sensitivity analyses and measures of statistical uncertainty related to the model would allow Congress, policymakers, and the public to better understand its potential limitations and more fully evaluate the validity of DHS’s metrics that use estimates. We are making the following four recommendations to DHS: The Secretary of Homeland Security should develop and implement a process to systematically review the reliability of the data used in its Border Security Metrics Report and comprehensively identify any limitations with the data and methodologies that underlie its metrics. (Recommendation 1) The Secretary of Homeland Security should ensure the communication of the limitations of the metrics identified through the systematic review in the department’s annual Border Security Metrics Report. (Recommendation 2) The Under Secretary for the Office of Strategy, Policy, and Plans should include the results of sensitivity analyses to key assumptions in its statistical models of unlawful entry estimates in its annual Border Security Metrics Report. (Recommendation 3) The Under Secretary for the Office of Strategy, Policy, and Plans should include measures of statistical uncertainty for all metrics based on estimates derived from statistical models in its annual Border Security Metrics Report. (Recommendation 4) We provided a draft of this report to DHS and the Office of National Drug Control Policy for review and comment. DHS provided written comments, which are reproduced in appendix III and discussed below. DHS also provided technical comments, which we incorporated as appropriate. The Office of National Drug Control Policy indicated via e-mail that it did not have any comments on the draft report. In its comments, DHS concurred with our recommendations and stated that it planned to implement 3 of the 4 by October 2020. With respect to our second recommendation, DHS requested that we consider it closed as implemented because the department already detailed some of the limitations in its fiscal year 2017 report, and plans to continue to identify known limitations and the progress made to mitigate previously identified limitations in future reports. As discussed in this report, we agree that DHS identified and disclosed limitations for some metrics in its fiscal year 2017 Border Security Metrics Report; however, we identified at least one additional limitation for 21 of the 35 metrics on which DHS reported that DHS did not disclose or about which it could have been more transparent. To address the intent of this recommendation, once DHS has implemented a process to systematically review the reliability of the data used in its report and comprehensively identified related limitations, it should disclose those limitations in its annual Border Security Metrics Report. We are sending copies of this report to the appropriate congressional committees and the Secretary of the Department of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. GAO staff who made key contributions to this report are listed in appendix IV. This appendix provides additional information on our analysis of the suitability and validity of the metrics the Department of Homeland Security (DHS) reported in its fiscal year 2017 Border Security Metrics Report for each of the four domains listed in the National Defense Authorization Act for Fiscal Year 2017 (NDAA)—between ports of entry, at ports of entry, the maritime border, and air and marine metrics in the land domain. Specifically, this appendix provides information on the metrics including their status, descriptions, differences between what DHS reported for the metrics and how they were described or defined by the NDAA, limitations, and any additional information or planned actions by DHS, where applicable. Description This metric is a rate comparing apprehensions to the total number of attempted unlawful border crossers. As such, this metric requires an estimate of the number of unlawful entry attempts that are not detected, which is added to the number of detected unlawful border crossers to create the denominator. The Department of Homeland Security (DHS) provided two methods for calculating this rate in its report. The first method, called the Model-based Apprehension Rate, uses a statistical model based on the capture-recapture methodology to estimate the rate.The second method, called the Observational Apprehension Rate, calculates the ratio of apprehensions to the sum of apprehensions and got aways. unlawful entries is limited to the southwest border. According to the report, research is underway on methods to produce estimates for the northern border. Limitations The Observational Apprehension Rate incorporates data on apprehensions, and got aways, while the Model- based Apprehension Rate is based on an estimate for undetected unlawful entries. Consequently, the limitations for those metrics also apply here. For more information on the limitations for those metrics, see the respective sections below. DHS identified: The observational apprehension rate excludes unobserved got aways. Additional information and planned actions by the Department of Homeland Security In its report, DHS noted that it has taken steps to improve situational awareness along the border and mitigate limitations. These steps include investing in technology, refining observational estimates, and developing a methodology to estimate statistical reliability. According to U.S. Border Patrol officials, investments in new technology have enabled U.S. Border Patrol to better detect cross-border activities. For additional information on the data elements used for this metric and DHS’s planned actions, see the respective sections below on apprehensions, got aways, and the estimate for undetected unlawful entries. Description This metric is a count of the total number of attempted unlawful border crossers between land ports of entry who were directly or indirectly observed or detected by U.S. Border Patrol. The Department of Homeland Security (DHS) calculated this metric by adding turn backs, got aways, and apprehensions of unlawful border crossers. Patrol officials, the northern border has different immigration dynamics than the southern border and accounts for a significantly smaller number of turn backs and got aways overall, so northern border data were not included. Limitations Because this metric incorporates data on apprehensions, got aways, and turn backs, the limitations for those metrics also apply here. For more information on the limitations for those metrics, see the respective sections below. Additional information and planned actions by the Department of Homeland Security For additional information on the data elements used for this metric and DHS’s planned actions, see the respective sections below. Description This metric is an estimate of the number of attempted unlawful border crossers that are not directly or indirectly observed or detected by U.S. Border Patrol (Border Patrol). The Department of Homeland Security (DHS) used a statistical model, based on capture-recapture methodology, to estimate total successful unlawful entries, and subtracted detected got aways to calculate the total number of undetected unlawful entries. unlawful entries is limited to the southwest border. According to DHS’s report, research is under way to produce this estimate for the northern border. DHS does not currently have reliable data on the estimated share of migrants who, following an unsuccessful unlawful entry attempt, are deterred from making a subsequent reentry attempt. For its model, DHS used data from a survey of recently removed Mexicans, which asked them about their intentions to re-enter the United States. According to DHS’s report, a shortcoming of the survey is that it does not take account of shifting border enforcement efforts, potential changes in behavior by individuals who have been exposed to consequence programs, or other deterrent factors along the border. Consequently, any resulting undercount in the estimate of the deterred population results in a downward bias. The population that conforms best to the model’s assumptions represents a diminishing share of southwest border apprehensions. Specifically, in its report DHS said that Mexican adults removed to the nearest border accounted for about 95 percent of apprehensions in the 1990s. However, because of recent changes at the border, including changes in the composition of border flows (i.e., rising numbers of Central Americans and asylum seekers) and in Border Patrol’s enforcement strategy, the population best reflected in the model has declined to as few as 20 percent of apprehensions in recent years. Further, DHS noted that some alien populations, such as those seeking asylum and who do not evade detection by Border Patrol agents, are also excluded from the model. However, these populations make up an increasing share of apprehensions in recent years. The model uses restrictive assumptions about which re-apprehensions to include. For example, the model excludes apprehensions occurring at check points and other remote locations and those occurring more than 4 days after an illegal entry. According to DHS, these assumptions result in a downward bias. We identified: DHS described assumptions it made in its report but did not provide quantitative information on the extent to which they affected its estimated undetected unlawful entries through the use of sensitivity analyses. Sensitivity analyses help to convey the extent to which changing the values of variables, assumptions, data, or other input affects statistical estimates. By including the results of sensitivity analyses in its Border Security Metrics Report, DHS would allow Congress and the public to better understand the potential limitations associated with its model and make independent assessments on its accuracy. DHS did not provide information on the statistical level of uncertainty related to this rate, such as margins of error or confidence intervals. This information would help convey how the estimates might vary due to randomness in the data. Instead, DHS provided a single rate that does not fully convey the difficulty and uncertainty of the estimate. This metric incorporated data on apprehensions and got aways. For more information on the limitations associated with those metrics, see the respective sections below. Additional information and planned actions by the Department of Homeland Security According to DHS, officials are continuing to improve the accuracy of the existing statistical model for estimating unlawful border crossers but are also considering alternative methodologies. U.S. Customs and Border Protection has contracted with Johns Hopkins Applied Physics Laboratory to develop a new model for estimating the flow of unlawful border crossers. This model uses a combination of statistical modelling, data from sensors along the border, and probability models that reflect how Border Patrol agents and unlawful border crossers behave in given circumstances. Border Patrol officials estimated that the earliest the simulation-based estimate could potentially be incorporated into the DHS Border Security Metrics Report would be for fiscal year 2020. Description This metric is a count of the number of unlawful border crossers who, after making an unlawful entry into the United States, responded to law enforcement efforts by returning promptly to the country from which they entered. These data came from U.S. Border Patrol (Border Patrol) records. Border Patrol officials, the northern border has different immigration dynamics than the southern border and accounts for a significantly smaller number of turn backs overall, so northern border data were not included. Officials stated that while the current emphasis of reporting is on the southwest border, efforts are underway to identify and find ways to capture data that are important and reflective of the effectiveness in addressing threats specific to the northern border. The estimate aggregates potentially subjective observations from thousands of individual agents. Some unlawful border crossers may enter the United States to drop off drug loads or to act as decoys to lure agents away from a certain area and then return to Mexico, and therefore may be misidentified as turn backs. In our previous work we identified differences in the procedures for reporting and classifying turn backs across sectors, and noted how factors such as terrain and weather may impact agents’ abilities to accurately detect turn backs. According to DHS, since 2014, Border Patrol has implemented a standard, southwest border-wide methodology to improve reporting and mitigate the potential subjectivity of observations by agents. Therefore, data before 2014 are not necessarily comparable to data from 2014 and later. DHS presented the data in a table without explaining that the methodology used to categorize and count turns backs changed in 2014. Additional information and planned actions by the Department of Homeland Security According to DHS’s report, Border Patrol has taken steps to implement a standard, southwest border-wide methodology to improve reporting of potential turn backs. In addition, DHS’s report said that command staff ensure all agents are aware of and utilize proper definitions for apprehensions, got aways, and turn backs at their respective stations. They also ensure necessary communication takes place between and among sectors and stations to minimize double-counting when subjects cross through more than one station. DHS’s report noted that Border Patrol headquarters components validate data integrity. Description This metric is a count of the number of unlawful border crossers who are directly or indirectly observed entering unlawfully, are not apprehended, and are not turn backs. These data came from U.S. Border Patrol (Border Patrol) records. Border Patrol officials, the northern border has different immigration dynamics than the southern border, so northern border data were not included. Officials stated that while the current emphasis of reporting is on the southwest border, efforts are under way to identify and find ways to capture data that are important and reflective of the effectiveness in addressing threats specific to the northern border. Limitations DHS identified: The count aggregates potentially subjective observations from thousands of individual agents. In previous work we identified differences in procedures for reporting and classifying got aways across sectors, and noted how factors such as terrain and weather may impact agents’ abilities to accurately detect got aways. According to DHS, since 2014, Border Patrol has implemented a standard, southwest border-wide methodology to improve reporting and mitigate the potential subjectivity of observations by agents. Therefore, data before 2014 are not necessarily comparable to data from 2014 and later. DHS presented the data in a table without explaining that the methodology used to categorize and count turns backs changed in 2014. For information on limitations with the model-based estimate for undetected unlawful entries, see the section for estimated undetected unlawful entries above. Additional information and planned actions by the Department of Homeland Security According to DHS’s report, Border Patrol has taken steps to implement a standard, southwest border-wide methodology to improve reporting of potential got aways. In addition, DHS’s report said that command staff ensure all agents are aware of and utilize proper definitions for apprehensions, got aways, and turn backs at their respective stations. They also ensure necessary communication takes place between and among sectors and stations to minimize double-counting when subjects cross through more than one station. DHS’s report noted that Border Patrol headquarters components validate data integrity. As a comparison against the counts of documented got aways, DHS also provided an estimate of total successful unlawful entries along the southwest border using a statistical model based on capture-recapture methodology. For more information on the methodology for this estimate, see the section titled “Estimated Undetected Unlawful Entries” in this appendix. Description This metric is a rate comparing the number of apprehensions and turn backs to the number of apprehensions, estimated undetected unlawful entries, turn backs, and got aways in each U.S. Border Patrol sector. rate is not available because sector-level estimates of unlawful entries and attempts have not yet been produced and validated. As an alternative, DHS presented data using the interdiction effectiveness rate. With this rate, the estimated undetected unlawful entries measure is replaced with known got aways. However, DHS does not have an interdiction effectiveness rate for the northern border so it solely provided data for the southwest border. According to DHS’s report, the department has not yet developed a northern border interdiction effectiveness rate because there are only a small number of attempted and successful entries along the northern border. Limitations None identified. Additional information and planned actions by the Department of Homeland Security DHS reported that sector-level estimates of unlawful entries and attempts are projected to be available in its 2019 annual Border Security Metrics Report to Congress. Authorization Act for Fiscal Year 2017 (NDAA) defined this metric as a rate comparing the estimated total undetected unlawful border crossing attempts to the unlawful border crossing effectiveness rate. The Department of Homeland Security (DHS) calculated this metric by dividing the detected unlawful entries by the estimated total unlawful entries. The number of detected unlawful entries is calculated by adding turn backs, got aways, and apprehensions. Estimated total unlawful entries is calculated by adding turn backs, apprehensions and estimated total successful unlawful entries derived from DHS’s statistical model. unlawful entries is limited to the southwest border. Additionally, DHS used detected unlawful entries as the numerator, instead of the estimated total unlawful border crossing attempts not detected as called for in the NDAA. For the denominator DHS used the estimated total unlawful entries instead of the unlawful border crossing effectiveness rate, as called for in the NDAA. Limitations Because this metric incorporates data on apprehensions, got aways, and turn backs, as well as the estimate for undetected unlawful entries, the limitations for those metrics also apply to this metric. For more information on the limitations for those metrics, see the respective sections for those metrics. Additional information and planned actions by the Department of Homeland Security For additional information on apprehensions, got aways, turn backs, and the estimate for undetected unlawful entries, and any planned actions by DHS for those metrics, see the respective sections for those metrics. Description This metric is a count of the number of apprehensions in each U.S. Border Patrol (Border Patrol) sector. Data come from Border Patrol records, and each apprehension of the same unlawful crosser in a fiscal year is counted separately, meaning these data do not represent a count of unique crossers apprehended. Border Patrol officials, the northern border has different immigration dynamics than the southern border, so northern border data were not included. Officials stated that while the current emphasis of reporting is on the southwest border, efforts are under way to identify and find ways to capture data that are important and reflective of the effectiveness in addressing threats specific to the northern border. Limitations DHS identified: In its report, DHS said that apprehensions are not a useful indicator of successful unlawful border crossings over the long-term and across multiple locations because the relationship between apprehensions and successful unlawful entries depends on the apprehension rate, which changes over time and may differ by location. Additional information None. Description This metric is a count of the number of apprehensions of unaccompanied alien children (UAC), and the nationality of such children, in each U.S. Border Patrol (Border Patrol) sector. A UAC is a child under 18 years old with no lawful immigration status, and no parent present and available in the United States to provide care and physical custody. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report The Department of Homeland Security (DHS) only included data for the southwest border. Limitations DHS identified: Agents may not be able to reliably distinguish among older children and young adults or confirm whether children are traveling alone or in family groups. We identified: We previously reported that it can be challenging to obtain accurate information about a child’s country of origin because of absence of documentation, language barriers, and coached responses by smugglers, among other reasons. Border Patrol officials said that the data on UAC may have reliability issues because original data from a shared database had been changed. Specifically, officials said that in January 2015 they noticed that Enforcement and Removal Operations staff were inadvertently overwriting Border Patrol’s original data entries about the status of migrant children apprehended once those children were placed with relatives or a foster family. Additional information and planned actions by the Department of Homeland Security According to Border Patrol officials, agents rely on statements provided by the child to determine the nationality of UACs when verifiable documentation is not available. Verifiable documentation could include biometric checks, birth certificates, state-issued identification cards, and passports. However, officials noted that this list is not all-inclusive and the processing agent determines the validity of any presented documents. Border Patrol officials said that a data integrity team regularly examines data on apprehensions and they conduct biweekly data reliability checks. Additionally, they are working with Enforcement and Removal Operations to modify the data entry process so that updates can be made without overwriting the original apprehension data entered by Border Patrol. Description This metric is a count of the number of apprehensions of family units, and the nationality of such family units, in each U.S. Border Patrol (Border Patrol) sector. A family unit is the number of individuals apprehended with a family member. For example, a mother and child apprehended together are counted as two family units. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report The Department of Homeland Security (DHS) only included data for the southwest border. Limitations DHS identified: DHS noted that the count of apprehensions for family units is considered reliable, but that agents may not be able to reliably identify family units. We identified: According to Border Patrol officials, their data entry system did not have a dedicated field for agents to record apprehensions of persons within a family unit for all of the years presented in the report. In December 2014, Border Patrol added specific data entry fields to its data entry processes for agents to input information about family units. These fields incorporated built in safeguards and edit checks to help ensure that agents make an appropriate family unit classification. Previously, Border Patrol officials said they used proxy data to identify family units. Given the additional safeguards and checks included with the new family unit data entry fields, Border Patrol officials stated that the data after December 2014 may be more reliable overall compared to previous years. Border Patrol officials stated that they have high confidence in the proxy count for data pre-2014, but acknowledged that those data may contain misclassifications of family units. Additional information According to Border Patrol officials, agents are trained in interviewing techniques and the processing agent will consider all available evidence to determine the validity of claims to familial relationships. Border Patrol officials also noted that in order to be categorized as a family unit, at least one member of the family unit must be at least 18 years of age. Consequently, related individuals younger than 18 years of age that are apprehended together would not be categorized as a family unit. Description This metric is a rate comparing the amount and type of illicit drugs seized between ports of entry in any fiscal year to the average of the amount and type of illicit drugs seized between ports of entry in the immediately preceding 5 fiscal years. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations None identified. Additional information None. Description This metric was not specifically defined in the National Defense Authorization Act for Fiscal Year 2017 (NDAA); the NDAA called for an estimate of the impact of the Consequence Delivery System (CDS) on the recidivism rate of unlawful border crossers over multiple fiscal years. The Office of Immigration Statistics (OIS) calculated this metric by providing the average annual recidivism rate for the 3 years prior to fiscal year 2012— when the CDS was implemented—and the average annual recidivism rate for the subsequent 3 years. The annual recidivist rate is calculated by dividing the number of unique crossers apprehended multiple times in a fiscal year by the total number of unique crossers in the fiscal year. to DHS’s report, recidivism data for the northern border were not available due to the small number of attempted illegal entries along the northern border. Noting the findings from our January 2017 review, DHS stated that its current recidivism measure could be strengthened by using the date an unlawful border crosser is removed or returned instead of the date they are apprehended, as well as by counting re-apprehensions within a fixed period of time defined by the crosser’s repatriation date instead of by the fiscal year. In January 2017, we reported that using a crosser’s apprehension history beyond 1 fiscal year, and excluding crossers that have not been previously removed, among other things, produces a significantly different rate compared to how DHS currently calculates it. Consequently, we recommended that DHS calculate recidivism for a period of time longer than 1 fiscal year and that DHS exclude from the recidivism calculation aliens for whom there is no record of removal and who may remain in the United States. As of December 2018, this recommendation remained open. DHS stated that changes in the recidivism rate after 2012 cannot be attributed solely to CDS because enforcement is a complex, dynamic system. We identified: Given that DHS’s methodology is to provide the 3-year average of the recidivism rate before and after CDS was implemented in fiscal year 2012, the data presented will remain static for subsequent annual reports because the periods of comparison for analyzing recidivism are fixed around a specific point in time. According to OIS officials, to help address this issue, in the next report they plan to provide individual rates for each year instead of the 3-year average. Additional information and planned actions by the Department of Homeland Security In its report, DHS noted that future reports will include estimates of the impact of CDS on both the annual recidivism rate and a longer-term recidivism rate. For example, OIS officials said they plan to update the way they calculate recidivism for future issues of the report and are developing a multivariate impact analysis that would take into consideration factors such as crossers’ demographics and immigration history. Description This metric was not specifically defined in the National Defense Authorization Act for Fiscal Year 2017 (NDAA); the NDAA called for an examination of each consequence under the Consequence Delivery System (CDS), including (1) voluntary return, (2) warrant of arrest or notice to appear, (3) expedited removal, (4) reinstatement of removal, (5) alien transfer exit program, (6) criminal consequence program, (7) standard prosecution, and (8) Operation Against Smugglers Initiative on Safety and Security. The Department of Homeland Security (DHS) presented data on the recidivism rates for each consequence between fiscal years 2012 through 2016. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report As noted above for the metric “estimates of the impact of the Consequences Delivery System on recidivism,” DHS only included data for the southwest border because recidivism data for the northern border were not available due to the small number of attempted illegal entries along the northern border. Differences in recidivism rates among the consequences may also reflect differences in the propensity of the targeted populations to attempt to re-enter. As with the metric for estimating the impact of the CDS on recidivism discussed above, DHS noted the limitation that current recidivism data are based on apprehensions within a given fiscal year, and not the date when an individual was repatriated to their country of origin. In January 2017, we reported that some unlawful border crossers were incorrectly classified based on CDS guidance. U.S. Border Patrol (Border Patrol) agents implement CDS by classifying apprehended aliens into one of seven noncriminal or criminal categories and then applying one or more of eight different consequences; therefore, determining the correct classification of the unlawful border crosser is important for identifying and applying the appropriate consequence. Our analysis of Border Patrol apprehension data from fiscal year 2013 through 2015 showed that Border Patrol did not classify 11 percent of apprehensions in accordance with the agency’s guidance. We recommended that Border Patrol provide consistent guidance for classification and take steps to ensure the integrity of classification data. Border Patrol implemented this recommendation as of December 2017, but the issue could potentially have implications for the data DHS used in this metric, which was for fiscal years 2012 through 2016. Additional information and planned actions by the Department of Homeland Security According to its report, DHS is refining its analysis and will seek to specifically address the limitations discussed above in the fiscal year 2018 version of the Border Security Metrics Report. Ports of entry are U.S. government facilities that provide for the controlled entry into or departure from the United States. There are 328 ports of entry in the United States. Specifically, a port of entry is any officially designated location (seaport, airport, or land border location) where U.S. Customs and Border Protection (CBP) officers or employees are assigned to clear passengers, merchandise and other items, collect duties, and enforce customs laws; and where CBP officers inspect persons seeking to enter or depart, or apply for admission into, the United States pursuant to U.S. immigration law and travel controls. CBP’s Office of Field Operations (OFO) is the lead DHS component responsible for carrying out activities at POEs. The 15 metrics in this domain measure the number of travelers attempting to enter the United States at ports of entry, illicit drugs seized at ports of entry, and cargo entering the United States, among other things. DHS included 11 of the 15 metrics called for in the NDAA for this domain in its fiscal year 2017 Border Security Metrics Report, as shown in table 5. DHS reported that the four metrics for which it did not provide information did not yet have a reliable methodology or were under review, and that DHS was in the process of developing methodologies to capture the data needed for the requested metrics. DHS officials said these four metrics would not be ready for inclusion in the next annual report. Description This metric is a count of total inadmissible travelers, and requires an estimate of the number of inadmissible travelers who successfully enter at a port of entry without being detected. The metric is the sum of the number of inadmissible travelers interdicted and the estimated number of inadmissible travelers who successfully enter at a port of entry without being detected. inadmissible travelers who successfully enter at a port of entry without being detected. Therefore, DHS only presented data on known inadmissible travelers. Limitations None identified. Additional information and planned actions by the Department of Homeland Security DHS projected that the department may be able to include estimates on the number of inadmissible travelers who successfully enter at a port of entry in its fiscal year 2019 Border Security Metrics Report to Congress. According to U.S. Customs and Border Protection (CBP) officials, they are in the process of determining whether CBP’s Compliance Measurement Examination (COMPEX) program could be used as a means to reliably measure undetected inadmissible travelers. Description These metrics are rates that require data on travelers seeking admission at a port of entry, interdictions of inadmissible travelers, and an estimate of the number of inadmissible travelers who successfully enter at a port of entry without being detected. The refusal rate is calculated by dividing the number of inadmissible travelers interdicted by all people seeking admission at a port of entry. The interdiction rate is calculated by dividing the number of inadmissible travelers interdicted by the total number of inadmissible travelers who attempt to enter at a port of entry. inadmissible travelers who successfully enter at a port of entry without being detected. Therefore, DHS only presented data on the refusal rate. Limitations None identified. Additional information and planned actions by the Department of Homeland Security DHS projected that the department may be able to include estimates on the number of inadmissible travelers who successfully enter at a port of entry in its next Border Security Metrics Report to Congress. According to U.S. Customs and Border Protection (CBP) officials, they are in the process of reviewing data and program policies for CBP’s Compliance Measurement Examination program to determine if the program could be used as a means to reliably measure undetected inadmissible travelers, which would then be used in calculating the interdiction rate. Description This metric is a count of the amount in kilograms of illicit drugs seized by U.S. Customs and Border Protection officers at ports of entry. In an appendix to the report, the Department of Homeland Security listed out 34 different types of illicit drugs and the amounts seized for each for fiscal years 2007 through 2016. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations None identified. Additional information None. Description This metric is a rate that compares the amount of illicit drugs seized (in kilograms) by Office of Field Operations officials at ports of entry in 1 fiscal year to the average amount seized in the immediately preceding 5 fiscal years. the metric. The Department of Homeland Security provided rates for cocaine, methamphetamine, marijuana, and heroin for fiscal years 2012 through 2016. Limitations None identified. Additional information None. Description This metric is a count of the number of infractions related to travelers and cargo committed by major violators, and an estimate of the number of major infractions not interdicted. The Department of Homeland Security (DHS) calculated an infraction rate by dividing the number of major infractions by the total number of passengers at ports of entry for fiscal years 2007 through 2016. National Defense Authorization Act for Fiscal Year 2017 (NDAA). As an alternative, for the purpose of its report, DHS defined a major infraction as an arrest, including arrests related to terrorism, drugs, criminal aliens, and currency, among other things. DHS reported that it does not have a methodology in place to estimate the number of undetected major infractions. Therefore, only data on known infractions are included. DHS only included data for passenger infractions and not cargo-related infractions. Although not requested by the NDAA, DHS provided an infraction rate by dividing the number of known infractions by the total number of travelers at ports of entry. Limitations We identified: Given that DHS’s alternative approach to this metric involves using arrests as a proxy for major infractions, it is unclear whether there is a one-to-one correspondence between the arrest of a major violator and the number of infractions committed. Additional information According to U.S. Customs and Border Protection (CBP) officials, they plan to use data from CBP’s Compliance Measurement Examination program as a means to report estimated undetected major infractions starting with DHS’s fiscal year 2019 report. Description This metric is a rate that compares the amount of cocaine seized at land ports of entry to the total estimated flow of cocaine. the total flow of cocaine through land ports of entry. The Office of National Drug Control Policy produces annual estimates for total cocaine flow into the United States, but does not have a methodology to estimate the flow of cocaine through land ports of entry alone. Therefore, the estimates the Department of Homeland Security used included cocaine flow through all domains. According to the U.S. Drug Enforcement Administration’s National Drug Threat Assessment, the southwest border remains the key entry point for the majority of the cocaine entering the United States. Limitations None identified. Additional information None. Description This metric is a rate that compares the average wait time for vehicles to pass through a land port of entry to the total number of commercial and private vehicles at each land port of entry. data were not available for every port of entry, such as small ones with negligible wait times. Limitations We identified: We reported in July 2013 that commercial vehicle wait time data were unreliable due to inconsistent data collection processes at ports, and made two recommendations to DHS to improve the reliability of the data. While DHS implemented these recommendations in 2018, older data, including the data for the years presented in the report (fiscal years 2012 through 2016), remain unreliable. Additional information and planned actions by the Department of Homeland Security U.S. Customs and Border Protection (CBP) officials clarified that the wait times shown in the report reflect the average of all hourly recordings for wait times at ports of entry rather than the average passenger or vehicle experience because CBP did not report a volume-weighted measure of wait times. According to the report, CBP’s wait time policy is currently under review and new guidance will be issued in the future to account for improvements in automation and recording. Description This metric is a rate that measures traffic volume at land ports of entry against the physical and staffing capacity at each land port of entry. The Department of Homeland Security (DHS) calculated the average number of vehicles processed per booth, per hour at each land port of entry. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None. Limitations None identified. Additional information In addition to reporting utilization at each port of entry, DHS provided the average utilization rate for all northern border land ports of entry and all southern border land ports of entry. This metric is a rate that measures the frequency of secondary examinations at each land port of entry. The Department of Homeland Security (DHS) calculated the rate by dividing the recorded number of passengers sent for secondary inspection by the total number of recorded passengers at each land port of entry. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report DHS did not include data on secondary examinations of cargo or shipments. Limitations None identified. Additional information None. Description This metric is a count of the number of cargo containers at sea ports that DHS identified as potentially high-risk using National Targeting Center (NTC) security criteria. According to the Department of Homeland Security (DHS), all international cargo shipments coming to the United States are screened to identify potentially high-risk containers, which may then be reviewed, scanned, or physically inspected prior to lading at a port of entry. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations We identified: U.S. Customs and Border Protection (CBP) officials said that the process of defining and identifying “high-risk” shipments can exclude some shipments, such as those in free trade zones. Additional information DHS’s report said that the NTC periodically refines, improves, and revises the security criteria for high-risk shipments, which can affect the number of cargo shipments identified as high-risk. Description This metric is a rate comparing the number of potentially high-risk cargo containers scanned at each sea port of entry during a fiscal year to the total number of high-risk cargo containers that entered the United States at each sea port of entry during the previous fiscal year. separate from cargo containers that were reviewed or assessed; instead, DHS tracks these inspection methods collectively. Therefore, DHS also included data on potentially high-risk cargo containers that were reviewed or assessed as well as those that were scanned in its report. Limitations DHS identified: In its report, DHS noted that ratio data are not available for fiscal year 2014 because U.S. Customs and Border Protection did not collect comparable container-level data (as opposed to shipment-level data) in fiscal year 2013. DHS also noted that the totals across the ports or field offices may include duplicate container counts. We identified: NTC officials said that the definition of “high-risk” shipments excludes some shipments, such as those in free trade zones. NTC officials noted that assessing, reviewing, and scanning containers are different activities and reflect different levels of inspection or review. For example, NTC officials said that while all containers are “assessed” in order to determine their risk level, only higher risk containers may be scanned using radiation detection and nonintrusive inspection equipment. Consequently, when DHS included data on containers that were assessed or reviewed but not scanned, the resulting count was higher. In an appendix to its report, DHS presented a column of data called the “percentage of potentially high-risk containers scanned (same fiscal year)” for each fiscal year. Given DHS’s inability to separate data on the different inspection methods, the data in this column included containers that were reviewed by all inspection methods, not just scanning. In its appendix, DHS did not present data on the number of containers that “entered the United States,” even though it used those data to calculate the ratio and they are specified in the National Defense Authorization Act for Fiscal Year 2017. As a result, it is not possible to verify the accuracy of DHS’s ratio calculations. Additional information None. The U.S. maritime border domain encompasses ports, internal or inland waters, and coastal waters, as well as the territorial sea (waters 12 nautical miles seaward of the U.S. coast), contiguous zone (waters adjacent to and seaward of territorial sea and extending 24 nautical miles from shore), and exclusive economic zone (waters seaward of and adjacent to territorial sea and extending out to 200 nautical miles from shore). U.S. Coast Guard (Coast Guard), Air and Marine Operations, and U.S. Border Patrol share responsibility for patrolling the U.S. maritime borders, and territorial sea. The Coast Guard is a component of DHS and the lead federal maritime law enforcement agency on the high seas (waters beyond 12 nautical miles seaward of the U.S. coast) and all other waters under U.S. jurisdiction. The Coast Guard responds to a variety of maritime border security issues, including trafficking of narcotics, people, illicit goods, unlawful migration, illegal exploitation of natural resources, potential terrorist activities, and the disruption of maritime commerce. The metrics in this domain measure the number of migrants and illicit drugs removed, among other things. DHS included 4 of 6 metrics called for in the NDAA for this domain in its fiscal year 2017 Border Security Metrics Report, as shown in table 6. Description This metric was not specifically defined in the National Defense Authorization Act for Fiscal Year 2017 (NDAA). The NDAA described situational awareness as the knowledge and understanding of current unlawful cross- border activity, including (1) threats and trends concerning illicit trafficking and unlawful crossings, (2) the ability to forecast future shifts in such threats and trends, (3) the ability to evaluate such threats and trends at a level sufficient to create actionable plans, and (4) the operational capability to conduct persistent and integrated surveillance of the international borders of the United States. developing a measure for situational awareness in the maritime domain that meets the intent of the NDAA. While this effort is in process, DHS presented data on U.S. Coast Guard and U.S. Customs and Border Protection (CBP) asset (aircraft and cutter or boat) hours contributing to situational awareness or interdiction support and the number of vessel manifests screened. Limitations None identified. Additional information According to CBP Air and Marine Operations officials, they did not have confidence that the data for years prior to fiscal year 2016 were consistent enough for making comparisons across years. Consequently, only data for fiscal year 2016 were included in DHS’s report for the metrics related to CBP. Description This metric is a count of the total number of undocumented migrants interdicted, identified directly or indirectly but not interdicted, or otherwise believed to have unlawfully entered the United States through the maritime border. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations Department of Homeland Security (DHS) identified: The accuracy of migrant flow counts depends on partners to report interdictions and the ability to detect migrants. According to the DHS report, the U.S. Coast Guard relies on partners to report interdictions for compilation in the U.S. Coast Guard’s database. Interdictions may be double-counted by the U.S. Coast Guard and its partners because they cooperate during operations and some interdictions by partners may not get reported. Further, some migrants may not be apprehended and leave no evidence, and are therefore excluded from the known flow figures. We identified: According to U.S. Coast Guard officials, there is no centralized database for tracking migrant interdictions, and the decentralized nature of the data collection could lead to errors. Additional information According to the U.S. Coast Guard, about 90 percent of the data on migrant interdictions and flow originate from U.S. Coast Guard records. U.S. Coast Guard officials said that as part of a department-wide initiative to standardize illegal immigration statistics, they are in the preliminary stages of building a centralized database to enter and maintain information on migrant interdictions. Additionally, officials said they take steps to ensure the reliability of externally reported data such as communicating with partners and working together to reconcile any errors. Within the U.S. Coast Guard, meetings are held regularly to discuss and vet the accuracy of migrant flow data. Description This metric is a rate comparing the amount and type of illicit drugs removed by the Department of Homeland Security (DHS) maritime security components in any fiscal year, including drugs abandoned at sea, to the average amount removed or abandoned in the immediately preceding 5 fiscal years. by all DHS maritime security components, but DHS only provided data on removals by the U.S. Coast Guard. DHS did not explain in its report why it only included data from the U.S. Coast Guard. DHS officials said that the U.S. Coast Guard is the primary DHS component involved in this activity and was the only component that provided data for this metric, but this was not noted in the report. According to U.S. Coast Guard officials, some of the data for fiscal 2013 was misreported. Specifically, the quantity removed for methamphetamine should be 0 (report shows 17.4) while the value should be 7.9 kilograms for heroin (report shows 0). Additional information None. Description This metric is a rate comparing the amount of cocaine removed by the Department of Homeland Security (DHS) maritime security components inside and outside the maritime transit zone to the total documented cocaine flow rate. DHS used estimates of noncommercial maritime cocaine flow from the Consolidated Counter Drug Database, which are derived from intelligence reporting and case data. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations DHS identified: There is less robust intelligence on noncommercial maritime cocaine flow outside the transit zone than inside the transit zone, so data for outside the transit zone are not considered reliable. Precise cocaine flow estimates through a particular mode or domain can be difficult to obtain. In our prior work, officials with the Office of National Drug Control Policy and other departments and agencies involved in U.S. counternarcotics efforts told us that it is difficult to obtain precise estimates of cocaine flow because of the difficulty in obtaining specific information about the production of cocaine and how it gets to the United States. We have also previously reported that when confronted with threats to their activities, drug-trafficking organizations use a variety of techniques to quickly change their modes of operation, thus avoiding capture of their personnel and seizure of their illegal drugs. For example, when air interdiction efforts have proven successful, traffickers have increased their use of maritime and overland transportation routes. Additional information According to U.S. Coast Guard officials, DHS officials hold quarterly inter-agency meetings to review the reliability of performance data related to cocaine interdiction performance. Air and Marine Operations (AMO) is a federal law enforcement agency within CBP that interdicts unlawful people and cargo approaching U.S. borders, investigates criminal networks, and provides domain awareness in the air and maritime environments, among other things. The metrics in this domain measure AMO’s flight hours, individuals detected, and apprehensions, among other things. DHS included 7 of 8 metrics within this domain called for in the NDAA in its fiscal year 2017 Border Security Metrics Report, as shown in table 7. DHS reported that the “AMO actionable intelligence” metric was under review and estimated that the department would provide information on this metric in its 2019 annual report to Congress. Description This metric is a rate comparing the number of flight hour requirements to the number of flight hours flown by Air and Marine Operations (AMO) in the land domain. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. We identified: DHS used the terms “funded flight hours,” “unfunded flight hours,” and “unconstrained flight hours” in the report without clearly defining them. AMO officials stated that a definition of these terms will be included in the next report. Additional information AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a rate comparing the number of funded flight hours appropriated to Air and Marine Operations (AMO) to the number of actual flight hours flown. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. Additional information AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a rate comparing the number of aviation missions flown by Air and Marine Operations (AMO) to the number of aviation missions cancelled by AMO due to maintenance, operations, or other causes. the number of missions cancelled due to causes within AMO control, such as maintenance, personnel, and asset availability. However, the Department of Homeland Security (DHS) used the total number of mission requests, which also includes the number of missions flown in addition to the number of missions cancelled for reasons within AMO control. Limitations DHS identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. Additional information AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a rate comparing the number of missions cancelled by Air and Marine Operations (AMO) due to weather compared to the total planned missions. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. Additional information AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a count of the number of individuals detected by Air and Marine Operations (AMO) through the use of unmanned aerial systems and manned aircraft. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None identified. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. DHS data on detections from manned aircraft were limited to those that led to apprehensions and arrests, and data from unmanned aircraft were limited to the number of Vehicle and Dismount Exploitation Radar (VADER) detections. AMO did not track data from all sensors on unmanned and manned aircraft, and considers this metric to be a work in progress. We identified: In February 2017 we reported that some mission data (such as asset assists) for unmanned aerial systems were collected inconsistently across operation locations, which could affect the accuracy of the counts provided. We recommended that U.S. Customs and Border Protection—of which AMO is a component—update and maintain guidance for recording mission information in its data collection system, and provide training to users of the system. DHS completed implementation of these recommendations in July 2018. Although the recommendations have been implemented, this limitation is relevant because the data presented (for fiscal year 2016) were collected prior to their implementation. Additional information and planned actions by the Department of Homeland Security DHS expects to provide more comprehensive data for this metric in the next annual report. AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a count of the number of apprehensions assisted by Air and Marine Operations (AMO) through the use of unmanned aerial systems and manned aircraft. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. We identified: In February 2017 we reported that some mission data (such as asset assists) for unmanned aerial systems were collected inconsistently across operation locations, which could affect the accuracy of the counts provided. We recommended that U.S. Customs and Border Protection—of which AMO is a component—update and maintain guidance for recording mission information in its data collection system, and provide training to users of the system. DHS completed implementation of these recommendations in July 2018. Although the recommendations have been implemented, this limitation is relevant because the data presented (for fiscal year 2016) were collected prior to their implementation. Additional information In addition to the number of apprehensions assisted, DHS also provided the number of enforcement flight hours used for the assists. AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Description This metric is a count of the number and quantity of illicit drug seizures assisted by Air and Marine Operations (AMO) through the use of unmanned aerial systems and manned aircraft. Differences between the National Defense Authorization Act for Fiscal Year 2017 and the Department of Homeland Security’s report None. Limitations Department of Homeland Security (DHS) identified: Data prior to fiscal year 2016 were unavailable. According to AMO officials, this is because AMO did not collect these data prior to fiscal year 2016, or because older data were not comparable. We identified: In February 2017 we reported that some mission data (such as asset assists) for unmanned aerial systems were collected inconsistently across operation locations, which could affect the accuracy of the counts provided. We recommended that U.S. Customs and Border Protection—of which AMO is a component—update and maintain guidance for recording mission information in its data collection system, and providing training to users of the system. DHS completed implementation of these recommendations in July 2018. Although the recommendations have been implemented, this limitation is relevant because the data presented (for fiscal year 2016) were collected prior to their implementation. Additional information In addition to the drug seizures assisted (in pounds), DHS also provided the number of enforcement flight hours used for the assists. AMO officials said they have taken steps to improve how they track flight hour data, such as by adding new data fields to AMO’s system and providing training to staff. Based on findings from previous reviews of border security programs and efforts, we have recommended other metrics that the Department of Homeland Security (DHS) could use to help measure the effectiveness of border security. The tables that follow provide information about these recommended metrics in each of the four domains listed in the National Defense Authorization Act for Fiscal Year 2017—between ports of entry, at ports of entry, in the maritime border domain, and the air and marine security in the land domain. The recommendations listed in the tables below remain open; however, implementing them would provide DHS with additional indicators and metrics that could provide important insights into the state of border security. In addition to the contact named above, Taylor Matheson (Assistant Director), David Alexander, Kelsey Burdick, Lilia Chaidez, Kathleen Donovan, Michele Fejfar, Sally Gilley, Christopher Hatscher, Eric Hauswirth, Mikaela Meyer, Sasan J. “Jon” Najmi, Kevin Reeves, and Jeff Tessin made key contributions to this report.", "summary": "According to DHS, the United States has approximately 6,000 miles of land borders, 95,000 miles of coastline, and more than 300 ports of entry where travelers and cargo are inspected and processed for entry. Securing U.S. border areas is a key part of DHS's mission, and the department's ability to measure its border security efforts is essential for it to manage its responsibilities effectively and efficiently. The NDAA for Fiscal Year 2017 requires DHS to report annually on 43 border security metrics. DHS issued its first report in May 2018. The Act also includes a provision for GAO, within 270 days of receipt and biennially for the following 10 years, to review and report on the data and methodology contained in DHS's report. This report assesses the extent to which DHS: (1) reported metrics as outlined in the NDAA using quality information; and (2) validated assumptions and conveyed statistical uncertainty for unlawful entry metrics, among other objectives. GAO assessed the methodology and data in DHS's report, analyzed DHS's use of statistical models, and interviewed officials from DHS offices and components involved in developing the metrics. The Department of Homeland Security (DHS) reported on 35 of 43 metrics called for by the National Defense Authorization Act (NDAA) for Fiscal Year 2017 (see figure); it generally used quality information, but did not identify some data limitations. GAO found that about half of the 35 metrics generally included elements as called for by the NDAA, while 17 metrics differed, such as in scope or calculation. For example, DHS only provided information on the southwest border for some metrics, such as the estimate of undetected unlawful border crossers for which a methodology for estimating unlawful crossings for the northern border had not yet been completed. DHS components responsible for collecting the metric data generally have processes in place to ensure the reliability of the data and the quality of the information provided. DHS also identified and disclosed limitations for some, but not all, of the data elements and metrics used. For example, GAO found that DHS did not disclose limitations on data related to apprehensions of individuals that were assisted by unmanned aerial systems. By developing and implementing a process to systematically review the reliability of the data and comprehensively identify and communicate limitations, DHS would improve the quality of the information provided. DHS used a statistical model to estimate three metrics on unlawful border entries but did not validate some assumptions the model employs through sensitivity analyses and provide measures of statistical uncertainty in accordance with standards for federal agencies. For example, DHS's model assumes that 100 percent of families unlawfully crossing the border will be apprehended, but DHS did not provide information on the extent to which the assumption affected its metrics. DHS also did not provide information on the level of statistical uncertainty for the metrics, such as margins of error. Providing such information would allow Congress and the public to better understand the potential limitations and accuracy of these metrics of unlawful entry. Additionally, DHS's statistical model, which is based on Mexican adults not seeking asylum, represents a small and declining share of those apprehended at the border and DHS is developing a new model to account for current border conditions. GAO is making four recommendations, including that DHS develop and implement a process to systematically review the reliability of metric data, identify and communicate limitations of the metrics, and include the results of sensitivity analyses and measures of statistical uncertainty for metrics derived from statistical models. DHS concurred with the recommendations.", "document_type": "gao"}
{"report": "Beneficiaries have several Medicare options from which to select, which can have important consequences for their out-of-pocket expenses and access to care. These decisions include the following: What type of coverage? The first coverage decision faced by Medicare beneficiaries is choosing between original Medicare or MA. Original Medicare includes coverage for Medicare Part A services, such as inpatient hospital stays, and for Medicare Part B services, such as outpatient hospital care and physician office visits. Under MA—the private plan alternative to original Medicare—beneficiaries enroll in MA plans that generally must provide coverage for all the services included under original Medicare, and may also offer extra benefits. MA plans generally establish a network of health care providers to provide services to enrolled beneficiaries. Add prescription drug coverage? Beneficiaries in original Medicare and those in certain MA plans may also choose whether to add prescription drug coverage (Medicare Part D). Prescription drug plans are administered by private insurance companies that contract with CMS. Beneficiaries in original Medicare obtain drug coverage by purchasing a separate prescription drug plan (PDP), while those in MA generally obtain coverage by selecting a MA plan that offers prescription drug benefits. MA prescription drug plans and separate PDPs vary in the amount beneficiaries need to pay and in the drugs that are covered. Add supplemental coverage? Beneficiaries in original Medicare can also purchase Medicare supplemental insurance—known as Medigap plans—offered by private insurance companies. These plans help pay for Medicare’s required cost sharing and some out-of-pocket costs not covered under original Medicare, such as emergency health care during international travel. Figure 1 illustrates the decisions beneficiaries have to make when selecting their Medicare coverage options. Two research studies we reviewed indicate that cost is a key consideration for Medicare beneficiaries when selecting Medicare coverage. Beneficiaries may want to know what their likely out-of-pocket costs will be monthly, annually, or both. Beneficiaries may also want to know what their costs may be if they have a change in health status, such as by experiencing an illness. Beneficiaries may be responsible for several specific types of health care costs, including the following: Premiums—Beneficiaries generally make monthly payments to purchase coverage. Medicare Part A generally does not require beneficiaries to pay a premium. Part B premiums are established by statutory formula and are means-tested so that beneficiaries with higher incomes pay higher premiums. The premiums charged by MA plans and Part D plans are established by each plan and can vary widely. Beneficiaries in original Medicare who opt to purchase Medigap will also pay a monthly premium for coverage, with the amount of the premium varying across the 10 standardized plans and by the different companies offering these plans. Cost sharing—Beneficiaries are typically responsible for paying a portion of the costs for the services they receive as either a copayment or coinsurance. A copayment is a fixed dollar amount for each doctor visit, medical service, or medication. With coinsurance, a beneficiary pays a percentage of the allowed charge for each health care service or medication. Deductibles—Beneficiaries must pay out-of-pocket a specified annual amount of expenses before Medicare will begin paying for approved services or medications. MA plans establish out-of-pocket maximums or set limits on the amount a beneficiary will have to spend a year. In contrast, original Medicare has no limit on beneficiary out-of-pocket costs. In 2019, two Medigap plans provide maximum out-of-pocket limits, and beneficiaries with these plans do not have to pay costs above the limits. The same two research studies identified access to particular health care providers as another key consideration for beneficiaries when selecting Medicare coverage. Beneficiaries in original Medicare may see any doctor or use any facility that accepts Medicare payment, and referrals are not needed to see specialists. In contrast, MA beneficiaries must typically use the MA plan’s network of health care providers, including doctors, hospitals, and outpatient facilities, and referrals are generally needed to see specialists. Further, beneficiaries in MA plans that allow access to out-of-network providers may be required to pay more when receiving services from such providers. MA provider networks can change during the year and from year to year. According to CMS officials, MPF was launched in 1998 in response to the Balanced Budget Act of 1997, which required the Department of Health and Human Services—the agency responsible for overseeing CMS—to maintain MA plan information on the internet, among other things. According to CMS, MPF is a primary CMS resource for beneficiaries to compare costs and coverage of different Medicare health and prescription drug coverage options in their area, including comparing original Medicare to MA plans, and Part D plans. As illustrated in figure 2, the MPF landing page—the first web page users see when accessing MPF— includes a section where beneficiaries start the process of searching for and comparing coverage options (see A in fig. 2), and a section providing links to additional decision support tools for beneficiaries (see B in fig. 2). Beneficiaries begin searching in MPF by entering their zip code and following a 4-step process that moves them through different MPF website pages. Step 1—Basic search: Beneficiaries provide responses to requested information, including identifying whether they have Medicare coverage and whether they would like to add prescription drug coverage to their search. Step 2—Enter drugs: Beneficiaries may add a list of prescription drugs, along with the dosage and dosing frequency, to identify which plans cover these drugs and the cost sharing amount under each plan. Step 3—Select pharmacies: Beneficiaries select up to two pharmacies that they prefer for obtaining their medications. Step 4—Refine plan results: Beneficiaries see a list of available coverage options—original Medicare, MA plans, and separate PDPs—based on the zip code they entered. Beneficiaries can filter these search results by variables such as monthly premium or deductible amounts, and then they can sort those results by variables such as lowest estimated annual costs or lowest plan deductible. Beneficiaries can then select up to three choices, view specific coverage and cost details for each, and do a detailed side-by-side comparison of each. The plan results page shows this comparison and includes beneficiaries’ estimated annual out-of- pocket costs for each coverage option they choose to review. The additional decision support tools available on the MPF landing page that beneficiaries may use to help select their Medicare health and drug coverage include the following: 1. Help with Your Medicare Choices, which uses filtering questions to help new beneficiaries understand their Medicare coverage choices; 2. Estimate Medicare Costs, which helps beneficiaries compare the average estimated costs of original Medicare options, such as original Medicare with a prescription drug plan and a Medigap plan, to the costs of MA with prescription drug coverage; and 3. Find and Compare Medigap Policies, which helps beneficiaries find information on the different standardized Medigap plans offered by zip code. Since its inception, MPF has undergone many modifications as new parts were added to the Medicare program, such as the addition of Medicare Part D. According to CMS officials, the agency has also taken steps to make additional changes to improve the website, including technology updates to improve system stability and performance, such as page load times and error rates. In addition, CMS seeks feedback from stakeholders, such as the customer service representatives at the 1-800- MEDICARE help line, SHIP personnel, and others, which according to agency officials, has resulted in additional changes. Changes have included allowing beneficiaries to log into their Medicare account to access some of their existing data, such as their prescription drugs, and the addition of a help feature that can connect beneficiaries to 1-800- MEDICARE customer service representatives for live help. Stakeholders, research studies, and SHIP directors responding to our survey generally indicated that MPF is difficult for beneficiaries to navigate and understand. All 13 stakeholder groups we interviewed reported that MPF is challenging for Medicare beneficiaries to use. Specifically, most stakeholders cited difficulty navigating as beneficiaries click through multiple complex pages in order to find and compare coverage options. For example, two stakeholders noted that beneficiaries must answer questions about their current Medicare health and drug coverage and then go through a series of pages and steps before they can view detailed information on their coverage options. One of these stakeholders also told us that MPF navigation is cumbersome because users cannot jump directly to certain pages or sections that address their needs, such as viewing the availability of preferred pharmacies. One of the stakeholders we interviewed also noted the lack of prominent instructions on how to use MPF contributed to difficulties navigating the four steps. Finally, in our interviews two stakeholders also noted that navigation is difficult because beneficiaries are uncertain of the information needed to make different comparisons or identify specific plans. For example, the ability to filter and sort plan information does not appear until later in the plan search process, where users are refining plan results. This makes it hard for users to narrow options specific to their needs because they first must go through all the options presented. Specifically, beneficiaries will first see a list of plans available in their zip code—on average 24 plans—and then must narrow down that list before they can compare up to three selected plans. A 2018 report conducted jointly by two advocacy groups cited difficulties locating the filter and sort functions in MPF, which contributed to navigation problems. CMS user testing conducted on MPF found that overall beneficiaries are confused about how to find a MA plan on MPF. For example, this testing showed that some users had difficulties with the steps for refining plan results because they overlooked or ignored the filters. A 2017 CMS study noted that MPF navigation is difficult and is better suited for specialist users who assist beneficiaries in determining their coverage options, such as 1-800 MEDICARE customer service representatives and SHIP counselors. Further, CMS officials said the study found that beneficiaries would benefit if navigation through the site were more tailored to the tasks they were undertaking. Our survey of SHIP directors, who provide assistance to Medicare beneficiaries and therefore are familiar with MPF usability, also found that it is difficult for beneficiaries to navigate and find information. Specifically, 73 percent (29 of 40) of the SHIP directors who responded to our survey reported that it is difficult or very difficult for beneficiaries to find information in MPF. While SHIP directors reported that it is easier for SHIP counselors to find information, they noted that some also experience difficulty. Eighteen percent (7 of 40) SHIP directors reported that it is difficult for SHIP counselors to find information in MPF. (See fig. 3.) In addition to website navigation, it is also difficult for beneficiaries to understand the information in MPF, according to stakeholders, research studies, and SHIP directors responding to our survey. All seven beneficiary advocacy groups interviewed reported that beneficiaries find it challenging to understand information in MPF. For example, some stakeholders noted that beneficiaries do not always understand terminology, such as the differences between cost sharing, copayment, and out-of-pocket costs. Most stakeholders also noted that beneficiaries struggle to understand cost estimates and interpret how much they will have to pay. CMS user testing of MPF in 2018 found that beneficiaries were overwhelmed by the number and complexity of options from which they had to choose. According to a 2018 research study conducted by two advocacy groups, the website explains health coverage terminology poorly and does not use plain language. As a result, users with low health insurance literacy may not understand, for example, the cost differences between generic versus brand-name drugs. Sixty-five percent (26 of 40) of the SHIP directors we surveyed reported that the information in MPF is difficult or very difficult for beneficiaries to understand, while 23 percent (9 of 40) reported that it is difficult for SHIP counselors to understand information (see fig. 4). SHIP directors identified health coverage terminology as a challenge, with 38 percent (15 of 40) reporting that MPF does a poor or very poor job explaining health coverage terminology, such as non-network providers, drug formularies, and drug tiers to beneficiaries. MPF provides incomplete estimates of beneficiaries’ costs under original Medicare, making it difficult to compare coverage options, according to stakeholders and SHIP directors responding to our survey. The cost estimates on the plan results pages are incomplete because they do not include the effect of Medigap—which helps cover beneficiaries’ cost sharing responsibilities under original Medicare. As a result, beneficiaries who want to use MPF to compare original Medicare with a Medigap plan to specific MA plans are unable to do so. Most—4 of 7—beneficiary advocacy group stakeholders that we interviewed noted that beneficiaries must leave MPF to obtain information about Medigap plans, such as the specific benefits covered under those plans and their estimated costs. Six of seven beneficiary advocacy groups that we interviewed noted that MPF’s incomplete information on estimated beneficiary costs is a concern because beneficiaries need this information for understanding and comparing their Medicare options. CMS’s other coverage decision support tools—Help with Your Medicare Choices and Estimate Medicare Costs—provide general information intended to help beneficiaries understand and compare their Medicare options. However, these tools are separate links; their information is not included on the plan results pages in MPF. The SHIP directors we surveyed also noted lack of information as a concern, with 75 percent (30 of 40) reporting that the lack of Medigap information in MPF limits the ability of beneficiaries to compare original Medicare and MA plans. Further, SHIP directors surveyed reported more general concerns with MPF’s cost estimates, with 80 percent (32 of 40) reporting that improvements are needed to better estimate total annual beneficiary costs, and 63 percent (25 of 40) of the SHIP directors reporting that MPF does a poor or very poor job comparing the costs of original Medicare to MA. Stakeholders and SHIP directors responding to our survey reported that MPF also provides incomplete information on MA plan provider networks. According to a CMS-sponsored study, determining if specific providers are in an MA plan provider network is a key factor for beneficiaries when making coverage decisions, and beneficiaries stated in user testing that they must have this information. However, to obtain information on the providers in specific MA plans, MPF users must exit the website and go to the individual plan websites. Most stakeholders—10 of 13—cited the lack of information on provider networks as a shortcoming for beneficiaries in using MPF to select a plan, with one group stating that MPF users may need to call individual plans to determine if providers are in a plan’s network. SHIP directors also cited this issue as a problem, as 85 percent (34 of 40) who responded to our survey reported that the lack of a provider directory limits MPF as a resource for beneficiaries to compare MA plans. Without provider information, beneficiaries are not able to use MPF to narrow their options to MA plans that include desired providers or make comparisons among these plans. According to CMS officials, the agency is redesigning MPF to make it more usable for beneficiaries and is planning to release the redesigned MPF in early August 2019. With the redesign, CMS plans to improve the navigation of MPF by providing more prominent explanations on how to use MPF; reducing the steps users must take to get to more detailed coverage information; configuring MPF so users can more easily switch between different topics inside MPF, such as switching between MA plan information and Part D plan information; and improving the filter and sort functions so users can narrow down their coverage options more quickly. CMS also plans to make information easier to understand by simplifying and reducing the volume of information on the pages and revising frequently misunderstood terms with more user-friendly language. As part of the redesign, CMS is also taking steps to provide more complete cost information in MPF to help compare coverage options, according to agency officials. CMS plans to provide more information to the redesigned MPF to help beneficiaries understand their coverage options and decide whether original Medicare or MA is right for them. CMS officials also told us in June 2019 that the redesigned MPF will allow beneficiaries to do estimated cost comparisons of MA to all their original Medicare options, such as original Medicare with a Medigap plan and a prescription drug plan. Officials also told us that CMS is incorporating the functionality of the additional decision support tools currently available on the MPF landing page—Help with Your Medicare Choices and Estimate Medicare Costs—into the redesigned MPF to help beneficiaries understand their coverage options and compare their estimated costs across these options. In June 2019, CMS officials stated these additional tools will also continue to appear as separate links on the MPF landing page. CMS officials also told us that they are currently examining how to integrate MA plan provider information, but this is not part of the redesigned MPF being released in August 2019. The officials said they are working with the plans to develop requirements to help support the integration of provider directories into future versions of MPF. According to CMS, the redesign of MPF is not finalized and CMS will continue to evaluate the extent to which the changes will make MPF easier for beneficiaries to use and whether it provides complete information for making coverage decisions. As of June 2019, CMS officials told us they are continuing to gather feedback from stakeholders, such as 1-800-MEDICARE customer service representatives and SHIP personnel, and conduct user testing on a redesigned MPF model. CMS then plans to publicly launch the redesigned MPF to a subset of users in early August 2019. Once launched, CMS plans to incorporate feedback from this subset of users to confirm the core features that will be released in the redesigned MPF prior to the Medicare open enrollment period starting October 15, 2019. According to CMS officials, the development of the redesigned MPF is an incremental process that will involve continuous changes based on feedback and user testing. According to the agency, CMS will know more about how well the redesigned MPF addresses user needs after it is used by beneficiaries. We provided a draft of this report to the Department of Health and Human Services for review and comment. The Department of Health and Human Services provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contact named above, Tim Bushfield, Assistant Director; Maggie G. Holihan, Analyst-in-Charge; Sylvia Diaz Jones; Anne Hopewell; Dennis A. Antonio; and Dan Ries made key contributions to this report. Also contributing were Cathy Hamann, Krister Friday, Ethiene Salgado-Rodriguez, Julie Flowers, and Jennifer Rudisill.", "summary": "Medicare beneficiaries—more than 60 million as of 2019—have a series of decisions to make when selecting their Medicare health and prescription drug coverage. Beneficiaries must first choose between two main options for their Medicare coverage: either original fee-for-service Medicare or MA. Within these two options, beneficiaries have many additional choices, and they are permitted to change their coverage at least annually. These selections can be difficult due to the Medicare program's complexity and can have important implications for beneficiaries' out-of-pocket costs and access to providers. According to CMS, the MPF website is intended to help beneficiaries make informed decisions regarding their health care and prescription drug coverage. However, some stakeholders have raised concerns that beneficiaries experience challenges using MPF to compare their Medicare coverage options. GAO was asked to review MPF. This report examines what is known about the usability of MPF and the completeness of its information. GAO reviewed research and CMS documentation on MPF, and surveyed 51 directors of SHIP offices that have counselors who assist beneficiaries with Medicare decisions. Forty SHIP directors completed the survey, resulting in a 78 percent response rate. GAO also interviewed CMS officials and officials with 13 stakeholder groups, including seven beneficiary advocacy groups. GAO provided a draft of this report to the Department of Health and Human Services. The department provided technical comments, which GAO incorporated as appropriate. The Medicare Plan Finder (MPF) website—a primary resource for comparing Medicare coverage options—is difficult for beneficiaries to use and provides incomplete information, according to stakeholders and research studies. These sources and directors of State Health Insurance Assistance Programs (SHIP) GAO surveyed—who assist beneficiaries with their Medicare coverage choices—reported that beneficiaries struggle with using MPF because it can be difficult to find information on the website and the information can be hard to understand. For example, MPF requires navigation through multiple pages before displaying plan details, lacks prominent instructions to help beneficiaries find information, and contains complex terms that make it difficult for beneficiaries to understand information. In response to GAO's survey, 73 percent of SHIP directors reported that beneficiaries experience difficulty finding information in MPF, while 18 percent reported that SHIP counselors experience difficulty. Stakeholders and SHIP directors reported that MPF provides incomplete estimates of costs under original Medicare, making it difficult to compare original Medicare and Medicare Advantage (MA), the program's private heath plan alternative. Specifically, MPF's plan results pages do not integrate information on Medigap plans. (These plans help cover some of beneficiaries' out-of-pocket costs.) Seventy-five percent of the SHIP directors surveyed reported that the lack of Medigap information in MPF limits the ability of beneficiaries to compare original Medicare to MA. The Centers for Medicare & Medicaid Services (CMS)—the agency that administers MPF—is aware of the difficulities beneficiaries face using MPF and is planning to launch a redesigned website in August 2019. According to CMS, redesigning MPF involves multiple iterations of changes and ongoing user testing, and CMS will know more about how well the redesigned MPF addresses user needs after it is used by beneficiaries.", "document_type": "gao"}
{"report": "The government can choose from a wide selection of contract types to acquire the variety and volume of supplies and services agencies require to meet their needs. Contract types vary according to the degree and timing of the responsibility assumed by the contractor for the costs of performance, and the amount and nature of the profit incentive offered to the contractor for achieving or exceeding specified standards or goals. The primary contract types described by the Federal Acquisition Regulation (FAR) fall into two broad categories—cost-type and fixed- price-type—and table 1 summarizes key features of each. As illustrated in figure 1, within these categories the specific contract types range from cost-plus-fixed-fee, in which the contractor has minimal responsibility for the performance costs and the negotiated fee (profit) is fixed, to firm-fixed-price, in which the contractor has full responsibility for the performance costs and resulting profit (or loss). In between are the various incentive contracts, under which the contractor’s responsibility for the performance costs and the profit or fee incentives offered are tailored to the uncertainties involved in contract performance. For contracts with incentive fees or profits, the amount of fee or profit payable is related to the contractor’s performance, and generally involves an objective evaluation by the government of the contractor’s performance toward cost, schedule, or technical goals. Award fees, on the other hand, typically emphasize multiple aspects of contractor performance that are more subjectively assessed, such as the contractor’s responsiveness, technical ingenuity, or cost management. Furthermore, the basic types of contracts may be used in combination, with both fixed-price-type and cost-type contract line item numbers, unless otherwise prohibited. For example, a firm-fixed-price contract may have a cost-type line item for travel. The FAR states that selecting the contract type is generally a matter for negotiation and requires the exercise of sound judgment by the contracting officer. Negotiating the contract type and negotiating prices are closely related and should be considered together. The objective is for the government to negotiate a contract type and price (or estimated cost and fee) that will result in reasonable contractor risk and provide the contractor with the greatest incentive for efficient and economical performance. As also noted in the FAR, the government usually assumes greater risk in its contracts for more complex requirements, particularly those unique to the government. This is especially true for complex research and development contracts, where performance uncertainties or the likelihood of changes make it difficult to estimate performance costs in advance. Cost-type contracts are suitable for instances when uncertainties about contract performance do not allow accurate enough cost estimates to use a fixed-price-type contract—in other words, when programs choose to accept more risk. The level of risk drives the contract type chosen, with the contract then reflecting the risk of the work. DOD programs may use different contract types across the life of the MDAP. For example, DOD guidance notes that the preferred contract type for development efforts is cost-type, and requires particular consideration of fixed-price-incentive contracts for acquisitions moving from development to production. Consistent with the FAR, DOD guidance also notes that firm-fixed-price production contracts may be in the government’s best interest once costs have become stable. DOD and Congress have encouraged use of fixed-price-type contracts where appropriate. For example, DOD’s Better Buying Power initiative, which started in 2010, called for increased use of fixed-price-incentive contracts for programs transitioning from development to production. In addition, the National Defense Authorization Act (NDAA) for Fiscal Year 2017 required DOD to establish a preference for fixed-price-type contracts in the determination of contract type and specified approval requirements for use of cost-type contracts above certain dollar thresholds. Congress has also limited DOD’s ability to use cost-type contracts to acquire production units absent congressional notification. Our prior work contains many recommendations related to incentive-type contracts. For example, in March 2017 we recommended that the Navy remind contracting officials to follow guidance on documenting the rationale for using fixed-price-incentive contracts, and in April 2017, the Navy issued a memorandum addressing this issue. In July 2017 we recommended that DOD collect and analyze data to determine the extent to which incentive contracts achieved desired outcomes. While DOD agreed with the recommendation and developed a template for the military departments to use to collect relevant information, it is still gathering updates from the military departments about the status of this effort. DOD acquires MDAPs through the Defense Acquisition System, which implements an adaptive acquisition framework that allows DOD officials to develop acquisition strategies and employ acquisition processes that match the characteristics of the capability being acquired. The pathway for acquiring major capabilities generally includes four phases, three of which we focus on in this report: (1) technology maturation and risk reduction; (2) engineering and manufacturing development; and (3) production and deployment. Programs typically complete a series of milestone reviews and other key decision points that authorize entry into a new acquisition phase, as illustrated in figure 2. These milestones also typically mark critical contract award decisions. For example, the Milestone B decision commits the resources, including authorizing award of the program’s development contract, needed to conduct development leading to production. Milestone C represents the decision to move forward with initial production, including award of the initial production contract. A number of officials and agencies are involved in DOD’s choice and monitoring of MDAP contracts. Milestone decision authority: The designated individual with overall responsibility for the program who, at the time of key milestone reviews, approves the acquisition strategy with specified contract types. In approving the acquisition strategy, this individual must ensure that the strategy considers how to manage risk and how the contract type selected relates to the level of program risk in each acquisition phase. This individual is to use the acquisition strategy to assess the viability of the proposed approach, ensuring that it clearly explains how it is to be implemented with available resources, and is tailored to address program requirements and constraints. Milestone decision authority for most MDAPs now resides with the military departments following a reform enacted in the NDAA for Fiscal Year 2016. Prior to this reform going into effect, a position within the Office of the Secretary of Defense typically served as the milestone decision authority for MDAPs until they entered the production and deployment phase. Following a reorganization of the Office of the Secretary of Defense enacted in the NDAA for Fiscal Year 2017, the USD(A&S) now serves as milestone decision authority for a small number of MDAPs, such as the F-35 program. For other MDAPs, the following officials serve as milestone decision authority within the military departments: the Assistant Secretary of the Air Force (Acquisition, Technology, and Logistics); the Assistant Secretary of the Army (Acquisition, Logistics, and Technology); and the Assistant Secretary of the Navy (Research, Development, and Acquisition). Program manager: The designated individual with responsibility for and authority to accomplish program objectives for development, production, and sustainment to meet user operational needs. The program manager plans acquisition programs, prepares programs for key decisions, and executes approved acquisition and product support strategies. Contracting officer: The individual with the authority to enter into, administer, or terminate contracts and make related determinations and findings. Contracting officers are responsible for ensuring performance of all necessary actions for effective contracting, ensuring compliance with the terms of the contract, and safeguarding the interests of the United States in its contractual relationships. In order to perform these responsibilities, contracting officers are allowed wide latitude to exercise business judgement. Defense Contract Management Agency (DCMA): The entity that provides contract administration services for most DOD buying activities. Its contract management offices work with defense contractors to help ensure they deliver goods and services that meet performance requirements on time and at projected cost. Supervisor of Shipbuilding, Conversion and Repair (SUPSHIP): The entity that is the Navy’s on-site technical, contractual, and business authority for the construction of Navy ships. SUPSHIPs are co-located with the nation’s major shipbuilders and oversee the construction of every Navy ship, from patrol craft to the Navy’s most complex surface combatants and nuclear submarines and aircraft carriers. In addition to serving as milestone decision authority for certain MDAPs, USD(A&S) is responsible for improving outcomes by gathering and distributing best practices and lessons learned across the military departments. One such mechanism related to contract type choice, established in 2008, was mandatory preaward peer review—conducted by DPC, an office within USD(A&S)—for solicitations and contracts valued at over $1 billion and noncompetitive procurements over $500 million. For these competitive procurements, DPC conducted phased peer reviews prior to three events—issuance of the solicitation, issuance of the request for final proposal revisions, and contract award. The peer review teams—composed of senior DOD contracting leaders and officials from other military departments, and whenever possible comprising the same personnel across the three phases—discussed contract type and structure, and reviewed key program documentation such as acquisition strategies. Upon completion of a review, the team provided its findings and recommendations to the contracting officer, among other officials. However, in August 2019, DPC announced that it would no longer conduct peer reviews for most competitive procurements above $1 billion. Further details of this change are discussed later in this report. While the individual military departments have distinct requirements for the weapon systems they acquire, they also on occasion procure similar types of platforms, and use the same relatively small pool of contractors. For example, the Air Force and Navy both purchase fighter aircraft, and all three military departments buy missile systems. In 2019, we analyzed the 183 major development and procurement contract awards for MDAPs reported by DOD at that time, and found that almost half went to five corporations and entities connected with them, constituting 72 percent of the dollars associated with those contracts. From fiscal year 2011 through fiscal year 2019, a small proportion—an average of less than one-fifth—of obligations for programs in DOD’s portfolio of MDAPs was on cost-type contracts, although this proportion varied across the military departments. The remainder were on fixed- price-type contracts, split between firm-fixed-price and fixed-price- incentive, as illustrated in figure 3. Figure 4 illustrates the proportion of obligations by contract type for each of the military departments across the 9-year period. The Air Force made the most use of cost-type contracts, at an average of around one-quarter of obligations. While the Army made the least use of cost-type contracts, it made the most use of firm-fixed-price contracts. The Navy made the most use of fixed-price-incentive contracts. We have previously reported that the Navy has generally used cost-type contracts for lead ships and fixed-price-incentive contracts for follow-on ships. We found that the choice of cost-type contracts for MDAPs by contracting officers is based on assessments of program risk and uncertainty, underpinned by a number of statutory, regulatory, and policy provisions. Risk assessment also drives the application of additional reporting and surveillance requirements—designed to help the program office monitor cost and schedule performance—once DOD has awarded a cost-type contract for an MDAP. A range of statutory, regulatory, and policy provisions emphasize the importance of considering program risk and uncertainty when planning acquisitions and determining contract types for MDAPs. These provisions guide the decisions of contracting officers when choosing contract type and establish documentation requirements such as acquisition strategies. Table 2 describes key provisions related to program risk and uncertainty. Contracting and program officials, among others, collaborate and determine the appropriate contract type based on assessments of risk, considering factors such as availability of historical contract information, use of new technologies, cost stability, and the level of definition of requirements, such as software. In arriving at these determinations, officials we met with noted the importance of contracting officers having experience using a range of contract types. The seven MDAP cost-type contracts included in our review had documented rationales for their choice that all indicated areas of risk and uncertainty, addressing provisions noted in table 2. For example, four were development contracts, and FAR Part 35 states that the use of cost- type contracts for research and development is usually appropriate given the absence of precise specifications and difficulties in accurately estimating costs. The other three cost-type contract rationales noted that, consistent with the FAR, uncertainties in contract performance did not allow for costs to be estimated with sufficient accuracy to use a fixed- price-type contract. Table 3 summarizes these rationales. Contract types that shift more risk onto the government—including cost- type contracts—and exceed certain dollar thresholds have additional contractual reporting requirements. These requirements are designed to help the program office to monitor cost and schedule performance. In order to receive a cost-type or incentive contract valued at $20 million or more, a contractor must have an earned value management (EVM) system that complies with certain guidelines. These systems integrate the scope of work with cost, schedule, and performance elements to support project planning. They also provide program offices with monthly contract performance reports that include cost and schedule status and risks. Our prior work contains recommendations related to DOD’s use of EVM. For example, in 2009 we recommended that DOD modify policies governing EVM to ensure they addressed a number of weaknesses we had identified. In response, DOD developed and incorporated into its program management curricula a new EVM training course. Among the duties of two specialized government contract administration agencies—DCMA and SUPSHIP—are the review and approval of contractor EVM systems, and ongoing surveillance of data generated by the systems. The regular reports provided to program offices by these agencies include EVM data and analysis and highlight areas of concern and contract performance risk. In addition to use of EVM data, contracting officials from the seven cost- type MDAP contracts included in our review noted the importance of regular interactions between DOD—whether the program office, DCMA, or SUPSHIP—and the contractor in order to proactively identify drivers of cost or schedule overruns. These interactions can range from day-to-day tracking to comprehensive quarterly reviews. Several officials also noted the importance of having DCMA and SUPSHIP representatives on-site at contractor facilities, overseeing the contract and communicating with the contractor. Our analysis of program cost and schedule outcomes for 21 MDAPs did not find a clear relationship between these outcomes and the contract type used. DOD’s current portfolio of MDAPs contains a total of 85 programs. The 21 MDAPs in our review are the non-shipbuilding subset of the 85 that, as of January 2019, had completed system development, held a critical design review, and started production. Thus, these 21 programs are sufficiently far along the acquisition process that we can analyze their cost and schedule outcomes. We found that they demonstrated a range of cost and schedule performance, regardless of contract type chosen. Table 4 notes the contract types used for these MDAPs as well as unit cost and schedule change between each program’s first full estimate and our most recent in-depth assessment of the program as of May 2019. As reflected in the table, all but four of the MDAPs used some mix of cost-type and fixed-price-type contracts. Performance varied widely for programs using cost-type contracts at some stage, with unit cost change varying from 44 percent reduction to 183 percent growth, and schedule change varying from zero to 146 percent growth. In addition, while two of the three programs that used only fixed-price-type contracts had unit cost reductions, they also experienced schedule growth of over 40 percent. Programs generally made greater use of cost-type contracts than fixed-price-type contracts during development, and greater use of fixed-price-type contracts during procurement, as knowledge built over time. While we did not find a clear relationship between contract type and cost and schedule performance, we have found a relationship between improved outcomes and implementation of certain knowledge-based acquisition practices on these 21 programs. These are practices identified in our body of prior work that ensure a high level of knowledge is achieved at key junctures in development. We apply these practices as criteria in weapon system reviews, including our annual assessment of weapon systems. As shown in table 5 and based on analysis of the 21 programs, in general MDAPs that implemented certain knowledge practices—thus reducing risk—before the start of system development and critical design review had better unit cost and schedule outcomes than those that did not. The first such practice—completing preliminary design review before system development start—means that a program has held a review that assesses the maturity of the preliminary design, supported by the results of activities including prototyping and critical technology demonstrations. The second practice—release of at least 90 percent of drawings by critical design review—refers to the design drawings released or deemed releasable to manufacturing by that point. Our prior work has shown that establishing a sound business case is essential to achieving better program outcomes. A solid, executable business case provides credible evidence that the warfighter’s needs are valid and can best be met with the chosen concept. The business case should also demonstrate that the chosen concept can be developed and produced within existing resources such as technologies, design knowledge, funding, and time. At the heart of a business case is a knowledge-based approach, in which knowledge supplants risk over time. Establishing a business case calls for a realistic assessment of risks and costs; doing otherwise undermines the intent of the business case and invites failure. Over the years, we have identified a number of factors that undermine business cases and drive cost and schedule overruns, several of which are illustrated in figure 5. Undesirable outcomes such as cost and schedule growth reflect decisions made to move forward with programs before the knowledge needed to reduce risk and make those decisions is sufficient. For example, we have previously found that the majority of cost growth occurs after production start, which may be a sign that programs are entering production without attaining key knowledge about technology maturity, design stability, and production readiness in preceding phases of development. The primary consequences of risk are often more time and money, and these consequences flow through the acquisition phases, with unplanned overlap—known as concurrency—in development, testing, and production. Our annual assessment of weapon systems has identified numerous examples of programs proceeding without sufficient knowledge to reduce risk, and their subsequent cost and schedule growth. These examples have included the following from among the 21 MDAPs reviewed in this report: The F-35 program started development without a match between resources and requirements and without a stable design. Critical technologies were immature, development and production occurred concurrently, and critical deficiencies were still not resolved well into production. As of May 2019, the program had experienced unit cost growth of 75 percent and schedule growth of 35 percent since its first full estimate in October 2001. The MQ-4C program did not achieve technology maturity or design stability prior to development start and critical design review, respectively, and developmental challenges delayed production start. As of May 2019, the program had experienced unit cost growth of 10 percent and schedule growth of 70 percent since its first full estimate in February 2009. The CH-53K program failed to demonstrate technology and design maturity at appropriate points earlier in system development. As of May 2019, the program had experienced unit cost growth of 21 percent and schedule growth of 60 percent since its first full estimate in December 2005. A year after the production decision for the Ground/Air Task Oriented Radar program, the Marine Corps revised the program’s reliability requirements in response to an expert panel finding that the existing requirements did not reflect operational needs, contributing to delayed full-rate production. As of May 2019, the program had experienced unit cost growth of 168 percent and schedule growth of 146 percent since its first full estimate in August 2005. We have identified and recommended solutions to these issues, including that MDAPs establish firm and feasible requirements, mature technologies, incremental acquisition approaches, and realistic cost estimates. While DOD has agreed with most of our recommendations in these areas, it has not always implemented them. As we noted in our most recent High Risk List report, as of November 2018, 88 recommendations related to DOD weapon systems acquisition remained open. Furthermore, while we had previously reported better cost performance on newer programs initiated after implementation of major acquisition reforms in 2010, more recently we found cost growth on those programs. We attributed the deteriorating performance of newer programs to the inconsistent implementation of knowledge-based acquisition practices, as the negative effects of entering development with insufficient knowledge cascade throughout the acquisition cycle. In August 2019, DPC announced that it would no longer conduct mandatory peer reviews for competitive procurements above $1 billion, except for the small number of MDAPs for which USD(A&S) remains milestone decision authority, and other programs of special interest to USD(A&S). As part of the same announcement, DPC stated that it planned to continue to perform peer reviews for noncompetitive procurements of $500 million or more. DPC officials expect that the procurements no longer covered by DPC’s peer review will instead be covered by the military departments’ own review processes, which already address competitive procurements up to $1 billion. While these review processes exist within the military departments, there is not an active mechanism for sharing across the departments any best practices and lessons learned—including about contract choice—found in the course of the reviews. DPC does not currently have plans to address the reduced potential for information sharing resulting from this change. Figure 6 depicts key developments related to the DPC peer reviews since their establishment in 2008, including the last update to an online compendium—a tool designed to share best practices, lessons learned, and recommendations from peer reviews across DOD—in 2013. According to DPC officials, updates to the compendium stopped as personnel became more familiar with the peer review process. They also noted that the change to peer reviews in 2019 resulted from resource constraints and staff reductions associated with recent acquisition reforms. The officials expect this change to reduce the number of DPC peer reviews by half to approximately 50 per year, consisting primarily of the reviews for noncompetitive procurements of $500 million or more. The peer review process was established with the following objectives: 1. to ensure that contracting officers across DOD consistently and appropriately implement policies and regulations; 2. to continue to improve the quality of contracting processes across 3. to facilitate cross-sharing of best practices and lessons learned across DOD. In support of this third objective, procedures for conducting peer reviews stated that the predecessor office to DPC would look for common trends and issues to be shared with the broader DOD contracting community, and maintain information about best practices and lessons learned on its website. This public website currently houses the online compendium, although, as noted above, the last update was in 2013. Contracting officials we met with noted the value of being able to learn from the experiences of officials in other military departments through peer reviews. For example, contracting officials on an Air Force program that had a peer review involving Navy officials stated that lessons shared by those officials reduced the time it took to subsequently execute a contract. Officials from across the military departments cited benefits that resulted from these opportunities to learn from the real-world experience of peers across DOD, including the ability to share contracting information and expertise, review cost-sharing arrangements, and recalibrate contracting decisions. The online compendium is a spreadsheet with a row for each example of feedback, with the program and officials concerned kept anonymous. Columns include the category of feedback (e.g., source selection, terms and conditions), the type of feedback (e.g., recommendation, lesson learned, best practice), and the phase of review (e.g., issuance of the solicitation). Our analysis of the compendium found that it captures practices and recommendations related to contract type, as illustrated by the following examples: Use of incentives: Consider development of cost and performance incentives, rather than use of an award fee. Different contract type: Reconsider plan to award a fixed-price- incentive contract, given historical use of a cost-plus-incentive-fee arrangement under which contractor delivered at or around target cost. Source selection: Throughout solicitation for an award combining firm-fixed-price and cost-type line items, tell offerors what they are expected to provide and how they will be evaluated, and document that evaluation occurred in this exact way. Officials from the military departments confirmed that they are aware that they will now be expected to perform the reviews that DPC previously conducted. They have taken steps to adjust procedures accordingly, including updating their acquisition regulations as necessary. However, DPC does not currently have plans to encourage sharing of findings from military department-level reviews across the departments. For example, there are no plans to solicit updates to the online compendium or a similar centralized resource. USD(A&S) is responsible for improving acquisition results—including cost, schedule, and performance—by gathering and distributing data, best practices, and lessons learned across the military departments. Without a centralized resource for sharing findings, and as most reviews transition to the military departments, it will become more difficult for USD(A&S) to identify contracting trends across DOD and perform this assigned role. An updated compendium or other centralized resource could help contracting officials continue to learn from the experiences of peers across DOD—including when acquiring similar platforms and from similar contractors—by exposing them to good practices for structuring contracts and prompting consideration of alternative contract types. With DPC conducting fewer peer reviews and no updates to the compendium since 2013, contracting officials might not have insight into how other programs across DOD structure contracts. As the reviews will now primarily occur within the military departments, these officials could lose exposure to alternative contracting approaches suitable for their programs. A centralized resource such as the compendium takes on a new significance as a means for sharing information between the military departments as they proceed with their own peer reviews. USD(A&S) remains well-positioned to facilitate information exchange and contribute to positive program outcomes by requiring the military departments to share the findings of their peer reviews. The Under Secretary of Defense for Acquisition and Sustainment should establish procedures requiring the military departments to collect and share findings from their peer reviews of MDAP contracting approaches— including choice of contract type—such as by updating the existing online compendium of best practices and lessons learned as they complete their reviews. We provided a draft of this report to DOD for review and comment. DOD concurred with our recommendation and provided written comments, which are reprinted in appendix II. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report addresses: (1) the extent to which the Department of Defense (DOD) uses cost-type contracts for major defense acquisition programs (MDAP); (2) how DOD chooses among cost-type and other contract types for MDAPs and monitors their cost and schedule performance; (3) the range of cost and schedule outcomes across MDAPs that used cost-type contracts; and (4) the extent to which DOD shares information about choosing MDAP contract types across the military departments. To assess the extent to which DOD uses cost-type contracts for MDAPs, we analyzed Federal Procurement Data System-Next Generation (FPDS- NG) data regarding obligations by contract type from fiscal year 2011 through fiscal year 2019 on contracts for programs in DOD’s MDAP portfolio awarded from fiscal year 2010 through fiscal year 2018. These data reflect programs that were part of DOD’s MDAP portfolio and contracts that were reported in Selected Acquisition Reports at any point during this period. The basic types of contracts may be used in combination, with both fixed-price-type and cost-type contract line item numbers, unless otherwise prohibited. Per the Defense Federal Acquisition Regulation Supplement (DFARS) Procedures, Guidance, and Information, when entering contract type information info FPDS-NG, the data entrant is to choose the contract type that is applicable to the predominant amount of the contract action, based on the value of the line items; the selected contract type automatically populates any subsequent contract action reports for modifications. We aggregated obligations on orders under indefinite-delivery contracts and basic ordering agreements by contract type for each fiscal year. We used the Defense Acquisition Management Information Retrieval (DAMIR) system to identify those contracts reported in Selected Acquisition Reports for programs in the MDAP portfolio awarded from fiscal year 2010 through fiscal year 2018. Our dataset includes only obligations on MDAP contracts awarded since fiscal year 2010 due to problems identified in a prior GAO report regarding how data on contract types were reported in FPDS-NG for contracts awarded prior to that date. Specifically, prior to fiscal year 2010, data entrants could select the contract types “combination” and “other”, or not enter a contract type at all. The Office of Federal Procurement Policy subsequently removed those contract types as options in FPDS-NG, and made completion of the field mandatory. Contracts retain their original designation in FPDS-NG when modifications to those contracts are subsequently made. Therefore, in order to avoid including contracts coded as “combination” or “other”, we limited our analysis to contracts awarded since fiscal year 2010. We assessed data reliability by comparing the contract types identified in FPDS-NG for each contract with information on contract types contained in DAMIR and in another DOD database—Earned Value Management- Central Repository—and determined the data were sufficiently reliable for the purposes of analyzing the extent of DOD’s use of cost-type contracts for MDAPs. Contractors for programs with earned value management (EVM) reporting requirements submit EVM data to Earned Value Management-Central Repository. EVM reporting is generally required for cost-type or incentive contracts valued at $20 million or more. We included obligations associated with contract types contained in FPDS- NG if they matched contract types contained in either DAMIR or Earned Value Management-Central Repository. When there was no match with either source, we reviewed the narrative discussion of contract types contained in Selected Acquisition Reports in order to determine the most appropriate contract type with which to label those obligations. To assess how DOD chooses among cost-type and other contract types for MDAPs and monitors their cost and schedule performance, we reviewed relevant statutes, regulations, and policies. We analyzed documentation and interviewed officials regarding contract choice and monitoring from the following DOD and military department offices and selected contracting commands: Under Secretary of Defense for Acquisition and Sustainment Acquisition, Analytics and Policy Defense Pricing and Contracting Cost Assessment and Program Evaluation Defense Contract Management Agency Deputy Assistant Secretary of the Air Force for Contracting Deputy Assistant Secretary of the Army for Procurement Deputy Assistant Secretary of the Navy for Procurement Air Force Materiel Command Space and Missile Systems Center Marine Corps Systems Command Naval Air Systems Command Naval Information Warfare Systems Command Naval Sea Systems Command As illustrative examples of contract choice and monitoring under a variety of conditions, including different military departments and appropriation types, we also selected a nongeneralizable sample of seven MDAP contracts. Specifically, we selected for each of the three military departments the most recently awarded cost-type MDAP Research Development, Test, and Evaluation contract and the most recently awarded cost-type MDAP Procurement contract as reported in the December 2017 Selected Acquisition Reports. We also selected the most recently awarded cost-type MDAP contract for the Marine Corps. Table 6 notes the selected MDAPs and contracts, as well as the milestone decision authority responsible for approving the acquisition strategy associated with that contract. We interviewed contracting officials for these programs and reviewed key documentation such as acquisition strategies relating to each one of these contracts. We also reviewed our past work related to contract types used for MDAPs, including DOD’s use of incentive contracts and the Navy’s use of fixed-price-incentive contracts for shipbuilding. To assess the range of cost and schedule outcomes across MDAPs that used cost-type contracts, we identified the contract types as reported in DAMIR or GAO’s April 2018 and May 2019 annual assessments of weapon systems for 21 non-shipbuilding MDAPs that as of January 2019 had completed system development, held a critical design review, and started production. Table 7 notes the 21 MDAPs, as well as the dates of their first full estimate, and their most recent individual assessment by GAO as of May 2019. We compared the contract types reported in DAMIR or GAO’s annual assessments of weapon systems with the percentage unit cost and schedule change between the first full estimate and our most recent in- depth assessment of each program as of May 2019. Since 2018, as part of our annual assessment of weapon systems, we have conducted a statistical analysis evaluating programs’ completion of knowledge-based acquisition practices and corresponding performance outcomes. Our report cites results of this analysis as it pertains to these 21 MDAPs. We reviewed prior GAO work on the drivers of cost and schedule overruns for MDAPs. To assess the extent to which DOD shares information about choosing MDAP contract types across the military departments, we reviewed DOD and military department documentation related to contracting review processes. We compared this information to DOD memorandums establishing practices and policies for sharing of acquisition information across DOD. We also interviewed officials from offices including Defense Pricing and Contracting within the Office of the Under Secretary of Defense for Acquisition and Sustainment, and the cognizant Deputy Assistant Secretaries of the military departments. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Shelby S. Oakley, (202) 512-4841 or oakleys@gao.gov In addition to the contact named above, Raj Chitikila (Assistant Director), Robert Bullock, Jenny Chanley, Jasmina Clyburn, Andrea Evans, Lori Fields, Suellen Foth, Kurt Gurka, Stephanie Gustafson, and Grace Haskin made key contributions to this report.", "summary": "When acquiring major weapon systems, DOD can choose between several different contract types. One of these is cost-type, under which DOD pays allowable costs incurred by the contractor. Historically, DOD has struggled to manage its major acquisition programs. The result has been billions in cost growth and schedule delays in providing systems to the warfighter. GAO was asked to review DOD's use of cost-type contracts for its major acquisition programs. This report addresses the use of and range of cost and schedule outcomes for cost-type contracts for major weapon system acquisitions, and how military departments share information about contract choice. GAO analyzed government contracting data on obligations by contract type for fiscal years 2011 through 2019 on contracts in DOD's portfolio of major acquisition programs. GAO compared contract types for 21 major acquisition programs with their cost and schedule outcomes; reviewed seven recently awarded cost-type contracts for major acquisition programs, selected to reflect the different military departments and appropriation types; and interviewed contracting officials. To acquire new major weapon systems, such as aircraft, ships, and satellites, the Department of Defense (DOD) uses a variety of contract types including cost-type contracts, under which the government assumes more risk. DOD is required to document its risk assessment in choosing contract types for major programs. Risks assessed can include use of new technologies and stability of system costs and requirements. Once awarded, cost-type contracts have additional reporting requirements to help monitoring of cost and schedule performance. GAO analyzed program cost and schedule outcomes for 21 major acquisition programs, and did not find a clear relationship between these outcomes and contract types used. However, programs that completed certain knowledge-based acquisition practices generally had better cost and schedule outcomes than programs that did not implement those practices. These practices include completing preliminary design review before the start of system development and releasing at least 90 percent of design drawings by critical design review. From fiscal years 2011 through 2019, DOD used cost-type contracts for a small proportion—under one-fifth on average—of obligations for its major acquisition programs. This proportion varied across the military departments (see figure). A change to DOD's peer review process for its largest contract awards reduced a means for sharing best practices and lessons learned about contract choice across the military departments. In 2019, the Office of the Secretary of Defense announced the end of its peer reviews for most competitive procurements above $1 billion. While these contracts will instead be reviewed through the military departments' own processes, DOD currently does not require the departments to collect and share their findings. DOD has an online compendium of peer review findings; however, this was last updated in 2013. Using an existing centralized resource such as the compendium could help contracting officials learn from the experiences of peers across DOD by exposing them to good practices for structuring contracts. GAO recommends that DOD establish procedures requiring the military departments to collect and share findings from their reviews of contracting approaches, such as by updating the existing online compendium. DOD agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "DOD’s acquisition of weapon system programs has been on our High Risk List since 1990 because DOD programs consistently fall short of cost, schedule, and performance expectations. Congress and DOD have long explored ways to curtail these cost, schedule, and performance problems, and both took related actions about a decade ago, with Congress passing the Weapon Systems Acquisition Reform Act of 2009 and DOD implementing its “Better Buying Power” initiatives. The Weapon Systems Acquisition Reform Act of 2009 aimed to improve the organization and procedures of DOD for the acquisition of major weapon systems, for example by revising the certifications that programs were expected to complete before approval for system development start. The new certifications included the need to conduct trade-offs among cost, schedule, and performance objectives and for independent verification of technology maturity. In 2010, DOD started its own acquisition reform initiatives through “Better Buying Power.” These reforms required DOD programs to conduct analyses of program affordability and set cost targets, among other things, which placed cost constraints on programs and encouraged programs to find cost improvements during program execution. These and other reforms championed sound management practices, such as realistic cost estimating, increased use of prototyping, and systems engineering. In 2016, we found that DOD was beginning to decrease the amount of cost growth in its major defense acquisition program portfolio. Despite DOD’s improvements in cost control, however, members of Congress remained concerned that the DOD acquisition process was overly bureaucratic and too slow to deliver capability to the warfighter. Congress enacted numerous additional acquisition-related provisions in the National Defense Authorization Acts for Fiscal Year 2016 and subsequent years that addressed the processes with which DOD and the military departments acquire goods and services and encourage innovation. These provisions addressed a wide range of acquisition issues, such as the: creation of new processes for oversight of major defense acquisition programs; development of streamlined alternative acquisition paths; and changes to DOD’s other transaction authority, which allows DOD to enter into agreements that generally do not follow a standard format or include terms and conditions required in traditional mechanisms, such as contracts or grants. Congress also required that DOD establish a panel in the National Defense Authorization Act for Fiscal Year 2016, referred to as the “Section 809 Panel,” to identify ways to streamline and improve the defense acquisition system. The panel issued its final report in January 2019, which, together with its earlier reports, included a wide range of recommendations aimed at changing the overall structure and operations of defense acquisition. DOD acquisition policy defines an acquisition program as a directed, funded effort that provides a new, improved, or continuing materiel, weapon, or information system, or a service capability in response to an approved need. DOD Directive 5000.01, The Defense Acquisition System, provides management principles and mandatory policies and procedures for managing all acquisition programs. Oversight levels and procedures for DOD’s acquisition programs are outlined in DOD Instruction 5000.02, Operation of the Defense Acquisition System. Traditionally, defense acquisition programs are classified into acquisition categories based on the value and type of acquisition. DOD’s most costly programs have historically been referred to as major defense acquisition or Acquisition Category I programs. Programs with lower costs are categorized as Acquisition Category II or III programs. The acquisition category of a program can affect oversight levels and procedures, such as what program information and documents are required and who is designated as the milestone decision authority. Among other responsibilities, the milestone decision authority approves entry of an acquisition program into the next phase of the acquisition process and is accountable for cost, schedule, and performance reporting. DOD’s acquisition process includes three major milestones at which program offices provide information to or receive a waiver from the milestone decision authority. The milestone decision authority then makes a decision on whether the program is ready to transition to the next acquisition phase. The milestones normally represent transition points in programs at which there is a marked increase in the funding required for the program. Milestone A is the decision for an acquisition program to enter into the technology maturation and risk reduction phase. Milestone B is the decision to enter the engineering and manufacturing development phase. Milestone C is the decision to enter the production and deployment phase. Programs may start at different milestones depending on the circumstances of the particular program, such as whether the technologies the program plans to use are mature. Some major defense acquisition programs, such as the Marine Corps’ Amphibious Combat Vehicle program and the Navy’s Next Generation Jammer-Mid Band program, entered the acquisition system at milestone A. Other programs, such as the Air Force’s Combat Rescue Helicopter program and the Army’s Armored Multi-Purpose Vehicle program, entered directly at milestone B without having a milestone A because technologies were considered mature by the Office of the Secretary of Defense and an independent review team, respectively. Figure 1 illustrates the key milestones associated with the defense acquisition system. DOD’s acquisition policy encourages tailoring the acquisition process, including tailoring of documentation or information requirements. In previous work, we identified opportunities for DOD to tailor the documentation and oversight needed for major defense acquisition programs. In 2015, we found that 24 acquisition programs we surveyed spent, on average, over 2 years completing up to 49 information requirements for their most recent milestone decision. We found that DOD’s review process was a key factor that influenced the time needed to complete the information requirements. In total, the requirements averaged 5,600 staff days to document, yet acquisition officials considered only about half of the requirements as high value. We recommended that DOD eliminate reviews and information requirements that do not add value or are no longer needed. DOD agreed with both recommendations and took some actions through its Better Buying Power initiatives to streamline documentation and staff reviews. Among the information requirements that acquisition officials considered most valuable were those that support a sound business case. A solid, executable business case provides credible evidence that (1) the warfighter’s needs are valid and that they can best be met with the chosen concept, and (2) the chosen concept can be developed and produced within existing resources—such as technologies, design knowledge, funding, and time. Establishing a sound business case for individual programs depends on disciplined requirements and funding processes, and calls for a realistic assessment of risks and costs; doing otherwise undermines the intent of the business case and increases the risk of cost and schedule overruns and performance shortfalls. The program’s business case typically includes documentation of the capabilities required of the weapon system, the strategy for acquiring the weapon system, sound cost estimates based on independent assessments, and a realistic assessment of technical and schedule risks. Several entities at the enterprise level (meaning the Office of the Secretary of Defense, Joint Chiefs of Staff, and Joint Staff) and the military department level play a role in the oversight and budgeting for DOD weapon system acquisition programs. In general, at the enterprise level, the acquisition and budgeting processes are managed by subordinate offices within the Office of the Secretary of Defense. More specifically: The Under Secretary of Defense for Research and Engineering is responsible for establishing policies on and supervising all aspects of defense research and engineering, technology development, technology transition, prototyping, experimentation, and developmental testing activities and programs, including the allocation of resources for defense research and engineering. This organization has a significant role in activities prior to milestone B, but also interacts with major defense acquisition programs throughout their life cycles with regard to technical risks. For major defense acquisition programs, the Under Secretary conducts assessments in areas such as technology maturity, interoperability, and cyber security. The Under Secretary of Defense for Acquisition and Sustainment is responsible for establishing policies on and supervising all matters relating to acquisition (including (1) system design, development, and production; and (2) procurement of goods and services) and sustainment (including logistics, maintenance, and materiel readiness). This organization has certain oversight responsibilities for major defense acquisition programs throughout the acquisition process, such as collecting and distributing performance data. The Under Secretary is the Defense Acquisition Executive and serves as the milestone decision authority for certain major defense acquisition programs. The Director, Cost Assessment and Program Evaluation and the Under Secretary of Defense (Comptroller) manage the annual budget preparation process for acquisition programs. These organizations have cost assessment and budgetary responsibilities, respectively, for major defense acquisition programs leading up to each milestone and once these programs have been fielded. At the military department level, the service acquisition executive, also known as the component acquisition executive, is a civilian official within a military department who is responsible for all acquisition functions within the department and can serve as the milestone decision authority. The following officials serve as the service acquisition executive for the military departments: the Assistant Secretary of the Air Force (Acquisition, Technology, and Logistics) for the Air Force; the Assistant Secretary of the Army (Acquisition, Logistics and Technology) for the Army; and the Assistant Secretary of the Navy (Research, Development and Acquisition) for the Navy and the Marine Corps. We focused our review on five selected reforms from the National Defense Authorization Acts for Fiscal Years 2016 and 2017. Three of the reforms affect the processes related to DOD’s oversight of major defense acquisition programs, the fourth restructured acquisition oversight functions in the Office of the Secretary of Defense, and the fifth provides alternative acquisition pathways for programs that are not considered major defense acquisition programs and have an objective of being completed within 5 years. Table 1 identifies the source of the five reforms that we reviewed and provides a brief summary of each reform. For additional detail on the statute, amendments, and related DOD guidance we reviewed, see appendix II. We found that DOD has made progress implementing reforms that have affected the oversight of major defense acquisition programs. Decision- making authority for these programs has been realigned between the Office of the Secretary of Defense and the military departments. In addition, new processes are in place to improve DOD’s consideration of program cost, fielding, and performance goals and assessment of technical risk although questions remain about how they will be implemented. The Office of the Secretary of Defense has also restructured in an effort to increase innovation in the earlier stages of the acquisition process and reduce cost, schedule, and performance risks in later stages. While the restructure has begun to take shape, additional steps remain to be completed, including developing charters and fully staffing new offices. These steps are important to determining how acquisition oversight roles within the Office of the Secretary of Defense— which had been executed by a single office for decades—will be divided and how new offices will be structured to effectively carry out their work. Milestone decision authority for most major defense acquisition programs now resides with the military departments, a reform generally required for programs starting after October 1, 2016 by section 825 of the National Defense Authorization Act for Fiscal Year 2016. According to data from DOD’s Defense Acquisition Visibility Environment system, as of March 2019, milestone decision authority was at the military department level for 80 of 89 major defense acquisition programs. The 80 programs include all six programs that started at milestone B or an equivalent milestone since this reform became effective on October 1, 2016, and 74 other programs that started before the reform became effective. The nine programs retained by the Office of the Secretary of Defense all began prior to the reform becoming effective and include programs that are high risk, joint, or have had significant cost or schedule growth, such as the F-35 Joint Strike Fighter program and the Army’s Integrated Air and Missile Defense program. See appendix III for more information about milestone decision authority, including a list of the major defense acquisition programs as of March 2019 and the milestone decision authority for each. Prior to this reform going into effect, the Under Secretary of Defense for Acquisition, Technology and Logistics within the Office of the Secretary of Defense typically was the milestone decision authority for major defense acquisition programs until they entered the production and deployment phase—that is, for the milestone A, B, and C decisions. The Under Secretary then typically delegated milestone decision authority to the military departments after the milestone C decision. Under the new reform, the Secretary of Defense may designate an alternate milestone decision authority under certain circumstances. For example, the Secretary may determine that the program meets one of several characteristics outlined in statute, such as addressing a joint requirement or the program being critical to a major interagency requirement. There are now substantially more major defense acquisition programs with decision authority at the military department level. This change resulted from both the statutory reform for newly started programs and changes to milestone decision authority for existing programs resulting from a separate review conducted by the Office of the Secretary of Defense after the reform became effective, wherein the military department was designated the milestone decision authority for approximately 20 programs. See figure 2 for trends in the level of milestone decision authority from 2012 to 2019. major defense acquisition program will provide an options matrix to stakeholders including the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment, Cost Assessment and Program Evaluation, and the Joint Staff, which must include at least three options that represent differing assumptions about possible solutions, technical risks, cost, schedule, and affordability. gathering and distributing data and lessons learned, and conducting or approving independent cost estimates. These stakeholders must be granted the access necessary to complete independent analysis in their area of responsibility. This analysis will consider aggregated risk regarding technical feasibility, cost, schedule, and affordability, and will be submitted to the milestone decision authority. A goal establishment meeting will be held within 30 days of the program’s analysis of alternatives outbrief and will be co-chaired by the milestone decision authority and Vice Chief of the pertinent military service(s) and supported by the stakeholders identified above. As of March 2019, no programs have held a milestone A since the reform became effective, and no programs have had goals established under the new process. establish a process to develop program cost, fielding, and performance goals for major defense acquisition programs that reach milestone A after October 1, 2017. The statute described the goals as follows: (1) the cost goal is for both procurement unit cost and sustainment cost, (2) the fielding goal is the date for initial operational capability, and (3) the performance goal is for technology maturation, prototyping, and a modular open system approach. DOD issued a policy for the process in November 2018, stating that stakeholders will complete independent analyses in their areas of responsibility to consider the aggregated risk regarding technical feasibility, cost, schedule, and affordability, which will be submitted to the milestone decision authority (typically at the military department level). The policy stated that it applies to all major defense acquisition programs that enter the acquisition process after October 1, 2017, without regard to what milestone initiates the program. The policy also stated that the Office of the Secretary of Defense will have the opportunity to consult with the milestone decision authority on revised goals if the program exceeds its initial cost or fielding goals prior to the next milestone or production decision. DOD acquisition policy already required programs to document objectives for system cost, schedule, and performance in an acquisition program baseline at milestone B and affordability cost goals were to be set at milestone A. Under the new process, fielding and performance goals are established earlier and all three goals (cost, fielding, and performance) are required to be established before funds are obligated for technology development, systems development, or production, rather than being set at specific program milestones. The new process also adds a meeting to review and discuss the goals before they are approved by the milestone decision authority. Officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment told us that this new process is intended to consolidate existing information to inform earlier decisions on which investments the department wants to make. As of March 2019, no major defense acquisition programs have held a milestone A since the statutory requirement became effective, and no major defense acquisition programs have had goals established under the new process. According to officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment, no new programs have been required to have goals established since DOD’s policy for the process was issued in November 2018. These officials told us they rely on the milestone decision authority to notify them when goals need to be established and that the first programs expected to have goals established under the new policy are the Army’s Gator Landmine Replacement Program and the Air Force’s Mk21A Reentry Vehicle. Both programs are slated to go through the process in mid-2019. Independent technical risk assessments. The Under Secretary of Defense for Research and Engineering is now responsible for conducting or approving independent technical risk assessments for major defense acquisition programs prior to milestones A and B and before production decisions. According to DOD’s December 2018 independent technical risk assessment policy, the assessments will consider the full spectrum of technology, engineering, and integration risk, including critical technologies and manufacturing processes, and the potential impacts to cost, schedule, and performance. The reform required the assessments for major defense acquisition programs reaching milestone A after October 1, 2017; no major defense acquisition programs have held a milestone A since that date. DOD policy issued in December 2018 implementing the statute states that the assessments will be conducted for all major defense acquisition programs at each upcoming milestone throughout the acquisition process, effective December 3, 2018. As a result, the assessments will be conducted regardless of whether the program reached milestone A after October 1, 2017. As of March 2019, the Office of the Under Secretary of Defense for Research and Engineering had conducted eight independent technical risk assessments on major defense acquisition programs. One additional assessment on the Infrared Search and Track Block II program was delegated to the Navy to conduct, although the Office of the Under Secretary of Defense for Research and Engineering still approved the assessment. While DOD acquisition guidance previously provided for similar types of assessments, they were not always required to be conducted or approved at the Office of the Secretary of Defense level for all major defense acquisition programs. DOD acquisition guidance previously provided for the Office of the Secretary of Defense to request broad program assessments related to systems engineering, including risk areas, at all milestones for major defense acquisition programs with milestone decision authority at the Office of the Secretary of Defense level. Additionally, all major defense acquisition programs were required to have a separate assessment of critical technology elements prior to entering the system development phase or the production and deployment phase if the system enters the acquisition life cycle after system development. DOD’s December 2018 policy requires that independent technical risk assessments be conducted or approved at the Office of the Secretary of Defense level by the Office of the Under Secretary of Defense for Research and Engineering unless this responsibility is delegated, regardless of the level of the milestone decision authority. The Office of the Secretary of Defense officially reorganized its acquisition organization on January 31, 2018, in response to Section 901 of the Fiscal Year 2017 National Defense Authorization Act. Under the reorganization, responsibilities of the former Under Secretary of Defense for Acquisition, Technology and Logistics were divided between two new offices—the Under Secretary of Defense for Research and Engineering and the Under Secretary of Defense for Acquisition and Sustainment (see fig. 3 and app. IV for organizational charts). According to the conference report accompanying the legislation, the priorities framing the conference discussions on reorganization included elevating the mission of advancing technology and innovation within DOD, and fostering distinct technology and acquisition cultures. The report further states that the conferees expect that the Under Secretary of Defense for Research and Engineering would take risks, test, and experiment, and have the latitude to fail, as appropriate. Additionally, the report states that the conferees expect the Under Secretary of Defense for Acquisition and Sustainment to focus on timely, cost-effective delivery and sustainment of products and services, and seek to minimize any risks to that objective. It is too early to say whether the goals of the reorganization have been realized. In July 2018, the Deputy Secretary of Defense issued a memorandum outlining the overall organizational structures, roles, and responsibilities of the two new Under Secretary offices. Responsibilities of many prior subordinate offices were realigned to one of the two new Under Secretary offices as part of the reorganization. For example, systems engineering falls under the Under Secretary of Defense for Research and Engineering and contracting policy and oversight falls under the Under Secretary of Defense for Acquisition and Sustainment. New offices or positions were also created during the reorganization. For example, the Office of the Under Secretary of Defense for Research and Engineering created eight assistant director positions to serve as resident experts in strategic technology areas, such as cyber, quantum science, and hypersonics. Similarly, the Office of the Under Secretary of Defense for Acquisition and Sustainment created an Assistant Secretary of Defense for Sustainment. Previously, sustainment activities were spread across several organizations headed by two Assistant Secretaries of Defense. While foundational steps to stand up the two new Under Secretary offices have been taken, as of March 2019, reorganization actions were ongoing in two major areas: completing chartering directives that define the scope of responsibilities for the two new offices and hiring additional people for the new offices, including for several senior leadership positions. Chartering directives: Officials from the Office of the Chief Management Officer originally expected charters for the two offices to be completed by January 2019, but progress has been delayed. According to DOD policy, chartering directives are required to define the scope of functional responsibilities and identify all delegated authorities for the chartered organizations. According to a July 2018 memorandum issued by the Deputy Secretary of Defense, the Chief Management Officer is to oversee the development of the charters. Officials from the Office of the Chief Management Officer stated that they are doing so with significant input from the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment. These officials told us that the development of the charters has taken longer than expected because redistributing the responsibilities of a single office into two new offices was complicated due to the number of shared or partially overlapping interests. Officials from the Offices of the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment now estimate the charters will be completed in July 2019 after department- wide coordination, though they said that time frame may be optimistic given the challenges to date. These officials also told us they expect that they will need to make additional changes to other existing acquisition policies and guidance to incorporate the new content of the chartering directives once complete. Hiring additional employees: In order to stand up the two newly- created organizations, on February 1, 2018, 516 civilian and military positions from the former Office of the Under Secretary of Defense for Acquisition, Technology and Logistics were divided between the two new Under Secretary offices. Finalizing staffing for both offices has been a gradual process that will not be completed until at least fiscal year 2020 because of the need to: (1) reduce positions to meet statutorily-directed cost-savings objectives; (2) realign positions between the two offices; and (3) hire additional staff. Table 2 provides additional detail on past and expected changes to authorized positions. Both Under Secretaries are still working to staff their offices, with approximately 30 percent of current positions vacant in the Office of the Under Secretary of Defense for Research and Engineering, and 8 percent of current positions vacant in the Office of the Under Secretary of Defense for Acquisition and Sustainment. See figure 4 for the current status of staffing within both offices. Both Under Secretaries have experienced challenges while staffing their offices. For example: The Office of the Under Secretary of Defense for Acquisition and Sustainment has experienced challenges stemming from needing to meet required personnel reductions while also hiring staff to align with the revised priorities from the reorganization. As part of the restructuring, the office will absorb all of the 57 remaining civilian and military position reductions that were originally assigned to the former Office of the Under Secretary of Defense for Acquisition, Technology and Logistics. These reductions will occur during both fiscal years 2019 and 2020. At the same time, officials said they are still working to hire staff with skills in needed areas such as data analytics. Officials said they are leveraging existing authorities such as voluntary early retirement authority and voluntary separation incentive payments to meet their targeted number of authorized positions by the end of fiscal year 2020. Officials from the Office of the Under Secretary of Defense for Research and Engineering said their challenges have primarily been negotiating the appropriate number of positions for the organization and staffing the organization in a timely manner. For example, 13 positions are not currently available to be filled because they will not be transferred from the Office of the Under Secretary of Defense for Acquisition and Sustainment until fiscal year 2020. The officials also stated that there have been delays related to developing new position descriptions, revalidating existing position descriptions, and finding individuals with the right skill sets for positions. Both offices have been delayed in filling key leadership positions. According to officials from these offices, vacant positions include the Deputy Director of Mission Engineering and Integration, the Director of Systems Engineering, and the Principal Director of Defense Pricing and Contracting. Senior officials from both offices told us that they have been unable to fill some vacant senior executive positions since the most recent Secretary of Defense resigned on December 31, 2018. The inability to fill these positions is due to the Office of Personnel Management’s general policy to suspend processing for senior executive service career appointments when an agency head leaves, until a successor is appointed at the agency. As of March 2019, a new Secretary of Defense had yet to be confirmed. Senior level officials also told us that some decisions about structure and staffing may be held up until after these executive positions are filled, but that in the interim, they are moving forward with daily operations and in some instances have other employees acting in those roles. As of March 2019, the military departments had begun using middle-tier acquisition pathways for over 35 rapid prototyping and rapid fielding programs under interim guidance issued by the Under Secretary of Defense for Acquisition and Sustainment and the military departments. However, DOD has yet to determine certain aspects of program oversight, including what information military departments should consider in selecting programs and what metrics and data the Office of the Secretary of Defense and military department leaders should use to assess performance. The Departments of the Air Force, Army, and Navy have begun to execute over 35 unclassified and classified acquisition programs using new acquisition pathways distinct from the traditional DOD acquisition process. Section 804 of the National Defense Authorization Act for Fiscal Year 2016 required DOD to issue guidance establishing two new streamlined acquisition pathways for DOD—rapid prototyping and rapid fielding—under the broader term “middle tier of acquisitions.” According to the Joint Explanatory Statement accompanying the National Defense Authorization Act, the guidance was to create an expedited and streamlined “middle tier” of acquisition programs intended to be completed within 5 years. The Joint Explanatory Statement noted that middle-tier programs would be distinctive from rapid acquisitions that are generally completed within 6 months to 2 years and traditional acquisitions that last much longer than 5 years. Statute lays out more specific intended time frames and expectations for programs using these two pathways: The rapid prototyping pathway is to provide for the use of innovative technologies to rapidly develop fieldable prototypes to demonstrate new capabilities and meet emerging needs. The objective of a rapid prototyping program is to field a prototype that can be demonstrated in an operational environment and provide for a residual operational capability within 5 years of the development of an approved requirement. The rapid fielding pathway is to provide for the use of proven technologies to field production quantities of new or upgraded systems with minimal development required. The objective of a rapid fielding program is to begin production within 6 months and complete fielding within 5 years of the development of an approved requirement. Middle-tier acquisition pathways are distinct from the traditional acquisition system for major defense acquisition programs. These pathways allow for programs to be exempted from the acquisition and requirements processes defined by DOD Directive 5000.01 and the Manual for the Operation of the Joint Capabilities Integration and Development System. The statute does not identify a dollar limit for programs using middle-tier acquisition pathways. Middle-tier programs are typically approved for initiation by the service acquisition executive, although Air Force policy also allows for smaller programs to be initiated by the program executive officer. Table 3 shows the number of unclassified programs initiated by the military departments as of March 2019. The middle-tier programs initiated to date represent a range of products, dollar amounts, and complexity. For example, one of the smaller dollar value programs is an approximately $30 million Navy effort to develop a prototype rocket motor that would support extended ranges for an existing missile. One of the larger dollar value programs is a multibillion dollar Army effort to develop the next generation combat vehicle. The military departments generally require funding these programs through the traditional budget process, using DOD’s existing planning, programming, budgeting, and execution process. Based on estimated program costs reported by the military departments, we found that approximately half of the programs initiated to date would be categorized as major defense acquisition programs if they were not being pursued under a middle-tier pathway. In some cases, such as the Army’s Lower Tier Air and Missile Defense Sensor program, an existing program planned as a major defense acquisition program shifted to a middle-tier acquisition pathway. Appendix V includes a list of middle-tier acquisition programs started by the military departments as of March 2019. Although DOD and the military departments have issued interim guidance for using middle-tier acquisition pathways, we found that DOD has not provided department-wide guidance on how certain aspects of program oversight will be conducted. DOD has yet to determine what types of business case information should be submitted to decision makers to help ensure well-informed decisions about program initiation and how program performance will be measured consistently. Section 804 of the National Defense Authorization Act for Fiscal Year 2016 required the Under Secretary of Defense for Acquisition, Technology and Logistics to establish guidance for middle-tier acquisitions. In response, the Under Secretary of Defense for Acquisition and Sustainment issued interim guidance in April 2018 that provided the military departments and other DOD components with the authority to implement middle-tier acquisition programs on an interim basis through September 30, 2019. The guidance laid out the broad purposes and requirements of middle-tier acquisition authorities, and encouraged the military departments and other DOD components using middle-tier acquisition pathways to develop specific implementation processes and procedures to implement the interim authority. Between April 2018 and September 2018, the military departments each issued their own implementing guidance, which provided additional details on how middle- tier programs would be selected and overseen within their department during the period of the interim authority. Subsequently, the Under Secretary of Defense for Acquisition and Sustainment issued two additional interim guidance memorandums: the first in October 2018, which described how the Office of the Secretary of Defense and the Joint Staff would conduct oversight of the military departments’ use of middle-tier acquisition pathways, and the second in March 2019, which addressed sustainment planning considerations for programs using the rapid fielding pathway. The Director, Cost Assessment and Program Evaluation, also issued guidance in April 2019 that included a life-cycle cost estimating policy for programs using the rapid fielding pathway. Statute requires that the guidance from the Office of the Secretary of Defense include a “merit-based process” for considering potential middle- tier programs, although the interim guidance does not describe what the process should include or what information should be considered by decision makers to assess merit other than meeting the needs communicated by the Joint Chiefs of Staff and the combatant commanders. Guidance from each of the military departments provides additional detail on the program selection process, to include describing generally the type of information decision makers should consider when selecting programs. Neither the Office of the Secretary of Defense’s guidance nor the military departments’ guidance fully identifies key elements of a business case to be provided as part of the program initiation process. Our past work has shown that in order to make sound decisions about initiating acquisition programs, it is important that decision makers have the information they need to assess the business case, including that (1) the warfighter need exists and that it can best be met with the chosen concept and (2) the concept can be developed and produced within existing resources. Information needed to establish a business case for a traditional acquisition program typically includes a requirements document (which provides information on the capabilities required of the weapon system); the strategy for acquiring the weapon system; sound cost estimates based on independent assessments; and a realistic assessment of risks, including those risks related to technology and schedule. For a middle-tier acquisition program, business case information would help decision makers make well-informed decisions, to include assessing whether the program is likely to meet objectives established in statute to complete a prototype with a residual operational capability (in the case of a rapid prototyping program) or complete fielding (in the case of a rapid fielding program) within 5 years of an approved requirement. Programs using a middle-tier pathway are intended to be completed within 5 years, and guidance may provide for expedited and streamlined procedures. As a result, the appropriate documents to provide business case information for a middle-tier acquisition program may not need to be as detailed as those for a major defense acquisition program. These documents may also vary to some extent depending on whether a program is a rapid prototyping or a rapid fielding program. However, having this type of information available in some form at program initiation can help decision makers to assess the soundness of a program’s business case at the time a decision is made to start a new program. Oversight at this time is critical because, as we have previously reported, program initiation presents the greatest point of leverage in the program life cycle for decision makers. Table 4 provides additional detail about certain types of business case documentation that are to be considered at program initiation for middle-tier acquisition programs according to the Office of the Secretary of Defense and the military departments’ guidance. Section 804 of the National Defense Authorization Act for Fiscal Year 2016 directed the Under Secretary of Defense for Acquisition, Technology and Logistics to establish guidance for middle-tier acquisitions within 180 days of enactment of the statute (which would have been May 2016), but guidance was not issued until April 2018. According to officials who were involved in efforts to develop the guidance, the Office of the Secretary of Defense circulated multiple iterations of draft guidance, but was unable to reach agreement with the military departments because of concerns that the guidance was too burdensome. These officials told us that as a result, the Under Secretary of Defense for Acquisition and Sustainment decided instead to issue broad interim guidance and allow each of the military departments and other DOD components to develop processes and procedures to implement the interim authority. As stated in the Under Secretary of Defense for Acquisition and Sustainment’s April 2018 interim guidance, the Under Secretary of Defense for Acquisition and Sustainment would develop final guidance for the department in 2019 based on lessons learned from the military departments and other DOD components. According to officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment, the Under Secretary began the process in February 2019 to develop this final guidance. The process was in its initial stages as of March 2019 and officials involved told us they hope to complete the final guidance by September 2019. The business case information programs provided to decision makers at initiation varied widely for nine middle-tier acquisition programs we reviewed. We found that certain types of business case information, such as an assessment of schedule risk that would indicate whether a program could realistically be expected to be completed within time frame objectives in statute, were often not completed at the time of program initiation. For example: Six programs had approved requirements at program initiation. Three of these programs had requirements validated through DOD’s traditional requirements process prior to the decision to start under a middle-tier pathway. Two of these programs, both of which were Air Force programs, had previously planned to start as major defense acquisition programs. The third program, an Army program, had requirements based on those approved for an existing major defense acquisition program. The other three of these programs, all of which were Navy programs, had high-level requirements that described, for example, what environments the system should be tested in or what quantity should be fielded. These requirements were approved by the Navy’s Accelerated Acquisition Board of Directors, which includes the Chief of Naval Operations and the Assistant Secretary of the Navy for Research, Development and Acquisition, among other officials. Three programs were still in the process of developing requirements at the time of program initiation. Only one of the nine programs had an approved acquisition strategy at the time of program initiation. Officials from the other programs told us they planned to develop an acquisition strategy or were in the process of developing or updating one. While all nine of the programs had developed at least a draft cost estimate at program initiation, only one of the nine programs had an assessment of its program cost estimate completed by the military department cost agency at the time of program initiation. Officials from three other programs said that an assessment by the military department cost agency was in progress or planned. Officials from the other five programs told us they had developed a draft cost estimate at program initiation that in some cases was still expected to change and that they did not plan for an assessment by the military department cost agency. The programs varied in the extent to which they assessed risk at program initiation. Four programs had risk assessments that addressed schedule and technology risks, which are types of risks we have identified in our previous work as important to understanding a program’s business case. Two other programs had risk assessments that included either schedule or technology risks but not both. Officials from the other three programs stated that they were still in the process of assessing risks and had yet to assess risks related to meeting statutory schedule objectives at the time of program initiation. Without the Office of the Under Secretary of Defense for Acquisition and Sustainment identifying in its final guidance the minimum program information needed to help decision makers evaluate the program’s business case, DOD cannot ensure that the military departments are consistently considering these types of information. As a result, DOD is not well positioned to ensure that approved middle-tier acquisition programs represent sound investments and are likely to meet the objective of delivering prototypes or capability to the warfighter within 5 years. The Office of the Secretary of Defense and the military departments generally collect program data but we found that neither the Office of the Secretary of Defense nor the military departments has identified metrics that would allow them to use that data to measure and report on program performance in a consistent manner. Developing such metrics would allow senior leaders in the Office of the Secretary of Defense and the military departments to monitor and assess performance across the portfolio of middle-tier programs during program execution, including whether programs are on track to meet statutory objectives for rapid prototyping and rapid fielding. Table 5 provides additional detail on the extent to which guidance addresses the collection of program data and identification of metrics to measure program performance. The Office of the Secretary of Defense began collecting middle-tier program data from the military departments in November 2018 as part of an effort to ensure that middle-tier authority was being used appropriately within the department. However, the office has yet to determine what metrics it will use to measure program performance consistently across the portfolio. Officials within the Office of the Secretary of Defense who are involved with collecting the data told us that they are still refining what data should be collected, determining how to standardize definitions to improve the consistency of data, and considering how to use the data collected to monitor program execution. For example, they are still trying to determine the appropriate triggers that would allow them to know that a middle-tier program may be experiencing cost or schedule challenges. Similarly, guidance from two of the three military departments requires the collection of program data, but the military departments also have not identified metrics to consistently measure performance across programs. The Navy’s guidance does not require the collection of program data or identify metrics to measure program performance. Interim guidance from the Air Force and the Army requires the collection of program data and also requires programs to develop metrics to measure performance, but these metrics are not required to be consistent across programs. Decisions about specific metrics to be reported are left to the discretion of the decision authority for each program, who is typically the service acquisition executive or a program executive officer. As a result, these metrics may not allow consistent measurement of performance across programs because, for example, programs may have a different starting point for reporting data, or may change the metrics that are being assessed at different points within the life of a program. According to federal internal control standards, the ability of agency management to compare actual performance to planned or expected results throughout the organization and analyze significant differences is important to help ensure that the agency is meeting objectives and addressing risks appropriately. These standards also state that agency management should define objectives in quantitative or qualitative terms to permit reasonably consistent measurement of performance toward those objectives. For middle-tier acquisition programs, statute includes objectives related to fielding time frames for both rapid prototyping and rapid fielding programs. Additionally, for rapid prototyping, part of the objective is that the prototype fielded can be demonstrated in an operational environment and provide for residual operational capability. Middle-tier acquisition programs are to be provided streamlined processes, including for program oversight. Decisions about how to measure program performance therefore should be considered in light of how to facilitate oversight without losing the benefits of the flexibilities offered by middle-tier pathways. However, without the Office of the Under Secretary of Defense for Acquisition and Sustainment identifying in its final guidance a minimum set of metrics that can be used to measure performance of programs across the military departments, DOD risks not knowing how the department’s portfolio of middle-tier programs is progressing, including whether programs are on track to meet statutory objectives for rapid prototyping and rapid fielding. As a result, senior leaders in the Office of the Secretary of Defense and the military departments may lack insight needed to identify and address emerging challenges in a timely manner. This is particularly important given that the portfolio includes complex, costly programs that address important capability gaps for the department. While DOD has made progress implementing individual reforms, it continues to face challenges that affect the implementation of the reforms we reviewed. First, we found that senior DOD leadership has not fully addressed disagreements about the division of acquisition oversight roles and responsibilities between the Office of the Secretary of Defense and the military departments. As a result, there have been continuing differences of opinion about how to implement specific reforms. Second, DOD has yet to address persistent portfolio management challenges that affect its ability to effectively manage its portfolio of weapon system investments. Lastly, DOD has yet to develop processes to assess the effectiveness of recent reforms. Without developing such processes, DOD officials will not be well positioned to assess whether reforms are having the intended effects, such as improving innovation and delivering capability to the warfighter more quickly, or if additional changes are necessary to achieve such outcomes. Top DOD leadership has not fully addressed disagreements that remain about the division of acquisition oversight responsibilities between the Office of the Secretary of Defense and the military departments. Our past work has shown that in times of significant organizational transformation, top leadership must set the direction, pace, and tone for the transformation. Personal involvement of these leaders in driving change, including the Secretary and Deputy Secretary, helps provide stability. Internal control standards for federal agencies also emphasize the importance of management communicating information down and across organizational levels in order to enable personnel to perform key roles in achieving objectives and addressing risks. The Deputy Secretary of Defense has weighed in on the division of acquisition oversight responsibilities within the Office of the Secretary of Defense and has addressed specific roles and responsibilities for certain reforms. However, despite continuing disagreements about the division of oversight roles and responsibilities between the Office of the Secretary of Defense and the military departments, DOD’s top leadership has not provided a detailed framework addressing the appropriate roles of each party for acquisition oversight. Officials from the Office of the Secretary of Defense and the military departments we met with expressed different opinions on the appropriate oversight role of the Office of the Secretary of Defense. For example, the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment both stated that in cases where the milestone decision authority is at the military department level, the military departments do not see the value in having the Office of the Secretary of Defense involved. This is consistent with concerns that officials from all three military departments have raised in speaking with us. Specifically, officials from all three departments raised concerns that the Office of the Secretary of Defense is overreaching on its oversight responsibilities in some cases, and creating new oversight processes that contradict the intent of recent reforms to speed up the acquisition process. Implementation of several of the reforms we reviewed has resulted in disagreements between the Office of the Secretary of Defense and the military departments that have yet to be resolved. For example: Cost, fielding, and performance goals. Despite the issuance of policy by the Deputy Secretary of Defense in November 2018 on the establishment of cost, fielding, and performance goals, military department officials have continued to express concerns that the process is too burdensome and involves too many stakeholders from the Office of the Secretary of Defense. These officials stated that Office of the Secretary of Defense involvement in programs with decision authority at the military departments, such as participation in meetings with the milestone decision authority to provide advice on cost, fielding, and performance goals, would slow down programs that other reforms were intended to accelerate. They added that they had expressed these concerns to the Office of the Secretary of Defense during the drafting of the policy, but they did not feel that their input was appropriately considered in the final policy. Officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment stated that the analysis and meetings that involve the Office of the Secretary of Defense are ways for stakeholders to advise the milestone decision authority on program decisions based on information from existing oversight mechanisms, such as independent cost estimates and analyses of alternatives. Previously this type of oversight was conducted via multiple meetings leading up to program milestones. The policy states that the policy procedures will be revisited in 6 months and lessons learned incorporated where needed. Independent technical risk assessments. Debates about who should conduct independent technical risk assessments were elevated to the Deputy Secretary of Defense. Subsequently, the Deputy Secretary issued guidance in December 2018 to reiterate that the Under Secretary of Defense for Research and Engineering would conduct or approve these assessments for all major defense acquisition programs, although that responsibility may be delegated. However, despite the issuance of new guidance, there continue to be ongoing debates about when assessments will be delegated to the military departments. The December 2018 guidance does not include criteria for when responsibility for the assessments may be delegated. Officials from the Office of the Under Secretary of Defense for Research and Engineering said that decisions about whether to delegate assessments should be based primarily on the risk level of the program, but officials from military departments stated that these assessments should be conducted within the military department. Officials from the Office of the Under Secretary of Defense for Research and Engineering told us that they had convened a joint working group with the military departments in February 2019 to address this and other implementation issues related to independent technical risk assessments. In the meantime, nearly all assessments continue to be conducted by the Office of the Under Secretary of Defense for Research and Engineering. Middle-tier acquisition. Office of the Secretary of Defense and military department officials also disagree on the extent to which the Office of the Secretary of Defense should weigh in on the appropriateness of a program using a middle-tier pathway. DOD’s October 2018 interim governance guidance provided that the Office of the Secretary of Defense may determine that specific programs were not appropriate for a middle-tier pathway. However, officials from the Air Force and the Army expressed concerns to us about whether that determination was appropriate to be made by the Office of the Secretary of Defense since, from their perspective, programs should be selected at the military department level. Office of the Secretary of Defense officials also told us that there are differences of opinion between them and the military departments on the appropriate amount of information that programs should report to the Office of the Secretary of Defense, including whether the same information should be provided by all middle-tier programs, regardless of expected program cost. As stated earlier, DOD is in the process of finalizing guidance for middle-tier acquisition programs, which could address these issues. Documents that could outline roles and responsibilities of the various parties for acquisition oversight are still being developed. For example, as discussed earlier, officials from the Offices of the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment told us that chartering directives for these offices, which are expected to be completed in July 2019, may address to some extent how the offices should work together and with the military departments and other external organizations. In addition, officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment told us that while reforms are currently being implemented under multiple different polices and guidance documents, DOD Instruction 5000.02 will be substantially revised, including to reflect the latest reforms. When completed, the instruction is expected to provide further detail on how oversight activities will be carried out by various acquisition entities. Officials stated that they hoped to complete a version of the revision of DOD Instruction 5000.02 by the end of 2019, but they acknowledged that this estimate was optimistic and that it might take longer than expected to come to agreement on this policy. Without a comprehensive framework from top leadership in the near term that addresses acquisition oversight roles and responsibilities in detail, DOD’s ability to continue with reform implementation, including its ability to finalize policies that could clarify roles and responsibilities, may be slowed by ongoing disagreements. In the longer term, without resolving these issues, DOD cannot ensure that it is achieving the balance between oversight and accountability and efficient program management that senior leadership expects as an outcome of acquisition reform. With too little oversight, acquisition programs may not be properly scrutinized before they are started, which could lead to poor program cost and schedule outcomes. Alternatively, if new oversight processes are too burdensome, DOD may not achieve the expected benefits of streamlining its acquisition processes. As part of this review, we also assessed DOD’s efforts to implement our previous portfolio management recommendations and identified opportunities and challenges related to portfolio management that DOD may face as it continues to implement acquisition reforms. Our past work has shown that when investments are not managed as a portfolio at the enterprise level (meaning at the level of the Office of the Secretary of Defense, Joint Chiefs of Staff, and Joint Staff), the military departments plan to acquire more weapons than DOD can afford, sometimes develop potentially duplicative solutions to common needs, and do not always choose an optimal mix of investments to ensure the department can maintain its technological edge in the future. Realigning roles and responsibilities for decisions related to weapon system programs between the Office of the Secretary of Defense and the military departments could lead to further questions about who is ultimately responsible and accountable for portfolio management decisions if leadership roles are not clearly defined. Officials we met with from the Office of the Secretary of Defense told us that questions remain about the division of responsibilities between the Office of the Secretary of Defense and the military departments for making these types of portfolio management decisions. They told us that concerns we had previously identified about the division of decision-making authority for portfolio management had yet to be addressed during the implementation of recent acquisition reforms, and that in some cases, the reforms had led to additional questions. For example, the Under Secretary of Defense for Research and Engineering told us that while the statute that created his position as part of the restructuring of the former Office of the Under Secretary of Defense for Acquisition, Technology and Logistics assigns him responsibility for allocating resources for defense research and engineering, because he does not have control over the research and engineering budget, in actuality the military departments decide how to prioritize their investments. We found in August 2015 that DOD has had difficulty implementing portfolio management at the enterprise level in part due to diffuse decision-making responsibilities that make it difficult to determine who is empowered to make enterprise-level weapon system investment decisions. At that time, we recommended that DOD revise its portfolio management directive in accordance with portfolio management best practices. We also recommended that the Secretary of Defense designate the Deputy Secretary of Defense or some appropriate delegate responsible for the directive’s implementation, among other recommendations. DOD partially concurred with the recommendations, but the planned actions DOD identified at the time of our report did not fully address the issues we identified. For example, DOD stated that it did not plan to revise its portfolio management directive as we recommended, but instead planned to rescind it and direct stakeholders to participate in portfolio management through the requirements, acquisition, and budget processes. In response, we expressed concern that this approach could reinforce the stove-piped governance structure that we found to be an impediment to integrated portfolio management. As of March 2019, DOD had yet to implement our recommendations. An official from the Office of the Under Secretary of Defense for Acquisition and Sustainment told us that DOD is revising its portfolio management directive, but that there was not yet an estimated completion date. We are not making new recommendations on portfolio management in this report, but we continue to believe that DOD should implement our prior recommendations in order to improve its portfolio management capabilities. See appendix VI for additional details on our assessment of DOD’s progress in this area. DOD is beginning to monitor the implementation of certain reforms, but has yet to establish processes to assess the overall effectiveness of its reform efforts. Collectively, the reforms offer the potential for DOD to significantly reduce the time needed to approve and field acquisition programs by allowing the military departments additional opportunities to tailor documents needed for approval and limiting oversight by the Office of the Secretary of Defense. Ultimately, DOD anticipates that this opportunity will improve the speed at which new capabilities are delivered to the warfighter. Our prior work has identified steps that agencies, such as DOD, can take to help ensure successful implementation of reform efforts, including establishing clear outcome-oriented goals and performance measures putting in place processes to collect the needed data and evidence to effectively measure the reforms’ outcome-oriented goals. The Office of the Secretary of Defense has taken some initial steps to collect data that may help to measure the outcomes of a few reforms, but has yet to determine goals or processes for assessing the overall effectiveness of the reforms. For example, as previously discussed, the Office of the Under Secretary of Defense for Acquisition and Sustainment began initial efforts to collect middle-tier acquisition program data, such as cost and schedule data, from the military departments in November 2018. Officials from that office told us that once they address reliability concerns with the data they are receiving, such as ensuring that programs report schedule data in a consistent fashion, they anticipate that they will be able to use the data to better understand the military departments’ use of middle-tier acquisition pathways. However, according to officials we spoke with from the offices of the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment, DOD has not determined how it will assess whether the reforms are collectively resulting in an acquisition process that is more efficient or how it will measure their effect on cost and schedule outcomes. These officials told us that it is important to have data to assess the effect of recent acquisition policy and organizational changes, but they have not determined specifically who will do the assessment, how it will be done, and what data will be needed. They told us that as a part of the reorganization of the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, they are still in the process of assessing data gaps and needs within the newly-formed organizations and that this type of analysis needs to be completed before they determine how they will assess recent reforms. We recognize that assessing the cumulative effect of recent acquisition reforms on the acquisition process and on the cost and schedule performance of the major defense acquisition program portfolio could take several years because a critical mass of programs will need to go through the new acquisition processes. In the interim, however, determining how an assessment of reforms will be conducted is an important first step in determining whether the reforms are having their intended effect. If DOD officials wait too long to plan for how the department will assess the effect of recent acquisition reforms, including identifying who will be responsible for the assessment and what data will be needed, they may miss the opportunity to collect data from the beginning of implementation needed to measure progress. As a result, they may not be informed about early indications of improvements or problems in the cost, schedule, and performance of programs. Recent acquisition reforms have given DOD significant opportunity to focus on delivering innovative capability to the warfighter more quickly and reduce bureaucratic processes that had built up over time. While DOD has made progress in implementing these reforms, continued attention from top leadership would help ensure that the progress the department has made is not unnecessarily slowed or halted. Middle-tier acquisition will require careful consideration as the department proceeds with the development of final guidance. Middle-tier programs are generally exempt from traditional acquisition and requirements processes, but they may still be large, expensive programs critical to the department’s ability to meet its mission. Identifying the types of business case elements decision makers should consider when initiating programs would improve the department’s ability to ensure that the programs the military departments select are sound investments and likely to succeed using a middle-tier acquisition pathway. Identifying metrics to track performance consistently across the portfolio of middle-tier programs will provide necessary information to senior leaders once programs have been started to assess the performance of middle-tier acquisition programs, including whether they are well positioned to meet statutory objectives. The department also faces challenges that affect the implementation of the reforms we reviewed. These sweeping changes have resulted in some disagreements about oversight roles and responsibilities between the Office of the Secretary of Defense and the military departments that have not been fully resolved. Clear communication from top leadership of a framework for oversight roles and responsibilities that is detailed enough to address areas of continued disagreement would help the department to move forward with effective implementation of the reforms. Developing an approach to assess the effects of recent acquisition reforms is also critical so that DOD can monitor whether reforms are collectively having the effect of speeding up the acquisition process without unintended negative consequences on cost and performance of acquisition programs. We also continue to believe that DOD should address our past recommendations to clarify and strengthen roles and responsibilities at the enterprise level for making portfolio management decisions to make sure that its investments are strategy-driven, affordable, and balance near- and long-term needs. In fact, these recommendations may take on more importance for DOD in light of the implementation of acquisition reforms that will further diffuse responsibility for initiating and overseeing acquisition programs. We are making the following four recommendations to DOD: The Secretary of Defense should direct the Under Secretary of Defense for Acquisition and Sustainment to identify in final guidance the types of business case elements potential middle-tier acquisition programs should develop and decision makers should consider at program initiation to assess the soundness of programs’ business cases, including whether programs are well positioned to meet statutory objectives. (Recommendation 1) The Secretary of Defense should direct the Under Secretary of Defense for Acquisition and Sustainment to determine and identify in final guidance for middle-tier acquisition programs the metrics that will be used to assess the performance of middle-tier acquisition programs across the military departments, including whether programs are meeting statutory objectives. (Recommendation 2) The Secretary of Defense should ensure that a comprehensive framework that clarifies the roles and responsibilities of the Office of the Secretary of Defense and the military departments for acquisition oversight is communicated by senior leadership. This framework should be detailed enough to address areas of continued disagreement among key stakeholders and serve to inform the department’s revisions of other acquisition policies such as DOD Instruction 5000.02. (Recommendation 3) The Secretary of Defense should develop a plan for how the department will assess the effect of recent acquisition reforms, including identifying who will be responsible for the assessment and what data will be needed. (Recommendation 4) We provided a draft of this product to DOD for comment. In its comments, reproduced in appendix VII, DOD concurred with our four recommendations. DOD also provided technical comments with regard to improving the clarity of the discussion of certain reforms and providing additional context about military departments’ oversight practices for middle-tier acquisition programs, among other issues. We incorporated DOD’s technical comments as appropriate. In its written comments, DOD described planned actions to address our recommendations. Specifically, in response to our first recommendation, to identify the types of business case elements that should be considered by decision-makers for middle-tier programs at program initiation, DOD stated that it expects to identify these business case elements in its final guidance on middle-tier programs, which it expects to complete in September 2019. In response to our second recommendation, to identify metrics that will be used to assess the performance of middle-tier programs, DOD stated that it plans to determine performance metrics in coordination with its release of its final guidance on middle-tier programs. DOD expects to release this guidance in late 2019. In response to our third recommendation, for senior leadership to clarify acquisition oversight roles and responsibilities, DOD stated that these roles and responsibilities will be finalized through the issuance of chartering directives and updated acquisition policy; issuance is expected by the end of 2019. Finally, in response to our fourth recommendation, to plan for assessing the effects of acquisition reforms, DOD stated that it has included a division in the Office of the Assistant Secretary of Defense for Acquisition to analyze and assess this and other high-level oversight and policy issues. DOD’s planned actions to address our first, second, and fourth recommendation, if implemented effectively, should address the intent of our recommendations. With regard to our third recommendation, however, we do not believe that the steps outlined in DOD’s written comments are likely to fully address the disagreements about acquisition oversight roles and responsibilities that we identified in the report. We acknowledge in the report that DOD plans to issue chartering directives and re-issue DOD Instruction 5000.02 as part of its efforts to outline the roles and responsibilities of various parties for acquisition oversight, as DOD reiterated in its written comments. However, without a comprehensive framework to inform the revisions of acquisition policies, such as DOD Instruction 5000.02, DOD’s ability to finalize these policies may be hindered by the disagreements between the Office of the Secretary of Defense and the military departments that we identified in our report. These disagreements are persistent and focused on fundamental acquisition oversight issues. Simply issuing chartering directives and finalizing policy as planned may not be enough to ensure that areas of disagreement are resolved and that officials within the Office of the Secretary of Defense and the military departments have a shared understanding of an acquisition oversight framework for the entire Department that will serve as the basis for any policy. Furthermore, without senior leadership within DOD communicating this framework to the Office of the Secretary of Defense and the military departments in sufficient detail to address areas of disagreement among key stakeholders, disagreement will likely persist and the intended impacts of reforms could be stymied. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. This report addresses (1) the progress the Department of Defense (DOD) has made to implement selected oversight reforms for major defense acquisition programs; (2) how DOD has used middle-tier acquisition pathways and the extent to which DOD has developed guidance on middle-tier program oversight; and (3) challenges DOD faces related to reform implementation. The conference report for the National Defense Authorization Act for Fiscal Year 2018 and the Senate Armed Services Committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 also contained provisions for GAO to review project, program, and portfolio management standards within DOD. Appendix VI of this report includes our assessment of DOD’s efforts to implement our previous portfolio management recommendations and identifies opportunities and challenges related to portfolio management that DOD may face as it continues to implement acquisition reforms. We focused our review on five selected reforms from the National Defense Authorization Acts for Fiscal Years 2016 and 2017 that we determined substantially affected DOD’s oversight of acquisition programs. Our selections were informed by our analysis of the National Defense Authorization Acts for Fiscal Years 2016 and 2017 and our past work on factors affecting the oversight of major defense acquisition programs. We also interviewed officials from the Office of the Secretary of Defense and the military departments to obtain their perspectives on the most significant reforms to acquisition oversight and considered those perspectives when we made our selections. For the purposes of our report, when we refer to a reform, we are referring to a specific change to DOD’s acquisition oversight processes or roles and responsibilities. Two of the reforms we reviewed align with sections of the National Defense Authorization Act for Fiscal Year 2016, and the other three align with one or more sections from the National Defense Authorization Act for Fiscal Year 2017. Table 6 identifies the specific sections or subsections that we reviewed for each reform. We also reviewed related amendments to these sections from National Defense Authorization Acts for subsequent years to determine whether the National Defense Authorization Act sections we reviewed, or sections of the U.S. Code that were added by sections we reviewed, had been modified since being signed into law. When we identified amendments, we assessed DOD’s progress in implementing the statute as amended. Appendix II provides additional details about the original legislative requirements and amendments, if any, to each of the reforms we selected. To identify the progress DOD has made to implement selected oversight reforms for major defense acquisition programs, we analyzed three selected reforms that affect processes related to DOD’s oversight of major defense acquisition programs: designating military departments to be the milestone decision performing independent technical risk assessments; and establishing cost, fielding, and performance goals. We also analyzed one reform that restructured acquisition oversight functions in the Office of the Secretary of Defense. We analyzed the associated National Defense Authorization Act sections and reviewed related acquisition policies and guidance from the Office of the Secretary of Defense and the military departments (see app. II for a list of key guidance we reviewed for each reform). For each reform, we analyzed DOD and military department policies and guidance to determine steps DOD and the military departments had taken to implement the reforms. We also compared new or updated policies and guidance, when available, with prior policies and guidance to determine how oversight roles, responsibilities, and processes had changed for DOD’s major defense acquisition programs. To obtain additional insight into how designation of milestone decision authority had changed as a result of recent reforms, we requested and analyzed data provided by DOD about the milestone decision authority levels for the major defense acquisition program portfolio. To assess the reliability of these data, we discussed the data and sources used to compile them with DOD officials, reviewed the data for errors, reviewed related documentation on programs with milestone decision authority at the military department level, and compared the data when possible to other sources, such as publicly available lists of major defense acquisition programs. On the basis of these steps, we determined that the data we used were sufficiently reliable to identify changes in the level of milestone decision authority over time for major defense acquisition programs. To assess changes resulting from the reorganization of Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, we also reviewed updated organizational charts and staffing and vacancy data for the successor offices (the Office of the Under Secretary of Defense for Research and Engineering and the Office of the Under Secretary of Defense for Acquisition and Sustainment) and compared these to past organizational charts and staffing data for the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics. To determine the current percentage of positions vacant in each office, we compared actual data for filled positions as of March 2019 to the total number of vacant positions as of the same point in time. The vacancy numbers do not include vacant positions that are slotted for future reduction or transfer. To assess the reliability of these data, we requested and reviewed written responses from DOD officials on the reliability of the data and sources used to compile it, reviewed the data for logical inconsistencies, and compared the data when possible to other sources, such as related data provided for other time frames. On the basis of these steps, we determined that the data we used were sufficiently reliable to identify the current staffing status for the two new Under Secretary offices. To determine how DOD has used middle-tier acquisition pathways, we reviewed the relevant statute and guidance, and obtained information from the military departments about the number and types of programs using middle-tier acquisition pathways as of March 2019. We analyzed the guidance from the Office of the Under Secretary of Defense for Acquisition and Sustainment and the military departments to determine how they were implementing the statute with regard to selection of programs and program oversight. We also compared the guidance with our past work on elements of business cases that should be completed at program initiation to determine what elements were addressed by DOD guidance. At each of the military departments, we judgmentally selected three middle-tier programs to review in additional detail. We selected programs to obtain a range of program costs (including programs that were above the equivalent threshold cost for designation as a major defense acquisition program if the program were not using a middle-tier acquisition pathway, as well as those below that threshold) and types of programs being executed under middle-tier acquisition pathways (such as space, artillery, software, missile, and ground vehicle programs). Programs we selected include: Air Force: Hypersonic Conventional Strike Weapon; Next Generation Overhead Persistent Infrared Space; Protected Tactical Enterprise Service; Army: Extended Range Cannon Artillery; Optionally Manned Fighting Vehicle; Rapid Opioid Countermeasures System; and Navy: STANDARD Missile-2 Block IIIC; STANDARD Missile-6 Block IB Phase IA Rocket Motor; STANDARD Missile-6 Block IB Phase IB All Up Round. For these programs, we collected and analyzed additional information such as acquisition decision memorandums, acquisition strategies, program cost and schedule estimates, and risk assessments. We also interviewed or received detailed written responses from program officials that addressed issues such as how decisions were made to execute programs under middle-tier acquisition pathways and how oversight for programs was being conducted. Further, we reviewed interim guidance from the Office of the Under Secretary of Defense for Acquisition and Sustainment and the military departments to determine how DOD planned to measure middle-tier program performance. We compared DOD and the military departments’ guidance on developing metrics and collecting data to assess middle-tier program performance to relevant internal controls related to consistent measurement of program performance. To assess the challenges DOD faces with regard to reform implementation, we reviewed policy and guidance issued by top DOD leadership that outlined roles and responsibilities for the Office of the Secretary of Defense and the military departments with regard to acquisition oversight and compared them to leading practices for leadership involvement in agency transformations that we had identified in prior work. We also collected and analyzed information about DOD’s actions taken to implement prior recommendations we have made to improve portfolio management at DOD and analyzed the acquisition oversight reforms we included in this review to identify opportunities and challenges related to portfolio management that DOD may face as it continues to implement acquisition reforms. Lastly, we reviewed DOD’s plans and ongoing efforts to develop performance measures and collect data to assess the effects of acquisition reforms and compared these efforts with success factors for reform implementation identified in our past work. For all objectives, we also conducted interviews with officials from the Office of the Secretary of Defense, the Joint Staff, and the military departments to obtain additional insight into implementation status, implementation challenges, and future plans, including: Office of the Secretary of Defense: The Office of the Under Secretary of Defense for Research and Engineering, the Office of the Under Secretary of Defense for Acquisition and Sustainment, the Office of the Under Secretary of Defense (Comptroller), the Office of the Chief Management Officer, the Office of the Director of Operational Test and Evaluation, the Office of the Director of Cost Assessment and Program Evaluation, and the Office of the General Counsel. Joint Staff: Force Structure, Resource and Assessment Directorate, J-8. Military departments: For each of the three military departments (Air Force, Army, and Navy) we interviewed acquisition officials from the Service Acquisition Executive’s office, requirements officials supporting the Chief of Staff of the respective armed force, and officials from the military department cost agencies. At the Air Force we also interviewed officials from the Office of the General Counsel. We conducted this performance audit from March 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix III: Milestone Decision Authority for Major Defense Acquisition Programs as of March 2019 Programs with milestone decision authority at the Air Force level (26) Advanced Extremely High Frequency Satellite AIM-120 Advanced Medium Range Air-to-Air Missile Air Force Intercontinental Ballistic Missile Fuze Modernization Airborne Warning and Control System Block 40/45 Upgrade B61 Mod 12 Life Extension Program Tailkit Assembly F-15 Eagle Passive Active Warning Survivability System Family of Advanced Beyond Line-of-Sight Terminals Global Positioning System III Follow-On Production Military Global Positioning System User Equipment Increment 1 MQ- 9 Reaper Unmanned Aircraft System Small Diameter Bomb Increment II Space Based Infrared System High Space Fence Ground-Based Radar System Increment 1 Wideband Global SATCOM Programs with milestone decision authority at the Army level (18) AH-64E Apache New Build Airborne & Maritime/Fixed Station Joint Tactical Radio System AN/TPQ-53 Counterfire Target Acquisition Radar Common Infrared Countermeasure Programs with milestone decision authority at the Army level (18) Guided Multiple Launch Rocket System/Guided Multiple Launch Rocket System Alternative Warhead Handheld, Manpack, and Small Form Fit Radios M88A2 Heavy Equipment Recovery Combat Utility Lift Evacuation System MQ-1C Gray Eagle Unmanned Aircraft System Patriot Advanced Capability-3 Missile Segment Enhancement RQ-7B Shadow Tactical Unmanned Aircraft System Warfighter Information Network-Tactical Increment 2 Programs with milestone decision authority at the Navy level (36) Advanced Arresting Gear AGM-88E Advanced Anti-Radiation Guided Missile Air and Missile Defense Radar Amphibious Combat Vehicle Phase 1 Increment 1 CVN 78 Gerald R. Ford Class Nuclear Aircraft Carrier DDG 1000 Zumwalt Class Destroyer DDG 51 Arleigh Burke Class Guided Missile Destroyer H-1 Upgrades (4BW/4BN) Joint Precision Approach and Landing System LHA 6 America Class Amphibious Assault Ship Littoral Combat Ship Mission Modules LPD 17 San Antonio Class Amphibious Transport Dock MQ-4C Triton Unmanned Aircraft System Programs with milestone decision authority at the Navy level (36) MQ-8 Fire Scout Unmanned Aircraft System Offensive Anti-Surface Warfare Increment 1 (Long Range Anti-Ship Missile) The conference report for the National Defense Authorization Act for Fiscal Year 2018 and the Senate Armed Services Committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 included provisions for GAO to review project, program, and portfolio management standards within DOD. This appendix includes our assessment of DOD’s efforts to implement our previous portfolio management recommendations and identifies opportunities and challenges related to portfolio management that DOD may face as it continues to implement acquisition reforms. Portfolio management is used by leading commercial companies to help ensure their investments are optimized to meet customer needs within available resources. Portfolio management focuses on products collectively at an enterprise level and involves evaluating, selecting, prioritizing, and allocating limited resources to projects that best accomplish strategic or organizational goals. It is also a vehicle to make a wide variety of decisions, including capability and funding trade-offs, to achieve the optimal capability mix for a given level of investment. For DOD, effective portfolio management can help to ensure that weapon system investments are strategy-driven and affordable and balance near- and long-term needs. Take a hypothetical example in which DOD starts with 10 programs and $50 billion to invest. Without portfolio management, program managers may seek to get the most that they can out of each of the 10 programs, without assessing their aggregate contributions to defense. Using portfolio management, DOD executives would look at different combinations of and approaches to the 10 programs to determine what, collectively, would provide the best capabilities for $50 billion. This would enable executives to decide, for example, whether it is better to concentrate more investment in seven programs rather than fund all 10 as best as possible. In another example, if a program began to have cost or performance problems, portfolio management would consider whether the other programs in the portfolio could address the requirements of the problematic program rather than just putting more money into it. Portfolio management activities at DOD are carried out at both the enterprise level and the military department level and responsibilities are divided among the requirements community, the acquisition community, and the budget community. At the enterprise level, the primary offices responsible for portfolio management are the Joint Staff (representing the requirements community), the Under Secretary of Defense for Research and Engineering and the Under Secretary of Defense for Acquisition and Sustainment (representing the acquisition community), and the Director of Cost Assessment and Program Evaluation (representing the budget community). In 2007, we identified several best practices for portfolio management, which we revalidated in 2015. These leading practices encourage organizations to assess product investments collectively from an enterprise level, rather than as independent and unrelated initiatives; continually make go/no-go decisions through a gated review process to rebalance portfolios based on investments that add the most value; use an integrated approach to prioritize needs and allocate resources in accordance with strategic goals; rank and select investments using a disciplined process to assess the costs, benefits, and risks of alternative products; empower leadership to make investment decisions and hold leadership accountable for investment outcomes; and provide sustained leadership for portfolio management. Portfolio management best practices and the Project Management Institute’s portfolio management standards also state that organizations should conduct regular reviews to adjust to strategic changes or changes in the mix of products within a portfolio, among other reasons. From a DOD perspective, portfolio reviews can help increase return on taxpayers’ investments in weapon systems in a number of ways, such as: helping to ensure investments align with national security and military strategies; prioritizing the most important investments; selecting the optimum mix of investments; identifying and eliminating unwarranted duplication; monitoring programs’ health to determine whether changes to the portfolio are warranted; and determining whether investments are affordable. We have previously reported that DOD was not effectively using portfolio management to optimize its weapon system investments. In 2015, we identified several factors that inhibited DOD’s ability to do so, including fragmented governance, a lack of sustained leadership, and a perceived lack of decision-making authority at the enterprise level. We also found that DOD’s portfolio management policy was dated, not fully consistent with best practices, and was not being implemented by the Department, in part due to changes in leadership priorities. Further, DOD’s enterprise- level requirements, acquisition, and budgeting communities—meaning those at the Office of the Secretary of Defense, Joint Chiefs of Staff, and Joint Staff level—were not consistently conducting portfolio reviews or collaborating to integrate key information. As a result, we reported that DOD may have been missing opportunities to better leverage its resources and identify investment priorities that best reflect DOD-wide needs. We recommended that DOD update its portfolio management policy; designate a senior official responsible for its implementation; conduct annual portfolio reviews that integrate key information from the requirements, acquisition, and budget processes; and invest in analytical tools to support its portfolio management efforts. DOD partially concurred with the recommendations, but the planned actions DOD identified at the time of our report did not fully address the issues we identified. As of March 2019, DOD had yet to implement our recommendations from 2015 (see table 16 for details of implementation status). It is too soon to assess the effect of the acquisition reforms we reviewed on DOD’s portfolio management efforts because a critical mass of programs has not yet gone through the new acquisition processes. Depending on how the department implements these reforms, some aspects of these reforms could help to address previously-identified deficiencies in portfolio management in the department. For example: Officials in the Office of the Under Secretary of Defense for Acquisition and Sustainment told us that now that milestone decision authority for major defense acquisition programs has largely shifted from the Office of the Secretary of Defense to the military departments, they expect that they will have more time to focus on portfolio-level issues such as identifying how systems need to work together to fill capability gaps since they are less involved in the details of individual programs. We previously reported that DOD’s processes were too focused on optimizing individual investments rather than considering investments across the department. The process developed by DOD to establish cost, fielding, and performance goals brings together officials from DOD’s acquisition, requirements, and budget communities, the three key entities with responsibility for portfolio management, to provide advice on the establishment of program goals. We previously reported that DOD’s enterprise-level processes, organizations, and decision makers oversee weapon system investments generally as stove-pipes and not as an integrated whole. While the process assesses programs on an individual basis rather than collectively from an enterprise level as called for by portfolio management best practices, it may still provide additional shared insight across the acquisition, requirements, and budget communities to help assess portfolios in a more integrated fashion at an enterprise level. However, other aspects of certain reforms have the potential to exacerbate challenges we have previously identified with DOD’s portfolio management approach if not actively managed. For example: Realigning roles and responsibilities for decisions related to weapon systems programs could lead to further questions about who is ultimately responsible and accountable for portfolio management decisions if leadership roles are not clearly defined. We previously reported that DOD’s governance structure for portfolio management was fragmented in part as a result of widely-dispersed decision making responsibilities for weapon system investments. We found that this dispersion of responsibility made it difficult to determine who was empowered to make enterprise-level weapon system investment decisions and who can be considered portfolio managers. According to portfolio management best practices, leadership should be clearly defined and held accountable for outcomes. Programs under middle-tier acquisition pathways have fewer requirements to report program information to offices within the Office of the Secretary of Defense and the Joint Staff than major defense acquisition programs. For example, middle-tier acquisition programs are generally exempted from the Joint Capabilities Integration and Development System for requirements development. Therefore Joint Staff officials may have less information about program requirements than for a major defense acquisition program. Office of the Secretary of Defense officials told us they are working with the military departments and other stakeholders to determine what information is needed for oversight and portfolio management for middle-tier acquisition programs. Office of the Secretary of Defense and Joint Staff officials told us that guidance issued by the Under Secretary of Defense for Acquisition and Sustainment in October 2018 that gives the Office of the Secretary of Defense and Joint Staff formal roles in a governance process may help to ensure sufficient insight. DOD’s ability to develop a common set of portfolios to facilitate integrated portfolio analysis may be more difficult. We previously reported that the requirements, acquisition, and budget communities at DOD were using different portfolio constructs, meaning that they defined their portfolios differently and did not use a standard approach to group investments into portfolios. We identified the use of different approaches as a barrier to taking an integrated approach to prioritize needs and allocate resources in accordance with strategic goals, as called for by portfolio management best practices. For example, the requirements community uses eight joint capability areas for examining warfighter needs, acquisition portfolios vary by military department, and budget data are organized into 11 major force programs. In our prior work, many officials at DOD said that using a wide variety of portfolio constructs is necessary and sometimes beneficial given the different roles and perspectives of the organizations involved. However, as notionally illustrated in figure 8, the different communities need to go through an extensive mapping exercise when they want to analyze their portfolios from another perspective—for example, examining funding associated with joint capability areas. With the reorganization of the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, officials from the Offices of the Under Secretaries of Defense for Research and Engineering and Acquisition and Sustainment told us that portfolio management activities that used to be conducted by the Office of the Under Secretary of Defense for Acquisition, Technology and Logistics are now split between their offices. Officials from the Office of the Under Secretary of Defense for Research and Engineering told us that they were still in the process of determining what portfolio construct they would use to group investments for portfolio management purposes. If that office decides to use a different portfolio construct than other entities, that decision will increase the already complex process of mapping together portfolios in order to perform an integrated portfolio analysis. Officials from both offices told us that they were working on a pilot effort to conduct portfolio management by focusing on DOD’s missions rather than programs, which could help to standardize the portfolio constructs if the approach is accepted on a wider scale. In addition to the contact named above, Cheryl Andrew (Assistant Director), Marie Ahearn, Peter W. Anderson, David Dornisch, Anne McDonough, Melissa Pope, Scott Purdy, Juli Steinhouse, Sara Sullivan, Anne Louise Taylor, Alyssa Weir, and David Wishard made key contributions to this report.", "summary": "Amid concerns about the ability of DOD's acquisition process to keep pace with evolving threats, Congress included numerous reforms in recent National Defense Authorization Acts that could help to streamline acquisition oversight and field capabilities faster. GAO was asked to examine DOD's efforts to implement these reforms. This report addresses (1) the progress DOD has made implementing selected oversight reforms related to major defense acquisition programs; (2) how DOD has used middle-tier acquisition pathways; and (3) challenges DOD faces related to reform implementation. GAO reviewed five reforms: milestone decision authority designation; cost, fielding, and performance goals; independent technical risk assessments; restructuring of acquisition oversight offices; and middle-tier acquisition. GAO analyzed applicable statutes and implementing guidance, collected information from DOD about the number and types of middle-tier acquisition programs, reviewed relevant documentation, and interviewed DOD officials. The Department of Defense (DOD) has made progress in implementing reforms to restructure the oversight of major defense acquisition programs. As a result of one of these reforms, decision-making authority for many programs shifted from the Office of the Secretary of Defense to the military departments (see figure). Questions remain about how some reforms GAO reviewed will be carried out. For example, no programs have been required to have cost and fielding goals set under DOD's new process yet, and DOD has formed a working group to determine when to delegate risk assessments to the military departments. DOD also began using new pathways referred to as middle-tier acquisition to rapidly prototype and field new weapon systems. Middle-tier programs are expected to field capabilities within 2 to 5 years. As of March 2019, military departments were using this authority for 35 unclassified programs (see table). Source: GAO analysis of Department of Defense data. | GAO-19-439 DOD has yet to fully determine how it will oversee middle-tier acquisition programs, including what information should be required to ensure informed decisions about program selection and how to measure program performance. Without consistent oversight, DOD is not well positioned to ensure that these programs—some of which are multibillion dollar acquisitions—are likely to meet expectations for delivering prototypes or capability to the warfighter quickly. DOD also continues to face implementation challenges, including one related to disagreements about oversight roles and responsibilities between the Office of the Secretary of Defense and the military departments. Senior DOD leadership has not fully addressed these disagreements. As a result, DOD is at risk of not achieving an effective balance between oversight and accountability and efficient program management. GAO is making four recommendations, including that DOD should identify the types of information needed to select and oversee middle-tier acquisition programs consistently, and clarify the roles and responsibilities of the Office of the Secretary of Defense and the military departments for acquisition oversight. DOD concurred with GAO's recommendations and described actions planned to address them.", "document_type": "gao"}
{"report": "Signed into law on May 9, 2014, the DATA Act expands on previous federal transparency legislation. It requires a greater variety of data related to federal spending by agencies, such as budget and financial information, to be disclosed and agency spending information to be linked to federal program activities so that policymakers and the public can more effectively track federal spending through its life cycle. The act gives OMB and Treasury responsibility for establishing government-wide financial data standards for any federal funds made available to, or expended by, federal agencies. As Treasury and OMB implemented the DATA Act’s requirement to create and apply data standards, the overall data standardization effort has been divided into two distinct, but related, components: (1) establishing definitions which describe what is included in each data element with the aim of ensuring that information will be consistent and comparable and (2) creating a data exchange standard with technical specifications that describe the format, structure, tagging, and transmission of each data element. Accordingly, OMB took principal responsibility for developing policies and defining data standards. Treasury took principal responsibility for the technical standards that express these definitions, which federal agencies use to report spending data for publication on USAspending.gov. Under the act, agencies are required to submit complete and accurate data to USAspending.gov, and agency-reported award and financial information is required to comply with the data standards established by OMB and Treasury. See app. V for more information on the sources of data and process for submitting data under the DATA Act. Since the DATA Act’s enactment in 2014, we have issued a series of reports and made recommendations based on our ongoing monitoring of DATA Act implementation. In November 2017, we issued our first report on data quality, which identified issues with, and made related recommendations about, the completeness and accuracy of the Q2 FY2017 data that agencies submitted, agencies’ use of data elements, and Treasury’s presentation of the data on Beta.USAspending.gov. In addition, as part of our ongoing monitoring of DATA Act implementation, and in response to provisions in the DATA Act that call for us to review IG reports and issue reports assessing and comparing the quality of agency data submitted under the act and agencies’ implementation and use of data standards, we issued a report in July 2018, based on our review of the IG reports of the quality of agencies’ data for Q2 FY2017. Our prior reports identified significant data quality issues and challenges that may limit the usefulness of the data for Congress and the public. These data quality challenges underscore the need for OMB and Treasury to make further progress on addressing our 2015 recommendation that they establish clear policies and processes for developing and maintaining data standards that are consistent with key practices for data governance. Such policies and processes are needed to promote data quality and ensure that the integrity of data standards is maintained over time. In March 2019, we reported on the status of OMB’s and Treasury’s efforts to establish policies and procedures for governing data standards. We found that OMB and Treasury have established some procedures for governing the data standards established under the DATA Act, but a formal governance structure has yet to be fully developed. Therefore, we made recommendations to OMB to clarify and document its procedure for changing data definition standards, and to ensure that related policy changes are clearly identified and explained. For Q4 FY2018, 107 agencies, including all 24 CFO Act agencies and 83 non-CFO Act agencies, determined they were required to submit data, or they would voluntarily submit data, under the DATA Act. Of these 107 agencies, 96 submitted data for Q4 FY2018. This is an increase over the initial submissions for Q2 FY2017 when 78 agencies submitted data that covered 91 federal entities. This represents an improvement in the number of agencies reporting. However, not all the required files submitted by agencies were complete, and the data submitted were not always accurate (i.e., consistent with agency source records and other authoritative sources and applicable laws and reporting standards). In addition, we found that some CFO Act agencies did not include certain financial assistance programs that made awards during fiscal year 2018 in their submissions. Finally, some agencies continued to have challenges in reporting some data elements in accordance with standards. While the total number of agencies that submitted data for Q4 FY2018 increased compared to Q2 FY2017, more agencies submitted their data for Q4 FY2018 after the due date compared to Q2 FY2017. In addition, the data for Q4 FY2018 available on USAspending.gov are not complete because some agencies failed to submit data or submitted partial data. Fourteen agencies submitted late. Agencies were required to submit their DATA Act files for Q4 FY2018 by November 14, 2018—45 days after the end of the quarter. Eighty-two agencies submitted their data on time. These 82 agencies represented about 84 percent of the total obligations government-wide reported to Treasury on the SF 133 for Q4 FY2018. Fourteen agencies submitted their data after the November 14, 2018 due date. Our prior review of data submitted for Q2 FY2017 found that one agency submitted data after the due date. Eleven agencies did not submit data. Eleven non-CFO Act agencies did not submit any DATA Act files for Q4 FY2018. By contrast, in reviewing Q2 FY2017 data, we identified 28 agencies that determined they should have reported data under the DATA Act, but did not. Agencies told us that they did not submit data for Q4 FY2018 because (1) there was confusion or miscommunication between the agency and its shared service provider about who was responsible for reporting the data; (2) their officials had determined the agency was not required to report; (3) new staff were unfamiliar with DATA Act requirements; and (4) technical or systems issues, such as a financial system upgrade in process, prevented them from reporting their data. Multiple agencies submitted blank files. Of the 96 agencies that submitted DATA Act files for Q4 FY2018, 35 non-CFO Act agencies submitted the file that links budget and award information (i.e., File C) or the file containing procurement data (i.e., File D1) that did not contain any data (i.e., files were blank). Specifically, 34 non-CFO Act agencies submitted a blank File D1, which contains procurement data, and 16 of those 34 also submitted a blank File C. Another non-CFO Act agency submitted a blank File C only. File C data are particularly important to oversight and transparency because they link budget and award information, as required by the DATA Act. Without this linkage, policymakers and the public may be unable to effectively track federal spending because they would be unable to see obligations at the award and object class level. Agencies told us they submitted files without data for reasons including: (1) their data was submitted by and comingled with their shared service provider’s DATA Act submissions; (2) they did not have award activity to report or award activity was below the micro-purchase threshold for reporting; and (3) they do not use the Federal Procurement Data System- Next Generation or their systems were unable to produce the data necessary to create the files. We did not assess the completeness of File D1 in 2017, but we found that 13 agencies submitted a blank File C in Q2 FY2017. Of these 13 agencies, two were CFO Act agencies with large amounts of award activity —the Departments of Defense (DOD) and Agriculture (USDA)— both of which did submit a File C with data for Q4 FY2018. Two agencies submitted incomplete files. DOD and Treasury submitted all seven required DATA Act files for Q4 FY2018, but the data in some of those files were not complete. According to DOD officials, its File C submission for Q4 FY2018 included data from six of its 18 accounting systems. DOD officials said they are working to report data from all 18 systems in File C by the fourth quarter of fiscal year 2019. They said prior to Q4 FY2018, OMB granted DOD extensions for reporting financial and payment information in File C, as permitted by the act. DOD officials said the extensions allowed DOD to focus on financial statement audit readiness, build a single source tool from which File C obligation data could be aligned with procurement and grant data, and coordinate with the intelligence community on concerns over increased transparency. According to Treasury officials, the agency’s data submission did not include the spending of one of its component organizations—the Treasury Executive Office for Asset Forfeiture, Equitable Sharing Program— because OMB guidance does not allow for reporting aggregate transactions when Primary Place of Performance, a required data element, is at a multistate or nationwide level. According to Treasury officials, Treasury is working with OMB and the Treasury DATA Act Program Management Office to allow for these types of transactions to be reported. In our 2017 review, we identified similar challenges with the completeness of agencies’ DATA Act submissions for Q2 FY2017 and made recommendations to Treasury and OMB to improve the completeness of data on USAspending.gov. We recommended that Treasury reasonably assure that ongoing monitoring controls to help ensure the completeness and accuracy of agency submissions are designed, implemented, and operating as intended. Treasury agreed with this recommendation. In September 2019, Treasury officials told us that they are working to formalize a process for monitoring agency submissions that will include emailing reminders to agencies prior to submission deadlines, following up with agencies that do not submit required data on time, and forwarding a list of non-compliant agencies to OMB. We also recommended that OMB continue to provide ongoing technical assistance that significantly contributes to agencies making their own determinations about their DATA Act reporting requirements and that it monitor agency submissions. While OMB generally agreed with our recommendation, it has not yet taken steps to monitor agency submissions to help ensure their completeness. In October 2019, OMB staff told us that they believe monitoring agency submissions is not their responsibility. During this review we asked agencies why they did not submit data for Q4 FY2018. Subsequently, five of them submitted their data late (out of the initial 18 agencies that had not submitted data), demonstrating that simple monitoring tasks such as a follow up call or email can result in actions taken by the agencies. To address ongoing challenges with the completeness of agencies’ DATA Act submissions, we continue to maintain that Treasury and OMB should monitor agencies’ submissions to help ensure the completeness and accuracy of those data submissions. See app. IV for more information on the status of these recommendations. Agencies did not report awards made to 39 financial assistance programs. Seven of the 24 CFO Act agencies did not report spending for at least one financial assistance program that made awards during fiscal year 2018. File D2 contains detailed information about individual financial assistance awards. We compared the spending data reported by the 24 CFO Act agencies in File D2 against the Assistance Listings, formerly known as the Catalog of Federal Domestic Assistance (CFDA), a government-wide compendium of federal programs, projects, services, and activities that provide assistance or benefits to the American public. As of March 2019, the Assistance Listings website contained 2,926 programs for the CFO Act agencies. Of these, 39 programs (approximately 1 percent) were not included in the Q4 FY2018 DATA Act submissions, even though these agencies stated that they made reportable awards during fiscal year 2018. In comparison, in July 2017, the CFDA listed 2,219 programs for the CFO Act agencies. Of these 2,219 programs, 160 programs (approximately 7 percent) were not included in the Q2 FY2017 DATA Act submissions even though they made reportable awards. The remaining programs either reported at least one award or did not make awards that were subject to reporting. To provide a sense of magnitude of the underreporting, we obtained estimates of the total projected annual spending for these programs for fiscal year 2018 from the Assistance Listings website and applicable agencies. Based on the estimated obligations, the 39 programs account for approximately $11.5 billion in estimated annual obligations in fiscal year 2018. The omitted amounts largely resulted from USDA’s failure to report 27 programs representing more than 99 percent of the estimated annual obligations. According to USDA officials, USDA did not submit awards for some of these programs because it maintains that the information in legacy reporting systems is incompatible with the Treasury broker. USDA is working on solutions to resolve identified reporting challenges with its financial and awards systems. Treasury took steps to address findings on completeness issues for financial assistance programs we reported in 2017. At Treasury’s request, we provided details regarding the programs that were omitted from the USAspending.gov database for fiscal year 2017, which Treasury shared with the appropriate agencies. In our review of fiscal year 2018 data, we found that only nine of these programs did not report. Based on the results of testing performed on a sample of budgetary and award transactions, we found that the overall completeness within individual transactions and accuracy of the reported data was high. We selected a projectable government-wide sample of 405 transactions and tested 41 data elements and subelements associated with them for completeness and accuracy. We determined data completeness within the transaction based on whether the element included a value and whether the value was appropriate. We determined accuracy of data elements by determining consistency with agency source records as well as applicable laws and reporting standards. Specifically, based upon our sample we estimate with a 95 percent confidence level that all the data in the population were between 99 and 100 percent complete and between 90 and 93 percent accurate. We further analyzed accuracy at the transaction and individual data element levels as follows: 1. Transaction level, which describes the extent to which all applicable data elements within an individual transaction are complete and consistent with agency source records, and applicable laws and reporting standards. 2. Data element level, which describes the extent to which the data elements and subelements used for reporting budgetary and award information were consistent with agency source records and applicable laws and reporting standards. Consistency of transactions. For data submitted in Q4 FY2018, we found that the level of consistency differed between budgetary and award transactions, but both improved compared to the data we sampled for our review of Q2 FY2017 data. Based on our projectable government-wide sample of Q4 FY2018 data, we estimate with 95 percent confidence that between 84 and 96 percent of the budgetary transactions and between 24 and 34 percent of the award transactions in the USAspending.gov database were fully consistent with agency sources. We considered a transaction to be “fully consistent” if the information contained in the transaction was consistent with agency records for every applicable data element. This result represents an increase in consistency from what we reported in 2017, when we estimated that between 56 and 75 percent of budgetary transactions were fully consistent, and between 0 and 1 percent of award transactions were fully consistent. In addition to the transactions that were fully consistent, we estimate that 94 to 100 percent of budgetary transactions and 62 to 72 percent of award transactions in the population were significantly consistent. We considered a transaction significantly consistent if 90 percent or more of the data elements and subelements in the transaction were consistent with agency source records and applicable laws and reporting standards. Consistency of data elements. We also found improvements in the consistency of budgetary and award data elements with agency records, and applicable laws and reporting standards. As shown in figure 1, more data elements were significantly consistent and fewer were significantly inconsistent in Q4 FY2018 than Q2 FY2017. We considered a data element to be “significantly consistent” if the estimated consistency rate was at least 90 percent. Five of six of the budgetary data elements were significantly consistent in Q4 FY2018, compared to four of seven data elements in our 2017 review. We also found improvements in the consistency of award data elements and subelements compared to our 2017 review. Eighteen of the 35 award data elements and subelements in our sample were significantly consistent in Q4 FY2018, compared to only one of 26 data elements and subelements we tested in our 2017 review. See figure 2 for the data elements and subelements in our sample that were significantly consistent. We considered a data element “significantly inconsistent” if it was either not consistent with agency records or incomplete at least 10 percent of the time. We found that no budgetary data elements were significantly inconsistent, which is an improvement from our 2017 review where we found one budgetary data element—Obligation—significantly inconsistent. Similarly, we found fewer significantly inconsistent award data elements compared to our 2017 review. Specifically, we found five of 35 award data elements and subelements significantly inconsistent in Q4 FY2018, compared to 11 of 26 in our 2017 review. See figure 3 for the data elements and subelements in our sample that were significantly inconsistent. Unverifiable data elements. We found no data elements that exhibited a significant amount of unverifiable information—incomplete or inadequate agency source records that prevented us from determining whether the data element was significantly consistent or inconsistent. See app. III for details. While we tested the consistency of agency records and applicable laws and reporting standards for the 41 data elements and subelements previously discussed, we performed a different test for three other data elements that contained a value derived by FPDS-NG and FABS. These data elements and subelements—Legal Entity County Name, Primary Place of Performance County Name, and Primary Place of Performance Congressional District—were assessed against the other sources from which they were derived, such as data from the U.S. Census Bureau and house.gov, rather than agency records. We found that each were neither significantly consistent nor significantly inconsistent with their sources. See appendix III, table 5 for details. The DATA Act requires OMB and Treasury to establish data standards to produce consistent and comparable reporting of federal spending data. While we found improvements in the overall completeness and accuracy of the data when compared with the results of our 2017 review, we identified persistent challenges with the implementation and use of two award data elements—Award Description and Primary Place of Performance Address that limit the usefulness of these data. We previously reported that these data elements are particularly important to achieving the transparency goals envisioned by the DATA Act because they inform the public what the federal government spends money on and where it is spent. In our sample results, we found agencies reported values for Award Description that were significantly inconsistent with agency sources and with the established standard for reporting this data element which is defined by the DATA Act data standard as a “brief description of the purpose of the award.” Based on our testing of a representative sample of Q4 FY2018 transactions, we estimate that the Award Description data element was inconsistent with agency source records or contained information that was inconsistent with the established standard in 24 to 35 percent of awards. While this represents an improvement over the results we reported for this data element in 2017, we found in our testing that agencies continue to face challenges in reporting Award Description consistent with the established standard. See figure 4 for several examples of the Award Description data submitted by agencies in our sample, which illustrates the range of agency interpretations of this data element from understandable to incomprehensible. Lengthy, technical description. For example, the National Aeronautics and Space Administration (NASA) included several paragraphs for the description of procurement and financial assistance award transactions in our sample that were long and highly technical. These descriptions did not meet the data standard because they contained acronyms, jargon, and other technical terminology that might be challenging for others outside the agency to understand. NASA officials said they use the Award Description field internally to search for vendors when making awards for similar services. Thus, they instructed contract officers to include as much information as possible to maximize the Award Description field for later use. As of June 2019, the General Services Administration decreased the character limit for reporting Award Description in FPDS-NG for procurement awards from 4,000 characters to 250 characters to discourage agencies from copying and pasting sizeable portions of a contract’s contents rather than thoughtfully including a brief description of what is being procured. NASA officials said that the new maximum will limit the flexibility to search for contractors. They are seeking alternatives for these searches. No description provided. The Department of Education reported “unknown title” for the Award Description for the majority of the financial assistance award transactions in our sample. This does not meet the data standard because it does not provide any information about the award. Agency officials said the Award Description is provided by the applicant and if one is not provided, their system automatically will populate it as “unknown title.” Geographic information. DOD reported location information for the Award Description in several transactions in our sample. The locations reported in the description field were not understandable except to agency officials. For example, one field contained the text “4542874050!TRBO REGION 1.” DOD officials explained that this description includes the part number for a medical supply item and the region of the country and is auto populated by an agency system. While the description is consistent with agency sources, it is not easily understood by the public. The Defense Federal Acquisition Regulation Supplement Procedures, Guidance, and Information provides instructions to use plain English as much as possible, and to explain numbers and acronyms. DOD officials said the agency is investigating methods to improve how similar transactions are auto-populated. Description of modification. The Department of Homeland Security (DHS) used the Award Description field to describe modifications to contracts instead of the good or service being procured. Specifically, DHS reported “de-obligate excess funds and closeout” for a modification to a contract that procured information technology products and services. DHS officials said reporting the nature of the modification, rather than the original purpose of the award, is consistent with practices used in contract writing systems across the federal government and is intended to inform the public of changes made to the contract by the modification. DHS is working with Treasury to clarify how this information is displayed on USAspending.gov and suggested that additional information on how award descriptions for modifications are to be reported would be beneficial and should be provided in the DAIMS. We found that some individual agencies have taken steps to provide additional guidance on Award Description to ensure agency personnel are providing information that is consistent with the standard. Four agencies in our sample had additional guidance for their contracting officers. For example, officials from the Department of Veterans Affairs (VA) said that in June 2019, VA trained hundreds of members of its contracting workforce with curriculum that included an interactive game to illustrate how to provide a brief description of an award that meets the standard for reporting this information. Officials from 11 agencies said additional guidance on Award Description could help ensure those entering the data understand the standard definition and report appropriate information, for example, by providing examples of award definitions that meet the standard. In the absence of government-wide guidance, agencies have reported values that are inconsistent with the data standard and not comparable between agencies. Agencies also reported several challenges with reporting Primary Place of Performance Address for nonroutine locations, which OMB and Treasury defined as “where the predominant performance of the award will be accomplished.” Taking into account each of its subelements, we found the information regarding Primary Place of Performance Address had higher rates of inconsistency than the majority of the data elements in our review. Multiple subrecipients. Agency officials reported challenges with identifying Primary Place of Performance Address in cases where an award is made to a recipient that further distributes the funding to subrecipients. For example, the U.S. Agency for Global Media (USAGM) awards Radio Free Europe/Radio Liberty a grant that funds work globally. Officials from USAGM said that as a U.S. not-for-profit organization, Radio Free Europe/Radio Liberty, maintains corporate headquarters in Washington, D.C., but, as an international media organization, maintains many offices abroad. USAGM reports the Primary Place of Performance Address as Washington, D.C. because it is where the organization maintains its corporate office, but much of the performance takes place in other locations. In another example, the Department of Health and Human Services’ (HHS) Centers for Medicare and Medicaid Services (CMS) reports the Primary Place of Performance Address for Medicare payment data as the county of its payment processing centers, even though each processing center makes payments to recipients in multiple states and counties. CMS contracts with Medicare Administrative Contractors (MAC) to process and pay Medicare fee-for-service claims. For each type of Medicare claim, the number of jurisdictions and the number of MACs that handle that type of claim vary. At the time of our review, there were 12 jurisdictions for Medicare Part A and B claims handled by MACs. As shown in figure 5, the jurisdictions are made up of multiple states. In addition to the MAC jurisdictions for Medicare Part A and Part B claims, there were four home health and hospice jurisdictions and four durable medical equipment jurisdictions. Thus, there are 20 MAC jurisdictions, almost all of which covered multiple states. As a result, the spending for Medicare payments is reported in a small number of counties instead of where the beneficiaries of Medicare services are located. Software. Officials from three agencies in our review said that it is challenging to determine Primary Place of Performance Address for software licenses when purchased as a service. For example, there could be multiple performance locations, but none of these locations are predominant. Large or undefined locations. Officials from the agencies in our review reported challenges in meeting the standard for reporting large or undefined performance locations. For example, officials from the Delta Regional Authority said that it was difficult, at times, to determine the Primary Place of Performance Address for watersheds because they can cover a large area and cross multiple jurisdictions. Officials from the National Science Foundation (NSF) said that for projects that may not have a single location, they report the location that corresponds to the research asset’s physical location or the primary site. For example, for a research vessel, NSF officials report the awardee’s address, which is generally the vessel’s homeport as the Primary Place of Performance Address. In another example, NASA officials said that when they let contracts for services performed on the International Space Center, they report the command center in Houston as the Primary Place of Performance Address. For some of these non-routine locations, the FPDS-NG data dictionary provides guidance for procurement transactions. For example, for services being performed in oceans and seas, it directs agencies to report the closest U.S. city. For services being performed in the atmosphere or space, the FPDS-NG Data dictionary directs agencies to report the location from which the equipment conducting the services was launched. However, the DATA Act Information Model Schema (DAIMS) Data Dictionary does not include the same level of detailed guidance for reporting financial assistance awards and directs agency officials to report the location where the predominant performance of the award will be accomplished. Officials from several agencies said it would be helpful for OMB and Treasury to issue guidance on Primary Place of Performance Address for financial assistance awards to help agencies report this information consistent with the established standard. In the absence of more specific guidance, agencies are using different decision rules to identify the Primary Place of Performance Address for financial assistance awards which could limit the usefulness of this information to the public. We previously identified similar issues with Award Description and Primary Place of Performance Address on USAspending.gov. We recommended that OMB and Treasury provide agencies with additional guidance to address potential clarity, consistency, or quality issues with the definitions for specific data elements including Award Description and Primary Place of Performance Address and that they clearly document and communicate these actions to agencies providing these data as well as to end-users. OMB issued guidance in June 2018 which provides clarification on reporting requirements for some data element definitions. However, additional guidance is needed to clarify how agencies are to report spending data using standardized data element definitions that may be open to more than one interpretation, and then broadly communicate this information to agencies and the public. We continue to believe additional guidance is needed to facilitate agency implementation of certain data definitions to produce consistent and comparable information. Given the challenges we identified in this report and in previous reports with Award Description and Primary Place of Performance Address, we have concerns about whether the guidance OMB issued provides sufficient detail for agencies to consistently interpret and implement the definitions. See app. IV for more information on the status of this recommendation. Treasury does not fully disclose all known data limitations on USAspending.gov. According to OMB guidance, federal agencies should be transparent about the quality of information and identify the limitations of the data they disseminate to the public. Further, Treasury’s Information Quality Guidelines state that, when disseminating information to the public, information should be presented within the proper context to disseminate information in an accurate, clear, complete, and unbiased manner. In November 2017, we identified data quality limitations that were not disclosed on USAspending.gov. We recommended that Treasury disclose known data quality issues and limitations on USAspending.gov. Treasury agreed with this recommendation and has taken steps to better disclose some of these limitations, but many of the issues we identified in 2017 continue to present challenges. Some of these challenges apply widely, while others were specific to particular agencies. They include the following: Data not submitted or incomplete. One step taken by Treasury to improve disclosure was to create a webpage in USAspending.gov that provides information on unreported data. However, it is unclear exactly what this information covers. For example, it is unclear whether the information on unreported data includes financing accounts, agencies that should have reported but did not submit data, missing data for agencies that did submit, or spending that was not reported because obligation amounts fell below $25,000 and was therefore not required to be reported. As a result, users do not clearly know what data are unreported or the amount that was required to be reported. Optional data elements and subelements. Another issue we identified in 2017 and found again in our current review was that key information about the reporting requirements for some data elements and subelements was not adequately disclosed to the public. Specifically, for Q4 FY2018 certain data elements were listed in guidance as optional for agencies to report. According to Treasury officials, agencies were not required to report these data elements because the data standard was not fully implemented. For example, prior to fiscal year 2019, the data element Funding Office Name was optional for financial assistance awards. Additionally, as of September 2019, Period of Performance Start Date and Period of Performance Current End Date remained optional for reporting pending government-wide agreement on the standard. USAspending.gov does offer some information regarding optional data elements by providing a link to the DAIMS Reporting Submission Specifications document. However, this document is not labeled in a way that would make it clear to the user what information can be found there. Moreover, some agencies may voluntarily submit data for optional fields so only partial information for optional data elements may be displayed on USAspending.gov. Because data limitations related to optional data elements are not prominently displayed on USAspending.gov, users may not know which data elements or subelements are potentially incomplete. A more systematic approach for identifying and disclosing known data limitations on USAspending.gov—including procedures for addressing wide ranging issues such as communicating changes in the reporting requirements for certain data elements and information about data that may be unreported or incomplete—could help users of the data better understand potential quality issues with particular data elements and sources, and how to appropriately interpret the data. While Treasury has taken steps to better disclose data limitations, it needs to take further action to implement a more systematic approach, in line with our 2017 recommendation. In addition to such broader challenges, we identified two specific data limitations involving DOD and HHS: Delay in availability of DOD procurement data. A third issue we identified in our 2017 review, and again in our current review, concerns how information on DOD procurement data is presented on USAspending.gov. Specifically, information related to a 90-day delay in data availability for DOD procurement awards is not posted on USAspending.gov. FPDS-NG—which collects information on contract actions for display on USAspending.gov—releases DOD-reported procurement data to the public after a 90-day waiting period to help ensure the security of these data before they are released to the public. This also results in a 90-day delay in reporting these data to USAspending.gov. FPDS-NG clearly states that DOD data are subject to a 90-day delay as seen in figure 6. While DOD reports this data limitation in its senior accountable official certification statement, it is not presented prominently to users who are viewing DOD’s spending data. For example, DOD’s delay in data availability is not presented on DOD’s agency profile page or with queries on specific transactions associated with DOD. Until such information is transparently communicated, users of USAspending.gov who access DOD procurement data directly or as a result of broader government-wide searches are likely unaware that the information may be incomplete or not comparable. Medicare payment data. Additionally, in this review we found limitations in how Medicare payment data are made available to the public. According to HHS officials, CMS reports the Primary Place of Performance Address for Medicare payment data as the county for the applicable Medicare Administrative Contractor (MAC) because the MAC is the direct recipient of the agency’s contract award. As a result, Medicare spending data on USAspending.gov are not reported in the county where the Medicare beneficiaries are located. There are more than 3,200 counties and county equivalents in the United States and Puerto Rico, but only 20 Medicare MAC jurisdictions. Although Medicare payments may reach every county in the country, the users of USAspending.gov will only see this spending in the counties in which a MAC is located. We found that this information is not described on USAspending.gov. HHS officials said that they identified this limitation to the transparency of Medicare payment data to Treasury in 2016. They suggested that Treasury add information about how Medicare payments are reported on USAspending.gov to avoid confusion for users of the data. However, at that time, Treasury determined that it was unnecessary to provide this additional information on USAspending.gov. Until such information is transparently communicated, it will be unclear to the user that Medicare payments are consolidated in the counties where MACs are located. One of the purposes of the DATA Act is to establish government-wide data standards to provide consistent and comparable data that are displayed accurately for taxpayers and policymakers on USAspending.gov. As we have reported previously, establishing a data governance structure—an institutionalized set of policies and procedures for providing data governance throughout the life cycle of developing and implementing data standards—is critical for ensuring that the integrity of data standards is maintained over time. Such a structure, if properly implemented, would greatly increase the likelihood that the data made available to the public will be accurate. Accordingly, in 2015, we recommended that OMB, in collaboration with Treasury, establish a set of clear policies and procedures for developing and maintaining data standards that are consistent with leading practices for data governance. This recommendation has not been implemented. Having formalized policies and procedures in place for one of these key practices—managing, controlling, monitoring, and enforcing the consistent application of data standards once they are established—could help address some of the data quality challenges we identified in this and previous reviews. As described earlier, agencies experience challenges reporting Award Description and Primary Place of Performance Address. We continue to believe that having a robust data governance structure that includes policies and procedures for enforcing the consistent application of the established standards would lead to greater consistency and comparability of reporting for data elements, such as Award Description and Primary Place of Performance Address. OMB and Treasury have established some procedures for governing the data standards established under the DATA Act, but a robust governance structure has yet to be fully developed and operational. Since the enactment of the DATA Act in 2014, OMB has relied on a shifting array of advisory bodies to obtain input on data standards. In March 2019, we reported that the governing bodies involved in initial implementation efforts had been disbanded, and that their data governance functions were to be accomplished within the broader context of the cross-agency priority (CAP) goals established under the 2018 President’s Management Agenda (PMA). Since we issued our report, OMB has taken additional steps to develop a government-wide data structure and to establish data governance programs at each agency. OMB staff told us that they envision agencies as incubators of data governance where they can learn lessons on data governance. Toward that end, OMB, in collaboration with other interagency groups, has taken a number of steps to further develop data governance at both the agency and government-wide levels: In October 2019, OMB issued a set of grants management data standards under the Results Oriented Accountability for Grants CAP Goal. According to OMB staff, they received more than 1,100 public comments on draft standard data elements which were released for public comment in November 2018. OMB issued a memorandum in April 2019 that outlines approaches to shared services and the governance structure established to support shared services used for data reporting. In June 2019, as part of the CAP Goal Leveraging Data as a Strategic Asset, OMB issued the draft 2019-2020 Federal Data Strategy Action Plan (Action Plan). This document identifies both government-wide and agency-level action steps for improving data governance. To address government-wide data governance, the Action Plan calls for improvement in the standards for financial management data and geospatial data. The Action Plan directs agencies to establish a body of internal stakeholders responsible for data governance. These bodies will be made up of senior level staff and be responsible for assessing agency capability and ensuring monitoring and compliance with policies and standards related to data. Agencies are also instructed to assess data and related infrastructure maturity, identify opportunities to increase staff data skills, and identify data needs to answer key agency questions. OMB also issued initial guidance in July 2019 to support agency efforts to implement the first phase of the Evidence Act. For example, the Evidence Act requires, among other things, agencies to designate a Chief Data Officer by July 13, 2019. OMB also guidance directs agencies to establish a data governance body, chaired by the Chief Data Officer, with participation from relevant senior-level staff from agency business units, data functions, and financial management by September 30, 2019. In July 2019, the Federal Data Strategy Team issued a data governance playbook. According to OMB officials, this playbook is not guidance, but is meant to be a framework for agency-level data governance accompanied by forthcoming resources. OMB staff told us that updates to the playbook would come relatively quickly, but also said they had no planned time frames for doing so. Agencies have taken initial steps to establish data governance programs and develop data quality plans. As of September 2019, seven of the 30 agencies included in our review reported that they have taken steps to designate a Chief Data Officer as required by the Evidence Act. Twenty reported establishing internal bodies similar to the data governance bodies as directed by OMB guidance. The make-up and function of data governance bodies varies across agencies. The Department of Labor reported its Data Board was formalized and that the acting Chief Data Officer had become the official Chief Data Officer. The U.S. Agency for International Development reported establishing a DATA Act Governance Council to facilitate the effective implementation of the DATA Act. Other agencies reported similarly structured bodies referred to as working groups, steering committees, and consortiums. As of September 2019, 19 agencies reported that they have completed a data quality plan as required by OMB Memorandum, M-18-16. Nine agencies that do not have a data quality plan will have one completed by September 30, 2019. The data quality plans from the agencies in our sample varied in scope and content. Features of data quality plans we reviewed included a description of a data governance board, an assessment of existing and planned internal controls for data quality, and determination of priority data elements based on assessments of risk of data quality issues. For example, the Departments of Commerce and the Interior each conducted a risk assessment on the likelihood and consequence of improper reporting for assistance and procurement data. They will employ strategies or controls to mitigate risks related to the highest risk elements. Similarly, Treasury named targeted data elements based on their relevancy and further assessed the risk of improper reporting of each element based on existing internal controls. Agencies in our review reported using a variety of sources of guidance in developing their data quality plans, including the Data Quality Playbook issued by the Leveraging Data as a Strategic Asset Working Group in November 2018, OMB Circular M-18-16, and guidance on conducting required reviews under the DATA Act from the Council of inspector general for Integrity and Efficiency. While some agencies in our review reported that the information from these sources was helpful, they also noted the need for additional guidance, including help understanding the reporting requirements for certain data elements. In the 5 years since enactment, OMB, Treasury, and federal agencies have made significant strides to address many of the policy, technical, and reporting challenges presented by the DATA Act’s requirements. We found improvements in the overall quality of the data on USAspending.gov compared to our 2017 review of data quality. To continue moving forward with this progress and to fully realize the DATA Act’s promise of helping to improve data accuracy and transparency, more needs to be done to address continued challenges with the completeness and accuracy of key data elements. For example, OMB and Treasury have not fully addressed our recommendations to monitor agency submissions and ensure agencies are accountable for the completeness and accuracy of their data submissions. In addition, without the transparent disclosure of known data limitations, users may view, download, or analyze data made available on the website without full knowledge of the extent to which the data are timely, complete, accurate, or comparable over time. This could lead users to inadvertently draw inaccurate information or conclusions from the data. We have previously recommended that Treasury disclose known data limitations on USAspending.gov. The agency has taken some steps toward this goal. However, as we have shown, work remains for Treasury to develop a more systematic approach for disclosing known data limitations on its website. In the meantime, we believe it is important to address the specific data limitations we identify in this report. These include the need to provide users with information about the delay in the availability of DOD procurement data, and how Medicare payment data are reported. Finally, the challenges we have found with data completeness and accuracy, and the transparency around data limitations also demonstrate the importance of continued progress by OMB and Treasury in addressing our previous open recommendations to develop a robust and transparent data governance structure, and implement controls for monitoring agency compliance with DATA Act requirements. We maintain that OMB and Treasury should address our prior recommendations on DATA Act implementation, including recommendations on monitoring agency submissions, providing additional guidance on reporting established data standards, implementing a systematic approach to facilitate the disclosure of known data limitations on USAspending.gov, and developing a robust and transparent governance structure. We are making a total of two new recommendations to Treasury regarding the disclosure on USAspending.gov of specific known data limitations: The Secretary of the Treasury should ensure that information about the 90-day delay for displaying DOD procurement data on USAspending.gov is transparently communicated to users of the site. Approaches for doing this could include prominently displaying this information on the DOD agency profile page, in the unreported data section, and in search results that include DOD data. (Recommendation 1) The Secretary of the Treasury should ensure that information regarding how the Primary Place of Performance Address for Medicare payment data are reported is transparently communicated to the users of USAspending.gov. (Recommendation 2) We provided a draft of this report to the Departments of Agriculture (USDA), Defense (DOD), Commerce, Education, Health and Human Services (HHS), Homeland Security, the Interior (DOI), Labor (DOL), the Treasury, and Veterans Affairs (VA); the Office of Management and Budget (OMB); the National Science Foundation (NSF); the National Aeronautics and Space Administration (NASA); the Small Business Administration (SBA); the U.S. Agency for International Development (USAID); the U.S. Agency for Global Media (USAGM); and the Delta Regional Authority (DRA) for review and comment. USAID and Treasury provided written responses, which are summarized below and reproduced in appendixes VII and VIII, respectively. DHS and OMB provided technical comments, which we incorporated as appropriate. USDA, DOD, Commerce, Education, HHS, DOI, DOL, VA, NSF, NASA, SBA, USAGM, and DRA had no comments on the draft report. In its written comments, USAID stated that it is committed to DATA Act reporting and the accessibility and transparency of its spending data. In its written comments, Treasury stated its commitment to fully realizing the DATA Act’s promise of helping to improve data accuracy and transparency. Treasury agreed with our two recommendations on the disclosure of specific known data limitations and stated that it will work with HHS and DOD to implement them in the coming months. Treasury also stated that it remains committed to fully implementing our prior recommendations on DATA Act implementation. We are sending copies of this report to the relevant congressional committees; the Secretaries of Agriculture, Defense, Commerce, Education, Homeland Security, the Interior, Labor, the Treasury, and Veterans Affairs; the Directors of the Office of Management and Budget and the National Science Foundation; the Administrators of National Aeronautics and Space Administration, the Small Business Administration, and U.S. Agency for International Development; the Chief Executive Officer of the U.S. Agency for Global Media; the Chairman of the Delta Regional Authority; and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report, please contact Michelle Sager at (202) 512-6806 or sagerm@gao.gov or Paula M. Rascona at (202) 512-9816 or rasconap@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of our report. Key contributors to this report are listed in app. IX. National Science Foundation Nuclear Regulatory Commission (NRC) File B (Budgetary) File D1 (Procurement) The Broadcasting Board of Governors changed its name to the U.S. Agency for Global Media in August 2018. The Digital Accountability and Transparency Act of 2014 (DATA Act) requires that we report on the timeliness, completeness, accuracy, and quality of the data submitted under the act and the implementation and use of data standards. This review responds to the act’s requirement by addressing the following: (1) the timeliness, completeness, accuracy, and quality of the data and the implementation and use of data standards; and (2) the extent to which progress has been made to develop a data governance structure consistent with key practices, and how it affects data quality. We also update the status of select implementation issues and our previous recommendations related to implementing the DATA Act and data transparency. To assess the timeliness, completeness, accuracy, and quality of the data submitted and the implementation and use of data standards, we analyzed agency submission files for the fourth quarter of fiscal year 2018 (Q4 FY2018) on USAspending.gov and reviewed a representative stratified random sample from the Department of the Treasury’s (Treasury) USAspending.gov database download for Q4 FY2018. Specifically, to assess timeliness, we accessed agency submission files on USAspending.gov for Q4 FY2018 and determined whether agencies submitted their data by the established deadline—45 days after the end of the quarter or November 14, 2018—based on the date agencies certified their submissions. To help understand the proportion of spending that agencies reported by the due date, we obtained and analyzed a file from Treasury containing SF 133 Report on Budget Execution and Budgetary Resources (SF 133) data—which includes unaudited balances reported by agencies—for Q4 FY2018. These obligation balances are only used for illustrative purposes in our report. They include financing accounts, among other things, which are not required to be reported under the DATA Act. To assess completeness, we determined whether (1) all agencies that determined they are required to or would voluntarily submit DATA Act files did so, (2) the transactions reported in the files submitted by agencies contained all required data for that transaction, and (3) the database contained required assistance award data from the 24 Chief Financial Officers Act of 1990 (CFO Act) agencies. To determine whether all agencies that should have reported Q4 FY2018 data did so, we compared Treasury’s list of agencies that determined they were required to or would voluntarily report data to the agency file submissions on USAspending.gov for Q4 FY2018. We followed up with agencies that had not reported to find out the reasons for not reporting, but we did not verify the accuracy of their responses. To assess the completeness of files submitted by agencies, we accessed the agency submission files for Q4 FY2018 available on USAspending.gov and determined whether all files for each agency contained data (i.e., were not blank). We followed up with agencies that submitted a blank File C and/or File D1 that did not contain any data to find out why the files were blank, but we did not verify the accuracy of their responses. We also made inquiries of agencies to determine whether any agency components or systems did not submit data. Finally, we tested completeness of agency submissions through our sample testing, described in detail below. To assess the completeness of assistance data in the USAspending.gov database, we determined the extent to which federal agencies were reporting required award data based on a list of potential award-making agencies/programs from Assistance Listings on beta.SAM.gov, formerly the Catalog of Federal Domestic Assistance. We identified all programs listed in the Assistance Listings, as of September 2018. For the 24 CFO Act agencies only, we compared programs listed in the Assistance Listings to data in the USAspending.gov database to determine which programs reported information on at least one assistance award for fiscal year 2018. For any program reporting no assistance award information for the year, we asked agency officials why information was not reported. For all programs that agency officials determined either made an award but did not report it, or reported awards late to USAspending.gov, we extracted the agencies’ obligation estimates for fiscal year 2018 as reported in the Assistance Listings. To further assess completeness of the data and to assess accuracy of the data and the implementation and use of data standards, we extracted all records included in the scope of our review from a database used to display data on USAspending.gov. The records covered activity during Q4 FY2018 (July through September 2018). To extract all records from the database, we mapped the database fields to the data elements within the scope of our audit. Once we had the data within the scope of our audit for Q4 FY2018, we performed the following steps: Sampling data to determine completeness and accuracy: From the database we extracted, we selected a stratified random probability sample of 405 records for Q4 FY2018. Data records were stratified into procurement award transactions, assistance award transactions, and budgetary records. We randomly selected 158 procurement awards, 150 financial awards, and 97 budgetary records. Estimates for the results of the procurement, assistance, and budgetary samples have sampling errors of +/- 7.8, 8, and 10 percentage points or less, respectively, at the 95 percent level of confidence. The probability sample was designed to estimate the overall rate of reporting errors for a data element with a sampling error of no greater than plus or minus 5.3 percentage points at the 95 percent level of confidence. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval (e.g., +/- 7 percentage points). This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. For 41 data elements and subelements required by FFATA or the DATA Act, we first assessed the extent to which a data element was complete—whether there was a value and if that value was appropriate. If the data element was not complete, then we also considered that data element to not be accurate. For those elements that were complete, we then assessed the extent to which the data were accurate by comparing the information in our sample to the information contained in the originating agency’s underlying source documents, where available, and determining whether the data were consistent with applicable laws and reporting standards, as applicable. Therefore we determined an element was inconsistent if it was either inconsistent with the agency documents, applicable laws or reporting standards, or incomplete. For three data elements that contained values derived by Federal Procurement Data System-Next Generation (FPDS-NG) and Financial Assistance Broker Submission (FABS) based on other values provided by agencies, we compared the information in the sample to other sources, such as data from the U.S. Census Bureau and house.gov. This allowed us to verify whether the values in our sample were consistent with the systems from which they were derived. We then interviewed agency officials to discuss differences between the information in our sample and information in agency or other sources. Data element and subelement testing: Table 3 shows the 44 data elements and subelements tested in the statistical sample—including six budgetary data elements and 38 award data elements and subelements. Individual data elements may vary with their representation in the sample (e.g. Legal Entity Address Lines 1 and 2) because the data element was not required for all of the sampled data records. Specific error rates by category can be found in app. III. The government-wide results are a weighted total of the three strata of our sample: (1) procurement award transactions, (2) assistance award transactions, and (3) budgetary records. For reporting purposes, we combined some of the results for the award strata because some data elements appear in both Files D1 (procurement) and D2 (financial assistance). See app. I for the list of agencies and number of records randomly selected and tested in each strata. If we determined, after reviewing agency source documents, that a data element was not applicable to the sampled record, we did not factor the data element into our evaluation of completeness and accuracy. We determined an element to be unverifiable if no agency source records were provided or the records provided did not meet our audit standards. To test the controls over the reliability of agency data, we obtained supporting documentation to confirm that the agency provided only official agency source documents, such as a system of records notice. When such a supporting document was unavailable, we reviewed agency transparency policy documentation, data verification and validation plans or procedures, or system source code information to ensure the reliability of the data. We did not assess the accuracy of the data contained in sources provided by agencies. For the purposes of our review, we defined data quality as encompassing the concepts of timeliness, completeness, and accuracy. Therefore, our assessment of overall data quality is reflected in our specific assessments of these components. We also reviewed OMB, Treasury, and agency documents related to DATA Act implementation. We interviewed OMB and Treasury officials on their role in DATA Act implementation and interviewed officials from the agencies in our sample to discuss their test results and efforts to submit data under the DATA Act. To describe changes in data quality since our prior work, we compared the results of our review of Q4 FY2018 data to the results of our review of quarter two fiscal year 2017 (Q2 FY2017) data performed in our first assessment of data quality. For both reviews, we examined a projectable sample of budgetary and award transactions from a database that, according to Treasury, is partly used to display data on USAspending.gov. However, there were the following differences: (1) our 2017 sampling frame was confined to the 24 CFO Act agencies (which represented 99 percent of obligations in our data set at that time), while our sampling frame for this review included all agencies that submitted Q4 FY2018 data files as of February 11, 2019; (2) more agencies and their components reported data in Q4 FY2018 than in Q2 FY2017; (3) in 2017 our estimated error rate calculations included elements of certain sampled transactions that were determined to be not applicable to the transaction and were classified as consistent with agency sources in both the numerator and denominator while in this review, we excluded not applicable elements from both the numerator and denominator of the estimated rate calculations; (4) our sampling frame for this review included more data elements and subelements than were in our Q2 FY2017 sampling frame; (5) in this review, since three data elements we reviewed were derived by FPDS-NG and FABS rather than provided by agencies, we compared the information in the sample to other sources rather than agency documents and therefore did not include those results in our comparisons to Q2 FY2017; (6) agencies’ Q4 FY2018 data were submitted under policies and procedures outlined in DAIMS v1.3 which reflects changes in validation rules and reporting requirements from the DAIMS v1.0 that was in effect in 2017; (7) OMB issued additional guidance on DATA Act reporting since we reported in 2017; and (8) changes were made to the Treasury broker since our last report. To evaluate how the current data governance structure affects data quality, we compared data quality challenges we identified during our review to key practices for data governance identified in our prior work to underscore the need for a more robust structure consistent with key practices. To assess progress made to develop a data governance structure consistent with key practices, we reviewed policy and other documentation related to ongoing efforts to develop a government-wide structure for governing the standards established under the act and interviewed OMB staff about these efforts. We also reviewed agency data quality plans—guidance intended to facilitate agency efforts to establish data governance programs—and interviewed agency officials on their data governance efforts. To update the status of our recommendations related to the implementation of the DATA Act, we reviewed new guidance and other related documentation, and interviewed OMB staff and Treasury officials. See app. IV for an update on our recommendations related to DATA Act implementation. We conducted this performance audit from November 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix III: Estimates of Consistency Rates for Award Transactions and Budgetary Accounts/Balances Accurate/consistent (%) Q4 FY2018 Q2 FY2017 Q4 FY2018 Q2 FY2017 Q4 FY2018 Q2 FY2017 3-8 97-100 83-91 0-1 5-11 0-3 Inconsistent (%) Catalog of Federal Domestic Assistance Number (CFDA) Inconsistent (%) Data element Primary Place of Performance Address (all subelements) Accurate/consistent (%) Unverifiable (%) Legal Entity Address City Name refers to two subelements under DAIMS v.1.3 (Legal Entity Address City Name and Foreign City Name), which we combined for reporting purposes. Legal Entity Address State Name refers to three subelements under DAIMS v.1.3 (Legal Entity Address State Description for procurement awards and Legal Entity Address State Name and Foreign Province Name for financial assistance awards), which we combined for reporting purposes. Legal Entity Address Zip Code refers to four subelements under DAIMS v.1.3 (Legal Entity Address Zip+4 for procurement awards, Legal Entity Address Zip 5 and Last 4 for financial assistance awards, and Legal Entity Address Foreign Postal Code for foreign financial assistance awards), which we combined for reporting purposes. Primary Place of Performance Address Zip Code is one subelement under DAIMS v.1.3 (Primary Place of Performance Address Zip+4), which contains both the first five digits from the zip code and the last 4. However, the USAspending.gov database we obtained our sample from contained the zip code information for this element in two parts: 5 digit zip code and +4. Therefore, we present these subelements separately for reporting purposes. Element was optional for fourth quarter of fiscal year 2018. Unverifiable includes data elements rates as inaccurate because agency records were insufficient to complete the test or because the agency did not provide supporting documentation. Accurate/consistent (%) Estimated ranges Inconsistent (%) Unverifiable (%) In our prior Digital Accountability and Transparency Act of 2014 (DATA Act) reports, we have made recommendations to both the Department of the Treasury (Treasury) and the Office of Management and Budget (OMB) on a range of topics. Treasury and OMB have collectively taken action that resulted in closure of nine prior recommendations on the data transparency and implementation of the DATA Act. Table 7 provides a listing of open DATA Act recommendations at the time this report was issued as well as a short discussion of their status. Full and effective implementation of the open recommendations listed below will contribute to more reliable and consistent federal data to measure the cost and magnitude of federal investments as well as facilitate efforts to share data across agencies to improve transparency, accountability, decision- making, and oversight. The Digital Accountability and Transparency Act of 2014 (DATA Act) requires the Office of Management and Budget (OMB) and the Department of the Treasury (Treasury) to establish government-wide data standards that to the extent reasonable and practicable produce consistent, comparable, and searchable spending data for any federal funds made available to or expended by federal agencies. These standards specify the data elements to be reported under the DATA Act and define and describe what is to be included in each data element, with the aim of ensuring that data will be consistent and comparable. The DATA Act requires OMB and Treasury to ensure that the standards are applied to the data made available on USAspending.gov which has many sources of data. Some data are from agency systems, while other data are pulled or derived from government-wide reporting systems. Key award systems that generate data files that are linked to agency submitted files include the Federal Procurement Data System-Next Generation (FPDS-NG), which collects information on contract actions; the Financial Assistance Broker Submission (FABS) which collects information on financial assistance awards; the System for Award Management which is the primary database for information on entities that do business with the federal government (i.e., contractors and grantees), and in which such entities must register; and the Federal Funding Accountability and Transparency Act of 2006 (FFATA) Subaward Reporting System (FSRS), which provides data on first-tier subawards reported by prime award recipients. Agencies submit procurement award information to FPDS-NG daily and financial assistance award information (grants, loans, insurance and other financial assistance) to FABS at least twice monthly. These award data are reflected in USAspending.gov daily. As depicted in figure 7, agencies are expected to submit financial data linked to award data and certified on a quarterly basis, 45 days after the close of the quarter. They submit three data files with specific details and data elements to Treasury’s DATA Act Broker (broker) from their financial management systems quarterly (Files A, B, C). In February 2019, to reduce agency burden, Treasury made updates including an optional new broker feature that agencies can use to generate a provisional File A which agencies can choose to upload and submit as their File A in the regular submission process. The new feature produces an agency’s provisional File A based on budget and financial information reported by the agency to the Government-wide Treasury Account Symbol Adjusted Trial Balance System for the creation of the SF 133 Report on Budget Execution and Budgetary Resources. The broker then extracts award and subaward information from existing government-wide reporting systems to build four files that include procurement information, information on federal assistance awards such as grants and loans, and recipient information (Files D1, D2, E, and F). Each agency’s data must pass a series of validations in the broker and then be certified by the agency’s senior accountable official (SAO) before they are submitted for display on USAspending.gov. According to OMB guidance, the purpose of the SAO certification is to provide reasonable assurance that the agency’s internal controls support the reliability and validity of the data submitted to Treasury for publication on the website. The SAO assurance means that, at a minimum, the data reported are based on appropriate controls and risk management strategies as described in OMB Circular A-123, Management’s Responsibility for Enterprise Risk Management and Internal Control. In addition, agencies should include information about any data limitations in their SAO certification statements. Committee for Purchase from People Who Are Blind or Severely Disabled (AbilityOne Commission) District of Columbia Courts (DC Courts) In addition to the above contacts, Peter Del Toro (Assistant Director), Kathleen Drennan (Assistant Director), Michael LaForge (Assistant Director), Maria C. Belaval (Auditor-in-Charge), Barbara Lancaster (Analyst-in-Charge), Diane Morris (Auditor-in-Charge), Carl Barden, Daniel Berg, Mark Canter, Jenny Chanley, Shelby Clark, Tracy Davis Ross, Tabitha Fitzgibbon, Valerie Freeman, Jamaika Hawthorne, Michael Kany, Roy Kilgore, Peter Kramer, Seraé LaFache-Brazier, Krista Loose, Tonyita Muschette, Quang Nguyen, Kristine Papa, Joseph Raymond, Lisa Rowland, Susan Sato, John A. Schaefer, Sara Shore, James Skornicki, Andrew J. Stephens, James Sweetman, Jr., Silvia Symber, and Lisa Zhao made key contributions to this report. Additional members of GAO’s DATA Act Internal Working Group also contributed to the development of this report. DATA Act: Customer Agencies’ Experiences Working with Shared Service Providers for Data Submissions. GAO-19-537. Washington, D.C.: July 18, 2019. DATA Act: Pilot Effectively Tested Approaches for Reducing Reporting Burden for Grants but Not for Contracts. GAO-19-299. Washington, D.C.: April 30, 2019. DATA Act: OMB Needs to Formalize Data Governance for Reporting Federal Spending. GAO-19-284. Washington, D.C.: March 22, 2019. Open Data: Treasury Could Better Align USAspending.gov with Key Practices and Search Requirements. GAO-19-72. Washington, D.C.: December 13, 2018. DATA Act: Reported Quality of Agencies’ Spending Data Reviewed by OIGs Varied Because of Government-wide and Agency Issues. GAO-18-546. Washington, D.C.: July 23, 2018. DATA Act: OMB, Treasury, and Agencies Need to Improve Completeness and Accuracy of Spending Data and Disclose Limitations. GAO-18-138. Washington, D.C.: November 8, 2017. DATA Act: As Reporting Deadline Nears, Challenges Remain That Will Affect Data Quality. GAO-17-496. Washington, D.C.: April 28, 2017. DATA Act: Office of Inspector General Reports Help Identify Agencies’ Implementation Challenges. GAO-17-460. Washington, D.C.: April 26, 2017. DATA Act: Implementation Progresses but Challenges Remain. GAO-17-282T. Washington, D.C.: December 8, 2016. DATA Act: OMB and Treasury Have Issued Additional Guidance and Have Improved Pilot Design but Implementation Challenges Remain. GAO-17-156. Washington, D.C.: December 8, 2016. DATA Act: Initial Observations on Technical Implementation. GAO-16-824R. Washington, D.C.: August 3, 2016. DATA Act: Improvements Needed in Reviewing Agency Implementation Plans and Monitoring Progress. GAO-16-698. Washington, D.C.: July 29, 2016. DATA Act: Section 5 Pilot Design Issues Need to Be Addressed to Meet Goal of Reducing Recipient Reporting Burden. GAO-16-438. Washington, D.C.: April 19, 2016. DATA Act: Progress Made but Significant Challenges Must Be Addressed to Ensure Full and Effective Implementation. GAO-16-556T. Washington, D.C.: April 19, 2016. DATA Act: Data Standards Established, but More Complete and Timely Guidance Is Needed to Ensure Effective Implementation. GAO-16-261. Washington, D.C.: January 29, 2016. Federal Spending Accountability: Preserving Capabilities of Recovery Operations Center Could Help Sustain Oversight of Federal Expenditures. GAO-15-814. Washington, D.C.: September 14, 2015. DATA Act: Progress Made in Initial Implementation but Challenges Must be Addressed as Efforts Proceed. GAO-15-752T. Washington, D.C.: July 29, 2015. Federal Data Transparency: Effective Implementation of the DATA Act Would Help Address Government-wide Management Challenges and Improve Oversight. GAO-15-241T. Washington, D.C.: December 3, 2014. Government Efficiency and Effectiveness: Inconsistent Definitions and Information Limit the Usefulness of Federal Program Inventories. GAO-15-83. Washington, D.C.: October 31, 2014. Data Transparency: Oversight Needed to Address Underreporting and Inconsistencies on Federal Award Website. GAO-14-476. Washington, D.C.: June 30, 2014. Federal Data Transparency: Opportunities Remain to Incorporate Lessons Learned as Availability of Spending Data Increases. GAO-13-758. Washington, D.C.: September 12, 2013. Government Transparency: Efforts to Improve Information on Federal Spending. GAO-12-913T. Washington, D.C.: July 18, 2012. Electronic Government: Implementation of the Federal Funding Accountability and Transparency Act of 2006. GAO-10-365. Washington, D.C.: March 12, 2010.", "summary": "The DATA Act requires federal agencies to disclose roughly $4 trillion in annual federal spending and link this spending information to federal program activities so that policymakers and the public can more effectively track federal spending through its life cycle. The act also requires OMB and Treasury to establish data standards to enable consistent reporting of agency spending. The DATA Act includes a provision for GAO to report on the quality of the data collected and made available through USAspending.gov. Specifically, this report addresses: (1) the timeliness, completeness, and accuracy of the data, and the implementation and use of data standards; and (2) progress made in developing a data governance structure consistent with key practices, and how it affects data quality. GAO examined a projectable government-wide sample of Q4 FY2018 spending data from a Treasury database that populates data on USAspending.gov by comparing them to agency source records and other sources. GAO also compared the results of Q4 2018 with results from its previous review of Q2 FY2017 data. The Digital Accountability and Transparency Act of 2014 (DATA Act) requires federal agencies to report spending data to USAspending.gov, a public-facing website. A total of 96 federal agencies submitted required spending data for quarter four of fiscal year 2018 (Q4 FY2018). GAO examined the quality of these data and compared the results with the results of its prior review of quarter two of fiscal year 2017 (Q2 FY2017) data, as appropriate. GAO identified improvements in overall data quality, but challenges remain for completeness, accuracy, use of data standards, disclosure of data limitations, and overall data governance. Completeness. The number of agencies, agency components, and programs that submitted data increased compared to Q2 FY2017. For example, 11 agencies did not submit data in Q4 FY2018, compared to 28 in Q2 FY2017. Awards for 39 financial assistance programs were omitted from the data in Q4 FY2018, compared to 160 financial assistance programs in Q2 FY2017. Accuracy. Based on a projectable governmentwide sample, GAO found that data accuracy for Q4 FY2018—measured as consistency between reported data and agency source records or other authoritative sources and applicable laws and reporting standards—improved for both budgetary and award transactions. GAO estimates with 95 percent confidence that between 84 a 96 percent of the budgetary transactions and between 24 and 34 percent of the award transactions were fully consistent for all applicable data elements. In Q2 FY2017, GAO estimated that 56 to 75 percent of budget transactions and 0 to 1 percent of award transactions were fully consistent. Use of data standards. GAO continued to identify challenges related to the implementation and use of two data elements— Award Description and Primary Place of Performance Address— that are particularly important to achieving the DATA Act's transparency goals. GAO found that agencies continue to differ in how they interpret and apply The Office of Management and Budget's (OMB) standard definitions for these data elements. As a result, data on USAspending.gov are not always comparable, and in some cases it is difficult for users to understand the purpose of an award or to identify the location where the performance of the award occurred. USAspending.gov presentation. GAO identified known data limitations that were not fully disclosed on USAspending.gov. For example, the 90-day delay for inclusion of Department of Defense procurement data is not clearly communicated. In addition, although the website provides a total figure for unreported spending it is unclear whether it includes the 11 agencies that did not submit data. Not knowing this information could lead users of USAspending.gov to inadvertently draw inaccurate conclusions from the data. Data governance. OMB and the Department of the Treasury (Treasury) have established some procedures for governing the data standards established under the DATA Act, but procedures for enforcing the consistent use of established data standards have yet to be developed. Persistent challenges related to how agencies interpret and apply data standards underscore GAO's prior recommendations on establishing a governance structure that ensures the integrity of these standards. GAO maintains that OMB and Treasury should address prior recommendations on monitoring agency submissions, implementing data standards, disclosing data limitations, and developing a robust data governance structure. In addition, GAO makes two new recommendations to Treasury regarding disclosing on USAspending.gov specific known data limitations. Treasury agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The military services – Army, Navy, Air Force, and Marine Corps – have highly trained EOD personnel to eliminate explosive hazards in support of a variety of events and activities, ranging from major combat operations and contingency operations overseas to assisting the Secret Service in its protection of the President of the United States (see fig.1). EOD forces are dispersed worldwide to meet combatant commanders’ operational requirements related to these missions. Although the services’ EOD forces support combatant commanders, NORTHCOM’s Joint Force Headquarters-National Capital Region coordinates EOD force support of land-based homeland defense and DSCA missions. EOD forces conduct combat-related and DSCA missions that support national military objectives. EOD combat-related missions include preparations for combat such as training and exercises, and the wartime execution of EOD missions. EOD forces play a major role in all phases of combat operations. For example, these forces contribute to information gathering during operations and serve to enable the safe conduct of operations within an operational area. Additionally, EOD forces support freedom of maneuver and force protection. Further, they may directly support missions such as counterterrorism, deterring and defeating aggression, and countering weapons of mass destruction, among others across the spectrum of operations. Officials from each service stated that EOD forces prepare for these combat-related missions during predeployment in-garrison periods. EOD forces also conduct DSCA missions when they are not engaged in combat-related missions. DOD provides EOD forces when requested in advance by specific federal agencies and approved by the appropriate DOD official. Officials stated that generally, EOD forces undertake VIP support missions during in-garrison periods, just after returning from combat-related deployments or while preparing for the next deployment. The military services collectively have more than 6,300 EOD positions to fulfill combatant command missions, and demand for EOD manpower and expertise is high. Each service determines the number of EOD technicians it needs based on its respective requirements, which consider combatant commanders’ wartime missions and plans. According to a DOD official, the services take into account the long lead times—up to 3 years in one service—that can be necessary to produce qualified and experienced EOD specialists. In accordance with DOD policy, when considering EOD wartime requirements, service officials should make certain that national military objectives can be accomplished using a minimum of manpower that produces maximum combat power. DOD policy also states that a formal validated process is to be used to determine wartime manpower requirements. Generally, manpower requirements are the amount of personnel needed to accomplish a job, mission, or program. Joint doctrine outlines mission tasks associated with EOD units. Once a service determines the tasks required of a particular community (such as EOD), the service then sizes its forces (i.e., determines the manpower requirement) according to the demand for those tasks among the combatant commands. Risk is the effect of uncertainty on objectives with the potential for either a negative outcome or a positive outcome or opportunity. In the military, accurately appraising risk allows leaders and staffs to manage and communicate risk effectively to inform decisions across disparate processes. Joint doctrine describes a planning process that aligns resources and military activities, and enables leaders to examine risks, among other factors, to determine a preferred course of action to achieve an objective. Planning for EOD involves military manpower systems that accurately determine the required EOD forces and decision makers who decide how much risk is acceptable if or when there is a shortfall of EOD forces. According to DOD doctrine on joint planning, regardless of the efforts to mitigate it, some level of risk will remain and should be identified to senior leaders so there is a common understanding of the decisions required and the potential effects of those decisions. Commanders must include a discussion of risk in their interaction with DOD senior leaders and that discussion must be in concrete terms that enable and support decision- making. In the context of strategic and military risk evaluation during joint planning, combatant commanders and DOD’s senior leaders work together to reach a common understanding of risk, decide what risk is acceptable, and minimize the effects of accepted risk by establishing appropriate risk controls. The military services’ processes for determining EOD manpower levels are based on combat-related missions and, accordingly, do not fully consider DSCA missions. However, DOD provides EOD resources for various DSCA missions such as: aiding in the protection of the President of the United States and dignitaries through VIP support missions; providing assistance to law enforcement agencies and other civil authorities in the United States and its territories when necessary to save lives under DOD’s immediate response authority; and rendering safe military munitions when requested by civil authorities (see fig. 2). EOD and manpower officials from each of the military services explained that, in practice, their respective services focus on combat-related missions and do not consider DSCA missions in determining the number of EOD personnel needed. Specifically: According to Army officials, the Total Army Analysis process that is used to size Army forces considers core functions for combat operations and warfighting requirements. They explained that this process does not consider DSCA requirements in determining the number of EOD forces needed. In Army guidance, manpower is based on wartime missions and wartime requirements for sustained combat operations, among other types of information. Due in part to force structure adjustments and the drawdown of EOD forces, since 2014, according to information provided by the Army, the Army has reduced more than 800 EOD positions, the equivalent of two EOD battalions and 13 EOD companies. According to Navy officials, the Navy makes manpower decisions with a focus on wartime requirements by analyzing required operational capabilities against the projected operational environment. In Navy manpower guidance, this analysis is critical to developing fleet manpower requirements for units such as EOD forces. Navy officials explained that the process does not consider the DSCA mission in determining EOD manpower. The Air Force’s EOD manpower standard, which has been updated through 2013, is based on in-garrison needs and wartime requirements. In Air Force manpower guidance, manpower is described as a critical resource that enables combat capability; the guidance further notes that manpower requirements are identified and resources are subsequently allocated for peacetime and wartime missions. However, Air Force officials stated that the process focuses on results for combat-related missions and does not specifically include DSCA requirements. According to Marine Corps officials, the Marine Corps’ EOD forces are sized to support Marine Expeditionary Forces for deployment for overseas combat operations. The Marine Corps’ manpower guidance describes a force structure process designed to identify and provide the capabilities, including personnel and equipment, necessary to accomplish mission essential tasks. Marine Corps officials stated that the service does not receive additional EOD manpower specifically for DSCA missions. Although service manpower calculations do not reflect DSCA missions, one of the DSCA missions—VIP support—is manpower intensive and occurs frequently. Specifically, the workload for VIP support can be substantial and has increased from about 248,000 man-hours in fiscal year 2007 to over 690,000 man-hours in fiscal year 2017. According to a NORTHCOM official, this rise is due to an increase in the different types and complexity of threats requiring more EOD personnel to sufficiently support civil authorities. Figure 3 below illustrates the increase in the amount of time the EOD forces have spent on VIP support missions. The military services have a long-standing practice of providing support to civil authorities, including EOD support. DOD support to civil authorities is grounded or reflected in statute and DOD guidance. For example, the Presidential Protection Assistance Act of 1976 requires executive agencies, including DOD, to assist the Secret Service on a temporary basis in protecting the President, the Vice President and other persons— such as visiting foreign dignitaries (see fig.4). In addition, the National Military Strategy and current homeland defense strategy prioritize defending the homeland and providing support to civil authorities. Moreover, DOD guidance addresses DSCA generally as well as specific support to the Secret Service, Department of Homeland Security, and law enforcement. Further, the Secretary of Defense approved a Joint Staff standing execute order (EXORD) which is used to execute routine VIP support missions related to the protection of dignitaries on short notice. This order authorizes NORTHCOM to provide EOD support to the Secret Service and U.S. Department of State within the NORTHCOM area of operations, and to coordinate that support at locations worldwide. Joint doctrine for EOD also lists DSCA as one of nine military missions that EOD forces may directly support, and states that the majority of EOD DSCA missions will be in support of law enforcement or emergency support agencies. Finally, the military services’ Inter-Service Responsibilities for Explosive Ordnance Disposal lists several common responsibilities of the military services’ EOD assets that include providing support to civilian agencies such as the Secret Service. While the DSCA mission is emphasized in departmental guidance and support of civil authorities has placed increasing and significant demands on EOD forces, the military services do not fully consider these factors in determining the appropriate number of EOD forces. According to EOD officials, this is because the primary mission of EOD forces is to conduct combat missions in support of combatant commanders and meet operational plans. Service officials stated that DSCA missions are not priority missions when it comes to sizing their respective forces, and that they do not routinely increase EOD manpower in order to provide support to other federal agencies. Standards for Internal Control in the Federal Government state that management should design control activities to achieve objectives and respond to risks. Specifically, management should ensure policies and procedures are relevant and effective in achieving an entity’s objectives. In addition, the standards state that management should use quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives. Quality information is information that is appropriate, current, complete, accurate, accessible, and provided on a timely basis. DOD manpower policy states that manpower management shall be flexible, adaptive to program changes, and responsive to new management strategies, and that existing policies, procedures, and structures shall be periodically evaluated to ensure efficient and effective use of manpower resources. However, the military services’ current processes for determining the appropriate amount of EOD manpower do not fully account for the increase in DSCA missions requiring EOD support. While it is understandable that the services prioritize combat missions when determining EOD requirements, they are not considering all available information in their decision-making process. This lack of consideration limits their ability to efficiently and effectively achieve their objectives and manage risks. Accounting for the increase in EOD manpower demand may not necessarily result in an increase in manpower; however, the services will be better prepared to understand the demand on existing EOD forces and evaluate any resulting risks. Ultimately, unless the military services update appropriate guidance to ensure that they consider the total EOD force required to support combat-related and DSCA missions, decision makers cannot accurately assess the sufficiency of EOD forces to meet both missions and the associated risks. DOD cannot evaluate the effects of VIP support missions on military preparedness because current VIP support mission guidance does not require the military services to notify the Joint Staff and appropriate combatant commands when military preparedness is negatively affected by these missions. According to officials from the military services, the execution of VIP support missions introduces risk that threatens the services’ abilities to execute combat-related missions. Specifically, military preparedness is degraded when the services’ EOD forces are unable to concurrently complete predeployment tasks, such as training for combat, because the forces are called upon to execute routine VIP support missions. Officials told us that EOD forces can only conduct these VIP support missions during the time period when EOD forces are scheduled to conduct predeployment tasks and accomplish training. As a result, according to officials, VIP support missions can deleteriously affect military preparedness for EOD forces. In multiple instances, missions supporting civil authorities have stressed the Army’s EOD capabilities, resulting in missed training and the inability to participate in exercises and activities supporting combat-related missions, according to statements and data provided by the Army. Furthermore, fulfilling VIP support missions can be particularly difficult because short-notice demand for EOD teams often exceeds the planned VIP support demand that can be supported. As a result, Army EOD teams are sometimes dispatched at the expense of military preparedness for combat-related missions in support of combatant commands, according to Army officials. Specific details of the effect recent VIP support missions have had on the Army’s EOD capabilities are included in our July 2019 restricted report. Officials from other services also acknowledged that undertaking routine VIP support missions comes at the expense of training for combat-related missions because of the high demand for and limited number of EOD forces. According to a senior Navy official, that service has sometimes refused mission requests to protect dignitaries because of its inability to meet operational demands, such as deployments and training for its EOD forces and support missions to protect dignitaries simultaneously. When this occurs, however, NORTHCOM will ask another service to accept the mission, thereby putting increased demand on that other service’s EOD forces that, in turn, may conflict with their scheduled training and preparations for combat missions, according to military service officials. Because NORTHCOM has few permanently assigned forces to conduct VIP support missions, it must instead rely on EOD forces from each of the military services that are in-garrison and preparing for but not currently deployed to a combat-related mission. According to DOD guidance, DOD’s ability to grant Secret Service requests for support is to be evaluated based on a number of factors, one of which is the effect on military preparedness. For example, DOD Directive 3025.18, Defense Support of Civil Authorities (DSCA), specifies that requests from civil authorities for assistance shall be evaluated for several factors, including the impact on DOD’s ability to perform its other primary missions. The guidance also provides that the Chairman of the Joint Chiefs of Staff is responsible for advising the Secretary of Defense on the effects of requests for civil support on national security and military readiness. According to joint doctrine, a commander’s tasks associated with the function of command and control include managing risk—such as that arising from EOD support for other agencies protecting dignitaries—as well as communicating and ensuring the flow of information across the staff and joint force, and to higher authorities. Additionally, in the context of evaluating strategic and military risk during joint planning, combatant commanders and senior DOD leaders work together to reach a common understanding of risk, decide what risk is acceptable, and minimize the effects of accepted risk. The Standards for Internal Control in the Federal Government also addresses the importance of an entity using quality information to achieve its objectives. Specifically, management should use quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. As previously mentioned, the Joint Staff has issued a Secretary of Defense-approved EXORD that provides guidance for the military to provide EOD support to the Secret Service and Department of State for routine VIP support missions. However, this EXORD does not specify a requirement for the services to notify DOD stakeholders regarding the effect on military preparedness for combat missions. As a result, the military services are not advising the Joint Staff or NORTHCOM when these VIP support missions are adversely affecting EOD military preparedness for combat-related missions. Regarding military preparedness, the absence of a notification requirement precludes decision makers from understanding the risk to EOD forces’ ability to perform their primary mission. Decision makers need this information to carry out their responsibilities and assess risk to ensure efficient and effective accomplishment of both VIP support missions and preparation for combat-related missions for combatant commands. The military services’ EOD forces provide the combatant commanders necessary capabilities for combat and combat-related missions. They also provide capabilities through their DSCA missions that are important to supporting U.S. law enforcement agencies and other federal, state, and local civil authorities. DOD has manpower processes that result in careful consideration of the requirements of the combatant commander for combat-related missions. However, those manpower processes do not fully consider DSCA missions, such as the VIP support mission and its accompanying substantial workload. Until DOD processes begin to consider the demand for EOD support for both types of missions, decision makers cannot know the complete manpower requirement for EOD. Consequently, the extent to which the services’ EOD forces are sufficient or insufficient to meet national military objectives cannot be fully known. Furthermore, DOD lacks a requirement in guidance specific to the VIP support mission to notify stakeholders regarding the effects of such missions on military preparedness for combat-related missions. As a result, DOD may not be fully considering risks associated with the use of EOD forces for VIP support on the preparation and training of those forces for combat-related missions. We are making the following four recommendations to DOD. The Secretary of the Army should update Army manpower guidance, or other guidance as appropriate, to ensure that all missions conducted by EOD forces, including DSCA missions, are considered in determining the required number of EOD forces. (Recommendation 1) The Secretary of the Air Force should update Air Force manpower guidance, or other guidance as appropriate, to ensure that all missions conducted by EOD forces, including DSCA missions, are considered in determining the required number of EOD forces. (Recommendation 2) The Secretary of the Navy should update Navy and Marine Corps manpower guidance, or other guidance as appropriate, to ensure that all missions conducted by EOD forces, including DSCA missions, are considered in determining the required number of EOD forces. (Recommendation 3) The Secretary of Defense should ensure that the Chairman of the Joint Chiefs of Staff, in collaboration with the combatant commands, incorporate into the appropriate guidance a requirement that the military services notify the Joint Staff and the affected combatant commands when the execution of VIP support missions negatively affects the preparedness of EOD units for combat-related missions. (Recommendation 4) We provided a draft of this report to DOD for review and comment. DOD did not provide comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Secretaries of the Army, Navy, and Air Force. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact me at (202) 512-5431 or russellc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contact named above, Guy LoFaro, (Assistant Director), Ben Atwood, Naba Barkakati, Christopher Gezon, Amie Lesser, Dennis Mayo, Paulina Reaves, Michael Silver, Michael Shaughnessy, Stephen Woods, and Lillian Yob made contributions to this report.", "summary": "EOD forces are a high demand, critical asset that support DOD's ability to execute military operations. DOD increased the number of EOD forces by more than 70 percent from 2002 to 2012 because of increased demand. When not deployed, EOD forces provide support to civil authorities. One of these missions is protecting U.S. and foreign dignitaries—also referred to as VIP support missions. House Report 115-200 included a provision for GAO to review matters related to EOD capabilities and requirements. This report assesses the extent to which (1) the military services consider all combatant command EOD requirements, including DSCA, in determining the number of EOD personnel needed, and (2) DOD evaluates the effect of VIP support missions on the military preparedness of EOD forces. GAO reviewed relevant guidance, analyzed EOD data, and interviewed EOD and manpower officials. This is a public version of a sensitive report that GAO issued in July 2019. Information that DOD deemed sensitive has been omitted. The military services' processes for determining the necessary number of explosive ordnance disposal (EOD) personnel are based on combat-related missions. However, these processes do not fully consider some defense support of civil authority (DSCA) missions that EOD forces conduct. Demand for EOD forces for DSCA missions can be manpower-intensive and frequent. For example, EOD forces' workload for protecting U.S. and foreign dignitaries—also referred to as Very Important Person (VIP) support missions—increased from about 248,000 to over 690,000 man-hours in fiscal years 2007 to 2017 (figure). However, according to officials, the services do not consider DSCA missions in determining the number of EOD personnel needed, instead focusing on combat-related missions. Unless the Department of Defense (DOD) ensures that the services update guidance to consider the total EOD force required to support both missions, decision makers cannot accurately assess the EOD forces' sufficiency. DOD guidance specific to VIP support missions does not include a requirement for the services to report on the effect of VIP support missions on military preparedness. According to officials, military preparedness is degraded when the services' EOD forces are unable to concurrently complete predeployment tasks such as training for combat. Per DOD guidance, Secret Service support requests are to be evaluated based on their effects on military preparedness. Without this information, decision makers are precluded from understanding the risk to EOD forces' military preparedness resulting from the routine VIP support missions. Decision makers need this information to ensure efficient and effective accomplishment of both VIP support missions and preparation for combat-related missions for affected combatant commands. GAO is making four recommendations including that DOD (1) update the appropriate service guidance to ensure that all EOD missions, including DSCA missions, are considered in determining the required number of EOD forces, and (2) incorporate into appropriate guidance a requirement for the military services to notify the Joint Staff and combatant commands when VIP support missions negatively affect the military preparedness of EOD units. DOD did not provide comments on the draft of this report.", "document_type": "gao"}
{"report": "In response to the 2014 access crisis, VA launched the MyVA initiative, which was designed to transform the health care experience of veterans. In concert with the MyVA initiative, VA introduced the MyVA Access Declarations in April 2016 with the goal of improving access by providing veterans more control as to how they receive their health care. The MyVA Access Declarations was a list of nine “access declarations” that were intended to serve as the foundational principles for improving and ensuring access to care. Two of these “access declarations” required providing timely primary and mental health care and included same-day services. VHA had policies in place for same-day services in primary and mental health care clinics for several years prior to the same-day-services initiative. In primary care, the 2014 Patient-Aligned Care Team (PACT) handbook required all primary care providers and registered nurses to ensure they provide same-day access (unless it is too late in the day as determined by the individual facility) for face-to-face encounters, telephone encounters and, when required by VHA guidance or policy, other types of encounters. The PACT handbook was supplemented by a 2015 VHA memo on unscheduled patient walk-ins. The memo states that if an unscheduled patient presents at a PACT clinic with a clinical concern, the patient cannot be turned away without evaluation by a clinical member of the team, regardless of clinic hours, resource availability, or eligibility/enrollment status. VHA also had previously developed policies stating that veterans are entitled to timely access to mental health care. Specifically, a 2007 VHA memo required that all veterans requesting or referred for mental health care or substance abuse treatment receive an initial evaluation within 24 hours. VHA’s 2015 Uniform Mental Health Services handbook also noted that all new patients requesting or referred for mental health care services must receive an initial evaluation within 24 hours and a more comprehensive diagnostic and treatment planning evaluation within 30 days. Additionally, since 2008, VHA has required the integration of primary care and certain mental health care services at VA medical centers serving a veteran population greater than 5,000. This care model, known as Primary Care–Mental Health Integration (PC-MHI), integrates mental health staff into each primary care PACT clinic, allowing veterans to receive services for depression, anxiety, post-traumatic stress disorder, and substance use without needing to obtain a separate referral to providers in the mental health care clinic. According to VHA guidance, PC-MHI has been shown to improve access to same-day mental health care and reduce no-show rates to appointments. VHA’s veterans access to care office was created in 2016 as the national oversight office for VHA access-to-care issues. Additionally, each VISN is responsible for overseeing the VA medical centers within their designated regions. This oversight includes oversight of access issues and the implementation of initiatives such as the same-day service initiative. VA medical center directors are responsible for ensuring local policies are in place for the effective operation of their primary and mental health care clinics, including affiliated CBOCs. VHA used a five-pronged approach to design its same-day services initiative: VHA (1) defined same-day services, (2) developed guidance, (3) updated its mental health policies, (4) offered training, and (5) assessed VA medical center readiness to implement the initiative. VHA defined same-day services. As an initial step, VHA leadership developed the following definitions of same-day services in primary and mental health care: Same-day services in primary care: “When a veteran requires primary care services right away, during regular business hours, he or she will receive services the same day at a VA medical center. If a veteran calls after normal business hours, he or she will receive care the next business day.” Same-day services in mental health: “If a veteran is in crisis or has another need for mental health care right away, he or she will receive immediate attention from a health care professional at a VA medical center.” VHA also identified a variety of ways in which veterans can receive same- day services, including: (1) providing a face-to-face visit; (2) returning a phone call; (3) arranging a telehealth or video care visit; (4) responding to a secure email; or (5) scheduling a future appointment. VHA developed guidance for the same-day service initiative. To help VA medical centers implement its definition of same-day services, in April 2016, VHA developed written guidance—the MyVA Access Implementation Guidebook. The guidebook provides a variety of solutions to help VA medical centers meet the intent of the same-day service initiative. The guidebook includes specific solutions for VA medical centers struggling to provide same-day services in primary or mental health care for veterans with urgent care needs: Implementing open access in primary and mental health care: Open access aims to balance the supply of (for example, available appointments) and demand for (for example, the number of patients assigned to a provider and annual visits per patient) services to increase patient access. Achieving open access requires implementing specific strategies including achieving full staffing, planning for contingencies such as clinical staff absences or vacancies and managing the number of times patients see a provider each year, among other strategies. Implementing primary care-mental health integration: In order to complete the implementation of PC-MHI across the VA system, the guidebook suggests facilities address staffing vacancies, develop a PC-MHI implementation plan, and choose an open access scheduling model (for example, full open access where there are no scheduled appointments and patients are seen on a first come, first served basis), among other things. Utilizing same-day referrals to mental health for suicide prevention: This solution reiterates many of the mental health policy changes that VHA introduced in conjunction with the same-day service initiative such as implementing an initial screening evaluation, developing a process for same-day care for established patients with an urgent need, and deploying open access scheduling, among other things. The guidebook states that all of the solutions were chosen because they were used successfully at other VA medical centers; can be quickly implemented; and have a high impact on veterans’ access to care. The guidebook also notes that flexibility is a key element when choosing solutions and explains that VA medical centers should select and modify solutions as needed. The guidebook does not make any of the solutions mandatory; however, several of the mental health solutions were introduced to facilities through separate VHA memos and are required. VHA updated mental health policies. VHA updated certain mental health policies to facilitate the implementation of the same-day services initiative. Specifically, in April 2016 VA issued a memo updating its mental health policy to require that any veteran new to mental health services requesting or referred for care in person be seen the same day by a licensed independent provider to screen for and address immediate care needs. This was a change from the previous timeframe of 24 hours for an initial evaluation. The memo also created new processes for VA medical centers to assess same-day services in mental health care clinics, including a medical chart review and a one-time review of standard operating procedures to ensure that the new guidelines are being followed. VHA also distributed other memos that either sought to clarify existing guidance or expand same-day services into other areas of mental health care, such as substance abuse. Additionally, VHA provided a memo to VA network directors and mental health leads about scheduling models for mental health care that all VA medical centers needed to implement for the same-day service initiative. VHA provided training on the same-day-services initiative. VHA provided voluntary training for same-day services some of which discussed the solutions from the guidebook and the updated mental health policy. The trainings began in February 2016 for primary care and in May 2016 for mental health. The trainings consisted of national telephone calls (often with slide presentations) that any VA medical center staff member could join, and the presentation materials were posted to VHA’s internal website. The telephone trainings generally occurred twice a month in primary care and every week in mental health care. VHA assessed VA medical center same-day service readiness. Beginning in January 2017, VHA provided technical assistance around same-day services to VA medical centers. VHA reviewed several aspects of same-day services, including how VA medical centers were able to provide same-day services and identified any approaches that may have needed improvement. Generally, low-performing VA medical centers received continuous on-site support; moderate performing VA medical centers received a combination of virtual and on-site support; and, high performing VA medical centers primarily received virtual support. To determine the progress that VA medical centers were making in providing same-day services, VHA conducted surveys that required medical center directors to self-certify—and, in some cases, VISN directors to validate—that their VA medical centers (including affiliated CBOCs) were able to provide same-day services. In the event that a VISN director could not validate medical center survey information, VHA followed up with the medical center and VISN director to create an action plan to mitigate any issues that were delaying validation. These surveys were conducted in 2016 and 2017; focused on either primary care, mental health care or both; and varied in the information collected to determine how VA medical centers were providing same-day services (See Table 2 for information on the same-day-services readiness assessment surveys used by VHA). According to VHA, all VA medical centers were offering same-day services in primary and mental health care by December 2016. In January 2018, VHA announced that same-day services in primary and mental health care had been achieved in all VA medical centers and CBOCs (more than 1,000 facilities). Officials we spoke with from all six VA medical centers in our review told us they were providing same-day services in primary and mental health care prior to the same-day service initiative, an assertion supported by VHA survey data. For example, in a VHA survey conducted in May 2016, around the same time as the launch of the same-day service initiative, 142 out of 165 officials (86 percent) that responded to the survey said that their medical centers offered same-day appointments “always” or “very frequently” in primary care for urgent concerns. We found that the VA medical centers in our review used a variety of approaches in providing same-day services in primary and mental health care, most of which were in existence before the initiative. As noted earlier, VHA did not require the implementation of any specific solutions in the guidebook and afforded VA medical centers the flexibility to choose appropriate local solutions for the same-day service initiative. Many VA medical centers used this flexibility to continue providing same-day services as they had prior to the initiative often because that is what their resources allowed them to do or, in the case of mental health, because it was built into the foundation of their service line. VHA officials noted that mental health services—particularly PC-MHI—were built around same- day services so VHA’s guidance was familiar to them. The approaches used by the selected VA medical centers included using “float providers” who had not already been assigned specific patients to assist those who requested same-day services; carving out specific appointment times in the schedule for walk-ins; overbooking appointments in providers’ schedules, and offering walk-in clinics. VHA suggested that certain solutions should be prioritized if VA medical centers were struggling to provide same-day services and, in particular for mental health, created new requirements around same-day services. However, officials at selected VA medical centers noted that some of the suggested solutions in the guidebook—particularly open access—and requirements in updated mental health policies were difficult to implement because of longstanding challenges with staffing, space, or competing VHA policies. For example, VHA’s guidebook suggests the implementation of open access in primary and mental health care in such situations. However, officials at four of the six VA medical centers we visited noted that open access was difficult to implement because of the long-standing challenges mentioned above. In addition, VHA updated its mental health policy to include that any veteran new to mental health services requesting or referred for care in person be seen the same day by a licensed independent provider to screen for and address immediate care needs. However, one medical center official noted that they had designed their mental health clinic processes around registered nurses, who are responsible for completing the initial assessments of new patients. The official added that the medical center did not have licensed independent providers readily available at certain facilities to help complete the assessments in a timely manner. Officials at all six medical centers we visited noted that implementation was also sometimes challenging as veterans’ expectations shifted with the same-day-services initiative, with veterans’ expecting more immediate access to care from physicians for a variety of conditions. For example, one medical center official noted that veterans are presenting for care and wanting to see a provider because it is these veterans’ understanding that they could get care immediately for any condition including chronic, less urgent issues. Additional officials at the same facility echoed this concern and noted that they are not certain that this was the policy’s intent. Another medical center official noted that several medical center officials asked VHA to change the name “same-day service” because it gives the impression that veterans would always be able to see their provider immediately. This official added that there is some confusion for both staff and veterans about what are same-day services. Additionally, according to one veterans service organization official that we spoke with, a small number of veterans reported that the availability of same-day services varied by facility (VA medical center versus CBOC) and location (urban versus rural). Another medical center official noted that same-day services are not sustainable if the definition is immediate care by a provider for any condition, especially non-urgent issues. VHA officials told us that the same-day service initiative was a response to the 2014 access crisis and they wanted facilities to use the resources available to them rather than waiting on new policies and strategies. They stated that their main concern was that veterans’ needs were met, not necessarily how they were met. As such, VHA officials told us that they found VA medical centers’ implementation of same-day services acceptable. The VHA officials added that the guidebook is still the foundational document for same-day services. VHA officials told us that it is important for VA medical centers to educate patients on the appropriate use of same-day services. They added that in fiscal year 2019 they are (1) developing a more precise definition of same-day services; (2) developing a website to better explain the purpose of the initiative; and (3) requiring on-demand trainings to provide a clearer explanation about what same day services are available and what staff roles and responsibilities are, among other things. The training is expected to be completed no later than the first quarter of fiscal year 2020. VHA is limited in its efforts to assess the impact of same-day services due to its lack of documented objectives, developed performance goals and related performance measures. Our previous work has shown the benefit of fully connected objectives and performance goals with measurable targets. Objectives state the longer term desired impact or outcome to be achieved, while performance goals communicate the target the agency seeks to achieve within a certain timeframe. Performance measures are indicators of the progress the agency is making towards a goal or target within a particular time frame. VHA officials told us that the overall objectives of same-day services are to improve veterans’ access to care and customer service while having minimal impact on medical centers’ existing workflows. However, VHA has not documented these objectives—for example, in a directive. In addition, VHA has not developed and documented performance goals that, with associated performance measures, would facilitate monitoring of progress towards the desired outcome of the same-day services initiative. VHA officials stated that the same-day-services initiative was developed quickly in response to the 2014 access crisis, and noted that at the time, their focus was “to get something out quickly” instead of taking time to standardize the initiative around specific policies and procedures, which could include documenting objectives and developing performance goals. VHA officials acknowledged that their decision to focus on quickly implementing the initiative without documenting objectives and developing performance goals and associated performance measures makes assessing the impact of the same-day services initiative more challenging. VHA has taken some steps to collect data on same-day services. For example, VHA officials stated that they primarily rely on two measures to assess the impact of the same-day services initiative: patient experience scores and the number of same-day appointments. However, without performance goals these measures do not provide VHA with a means to monitor progress and provide limited information on same-day services’ impact. Patient experience score: VHA uses the Survey of Healthcare Experiences for Patients (SHEP) to measure veterans’ perceptions of their experience at VA medical centers. For same-day services, VHA monitors responses to two questions. According to VHA officials, the key measure is based on the survey question that asks “in the last 6 months, when you contacted this provider’s office to get an appointment for care you needed right away, how often did you get an appointment as soon as you needed?” While SHEP scores provide some data related to customer service and access to care, VHA has not developed performance goals that sets targets for these or other aspects of the same-day services initiative that would benefit from monitoring. Such goals would better enable VHA to identify gaps in performance and plan any needed improvements; ensure balance between agency priorities, such as customer service and access; and identify unintended effects, such as disruption to clinic workflows. For example, officials at one medical center told us that focusing on customer service creates issues with respect to routine care in that veterans’ definition of customer service is based on what makes them happy, while providers are focused on providing the best treatment. Officials added that these two definitions do not always align. In addition, officials at another medical center stated that implementing same-day services impacted their providers’ schedules and the resulting changes to their processes created chaos. Number of same-day appointments: VHA measures the number of same-day appointments, which, according to a VHA official, are identified in VHA data as appointments completed on the same day they are created in VHA’s scheduling system. According to a VHA training document, VA completed 12 million same-day appointments in fiscal year 2018. However, without performance goals with clear targets for same-day appointments, an official from one VISN said she was unclear how many same-day appointments medical centers should be scheduling. Additionally, same-day services performance goals may afford VHA the opportunity to monitor other key measures—such as those that capture services that do not require an appointment—which could provide VHA with important information on the impact of same-day services on access to care. Moreover, performance goals and additional performance measures may help prevent unintended consequences, such as an over-emphasis on same-day appointments as the way to provide same-day services, which VHA officials stated they are working to curb. For example, officials at two selected medical centers also noted that measuring the number or proportion of same-day appointments does not capture all the ways medical centers provide same-day services. Officials at two other selected medical centers noted they can meet veterans’ same-day needs through multiple avenues, such as a registered nurse providing patient education or by renewing a prescription, that do not require an appointment and therefore, would not be counted in the number of same-day appointments. VHA officials stated that the impact of the same-day services on access to care is difficult to measure and additional measures would help properly measure the impact. VHA’s lack of documented objectives and developed performance goals and related measures is inconsistent with our prior work on effective management practices and federal internal control standards. Specifically, we have previously reported that performance measures benefit from certain key practices, such as breaking down of broad long- term objectives into specific near-term performance goals with measurable targets and time frames, and key attributes, such as balance to prevent skewed incentives over-emphasizing certain goals. Additionally, Standards for Internal Control in the Federal Government states that documentation provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. Without clearly documented objectives, performance goals, and related performance measures, VHA is hindered in its efforts to define success for its same-day service initiative and measure progress achieving it. VHA officials stated they rely on VISN and VA medical center officials to oversee same-day services; however, we found that without performance goals and related performance measures, VISNs and VA medical centers found it challenging to oversee the same-day services initiative. Specifically, officials at five of the six medical centers and two of the four VISNs we visited stated that it is difficult to measure same-day services; which in turn makes assessing the initiative’s impact on veterans’ access to care difficult. Officials at one medical center explained that the challenge stems from the fact that that VHA has not defined what outcome it wants to achieve. In addition, officials at another VA medical center stated that they have a number of access measures available to them, but it was unclear to them which measures they should be prioritizing as part of their oversight of the same-day services initiative. Further, absent performance goals, we found that VISNs and medical centers, which operate in a decentralized environment, varied in their oversight strategies. For example, one VISN required all medical centers to complete a self-assessment of their access capacity and sustainability, and collected information on a number of key open access elements, including Patient-Aligned Care Team staffing levels and provider panel sizes, among others. However, oversight by other VISNs was reportedly less robust. For example, at one VISN, officials stated it is difficult to audit access broadly and described their oversight of same-day services as “fairly minimal.” At the medical center level, oversight also varied as officials tried to develop their own oversight solutions. Officials at one medical center we visited used a feature within the outpatient appointment scheduling system that allowed them to count the specific services, such as pharmacy refills, that veterans seeking same-day mental health care had requested. According to these officials, the tool provided additional data not found in existing VHA access-related reports and allowed them to better understand veterans’ demand for specific same-day services and utilize resources more efficiently. These officials added that they developed this solution because they had not received guidance from VHA on how they should measure demand, and they had skilled staff with the ability to develop their own measures. However, not all VA medical centers we visited had the skilled staff to develop similar solutions. Developing performance goals and related performance measures would better position VHA to obtain useful, comparable information on the impact of same-day services on access to care across VISNs and medical centers. Moving forward, VHA is planning to conduct a “mystery shopper” evaluation of same-day services to assess the impact of same-day services. The mystery shopper evaluation will consist of various scenarios in which veterans, engaged through a contractor, will attempt to access same-day care at a variety of clinics in VA medical centers. As described in a VHA planning document, the evaluation is intended to provide VHA with information on veterans’ experience in obtaining same-day services and will attempt to understand variations in how same-day services are provided. However, VHA officials have not determined if the evaluation will be ongoing. VHA officials stated that in addition to the mystery shopper evaluation, they are considering additional measures to better assess the impact of same-day services beyond their current measures, such as the number of pharmacy refills completed the same day they were requested. However, as of May 2019, VHA had not developed specific performance goals to align these measures to, or set timeframes for their creation. Without overall performance measures that are tied to documented performance goals, VHA will continue to be limited in its ability to assess the impact of same-day services on veterans’ access to care. VHA’s same-day services initiative for primary and mental health care is one of several efforts by VHA to help improve veterans’ access to care in the 5 years since access issues garnered national attention. VHA’s stated objectives for the same-day-services initiative are to improve veterans’ access to care and customer service while having minimal impact on medical centers’ existing workflows. However, VHA has not documented these objectives or developed performance goals and related measures that provide for monitoring towards the desired outcomes. VHA primarily relies on veteran satisfaction scores and the number of same-day appointments to monitor the same-day-services initiative, but these measures alone do not enable an assessment of the impact of same-day services on access to care. Without documented objectives, and performance goals and related measures tied to these goals, VHA will continue to be limited in its ability to determine, how, if at all, the same- day-services initiative has improved veterans’ access to care. The Under Secretary for Health should document same-day services objectives and develop performance goals and related performance measures to facilitate the periodic assessment of the impact of same-day services on veterans’ access to care. (Recommendation 1) We provided a draft of this report to VA for review and comment. In its written comments, which are reproduced in appendix I, VA concurred in principle with our recommendation. VA stated that its Office of Veterans Access to Care will clarify objectives, develop performance goals, and explore the options for reliable performance measures. VA noted that identifying options for performance measures will take approximately 9 months and that additional time may be needed for development, testing and refinement. VA provided a target completion date of April 2020. We are sending copies of this report to the appropriate congressional committee and the Secretary of Veterans Affairs. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at DraperD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Ann Tynan (Assistant Director), Dan Klabunde (Analyst-in-Charge), Jennie F. Apter, and Q. Akbar Husain made key contributions to this report. Also contributing were Muriel Brown, Jacquelyn Hamilton, Ethiene Salgado-Rodriguez, and Merrile Sing.", "summary": "In 2014, a series of congressional testimonies highlighted problems with veterans' access to care after significant appointment wait times at VA medical centers reportedly resulted in harm to veterans. In response, VHA implemented several initiatives, including same-day services at its medical centers and outpatient clinics. GAO was asked to review the same-day services initiative and VHA's related oversight activities. This report (1) describes how VHA designed and how selected medical centers implemented the same-day services initiative; and (2) examines VHA's efforts to assess the impact of the same-day services initiative on veterans' access to care. GAO reviewed VHA documents, including policies, guidance, and requirements related to same-day services and interviewed VHA officials regarding implementation and oversight. GAO visited six VA medical centers selected for the complexity of services offered, range of wait times, and geographic variation, among other factors. GAO interviewed officials from (1) the six VA medical centers and affiliated outpatient clinics, (2) VHA's networks with oversight responsibility, and (3) two veterans service organizations. The Department of Veterans Affairs' (VA) Veterans Health Administration (VHA) introduced its same-day services initiative in primary and mental health care in April 2016, and used a five-pronged approach for its design: it defined same-day services, developed guidance, updated its mental health policies, offered training, and assessed VA medical center readiness to implement the initiative. Officials from all six VA medical centers GAO visited said they already were providing same-day services prior to the initiative and generally relied on previous approaches to implement VHA's same-day-services initiative. However, these officials told GAO that some of VHA's guidance and updated policies were difficult to implement due to long-standing challenges of staffing and space constraints, among others. For example, one medical center official stated that the medical center did not have the appropriate providers readily available to complete the initial mental health assessments of new patients in a timely manner—a new requirement under VHA's updated policies. VHA officials stated that the objectives of the same-day services initiative are to improve veterans' access to care and customer service. However, VHA has not documented these objectives in a directive or developed and documented performance goals that, with associated performance measures, would monitor progress. Although VHA does monitor patient experience scores and the number of same-day appointments, these measures are not tied to specific performance goals. For example, VHA has not specified targets for the number of same-day appointments medical centers should provide. Furthermore, monitoring the number of same-day appointments does not capture all of the ways VA medical centers provide same-day services, such as renewing prescriptions. VHA officials acknowledged the intitiative was quickly developed in response to the 2014 access crisis, and developing new policies or processes, which could include documenting objectives and developing performance goals, was not the priority. Without performance goals and related measures, VHA will continue to be limited in its ability to determine, how, if at all, the same-day services initiative has improved veterans' access to care. GAO recommends that VA document objectives and develop performance goals and related performance measures to facilitate the periodic assessment of the impact of same-day services on veterans' access to care. VA agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "The U.S. government implements an export control system to manage risks associated with exporting sensitive items and ensure that legitimate trade can still occur. The export control system is governed by a complex set of laws, regulations, and processes that multiple federal agencies administer to ensure compliance. State and Commerce each play a role in the U.S. export control system. Historically, State has controlled the export of military items, known as defense articles and services, while Commerce has controlled the export of less sensitive items with both military and commercial applications, known as dual-use items. In addition to firearms, artillery, and ammunition, State controls the export of items such as tanks, fighter aircraft, missiles, and military training, which it lists on the U.S. Munitions List (USML). Commerce controls the export of dual-use items such as computers, radars, and telecommunications equipment, which it lists on the Commerce Control List (CCL). State and Commerce both control the export of items within their jurisdictions by requiring a license or other authorization to export a controlled item; vetting the parties associated with export transactions; monitoring the end-use of exports and other compliance activities; and supporting law enforcement agencies’ investigations of possible violations of export control laws and regulations. Generally, unless a license exemption applies, exporters submit a license application to State if their items are controlled on the USML or to Commerce if they are controlled on the CCL to receive export approval. As part of the application review process, State and Commerce consult with other agencies, including DOD. Additionally, offices within Commerce, DHS, and the Department of Justice (DOJ) investigate potential violations of export control laws and regulations, and conduct enforcement activities. Items identified on the State and Commerce export control lists are subject to different laws and regulations. The Arms Export Control Act of 1976, as amended, (AECA) provides the statutory authority to control the export of defense articles and services, which the President delegated to the Secretary of State. State’s International Traffic in Arms Regulations (ITAR) implement this authority and identify the specific types of items subject to control in the USML. The USML is comprised of 21 categories of items, each with multiple sub-categories, encompassing defense items such as firearms, missiles, and aircraft. Firearms, artillery, and ammunition represent the first three categories of the USML (see table 1). Additional information on the 21 categories of the USML is presented in appendix II. Within State, the Directorate of Defense Trade Controls (DDTC) is responsible for implementing controls on the commercial export of these items. The Export Control Reform Act of 2018 (ECRA) provides the statutory authority for Commerce to control the export of less sensitive military items, dual-use items, and basic commercial items. Commerce’s Export Administration Regulations (EAR), which contain the CCL, implement this authority. The CCL classifies less sensitive military items, dual-use items, and basic commercial items in 10 categories, such as Nuclear & Miscellaneous, Electronics, and Telecommunications, and in 5 product groups. Appendix II shows the 10 categories and five groups of the CCL. Commerce’s Bureau of Industry and Security (BIS) is responsible for implementing these export controls (see table 2 for a summary of the legal and regulatory frameworks for State’s and Commerce’s export controls). In May 2018, State and Commerce published proposed rules in the Federal Register to request public comments on the proposed transfer of certain items in USML Categories I, II, and III (firearms, artillery, and ammunition) to the CCL. According to State and Commerce’s proposed rules, the purpose of the transfer is to limit the items that State controls to those that provide the United States with a critical military or intelligence advantage or, in the case of weapons, are inherently for military end use. According to the proposed rules, items that do not meet these criteria would be removed from State’s export control jurisdiction and moved to Commerce’s jurisdiction. The proposed rules state that some, but not all, of the firearms, artillery, and ammunition currently controlled for export by State would transfer to Commerce control. The items proposed for transfer to the CCL include non-automatic and semi-automatic firearms up to .50 caliber, and non-automatic shotguns with a barrel length less than 18 inches; as well as parts, components, accessories, attachments, and ammunition for these firearms and shotguns, among other items. According to the proposed rules, if finalized, State would continue to control fully-automatic firearms, shotguns, and modern artillery; silencers, components, parts, and accessories specially designed for automatic firearms and shotguns; and specific types of ammunition, including ammunition for automatic firearms. The proposed rules would also make a variety of conforming changes to the USML and CCL to accommodate the transferred items. The proposed transfer of firearms, artillery, and ammunition is part of an ongoing effort to reform the export control lists by reviewing the USML categories and transferring certain items considered less sensitive to the CCL. Since the export control reform initiative was first announced in 2010 with the objective of modernizing the export control system, State and Commerce have finalized various rulemakings that transferred certain items from USML Categories IV through XXI to Commerce’s control. Firearms, artillery, and ammunition are the last three USML categories proposed to undergo regulatory changes under export control reform. In accordance with the AECA, the President must notify Congress of items proposed for removal from the USML and describe the nature of any controls to be imposed on the items, and may not remove the items until 30 days after providing such notice. State and Commerce published the proposed rules in the Federal Register on May 24, 2018, opening a 45-day public comment period that ended on July 9, 2018. After reviewing public comments, State and Commerce submitted final rules to the Office of Management and Budget for regulatory review on November 7, 2018. The required 30-day congressional notification period pursuant to the AECA began on February 4, 2019, according to a State official. State reviewed 68,690 export license applications for firearms, artillery, and ammunition with a potential value of up to $45.4 billion during fiscal years 2013 to 2017. The number of export license applications for firearms, artillery, and ammunition remained relatively constant from fiscal years 2013 to 2017, averaging 13,738 annually, even as the total number of licenses reviewed by State declined as the export control reform process transferred items from State to Commerce control (see fig. 1). Firearms, artillery, and ammunition increased from about 16 percent of all license applications reviewed by State in fiscal year 2013 to about 36 percent in 2017. State processes export license applications for permanent exports, temporary exports and imports, and certain types of agreements. During fiscal years 2013 to 2017, about 91 percent of export license applications for firearms, artillery, and ammunition were for permanent exports, about 8 percent for temporary exports and imports, and about 2 percent for agreements. State can take various actions on the export license applications it receives, including approving the license, approving with conditions, returning without action, and denying the license. For fiscal years 2013- 2017, State approved 87 percent of the number of export license applications for firearms, artillery, and ammunition, returned without action 12 percent, and denied 1 percent. State can approve an application but place conditions on the export license, such as limiting the validity period or prohibiting certain types of intermediaries in the export transaction. State can also return without action export license applications that are missing information or that it is otherwise unable to review, and can deny, revoke, suspend, or amend a license for foreign policy or national security reasons. About two-thirds of the export license applications for firearms, artillery, and ammunition that State reviewed during fiscal years 2013-2017 were for firearms and related items controlled under Category I of the USML (see fig. 2). Of the applications for these items, about 57 percent involved non-automatic or semi-automatic firearms—most of which are proposed to transfer to the CCL under Commerce control—and about 4 percent involved fully-automatic firearms—which would remain on the USML under State control. The remainder of export license applications for Category I items included other types of firearms such as combat shotguns, firearm attachments such as silencers and riflescopes, firearm parts and components, and technical data and defense services related to these items. The proposed rules state that some of these items would transfer to Commerce control while others would remain under State control. As shown in figure 2, export license applications for Category II artillery were about 5 percent of all Category I-III license applications from fiscal years 2013 through 2017. According to State, under the proposed rules, modern artillery, their ammunition, and certain related parts and components would remain under State’s control. Category III ammunition represented about 21 percent of the Category I-III export license applications. As stated in the State and Commerce proposed rules, USML Category III would be revised to specifically list the ammunition that it controls, which would include ammunition that has only or primarily military applications. Generally, ammunition used in the non- automatic and semi-automatic firearms that are proposed to transfer to Commerce control would also transfer. About 8 percent of the export license applications involved items controlled in more than one category of USML Categories I, II, and III, which are shown as “Multiple” in figure 2. In fiscal years 2013 to 2017, 32 percent of license applications for the export of firearms, artillery, and ammunition were intended for end-users in countries in Europe and Eurasia, 29 percent to the Western Hemisphere, 24 percent to East Asia and the Pacific, 7 percent to the Near East, 3 percent to Africa, 3 percent to South and Central Asia, and 2 percent to multiple countries (see fig. 3). Export license applications for firearms, artillery, and ammunition during fiscal years 2013 to 2017 included applications for end-users spanning 189 countries and territories, yet the top 20 countries represented about 70 percent of the total number of applications (see fig. 4). State’s and Commerce’s export controls are guided by different laws, regulations, or policies that have several different requirements for registration, licensing, end-use monitoring, congressional notification, public reporting, and enforcement. The AECA requires manufacturers, exporters, and brokers of items on the USML to register with State whereas there is no registration requirement in the law for manufacturers, exporters, and brokers of items on the CCL under Commerce’s jurisdiction. Differences also exist in how State and Commerce screen export license applications and in their license requirements. For example, State and Commerce rely on different internal watch lists to screen applicants. In addition, according to Commerce, certain exports that currently require a State license would not require a Commerce license once transferred to Commerce’s jurisdiction. State and Commerce also conduct end-use monitoring of selected controlled exports differently. For example, State relies primarily on embassy staff to conduct end-use checks and Commerce relies primarily on several export control officers based overseas for this responsibility. In addition, congressional notification and public reporting requirements that under current law apply to firearms on the USML would not be applicable if they are transferred to the CCL. Finally, there are some differences in enforcement of export control laws, such as different maximum fines for civil violations, depending on whether the item is controlled by the ITAR under State’s jurisdiction or controlled by the EAR under Commerce’s jurisdiction. The AECA requires manufacturers, exporters, and brokers of defense articles or services listed on the USML to register annually with State’s Directorate of Defense Trade Controls (DDTC) whereas there is no requirement in the law for registration for manufacturers, exporters, and brokers of items on the CCL. State reported having 13,083 registrants across all 21 USML categories in fiscal year 2017. Registration, which requires a fee payment of at least $2,250 per year, is generally a precondition for obtaining a State export license, unless State grants an exception to a manufacturer or exporter, or a broker is eligible for an exemption. According to a State document, registration provides important information on the identity and location of defense companies and conveys management responsibility for compliance with export control laws. Those registering must disclose any foreign ownership or affiliations and certify that they have not been indicted, otherwise charged with, or convicted of export control violations and other crimes. Manufacturers and exporters whose entire product line transfers to the CCL would no longer have to register, according to Commerce’s proposed rule, while those that manufacture or export any items that remain on the USML, would continue to register with DDTC. State’s and Commerce’s processes for reviewing export license applications involve opportunities for other Departments to review applications. While DDTC has primary responsibility for reviewing State’s commercial export license applications, other bureaus within State, as well as DOD, also review certain applications, depending on the defense article, defense service, or the destination country. Commerce export license applications also involve an interagency review that includes State, DOD, and the Department of Energy, depending on the item to be exported. Both departments have a process for resolving disagreements among the reviewing bureaus or agencies on the disposition of the application. According to State officials, as part of the interagency review process for Commerce licenses, State has generally reviewed applications for items that have previously moved from the USML to the CCL and would continue to do so for items that would transfer to the CCL under the proposed rules. Moreover, DOD officials told us that DOD intends to review Commerce export license applications for these items during the interagency review process, if the proposed transfer is implemented. This would represent a change from DOD’s current practice to generally not review State’s firearms license applications. DOD officials told us that if the proposed rules are finalized, they believed it is prudent to begin reviewing Commerce license applications for items that would transfer under the proposed rules, at least initially. State and Commerce each maintain their own internal watch lists to screen all parties identified on license applications. A watch list match would trigger further review of the license and ultimately can result in a denial of the license in some cases. State and Commerce also use watch lists as a means of targeting transactions for possible end-use checks to verify legitimacy of end-users of controlled exports. Both departments’ watch lists include any derogatory information they collect internally from their past screening and end-use monitoring of licenses. For example, if information is identified raising questions about the legitimacy of a party to a license during the application review, that information would be used to update the watch list to inform future license application reviews. State’s and Commerce’s watch lists also include information from automated databases maintained by other U.S. agencies as well as information from law enforcement agencies and the intelligence community. State’s watch list contains over 200,000 entries, including sensitive details related to ongoing and previous law enforcement activities, according to State officials. According to Commerce officials, because State has been responsible for export controls of firearms, artillery, and ammunition, its internal watch list is also more likely than Commerce’s to include derogatory information collected from past screening and end-use monitoring related to exports of these items. However, Commerce does not have access to State’s watch list, according to State and Commerce officials. These officials noted that a Commerce licensing officer can ask State to screen an applicant with State’s watch list on a case-by-case basis, although such checks are not done routinely. State and Commerce officials told us that, in anticipation of the transfer of firearms, artillery, and ammunition to Commerce’s responsibility, the two departments are engaged in ongoing discussions to potentially share State’s watch list with Commerce. According to State officials, these discussions involve determining which specific watch list information Commerce would need and State is able to share, depending on the source of the information. State and Commerce also have to resolve the sharing and updating of information using different information technology infrastructures, according to department officials. As of February 2019, the departments had not reached agreement or established a documented process to achieve the goal of sharing watch list information before implementation of the proposed transfer would occur, according to State and Commerce officials. Information sharing is supported by a policy statement included in the ECRA. The statement says that among other factors, the “export control system must ensure that it is transparent, predictable, and timely, has the flexibility to be adapted to address new threats in the future, and allows seamless access to and sharing of export control information among all relevant United States national security and foreign policy agencies.” Without access to State’s watch list, if the proposed rules are finalized, Commerce may lack critical information needed to effectively screen license applicants for firearms and related exports and target possible cases for end-use monitoring to ensure that these exports are used as intended and by legitimate end-users. Both State and Commerce screen license applications for human rights concerns, but the federal law that prohibits exports to the governments of certain foreign countries on human rights grounds applies differently to items under State’s jurisdiction than under Commerce’s. Under Section 502B of the Foreign Assistance Act of 1961, as amended, in general, “no security assistance may be provided to any country the government of which engages in a consistent pattern of gross violations of internationally recognized human rights.” For this provision, “security assistance” is defined in part as any license in effect with respect to the export to or for the armed forces, police, intelligence, or other internal security forces of a foreign country of (1) any defense articles or defense services licensed for export under section 38 of the AECA, or (2) items listed under the 600 series of the CCL. Licenses under Commerce’s jurisdiction generally may not be issued for items defined as “crime control and detection instruments and equipment” to a country, the government of which engages in a consistent pattern of gross violations of internationally recognized human rights. For items under Commerce’s jurisdiction, the Commerce proposed rule specifies that concern for human rights is a regulatory reason for denying a license for firearms and ammunition under Commerce’s Export Administration Regulations (EAR). Within State, the Bureau of Democracy, Human Rights and Labor (DRL) is primarily responsible for screening export license applications to ensure that exports do not involve parties with human rights concerns. According to DRL officials, the bureau reviews applications for exports to specific countries where human rights concerns exist and prioritizes applications for firearms exports because they are often associated with human rights abuses committed by government police and military units. The officials noted, however, that State rarely denies an export license based solely on human rights concerns. If firearms are transferred to Commerce’s responsibility, DRL will continue to have the primary role in screening license applications for human rights as part of the Commerce-led interagency review process, according to DRL officials. For Commerce license applications, however, State’s position would be weighed together with the positions of Commerce, DOD, and Energy, according to Commerce officials. By contrast, for State export license applications, State alone makes the final determination, according to State officials. State and Commerce have different end-user certification requirements. State’s export control regulations require that for certain items, applicants provide a written certification from end-users that they will not re-export, resell, or otherwise dispose of the commodity outside of the country listed on the license. This requirement generally applies to all items on the USML that are designated as Significant Military Equipment, including firearms, and ammunition. In contrast, Commerce generally does not require end-user certification for items on the CCL but does require it when it has not verified the legitimacy of end-users and may also impose this requirement on a case-by-case basis. Written end-user certification provides additional assurance and accountability that end-users will comply with the terms and conditions of the license, according to State officials. It also is a deterrent and provides documentary evidence that can be later used in court, if necessary, according to an official from Immigration and Customs Enforcement (ICE). The AECA states that the Secretary of State shall require reporting on political contributions, gifts, commissions, and fees paid or offered, or agreed to be paid by any person in connection with a commercial sale of an item listed on the USML to or for the armed forces of a foreign country or an international organization. State’s export control regulations also require license applicants to disclose certain payment of political contributions, fees, and commissions for certain sales of defense articles and defense services. This requirement applies to exports of $500,000 or more. Applicants must report political contributions in an aggregate amount of $5,000 or more and paid fees or commissions in an aggregate amount of $100,000 or more. Applicants must provide a letter to DDTC containing specific information about the sale, including the amounts of political contributions, fees, or commissions paid, and the name and nationality of each recipient. The disclosures are intended to ensure that purchases made by foreign governments of U.S. defense articles are based on merit without improper influence. Failure of applicants to comply with these disclosure requirements can result in additional oversight measures and civil penalties. According to an ICE official, this disclosure information may provide valuable information in criminal or civil matters. There is no requirement in the law for these disclosures for items listed on the CCL and Commerce licenses do not require these disclosures. Therefore, this information would no longer be collected as part of the licensing process for firearms, artillery, and ammunition that are proposed for transfer to the CCL, according to Commerce officials. Consistent with export control regulations, there are several circumstances in which some exports proposed for transfer that currently require State licenses would either require fewer or no Commerce licenses if the proposed rules are finalized, according to Commerce. Multiple end-users on one license. State requires licenses to be limited to only one end-user, while Commerce allows multiple end-users on a single license. The applicant for a State export license must provide a purchase order documenting the proposed export to a single end-user and an additional license would be required for each additional end-user. According to Commerce officials, a Commerce license can have multiple end-users associated with a particular consignee, reducing the total number of licenses for which the applicant must apply. Technical data and defense services. State requires licenses for defense services and technical data whereas Commerce’s export controls do not generally apply to defense services and apply to technical data more narrowly than State. State’s regulations define defense services as “the furnishing of assistance (including training) to foreign persons … in the design, development, engineering, manufacture, production, assembly, testing, repair, maintenance, modification, operation, demilitarization, destruction, processing or use of defense articles.” State’s definition of defense services also includes military training of foreign units and forces including publications, training exercises, and military advice. State’s definition of technical data includes information, such as blueprints, drawings, or instructions. Commerce’s export control regulations generally do not apply to services. For example, training in the basic operation of a firearm controlled by Commerce would not be subject to export controls, according to State officials. In addition, Commerce’s regulations do not control technology or software, if it is “available to the public without restrictions.” For example, Commerce officials told us that Commerce would not require an export license for the posting of instructions for 3D printing of firearms on the internet, if they were publicly available without restrictions. Minimum level of U.S.-origin content. Items subject to State’s controls require a license when they are incorporated into a foreign-made product regardless of the percentage of controlled U.S. content in that product. Commerce does not require a license for items when they are incorporated into foreign-made items unless the controlled U.S.-origin content of a foreign-made product exceeds the applicable minimum percentage which, according to Commerce officials, may be 10 or 25 percent, depending on the destination. This minimum level of U.S.-origin content is referred to as “de minimis treatment.” Commerce’s proposed rule states that de minimis treatment in Commerce’s regulations would apply for all foreign-made items proposed for transfer to the CCL, unless they are being exported to a country that is subject to a United States arms embargo, in which case there would be no minimum threshold for U.S.-origin content. License exceptions. State regulations contain some country-based license exceptions, including for exports to Canada and, more narrowly, to Australia and the United Kingdom whereas Commerce has several different license exceptions under its regulations. For example, Commerce regulations have the “Strategic Trade Authorization” (STA) exception that permits exports of certain items to countries determined to be low risk, which includes NATO partners and other close allies, of which 37 are eligible for a broader STA authorization and seven are eligible for a much narrower STA authorization. Commerce’s proposed rule specifies that it would revise Commerce’s regulations to make firearms and most parts, components, accessories, and attachments ineligible for the STA license exception. However, Commerce estimates that 450 to 650 license applications per year involving certain eligible items would still be authorized under STA exceptions if the proposed rules are finalized. Commerce also has a “Limited Value Shipment” exception, which is available for proposed exports of certain less sensitive firearms parts and components with a value of $500 or less per shipment based on the actual selling price or fair market value. Commerce’s proposed rule specifies that this exception would only be available for certain parts, components, and accessories and attachments for firearms; complete firearms would be ineligible for this exception. State offers a similar exemption but only for licenses with a value of $100 or less, based on the wholesale price. State and Commerce both conduct end-use monitoring to verify the reliability of foreign end-users and legitimacy of proposed transactions and to provide reasonable assurance of compliance with the terms of the license and proper use of the licensed items. State recommends that end-use checks involve a site visit whenever possible, while Commerce policy requires that the end-use check include a physical verification on-site with a party to the transaction, according to Commerce officials. State and Commerce also apply their own means of risk-based targeting to select the licenses or exports that will undergo end-use monitoring, however, similarities exist involving selection criteria. For example, State and Commerce may target transactions that involve unfamiliar foreign parties, unusual shipping routes, or derogatory information from watch lists, according to the departments. The number of end-use checks conducted by State averaged about 1.3 percent of its license applications, and those conducted by Commerce averaged about 3.3 percent of its applications from fiscal years 2013-2017. State and Commerce end-use checks may result in either “favorable” or “unfavorable” findings. Commerce may also categorize an end-use check as “unverified.” An “unfavorable” or “unverified” result occurs if the end- use check cannot verify information in the license or reveals facts that are inconsistent with the license. For either State or Commerce, an unfavorable end-use check can lead to denying applications, revoking licenses, removing parties from licenses, updating the watch list, or making referrals to U.S. law enforcement agencies for investigation, according to a State report and Commerce officials. State closed 166 of 766, or 22 percent, of end-use monitoring cases as “unfavorable” in fiscal years 2013-2017 for firearms, artillery, and ammunition licenses. State’s three most common reasons for an unfavorable finding for end-use checks for firearms, artillery, and ammunition were derogatory information on a foreign party, inability to confirm order or receipt of goods, and involvement of an unlicensed party. State relies on U.S. embassy or consulate staff in the country or countries involved in the transaction to conduct its end-use checks. Commerce relies primarily on Export Control Officers (ECOs) positioned overseas to conduct end-use checks. ECOs conducted an average of about 60 percent of Commerce’s end-use checks per year from fiscal years 2013 to 2017. According to Commerce officials, Commerce had a total of nine ECO positions in Beijing, Dubai, Frankfurt, Hong Kong, Istanbul, New Delhi, and Singapore, as of October 2018 (see fig. 5). Six of these nine positions were filled as of this date. The ECOs have areas of responsibility covering multiple countries within their geographic region. For the remaining 40 percent of end-use checks, Commerce relied primarily on its “Sentinel Program” in which BIS special agents based in domestic field offices, along with other responsibilities, travel to destination countries not covered by ECOs to conduct end-use checks. In addition, a small percentage of Commerce’s end-use checks are conducted by Foreign Commercial Service officers or other personnel stationed at U.S. embassies, according to Commerce officials. State conducted 766 end-use checks for firearms, artillery, and ammunition in fiscal years 2013-2017 with the largest share, over 40 percent, in the Western Hemisphere (see fig. 6). None of Commerce’s overseas ECO positions are located in this region nor do any cover it within their areas of responsibility. According to Commerce officials, the number and locations of end-use checks for firearms, artillery, and ammunition, if these items are transferred to the CCL, will depend on how exports of these items factor into the department’s existing targeting criteria. To the extent that Commerce needs to conduct end-use checks for these items in the Western Hemisphere, Commerce officials told us that they plan to cover these checks via the Sentinel Program and, where necessary, through checks by Foreign Commercial Service Officers. The officials noted that they plan to reassess their end-use monitoring efforts after items are transferred to the CCL if the proposed rules are finalized. End-use checks include pre-license checks in support of the license application review or post-shipment verifications after the license has been approved and items have shipped. As shown in figure 7, more than 50 percent of State’s end-use checks specifically for firearms, artillery, and ammunition licenses from fiscal years 2013 to 2017 were pre-license checks. Conversely, about 90 percent of Commerce’s end- use checks for all items subject to the EAR for this period were post- shipment verifications. Commerce noted that it conducts mostly post- shipment verifications because it controls a higher share than State of items that are exported without a license. The AECA requires State to notify Congress before State can approve certain export licenses for firearms, artillery, and ammunition. These notification requirements depend on the proposed export value and type of export, among other factors. For example, the AECA requires State to notify Congress of proposed licenses for the export of USML Category I firearms in the amount of $1 million or more. Additionally, State must notify Congress of proposed licenses for commercial agreements that involve the overseas manufacture of certain USML items, including many firearms, artillery, and ammunition items, regardless of the proposed value. During fiscal years 2013 to 2017, State identified 240 export license applications involving firearms, artillery, and ammunition that required congressional notification, totaling approximately $2.5 billion. Additionally, State identified 41 license applications for commercial technical assistance or manufacturing license agreements involving the overseas manufacture of firearms, artillery, and ammunition that required congressional notification, totaling approximately $5.7 billion. According to State and Commerce officials, these congressional notification requirements would no longer apply to firearms, artillery, and ammunition that move from State’s to Commerce’s export control responsibility because the requirements apply specifically to USML controlled items. The proposed rule transferring firearms to Commerce’s responsibility does not revise Commerce’s export control regulations to add a congressional notification requirement for firearms, according to Commerce officials. The Foreign Assistance Act, as amended, requires State to report to Congress annually on military assistance and military exports to the governments of each foreign country and international organization and specifies that the report include “a statement of the aggregate dollar value and quantity of semiautomatic assault weapons, or spare parts for such weapons.” The Act also requires that State post all unclassified information from this report on the internet. To comply with this requirement, State posts an annual report that includes the aggregate dollar value and quantity of defense articles and services, by USML category, licensed to each foreign country and international organization, as well as data on the actual shipments occurring during the fiscal year. The report also includes an appendix that breaks out exports specifically for the USML sub-category I(a), which includes non-automatic and semi- automatic firearms, and sub category I(h), which includes firearms components, parts, accessories, and attachments. This reporting requirement only applies to exports of items on the USML, which are licensed by State under the AECA, but does not apply to exports controlled by Commerce. This information on exports, by country, would no longer be available for firearms and other items from Categories I-III of the USML after they are transferred to the CCL if the proposed rules are finalized, according to Commerce officials. The statutory penalties available for criminal violations of export control laws are the same regardless of whether the items are on the USML and controlled by State or on the CCL and controlled by Commerce. Criminal violations may result in fines up to $1 million and prison terms up to 20 years, or both. Under the AECA, civil violations of State’s export controls may result in a fine of up to $500,000 but, according to State officials, can be much higher based on inflation under the Federal Civil Penalties Inflation Adjustment Act of 1990, as amended. State told us that actual civil penalties for civil violations in 2018 ranged from $824,959 to $1,134,602. By contrast, the ECRA set the penalty for civil violations of Commerce’s export controls at up to $300,000 or twice the value of the transaction that is the basis of the violation, whichever is of greater value. According to Commerce officials, this can substantially increase the monetary penalty for civil violations. Criminal violations of either State’s or Commerce’s export control laws may result in prohibiting the violator from involvement in future exports of controlled items. The AECA also precludes the issuance of State licenses to persons convicted of violating certain federal laws, such as the Foreign Corrupt Practices Act. Similarly, Commerce can deny the export privileges, including the ability to obtain a license, of companies and individuals for a period of 10 years from the date of conviction for violating certain federal laws. This prohibition can be expanded to include other related parties, such as those connected with the denied person by virtue of affiliation, ownership, or control. Agencies with responsibility for export control enforcement can vary depending on whether items are controlled by State or Commerce. According to DHS officials, ICE has jurisdiction to investigate potential export control violations and U.S. Customs and Border Protection has primary enforcement responsibility for export control violations at the border, seaports, and airports. The Federal Bureau of Investigation (FBI) can also investigate these cases involving items controlled by either State or Commerce. According to Commerce, the Office of Export Enforcement in BIS has over 100 special agents in U.S.-based field offices authorized to investigate potential violations of Commerce’s export control laws. These investigative resources would be available, in addition to DHS and FBI, to address illegal firearms trafficking if the proposed transfer is implemented, according to Commerce officials. State expects to lose revenue from registration fees if the proposed transfer of firearms, artillery, and ammunition to Commerce is implemented. State estimates in its proposed rule that the transfer would result in about 10,000 fewer license applications per year for Category I- III items—a reduction of about 26 percent from the 38,862 applications that State processed in fiscal year 2017. State estimates a recurring annual registration fee revenue loss of about $2.5 million, according to its proposed rule. State officials told us, if the proposed rules become final, there would be additional revenue declines from an uncertain drop in the number of registrants that State cannot estimate. They explained that because many manufacturers and exporters would likely be involved in items controlled by State as well as Commerce, they would still need to register with State. Others involved only in items moving to Commerce would no longer have to register with State. For example, according to State officials, a manufacturer of both semi-automatic weapons that the proposed rules identify for transfer to the CCL and fully automatic weapons that would stay on the USML would still be required to register with State, if the proposed rules are finalized. State officials noted that the decline in the number of license applications resulting from previous transfers of items from the USML to the CCL has not produced a proportional decline in registration revenue. According to data provided by State, registration revenue has dropped less than 25 percent from about $47 million in fiscal year 2013 to about $36 million in fiscal year 2017, while the number of export license applications has dropped more than 50 percent from about 83,000 to almost 39,000. With the decline in license workload that State expects would result if the proposed rules are finalized, State officials told us that four contractors currently responsible for reviewing licenses for firearms and ammunition in DDTC could be moved to other teams with vacancies in order to review licenses for other controlled items. On the other hand, State’s Bureau of International Security and Nonproliferation (ISN), which has lead responsibility at State for reviewing Commerce licenses for items transferring from the USML to the CCL, expects to see an increase in its workload. An ISN official told us his bureau could potentially need an additional 2.5 full-time equivalent staff to review items transferred to the CCL as part of Commerce’s interagency review process. Commerce estimates in its proposed rule that it would gain 6,000 additional license applications from the proposed transfer—an increase of about 18 percent above the 34,142 license applications it reviewed in fiscal year 2017. Commerce officials told us that the increased workload to review license applications will also create more work for some related activities. For example, Commerce expects the number of investigative leads and export enforcement investigations to include more firearms- related actions. However, Commerce officials told us they have not estimated the magnitude of these changes. Commerce officials told us they believe they have enough resources to absorb the increase in workload. They noted that they have flexibility to shift license review staff to meet demand created by the additional licenses, if necessary. In addition, BIS received an 18 percent increase in full-time equivalent staff positions, from 367 to 432, in fiscal year 2018. This increase was in response to workload demands created by previous transfers of items from the USML to the CCL, according to Commerce officials. Commerce officials told us that they will continue to assess workload data after the proposed transfer is implemented to determine whether they have adequate staff levels to meet increased workload demands. If finalized, the proposed rules to transfer certain firearms, artillery, and ammunition from Categories I-III of the USML to the CCL would apply Commerce’s export control system to these items instead of State’s. However, critical information needed to effectively screen applicants and target licenses for end-use monitoring may be unavailable to Commerce unless State shares its watch list data. Further, because State has been responsible for export controls of firearms, artillery, and ammunition, its watch list is more likely than Commerce’s to include derogatory information collected from past screening and end-use monitoring related to exports of these items, according to Commerce officials. While State and Commerce officials said that they have held discussions regarding how to share relevant information from their internal watch lists, as of February 2019, they had not reached any agreement on how to share watch lists if the proposed rules are finalized. Without such an agreement or process to share State’s watch list, Commerce may lack critical information needed to ensure that items proposed for transfer are used as intended and by legitimate end-users. We are making a total of two recommendations, including one to State and one to Commerce. If responsibility for controlling the exports of certain firearms, artillery, and ammunition is transferred from State to Commerce, the Secretary of State should ensure that the Under Secretary of State for Arms Control and International Security Affairs develops a process for sharing State’s internal watch list with Commerce to enhance oversight of these items. (Recommendation 1) If responsibility for controlling the exports of certain firearms, artillery, and ammunition is transferred from State to Commerce, the Secretary of Commerce should ensure that the Under Secretary of Commerce for Industry and Security develops a process for receiving State’s internal watch list and integrating it into Commerce’s licensing review process to enhance oversight of these items. (Recommendation 2) We provided a draft of this report to State, Commerce, DOD, DHS, and DOJ for review and comment. In their written comments, reproduced in appendixes III and IV, State and Commerce agreed with our recommendations. Commerce provided some minor revisions to the recommendation, which we incorporated. DOD, DHS, and DOJ did not provide written comments. In addition, State, Commerce, and DOJ provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretaries of State, Commerce, Defense, and Homeland Security; and the Attorney General of the United States. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Our objectives were to assess (1) the volume and value of commercial export license applications State Department (State) reviewed for firearms, artillery, and ammunition—Categories I-III of the U.S. Munitions List (USML)—in fiscal years 2013-2017, (2) how certain export controls differ between State and Commerce, and (3) what is known about the resource implications for State and Commerce due to the proposed transfer. To assess the volume and value of export license applications for USML Category I-III firearms, artillery, and ammunition that State reviewed during fiscal years 2013 to 2017, we obtained data from the interagency export licensing database, USXPORTS. USXPORTS is the system of record for all munitions and dual-use export license applications and adjudications, and is maintained by the Defense Technology Security Administration, within the Department of Defense (DOD). The data on USXPORTS originates from private companies applying for export licenses which, in the case of munitions, State is responsible for adjudicating. The agencies use this database to review and adjudicate applications, and also to report back to the applicants. We interviewed officials from State’s Directorate of Defense Trade Controls (DDTC) in State’s Bureau of Political and Military Affairs to understand the data and identify any limitations on how we use them. We analyzed the data to describe the number and reported value of export license applications, the USML items in the applications, and the reported destination country, among other characteristics. We assessed these data and found them to be sufficiently reliable for the purpose of conducting these analyses, but recognized that approved applications may not necessarily result in actual exports. We also noted some minor data limitations in our report, such as the fact that amendments to export license applications are not associated with destination countries. We did not independently audit the underlying data submitted to DDTC by private companies. To analyze how certain export controls differ between State and Commerce, we reviewed the departments’ proposed rules, relevant laws and regulations, agency guidance, and annual reports related to State’s and Commerce’s export controls. We also interviewed officials from Commerce’s Bureau of Industry and Security; DDTC; State’s Bureau of Democracy, Human Rights and Labor; State’s Bureau of International Security and Nonproliferation; Immigration and Customs Enforcement and U.S. Customs and Border Protection in the Department of Homeland Security; and the Defense Technology Security Administration. We sought to present differences between State’s and Commerce’s export controls that are potentially relevant for items proposed for transfer from the USML to the CCL, rather than every possible distinction between the two departments’ export control systems. To describe the number of export license applications for firearms, artillery, and ammunition that required congressional notification, we reviewed the licensing data from the USXPORTS database. To describe the end-use monitoring conducted on exports of firearms, artillery, and ammunition, we extracted data from State’s Defense Trade Application database and interviewed agency officials to understand the data. We analyzed the data by the number of checks per year, the proportion of pre-license checks to post- shipment checks, the countries where the checks were conducted, and the outcome of the checks. We assessed these data and found them to be sufficiently reliable for these purposes. To assess what is known about the resource implications for State and Commerce due to the proposed transfer, we held discussions with State and Commerce officials, and reviewed annual budget documents and other agency reports. To better understand State’s estimated reduction of 10,000 license applications per year and Commerce’s estimated gain of 6,000 licenses that would result from the proposed transfer of items from the USML to the CCL, we reviewed State’s fiscal year 2013-2017 export license data and the proposed rules. We also discussed the estimates with agency officials. Commerce officials told us that their estimate was fairly broad, based on State’s estimate and their knowledge and experience of differences between the two agencies’ license requirements that account for the difference between the two estimates. We were not able to independently assess the accuracy of either estimate because the license data we collected from State were not disaggregated to identify which items on license applications would be transferring to the CCL under the proposed rules and which would be staying on the USML. Each State license application can involve multiple items across multiple USML Sub-Categories. We also reviewed the number of full-time equivalent staff responsible for export control activities and State’s annual revenue from registration fees paid by manufacturers, exporters, and brokers involved in items on the USML. We discussed State’s registration data with agency officials and while we assessed these data as sufficiently reliable for descriptive purposes, we also determined that these data could not be used to generate reliable estimates about the resource implications for the Department of State because there was no clear pattern in the relationship between applications, registrants, and revenue in the data provided. We conducted this performance audit from February 2018 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Defense articles and services subject to export controls under the Department of State’s jurisdiction are listed in the 21 categories of the United States Munitions List (USML). Table 3 shows the 21 USML categories and the dates of rule changes under export control reform that transferred certain items within these categories to the Commerce Control List (CCL). The CCL is divided into ten broad categories and each category is further subdivided into five product groups (see table 4). In addition to the individual named above, Drew Lindsey (Assistant Director), Howard Cott (Analyst in Charge), Ashley Alley, Martin de Alteriis, Neil Doherty, Adam Peterson, and Aldo Salerno made significant contributions to this report.", "summary": "The U.S. government implements an export control system to manage risks associated with exporting sensitive items while facilitating legitimate trade. State currently controls the export of most firearms, artillery, and ammunition. Regulatory changes proposed by State and Commerce would transfer this responsibility for many of these items to Commerce, which implements export controls under different legal and regulatory authorities. The proposed changes are part of a larger export control reform effort since 2010 to transfer control of less sensitive items from State to Commerce. GAO was asked to review the proposed changes to export controls of firearms, artillery, and ammunition. This report assesses (1) the volume and value of commercial export license applications State reviewed for these items in fiscal years 2013-2017, (2) how certain export controls differ between State and Commerce, and (3) what is known about the resource implications for State and Commerce due to the proposed transfer. GAO reviewed the proposed rules and related laws and regulations; analyzed data and documents related to licensing, end-use monitoring, and staff resources; and interviewed agency officials. The Department of State (State) reviewed approximately 69,000 commercial export license applications for firearms, artillery, and ammunition valued at up to $45.4 billion during fiscal years 2013 to 2017. About two-thirds of these applications were for firearms, and the majority involved the export of non-automatic and semi-automatic firearms, which are among the items proposed for transfer from State to Department of Commerce (Commerce) control. GAO identified several differences in Commerce's and State's export controls including those related to registration, licensing, end-use monitoring, and congressional notification that, according to the agencies, would apply to firearms, artillery, and ammunition proposed for transfer. Some of these differences are due to varying requirements in applicable laws and regulations. For example, the law requires manufacturers, exporters, and brokers to register with State for items controlled by State but not for items controlled by Commerce. Additionally, while Commerce and State both screen parties to licenses against relevant watch lists, Commerce officials said they do not have direct access to State's internal watch list, which contains derogatory information from past screening of licenses for firearms, artillery, and ammunition exports. State and Commerce officials stated that, while they have held some discussions, they have not established a process for sharing watch list information. Without access to State's watch list, Commerce may lack critical information to effectively screen parties to exports of firearms and related items. State and Commerce also both have end-use monitoring programs to confirm the legitimacy of end-users but some differences exist. For example, State relies on embassy staff to conduct end-use monitoring whereas Commerce relies primarily on several officers positioned overseas specifically for this purpose. In addition, a statutory requirement to notify Congress of proposed firearms exports over $1 million would no longer apply to firearms that transfer from State to Commerce, according to Commerce officials. According to the proposed rules and agency officials, the proposed transfer, if finalized, would result in a decline in licenses and revenues for State and an increase in licenses for Commerce, but the precise extent of these changes is unknown. State estimates that the transfer would result in a decline in revenue from registration fees but officials stated it is difficult to predict the extent of this decline. Commerce officials stated that they expected their licensing and enforcement workload to increase as a result of the transfer, if finalized, but they believe they have sufficient staff resources available to absorb the increase. GAO recommends that if the proposed regulatory changes become final, State and Commerce develop a process for sharing State's internal watch list with Commerce to enhance oversight of firearms, artillery, and ammunition exports. State and Commerce agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Federal agencies conduct a variety of procurements that are reserved for small business participation through small business set-asides. These set-asides can be for small businesses in general, or they can be specific to small businesses that meet additional eligibility requirements in the Service-Disabled Veteran-Owned Small Business, Historically Underutilized Business Zone (HUBZone), 8(a) Business Development (8(a)), and WOSB programs. The WOSB program enables federal contracting officers to identify and establish a sheltered market, or set- aside, for competition among women-owned small businesses (WOSB) and economically disadvantaged women-owned small businesses (EDWOSB) in certain industries. WOSBs can receive set-asides in industries in which SBA has determined that women-owned small businesses are substantially underrepresented. To determine these industries, SBA is required to conduct a study to determine which North American Industry Classification System (NAICS) codes are eligible under the program and to report on such studies every 5 years. Additionally, businesses must be at least 51 percent owned and controlled by one or more women who are U.S. citizens to participate in the WOSB program. The owner must provide documents demonstrating that the business meets program requirements, including a document in which the owner attests to the business’s status as a WOSB or EDWOSB. According to SBA, as of early October 2018, there were 13,224 WOSBs and 4,488 EDWOSBs registered in SBA’s online certification database. SBA’s Office of Government Contracting administers the WOSB program by, among other things, promulgating regulations and conducting eligibility examinations of businesses that receive contracts under a WOSB or EDWOSB set-aside. According to SBA, as of October 2018, there were two full-time staff within the Office of Government Contracting whose primary responsibility was the WOSB program. Initially, the program’s statutory authority allowed WOSBs to be self- certified by the business owner or certified by an approved third-party national certifying entity as eligible for the program. Self-certification is free, but some third-party certification options require businesses to pay a fee. Each certification process requires businesses to provide signed representations attesting to their WOSB or EDWOSB eligibility. Businesses must provide documents supporting their status before submitting an offer to perform the requirements of a WOSB set-aside contract. In August 2016, SBA launched certify.sba.gov, which is an online portal that allows firms participating in the program to upload required documents and track their submission and also enables contracting officers to review firms’ eligibility documentation. According to the Federal Acquisition Regulation, contracting officers are required to verify that all required documentation is present in the online portal when selecting a business for an award. In addition, businesses must register and attest to being a WOSB in the System for Award Management, the primary database of vendors doing business with the federal government. In 2011, SBA approved four organizations to act as third-party certifiers. According to SBA data, these four third-party certifiers completed a total of about 3,400 certifications in fiscal year 2017. In 2014 we reviewed the WOSB program and found a number of deficiencies in SBA’s oversight of the four SBA-approved third-party certifiers and in SBA’s eligibility examination processes, and we made related recommendations for SBA. In addition, in 2015 and 2018 the SBA Office of Inspector General (OIG) reviewed the WOSB program and also found oversight deficiencies, including evidence of WOSB contracts set aside for ineligible firms. In both reports, the SBA OIG also made recommendations for SBA. Further, in July 2015, we issued GAO’s fraud risk framework, which provides a comprehensive set of key components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. As of early May 2019, SBA had implemented one of the three changes that the 2015 NDAA made to the WOSB program—sole-source authority. The two other changes—authorizing SBA to implement its own certification process for WOSBs and requiring SBA to eliminate the WOSB self-certification option—had not been implemented. The 2015 NDAA did not require a specific time frame for SBA to update its regulations. SBA officials have stated that the agency will not eliminate self-certification until the new certification process for the WOSB program is in place, which they expect to be completed by January 1, 2020. In September 2015, SBA published a final rule to implement sole-source authority for the WOSB program (effective October 2015). Among other things, the rule authorized contracting officers to award a contract to a WOSB or EDWOSB without competition, provided that the contracting officer’s market research cannot identify two or more WOSBs or EDWOSBs in eligible industries that can perform the requirements of the contract at a fair and reasonable price. In the final rule, SBA explained that it promulgated the sole-source rule before the WOSB certification requirements for two reasons. First, the sole-source rule could be accomplished by simply incorporating the statutory language into the regulations, whereas the WOSB certification requirements would instead require a prolonged rulemaking process. Second, SBA said that addressing all three regulatory changes at the same time would delay the implementation of sole-source authority. As of early May 2019, SBA had not published a proposed rule for public comment to establish a new certification process for the WOSB program. Previously, in October 2017, an SBA official stated that SBA was about 1–2 months away from publishing a proposed rule. However, in June 2018, SBA officials stated that a cost analysis would be necessary before the draft rule could be sent to the Office of Management and Budget for review. In response to the SBA OIG recommendation that SBA implement the new certification process, SBA stated that it would implement a new certification process by January 1, 2020. Further, in June 2018, SBA officials told us that they were evaluating the potential costs of a new certification program as part of their development of the new certification rule. On May 3, 2019, SBA officials explained that they expected to publish the proposed rule within a few days. In December 2015, SBA published an advance notice of proposed rulemaking to solicit public comments to assist the agency with drafting a proposed rule to implement a new WOSB certification program. In the notice, SBA stated that it intends to address the 2015 NDAA changes, including eliminating the self-certification option, through drafting regulations to implement a new certification process. The advance notice requested comments on various topics, such as how well the current certification processes were working, which of the certification options were feasible and should be pursued, whether there should be a grace period for self-certified WOSB firms to complete the new certification process, and what documentation should be required. Three third-party certifiers submitted comments in response to the advance notice of proposed rulemaking, and none supported the option of SBA acting as a WOSB certifier. One third-party certifier commented that such an arrangement is a conflict of interest given that SBA is also responsible for oversight of the WOSB program, and two certifiers commented that SBA lacked the required resources. The three third-party certifiers also asserted in their comments that no other federal agency should be allowed to become an authorized WOSB certifier, with one commenting that federal agencies should instead focus on providing contracting opportunities for women-owned businesses. All three certifiers also proposed ways to improve the current system of third-party certification—for example, by strengthening oversight of certifiers or expanding their number. The three certifiers also suggested that SBA move to a process that better leverages existing programs with certification requirements similar to those of the WOSB program, such as the 8(a) program. In the advance notice, SBA asked for comments on alternative certification options, such as SBA acting as a certifier or limiting WOSB program certifications to the 8(a) program and otherwise relying on state or third-party certifiers. SBA has not fully addressed deficiencies we identified in our October 2014 report, and these recommendations remain open. First, we reported that SBA did not have formal policies for reviewing the performance of its four approved third-party certifiers, including their compliance with their agreements with SBA. Further, we found that SBA had not developed formal policies and procedures for, among other things, reviewing the monthly reports that certifiers submit to SBA. As a result, we recommended that SBA establish comprehensive procedures to monitor and assess the performance of the third-party certifiers in accordance with their agreements with SBA and program regulations. In response to our October 2014 recommendation, in 2016 SBA conducted compliance reviews of the four SBA-approved third-party certifiers. The compliance reviews included an assessment of the third- party certifiers’ internal certification procedures and processes, an examination of a sample of applications from businesses that the certifiers deemed eligible and ineligible for certification, and an interview with management staff. SBA officials said that SBA’s review team did not identify significant deficiencies in any of the four certifiers’ processes and found that all were generally complying with their agreements. However, one compliance review report described “grave concerns” that a third- party certifier had arbitrarily established eligibility requirements that did not align with WOSB program regulations and used them to decline firms’ applications. SBA noted in the report that if the third-party certifier failed to correct this practice, SBA could terminate the agreement. As directed by SBA, the third-party certifier submitted a letter to SBA outlining actions it had taken to address this issue, among others. In January 2017, SBA’s Office of Government Contracting updated its written Standard Operating Procedures (SOP) to include policies and procedures for the WOSB program, in part to address our October 2014 recommendation. The 2017 SOP discusses what a third-party-certifier compliance review entails, how often the reviews are to be conducted, and how findings are to be reported. The 2017 SOP notes that SBA may initiate a compliance review “at any time and as frequently as the agency determines is necessary.” In March 2019, SBA provided an updated SOP, which includes more detailed information on third-party compliance reviews, such as how SBA program analysts should prepare for the review. However, the updated SOP does not provide specific time frames for how frequently the compliance reviews are to be conducted. In addition, in April 2018, SBA finalized a WOSB Program Desk Guide that discusses how staff should prepare for a compliance review of a third-party certifier, review certification documents, and prepare a final report. In March 2019, SBA provided GAO with an updated WOSB Program Desk Guide that contains information comparable to that in the 2018 version. Both Desk Guides do not describe specific activities designed to oversee third-party certifiers on an ongoing basis. Per written agreements with SBA, third-party certifiers are required to submit monthly reports that include the number of WOSB and EDWOSB applications received, approved, and denied; identifying information for each certified business, such as the business name; concerns about fraud, waste, and abuse; and a description of any changes to the procedures the organizations used to certify businesses as WOSBs or EDWOSBs. In our October 2014 report, we noted that SBA had not followed up on issues raised in the monthly reports and had not developed written procedures for reviewing them. At that time, SBA officials said that they were unaware of the issues identified in the certifiers’ reports and that the agency was developing procedures for reviewing the monthly reports but could not estimate a completion date. In interviews for our March 2019 report, SBA officials stated that SBA still does not use the third-party certifiers’ monthly reports to regularly monitor the program. Specifically, SBA does not review the reports to identify any trends in certification deficiencies that could inform program oversight. Officials said the reports generally do not contain information that SBA considers helpful for overseeing the WOSB program, but staff sometimes use the reports to obtain firms’ contact information. SBA’s updated 2019 SOP includes information on reviews of third-party certifier monthly reports, but it does not contain information on how staff would analyze the reports or how these reports would inform SBA’s oversight of third-party certifiers and related compliance activities, such as eligibility examinations. On May 3, 2019, SBA officials stated that, earlier in the week, they had initiated monthly meetings with the third-party certifiers. SBA officials explained that they intended to continue holding these monthly meetings to discuss best practices and potential issues related to the approval and disapproval of firms and to improve collaboration. Although SBA has taken steps to enhance its written policies and procedures for oversight of third-party certifiers, it does not have plans to conduct further compliance reviews of the certifiers and does not intend to review certifiers’ monthly reports on a regular basis in a way that would inform its oversight activities. SBA officials said that third-party certifier oversight procedures would be updated, if necessary, after certification options have been clarified in the final WOSB certification rule. However, ongoing oversight activities, such as regular compliance reviews, could help SBA better understand the steps certifiers have taken in response to previous compliance review findings and whether those steps have been effective. In addition, leading fraud risk management practices include identifying specific tools, methods, and sources for gathering information about fraud risks, including data on trends from monitoring and detection activities, as well as involving relevant stakeholders in the risk assessment process. Without procedures to regularly monitor and oversee third-party certifiers, SBA cannot provide reasonable assurance that certifiers are complying with program requirements and cannot improve its efforts to identify ineligible firms or potential fraud. Further, it is unclear when SBA’s final rule will be implemented. As a result, we maintain that our previous recommendation should be addressed—that is, that the Administrator of SBA should establish and implement comprehensive procedures to monitor and assess the performance of certifiers in accordance with the requirements of the third-party certifier agreement and program regulations. SBA also has not fully addressed deficiencies we identified in our October 2014 report related to eligibility examinations. We found that SBA lacked formalized guidance for its eligibility examination processes and that the examinations identified high rates of potentially ineligible businesses. As a result, we recommended that SBA enhance its examination of businesses that register for the WOSB program to ensure that only eligible businesses obtain WOSB set-asides. Specifically, we suggested that SBA should take actions such as (1) completing the development of procedures to conduct annual eligibility examinations and implementing such procedures; (2) analyzing examination results and individual businesses found to be ineligible to better understand the cause of the high rate of ineligibility in annual reviews and determine what actions are needed to address the causes, and (3) implementing ongoing reviews of a sample of all businesses that have represented their eligibility to participate in the program. SBA has taken some steps to implement our recommendation, such as including written policies and procedures for WOSB program eligibility examinations in an SOP and a Desk Guide. However, SBA does not collect reliable information on the results of its annual eligibility examinations. According to SBA officials, SBA has conducted eligibility examinations of a sample of businesses that received WOSB program set-aside contracts each year since fiscal year 2012. However, SBA officials told us that the results of annual eligibility examinations—such as the number of businesses found eligible or ineligible—are generally not documented. As a result, we obtained conflicting data from SBA on the number of examinations completed and the percentage of businesses found to be ineligible in fiscal years 2012 through 2018. For example, based on previous information provided by SBA, we reported in October 2014 that in fiscal year 2012, 113 eligibility examinations were conducted and 42 percent of businesses were found to be ineligible for the WOSB program. However, during our more recent review, we received information from SBA indicating that 78 eligibility examinations were conducted and 37 percent of businesses were found ineligible in fiscal year 2012. In addition, SBA continues to have no mechanism to look across examinations for common eligibility issues to inform the WOSB program. As we noted in 2014, by not analyzing examination results broadly, the agency is missing opportunities to obtain meaningful insights into the program, such as the reasons many businesses are deemed ineligible. Further, SBA still conducts eligibility examinations only of firms that have already received a WOSB award. In our October 2014 report, we concluded that this sampling practice restricts SBA’s ability to identify potentially ineligible businesses prior to a contract award. SBA officials said that while some aspects of the sample characteristics have changed since 2012, the samples still generally consist only of firms that have been awarded a WOSB set-aside. Restricting the samples in this way limits SBA’s ability to better understand the eligibility of businesses before they apply for and are awarded contracts, as well as its ability to detect and prevent potential fraud. We recognize that SBA has made some effort to address our previous recommendation by documenting procedures for conducting annual eligibility examinations of WOSB firms. However, leading fraud risk management practices state that federal program managers should design control activities that focus on fraud prevention over detection and response, to the extent possible. Without maintaining reliable information on the results of eligibility examinations, developing procedures for analyzing results, and expanding the sample of businesses to be examined to include those that did not receive contracts, SBA limits the value of its eligibility examinations and its ability to reduce ineligibility among businesses registered to participate in the WOSB program. These deficiencies also limit SBA’s ability to identify potential fraud risks and develop any additional control activities needed to address these risks. As a result, the program may continue to be exposed to the risk of ineligible businesses receiving set-aside contracts. In addition, in light of these continued deficiencies, the implementation of sole-source authority without addressing the other changes made by the 2015 NDAA could increase program risk. For these reasons, we maintain that our previous recommendation that SBA enhance its WOSB eligibility examination procedures should be addressed. SBA has also not addressed previously identified issues with WOSB set- asides awarded under ineligible industry codes. In 2015 and 2018, the SBA OIG reported instances in which WOSB set-asides were awarded using NAICS codes that were not eligible under the WOSB program, and our analysis indicates that this problem persists. Specifically, our analysis of data from the Federal Procurement Data System–Next Generation (FPDS–NG) on all obligations to WOSB program set-asides from the third quarter of fiscal year 2011 through the third quarter of fiscal year 2018 found the following: 3.5 percent (or about $76 million) of WOSB program obligations were awarded under NAICS codes that were never eligible for the WOSB program; 10.5 percent (or about $232 million) of WOSB program obligations made under an EDWOSB NAICS code went to women-owned businesses that were not eligible to receive awards in EDWOSB- eligible industries; and 17 of the 47 federal agencies that obligated dollars to WOSB program set-asides during the period used inaccurate NAICS codes in at least 5 percent of their WOSB set-asides (representing about $25 million). According to SBA officials we spoke with, WOSB program set-asides may be awarded under ineligible NAICS codes because of human error when contracting officers are inputting data in FPDS–NG or because a small business contract was misclassified as a WOSB program set-aside. Rather than review FPDS–NG data that are inputted after the contract is awarded, SBA officials said that they have discussed options for working with the General Services Administration to add controls defining eligible NAICS codes for WOSB program set-aside opportunities on FedBizOpps.gov—the website that contracting officers use to post announcements about available federal contracting opportunities. However, SBA officials said that the feasibility of this option was still being discussed and that the issue was not a high priority. Additionally, as of November 2018, the WOSB program did not have targeted outreach or training that focused on specific agencies’ use of NAICS codes, and SBA officials did not identify any targeted outreach or training provided to specific agencies to improve understanding of WOSB NAICS code requirements (or other issues related to the WOSB program). On May 6, 2019, an SBA official provided information that SBA has initiated a review to determine federal agencies’ use of ineligible NAICS codes and that SBA plans to share the findings with agencies and also provide training to procurement center representatives. Congress authorized SBA to develop a contract set-aside program specifically for WOSBs and EDWOSBs to address the underrepresentation of such businesses in specific industries. In addition, federal standards for internal control state that management should design control activities to achieve objectives and respond to risks, and that management should establish and operate monitoring activities to monitor and evaluate the results. Because SBA does not review whether contracts are being awarded under the appropriate NAICS codes, it cannot provide reasonable assurance that WOSB program requirements are being met or identify agencies that may require targeted outreach or additional training on eligible NAICS codes. As a result, WOSB contracts may continue to be awarded to groups other than those intended, which can undermine the goals of and confidence in the program. While federal contract obligations to all women-owned small businesses and WOSB program set-asides have increased since fiscal year 2012, WOSB program set-asides remain a small percentage. Specifically, federal dollars obligated for contracts to all women-owned small businesses increased from $18.2 billion in fiscal year 2012 to $21.4 billion in fiscal year 2017. Contracts awarded to all women-owned small businesses within WOSB-program-eligible industries also increased during this period—from about $15 billion to $18.8 billion, as shown in figure 1. However, obligations under the WOSB program represented only a small share of this increase. In fiscal year 2012, WOSB program contract obligations were 0.5 percent of contract obligations to all women- owned small businesses for WOSB-program-eligible goods or services (about $73.5 million), and in fiscal year 2017 this percentage had grown to 3.8 percent (about $713.3 million) (see fig. 1). In summary, the WOSB program aims to enhance federal contracting opportunities for women-owned small businesses. However, as of early May 2019, SBA had not fully implemented comprehensive procedures to monitor the performance of the WOSB program’s third-party certifiers and had not taken steps to provide reasonable assurance that only eligible businesses obtain WOSB set-aside contracts, as recommended in our 2014 report. Without ongoing monitoring and reviews of third-party certifier reports, SBA cannot ensure that certifiers are fulfilling their requirements, and it is missing opportunities to gain information that could help improve the program’s processes. Further, limitations in SBA’s procedures for conducting and analyzing eligibility examinations inhibit its ability to better understand the eligibility of businesses before they apply for and potentially receive contracts, which exposes the program to unnecessary risk of fraud. Also, since SBA does not expect to finish implementing the changes in the 2015 NDAA until January 1, 2020, these continued oversight deficiencies increase program risk. As a result, we maintain that our previous recommendations should be addressed. In addition, SBA has not addressed deficiencies related to WOSB program set-asides being awarded under ineligible industry codes. Although SBA has updated its training and outreach materials for the WOSB program to address NAICS code requirements, it has not developed a process for periodically reviewing FPDS–NG data, and has yet to provide targeted outreach or training to agencies that may be using ineligible codes. As a result, SBA is not aware of the extent to which individual agencies are following program requirements and which agencies may require targeted outreach or additional training. Reviewing FPDS–NG data would allow SBA to identify those agencies (and contracting offices within them) that could benefit from such training. Without taking these additional steps, SBA cannot provide reasonable assurance that WOSB program requirements are being met. As such, we made one recommendation in our March 2019 report to SBA. We recommended that SBA develop a process for periodically reviewing FPDS–NG data to determine the extent to which agencies are awarding WOSB program set-asides under ineligible NAICS codes, and take steps to address any issues identified, such as providing targeted outreach or training to agencies making awards under ineligible codes. As of May 2019, this recommendation remains open. Chairman Golden, Ranking Member Stauber, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact William Shear, Director, Financial Markets and Community Investment at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Andrew Pauline (Assistant Director), Tarek Mahmassani (Analyst in Charge), and Jennifer Schwartz. Other staff who made key contributions to the report cited in the testimony were Allison Abrams, Pamela Davidson, Jonathan Harmatz, Tiffani Humble, Julia Kennon, Rebecca Shea, Jena Sinkfield, Tyler Spunaugle, and Tatiana Winger. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In 2000, Congress authorized the WOSB program, allowing contracting officers to set aside procurements to women-owned small businesses in industries in which they are substantially underrepresented. To be eligible to participate in the WOSB program, firms have the option to self-certify or be certified by a third-party certifier. However, the 2015 NDAA changed the WOSB program by (1) authorizing SBA to implement sole-source authority, (2) eliminating the option for firms to self-certify as being eligible for the program, and (3) allowing SBA to implement a new certification process. This testimony is based on a report GAO issued in March 2019 ( GAO-19-168 ). For that report, GAO examined (1) the extent to which SBA has addressed the 2015 NDAA changes, (2) SBA's efforts to address previously identified deficiencies, and (3) use of the WOSB program. GAO reviewed relevant laws, regulations, and program documents; analyzed federal contracting data from April 2011 through June 2018; and interviewed SBA officials, officials from contracting agencies selected to obtain a range of experience with the WOSB program, and the three (out of four) private third-party certifiers that agreed to meet with GAO. The Small Business Administration (SBA) has implemented one of the three changes to the Women-Owned Small Business (WOSB) program authorized in the National Defense Authorization Act of 2015 (2015 NDAA). In September 2015 SBA published a final rule to implement sole-source authority (to award contracts without competition), effective October 2015. As of early May 2019, SBA had not eliminated the option for program participants to self-certify that they are eligible to participate, as required by the 2015 NDAA. SBA officials stated that the agency intended to address the third change made by the 2015 NDAA (meaning implement a new certification process for the WOSB program). SBA has not addressed WOSB program oversight deficiencies and recommendations in GAO's 2014 report ( GAO-15-54 ). For example, GAO recommended that SBA establish procedures to assess the performance of four third-party certifiers—private entities approved by SBA to certify the eligibility of WOSB firms. While SBA generally agreed with GAO's recommendations and conducted a compliance review of the certifiers in 2016, it has no plans to regularly monitor their performance. By not improving its oversight, SBA is limiting its ability to ensure third-party certifiers are following program requirements. Further, the implementation of sole-source authority in light of these continued oversight deficiencies can increase program risk. GAO maintains that its recommendations aimed at improving oversight should be addressed. In addition, GAO's March 2019 ( GAO-19-168 ) report found that about 3.5 percent of contracts using a WOSB set-aside were awarded for ineligible goods or services from April 2011 through June 2018. At that time, SBA was not reviewing contracting data that could identify which agencies may need targeted training. GAO recommended that SBA review such data to help address identified issues. In early May 2019, SBA said it had initiated such efforts. While federal contract obligations to all women-owned small businesses and WOSB program set-asides have increased since fiscal year 2012, WOSB program set-asides remain a small percentage (see figure). Note: Obligations to women-owned small businesses represent contract obligations to women-owned small businesses under WOSB-program-eligible North American Industry Classification System codes. FPDS-NG obligation amounts have been adjusted for inflation. GAO recommended in March 2019 that SBA develop a process for periodically reviewing the extent to which WOSB program set-asides are awarded for ineligible goods or services and use the results to address identified issues, such as through targeted outreach or training on the WOSB program. SBA agreed with the recommendation.", "document_type": "gao"}
{"report": "The LDA defines a lobbyist as an individual who is employed or retained by a client for compensation for services that include more than one lobbying contact (written or oral communication to covered officials, such as a high ranking agency official or a Member of Congress made on behalf of a client), and whose lobbying activities represent at least 20 percent of the time that he or she spends on behalf of the client during the quarter. Lobbying firms are persons or entities that have one or more employees who lobby on behalf of a client other than that person or entity. The LDA requires lobbyists to register with the Secretary of the Senate and the Clerk of the House, and to file quarterly reports disclosing their respective lobbying activities. Lobbyists are required to file their registrations and reports electronically with the Secretary of the Senate and the Clerk of the House through a single entry point. Registrations and reports must be publicly available in downloadable, searchable databases from the Secretary of the Senate and the Clerk of the House. No specific statutory requirements exist for lobbyists to generate or maintain documentation in support of the information disclosed in the reports they file. However, guidance issued by the Secretary of the Senate and the Clerk of the House recommends that lobbyists retain copies of their filings and documentation supporting reported income and expenses for at least 6 years after they file their reports. Figure 1 provides an overview of the registration and filing process. Lobbying firms are required to register with the Secretary of the Senate and the Clerk of the House for each client if the firms receive or expect to receive more than $3,000 in income from that client for lobbying activities. Lobbyists are also required to submit an LD-2 quarterly report for each registration filed. The LD-2s contain information that includes: the name of the lobbyist reporting on quarterly lobbying activities; the name of the client for whom the lobbyist lobbied; a list of individuals who acted as lobbyists on behalf of the client during the reporting period; whether any lobbyists served in covered positions in the executive or legislative branch, such as high-ranking agency officials or congressional staff positions, in the previous 20 years; codes describing general lobbying issue areas, such as agriculture and education; a description of the specific lobbying issues; houses of Congress and federal agencies lobbied during the reporting reported income (or expenses for organizations with in-house lobbyists) related to lobbying activities during the quarter (rounded to the nearest $10,000). The LDA requires lobbyists to report certain political contributions semiannually in the LD-203 report. These reports must be filed 30 days after the end of a semiannual period by each lobbying firm registered to lobby and by each individual listed as a lobbyist on a firm’s lobbying report. The lobbyists or lobbying firms must: list the name of each federal candidate or officeholder, leadership political action committee, or political party committee to which he or she contributed at least $200 in the aggregate during the semiannual period; report contributions made to presidential library foundations and presidential inaugural committees; report funds contributed to pay the cost of an event to honor or recognize an official who was previously in a covered position, funds paid to an entity named for or controlled by a covered official, and contributions to a person or entity in recognition of an official, or to pay the costs of a meeting or other event held by or in the name of a covered official; and certify that they have read and are familiar with the gift and travel rules of the Senate and House, and that they have not provided, requested, or directed a gift or travel to a Member, officer, or employee of Congress that would violate those rules. The LDA also requires that the Secretary of the Senate and the Clerk of the House guide and assist lobbyists with the registration and reporting requirements and develop common standards, rules, and procedures for LDA compliance. The Secretary of the Senate and the Clerk of the House review the guidance annually. It was last revised January 31, 2017, to (among other issues), revise the registration threshold to reflect changes in the Consumer Price Index, and clarify the identification of clients and covered officials and issues related to rounding income and expenses. The guidance provides definitions of LDA terms, elaborates on registration and reporting requirements, includes specific examples of different disclosure scenarios, and provides explanations of why certain scenarios prompt or do not prompt disclosure under the LDA. The offices of the Secretary of the Senate and the Clerk of the House told us they continue to consider information we report on lobbying disclosure compliance when they periodically update the guidance. In addition, they told us they email registered lobbyists quarterly on common compliance issues and reminders to file reports by the due dates. The Secretary of the Senate and the Clerk of the House, along with USAO, are responsible for ensuring LDA compliance. The Secretary of the Senate and the Clerk of the House notify lobbyists or lobbying firms in writing that they are not complying with the LDA reporting. Subsequently, they refer those lobbyists who fail to provide an appropriate response to USAO. USAO researches these referrals and sends additional noncompliance notices to the lobbyists or lobbying firms, requesting that they file reports or terminate their registration. If USAO does not receive a response after 60 days, it decides whether to pursue a civil or criminal case against each noncompliant lobbyist. A civil case could lead to penalties up to $200,000 for each violation, while a criminal case—usually pursued if a lobbyist’s noncompliance is found to be knowing and corrupt—could lead to a maximum of 5 years in prison. Generally, under the LDA, within 45 days of being employed or retained to make a lobbying contact on behalf of a client, the lobbyist must register by first filing an LD-1 form with the Secretary of the Senate and the Clerk of the House. Thereafter, the lobbyist must file quarterly disclosure (LD-2) reports that detail the lobbying activities, including filing a first report for the quarter in which the lobbyist registered. Of the 3,618 new registrations we identified for the third and fourth quarters of 2017 and the first and second quarters of 2018, we matched 3,329 of them (92.01 percent) to corresponding LD-2 reports filed within the same quarter as the registration. These results are consistent with the findings we have reported in prior reviews. We used the House lobbyists’ disclosure database as the source of the reports. We also used an electronic matching algorithm that allows for misspellings and other minor inconsistencies between the registrations and reports. Figure 2 shows lobbyists filed disclosure reports as required for most new lobbying registrations from 2010 through 2018. As part of their regular enforcement procedures, the Clerk of the House and the Secretary of the Senate are to follow up with newly filed registrations where quarterly reports were not filed. If the Clerk of the House and the Secretary of the Senate are unsuccessful in bringing the lobbyist into compliance, they may refer those cases to USAO as described earlier in figure 1. For selected elements of lobbyists’ LD-2 reports that can be generalized to the population of lobbying reports, our findings have generally been consistent from year to year. Most lobbyists reporting $5,000 or more in income or expenses provided written documentation to varying degrees for the reporting elements in their disclosure reports. Figure 3 shows that for most LD-2 reports, lobbyists provided documentation for income and expenses for sampled reports from 2010 through 2018, and our 2018 estimate does not represent a statistically significant change from 2017. Figure 4 shows that in 2018, 10 percent of lobbyists’ reported income or expenses differed by $10,000 or more. Additionally, for some LD-2 reports, lobbyists did not round their income or expenses as the guidance requires. In 2018, we estimate 20 percent of reports did not round reported income or expenses according to the guidance. We have found that rounding difficulties have been a recurring issue on LD-2 reports from 2010 through 2018. As we previously reported, several lobbyists who listed expenses told us that based on their reading of the LD-2 form, they believed they were required to report the exact amount. While this is not consistent with the LDA and the guidance, this may be a source of some of the confusion regarding rounding errors. In 2016, the guidance was updated to include an additional example about rounding expenses to the nearest $10,000. The LDA requires lobbyists to disclose lobbying contacts made with federal agencies on behalf of the client for the reporting period. This year, of the 99 LD-2 reports in our sample, 46 reports disclosed lobbying activities at federal agencies. Of those, lobbyists provided documentation for all disclosed lobbying activities at the federal agencies for 29 LD-2 reports. Figure 5 shows that lobbyists for most LD-2 reports provided documentation for selected elements of their LD-2 reports that include general issue area codes for lobbying activities, lobbying the House and the Senate, and individual lobbyists listed from 2010 through 2018. In 2017 and 2018, there was an improvement of compliance with documentation for lobbying the House and the Senate over the previous 7 years. Figure 6 shows that lobbyists for most lobbying firms filed contribution reports as required in our sample from 2010 through 2018. All individual lobbyists and lobbying firms reporting lobbying activity are required to file political contribution (LD-203) reports semiannually, even if they have no contributions to report, because they must certify compliance with the gift and travel rules. The LDA requires a lobbyist to disclose previously held covered positions in the executive or legislative branch, such as high-ranking agency officials and congressional staff, when first registering as a lobbyist for a new client. This can be done either on a new LD-1 or on the quarterly LD- 2 filing when added as a new lobbyist. This year, we estimate that 19 percent of all LD-2 reports may not have properly disclosed previously held covered positions as required. As in our other reports, some lobbyists were still unclear about the need to disclose certain covered positions, such as paid congressional internships or certain executive agency positions. Figure 7 shows the extent to which lobbyists may not have properly disclosed one or more covered positions as required from 2010 through 2018. Lobbyists amended 23 of the 99 LD-2 disclosure reports in our original sample to change previously reported information after we contacted them. Of the 23 reports, 10 were amended after we notified the lobbyists of our review, but before we met with them. An additional 13 of the 23 reports were amended after we met with the lobbyists to review their documentation. We consistently find a notable number of amended LD-2 reports in our sample each year following notification of our review. This suggests that sometimes our contact spurs lobbyists to more closely scrutinize their reports than they would have without our review. Table 1 lists reasons lobbying firms in our sample amended their LD-2 reports. As part of our review, we compared contributions listed on lobbyists’ and lobbying firms’ LD-203 reports against those political contributions reported in the Federal Election Commission (FEC) database to identify whether political contributions were omitted on LD-203 reports in our sample. The samples of LD-203 reports we reviewed contained 80 reports with contributions and 80 reports without contributions. We estimate that overall in 2018, lobbyists failed to disclose one or more reportable contributions on 33 percent of reports. Additionally, eight LD- 203 reports were amended in response to our review. Table 2 shows our results from 2010 to 2018; estimates in the table have a maximum margin of error of 11 percentage points. For this year’s review, the estimated change in the percent of LD-203 reports missing one or more FEC- reportable contributions was a statistically significant increase compared to each of the prior 9 years. As part of our review, we conducted interviews with 97 different lobbying firms in the 2018 sample of LD-2 disclosure reports. Consistent with prior reviews, most lobbying firms reported that they found it “very easy” or “somewhat easy” to comply with reporting requirements. Of the 97 different lobbying firms interviewed, 24 reported that the disclosure requirements were “very easy,” 61 reported them “somewhat easy,” and 11 reported them “somewhat difficult” or “very difficult.” One lobbying firm did not respond to this question (see figure 8). Most lobbying firms we surveyed rated the definitions of terms used in LD-2 reporting as “very easy” or “somewhat easy” to understand with regard to meeting their reporting requirements. This is consistent with prior reviews. Figure 9 shows what lobbyists reported as their ease of understanding the terms associated with LD-2 reporting requirements from 2012 through 2018. The U.S. Attorney’s Office for the District of Columbia (USAO) officials stated that they continue to have sufficient personnel resources and authority under the LDA to enforce reporting requirements. This includes imposing civil or criminal penalties for noncompliance. Noncompliance refers to a lobbyist’s or lobbying firm’s failure to comply with the LDA. However, USAO noted that due to attrition the number of the assigned personnel has changed from 2017 as indicated in table 3. USAO officials stated that lobbyists resolve their noncompliance issues by filing LD-2, LD-203, or LD-2 amendments, or by terminating their registration, depending on the issue. Resolving referrals can take anywhere from a few days to years, depending on the circumstances. During this time, USAO creates summary reports from its database to track the overall number of referrals that are pending or become compliant as a result of the lobbyist receiving an email, phone call, or noncompliance letter. Referrals remain in the pending category until they are resolved. The pending category is divided into the following areas: “initial research for referral,” “responded but not compliant,” “no response /waiting for a response,” “bad address,” and “unable to locate.” USAO officials noted that they attempt to review and update all pending cases every six months. USAO focuses its enforcement efforts primarily on the “responded but not compliant” and the “no response/waiting for a response” groups. Officials told us that, if after several attempts, it cannot contact the noncompliant firm or its lobbyist, it confers with both the Secretary of the Senate and the Clerk of the House to determine whether further action is needed. In the cases where the lobbying firm is repeatedly referred for not filing disclosure reports but does not appear to be actively lobbying, USAO suspends enforcement actions. USAO officials reported they will continue to monitor these firms and will resume enforcement actions if required. USAO received 3,798 referrals from both the Secretary of the Senate and the Clerk of the House for failure to comply with LD-2 reporting requirements cumulatively for filing years 2009 through 2018. Figure 10 shows the number and status of the referrals received, and the number of enforcement actions taken by USAO to bring lobbying firms into compliance. Enforcement actions include USAO attempts to bring lobbyists into compliance through letters, emails, and calls. About 40 percent (1,533 of 3,798) of the total referrals received are now compliant because lobbying firms either filed their reports or terminated their registrations. In addition, some of the referrals were found to be compliant when USAO received the referral, so no action was taken. This may occur when lobbying firms respond to the contact letters from the Secretary of the Senate and the Clerk of the House after USAO received the referrals. About 59 percent (2,250 of 3,798) of referrals are pending further action because USAO could not locate the lobbying firm, did not receive a response from the firm after an enforcement action, or plans to conduct additional research to determine if it can locate the lobbying firm. The remaining 15 referrals did not require action or were suspended because the lobbyist or client was no longer in business or the lobbyist was deceased. LD-203 referrals consist of two types: (1) LD-203(R) referrals represent lobbying firms that have failed to file LD-203 reports for their lobbying firm; and (2) LD-203 referrals represent the lobbyists at the lobbying firm who have failed to file their individual LD-203 reports as required. USAO received 2,629 LD-203(R) referrals from lobbying firms (cumulatively from 2009 through 2018) and 5,897 LD-203 referrals for individual lobbyists (cumulatively from 2009 through 2017) from the Secretary of the Senate and the Clerk of the House for noncompliance with reporting requirements). LD-203 referrals are more complicated than LD-2 referrals because both the lobbying firm and the lobbyists within the firm are each required to file an LD-203. Lobbyists employed by a lobbying firm typically use the firm’s contact information and not the lobbyists’ personal contact information. This makes it difficult to locate a lobbyist who is not in compliance and may have left the firm. In 2018, USAO officials confirmed that, while many firms have assisted USAO by providing contact information for lobbyists, they are not required to do so. According to officials, USAO has difficulty pursuing LD-203 referrals for lobbyists who have departed a firm without leaving forwarding contact information with the firm. While USAO utilizes web searches and online databases, including social media, to find these missing lobbyists, it is not always successful. Figure 11 shows the status of LD-203(R) lobbying firm referrals received and the number of enforcement actions taken by USAO to bring lobbying firms into compliance. About 42 percent (1,093 of 2,629) of the lobbying firms referred by the Secretary of the Senate and the Clerk of the House for noncompliance from calendar years 2009 through 2018 are now considered compliant because firms either filed their reports or terminated their registrations. About 58 percent (1,523 of 2,629) of the referrals are pending further action. The remaining 13 referrals did not require action or were suspended because the lobbyist or client was no longer in business or the lobbyist was deceased. USAO received 5,897 LD-203 individual lobbyists referrals from the Secretary of the Senate and the Clerk of the House for lobbyists who failed to comply with LD-203 reporting requirements for calendar years 2009 through 2017. Figure 12 shows the status of the referrals received and the number of enforcement actions taken by USAO to bring lobbyists into compliance. In addition, figure 12 shows that about 32 percent (1,880 of 5,897) of the lobbyists had come into compliance by filing their reports or no longer being registered as a lobbyist. About 68 percent (4,003 of 5,897) of the referrals are pending further action because USAO could not locate the lobbyist, did not receive a response from the lobbyist, or plans to conduct additional research to determine if it can locate the lobbyist. The remaining 14 referrals did not require action or were suspended because the lobbyist or client was no longer in business or the lobbyist was deceased. USAO received LD-203 referrals from the Secretary of the Senate and the Clerk of the House for 7,617 individual lobbyists who failed to comply with LD-203 reporting requirements for any filing year from 2009 through 2017. Figure 13 shows the status of compliance for individual lobbyists listed on referrals to USAO. About 36 percent (2,706 of 7,617) of the lobbyists had come into compliance by filing their reports or by not being registered as a lobbyist. About 65 percent (4,911 of 7,617) of the referrals are pending action because USAO could not locate the lobbyists, did not receive a response from the lobbyists, or plans to conduct additional research to determine if it can locate the lobbyists. USAO officials said that many of the pending LD-203 referrals represent lobbyists who no longer lobby for the lobbying firms affiliated with the referrals, even though these lobbying firms may be listed on the lobbyist’s LD-203 report. According to USAO officials, lobbyists and lobbying firms who repeatedly fail to file reports are labeled chronic offenders and referred to one of the assigned attorneys for follow-up. USAO also receives complaints regarding lobbyists who are allegedly lobbying but never filed an LD-203. USAO officials added that USAO monitors and investigates chronic offenders to ultimately determine the appropriate enforcement actions, which may include settlement or other civil actions. Additionally, USAO officials reported that they are working to resolve an active case involving a chronic offender firm and lobbyist that was pending as of 2018. USAO officials noted that the agency is continuing settlement discussions with the company that failed to respond to required LDA violation notices and its lobbyist did not respond to individual violations for semiannual reporting. The company is now current on filing its reports and USAO is working with the Secretary of the Senate and the Clerk of the House on settling past violations. USAO continues to review its records to identify additional chronic offenders for further action due to noncompliance. We provided a draft of this report to the Department of Justice for review and comment. The Department of Justice did not have comments. We are sending copies of this report to the Attorney General, the Secretary of the Senate, the Clerk of the House of Representatives, and interested congressional committees and members. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2717 or jonesy@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. The random sample of lobbying disclosure reports we selected was based on unique combination of House ID, lobbyist, and client names (see table 4). Lobbyist or lobbying firm Jessica Woolley National Multifamily Housing Council, Inc. Our objectives were to determine the extent to which lobbyists are able to demonstrate compliance with the Lobbying Disclosure Act of 1995, as amended (LDA) by providing documentation (1) to support information contained on registrations and reports filed under the LDA; (2) to identify challenges or potential improvements to compliance, if any; and (3) to describe the resources and authorities available to the U.S. Attorney’s Office for the District of Columbia (USAO), its role in enforcing LDA compliance, and any efforts it has made to improve LDA enforcement. We used information in the lobbying disclosure database maintained by the Clerk of the House of Representatives (Clerk of the House). To assess whether these disclosure data were sufficiently reliable for the purposes of this report, we reviewed relevant documentation and consulted with knowledgeable officials. Although registrations and reports are filed through a single web portal, each chamber subsequently receives copies of the data and follows different data-cleaning, processing, and editing procedures before storing the data in either individual files (in the House) or databases (in the Senate). Currently, there is no means of reconciling discrepancies between the two databases caused by the differences in data processing. For example, Senate staff told us during previous reviews they set aside a greater proportion of registration and report submissions than the House for manual review before entering the information into the database. As a result, the Senate database would be slightly less current than the House database on any given day pending review and clearance. House staff told us during previous reviews that they rely heavily on automated processing. In addition, while they manually review reports that do not perfectly match information on file for a given lobbyist or client, staff members approve and upload such reports as originally filed by each lobbyist, even if the reports contain errors or discrepancies (such as a variant on how a name is spelled). Nevertheless, we do not have reason to believe that the content of the Senate and House systems would vary substantially. Based on interviews with knowledgeable officials and a review of documentation, we determined that House disclosure data were sufficiently reliable for identifying a sample of quarterly disclosure reports (LD-2) and for assessing whether newly filed lobbyists also filed required reports. We used the House database for sampling LD-2 reports from the third and fourth quarters of 2017 and the first and second quarters of 2018, as well as for sampling year-end 2017 and midyear 2018 political contributions reports (LD-203). We also used the database for matching quarterly registrations with filed reports. We did not evaluate the Offices of the Secretary of the Senate or the Clerk of the House, both of which have key roles in the lobbying disclosure process. However, we did consult with officials from each office. They provided us with general background information at our request. To assess the extent to which lobbyists could provide evidence of their compliance with reporting requirements, we examined a stratified random sample of 99 LD-2 reports from the third and fourth quarters of 2017 and the first and second quarters of 2018. We excluded reports with no lobbying activity or with income or expenses of less than $5,000 from our sampling frame. We drew our sample from 49,918 activity reports filed for the third and fourth quarters of 2017 and the first and second quarters of 2018 available in the public House database, as of our final download date for each quarter. Our sample of LD-2 reports was not designed to detect differences over time. However, we conducted tests of significance for changes from 2010 to 2018 for the generalizable elements of our review. We found that results were generally consistent from year to year and there were few statistically significant changes (as noted in our report) after using a Bonferroni adjustment to account for multiple comparisons. For this year’s review, we estimated that 97 percent of LD-2 reports provided written documentation for the lobbying income and expenses. Our sample is based on a stratified random selection and is only one of a large number of samples that we may have drawn. Because each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95-percent confidence interval. This interval would contain the actual population value for 95 percent of the samples that we could have drawn. The percentage estimates for LD-2 reports have 95-percent confidence intervals of within plus or minus 12 percentage points or fewer of the estimate itself. We contacted all the lobbyists and lobbying firms in our sample and, using a structured web-based survey, asked them to confirm key elements of the LD-2 and whether they could provide written documentation for key elements in their reports, including the amount of income reported for lobbying activities; the amount of expenses reported on lobbying activities; the names of those lobbyists listed in the report; the houses of Congress and the federal agencies that they lobbied, and the issue codes listed to describe their lobbying activity. After reviewing the survey results for completeness, we interviewed lobbyists and lobbying firms to review the documentation they reported as having on their online survey for selected elements of their respective LD- 2 report. Prior to each interview, we conducted a search to determine whether lobbyists properly disclosed their covered position as required by the LDA. We reviewed the lobbyists’ previous work histories by searching lobbying firms’ websites, LinkedIn, Leadership Directories, Legistorm, and Google. Prior to 2008, lobbyists were only required to disclose covered official positions held within 2 years of registering as a lobbyist for the client. The Honest Leadership and Open Government Act of 2007 amended that time frame to require disclosure of positions held 20 years before the date the lobbyists first lobbied on behalf of the client. Lobbyists are required to disclose previously held covered official positions either on the client registration (LD-1) or on an LD-2 report. Consequently, those who held covered official positions may have disclosed the information on the LD-1 or a LD-2 report filed prior to the report we examined as part of our random sample. Therefore, where we found evidence that a lobbyist previously held a covered official position, and that information was not disclosed on the LD-2 report under review, we conducted an additional review of the publicly available Secretary of the Senate or Clerk of the House database to determine whether the lobbyist properly disclosed the covered official position on a prior report or LD-1. Finally, if a lobbyist appeared to hold a covered position that was not disclosed, we asked for an explanation at the interview with the lobbying firm to ensure that our research was accurate. In previous reports, we reported the lower bound of a 90-percent confidence interval to provide a minimum estimate of omitted covered positions and omitted contributions with a 95-percent confidence level. We did so to account for the possibility that our searches may have failed to identify all possible omitted covered positions and contributions. As we have developed our methodology over time, we are more confident in the comprehensiveness of our searches for these items. Accordingly, this report presents the estimated percentages for omitted contributions and omitted covered positions rather than the minimum estimates. As a result, percentage estimates for these items will differ slightly from the minimum percentage estimates presented in prior reports. In addition to examining the content of the LD-2 reports, we confirmed whether the most recent LD-203 reports had been filed for each firm and lobbyist listed on the LD-2 reports in our random sample. Although this review represents a random selection of lobbyists and firms, it is not a direct probability sample of firms filing LD-2 reports or lobbyists listed on LD-2 reports. As such, we did not estimate the likelihood that LD-203 reports were appropriately filed for the population of firms or lobbyists listed on LD-2 reports. To determine if the LDA’s requirement for lobbyists to file a report in the quarter of registration was met for the third and fourth quarters of 2017 and the first and second quarters of 2018, we used data filed with the Clerk of the House to match newly filed registrations with corresponding disclosure reports. Using an electronic matching algorithm that includes strict and loose text matching procedures, we identified matching disclosure reports for 3,329, or 92.01 percent, of the 3,618 newly filed registrations. We began by standardizing client and lobbyist names in both the report and registration files (including removing punctuation and standardizing words and abbreviations, such as “company” and “CO”). We then matched reports and registrations using the House identification number (which is linked to a unique lobbyist-client pair), as well as the names of the lobbyist and client. For reports we could not match by identification number and standardized name, we also attempted to match reports and registrations by client and lobbyist name, allowing for variations in the names to accommodate minor misspellings or typos. For these cases, we used professional judgment to determine whether cases with typos were sufficiently similar to consider as matches. We could not readily identify matches in the report database for the remaining registrations using electronic means. To assess the accuracy of the LD-203 reports, we analyzed stratified random samples of LD-203 reports from the 29,798 total LD-203 reports. The first sample contains 80 reports of the 9,502 reports with political contributions and the second contains 80 reports of the 20,296 reports listing no contributions. Each sample contains 40 reports from the year- end 2017 filing period and 40 reports from the midyear 2018 filing period. The samples from 2018 allow us to generalize estimates in this report to either the population of LD-203 reports with contributions or the reports without contributions to within a 95-percent confidence interval of within plus or minus 11 percentage points or fewer. Although our sample of LD- 203 reports was not designed to detect differences over time, for this year’s review, the estimated change in percentage of LD-203 reports missing one or more reportable contributions was a statistically significant increase compared to each of the prior 9 years. While the results provide some confidence that apparent fluctuations in our results across years are likely attributable to sampling error, the inability to detect significant differences may also be related to the nature of our sample, which was relatively small and designed only for cross- sectional analysis. We analyzed the contents of the LD-203 reports and compared them to contribution data found in the publicly available Federal Elections Commission’s (FEC) political contribution database. We consulted with staff at FEC responsible for administering the database. We determined that the data are sufficiently reliable for the purposes of our reporting objectives. We compared the FEC-reportable contributions on the LD-203 reports with information in the FEC database. The verification process required text and pattern matching procedures so we used professional judgment when assessing whether an individual listed is the same individual filing an LD-203. For contributions reported in the FEC database and not on the LD-203 report, we asked the lobbyists or organizations to explain why the contribution was not listed on the LD-203 report or to provide documentation of those contributions. As with covered positions on LD-2 disclosure reports, we cannot be certain that our review identified all cases of FEC-reportable contributions that were inappropriately omitted from a lobbyist’s LD-203 report. We did not estimate the percentage of other non-FEC political contributions that were omitted because they tend to constitute a small minority of all listed contributions and cannot be verified against an external source. To identify challenges to compliance, we used a structured web-based survey and obtained the views from 97 different lobbying firms included in our sample on any challenges to compliance. The number of different lobbying firms is 97, which is less than our original sample of 99 reports because some lobbying firms had more than one LD-2 report included in our sample. We calculated responses based on the number of different lobbying firms that we contacted rather than the number of interviews. Prior to our calculations, we removed the duplicate lobbying firms based on the most recent date of their responses. For those cases with the same response date, the decision rule was to keep the cases with the smallest assigned case identification number. To obtain their views, we asked them to rate their ease with complying with the LD-2 disclosure requirements using a scale of “very easy,” “somewhat easy,” “somewhat difficult,” or “very difficult.” In addition, using the same scale, we asked them to rate the ease of understanding the terms associated with LD-2 reporting requirements. To describe the resources and authorities available to the U.S. Attorney’s Office for the District of Columbia (USAO) and its efforts to improve its LDA enforcement, we interviewed USAO officials. We obtained information on the capabilities of the system officials established to track and report compliance trends and referrals and on other practices established to focus resources on LDA enforcement. USAO provided us with reports from the tracking system on the number and status of referrals and chronically noncompliant lobbyists and lobbying firms. The mandate does not require us to identify lobbyists who failed to register and report in accordance with the LDA requirements, or determine for those lobbyists who did register and report whether all lobbying activity or contributions were disclosed. Therefore, this was outside the scope of our audit. We conducted this performance audit from May 2018 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Clifton G. Douglas Jr. (Assistant Director), Shirley Jones (Managing Associate General Counsel), Ulyana Panchishin (Analyst-in-Charge), James Ashley, Krista Loose, Kathleen Jones, Amanda Miller, Sharon Miller, Robert Robinson, Stewart W. Small, Peter Verchinski, and Khristi Wilkins made key contributions to this report. Assisting with lobbyist file reviews were Adam Brooks, Jazzmin R. Cooper, Colleen Corcoran, Rianna B. Jansen, Benjamin Legow, Regina Morrison, Andrew Olson, Amanda R. Prichard, Alan Rozzi, Bryan Sakakeeny, Kate Wulff, and Edith P. Yuh. Lobbying Disclosure: Observations on Lobbyists’ Compliance with New Disclosure Requirements. GAO-08-1099. Washington, D.C: September 30, 2008. 2008 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-09-487. Washington, D.C: April 1, 2009. 2009 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-10-499. Washington, D.C: April 1, 2010. 2010 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-11-452. Washington, D.C: April 1, 2011. 2011 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-12-492. Washington, D.C: March 30, 2012. 2012 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-13-437. Washington, D.C: April 1, 2013. 2013 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-14-485. Washington, D.C: May 28, 2014. 2014 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-15-310. Washington, D.C.: March 26, 2015. 2015 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-16-320. Washington, D.C.: March 24, 2016. 2016 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-17-385. Washington, D.C.: March 31, 2017. 2017 Lobbying Disclosure: Observations on Lobbyists’ Compliance with Disclosure Requirements. GAO-18-388, Washington, D.C.: March 30, 2018.", "summary": "The LDA, as amended, requires lobbyists to file quarterly disclosure reports and semiannual reports on certain political contributions. The law also includes a provision for GAO to annually audit lobbyists' compliance with the LDA. GAO's objectives were to (1) determine the extent to which lobbyists can demonstrate compliance with disclosure requirements; (2) identify any challenges or potential improvements to compliance that lobbyists report; and (3) describe the resources and authorities available to USAO in its role in enforcing LDA compliance. This is GAO's 12th annual report under the provision. GAO reviewed a stratified random sample of 99 quarterly disclosure LD-2 reports filed for the third and fourth quarters of calendar year 2017, and the first and second quarters of calendar year 2018. GAO also reviewed two random samples totaling 160 LD-203 reports from year-end 2017 and midyear 2018. This methodology allowed GAO to generalize to the population of 49,918 disclosure reports with $5,000 or more in lobbying activity, and 29,798 reports of federal political campaign contributions. GAO also interviewed USAO officials. GAO is not making any recommendations in this report. GAO provided a draft of this report to the Department of Justice for review and comment. The agency stated that it did not have comments. For the 2018 reporting period, most lobbyists provided documentation for key elements of their disclosure reports to demonstrate compliance with the Lobbying Disclosure Act of 1995, as amended (LDA). For lobbying disclosure (LD-2) reports and political contributions (LD-203) reports filed during the third and fourth quarter of 2017 and the first and second quarter of 2018, GAO estimates that 92 percent of lobbyists who filed new registrations also filed LD-2 reports as required for the quarter in which they first registered (the figure below describes the filing process and enforcement); 97 percent of all lobbyists who filed could provide documentation for lobbying income and expenses. However, an estimated 20 percent of these LD-2 reports were not properly rounded to the nearest $10,000; 19 percent of all LD-2 reports did not properly disclose one or more previously held covered positions as required; and 33 percent of LD-203 reports were missing reportable contributions, which was a statistically significant increase compared to prior years. Except as noted above, these findings are generally consistent with prior reports GAO issued from 2010 through 2017. GAO continues to find that most lobbyists in the sample reported some level of ease in complying with disclosure requirements and in understanding the definitions of terms used in the reporting. However, some disclosure reports demonstrate compliance difficulties, such as failure to disclose covered positions or misreporting of income or expenses. The U.S. Attorney's Office for the District of Columbia (USAO) stated it has sufficient resources to enforce compliance. USAO continued its efforts to resolve noncompliance through filing reports or terminating registrations, as well as imposing civil and criminal penalties.", "document_type": "gao"}
{"report": "VA administers one of the largest health care systems in the United States and is charged, through the VHA, with providing health care services to the nation’s eligible veterans. VHA expects to provide care to more than 7 million veterans in fiscal year 2019 at health care facilities across the country through a system of 18 regional networks known as Veterans Integrated Service Networks. VHA has 172 medical centers that offer a variety of inpatient and outpatient services, ranging from routine examinations to complex surgical procedures. VHA’s health care system also includes community-based outpatient clinics and other facilities that generally limit services to primary care and some specialty care. When veterans need services that are not available at VHA medical facilities or within required driving distances or time frames, VHA may purchase care from non-VHA providers through one of its community care programs. VHA’s National Surgery Office is charged with overseeing the VA Organ Transplant Program, including the 12 VATCs that have established specialty services to provide solid organ transplant surgery and post- operative care, in some cases in conjunction with an academic affiliate. VATCs offer transplants for one or more organ types including heart, kidney, liver, and lung. (See fig. 1.) VHA considers transplant services provided through a VATC’s academic affiliate as care provided within the VA Organ Transplant Program. VHA’s National Surgery Office is responsible for clinical and operational oversight, as well as policies related to the VA Organ Transplant Program, including facilitating and monitoring the transplant referral process; overseeing quality of care; and monitoring outcomes of veterans receiving transplants. In 2013, VHA’s National Surgery Office established TRACER to track and monitor the referrals, evaluations, and outcomes for organ transplants performed at the VATCs. Referring VHA medical centers use the database to enter a referral for a veteran to be evaluated at a VATC; and VATCs use it to record referral reviews, patient evaluations, transplant outcomes, and follow-up care. In addition, the database provides the National Surgery Office with information used to monitor transplant volumes, the referral and evaluation process, and clinical outcomes across all VATCs. The VA Organ Transplant Program’s services include pre-transplant evaluation and testing, transplant surgery, post-transplant follow-up care, as well as transplant-related round-trip travel and lodging for both the veteran and a caregiver. VHA covers the cost of lodging for the veteran and caregiver through a variety of arrangements including contracts with local hotels and on-site VHA medical center housing, such as through the Fisher House Program. In addition, VHA may cover the cost of transplant services provided by non-VA providers; for example, when a veteran in urgent need of a heart transplant cannot travel to a VATC that provides that service. The VA MISSION Act includes provisions regarding VA’s authority to cover organ transplant services by non-VA providers—referred to as community care. Prior to the VA MISSION Act, VHA used its authority, as needed, to contract for transplant services with providers in the community when VHA care and services were not accessible in a timely fashion; however, the act provides additional authority to improve veterans’ access to transplant care and services through community providers, and authorizes transplant procedures with living organ donors who are not eligible for VHA care. On June 5, 2019, VA issued final regulations for the act. The Health Resources and Services Administration contracts with the United Network for Organ Sharing—a private, nonprofit organization—to manage the OPTN, which creates and maintains transplant policies and bylaws that are applicable to all transplant centers in the United States, including the VATCs and the academic affiliates performing transplants under contract with them. OPTN documents organ allocation policies, and collects and reports data on transplant recipients, donors, and outcomes. OPTN also conducts periodic audits of transplant program performance, including ensuring that transplant programs meet functional activity requirements (i.e., performing a minimum number of transplants in a proscribed period of time), and reviewing post-transplant patient survival rates. In addition, OPTN assesses whether transplant centers have established required quality assurance and performance improvement programs to help ensure the quality and safety of the transplant services provided. When transplant centers, including the VATCs, identify a candidate for organ transplantation, they register the patient in the OPTN’s centralized, national computer network that matches organ donors with transplant candidates, referred to in this report as the “national organ donation waitlist.” Veterans do not receive preference for organ allocation. When an organ becomes available, the computer network generates a list of transplant candidates ranked by a standard set of criteria that generally include factors such as blood and tissue type, size of the organ, medical urgency of the candidate, time on the waitlist, and geographic distance between the organ donor and transplant candidate. An organ procurement specialist then contacts the transplant program of the top-ranked transplant candidate to determine if the available organ is suitable for the candidate. If the organ is suitable, arrangements are made to procure, transport, and store the donated organ, and for the transplant candidate to travel to the transplant center for surgery. If the organ is not suitable for a given candidate, the procurement specialist contacts the transplant program of the next transplant candidate on the list until the organ is found to be suitable for a transplant candidate. Each year, VA allocates most of its appropriations for health care services to VHA’s 18 Veterans Integrated Service Networks through the Veterans Equitable Resource Allocation (VERA) system. VERA funds are allocated for general purposes, such as treatment for basic and complex patients, research and educational support, and equipment and maintenance costs; as well as for specific purposes, such as preventative and primary care initiatives and transplant care. The VERA model uses price groups— categories of veterans with similar resource needs based on the complexity of their medical conditions—to determine the funding level for each network. In addition, VHA’s National Surgery Office historically allocated transplant specific purpose funds to the VATCs for solid organ transplants, because the costs of transplant services were not fully covered by general purpose funds. Beginning in fiscal year 2019, the VERA model was modified to establish a new price group specifically for transplant patients, allowing full funding with general purpose funds for these services. VHA officials explained that this change is expected to reduce the need for specific purpose funds to supplement transplant care. VHA officials told us academic affiliate contracts are funded through the medical services appropriations allocated to the VHA medical center where the VATC is located. To receive an organ transplant in the VA Organ Transplant Program, a veteran must go through a five-step process: (1) initial referral, (2) pre- operative evaluation, (3) listing on the OPTN national organ donation waitlist, (4) transplant surgery, and (5) follow-up care that continues for the remainder of the veteran’s life. See figure 2 for an overview of the five steps. Step 1: Initial screening and referral. A veteran seeking an organ transplant begins the process by having an initial screening at a referring VHA medical center. If VHA medical center providers determine that the veteran is a potential candidate for an organ transplant, they may prepare a formal referral to a VATC. To prepare a referral, the providers use an organ-specific checklist and other tools developed by VHA’s National Surgery Office with input from other experts in the field to perform a standard set of assessments of the veteran’s clinical, social, and mental health status. In addition, VHA officials told us that the initial screening includes an assessment of the veteran’s social and family support; for example, identifying a caregiver who can accompany and stay with the veteran throughout the transplant process. In addition, there are organ- specific criteria, such as negative tobacco smoking screens for veterans seeking a heart transplant, and up-to-date dialysis information for liver and kidney transplant candidates. VHA officials noted that the providers may consult with staff at a VATC as needed during the initial screening phase. Following the initial screening, if VHA medical center providers determine that the veteran is a potential candidate for a transplant, they enter the checklist information into the TRACER database, include the results of the required assessments outlined in the checklist, and attach any additional medical information, such as testing performed through care in the community. VHA officials told us that the VATC to which the veteran is referred is chosen based on factors including distance from the veteran’s home and the types of organ transplants offered at the VATC. Once the VHA medical center completes a referral in TRACER, the information becomes available to the selected VATC. Step 2: VATC referral review and veteran evaluation. When the VATC receives a veteran’s referral, VATC staff review it to determine whether the referral information is complete and the veteran meets the criteria to continue the process. If so, VATC staff evaluate the veteran and perform additional testing and clinical preparation needed to determine whether the veteran is a transplant candidate. To reduce the travel burden on veterans and their caregivers, providers at the veteran’s referring VHA medical center may arrange for telehealth visits with the VATC for pre- transplant education and consultation. However, travel for in-person appointments at the VATC is required for most veterans referred for evaluation. According to VATC officials we spoke with, the VATC considers the severity of the veteran’s illness and overall need for a transplant. In some cases, this assessment is conducted by a panel of experts composed of VATC providers and providers from the academic affiliate, where applicable. For example, some VATCs hold regular review meetings to discuss cases up for consideration jointly with providers from the VHA medical center and the academic affiliate, because individual cases may be co-managed depending on the type of organ being transplanted and the services provided at an individual VATC. Providers at some VATCs provide care at both the VATC and its academic affiliate, allowing for integrated clinical management of patients. If the VATC determines the veteran is not a candidate for transplantation, the referring VHA medical center can request a second opinion by another VATC. If the veteran is once again determined not to be a candidate, the referring VHA medical center can make a final appeal. Appeals are forwarded to the VA’s Transplant Surgical Advisory Board, comprised of subject matter experts, for consideration. According to VHA policy, the board considers the appeal and makes a recommendation to the National Director of Surgery (the head of VHA’s National Surgery Office) who is responsible for facilitating second opinion requests, making the final determination, and notifying the referring VHA medical center regarding the final appeal determination. VHA reported that between fiscal years 2014 and 2018, 39 decisions were appealed to the Transplant Surgical Advisory Board, one of which was approved for resubmission to another VATC for consideration. Step 3: Listing on the national organ donation waitlist. If the VATC determines that the veteran is a candidate for an organ transplant, VATC staff add the veteran to the national organ donation waitlist. At this point in the process, veterans follow the same procedure as the general population seeking an organ transplant. To maximize the chances that the veteran will receive an organ, the VATC staff may also discuss options the veteran can pursue for personally identifying a potential living donor (if applicable for the organ needed). VATC officials noted that they may provide other clinical interventions to help prolong a veteran’s life and preserve his or her health while awaiting an organ; for example, implanting a ventricular assist device into a veteran awaiting a heart transplant. Step 4: Transplant surgery. According to VATC officials, once a veteran is placed on the OPTN national organ donation waitlist, depending on the type of organ needed, the veteran and their caregiver may be required to travel to the VATC and remain in close proximity while awaiting organ availability. In some cases, such as for a liver transplant, a harvested organ can be kept viable for longer periods, allowing time for a veteran to travel from their home to the VATC once the organ becomes available. Depending on the arrangement between a particular VATC and its academic affiliate, the veteran could receive the transplant surgery and post-operative care at either the VATC or the affiliate. For example, the VATC in Richmond performs heart transplants and contracts with its affiliate for liver transplants. The VATC in Nashville performs kidney transplants and contracts with its affiliate for heart and liver transplants. From fiscal years 2014 through 2018, 61 percent of the transplant surgeries provided within the VA Organ Transplant Program were performed by a VATC and 39 percent were performed by an academic affiliate. See table 1 for a list of VATCs, organ types transplanted, and contracts with academic affiliates. Step 5: Follow-up care. Following the transplant surgery and the immediate post-operative care provided by the VATC and its academic affiliate, the veteran receives on-going follow-up care from both the VATC and the referring VHA medical center. VHA providers monitor veterans post-transplant for the remainder of their lives; for example, to oversee post-transplant immunosuppression, and track survival rates and outcomes for organ recipients. VA policy states that the VATC has primary responsibility for providing care while the veteran is at the VATC for the transplant and for providing specialized follow-up care after the veteran is discharged. In general, however, following discharge from the VATC, the veteran’s referring VHA medical center maintains responsibility for the veteran’s care coordination. VHA has policies and processes to allow for some aspects of transplant- related care, including follow-up care, to be done via telehealth—that is, visits with a VATC provider remotely from the veteran’s referring VHA medical center. VHA medical centers may establish telehealth agreements with VATCs to ease the burden of travel for veterans and their caregivers, and to allow for ongoing monitoring of the veteran’s health post-transplant. Because VHA monitors transplant recipients for the rest of their lives, using telehealth can decrease the need for the veteran to travel back to the VATC unless a specific clinical need arises, such as biopsies for heart transplant recipients. VHA officials noted that follow-up care is facilitated by VA’s shared electronic health record, which allows VHA providers to share medical records and other patient information over time and across locations. Further, VHA providers noted that follow-up care and communication between VATCs and primary care teams can be more complicated in the private sector when transplant services are not generally part of a patient’s whole system of care. VATCs provided about 1,700 organ transplants between fiscal year 2014 and fiscal year 2018. The number of organ transplants provided each year generally increased, ranging from 300 transplants in fiscal year 2014 to a peak of 400 transplants in fiscal year 2017. During this 5-year period, kidneys and livers were the most frequently transplanted organs, representing 85 percent of all organs transplanted at VATCs. Heart and lung transplants were much less common and represented the remaining transplants. (See fig. 3.) For the programs that were active during all 5 years from fiscal year 2014 through fiscal year 2018, the number of solid organ transplants performed varied by VATC, ranging from 12 at the Birmingham VATC to 399 at the Pittsburgh VATC. (See table 2.) The nearly 1,700 transplants performed through the VA Organ Transplant Program represent a relatively small portion—less than 20 percent—of the VHA referrals for organ transplant between fiscal years 2014 and 2018. While thousands of veterans are referred for solid organ transplants, far fewer veterans ultimately receive transplants. According to VA officials, VHA considers all submitted transplant referrals; however, many patients do not meet initial screening criteria to proceed with a formal evaluation. For example, a veteran’s state of illness may not be severe enough to warrant a full transplant evaluation. Further, some veterans who are offered transplant evaluations decide not to proceed following education about the process. Officials noted that in many cases, the transplant evaluation reveals that a veteran does not meet the criteria for a transplant, such as not having a committed caregiver who can support the veteran through the evaluation and transplant procedure. Of the veterans who are listed on the national organ donation waitlist, VHA officials report that the number of transplants is limited by the supply of organs, which does not meet the demand in the U.S. general population, including veterans. For veterans who received an organ transplant from a VATC between fiscal year 2014 and fiscal year 2018, survival rates varied by organ type, with the 3-year survival rate ranging from about 95 percent for kidney transplants to 85 percent for lung transplants, according to National Surgery Office data. (See table 3.) For national-level general population survival rates, see appendix II. Consistent with the increase in the number of organ transplants provided between fiscal years 2014 and 2018, VHA’s allocations and spending for transplant services also increased, similarly peaking in fiscal year 2017. VHA funds these services using a combination of general purpose and specific purpose funds. VHA’s National Surgery Office allocates transplant specific purpose funding to the VATCs based upon the transplant-related workload the VATCs report through TRACER. See appendix III for additional information on transplant-related allocations and expenditures. VHA Allocation of Transplant Specific Purpose Funds. VHA allocated $292 million in transplant specific purpose funds during this 5-year period, ranging from $50.3 million in fiscal year 2014 to approximately $64.6 million in fiscal year 2018. (See table 5 in app. III.) Transplant specific purpose funds are used to support program overhead costs (infrastructure and maintenance) associated with organ transplants performed at VATCs. In addition, they are used for pre-transplant evaluations, lodging, and some miscellaneous costs associated with transplants, such as living donor evaluations. Further, transplant specific purpose funds are used to fund other VHA medical centers without a VATC that perform certain transplant follow-up care. VHA Expenditures for Transplant-Related Services VHA Expenditures of General Purpose and Specific Purpose Funds for Veterans Receiving a Solid Organ Transplant. VHA spent approximately $259 million for services provided to veterans who received a solid organ transplant at a VATC during this 5- year period, ranging from $44.6 million in fiscal year 2014 to a high of $57.7 million in fiscal year 2017. Similarly, VHA’s spending for pre- and post-transplant care provided at VHA medical centers totaled approximately $68.6 million during this time, ranging from $10.8 million in fiscal year 2014 to $15.6 million in fiscal year 2017. (See tables 6 and 7 in app. III.) VHA Contracts with VATC Academic Affiliates. VHA spent over $216 million on contract payments to academic affiliates for transplant services during this period, ranging from $34.9 million in fiscal year 2014 to a high of $49.9 million in fiscal year 2017. This increased spending corresponded to an increase in the number of transplants performed by academic affiliates, which totaled 669 transplants—nearly 40 percent of all VATC transplants from fiscal year 2014 through fiscal year 2018. The highest volume—146 transplants—and the highest cost—$49.9 million—occurred in fiscal year 2017. (See table 8 in app. III.) VHA Contracts for Community Care. From fiscal year 2014 through fiscal year 2018, VHA spent $7.9 million for solid organ transplant services provided to 53 veterans through community care programs. (See table 9 in app. III.) According to VHA data, over this 5-year period, 50 of these transplants were authorized using title 38 U.S.C. § 1703 (“Non-VA Medical Care Program”). The remaining three were funded using the Veterans Access, Choice, and Accountability Act of 2014 (Choice Act)—totaling approximately $411,000 of the $7.9 million. VA has reported that while the Choice Act allows VHA to provide an eligible veteran transplant care at a transplant center in the community, generally at Medicare rates, organ procurement is only partially covered at Medicare rates. This has resulted in community providers being less willing to provide transplant services for VHA patients through community care programs. From fiscal years 2014 through 2018, VATCs received 10,494 referrals from VHA medical centers. In that time, the percentage of VATC referrals that met timeliness standards outlined by VHA’s National Surgery Office improved. Stable condition referrals: For veterans in stable condition, VHA requires that VATCs review referrals and decide within 5 business days whether veterans are potential candidates for an organ transplant and should receive a full evaluation. The percentage of referrals for which VATCs met the timeliness standard increased from 95 percent in fiscal year 2014 to 99 percent in fiscal year 2018. Emergency condition referrals: For veterans in emergency circumstances, VHA requires that VATCs review referrals and document within 48 hours whether veterans are potential transplant candidates and should receive a full evaluation. The percentage of referrals for which VATCs met the timeliness standard increased from 94 percent in fiscal year 2014 to 98 percent in fiscal year 2018. (For more information, see app. IV.) National Surgery Office officials identified two possible drivers of the observed improvements: (1) increased monitoring, and (2) providing real- time feedback to VATCs through TRACER. Providers at one VATC noted that they use information from the National Surgery Office’s Transplant Quarterly Reports to identify areas to improve and they assigned a transplant team nurse the responsibility to monitor program quality, including that timeliness requirements are being met. A provider at a VATC where timeliness has improved since fiscal year 2014 and is now at 100 percent explained that his facility has provided training to staff at referring VHA medical centers they work with frequently. For example, the official said he has hosted a workshop for transplant coordinators to provide training on submitting transplant referral packets through TRACER. While VATCs almost always met timeliness standards in fiscal year 2018, VATC officials in our review noted that transplant coordinators at referring VHA medical centers sometimes submit referral packets that are incomplete, requiring additional time and effort by the provider to search for information not readily available and potentially adding delays to the VATC review times. VHA requires that a complete referral packet be submitted through TRACER using a referral progress note that contains the required assessments outlined in the organ-specific checklist. The referral packet can also include attachments to transmit some required information, such as results for tests performed by community providers. Providers at three VATCs told us that reviewing a complete referral packet generally takes 30 minutes to an hour. However, in cases where the packet is incomplete (for example, it does not include the results from all the required assessments) the process is much less efficient and, according to two providers we interviewed, can take up to 5 hours. VATC providers explained that when not all test results are available in the referral packet, they have to access another VHA medical center’s electronic medical record system and search for the required information. Accessing another medical center’s system adds time to the referral review process and can take time away from the provider’s other duties, such as providing follow-up care to transplant patients or monitoring transplant outcomes. Internal controls state that management should assign responsibility to discrete units and demonstrate a commitment to develop competent individuals in those units, such as through training, to enable the organization to operate in an efficient manner and help achieve the organization’s objectives. However, a lack of understanding or implementation of the required information needed in the referral packets can make the process for reviewing the referral packets inefficient in some cases. Specifically, one VATC provider told us that incomplete referral packets are often due to a lack of training for staff at the referring VHA medical centers on the process for submitting referrals through TRACER. In fact, four of the five transplant coordinators at referring VA medical centers we interviewed reported a lack of training on submitting transplant referrals through TRACER. Instead, for example, a transplant coordinator at one referring VHA medical center said she received assistance from a medical clerk at her facility on how to submit referrals through TRACER. Officials at VHA’s National Surgery Office told us that although there is no centralized, in-person training available for referring VHA medical centers, the office published a training guide, which is available on VA’s intranet and provides guidance on how to access TRACER and refer patients for transplant evaluation. Despite this resource, transplant coordinators from some referring VHA medical centers still cited a need for additional training or other guidance. For example, one official said training for new transplant coordinators would be helpful as would regular updates on transplant criteria or policy changes, such as through regular calls or a newsletter targeted at transplant coordinators. In addition to timeliness requirements for referral review, VHA requires that VATCs complete an evaluation of veterans within 30 calendar days of receiving a referral to determine whether they are a candidate for transplant and should be placed on the national organ donation waitlist. From fiscal years 2014 through 2018, VATCs increased the percentage of evaluations completed within this time frame, from 55 percent (576 of 1,045 appointments) in fiscal year 2014 to 89 percent (1,193 of 1,346 appointments) in fiscal year 2017, before dropping to 87 percent (1,325 of 1,521 appointments) in fiscal year 2018. National Surgery Office officials attributed the overall improvement to increased monitoring and the increased availability of telehealth for conducting transplant evaluations. See appendix IV for more information on the timeliness of transplant evaluations by VATCs from fiscal years 2014 through 2018. The extent to which delayed evaluations occurred varied by VATC location and by organ type each fiscal year. For example, in fiscal year 2018, we found that the average time from referral to completed evaluation was less than 30 days for 19 of the 20 organ transplant programs, and overall, 13 percent of evaluations were not completed within 30 days. Of note, 51 of 128, or 40 percent, of evaluations for kidney transplant at the Bronx VATC were completed more than 30 days after the referral was submitted, with evaluations ranging from 5 to 84 days after submission. In contrast, all 69, or 100 percent, of liver evaluations at the Nashville VATC were completed within 30 days, with evaluations ranging from 0 to 28 days after the referral was submitted. (See fig. 4.) According to VHA data and three VATC providers we interviewed, evaluation appointment availability is not a cause for delays in most cases; rather, delays are primarily due to veteran preference. According to VHA data for 1,617 evaluation appointments completed in fiscal year 2018, 1,412 appointments were scheduled within the 30-day requirement. For the remaining 205 appointments, 13 were delayed due to lack of appointment availability, and 192 appointments were delayed due to veteran preference. According to providers at the three VATCs we interviewed, while veterans may prefer to be seen at a later date for a number of reasons, including that their caregiver is not available to travel, veterans are not always aware that they should be evaluated within 30 days of being referred for a transplant. VHA requires the referring VHA medical center to discuss the 30 day evaluation requirement with the veteran prior to submitting the referral. According to VHA, in some cases evaluation timeliness is a critical factor affecting patient outcomes. Although a veteran may choose to be seen at a time beyond the 30-day standard, postponing an evaluation may delay their placement on the national organ donation waitlist, potentially having a negative impact on their health and well-being. Officials at five VATCs and two referring VHA medical centers reported that additional training for transplant coordinators would be helpful for improving evaluation timeliness. Additional training enables employees to develop competencies and reinforce requirements, which is consistent with internal control standards that state that management should develop competent individuals to achieve the entity’s objectives. According to one VATC provider, transplant coordinators at referring VHA medical centers should be trained to discuss travel with the veteran before submitting the referral, so the transplant coordinator and the veteran understand that the evaluation should be completed within 30 days of referral, increasing the likelihood that veterans will be able to schedule timely evaluations. A referring VHA medical center transplant coordinator also said that additional training about the VATC’s processes would be helpful in order to be better able to inform veterans and their caregivers about what to expect from the transplant process. Placing veterans on the national organ donation waitlist as soon as possible is critical for potential transplant candidates to be matched with a donor organ. Since fiscal year 2014, VHA has improved timeliness for reviewing transplant referrals to determine if a veteran is a candidate and for completing transplant evaluations. However, VHA medical center staff do not always submit complete transplant referral packets through TRACER, which can create inefficiencies and delay the referral review process. Similarly, inefficiencies in the transplant evaluation process occur when VATC and VHA medical center staff do not fully inform veterans of their role in the transplant evaluation process, specifically, that their evaluation be completed within 30 days of referral. Without additional training to address these inefficiencies a veteran’s placement on the national organ donation waitlist could be delayed. The Under Secretary for Health should establish a requirement that VHA’s National Surgery Office provide additional training to staff at referring VHA medical centers on (a) submitting referral packets through TRACER that are complete, and (b) understanding and communicating the veteran’s role in the evaluation process related to the timely completion of transplant evaluations. (Recommendation 1) We provided a draft of this product to VA for comment. In its comments, reproduced in appendix V, the department concurred in principle with our recommendation, reiterated the resources it currently makes available to staff at referring VHA medical centers, and described actions it plans to take to address the recommendation. Specifically, VHA’s National Surgery Office plans to distribute a memorandum to all VHA facilities to reinforce the available training and resources to support the staff at referring VHA medical centers with submitting complete referrals, and to ensure adequate communication of the veteran’s role in timely completion of transplant evaluations. VA also provided technical comments, which we incorporated as appropriate. In addition, we provided a draft of this report to the Department of Health and Human Services for review and they did not have any comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of VA, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report is available at no charge on GAO’s website at http://www.gao.gov/. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or silass@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix VI. Appendix I: Department of Veterans Affairs Transplant Centers Providing Solid Organ Transplants (printable) We analyzed national transplant survival rates by organ type using data from the Scientific Registry of Transplant Recipients. All transplant facilities across the United States, including Department of Veterans Affairs transplant centers, provide data to this database. Table 4 shows the national transplant survival rates by organ for fiscal years 2014 through 2018. Annually, the Department of Veterans Affairs (VA) allocates most of its appropriations for health care services to the Veterans Integrated Service Networks within the Veterans Health Administration (VHA) through a model called the Veterans Equitable Resource Allocation (VERA). The VERA model is designed to fund patient care based on a methodology that develops set, or “capitated,” rates for different groups or categories of veterans with similar resource needs based on the complexity of their medical conditions. Categories include oncology, visual impairment, chronic mental illness, and critical illness. VERA uses a national formula that considers the number of veterans and the complexity of care provided; and certain geographic factors, such as local labor costs, in determining how much each Veterans Integrated Service Network should receive. VERA determines this amount based on each network’s activities and needs in the following areas: patient care, equipment, nonrecurring maintenance, education support, and research support. The networks, in turn, allocate resources to their respective VHA medical centers, including those with VA transplant centers (VATC). The networks distribute VERA funds to VHA medical centers based on the complexity of patients treated at the medical center in previous fiscal years. This appendix provides VA’s reported allocations and expenditures for solid organ transplant services through its VATCs and contracts with academic affiliates and community providers from fiscal year 2014 through fiscal year 2018. Table 5 shows VHA allocation of transplant specific purpose funds by VATC for transplant-related services. Table 6 shows VHA expenditures at each VATC for veterans who received solid organ transplants. Table 7 shows VHA expenditures for pre- and post-transplant services provided by VHA medical centers without a VATC for veterans who received transplants. Table 8 shows the total number of transplants and contract payments to academic affiliates for solid organ transplant services. Table 9 shows total number and spending for solid organ transplants provided by community care providers. The Veterans Health Administration (VHA) has timeliness requirements for reviewing transplant referrals to determine whether veterans are potential candidates for organ transplant and should receive a full evaluation, and for completing timely evaluations for potential candidates. Timeliness of referral reviews improved from fiscal year 2014 through fiscal year 2018. VHA requires that for veterans in stable condition, Department of Veterans Affairs transplant centers (VATC) review referrals and decide within 5 business days whether veterans are potential candidates for an organ transplant and should receive a full evaluation. For emergency cases, VATCs should perform this review and document the results within 48 hours. Table 10 shows the number of referrals reviewed and the percentage of timely referrals for each VATC and organ transplant program from fiscal year 2014 through fiscal year 2018. VHA requires that VATCs complete an evaluation of stable veterans within 30 calendar days of receiving a referral to determine whether they are a candidate for transplant and should be placed on the national organ donation waitlist. The percentage of evaluations completed within the required time frame increased from 55 percent in fiscal year 2014 to 87 percent in fiscal year 2018, although some variation can be seen by organ type and location within each fiscal year. Table 11 shows the number of completed evaluations and the percentage of timely evaluations for each VATC and organ transplant program from fiscal year 2014 through fiscal year 2018. In addition to the contact named above, Marcia A. Mann (Assistant Director), Jill K. Center (Analyst-in-Charge), Colin Ashwood, Emily Binek, Emily Bippus, Shana Deitch, Keith Haddock, and Ebony Russ made key contributions to this report. Also contributing were Krister Friday, Jacquelyn Hamilton, Giselle Hicks, Drew Long, Vikki Porter, and Ethiene Salgado-Rodriguez.", "summary": "As of June 2019, over 113,000 people in the United States—including veterans—were waiting for an organ transplant. In 2018, more than 36,000 organ transplants were performed at transplant centers across the country, including those within the Department of Veterans Affairs' (VA) Organ Transplant Program. GAO was asked to review how VA administers and oversees its organ transplant program. This report, among other things, examines the process and timeliness with which VA reviews referrals and completes evaluations for organ transplants. GAO reviewed data from VHA's Transplant Referral and Cost Evaluation Reimbursement database, documents related to VA's transplant program, and federal internal control standards. GAO conducted site visits to three of the 12 VATCs, selected to obtain diversity in geography and types of organs transplanted. At the selected VATCs, GAO reviewed facility data and documents related to organ transplants and interviewed officials. GAO also collected and reviewed information from the remaining nine VATCs. The 12 Veterans Affairs' transplant centers (VATC), which are overseen by the Veterans Health Administration (VHA), almost always met the referral timeliness standard from fiscal years 2014 through 2018. When a veteran is determined to be a potential candidate for an organ transplant, he or she can receive a formal referral to a VATC. Depending on the type of referral, the VATC must meet specific timeliness standards for reviewing the referral and deciding if the veteran should receive a full evaluation. Likewise, VATCs have timeliness standards for conducting the full evaluation, and generally showed improvement in meeting that standard from fiscal years 2014 through 2018. For those delays in conducting full evaluations that did occur, GAO found they varied by organ type and VATC. Specifically, in fiscal year 2018, transplant evaluation timeliness ranged from 60 percent at two VATC kidney programs to 100 percent at kidney, liver, heart or lung programs across seven different VATCs. According to VATC officials, transplant evaluation delays are caused when patients or caregivers are not available or not aware that they are required to be evaluated within 30 days of being referred. Although veterans may prefer to be seen at a later date, untimely evaluations can delay veterans' placement on the national organ donation waitlist. According to VHA data, 192 of the 1,617 transplant evaluation appointments completed in fiscal year 2018 did not meet the 30-day requirement. VATC officials said this was because veterans were not available or not aware of the requirement. GAO found that staff at referring VHA medical centers lacked a full understanding of the transplant referral and evaluation process. For example, VATC providers told GAO that transplant referrals are sometimes incomplete, requiring providers to spend extra time searching for information that should have been readily available. GAO found that additional training for medical center staff would help to improve the efficiency of the transplant referral process and the timeliness of transplant evaluations provided to veterans, a critical factor affecting veteran outcomes. VHA should provide additional training for staff at VHA medical centers that refer patients for organ transplants on (1) submitting complete referrals and (2) understanding and communicating the veteran's role related to timely completion of transplant evaluations. VA concurred in principle with the recommendation and described actions the department will take to address the recommendation.", "document_type": "gao"}
{"report": "Our past work has identified progress and challenges in a number of areas related to DHS’s management of the CFATS program, including (1) the process for identifying high-risk chemical facilities; (2) how it assesses risk and prioritizes facilities; (3) reviewing and approving facility site security plans; (4) inspecting facilities and ensuring compliance; and (5) efforts to conduct outreach with stakeholders and first responders. In May 2014, we found that more than 1,300 facilities had reported having ammonium nitrate to DHS. However, based on our review of state data and records, there were more facilities with ammonium nitrate holdings than those that had reported to DHS under the CFATS program. Thus, we concluded that some facilities weren’t required to report to DHS and some that were required may have failed to do so. We recommended that DHS work with other agencies, including the Environmental Protection Agency (EPA), to develop and implement methods of improving data sharing among agencies and with states as members of a Chemical Facility Safety and Security Working Group. DHS agreed with our recommendation and has since addressed it. Specifically, DHS compared DHS data with data from other federal agencies, such as EPA, as well as member states from the Chemical Facility Safety and Security Working Group to identify potentially noncompliant facilities. As a result of this effort, in July 2015, DHS officials reported that they had identified about 1,000 additional facilities that should have reported information to comply with CFATS and subsequently contacted these facilities to ensure compliance. DHS officials told us that they continue to engage with states to identify potentially non-compliant facilities. For example, as of June 2018, DHS officials stated that they have received 43 lists of potentially noncompliant facilities from 34 state governments, which are in various stages of review by DHS. DHS officials also told us that they hired an individual to serve as the lead staff member responsible for overseeing this effort. DHS has also taken action to strengthen the accuracy of data it uses to identify high-risk facilities. In July 2015, we found that DHS used self- reported and unverified data to determine the risk categorization for facilities that held toxic chemicals that could threaten surrounding communities if released. At the time, DHS required that facilities self- report the Distance of Concern—an area in which exposure to a toxic chemical cloud could cause serious injury or fatalities from short-term exposure—as part of its Top-Screen. We estimated that more than 2,700 facilities with a toxic release threat had misreported the Distance of Concern and therefore recommended that DHS (1) develop a plan to implement a new Top-Screen to address errors in the Distance of Concern submitted by facilities, and (2) identify potentially miscategorized facilities that could cause the greatest harm and verify that the Distance of Concern of these facilities report is accurate. DHS has fully addressed both of these recommendations. Specifically, in response to the first recommendation, DHS implemented an updated Top-Screen survey in October 2016 and now collects data from facilities and conducts more accurate modeling to determine the actual area of impact (formerly called the Distance of Concern), rather than relying on the facilities’ calculation. In response to the second recommendation, DHS officials reported in November 2016 that they reassessed all facility Top-Screens that reported threshold quantities of chemicals posing a toxic release threat, and identified 158 facilities with the potential to cause the greatest harm. In April 2018, DHS officials reported that all of these facilities have since been reassessed using updated Top-Screen information and, where appropriate, assigned a risk tier. DHS has also taken actions to better assess regulated facilities’ risks in order to place the facilities into the appropriate risk tier. In April 2013, we reported that DHS’s risk assessment approach did not consider all of the elements of threat, vulnerability, and consequence associated with a terrorist attack involving certain chemicals. Our work showed that DHS’s CFATS risk assessment methodology was based primarily on consequences from human casualties, but did not consider economic consequences, as called for by the National Infrastructure Protection Plan (NIPP) and the CFATS regulation. We also found that (1) DHS’s approach was not consistent with the NIPP because it treated every facility as equally vulnerable to a terrorist attack regardless of location or on-site security and (2) DHS was not using threat data for 90 percent of the tiered facilities—those tiered for the risk of theft or diversion—and using 5-year-old threat data for the remaining 10 percent of those facilities that were tiered for the risks of toxic chemical release or sabotage. We recommended that DHS enhance its risk assessment approach to incorporate all elements of risk and conduct an independent peer review after doing so. DHS agreed with our recommendations and has implemented actions to address both of them. Specifically, with regard to our recommendation that DHS enhance its risk assessment approach to incorporate all elements of risk, DHS worked with Sandia National Laboratories to develop a model to estimate the economic consequences of a chemical attack. In addition, DHS worked with Oak Ridge National Laboratory to devise a new tiering methodology, called the Second Generation Risk Engine. In so doing, DHS revised the CFATS threat, vulnerability, and consequence scoring methods to better cover the range of CFATS security issues. Additionally, with regard to our recommendation that DHS conduct a peer review after enhancing its risk assessment approach, DHS conducted peer reviews and technical reviews with government organizations and facility owners and operators, and worked with Sandia National Laboratories to verify and validate the CFATS program’s revised risk assessment methodology. To further enhance its risk assessment approach, in the fall of 2016, DHS also revised its Chemical Security Assessment Tool (CSAT), which supports DHS efforts to gather information from facilities to assess their risk. According to DHS officials, the new tool—called CSAT 2.0—is intended to eliminate duplication and confusion associated with DHS’s original CSAT. DHS officials told us that they have improved the tool by revising some questions in the original CSAT to make them easier to understand; eliminating some questions; and pre-populating data from one part of the tool to another so that users do not have to retype the same information multiple times. DHS officials also told us that the facilities that have used the CSAT 2.0 have provided favorable feedback that the new tool is more efficient and less burdensome than the original CSAT. Finally, DHS officials told us that, as of June 2018, DHS completed all notifications and processed tiering results for all but 226 facilities. DHS officials did not provide an estimated target completion date for these pending risk assessments, noting that completing the assessments is highly dependent on the facilities providing the necessary Top-Screen information. DHS has also made progress reviewing and approving facility site security plans by reducing the time it takes to review these plans and eliminating the backlog of plans awaiting review. In April 2013, we reported that DHS revised its procedures for reviewing facilities’ security plans to address DHS managers’ concerns that the original process was slow, overly complicated, and caused bottlenecks in approving plans. We estimated that it could take DHS another 7 to 9 years to review the approximately 3,120 plans in its queue at that time. We also estimated that, given the additional time needed to do compliance inspections, the CFATS program would likely be implemented in 8 to 10 years. We did not make any recommendations for DHS to improve its procedures for reviewing facilities’ security plans because DHS officials reported that they were exploring ways to expedite the process, such as reprioritizing resources and streamlining inspection requirements. In July 2015, we reported that DHS had made substantial progress in addressing the backlog—estimating that it could take between 9 and 12 months for DHS to review and approve security plans for the approximately 900 remaining facilities. DHS officials attributed the increased approval rate to efficiencies in DHS’s review process, updated guidance, and a new case management system. Subsequently, DHS reported in its December 2016 semi-annual report to Congress that it had eliminated its approval backlog. Finally, we found in our 2017 review that DHS took action to implement an Expedited Approval Program (EAP). The CFATS Act of 2014 required that DHS create the EAP as another option that tier 3 and tier 4 chemical facilities may use to develop and submit security plans to DHS. Under the program, these tier 3 and 4 facilities may develop a security plan based on specific standards published by DHS (as opposed to the more flexible performance standards using the standard, non- expedited process). DHS issued guidance intended to help facilities prepare and submit their EAP security plans to DHS, which includes an example that identifies prescriptive security measures that facilities are to have in place. According to committee report language, the EAP was expected to reduce the regulatory burden on smaller chemical companies, which may lack the compliance infrastructure and the resources of large chemical facilities, and help DHS to process security plans more quickly. If a tier 3 or 4 facility chooses to use the expedited option, DHS is to review the plan to determine if it is facially deficient, pursuant to the reporting requirements of the CFATS Act of 2014. If DHS approves the EAP site security plan, it is to subsequently conduct a compliance inspection. In 2017, we found that DHS had implemented the EAP and had reported to Congress on the program, as required by the CFATS Act of 2014. In addition, as of June 2018, according to DHS officials, only 18 of the 3,152 facilities eligible to use the EAP had opted to use it. DHS officials attributed the low participation to several possible factors including: DHS had implemented the expedited program after most eligible facilities already submitted standard (non-expedited) security plans to DHS; facilities may consider the expedited program’s security measures to be too strict and prescriptive, not providing facilities the flexibility of the standard process; and the lack of an authorization inspection may discourage some facilities from using the expedited program because this inspection provides useful information about a facility’s security. We also found in 2017 that recent changes made to the CFATS program could affect the future use of the expedited program. As discussed previously, DHS has revised its methodology for determining the level of each facility’s security risk, which could affect a facility’s eligibility to participate in the EAP. In our July 2015 report, we found that DHS began conducting compliance inspections in September 2013, and by April 2015, had conducted inspections of 83 of the inspected 1,727 facilities that had approved security plans. Our analysis showed that nearly half of the facilities were not fully compliant with their approved site security plans and that DHS had not used its authority to issue penalties because DHS officials found it more productive to work with facilities to bring them into compliance. We also found that DHS did not have documented processes and procedures for managing the compliance of facilities that had not implemented planned measures by the deadlines outlined in their plans. We recommended that DHS document processes and procedures for managing compliance to provide more reasonable assurance that facilities implement planned measures and address security gaps. DHS agreed and has since taken steps toward implementing this recommendation. Specifically, DHS revised CFATS Standard Operating Procedures that, as of February 2019, we are reviewing to determine if they sufficiently document the processes and procedures currently being used to track noncompliant facilities and ensure facilities implement planned measures as outlined in their approved site security plans. In August 2018, we reported that our analysis of DHS data since our 2015 report showed that DHS has made substantial progress in conducting and completing compliance inspections. Specifically, our analysis showed that DHS increased the number of compliance inspections completed per year since DHS began conducting compliance inspections in 2013 and that, for the 2,466 high-risk facilities with an approved site security plan as of May 2018, DHS had conducted 3,553 compliance inspections. Of these, DHS issued corrective actions to two facilities that were not in compliance with their approved site security plan. In our August 2018 report, we also found that DHS developed a new methodology and performance measure for the CFATS program in order to evaluate security changes made by high-risk chemical facilities, but that the methodology does not measure the program’s impact on reducing a facility’s vulnerability to an attack. We found that DHS could take steps to evaluate vulnerability reduction resulting from the CFATS compliance inspection process. We recommended that DHS incorporate vulnerability into the new methodology to help measure the reduction in the vulnerability of high-risk facilities to a terrorist attack, and use that data in assessing the CFATS program’s performance in lowering risk and enhancing national security. DHS agreed and is taking steps to implement this recommendation. Specifically, in September 2018, DHS reported making progress towards the implementation of two new performance metrics by the end of the first quarter of fiscal year 2019. DHS officials stated that these metrics should, among other things, evaluate the progress of individual facilities in enhancing their security while part of the CFATS program and be used to demonstrate an increase in the security posture across the population of CFATS facilities. In April 2013, we reported that DHS took various actions to work with facility owners and operators, including increasing the number of visits to facilities to discuss enhancing security plans, but that some trade associations had mixed views on the effectiveness of DHS’s outreach. We found that DHS solicited informal feedback from facility owners and operators in its efforts to communicate and work with them, but did not have an approach for obtaining systematic feedback on its outreach activities. We recommended that DHS take action to solicit and document feedback on facility outreach consistent with DHS efforts to develop a strategic communication plan. DHS agreed and has implemented this recommendation by developing a questionnaire to solicit feedback on outreach with industry stakeholders and began using the questionnaire in October 2016. In August 2018, we reported that DHS shares some CFATS information with first responders and emergency planners, but these stakeholders may not have all of the information they need to minimize the risk of injury or death when responding to incidents at high-risk facilities. While certain facilities are required under the Emergency Planning and Community Right-to-Know Act of 1986 to report some chemical inventory information, which local officials told us they rely on to prepare for and respond to incidents at chemical facilities, we found over 200 chemicals covered by CFATS that may not be covered by these reporting requirements. We also reported that DHS developed a secure interface called the Infrastructure Protection (IP) Gateway that provides access to CFATS facility-specific information that may be missing from required reporting. However, we found that the IP Gateway is not widely used at the local level and officials from 13 of 15 selected Local Emergency Planning Committees we contacted—consisting of first responders and covering 373 CFATS high-risk facilities—said they did not have access to CFATS data in the IP Gateway. We recommended that DHS should take actions to encourage access to and wider use of the IP Gateway and explore other opportunities to improve information-sharing with first responders and emergency planners. DHS concurred with this recommendation and reported in September 2018 that they are taking actions to implement it. Specifically, DHS has revised three fact sheets and an outreach presentation to include information on the IP Gateway and how to request access to it. In addition, DHS plans to ensure contact is made with first responders representing the top 25 percent of CFATS high-risk chemical facilities by no later than March 2019 so that they are properly prepared to respond to incidents at these facilities. Chairman Thompson, Ranking Member Rogers, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-3841 or andersonn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals making key contributions to this work include Ben Atwater, Assistant Director; Hugh Paquette, Analyst-in-Charge; Chuck Bausell, Michele Fejfar, Tracey King, and Tom Lombardi. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Thousands of facilities across the United States contain hazardous chemicals that could be used by terrorists to inflict mass casualties or harm surrounding populations. In accordance with the DHS Appropriations Act, 2007, DHS established the CFATS program to, among other things, identify and assess the security risk posed by chemical facilities. DHS inspects high-risk facilities after it approves facility security plans to ensure that the facilities are implementing required security measures and procedures. This statement summarizes progress and challenges related to DHS's CFATS program management. This statement is based on prior products GAO issued from July 2012 through August 2018, along with updates as of September 2018 on actions DHS has taken to address GAO's prior recommendations. To conduct the prior work, GAO reviewed relevant laws, regulations, and DHS policies for administering the CFATS program; how DHS assesses risk; and data on high-risk chemical facilities. GAO also interviewed DHS officials and relevant stakeholders. The Department of Homeland Security (DHS) has made progress addressing challenges that GAO's past work identified to managing the Chemical Facility Anti-Terrorism Standards (CFATS) program. The following summarizes progress made and challenges remaining in key aspects of the program. Identifying high-risk chemical facilities. In July 2015, GAO reported that DHS used self-reported and unverified data to determine the risk of facilities holding toxic chemicals that could threaten surrounding communities if released. GAO recommended that DHS should better verify the accuracy of facility-reported data. DHS implemented this recommendation by revising its methodology so it now calculates the risk of toxic release, rather than relying on facilities to do so. Assessing risk and prioritizing facilities. In April 2013, GAO reported weaknesses in multiple aspects of DHS's risk assessment and prioritization approach. To improve this process, GAO recommended that DHS enhance its risk assessment approach to incorporate all elements of risk and conduct a peer review after doing so. DHS implemented both recommendations by revising the CFATS risk assessment methodology to include threat, vulnerability, and consequence to better cover the range of security issues, and conducting peer reviews and technical reviews to verify and validate the CFATS program's new risk assessment approach. Reviewing and approving facility site security plans . DHS is to review facility security plans to ensure their security measures meet DHS standards. In April 2013, GAO reported a 7- to 9-year backlog for these reviews. In July 2015, GAO reported that DHS had made substantial progress in addressing the backlog—estimating that it could take between 9 and 12 months for DHS to review and approve security plans for the approximately 900 remaining facilities. DHS has since taken additional action to expedite these activities and has eliminated this backlog. Inspecting facilities and ensuring compliance. In July 2015, GAO found that nearly half of the facilities DHS had inspected were not fully compliant with their approved security plans and that DHS did not have documented procedures for managing facilities' compliance. GAO recommended that DHS document procedures for managing compliance. DHS revised CFATS procedures that, as of February 2019, GAO is reviewing to determine if they sufficiently address the recommendation. Conducting stakeholder and first responder outreach. In August 2018, GAO reported that DHS shares some CFATS information with first responders and emergency planners but these stakeholders may not have all of the information they need to minimize the risk of injury or death when responding to incidents at high-risk facilities. GAO recommended that DHS should, among other things, take actions to explore opportunities to improve information-sharing with first responders and emergency planners. DHS concurred with this recommendation and reported in September 2018 that it is conducting additional outreach and taking other actions to implement it. GAO has made various recommendations to strengthen DHS's management of the CFATS program, with which DHS has generally agreed. DHS has implemented or described planned actions to address these recommendations.", "document_type": "gao"}
{"report": "DOD has long recognized that the contracts for items like weapon systems are capital intensive in nature and take a long time to produce. Contract financing assists the defense contractor in managing expenses, such as material, labor, and overhead. In such cases, DOD can agree to help finance these expenses as the work progresses through various types of contract financing payments, including progress payments and performance-based payments. Progress payments based on cost are determined as a percentage of the costs incurred by the contractor as work progresses. Currently, DOD pays 80 percent of incurred costs of large business concerns and 90 percent of incurred costs of small business concerns. To receive progress payments on the basis of cost, contractors are required to have an accounting system and controls that are adequate for proper administration of progress payments. The cognizant contract administration office is to maintain surveillance of the contractor’s accounting system as appropriate, and the Defense Contract Audit Agency is to audit the accounting system. DOD provides contract financing on fixed-price type contracts for non- commercial items. Performance-based payments enable the contractor to be paid for achieving certain contractual milestones, such as delivery of a major subcontracted component. DOD can pay up to 90 percent of either the contract’s price or the price of a deliverable item using performance-based payments. DOD’s performance-based payments guide states that these payments should not be structured such that they amount to advance payments, which in general terms are payments made before work is complete on a contract regardless of what performance milestones are met. Unlike progress payments, however, performance-based payments do not require that the contractor have an adequate accounting system. Lastly, contract financing can also be used when the terms and conditions of a contract are not yet “definitized,” a term that generally means finalized. These actions, which are termed undefinitized contract actions (UCAs) at DOD, are to be used only when the negotiation of a definitive contract action is not possible in sufficient time to meet DOD’s requirements and the department’s interest demands that the contractor be given a binding commitment so that contract performance can begin immediately. The government may incur unnecessary costs if requirements change before the contract is definitized. Defense acquisition regulations generally require UCAs to be definitized within 180 days of the UCA date or before more than 50 percent of the estimated contract price is obligated, whichever occurs first. During this period, progress payments are limited to 80 percent of work accomplished. DOD’s 2014 performance-based payments guide recommends that a UCA be awarded using progress payments first; performance-based payments should then be considered during the definitization process. Table 1 summarizes the conditions and rates applicable to progress payments based on costs and performance-based payments. Several offices and agencies within DOD have a role in managing contract financing. The office of DPC, within DOD’s Office of the Under Secretary of Defense for Acquisition and Sustainment, is responsible for all pricing, contracting, and procurement policy matters. This office formulates and oversees DOD-wide pricing policies and strategies supporting the procurement of major defense programs, including programs that use progress and performance-based payments. DCMA and other contract administration offices monitor contractors’ performance and management systems to ensure that cost, product, and performance are in compliance with the contract terms. DCMA generally maintains contract financing payment data for DOD progress and performance-based payments for contracts DCMA administers. Within DCMA, the Cost and Pricing Center supports DOD-wide analysis of contract data to support DOD-wide decision making, among other things. Contract financing has an impact on the price of negotiated contracts and, more generally, on the health and profitability of the defense contractor. On negotiated contracts, DOD requires contracting officers to use weighted guidelines, a structured approach used to develop profit objectives for individual defense contracts. DOD implements its profit policy through the weighted guidelines. As part of their efforts to determine the government’s negotiating position, including how much profit the contractor should receive under the contract, contracting officers are to consider various factors, including the degree to which the government is providing contract financing. Assuming other factors are held constant, the weighted guidelines suggest that the negotiated profit rate of a fixed-price defense contract might be 1 to 2 percentage points lower when the government provides contract financing. The contracting officer may vary the amount to consider other risk elements when establishing the government’s negotiating position. DOD-provided contract financing can also provide contractors higher rates of return on the amount of corporate funds contractors invest on that same contract. One measure of this benefit is “internal rate of return” (IRR), a tool that can be used to assess the impact of contract financing on overall contractor profitability. DOD’s 2001 Incentives Guidebook notes that IRR is one of the basic tools used by industry to determine where to invest its funds and assess the risks and potential rewards involved in contracting with the government or commercial entities. IRR is a measure that integrates both the contractor’s investment to produce the product and the profit earned on that product. In contrast to contracts in which the contractors must either self-finance or borrow from commercial lenders, when contractors receive financing on a contract from the government the contractor’s IRR can be significantly higher. Figure 1 provides a hypothetical example of how changes in the progress payment rate on a 40-month, fixed-priced contract affects the expected contract profit rate and the contractor’s IRR. As illustrated above, providing contract financing (in this case, progress payments) has a significant impact on the contractor’s IRR and a lesser impact on the actual profit that DOD expects the contractor to make. For example, if DOD provided no contract financing, the weighted guidelines would suggest a profit rate on this hypothetical contract of 13.8 percent, which would provide an internal rate of return to the contractor of 7.5 percent. If DOD provided progress payments at the customary rate of 80 percent, the weighted guidelines would suggest a profit rate on this hypothetical contract of 10.4 percent, or 3.4 percentage points lower than if no financing was provided. However, even though the contractor’s expected profit is lower, the IRR for the contract would increase to 30.9 percent, or a little more than four times what would be realized if the contractor had to finance the effort on its own. Several studies conducted by DOD, nonprofit organizations and GAO have assessed the impact of contract financing on contract profit or contractor profitability. These studies have generally found that, depending on the measure used, the defense industry generates high returns on investment. For example, In 1976, DOD’s Profit ‘76 study examined earnings’ relationship to capital investment and increased productivity. The Profit ‘76 study group concluded that government contractors were able to maintain higher profits by keeping investment low partly because DOD did not have profit policies in place to encourage investment in items such as facilities. As a result of the Profit ‘76 study, DOD made a number of changes to its profit policy to encourage corporate investment in facilities, among other things. In 1991, GAO suggested that using return on assets to measure profitability of defense contractors is beneficial because it recognizes how government financing can affect contractors’ levels of profitability. In 2008, the Institute for Defense Analyses reported that defense contractors generated high returns with low operating margins, in part because government-provided contract financing helped fund the contractors’ long, asset-intensive product cycles. According to DPC officials, however, the most comprehensive study of contract financing and profit policies was conducted by the DFAIR commission in 1985. We discuss this study in more detail below. Since the DFAIR commission issued its report in 1985, Congress and DOD have made a number of changes to the statutory and regulatory framework intended to (1) reduce the administrative burden associated with contract financing and (2) encourage the use of performance-based payments (see figure 2). Our review found that DOD paid less in performance-based payments after making some changes to contract financing policies, but started increasing these payments again in 2016. According to DPC officials, the most comprehensive study of contract financing and profit policies was conducted by the DFAIR commission in 1985. The DFAIR commission assessed, among other issues, whether DOD contract financing policies were equitable in maintaining the defense industrial base and cost-effective for DOD, the effectiveness of DOD contract financing policies as a means of encouraging contractor cost efficiencies, the profitability of defense work and its reasonableness in comparison with the profitability of the non-defense sector, and the interrelationship of DOD’s contract finance and profit policies. In evaluating contractor financing costs, DFAIR developed a model of a typical contract to use in calculating contractors’ contract financing costs, the amount of interest a contractor would have to pay if it were required to bear all those costs, and the effect of payment delays on contractor financing costs. The DFAIR commission reached a number of conclusions about DOD’s contract financing and profit policy in effect at that time. The study concluded that: The progress payment rate was appropriate for the time period studied but should be revised based on changes in short-term interest rates. DOD’s profit policy as reflected in the weighted guidelines at the time of the study did not explicitly take into account the cost of working capital (the difference between a contractor’s assets and liabilities). The profitability of individual defense contracts the commission reviewed had been consistently lower than the profit levels reported to have been negotiated by government contracting officers. DOD’s profit policy needed to be simplified and better integrated with contract financing policy. The study also concluded that there was a need to make DOD contract financing more responsive to economic conditions and that profit policy, contract financing, and contractor investment are related. We agreed with the conclusion that profit policy, contract financing, and contractor investment are related. We also highlighted the need for recurring DOD contract profitability studies using a generally accepted methodology in our 1986 report. Our work found that since the DFAIR study was issued, DOD made several changes to reduce the administrative burden associated with contract financing requirements. These changes included Elimination of flexible progress payments (1999) – DOD introduced flexible progress payments in 1981 as a new approach to contract financing. Under flexible progress payments, DOD contracting officers were to use the DOD Cash Flow Computer Model to develop an applicable progress payment rate for that contract. Under this approach, DOD specified the minimum percentage the contractor was required to invest and DOD would provide the remainder. The amount of contractor investment required by DOD varied from 5 to 25 percent, depending upon the year. Flexible progress payments were not allowed on contracts issued after November 11, 1993; the references were eliminated completely from the DFARS in 1999. Elimination of “paid cost rule” (2000) – The paid cost rule required large businesses to pay subcontractors before billing the government for payment. After DOD eliminated this rule in March 2000, large businesses were generally able to include subcontract costs incurred but not yet actually paid on progress payment requests to the government. Elimination of “financial need requirement” (2016) – Since 2000, one of the ways contractors could receive progress or performance- based payments under the FAR was on the basis of financial need or the unavailability of private financing. In that regard, an April 2013 DOD Inspector General report found that contracting personnel did not properly negotiate and verify contractors’ need for contract financing before authorizing performance-based payments. The Inspector General recommended that contracting personnel determine whether private financing is available to a contractor before authorizing performance-based payments. While DOD concurred with the recommendation, it subsequently amended the DFARS in 2016 to eliminate the requirement for DOD personnel to justify the use of contract financing for certain fixed-price contracts. In doing so, DOD stated it was in DOD’s best interests. Congress enacted the Federal Acquisition Streamlining Act (FASA) in 1994 to provide the executive branch with requirements to improve the process for acquiring goods and services. FASA, among other things, established performance-based payments “wherever practicable” as a form of contract financing. In 1995, the FAR Council amended the FAR to enable the use of performance-based payments up to a maximum amount of 90 percent of the contract’s price. In 2000, DOD issued a rule amending the DFARS to emphasize that performance-based payments were the preferred method of financing. The rule required contracting officers to consider and deem performance-based payments impracticable before deciding to provide progress payments. This rule was part of a larger effort by DOD to make contract financing procedures easier to understand and to simplify related provisions. DOD subsequently issued a user’s guide in 2001 to help its contracting personnel and contractors in using performance-based payments. Despite the provisions to encourage the use of performance-based payments when appropriate, DOD subsequently initiated department- specific actions that, according to industry officials, decreased the frequency with which they received performance-based payments on defense contracts. For example, the Under Secretary of Defense for Acquisition, Technology and Logistics’ September 2010 Better Buying Power memorandum instructed contracting officers to use progress payments as the basis for price negotiations. After the contractor and DOD contracting officer agreed on price using progress payments, contractors could propose using an alternate financing arrangement, including performance-based payments. The memorandum indicated that the rationale for this change was to provide increased incentives for contractor performance. In April 2011, the Director of Defense Procurement and Acquisition Policy (now known as DPC) issued a memorandum that focused on the “practicality” of performance-based payments, stating they “are not practical for use on all fixed-price contracts and require considerable effort between the contractor and Government.” The memorandum noted that if contractors wanted to use performance-based payments, then the contractor should submit a proposed schedule to include all performance-based payment events, completion criteria, and event values, along with the contractor’s expected expenditure profile. To implement its April 2011 performance-based payment policy, DOD issued a proposed rule to amend the DFARS in January 2012. This rule was finalized in March 2014. The 2014 version of the DOD performance-based payments user’s guide noted that performance-based payments are the preferred method only when they are deemed practical by the contracting officer. However, industry officials told us that they frequently cannot reach agreement with DOD regarding performance milestones, and therefore agree to the use of progress payments instead. The impact of DOD’s changes on the relative use of progress versus performance-based payments is uncertain. Between fiscal years 2010 and 2018, DCMA data indicates that DOD provided between $36 billion and $49 billion a year in contract financing on contracts DCMA administered. We found that nearly 98 percent of those contract financing payments were paid to medium and large defense contractors. We also found that the amount DOD paid out in performance-based payments on those contracts fell between 2010 and 2016 before increasing in 2017. In December 2016, Congress enacted Section 831 of the Fiscal Year 2017 NDAA to establish performance-based payments as the preferred type of contract financing for DOD in statute. Section 831 also directed the Secretary of Defense to ensure that nontraditional defense contractors and other private sector companies are eligible for performance-based payments, in line with best commercial practices. Figure 3 shows the differences in DOD’s progress and performance-based payments between fiscal years 2010 and 2018 for contracts administered by DCMA. In August 2018, DOD introduced a proposed rule that was intended to use contract financing rates to help incentivize contractor performance and to implement Section 831. The proposed rule would have set a base progress payment rate for large businesses (specifically, for other than small businesses) at 50 percent and small businesses at 90 percent. At the same time, however, the proposed rule provided opportunities to increase the rate if the contractor achieved certain enterprise-wide priorities such as meeting contract delivery dates. The proposed rule also eliminated some of the administrative requirements associated with performance-based payments to encourage their use. According to DPC officials, the rates would be subject to an annual adjustment based on the performance criteria provided in the rule. Table 2 summarizes key aspects of the proposed rule. DOD officials acknowledged that if implemented, contractors would initially receive a lower level of contract financing, but believe with improvements in their overall performance contractors would eventually receive much higher levels of financing than currently provided. Industry officials voiced a number of concerns about the proposed rule at the January and February 2019 public meetings held after the rule was proposed, as well as in our interviews with them. For example, these officials noted that the proposed rule would change the intent of contract financing from a means of assisting contractors to help meet short-term expenses to a mechanism for ensuring compliance with contract terms and conditions on an enterprise-wide basis. Industry officials said they believe compliance with contract terms and conditions should be addressed on a contract-by-contract basis. Further, industry officials stated that the changes suggested in the proposed rule could negatively impact the health, competitiveness, and resiliency of the defense industrial base and introduce significant uncertainty as to how much contract financing DOD would provide. Additionally, industry officials noted that the rule did not contain specific implementation details in such areas as whether the incentives would be applied on an enterprise-wide basis and how to ensure the data were reliable. DOD withdrew this rule in October 2018, citing the need to conduct additional outreach with industry regarding contract financing methods. Subsequently, DPC held three public meetings in January and February 2019 to obtain public comments on revising policies and procedures for contract financing, performance incentives, and associated regulations prior to proposing a new rule. DPC provided no timeframes for doing so. DOD officials issued the proposed rule in April 2019 to implement Section 831’s statutory preference for performance-based payments for public comment. The proposed rule notes that performance-based payments are the preferred method of contract financing at DOD whenever practicable. The period for public comments ends on July 1, 2019. DOD officials indicated that they hope to issue a final rule in early 2020. DOD has not conducted a comprehensive assessment of the impact of its contract financing and profit policies on the defense industry since the DFAIR study was completed in 1985. In the intervening time, there have been significant changes in the composition of the defense industry, business practices, and economic conditions. In December 2018, DPC officials acknowledged the need to assess contract financing policies against market and economic conditions on an ongoing basis and determine the effect these policies have on the defense industry, but did not provide a timeframe for doing so. DOD officials acknowledged that the department has not done a comprehensive assessment of how its contract financing policies affect the defense industry since the DFAIR study was issued in 1985. DOD had previously stated its intent to do such an assessment on a regular basis. Specifically, in 1991 DOD noted that it would issue progress payment rates each February. DOD also noted that it would use the methodology from the DFAIR study to determine the progress payment rate based on short-term commercial interest rates. However, DOD removed the DFARS provision related to flexible progress payments in 1999. Overall, we found that DOD has adjusted the progress payment rate five times since the DFAIR study was completed, but only adjusted the progress payment rate twice since 1991 when DOD indicated its intent to assess the rate annually. DOD last changed the progress payment rate in 2001 (see table 3). Since the DFAIR study was conducted and DOD last assessed progress payment rates, DOD and industry officials noted that the composition of the defense industry has changed, as we have noted in our prior work. For example, in 1997, we reported that the end of the Cold War and the subsequent declines in DOD budgets resulted in, among other changes, a reduction in the number of defense contractors through various mergers and acquisitions. In our current work, DPC officials pointed to a changing proportion of subcontractors relative to prime contractors. Industry officials also identified the emergence of contractors who do not typically work with DOD and technology companies into the defense sector as an issue that should be considered when looking at contract financing and profit policies. According to industry officials, the industrial base has moved away from heavy industrial manufacturing toward technology and more sophisticated industry partners, including contractors who do not typically work with DOD. These officials noted that these contractors may not be eligible for contract financing because they may not have an approved cost accounting system needed to receive progress payments. In that regard, in July 2017, we reported that one company conducted a study that determined it would take at least 15 to18 months and millions to establish a government-unique cost accounting system. Industry officials also noted that the emergence of high-technology companies may pose a challenge to traditional defense contractors in terms of attracting financing and investment from commercial and private investors at competitive rates. Industry officials also identified changing business practices, including the increased use of UCAs, which affect their ability to use performance- based payments. Industry officials stated that it is more difficult to negotiate performance-based payments on UCAs, noting that DOD’s guidance suggests that performance-based payments should not be provided for UCAs until definitization occurs. Our review of DOD’s semi- annual reports to Congress on the use of UCAs found that the number of UCAs and unpriced change orders reported by DOD has varied between March 2014 and September 2018 (see figure 4). DOD reported that the total not-to-exceed dollar value of all UCAs and unpriced change orders was approximately $76 billion as of September 2018. Finally, market and economic conditions have changed since the DFAIR study. For example, at the time of the DFAIR study, short-term interest rates were around 8 percent, whereas the short-term interest rate in 2018 was 2 percent. Figure 5 shows the changes in short-term interest rates and inflation since 1980. Industry officials noted, however, that a comprehensive economic assessment of defense industry returns and the cost of contract financing policies should be conducted. For example, they noted that a reduction to progress payment rates in times of higher interest rates would increase their cost of working on complex contracts. Industry officials acknowledged that while interest rates have been low, they anticipate rates increasing in the near future. DPC officials acknowledged that DOD’s August 2018 proposed rule did not assess the proposed rule’s impact on the health and profitability of the defense industry. DPC officials noted that since the proposed rule was focused on incentivizing contractor performance, DOD’s supporting analysis did not include an assessment of how the proposed rule would impact the overall profitability of defense contractors (such as assessing the impacts to a contractor’s internal rate of return) or of the profitability of defense work relative to non-defense industry opportunities. Rather, DOD’s analysis estimated the total financial impact the rule would have on large and small contractors primarily based on interest costs. Further, DOD stated in its supplementary material that it did not consider the extent to which the contract profit policy (in the form of weighted guidelines) would need to be adjusted given the proposed rule changes. DPC officials explained that changes to the weighted guidelines would need to consider how such changes would support the intent of providing higher rates of contract financing for higher levels of contractor performance. If DOD were to only propose a change to the progress payment rate, DPC officials acknowledged that such an assessment should consider what changes, if any, would need to be made to the weighted guidelines. DPC officials said they conducted an informal analysis that assessed contractor profitability, but this analysis was not made publicly available. In December 2018, DPC officials acknowledged the need to assess contract financing policies against market conditions on an ongoing basis and determine the effect these policies have on the defense industry. GAO’s Standards for Internal Control in the Federal Government call for monitoring the effectiveness of systems and policies throughout an organization on a recurring basis. Until DOD conducts a comprehensive assessment and updates that assessment on a recurring basis, it will not be in a position to understand whether current or future contract financing policies are achieving their intended objectives. DOD and industry officials have acknowledged that the defense industry, economic and market conditions, legislative and regulatory requirements, and business practices have all changed since the issuance of the DFAIR study in 1985. Despite this recognition, DOD has not conducted a comprehensive assessment of how its contract financing policies affect the defense industry in more than 30 years. Without assessing the collective impact of these changes, DOD may be assuming too much financial risk or providing contractors with levels of working capital that are not commensurate with what is needed to help finance long-term projects, and affecting its ability to attract new entrants into the defense market. That assessment, however, should not be a one-time effort. A prior DOD study, our work, and the department have acknowledged the need to do so on a regular and recurring basis. Without a comprehensive and systemic assessment, conducted on a recurring basis, of DOD’s contract financing policy’s effect on the defense industry, DOD will not be in a position to understand whether current or future policies are achieving their intended objectives. We recommend that the Acting Secretary of Defense direct the Under Secretary for Acquisition and Sustainment to ensure it conducts a comprehensive assessment of the effect that its contract financing and profit policies have on the defense industry and update that assessment on a recurring basis. (Recommendation 1) We provided a draft of this report to DOD for review and comment. DOD provided written comments, which are reprinted in appendix I, and concurred with our recommendation. In concurring with our recommendation, DOD stated it would seek fiscal year 2020 funds to contract a study on DOD contract financing policies and their effect on the defense industry. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of the report to the Acting Secretary of Defense; the Principal Acting Director, Defense Pricing and Contracting; the Director, Defense Contract Management and Agency; the Director, Office of Management and Budget; the Administrator for Federal Procurement Policy, and appropriate congressional committees. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3665 or dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. In addition to the contact named above, Bruce H. Thomas, Assistant Director; Lorraine Ettaro, Elizabeth Field, Gina Flacco, Stephanie Gustafson, Kristen Kociolek, John Lopez, Beth Reed Fritts, Miranda Riemer, Anne Stevens, Megan Stewart, Anne Louise Taylor, Alyssa Weir, Robin Wilson, and Alex Winograd made key contributions to this report.", "summary": "Each year, DOD provides contractors with billions of dollars in contract financing on fixed-price contracts for major weapons systems and other long-term efforts. Contract financing helps contractors manage expenses until they begin delivering the contracted items to DOD. Contract financing can take several forms, including progress payments based on the cost incurred by the contractor, and performance-based payments, in which the government pays the contractor an agreed-to amount for achieving certain milestones. DOD last performed a comprehensive assessment of its contract financing polices in 1985. The Conference Report accompanying the Fiscal Year 2019 National Defense and Auhorization Act included a provision for GAO to analyze the level of financing currently provided to contractors, among other things. This report (1) describes changes in DOD contract financing policy since 1985 and (2) assesses the extent to which DOD has analyzed the effect of its contract financing policies on the defense industry. GAO assessed relevant legislation and DOD regulations; obtained data on DOD's use of progress and performance-based payments from fiscal years 2010 through 2018; and interviewed cognizant DOD and industry officials. Congress and the Department of Defense (DOD) have changed the contract financing legislative and regulatory framework since DOD last performed a comprehensive assessment, including eliminating a requirement that contracting officers justify a need for contract financing and establishing a preference for performance-based payments. However, Defense Contract Management Agency data indicates that the amount of performance-based payments it administered fell from 2010 to 2016 (see figure). DOD officials acknowledged that DOD has not comprehensively analyzed how its policies affect the defense industry since 1985. Industry and economic conditions, however, have since changed, including lower interest rates and the emergence of contractors who do not typically work with DOD. In August 2018, DOD proposed introducing performance-based elements into its process for setting progress payment rates. DOD officials stated that since the proposed rule focused on incentivizing contractors' performance, they did not assess how it would affect defense contractor profitability or whether other financing or profit policies changes would be needed. DOD withdrew the proposed rule in October 2018. GAO's Standards for Internal Control in the Federal Government call for organizations to monitor the effectiveness of their policies on a recurring basis. In December 2018, DOD officials acknowledged the need to do so. Until DOD conducts a comprehensive assessment and ensures they are done on a recurring basis, it will not be in a position to understand whether current or future contract financing policies are achieving their intended objectives. GAO recommends that DOD ensure it conducts a comprehensive assessment of the effect that its contract financing and profit policies have on the defense industry and update that assessment on a recurring basis. DOD concurred with the recommendation.", "document_type": "gao"}
{"report": "Schools generally report incidents of restraint and seclusion to their district, and districts are responsible for reporting incidents of restraint and seclusion to Education’s CRDC. Districts are expected to report the number of incidents and the number of students affected for all schools in their district and to use Education’s definitions of restraint and seclusion to determine whether an incident occurred. Education defines two types of restraint: physical and mechanical (see table 1). Education’s definition of a physical restraint makes a distinction between a restraint and a physical escort. Similarly, Education’s definition of seclusion makes a distinction between seclusion and a timeout (see figures 1 and 2). Every two years, OCR administers the CRDC to nearly every public school district in the country. In turn, districts self-report information on a wide variety of topics, including course offerings, discipline, and restraint and seclusion. Education collects these data through an online submission tool. CRDC activities, such as data collection and quality, are managed by a company under contract with Education. The data submission period for the 2017-18 school year ended June 21, 2019. School districts have one year from the end of the submission period to make a request to amend submitted data. As of March 2020, Education had not announced when it will publicly release these data. Education’s primary data quality checks for the CRDC data, including the restraint and seclusion data, are built into the CRDC submission tool. The online CRDC submission tool automatically performs checks that flag data errors or potential errors. These “business rules” occur in real time as districts enter data or after they upload files. The 2015-16 submission tool used three business rules related to restraint and seclusion; for the purpose of this report, we focused on the two rules most relevant to our work. The first business rule pertains to the reporting of zeros for very large districts only—that is, those districts with 100,000 or more enrolled students (see fig. 3). If a very large school district enters zero incidents of restraint and seclusion, it receives a message prompting it to review its enrollment counts and reported incidents, or provide an explanation using a reason code and comment. Importantly, if districts have not collected the data required for the CRDC—or if the data are unavailable for some other reason—districts are to leave relevant data cells blank. A zero in a data cell should represent an actual count— that is, the district restrained or secluded zero students. The second rule applies to schools that both report more than 100 incidents of restraint or seclusion and enter a greater number of students affected by restraint or seclusion than the number of incidents reported (see fig.4). Districts are asked to resolve this error by adjusting their counts so the number of students subjected to restraint or seclusion is less than the number of incidents of restraint or seclusion, or to provide an explanation using a reason code and comment. The last step in the data submission process is the district certification. To complete this step, the district superintendent or an authorized designee must indicate agreement with a statement that acknowledges that they are responsible for verifying the data, the information provided is “true and correct,” and a willfully false statement is punishable by law. The CRDC submission tool is designed so that it should not allow a district to certify its submission unless all required data pass the system validation checks, or all errors are explained. Education also reviews CRDC data quality during other phases of data collection to identify potential data quality issues to improve future collections. For school year 2015-16, Education’s contractor reviewed data quality during and after the collection phase. Education’s contractor contacted school districts about potential errors that Education determined were easily adjustable and asked them to review and correct data or provide an explanation if no corrections were determined to be necessary. Further, some states and school districts have laws, regulations, and/or policies regarding restraint and seclusion. These laws vary from state to state, and sometimes require schools or districts to annually report incidents of restraint and seclusion to either the state or local education agency. In January 2019, Education announced an initiative to address inappropriate use of restraint and seclusion on children with disabilities. As part of this initiative, OCR announced plans to conduct 50 data quality reviews of the 2015-16 restraint and seclusion CRDC data submitted across each of OCR’s 12 enforcement regions. This review had not been completed at the time of our review. In August 2019, Education announced plans for OCR to work collaboratively with Education’s National Center for Education Statistics (NCES). Education stated that the collaboration would help ensure that CRDC data are reliable and authenticated in a manner that provides a more accurate picture of key civil rights issues in education. According to the announcement, under a new agreement, NCES and OCR will work together to improve the quality of the CRDC data by providing school districts with technical assistance, and by reviewing and revising data quality procedures. NCES is the primary federal entity responsible for collecting and analyzing statistical data related to education. We identified four key issues for which Education’s quality control processes for its CRDC restraint and seclusion data are largely ineffective or do not exist (see table 2). Education’s business rule to detect potentially erroneous reporting of zero incidents applied to only 30 of the more than 17,000 school districts nationwide, rendering it largely ineffective for checking the 70 percent of districts that reported zero incidents of restraint or seclusion. This is because the rule only applied to districts with over 100,000 enrolled students. However, in its January 2019 data quality review of 50 districts’ restraint and seclusion data, OCR found erroneous reporting of zeros in districts of all sizes. Of the 50 districts OCR contacted, OCR determined that 40 districts should amend their original 2015-16 submissions. When we analyzed the 2015-16 CRDC restraint and seclusion data, we found that almost three-quarters of small districts reported zeros, while about one-third of large and one-fourth of very large districts reported zero incidents (see table 3). The findings from Education’s data quality review, along with those from our analysis, suggest that misreporting is a problem among districts of all sizes. For the 2017-18 CRDC data collection, Education lowered the threshold for the rule to detect potentially erroneous reporting of zeros to include districts with 50,000 enrolled students, rather than only districts with more than 100,000. However, the new rule counts students with disabilities and students without disabilities separately. To trigger the rule, a district would have to have at least 50,000 students with disabilities and report zero incidents for them, or have at least 50,000 students without disabilities and report zero incidents for them. Of the nation’s more than 17,000 school districts, only 3 (Chicago, Los Angeles, and New York) have at least 50,000 students with disabilities; only 95 have at least 50,000 students without disabilities. Education’s CRDC data show that restraint and seclusion disproportionately affect students with disabilities and its data quality review showed that substantial portions of districts of all sizes inaccurately reported zeros. However, Education could not provide a data-driven basis for the 100,000 or 50,000 student enrollment thresholds or for creating separate thresholds for students with and without disabilities. Rather, Education stated that the thresholds were a management policy decision inherited from previous administrations. Because Education’s business rule targeting districts that report zeros was inadequate, in June 2019, GAO recommended, among other things, that for the 2017-18 data collection Education contact districts that reported all zeros for restraint and seclusion to ask them to ensure that the zeros actually represented zero incidents, and Education did so after the data collection closed. Absent a business rule targeting all districts reporting zeros during data submission, inaccuracies in future data collections will likely be missed, and Education risks expending more time and resources with repeated manual follow up after the fact. Federal standards for internal control state that management should evaluate both internal and external sources of data for reliability. Absent reliable and accurate data, the public’s confidence in the CRDC restraint and seclusion data may be further undermined, and the utility of a dataset intended to assist with federal civil rights monitoring, enforcement, and oversight will remain limited. While it is clear that some school districts have reported inaccurate restraint and seclusion data, Education officials do not fully understand why this is occurring. In technical comments on a draft of this report, Education stated that it is committed to learning more about why this is occurring. While we do not know all of the reasons districts fail to report accurate data, our interviews with over 50 school and district officials provide some insight. School officials in the nine districts we visited cited a variety of reasons districts might not report, including that they were not collecting the data because their state did not require reporting, and that their school district only required them to collect data for students with Individualized Education Programs (IEPs). More fully understanding why districts report inaccurate data is key to correcting the issue. Federal standards for internal control also state that managers should use quality information to achieve the entity’s objectives, assess the risks facing the entity as it seeks to achieve its objectives, and use this assessment to develop appropriate risk responses. By not identifying school districts’ reasons for reporting zero incidents of restraint and seclusion, Education will not know how to best support districts in improving the accuracy of their reported data. Future CRDC data will remain inaccurate, significantly limiting the utility of a key tool on which OCR relies to help it enforce federal civil rights laws. Education has no business rules that flag school districts reporting very low or very high rates of restraint or seclusion, nor has it completed initial efforts to determine a range of rates that might warrant further exploration. Given widespread concerns about misreporting, we devised two possible ways to test for these types of outliers. First, we looked beneath the district level to examine school-level reporting patterns within districts. When we tested the nation’s 30 largest school districts (those with more than 100,000 students), we found patterns that may suggest underreporting in at least 13 of them, in addition to the 10 that reported zeros for the 2015-16 school year. In these 13 districts, we found that all of the incidents of restraint reported occurred in no more than 15 percent of a district’s schools; the rest of the schools in those districts reported zero incidents. (See fig. 5.) For example, the Chicago Public School District—the third largest school district in the country, with nearly 400,000 students enrolled—reported a total of 47 incidents of restraint for school year 2015-16. All of these incidents were reported by just two of its 579 schools. The district’s six incidents of seclusion were clustered in one school. In the Los Angeles Unified school district, the second largest school district in the country, 82 of its 785 schools reported a total of 108 incidents of restraint, with 65 schools reporting exactly one incident each. The district reported no incidents of seclusion. Education has a business rule that targets large districts (for 2017-18, those with over 50,000 students), but only when all schools in a district report zeros. Thus, as long as a large district reports at least one incident of either restraint or seclusion, the business rule would not be triggered. Education’s post-collection data quality reviews for school year 2015-16 did not test below the district level to look for potential underreporting within a district. Second, we tested for outliers by comparing per capita rates of restraint or seclusion in the 30 very largest districts (over 100,000 students enrolled) to average rates in all school districts. In the 30 districts, we found that in addition to the 10 districts that reported zeros, nine districts reported fewer than three incidents of physical restraint per 10,000 students, which is lower than 95 percent of all districts reporting incidents. (See fig. 6.) For example, DeKalb County school district in Georgia reported 0.3 incidents per 10,000 students, and Charlotte Mecklenburg school district in North Carolina reported 0.5 incidents per 10,000 students. We also tested for districts with very high rates of physical restraint. For the 2015-16 school year, we found 52 districts that were outliers, most of which served comparatively large populations of students with disabilities. Forty-nine of these 52 districts had rates of physical restraint per enrolled student higher than 99 percent of all districts that reported incidents of physical restraint. Almost half reported an average of 10 or more incidents per student affected, and almost two-thirds of the districts reported restraining from 25 to100 percent of their students. The Learning Tree preschools in Alabama, which enrolled a combined 135 preschool students ages 3 to 5, reported that it restrained nearly two-thirds of its students in school year 2015-16. Further, Learning Tree reported 5,963 incidents of physical restraint affecting 84 students, or an average of 71 incidents of physical restraint per preschooler. The Morris-Union Jointure Commission School District in New Jersey, where almost all of its 281 students were identified as having a disability, reported restraining over one-third of its students. These students were restrained an average of 20 times in school year 2015-16. (See table 4.) We found a similar pattern in the 2015-16 seclusion data, identifying 36 outlier school districts. For 22 of the 36 districts, the rates of seclusion were higher than 99 percent of districts reporting. (See appendix IV for more information.) For example, CRDC data for the Sangamon Area Special Education District in Illinois, which enrolled 74 students in grades 1 through 12, showed the district secluded one-third of its students an average of 27 times each in school year 2015-16. Similarly, data for the Bi-County Special Education Cooperative, also in Illinois, showed the district secluded over two-thirds of its 48 enrolled students an average of 13 times each in school year 2015-16. Federal standards for internal control state that management is to determine if controls individually and in combination with other controls are capable of achieving an objective and addressing related risks. An internal control design may be deficient when a control necessary to meet an objective is missing. Without business rules or similar analytical processes to flag these outliers, they may continue to go undetected by Education and other stakeholders. Education may be missing an opportunity to identify districts with disproportionately low or high incidents of restraint and seclusion to determine where technical assistance or other intervention may be warranted. Such information is particularly critical given widespread concerns about underreporting and misreporting, and its stated interest in protecting students’ civil rights. Education has a business rule that identifies illogical data; that is, when schools report more students affected than incidents of either restraint or seclusion. However, the rule is largely ineffective because it was not designed in a way that would detect logical inconsistencies in the majority of cases, as the rule would have only applied to schools with at least 100 incidents. When we tested Education’s rule on the 462 schools that reported at least 100 incidents in 2015-16, we found no logical inconsistencies in the data. However, when we tested the rule on all schools, we found logical inconsistencies in the data reported by 592 schools with fewer than 100 incidents. For example, a school in Indiana reported that it restrained 156 students, but only reported 80 incidents. (See table 5.) Education could not provide any data-driven basis for its threshold of 100 incidents for this business rule. Education officials said that the threshold was inherited from previous administrations’ business rules. Collecting accurate data is key to the Office for Civil Rights’ (OCR) mission to ensure equal access to education and to promote educational excellence throughout the nation. In addition, federal standards for internal control state that when evaluating the design of internal controls, such as business rules, management should determine if controls are capable of achieving an objective and addressing related risks. An internal control design is deficient if, even though it operates as designed, it does not meet the control objectives. Our analysis shows that the business rule is not effective in its current form, because 592 schools were able to report illogical, and therefore incorrect, data. We talked to more than 50 officials in nine school districts in Kentucky, Washington, and Wisconsin about their interpretations of the CRDC’s definitions of restraint and seclusion. These school districts all reported incidents of restraint and seclusion in 2015-16, but officials we interviewed differed in their interpretations of terms used in the CRDC definitions, such as alone and escort. As a result, districts varied in how they counted incidents of restraint and seclusion. Further, officials we spoke with in the three state educational agencies and all seven stakeholder groups with expertise on the use of restraint and seclusion in public schools also said there was ambiguity regarding terms used in the definitions. For example, an official from one stakeholder group that represents some of the nation’s largest school districts said that its constituents provided feedback that restraint and seclusion terms were ambiguous, open to interpretation, and do not provide enough clarity. Civil Rights Data Collection Definition of Seclusion: Seclusion is the involuntary confinement of a student alone in a room or area from which the student is physically prevented from leaving. It does not include a timeout, which is a behavior management technique that is part of an approved program, involves the monitored separation of the student in a non- locked setting, and is implemented for the purpose of calming. With respect to the definition of seclusion, district and school officials varied in their interpretations of the word alone, and consequently, whether the incident should be counted as seclusion. Officials in three districts said that an incident was not seclusion as long as a teacher was in the room with the student, while officials in several other districts said that even if a teacher was present, it could still be seclusion if the student was prevented from leaving. (See sidebar.) Officials in the nine districts we visited also varied in their interpretation of the word area. Because the CRDC’s definition of seclusion states that seclusion can occur in an area, officials from one stakeholder group representing thousands of school administrators wondered whether it should be considered seclusion if a child is in a classroom with 20 other students and is required to stay alone in the corner of the room. Officials from a district in Wisconsin said that if a student is taken away from peers and placed in one area of the same room, but cannot leave that area, it still might be seclusion, even if the student and peers are in the same room. Officials in another district in Wisconsin said that sending a student to a corner does not count as seclusion. However, they said that the use of mobile partitions to close off an area of a room could constitute seclusion. The phrase physically prevented from leaving also elicited differing interpretations. Officials from the stakeholder group representing administrators said the definition is not clear about what counts as “prevented from leaving”: a barrier, such as a door; the presence of another adult watching the child; or both. School officials we spoke with had differing interpretations of this phrase, which affected how they counted and reported incidents of seclusion. School officials in a district in Kentucky said that the phrase means closing the door and keeping it closed. However, officials in another school in the same district did not specify the use of a door, stating instead that “physically prevented from leaving” means the student cannot walk out of the room. A school official in Washington said that it would count as seclusion if staff put a student in a motorized wheelchair in a room and deactivated the wheelchair’s power. Civil Rights Data Collection Definition of Physical Restraint: Physical restraint is a personal restriction that immobilizes or reduces the ability of a student to freely move their torso, arms, legs, or head. The term does not include a physical escort. Physical escort means a temporary touching or holding of the hand, wrist, arm, shoulder or back for the purpose of inducing a student who is acting out to walk to a safe location. With respect to the definition of physical restraint, school district officials we interviewed varied in their interpretations of the term escort, which the CRDC definition specifies is not a physical restraint. (See sidebar.) While officials in three districts said that an escort meant providing a physical prompt to a student who was not resisting relocation, officials in four districts said that moving a student who was resisting staff still counted as an escort. For example, officials in a school in Wisconsin said that if the student who is resisting is “carried away” from a location, that action would not meet the definition of escort and would count as restraint. Yet a district in Kentucky counted moving students against their will—including by carrying them—as escorts and did not report them as restraints. Further demonstrating differing interpretations of these terms, officials in four districts said they reported all escorts as restraints in the CRDC. Education does not provide schools or school districts with any information that could help clarify its definitions or provide examples on how schools and school districts should apply the definitions of restraint and seclusion to common classroom situations. For example, while Education’s “Restraint and Seclusion: Resource Document” includes the CRDC definitions of restraint and seclusion, it does not include clarifying information or examples about how to apply the definitions. Officials in the schools and districts we visited inconsistently interpreted the definitions for restraint and seclusion; moreover, officials from the seven stakeholder groups we interviewed said the definitions were unclear. These findings raise concern about whether restraint and seclusion data reported by school districts to the CRDC are being reported in a way that is consistent with the CRDC definitions. Federal guidance on data reliability states that data should be well defined enough to yield similar results in similar analyses. In addition, federal standards for internal control state that agency management should use quality information to achieve the entity’s objectives, noting that such data should be reasonably free from error and bias and faithfully represent what they purport to represent. Absent data on restraint and seclusion that is what it purports to be, Education will continue to lack quality information key to fulfilling its mission of ensuring equal access to education nationwide. Officials in all nine school districts we visited said they used their data on restraint and seclusion to help reduce its use. In addition to collecting data for CRDC reporting purposes, these districts also collected and used more current and more detailed data to help reduce the use of restraint and seclusion. Officials in seven of the nine districts said they began collecting the data when their state passed a law requiring reporting. District officials identified several benefits to collecting data and using it to develop strategies to reduce use of restraint and seclusion. Specifically, officials said that the data helped them identify the following: Behavior patterns. Officials in several districts told us that collecting and reviewing data on restraint and seclusion helps them identify patterns in staff and student behavior that may contribute to use of these practices. Specifically, by identifying the circumstances under which a student’s behavior tends to escalate, staff can strategize how to more effectively respond so as to prevent the need to use restraint or seclusion. For example, one official in an elementary school in Wisconsin said that if staff notice more incidents occur on particular weekdays, they can examine those days to understand what may be affecting students’ behavior. Similarly, a teacher of students with autism in a middle school in Washington said that reviewing data helps staff, such as teachers, paraprofessionals, and administrators, determine what triggered a student’s behavior and then determine what to do differently to avoid triggering the student. In all three states, we visited districts that required staff to participate in a debriefing after each incident in an effort to understand what might have triggered the event and to discuss strategies to deescalate future incidents. For example, officials in Washington said that the building administrator and all staff involved discuss every incident. District officials consider this an important step for reducing use of restraint and seclusion, and said holding the discussions was a “game- changer.” Need for training. Officials in several districts said they examine data on restraint and seclusion at the classroom and school level to determine if staff need additional training, including on how to manage student behavior, or appropriately use restraint or seclusion. For example, a behavior coach for a Kentucky school district said that the data on restraint and seclusion helps her determine if certain teachers could benefit from more training on de-escalation techniques. A director of student services in Washington said that he was concerned about the rates of restraint and seclusion in the district, and after implementing more training for teachers, the rates declined. Officials in another Washington district said that after the district began collecting data in response to state law, they discovered that staff were using restraint and seclusion as punishment. As a result, district officials said that they coached teachers on how to manage behavior differently and emphasized that restraint and seclusion should not be an everyday occurrence. Officials at an elementary school in Wisconsin said that de- escalation training helps staff understand that students are trying to communicate with their behaviors. They said that when staff adopt the perspective that students are trying to communicate, staff also see the value of collecting data to improve how they respond to the students’ behaviors. Need for student supports. Officials in five of the nine districts we visited spoke about using restraint and seclusion data to assess when a student required additional support services to be successful in the classroom. For example, officials in one district in Kentucky said their data provides evidence for obtaining additional staff or social emotional learning resources for students. Similarly, officials in one Wisconsin district said the data can be used to allocate funding for school-based services to help address underlying causes of behavior. Officials in another Wisconsin district said that a jump in restraints or seclusions of a particular student could indicate that the student’s individualized education program needs to be adjusted. Officials in all the districts we visited also shared strategies on how they improved their CRDC data reporting, including communicating with staff about how data are used, training on how to report, and developing processes that encourage reporting. Specifically: Communication and culture. Officials in the majority of school districts said they routinely reviewed their data with school staff and emphasized the value of collecting data on restraint and seclusion. Officials in a district in Wisconsin said that they monitor data on restraint and seclusion on a monthly basis for students with and without disabilities, which increases interest among school staff about what causes the incidents. Officials in three districts we visited said that they explain to staff that documenting incidents of restraint or seclusion ensures that students obtain the support services they need. In a Wisconsin district, officials said they emphasize that reporting helps the students and keeps the school safe by making the district aware that more supports are needed. Officials at a school in Wisconsin said that some staff might worry that the data reflect poorly on them or might fear repercussions, but district officials have worked to shift the culture of reporting to focus on continuous improvement and problem solving. Similarly, officials in another Wisconsin district said that schools might be concerned about the data being used against them; therefore, district officials try to create a culture of curiosity around the data, rather than a culture of punishment. Accountability. To encourage staff to report incidents, officials in some districts developed processes that increased accountability for reporting. For example, school officials at an elementary school in Wisconsin said an administrative assistant in the main office immediately logs calls from classroom teachers requesting help managing a student’s behavior. Officials said this process provides accountability. Two districts said that they used a team approach for restraint or seclusion, which included someone to observe and someone to record details of the intervention, such as the time it began or the events that preceded it. Having multiple people involved increased the likelihood that relevant facts were recorded. Officials in a district in Washington said that keeping teachers and staff honest about reporting requires reiterating the process and procedures, reviewing the forms with staff, and following up with schools that fail to submit reports. Officials in a district in Wisconsin said they have advised staff to write the incident down on paper until staff are able to enter it in the district’s electronic reporting system. Training. Officials from all nine districts said they encourage reporting by provided training on how to report incidents. Generally, this information was incorporated into trainings on when to use restraint and seclusion and how to deescalate a student’s behavior. Officials from five stakeholder groups we interviewed, all of whom have expertise related to the use of restraint and seclusion in public schools, stated that training was necessary to both raise awareness of the requirement to report incidents and to ensure that incidents were reported accurately. For example, in de-escalation training for teachers in a Washington district, the trainer provides examples of restraint and seclusion; presents a variety of scenarios, including ambiguous ones, for discussion; and reviews the appropriate staff response. The Civil Rights Data Collection (CRDC) is a longstanding and critical aspect of Education’s Office for Civil Rights’ overall enforcement and monitoring strategy. Collecting accurate data through the CRDC can help Education in its mission to ensure equal access to education, promote educational excellence for all, and enforce various federal civil rights laws prohibiting discrimination on the basis of race, color, national origin, sex, and disability. However, the significant data quality problems that both Education and we identified with the CRDC data on restraint and seclusion, combined with the significant weaknesses we found in Education’s data quality control processes, cast serious doubt on the accuracy of these data. As a result, it is impossible to accurately determine the frequency and prevalence of restraint and seclusion among K-12 public school students. The four recommendations in our June 2019 report urged Education to take immediate steps to address the widespread potential misreporting of zeros for its 2017-18 CRDC. Education took some steps to address the issues we raised, but has not yet fully addressed them. Moreover, those recommendations were intended as stop-gap measures to improve the quality of the 2017-18 data being collected in real time precisely because the CRDC’s business rules related to restraint and seclusion are inadequate. Therefore, addressing our recommendations would not solve the issues that are the subject of this report. Our work makes it clear that an overhaul of the quality control processes is needed to correct fundamental problems with federal restraint and seclusion data collected through the CRDC. Two of the CRDC’s key business rules meant to check data quality and flag potential errors in restraint and seclusion data are poorly designed and the thresholds that trigger these rules have no data-driven basis. Further, Education does not have business rules designed to flag outlier schools and school districts that report relatively low or high rates of restraint and seclusion, nor has it determined a range of rates that might warrant further exploration. Until Education more fully understands why so many school districts are underreporting and misreporting federal restraint and seclusion data, it will likely not be able to help districts improve their reporting, thereby improving the accuracy and utility of the data. There were widely varied interpretations of federal restraint and seclusion definitions among the 50 school and district officials with whom we spoke and officials from the seven key stakeholder groups we interviewed echoed these concerns. As a result, we have concerns that school districts may be inconsistently counting and reporting instances of restraint and seclusion for federal reporting purposes. Clarifying the definitions, for example by explaining to districts how they can be applied to common classroom scenarios, could help produce more consistency in reporting. Ultimately, the issues we found with Education’s restraint and seclusion data have consequences for the students who are restrained or secluded in school and whose restraint or seclusion goes un-reported. When federal data are misreported to the public, it undermines confidence in that data and fails to provide decision makers with reliable information on which to make informed policy decisions to protect students. In addition, Education lacks information that could help it determine whether schools’ use of these practices may be excessive, discriminatory, or both. GAO is making six recommendations on restraint and seclusion to the Department of Education’s Office for Civil Rights. The Assistant Secretary for the Office for Civil Rights should revise its CRDC business rule to require that every school district reporting zeros, regardless of district size or numbers of students with disabilities, affirm the zeros are correct during the CRDC data submission process. (Recommendation 1) The Assistant Secretary for the Office for Civil Rights should develop and implement a CRDC business rule that targets schools and school districts that report very low numbers of incidents and set data-driven thresholds to detect such incidents. (Recommendation 2) The Assistant Secretary for the Office for Civil Rights should develop and implement a CRDC business rule that targets schools and schools districts that report very high number of incidents and set data-driven thresholds to detect such incidents. (Recommendation 3) The Assistant Secretary for the Office for Civil Rights should apply the CRDC business rule targeting illogical data at the school level to all schools, regardless of the number of incidents reported. (Recommendation 4) The Assistant Secretary for the Office for Civil Rights should identify the factors that cause underreporting and misreporting of restraint and seclusion and take steps to help school districts overcome these issues. (Recommendation 5) The Assistant Secretary for the Office for Civil Rights should further refine and clarify federal restraint and seclusion definitions and take steps to ensure that this information is conveyed to school districts. This could include providing common classroom scenarios that highlight the differences between a restraint and an escort, and a time out and a seclusion. (Recommendation 6) We provided a draft of this report to the Department of Education for review and comment. In its formal comments, which are reproduced in appendix II, Education agreed with all six recommendations. Education also provided technical comments, which we incorporated, as appropriate. In agreeing with GAO’s six recommendations, Education stated that it would determine the best means to implement them. Education also stated that it is fully committed to working with public schools, state educational agencies, and school districts to help ensure accurate reporting of federal restraint and seclusion data, and to improve the quality of the information for all users of CRDC data. We appreciate Education’s willingness to address the serious data quality issues affecting the CRDC restraint and seclusion data. In its response, Education stated that the agency has already made significant improvements to the CRDC in general and has made specific improvements with respect to restraint and seclusion data, especially in response to the four recommendations we made in our June 2019 correspondence. Education asked that we acknowledge the progress it feels it has made in this regard, and we have done so. Importantly, however, our June 2019 recommendations were intended as stop-gap measures to improve the quality of the 2017-18 data that was already being collected in real time precisely because the CRDC’s business rules related to restraint and seclusion were inadequate. Therefore, steps Education has taken toward addressing them do not address the underlying data quality issues that are the subject of this report. In other words, the recommendations in this report urge Education to address data quality problems at the front-end by applying adequate business rules at the time districts submit their data. This could reduce the need for follow-up with districts to correct potentially inaccurate data. More information about our assessment of the steps Education has taken to address the four recommendations from the June 2019 report are available on our website. Education also stated that because our draft report did not mention the methodological improvements OCR made to address the quality of restraint and seclusion data for the 2017-18 CRDC data collection, our draft report overstates the relevance of the data issues from the 2015-16 collection. Education also stated that it provided us with information about the methodological improvements in December 2019, and, in its formal response, requested that we reflect the information in this report. We disagree with this perspective. After we completed our audit work for this engagement, Education provided us an excerpt from its post-collection data quality report for school year 2017-18. At that time and again in its technical comments on this report, Education stated that “information shared with GAO about the results of the 2017-18 data quality review process and what might be addressed is still confidential.” As of March 23, 2020 Education described the 2017-18 data quality control process as “incomplete.” Lastly, the 2017-18 CRDC data, which are the topic of the excerpt Education provided to us, are not yet available. Under our auditing standards, we cannot opine on the quality of data we could not independently assess or on the efficacy of process improvements associated with those data. Education also raised concerns about how we weighted our interviews with school officials, and it questioned the relevance of our discussions about selected school districts’ use of restraint and seclusion data not reported for CRDC purposes. We disagree. Education was concerned about the weight GAO placed on information obtained from 50 officials in 11 school districts across 3 states whom we interviewed during the course of our audit work. As stated in the report, this information cannot be generalized to all districts. However, we believe it provides useful insights into how some districts use their restraint and seclusion data to reduce the incidence of these practices and improve the accuracy of their data. The widespread disagreement among the 50 school officials with whom we spoke also highlights confusion about how to accurately and consistently apply CRDC definitions of restraint and seclusion. This finding is supported by the views of seven nonfederal advocacy organizations that represent parents and families; individuals with disabilities; and other stakeholders, such as representatives of relevant school and special education professional associations. Education questioned the relevance of discussing the benefits that selected school districts said they derive from using restraint and seclusion data not reported for CRDC purposes. Education stated that “attempting to generalize comments about how these nine school districts use restraint and seclusion data” seems inconsistent with Governmental Accounting Standards Board (GASB) statistical principles. We believe that describing selected school districts’ use of their restraint and seclusion data is within the scope of our stated audit objectives. In addition, the explanatory statement from the House Committee on Appropriations accompanying the Consolidated Appropriations Act of 2018 includes a provision for us to provide examples of how schools are adopting effective alternatives to these practices and reducing the incidence of seclusion and restraint, among other things. Further, Education mistakenly asserts that none of the data and analyses that the school districts collected, performed, or used are part of the CRDC and none could be feasibly collected by the CRDC. We have further clarified in the final report that portions of the data these school districts collect are used for CRDC reporting purposes. For example, some of the data elements are the same ones that districts use to calculate aggregate incident counts, which are required by the CRDC. We do not recommend that Education collect such detailed data or perform such analyses. Regarding Education’s concern about “GASB statistical principles” and case selection, all GAO performance audits are subject to Generally Accepted Government Auditing Standards (GAGAS); in contrast, GASB’s Generally Accepted Accounting Principles apply to financial audits of public entities. The applicable methodological guidance we followed -- Selecting a Sample of Nongeneralizable Cases for Review in GAO Engagements -- is designed to ensure that GAO policies on evidence and GAGAS are met, and conforms to the generally accepted principles and practices of the appropriate disciplines. When providing illustrative examples, it is neither necessary nor appropriate to use statistical methods to analyze and interpret evidence. Finally, in its comments, Education stated that it is critical that we emphasize that the CRDC is an aggregate of self-collected and self- reported data from school districts and that the district superintendent or an authorized designee certifies that the data they submit are “true and correct.” We agree, and acknowledged this in several places in both the draft and final reports. At the same time, we believe that self-certified data does not absolve Education of its responsibility to ensure the quality of the data it collects and publicly reports – especially given the CRDC’s longstanding role in Education’s overall enforcement of various federal civil rights laws prohibiting discrimination on the basis of race, color, national origin, sex, and disability. Self-reported data by nature are subject to error, making the need for effective quality control measures before, during, and after collection a necessity. We are sending copies to the appropriate congressional committees, the Secretary of Education, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report examines (1) the effectiveness of CRDC data quality control procedures for its restraint and seclusion data, (2) how selected districts interpret the CRDC definitions of restraint and seclusion and (3) how selected districts use data on restraint and seclusion and encourage staff to report incidents. Below are the details of our analysis to determine the extent to which Education ensures the quality of restraint and seclusion data reported by school districts, and of our interviews with officials in selected districts about how they apply Civil Rights Data Collection (CRDC) definitions of restraint and seclusion and use restraint and seclusion data. To inform all of our objectives, we interviewed federal agency officials, representatives from several nonfederal advocacy organizations that represent parents and families, individuals with disabilities, and other stakeholders, such as representatives of professional associations. We also reviewed agency documentation, relevant federal laws, regulations and policies, and selected state laws. Analysis of National Restraint and Seclusion Data To determine the extent to which Education ensures the quality of restraint and seclusion data reported by school districts, we analyzed Education’s Civil Rights Data Collection (CRDC) for school year 2015-16. Specifically, we analyzed the CRDC to determine the extent to which districts reported zero incidents of restraint and seclusion, to identify outliers (districts that reported a high or low incidence of restraint and seclusion), and to identify illogical data. CRDC is a biennial survey that is mandatory for nearly every public school and school district in the United States and is conducted by Education’s Office for Civil Rights. The CRDC collects data on the nation’s public schools (pre-K through 12th grade) that includes the use of restraint and seclusion, student demographics and enrollment numbers, educational and course offerings, and disciplinary actions. In school years 2013-14 and 2015-16, the CRDC collected data from nearly every public school in the nation (approximately 96,000 schools in 17,000 school districts in school year 2015-16). CRDC data are self-reported by districts and schools, and consequently there is potential for misreporting of information. After reviewing their CRDC data, school districts can submit revised data to Education. The public-use data file of the CRDC for school year 2015-16 was the primary source of data for our analyses and the most recent data available at the time. We also used restraint and seclusion data from school year 2013- 14 primarily to analyze how use of restraint and seclusion may have changed between the two time periods. The CRDC collected data on (1) mechanical restraint, (2) physical restraint, and (3) seclusion. Using these data, we performed the following analyses to determine potential inaccuracies or underreporting in the CRDC. Analysis of Extent of Districts Reporting Zeros To examine the extent to which school districts reported zeros, we calculated the percentage of districts and schools reporting zeros for restraint (both mechanical and physical) and for seclusion. We performed this calculation for both districts and schools nationally and by state, district size, and school type (e.g., charter, traditional, and special education schools). Although Education has a business rule that targets very large districts that report zero incidents of restraint or seclusion, we calculated the number of all districts and schools that reported zeros to understand the prevalence of zeros in the reported data. Analysis of Relatively Low Rates of Restraint and Seclusion Incidents To test for potential underreporting, we first limited our analysis to the restraint and seclusion data reported by the 30 largest school districts in the nation (districts with over 100,000 students enrolled). Because of these districts’ size, we reasoned that they would be more likely to have incidents of restraint and seclusion to report. Our analysis found that 20 of the 30 largest school districts reported incidents, and thus we focused our analysis of underreporting on the 20 largest districts that reported incidents. For each of the 20 districts, we calculated the percentage of schools that reported incidents. To compare the 20 largest districts that reported incidents with all 5,252 districts that reported incidents, we calculated the rates of restraint and seclusion per enrolled student and calculated percentile ranges. (See table 6.) We determined that nine of the 20 districts had incidents of physical restraint per enrolled student that were below the 5th percentile of all districts reporting incidents of physical restraint. Analysis of Relatively High Rates of Restraint and Seclusion Incidents To identify school districts with relatively high rates of restraint and seclusion, we examined districts that reported having more incidents than students enrolled. This analysis potentially indicates that some students may have been restrained or secluded multiple times. To illustrate, if a school district reported that it had 24 students enrolled, and also reported that it had 100 incidents of restraint, these reported data would indicate that the reporting was erroneous or that some students were restrained multiple times. Based on this analysis, we then calculated the average number of incidents (of restraint and seclusion) per student affected. Analysis of Extent of Illogical Data To test for illogical data, we analyzed the restricted-use restraint and seclusion data file for schools that reported more students affected than incidents. To illustrate, if a district reported that a school had restrained 80 students, and also reported that the school had 40 incidents of restraint, these reported data are illogical. Education has a business rule to detect illogical data at the school level, but the rule applies only to schools with more than 100 incidents. For our analysis, we looked for all schools with illogical data to determine the prevalence. School District Interviews on Interpreting CRDC Definitions of Restraint and Seclusion To determine how selected school districts interpret the CRDC definitions of restraint and seclusion, we selected 11 schools and nine school districts in three states to serve as illustrative examples. In total, we interviewed about 50 school officials. Information we collected from our 11 selected schools and nine districts cannot be generalized to all districts and schools nationwide. We selected states, districts, and schools to obtain a range of perspectives on federal reporting of restraint and seclusion data. Our selection also accounted for other criteria, such as selecting states that had laws requiring reporting; high or low rates of reporting zeros among districts; relatively high or low rates of restraint or seclusion per capita; grade levels served (e.g., K-6 or 9-12); school type (e.g., traditional or charter); and significant changes—increase or decrease—in incidents across reporting periods. We also selected districts that had reported incidents. As a result, we selected nine school districts to visit: two in Kentucky, three in Washington, three in Wisconsin, and a charter district in Wisconsin (see table 7). To determine how district and school officials, such as assistant superintendents, program managers, department directors, principals, and teachers, were interpreting the CRDC definitions of restraint and seclusion, we made the following statements and asked the following questions in our interviews. 1. We are going to talk to you about the definitions of restraint and seclusion that appear in the CRDC. We have heard that these definitions are not always clear to educators, so we want to get your feedback. Mechanical Restraint: the use of any device or equipment to restrict a student’s freedom of movement. Do you think this definition is clear or does it leave room for ambiguity? Physical Restraint: a personal restriction that immobilizes or reduces the ability of a student to move his or her torso, arms, legs, or head freely. The term does not include a physical escort. Physical escort means a temporary touching or holding of the hand, wrist, arm, shoulder or back for the purpose of inducing a student who is acting out to walk to a safe location Do you think this definition is clear or does it leave room for ambiguity? How do you differentiate between physical escort and physical restraint? Does breaking up a fight constitute a restraint? Seclusion: the involuntary confinement of a student alone in a room or area from which the student is physically prevented from leaving. It does not include a timeout, which is a behavior management technique that is part of an approved program, involves the monitored separation of the student in a non-locked setting, and is implemented for the purpose of calming. Do you think this definition is clear or does it leave room for ambiguity? How do you differentiate between timeout and seclusion? What does physically prevented (from leaving) mean? In what types of physical spaces can seclusion occur? Does your district have dedicated spaces for seclusion rooms? Can you describe where they are generally located, e.g., which types of schools or classrooms? 2. How do staff determine when an incident needs to be recorded as a restraint? 3. How do staff determine when an incident needs to be recorded as a seclusion? We conducted this performance audit from November 2018 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Sherri Doughty (Assistant Director), Lara Laufer (Analyst-in-Charge), Morgan Jones, and Kristin Petroff, made key contributions to this report. Also contributing were James Bennett, Deborah Bland, Tonnye Conner-White, Holly Dye, Gretta Goodwin, Sheila R. McCoy, Jean McSween, John Mingus, James Rebbe, and Manuel Valverde.", "summary": "Every 2 years, Education requires nearly all school districts to report incidents of restraint and seclusion. Generally, restraint is restricting a student's ability to move, and seclusion is confining them alone in a space they cannot leave. The House Committee on Appropriations' explanatory statement accompanying the Consolidated Appropriations Act of 2018 included a provision for GAO to evaluate the CRDC's restraint and seclusion data. This report examines (1) the effectiveness of CRDC data quality control procedures, (2) selected districts' interpretation of CRDC's restraint and seclusion definitions, and (3) selected districts' use of data. GAO analyzed CRDC's quality control processes for school year 2015-16, and interviewed officials from seven stakeholder groups and over 50 school and district officials in three states. GAO selected states, districts, and schools to obtain a range of perspectives on using restraint and seclusion data and interpreting CRDC definitions of restraint and seclusion. Selection criteria included changes in reported incidents year to year and laws requiring districts to report incidents to states. The Department of Education's (Education) quality control processes for data it collects from public school districts on incidents of restraint and seclusion are largely ineffective or do not exist, according to GAO's analysis of school year 2015-16 federal restraint and seclusion data—the most recent available. Specifically, Education's data quality control processes were insufficient to detect problematic data in its Civil Rights Data Collection (CRDC)—data Education uses in its efforts to enforce federal civil rights laws (see figure). For example, one rule Education used to check the quality of data submitted only applied to very large school districts, although GAO and Education's own analyses found erroneous reporting in districts of all sizes. Education also had no rules that flagged outliers that might warrant further exploration, such as districts reporting relatively low or high rates of restraint or seclusion. GAO tested for these outliers and found patterns in some school districts of relatively low and high rates of restraint or seclusion. Absent more effective rules to improve data quality, determining the frequency and prevalence of restraint and seclusion will remain difficult. Further, Education will continue to lack information that could help it enforce various federal civil rights laws prohibiting discrimination. Officials in the nine school districts GAO visited lacked a common understanding of the CRDC's restraint and seclusion definitions. Similarly, officials GAO interviewed in all three state educational agencies (Kentucky, Washington, and Wisconsin) and all seven stakeholder groups expressed similar concerns about the clarity of these definitions. For example, officials inconsistently interpreted the word alone in the definition of seclusion and, therefore, on whether to count an incident if a teacher was in the room. Absent clearer definitions, Education will continue to lack quality information on restraint and seclusion in public schools. Officials in school districts GAO visited identified several benefits to collecting these data, including identifying patterns in student behavior and developing interventions that can reduce the need for restraint and seclusion. Officials also said that analyzing their data helped them identify needs for additional staff training and student support services. GAO made six recommendations, including that Education expand its CRDC business rules to cover all districts, develop additional quality controls to address misreporting, address factors underlying misreporting, and refine and clarify its definitions. Education agreed with these recommendations.", "document_type": "gao"}
{"report": "In January 2018, OMB released (M-18-04) Monitoring and Evaluation Guidelines for Federal Departments and Agencies that Administer United States Foreign Assistance (the “Guidelines”) in response to the 2016 FATAA legislation. (See appendix III for additional information on the requirements in the legislation). The Guidelines provide direction to federal departments and agencies that administer foreign assistance on monitoring the use of resources, evaluating the outcomes and impacts of the foreign assistance projects and programs, and applying the findings and conclusions of such evaluations to proposed project and program design. The goals of the Guidelines are to set forth key principles to guide each agency and to specify requirements, where appropriate, that agencies must cover in their own policies on M&E of foreign assistance. The Guidelines define monitoring and evaluation as follows: Monitoring is the ongoing and systematic tracking of data and information relevant to policies, strategies, programs, projects, and/or activities and is used to determine whether desired results are occurring as expected during program, project, or activity implementation. Monitoring often relies on indicators, quantifiable measures of a characteristic or condition of people, institutions, systems, or processes that may change over time. Evaluation is the systematic collection and analysis of information about the characteristics and outcomes of the program, including projects conducted under such program, as a basis for making judgments and evaluations regarding the program; improving program effectiveness; and informing decisions about current and future programming. Table 1 lists OMB’s M&E requirements and key excerpts of the descriptions as noted in the OMB M-18-04. In 2016, we reported on leading practices for foreign assistance program M&E. We identified 28 leading practices—14 for monitoring and 14 for evaluation. Table 2 lists and defines these monitoring practices. Table 3 lists the evaluation practice and corresponding definition. Based on our review, the Guidelines incorporate most of GAO’s leading practices for monitoring and evaluation. However, they do not incorporate practices on developing monitoring plans that are based on risks, ensuring that staff are appropriately qualified to conduct monitoring, establish procedures to close out programs, developing staff skills for evaluation, and following up on evaluation recommendations. OMB indicated that it intended the Guidelines to focus on elements required by the FATAA legislation. Nevertheless, incorporating these leading practices in the Guidelines can help ensure that all agencies address impediments, effectively manage foreign assistance, and meet their assistance goals. Based on our review, OMB incorporates 11 of 14 GAO’s leading practices. Figure 1 shows our assessment of the Guidelines with regard to monitoring foreign assistance. The OMB Guidelines do not incorporate practices on developing monitoring plans that are based on risks, ensuring that staff are appropriately qualified to conduct monitoring, and establishing close-out procedures for projects and programs. Developing monitoring plans based on an assessment of risk. The Guidelines do not incorporate GAO’s leading practice of developing monitoring plans based on as assessment of risks related to achieving the defined objectives. Identifying and assessing risks can help agencies determine if impediments exist that they might need to mitigate in order to manage their foreign assistance more effectively. Additionally, determining which activities warrant greater oversight and which require less can also help agencies ensure the appropriate allocation of foreign assistance. Ensuring Staff qualifications for monitoring. The Guidelines do not incorporate GAO’s leading practice for agencies to ensure that staff members responsible for monitoring programs or projects have the relevant knowledge, skills, and training. By having qualified staff for monitoring programs or projects, agencies can help ensure they meet their foreign assistance goals. By hiring qualified staff and providing them the right training, tools, structure, incentives, and responsibilities, agencies can make operational success possible. Establishing close out procedures for projects and programs. The Guidelines do not incorporate GAO’s leading practice for agencies to establish program closeout procedures for all required work and administrative actions completed by the implementing partner. By establishing such procedures, agencies can help ensure their foreign assistance is less susceptible to fraud, waste, and mismanagement; addresses increases to potential costs in fees for maintaining foreign assistance; and increases their ability to redirect foreign assistance to other projects. Based on our review, OMB incorporates 12 of 14 GAO’s leading practices. Figure 2 shows our assessment of the Guidelines with regard to evaluating foreign assistance. The OMB Guidelines do not incorporate some practices such as developing staff skills for evaluation and following up on evaluation recommendations. Developing staff skills regarding evaluating. The Guidelines do not incorporate GAO’s leading practice for agencies to establish requirements that the staff responsible for overseeing and using evaluations should continually undertake the relevant education, training, or supervised practice needed to learn new concepts, techniques, and skills. By having their staff continually undertake such education, training, or supervised practice, agencies can benefit more fully from program evaluations. Following up on recommendations. The Guidelines do not incorporate GAO’s leading practice for agencies to determine whether management or programs have accepted the recommendations made in evaluation reports and taken the actions needed to address them. By developing mechanisms to track recommendations, agencies can better address inefficient, mismanaged, or costly programs or projects. The FATAA requires the President to set forth guidelines “according to best practices of monitoring and evaluation” but does not define these best practices. Specifically, FATAA states, “the President shall set forth guidelines, according to best practices of monitoring and evaluation studies and analyses, for the establishment of measurable goals, performance metrics, and monitoring and evaluation plans that agencies can apply with reasonable consistency to covered United States foreign assistance.” OMB staff told us that the Guidelines were intended to focus on elements required by the FATAA legislation but noted that agencies are free to add additional requirements to their own M&E policies. However, we have previously reported that while some of these agencies have incorporated these leading practices, others have not. Furthermore, agencies that have incorporated these practices would not necessarily continue to include them if they are not required in the Guidelines. Regarding leading practices, officials noted that while these practices are important, there is no singular established standard for best monitoring practices. Nevertheless, both OMB’s circulars and recent legislation note the importance of leading practices for M&E. For example, Circular A-123 notes that management should identify internal and external risks that may prevent the organization from meeting its objectives. Additionally, the Foundations for Evidence-Based Policymaking Act of 2018 requires OPM, in consultation with the OMB, to identify skills and competencies needed for program evaluation, establish a new occupational series or update an existing one for program evaluation, and establish a new career path for program evaluation. Based on our review, most agencies incorporated all of OMB’s Guidelines for monitoring in their policies. However, DOD did not include the requirement to establish roles and responsibilities among agencies that participate in funding transfers or ensure that verifiable, reliable, and timely information is collected and available to monitoring personnel. We also found that agencies incorporate most of OMB’s Guideline requirements for evaluation in their policies, but some did not include the requirement to conduct impact evaluation on all pilot programs. Without incorporating these Guideline requirements, agencies risk losing accountability over their funding and monitoring and evaluating activities. They also risk replicating programs without fully understanding their effectiveness. We also found that all of the agencies we reviewed have taken initial steps to implement their M&E policies. Based on our review of agency monitoring policies, all the agencies except DOD incorporated relevant Guideline requirements. All six agencies we reviewed incorporated the requirement to establish monitoring policies that apply to their major foreign assistance programs. For example, State, USAID, and MCC have agency-wide policies for foreign assistance M&E. USDA and HHS have policies relevant to their major foreign assistance programs—for USDA, the Foreign Agriculture Service’s food aid programs, and for HHS, the President’s Emergency Plan for AIDS Relief (PEPFAR). All of the agencies with relevant monitoring policies—DOD, HHS, MCC, State, USAID, and USDA— incorporate the requirement to develop, collect, analyze, and report data on performance indicators. These policies help ensure the measurement of project implementation and progress, and promote the timely analysis and reporting of results that could identify any needed corrections. DOD did not incorporate Guideline requirements to establish agencies’ roles and responsibilities and ensure verifiable data for monitoring activities. Establishing agencies’ roles and responsibilities when funds are transferred. DOD did not include the Guideline requirement for agencies to establish roles and responsibilities in funding transfers. Without defined roles and responsibilities, agencies risk losing accountability over funding and monitoring activities. In addition, agencies could miss opportunities to collaborate and leverage interagency efforts to facilitate decision-making and address barriers across agency boundaries. Ensuring verifiable, reliable, and timely data. DOD did not include the Guideline requirement for agencies to ensure they collect and provide verifiable, reliable, and timely data to monitoring personnel. Without ensuring that such data are available to monitoring personnel, agencies risk employing inappropriate methods, continuing ineffective programs or projects, and making uninformed decisions. DOD officials told us these practices are currently not required because they are still in the process of fully aligning their policy with the Guidelines. Officials explained that working on prioritizing and directing resources towards M&E efforts has been a challenge. Officials noted they expect to update the policy to include these requirements in the future, but they have no specific timelines in place. The agencies we reviewed incorporated nearly all relevant Guideline requirements on evaluation. Three of the six agencies—DOD, HHS and USDA—did not include a requirement to conduct impact evaluations on all pilot programs or projects. Figure 4 shows our assessment of agencies’ evaluation policies against the Guidelines. All the agencies we reviewed have established project-specific evaluation plans. For example, HHS implements PEPFAR’s evaluation plan which indicates specific requirements for describing the evaluation component, strategy, or intervention, the reason for the evaluation, the type of evaluation, the key evaluation questions, the data sources, the methods by question, and the dissemination and utilization plan. All the agencies we reviewed also had policies on distributing their evaluation reports internally and publicly reporting them. For example, State and USAID have a web-based, customized Evaluation Registry system that they jointly maintain for bureaus and independent offices to record and track planned, ongoing, and completed evaluations. Conduct impact evaluations for pilot programs or projects. DOD, HHS, and USDA did not include the Guideline requirement for agencies to conduct impact evaluations for pilot programs or to conduct only a performance evaluation and to provide a justification for not conducting an impact evaluation. Without a requirement to conduct impact evaluations of pilot programs, agencies risk duplicating or scaling up programs without fully understanding the factors that could lead to their success or failure. DOD. DOD officials told us they do not require this practice because they are still in the process of fully aligning their policy with the Guidelines. According to DOD, it has determined that impact evaluations are impractical and inappropriate for the planned evaluations; instead, it plans to conduct only performance evaluations and provide justifications for not conducting impact evaluations, as required by the OMB Guidelines. DOD plans to address the evaluation methodology of pilot programs in future updates, according to officials. However, DOD has no specific timelines in place for these updates. HHS. PEPFAR’s M&E documents indicate that PEPFAR teams are encouraged but not required to evaluate all current pilot programs to see which should be taken to scale for specific populations. Officials from HHS and the Office of the U.S. Global Aids Coordinator noted that they conduct their own evaluation of pilot programs and use routine program data to inform scaling of programs. However, PEPFAR policies do not specifically require that such evaluations be like the impact evaluations described in the Guidelines. USDA. FAS’s M&E documents indicate that when selecting projects to undergo impact evaluation the agency will consider pilot projects. USDA officials told us they have no requirement to conduct impact evaluations on all pilot projects because impact evaluations may be cost prohibitive and project lifecycles are short (i.e., 3 to 5 years). Officials further noted that implementing partners can conduct an impact evaluation on pilot programs, but are not required to do so. Although the Guideline requirement indicates that agencies can forgo impact evaluations, they must provide a justification in their M&E policy. USDA officials have not provided such a justification provided in their M&E policy. Establish agencies’ roles and responsibilities for evaluation activities when funds are transferred. DOD did not include the Guideline requirement for agencies to define roles and responsibilities when there are funding transfers between or among U.S. government agencies to ensure accountability for evaluation activities. Without defined roles and responsibilities, agencies risk losing accountability over funding and evaluation activities. In addition, they could miss opportunities to collaborate and leverage interagency efforts to facilitate decision-making and address barriers across agency boundaries. Evaluate all programs at least once whose dollar value equals or exceeds that of a median sized program within the agency. DOD did not include the Guideline requirement for agencies to evaluate all programs, at least once during their existence, whose dollar value equals or exceeds that of a median sized program in the agency. Without a mechanism to evaluate all these types of programs, agencies risk continuing inefficient, mismanaged, or costly projects. DOD officials told us they do not currently require these practices because they are still in the process of fully aligning their policy with the Guidelines. They noted that they expect to update the policy to include these requirements, but they have no specific timelines in place. Since the six agencies we reviewed recently updated their M&E policies to align with the OMB Guidelines, many existing assistance projects and programs may not be governed by these requirements. Nonetheless, the agencies we reviewed have taken initial steps to help ensure implementation of agency M&E policies. In interviews, agencies provided us with the following examples of such steps. State. State developed a guidance document and tool-kit to operationalize and oversee its M&E policy to ensure it implements the Guidelines. According to State officials, they provide classroom training on the M&E policy and are piloting a revised online and classroom evaluation courses for staff. Officials also noted that they have dedicated staff to assist bureaus in implementing the Guidelines, among other agency policies. USAID. USAID has an approval process to ensure key deliverables include Activity plans that meet Guideline requirements. Additionally, USAID’s policy requirements indicate that each mission program office must identify a point of contact for monitoring and evaluation to ensure that USAID and its partners are complying with the agencies policies and foreign assistance M&E guidelines. MCC. MCC also has an approval process through their Department of Policy and Evaluation to ensure implementation of the Guidelines. As part of the process, the MCC Board of Directors or the appropriate partner country must approve initial M&E plans. HHS. Within HHS, the Centers for Disease Control and Prevention (CDC) are responsible for implementing the monitoring and evaluation guidance for their PEPFAR programs. CDC officials told us that they have existing mechanisms and supervisory structures in place to ensure that the Guidelines’ requirements are met in PEPFAR programs. USDA. USDA officials told us that the current M&E policy applies only to food assistance programs within FAS and not for other USDA programs. Officials explained they are trying to develop a structure that allows FAS to ensure all USDA components are implementing the OMB Guidelines. DOD. DOD developed guidance for fiscal year 2020 on implementing its M&E policy. DOD officials we spoke to noted they are working on identifying resources, skills, and capabilities to fully implement DOD’s M&E policy. OMB’s Guidelines set forth key principles to guide agencies and to specify requirements, where appropriate, which they must cover in their own policies on M&E of foreign assistance. However, they do not include key leading practices for M&E that GAO identified for ensuring agencies meet their foreign assistance goals and objectives. While OMB allows agencies discretion to include these or other best practices, it is unknown if the agencies will do so. By ensuring that OMB’s government-wide Guidelines include these best practices, agencies can help address impediments, effectively manage foreign assistance, and meet their goals. Although all agencies we reviewed developed or updated their M&E policies to align with the Guidelines, not all of them include important requirements. DOD, HHS, and USDA did not include the requirement for agencies to conduct impact evaluations for pilot programs or to conduct performance evaluations and provide a justification for not doing an impact evaluation. Without a requirement to conduct impact evaluations of pilot programs, agencies risk duplicating or scaling up programs without fully understanding the causes that could lead to their success or failure. We are making the following seven recommendations, including one to OMB, four to DOD, one to State, and one to USDA. The Director of the Office of Management of Budget should update the Guidelines to include GAO’s leading practices of developing monitoring plans that are based on risks, ensuring that monitoring staff have appropriate qualifications, establishing procedures to close-out programs, developing staff skills regarding evaluations, and establishing mechanisms for following up on evaluation recommendations. (Recommendation 1) The Secretary of Defense should update the Department’s monitoring and evaluation policies to define roles and responsibilities among agencies that participate in interagency funding transfers. (Recommendation 2) The Secretary of Defense should update the Department’s monitoring and evaluation policies to ensure verifiable, reliable, and timely data are available to monitoring personnel. (Recommendation 3) The Secretary of Defense should update the Department’s monitoring and evaluation policies to ensure that it evaluates all programs, at least once in their lifetimes, whose dollar value equals or exceeds that of the median program in the agency. (Recommendation 4) The Secretary of Defense should update the Department’s monitoring and evaluation policies to require the agency to conduct impact evaluations on all pilot programs before replicating or expanding, or conduct performance evaluations for those programs and provide a justification for not conducting an impact evaluation. (Recommendation 5) The Department of State’s U.S. Global AIDS Coordinator, in collaboration with HHS and other implementing agencies, should update the PEPFAR monitoring and evaluation policies to require these agencies to conduct impact evaluations on all pilot programs before replicating or expanding, or conduct performance evaluations for those programs and provide a justification for not conducting an impact evaluation. (Recommendation 6) The Secretary of Agriculture, in collaboration with the Foreign Agriculture Service, should update their monitoring and evaluation policies to require USDA to conduct impact evaluations on all pilot programs before replicating or expanding, or conduct performance evaluations for those programs and provide a justification for not conducting an impact evaluation. (Recommendation 7) We provided a draft of this product to the DOD, HHS, MCC, OMB, State, USDA, and USAID for comment. OMB commented on the draft report in an email from the staff responsible for economic policy, federal financial management, and international affairs. In the email, OMB disagreed with the recommendation to revise the Guidelines. It emphasized that an interagency group had developed the Guidelines and had consulted a number of expert sources on monitoring and evaluation policies and practices, including GAO’s leading practices. OMB also developed the guidelines to achieve the objectives contained in the Foreign Aid Transparency and Accountability Act of 2016 within the context of other existing OMB guidance. OMB suggested that it would be more effective to remind agencies that, in addition to the Guidelines specified in M-18-04, they should follow all guidance OMB had issued affecting monitoring and evaluation activities. This guidance includes policies for closeout procedures in the Uniform Guidance, for the Enterprise Risk Management and Internal Control in A-123, and for the Foundations for Evidence- Based Policymaking Act on using evaluation information and monitoring and evaluation staff skills and qualifications. We acknowledge that relevant monitoring and evaluation guidance is available to agencies in other forms beyond the Guidelines. However, we believe it is important for OMB to incorporate this guidance into its Guidelines, if only by reference, in order to emphasize the importance of these practices in the context of monitoring and evaluation of foreign assistance. This step would help ensure that OMB had integrated this guidance into the management of foreign assistance programs as appropriate. DOD concurred with our recommendations and indicated that it would address many of them in the next iteration of its M&E policy for security assistance (see appendix IV for written comments). DOD noted that two of our recommendations had limited applicability to DOD for security assistance, but described how it would implement them. First, DOD stated that it has not used its authority to transfer funds for security cooperation assistance to other departments and agencies. However, DOD indicated it would implement our recommendation to define roles and responsibilities among agencies that participate in interagency funding transfers, should such transfers become necessary. Second, DOD stated that conducting impact evaluations was not a feasible in the context of security assistance. Instead, DOD plans to conduct only performance evaluations, but it would provide justifications for not conducting impact evaluations, as required by the Guidelines. By documenting these approaches in its M&E policies, DOD would help ensure that those departments conducting M&E for DOD security assistance initiatives implement them as required. State agreed with the intent of the recommendation (see appendix V for written comments). State explained that impact evaluations are often not feasible in the context of assistance provided under PEPFAR and described its alternative approach to evaluating new initiatives. State indicated it would update appropriate PEPFAR policies to clarify when agencies should conduct impact and/or performance evaluations. These clarifications will reflect how State evaluates PEPFAR programs in practice in accordance with OMB guidance and legislation, according to State. USAID provided written comments (see appendix VI). HHS and USDA provided technical comments, which we incorporated as appropriate. MCC did not provide comments. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget; Secretaries of Agriculture, Defense, Health and Human Services, and State; Administrator of the U.S. Agency for International Development; and the Executive Officer of the Millennium Challenge Corporation and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3149 or GootnickD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. This report examines the extent to which (1) the Office of Management and Budget’s (OMB) monitoring and evaluation (M&E) Guidelines incorporate GAO leading practices and (2) agencies incorporate the OMB Guidelines in their M&E policies and plans. To address objective one, we examined the OMB Guidelines against GAO’s 28 leading practices—14 for monitoring and 14 for evaluation— identified in GAO-16-861R. In 2016, GAO developed the 28 leading practices. In 2019, we provide specific definitions for each of the practices noted. We made slight modifications to the language to align with the definitions provided. For monitoring, we developed this list of leading practices based on our review of the GPRA Modernization Act of 2010; OMB’s Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards; GAO’s Standards for Internal Control in the Federal Government (Greenbook); and others. The list of leading practices for monitoring includes developing monitoring plans; collecting, reviewing, and analyzing monitoring data; and establishing roles and responsibilities of personnel responsible for monitoring. For evaluation, we developed a list of leading practices based on the American Evaluation Association’s (AEA) 2016 An Evaluation Roadmap for a More Effective Government (AEA Roadmap) and Preface to Evaluators’ Ethical Guiding Principles. The list of leading practices for evaluation include developing evaluation plans; ensuring evaluator independence; developing staff skills regarding evaluation and use of evidence; and establishing roles and responsibilities of personnel responsible for evaluation. To perform these analyses, two analysts assessed if the Guidelines incorporated specific GAO leading practices. The analysts worked iteratively, comparing notes and reconciling differences at each stage of the analysis. In addition, GAO staff independent of the two analysts reviewed the final analysis, and made modifications as appropriate. We also interviewed relevant OMB officials in Washington D.C. involved in developing the memorandum and inquired about specific requirements and plans to ensure the implementation of these Guidelines. To address our second objective, we examined U.S. agency M&E policies against the requirements noted in the OMB Guidelines. We identified the six major agencies administering the most foreign assistance funds. The six agencies are the U.S. Agency for International Development (USAID), the Department of State (State), the Millennium Challenge Corporation (MCC), the Department of Health and Human Services (HHS), the U.S. Department of Agriculture (USDA) and the Department of Defense (DOD). We asked these agencies to identify or provide all relevant policies and guidance relating to foreign assistance M&E, including, where appropriate, standard operating procedures or other guidance. For USDA, we reviewed the Foreign Agricultural Service’s food assistance; for HHS, the President’s Emergency Program for AIDS Relief; and for DOD, security cooperation programs. To perform these analyses, two analysts assessed agency M&E policy documents against the requirements in the OMB Guidelines. We identified requirements as phrases that included the following language “required,” “must,” “mandatory,” or “should.” The analysts worked iteratively, comparing notes and reconciling differences at each stage of the analysis. In addition, other GAO staff independent of the two analysts reviewed the final analysis, and made modifications as appropriate. We also interviewed relevant OMB staff and agency officials in Washington D.C. involved in developing and implementing the M&E policies and inquired about specific requirements, and plans to ensure their M&E policies are implemented. We conducted this performance audit from July 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: The Office of Management and Budget Monitoring and Evaluation Guidelines (OMB Memorandum M-18-04) In January 2018, the Office of Management and Budget (OMB) released (M-18-04) Monitoring and Evaluation Guidelines for Federal Departments and Agencies that Administer United States Foreign Assistance (the “Guidelines”) in response to the Foreign Aid Transparency and Accountability Act of 2016 (FATAA). Table 4 shows the complete description of the requirements noted in the Guidelines. The Foreign Aid Transparency and Accountability Act of 2016 (FATAA) has required objectives on monitoring and evaluation for the Office of Management and Budget (OMB) to include in the Guidelines. We compared the 13 required objectives for the Guidelines set forth in the FATAA legislation with those in the OMB Guidelines. We found that all of the monitoring and evaluation requirements set forth in the legislation are included in the OMB Guidelines. Table 5 shows the FATAA legislation requirements, OMB Guidelines, and our assessment of the alignment between the legislation and OMB’s Guidelines. In addition to the individual named above, James B. Michels (Assistant Director), Farahnaaz Khakoo-Mausel (Analyst-in-Charge), Paulina Maqueda-Escamilla, Mark Dowling, Martin De Alteriis, Benjamin Licht, John Hussey, Neil Doherty, Aldo Salerno, Carolina Morgan and Michael Simon made key contributions to this report. Government Auditing Standards 2018 Revision (Supersedes GAO-12-331G. GAO-18-568G. Washington, D.C.: July 17, 2018. Foreign Assistance: Agencies Can Improve the Quality and Dissemination of Program Evaluations. GAO-17-316. Washington, D.C.: March 3, 2017. Foreign Assistance: Selected Agencies’ Monitoring and Evaluation Policies Generally Address Leading Practices. GAO-16-861R. Washington, D.C.: September 27, 2016. Program Evaluation: Some Agencies Reported that Networking, Hiring, and Involving Program Staff Help Build Capacity. GAO-15-25. Washington, D.C.: November 13, 2014. Government Efficiency and Effectiveness: Inconsistent Definitions and Information Limit the Usefulness of Federal Program Inventories. GAO-15-83. Washington, D.C.: October 31, 2014. Standards for Internal Control in the Federal Government. GAO-14-704G. Washington, D.C.: September 10, 2014. State Department: Implementation of Grants Policies Needs Better Oversight. GAO-14-635. Washington, D.C.: July 21, 2014. Program Evaluation: Strategies to Facilitate Agencies’ Use of Evaluation in Program Management and Policy Making. GAO-13-570. Washington, D.C.: June 26, 2013. President’s Emergency Plan for AIDS Relief: Agencies Can Enhance Evaluation Quality, Planning, and Dissemination. GAO-12-673. Washington, D.C.: May 31, 2012. Grants Management: Action Needed to Improve the Timeliness of Grant Closeouts by Federal Agencies. GAO-12-360. Washington, D.C.: April 16, 2012. Designing Evaluations: 2012 Revision. GAO-12-208G. Washington, D.C.: January 31, 2012. International School Feeding: USDA’s Oversight of the McGovern-Dole Food for Education Program Needs Improvement. GAO-11-544. Washington, D.C.: May 19, 2011. Program Evaluation: Experienced Agencies Follow a Similar Model for Prioritizing Research. GAO-11-176. Washington, D.C.: January 14, 2011. Managing for Results: Enhancing Agency Use of Performance Information for Management Decision Making. GAO-05-927. Washington, D.C.: September 9, 2005. Program Evaluation: An Evaluation Culture and Collaborative Partnerships Help Build Agency Capacity. GAO-03-454. Washington, D.C.: May 2, 2003. Managing For Results: Federal Managers’ Views Show Need for Ensuring Top Leadership Skills. GAO-01-127. Washington, D.C.: October 20, 2000. Performance Plans: Selected Approaches for Verification and Validation of Agency Performance Information. GAO/GGD-99-139. Washington, D.C.: July 30, 1999. Agency Performance Plans: Examples of Practices That Can Improve Usefulness to Decisionmakers. GAO/GGD/AIMD-99-69. Washington, D.C.: February 26, 1999. Executive Guide: Effectively Implementing the Government Performance and Results Act. GAO/GGD-96-118. Washington, D.C.: June 1, 1996.", "summary": "The Trump Administration requested $28.5 billion in foreign assistance in fiscal year 2019, to be administered by at least 22 federal agencies. Almost 95 percent of this assistance is administered by six agencies—the Departments of Agriculture (USDA), Defense (DOD), State (State), Health and Human Services (HHS), the Millennium Challenge Corporation (MCC), and the U.S. Agency for International Development (USAID). FATAA required the President to set forth guidelines for M&E of U.S. foreign assistance. In January 2018, OMB issued the required guidelines for federal agencies. FATAA also contained a provision for GAO to analyze the guidelines established by OMB; and assess the implementation of the guidelines by the agencies. In this report, GAO examined the extent to which (1) OMB's M&E Guidelines incorporate GAO leading practices, and (2) agencies incorporate the OMB Guidelines in their M&E policies and plans. GAO assessed the OMB Guidelines against GAO's 28 leading practices identified in GAO-16-861R . GAO also assessed the six agencies' foreign assistance M&E policies against the Guidelines and interviewed OMB and relevant agency officials in Washington, DC. The Office of Management and Budget's (OMB) foreign assistance Guidelines incorporate most of GAO's leading practices for monitoring and evaluation (M&E), but gaps exist (see figure). Monitoring : The Guidelines define monitoring as the continuous tracking of program or project data to determine whether desired results are as expected during implementation. The Guidelines do not require GAO's leading practices on risk assessments, staff qualifications, and program close-out procedures. Evaluation : The Guidelines define evaluation as the systematic collection and analysis of program or project outcomes for making judgments and informing decisions. They do not require GAO's leading practices on developing staff skills and following up on recommendations. OMB officials indicated the Guidelines are focused on elements required in the Foreign Aid Transparency and Accountability Act of 2016 (FATAA), but noted that agencies can add additional requirements to their own M&E policies. FATAA requires the President to set forth guidelines “according to best practices of monitoring and evaluation.” OMB staff acknowledged that GAO's leading practices are important, but stated that there is no singular established standard for best monitoring practices. Nevertheless, all of GAO's leading practices can help agencies address impediments, effectively manage foreign assistance, and meet their goals. When assessing agencies' M&E policies against OMB Guidelines, GAO found that agencies incorporated most of the requirements. However, for monitoring, one of the six agencies GAO reviewed—DOD—did not include the requirements to establish agencies' roles and responsibilities and ensure verifiable data for monitoring activities. For evaluation, agencies required most Guideline requirements, but not all. For example, DOD, HHS, and USDA did not require conducting impact evaluations for pilot programs or projects. Without a clear requirement to do such evaluations, agencies risk duplicating or scaling up programs without fully understanding the factors that could lead to their success or failure. Agencies GAO reviewed have plans or mechanisms in place to oversee the implementation of their M&E policies. For example, State developed a guidance document to operationalize and oversee its M&E policy to ensure the implementation of the Guidelines. GAO is making recommendations to OMB, DOD, State, and USDA. OMB did not agree with the recommendation to update the Guidelines, but GAO maintains that doing so can help to emphasize the importance of the M&E practices we identified. DOD, State, and USDA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The 22 TCS programs covered by our review varied widely in total donations and number of scholarships awarded. For example, total donations during 2017 ranged from $854,326 in New Hampshire’s program to approximately $623 million in Florida’s largest program (see fig. 1 and app. I). Of the 17 states operating these programs, Arizona, Florida, and Pennsylvania operate the largest programs in terms of both dollars donated and number of scholarships awarded. These are also the only three states that operate multiple programs per state. Decisions about whether to develop and operate a TCS program—as well as how to structure requirements—are at the discretion of each state; there is no federal role in establishing these programs. For example, states sometimes choose to establish requirements that SGOs and schools must follow as a minimum condition for participation. Since scholarships are funded through donations rather than state appropriations, the financial impact to states from TCS programs primarily occurs through forgone revenue resulting from the associated tax credits. Various state agencies, SGOs, and participating private schools generally all play a role in administering state TCS programs, with the specific division of responsibilities varying by program. State agencies that are responsible for tax administration, education, or both, generally administer these programs. For example, in some programs, state agencies disseminate information to donors, scholarship students, or the public, and approve SGOs or private schools to participate in the program. SGOs are tax-exempt organizations that are generally responsible for managing some aspects of the donation process—such as collecting donations—as well as awarding scholarships to students. Participating private schools educate students receiving tax credit scholarships. They sometimes also facilitate donations or inform parents about TCS scholarship awards. Participating schools can vary in terms of characteristics such as their size, religious affiliation, and whether they focus on specific student populations, such as students with disabilities. In September 2018, we issued a report that described state TCS program requirements related to donations and student eligibility for programs operating at the beginning of 2018. In that report, we found that these programs offered tax credits to individuals, businesses, or both that ranged from 50 percent to 100 percent of the donation amount. We also found that most programs set limits on the amount of TCS program donations that could be made per year. In terms of eligibility, we found that TCS programs commonly determined student eligibility based on their household income, with income limits varying widely across programs. States have established requirements that SGOs must follow as a condition of participation in their TCS programs. See figure 2 for key requirements that some states have chosen to put in place for SGOs. All TCS programs have financial requirements that limit the percentage of donations that SGOs are permitted to use for non-scholarship expenses—such as staff salaries—and most also require SGOs to undergo annual financial audits or reviews. (See fig. 3.) The limit on the percentage of donated funds that SGOs are permitted to use on non-scholarship expenses ranges from 2 percent to 10 percent for 20 of the 22 programs. The other 2 programs—both in Pennsylvania— have a limit of 20 percent. About half (12) of programs also require SGOs to follow rules about how donated funds or related interest are managed and spent. For instance, South Dakota requires SGOs to spend all revenue from interest or investments on TCS scholarships. Most (19) programs require SGOs to undergo either an annual financial audit or review. Some of these programs require more extensive audits for SGOs that receive donations over a certain dollar threshold (e.g., over $1 million). Three programs require at least some SGOs to submit proof of fiscal soundness, such as a surety bond or letter of credit. For example, to insure against potential financial loss, Florida requires SGOs to submit a surety bond equal to the SGO’s unspent donations. Some programs require SGOs to take steps to guard against conflicts of interest. For example, four programs require SGOs to have a conflict of interest policy or a policy designed to prevent individual financial gain among SGO personnel. For instance, New Hampshire prohibits SGOs from awarding scholarships to children of any SGO employee or to children of any business owner whose business donates to the SGO. About a third (8) of programs prohibit SGOs and participating schools from sharing resources or personnel, while other programs do not include such prohibitions. For example, in Pennsylvania, schools are permitted to operate as SGOs and award scholarships directly to their students. In addition, TCS programs require SGOs to be recognized as tax-exempt organizations by the Internal Revenue Service (IRS), so they generally are also subject to applicable federal requirements for tax-exempt organizations, such as filing an annual information return or notice with the IRS. In addition, SGOs may be subject to applicable state laws for tax-exempt or non-profit organizations. Figure 4 shows the number of state TCS programs that had selected administrative requirements for SGOs. All programs require SGOs to register or receive state approval by, for example, submitting an application to the state or providing documentation showing the SGO is a tax-exempt organization. Slightly fewer than half (10) of programs require SGOs to follow rules about the qualifications of SGO leadership personnel. For instance, Nevada requires the SGO’s top board member to sign an affidavit stating that no member of the board of directors or SGO employee has ever been convicted of a felony, among other requirements. Nine of the programs have requirements related to marketing and fundraising practices. For instance, Louisiana requires SGOs to send the state any advertisements so state officials can review the materials. Almost all (21) programs require SGOs to report to the state the number or total dollar amount of scholarships they awarded. Also, 19 programs require SGOs to report information about the characteristics of scholarship students, such as household income or geographic location. These programs sometimes choose to require SGOs to report individual student-level information or aggregated information for all of their scholarship students combined. For example, Alabama requires SGOs to report identifying information and scholarship amounts for each student to the state. Alternatively, Georgia requires SGOs to report the number of families of scholarship recipients by income group. Figure 5 shows how many programs had key requirements for SGOs related to scholarship awards. Almost all (20) programs prohibit SGOs from awarding scholarships to only one school. Some of these 20 programs require SGOs to allow students to use their scholarships at any qualified school whereas others allow SGOs to work with a subset of two or more schools. The majority of programs prohibit donors from recommending that scholarships go to specific students while fewer programs prohibit donors from directing funds to specific schools. More than half (16) of programs prohibit SGOs from allowing donors to recommend that scholarships go to specific individuals, such as students they know personally. About one-third (8) of programs prohibit SGOs from allowing donors to recommend that scholarship funds be used at a specific school. In addition to requirements for SGOs, states with TCS programs also have requirements for private schools. See figure 6 for key requirements that some states with TCS programs have chosen to put in place for schools. Some requirements were specific to schools participating in the TCS program and some requirements were for all private schools, regardless of TCS program participation. We counted programs as having a particular requirement as long as the requirement applied to at least some of the participating private schools. Programs generally have one or more academic requirements for participating private schools. (See fig. 7.) About half (9) of the programs require private schools to register or be approved by the state TCS program before their students can receive TCS scholarships. For example, in Nevada private schools must register with the state by completing a form acknowledging that they will follow program requirements. Other programs, such as Georgia’s, require SGOs to determine if private schools meet program participation requirements. Separate from any requirements to register with the TCS program itself, over half (14) of the programs require participating private schools to be accredited by the state or another organization, such as a regional accreditation organization. For example, Pennsylvania requires participating private schools to be 1) licensed by the state, 2) accredited by an association approved by the state, or 3) operated by a religious institution. Private schools participating in most TCS programs are subject to requirements regarding minimum instructional time or student attendance and requirements related to curriculum content or core subjects, such as reading, mathematics, social studies, and science. These requirements may or may not be the same as requirements for all private schools in a state. For example, Nevada requires all private schools, including those participating in its TCS programs, to provide 180 days of academic instruction per year. South Carolina’s TCS program generally requires participating private schools to offer the courses required to receive a high school diploma in the state. Eleven programs require schools to give academic tests to TCS students. Of these programs, three require participating schools to administer the same test required of public school students and eight allow schools to select among multiple tests. For example, Louisiana requires participating private schools to give TCS students the same state tests in English and math that are used in public schools, whereas Florida allows participating private schools to choose from a state approved list of norm-referenced tests. These 11 programs also require schools to report TCS students’ test results to the state, parents, or other entities. For instance, one of Florida’s programs requires schools to report test results to a university selected by the state to analyze TCS students’ test scores. Participating schools are often required to ensure their teachers undergo background checks or meet minimum qualifications, and less frequently required to undergo site visits. (See fig. 8.) Most (18) programs require participating private schools to conduct background checks or fingerprinting of employees with direct, unsupervised contact with children. Additionally, 12 programs require schools to ensure teachers meet certain qualifications, such as holding a state-issued certificate or a college degree. For example, Alabama requires all private school teachers to hold teaching certificates issued by the state. Nine of the programs require private schools to permit state or other officials to conduct site visits. In the majority of these programs, site visits are a general requirement for private schools in the state or a component of state accreditation that some or all schools are required to obtain before participating in the TCS program. Across these programs, the frequency of the site visit varies. For instance, Indiana state officials are required to make random site visits to at least five percent of participating private schools each year, while Iowa requires a site visit for all private schools operating in the state at least once every five years. Among the 22 programs, financial requirements for participating private schools are generally less common than academic and administrative requirements. (See fig. 9.) Most (19) programs have requirements related to student withdrawals, such as requiring schools to report or repay the scholarship when students withdraw from the school for which the scholarship was originally awarded. For example, Illinois requires schools and SGOs to prorate scholarships for students who transfer to another private school during the school year, while Louisiana requires schools to immediately notify the SGO and state if a scholarship student is no longer enrolled. Few (4) programs require schools to complete an annual financial audit or review. Among programs with such requirements, Florida requires schools that receive more than $250,000 in scholarship funds to submit the results of a financial audit to the SGO that awarded the majority of those funds. South Carolina requires all schools to include a copy of an audit or other financial review when they initially apply to participate in the program and annually afterwards. About one-fourth (5) of programs require schools to provide surety bonds or other evidence to demonstrate financial viability. For example, Louisiana requires schools that have operated for fewer than five years and will receive more than $50,000 in TCS funds to either provide a SGO with a surety bond equal to the amount of TCS funds they expect to receive during the school year or other information showing financial viability. Florida requires schools operating for fewer than three years to provide the state with a surety bond equal to the amount of scholarship funds for any quarter. In the three states with the largest TCS programs—Arizona, Florida, and Pennsylvania—SGOs are generally responsible for recruiting donors while state agencies administer tax credits. (See fig. 10). SGOs generally recruit potential donors and sometimes help them apply for tax credits. SGO officials in all three states described ways they solicit donations, such as meeting with representatives from corporations to promote TCS programs or providing banners and pamphlets for private schools to display. In Arizona—where SGOs are permitted to allow donor recommendations for specific schools or students in certain programs— SGO and school officials described roles for schools or students and their families in soliciting donations. For example, family members of prospective scholarship students may encourage members of their community to donate and recommend their child or child’s school, according to officials from a SGO and a school we visited in Arizona. In addition, SGO officials we spoke with in all three states noted that they help donors navigate the process of obtaining tax credits. For example, officials from a SGO in Pennsylvania described how they can fill out the application for tax credit pre-approval as the donor’s delegate or review completed applications for errors before donors submit them to the state. State agencies administer state tax credits based on the rules of each TCS program. Specifically, five of the eight programs in the three states have a maximum total dollar limit on the amount of all scholarship tax credits that can be awarded in a year. In those five programs, the state requires donors to apply for pre-approval of the tax credits to ensure the limit has not been reached and tax credits are still available. In the Florida and Arizona programs that have such limits, state agencies consider all donor applications for tax credit pre-approval on a first come, first served basis. Pennsylvania considers returning donors for pre-approval before considering new donors (while tax credits remain). State officials in Pennsylvania and Florida described different methods for reviewing donors’ tax compliance before and after they file their taxes and claim the TCS tax credit. Specifically, the Pennsylvania Department of Revenue checks for any outstanding tax liability before approving tax credits for the TCS programs and reviews all tax returns that claim TCS credits to ensure the amount of tax credits claimed does not exceed the amount that was pre-approved. The Florida Department of Revenue reviews tax returns that claim a TCS credit to ensure the amount of tax credits used matches the approved amount that was allocated for the donor. Officials from the Arizona Department of Revenue said it does not have a separate tax compliance review process for its TCS credits. All three states established scholarship requirements while SGOs managed the scholarship awards process by determining which students are eligible for TCS scholarships, which eligible applicants will receive scholarships, and how much to allocate to scholarship recipients within program limits. In contrast, state agencies have a limited role—or no role at all—in determining the allocation of scholarships among eligible students, according to state and SGO officials in all three states. However, states may provide guidance documents to help SGOs navigate the state’s general policies for the awards process. The number of SGOs awarding scholarships varied across the three states, as did program policies for how those SGOs determine which eligible students receive scholarships. In fall 2017, Florida had two SGOs—one of which awarded 99 percent of scholarships. Meanwhile, Arizona’s four TCS programs had between 14 and 60 SGOs each and Pennsylvania’s two programs had approximately 190 and 260 SGOs each. In addition, as described in table 1, states varied in their requirements for how SGOs prioritize eligible students, the degree to which SGOs may work exclusively with a subset of schools, and whether SGOs may consider donors’ recommendations when deciding which students receive scholarships. Further, because each SGO is responsible for establishing its own procedures for awarding scholarships within program requirements, a TCS program with many SGOs could have substantial variation in how scholarships are awarded. Prioritizing eligible students: The three states provide varying levels of discretion to SGOs in how they prioritize eligible students when awarding scholarships. For example, Florida’s largest program requires SGOs to award scholarships on a first-come, first-served basis with first priority to students who previously received a scholarship, and then to students from lower-income households or who are in foster care; its other program requires SGOs to award scholarships to students on a first- come, first-served basis. Two programs in Arizona and one in Pennsylvania outline requirements for how SGOs must prioritize among eligible students, while the remaining programs do not. Further, in all four Arizona programs and both Pennsylvania programs, SGOs are permitted to set additional criteria for selecting scholarship recipients beyond requirements set by the state, as long as those criteria align with program rules and existing laws. For example, officials we spoke with at one SGO in Arizona noted that their selection committee considers written narratives from students and their parents about the student’s character and academic achievement when prioritizing eligible students, among other factors. Working with a subset of schools: State policies about partnerships between SGOs and schools can affect which students receive scholarship awards and where students can use those awards. SGOs in Florida award scholarships to students who can then use their scholarship award at any private school that qualifies to participate in the TCS program. In contrast, Arizona and Pennsylvania allow SGOs to partner with subsets of participating schools and award scholarships exclusively to students at those schools. For example, in Arizona and Pennsylvania, some SGO officials noted that the scholarships awarded through their SGO may only be used at partner schools that shared a religious affiliation with the SGO. Allowing donor recommendations: The TCS programs in the three states also had different rules on whether donors may recommend that scholarships be awarded to particular schools or students. Florida prohibits donors from making scholarship recommendations or designations for specific schools or students. In all Pennsylvania and Arizona programs, donors can recommend or designate donations for specific schools, but SGOs can take different approaches to distributing any such recommended funds. For example, one SGO in Pennsylvania sends recommended donation funds directly to the designated schools and the school decides how to distribute the scholarship funds among eligible students. In Arizona, one SGO tracks the amount of donations donors recommend for each of its partner schools and awards those funds to eligible students enrolled at those schools. Further, Arizona’s two TCS programs designed for individual donors (rather than businesses), allow donors to recommend that the funds they donate go to specific students. An official at one SGO we visited in Arizona said they provided its external scholarship award committee with information about students’ applications, including any student-specific recommendations, to inform the selection process. Pennsylvania programs do not expressly prohibit donor recommendations for specific students. In Pennsylvania, officials from one school that was also a SGO told us that they did not accept student-specific recommendations, while officials in a different SGO described how donors may not make student- specific recommendations, but may designate certain groups of students, such as children of first responders. In addition to establishing program policies regarding how eligible students are selected, the three states also have requirements regarding the amount of scholarship money that can be awarded per student, and SGO officials described different methods for determining the amount and frequency of scholarship awards for each student. Among the schools we visited the proportion of students who received TCS scholarships compared to students who did not receive TCS scholarships varied. For example, in one school in Florida, less than one percent of students received TCS scholarships and in a school in Arizona, school officials told us that about 80 percent of students receive TCS program scholarships. When awarding scholarships, officials at some SGOs we visited chose to issue a limited number of awards at the maximum allowable scholarship amount while others chose to issue scholarships to more students in smaller amounts—sometimes for shorter periods. In addition, students in Arizona and Pennsylvania may receive multiple concurrent scholarships from different SGOs, different TCS programs in the state, or both. This approach potentially increases the amount of funding students receive; however, it can also present logistical difficulties for the schools and families of scholarship recipients, according to SGO and school officials. For instance, officials at one school described wanting students to receive as much TCS funding as possible, but said it was also challenging to track the different SGO award cycles, incoming funds, and the projected impact on tuition balances for each student. As part of the scholarship award process, some SGOs we visited told us they collected information about tuition and fees at schools to ensure scholarship award amounts do not exceed school tuition, per program requirements. Costs for tuition ranged from approximately $6,000 per year to approximately $37,000 per year among the schools we visited. To participate in TCS programs, all three states require SGOs to provide a description of some of their operating procedures and regularly report donation and scholarship information. The type of information states collect and how they determine whether SGOs are following applicable TCS program requirements varies. (See table 2.) All three states require SGOs to complete an application to participate in TCS programs, which involves signing a form attesting that the SGO will follow program requirements and providing other types of documentation. This documentation includes evidence that the SGO is recognized as tax- exempt by the IRS, descriptions of the SGO’s procedures for awarding scholarships, and other information, depending on the program. When reviewing SGO applications, state officials in all three states described how they check that all required information is included in accordance with program rules, but generally do not evaluate the content. For example, in Pennsylvania, a program official noted that the state agency checks that SGOs submit all required documents and relies on attestation statements signed by SGO officials as an essential step for certifying that SGOs will follow program requirements. In addition, state agencies also generally provide SGOs with some guidance on how to interpret program requirements in all three states. State agencies in both Arizona and Pennsylvania have developed guidance manuals for SGOs. Florida collaborates closely with SGOs to interpret program rules and develop guidance, according to SGO and state officials. In addition to application materials, all three states require SGOs to regularly submit information about donations received, scholarships awarded, and the results of financial audits or reviews. The extent to which these audits or reviews include an assessment of SGO compliance with program requirements varies. For example, in addition to financial audits, Florida also requires the state Auditor General to review SGO operations for compliance annually. According to SGO officials, the Florida Auditor General conducts file reviews and on-site visits during these compliance reviews. In Arizona, the SGO manual includes optional procedures financial auditors may use to determine if SGOs are following certain program requirements as part of their review. Pennsylvania does not require an assessment of SGOs’ compliance with program requirements as part of its annual financial audit. According to officials, states typically work with SGOs to resolve any compliance issues and state agencies rarely permanently revoke SGOs’ approval to participate in TCS programs. According to officials in Florida, no SGOs have been removed from the programs due to noncompliance. The officials said that once a SGO has been approved through the states’ initial application process it is very likely that they will be renewed each year unless a large compliance issue arises. Officials in Pennsylvania noted that they contact SGOs to clarify discrepancies in documentation and have temporarily revoked approval from a small proportion of SGOs that failed to submit required information. Officials in Arizona described one instance where a SGO was decertified due to noncompliance; officials stated that the SGO would be recertified if it resolved the compliance issues and reapplied to be a SGO. State officials in the three states described different approaches to overseeing participating private schools’ compliance with program requirements. Florida state officials described using a variety of monitoring activities to oversee participating private schools, while Arizona and Pennsylvania state agency officials said they do not conduct ongoing monitoring activities due to the parameters of their statutory authority. (See table 3.) Florida state officials described conducting site visits to schools during the initial application process and when they determine schools are at risk of noncompliance. They also noted their monitoring practices have led them to identify multiple issues of noncompliance at certain schools and, as a result, they have temporarily or permanently suspended those schools from receiving TCS program funds. They said the state also delegates certain monitoring activities to SGOs, such as reviewing financial audit results, following up with schools to resolve any issues resulting from those audits, and reporting those issues to the state. State and SGO officials said that SGOs in Florida may also be responsible for implementing any penalties to schools, such as adjusting scholarship payments to schools that do not meet certain reporting requirements. For all Arizona programs and one of two Pennsylvania programs, officials told us that they generally rely on SGOs to verify that schools receiving scholarship funds meet program requirements. For example, in Arizona, SGOs are responsible for determining if a school qualifies to participate in the state’s TCS programs. SGO officials we spoke to in Arizona noted they require schools to sign documents attesting that the school meets the requirements to be a qualified school. In Pennsylvania’s Educational Improvement Tax Credit Program, SGOs determine whether schools are qualified to participate and each SGO may approach this differently, according to state officials. For example, in addition to meeting the state’s criteria for participation in the program, one SGO we spoke with in Pennsylvania also required schools to be tax-exempt, have a board and budget, and share its religious affiliation. Another SGO we spoke with in Pennsylvania required that a school attest that it meets program requirements. In Pennsylvania’s other TCS program (the Opportunity Scholarship Tax Credit Program) state officials told us that they determine whether schools are qualified to participate and do not conduct subsequent monitoring activities. We provided a draft of this report to the Department of Education for review and comment. Education’s comments are reproduced in appendix III. Education also provided technical comments, which we incorporated as appropriate. We also provided relevant excerpts from the report to the appropriate state agencies in each state we reviewed and incorporated their technical changes as appropriate. Education did not comment on the report’s findings. Instead, it provided information about the administration’s tax credit proposal and made observations about how the scope of TCS programs covered in our report was both similar and different from educational programs that are addressed in the administration’s proposal. In its comments, Education further stated that given these scope differences, the GAO report may not fully inform the debate around the administration’s proposal. As stated in the draft report, promoting school choice options—both private and public—through a variety of spending and tax expenditure programs continues to be a topic of national debate. The purpose of this report was to examine state TCS programs that are used to fund scholarships that students can use to attend private elementary and secondary schools by describing: (1) key requirements state TCS programs have chosen to establish for SGOs, (2) key requirements for private schools participating in state TCS programs, and (3) how selected states implement TCS programs and how they assess whether SGOs and participating private schools are following key state requirements. Education stated that the draft report does not note that several TCS programs allow scholarships to be used for educational expenses beyond tuition. As stated in the draft report, some states use tax credit scholarship programs to fund preschool, career and technical education, or public school initiatives; the draft report further noted that these programs are outside the scope of this review. This report is the second of two GAO reports examining K-12 TCS programs. The prior report (GAO-18-679) discussed various ways students can use state K-12 TCS scholarships. Specifically, we reported that, as of SY 2017-2018, more than half of the programs (13 of 22) allowed students to use their scholarship money for costs like transportation and books in addition to tuition, whereas the remaining programs (9 of 22) required scholarship funds to be used for tuition only. Education asserted positive fiscal effects associated with state TCS programs and cited several studies to this end. As stated in the draft report, tax credits are a form of forgone revenue. Assessing the fiscal impact of these programs was not among the purposes of this report. Thus, we did not assess the reliability of these studies or the validity of their results. Education also commented on our decision to exclude Montana’s TCS program from the scope of this report. As noted in our report, we did not include Montana’s program because it was the subject of pending litigation at the time of our review. Finally, Education noted, as also stated in the draft report, that states and school districts have obligations under the Elementary and Secondary Education Act and the Individuals with Disabilities Education Act to make equitable services available to eligible private school students, including those who participate in TCS programs. We agree and have reported extensively on equitable services in the context of private schools in GAO-16-712 and GAO-18-94. In GAO-18-94, we recommended that Education review information provided by states related to changes in federal special education rights when a parent places a student with a disability in private school and work with the states to correct inaccurate or incorrect information. In that report, we identified some private school choice programs that were providing information that Education confirmed inaccurately described rights under the Individuals with Disabilities Education Act when a student with a disability is moved from a public to a private school. Education agreed with this recommendation – a recommendation GAO considers to be among the highest priority of recommendations we have made to the Department. However, Education has not yet fully implemented this recommendation and, as of September 2019, we found that some information Education confirmed to be inaccurate remains in several states’ private school choice program documents. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Education, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in Appendix IV. of donors: businesses, individuals, or both) 1,957b (both) 15 (business) 795 (business) $1,856 88,109b (individual) $1,450 47,895b (individual) ——- (both) 286d (business) 23,411b (both) ——- (both) 6,768b,d (both) 3,054 (both) 153 (both) 79 (both) 69d (business) 71 (business) of donors: businesses, individuals, or both) Average donation amount per donor ——- (both) 1,671 (business) 662 (business) 40 (business) 788d (both) ——- (business) 1,428 (both) The profiles in this appendix describe key features of the largest tax credit scholarship programs in Arizona, Florida, and Pennsylvania, as measured in terms of the scholarships awarded in 2017. Information in these profiles was obtained from interviews with state agency and selected scholarship granting organization (SGO) officials and state program documents, and was verified by state officials. GAO did not independently review state laws or regulations. Unless otherwise specified, program requirements are as of school year 2018-2019. 10 percent of donations. Undergo annual audit or financial review depending on amount of donations received. donations. Administrative Receive state approval to operate. Ensure all promotional materials include required language. scholarship awards. Academic Follow guidelines for school curriculum or core subjects. Follow guidelines for minimum instructional time or attendance. Donations: Donors contributed over $68 million during calendar year 2017. The program is open to individual donors only (business donors may fingerprinting for staff. donate through other Arizona programs.) Financial Follow requirements if students withdraw (e.g., report or repay). Donations are eligible for 100 percent tax credits. The program does not limit annual program-wide donations. Individual donors (filing as single) were limited to $569 in tax credits during tax year 2019. Scholarship awards: 34,632 scholarships were awarded between July 1, 2017 and June 30, 2018. All K-12 students who live in Arizona and attend a private school are eligible for the program. SGOs are expected to consider financial need when prioritizing among eligible applicants. Students may receive more than one scholarship from this program and concurrently receive scholarships from other tax credit scholarship programs in the state, up to the full cost of tuition. SGOs may partner with a subset of qualified schools, such as schools with shared religious views or teaching methods. Donors may recommend that their donation fund scholarships at specific schools or be awarded to specific students (within certain parameters). 0 percent of donations in first 3 years and 3 percent afterwards. Provide a surety bond or line of credit. Maintain separate accounts for scholarship funds. Not share resources or personnel with private schools. Have a conflict of interest policy. Undergo annual financial audit. Report information about donations. Administrative Receive state approval to operate. Not have an owner or operator who recently filed for bankruptcy. Limit funds used for marketing. Report on scholarship awards. Academic Register with state. Follow guidelines for minimum instructional time or attendance. Donations: Donors contributed about $623 million during tax year 2017. The program is open to businesses (not individuals). Donations are eligible for 100 percent tax credits. Maximum allowable credit amounts per donor vary from 50 percent to Administer an approved academic test (not necessarily the test used in public schools). 100 percent of tax liability, depending on the type of business tax to which the tax credit is applied. Program-wide limit on tax credits was $698 million in state fiscal year 2017-2018. Administrative Hire teachers who meet minimum qualifications. Ensure background checks or fingerprinting for staff. Undergo state site visits. Scholarship awards: 108,098 scholarships were awarded during school year 2017-2018. Students are eligible for full scholarships if their household income level does not exceed 200 percent of the federal poverty level or if they are in foster care. Financial Undergo annual audit if receive a Students may only receive one tax credit scholarship at a time, up to $7,208 for tuition and fees, as of school year 2017-2018. given amount of scholarships. SGOs must allow students to use scholarships at any private school Provide a surety bond or line of participating in the program. credit if in operation for less than 3 years. Donors are prohibited from recommending that their donation fund scholarships at specific schools or for specific students. Follow requirements if students withdraw (e.g., report or repay). 20 percent of donations. Undergo annual audit or financial review. donations. Administrative Receive state approval to operate. Report information about scholarship awards. Academic Be accredited, licensed by the state, or a religious institution. Follow guidelines for minimum instructional time or attendance. Follow guidelines for core curriculum or academic subjects. Administrative Hire teachers who meet minimum qualifications. Ensure background checks or fingerprinting for staff. Donations: Donors contributed about $87 million during tax year 2017. The program is open to businesses, including “special purpose entities” Financial Follow requirements if students withdraw (e.g., report or repay). which allow individuals to donate to the program through the entity. Donors are eligible to receive tax credits for 75 percent of their donations if they donate for one year and tax credits for 90 percent of their donations if they donate for two consecutive years. The maximum allowable tax credit amount per donor is $750,000. The program-wide limit on tax credits was $135 million in fiscal year 2017. Donors must apply for pre-approval before claiming tax credits. Past donors may apply for credits before potential new donors apply for any remaining tax credits. Scholarship awards: 37,725 students received scholarships during school year 2017-2018. Students are eligible for scholarships if their household income level does not exceed $85,000, plus $15,608 per dependent in the household (higher for students with disabilities). Students may receive multiple tax credit scholarship at a time. Total scholarship award amount may not exceed the cost of tuition and fees. SGOs may partner with a subset of qualified schools, such as schools with shared religious views or teaching methods. Donors may recommend that their donation fund scholarships at specific schools. Donors are not prohibited from recommending scholarships to specific students. In addition to the individual named above, Nagla’a El-Hodiri (Assistant Director), Barbara Steel (Analyst-in-Charge), Andrew Emmons, and Jessica L. Yutzy made key contributions to this report. Also contributing to this report were Isabella Anderson, Jeff Arkin, Deborah Bland, Lilia Chaidez, Sarah Cornetto, Caitlin Cusati, Charles Ford, Monika Gomez, Alison Grantham, Kirsten Lauber, Sheila R. McCoy, Mimi Nguyen, Corinna Nicolaou, and Michelle Philpott.", "summary": "All TCS programs are state programs. States develop program policies and requirements, including establishing the roles and responsibilities of SGOs and participating private schools. The President's fiscal year 2020 budget request included a proposal for federal tax credits for donations to state-authorized SGOs. GAO was asked to review key characteristics related to accountability in state TCS programs that can fund K-12 educational expenses. This report examines (1) key requirements state TCS programs have chosen to establish for SGOs, (2) key requirements for private schools participating in state TCS programs, and (3) how selected states implement TCS programs and assess whether SGOs and participating private schools are following key state requirements. GAO identified key requirements states may choose to establish related to accountability for SGOs and schools based on relevant research and prior work. GAO also reviewed program documents from all 22 TCS programs to identify whether they had these key requirements as of school year 2018-2019 and then verified this information with state program officials. GAO did not conduct an independent review of state laws and regulations. GAO visited Arizona, Florida, and Pennsylvania, which have the largest TCS programs. In each of these states, GAO reviewed program documents and interviewed officials at state agencies and staff at selected SGOs and private schools (selected to provide variation in size and other characteristics). State tax credit scholarship (TCS) programs—programs that offer state tax credits for donations that can fund scholarships for students to attend private elementary and secondary schools—have established various key requirements for the scholarship granting organizations (SGO) that collect donations and distribute awards. For example, all 22 TCS programs in operation as of January 2019 require SGOs to register with or be approved by the state and limit the percentage of donations they can use for non-scholarship expenses. In addition, almost all of these programs—which received over $1.1 billion in donations and awarded approximately 300,000 scholarships in 2017—also require SGOs to undergo annual financial audits or reviews (19 programs). Fewer programs have requirements about SGO fundraising practices (9 programs) or the qualifications of SGO leadership personnel (10 programs), such as restrictions on officials having previous bankruptcies. States also have various key requirements that apply to private schools that enroll students with TCS scholarships. For example, private schools in most of the 22 programs must follow certain academic guidelines related to curriculum content (18 programs) and instructional time (19 programs), and have staff undergo background checks (18 programs). Schools in fewer programs are required to conduct academic testing (11 programs), ensure their teachers have specified qualifications (12 programs), or undergo an annual audit or financial review (4 programs). The three states with the largest TCS programs—Arizona, Florida, and Pennsylvania—implement and oversee their programs in different ways. In all three states, state agencies administer the tax credits while SGOs are generally responsible for managing donations and awarding scholarships; the details of these processes varied based on the requirements of each program. For example, Arizona and Pennsylvania's programs allow donors to recommend that funds go to specific schools, which can affect how SGOs solicit donations and award scholarships. Florida does not permit recommendations. All three states require SGOs to report on operations and undergo annual financial audits or reviews, while the states differ in how participating private schools are overseen. Florida's TCS programs use multiple monitoring methods, while all Arizona programs and one of two Pennsylvania programs generally rely on SGOs to confirm that schools comply with program requirements.", "document_type": "gao"}
{"report": "DHS has 15 components involved in achieving its broad strategic goals of countering terrorism and homeland security threats, securing U.S. borders and sovereignty, securing cyberspace and critical infrastructure, preserving U.S. prosperity and economic security, and strengthening preparedness and resilience. DHS relies on contracts to support these missions and has 10 contracting activities with authority to procure products and services within and across DHS’s components. For example, OPO within DHS’s Management Directorate is responsible for contracting for a number of DHS’s components and offices, including the Science and Technology Directorate, the Cybersecurity and Infrastructure Security Agency, and the Countering Weapons of Mass Destruction Office. See appendix II for DHS’s organizational chart, identifying operational and support components and contracting activities. The FAR requires that agencies take certain steps when identifying and developing requirements that need to be addressed through the execution of a contract. For example, the FAR requires that agencies conduct market research, as appropriate, and defines market research as the process used to collect and analyze information about capabilities in the market that could satisfy an agency’s needs. While the extent of market research will vary depending on characteristics of the requirement, the FAR provides general policies and procedures for conducting market research with the goal of arriving at the most suitable approach to acquiring, distributing, and supporting supplies and services. The FAR also requires agencies to perform acquisition planning activities for all acquisitions to ensure that the government meets its needs in the most effective, economical, and timely manner possible. In addition to the FAR, DHS relies on the Homeland Security Acquisition Regulation and Homeland Security Acquisition Manual—issued by DHS’s Chief Procurement Officer to implement and supplement the FAR—to establish policies and procedures for all acquisition activities within the department. For example, together the Homeland Security Acquisition Regulation and Homeland Security Acquisition Manual provide more specific department-wide policies and procedures for implementing acquisition requirements laid out by the FAR, such as competition, acquisition planning, and market research. Contracting activities may also implement their own procedures that support and implement the FAR, Homeland Security Acquisition Regulation, and Homeland Security Acquisition Manual. DHS also has its own policies and guidance for managing its service acquisition programs. For example, DHS generally defines major acquisition programs as those with life-cycle cost estimates of $300 million or more. However, DHS’s Acquisition Management Instruction 102-01-001 identifies additional thresholds for approval of stand-alone service acquisition programs—service contracts that are not part of a larger acquisition program. Specifically, service acquisition programs with annual cost estimates of $1 billion or more, or between $100 million and $1 billion are identified as Major Level 1 or 2 acquisition programs, respectively, and generally require approval from DHS’s Chief Acquisition Officer. Service acquisition programs with annual cost estimates under $100 million can be approved at the component level in accordance with component policies and processes. As of November 2019, DHS did not have any service programs identified as Major Level 1 or 2. In response to the 2009 Presidential Memorandum on Government Contracting, OFPP, within OMB, issued a policy letter in September 2011 to all executive agencies—including DHS—to clarify, in part, when governmental outsourcing of services is and is not appropriate. Specifically, the letter defines inherently governmental functions, according to the definition in the Federal Activities Inventory Reform Act, as those that are so intimately related to the public interest as to require performance by federal employees, such as determining agency policy or budget requests. Additionally, it identifies categories of service functions that agencies are allowed to contract for, but that require heightened management attention, as they pose a risk to the government losing control of either its responsibility to perform inherently governmental functions or its mission and operations. Figure 1 illustrates the increasing risk related to contracting for these types of functions. The letter also provides guidance on managing the performance of closely associated with inherently governmental and critical service functions, among others. In 2010, OFPP had also identified categories of services requiring heightened management attention. The three categories of service functions requiring special or heightened management attention follow: 1. Closely associated with inherently governmental functions. The 2011 OFPP policy letter adopts a single definition of an inherently governmental function, clarifies the types of services that constitute those closely associated with inherently governmental functions, and highlights the steps that agencies must take to ensure that the contractor does not ultimately perform functions that are reserved exclusively for federal employees. The response to public comments in the 2011 OFPP policy letter—in accordance with the FAR— provides the example that aspects of acquisition planning, such as determining requirements and approving a contract strategy, are inherently governmental functions. However, contractors may be used to support acquisition planning efforts through functions such as performing market research or drafting statements of work. These supporting functions are deemed closely associated with inherently governmental functions and can be contracted for. However, the OFPP policy letter states that agencies are required to take certain steps—such as assigning a sufficient number of qualified government employees to perform contract management—to ensure, among other things, that the contractor does not perform, interfere with, or undermine the integrity of the agency’s decision-making responsibilities. 2. Critical functions. The 2011 OFPP policy letter describes critical functions that, when contracted for, pose a risk that the agency could lose control of its mission and operations. Among other things, the policy established the criteria for identifying critical functions that are internally unique to each agency based upon their mission and operations. As an example, the 2011 OFPP policy letter notes that analyzing areas of tax law that impose significant compliance burdens on taxpayers may constitute a critical function for the Internal Revenue Service’s Office of the Taxpayer Advocate. OFPP notes that when contracting for a critical function, agencies must retain sufficient internal capability either through: dedicating an adequate number of federal personnel to perform the function in-house or alongside the contractors in the event the contractor fails to perform; or ensuring federal personnel are available to oversee and manage the contractor workforce. 3. Special interest functions. Special interest functions, according to OFPP, are functions that required increased management attention due to heightened risk of workforce imbalance. Some special interest functions may also be either closely associated with inherently governmental or critical functions. According to OFPP, contracting for these functions also poses a risk that the agency can lose control of its mission and operations. In a November 2010 memo, OMB instructed agencies to identify and analyze a list of product and service codes to be deemed special interest functions. DHS, with OMB approval, has chosen 17 product and service codes to categorize as special interest functions, including policy review and development and acquisition support services. To mitigate the risk associated with contracting for special interest functions, agencies are required to analyze their contracts for special interest functions annually to ensure the mix of federal employees to contractors is appropriately balanced. For examples of functions deemed closely associated with inherently governmental, critical, and special interest, see appendix III. Since March 2019, DHS has required program officials to complete its Inherently Governmental and Critical Functions Analysis job aid for all proposed service contract requirements above the simplified acquisition threshold—currently $250,000—with a product and service code that is not included on DHS’s exemption list. The department established the Inherently Governmental and Critical Functions Analysis job aid to enable it to systematically ensure that proposed service requirements do not include inherently governmental functions and to identify those that contain functions considered closely associated with inherently governmental or critical. The job aid collects general information about the proposed service contract, such as a brief description, followed by three discrete sections to check for these three functions. Section 1. This section includes a checklist for functions that the FAR has identified as being inherently governmental, such as developing federal agency policy and determining price reasonableness of vendor bids. In order to proceed with contracting for the service, the program official has to certify that none of these functions exist within the proposed requirement. Section 2. This section includes a checklist for functions that the FAR and OMB have identified as being closely associated with inherently governmental functions, such as conducting market research or drafting statements of work. If program officials identify any functions that are closely associated with inherently governmental in the proposed requirement, the job aid includes a narrative section where the program official is expected to input information on the nature of the work to be performed by the contractor and how heightened management attention will be given. Section 3. This section requires program officials to consider whether the proposed requirement is necessary for the agency to effectively perform and maintain control of its mission, which would designate the requirement as critical. Agencies are allowed to contract for critical functions so long as the program official certifies that the agency has sufficient internal capacity to undertake the work if, for any reason, the contractor is unable to provide the service. Special interest functions are not required to be identified in the job aid. The job aid concludes with the program official’s signature and is eventually forwarded to the contracting officer as part of the overall procurement package prior to soliciting for the proposed requirement. The job aid was put in place following the March 2019 decommissioning of DHS’s prior tool—the BWAT. The BWAT was used to implement DHS’s Balanced Workforce Strategy, which focuses on achieving the appropriate mix of federal and contractor personnel. This strategy was established in October 2009 to meet the statutory requirements in the 2009 Omnibus Appropriations Act. The 2009 Omnibus Appropriations Act directed most federal agencies—including DHS—to devise and implement guidelines and procedures to ensure that, on a regular basis, consideration is given to using federal employees to perform new functions, and functions that are performed by contractors but can be performed by federal employees. The Balanced Workforce Strategy established processes to enable DHS to achieve the appropriate mix of federal employees and contractors to accomplish the department’s mission, while minimizing risk to DHS’s missions from an overreliance on contractors. DHS implemented this strategy through the BWAT—an online questionnaire completed by individual program offices for certain service contracts. The function of the BWAT was to ensure the proposed service functions are not inherently governmental, and to identify whether the functions are closely associated with inherently governmental, critical, or special interest, among others. In addition, the BWAT recommended the ratio of federal employees to contractors needed to oversee those services. This analysis was then approved by the program and reviewed by the contracting officer as part of the procurement package. According to officials from an internal DHS working group, the Balanced Workforce Strategy—and BWAT by extension—were deemed no longer necessary based on the maturation of the department’s program and contracting officials’ ability to identify inherently governmental, closely associated with inherently governmental, critical, and special interest functions without a detailed questionnaire. In addition, the software used to conduct the BWAT was not supportable and faced obsolescence issues. For additional information on the differences between the BWAT and the job aid, see appendix IV. DHS relies on its planning, programming, budgeting, and execution process to plan for and allocate resources—including those for service contracts—across the department. DHS uses this process to develop its Future Years Homeland Security Program—a database that contains 5- year program funding plans and is used to prepare a report to Congress—and the department’s annual budget request. According to DHS guidance, at the outset of the annual planning, programming, budgeting, and execution process, the Office of Policy and Office of Program Analysis and Evaluation under the Chief Financial Officer provides resource planning guidance to the components outlining departmental priorities. Following the identification of departmental priorities, DHS guidance states that components should consider their objectives and commitments within fiscal guidance constraints, to estimate needs in their resource plans. The components then prepare their annual resource plans, based on their needs and in line with DHS priorities, which are reviewed by DHS leadership and culminate in a document reflecting the department’s resource decisions. See figure 2 for a depiction of the planning, programming, budgeting, and execution process. Beginning with the fiscal year 2017 budget request, DHS has used the common appropriation structure to organize the information in its budget requests. This common appropriation structure is comprised of four appropriation accounts: procurements, construction, and improvements; operations and support; and federal assistance. Each of these accounts has mission oriented program/project activities that correspond to the components’ different operations. For example, ICE’s fiscal year 2020 budget request includes program/project activities for the three operational directorates that accomplish its mission— Homeland Security Investigations, Enforcement and Removal Operations, and the Office of the Principal Legal Advisor. Within the component’s program/project activity accounts, service contract requirements are reflected in budget documents through object classes prescribed by OMB. OMB guidance establishes object classes as a measure for communicating resource needs in budget justifications and identifies eight object class codes for other contracted services, as shown in table 1. We have conducted prior work on the use of service contracts across the federal government, including how agencies have mitigated challenges overseeing and managing risks associated with service contracts that require heightened management attention, and how agencies have identified estimated service contract needs as part of agency budget requests. Specifically: In December 2011, we reported on how the Departments of Homeland Security, Transportation, and Housing and Urban Development, the United States Agency for International Development, and the National Science Foundation considered and mitigated risks associated with professional and management support service contracts—including contracts that are considered to be a special interest function and can increase the risk that contractors inappropriately influence the government’s authority, control, and accountability for decisions. We found that these agencies generally did not consider and mitigate the risks associated with selected professional and management support service contracts prior to their award. We recommended that OMB establish a deadline for agencies to develop procedures to improve their management of risks related to professional and management support service contracts. OMB agreed with our recommendation but did not establish such a deadline. In February 2016, we reported on what insights the Department of Defense had into the military department’s use of service contracts to fulfill current and future requirements, and how the department reported on service contract requirements in its annual budget requests to Congress. We found that while program offices within the military departments generally had information on current and future service contract requirements beyond the budget year, that future service requirements through the Future Years Defense Program were not identified to Department of Defense leadership in annual budget requests because there was no requirement to do so. We also found that the Department of Defense’s budget requests to Congress did not include all planned service contract needs and that its contracted services budget exhibit intended to meet certain statutory reporting requirements significantly underreported its estimated budget request for contracted services. We suggested that Congress should consider revising statutory reporting requirements to include estimated requirements beyond the budget year. In August 2018, Congress included a provision in the National Defense Authorization Act for Fiscal Year 2019 requiring the Department of Defense to include information on planned service contract requirements in the Future Years Defense Program. We also recommended that the military departments revise budgeting guidance to collect service contract information beyond the budget year, and that the Department of Defense modify its approach for reporting on service contracts in budget exhibits to ensure that certain service contract requirements are included. The department generally agreed with these recommendations, and has taken some steps to update military department budget guidance and modified its approach for reporting service contract requirements in its budget requests. In September 2019, we reported on the extent to which the National Nuclear Security Administration reports information on service contract requirements in its congressional budget justification documents and manages potential risks of service contracts that are at risk of performing inherently governmental functions. We found that the National Nuclear Security Administration did not consistently include information on all of its service contracts in budget justification materials. We also found that the agency may not be effectively managing the risks of contractors performing inherently governmental activities because contracting officers are not required to document how they will oversee contracts for services closely associated with inherently governmental functions, and the agency does not verify that planned oversight is performed. We recommended that the National Nuclear Security Administration report on all professional support services contracts with obligations as part of its budget justification materials, ensure contracting officers document plans to oversee service contracts at risk of performing inherently governmental functions, and develop a process to ensure that contracting officers are carrying out planned oversight. The National Nuclear Security Administration generally agreed with these recommendations. DHS obligated about $70.7 billion, or 76 percent, of its $93.7 billion in total contract obligations on services from fiscal years 2013 through fiscal year 2018. See figure 3 for details on DHS’s obligations on services and products from fiscal years 2013 through 2018. DHS annual service contract obligations increased by 40 percent from fiscal years 2013 to 2018, from about $10.5 billion to $14.7 billion. This increase in service contract obligations was largely driven by increases in Federal Emergency Management Agency and CBP service contract obligations, which grew by $2.2 billion and $927 million respectively. In fiscal year 2018, the Federal Emergency Management Agency had the highest service contract obligations, at $3.3 billion, followed by DHS headquarters organizations, and CBP. Of the Federal Emergency Management Agency’s fiscal year 2018 service contract obligations, $2.5 billion, nearly 75 percent, were identified as disaster-related. See figure 4 for additional detail on fiscal year 2018 service contract obligations by DHS component. DHS relies on a variety of services to accomplish its missions. For example, about $2.1 billion, or 14 percent of DHS’s total fiscal year 2018 service contract obligations, were for guard services to protect federal buildings or other security needs. DHS obligated about $2 billion, or 13 percent of its total fiscal year 2018 service contract obligations, towards various information technology and telecommunications services—such as satellite services and hardware and software maintenance. DHS’s five service categories with the highest amount of contract obligations in fiscal year 2018 accounted for about 40 percent of its total service contract obligations that year. See figure 5 for additional details on DHS’s top service obligations. In fiscal year 2018, 65 percent of DHS’s total service contract obligations were for services in need of heightened management attention or oversight due to being a closely associated with inherently governmental, critical, or special interest function. DHS’s obligations on contracts for these types of services increased by about 58 percent, from about $6 billion in fiscal year 2013 to $9.5 billion in fiscal year 2018. See figure 6 for additional details on the proportion of contract obligations for services in need of heightened management attention over time. Within our selected components, obligations for service contracts in need of heightened management attention increased the most from fiscal years 2013 to 2018 for contracts awarded by ICE—increasing by $732.1 million. CBP’s obligations for service contracts in need of heightened management attention increased over this time frame by $598 million. Service contracts in need of heightened management attention accounted for more than three quarters of all service contract obligations in fiscal year 2018 for DHS headquarters organizations and ICE. See figure 7 for additional detail on fiscal year 2018 contract obligations for services in need of heightened management attention by DHS component. DHS has policies and guidance to identify its service and product needs and develop contract requirements. In addition to the FAR, Homeland Security Acquisition Regulation, and Homeland Security Acquisition Manual, which combined establish DHS’s acquisition regulations and contracting policies, DHS has developed additional guidance specific to identifying needs and developing contract requirements. For example, DHS’s Developing and Managing Contract Requirements Desk Guide for the Acquisition Workforce is available to program personnel as a resource for how to define requirements, including processes and required documents and templates. DHS has also developed guidance for program and contracting officials for specific activities related to the requirements development process—such as market research, acquisition planning, and source selection guides—as well as guidebooks for specific participants involved in identifying needs and developing contract requirements, such as the contracting officer’s representative. Based on DHS policies and guidance, we identified key processes DHS undertakes to identify needs and develop contract requirements for services and products. Of these key processes, assessing for inherently governmental functions is specific to DHS’s development of service requirements. In response to the 2011 OFPP policy letter’s requirements to screen service contracts for the performance of inherently governmental functions and consider how contractor employees are used to perform agency functions, DHS implemented the BWAT in 2013. As previously noted, this tool has now been replaced by the Inherently Governmental and Critical Functions Analysis job aid. These tools have been required for service contracts specifically to ensure that contractors are not performing tasks that should be reserved for federal employees. Once completed, the output from these tools are reviewed by the contracting officer and included in the procurement package. Figure 8 summarizes key processes we identified that DHS uses to identify and develop service requirements. In addition to the policies and guidance DHS has for identifying and developing service requirements, DHS components in our review have implemented additional guidance and tools. For example, USCIS has developed specific guidance to support the program office’s development of requirements, including information on how to define requirements, conduct market research, and develop a cost estimate and acquisition strategy. Further, all of the components in our review reported using tools, such as templates and checklists, to help guide program and contracting officials through the requirements development process. For example, all of the components in our review use templates for market research, acquisition plans, and requirements documents that identify what information officials should include in these documents. The components in our review also provided program and contracting officials with checklists for what documents are required in the procurement package, depending on the type of contract being solicited. Some of the components in our review maintain this information on acquisition websites that serve as repositories for DHS and component guidance, templates, and other requirements. For example, ICE’s Office of Acquisition Management’s portal provides guidance, documents, and templates by phase of the acquisition process, from acquisition planning and solicitation preparation through contract administration and close-out. DHS components in our review also relied on subject matter experts to assist in their requirements development efforts, with the level of involvement varying depending on the requirement. Specifically, officials associated with two of the eight contracts in our review stated they used integrated product teams to assist with developing their service requirements. For example, officials involved in requirements development for services at USCIS’s 135 Application Support Center locations told us they established an integrated product team with program officials, the contracting officer, cost estimators, Field Office Directorate personnel, and Office of Security and Integrity personnel. Officials from the other six contracts relied on more informal subject matter expert involvement. Component officials from three of our contracts that relied on more informal coordination methods said that when the requirement is recurring and has previously been contracted for, formal coordination through an integrated product team may not be necessary. DHS has established a process for reviewing the procurement strategy for certain service and product procurement actions prior to award, but has not developed an approach to ensure proposed service contract requirements are clearly defined or that it is consistently reviewing what DHS considers to be high-risk service procurement actions. In 2018, OCPO and the Office of Program Accountability and Risk Management began piloting a DHS-wide Service Requirements Review to validate, optimize, prioritize, and approve service requirements early in the development process. However, DHS discontinued these efforts before the pilot was finalized. According to DHS officials, they initiated this pilot because there had been no consistency or rigor for reviewing service contract requirements even though these contracts account for over 70 percent of DHS’s contract obligations. According to DHS documents and officials, the main objectives of the pilot were to: ensure service requirements are clearly defined and reviewed before planning how the services are obtained; assess whether the services should be provided in whole or in part by foster collaboration and opportunities to leverage efficiencies for similar service requirements to avoid duplication in services across the department; and assess whether the requirement should be managed as a service acquisition program. To accomplish these objectives, DHS identified stakeholders from within DHS’s Management Directorate to be headquarters-level reviewers for service requirements based on the type of service being contracted for. However, according to OCPO and Office of Program Accountability and Risk Management officials, the pilot was discontinued in April 2019 before any service requirements were reviewed because it was determined to be too resource intensive. According to DHS officials, the discontinuation of the Service Requirements Review pilot coincided with the implementation of the Procurement Strategy Roadmap, a separate OCPO-led initiative to review and approve the procurement strategy for all service and product acquisitions with a total estimated value over $50 million. The Procurement Strategy Roadmap requires contracting activities, along with their procurement teams, to present and discuss the procurement strategy with the DHS Chief Procurement Officer, members of OCPO, and other stakeholders as needed, prior to drafting an acquisition plan or other decision documents. According to OCPO officials, it was intended to require procurement staff to meet with OCPO officials early in the acquisition planning process, prior to the service contract requirement being finalized, to discuss how services and products would be purchased. Specifically, the Procurement Strategy Roadmap is intended to address what OCPO considered as key elements of the procurement process, such as the requirement, competition, the availability of strategic sourcing or small business options, and contract type. Following the discontinuation of the Service Requirements Review pilot in April 2019, OCPO and Office of Program Accountability and Risk Management officials discussed expanding the Procurement Strategy Roadmap to incorporate some elements of the Service Requirements Review pilot, including reviewing proposed requirements to determine if they are clearly defined and valid, when appropriate. For example, OCPO officials said they have included the Office of Program Accountability and Risk Management and the Office of the Chief Information Officer to facilitate additional DHS stakeholder involvement in some reviews, and to broaden the discussion beyond how services and products will be purchased and include what the requirement is and whether it needs to be purchased at all. However, as of February 2020, OCPO officials told us that reviewing requirements to ensure they are clearly defined and collaborating with additional DHS stakeholders to identify opportunities to leverage existing service requirements was not the intent of the Procurement Strategy Roadmap. For example, OCPO officials stated that proposed requirements may only be reviewed by additional DHS stakeholders during the Procurement Strategy Roadmap if the requirement is new, “unique,” or “high risk,” and that this decision is based on their review of the information in the Procurement Strategy Roadmap and professional judgment. When asked what constitutes a unique or high risk requirement, officials told us a proposed requirement could be high risk if it had historical procurement issues, but noted that ultimately the decision to review the requirement and whether to involve additional DHS stakeholders in that review is subjective and based on whether OCPO leadership believes other stakeholders may add value in developing and reviewing the proposed requirement. According to OCPO officials, some Procurement Strategy Roadmap requirements supporting major acquisition programs undergo separate review by DHS headquarters stakeholders in the Acquisition Review Board. However, high-dollar service acquisitions that are not associated with a major acquisition program or not above $100 million do not currently receive headquarters- level scrutiny to determine whether requirements are clearly defined or to leverage efficiencies and buying power for similar service requirements across the department. In addition, OCPO has not established a process to ensure it is consistently reviewing proposed procurement actions through the Procurement Strategy Roadmap. Our review of the fiscal year 2019 Procurement Strategy Roadmap eligible procurement actions found that OCPO subjectively waived the review for 18 of the 49 eligible actions— over 36 percent of the actions that should have been subject to a Procurement Strategy Roadmap. The waived procurement actions included three out of six Federal Emergency Management Agency actions, eight out of 16 OPO actions, four out of 12 CBP actions, and two out of six Transportation Security Administration actions. According to OCPO officials, the decision to waive a procurement action is a subjective one, made by OCPO leadership based on the initial information provided. For example, officials said the review may be waived if the procurement action is recurring or will be fulfilled using an already established DHS contract vehicle. We found, however, that the subjective decision to waive the reviews does not take into account other acquisition risks. For example, our review of the description of waived procurement actions found that 11 of the 18 actions were for services, including some for administrative and professional support and information technology services that DHS considers to be in need of heightened management attention. Two of the waived actions were for requirements that resulted in orders placed off General Services Administration Schedule contracts, despite an OCPO official telling us that these orders are expected to receive increased scrutiny to ensure that any existing DHS contract vehicles have been fully considered. Our review of waived procurement actions also found that OCPO waived several Federal Emergency Management Agency actions for disaster response activities and CBP actions for services at temporary soft-sided facilities used for holding detainees on the U.S.-Mexico border. Our prior work has noted challenges in requirements development and acquisition planning for these types of contracts. For example, in April 2019, we reported that contracting officers at FEMA were receiving requirements packages for disaster contracts that lacked technical specificity or had inaccurate estimates of the products and services needed. In March 2020, we also reported on acquisition planning, requirements development, and information sharing challenges with one of the waived procurement actions—a CBP delivery order for a soft-sided facility and services to hold and care for detainees—finding that these challenges led to CBP spending millions of dollars on services that were not ultimately needed. Federal internal control standards state that management should identify and respond to risk to achieve its objectives. OCPO officials acknowledged that the intent of the Procurement Strategy Roadmap was not to replace the Service Requirements Review that preceded it, and that expanding the scope of the Procurement Strategy Roadmap to review requirements would require additional resources. However, the department’s previous efforts to devote management attention to its growing proportion of service procurements are indicative of its concerns about its use of service contracts. While the Procurement Strategy Roadmap is not specific to services, it can provide a mechanism to address these concerns. Moreover, without documenting factors OCPO considers when waiving certain Procurement Strategy Roadmap eligible procurement actions, DHS is at risk of not consistently reviewing service procurement actions that could benefit from headquarters-level review. Given DHS’s reliance on service contracts, which accounted for 78 percent of DHS’s contract obligations in fiscal year 2018, developing a risk-based approach for reviewing proposed service requirements through the Procurement Strategy Roadmap or other means could help to improve DHS’s use of service contracts by identifying opportunities to leverage efficiencies and ensuring service requirements are clearly defined across the department. DHS does not have a formal process for identifying all service requirements in need of heightened management attention or for planning, documenting, and updating the amount of federal personnel necessary to perform or oversee these requirements. In order to maintain control of their mission and performance of inherently governmental functions, part of contracting for services in need of heightened management attention—including functions that are closely associated with inherently governmental, critical, and special interest—is ensuring that agencies dedicate an adequate number of federal employees to oversee these functions. Specifically, OFPP notes that prior to contract award, for services that require heightened management attention agencies should complete an analysis that among other things and depending on the service, establishes that they can: retain sufficient capacity and capability to give heightened management attention to contractor performance or retain control of its operations; limit or guide the contractor’s exercise of discretion; ensure reasonable identification of contractors and contractor work avoid or mitigate conflicts of interest. Functions Requiring Heightened Management Attention The Office of Management and Budget’s (OMB) Office of Federal Procurement Policy (OFPP) guidance identifies three categories of service contracts requiring heightened management attention—those closely associated with inherently governmental functions, critical functions, and special interest functions. Depending on the function, these categories of service contracts may involve contractor work products that support policy development and program evaluation, and other tasks that are essential to the agencies’ ability to perform its mission. According to OMB, these contracts require management attention to ensure that they do not result in the performance of inherently governmental functions by the contractor and that agencies retain control of their mission and operations. DHS officials stated that, as of March 2019, they use the Inherently Governmental and Critical Functions Analysis, or job aid, to screen proposed service requirements to ensure that there are no inherently governmental functions and to identify functions that may be contracted for that are closely associated with inherently governmental or critical. If a function is identified as closely associated with inherently governmental or critical, program officials must certify that there is sufficient internal capacity to oversee contractor activities and maintain control of its missions and operations. Further, if a function is closely associated with inherently governmental, the job aid includes a narrative section where the program office should document mitigation strategies to ensure heightened management attention and enhanced oversight occur throughout the life of the contract. We found that the job aid does not provide a place to identify special interest functions that require heightened management attention. In addition, the job aid does not require program officials to analyze or document the expected federal personnel necessary to perform or oversee service requirements in need of heightened management attention following contract award; therefore information available for planning purposes is limited. We analyzed all nine of the 27 completed job aids that included closely associated with inherently governmental functions, and found that none included any calculation of federal oversight personnel necessary or mentioned the federal personnel who will be expected to perform oversight activities. The narrative section of the job aid instructs components to document mitigation strategies for functions identified as closely associated with inherently governmental functions. We found that two of the nine job aids identified mitigation strategies, such as noting that federal employees will ensure the contractor’s presence is announced at all meetings. However, neither provided any detail about who—such as the program manager or contracting officer representative—would be responsible for performing and overseeing the contractor employees performing the contracted functions or tasks. Program and contracting officials from ICE, CBP, and USCIS stated that analyzing and documenting the expected federal oversight personnel necessary prior to contract award with the BWAT provided visibility—both within the program and across the component—into resource needs. However, only ICE continues to analyze and document federal oversight necessary outside of the job aid. Following the BWAT’s decommissioning, ICE established a Service Contract Review Template for all service contracts above $1 million. ICE program officials are expected to complete this template with information such as a description of the requirement, the anticipated product and service code, identification of special interest functions, expected number of contractors needed, the number of federal employees available to oversee the work, and a justification for outsourcing the requirement. From this information, the template produces a recommended percentage of federal personnel necessary to perform management oversight. ICE created this new process because it wanted to ensure that it has a repeatable, documented decision-making process that helps plan oversight, such as the proper balance of federal and contractor employees and determining the reasonableness of the contract. DHS’s job aid also does not provide a process to update oversight needs if the contracted tasks or functions change throughout the life of the service contract. Officials from three of the four components in our review reported not having a formal process for updating federal oversight needs when elements of the contract change—such as an increase in the number of contractor personnel performing tasks or a change in scope. For example, component program and contracting officials told us that, although one of the service contracts in our review experienced an increase in the number of contractor personnel, they did not update planning for federal oversight personnel needs. In contrast, officials from ICE reported having a process to reevaluate federal oversight needed that is triggered by specific contract funding actions. Funding actions that trigger the process include: establishing a new contract, exercising an option on an existing contract, or adding funding to a service contract. ICE officials explained that through this process they review the service contract for changes to the number of contractors and whether the current oversight levels are sufficient. If they find that current oversight levels are no longer sufficient, ICE officials stated that they would require the program office to develop a risk mitigation strategy, such as assigning additional oversight personnel or increasing the contractor’s reporting requirements. DHS headquarters officials told us they no longer have a formal process for analyzing and documenting federal oversight requirements because the department has matured since implementing the BWAT, and program and contracting staff are aware of how to plan for federal oversight requirements for service contracts in need of heightened management attention. Specifically, during our review, DHS and component officials from OPO and USCIS stated that they rely on their program and contracting officials’ historical knowledge and professional judgment to determine and communicate oversight needs informally at the component level. However, we found a lack of understanding and inconsistencies in how oversight was analyzed and documented prior to the BWAT’s decommissioning. Specifically, 25 of the 75 required BWATs for special interest functions we reviewed either could not be provided or did not contain the information used to calculate and, therefore, plan for sufficient federal employees to conduct oversight. In addition, according to DHS documents and officials, the department plans for federal oversight personnel needs more broadly through its annual workforce planning efforts; and therefore, it is not necessary to analyze federal oversight personnel needs at the contract level. Yet we found that DHS’s fiscal year 2018 annual workforce plan focused on DHS and government-wide mission critical occupations, like Border Patrol Agents and Transportation Security Administration Officers. The plan does not address oversight needs based on services in need of heightened management attention (i.e., contracted functions that are closely associated with inherently governmental, critical, or special interest). While DHS’s workforce plan accounts for government-wide mission critical occupations, such as contracting officers and specialists, there is not the same level of consideration given to program managers, employees who serve as contracting officer’s representatives, or other program staff that are responsible for performing oversight at the contract level. According to OCPO officials, program officials completing the job aid should document in the narrative section the federal personnel responsible for ensuring the task does not become inherently governmental. However, we found that the job aid instructions do not address how program officials should analyze or document the federal personnel who will be tasked with conducting oversight. The job aid also does not include similar instructions, or provide space, to depict this information for functions identified as critical. Moreover, although there is guidance on when an initial job aid needs to be completed, there is no guidance indicating when, and under what circumstances, program and contracting officials may need to update federal oversight needs based on changes to the functions or task being performed by the contractor. Officials associated with only three of the eight contracts in our review reported receiving some training on the new job aid, but OCPO officials explained that they have not provided additional training beyond the instructions in the acquisition alert that implemented the job aid. Federal internal control standards state that agency’s management should use and internally communicate quality information to achieve the entity’s objectives. OCPO officials told us that components—such as ICE—have the discretion to establish additional processes for identifying and calculating federal oversight beyond what is required by the job aid. However, without consistently identifying all service requirements in need of heightened management attention and establishing a repeatable process across the department for analyzing, documenting, and updating the federal personnel needed to perform or oversee the requirement when changes occur, program and contracting officials lack reasonable assurance that they are dedicating an adequate number of federal employees to oversee these functions. This places DHS components at risk of inconsistently planning federal oversight necessary to ensure the department retains control of its missions and the performance of inherently governmental functions. DHS components included in our review are at risk of not conducting the oversight tasks and safeguards necessary to ensure that, once the contract has been awarded, the contractor’s functions are performed in a way so as to not become inherently governmental, and that DHS retains sufficient internal capability to retain control of its mission for functions that are closely associated with inherently governmental, critical, or special interest. The 2010 Consolidated Appropriations Act states that agencies should have specific safeguards and monitoring systems in place to ensure the work that contractors are performing has not changed or expanded during performance to become an inherently governmental function. Additionally in 2010, OMB issued a memo that states agencies shall conduct meaningful analysis—through the annual service inventory—focused on special interest functions that require heightened management attention to ensure proper workforce balance. Based on our review of contract documentation and interviews with program and contracting officials associated with the eight contracts in our review, oversight of these service contracts in need of heightened management attention focused largely on assessing the quality of specific contractor tasks. Oversight of these contracts did not include a focus on ensuring the work of the contractors is not performed in a way so as to become inherently governmental, or that DHS retains sufficient internal capability to perform its missions. While assessing quality is important in monitoring contractor performance, it does not allow DHS to identify when tasks beyond what is detailed in the contract—including tasks that are potentially inherently governmental and require that final agency action reflects the independent conclusions of agency officials—are being performed. According to DHS’s most recent service contract inventory analysis and OCPO officials, DHS relies on well-trained contracting officer’s representatives to monitor contractor performance for inherently governmental functions. Yet one of the eight contracts in our review has not had a certified contracting officer’s representative assigned to the contract since its award in September 2018. For the remaining seven contracts, we found that their contracting officer’s representative appointment letters—which document oversight responsibilities— mentioned performing surveillance and inspections against the contract’s performance requirements. But only two of the seven letters—both from CBP—reference performing oversight tasks focused on how the contractor is completing the work. Specifically, both appointment letters stated that ongoing reviews should be completed focusing on the way work is performed and how the government is managing service acquisitions for closely associated with inherently governmental and critical functions. However, none of the letters we reviewed identified specific safeguards—such as vetting all contractor recommendations through a panel of federal employees—that federal personnel should perform to mitigate identified concerns with contractors performing closely associated with inherently governmental or losing sufficient internal capability for performing critical functions. Similarly, program and contracting officials associated with six of the eight service contracts in our review did not identify additional oversight tasks undertaken as a result of the contract requiring heightened management attention. Rather, these officials said they assess the contractor’s performance in terms of the quality of deliverables when asked about the types of oversight tasks performed. For example, DHS headquarters officials responsible for overseeing a service contract for technical support related to the development of nuclear detection technologies stated that their oversight largely focuses on tracking the completion of tasks included in the statement of work as well as available funding. These officials did not identify any additional actions taken to address the risk of contractors working in situations that permit or might permit access to confidential business or other sensitive information—a function closely associated with inherently governmental functions in need of heightened management attention. Additionally, acquisition officials from one of the DHS components in our review stated that they have previously relied on the contractor to report if they were performing work that was not specified in the contract. While performance monitoring is crucial to ensure that the contractor is meeting the terms of the contract, it alone does not provide DHS visibility into whether work is being performed that is outside the scope of the contract or inappropriate for contractors. Program and contracting officials associated with two of the eight service contracts in our review identified safeguards they have established to prevent contractors from performing inherently governmental work. For example, program and contracting officials associated with a USCIS contract awarded to assist in the preparation of Freedom of Information Act requests stated that they have safeguards in place to ensure the contractor does not approve agency responses to Freedom of Information Act requests—an inherently governmental function, according to the 2011 OFPP policy letter. Specifically, officials associated with this contract explained that they use a software program that does not allow a user without federal employee credentials to approve a request within the system. This is an example of a safeguard that can be instituted for similar service contracts when the risk of the contractor performing the inherently governmental function of approving requests is present. Additionally, officials associated with CBP’s service contract for maintaining its unmanned aircraft systems stated that they ensure that their onsite personnel do not direct contractors to perform unauthorized tasks by requiring these personnel to report directly to the program office. Contracting and program officials’ lack of focus on safeguards to mitigate risks associated with contract functions in need of heightened management attention is due, in part, to DHS not identifying—either in guidance or training that we reviewed—a list of oversight tasks that program and contracting officials can perform. DHS’s OCPO officials explained that there are unique aspects of each contract that should drive oversight needs so they have not established any required safeguards component program and contracting officials must employ. Despite the uniqueness of each contract, officials from OPO stated that it would be helpful to have a list of identified potential oversight tasks or safeguards for service contracts in need of heightened management attention to ensure they are managing the risk of the contractor performing work outside of scope. We found that at least one federal agency has such a list available. Specifically, the Department of State’s Contracting Officer’s Representative Handbook provides a list of mitigation strategies contracting officer’s representative can employ for contracts requiring risk mitigation—such as reserving final approval authority of any contractor proposed action for federal employees only. Additional strategies listed include requiring contractor affiliation be clearly displayed on all presentation material, and conducting conflict of interest reviews when contractors are performing services that involve or relate to evaluating another contractor’s performance. Without identifying what oversight tasks or safeguards component personnel can institute to prevent contractors from performing inherently governmental functions or from affecting the ability of the agency to maintain control of its mission and operations, DHS is at risk of its personnel not knowing which steps they should take to prevent that from occurring. DHS components in our review consider service contract requirements when identifying their resource needs and formulating their budget justifications, but DHS headquarters and Congress have limited visibility into requested and actual service contract requirement costs. DHS uses the planning, programming, budgeting, and execution process to allocate resources—including those for service contracts—across the department. DHS’s guidance for this process that we reviewed does not provide specific instructions for how the components should consider service contract requirements when budgeting, but program officials we spoke with said that they generally provide information on specific service contract costs, among other resource needs, to their budget offices during the programming phase. Components then include these resource needs in their budget justifications, which are submitted to DHS headquarters for review before being submitted to OMB and then Congress. Based on our review of component budget justifications, components communicate service contract requirements in three primary ways, but none provide complete visibility into service contract requirements. Object Classes: Object classes are broad spending categories identified in OMB guidance. As shown earlier in table 1, there are eight object classes for other contracted services. According to component officials, once the resource needs for service contracts are identified, they are grouped into the object classes that best represent the requirement by either program or budget officials before submitting budget justifications to DHS headquarters. However, object class codes do not provide visibility into just service contract requirements. For example, budget officials at ICE and USCIS told us that aligning service requirements across object classes is not always perfect or precise. According to ICE officials, object class codes may include other expenses, such as interagency agreements. Further, USCIS officials noted that some contract requirements can apply to multiple object classes, so how requirements are communicated by object class is subjective based on program officials’ judgment. Cost Drivers: According to DHS budget officials, cost drivers identified in budget documentation represent the requirements that make up the largest costs at the program/project activity level. Service requirements may be included as a cost driver, but only if the estimated value of the contract represents a large portion of the program/project activity’s costs. For example, ICE’s budget guidance instructs the program offices to identify major requirements that add up to at least 50 percent of the program/project activity resource needs as non-pay cost drivers. Based on that guidance, in fiscal year 2020 budget documentation, one of ICE’s service contracts included in our review—for Office of the Principal Legal Advisor document management services—is identified as a cost driver. Only one other contract included in our review—from USCIS—was identified as a cost driver. Capital Investment Exhibit: According to DHS budget officials, the five contracts with the highest dollar value supporting each component’s capital investment are identified in the component’s budget documentation. Service contracts may be included in the capital investment exhibit if they meet this criteria, but the details included are vague. For example, for each contract listed, the exhibit typically includes information such as the contract number and total value, but does not categorize whether the contract is for a product or service nor consistently provide a description of the contract itself. For the contracts in our review, one of the eight—a contract for nuclear detection technology technical support—was included in the capital investment exhibit in fiscal year 2020 budget documentation. Since component budget offices submit their proposed budget requests with service contract requirements aligned into object class codes, program/project activities, and capital investment exhibits, DHS lacks visibility into the components’ requested service contract requirement needs. For example, officials from the Office of the Chief Financial Officer stated that they do not have visibility into DHS and the components’ specific service contract requirements. Rather, officials said their visibility is limited to changes in service contract requirements that are justified as part of requested increases or decreases in components’ funds. While officials from the Office of the Chief Financial Officer stated that they can request additional information from the components on service requirements if needed, officials could not identify any specific circumstances that have led to them requesting this information for their own purposes or in response to congressional interest. See figure 9 for details on how service contract requirements are communicated to DHS headquarters in budget documentation. Moreover, although DHS obligates over three-quarters of its contract spending to services, neither the Office of the Chief Financial Officer or OCPO have full visibility into or track service contract requirement costs. For example, similar to how information is portrayed in budget documents, officials from the Office of the Chief Financial Officer stated they report obligations to Congress by object class level on a quarterly basis; therefore, visibility into service contract requirement costs is limited. Further, OCPO officials stated that they also do not have a system for tracking service contract obligations reported through FPDS- NG or otherwise. In a discussion held during the course of our review, congressional requesters expressed interest in receiving additional information and visibility into DHS’s estimated service contract requirements. Members of Congress have also previously expressed interest in having increased oversight and visibility into other aspects of DHS’s proposed spending as well as into the Department of Defense’s estimated service contract requirements. For example, DHS budget officials told us that the decision to include the top five highest dollar value contracts in its capital investment exhibits was driven by congressional interest in this type of information on service contracts. In addition, in 2009, Congress began requiring the Department of Defense to identify in its budget submission the amounts requested for its service contracts for each component, installation, or activity, excluding services related to research and development and military construction. For example, the Department of Defense has two budget exhibits that provide details on estimated service contract requirements—one that details its advisory and assistance services, and another that tracks contracted services across prior fiscal years. In February 2016, we found shortfalls in the Department of Defense’s reporting of service contract requirements in its budget documents. We recommended that it modify its approach for reporting service contracts in its budget justifications to include additional service requirements. The Department of Defense agreed with this recommendation and, in February 2016, took steps to fully report on these service categories in its service contract spending exhibit accompanying the fiscal year 2017 budget request. We have also reported on challenges with congressional visibility into DHS’s major acquisition programs in budget documents. In April 2018, we found that DHS budget practices limit Congress’s visibility into costs and recommended that DHS work with Congress to include information on operations and support funding requests for major acquisitions in its annual budget justifications. DHS agreed with this recommendation and addressed it by adding an operations and support funding information display for major acquisition programs to its congressional budget justification for fiscal year 2021. Federal internal control standards state that agency’s management should communicate quality information internally and externally to inform decisions. Although detailed information on service requirements is available at the component level, DHS’s budget justifications do not provide that level of visibility. Visibility into service requirements is especially critical given that increases in DHS’s service contract obligations—particularly those in need of heightened management attention—may pose risks to DHS maintaining control over its mission. Given these increases, additional visibility into how much of DHS’s mission is being accomplished through the use of services requiring heightened management attention could inform DHS’s decision-making on the tasks it chooses to contract for, and the balance of its federal and contractor workforce. Without working with Congress to determine the format and level of detail needed to communicate service contract requirements in budget information, DHS headquarters and Congress are at risk of not having the information for sound resource planning and decision-making related to DHS’s use of service contracts. Service contracts play a critical role in supporting DHS’s wide range of missions, but increases in service contract obligations—including significant increases in obligations for services in need of heightened management attention—necessitate DHS’s attention as it develops, reviews, oversees, and budgets for service contract needs. DHS’s recent effort to perform a headquarters-level review of certain service and product procurement actions is a positive step in improving the department’s visibility into how it is acquiring certain services and products. However, without developing a risk-based approach for reviewing certain proposed service contract requirements to ensure they are clearly defined and valid before they are procured and consistently reviewing eligible procurement actions, DHS cannot ensure it has established the rigor needed to review its service procurements. Further, changes in DHS’s processes and a lack of agency-wide guidance for planning, documenting, and updating federal oversight personnel and activities for services in need of heightened management attention have put the department at risk of not effectively addressing whether contractors are performing inherently governmental functions. These risks could pose challenges to DHS’s ability to maintain control over its mission and operations. Ensuring DHS has guidance for planning and updating the resources needed to oversee these contracts, and identifying the types of activities that federal personnel should be performing to mitigate the risks associated with these contracts are critical to DHS’s ability to address these concerns. Finally, despite the availability of information on specific service contract requirements within component program offices, DHS does not communicate most of this information in budget documentation provided to DHS headquarters or Congress, nor is DHS currently required to do so. Given that DHS’s service contract obligations—including those in need of heightened management attention—account for more than three quarters of DHS’s total annual contract obligations, DHS is missing opportunities to make more informed strategic decisions because it does not have visibility into its current or future service requirement spending for these services. We are making six recommendations to the Secretary of Homeland Security: The Secretary of Homeland Security should direct the DHS Chief Procurement Officer to, in coordination with the Office of Program Accountability and Risk Management, develop a risk-based approach for reviewing service requirements—through the Procurement Strategy Roadmap or other means—to ensure proposed service requirements are clearly defined and reviewed before planning how they are to be procured. (Recommendation 1) The Secretary of Homeland Security should direct the DHS Chief Procurement Officer to document the factors the Office of the Chief Procurement Officer considers when waiving procurement actions from its Procurement Strategy Roadmap to ensure it is consistently considering potential acquisition risks in its planning—including those specific to services. (Recommendation 2) The Secretary of Homeland Security should direct the DHS Chief Procurement Officer to update the Inherently Governmental and Critical Functions Analysis to require the identification of special interest functions. (Recommendation 3) The Secretary of Homeland Security should direct the DHS Chief Procurement Officer to update the Inherently Governmental and Critical Functions Analysis to provide guidance for analyzing, documenting, and updating the federal workforce needed to perform or oversee service contracts requiring heightened management attention. (Recommendation 4) The Secretary of Homeland Security should direct the DHS Chief Procurement Officer to develop guidance identifying oversight tasks or safeguards personnel can perform, when needed, to mitigate the risk associated with contracts containing closely associated with inherently governmental functions, special interest functions, or critical functions. (Recommendation 5) The Secretary of Homeland Security should direct the DHS Chief Financial Officer to work with Congress to identify information to include in its annual congressional budget justifications to provide greater transparency into requested and actual service requirement costs, particularly for those services requiring heightened management attention. (Recommendation 6) We provided a draft of this report to DHS for review and comment. In its comments, summarized below and reproduced in appendix V, DHS agreed with the third and fifth recommendations and identified steps it plans to take to address them. DHS disagreed with the first, second, fourth, and sixth recommendations. DHS also provided technical comments, which we incorporated as appropriate. DHS did not agree with the first recommendation, that OCPO, in coordination with the Office of Program Accountability and Risk Management, develop a risk-based approach for reviewing service requirements through the Procurement Strategy Roadmap, or other means, to ensure that proposed service requirements are clearly defined and reviewed before planning how they are to be procured. In its response, DHS cited Instruction 102-01-001 as codifying how DHS and its components acquire and sustain services for major acquisitions. However, as noted in our report, as of November 2019 none of DHS’s services programs rose to the level of being classified as a major service acquisition. Therefore, DHS is at risk of overlooking those service contracts that are not a service acquisition program or not associated with its major acquisitions. DHS also noted the use of existing key processes that enable it to identify needs and develop contract requirements for services. While we acknowledge in our report that DHS and selected components have these processes in place, we found they were not consistently used throughout the contracts in our review, and none can serve as a replacement for the kind of risk-based headquarters-level oversight that we believe is necessary. For example, among its processes, DHS cited the use of integrated product teams as a way to facilitate comprehensive reviews of service requirements. We noted in our report, however, that according to officials only two of the eight contracts in our review used such an approach. Further, DHS stated that other existing efforts meet the primary objectives of the Service Requirements Review pilot, thus making an additional headquarters-level review of service requirements unnecessary. However, all of these efforts were also already in place when the then Under Secretary of Management directed OCPO and the Office of Program Accountability and Risk Management to undertake its December 2018 pilot program to provide consistency and rigor to reviewing service contract requirements. Therefore, we continue to believe that given the amount DHS obligates in service contracts to support its mission, establishing a risk-based approach to review service requirements prior to and in coordination with its consideration of how those requirements are to be procured will help prevent negative acquisition outcomes and the potential for wasted resources. DHS also did not agree with the second recommendation. In its response, DHS stated that OCPO’s decision to waive a Procurement Strategy Roadmap review does not mean that the Chief Procurement Officer did not consider acquisition risks, and that it is unclear what other acquisition risks we believe are not being considered. The recommendation to document the factors considered when waiving the Procurement Strategy Roadmap is intended to ensure that the department is able to consistently apply a framework and maintain institutional knowledge—particularly given the risks and challenges that vacancies in top leadership positions throughout the department could pose to addressing management issues. Waiving procurements without documentation of what acquisition risks are being considered puts the department at risk of inconsistently making those decisions and not being able to leverage Procurement Strategy Roadmap lessons learned. DHS noted in its response that the decision to waive a procurement review is based on several considerations, such as the type of service, information provided to the Chief Procurement Officer by the Head of Contracting Activity, and historical and current knowledge of the procurement, among others. However, the department offered no further insights as to: what types of services may not warrant a Procurement Strategy Roadmap; what type of information provided by the Head of Contracting Activity may indicate a review is unnecessary; or how the Chief Procurement Officer maintains the historical knowledge of procurements that may have previously experienced challenges and thus warrant a Procurement Strategy Roadmap. We continue to believe that taking the step of documenting the factors considered—such as types of services that may require additional review, or challenges with prior procurements, some of which may have been awarded years prior—will help ensure that decisions to waive Procurement Strategy Roadmaps are made consistently and transparently. DHS did not agree with the fourth recommendation, that OCPO should update the Inherently Governmental and Critical Functions Analysis job aid to provide guidance for analyzing, documenting, and updating the federal workforce needed to perform or oversee service contracts requiring heightened management attention. In its response, DHS stated that the job aid requires components to certify that they have sufficient internal capacity to oversee and manage contractor activities and maintain control of its missions and operations when the requirement is a closely associated with inherently governmental or critical function. Further, DHS stated that the job aid requires components to certify that there are an adequate number of positions filled by federal employees to manage and monitor contractors if the requirement is a critical function. As noted in our report, each component is making its own determination, in the absence of guidance, as to what factors to consider. In its response, DHS stated that OCPO will assist components with examples of analysis by reviewing what some components are doing, and sharing those examples with others. However, in the absence of guidance about what DHS expects the components to analyze and document based on those examples, DHS does not know how or whether the components are considering the federal workforce available to oversee service contracts in need of heightened management attention, or what steps, if any, the components are taking to mitigate risks if there are not enough federal personnel available to oversee the contracts after award. In its response, DHS recognized the need to provide guidance for updating the job aid, if there is a change in the contract requirement, to help ensure it has sufficient internal capacity to oversee and manage contractor activities, maintains control of its missions and operations, and has the appropriate workforce in place. We consider this to be a positive step to address part of the recommendation; however, it is unclear what considerations the components will use to update their analysis without the presence of guidance for how to analyze the federal workforce needed prior to the contract being awarded. We maintain that without guidance, DHS is at risk of inconsistent consideration of federal oversight for service contracts across its components—an action at odds with its goals of improving integration, and centralizing and coordinating its many functions to ensure that its whole is greater than its parts. Finally, DHS did not agree with the sixth recommendation, to work with Congress to identify information to include in congressional budget justifications to provide greater transparency into requested and actual service requirement costs, particularly for services requiring heightened management attention. In its response, DHS stated that it does not believe including additional information on estimated or actual service contract requirement costs is appropriate, and stated that contract information can be found in congressional budget justifications in budget object class breakouts, cost drivers, and in the Procurement, Construction, and Improvement Appropriation Capital Investment exhibit. We acknowledge these same three sources of information in our report, and note the limitations with each (either over-estimating or under- estimating service contracts) to providing visibility into DHS’s estimated or actual service contract requirements—both internally to DHS and externally to Congress. For example, as we note in the report, contracts identified in the Capital Investment Exhibit are not categorized as being for a product or service nor does the exhibit consistently provide a description of what the contract is for. In its response DHS noted limitations with our analysis comparing contract obligation data from FPDS-NG with what is reported in DHS’s budget justifications, however, after discussion with DHS officials during our review, we did not include that comparison in our report. DHS also noted in its response that the congressional budget justifications are intended to focus on the request, not on the previous or current year’s contracts. However, the recommendation that DHS work with Congress is impartial as to what type of service contract information would be useful for providing greater transparency into DHS’s service contract requirements. Rather, the recommendation is intended to address the limited visibility both DHS and Congress have into DHS service requirements—in particular the significant increases in services requiring heightened management attention—and provide a means to report on that information to improve internal and external oversight over these requirements and to allow for more informed decision-making. The need for this visibility into service contract requirements is aligned with prior recommendations GAO has made related to the need to increase visibility in DHS’s congressional budget justifications for major acquisition programs’ funding requests; recommendations that DHS has agreed with and implemented. Given that service contracts accounted for over three quarters of DHS’s contract obligations from fiscal years 2013 through 2018, we continue to believe that our recommendation to work with Congress on how to convey that information in congressional budget requests is valid. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the DHS Chief Procurement Officer, the Commissioner of U.S. Customs and Border Protection, the Director of Immigration and Customs Enforcement, and the Director of U.S. Citizenship and Immigration Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. You asked us to review the Department of Homeland Security’s (DHS) use of and planning for service contracts. This report addresses the extent to which DHS and selected components and offices (1) used service contracts from fiscal years 2013 through 2018; (2) identified, developed, and reviewed service contract requirements; (3) ensured oversight of service contracts requiring heightened management attention; and (4) considered service requirements in budgeting processes. To identify the extent to which DHS used service contracts, we reviewed the Federal Procurement Data System-Next Generation (FPDS-NG) data on DHS-funded contract obligations from fiscal years 2013 through 2018 adjusted for inflation using the Gross Domestic Product Price Index. We identified obligations for services using the codes associated with services in the General Services Administration’s Federal Procurement Data System Product and Service Codes Manual. We analyzed the FPDS-NG data to identify DHS service obligations compared to obligations for products, service obligations by DHS component, the types of services procured, and the proportion of service contracts for functions in need of heightened management attention—those deemed closely associated with inherently governmental, critical, and special interest functions. We assessed the reliability of FPDS-NG data by reviewing existing information about the FPDS-NG system and the data it collects— specifically the data dictionary and data validation rules—and performing electronic testing. We determined the FPDS-NG data were sufficiently reliable for the purposes of identifying DHS’s use of service contracts. We selected a non-generalizable sample of four DHS contracting activities that had high obligations for service contracts and special interest functions compared to other DHS contracting activities—U.S. Customs and Border Protection (CBP), U.S. Immigration and Customs Enforcement (ICE), U.S Citizenship and Immigration Services (USCIS), and the Office of Procurement Operations (OPO). For the purposes of this report, we will refer to these contracting activities, which include three components and one office, as components. From these components, we selected a non-generalizable sample of 100 contracts awarded in fiscal year 2018 that were above the simplified acquisition threshold and were not exempt from performing a Balanced Workforce Assessment Tool (BWAT)—a risk analysis tool used by DHS components at that time to identify the appropriate mix of federal and contractor employees. Seventy five of the 100 contracts were for special interest functions, with the remaining 25 randomly selected. From that sample, we selected eight contracts—two from each component—that were identified as requiring heightened management attention. We selected a range of contracts based on whether the contract contained functions requiring heightened management attention, the percent of recommended federal oversight, and whether the requirement was new, among other selection criteria. We conducted semi-structured interviews with program, contracting, and budgeting officials from the eight selected component contracts to identify how the selected service contract requirements were developed, overseen, and considered when budgeting. Information collected from the four components and eight contracts cannot be generalized to all components and contracts. For additional details on the contracts we selected, see table 2. To determine how DHS and selected components identified, developed, and reviewed service contract requirements prior to soliciting for a contract, we reviewed relevant documentation, including the Federal Acquisition Regulation (FAR), and DHS, CBP, ICE, USCIS, and OPO contracting policies. To determine what processes selected components have for identifying and developing service requirements, we reviewed documentation, and interviewed program and contracting officials associated with our four selected components and eight selected contracts. To determine how DHS is reviewing service contract requirements, we reviewed DHS Office of the Chief Procurement Officer (OCPO) and Office of Program Accountability and Risk Management guidance and documentation on recent DHS headquarters initiatives—the Procurement Strategy Roadmap and Service Requirements Review pilot—and federal internal control standards on risk assessment. We also interviewed officials on these efforts to identify similarities and differences, and the processes established to review certain service contracts. To determine the extent to which DHS and the selected components in our review ensured federal oversight of service contracts requiring heightened management attention, we reviewed relevant documentation and regulations including Office of Federal Procurement Policy (OFPP) memorandums, the FAR, DHS contracting policies and guidance, and federal internal control standards on information and communication and risk assessment. To understand how DHS and selected components planned and documented oversight needs we reviewed available BWATs from our non-generalizable sample of contracts that we identified as special interest functions. Using FPDS-NG data, we identified an additional 27 contracts with completed job aids that were awarded in fiscal year 2019 for special interest functions across our selected components following implementation of the Inherently Governmental and Critical Functions Analysis job aid in March 2019. We reviewed the completed job aid associated with each of these contracts to understand how the oversight planning process has changed. We interviewed OCPO and component program and contracting officials about their use of both the BWAT and the Inherently Governmental and Critical Functions Analysis job aid. To determine the extent to which DHS and selected components conducted federal oversight of service contracts requiring heightened management attention throughout the life of a service contract, we analyzed documentation—such as contracting officer’s representative appointment letters depicting oversight responsibilities and training for contracting and program officials—and interviewed officials responsible for performing oversight functions. Additionally, to understand the types of tasks oversight officials can perform to mitigate the risk of contractors performing inherently governmental functions or losing control of the department’s mission, we reviewed OCPO provided guidance and trainings and interviewed relevant officials. To determine the extent to which DHS and selected components consider service contracts when budgeting, we reviewed Office of Management and Budget (OMB), DHS headquarters, and component budgeting guidance, federal internal control standards on information and communication, and interviewed headquarters and component budget officials. To determine how service contract requirements are communicated during resource planning and budget formulation, we reviewed DHS and component budget justification documents to identify what ways service requirement information is reflected, including whether specific information on our selected contracts was visible. We compared the resources DHS reported needing and receiving in its fiscal year 2018 budget documentation with DHS’s use of service contracts as reported in FPDS-NG in the same fiscal year as a proxy for visibility of service contract requirements in DHS budgeting. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Department of Homeland Security Organizational Chart The Office of Procurement Operations is the contracting activity for the following DHS components and offices shown above: Countering Weapons of Mass Destruction; Cybersecurity and Infrastructure Security Agency; Civil Rights and Civil Liberties; General Counsel; Office of Intelligence and Analysis; Legislative Affairs; Office of Operations Coordination; Partnership and Engagement; Office of Strategy, Policy, and Plans; Public Affairs; Chief Information Officer; Chief Financial Officer; Secretary/ Deputy Secretary; Management Directorate; Privacy; and the Science and Technology Directorate. In September 2011, the Office of Federal Procurement Policy (OFPP) in the Office of Management and Budget (OMB) issued a policy letter to help agencies manage the performance of inherently governmental and critical functions. The guidance states contracts whose performance may involve closely associated with inherently governmental, critical, or special interest functions require heightened management attention. Specifically, guidance states that closely associated with inherently governmental functions are functions that require heightened management attention to ensure that contractor’s activities do not expand into inherently governmental functions. OMB’s response to public comments on the proposed policy letter provides examples of inherently governmental and closely associated with inherently governmental functions, as shown in table 3. In response to public comments on the proposed policy letter, OMB called critical functions core to the agency’s mission or operations. In addition, the policy letter states that critical functions, when contracted for, pose the risk that the agency can lose control of its mission and operations. Examples of work previously identified by DHS as critical functions for the department include: Intelligence services—proprietary software used to conduct deep and dark web searches on possible threats against senior officials. Risk mitigation services—supporting undercover agents’ identities Program support—immigration data integration Administrative services—working closely with agency senior leadership to conduct research, schedule and attend meetings, as well as develop policies. The policy letter states that agencies must retain sufficient internal capability to give critical functions heightened management attention by: dedicating an adequate number of qualified federal personnel to understand the agency’s requirements and perform functions alongside contractors, if necessary, in the event the contractor fails to perform; or ensure qualified federal personnel are available to oversee and manage the contractor workforce. OMB guidance also describes special interest functions as requiring heightened management attention. In a 2010 memo, OFPP issued guidance to help agencies conduct a required service contract inventory for fiscal year 2010. The guidance describes the service contract inventory as a tool to better understand how contracted services are used and whether contractors’ skills are utilized in an appropriate manner. According to the guidance, agencies should give priority consideration to special interest functions, which for fiscal year 2010 OFPP identified as the categories of professional management services and information technology support services. Special interest functions require increased management attention due to increased risk of workforce imbalance. DHS, in line with OMB guidance, has identified 17 product and service codes to categorize as special interest functions, as shown in table 4. The Department of Homeland Security (DHS) implemented its Balanced Workforce Strategy (BWS) in October 2009 to establish a set of processes that, when repeated on a regular basis, enables the department to achieve the appropriate mix of federal employees and contractors to accomplish the department’s mission while minimizing mission risk that may result from an overreliance on contractors. To accomplish the intended goals of the BWS, DHS instituted an online questionnaire called the Balanced Workforce Assessment Tool (BWAT). The BWAT was in place until March 2019 when DHS determined it— along with the strategy—were no longer necessary given the maturation of their acquisition workforce and their inability to support the software underlying the BWAT. In its place, DHS commissioned its Inherently Governmental and Critical Functions Analysis—known as the job aid. Marie A. Mak 202-512-4841 or MakM@gao.gov In addition to the contact named above, Penny Berrier (Assistant Director), Meghan Perez (Analyst in Charge), Erin Butkowski, Signe Janoska-Bedi, and Jacqueline Wade were principal contributors. In addition, the following people made contributions to this report: Pete Anderson, Lorraine Ettaro, Suellen Foth, Julia Kennon, Roxanna Sun, and Anne Louise Taylor.", "summary": "DHS's spending on services—such as guard services and technology support—represents over 75 percent of its annual contract obligations. The Office of Management and Budget has recognized that some service contracts require extra management attention because they pose a risk that the government could lose control of its decisions or operations. GAO was asked to review DHS's use of and planning for service contracts. This report addresses, among other objectives, the extent to which DHS and selected components and offices use, oversee, and budget for service contracts. GAO analyzed Federal Procurement Data System-Next Generation data from fiscal years 2013 through 2018; selected non-generalizable samples of four components with high service contract obligations and eight service contracts requiring heightened management attention; and interviewed DHS officials. From fiscal years 2013 through 2018, the Department of Homeland Security (DHS) increased its reliance on contracts for services, particularly those in categories that may need heightened management attention, such as drafting policy documents (see figure). These services include functions that are closely associated with inherently governmental, critical, or special interest, which could put the government at risk of losing control of its mission if performed by contractors without proper oversight by government officials. GAO found that DHS and selected components do not consistently plan for the level of federal oversight needed for these contracts because there is no guidance on how to document and update the number of federal personnel needed to conduct oversight. GAO also found that program and contracting officials from six of the eight contracts GAO reviewed did not identify specific oversight activities they conducted to mitigate the risk of contractors performing functions in a way that could become inherently governmental. DHS lacks guidance on what these oversight tasks could entail. Without guidance for documenting and updating the planned federal oversight personnel needed, and identifying oversight tasks, DHS cannot mitigate the risks associated with service contracts in need of heightened management attention. Selected DHS components have information on service requirements, but budget documentation—submitted to DHS headquarters as well as to Congress—does not communicate details about most estimated or actual service contract requirements costs. Given that services account for over three-quarters of DHS's annual funding for contracts, additional insights would shed light into how much of DHS's mission is being accomplished through services, including those requiring heightened management attention. Without more visibility into this information, DHS headquarters and Congress are at risk of not having complete information for sound resource planning and decision-making, particularly as it relates to determining what proposed service contract requirements DHS should prioritize when budgeting. GAO is making six recommendations, including that DHS provide guidance for documenting and updating the federal workforce needed to oversee certain service contracts and identifying oversight tasks, and report service requirement information in budget documents to Congress. DHS agreed with two of the recommendations and did not agree with four of them. GAO continues to believe the recommendations are valid, as discussed in the report.", "document_type": "gao"}
{"report": "FDA approves reference listed drugs and generic drugs that meet safety and efficacy standards for marketing in the United States. Generic drug companies must show that their drug is (1) the same as the reference listed drug with respect to the active ingredient(s), conditions of use, route of administration, dosage form, strength, and labeling (with certain permissible differences, as approved by FDA); and (2) bioequivalent to the reference listed drug, meaning it generally delivers the same amount of active ingredient(s) in the same amount of time as the reference listed drug. When the reference listed drug is available, it is also designated as the reference standard drug, which is the product generic drug companies must use to conduct bioequivalence testing. When the reference listed drug is not available, FDA will select an approved generic of the reference listed drug to serve as the reference standard drug. All drugs pose some level of safety risk to patients. According to FDA, for most drugs, routine, risk-minimization measures, such as FDA-approved professional labeling, are sufficient to protect the public from the drug’s risks. However, in some cases, FDA may require a drug company to take additional actions to ensure that the benefits of the drug outweigh its risks and to help mitigate or prevent serious risks of adverse side effects. Specifically, FDA may require the drug company to establish a REMS that includes one or more risk-mitigation strategies beyond the drug’s professional labeling. According to FDA, most REMS are designed to reinforce patients’ and health care providers’ behaviors and actions that support the safe use of the particular drug they cover. For example, FDA may require drug companies to give patients and health care providers additional information to reinforce certain safe use conditions or specific risks described in the approved labeling of a certain drug. FDA may require a REMS either before a drug is approved or after approval if FDA becomes aware of new safety information. When determining whether a REMS is necessary, FDA considers several factors, including, for example, the estimated size of the population likely to use the drug and the seriousness of the disease or condition being treated. FDA may require a REMS to include one or more components. For example, FDA may require drug companies to provide patients with certain information in the form of medication guides. Generally, medication guides include information on serious side effects, including those that might require emergency medical care or involve life- threatening conditions. Similarly, FDA may require drug companies to develop communication plans for how the drug company will disseminate information to health care providers. Communication plans can include, for example, information on any serious risks of the drug and any safety protocols to ensure its safe use. Thus, for one REMS, FDA could require a drug company to provide a medication guide. For a second REMS, FDA could require a drug company to provide both a medication guide and a communication plan. Table 1 below includes a list of selected REMS components. Additionally, if a reference listed drug is subject to a REMS, an approved generic drug is also subject to some of the same REMS requirements. FDA can also require drug companies to implement another REMS component, called “elements to assure safe use” (ETASU), if a drug has been shown to be effective, but is associated with a specific serious risk. Depending on the risk, FDA may require any or all of the following ETASU measures: Prescribers have specific training or special certifications; Pharmacies or health care settings where the drug is dispensed have Drugs are dispensed only in certain health care settings, such as hospitals; Drugs are dispensed with evidence of safe-use by the patient, such as requiring a patient’s acknowledgement that she has been counseled on a drug’s risks and understands and accepts these risks; Patients are monitored, for example, while taking the drug for specific adverse events or outcomes; or Patients are enrolled in a registry for collection of certain information, such as patient outcomes and adverse reactions associated with the drug. According to FDA, these measures are for drugs that can be marketed only if there are requirements in place to mitigate a specific serious risk listed in the drug’s labeling. If FDA requires certain ETASU measures, it may also require a drug company to develop an implementation system to enable the drug company to monitor and evaluate implementation of the ETASU measures by health care providers, pharmacists, and other responsible parties. Also, if a reference listed drug is subject to a REMS with ETASU and a generic version is being developed, the reference drug company and the generic drug company are required to develop a shared system—a system that is used by participating companies to coordinate their REMS activities and information about a drug’s risks. Under a required shared system, the generic drug company and the reference drug company use the same REMS documentation and other materials on the drug’s risks and generally share in the implementation and maintenance of any database and infrastructure (e.g., call center). According to FDA, shared systems can be beneficial in reducing the burden for patients and health care providers, such as prescribers and pharmacies, when accessing REMS informational materials or completing administrative requirements, including any required training or certifications for providers. Generic drug companies must submit REMS documentation and materials as part of their generic drug application. Generally, before FDA can approve generic drugs that are subject to REMS with ETASU, reference drug companies and generic companies must reach agreement on a required shared system. According to FDA, generic drug companies that are developing a required shared system should submit their proposed REMS materials to FDA by the midpoint of the application review process or another time as specified by the agency. Any delays in the development of a required shared system can affect FDA’s ability to approve a generic drug application. A generic company may request a waiver from FDA, which if granted, would allow the generic company to develop a separate system that includes the same ETASU measures required for the reference listed drug. For example, if the reference listed drug’s ETASU measures require prescriber certification and the dispensing of the drug in certain health care settings, then the generic drug company’s separate system must also include the same ETASU measures. In recent years, FDA and FTC have identified two practices that can hinder competition by preventing or delaying the development and marketing of generic drugs. The first practice the agencies identified involves limiting access to samples of reference standard drugs, which generic companies generally need to conduct bioequivalence testing. This practice can apply both to reference standard drugs subject to REMS, specifically those subject to certain ETASU measures, and those not subject to REMS. For example, some drug companies might limit access to samples of reference standard drugs subject to REMS, citing ETASU measures that limit distribution, such as the measure that limits distribution of drugs subject to REMS to only certain health care settings. Additionally, drug companies may limit access to samples of reference standard drugs that are not subject to REMS. Typically, generic companies obtain samples through normal distribution channels such as wholesale distributors. However, drug companies could, for example, limit the sale of their reference standard drugs to certain pharmacies, such as specialty pharmacies. FDA and FTC have testified before Congress that these distribution limits—for reference standard drugs with and without ETASU-related distribution measures—can hinder generic companies’ ability to develop generic drugs and to submit a generic drug application to FDA for review. The second practice involves circumstances when a reference drug company delays its negotiations with generic drug companies on a required shared system. The negotiations to develop a required shared system can be complex because all parties must agree on the implementation of the REMS as well as issues related to cost-sharing, confidentiality, and product liability concerns. As part of their generic drug application, generic companies must include an adequate REMS program in order to be approved. Therefore, delays in the development of a required shared system can affect FDA’s ability to approve a generic drug application. Our analysis of FDA data shows that as of March 18, 2019, there were 74 approved active REMS that apply to 523 drugs. These drugs pose a variety of risks to users, treat a variety of conditions, and some are generics. A REMS can apply to one drug, more than one drug, or to a large number of drugs. Specifically, the approved REMS apply to: 136 drugs because they pose a high risk of serious medical side effects, 384 drugs because they pose a high risk of serious medical side effects from misuse and abuse, and Three drugs because they have the risk of medical side effects from both the use of the drug and from misuse and abuse. These drugs also treat at least 15 different types of medical conditions such as cancer, cardiovascular, and respiratory conditions. Twenty-two are orphan drugs, which are drugs intended to treat rare diseases. One hundred forty-three of these drugs are reference standard drugs, and 64 of these reference standard drugs have one or more approved generics that are also subject to REMS. (See Table 2) For example, FDA approved a generic of the drug Clozaril, which is used to treat mental and mood disorders. Both Clozaril and its generic, Clozapine, are subject to a REMS to prevent adverse medical side effects. Medicare and Medicaid paid at least $11.8 billion in 2017 for reference standard drugs subject to REMS. Specifically, in 2017 Medicare paid at least $8.5 billion for 83 of 139 reference standard drugs subject to REMS. This amount accounted for at least 8 percent of all Medicare drug spending in 2017. In the same year, Medicaid paid at least $3.3 billion—or at least 15 percent of all Medicaid drug spending—for 83 of the 139 reference standard drugs subject to REMS. Appendix I provides information from available data on Medicare and Medicaid spending on reference standard drugs subject to REMS. Of the 74 active REMS in our analysis, 51 have at least one required ETASU measure, and 35 specifically limit how drugs are distributed. Thirty-one of the 74 active REMS also require medication guides explaining the risks of the drug to be given to patients, and 12 require a communication plan for how the company will disseminate information to health care providers. Similar to how the 74 active REMS can have more than one REMS component, the 51 active REMS with ETASU measures can have more than one required measure. For example, 19 active REMS have an ETASU measure requiring patients to be enrolled in a registry and an ETASU measure requiring drug companies to provide training to prescribers of the drugs. Over half of the 51 active REMS with ETASU include measures that may limit how drugs are distributed. Specifically, 35 active REMS with ETASU measures include a requirement for drug companies to ensure drug dispensing settings are specially certified before they distribute the drugs. The certification process may require dispensing pharmacies to enroll in education programs provided by the drug companies. For example, to mitigate the risk of accidental overdoses from the misuse and abuse of fentanyl products, dispensing pharmacies are required to complete an education program that addresses—among other things— the risks of fentanyl products, patient selection, drug dosage, and patient counseling. In addition, for 10 of the 74 active REMS, companies have entered into a shared system. In three of the 10 shared systems, generic companies received a waiver from the shared system requirement after they were not successful in negotiating a shared system with the reference drug companies. In these three cases, the generic drug companies entered into shared systems that are separate from the reference drug company systems. For example, after developing generics of Lotronex, which is subject to REMS with ETASU and intended to treat gastrointestinal conditions, the generic companies were required to enter into a shared system with the reference drug company. When these companies were not successful in negotiating a required shared system, FDA determined the burden of developing a required shared system with the reference drug company outweighed the benefits of having one and waived the requirement. Once FDA granted the waiver, multiple generic companies were allowed to share REMS materials and administrative requirements with heath care providers via one shared system that is separate from Lotronex’s REMS system. FDA and FTC have taken four actions to address circumstances when generic drug companies cannot access samples of reference standard drugs or experience delays in negotiating required shared systems. According to FDA and FTC, both circumstances can hinder generic drug companies’ ability to develop and market generic drugs. Three of the actions focus on making samples of reference standard drugs accessible and the fourth focuses on facilitating the development of a required shared system. While all four of the actions pertain to drugs subject to REMS, only two of the actions pertain to drugs both subject to REMS and not subject to REMS. According to FDA officials, the agency is even more limited in what actions it can take when drugs not subject to REMS are involved. Drug Companies’ Perspectives on Limited Access to Samples of Reference Standard Drugs with Elements to Assure Safe Use (ETASU) that Limit Distribution Officials from all four of the generic drug companies we interviewed told us that their inability to access samples of reference standard drugs with ETASU measures that limit distribution either delayed or discouraged them from developing generic drugs. Officials from two of the five reference drug companies we interviewed told us they were unaware of specific instances when generic companies had difficulty obtaining samples or that generic companies had requested samples of reference standard drugs with ETASU measures that limit distribution. Also, officials from two reference drug companies cited safety concerns as the reason for limiting the distribution of their drug. FDA issued draft guidance on how to obtain a safety determination letter. One of FDA’s actions focused on facilitating generic drug companies’ access to reference standard drugs with ETASU-related limited distribution measures. (See sidebar for drug companies’ perspectives on this practice.) In 2014, FDA issued draft guidance describing how a generic drug company could ask the agency to send what is known as a safety determination letter to the reference drug company on the generic drug company’s behalf. The draft guidance explains how FDA could send a letter stating that the agency had reviewed the generic company’s plans for its bioequivalence testing and determined that these plans included safety measures that were comparable to those in the ETASU measures for the reference standard drug. For example, if the reference standard drug’s ETASU required protections to prevent fetal exposure to the drug, the generic company’s plans should include the same protections. The safety letter would also note that FDA would not consider it a REMS violation to provide reference standard drug samples to the generic company requesting the safety determination letter. According to FDA, some reference drug companies were concerned that providing samples to the generic drug company would violate REMS requirements. From 2016 to 2018, FDA issued 12 safety determination letters to reference drug companies on behalf of generic companies, according to agency data. However, FDA did not issue a safety determination letter for all of the requests it received. According to FDA officials, there are various reasons why they might not issue a safety determination letter to the reference drug company. For example, a generic company must sign a disclosure form in order for FDA to send the letter to the reference drug company, but the generic company does not always choose to do this. Additionally, the generic company might have withdrawn its request for a safety determination letter, or FDA might be waiting for additional information from the generic company in order to complete its review. According to FDA officials, there is no need for a safety determination letter (which assures the reference drug company that providing samples to the generic drug company will not be considered a violation of their REMS) when there is no REMS for the product in the first place. Drug Companies’ Perspectives on Limited Access to Samples of Reference Standard Drugs Not Subject to Risk Evaluation and Mitigation Strategies (REMS) Officials from three of the four generic companies in our review told us they had experience with drug companies’ imposed distribution limits on reference standard drugs not subject to REMS. Of the four generic companies in our review, officials from one company said they were not able to obtain the samples they needed and chose not to pursue developing a particular drug. Officials from one of the five reference drug companies said they have limited distribution for reference standard drugs not subject to REMS. They said their companies do so to ensure that their products are efficiently distributed, in part by using certain pharmacies. FDA published a web page with information about inquiries that included drugs both subject to and not subject REMS. In February 2019, FDA published a web page with information on inquiries made to FDA by generic companies seeking to obtain samples of reference standard drugs in order to develop generic drugs. (See sidebar for drug companies’ perspectives on this practice.) FDA officials said they published this list to increase transparency about continuing issues related to accessing samples and to raise awareness about the potential effect these issues might have on reducing competition in the drug market. This list included drugs subject to and not subject to REMS, the names of reference drug companies, and the number of inquiries made. According to the web page as of February 2019, inquiries were made for 54 reference standard drugs, including 25 drugs with ETASU-related limited distribution measures and 29 drugs without such measures. According to FDA data, the number of inquiries had been generally decreasing in the years prior to when the list was published. FTC officials reviewed inquiries the agency received from FDA and generic companies and filed two briefs. FTC told us it reviewed inquiries the agency had received from generic companies and FDA, including those related to information on FDA’s published web page. However, FTC officials said, to date, they have not brought a case charging a reference drug company with violating federal antitrust law for refusing to provide samples to a generic drug company. In order to take enforcement action, FTC needs to find sufficient evidence of activity that violates the Federal Trade Commission Act or the Sherman Act. For example, FTC would need to find that a reference drug company’s practice constituted monopolization in violation of the Sherman Act. According to FTC officials, they have not brought any antitrust cases to the courts, but have filed two amicus briefs related to cases involving drugs subject to REMS. In both of these briefs, FTC noted that the generic companies’ respective allegations, if true, established an antitrust violation and that the generic companies’ lawsuits should be allowed to continue. Drug Companies’ Perspectives on Negotiating Required Shared Systems Officials from one generic company said that the respective reference drug companies would not meet with them to negotiate the development of a required shared system REMS. Officials from another generic company said the negotiation process with the reference drug company lasted almost 2 years. Officials from four of the five reference drug companies we interviewed had experience negotiating required shared systems. Officials from three of these four companies told us that developing a shared system is a difficult, challenging, and complex process. Officials from one reference drug company said that the level of complexity can increase based on the number of companies and the different people involved. FDA issued waivers that allowed generic drug companies to develop a separate system from the REMS of the reference listed drug and issued draft guidance on how to obtain such a waiver. According to FDA, since 2007, the agency has received 13 requests for a waiver from the shared system requirement, and at the time of our data collection and analysis, FDA had approved three, the first in 2013. (See sidebar for drug companies’ perspective on required shared systems.) These waivers allowed the generic drug company to develop a separate system that includes the same ETASU measures required for the reference listed drug. According to officials, FDA was unable to grant the remaining waivers for different reasons. For example, the agency may still be reviewing the generic drug application submitted by the company that requested a waiver. Officials explained that the waiver request is part of the overall generic drug application and the agency cannot approve a waiver without approving the application as well. To further facilitate the process, in 2018, FDA issued draft guidance describing what factors the agency considers when granting waivers. The statute authorizes FDA to grant a waiver (1) if the burden of creating a required shared system outweighs the benefit of having it, taking into account the impact on the health care providers, patients, and drug companies involved or (2) if an aspect of the ETASU is covered by an unexpired patent or entitled to trade secret protection, and the generic company was unsuccessful in obtaining a license for use. FDA’s guidance describes examples of the potential benefits of having a shared system and the burdens of forming a shared system on health care providers, patients and drug companies that FDA will consider. For example, having a shared system could benefit drug companies by making a REMS for multiple products more efficient. In contrast, the drug companies negotiating a required shared system could be market competitors and involved in patent litigation related to the drug product. In general, the four generic drug companies and five reference drug companies we interviewed disagreed on the usefulness of FDA’s and FTC’s efforts to address the practices that may affect the development of generic drugs. FDA’s safety determination letters. Officials from three of the generic companies in our review said that the safety determination letters were not useful because they were not enforceable and did not require a reference drug company to provide a generic company with samples of a reference standard drug. In its comments on FDA’s draft guidance on obtaining a safety determination letter, one stakeholder representing generic companies expressed concern that reference drug companies now use safety determination letters as another requirement to obtain samples. In contrast, officials from three reference drug companies we interviewed told us that FDA’s safety determination letters addressed their safety concerns regarding sharing samples of reference standard drugs with generic companies. Further, officials from two of these three reference drug companies said they request these letters from generic companies that request samples of reference standard drugs. Officials from the remaining two reference drug companies we interviewed said they were not aware of FDA’s safety determination letters or did not have concerns or a position on the issue. FDA’s publication of its web page. Officials from one of the four generic companies we interviewed told us they thought the inquiries web page published by FDA was helpful. However, this same company said it had not noticed a significant effect in being able to access samples of reference standard drugs because of the web page. Officials from another generic company said it was too early to tell about the usefulness of FDA’s web page. Of the remaining two generic companies, officials from one company were unaware of the web page and officials from the second company noted that they were uncertain why a generic company would be included in the list of companies on FDA’s web page. Officials from two of the five reference drug companies we interviewed, and whose companies appeared on the web page, said they were unaware of any inquiries made to their companies requesting samples of reference standard drugs. Additionally, officials from one company told us they did not know why they were on FDA’s published web page because the company had sold the reference standard drug to another company and had informed FDA that this had occurred. According to FDA, the web page reflects the owner of the reference standard drug at the time the agency received an inquiry, regardless of whether the drug was later sold. Additionally, some generic companies might contact FDA directly without contacting the reference drug company because they anticipate having difficulties accessing samples of the reference standard drug. FDA notes on its web page that the agency did not independently investigate or confirm the access limitations described in the inquiries it received. FTC’s filing of amicus briefs. Officials from two of the generic companies in our review said FTC’s filing of amicus briefs was generally a positive step. Officials from two companies said the amicus briefs helped negotiations with reference drug companies. A third generic company said the amicus briefs helped raise awareness about issues generic companies are having. Officials from a fourth generic company said FTC’s actions could impact the company’s efforts to develop generic versions of reference listed drugs in the future. Officials from the five reference drug companies we interviewed did not have any comments on FTC’s specific amicus briefs. Waivers for a required shared system. Officials from three of the four generic companies we spoke with had experience with waivers. Officials from one of these three companies said the waiver guidance was helpful. However, officials from this generic company and a second company said it took FDA almost a year to grant their waivers. According to officials from a third company, they obtained their waiver within a month, in part, because negotiations had been ongoing for more than a year. According to FDA officials, the review of a waiver request is part of the generic drug company’s drug application. FDA will not grant a waiver unless the generic drug company meets the waiver requirements and its generic drug application is approved. Reference drug companies and other stakeholders expressed concerns about these waivers. Officials from three of the five reference drug companies we spoke with said the burden on health care providers or patients should be considered when granting waivers. Officials from one company specifically expressed concerns that as FDA grants additional waivers, it could place an additional burden on the health care system. For example, health care providers could be required to use multiple systems to access REMS information on the drug’s risks or to complete administrative requirements, such as required certification. The remaining reference drug companies did not have comments on the topic. In comments we reviewed on FDA’s draft guidance on these waivers, stakeholders noted concerns similar to those raised by the reference drug companies. For example, two groups representing pharmacists and pharmacies said that if FDA grants additional waivers, it could place a burden on the health care system. Historically, FDA has attempted to limit the number of required shared systems created under waivers. If a generic drug company is granted a waiver, it is allowed to create a separate system that includes the same ETASU measures required of the reference listed drug. However, to date, FDA has only granted waivers to generic drug companies that agree to share their systems with other drug companies that concurrently or subsequently develop generic or brand versions of the same reference listed drugs. We provided a draft of this product to FDA and FTC for their review and comment. Both agencies provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of HHS, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In order to estimate Medicare and Medicaid spending on reference standard drugs subject to risk evaluation and mitigation strategies (REMS), we compared data from the Food and Drug Administration (FDA) on drugs subject to REMS as of March 18, 2019, to publicly available 2017 data on the Medicare Part D Drug Spending Dashboard and the Medicaid Drug Spending Dashboard, maintained by the Centers for Medicare & Medicaid Services (CMS). These data covered drug spending and utilization for both of these programs for calendar year 2017, the most current data available. However, not all spending and utilization data for reference standard drugs subject to REMS were available. Since we analyzed data as of March 18, 2019, we were able to identify 139 reference standard drugs subject to REMS with corresponding cost data. To assess the reliability of these data, we interviewed knowledgeable agency officials. We determined that the data were sufficiently reliable for the purposes of our report. Medicare and Medicaid paid at least $11.8 billion in 2017 for reference standard drugs subject to REMS, according to cost data available from the CMS’s drug pricing dashboard. Specifically, Medicare Part D paid at least $8.5 billion for reference standard drugs subject to REMS. This amount—which includes Medicare Part D plan sponsors and beneficiaries Part D payments such as copays, but not price concessions, such as manufacturers’ rebates—accounted for at least 8 percent of all Medicare drug spending in 2017. Similarly, Medicaid paid at least $3.3 billion for reference standard drugs subject to REMS, or at least 15 percent of all Medicaid drug spending in 2017. Of the 139 reference standard drugs in our analysis, the greatest share of these programs’ spending, across medical conditions, was on reference standard drugs subject to REMS for cancer, based on our analysis of available data. Specifically, Medicare and Medicaid spent at least $4.6 billion on 8 reference standard drugs that treat cancer. See table 3 below for Medicare and Medicaid spending for reference standard drugs subject to REMS by medical condition treated. Further, our analysis of available data showed that Medicare and Medicaid spent the most on Revlimid, a drug used to treat cancer, totaling $3.6 billion with Medicare accounting for $3.3 billion of this total. More than 37,000 Medicare beneficiaries used this drug, at an average cost per dosage unit of $626.94. (See table 4.) In contrast, Medicaid spent the most on Suboxone, a drug used to treat opioid dependence, totaling $0.7 billion, based on available data. More than 3 million Medicaid claims were filed for this drug in 2017, at an average cost per dosage unit of $7.89. Vivitrol was the third most utilized drug under Medicaid. (See table 5.) Based on our analysis of available data, the selected examples of reference standard drugs subject to REMS had higher average cost per dosage unit compared to the generic. For example, Medicare spent an average cost per unit of $12.20 for Clozaril, a drug used to treat mental health conditions, compared to $0.99 for clozapine, a generic version of Clozaril. Table 6 below shows selected examples comparing Medicare spending for reference standard drugs to Medicare spending for a generic version, based on our analysis of available data. Our analysis of available Medicaid data showed similar results to our analysis of Medicare data. For example, Medicaid spent an average cost of $11.71 for Clozaril, a drug used to treat mental health conditions, compared to $0.97 for clozapine, a generic version Clozaril. Table 7 below shows selected examples comparing Medicaid spending for reference standard drugs to Medicaid spending for a generic version, based on our analysis of available data. In addition to the contact named above, Geri Redican-Bigott and Tom Conahan, Assistant Directors; Carolyn Garvey, Analyst-in-Charge; Zhi Boon, Gay Hee Lee, and McKenna Storey made key contributions to this report. Also contributing were Sam Amrhein, Kaitlin Farquharson, Cathy Hamann, and Diona Martyn.", "summary": "To manage the risks posed by some drugs, FDA requires drug companies to establish risk evaluation and mitigation strategies. Companies developing generic drugs generally need samples of the reference standard drug to conduct bioequivalence testing. Generic companies may also have to negotiate a shared system with the reference drug company, when that company's drug is subject to certain REMS requirements. FDA and FTC officials acknowledge that some drug companies have used certain practices that prevent or delay the development of generic drugs. The practices include limiting access to samples of reference standard drugs with and without REMS and delaying negotiations for creating required shared systems. GAO was asked to review drugs subject to REMS and drug companies' experience with these practices. This report describes (1) the drugs subject to REMS, and (2) FDA and FTC's efforts to address these practices, and stakeholders' views on agencies' efforts. GAO analyzed FDA data on the conditions these drugs treat and the REMS requirements that apply to the drugs. GAO also interviewed FDA and FTC officials and representatives from five reference drug companies and four generic drug companies, which GAO selected based on a variety of factors, including the companies' experiences with drugs subject to REMS . GAO also reviewed public comments and related documents from FDA and FTC. HHS and FTC provided technical comments on a draft of this report, which GAO incorporated as appropriate. The Food and Drug Administration (FDA) can require drug companies to establish risk evaluation and mitgation strategies (REMS) for drugs with serious safety concerns to ensure that a drug's benefits outweigh its risks. As of March 18, 2019, FDA approved 74 active REMS that cover 523 drugs that treat various conditions. One hundred forty-three of the drugs are reference standard drugs, which are drugs generic drug companies must use to conduct bioequivalence testing. Of these 143, 64 have at least one approved generic that is also subject to REMS. Ten of the REMS are shared systems that allow health care providers to obtain information from multiple companies on a drug's risks and satisfy other administrative requirements through one REMS system. According to FDA and the Federal Trade Commission (FTC), drugs with and without REMS have been the subject of practices that can delay or prevent generic drug development and marketing. FDA and FTC have taken actions designed to address some of these practices. According to FDA officials, they are more limited in what actions they can take when drugs without REMS are involved. Drug company officials that GAO interviewed had different views on these actions. To address practices that may limit access to samples of reference standard drugs and keep generic drugs from the market: FDA issued draft guidance in 2014 on how generic companies could obtain a letter stating that the agency would not consider it a REMS violation to provide reference standard drug samples to the generic company requesting the letter. Three of the four generic companies GAO interviewed said these letters were not useful because they do not require drug companies to share samples. In contrast, officials from three of five reference drug companies said the letters addressed their safety concerns about providing samples to generic companies. FDA does not issue such letters for drugs without REMS. In February 2019, FDA published a list of drug companies whose reference standard drugs were the subject of access inquires made to FDA by generic drug companies. One of the four generic companies GAO spoke with said FDA's list was helpful, and one reference drug company said it was uncertain why it was included on the list. FTC has reviewed inquiries it received from FDA and generic companies, and has filed amicus briefs in two cases involving drugs with REMS. According to FTC, to date, the agency has not brought a case charging a drug company with violating federal antitrust law for refusing to provide samples to a generic drug company. To address practices that may delay negotiations between reference drug and generic drug companies for creating required shared systems, FDA issued waivers and related guidance that allowed generic companies to develop a separate, but comparable, REMS shared system. One generic drug company said the guidance on waivers was helpful; however, one drug company said the waivers put added burden on health care providers who have to use multiple REMS systems.", "document_type": "gao"}
{"report": "The F-35 plays a key role in DOD’s modernization efforts. However, it faces concerns in several areas that will inform the program’s cost and performance in the future. These include the risk in its modernization efforts, its aircraft not meeting all reliability targets, and sustainment and supply chain challenges. Specifically, the F-35 program plans to award Block 4 development contracts before it has key business case documents that would normally inform this decision. Also, the program is not meeting all of its Reliability and Maintainability (R&M) targets. Finally, the F-35 program’s sustainment costs are rising as it also faces significant supply chain challenges. The F-35 baseline aircraft program completed development in April 2018. It started formal operational testing of the baseline aircraft in December 2018 after a 3-month delay. This testing was delayed for two main reasons: (1) to resolve critical deficiencies identified in developmental testing, and (2) to accommodate an unexpected grounding following the crash of an F-35B in September 2018. According to a test official, the program expects to complete testing in December 2019, about 3 months later than planned due to delays with the simulator that is used for more complex testing. Until that testing is complete, there is still a risk that additional deficiencies may be identified. With the program wrapping up development of the baseline program, it is transitioning to early development and testing activities for the Block 4 modernization efforts, which the F-35 Joint Program Office estimates will cost about $10.5 billion. With Block 4, DOD plans to add new capabilities and modernize the F-35 aircraft to address evolving threats. In April 2019, we found that DOD will not have a complete business case for Block 4 before it plans to award development contracts in 2019. Section 224 of the National Defense Authorization Act for Fiscal Year 2017 required DOD to submit a report containing certain elements of an acquisition program baseline—in essence, a business case—to include cost, schedule, and performance information and independent estimates—for Block 4. In 2018, we found that DOD’s report to Congress was incomplete. In its report, DOD stated that the acquisition program baseline would continue to be refined over the next year. DOD officials stated that the updated F-35 program baseline, with the Block 4 efforts included, will be released in April 2019. Over the past year, the program has already invested over $1.4 billion, in part to gain the knowledge it needs to develop that business case, such as a preliminary design review, as well as to establish Block 4 testing facilities and support early capabilities’ development. The program incorporated some Block 4 activities into its acquisition strategy, which was approved in October 2018. However, we found that three key Block 4 business case documents will not be ready before the program’s planned development contract awards in May 2019: Independent Technology Readiness Assessment: A Technology Readiness Assessment is a systematic, evidence-based process that evaluates the maturity of hardware and software technologies critical to the performance of a larger system or the fulfillment of the key objectives of an acquisition program. The program office plans to conduct a partial independent assessment of initial capabilities sometime between October and December 2019 with additional assessments to follow. A program official stated that technologies will not be integrated into the aircraft until they are adequately mature. However, without a complete independent Technology Readiness Assessment, the program will not have identified potential critical technology elements and, as a result, may be at risk of delaying the delivery of new capabilities. Test and Evaluation Master Plan: Although the F-35 program has begun testing Block 4 capabilities, it does not have an approved Test and Evaluation Master Plan. The Test and Evaluation Master Plan documents the overall structure, strategy, and objectives, as well as the associated resources needed for execution. Developmental and operational test officials have expressed concerns about the lack of an approved test plan, uncertain funding, the number of test aircraft available, and the draft test schedule, among other things. An approved, properly resourced test plan is essential for planning and preparing for adequate testing of the Block 4 capabilities. According to these officials, without an approved plan, the F-35 program is providing the test authorities with capabilities to be tested without giving them the necessary direction on how to adequately prepare to conduct the tests, making it difficult to execute testing. While this is still a concern, F-35 program officials explained that over the past 3 months they have been providing the test authorities with the direction needed to conduct testing. Independent Cost Estimate: The Block 4 Independent Cost Estimate, which details the program’s total estimated life cycle cost, is not complete. In August 2017, we reported that DOD estimated the development funding needed for the first phase of Block 4 was projected to be over $3.9 billion through 2022. Since then, the program incorporated more fidelity and specific Block 4 efforts that were not in the original estimate into its Block 4 cost estimate. Based on the program office’s latest estimate, the cost of Block 4 capabilities is expected to be $10.5 billion through 2024. According to OSD’s Cost Assessment and Program Evaluation office, it will provide the Independent Cost Estimate between October and December 2019 to support the F-35 program’s pending full-rate production decision, but this would occur several months after the program plans to award the Block 4 development contracts. According to the GAO Cost Guide, an Independent Cost Estimate is considered one of the best and most reliable estimate validation methods as it provides an independent view of expected program costs that tests the program office’s estimate for reasonableness. Without an Independent Cost Estimate, Congress does not have insight into the full potential cost of Block 4. The expected completion dates for these documents are between October and December 2019, at the earliest. Figure 1 shows key Block 4 dates such as the Block 4 re-plan, which included revising the cost estimate for Block 4 that DOD established in 2017, the planned development contract awards, and planned completion dates for the three remaining critical business case documents. As seen in figure 1, the program office plans to award Block 4 development contracts in May 2019, at least five months before any of the critical business case documents will be available. Based on best practices identified by GAO, without an independent Technology Readiness Assessment, Test and Evaluation Master Plan, or an Independent Cost Estimate, program officials cannot have a high level of confidence that the requirements are firm and that risk has been adequately reduced before beginning efforts estimated to cost $10.5 billion in funding to develop Block 4. If program officials move ahead with Block 4 contracts without gaining the knowledge that a full business case would provide, Block 4 modernization efforts will be at risk of experiencing the same kind of cost and schedule growth the baseline development program experienced. To address this risk, in April 2019, we recommended to the DOD that it should ensure the F-35 program office complete its business case, to include the three documents discussed above, at least for the initial Block 4 capabilities under development before initiating additional development work. DOD did not concur with this recommendation. In its comments, DOD stated that the F-35 program office has adequate knowledge to begin Block 4 development. We maintain, however, that completing its business case before awarding its Block 4 development contracts would put DOD and the program in a better position to effectively and successfully develop Block 4 capabilities. As we reported in April 2019, the program has made slow, consistent progress in improving the F-35’s R&M metrics’ performance but half of the metrics are not achieving targets. All F-35 variants are generally performing near or above targets for four of the eight R&M metrics, while still falling short for the other four. Each F-35 aircraft variant is measured against eight R&M metrics, four of which are in part of the contract. All eight R&M metrics are described in the program’s Operational Requirements Document (ORD)—the document that outlines the targeted performance levels for these metrics that DOD and the military services agreed the F-35 should meet in 2000. Based on our analysis, while the program is on track to meet half of the targets, the program office has not taken adequate steps to ensure the others will be met. Additionally, in December 2018, the Director, Operational Test & Evaluation reported that, although performance for the four under-performing metrics has shown slow growth over the years, none of these metrics are meeting interim goals needed to reach requirements at each variant’s maturity. Each F-35 variants’ R&M performance against these metrics is shown in table 1. Since the program began tracking R&M performance in 2009, it has seen small, annual improvements. Over the past year, all variants showed a slight improvement in targeted performance levels for one metric, the mean flight hours between failure—design controlled, but saw little or no discernable improvement for the four metrics not meeting targets. However, based on current performance, the program does not expect to meet those targets by full aircraft maturity. According to F-35 program officials, the ORD R&M metrics should be re-evaluated to determine more realistic R&M performance metrics, but the program has not yet taken actions to do so. Until the program office does so, it remains accountable for ensuring those ORD R&M metrics are achieved. In June 2018, we recommended that the F-35 program identify steps it needs to take to ensure the F-35 aircraft meet R&M requirements before each variant reaches maturity and update its R&M Improvement Program (RMIP)—DOD’s action plan for improving R&M—with these steps. DOD concurred with our recommendation but has yet to take substantive actions to address it. DOD did, however, complete 16 improvement projects since we last reported on this. Despite completing these projects, there were not significant gains in the R&M metrics not meeting targets. Program officials advised, however, that measurable improvements in R&M can take time to manifest. To speed this process, the program is accelerating planned upgrades to older aircraft where appropriate, which officials stated should translate to an overall improvement in the program’s R&M performance. The F-35 program office has estimated that implementing all of the identified improvement projects currently contained in its RMIP could result in potential life cycle cost savings of over $9.2 billion by improving the F-35’s R&M. However, we found that, as of December 2018, the guidance the F-35 program office has used to implement the RMIP does not define specific, measurable objectives for what the desired goals for the F-35’s R&M performance should be or align improvement projects with R&M goals. Furthermore, the RMIP has not been a funding priority. Federal internal control standards state that programs should define objectives when implementing programs such as the RMIP. Although the F-35 program RMIP’s guidance has a general goal of improving R&M, it does not identify achieving the eight R&M targets listed in the ORD as an objective. Program officials acknowledged that the RMIP’s guidance does not include such an objective. Instead, officials stated they are using the RMIP to prioritize and fund projects that will improve aircraft availability and mission capability—neither of which are included in the eight R&M metrics, but are necessary and important initiatives. The program is focusing on these two areas in part because a September 2018 memorandum from the Secretary of Defense to the Secretaries of the military departments included a goal for the F-35 fleet to attain a mission capable rate of 80 percent by the end of fiscal year 2019. According to program officials, improving these two areas will translate into improvements in the F-35 overall R&M. However, we found that the RMIP’s guidance does not discuss these priorities or align how any improvement projects would ensure targets under all eight R&M targets will be met. In our prior work on weapon system acquisitions, we have identified a number of best practices for improving program outcomes if implemented, such as clearly establishing well-defined requirements and securing stable funding that matches resources to requirements. We found that the program office has not prioritized or dedicated funding in its budget to improve R&M, in part because program officials explained that they were focused on initiatives intended to lower the cost of the aircraft. In addition, any current funding for R&M improvement projects comes from the program’s operation and maintenance funds, which are only available for one fiscal year. Officials explained that, if the funding runs out or is used by the program for other efforts, then R&M projects will go unfunded or be suspended until new funding is available. In fiscal year 2018, for example, while some projects were completed, several other projects were suspended when that year’s funding ran out. As of December 2018, according to a contractor representative, all of the identified improvement projects currently unfunded in the program’s RMIP would cost about $30 million to implement, but were not funded. Program officials also stated that they are in the process of revising the RMIP and have considered including more specific objectives in addition to improving aircraft availability and mission capability, such as more focus on improving R&M performance where ORD R&M targets are not currently being met. According to the program, any revisions to the RMIP and changes to how it will be funded, however, will not be complete until April 2019. By not defining objectives in its RMIP guidance for meeting all eight R&M metrics, aligning which improvement projects will ensure those metrics are met, and prioritizing funding for those projects, the program is at risk of not fully meeting its R&M targets. As a result, the warfighter may accept aircraft that are less reliable than originally planned, and whose operation and sustainment costs may raise affordability questions. In addition, the military services recently identified the need to cut sustainment costs—by 43 percent in the case of the Air Force—to improve the F-35’s affordability in sustainment. Increasing costs from less reliable aircraft will add strain to an already unaffordable program. To address these issues, in April 2019, we recommended to DOD that it should ensure that the F-35 program office 1. assess whether the ORD R&M targets are still feasible and revise the 2. as it revises its RMIP, identify specific and measurable R&M objectives in its RMIP guidance; 3. as it revises its RMIP, identify and document which RMIP projects will achieve the identified objectives of the RMIP guidance; and 4. prioritize funding for the RMIP. DOD concurred with these recommendations and stated that it will take actions to address them. We have previously reported on the F-35 program’s rising estimated sustainment costs and challenges maintaining an expanding fleet. In October 2017, we reported that estimated F-35 life-cycle sustainment costs increased by 24 percent from fiscal years 2012 through 2016 due to an increase in projected flying hours and other factors. We also reported that sustainment costs were not fully transparent to the military services. For example, the Marine Corps received an initial funding requirement for fiscal year 2017 sustainment of $293 million, which then increased to $364 million in the execution without a full explanation from the program office. We recommended that DOD take steps to improve communication with the services and provide more information about how F-35 sustainment costs they are being charged relate to the capabilities received. DOD concurred with the recommendation and has begun taking actions to address it. In addition, DOD faces substantial supply chain challenges that are lowering F-35 aircraft performance. In April 2019, we reported that F-35 aircraft performance was falling short of warfighter requirements—that is, aircraft could not perform as many missions or fly as often as required. Specifically, F-35A aircraft were mission capable only 52 percent of the time from May through November 2018—far short of the 80 percent target set by the former Secretary of Defense. This lower-than-desired aircraft performance is due largely to F-35 spare parts shortages and limited part repair capabilities. For example, during this time period, F-35 aircraft were unable to fly about 30 percent of the time due to spare parts shortages. Additionally, DOD’s capabilities to repair F-35 spare parts at its depots are years behind schedule, which has resulted in an average of 188 days to repair an F-35 part and a backlog of about 4,300 spare parts awaiting repair at military depots or manufacturers. We also reported that DOD faces challenges managing, moving and maintaining accountability of F- 35 parts within the supply chain. We made eight recommendations to DOD, including that DOD determine what actions are needed to close the gap between warfighter requirements for aircraft performance and F-35 supply chain capabilities. DOD concurred with the recommendations and identified actions that it was taking or planned in response. Finally, the F-35’s Autonomic Logistics Information System (ALIS) has the potential to lead to increased costs for the program if key issues are not addressed. ALIS is the F-35’s central logistics system intended to support operations, mission planning, supply-chain management, maintenance, and other processes. In April 2016, we identified several risks, including that ALIS (1) was not initially designed to be deployable, (2) lacked redundant infrastructure, (3) did not communicate well with legacy aircraft systems, (4) had data accuracy and accessibility issues, and (5) had security risks. In addition, DOD had not included certain analyses and information, such as historical cost data, to increase the credibility and accuracy of ALIS’s estimated costs. Further, a 2013 DOD-commissioned study found that schedule slippage and functionality problems with ALIS could lead to between $20 billion and $100 billion in additional costs. We have made several recommendations to DOD to improve ALIS planning and cost estimates, and to develop a performance measurement process for ALIS to better address problems based on actual system performance and user requirements. DOD generally concurred with our recommendations and has taken some actions, including developing a plan that identifies and prioritizes key ALIS risks. However, more work remains. We are currently conducting a review examining DOD’s progress in implementing our ALIS-related recommendations, addressing concerns from ALIS users, identifying emergent financial and operational risks associated with ALIS, taking near-term actions to improve ALIS functionality, and assessing DOD’s actions regarding the long-term viability of ALIS to ensure capable sustainment of the F-35 fleet. We plan to issue a report based on our current work later in 2019. Based on our ongoing work, ABMS is early in the acquisition process, as the specific capabilities and overarching acquisition strategy are still to be determined by the Air Force. As a result, the Air Force has not yet established a cost and technical baseline for ABMS. When ABMS planning began in 2017, program officials stated that the intent of the program was to replace and modernize the capabilities of the AWACS system—which provides the warfighter with the capability to detect, identify, and track airborne and maritime threats. But changes in Air Force expectations for how it would fight during future conflicts led the department to assess options for developing a more robust and survivable air, land, and sea battle management system that can operate in contested environments. In July 2018, the ABMS Initial Capabilities Document—which describes capability needs and associated gaps—was approved by the DOD Joint Requirements Oversight Council. Our ongoing work also found that, in December 2018, the Air Force determined it would not continue its planned JSTARS Recapitalization program—which was intended to provide surveillance and information on moving ground targets—well into the future, as initially expected. As a result of a recent study, the Air Force has extended the estimated service life of the JSTARS fleet, and will incorporate its capabilities into the ABMS in the short term, and retire JSTARS in the 2030s. Our preliminary observations indicate that the details about ABMS are still to be determined. The Air Force expects to fully define ABMS through an Analysis of Alternatives (AOA) that it plans to complete by the summer of 2019, as shown in figure 2. The ABMS AOA, led by the Air Force’s Air Combat Command, will assess how ABMS will deliver air-centric capabilities, such as those currently provided by AWACS. Air Force officials explained that they plan to utilize an existing AOA completed for the JSTARS Recapitalization program, approved in May 2012, to identify and assess ABMS’s potential ground target tracking capabilities. Originally planned as a 9-month study, Air Force officials stated that the ABMS AOA was shortened to a 6-month effort. As a result, the Air Force received conditional approval to reduce the number of alternatives studied from five to three. Our ongoing work indicates that the Air Force plans to develop ABMS over three phases. The first phase began in fiscal year 2018 and goes through 2023. In this phase, the Air Force plans to integrate existing sensors, improve battle management systems, and upgrade communication networks across 10 existing acquisition programs. Table 2 includes information on three existing programs the Air Force plans to enhance during the first phase of ABMS. According to an Air Force acquisition official, the technologies associated with the first phase are considered to be mature but there may be risks as the Air Force integrates technologies. Air Force officials explained that their approaches to the second and third phases of ABMS are not fully developed, but noted that the phases would be informed by the AOA results. That said, the Air Force expects to start phase 2 in 2024 by integrating advanced sensors and software into its existing battle management command and control platforms while at the same time retiring JSTARS. Air Force officials have reported that the third phase, planned for the mid-2030s, is expected to provide multi-sensor, resilient battle management command and control capability using multiple types of communications methods, with an initial operational capability planned for 2035. The Air Force estimates that ABMS’s acquisition cost through fiscal year 2024 will be $3.8 billion. Because ABMS is composed of many different defense acquisition programs, the Air Force intends to manage it as a family of systems directed by a Chief Architect and not a traditional acquisition program manager. According to the Air Force, the ABMS Chief Architect is the first of its kind, and the Air Force believes the position will be instrumental in integrating the various programs and technologies into an overall system. Based on our preliminary analysis, the roles and responsibilities of the Chief Architect have not been fully defined. However, according to the Air Force, the Chief Architect is expected to be responsible for (1) leading a high-level analysis and determining the overall design of ABMS, (2) coordinating with the service-level commands and the acquisition programs involved to make sure they are aligned with the ABMS development, and (3) identifying the enabling technologies for integration into ABMS. Chairman Norcross, Ranking Member Hartzler, and members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have. We look forward to continuing to work with the Congress as we to continue to monitor and report on the progress of the F-35 program and the ABMS. If you or your staff have any questions about this testimony, please contact Michael J. Sullivan at (202) 512-4841 or sullivanm@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this statement are Justin Jaynes (Assistant Director), Diana Maurer, Jennifer Baker, Desirée E. Cunningham, Alissa Czyz, Stephanie Gustafson, Kasea Hamar, Jeff Hubbard, Jessica Karnis, Matt Metz, Robin Wilson, and Lauren Wright. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In 2018, the F-35 program began operational testing. Also in 2018, the Air Force continued planning for the acquisition of ABMS, intended to modernize how DOD maintains command and control over and manages the future battlefield. Both the F-35 and ABMS are expected to play key roles in DOD's modernization efforts. This testimony statement discusses (1) the F-35 program's development and modernization efforts, and progress in improving the aircraft's R&M and (2) DOD's current planning efforts for ABMS. This statement is based on two GAO reports on the F-35 published in April 2019 and on GAO's ongoing work examining ABMS. To conduct this work, GAO analyzed DOD management reports; discussed the efforts with program and contractor officials; and compared both efforts to DOD policy and GAO acquisition best practices. The Department of Defense (DOD) wrapped up the F-35 development program in April 2018 and expects to complete operational testing in December 2019. DOD has turned its attention to modernization efforts—referred to as Block 4—to add new capabilities to address evolving threats. The program office estimates Block 4 to cost at least $10.5 billion through 2024. DOD plans to start Block 4 development without a complete business case identifying baseline cost and schedule estimates. Key documents for establishing a business case, such as an independent cost estimate, will not be ready before the program plans to award Block 4 development contracts in May 2019 (see figure). Without a business case—consistent with acquisition best practices—program officials cannot be confident that the risk of committing to development has been reduced adequately prior to planned contract awards. The program made slow, sustained progress in improving the F-35's reliability and maintainability (R&M). F-35 aircraft are assessed against eight R&M metrics, which inform how much time the aircraft will be in maintenance rather than operations. Half of these metrics are not meeting targets. While the program office has a plan for improving R&M, its guidance is not in line with GAO's acquisition best practices or internal control standards as it does not include specific, measurable objectives, align improvement projects to meet those objectives, and prioritize funding to match resources to R&M requirements. If the R&M requirements are not met, the warfighter will have to settle for a less reliable and more costly aircraft than originally planned. This contributes to the F-35's $1.12 trillion estimated sustainment costs and challenges with maintaining an expanding fleet that also has supply chain and logistics system problems. GAO's ongoing work indicates that the Air Force's Advanced Battle Management System (ABMS)—intended to provide battle management command and control and surveillance across air, land, and sea—is in the early stages of planning. The capabilities and the strategy to deliver those capabilities are still to be determined. The Air Force plans to manage ABMS as a family of systems, integrating sensors from existing and future weapons programs, and overseen by a Chief Architect—whose role is still to be determined. The Air Force expects to further define ABMS after analyzing different options for delivering the capability. That analysis is expected to be complete in summer 2019. In April 2019, GAO recommended that the F-35 program office complete its Block 4 business case before making more contract awards. DOD did not concur, citing that it has adequate knowledge to begin Block 4 development. GAO maintains that completing its business case before awarding its Block 4 development contracts would put DOD and the program in a better position to successfully develop Block 4 capabilities. GAO also recommended that DOD take action to improve its R&M performance. DOD concurred and noted the actions it would take.", "document_type": "gao"}
{"report": "A skilled acquisition workforce is vital to maintaining military readiness, increasing the department’s buying power, and achieving substantial long-term savings through activities such as systems engineering and contract administration. As of September 2018, DOD’s civilian acquisition workforce was comprised of about 157,000 civilian personnel (see figure 1). About 60 percent of DOD’s civilian acquisition workforce personnel held positions in 3 of 14 acquisition career fields: engineering, contracting, and life cycle logistics (see table 1). We have previously found that DOD has faced various challenges in growing and sustaining its acquisition workforce, including challenges with hiring, recruiting, and retaining personnel. In December 2015, we found that over the past 20 years, DOD has significantly reduced and then subsequently increased the size of its acquisition workforce. During the 1990s, as defense budgets decreased, DOD reduced the size of its military and civilian acquisition workforce, and by the early 2000s it began relying more heavily on contractors to perform many acquisition support functions. According to DOD, between 1998 and 2008, the number of military and civilian personnel performing acquisition activities decreased 14 percent, from about 146,000 to about 126,000 personnel. Due to concerns about skill gaps within the workforce and growing reliance on contractors, the Secretary of Defense announced his intention in 2009 to rebalance the workforce mix. In 2010, DOD issued an acquisition workforce plan that specified DOD would add 20,000 military and civilian personnel to its acquisition workforce by fiscal year 2015. DOD subsequently increased the size of its military and civilian acquisition workforce by 21 percent between 2008 and 2015 to about 153,000 personnel, but did not accomplish growth goals set for certain priority career fields, such as engineering and contracting. DOD officials stated that the shortfalls were largely the result of high attrition rates, difficulty hiring qualified personnel, and budget constraints. In May 2018, we found that DOD’s Science and Technology Reinvention Laboratories (defense laboratories), which include acquisition workforce personnel, experienced challenges with delays with security clearances and human resource processing of personnel actions, which contributed to a lengthy hiring process. We also found that the delays made it difficult for defense laboratories to hire highly qualified candidates. Similarly, in June 2018, the Section 809 Panel identified DOD’s cumbersome hiring process as a challenge for shaping its acquisition workforce. The Section 809 Panel emphasized that these challenges undermine DOD’s ability to successfully recruit top candidates into the acquisition workforce. Most recently, in March 2019, we reported that DOD had not developed metrics to track progress associated with shaping the future acquisition workforce, such as workforce targets as a whole or by specific career fields. For example, we reported that DOD issued an updated acquisition workforce strategic plan in October 2016 which, among other things, assessed its current capacity and capability, and identified risks that DOD needed to manage to meet future needs. In addition, in September 2017, DOD issued a workforce rationalization plan. However, neither the October 2016 strategic plan nor the September 2017 workforce rationalization plan established specific size targets. We noted that without such metrics, DOD would not be able to demonstrate that its strategic workforce planning efforts and associated initiatives were successful, despite increasing the size of its acquisition workforce beyond its earlier target. DOD’s challenges with hiring civilian acquisition workforce personnel are not unique within the federal government. The traditional method of hiring for the federal government, also known as the competitive examining process, has been characterized by federal agencies as rigid and lacking in flexibility. The traditional hiring method generally requires agencies to, among other things, notify the public that the government will accept job applications for a position, screen applications against minimum qualification standards, apply selection priorities such as veterans’ preference, and assess applicants’ relative competencies or knowledge, skills, and abilities against job-related criteria to identify the most qualified applicants. In 2008, OPM established a roadmap for the traditional hiring method, including an 80-day time-to-hire goal (see figure 2). To address some of the human capital challenges federal agencies face, statutes have provided hiring, recruitment, and retention flexibilities that provide agencies with tools to help manage their workforces. Legislation has also provided hiring flexibilities exclusively to DOD for specified purposes, including hiring acquisition workforce personnel. Hiring flexibilities can help the government fill critical skills gaps or achieve certain public policy goals, such as employing veterans. As of September 2018, we identified 46 hiring flexibilities that DOD could use to hire civilian acquisition workforce personnel, including the following. DOD Direct Hire Authorities. These authorities help expedite the hiring process by allowing DOD to hire candidates without regard to certain provisions in Title 5, such as veterans’ preference and applicant rating and ranking. According to DOD officials, using direct hire authorities can reduce the time to hire personnel by nearly half as compared to the traditional hiring method. We identified 14 DOD direct hire authorities in effect as of fiscal year 2018 that DOD could use to hire civilian acquisition workforce personnel. For example, the “expedited hiring authority for certain defense acquisition workforce positions” (expedited hiring authority for acquisition positions) permits the Secretary of Defense to determine that a shortage of candidates or a critical hiring need exists for certain acquisition workforce positions, and to recruit and appoint qualified persons directly to those positions. For the purposes of the expedited hiring authority, in December 2015, the Secretary of Defense had designated 12 of the 14 acquisition career fields as critical or understaffed, including the engineering, contracting, and life cycle logistics career fields. DOD Civilian Acquisition Workforce Personnel Demonstration Project (AcqDemo) Hiring Authorities. According to HCI officials, about 19 percent of DOD’s civilian acquisition workforce personnel participate in the AcqDemo performance management system, an alternative to the General Schedule pay system. Hiring managers under AcqDemo may use AcqDemo-specific hiring flexibilities, such as direct hire appointments for the business and technical management professional career path, in addition to hiring flexibilities available DOD-wide. Veterans-Related Hiring Authorities. These authorities allow agencies to hire certain veterans without regard to certain provisions in Title 5. For example, agencies may appoint eligible veterans under the Veterans’ Recruitment Appointment authority without competition under limited circumstances or otherwise through excepted service hiring procedures. Pathways Programs. These programs promote employment opportunities in the federal government for students and recent graduates through an exception to the competitive hiring rules for certain positions in the federal workforce. Appendix I provides additional information on the hiring flexibilities that were available to DOD’s civilian acquisition workforce as of September 2018. Sections of Title 5 outline recruitment and retention flexibilities that agencies can offer to prospective and current employees to help recruit and retain highly qualified personnel. Like other federal agencies, DOD can use these incentives to recruit and retain civilian personnel, including those in the acquisition workforce. Recruitment bonuses may be paid to a newly hired federal employee if the agency determines that the position would be difficult to fill in the absence of a bonus. Relocation bonuses may be paid to a current employee who must relocate for a position in a different geographic area if the agency determines that the position would be difficult to fill in the absence of a bonus. Retention bonuses may be paid to a current employee if the agency determines that the unusually high or unique qualifications of the employee or a special need of the agency for the employee’s services makes it essential to retain the employee who would likely leave federal service in the absence of such a bonus. Student loan repayments may be paid on behalf of a job candidate or a current employee to recruit or retain highly qualified personnel. The employees must sign a service agreement of at least 3 years with the agency that pays the loans. Federal agencies may pay up to $10,000 per employee per calendar year, totaling no more than $60,000 for any one employee. DOD can fund the four monetary incentives with the Defense Acquisition Workforce Development Fund (DAWDF)—a dedicated funding source for the recruitment, training, and retention of DOD’s acquisition personnel— as well as other sources, such as operations and maintenance appropriations. Appendix II provides additional information on the recruitment and retention flexibilities available to DOD’s civilian acquisition workforce as of September 2018. Several offices within DOD play key roles in managing how the department uses hiring, recruitment, and retention flexibilities for the civilian acquisition workforce. For example, HCI oversees department- wide acquisition workforce strategic planning; DCPAS develops implementation guidance on how DOD flexibilities should be used; and civilian personnel centers track the extent to which flexibilities are used (see table 2). From fiscal year 2014 to 2018, DOD increased its use of hiring, recruitment, and retention flexibilities for its civilian acquisition workforce. During this period, DOD used hiring flexibilities for 90 percent of its approximately 44,000 civilian acquisition workforce hiring actions. This high usage rate came as USD (A&S), USD (P&R), and the military departments’ leadership encouraged their hiring managers and human resource specialists to use the hiring flexibilities to help reduce the length of the hiring process. Additionally, during this period, DOD’s human resource specialists issued guidance that helped address confusion about the requirements governing the hiring authorities. Currently, USD (P&R) is leading a DOD-wide effort to consolidate direct hire authorities in an attempt to simplify their application. During this 5-year period, DOD also increased its use of recruitment and retention flexibilities for the civilian acquisition workforce, increasing the dollar amount authorized for these flexibilities from $13.9 million in fiscal year 2014 to $33.7 million in fiscal year 2018. This increase came as DOD leadership emphasized the benefits of recruitment and retention flexibilities and oversaw concerted efforts to increase their usage through the dissemination of information to human resource specialists. We found that DOD used hiring flexibilities for about 90 percent of DOD’s approximately 44,000 civilian acquisition workforce hiring actions between fiscal years 2014 and 2018. Further, DOD increased its use of these flexibilities, which include direct hire authorities, from 80 percent in fiscal year 2014 to 95 percent in fiscal year 2018 (see figure 3). From fiscal year 2014 to 2018, DOD used the expedited hiring authority for acquisition positions more than any other direct hire authority for its civilian acquisition workforce. Congress enacted this authority in fiscal year 2009 and in fiscal year 2010, amended the authority to, among other things, allow hiring of all qualified applicants instead of only highly qualified applicants. Additionally, in November 2015, legislation eliminated the expedited hiring authority’s expiration date and made the authority permanent. Command officials told us that they used this authority often because it does not have as many requirements as other direct hire authorities and because of their familiarity with it. Nine of the 14 DOD direct hire authorities identified were not available for use until fiscal year 2017 because they were enacted after that year or DOD had not yet implemented the authority, either through memorandums or federal register notices (see table 3). Since 2015, USD (A&S), USD (P&R), and leadership of the military departments have encouraged the use of hiring flexibilities—particularly direct hire authorities—over the traditional method. From July 2015 to November 2017, USD (A&S) and USD (P&R) convened five joint acquisition and human resource summits to provide a recurring forum for discussing leading practices in sustaining the acquisition workforce, including the improved use of hiring flexibilities. In October 2016, USD (A&S) issued its current acquisition workforce strategic plan for DOD and used this document to encourage implementation of direct hire authorities as appropriate. In November 2017, senior leadership in the USD (P&R) office issued a Federal Register Notice that updated and consolidated AcqDemo’s rules and guidance, including introducing additional AcqDemo hiring flexibilities (see appendix I, table 8 for additional information on these flexibilities). In 2018, the Secretary of the Navy, the Assistant Secretary of the Army for Manpower and Reserve Affairs, and the Assistant Secretary of the Air Force for Manpower and Reserve Affairs each issued memorandums to their respective departments stating that the use of direct hire authorities be considered first in the hiring process, as appropriate. These memorandums note that direct hire authorities provide significant advantages in timeliness compared to the traditional hiring process, and encourage maximum use of direct hire authorities to the extent appropriate. In addition to DOD leadership emphasis, command officials credited DCPAS and the military departments’ civilian personnel centers for taking actions to help DOD increase its use of direct hire authorities. These officials explained that confusion among hiring managers and human resource specialists over the numerous requirements that apply to each direct hire authority constituted one of the main challenges that had previously limited DOD’s use of direct hire authorities. To illustrate the potential for confusion, table 4 presents some of the direct hire authority requirements a hiring manager would have to consider under two different hiring authorities. To help address the confusion stemming from the direct hire authorities’ numerous requirements, in 2017 and 2018, DCPAS and the personnel centers consolidated information on the available direct hire authorities and the requirements that govern each of them into concise and comprehensive guidance documents. As a result, command-level and personnel center officials told us that human resource specialists can now quickly find and compare available direct hire authorities to determine what may work best for their hiring needs. We found that the military departments’ use of certain direct hire authorities was limited by the amount of time it took DOD leadership to implement some of the authorities. DCPAS officials told us that although Congress enacts direct hire authorities in legislation, DOD human resource personnel and hiring managers do not use the authorities until DOD and the components issue implementing guidance. We found that DOD implemented the 14 DOD direct hire authorities anywhere from 2 to 42 months after an authority’s enactment (see figure 4). In May 2018, we reported on the 30-month lapse between the enactment of the science, technology, engineering, and mathematics direct hire authority for students at the defense laboratories and DOD’s issuance of corresponding implementation guidance. Defense laboratory officials told us it took longer than anticipated to publish the federal register notice that allowed the laboratories to use the hiring authority, and they attributed the delays to coordination issues among relevant offices during the approval process. In December 2018, we found that the defense laboratories hired significantly fewer students than authorized because of the delays. To address the delays, in May 2018, we recommended that DOD establish and document time frames for its coordination process to help ensure the timely implementation of defense laboratory hiring authorities in the future. DOD concurred with our recommendation and identified actions the department plans to take to improve oversight and coordination of the defense laboratories’ hiring efforts. DOD acquisition workforce and human resource officials told us that they also did not use certain direct hire authorities as much from fiscal years 2014 to 2018 because the requirements associated with them made them harder to use. For example, according to DOD guidance documents we reviewed, most of the DOD direct hire authorities applicable to the civilian acquisition workforce have expiration dates or limits on the number of hires. Table 5 provides examples of requirements governing direct hire authorities that officials identified as making the authorities more difficult to use. Going forward, HCI and DCPAS officials told us that USD (P&R) is leading a DOD-wide effort to advise Congress on which direct hire authorities could be consolidated and which requirements could be eliminated. For example, HCI officials said that USD (P&R) recently provided Congress input on consolidating four cybersecurity-related authorities into one authority. DCPAS officials also told us they previously provided input to Congress on certain challenges hiring managers experienced in using some of the direct hire authorities. According to command officials, DCPAS recommended that Congress raise the limits on the number of personnel that could be hired under the defense laboratory direct hire authorities. We found that DOD increased its use of recruitment and retention flexibilities from fiscal year 2014 to fiscal year 2018. We also examined two other issues related to recruitment and retention—post-employment restrictions on military personnel and authorities to remove civilian acquisition workforce employees for unacceptable performance. DOD officials did not identify either issue as a major challenge for managing the civilian acquisition workforce. We found that DOD increased its use of recruitment bonuses, relocation bonuses, retention bonuses, and student loan repayments from $13.9 million in fiscal year 2014 to $33.7 million in fiscal year 2018 (see figure 5). As part of the increased total amount of funds authorized for recruitment and retention flexibilities, DOD had increased the number of awarded recruitment and retention flexibilities by approximately 140 percent between fiscal years 2014 to 2018 (see table 6). DOD leadership has emphasized the benefits of recruitment and retention flexibilities, which helped increase their use. For example, in DOD’s October 2016 acquisition workforce strategic plan, USD (A&S) stated that the acquisition workforce would increase the use of these flexibilities by leveraging DAWDF. Additionally, in November 2016, USD (A&S) and USD (P&R) held a joint acquisition and human resource summit, which highlighted efforts of an integrated product team established to expand the use recruitment and retention flexibilities. For example, the integrated product team developed a fact sheet to answer frequently asked questions about incentives from human resource specialists and hiring managers within the military departments. Officials from the commands and DACMs generally agreed that recruitment and retention flexibilities were useful tools in helping them recruit and retain acquisition workforce talent. To receive these monetary incentives, employees must enter into written service agreements to remain with the department for a specific period. DACM and defense agency officials, however, noted that retention bonuses were the least effective of the monetary recruitment and retention flexibilities. For example, Defense Contract Management Agency and Air Force officials told us they do not use retention bonuses as widely because they do not view them as effective tools in retaining talent. Defense Contract Management Agency officials explained that most of the personnel who leave their agency for other jobs go to other DOD organizations or federal agencies, and retention bonuses are generally used only for employees who are likely to leave federal service. The Air Force DACM’s representatives told us the Air Force decreased its use of DAWDF for retention bonuses as a result of a 2016 RAND Corporation study that found that private sector companies made minimal use of retention bonuses. According to this study, none of the 21 companies in RAND’s sample—among Fortune’s “100 best companies to work for”—identified retention bonuses as a primary tool to retain talent. Lastly, command and personnel center officials we interviewed also noted that a number of factors outside of monetary recruitment and retention flexibilities influence an employee’s decision to join or remain with DOD. These factors include the organization’s mission and work-life programs and policies. DOD military personnel are subject to certain post-employment restrictions that could potentially dissuade them from seeking further employment with the department as civilian personnel, but DACM and command officials told us these restrictions have not significantly affected their ability to recruit new hires. For example, the “180-day rule” prevents DOD from appointing retired military personnel to civil service positions within 180 days of the military person’s retirement unless the appointment, which must be in the competitive service, is authorized by the Secretary of Defense or a designee, OPM approves the appointment, and the minimum rate of basic pay has been increased. DACM and command officials noted that retired military personnel could elect to work for private sector companies during the 180-day period. However, these officials did not cite post-employment restrictions as a major recruitment challenge for the civilian acquisition workforce and instead cited other challenges, such as limited resources dedicated to recruiting civilian personnel and hiring delays due to the security clearance process. DOD does not have specific statutory authority in Title 10, U.S. Code for removing civilian acquisition workforce personnel for unacceptable performance. However, DOD’s civilian employees are subject to a longer probationary period than other civilian federal employees, and DACM and command officials told us that removing underperforming staff is easier during a probationary period than when staff are permanently employed. Officials also noted that staff tend to leave on their own accord if they are not performing well within the department. DOD does not regularly monitor its use of hiring, recruitment, and retention flexibilities for its civilian acquisition workforce, and despite ongoing efforts, is not yet able to systematically assess the effectiveness of these flexibilities. HCI, the office responsible for DOD-wide acquisition workforce strategic planning, regularly monitors the overall health of the acquisition workforce, in part by reviewing and reporting statistics on workforce size, workforce gains and losses, and other workforce-related metrics on a quarterly basis. Further, as previously noted, DOD has increased its overall use of human capital flexibilities. However, HCI does not regularly monitor the military departments and defense components’ specific use of hiring, recruitment, and retention flexibilities. As a result, HCI is missing opportunities to identify variations in usage rates, and use that information to determine whether there are specific issues or challenges being encountered. For example, we found that the Air Force and Navy used direct hire authorities twice as often as the Army in fiscal year 2018. Further, while DOD leadership has emphasized that using hiring flexibilities improves DOD’s ability to recruit and hire high-quality talent in a timely manner, HCI is not yet able to assess how effective the hiring flexibilities have been in achieving these goals. This is because DCPAS has not yet developed a plan to consistently measure how long it takes to hire new personnel across the department. Similarly, DCPAS has not yet established metrics to assess the quality of the new personnel DOD hires. DCPAS has efforts underway to address these issues and plans to start using these metrics in 2019. DOD policy states HCI should implement strategies and policies to help attract and retain acquisition workforce personnel. To this end, HCI officials told us they monitor the overall health of the acquisition workforce in various ways, including outreach to the DACMs on workforce challenges, as well as holding knowledge-sharing events, such as a May 2018 acquisition workforce human capital symposium. Additionally, HCI reviews and reports statistics on workforce size, workforce gains and losses, and other workforce-related metrics on a quarterly basis. For example, in its fiscal year 2019 first quarter assessment, HCI reported data on the current size of the acquisition workforce; acquisition workforce education and certification levels; and workforce gains, losses, retirement eligibility and attrition rates, among other things, both on a DOD-wide basis as well as by acquisition career field. HCI officials told us they use these data to identify potential or emerging workforce challenges. HCI officials noted that if they identify any issues, they further analyze data to identify the root cause of the issues. HCI officials acknowledged, however, that HCI does not regularly collect or review data on the defense components’ specific use of hiring, recruitment, and retention flexibilities as part of its quarterly assessments. HCI officials stated that they collect and review hiring flexibilities data on an as-needed basis, such as in preparation for DOD acquisition workforce governance forums, including senior steering board and workforce management group meetings, in which the use of the flexibilities will be on the agenda, or in response to Congressional requests. HCI officials also noted that because the use of hiring, recruitment, and retention flexibilities are made at the command level within the military departments, the military departments are better positioned to regularly monitor usage. However, the military departments are not in a position to identify variations in usage rates across DOD’s civilian acquisition workforce, which are significant. For example, we found that the Air Force and the Navy used direct hire authorities for 85 percent and 84 percent of their respective hiring actions in fiscal year 2018, while the Army used direct hire authorities for 42 percent of its hiring actions that year. Similarly, some career fields use the hiring flexibilities at higher rates than others. While hiring flexibilities comprised 95 percent of total civilian acquisition workforce hiring actions in fiscal year 2018, the auditing and purchasing career fields used hiring flexibilities for only 68 percent and 62 percent of their respective hiring actions that year. Without regularly monitoring usage rates for hiring flexibilities across the civilian acquisition workforce, HCI lacks visibility into these types of variations and opportunities to investigate and address them, as appropriate. Lastly, HCI focuses its efforts on those recruitment and retention flexibilities funded by DAWDF because HCI is responsible for DAWDF’s management. Based on DAWDF reports and DCPDS data, we found that the amount of dollars obligated for DAWDF-funded recruitment, retention, and recognition initiatives in 2017 was $15 million or about two-thirds of the total dollars authorized for the recruitment and retention flexibilities for DOD’s civilian acquisition workforce in fiscal year 2017. The remaining amount (about one-third) was funded by other sources, such as the military departments’ operations and maintenance appropriations, but is not included as part of HCI’s annual review. Since 2002, we have repeatedly found that agencies should strategically manage their use of human capital flexibilities—including hiring, recruitment, and retention flexibilities—to address human capital challenges. Additionally, federal internal control standards state that an agency’s management should obtain relevant data on a timely basis to effectively monitor activities to achieve objectives. Based on these standards, in May 2018, we recommended that DOD’s defense laboratories routinely monitor data on its use of hiring authorities. DOD concurred with our recommendation and planned to determine the appropriate data to be collected and establish routine reporting requirements. Because HCI is not regularly reviewing hiring flexibility usage, it may be similarly missing opportunities to help identify challenges, inconsistencies, or needed improvements in using the flexibilities. DOD leaders have repeatedly emphasized that hiring flexibilities— particularly direct hire authorities—can help the department hire high- quality talent in a more timely manner. We have previously found that time-to-hire and quality-of-hire are useful metrics that help agencies evaluate their hiring efforts, which can include the use of hiring flexibilities. To this end, DCPAS collects and reports time-to-hire data to measure DOD’s progress in improving hiring practices. For example, according to DCPAS, from fiscal year 2016 through 2018, DOD took an average of 127 days to hire civilian personnel under the traditional hiring method compared to an average of 110 days when using DOD direct hire authorities. DCPAS also noted variations in time-to-hire across the direct hire authorities, reporting that DOD took anywhere from 77 to 111 days to hire civilian personnel using the 14 DOD direct hire authorities applicable to the civilian acquisition workforce. For the expedited hiring authority for acquisition positions—the direct hire authority used most frequently to hire civilian acquisition workforce personnel—DCPAS reported an average time-to-hire of 106 days from fiscal year 2016 through 2018. While these time-to-hire metrics could be helpful in determining which direct hire authorities most effectively expedite the hiring process, HCI officials told us they do not use these metrics to inform management decisions for the civilian acquisition workforce because they are not yet consistently measured. DCPAS officials explained that the military departments and their major commands developed their own approaches for inputting and reporting time-to-hire data based on their individual needs and data systems. HCI and DCPAS officials acknowledged that this resulted in different ways to record and track the data, which in turn prevented meaningful comparisons between the time-to-hire metrics produced by each of the components. According to HCI and DCPAS officials, this difference, in part, is attributable to the variation in how DOD personnel input certain data. For example, one human resource specialist may initiate a request for a personnel action—which is generally the starting date for time-to-hire metrics—on the day the hiring manager submits a job description, while another human resource specialist may initiate a request for personnel action after the job announcement has been posted publicly. Moreover, our analysis of DCPAS data for all DOD civilian personnel hires from fiscal year 2014 to 2018 shows that about 36,000 of 420,000 personnel actions, or about 9 percent, were initiated on or after the individuals’ start dates, producing a zero or negative time-to-hire figure. DCPAS officials told us they omit these figures when they report time-to-hire metrics. Until time-to-hire metrics are consistently measured DOD-wide, HCI will not be able to use this data to assess which direct hire authorities have most effectively expedited the hiring process, which DOD components have been the most successful in using these authorities, or identify potential issues in using these authorities. In September 2018, to address inconsistent time-to-hire methodologies across DOD, we recommended that the DOD Chief Management Officer require that all DOD human resource providers adopt consistent time-to- hire measures. DOD concurred with our recommendation, and in June 2019, DCPAS officials told us they were in the process of developing a plan to implement consistent time-to-hire metrics across the department. DCPAS officials anticipate completing the plan by July 2019 and will start implementation after DOD leadership approves this plan. HCI officials told us that they plan to use the time-to-hire metrics to assess the civilian acquisition workforce’s hiring efforts, including the use of flexibilities, when the metrics are comparable. Similarly, HCI officials told us that they cannot systematically assess quality-of-hire across the civilian acquisition workforce because DCPAS has not developed guidance that outlines how quality-of-hire should be measured. DOD’s June 2018 civilian human capital operating plan outlines an initiative to improve the quality of civilian hires, among other things. As part of this initiative, DCPAS is to establish quality-of-hire metrics using data collected from an OPM hiring satisfaction survey tool. Using the OPM survey, DOD’s hiring managers are to rate the performance of new employees 6 months after they are hired. DCPAS officials stated that various DOD components have used the survey since 2011, but acknowledged hiring managers completed the survey for only 1 percent of all DOD hires in fiscal year 2018. In March 2019, USD (P&R) leadership issued a memorandum to DOD human capital offices encouraging wider implementation of the survey, including outlining roles and responsibilities and milestones for implementation. Starting in fiscal year 2020, USD (P&R) plans to set quality-of-hire goals using the fiscal year 2019 survey results and incorporating these into future civilian human capital operating plans. HCI officials told us that they plan to use the quality-of-hire metrics to evaluate the civilian acquisition workforce’s hiring efforts, including the use of flexibilities, once DCPAS completes its efforts. Congress has provided DOD with a number of hiring, recruitment, and retention flexibilities to help the department manage its acquisition workforce. DOD leadership has encouraged the use of these flexibilities across the department in recent years, and usage has increased significantly since 2014. However, HCI does not regularly monitor defense components’ use of hiring, recruitment, and retention flexibilities for their civilian acquisition workforce to identify challenges, inconsistencies, or needed improvements in using these tools. As a result, HCI may be missing opportunities to develop strategies or inform efforts aimed at improving the usage of these flexibilities. The Secretary of Defense should ensure that the Director of Human Capital Initiatives regularly monitors usage of hiring, recruitment, and retention flexibilities for the civilian acquisition workforce—across the military departments and acquisition career fields—to help develop strategies or inform efforts aimed at improving the usage of these flexibilities. (Recommendation 1) We provided a draft of this report to DOD for review and comment. DOD provided written comments, which are reprinted in appendix VII, and concurred with our recommendation. In concurring with our recommendation, DOD stated it would provide guidance to DOD components to monitor usage of flexibilities and provide the results to HCI at least annually. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; the Secretaries of the Army, the Air Force, and the Navy; the Under Secretary of Defense for Acquisition and Sustainment; the Under Secretary of Defense for Personnel and Readiness; the Director of the Defense Civilian Personnel Advisory Service, and the Director of Human Capital Initiatives. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. Sections of Title 5 of the U.S. Code include, among other things, requirements that agencies must follow to hire personnel, such as those associated with the competitive examining hiring authority. Competitive examining has been the traditional method of hiring for the federal government since 1978. The traditional hiring method requires agencies to notify the public that the government will accept applications for a job; screen applications against minimum qualification standards; apply selection priorities such as veterans’ preference, where applicable; and assess applicants’ relative competencies or knowledge, skills, and abilities against job-related criteria to identify the most qualified applicants. Hiring flexibilities were established beyond the traditional hiring method to expedite the hiring process and achieve certain public policy goals. We identified 46 hiring flexibilities available to the Department of Defense’s (DOD) civilian acquisition workforce as of September 2018—3 specific to the DOD acquisition workforce; 6 specific to DOD’s Civilian Acquisition Workforce Personnel Demonstration Project; 20 available DOD-wide, including its acquisition workforce; and 17 available government-wide. Further, of the 46 hiring flexibilities, 14 are DOD direct hire authorities provided in statute that we have identified as being directly applicable to the DOD civilian acquisition workforce—3 of which are specific to the DOD acquisition workforce and 11 of which are available DOD-wide. Tables 7 through 10 provide additional information on each of the 46 hiring flexibilities and denote the 14 DOD direct hire authorities and their legal authorities. Recruitment and retention flexibilities assist federal agencies in attracting and retaining employees who possess unusually high or unique qualifications, or who fill essential needs for the agencies. Additionally, they allow agencies more control over compensation and are intended to help government compete with the private sector. We identified nine recruitment and retention flexibilities available to the Department of Defense’s (DOD) civilian acquisition workforce as of fiscal year 2018— four monetary incentives and five work-life balance policies and programs (see tables 11 and 12). Section 843 of the National Defense Authorization Act for Fiscal Year 2018 included a provision for us to review and report on the effectiveness of hiring and retention flexibilities for the Department of Defense’s (DOD) acquisition workforce, with a focus on its civilian acquisition workforce, including (a) the extent to which DOD experiences challenges with recruitment and retention of the acquisition workforce, such as post-employment restrictions; (b) a description of the hiring and retention flexibilities available to DOD to fill civilian acquisition positions and the extent to which DOD has used the flexibilities available to it to target critical or understaffed career fields; (c) the extent to which DOD has the necessary data and metrics on its use of hiring and retention flexibilities for the civilian acquisition workforce to strategically manage the use of such flexibilities; (d) an identification of the factors that affect the use of hiring and retention flexibilities for the civilian acquisition workforce; (e) recommendations for any necessary changes to the hiring and retention flexibilities available to DOD to fill civilian acquisition positions; and (f) a description of the flexibilities available to DOD to remove underperforming members of the acquisition workforce and the extent to which any such flexibilities are used. This report: (1) provides information on DOD’s use of available hiring, recruitment, and retention flexibilities for its civilian acquisition workforce personnel from fiscal years 2014 to 2018; and (2) determines the extent to which DOD has monitored and assessed its use of hiring, recruitment, and retention flexibilities for its civilian acquisition workforce. In doing so, the report addresses elements (a) through (f) identified above. To examine DOD’s use of available hiring, recruitment, and retention flexibilities for its civilian acquisition workforce personnel from fiscal years 2014 to 2018, we reviewed relevant statutes, reports, and DOD policies and guidance to identify hiring, recruitment, and retention flexibilities available to DOD’s civilian acquisition workforce. Based on our review, we identified the following hiring authorities: competitive examination, which we refer to as “the traditional hiring method,” and 46 alternatives to the traditional hiring method, which we refer to as “hiring flexibilities” for the purposes of our review. Appendix I provides additional information on these 46 hiring flexibilities. We also identified four monetary incentives and five work-life balance programs that DOD can use to recruit and retain civilian acquisition workforce personnel. We scoped our analysis to the four monetary incentives DOD can use to recruit and retain civilian acquisition workforce personnel—(1) recruitment bonuses, (2) retention bonuses, (3) relocation bonuses, and (4) student loan repayments—and collectively refer to these four incentives as “recruitment and retention flexibilities” for the purposes of our review. We focused our review on the four government-wide monetary flexibilities with personnel data in the Defense Civilian Personnel Data System (DCPDS), DOD’s central repository for civilian personnel transactions data, and required for submission to the Defense Manpower Data Center. Appendix II provides additional information on these four recruitment and retention flexibilities. We also analyzed personnel data from DCPDS. We obtained DCPDS data on hiring actions from the Office of the Under Secretary of Defense (USD) for Personnel and Readiness (P&R) – Defense Manpower Data Center. We obtained DCPDS data on dollars authorized for recruitment and retention flexibilities from USD (P&R) – Defense Civilian Personnel Advisory Service (DCPAS). We also obtained acquisition workforce data for fiscal years 2014 through 2018 from DOD’s DataMart, a central repository of acquisition workforce data, from the Defense Manpower Data Center. We analyzed the DataMart data to determine which DOD civilian personnel were in DOD’s acquisition workforce at the end of each fiscal year, the military department or organization in which these personnel worked, and the career fields in which these personnel held positions. For our analysis of hiring flexibilities, we included all hiring actions for the DOD civilian acquisition workforce with effective dates from fiscal year 2014 through 2018, except for actions with legal authority codes designated as transfers. We did not include hiring actions designated as transfers because they include hiring actions between military departments as well as transfers from outside of DOD. We excluded all of these transfer hiring actions because the data did not include enough information for us to distinguish between internal and external transfers. We identified 44,291 hiring actions for this 5-year period, and used the legal authority code data fields for each hiring action to determine the type of hiring authority or flexibility that DOD used. We analyzed DOD’s usage of hiring flexibilities from fiscal years 2014 through 2018 across each of DOD’s 14 acquisition career fields and the military departments. Of the hiring flexibilities, we focused our analysis on DOD direct hire authorities because they comprised the single largest category of hiring authorities used by the DOD civilian acquisition workforce for hiring actions from fiscal year 2014 through 2018—26,385 of 44,291 DOD hiring actions or 60 percent. DCPDS, however, did not include enough information for us to determine which specific direct hire authority DOD used for each hiring action. For these actions, the human resource specialists manually entered the details of the specific type of DOD direct hire authority they used in DCPDS. To determine the type of DOD direct hire authority used, two analysts independently reviewed each description and identified the appropriate DOD direct hire authority. For 360 of the 26,385 the hiring actions (or 1.4 percent), the descriptions did not contain enough information for us to determine the specific DOD direct hire authority used. For the purposes of our analysis, we established three categories of hiring actions based on the DOD’s designations in DCPDS (see table 13). For our analysis of recruitment and retention flexibilities, we included all actions authorizing recruitment bonuses, retention bonuses, relocation bonuses, and student loan repayments for the DOD civilian acquisition workforce from fiscal year 2014 through 2018. We identified 13,643 authorization actions. We used the award amount data field for each authorization action to determine the amount of dollars authorized for these four types of incentives. We analyzed DOD’s usage of the recruitment and retention flexibilities from fiscal years 2014 through 2018 across each of DOD’s 14 acquisition career fields. We assessed data reliability by electronically testing these data, reviewing relevant data standards and guidance, and interviewing DCPAS and Defense Manpower Data Center officials. We determined that the data were sufficiently reliable for the purposes of reporting the frequency with which DOD’s civilian acquisition workforce used hiring, recruitment, and retention flexibilities for fiscal years 2014 through 2018. We also identified factors that affected DOD’s use of hiring, recruitment, and retention flexibilities for its civilian acquisition workforce by reviewing DCPAS and military departments’ policies and guidance for using human capital flexibilities, including implementation of 14 DOD direct hire authorities provided in statute, and efforts by DCPAS to improve DOD’s use of the flexibilities. To determine the extent to which DOD has monitored and assessed its use of hiring, recruitment, and retention flexibilities for its civilian acquisition workforce, we reviewed acquisition workforce human capital plans from the Office of Human Capital Initiatives (HCI) within USD for Acquisition and Sustainment (A&S); acquisition workforce plans from the Air Force, the Army, and the Navy; and data and metrics collected by HCI and DOD’s four Directors for Acquisition Career Management (DACM)— one for each of the military departments and a fourth for the defense agencies and field activities outside the military departments. We assessed DOD’s efforts against our key practices for effectively managing human resource flexibilities and federal internal control standards, including that management should use quality information to achieve the entity’s objectives. We also reviewed reports by the Advisory Panel on Streamlining and Codifying Acquisition Regulations—commonly referred to as the Section 809 Panel after the legislative provision that required the Secretary of Defense to establish an advisory panel on streamlining acquisition regulations—and interviewed Section 809 Panel commissioners to supplement our analysis. For both objectives, we interviewed officials from HCI, the office responsible for DOD-wide acquisition workforce DCPAS, the office responsible for developing DOD’s civilian human resources policies and programs; the Defense Manpower Data Center, the office responsible for collecting and maintaining DOD’s civilian personnel data; the Directors for Acquisition Career Management (DACM) for each military department and the Fourth Estate, which is responsible for the 30 defense agencies and field activities outside the military departments; the Air Force Personnel Center; Army’s Civilian Human Resources Agency; Navy’s Office of Civilian Human Resources; and the command within each military department that had the largest number of civilian acquisition workforce personnel in fiscal year 2018: Air Force Materiel Command, Army Combat Capabilities Development Command, and Naval Sea Systems Command. We also interviewed officials from the Defense Contract Management Agency, which had the largest number of civilian acquisition personnel of the other defense agencies with acquisition workforce personnel. Collectively, these four organizations comprised about 38 percent of DOD’s civilian acquisition workforce in fiscal year 2018. We also interviewed personnel from the Office of Personnel Management (OPM), which is responsible for developing and promulgating government-wide human capital policies; and personnel from the Society for Human Resource Management, the world’s largest human resources membership group, who were familiar with metrics used by the private sector to monitor hiring and retention efforts. We conducted this performance audit from August 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Section 843 of the National Defense Authorization Act for Fiscal Year 2018 included, among other things, a provision for us to review the extent to which the Department of Defense (DOD) has used hiring flexibilities available to it to target critical or understaffed career fields. In its December 2015 memo on using the expedited hiring authority for certain defense acquisition workforce positions, DOD designated 12 of the 14 acquisition workforce career fields as shortage or critical needs categories. We identified 44,291 DOD hiring actions from fiscal year 2014 to 2018 for the civilian acquisition workforce, and categorized them as (1) traditional hiring method actions, (2) actions using DOD direct hire authorities, or (3) other hiring flexibilities (see appendix I for additional information on these hiring flexibilities, including DOD direct hire authorities). We further categorized the hiring actions by DOD’s 14 acquisition workforce career fields and ordered the career fields by total number of hiring actions in fiscal year 2018. Figures 6, 7, 8, and 9 provide data on the use of hiring flexibilities for each of the 14 acquisition workforce career fields. We identified 44,291 Department of Defense (DOD) hiring actions from fiscal year 2014 to 2018 for the civilian acquisition workforce, and categorized them as (1) traditional hiring method actions, (2) actions using DOD direct hire authorities, or (3) other hiring flexibilities (see appendix I for additional information on these hiring flexibilities, including DOD direct hire authorities). We further categorized the hiring actions by military departments and defense agencies. Figure 10 provides data on the use of hiring flexibilities for each of the military departments and the Fourth Estate, which is responsible for the 30 defense agencies and field activities outside the military departments. Section 843 of the National Defense Authorization Act for Fiscal Year 2018 included, among other things, a provision for us to review the extent to which the Department of Defense (DOD) has used retention flexibilities available to it to target critical or understaffed career fields. In its December 2015 memo on using the expedited hiring authority for certain defense acquisition workforce positions, DOD designated 12 of the 14 acquisition workforce career fields as shortage or critical needs categories. We identified $123.9 million authorized in recruitment and retention flexibilities for DOD’s civilian acquisition workforce from fiscal year 2014 to 2018, and categorized them as (1) recruitment bonuses, (2) relocation bonuses, (3) retention bonuses, and (4) student loan repayments (see appendix II for additional information on these recruitment and retention flexibilities). We further categorized the recruitment and retention flexibilities by DOD’s 14 acquisition workforce career fields and ordered the career fields by total dollars authorized by DOD. See figures 11 through 14 below. In addition to the contact named above, Nathan Tranquilli (Assistant Director), Claire Li (Analyst-in-Charge), TyAnn Lee, and Ashley Rawson made key contributions to this report. Lorraine Ettaro, Christopher Falcone, Lori Fields, Cynthia Grant, Laura Greifner, and Sylvia Schatz also contributed to this report.", "summary": "DOD spends over $300 billion annually on contracts for products and services such as major weapons systems and military support services. By awarding and overseeing these contracts, DOD's acquisition workforce plays a critical role in maximizing DOD's buying power. DOD has increased the size of its acquisition workforce in recent years, but has also faced a number of challenges hiring and retaining personnel. DOD has a number of human capital flexibilities that help DOD in hiring, recruiting, and retaining its civilian acquisition workforce. The National Defense Authorization Act for Fiscal Year 2018 included a provision for GAO to review DOD's implementation of human capital flexibilities for its acquisition workforce. This report: (1) provides information on DOD's use of human capital flexibilities and (2) determines the extent to which DOD has monitored and assessed its use of these flexibilities. GAO reviewed relevant statutes, and DOD policies, guidance, and acquisition workforce plans; analyzed DOD's fiscal year 2014-2018 civilian acquisition workforce personnel data; and interviewed DOD officials. The Department of Defense (DOD) has used human capital flexibilities extensively to hire, recruit, and retain its civilian acquisition workforce. Since 2014, usage rates for hiring flexibilities—alternatives to the traditional, competitive hiring process—have generally increased. DOD leadership has encouraged its hiring personnel to use these flexibilities, such as direct hire authorities, to reduce the length of the hiring process. From fiscal year 2014 to 2018, DOD used hiring flexibilities for 90 percent of its approximately 44,000 civilian acquisition workforce hiring actions (see figure). DOD also increased its use of recruitment and retention flexibilities for its civilian acquisition workforce, increasing the dollar amount authorized from $13.9 million in fiscal year 2014 to $33.7 million in fiscal year 2018. This increase came as DOD leadership emphasized the benefits of these flexibilities, and oversaw concerted efforts to increase their usage through the dissemination of information to human resource specialists. While usage of human capital flexibilities has increased, DOD's Office of Human Capital Initiatives (HCI), which is responsible for DOD-wide acquisition workforce strategic planning, does not regularly monitor or assess how the department uses these flexibilities. HCI regularly monitors the overall health of the acquisition workforce, including by reviewing workforce metrics on a quarterly basis, but does not regularly monitor the military departments' use of human capital flexibilities. For example, GAO found the Air Force and Navy used direct hire authorities twice as often as the Army in fiscal year 2018. Without efforts to gain such insights through monitoring, HCI may be missing opportunities to identify challenges, inconsistencies, or needed improvements in using these tools. With regard to assessing the use of human capital flexibilities, HCI intends to study how long it takes to hire personnel when using the flexibilities. According to DOD officials, this analysis can begin following development of a plan to ensure that defense components consistently collect data on hiring timeframes. DOD officials said they expect to issue this plan in 2019. GAO recommends that HCI regularly monitors DOD's use of human capital flexibilities for its civilian acquisition workforce to help identify challenges, inconsistencies, or needed improvements in using these tools. DOD concurred with the recommendation.", "document_type": "gao"}
{"report": "Depots are government-owned, government-operated industrial installations that maintain, overhaul, and repair a multitude of complex military weapons systems and equipment for DOD. The military services operate 17 depots that perform depot-level maintenance on a wide range of vehicles and other military equipment, including aircraft, engines, combat vehicles, ships, and software. Of those, the Air Force operates three Air Logistics Complexes and the Navy operates three Fleet Readiness Centers for aviation depot maintenance (see figure 1). For the purposes of this report, we will be referring to them as Air Force and Navy aviation depots. The Air Force’s and Navy’s aviation depots operate through the Air Force and Navy working capital funds. Depot customers are charged for the anticipated full cost of goods and services. Over the past decade, we have audited the services’ working capital funds activities related to carryover, new orders, and revenue that can affect depot maintenance timeliness. For more information on the services’ working capital funds depot maintenance activities, see appendix II. The depots are part of a larger, DOD-wide logistics enterprise that involves a number of different organizations, which are identified in figure 2 and described below. Assistant Secretary of Defense for Sustainment. This official serves as the principal assistant and advisor to the Under Secretary of Defense for Acquisition and Sustainment on materiel readiness. Among other responsibilities, the Assistant Secretary of Defense for Sustainment prescribes policies and procedures on maintenance, materiel readiness and sustainment support. DOD officials report that the Office of the Deputy Assistant Secretary of Defense for Materiel Readiness is responsible for maintenance policy along with the development of a strategic vision for DOD’s organic depot base. Also, the Air Force and Navy each has its own logistics or materiel command component, which provides day-to-day management and oversight of the services’ depots. Air Force Materiel Command. This command develops, acquires, and sustains weapon systems and their components, providing acquisition and life-cycle management services and logistics support, among other things. The Air Force Life Cycle Management Center within Air Force Materiel Command is responsible for the life-cycle management of weapon systems from inception to retirement, with a specific program office managing each type of aircraft. Air Force Materiel Command works with the program offices to develop, review, validate and prioritize aircraft depot maintenance workload requirements and associated funding. Naval Air Systems Command. This command is responsible for providing life-cycle support of aircraft, weapons, and systems for the Navy and Marine Corps including, acquisition, repair and modification, and in- service engineering and logistics support. As with the Air Force, a specific program office manages each type of aircraft. According to Navy officials, Naval Air Systems Command (NAVAIR), and Commander, Fleet Readiness Centers (COMFRC) work with the program offices to plan and approve the maintenance depot work executed at the Navy aviation depots, including obtaining fixed-wing aircraft workload requirements and associated funding. The 36 Air Force and Navy fixed-wing aircraft types we selected for our review ranged from fighters to bombers. These aircraft completed a total of 4,513 depot maintenance events in fiscal years 2014 through 2019. See figure 3 for more information. For the selected aircraft in our review, the Air Force completed depot maintenance on time or earlier an average of 82 percent of the time during fiscal years 2014 through 2019. However, the Navy completed depot maintenance on time or early in the same period an average of 52 percent of the time. We found that a range of factors, such as unexpected repairs and aircraft operating beyond their designed service life, have affected Air Force and Navy depot maintenance timeliness for fixed-wing aircraft. Our analysis of aggregate depot maintenance data regarding fiscal years 2014 through 2019 shows that: Air Force aviation depots completed depot maintenance of the selected fixed-wing aircraft on time or early in 5 of 6 fiscal years. The annual average percentages for on-time or early-completion maintenance ranged from 78 to 90 percent. In total, selected Air Force fixed-wing aircraft have spent 22,572 fewer days in maintenance than expected since fiscal year 2014. Navy aviation depots were late in completing depot maintenance of the selected fixed-wing aircraft for each of the 6 fiscal years. The annual average percentages for on-time or early-completion maintenance ranged from 45 to 63 percent. In total, the maintenance for selected Navy fixed-wing aircraft has taken over 62,000 more days than expected since fiscal year 2014. Figure 4 shows the percentage of depot maintenance completed on time or early, as well as total days of maintenance delays, if applicable, for the Air Force and Navy. Analyzing the maintenance timeliness data on a per aircraft basis shows similar trends. The Air Force completed depot maintenance on average about 7 days early per aircraft during fiscal years 2014 through 2019, while the Navy completed depot maintenance on average nearly 55 days late per aircraft (see figure 5). In comparing depot maintenance timeliness for specific aircraft types, we found that timeliness varied for both Air Force and Navy aircraft. For example, Air Force aviation depots completed individual KC-135 aircraft maintenance an average of about 28 days earlier than projected and completed F-15E aircraft maintenance an average of almost 35 days later than projected. Navy aviation depots completed individual EA-6B aircraft maintenance an average of about 1 day earlier than projected and completed F/A-18A-D aircraft maintenance on average about 137 days later than projected. Figure 6 shows the average number of days—by aircraft type—that the Air Force and Navy aviation depots completed maintenance earlier or later than projected in fiscal years 2014 through 2019. Our prior work has identified multiple factors that contribute to depot maintenance delays, including the size and skill of the depot workforce, the condition of weapon systems upon arrival at the depot, the availability of spare parts, and the condition of the depot’s facilities and equipment, among others. In addition, all of these factors can be affected by funding and operational considerations (such as unexpected accidents). DOD officials have stated that disruptions to funding, to include continuing resolutions, also affect the ability to conduct depot maintenance. Over the course of this review, Air Force and Navy officials cited many of these factors as continuing to affect depot maintenance timeliness while offering specific details on issues contributing to the trends we identified above. Air Force’s perspectives on early and late completions: Air Force officials stated a variety of reasons for completing aircraft maintenance earlier than projected, including frequent communication between program offices and depot stakeholders. For example, Air Force Sustainment Center officials told us that they conduct weekly aircraft performance review meetings with commanders and senior staff to provide a comprehensive status update on aircraft maintenance performance that has occurred since the previous meeting. In addition, on the KC-135 depot production line, Air Force officials told us they document tasks that can be done concurrently during a specific phase in the maintenance process, which has helped them meet their timeliness targets. Air Force officials from across the sustainment enterprise agreed that proactive planning for depot maintenance requirements helps the depots provide the appropriate resources to perform aircraft maintenance. Officials cited unexpected repairs or shortage of skilled depot maintainers as reasons for later-than-projected completion of maintenance on an aircraft. Navy’s perspectives on late completions: Navy officials stated various reasons for completing aircraft maintenance later than projected, including growth in the scope of needed work after the aircraft was evaluated (e.g., finding damage that required tailored engineering instructions), a diminishing supply of manufactured parts for aircraft, and aircraft operating well beyond their designed service life—such as the F/A-18A-D fighters and C-2A cargo aircraft. In addition to operating F/A- 18A-Ds longer than originally planned, Navy officials stated that they also had to manage aircraft production delays related to the F-35, which was scheduled to replace the F/A-18A-Ds. Navy officials explained that they have implemented a variety of strategies to improve on-time maintenance. These initiatives primarily focus on mitigating or reducing maintenance delays in the year of execution. For example: Naval Sustainment System initiative: The Navy implemented this initiative at the beginning of fiscal year 2019, which led to the service implementing private industry best practices and employing new strategies such as “swarming,” which refers to many artisans being put to work on a particular aircraft to expedite completion. The initial focus of these strategies was on the F/A-18E-F. During a site visit to Fleet Readiness Center Southwest, officials showed us how the initiative prompted reconfiguration of workstations—clearing storage and material areas in the hangar and creating direct line of vision for maintainers—to maximize an artisan’s time spent on an aircraft. Tracking depots efficiency: Officials are using a new software program that enables real-time tracking of the progress of aircraft maintenance, which they told us has led to improved efficiency because it provides increased visibility into aircraft with delays. For example, officials stated over the past 2 years, they have decreased the number of aircraft undergoing maintenance from 390 in 2017 to about 270 across the aviation depots. The Air Force has largely accurately planned for aviation depot maintenance requirements for selected fixed-wing aircraft during fiscal years 2014 through 2019, but the Navy has not. Both services have initiatives underway to improve planning for aviation depot maintenance; however, we identified several planning challenges that the Navy has not fully addressed, such as not effectively using historical data to establish accurate planning targets for aircraft depot maintenance packages. Our analysis of Air Force planned maintenance workload data—estimates of the number of days planned for depot maintenance made 3 years in advance—found that the Air Force largely accurately planned for aviation depot maintenance requirements for selected aircraft for fiscal years 2014 through 2019. The difference between the number of days the Air Force planned in advance that it would need for maintenance and actually needed has been small and trending downward, from 12 percent in fiscal year 2014 to 3 percent in fiscal years 2018 and 2019 (see figure 7). Our analysis shows that, for the 6 fiscal years we reviewed, the Air Force slightly underestimated the amount of time it needed to complete fixed- wing aircraft maintenance by an average of about 6 days per aircraft. To accurately plan for aviation depot maintenance, Air Force Materiel Command officials told us they had implemented three key initiatives including: Conducting early inspections: Air Force officials stated that they have been conducting pre-inspections of selected aircraft a year before scheduled maintenance to check for unplanned maintenance needs, and to ensure the availability of parts. Officials stated that the early inspections can clarify the scope of work and avoid extended delays in completing maintenance. For example, the Air Force has been conducting pre-inspections of its KC-135—an aerial refueling aircraft—by sending Boeing engineers to pre-inspect a sample of KC- 135s that are scheduled for depot maintenance in the following year. The inspections can inform parts orders with long-lead times and initiate developing procedures to resolve any new repairs identified during inspections, Air Force officials stated. Developing and implementing a new metric: To help measure the effectiveness of planning, Air Force officials stated that in 2017 Air Force Materiel Command created a new metric—the Planned Obligations Weighted for Execution Review—comparing which customer orders were planned for funding versus which ones actually received funding. According to Air Force officials, the metric provides visual information to leaders of the degree of variance between the planned and actual aircraft that come into the depots for maintenance. Air Force Materiel Command officials stated that the metric has helped them identify factors affecting the differences between planned and actual aircraft entering the depots for maintenance and to adjust resources when needed to address the workload. Reviewing planning performance and making adjustments: Air Force Materiel Command annually conducts a two-phased planning process to establish the organic Air Force depot-level resources necessary to support the projected funded maintenance requirements for the next 2 fiscal years. Later, the Air Force conducts an after-action review of the performance of the planning process. In addition, command leadership, senior staff, and other members of the aviation depot community hold weekly performance review meetings and make necessary adjustments. This includes reviewing visual information such as standardized charts and graphs that provide the current status of aircraft undergoing depot maintenance, as well as any issues they are monitoring. Our analysis of Navy-planned maintenance workload data—estimates of the number of days planned for depot maintenance made 3 years in advance—found that the Navy generally has not accurately planned for aviation depot maintenance requirements for selected fixed-wing aircraft for fiscal years 2014 through 2019. We found a trend of underestimating actual days needed for aircraft maintenance. The difference between the number of days the Navy planned in advance it would need for maintenance and the number actually needed ranged from a low of 3 percent in fiscal year 2014 to a high of 69 percent in fiscal year 2018. However, we found the difference declined to 42 percent in fiscal year 2019. Figure 8 shows the difference between planned and actual work days for selected Navy fixed-wing aircraft in fiscal years 2014 through 2019. Our analysis, for the 6 fiscal years that we reviewed, showed that the Navy underestimated the amount of time it needed to complete fixed-wing aircraft maintenance by an average of about 55 days per aircraft. The Navy has acknowledged that it has not accurately planned for depot maintenance requirements. The Navy conducted risk assessments and internal control assessments in 2018 and 2019 and found material weaknesses, such as a trend of underestimating time needed to address aviation depot maintenance requirements. Specifically, the two risk and internal control assessments stated that Navy policies for defining, costing, and executing maintenance did not allow them to correctly predict cost estimates and duration of depot maintenance. In addition, the Navy’s 2019 risk and internal control assessment highlighted the need to improve planning accuracy; the report stated that internal reviews found workload standards did not accurately capture the required maintenance and that planned maintenance requirements exceeded depot capacity. Navy officials stated that they implemented an initiative in fiscal year 2020 to improve maintenance requirements called Performance to Plan. This initiative is focused on incorporating data collection and analysis to, among other things, improve forecasts of maintenance period durations according to Navy documentation. For example, the approach of Performance to Plan is to incorporate predictive data into planning to improve forecasts of maintenance period durations, according to the same documentation. While this initiative is a positive step, it is still in the early stages of implementation and we identified three reasons that have in part led to inaccurate planning that the Navy has not fully addressed. The Navy measures depot performance using turnaround time as one of the key timeliness metrics. Turnaround time is the overall duration of the maintenance cycle, from when the aircraft is inducted into the depot to when it is provided back to the squadron. According to Navy officials, the Navy reviews historical data to support the maintenance requirements planning process in various ways, including adjusting turnaround time based on historical depot performance. However, we found that the Navy has not effectively used historical data to analyze turnaround time—total days planned for depot maintenance periods—and to update maintenance requirements planning for selected fixed-wing aircraft. Specifically, our analysis of average turnaround time for selected aircraft depot maintenance packages shows that the Navy has not adjusted maintenance planning effectively to account for the actual days needed to perform maintenance. Figure 9 shows that the Navy kept planned turnaround time the same or with minimal changes for maintenance packages for the C-2A, the F/A-18A-D, and the F/A-18E-F, despite worsening trends in maintenance execution during fiscal years 2014 through 2019. C-2A: In fiscal years 2016 through 2019, the Navy did not adjust its planned turnaround time—270 days—while the average number of actual work days to complete maintenance increased from 451 days in fiscal year 2016 to a high of 722 days in fiscal year 2018. Further, the difference between the average planned turnaround time and the average actual number of days needed to complete maintenance increased from 181 days in fiscal year 2016 to 352 days in fiscal year 2019, and peaked at 452 days in fiscal year 2018. F/A-18A-D: In fiscal years 2014 through 2019, the Navy adjusted its planned turnaround time by a total of 82 days, while the average number of actual work days to complete maintenance increased from 148 days in fiscal year 2014 to 694 days in fiscal year 2019, and peaked to 857 days in fiscal year 2018. In addition, the difference between the average planned turnaround time and the average actual number of days needed to complete maintenance increased from 52 days in fiscal year 2014 to 412 days in fiscal year 2019, and peaked at 629 days in fiscal year 2018. F/A-18E-F: In fiscal years 2014 through 2019, the Navy adjusted its planned turnaround time by a total of 28 days, while the average number of actual work days to complete maintenance increased from 51 days in fiscal year 2014 to 92 days in fiscal year 2019. In addition, the difference between the average planned turnaround time and the average actual number of days needed to complete maintenance increased from 10 days in fiscal year 2014 to 23 days in fiscal year 2019, and peaked at 59 days in fiscal year 2016. Naval Air Systems Command Workload Standards Required for the Aircraft and Engine Programs at the Fleet Readiness Centers states that COMFRC should analyze and review naval aviation proposed workload standard packages and compare to actual production and historical data. It also states that the workload standard development process, which includes the estimation and development of turnaround time—is to provide a basis for the identification of resource requirements at the naval aviation depot, such as personnel skills mix and materials, and as a budgetary justification of workload for the repair of aircraft. In addition, the Navy 2014-2019 Depot Maintenance Strategic Plan states that NAVAIR and COMFRC will identify and sustain requisite core maintenance capabilities through a planning process that effectively estimates and monitors near and long-term workload. Navy officials explained that they have worked to incorporate historical data into their maintenance requirements planning process; however, they acknowledged that planning needs to improve and they are in the process of revising how COMFRC and NAVAIR determines planned turnaround time. For example, COMFRC and F/A-18 program office officials said as part of the Naval Sustainment System initiative, COMFRC is moving toward a 60-day fixed turnaround time on some F/A-18E-F depot maintenance packages in an effort to drive depot maintenance efficiency and, ultimately, improve aircraft mission capability rates. According to officials, they plan to apply a fixed turnaround time across all aircraft. As the Navy moves forward, it must ensure that it effectively uses historical data to analyze turnaround time and establish accurate turnaround time targets for fixed-wing aircraft depot maintenance packages. If it does not do so, the Navy will likely continue to underestimate the number of days required to perform depot maintenance and misalign the resources and funding needed at the depots to perform aircraft maintenance, which in part contributes to persistent maintenance delays that reduce the time aircraft are available for operations and training. We found that Navy depot maintenance planners do not have direct visibility into fixed-wing aircraft maintenance that is performed outside the Navy aviation depots by an operational unit or at an intermediate maintenance facility—information critical to planning for the condition and depot maintenance needs of individual aircraft. Navy officials said that data exists on maintenance conducted on an aircraft outside the Navy aviation depots—by an operational unit or at an intermediate maintenance facility—and on the condition of an aircraft while deployed with squadrons. However, depot planners do not have direct visibility over squadron-level information because the Navy has not provided depot planners regular reporting on fixed-wing aircraft maintenance performed outside the aviation depots. Instead, depot planners can access that data only through a request to the squadron and typically rely on general planning factors rather than aircraft-specific data when estimating maintenance needs. According to Navy officials, the lack of direct visibility into the condition and maintenance history of an aircraft has driven maintenance delays in the past. For example, COMFRC and F/A-18 program office officials said that high turnaround time on certain F/A-18A-Ds undergoing maintenance was due to extended squadron usage on the aircraft combined with a lack of logistics support to address these issues. Furthermore, for aircraft damage that was outside of the depot’s repair capabilities, long lead times on parts procurement and extensive engineering analysis resulted in aircraft being placed in delay for extended periods of time, sometimes years, according to the officials. Figure 10 shows an F/A-18 undergoing depot maintenance at a Navy aviation depot. In other cases, high usage by squadrons can cause unexpected corrosion on many types of fixed-wing aircraft that depots have not prepared to address. For example, Office of the Chief of Naval Operations officials said that some aircraft have panels that are taken off during depot maintenance events. If depot maintainers find unexpected corrosion behind a panel, it may require additional time to repair that aircraft, resulting in an increase in the turnaround time. In addition, a COMFRC official stated an AV-8B arrived at an aviation depot without the engine installed, which prevents full operational checks being performed during disassembly. Once maintenance was completed, the aircraft went through operational checks and officials found canopy seal issues, which could have been identified if the depot had received data from the intermediate-level maintenance facility. The Navy 2014-2019 Depot Maintenance Strategic Plan states that NAVAIR and COMFRC will identify and sustain the necessary capabilities to perform maintenance through a planning process that effectively estimates and monitors near and long-term workload. Navy officials said direct visibility into data on the current condition and maintenance history of an aircraft at the squadron level better prepares COMFRC and NAVAIR to more accurately plan aircraft depot maintenance. This has been corroborated by Naval Sustainment System initiative findings that revealed that the Navy should be better informed about the condition of aircraft in order to improve their maintenance requirements planning. However, depot planners do not have direct visibility over squadron-level information because the Navy has not provided depot planners regular reporting on fixed-wing aircraft maintenance performed outside the aviation depots. Without regular reporting on fixed-wing aircraft maintenance performed outside the Navy aviation depots by an operational unit or at an intermediate maintenance facility, depot planners cannot plan for the condition and depot maintenance needs of individual aircraft, which in part contributes to persistent maintenance delays that reduce the time aircraft are available for operations and training. We found that the Navy does not have formal processes and related guidance for communication and coordination between depot stakeholders to inform maintenance requirements planning. Navy officials explained that depot maintenance stakeholders communicate in a variety of ways to inform maintenance requirements planning. For example, the Navy conducts annual and mid-year workload planning meetings. At the annual workload planning meeting, COMFRC and aircraft program leads provide plans to meet aircraft workload requirements for the current year and the next 2 fiscal years. The mid-year review provides an update on the current year’s performance and the final workload plan for the next 2 fiscal years, according to Navy documentation. Various aircraft program office leads attend both the annual and mid-year planning meetings to provide an update on workload plans—among others—to COMFRC. Navy officials stated that they also informally communicate in a variety of ways to inform maintenance requirements planning. For example, depot maintenance engineers may find extra corrosion on an aircraft, and use those findings to update maintenance plans for other individual aircraft. While these meetings provide opportunities for collaboration and officials utilize other means to informally communicate, NAVAIR and COMFRC do not have formal processes and related guidance for communication and coordination between depot stakeholders to ensure they receive input from all key subject-matter experts regarding workload planning. Navy officials noted that not having formal processes and related guidance presents several challenges including: Navy officials said that there is no formal process or guidance for communication and coordination, and that the process instead involves a series of documents that COMFRC receives that are assembled to create a representation of future workload from the Commander, Naval Air Forces and from each of the aircraft program offices, among others. A COMFRC official said that different stakeholders manage various parts of workload planning and without guidance on specific documentation needs and process owners, it is challenging for the Navy to identify accountable stakeholders and discuss specific planning needs. NAVAIR officials said workload planners hold periodic meetings, but attendance by subject-matter experts is not mandatory. For example, subject-matter experts from the Fleet Support Teams—officials who provide engineering and logistics technical support to fleet and aviation depot maintenance organizations—are not required to attend workload planning meetings. Experts may potentially attend via video teleconference, but others, due to time zone differences, may not participate. As a result, workload planning meetings may not consistently include workload input from all relevant subject-matter experts. Navy officials said that once the Naval Sustainment System initiative began focusing on improving depot maintenance on the F/A-18E-F, deficiencies in the workload planning process became more apparent. They noted the challenges of coordinating key stakeholders along the maintenance planning timeline and its impact on planning and budgeting. In particular, Navy officials stated the current depot maintenance planning-time horizon was disconnected from long- range planning, such as the Program Objective Memorandum process. For example, due to a misalignment in the planning and budgeting processes, COMFRC reacts to the outcome of the Program Memorandum Objective process rather than influencing it, which results in many adjustments to their productions plans, such as improper staffing, material management, and facility-usage plans. NAVAIR Instruction 5221.1B, Workload Acceptance states that commanders will establish internal competency guidelines for communication and coordination of workload-related issues. In addition, the Navy 2014-2019 Depot Maintenance Strategic Plan, states the Navy will forge a strong liaison between maintenance activities and the acquisition community to ensure that maintenance requirements and planning are in sync. As a result of the Naval Sustainment System initiative, Navy officials said that COMFRC is developing a new workload planning process to become more proactive in depot maintenance planning and increase information exchanges. This includes ensuring that the new process involves all key depot maintenance stakeholders, such as COMFRC officials, program managers, and fleet officials. For example, NAVAIR officials said that most of the Fleet Support Team scheduled maintenance leads will be the primary point of contact to assist COMFRC with developing the future maintenance requirements planning and will be invited and asked to attend workload planning meetings. If they are unable to attend, they will then ask to have a program office representative attend in their place. However, Navy officials acknowledged that their efforts are still in the developmental stages and that the Navy needs formal processes and related guidance for communication and coordination between depot stakeholders to inform maintenance requirements planning. Without these in place, the Navy cannot be assured that all subject-matter expert input is proactively solicited and incorporated into depot workload planning, which in part can contribute to persistent maintenance delays that reduce the time aircraft are available for operations and training. The ability of the Air Force and Navy aviation depots to complete maintenance on time directly affects military readiness. Poor planning for depot maintenance contributes to longer delays and reduced unit readiness. The Air Force has generally accurately planned for aviation depot maintenance over the last 6 years and in turn has completed the vast majority of its depot maintenance on time or early over this timeframe. In contrast, the Navy has not accurately planned for aviation depot maintenance over the last 6 years and in turn has completed only half of its depot maintenance on time over this timeframe, which has adversely affected aircraft availability. While the Navy has implemented an initiative to improve maintenance planning, the Navy has not effectively used historical data to analyze turnaround time and establish accurate planning targets for aircraft maintenance packages. In addition, Navy depot planners do not have visibility into aircraft maintenance that is performed outside the depots by an operational unit or other maintenance facility—information critical to planning for the condition and depot maintenance needs of individual aircraft. The Navy also has not established formal processes and related guidance for communication and coordination between depot stakeholders to ensure they receive input from all key subject-matter experts to inform maintenance planning. Without addressing these challenges, the Navy cannot appropriately plan for depot maintenance workload and may continue to experience maintenance delays that reduce the availability of aircraft for operations and training. We are making three recommendations to the Department of Navy. The Secretary of the Navy should ensure that Naval Air Systems Command and Commander, Fleet Readiness Centers effectively use historical data to analyze turnaround time and establish accurate turnaround time targets for fixed-wing aircraft depot maintenance packages. (Recommendation 1) The Secretary of the Navy should ensure that Commander, Naval Air Forces and Commander, Naval Air Force, Pacific provide depot planners regular reporting on fixed-wing aircraft maintenance performed outside the Navy aviation depots by an operational unit or at an intermediate maintenance facility to ensure they have information on the current condition and depot maintenance needs of individual aircraft. (Recommendation 2) The Secretary of the Navy should ensure that Naval Air Systems Command and Commander, Fleet Readiness Centers establish formal processes and related guidance for communication and coordination between depot stakeholders to inform maintenance requirements planning. (Recommendation 3) We provided a draft of this report to DOD for review and comment. In written comments on a draft of this report, DOD concurred with all three of our recommendations. DOD’s comments are reprinted in their entirety in appendix III. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Secretaries of the Navy and Air Force. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report, please contact Diana Maurer at (202) 512-9627 or maurerd@gao.gov or Asif A. Khan, at (202) 512-9869, or khana@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report are listed in appendix IV. Senate Report 115-262 accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019 included provisions for us to examine the Department of Defense’s (DOD) aviation depots and maintenance operations. Our report examines the extent to which 1) the Air Force and Navy aviation depots completed selected fixed-wing aircraft maintenance on time from fiscal years 2014 through 2019, and 2) the Air Force and Navy accurately planned for depot maintenance requirements for selected fixed-wing aircraft from fiscal years 2014 through 2019 and addressed any associated challenges. We have separate ongoing reviews to examine maintenance timeliness and related issues at the Army and Marine Corps key weapons systems depots and Navy shipyards. For objective one, we selected a non-generalizable sample of 18 Air Force and 18 Navy fixed-wing aircraft types, including fighters, bombers, and aerial refuelers, based on information from Navy and Air Force maintenance data and our prior work. These aircraft had maintenance completed in fiscal years 2014 through 2019, at the Navy’s three Fleet Readiness Centers and the Air Force’s three Air Logistics Complexes. We selected this time period so we could identify and obtain insight on historical data trends regarding maintenance timeliness for the selected aircraft. For each aircraft, we collected data on the date maintenance began and was completed for individual aircraft, as well as the original estimate of time (in days) needed to complete maintenance. We also collected updated estimates if available. We used this information to calculate the difference between the number of days planned for maintenance (using the updated estimate if available) and the number of days used for maintenance in order to determine whether the services completed aircraft maintenance on time, early, or late. Additionally, we used the total number of aircraft completed in each fiscal year to calculate a measure of average maintenance timeliness by aircraft type. We presented the data based on aircraft that had maintenance completed in a given fiscal year; however, not all of the maintenance was necessarily completed in that given fiscal year. For example, an aircraft may have had maintenance begun on it in one fiscal year and its maintenance completed in the next fiscal year. In such case, we would count that aircraft in the second fiscal year. The aircraft types we selected were: F/A-18A-D Hornet T-6B Texan II Turboprop In addition, we interviewed DOD and service officials to gain a better understanding of factors influencing fixed-wing aircraft maintenance timeliness and reviewed our prior work on depot maintenance. For objective two, we collected information on the depot maintenance planning processes for Air Force and Navy fixed-wing aircraft. Using the non-generalizable sample of 18 Air Force and 18 Navy fixed-wing aircraft identified in objective one, we analyzed data on maintenance duration for maintenance completed in fiscal years 2014 through 2019, and compared the number of days planned for maintenance to the number of days used for maintenance to determine the extent to which planned and actual numbers aligned. We interviewed DOD, Navy, and Air Force officials to obtain their views on the challenges related to planning, incorporating historical data, and coordinating with stakeholders related to the maintenance requirements planning process for aircraft depot maintenance. For specific challenges identified in the Navy, we reviewed documents including Naval Air Systems Command (NAVAIR) workload standards, applicable Navy guidance, and the Navy depot maintenance strategic plan and interviewed Commander, Fleet Readiness Centers (COMFRC) and NAVAIR officials to determine the extent to which the Navy incorporates historical data into the maintenance requirements planning process and the extent to which Navy depot stakeholders communicate and coordinate to inform this planning process. In addition, we visited one Air Force aviation depot and one Navy aviation depot to interview officials from specific aircraft programs, depot production, and depot business offices to understand challenges associated with planning for depot maintenance. To assess the reliability of the maintenance timeliness and planning data collected for both objectives, we reviewed and evaluated two systems— one for the Air Force and one for the Navy—that are used to collect and track data on depot maintenance. We conducted these assessments by interviewing officials regarding their data-collection processes, reviewing related policies and procedures associated with the collection of the data, examining the data for missing values and other anomalies, and interviewing knowledgeable agency officials regarding their accuracy and completeness. Based on our assessments, we determined that the data used from these systems were sufficiently reliable for the purposes of summarizing trends in selected aircraft maintenance timeliness and planning accuracy for fiscal years 2014 through 2019. We also assessed the reliability of the working capital fund data related to aviation depot maintenance activities included in Appendix II, by (1) reviewing our prior work to determine if there were reported concerns with Air Force and Navy budgetary data, and (2) reconciling the working capital fund data that was previously published in our reports for consistency. Based on our assessment, we determined that these data were sufficiently reliable for the purposes of presenting information on the services’ working capital funds activities and budget estimates for fiscal years 2014 through 2019. The U.S. military use working capital funds to procure and provide certain materiel and commercial products and services to its forces. A Working Capital Fund (WCF) is a type of revolving fund that operates as a self- supporting entity conducting a regular cycle of businesslike activities, such as acquiring parts and supplies, equipment maintenance, transporting personnel, research and development. Department of Defense (DOD) WCFs are authorized under 10 U.S.C. § 2208 and their amounts are generally available until expended. Ongoing WCF operations and maintenance of a minimum cash balance are funded through reimbursements to the WCF comprised of customer payments for goods or services received from WCF-supported activities, such as Navy and Air Force aviation depots. DOD WCFs operate on a break-even basis, although they may realize gains or losses within each fiscal year. As part of the annual budget submission for each upcoming fiscal year, however, prior year gains and losses are taken into account when new rates are established at levels estimated to recover the budgeted costs of goods and services, including all general and administrative overhead costs. Regardless, WCFs must maintain a net-positive cash balance at all times. Section 2464 of title 10 of the United States Code requires DOD to maintain a core depot-level maintenance and repair capability that is government-owned and operated. Maintaining this capability provides a ready and controlled source of technical competence and resources to enable effective and timely response to mobilizations, contingencies, or other emergencies. Additionally, DOD must assign these government- owned and operated facilities (the depots) sufficient workload to ensure cost efficiency and technical competence during peacetime, while preserving the surge capacity and reconstitution capabilities necessary to fully support the strategic and contingency plans prepared by the Chairman of the Joint Chiefs of Staff. The three Air Force and three Navy aviation depots operate through the Air Force and Navy working capital funds. Depot customers are charged for the anticipated full cost of requested goods and services. We reviewed the Air Force’s and the Navy’s budget estimates for fiscal years 2014 through 2019 and describe the information at a summary level below: Carryover (funded maintenance work leftover at the end of the fiscal year): Both services’ aviation depots underestimated carryover for most years during fiscal years 2014 through 2019. New orders (funded workload customers place at the aviation depots for maintenance work to be performed on their aircraft): Both services generally underestimated the amount of funds that their aviation depots received from new orders placed by customers and the work performed did not keep pace with those orders from year to year, during fiscal years 2014 through 2019. Revenue (dollar amount of work performed by depots in a single fiscal year): The services have varying trends for revenue for fiscal years 2014 through 2019. In fiscal years 2014 and 2017 through 2019 the Air Force, and for fiscal years 2014 through 2017 the Navy, overestimated the amount of revenue that was actually earned. Conversely, the Air Force underestimated for fiscal years 2015 through 2016, and the Navy underestimated during fiscal years 2018 through 2019. Workload (workload projections are expressed in Direct Production Earned Hours (DPEHs) for the Air Force and Direct Labor Hours (DLHs) for the Navy): A DPEH or DLH is an hour earned by a direct employee against an established work order, and includes civilians, contractors and military personnel. In fiscal years 2014 through 2019, Air Force depots’ workload increased from 21,337,000 DPEHs to 24,511,000 DPEHs—an increase of about 3.2 million (14.9 percent) DPEHs. During those same years, Navy depots’ workload generally increased from 10,161,000 DLHs to 11,668,000 DLHs—an increase of about 1.5 million (14.8 percent) DLHs. Personnel (civilian and military personnel performing depot maintenance at aviation depots and civilian staff performing support functions, such as finance and budgeting and supply and acquisitions): In fiscal years 2014 through 2019 the number of civilian personnel working at the aviation depots has generally increased by around 3,000 for both the Air Force and the Navy. Each year, customers order billions of dollars of maintenance work that the depots cannot complete by the end of the fiscal year. To the extent that the depots do not complete work at year-end, the work and related funding will be carried into the next fiscal year. DOD refers to this reported dollar value of work that has been ordered and funded (obligated) by customers, but not completed by working capital fund activities at the end of the fiscal year as “Carryover”. DOD allows and the congressional defense committees recognize that some carryover from one fiscal year to the next is needed to ensure a smooth flow of maintenance work during the transition from one fiscal year to the next. However, past congressional defense committee reports have raised concerns that the level of carryover may be more than is needed. DOD has reported that approximately 6 months of carryover is optimal. Excess carryover (i.e., more unfinished work than allowed) may reflect an inefficient use of resources and tie up funds that could be used for other priorities. Excessive amounts of carryover may result in future appropriations or budget requests of depot customers being subject to reductions by DOD and the congressional defense committees during the annual budget-review process. Tables 1 and 2 show Air Force and Navy carryover for fiscal years 2014 through 2019, respectively. Accurate budgets for the amount of new orders to be received by the depots are essential for them to plan their work, such as determining the right number of personnel, parts, and material needed. For example, if the services include workload in their new order estimates that do not materialize, a depot is at risk of incurring unplanned financial loss because the depot is allocating its overhead costs over less work than planned. These losses may lead the depots to increase their rates for repairing assets. If the customer receives more funding (e.g., Operations & Maintenance or Procurement) than they originally anticipated and they in turn increase their orders with the depots (new orders or just an increase to an existing order), or if operational decisions lead to changes in requirements or priorities, unplanned workload may materialize at the depots resulting in additional carryover. Tables 3 and 4 show Air Force and Navy new orders for fiscal years 2014 to 2019, respectively. Revenue represents the dollar amount of work performed by depots in a single fiscal year. DOD WCFs conduct businesslike activities to generate revenue from the sale of goods or services to customers, such as the military services or combatant commands, to cover costs expended throughout the year in support of those services. The DOD FMR 7000.14- R directs DOD WCFs to operate on a “break-even” basis (revenue generated equals the cost associated with receiving the revenue). See tables 5 and 6 for Air Force and Navy Depots’ Revenue (Budgeted vs Actual) for fiscal years 2014 through 2019. The Air Force and Navy express depot workload projections in Direct Production Earned Hours (DPEHs) for the Air Force, and Direct Labor Hours (DLHs) for the Navy. A DPEH or DLH is an hour earned by a direct employee against an established work order in the performance of depot work on an end item. The Air Force and Navy include direct labor hours worked by civilians, contractors and military personnel in their DPEH and DLH projections. Tables 7 and 8 show Air Force DPEHs and Navy DLHs for fiscal years 2014 through 2019, respectively. The number of civilian personnel at the Air Force and Navy aviation depots—referred to as end strength—perform the majority of depot-level maintenance activities and are made up of personnel such as artisans and maintainers—welders, machinist, sheet metal mechanics, aircraft mechanics, aircraft electricians, engineers and scientists—performing aviation depot maintenance, but also includes personnel performing support functions such as finance and budgeting. Tables 9 and 10 show total civilian and military personnel employed at the Air Force and Navy aviation depots for fiscal years 2014 through 2019, respectively. As seen in table 9, in fiscal years 2014 through 2019, the number of civilian personnel working at the Air Force aviation depots has grown by over 3,000 civilians (25,540 to 28,576). As seen in table 10, in fiscal years 2014 through 2019, the number of civilian personnel working at the Navy aviation depots has grown by over 3,100 civilians (8,515 to 11,643). Diana Maurer at (202) 512-9627 or maurerd@gao.gov, or Asif A. Khan at (202) 512-9869 or khana@gao.gov. In addition to the contacts listed above, Chris Watson (Assistant Director), Delia Zee (Analyst-in-Charge), John Craig, Sergio Enriquez, Amie Lesser, Felicia Lopez, Amanda Manning, Keith McDaniel, Richard Powelson, Benjamin Sclafani, Michael Silver, and Roger Stoltz (Assistant Director) made key contributions to this report. Military Depots: DOD Can Benefit from Further Sharing of Best Practices and Lessons Learned. GAO-20-116. Washington, D.C.: January 30, 2020. Navy Maintenance: Persistent and Substantial Ship and Submarine Maintenance Delays Hinder Efforts to Rebuild Readiness. GAO-20-257T. Washington, D.C.: December 4, 2019. Naval Shipyards: Key Actions Remain to Improve Infrastructure to Better Support Navy Operations. GAO-20-64. Washington, D.C.: November 25, 2019. F-35 Aircraft Sustainment: DOD Faces Challenges in Sustaining a Growing Fleet. GAO-20-234T. Washington, D.C.: November 13, 2019. Depot Maintenance: DOD Should Adopt a Metric That Provides Quality Information on Funded Unfinished Work. GAO-19-452. Washington, D.C.: July 26, 2019. Military Depots: Actions Needed to Improve Poor Conditions of Facilities and Equipment That Affect Maintenance Timeliness and Efficiency. GAO-19-242. Washington, D.C.: April 29, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Depot Maintenance: DOD Has Improved the Completeness of Its Biennial Core Report. GAO-19-89. Washington, D.C.: November 14, 2018. Air Force Readiness: Actions Needed to Rebuild Readiness and Prepare for the Future. GAO-19-120T. Washington, D.C.: October 10, 2018. Weapon System Sustainment: Selected Air Force and Navy Aircraft Generally Have Not Met Availability Goals, and DOD and Navy Guidance Need to Be Clarified. GAO-18-678. Washington, D.C.: September 10, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions That Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Depot Maintenance: Executed Workload and Maintenance Operations at DOD Depots. GAO-17-82R. Washington, D.C.: February 3, 2017. Depot Maintenance: Improvements to DOD’s Biennial Core Report Could Better Inform Oversight and Funding Decisions. GAO-17-81. Washington, D.C.: November 28, 2016. Army Working Capital Fund: Army Industrial Operations Could Improve Budgeting and Management of Carryover. GAO-16-543. Washington, D.C.: June 23, 2016. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations. GAO-16-450. Washington, D.C.: June 9, 2016. Navy Working Capital Fund: Budgeting for Carryover at Fleet Readiness Centers Could Be Improved. GAO-15-462. Washington, D.C.: June 30, 2015. Army Industrial Operations: Budgeting and Management of Carryover Could Be Improved. GAO-13-499. Washington D.C.: June 27, 2013. Marine Corps Depot Maintenance: Budgeting and Management of Carryover Could Be Improved. GAO-12-539. Washington, D.C.: June 19, 2012. Air Force Working Capital Fund: Budgeting and Management of Carryover Work and Funding Could Be Improved. GAO-11-539. Washington, D.C.: July 7, 2011.", "summary": "Three Air Force and three Navy aviation depots maintain critical fixed-wing aviation platforms, such as the KC-135 aerial refuelers and F/A-18 fighters. The ability of these depots to complete maintenance on time directly affects military readiness because delays reduce the time aircraft are available for operations and training. Senate Report 115-262, accompanying a bill for the Fiscal Year 2019 National Defense Authorization Act, contained provisions that GAO examine the Department of Defense's (DOD) aviation depots. GAO's report evaluates the extent to which 1) the Air Force and Navy aviation depots completed selected fixed-wing aircraft maintenance on time from fiscal year 2014 through 2019, and 2) the Air Force and Navy accurately planned for depot maintenance requirements from fiscal year 2014 through 2019 and addressed any associated challenges. GAO selected a non-generalizable sample of 18 Air Force and 18 Navy fixed-wing aircraft types; analyzed maintenance and planning data for fiscal year 2014 through 2019; and interviewed service officials. The Air Force and Navy varied in the extent that they completed depot maintenance on time for selected fixed-wing aircraft in fiscal years 2014 through 2019. Specifically, GAO's analysis of aggregate maintenance data found that: Air Force depots completed aircraft maintenance on time or early in 5 of 6 years, with percentages for on-time or early-completion maintenance ranging from 78 to 90 percent. Navy depots completed aircraft maintenance late for each of the 6 years, with percentages for on-time or early-completion maintenance ranging from 45 to 63 percent. Navy fixed-wing aircraft have spent over 62,000 more days in maintenance than expected since fiscal year 2014. The Air Force generally has accurately planned for depot maintenance requirements for selected fixed-wing aircraft during fiscal year 2014 through 2019, but the Navy has not. Both services have initiatives underway to improve planning for aviation depot maintenance; however, GAO identified planning challenges that the Navy has not fully addressed: The Navy has not effectively used historical data to analyze turnaround time—total days planned for depot maintenance periods—and established accurate planning targets for aircraft maintenance packages. Navy depot planners do not have visibility into aircraft maintenance that is performed outside the depots by an operational unit or other maintenance facility—information critical to planning for the condition and depot maintenance needs of individual aircraft. The Navy does not yet have formal processes and related guidance for communication and coordination between depot stakeholders to inform maintenance requirements planning. Without addressing these challenges, the Navy cannot appropriately plan for depot maintenance workload and will likely continue to experience maintenance delays that reduce the time aircraft are available for operations and training. GAO is making three recommendations to the Navy: to use historical data to set turnaround time targets for depot maintenance; provide planners information on maintenance performed outside the depots; and establish processes for communication between depot stakeholders. DOD concurred with all three recommendations.", "document_type": "gao"}
{"report": "This section describes tribal energy resources, EPACT05, and federal agencies’ authority and processes to purchase energy. Tribal lands have untapped energy resources that, if developed, could help to alleviate economic hardships among tribal populations. According to DOE, while tribal lands account for only 2 percent of all U.S. land, tribal land contains an estimated 50 percent of potential uranium reserves, 30 percent of coal reserves west of the Mississippi, and 20 percent of known oil and gas reserves. Furthermore, DOE’s National Renewable Energy Laboratory also reports that these tribal lands contain about 6.5 percent of all utility-scale potential U.S. renewable energy resources. Ninety percent of this potential renewable energy capacity is for solar energy. According to the laboratory, tribal lands have the potential for over 6,000 gigawatts of utility-scale solar photovoltaic capacity. To put this in perspective, a single gigawatt of power running at full capacity has approximately enough energy potential to power over 800,000 homes. However, 86 percent of tribal lands with energy potential are undeveloped, according to DOE. In July 2018, DOE announced the release of its Tribal Energy Atlas and an accompanying report on the renewable energy potential on tribal lands. The atlas, developed by the National Renewable Energy Laboratory, is an interactive, web-based geospatial application that provides information about energy resource potential on tribal lands (see fig. 1). According to DOE, the atlas is the first of its kind; further, it is available to tribal energy project planners, technicians, and investors to assist with analyzing energy options on tribal lands. Previously, DOE had identified multiple tribal lands with undeveloped energy resources that could potentially meet DOD energy needs. Specifically, in a May 2013 report, DOE identified 15 reservations that had, among other things, the potential to meet DOD energy needs and were near existing transmission lines that could be used to transport the energy from the reservation to the installation. The report was based on a DOE survey of DOD installations that could have an interest in purchasing energy from tribal sources based on the tribes’ proximity to the installations and the tribal energy sources’ potential to meet installation energy needs, among other factors. EPACT05 has several provisions related to tribal energy resource development. As previously noted, one of these provisions authorizes federal agencies to give preference to majority tribally owned energy suppliers over other potential energy suppliers when purchasing energy. More specifically, EPACT05 specifies that federal agencies “may” give such a preference as long as the agencies do not pay more than prevailing market prices or obtain less-than-prevailing-market terms and conditions. In addition, EPACT05 doubles the credit that agencies receive toward their mandated renewable energy goals if the renewable energy that agencies contract for is produced on tribal lands. As noted earlier, GSA has primary authority to enter into energy contracts for federal agencies, and it has delegated this authority to DOD and DOE as well, by regulation. In addition to these statutory and regulatory authorities, the acquisition and supply of energy for federal agencies is governed by the Federal Acquisition Regulation (FAR), which is issued and maintained by the Federal Acquisition Regulatory Council (FAR Council). The process GSA has prescribed for entering into federal energy contracts varies by location, depending on market conditions and state law. In traditional energy markets, retail customers such as GSA, DOD, and DOE are typically required to contract with the local utility operating in the area for energy. In deregulated markets, these agencies publicly issue requests for proposals for energy, and energy providers engage in a competitive bidding process for federal energy contracts. Federal officials seeking to enter into energy contracts may specify energy of certain types (for example, renewable sources may be given priority) in the requests for proposals, and the energy contracts are typically awarded to the best-value provider who meets the requirements of the request for proposal. Federal officials, tribal representatives, and stakeholders we interviewed identified a number of factors that have the potential to limit federal government energy purchases from tribal sources, and they offered suggestions to address some of these factors. The factors, which sometimes overlapped, included requirements to purchase from monopoly utilities, difficulty entering the market at the prevailing rate, access to transmission infrastructure, access to capital, and technical capacity. Requirements to purchase from monopoly utilities. In traditional regulated energy markets, retail customers, including federal agencies, generally can only purchase energy from the local monopoly utility in that region. According to officials from GSA, DOD, and DOE, this requirement prevents agencies from purchasing from tribes. A representative we interviewed from one tribal energy corporation concurred with the agency officials’ assessment. That tribal energy corporation currently sells energy in wholesale markets and is interested in selling energy to federal agencies, but it has not succeeded in doing so because agencies typically make purchases as retail, not wholesale, customers, according to the tribal representative. Nonetheless, according to the tribal representative, retail customers, including federal agencies, may have the option to purchase electricity as wholesale customers in traditional markets if the entity is large enough, which would allow them to purchase from sources such as the tribal corporation. GSA officials told us that purchasing energy as a wholesale customer may not be in the best interest of the federal government, given the associated technical requirements, including connecting to the grid in ways GSA is not currently equipped for, and regulatory risk, such as managing power in a way not required of retail customers. In particular, GSA officials expressed concern about the regulatory requirements associated with reselling any potential excess energy that may come with a wholesale purchase. Additionally, DOE officials said there might be cost considerations related to achieving and maintaining status as a wholesale customer, as well as risks in giving up retail customer status, including the loss of the utility’s obligation to service the agency’s facilities because it is no longer a retail customer. In addition, according to DOE officials, switching from retail to wholesale purchasing has historically presented significant litigation risk, such as the utility challenging the legal and technical basis for the government’s change from retail to wholesale customer. Difficulty entering the market at the prevailing rate. According to GSA procurement guidance, the contracting process for public utility services should obtain the best-value product for the government, which GSA officials said typically awards the contract to the lowest-cost provider that also meets technical requirements, potentially limiting federal agency opportunities to purchase energy from tribes. In particular, tribes may find it difficult to enter the energy market at competitive rates, according to four federal officials and one stakeholder. For example, two DOE officials provided examples of DOE receiving bids from tribes for federal energy contracts but stated that both bids were unsuitable because their price was higher than the market rate. One DOE official said that tribes developing renewable energy projects would have to compete with lower- cost natural gas and hydroelectric energy, which could prevent tribes from meeting the prevailing market rate. To help foster the success of such tribal projects, one DOE official and one stakeholder suggested allowing federal agencies to purchase energy from tribes at rates that exceed the prevailing market rates. However, some tribes have successfully entered the energy market and have sold energy at competitive rates. For example, representatives we interviewed from one tribe and a renewable energy development corporation owned by several tribes said they anticipate that their current or future projects will allow them to sell energy at competitive rates, and at least two tribes have entered into contracts with the federal government. Moreover, since the beginning of 2017, DOE has seen an increased interest from tribes in renewable energy projects because the price of renewable energy has become more competitive with other, lower-cost forms of energy, according to DOE officials. As tribes develop more renewable energy projects, there may be additional opportunities for federal agencies to purchase from tribes, which will also help these agencies meet federal renewable energy goals. Access to transmission infrastructure. Lack of access to energy transmission infrastructure may prevent tribes from transmitting their energy off tribal lands, according to 10 federal officials, tribal representatives, and stakeholders whom we interviewed. One DOE official said the biggest challenge in contracting for energy with tribes can be getting a physical connection to transmit power between the tribal energy providers and a federal building. Federal officials from GSA and DOE noted that there are few federal buildings close to tribal lands, making transmission from those lands to federal buildings more complex and expensive. A 2013 Edison Electric Institute report said that the cost of new construction of overhead transmission lines can range from $174,000 to $11 million per mile. DOE’s Tribal Energy Atlas may assist tribes in overcoming this factor because it provides information on existing infrastructure, including transmission lines, giving tribes access to data they need to make informed decisions about their energy development options. Further, tribes are not limited to developing energy projects on their own lands, which can eliminate issues with proximity to federal purchasers. For example, one tribe near San Diego partnered with a private developer to build a wind farm in Illinois to sell energy to GSA. The purchase was the largest wind energy purchase from a single source in federal contracting history, according to GSA officials. Access to capital. Tribal energy development may be hindered because of difficulty obtaining access to capital, potentially limiting federal energy purchases from tribes. For example, one industry official we interviewed who worked with a tribe in the process of developing a wind farm on its reservation said the tribe does not have the necessary capital to connect to the local transmission infrastructure. As a result, it cannot provide power beyond the reservation. Likewise, nine federal officials and stakeholders whom we interviewed said securing financing for energy development could be difficult for some tribes. To overcome this potential limitation, one group of tribes combined their resources and formed a multi-tribal power authority, which allowed them to raise the necessary capital to take on a larger-scale project while maintaining tribal ownership and creating jobs in the tribal communities. The multi-tribal authority plans to develop one of the largest wind farms in the country and sell the energy at a competitive price, according to representatives from a renewable energy development corporation owned by several tribes. Another option for tribes to address this limitation is tribes leasing their land to private developers to operate and maintain energy projects, thereby benefiting from their energy resources without having to raise the capital needed to develop them but still receiving additional benefits for the tribal community. For example, one tribal representative and one stakeholder mentioned that training and educational programs for tribal members could be part of these agreements between private developers and tribes. Technical capacity. Some tribes may not have the technical capacity to develop their energy resources, which can also limit federal energy purchases from tribal sources, according to tribal representatives and stakeholders we interviewed. For example, one tribal representative and four stakeholders we interviewed said that some tribes lack experience with energy development, which potentially limits their ability to take on large-scale projects that could meet federal energy needs. Two stakeholders noted the importance of tribes having access to professionals with experience in running energy development projects to help overcome this potential limitation. Federal agencies offer programs that could assist tribes with building technical capacity. For example, the Department of the Interior provides technical and financial assistance to tribes for the exploration, development, and management of tribal energy resources. In addition, DOE offers grants and education through webinars, forums, and workshops. For example, DOE in August 2018 selected 15 tribal projects to receive funding for developing their energy resources to reduce or stabilize energy costs, as well as to increase energy security and resilience on tribal lands. DOE has also provided technical assistance, technology and market analysis, and capacity building for tribes, as well as webinars on utility-scale energy development, fundamentals of energy markets for tribes, and effective tribal project partnerships. However, DOE’s efforts have focused primarily on reducing tribal energy costs and assisting tribes in developing energy for use on reservations, rather than on selling energy to outside sources, according to DOE officials. Since the establishment of the tribal energy preference, GSA, DOD, and DOE have not entered into an energy contract with a tribe using the preference. The preference and other tribal energy resource development provisions added in the tribal energy section of EPACT05 provide federal agencies with mechanisms to support tribal energy development and use. As noted previously, the section provided for grants to assist tribes in developing their energy resources, authorization for federal agencies to give preference to tribal energy sources when contracting for energy, and double credit towards mandated renewable energy goals when federal agencies contract for energy produced on tribal lands. GSA, DOD, and DOE officials we interviewed identified five instances in the past when a tribe bid on a federal energy contract, and agencies did not use the tribal energy preference in any of these instances. Two of the instances led to contracts with GSA because, in one of those instances, officials said that the tribe submitted the best bid, and in the other, GSA used the small business preference authority instead, as discussed further below. The other three instances were bids to DOD and DOE; these instances did not lead to contracts because either the cost was too high or the proposal was unsolicited and not needed by the agency, according to agency officials. Officials from GSA and DOD noted that EPACT05 makes use of the preference discretionary because it says that federal agencies “may give preference” to a majority tribally owned energy source. Officials from DOD said they cannot authorize agency officials to use the preference without a policy or FAR requirement to use the preference. DOD officials said they follow FAR regulations and guidance when implementing policy and guidance for the agency, but the FAR has no provisions specifically addressing the preference. Similarly, GSA officials told us they would be hesitant to use the preference because they believe it limits competition solely to tribal sources, which may not be in the best interest of the federal government. GSA officials attempted to use the preference to limit an energy contract solicitation solely to tribal sources in 2014, according to a stakeholder that worked on the project, but the GSA Administrator expressed concern about limiting competition in that manner. The stakeholder noted that GSA instead decided to open the solicitation to small businesses, and the tribe ultimately won the contract through the small business preference authority. When we reported on implementation of the tribal energy preference in November 2016, we found that federal agencies had not used the preference because of uncertainty about how to do so and lack of guidance. Because GSA has primary energy purchasing authority for the federal government, we recommended that GSA develop implementing guidance to clarify how contracting officials across the federal government should use the preference. GSA partially agreed with the recommendation, stating that guidance would be beneficial, but GSA officials stated that government-wide rulemaking from the FAR Council, of which GSA is a member, is necessary to clarify how agencies should use the preference. Subsequently, GSA officials told us that in April 2017, GSA presented the FAR Council with a business case that included an analysis of the problem we identified. After reviewing the business case, the FAR Council determined the preference has limited application government-wide. GSA officials told us that the FAR Council declined to pursue regulatory changes to the FAR because, according to the council, the preference only impacts agencies responsible for entering into federal energy contracts, mainly GSA, DOD, and DOE. Further, the FAR Council recommended that GSA consider nonregulatory paths, in keeping with Executive Order 13771, which aims to reduce costs associated with regulatory compliance. In response to the FAR Council’s recommendation, GSA added the preference language from EPACT05 to the form it uses to delegate purchasing authority to other federal agencies that may seek this authority in the future. As we reported in November 2016, DOE in 2013 issued agency-specific guidance on use of the preference, such as for limiting competition to qualified majority tribally owned suppliers for the purchase of renewable energy and energy by-products. DOE distributed the tribal energy preference guidance through a February 2013 acquisition letter. However, in our interviews with officials responsible for purchasing energy in nine DOE offices, we found that officials in five of these nine offices were unaware of the DOE guidance or unaware of the preference. DOE headquarters officials stated that the agency did not take further action to communicate the guidance or ensure relevant officials were aware of it after its initial distribution. Under federal standards for internal control, management should internally communicate the necessary quality information to achieve the entity’s objectives. According to DOE documentation, the objectives of the guidance are to promote tribal renewable energy development, reaffirm the federal government’s trust responsibility to tribes, and reinforce key national policy objectives such as the acquisition and use of clean energy products. DOE officials agreed that officials responsible for purchasing energy should be aware of the agency’s guidance and the preference. For example, officials from one DOE office stated that its contracting officials are aware of the preference because it has included the preference language in its requests for proposals. By taking steps to communicate the guidance to all DOE officials responsible for purchasing energy, DOE will be better positioned to ensure that these officials are aware of the preference, which may increase its use. In addition, officials from GSA, DOD, and DOE who are responsible for purchasing energy told us they are still uncertain about how they would use the preference. For example, officials from GSA stated that they would use the preference as a tiebreaker at a minimum, but they also noted that ties are unlikely and they had not seen any ties in bids to provide energy in the last 4 years. They also noted that they would rely on GSA’s legal and acquisition policy offices for any instruction regarding using the preference. Similarly, DOD officials responsible for energy purchases stated they would have to consult with DOD’s acquisition policy office, which stated that DOD does not have guidance and could not authorize use of the preference without a requirement in the FAR, as discussed previously. Likewise, DOE officials were unclear about how they would use the preference, stating that they would use the preference by awarding the energy contract to a tribe if the tribe had the lowest bid. However, the agency would not need to use the preference in such situations because the agency generally awards contracts to the lowest bidder, according to DOE officials. According to officials from GSA and DOD, other statutes that authorize agencies to apply preferences for acquisition of goods and services from specific sources include more specific requirements in their statutory language, making the requirements easier to apply. For example, GSA officials explained that the specific requirements and measurable goals set under the Small Business Act, as amended, increases contracts awarded to small businesses. In contrast, EPACT05’s tribal energy provision does not contain analogous specific requirements for how agencies should use the preference. DOD officials stated that the agency would potentially pursue using the tribal energy preference if EPACT05 required a certain amount of energy contracts to go to tribes, similar to the Small Business Act’s requirements for small businesses. Energy resources on tribal lands present an opportunity for individual tribes that pursue development of these resources to improve their socioeconomic status by generating income, jobs, and associated economic development. The federal government, as a significant energy consumer, is in a position to support energy development on tribal lands. Through EPACT05’s tribal energy resource development provisions, including the tribal energy preference, Congress has provided federal agencies with mechanisms for such support. GSA and DOE have taken steps intended to promote use of the preference—GSA by adding the preference language when delegating energy contracting authority in the future, and DOE by issuing guidance. However, no federal agency has used the preference since its establishment in 2005, in part because EPACT05 does not require its use or include goals specifying how agencies should use it. Further, officials we interviewed at GSA, DOD, and DOE told us they were uncertain about how to use the preference. Specific incentives or requirements for the use of the tribal energy preference could help create additional opportunities for federal energy purchases from tribes as they develop more renewable energy projects. DOE’s issuance of agency-specific guidance for implementing the preference is an important positive step. However, some DOE officials responsible for purchasing energy were unaware of the DOE guidance. By taking steps to communicate the guidance to all DOE officials responsible for purchasing energy, DOE will be better positioned to ensure that these officials are aware of the preference, which may increase its use. To the extent that Congress wants to further encourage federal agencies to use tribal energy sources, it should consider amending the Energy Policy Act of 2005 to provide more specific direction to federal agencies for implementing the tribal energy preference, to include consideration of additional incentives or requirements to use these energy sources. (Matter for Consideration 1) The Secretary of Energy should communicate DOE’s tribal energy preference guidance to all DOE officials responsible for purchasing energy. (Recommendation 1) We provided a draft of this report for review and comment to DOE, DOD, and GSA. In its written comments, reproduced in appendix I, DOE concurred with our recommendation and outlined planned action to implement it. Specifically, DOE plans to issue and disseminate a new policy flash to its acquisition personnel to draw renewed attention to its tribal energy preference guidance. DOD and GSA stated that they did not have any comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Administrator of General Services, the Secretary of Defense, the Secretary of Energy, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the individual named above, Karla Springer (Assistant Director), Andrew Moore (Analyst in Charge), Justin Bolivar, William Gerard, Cindy Gilbert, Cynthia Norris, and Caroline Prado made key contributions to this report.", "summary": "Tribal lands hold considerable energy resources—oil, gas, coal, wind, solar, geothermal, and biomass. Tribal energy projects can help tribes fund programs and services that improve tribal members' quality of life. Federal agencies are large consumers of energy in the United States, spending about $6 billion in 2017 on energy for their facilities. Congress has provided a mechanism for agencies to support development and use of tribal energy by authorizing agencies to give preference to majority tribally owned suppliers when purchasing energy. GAO was asked to review federal efforts to use the preference. This report examines, among other objectives, the extent to which GSA, DOD, and DOE have used the tribal energy preference. GAO reviewed available agency information on use of the preference and interviewed federal agency officials to understand how agencies would use the preference when entering into contracts with tribal suppliers. None of the three primary federal agencies with authority to enter into energy contracts—the General Services Administration (GSA) and the Departments of Defense (DOD) and Energy (DOE)—have used the tribal energy preference since it was established in the Energy Policy Act of 2005 (EPACT05). The section of the act that includes the preference provides federal agencies with mechanisms that can support development and use of tribal energy resources. The mechanisms include grants to assist tribes in developing their energy resources and authorization for agencies to give preference to majority tribally owned sources in federal energy purchases, so long as they pay no more than prevailing market prices and obtain no less than prevailing market rate terms and conditions. According to DOE, tribal lands account for 2 percent of U.S. land but contain about 6.5 percent of all utility-scale U.S. renewable energy potential. GSA, DOD, and DOE officials identified five instances in the past when a tribe bid for a federal energy contract, and the agencies did not use the preference in any of those instances. GSA awarded a contract to tribes in two of the instances. In the first instance, the tribe submitted the best bid. In the second, GSA officials attempted to use the preference by limiting the energy contract solicitation solely to tribal sources, according to a stakeholder that worked on the project, but the GSA Administrator expressed concern about limiting competition in that manner. GSA instead used the small business preference authority, through which the tribe ultimately won the contract. DOD and DOE received the other three bids, which did not lead to contracts because either the cost was too high or the bid was not needed by the agency, according to agency officials. Federal officials noted that use of the preference is discretionary. EPACT05, which says agencies “may give preference,” does not require use of the preference, and the Federal Acquisition Regulation does not specifically address the preference. In November 2016, GAO reported that one reason federal agency officials cited for not using the preference was uncertainty about how to do so. GAO recommended that GSA develop guidance to clarify use of the preference across the federal government. GSA agreed that such guidance would be beneficial but stated that the Federal Acquisition Regulatory Council is the regulatory body empowered to address this issue. In April 2017, GSA presented the council with a business case on the issue. However, GSA officials told GAO that the council determined that the preference has limited application government-wide because it mainly affects GSA, DOD, and DOE, and that, accordingly, the council declined to issue regulations and recommended GSA consider nonregulatory paths. GSA then added the preference language to the form it will use if it delegates purchasing authority in the future. In 2018, federal agency officials told GAO they were uncertain how to use the preference. According to GSA and DOD officials, other statutes that authorize agencies to apply preferences for acquisition of goods and services from specific sources include more specific requirements in their statutory language, making them easier to apply. GSA officials noted that the Small Business Act, as amended, contains specific requirements and measurable goals that increase contracts awarded to small businesses. DOD officials stated that the agency might use the tribal energy preference if EPACT05 had similar requirements. To the extent that Congress wants to further encourage use of tribally owned energy sources, it should consider amending EPACT05 to provide more specific direction to federal agencies for implementing the tribal energy preference, to include consideration of additional incentives or requirements.", "document_type": "gao"}
{"report": "VA pays monthly disability compensation to veterans with service- connected disabilities according to the severity of the disability. VA’s disability compensation claims process starts when a veteran submits a claim to VA. A claims processor then reviews the claim and helps the veteran gather the relevant evidence needed to evaluate the claim. Such evidence includes the veteran’s military service records, medical exams, and treatment records from VHA medical facilities and private medical service providers. If necessary to provide support to substantiate a claim, VA will also provide a medical exam for the veteran, either through a provider at a VHA medical facility or through a VBA contractor. According to VBA officials, VBA monitors a VHA facility’s capacity to conduct exams, and in instances when the facility may not have capacity to conduct a timely exam, VBA will send an exam request to one of its contractors instead. Once the contractor accepts the exam request from VBA, it assigns a contracted examiner to conduct the exam and complete an exam report designed to capture essential medical information for purposes of determining entitlement to disability benefits. The contractors send the completed report to VBA, which uses the information as part of the evidence to evaluate the claim and determine whether the veteran is eligible for benefits. In 2016, VBA established an exam program office to manage and oversee contractors, monitor their performance, and ensure that they meet contract requirements. For example, in 2018 we reported that the contracts require that contractors develop plans outlining how they will ensure examiners are adequately trained. We also reported that contractors are required to provide VBA with monthly exam status reports, which include the number of canceled, rescheduled, and completed exams, among other things. VBA also has an office dedicated to completing quality reviews of contractors’ exam reports, which are used to assess contractor performance. VBA awarded new contracts in 2018, in part, because it wanted to update performance measures for its contractors and to change how contractors were assigned to each region throughout the country, according to agency officials. For example, officials said that the agency restructured the service areas in its contracts from five U.S. geographic districts to four to balance the number of rural and urban areas contained in each region. In doing so, they said that VBA’s goal was to distribute exams in rural areas, where it can be more challenging to find examiners, more evenly across all contractors. VBA has not fully resolved issues in collecting information on contractors’ quality and timeliness, which continues to hinder its ability to oversee contractor performance. We previously reported that VBA’s lack of complete and accurate information on the quality and timeliness of exams limited its oversight of contracted examiners and contributed to other challenges in managing the contracts. For example, VBA officials had told us that as of late June 2018, VBA was behind in completing quality reviews for contracted exams that were completed in 2017, in part, due to lack of staff to complete the quality reviews. Further, VBA officials had acknowledged that they did not have accurate information on whether contractors were completing veterans’ exams in a timely manner as outlined in the contracts. We reported in 2018 that VBA measured timeliness as the number of days between the date the contractor accepts an exam request and the date the contractor initially sends the completed exam report to VBA. However, we previously found that the exam management system VBA used until spring 2018 did not retain the initial exam completion date when VBA sent an initial exam report back to a contractor for clarification or correction. In such cases, VBA’s system maintained only the most recent date an exam report was sent back to VBA. In such a situation, according to agency officials, VBA would not always be able to accurately assess a contractor’s timeliness as outlined in the contracts. Similar to our findings, the VA Office of Inspector General’s June 2019 report on VBA’s oversight of contracted exam cancellations also identified deficiencies due to staffing shortages and exam management system limitations, among other reasons. According to VBA officials in 2018, because VBA did not have complete and accurate information on contractor performance, it could not carry out key oversight activities. For example, VBA officials acknowledged that they were unable to track exams that needed corrections or clarifications, which we reported is needed to determine if VBA should reduce payment to a contractor. In 2018, we reported that the contracts required that contractors correct these exams within a certain number of days and bill VBA for these exams at half price. However, we found that VBA’s lack of complete and reliable information on insufficient exams hindered its ability to ensure such requirements were met. Further, in the absence of current and accurate quality and timeliness information, we reported in 2018 that VBA officials told us that they had not completed the quarterly reports that summarize how each contractor performed. VBA’s delay in completing these reports meant that it had not administered other provisions of the contracts. For example, we reported in 2018 that the contracts stated that VBA could use performance data to help determine how to allocate exams within specified areas in the United States that have two contractors; in particular, VBA could decide to allocate more exams to the contractor with higher performance results. However, VBA did not have performance data on which it could base its allocation of exams. Rather, the agency based allocation on contractor workload. Further, we reported that the contracts outlined how VBA could use performance data to administer financial incentives linked to performance targets. However, due to the lack of performance information, VA had not yet administered these incentives at the time of our review in October 2018. In our 2018 report, we recommended that VBA take steps to address the oversight issues we identified by developing and implementing a plan for using data from the new exam management system to accurately assess contractor timeliness, monitor time spent correcting exams, and verify proper exam invoicing. VBA has taken steps to address issues with both the incomplete quality information and inaccurate timeliness data. For example, to help resolve the delays in completing quality reviews, VBA officials said in November 2018 that the agency had hired additional staff to assess quality of contract exam reports. As of September 2019, officials said they have 16 out of 17 full-time positions filled in the quality review office because one employee left and that they are in the hiring phase for the final position. With the addition of quality review staff, officials stated that VBA is up-to- date on completing initial quality reviews. However, they said the agency has not yet finalized any quality scores, or completed the quarterly performance reports, under the new contracts. As such, according to VBA, it has not yet administered financial incentives linked to performance. To address the inaccurate timeliness data, VBA officials stated that the agency’s new exam management system, implemented in spring 2018, was designed to capture information that would allow VBA to accurately calculate contractor timeliness. Officials also said that VBA revised its performance measures to help it more fully assess contractors’ performance. In its agency comment response to our draft report in September 2018, VBA had a target completion date of December 2018 for implementing our recommendation. However, as of September 2019, VBA reported that it has not been able to fully implement its plan for using the new system to improve oversight of contractors and did not provide a target completion date for fully implementing our recommendation. In particular, VBA has not been able to implement an automated invoicing system that it plans to use to validate the accuracy of contractors’ invoices nor can it reconcile historical data in the exam management system. As a result, according to VBA, it still cannot ensure that it is paying contractors the correct amounts based on the terms of the contracts. According to VBA, the delay in implementation is, in part, a result of having to fix technical issues with exam scheduling requests and an ongoing effort involving multiple VA offices to align VBA’s systems with those of multiple contractors. To address these issues, VBA stated that it has completed testing of its invoice system with all of the contractors and anticipates completing analysis of the results of those tests by October 2019 and will provide an updated target completion date at that time. We also recommended that VBA regularly monitor and assess aggregate performance data and trends over time to identify higher-level trends and program-wide challenges. Without plans to conduct comprehensive performance analyses, we stated that VBA is limited in its ability to determine if the contract exam program is achieving its quality and timeliness goals in a cost effective manner. VBA stated that as it makes improvements to its exam management system data it will be able to implement this recommendation, but did not provide a specific date. VBA also noted that information collected in the new exam management system has helped them to identify potential issues with the metrics that they use to assess contractor performance and that the agency is in the process of identifying the best way to analyze the data to make improvements to the program. We previously reported that VBA relies on contractors to verify that their examiners complete required VA training and that VBA did not have information on whether the training effectively prepares examiners to conduct high quality exams. Specifically, we noted that the contractors, rather than VBA, access the contractor training systems to verify that examiners have completed the required training before they are approved to conduct exams. Further, VBA did not review contractors’ self-reported training reports for accuracy or request supporting documentation, such as training certificates, or solicit feedback from contracted examiners on the effectiveness of training or suggestions for improvement. Since VBA was without plans to verify completion of training, we noted that VBA risked using contracted examiners who are unaware of the agency’s process for conducting exams. This could lead to poor-quality exams that need to be redone and, thus, delays for veterans. Similarly, without information on the effectiveness of training, VBA may not know whether additional training courses are needed. To address these concerns, we recommended that VBA document and implement a plan and processes to verify that contracted examiners have completed required training and that it collect feedback on training for the purpose of assessing its effectiveness and making improvements as needed. As of July 2019, after VBA determined that none of its contractors were comprehensive in reporting all examiners’ training, VBA reported that the agency started conducting random audits of contractor training records. Additionally, VBA said that contractors can submit feedback following the completion of each VBA-developed training course and that it will use this information to make improvements. However, VBA is still in the process of developing a centralized training system to collect information on all training completed by contracted examiners and to obtain participant feedback on each course. VBA stated that it expects the system updates that would allow it to verify that all examiners have completed required training will be fully implement by the end of fiscal year 2020 and that it will continue random audits until full implementation. In conclusion, as VBA increasingly relies on contractors to perform veterans’ disability compensation exams, it is important that the agency ensures proper oversight of these contractors. Specifically, VBA needs to ensure that (1) it has accurate and up-to-date information on individual contractor performance to ensure veterans receive quality and timely exams and that contractors are properly paid, as well as a mechanism to asses overall performance of the contract; and (2) examiners are trained to conduct these exams in a manner that results in accurate exam reports that claims processors can use to make a disability ratings decision. Without sustained oversight, VBA also runs the risk of causing undue harm to veterans through delayed or inadequate exams. Chair Luria, Ranking Member Bost, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to answer any questions you or other members of the subcommittee may have at this time. For questions about this statement, please contact Elizabeth Curda, Director, Education Workforce, and Income Security Issues at (202) 512- 7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact above, Nyree Ryder Tee (Assistant Director); Justin Gordinas (Analyst-in-Charge); Alex Galuten; and Jessica Orr made key contributions to this testimony. Other staff who made key contributions to the report cited in the testimony are identified in the source product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VBA has increased the use of contractors in conducting veterans' disability medical exams. From fiscal year 2012 through mid-September fiscal year 2019, VBA reported that the number of exams completed by contractors rose from about 178,000 to nearly 958,000, which is more than half of all exams completed to date in fiscal year 2019. The remaining exams were completed by medical providers from the Veterans Health Administration. According to VBA, its contracts are worth up to $6.8 billion over 10 years. In light of issues GAO identified with VBA's oversight of contracted examiners in its October 2018 report (GAO-19-13), this testimony provides updates on VA's efforts to 1) improve its oversight of contracted examiners to ensure quality and timely exams and proper invoicing, and 2) ensure that examiners are properly trained. The Veterans Benefits Administration (VBA) has not fully resolved issues regarding how it oversees the quality and timeliness of and invoicing for disability compensation medical exams that are completed by contracted examiners. VBA uses medical exam reports from both VHA and contract examiners to help determine if a veteran should receive disability benefits. GAO reported in October 2018 that VBA was behind in completing quality reviews of contracted exams and did not have accurate information on contractor timeliness. VBA's lack of quality and timeliness data hindered its oversight of contractors' performance. In 2018, GAO made recommendations for VBA to address these issues. VBA has begun to implement GAO's recommendations, but continued action is needed to: Develop and implement a plan for using data from its new medical exam management system to (1) assess contractor timeliness, (2) monitor time spent correcting exams, and (3) verify proper exam invoicing. According to VBA, the agency has not fully implemented its plan for using this new system to resolve challenges with oversight of contractors' performance. For example, due to system issues, VBA has not been able to implement an automated invoicing system it planned to use to validate the accuracy of contractors' invoices. Further, VBA has not yet completed quarterly performance reviews of contracted exams under its new contracts, including any reports for fiscal year 2019. As a result, VBA still is unable to ensure that it is paying contractors the correct amounts based on its contract terms. Monitor and assess aggregate performance data and trends over time to identify higher-level trends and program-wide challenges. VBA officials stated that as the agency makes improvements to the exam management system data it will be able to implement this recommendation, but officials could not provide a target completion date. VBA has taken steps to address issues GAO identified with its oversight of contracted examiner training requirements but has not yet fully addressed them. Having properly trained examiners who can provide high quality exam reports is critical to ensuring that claims processors can make timely and accurate disability determinations for veterans. In 2018, GAO recommended that VBA improve its training oversight by: Implementing a plan to verify that all contracted examiners have completed required training. In response, VBA began conducting random audits of training completed by contracted examiners, but it is still in the process of developing a centralized training system that will collect this information. Such a system could help ensure that contracted examiners complete training and, ultimately, conduct high-quality exams. Collecting information from contractors or examiners on training and use this information to assess training and make improvements. VBA has since developed a feedback tool for examiners to complete following training and plans to use it to improve the training, where needed. GAO made four recommendations in 2018, including that VBA (1) develop a plan for using its new data system to monitor contractors' quality and timeliness performance, (2) analyze overall program performance, (3) verify that contracted examiners complete required training, and (4) collect information to assess the effectiveness of that training. VA agreed with and initiated actions on all of these recommendations but has not yet fully implemented them.", "document_type": "gao"}
{"report": "Different aviation industry employers have distinct workforce needs and may require workers with specific skillsets depending on the type of work performed. The workforce includes FAA-certificated mechanics and repairmen, as well as non-certificated workers. FAA-certificated mechanics inspect, service, and repair aircraft bodies (airframe) and engines (powerplant), and only they can approve an aircraft for return to service. It can take between 1 and 3 years to obtain the required education or training to become certificated. FAA-certificated repairmen service aircraft components and must be recommended for certification by their employer to perform specific tasks such as welding or painting. It can take more than a year to obtain the required experience or training to become certificated. A repairman certificate is only valid at the employer for which it was issued. Non-certificated aviation maintenance workers include individuals who are supervised by certificated mechanics or repairmen in performing repair work. Existing federal data shed light on key workforce characteristics such as the number of FAA-certificated mechanics and repairmen, their age, sex, and education. Specifically: As of December 2018, about 295,000 individuals held a mechanic certificate and about 35,000 held a repairmen certificate. The median age of FAA-certificated mechanics and repairmen was 54 years old, according to our analysis of FAA data. Three percent of all aviation maintenance certificate holders were women as of December 2018. Attending AMT school was the most common pathway certificated individuals used to qualify for the FAA tests to become mechanics. Existing federal data also provide some information on employment characteristics such as the supply of certificated workers. Specifically, FAA certificated about 8,600 mechanics and repairmen on average each year for 2014 through 2018 (see fig. 1). BLS data project an annual average of 11,800 job openings in the United States from 2018-2028 for aircraft mechanics and service technicians due to growth and replacement, which include job openings for certificated and non- certificated workers. There are, however, certain limitations to existing federal data. For example, neither FAA nor BLS collects data on the race or ethnicity of certificated individuals. In addition, FAA officials said the number of certificated individuals likely overestimates the number of them working in the aviation industry. It is unknown how many of the approximately 330,000 certificate holders are retired, deceased, or working in other industries. Furthermore, BLS data indicate 136,900 individuals were employed in the aircraft mechanics and service technicians occupation in 2018, but it is not clear how many of those jobs were filled by FAA- certificated workers. There are also limitations to determining employment characteristics such as pay for certificated workers, specifically. BLS publishes some data on pay for aircraft mechanics and service technicians, such as average hourly and annual wages. However, the occupational classification system BLS and other federal statistical agencies use for aircraft mechanics and service technicians does not distinguish between FAA- certificated and non-certificated workers, making it difficult to determine employment characteristics such as pay for certificated workers, specifically. This is in part because workers are classified by the work they perform and not necessarily by certification or education, according to occupational classification system principles. BLS officials said they collected wage and employment data for certificated workers separate from non-certificated workers in employer surveys conducted between 2000 and 2012, but stopped collecting these data in part because employers inconsistently reported them. Employers we interviewed, including air carriers and repair stations, had differing perspectives on potential growth in demand for aviation maintenance workers; some said they were experiencing difficulty finding enough workers to meet their needs, while others said they were not experiencing difficulty. Employers we interviewed for our 2014 report also expressed varying levels of difficulty filling vacancies and recruiting individuals for certain aviation professions, including aviation maintenance workers. Small and medium-sized employers in particular cited some challenges to hiring due to the wage they offered. Some stakeholders we interviewed for our recent report voiced concerns about the potential for a labor shortage. In addition to these views, two of the three selected labor market indicators (unemployment rate and wage earnings) we reviewed from 2013 through 2018 were consistent with difficulties in hiring aircraft mechanics and service technicians, while the other indicator (employment) was not. Several federal agencies such as DOD, DOL, VA, Education, and the Department of Transportation administer grants or programs that support individuals pursuing aviation maintenance careers or facilitate coordination among different stakeholders to support them. For example: DOD’s Military Services’ Credentialing Opportunities On-Line (COOL) program. This program provides funding for service members to obtain professional credentials related to their military training and helps them translate their military experience into civilian occupations. DOL’s Registered Apprenticeship Program. DOL awards grants to support Registered Apprenticeship Programs— employer-driven training opportunities that combine on-the-job learning with related classroom instruction. The program facilitates coordination among different stakeholders such as industry, states, and educational institutions to support apprenticeships and employment opportunities. In addition, FAA established an Aviation Workforce Steering Committee in February 2019, in part to coordinate efforts across FAA to address various workforce related provisions included in the FAA Reauthorization Act of 2018. Additional examples of federal grants or programs that support this workforce can be found in our report. The report also includes examples of states, industry employers, and AMT schools coordinating or partnering to support the workforce including developing career grants and military pathway programs. Despite some of FAA’s recent efforts in support of this workforce, we found that FAA does not routinely analyze, collect, or coordinate with other stakeholders on certain data related to workforce development. FAA’s strategic plan includes an objective on promoting the development of a robust aviation workforce, and its Aviation Workforce Steering Committee charter emphasizes providing diverse populations, including youth, women, and minorities, with clear pathways into aviation careers to expand the talent pool from which both government and industry may recruit. However, neither the strategic plan nor the steering committee charter provides specific information on how FAA plans to select and measure any efforts it undertakes related to these objectives. Without routinely analyzing its own data or leveraging others’ data, FAA may not have certain information it needs to track or ensure progress toward its workforce development goals. We identified several areas in which improved data analysis, collection, or coordination could assist FAA in measuring progress and understanding how to target its resources in support of its workforce related objectives. For example, FAA could use the demographic or pathway data it already collects to identify patterns or relationships (such as the trend in female certificate holders by pathway), which could be useful information as FAA aims to increase opportunities for women to pursue aviation maintenance careers. FAA could also use existing AMT school data (such as enrollment or mechanic test pass-rate data) to analyze nationwide trends or aggregate information across AMT schools to better understand the AMT school pathway as a whole. In our 2020 report that issued last week, we recommended that the Aviation Workforce Steering Committee, as part of its ongoing efforts, take steps to use existing FAA data and coordinate with other federal agencies to identify and gather the information it needs to measure progress and target resources toward its goal of promoting a robust, qualified, and diverse aviation maintenance workforce. FAA agreed with our recommendation. Even as FAA’s strategic plan states the agency’s focus on promoting the development of a skilled aviation maintenance workforce to integrate new technologies, the agency has acknowledged that the current curriculum requirements for AMT schools and mechanic testing standards are outdated. FAA officials, employers, and AMT School officials we interviewed said the current curriculum requirements do not emphasize commonly used modern aircraft technologies, such as avionics and composite materials. Over the years, FAA has attempted several times to revise curriculum requirements for AMT schools through the rulemaking process, and efforts to revise these requirements are ongoing through this process. FAA is also currently updating the testing standards for mechanics. FAA officials have noted several challenges to updating the curriculum requirements including competing demands at the department level and the extent of comments FAA has received from stakeholders in response to proposed changes. In October 2015, FAA published a notice of proposed rulemaking (NPRM) with the stated goal of updating the existing AMT school curriculum. FAA issued a supplemental NPRM in April 2019 that expanded the scope of the NPRM it issued in October 2015. Comments on the supplemental NPRM were due in June 2019. As of October 2019, FAA officials said they were in the process of reviewing the comments. FAA officials told us that a final rule will be published some time toward the end of 2020. In a separate effort outside of the rulemaking process, FAA is currently updating the testing standards for mechanics. FAA has acknowledged that current mechanic testing standards are also outdated. As a result, aviation stakeholders have stated the mechanic tests include outdated or irrelevant questions. For example, the practical test may include projects on wood airframes and fabric coverings, which are not common to modern commercial aircraft. An FAA official noted that any delay in finalizing the rule would likely result in a corresponding delay to finalizing the testing standards. Delaying the release of the updated mechanic testing standards could result in the prolonged use of outdated or irrelevant questions on the mechanic tests. FAA officials said that once finalized and implemented, the updated curriculum requirements for AMT schools and the mechanic testing standards for individuals should be mostly aligned. Chairman Larsen, Ranking Member Graves, and members of the Subcommittee, this completes my prepared remarks. I look forward to answering any questions you may have. If you or your staff have any questions about this statement, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this testimony were Betty Ward-Zukerman, Assistant Director, Vashun Cole, Chelsa Gurkin, Ellie Klein, Meredith Moore, Justin Reed, Andrew Von Ah, and Chris Woika. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "FAA requires that only mechanics who are \"certificated\" by the FAA approve aircraft for return to service. Some stakeholders have expressed concern that retirements and attrition could adversely affect the capacity of this workforce to meet the growing demand for air travel, and that the mechanic curriculum is outdated. The FAA Reauthorization Act of 2018 included provisions for GAO to examine the aviation workforce. This testimony examines (1) what federal data reveal about the characteristics of the aviation maintenance workforce, (2) how selected federal agencies and other key stakeholders provide support and coordinate to develop the skills of this workforce, and (3) FAA's progress in updating the curriculum and testing standards for mechanics. GAO analyzed FAA and BLS data; reviewed relevant federal laws and regulations; and interviewed selected federal agency, industry, and AMT school officials. Federal data provide some information on the Federal Aviation Administration (FAA)-certificated aviation maintenance workforce, though certain data limitations exist. FAA maintains data on the number of individuals newly certificated each year, but less is known about how many certificated individuals exit the aviation industry each year and the extent of growing demand. A sufficient supply of certificated workers is critical for safety and to meet the growing demand for air travel. Bureau of Labor Statistics (BLS) data provide some information on pay and demand for aviation maintenance workers more broadly, but do not differentiate between FAA-certificated and non-certificated workers due to data collection challenges. Demographic data may also be useful for workforce analysis and planning. FAA data provide some demographic information on certificated mechanics and repairmen, such as age and sex, but the agency lacks data on race and ethnicity. According to GAO analysis of FAA data, the median age of the roughly 330,000 mechanics and repairmen FAA had certificated as of December 2018 was 54 years old and three percent were women. Government agencies, educational institutions, and businesses coordinate to some extent in support of this workforce, but FAA does not routinely analyze, collect, or coordinate with other stakeholders on certain data related to workforce development. One of FAA's strategic objectives includes promoting the development of a robust, skilled aviation workforce, and the agency established a committee, in part, to explore ways to diversify this workforce; however, FAA is not currently positioned to understand whether its efforts are optimally targeted or effective. Without routinely analyzing its own data or leveraging others' data, FAA may not have certain information it needs to track or ensure progress toward its workforce development goals. FAA has acknowledged that curriculum requirements for Aviation Maintenance Technician (AMT) schools and mechanic testing standards are outdated. Efforts to revise the decades-old curriculum requirements for AMT schools are ongoing and FAA officials told GAO that a final rule will be published some time toward the end of 2020. FAA officials indicated that the revised mechanic testing standards would likely be finalized after. In its February 2020 report, GAO recommended that FAA use its existing data and coordinate with other federal agencies to identify and gather information to measure progress and target resources toward its goal of promoting a robust, qualified, and diverse aviation maintenance workforce. FAA agreed with the recommendation.", "document_type": "gao"}
{"report": "According to DHS and HHS officials, DHS has historically separated a number of children from accompanying adults at the border and transferred them to HHS custody, but these separations occurred only in certain circumstances. For example, DHS might separate families if the parental relationship could not be confirmed, if there was reason to believe the adult was participating in human trafficking or otherwise a threat to the safety of the child, or if the child crossed the border with other family members such as grandparents without proof of legal guardianship. HHS has traditionally treated these children as unaccompanied alien children (UAC)—children who (1) have no lawful immigration status in the United States, (2) have not attained 18 years of age, and (3) have no parent or legal guardian in the United States or no parent or legal guardian in the United States available to provide care and physical custody. The Attorney General’s April 2018 memorandum, also referred to as the “zero tolerance” policy, directed Department of Justice (DOJ) prosecutors to accept all referrals of all improper entry offenses from DHS for criminal prosecution, to the extent practicable. According to DHS officials, in implementing the April 2018 memo, DHS’s U.S. Customs and Border Protection (CBP) began referring a greater number of individuals apprehended at the border to DOJ for criminal prosecution, including parents who were apprehended with children. In these cases, referred parents were placed into U.S. Marshals Service custody and separated from their children because minors cannot remain with a parent who is arrested on criminal charges and detained by U.S. Marshals Service. In cases where parents were referred to DOJ for criminal proceedings and separated from their children, DHS and HHS officials stated they treated those children as UAC. In such cases, DHS transferred these children to the custody of HHS’s Office of Refugee Resettlement (ORR) and ORR placed them in one of their shelter facilities, as is the standard procedure for UAC. The President’s executive order issued on June 20, 2018, directed, among other things, that the Secretary of Homeland Security maintain custody of alien families during any criminal improper entry or immigration proceedings involving their family members, to the extent possible. This order stated that the policy of the administration is to maintain family unity, including by detaining alien families together where appropriate. In addition, on June 26, 2018, a federal judge ruled in the Ms. L. v. ICE case that certain separated parents must be reunited with their minor children (referred to in this testimony statement as the “June 2018 court order”). In this case, the American Civil Liberties Union filed a federal lawsuit on behalf of certain parents (referred to as class members) who had been separated from their children. As of September, 10, 2018, the government had identified 2,654 children of potential class members in the Ms. L. v. ICE case, which we discuss in greater detail later in this statement. As of January 31, 2019, this litigation was ongoing. Under the Homeland Security Act of 2002, responsibility for the apprehension, temporary detention, transfer, and repatriation of UAC is delegated to DHS, and responsibility for coordinating and implementing the placement and care of UAC is delegated to HHS’s ORR. CBP’s U.S. Border Patrol (Border Patrol) and Office of Field Operations (OFO), as well as DHS’s ICE, apprehend, process, temporarily detain, and care for UAC who enter the United States with no lawful immigration status. ICE’s Office of Enforcement and Removal Operations (ERO) is generally responsible for transferring UAC, as appropriate, to ORR, or repatriating them to their countries of nationality or last habitual residence. Under the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (TVPRA), UAC in the custody of any federal department or agency, including DHS, must be transferred to ORR within 72 hours after determining that they are UAC, except in exceptional circumstances. In addition, the 1997 Flores v. Reno Settlement Agreement (Flores Agreement) sets standards of care for UAC while in DHS or ORR custody, including, among other things, providing drinking water, food, and proper physical care and shelter for children. In 2015 and 2016, we reported on DHS’s and HHS’s care and custody of UAC, including the standard procedures that DHS follows to transfer UAC to ORR. ORR’s UAC policy guide states that the agency requests certain information from DHS when DHS refers children to ORR, including, for example, how DHS determined the child was unaccompanied. Depending on which DHS component or office is referring the child to ORR, DHS may provide information on the child in an automated manner directly into ORR’s UAC Portal—the official system of record for children in ORR’s care—or via email. ORR has cooperative agreements with residential care providers to house and care for UAC while they are in ORR custody. The aim is to provide housing and care in the least restrictive environment commensurate with the children’s safety and emotional and physical needs. In addition, these care providers are responsible for identifying and assessing the suitability of potential sponsors—generally a parent or other relative in the country—who can care for the child after the child leaves ORR custody. Release to a sponsor does not grant UAC legal immigration status. Children are scheduled for removal proceedings in immigration courts to determine whether they will be ordered removed from the United States or granted immigration relief. Once at the shelter, shelter staff typically conduct an intake assessment of the child within 24 hours, and then are to provide services such as health care and education. According to ORR’s UAC policy guide, shelter staff are responsible for meeting with the child to begin identifying potential sponsors, which can include parents. To assess the suitability of potential sponsors, including parents, ORR care providers collect information from potential sponsors to establish and identify their relationship to the child. For example, the screening conducted of potential sponsors includes various background checks and in June 2018, ORR implemented increased background check requirements that were outlined in an April 2018 memorandum of agreement with DHS. These changes required ORR staff to collect fingerprints from all potential sponsors, including parents, and all adults in the potential sponsor’s household and transmit the fingerprints to ICE to perform criminal and immigration status checks on ORR’s behalf. ICE was to submit the results to ORR, and ORR used this information, along with information provided by, and interviews with, the potential sponsors, to assess their suitability. However, in December 2018, ORR revised its background check policy to limit criminal and immigration status checks conducted by ICE to the potential sponsor, unless concerns about other adult household members are raised via a public records check, there is a documented risk to the safety of the child, the child is particularly vulnerable, or the case is referred for a home study. According to HHS and DHS officials we interviewed, the departments did not take specific steps in advance of the April 2018 memo to plan for family separations or a potential increase in the number of children who would be referred to ORR because they did not have advance notice of the memo. Specifically, ORR, CBP, and ICE officials we interviewed stated that they became aware of the April 2018 memo when it was announced publicly. Though they did not receive advance notice of the April 2018 memo, ORR officials stated that they were aware that increased separations of parents and children were occurring prior to the April memo. According to ORR officials, the percentage of children referred to ORR who were known to have been separated from their parents rose by more than tenfold from November 2016 to August 2017 (0.3 to 3.6 percent). In addition, the ORR shelter and field staff we interviewed at four ORR facilities in Arizona and Texas told us they started noticing an increase in the number of children separated from their parents in late 2017 and early 2018, prior to the April 2018 memo. The DHS officials we interviewed stated that, in some locations across the southwest border, there was an increase in the number of aliens CBP referred to DOJ for prosecution of immigration-related offenses after an Attorney General memo issued in April 2017. This memo prioritized enforcement of a number of criminal immigration-related offenses, including misdemeanor improper entry. In addition, CBP officials stated that there may have been an increase in children separated from non-parent relatives or other adults fraudulently posing as the child’s parents. According to ORR officials, in November 2017, ORR officials asked DHS officials to provide information about the increase in separated children. In response, DHS officials stated that DHS did not have an official policy to separate families, according to ORR officials. A few months prior to the April 2018 memo, ORR officials said they saw a continued increase in separated children in their care. ORR officials noted that they considered planning for continued increases in separated children, but HHS leadership advised ORR not to engage in such planning since DHS officials told them that DHS did not have an official policy of separating families. From July to November 2017, the Border Patrol sector in El Paso, Texas conducted an initiative to address an increase in apprehensions of families that sector officials had noted in early fiscal year 2017. Specifically, Border Patrol officials in the sector reached an agreement with the District of New Mexico U.S. Attorney’s Office to refer more individuals who had been apprehended, including parents who arrived with minor children, for criminal prosecution. Prior to this initiative, the U.S. Attorney’s Office in this district had placed limits on the number of referrals it would accept from Border Patrol for prosecution of immigration offenses. According to Border Patrol officials, under this initiative, the U.S. Attorney’s Office agreed to accept all referrals from Border Patrol in the El Paso sector for individuals with violations of 8 U.S.C. § 1325 (improper entry by alien) and § 1326 (reentry of removed aliens), consistent with the Attorney General’s 2017 memo directing federal prosecutors to prioritize such prosecutions. For those parents placed into criminal custody, Border Patrol referred their children to ORR’s care as UAC. According to a Border Patrol report on the initiative, the El Paso sector processed approximately 1,800 individuals in families and 281 individuals in families were separated under this initiative. Border Patrol headquarters directed the sector to end this initiative in November 2017, and Border Patrol officials stated that there were no other similar local initiatives that occurred prior to the Attorney General’s 2018 memo. When the April 2018 memo was released, there was no single database with easily extractable, reliable information on family separations. DHS and HHS subsequently updated their data systems in the spring and summer of 2018, but it is too soon to know the extent to which these changes, if fully implemented, will consistently indicate when children have been separated from the parents or will help reunify families, if appropriate. Specifically, prior to April 2018, CBP’s and ORR’s data systems did not include a designated field to indicate that a child was unaccompanied as a result of being separated from his or her parent, and ORR officials stated that such information was not always provided when children were transferred from DHS to HHS custody. According to agency officials, between April and August 2018, the agencies made changes to their data systems to help notate in their records when children are separated from parents. Regarding DHS, CBP’s Border Patrol and OFO made changes to their data systems to allow them to better indicate cases in which children were separated from their parents; however, ORR officials told us in September 2018, that they had been unaware that DHS had made these systems changes. According to Border Patrol officials, Border Patrol modified its system on April 19, 2018, to include yes/no check boxes to allow agents to indicate that a child was separated from their parent(s). However, Border Patrol officials told us that information on whether a child had been separated is not automatically included in the referral form sent to ORR. Rather, agents may indicate a separation in the referral notes sent electronically to ORR, but they are not required to do so, according to Border Patrol officials. While the changes to the system may make it easier for Border Patrol to identify children separated from their parents, ORR officials stated ORR may not receive information through this mechanism to help it identify or track separated children. Prior to this system modification, Border Patrol agents typically categorized a separated child as an unaccompanied child in its system and did not include information to indicate the child had been separated from a parent. CBP’s OFO, which encounters families presenting themselves at ports of entry, also modified its data system and issued guidance to its officers on June 29, 2018, to track children separated from their parents. OFO officials have access to the UAC Portal but typically email this information to ORR as part of the referral request. According to OFO officials, prior to that time, OFO designated children separated from their parents as unaccompanied. ORR updated the UAC Portal to include a check box for indicating that a child was separated from his or her parents. According to ORR officials, ORR made these changes on July 6, 2018, after the June 20 executive order and June 2018 court order to reunify families. According to ORR officials, prior to July 6, 2018, the UAC Portal did not have a systematic way to indicate whether a child was designated as unaccompanied as a result of being separated from a parent at the border. The updates allow those Border Patrol agents with direct access to the UAC Portal to check this box, and Border Patrol issued guidance on July 5, 2018, directing its agents to use the new indicator for separated children in the UAC Portal and provide the parent’s alien number in the UAC Portal when making referrals to ORR as of July 6, 2018. However, ORR officials also said that DHS components with access to the UAC Portal are not yet utilizing the new check box consistently. Staff at three of the four shelters we visited in Arizona and Texas in July and August of 2018 said that in most, but not all cases during the spring of 2018, DHS indicated in the custody transfer information that a child had been separated. Staff at one shelter estimated that for approximately 5 percent of the separated children in its care there was no information from DHS indicating parental separation. In these cases, shelter staff said they learned about the separation from the child during the shelter’s intake assessment. Staff at the same shelter, which cares for children ages 0 to 4, noted that intake assessments for younger children are different from intake for older children, as younger children are unable to provide detailed information on such issues as parental separation. While the updates that OFO and ORR have made to their data systems are a positive step, they do not fully address the broader coordination issues we identified in our previous work. Specifically, we identified weaknesses in DHS and HHS’s process for the referral of UAC. In 2015, we reported that the interagency process to refer and transfer UAC from DHS to HHS was inefficient and vulnerable to errors because it relied on emails and manual data entry, and documented standard procedures, including defined roles and responsibilities, did not exist. To increase the efficiency and improve the accuracy of the interagency UAC referral and placement process, we recommended that the Secretaries of DHS and HHS jointly develop and implement a documented interagency process with clearly defined roles and responsibilities, as well as procedures to disseminate placement decisions, for all agencies involved in the referral and placement of UAC in HHS shelters. In response, DHS officials told us DHS delivered a Joint Concept of Operations between DHS and HHS to Congress on July 31, 2018, which provides field guidance on interagency policies, procedures, and guidelines related to the processing of UAC transferred from DHS to HHS. DHS submitted the Joint Concept of Operations to us on September 26, 2018, in response to our recommendation. We are reviewing the extent to which the Joint Concept of Operations includes a documented interagency process with clearly defined roles and responsibilities, as well as procedures to disseminate placement decisions, for all agencies involved in the referral and placement of unaccompanied children, including those separated from parents at the border, in HHS shelters. Moreover, to fully address our recommendation, DHS and HHS should implement such interagency processes. DHS and HHS took various actions in response to the June 26, 2018, court order to identify and reunify children separated from their parents. The June 2018 court order required the government to reunite class member parents with their children under 5 years of age within 14 days of the order, and for children age 5 and over, within 30 days of the order. HHS officials told us that there were no specific procedures to reunite children with parents from whom they were separated at the border prior to the June 2018 court order. Rather, the agency used its standard procedures, developed to comply with the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (TVPRA), to consider potential sponsors for unaccompanied children in their custody; if a parent was available to become a sponsor, reunification with that parent was a possible outcome. DHS and HHS Efforts to Identify Potential Class Members. To create the list of potential class members (that is, those parents of a separated child covered under the lawsuit) eligible for reunification per the June 2018 court order, DHS and HHS officials told us that they generated the list based on children who were in DHS or HHS custody on that date. As a result, DHS and HHS officials told us that a parent of a separated child would only be a class member if his or her child was detained in DHS or HHS custody on June 26, 2018. After developing the class list, DHS and HHS officials told us that they next determined whether class members were eligible for reunification, as a class member could be determined ineligible for reunification if it was determined that the parent was unfit or presented a danger to the child. Parents of children who were separated at the border but whose children were released by ORR to sponsors prior to the June 2018 court order were not considered class members, and according to HHS officials, the department was not obligated to reunite them with the parent or parents from whom they were separated. Further, HHS officials told us that they do not know how many such children separated from parents at the border were released to sponsors prior to the order and that the court order does not require the department to know this information. Because there was no single database with information on family separations, HHS officials reported using three methods to determine which children in ORR’s custody as of June 26, 2018, had been separated from parents at the border: 1. Data Reviewed by an Interagency Data Team. An interagency team of data scientists and analysts—led by HHS’s Office of the Assistant Secretary for Preparedness and Response with participation from CBP, ICE, and ORR—used data and information provided by DHS and HHS to identify the locations of separated children and parents, according to HHS officials. 2. Case File Review. HHS reported that more than 100 HHS staff reviewed about 12,000 electronic case files of all children in its care as of June 26, 2018 for indications of separation in specific sections of each child’s case file, such as the phrases “zero tolerance,” “separated from ,” and “family separation.” 3. Review of Information Provided by Shelters. According to HHS officials, shelter staff were asked to provide lists of children in their care who were known to be separated from parents based on the shelter’s records. On the basis of its reviews, as of September 10, 2018, the government had identified 2,654 children of potential class members in the Ms. L. v. ICE case. Of the 2,654 children, 103 were age 0 to 4 and 2,551 were age 5 to 17. As previously discussed, the number of children of potential class members does not include those who were separated from parents but released to sponsors prior to the June 2018 court order or the more than 500 children who were reunified with parents by CBP in late June 2018, because these children were never transferred to ORR custody. As of September 10, 2018, 2,217 of the 2,654 identified children had been released from ORR custody, according to a joint status report filed in the Ms. L. v. ICE case. About 90 percent of the released children were reunited with the parent from whom they were separated and the remaining children were released under other circumstances. Children released under other circumstances could include those released to another sponsor such as a parent already in the United States, another relative, or an unrelated adult, or children who turned 18. Staff at one ORR facility we visited told us they planned to release some children under these circumstances. As of December 11, 2018, the government had identified additional possible separated children of potential class members for a total of 2,816. It had released 2,657 and 159 remained in ORR custody. However, the government has also reported that 79 of the children it initially identified as separated had not been separated from a parent. Excluding those 79 children from the 2,816 total would bring the total number of children separated to 2,737. Plan for Reunifying Children with Class Member Parents Within and Outside ICE’s Custody. The process used to reunify separated children with their class member parents in the Ms. L. v. ICE case evolved over time based on multiple court hearings and orders, according to HHS officials. After the June 2018 court order, HHS officials said the agency planned to reunify children using a process similar to their standard procedures for placing unaccompanied children with sponsors. However, according to agency officials, the agency realized that it would be difficult to meet the court’s reunification deadlines using its standard procedures and began developing a process for court approval that would expedite reunification for class members. As a result, from June 26, 2018 to July 10, 2018, the reunification process was refined and evolved iteratively based on court status conferences, according to HHS officials. ORR field and shelter staff we interviewed noted the impact of the continually changing reunification process; for example, staff at one shelter told us there were times when they would be following one process in the morning but a different one in the afternoon. On July 10, 2018, the court approved reunification procedures for the class members covered by the June 2018 court order. In the July 10, 2018 order that outlined these procedures, the court noted that the standard procedures developed by ORR pursuant to the TVPRA were meant to address “a different situation, namely, what to do with alien children who were apprehended without their parents at the border or otherwise” and that the agency’s standard procedures were not meant to apply to the situation presented in the Ms. L. v. ICE case, which involves parents and children who were apprehended together and then separated by government officials. The reunification procedures approved in the Ms. L. v. ICE case apply only to reunification of class members with their children and included determining (1) parentage and (2) whether the parent is fit to take care of the child or presents any danger to the child. Specifically: 1. Determining Parentage. Before July 10, 2018, to determine parentage for children ages 0 to 4, HHS officials said they initially used DNA swab testing instead of requiring documentation, such as birth certificates, stating that DNA swab testing was a prompt and efficient method for determining biological parentage in a significant number of cases. On July 10, 2018, the court approved the use of DNA testing “only when necessary to verify a legitimate, good-faith concern about parentage or to meet a reunification deadline.” HHS officials told us that at that point, to determine parentage, ORR relied on the determinations made by DHS when the family was separated and information ORR shelter staff had already collected through assessments of the children in their care. Unless there were specific doubts about the relationship, ORR did not collect additional information to confirm parentage, according to HHS officials. 2. Determining Fitness and Danger. To reunify class members, HHS also followed the procedures approved by the court on July 10, 2018 for determining whether a parent is fit and whether a parent presents a danger to the child. HHS used the fingerprints and criminal background check of the parent conducted by DHS when the individual was first taken into DHS custody rather than requiring the parent and other adults living in the household to submit fingerprints to ORR, as potential sponsors were typically required to do for unaccompanied children. According to HHS officials, ORR personnel also reviewed each child’s case file for any indication of a safety concern, such as allegations of abuse by the child. HHS did not require fingerprints of other adults living in the household where the parent and child will live. HHS also did not require parents to complete an ORR family reunification application as potential sponsors are typically required to do for unaccompanied children. The specific procedures for physical reunification varied depending on whether the parents were inside or outside of ICE custody. DHS and HHS took steps to coordinate their efforts to reunify children with parents who were in ICE custody, but experienced challenges. Generally, for parents in ICE custody, DHS transported parents to a detention facility close to their child and HHS transported the child to the same facility. At the facility HHS transferred custody of the child to ICE for final reunification. HHS officials said that in some instances children had to wait for parents for unreasonably long amounts of time and parents were transported to the wrong facilities. In one case, staff at one shelter told us that they had to stay two nights in a hotel with the child before reunification could occur. According to HHS officials, for families in which the parent was released into the interior of the United States, the reunification process involves ORR officials and shelter staff attempting to establish contact with the parent and determining whether the parent has “red flags” for parentage or child safety. These determinations are based on DHS-provided criminal background check summary information and case review of the child’s UAC Portal records. In cases where no red flags are found, HHS transports the child to the parent or the parent picks the child up at the ORR shelter. For more information on DHS and HHS reunification procedures for class member parents inside and outside ICE custody, see GAO-19-163. Chair DeGette, Ranking Member Guthrie, and Members of the Subcommittee, this concludes our prepared remarks. We would be happy to answer any questions that you may have. For further information regarding this testimony, please contact Kathryn A. Larin at (202) 512-7215 or larink@gao.gov or Rebecca Gambler at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony include Kathryn Bernet (Assistant Director), Elizabeth Morrison (Assistant Director), David Barish (Analyst-in-Charge), Andrea Dawson, Jason Palmer, and Leslie Sarapu. In addition, key support was provided by Susan Aschoff, James Bennett, Sarah Cornetto, Michael Kniss, Sheila R. McCoy, Jean McSween, Jan Montgomery, Heidi Nielson, and Almeta Spencer. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "On April 6, 2018, the Attorney General issued a memorandum on criminal prosecutions of immigration offenses. According to HHS officials, this resulted in a considerable increase in the number of minor children whom DHS separated from their parents after attempting to cross the U.S. border illegally. On June 20, 2018, the President issued an executive order directing that alien families generally be detained together, and on June 26, 2018, a federal judge ordered the government to reunify separated families. DHS is responsible for the apprehension and transfer of UAC to HHS. HHS is responsible for coordinating UAC placement and care. This testimony discusses DHS and HHS (1) planning efforts related to the Attorney General's April 2018 memo, (2) systems for indicating children were separated from parents, and (3) actions to reunify families in response to the June 2018 court order. It is based on a report GAO issued in October 2018. This testimony also includes updated data reported by the government on the number children separated from their parents subject to the court's reunification order and the number of those children in ORR custody as of December 11, 2018. Department of Homeland Security (DHS) and Department of Health and Human Services (HHS) officials GAO interviewed said the agencies did not plan for the potential increase in the number of children separated from their parent or legal guardian as a result of the Attorney General's April 2018 “zero tolerance” memo because they were unaware of the memo in advance of its public release. The memo directed Department of Justice prosecutors to accept for criminal prosecution all referrals from DHS of offenses related to improper entry into the United States, to the extent practicable. As a result, parents were placed in criminal detention, and their children were placed in the custody of HHS's Office of Refugee Resettlement (ORR). DHS and ORR treated separated children as unaccompanied alien children (UAC)—those under 18 years old with no lawful immigration status and no parent or legal guardian in the United States available to provide care and physical custody. Prior to April 2018, DHS and HHS did not have a consistent way to indicate in their data systems children and parents separated at the border. In April and July 2018, U.S. Customs and Border Protection's Border Patrol and ORR updated their data systems to allow them to indicate whether a child was separated. However, it is too soon to know the extent to which these changes, if fully implemented, will consistently indicate when children have been separated from their parents, or will help reunify families, if appropriate. In response to a June 26, 2018 court order to quickly reunify children separated from their parents, HHS determined how many children in its care were subject to the order and developed procedures for reunifying these families. As of September 2018, the government identified 2,654 children in ORR custody who potentially met reunification criteria, which does not include separated children released to sponsors prior to the June 2018 court order. On July 10, 2018, the court approved reunification procedures for the parents covered by the June 2018 court order. This July 10, 2018 order noted that ORR's standard procedures used to release UAC from its care to sponsors were not meant to apply in this circumstance, in which parents and children who were apprehended together were separated by government officials. Since GAO's October 2018 report, the government identified additional children separated from parents subject to the court's reunification order and released additional children from its custody (see figure). GAO recommended in 2015 that DHS and HHS improve their process for transferring UAC from DHS to HHS custody. DHS and HHS concurred and have taken action, but have not fully implemented the recommendation.", "document_type": "gao"}
{"report": "Different aviation industry employers have distinct workforce needs and may require workers with specific skillsets depending on the type of work performed. The aviation maintenance workforce includes FAA-certificated mechanics and repairmen, as well as non-certificated workers. FAA-certificated mechanics inspect, service, and repair aircraft bodies (airframe) and engines (powerplant), and only they can approve an aircraft for return to service. FAA-certificated mechanics can earn an airframe rating, a powerplant rating, or an airframe and powerplant (A&P) rating. It can take between 1 and 3 years to obtain the required education or training to become certificated. If an FAA- certificated mechanic changes employers, the certificate remains valid. FAA-certificated repairmen service aircraft components and must be recommended for certification by their employer to perform specific tasks such as welding or painting. It can take more than a year to obtain the required experience or training to become certificated. FAA-certificated repairmen are employed by entities such as repair stations that are authorized by FAA to perform specific tasks. A repairman certificate is only valid at the employer for which it was issued. Non-certificated aviation maintenance workers include individuals who are supervised by certificated mechanics or repairmen in performing repair work. FAA maintains data on certificated mechanics and repairmen, including data on characteristics such as age and sex. FAA also maintains some data on non-certificated workers, such as the number employed by FAA- certificated repair stations, but neither the federal government nor the aviation industry maintains data on the total number of non-certificated aviation maintenance workers. Career pathways consist of education, training, and support services that enable individuals to obtain industry-relevant certification and employment. There are three distinct pathways to become eligible to take the FAA mechanic tests—military training and experience, AMT School, and practical, or civil work experience (see fig. 1). FAA collects data on the use of the different pathways to becoming a certificated mechanic. Individuals must pass the FAA mechanic tests to become certificated, regardless of the pathway they take to become eligible to take the tests. There are three tests—written, oral, and practical. FAA publishes testing standards for the oral and practical skills tests. Military training and experience. The Community College of the Air Force administers an FAA-approved A&P training program which consists of on-the-job training and various courses for military service members with certain experience. When service members successfully complete the program, the Joint Services Aviation Maintenance Technician Certification Council issues them a certificate of eligibility to take the FAA mechanic tests (see side bar). Aviation Maintenance Technician School. Individuals may also attend an FAA-approved AMT School to become eligible to take the FAA mechanic tests. FAA approves and oversees AMT Schools and it maintains enrollment and mechanic test pass-rate data for each school. The minimum curriculum requirements for these schools are currently prescribed in regulation. The regulation includes the subjects the curriculum must cover and the number of training hours students must complete to become eligible to take the FAA mechanic tests. Given that AMT School curriculum requirements are in regulation, FAA has in the past attempted to amend the requirements through the federal rulemaking process. Practical work experience. People can also become eligible to take the FAA mechanic tests by demonstrating practical, or civil work experience. Individuals may work under the supervision of a certificated mechanic for 18 months for either an airframe or powerplant certificate, or 30 months for an A&P certificate. Practical work experience includes apprenticeships, which combine on-the-job training with classroom instruction. For certificated repairmen, there is no prescribed test, though repairmen must demonstrate their practical experience or have completed formal training to be certificated. Avionics technicians also have no prescribed test, but may seek certain related certifications. The Standard Occupational Classification (SOC) system is a federal statistical standard used to classify workers into occupational categories for purposes of collecting, calculating, or disseminating data such as employment levels and pay. The SOC structure forms the basis for the occupational coding system used by BLS’ Occupational Employment Statistics survey and Current Population Survey. Aviation maintenance workers generally fall into the avionics technicians or the aircraft mechanics and service technicians occupational group (see fig. 2). Both occupational groups include certificated and non-certificated individuals. The most recent revision to the SOC was for 2018. In addition to the Department of Transportation (DOT) and FAA, several other federal agencies play a role in developing and maintaining a qualified aviation professional workforce. For example, we previously reported on related efforts administered by DOD, DOL, VA, and Education. These agencies provide either financial assistance for education or training in aviation maintenance related fields or administer programs that support career pathways to becoming an FAA-certificated mechanic or repairman. As of December 2018, about 295,000 individuals held a mechanic certificate and about 35,000 held a repairman certificate. The median age of FAA-certificated mechanics and repairmen was 54 years old, according to our analysis of the FAA data. Specifically, 52 percent were between the ages of 50 and 70 years old; 19 percent were between 39 and 49; and 19 percent were between 18 and 38. The remaining 10 percent were between the ages of 71 and 89 years old (see fig. 3). In comparison, about 23 percent of the overall workforce was age 55 or over according to BLS data as of 2018. Our analysis of FAA data also found that 3 percent of all aviation maintenance certificate holders were women as of December 2018. This percentage has not changed since we last reported on this workforce in 2014. In comparison, BLS data as of 2018 show that women made-up 47 percent of the total workforce. We were not able to analyze other demographic characteristics for these certificate holders, such as race or ethnicity, because neither FAA nor BLS collects these data. FAA data for 2015 through 2018 also provide some information on the education and work experience of certificated mechanics. These data show that attending AMT School was the most common pathway certificated individuals used to qualify for the FAA tests to become mechanics (see fig. 4). In addition, FAA data provide information on the number of newly certificated individuals and indicate that FAA certificated about 8,600 mechanics and repairmen on average each year for 2014 through 2018 (see fig. 5). BLS data project an annual average of 11,800 job openings in the United States from 2018-2028 for the aircraft mechanics and service technicians occupation due to growth and replacement, which include job openings for both certificated and non-certificated workers. The supply of workers to fill any open or projected job openings in the aviation industry, however, not only depends on the number of people qualified to do the work, but also their availability and willingness to work at a certain wage and under particular working conditions. While FAA data provide information on the number of mechanic and repairman certificate holders who are qualified to perform certain work, less is known about the number of them who are available and willing to work in the aviation industry. FAA data show there were approximately 330,000 certificated mechanics and repairmen as of December 2018, but FAA officials said this number likely overestimates the number of individuals working in the aviation industry. BLS data indicate 136,900 were employed in the aircraft mechanics and service technicians occupation in 2018, but it is not clear how many of those jobs were filled by FAA- certificated workers. In addition, it is unknown how many of the approximately 330,000 certificate holders are retired, deceased, or working in other industries. Individuals who obtain a mechanic certificate from FAA may never work in the aviation industry, or may begin their career in the aviation industry and leave for a job in another industry. Several stakeholders we interviewed said FAA-certificated mechanics possess certain skills that are transferrable to other industries and leave the aviation industry to work for other employers, such as amusement parks. Furthermore, officials explained that once certificated, there is no certification renewal requirement for mechanics. BLS publishes some data on pay for aircraft mechanics and service technicians, such as average hourly and annual wages. However, the occupational classification system BLS and other federal statistical agencies use for aircraft mechanics and service technicians does not distinguish between FAA-certificated and non-certificated workers. This is in part because workers are classified by the work they perform and not necessarily by certification or education, according to SOC classification system principles. As a result, it is difficult to determine employment characteristics such as pay for certificated workers, specifically. BLS data as of May 2018 show that annual wages for aircraft mechanics and service technicians ranged from about $37,000 to about $98,000. According to BLS officials, it is not uncommon for there to be a wide salary range across an occupation, as wages may vary depending on factors such as experience, education, and skills. A DOD official we interviewed also said that employers have told him that they pay certificated aviation maintenance workers more than non-certificated workers. BLS officials said they collected wage and employment data for certificated workers separate from non-certificated workers in employer surveys conducted between 2000 and 2012. However, officials said they stopped collecting these data in part because employers inconsistently reported them. Data limitations at the federal and state levels also make it difficult to determine the demand for certificated aviation maintenance workers. BLS occupational data. On the federal level, BLS occupational outlook data provide some information on potential future demand nationwide for aviation maintenance workers, but the data do not distinguish between certificated and non-certificated workers. As a result, the data provide limited detail about the demand for certificated workers, specifically. According to BLS data, total employment for the aircraft mechanics and service technicians occupation is projected to grow about 3 percent over the 2018 to 2028 time frame, which is slower than the average for all occupations. As previously mentioned, these data project an annual average of 11,800 job openings for this occupation from 2018 to 2028 due to job growth and replacement. DOL certification data. On its public website for career planning and job search, CareerOneStop, DOL provides information on certifications that are frequently mentioned in online job postings and considered to be in-demand. DOL also indicates in its online resources which certifications may draw on training and experience gained in the military. However, DOL does not track or publish data on the demand for occupational licenses, including federal licenses such as FAA’s A&P certification. DOL officials said currently there are no plans to expand the agency’s data collection to include information on the demand for occupational licenses. DOL officials added that for certain jobs that require licenses, the demand for the required licenses mirrors occupational demand for those jobs so collecting those data may not be as meaningful. Workforce Innovation and Opportunity Act plans. On the state level, Workforce Innovation and Opportunity Act plans, intended in part to outline states’ use of federal funds to help workers meet employers’ needs, provide some geographically-specific information on the demand for workers in the aviation industry. Our review of states’ most recent Workforce Innovation and Opportunity Act plans found that 19 states identified the aerospace and aviation industry as a targeted sector for development. However, only certain plans specifically mention the need for certificated mechanics; others refer to the aviation industry more broadly. Employers we interviewed had differing perspectives on potential growth in demand for aviation maintenance workers; some said they were experiencing difficulty finding enough workers to meet their needs, while others said they were not experiencing difficulty. While some stakeholders voiced concerns about the potential for a labor shortage, the selected labor market indicators we reviewed for aircraft mechanics and service technicians (unemployment, wages, and employment) from 2013 through 2018 were not all consistent with the existence of hiring difficulties. See appendix I for our analysis. Officials we interviewed from a regional airline said the majority of the airline’s certificated mechanics come to them directly after completing AMT School and that the airline was having a difficult time finding enough mechanics to fill 60 open full-time positions. On the other hand, officials we interviewed from a major airline said the airline rarely hires certificated mechanics right out of AMT School and that their employees typically come to them with a number of years of experience. The officials from the major airline said that they were not experiencing difficulty recruiting and retaining aviation maintenance workers, but noted that regional airlines may experience hiring difficulties first if there is a shortage of these workers because certificated mechanics often start their careers at regional airlines to gain practical experience before moving on to work at a major airline. Registered Apprenticeship Program Serving Underrepresented Populations The Department of Labor awarded the Connecticut Department of Labor Office of Apprenticeship Training a $1,550,000 grant to fund the Connecticut Apprenticeship Expansion Rx project, which targets the aviation industry, among others. The project aims to serve over 1,600 apprentices and provide underrepresented populations, including women, dislocated, and under- employed individuals an opportunity to acquire industry required credentials. Key partners include industry, educational institutions, and labor unions. Registered Apprenticeship Program for Airframe and Powerplant Mechanics As part of the State Apprenticeship Expansion grant, the Alaska Department of Labor and Workforce Development (DOLWD) is implementing registered apprenticeships in aviation, a relatively new industry in using the apprenticeship model. With the help of the U.S. Department of Labor Office of Apprenticeship in Alaska, two aviation occupations have been approved: Airframe & Powerplant Mechanic and Air Transport Pilot. The Alaska state Apprenticeship Coordinator is working closely with the U.S. Department of Labor Office of Apprenticeship and individual air carriers across Alaska to develop and implement registered apprenticeships for these occupations. Alaska DOLWD has approximately 12 mechanic apprentices and 2 air transport pilot apprentices with various air carrier employers. support Registered Apprenticeship Programs— employer-driven training opportunities that combine on-the-job learning with related classroom instruction. The program facilitates coordination among different stakeholders such as industry, states, and educational institutions to support apprenticeships and employment opportunities. DOL awarded almost $3.8 million in grants and contracts from 2014 through 2018 to promote these apprenticeships for aviation maintenance workers. For example, one grantee is aiming to serve underrepresented populations in the aviation industry, including women, and another is coordinating with industry to develop a registered apprenticeship program for certificated mechanics (see side bars). In addition, the United Services Military Apprenticeship Program, a DOL registered program, provides service members an opportunity to improve skills and qualify for employment in a recognized civilian trade, including as an A&P mechanic, upon completion of military service. VA’s Post-9/11 GI Bill Program. The Post-9/11 Veterans Educational Assistance Act of 2008 (Post-9/11 GI Bill) provides funding for veterans to pursue an approved program of education, including undergraduate and graduate degrees, non-college degree programs, apprenticeships, and on-the-job training. VA data show approximately $42 million in Post-9/11 GI Bill funds were awarded in fiscal year 2018 to 4,200 veterans enrolled in aviation maintenance post-secondary programs, which include programs at FAA-approved AMT Schools. Education’s financial assistance. Education provides billions of dollars in federal assistance to support students pursuing higher education, which may include training in aviation-related fields. We previously reported that in academic year 2011-2012, Education disbursed $918 million in federal grants to 142,708 recipients and $1.3 billion in federal loans to 114,564 recipients pursuing aircraft mechanic and avionics programs. DOT’s workforce development grant program. DOT is also developing a process for administering a workforce development grant program for aviation maintenance workers. Specifically, the FAA Reauthorization Act of 2018 included a provision for DOT to establish an aviation maintenance workforce development grant program. Once established, eligible entities such as aircraft repair stations, unions, educational institutions, and state or local governments may apply for grants. The program may provide grants for projects such as establishing new educational programs or scholarships for individuals seeking employment in the aviation maintenance industry and supporting service members transitioning into aviation maintenance related careers. In addition, FAA has taken steps to engage other key stakeholders on aviation workforce development initiatives. In September 2018, FAA sponsored an Aviation Workforce Symposium that included participants from industry, AMT Schools, and federal agencies such as Education and DOL. Discussion topics included building the pipeline of workers, maximizing efficiency in training, and promoting productive partnerships. Subsequent to the 2018 symposium, FAA established an Aviation Workforce Steering Committee in February 2019, in part to coordinate efforts across FAA to address various workforce related provisions included in the FAA Reauthorization Act of 2018. The steering committee finalized its charter in April 2019, and the charter states FAA’s intentions of developing productive partnerships with industry, government, and educational institutions to expand the pipeline of aviation safety professionals. As of October 2019, FAA was finalizing a working group structure to carry out the steering committee’s work that will focus on: (1) marketing/communications, (2) educational outreach, (3) training, and (4) partnerships. FAA officials also told us they plan to collaborate with other federal agencies moving forward, including Education, DOL, and DOD. For example, FAA and DOD officials said they are currently discussing options for streamlining pathways for service members with aviation maintenance backgrounds to move into civilian careers in aviation maintenance. According to a DOD official, streamlining pathways could increase the number of service members who become FAA-certificated mechanics and leverage the skills of the over 250,000 current service members with aviation maintenance backgrounds. Additional examples of states, industry employers, and AMT Schools coordinating or partnering to support the aviation maintenance workforce include: Career grants. One state we visited developed a career grant to align students’ programs of study with in-demand occupations in the state. The grant provides tuition assistance to in-state residents working toward selected certificates or degrees at eligible in-state colleges or universities, including aviation maintenance programs. Military pathway program. Officials from a regional airline we interviewed said the airline developed a military transition program to assist service members in preparing for the FAA mechanic tests. The airline funds 100 percent of the program cost, which according to officials is about $11,000 per person. As part of the program, airline officials told us they provide about $5,000 worth of tools to each participant. Training equipment and funding. Officials we interviewed from one school said they strategically opened their AMT program next to a major cargo airline so that students could benefit from employment opportunities there. The officials said the airline also benefits from the close proximity of the school in that it is able to leverage local talent, and the airline provides AMT School students with scholarships, technical support, and surplus equipment to use for training. In another example, officials from a major commercial airline told us the airline partners with over 40 AMT Schools and provides them with funding to improve operations and recruitment. Officials said the goal of the program is to ensure the airline has a pipeline of workers to fill any future job openings. Despite FAA’s recent efforts to coordinate with other federal agencies on expanding and streamlining pathways for aviation maintenance careers, we found that FAA does not routinely analyze, collect, or coordinate with other stakeholders on certain related data. Such activities could assist FAA in measuring progress toward meeting its workforce related objectives and inform strategic decisions for promoting the development of this workforce. For example, FAA’s strategic plan includes an objective on promoting the development of a robust aviation workforce. In addition, FAA’s Aviation Workforce Steering Committee charter emphasizes providing diverse populations, including youth, women, and minorities, with clear pathways into aviation careers to expand the talent pool from which both government and industry may recruit. However, neither the strategic plan nor the steering committee charter provides specific information on how FAA plans to select and measure any efforts it undertakes related to these objectives. Prior GAO work has emphasized that strategic workforce planning requires monitoring and evaluating progress toward goals, and federal internal control standards state that management should use quality information to achieve its objectives. We identified several areas in which improved data analysis, collection, or coordination could assist FAA in measuring progress and understanding how to target its resources in support of its workforce related objectives. Demographic data. FAA collects certain demographic data on its A&P certification application, such as the age and sex of individuals; however, FAA currently uses these data only to determine eligibility and issue certificates, according to FAA officials. These data could also be used to identify patterns or relationships, such as the trend in female certificate holders by pathway, which could be useful information as FAA aims to increase opportunities for women to pursue aviation maintenance careers. In addition, FAA does not currently collect data on the race and ethnicity of certificated individuals. Such data could provide additional information on the demographics of certificated individuals and help FAA or other stakeholders monitor the progress of any efforts to diversify this workforce. FAA could also leverage BLS data on the race and ethnicity of certificated and non-certificated aircraft mechanics and service technicians more broadly as it begins to develop and implement any activities related to expanding and diversifying the talent pool for recruiting workers into aviation maintenance careers. Pathway data. FAA also maintains mechanic pathway data, but these data do not provide a complete picture of certificated individuals’ education, training, and work experience due to certain data limitations. For example, FAA does not require AMT Schools to report program completion data. As a result, it does not have information such as how many students who enter FAA-approved AMT Schools complete the program. Moreover, FAA does not analyze nationwide trends for AMT Schools using existing data on these schools (such as enrollment or mechanic test pass-rate data) or aggregate information across AMT Schools to better understand the AMT School pathway as a whole. In addition, pathway data collected by FAA do not clearly differentiate between civil and military work experience. Specifically, FAA officials said practical, or civil, work experience pathway data may include information on individuals with both prior military and civil experience. Moreover, according to an FAA official, FAA’s military experience pathway data may include individuals who completed DOD’s FAA- approved A&P training program as well as individuals who met FAA’s on-the-job training requirements through relevant military experience. Combined pathway data may limit FAA’s and DOD’s understanding of DOD’s contributions to this workforce, including the number of individuals who completed DOD’s FAA-approved A&P training program and subsequently obtained mechanic certification from FAA. Supply and demand data. Other federal agencies, such as BLS and DOD, maintain data that relate to this workforce more broadly that could be useful to FAA. For example, FAA could leverage BLS data on the projected employment of certificated and non-certificated aircraft mechanics and service technicians in conjunction with its data on newly certificated workers each year to better understand worker supply and demand. DOD also maintains information on separating service members with aviation maintenance backgrounds, who may be attractive to the commercial aviation industry. For example, according to a DOD official, in fiscal year 2018 over 22,000 service members with aviation maintenance backgrounds separated from the Air Force and Navy. Additional data analysis and coordination could potentially yield useful information on worker supply and demand and areas for promoting the development of this workforce. Without routinely analyzing its existing data on certificated workers, collecting additional data, or leveraging existing workforce data maintained by other federal agencies, FAA will not have certain information it needs to measure progress and strategically target its resources toward its objective of promoting the development of a robust aviation workforce. A robust aviation workforce, including certificated mechanics and repairmen, is necessary for maintaining a safe aviation system. FAA’s recently developed Aviation Workforce Steering Committee presents the agency with an opportunity to engage other federal agencies in discussions on how to leverage data to expand and diversify this workforce. Even as FAA’s strategic plan states the agency’s focus on promoting the development of a skilled aviation maintenance workforce to integrate new technologies, the agency has acknowledged that the current curriculum requirements for AMT Schools and mechanic testing standards are outdated. Efforts to revise the curriculum requirements for AMT Schools are ongoing through the rulemaking process, and FAA is also currently updating the testing standards for mechanics. The curriculum requirements for AMT Schools have remained largely unchanged for several decades despite numerous attempts to update them as aviation technology has evolved. The minimum requirements are established in regulation and list the subjects that AMT Schools must include in their training curriculum for individuals to be eligible to take FAA’s mechanic tests. FAA officials, employers, and AMT School officials we interviewed said the current curriculum requirements do not emphasize commonly used modern aircraft technologies, such as avionics and composite materials. Because the curriculum requirements are established in federal regulation, FAA has attempted several times to revise them through the rulemaking process. Table 1 provides selected changes or actions relating to these requirements. FAA officials noted several challenges to updating the AMT School curriculum requirements, including competing demands at the department level, the extent of comments FAA has received from stakeholders in response to proposed changes, and the amount of time required to coordinate with internal stakeholders during the review process. We previously reported on factors that affect the amount of time needed to issue a rule for selected agencies, which included similar challenges such as the complexity of an issue, agency management priorities, and the amount of review required at different phases of the rulemaking process. In October 2015, FAA published a notice of proposed rulemaking (NPRM) with the stated goal of updating the existing AMT School curriculum and providing an efficient means of changing specific course items by including them in each school’s operations specifications (see fig. 6). This would eliminate the need to go through the federal rulemaking process to update the curriculum. As part of its ongoing efforts to revise the curriculum requirements for AMT Schools through the rulemaking process, FAA issued a supplemental NPRM in the April 2019 Federal Register that expanded the scope of the NPRM it issued in October 2015 (see fig. 6). Comments on the supplemental NPRM were due in June 2019. As of October 2019, FAA officials said they were in the process of reviewing the comments. In a separate effort outside of the rulemaking process, FAA is currently updating the testing standards for mechanics. The standards were last revised in 2015. FAA has acknowledged that current mechanic testing standards are also outdated. As a result, aviation stakeholders have stated that the mechanic tests include outdated or irrelevant questions. For example, the practical test may include projects on wood airframes and fabric coverings, which are not common to modern commercial aircraft. FAA has stated that the revised testing standards will provide a comprehensive framework for the mechanic tests and serve as a guide for reviewing and revising the oral and written test questions and the practical projects. FAA officials said two offices within the agency are responsible for updating AMT School training curriculum requirements and mechanic testing standards and that these offices have been coordinating efforts to align the two. FAA’s efforts to modernize the curriculum requirements for AMT Schools and its efforts to update the mechanic testing standards started on slightly different paths, in part due to differences in when the working groups were formed and recommendations to address these issues were made (see fig. 7). As of October 2019, FAA had not issued a final rule for modernizing AMT School curriculum requirements as required by the FAA Reauthorization Act of 2018, and it was still in the process of updating testing standards. FAA officials have indicated that they have informed the appropriate committees in Congress that the proposed schedule for issuance of a final rule is in October 2020 and said that the revised mechanic testing standards would likely be finalized after the publication of the final rule amending the curriculum requirements for AMT Schools. An FAA official noted that any delay in finalizing the rule would likely result in a corresponding delay to finalizing the testing standards. Delaying the release of the updated mechanic testing standards could result in the prolonged use of outdated or irrelevant questions on the mechanic tests. FAA officials said that once finalized and implemented, the updated curriculum requirements for AMT Schools and the mechanic testing standards for individuals should be mostly aligned. A sufficient supply of aviation maintenance workers is critical to maintaining a safe and robust aviation system and meeting the growing demand for air travel. Current training and skills requirements for these workers are also important because of changing flight technology. Both the federal government and other industries benefit from having a professional, trained, and qualified workforce, and addressing aviation workforce needs is a shared responsibility among these different stakeholders. As the federal agency responsible for certificating aircraft mechanics and repairmen, FAA maintains certain demographic information on these individuals that could shed light on the characteristics and employment of these personnel. However, without strategically using or analyzing the data it has along with data other stakeholders collect, FAA will not have certain information it needs to target its resources or measure and improve progress toward its aviation workforce goals. It may also miss the opportunity to provide other stakeholders with valuable information for supporting these workers. Other agencies and stakeholders may also assist FAA in understanding and promoting the development of the aviation maintenance workforce. FAA’s recently developed Aviation Workforce Steering Committee presents the agency with an opportunity to engage other federal agencies to explore potential data sources and their usefulness and discuss ways to expand, diversify, and strengthen career pathways for the aviation maintenance workforce. The Administrator of FAA should direct the Aviation Workforce Steering Committee, as part of its ongoing efforts, to take steps to use existing FAA data and coordinate with other federal agencies to identify and gather the information it needs to measure progress and target resources toward its goal of promoting a robust, qualified, and diverse aviation maintenance workforce. For example, FAA could task a committee working group with developing and implementing ways to improve data sharing among federal agencies to inform decision-making on how to strengthen career pathways and better understand the supply and demand of certificated workers. (Recommendation 1) We provided a draft of this report to DOT, DOL, Education, DOD, and VA for review and comment. DOT provided written comments, which are reprinted in appendix II. DOT concurred with our recommendation. Specifically, DOT agreed that using existing data could potentially contribute to its efforts to develop the aviation maintenance workforce. DOT said it will ask the Aviation Workforce Steering Committee to consider using existing FAA data and to coordinate with other federal agencies regarding other potential data sources to support the FAA’s aviation maintenance workforce goals. DOL provided technical comments, which we incorporated in the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, the Secretary of the Department of Labor, the Secretary of the Department of Education, the Secretary of the Department of Defense, the Secretary of the Department of Veterans Affairs, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or gurkinc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. While no single metric can be used to determine whether a labor shortage exists, certain indicators in conjunction with views of stakeholders can provide insight on this issue. We previously found, based on our review of economic research, that an occupation experiencing a labor shortage would exhibit the following: (1) a low unemployment rate signaling limited availability of workers in that profession, (2) increases in wages offered to draw people into that profession, and (3) increases in employment due to increases in demand for that occupation. Table 2 shows these specific indicators from 2013 through 2018 for the aircraft mechanics and service technicians occupation, measured using Bureau of Labor Statistics (BLS) Current Population Survey data. According to our analysis of BLS data from 2013 through 2018, unemployment rate and change in median wage earnings for the aircraft mechanics and service technicians occupation, which includes both Federal Aviation Administration-certificated and non-certificated workers, were consistent with the existence of hiring difficulties, while the percent change in employment was not. Data on two of the three indicators (unemployment rate and wage earnings) were consistent with difficulties in hiring aircraft mechanics and service technicians. However, because these data combine information for certificated and non-certificated workers, it is difficult to know the extent to which any hiring difficulties represent demand for certificated workers, specifically. In addition, the indicators should be viewed with appropriate caveats. For example, while median wages increased for aircraft mechanics and service technicians in 2018 compared to 2013, they did not increase in every year—and they exhibited decreases of as much as 6.7 percent. The direction of change of the employment indicator was not consistent with hiring difficulties for this occupation. As shown in table 2, from 2013 through 2018, employment for aircraft mechanics and service technicians does not appear to have changed, while employment for all other occupations increased. However, employment for this occupation did not remain constant in every year over that time period and exhibited increases of as much as 12.5 percent and decreases of as much as 21.9 percent. Chelsa Kenney Gurkin at (202) 512-7215 or Gurkinc@gao.gov. In addition to the contact named above, Betty Ward-Zukerman (Assistant Director), Meredith Moore (Analyst-in-Charge), Ellie Klein, and Chris Woika made key contributions to this report. Additional assistance was provided by James Bennett, Lilia Chaidez, Holly Dye, Serena Lo, Sheila R. McCoy, John Mingus, Michael Naretta, James Rebbe, Almeta Spencer, and Andrew Von Ah.", "summary": "FAA requires that only mechanics who are “certificated” by the FAA approve aircraft for return to service. The required training to become a certificated mechanic can take between 1 and 3 years. FAA also oversees the certification of repairmen who work on aircraft parts. Some stakeholders have expressed concern that retirements and attrition could adversely affect the capacity of this workforce to meet the growing demand for air travel, and that mechanic curriculum is outdated. The FAA Reauthorization Act of 2018 included provisions for GAO to examine the aviation workforce. This report examines (1) what available federal data reveal about the FAA-certificated aviation maintenance workforce; (2) how selected government agencies, educational institutions, and businesses provide support and coordinate to develop the aviation maintenance workforce; and (3) the progress FAA has made in updating its curriculum and testing standards for mechanics. GAO analyzed FAA data on certificate holders as of December 2018; reviewed BLS employment data for 2013 through 2018; reviewed relevant federal laws and regulations; and interviewed selected federal agency, industry, and AMT School officials. Federal data provide an incomplete picture of the Federal Aviation Administration (FAA)-certificated aviation maintenance workforce. A sufficient supply of certificated workers is critical for safety and to meet the growing demand for air travel. However, supply and demand data for certificated workers are limited. FAA maintains data on the number of individuals newly certificated each year (see figure), but less is known about how many certificated individuals exit the aviation industry each year and the extent of growing demand. Bureau of Labor Statistics (BLS) data provide some information on pay and demand for aviation maintenance workers more broadly, but do not differentiate between FAA-certificated and non-certificated workers due to data collection challenges. Demographic data may also be useful for workforce analysis and planning. FAA data provide some demographic information on certificated mechanics and repairmen, such as age and sex, but the agency lacks data on race and ethnicity. According to GAO analysis of FAA data, over half of the roughly 330,000 mechanics and repairmen FAA had certificated as of December 2018 were between 50 and 70 years old and 97 percent were men. Government agencies, educational institutions, and businesses coordinate to some extent in support of this workforce, but FAA lacks certain information—including information maintained by other agencies that administer related programs—that could advance its workforce development efforts. One of FAA's strategic objectives includes promoting the development of a robust, skilled aviation workforce, and the agency established a committee, in part, to explore ways to diversify this workforce; however, FAA is not currently positioned to understand whether its efforts are optimally targeted or effective. Without routinely analyzing its own data or leveraging others' data, FAA may not have certain information it needs to track or ensure progress toward its workforce development goals. FAA has acknowledged that curriculum requirements for Aviation Maintenance Technician (AMT) Schools and mechanic testing standards are outdated. Efforts to revise the curriculum requirements for AMT Schools are ongoing and FAA officials told GAO that a final rule will be published some time toward the end of 2020. FAA officials indicated that the revised mechanic testing standards would likely be finalized after. GAO recommends that FAA use its existing data and coordinate with other federal agencies to identify and gather information to measure progress and target resources toward its goal of promoting a robust, qualified, and diverse aviation maintenance workforce. FAA agreed with the recommendation.", "document_type": "gao"}
{"report": "CMS and states jointly administer the Medicaid program and generally share in the financing of Medicaid payments according to a formula established in law. States may deliver health care services to Medicaid beneficiaries through fee-for-service payments to participating providers or through Medicaid managed care plans, through which states pay plans a fixed amount per beneficiary—typically per member per month—to provide a specific set of Medicaid-covered services. States finance their share (nonfederal share) of Medicaid program spending in a variety of ways, including state funds, such as state general funds appropriated to the state Medicaid program and funds collected through taxes levied on health care providers. Within limits, however, states may also use other sources of funds—including funding from local government providers, such as county-owned or county-operated hospitals, or from local governments on behalf of government providers. Federal law allows states to finance up to 60 percent of the nonfederal share of Medicaid payments from local government funds. State Medicaid agencies have two primary mechanisms for making payments to hospitals—base payments and supplemental payments— and both can qualify for federal matching funds. Base payments are payments to hospitals for specific services provided to Medicaid beneficiaries through both fee-for-service and managed care. These payments are set by state Medicaid programs or managed care plans, and can vary considerably across states for the same services. Payment amounts for the same service may also vary within a state. States’ Medicaid base payments are typically lower than other payers’, and often are below the costs of providing services. Supplemental payments are typically lump sum payments made to hospitals that are not specifically tied to an individual’s care. Like all Medicaid payments, supplemental payments are required to be economical and efficient. Supplemental payments can be grouped into two broad categories: (1) DSH payments, which states are required to make to certain hospitals; and (2) non-DSH payments, which states are allowed to make, but are not required by law. DSH payments are designed to help offset uncompensated care costs for hospitals serving a high proportion of Medicaid beneficiaries and uninsured low-income patients. In fiscal year 2017, total DSH payments to hospitals nationally were about $18.1 billion. States may distribute DSH payments to any eligible hospital in the state; however, under federal law, the total amount of DSH payments to a hospital must not be more than the total amount of uncompensated care provided by the hospital (both the Medicaid shortfall and uncompensated costs for care for the uninsured). To be eligible for a DSH payment, hospitals must meet minimum requirements such as having a Medicaid inpatient utilization rate of at least 1 percent. States are required to make DSH payments to certain hospitals—termed deemed-DSH hospitals—with a Medicaid inpatient utilization rate of at least one standard deviation above the mean for hospitals in the state that receive Medicaid payments, or a low-income utilization rate that exceeds 25 percent. The amount of federal funding each state may claim for DSH payments is limited by federal law. Since fiscal year 1993, each state is subject to a federal DSH allotment that establishes the maximum federal funding available for the payments. A state’s DSH allotment is largely based on its fiscal year 1992 DSH spending, although Congress has since made several incremental adjustments to these allotments. Ultimately, however, the states that spent the most in fiscal year 1992 continue to have the largest allotments; conversely, the states that spent the least in fiscal year 1992 have the smallest allotments. States may choose to make DSH payments to institutions for mental disease (IMD), which can include state-operated psychiatric hospitals. Prior to 1997, a large share of DSH payments went to state-operated IMDs, where they were used to pay for services not covered by Medicaid and any remaining funds were returned to the state treasuries. In general, Medicaid excludes fee-for-service base payments for beneficiaries aged 21-64 who are residents of IMDs—called the IMD exclusion—and using DSH payments allowed states to support the costs of IMDs. In 1997, Congress restricted the total amount of DSH payments a state could make to IMDs as a group by establishing an annual limit on payments to IMDs for each state. Any unspent funds within the IMD-designated limit can be used for other hospital types. Non-DSH payments include four types of supplemental payments that states may make, but are not required to do so, to hospitals and other providers. Medicaid upper payment limit (UPL) payments are lump-sum payments that are made in addition to fee-for-service base payments. The UPL is a limit or ceiling on the amount of a state’s Medicaid payments for which the federal government will match spending. The UPL is based on the difference between Medicaid fee-for-service base payments and an estimate of what Medicare would pay for comparable services. The UPL is not a hospital-specific limit, but is applied in the aggregate across certain categories of providers. States have some flexibility in deciding which hospitals will receive a UPL payment, and how to allocate UPL payments among hospitals. In fiscal year 2017, UPL payments totaled nearly $13 billion. Uncompensated care pool payments are payments that some states make to hospitals specifically for uncompensated care costs in conjunction with section 1115 demonstration waivers and pilot projects for which they have received approval from the Secretary of HHS. Specifically, section 1115 of the Social Security Act authorizes the Secretary of HHS to waive certain federal Medicaid requirements and allow costs that would not otherwise be eligible for federal matching funds for experimental, pilot, or demonstration programs that, in the Secretary’s judgment, are likely to assist in promoting Medicaid objectives. States have received approval to make supplemental payments for hospital uncompensated care in their Medicaid programs. In fiscal year 2017, states reported total spending of about $8 billion through uncompensated care pools. Delivery system reform incentive payment (DSRIP) programs, which have also been authorized under section 1115 demonstrations, allow states to make supplemental payments to providers engaging in various improvement projects that align with state delivery system reform objectives. Examples of reform objectives include improving care for patients with specific conditions or increasing capacity. In fiscal year 2017, DSRIP program payments totaled about $7.3 billion. Graduate medical education payments help support teaching hospitals, and can include teaching costs, such as physician resident salaries, though states are not required to make such payments to teaching hospitals. States have significant flexibility in designing and administering these payments; however, the payments are subject to the UPL. In fiscal year 2017, Medicaid graduate medical education payments totaled about $2 billion. Effective January 1, 2014, PPACA allowed states to expand Medicaid eligibility to certain non-pregnant, non-elderly individuals. PPACA also required a phased reduction in DSH allotments to states, reflecting the expectation that the number of uninsured individuals would decline—and so would hospital spending on uncompensated care. As of May 2019, there were 37 “expansion states”—those states that chose to expand Medicaid eligibility—and 14 “non-expansion states”—those that did not choose to expand Medicaid. Congress has delayed the reduction in DSH allotments several times. The reductions are scheduled to begin in fiscal year 2020. Between 2013 and 2014, both expansion and non-expansion states reported different degrees of change in care for the uninsured and Medicaid shortfall. In particular, MACPAC reported that between 2013 and 2014, the year in which most state Medicaid expansions took effect, expansion states’ uncompensated care costs for the uninsured declined by $2.2 billion (19 percent), while non-expansion states’ uncompensated care costs for the uninsured increased by $0.6 billion (5 percent). During the same period, expansion states’ Medicaid shortfall increased by $2.2 billion (36 percent), and non-expansion states’ Medicaid shortfall increased by $1.8 billion (546 percent). States’ use of supplemental payments has grown in recent decades, partly due to the flexibility supplemental payments provide. This flexibility is twofold: supplemental payments provide states with flexibility in financing the nonfederal share of supplemental payments, and flexibility to target the payments to specific hospitals or types of hospitals. Total supplemental payments to hospitals have grown over time, while states’ base payments have often been frozen or reduced. Congress imposed limits on DSH spending in the 1990s, and since then states’ use of non-DSH payments has grown. Between fiscal year 2000 and fiscal year 2017, DSH payments increased about 16 percent, from $15.6 billion to $18.1 billion. In prior work, we reported that in fiscal year 2006 state Medicaid agencies made at least $6.3 billion in non-DSH payments, though the exact amounts are unknown, because states did not report all their payments to CMS. By fiscal year 2017, the amount of non-DSH payments had increased to $30.4 billion. Both uncompensated care pool payments and DSRIP programs are relatively new types of non-DSH payments, and thus contributed to the overall increase in supplemental payments. In prior work, we reported that, as of February 2017, CMS authorized nearly $38.7 billion in DSRIP spending nonconsecutively over 2011 to 2022 in four states with the largest DSRIP programs. Our prior work found that new or increased supplemental payments helped mitigate the increasing gap between Medicaid base payments and hospital costs. While supplemental payments increased, the number of states reducing or freezing base payments to hospitals has increased, in part, because states reported challenges paying the nonfederal share with state general funds. Our work found that from 2008 to 2011, across all providers, the number of states making at least one base payment reduction grew from 13 to 34, while the number of states increasing at least one base payment fell over the same period. Across all 4 years, states most frequently reported reducing base payments for hospitals. The Kaiser Family Foundation’s annual survey data shows the trend continued in more recent years. Specifically, over half of states froze or reduced inpatient hospital base payments each fiscal year from 2011 to 2018, ranging from a low of 28 states in 2011 and 2018, to a high of 39 states in 2012. (See table 1.) In a September 2018 study of five states, MACPAC found that hospitals and state Medicaid officials often prefer increases to supplemental payments rather than increases to base payments, because supplemental payments come with more predictability. MACPAC found that all five states reported reducing hospital base payments from 2007 to 2011. After 2011, all five states kept base payments frozen with no adjustment for inflation. As a result, base payments to hospitals in these states were lower in 2018 relative to other payers and hospital costs. To address the growing gap between base payments and hospital costs, states collaborated with hospitals to establish or increase supplemental payments. In the five states, supplemental payments ranged from 18 percent to 61 percent of total hospital payments. More often than with base payments, states have relied on sources other than state general funds to finance the nonfederal share of supplemental payments. For example, states may receive funds for the nonfederal share of supplemental payments through taxes levied on health care providers. (See fig. 1.) In previous work, we found that funds from local governments and health care providers constituted about 50 percent of the nonfederal share for DSH and non-DSH payments in fiscal years 2008 through 2012. In contrast, funds from local governments and health care providers constituted approximately 30 percent of base payments during the same time period. The MACPAC study of five states also found that states and hospitals preferred supplemental payments, because hospitals can track the extent to which their tax assessments are recouped through supplemental payments. In a July 2014 report, we found that the number of states relying on provider taxes increased, and that provider tax revenues were then used for the nonfederal share of supplemental payments. In particular, the total number of provider taxes increased from 119 taxes in 42 states in 2008 to 159 taxes in 47 states in 2012—a 34 percent increase. Kaiser Family Foundation data show this trend has continued. According to state survey data, the number of states using inpatient hospital provider taxes has steadily increased from fiscal year 2011 to 2018, ranging from a low of 34 states in 2011, to a high of 42 states in 2017 and 2018. (See table 2.) Supplemental payments provide states with flexibility that allows them to address states’ goals by targeting payments to particular hospitals or hospital types, such as public hospitals or teaching hospitals. States may choose to target supplemental payments to hospitals that may not have the highest uncompensated care costs. Our prior work found some states’ DSH payments were not proportionally targeted to hospitals with the highest uncompensated care costs, which DSH payments are designed to address. Based on our prior analysis of annual hospital-specific 2010 DSH data, we reported that in 30 of 42 states, hospitals receiving the largest share of state DSH payments did not provide the largest share of total uncompensated care. Moreover, our prior review of the independent DSH audits found that 41 states made DSH payments to 717 hospitals that exceeded the individual hospitals’ uncompensated care costs as calculated by the auditors, 9 states did not accurately calculate the uncompensated care costs of 206 hospitals in those states for purposes of making DSH payments, and 15 states made DSH payments to a total of 58 hospitals that either did not retain their DSH payments or were not qualified to receive them. States’ criteria for identifying eligible DSH hospitals and how much funding they receive vary, but were often related to hospital ownership, hospital type, and geographic factors. Our prior work found that 2006 DSH payments to individual hospitals varied widely, ranging from 1 cent to about $395 million. For example, California reported both the lowest and highest 2006 DSH payment amounts; the state made a total of only $160 in DSH payments to 96 private hospitals and paid $2 billion in DSH payments to 51 government hospitals. Based on our analysis of 2014 DSH audits, several states targeted DSH payments to certain hospitals and hospital types, including the following: Public hospitals: States targeting nearly all (93 percent or higher) of their DSH funding to public hospitals included Arkansas (99 percent), California (100 percent), Illinois (99 percent), Iowa (93 percent), Maine (100 percent), and Washington (97 percent). Nonprofit hospitals: Nebraska targeted 98 percent of its DSH funding to nonprofit hospitals. High-teaching hospitals: Arkansas targeted 98 percent of DSH funding to high-teaching hospitals, defined as teaching hospitals with an intern-and-resident-to-bed ratio of 0.25 or greater. IMDs: Maine makes DSH payments to the two state-run IMDs. In 2014, 18 states directed their entire IMD-designated DSH limit to IMDs. (For additional information on DSH payments to IMDs, see table 9 in app. II). Similarly, states can target UPL payments to certain hospitals. We and the HHS Office of the Inspector General have reported that some states concentrated these payments to a small number of providers. Our work has highlighted a number of concerns about the use of non- DSH payments from various perspectives, highlighting the need for transparent reporting, ensuring expenditures meet Medicaid purposes, and concerns regarding arrangements that shift costs from the states to the federal government. For example, in November 2012, we recommended that Congress consider requiring CMS to improve the transparency of and accountability for non-DSH payments by requiring facility-specific payment reporting and annual audits. The report noted that the annual DSH reports and audits that states began submitting in 2010 were important steps toward improving transparency and accountability for Medicaid DSH payments; however, similar information is lacking for non-DSH payments. Moreover, the report stated that the limited information available on non-DSH payments shows that a large share of these payments are paid to a small number of hospitals; when these payments are combined with Medicaid base payments, hundreds of hospitals may be receiving Medicaid payments well in excess of their actual costs of providing Medicaid services. As of March 2019, Congress has not taken any action, but CMS announced in fall 2018 that it was planning a proposed rule on supplemental payments that, if finalized, would improve transparency by requiring states to provide CMS with certain information on Medicaid supplemental payments. The agency plans to release the proposed rule for comment by fall 2019. In 2014, we recommended that CMS develop a data collection strategy ensuring states report accurate and complete data on all sources of funds used to finance the nonfederal share of Medicaid payments. Such data are needed to (1) track trends in financing the nonfederal share, and (2) oversee compliance with current limits on sources of financing the nonfederal share. CMS did not concur with our recommendation, but did acknowledge the agency does not have sufficient data to oversee compliance with the 60 percent limit on local government contributions to a state’s nonfederal share. Among hospitals receiving DSH payments in 2014, total uncompensated care costs varied by state, ranging from $5.9 million in North Dakota to $6.2 billion in New York. In the hospitals, most uncompensated care costs were related to costs to care for uninsured patients, rather than the Medicaid shortfall. For example, among hospitals receiving DSH payments in the 48 states studied: Costs related to care for the uninsured comprised about two-thirds (67.9 percent) of total uncompensated care costs for DSH hospitals. The remaining share of DSH hospital uncompensated care costs consisted of the Medicaid shortfall. In 34 states, costs for care for the uninsured exceeded the Medicaid shortfall. In the remaining 14 states, the Medicaid shortfall exceeded costs related to care for the uninsured. In 15 states, Medicaid paid hospitals more than the total cost of services provided to Medicaid beneficiaries, resulting in a surplus of Medicaid payments—even prior to receiving DSH payments. Termed a negative Medicaid shortfall, these surplus funds can be the result of non-DSH Medicaid supplemental payments. The remaining 33 states had some Medicaid shortfall. (See table 3.) No states had a surplus of total uncompensated care costs. (For additional information on state uncompensated care costs and DSH payments in 2014, see table 10 in app. II.) DSH payments—both the federal and nonfederal share—varied significantly in the amount that each state paid to hospitals in 2014. (See table 4 and fig. 2.) Wyoming made the smallest amount of DSH payments at about $500,000, while New York made the largest amount in DSH payments at $3.5 billion. Differences in DSH payments are largely the result of differences in the state allocations established in law. The proportion of total DSH hospital uncompensated care costs covered by total DSH payments in 2014 also varied considerably by state. Nationally, DSH payments ($18.3 billion) covered about half of DSH hospital uncompensated care costs ($36.2 billion). Nineteen states made DSH payments totaling at least 50 percent of uncompensated care costs for the states’ DSH hospitals, while 29 states made DSH payments of less than 50 percent of uncompensated care costs for the states’ DSH hospitals. (See table 5.) Four states (California, Illinois, Maryland, and Missouri) made DSH payments that exceeded aggregate hospital uncompensated care costs. (For additional information on state uncompensated care costs and DSH payments in 2014, see table 10 in app. II.) Among hospitals receiving them, DSH payments accounted for 13.6 percent of total Medicaid payments, nationally, but there was considerable variation across states. For example, DSH payments comprised 96.6 percent of Medicaid payments to DSH hospitals in Maine and 0.7 percent of Medicaid payments to DSH hospitals in Tennessee. In 40 states, DSH payments accounted for less than 20 percent of total Medicaid payments to hospitals, but in 8 states, it exceeded 20 percent. (See table 6.) (For additional information on state Medicaid payments to hospitals, see table 11 in app. II.) Among deemed and non-deemed DSH hospitals, overall deemed-DSH hospitals received larger relative DSH payments compared to non- deemed DSH hospitals. Deemed-DSH hospitals received 69.9 percent of DSH payments in 2014, but carried 51.2 percent of uncompensated care costs, relative to all hospitals receiving DSH payments that year. Each of the 48 states that distributed DSH payments in 2014 had at least one deemed-DSH hospital. (See table 7 for hospital type definitions.) Most of these states (36) provided deemed-DSH hospitals with a greater share of DSH payments relative to their share of total uncompensated care costs. (See table 8 for a summary of how states’ DSH payments to deemed-DSH hospitals compared to the hospitals’ share of uncompensated care costs, and table 12 in app. II for additional information by state.) In terms of ownership and teaching hospital status, hospitals that were publicly owned or teaching hospitals also generally received a greater proportion of DSH payments relative to their share of total uncompensated care costs. Among the three different ownership groups (public, non-profit, and private), public hospitals generally received a larger share of DSH payments relative to their share of uncompensated care. Among hospitals receiving DSH payments in 2014, public (36.7 percent) and nonprofit (53.7 percent) hospitals accounted for more uncompensated care costs than that of privately owned hospitals (9.6 percent). States generally provided more DSH payments to public hospitals (62.8 percent) relative to their share of total uncompensated care costs (36.7 percent). (For additional information on DSH payments and hospitals’ uncompensated care costs by ownership, see table 13 in app. II.) States distribute DSH payments to teaching hospitals at different rates, but generally provided a greater proportion of DSH payments to high-teaching hospitals (56.5 percent) relative to their share of total DSH hospital uncompensated care costs (44.0 percent). (For additional information on DSH payments and hospitals’ uncompensated care costs by hospital teaching status, see table 14 in app. II.) Nationally, urban hospitals received a greater share of DSH payments relative to rural hospitals, with 89.6 percent of DSH funds distributed to urban hospitals and the remaining 10.4 percent distributed to rural hospitals. This proportion corresponds to a similar distribution of uncompensated care costs, with 88.2 percent of uncompensated care costs among DSH hospitals carried by urban hospitals and the remaining 11.8 percent carried by rural hospitals. (For additional information on DSH payments and hospitals’ uncompensated care costs by urban/rural status, see table 15 in app. II.) For additional information on variation in uncompensated care and DSH payments by hospital category and sole community provider status, and state characteristics, see tables 16 through 19 in appendix II. We provided a draft of this report to HHS for review. HHS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to appropriate congressional committees, to the Secretary of Health and Human Services, the Administrator of CMS, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114, or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This bibliography contains citations for the eight Kaiser Family Foundation reports referenced in the report. Kaiser Family Foundation and Health Management Associates. States Focus on Quality and Outcomes Amid Waiver Changes: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2018 and 2019. Washington, D.C.: Kaiser Family Foundation, and National Association of Medicaid Directors, October 2018. Kaiser Family Foundation and Health Management Associates. Medicaid Moving Ahead in Uncertain Times: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2017 and 2018. Washington, D.C.: Kaiser Family Foundation, October 2017. Kaiser Family Foundation and Health Management Associates. Implementing Coverage and Payment Initiatives: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2016 and 2017. Washington, D.C.: Kaiser Family Foundation and National Association of Medicaid Directors, October 2016. Kaiser Family Foundation and Health Management Associates. Medicaid Reforms to Expand Coverage, Control Costs and Improve Care: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2015 and 2016. Washington, D.C.: Kaiser Family Foundation and National Association of Medicaid Directors, October 2015. Kaiser Family Foundation and Health Management Associates. Medicaid in an Era of Health & Delivery System Reform: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2014 and 2015. Washington, D.C.: Kaiser Family Foundation, and National Association of Medicaid Directors, October 2014. Kaiser Family Foundation and Health Management Associates. Medicaid in a Historic Time of Transformation: Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2013 and 2014. Washington, D.C.: Kaiser Commission on Medicaid and the Uninsured, Kaiser Family Foundation, October 2013. Kaiser Family Foundation and Health Management Associates. Medicaid Today; Preparing for Tomorrow: A Look at State Medicaid Program Spending, Enrollment and Policy Trends Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2012 and 2013. Washington, D.C.: Kaiser Commission on Medicaid and the Uninsured, Kaiser Family Foundation, October 2012. Kaiser Family Foundation and Health Management Associates. Moving Ahead Amid Fiscal Challenges: A Look at Medicaid Spending, Coverage and Policy Trends Results from a 50-State Medicaid Budget Survey for State Fiscal Years 2011 and 2012. Washington, D.C.: Kaiser Commission on Medicaid and the Uninsured, Kaiser Family Foundation, October 2011. To conduct this analysis, we used data compiled by Acumen for the Medicaid and CHIP Payment and Access Commission. These data consist of measures from several sources. The measures used within this report were collected from state disproportionate share hospital (DSH) audits and Medicare cost reports. The 2014 DSH audits, which report data on hospital uncompensated care costs and DSH payments to hospitals, were submitted by 48 states and the District of Columbia. These data do not include a census of all hospitals, but only those hospitals that were reported in the 2014 DSH audits. As a result, these data do not capture all uncompensated care costs in each state, only uncompensated care costs for those hospitals reported in the 2014 DSH audits. Two states, Massachusetts and Hawaii, did not submit a 2014 DSH audit, because they did not make DSH payments. Additionally, while South Dakota submitted a 2014 DSH audit, we excluded the state from our analysis because of concerns about the reliability of the reported cost measures. In addition, not all hospitals reported every data element we analyzed. As a result, total uncompensated care costs and total DSH payments vary between tables, as hospitals were excluded from a given table if they did not report the characteristic described by the table. The numbers of hospitals excluded because they did not report a given data element are noted in each table for which this is the case. Likewise, as uncompensated care costs are an important focus of the report, we also excluded from all analyses 13 hospitals that did not report a value for uncompensated care costs. In addition to the contact named above, Lori Achman (Assistant Director), Dawn Nelson (Analyst-in-Charge), Sean Miskell, and Jeffrey Tamburello made key contributions to this report. Also contributing were Tim Bushfield, Drew Long, Vikki Porter, and Emily Wilson.", "summary": "Medicaid, the joint federal-state program that finances health care coverage for low-income and medically needy individuals, spent an estimated $177.5 billion on hospital care in fiscal year 2017. About a quarter ($46.3 billion) of those hospital payments were supplemental payments—typically lump sum payments made to providers that are not tied to a specific individual's care. States determine hospital payment amounts within federal limits. In fiscal year 2017, DSH payments totaled about $18.1 billion. Beginning in fiscal year 2020, the amount of DSH payments each state can make is scheduled to be reduced. GAO was asked to study Medicaid DSH payments to hospitals. Among other things, GAO examined hospital uncompensated care costs and DSH payments by state Medicaid program and hospital characteristics. GAO analyzed data from the 2014 DSH audits—states' independently audited and certified reports of hospital-level uncompensated care costs and DSH payments—from 47 states and the District of Columbia (48 states). Three states were excluded from the analysis because they either did not make DSH payments or the submitted data were unreliable. The 2014 data were the most recently available audited, hospital-specific, data at the time of GAO's analysis. We provided a draft of this report to HHS for review. HHS provided technical comments, which we incorporated as appropriate. Medicaid disproportionate share hospital (DSH) payments are one type of supplemental payment and are designed to help offset hospitals' uncompensated care costs for serving Medicaid beneficiaries and uninsured patients. Under the Medicaid DSH program, uncompensated care costs include two components: (1) costs related to care for the uninsured; and (2) the Medicaid shortfall—the gap between a state's Medicaid payment rates and hospitals' costs for serving Medicaid beneficiaries. GAO's analysis of hospitals receiving DSH payments showed that in 2014, costs related to care for the uninsured comprised 68 percent of total uncompensated care costs, and the remaining 32 percent was the Medicaid shortfall. Across states, GAO found that total DSH payments varied significantly in 2014. DSH payment levels are generally tied to state DSH spending in 1992 and since 1993 states have been subject to a limit on the amount of federal funding that may be used for DSH payments. Medicaid DSH payments covered 51 percent of the uncompensated care costs. In 19 states, DSH payments covered at least 50 percent of uncompensated care costs. DSH payments comprised about 14 percent of total Medicaid payments, yet wide variation existed. For example, DSH payments comprised about 97 percent of Medicaid payments to DSH hospitals in Maine and 0.7 percent of Medicaid payments to DSH hospitals in Tennessee. Some types of hospitals received a greater proportion of DSH payments relative to their share of total uncompensated care costs. For example, states generally provided more DSH payments to public hospitals (in comparison to private and non-profit hospitals) and teaching hospitals (as compared to non-teaching hospitals) relative to their share of total uncompensated care costs.", "document_type": "gao"}
{"report": "FAA air traffic controllers are responsible for guiding aircraft that are departing, landing, and moving around the terminal area at 518 U.S. airports. Airport terminal areas include “movement areas,” such as runways and taxiways, and “non-movement areas” such as ramp areas (see fig. 1). Incidents can occur in either the movement or non-movement area and include: Runway incursions: These incidents involve the incorrect presence of an aircraft, vehicle, or person on a runway. Incursions fall into three categories—pilot deviations, operational incidents, and vehicle or pedestrian deviations—depending on their cause (see fig. 2). Runway excursions: These incidents occur when an aircraft veers off the side, or overruns the end, of a runway. Wrong-surface: These incidents occur when an aircraft lands or departs, or tries to land or depart, on the wrong runway or on a taxiway (see fig. 3). Wrong surface incidents also include when an aircraft lands or tries to land at the wrong airport. Ramp area: These incidents occur when aircraft, vehicles, or people cause damage or injuries in the ramp area. FAA oversees the safety of runways and taxiways and works with partners such as airlines, airports, pilots, and others to improve safety in these areas. FAA’s oversight of ramp areas is generally exercised indirectly through its certification of airports and airlines, which have been more directly responsible for safety in these areas. Several FAA offices—with staff in D.C. headquarters, FAA regional offices, and local district offices—oversee terminal area safety, including: The Air Traffic Organization (ATO) manages air traffic control, validates reports of terminal area incidents, develops and maintains runway safety technology, and leads investigations of operational incidents. ATO also administers the mandatory reporting system, which requires air traffic controllers to report certain incidents, including runway incursions, excursions, and wrong surface landings. ATO’s Runway Safety Group leads and coordinates all FAA terminal area safety efforts. The goal of the Runway Safety Group is to improve runway and taxiway safety by reducing the risk of runway incursions, excursions, and other incidents. The Office of Airports oversees airport-related safety, including inspecting and certifying operations at commercial airports and establishing airport design and safety standards. The Office of Airports also provides grants to airports to help support safety improvements, and leads investigations of incursions caused by vehicle/pedestrian deviation. Office of Aviation Safety investigates aircraft incidents and accidents, sets aviation safety standards, and certifies aircraft and pilots. Office of Aviation Safety, Flight Standards Service (Flight Standards) inspects and certifies airlines, promotes runway safety initiatives, and provides policies and guidance for pilots. Flight Standards also administers a reporting program to obtain information on incidents involving pilots and leads investigations of incursions caused by pilot deviation. Office of Aviation Safety, Accident Investigation and Prevention oversees investigations of terminal area-safety accidents and incidents, a role which includes coordinating with the NTSB, OSHA, and other FAA offices. Runway and taxiway safety has long been a focus of FAA efforts. FAA’s fiscal year 2019-2022 strategic plan establishes four safety initiatives related to its data-driven, risk-based safety oversight approach, known as a Safety Management System (SMS), including two fiscal year 2019 safety initiatives: proactively addressing emerging safety risk by using data-informed approaches to make risk-based decisions, and reducing the risk of runway incursions and wrong surface incidents. Further, FAA’s SMS guides its terminal area oversight. For example, FAA’s order establishing the Runway Safety Program states that FAA use SMS to ensure the safety of the national airspace through evaluations, data tracking, and analysis of incidents to identify new hazards and risks, and to assess existing safety controls. In our 2011 report on FAA’s oversight of terminal area safety, we made three recommendations related to excursions, ramp areas, and information sharing, all three of which FAA has since implemented. FAA uses data from reports and investigations to analyze runway incursions. For example, a team of representatives from the Air Traffic Organization, the Office of Airports, and the Office of Flight Standards, uses information on each incursion to classify its severity into one of four categories—A through D. An example of a category A incursion occurred in June 2018 in Springfield, Missouri, when an aircraft with 53 people on board accelerated for takeoff before noticing an airport operations vehicle crossing the runway. No injuries or damage were reported, but a collision was narrowly avoided. An example of a Category C or D incursion is a pilot entering a runway without authorization, but without significant potential for a collision. FAA reports the rate of severe category A and B incursions to Congress and the public in its annual performance plan. FAA also uses data to analyze runway incursions over time. For example, FAA data show that the number and rate of reported runway incursions nearly doubled from 954 in fiscal year 2011 to 1804 in fiscal year 2018 (see fig. 4). The majority of reported runway incursions (62 percent) were pilot deviations followed by operational incidents (20 percent) and vehicle/pedestrian deviations (18 percent). According to our analysis of FAA data, the increase in reported incursions was largely due to an increase in less severe incursions. Our analysis showed that severe incursions (category A and B) in which there is a significant potential for a collision, are relatively infrequent. Category C and D incursions, in which there is less potential for a collision, are more frequent. According to FAA officials, the increase in less severe incursions may be due to increased reporting of these incidents, which we also noted in our 2011 report on terminal area safety. However, the number and rate of reported runway incursions has continued to steadily increase since then, and may also indicate an increase in the actual occurrence of incidents. In 2017, FAA developed a new metric to analyze excursions and other incidents, as well as incursions. According to FAA officials, the new metric (“Surface Safety Metric”) measures the relative riskiness of terminal area incidents by assigning a different severity weight to each incursion, excursion, or other incident depending on its proximity to a fatal accident. For example, FAA documentation states that the new metric assigns a severity weight of 1 to incidents that result in a fatal injury, 0.6 to incidents with serious injuries, and 0.3 to incidents with minor injuries. Incidents in which there are no injuries are assigned even lower severity weights—for example 0.003 for a category A incursion and 0.002 for a category B incursion. FAA officials said they will analyze these severity weights year-to-year, so they can identify trends in each type of incident and across all incidents. For example, FAA officials noted that despite an increase in the number of runway incursions from fiscal years 2011 through 2018, the estimated risk of these incidents, as measured by their severity weights, declined. FAA has developed new performance goals tied to this metric, which it plans to report to Congress and the public by the end of fiscal year 2019. FAA has analyzed excursion data through special FAA task teams and other joint industry efforts with airlines, associations, and other government agencies. Excursions occur when an aircraft veers off the side or end of a runway, and can result in serious injury, death, or property damage. For example, on September 27, 2018, a small aircraft slid off the side of the runway at Greenville Downtown Airport in South Carolina shortly after landing. The aircraft continued down a 50-foot cliff, resulting in the deaths of two people. According to data FAA provided to us, nearly 700 excursions were reported in fiscal year 2018. Additionally, several joint industry efforts and special task teams have recently analyzed excursions. For example, the Commercial Aviation Safety Team (CAST), which FAA co-leads, found that about a third of the commercial accidents in the U.S. that resulted in fatalities or irreparable damage to the aircraft from 2006 through 2015 were attributed to runway excursions. In 2013, FAA began collecting additional data on excursions, but our review of FAA’s data found the excursion data FAA has collected since then contain duplicates. In 2011, we found that FAA was not formally tracking runway excursions and recommended that FAA develop a plan to track and assess them, which FAA began doing in 2013. Prior to 2013, FAA collected excursion data from two sources—the NTSB Aviation Accident Database, which contains information gathered during NTSB investigations, and FAA’s own Aviation Safety Information Analysis and Sharing (ASIAS) database, which includes information on incidents that may not reach the level of an NTSB investigation, such as an incident without serious injuries or fatalities. In 2013, FAA began identifying excursions in a third source—mandatory occurrence reports that FAA requires air traffic controllers to file when they observe an incident. FAA officials said that the additional excursions they identified through these mandatory occurrence reports added 15 percent more annual reports to those that they had identified through only the other two sources. However, FAA officials said there are likely duplicate records in their excursion data as a single excursion could be reported in more than one of these three sources. Although we did not have enough identifying information in the excursion data FAA provided to confirm the number of duplicate reports, our analysis of excursion data did identify possible duplicates. Further, despite containing possible duplicates, FAA recently began using these excursion data in its new surface safety metric. Federal standards for internal control state that data should be appropriate, current, complete, and accurate. A 2017 FAA internal analysis also noted the importance of identifying duplicates in order to ensure accurate runway excursion data. FAA officials said that they do not know how many duplicate records there are, and that they do not have an automated way to identify (and remove) all duplicates. FAA officials said that they could manually identify and remove duplicates, but that they do not currently do this nor plan to do so because duplicate excursion records would not affect their assessment of excursion risk. FAA officials said that excursions captured solely by the mandatory occurrence reports tend to be minor, lower-risk events. However, without a process to identify duplicates, FAA is not able to verify that this statement is true, and therefore cannot accurately assess and mitigate the risk excursions pose to terminal area safety. FAA does not use data to analyze most ramp area incidents, and does not plan to do so in its new surface safety metric. While the manager of the Runway Safety Group said FAA analyzes fatal ramp accidents through its participation in CAST, it does not analyze non-fatal ramp incidents, which are estimated to occur more frequently. In addition to some airport and airline officials telling us that they likely collect ramp data, FAA’s Runway Safety Group manager said that FAA likely has data on some non-fatal ramp incidents. For example, some air traffic controllers we interviewed said that they would report any ramp area incidents they observed through FAA’s mandatory reporting process, and officials from a pilot association told us they would also report such incidents. However, FAA officials said that FAA does not plan to analyze ramp incidents in the agency’s new surface safety metric. FAA’s Runway Safety Program Manager said that FAA has not analyzed most ramp area incidents because the risk of these incidents is lower than that in other areas, such as runways, and therefore does not merit analysis. For example, the manager said that aircraft speed in the ramp area is generally slower than take-off or landing speed, and fatalities are infrequent. However, we have previously reported that ramp areas are typically small, congested areas in which departing and arriving aircraft are serviced by ramp workers, who include baggage, catering, and fueling personnel. These areas can be dangerous for ground workers and passengers. The Flight Safety Foundation, which has collected its own data on ramp safety, estimated that each year 27,000 ramp accidents and incidents occur worldwide and can be costly due to effects such as damage to aircraft and schedule disruptions. In addition, ramp areas are complex because safety responsibilities in these areas vary by airport and even by terminal. For example, officials at Boston Logan International Airport told us that the airport operator shares some responsibilities with airlines but maintains control over all ramp areas. By contrast, officials at Los Angeles International Airport told us that in terminals leased by individual airlines, the airline controls the ramp area, while the airport operator controls the ramp areas in terminals where multiple airlines operate. Officials from the Air Line Pilots Association told us that ramp areas are the “scariest part of airports.” One official gave an example of inconsistencies between airports that can cause confusion and risk, such as some airport ramp areas being marked with painted lines while others are not. Federal internal control standards state that data should be appropriate, current, complete, and accurate. In addition, FAA’s own SMS calls for FAA to use a data-driven approach to analyze safety risks so that it can control that risk. As part of those efforts, FAA began the rulemaking process in 2010 to require airports to implement SMS, through which airports would analyze risks in runways, taxiways, and ramp areas, but as of August 2019 this rule had not been finalized. Although some airport officials we interviewed said they are voluntarily implementing SMS and could be collecting data on ramp area incidents, FAA—with its role in overseeing safety at all commercial airports—is better positioned to take steps to analyze ramp incidents across all U.S. airports. For example, an individual airport implementing SMS would analyze ramp area incidents at that airport, but FAA could analyze ramp area incidents and identify trends across hundreds of airports as it does for other terminal area incidents described above. Beginning to analyze ramp area incidents, for example in its new metric, would provide FAA with information necessary to mitigate ramp area incidents and ensure that it is directing its efforts to the riskiest parts of the terminal area. FAA, airports, and airlines have implemented multiple efforts, including technologies, to improve runway, taxiway, and ramp safety; FAA’s efforts, which are coordinated by the Runway Safety Group, focus primarily on runway and taxiway safety. FAA’s primary runway and taxiway safety effort is the Runway Safety Program, whereby staff develop national and regional runway safety plans, analyze data on runway and taxiway incidents, and help local air traffic control managers organize annual Runway Safety Action Team (RSAT) meetings at which FAA, airport operator, and other stakeholders at each airport discuss recent runway and taxiway incidents. Prior to each RSAT, FAA’s Regional Runway Safety Program Managers we met with told us they compile and share available information on each incident that occurred in the last year at the airport with the local air traffic manager. This information may include trends in incursions, the location of each incident on an airport map, and results from vehicle/pedestrian deviation investigations conducted by the FAA Office of Airports. Each air traffic manager then presents this information to attendees, who may include staff from FAA’s Office of Airports or Flights Standards, the airport operator, and local pilots. Participants discuss the prior year’s incidents, identify risks, and develop a plan to mitigate these risks. For example, attendees at an RSAT in Phoenix, Arizona, discussed risk factors that could be contributing to pilot deviations, and identified that pilots could be missing taxiway markings that instruct pilots to stop before proceeding onto a runway. Consequently, these RSAT attendees developed a plan to add lights to the surrounding area to improve visibility. The attendees also tasked air traffic managers with developing a program to provide annual tours of the tower and airfield to local pilots and personnel working on the airfield to show both parties what the other sees during flight operations. Another important FAA effort is the Runway Incursion Mitigation (RIM) Program established by the Office of Airports in 2015 to identify strategies to mitigate areas of airport runways or taxiways that do not meet current FAA airport design standards and have high incursions rates (“RIM locations”). There can be multiple RIM locations at a single airport. FAA considers locations for inclusion in the RIM inventory based on whether the location has a non-standard design and has experienced three or more incursions in a given calendar year, or averaged at least one incursion per year over the course of the RIM program. At RIM locations, FAA provides funding and technical assistance to airports to mitigate the risk of incursions, such as by changing airport design and by improving runway and taxiway signage. For example, the airport may reconfigure a taxiway to intersect a runway at a 90-degree angle (the FAA standard), or install “hold position” signs at intersections between two runways. According to FAA, at the end of fiscal year 2018, FAA had helped airports mitigate 33 RIM locations through the program, leaving 135 locations across 79 airports that still needed to be mitigated. FAA also collaborates with industry stakeholders to identify and address runway and taxiway safety issues. For example, FAA serves as Co-Chair of CAST, which analyzes data across airports to identify root causes of incidents and develop and track mitigations to address those causes. For instance, through CAST, FAA and industry stakeholders developed training for air traffic controllers to mitigate the risk of runway excursions. The training described factors that can contribute to runway excursions such as adverse winds, wet or contaminated runways, or unstable aircraft approaches. In addition, in 2015, FAA convened a forum of aviation stakeholders representing government, industry, and labor called the Runway Safety Call to Action which developed 22 short-, medium-, and long-range mitigations to address the rising number of reported runway incursions. In 2018, the DOT Office of Inspector General reviewed FAA’s progress in implementing these 22 mitigations and made three recommendations to address implementation challenges it identified, including consolidating duplicate mitigations and, as mentioned below, developing a plan to measure their effectiveness. As of August 2019, FAA had not implemented these recommendations. Individual airport operators and airlines have implemented their own efforts to improve runway, taxiway, and ramp safety. For example, officials who manage Daniel K. Inouye International Airport in Honolulu, Hawaii, told us that they changed the location of markings in an airport area known to be confusing to some pilots, which reduced incursions at this location. In addition, officials from Airlines for America and the Regional Airlines Association told us airlines host safety meetings where they leverage their collective data to identify and address industry-wide safety trends. Officials told us that one of the working groups at these airline safety meetings specifically discusses issues and solutions pertaining to the ramp area. FAA, airports, and airlines fund multiple technologies to improve runway and taxiway safety, primarily through increasing air traffic controller, pilot, and vehicle operator awareness of their surroundings. See Table 1 for technologies in place or in development. FAA surveillance technologies are multi-million dollar programs designed to help air traffic controllers identify aircraft and vehicles in the terminal area. For example, at the 35 airports where ASDE-X has been installed since 2011, FAA estimated the total program cost to FAA to be more than $800 million. In-aircraft technologies like those mentioned above help pilots identify their location on runways and taxiways, and could mitigate risks of injuries and damage caused by excursions. FAA has taken steps to improve terminal area safety, but has not assessed the effectiveness of many of its runway and taxiway safety efforts. For example, FAA has not evaluated how its primary efforts such as ASDE-X, ASSC, or the Runway Safety Program contribute to runway and taxiway safety, despite having implemented these efforts years ago. In some instances, FAA has taken steps to evaluate its terminal-area safety efforts. For example, FAA tracks the Runway Incursion Mitigation Program’s outcomes and the number of runway excursions safely stopped by an Engineered Material Arresting System (EMAS). FAA also contracted with a research organization in 2017 to evaluate the effectiveness of Runway Status Lights on the runway incursion rate at 15 airports. Further, the Runway Safety Program manager described other instances in which local airport officials have taken steps to evaluate the effect of mitigations at those airports. For example, one of FAA’s runway safety offices assessed the effect of five informational videos it produced, to highlight issues identified at specific airports, on runway incursions at those locations after the videos were released. However, FAA has not assessed the effectiveness of many of its numerous other runway and taxiway efforts described above and FAA officials told us that FAA does not have a plan to do so. Officials told us that they believe that the assessments described above are sufficient, based on the availability of agency resources. In June 2018, the DOT IG reported a similar finding related to its assessment of FAA’s 2015 Runway Safety Call to Action, described above. The DOT IG reported that FAA had a plan to track the completion of mitigations aimed at improving runway and taxiway safety, but not to link the mitigations to quantifiable goals or metrics that would measure their effectiveness in reducing runway incursions. FAA’s guidance on the Runway Safety Program states that FAA may evaluate the effectiveness of its runway safety programs, and the extent to which they are helping FAA meet its safety goals. In addition, in the 2016 Evaluation Roadmap for a More Effective Government, the American Evaluation Association stated that agencies should consistently use program evaluation and systematic analysis to improve program design, implementation, and effectiveness and to assess what works, what does not work, and why. Evaluating a program’s effectiveness can include methods such as surveying a program’s managers (e.g., regional runway safety program managers), or comparing a program’s performance to an evaluative criterion (e.g., a measure of terminal area safety). Without assessing the effectiveness of its range of efforts, FAA cannot determine the extent to which each of its efforts contribute to its goal of improving runway and taxiway safety, or whether other actions are needed. As discussed previously, FAA has efforts designed to increase runway and taxiway safety that range from periodic stakeholder meetings to multi-million dollar ground surveillance systems. By assessing the effectiveness of its primary efforts, FAA may be better positioned to make decisions about how to target its limited resources within and among these efforts. We also found that FAA may be missing opportunities to improve its terminal-area safety efforts, including improving communication within FAA. Specifically, FAA Regional Runway Safety Program staff told us that they do not receive the results of most runway incursion investigations— information that could aid RSAT discussions about preventing these incidents in the future. Four of FAA’s five Regional Runway Safety Program Managers we interviewed reported that, they did not receive the results of investigations of pilot deviations—which constitute the majority of runway incursions—from the Office of Flight Standards. As part of its investigations of these incursions, Flight Standards identifies possible causes and implements mitigations, such as additional pilot training. However, FAA does not require Flight Standards to automatically provide their investigations of runway and taxiway incidents to the Runway Safety Group, which could enhance runway and taxiway safety. FAA officials said that FAA requires Flight Standards to make its investigations available to Runway Safety Group staff, if requested, but acknowledged that this does not always result in Runway Safety Group staff receiving these investigations in a timely manner. FAA officials said they are in the process of implementing additional processes to improve communication between Flight Standards and the Runway Safety Group, but documentation on these processes FAA provided to us did not address getting investigations to Runway Safety program staff in a timely manner. Without this information, the Regional Runway Safety Program Managers may be unable to provide air traffic managers with relevant information on most incursion investigations as they prepare to host their annual RSAT meetings. The manager of the Runway Safety Group told us that Regional Runway Safety Program Managers may request individual investigations from regional Flight Standards officials, but that it would be time consuming for these regional managers to make such requests for every pilot deviation. One of FAA’s objectives is to improve runway and taxiway safety, and federal internal control standards state that management should internally communicate the information necessary to help meet its objectives. Without timely access to the results of Flight Standards’ incident investigations, Regional Runway Safety Program Managers—and therefore, local air traffic control managers—may not have all of the relevant information they need to develop appropriate runway and taxiway safety mitigation strategies and plans. Selected airport operators we interviewed also reported that they may not have all information they need to develop appropriate terminal area safety mitigation strategies. Specifically, most of those we interviewed reported that air traffic control managers did not provide them with complete and timely information on all runway and taxiway incidents. Six of 10 airport operators we interviewed told us that air traffic control managers did not notify them of all runway and taxiway incidents as they happened. Further, some airport operators told us that they were not aware of all incidents until the annual RSAT meeting. For example, the operator of one airport told us that the air traffic manager notifies the airport of vehicle/pedestrian deviations immediately, but not of operational incidents or pilot deviations. The Manager of the Runway Safety Program also confirmed that communication varies by airport operator and air traffic manager. According to federal internal control standards, management should communicate quality information externally so that external parties can help the entity achieve its objectives and address related risks. Further, according to air traffic control procedures, controllers are required to report as soon as possible to airport managers and others “any information which may have an adverse effect on air safety.” However, this requirement does not specify the types of terminal area safety incidents to which this applies. Also, through a 2018 internal risk management process, FAA identified the need for enhanced communication among airport management, the FAA Air Traffic Organization, and pilots at towered airport facilities, in order to mitigate the safety risks associated with runway incursions. Lacking complete information on runway and taxiway incidents at their airports could hamper airport operators’ ability to develop appropriate safety strategies or make investment decisions related to safety in a timely manner. For example, the operator of one airport told us that not being notified of operational incidents means the airport does not have a complete picture of the safety incidents there, which limits their ability to identify trends or training needs. FAA’s safety oversight approach is designed to use data to identify hazards, manage risks, and mitigate them before an accident occurs. FAA uses data to analyze runway incursions, and recently developed a new metric to track the risk of terminal-area incidents. However, without leveraging data to analyze all terminal-area incidents, FAA may be missing opportunities to better target the agency’s resources, and ultimately to further improve safety. For example, because FAA does not have a process to eliminate all duplicates from its excursion data, it does not have assurance that its excursion data are accurate, and it may be missing opportunities to mitigate the risks excursions pose. Similarly, taking steps to analyze ramp area incidents by identifying such incidents in its new metric would help FAA determine whether it needs to focus more on improving safety in ramp areas. In addition, establishing a plan to evaluate all of its runway and taxiway safety efforts would help FAA direct its resources toward activities and technologies proven to enhance safety and identify ways to strengthen those efforts. Moreover, improving internal communication among FAA offices could make the annual Runway Safety Action Team meetings—a key component of FAA’s terminal area safety efforts—more effective. And last, improving external communication between air traffic managers and airport operators would help airports identify and implement needed mitigations more quickly. We are making the following five recommendations to FAA: 1. The Runway Safety Manager should develop a process to identify and remove duplicate excursion records. (Recommendation 1) 2. The Runway Safety Manager should take steps to analyze data on ramp area incidents in FAA’s new surface safety metric. (Recommendation 2) 3. The Runway Safety Manager should establish a plan to assess the effectiveness of all of FAA’s terminal area-safety efforts, including Airport Surface Detection Equipment, Model X (ASDE-X) and the Runway Safety Program. (Recommendation 3) 4. The Administrator of FAA should require Flight Standards to share the results of its investigations with the Runway Safety Group, in a timely manner. (Recommendation 4) 5. The Administrator of FAA should require air traffic control managers to share information on terminal area incidents, such as operational incidents and pilot deviations, with airport operators, in a timely manner. (Recommendation 5) We provided the Department of Transportation (DOT), the Department of Labor (DOL), the National Aeronautics and Space Administration (NASA), and the National Transportation Safety Board (NTSB), with a draft of this report for review and comment. In its written comments reproduced in appendix I, DOT concurred with our recommendations. DOL, NASA, and NTSB did not provide technical comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 11 days from the report date. At that time, we will send copies to the appropriate congressional committees, DOT, DOL, NASA, NTSB, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. In addition to the individual named above, other key contributors to this report were Heather MacLeod (Assistant Director); Sarah Farkas (Analyst-in-Charge); Dave Hooper; Josh Ormond; Madhav Panwar; Steven Rabinowitz; Laurel Voloder; Madeline Welter; and Elizabeth Wood.", "summary": "U.S airspace system is one of the safest in the world, but incidents and near misses at and around U.S. terminal areas still occur. FAA oversees the safety of runways and taxiways and works with industry partners—including airlines, airports, pilots, and others—to improve safety in these areas. Despite FAA's continued efforts, the number of reported terminal area incidents has increased over time. GAO was asked to review various issues related to runway safety and to update its prior work on airport terminal areas. This report examines: (1) the extent to which FAA uses data to analyze terminal area incidents and (2) efforts FAA and others have implemented to improve terminal area safety, and how FAA assesses their effectiveness. GAO analyzed FAA data; interviewed officials from 10 airports selected based on high runway incident rates in the past 3 years, among other factors; and interviewed federal and industry officials. The Federal Aviation Administration (FAA) uses data to analyze some types of incidents in airport “terminal areas”—runways, taxiways, and ramps. For example, FAA uses data to analyze runway “incursions”—the incorrect presence of an aircraft, vehicle, or person on the runway. According to FAA data, the rate of reported runway incursions nearly doubled from fiscal years 2011 through 2018, with most of this increase due to a rise in reports of less severe incursions, or those without immediate safety consequences. However, GAO found that FAA has not identified or removed all duplicates from its data on runway “excursions”—when an aircraft veers off or overruns a runway—which limits FAA's ability to accurately analyze these incidents. Additionally, FAA does not use data to analyze incidents that occur in ramp areas—the parts of terminal areas where aircraft are prepared for departure and arrival—where injuries to workers and damage to aircraft can occur. Without a process to leverage accurate excursion and ramp incident data, FAA may not be able to assess the risk these incidents pose to passengers, airport staff, and others. FAA, airports, and airlines have implemented multiple efforts to improve terminal area safety, but FAA has not assessed the effectiveness of many of its efforts. For example, FAA has funded multiple technologies to improve runway safety, such as Airport Surface Detection Equipment, Model X (ASDE-X)—a ground surveillance system that enables air traffic controllers to track landing and departing aircraft and alerts controllers of potential collisions. However, FAA has not assessed the effectiveness of ASDE-X. Similarly, FAA has not assessed the effectiveness of its Runway Safety Program, whereby FAA staff, along with local airport stakeholders, provide data and support to local air traffic managers to help identify and manage terminal area safety incidents. FAA has taken steps to evaluate some of its terminal-area safety efforts, such as tracking the number of runway excursions safely stopped by a lightweight, crushable concrete designed to stop or greatly slow an aircraft that overruns the runway. However, without assessing how all of FAA's efforts contribute to its goal of improving runway and taxiway safety, FAA cannot determine the extent to which it is targeting its limited resources to the most effective strategies. GAO is making five recommendations including that FAA identify and remove duplicate excursion data, develop processes to analyze ramp area incidents, and establish a plan to assess the effectiveness of its terminal area safety efforts. FAA concurred with the recommendations.", "document_type": "gao"}
{"report": "OCWR allocates functions among its Board of Directors, Executive Director, and General Counsel (see fig. 1). This organizational structure is largely due to statutory requirements in the CAA. As of February 2019, OCWR had 28 full-time equivalent positions, which includes five part-time board members (counted as one full-time equivalent) appointed by congressional leadership. This represents an increase of five full-time equivalents since April 2018. OCWR manages an Administrative Dispute Resolution (ADR) process to resolve alleged violations of workplace rights and protections, such as discrimination. The Reform Act overhauled the ADR process, including removing mandatory counseling and mediation periods and a waiting period prior to filing a claim (see fig. 2). To advance worker protections, the Reform Act mandated that OCWR implement various new requirements. OCWR has implemented three of the four requirements that generally became effective on June 19, 2019 (see table 1). As of October 2019, OCWR had completed three requirements. Managing changes to the ADR process. OCWR officials stated that because they had initiated a multi-year process to revise procedural rules in 2016, they were more familiar with the steps and timeline needed to implement this requirement in 2019. Appointing a confidential advisor. Similarly, an OCWR official stated that the confidential advisor role was similar to OCWR’s counselor role prior to the Reform Act, which made implementing this requirement more manageable. Creating a secure electronic system to file claims. The online system, SOCRATES, was operational starting June 26, 2019, 7 days after the requirement’s effective date of June 19, 2019. Between June 19 and June 26, 2019, OCWR implemented a fillable PDF form so that claims could be submitted electronically (email or fax). OCWR officials reported that no claims were filed during the 7-day delay, and therefore, they believe that the delay did not negatively affect employees’ ability to file claims. According to OCWR, testing the system the week prior to June 19, 2019, revealed numerous problems with SOCRATES. For example, if a user did not submit his or her claim within a certain amount of time, the system refreshed the page without saving the user’s data, forcing the user to restart the claim. Also, during a June 17, 2019, meeting between OCWR and congressional staff, OCWR received requests to further revise forms associated with SOCRATES. OCWR was unable to implement these changes before the June 19, 2019, deadline. As a result, OCWR delayed the launch of SOCRATES until June 26, 2019, to allow time to resolve these issues and fully test the system. However, OCWR did not communicate the decision to delay the full launch of SOCRATES to congressional stakeholders who had expected that the system would be delivered on time. As of October 2019, OCWR had not completed one requirement that was due by June 19, 2019. Establishing a program to permanently retain records. The Reform Act required OCWR to establish and maintain a permanent records retention program, which includes records of preliminary reviews, mediations, hearings, and other proceedings. Since November 2017, OCWR has operated under an interim records retention policy that requires it to permanently keep all records. According to OCWR, it is not destroying or deleting any records. OCWR’s interim permanent records retention policy states that OCWR will establish standards and procedures for records integrity, privacy, and confidentiality. However, as of October 2019, about 4 months after this requirement became effective, OCWR had not developed these standards or established other policies or procedures for maintaining a permanent records retention program other than the interim policy. According to OCWR, it scanned paper records to create electronic files and hired a separate contractor in September 2019 to help further develop its records retention program. As of October 2019, OCWR was implementing the other three requirements which have varying deadlines, time frames, and effective dates extending beyond June 19, 2019 (see table 2). Tracking and reporting data and assessments. The Reform Act created new reporting requirements for OCWR. For example, it required OCWR to issue annual, itemized reports on awards and settlements. The Reform Act also required OCWR to issue a one- time report on awards and settlements previously paid, which OCWR published on January 20, 2019. OCWR plans to issue the report on 2019 awards and settlements by January 31, 2020, and subsequent reports annually. The Reform Act also required OCWR to use SOCRATES data to assess the effectiveness of ADR procedures in resolving claims in a timely manner and to publish these assessments in semi-annual reports to Congress. OCWR plans to issue the first semi-annual report by January 31, 2020. Conducting a workplace climate survey. The Reform Act required OCWR to conduct a secure survey of legislative branch offices covered by the act by December 20, 2019 (within one year of enactment), and every 2 years thereafter. The survey would assess the workplace environment, including attitudes toward sexual harassment. As of October 2019, OCWR officials reported that they were waiting for additional input from congressional staff before proceeding with certain aspects of the survey. According to OCWR officials, OCWR’s House and Senate oversight committees had different views of what the survey should include. Therefore, OCWR plans to conduct separate surveys for House offices, Senate offices, and other legislative branch offices. According to OCWR officials, they may be able to launch the House survey by the December 20, 2019, deadline, with the other surveys following. However, the timeline for conducting these surveys is uncertain until OCWR can confirm the surveys’ content with congressional staff and conduct various tests, such as separately pilot testing each of the three surveys. Additional work remaining includes: reviewing changes to the survey questions, obtaining input from legislative branch stakeholders, conducting internal testing of the survey, pilot testing the survey with legislative offices, and finalizing the survey and communications to survey recipients. Educating and assisting legislative branch agencies. OCWR updated various education and training materials, such as: creating a new workplace rights brochure; redesigning a poster notifying employees of rights, protections, and procedures under the CAA; and establishing audio and visual teleconferencing access for out-of- area employees (i.e., legislative branch employees in elected officials’ district and state offices). An OCWR official reported that, in October 2019, OCWR developed a training video on new procedures under the Reform Act. A link to the training video was included in the September 2019 quarterly e- newsletter sent to all legislative branch employees covered under the CAA. According to the official, OCWR also plans to launch another training video in November 2019 and develop three new training classes. We found that OCWR incorporated some key management practices when implementing Reform Act requirements (see appendix II for a list of management practices we used to assess OCWR). However, we also found that OCWR did not consistently incorporate key management practices for some requirements and that opportunities exist to improve the remaining implementation and administration of Reform Act requirements. We found that OCWR incorporated some key change management or project management practices applicable to implementing Reform Act requirements. For example: OCWR defined the Reform Act requirements and created 21 task teams for implementing them. OCWR dedicated an implementation team to manage the transformation process. OCWR designated a manager to track the implementation status for all task teams. The task team leaders also met weekly. OCWR established an overall project schedule with interim milestones and time frames for revising procedural rules, part of the requirement to manage changes to the ADR process. OCWR also established an overall project schedule for conducting the workplace climate survey. OCWR officials reported that having this schedule has enabled them to track progress, determine that the survey is behind schedule (as of October 2019), and communicate revised expectations to stakeholders. In addition, OCWR officials stated they identified and addressed risks associated with the requirement to appoint a confidential advisor. These risks included the perception of a potential conflict of interest that could arise if an attorney contracted from a private law firm served as the confidential advisor. To mitigate this perception, OCWR hired the confidential advisor as an employee to ensure that the confidential advisor cannot refer claimants to his or her own law firm for legal representation. Project schedules provide a detailed plan for delivering products, services, and results in a timely manner, as well as serve as a communication tool for managing stakeholder expectations. OCWR used project schedules to revise the procedural rules and develop the workplace climate survey but did not use schedules to manage the implementation of other requirements. In particular, for SOCRATES, OCWR officials reported that they proposed a draft schedule but did not finalize this draft or otherwise document changes to the schedule. According to these officials, they did not update the schedule because their implementation plans had changed significantly, and the compressed timeframe resulted in making changes “on the fly.” For example, they revised the system architecture as late as 3 weeks before the mandated deadline, which required signing an interagency agreement for hosting the system with the Library of Congress the day before the mandated deadline. In addition, OCWR encountered last-minute issues when testing the system, as we previously discussed. As a result, OCWR delayed the full launch of SOCRATES but did not communicate this decision to congressional stakeholders who had expected that the system would be delivered on time. Although not a long delay, a project schedule could have helped manage stakeholder expectations. Without a schedule for SOCRATES, OCWR missed opportunities to take corrective actions earlier, communicate with congressional stakeholders, and better manage expectations. OCWR has ongoing cybersecurity activities and planned upgrades to other information technology (IT) systems, but has not yet established project schedules for them. Moving forward, it will be important for OCWR to establish project schedules to manage IT projects and allow key stakeholders to monitor OCWR’s progress. OCWR has taken interim steps to establish a permanent records retention program. These steps include changing its records retention policy in November 2017 to make all records permanent, hiring a contractor in May 2019 to scan paper records and store them electronically, and hiring another contractor in September 2019 to help develop its records retention program. Key management practices call for organizations to identify and assess risks that could affect their ability to achieve their goals and objectives and to monitor and manage these risks as the projects progress. OCWR identified the largest potential risk to establishing and maintaining a permanent records retention program as the loss of control over confidential files. For example, an OCWR official confirmed that OCWR maintains a physical file for every electronic file, which results in multiple storage locations and duplicate records. Although this ensures the availability of records, multiple storage locations can make ensuring the confidentiality and security of these records more difficult. However, as of October 2019, OCWR has not yet fully addressed this risk by developing a policy to manage it or identified other risks. OCWR officials stated that the contractor will help with these tasks. They also reported that they plan to develop policies for the records retention program, particularly for maintaining the privacy and security of records, based on records management requirements for executive branch agencies. According to OCWR officials, addressing risks for its records retention program is not a high priority, and demand for records is low. Nevertheless, if OCWR does not address the potential risks, and any emerging risks, associated with permanently retaining sensitive records, OCWR may be less able to manage its records and ensure their confidentiality, integrity, and availability. We have previously reported that a critical element in an organization’s efforts to manage for results is its ability to set meaningful goals for performance and to measure progress toward these goals. Strategic goals are intended to be the starting point for an organization’s performance measurement efforts. To provide a connection between the long-term strategic goals and the day-to-day activities, organizations should also establish near-term performance goals and measures. Finally, an organization needs to report on its performance to provide information to its stakeholders on the extent to which it has met its performance goals and what it accomplished with its resources. Leading organizations then apply this performance information to continuously improve organizational processes, identify performance gaps, and set improvement goals. OCWR’s 2019-2023 strategic plan includes several broad, long-term, outcome-related goals that address Reform Act requirements. These goals are supported by objectives, called initiatives. For example, OCWR has a long-term strategic goal to “provide an efficient and effective ADR program.” A supporting initiative is to “ensure that ADR processes meet statutory and regulatory mandates, including mandates for maintaining confidentiality.” However, this initiative does not state what is to be achieved and by when, and none of the supporting initiatives reflect near- term performance goals that allow for an objective assessment of progress. Performance goals, which are used to assess progress toward long-term goals, should be stated in objective, measureable, and quantifiable terms. OCWR identifies performance measures in its strategic plan, but the measures lack target levels of performance which would help assess progress toward goals. For example, one of OCWR’s initiatives is to “empower stakeholders to effectively resolve their workplace disputes without having to engage in protracted dispute resolution proceedings.” A supporting performance measure is to “track the rate of cases resolved by negotiated settlements.” This measure provides a starting point for collecting performance information but does not specify how it can be used to assess progress on the initiative. We have previously reported that successful performance measures commonly demonstrate results, are limited to the vital few, respond to multiple priorities, and link to responsible programs. OCWR does not report on progress toward goals in its annual report, partly because of the lack of performance goals and measures assessing progress. OCWR’s annual reports summarize statistical data about the number of employees using OCWR’s services and reasons for ADR claims from each fiscal year, which is information required to be published under the CAA. However, these statistics do not compare actual performance against measurable performance goals. Further, OCWR does not report how it used the data to improve its programs. For example, in its fiscal year 2018 annual report, OCWR reported the number and types of workplace issues that employees inquired about in general information requests and raised during formal counseling requests. However, OCWR did not report how it used this information to identify trends and develop training programs to target the indicated issues. According to OCWR officials, OCWR does not set more specific or measurable goals and measures beyond what is included in its strategic plan. In addition, they stated that OCWR’s current performance goals and measures reflected their concern that changes from the Reform Act could affect their workload, such as the number of cases filed and how they would be settled. They plan to reassess their performance starting in June 2020, about 1 year after many Reform Act requirements became effective, and establish new performance measures and targets based on updated baseline performance levels. Clearly defining performance goals, such as establishing measureable performance targets and milestones, and related performance measures would provide OCWR information to determine if it is making progress toward its long-term goals and better communicate with congressional and other key stakeholders about its progress. Moreover, such performance data would allow OCWR to make more informed decisions to improve performance, such as determining what activities are working as intended and achieving results, and which are not and could be improved. Finally, sharing this information in publically available annual reports could make it more useful and transparent for stakeholders, as well as strengthen OCWR’s accountability for making progress toward its goals. OCWR has a broad mandate to provide education and information to Members of Congress and covered legislative branch offices and employees about their rights, protections, and responsibilities under the CAA. OCWR routinely conducts educational activities, such as holding brown bag events, creating online training, and posting resources on its website and social media channels. OCWR also performs outreach by meeting with congressional committees regularly, communicating with stakeholders (e.g., House and Senate Employment Counsel), meeting with heads of legislative branch employing offices at least sending an annual notice of rights to all legislative employees. However, we found that OCWR’s assessment of these activities is limited, such as collecting feedback forms from attendees of its brown bag events. While important, these efforts do not enable OCWR to assess the effectiveness of its education and outreach activities and the extent to which they are reaching all covered legislative branch populations. Key management practices call for continuous monitoring to identify areas that require additional attention. In 2004, we recommended that OCWR use various approaches, such as feedback surveys, to increase its understanding of the actual level of awareness of its activities among target populations. In response to the recommendation, from 2008 to 2009, OCWR surveyed legislative branch employees but had a low response rate, which rendered the survey data of limited value. OCWR officials attributed the low response rate to not having all respondent email addresses, as well as the lack of statutory authority to conduct surveys. Through the Reform Act’s requirement to conduct a workplace climate survey every 2 years, OCWR has new opportunities to collect data on the extent to which legislative branch employees are aware of OCWR’s services and their rights under the CAA. Because the Reform Act states that OCWR must consult with congressional committees on how to carry out the survey, OCWR has sought guidance from its oversight committees on what information to collect for the survey and the use of the results. In addition to developing the climate survey, an OCWR official stated that, in March 2019, OCWR also hired a training and education project manager who is responsible for developing an education and outreach strategy. This effort is intended to include assessing awareness levels of OCWR’s activities among legislative branch populations and improving awareness where needed. However, as of October 2019, OCWR did not provide documentation of the strategy and a timeline for its completion. A mechanism for collecting feedback more widely from all covered legislative branch employees could improve OCWR’s understanding of the reach and effectiveness of its education and outreach efforts. For example, it could help OCWR determine if it may be missing certain subsets of legislative branch populations, such as maintenance workers who may have limited computer access. Further, such information could help inform management and resource allocation decisions, such as where to focus education and outreach efforts and how to increase their effectiveness. In 2004, we reviewed OCWR’s management practices and made 20 recommendations to help OCWR: strengthen strategic planning and develop results-oriented performance measures; ensure an effective, results-oriented program structure; build effective communication emphasizing outreach and coordination with congressional and legislative branch stakeholders; and create and sustain an enhanced management control environment, particularly for managing human capital and performance. Between 2004 and 2013, we determined that OCWR had implemented 18 of the 20 recommendations. In this review, we found that, of these 18 recommendations, OCWR subsequently stopped implementing an information technology (IT) planning recommendation that could have strengthened its ability to better manage and implement the requirements in the Reform Act. We had recommended that OCWR ensure that IT planning and implementation be an integral component of the strategic planning process. This recommendation focused on positioning OCWR to effectively leverage technology in achieving strategic mission goals and outcomes. To do this, OCWR needed to establish certain basic IT management capabilities, such as: developing a picture or description, based on OCWR’s strategic plan, of what it wanted its future IT environment to look like; establishing and following a defined and disciplined process for allocating limited resources across competing IT needs; using a rigorous IT system acquisition management process; and ensuring that needed IT skills have been identified and obtained. OCWR took steps in 2003 and 2005 to create an IT task force and issue a multi-year IT plan, respectively. However, these efforts were not sustained. An OCWR official explained that OCWR had not conducted IT planning, including developing an IT strategic plan, in recent years because of limited resources and difficulties attracting a candidate for the IT manager position. These challenges resulted in the position remaining vacant for approximately 18 months from 2016 to 2018. In past work, we have reported that IT strategic planning can help an organization align its IT goals and investments with its strategic goals. A key element of IT strategic planning is developing an IT strategic plan that can serve as an organization’s vision or road map to guide its efforts and investments. OCWR officials reported that they will be developing an IT strategic plan. However, as of October 2019, they were unable to provide additional documentation or a timeline for completion. Without IT strategic planning, OCWR may be less able to set forth a long- term vision of OCWR’s IT environment and measure progress in carrying out its strategic initiatives. For example, OCWR envisioned developing an electronic claims filing system as one of its strategic initiatives as early as fiscal years 2013 to 2015. However, that system was not implemented until 2019, in part because OCWR did not have an IT strategic plan and related IT expertise to support the initiative. With increased funding for implementing Reform Act requirements, OCWR has recently re-focused on human capital management. In September 2018, it hired an IT manager whose responsibilities include IT planning and cybersecurity. In September 2019, OCWR hired a contractor to help update its human capital plan, which had not been updated since 2009. We have previously reported that effective human capital management is critical to sustaining an IT workforce with the necessary skills to execute a range of management functions that support the agency’s mission and goals. Given OCWR’s strategic and ongoing IT initiatives, it will be important for OCWR to consider leading practices in human capital management to ensure that it has the appropriate skills and capacity to meet its current and future responsibilities. These leading practices include consulting with key stakeholders when developing human capital strategies, having a system in place to continually assess and improve human capital planning and investment, determining critical skills and competencies its workforce needs to achieve current and future agency goals, linking the strategic workforce plan with the organization’s strategic plan, developing customized strategies to recruit highly specialized and having an ongoing succession planning process for identifying and developing a diverse talent pool. If OCWR does not continue to strategically assess and manage its human capital needs, it could again find itself with IT or other skills gaps that could negatively affect its ability to meet its mission. Incorporating these leading practices in human capital management could help OCWR develop a workforce plan that better aligns with its mission and goals, as well as develop long-term strategies for recruiting and retaining staff to achieve those goals. Although small in size, OCWR has important responsibilities—to advance the safety, health, and workplace rights of employees and employers in the legislative branch. The Reform Act updated how OCWR carries out these responsibilities, such as requiring OCWR to offer an electronic option for filing Administrative Dispute Resolution (ADR) claims and to conduct a workplace climate survey of legislative branch employees. To meet these new requirements, OCWR developed new procedures, trained and hired staff, and balanced new responsibilities with existing ones. As a result, OCWR completed three requirements—managing changes to the ADR process, appointing a confidential advisor, and creating a secure electronic claims reporting system. However, as of October 2019, OCWR had not fully completed the requirement to establish and maintain a program for permanent records retention. To meet this requirement, OCWR needs to develop and implement policies and procedures to administer and manage the program, as well as identify and address potential risks related to the privacy and security of records, among other actions. To help OCWR meet requirements with ongoing work and build upon completed work, it will be important for OCWR to incorporate key practices for project management, such as consistently developing and using project schedules and assessing risk. These practices could help OCWR better manage expectations and prioritize high-risk work. Further, establishing results-oriented performance goals and measures and collecting and using performance information could help OCWR evaluate and better focus its education and outreach efforts, as well as assess progress toward its strategic goals. Finally, OCWR should use its strategic planning process to clearly articulate how its IT initiatives support its organizational goals, such as how the electronic claims reporting system supports a more efficient and effective ADR program. Establishing performance measures and monitoring actual-versus-expected performance of those measures can help determine whether IT is making a difference in improving performance, and in turn whether OCWR is better serving the legislative community. Additionally, OCWR needs to evaluate its human capital management strategies to ensure that it can recruit and retain staff with the appropriate skills to plan and manage IT projects, as part of a larger effort to conduct IT planning. We are making the following six recommendations to OCWR: The Executive Director of OCWR, in collaboration with relevant managers, should establish a policy that requires a schedule of tasks to be developed, documented, and updated throughout the lifetime of IT system projects. (Recommendation 1) The Executive Director of OCWR should identify and assess risks in establishing and maintaining a permanent records retention program, and develop policies and procedures to ensure that risks are properly addressed. (Recommendation 2) The Executive Director of OCWR should identify desired performance results, develop performance measures that demonstrate the degree to which the desired results were achieved, and report progress toward those results in OCWR’s annual reports. (Recommendation 3) The Executive Director of OCWR should collect relevant data through a survey or other mechanisms, and use the information to evaluate the effectiveness of education and outreach efforts and the extent to which they are reaching all covered legislative branch populations. (Recommendation 4) The Executive Director of OCWR should integrate IT planning and implementation into the agency’s strategic planning process. (Recommendation 5) The Executive Director of OCWR should incorporate key strategic human capital management practices, such as developing strategies to recruit and retain staff with mission-critical skills, into the strategic planning process. (Recommendation 6) We provided a draft of the report to OCWR for review and comment. In its comments—reproduced in appendix III—OCWR agreed with our findings and concurred with our six recommendations. To address the recommendations, OCWR noted that it has already taken some actions, such as hiring a contractor to assess risks related to permanent records retention. It intends to implement additional changes, such as developing a policy for IT project planning. Going forward, OCWR agreed to update us on its progress implementing the recommendations. We are sending copies of this report to the appropriate congressional committees, the Executive Director of OCWR, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or jonesy@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our first objective was to determine the status of Office of Congressional Workplace Rights’ (OCWR) efforts to address new requirements from the Congressional Accountability Act of 1995 Reform Act (Reform Act). To meet this objective, we reviewed applicable laws and identified the new requirements. We reviewed the Reform Act and grouped Reform Act requirements into seven categories of activities based on similar characteristics, such as requirements related to amending the claims process, and how these requirements aligned with OCWR’s task teams working on these requirements. We also collected and reviewed documentation on OCWR’s implementation process and management practices, such as OCWR’s list of tasks and task teams, task team meeting notes, progress reports, agreements with outside vendors, and email communications. Our second objective was to assess how OCWR is incorporating key management practices to implement the Reform Act’s new requirements. To meet this objective, we analyzed OCWR’s implementation of new requirements against key practices for organizational change management we identified in our 2003 report, Results-Oriented Cultures: Implementation Steps to Assist Mergers and Organizational Transformations (GAO-03-669) and key practices for project management from the Project Management Institute Inc.’s A Guide to the Project Management Body of Knowledge, PMBOK Guide®. We determined which key practices and related implementation steps were applicable to OCWR based on the following factors: (1) if the practices aligned with the scope and nature of OCWR’s work, and (2) if the practices applied to OCWR’s implementation timeline given Reform Act deadlines. We shared these key management practices with OCWR. Our third objective was to determine the extent to which OCWR implemented recommendations from our 2004 report, Office of Compliance: Status of Management Control Efforts to Improve Effectiveness (GAO-04-400). To meet this objective, we reviewed OCWR’s plans and documentation of its activities, such as strategic plans and annual reports, to address the recommendations. We then assessed OCWR’s plans and activities against our original recommendations and the recommendations’ implementation status to determine the extent to which OCWR implemented the recommendations in the past and has continued to take similar actions. For all three objectives, we interviewed OCWR officials and conducted semi-structured interviews with a nonprobability sample of key stakeholders and officials from offices covered by the Reform Act. Although results from these interviews are not generalizable to all stakeholders or offices covered by the act, they provided views and illustrative examples about OCWR’s efforts to address new Reform Act requirements, OCWR’s efforts to incorporate key management practices to implement those new requirements, and the extent to which OCWR implemented some of our previous recommendations. These stakeholders and offices include the Architect of the Capitol, Senate Chief Counsel for Employment, and Office of House Employment Counsel. To obtain perspectives from a range of stakeholders and offices, we considered the following factors in our selection: size of the office or agency by number of employees; extent to which offices/agencies are involved in outreach by number of Administrative Dispute Resolution cases and Occupational Health and Safety Inspections/Americans with Disabilities Act inspections; past interviews with offices/agencies discussing OCWR outreach for balance of perspective (e.g., both chambers of Congress). We also interviewed the House Office of Employee Advocacy and the House Office of the Chief Administrative Officer safety team to obtain additional views on their interactions with OCWR. We conducted this performance audit from January 2019 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We determined that the following key organizational change management practices and key project management practices, as well as related implementation steps, were relevant for assessing the Office of Congressional Workplace Rights’ (OCWR) management practices. In addition to the contact name above, Steven Lozano (Assistant Director), Elizabeth Fan (Analyst in Charge), David Blanding, Giny Cheong, Patrick Dibattista, Karin Fangman, Ben Licht, Patricia Powell, and Edith Yuh made key contributions to this report. Karen Brindle, Hannah Brookhart, Kisa Bushyeager, Terrell Dorn, Robert Gebhart, Lisa Hardman, Ted Hu, Susan Irving, Sonya Johnson, Amalia Konstas, Kaelin Kuhn, Patricia McClure, Zina Merritt, Edda Emmanuelli Perez, Robert Robinson, Sukhjoot Singh, Jon Ticehurst, Alicia White, and Rebecca Woiwode also provided valuable assistance.", "summary": "OCWR is an independent, non-partisan office that administers and enforces various provisions related to fair employment and occupational safety and health within the legislative branch. Responding to concerns about sexual harassment in the workplace, Congress passed the Reform Act in 2018, which expanded worker protections and overhauled the process for resolving workplace claims, including claims relating to discrimination and harassment. The act also required OCWR to create a secure, electronic claims system and appoint a confidential advisor to assist claimants, among other requirements. The Reform Act includes a provision for GAO to review OCWR's management practices. This report examines (1) the status of OCWR's efforts to address new requirements in the Reform Act; (2) how OCWR is incorporating key management practices to implement the new requirements; and (3) the extent to which OCWR implemented recommendations from a related 2004 GAO report. GAO reviewed documentation on OCWR's processes, interviewed officials from OCWR and selected legislative branch offices, and assessed how OCWR's actions aligned with key organizational change management practices that GAO identified and key project management practices from the Project Management Institute. The Office of Congressional Workplace Rights' (OCWR) mission is to effectively implement and enforce the Congressional Accountability Act of 1995 (CAA), as amended in 2018 by the Congressional Accountability Act of 1995 Reform Act (Reform Act). OCWR has implemented three of the four Reform Act requirements that generally became effective June 19, 2019, as shown below. Three other Reform Act requirements—track and report data and assessments, conduct a workplace climate survey, and educate and assist legislative branch offices—are in progress. OCWR has incorporated some key management practices when implementing requirements, such as managing risks associated with appointing a confidential advisor. However, opportunities exist to further incorporate key management practices in OCWR's work. For example: Addressing risks . OCWR has not yet developed policies and procedures to address the risks associated with permanently retaining sensitive records, such as ensuring they remain confidential when stored in multiple locations. Measuring performance . OCWR has not established measurable performance targets and milestones or related performance measures. Doing so would allow OCWR to determine if it is making progress toward its long-term goals and better communicate with congressional and other stakeholders about its progress. Monitoring effectiveness . OCWR routinely conducts educational activities, such as holding brown bag events and online training, and performs a variety of outreach activities. OCWR has new opportunities every 2 years to collect data through the workplace climate survey on the extent to which legislative branch employees are aware of OCWR's services and their rights under the CAA. GAO found that OCWR implemented most recommendations from a 2004 GAO report examining OCWR's management controls. GAO also found that OCWR later stopped implementing a recommendation related to information technology (IT) planning, including ensuring that it obtained necessary IT skills. Without IT strategic planning, including recruiting and retaining staff with mission-critical IT skills, OCWR may be less able to carry out its strategic initiatives. GAO is making six recommendations to OCWR to better incorporate key management practices as it implements requirements, and to improve its strategic planning. OCWR agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Several bureaus within Interior are responsible for the leasing, permitting, and inspecting of mineral extraction activities on federal lands and waters. Interior’s Bureau of Land Management (BLM) is responsible for onshore activities and manages approximately 700 million acres of subsurface mineral rights throughout the country, including the acreage it leases to companies for oil and gas development. At the end of fiscal year 2016, about 41,000 oil and gas leases accounted for approximately 28.2 million acres in 32 states, according to BLM data. For offshore oil and gas activities, the Bureau of Ocean Energy Management is generally responsible for leasing and resource planning and evaluation, among other functions, and the Bureau of Safety and Environmental Enforcement is generally responsible for permitting and inspecting as well as verifying production volumes on offshore leases, among other functions. Under the Outer Continental Shelf Lands Act, as amended, Interior is responsible for leasing and managing approximately 1.71 billion offshore acres. To begin the leasing process, Interior holds auctions through which companies may secure the rights to federal leases that allow them to drill for oil and gas upon meeting certain conditions. Once a company obtains a lease, it may conduct further exploration and subsequently determine whether it would like to drill a well. If a company plans to drill, it must first secure a permit from Interior. To secure a permit to drill under an onshore lease, a company must submit an application for a drilling permit to the appropriate BLM field office. BLM officials then evaluate the company’s proposal to ensure that it conforms to the relevant BLM land use plan for the area as well as applicable laws and regulations, including those focused on protecting the environment. To secure a permit to drill on offshore leases, a company must submit an application for a drilling permit to the Bureau of Safety and Environmental Enforcement, where it is reviewed for completeness and whether all technical elements conform to applicable regulations. Once a company secures a permit and begins producing, oil and gas is transported to market and sold. As part of this process, companies may elect to process the natural gas into various products before its sale. Under ONRR regulations, companies may deduct certain costs associated with transportation and natural gas processing from the royalties due. Companies can continue to produce oil and gas until the lease is no longer capable of producing in paying quantities, regardless of the length of the lease. To ensure compliance with applicable laws, regulations, and other requirements, both BLM and the Bureau of Safety and Environmental Enforcement have inspection and enforcement programs that are designed to verify that companies comply with all requirements at the lease site, including those related to measuring oil and gas volumes. The authority for inspecting wells and leases for this purpose is derived from FOGRMA. The act requires the Secretary of the Interior to develop guidelines that specify the coverage and frequency of inspections. Interior has delegated responsibilities for implementing the act to BLM for onshore leases and to the Bureau of Safety and Environmental Enforcement for offshore leases. ONRR’s oversight of federal royalties includes collecting company-paid royalties, disbursing these royalties to appropriate accounts, and verifying the company-paid royalties through its compliance activities. Collecting: Companies that obtain federal onshore or offshore oil and gas leases are typically obligated to pay royalties on any oil or gas they produce from the leases and then sell. As a condition of producing oil and gas under federal and Indian leases, companies are required to submit two key monthly reports to ONRR—one specifying the total production and disposition of oil and gas and the other stating the royalties due based on production. However, because of various leasing and development arrangements made by companies, these two reports are often submitted by different companies. The companies physically developing the lease, referred to as the operators, are responsible for reporting the production volumes to ONRR in monthly production reports. The companies with a financial interest in the lease, referred to as the payors, are responsible for reporting the cash royalty owed on the federal and Indian oil and gas production in their monthly royalty reports. Each month, payors are to calculate the royalty payment owed to the federal government using the four key variables illustrated in the following equation: Royalty payment = ((volume sold x sales price) less deductions) x royalty rate Companies are to submit monthly production and royalty reports via a web-based portal to ONRR’s royalty information technology (IT) system. In addition to filing the royalty report with ONRR, companies typically make the actual cash royalty payment via an electronic fund transfer to an account at the Department of the Treasury (Treasury). Disbursing: Once ONRR reconciles the self-reported royalty payment data from the monthly royalty reports with the payments to Treasury, ONRR is to disburse the royalties from the Treasury account to the appropriate federal, state, tribal, or Individual Indian Money (IIM) accounts. All these transactions are to be recorded and stored in ONRR’s IT system. Verifying: ONRR is responsible for verifying royalties through its compliance program, which includes ensuring that the royalty revenues generated from the sale of oil and gas extracted from leased federal lands are accurately reported and paid. In conducting its compliance activities, ONRR is to assess the elements of the royalty equation: commodity price, volume of oil and gas, transportation and processing allowances, and royalty rate. ONRR also is to ensure that all relevant laws, regulations, and lease terms have been followed. ONRR has two key statutory requirements for its compliance program: FOGRMA and the Federal Oil and Gas Royalty Simplification and Fairness Act of 1996 (RSFA). FOGRMA requires that ONRR establish a comprehensive auditing system to provide the capability to accurately determine oil and gas royalties. RSFA directs ONRR not to conduct audit activities if it and the relevant state determine that the cost of conducting or requiring the audit exceeds the expected amount to be collected by the activity, based on the most current 12 months of activity. ONRR’s Work Planning Group identifies which companies or leases will be subject to compliance activities. The three primary levels of compliance activities ONRR conducts are audits, compliance reviews, and data mining—each of which provides a varying degree of assurance that royalties are accurately paid. Audits: According to ONRR documents, an audit involves detailed examinations of companies’ royalty payments and corresponding reporting to ONRR. As part of an audit, ONRR staff are to assess the accuracy and completeness of the companies’ self-reported production and royalty data compared to third-party documents, such as sales contracts and oil and gas sales receipts from pipeline companies. According to ONRR documents, it is to design its audits to ensure that royalty payments and other obligations to ONRR are in substantial compliance with applicable lease terms, federal laws and regulations, and other policies. Compliance reviews: ONRR describes compliance reviews as an analysis designed to determine the reasonableness of company- reported production and royalty data. In contrast to audits, compliance reviews are quicker, more limited checks on the accuracy and completeness of companies’ self-reported data and do not include systematically examining the underlying source documentation used to generate the self-reported data. Data mining: ONRR began its data mining program in 2011 and officially organized it within the compliance program beginning in fiscal year 2018. Data mining is a partially automated activity to identify and resolve data errors prior to audits and compliance reviews. According to ONRR officials, data mining examines large sets of company- reported data for certain common errors, such as irregularities in the volume of oil or gas extracted. Officials stated that data mining generally identifies obvious data errors that ONRR staff work with companies to correct. The process companies are to follow to produce oil and gas from federal leases, bring it to market, transmit required data to Interior, and pay royalties is outlined in figure 1. FOGRMA authorizes the Secretary of the Interior to enter into cooperative agreements with states to share oil and gas royalty management information and carry out inspection, audit, investigation, and enforcement activities on federal and Indian lands. Currently, the nine states that are members of STRAC have delegated authority to conduct compliance activities for federal lands in their respective state. These agreements form the framework of ONRR’s relationship with states for mineral revenue compliance activities. A governor or other appropriate official with delegation authority may request that Interior enter into a cooperative agreement with a state by sending a letter to the Director of ONRR. States may also elect to end these agreements at their discretion with a 120-day notice. States have a vested interest in ensuring that all royalties are paid accurately because states receive a portion of the royalties that the federal government collects, including additional collections resulting from compliance activities identifying underpayment. ONRR also reimburses states for the costs of performing approved and eligible compliance activities, including compliance activities under the cooperative agreement. State audit offices that have entered into agreements with ONRR are to submit yearly work plans identifying the compliance activities they propose to conduct in the next fiscal year, which ONRR is to review and approve. Member states can conduct both audits and compliance reviews, and ONRR requires that the state auditors follow the procedures established in generally accepted government auditing standards and ONRR’s audit and compliance review manuals. To ensure that compliance activities are conducted in accordance with generally accepted government auditing standards and relevant ONRR manuals, states are to undergo an external peer review every 3 years, during which they are assessed on their adherence to the standards and manuals and whether they provided corrective actions to any identified problems. A key practice in results-oriented management for federal agencies is establishing agency-wide, long-term strategic goals. The Government Performance and Results Act of 1993 (GPRA), which was significantly enhanced by the GPRA Modernization Act of 2010 (GPRAMA), requires federal agencies, among other things, to develop strategic plans with long-term, outcome-oriented goals; annual goals linked to achieving the long-term goals; and annual reports on the results achieved, as assessed through the use of performance measures and targets. Federal departments and agencies must comply with these requirements and are to follow associated Office of Management and Budget guidance when developing their agency-wide strategic plans. We have reported that these requirements also can serve as leading practices for strategic planning at lower levels within federal agencies, such as planning for individual divisions, programs, or initiatives. These leading practices include defining the mission and goals of an agency or a specific program and developing and using performance measures that allow an agency to track its progress toward its mission and goals. ONRR issued a fiscal year 2017 strategic priorities document that contains the agency’s mission statement: “to collect, account for, and verify natural resource and energy revenues due to states, American Indians, and the U.S. Treasury.” ONRR stated in the document that it planned to achieve Interior’s strategic goals to (1) timely disburse 98 percent of federal and Indian revenues, (2) close 85 percent of Interior’s OIG and GAO recommendations targeted for implementation in fiscal year 2017, and (3) report results of ONRR’s supporting performance measures for Interior’s strategic goals on total ONRR compliance collections and a 3-year average compliance return on investment. ONRR also stated that it planned to create an ONRR strategic plan. In the 1970s and early 1980s, we and Interior’s OIG reported on Interior’s management of the oil and gas revenue collection system. Interior’s OIG issued five reports critical of the program from 1969 through 1977 that raised concerns about royalty collections. In 1981, we reported that Interior was not collecting potentially hundreds of millions in royalties due from federal oil and gas leases. In response, in 1981, the Secretary of the Interior established the Commission on Fiscal Accountability of the Nation’s Energy Resources, also known as the Linowes Commission, to investigate allegations of irregularities in royalty payments, among other issues. The Linowes Commission raised a number of concerns, and its 1982 report stated that management of royalties for the nation’s energy resources had been a failure for more than 20 years. The report found that because the federal government had not adequately managed this multibillion-dollar enterprise, the oil and gas industry was not paying all the royalties it rightly owed. The report cited a range of problems, including the failure to verify data that companies reported as well as late payments and underpayments. Following this report, Interior and Congress took actions aimed at improving revenue collection, including reorganizing oil and gas revenue collections under a new bureau within Interior, passing FOGRMA in 1982, and passing RSFA in 1996. In December 2006, Interior’s OIG analyzed ONRR’s compliance processes and issued a report that made several recommendations to improve these processes and the agency’s systems for tracking them. The report identified deficiencies with how ONRR maintained compliance-related information and recommended changes for how ONRR measures its compliance activities’ performance. In 2007, Interior’s Subcommittee on Royalty Management—a subcommittee of the Royalty Policy Committee—issued a report that reiterated several of the findings from Interior’s OIG report on ONRR and further stated that several aspects of royalty management activities required prompt and, in some cases, significant management attention. In particular, the report included over 100 recommendations for improving Interior’s management of oil and gas resources, including recommendations related to audit, compliance, and enforcement. Appendix I provides a list of the subcommittee’s recommendations and the status of their implementation, according to Interior documents and interviews with Interior officials. We identified several challenges with Interior’s management of federal oil and gas in the 2000s. In February 2011, in part because of the challenges identified in our past work, we added Interior’s management of federal oil and gas resources to our list of program areas at high risk for fraud, waste, abuse, and mismanagement. In the March 2019 update of our High-Risk List, we found that Interior had made progress improving its management of federal oil and gas resources. However, additional steps are needed to improve Interior’s royalty determination and collection. ONRR, according to officials, has begun implementing several initiatives that seek to make the agency operate more effectively. In March 2017, ONRR initiated Boldly Go, an effort to assess its organizational structure and identify and implement potential improvements. According to ONRR officials, this initiative was in response to March 2017 comments from the Secretary of the Interior, in which he said the department, in general, should undergo a “bold restructuring.” ONRR officials said that the Boldly Go organizational restructuring was implemented in October 2017 and included several changes to how ONRR conducts its compliance work. Before the reorganization, audits and compliance reviews were part of the same management group—referred to as the Audit and Compliance Management group. After the reorganization, audits and compliance reviews are managed separately. Audits now have their own management group, referred to as Audit Management. According to ONRR officials, the new Audit Management group conducts audits of multiple companies and properties and will attempt to identify more systemic misreporting issues common to those companies and properties. ONRR staff who conduct compliance reviews were moved into the same management group as the data mining staff in the new Compliance Management group. According to ONRR officials, the merger occurred because both groups use similar data sources to conduct less in-depth checks of the royalty data than audits. Additionally, officials stated that putting these activities under the same management could assist in better targeting companies for similar compliance issues. Prior to the reorganization, identifying and selecting cases for audits and compliance reviews was a function of the Audit and Compliance Management group. After the reorganization, this function was moved to a new Analytics and Risk Management group that is also tasked with using data analytics methods, such as computerized analysis of spatial and geographic data, to better identify noncompliant royalty payments. ONRR is also in the process of implementing a new electronic compliance case management and work paper tool referred to as the Operations and Management Tool (OMT). According to ONRR documents, OMT is to combine multiple systems into one and is intended to serve a variety of functions. ONRR documents state that OMT is designed to be a single standardized system that reduces manual data entry, creates a single system of record for ONRR case data, offers error checks to eliminate data entry errors, and provides greater transparency for outside auditors. One ONRR official stated that the agency plans to have ONRR’s data mining, compliance review, and audit teams all using OMT to manage their compliance work in 2019. According to some ONRR and state audit officials, ONRR piloted OMT’s electronic compliance case management system in North Dakota in 2018, and ONRR expects to offer OMT as an option to other STRAC partners for their audit and compliance review case management needs. Finally, the agency introduced a new auditor training curriculum in April 2018. Shortly after new auditors are hired, they are expected to begin ONRR’s training program, and according to ONRR’s training manual, they are expected to complete the training within 2 years of their hire dates. According to ONRR officials, courses will also be available to existing audit staff upon request. ONRR reported generally meeting its annual royalty compliance goals for fiscal years 2010 through 2017. To meet its compliance goals, ONNR used all three levels of compliance activities—audits, compliance reviews, and data mining—each of which provides a different level of assurance. However, ONRR’s compliance goals may not align with the agency’s mission to ensure the accuracy of royalty payments and other statutory requirements. ONRR reported generally meeting its annual compliance goals—those from Interior’s strategic plan and bureau-specific goals—for its royalty compliance program for fiscal years 2010 through 2017, and the agency made multiple revisions to its goals during this period. Our analysis of Interior’s annual budget justifications for fiscal years 2010 through 2017 found that ONRR reported meeting its compliance goals for 6 of the 8 fiscal years we reviewed (see table 1). According to ONRR officials we interviewed, the 2 years when the agency did not report meeting its compliance goals largely resulted from a shift in the focus of its goals that created a short-term misalignment of planned work and available resources. During fiscal years 2010 through 2017, ONRR revised its annual compliance goals multiple times. These included both compliance goals supporting Interior’s strategic plans covering fiscal years 2007 through 2018 and bureau-specific goals. In the revisions to its compliance goals, ONRR generally shifted from goals focused on the extent to which its compliance program was ensuring the accuracy of royalty payments to those focused on the efficiency of the program. ONRR’s accuracy goals, which included conducting compliance activities to cover a specific percentage of royalties, companies, or properties, helped it assess the extent to which it was ensuring the accuracy of royalty payments. That is, by measuring the portion of, for example, royalties subject to compliance activities, it was able to quantify the percentage of royalties that were reasonably correct or accurate. ONRR’s efficiency goals, which included conducting compliance activities to obtain a certain return on investment and additional amount of royalty collections, helped it assess whether resources spent on compliance activities were used cost effectively. According to ONRR officials, these revisions were made in an effort to continually improve its compliance performance. Table 2 identifies ONRR’s annual compliance goals for fiscal years 2010 through 2017 and establishes two categories for these goals corresponding to ONRR’s requirements under FOGRMA and the RSFA. Appendix II provides more detailed information on ONRR’s annual compliance goals and the agency’s reported compliance program performance. Conduct compliance activities on specified percentage of companies (coverage) Conduct compliance activities on specified percentage of properties (coverage) Conduct compliance activities on specified percentage of companies (coverage) Conduct compliance activities on specified percentage of companies (coverage) Conduct compliance activities on specified percentage of companies (coverage) Conduct compliance activities on specified percentage of payors and operators (coverage) Conduct compliance activities on specified percentage of payors and operators (coverage) Generate specified return on investment from compliance activities Generate specified return on investment from compliance activities Generate specified amount in total additional royalties Generate specified return on investment from compliance activities Generate specified amount in total additional royalties Legend: FOGRMA = Federal Oil and Gas Royalty Management Act of 1982, as amended; N/A = not applicable; RSFA = Federal Oil and Gas Royalty Simplification and Fairness Act of 1996; — = does not apply. While it is within ONRR’s purview to revise its compliance goals or targets, frequent changes may complicate management’s ability to assess performance over time because consistent goals are needed as a baseline from which to assess performance. For example, for the time period we reviewed, ONRR revised its compliance goals or goal targets nearly every year. This makes it difficult to assess, for example, how variations in resource allocations to and among its compliance activities may have affected the compliance program’s performance. The following are the types of compliance goals that ONRR used and revised for the period: Royalty coverage goal. Prior to fiscal year 2010, one of ONRR’s compliance goals was to conduct compliance activities on a specified percentage of royalties within 3 years of the date it received payment. In December 2006, Interior’s OIG issued an audit report that found, among other things, that the royalty compliance coverage goal had reduced the number of companies and properties subject to compliance work. The report stated that ONRR should consider modifying its compliance program strategy to ensure appropriate coverage of properties and companies within a reasonable time frame even if this resulted in a reduction in the overall percentage of dollars covered and recommended that ONRR develop separate performance measures for companies and properties subjected to compliance coverage. ONRR concurred with the recommendation and developed an implementation action plan. For fiscal year 2010, ONRR eliminated its royalty coverage goal in response to the OIG recommendation. Company/operator/payor and property coverage goals. For fiscal year 2010, ONRR revised its compliance goals to address company and property coverage, or conducting compliance activities—including audits and compliance reviews—on a certain percentage of companies and properties. ONRR’s fiscal year 2010 budget justification stated that the new compliance goals would reflect the cumulative percentage of unique companies and properties covered by audits, compliance reviews, or the royalty-in-kind compliance strategy. For fiscal year 2010, ONRR’s company coverage goal was to cumulatively conduct compliance activities on 57.6 percent of companies that paid royalties from fiscal years 2008 through 2012. ONRR’s property coverage goal was to cumulatively conduct compliance activities for 35 percent of properties where oil and gas had been extracted and sold from fiscal years 2008 through 2012. For fiscal year 2011, ONRR revised its compliance goals, eliminating the property coverage goal. ONRR also revised its company coverage goal to cumulatively conduct compliance activities on 66 percent of companies that paid royalties for fiscal years 2011 through 2016. ONRR further revised this goal for fiscal year 2014 to consider operators and payors instead of companies. In fiscal year 2014 ONRR established a compliance goal of conducting compliance activities on 90 percent of operators and payors but dropped the goal to 52 percent for fiscal year 2015. The goal for covering a percentage of operators and payors was eliminated beginning in fiscal year 2016, which left ONRR without a compliance goal addressing its coverage of royalty payments. Agency officials we interviewed told us that they eliminated ONRR’s company coverage goal because they concluded that the compliance program was reviewing too many companies and properties with smaller royalty payments, which officials deemed an inefficient use of limited compliance resources. ONRR officials added that budgetary constraints and the complexity of company bankruptcies and consolidation in the oil and gas industry also contributed to the goal’s elimination. Additionally, in 2008, ONRR established a data mining program to examine large sets of operator-reported data to identify royalty and reporting errors, such as when the production volumes that payors and operators reported for the same lease did not match. This work led to additional royalty collections, but ONRR did not consider these results when calculating its annual performance measure for company and property coverage. According to officials, data mining was the responsibility of ONRR’s Royalty Reporting group and was not considered compliance work. Return on investment goal. ONRR has had a goal for return on investment for fiscal years 2010 through 2017 that measured the efficiency of the compliance work that all of its program areas performed. However, Interior elevated this goal from a bureau-specific goal to a strategic plan goal for fiscal year 2017. This goal is a ratio of costs to collections for compliance activities—and is to assess whether ONRR collected additional royalties for every additional dollar the agency spends on compliance reviews, audits, and data mining. To account for variations in collections and oil and gas prices, ONRR is to calculate its performance on return on investment based on the royalties from the previous 3 years. For example, the return on investment the agency reported for fiscal year 2017 was based on revenues collected from fiscal years 2014, 2015, and 2016. According to ONRR officials, the goal for fiscal year 2017—to collect an additional $2 in royalties for every $1 spent on compliance activities—was developed based on trends from prior years. Achieving this return on investment would indicate that ONRR met its goal. Total additional royalty collections goal. In fiscal year 2016, ONRR developed a bureau-specific goal for total additional royalties collected from compliance reviews, audits, and data mining. The goal for fiscal year 2016 was to collect an additional $110 million from compliance activities. In the following fiscal year, 2017, ONRR elevated this goal to a strategic plan goal and kept the amount the same, at $110 million in additional royalties. To generally meet its compliance goals during fiscal years 2010 through 2017, ONRR used all levels of its compliance activities: audits, compliance reviews, and data mining. The number of audits completed annually generally remained the same for fiscal years 2010 through 2017, declining slightly from 162 in 2010 to 153 in 2017. During the same time period, the number of completed compliance reviews decreased, declining from 1,233 in 2010 to 683 in 2017 (see fig. 2). During this time frame, ONRR’s Data Mining group increased the number of exceptions resolved to address instances of incorrectly reported data from 4,323 in 2010 to over 26,000 in 2017. Our analysis of ONRR’s data on compliance activities showed that adding data mining financial results in 2011 was associated with a decrease in the return on investment for ONRR’s other compliance activities. Prior to including data mining, compliance reviews earned a 6 to1 return on investment, STRAC compliance work earned about a 4 to1 return on investment, and audits earned a 2 to1 return on investment. By the end of fiscal year 2017, data mining proved to be far more cost-effective for royalty compliance, with a return on investment of 9 to1. During the same time, return on investment declined for all compliance reviews (including STRAC compliance work) and all audits (see fig. 3). According to ONRR officials, the reason for this decline was that data mining was identifying royalties that might otherwise have been identified through audits or compliance reviews. Additionally, ONRR officials we interviewed stated that data mining has been more cost-effective than audits or compliance reviews in identifying additional royalties. Officials we interviewed stated that data mining often identifies more simple reporting errors. Return on investment is an indicator of the efficiency of ONRR’s compliance program. As long as ONRR is collecting more royalties through its compliance activities than it is spending on identifying those royalties, the federal government will obtain additional revenues. According to ONRR officials we interviewed, the agency does not calculate the potential additional royalty revenues that would be generated if it conducted additional compliance activities. However, ONRR officials said they do calculate the effect of reduced funding on compliance activities. For example, ONRR stated in its fiscal year 2018 budget justification document that reductions in its budget for compliance work would directly result in reductions to additional royalty collections. ONRR’s fiscal year 2017 compliance goals, the most recent compliance goals we reviewed, may be useful for assessing certain aspects of ONRR’s performance but may not be effectively aligned with the agency’s stated mission or fulfill other statutory requirements. ONRR’s 2017 strategic priorities document states that the agency’s mission is to collect, account for, and verify energy revenues. Additionally, statutory requirements under RSFA direct ONRR not to conduct audit activities if it and the relevant state determine that the cost of conducting or requiring the audit exceeds the expected amount to be collected by the activity, based on the most current 12 months of activity. ONRR’s fiscal year 2017 return on investment compliance goal helps the agency comply with RSFA by assessing whether the agency’s compliance program is cost- effective. Moreover, ONRR’s statutory requirements under FOGRMA require that it establish a comprehensive auditing system to provide the capability to accurately determine oil and gas royalties, among other requirements. However, ONRR’s fiscal year 2017 compliance goals do not sufficiently address its mission or FOGRMA requirements, in part, because its goals do not address accuracy—or consider the extent to which its compliance work is covering, for example, royalty payments. While ONRR previously had coverage goals, agency officials told us that they eliminated their company and property coverage goals because they concluded the compliance program was reviewing too many companies and properties with smaller royalty payments. ONRR officials told us that this was deemed an inefficient use of limited compliance resources. However, it is difficult for ONRR to provide reasonable assurance that it is accurately collecting royalties when it does not have data on the extent to which, for example, royalties or companies were subject to compliance activities. According to agency officials we interviewed, ONNR stopped tracking these data when ONRR eliminated its coverage goals for fiscal year 2016. As a result, ONRR could be determining that it is meeting its current annual compliance goals but potentially doing so by examining a small percentage of royalties or companies. For example, ONRR may be able to achieve a 2 to 1 return on investment, but only conduct compliance activities on 10 percent of the approximately $5 billion in royalties paid in calendar year 2017. This raises questions about the extent to which ONRR can provide reasonable assurance that its compliance program is assessing the accuracy of oil and gas royalty payments because it does not have a goal for, or data on, the amount of royalties subject to compliance activities. Finally, because ONRR no longer has a coverage goal—which helps it assess the extent to which it has ensured the accuracy of royalty payments—it does not track the amount of royalties subject to its differing level of compliance activities. ONRR has established a compliance program with three activities—audits, compliance reviews, and data mining—each of which offers varying levels of assurance for determining the accuracy of royalty payments. However, the extent to which its compliance program allows ONRR to accurately determine and collect royalty payments is unclear because the agency does not track each compliance activity’s contribution toward a coverage goal. Interior’s OIG reported a similar finding in December 2006. In its report, the OIG found that ONRR’s compliance goal for coverage of royalties was misleading because it weighed audits and compliance reviews equally, although the two compliance activities provided differing levels of assurance about whether royalties were accurately paid. The OIG recommended that ONRR should revise the compliance goal to account for each compliance activity separately. While ONRR did not concur with establishing a goal for each of the compliance activities, it agreed to internally track separate measures for them. According to ONRR documentation, the agency took steps to identify what amount of royalties was covered by audits or compliance reviews but did not report this information. When ONRR eliminated its coverage goals for fiscal year 2016, it no longer tracked information on the extent to which royalty payments were subject to its different levels of compliance activities. By establishing a coverage goal (e.g., identifying the number of companies or percentage of royalties subject to compliance activities over a set period of time) that aligns with the agency’s mission and tracking the extent to which each of its compliance activities contributes toward this goal, ONRR would have greater assurance that its compliance program has the capability to accurately determine oil and gas royalties. ONRR’s process to select compliance cases for audits and compliance reviews is not documented. Additionally, the agency does not have performance measures for determining whether its case selection process aligns with the agency’s compliance goals. Finally, while ONRR has a risk model to assist in selecting compliance cases, it has not analyzed the effect the risk model has had on its selection process. ONRR does not have a documented case selection process with procedures for how to select cases. According to ONRR officials, ONRR’s Work Planning Group reviews royalty information on federal oil and gas leases and selects leases from specific companies or properties to undergo either an audit or a compliance review. These officials also stated that while the process for selecting cases for audits and compliance reviews differs, the agency has no written procedures for either compliance activity on how cases should be selected. For audits, ONRR officials we interviewed told us that cases are generally selected based on research from ONRR’s recently established Analytics and Risk Management group, which includes the relocated Work Planning Group and other offices that analyze particular aspects of the oil and gas industry, such as pricing. According to these officials, the work planners or analytics staff review a variety of royalty payment and oil and gas production information to identify trends and outliers that may indicate potential royalty noncompliance. The officials told us that they also consider other factors in their selection decisions, such as whether a company was new—and therefore may be unfamiliar with how to correctly report royalties—or had undergone a change in ownership—which can lead to reporting errors. Additional factors that ONRR officials told us they considered were referrals by ONRR staff based on recently completed compliance activity on a specific company or property and the risk scores for the relevant companies and properties generated from the agency’s compliance risk model. For compliance reviews, ONRR officials we interviewed told us that the Work Planning Group includes information from a Go/No-go analysis, which they said allows ONRR to make a decision early in the process to cost effectively decide whether to initiate a compliance review. According to ONRR officials, the use of the Go/No-go analysis began in fiscal year 2015 as means to better ensure that the compliance activities they select will identify a finding of royalty noncompliance. According to the officials, the Work Planning Group then compares the list of companies and properties to other sources of information, such as the findings of recently completed work and ONRR’s royalty compliance risk model, to select cases based on the group’s professional judgment. Overall, ONRR officials we interviewed said that the Work Planning Group maintains a small pool of cases for either an audit or compliance review for when staff become available after completing other work. ONRR officials said that as there was no requirement that they develop documented procedures for case selection, they rely on the experience and training of members of the Work Planning Group to review the available information and select cases based on requests from the Audit Management and Compliance Management groups. Under federal standards for internal control, management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives, including the documentation of the internal control system. Documentation provides a means to retain organizational knowledge and mitigate the risk of consolidating that knowledge to a few personnel, as well as a means to communicate that knowledge as needed to external parties, such as external auditors. By developing a documented case selection process that includes procedures for how to select compliance cases, ONRR could better ensure that it retains the organizational knowledge needed to carry out the process effectively and can defend it to external parties. ONRR does not have performance measures for determining the extent to which cases selected align with the agency’s compliance goals. ONNR’s Work Planning Group is responsible for selecting cases—that is, companies or properties—to undergo a compliance review or audit. As mentioned previously, ONRR’s fiscal year 2017 goals for its compliance program are to achieve a specified return on investment and total amount of additional royalties collected from the cases it selects to undergo compliance activities. However, according to ONRR officials we interviewed, these goals are not considered when selecting cases. Rather, these officials told us that the Work Planning Group attempts to select cases for compliance activities that are the most likely to result in a finding of royalty noncompliance. A finding of noncompliance for a company can result from a variety of circumstances, such as reporting an incorrect volume of oil or gas sold or claiming allowances for transportation and processing costs above established limits. ONRR officials stated that the agency’s IT system tracks whether a completed compliance case resulted in a finding, but the agency does not regularly assess the percentage of completed cases that produce findings. Prior to 2015, ONRR had performance measures for determining the extent to which cases selected aligned with its compliance goals but stopped using these measures after it made changes to the goals. Prior to fiscal year 2010, for example, ONRR had a goal for conducting compliance activities on a certain percentage of royalties within 3 years from the date it received payment. To support this goal, ONRR sought to select companies with relatively high royalty dollar amounts. ONRR then assessed its performance toward achieving this goal by reviewing all completed audits and compliance reviews over a 3-year period and calculating the percentage of total royalties paid over this period from completed compliance cases. For example, in fiscal year 2008, ONRR reported that compliance cases covered 69 percent of royalties received in calendar year 2004. However, as we noted previously, the 2006 OIG report found that the focus on coverage of royalties resulted in ONRR providing limited coverage of its universe of companies and properties. Additionally, ONRR officials we interviewed confirmed that selecting cases with higher royalty amounts to achieve the royalty coverage goal resulted in more limited coverage of companies because the goal directed ONRR toward repeatedly selecting many of the same large companies each year for compliance activities. In response to the recommendations in the OIG’s report as well as ONRR’s own recognition of the reduced company coverage resulting from its selection of companies that pay high royalties, ONRR transitioned to a new performance measure for case selection along with a new compliance goal in fiscal year 2010. ONRR’s new performance measure assessed the number of unique companies and properties for selected compliance activities. This new performance measure, according to ONRR officials, was driven by ONRR’s new compliance goal for cumulatively covering a certain percentage of unique companies and properties over a 3-year period. According to ONRR officials, after the company and property coverage goal was in place for approximately 5 years, officials determined that this goal and corresponding performance measure was driving the compliance case selection process to select too many companies and properties with smaller royalty payments, which they deemed an inefficient use of limited compliance resources. As a result, ONRR officials told us that the agency decided to change its compliance goal in fiscal year 2015 to focus on return on investment and total additional dollars collected. However, ONRR did not establish a corresponding performance measure for its compliance case selection process that would determine the extent to which cases selected contributed to ONRR’s compliance goals. As stated previously, we have reported that the requirements in GPRA and GRPAMA for establishing performance metrics serve as leading practices for divisions, programs, and initiatives. Performance measures help agencies make resource decisions, provide managers information on which to base their organizational and management decisions, and create powerful incentives to influence organizational and individual behavior. Furthermore, successful performance measures are aligned with division and agency-wide goals and missions. According to ONRR officials we interviewed, they have not established performance measures for determining whether the way such cases are selected aligns with the agency’s compliance goals because there is no specific requirement to do so. By developing performance measures (e.g., establishing a specified percentage of compliance cases that identify findings of royalty noncompliance or total additional royalties) that assess whether the agency is selecting cases that are helping it achieve its compliance goals, ONRR would be able to better monitor its performance in achieving its goals and whether changes to its selection process affect its performance. ONRR has developed a model that assesses the risk of noncompliance for companies and properties. Officials from the Work Planning Group use this model to inform their compliance case selections. However, it is unclear whether use of the model has improved case selection because ONRR has not analyzed the model’s effect on such selections. ONRR began a pilot program in 2006 to analyze the risk factors for royalty noncompliance, which included developing a quantitative risk model. In December 2006, Interior’s OIG recommended that ONRR consider additional factors that may indicate a risk of noncompliant royalty payments when making case selection decisions. In addition to the factors that ONRR was using to select cases to help achieve its compliance goals, such as cases with high royalty dollars, the OIG recommended that ONRR incorporate other risk factors, including companies or properties having a history of underreported royalties and falsely reported information to other federal agencies, such as the Environmental Protection Agency. In December 2007, Interior’s Subcommittee on Royalty Management reiterated the importance of using a risk-based process for compliance and made a number of related recommendations to ONRR. Among these were that ONRR should fully implement the quantitative model it was developing as part of its pilot program. Additionally, the subcommittee recommended that ONRR evaluate its risk model’s performance and then establish a process to continually validate and update the model to ensure that it remains effective. In response to these recommendations, ONRR worked with a contractor from 2006 through 2012 to develop an initial risk model. This model evaluated the risk of royalty noncompliance for each lease based on four characteristics: the type of lease, the specific location of the lease, the region of the country the lease was in, and the type of commodity extracted. The model looked at a number of indicators of risk, which were grouped into four overall risk drivers: complexity of the oil and gas market, complexity of regulations, commodity-specific practices, and transparency of the market. According to officials from the Work Planning Group we interviewed, they used the risk scores generated from this model to help inform the list of compliance cases to be reviewed the following year. These officials told us that they stopped using the scores from this model around 2012 for two reasons. First, the model allowed for the scores to be manually weighted based on the judgment of those selecting the compliance cases, and this weighting process was believed to have eventually hurt the accuracy of the risk scores. Second, agency officials determined that the risk scores the model was producing did not correlate closely with cases resulting in significant findings. In 2013, ONRR tasked a different contractor with developing a new set of risk models. According to an initial development document, ONRR requested separate risk models for companies and properties that would determine the propensity for a company to submit an incorrect royalty payment using historical royalty compliance data that ONRR and third- party sources provided. The contractor produced two risk models, one that assigned a risk score to companies and one to properties. The risk scores—which ranged from 0 to 100—attempted to quantify the risk of royalty noncompliance. The initial models were completed in 2014, and ONRR began including the risk scores from these models in the data that the Work Planning Group reviewed during the case selection process. Documents from the contractor show that the models then went through an initial validation process using the results of cases that the contractor selected when the models were instituted in 2014 and completed cases from 2012 onward. According to documents summarizing the contractor’s efforts, the validation showed a correlation between higher risk scores on the company model and cases that resulted in findings and additional royalty revenues. However, the contractor reported that higher risk scores on the property model did not correlate with either findings or additional royalty revenues. The documents we reviewed also included a number of recommendations to ONRR to improve its risk modeling, including adding third-party and commercial data sources, adding data sources from within ONRR and other oil and gas bureaus within Interior, and attempting to redefine property risk and building a new property risk model. However, according to officials we interviewed, they have not yet acted on any of these recommendations. ONRR requested that the contractor update the models with data from recent royalty reporting and completed compliance cases, which it did in both 2015 and 2018 but does not do either regularly or periodically. According to ONRR officials, the Work Planning Group currently considers the risk scores based on the company model when selecting cases but does not consider the risk scores based on the property model, as the group considers those scores less reliable. ONRR officials told us that they do not believe that their current risk approach is entirely effective and are considering having staff from the Analytics and Risk Management group develop a risk model for the agency. To date, ONRR has not analyzed how the use of the risk scores has affected case selection or findings of royalty noncompliance and is therefore unable to identify whether its risk model is effective. As a result, the agency does not have sufficient information to make a decision on whether to continue using the model as it exists today, consider potential improvements, or discontinue the model in favor of another approach. Federal standards for internal control state that management should design control activities to achieve objectives and respond to risks, such as by comparing actual performance to planned or expected results and analyzing significant differences. By periodically analyzing whether the risk model is effectively identifying potential royalty noncompliance and whether the model’s results are being effectively used to assist in case selection, and making changes to the model (e.g., updating it) or developing a new model based on this analysis, ONRR would be better able to determine how to proceed with using risk analysis to inform its case selections. STRAC officials we interviewed from the nine member states that had agreements with ONRR for conducting royalty compliance generally expressed satisfaction with ONRR’s coordination of compliance activities, including both the frequency of interaction as well as support for budget and training. STRAC officials from all nine member states generally expressed satisfaction with the frequency of interaction between STRAC and ONRR. STRAC officials stated that this interaction occurred primarily through three mechanisms. First, ONRR and STRAC hold semiannual in-person meetings. At these meetings, STRAC officials said that attendees discuss a range of topics. For example, at the March 2018 STRAC meeting in Sacramento, California, which we attended, there were two training sessions as well as a session on updates to ONRR’s IT systems. Second, ONRR and STRAC hold quarterly teleconferences. These teleconferences, according to STRAC officials, are opportunities for both ONRR and STRAC to highlight any significant or systematic issues that they may be identifying in their compliance activities. Third, ONRR assigned agency points of contact to each STRAC member state for technical questions. The STRAC officials stated that ONRR has been responsive when they have reached out with questions or concerns. Overall, STRAC officials from seven of the nine member states said that coordination with ONRR had improved over the past approximately 10 years. STRAC officials from two of the member states attributed this improvement to ONRR leadership’s concerted effort to work more effectively with STRAC. Additionally, STRAC officials from the majority of member states generally expressed satisfaction with the support ONRR has provided STRAC member states with respect to resources and training. STRAC officials from seven of nine member states told us that the current contracted budget was sufficient to conduct oversight of their states’ federal oil and gas royalties. STRAC officials from two member states stated that the budget was insufficient. One official stated that the budget did not allow the state to review all of the federal properties for which it was responsible. The officials from the other state indicated that a larger budget would allow the state to hire additional auditors. According to these officials, additional auditors could help the state conduct compliance activities on more royalty payors and in particular small royalty payors that may not be as familiar with the requirements for federal royalty payments. STRAC officials from several member states said that the flat budget that ONRR provided over the past several years may lead to changes in their federal royalty compliance activities. For example, one official stated that without additional funding in the future, the state may have to move more experienced and higher paid auditors to state royalty compliance activities, thus leaving less experienced and lower paid auditors to conduct federal royalty compliance activities. Another official stated that the state had offered less training and reduced the amount of funds for travel to address potential budget shortfalls. Additionally, another official stated that flat budgets could make it difficult to offer staff merit pay increases. Finally, officials from seven of the nine STRAC member states said ONRR provided sufficient training on policies, procedures, and IT systems used to conduct compliance activities on federal oil and gas royalties. A STRAC official from one member state said that ONRR’s training had improved recently, while another official said that support had improved. However, STRAC officials from three member states expressed uncertainty about ONRR’s training for companies. These officials stated that they would like to understand the content of the training so they would better understand how ONRR is training companies to report royalties. None of the nine STRAC member states had documented case selection processes. Specifically, officials from all nine STRAC member states we interviewed said that either they did not have, or were unable to provide, documented procedures for the processes they used to select federal oil and gas compliance cases. Rather, STRAC officials stated that they relied on a variety of factors to select cases for compliance reviews. Staff expertise about companies and properties was the factor that all nine STRAC officials identified as key for case selection. For example, one official stated that she had over 10 years of experience and therefore knew what companies or properties to review. Another official stated that because staff also work on state tax audits, they can use knowledge from that work to help identify compliance cases. Another factor officials identified as assisting in the case selection process was ONRR’s company and property risk scores, though they were given varying degrees of consideration. Other factors officials identified included referrals from BLM or ONRR, and risk scores generated from their own models. Under federal standards for internal control, management should establish an organization structure, assign responsibility, and delegate authority to achieve the entity’s objectives, including the documentation of the internal control system. Documentation provides a means to retain organizational knowledge and mitigate the risk of consolidating that knowledge to a few personnel, as well as a means to communicate that knowledge as needed to external parties, such as external auditors. Because STRAC members do not have a documented process, ONRR cannot, for example, assess whether STRAC members are selecting compliance cases in a manner that aligns with ONRR’s compliance goals or that future STRAC members will know how to select compliance cases. In the agreements between the nine STRAC members and ONRR, the agency includes terms and conditions that the members agree to, but ONRR does not require STRAC members to have documented procedures for compliance case selection. By including in ONRR’s future agreements with STRAC members requirements to develop a documented case selection process, including procedures for how to select compliance cases and how to document which factors were considered in selection decisions, ONRR could better assess whether members select cases that align with the agency’s compliance goals. We reviewed STRAC members’ annual work plans to determine whether the compliance activities discussed aligned with ONRR compliance goals. STRAC member agreements from eight of the nine STRAC members included language that the “state will contribute to ONRR’s GPRA goals and thereby the performance goals of this Agreement by performing audits, compliance reviews and other investigations in coordination with ONRR. The yearly performance goals are listed on the state’s annual work plan.” However, when we reviewed the STRAC members’ corresponding annual work plans, we found no information on how the members’ compliance activities contributed to ONRR’s goals. For example, several of the STRAC members’ work plans included information on the leases and properties selected for compliance activities but did not include information on how those selections would contribute to ONRR’s compliance goals. In addition, the majority of STRAC officials from member states said they did not consider ONRR’s compliance goals for return on investment or total additional royalty collections when selecting compliance cases. When we asked STRAC members about their goals, three of nine STRAC member states noted that they had compliance program goals. For example, one STRAC member’s goal was to “maximize revenue to the state” and “implement on behalf of ONRR and the state, a constantly improving and efficient royalty audit program.” Another member’s goal was to “protect the US Citizens’ Federal Mineral Interest within the boundaries of the state by ensuring that a fair value, as established by the federal regulations, is received.” Officials from the other six STRAC members told us that their states do not have goals for federal oil and gas royalty compliance activities because ONRR does not require that they do so. For STRAC members that did not have compliance goals, officials provided examples of informal goals—or goals that were not documented. For example, one STRAC official reported that the state’s goal was to try to audit 50 percent of royalties paid to the state every 2 years. Another STRAC official stated the state tries to review major market areas in the state once every 7 years. When we compared STRAC officials’ responses on their goals to ONRR’s broader compliance goals for return on investment and total additional royalty collections, we found that the majority of states’ compliance goals did not align with ONRR’s goals. Federal standards for internal control state that management should define objectives clearly to enable the identification of risk and define risk tolerances, such as by defining objectives in alignment with the organization’s mission, strategic plan, and performance goals. In requiring eight of the nine STRAC members to conduct compliance activities consistent with the agency’s compliance goals, ONRR was following these standards. However, ONRR approved the STRAC members’ work plans, although those work plans did not specify how the described members’ compliance activities would contribute to ONRR’s goals as the agency stated they would in the agreements between the seven of the nine STRAC members and ONRR. By requiring STRAC members to describe in their annual work plans how their compliance activities would align with ONRR’s current compliance goals, ONRR would have better assurance that activities were aligned with its compliance goals. Finally, ONRR does not track STRAC member states’ contributions against its annual compliance goals. ONRR has the data available to track these contributions because the results of STRAC members’ compliance activities are retained in ONRR’s IT system. For example, we obtained reports on the aggregate overall return on investment of STRAC members and reviewed individual data entries from STRAC members’ work that included a data field for revenue collections. According to regulations, if a state accepts delegated authority, it is to assist ONRR in meeting the requirements of GPRA as well as in developing and endeavoring to comply with ONRR’s Strategic Plan and Performance Measurements. Because ONRR does not track STRAC member states’ contributions toward its annual compliance goals, the agency has limited information for assessing whether the funding they are providing to STRAC members is achieving its goals. ONRR officials we interviewed stated that they do not track states’ contributions to ONRR’s overall compliance goals as there is no requirement to do so. However, by tracking the performance of each state and its contribution toward ONRR’s compliance goals, ONRR could better assess the effectiveness of states’ performance in supporting the agency’s mission of ensuring accurate royalty payments. ONRR is taking steps intended to improve its royalty compliance program and better verify that all royalties paid on the sale of oil and gas extracted from leased federal lands are accurate. These steps include reorganizing the management structure of its compliance program, implementing new systems for managing compliance cases electronically, and instituting a training curriculum for newly hired auditors. However, although ONRR reported generally meeting its compliance goals for fiscal years 2010 through 2017, its current goals may not align with the agency’s mission or other statutory requirements. For example, ONRR’s fiscal year 2017 compliance goals do not sufficiently address its mission to collect, account for, and verify revenues, in part, because its goals do not address accuracy, such as through a coverage goal. Establishing a coverage goal (e.g., identifying the number of companies or percentage of royalties subject to compliance activities over a set period) that aligns with the agency’s mission, and tracking the extent to which each of its compliance activities contributes to this goal, would provide ONRR more reasonable assurance that its compliance program is assessing the extent to which oil and gas royalty payments are accurate. Furthermore, ONRR’s audits, compliance reviews, and data mining efforts each provide a different level of assurance that royalties are accurately paid, but the agency does not measure how each of the compliance activities contributes to the FOGRMA requirement to establish a system with the capability to accurately determine and collect royalties in a timely manner. By tracking the extent to which each of its compliance activities contributed to any future coverage goal, ONRR would have greater assurance that its compliance program has the capability to accurately determine oil and gas royalties. In addition, ONRR’s compliance program relies on its Work Planning Group, which is responsible for reviewing information on companies and properties to select cases for audits or compliance reviews. The Work Planning Group, however, does not have a documented case selection process. By developing a documented case selection process that includes procedures for how to select compliance cases, ONRR could better ensure that it retains the organizational knowledge needed to effectively select compliance cases and defend the process in external reviews. In addition, ONRR does not have performance measures to determine the extent to which cases selected align with ONRR’s compliance goals. By developing performance measures (e.g., establishing a specified percentage of compliance cases that identify findings of royalty noncompliance or total additional royalties) that assess whether the agency is selecting cases that are helping it achieve its compliance goals, ONRR would be able to better monitor its performance in achieving its goals and whether changes to its selection process affect performance. Moreover, since 2006, ONRR has worked to develop a model to assess the risk of royalty noncompliance for use in its compliance case selection process. After several iterations with two contractors, ONRR began using the risk scores from its model to assist with case selection in 2014. However, according to ONRR officials, the agency is considering discontinuing the use of its current model in favor of one that is internally developed. ONRR has not analyzed how the use of the risk scores has affected case selection or findings of royalty noncompliance and is therefore unable to identify whether its risk model is effective. By periodically analyzing whether the risk model is effectively identifying potential royalty noncompliance and whether the model’s results are being effectively used to assist in case selection and making changes to the model (e.g., updating it) or developing a new model based on this analysis, ONRR would be better able to determine how to proceed with using risk analysis to inform its case selections. Furthermore, none of the nine STRAC members had documented case selection processes. In the agreements between the nine STRAC members and ONRR, the agency includes terms and conditions that the members agree to, but ONRR does not require STRAC members to have documented procedures for compliance case selection. By including requirements in ONRR’s agreements with STRAC members to develop a documented case selection process, including procedures for how to select compliance cases and how to document which factors were considered in selection decisions, ONRR could better assess whether members select cases that align with the agency’s compliance goals. Additionally, ONRR does not require that STRAC members specify how their compliance activities included in annual work plans contribute to ONRR’s compliance goals, although those goals appear on the work plans. ONRR approved the work plans but did not specify how the members’ compliance activities would contribute to its goals as the agency stated they would in the agreements between eight of the nine STRAC members and ONRR. By requiring STRAC members to describe in their annual work plans how their compliance activities would align with ONRR’s current compliance goals, the agency would have better assurance that activities were aligned with its performance goals. Lastly, ONRR does not track STRAC members’ contributions toward its annual compliance goals though it has the data to do so. By tracking the performance of each state and its contribution toward ONRR’s compliance goals, ONRR could better assess the effectiveness of states’ performance in supporting its mission of ensuring accurately royalty payments. We are making a total of seven recommendations to ONRR. Specifically: The Director of ONRR should establish an accuracy goal (e.g., identifying the number of companies or percentage of royalties subject to compliance activities over a set period of time) that aligns with the agency’s mission of collecting, accounting for, and verifying royalty payments. In doing so, ONRR should track the extent to which each compliance activity (audits, compliance reviews, and data mining) contributes toward achieving this goal. (Recommendation 1) The Director of ONRR should develop a documented case selection process that includes procedures for how to select all compliance cases. (Recommendation 2) The Director of ONRR should develop performance measures (e.g., having a specified percentage of compliance cases identify findings of royalty noncompliance or total additional royalties) that assess whether the cases the agency is selecting are helping it achieve its compliance goals. (Recommendation 3) The Director of ONRR should periodically analyze whether the risk model is effectively identifying potential royalty noncompliance and whether the model’s results are being effectively used to assist in case selection, and should use this analysis to make changes to the model (e.g., updating it) or develop a new model. (Recommendation 4) The Director of ONRR should include requirements in ONRR’s agreements with STRAC members to develop a documented case selection process, including procedures for how to select compliance cases and how to document which factors were considered in selection decisions. (Recommendation 5) The Director of ONRR should require STRAC members to describe in their annual work plans how their compliance activities would align with ONRR’s current compliance goals. (Recommendation 6) The Director of ONRR should track the performance of the compliance work of each state STRAC member and the contribution that each state makes to ONRR’s compliance goals. (Recommendation 7) We provided a draft of this report to Interior for review and comment. Interior concurred with all seven recommendations. Agency comments are reproduced in appendix III. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Interior, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made major contributions to this report are listed in appendix IV. We reviewed and summarized recommendation closure documentation that the Department of the Interior (Interior) provided for royalty compliance recommendations made to the department by the Royalty Policy Committee’s Subcommittee on Royalty Management in 2007 and Interior’s Office of Inspector General (OIG) in 2006. For the subcommittee recommendations, Interior officials told us that the subcommittee did not assess the implementation of its recommendations. As a result, we present information that Interior provided on its decision about the status of the recommendations and a summary of actions taken. (See table 3.) For the OIG recommendations, we present the status of recommendations according to the OIG and a summary of the actions according to Interior. (See table 4.) We did not independently assess the implementation of the recommendations. See table 5 for detailed information on the Office of Natural Resources Revenue’s (ONRR) performance goals, including goal type, goal, fiscal year goal, fiscal year performance, and long-term target for performance goal. In addition to the contact named above, Christine Kehr (Assistant Director), Glenn C. Fischer (Analyst-in-Charge), Tim Bober, John Delicath, Sarah Detweiler, Wil Gerard, Cindy Gilbert, Michael Kendix, Eli Lewine, Ben Licht, Anne Stevens, and Sara Sullivan made important contributions to this report.", "summary": "Royalties paid on the sale of oil and gas extracted from leased federal lands and waters are a significant source of revenue for the federal government. However, Interior has faced challenges verifying the accuracy of royalty payments. In the 2000s, GAO issued reports highlighting weaknesses in Interior's royalty compliance program. In 2011, GAO added Interior's management of federal oil and gas resources to its High-Risk List, in part because its work showed Interior did not have assurance that it was collecting its share of revenue from oil and gas produced on federal leases. Interior has taken steps to operate more effectively. GAO was asked to examine ONRR's federal oil and gas royalty compliance efforts. This report examines, among other objectives, the extent to which ONRR reported meeting its compliance goals for fiscal years 2010 through 2017, the most recent data available. GAO reviewed relevant laws, regulations, agency guidance, and Interior's annual performance plan and report and annual budget justifications for the period; analyzed ONRR compliance data for the period; and interviewed ONRR officials and state auditors who conducted work in coordination with ONRR. The Department of the Interior's (Interior) Office of Natural Resources Revenue (ONRR) reported that it met its annual performance goals for its royalty compliance program in 6 of the 8 years from fiscal years 2010 through 2017. Under this program, ONRR conducts three levels of compliance activities—audits, compliance reviews, and data mining—to help ensure that oil and gas royalty payments submitted by companies that produce oil and gas from federal leases are accurate and comply with federal laws and regulations (see figure). Specifically, GAO's analysis of Interior's annual budget justifications for fiscal years 2010 through 2017 found that ONRR reported meeting its compliance goals for 6 of the 8 fiscal years. According to ONRR officials, ONRR did not report meeting its compliance goals for 2 years because of a shift in the agency's goals that created a short-term misalignment of planned work and available resources. ONRR's fiscal year 2017 goals for its compliance program were (1) to obtain a return of $2 of additional royalties for every dollar spent on compliance activities and (2) to collect a defined amount of additional royalties. ONRR's compliance goals generally aligned with the agency's requirement that resources should not be expended without an expected return. However, these goals may not align with the agency's mission to collect, account for, and verify royalty payments and other statutory requirements because the goals do not address accuracy—or the extent to which its compliance work is covering, for example, royalty payments. By establishing a goal that addresses accuracy, for example, by covering a portion of royalty payments with its compliance activities, ONRR could increase the extent to which it had reasonable assurance that its compliance program is fully accounting for federal oil and gas royalty payments. GAO is making seven recommendations, including that ONRR establish an accuracy goal that addresses coverage that aligns with its mission. Interior concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Micronesia, the Marshall Islands, and Palau are among the smallest countries in the world. In fiscal year 2017, the three FASs had a combined resident population of approximately 175,000 (102,622 in Micronesia; 54,354 in the Marshall Islands; and 17,901 in Palau). Interior’s Office of Insular Affairs (OIA) has primary responsibility for monitoring and coordinating U.S. assistance to the FASs, and State is responsible for government-to-government relations. The U.S. relationship with the FASs began when American forces liberated the islands from Japanese control near the end of World War II. In 1947, the United States entered into a trusteeship with the United Nations and became the administering authority over Micronesia, the Marshall Islands, and Palau. Voters approved the Constitution of the Federated States of Micronesia in 1978 and approved the Constitution of the Marshall Islands in 1979. Both Micronesia and the Marshall Islands remained subject to the authority of the United States until 1986, when a compact of free association went into effect between the United States and the two nations. The Palau constitution took effect in 1981, and Palau entered into a compact of free association with the United States in 1994. Micronesia and Marshall Islands became members of the United Nations in 1991, while Palau joined the organization in 1994. Under its compacts with Micronesia, the Marshall Islands, and Palau, the United States provided economic assistance that includes access to certain federal services and programs, among other things, for defined time periods. Economic assistance to Micronesia and the Marshall Islands. The 1986 compact of free association between the United States and Micronesia and the Marshall Islands, respectively, provided about $2.6 billion in funding for fiscal years 1987 through 2003. In 2003, the United States approved amended compacts of free association with the two countries. According to Interior, economic assistance under the amended compacts is projected to total $3.6 billion, including payments for compact sector grants and trust fund contributions for both countries in fiscal years 2004 through 2023. Funding under the original compact and amended compacts has been provided to Micronesia and the Marshall Islands through Interior. Economic assistance to Palau. The compact of free association between the United States and Palau entered into force in 1994 and provided $574 million in funding through Interior for fiscal years 1995 through 2009 for assistance to the government, contributions to a trust fund, construction of a road, and federal services. In September 2010, the United States and Palau signed an agreement that would, among other things, provide for additional assistance to Palau, including contributions to its trust fund. The 2010 agreement and subsequent amendments entered into force in September 2018. According to Interior, direct assistance to Palau under the compact will total $229 million for fiscal years 2010 through 2024, including $105 million that Congress provided in annual appropriations in fiscal years 2010 through 2017. Under the compacts, the United States has responsibility for defense and security matters in, and relating to, each of the FASs, and subsidiary agreements pursuant to the compacts provide for U.S. military use and operating rights in these countries. According to the Department of Defense, the compacts have enabled it to maintain a critical strategic position in the Indo–Pacific region. The compact with the Marshall Islands also provided for a separate agreement that constituted a full and final settlement of all claims resulting from U.S. nuclear tests conducted in the Marshall Islands during the period 1946 through 1958. In addition, a subsidiary agreement with the Marshall Islands secured the United States’ access to the U.S. military facilities on Kwajalein Atoll, which are used for missile testing and space tracking activities. Under the compacts, eligible FAS citizens are exempt from certain visa and labor certification requirements of the Immigration and Nationality Act as amended. The migration provisions of the compacts allow eligible FAS citizens to enter the United States (including all states, territories, and possessions) and to lawfully work and reside in the United States indefinitely. The implementing legislation for the 1986 compact with Micronesia and the Marshall Islands stated that it was not Congress’s intent to cause any adverse consequences for U.S. territories and commonwealths and the state of Hawaii. The legislation further declared that Congress would act sympathetically and expeditiously to redress any adverse consequences. In addition, the legislation authorized compensation to be appropriated for these areas that might experience increased demands on their educational and social services from compact migrants from Micronesia, the Marshall Islands, and Palau. The legislation required the President to report and make recommendations annually to Congress regarding adverse consequences resulting from the compact and provide statistics on compact migration. In November 2000, Congress made the submission of annual reports about the impact of compact migration in affected jurisdictions—that is, compact impact reports—optional and shifted the responsibility for preparing these reports from the President to the governors of Hawaii and the territories. In December 2003, Congress took steps in the amended compacts’ implementing legislation to address compact impact in designated U.S. areas. The legislation restated Congress’s intent not to cause any adverse consequences for the areas defined as affected jurisdictions— Hawaii, Guam, the CNMI, and American Samoa. In addition, the legislation authorized and appropriated funding for compact impact grants to the affected jurisdictions, to be allocated on the basis of the proportion of compact migrants living in each jurisdiction. Further, the legislation required an enumeration of compact migrants to be undertaken at least every 5 years. The legislation also permitted affected jurisdictions to submit compact impact reports to the Secretary of the Interior. The implementing legislation for the amended compacts authorized and appropriated $30 million for each fiscal year from 2004 through 2023 for grants to the affected jurisdictions. According to the legislation, the grants are provided to aid in defraying costs incurred by these jurisdictions as a result of increased demand for services due to the residence of compact migrants. OIA reviews the affected jurisdictions’ annual proposals for the use of the funds and provides the funds to the jurisdictions as compact impact grants. The grants are to be used only for health, educational, social, or public safety services or for infrastructure related to such services. Figure 1 shows the locations of the FASs and the affected jurisdictions. The implementing legislation for the amended compacts requires Interior to conduct an enumeration of compact migrants, which is to be supervised by the Census Bureau or another organization selected by Interior, at least every 5 years beginning in fiscal year 2003. On the basis of these enumerations, each affected jurisdiction is to receive a portion of the annual $30 million appropriation in proportion to the number of compact migrants living there. The legislation permits Interior to use up to $300,000, adjusted for inflation, of the annual appropriation for compact impact to conduct each enumeration. The amended compacts’ implementing legislation defines a compact migrant, for the purposes of the enumeration, as “a person, or their children under the age of 18, admitted or resident pursuant to [the compacts] who as of a date referenced in the most recently published enumeration is a resident of an affected jurisdiction.” Compact migrants have varying eligibility for certain U.S. federal government programs. Eligibility for some federal programs changed as a result of the 1996 Personal Responsibility and Work Opportunity Reconciliation Act. For example, when the compacts were signed, FAS citizens were eligible for Medicaid; however, the act removed this eligibility. Table 1 shows compact migrants’ eligibility status for selected federal benefit programs as of November 2019. From 2009 to 2018, the number of compact migrants living in U.S. states and territories rose by an estimated 68 percent, from about 56,000 to about 94,000. In 2011, we reported that combined data from the Census Bureau’s 2005-2009 American Community Survey and 2008 enumeration showed an estimated 56,345 compact migrants living in U.S. areas. During the period 2013 to 2018, an estimated 94,399 compact migrants lived in U.S. areas, according to combined data from the Census Bureau’s 2013-2017 American Community Survey and 2018 required enumeration in Guam, the CNMI, and American Samoa. This estimate includes Micronesian and Marshallese citizens who entered the United States after 1986, Palauan citizens who entered the United States after 1994, and certain U.S.-born children younger than 18 years. Data from the 2013-2017 American Community Survey and the 2018 enumeration indicate that an estimated 50 percent of compact migrants lived on the U.S. mainland and an estimated 49 percent lived in the affected jurisdictions during this period: 26 percent in Hawaii, 20 percent in Guam, and 3 percent in the CNMI. This estimate indicates growth in the number of compact migrants on the U.S. mainland since 2011, when we reported that the Census Bureau estimated 58 percent of compact migrants lived in the affected jurisdictions. The Census Bureau estimated that 11 states in the U.S. mainland, in addition to three of the four affected jurisdictions—Hawaii, Guam, and the CNMI—had compact migrant populations of more than 1,000, according to the 2013-2017 American Community Survey and the 2018 enumeration (see fig. 2). Stakeholders we interviewed—including FAS embassy and consular officials, FAS community members, state government officials, and representatives of private sector and nonprofit organizations—expressed concerns about the Census Bureau’s prior estimates of compact migrants. Some Arkansas stakeholders cited other, higher estimates of the FAS population in their state. Moreover, some stakeholders said that compact migrant populations are apprehensive or distrustful about being formally counted through surveys or the census. Stakeholders also noted that some compact migrant communities have felt frustrated at having been encouraged to respond to surveys and be counted but not experiencing any benefit from these efforts, according to a nonprofit official and FAS community members. Marshallese consular officials said that they believed the 2010 census undercounted their citizens, noting that the Census Bureau did not employ any Marshallese surveyors in the Arkansas counties with Marshallese populations. Stakeholders also expressed concern about the decennial census to be conducted in 2020, which, like the 2010 decennial census, will collect information on race. Nonprofit organization officials whom we interviewed expressed concern that the 2020 census could result in an undercounting of compact migrants because of language barriers and compact migrants’ difficulty accessing the census form online. Arkansas health care and private sector representatives and the Marshallese consulate described plans to address barriers to obtaining a more accurate count of the population in the 2020 census. Hawaii is making a statewide effort to ensure that compact migrants are counted in the 2020 census, according to Hawaii state officials. According to Guam officials, an outreach effort in Guam has leveraged “trusted voices,” or parties known to compact migrant communities there, to communicate the importance of responding to the 2020 census. Data from the American Community Survey showed an estimated 72,965 compact migrants living in the 50 states, the District of Columbia, and Puerto Rico in 2013 through 2017. An estimated 31,425 compact migrants living in these areas (43 percent) were U.S. citizens. The remaining estimated 41,540 (57 percent) were not U.S. citizens. The U.S. citizens who were counted included naturalized citizens and minor-age U.S. citizen children of compact migrants, who would no longer be counted as compact migrants after reaching 18 years of age. An estimated 25,555 compact migrants living in these areas were born in Micronesia; 20,545 were born in the Marshall Islands; and 3,435 were born in Palau. These totals do not include compact migrants born in the FAS and living in Guam, the CNMI, or American Samoa, because the American Community Survey does not cover these territories. An estimated 27,735 compact migrants living in these areas who were 18 years and older (69 percent) were in the civilian labor force. Of those, 24,540 (89 percent) were employed and 3,195 (12 percent) were unemployed. An estimated 1,660 compact migrants living in these areas—4 percent of compact migrants 17 years and older—were on active duty in the U.S. military or had served on active duty in the past. For additional American Community Survey data on compact migrant demographics, see appendix IV. Compact migrants move to U.S. areas for a range of reasons, including greater economic and educational opportunities, better access to health care, a desire to join family members in the United States, and a wish for greater personal freedom. In some communities we visited, stakeholders noted that FAS citizens had come to the United States for school or work before the compact with Micronesia and the Marshall Islands and the compact with Palau went into effect but that the compacts had opened the option of migration to a broader range of individuals. Economic opportunities. Compact migrants described moving to U.S. areas for better, more reliable jobs and higher wages. Having a better-paying job in the United States sometimes allows individuals to send remittances or consumer goods to family members living in an FAS. Other compact migrants move to U.S. areas to join the military. Educational opportunities. Compact migrant families often move to U.S. areas so that their children will have access to improved primary and secondary education, according to compact migrants. Some compact migrants travel to U.S. areas to attend college and choose to stay to work, including to pay off their student loans, according to consular officials and compact migrants. Health care access. Compact migrants sometimes migrate to U.S. areas to obtain medical treatment for themselves or family members, according to FAS community members and consular officials. Some medical procedures or treatments, such as dialysis or access to specialists, are not available in the FASs, according to federal and nonprofit officials. Family. Many compact migrants relocate to the United States to join family members and communities already living there, according to consular and nonprofit officials. Personal freedom. Some compact migrants said that they have more personal, social, and cultural freedom in the United States than in their more traditional home country. Changes in the natural environment in the FASs have also prompted migration from those areas, according to FAS representatives. Depleted food resources and effects of climate change—including more-frequent typhoons, coral reef bleaching, and depletion of fishing stocks—have contributed to migration, according to an FAS official. In addition, members of Marshallese communities cited rising sea levels and frequent tidal flooding as reasons for migrating from the Marshall Islands to U.S. areas. Some Marshallese community members also noted that the legacy of U.S. nuclear testing had contributed to their decision or need to move. Compact migrants cited varied reasons for choosing to migrate to specific locations. For example, representatives of FAS communities in Guam and the CNMI noted the FASs’ closer proximity to those territories than to the U.S. mainland as well as the similarity of Guam’s and the CNMI’s island cultures to those of their home countries. Also, some compact migrants in Arkansas and Oregon cited the lower cost of living and a perception of less discrimination or greater safety there than in Hawaii. Marshallese community members often migrate to Arkansas for jobs in the poultry industry. Consular officials noted that, because of comparatively lower wages and fewer housing options in the FASs, returning to their countries after living in U.S. areas can be difficult for some compact migrants. Some compact migrants said that it is also difficult to find a good job in their home countries without family or political connections. According to an FAS official, some compact migrants retire to their home countries. However, several compact migrants we spoke with said they planned to stay in U.S. areas to be close to medical care or to children and grandchildren born there. The affected jurisdictions of Hawaii, Guam, and the CNMI reported estimated compact impact costs (i.e., costs incurred as a result of increased demands on public services from compact migrants) that totaled $3.2 billion during the period fiscal years 2004 through 2018 and increased over time for Hawaii and Guam. Interior has provided compact impact grants totaling more than $30 million annually to the affected jurisdictions, each of which uses the funds differently. In October 2019, Census discovered an error in the 2013 and 2018 enumerations, which Interior had used to determine the distribution of compact impact grant funds and which resulted in misallocation of these funds for fiscal years 2015 through 2020. In February 2020, Interior officials told us that the department had developed a modified plan for compact impact grants in fiscal years 2021 through 2023 that, according to the officials, is intended to correct the misallocation. Hawaii, Guam, and the CNMI reported a total of $3.2 billion in estimated compact impact costs during the period fiscal years 2004 through 2018, with estimated annual costs increasing over time for Hawaii and Guam and fluctuating for the CNMI. Hawaii reported $1.8 billion in total estimated compact impact costs. Hawaii’s reported annual costs increased from $55 million in fiscal year 2004 to $198 million in fiscal year 2018. Guam reported $1.2 billion in total estimated compact impact costs. Guam’s reported annual costs increased from $33 million in fiscal year 2004 to $147 million in fiscal year 2017. The CNMI reported $116 million in total estimated compact impact costs. The CNMI’s reported annual costs amounted to $10 million in both fiscal year 2004 and fiscal year 2018 but fluctuated over time, ranging from a low of about $3 million in fiscal year 2011 to a high of $12 million in fiscal year 2014. For a summary of the estimated compact impact costs reported by the three affected jurisdictions, see figure 3. For more details of their compact impact reporting, see appendix V. The three affected jurisdictions reported compact impact costs for education, health, public safety, and social services (see table 2). As the table shows, the highest total costs in fiscal year 2017 were for education and health services. In November 2011, we found that Interior’s reporting to Congress on compact impact had been limited, and we identified weaknesses in existing compact impact reporting. We found that some jurisdictions did not accurately define compact migrants, account for federal funding that supplemented local expenditures, or include revenue received from compact migrants. Our November 2011 report recommended that the Secretary of the Interior disseminate guidelines to the affected jurisdictions that adequately addressed concepts essential to producing reliable impact estimates and that the Secretary call for the use of these guidelines in developing compact impact reports. Although Interior developed a draft of compact impact reporting guidelines in 2014, it had not disseminated such guidelines to the affected jurisdictions as of February 2020. In 2019, Interior awarded the Guam government a technical assistance grant for $280,000 to conduct a cost-benefit analysis to determine compact migrants’ economic contribution to the local economy. The effort will reportedly also seek to address weaknesses and methodological concerns related to compact impact costs calculated by Hawaii, Guam, and the CNMI. Guam officials said that the grant application was prepared in response to our prior critique of their compact impact estimation methodology. The grant was awarded to the Guam Bureau of Statistics and Plans, which contracted with University of Guam consultants to carry out the work beginning in October 2019. Guam officials expected this work to result in two reports—one identifying economic contributions by compact migrants (expected September 2021) and another proposing a methodology for determining compact impact costs (expected August 2022). During fiscal years 2004 through 2019, Hawaii, Guam, and the CNMI received a combined total of approximately $509 million in compact impact grant funding. This total includes (1) annual compact impact grant funding allocated from $30 million authorized and appropriated in the amended compacts’ implementing legislation and (2) additional compact impact grant funding allocated from annual appropriations. In fiscal years 2004 through 2019, Interior made annual allocations of the $30 million of compact impact grant funds authorized and appropriated in the amended compacts’ implementing legislation. Interior provided these allocations as compact impact grants to each affected jurisdiction to defray their costs due to the residence of compact migrants. Interior used the four most recent enumerations— conducted in 2003, 2008, 2013, and 2018—as the basis for these annual allocations. Since fiscal year 2012, Interior has provided additional compact impact grant funding to the affected jurisdictions from annual appropriations. This additional funding has ranged from approximately $3 million to $5 million per year since fiscal year 2012. Interior has allocated the additional funding on the basis of the 2013 and 2018 enumerations. Table 3 shows the total amounts that Hawaii, Guam, and the CNMI received as compact impact grant funding in fiscal years 2004 through 2019. Affected jurisdictions use their compact impact grant funding in varying ways and report on their use of the funds to Interior. Hawaii allocates the entirety of its compact impact grant—approximately $13 million annually since fiscal year 2015—to the state’s MedQuest division to defray costs of providing medical services to compact migrants. Guam has used some of its approximately $15 million of compact impact funding each year for new schools constructed through leasebacks (see fig. 4 for photos of several schools built by the Guam government with compact impact funds). The CNMI allocates its approximately $2 million of compact impact funding each year across the education, health care, public safety, and social service sectors. Hawaii, Guam, and CNMI officials have emphasized that compact impact funding does not fully compensate for the expenses associated with compact migration. For stakeholder suggestions related to compact impact funding and other issues, see appendix VII. In October 2019, Census Bureau officials discovered an error in the 2013 and 2018 Census Bureau enumerations that caused inaccurate counts of compact migrants in Hawaii and, according to Interior officials, resulted in misallocation of compact impact funding for Hawaii, Guam, the CNMI, and American Samoa in fiscal years 2015 through 2020. Relative to the proportion of compact migrants in each jurisdiction, allocations to Hawaii were a total of $16.9 million lower than they would have been without the enumeration error while allocations to Guam, the CNMI, and American Samoa were higher than they would have been without the error. Table 4 summarizes the under- and overpayments of compact impact funding to each affected jurisdiction that, according to Interior officials, resulted from the enumeration error. The enumeration error was discovered in late October 2019, near the beginning of fiscal year 2020. As of February 2020, OIA officials had developed a modified planned allocation of compact impact funds for fiscal years 2021 to 2023. Beginning in fiscal year 2021, OIA plans to divide the $30 million of annual compact impact grant funding in fiscal years 2021 through 2023 using corrected base allocations from the updated 2018 enumeration from Census Bureau, according to an Interior preliminary assessment. The base allocations will be adjusted upward for Hawaii and downward for Guam, the CNMI, and American Samoa to correct for the erroneous payments in fiscal years 2015 through 2020. See table 5 for a comparison of the originally planned fiscal year 2020 allocation (based on the erroneous enumeration) and the revised allocation (based on the corrected enumeration) as well as the grant amounts that OIA proposed for fiscal years 2021 through 2023 to correct for the erroneous payments. The governments of some of the U.S. areas we visited identified effects of providing public education and health care services to compact migrants. Compact migration’s effects in U.S. areas we visited also include budgetary contributions from compact migrants’ payment of taxes and fees as well as budgetary costs of other government programs and services to compact migrants. Stakeholders in the U.S. areas additionally discussed the participation of compact migrants in those areas’ workforces and communities in terms of contributions and impacts of compact migration. Children of compact migrants attending U.S. public primary and secondary schools sometimes receive additional or specialized services, such as support for English language learners, according to state and territorial officials. In the U.S. areas we visited, state and territorial departments and school districts have identified and counted compact migrant students by means of one or more criteria, including ethnicity, language, and place of birth. See table 6 for estimated numbers of compact migrant students in the states and territories we visited and the criteria that each state or territory used to count students as compact migrants. Compact migrants are eligible for in-state tuition at some U.S.-based colleges and universities, according to university, nonprofit, and state officials. For example, in Guam, compact migrants attending the University of Guam are eligible for in-state tuition. In Oregon, FAS citizens are eligible for in-state tuition after a 1-year residency period in the state, according to nonprofit officials. In Arkansas, Marshallese citizens are eligible for in-state tuition after a 3-year residency period in the state, according to state tuition policy and officials. States and territories have reported budget and program effects related to health care for compact migrants who are eligible for federal benefits as well as health care for individuals, including compact migrants, who are ineligible for federal benefits and lack private insurance or other means of payment. U.S. area governments sought to enable compact migrants’ access to health care in several ways, including extending access to the federal Children’s Health Insurance Program (CHIP) or Medicaid and leveraging federal health insurance tax credits and other federal funding. According to some U.S. area government officials, some of these programs are provided specifically because compact migrants are ineligible for certain programs at the federal level. Extended Access to Children’s Health Insurance Program or Medicaid The Children’s Health Insurance Program Reauthorization Act of 2009 included an option for states to cover children younger than 21 years and pregnant women in both CHIP and Medicaid who are lawfully residing in the United States—a definition that includes compact migrants—and who are otherwise eligible under the state plan. Therefore, in some U.S. areas, non-U.S. citizen compact migrants who are children or pregnant may access federal health insurance coverage through CHIP or Medicaid. As of February 2020, 38 states and territories and the District of Columbia had extended such coverage to lawfully residing non–U.S. citizen pregnant women or children, including compact migrants, who met all other eligibility requirements (see fig. 5). According to Arkansas officials, their state’s decision to extend this coverage was sought in part to address unmet needs of compact migrants living in Arkansas. Subsidized Coverage in Patient Protection and Affordable Care Act Exchanges Compact migrants are eligible to purchase individual market health insurance plans through health insurance exchanges established under the Patient Protection and Affordable Care Act (PPACA). Individuals purchasing coverage through the exchanges may be eligible, depending on their incomes, to receive financial assistance in the form of premium tax credits to offset the costs of their coverage. Premium tax credits, which are designed to reduce an eligible individual’s premium costs, may be either paid in advance on a monthly basis to an enrollee’s issuer (referred to as advance premium tax credits) or received after the individual files federal income taxes for the prior year. Some state governments have elected to cover the remaining balance of some individuals’ exchange plans, leveraging a combination of advance premium tax credits and state funds to fully cover health insurance premiums on certain exchange plans. For example, Hawaii created the Health Care Premium Assistance Program, a special state program that covers the cost of premiums on eligible plans for qualified residents who do not qualify for Medicaid. While Hawaii’s program was not created specifically in response to compact migration and is not limited to compact migrants, most of its enrollees are compact migrants, according to Hawaii government officials. Since its launch in 2015, the program pays the balance of health insurance premiums not covered by advance premium tax credits for those who would otherwise be qualified for federal Medicaid if not for their citizenship status, including compact migrants. According to state officials, the program covered 3,223 compact migrants residing in Hawaii as of June 2017. Oregon and Washington developed premium assistance programs specific to compact migrants that leverage advance premium tax credits to eliminate health care premium costs. In addition to covering premiums, these programs provide for out-of-pocket health care costs, according to the programs’ websites and state officials. Oregon COFA Premium Assistance Program. The Oregon COFA Premium Assistance Program was launched in 2017, expressly to help compact migrants gain access to health care. In Oregon, participants pay for out-of-pocket costs at the time of service and subsequently apply to the program for reimbursement. Oregon’s program covered 780 compact migrants as of October 2019, according to state officials. The officials estimated that this program leverages $9 of federal funds through advance premium tax credits for every $1 of Oregon state funds contributed. Washington COFA Islander Health Care. The Washington COFA Islander Health Care program was launched in 2019, expressly to help compact migrants gain access to health care, and was based in part on the Oregon program, according to state officials. Washington will also cover dental insurance costs for compact migrants beginning in 2021, according to the program’s website and state officials. Participants in Washington’s program receive a payment card with preloaded funds to use for out-of-pocket costs. The program covered approximately 1,100 compact migrants in 2019, according to state officials. (Fig. 6 shows an example of an advertisement for Washington’s program, presenting information in six languages spoken by compact migrants.) Additional Federal Health Care Funding in U.S. Territories All U.S. territories, including Guam and the CNMI, receive federal funding through Medicaid, which is subject to an annual cap. Section 2005 of the PPACA, as amended, increased the funding caps for the territories for the period beginning on July 1, 2011, and ending on September 30, 2019, and provided a total of $6.3 billion in additional federal funding for health care to the territories. Guam and the CNMI have used some of this funding, in addition to other federal funding for health care, to partially support compact migrants’ health care costs or to alleviate the burden on programs that cover compact migrants. Guam. PPACA Section 2005 funding partly alleviated the financial shortfall of Guam’s Medically Indigent Program, according to a territory official. The Medically Indigent Program pays for health care costs of primarily non-U.S. citizens living in Guam, including compact migrants, who do not have other health insurance. Most compact migrants in Guam qualify for this program after meeting the 6-month residency requirement, according to Guam officials. In fiscal year 2019, compact migrants participating in the program numbered 8,616, according to Guam officials, and made up 73 percent of the program’s total participation. The officials said that the program is also funded through Guam local appropriations and federal Medicaid Undocumented Emergency Services funding. CNMI. Territorial hospital officials said that PPACA Section 2005 funding available in fiscal years 2011 through 2019 partially covered patient care costs in excess of the territory’s annual Medicaid cap, including care for compact migrants. The CNMI Medicaid program uses federal Disaster Relief Assistance funding to reimburse the hospital for emergency services provided to compact migrants, according to CNMI officials. Other Health Care Services Available to Compact Migrants Non-U.S. citizens, including compact migrants, may access health care through the U.S. Department of Health and Human Services Health Resources and Services Administration’s Health Center Program and through state government–supported clinics. The Health Center Program was established in the mid-1960s to help low-income individuals gain access to health care services. Health centers are responsible for delivering affordable, accessible, high-quality, comprehensive primary health care regardless of recipients’ ability to pay, according to Department of Health and Human Services officials. Figure 7 shows the entrance to Kokua Kalihi Valley, a federally qualified health center in Honolulu that estimates one-third of its patient population to be compact migrants, mostly from Micronesia. State clinics provide health services such as screening and treatment of certain infectious diseases to compact migrants, among other state residents. For example, the Arkansas Department of Health established the Dr. Joseph Bates Outreach Clinic to provide public health services to Marshallese in the region. As of September 2019, approximately 95 percent of the clinic’s patients were Marshallese, according to clinic officials. In addition, the University of Arkansas for Medical Sciences Northwest Campus facilitates research and community health programs in the Marshallese community and has established a clinic focused on diabetes. The budgetary effects of compact migration in the U.S. areas we visited include contributions by compact migrants, such as payment of federal and state taxes and fees, and also include several types of government program costs related to compact migration. Budgetary contributions. Compact migrants pay payroll taxes, including income taxes, and contributions to Social Security and Medicare. They also pay fees associated with state or territorial documentation or licensing, including driver’s licenses. In general, reliable data on budgetary contributions of compact migrants are not available, because state and territorial tax filings and related databases do not provide data on citizenship or ethnicity, according to state and territorial officials. However, the Hawaiian government reported that in 2017, compact migrants generated an estimated $36.6 million in state revenue from fees and taxes, such as the individual income tax, general excise taxes, and taxes generated from state government spending. According to University of Guam officials and an FAS community member, the presence of FAS communities may have helped Guam institutions obtain funding, including funding for research. Budgetary costs. State and territorial officials identified budgetary costs related to compact migration. For example, officials cited costs of providing translators or interpreters for government programs and costs associated with compact migrant interactions with police and the justice system. Some states have elected to extend state-level programs for food or cash-based assistance to compact migrants who are ineligible for the federal equivalents. For example, Washington’s Cash Assistance and Food Assistance Programs provide financial support to FAS citizens who are ineligible for the federal Supplemental Nutrition Assistance Program and Temporary Assistance for Needy Families. In Guam, some compact migrants qualify for the federal earned income tax credit, according to officials of Guam’s Department of Revenue and Taxation. The officials noted that because Guam’s tax system mirrors the federal system, any earned income tax credit paid in Guam is an expense to the territorial government. Compact migrants are eligible to work in U.S. areas and have contributed to the workforces of receiving communities, holding jobs in a range of industries. According to stakeholders we interviewed, compact migrants have encountered challenges while participating in the workforce. In the U.S. areas where they reside, compact migrants participate in the local economies in part by serving in the workforce in a variety of fields, including manufacturing, service industries, and professional industries, according to stakeholders we interviewed. See table 7 for examples. The following describes compact migrants’ participation in the areas we visited. Arkansas. Arkansas private sector representatives described Marshallese workers as essential to poultry plant operations, comprising one-quarter to one-third of some plants’ workers. At one such plant, most Marshallese employed are line workers on the floor of the plant, while others work as trainers and translators. Other compact migrants in Arkansas work at an airport; in hotels; in retail; or as caregivers, including in adult day care, according to FAS consular officials and nonprofit representatives. CNMI. CNMI officials and a private sector representative described compact migrants as a valuable resource in supplementing the CNMI’s small labor pool. Officials also noted that without compact migrants, businesses would have to recruit more foreign labor and face more-severe hiring challenges than they do now. Officials and a private sector representative stated that several businesses and franchises were founded by, and employ, compact migrants. Guam. Guam Chamber of Commerce representatives indicated that compact migrant workers would not be easily replaced if they were no longer eligible to work in Guam and that hiring other foreign workers in Guam involves difficult visa processes. Compact migrants tend to hold entry-level and low-skill jobs in Guam and have high turnover rates, according to representatives from one company. Several businesses in Guam were founded by, or cater to, compact migrants, according to private sector representatives. Hawaii. Micronesian officials noted that established communities of compact migrants in Hawaii help other FAS citizens to migrate, network, and find job opportunities. FAS community members in Hawaii identified multiple local businesses that either are owned by compact migrants or employ a large number of compact migrants. Oregon. In Oregon, some compact migrants work as caregivers or in a plant manufacturing reusable plastic containers for food storage and transport, according to an FAS official and community members. Oregon state government officials noted that compact migrants play an important role in working with adults and children with intellectual and developmental disabilities and in other paid caregiver capacities. The Governor of Oregon noted that compact migrants bring a tremendous amount of value to Oregon communities as educators, social workers, caregivers, and as members of the U.S. military. Other jobs or industries in which compact migrants work include warehousing, fast-food restaurants, and airport jobs, according to FAS officials. Washington. Some compact migrants work in caregiving, including at senior care homes; in manufacturing, warehousing, fast-food restaurants, or nonprofits; as artisans; or at airports, according to state and FAS officials and FAS community members. Stakeholders reported that compact migrants have encountered various challenges related to participation in the U.S. workforce. See appendix VII for additional challenges experienced by compact migrant communities. Form I-94. Compact migrants from Micronesia and the Marshall Islands may present an unexpired FAS passport and Form I-94 Arrival/Departure Record (known as Form I-94) to employers to demonstrate their identity and employment authorizations. Before 2013, compact migrants entering the United States received a paper copy of the form to document their legal entry and their ability to legally reside indefinitely in the United States. The DHS transition in 2013 from issuing Forms I-94 on paper to issuing them electronically created challenges for compact migrants, according to FAS community members. According to consulate officials, communities were not adequately notified that DHS would maintain these records in publicly accessible databases for only 5 years. As a result, some compact migrants who entered the United States after mid-2013 did not download their Forms I-94 before they became unavailable and thus did not have a Form I-94 to show to employers, according to stakeholders we interviewed. REAL ID–compliant driver’s licenses. Some employers require employees to have REAL ID–compliant driver’s licenses, according to FAS officials and community members. Before September 2019, DHS required compact migrants and other nonimmigrants applying for a REAL ID–compliant driver’s license to present an unexpired passport with an unexpired visa and Form I-94 or to present an employment authorization document. However, because compact migrants do not receive a visa and are not otherwise required to obtain an employment authorization document, they were unable to obtain the licenses. In September 2019, DHS changed its requirements specifically to allow compact migrants to receive REAL ID–compliant driver’s licenses by presenting an unexpired passport and Form I- 94. Some compact migrants in Guam said that challenges related to REAL ID before the DHS regulation change had negatively affected their employment because some military base jobs required these documents for employment or for base access. In addition, some compact migrants have lost jobs at airports because of difficulty in obtaining REAL ID–compliant identification, according to Marshallese embassy officials. See appendix X for information about legislative and DHS policy changes that affected compact migrants’ ability to access full-term REAL ID–compliant driver’s licenses and identification cards. Commercial driver’s licenses. Various stakeholders discussed difficulties that compact migrants had encountered in obtaining commercial driver’s licenses required by certain jobs and obtaining standard driver’s licenses that are compliant with REAL ID requirements in some states. Marshallese officials said that compact migrants’ inability to obtain or renew commercial driver’s licenses had prevented them from being able to work in related jobs, such as truck driving. Labor abuse and discrimination. In September 2019, the government of Micronesia requested that the Department of State provide assistance to investigate abuse and mistreatment of Micronesian citizens who were recruited to move to the United States to work for a U.S. company in Iowa. In addition, compact migrants in Hawaii, Guam, and Oregon told us that they had faced workplace discrimination or were seen as harming the local economy. For example, compact migrants in Guam said that they had experienced discrimination in hiring and pay and sometimes were made to feel like a burden on the community. Additionally, a March 2019 report by the Hawaii Advisory Committee to the U.S. Commission on Civil Rights concluded that some compact migrants find it difficult to report workplace discrimination because they are concerned about retaliation from employers. The report found, among other things, that compact migrants face discrimination in access to employment and housing and also face widespread negative public perception in Hawaii. Stakeholders expressed some concerns about compact migration with respect to public health and law enforcement interactions. In addition to participating in the workforce, compact migrants participate in social institutions and create diversity and cultural exchange in their receiving communities. State and territorial health department officials and health care providers in the U.S. areas we visited noted concerns about the prevalence of communicable diseases such as tuberculosis and Hansen’s disease in compact migrant communities. Tuberculosis. State and territorial health departments have worked to identify and treat cases of active and latent tuberculosis in compact migrant communities. About 15 to 20 percent of active, communicable tuberculosis cases in Hawaii have occurred in the FAS community, including several cases of antimicrobial drug–resistant variants of tuberculosis, according to Hawaii government officials. In 2019, 23 communicable tuberculosis cases were diagnosed in compact migrants in Hawaii. In Arkansas, public health officials estimated that they had screened 30 percent of the Marshallese population since 2000 and reported 202 active cases and 500 cases of latent tuberculosis infection between 1997 and 2019. Arkansas officials also said that they screened 1,728 Marshallese and reported five cases of active disease and 95 cases of tuberculosis infection in fiscal years 2018 and 2019. In 2017 and 2018, Arkansas officials traveled to the Marshall Islands to conduct screening for active and latent tuberculosis in addition to diabetes and Hansen’s disease. Hansen’s disease. Hansen’s disease affects some members of compact migrant communities, according to health care providers and state government officials. For example, the Hawaii Department of Health has a registry of 281 patients who are on active treatment or monitoring for recurrence of Hansen’s disease or complications from the disease. The department manages 10 to 20 new cases of Hansen’s disease each year. According to Hawaii public health officials, 95 percent of the individuals diagnosed with Hansen’s disease in the state were from the Micronesian or Marshallese communities. From 2003 to 2019, the Arkansas Department of Health reported that 54 individuals, including 42 compact migrants, had been diagnosed with Hansen’s disease. Some stakeholders reported concerns regarding public order and law enforcement interactions with compact migrants in Guam, Hawaii, and Washington. Guam. Guam law enforcement agencies report on crimes committed by, or attributed to, FAS groups in each location. Guam private sector representatives we interviewed expressed a belief that social tension with the FAS communities was driven in part by some compact migrants’ public drunkenness or violence. In addition, language barriers can hinder compact migrants’ social integration into receiving communities, according to Guam law enforcement officials. Hawaii. Common offenses for which compact migrants are cited or arrested in Hawaii include quality-of-life or social-order offenses, such as trespassing, disorderly conduct, drinking in public or driving under the influence of alcohol, assault, or harassment, according to state officials. These interactions with the public or with law enforcement officials may contribute to a strained relationship between compact migrants and receiving communities. Hawaii officials estimated that 20 to 25 percent of the population using the state’s homeless services self-identify as part of the FAS community. Compact migrants may sleep in public parks, which can lead to legal charges. A lack of affordable housing may be a cause for homelessness among FAS communities. Washington. Marshallese embassy officials cited sporadic problems with gang activity and drug use among some younger Marshallese community members, particularly those living in Washington. These officials suggested that some migrant children who feel bullied or pressured may band together, resulting in a negative or gang-like situation. In some U.S. areas we visited, stakeholders we interviewed said that compact migrants seek to contribute to, or engage with, their surrounding U.S. communities through volunteer work, including church activities, environmental work, and other efforts. For example, FAS communities described participating in environmental cleanup efforts, including efforts to control invasive species and leveraging their agricultural knowledge to help Hawaiian farmers grow a more resilient variety of taro. Several community representatives in multiple states noted that some compact migrants spend a significant amount of time supporting their fellow community members as translators or interpreters or volunteering to help others navigate complex systems in U.S. areas. FAS citizens also serve in the U.S. military. The FAS countries have a high rate of military service, according to FAS officials and State documentation. Stakeholders in some U.S. areas we visited described compact migrant populations as contributing to the diversity of receiving communities and educational institutions. For example, University of Guam officials said that FAS student association groups sponsor cultural events and activities that help to define the character of the university. The officials also noted that FAS students contribute to research portfolios and bring FAS government and community perspectives to classroom discussions. The officials observed that the presence of compact migrants increases the university community’s diversity and its cultural awareness and competency. In Arkansas, Marshallese community members said that they had helped to teach local U.S. residents about Marshallese culture and history not otherwise taught in U.S. schools. Marshallese community members in Arkansas also expressed a belief that the community brought a greater emphasis on family and respect for elders to the region. We provided a draft of this report for review and comment to the Departments of Agriculture, Commerce, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, State, and Transportation; the Social Security Administration; the Governors of Hawaii, Guam, the CNMI, Arkansas, Oregon, and Washington; and the Ambassadors of Micronesia, the Marshall Islands, and Palau to the United States. The Departments of Agriculture, Health and Human Services, Homeland Security, and State and the Social Security Administration provided technical comments, which we incorporated as appropriate. The Departments of Commerce, Housing and Urban Development, the Interior, and Transportation did not provide comments. U.S. areas and the FAS Ambassadors provided written comments that we have summarized below and reproduced in appendixes XI through XIX, and responded to their comments, where appropriate, at the end of those appendixes. Hawaii. The government of Hawaii commented that the health and economic impacts of the coronavirus pandemic, in addition to Hawaii’s high cost of living and public charge concerns, affect the state’s compact migrant communities in particular. The government also observed that racial disparities and other determinants of health and well-being are exacerbated for compact migrants. Noting that compact migrants lack access to Medicaid and the Supplemental Nutrition Assistance Program, the government urged that compact migrants’ access to health care and food nutrition programs be treated as a federal priority. Guam. The government of Guam advocated, in the context of the coronavirus pandemic, for restoring debt relief provisions associated with compact migration to offset unreimbursed compact expenses. The government noted that from the time the compacts went into effect until 1996, FAS citizens maintained access to federal health coverage. The government also commented that in 2017, Interior’s Office of Insular Affairs reported to Congress that restoring this eligibility would be in line with Congress’ intent to never cause adverse consequences to the territories and Hawaii. In addition, the government observed that moving compact migrants from Guam’s locally funded Medically Indigent Program to Medicaid would help Guam provide government services to all residents who need them. The government of Guam noted that the ongoing absence of an agreed definition for compact migrant for the purposes of data collection creates confusion. CNMI. The government of the CNMI commented on the importance of compact migrants’ contributions to the territory’s workforce needs and noted that they enrich the cultural makeup of the CNMI. Separately, the government stated that the response to the enumeration error discovered by the U.S. Census Bureau that led to a misallocation of compact impact funds has penalized the territories. According to Interior’s modified plan, future allocations to the CNMI (in addition to Guam and American Samoa) would be adjusted downward to account for past overpayment. The CNMI commented that reducing the future amounts of compact impact funds because of an error of the federal government does not recognize the present needs of the CNMI. The CNMI government also noted that the territories receive less data collection support from the American Community Survey, the U.S. Bureau of Economic Analysis, and the U.S. Bureau of Labor Statistics than other U.S. areas receive. Arkansas. The government of Arkansas commented that it considered the Census Bureau data in our report to underestimate the compact migrant population in Arkansas, and it cited several higher estimates. The government noted that the state does not receive compact funding, despite its high population of Marshallese, because it is not an affected jurisdiction as defined in the Compacts of Free Association Amendments Act of 2003. The government projected that approximately 12,000 compact migrants reside in Arkansas and estimated its annual costs related to compact migration at about $72 million. We believe that the Census Bureau data are sufficiently reliable for our purposes of estimating the number of compact migrants in U.S. areas. However, our report includes a discussion of stakeholder concerns that the compact migrant population in Arkansas may have been undercounted. We reported that the Census Bureau had estimated the compact migrant population in Arkansas during the period 2013 to 2017 at 5,895 on the basis of the definition of “compact migrants” used for its enumerations—citizens of Micronesia, the Marshall Islands, and Palau who entered the United States after 1986 (from Micronesia and the Marshall Islands) or 1994 (from Palau) and their U.S.-born children (biological, adopted, and step-) and grandchildren younger than 18 years. Oregon. The government of Oregon advocated for more reporting on the effects that U.S. military access to, and U.S. testing of 67 nuclear weapons in, the Marshall Islands has had on compact migration, citing the devastating impact of nuclear fallout on inhabitants’ health and the environment. The government of Oregon also cited a need to report on compact migrants’ positive contributions to receiving areas. Our report provides qualitative descriptions of compact migrants’ contributions, including budgetary, workforce, and social contributions, and also provides high-level data on estimated mean and median incomes among compact migrants. We have incorporated additional statements by the government of Oregon about compact migrant contributions in our report. The government noted that it has taken steps at the state level to provide health care access to compact migrant populations while also urging Congress to restore this populations’ access to federal programs such as Medicaid and Temporary Assistance for Needy Families. Further, the government called on Interior to expand the definition of “affected jurisdiction” and appropriate grant funds equitably. As we note in our report, this definition and the associated grant funding were established by Congress in the amended compacts’ implementing legislation. Washington. The government of Washington commented that our report did not provide a detailed history of U.S. military nuclear testing in the FASs and subsequent impacts on them and their citizens. The government noted that such information is necessary to explain FAS citizens’ current challenges and why additional resources are required to meet their needs. Further, the government commented that our report omits the personal narratives that are critical to a holistic account of the FAS experience in the United States, including the struggles many compact migrants face. Our report incorporates information that we obtained through our interviews with members of compact migrant communities, including those in Washington, such as reasons for migration, workforce and other challenges they faced, and stakeholder suggestions for improving experiences or outcomes of compact migration (see app. VII). The government of Washington stated that it hoped our report would prompt the federal government to make additional resources available to U.S. areas with sizeable compact migrant populations, and it called for inclusion of Washington among affected jurisdictions receiving compact impact grant funding. Micronesia. The Embassy of the Federated States of Micronesia emphasized the importance of quantifying not only costs but also economic benefits of compact migration, including job creation, taxes paid, and community contributions. The embassy also called for guidelines and enumeration methods that better capture actual costs and revenue. The embassy noted the relationship between FAS citizens’ ineligibility for federal programs such as Medicaid and the costs borne by local governments and communities in the absence of these federal programs. According to the embassy, the continuing challenge of Micronesian citizens’ ineligibility for Medicaid since 1996, compounded by the effects of relevant social determinants of health, make their successful integration in U.S. areas more difficult. Noting that these circumstances have a direct effect on Micronesian migrants’ ability to contribute positively in receiving areas and become less reliant on public assistance programs, the embassy expressed support for the restoration of FAS citizens’ eligibility for Medicaid and for expanded veterans’ health care in Micronesia. The embassy commented that compact impact grant funding is a domestic issue and that discussions related to this issue should not diminish the priority of ongoing U.S. assistance to Micronesia under the compact. The embassy also raised concerns about challenges facing compact migrants, including the challenges described in our report. Marshall Islands. The Embassy of the Republic of the Marshall Islands described the migration rights provided in the compact as fundamental and essential to its country’s relationship with the United States. Additionally, the embassy observed that restoring Medicaid eligibility for its citizens living and working in the United States would greatly benefit its citizens and substantially reduce impact costs to certain areas. The embassy noted that, although Marshall Islands citizens living in the United States are eligible to purchase individual market health insurance plans through exchanges established under the Patient Protection and Affordable Care Act, many who are employed lack access to affordable health care because of the limited insurance benefits offered by most service industries or the high cost of covering family members. Furthermore, the embassy called for an objective accounting of revenue received from compact migrants and depiction of their contributions to, for example, the health and food security of the United States through employment in the food processing industry and other essential work. Last, the embassy commented that the addition of Marshallese workers to the 2020 census effort may remedy the potential undercounting of its citizens in the previous census. Palau. The Embassy of the Republic of Palau observed that it would be helpful to know the number of compact migrants from each FAS country who are able to access the federal programs for which they are eligible. This question was outside the scope of our review. Further, the embassy commented that it would like the U.S. federal government to inform and educate state departments of motor vehicles regarding the special status of FAS citizens in the United States, and it highlighted the difficulties that compact migrants historically have faced in obtaining REAL ID–compliant identification. We are sending copies of this report to the appropriate congressional committees and to the Departments of Agriculture, Commerce, Health and Human Services, Homeland Security, Housing and Urban Development, the Interior, State, and Transportation; the Social Security Administration; and the Governors of Arkansas, the CNMI, Guam, Hawaii, Oregon, and Washington; and the Ambassadors of Micronesia, the Marshall Islands, and Palau. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XX. We were asked to review topics related to migration to U.S. areas from the freely associated states (FAS)—the Federated States of Micronesia (Micronesia), the Republic of the Marshall Islands (Marshall Islands), and the Republic of Palau (Palau)—under those countries’ compacts of free association with the United States. This report (1) presents estimates of compact migrant populations and describes recent trends in compact migration; (2) summarizes the reported costs related to compact migration (compact impact costs) in three affected jurisdictions—Hawaii, Guam, and the Commonwealth of the Northern Mariana Islands (CNMI); and (3) describes effects of compact migration on governments, workforces, and societies in these and other U.S. areas. To present estimates of compact migrant populations in U.S. areas and describe recent trends in compact migration, we obtained special tabulations of data from the U.S. Census Bureau’s 2013-2017 American Community Survey (ACS) for the 50 U.S. states, the District of Columbia, and Puerto Rico. For Guam and the CNMI—U.S. territories that are not covered by the ACS—we used the Census Bureau’s revised 2018 enumeration of compact migrants in these areas. The special tabulations of ACS data and the Census Bureau’s 2013 and 2018 enumeration reports defined compact migrants as individuals residing in U.S. areas who were born in the FASs and entered the United States after 1986 (for Micronesia and the Marshall Islands) or 1994 (for Palau) and their U.S.-born children (biological, adopted, step-) and grandchildren younger than 18 years. We calculated percentage changes in states and territories that had more than 1,000 estimated compact migrants (or were designated as affected jurisdictions by the 2003 compacts’ implementing legislation) by comparing 2005-2009 ACS data and the 2008 enumeration with 2013-2017 ACS data and the revised 2018 enumeration. To identify and describe changes in Census Bureau methods and definitions for enumerating compact migrants over time (see app. VI), we reviewed the definitions of “compact migrant” in the bureau’s enumeration reports for tabulations before and including 2018. We also interviewed Census Bureau and Department of the Interior (Interior) officials. For example, we asked when and where grandchildren were counted among compact migrants younger than 18 years. To estimate net arrivals to U.S. areas by travelers with FAS passports (see app. III), we analyzed data from the Department of Homeland Security’s (DHS) Customs and Border Protection’s (CBP) Arrival and Departure Information System (ADIS). According to CBP officials, ADIS consolidates data from several DHS systems to create unique, person- centric travel records for all travelers regardless of citizenship. We calculated monthly FAS net arrivals to U.S. areas from 2017 through 2019 by using ADIS data that DHS provided, showing numbers of individuals with FAS-issued passports entering and exiting U.S. ports of entry each month during the period. To assess the reliability of ADIS data, we spoke with DHS officials to identify potential data reliability concerns and other limitations of ADIS. Officials said that any compact migrant who enters on an FAS passport and holds U.S. citizenship will be masked or not appear in the ADIS system. Officials also said that compact migrants who become U.S. citizens after arrival or are later discovered to be U.S. citizens are removed from the data; CBP officials believed these numbers to be small. We also conducted statistical checks for consistency and completeness of the ADIS data, including validating the ADIS data against publicly available passenger data from the U.S. Department of Transportation Air Carrier Statistics (TranStats) T-100 database for 2015 to 2019 (data for 2019 were partial). We used flight segment data from the T-100 database containing total passenger counts reported by both U.S. and foreign air carriers for flights that compact migrants take to U.S. areas. We found that data from ADIS and the T-100 database were positively correlated for 2015, 2017, 2018, and 2019 but were not correlated for 2016. According to CBP officials, ADIS was significantly changed in 2016 and may contain duplicate entries for that year. As a result, we determined that ADIS data for 2017 and later were sufficiently reliable for our intended use. To quantify costs related to compact migration that were reported by the affected jurisdictions included in our review—Hawaii, Guam, and the CNMI—we reviewed documents that they had published or provided to Interior, such as compact impact reports submitted by Hawaii and Guam and grant documents submitted by the CNMI. We used the most recent data available for 2004 through 2018. To identify the amount of funding distributed by Interior as compact impact grants to the affected jurisdictions, we interviewed Interior officials and reviewed relevant documentation. To identify and describe effects of compact migration on governments, workforces, and societies of receiving U.S. areas, we reviewed relevant documentation and conducted interviews with stakeholders in six U.S. areas that we visited. Documentation that we reviewed included program information and counts of compact migrants using state-level benefits programs, treated by state or local health clinics, enrolled in public schools or higher-education institutions, or using interpreters. Because various sources may define compact migrants by ethnicity, place of birth, language of origin, or other metrics, we noted the definition used for each count in this report. To identify the eligibility of compact migrants for selected federal programs, we reviewed relevant statutes and regulations and held discussions with officials from the U.S. agencies that oversee the programs. We selected the programs included in table 1 on the basis of those we included in a prior report, and we added other selected programs that we learned about in the course of interviews for our current report. We traveled to, and interviewed stakeholders in, six U.S. states and territories where compact migrants live, including three of the U.S. areas designated in the 2003 amended compacts’ implementing legislation as affected jurisdictions—Hawaii, Guam, and the CNMI— and three mainland states—Arkansas, Oregon, and Washington. We selected these areas on the basis of previously reported compact migrant population distributions in U.S. areas and of the locations of consulates or honorary consuls established by Micronesia, the Marshall Islands, and Palau. Stakeholders we interviewed included officials from nine federal agencies; state and territorial government officials in areas we visited; private sector and nonprofit organization representatives such as chambers of commerce, employers of compact migrants, and nonprofit service providers; officials from the FAS embassies and consulates or honorary consuls in areas we visited; and compact migrants living in areas we visited (see table 8). FAS embassy officials in Washington, D.C., connected us with local community members who helped us promote and organize the local community meetings in areas we visited. Participants whom we interviewed in the meetings do not represent a generalizable sample of compact migrants, and the challenges they discussed are not comprehensive (see app. VII for a discussion of challenges faced by compact migrants, according to stakeholders we interviewed). To describe academic studies of workforce and fiscal impacts of new migrants (see app. IX), we conducted a search, using keywords relevant to the economic impact of migration, in American and European economics academic journals published during the period 2015 to 2019. We reviewed a subset of these articles that we deemed most relevant to the context of compact migration, including articles that related to migration of lower-skilled workers and that included empirical analysis of the impact of this migration on various economic aspects. We also reviewed survey articles reviewing the conclusions of prior relevant publications. We conducted this performance audit from March 2019 through June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 9 presents Census Bureau data for U.S. states and territories that had estimated compact migrant populations of more than 1,000 in 2013 through 2018 and shows percentage changes in these populations from 2005-2009 to 2013-2018. Data for U.S. areas not covered by the American Community Survey, including Guam, the Commonwealth of the Northern Mariana Islands (CNMI), and American Samoa, are from compact migration enumerations that the Census Bureau performed on behalf of the Department of the Interior. According to 5-year data from the Census Bureau’s 2013-2017 American Community Survey, 72,965 compact migrants resided in the 50 U.S. states, the District of Columbia, and Puerto Rico. (The American Community Survey does not cover American Samoa, the CNMI, Guam, or the U.S. Virgin Islands.) For estimates of the number of compact migrants in each of the 50 U.S. states, the District of Columbia, and Puerto Rico, see table 10. The American Community Survey captures, among other things, respondents’ place of birth (by country) and state of residence. Table 11 provides Census Bureau estimates, using 2013-2017 American Community Survey data, of the numbers of compact migrants born in the freely associated states—the Federated States of Micronesia, the Republic of the Marshall Islands, and the Republic of Palau—and residing in each of the 50 states, the District of Columbia, and Puerto Rico. From 2017 through 2019, an average of about 366 more migrants from the Federated States of Micronesia (Micronesia), Republic of the Marshall Islands (Marshall Islands), and Republic of Palau (Palau) arrived in U.S. areas per month (4,390 per year) than departed, according to the Department of Homeland Security’s Customs and Border Protection’s Arrival and Departure Information System (ADIS). As figure 8 shows, this trend was driven by migrants from Micronesia and the Marshall Islands (3,343 and 1,487 per year on average, respectively). Each year during this period, an average of about 440 more Palauan citizens departed from the United States than arrived. The Census Bureau’s American Community Survey is an ongoing survey that provides information on a yearly basis, including employment status, educational attainment, veteran status, and age of survey respondents, among other topics. The survey covers the 50 U.S. states, the District of Columbia, and Puerto Rico. (The survey does not cover American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, or the U.S. Virgin Islands.) Some data for compact migrant populations are available through the American Community Survey. See table 12 for demographic information about compact migrant populations in the 50 U.S. states, the District of Columbia, and Puerto Rico in 2013 to 2017. See table 13 for demographic information about the compact migrant population in Hawaii only. Since 1986, Hawaii, Guam, and the Commonwealth of the Northern Mariana Islands (CNMI) have submitted to the Department of the Interior (Interior) intermittent compact impact reports and other documents that include descriptions of, and estimated costs for, education, health, public safety, and social services that local government agencies provided to compact migrants. Hawaii and Guam have submitted compact impact reports, which are available on Interior’s Office of Insular Affairs’ website. The CNMI has not submitted a compact impact report since fiscal year 2003 but reports compact impact costs to Interior in the CNMI’s annual plan for the use of compact impact grants. Table 14 shows the estimated costs that these affected jurisdictions reported to Interior or provided to us for 1986 through 2018. The Census Bureau, working under an interagency agreement with the Department of the Interior (Interior), has conducted six sets of enumerations of compact migrants in affected jurisdictions for the purpose of allocating compact impact grant funding and has performed the enumerations every 5 years. Enumeration methods and definitions have changed over time. During the course of our work, an error was discovered that affected the accuracy of the 2013 and 2018 enumerations and also affected Interior’s allocations of compact impact grants for several fiscal years. Census Bureau methods of gathering new data or analyzing existing data for compact migrant enumerations on behalf of Interior have changed over time. In 1993,1998, and 2003, the bureau used the “snowball” technique; in 2008, 2013, and 2018, the bureau employed a two-pronged approach. For enumerations in 1993, 1998, and 2003, the Census Bureau employed a survey method known as snowball sampling to count compact migrants in Hawaii, Guam, and the Commonwealth of the Northern Mariana Islands (CNMI). Because the surveys relied on referrals by respondents to identify new respondents, they were likely to undercount compact migrants who were not referred. For the enumerations in 2008, 2013, and 2018, the Census Bureau used a combination of existing and new survey data to count or estimate the numbers of compact migrants in Hawaii, Guam, and the CNMI. However, for the enumerations in Hawaii, the bureau used a different approach than it used for the enumerations in Guam and the CNMI. Also, for the enumerations in Guam and the CNMI, the bureau used a different approach in 2013 than it used in 2008 and 2018. To estimate the number of compact migrants in Hawaii, the Census Bureau used existing American Community Survey data. To estimate the numbers of compact migrants in Guam and the CNMI, the bureau used existing decennial census data in 2013 and gathered new survey data in 2008 and 2018. See table 15 for a summary of the enumeration methods that the Census Bureau has used over time. The definition of “compact migrant” that the Census Bureau used for the enumerations has changed over time. Each enumeration has counted as a compact migrant any individual, of any age, who was born in the Federated States of Micronesia (Micronesia), the Republic of the Marshall Islands (Marshall Islands), or the Republic of Palau (Palau) and who entered the United States after the effective date of their country’s compact. However, the enumerations in 2003, in 2008, and in 2013 and 2018 used various criteria for counting U.S.-born (U.S. citizen) individuals as children of compact migrants and therefore as compact migrants. 2003 enumeration. The definition of “compact migrant” in the 2003 amended compacts’ implementing legislation indicates that the children of compact migrants were to be considered compact migrants until 18 years of age. Interior interpreted the legislation’s definition of “compact migrant” as including all children younger than 18 years who were born to a compact migrant or migrants in the United States, thus including some U.S. citizens. 2008 enumeration. For the 2008 enumeration, the Census Bureau, on behalf of Interior, counted as compact migrants all children (biological, adopted, and step-) younger than 18 years who were born in the United States to a compact migrant head of household or to his or her spouse, were adopted by a compact migrant head of household or by his or her spouse, or were stepchildren of a compact migrant head of household or of his or her spouse. 2013 and 2018 enumerations. Starting with the 2013 enumeration, the Census Bureau also began counting as compact migrants all children (biological, adopted, and step-) younger than 18 years who were born in the United States to a compact migrant or to his or her spouse, regardless of whether they were the children of the head of household or of his or her spouse, and all grandchildren of a compact migrant who were younger than 18 years, regardless of whether they were the grandchildren of the head of household or of his or her spouse. Also starting with the 2013 enumeration, the Census Bureau introduced a requirement that to be counted as a compact migrant, a child or grandchild of a compact migrant must never have been married. For a summary of “compact migrant” definitions used for the enumerations over time, see table 16. The six sets of enumerations of compact migrants that the Census Bureau conducted on behalf of Interior in affected jurisdictions from 1993 through 2018 showed these populations growing in Hawaii and Guam and fluctuating in the CNMI. During our work with the Census Bureau to obtain American Community Survey data related to compact migrant populations, bureau officials discovered a programming error in the 2013 and 2018 enumerations of compact migrants that had resulted in an underestimate of certain compact migrants in Hawaii. The bureau revised these estimates in October 2019 to correct for the error in Hawaii. Figure 9 shows the Census Bureau’s revised estimates of compact migrants in the affected jurisdictions as of October 2019. In February 2020, Interior requested that the Census Bureau further revise its estimates for 2013 and 2018 to no longer count grandchildren. As of March 2020, the results of this revision were not yet available. In the U.S. areas we visited, stakeholders from state and territorial governments, private sector and nonprofit organizations, and freely associated state (FAS) consulates and communities made suggestions for improving experiences or outcomes of compact migration for both the receiving areas and the migrants themselves. Stakeholders recommended that some actions be taken in both the United States after compact migrants’ arrival and in the FASs before the migrants’ departure. Provide more information and education about the compacts. Several stakeholders said that U.S. agencies should better understand the compacts and coordinate their related work. These stakeholders, including members of compact migrant communities, noted that U.S. government officials in some cases have seemed uncertain or unaware that compact migrants are able to live and work in U.S. areas without a visa or other documentation and have asked them to present immigration documents they do not possess or are not required to obtain. An FAS official and community members noted a need for more education of employers and state government officials regarding the migration terms of the compacts and the migration status of FAS citizens in the United States. Restore Medicaid eligibility and expand benefits access. State government officials and health care providers advocated restoring Medicaid access to FAS populations. An FAS Consul General advocated restoring Medicaid eligibility to its pre-1996 status for compact migrants. FAS community members suggested extending Supplemental Nutrition Assistance Program benefits and expanding federal student loan access to compact migrants. Provide more information and guidelines about federal programs and policies. State government officials suggested that changes to federal government policies should include specific information about the applicability of the changes to FAS citizens. Health care providers suggested that the federal government should share more data about compact migration and noted a need for federally established guidelines to support accurate, rather than exaggerated, cost reporting. The providers noted that compact impact estimating was chaotic and had a negative effect on the community. FAS community members expressed interest in federally provided educational sessions and clear eligibility criteria for federal benefits. Simplify Form I-94 access for compact migrants. FAS consular officials and community members said that compact migrants entering the United States should receive information about the importance of their Form I-94 Arrival/Departure Record (Form I-94) and how to retrieve it online. Because compact migrants have had difficulty in accessing these forms, and given the cost of replacing them, FAS community members requested that federal agencies be enabled to retrieve migrants’ Forms I-94 for them. FAS consular officials recommended that compact migrants’ Forms I-94 be made accessible on the Customs and Border Protection website indefinitely, not only for the current 5-year period, since compact migrants’ forms do not expire. Provide more and broader funding to U.S. states and territories. State government officials, nonprofit representatives, and FAS community members said that more federal funding and resources were needed to accommodate the compact migrant population or to support the receiving states and territories. State government officials also said that the federal government should increase compact impact funds to a “reasonable amount,” even if the full costs cannot be covered. They noted that the compacts represent a federal obligation and expressed a belief that the federal government should take care of compact migrants. According to some health care providers, the United States’ treatment of the compact migrant population in U.S. areas could affect the FASs’ compact negotiations with the U.S. government. State government officials also suggested that allowing compact migrants access to more federal benefits would help alleviate compact impact on states and territories. Clarify immigration provisions under the compacts of free association. FAS community members in some locations we visited expressed a need for clarification about the status of migration provisions of the compacts. Specifically, they expressed concern that they might have to leave the United States in 2023. For example, in one FAS community we visited, community members registered confusion about whether provisions of the compacts (including migration provisions) are scheduled to end in 2023 and whether FAS citizens in U.S. areas can become U.S. citizens. One community member expressed concern that compact migrants would be “chased” out of U.S. areas after 2023 and that “all of their rights” under the compacts would be revoked. FAS community members also sought clarification about the implementation of the DHS rule for considering public charge while determining admissibility to U.S. areas. According to community members and other stakeholders, the rule has caused uncertainty in compact migrant communities, which may result in some compact migrants’ not enrolling in, or unenrolling from, public benefits programs. FAS community members said that they are uncertain whether and how the rule change will apply to them and whether enrolling in public benefits or enrolling eligible children will make them ineligible to reenter the United States. FAS consular officials and community members also suggested revising certain immigration provisions—for example, changing compact migrants’ nonimmigrant status to allow them access to a wider range of jobs, including law enforcement and military officer positions. Expand health care access and clinics in U.S. areas. State government officials said they believed that more health education and outreach to FAS communities were needed. A nonprofit representative noted that FAS communities lack vision care and that the extension of postpartum care to FAS communities would improve maternal and child health. FAS community members suggested the creation of a Pacific Islander–specific health clinic in the Pacific Northwest, with translators on staff and on-site enrollment for health insurance. Representatives of a nongovernmental organization in Hawaii that is led and staffed by compact migrants noted that a series of changes in compact migrants’ eligibility for the Hawaii state health care program, Med-QUEST, had caused confusion about compact migrants’ eligibility for public health care benefits. Address preventative care, dialysis needs, and communicable diseases in the FASs. State and territorial government officials and health care providers said that greater access to in-country care, including more resources for primary care, was needed in the FASs. They recommended making more preventative treatment available in the FASs, including diabetes prevention, and establishing clinics in the FASs to potentially reduce the number of individuals moving to the United States for health care. Health care providers suggested that the Department of the Interior (Interior) should produce or fund a study on dialysis in the FASs, including an analysis of whether high-quality dialysis services in the FASs would decrease migration solely for access to dialysis. Territorial government officials suggested that compact migrants should receive health screenings before departing for the United States to identify any serious conditions or communicable diseases. Some health care providers and state government officials proposed that the U.S. federal government focus on reducing or eliminating the transmission of tuberculosis in the FASs. Offer predeparture education to compact migrants in the FASs. State government officials and nonprofit representatives suggested that videos be aired on television in the FASs to support predeparture education, to explain differences they would find in the United States, and to reduce culture shock after arrival. Some state government officials and health care providers suggested that FAS citizens be encouraged to gather documentation, such as immunization and medical records, school records, and anything necessary to obtain a U.S. driver’s license, before departing for the United States. State government officials also suggested that lists of community-based organizations, by U.S. state or territory and city, be provided to FAS citizens before their departure. Offer orientation and information to compact migrants arriving in the United States. State government officials said that U.S. areas should offer and fund location-specific orientations for FAS citizens after arrival. The officials suggested that these orientations should cover how health care eligibility works, what resources are available to compact migrants, and how they can contact interpreters. State government officials also said that proactive education about U.S. laws could help compact migrants avoid behavior or circumstances that might cause them to run afoul of the law, given cultural differences and misunderstandings. Health care providers noted that compact migrants could be given more information to encourage better nutritional choices and more exercise. Expand and professionalize translation and interpretation resources. Compact migrants who are not fluent in English may experience challenges accessing or navigating health care, the judicial system, and educational institutions, according to state government officials, FAS consulate officials, private sector and nonprofit organization representatives, and compact migrant communities. State government officials reported frequent difficulty in finding interpreters and translators for the multiple languages spoken by compact migrants. State government officials recommended that grants be made available to help pay for interpreters until more FAS community members graduate from college and become qualified. The officials also said that interpreters should be encouraged to develop greater proficiency in fields such as law and medicine so that they can serve in multiple capacities. In addition, the officials identified a need for more in-person interpreters in hospitals and medical facilities. State government officials noted that FAS communities speak many different languages, and they acknowledged the need for a culturally-specific approach for each group. They said that, in addition to translating content, interpreters should fully explain the context of programs to ensure compact migrants’ understanding. FAS community members proposed the creation of a group of paid, full-time interpreters and a language certification requirement to guarantee the availability and quality of language services. Create “one-stop shops” with information and resources for compact migrants. State government officials and health care providers identified a need for one-stop shops—centers that serve compact migrant populations—in areas that do not currently have them. According to stakeholders in a U.S. state without such a center, a one-stop shop could reduce duplication and increase coordination among the many groups that serve the FAS community. Other stakeholders suggested that each state government establish a single point of contact for compact migrants. FAS community members and nonprofit representatives identified a need for a cultural center or other physical space that could be used to hold events and provide centralized communication and resources for the FAS community in the Pacific Northwest, in particular. Emphasize community-based approaches to supporting compact migrants. State government officials noted the importance of community- based approaches to supporting compact migrants. For example, stakeholders recommended hiring community health workers from the FAS population to engage with their communities in U.S. areas. According to the officials, community health workers, as known and trusted entities, are better sources of information for FAS communities than any government agency. The officials also acknowledged the importance of engaging with FAS community leaders (including embassy or consular officials and church leaders) in U.S. areas to successfully connect with FAS community members. Provide compact migrant–dedicated housing. State government officials, FAS consulate officials, and nonprofit organization representatives discussed discrimination that compact migrants experienced in housing. For example, stakeholders in some areas we visited described landlords who failed to maintain or repair housing leased to compact migrants, who targeted compact migrants for evictions, or who avoided renting units to compact migrants. Officials in one state suggested that FAS communities need access to dedicated housing options that align with their community traditions and cultural norms, such as units that can accommodate large or multiple families. Nonprofit organizations provide compact migrants with a range of assistance, such as assistance with housing or rent, food, documentation and legal matters, and enrollment in health insurance. Some organizations, such as “one-stop shops” (i.e., centers serving compact migrant populations), serve only compact migrants, while other organizations serve compact migrants among other members of the receiving community. Additionally, some companies that employ compact migrants offer programs intended to help them adjust to life in the United States. The information presented in this appendix is based mainly on documentation provided by the organizations and interviews with their representatives. Several nonprofit organizations in U.S. areas that we visited target their services to compact migrants. Two of these organizations—one-stop shops in Hawaii and Guam—aim to support the compact migrant communities by connecting the migrants to existing resources and, in some cases, creating new programs and services to support freely associated state (FAS) communities, according to nonprofit and government officials and documentation. These one-stop shops receive funding from the U.S. Department of the Interior (Interior) as well as other governmental and nongovernmental sources. In Guam, the Micronesian Resource Center One-Stop Shop was developed with input from various communities in Guam and government agencies and launched in October 2015, according to one-stop shop officials and Interior documentation. The one-stop shop has received an Interior grant each year starting in fiscal year 2016. The amount of the grant has steadily increased, rising from $210,000 in fiscal year 2016 to $217,000 in fiscal year 2017, $250,000 in fiscal year 2018, and $267,000 in fiscal year 2019, according to Interior documentation and officials. The one-stop shop employs both case workers and cultural mediators and uses a mobile van to bring services directly to FAS communities, according to one-stop shop officials. These services include outreach to communities, including youths; workshops for parenting and driving; and assistance with lost or replacement documentation. For example, when conflict escalated among compact migrants living in a Guam apartment complex, Interior and Guam officials noted that the one-stop shop worked with police to facilitate meetings and participation in neighborhood watch programs. The one-stop shop has hosted “Welcome to Guam” orientations to educate compact migrants about finding housing, setting up utilities, and opening a bank account in Guam; employees’ rights; medical insurance; deportable offenses; and the danger of human trafficking, according to one-stop shop officials. In Hawaii, the one-stop shop We Are Oceania was established with Interior funding in 2015. The organization provides case management, helping compact migrants to find jobs, address housing or legal issues, and enroll in health insurance through Hawaii’s Premium Assistance Program, according to one-stop shop officials and documentation. We Are Oceania has also provided cultural consultations and trainings to Hawaii public school teachers and service providers to educate them about cultural differences and potential challenges that compact migrants may face, according to nonprofit representatives and documentation. The officials also said that the organization hosts a youth summit and helped open a newcomer welcome center at a middle school. Figure 10 shows photos of the We Are Oceania facility, including desks where compact migrants can apply for health insurance and other services. Other nonprofit organizations were also founded specifically to assist the compact migrant community in navigating various U.S. systems, such as education and health care, and obtaining documentation such as driver’s licenses or Forms I-94 Arrival/Departure Records. The Arkansas Coalition of Marshallese in Springdale, Arkansas, according to representatives of the organization, helps local compact migrants with tasks such as retrieving new Forms I-94 from Customs and Border Protection; translating state driver’s license applications into Marshallese; providing education about diabetes prevention and management; and enrolling compact migrant children in ARKids, the state’s public health insurance program that extends federal health insurance coverage for children younger than 19 years. In 2018, the Micronesian Islander Community Organization in Oregon announced a study among local compact migrants to identify barriers that they faced in the region, such as a lack of certified health care interpreters. Additionally, the Oregon-based COFA Alliance National Network conducts policy and advocacy work aimed at supporting compact migrant communities, according to representatives of the organization. Charities, legal services, and other programs assist compact migrants and other eligible individuals in selected U.S. areas. For example: In Hawaii, the Salvation Army of the Hawaiian and Pacific Islands provides assistance with rent, utilities, and food; interpreters to assist non–English speakers with accessing health and legal services; and digital literacy training (e.g., how to use email), according to Salvation Army officials. In Guam, the Salvation Army Guam Corps provides assistance with rent, utilities, food, and clothing and also provides case management services, according to Guam officials. In the Commonwealth of the Northern Mariana Islands (CNMI), Karidat provides a food pantry, clothing assistance, rental assistance, and victim advocacy, among other services. (Fig. 11 shows a public bulletin board and donated clothing in Karidat’s offices.) In 2018, compact migrants made up 20.4 percent of individuals accessing Karidat’s food pantry and 39.5 percent of individuals receiving clothing assistance, according to Karidat estimates. The Hawaii and Arkansas chapters of the Legal Aid Society provide legal services to local residents, such as victims of crime, according to Hawaii and Arkansas officials. According to Hawaii chapter officials, they served 569 compact migrants (8.5 percent of their total clients) in fiscal year 2019. The Asian Family Center within Oregon’s Immigrant and Refugee Community Organization provides similar services, including defense for parties engaged in deportation removal proceedings, according to representatives of the organization. Some employers with compact migrant workers provide employee services, programs, or accommodations specific to these workers’ needs. In Arkansas, Tyson, Inc., provides written materials in Marshallese and operates a program that appoints chaplains to help the company’s Marshallese workers, as well as other non–U.S. citizen employees, navigate life in the United States generally and in Arkansas specifically, according to private sector representatives. Additionally, the representatives told us that the company provides free classes in financial literacy and English as a second language to its employees, including compact migrants. Another company in the region, Cargill Protein, has partnered with local nongovernmental organizations to educate its compact migrant employees about U.S. driving laws and help prepare them for driver’s license tests. We examined academic studies published from 2015 through 2019 to determine what is known about the likely effects of migration similar to compact migration on the workforces of receiving countries. Because we were unable to identify articles published during this period that focused specifically on compact migration, we focused our search on studies examining the effects of migration by other groups with relatively few skills. Studies that we reviewed sometimes reached differing conclusions about whether migration is associated with a negative, neutral, or positive effect on the employment and earnings of nonmigrant workers in the receiving countries. Some studies found that migration may result in worsened employment prospects or wages—particularly in the short term and if the influx of migrants is sudden—for nonmigrant workers who are most similar to the migrants in terms of demographics and skills. If the migrant workers are close substitutes for nonmigrants, they may intensify competition for jobs, increasing unemployment and lowering wages for such nonmigrant workers as well as for similar prior migrants. In the case of compact migration, this might include younger and less educated nonmigrants. However, according to other studies and survey papers that we reviewed, nonmigrants, both low and high skill, could benefit as a whole from migration. For example, one study of the effects of migration on 20 countries found that both low- and high-skill nonmigrants clearly benefited from an influx of migrant workers about two-thirds of the time. Nonmigrant workers may benefit from migration if the migrant workers specialize in different skills and vocations than the nonmigrant population, leading to complementary effects from scale and specialization. For example, larger numbers of construction workers may result in greater efficiency and quality in the building of more restaurants and bars, benefitting workers in nonconstruction trades as well as nonmigrant investors and business owners. Institutions may play an important role in determining the effects of migration on the receiving country’s workforce. For example, a study estimating the effect of migrant workers in European Union countries and controlling for institutional and noninstitutional factors showed that the effect of migrants varied between countries, driven in part by differences in their institutional environment, such as the extent of unemployment insurance, fiscal redistribution, and government spending on services and public goods. This study found that, while fiscal redistribution to migrant workers through taxation and unemployment benefits somewhat worsens outcomes for nonmigrants, this effect is often outweighed by the economic contribution of these migrants. Distinctions in statistical methodologies and assumptions may explain studies’ seemingly contradictory conclusions about the effects of migration on the workforce of receiving countries. According to a survey paper reviewing other previously published work, the statistical controls selected for studies of the impact of migration can result in subtle but economically important distinctions in what the studies attempt to measure, such as the total effects of migration on a given region or the effects of migration on a specific group (e.g., a particular education or skill group). According to this and a second survey paper we reviewed, contradictory conclusions may also result from differing assumptions about factors such as the extent to which migrants “downskill” (compete for jobs for which they may be overqualified) and, therefore, about the nonmigrants that should be used as a comparison group to examine the effect of migrants of a particular skill and education level. According to a third survey paper we reviewed, studies also vary in whether they measure the shorter- or longer-term effects of migration; the survey found that negative effects are more often reported when studies measure migration’s shorter-term effects. Academic journal articles that we examined also discuss the potential fiscal effect of migration. Several studies argue that evaluations of migration’s fiscal effect should consider the potential effects over multiple generations and should also consider the indirect fiscal effect of migrants’ influence on native workers. For example, a panel discussion report of the National Academies of Sciences, Engineering, and Medicine states that descendants of immigrants are often studied only as children, in cross- sectional data providing a point-in-time snapshot. As a result, according to the report, the average immigrant household is counted as a net fiscal burden in part because young children of immigrants, like the children of natives, receive public education. The report stated that studying the descendants of immigrants as they complete their education, become workers, and start paying taxes provides a more complete measure of migration’s fiscal effect, because such an analysis may include not only the cost of their education but also the delayed fiscal benefits of that education: larger tax payments made possible by the investment in human capital that education represents. Another paper we reviewed argues that because migrant workers can positively influence the upward mobility of native workers, the higher taxable income from these native workers should be considered, in addition to the low taxable income of the migrants, to avoid negatively biasing the estimated fiscal effect of migrants. The REAL ID Act, passed by Congress in 2005, set minimum document requirements and issuance standards for driver’s licenses and personal identification cards. The act also prohibits federal agencies from accepting for certain purposes driver’s licenses and identification cards from states that do not meet the act’s minimum standards. Citizens of the freely associated states (FAS)—the Federated States of Micronesia, the Republic of the Marshall Islands, and the Republic of Palau—have always been eligible for REAL ID–compliant driver’s licenses or identification. However, the term of the licenses’ or identification’s validity and the documents that the Department of Homeland Security (DHS) required to establish compact migrants’ identity have varied over time. Currently, compact migrants are eligible for full-term REAL ID–compliant identification. Since September 2019, they have been required to present an unexpired FAS passport and the most recent Form I-94 Arrival/Departure Record (Form I-94) as evidence of identity to obtain the identification. DHS regulations previously required compact migrants to provide documents they were not required to have. Before September 2019, DHS required compact migrants applying for REAL ID–compliant identification to present, in addition to their unexpired foreign passport and Form I-94, either an unexpired U.S. visa (affixed to the passport) or an employment authorization document (EAD). However, under the compacts of free association, compact migrants are not required to obtain a visa or an EAD. On September 4, 2019, DHS modified its policy, designating an unexpired passport from one of the FAS countries, in combination with an individual’s most recent Form I-94, as acceptable evidence of identity that compact migrants may present to obtain REAL ID–compliant identification. Federal law previously restricted the term of the REAL ID–compliant identification that compact migrants could receive. Before December 2018, compact migrants were eligible to receive temporary, limited-term REAL ID–compliant identification, valid until the expiration date on their EAD, which could be a maximum of 5 years, according to DHS officials. In December 2018, the REAL ID Act Modification for Freely Associated States Act made FAS citizens eligible for full-term REAL ID–compliant identification. Since then, compact migrants have been eligible for full- term REAL ID–compliant identification, valid for the maximum number of years for any license or identification as set by individual U.S. states and territories, according to DHS officials. In several areas that we visited, compact migrant communities described challenges they had experienced in obtaining or renewing their REAL ID– compliant identification. Some compact migrants spoke of difficulty due to the requirement to present a visa or an EAD as evidence of identity. In one location, FAS community members said that other members of the community had lost employment on a military base because they were unable to obtain REAL ID–compliant identification. (We heard many of these observations before September 2019, when DHS modified the policy that required applicants for REAL ID–compliant identification to present a visa or EAD.) Some compact migrants reported being unable to obtain REAL ID– compliant identification for other reasons. number on their current foreign passports. When an FAS citizen’s passport expires and he or she renews it while in the United States, the new passport has a different number than the former passport number displayed on the FAS citizen’s Form I-94. 1. Section 104(e)(9)(A) of the amended compacts’ enabling legislation authorized the President of the United States, at the request of the Governor of Guam or the Governor of the Commonwealth of the Northern Mariana Islands (CNMI), to reduce, release, or waive all or part of any amounts owed by the Guam or CNMI government (or either government’s autonomous agencies or instrumentalities), respectively, to any department, agency, independent agency, office, or instrumentality of the United States. According to section 104(e)(9)(B)(iv), that authority expired on February 28, 2005. 2. The Census Bureau data that we report reflect a definition of “compact migrants” that includes citizens of the Federated States of Micronesia (Micronesia), Republic of the Marshall Islands (Marshall Islands), and Republic of Palau (Palau) who entered the United States after 1986 (from Micronesia and the Marshall Islands) or 1994 (from Palau) and their U.S.-born children (biological, adopted, and step-) and grandchildren younger than 18 years. 1. The Arkansas Department of Education’s data estimating the number of compact migrant students at 4,175 is based on students’ ethnicity (Hawaiian and Pacific Islander) in the 2018-2019 school year. As a result, Arkansas’s estimate may include students who are not Marshallese. In addition, Arkansas’s estimate may include second- generation U.S. citizens, including Marshallese children born in the United States to Marshallese parents who were also born in the United States. The American Community Survey data that we report reflect a definition of “compact migrants” that includes only citizens of the Federated States of Micronesia (Micronesia), Republic of the Marshall Islands (Marshall Islands), and Republic of Palau (Palau) who entered the United States after 1986 (from Micronesia and the Marshall Islands) or 1994 (from Palau) and their U.S.-born children (biological, adopted, and step-) and grandchildren younger than 18 years. The 5,895 compact migrants that the Census Bureau estimated resided in Arkansas during the period 2013 to 2017 (a different time period from that of the data cited by the government of Arkansas) includes only adults and children who met those criteria. We believe that the Census Bureau data are sufficiently reliable for our purposes of estimating the number of compact migrants in U.S. areas. However, our report includes a discussion of stakeholder concerns that the compact migrant population in Arkansas may be undercounted. 2. The population estimate cited in the published study from Arkansas is based in part on a 2013 statement by a Marshallese consulate official. The Arkansas Department of Education estimated there were 4,175 Hawaiian and Pacific Islander students in Arkansas schools in the 2018-2019 school year. 3. Costs related to compact migration in U.S. areas not considered affected jurisdictions are outside the scope of our review. 4. We updated our report to reflect the data that the government of Arkansas cites for the period 1997 to 2019. 1. We have previously reported on defense issues in the Federated States of Micronesia and the Republic of the Marshall Islands (Marshall Islands). For more information about the United States’ right to use part of the Kwajalein Atoll in the Marshall Islands for missile tests and space tracking operations, see GAO, Foreign Relations: Kwajalein Atoll Is the Key U.S. Defense Interest in Two Micronesian Nations, GAO-02-119 (Washington, D.C.: Jan. 22, 2002). For more information about the Marshall Islands’ Nuclear Claims Trust Fund, see GAO, Marshall Islands: Status of the Nuclear Claims Trust Fund, GAO/NSIAD-92-229 (Washington, D.C.: Sept. 25, 1992). 2. Our report provides some information about contributions by compact migrants, including qualitative statements about their budgetary, workforce, and community contributions as well as high-level data on their average per-capita income (see app. IV). We have added the government of Oregon’s statements about the contributions of compact migrants to our report. 3. As our report notes, the affected jurisdictions are defined in the amended compacts’ implementing legislation, which also establishes funding for the associated compact impact grants for those jurisdictions. 4. We made revisions in our report to help direct readers to stakeholders’ suggestions for improving experiences or outcomes of compact migration, presented in appendix VII. 1. Our report incorporates the results of our interviews with members of compact migrant communities, including their reasons for migrating to U.S. areas, workforce challenges and other challenges they face, and their contributions to U.S. communities. Our report also includes these and other stakeholders’ suggestions for improving experiences or outcomes of compact migration (see app. VII). 2. We have previously reported on defense issues in the Federated States of Micronesia and the Republic of the Marshall Islands (Marshall Islands). For more information about the United States’ right to use part of the Kwajalein Atoll in the Marshall Islands for missile tests and space tracking operations, see GAO, Foreign Relations: Kwajalein Atoll Is the Key U.S. Defense Interest in Two Micronesian Nations, GAO-02-119 (Washington, D.C.: Jan. 22, 2002). For more information about the Marshall Islands’ Nuclear Claims Trust Fund, see GAO, Marshall Islands: Status of the Nuclear Claims Trust Fund, GAO/NSIAD-92-229 (Washington, D.C.: Sept. 25, 1992). (from Micronesia and the Marshall Islands) or 1994 (from Palau) and their U.S.-born children (biological, adopted, and step-) and grandchildren younger than 18 years. Given this definition, any individual older than 18 years who was not born in an FAS would not be counted as a compact migrant in the Census Bureau enumerations or the American Community Survey data in this report. 8. Table 10 in appendix II of our report includes estimates of the number of compact migrants in states with fewer than 1,000 estimated compact migrants, except when the data were suppressed by the Census Bureau or the number was unreportable because the margin of error exceeded the estimate. 9. Our report notes that some FAS citizens move to U.S. areas to join the military and that the FASs have a high rate of U.S. military service, according to FAS officials and Department of State documentation. 10. The amended compacts’ implementing legislation permitted the affected jurisdictions (Hawaii, Guam, the Commonwealth of the Northern Mariana Islands, and American Samoa) to submit compact impact reports to the Secretary of the Interior. The definition of “affected jurisdictions” in the legislation did not include any mainland states. 11. Our report notes that compact migrants work in professional industries, including jobs in government and education. 12. We updated our report to include information about the locations of COFA Alliance National Network chapters in states other than Oregon. 1. Our report describes policies allowing compact migrants to access in- state tuition at colleges and universities in some U.S. areas but does not include a comprehensive description of such policies in all U.S. areas. 2. Our report describes this and other challenges related to Form I-94 and includes freely associated state consular officials’ recommendations to their citizens experiencing this challenge (see app. VII). Pacific in the 2005 legislation was an error, it had no impact on FAS citizens’ eligibility for limited-term REAL ID–compliant identification. David Gootnick, (202) 512-3149 or gootnickd@gao.gov In addition to the contact named above, Emil Friberg (Assistant Director), Caitlin Mitchell (Analyst-in-Charge), Topher Hoffmann, Andrew Kurtzman, Reid Lowe, Moon Parks, and Nicole Willems made key contributions to this report. Kathryn Bernet, Justin Fisher, Rebecca Gambler, Christopher Keblitis, Ty Mitchell, Mary Moutsos, and Michael Simon provided technical assistance.", "summary": "The U.S. compacts of free association permit eligible citizens from the freely associated states (FAS), including Micronesia, the Marshall Islands, and Palau, to migrate to the United States and its territories without visa and labor certification requirements. In fiscal year 2004, Congress authorized and appropriated $30 million annually for 20 years to help defray costs associated with compact migration in affected jurisdictions, particularly Hawaii, Guam, and the CNMI. This funding ends in 2023, though migration to U.S. areas is permitted to continue and is expected to grow. GAO was asked to review topics related to compact migration. This report describes (1) estimated compact migrant populations and recent trends in compact migration; (2) reported costs related to compact migration in Hawaii, Guam, and the CNMI; and (3) effects of compact migration on governments, workforces, and societies in these and other U.S. areas. GAO reviewed Census Bureau data to determine the numbers of compact migrants in U.S. areas. In addition, GAO interviewed federal, state, and territory government officials; representatives of private sector and nonprofit groups employing or serving compact migrants; FAS embassy and consular officials; and members of compact migrant communities. In commenting on a draft of this report, U.S. area governments and FAS Ambassadors to the United States identified areas for additional study related to compact migration and impact. Some also discussed policy considerations, including restoration of Medicaid benefits to compact migrants. More than 94,000 compact migrants—that is, citizens of the Federated States of Micronesia (Micronesia), the Republic of the Marshall Islands (Marshall Islands), and the Republic of Palau (Palau) as well as their U.S.-born children and grandchildren younger than 18 years—live and work in the United States and its territories, according to Census Bureau data. Data from Census Bureau surveys covering the periods 2005-2009 and 2013-2017 and an enumeration in 2018 show that the combined compact migrant populations in U.S. areas grew by an estimated 68 percent, from about 56,000 to about 94,000. Historically, many compact migrants have lived in Hawaii, Guam, and the Commonwealth of the Northern Mariana Islands (CNMI). From 2013 to 2018, an estimated 50 percent of compact migrants lived on the U.S. mainland. Hawaii, Guam, and the CNMI track and report the financial costs related to compact migration, or compact impact, for their state or territory. These areas reported estimated costs totaling $3.2 billion during the period fiscal years 2004 through 2018. In fiscal years 2004 through 2019, Hawaii, Guam, and the CNMI received a combined total of approximately $509 million in federal grants to help defray the costs of providing services to compact migrants. In the U.S. areas GAO visited—Arkansas, the CNMI, Guam, Hawaii, Oregon, and Washington—state and territorial officials identified effects of providing public education and health care services to compact migrants. Some area governments use a combination of federal and state or territorial funds to extend health care coverage to compact migrants. For example, some states help compact migrants pay for coverage through health insurance exchanges, created under the 2010 Patient Protection and Affordable Care Act, by covering the cost of premiums not covered by advanced premium tax credits available to eligible compact migrants. Effects of compact migration in these U.S. areas also include compact migrants' budgetary contributions through payment of taxes and fees as well as their workforce contributions—for example, through jobs in hotels, manufacturing, the U.S. military, poultry processing, caregiving, and government.", "document_type": "gao"}
{"report": "The United States took control of the Northern Mariana Islands from Japan during the latter part of World War II. After the war, the U.S. Congress approved a trusteeship agreement making the United States responsible to the United Nations for the administration of the islands. In 1976, the District of the Mariana Islands entered into a covenant with the United States establishing the island territory’s status as a self-governing commonwealth in political union with the United States. The covenant granted the CNMI the right of self-governance over internal affairs and granted the United States complete responsibility and authority for matters relating to foreign affairs and defense affecting the CNMI. The covenant also preserved the CNMI’s exemption from certain federal laws that had previously been inapplicable to the Trust Territory of the Pacific Islands, including certain federal minimum wage provisions and immigration laws, with certain limited exceptions. In 2008, the CNRA amended the joint resolution approving the U.S.– CNMI covenant to generally apply federal immigration law, including the INA, to the CNMI, with a transition period for foreign workers and investors. In addition, the INA provides DHS with discretionary authority to grant parole to certain noncitizens, on a case-by-case basis, allowing them to be temporarily present in the United States, including the CNMI. To provide for an orderly transition from the CNMI immigration system to the U.S. federal immigration system under the immigration laws of the United States, DHS, through USCIS, established the CNMI-Only Transitional Worker program in 2011. Through the program, employers petition for nonimmigrant CW-1 permits that allow foreign workers who meet certain requirements to work temporarily in the CNMI. The CNRA limits the number of permits DHS may issue annually and reduces that number each year until the end of the transition period. Since 2008, Congress has amended the CNRA several times, with provisions that affected the length of the transition period, the number of CW-1 permits allocated, and the distribution of permits (see table 1). Figure 1 shows the past numerical limits on CW-1 permits established by DHS and the current and future numerical limits for permits specified in the Northern Mariana Islands U.S. Workforce Act of 2018, Pub. L. No. 115-218. The limits shown are the maximum number of permits available for each fiscal year through the end of the transition period and may not reflect the number of permits for which employers would petition and that DHS would approve. In addition, the INA provides authorization for several types of visas for nonimmigrant workers and their families—for example, H-2B visas for temporary nonagricultural workers—that became applicable to the CNMI with the passage of the CNRA. The CNRA allows CNMI employers to bring temporary workers to the CNMI under the H-2B program without counting against the numerical restriction for H-2B visas. The CNRA and its implementing regulations established E-2 CNMI Investor (E-2C) status, a classification for certain foreign investors who previously had been lawfully admitted to the CNMI under the territory’s immigration system and who met certain eligibility requirements. Such investors could petition for E-2C status prior to January 18, 2013, according to USCIS. Eligibility criteria include, among others, providing evidence of maintaining financial investments in the CNMI of at least $50,000. DHS may grant E-2C status for up to 2 years, and such status can be renewed. Under the INA, DHS has discretionary parole authority to allow certain noncitizens, on a case-by-case basis, to be temporarily present in the United States. DHS has used this authority to grant parole to individuals who may be inadmissible or otherwise ineligible for admission to allow them to remain in the CNMI, according to DHS. In 2017, the President issued Executive Order 13767, calling for, among other things, the Secretary of Homeland Security to take appropriate action to ensure that parole authority is exercised only on a case-by-case basis in accordance with the plain language of the statute and, in all circumstances, only when an individual demonstrates urgent humanitarian reasons or a significant public benefit derived from such parole. Proposed bill H.R. 560 includes several provisions, among others, that would provide CNMI resident status to eligible individuals. To be eligible for CNMI resident status under H.R. 560, an individual must have been lawfully present in the CNMI under U.S. immigration laws on the date of enactment or on December 31, 2018; be admissible as an immigrant to the United States under the INA, although no immigrant visa is required; have resided continuously and lawfully in the CNMI from November 28, 2009, through the date of enactment; and not be a citizen of the Federated States of Micronesia, Republic of the Marshall Islands, or Republic of Palau. Individuals who meet each of these four criteria would be eligible to apply for CNMI resident status if they fall into one of the categories shown in table 2. As figure 2 shows, the number of CW-1 permits approved by USCIS remained well under the annual numerical limits established by DHS for fiscal years 2012 through 2015 and exceeded or neared the annual limits for fiscal years 2016 and 2017. According to USCIS data, most individuals with approved CW-1 permits for fiscal years 2015 through 2018 were born in the Philippines or China. In addition, as table 3 shows, four times more CW-1 permits were issued to Chinese nationals for fiscal years 2016 and 2017 than for fiscal year 2015. As we reported in 2017, firms involved in building a new casino in Saipan have primarily employed Chinese workers. About one-third of fiscal year 2018 CW-1 permit holders had maintained continuous employment in the CNMI since 2015 and could be eligible for CNMI resident status under H.R. 560, if they had been admitted every year under CW-1 status and were otherwise eligible. USCIS CW-1 permit data for fiscal years 2015 through 2018 show that, of the 8,995 foreign workers with CW-1 permits approved by USCIS for fiscal year 2018, 2,875 workers (about 32 percent) had maintained continuous employment in the CNMI since fiscal year 2015. (Of this group, 2,287—80 percent—were born in the Philippines.) Under H.R. 560, a foreign national who meets additional eligibility requirements, including having resided continuously and lawfully in the CNMI from November 28, 2009, through the date of enactment, may be admitted to the CNMI under CNMI resident status if that individual was admitted to the CNMI as a CW-1 worker during fiscal year 2015 and during every subsequent fiscal year beginning before July 24, 2018. As a result, according to our analysis of USCIS data, 2,875 workers could be eligible under H.R. 560 to apply for CNMI resident status if they were admitted as CW-1 workers every fiscal year until 2018 and met all other eligibility conditions. Table 4 shows the numbers of foreign workers who received CW-1 permits for fiscal year 2018 and had maintained continuous employment in the CNMI since fiscal years 2012 through 2017. USCIS data show a reduction from fiscal year 2017 to fiscal year 2018 in the number of CW-1 permit holders and a significant increase in the number of H-2B beneficiaries. While the number of approved CW-1 permit holders declined from 12,889 in fiscal year 2017 to 8,995 in fiscal year 2018, the number of H-2B beneficiaries for those years increased from 0 to 3,058. In addition, our analysis of USCIS data found that the number of CW-1 permit holders for the construction trade declined from 2,981 to 545—by 82 percent—from fiscal year 2017 to fiscal year 2018. Meanwhile, the number of H-2B beneficiaries for the construction trade in the CNMI increased from 0 for fiscal year 2017 to 1,801 for fiscal year 2018. In August 2017, Congress amended the CNRA to, among other things, restrict CW-1 permits for workers in construction and extraction occupations (as defined in the U.S. Department of Labor’s Standard Occupational Classification system) by allowing only extensions of CW-1 permits first issued before October 1, 2015. The CNRA allows CNMI employers to petition for H-2 visas to bring temporary workers, such as construction workers, to the CNMI without counting against the numerical restriction for such visas. According to a senior USCIS official, the new casino employer in Saipan began petitioning in 2018 for foreign workers under the H-2B program instead of petitioning for CW-1 permits for its construction workers. The official noted that Pub. L. No. 115-53’s restriction on the use of CW-1 permits for construction trade workers may account for the decrease in petitions for CW-1 permit holders and increase in petitions for H-2B beneficiaries from fiscal year 2017 to fiscal year 2018. Table 5 shows the numbers of approved CW-1 permit holders and H-2B beneficiaries for the construction trade in fiscal years 2016 through 2018. In October 2016, DHS announced the list of countries whose citizens were eligible to participate in the H-2 program from January 18, 2017, to January 18, 2018. Asian countries on the list included the Philippines, South Korea, Taiwan, and Thailand, among others, but did not include China. In January 2019, because of concerns about overstays and human trafficking, DHS removed the Philippines from the list of countries eligible for the H-2B program. CNMI government and Chamber of Commerce officials have voiced concerns that the removal of the Philippines from the list will make it difficult to hire construction workers in the aftermath of two recent typhoons. USCIS began approving 2-year E-2C status for eligible foreign long-term investors and their dependents in the territory in fiscal year 2011. According to USCIS, as of February 5, 2019, 56 investors who had previously resided in the CNMI as investors under CNMI immigration law were residing in the CNMI with E-2C status. Under H.R. 560, foreign nationals who otherwise meet additional eligibility requirements may be granted CNMI resident status if they resided in the CNMI as investors under CNMI immigration law and are presently resident under E-2C status. As a result, under H.R. 560, these 56 investors could be eligible to apply for CNMI resident status if they met all other eligibility conditions. According to USCIS testimony, after the CNRA was passed in 2008, USCIS implemented DHS’s discretionary parole authority by making parole available to groups of individuals residing in the CNMI who would not be covered by INA classifications and for whom the classifications established in the CNRA did not appear to be appropriate. These individuals previously had immigration status under CNMI immigration law that allowed them to potentially remain in the CNMI indefinitely, according to USCIS. Without USCIS action, these individuals would have been deemed unlawfully present in the United States, according to USCIS documents. To provide such individuals with a means to remain temporarily in the CNMI during the transition period, USCIS announced several discretionary parole policies to cover the following groups, among others, which were potentially eligible for parole: CNMI permanent residents, immediate relatives of CNMI permanent residents, spouses and children of deceased CNMI permanent residents, and immediate relatives of citizens of the freely associated states (November 2009) Certain in-home foreign national caregivers of CNMI residents (October 2011) Immediate relatives of U.S. citizens, especially parents of U.S. citizen children, and stateless individuals in the CNMI (November 2011) In response to Executive Order 13767, on December 27, 2018, USCIS announced the termination of parole for immediate relatives of U.S. citizens and certain stateless individuals; CNMI permanent residents, immediate relatives of CNMI permanent residents, and immediate relatives of citizens of the freely associated states; and certain in-home foreign worker caregivers of CNMI residents. To provide an opportunity for individuals in these categories to prepare to depart or seek a different lawful status, USCIS announced that the affected individuals were allowed to remain in the CNMI with a transitional parole status for up to 180 days, not to extend beyond June 29, 2019. According to a senior USCIS official, from December 2, 2016, through December 14, 2018, USCIS had granted parole until December 31, 2018, to 1,039 individuals in the terminated parole categories. Under H.R. 560, some of these individuals could be eligible to apply for CNMI resident status if they met all other eligibility conditions. Vice Chairman Sablan, Republican Leader Gonzalez-Colon, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact David Gootnick, Director, International Affairs and Trade, at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Emil Friberg (Assistant Director), Julia Ann Roberts (Analyst in Charge), Sada Aksartova, Andrew Kurtzman, Reid Lowe, and Alexander Welsh. Technical support was provided by Kathryn Bernet, Justin Fisher, Christopher Keblitis, Mary Moutsos, and Moon Parks. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The 1976 covenant defining the political relationship between the CNMI and the United States exempted the CNMI—a U.S. territory north of Guam—from certain federal immigration laws. However, the covenant preserved the right of the U.S. government to apply federal law in these exempted areas. The CNRA, which amended a joint resolution approving the covenant, generally established federal control of CNMI immigration beginning in 2009. In 2009, DHS began implementing, among other things, a foreign worker permit program to address CNRA provisions specific to the CNMI. DHS also began using its discretionary authority under the INA to parole certain groups of individuals into the CNMI (i.e., allow them to be temporarily present). Congress has amended the CNRA several times with provisions that affected the total number of permits allocated and the distribution of permits. Proposed bill H.R. 560 would further modify the CNRA by establishing a CNMI resident status for certain individuals. Among its other provisions, the CNRA allows CNMI employers to petition for H-2 visas for temporary workers without counting the visas against a numerical restriction. Drawing from ongoing work, this testimony discusses DHS's implementation of (1) selected CNRA provisions regarding foreign workers, among others, in the CNMI and (2) its discretionary parole authority under the INA as applied in the CNMI. GAO updated information from May 2017 ( GAO-17-437 ) and February 2018 ( GAO-18-373T ), reviewed relevant legal documents, and analyzed DHS data. Under the Consolidated Natural Resources Act of 2008 (CNRA), the Department of Homeland Security (DHS) established the nonimmigrant Commonwealth of the Northern Mariana Islands (CNMI)–Only Transitional Worker program in 2011. Through the program, eligible foreign nationals can obtain CNMI-Only Transitional Worker (CW-1) permits to work temporarily in the CNMI. Under H.R. 560, foreign nationals who meet additional eligibility requirements could be eligible to receive CNMI resident status if they were admitted annually to the CNMI as a CW-1 worker in fiscal years 2015 through 2018. GAO's preliminary analysis of DHS data found that 2,875 (about 32 percent) of 8,995 workers with CW-1 permits for fiscal year 2018 had maintained continuous employment each fiscal year since 2015 (i.e., received a CW-1 permit annually). While DHS data show the number of approved CW-1 permit holders declined from fiscal year 2017 to fiscal year 2018 (see figure), the number of H-2B beneficiaries—who often fill construction jobs—increased from 0 to 3,058. In January 2019, DHS removed the Philippines from the list of countries eligible for the H-2B program. In 2009, DHS began granting discretionary parole that authorized temporary stays for certain CNMI residents, such as spouses and children of U.S. citizens. These individuals may have been inadmissible or otherwise ineligible for admission to the United States, according to DHS. However, in December 2018, DHS announced that it was terminating parole for certain categories of residents in response to Executive Order 13767, issued in 2017. The order called on DHS to take appropriate action to ensure that parole authority is exercised only on a case-by-case basis, among other things. According to DHS, 1,039 individuals in the terminated categories had been granted parole until December 31, 2018. Under H.R. 560, some of these individuals could be eligible to apply for CNMI resident status.", "document_type": "gao"}
{"report": "NRC was established by the Energy Reorganization Act of 1974 and is headed by five commissioners, collectively referred to as the Commission, with members appointed by the President and confirmed by the Senate. One commissioner is designated by the President to serve as the Chair, who, among other things, serves as the official spokesperson of the Commission. The Commission is responsible for, among other things, revising budget estimates and determining the distribution of appropriated funds according to major programs and purposes. NRC staff from program offices in headquarters and four regional offices implement the agency’s programs for developing regulations, licensing, inspection, enforcement, and emergency response, among other responsibilities. In addition, NRC’s Office of the Chief Financial Officer establishes, maintains, and oversees the implementation and interpretation of the agency’s regulatory user fee policies and regulations and is responsible for assessing annual and service fees to licensees for each license they hold and sending invoices to licensees. The Office of the Chief Financial Officer also leads the agency’s budget formulation and execution processes. NRC’s authority to charge service and annual fees is derived from two laws: the Independent Offices Appropriations Act of 1952 and the Omnibus Budget Reconciliation Act of 1990, as amended. The Independent Offices Appropriations Act of 1952 provides broad authority to federal agencies, including NRC, to assess user fees or charges to identifiable beneficiaries through regulation. The Omnibus Budget Reconciliation Act of 1990 requires that NRC recover approximately 90 percent of its annual budget authority through fees assessed to licensees, excluding amounts appropriated for any one of a number of specified purposes. The law requires that NRC first use its authority from the Independent Offices Appropriation Act of 1952 to collect service fees for specific services provided. However, because those fees do not equal 90 percent of NRC’s budget authority, NRC also assesses annual fees. To the maximum extent practicable, the annual fees assessed must have a reasonable relationship to the cost of the regulatory services provided and may be based on how NRC allocates resources for regulating licensees or fee classes. The licensees regulated by NRC encompass a broad range of commercial uses of nuclear material such as use in commercial nuclear power reactors; the use of radioactive materials in medical, academic, and industrial settings; and the transport, storage, and disposal of radioactive materials and waste. For the purpose of setting service and annual fees, NRC established nine fee classes. Figure 1 shows NRC’s total budget authority and the amounts NRC collected through service and annual fees from licensees for fiscal years 2014 through 2019. NRC sets its service fees and annual fees through the federal rulemaking process every year. Under this process, NRC first drafts and then publishes a proposed fee rule in the Federal Register, after which interested parties have 30 days to comment. NRC develops the proposed fee rule by allocating its resources for regulating the fee classes and calculating its proposed hourly fee rate, which is the same rate for all fee classes, and annual fees, which vary by fee class. NRC bases its calculations for the proposed fee rule on its appropriation for the current fiscal year, if enacted. If the agency has not received its appropriation by the time it begins calculating fees, it bases these calculations on the President’s Budget. As part of this process, NRC generally posts fee work papers providing additional details to support the proposed fee rule. After the 30-day comment period, NRC adjusts its hourly fee rate for service fees and annual fees, as needed, and drafts a final fee rule. Finally, NRC publishes a final fee rule that includes its responses to comments received on the proposed fee rule. The final fee rule becomes effective 60 days after publication. In recent years, GAO and NRC internal initiatives identified several key findings and made recommendations to improve NRC’s fee-setting process, including the following: In 2016, NRC’s Fees Transformation Initiative recommended process improvements related to updating NRC’s fee rules and associated work papers. In 2017, we recommended that NRC clearly present information in NRC’s proposed fee rule, final fee rule, and fee work papers such as by defining and consistently using key terms so that stakeholders could understand fee calculations. In 2017, we also recommended that NRC develop objective, measurable, and quantifiable performance goals and metrics that would enable NRC to assess its efforts to improve the transparency and timeliness of its fee-setting process. NRC’s billing process for annual fees is based solely on the annual fee rate that is set through the rulemaking process. NRC’s billing process for service fees begins by identifying work that can be billed to a specific licensee and ends when the licensee pays its invoice for service fees. Once NRC determines that billable work needs to be done, NRC program office staff and contractors perform the work. NRC follows the steps in the billing process shown in figure 2. NRC assigns an activity code under which billable work is accomplished. Both NRC staff and contractors can perform work under the same billing codes. Once the hours charged have been reviewed, NRC aggregates the charges in its financial accounting system. Then, NRC staff and supervisors verify the hours billed to that activity code on a monthly basis through a formal, agency-wide billing validation process. On a quarterly basis, NRC will send invoices through the U.S. Postal Service or electronically to licensees, who have 30 days from issuance of the invoice to review and pay the invoice before being assessed late fees. Licensees may also dispute charges at this point. According to NRC staff, most disputes are handled informally and generally entail explanations of the agency’s billing or licensing policies. NRC provides licensees information on billing through other methods as well. For example, as part of the Fees Transformation Initiative, NRC posted public cost estimates for common regulatory actions to help licensees better plan for the cost of those actions. In addition, during the course of regulatory actions, NRC staff are to communicate with licensees about the status of the work being performed, and NRC can provide licensees biweekly estimates of charges from NRC staff and contractors to supplement its billing invoices. Over the years, GAO, NRC’s OIG, and NRC internal initiatives identified several key findings and made recommendations to improve NRC’s billing process, including the following: NRC began an initiative aimed at improving its billing codes in 2013, and in 2017, NRC’s Cost Accountability and Management Project plan stated that NRC’s methods for requesting and managing billing codes place the agency at risk of collecting inaccurate data. In 2018, we found that NRC was working to improve internal controls over the billing codes NRC staff use to record their work hours, which did not describe the work being performed and did not have a consistent naming convention. Relatedly, in 2015, NRC’s OIG recommended that NRC establish policies and procedures to centralize control of its billing code structure, link billing codes to specific tasks, and design and implement controls regarding the billing codes to which staff can charge time. In 2014, NRC’s Fee Billing Process Improvement Project report recommended that NRC standardize and document its fee-billing validation process, along with developing and issuing guidance for the process. In 2018, we found that NRC’s billing validation procedures for verifying the accuracy of time charged to licensees was not standardized across the regional and program offices, but NRC was planning to pilot a standardized process. Relatedly, in 2015, NRC’s OIG recommended that NRC design and implement a plan to improve its billing validation process. Similarly, in 2017, NRC’s OIG recommended that NRC implement a streamlined and consistent billing validation process and define the roles and responsibilities for billing validation staff. In 2016, NRC’s Fees Transformation Initiative recommended process improvements related to the information NRC provides to licensees through cost estimates and on invoices. In 2017, NRC’s OIG recommended that NRC create consistent, well-defined processes and reporting to calculate and explain its cost estimates. In 2018, we found that NRC had posted cost estimates for common regulatory activities to its public website. In 2018, we recommended that NRC formally communicate to licensees the availability of supplemental billing information, including biweekly reports and monthly status reports on contractor charges. Relatedly, in 2015, NRC’s OIG recommended that NRC design and implement a process to provide information regarding contractor charges on invoices that identifies the specific tasks performed and related reimbursable contractor costs. In 2018, we found that NRC intended to transition to electronic billing to address challenges some licensees were experiencing with the format and timeliness of invoices, but did not have planning documents for this transition. We recommended that NRC develop a project plan for the transition to electronic billing incorporating plans for schedule and cost, steps that involve soliciting and considering licensee feedback, and steps to assess the results of implementing electronic billing. NRC submits an annual budget justification to Congress with estimates and other information that support the policies and proposed spending decisions represented in the President’s Budget. This includes information on what NRC plans to achieve with the resources the agency requested. After Congress enacts appropriations providing NRC’s budget authority for the fiscal year, NRC allocates these appropriated funds to its offices, which obligate them to carry out the agency’s mission. Though NRC receives its funding from these congressional appropriations, the agency then collects approximately 90 percent of its budget from service and annual fees, and the fees collected are then deposited to the U.S. Treasury. NRC’s budget structure is currently grouped by programs and business lines, among other subsets. For fiscal year 2020, NRC’s two major programs are (1) Nuclear Reactor Safety and (2) Nuclear Materials and Waste Safety. Under these two programs, seven business lines relate to key regulatory groups of licensees as follows: The Nuclear Reactor Safety Program New Reactors (including Advanced Reactors) The Nuclear Materials and Waste Safety Program Spent Fuel Storage and Transportation Decommissioning and Low-Level Waste In addition to these seven programmatic business lines, there is a Corporate Support business line which encompasses agency-wide support activities, including acquisitions, administrative services, financial management, human resource management, information management, information technology, outreach, policy support, and associated training and travel. The Corporate Support business line supports all of the programmatic business lines, and Corporate Support costs are allocated across the other business lines in NRC’s budget. Over the years, GAO, NRC’s OIG, and NRC internal initiatives identified several key findings and made recommendations to improve NRC’s budgeting process, including the following: NRC’s OIG reported in 2013 and we similarly reported in 2017 that NRC’s budget justification and related systems did not align with its budget execution. NRC’s OIG recommended NRC enforce the consistent use of financial management system codes to help address this issue. Relatedly, in 2016, an NRC internal initiative identified the need to present actual obligation data in its budget justifications. In 2017, we found that NRC did not present actual obligation data in its budget justifications for fiscal years 2010 through 2017, which made it difficult for users of the budget justification—including Congress and licensees—to understand how NRC spent its appropriations. Since 2017, NRC has implemented changes to its fee-setting process in response to GAO and internal NRC findings and recommendations. Those changes have improved the fee-setting process in two main areas: (1) the clarity and consistency of terms used in fee rules, and (2) performance goals and measures for transparency and timeliness of NRC’s fee-setting process. NRC began using clear and consistent terms in its fee rules in response to GAO and internal NRC recommendations. Specifically, in 2017 we recommended that NRC clearly present information in NRC’s proposed fee rule, final fee rule, and fee work papers by defining and consistently using key terms, providing complete calculations for how fees are determined, and ensuring the accuracy of the fee rules and work papers. In addition, NRC’s Fees Transformation Initiative identified process improvements related to updating NRC’s fee rules and associated work papers. Beginning with NRC’s fiscal year 2017 proposed fee rule, NRC made the following changes: NRC provided definitions of key terms used in the calculation of its hourly-fee rate for service fees. After providing these definitions in its fee rules and workpapers for fiscal years 2017 and 2018, NRC codified these definitions in its regulations in June 2018. NRC posted fee-related spreadsheets in electronic format on its public website to supplement the proposed and final fee rules. Specifically, NRC included an additional supplemental spreadsheet with downloadable data comparing budgeted resources from the proposed fee rule to the prior year’s amounts to enhance transparency on changes from year to year. Seven of the 11 licensees we interviewed said that NRC uses clear and consistent information in its fee rule and associated work papers. One licensee said that that the language in the fee rule and work papers is difficult to follow given the finance terminology but noted that its organization has not done a thorough review of the fee rule. Another licensee said that the fee rule has a large amount of data that is easy to follow given NRC’s detailed work papers, but the licensee would like to see additional narrative information in the fee rule justifying increases or decreases to fee categories. The remaining two licensees had no comment. Additionally, one of the seven licensees who said NRC uses clear and consistent information in its fee rule also told us that determining what licensees pay for through NRC’s fees at a more detailed level is difficult because NRC does not stipulate which NRC actions are specifically recovered through service fees and which are recovered through annual fees. In 2017, we reported that NRC’s budgeting system is not designed to provide information on which budget items are recovered specifically through service fees and which are recovered through annual fees. At that time, NRC staff told us that the agency was trying to determine if its budget formulation system could be modified to address this concern. According to NRC officials, since we last reported, NRC has modified the system so that, beginning with its fiscal year 2021 budget justification, the agency can provide more detailed information for the operating reactor fee class in accordance with legislative requirements in the Nuclear Energy Innovation and Modernization Act. NRC officials said that this information will include which budgeted activities are proposed to be recovered through service fees versus through annual fees for the operating fee class. The agency has not made similar modifications to its budgeting system to provide more detailed information for the other fee classes, according to NRC officials, because NRC has prioritized making system upgrades to address legislative requirements and is only required to provide more detailed information for the operating reactor fee class, as well as because the formulation of NRC’s budget is done two years in advance of the fee rule and the information is subject to change. NRC developed performance goals and measures for the transparency and timeliness of its fee-setting process in response to a GAO recommendation and internal NRC findings and recommendations. Specifically, in 2017 we recommended that NRC develop objective, measureable, and quantifiable performance goals and measures to enhance the transparency and timeliness of NRC’s fee-setting process. NRC established three performance goals for its fee-setting process: (1) increased transparency, (2) increased equitability, and (3) increased timeliness. To meet the first two performance goals of increased transparency and equitability, NRC developed several performance measures, including implementing 80 percent of identified improvements in NRC’s Fees Transformation Initiative, holding two public outreach meetings with stakeholders on fee-setting or billing topics, and soliciting public comments on improvement activities. For NRC’s performance goal of increasing timeliness, its performance measure is to meet NRC’s planned date for issuance of the proposed and final fee rules. NRC’s goal is to issue its proposed fee rules in January and final fee rules in May of a given fiscal year. However, NRC finalizes its fee rule after it receives its annual appropriations, and according to NRC officials, NRC’s publication of the final fee rule may be delayed depending on when NRC receives its annual appropriations. Based on our review of NRC documents and interviews with agency officials, we have determined that NRC has met these performance measures. Specifically, NRC closed as implemented about 93 percent of improvements—37 of 40—NRC identified as a part of its Fees Transformation Initiative. Further, NRC has held numerous public outreach meetings on these topics since 2017 and solicited public comments, with the most recent public meeting occurring on February 13, 2019, to discuss key features of NRC’s fiscal year 2019 fee rule. For fiscal years 2017 through 2019, NRC issued its proposed fee rule in January. NRC published its final fee rules for fiscal years 2017 and 2018 in June, and published its fiscal year 2019 final fee rule in May. Since 2017, NRC has implemented changes to its billing process in response to GAO, NRC OIG, and internal NRC findings and recommendations to improve the transparency, accuracy, and timeliness of the process, but some billing information NRC provides licensees is still not transparent. NRC improved transparency by standardizing its billing codes, updating its invoices, formally communicating some supplemental billing information, and creating public cost estimates, but it has not ensured the estimates clearly define what costs are included or provided work progress information throughout the course of ongoing regulatory activities. NRC also implemented a standardized process to validate charges to licensees to improve accuracy. In addition, NRC enhanced the timeliness of its billing process by implementing an electronic billing system. NRC implemented changes to increase the transparency of its billing process in response to GAO, NRC OIG, and internal NRC findings and recommendations, in four main areas: (1) standardized billing codes, (2) updated invoices, (3) supplemental billing information, and (4) public cost estimates. NRC improved its standardized billing codes—codes that NRC staff use to record their work hours on time cards—in response to GAO findings and NRC OIG recommendations as well as NRC internal initiatives. Specifically, in 2018 we reported that NRC’s billing codes did not adequately describe work performed and did not have a consistent naming convention, which increased the risk of staff charging their time to the wrong billing codes. We reported that this, in turn, could lead to billing errors. In addition, in 2015 NRC’s OIG recommended, among other things, that NRC establish policies and procedures to centralize control of billing codes. Moreover, NRC began an initiative aimed at improving its billing process in 2013, and in 2017, NRC’s Cost Accountability and Management Project plan stated that NRC’s methods for requesting and managing billing codes place the agency at risk of collecting inaccurate data. Based on our review of NRC’s updated billing codes, the agency’s Enterprise Project Identifiers, (EPID)—umbrella codes for regulatory actions such as inspections, licensing actions, and licensing renewals— now have a consistent naming structure, and NRC has centralized control of billing codes. In particular, the EPID alpha-numerical naming structure denotes the type of regulatory work, the calendar year the work began, and includes a 4-digit number to make the code unique, among other elements. NRC also created and implemented Cost Activity Codes (CAC), which are numerical codes that capture the ways in which NRC staff spend billable time working on an EPID, including the time spent preparing and documenting an action as well as performing the direct work. In addition, NRC added controls to ensure staff charge the correct billing codes. For example, NRC management must now grant staff permission before they are able to charge these codes. Eight of the 11 licensees we interviewed said that NRC has consistently used both EPIDs and CACs after NRC revised the accounting structure. The remaining three licensees we interviewed had no comment on the revised EPIDs and CACs. NRC officials stated that while they have completed standardizing the billing codes, they are continuously working on refining them to respond to stakeholder feedback, and NRC started a working group in November 2019 to further review the codes. NRC updated the service fee invoices it sends to licensees in response to internal NRC initiatives, but it has not implemented an internal NRC recommendation to provide licensees with information on the progress of work performed on ongoing regulatory actions. As part of our prior review of NRC’s billing process, we found that NRC expected to issue updated invoices to licensees. We were unable to assess licensees’ satisfaction with the updated invoices because NRC issued them after we had completed our review. In January 2018, NRC updated the service fee invoices it sends to licensees, in response to NRC internal initiatives, to include the names of NRC staff and of contractors billing time, along with the updated EPIDs and CACs. According to our analysis of a sample of invoices from before and after January 2018, NRC has consistently made these changes to invoices. As shown in figure 3, NRC’s updated invoices provide the quarterly total of all charges for a given regulatory action as an EPID total. CACs are no longer specific to a project or site and can now be reused to represent the same type of work for different EPIDs. NRC staff and contractors can charge multiple CACs to the same EPID during a given quarter. All 11 licensees we interviewed stated that the changes NRC made to the invoices were positive. Seven licensees stated that the inclusion of staff names made it easier to understand what they were being billed for, and five licensees stated that the inclusion of CACs improved NRC’s billing process. In 2016, NRC’s Fees Transformation Initiative recommended a process improvement to include information on the progress of work performed on inspection reports, but NRC ended this initiative in 2018 without making updates to the inspection reports. NRC determined that the updated information on invoices, described previously, resulted in sufficient improvements to transparency. However, two licensees we interviewed told us that including information on the progress of work performed would assist licensees with their planning and budgeting. According to our analysis of NRC documents and a licensee we interviewed, some NRC regulatory oversight actions can take several years to complete, with charges to licensees from a single action spanning multiple quarterly invoices. One licensee explained that, as a result, not having information on the progress of work performed on ongoing regulatory actions can make it more difficult to budget. This is because the licensee does not know how far NRC is in completing an activity, and NRC may invoice for a large amount of additional costs that the licensee did not anticipate. One of NRC’s program offices has a policy regarding when to communicate information on the progress of work performed on ongoing regulatory actions, but the remaining NRC program offices we spoke with do not. Specifically, the Office of Nuclear Reactor Regulation has a policy to communicate with operating reactor licensees if it anticipates significant changes to the forecasted completion date or hours billed to complete the action. Furthermore, officials in this office said that it has a practice to notify the licensee when it estimates that NRC will expend over 125 percent of the initial estimate of hours for a given regulatory action. These officials said that the office created this policy and practice to improve its communication with licensees, in support of NRC’s Principles of Good Regulation, which includes guidance on transparency. They further stated that this policy and practice benefit licensees by allowing them to better budget and plan for NRC’s work. Additionally, they benefit NRC by helping the agency to better manage its resources and workload, according to these officials. In contrast, officials from the Office of New Reactors and the Office of Nuclear Material Safety and Safeguards stated that they do not have a policy regarding communicating with licensees about the progress of work performed on ongoing regulatory actions. Furthermore, there is no agencywide policy or guidance regarding this communication. Officials from the Office of New Reactors stated that the office tracks percent completion as an internal metric, but does not communicate this information to licensees. The Office of Nuclear Material Safety and Safeguards does not track regulatory actions by percent completion. NRC officials told us that it is difficult to provide accurate estimates of work progress to licensees because NRC’s ability to meet anticipated cost and schedule estimates depends on the complexity of the NRC action. NRC’s Principles of Good Regulation and NRC’s Organizational Values list openness as a key principle and value, respectively. According to those documents, being open—that is, transparent and forthright—should guide every action NRC takes, how it performs administrative tasks, and how it interacts with stakeholders, such as licensees. Additionally, Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. According to NRC officials, NRC generally provides licensees with an estimate of the number of hours and length of time NRC anticipates it will take to complete certain regulatory actions upon beginning the action. NRC officials said that NRC project managers are in regular contact with licensees about the status of ongoing NRC activities; however, three licensees we interviewed stated that NRC’s project managers do not always communicate about the status of the regulatory action, which can make planning and budgeting more difficult. This is in part because the program offices do not each have a policy regarding when NRC should provide updates on cost and schedule. Formalizing when NRC staff are to communicate information to licensees on the progress of work performed could enhance transparency and make planning and budgeting easier for licensees, as they would have more information about when an action is expected to be completed or when it will cost more than NRC’s initial estimate. NRC formally communicated to licensees that supplemental billing information about contractor charges is available and developed guidance on how that information should be provided in response to two GAO recommendations. Specifically, we reported in 2018 that, upon request, NRC can provide information on contractor charges to licensees through a summary of work performed or a biweekly summary of charges that lists all billable activities charged during a 2-week period. NRC officials stated that the purpose of the biweekly summaries is to provide licensees with information on costs that accrued in that particular period to help licensees estimate their quarterly bill amount. We recommended that NRC formally communicate to all licensees that these two supplemental billing reports were available and how to request them, as we found that not all licensees were aware this information was available. We also recommended that NRC develop policy and guidance on what billing information related to contractor charges NRC staff could provide to licensees and how it should be provided. In January 2019, NRC formally communicated to licensees that supplemental billing information about contractor charges is available, but it has yet to formally communicate to licensees that biweekly summaries of charges are also available. Specifically, NRC created a process for licensees to request narrative information on contractor charges through a standard form, and formally communicates that process to licensees through a reference to the form on agency invoices. NRC also developed guidance on what billing information related to contractor charges NRC staff can provide to licensees, along with a process map for how to respond to licensee requests for contractor information. In contrast, while NRC has continued to provide biweekly summaries to licensees upon licensee request, the agency has not formally communicated the existence of these reports to licensees. Seven of the 11 licensees we interviewed receive the biweekly reports, and five of these licensees said the reports allow them to better track billable activity through the quarter. The remaining four licensees we interviewed were unaware that NRC can provide these reports. Agency officials stated that they do not have the capacity to provide these biweekly reports to all licensees, as the current process is manual and labor-intensive. However, NRC officials stated that they plan to create an automated process to provide these biweekly summaries as an enhancement to the agency’s electronic billing initiative. NRC plans to implement this enhancement by March 2020, according to NRC officials. NRC created and posted public cost estimates for common oversight activities to its website in response to an internal NRC recommendation, but it has not consistently updated those estimates or ensured the estimates clearly defined what costs were included. Specifically, in 2017, NRC’s Fees Transformation Steering Committee, chaired by a representative in the Office of the Chief Financial Officer, tasked NRC program officials with creating public cost estimates for common regulatory actions to increase transparency and enhance stakeholder awareness of the costs associated with activities such as site permitting, design certifications, inspections, license amendments, and license renewals. We have previously reported that licensees had identified challenges with planning for future work and budgeting to pay future costs because NRC had not provided certain information about the agency’s billable work, such as cost estimates. Beginning in September 2017, staff from several NRC program offices posted public cost estimates relating to six types of regulated entities: operating reactors, new reactors, fuel facilities, spent fuel storage and transportation, decommissioning, and uranium recovery. The cost estimates, which are based on historical expenses and are calculated using a sample of licensing and oversight actions, include the low, high, and average number of NRC staff hours billed for each action, as well as some estimates for contractor charges for certain tasks. According to agency officials, NRC does not use these estimates as part of its budgeting and fee-setting processes since these public cost estimates are a resource for identifying possible costs, but are not tailored to a site- specific NRC action. Instead, the estimates assist stakeholders with planning for the costs of future NRC work. The Fees Transformation Steering Committee created guidance that the program offices should update the estimates periodically, and NRC also posted on its public website that these estimates would be updated biennially. However, we found that, as of December 2019, NRC’s program offices had updated only two of the six estimates. When we discussed this with NRC officials at that time, the Office of the Chief Financial Officer sent out a reminder to the program offices to update their estimates by January 31, 2020. Additionally, we found that NRC program offices did not clearly define what costs—such as project management—are included across the six public cost estimates, which may limit stakeholders’ ability to understand them. For example, the cost estimate for operating reactors included “inspection support” activities and defined what types of costs are included in this category. In contrast, the cost estimate for fuel facilities included a category for “project management activities,” but did not define what types of costs are included in this category. The remaining four cost estimates did not mention project management costs, so it is unclear whether the estimates include these types of costs. According to our analysis of NRC documents and licensees we spoke with, project management costs for some NRC actions can account for about two thirds of total hours billed. Thus, increased transparency of these costs could help stakeholders—such as NRC licensees or potential applicants—better understand the full cost of NRC’s regulatory actions. The Fees Transformation Steering Committee provided high-level guidance to the program offices for developing cost estimates, but the guidance did not specify what costs to include when creating these estimates. According to NRC officials, the Committee did not provide specific guidance regarding cost estimates because activities in the cost estimates may vary based on the specific activities conducted by the program offices and it wanted the program offices to have flexibility when creating the estimates. We recognize that some activities in the cost estimates will vary based on the different activities conducted by the program office. However, certain costs, such as project management, are relevant across all cost estimates, and it is not always clear whether these costs are included. As previously discussed, NRC’s Principles of Good Regulation and NRC’s Organizational Values list openness—that is, being transparent and forthright—as a key principle and value, and it is applicable to the agency’s cost estimates. Additionally, Standards for Internal Control in the Federal Government state that management is to externally communicate the necessary quality information to achieve the entity’s objectives. By clearly defining what costs are included in its public cost estimates, NRC could enhance transparency and increase the value of these estimates as a budgeting and planning tool for stakeholders. In response to internal NRC and NRC OIG recommendations, NRC implemented a standardized process to validate charges to licensees to improve accuracy. Specifically, in 2014 NRC’s License Fee Billing Business Process Improvement report recommended that NRC standardize and document its fee-billing validation process, along with developing and issuing guidance for the process. Furthermore, in 2017 NRC’s OIG recommended that NRC implement a streamlined and consistent billing validation process and define the roles and responsibilities for billing validation staff. Reinforcing these recommendations, we reported in 2018 that NRC did not have formal guidance on validating charges and that the process varied among NRC’s program offices. At the time of our review, NRC was planning to standardize the process and establish clear roles and responsibilities for staff participating in the process. In August 2019, NRC implemented a revised process for validating time charged to licensees in order to improve the accuracy of invoices, identify billing errors in a timelier manner, and standardize billing validation throughout the agency. This revised process came out of the work of NRC’s Fee-Billing Validation Working Group, which began work in December 2017. NRC implemented several changes to standardize the process agency-wide, including creating formalized roles throughout the process, a handbook outlining the steps of the process, and an internal controls checklist for management to complete in order to certify fee- billing validation. In addition, NRC changed the frequency of the billing validation process from a quarterly to a monthly basis. NRC officials we interviewed stated that the biggest changes in the new process are the increased role of management-level personnel throughout the process and the increased frequency of the reviews. NRC enhanced the timeliness of its billing process by implementing an electronic billing system in line with a project plan the agency developed in response to a GAO recommendation. Specifically, in 2018 we reported that NRC was undertaking an initiative to transition to an electronic billing system known as eBilling, but it had not developed planning documents for the initiative. We recommended that NRC develop a project plan for eBilling that would (1) establish plans for schedule and cost, 2) involve licensees in developing system capabilities, and (3) include steps to assess the results of implementing eBilling. Based on our review of NRC’s eBilling documents, NRC implemented these recommendations as part of its planning process. For example, NRC solicited feedback about eBilling usability, organization, content, and functionality from nine licensees it selected for an eBilling pilot. NRC also established plans for schedule and cost and included metrics assessing eBilling on the timeliness of invoices, licensee participation rates, and the accuracy of invoices in its eBilling project plan. As a result, in September 2019, NRC was able to begin distributing electronic invoices through eBilling and sent all licensees receiving service fee invoices an informational brochure giving instructions for how to enroll in the program in October 2019. Six of the 11 licensees we interviewed stated that they anticipated eBilling would improve the timeliness of NRC’s billing process. Figure 4 summarizes some of the key features now available to licensees through eBilling. Since 2017, NRC has implemented changes to its budgeting process that address some but not all of its internal initiatives, prior GAO, and NRC OIG findings and recommendations in two main areas: (1) NRC’s annual budget justification, and (2) NRC’s budget formulation and budget execution systems. Annual budget justification. In 2017, we reported that NRC did not present actual obligation data in its annual budget justifications for fiscal years 2010 through 2017, and without this information, it was difficult for users of the budget justification—including Congress and licensees—to understand how NRC used its appropriations. We also reported that, in spite of an agency initiative to decrease overhead costs, NRC’s obligations for overhead—currently named Corporate Support—increased each year from fiscal year 2011 to 2015 due to increases in rent, utilities, and information technology investments, among other things. As a part of its Fees Transformation Initiative, NRC planned to include additional information on actual obligation data to better enable stakeholders to determine how NRC spent its appropriation. Starting with fiscal year 2018, NRC began presenting actual obligation data in its annual budget justification. NRC data show that the agency had about a 4 percent decrease in actual obligations for Corporate Support from fiscal year 2016 to fiscal year 2019, from $302.9 million to $291.2 million, as shown in table 1. These reductions were a result of NRC’s corporate workload reductions to reflect efficiencies as well as current and projected declines in agency workload, among other things. However, actual obligations for Corporate Support as a percentage of NRC’s total agency-wide obligations increased by about 2.3 percent during this same time period. Specifically, in fiscal year 2016, Corporate Support was about 30.4 percent of total NRC obligations ($302.9 million of $996.6 million), whereas in fiscal year 2019, Corporate Support was about 32.7 percent of total NRC obligations ($291.2 million of $891.5 million). In some years, reductions in Corporate Support were offset by pay increases consistent with federal government-wide guidance and investments in information technology, among other items. In addition, NRC officials said that Corporate Support as a percentage of NRC’s total obligations increased because program resources decreased as NRC’s projected workload declined. In addition to presenting actual obligation data in its annual budget justification, NRC began presenting more detailed information on the status of funds it carried over from previous fiscal years starting in its fiscal year 2018 budget justification. Specifically, NRC began reporting the amounts of carryover funds that were allocated in a given fiscal year and the amounts of these funds available for obligation at the beginning of a fiscal year, as shown in table 2. According to NRC officials, the agency generally allocates carryover funds based on (1) congressional direction to use carryover funds to supplement annual appropriations, and (2) the agency’s discretion in order to address urgent mission needs. In its fiscal year 2018 and 2019 budget justifications, NRC presented this carryover data by appropriation funding category, while it presented the rest of the information in its budget justification by the agency’s business lines. According to NRC officials, the difference in presentation limited the ability of users of the budget justification to understand where these carryover funds were being allocated. In response, in its fiscal year 2020 budget justification, NRC began presenting data on its congressionally- directed carryover funds using the same business lines it used to present the rest of the information in its budget justification. However, NRC did not present its discretionary use of carryover using those business lines. NRC officials told us that they started an initiative to enhance NRC’s carryover tracking process, and that NRC will continue to refine how the agency presents carryover data in future budget justifications. In addition to presenting data in its annual budget justification, NRC included additional information in its budget justifications to increase transparency, in response to NRC’s Fees Transformation Initiative. For example, in its fiscal year 2018 budget justification, NRC included a crosswalk of business lines’ allocation to NRC’s nine fee classes with the goal of helping licensees understand how NRC’s planned workload in its budget formulation impacts licensees’ fees. Budget formulation and execution system. NRC’s OIG reported in 2013 that NRC’s budget formulation process did not align with its budget execution process, and we similarly reported in 2017 that these processes were not aligned from fiscal years 2010 through 2015. NRC used two different systems—one to formulate its budget and another to execute its budget through obligation of funds. The two systems differed in that they used different account structures for NRC’s personnel and other costs. Specifically in 2013, NRC’s OIG found that NRC’s budget formulation and execution processes were not aligned, recommending NRC enforce the use of financial management system codes. In 2017, we reported that there were no specific requirements for an agency’s budget formulation process to align with its execution process, but without this information, it was difficult to track how NRC used its funds in relation to its budget authority. According to NRC officials, the agency has prioritized making system upgrades to address new legislative requirements in the Nuclear Energy Innovation and Modernization Act before fully addressing other challenges with the systems. However, as of December 2019, officials told us that NRC recently began the planning phase of work to address these system challenges, and that NRC plans to implement system upgrades in fiscal year 2020, with a tentative completion date in fiscal year 2021. Furthermore, in a 2017 letter to NRC’s OIG, NRC noted that it had begun updating its systems to address NRC OIG’s 2013 recommendation on financial management system codes. However, the system modifications did not accomplish the entire task, and NRC has established a monthly process to manually reconcile the codes between the two systems while NRC further updates its systems to meet NRC OIG’s recommendation. Since 2017, NRC has made a number of changes to its fee-setting, billing, and budgeting processes in response to GAO, NRC OIG, and internal NRC findings and recommendations, and those changes have improved those processes and addressed some challenges previously raised by licensees. However, additional steps could further enhance NRC’s efforts to improve its billing process. First, NRC program offices do not consistently provide information on the progress of work performed on ongoing regulatory actions. By developing guidance about when NRC staff are to communicate information to licensees on the progress of work performed, NRC could enhance transparency and facilitate planning and budgeting, as licensees would have more information about when an action is expected to be completed or will cost more than NRC’s initial estimate. Second, NRC program offices do not clearly define what costs are included across their public cost estimates for common oversight activities. By doing so, NRC could enhance transparency and increase the value of these estimates as a budgeting and planning tool for stakeholders, consistent with NRC’s Principles of Good Regulation. We are making the following two recommendations to NRC: The Executive Director for Operations of NRC should ensure relevant NRC program offices develop policy and guidance for when to communicate information on work progress to licensees, such as through communications to licensees at specified timeframes or thresholds. (Recommendation 1) The Chief Financial Officer of NRC should, in consultation with NRC program offices, develop guidance to ensure NRC staff clearly define what costs—such as project management—are included in its public cost estimates. (Recommendation 2) We provided a draft of this report to NRC for review and comment. In its comments, reproduced in appendix I, NRC neither agreed nor disagreed with our recommendations but did describe actions that it intends to take in response to our recommendations. NRC stated that it will review its current practice of providing information on work progress to licensees and develop or revise any policy and guidance where necessary. NRC also stated that it will review its current web-based cost estimates to determine if changes are necessary and implement those changes as appropriate. Although further review of NRC’s practices on providing work progress information to licensees and cost estimates could be worthwhile, we believe our review sufficiently demonstrated that by taking additional steps, NRC could further enhance transparency and facilitate planning and budgeting for licensees. As a result, we continue to believe that implementing our recommendations on work progress and cost estimates could further improve NRC’s processes. NRC also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Chairman of NRC, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, David Marroni (Assistant Director), Margaret Childs (Analyst-in-Charge), and Jon Muchin made key contributions to this report. Kevin Bray, Cindy Gilbert, Jessica Lemke, Susan Murphy, Dan Royer, Sheryl Stein, and Doris Yanger made additional contributions.", "summary": "NRC regulates the commercial nuclear industry. In that role, the agency provides services for regulated entities that hold licenses—that is, licensees. NRC recovers the majority of costs for these services by setting fee rates and using those rates to bill licensees. In 2017 and 2018, GAO recommended actions to improve NRC's fee-setting, billing, and budgeting processes, and NRC OIG and internal agency initiatives recommended additional actions. However, industry stakeholders continue to identify challenges with these processes. GAO was asked to review NRC's (1) fee-setting, (2) billing, and (3) budgeting processes. This report examines NRC's progress since 2017 implementing changes to those processes in response to GAO, NRC OIG, and internal agency findings and recommendations. GAO identified relevant GAO, NRC OIG, and internal agency recommendations and evaluated NRC's progress implementing those using evidence such as NRC's fee rules and budget documentation. GAO also spoke with NRC officials and interviewed a non-generalizable sample of NRC licensees, who were selected based on the amount of fees NRC charged them from fiscal years 2014 through 2018. Since 2017, the Nuclear Regulatory Commission (NRC) has implemented changes to its fee-setting, billing, and budgeting processes in response to GAO, the NRC Office of Inspector General (OIG), and internal agency findings and recommendations: Fee-Setting . NRC has improved the clarity, consistency, and transparency of its fee-setting process by, among other things, defining key terms used in the calculation of its hourly-fee rate and by developing and meeting performance measures for the transparency and timeliness of the fee-setting process. Second, NRC did not clearly define what costs are included across all its public cost estimates for common regulatory actions. NRC created the estimates as a transparency measure to assist stakeholders—including licensees and potential applicants—with planning for the costs of future NRC oversight activities. However, NRC did not specify what costs are included across these cost estimates, such as those related to project management. According to GAO's analysis of NRC documents, such costs for some NRC actions can account for about two thirds of total hours billed. By clearly defining the costs in its public cost estimates, NRC could enhance transparency and increase the value of the estimates as a budgeting and planning tool for stakeholders, in accordance with NRC's Principles of Good Regulation . Budgeting . NRC has made some changes to its budgeting process to better enable stakeholders to determine how it spent its appropriation. For example, starting in fiscal year 2018, NRC began presenting actual obligation data and more detailed information on the status of funds it carried over from prior fiscal years in its annual budget justification. GAO recommends that NRC (1) develop guidance on when to communicate work progress information to licensees, and (2) ensure costs are clearly defined in its public cost estimates. NRC neither agreed nor disagreed but plans to review these processes. GAO believes its report supports implementation of these recommendations.", "document_type": "gao"}
{"report": "Within CBP, Border Patrol is responsible for securing U.S. borders and apprehending individuals arriving at the border between ports of entry. Also within CBP, OFO is responsible for inspecting travelers and cargo seeking to enter the United States through ports of entry and encounters or apprehends individuals determined to be inadmissible to the country. Upon apprehension of individuals at or between ports of entry, Border Patrol agents and OFO officers generally decide whether to (1) place apprehended adults and family units into expedited removal proceedings, or (2) initiate full immigration proceedings, according to CBP officials. If agents or officers place individuals into expedited removal proceedings, CBP will transfer them to DHS’s U.S. Immigration and Customs Enforcement (ICE) for longer-term detention (see appendix II for more information on eligibility, screening standards, and possible screening outcomes for credible and reasonable fear cases). Noncitizen adults and family units may make a fear claim in CBP custody at any point after apprehension, and during the pendency of their expedited removal proceedings in ICE custody (see appendix III for data on apprehensions of noncitizens placed into expedited removal who claimed fear of returning to their country, along with other characteristics of their cases). ICE is generally responsible for referring any fear claims to USCIS for a fear screening after individuals enter detention. If USCIS makes a negative determination and the determination is either not reviewed by an immigration judge, because the noncitizen has declined immigration judge review, or, if reviewed, is upheld by a reviewing immigration judge, ICE is then responsible for removing the person from the country. Within USCIS, the Refugee, Asylum, and International Operations Directorate (RAIO) is to provide, among other things, services for people who are fleeing oppression, persecution, or torture or facing urgent humanitarian situations. RAIO is made up of two divisions: the Asylum Division and the International and Refugee Affairs Division. USCIS’s Asylum Division is responsible for, among other responsibilities, adjudicating affirmative asylum applications—that is, claims made at the initiative of the individual who files an application for asylum with USCIS—and screening credible and reasonable fear cases. As of March 2019, USCIS had 546 asylum officers on board and eligible to screen credible and reasonable fear cases (out of 745 authorized positions). Asylum officers screen cases at the Asylum Prescreening Center in Arlington, Virginia, and eight asylum offices nationwide. USCIS established the Asylum Pre-Screening Center in fiscal year 2016 to provide additional support for the credible and reasonable fear caseload. As of April 2019, the Asylum Pre-Screening Center and the Arlington asylum office together had jurisdiction over 27 ICE detention centers across the United States. EOIR is responsible for conducting immigration court proceedings, appellate reviews, and administrative hearings to fairly, expeditiously, and uniformly administer and interpret U.S. immigration laws and regulations. As of September 30, 2019, 442 immigration judges presided over EOIR’s 63 immigration courts nationwide. In addition to removal proceedings, immigration judges also conduct certain other types of hearings, such as the review of negative credible fear determinations. Table 1 provides additional information about DHS’s and DOJ’s roles in the credible and reasonable fear processes. In July 2019, USCIS made several changes to its credible fear screening processes in response to an interim final rule implementing a new mandatory bar to asylum, known as the “third country transit bar.” Under the interim final rule, noncitizens who enter, attempt to enter, or arrive in the United States across the southern land border on or after July 16, 2019, after transiting through at least one country outside their country of citizenship, nationality, or last lawful habitual residence en route to the United States, must be found ineligible for asylum unless they demonstrate that they fall under an exception to the third country transit bar. As shown in table 2, USCIS’s credible and reasonable fear caseloads nearly doubled from fiscal year 2014 (over 56,000 referrals to USCIS) to fiscal year 2018 (almost 109,000 referrals)—the most recent full year of USCIS data available at the time of our analysis. From fiscal year 2014 through the first two quarters of fiscal year 2019, referrals to USCIS for credible fear screenings comprised about 89 percent of all credible and reasonable fear referrals. The number of referrals for credible fear screenings in the first two quarters of fiscal year 2019 alone was larger than the total number of referrals in each of fiscal years 2014 and 2015. Referrals for reasonable fear screenings also increased from fiscal years 2014 to 2018, and comprised between 9 and 15 percent of all referrals during that time period. Appendix III contains additional information on the characteristics of credible and reasonable fear applicants from fiscal year 2014 through March 2019. As shown in figure 1, USCIS asylum officers made positive determinations in about 71 percent of all credible and reasonable fear screenings between fiscal years 2014 and the first two quarters of fiscal year 2019. The remaining credible and reasonable fear screenings were almost evenly divided between negative determinations and administrative closures (approximately 14 percent each) with a small remainder of screenings pending resolution (0.1 percent). Individually, from fiscal year 2014 through the first 2 quarters of fiscal year 2019, USCIS asylum officers made positive determinations in nearly 77 percent of all credible fear screenings; officers made positive determinations in about 30 percent of reasonable fear screenings. Regarding credible fear screenings specifically, the percentage of positive determinations ranged from about 73 to 80 percent of total credible fear cases completed each year from fiscal year 2014 through the first two quarters of fiscal year 2019 (see fig. 2). Regarding reasonable fear screenings, as shown in figure 3, outcomes for reasonable fear cases from fiscal year 2014 through the first two quarters of fiscal year 2019 were generally split evenly each year among positive determinations (from 28 to 32 percent), negative determinations (from 29 to 35 percent), and administrative closures (from 35 to 42 percent). EOIR’s credible and reasonable fear workload increased by about 16 percent—from about 8,100 reviews to about 9,400 reviews each year— between fiscal year 2014 and fiscal year 2018. According to EOIR data, from fiscal year 2014 through the third quarter of 2019 (the most recent data available at the time of our analysis), EOIR’s immigration judges, at the noncitizens’ requests, reviewed about 55,000 cases in which USCIS asylum officers made a negative credible or reasonable fear determination (see figure 4). Approximately 10 percent of these reviews were for individuals detained at the Karnes, Dilley, or Berks family residential centers. As shown in figure 4, immigration judges upheld USCIS’s negative credible and reasonable fear determinations in 77 percent of all reviews judges conducted from fiscal year 2014 through the third quarter of fiscal year 2019. During this time period, immigration judges vacated (or overturned) 22 percent of USCIS’s negative determinations—meaning, judges found that those individuals had a credible or reasonable fear, as appropriate. As a result, individuals found to have a credible fear were to be placed in full removal proceedings and individuals found to have a reasonable fear were to be placed into more limited removal proceedings to consider the applicants’ eligibility for withholding of removal or deferral of removal. Immigration judges upheld 45 percent of USCIS’s negative determinations and vacated 54 percent of USCIS’s negative determinations for individuals in ICE’s Dilley, Karnes, or Berks family residential centers. In addition, EOIR publicly reports data on the outcomes of removal cases across immigration courts that originated with a positive credible fear determination. EOIR reported that, from fiscal years 2014 through March 2019, immigration judges completed about 135,000 cases that began with a positive credible fear determination. Individuals in about 75,800 of the completed removal cases filed applications for asylum (56 percent). In about 59,200 of the completed removal cases (44 percent), individuals did not file an asylum application. However, as previously described, individuals who have received positive credible fear determinations may apply for other forms of relief or protection besides asylum, such as withholding of removal, and those applications are not represented in the statistics on EOIR’s website. Further, EOIR officials told us that, for data reporting purposes, each member of a family who receives a Notice to Appear before an immigration judge is counted as one EOIR removal case and each removal case may or may not include an asylum application. However, for a number of immigration applications before the court, including asylum and the related screening for credible fear, a spouse or child (defined as an unmarried natural or legally adopted child under 21 years of age) may be included as a dependent on a principal’s application and derive lawful immigration status from the principal applicant if the application is granted. As previously discussed, individuals detained in family residential centers—including individuals who could be eligible dependents for credible fear screening and asylum application purposes—comprise a substantial proportion of those who receive positive credible fear determinations. As such, according to EOIR officials, each family member would not be expected to file a separate asylum application. For example, a mother and her two children whose removal cases originated with a positive credible fear screening would comprise three removal cases in EOIR’s publically reported data, but it is likely that only the mother’s case would include an application for asylum, with her children as dependents on that application. For those removal cases in which the noncitizen applied for asylum, immigration judges granted asylum in about 19,300 cases (25 percent of the 75,800 completed removal cases with an asylum application). USCIS has developed various policies and procedures related to managing and overseeing credible and reasonable fear cases in accordance with the regulations governing credible and reasonable fear screenings, including setting requirements for interview procedures, background and security checks, and supervisory review. In particular, USCIS has a Credible Fear Procedures Manual and a Reasonable Fear Procedures Manual that outline the procedures officers are to follow in screening these cases. Interview procedures. As of July 2019, an asylum office is to wait a minimum of one full calendar day from the applicant’s arrival at an ICE detention facility before conducting a credible fear interview; an asylum office is to wait 48 hours after an initial orientation on the reasonable fear process before a reasonable fear interview, according to USCIS policy. However, both credible and reasonable fear interviews generally occur at least 48 hours after the applicant’s arrival at a detention facility, according to USCIS officials. Asylum officers may conduct credible and reasonable fear interviews either in-person or on the phone. Asylum officers are to arrange the assistance of an interpreter, generally connected over the phone, if the applicant is unable to proceed effectively in English pursuant to regulation. Asylum officers are to verify and document that applicants have received and understood information regarding the credible or reasonable fear process before they begin asking substantive questions during the interview about the applicant’s claim. According to USCIS documents and officials, during the interview, asylum officers are to elicit all information relevant to a credible or reasonable fear claim, and regulation requires they conduct interviews in a non- adversarial manner. For example, asylum officers are to ask applicants questions to determine whether they can establish a credible or reasonable fear of persecution based on their race, religion, nationality, membership in a particular social group, or political opinion. In addition, asylum officers are to ask applicants questions to determine whether they can establish a credible or reasonable fear of torture if returned to their home country. During our observations of in-person and telephone interviews, we observed asylum officers asking questions to ensure they fully explored any aspect of the claim related to a protected ground that could result in a positive determination. For example, we observed asylum officers asking applicants separate questions about each protected ground, even if the applicant had not previously expressed they were harmed because of their political beliefs or race. USCIS policy notes the applicant’s credibility is dependent on various factors such as comparing information provided during the interview with that previously provided in the applicant’s sworn statement to Border Patrol or OFO when initially apprehended. If asylum officers identify an issue with the applicant’s credibility, they are to inform the applicant of the concerns and ask the applicant for his or her perspectives. During our site visits, we observed asylum officers questioning applicants on inconsistencies, in a non-adversarial manner, between information provided during the interview as compared to the applicant’s sworn statements to Border Patrol agents upon apprehension. At the end of the interview, asylum officers are to provide a verbal summary of the material facts of the applicant’s claim, and provide an opportunity for the applicant to make any corrections or additions. We observed asylum officers providing such summaries in all but one of the interviews that we observed in full. According to USCIS policy, asylum officers are to record key information about the applicant’s claim, as well as specific details of the determination, on required forms that serve as the official record of the credible or reasonable fear screening. In addition, asylum officers use a “checklist” to record more detailed legal analysis related to the applicant’s claim. Asylum officers also generally type notes during interviews in a question and answer format, capturing each question and follow-up question they ask, and each response the applicant provides. We observed asylum officers documenting interviews in this way during all of the interviews where we observed the asylum officer in person. Background and security checks. USCIS policy requires asylum officers to ensure certain background and security checks are conducted. If security checks or information discovered during the interview raises concerns related to fraud, public safety, or national security, asylum officers are to refer the case to USCIS’s Fraud Detection and National Security Directorate (FDNS) for assistance. FDNS officials told us the short time frames in the credible and reasonable fear process, among other factors, make direct involvement in individual cases less likely than in other caseloads at USCIS, such as affirmative asylum cases. As such, the scope and extent of FDNS investigations into credible and reasonable fear cases is limited relative to other USCIS caseloads. FDNS data indicate that asylum officers referred approximately 1,400 total credible and reasonable fear cases to FDNS between fiscal years 2017 and 2018. Of those, 13 cases resulted in a formal finding, called a Statement of Finding. FDNS officials told us referrals from asylum officers on credible and reasonable fear cases typically result in FDNS conducting research related to an applicant’s criminal history or travel patterns. FDNS may refer this information, in turn, to ICE to reference in the applicant’s removal proceedings, as appropriate. In contrast, according to FDNS officials, a fraud referral in the affirmative asylum context may result in a more formal finding of fraud in a Statement of Finding. Supervisory review. USCIS oversight of credible and reasonable fear cases includes a required supervisory review of each case after an asylum officer makes a positive or negative determination. USCIS officials said supervisors are to review cases for legal sufficiency and accuracy, including a review of the screening checklist and the asylum officer’s supporting interview notes. According to officials, supervisors are to communicate the results of their review to the asylum officer informally (e.g., via email or in-person discussion) for small issues, such as an administrative error, or through a formal write-up for larger issues, such as if the asylum officer’s legal analysis was insufficient and requires a second interview with the applicant. USCIS oversight of credible and reasonable fear cases includes basic training for new asylum officers and ongoing training for incumbent officers at asylum offices; these trainings include information specific to credible fear and reasonable fear screenings. As of the time of our review, the initial training program for asylum officers is comprised of two main components: Distance Training. New asylum officers participate in 3 weeks of self- paced RAIO Directorate and Asylum Division distance training in their respective asylum offices. During distance training, asylum officers are expected to participate in webinars, read the training materials and complete exercises and quizzes in preparation for residential training. The Asylum Division distance training includes course readings on credible and reasonable fear, and observations of credible and reasonable fear interviews. Residential Basic Training. Asylum officers participate in a 6-week residential basic training program, which includes 3 weeks of training in issue areas common across USCIS’s Refugees, Asylum, and International Operations Directorate, as well as three weeks of Asylum Division-specific training. In the first 3-week session, courses include classroom instruction, practical exercises, and interviewing exercises on a variety of topics and skills relevant to multiple areas of USCIS’s work, such as on affirmative asylum and refugee adjudications. The legal topics and skills covered in this initial training include eligibility for asylum, an applicant’s nexus to protected grounds, and eliciting testimony, among others. The second 3-week session focuses on division-specific policy, procedure, and law related to asylum adjudications and screenings. For example, the 3-week session includes training on the affirmative asylum process, and multiple mock affirmative asylum interviews, among others, as well as 2 days of training specific to credible and reasonable fear cases. These 2 days include practical exercises; one mock credible fear interview exercise; and formal presentations on interviewing skills and security checks in a credible fear context, forms required for credible and reasonable fear, and on the Convention against Torture. At the end of the 6-week residential training course, new asylum officers must pass final exams with a score of at least 70 percent. We reviewed a version of the exam and found that it included questions specific to credible and reasonable fear screenings. Asylum Division officials said the 9 combined weeks of distance and residential basic training constitute the minimum amount of formal training required for asylum officers to effectively screen credible and reasonable fear cases. However, Asylum Division officials said it is important for individual asylum offices to provide additional, on-the-job training to new officers assigned to screen credible and reasonable fear cases, specifically. Asylum officers screen credible and reasonable fear cases under shorter time frames and with less corroborating documentation compared to affirmative asylum cases. As such, Asylum Division officials told us that officers accustomed to adjudicating affirmative asylum cases may need to adjust to the shorter time frames required in credible and reasonable fear cases. For example, some asylum offices have developed formal presentations on local policies and procedures, or provide officers with an opportunity to observe other officers conducting credible or reasonable fear interviews and gradually increase the number of cases they screen per day. Given their caseloads, the Houston and Arlington asylum offices provide 3 and 4 weeks of additional credible and reasonable fear training for new asylum officers, respectively. By comparison, the San Francisco and Newark asylum offices provide 1 week of training on credible and reasonable fear procedures for new asylum officers and Los Angeles provides 2 days of such training, according to officials. For incumbent asylum officers, USCIS policy requires asylum offices to allocate four hours per week for formal or informal training. The training can range from classroom instruction by a training officer, to individual study time that asylum officers can use to review case law, research country conditions affecting asylum applicants, or read new USCIS procedures and guidance. Individual asylum offices design their weekly training programs based on the types of cases their office generally receives, according to Asylum Division officials. The Asylum Division requires training officers to track the date and topic of each weekly training session and report that information to Asylum Division headquarters on a quarterly basis. Our analysis of fiscal year 2018 quarterly training reports for all asylum offices and sub-offices indicates that offices with larger credible and reasonable fear caseloads generally provided more weekly trainings on these topics. For example, Houston and Arlington conducted seven or more weekly training sessions on credible and reasonable fear screenings in fiscal year 2018. By comparison, two offices with smaller credible and reasonable fear caseloads—Newark and New York—conducted one or fewer weekly sessions on credible and reasonable fear (see app. III for credible and reasonable fear workload data by asylum office). In addition to this training program for asylum officers, USCIS trains officers from outside the Asylum Division to screen credible and reasonable fear cases, including refugee officers and others. Refugee officers receive some of the same basic training as asylum officers, as they participate in the same RAIO distance training and RAIO Directorate residential training. Refugee officers do not participate in Asylum Division distance training or residential training. As a result, USCIS provides refugee officers with 3 days of training on screening credible fear cases before they can begin screening cases. We reviewed training materials for the refugee officer training, and found the sessions are similar to Asylum Division residential training sessions on credible fear screening. In addition, some materials provide information and guidance on the differences between adjudicating refugee cases and screening credible fear cases. Officials said refugee officers generally screen credible fear cases, including at the family residential centers, only if they are detailed to the Houston and Arlington asylum offices. Both Houston and Arlington provide refugee officers detailed to their offices with 1-2 weeks of additional training on credible fear screening, similar to the procedural training they provide to new asylum officers. At both offices, trainings include formal presentations or exercises on legal concepts and procedures specific to credible fear, credible fear interview observations, and a gradual increase in the number of cases refugee officers screen each day. Although all new asylum officers receive basic training on the credible and reasonable fear screening process and may also receive on-the-job training in their home offices, not all offices provide additional pre- departure training to asylum officers before they begin screening cases for family units at ICE family residential centers. Credible fear screenings at ICE’s family residential centers, in particular, represent a significant percentage—about 34 percent—of all credible fear cases asylum officers screened from fiscal year 2014 though the second quarter of fiscal year 2019. As discussed previously, asylum offices with relatively small credible and reasonable fear local caseloads generally provide less on- the-job training throughout the year on credible and reasonable fear. However, almost all asylum offices send officers to the family residential centers in Texas for in-person interviews, including those offices with small credible and reasonable fear caseloads at the local level. Asylum Division officials said they require asylum offices to send a specific number of asylum officers—a number in proportion to the size of the office—with the largest offices sending the most officers to the family residential centers each year. For example, in fiscal year 2018, Newark, Los Angeles, Houston, and Chicago sent the most officers to the family residential centers, as shown in figure 5 below. At least two asylum offices provide pre-departure training to asylum officers being sent to ICE’s family residential centers. To support officers who are more accustomed to adjudicating affirmative asylum cases, the Los Angeles asylum office provides pre-departure training for officers before they travel to the family residential centers. In Los Angeles, officers observe credible and reasonable fear interviews and gradually increase to a full caseload of credible or reasonable fear cases at their home office, according to officials. In San Francisco, officers receive pre- departure training highlighting procedures unique to the family residential centers or to processing family units in credible and reasonable fear. Specifically, San Francisco pre-departure training includes a formal presentation on family residential center procedures, including discussion of challenges officers may experience, according to officials. By comparison, officials from the Chicago and New York offices told us they do not provide formal pre-departure training but rather direct or recommend that officers review Asylum Division guidance and procedures on family processing independently before they travel. Officials from two other offices told us they rely on the training asylum officers may receive throughout the year related to credible and reasonable fear, which can vary, as previously discussed. Asylum officers also noted inconsistent pre-departure training prior to their temporary duty during our February 2019 visits to two Texas family residential centers in Dilley and Karnes. For example, some asylum officers we interviewed said they screened credible and reasonable fear cases at their home office in preparation for their assignment. Others said they reviewed procedures independently on family processing in credible and reasonable fear cases. Officers from one asylum office said they relied primarily on an email from USCIS support staff located at the family residential centers to learn about screening family cases. Asylum officers are to review the procedures on family processing in credible and reasonable fear before they arrive at the family residential centers, according to officials. However, there is no minimum amount of pre-departure training, or required content for such training, that all asylum offices are to provide before officers begin screening family units. Asylum Division officials acknowledged that training on screening of family units for credible and reasonable fear varies by asylum office and noted that offices have been given discretion to determine what, if any, pre-departure training to provide on screening family units. Arlington and Houston asylum office officials stated that inconsistent asylum officer training on credible and reasonable fear cases negatively impacts efficiency at the family residential centers. Specifically, these officials noted that asylum officers who typically adjudicate affirmative asylum applications benefit from training on key differences between credible fear, reasonable fear, and affirmative asylum. For example, officials said more training could reduce administrative errors in applicants’ paperwork, and changes needed during supervisory review, both of which occur more often for officers with less experience and training, according to officials. Further, officials said asylum officers less experienced in credible and reasonable fear may not be able to handle a full caseload at the family residential centers when they first arrive. As a result, Houston officials said they may spend the first week of a 2-week assignment providing additional support to inexperienced officers as they gradually increase to a full caseload. Standards for Internal Control in the Federal Government states management should demonstrate a commitment to recruit, develop, and retain competent individuals. The standards also note that competence is the qualification to carry out assigned responsibilities, and requires relevant knowledge, skills, and abilities, which are gained largely from professional experience, training, and certifications. As previously noted, Asylum Division officials told us additional training for asylum officers before they begin screening cases at the family residential centers is important. Officials also said their intention is to balance such training against the need for rapid deployment, in some cases. Although additional training may not be feasible before every deployment, providing asylum officers additional pre-departure training before they begin screening credible and reasonable fear cases for family units would better prepare officers and help ensure efficient and effective case processing at ICE’s family residential centers. USCIS relies primarily on two quality assurance reviews for assessing quality of credible and reasonable fear cases, but does not document the results of one of these reviews in a consistent manner. Annual, Asylum Division-wide reviews. The Asylum Division conducts division-wide quality assurance reviews on a random sampling of credible fear, reasonable fear, or affirmative asylum cases selected proportionally from asylum offices nationwide. To do so, the Asylum Division works in collaboration with the RAIO Directorate. The reviews occur each year, and rotate between a sampling of credible fear cases, reasonable fear cases, and affirmative asylum cases. For credible and reasonable fear reviews, USCIS randomly selects a specified number of cases after supervisory review, but before officers serve determinations to the applicant. Reviewers use a checklist to identify and track quality issues arising in each reviewed case, such as accurate data entry, appropriate legal analysis, asylum officer notes that reflect a skilled interview, and others. The review process for each case includes two lines of review. If the two reviewers come to different conclusions, they discuss any differences in their reviews and reach consensus about how to score the case. USCIS records the results of these reviews in a document that lays out the numbers and percentages of errors in areas covered in the review checklist. For example, for the 2018 review of credible fear cases, the document states asylum officer notes did not reflect a skilled interview in an estimated 58 percent of cases. For most of these cases, the reason for the error that reviewers noted was insufficient follow-up questions. USCIS officials said while the sample across asylum offices is generalizable with respect to the credible or reasonable fear caseloads nationwide, the samples taken from each asylum office are not large enough to draw conclusions about trends at individual asylum offices. Officials said they rely on periodic reviews to identify trends by asylum office. Periodic, asylum office reviews. In addition to the Asylum Division-wide quality assurance reviews, the Asylum Division began conducting periodic reviews at asylum offices in November 2017. As of November 2019, the Asylum Division had conducted periodic reviews of credible and reasonable fear cases or affirmative asylum adjudications at some asylum offices, as well as a review of credible and reasonable fear cases at the family residential centers. For periodic reviews, the Asylum Division selects cases over a period of several weeks. For example, based on the Asylum Division’s draft standard operating procedures for the periodic reviews, an asylum office may send two to four credible and reasonable fear cases every day for several weeks to reach the required total number of cases. According to the draft standard operating procedures, Asylum Division reviewers are to use a reviewer checklist, modeled off the checklist used for the Asylum Division-wide reviews, as a starting point for what factors to review. However, USCIS does not document the results of the periodic reviews in a consistent manner. We reviewed the reports resulting from six periodic reviews conducted at the Arlington, Chicago, Miami, and Houston asylum offices, the New Orleans sub-office, and the family residential centers. We found that all reports included information on strengths and weaknesses, and some reports further organized analysis into additional categories. For example, some reports had analysis on details related to procedures, eliciting testimony, and issues related to fraud detection and national security. Other reports included analysis of specific trends in persecution cases and in Convention against Torture cases. Some reports also included analysis on legal sufficiency, applicant country of origin, determination outcomes, and others. According to the draft standard operating procedure, reviewers are to note trends, common errors, and collect samples to create a deliverable, such as a short report or other deliverables, for the asylum office at the end of the review. However, the Asylum Division has not provided guidance on what specific information is important to include in reports resulting from periodic reviews in order to track trends within an asylum office over time, or across asylum offices. Standards for Internal Control in the Federal Government states management should establish and operate monitoring activities to oversee the internal control system and evaluate the results. Management should document the results of ongoing monitoring and separate evaluations to identify internal control issues, and should use this evaluation to determine the effectiveness of the internal control system. Asylum Division officials told us the primary purpose of the periodic reviews is to collect information about current, office-specific trends, and provide timely support in the form of training sessions and other guidance. Further, the Asylum Division historically has not used the periodic reviews to compare one office to another, though they have sometimes noted issues from these reviews requiring similar guidance across multiple offices. Documenting the results of periodic reviews in a consistent manner would help the Asylum Division identify trends and provide support across asylum offices. The draft standard operating procedures for the periodic review provides general directions for reviewers to share information on trends to asylum office personnel, such as strengths, weaknesses, and other developing trends. However, the draft standard operating procedures do not specify requirements for documenting the results of these reviews. Asylum Division officials told us the periodic review standard operating procedures are in draft form, and that they may provide more specific guidance on aspects of the reviews in the future. However, officials also said they are not planning any changes or additions to the standard operating procedure as of September 2019. More specific guidance on requirements for documenting results would better position USCIS to track trends in a consistent manner for credible and reasonable fear reviews within and across asylum offices. By regulation, dependents, specifically a spouse or child, of a noncitizen (referred to as the “principal applicant”) can be included in the applicant’s credible fear determination if the dependent (1) arrived in the United States concurrently with the principal applicant, and (2) desires to be included in the principal applicant’s determination. However, any noncitizen may have his or her credible fear determination made separately, if he or she expresses such a desire. USCIS policy is to include any dependents on a principal applicant’s credible fear determination if the principal applicant receives a positive determination, resulting in both the principal applicant and any dependents being issued a Notice to Appear for full removal proceedings. For example, USCIS may process credible fear cases together for family units detained at ICE’s family residential centers, including children as dependents on a parent’s case, or issuing a Notice To Appear for the parent and children in the interest of family unity (see figure 6). We observed asylum officers at the family residential centers asking principal applicants whether they were apprehended with any family members. If yes, asylum officers asked for the names and dates of birth of those family members, and recorded the information in their typed notes. For parents who received a positive determination, we observed asylum officers including the child on the parent’s case as a dependent. Further, if a parent receives a negative credible fear determination, and his or her child receives a positive credible fear determination, USCIS may issue a Notice to Appear to the child as a positive credible fear determination and to the parent in the interest of family unity. In that case, because a parent could not be a “dependent” of a child under the regulation, USCIS policy is to use its discretion to issue a Notice to Appear to both the child receiving a positive determination and the parent he or she arrived with, in the interest of family unity, even though the parent initially received a negative determination. Issuing the parent and child a Notice to Appear places them into full removal proceedings where they can apply for multiple forms of relief or protection before an immigration judge, including asylum, rather than being expeditiously ordered removed in accordance with the expedited removal process. The exercise of this discretion to issue a Notice to Appear to both the child receiving a positive determination and the parent he or she arrived with in the interest of family unity is limited to cases in which the children are under the age of 18 because, according to the policy, family unity interests are more compelling when the child is a minor. USCIS data indicate that asylum officers screened more than 141,000 credible fear cases at ICE’s four family residential centers between fiscal years 2014 and the first two quarters of 2019 (see table 3). In addition, USCIS data indicate that positive credible fear determination rates are higher at the family residential centers—87 percent compared with the nationwide rate of 77 percent from fiscal year 2014 through the second quarter of fiscal year 2019 (see app. III for data on reasonable fear cases screened at ICE’s family residential centers). Asylum officers are to record individual case outcomes for all family members in USCIS’s automated case management system. However, Asylum Division officials said their system does not allow asylum officers to record whether an individual receives a credible fear determination as a principal applicant, dependent, or in the interest of family unity. Instead, asylum officers are to record positive determinations in the USCIS case management system for both (1) dependents on the basis of the principal applicant’s positive case, and (2) parents with negative determinations, on the basis of their child’s positive case. USCIS does record more specific information related to outcomes for family units in the family members’ individual hardcopy alien files, but this information is not readily available in an automated manner. USCIS’s case management system allows asylum officers to record family relationships—that is, officials stated that asylum officers are to record who is a principal applicant, and who is a spouse, child, parent, or sibling of the principal applicant. According to USCIS officials, asylum officers are to record a parent who receives a positive credible fear determination as the principal applicant, and record any children as a child. Further, asylum officers are to link known family members’ cases in the system, but adding a description of the family relationship is up to asylum officers’ discretion. However, the system does not allow officers to record whether an applicant’s determination stems from his or her own case, or from a family member’s case. As a result, USCIS does not maintain automated data in a readily accessible manner on outcomes for family members in a manner that indicates whether (1) an eligible family member received a positive determination as a dependent on a principal applicant’s positive case or (2) whether a parent was issued a Notice to Appear based on his or her child’s positive determination, after the parent received a negative determination. Standards for Internal Control in the Federal Government states that management should process obtained data into quality information that supports the internal control system. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Although USCIS data indicate that positive credible fear determination rates are higher at the family residential centers compared to rates of positive credible fear determinations across all detention facilities, USCIS officials stated the higher rates result from the ability to (1) include children under 18 on a parent’s positive credible fear determination, and (2) record all family members as positive in the system when USCIS uses its discretion in the interest of family unity. USCIS officials told us that systematically recording all outcomes of credible fear screenings for family members in a more complete manner would require changes to their case management system; according to Asylum Division officials, they are continually exploring options to improve the system’s capabilities. Without complete data in its case management system on all outcomes of credible fear screenings at family residential centers, USCIS is not well-positioned to report on the scope of either the agency’s policy for family members who are treated as dependents, pursuant to regulation, or USCIS’s use of discretion in the interest of family unity. USCIS manages its credible and reasonable fear workloads using national- and local-level staffing models to inform staffing allocation decisions. Specifically, USCIS has an agency-wide staffing model to allocate staff to different workload categories, including credible and reasonable fear workloads, for each upcoming fiscal year. Asylum Division headquarters officials stated they collaborate with USCIS’s Office of Performance and Quality, USCIS administrative offices, and local asylum offices to develop the national staffing model. Headquarters officials said the national staffing model is intended to allocate staff for each workload category for the upcoming fiscal year. They begin working on the staffing model in June for any given year in anticipation of resource decisions the agency will make before a new fiscal year begins, usually in September or October. According to officials, the national staffing model for credible and reasonable fear is based on historical case receipt and workload data, historical staffing data and future staffing workload forecasting data, bi-weekly reports on staffing and workload data, and observations from asylum offices submitted to headquarters, among other things. The Asylum Division also maintains staffing models that guide local staffing deployment, according to headquarters officials. Asylum offices make local staffing allocation decisions in collaboration with the Asylum Division at headquarters. Headquarters officials stated they consider several factors in allocating staff specifically for the credible and reasonable fear workloads for local asylum offices. Such factors include workload projections, available facilities and planned facilities projects, and existing workforce and vacancy levels (table 4 shows the number of asylum officers authorized and on board for each asylum office in March 2019). In addition, headquarters officials said they work with local asylum offices to review the number of credible and reasonable fear case receipts and current staffing allocations by asylum office on a daily basis. Headquarters officials stated they change staffing allocation as necessary to address changes in credible or reasonable fear case receipts. In the Houston and Arlington asylum offices, in particular, officials stated they review headquarters data on workload projections to assign personnel to the credible and reasonable fear workloads for their offices. For example, officials in the Houston office said they look at the projected credible and reasonable fear workload to determine the number of officers they may need. Houston office officials said they assign officers based on officer availability, considering factors such as leave or training schedules. Similarly, a senior official responsible for staffing in the Arlington office said they look at the projected numbers of credible and reasonable fear cases, as well as the location of the cases, to determine the target number of officers assigned to a specific workload. Once they set targets for the number of officers needed, a senior official responsible for staffing in the Arlington office said they assign personnel based on a number of factors, including officer preferences, seniority, and locations with the greatest need. Although USCIS uses national and local staffing models for determining staffing needs and allocating staff at and across field offices, senior Asylum Division officials stated that predicting future workload for credible fear cases is challenging. Moreover, headquarters officials told us that USCIS’s credible fear workload projections have been off by as much as 50 percent when comparing projected and actual credible fear workload volume in recent years. For example, the USCIS projections for credible fear cases in fiscal year 2015 were 78,485, but actual case receipts totaled 48,052. More recently in fiscal year 2018, USCIS projected 70,000 credible fear case receipts, but actual case receipts totaled 99,035. Headquarters officials stated that a variety of external factors— unpredictable changes in country conditions, and CBP and ICE decisions to either place individuals in expedited removal or issue Notices to Appear before an immigration judge—make it difficult to project this workload. Furthermore, headquarters officials stated the volume of credible fear cases can fluctuate on a weekly basis, while reasonable fear projections have been fairly accurate, since the number of reasonable fear cases has remained relatively stable in recent years. To manage its workload of credible and reasonable fear cases, USCIS relies on a flexible workforce to respond to fluctuations in cases, in addition to asylum officers who generally screen credible and reasonable fear cases. For example, USCIS pulls asylum officers from affirmative asylum adjudications and uses overtime hours to handle surges in credible and reasonable fear case receipts, according to officials. Senior Asylum Division officials stated they do not receive staffing increases to account for lost or stopped work in other workload categories, such as affirmative asylum, that result from surges in credible fear case receipts. They stated surges in credible and reasonable fear case receipts may require immediate staff redeployment from the affirmative asylum workload. As a result, asylum offices have sometimes canceled planned affirmative asylum interviews and have prioritized credible and reasonable fear screenings over affirmative asylum cases, which have significantly contributed to the current backlog in pending affirmative asylum cases, according to headquarters officials. As previously discussed, asylum offices across the country also send officers on details to ICE’s family residential centers to conduct credible and reasonable fear screenings. In addition, the Asylum Division headquarters tracks the number of asylum officers assigned to the credible and reasonable fear workload, among other workload categories such as affirmative asylum, through biweekly reports received from local asylum offices. Headquarters officials told us they use the reports to respond to specific requests for information about Asylum Division staffing allocation. For example, Congress may request information on the number of USCIS personnel working on credible fear cases for a particular time period, according to headquarters officials, so they maintain these reports to fulfill such requests. Specifically, with regard to the biweekly reports, asylum offices record the number of asylum officers assigned to credible and reasonable fear cases for each day in the 2-week pay period. The resulting biweekly reports are spreadsheets with 15 tabs, one tab for each day in a pay period and one tab summarizing the pay period, with 26 separate spreadsheets for each year per asylum office. Headquarters officials stated the biweekly reports are manually compiled and may contain errors, but the biweekly reports have historically provided the overall number of personnel performing credible and reasonable fear work for any particular date or pay period. As of October 2019, headquarters officials said they are developing automated software that will track information similar to that collected in the biweekly reports, which will allow more systematic analysis of the staffing data that the current biweekly reports contain. USCIS sets and monitors timeliness goals for completing credible and reasonable fear cases. Monitoring timeliness goals for credible fear cases. USCIS monitors credible fear processing times by setting timeliness goals for completing credible fear cases and those goals have changed over time. USCIS regulation does not require that credible fear cases be completed in a specific time frame; however, Asylum Division headquarters officials said they have used timeliness goals to help monitor their credible fear workload. In addition, case delays may occur for credible fear cases (discussed further below). Specifically, from fiscal year 2009 through the first quarter of fiscal year 2018, USCIS used a 14-day goal to monitor credible fear case processing times. In other words, USCIS monitored the extent to which officers completed credible fear cases within 14 calendar days of USCIS receiving referral documents from ICE and created an electronic file for the case in their case management system. According to our analysis, USCIS completed at least 81 percent of credible fear cases in 14 or fewer days for each fiscal year from 2014 to 2017—the last full fiscal year under the 14-day goal (see table 5). In February 2018, USCIS lowered its credible fear processing time goal to 10 days. USCIS completed 68 percent of credible fear cases in 10 or fewer days between February and September 2018. Monitoring timeliness requirements for reasonable fear cases. USCIS monitors reasonable fear processing times by setting a 10-day goal. Pursuant to regulation, asylum officers are to conduct reasonable fear interviews and make a determination within 10 days of receiving a referral from CBP or ICE with an indication that the individual has made a fear claim, absent exceptional circumstances. Additionally, a 2015 settlement agreement in the Alfaro-Garcia v. Johnson case (“Alfaro- Garcia” Settlement Agreement) requires USCIS to achieve an average national reasonable fear determination period of no more than 10 court days (i.e. business days), calculated on a monthly basis, for cases in which individuals are detained by DHS. For reasonable fear cases subject to this settlement agreement that take longer than 20 court days to complete, asylum offices are to notify the Chief of the Asylum Division in writing and provide an explanation for the delay. Further, USCIS must provide class counsel in the Alfaro-Garcia case a notice and remedial plan of action for cases that exceed 20 days that are subject to that settlement agreement. Consistent with USCIS policy and the Alfaro-Garcia settlement agreement, officers may pause the clock for reasonable fear cases— and thus case processing times—in the following limited circumstances: the applicant or the applicant’s representative requests to defer the reasonable fear interview; the applicant refuses to participate in the reasonable fear interview or accept service of a reasonable fear determination; or exceptional circumstances. USCIS pauses processing times for detained reasonable fear cases by recording the dates when the case was paused and when processing resumed, once the basis for pausing the clock no longer exists. Asylum Division headquarters officials said pauses in reasonable fear case processing times are separate from case delay reasons, but case delays may occur for reasonable fear cases. In our case processing time analysis of USCIS data, we excluded approximately 13 percent of reasonable fear cases that had at least one pause in case processing time from our analysis because, in conducting our analysis, we could not systematically confirm the appropriate order of dates for those cases. As shown in table 6, our review of USCIS data for cases that did not include pauses found that USCIS completed at least 91 percent of reasonable fear cases within 10 or fewer court days from fiscal year 2016 to the second quarter of fiscal year 2019. Although the Asylum Division monitors overall processing times for credible and reasonable fear cases, it does not collect comprehensive data in its case management system on some types of case delays. For example, USCIS tracks whether cases are delayed for certain reasons related to the individual—such as if he or she has a medical condition that prevents the asylum officer from conducting the interview, if the individual requests that the interview be rescheduled, or if the individual is detained in a remote location. In addition, USCIS’s system can track if cases are delayed for logistical or resource constraints. Specifically, asylum officers may select “lack of resources” as one case delay reason in the system. However, this field in the system does not allow officers to distinguish more specific types of delays—such as a lack of space in detention facilities for officers to screen fear cases, telephones not working properly, and other types of delays—which officers told us occur on a regular basis. Asylum officers we interviewed in the Arlington and Houston offices stated that logistical delays could affect the number of credible or reasonable fear cases they can complete each day. Specifically, some asylum officers said they have experienced delays up to 30 minutes waiting for phone lines to work properly at detention facilities. Moreover, supervisors we interviewed in the Arlington office stated telephone and interpreter delays could add 20 or 30 minutes per case, resulting in a cumulative delay that could affect an officer’s productivity for any given day. Moreover, supervisors in the Arlington office said it is challenging to identify the appropriate number of cases to assign to officers because the number depends on whether or not disruptions occur. Asylum officers in Arlington said they are expected to conduct a certain number of credible or reasonable fear screenings per day, but expectations for completing their assigned cases may be tempered by circumstances such as interpreter availability or if there are issues at the detention facility, including physical space shortfalls or difficulty in locating the individual at the facility. Similarly, asylum officers in Houston said they are expected to complete a certain number of credible or reasonable fear cases per day, but supervisors understand that they may face logistical challenges such as interpreter or telephone issues. In addition to system limitations in tracking case delay reasons, Asylum Division headquarters officials said their case management system does not have the capability to track how long case delays may last. Our analysis of USCIS data from fiscal year 2014 through the second quarter of fiscal year 2019 indicates that 21,528 credible fear cases and 6,724 reasonable fear cases had delays. USCIS’s system can calculate the number of days for each credible and reasonable fear case—in other words, the total processing time for each case—and the system can produce daily reports noting these overall processing times. However, officials in the Houston office told us they must investigate individual cases on an ad hoc basis to understand how long cases have been delayed during processing. Specifically, officials in the Houston office said they maintain weekly “late reports” using information from USCIS’s case management system that show pending credible and reasonable fear cases with the longest processing times and that they must spend time researching cases on the report to determine the length of the delays. Standards for Internal Control in the Federal Government state that management should obtain data on a timely basis so that they can be used for effective monitoring. These standards also state that management should process the obtained data into quality information that supports the internal control system. As previously discussed, USCIS’s case management system does not track specific logistical reasons for any delays in credible and reasonable fear cases, which affect the number of cases an officer can complete in a day. Furthermore, USCIS’s system can calculate the number of processing days for each credible and reasonable fear case. However, the system cannot track how long a case delay lasts. Headquarters officials said they evaluate the usefulness of their system, and consider options for improvements or changes, on an ongoing basis. However, as of October 2019, they stated they did not have plans for significant changes to the system to track more specific case delay reasons. Collecting additional information in its automated case management system on case delays would provide USCIS with more readily available information and analyzing such data could help USCIS identify case delay reasons relevant in the current environment for officers conducting fear screenings and better position USCIS to mitigate the reasons for the delays and improve efficiency in case processing. EOIR has developed processes for immigration courts and judges to help manage its workload related to credible and reasonable fear reviews. As previously discussed, in the event of a negative outcome of their credible or reasonable fear screening, noncitizens can request a review of USCIS’s negative determination by an immigration judge. The Immigration and Nationality Act, as amended, and regulation require that such reviews occur within certain time frames. Specifically, immigration judge reviews of negative credible fear determinations are to be conducted no later than 7 days after referral from USCIS, to the maximum extent practicable, and immigration judge reviews of negative reasonable fear determinations are to be conducted within 10 days of referral, in the absence of exceptional circumstances. EOIR officials told us that increased resources, beginning in fiscal year 2015, and a faster process for hiring immigration judges have allowed EOIR to increase the number of immigration judges. As of September 30, 2019, EOIR reported that it had 442 immigration judges on board, including 173 judges hired in fiscal year 2018 and fiscal year 2019. EOIR reports that the number of immigration judges has increased each year from fiscal year 2015 through fiscal year 2019. EOIR officials told us that they plan to hire an additional 100 judges in fiscal year 2020. Additionally, EOIR officials told us that they prioritize credible and reasonable fear reviews and that these reviews can generally be accommodated within EOIR’s existing resources—specifically, by finding efficiencies within judges’ existing schedules to add credible or reasonable fear review hearings or by conducting hearings via video teleconferencing (VTC). EOIR officials also said that credible and reasonable fear reviews for individuals in ICE’s family residential centers comprise a small portion of EOIR’s overall workload. According to EOIR officials, each ICE detention facility is assigned to the jurisdiction of an immigration court, and the workload for credible and reasonable fear reviews is managed locally by the court to which each detention facility is assigned. ICE officers are to initiate the immigration judge’s review by filing a request with the appropriate immigration court. Some courts are co-located with ICE detention facilities in which the detainee requesting the credible or reasonable fear review is housed. EOIR officials said that reviews in those locations are typically heard in person by immigration judges assigned to that facility, and that the court finds room in the judge’s regular calendar to hear credible and reasonable fear reviews. For individuals in detention facilities without a co-located immigration court, including ICE family residential centers, immigration judges typically conduct credible and reasonable fear reviews via VTC. Judges conducting credible or reasonable fear reviews via VTC may be located in any immigration court in the United States. According to EOIR officials, the Assistant Chief Immigration Judge for each court is responsible for managing the court’s workload, including seeking support from judges outside the court in circumstances where there are too many cases for the court’s assigned judges. EOIR officials told us that the use of VTC technology—which is available in all courtrooms—provides flexibility to the courts in balancing workloads related to credible and reasonable fear reviews, among other workloads. In addition, EOIR officials stated that judges’ credible and reasonable fear workload is impacted, in particular, by immigration enforcement priorities and USCIS credible or reasonable fear determinations. For example, if DHS places more noncitizens into expedited removal proceedings who subsequently express fear or intent to apply for asylum, EOIR’s related workload might increase. In addition, because immigration judges do not review USCIS’s positive credible fear determinations, if USCIS’s screenings result in more negative determinations, EOIR’s caseload related to credible or reasonable fear reviews might increase. As of January 2018, EOIR has performance measures that include timeliness goals for credible and reasonable fear reviews, and these timeliness goals align with the required credible and reasonable fear review time frames. However, EOIR data we reviewed indicate that about 30 percent of credible and reasonable fear reviews are not completed within the required time frames. Specifically, EOIR’s memorandum on Case Priorities and Immigration Court Performance Measures states that 100 percent of credible fear reviews should be completed within seven days of an asylum officer’s negative determination and that 100 percent of reasonable fear reviews should be completed within 10 days of the filing of a negative reasonable fear determination. Further, according to EOIR officials, courts are to assign credible and reasonable fear reviews to a judge within 48 hours of receipt of the request from ICE, and immigration judges are to complete such reviews within 24 hours after they are assigned. EOIR officials said their automated case management system maintains data on the date when courts receive a request from ICE for an immigration judge review, the date the review is assigned to a judge, and the date the review takes place. EOIR headquarters officials told us that they monitor the extent to which judges are completing reviews within 24 hours after they are assigned using an automated immigration judge performance dashboard, which allows officials to review this performance measure for all judges combined, for individual courts, or for individual judges. Further, EOIR officials told us that if courts are scheduling credible and reasonable fear reviews within 48 hours after receipt and judges are completing reviews within 24 hours after they are assigned, they expect that EOIR should be meeting the required time frames (7 days after ICE’s referral for credible fear reviews and 10 days after ICE’s referral for reasonable fear review) for conducting credible and reasonable fear reviews. EOIR data we reviewed indicate that, from fiscal year 2014 through June 2019, approximately 28 percent of credible fear and 36 percent of reasonable fear reviews exceeded the required time frames, as shown in table 7 below. As previously discussed, the Immigration and Nationality Act and regulation allow for some flexibility with regard to the required credible and reasonable fear review time frames. Specifically, credible fear reviews are to be completed within 7 days, to the maximum extent practicable, and reasonable fear reviews are to be completed within 10 days, absent exceptional circumstances. EOIR officials we spoke with said there are a variety of court, judge, or applicant-related reasons that reviews could exceed the required time frames. For example, case file documentation sent from USCIS to the court may be incomplete. Further, a detention facility may have a medical quarantine that restricts court proceedings for a certain period of time. EOIR headquarters officials told us that, as of October 2019, they review weekly reports that include the median processing times for completed credible and reasonable fear reviews. For example, according to one weekly report from October 2019, the median completion time for credible fear reviews was 7 days. These reports also include information about the average and median number of days pending per case, for those credible and reasonable fear reviews that are not complete. For example, the weekly report we reviewed from October 2019 showed that EOIR had 553 pending credible fear reviews that week, with a median of 7 days pending and an average of 18 days pending. While these weekly reports allow EOIR headquarters officials to monitor some information about their credible and reasonable fear workload, they do not provide information to EOIR officials about the proportion of EOIR’s credible and reasonable fear reviews that are completed within the required time frames, or whether any reviews are delayed for reasons within the limits set out in the law or regulation. EOIR officials said they plan to implement an automated court operations dashboard in early 2020 which is to, among other things, monitor court performance against the performance goals EOIR established in January 2018, including the credible and reasonable fear performance goals. This automated dashboard is to be similar to the immigration judge performance dashboard, which EOIR implemented in early 2019. According to EOIR, the court operations dashboard is intended to operationalize EOIR’s performance measures—including completion of 100 percent of credible fear reviews with 7 days and 100 percent of reasonable fear reviews within 10 days—by providing court staff with daily alerts and warning notices to help court administrators prioritize the scheduling of cases based on the performance measures. This prioritization, combined with EOIR’s monitoring of judge performance to ensure that credible and reasonable fear reviews are completed within 24 hours after they are scheduled, should provide EOIR officials with sufficient information to monitor EOIR’s adherence to the required credible and reasonable fear review time frames. Because implementation of the court operations dashboard is planned for early 2020, it is too soon to know if EOIR will use the dashboard to monitor adherence to the required credible and reasonable fear review time frames or if it will help EOIR understand reasons for delays in those cases that take longer than 7 or 10 days. The number of credible and reasonable fear cases has increased since fiscal year 2014, and USCIS policies and procedures require completion of those cases within short time frames. The Asylum Division provides training for credible and reasonable fear cases to new asylum officers in basic training, given the differences between these screenings and affirmative asylum adjudications. However, not all offices provide additional training on screening such cases at the family residential centers. Ensuring that all asylum offices provide such training, in addition to basic training for new officers, would better prepare them to screen those cases efficiently and effectively. In addition, USCIS relies on its periodic quality assurance reviews to assess the quality of credible and reasonable fear cases across asylum offices. Developing and implementing more specific guidance on requirements for documenting the results of its periodic quality assurance reviews would better position the agency to track trends for credible and reasonable fear reviews across asylum offices. USCIS data show that positive credible fear determination rates are higher at the family residential centers than they are nationwide, in part because USCIS’s automated case management system does not track whether an individual receives a credible fear determination as a principal applicant, dependent, or in the interest of family unity. Without systematically recording credible fear determinations involving family members, USCIS may not have complete data on credible fear determination rates, and the agency may not be in a position to report on the scope of its policy for family members in the credible fear process. Asylum officers have experienced logistical delays that can affect the number of credible and reasonable fear cases they complete each day. Although USCIS tracks some of these delays in its case management system, the system does not distinguish between specific reasons for logistical case delays, such as telephones nor working properly or lack of space at detention facilities for officers to screen cases. Furthermore, USCIS’s system can calculate the number of processing days for each credible and reasonable fear case. However, the system cannot track how long case delays last. By collecting and analyzing additional information on case delays, including specific reasons for delays and how long they last, USCIS can identify relevant case delays for officers conducting fear screenings. Moreover, analyzing specific case delay information could help USCIS mitigate reasons for case delays and improve efficiency in case processing. We are making the following four recommendations to USCIS: The Director of USCIS should ensure that, in addition to USCIS’s basic asylum officer training, all asylum offices provide pre-departure training on the credible and reasonable fear processes before their officers begin screening cases at the family residential centers. (Recommendation 1) The Director of USCIS should develop and implement more specific guidance on requirements for documenting results of Asylum Division periodic quality assurance reviews. (Recommendation 2) The Director of USCIS should ensure asylum officers systematically record in USCIS’s automated case management system if individuals receive credible fear determinations as principal applicants, dependents, or in the interest of family unity, pursuant to regulation or USCIS policy. (Recommendation 3) The Director of USCIS should collect and analyze additional information on case delays, including specific reasons for delays and how long they last, that asylum officers may face when screening credible and reasonable fear cases. (Recommendation 4) We provided a draft of this report to DHS and DOJ for review and comment. DHS provided formal, written comments, which are reproduced in full in appendix IV. DHS also provided technical comments, which we incorporated as appropriate. DOJ told us they had no comments on the draft report. DHS concurred with our recommendations and described actions planned or underway to address them. For example, regarding our recommendation that all USCIS asylum offices provide officers with pre-departure training on credible and reasonable fear before they officers begin screening cases at family residential centers, DHS stated that USCIS plans to develop a standardized pre-departure training and provide this training to all asylum officers prior to their deployment to the family residential centers. In addition, regarding our recommendation that USCIS ensure that asylum officers record in their automated case management system if individuals receive credible fear determinations as principal applicants, dependents, or in the interest of family unity, DHS noted USCIS will explore ways to modify its case management system to ensure that asylum officers record such data and train officers on any subsequent system changes. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, the Attorney General, and other interested parties. In addition, the report is available at no charge on GAO’s website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix V. We were asked to review processes for screening noncitizens who arrive at the southwest border expressing an intention to apply for asylum, a fear of persecution or torture, or a fear of return to their country, and the resources needed to carry out these screenings within applicable time frames by the Department of Homeland Security’s (DHS) U.S. Citizenship and Immigration Services (USCIS) and Department of Justice’s (DOJ) Executive Office for Immigration Review (EOIR). This report discusses (1) what USCIS and EOIR data show about the credible fear and reasonable fear processes, (2) the extent to which USCIS has policies and procedures for overseeing credible fear and reasonable fear screenings, and (3) the extent to which USCIS and EOIR have processes for managing their respective credible fear and reasonable fear-related workloads. To address all three objectives, we interviewed USCIS headquarters personnel from the Refugee, Asylum, and International Operations Directorate (RAIO) and RAIO’s Asylum Division who are responsible for managing USCIS’s credible and reasonable fear screening processes. We also interviewed officials from USCIS’s Fraud Detection and National Security Directorate (FDNS), which is responsible for leading USCIS’s efforts to detect and deter immigration benefit fraud and help detect national security and public safety threats. We conducted site visits at two of USCIS’s eight asylum offices—Houston, Texas and Arlington, Virginia—in April 2019. We selected these asylum offices based on the relatively large size of their credible and reasonable fear caseloads in fiscal year 2018—the most recent, complete data available at the time of our review. During these visits, we conducted in-person, semi-structured interviews with asylum officers, supervisory asylum officers, training officers, FDNS immigration officers, and asylum office management. During these interviews, we discussed topics related to data quality, supervisory review, training, quality assurance, family processing, and resource allocation. While the views expressed in these interviews do not represent those of all Houston and Arlington asylum office officials, they provide valuable insights from stakeholders who have experience with credible and reasonable fear policies and procedures. In addition, we collected written responses from the remaining six asylum offices on the same topics. Further, we conducted site visits to U.S. Immigration and Customs Enforcement (ICE) adult detention centers and family residential centers. Specifically, we visited single adult detention facilities in San Diego, California (September 2018), and Port Isabel and Pearsall, Texas (October 2018 and February 2019, respectively). We selected these ICE single adult facilities based on their geographic proximity to various CBP field locations we visited (discussed below). In addition, in February 2019, we visited ICE’s Enforcement and Removal Operations field office in San Antonio, Texas, as well as ICE’s South Texas Family Residential Center in Dilley, Texas, and Karnes County Residential Center in Karnes, Texas. We selected these two ICE family residential centers for field visits because they accounted for more credible and reasonable fear referrals to USCIS than any other single adult detention facility or family residential center. We also selected them to examine unique aspects of ICE and USCIS processing of credible and reasonable fear claims made by members of family units. During these visits to USCIS asylum offices and ICE detention facilities, we observed USCIS asylum officers conducting credible or reasonable fear screenings of single adults and family unit members either in person or via telephone. In total, we observed more than 20 credible and reasonable fear interviews across our site visits. Our observations are not generalizable to all USCIS asylum offices conducting credible and reasonable fear screenings, but provided us the opportunity to learn more about how USCIS personnel conduct interviews, make fear determinations, process these cases, and coordinate with ICE officials. For additional context about how noncitizens are apprehended at the border, processed into expedited or full immigration removal proceedings, transferred to ICE, and ultimately referred to USCIS for credible and reasonable fear screenings, as appropriate, we interviewed headquarters personnel from DHS’s U.S. Customs and Border Protection’s (CBP) Office of Field Operations (OFO) and U.S. Border Patrol (Border Patrol) who are responsible for apprehending noncitizens at or between U.S. ports of entry. In addition, we conducted site visits at CBP facilities in California and Texas from September 2018 to October 2018. In California, we visited Border Patrol’s San Diego sector headquarters and Imperial Beach station, and OFO’s San Ysidro port of entry. In Texas, we visited CBP’s Central Processing Center and McAllen Border Patrol station in McAllen, Texas; Border Patrol’s Fort Brown, Weslaco, and Harlingen stations; and OFO’s Hidalgo and Brownsville ports of entry. During these visits, we interviewed Border Patrol and OFO officials and observed how CBP personnel processed apprehended individuals and, as appropriate, documented whether those individuals expressed an intention to apply for asylum, a fear of persecution or torture, or a fear of return to their country. To select these locations, we assessed CBP data on Border Patrol and OFO apprehensions along the southwest border and targeted specific locations that saw the greatest increase in the number of apprehensions of individuals from fiscal year 2016 to 2017. As noted previously, we also considered the geographical proximity of multiple CBP and ICE facilities to maximize observations. Our observations during site visits are not generalizable to all Border Patrol and OFO operations along the southwest border, but provided us the opportunity to learn more about policies and procedures for processing noncitizens into removal proceedings and documenting any fear claims. To address the first objective, we obtained and analyzed data and documentation from USCIS and EOIR. Regarding USCIS, we analyzed record-level data from USCIS’s automated case management system from fiscal year 2014 through the second quarter of fiscal year 2019 (March 2019)—the most recent time period for which complete data were available at the time of our review. We analyzed these data to identify the number, characteristics, and outcomes of credible and reasonable fear cases. According to USCIS officials, USCIS’s system creates a unique number, or “case ID” for each case. USCIS officials told us that a previous system used a different identifier for each case—the individual’s Alien number (or “A-number”)—and did not use a “case ID” field. USCIS transitioned from its previous system to its current system in February 2018 and, according to USCIS officials, cases originally opened prior to the transition to the new system may have been re-opened under the same “case ID” number in the new system. As part of our data reliability testing, we checked for unique “case ID” numbers by searching for duplicate values and determined the data did not have duplicate values for “case ID” numbers. For our analysis of USCIS data specifically for ICE detention facilities and family residential centers, we only included credible and reasonable fear cases for detained individuals. To assess the reliability of USCIS data, we completed a number of steps, including (1) performing electronic testing for obvious errors in accuracy and completeness, such as running logic tests; (2) reviewing existing information about the data and the systems that produced them, such as relevant training materials for USCIS officers who use the system; and (3) discussing data entry issues and data limitations with USCIS officials. We determined the data were sufficiently reliable to describe the number, outcomes, and characteristics of credible and reasonable fear cases. Regarding EOIR, we reviewed data on immigration judge reviews of credible and reasonable fear cases posted on its public website. Specifically, we reviewed EOIR data on credible and reasonable fear reviews from fiscal year 2014 through June 2019—the most recent, complete data available at the time of our review. We also obtained and analyzed summary data from EOIR on credible and reasonable fear reviews for those individuals detained in ICE’s family residential centers. We analyzed the data to determine the outcomes of all credible and reasonable fear reviews and compared the outcomes of all reviews with the outcomes of reviews at ICE’s family residential centers. Finally, we reviewed EOIR data on the outcomes in immigration court for those completed removal cases that began with a positive credible or reasonable fear determination. In addition, we interviewed immigration judges and other court personnel serving both detained and nondetained dockets from EOIR’s Otay Mesa Immigration Court and San Diego Immigration Court in California, and from EOIR’s Harlingen Immigration Court in Texas. We also observed two immigration judge reviews of negative credible fear determinations. Our observations are not generalizable to all immigration judge reviews, but provided us the opportunity to learn more about EOIR’s processes. We interviewed EOIR officials about their data entry and management practices for credible and reasonable fear reviews. We determined that the data EOIR provided, much of which they report publicly on their website, are sufficiently reliable for analyzing the number and duration of credible and reasonable fear reviews that are received, completed, and pending. To provide additional context on the numbers, characteristics, and outcomes of CBP apprehensions, we obtained and analyzed record-level data on all apprehensions by Border Patrol and OFO from fiscal year 2014 through the second quarter of fiscal year 2019. We also obtained and analyzed record-level data on ICE detentions from fiscal year 2014 through fiscal year 2018 (see app. III for the results of our analyses). To assess the reliability of Border Patrol, OFO, and ICE data, we completed a number of data reliability steps, including (1) performing electronic testing for obvious errors in accuracy and completeness, such as running logic tests; (2) reviewing existing information about the data and systems that produced them, such as relevant training materials for Border Patrol agents and OFO, and ICE officers who use agency data systems; and (3) discussing data entry issues and data limitations with Border Patrol, OFO, and ICE officials. We also received demonstrations on the data systems from Border Patrol, OFO, and ICE officials at headquarters and in the field. As described below, we determined that the data are sufficiently reliable for providing information on the numbers, characteristics, and outcomes of CBP apprehensions and ICE detentions. Border Patrol data. For our analysis of Border Patrol data, we used “apprehensions” as our unit of analysis, instead of the number of individuals apprehended, because an individual may have been apprehended multiple times in the same year. We identified a small number of Border Patrol apprehension records that had the same date of apprehension and unique identifier (“A-number”). It is possible that these apprehension records represented one apprehended individual that Border Patrol agents processed as two apprehensions. These records comprised less than one percent of the more than 2.3 million apprehension records we analyzed. We included these apprehension records in our analysis because Border Patrol considers them unique apprehensions and because their small number did not materially affect our analysis. In addition, Border Patrol did not systematically track family relationships in its data systems until fiscal year 2016, as we have previously reported. Therefore, our analysis of Border Patrol apprehensions of family unit members processed under expedited removal proceedings is for fiscal years 2016 through the first two quarters of 2019. Further, according to Border Patrol officials, Border Patrol did not record reasonable fear cases in its automated data system before April 2016. Therefore, we are reporting the number of reasonable fear cases recorded by the Border Patrol in its automated system from fiscal year 2017 (the first full year for which Border Patrol recorded this information in its system) through the second quarter of fiscal year 2019. We did not include the 860 reasonable fear cases that Border Patrol recorded in its automated system for fiscal year 2016, since this number represents only partial-year data. According to Border Patrol officials, prior to April 2016, these reasonable fear cases would likely have been recorded under other case dispositions in their automated system, such as one indicating the reinstatement of a prior removal order. We determined that Border Patrol data are sufficiently reliable to describe the numbers and demographic characteristics of individuals and family unit members apprehended from fiscal year 2014 through the second quarter of fiscal year 2019. OFO data. For our analysis of OFO data, we used “apprehensions” as our unit of analysis, instead of the number of individuals apprehended. We excluded approximately 13 percent of all apprehension records (including single adults, unaccompanied alien children, and parents and children that arrived as part of a family unit) from our analyses because we could not confirm an A-number for those apprehensions. Among the apprehension records missing an A-number, 44 percent were cases in which OFO officers paroled the individuals and, according to OFO officials, officers are not required to assign an A-number to these individuals. In addition, 47 percent of the records with a missing A- number were cases that involved the individual withdrawing their application for admission into the United States, in which OFO officers have discretion whether to assign an A-number. According to OFO officials, additional records with missing A-numbers may be due to data entry errors or problems with the data system saving this information in the database that OFO used to pull the data. Finally, we collapsed 182,266 apprehension records into 86,597 apprehension records because we determined that they were duplicate records for the same individual and the same apprehension, based on factors such as alien number, birth date, and date and time of apprehension. As a result, we determined that we could not present precise figures for analyses that include OFO data and instead provided approximations throughout the report. We rounded all data and figures on OFO apprehensions down to the hundreds place and described relevant data using modifiers such as “at least” because of possible missing information. In addition, according to OFO officials, OFO does not capture information in its automated data system on individuals who were processed under expedited removal with a reasonable fear claim. OFO officials stated that, since OFO has historically processed a relatively small number of such apprehensions, it does not collect automated data on reasonable fear claims. With the previously-described modifications, we determined that OFO data are sufficiently reliable to generally describe the numbers and demographic characteristics of individuals and family unit members apprehended from fiscal year 2014 through the second quarter of fiscal year 2019. ICE data. To report on ICE detentions of adults and family unit members, we obtained and analyzed ICE detention data from fiscal years 2014 to 2018, the most current data available at the time of our review. The ICE data we obtained contained information on whether adults and family members booked-in to an ICE detention facility had a fear claim recorded in ICE’s data system as of the date our data were pulled. Specifically, we divided our analysis of ICE detention data into two parts. First, we obtained data on all individuals (all adults and children without consideration of any family relationships) detained from fiscal year 2014 through fiscal year 2018. Second, we obtained data specifically on family unit members apprehended by CBP and housed at the four ICE family residential centers from fiscal year 2014 through fiscal year 2018. Regarding our analysis of family unit members who made a fear claim in one of ICE’s family residential centers, we excluded less than one percent of all detention records from our analyses because we could not confirm a unique identifier for the individual. In addition, for individual family unit members who were detained more than once in a fiscal year, we included the most recent record for the individuals in our analyses to report on the most recent information available about each individual. This accounted for less than one percent of all detention records in our time period of analysis. We determined that the data were sufficiently reliable to describe the numbers of individuals (adults and family unit members) who were apprehended by CBP and recorded by ICE as having made a credible fear claim. To address our second objective, in addition to our aforementioned interviews and site visits, we reviewed relevant laws and regulations governing the credible and reasonable fear screening process. We collected and analyzed documentation on key USCIS oversight mechanisms related to credible and reasonable fear screenings— supervisory review, asylum officer training, and quality assurance reviews. In particular, we reviewed the Credible Fear Procedures Manual, and the Reasonable Fear Procedures Manual, standard operating procedures, training and quality assurance records and materials, and guidance on conducting credible and reasonable fear screenings for families in ICE detention. Specifically, we reviewed USCIS asylum officer basic training materials from RAIO and the Asylum Division, and training materials for officers from outside the Asylum Division who screen credible and reasonable fear cases. In particular, we reviewed USCIS Asylum Division quarterly training reports for fiscal year 2018 and used them to analyze the weekly training activities in each asylum office for each week of the reporting quarter. We compared RAIO and Asylum Division training materials with federal internal control standards related to developing competent individuals qualified to carry out assigned responsibilities. We also reviewed documents associated with the quality assurance reviews that the Asylum Division conducted, including those reviews conducted in collaboration with RAIO. Specifically, we reviewed standard operating procedures, reviewer checklists, and resulting reports and analysis for three RAIO nationwide reviews of credible and reasonable fear cases and for the six periodic reviews of credible and reasonable fear cases the Asylum Division conducted at asylum offices and at the family residential centers between November 2017 and May 2018. We compared these policy documents and their role in providing oversight of the credible and reasonable fear process against federal internal control standards related to ongoing monitoring activities and evaluation of results. We also reviewed USCIS standard operating procedures, requirements, and training materials for processing family members, and corresponding data on applicant family relationships. We then compared the procedures, requirements and data against federal internal control standards related to obtaining high quality data. To address our third objective, we reviewed USCIS and EOIR documents and data, and interviewed relevant officials to evaluate the extent to which USCIS and EOIR have process for managing their respective credible and reasonable fear-related workloads. USCIS. In particular, we reviewed USCIS documentation and spoke with officials from Asylum Division headquarters and local asylum offices regarding the Asylum Division’s staffing allocation model for the credible and reasonable fear workload. In addition, we obtained and analyzed record-level data from USCIS’s automated case management system to identify processing times and case delays for credible and reasonable fear cases between fiscal year 2014 through the second quarter of fiscal year 2019 (March 2019). We included cases that had a fear determination that was served or an administrative closure for both detained and nondetained individuals. In this report, we present information on both credible and reasonable fear case receipts and analysis of processing times for the cases using the “clock-in” date recorded in USCIS’s automated case management system. However, while USCIS relies on the “clock-in” date to track case processing times, according to an Asylum Division official USCIS tracks and reports the number of credible and reasonable fear case receipts based on the date cases are input into, or “created” in, its automated system. According to the official, these “created” and “clock-in” dates are often the same, but can differ slightly. Therefore, the number of case receipts tracked and reported by USCIS may differ slightly from those presented in this report. Regarding credible fear cases, we determined case processing times by calculating the difference between the beginning and end dates for credible fear cases. We considered credible fear case processing times for detained individuals to begin on the day when USCIS receives referral documents and records a “clock-in” date in the automated case management system, as noted previously. For nondetained individuals, the clock starts for credible fear cases when a USCIS asylum office conducts the interview for a credible fear screening. We used the starting clock date for detained and nondetained individuals provided by USCIS for our analysis. We considered credible fear case processing times to end on the day when cases either had a fear determination that was served or an administrative closure. We included credible fear cases that had a fear determination that was served or an administrative closure for detained and nondetained individuals. We also reviewed USCIS’s publicly-reported data on credible fear processing times during this time period. Regarding reasonable fear cases, we used USCIS data to count the number of processing days and percent of cases completed in certain time intervals. We determined reasonable fear processing times by calculating the difference between the beginning and end dates for reasonable fear cases. We considered reasonable fear case processing times for detained individuals to begin on the day when USCIS receives referral documents and records a “clock-in” date in the automated case management system, as noted previously. For nondetained individuals, the clock starts for reasonable fear cases when a USCIS asylum office conducts the interview for a reasonable fear screening. We used the starting clock date for detained and nondetained individuals provided by USCIS for our analysis. We calculated reasonable fear processing times in court days by excluding weekends and federal holidays. USCIS may also pause the clock when processing reasonable fear cases in certain circumstances. We excluded approximately 13 percent of reasonable fear cases that had at least one pause in case processing time from our analysis because in conducting our analysis we could not systematically confirm the appropriate order of dates for those cases. We considered reasonable fear case processing times to end on the day when cases either had a fear determination that was served or administrative closure. We also included reasonable fear cases that were served a fear determination or received an administrative closure for detained and nondetained individuals. To identify the reasons for delays in credible and reasonable fear cases during the time period of our analysis, we identified the fields that USCIS’s case management system tracks for case delays related to the credible and reasonable fear workload. In addition, we reviewed USCIS’s manuals and documentation on its case management system. We compared USCIS’s recording and tracking of data on case delays to federal internal control standards related to obtaining data on a timely basis for management to use for effective monitoring and that data should be processed into high quality information. We determined that the USCIS data we reviewed on credible and reasonable fear processing times and case delays were sufficiently reliable for our purposes. EOIR. To evaluate EOIR’s process for managing its credible and reasonable fear-related workload, we interviewed EOIR officials about their practices to manage the credible and reasonable fear workload, including immigration judge hiring, oversight of credible and reasonable fear review processing times, infrastructure requirements for credible and reasonable fear reviews, and the use of video teleconferencing by judges to conduct credible and reasonable fear reviews. We reviewed publicly available data about EOIR’s workload and case adjudications, including data about the number of credible and reasonable fear reviews EOIR judges completed and data about judges hired from fiscal year 2014 through fiscal year 2019. We also reviewed guidance documents, such as EOIR’s 2018 Case Priorities and Performance Measures memorandum, which established performance measures for credible and reasonable fear reviews. In addition, we used EOIR data to analyze the timeliness of EOIR’s completion of credible and reasonable fear reviews and compared EOIR’s processing times for fiscal year 2014 through the third quarter of fiscal year 2019 with required time frames. By reviewing documentation on EOIR’s case management system and interviewing officials with knowledge about EOIR’s case management system and the methodology used to calculate the publicly-reported data, we determined that the EOIR data we reviewed on credible and reasonable fear review processing times and outcomes was sufficiently reliable for analyzing the number of credible and reasonable fear reviews completed and pending, and the duration of the reviews. We conducted this performance audit from November 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient and appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides detailed information on eligibility, screening standards, and possible screening outcomes for both credible fear and reasonable fear cases. Noncitizens placed into expedited removal who make fear claims will be referred to U.S. Citizenship and Immigration Services (USCIS) for a credible fear screening by an asylum officer or, if the individual has been issued a final administrative removal order after conviction for an aggravated felony or has a prior order of removal that is reinstated, and expressed a fear of return, for a reasonable fear screening. Table 8 below describes the eligibility and screening standards, as well as the potential outcomes for USCIS’s credible fear screening cases. Similarly, table 9 details eligibility, screening standards, and potential outcomes for reasonable fear screening cases. If noncitizens are placed into expedited removal proceedings instead of full removal proceedings, they are to be ordered removed from the United States without further hearing before an immigration judge unless they indicate either an intention to apply for asylum or a fear of persecution or torture or a fear of return to their country (referred to throughout this appendix as making a “fear claim”). This appendix provides information on the number and dispositions (such as full removal proceedings or expedited removal proceedings, among others) of noncitizens who were apprehended by the Department of Homeland Security’s (DHS) U.S. Customs and Border Protection’s (CBP) U.S. Border Patrol (Border Patrol) and Office of Field Operations (OFO) at or between U.S. ports of entry from fiscal year 2014 through the second quarter of fiscal year 2019. It also includes U.S. Immigration and Customs Enforcement (ICE) data on detentions of noncitizens who made a credible fear claim. For cases in which noncitizens were referred to U.S. Citizenship and Immigration Services (USCIS) for a fear screening, this appendix also provides additional information on the characteristics of these cases, including their country of origin, age, gender, whether they had representation, and location of their screenings. As shown in table 10, Border Patrol apprehensions totaled more than 2.3 million from fiscal year 2014 through the second quarter of fiscal year 2019. Further, Border Patrol data indicate that agents processed about 687,000 (or 30 percent) for full immigration proceedings and nearly 931,000 (or 40 percent) under expedited removal proceedings. For those apprehensions that agents processed under expedited removal, more than 197,000 (approximately 9 percent of total apprehensions) included a credible fear claim made in Border Patrol custody. As also shown in table 10, during fiscal years 2017 through the first two quarters of 2019, Border Patrol apprehended more than 10,000 additional noncitizens who made reasonable fear claims. As shown in figure 7, the number of Border Patrol apprehensions of individuals who were placed into expedited removal proceedings with a credible fear claim increased from more than 16,000 apprehensions in fiscal year 2014 to more than 51,000 in fiscal year 2018. These apprehensions of individuals claiming fear ranged from 3 percent to 13 percent of total apprehensions during these fiscal years. Border Patrol data include various characteristics of each apprehension such as age, gender, and whether a noncitizen was a member of a family unit. For example, of the nearly 208,000 apprehensions processed under expedited removal with a credible or reasonable fear claim during fiscal years 2014 through the first half of fiscal year 2019, approximately 166,000 (or 80 percent) were adults age 18 and above with the remaining 42,000 (or 20 percent) encompassing children age 17 and under (see table 11). Of the nearly 208,000 apprehensions processed under expedited removal with a credible or reasonable fear claim during fiscal years 2014 through the first half of fiscal year 2019, approximately 117,000 (or 56 percent) were male and the remaining 90,000 (44 percent) were female (see table 12). As shown in table 13, for fiscal years 2016 through the first two quarters of 2019, Border Patrol apprehended nearly 456,000 noncitizens who were members of families. Of these, Border Patrol processed more than 120,000 (or 26 percent) under expedited removal proceedings. Nearly 71,000 apprehensions during this time period (15 percent of total family unit members apprehended and 59 percent of those placed in expedited removal) included a credible fear claim. From fiscal year 2014 through March 2019, OFO apprehensions at ports of entry totaled at least 546,900. Of these 546,900 apprehensions, OFO officers placed at least 193,500 (or 35 percent) into expedited removal proceedings. For those in expedited removal proceedings, OFO data indicate that at least 104,600 apprehensions included a credible fear claim in OFO custody (19 percent of total apprehensions). In addition, OFO issued Notices to Appear before an immigration judge for full immigration proceedings to at least 167,400 (or 31 percent) of the approximately 546,900 total apprehensions (see figure 8). As shown in figure 9, the number of OFO apprehensions in expedited removal proceedings with a credible fear claim generally increased over this time period from at least 11,600 apprehensions in fiscal year 2014 to at least 27,000 in fiscal year 2018 (the last full year of data available at the time of our analysis). In addition to this overall increase, the percentage of OFO’s total apprehensions placed into expedited removal proceedings with a credible fear claim also increased. Specifically, these apprehensions increased from about 17 percent of all apprehensions in fiscal year 2014 to about 26 percent in fiscal year 2018. OFO apprehension data include various characteristics such as age, gender, and whether an apprehension involved a member of a family unit. For example, as shown in table 14, of the approximately 104,300 OFO apprehensions with credible fear claims, at least 78,500 (or 75 percent) were adults age 18 and above with about 25,700 (or 25 percent) of the remaining credible fear claims encompassing children age 17 and under. Also, for each year during this period, the percentage of adults versus children was generally consistent with this overall percentage with the exception of fiscal year 2019, for which the partial year’s data show that about 98 percent of those apprehensions processed under expedited removal with a credible fear claim were adults. In addition, for fiscal years 2014 through the first two quarters of fiscal 2019, at least 56,500 (or 54 percent) of these apprehensions involving a fear claim were male and at least 47,400 (or 45 percent) were female (see table 15). Also, for each year during this period, the number of males and females were almost evenly split with the exception of fiscal year 2019, for which the partial year’s data show a larger proportion of males claiming fear. As shown in table 16, for fiscal years 2016 through the first two quarters of 2019, OFO had a total of at least 144,100 apprehensions involving members of family units. Of these approximately 144,100 apprehensions, OFO placed at least 39,100 (27 percent) into expedited removal proceedings of which at least 32,900 (about 23 percent of total family unit members apprehended and approximately 84 percent of those placed in expedited removal) claimed a credible fear of returning to their country. The number of individuals in expedited removal proceedings detained in ICE facilities with a credible fear claim increased from fiscal years 2014 to 2018. Specifically, as shown in table 17, ICE data indicate that the number of individuals in expedited removal proceedings with a recorded credible fear claim while in ICE detention increased from about 37,000 (or 9 percent) in fiscal year 2014 to about 99,000 (or 26 percent) in fiscal year 2018. The period of greatest percentage increase was from fiscal years 2015 to 2016 when the percentage of individuals in expedited removal proceedings with a credible fear claim while in ICE custody increased from approximately 15 percent to 25 percent. For fiscal years 2014 through 2018, the majority of family unit members in ICE’s four family residential centers had a credible fear claim (81 percent), as demonstrated in table 18. The number of family unit members with a fear claim ranged from approximately 69 percent in fiscal year 2015 to 88 percent in fiscal year 2018. For fiscal years 2014 through 2018, slightly more than half of all family unit members in ICE’s four family residential centers with a credible fear claim were children under the age of 18 (55 percent). As also shown in table 19, the division between adults and children with fear claims varied little each year. As shown in Figure 10, the majority of credible fear cases referred to USCIS for screening from fiscal year 2014 through the first two quarters of fiscal year 2019 had applicants who were nationals of El Salvador, Honduras, Guatemala, or Mexico. Citizens of these countries accounted for 74 percent of all credible fear cases during this time period (approximately 306,000 referrals). As shown in table 20, El Salvador had the most credible fear referrals to USCIS each year from fiscal year 2014 through fiscal year 2017. However, beginning in fiscal year 2018, Honduras accounted for the most credible fear referrals to USCIS among these four countries. As shown in Figure 11, applicants from the countries of Mexico, Honduras, El Salvador, and Guatemala accounted for all but approximately 7 percent of the reasonable fear cases screened by USCIS for fiscal years 2014 through the first two quarters of fiscal year 2019. Overall, Mexican nationals accounted for the largest number of reasonable fear cases among these four countries (33 percent of total reasonable fear cases). As shown in table 21, Mexico had the most reasonable fear referrals to USCIS each year from fiscal years 2014 through the first two quarters of fiscal year 2019. As table 22 shows, noncitizens making credible fear claims who had representation present at their interviews with asylum officers more often received positive determinations of fear by the asylum officer. Overall, during this time period, the number of positive determinations in cases with representation was nearly 10 percentage points greater than those without representation. As table 23 shows, similar to credible fear cases, noncitizens making reasonable fear claims who had representation present at their interviews with asylum officers more often received positive determinations of fear by the asylum officer. Overall, during this time period, the number of positive determinations in cases with representation was over 20 percentage points greater than those without representation. As table 24 shows, two of ICE’s family residential centers (Dilley and Karnes family residential centers) accounted for the highest number of credible and reasonable fear referrals, among the top five facilities making these referrals, from fiscal years 2014 through the first two quarters of fiscal year 2019. As shown in table 25, reasonable fear screenings for those in ICE family residential centers comprised 6 percent of all such cases referred to USCIS during this same period with the percentage of positive determinations (77 percent) higher than that for all reasonable fear cases nationwide (30 percent). As shown in table 26, the Houston asylum office screened two-thirds (67 percent) of credible fear cases from fiscal year 2014 through the first two quarters of fiscal year 2019. Also, over this same time period, USCIS’s Los Angeles asylum office screened the second most credible fear cases (11 percent). However, since fiscal year 2018, USCIS’s Asylum Pre- Screening Center has screened the second most credible fear cases after Houston. As shown in table 27, the Houston asylum office screened nearly half (approximately 45 percent) of reasonable fear cases from fiscal year 2014 through the first two quarters of fiscal year 2019. Also, over this same time period, USCIS’s Los Angeles asylum office screened the second most reasonable fear cases (12 percent). However, since fiscal year 2018, USCIS’s Asylum Pre-Screening Center has screened the second most reasonable fear cases after Houston. In addition to the contact named above, Kathryn Bernet (Assistant Director), Michael Harmond (Analyst-in-Charge), Hiwotte Amare, Miranda Cohen, Benjamin Crossley, Michele Fejfar, Cynthia Grant, Jan Montgomery, Heidi Nielson, Mary Pitts, Adam Vogt, and Jessica Walker made key contributions to this work.", "summary": "Individuals apprehended by DHS and placed into expedited immigration proceedings are to be removed from the country without a hearing in immigration court unless they express an intention to apply for asylum, or a fear of persecution, torture, or return to their country. Those with such “fear claims” are referred to USCIS for a credible fear screening. Individuals who have certain criminal convictions or who have a reinstated order of removal and claim fear are referred for a reasonable fear screening. Those with negative outcomes can request a review by EOIR's immigration judges. GAO was asked to review USCIS's and EOIR's processes for fear screenings. This report examines (1) USCIS and EOIR data on fear screenings, (2) USCIS policies and procedures for overseeing fear screenings, and (3) USCIS and EOIR processes for workload management. GAO analyzed USCIS and EOIR data from fiscal years 2014 through mid-2019; interviewed relevant headquarters and field officials; and observed fear screenings in California, Texas, and Virginia, where most screenings occur. Data from the Department of Homeland Security's (DHS) U.S. Citizenship and Immigration Services (USCIS) and Department of Justice's Executive Office for Immigration Review (EOIR) indicate that their credible and reasonable fear caseloads generally increased from fiscal year 2014 through fiscal year 2018. USCIS's caseloads nearly doubled during this timeframe—from about 56,000 to almost 109,000 referrals for credible and reasonable fear screenings. Further, the credible fear caseload was larger in the first two quarters of fiscal year 2019 alone than in each of fiscal years 2014 and 2015. Referrals to USCIS for reasonable fear screenings also increased from fiscal years 2014 through 2018. USCIS asylum officers made positive determinations in 71 percent of all credible and reasonable fear screenings between fiscal years 2014 and the first two quarters of fiscal year 2019. The outcomes of the remaining screenings were generally split evenly (14 percent each) between negative determinations or administrative closures (such as if the applicant was unable to communicate). EOIR's caseload for immigration judge reviews of USCIS's negative credible and reasonable fear determinations also increased between fiscal year 2014 and fiscal year 2018. EOIR's immigration judges reviewed about 55,000 cases from fiscal year 2014 through the third quarter of 2019 (the most recent data available), and judges upheld USCIS's negative determinations in about three-quarters of all reviews. USCIS has developed various policies and procedures for overseeing credible and reasonable fear screenings in accordance with the regulations governing those screenings, such as interview requirements and mandatory supervisory review. USCIS provides basic training for new asylum officers and other training at individual asylum offices that includes credible and reasonable fear. The training at asylum offices includes on-the-job training for officers newly-assigned to credible and reasonable fear cases and ongoing weekly training for incumbent officers—some of which includes credible and reasonable fear. However, USCIS asylum offices do not all provide additional pre-departure training before officers begin screening families in person at DHS's family residential centers. Asylum Division officials told GAO that additional training for asylum officers before they begin screening such cases is important—in particular, credible fear screenings at these facilities represent about one-third of USCIS's caseload. Almost all USCIS asylum offices send officers to the family residential centers, including those offices with small fear caseloads at the local level. Some asylum offices provide pre-departure training to officers being sent to screen families, but such training is inconsistent across offices. By comparison, officials from the Chicago and New York offices stated they do not provide formal pre-departure training, but rather direct or recommend that officers review Asylum Division guidance and procedures on family processing independently before they travel. Officials from two other offices stated they rely on the training asylum officers may receive throughout the year related to credible and reasonable fear, which can vary. Providing pre-departure training, in addition to USCIS's basic training for new asylum officers, would help USCIS ensure that officers from all asylum offices are conducting efficient and effective fear screenings of families. Further, consistent with regulation, USCIS policy is to include any dependents on a principal applicant's credible fear determination if the principal applicant receives a positive determination, resulting in the principal and any dependents being placed into full removal proceedings with an opportunity to apply for various forms of relief or protection, including asylum. For example, a parent as a principal applicant may receive a negative determination, but his or her child may receive a separate positive determination. In the interest of family unity, USCIS may use discretion to place both the parent and child into full removal proceedings rather than the parent being expeditiously ordered removed in accordance with the expedited removal process. However, USCIS's case management system does not allow officers to record whether an individual receives a determination on his or her case as a principal applicant, dependent, or in the interest of family unity. Without complete data on all such outcomes, USCIS is not well-positioned to report on the scope of either the agency's policy for family members who are treated as dependents, pursuant to regulation, or USCIS's use of discretion in the interest of family unity. USCIS and EOIR have processes for managing their respective credible and reasonable fear workloads. For example, USCIS uses national- and local-level staffing models to inform staffing allocation decisions. USCIS also sets and monitors timeliness goals for completing credible and reasonable fear cases. Although USCIS monitors overall processing times, it does not collect comprehensive data on some types of case delays, which officers told us can occur on a regular basis. Asylum officers whom GAO interviewed stated that certain delays could affect the number of credible or reasonable fear cases they can complete each day. Collecting and analyzing additional information on case delays would better position USCIS to mitigate the reasons for the delays and improve efficiency. EOIR has developed processes for immigration courts and judges to help manage its workload that include performance measures with timeliness goals for credible and reasonable fear reviews. EOIR data indicate that about 30 percent of credible and reasonable fear reviews are not completed within the required timeframes. EOIR officials said they plan to implement an automated tool in early 2020 to monitor court performance, including the credible and reasonable fear performance goals. Because implementation of the automated tool is planned for early 2020, it is too soon to know if EOIR will use the tool to monitor adherence to the required credible and reasonable fear review time frames or if it will help EOIR understand reasons for case delays. GAO is making four recommendations, including that USCIS provide additional pre-departure training to USCIS asylum officers before they begin screening families, systematically record case outcomes of family members, and collect and analyze information on case delays. DHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Throughout history, new technologies have transformed societies. Many technological advances, ranging from the steam engine to electricity and personal computers, have enhanced productivity and improved societal standards of living. At the same time, many technological advancements have led to increases in automation—modifying processes to become more automatic by reducing human involvement—and corresponding changes in the workforce. For example, researchers have noted that automation has replaced tasks performed by workers and also increased production, creating a greater demand for other types of workers. Although automation has historically been a labor disrupter in manufacturing and physical work, various researchers have observed that recent progress in fields such as artificial intelligence (AI) and robotics are enabling machines to perform cognitive tasks currently performed by humans. Artificial intelligence refers to machines and computers that attempt to mimic various aspects of human intelligence, as we have reported. The field of AI can be traced back to the 1950s. Early AI often consisted of expert systems programmed by humans to perform predefined tasks. This form of AI resulted in some degree of productivity gains and remains an active area of development. However, numerous factors, primarily the trends underlying big data (i.e., increased data availability, storage, and processing power), have contributed to rapid innovation and accomplishments in AI in recent years. Present-day AI innovation centers more on machine learning, including deep neural network architectures, in which systems are trained against observational or simulated outcomes—applications include language translation and machine vision (i.e., systems that use cameras, radar, or lasers to observe their surroundings or recognize content). Industrial robots and robotic machinery are often more comparable to expert systems that are programmed to perform predefined tasks, but they can also incorporate machine learning, such as having machine vision capabilities (e.g., object recognition). Below are some examples of expert system and machine learning applications of artificial intelligence. Examples of expert system applications of AI: software programs that prepare tax filings or schedule logistics; and industrial robots that perform predefined or routine tasks, such as lifting, placing, and welding pieces of metal together. Examples of machine learning applications of AI: software that uses a training dataset to “learn” how to read information from a form filled out by a person; collaborative robots that can sense when they touch a physical obstruction and shut down to safely work alongside humans; industrial robots with machine vision incorporated to identify and pick up specific parts from a collection of randomly strewn pieces; and automated guided vehicles that transport materials around a production plant and use cameras and radar to navigate independently and re-route around obstacles. Advanced technologies, including AI and other technological drivers of workforce changes, are continually progressing and new developments emerge regularly. For example, automated vehicles have varying levels of autonomy. Similarly, while robots have existed for decades, today’s generation of robots may be equipped with machine vision and learning capabilities that enable them to perform a more expansive array of tasks. How, when, or whether technologies progress from development to commercialization (i.e., readiness for adoption), and how, when, or whether firms adopt the technologies is generally dependent on context- specific considerations, which are difficult to predict. To better understand these developments and how they affect the economy, the National Academies report recommended developing three indexes (technology progress index; AI progress index; and organizational change and technology diffusion index) to measure technology progress and the extent of adoption. The study suggested that indexes could be valuable for identifying what fields are advancing rapidly and what benchmarks might indicate the imminence of significant economic impact, as well as tracking and predicting the types of human tasks that can be automated and the impacts of technology adoption by industry. Stanford University’s AI Index project is another initiative that aims to track, collate, and visualize data related to artificial intelligence. The data collected by the AI index measure, among other things, volume of AI activity (e.g., published papers, course enrollment, AI-related startups, job openings) and technical performance (e.g., object detection and speech recognition). However, the potential uses and limitations of the data being compiled are yet to be seen, as this initiative is still in its early stages. While national employment data measure jobs and workers by occupation and industry, the adoption of advanced technologies generally affects specific work tasks, and can materialize in a variety of ways. As shown in figure 1, industries are made up of various occupations, which in turn are formed by a group of jobs. Underlying all, jobs are comprised of a collection of varied work tasks. By analyzing tasks within jobs or occupations to determine their susceptibility to automation, a number of studies have developed models to estimate the future workforce effects of advanced technology adoption. The three example studies below each developed similar models, though differences in methods and data sources produced varying conclusions about the number of jobs that may be automated in the future. In a 2016 article, researchers Frey and Osborne estimate that 47 percent of total U.S. employment is in occupations that are at high risk of automation over the next decade or two (i.e., by 2030). For example, the authors observe both that industrial robots will be able to perform a wider scope of non-routine manual tasks and that a substantial share of employment in services, sales, and construction occupations exhibit high probabilities of automation. A 2017 report by the McKinsey Global Institute estimates that 23 percent of total U.S. work hours could be automated by 2030 or as high as 44 percent under other assumptions. The report predicts that while labor demand will enable some re-employment of displaced workers, up to one-third of the workforce may need to change occupational categories. In a 2016 paper, researchers Arntz, Gregory, and Zierahn estimate that 9 percent of all U.S. workers hold jobs that are at high risk of automation. The authors observe that susceptibility to automation is lower for jobs that require cooperating or influencing others. Studies by Autor and others also develop theoretical models exploring the effects of automation. For example, they noted that while automation can substitute for some tasks, it can also complement others. This can lead to increasing value for tasks that require other attributes like creativity and intuitive judgement. These models hypothesize that automation may have a net positive effect on employment, or at least on employment in certain sectors, which is consistent with historical employment trends. However, researchers have also noted that machine learning may affect different tasks than earlier forms of automation and may be less likely to automate low-wage jobs—though low-wage workers may be affected in other ways. Although the models discussed above represent ways of identifying jobs that may be affected by the adoption of advanced technologies, they do not provide a model for tracking the current or to-date workforce effects of technology adoption. As the recent National Academies report states, “making forecasts about social phenomena is perilous… doing so with respect to the fast-changing and dynamic area of technology is even more challenging.” According to a different project by some of these same experts, several factors unrelated to whether a task or job could be automated contribute to these challenges. For example, technologies may substitute for human labor in some tasks, but: may also complement human labor in other tasks—increasing the demand for, or value of, human labor (e.g., the automation of calculation tasks leading to increased demand for human programmers); prices and demand for products may counteract this human labor substitution (e.g., technology reducing the price of air travel, and thus leading to increased demand for flights, and thus increased employment in the aviation industry); and firms may redesign operations in response to the substitution in ways that lead to employment increases or decreases that are greater than the direct substitution. As discussed in the National Academies report and elsewhere, researchers have tried to disentangle workforce effects in various ways, such as analyzing productivity data to examine workforce trends in the context of other economic factors, such as globalization. As the National Academies report observes, “Predictions that new technologies will make workers largely or almost entirely redundant are as old as technological change itself…. However, predictions of widespread, technologically induced unemployment have not come to pass, at least so far.” Since recovering from the recession of 2007-2009, the economy has recently experienced low unemployment rates—4.0 percent in January 2019—despite continued strides in advanced technologies. However, other indicators have not recovered. For example, the labor force participation rate—the percentage of the population that is either employed or seeking work—declined significantly through the recession and has generally remained at this lower level. This may indicate that the post-recession decline in the unemployment rate may over-represent the health of the labor market, according to BLS. Advanced technologies and automation may also affect workers in other ways, beyond potential changes in the workplace, such as by reducing production costs and thus lowering the prices of consumer goods. There are currently no comprehensive data on firms’ adoption and use of advanced technologies. As a result, researchers have difficulty determining whether changes in the U.S. workforce observed in existing employment data are related to advanced technologies. The National Academies report states that federal household and employer surveys, such as the CPS, ACS, and OES, provide useful information about changes to the occupational mix of the U.S. workforce over time. However, these data cannot identify the causes of employment shifts. For example, these data do not identify whether an employment decline in one occupation is due to jobs being replaced as a result of automation, or to other factors unrelated to automation. Other federal data, such as the Job Openings and Labor Turnover Survey, provide useful information on employment turnover and opportunities. However, although these data are available by industry sector and firm size, the data do not capture reasons for layoffs and discharges, and thus cannot be linked to advanced technologies. In the absence of comprehensive data that definitively link employment trends to technology adoption, we analyzed occupations that researchers Frey and Osborne identified as being susceptible to automation (see sidebar) to determine whether changes due to advanced technologies are appearing in employment data. By exploring concentrations of these occupations in industries, job displacements in these occupations, and the characteristics of workers in these occupations, we found minor indications that advanced technologies are changing the workforce and could affect some worker populations. However, the conclusions that can be drawn from these analyses are limited by the unpredictability of when, if, or how automation materializes—e.g., whether worker positions are eliminated or shifted to other non-automated tasks. Industries with higher concentrations of jobs susceptible to automation were more likely than others to have experienced significant growth in their concentration of tech jobs from 2010 to 2016, according to our analysis of employment data from the American Community Survey. For example, as shown in figure 2, the plastics product manufacturing industry has a relatively high concentration of jobs susceptible to automation. Many of these jobs are in production occupations. From 2010 through 2016, this industry experienced about 11 percent annual growth in tech jobs (i.e., jobs in the fields of computing, engineering, and mathematics). More than half of this growth was the result of increases in industrial engineers, engineering technicians, and miscellaneous engineers. As we observed at some firms we visited, some of these engineers may have been hired to program or maintain newly installed robots. However, the data do not provide this level of information about job tasks. Similar dynamics could also be occurring in other industries. Across all 69 industries that had statistically significant changes in the concentration of tech jobs, we found a positive, though weak, correlation with the concentration of jobs susceptible to automation (see fig. 2). This suggests that growth in tech jobs may be an indicator of industries’ preparation for, or adoption of advanced technologies. However, given the complex causes of employment changes, there could be other reasons for tech job growth in these industries that are unrelated to firms’ adoption of advanced technologies. The growth in tech jobs in certain industries suggests firms in these industries may be using more advanced technologies, which could also signal that jobs susceptible to automation are being replaced. However, our analysis of ACS data showed no correlation between an industry having a higher concentration of jobs susceptible to automation and employment changes in that industry (i.e., total employment increases or decreases). We also found no meaningful differences in job losses, according to our analysis of employment data from the Current Population Survey’s Displaced Worker Supplement. Specifically, the relative rate at which workers in occupations susceptible to automation lost a job because their position or shift was abolished or there was insufficient work for them to do was not meaningfully different than workers in other occupations. There could be a number of reasons we did not find a relationship between susceptibility to automation and employment changes in both of these analyses, including: a relationship does not exist; such a relationship is too complex to measure in this way (e.g., automation may lead to decreases in employment in some industries, while also leading to increases in employment in other industries due to improved competitiveness, productivity, and profitability); it is too soon to observe the employment effects of automation (e.g., growth in tech jobs in an industry may be a leading indicator of employment disruption); or our analysis covered a period of overall economic growth, which could obscure or overwhelm other employment trends. Existing data cannot predict with certainty when or if automation will materialize in the workforce, as suggested by our analyses. However, the tendency of particular worker groups to hold jobs susceptible to automation suggests that some communities may be disproportionately affected by changes if they occur. For example, according to our analysis of 2016 ACS data, workers with lower levels of education are more likely than those with higher levels to hold jobs in occupations that the Frey and Osborne study identify as susceptible to automation. Specifically, 60.7 percent of workers with a high school degree or less hold these types of jobs, as compared to 46.7 percent of workers with some college, 26.9 percent of workers with a bachelor’s degree, and 11.3 percent of workers with a graduate degree. In addition, 54.1 percent of Hispanic workers hold jobs in occupations susceptible to automation, as compared to 46.4 percent of Black workers, 40.0 percent of White workers, and 35.9 percent of Asian workers. Certain geographic areas also rely more heavily than others on occupations identified as susceptible to automation, according to OES data. We identified areas where the proportion of jobs susceptible to automation is at least 5 percentage points greater than the national average (see fig. 3). These occupations are comprised of a diverse set of jobs that may experience automation in different ways and at different times, if at all. However, if employment disruptions are regionally concentrated, groups of workers with similar skills in the same labor market may need to adapt to changes simultaneously, which could strain the availability of local job opportunities and support resources. Workers in occupations that the Frey and Osborne study identify as susceptible to automation earn less on average than other workers. For example, the median hourly wage for workers in occupations susceptible to automation is $14.26, compared to $22.06 for other workers, according to our analysis of 2016 ACS data. After controlling for factors that may affect wages, such as age, education, and industry, we found that workers in jobs susceptible to automation earn about 17.2 percent less, on average, than similar workers in other occupations. These results show that, on average, workers in jobs susceptible to automation are already in more vulnerable economic circumstances than other workers. When or if changes brought on by automation materialize, these workers may face additional hardships in adapting to changing workforce demands. In the absence of comprehensive data, researchers have taken differing approaches to exploring the relationships between technology adoption and workforce trends. We identified some examples of recent and ongoing work that attempt to measure workforce effects directly attributable to technology adoption. These examples illustrate types of data that may be useful for better understanding and measuring the use of specific technologies (e.g., robot sales), the spread of technologies generally (e.g., automation patents), and how specific work tasks are changed by technology use (e.g., firm-level operations data). Some researchers have used data on industrial robot sales collected by the International Federation of Robotics (IFR) to approximate robotics adoption worldwide and in the United States and to model its direct effects on employment. Analysis by Furman and Seamans (2018) shows that annual sales of industrial robots in the United States increased substantially between 2010 and 2016. The analysis attributes this growth to a combination of factors, including lower robot prices, improved robot functionality, and greater awareness of the benefits of robots. They also observe that the automotive sector was the largest customer for industrial robot sales in the United States from 2004 through 2016, though robot sales to the consumer electronics sector grew the most over that period. Studies by Acemoglu and Restrepo (2017) and by Graetz and Michaels (2017) both use IFR data through 2007 to model the workforce effects of robot adoption in the United States, though their methods, results, and conclusions differ. Acemoglu and Restrepo estimate that each additional robot used in a geographic area reduces employment by about six workers in that area. They observe that their estimated employment effects are greatest in manufacturing and other industries most exposed to robots, in routine manual work-related occupations, and for workers with less than a college education. They do not find corresponding employment gains in any other occupation or education groups. They also estimate that one more robot used per thousand workers reduces wages by about 0.5 percent. They conclude by noting that, so far, relatively few robots have been used in the U.S. economy and thus the effect on jobs has been limited; however, they state that if robot usage continues to grow as researchers expect, these effects could be more substantial. Graetz and Michaels estimate that increased robot use did not significantly affect total hours worked across the 17 developed countries in their analysis, but that work shifted from low-skilled workers to middle-skilled and high-skilled workers. They also estimate that increased robot use increases productivity and average wages. While their analysis covers 17 developed countries, they note that robot use in the United States was marginally lower than the average across all countries. They also observe that while their results differ from Acemoglu and Restrepo, it is possible that the effects of robot usage are different in the United States than across the 17 countries they analyze. Other researchers have used U.S. patent data as an alternative way to approximate the spread of advanced technologies and to examine the resulting workforce effects. Mann and Püttman (2017) use machine learning algorithms to identify patents related to automation technology. They find that automation patents grew substantially from 1976 through 2014. After linking the patents to industries where they may be used, they estimate that automation causes manufacturing employment to fall, though it increases employment in the service sector, as well as overall employment. They observe that their results depict a more positive picture of the employment effects of new technology use than the studies that used industrial robot sales data (discussed above). Lee Branstetter, a researcher at Carnegie Mellon University, and his colleagues have a similar ongoing project that uses a machine learning algorithm to identify patents related to AI technologies. According to these researchers, their initial results suggest a rapid rise in AI patents over the past decade and also that AI patents are emerging in a variety of application areas. They are also in the early stages of work linking AI patents to industries to explore how new technology use affects the workforce. Researchers have also identified how important micro-level data could be for understanding the workforce effects of advanced technology adoption. For example, reports by the National Academies and others highlight the potential for firm-level information to augment traditional survey data to enable analyses of the conditions under which advanced technologies complement or substitute for workers, and what types of firms invest in advanced technologies. Other researchers have emphasized the importance of focusing on work tasks to analyze the effects of technological change at workplaces. Erica Fuchs, a researcher at Carnegie Mellon University, and her colleagues Christophe Combemale, Katie Whitefoot, and Laurence Ales use a combined firm-level, task- based approach by collecting and analyzing production floor data from four semiconductor firms with different levels of process automation and parts consolidation. They map out detailed versions of firms’ production processes and then use existing data and technical knowledge to simulate each step to analyze the effects of technology changes. Their preliminary results estimate that automation replaces some routine tasks, leading to estimated declines in the number of production floor jobs requiring medium skill levels. According to the authors, this firm-level, task-based approach may be applicable to other manufacturing industries and could provide insight on how the adoption of different technologies may produce different labor outcomes. However, they note that the approach requires detailed production process data, which may be difficult to collect for many firms or industries. Commerce’s Census Bureau has begun administering surveys with questions that focus specifically on firms’ adoption of advanced technologies and resulting workforce changes. According to Census, this data collection is part of a long-standing, coordinated effort to measure the impact of technology. In addition, consistent with Commerce’s strategic plan, these represent new efforts to provide a timely, in-depth, and accurate picture of the economy amidst the economic shifts and technological advances of the 21st century. However, none of the survey results will be available until late 2019 and later. The new Annual Business Survey (ABS) is a joint effort by Commerce and the National Science Foundation that has the potential to provide insight on the spread of advanced technologies in the economy and could be used to examine the workforce effects of technology adoption, but the first ABS results are not expected until late 2019. Census administered the 2017 ABS in June 2018 to collect information on firms’ use of advanced technologies, such as automated guided vehicles, machine learning, machine vision, and robotics, among other things (see example in sidebar). The survey asks whether firms are testing a given technology or using it for either less than 5 percent, 5 to 25 percent, or more than 25 percent of their production or service. Census officials said this question should provide information about the extent of technology adoption nationwide, including whether there are any industry concentrations of advanced technologies. Census plans to add questions on the workforce effects of advanced technologies when it administers the 2018 ABS during July through December 2019, pending final approval by the Office of Management and Budget. Census plans to release these survey results in December 2020. Specifically, Census plans to include new questions that ask firms about: (1) their use of advanced technologies such as AI, cloud computing, robotics, and specialized software and equipment; (2) their motivation for adopting and using artificial intelligence and advanced technologies; (3) the impact these technologies might have on the number and skill level of workers; and (4) the factors that could adversely affect the adoption or production of these technologies. The new questions also ask about changes in the number of production workers, non-production workers, supervisors, and non-supervisors. These new questions could be used to characterize the prevalence of workforce changes in the economy caused by advanced technology adoption (e.g., declines in production workers, or increases in supervisory workers) and whether this differs by industry sector. However, these planned questions are not intended to provide information to quantify the magnitude of workforce changes, in part to minimize respondent burden and potential survey error, according to Census. In addition, until the ABS data are available and evaluated, it remains unclear what limitations, if any, the data may have. Census also plans to expand other surveys to track the spread of advanced technologies in the economy, including its Annual Survey of Manufactures (ASM) and Annual Capital Expenditures Survey (ACES). Census plans to administer the 2018 ASM in May 2019, pending final approval by the Office of Management and Budget. The survey will collect capital expenditures data for industrial robotics at approximately 50,000 manufacturing plants, as well as the number of industrial robots purchased by and in use at these plants. Census officials stated these two measures might be useful in understanding the impact that industrial robots could have on productivity as well as the impact robots could have on the manufacturing labor force once the survey results are available in the spring of 2020. Census plans to administer the 2018 ACES during March through May 2019 and to have the survey results available in February 2020.The survey will include questions on robotics expenditures, similar to those in the 2018 ASM. However, the ACES collects expenditure data from 50,000 employer firms across all non-farm sectors of the economy—instead of just manufacturers—and will also ask about firms’ use of both industrial and service robots. Some Commerce offices also track issues related to the adoption and workforce effects of advanced technologies on a limited or intermittent basis. For example, National Institute of Standards and Technology officials stated that the Hollings Manufacturing Extension Partnership collects limited information about the number of jobs gained and retained by small and medium businesses adopting new technologies. National Telecommunications and Information Administration officials said they monitor developments in AI on an intermittent basis and also direct a project that examines new applications of small and large internet devices. DOL has a role in collecting data that track changes occurring in the U.S. economy and workforce, including developing new ways to track emerging economic trends, though as we previously discussed, currently available federal data do not link shifts in the workforce to technological changes. BLS is the principal federal statistical agency responsible for measuring labor market activity. According to DOL’s strategic plan, BLS is to support public and private decision-making and meet the needs of its many stakeholders, including the general public, educational institutions, and the public workforce system. This includes regularly identifying structural shifts in the economy and developing new data products that reflect economic changes. In addition, DOL’s Employment and Training Administration (ETA) is to assist workers’ entry and reentry into in- demand industries and occupations. This assistance includes providing job seekers with accurate labor market data and guidance about opportunities, aligning training services to industry needs, and helping connect businesses with properly skilled workers. Internal control standards state that agencies should use quality information to identify, analyze, and respond to significant changes, including external conditions such as economic and technological changes that may affect an agency’s ability to achieve its objectives. DOL collects workforce data through various surveys, including the Current Population Survey’s Displaced Worker Supplement, and produces other data products such as the occupational employment projections and Occupational Information Network database that include information related to advanced technologies. However, these data are limited, and according to BLS, provide some, but not all, of the information required to assess the impact of automation on the workforce. BLS’s Employment Projections program identifies and provides limited information about occupations expected to experience declines in their share of employment in an industry or group of industries as a result of the adoption of advanced technologies. On a biennial basis, this program analyzes changes in the economy to project how employment by occupation may change over 10 years, including which occupations may be affected by advanced technologies. Factors that can affect occupational employment include but are not limited to technological innovation; changes in business practices or production methods; organizational restructuring of work; changes to the size of business establishments; and offshore and domestic outsourcing, according to BLS. As part of this program, BLS develops a table of occupations that are projected to have direct employment changes due to some identified reason. This table identifies projected staffing pattern changes and BLS’s qualitative judgment of the most significant factor or factors projected to affect the occupation. The table also indicates whether an occupation’s share of employment is expected to change within a single industry or within multiple or all industries. For example, the table includes the following selected entries: Librarians: Employment share is projected to decline in the information services industry as internet-based research continues to displace library-based research. Stock clerks and order fillers: Employment share is projected to decline in two industries (the warehousing and storage industry and the grocery and merchant wholesalers industry) as firms increasingly adopt automated storage-and-retrieval systems. Aircraft structure and systems assemblers: Employment share is projected to decline in all industries as collaborative robotics increase efficiency, producing more output with the same amount of labor. We identified 100 occupations in BLS’s table that are projected to experience declines in their shares of employment in an industry or group of industries as a result of the adoption of advanced technologies. Similar to the examples above, reasons could be related to automation, the increased use of robots or artificial intelligence, advances in machine or software technologies, or other changes resulting from the adoption of advanced technologies. As shown in figure 4, most of these occupations are production occupations (40 of 100) or office and administrative support occupations (30 of 100). BLS officials told us they do not currently track groups of occupations projected to experience employment share declines due to specific reasons, such as advanced technology adoption. Officials also said they do not aggregate total projected employment effects stemming from similar causes because they are unable to identify ripple effects in all occupations—e.g., automation in one occupation affecting employment in a different occupation. Information contained in ETA’s Occupational Information Network (O*NET) database includes, among other things, information about work activities, tools and technologies used, and required skills associated with over 1,000 occupations. According to ETA officials, the primary purpose of O*NET is to assist job seekers in making employment decisions. However, the O*NET database can be used to identify occupations that use certain types of advanced technologies. For example, we identified 15 occupations in which workers monitor, install, develop, troubleshoot, debug, or perform other tasks with robots as part of their daily work activities and 63 occupations in which workers use robots as a tool or technology in their daily work activities (see table 1). In addition, states, federal officials including at BLS, and academic researchers use these data to inform, among other things, worker support programs. DOL officials told us they do not use O*NET data to analyze changes in occupations over time, such as robots being used in additional occupations, because the methodology is not currently structured to capture these kinds of changes systematically. For example, data are collected from a selection of occupations at varying frequencies, rather than at the same time, which could make it challenging to track changes in certain occupations over time. Without comprehensive data linking employment shifts and technological changes, policymakers and DOL may not be prepared to design and implement programs that both encourage economic growth and provide support for workers affected by changes. DOL-funded programs rely on accurate information to guide job seekers to employment opportunities and to help align training services with local industry needs. For example, the O*NET database identifies high-growth, high-demand occupations for job seekers based largely on BLS employment projections data. While these employment projections provide valuable information, they are not designed to identify the full extent of occupational shifts due to advanced technology adoption. Similarly, other workforce surveys, such as the Current Population Survey’s Displaced Worker Supplement and the Job Openings and Labor Turnover Survey, do not collect information about the causes of job losses and gains. This information could be a valuable tool for designing programmatic or policy supports for workers. For example, data on whether advanced technologies have resulted in worker displacements, work hour reductions, or substantial adjustments to work tasks could better position BLS to meet stakeholder needs. Congress has expressed concern that there continues to be insufficient data on the effects advanced technologies are having on the U.S. workforce. On January 2, 2019, BLS reported to Congress that it plans to work with a contractor during fiscal year 2019 to study the interaction between labor and capital in the workplace and how it is affected by new technologies; identify ways to supplement BLS data with additional information on automation; and produce a report that recommends data collection options to fill those gaps. In fiscal year 2020, BLS also plans to identify pilot projects to test the feasibility of new data collection based on the recommendations in its final report, resources permitting. However, these plans are still in their early stages, according to BLS officials. Officials at Commerce and DOL stated that collecting data on the adoption and workforce effects of advanced technologies is challenging because it is difficult to identify which new and emerging technologies to track; employment trends generally occur at the occupation and industry levels but the effects of advanced technologies typically occur at the task or job level; and employment trends have a complex and diverse set of causes. Specifically: Identifying which new and emerging technologies to track. Census officials said there is uncertainty about how an emerging technology might affect the economy and thus whether it should be tracked systematically. For example, self-service technology appeared at grocery stores in 1916, other self-service technology appeared at gas stations later, and more recently self-service technologies are being adopted by some restaurants, according to researchers. Periodically, Census has included questions in its firm surveys about the use of these technologies. Past surveys asked questions about the use of self-service at gas stations until the technology became ubiquitous and was dropped from the survey. As self-service technologies have expanded to other areas of the economy such as restaurants, Census has again added questions about self-service to recent surveys because information is lacking on the growth of this phenomenon. Trends and effects appear at different levels. BLS officials said employment changes due to technology typically occur at the individual task or job level and employment trend data are at the industry and occupation levels. Officials also said that identifying technology-related effects in occupations, such as changes related to uses of machine learning algorithms, is difficult because some workers within an occupation might be affected by the technology while others might not. For example, some computer scientists and engineers might be involved in the development or application of machine learning algorithms while others are not. Causes of trends are complex and diverse. BLS officials said that employment trends’ complex and diverse causes make it difficult to identify occupations that are changing because of advanced technologies. Changes in one occupation may have ripple effects in other occupations. Partly as a result of this complexity, BLS’s Employment Projections program identifies examples of technology- impacted occupations, but it does not attempt to identify all instances where technology impacts occupations nor does it attempt to quantify an overall projected employment effect of advanced technologies. The White House Office of Science and Technology Policy (OSTP) is responsible for coordinating AI related policy across government agencies and for overseeing the National Science and Technology Council’s subcommittees and their ongoing activities. For example, the Subcommittee on Machine Learning and Artificial Intelligence was originally chartered in 2016 to monitor machine learning and artificial intelligence and to watch for the arrival of important technology milestones in the development of AI, among other things. OSTP officials told us that the Subcommittee has been re-chartered, now receives direction from OSTP’s Select Committee on Artificial Intelligence, and is presently focused on federal resources related to AI research and development. Selected firms generally adopted advanced technologies through a phased process of innovation and technology adoption (see fig. 5). We met with officials representing 16 firms that are using advanced technologies and a systems integrator who spoke for a number of his customer firms. Many firm officials described the path to integrating technology into operations as lengthy, complex, and iterative. For example, some firms we visited have had to build and test different mechanical “grippers” attached to robot arms to pick up and handle particular objects; one firm had high school participants at a local training center develop a gripper solution for one of the firm’s robots. Some of the large firms we visited had their own internal teams that identified, tested, and integrated advanced technologies. Other firms we visited used third- party integrator companies to help with incorporating technologies into their operations. We spoke with firm officials about their motivations for adopting advanced technologies, as well as challenges they faced throughout the process, and they identified a number of similar issues. Most selected firms cited cost savings as a primary consideration for adopting advanced technologies. Firm officials discussed cost-related motivations in various forms, such as remaining competitive in a global economy, increasing productivity (i.e., lower cost per unit), decreasing labor costs, and saving on physical space. Firms said they adopted advanced technologies as a way of reducing operational costs—including labor costs—to increase competitiveness and profitability. Some officials also specifically identified the pressure of large low-cost competitors, both in the United States and globally, as a major motivation to reduce costs and product prices. Officials at a medium-sized door manufacturer told us that increased use of advanced technologies, such as robots, enabled the firm to increase efficiency, reduce labor costs, and re-focus its product line on custom doors to survive the entry of manufacturers in China that could sell mass-produced doors for lower prices. The original motivation for adopting robots at a medium-sized automotive parts manufacturer was a customer’s price demand that the firm could not meet and still remain profitable, according to officials. Integrating more robots enabled the firm to reduce production costs by using fewer workers. At a large manufacturing corporation of household and personal care goods, officials told us the company had a goal of reducing its workforce size by 1,500 full-time positions per year for 5 years (across its subsidiaries), and specifically using robotic automation to accomplish 40 percent of its reduction goal. The constant pressure to keep costs low in the health care sector motivated a university-affiliated medical center we visited to explore adopting more advanced technologies, such as autonomous mobile robots that could decrease expenses by reducing the number of positions in some departments. Firm officials also told us about other, non-labor-related cost savings considerations that led to the adoption of advanced technologies. Officials at a large automotive manufacturer told us they recently upgraded a laser welding system to use fewer, more advanced robots to save production line space—which is a valuable commodity in manufacturing. They also pursued this change to increase overall production capacity because the physical space they saved could be used to install more robots for other production steps. The integration of autonomous mobile robots to deliver prescription drugs to patient wards at a university-affiliated medical center was intended, in part, to save costs related to medicines that go missing when delivered and processed manually, according to officials. According to officials at selected firms, the desire to improve jobs led firms to adopt advanced technologies. The firms wanted to automate tasks that are dangerous, difficult, dull, or dirty in large part to improve worker safety, and to optimize the value added by workers. For example: Dangerous work: Two robots were installed to pick up doors weighing between 90 and 300 pounds, and place them on a paint line at a medium-sized door manufacturer we visited. Prior to the robots, workers who performed this dangerous task experienced work related injuries, and the firm paid large amounts of money in workers’ compensation claims, according to officials. Once the robots were installed, the firm experienced a decrease in the number of worker compensation claims. Dull work: A small automotive parts manufacturer we visited installed an industrial robot to perform a machine-to-machine transfer of a heavy part. Prior to the robot, the firm had three workers performing this task—even though the task only required two—because workers would eventually quit due to the tedium of the job and new workers would require time to be trained, according to officials. Value-added work: Some officials told us they adopted advanced technologies because they wanted to maximize human labor that provided value to the firm and reduce labor that did not. Officials at a warehouse for a regional grocery store chain and a university- affiliated medical center said they wanted to minimize time workers spent traveling between tasks (as opposed to performing tasks). Warehouse officials said their workers spend up to 60 percent of their time traveling back and forth between shelves and products, which is time that could be spent selecting and sorting items. Thus, at the time of our visit, the warehouse was in the early stages of adopting automated guided vehicles to eliminate the need for workers to travel between points. Similarly, officials at a university-affiliated medical center that adopted autonomous mobile robots to transport, among other things, prescription drugs, said nurses and pharmacy technicians used to walk back and forth between the patient ward and the pharmacy to pick up and deliver these drugs, which diverted them from performing other tasks. They said that the medical center wanted them to have more time to provide valuable work, especially for employees who are highly-paid. Officials at many firms said that adopting advanced technologies can help them deal with the challenges of recruiting and retaining skilled workers. They explained that worker shortages and high turnover can result from skill gaps in the local or national workforce, low unemployment, and certain work being viewed as unappealing, among other reasons. For example, officials at a warehouse for a regional grocery store chain we visited told us they struggle with high worker turnover and the constant need to hire new workers. In addition, low unemployment can make it difficult to retain workers with the right skills to operate machinery according to officials at a small automotive parts manufacturer. Similarly, at the university-affiliated medical center, an official said that positions for pharmacy and other types of medical technicians can be difficult to fill. By using autonomous mobile robots to automate some tasks, the medical center can streamline its operations to more efficiently use the technicians it already has. Recruitment in Manufacturing Officials at some manufacturing firms we visited said they have had trouble attracting new workers into the sector, and officials at two firms said that adopting advanced technologies is one way they have sought to make manufacturing more attractive and to appeal to more and younger workers. One younger worker at a small automotive parts manufacturer talked about how appealing his workplace was due to the firm’s use of advanced technologies, specifically robots. Officials at a large automotive manufacturer viewed their tech development facility, which includes spaces to tinker with virtual reality, augmented reality (i.e., technology that superimposes images on a user’s view of the real world; for example, by wearing augmented reality glasses), and other emerging technologies, as an asset to recruit young talent. Improving product quality, expanding product offerings, and supply chain reliability were primary motivations for adopting advanced technologies, according to officials at some firms. Product quality: Quality is paramount in the automotive industry, where mistakes are costly and can have implications for a firm’s reputation, according to officials at a medium-sized automotive parts manufacturer we visited. For this reason, they decided to use robots rather than workers for welding in order to standardize the processes, reduce errors, and improve product consistency and quality. Officials at a large automotive manufacturer similarly said that the firm has pursued machine learning technologies to ensure fewer defects and problems in vehicles. Engineers at the firm are developing a smart watch for workers who connect wires that will provide feedback to these workers if a proper connection is not made, based on the sound of the connection. The firm is already using machine vision technology that inspects vehicles as they pass through a section of the production line to ensure the correct pieces have been used for each vehicle model. Expanding product offerings: At a medium-sized fruit processing plant, an official said that integrating robots, an advanced conveyer system, and machine vision inspection technologies, among other advanced technologies, enabled the firm to begin producing applesauce in a highly automated and safe way. Had manual production been the only option, officials said they would not have considered producing applesauce due, in part, to safety issues. Supply chain reliability: One small manufacturer of rubber stamps and embossing seals (hereafter referred to as a small stamp manufacturer) used to rely on a single supplier for pre-cut materials, which was not always reliable. The firm adopted a collaborative robot, in part, so it could purchase raw materials directly and then have the robot cut the materials as part of the production process (see fig. 6). In addition to the capital cost of advanced technologies, which some firms told us can be substantial, firms face a number of risks that can affect their return on investment, such as the reliability of technology and working with new tech developers. While the firms we met with had already adopted advanced technologies, officials had to consider and overcome various risks during the adoption process. Some of these firms decided against adopting other advanced technologies upon evaluating these risks. Being an early adopter of a technology is risky because the new technology may not yet be sufficiently reliable for firms’ operations. Officials at a large appliance manufacturer we visited showed us technology that was supposed to use machine vision to autonomously inspect the wire connections for clothes dryers. They told us that the vision technology had been ineffective, so they took it off the production line for engineers to continue working with it in the lab; they planned to bring the technology back onto the line a few weeks after our visit. Officials at this firm said that the vision technology was still relatively immature, as it had a limited field of vision and yielded numerous false readings. Similarly, a warehouse we visited that invested in automated guided vehicles used them to move pallets for a short time, but then put them into storage because these vehicles did not have mature enough machine learning and vision capabilities for the firm’s purposes. Eventually, officials from this warehouse began working closely with the developer firm to improve the vehicle technology, which advanced enough that it could be used. For instance, officials from the warehouse suggested adding turn signals to the vehicles to alert nearby workers of intended movements and improving the vehicles’ ability to travel over spills without triggering the system’s sensors to shut down. Firm Size Might Affect Risk Tolerance An official at one small manufacturing firm stated that larger firms may be more willing to be early adopters of technology, as they may be able to absorb the high risks of experimenting with expensive technologies, while smaller firms tend to wait until a technology has been optimized before deciding to adopt it. Accordingly, his firm only purchases industrial robots from an established manufacturer, although it would like to experiment with newer technologies in the future, such as augmented reality. Officials at a large manufacturing firm told us they have purchased a number of advanced technologies to experiment with, even though they do not know yet how the technologies may ultimately be used in their production process. This firm also has teams of technicians and engineers who can adapt the technology for operations. During our visit, we met with engineers who demonstrated different potential applications of technologies that are still being tested, including using virtual reality to test new part design and augmented reality glasses to provide interactive training to workers. Officials at some firms explained that installing advanced technologies at times necessitated building manual redundancies into their operations due to reliability concerns. Officials at a construction consulting company and a municipal township that adopted a machine learning technology to inspect roads said the technology would miscategorize road quality at times, such as identifying tree branch shadows on the road as pavement cracks. While working with the developer to improve the technology, officials said they continued to conduct redundant manual inspections to ensure they were making road repair decisions based on accurate information. During our visit to a large appliance manufacturer, we saw multiple collaborative robots that were not working properly. As a result, workers were performing these tasks manually while the robots were down; officials told us that each of the firm’s automated processes has workers trained to perform the tasks in case a technology was not working properly. Technologies Viewed Differently by Firms Some firms find a technology to be useful while others find little practical application for that technology, as illustrated by the various opinions firm officials had about collaborative robots. Officials at one small manufacturer we visited said that a collaborative robot was well suited for the firm’s production process and environment because, among other reasons: (1) the firm produces small durable goods that require dexterity rather than speed, which the collaborative robot could provide; (2) the collaborative robot would be safe around workers and could be trained by non-technical staff, so the firm’s small workforce could adapt to its use; and (3) the collaborative robot could fit in the firm’s limited floor space, as it would not require a cage. On the other hand, officials at other manufacturing firms we visited told us that collaborative robots were less useful in their settings because they have significant weight and speed limitations in order to be safe enough to operate outside of a cage, limiting their usefulness for their firms. Some firm officials told us it could be risky to work with tech developers with limited experience. Officials at a large appliance manufacturer said that newer developers may go out of business or be bought out by a larger firm, which could render the technology acquired from them obsolete (especially in terms of future servicing of parts and software updates). The officials stated that emerging technologies, both hardware and software, tend to not be standardized, so investing in a developer likely means investing in a type of technology that may not be supported by other developers if issues arise. We heard from some firms that they purchased technology from developers who already had established reputations and longevity. For example, a small manufacturer of durable goods selected a robotics company because of the founder’s reputation and track record, among other reasons. Operational slowdowns: The time period between initial adoption and optimization of a technology varies widely and can sometimes be a lengthy and ongoing process, according to officials. One small stamp manufacturer experienced a lengthy and iterative implementation process for an off-the-shelf collaborative robot they purchased. For example, they had to construct a customized environment for the robot to function in, make parts by hand, purchase a 3-D printer to develop tools for the robot, and build additional parts to take care of increased byproducts like sawdust. Officials at a large automotive manufacturer told us that new technology, such as machine vision technology used for automated inspections, is often integrated on the weekends or during off-shifts. Then, on the first day of production after the new technology is integrated, the production line starts slowly and speeds up as worker comfort and experience increases. Outside of manufacturing, a consultant that helps facilitate the adoption of advanced technologies at firms said that firms’ existing, or legacy, computer infrastructure can be a barrier to integrating machine learning technology, increasing complexity and causing an extended implementation process as his firm integrates the new technology platform with the legacy infrastructure. Worker concerns: Officials at some manufacturing firms said they have encountered worker concerns with advanced technologies, and have employed various tactics to mitigate this, such as introducing workers to the technology in offsite demonstrations and involving them during the decision-making and planning before the technology was integrated. In one case, workers were able to ask questions about a collaborative robot as it was being installed and were provided with orientation training. The robot was then phased into operations—used initially for short periods of time so workers would become accustomed to its physical presence and proximity to their workstations. Deciding Not to Adopt Advanced Technologies Officials at the firms we visited identified instances in which they chose not to adopt certain advanced technologies, or not to use advanced technologies that were working well in other processes. Reasons we heard included: a product line had too much variation to benefit from advanced technologies (i.e., that some advanced technologies work better for standardized products and processes); a certain manufacturing process was too low-volume to invest time and resources into automation; and human dexterity is difficult to replicate. Officials from a large appliance manufacturer showed us an instance where using automation would not make sense. We observed a worker performing a simple, single task: grabbing a metal heat shield and plastic dishwasher spinner from separate bins and clipping one on to the other. Because of the shape of the pieces and because they were lying unorganized in boxes, the task requires human dexterity, making the process difficult to automate, according to officials. Officials at many of the firms we visited said they needed fewer workers in certain positions after adopting advanced technologies to perform tasks previously done by workers. Officials at these firms generally told us they adjusted by redeploying workers to other responsibilities and, in certain instances, reducing the firm’s workforce size through attrition. We also heard examples of direct layoffs due to the adoption of technologies. There may also be other types of adjustments firms can make that we did not observe or discuss with these officials. The complexity of these workforce adjustments makes it difficult to determine or measure the effects of technology adoption on workers. For example, although workers may not have lost their jobs due to an adopted technology taking over specified work tasks—either because of redeployments or attrition— fewer job opportunities might be available in the future for workers with similar skills. In addition, the iterative and sometimes lengthy process of incorporating advanced technologies can delay workforce effects. Thus, the absence of short-term effects of technology adoption does not necessarily preclude long-term implications, such as reductions or slower growth rates in workforce size over time (see text box below). As discussed in the prior section, one reason firm officials are motivated to use advanced technologies is to decrease labor costs. Slower Workforce Growth than Revenue Growth An official from a small automotive parts manufacturer told us that advanced technologies and automation resulted in revenue increasing by more than 400 percent over the last 12 years while the workforce increased about 15 percent. Production workers now make up a smaller percentage of the overall firm workforce than prior to automation, and sales and support staff now make up a greater percentage. The firm official described this change as an increase in higher-skilled jobs and a decrease in lower-skilled jobs. Similarly, according to firm officials at a different medium-sized automotive parts manufacturer, revenue has grown six times in the past 15 years while the workforce has grown four times, largely as a result of adopting robotics technology. Redeployments without job loss: When advanced technologies replaced positions, firms we visited often shifted, or redeployed, workers to different responsibilities. For example, officials at a medium-sized automotive parts manufacturer we visited told us they had nine workers who smoothed sharp edges and removed burrs on hydraulic cylinders prior to installing two robots to perform these tasks. Now, with the robots in these positions, three workers load the robots and then inspect and de- burr any parts of the cylinders the robots missed. The other six workers were redeployed to other tasks, according to a firm official. At a large appliance manufacturer we visited, officials told us that two workers used to move large parts from one line to another line to be painted. Now, as we observed, a collaborative robot performs this function alone; a worker monitors the operation to ensure it is running smoothly, and the original workers were moved to different tasks on the production line, according to officials. Although the size of these firms’ workforces did not decrease as a result of the technology adoption, the numbers of certain positions were adjusted—for example, production positions decreased while monitoring positions increased. Differences in skills required for these positions may also affect the ability of current workers to transition and could have implications for individual workers even though the number of jobs at the firm does not change. These sorts of changes may or may not appear in firms’ reported employment data, depending on whether redeployed workers change occupations or what other workforce changes may be occurring simultaneously (e.g., if other production workers are hired for reasons unrelated to the technology adoption). Redeployments with job loss through attrition: Officials at some of the selected firms that redeployed workers said they also reduced their overall workforce size through attrition, as a result of adopting advanced technologies. Autonomous mobile robots independently transported biohazardous waste, linens, meals, and prescription drugs throughout the university- affiliated medical center we visited. Officials told us they eliminated 17 positions after they deployed the robots. No workers were laid off; instead, they relied on high staff turnover rates and moved workers to vacant positions elsewhere. At a medium-sized fruit processing plant, firm officials told us they replaced 150 to 200 jobs with various advanced technologies over the past 3 to 4 years. However, they relied on attrition rather than layoffs. For example, the plant adopted a robot to pack food into boxes. Prior to using the robot, officials told us there were 26 workers per shift performing this job; as of our visit, there were 13 workers per shift. A medium-sized door manufacturer reduced its workforce from 650 employees to less than 500 over approximately the last 20 years due to, among other things, their adoption of robots, according to firm officials. For example, we observed industrial robots that load steel sheets into a cutting machine, reading a barcode on each sheet that tells them what size sheet is being lifted and how it should be placed in the cutting machine. This process only requires a single worker to monitor the robots during each of two shifts, where previously three workers per shift were on this production step (i.e., a change from six to two workers total). How quickly workforce reductions materialize for firms using attrition can vary greatly. We visited firms with low employee turnover rates and firms with high turnover rates. High worker turnover rates allowed some firms to more quickly adjust their workforces when deploying advanced technologies and may be a reason we were told about job loss through attrition rather than layoffs at these firms. Job loss through layoffs: An official from a systems integrator firm (“integrator”) provided examples of significant layoffs as a direct result of advanced technologies. This integrator provides machine learning technology and other similar products to automate office and administrative processes, among other things. One of the integrator’s customers—a U.S. automotive parts firm facing competition from online retailers—adopted machine learning technology to take over its accounts payable and distribution system. As a result, according to the integrator’s official, this firm reduced the number of employees in one of its U.S. offices from 500 to 200. Another of this same integrator’s customers—a firm that sells telecommunication circuits—adopted machine learning technology to automate product returns processing. As a result, the firm experienced a 30 percent reduction in customer care calls, and replaced about 150 jobs in a U.S. call center with 110 jobs at a call center in a different country (i.e., about 150 U.S. jobs lost; and an overall workforce reduction), according to the integrator’s official. According to officials at some selected firms, greater competitiveness and productivity due to the adoption of advanced technologies (see sidebar) has helped firms grow their workforces. For example, some hired additional production workers due to increased production (despite some production tasks being taken on by the adopted technologies), or new types of workers, such as technicians to maintain the technologies. Some officials also said that although they may not have grown their workforces, adopting advanced technologies helped them stay in business by allowing them to compete effectively, and thus to preserve jobs and retain workers. For example, officials at a medium-sized door manufacturer, where we observed numerous robots in the production facility, told us that their firm “could not survive” global competition without the use of advanced technologies. Productivity and Efficiency Gains Adopting advanced technologies has helped some firms improve their product quality and increase their production efficiency. For example, according to officials at a medium-sized fruit processing plant, after the firm began using an automated fruit grading technology, the process took significantly less time and resulted in far fewer complaints from farmers about the grading. Farmers thought the automated grading technology was fairer and more accurate than having workers manually and subjectively grade the fruit. A large appliance manufacturer that began using a collaborative robot to apply sealant to an appliance door observed improved consistency, which led to fewer service calls from retailers and customers about excessive, insufficient, or incorrect seals. One medium-sized door manufacturer said that automation technologies enabled them to produce and ship doors in 3 days, as opposed to 4 to 6 weeks. An official from a warehouse for a regional chain of grocery stores said that using automated guided vehicles allowed the firm to save time moving pallets from one end of the warehouse to the other, and also save worker hours. The warehouse saves just over $2 per pallet moved by an automated guided vehicle rather than a worker, and up to $3,500 a day based on volume, according to the official. Advanced technologies enabled some selected firms to increase production or produce a larger range of goods, and thus to hire additional production workers. This also led to workforce increases for suppliers and other firms, according to officials. One large appliance manufacturer increased its use of robots and other advanced technologies to produce more of its own component parts internally instead of relying on suppliers. As a result, the firm was also able to increase the number of production jobs, according to firm officials. Due to advanced technologies, a small automotive parts manufacturer was able to bid on a contract to produce a new and more intricate part for a major automotive manufacturer. An official described how the part was so intricate that it could not have been produced manually with the required level of consistency and speed. Although the firm adopted six robots to produce this part, winning the contract also created nine new jobs. While the robots are completing much of the production, the volume of parts demanded and the existence of some tasks that only workers can complete has led to this job growth. A developer of autonomous mobile robots said that, as a result of increased business, his firm has created jobs among its eight local suppliers where he buys parts, such as motherboards for the robots. Growth of Developer and Integrator Firms Selected developer firms we met with said they grew their technical and non-technical staff as a result of increasing demand for their technologies. A firm that develops and produces robots had tripled its workforce size, to about 130 employees, in the last year alone, according to officials. An official at another developer firm that makes inspection robots said they had grown from three workers to about 20 and envisions expanding to 100 in the near future. The official said that the firm’s first years were spent on technology development, but that once the technology was deployable to customers, the firm grew its workforce size. Integrator firms that help companies adopt advanced technologies have also grown in size, and new types have emerged, according to integrators we visited. For example, with the development of smarter robots, one integrator firm we visited entered the industry to recondition and sell old robots; the firm also adds newer technology to these robots if requested. This integrator has grown from 35 to 45 employees in the last 10 years, according to officials, with the new positions being primarily robot technician jobs. As a result of technology adoption, some firms hired more workers with technical skills, and in other instances lower-skilled workers, according to firm officials. An official from a warehouse for a regional chain of grocery stores said that adopting an advanced automation system created a need for three additional workers to provide preventive maintenance on the machines. These additional positions pay about 25 percent more than the standard warehouse positions, according to officials. At a large automotive manufacturer, officials told us the firm increased its number of lower-skilled cleaning jobs when robots began producing large amounts of byproduct. At the firms we visited, workers changed roles and tasks as a result of advanced technology adoption, such as focusing more on interactive, cognitive, higher-skilled, and monitoring tasks, and in other cases focusing more on lower-skilled tasks. Workers who can adapt and be flexible to task changes may experience positive effects, including work that is less physically taxing, safer, more ergonomic, less monotonous, or higher paying. On the other hand, workers who are unable to adjust to changing tasks may be negatively affected. Officials at some of the firms told us that their firms provided internal training or leveraged external resources to develop workers’ skills to help them move into new positions. During our visits to selected firms, we saw a variety of ways in which tasks for workers are changing. Interactive work: The use of autonomous mobile robots to deliver prescription drugs for patients enabled nurses at the university-affiliated medical center we visited to focus more of their time on patient interaction, according to officials. The small stamp manufacturer we visited would like to continue to automate its ordering process and focus more on providing customer service. Officials there said for future hires, they plan to recruit for data and people skills, rather than production skills. Cognitive work: A federal statistical agency adopted machine learning technology to automatically interpret text narratives on forms and assign codes to the data. As a result, staff who previously entered this information manually are able to spend more time on analytical tasks such as reviewing the accuracy of the auto-coding, correcting issues, obtaining clarifications about information submitted on the forms, and following up with non-respondents, according to officials. Higher-skilled work: At a large automotive manufacturer, due to increased use of advanced technologies, workers who are hired today need to have greater technical proficiencies than workers hired in the past. For example, to adapt to their changing roles working with robotic equipment, non-technical production staff need machine maintenance and technical skills, rather than only manual dexterity skills. Officials at a large appliance manufacturer that adopted an automated machine to stamp metal said that the resulting process required a single worker to monitor the machine and provide basic maintenance. This worker needed technical skills and at least 6 months of training to effectively perform these duties. In contrast, at another one of this firm’s global plants, four separate pressers are used and each requires workers to load and unload metal. Monitoring work: Officials at the large appliance manufacturer mentioned above showed us a step in their production process in which two small pieces of plastic and metal need to be attached. Three workers used to perform this task by hand, which caused ergonomic challenges, and inconsistencies in both quality and production cycle times. Now, the firm uses three robots to perform this work and a single worker loads the pieces for all three robots and monitors their performance. At a small automotive parts manufacturer, production operators who work in cells with robots monitor multiple machines and sometimes also monitor multiple work cells, so a greater aptitude level is needed. As a result, these operators earn $3 per hour more than operators in work cells without robots, according to a firm official. Less physically taxing work: Staff at some firms also told us how advanced technologies have made worker tasks less physically demanding. For example, we talked with one warehouse worker who used to lift heavy boxes, but who now operates a forklift after his old task was automated with a conveyer belt and sorting system. He described his new position as having ergonomic benefits, including experiencing less back pain. At a large automotive manufacturer, officials said the firm installed six robots to paint vehicle interiors. This production step was a major ergonomic hazard and workers who did this painting had a relatively high injury rate, according to officials. Officials told us that adopting the robots lowered the injury rate among these workers and resulted in faster vehicle painting. Simplified work: At a small stamp manufacturer that adopted a collaborative robot, officials told us that as the firm continues to redesign and optimize operations, the robot will take on more complex tasks. As a result, the remaining production work performed by the firm’s production worker will be simpler (see fig. 7). Officials said that in the future, after the firm’s current production worker retires, the firm may rely on contingent workers to perform any needed production work not completed by the robot because the tasks will be simpler and easier to train a new, temporary worker to complete. Officials said the firm may also hire a worker with a different and more varied skillset who can perform the few remaining production tasks along with other types of tasks. Lower-skilled work: Officials at a medium-sized door manufacturer installed a robot to facilitate the firm’s redesigned door sealant system and production process. The original process of manually applying door sealant was physically-intensive, ergonomically challenging, and required significant skill and experience to precisely apply the sealant. With the new design, a robot applies the sealant autonomously. As a result, workers perform lower-skilled tasks in this process, including placing a piece on a platform, visually inspecting the robot’s work, cleaning and setting up the robot’s work station, and confirming the correct program is entered in the computer. Adaptability to changing daily work demands: Officials from selected firms told us that due to advanced technology adoption, workers need to change tasks depending on the day and circumstances. For example, at a large appliance manufacturer some workers serve in different capacities depending if the robots are functioning properly and depending on the production needs of that day. On the day we visited the plant, several of the robots were malfunctioning and workers were performing the robots’ tasks. Firm officials said that some of their workers serve in swing roles and move around to different production processes and assist as needed. Training Centers for Advanced Tech Skills We met with officials at a training center that re-trains adults and teaches high school students to work with advanced technologies used in manufacturing. We visited two firms in the area that told us that this training center helps fill a local shortage in maintenance technician skills, and that they have hired workers who graduated from the center. Officials at the training center said that there is a high demand in the area for maintenance technicians. For example, they said that a large automotive manufacturer in the area is planning to hire 800 maintenance technicians over the next 3 years, and that the firm is worried about how it will fill these positions. Officials at the training center also said that some firms have such a high demand for maintenance technicians that they hire high school students who complete the training program before they graduate high school. The training center is piloting its adult training program. The program recruits adults who are underemployed and have some mechanical aptitude, then trains them in advanced technologies used in manufacturing. Most of the students who participated in an early pilot obtained higher paying jobs than those they held before the program, according to officials at the training center. Many firms we visited offered training for workers to adapt to their changing roles and tasks, particularly when the tasks or roles became more technical. Some firms used internal training resources and some leveraged local training centers (see sidebar). Some technology developers also offered training to firms that adopted their technologies. Officials at some firms told us that training current workers for more technical positions was easier than finding workers with the appropriate skills. For example, officials at one medium-sized door manufacturer said they needed highly specialized engineers, but could not find any in the region. As a result, this firm offered tuition reimbursement for workers who were willing to go back to school to become engineers. They also partnered with local community colleges to train students to become future maintenance technicians. Officials at a large automotive manufacturer said that due to increases in the firm’s use of advanced technologies, the plant has needed to hire more technicians. As a result, this firm added programs to its on-site training center to train workers for these roles. The complex job changes we observed at the selected firms we visited are not currently captured in federal data, though they may have significant implications for broader employment shifts. As the primary agencies responsible for monitoring the U.S. economy and workforce, the Departments of Commerce and Labor are aware of the importance of advanced technologies as major drivers of changes. For example, Census’ newly administered Annual Business Survey may provide valuable information in the future about the adoption and use of advanced technologies nationwide and the prevalence of resulting workforce effects. However, comprehensive data on firms’ adoption and use of advanced technologies do not currently exist, which prevents federal agencies and others from fully monitoring the spread of advanced technologies throughout the economy and linking their use to changes in employment levels or structural shifts in the tasks and skills associated with jobs. Observations from our visits to selected firms illustrate the complex and varied workforce effects that result from firms’ adoption of advanced technologies. In some circumstances, technology adoption will lead to increases in different types of jobs and in other cases technology adoption will lead to workforce reductions—either over time or immediately. Regardless of the firm-level workforce effects, worker roles and responsibilities are likely to change as advanced technologies take over tasks that workers previously performed. These changes could positively affect some workers, but could also have negative consequences for other workers, especially those who are unable to adapt to changes. For example, workers whose previous work tasks are automated and who are unable to perform new tasks required of them may need to seek new employment. If these changes occur occupation- wide, across many firms, workers may need to re-train or seek new employment in entirely different occupations or industries. To the extent that these changes are concentrated among occupations susceptible to automation, certain groups of workers (e.g., those with lower education levels) may be disproportionately affected and may lack the opportunity to develop skills needed to enter growing occupations. These workers will be in greater need of programmatic or policy supports, and federal workforce programs will need to be aligned with in-demand skills for the changing economy. Without comprehensive data that can measure the magnitude and variety of these firm-level changes, the workforce effects of the adoption of advanced technologies will remain unclear, job seekers may not be fully informed about their best future career prospects, and federally funded programs to support workers may be misaligned with labor market realities. DOL’s ability to collect information regularly on jobs and workers may enable the agency to fill these information gaps. Specifically, better data could be used by policymakers and DOL to proactively design and fund worker training programs that meet the job needs of the future. The Secretary of Labor should direct the Bureau of Labor Statistics (BLS) and the Employment and Training Administration (ETA) to develop ways to use existing or new data collection efforts to identify and systematically track the workforce effects of advanced technologies. For example, the Secretary could select any of the following possibilities, or could identify others. BLS could expand existing worker or firm surveys to ask respondents whether advanced technologies have resulted in worker displacements, work hour reductions, or substantial adjustments to work tasks. BLS could expand its employment projections work to regularly identify occupations projected to change over time due to advanced technologies. ETA could expand the O*NET data system to identify changes to skills, tasks, and tools associated with occupations, as the information is updated on its rotational basis, and consider how this could be used to track the spread of advanced technologies. (Recommendation 1) We provided a draft of this report to DOL, Commerce, NSF, and OSTP for review and comment. We received written comments from DOL that are reprinted in appendix II and summarized below. DOL and Commerce provided technical comments, which we incorporated as appropriate. NSF and OSTP told us that they had no comments on the draft report. DOL agreed with our recommendation to develop ways to identify and track the workforce effects of advanced technologies. DOL stated that it will continue coordinating with the Census Bureau on research activities in this area, and that it plans to identify and recommend data collection options to fill gaps in existing information about how the workplace is affected by new technologies, automation, and AI. DOL also stated that it plans to release employment projections annually instead of every 2 years, beginning in 2019. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Labor, the Secretary of Commerce, the Director of the National Science Foundation, the Director of the White House Office of Science and Technology Policy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or brownbarnesc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The objectives of this review were to examine (1) what is known about how the adoption of advanced technologies affects the U.S. workforce; (2) selected federal agency efforts to track and monitor the adoption and workforce effects of advanced technologies; (3) considerations that led selected firms to adopt advanced technologies and the risks they faced; and (4) ways technology adoption has affected the workforce at selected firms. Throughout the report, we use “advanced technologies” as a broad term to describe technological drivers of workforce changes, including but not limited to those identified in the National Academies study: artificial intelligence; machine learning; robotics; autonomous transport; advanced manufacturing; 3D printing; advanced materials; computing power; and internet and cloud technology. The technologies we observed at work sites could generally be categorized as applications of robotics, machine learning (e.g., machine vision or autonomous navigation), or both. However, not all technologies that may affect the U.S. workforce in the future—through automation or in other substantial ways—fall into these categories. Our use of the broad term “advanced technologies” leaves open the possibility that new technologies and other areas of focus are likely to emerge. To examine what is known about how the adoption of advanced technologies affects the U.S. workforce, we explored the extent to which available federal data could identify and measure these effects, and we identified limitations with available data. Because there was no comprehensive data that link employment trends to technology adoption, we used a study by Frey and Osborne to identify a group of occupations susceptible to automation. We then analyzed whether the concentration of these occupations in industries is correlated with growth in tech jobs or employment declines in those industries, whether job displacements are more common in these occupations than in others, the characteristics of workers who hold jobs in these occupations, and the geographic concentration of jobs in these occupations. We analyzed employment data from the Census Bureau (Census) and the Bureau of Labor Statistics (BLS); specifically, the American Community Survey (ACS), the Current Population Survey’s (CPS) Displaced Worker Supplement, and the Occupational Employment Statistics (OES) survey. For more information, see detailed discussions of our data analyses in sections 1-3 below. Identifying occupations susceptible to automation: Using a model that evaluates tasks within an occupation, Frey and Osborne estimate a probability of automation for 702 occupations. They identify occupations with a probability greater than 0.7 as being at high risk of automation. In our analyses, we thus consider this collection of occupations as those susceptible to automation. While there are different studies that attempt to predict what occupations or jobs may be automated in the future, we use the work by Frey and Osborne because it is widely cited and because its results are structured to allow us to identify a broadly inclusive collection of occupations susceptible to automation. The results of our analyses could be affected by using other studies to the extent that they identify different occupations as susceptible to automation. The accuracy of any collection of occupations is limited by the unpredictability of when or if jobs are automated, as well as the fact that occupations are comprised of a variety of jobs, which may experience automation to varying degrees or in different ways. We also reviewed examples of recent and ongoing studies that attempt to measure workforce effects directly attributable to technology adoption. We identified examples of research through interviews with knowledgeable individuals and from among those included in a recent review of the state of empirical work. Our review of studies was not meant to be comprehensive of the research in this area. To identify selected federal agencies’ current and planned efforts to collect data on, and monitor the prevalence and effects of advanced technologies in the economy, we met with the Departments of Labor (DOL) and Commerce (Commerce), as the principal federal agencies responsible for collecting data on the U.S. economy and workforce; the White House Office of Science and Technology Policy (OSTP), which leads interagency science and technology policy-coordination efforts across federal agencies; and the National Science Foundation (NSF), which was involved in the development of the Annual Business Survey. We interviewed officials and reviewed data and information collected by these agencies. We also reviewed the Annual Business Survey’s questionnaire to consider the potential uses of data being collected by the survey, and analyzed data from DOL’s Employment Projections program and Occupational Information Network (O*NET) database to identify information related to the adoption and workforce effects of advanced technologies. Annual Business Survey: The Annual Business Survey was administered for the first time in summer 2018, and collects information from firms about various topics, including innovation and technology use. The survey is a joint effort by the Census Bureau and the National Center for Science and Engineering Statistics within the National Science Foundation and Census plans to administer the survey annually for 5 years. The Annual Business Survey replaces the 5-year Survey of Business Owners, the Annual Survey of Entrepreneurs, the Business R&D and Innovation for Microbusinesses survey, and the innovation section of the Business R&D and Innovation Survey. Employment Projections program: BLS’s Employment Projections program analyzes changes in the economy, among other things, to project how employment by occupation may change over the next 10 years, including which occupations may be affected by advanced technologies. BLS’s projections are for the most part structured around the Occupational Employment Statistics, which produces employment and wage estimates for over 800 occupations. As part of this program, BLS develops a table of occupations that are projected to have direct employment changes due to some identified reason. According to BLS officials, the specific reason listed for each occupation is based on BLS’s judgment of the most significant factor or factors affecting the occupation (i.e., based on a qualitative assessment). We examined the reasons listed in this table and identified those related to the adoption of advanced technologies in an occupation, such as through automation, the increased use of robots or artificial intelligence, advances in machine or software technologies, or other similar changes. We then counted the number of unique occupations projected to experience declines in their shares of employment in an industry or group of industries due to one of these reasons. We also counted these occupations according to their major occupation group. BLS projected that some of these occupations would experience employment share declines in all industries and some would experience employment share declines in a single industry only. We counted unique occupations regardless of what industries or how many were noted (e.g., all industries or only one). We chose to do this to capture an inclusive list of occupations projected to be affected by advanced technologies, and because we are not using the list to quantify total projected employment changes. Of the 247 unique occupations BLS includes in its table as projected to have direct employment changes due to some identified reason, BLS projects that 163 will experience employment share declines— 100 of those occupations are projected to change broadly as a result of the adoption of advanced technologies. An employment share decline indicates that employment in an occupation will decline relative to others in a given industry or group of industries, not that the occupation will necessarily experience a decrease in employment in absolute terms. Occupational Information Network (O*NET) database: The O*NET database contains information about the skills, tasks, and tools (i.e., use of technology) associated with specific occupations. We downloaded two components of the database that (1) list the various work tasks associated with each occupation, and (2) list the various tools and technologies used by each occupation. In each database component, we searched for and identified tasks, tools, and technologies that involved robots in some way—e.g., tasks such as working with robots, robotic systems, or robotic applications, and tools such as welding robots, loading robots, or robot automation tools. We then counted the number of unique occupations that (1) had an associated work task related to robots, or (2) used a robot-related tool in the occupation. To understand firms’ adoption of advanced technologies and any resulting workforce effects, we met with officials representing 16 different firms that are using advanced technologies in their operations, as well as a systems integrator who provided detailed information about how several customer firms are using advanced technologies. Most of the meetings with firms were in-person site visits; three of the meetings with firms and the meeting with the systems integrator were by phone. Throughout this report, we use the term “firm” for simplicity, although the “firms” we met with included production plants of large manufacturers, single-location firms, public sector agencies, and other entities (see below). We also identify the manufacturing firms we visited as falling into one of three different size groups to describe their relative size differences from each other. The manufacturing firms we visited ranged from eight employees to thousands, according to firm officials. For the purposes of our study, we define small as fewer than 200 employees; medium as 200 employees to 1,000; and large as over 1,000 employees. Among the 16 firms we met with that are using advanced technologies, 10 are manufacturing firms: a small manufacturer of rubber stamps and embossing seals (also referred to as a small stamp manufacturer); two medium-sized door manufacturers; a small automotive parts manufacturer; a medium-sized automotive parts manufacturer; two large appliance manufacturers; a large automotive manufacturer; a large manufacturing corporation of household and personal care a medium-sized fruit processing plant. Six are non-manufacturing firms of various types: a construction consulting company; a federal statistical agency; a food retail corporation; a municipal township; a university-affiliated medical center; and a warehouse for a regional grocery store chain. The firms about which we received information from the systems integrator were business, administrative, and customer relations offices of various firm types. To identify firms to meet with, we consulted and sought referrals from a variety of knowledgeable sources, including academic researchers, technology developer firms, technology integrator firms, state economic development associations, and our own research. We selected firms that varied in size, industry sector, types of advanced technology used, and geography. We limited our focus to firms that had adopted advanced technologies and had experienced workforce effects. Our selection of firms is not a generalizable sample, but does provide illustrative examples of the adoption and workforce effects of advanced technologies. During our site visits at firms, we met with one or more management officials and, at times, with workers. We were also able to view the advanced technologies being used in operations. Our discussions with officials included topics such as motivations for adopting advanced technologies, the integration process, and any workforce effects that resulted from the technologies, including positions lost or gained and how workers’ tasks and skills may have changed. Our site visits and interviews with firm officials ranged from hour-long conversations to full-day visits, so some site visits yielded more detailed information than others. In addition to the firms that use advanced technologies, we interviewed seven technology developer firms and two robotics integrator firms (in addition to the systems integrator mentioned above). We met with these firms to learn more about some of the technologies being used and the adoption process, as well as about workforce effects at these firms. We identified these developer and integrator firms from various sources, including our conversations with academic researchers and our own research. We conducted additional interviews to obtain background and context for our work. We met with individuals knowledgeable about issues related to the adoption and workforce effects of advanced technologies, such as academic researchers and economists, officials from two unions representing manufacturing workers, officials at three industry-based organizations, officials from two state economic development associations, and officials at two worker training centers. For all objectives, we also reviewed relevant federal laws and regulations. The remainder of this appendix provides detailed information about the data and quantitative analysis methods we used to examine what is known about the workforce effects of automation and the adoption of advanced technologies (objective 1), as follows: Section 1: Analyses using data from the ACS Section 2: Analyses using data from the CPS’s Displaced Worker Section 3: Analyses using data from the OES survey For each of the datasets described below, we conducted a data reliability assessment of variables included in our analyses. We reviewed technical documentation and related publications and websites with information about the data. We spoke with BLS and Census officials who maintain the datasets to gain an understanding of and provide context for the various data that we analyzed, as well as to resolve any questions about the data and to identify any known limitations. We also tested the data, as applicable, to check for logical consistency, missing data, and consistency with data reported in technical documentation. We determined that the variables we used from the data we reviewed were sufficiently reliable for the purposes of this report. This section describes the quantitative analysis methods we used to examine employment trend correlations and the characteristics and earnings of workers in occupations susceptible to automation (as identified by Frey and Osborne; see above). We used ACS data for these analyses. The ACS is administered by the Census Bureau and is an ongoing national survey that uses a series of monthly samples to produce annually updated estimates for the same areas surveyed via the decennial census. The ACS collects a range of information about individuals from a large sample of households—over 2.2 million respondent households in 2016—including employment information such as occupation, industry, and earnings, and demographic information such as age, gender, race, ethnicity, and educational attainment. We limited our analysis to workers who were classified as current employees, and who had earned positive wage and salary income in the prior 12 months. In 2016, this resulted in observations representing 136 million workers, close to the number reported by BLS for that same period using a different survey. This report primarily used ACS data from 2010 through 2016—specifically, we relied on the Census Bureau’s Public Use Microdata Sample of the ACS for the single years 2010, 2011, 2012, 2013, 2014, 2015, and 2016. To test whether industries with higher concentrations of individuals in occupations susceptible to automation (as identified by Frey and Osborne) have experienced employment changes, we examined their correlation with changes in tech job concentration and changes in overall employment from 2010 through 2016. We limited the analysis to this period both because the ACS occupation codes changed in 2010 and because it allowed our results to post-date the economic recession of 2007-2009. We used industry definitions set by the ACS data, which groups some industries together—e.g., residential and nonresidential construction industries are combined in a single construction industry grouping. We defined tech jobs as those in computing, engineering, and mathematics occupations, consistent with previous GAO work on the tech field. We also examined an alternative definition of tech jobs in which we included those with “computer” in the occupation title. For both definitions, we estimated the number of tech jobs in each industry in each year, 2010-2016. We then calculated the growth rate in the number of tech jobs in each industry, and correlated that growth rate with the percentage of workers in that industry in occupations susceptible to automation (as identified by Frey and Osborne). We also estimated the number of workers overall in each industry in each year (2010-2016) and correlated the trend in total employment with the percentage of workers in that industry in occupations susceptible to automation (as identified by Frey and Osborne). We restricted our correlation analyses to those industries where the tech job growth rate or the overall employment trend was statistically significant. We performed two correlation tests. The Spearman test measures correlation between the rank of the two sets of values. The Pearson test measures correlation between the values themselves. As shown in table 2, we found a positive but weak correlation between industries with higher concentrations of jobs susceptible to automation and their concentration of tech jobs, based on both correlation tests and both definitions of tech jobs, and we found no meaningful correlation with change in overall employment in either test. To explore an example industry—the plastics product manufacturing industry—in further detail, we identified the number of jobs susceptible to automation within that industry, by occupation and groups of occupations. We also examined the growth in tech jobs within the industry, by tech occupation. We approximated each occupation’s contribution to the overall growth of tech jobs in the industry by multiplying their individual growth rates over the period 2010-2016 by their employment in 2010. The growth rates for the three engineering occupations, which when combined, account for more than half of the industry’s growth in tech jobs, were each significant at the 85 percent confidence level. To analyze the characteristics of workers in occupations susceptible to automation (as identified by Frey and Osborne), as well as the characteristics of workers with tech jobs, we used 2016 ACS data. We examined data on the workers’ gender, level of education, age, race and ethnicity, and hourly wage, and compared distributions of workers in occupations susceptible to automation and workers in all other occupations (see table 3). For race and ethnicity categories, we included only non-Hispanic members of White, Black, Asian, and Other categories, and the Hispanic category included Hispanics of all races. The “Other” category included American Indian or Alaskan Native, Native Hawaiian or Pacific Islander, two or more races, and other race. To analyze education level, we combined all attainment levels from a high school degree or less. To estimate the hourly wage of workers, we divided the wage and salary earnings of the worker by their usual hours worked and weeks worked. To test the reliability of this measure, we compared our results to average hourly wages reported by other BLS surveys; we found that the average values were sufficiently close to determine that this method was sufficiently reliable for our purposes. To investigate whether differences in hourly wage might be due to other factors, we estimated multiple regression models that enabled us to control for additional variables. Specifically, we estimated wage differences between workers in occupations susceptible to automation and workers in other occupations—i.e., whether a worker was in an occupation susceptible to automation (as identified by Frey and Osborne) was our primary independent variable (a binary, yes/no variable). Because we used the natural log of the hourly wage as the dependent variable, the standard interpretation of the regression coefficient of this variable is that it represents the average log point difference in hourly wages between occupations susceptible to automation and all other occupations. This coefficient can be made to more closely approximate a percentage difference in hourly wages or an earnings gap by taking the exponent and subtracting 1. As noted previously, we limited our analysis to workers who earned positive wage and salary income in the prior 12 months. We also removed observations with outlier values for wages (e.g., wage rates above $140 per hour); this represented about 1 percent of the sample in 2016. We ran five regression models with different sets of independent variable controls. Regression (1) estimates the earnings gap without any controls (the uncorrected earnings gap). Regression (2) estimates the earnings gap with a set of independent variables that control for characteristics of the individual; these variables included age, race and ethnicity, gender, marital status, state of residence, and education level. Regression (3) estimates the earnings gap with independent dummy variables for 2-digit industry codes added; this corrects for any differences between industries at the 2-digit level. Regression (4) estimates the earnings gap with independent dummy variables for 2-digit occupation codes added; this corrects for any differences between occupations at the 2-digit level. Regression (5) includes both 2-digit industry and 2-digit occupation code dummy variables. As table 4 shows, we found a significant difference in hourly wages between workers in occupations susceptible to automation compared to workers in other occupations, even after independent variables to control for worker characteristics, industry, and occupation codes were included. Including the additional independent variables caused the earnings gap to fall from just over -34 percent to just over -10 percent. Regression model 3, which estimated an earnings gap of about -17.2 percent, is our preferred model, as it controls for individual worker characteristics and for any differences between industries at the 2- digit level, but does not include occupation as an independent variable. Including occupation variables controls for any differences between occupations at the 2- digit level. However, because we identify workers in jobs susceptible to automation based on their occupations, these occupation control variables are likely highly predictive of Frey and Osborne’s estimated probability of automation, which is used to categorize workers in jobs susceptible to automation. We also ran these regression models for other years from 2010 to 2016 and we found substantively similar results. This section discusses the quantitative analysis methods we used to compare relative job displacement rates between workers in occupations susceptible to automation (as identified by Frey and Osborne; see above) and workers in other occupations. We used data from the CPS’s Displaced Worker Supplement for these analyses. The CPS is sponsored jointly by Census and BLS and is the source of official government statistics on employment and unemployment in the United States. The basic monthly survey is used to collect information on employment, such as employment status, occupation, and industry, as well as demographic information, among other things. The survey is based on a sample of the civilian, non-institutionalized population of the United States. Using a multistage stratified sample design, about 56,000 households are interviewed monthly based on area of residence to represent the country as a whole and individual states; the total sample also includes additional households, some of which are not interviewed in a given month for various reasons, such as not being reachable. The CPS Displaced Worker Supplement has been administered every other year since 1984, and provides supplemental data on persons age 20 years or older who lost a job involuntarily in the prior 3 years, including data on reasons for job displacement, as well as industry and occupation of the former job. This report used data from the January 2016 Displaced Worker Supplement. To analyze whether workers in occupations susceptible to automation (as identified by Frey and Osborne) experience job displacement at differing rates than workers in other occupations, we used data from the CPS’s January 2016 Displaced Worker Supplement. We identified workers who lost or left a job involuntarily during the 3 calendar years prior to the survey (i.e., January 2013 through December 2015) because their position or shift was abolished or because there was insufficient work for them to do. We focused on these reasons for displacement as those that most closely approximate how advanced technologies could replace workers at a given firm. We also limited our analysis to those workers who did not expect to be recalled to their jobs within the next 6 months. We categorized these displaced workers according to the occupations from which they were displaced (e.g., workers displaced from occupations susceptible to automation and workers displaced from all other occupations). We calculated relative job displacement rates as the number of displacements over the period 2013-2015 reported by a given population (e.g., workers in occupations susceptible to automation), over that population’s total current employment in January 2016. Although this measure does not represent the total number of jobs that existed annually that could have resulted in displacements, it allows us to control for population size and to approximate a relative displacement rate. We examined various populations, including occupations identified as susceptible to automation by Frey and Osborne, occupations BLS projects will experience declines in their share of employment due to advanced technologies (see above), and production occupations. To categorize occupations, Frey and Osborne and BLS use Standard Occupational Classification (SOC) codes, whereas the Displaced Worker Supplement uses Census occupation codes. We used a crosswalk provided by Census to match these occupation classifications. SOC codes have a hierarchical structure—e.g., a “broad” occupation group contains a subset of “detailed” occupations. For example, SOC code 13- 1031 is the detailed occupation “claims adjusters, examiners, and investigators” within the broad group SOC 13-1030 (“claims adjusters, appraisers, examiners, and investigators”). When a direct crosswalk between SOC and Census occupation codes was not available at the detailed level, we used the associated broad SOC group to identify a Census occupation code. There were some respondents in the Displaced Worker Supplement who did not report the occupation from which they were displaced, and these were dropped from our analysis. To estimate the sampling errors for each estimate, we used strata defined by state because the Displaced Worker Supplement data did not provide replicate weights or the sampling strata necessary to obtain standard errors. When estimating the number of job displacements over the period 2013-2015 reported by a given population (e.g., workers in occupations susceptible to automation), we used the supplement weight for respondents. When estimating the population’s total current employment in January 2016, we used the CPS 2016 weight for respondents. We used a Taylor series linearization to estimate the sampling error of the ratio of estimated number of job displacements over the period 2013- 2015 to the estimated number of current employment in 2016. While our primary analysis examined relative displacement rates for workers in occupations susceptible to automation, we also conducted sensitivity analyses by considering other groups of occupations. Specifically, we examined the relative displacement rates of the following groups: Jobs susceptible to automation had a relative displacement rate of 3.4 percent +/- 0.3, and all other jobs combined had a relative displacement rate of 2.9 percent, +/- 0.2. Jobs in occupations BLS projects will experience relative declines in employment due to advanced technologies (see above) had a relative displacement rate of 3.7 percent, +/- 0.5, and all other jobs combined had a relative displacement rate of 3.6 percent, +/- 0.2. Jobs in production occupations had a relative displacement rate of 3.7 percent +/- 0.8, and all other jobs combined had a relative displacement rate of 3.1 percent, +/- 0.2. This section discusses the quantitative analysis methods we used to analyze geographic reliance on occupations susceptible to automation (as identified by Frey and Osborne; see above). We used OES data for these analyses. The OES survey is a federal-state cooperative effort between BLS and state workforce agencies, which collects information on occupational employment and wage rates for wage and salary workers in nonfarm establishments. The survey is based on a sample drawn from about 7.6 million in-scope nonfarm establishments in the United States that file unemployment insurance reports to the state workforce agencies. Using a stratified sample design, about 200,000 establishments are surveyed semiannually and employment estimates are based on six panels of data collected over a 3-year cycle. The final in-scope sample size when six panels are combined is approximately 1.2 million establishments. The OES survey includes all full- and part-time wage and salary workers in nonfarm industries, but excludes self-employed workers, owners and partners in unincorporated firms, household workers, and unpaid family workers. OES data provide occupational employment estimates by industry for the country as a whole, for individual states, and for more local geographic areas (e.g., metropolitan and nonmetropolitan areas). This report used data from the May 2017 Occupational Employment Statistics. To analyze what U.S. geographic areas rely more heavily on employment in occupations susceptible to automation, we used data from the May 2017 OES. For each local geographic area, we estimated how many jobs were in occupations identified as susceptible to automation by Frey and Osborne (see above) and how many jobs were in all other occupations. We also estimated how many jobs were in each group of occupations nationwide (using national-level data). We then calculated a location quotient for each local geographic area, which measures the proportion of each area’s jobs that were in occupations susceptible to automation compared to the national proportion of employment in these occupations. This measure depicts the extent to which a local geographic area relies on certain jobs for the employment of its population, relative to other areas. Based on their location quotients, we categorized and mapped 589 local geographic areas in the following three groups: Relatively High Concentration: Areas where the proportion of jobs susceptible to automation is at least 5 percentage points greater than the national average, and the difference is statistically significant at the 95 percent confidence level. This translates to an estimated location quotient of at least 1.1. Average or Relatively Low Concentration: Areas where the proportion of jobs susceptible to automation is within 5 percentage points above the national average or lower. Undetermined Reliance: Areas where the proportion of jobs susceptible to automation is undetermined. We classify an area’s proportion as “undetermined” if the estimated margin of error at the 95 percent confidence level is larger than 5 percentage points. We conducted one sided z-tests at the 95 percent confidence level to analyze each area’s estimated location quotient. The null hypothesis is that the area location quotient is less than or equal to 1.1 (i.e., the proportion of employment in the group of occupations in an area is 1.1 times the national proportion). The alternative hypothesis is that the area location quotient is greater than 1.1. Because estimated area employment proportions are based on a sample, we also restricted our tests to those areas that were reliable for our purposes by requiring that areas had sampling errors of no greater than 5 percentage points for a 95 percent confidence interval. According to BLS, employment estimates for individual occupations in individual local geographic areas may not be available in the public data for a variety of reasons, including for example, failure to meet BLS quality standards or to ensure the confidentiality of survey respondents. Because we aggregate data across multiple occupations, our methodology treats these cases as if employment in the given occupation in the given area was zero, which is not the case and which introduces imprecision into our analysis and the resulting location quotients. However, because ensuring confidentiality is a primary concern, we assume that most of these cases where data are suppressed would have relatively small numbers of jobs, and thus have minimal effects on our results. To test this assumption and to ensure the appropriateness of our methods, we compared the total number of jobs we analyzed across all local geographic areas to the total number of jobs reported at the national level (which do not have data suppressed). The total number of jobs analyzed across our local geographic areas was 5.5 percent lower than the total number of jobs reported at the national level, which we concluded was within an acceptable threshold to determine that the data were sufficiently reliable for our purposes and our analysis. In addition, according to BLS, because occupational employment estimates are rounded to the nearest 10 before publication, estimates of location quotients calculated from the public data will be subject to some rounding error, compared with location quotients calculated from the unrounded pre-publication data. In addition to the contact named above, Blake Ainsworth (Assistant Director), Michael Kniss (Analyst-in-Charge), Shilpa Grover, and John Lack made key contributions to this report. Also contributing to this report were James Bennett, Benjamin Bolitzer, Melinda Cordero, Holly Dye, Jonathan Felbinger, Sheila R. McCoy, Jean McSween, James Rebbe, Krishana Routt-Jackson, Benjamin Sinoff, Almeta Spencer, and Sonya Vartivarian.", "summary": "Advanced technologies—including artificial intelligence and robotics—are continually changing and emerging. While robots have existed for decades, modern robots may be equipped with learning capabilities that enable them to perform an expansive array of tasks. Advanced technologies are likely to affect the U.S. workforce by enabling firms to automate certain work tasks. Questions exist about how prepared federal agencies are to monitor workforce changes, promote economic growth, and support workers who may be negatively affected by automation. GAO was asked to examine workforce issues related to the adoption of advanced technologies. This report examines (1) what is known about how the adoption of advanced technologies affects the U.S. workforce ; (2) federal efforts to track these effects; (3) considerations that led selected firms to adopt advanced technologies and the risks they faced; and (4) ways technology adoption has affected the workforce at selected firms. GAO identified available federal workforce data, analyzed the extent to which those data could identify and measure workforce effects due to advanced technologies, reviewed selected research, and analyzed federal data on occupations susceptible to automation. GAO used data from the American Community Survey (2010-2016), the Current Population Survey's Displaced Worker Supplement (2016), and the Occupational Employment Statistics (2017). GAO met with 16 firms that are using advanced technologies in their operations and seven firms that develop advanced technologies, and interviewed managers and workers, and observed firms' use of technologies. The selected firms varied in size, industry sector, types of technologies used, and geographic location. Findings from discussions with the fims are not generalizable, but provide illustrative examples about the adoption of advanced technologies. GAO interviewed officials from federal agencies, including Commerce and DOL, academic researchers, economists, labor union officials, industry association officials, officials from state economic development associations, and other knowledgeable individuals. GAO also reviewed relevant academic work. Although existing federal data provide useful information on the U.S. workforce, they do not identify the causes of shifts in employment. As a result, it is difficult to determine whether changes are due to firms adopting advanced technologies, such as artificial intelligence and robots (see photo), or other unrelated factors. In lieu of such data, GAO analyzed employment trends and characteristics of jobs that selected researchers identified as susceptible to automation, and found that: industries with a greater proportion of jobs susceptible to automation were more likely to have experienced growth in tech jobs (i.e., computing, engineering, and mathematics) from 2010 to 2016—possibly an indicator of industries preparing to adopt advanced technologies; occupations susceptible to automation and industries with a greater share of these jobs did not experience meaningfully higher job loss rates in this period, though it could be too soon to observe these effects; and certain groups, such as workers with no college education and Hispanic workers, tended to hold jobs susceptible to automation in 2016, and thus could be disproportionately affected by changes if they occur. The Department of Labor (DOL) has a role in tracking changes in the U.S. workforce, but the data it collects related to the workforce effects of advanced technologies are limited. DOL's Bureau of Labor Statistics (BLS) identifies occupations projected to experience staffing pattern changes and the most significant causes, such as use of robotics, but its efforts are not designed to capture all instances of changes due to advanced technologies. DOL's Occupational Information Network program also collects data on tasks and technologies in occupations, such as robotics, but it was not designed to track changes over time. According to BLS, these efforts and other data they collect provide some, but not all, of the information required to identify and systematically track the impact of automation on the workforce. Without comprehensive data that link technological changes to shifts in the workforce, DOL lacks a valuable tool for ensuring that programs it funds to support workers are aligned with local labor market realities, and employers and job seekers need to rely on other sources of information to decide what training to offer or seek. The Department of Commerce's Census Bureau (Census) has started tracking technology adoption and resulting workforce effects in the new Annual Business Survey, which was administered for the first time in June 2018 with significant support from the National Science Foundation. This first survey asked firms about their use of advanced technologies and initial results will be available in late 2019. When the survey is next administered in summer 2019, Census plans to ask additional questions about firms' motivations for adopting technologies and effects the technologies might have on workers. This survey could provide information about the prevalence of technology adoption and workforce changes (e.g., declines in production workers or increases in supervisory workers), but it is not intended to provide information on the magnitude of workforce changes. Also, it remains unclear what limitations, if any, the survey data may have. According to officials from the 16 firms GAO interviewed, cost savings and other considerations led them to adopt advanced technologies, despite facing certain risks with the new technologies. Officials from these firms typically identified cost savings and improving job or product quality as primary motivations for adopting advanced technologies. For example, an automotive parts manufacturer said the firm adopted robots to reduce costs by using fewer workers. A door manufacturer said the firm installed two robots to lift heavy doors onto a paint line to reduce the number of worker injuries. A rubber stamp manufacturer said acquiring a robot (pictured above) allowed it to purchase and process raw materials instead of buying precut materials. Firm officials also identified risks related to adopting advanced technologies that could affect their return on investment, such as risks related to the reliability of technology and working with new tech developers. Among the firms GAO met with, officials described various ways technology adoption has affected their workforces. On one hand, officials at many firms said they needed fewer workers in certain positions after adopting technologies. The firms generally redeployed workers to other tasks, and in some cases, reduced the size of their workforces, typically through attrition. For example, a medical center GAO visited adopted autonomous mobile robots to transport linens and waste, among other things, which officials said eliminated 17 positions and shifted workers to other positions. On the other hand, officials at some firms said advanced technologies helped them increase competitiveness and add positions. An appliance manufacturer used advanced technologies to produce more of its own parts instead of relying on suppliers and, as a result, increased the number of production jobs, according to officials. Firm officials also noted that workers' tasks and skills have been changing due to advanced technologies (see figure). Workers who can adapt to new roles may experience positive effects, such as work that is safer, while those who cannot adapt may be negatively affected. GAO recommends that DOL develop ways to use existing or new data collection efforts to identify and systematically track the workforce effects of advanced technologies. DOL agreed with GAO's recommendation, and plans to identify and recommend data collection options to fill gaps in existing information about how the workplace is affected by new technologies, automation, and artificial intelligence. DOL also stated that it will continue coordinating with the Census Bureau on research activities in this area.", "document_type": "gao"}
{"report": "While female participation in the military dates back to the American Revolution, women have formally served in United States military units since 1901 with the establishment of the Army Nurse Corps. The Act of May 14, 1942 authorized the president to establish and organize a Women’s Army Auxiliary Corps for the purpose of “making available to the national defense when needed the knowledge, skill, and special training of the women of this Nation.” In 1948, the Women’s Armed Services Integration Act of 1948 authorized the military services to, subject to the provisions of the act, enlist and appoint women to their active and reserve components. Certain provisions of the Women’s Armed Services Integration Act of 1948, including limits on the number of women in the Navy and Marine Corps, were repealed in 1967, and additional changes to DOD policies have been made since then. For example, the Department of Defense Appropriation Authorization Act, 1976 directed the secretaries of the military departments to, among other things, take such action as may be necessary and appropriate to insure that women were eligible for appointment and admission to the military service academies. Almost two decades later, the National Defense Authorization Act for Fiscal Year 1994, among other things, required the Secretary of Defense to ensure that qualification of members of the armed forces for military occupational career fields open to both male and female members is evaluated on the basis of common, relevant performance standards without differential standards or evaluation on the basis of gender. It also repealed the remaining statutory prohibitions on the Secretary of the Navy assigning female servicemembers to duty on vessels and aircraft engaged in combat missions or expected to be assigned combat missions. In January 1994, the Secretary of Defense issued a memorandum creating the Direct Ground Combat Definition and Assignment Rule, which made servicemembers eligible for assignment to all positions for which they were qualified, but it excluded female servicemembers from assignment to units below the brigade level whose primary mission was to engage in direct combat on the ground. The memorandum required the services to coordinate approved implementing policies and regulations—including certain service restrictions on the assignment of women—with the Assistant Secretary of Defense for Personnel and Readiness prior to their issuance. The memorandum also permitted the services to propose additional exceptions. In its 2011 final report, the Military Leadership Diversity Commission stated that the services’ have been leaders in providing opportunities for all servicemembers, regardless of racial/ethnic background, or gender, and stated that the DOD’s mission-effective force is a living testament to progress in the areas of military equal opportunity policies and related recruiting and management tactics. The report also stated that more needs to be done to address 21st century challenges and that the Armed Forces have not yet succeeded in developing a continuing stream of leaders who are as demographically diverse as the nation they serve. A 2013 Secretary of Defense and Chairman of the Joint Chiefs of Staff memorandum rescinded the 1994 Direct Ground Combat Definition and Assignment Rule. That memorandum also directed the military services to open currently closed units and positions to female servicemembers, consistent with certain principles and with the implementation of certain standards. The memorandum also directed that the integration of female servicemembers into these newly opened positions and units occur as expeditiously as possible, considering good order and judicious use of fiscal resources, and no later than January 1, 2016. The military services also took action through issuing guidance. For example, in 2013, the Commandant of the Marine Corps issued a letter to Marine Corps leadership stating that it is imperative for the Marine Corps to take a fresh approach to diversity and establishing four task force groups, including one titled “Women in the Corps: Attract, Develop, and Retain Women Officers.” Subsequently in June 2014, the Secretary of the Air Force and Air Force Chief of Staff released a memorandum establishing active-duty officer applicant pool goals, which are intended to reflect the nation’s highly talented, diverse, and eligible population. More recently, in 2015, the Secretary of Defense determined that no exceptions were warranted to the full implementation of the rescission of the Direct Ground Combat Definition and Assignment Rule and directed the secretaries of the military departments and chiefs of the military services to begin to execute the implementation of their approved plans to open all military occupational specialties, career fields, and branches for accession by female servicemembers as soon as practicable and not later than April 1, 2016. Figure 1 presents a timeline of selected events in female participation in the military, including changes to laws and policies. Overall, the percentage of female active-duty servicemembers slightly increased from fiscal year 2004 through 2018. However, our analyses also determined that for fiscal years 2004 through 2018, female enlisted servicemembers and commissioned officers had higher attrition rates than their male counterparts, and the percentage of female active-duty servicemembers began to decrease at the 10–to-less-than-20-years of service career point, meaning a smaller pool of female servicemembers being available for leadership opportunities. We also found that female servicemembers are generally more likely to separate from the military, and that the reasons active-duty servicemembers separate from the military vary by gender, pay grade category, and length of service. In addition, other factors—such as access to quality childcare or family planning—have been found to influence female active-duty servicemembers’ separation decisions based on our review of existing literature. The services have experienced slight increases in their populations of female active-duty servicemembers from fiscal year 2004 through 2018. More specifically, the overall percentage of female active-duty servicemembers increased slightly department-wide within that 15 year period, from 15.1 percent in fiscal year 2004 to 16.5 percent in fiscal year 2018, with slight decreases identified in some years—for example, fiscal years 2005 through 2009. Comparatively, the percentage of males serving on active duty decreased from 84.9 percent in 2004 to 83.5 percent in 2018. In fiscal year 2018, the Air Force had the highest percentage of female active-duty servicemembers (20.2 percent), followed by the Navy (19.6 percent), the Army (15.1 percent), and the Marine Corps (8.6 percent). The Air Force also had the highest percentages of female enlisted and officers in fiscal year 2018 (20.0 percent and 21.3 percent, respectively). The Marine Corps (8.7 percent female enlisted and 7.9 percent female officer), had the lowest percentages in fiscal year 2018. Figure 2 shows the representation of active-duty servicemembers, by gender, organization, and pay grade for fiscal year 2018. The Air Force and the Army had higher percentages of female servicemembers than the Navy and Marine Corps in fiscal year 2004— the first year of the data we analyzed–-and those percentages remained relatively stable over the full 15 fiscal years of data we analyzed. Additionally, the percentage of female servicemembers in the Air Force remained higher in each year than in the three other services over that 15 year period. The Navy and the Marine Corps experienced larger increases in their overall percentages of female active-duty servicemembers from fiscal year 2004 through fiscal year 2018. For example, the overall percentage of female active-duty servicemembers in the Navy increased by 4.9 percentage points, from 14.7 percent in fiscal year 2004 to 19.6 percent in fiscal year 2018. The Marine Corps experienced an increase of 2.5 percentage points in that same time period, from 6.1 percent in fiscal year 2004 to 8.6 percent in fiscal year 2018. Figure 3 shows the percentage of female active-duty servicemembers across all services in select years from fiscal years 2004 through 2018, by their organization. We also found that although the percentage of female active-duty servicemembers generally increased across the department from fiscal year 2004 through 2018, the percentage of female active-duty servicemembers was higher for those with fewer years of service and generally decreased as years of service increased. Specifically, as figure 4 shows, the percentages of female enlisted and commissioned officers in all four services with either 10 to 20 years of service or 20 or more years of service were generally lower than those with less than 10 years of service. We also found that the percentages of women with more years of service were higher in more recent years, specifically in fiscal years 2014 through 2018 as compared to fiscal years 2004 through 2009. For example, in fiscal years 2014 through 2018, the percentage of female enlisted with 20 or more years of service (12 percent) was 2.2 percent higher than the percentage of female enlisted in fiscal years 2004 through 2009 (9.8 percent). Similarly, the percentage of female commissioned officers with 20 or more years of service in fiscal years 2014 through 2018 (12.1 percent) was 1.4 percent higher than female commissioned officers with the same length of service in fiscal years 2004 through 2009 (10.7 percent). In addition, the percentage of female warrant officers with 20 or more years of service in fiscal years 2014 through 2018 (8.3 percent) was 2.3 percent higher than female commissioned officers with the same length of service in fiscal years 2004 through 2009 (6 percent). From fiscal year 2004 through 2018, female active-duty enlisted servicemembers and commissioned officers had higher annual attrition rates than corresponding males during that same time period. However, the gaps between male and female attrition rates for enlisted and commissioned officers have narrowed in more recent years. Specifically, for fiscal years 2004 and 2018, enlisted female active-duty servicemembers’ annual attrition rates were 33.1 and 8.6 percent, respectively. In fiscal years 2004 and 2018, enlisted male active-duty servicemembers’ annual attrition rates were 22.7 and 6.1 percent, respectively. For fiscal years 2004 and 2018, female commissioned officer annual attrition rates were 10 and 0.7 percent respectively, while male commissioned officer annual attrition rates were 6 and 0.4 percent in those same years, respectively. In fiscal years 2004 and 2018, female warrant officer annual attrition rates were 12.5 and 0 percent, and male warrant officer annual attrition rates were 3.2 and 0 percent in fiscal years 2004 and 2018, respectively. Figure 5 shows active-duty servicemember annual attrition rates over time from 2004 through 2018, by gender and pay grade. Additionally, we developed a set of statistical models—all discrete time duration analysis—using data from fiscal years 2004 through 2018 which accounted for active-duty servicemembers’ time in service (i.e., the period of time from when they joined the military until their separation). The models estimated the association of gender with separation. We accounted for specific servicemember characteristics, such as gender, branch of military service, pay grade, race or ethnicity, marital status, and the existence of dependents to estimate the associations that these characteristics have with active-duty servicemembers separating from the service. The results of our statistical models show that female active-duty servicemembers are more likely to separate from the military than males at any given period of time in service. The average estimated likelihood of female active-duty servicemembers’ separation for each quarter year of time in service is 2.3 percent, while the average estimate for male active- duty servicemembers is 1.8 percent. In relative terms, the likelihood of separation for female active-duty servicemembers is 28 percent higher than the likelihood of separation for male active-duty servicemembers. When controlling for various individual and occupational characteristics— including pay grade categories, marital status, race or ethnicity, education level, occupation, and whether the servicemember has dependents— among others—female active-duty servicemembers’ average estimated likelihood of separating from the military per quarter year of time in service ranges from 1.8 percent to 3.1 percent, depending on their branch of service, while that for their male counterparts ranges from 1.4 percent to 2.3 percent, if other personal characteristics remain the same. In relative terms, the likelihood of separation for female active-duty servicemembers is estimated to be 13 to 46 percent higher than that of their male counterparts. Based on our statistical models, we also found the following by particular characteristics: Married versus unmarried without dependents: In all of the services, both female and male married active-duty servicemembers without dependents are more likely to separate from the military than unmarried male and female active-duty servicemembers without dependents. For example, the likelihood of separation for both female and male married active-duty servicemembers without dependents in the Air Force and the Navy are twice as high as male and female unmarried active-duty servicemembers without dependents in the same services. Married with dependents versus unmarried without dependents: Married male active- duty servicemembers with dependents in all of the services except the Air Force are less likely to separate from the military than unmarried males without dependents. However, married female active-duty servicemembers who have dependents and are serving in the Army, the Navy, and the Air Force are more likely to separate compared to unmarried female active-duty servicemembers without dependents. For example, in the Navy, the likelihood of separation for married female active-duty servicemembers who have dependents is 17 percent higher relative to that for unmarried female active-duty servicemembers without dependents. Comparatively, we estimate that the likelihood of separation for married male active-duty servicemembers in the Navy who have dependents is 28 percent lower than the likelihood of separation for unmarried male active-duty servicemembers in the Navy who do not have dependents. Unmarried with dependents versus unmarried without dependents: In all four services, unmarried female active-duty servicemembers who have dependents are more likely to separate from the military than their unmarried counterparts who do not have dependents. Our analysis produced similar results for unmarried male active-duty servicemembers with dependents, except for those serving in the Navy, who we found are less likely to separate than unmarried male active-duty servicemembers without dependents. More specifically, we estimate that the likelihood of separation for unmarried male and female active-duty servicemembers who have dependents and serve in the Army, Marine Corps, or Air Force, is from 9 percent to 32 percent higher than that for their unmarried male and female counterparts who do not have dependents. Further, we estimate that the likelihood of separation for unmarried female active- duty servicemembers who are serving in the Navy and who have dependents is 35 percent higher relative to the likelihood of separation for those female servicemembers who serve in the Navy and are unmarried and do not have dependents. Pay grade categories: Our analysis found that enlisted male and female active-duty servicemembers in all of the services are more likely to separate from the military than male and female active-duty officers and warrant officers within the same service. For example, we estimate that the likelihood of separation for male and female officers serving in the Navy is 62 and 63 percent lower, respectively, relative to the likelihood of separation for enlisted male and female active-duty servicemembers serving in the Navy. Race or ethnicity minority groups versus whites: In all of the services, black and Hispanic female active-duty servicemembers are less likely to separate from the military than white female active-duty servicemembers. All other racial or ethnic minority female active-duty servicemembers are also less likely to separate from the military than white female active-duty servicemembers except in the Army. More specifically, we estimate that black, Hispanic, and all other racial or ethnic minority female active-duty servicemembers in all of the services (except in the Army) are at least 13 percent less likely to separate from the military relative to white female active-duty servicemembers. All other racial or ethnic minority female active-duty servicemembers (except black and Hispanic) serving in the Army are estimated to be 26 percent more likely to separate from the military relative to white female active-duty servicemembers. In 2011, the Military Leadership Diversity Commission’s final report discussed explanations for discrepancies in representation among senior military leaders, including lower retention of mid-level female enlisted and officer servicemembers. Additionally, OSD officials stated that, in 2017, ODEI conducted an assessment of diversity and inclusion among officers that analyzed fiscal year 2012 through 2016 data to determine whether there was a difference between male and female retention within each of the services. According to DOD, ODEI found various increases and decreases in female retention; however, the officials stated that the assessment did not include an analysis to identify the reasons for the differences in retention among female servicemembers within the services. In its 2017 and 2018 reports, DACOWITS identified dual-military couples as facing retention challenges and the 2017 report stated that, proportionally, more female servicemembers are married to a military spouse than are male servicemembers. Additionally, in the 2017 report, DACOWITS stated that servicemembers who are separated from the military because of issues related to parenthood, including family care plans, are disproportionately female. The DACOWITS report further stated that, according to data provided to DACOWITS by the services, between fiscal year 2007 and 2016, female servicemembers represented between 65 and 83 percent of parenthood-related discharges. We also analyzed 15 years of separation code data (fiscal years 2004 to 2018) to identify the documented reasons why active-duty servicemembers separated from the military during that time. Our analysis of these data found that the reasons active-duty servicemembers separate from the military vary slightly based on gender, pay grade category, and length of service, as well as by time period. For example, misconduct was a top reason for separation from 2004 through 2013 for enlisted male servicemembers with 5 or fewer years of service, whereas pregnancy was one of the top three reasons for separation for female enlisted with 5 or fewer years of service, during that same period. However, neither misconduct for male servicemembers nor pregnancy for female servicemembers were found to be in the top three reasons for separation in fiscal years 2014-2018. The results of this analysis are shown below in figures 6, 7, and 8. To better understand other factors that may underlie a servicemember’s decision to separate, we reviewed a variety of studies on female active- duty servicemember retention in the military. Through our review, we identified six factors that were reported to influence female active-duty servicemembers’ separation from the military: work schedules, deployments, organizational culture, family planning, sexual assault, and dependent care. Work schedules. Specifically, four of the six studies in our literature review cited work schedule as a reason for or factor influencing separation by female active-duty servicemembers. For example, in several studies female active-duty servicemembers cited the demands and uncertainty of their work schedules. In one study, which asked senior female enlisted Army personnel about the primary factors responsible for their decision to leave the military, a review of the participants’ responses indicated that the primary factor responsible for female servicemembers exiting the service sooner than their male counterparts was that the female members believed they constantly had to sacrifice family time for their careers. In another study, former female active-duty naval surface warfare officers cited the uncertainty of their work schedules as having a strong influence on their decision to separate from the military. Deployments. The occurrence of deployments and their effects on family life were also highlighted in four of the six studies as factors influencing female servicemembers’ decisions to separate from the military. For example, one study of female Air Force pilots identified deployments as a factor that caused them to consider leaving active duty. In another study, which included 295 active-duty and reserve female officers in grades O-1 to O-5, participants in 94 percent of the 54 focus group mentioned deployments as an important negative influence on retention, given their effect on spouses and children. Organizational culture. Organizational culture also had an effect on female servicemembers’ decisions to separate from the military in four of the six studies we reviewed. In one study, female active-duty, reserve, and Air National Guard officers in the Air Force mentioned the lack of female mentors and role models in leadership positions, and the experience of sexism as factors influencing the decision to separate. Female servicemembers also discussed how having leaders who are not supportive or understanding of family needs can contribute to a negative or toxic work environment. Study participants also noted that they often faced sexism and the existence of an “old boy’s network,” especially in career fields dominated by males. As such, these female servicemembers felt they had to work harder to prove themselves and also felt they were sometimes not treated equally because they were female. Family planning. Three of the six studies in our literature review cited family planning as being another characteristic that influences separation for female active-duty servicemembers. In one study, female officers in a majority of focus groups (85 percent of 54 focus groups) mentioned issues related to pregnancy that could affect their decisions to stay in or leave the Air Force. More specifically, Air Force female officers (active duty, reserve, and Air National Guard) cited the difficulty of timing pregnancies to fit within rigid career timelines. These female servicemembers stated that they felt they needed to ensure that pregnancy occurred at certain times in their careers to minimize negative career effects. Even with that effort, the female servicemembers stated that negative effects still persisted due to missed opportunities while pregnant, such as in-residence professional military education, or career- field specific problems, such as loss of flying time for pilots. Sexual assault. Two of the six studies in our literature review cited sexual assault as a reason for separation by female active-duty servicemembers. In one study, female military veterans mentioned both the occurrence of a sexual assault and how it was handled by the military as contributing to their separation. For example, two females stated that the perpetrator was not punished, and another woman cited the lack of support from other servicemembers as contributing to their decisions to separate from the military. In another study examining female officer retention (active duty, reserve, and Air National Guard) in the Air Force, a few participants cited cases in which either they or individuals they knew had decided to leave specifically because of a sexual assault. Participants commented that female officers often do not want to report the incident, deciding instead to separate. Dependent care. Two of the six studies in our literature review also mentioned challenges with dependent care as influencing female servicemembers’ decisions to separate from the military. For example, in one study, female military veterans cited difficulties being separated from their children for long time periods as a reason for ending military service. These difficulties were both emotional and practical, including limited stable and safe placement options for children while mothers were deployed. In another study, female Air Force officers in 59 percent of 54 focus groups stated that difficulties with childcare development centers on military bases—including service hours that were incompatible with their work schedules, inconsistent quality of care, and long waitlists—could influence their separation decisions. Participants in that study’s focus groups stated that childcare development centers often have limited hours that make it difficult to coordinate childcare with long work hours or shift work. For example, according to the study’s focus group participants, pilots are sometimes required to fly at night and regularly need overnight child care, outside of typical childcare development center hours. Further, participants stated that some female servicemembers also raised concerns about the quality of care at childcare development centers, noting that the quality of employees is not consistent across locations and that the childcare development centers generally do not provide day-care services that include educational activities to enhance children’s learning, unlike some off-base options. In addition, some female servicemembers in that same study’s focus groups cited problems setting up childcare with childcare development centers before the end of their maternity leave due to lengthy wait lists. Our analyses determined that for fiscal years 2004 through 2018, female active-duty servicemember promotion rates were slightly lower for enlisted in most years, but higher for officers as compared to their male counterparts. We also found that the percentage of promotions for eligible female and male active-duty servicemembers decreases at certain grade levels, and the likelihood of promotion varies across certain characteristics, including gender and pay grade. Overall, we estimated that in most years from fiscal years 2004 through 2018, promotion rates for female enlisted active-duty servicemembers were slightly lower than those for male enlisted active-duty servicemembers. Specifically, female enlisted promotion rates were lower than male enlisted promotion rates by a range of 0.1 percentage points to 2.5 percentage points during much of that time period. However, in fiscal years 2015 and 2018, female enlisted promotion rates were higher than their male counterparts by 0.1 percentage points and 0.4 percentage points, respectively. In contrast, female commissioned officers had higher promotion rates than male commissioned officers each year during that same period. Specifically, from fiscal years 2004 through 2018, female commissioned officer promotion rates ranged from 3.3 to 5.3 percentage points higher than male commissioned officer promotion rates. Similarly, from fiscal year 2004 through 2018, female warrant officer promotion rates were higher—a range of 1.5 to 19.3 percentage points—than male warrant officer promotion rates in most years. However, in fiscal years 2015 and 2016, promotion rates for male warrant officers were higher by 1.4 percentage points and 1.9 percentage points, respectively. Figure 9 shows active-duty servicemember annual promotion rates over time, by gender and pay grade category, for fiscal years 2004 through 2018. We also present additional data in appendix III on servicemember promotion rates in fiscal years 2004 through 2018. The 2017 DACOWITS report stated that female servicemembers are particularly underrepresented in military leadership and, as of July 2017, the percentages of female servicemembers in the highest ranks were much lower than in the lowest ranks, particularly among officers. Further, according to DACOWITS, the percentage of female servicemembers declined by nearly two-thirds from the lowest to highest- ranking commissioned officer position, and by nearly half from the lowest to highest-ranking enlisted position. Through our analysis of DMDC data, we found a similar trend in 2018 with the percentage of female servicemembers declining by nearly three quarters from the lowest to highest-ranking commissioned officer positions (21 percent to 5.4 percent). Additionally, the trend was also similar for enlisted personnel for which the percentage of female enlisted declined by nearly half from the lowest to highest-ranking positions (16.6 percent to 9.1 percent). Based on our discrete time duration analysis, we estimated that promotion rates may vary for female active-duty servicemembers relative to their male counterparts across the services, after adjusting for certain demographic and occupation-specific factors, including gender, time in service, branch of service, pay grade, marital status, and whether the active-duty servicemember has dependents. We estimated that in the Navy, enlisted female active-duty servicemembers may have a lower likelihood of promotion than their male counterparts, whereas the evidence is mixed for the Army, the Marine Corps, and the Air Force after controlling for certain individual- and occupation-level characteristics. Figure 10 presents the likelihood of female promotion as compared to males when controlling for time in service, while figure 11 presents the difference in likelihood of promotion when controlling for various demographic factors. Officials from the Service Women’s Action Network told us that, with regard to career progression, the rigidity and timing of some job requirements for certain military occupational specialties are not conducive to becoming pregnant or raising a young family. Specifically, these officials stated that such requirements—for example, Naval surface warfare tours—often occur at the time in a female active-duty servicemember’s life when she may try to become pregnant or have young children. However, according to these officials, such tours must occur at these specific points in one’s career in order to get promoted. Similarly, the Military Leadership Diversity Commission reported in its 2011 final report that, although the services do not have a checklist of assignments required for promotion, each service, community, and career field has a notional career path comprising key work and educational assignments, including leadership and staff assignments early on in one’s career, holding command assignments, meeting certain educational milestones, and holding executive officer or assistant positions to current flag or general officers. Further, the report stated that women and minorities face barriers to serving in such key assignments which can affect their ability to reach senior leadership ranks. The Military Leadership Diversity Commission also reported that one barrier may include lack of sufficient knowledge about these key assignment opportunities, perhaps because women and minorities may not receive the same career counselling or mentoring about key assignments as their white male counterparts. DOD officials stated that as part of the 2017 ODEI assessment, female promotion rates were also analyzed across the services. According to those officials, the assessment found variations in promotion rates from fiscal year 2012 through fiscal year 2016 among female servicemembers; however officials also stated that the assessment did not include an analysis to identify the reasons for the differences in promotion rates among female and male servicemembers. DOD has identified that female recruitment and retention is important to diversity in the military, but the services do not have plans that include goals, performance measures, or timeframes to guide and monitor current or future efforts to recruit and retain female active-duty servicemembers. While recruiting is an important first step in building a diverse force and increasing the representation of female servicemembers, retention plays a similarly important role in maintaining that diversity once it is achieved. DOD’s 2012-2017 Diversity and Inclusion Strategic Plan, quoting the 2011 National Military Strategy, stated that the all-volunteer force must represent the country it defends and benefits immensely from the different perspectives and linguistic and cultural skills of all Americans. According to ODEI officials, the department is currently updating its diversity and inclusion strategic plan to guide efforts through 2024. However, neither the 2012-2017 plan nor the draft updated plan, according to officials, has a focus on goals, such as recruitment or retention goals, for any one particular demographic group. Officials we interviewed stated that there is a general goal to recruit a force that reflects the makeup of the country it represents as a method for encouraging trust in the military among the population at large. However, according to OSD and service officials, the department emphasizes gender-neutral occupational standards and policies, with its focus on recruiting and retaining the best and brightest service members. Specifically, OSD officials stated that the department’s priorities and goals are aimed at improving the retention and promotion rates of all active-duty servicemembers, while ongoing OSD efforts to evaluate diversity within the department focus more broadly on the overall state of diversity of both the military and civilian workforces. OSD officials further stated that retention goals have, in the past, been misconstrued as quotas based on gender and, as such, the department does not set goals or targets for gender. While we recognize the department’s concern about goals being misconstrued as quotas, goals are not quotas and we have previously reported that quantitative and qualitative performance measures “help organizations translate their diversity aspirations into tangible practice.” For example, an organization can track data on its workforce to evaluate the effectiveness of the organization’s diversity management efforts and the progress it is making in those efforts. In addition to analyzing quantitative workforce data, we further reported that organizations can use qualitative data derived from interviews, focus groups, and surveys to identify employee perceptions—including available opportunities and work environment or culture—among various segments of their workforces. In its 2017 report, DACOWITS stated that each of the military services experiences challenges retaining women to a varying degree, with a particularly wide gender gap in operational specialties. DACOWITS’ report further stated that concerns persist that this attrition will result in a disproportionate impact to mission readiness if left unresolved. DACOWITS has also made a number of recommendations specific to the services’ efforts to address and increase female representation in the military through the use of goals and targets. For example, in 2014, DACOWITS recommended that the services should have targets to increase the representation of enlisted female servicemembers and that these targets should be benchmarked against the pool of eligible recruits. Subsequently in 2015, DACOWITS recommended, among other things, that the services should set goals to systematically increase the representation of women in the officer and enlisted ranks. However, according to officials from the four services, the services currently do not have plans that include goals, performance measures, and timeframes to guide and monitor efforts to recruit and retain female servicemembers. For example, Marine Corps officials stated that DOD has not tasked the Marine Corps to prioritize gender with regard to retention or promotion. Marine Corps officials also stated that the Marine Corps does not have any programs or initiatives that focus specifically on reducing attrition and increasing retention of female servicemembers and that its programs focus on increasing the retention of quality Marines—regardless of gender. As another example, Air Force officials stated that, while the Air Force has some specific initiatives that each have their own goals, performance measures, and timeframes included as part of those initiatives, these efforts have not been consolidated into a deliberate plan that targets female servicemembers. Navy and Army officials also stated that their respective services do not have plans specific to female retention efforts. We found that OSD has not provided guidance to the services to develop and implement plans to guide and monitor their efforts to recruit and retain female servicemembers. While DOD is in the process of updating its diversity and inclusion strategic plan to guide efforts through 2024, the updated plan will focus—like the 2012-2017 plan—on providing an overarching construct for the department’s diversity efforts. DOD’s 2012- 2017 Diversity and Inclusion Strategic Plan recognized that, due to the significant amount of time it takes to develop senior DOD leaders, it is essential that the department act to tap into the nation’s growing diverse talent pool. We have previously reported that pressures facing DOD— including increased competition for resources and involvement in more than a decade of conflict—underscore the importance of using a strategic approach to recruiting, developing, and retaining its workforce. In addition, although DOD has reported that the services generally met overall recruiting and retention goals—goals that do not consider gender—we have also reported in recent years on challenges associated with meeting its goals for certain critical skills and specialties—for example, the medical field and pilots—and rebuilding readiness across the force. Given appropriate planning and monitoring, the department could, as the former Secretary of Defense stated in 2015, benefit by drawing strength from the broadest possible pool of talent, which includes the female population that makes up over 50 percent of the population. Our prior work on effective strategic workforce planning states that agencies should periodically measure their progress toward meeting human capital goals and the extent to which human capital activities contribute to achieving programmatic goals and provide information for effective oversight by identifying performance shortfalls and appropriate corrective actions. In addition, internal control standards for the federal government state that management should define objectives clearly, including what is to be achieved , who is to achieve it, how it will be achieved—and in what timeframes—in addition to helping ensure that terms are understood at all levels. Finally, the standards also stipulate that management should develop information needed for corrective action, if necessary. Until DOD provides clear guidance and the services establish plans for monitoring and guiding their efforts to recruit and retain female active-duty servicemembers, including establishing goals, performance measures, and timeframes, the department may continue to experience slow growth of the female population and miss opportunities to retain a valuable segment of the population for its active-duty force. Women have been eligible for appointment and admission to the military service academies for over 40 years and, more recently, DOD has taken steps to open more positions to female servicemembers, including ground combat positions. However, while DOD has identified that it intends to increase diversity—including gender diversity—across the services, data show that the overall percentage of female servicemembers across the department has increased slightly from fiscal years 2004 through 2018. In addition to this slight overall growth, female enlisted and commissioned officer rates of attrition during that same period were slightly higher in comparison to their male counterparts. The percentage of female active- duty servicemembers tends to decrease at the 10-to-less-than-20 years of service category, and female active-duty servicemembers are more likely to separate from the military than their male counterparts. Moreover, from fiscal years 2004 through 2018, promotion rates for female active- duty servicemembers were slightly lower among the enlisted ranks in most years, but higher for officers as compared to their male counterparts. DOD has an ongoing effort to study the state of diversity in the department and is in the process of developing a new Diversity and Inclusion Strategic Plan for 2019-2024. However, these efforts address the department’s overall diversity and do not provide guidance to the services for developing plans to guide and monitor efforts to recruit and retain female active-duty servicemembers. Without such guidance and clear plans that include goals, performance measures, and timeframes to guide and monitor efforts to recruit and retain female servicemembers in the active-duty force, the services are not positioned to achieve the department’s goals of maintaining a ready force that includes the best and the brightest and is also representative of the population it serves. We are making a total of five recommendations—one to the Secretary of Defense and one to each of the military services. Specifically: The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness provides guidance to the services, for example, in its forthcoming diversity and inclusion strategic plan, to develop plans, with clearly defined goals, performance measures, and timeframes, to guide and monitor recruitment and retention efforts of female active-duty servicemembers in the military. (Recommendation 1) The Secretary of the Army should develop a plan, with clearly defined goals, performance measures, and timeframes, to guide and monitor the Army’s female active-duty servicemember recruitment and retention efforts. (Recommendation 2) The Secretary of the Navy should develop a plan, with clearly defined goals, performance measures, and timeframes, to guide and monitor the Navy’s female active-duty servicemember recruitment and retention efforts. (Recommendation 3) The Secretary of the Navy should ensure that the Commandant of the Marine Corps develops a plan, with clearly defined goals, performance measures, and timeframes, to guide and monitor the Marine Corps’ female active-duty servicemember recruitment and retention efforts. (Recommendation 4) The Secretary of the Air Force should develop a plan, with clearly defined goals, performance measures, and timeframes, to guide and monitor the Air Force’s female active-duty servicemember recruitment and retention efforts. (Recommendation 5) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix V, DOD and the services concurred with our recommendations and noted steps the department has taken and would be taking. DOD also provided technical comments, which we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense; the Secretary of the Army; the Secretary of the Navy; the Commandant of the Marine Corps; the Secretary of the Air Force; the Office for Diversity, Equity, and Inclusion; and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. Caswell, David C.USAF Female Pilot Turnover Influence: A Delphi Study of Work-Home Conflict.Wright-Patterson Air Force Base, Ohio: Department of the Air Force, Air Force University, Air Force Institute of Technology (June 2016). https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/AD1054221 .xhtml. Dichter, Melissa E. and Gala True. ““This is the Story of Why My Military Career Ended Before It Should Have”: Premature Separation From Military Service Among U.S. Women Veterans.” Affilia: Journal of Women & Social Work, vol. 30, no. 2 (2015): 187-199. http://dx.doi.org/10.1177/0886109914555219. https://dialog.proquest.com/professional/docview/1681926518?accountid =12509. Keller, Kirsten M., Kimberly Curry Hall, Miriam Matthews, Leslie Adrienne Payne, Lisa Saum-Manning, Douglas Yeung, David Schulker, Stefan Zavislan, and Nelson Lim. Addressing Barriers to Female Officer Retention in the Air Force (Santa Monica, California: RAND Corporation, 2018). https://www.rand.org/pubs/research_reports/RR2073.html. Pierce, Penny F., TriService Nursing Research Program. Women Veterans Project: Operation Iraqi Freedom. Ann Arbor, Michigan: University of Michigan (2008). https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/PB2013101 316.xhtml. Stoker, Carol and Alice Crawford. Surface Warfare Officer Retention: Analysis of Individual Ready Reserve Survey Data. Monterey, California: Naval Postgraduate School, Graduate School of Business and Public Policy (January 22, 2008). https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/ADA476863 .xhtml. Williams, Nanette Marie, The Influence of Contemporary Army Culture on Senior Enlisted Women’s Decision to Commit to a Lifelong Career. Flint, Michigan: Baker College, 2013. https://search.proquest.com/docview/1427847908?accountid=12509. This report examines (1) trends in the percentage of female active-duty servicemembers in the military and their attrition rates from fiscal year 2004 through 2018, including the reported factors leading to that attrition; (2) how female active-duty servicemember promotion rates compare with those of their male counterparts and among female servicemembers with differing characteristics from fiscal years 2004 through 2018, and what factors influence these rates; and (3) the extent to which DOD and the military services have plans to guide and monitor female active-duty servicemember recruitment and retention. To address these objectives, we focused our review on active-duty enlisted, officers, and warrant officers in all ranks and pay grades, serving within the four military services (the Army, the Navy, the Marine Corps, and the Air Force). For our first and second objectives, we obtained and analyzed servicemember personnel data for fiscal year 2004 through 2018 from the Defense Manpower Data Center (DMDC), including, for example, service start date, branch of service, status, grade, gender, race, marital status, and whether the servicemember has dependents. We selected fiscal year 2004 through 2018 because, at the time we submitted our request for data, this was the most recent 15-year time period for which DMDC had complete data available. These data were obtained from three different files maintained by DMDC, including the (1) Active-Duty File Monthly Snapshots, (2) Transaction data for active-duty separations for October 1, 2003 through September 30, 2018, and (3) the Defense Enrollment Eligibility Reporting System. The data obtained from DMDC are granular down to the single month and single servicemember. We aggregated these data into a single file that allowed us to analyze them for (1) descriptive statistics to show trends and (2) modeling using duration analysis to show trends to examine the likelihood of occurrence for specific events for various demographic and DOD-specific administrative characteristics. We analyzed these data based on specific demographic characteristics, including gender, race, ethnicity, pay grade, and other variables. While the focus of this review was female active-duty servicemembers, we analyzed data on male active-duty servicemembers, using the same demographic and administrative characteristics, as the primary comparison group. We also analyzed the data to identify and compare the reasons for separation by these different groups and characteristics based on assigned separation designator codes. To assess the reliability of the data obtained from DMDC, we reviewed related documentation, for example, the data dictionary associated with the active-duty file; interviewed knowledgeable officials from DMDC; and conducted both electronic and manual data testing to look for missing or erroneous data. For example, within the data, some servicemembers changed their race, ethnicity, and/or gender over time. Through discussions with DMDC, we determined that these are often errors in the data, but in some instances can be the result of personal decisions by the servicemember. DMDC recommended using the last known instance for each of these attributes for each point on the servicemembers’ timeline. We implemented this recommendation, as it improved the results and findings and avoided servicemembers being counted across multiple, exclusive demographics—i.e., double counted. Based on these steps, we determined that these data were sufficiently reliable for the purposes of analyzing and reporting on the representation of servicemembers with specific demographic characteristics and the rates of attrition and promotion among those servicemembers for fiscal year 2004 through 2018. We also determined that fiscal year 2004 through 2018 DMDC data were sufficiently reliable for the purposes of constructing a duration analysis statistical model to estimate the likelihood of attrition by servicemembers with specific demographic factors. We used the fiscal year 2004 through 2018 DMDC data to construct descriptive statistics of the demographic composition of the services’ active-duty forces and drew comparisons between female and male servicemembers, and across demographic and administrative characteristics. According to service officials, the department does not have a universal definition for attrition. We, therefore, constructed attrition rates for active-duty servicemembers by capturing (1) any enlisted servicemember who separated more than 1 week from the end of his or her first service contract, and (2) any officer who separated within 3 years of his or her start date. Attrition rates were calculated by taking the total number of members who attritted, per the definitions above, in a given fiscal year and dividing that number by the total number of officers or enlisted servicemembers in that year, times 100 to express as a percent. To prevent double counting of non-attritted members across multiple fiscal years, attritted and non-attritted members were counted in the year that they entered service and not the year that they separated. In order to construct promotion rates for active-duty servicemembers, we used the servicemembers’ time-in-grade, time-in-service, and each service’s policy for time-in-service and time-in-grade minimums for each pay grade to determine eligibility for promotion. For every fiscal year, if a servicemember was eligible for promotion whether they promoted or not, the servicemember was counted as eligible. If the servicemember did promote, then the servicemember was counted as promoted. The promotion rate for each category was calculated as the total number of promoted servicemembers divided by the total number of promotion- eligible servicemembers, times 100 to express as a percent. We also conducted an analysis of associations between each of separation and promotion outcomes and certain demographic characteristics for servicemembers using the servicemember personnel data from DMDC for fiscal years 2004 through 2018, which included quarterly data on individual servicemembers. These data also contain information for each servicemember on the timing of his or her separation and promotions, if any. Specifically, we implemented a discrete time method for the analysis of event histories, using a logit specification. This is a type of duration analysis methodology that is suited to the analysis of event occurrences and their timing—which is the time elapsed until the event occurs (e.g. number of years until separation or promotion). We examined the extent to which each active-duty servicemember’s separation and promotions (or lack thereof) may be associated with certain factors related to that servicemember’s demographic and occupational characteristics. These factors were time-invariant (e.g. race, gender, etc.) or time-varying (e.g. occupation, marital status, etc.). For our duration models for separation, we generally included (1) gender, (2) marital status, (3) the existence of dependents, (4) race and ethnic groups, (5) pay grade categories, (6) having a bachelor’s degree or higher education degree versus not, (7) whether the individual has been assigned to an overseas duty location, (8) occupation, (9) fiscal year fixed effect, and (10) quarter-year time-in-service fixed effect. We tested multiple models and included various sets of factors. Since the number of female active-duty servicemembers decreases at higher pay grades, this was taken into account for our duration models for promotion. To ensure convergence of our promotion models, we made the following adjustments in control variables. We started with the Marine Corps’ promotion data because the service has the smallest proportion of female active-duty servicemembers among the four services. After testing with multiple sets of different control variables with the data, we decided to use the following control variables. (See table 1.) We could not control for all factors that may affect separation and promotion, such as a servicemember’s performance and labor market conditions. We also did not model the promotion process in the services. Our modeling should thus be viewed as evidence that may inform on possible associations in the data, and does not establish a causal relationship. Additional inquiry into each of the observed separation and promotion cases would be needed to truly ascertain the role of certain factors, such as gender, in each of these cases. Additionally, we conducted a literature review and content analysis of existing research on promotion and retention in the military, with a focus on female servicemembers. To identify studies, we conducted searches of various databases, including ProQuest, EBSCO, Westlaw Edge, Scopus, Dialog, and the National Technical Information Service, for English-language sources published in calendar year 2008 through 2018. We searched for peer-reviewed material, government and non- governmental reports, conference papers, books, and dissertations or theses. The database search was conducted from December 21, 2018 to January 10, 2019. This search and review process yielded 213 potentially relevant studies after initial scoping by a research librarian and, after additional screening of titles and abstracts for relevance, resulted in the selection of 87 studies for full text review. Specifically, two analysts sequentially reviewed the full texts for substantive content and reconciled any differences. Two methodologists sequentially reviewed the full texts for methodological considerations and reconciled any differences. Then the analysts and methodologists discussed and reconciled any remaining differences. To be included in our review, studies had to either (1) include factors servicemembers reported about intended or actual separations, including retention; or (2) report analyses designed to identify characteristics that statistically predict service separation or attrition differences among female servicemembers or between female and male servicemembers. The studies had to include primarily one or more of the four military services within DOD and could not focus exclusively on the Coast Guard. The studies also had to include primarily active-duty personnel and could not focus exclusively on reserve component personnel. Studies that focused only on recruitment or accessions, exit or lateral transfer from a career field but not separation from service, or data collected only from military spouses were also deemed out of scope. The studies we included in our literature review were published between 2008 and 2018 and included information relevant to our research objective on female servicemember retention, attrition, or promotion. From the group of 87 studies, we excluded 81 studies because they did not meet our inclusion criteria or the results were deemed not relevant to this review. The resulting six studies were further reviewed for content. We conducted a content analysis in order to be able to summarize the relevant results from the literature search by identifying recurring themes. To conduct this content analysis, the team developed a list of six overarching themes with three to seven sub-themes associated with each main theme. The resultant 54 sub-themes were documented in the team’s data collection instrument as a paired main theme and sub-theme. First, an analyst recorded an assessment of whether the study included the theme and sub-theme. A second analyst independently reviewed the same information and recorded an assessment. The two analysts reconciled their two independent assessments to produce the analysts’ consensus and recorded that consensus in the team’s final spreadsheet. All results reported from the studies reviewed were found to be sufficiently reliable for how they are used in this report and any limitations are mentioned in the text. For our third objective, we reviewed documentation on the Office of the Secretary of Defense’s (OSD) and services’ efforts to collect and analyze data on diversity in the department, as well as servicemember retention. We reviewed the department’s plans for developing and promoting diversity and inclusion in the force, including the department’s 2012-2017 Diversity and Inclusion Strategic Plan. We also reviewed a draft version of the department’s forthcoming plan for 2019-2024 Diversity and Inclusion Strategic Plan. We evaluated their efforts to determine whether they met federal internal control standards, including that management should design appropriate types of control activities such as defining objectives clearly and helping ensure that terms are understood at all levels. We reviewed other publications on female recruitment and retention in the military, including reports and briefings developed by the Defense Advisory Committee on Women in the Services (DACOWITS) and the 2011 final report of the Military Leadership Diversity Commission to determine what others had found and recommended with regard to female retention and participation in the military. We also analyzed our past reports and recommendations, for example, on military personnel management and DOD’s Career Intermission Pilot Program, among others. For all three objectives, we also interviewed officials from the Office of Military Personnel Policy Office and the Office for Diversity, Equity, and Inclusion (ODEI), both under the Office of the Under Secretary of Defense for Personnel and Readiness, as well as officials from the four military services. We also interviewed representatives from DACOWITS and the Service Women’s Action Network. Further, we reviewed previously made recommendations by DACOWITS and the Military Leadership Diversity Commission aimed at improving promotion and retention, specifically of female servicemembers, and interviewed OSD officials about any progress made by the department and the services to address these recommendations. We conducted this performance audit from September 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Tables 2 through 14 present snapshots of active-duty data from the Defense Manpower Data Center, spanning the years of 2004 through 2018. We developed a set of statistical models—all discrete time duration analysis–using data from fiscal years 2004 through 2018, which accounted for active-duty servicemembers’ time in service—that is, the period of time from when they joined the military until their separation. We controlled for specific servicemember characteristics such as gender, branch of military service, pay grade, race or ethnicity, marital status, and the existence of dependents to estimate the association of these characteristics on the likelihood of active-duty servicemembers separating from the service. Table 15 depicts the results of our analysis. Positive numbers higher than 1.0 indicate the comparison group (e.g., married female servicemembers without dependents) is more likely to separate than the baseline group (e.g., unmarried female servicemembers without dependents). Positive numbers lower than 1.0 indicate the comparison group (e.g., female officers) is less likely to separate than the baseline group (e.g., female enlisted). Odds ratios from the duration analysis allow us to compare the relative relationships between various characteristics and separation from the military. For categorical variables, increase or decrease in the likelihood of separation is in comparison to an omitted category, or reference baseline group. Odds ratios that are statistically significant and greater than 1.00 indicate that servicemembers with those characteristics are more likely to separate than the baseline group. Odds ratio that are less than 1.00 indicate that servicemembers with those characteristics are less likely to separate. For example, the odds ratio for married female servicemembers with dependents in the Air Force are 1.203. This implies that the odds of separation for married female servicemembers with dependents in the Air Force are 1.203 times the odds of separation for unmarried female servicemembers without dependents in the Air Force, holding other factors constant, or that the odds of separation for married female servicemembers with dependents in the Air Force are about 20 percent higher than single female servicemembers without dependents in the Air Force, if other conditions remain constant. In addition to the contact named above, Kimberly Mayo (Assistant Director), Jennifer Weber (Analyst in Charge), Adriana Aldgate, Emily Biskup, Charles Culverwell, Edda Emmanuelli-Perez, Cynthia Grant, Chad Hinsch, Yvonne Jones, Zina Merritt, Amie Lesser, Samuel Moore, Moon Parks, Steven Putansu, Leigh Ann Sheffield, Michael Silver, Pamela Snedden, Carter Stevens, Elaine Vaurio, and Lillian M. Yob made key contributions to this report. Military Personnel: Observations on the Department of Defense’s Career Intermission Pilot Program. GAO-17-623R. Washington, D.C.: May 31, 2017. Military Personnel: Oversight Framework and Evaluations Needed for DOD and the Coast Guard to Help Increase the Number of Female Officer Applicants. GAO-16-55. Washington, D.C.: November 13, 2015. Military Personnel: DOD Should Develop a Plan to Evaluate the Effectiveness of Its Career Intermission Pilot Program. GAO-16-35. Washington, D.C.: October 27, 2015. Military Personnel: DOD Is Expanding Combat Service Opportunities for Women, but Should Monitor Long-Term Integration Progress. GAO-15-589. Washington, D.C.: July 20, 2015. Military Child Care: DOD Is Taking Actions to Address Awareness and Availability Barriers. GAO-12-21. Washington, D.C.: February 3, 2012. Women in the Military: Attrition and Retention. GAO/NSIAD-90-87BR. Washington, D.C.: July 26, 1990.", "summary": "The role of female servicemembers in the military has expanded in the last half century as restrictions on female servicemembers serving on active duty, including in combat, have been eliminated. DOD has also stated that recruiting and retaining women is important in order to reflect the nation's population and ensure strong military leadership. House Report 115-676 includes a provision that GAO review female retention and promotion in the military. This report examines (1) trends in the percentage of female active-duty servicemembers in the military and their attrition rates, including reported factors leading to attrition; (2) how female active-duty servicemember promotion rates compare with those of males and among females with differing characteristics, and what factors influence these rates; and (3) the extent to which DOD and the military services have plans to guide and monitor female active-duty servicemember recruitment and retention. GAO analyzed fiscal year 2004 through 2018 personnel data to identify attrition and promotion rates and conducted statistical modeling to determine the likelihood of separation and promotion, reviewed DOD reports and other literature on servicemember attrition, and interviewed officials from DOD and other military organizations. The Department of Defense (DOD) experienced slight increases in the overall percentage of female active-duty servicemembers from fiscal year 2004 through 2018 (15.1 percent in fiscal year 2004 to 16.5 percent in fiscal year 2018), with those percentages varying by pay grade category (see figure). During that period, female enlisted and commissioned officers had higher annual attrition rates than corresponding males. However, the gaps between male and female attrition rates have narrowed. For example, in fiscal years 2004 and 2018, female enlisted servicemembers' annual attrition rates were 33.1 and 8.6 percent, respectively, and enlisted males' annual attrition rates were 22.7 and 6.1 percent respectively. GAO's statistical model found that the likelihood of separation for female servicemembers is 28 percent higher than that of males. GAO's literature review of selected studies on reasons why females separate from the military identifed six themes, including family planning, sexual assualt, and dependent care, as influencing separations. GAO's analysis of fiscal year 2004 through 2018 data estimated that promotion rates were slightly lower for female enlisted in most years, but higher for officers as compared to their male counterparts. Specifically, female enlisted promotion rates ranged from 0.1 to 2.5 percentage points lower than male enlisted promotion rates during much of that period. However, from fiscal year 2004 through 2018, female commissioned officer promotion rates ranged from 3.3 to 5.3 percentage points higher than the rates of their male counterparts. GAO's statistical model also estimated that the likelihood of promotion outcomes varies by certain characteristics, such as gender and pay grade. For example, GAO estimated that the likelihood of promotion for female enlisted in the Navy may be lower than male enlisted, and the evidence is mixed for the other services. DOD has identified female recruitment and retention as important to diversity in the military, but the services do not have plans that include goals, performance measures, and timeframes to guide and monitor current or future efforts to recruit and retain females. According to officials, DOD is currently updating its diversity and inclusion strategic plan; however, neither its prior plan nor the updated plan include goals, such as recruitment or retention goals, performance measures, and timelines for any one particular demographic group. DOD officials stated that retention goals have, in the past, been misconstrued as quotas and, as such, the department does not set goals or targets for gender. However, goals are not quotas and can help guide continued improvement. Without DOD guidance and service plans with goals, performance measures, and timeframes to monitor female recruitment and retention efforts, DOD may continue to miss opportunities to recruit and retain a valuable segment for its active-duty force. GAO recommends that DOD provide the services with guidance to develop plans with goals, performance measures, and timelines to address female recruitment and retention efforts, and for the services to develop such plans. DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "Education administers federal student aid programs, including the William D. Ford Federal Direct Loan (Direct Loan) program, through the Office of Federal Student Aid. Only Direct Loans are eligible for the TEPSLF and PSLF programs. Under the Direct Loan program, Education issues and oversees federal loans provided to students and contractors service these loans. Education currently contracts with nine loan servicers that each handle the billing and other services for a portion of the over $1 trillion in outstanding student loans provided through the Direct Loan program. These servicers track and manage day-to-day servicing activities. Education contracts with a single loan servicer to implement PSLF and TEPSLF, which includes responding to borrower inquiries, reviewing requests for loan forgiveness, and processing loan forgiveness for qualifying borrowers. Borrowers interested in pursuing loan forgiveness under either PSLF or TEPSLF must have their loans transferred to this loan servicer in order to proceed. TEPSLF is a temporary expansion of the PSLF program and the eligibility requirements for TEPSLF are largely the same as those of the PSLF program with a few key exceptions. Both provide eligible borrowers with forgiveness on the remaining balance of their Direct Loans after they have met all program requirements. To receive forgiveness for a loan under either PSLF or TEPSLF, borrowers are required to be employed in a public service job for 10 years when making 120 qualifying payments, at the time they apply for forgiveness, and at the time they receive forgiveness for their loans. Specifically, borrowers are generally required to: Work full-time for at least 10 years at a public service organization, a government organization, agency, or entity at any level (federal, state, local, or Tribal); a nonprofit, tax exempt organization (under section 501(c)(3) of the Internal Revenue Code); or another private nonprofit organization that provides certain public services. Not be in default on their loans. Make 120 on-time monthly loan payments for the full amount due on their bill. These monthly payments do not need to be consecutive. Key differences between PSLF and TEPSLF include: Qualifying repayment plans. PSLF generally requires borrowers to repay their loans through one of the eligible income-driven repayment plans or the Standard repayment plan. TEPSLF allows borrowers to qualify for loan forgiveness through several additional types of repayment plans that do not qualify for PSLF, including the Graduated repayment plan, Extended repayment plan, Consolidated Standard repayment plan, and Consolidated Graduated repayment plan. Funding. TEPSLF loan forgiveness is temporarily available to borrowers on a first-come, first-served basis until the $700 million is expended. The PSLF program will continue unless repealed by Congress. Specific payment requirements. For TEPSLF, the following two payments generally must be at least as much as the borrower would have paid under an income-driven repayment plan: (1) the payment made immediately prior to applying for TEPSLF, and (2) the payment made 12 months prior to applying for TEPSLF. In the context of high denial rates in the PSLF program and evidence that some borrowers were being misinformed by loan servicers about which repayment plans would qualify for PSLF, Congress appropriated $4.6 million for Education to conduct outreach on PSLF and TEPSLF. The legislation called for this outreach to be targeted to, among others, borrowers who would qualify for PSLF loan forgiveness except that they have made some or all of their payments through plans that do not qualify. Congress directed Education to implement a simple method for borrowers to apply for TEPSLF within 60 days after the legislation funding the program was enacted. In response, Education established a process in which borrowers send an email to the TEPSLF loan servicer with their name and date of birth to initiate their TEPSLF review and establish their place in line for TEPSLF funds. In addition to sending an email to initiate a TEPSLF request, Education requires that a borrower has submitted a PSLF application before they can be considered for TEPSLF (see fig. 1). While a PLSF application is not explicitly required by statute for a borrower to be considered for TEPSLF loan forgiveness, Education officials said that the department added this step to the process because the PSLF application form captures information the TEPSLF loan servicer needs to determine a borrower’s eligibility for TEPSLF. Education officials said that they added this step in order to roll out the TEPSLF program within the required 60 days. Education’s TEPSLF website states that borrowers interested in this temporary expanded loan forgiveness option must submit a PSLF application in order to be considered for TEPSLF. Even with this information, our review of TEPSLF loan servicer data found that 71 percent of denied TEPSLF requests were denied because the borrower had not submitted a PSLF application. Education officials said that they believed that many borrowers send a TEPSLF request without submitting a PSLF application because TEPSLF funding is temporary and borrowers know that sending the email request will hold their place in line for the limited funds. However, borrowers who have not submitted the PSLF application are sent a denial letter from the TEPSLF loan servicer. According to Education officials, these borrowers would lose their place in line and have to reapply if they want to be reconsidered for TEPSLF. Officials from Education, the TEPSLF loan servicer, and representatives from selected organizations representing student borrowers all said that the requirement to submit a PSLF application to be eligible for TEPSLF loan forgiveness can confuse borrowers. For example, Education officials acknowledged that the majority of TEPSLF requests come from borrowers who have not first submitted a PSLF application, and officials from the TEPSLF loan servicer said that borrowers who called were frequently confused when they received a TEPSLF denial based on the fact that they had not first submitted the PSLF application. In addition, representatives from the three student borrower groups we interviewed said that having to apply for PSLF before requesting TEPSLF often confuses borrowers and, in the opinion of officials from two of the three groups, leads directly to large numbers of TEPSLF denials. We also found some examples of borrower confusion about the PSLF application requirement in our review of borrower complaints. In three TEPSLF borrower complaints filed with Education that we reviewed, the borrowers expressed confusion and frustration about why they were being asked to submit an application for a program—PSLF—they knew they did not qualify for in order to receive TEPSLF loan forgiveness. Education’s policy of requiring all borrowers requesting TEPSLF to first submit a PSLF application has created a confusing process for borrowers. Education officials said that integrating the TEPSLF request into the PSLF application—for example, by including a checkbox that borrowers could use to request a TEPSLF review if the loan servicer finds they are ineligible for PSLF—would eliminate the need for borrowers to take multiple steps, reduce the number of borrowers who are denied, and improve service to borrowers. Education officials estimated that integrating the TEPSLF request into the existing PSLF process would require roughly a year in order to revise the PSLF application form, borrower communications, and program procedures, and to work with the loan servicer to implement new contractual requirements. Education officials told us that they will be implementing a new online portal in fall 2019 to provide better overall service to borrowers. They also stated that the new portal could incorporate an online integrated PSLF and TEPSLF application if they had sufficient resources and time, but that there were currently no specific plans to do so. While Education rolled out the process for requesting TEPSLF loan forgiveness in 2 months, it has not created a borrower-friendly TEPSLF process. This does not align with Education’s strategic plan objective to improve the quality of service to customers across the student aid life cycle. Further, Congress created the temporary expansion to the PSLF program to help certain borrowers who faced barriers obtaining PSLF loan forgiveness and required Education to develop a simple method for borrowers to apply for TEPSLF. While initiating a TEPSLF request through an email is straightforward, requiring borrowers to have submitted a PSLF application to successfully pursue TEPSLF loan forgiveness is confusing and inefficient for borrowers because borrowers must take multiple steps and complete an application for a program they do not qualify for. If Education were to allow borrowers to request TEPSLF loan forgiveness through an integrated application form, it would improve service to borrowers, reduce borrower confusion about how to obtain loan forgiveness, and better align with its strategic plan objective to improve service to borrowers. Further, although TEPSLF is a temporary opportunity, it could be years before the $700 million appropriation is exhausted, and it is therefore worthwhile for Education to invest resources in improving the process now. From May 2018 through May 2019, about 40,000 borrowers submitted TEPSLF requests for loan forgiveness and Education has approved or denied about 54,000 separate TEPSLF requests. Education has approved 1 percent (661) and denied 99 percent (53,523) of these requests, according to the most recent data from the TEPSLF loan servicer (see fig. 2). Of the 53,523 denied TEPSLF requests, about 38,000 were ineligible for consideration and were therefore denied because the borrower had not submitted a PSLF application, according to data from the TEPSLF loan servicer. Of the remaining denied requests, about 15,000 were denied because they did not meet other program requirements (see fig. 3). As we previously noted, under the current TEPSLF review process, the loan servicer first checks to see if the borrower requesting TEPSLF has submitted a PSLF application. If the borrower has not done so, the loan servicer does not conduct any further review of the borrower’s request and sends the borrower a denial letter informing them they have to submit the PSLF application before the borrower can be considered for TEPSLF. Without the loan servicer conducting any further review of a borrower’s request, it is impossible to know how many of the roughly 38,000 requests that were denied because the borrower had not yet submitted a PSLF application would have otherwise met all other program requirements and been approved for TEPSLF loan forgiveness. The large number of TEPSLF requests denied for not submitting a PSLF application provides further evidence that many borrowers may be confused about the process for obtaining TEPSLF loan forgiveness. Further, more than 5,000 (about 10 percent) of the TEPSLF requests were denied because the borrower had not been repaying their loans for at least 10 years, which indicates that they had not yet made 120 qualifying payments—a straightforward program requirement. Since TEPSLF became available in May 2018, Education has approved TEPSLF loan forgiveness totaling about 4 percent (approximately $26.9 million) of the $700 million appropriated for TEPSLF loan forgiveness, according to the most recent data available from the TEPSLF loan servicer at the time of our review (see fig. 4). Of the 656 borrowers approved for TEPSLF loan forgiveness, the borrowers received an average of about $41,000 in loan forgiveness, with loan forgiveness amounts ranging from about $190 to about $227,000. Education does not provide complete information to borrowers about options they have to contest a denied TEPSLF request. Specifically, the letter the TEPSLF loan servicer sends to the borrower communicating a decision to deny the TEPSLF request includes the reason for the denial and the TEPSLF loan servicer’s customer service number for borrowers to call with questions. An FSA official told us that while there is no formal process for borrowers who are dissatisfied with their TEPSLF or PSLF determinations to contest them, borrowers do have additional options for addressing concerns, such as an additional review by the TEPSLF servicer, or a complaint to the FSA Feedback System or Ombudsmen (see fig. 5). According to Education officials, when a borrower is denied loan forgiveness, they can call the TEPSLF loan servicer’s customer service number with questions about the denial. TEPSLF servicer officials said that if the customer service representative is unable to resolve the borrower’s questions, the representative can elect to elevate the borrower’s concern internally within the TEPSLF loan servicer, which may result in a second review by loan servicer management. Education and TEPSLF loan servicer officials said that borrowers who are not able to resolve their issues with the loan servicer can bring their issues directly to Education. Specifically, if a borrower is dissatisfied with their TEPSLF decision, they can submit their concern through the online FSA Feedback Tool. Borrowers can also contest the decision with the FSA Ombudsman Group. Education officials told us it does not provide information about these options in its denial letters or on its TEPSLF website, noting that borrowers could find this information at the bottom of FSA’s main website. Education officials also stressed the importance of borrowers resolving their concerns first with their loan servicer directly before pursuing other avenues, and said that this is part of the reason why they do not include this information in letters sent to borrowers. All TEPSLF denial letters include a statement at the bottom of the letter indicating that if borrowers had questions about the information in their denial letter, they should call the general customer service number at the TEPSLF loan servicer for assistance. The letters did not explain how the servicer could potentially do a second review or subsequently refer the matter to Education. Information about the potential for a second review at the loan servicer and the option to raise an issue with Education directly would help borrowers who are unable to resolve their concerns by calling the general customer service number at the loan servicer. Additional information on options for contesting decisions is not necessary for all TEPSLF borrowers who are denied. For example, it may not be appropriate to include this information in denial letters sent to borrowers who do not meet basic program requirements—for example, those who have no federal Direct Loans. However, borrowers who are denied for reasons that are more prone to error, such as having fewer than 120 qualifying payments, are not made aware of all the available options so they can make informed decisions about how to best resolve their concerns. We previously reported that Education does not ensure that the loan servicer responsible for PSLF and TEPSLF is receiving consistent loan payment history information from other loan servicers, increasing the risk of inaccurate qualifying payment counts. This also raises the risk of inappropriate denials for TEPSLF. Our review of TEPSLF complaints made to Education from borrowers found eight examples of borrowers contesting the loan servicer’s determination of the number of qualifying payments. In six of these instances, the TEPSLF servicer determined that the borrowers were correct and had met requirements for loan forgiveness. Given the risk of denial errors, additional information about options for borrowers who are dissatisfied with their TEPSLF denial determination is especially important. While there is information about options for contesting decisions at the bottom of FSA’s main website, it is not incorporated into the TEPSLF website and borrowers may not know where to find this information. Federal internal control standards for external communication with stakeholders call for communication of quality information with external parties to achieve program objectives. Providing this information in relevant denial letters and Education websites will increase the likelihood that borrowers with valid concerns will have their TEPSLF requests appropriately resolved. Education and the TEPSLF loan servicer conduct direct outreach to certain borrowers about TEPSLF. For example, when TEPSLF was first rolled out, Education sent a notice to over 1,000 borrowers who had been denied PSLF due to a lack of 120 qualifying payments, but who had been in repayment for at least 10 years. Education officials told us that they had identified this group of borrowers as the most likely to be eligible for TEPSLF. This notice informed borrowers of the new TEPSLF loan forgiveness opportunity and told them how to apply for it. Education officials told us that they continue to review the PSLF denial list on a weekly basis and send notices to those whom they have determined to be the most likely to qualify for TEPSLF loan forgiveness. In addition, borrowers who have previously expressed interest in TEPSLF by sending an email to request TEPSLF loan forgiveness will be sent a TEPSLF outreach letter by the TEPSLF loan servicer under certain conditions: after submitting a new employment certification form, or after submitting a new PSLF application that is subsequently denied. In these two circumstances, the TEPSLF loan servicer sends the borrower a letter suggesting that they may now be eligible for TEPSLF loan forgiveness and would need to re-request such loan forgiveness. Education officials told us that the agency has focused on a broad, general outreach strategy; however, we found that its online information is limited because TEPSLF information is not included in several key online sources. Education and TEPSLF loan servicer officials told us that they primarily direct borrowers to online sources to inform them about TEPSLF requirements. For example, Education has created a TEPSLF-specific website and the TEPSLF loan servicer’s website references the TEPSLF opportunity and links to Education’s TEPSLF website if borrowers would like more information. However, we found that while all nine of the loan servicers’ websites contain some information on the PSLF program, none of them (other than the TEPSLF loan servicer) included TEPSLF information on their websites or provided a link to Education’s TEPSLF website. While Education officials told us that only the TEPSLF servicer is required to have TEPSLF information on its website, other loan servicers may also serve borrowers who are potentially eligible but may be unaware of TEPSLF. In addition, borrowers with other loan servicers who are interested in TEPSLF may not be aware that they have to transfer to the TEPSLF loan servicer to obtain loan forgiveness. Further, according to agency officials, Education’s PSLF Online Help Tool also does not include any TEPSLF information, and Education has not created a similar tool for TEPSLF. Education officials told us that the PSLF Online Help Tool, which assists borrowers with determining whether their loans and employment qualify and which PSLF forms they need to submit, is one of the primary PSLF outreach mechanisms to inform borrowers about PSLF eligibility. According to Education data, since the rollout of the online tool in December 2018 through the beginning of March 2019, about 340,000 users have used the online tool, and about 100,000 have logged on and have collectively generated about 40,000 PSLF-related forms, such as PSLF application forms. However, according to Education officials, the online tool does not include any information on TEPSLF. Education officials stated that the first phase of the Online Help Tool was focused on informing borrowers about eligibility requirements for PSLF and that as the department makes enhancements to phase two of the Online Help Tool, it could consider adding TEPSLF information and functionality. Both FSA and TEPSLF loan servicer officials stated that having information on TEPSLF integrated into the PSLF Online Help Tool would be beneficial for borrowers and would reduce confusion about TEPSLF. Federal internal control standards state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Including TEPSLF information in the PSLF Online Help Tool and noting it on all loan servicer websites could increase borrower awareness of TEPSLF and the likelihood that borrowers are able to take advantage of this opportunity. The loan forgiveness opportunity through TEPSLF is an expansion of the PSLF program and helps borrowers who hoped to qualify for PSLF but who did not realize they were in an ineligible loan repayment plan. Instead of integrating the expanded loan forgiveness opportunity into the existing PSLF process, Education required borrowers to have submitted a separate PSLF application before the loan servicer will consider a borrower’s TEPSLF request. The large number of requests denied because borrowers had not submitted a PSLF application suggests that borrowers are confused about this requirement. In some cases, these borrowers may have been working in public service jobs for years believing they were on track for loan forgiveness, only to find out later that they did not qualify. While the loan forgiveness opportunity through TEPSLF is only available until the $700 million in funding has been spent, a relatively small amount of total funding has been spent so far. It is possible that the program could continue for years, supporting the case for investing in improvements to the process now. Integrating the process for obtaining loan forgiveness through TEPSLF into the PSLF application would be easier for borrowers and help Education meet its goal to improve customer service. Information provided in TEPSLF denial letters and on the TEPSLF website does not explain what options are available to borrowers if they want to contest the loan servicer’s determination. While additional information on this topic is not necessary for borrowers who do not meet basic program requirements—for example, those who have no qualifying federal loans—this information would help certain borrowers whose TEPSLF requests may have been denied. By including this additional information on the TEPSLF website and in denial letters to these borrowers, the borrowers can then pursue additional options to contest the denial and help Education avoid denial errors. Finally, Congress provided funding and tasked Education with conducting outreach to borrowers to help increase overall borrower awareness of the public service loan forgiveness programs. While Education has engaged in some outreach activities, Education is missing opportunities to reach out to borrowers potentially eligible for TEPSLF—specifically, by not requiring all loan servicers’ websites to include information about TEPSLF and not including TEPSLF information in the PSLF Online Help Tool. TEPSLF was created to provide relief to a group of borrowers who were ineligible because they were repaying their loans on repayment plans that were not eligible for the original PSLF program. Without improved TEPSLF outreach in these two areas, however, many of these borrowers who were initially unable to qualify for the PSLF program may be unaware of the TEPSLF opportunity that was designed to help them. We are making the following four recommendations to Education’s Office of Federal Student Aid: The Chief Operating Officer of the Office of Federal Student Aid should integrate the TEPSLF request into the PSLF application, for example, by including a checkbox on the PSLF application, to provide borrowers a more seamless way to request TEPSLF consideration. (Recommendation 1) The Chief Operating Officer of the Office of Federal Student Aid should provide certain borrowers, for example, those who are denied TEPSLF for not having 120 qualifying payments, with more information about options available to contest TEPSLF decisions on the TEPSLF website and in their denial letters. (Recommendation 2) The Chief Operating Officer of the Office of Federal Student Aid should require all loan servicers to provide TEPSLF information on their websites. (Recommendation 3) The Chief Operating Officer of the Office of Federal Student Aid should include TEPSLF information in its PSLF Online Help Tool. (Recommendation 4) We provided a draft of this report to Education for its review and comment. In its comments, reproduced in appendix I, Education concurred with each of our recommendations and identified steps it plans to take to implement them. To make the TEPSLF loan forgiveness process easier for borrowers, Education stated that it will integrate the TEPSLF request into the PSLF application as part of the improvements planned for the PSLF application under its new online interface for student borrowers. Regarding our recommendation to provide certain borrowers with more information about options available to contest TEPSLF decisions, Education stated that it will add information for borrowers on the procedures for contesting TEPSLF decisions to FSA’s specific TEPSLF website and in relevant TEPSLF denial letters. To improve outreach and help increase overall borrower awareness of TEPSLF, Education stated it will require all loan servicers to provide TEPSLF information on their websites within 120 days. In addition, Education stated that it will also include TEPSLF information in the PSLF Help Tool. We also provided relevant report sections to the TEPSLF loan servicer for technical comments. The TEPSLF servicer provided technical comments, which we incorporated as appropriate. We are sending copies of this report to relevant congressional committees, the Secretary of Education, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Michelle L. St. Pierre (Assistant Director), Nora Boretti (Analyst-In-Charge), and Aaron Karty made significant contributions to this report. Also contributing to this report were James E. Bennett, Deborah Bland, Alicia P. Cackley, Marcia L. Carlsen, Linda A. Collins, William W. Colvin, Alex Galuten, Sheila R. McCoy, Jean L. McSween, Jessica S. Orr, Debra Prescott, and Ashanta Williams. Public Service Loan Forgiveness: Education Needs to Provide Better Information for the Loan Servicer and Borrowers. GAO-18-547. Washington, D.C.: Sept. 5, 2018. Federal Student Loans: Further Actions Needed to Implement Recommendations on Oversight of Loan Servicers. GAO-18-587R. Washington, D.C.: July 27, 2018. Federal Student Loans: Education Could Improve Direct Loan Program Customer Service and Oversight. GAO-16-523. Washington, D.C.: May 16, 2016. Federal Student Loans: Key Weaknesses Limit Education’s Management of Contractors. GAO-16-196T. Washington, D.C.: Nov. 18, 2015. Federal Student Loans: Education Could Do More to Help Ensure Borrowers Are Aware of Repayment and Forgiveness Options. GAO-15-663. Washington, D.C.: Aug. 25, 2015.", "summary": "In the context of high denial rates in the PSLF program, Congress appropriated $700 million in 2018 for a temporary expansion to the public service loan forgiveness program for certain borrowers who were not eligible for the original PSLF program. TEPSLF funds are available on a first-come, first-served basis. GAO was asked to review TEPSLF. This report examines (1) the extent to which the process for obtaining TEPSLF is clear to borrowers, (2) what is known about loan forgiveness approvals and denials, and (3) the extent to which Education has conducted TEPSLF outreach. GAO analyzed data from the TEPSLF servicer on loan forgiveness requests from May 2018 through May 2019 (the most recent available at the time of our review); reviewed Education's guidance and instructions for the TEPSLF servicer; assessed Education's outreach activities; interviewed officials from Education, the TEPSLF servicer, and selected groups representing borrowers; and reviewed borrower complaints about TEPSLF submitted to Education. The Department of Education's (Education) process for obtaining Temporary Expanded Public Service Loan Forgiveness (TEPSLF) is not clear to borrowers. Established in 2007, the Public Service Loan Forgiveness (PSLF) program forgives federal student loans for borrowers who work for certain public service employers for at least 10 years while making 120 payments via eligible repayment plans, among other requirements. In 2018, Congress funded TEPSLF to help borrowers who faced barriers obtaining PSLF loan forgiveness because they were on repayment plans that were ineligible for PSLF. Congress also required Education to develop a simple method for borrowers to apply for TEPSLF. Education established a process for borrowers to initiate their TEPSLF requests via e-mail. The agency also required TESPLF applicants to submit a separate PSLF application before it would consider their TEPSLF request. Agency officials said they established this process to quickly implement TEPSLF and obtain the information needed to determine borrower eligibility. However, the process can be confusing for borrowers who do not understand why they must apply separately for PSLF—a program they are ineligible for—to be eligible for TEPSLF. Requiring borrowers to submit a separate PSLF application to pursue TEPSLF, rather than having an integrated request such as by including a checkbox on the PSLF application for interested borrowers, is not aligned with Education's strategic goal to improve customer service to borrowers. As a result, some eligible borrowers may miss the opportunity to have their loans forgiven. As of May 2019, Education had processed about 54,000 requests for TEPSLF loan forgiveness since May 2018, and approved 1 percent of these requests, totaling about $26.9 million in loan forgiveness (see figure). Most denied requests (71 percent) were denied because the borrower had not submitted a PSLF application. Others were denied because the borrower had not yet made 120 qualifying payments (4 percent) or had no qualifying federal loans (3 percent). More than a year after Congress initially funded TEPSLF, some of Education's key online resources for borrowers do not include information on TEPSLF. Education reported that it has conducted a variety of PSLF and TEPSLF outreach activities such as emails to borrowers, social media posts, and new website content. However, Education does not require all federal loan servicers (who may serve borrowers interested in public service loan forgiveness) to include TEPSLF information on their websites. Further, Education's Online Help Tool for borrowers—which provides information on PSLF eligibility—does not include any information on TEPSLF. Requiring all loan servicers to include TEPSLF information on their websites and including TEPSLF information in its online tool for borrowers would increase the likelihood that borrowers are able to obtain the loan forgiveness for which they may qualify. GAO is making four recommendations, including that Education integrate the TEPSLF request into the PSLF application, require all loan servicers to include TEPSLF information on their websites, and include TEPSLF information in its PSLF Online Help Tool. Education agreed with GAO's recommendations. (617) 788-0534 or emreyarrasm@gao.gov .", "document_type": "gao"}
{"report": "U.S. and foreign air carriers have cooperated in a variety of ways to expand their international reach and service offerings. Legal requirements in the United States and other countries prevent mergers between U.S.- owned airlines and foreign owned airlines and also place restrictions on carriers providing end-to-end service between locations within other countries as well as between third countries. Air carriers may cooperate with each other to provide a wider range of services, more seamlessly, despite these restrictions. Simple forms of cooperation include, for example, “interlining,” which are voluntary commercial agreements to carry passengers across two or more carriers on the same itinerary, and “codesharing,” an agreement whereby carriers place their marketing code on a flight operated by another carrier. This practice allows consumers to book a single ticket for an itinerary involving two separate airlines, with one airline selling tickets under its own code for travel on the other carrier’s flight. These cooperative activities allow carriers to access each other’s network with varying degrees of cooperation. As part of their cooperative efforts, some carriers have formed global alliances. An alliance is an agreement between two or more airlines to link each of the airlines’ route networks and coordinate on specified activities, such as marketing and sales; coordination of airport operations (e.g., sharing gates or baggage facilities); and frequent flyer program accrual and redemptions. Alliances represent more involved coordination than interline or codeshare relationships. This expanded cooperation, according to DOT, allows participating carriers to further expand the geographic reach of their respective networks that the carriers would not be able to do on their own, because of the aforementioned legal restrictions and due to the economic and operational difficulties a single carrier would face implementing such an expansion in foreign markets. As of January 2019, there were three global airline alliances, each with a major U.S. member airline and multiple foreign partners: Oneworld (American Airlines); SkyTeam (Delta Air Lines); and the Star Alliance (United Airlines). These three airline alliances have 61 airline members: 13 for Oneworld, 20 for SkyTeam, and 28 for the Star Alliance. Many of the carriers within each of these alliances, as well as other carriers, have pursued antitrust immunity from DOT to cooperate more closely on key economic elements of their businesses that U.S. antitrust laws might prohibit. The specific activities are delineated in cooperative agreements and carriers have the option to implement such agreements without antitrust immunity from DOT. Carriers are more likely to pursue immunity when the proposed cooperation—and risk of antitrust violations—involves increasingly integrated business functions, according to DOT. However, once carriers that are party to such an agreement are immunized, carriers can cooperate more comprehensively than through interlining and codesharing arrangements (see fig. 1). For example, these agreements may stipulate that carriers share revenues across their flights, regardless of which carrier operates the flight, and jointly coordinate on schedules, prices, and sales. Since 1993, when DOT immunized the first cooperative agreement, between Northwest Airlines and KLM Royal Dutch Airlines, DOT has adjudicated 38 cases which involved one or more U.S. carriers and foreign carriers. Currently, United, Delta, and American—and their major foreign airline partners—are each members of multiple immunized cooperative agreements with their foreign airline partners. As a result, immunized carriers now provide air service across the globe. For example, in 2017, immunized carriers across these three alliances provided approximately 75 percent of the available seats on trans-Atlantic flights between the United States and Europe, and also provided on trans-Pacific service to Asia, and Australia, as well as service to South America. DOT’s process for reviewing each application for antitrust immunity includes two analytic steps. First, DOT must decide whether to approve a proposed cooperative agreement. In this step, by statute, DOT is directed to approve cooperative agreements deemed “not adverse” to the public interest. DOT conducts a competitive analysis to make this determination. Second, DOT decides whether to grant antitrust immunity to the agreement’s partners for activities undertaken pursuant to the approved agreement. DOT’s statutory authority provides for such a grant of immunity only to the extent necessary for the parties of the agreement to go forward with the transaction and only if the immunity is “required by the public interest,” vis-a-vis the creation of consumer, commercial, or other public benefits that would not otherwise occur. These steps will be discussed in detail in the following section. The statute does not detail specific competitive metrics or public benefits that DOT must consider in its evaluation but rather provides DOT leeway in making such determinations. The Department of Justice, which is responsible for reviewing and approving domestic mergers, may provide DOT with input during deliberations. DOT may also consult with relevant authorities in the foreign partner’s country. In granting antitrust immunity, DOT may require carriers to comply with specific conditions and, for grants of antitrust immunity approved since 2009, reporting requirements. DOT’s process to consider requests for immunity follows procedural steps delineated in the Administrative Procedure Act (APA). The APA provides for public notice and comment. At the beginning of the proceeding, carriers applying for immunity place information about the proposed cooperative agreement in a public docket. DOT staff then review this material, may request additional information to address any questions raised by their review, and will solicit comments from the public. The APA, in contrast to Department of Justice merger review procedures, specifies steps that afford public involvement and requires agencies to respond to the public comments. In DOT’s proceedings, the Department typically issues “show cause” orders that articulate the tentative approval or disapproval of the application. After publishing this show-cause order, DOT solicits additional public comments for review prior to issuing a final decision. See figure 2 for a summary of this process. DOT’s statutory authority indicates that DOT may conduct “periodic reviews,” but the statute does not include a definition of the nature or frequency of these reviews. All of DOT’s orders granting antitrust immunity state DOT may amend or revoke a grant of immunity at any time. Further, after DOT issues a final order that approves a request for antitrust immunity, the public docket remains open and provides a forum for ongoing public comments that DOT is obligated to respond to. DOT analyzes competitive and public benefit effects, taking into consideration the potential effects on consumers, when deciding whether to approve cooperation agreements and grant carriers antitrust immunity, based on our review of DOT’s processes. In competitive and public benefit analyses, DOT uses the professional experience and expertise of staff to identify and assess relevant market factors, the terms of proposed cooperative agreements, supporting documents, and other information in light of the facts and circumstances specific to each case. DOT’s competitive analysis focuses on the likely effect of the cooperative agreement on competition in key airline markets, while the public benefits analysis focuses on the likelihood of carrier integration yielding consumer benefits. As discussed earlier, DOT’s process includes opportunities for stakeholders’ participation. Stakeholders we interviewed considered the overall review process transparent, though some had criticisms of the underlying economic evidence DOT uses to predict if, and how, consumer benefits might arise. The potential effects of proposed cooperative agreements on competition, and thus consumers, are central to DOT’s analysis. Specifically, DOT looks to see how the agreement may affect competition across routes affected by the alliance agreement. To make this assessment, according to DOT documentation that we reviewed and officials whom we interviewed, DOT focuses on three key elements of the proposed agreement. Specifically, DOT identifies (1) the geographic scope of the proposed alliance and which markets that the agreement would affect; (2) the number of competitors in each market, their market shares, and the level of market concentration; and (3) the feasibility and likelihood of market entry by new competitors into markets that might be adversely affected by the agreement as well as the ability of existing carriers to compete in such markets (see table 1). DOT’s assessment is based on an array of information provided by applicants and third parties. This information may include competitive analyses or other studies conducted by consulting economists for the applicants, and business plans and data, among other things. DOT may also independently use departmental databases to conduct its own analysis, including those data DOT collects from foreign carriers pursuant to data-reporting requirements in existing grants of antitrust immunity. DOT looks at competitive issues at the region-to-region (e.g., United States to Europe), country-to-country (United States to France), and city- to-city levels (e.g., New York-to-Paris city pair market), or airport-to- airport pairs (Chicago O’Hare-to-London Heathrow). The analysis focuses largely on city- or airport-pairs because the sale of air transportation between cities/airports is the product being sold by airlines and purchased by the consumer, according to DOT officials. Consequently, DOT looks most closely at those city-pair markets where the number of competitors is expected to decline, such as from 3 to 2 or 2 to 1, when the applicants are counted as a single competitor. According to DOT officials, this approach to competitive analysis is consistent with legal and economic practice and in the application of antitrust laws and principles used by other competition authorities, such as the Department of Justice. Officials then recommend determinations as to whether such a reduction in competitors in these markets is likely to be harmful to competition and, in turn, to consumers. According to DOT officials, the department has no predetermined threshold for defining substantive competitive harm because it would not be appropriate to pre-define what constitutes a “substantial reduction in competition” that would necessitate disapproval of an application. Instead, the Department looks at the characteristics of discrete markets where there is a reduction. In addition to looking for potential competitive harms in the city-pair analysis, DOT’s competitive analysis also assesses if the agreement could enhance competition in some markets. In particular, DOT may find that certain markets will have an increase of an effective competitor due to the agreement. Specifically, based on applicants’ filings, DOT may expect the cooperating carriers to enter new routes that neither had previously served. For example, DOT approved a grant of immunity in 2010 based on expectations that the applicants would have increased opportunities for new or expanded transpacific routes and service and enhanced connecting options, among other benefits. Additionally, if two carriers each served a market with a market share under 5 percent—the threshold DOT uses for deeming a carrier as providing competitive service on the route—the agreement may push that market share above the 5-percent threshold and effectively result in a new competitor on the route. Also, according to DOT, the carriers’ agreement could result in connecting flights across two carriers to become effectively “online” (as opposed to “interline”) for some city-pair markets due to the agreement. This could potentially offer consumers competing options among airlines that provide direct flights on a given route. We reviewed DOT documentation in which its analyses had projected these improved competitive outcomes across thousands of city-pair markets based on an application for a cooperative agreement. Finally, according to DOT orders, carrier agreements can promote competition in various markets, if the agreements strengthen inter-alliance network competition. For example, DOT approved and immunized the cooperative agreement between the major partners of the Oneworld alliance, in part, based on the finding that a third immunized global network could better discipline the fares and services offered by the Star and SkyTeam alliances. Specifically, in approving the immunity application, DOT noted consumer benefits stating that “enhanced inter-alliance competition is beneficial for consumers across many markets, in particular the hundreds of transatlantic markets in which the applicants become more competitive as a direct result of the alliance. Travelers in those markets gain new competitive options.” Though DOT may find prospective competitive harm from the agreement, such as a reduction in the number of competitors in certain markets, DOT does not necessarily reject the application if a DOT-stipulated remedy can potentially mitigate those harms, according to department officials. DOT has used different potential remedies over the years, including carving out specified city-pairs from a grant of immunity and requiring carriers to divest from slots at specific airports (see table 2). DOT officials indicated carve-outs are less favored now than in the past because carve-outs on specific routes can, in DOT’s view, diminish broader public benefits of the alliance by limiting the degree carriers can merge their operations. DOT currently has 11 active carve-outs in three alliances, with the last carve- out issued in 2009. More recently, DOT officials indicated mitigations based on slot divestitures have the potential to better target competitive harms on specific routes by enabling new entrants to these cities with slot-constrained airports. DOT required slot-based remedies in two grants of immunity, one in 2010 and one in 2016. In the 2010 immunity grant, DOT required applicants to relinquish slots at London’s Heathrow airport and specified that two slots must be for Boston-Heathrow services and two for services between any U.S. location and Heathrow. DOT expected these remedies, once implemented, to enable other carriers to start new services to compete with the newly immunized alliance, thereby ensuring adequate competition remains in the affect market. Whether and what mitigation strategies are pursued can be a contested aspect of the proceeding, in which DOT, the applicants, and third-parties debate the competitive implications of the agreement and the mitigations based on the facts and circumstances of each situation. In a 2016 case involving Delta and Aeromexico, DOT included two new or rarely used conditions in the grant of antitrust immunity. Specifically, to address competitive concerns specific to this case, DOT made its approval conditional upon the removal of exclusivity clauses in the joint venture agreement that precluded specified types of cooperation with other carriers. Though the carriers argued that such clauses were necessary to encourage long-term investment in their cooperative products and services, DOT took into account the perspectives from stakeholders’ docketed comments, concluding that such clauses could give the carriers an undue ability or incentive to foreclose actual or potential competition. Additionally, DOT placed a 5-year sunset provision on its grant of antitrust immunity to Delta and Aeromexico to allow DOT a defined opportunity to revisit whether specific slot constraints identified at the Mexico City airport had been resolved. Prior grants of immunity regularly included requirements for carriers to resubmit their cooperative agreements to DOT after 5 years as part of DOT’s subsequent monitoring (discussed below), but the immunity was not time limited. DOT officials explained the inclusion of the sunset provision was to address concerns specific to this case, rather than a new departmental policy. Once the competitive analysis and any decisions on mitigations are complete, DOT determines whether, on balance, the proposed agreement would likely have an overall positive, neutral, or negative competitive effect and decides whether to approve the agreement. In all cases where DOT has granted antitrust immunity, DOT found the proposed cooperative agreements, on balance or with any specified remedy in place, to be either neutral or pro-competitive. However, DOT has denied approval of a proposed agreement, citing that the carriers’ combined market share on routes where they both operate service would be so dominant they could, for example, raise prices to the detriment of consumers. DOT conducts public benefits analyses to determine if there are benefits of proposed cooperative agreements for consumers. Based on our review of applications, carriers typically point to varied benefits such as the potential for lower fares on certain routes, improved connectivity, and reciprocal frequent flier benefits for consumers. In considering the public benefits claims made by applicants as well as any potential benefits of the proposed agreement identified by DOT, the department assesses whether (1) the public benefits identified are significant and likely to be realized in a timely fashion and (2) if a grant of immunity is necessary for the carriers to go forward with the agreement such that benefits will be achieved. DOT officials emphasized that this assessment focuses on the carriers’ anticipated level of integration. The officials said higher levels of cooperation in a proposed agreement, given the nature of the airline industry and depending on the economic incentives employed, can lead to lower fares, especially for connecting itineraries. Though DOT officials acknowledged that the flow of consumer benefits due to high levels of carrier cooperation is not absolute or certain, they said DOT’s analysis has consistently supported the notion that connecting passengers who traverse carriers on a given itinerary pay less as cooperation between alliance carriers increases. DOT has applied this policy in each of the proceedings involving grants of antitrust immunity to the three major air alliances—SkyTeam (2008), Star Alliance (2008), and Oneworld (2010)— as well as subsequent cases. For example, DOT approved immunity within the Star Alliance based on its expectation that fares for connecting itineraries for Star’s transatlantic routes would decrease, benefiting the majority of its transatlantic passengers. DOT further noted that this connecting service would “discipline fares on non-stop routes,” as well. The practical consequence of this policy, according to DOT officials, is that DOT expects applicants to present detailed cooperation agreements, which show integrative efficiencies and processes, at the time the requests for antitrust immunity are made. In other words, DOT expects antitrust immunity, when provided, will provide consumers with an array of benefits—lower connecting fares, new route offerings, among others— that follow from these business efficiencies. DOT’s public benefits analysis considers the specific provisions of each proposed agreement to assess how the applicants plan to coordinate a wide range of business functions. These can include network and capacity planning, scheduling, pricing, sales, revenue management, and customer service, among other considerations. DOT officials told us that they examine the carriers’ revenue-sharing plans, corporate strategic documents, and other relevant documentation. For example, DOT may look to see if carriers plan to: Share revenue in a manner to provide incentives to carriers to coordinate the management and selling of their combined networks to make more seats and more frequencies on routes linking their respective networks available, substantially increasing connectivity and time-of-day schedule options and improving customer service by treating their partner’s customers just as they would their own. Align their different ticket fare and availability classes and procedures such that their revenue management systems make seats available on domestic flights for passengers connecting from the foreign partner’s flights at the same levels and on the same terms as if customers were connecting online from their own international flights. Coordinate marketing and incentivize sales staff to promote the carriers’ combined, rather than individual networks, and thereby creating more options for consumers. Align products for a consistent, seamless passenger experience (e.g., baggage fees, upgrade policies, frequent flyer program rules). According to DOT, the agency further reviews governance and revenue- sharing provisions to ensure that sufficient economic incentives exist to substantially increase the number of passengers flowing through the combined networks and to significantly increase capacity (particularly on hub-to-hub routes and home country hub-to-beyond foreign hub routes). Further, DOT has sought detailed information from applicants on their plans to increase capacity beyond what they would do in the counterfactual scenario in which DOT did not grant immunity. These officials said that DOT places particular emphasis on the quantity, likelihood, and viability of additional capacity when determining whether the application will produce substantial benefits that might not occur if applicants choose not to go forward with the agreement in the absence of a grant of immunity. DOT also considers filings from other parties that support or cast doubt on the applicants’ claims. For example, in 2005, DOT denied an application from six carriers seeking immunity for the SkyTeam Alliance. According to DOT officials, based on the case record and competitive circumstances at the time, DOT found that immunizing the proposed agreement would not provide sufficient public benefits. This finding comported with arguments from objecting parties that immunity was not required to produce benefits because there was a high likelihood that SkyTeam members would continue integrating their management and operations, in order to maintain and maximize the profitability of their existing relationships. As with the competitive analysis, DOT officials use their professional experience and expertise, as well as the case record of each application, to determine the likelihood of benefits, and the necessity of antitrust immunity for carriers to implement their proposed plan quickly. As a general practice, DOT does not attempt to replicate the benefits analyses that carriers may provide as part of their application, according to DOT officials. DOT officials explained that they use their knowledge of the industry to verify and validate the applicants’ benefit claims by qualitatively assessing the reasonableness of the market and broad economic assumptions underlying these claims. Based on this assessment, DOT may condition a grant of immunity on carriers’ first demonstrating a readiness and ability to implement the agreement. For example, in one case, the department did not initially grant antitrust immunity to the partners of a cooperative agreement because DOT determined that incompatibilities in the carriers’ information technology systems would prevent the partnership from yielding consumer benefits. Consequently, DOT officials said they advised the applicants to reconcile these shortcomings, or risk DOT finding the benefits of the proposed cooperative agreement implausible and, in turn, antitrust immunity unwarranted. Similarly, DOT has also conditioned several grants of antitrust immunity on the carriers’ expeditious implementation of the proposed cooperative agreement. Based on our analysis of DOT’s antitrust immunity proceedings, DOT has ultimately approved most of the requests for antitrust immunity that it has received, with some stipulating competitive remedies. Specifically, DOT has adjudicated 38 applications involving a U.S. and foreign carrier(s) since 1993, granting antitrust immunity 31 times, according to our analysis. Twenty-three of these grants remain in effect across 13 different carrier agreements. See appendix I for information on adjudicated immunity proceedings involving U.S. and foreign carriers. In two proceedings, DOT denied antitrust immunity based on findings from its public benefits analysis. Specifically, in one proceeding, DOT found that the overall level of public benefit was small because the proposed alliance focused on a single route and was not likely to create new routes or a significant number of new travel options for consumers. In the other proceeding, DOT noted that code sharing or other less-involved forms of collaboration could produce similar benefits, namely new and expanded service additions, suggested by the carriers. Consequently, DOT denied these applicants’ requests for antitrust immunity. Most stakeholders, in particular representatives from major carriers, we interviewed considered DOT’s final decisions and application review process to be largely transparent, but lengthy. DOT officials and some stakeholders we interviewed underscored that there are opportunities for interested parties, including competing airlines, to examine all submitted application materials—including confidential and proprietary information— and to provide substantive comments. DOT officials emphasized the importance of a complete record of information on the official docket as the basis for their decisions. DOT is required to make a final decision within 6 months from the date of an application but may issue a notice to suspend the procedural schedule in order to establish a complete record. Some carriers we interviewed said that DOT’s review and efforts to establish a complete record can cause a proceeding to be lengthy. For example, the most recently completed proceeding to date was over 18 months from when the application was filed until DOT issued a decision. This proceeding involved a number of filings that pointed to the likely harm to present and future competition from independent carriers in specific markets due to the potential for exclusionary behavior by the applicant carriers. Our documentation review affirms DOT’s and stakeholders’ view that available proceedings’ records include DOT’s analyses and findings. With the exception of confidential or proprietary information, all applications, notices, DOT orders, and other documentation related to an application can typically be found on the public docket. Our review of all the proceedings found that each DOT order providing a grant of immunity included discussion of DOT’s findings from its competitive and public benefits analyses, as well as discussion of why and how DOT arrived at stipulated remedies, if any. For example, as previously discussed, in the 2010 Oneworld order, DOT described the potential competitive harm at specific airports that the department identified in its analysis and rationale for requiring a divestiture of slots at those airports as a remedy for those potential harms. Though we found consensus among stakeholders that DOT’s process is transparent, there is disagreement among the stakeholders we interviewed about the potential benefits of immunity for consumers. Specifically, two third-party stakeholders and representatives of all non- immunized carriers we interviewed suggested that carriers do not need antitrust immunity to cooperate in ways that benefit consumers, such as through codeshare and interlining agreements. Some of these stakeholders noted that immunized carriers, through their cooperative agreement, could have access to better market data than non-immunized carriers or leverage their increased network size to gain unfair competitive advantages. Representatives for all three U.S. carriers with approved immunized agreements indicated these immunities were, and continue to be, essential to their ability to provide high-quality service to their customers. Moreover, these carriers believed that changes to DOT’s process should be focused on expediting the process so that public benefits achievable only through grants of antitrust immunity could be realized more quickly. DOT officials indicated they are aware of the controversial nature of grants of antitrust immunity and noted that it takes time for DOT to gather and assess the evidence in each proceeding. These officials indicated that the department considers different views when considering applications, monitors academic and other literature on the topic, and applies these ideas as the officials deem appropriate in their decision-making. DOT conducts a number of activities to oversee and monitor individual immunized cooperative agreements and to understand how broad trends in international air competition affect immunized agreements. For example, DOT officials responsible for the program explained that they analyze a variety of international and domestic airline-competition issues including, but not limited to, airline alliances and, accordingly, keep track of market developments, such as new carriers entering markets and changes in market shares of established carriers. By monitoring these broad trends, DOT is able to better understand industry dynamics, according to officials we interviewed. For specific grants of immunity, DOT officials emphasized that they may tailor some monitoring activities to the nature of the agreement and the specific requirements set forth in DOT’s grant of immunity. For example, DOT officials explained they track compliance with the required slot divestitures in one grant of immunity through a designated trustee or, for immunities that require carriers to maintain capacity on certain routes, by DOT officials’ own review of existing flight schedule databases. DOT officials noted that the department’s specific monitoring activities are undertaken to track the implementation of cooperative agreements and to assure carriers comply with the terms of immunity grants (see table 3). In recent years, DOT’s monitoring activities have focused on the status of cooperation under immunized agreements and whether that cooperation is leading to merger-like efficiencies. To that end, according to DOT officials, all seven grants of immunity approved since 2009 require carriers to submit confidential annual reports to DOT. These reports cover topics including the public benefits of the agreement and commercial developments between the partners. Each year, DOT develops a template for these reports that delineates what information must be included on operational aspects of the implemented agreement (e.g., integration of routes and service planning) and the extent that partnered carriers have aligned their customer service policies to provide customers with a consistent experience across partners, among other topics. These reports, and DOT’s associated reviews, are the core of DOT’s current monitoring efforts, according to DOT officials and, according to representatives of the carriers submitting these reports, provide DOT with extensive information on the implementation status of the immunized agreement. Our examination of the most recent of these reports, for 2017, affirms they include considerable information on the implementation of the agreement and status of the alliance. DOT’s monitoring activities also include some review of empirical information on the effects of individual immunities. Specifically, as discussed above, carriers seeking immunity routinely identify anticipated consumer benefits, such as lower fares and greater frequency of service, and DOT has predicated grants of immunity on these expected benefits. According to DOT officials, they monitor available schedule, pricing, and other data to check whether observed outcomes are consistent with expectations, and if not, whether other factors, such as fuel prices or other market changes, provide a qualitative explanation of observed trends. The 2017 annual reports that carriers submitted to DOT also included information on these trends, based on our review of these documents. Likewise, according to DOT officials, DOT takes steps to track the status of remedies—such as whether airport slots were, in fact, divested and market entry occurred as was expected. DOT’s specific steps to do so vary depending on the nature of the remedy and the availability of relevant information. Furthermore, DOT officials commented that third parties, such as other air carriers, have incentives to alert DOT to concerns about violations of exclusivity prohibitions that help DOT verify and enforce this condition of some immunity grants. DOT’s monitoring activities do not typically include independent econometric analysis to examine the effects of the immunities it has granted, according to DOT officials, but the department tracks economic literature on these effects and has recently commissioned its own study. As we have noted, DOT looks for substantial integration among carriers requesting immunity as an indication that pricing efficiencies will be attained and benefit consumers. For a connecting airline route where one carrier serves one leg of the route and a different carrier serves the other leg, it is broadly recognized by economists that joint price-setting by the carriers will generally result in a lower airline fare. However, in cases where two airlines are competing on the same route—as could be the case on nonstop routes between the U.S. and another country—carrier coordination could reduce the extent of effective competition and lead to higher fares. Additionally, lesser forms of coordination that do not rely on a grant of immunity may also address the “double pricing” inefficiencies on connecting routes. Academic literature that uses statistical modeling to examine the effect of antitrust immunity has come to differing conclusions on the effect of immunity on fares for airline passengers. For example, one study found that connecting routes served by carriers with immunized cooperative agreements had lower prices compared to connecting routes served by carriers with other forms of cooperating agreements that were not immunized, and this study also found that immunities did not lead to higher fares on nonstop routes. However, another study found that antitrust immunity reduced competition and, thus, caused higher prices on nonstop routes; this study also found that pricing efficiencies on connecting routes did not require antitrust immunity. Recognizing the varying findings of the available literature, DOT commissioned a specialized study in 2016 to improve its understanding of the effect of immunities and airline joint ventures on consumer prices. According to DOT, the department provided guidance, data, and other input to support this work, but did not assist in the analysis or guide its conclusions. The report was provided to DOT in the summer of 2018, and according to DOT officials, as of December 2018, the department was reviewing the study’s findings, and considering how, if at all, it might apply the methodologies used in the study to DOT’s own monitoring activities in the future. DOT officials also indicated they have not made any final determinations about what, if any, adjustments may be appropriate to existing grants of immunity or to DOT’s process for considering future immunity applications based on the study’s findings. Based on our review of antitrust immunity proceedings, DOT has rarely amended or modified, and has seldom revoked immunity of an approved cooperative agreement. However, DOT has changed some terms of approval when carriers have sought immunity for updated agreements that, for example, added other carriers to an existing agreement. DOT officials explained that initiating a change in an existing immunity grant is a time-consuming and technically difficult process because it would involve the same administrative steps as in the initial approval process. Further, DOT officials indicated that carriers have been generally responsive to the requirements laid out in DOT’s grants of immunity, and as a result, DOT has not needed to pursue many corrective actions. Moreover, these officials explained that they are well aware of carriers’ plans to pursue new immunized agreements, and as a result, DOT officials are able to await those proceedings to make incremental changes to the terms of DOT’s original approval. For example, DOT’s early grants of immunity did not include annual-reporting requirements, but as carriers updated their agreements and sought new immunities, DOT used these new proceedings as an opportunity to add this requirement. There is generally little, if any, information from DOT available to external stakeholders and the public regarding DOT’s monitoring efforts and its findings on the effects of granted antitrust immunities. DOT publishes one summary document on its website that lists every active and inactive immunized cooperative agreement. This document, which according to officials, DOT updates periodically with each new grant of immunity, includes web links to the dockets of formal proceedings associated with each immunity application and grant. This document provides a single portal for anyone to access materials related to antitrust immunities that are spread across multiple dockets. Each docket remains open for public comment as long as DOT’s grant of immunity remains active. For example, in 2017, stakeholders submitted public docket comments critical of the market effects of a cooperative agreement awarded antitrust immunity 15 years earlier. In this case, DOT provided a formal, public response, as required, on the issues raised. DOT does not report information on its own voluntary monitoring activities in public dockets or elsewhere. For example, DOT does not post information on whether immunized carriers have submitted required annual reports or, as periodically required, resubmitted their cooperative agreements to DOT. Moreover, DOT does not release its assessments of these materials nor does DOT make any public statements on whether a grant of immunity yielded, in actuality, the types of carrier cooperation expected, whether DOT-imposed remedies were implemented and had the expected results, or whether the immunity generated the public benefits as expected when approved. As described previously, DOT has approved grants of immunity based on the expectation of various public benefits. These potential benefits include, for example, lower consumer prices for connecting flights, expanded route and schedule offerings, and increased market entry and competition. DOT provides no reports to the public or Congress related to whether these expectations were met. Internal controls help program managers achieve desired results and adapt to shifting environments, evolving demands, changing risks, and new priorities. As part of an internal control system, management should externally communicate quality information. Attributes of this principle call on federal program managers to communicate quality information externally so that external parties can help the government achieve its objectives and address related risks. Generally, according to this internal control standard, government reporting is intended for the executive branch’s decision makers and Congress as well as the general public. Management may select appropriate methods for external reporting. Accordingly, program managers should consider what methods are appropriate for such a broad audience, considering factors such as the nature of information and cost. In the context of grants of antitrust immunity, relevant parties include Congress, industry stakeholders, and the general public. Each of these groups may have distinct needs and abilities to access, understand, and act upon information about the effects of antitrust immunities in the marketplace. DOT officials cited several reasons for not reporting on their monitoring activities and related findings. DOT officials underscored that much of the information gathered in its voluntary monitoring efforts—annual reports, in particular—are proprietary and, therefore, not information DOT could publicly disclose. Representatives from immunized carriers we interviewed also stressed that public disclosure of the business plans and alliance status assessments provided to DOT would be damaging to their business if made public. DOT officials also expressed concern that commentary from the department about the effects of immunities could be construed as departmental promotion of a specific alliance, or “prejudgment” of an issue that could come before the department in a future proceeding. DOT officials also said competition authorities, such as the Department of Justice, do not typically address the results of a case (e.g., post-merger analyses) and are only involved with the process and guidelines associated with reviewing and adjudicating a case. While there are valid concerns about the publication of proprietary information and statutory prohibitions on doing so, there are available avenues for DOT to report on the findings of its monitoring activities and assessments of the consumer effects of antitrust immunities broadly. Further, many of the expected benefits of grants of immunity—such as changes in prices, schedules, and markets served—can be evaluated without relying on proprietary information. For example, the number of competitors serving city-pair markets and carriers’ market shares can be calculated—as DOT does during the approval process—using publicly available data. Prices changes under the immunity can also be evaluated using publicly available information. Likewise, an assessment of the market outcomes of competitive remedies—such as whether slots were divested and competitors provided new service as expected—does not require business-sensitive information about the internal workings of an immunized alliance, but rather data on the public actions of carriers in the marketplace. These data are publicly available through schedule data and information in DOT datasets. Government reporting can also protect proprietary information from improper disclosure, either by issuing restricted reports to Congress or through stating findings at a very general level. For example, the Federal Trade Commission has balanced the protection of proprietary information from public disclosure while also reporting on the commission’s findings of the effects of its commission- imposed competitive remedies. Specifically, the Federal Trade Commission published two merger remedies studies, eliminating the names of and financial information about the merging parties and the buyers of the divested assets in publicly available versions. The Federal Trade Commission made both of its studies public. The lack of information available on the observed effects of immunities in the marketplace, including the effects of DOT-stipulated remedies, can make it difficult for external stakeholders to assess what consumer benefits have, or have not, been realized. According to consumer and antitrust organizations we interviewed, the lack of available information left them speculating that DOT did not conduct any monitoring of granted immunities after approval. Likewise, representatives from two of the three non-immunized carriers we interviewed noted the contrast between the transparency of DOT’s approval process and the opacity of its monitoring process. Additionally, two stakeholders we interviewed opined that airline alliances have harmed consumers by, for example, creating restrictive rules that make certain types of travel more difficult than in the past, among other anti-consumer effects. Some stakeholders mentioned they had no basis to review or comment on whether DOT monitoring activities are sufficient. Another stakeholder mentioned that in the absence of any reports or other information from DOT, they did not know if alliances have delivered the consumer benefits initially expected. DOT officials stressed that because the process for consideration of immunity is public any outside party may petition the department for review of an existing immunized alliance and provide information on the docket—which remains open—if any party believes that an alliance is acting contrary to the public interest. However, two stakeholders we interviewed indicated that it was difficult to use the docket comments process to lodge observations or criticisms without, for example, disclosing their own competitively sensitive information and absent information on the implementation of immunized alliances. Further, the information available on dockets does not provide congressional policymakers with readily available information on the findings of DOT’s many ongoing monitoring activities. During the approval process, DOT publishes key aspects of its analytic findings in show-cause and final orders to the public docket. These documents provide insights into the basis for DOT’s decisions. DOT could periodically provide information on the effects of immunities, based on its monitoring activities, on the docket, or through other mechanisms, such as public reports or through confidential reports to Congress. This information could provide greater transparency and be useful in considering changes in DOT’s authority to grant antitrust immunity, an authority the Congress and others have considered at various points. With more information about DOT’s monitoring activities and findings, policymakers, stakeholders, and the public would have an improved understanding of the competitive effects of immunities. As U.S. and foreign air carriers have pursued more integrated forms of cooperation through international air alliances, DOT has extended American Airlines, Delta Air Lines and United Airlines antitrust immunities with their major foreign partners with the expectation that the immunities would yield public benefits. Cooperation between international air carriers can lead to certain benefits for consumers, and immunizing such cooperation from antitrust laws may yield additional benefits. DOT’s review of requests for immunity and oversight of immunized agreements are important to ensuring robust competition and, thus, consumer benefits in the marketplace. DOT’s ongoing monitoring pays significant attention to whether and how grants of immunity affect consumers. However, DOT generally has not reported on its monitoring activities and market outcomes of immunities. As the authority responsible for granting antitrust immunity, DOT holds a unique responsibility for reporting on these effects. Per internal control standards, the department’s responsibilities extend to communicating information to key stakeholders about the effect of immunities, based on DOT’s monitoring activities. DOT must balance providing information to policy makers and the public with statutory requirements that protect proprietary information from disclosure. DOT rightly keeps information on the status of cooperation under immunized agreements confidential. However, the market outcomes of immunities are not proprietary and DOT could publicly report on them. Such reports feasibly could include DOT’s views on whether the prospective benefits projected at the time of immunities’ approval have been realized and whether the department’s remedies have been implemented by immunized carriers and have had the effects expected by DOT. Like DOT’s current practice of periodically updating the summary document on immunities, DOT could issue such reports at a time interval it determines appropriate. Doing so would improve transparency and provide the public with improved information on the effects of antitrust immunities on consumers. The Director of DOT’s Office of Aviation Analysis should provide periodic external reporting, at a time interval DOT determines appropriate, to the public and policymakers, on the effects of antitrust immunity—based on the range of monitoring activities undertaken by DOT—including whether grants of immunity have achieved anticipated benefits and the status of remedies—such as airport slot divestitures—imposed as part of DOT’s approval. (Recommendation 1) We provided a draft of this report to DOT and the Department of Justice for review and comment. We received written comments from DOT, which are reproduced in appendix II and summarized below. In email, the Department of Justice told us they had no comments on the draft report. DOT and the Department of Justice also separately provided technical comments, which we incorporated as appropriate. In its written comments, DOT partially concurred with the recommendation. More specifically, DOT stated it will provide additional public information about the status of its monitoring activities and remedies, but it did not agree to report publicly on its findings about whether grants of immunity have achieved anticipated benefits. As discussed below, after evaluating the concerns that DOT raised, we continue to believe that periodically reporting on the effects of antitrust immunities would improve transparency and accountability. In its written response, DOT stated that if DOT were to release any additional materials than it already does, it could have a chilling effect, not just on competition by revealing proprietary information and insight on the real-time commercial strategies of a particular alliance, but also on the carriers’ willingness to share detailed and sensitive information with DOT that is necessary to conduct oversight. We disagree with DOT’s assertion that reporting on the effects of immunities would have a chilling effect on competition and the willingness of airlines to share information with DOT. Our report explains that DOT is prohibited from releasing proprietary information to the public and we expressly called on DOT to balance protecting this information while making appropriate information available to policy makers and the public. Moreover, contrary to DOT’s implication, we are not recommending DOT release the information DOT reviews during the annual reporting process, such as alliances’ revenue management and competitive strategies. Instead, the recommendation calls for DOT to report on the market effects of immunity relative to DOT’s anticipated benefits cited in DOT’s approvals of antitrust immunity and the status of remedies. As we noted in the draft report, these include trends in consumer fares, schedule offerings, and the like that DOT could report on without relying on proprietary information. DOT also stated that it must balance the importance of transparency with its statutory obligations to adjudicate each request for antitrust immunity fairly. Further, it stated that making such findings independently from the decision-making process in dockets with pending matters raises issues with prejudgment and ex parte communications, and is administratively unworkable. Doing so for cases that are not pending also raises issues of prejudice and prejudgment of “issues that are likely to be raised in future cases involving amendment of the alliance agreements (e.g., when membership changes).” We agree that DOT’s role as an impartial adjudicator is critical. We do not agree with DOT’s assertion that making public its assessment of the effects of immunities that have been granted would jeopardize its impartiality, because DOT could report this information and still consider each case based on its particular facts and circumstances. Further, the recommendation provides DOT with flexibility on how, when, and exactly what to report on that should allow DOT to avoid any prohibited ex parte communication. DOT described existing activities it believes maintain transparency for the public and ensure an ability for interested parties to seek review on the record of previously granted authorities. These activities include DOT’s public dissemination of passenger ticket and schedule data and the publication of DOT’s own orders that summarize departmental assessments of the state of competition as well as its immunity decisions. We note that our draft report described these activities in detail and recognized the overall transparency of DOT’s application review process. Nonetheless, we maintain that these activities do not provide regular or reliable information on the actual effects of antitrust immunities, based on DOT’s monitoring activities, and that DOT could do more to increase transparency through external reporting on these matters. For example, DOT’s provision of data to the public does not diminish the value of DOT providing its own independent reporting on whether expected consumer benefits, in fact, have materialized. Likewise, DOT’s published orders on specific immunities come at time intervals largely determined by the applicants and, naturally, when reviewing these applications, DOT’s competitive analysis focuses only on those markets relevant to the application at hand. More intentional reporting on the effects of immunity from DOT could address these shortcomings of existing activities. In other comments that were not included in DOT’s letter, DOT questioned the applicability of internal control standards to its role in monitoring grants of antitrust immunity. The principle of internal control we applied calls on management to externally communicate quality information that helps the agency achieve its objectives and manage risks. As we stated in the report, such communication can help program managers achieve desired results and adapt to shifting environments, which is relevant to DOT’s responsibility in this area. Ultimately, the recommendation, in full, aims to improve the transparency on the effects of antitrust immunity. Providing external stakeholders with additional information on DOT’s monitoring activities, as DOT agrees to do, should enhance confidence that DOT is undertaking oversight activities. Providing information on whether grants of immunity have achieved anticipated benefits, will further improve transparency and provide the public and Congress with useful information to inform policymaking in the future. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, the Attorney General, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the individual named above, Heather MacLeod (Assistant Director); John Stambaugh (Analyst in Charge); Friendly Vang-Johnson; Jim Geibel; Amy Suntoke; Delwen Jones; Amy Abramowitz; and David Hooper made key contributions to this report.", "summary": "Each year, millions of passengers travel internationally by plane. Many of these passengers are served by U.S. and foreign air carriers that have formed alliances to coordinate and integrate their networks. With antitrust immunity provided by DOT, airline alliances pursue a wide range of cooperative activities as outlined in joint venture agreements between the airlines. While this cooperation is meant to provide consumers with better services, it could also affect the extent of airline competition. GAO was asked to review consumer issues related to immunized international air alliances. This report (1) describes how DOT's review of antitrust immunity applications considers the potential effects on consumers and (2) evaluates how DOT monitors approved grants of antitrust immunity. GAO analyzed DOT's antitrust immunity proceedings, interviewed officials from DOT, the Department of Justice, as well as a nongeneralizable selection of 13 stakeholders, including consumer organizations and domestic air carriers with and without antitrust immunity. Potential effects on consumers are included in the analyses the Department of Transportation (DOT) conducts when reviewing international air carriers' requests for antitrust immunity. If granted, this immunity allows the airlines to engage in certain cooperative activities, such as coordinating prices and schedules, without risk of violating U.S. antitrust laws (see figure). DOT's analyses examine: The potential competitive effect of the proposed cooperative agreement in terms of relevant markets, on changes in the number of competitors and market shares, and on market entry. The potential for the close integration of carriers to create public benefits, such as lower consumer prices or expanded service offerings. Such analyses involve DOT staff's reviewing an array of data, documents, and reports filed in a public docket by carriers and interested parties and, ultimately, making a decision based on their assessment of the application. DOT has premised its decisions to grant immunity on the expectation that consumer benefits flow from high levels of integration of critical business functions between carriers. To date, DOT has granted antitrust immunity 31 times, with 23 grants currently in effect, which cover agreements made among carriers in each of the three major international air alliances. DOT has rejected three applications due to concerns about potential anticompetitive harm or insufficient public benefits for consumers. Stakeholders GAO interviewed generally agreed that DOT's decisions were transparent, but some disagreed on the potential benefits of immunity for consumers. DOT takes multiple steps to monitor alliances and understand the effects of immunity. Since 2009, DOT has required all transatlantic and transpacific partnerships to submit annual reports on the status of their immunized agreement. Additionally, DOT recently commissioned an empirical evaluation of immunities' effects and is currently reviewing the findings. However, DOT does not externally report information on the effects of granted immunities to Congress, industry stakeholders, and the public. As a result, these external entities are unable to determine what, if any, steps DOT is taking to ensure that grants of antitrust immunity remain in the public interest. Further, without additional transparency and information on DOT's findings on the effects of immunities, external entities do not know if immunized alliances have delivered the expected consumer benefits that DOT used as a basis to approve the carriers' request for antitrust immunity. GAO recommends that DOT externally report to policymakers and the public on the effects of antitrust immunity, based on DOT's monitoring activities. DOT agreed to provide public information on its monitoring, but not to report on the effects of antitrust immunity. GAO continues to believe its recommendation, in full, is valid as discussed further in the report.", "document_type": "gao"}
{"report": "After it is extracted, natural gas—a colorless, odorless fossil energy source—is stored in three types of underground geologic formations: salt caverns, depleted aquifers, and depleted oil and gas reservoirs. Two physical characteristics govern the suitability of each type of geologic formation for storage, including: (1) its capacity to hold natural gas for future use and (2) the rate at which natural gas can be withdrawn to meet demand. As of July 2019, about 80 percent of the approximately 400 natural gas storage sites in the United States are depleted natural gas or oil reservoirs because they are available in greater numbers than other types of formations, according to EIA. Underground salt caverns and depleted aquifers each account for about 10 percent of the sites. Natural gas storage sites are located in 31 states. California, Louisiana, Michigan, Pennsylvania, and Texas together contain natural gas storage sites that provide more than half of the natural gas storage capacity in the United States. Figure 1 illustrates the types of geologic formations used for natural gas storage and the locations of natural gas storage sites in the United States. The wells that inject natural gas into, or withdraw it from, the underground storage sites can extend thousands of feet underground. According to information from PHMSA, about 17,000 wells are used to inject and withdraw gas at approximately 400 natural gas storage sites, ranging from a few wells per site to more than a hundred wells at some larger sites. Wells are constructed with multiple layers of steel pipe, called casing, which are cemented in place. The layers of steel casing are intended to isolate the internal portion of the well from the outlying geological formations, which may include underground drinking water supplies. As a well is drilled deeper, progressively narrower casing is inserted further down the well and cemented in place. The wells at natural gas storage sites can be constructed to prevent leaks by installing multiple control points at each well, according to API. If a well is not constructed with such multiple points of control, it could be subject to a single point of failure, in which the failure of a single component, such as a casing or a safety valve, can lead to a large release of natural gas—a factor that contributed to the Aliso Canyon incident, according to PHMSA officials. From October 23, 2015, through February 11, 2016, the Aliso Canyon Underground Storage Facility in Los Angeles County, California, experienced a large and uncontrolled natural gas leak. The Aliso Canyon natural gas storage site is a depleted oil field that was converted into a natural gas storage reservoir in the 1970s and that is near the Porter Ranch community, a residential community of about 30,000 people. It provides natural gas to the Los Angeles region for residential heating and cooling, commercial and industrial uses, and as fuel for electric power plants. According to the Energy Information Administration, the Aliso Canyon site has the fourth largest capacity among the approximately 400 underground natural gas storage sites in the United States. The leak reportedly was caused by damage to a well casing approximately 500 feet underground. California state government officials identified the damage as being caused by the aging infrastructure of that well, which had been drilled in 1953, and a lack of redundant safety valves at the well that prevented the leak from being stopped. Across a 4-month period, the site operator made multiple attempts to stop the leak. About 8,000 families near the Aliso Canyon leak were temporarily relocated in November 2015 due to ongoing odors and symptoms including headaches or migraines; nausea, vomiting, stomach aches, or diarrhea; nosebleeds; respiratory or breathing problems; chest tightness, coughing, or palpitations; and light-headedness and dizziness. Various agencies, including public health and regulatory agencies from state and local governments such as the Los Angeles County Public Health Department and California’s Office of Environmental Health Hazard Assessment, responded to the leak. Additionally, several studies about the leak have been conducted or are planned. CCST, a nonpartisan, nonprofit organization established in response to a California state legislative resolution, published an independent review of the viability of underground natural gas in California, including an analysis of the health effects from stored natural gas releases. An interagency task force established pursuant to federal law, led by DOE and PHMSA, studied the Aliso Canyon incident and in 2016 provided a report to relevant congressional committees with recommendations to enhance safety. According to the 2016 interagency task force report, natural gas stored in geologic formations is under high pressure, which can force the gas through underground fissures or unplugged oil and gas wells and allow the gas to find its way to the surface. Leaks can also occur if the wells lose integrity because of cracking of the cement used to seal them, among other factors. Older wells used for natural gas storage were often drilled for other reasons, such as oil and gas production, and are more likely to have age-related degradation. As part of its work, the interagency task force chartered a Public Health and Environment Subgroup, led by EPA, to summarize the actions taken by local, state, and federal agencies to monitor and mitigate impacts to public health and the environment. The subgroup was to also recommend actions to prepare local, state, and federal agencies if a release from a natural gas storage facility should occur in the future. When the Aliso Canyon leak occurred in 2015, federal safety regulations applied to conventional surface pipelines and above-ground equipment at all natural gas storage sites. Only state safety regulations applied to underground natural gas storage sites at that time. The PIPES Act of 2016 significantly changed the regulation of natural gas storage. It requires, among other things, that DOT establish minimum safety standards for all natural gas storage sites. Within DOT, PHMSA's mission is to protect people and the environment by advancing the safe transportation of energy and other hazardous materials, and because natural gas storage is a part of this mission, PHMSA is responsible for natural gas storage safety. In response to the act’s requirement, PHMSA issued an interim final rule in December 2016 that took effect in January 2017. The rule included minimum safety standards based largely on recommended practices from API and generally required compliance by natural gas storage sites by January 2018. PHMSA provided for a public comment period, and after reviewing the public comments received on the interim final rule, PHMSA may modify aspects of the interim final rule by issuing a final rule. In August 2019, PHMSA officials told us they planned to issue a final rule in October 2019. PHMSA's interim final rule contains four different reporting requirements for operators of all natural gas storage sites, including an annual report with gas storage volumes, gas storage pressures, well depths, gas injection and withdrawal rates, and maintenance information that is conducted to ensure the safety of a facility. The interim final rule also requires operators to develop emergency response plans, but the required elements for such plans vary depending on the type of natural gas storage site. While PHMSA has authority for oversight of underground natural gas storage facilities, the PIPES Act also authorizes states to participate in such oversight by annually obtaining certification from or entering into an agreement with PHMSA (which we refer to as partnering with PHMSA). Authorized states are responsible for inspecting intrastate underground natural gas storage facilities on sites fully within their borders. According to PHMSA officials, 25 of the 31 states where underground natural gas storage sites are located have such intrastate sites, and PHMSA expected to partner with these 25 states by granting them oversight authorization, according to PHMSA officials. In addition, the PIPES Act requires PHMSA to set and charge user fees for operators of underground natural gas storage sites. The act restricts the use of these fees to activities related to natural gas storage site safety. The act also prohibits PHMSA from collecting fees unless the expenditure of these fees is provided in advance in an appropriations act; as a result, PHMSA can only collect fees up to the amount provided in advance in an appropriations act. Human health can be affected by breathing hazardous chemicals in the air; drinking water contaminated by such chemicals; or making skin contact with contaminated soil, dust, or water. Chemicals that can affect human health include several types of hazardous materials that pose a risk to human health and safety. Environmental effects of chemicals can include greenhouse gas emissions and groundwater contamination. Several federal agencies have a role in assessing the public health and environmental effects from exposure to hazardous chemicals, although these efforts may not be specifically related to underground natural gas storage as described in this report. For example, the Toxic Substances Control Act authorizes EPA to review the environmental and health effects of certain chemicals and regulate those that pose unreasonable risks to human health or the environment. According to EPA's July 2018 Report on the Environment, relationships between environmental exposures and health outcomes can only be established through well- designed epidemiological, toxicological, and clinical studies. Developing evidence that environmental contaminants cause or contribute to the incidence of adverse health effects can be challenging, particularly for effects that occur in a relatively small proportion of the population or effects with multiple causes. For example, there may be factors related to both the exposure and the health effect—confounding factors—that can make it difficult to detect a relationship between exposure to environmental contaminants and disease. In its 2018 report, EPA stated that it uses the results of scientific research to help identify linkages between exposure to environmental contaminants and diseases, conditions, or other health outcomes. These linkages, in turn, identify environmental contaminants and health outcomes of potential agency interest. Research has established a relationship between exposure and disease for some environmental contaminants, including radon and lung cancer, arsenic and cancer in several organs, and lead and nervous system disorders. OSHA established the Air Contaminants Standard to limit employees’ occupational exposure to more than 400 chemicals. It also established the Hazard Communication Standard, which requires employers to provide information to their employees about the hazardous chemicals to which they are exposed by means of Safety Data Sheets, among other things. Other federal agencies have responsibilities related to the human health effects of chemicals, including ATSDR and NIOSH. ATSDR has authority to, among other things, perform health assessments for releases or facilities where information was provided that individuals were exposed to a hazardous substance for which the probable source of such exposure is a release. NIOSH researches the safe use of chemicals in the workplace and provides information on how to measure chemicals in the work environment, among other things, for understanding and managing chemicals safely at work. In November 2017, we reported on PHMSA’s natural gas storage program. At the time of our 2017 review, PHMSA was still establishing its program, and we reviewed its planning efforts for developing the program. We found that although PHMSA had established a strategic goal for its natural gas storage program and set a performance goal for training inspectors, it had not yet followed other leading practices for strategic planning. PHMSA officials told us that the program would be guided by one of PHMSA’s existing strategic goals: to promote continuous improvement in safety performance. We found that PHMSA had not defined the level of performance to be achieved and did not have performance goals that addressed other core program activities, such as conducting inspections. We recommended that PHMSA define levels of performance, address core program activities, and use baseline data to develop performance goals for its natural gas storage program. At that time, we also found that PHMSA had not yet used initial baseline data it gathered early in the program to inform the development of its performance goal. We recommended that PHMSA use other data and information about budgetary resources as they become available to inform and refine its performance goals. PHMSA agreed with these recommendations and in May 2018 established a performance goal for inspections of natural gas storage sites. PHMSA officials told us in July 2019 that they were continuing to inform and refine agency performance goals based on budgetary information. After our report in November 2017, PHMSA began inspecting natural gas storage sites but has not fully assessed resource needs for its changing workload or established a performance goal that measures PHMSA’s progress toward its relevant strategic goal to improve safety. First, because PHMSA has not used an analysis of its workforce needs to inform its budget requests, the agency may not have assurance that it has enough resources to meet its performance goal of inspecting all of the approximately 400 natural gas storage sites within 5 years (from early 2018 through early 2023). Second, although PHMSA has established a performance goal that focused on the number of inspections completed, the goal does not reflect the agency’s contributions toward its strategic goal to promote continuous improvement in safety. In November 2017, we reported that PHMSA had established a strategic goal for its natural gas storage program but had not yet set performance goals that define the level of performance officials hope to achieve or that address all core program activities, such as conducting effective inspections. PHMSA's inspections of natural gas storage sites are designed to determine the extent to which these sites meet PHMSA’s 2016 minimum safety standards for natural gas storage sites, according to PHMSA officials and documents. In our November 2017 report, we stated that our prior work had identified several leading practices for strategic planning that PHMSA had not yet followed, such as setting goals that define a certain level of performance and address all core program activities. We recommended that PHMSA develop such goals, and the agency concurred. In 2018, PHMSA officials told us that the agency had established a performance goal to inspect all of the approximately 400 natural gas storage sites over 5 years (from early 2018 through early 2023), with the expectation that state partners would help PHMSA inspect the sites. The officials also told us the agency has started inspecting sites to meet that goal. Currently, 10 states have agreed to partner with PHMSA to help inspect natural gas storage sites, according to agency officials. Natural Gas Storage Site Inspections Conducted by the Pipeline and Hazardous Materials Safety Administration (PHMSA) At a PHMSA inspection of a natural gas storage site in rural Iowa, we observed PHMSA inspectors conducting visual inspections of natural gas storage wells in the field to ensure that the site operator's wells matched the operator's documentation and that the wells were operating within safe limits. During the inspection, PHMSA's inspectors also conducted a review of the storage site operator's safety procedures, such as the operator’s schedule for inspecting its wells for potential leaks or pressure changes, its emergency contact protocols, and its procedures for ensuring the integrity of wells. As part of the review, PHMSA inspectors reviewed the site operator’s documentation to evaluate the operator’s efforts to implement the agency’s 2016 minimum safety standards for natural gas storage sites. To meet its performance goal, PHMSA set targets for each of the 5 years (see app. II for details about PHMSA's annual targets for this performance goal). For example, PHMSA set a target that its inspectors and state partners would inspect a total of 41 sites in 2018. According to PHMSA officials, the agency completed 35 inspections, and its state partners inspected an additional 30 sites, for a total of 65 inspections in 2018. In future years, according to PHMSA planning documents, PHMSA’s annual site inspection targets will almost double from 41 total site inspections in 2018 to 80 total site inspections in 2019. However, PHMSA's inspection workload for its natural gas storage program has increased since November 2017, which may affect its ability to meet its inspection performance goal. We reported in November 2017 that PHMSA had developed a preliminary estimate of the workforce it would need to inspect half of the approximately 400 natural gas storage sites. That estimate was based on the agency’s experience from its pipeline safety program. Specifically, in 2017, agency officials said that they expected 25 state governments would partner with PHMSA to inspect about 200 of the sites and that six agency employees would inspect the remaining approximately 200 sites. Specifically, in 2017 PHMSA estimated the inspections would require about 203 work weeks of inspectors’ time. However, in October 2018, PHMSA officials told us that their inspectors would need more time than previously estimated to complete each natural gas storage site inspection, due to requirements for operators in the 2016 minimum safety standards. Furthermore, in its 2017 estimate, PHMSA assumed that all 25 state governments eligible to partner with PHMSA on inspections would agree to do so. However, as of June 2019, only 10 of the 25 eligible states had agreed to partner with PHMSA, according to agency officials. PHMSA officials told us that more states may decide to participate in the future. However, there are a variety of reasons why states may be reluctant to partner with PHMSA. For example, officials from two states told us that PHMSA had not offered enough funding to cover the cost of partnering with the agency. Officials from two states told us that partnering with PHMSA required some lead time to obtain funds through their states' legislative processes for such inspections. In addition, PHMSA officials told us that some states are waiting until the interim final rule is issued as a final rule before determining whether to partner. As a result, according to PHMSA data, unless additional states partner with the agency, PHMSA will need to increase the number of sites it inspects from about 200 to 322 in order for the agency to meet its performance goal of inspecting all of the approximately 400 sites by 2023. This would increase PHMSA’s inspection workload by about 60 percent, as shown in figure 2. Because of the increase in its inspection workload over its preliminary estimate, PHMSA does not have assurance that it has enough resources to meet its inspection goal. Specifically, PHMSA has requested and received the same budget authority for its natural gas storage safety activities—$8 million—for each fiscal year from 2017 through 2019. Of the $8 million, PHMSA requested $2 million for federal employees to inspect about 200 of about 400 natural gas storage sites. PHMSA requested the remaining $6 million for grants to authorized states to conduct inspections of the remaining sites. However, of the 25 states PHMSA expected to request such authority, only 10 did so and are partnering with PHMSA to conduct inspections, according to PHMSA officials. This means that the number of sites that states could inspect is about 90 rather than about 200, as PHMSA had initially estimated. In comparison, PHMSA's workload for its natural gas storage inspection program is more than three times higher than the workload for PHMSA’s pipeline inspection program. We also recommended in November 2017 that PHMSA use other data and information about budgetary resources to inform and revise its performance goals. PHMSA concurred with our recommendation. However, officials told us that as of July 2019, the agency had not yet fully addressed this recommendation to use workforce data to inform and revise its goals. In December 2018, PHMSA issued a strategic workforce plan that indicates it represents a thorough analysis of the agency’s current workforce composition as of 2018 and the collective viewpoints of employees and senior leadership regarding the future. PHMSA stated in this plan that workforce planning will allow the agency to respond to emerging challenges and responsibilities and improve overall mission effectiveness and efficiency. Specifically, the plan states that PHMSA leadership recognizes that while the agency has implemented some foundational elements of workforce management and the overall workforce is staffed with skilled professionals, the agency’s workforce planning has tended to be more reactive than proactive. The plan cites as evidence underdeveloped succession plans, inconsistent hiring results, increased turnover, and limited workforce analysis and forecasting. To address these gaps, the plan identifies the following three high-level strategies to supplement and expand agency capabilities: expand and enhance PHMSA’s recruitment and hiring plans, conduct operational workforce planning and workload analysis by program office, and implement succession planning and develop leadership and staff. PHMSA officials said that the agency has been assessing its workforce, but they told us this assessment will not guide the agency’s budget requests for its natural gas storage program. PHMSA officials told us they did not plan to change the workforce levels reflected in the agency’s budget requests until 2022 or 2023. This is because although PHMSA has been collecting and assessing workforce data since March 2018, the agency does not expect to have the workforce data it needs to further inform workforce analysis until 2022 or 2023, according to PHMSA officials. The officials indicated that the additional data they have begun gathering may include variables such as the number of additional states that may partner with PHMSA in the future; resources used, by region; and the capacity of inspection teams of different sizes. In technical comments PHMSA provided on a draft of this report, PHMSA officials stated that the agency recently concluded a workforce assessment of its pipeline inspection program—including its natural gas storage program— covering the 5 years from 2020 through 2024. PHMSA’s workforce assessment indicated that the state of Texas is likely to partner with PHMSA beginning in 2020, which would reduce the number of natural gas storage sites PHMSA would need to inspect. Based on our preliminary review of the information PHMSA officials provided, however, PHMSA’s assessment does not address the reasons its inspectors’ workload increased by about 60 percent, such as the factors affecting states’ participation in inspections. Moreover, PHMSA officials did not indicate whether PHMSA would use this workforce information to guide its workforce planning or budget requests. We have reported that strategic workforce planning is an essential tool to help agencies align their workforces with their current and emerging missions and develop long-term strategies for acquiring, developing, and retaining staff. Furthermore, we have reported that existing strategic workforce planning tools and models and our own work suggest that there are certain principles that such a process should address. These principles include developing strategies tailored to address gaps in number, deployment, and alignment of human capital to enable and sustain the contributions of all critical skills and competencies. We also have reported that workforce planning should include (1) identification of the knowledge, skills, and abilities and other characteristics (i.e., competencies) needed by the future workforce; the competencies of the current workforce; and gaps between the two; (2) development of a workforce action plan designed to address these gaps; and (3) monitoring and evaluation of the workforce planning actions taken. Furthermore, we have found in our prior work that completing and regularly updating staffing models in a timely manner can help support agencies’ activities and decision-making. By analyzing the factors affecting states’ participation in inspections and analyzing the agency’s workforce needs on an ongoing basis and using this information to guide its budget requests, PHMSA would have more reasonable assurance that it has the necessary staff to meet its inspection goal. PHMSA has established a strategic goal for its natural gas storage program to promote continuous safety performance but as of April 2019 had not established performance goals that reflect the agency’s contributions to protecting human health and the environment. According to PHMSA officials, PHMSA’s natural gas storage program is guided by the agency’s strategic goal to promote continuous improvement in safety performance. PHMSA officials acknowledged that the agency’s inspection performance goal provides information about activities or outputs— specifically, the number of inspections. However, this goal does not provide information on the outcomes or results of PHMSA's contributions toward its strategic goal of improving safety at natural gas storage sites, consistent with leading practices under GPRA. An example of an outcome-oriented performance goal could be to measure reductions in the volume of gas released from natural gas storage wells, which could indicate that operators of natural gas storage sites are reducing safety risks through improved maintenance. Based on our previous work, measuring performance outcomes is an important management tool for agencies, and leading practices indicate that results-oriented performance goals focus on expected results to show progress toward, or contributions to, intended results. By establishing performance goals that demonstrate improvements to safety outcomes, PHMSA would have better assurance that it can show its progress toward meeting the agency’s strategic goal of continuously improving safety performance. In addition to the performance goal PHMSA established, agency officials told us that DOT applied an outcome-oriented, department-wide performance goal to its natural gas storage program. Based on our review of DOT’s 2018-19 Annual Performance Plan—2017 Annual Performance Report, PHMSA is responsible for meeting the department-wide performance goal of reducing incidents involving death or major injury resulting from the transport of hazardous materials by all modes, including pipelines. While PHMSA officials told us this was an outcome-oriented goal, we believe it would not provide a meaningful measure of safety improvements at natural gas storage sites because, according to PHMSA data, there have been zero incidents involving death or major injuries at natural gas storage sites since 2017, when PHMSA started tracking incidents. While no deaths or major injuries have been reported at natural gas storage sites since 2017, PHMSA reported seven incidents—four in fiscal year 2017 and three in fiscal year 2018—that did not result in death or major injury. These seven incidents resulted in natural gas releases of 3 million cubic feet or more or caused estimated property damage of $50,000 or more. By tracking reductions to these incidents, PHMSA may have additional opportunities to measure outcomes in safety improvements. Several federal agencies—including EPA, ATSDR, OSHA and NIOSH— have documented potential health effects of chemicals that may be found in stored natural gas. These chemicals—some at trace amounts—are known to cause health effects at specific levels of exposure. Stored natural gas primarily consists of methane, and during large releases at natural gas storage sites, downwind methane concentrations can be higher than flammability or explosion limits, creating health and safety concerns, according to CCST. In addition, other chemicals occur naturally in natural gas or are residues from the storage site’s previous use. For example, hydrogen sulfide, a flammable, colorless gas that smells like rotten eggs, can occur in depleted oil and gas reservoirs. Figure 3 shows a building containing a well at a natural gas storage site with a notice that warns of hydrogen sulfide, which may collect in confined spaces in amounts that are acutely toxic. Hydrogen sulfide can cause a range of human health effects, from eye irritation to serious lung injury, according to ATSDR. In addition, some chemicals may be added to natural gas, such as sulfur odorants that are added to give natural gas a distinct smell in case of leaks. The combination of such chemicals varies from one storage site to another based on the attributes of that site, such as its geologic type and the extent to which sulfur odorants are added to the natural gas before storage. Many of these chemicals have been linked to adverse health effects. However, research is limited on the health effects of exposure to stored natural gas in general and on the effects in particular from exposure to chemicals that may occur in natural gas storage leaks or be present at the storage sites. Reports linking health effects are available on specific chemicals but not in the context of natural gas storage, based on our literature review. Scientific studies are important for establishing the association between chemicals in stored natural gas and symptoms community members may experience during leaks to determine health effects. EPA, through its Integrated Risk Information System (IRIS) Program, identifies and characterizes the health hazards of chemicals found in the environment and has produced assessments on several chemicals that may be present in natural gas. EPA established the IRIS Program in 1985 to help develop consensus opinions within the agency about the health effects from lifetime exposure to chemicals. The IRIS database of chemical assessments contains EPA’s scientific positions on the potential human health effects that may result from exposure to various chemicals in the environment. As of November 2018, the database included information on 510 chemicals. To conduct an assessment of a chemical, the agency follows a multi-step process that includes identifying credible health hazards associated with exposures to a chemical and characterizing the quantitative relationship between chemical exposure and each credible health hazard. The program derives toxicity values through this quantitative relationship. EPA has completed assessments on several chemicals that may be in stored natural gas, including hydrogen sulfide, benzene, toluene, ethylbenzene, and xylene. In its IRIS assessment on benzene, EPA found that, as is the case with many other organic solvents, benzene has been shown to produce neurotoxic effects in test animals and humans after short-term exposures to relatively high concentrations. ATSDR develops toxicological profiles—summaries of its evaluations concerning whether, and at what levels of exposure, adverse health effects occur and levels at which no adverse effects occur—for several chemicals that may be present in natural gas, including hydrogen sulfide, benzene, toluene, ethylbenzene, and xylene. For example, ATSDR has found that inhaling benzene can cause drowsiness, dizziness, and unconsciousness and that long-term benzene exposure affects the bone marrow and can cause anemia and leukemia. Also, ATSDR found that toluene may affect the nervous system and at low to moderate levels can cause tiredness, confusion, weakness, memory loss, nausea, and loss of appetite. However, these symptoms usually disappear when the exposure stops. NIOSH researches the safe use of chemicals in the workplace and provides information on how to measure chemicals in the work environment, engineering controls and personal protective equipment, risk assessments, and communication tools for understanding and safely managing chemicals at work. NIOSH publishes information on chemical hazards in the workplace to inform workers, employers, and occupational health professionals. For example, NIOSH reports on occupational exposure limits for ethylbenzene. NIOSH’s Pocket Guide to Chemical Hazards provides key facts on the health effects from exposures to chemicals and recommends occupational exposure limits to chemicals that can affect human health. In addition, NIOSH helped initiate the International Chemical Safety Cards, a joint international agency effort. The cards, which provide essential safety and health information in a clear and concise way, are drafted and peer-reviewed by an international group of scientists from institutions concerned with occupational safety and health. The cards provide information about some chemicals that can occur in natural gas storage sites, including hydrogen sulfide, benzene, toluene, ethylbenzene, and xylene. OSHA collects information on chemicals and occupational health effects for workers and compiles that information into a database. OSHA accumulates information from several government agencies, including EPA, ATSDR, and NIOSH. This information includes chemical identification and physical properties, occupational exposure limits, and sampling information. OSHA’s Occupational Chemical Database provides information on chemicals, including those that can be present in stored natural gas, such as hydrogen sulfide, benzene, toluene, ethylbenzene, and xylene. In addition, among other general information, OSHA regulations require employers to maintain and make available to employees Safety Data Sheets in the workplace for each hazardous chemical they use. Releases at natural gas storage sites are known to emit greenhouse gases—mainly carbon dioxide and methane—into the atmosphere, according to EPA and CCST reports. In addition, we identified two natural gas storage site releases from 2000 through 2018 that potentially impacted groundwater, but information about such releases is limited. Releases at natural gas storage sites emit greenhouse gases into the atmosphere, according to data from EPA’s program on greenhouse gas emissions. These can be major releases, such as the Aliso Canyon leak, or other emissions, such as leaking pipes and valves. According to the 2019 EPA annual report Inventory of U.S. Greenhouse Gas Emissions and Sinks, the main greenhouse gases released from natural gas storage sites are methane, the largest component of natural gas, and carbon dioxide, the main greenhouse gas produced by natural gas combustion. Of the two, methane makes a greater pound-for-pound contribution to climate change—the comparative impact of methane is more than 28 to 36 times greater than carbon dioxide over a 100-year period, according to EPA officials who cited the Intergovernmental Panel on Climate Change. As a result, leaks such as the Aliso Canyon incident contribute to climate change, according to EPA. For example, the Aliso Canyon leak resulted in the single largest release of methane in U.S. history, with a release of 78,000 metric tons of methane in 2015 and an additional 22,000 metric tons in the first 2 months of 2016. The Aliso Canyon leak equaled the greenhouse gas emissions from approximately 529,000 passenger vehicles driven for 1 year, according to EPA data. In most years since 1995, an annual average of 15,000 metric tons of methane were released from natural gas storage, according to EPA data on greenhouse gases. In 2015, however, due to the Aliso Canyon leak, greenhouse gas emissions from all natural gas storage wells increased to more than 92,000 metric tons of methane—about 6 times greater than the release for an average year—according to EPA estimates. Figure 4 shows EPA‘s estimates of annual methane emissions from natural gas storage sites from 1995 through 2016, including the estimated emissions from the Aliso Canyon leak in 2015 and 2016. Chronic releases during routine operations at natural gas storage sites, such as small leaks from valves or from equipment exhaust, also emit greenhouse gases into the atmosphere and may persist for long periods of time. These chronic releases tend to be slow leaks from natural gas wells, such as releases from seals and valves. Slow leaks can persist for long periods because, unlike major leaks, they are less likely to be detected, according to a CCST report. Moreover, slow leaks, if identified, may not be prioritized due to a perception that they present few implications for worker safety and public health, according to CCST’s report. However, the CCST report also stated that chronic releases may routinely occur, although the amount of the release is difficult to measure since it may not be known when the release started, and these chronic releases may lead to a significant release of greenhouse gas. In 2016, California conducted an assessment of all its natural gas storage wells across its 11 natural gas storage sites and found 229 chronic leaks. Methane releases from these slow, chronic leaks generally represent a small share of the statewide reported methane releases in California. However, over a 10-year period, the cumulative impact of these releases from routine operations in California can equal the amount of methane released in the Aliso Canyon leak, according to CCST, using estimates from the California Air Resources Board. In some instances, groundwater has been contaminated by the release of natural gas from storage sites, but the extent of the risk to groundwater is not known because data are limited. We identified two examples of releases from 2000 through 2018 that potentially affected groundwater: a 2003 release at the Playa Del Rey storage site in California and a 2006 release at a storage site near Fort Morgan in Colorado. Natural gas storage site releases can impact groundwater sources in different ways. For example, these releases can impact groundwater sources above the storage site when they involve the upward migration of gas and other fluids mixed with the gas. According to CCST, this occurred at the Playa Del Rey site, where stored natural gas has leaked into a freshwater aquifer for a number of years. In other cases, faulty natural gas well design and construction, such as inadequate cementing, can allow natural gas to migrate through fractures and infiltrate overlying groundwater sources or enter drinking water wells. For example, gas infiltrated an aquifer that served drinking water wells in Fort Morgan, Colorado, which led to an evacuation of about a dozen families until the release was stopped. Subsurface leaks can also result from abandoned wells in which the casings or cement have degraded over time or from improperly plugged wells. In January 2017, PHMSA started collecting data from operators on incidents, including releases of natural gas from underground storage sites that cause more than $50,000 of property damage; these incidents could include leaks that harm groundwater resources, according to PHMSA officials. Based on our review of PHMSA incident information, no reported incidents have included groundwater contamination. Moreover, PHMSA officials told us they are not aware of any incidents involving groundwater contamination that meet reporting thresholds. PHMSA does not require operators to submit information about groundwater contamination unless that contamination meets the regulatory definition of an incident. Natural gas storage is an integral part of the nation’s energy system, ensuring that energy is available to meet peak demands across the nation. PHMSA’s safety program for natural gas storage fills a gap that existed in the regulation of underground storage prior to 2017. PHMSA met its inspection targets in the first year of its program, but it faces challenges in meeting its performance goal to inspect 400 storage sites by 2023 because fewer states agreed to partner with the agency on inspections than PHMSA originally envisioned. Because of the increase in its inspection workload from its preliminary estimate, PHMSA does not have assurance that it has enough resources to meet its inspection goal. PHMSA officials told us that while the agency has conducted a workforce assessment, it will not have the data to complete a workforce analysis it can use to guide its workforce allocations and budget requests until 2022 or 2023. The officials also told us that more states may decide to participate in the future. By analyzing the factors affecting states’ willingness to participate in inspections and analyzing its workforce needs on an ongoing basis, PHMSA would have more reasonable assurance that it has the necessary staff to meet its inspection goal. In addition, while PHMSA addressed one of the two recommendations in our November 2017 report and has established a performance goal that provides information about the number of completed inspections, this performance goal does not provide information on the outcome of PHMSA's efforts to improve safety at natural gas storage sites, consistent with leading practices under GPRA. By establishing performance goals that demonstrate improvements to safety outcomes, such as tracking reductions in incidents ranging from releases of natural gas to death or major injury, PHMSA would have better assurance that it can measure its progress toward meeting its strategic goal to improve safety. We are making the following two recommendations to PHMSA: The PHMSA Administrator should analyze the factors affecting states’ participation in underground natural gas storage inspections and analyze its workforce needs on an ongoing basis to guide its budget requests. (Recommendation 1) The PHMSA Administrator should establish performance goals that demonstrate improvements to safety outcomes for the natural gas storage program, such as tracking reductions to incidents. (Recommendation 2) We provided a draft of this report to DOT for review and comment. In written comments, DOT concurred with the report’s recommendations and provided additional information on steps it is taking or plans to take as part of its implementation of the underground natural gas storage program. In addition, DOT stated that it would provide a detailed response to each recommendation within 180 days of our final report’s issuance. The complete comment letter is reproduced in appendix IV. If you or members of your staff have any questions about this report, please contact me at (202) 512-3841, or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report (1) assesses the extent to which the Department of Transportation’s Pipeline and Hazardous Materials Safety Administration (PHMSA) has further developed its natural gas storage program since our November 2017 report, (2) describes what is known about the potential health effects from chemicals in stored natural gas, and (3) describes what is known about the potential environmental effects of releases at natural gas storage sites. To address these objectives, we reviewed documents from PHMSA, the Department of Energy, and the Environmental Protection Agency (EPA) and met with officials from these agencies to understand their roles in natural gas storage safety. Since there was no comprehensive list of natural gas storage releases, we conducted a literature search for reports of incidents that occurred in the United States from 2000 through 2018. Later, we expanded our search to include reports of incidents related to mercaptan, an odorant added to natural gas, regardless of whether these incidents occurred at a natural gas storage site. We sought reports and studies from news reports and trade and peer-reviewed journals. We conducted searches in research databases such as Nexis’ All English Language News, Elsevier’s Scopus, Ei EnCompassLIT, and Chemical Safety Newsbase. We further expanded our search to include state or county reports that had conducted studies or released reports on these issues. We also reviewed three reports referred to us by agency officials we interviewed that compiled lists of natural gas storage releases to identify those releases that occurred from 2000 through 2018 at underground natural gas storage sites in the United States. The specific reports we reviewed were: An Appraisal of Underground Gas Storage Technologies and Incidents, for the Development of Risk Assessment Methodology; “Analysis of Occurrences at Underground Fuel Storage Facilities and Assessment of the Main Mechanisms Leading to Loss of Storage Integrity”; and U.S. Natural Gas Storage Risk-Based Ranking Methodology and Results. We also included a list of incidents at natural gas storage sites in 2017, the first year for which PHMSA collected and compiled these data for underground natural gas storage. From these sources, we identified 93 releases of natural gas from storage sites; these 93 releases include incidents as defined by PHMSA regulations as well as releases of natural gas that may not meet that definition. The releases we identified could include releases, leaks, explosions, or fires that occurred at natural gas storage sites, and we included these releases regardless of the severity of their impacts, such as injury, death, cost associated with release, or volume of gas released in the incident. We excluded releases at other types of storage, such as aboveground storage or oil storage. This list may not represent the complete universe of releases because not all releases may have been documented, and no federal agency or independent source cataloged all releases for this time period. We reviewed the list of releases to identify any documented examples of health or environmental effects associated with a release. We identified one example of reported health symptoms associated with a natural gas storage release at the Aliso Canyon Storage Site in 2015; the studies we identified did not empirically link the release of natural gas at Aliso Canyon to health effects. The studies also identified two examples of potential groundwater impacts from two other natural gas storage leaks. We visited natural gas storage facilities selected to represent each of the three types of underground storage—for depleted fields, Aliso Canyon in California; for salt caverns, Moss Bluff in Texas; and for aquifers, Redfield in Iowa. We reviewed documentation from each site and interviewed these sites’ operators. We selected these sites for specific reasons: Aliso Canyon because of the 2015 leak, Redfield because it was scheduled to undergo an inspection by PHMSA at the time of our visit, and Moss Bluff because it was readily accessible from a major urban area (Houston, Texas). Our findings from the sites we visited and officials we interviewed are not generalizable to sites and officials we did not include in our review but provide illustrative examples of such sites. We also met with officials from industry groups that represent companies that operate natural gas storage sites—the American Gas Association, American Petroleum Institute, and Interstate Oil and Gas Compact Commission—to better understand these groups’ perspectives on the natural gas storage safety program. We also met with the Environmental Defense Fund to understand its perspective on natural gas storage. To examine the extent to which PHMSA has taken action since our 2017 report to continue developing its program for natural gas storage, we reviewed documents related to the program, including strategic plans, business plans, guidance and plans related to inspections, data on the number of trained inspectors and completed inspection counts, and workforce planning. We also met with PHMSA officials to discuss the program. We selected a nongeneralizable sample of seven states: four of the five states with the largest amount of working natural gas storage (Michigan, Texas, Louisiana, and California), one state in which PHMSA was conducting an inspection (Iowa), and two additional states that had considered partnering with PHMSA (Alaska and Colorado). We met with officials representing these seven states to understand their perspectives on PHMSA’s natural gas storage safety program and their efforts to partner with PHMSA and conduct inspections. We compared PHMSA efforts on its natural gas storage program’s workforce planning with our prior work on best practices in workforce planning. We also compared PHMSA’s efforts on strategic planning with leading strategic planning practices that our past work has identified. For example, we have previously reported that requirements of the Government Performance and Results Act of 1993, as amended—such as performance goals—that apply at the departmental or agency level can serve as leading practices for planning at lower levels, such as component agencies, offices, programs, and projects, within federal agencies. To describe what is known about the potential health effects from chemicals in stored natural gas, we used our literature search results that identified releases from 2000 through 2018 to determine whether there were any studies that empirically linked the releases of natural gas in storage sites with health effects; we did not find any such studies. Since no list of natural gas storage site composition exists, we took steps to identify the components and chemicals that may be present in stored natural gas. First, we identified operators of natural gas storage sites that represented 49 percent of the total storage capacity of all natural gas storage sites within the United States. We identified these operators by reviewing Energy Information Administration data on natural gas storage working capacity from 2016. Next, we obtained and analyzed each operator’s Safety Data Sheet for natural gas and identified the components of natural gas. Also, we reviewed the interagency task force report to identify any additional chemicals that may be present in natural gas, and we reviewed reports to identify chemicals that had been identified as present in the Aliso Canyon storage site release in 2015. We then met with and obtained documents from federal agencies that focused on public health and occupational health to determine the extent to which chemicals within natural gas storage had documented potential health effects. We reviewed databases from EPA and the Agency for Toxic Substances and Disease Registry to identify the health effects that may be caused by exposure to chemicals. We also reviewed documents from and met with officials from the Occupational Safety and Health Administration (OSHA) and the National Institute for Occupational Safety and Health (NIOSH). To examine the health symptoms associated with the Aliso Canyon storage site leak, we (1) visited the storage facility; (2) met with officials from California state agencies, including the Los Angeles Department of Public Health, Division of Gas and Geothermal Resources, and South Coast Air Quality Management District to discuss the Aliso Canyon natural gas leak; and (3) reviewed reports related to potential health effects during and after the Aliso Canyon leak, including results on community health (2016); indoor dust samples (2016); and air monitoring for methane, benzene, volatile organic compounds, and sulfur odorants. Additionally, we reviewed reports from the Public Health and Environment Subgroup of an interagency task force that studied the Aliso Canyon incident and from the California Council on Science and Technology (CCST). To describe what is known about the potential environmental effects of releases at natural gas storage sites, we reviewed documentation and data from EPA on greenhouse gas emissions in general and specifically for the Aliso Canyon natural gas leak in 2015, and we spoke with officials from EPA knowledgeable about the agency’s greenhouse gas reporting program and inventory program. In addition, we obtained data from EPA estimating methane emissions from natural gas storage sites from 1995 through 2016. We assessed the reliability of these data by (1) corroborating these data with other published sources, (2) reviewing existing information about the data and the methods that produced them, and (3) interviewing agency officials knowledgeable about the data. We determined that these data were sufficiently reliable for the purposes of our reporting objectives, specifically to illustrate the relative size of the Aliso Canyon leak relative to estimated releases from natural gas sites. We identified an EPA report summarizing the amount of air emissions at the Aliso Canyon leak. For the Aliso Canyon incident in 2015, we reviewed reports that we identified through officials related to the release of methane, including results from air samples for methane taken by California agencies. We visited the Aliso Canyon storage facility and met with relevant California state agency officials. Also, through our literature search, we identified two examples of natural gas storage releases of chemicals into groundwater: the Playa Del Rey storage site in California and a storage site near Fort Morgan, Colorado. Additionally, we met with California Council on Science and Technology officials and reviewed the council’s report, Long-Term Viability of Natural Gas Storage in California, to better understand how a natural gas storage incident could impact groundwater. We also reviewed recommendations made in an October 2016 report by the Interagency Task Force on Natural Gas Storage Safety. We conducted this performance audit from December 2017 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Pipeline and Hazardous Materials Safety Administration (PHMSA) has set a goal to inspect all of the approximately 400 storage sites over 5 years, from early 2018 to early 2023, according to PHMSA officials. To meet this five-year goal, PHMSA divided its workload of approximately 400 inspections over the 5 years it planned to meet its goal. PHMSA planned that its state partners would complete about one-quarter of the inspections while its federal inspectors would complete the remaining three-quarters of inspections. PHMSA’s targets for inspections, and its actual inspections according to PHMSA officials, are illustrated in table 1 below. The Pipeline and Hazardous Materials Safety Administration (PHMSA) funds its enforcement activities, such as inspections by PHMSA employees and grants to states, partially through user fees paid by operators of natural gas storage sites. However, PHMSA cannot collect user fees from operators unless expenditure of the fees is provided in advance in an appropriations act. Annually, prior to the start of the fiscal year, PHMSA submits a budget request to Congress that identifies the amount of budget authority it needs for the underground natural gas storage program. The annual appropriations act then provides for expenditure of a certain amount of fees and PHMSA is authorized to collect that amount in fees. PHMSA then obligates the fees it receives either (1) for federal activities, such as inspections by PHMSA employees, or (2) for grants to state governments, which carry out inspections at some natural gas storage sites. Table 2 provides details about the PHMSA’s budget request, budget authority, user fees, and obligations. In addition to the contact named above, Diane Raynes and Janet Frisch (Assistant Directors), Lee Carroll (Analyst in Charge), Ellen Fried, Cindy Gilbert, Jennifer Gould, Rich Johnson, Jessica Lemke, John Mingus, Katrina Pekar-Carpenter, Rebecca Parkhurst, Jeanette Soares, Sheryl Stein, Sara Vermillion, and Kiki Theodoropoulos made important contributions to this report.", "summary": "About 400 natural gas storage sites are important to the U.S. natural gas system, providing about 30 percent of the nation's energy. During a 2015 leak at a storage site near Los Angeles, about 8,000 families were temporarily relocated due to symptoms such as migraines, nausea, and respiratory problems. The leak raised concerns about health and safety risks from other storage sites. In 2017, GAO recommended that PHMSA take actions, including using baseline data to develop performance goals for its natural gas storage program. GAO was asked to review the health and environmental effects of activities at natural gas storage sites. This report, among other objectives, (1) assesses the extent to which PHMSA has developed its natural gas storage inspection program and (2) describes what is known about the potential health effects from chemicals in stored natural gas. GAO reviewed available documents about natural gas storage incidents from 2000 through 2018; compared PHMSA research, goals, and plans against leading planning practices; visited sites representing the three types of storage sites; and interviewed agency officials. In 2018, the U.S. Department of Transportation's Pipeline and Hazardous Materials Safety Administration (PHMSA) set a goal for its natural gas storage inspection program to inspect all approximately 400 natural gas storage sites within 5 years, according to agency officials. PHMSA expected that all 25 eligible states would help inspect sites, but only 10 states agreed to partner with the agency. As a result, the agency's inspection workload increased by almost 60 percent from when it set its goal, according to PHMSA data. Because of the increase in its inspection workload over its preliminary estimate, PHMSA does not have assurance that it has enough resources to meet its inspection goal. Furthermore, PHMSA has not used a workforce analysis to inform its budget requests. PHMSA officials said that the agency does not expect to have enough data until 2022 or 2023 to further inform analysis of its workforce. By analyzing factors affecting states' willingness to partner with PHMSA and its workforce needs on an ongoing basis, the agency would have better assurance that it has the staff it needs to meet its inspection goal. Health effects have been reported related to chemicals that may be found in stored natural gas. Several federal agencies—including the Environmental Protection Agency and the Agency for Toxic Substances and Disease Registry—have documented potential health effects of chemicals that may be found in stored natural gas. In addition, some chemicals may be added to natural gas, such as sulfur odorants that give natural gas a distinct smell in case of leaks. The combination of such chemicals varies from one natural gas storage site to another, based on the attributes of that site such as its geologic type and the extent to which sulfur odorants are added to the natural gas before storage. Many of these chemicals have been linked to adverse health effects. However, research is limited on the health effects of exposure to stored natural gas in general and on the effects in particular from exposure to chemicals that may occur in natural gas storage leaks or be present at the storage sites. Reports linking health effects are available on specific chemicals but not in the context of natural gas storage, based on GAO's literature review. GAO is making two recommendations, including that PHMSA should analyze factors affecting states' willingness to partner with PHMSA and analyze its workforce needs on an ongoing basis. The agency concurred with the recommendations.", "document_type": "gao"}
{"report": "When DOT issued regulations requiring accessible lavatories on twin- aisle aircraft in 1990, single-aisle aircraft were used primarily for shorter distances. However, technological advancements—such as the use of lighter, stronger composite materials—have enabled aircraft to fly longer distances with greater fuel efficiency. As a result, both Airbus and Boeing now offer single-aisle aircraft designs that can routinely fly 3,000 to almost 4,000 nautical miles—or easily from coast to coast in the continental U.S. as well as some overseas routes to and from the U.S. Of the eight U.S. carriers we interviewed for this review, five of them operate only single-aisle aircraft and the remaining three fly a mixture of single- and twin-aisle aircraft. As shown in figure 1, twin-aisle aircraft are rarely used for domestic flights by U.S. carriers. In 2018, 99 percent of U.S. aircraft departures for domestic flights occurred on single-aisle aircraft: 71.7 percent on the larger single-aisle aircraft; 26.61 percent on smaller, regional aircraft; and 0.68 percent on turbo jets. According to the 2010 U.S. Census, 57 million Americans (roughly 1 in 5) have a disability, of whom half have mobility issues that may require accommodations when flying. Furthermore, older Americans are representing a greater share of the U.S. population. By 2020, 16.5 percent of the nation’s population will be over age 65, and by 2030, 20 percent of the population will be over age 65, and the likelihood of this group’ needing assistance to access lavatories may increase as they age. As an indication of the number of people with reduced mobility flying, DOT’s monthly aviation travel data indicate that for the first 6 months of 2019, aviation passengers checked a total of 294,216 wheelchairs and scooters. Over the past 30 years, some efforts have been made to address the issue of ensuring non-discriminatory treatment of aircraft passengers, including access to aircraft lavatories. The enactment of the ACAA, which prohibits discrimination by airlines on the basis of disability, charged DOT with promulgating implementing regulations. DOT promulgated a final rule in 1990, in which it required aircraft with more than one aisle (twin-aisle aircraft) in which lavatories are provided to have at least one wheelchair accessible lavatory. DOT, however, deferred setting regulations for single-aisle aircraft, noting cost and feasibility concerns for carriers. Since that initial regulation, DOT has taken several steps to study the issue of accessible lavatories for single-aisle aircraft, but as of December 2019, none of these actions has resulted in a regulation for accessible lavatories in single-aisle aircraft. These steps include: DOT issued an advance notice of proposed rulemaking (ANPRM) to study, among other things, the issue of accessible lavatories on single-aisle aircraft that was issued in conjunction with its final rule mandating that twin-aisle aircraft must have a lavatory that is accessible to passengers who use wheelchairs. DOT created an advisory committee in 1992 to provide guidance to DOT concerning access to lavatories on single-aisle aircraft for persons with disabilities, including persons who rely on the aircraft’s onboard wheelchairs. In 1996, the committee reported to DOT that it would be feasible to provide accessible lavatories on single-aisle aircraft but acknowledged that there could be a cost to doing so. As part of a final rule that DOT issued in 2008 to amend the ACAA regulations to include foreign carriers that fly to the U.S., DOT acknowledged that requiring accessible lavatories on single-aisle aircraft was an ongoing issue. While the department noted that accessible lavatories on single-aisle aircraft would benefit passengers with disabilities, it also expressed concerns that revenue loss and other cost impacts could be too great for the carriers. The department said that it would continue to study the issue and review ongoing developments. DOT published a notice of intent in December 2015 to explore the feasibility of conducting a negotiated rulemaking concerning, among other things, accessible lavatories on single-aisle aircraft for travelers with disabilities. As a result of the 2015 notice of intent, DOT established the ACCESS Advisory Committee in 2016—composed of representatives from air carriers, aircraft manufacturers, disability groups, and other aviation stakeholders. Its charge was to negotiate and develop a proposed amendment to DOT regulations for DOT’s consideration concerning accommodations for air travelers with disabilities that would address whether to require accessible lavatories on new single-aisle aircraft, among other issues. The committee noted that the issue of requiring accessible lavatories on single-aisle aircraft merited exploration because of two developments: (1) the increased use of single-aisle aircraft on long flights, and (2) the availability of new accessible- lavatory designs for single-aisle aircraft. In late 2016, the ACCESS Advisory Committee agreed on proposed amendments that included short-term and long-term solutions to address the challenges persons with mobility impairments face when traveling on single-aisle aircraft. The committee, taking into account costs to industry, recommended accessible lavatories on new aircraft, did not recommend requiring the retrofit of existing aircraft, and proposed a multi-tiered approach to meet this goal. In 2019, DOT publicized its intent to issue notices of proposed rulemaking regarding accessible lavatories to address the ACCESS Advisory Committee’s final resolution, which we discuss in more detail below. Both Airbus and Boeing offer their customers a range of standard lavatory designs. For example, both Airbus and Boeing offer a lavatory with a contoured design (see fig. 2). This design offers a smaller sink and different dimensions than previous lavatories and has a contoured or angled wall on the exterior allowing seats in the last row to recline into the bottom portion of the contour. Air carriers can also choose to move the last row of seats back into the contour and then add an extra row of seats after making other changes to the configuration of seating rows. Airbus and Boeing also offer flat-wall lavatory designs that are similar to the standard flat-wall lavatories that had previously been available on single- aisle aircraft for years but have slightly different interior dimensions. Compared to the contoured lavatory design, this current flat-wall lavatory design could offer a larger sink or more countertop space. According to measurements and diagrams the aircraft and lavatory manufacturers provided for these lavatory styles, some interior lavatory dimensions have decreased while other dimensions have increased. For example, changes in these two lavatory styles have resulted in increased interior space in some areas, such as the sitting knee space and diagonal shoulder width, and decreased space in other areas, such as the entry width and door height. These changes were to provide carriers options to help them meet their business strategies. In addition to making changes to the standard lavatories, since 2015, both Airbus and Boeing offered lavatory configurations for their single-aisle aircraft designed to provide greater access for passengers who rely on the use of onboard wheelchairs. According to officials for Airbus and Boeing, both manufacturers use a design that connects two adjacent lavatories with a retractable wall or partition. As shown in figure 3, when the folding partition is open, this configuration is designed to enable the person who relies on the aircraft-onboard-wheelchair to enter in one of the lavatories and then transfer or be transferred to the toilet in the other lavatory. While there are differences between the Boeing and Airbus models, they operate similarly. Both the Airbus and Boeing designs are for the rear of the aircraft and take up space in the area normally used for the galley where food and drink carts are located for flight attendants’ access. According to officials we interviewed from two carriers that have purchased aircraft with this design, a reduced galley area is less of a concern because their flights provide limited food and beverage service and do not need a full galley. They said that the space where the traditional lavatories were located could be used for other purposes, such as more seats. According to the manufacturers, the lavatory models that are designed for greater accessibility accommodate the onboard wheelchair to varying degrees. Airbus offers two designs to accommodate a passenger with an onboard wheelchair. The Space Flex version 1 design consists of two adjacent lavatories with a connecting retractable partition. This retractable partition can open to allow for a passenger who relies on the aircraft onboard-wheelchair to enter the lavatory with or without the help of an assistant. A representative from a disability organization was generally positive about the Space Flex version 1 and said it was a good design for both carriers and travelers with disabilities. Airbus also offers another lavatory design specifically for its A220 single-aisle aircraft model. Airbus officials told us that it is a single lavatory that is designed to accommodate a wheelchair but cannot accommodate both a passenger in an onboard wheelchair and an assistant. Boeing offers one lavatory designed to accommodate a passenger using an onboard wheelchair for single-aisle aircraft for its 737 aircraft family. This design, known as the Pax Plus, consists of two adjacent lavatories with a removable partition designed to enable a wheelchair and assistant to enter. In addition, officials from the eight selected air carriers told us that their crews are trained to assist passengers with reduced mobility to use lavatories. These officials from the eight air carriers stated that they provide their cabin crew with initial and, in some cases, recurrent training about how to assist passengers with reduced mobility, pursuant to DOT regulations. DOT regulations further stipulate that if there is an on-board wheelchair, the carrier must provide assistance to enable the passenger to move to and from the lavatory if, in general, such assistance is requested by or on behalf of a passenger with a disability. While aircraft manufacturers offer lavatories designed to accommodate passengers with mobility impairments, carriers do not often choose to acquire them. Of the eight U.S. carriers we interviewed, we found that four have some aircraft—all of which are Airbus aircraft—with lavatories that are designed to accommodate passengers with mobility impairments to some extent. Only one of these carriers is among the four with the largest number of aircraft in their fleet. Specifically, these four carriers have either the Space Flex version 1 or the Airbus A220 lavatory. Despite Boeing’s offering of the Pax Plus lavatories since 2017, Boeing officials told us that as of November 2019 no U.S. carriers have ordered these lavatories for their current or future single-aisle Boeing aircraft. Overall, about 4.5 percent of the combined single-aisle fleet of the eight selected carriers have lavatories designed to provide some measure of greater access to passengers with reduced mobility, including those who require the use of the onboard wheelchair (see fig.4). According to the carriers we interviewed, they consider the configuration of the aircraft among other factors, including their business strategy, when ordering lavatories for new aircraft. Providing a lavatory designed to accommodate onboard wheelchairs on single aisle aircraft may require financial tradeoffs for carriers, such as reducing the number of revenue generating seats in the aircraft cabin. According to airline officials, this reduction can result in higher costs for carriers that subsequently might be passed onto consumers through higher fares. Officials from all eight selected carriers, however, stated that all of their aircraft lavatories have features designed to increase access to certain lavatory functions, such as assist handles or grab bars, accessible call buttons, door locks, and faucets that passengers with disabilities can use. Carrier officials also stated that they need to make trade-offs between competing priorities; for example, taking into account how onboard wheelchair-accommodating lavatory designs may affect food service. According to officials from two carriers, an onboard wheelchair- accommodating lavatory can result in less galley space, and a full galley at the back of the aircraft is needed for the type of services they wish to provide to their customers without compromising customer seating capacity. Conversely, officials from two other carriers told us that trading galley space for onboard wheelchair-accommodating lavatories did not affect their food service, as they do not provide full meal service. For example, they said that because they did not need the full galley space, the Space Flex lavatory enabled them to add not only a lavatory that accommodates onboard wheelchairs but also an additional row of passenger seats. Representatives from stakeholder groups we interviewed told us that the lack of accessible lavatories makes flying challenging for persons with reduced mobility. They described how some passengers with reduced mobility take precautionary measures to avoid the need to use an aircraft lavatory, such as severely limiting food and fluid intake in advance of the flight, risking dehydration; using a catheter; or wearing a protective undergarment. Some passengers with reduced mobility reportedly may avoid long flights altogether by purchasing flights with connections or layovers. However, according to one stakeholder group, these precautionary measures may not alleviate the fear and anxiety that passengers who rely on the onboard wheelchair to get to the lavatory may face during air travel as there is always the possibility of having to deal with circumstances beyond their control. For example, unforeseen events such as increased flight time or delays in getting to the gate can increase the time a passenger has to postpone attending to normal bodily functions. Finally, stakeholder groups report that passengers may choose not to travel at all, or to drive rather than fly, choices that may increase the cost and time of travel, particularly if it involves an overnight stay. Even when an aircraft has a lavatory that can accommodate an onboard wheelchair, which exists on about 4.5 percent of the combined fleet of single-aisle aircraft for the 8 airlines included in our review, passengers may have difficulty determining whether or not their flight has such a lavatory. According to officials of air carriers, passengers may call the carriers’ customer service department for this information, although not all phone representatives may have this information readily available. In addition, our review of selected carriers’ websites revealed that most do not have information about which flights or aircraft may have such a lavatory, although we found that two carriers include descriptions of aircraft amenities or diagrams denoting onboard wheelchair- accommodating lavatories. However, even if this information were made available, it may not guarantee that a passenger with a mobility impairment will be able to fly on an aircraft with this type of lavatory because air carriers sometimes switch aircraft at the last minute without notice, such as when, for example, an aircraft has a mechanical problem. While stakeholders described challenges, neither air carriers nor DOT receive a large number of complaints regarding the lack of lavatories designed to accommodate passengers who use onboard wheelchairs or lavatories in general. As we have previously reported, DOT receives and processes complaints from passengers and uses complaint data to help identify which carriers to inspect for consumer protection violations. From 2014 through 2018, DOT received 59,846 complaints about U.S. carriers. Of these, we reviewed 1,263 complaints related to accessibility, inadequate facilities, and flight delays and identified 69 complaints about lavatories in general and 5 about the accessibility of lavatories. Of the 69 lavatory complaints identified: 64 related to non-functioning lavatories (e.g., non-operational or unclean lavatories, sinks lacking running water, etc.); 5 related to lavatories being inaccessible by persons with disabilities (e.g., lavatory grab bars at an improper height, passenger using onboard wheelchair unable to enter lavatory); and 2 related to lavatory size (e.g., lavatory size has been reduced). We also discussed lavatory-related complaints with the eight selected air carriers, three of which reported that these complaints made up about 1 percent or less of the total passenger complaints they received in 2018. Four air carriers reported that lavatory complaints related to accessibility made up an even smaller portion—around 0.05 percent or less of their total passenger complaints in 2018. However, the small number of complaints related to lavatory accessibility does not necessarily indicate that individuals who use onboard wheelchairs are not affected by inaccessible aircraft lavatories, as some may choose not to fly, and others may take precautionary measures as described above to avoid having to use the aircraft lavatory. Furthermore, because accessible lavatories are not required on single-aisle aircraft and there is no expectation that the lavatory would be accessible, passengers may not see grounds to complain or may not take the time to submit a complaint. As we have previously reported, complaint data are inherently limited because, according to academic literature, a substantial portion of dissatisfied individuals never complain and are therefore not represented in the complaint data. Finally, when they do complain, their complaints may not be representative of other individuals. We also found that there were very few complaints about non-functioning lavatories. As noted above, DOT received 64 passenger complaints on non-functioning lavatories. Carrier officials also told us that they have received few complaints about non-functioning lavatories. According to the air carrier officials we interviewed, depending on the flight, some flights may operate with one or more lavatories not functioning. However, most carrier officials reported that according to data they collect, this occurred on less than 2 percent of flights. In such instances, some carrier officials stated they would notify passengers of nonoperational lavatories to give them the opportunity to use the airport lavatories prior to boarding. These officials also stated that if all lavatories are inoperable it is the responsibility of the pilot—in consultation with flight dispatchers—to decide if the aircraft will take off or, if lavatories become inoperable during a flight, to divert to an airport other than the destination. Carriers further noted that flights with no operational lavatories are extremely rare. As previously noted, in late 2016, the ACCESS Advisory Committee reached a consensus on proposed amendments that would require accessible lavatories on single-aisle aircraft. DOT announced in 2019 that it would address the issue in rulemaking. On December 16, 2019, DOT issued a notice of proposed rulemaking to solicit comments on short-term accessibility improvements on single-aisle aircraft through the installation of accessibility features within the lavatory, such as assist handles, call buttons, and lavatory controls, without changing the size of lavatories. In addition, DOT has announced its intention to issue an advanced notice of proposed rulemaking to address long-term accessibility improvements, also addressed by the Advisory Committee, and to solicit comments and gather information on the costs and benefits of requiring carriers to increase the size of the single-aisle lavatory on new aircraft models to enable passengers using an onboard wheelchair to enter and use the lavatory with an assistant, if necessary. In addition to the two rulemakings, DOT has recently established another advisory committee. The ACAA Advisory Committee was created in response to a requirement in the FAA Reauthorization Act of 2018, has a 2-year charter, and is required to report its findings to both DOT and Congress on current DOT regulations on barriers to persons with disabilities who want to travel by air. The ACAA Advisory Committee is also required to determine the extent to which DOT is addressing those barriers, recommend improvements to implement the ACAA, and improve the flying experience for travelers with disabilities. The committee— comprised of members representing aircraft manufacturers, national disability organizations, air carriers, and airports—plans to hold its first meeting in early 2020. According to DOT officials, although it is within the purview of this committee to consider issues regarding accessible lavatories, it does not plan to do so at the present time given that the two proposed rulemakings are proceeding and that there is a Congressional mandate for the committee to report on other issues within 6 months of the first meeting. We provided a draft of this report to DOT for review and comment. DOT provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, DOT, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions concerning this report, please contact me at (202) 512-2834, or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the individual named above, other key contributors to this report were Ed Laughlin, Assistant Director; Martha Chow, Analyst-in- Charge; James Geibel; Geoffrey Hamilton; Elke Kolodinski; Gail Marnik; Malika Rice; Amy Rosewarne; Travis Schwartz; Pamela Snedden; and Elizabeth Wood.", "summary": "Flying can pose significant challenges for persons who rely on wheelchairs, including the lack of wheelchair accessible lavatories on most flights. In 1990, DOT required wheelchair accessible lavatories on twin-aisle aircraft used mainly for long flights. It did not require them for single-aisle aircraft, although DOT continued to study the issue. Since 1990, technological advances have enabled single-aisle aircraft to fly longer distances, and these aircraft now make 99 percent of domestic flights. In 2016, a DOT advisory committee recommended that DOT require accessible lavatories in certain single-aisle aircraft in the future. The Federal Aviation Administration (FAA) Reauthorization Act of 2018 included a provision that GAO examine the availability and designs of lavatories on commercial aircraft and the ability of passengers with disabilities to access them. This report describes (1) what is known about lavatory designs and accessibility for persons with reduced mobility and (2) the challenges wheelchair-bound passengers and others face while traveling on single-aisle aircraft without accessible or functional lavatories. GAO reviewed DOT's guidance and rulemaking and analyzed DOT's aircraft complaint data and fleet data for the eight largest U.S. air carriers. GAO interviewed officials from the eight largest mainline carriers and reviewed their fleet and lavatory data. GAO also interviewed officials from Airbus and Boeing and subsidiary lavatory manufacturers, as well as representatives from cabin crew labor associations and consumer groups representing persons with disabilities. Aircraft manufacturers offer lavatories that carriers can provide and that are designed to accommodate users of onboard wheelchairs, but carriers do not choose to acquire this option for their single-aisle aircraft. We found designs for lavatories that enable a passenger in an onboard wheelchair to use them, to varying degrees. In recent years, both Airbus and Boeing—makers of single-aisle aircraft—began offering similarly designed lavatories to provide greater access for these passengers. For example, one design consists of two adjacent lavatories located in the rear galley area with a connecting retractable wall to allow for a wheelchair-bound passenger to enter one lavatory and transfer or be transferred to the toilet in the other lavatory. Another design is a single lavatory large enough to accommodate a passenger using an onboard wheelchair. Four of the eight U.S. carriers—and only one of the four with the largest fleets—GAO interviewed have Airbus aircraft with an adjacent lavatory design (Space Flex version 1) or the single lavatory design found on the A220 aircraft, constituting about 4.5 percent of the carriers' combined single-aisle fleet (see figure). None of the eight U.S. carriers have purchased a similar lavatory for their Boeing's single-aisle aircraft. Carrier officials told GAO that they consider many factors when ordering lavatories, including financial and service tradeoffs such as the potential to lose seating spaces, or reduced food and beverage service for passengers. While the Department of Transportation (DOT) receives few complaints on lavatory inaccessibility, consumer groups told GAO that the lack of an accessible lavatory on single-aisle aircraft presents challenges for persons with reduced mobility. For example, some passengers take precautionary measures to avoid the need to use the aircraft lavatory and others avoid flying altogether. Additionally, although some aircraft have wheelchair-accommodating lavatories, they are not well advertised to passengers, making it difficult for passengers to know whether their flight may have such a lavatory. To address such challenges and the findings of its 2016 advisory committee, DOT issued, on December 16, 2019, a notice of proposed rulemaking to require carriers to install accessibility features without changing the size of the lavatories. DOT also expressed intent to study the costs and benefits of enlarging single-aisle aircraft lavatories to enable use by passengers using the onboard wheelchair.", "document_type": "gao"}
{"report": "In the primary market, lenders originate mortgage loans to borrowers to purchase homes. To evaluate the creditworthiness of a potential borrower (called underwriting), the lender considers the borrower’s credit scores and history, monthly debts including mortgage payments relative to income (debt-to-income ratio), and the amount of the mortgage loan relative to the home’s value (loan-to-value ratio). Borrowers with strong credit histories typically receive prime mortgages with the most competitive interest rates and terms. Lenders generally require borrowers to purchase private mortgage insurance when the loan-to-value ratio is higher than 80 percent. Some borrowers also may qualify for federal mortgage insurance programs (discussed later in this section). Mortgage lending creates certain risks: Credit risk is the risk that the borrower will default on the mortgage by failing to make timely payments. Prepayment risk is the risk that borrowers will pay off the principal of the loan before the mortgage term ends. Prepayment reduces or eliminates future interest payments. The lender must relend or reinvest the prepaid amount and may have only lower-interest options available for lending or investing the funds if interest rates have decreased. Interest rate risk is the risk that an increase in interest rates will reduce the value of a loan for the lender. For example, a lender might fund mortgage lending through short-term deposits. If interest rates rise and the lender previously made a long-term fixed-rate mortgage at a lower rate, the difference between the interest payments the lender receives from the mortgage and the interest the lender has to pay to its depositors decreases. Liquidity risk is the risk that an institution will be unable to meet its financial obligations as they come due without incurring unacceptable losses. For example, firms can be exposed to liquidity risk by funding longer-term asset purchases with shorter-term debt obligations. After origination, mortgages are serviced until they are paid in full or closed due to nonpayment. Servicers can provide borrowers with account statements, respond to customer service questions, and collect monthly payments, among other duties. The servicer can be the same institution that originated the loan or the servicer can change as institutions sell servicing rights. Lenders hold mortgage loans in their portfolios or sell them to institutions in the secondary market (see fig. 1). Lenders sell their loans to transfer risk (such as interest rate risk in the case of fixed-rate mortgages) or to increase liquidity. Secondary market institutions can hold the mortgages in their portfolios or pool them into MBS that are sold to investors. Participants in the secondary market include federal entities, issuers of private-label MBS, and investors. Private institutions, primarily investment banks, may issue MBS (known as private-label securities) which are backed by mortgages that are not federally insured and do not conform to the enterprises’ requirements. The federal government participates in the primary and secondary mortgage markets as both an actor and a regulator. In the primary market, the federal government operates mortgage guarantee and insurance programs to promote homeownership for certain types of borrowers. For example, the Federal Housing Administration (FHA), Department of Veterans Affairs (VA), Department of Agriculture’s Rural Housing Service, and HUD’s Office of Public and Indian Housing offer programs that insure mortgages against default or guarantee lenders payment of principal and interest. In the secondary market, the federal government facilitates mortgage lending through the enterprises (discussed below) and the Government National Mortgage Association (Ginnie Mae). Ginnie Mae is a federally owned corporation within HUD that guarantees the timely payment of principal and interest to investors in securities issued through its MBS program. Ginnie Mae-guaranteed MBS consist entirely of mortgages insured or guaranteed by federal agencies (such as FHA) and are issued by financial institutions it approves. The federal government also regulates the housing finance system through FHFA, which oversees the enterprises; the Bureau of Consumer Financial Protection, also known as the Consumer Financial Protection Bureau (CFPB); and the federal banking regulators, which enforce regulatory standards for mortgage lending. Congress chartered Fannie Mae and Freddie Mac as for-profit, shareholder-owned corporations in 1968 and 1989, respectively. They share a primary mission to enhance the liquidity, stability, and affordability of mortgage credit. The enterprises generally purchase mortgages that meet certain criteria for size, features, and underwriting standards (known as conforming loans) and hold the loans in their own portfolios or pool them into MBS that are sold to investors. In exchange for a fee, the enterprises guarantee the timely payment of interest and principal on MBS that they issue. The enterprises also have obligations to support housing for certain groups. Following the enactment of the Federal Housing Enterprises Financial Safety and Soundness Act of 1992, the enterprises have been required to meet specific goals for the purchase of mortgages supporting underserved groups (such as low- and moderate-income families) or certain geographic areas. In 2008, the Housing and Economic Recovery Act (HERA) tasked the enterprises to fund new affordable housing programs, including the Housing Trust Fund and the Capital Magnet Fund. The enterprises fund these programs with a dollar amount based on their unpaid balance of new business, purchases, and the funds distribute the money to states and housing organizations to support affordable housing. HERA established authorities for providing capital support to the enterprises and established FHFA as an independent regulatory agency for the enterprises. HERA also authorized the Director of FHFA to appoint FHFA as a conservator or receiver for the enterprises. FHFA put the enterprises into conservatorship in September 2008. FHFA has a statutory responsibility to ensure that the enterprises operate in a safe and sound manner and that their operations and actions of each regulated entity foster a liquid, efficient, competitive, and resilient national housing finance market. FHFA sets strategic goals for its conservatorship of the enterprises. According to FHFA, the enterprises’ boards of directors oversee day-to-day operations, but certain matters are subject to FHFA review and approval. For example, FHFA officials told us that FHFA reviews and approves some pilot programs. Fannie Mae and Freddie Mac retain their government charters and continue to operate legally as business corporations. Using authority provided in HERA, Treasury has committed to providing up to $445.6 billion in capital support to Fannie Mae and Freddie Mac while they are in conservatorship through the senior preferred stock purchase agreements. If Fannie Mae or Freddie Mac has a net worth deficit at the end of a financial quarter, Treasury will provide funds to eliminate the deficit. Under the most recent agreement in December 2017, the enterprises must pay Treasury a dividend of all their quarterly net income above a $3 billion capital reserve that each enterprise is allowed to retain. Since the 2007–2009 financial crisis, Congress has taken steps to improve regulation and consumer protection related to the housing finance system. For example, to address challenges related to limitations on mortgage information, HERA requires FHFA to collect market data. The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd- Frank Act) created CFPB, which has undertaken a number of consumer protection initiatives related to mortgage lending and servicing. The Dodd-Frank Act also updated the Truth in Lending Act to prohibit lenders from making certain mortgage loans without regard to a consumer’s ability to repay the loan (known as the ability-to-pay rule). A lender is presumed to have met the ability-to-repay requirement when it originates a qualified mortgage—a category of loans that have certain more stable features that make it more likely a borrower will repay the loan. Congress also has considered proposals to make significant changes to the housing finance system. During the 113th Congress (January 2013– January 2015), three proposals—the Housing Finance Reform and Taxpayer Protection Act of 2014, S. 1217; the FHA Solvency Act of 2013, S. 1376; and the Protecting American Taxpayers and Homeowners Act of 2013, H.R. 2767—were reported out of committee but no further action was taken. In September 2018, the Protecting American Taxpayers and Homeowners Act of 2018 (H.R. 6746) was reintroduced in the 115th Congress and referred to committee. As of the end of the 115th Congressional session, no further action had been taken. Industry groups and think tanks also have published reform proposals. We discuss reform proposals made since 2014 in more detail later in this report. Federal agencies also have commented on housing finance reform. In early 2018, the Director of FHFA sent a letter to the Chairman and Ranking Member of the Senate Committee on Banking, Housing, and Urban Affairs stating that conservatorship is not sustainable and needs to end, and provided suggestions on how the enterprises could be reformed. For example, the letter states that the housing finance system should preserve 30-year fixed-rate mortgages, end taxpayer bailouts for failing firms, maintain liquidity, and provide a level playing field for lenders of all sizes. It also states that secondary market activities should be managed by shareholder-owned firms chartered by a regulator and operating as utilities with an explicit paid-for federal guarantee on MBS issued by regulated firms. In June 2018, the Office of Management and Budget released recommendations to reform the federal government in a number of areas, including housing finance. The recommendations propose privatizing the enterprises, allowing new private entities to enter the market, and providing an explicit federal guarantee on MBS that could only be accessed in limited, exigent circumstances. In a 2014 report, we outlined a framework composed of nine elements we consider to be critically important to help policymakers assess or craft proposals to change the housing finance system (see table 1). The housing market has recovered since the financial crisis, with significant federal support. Indicators of recovery include rising house prices and declining mortgage delinquency rates. However, the federal government has continued to support the housing market with guarantees on more than two-thirds of new mortgages each year since 2008, either through government-insured originations or by guaranteeing timely payment to investors on mortgage loans purchased and securitized by the enterprises. The government also has continued to play a very substantial role in the secondary market, guaranteeing around 95 percent or more of all MBS issued annually since 2008. But recent trends—some loosening of underwriting standards, the rise of nonbank mortgage lenders and servicers, and less access to affordable housing and homeownership—may pose additional risks and challenges to the housing market and participants, including the enterprises. Several indicators demonstrate that the housing market has recovered since the financial crisis of 2007–2009. For example, real national average house prices have consistently risen each year since 2012 (see fig. 2). The rise in house prices also has been complemented by consistent economic growth, declining unemployment, and low mortgage rates since 2009. Higher house prices have some positive implications for the financial soundness of the enterprises: higher prices can reduce the enterprises’ potential losses due to defaulted loans because the enterprises can recover more value from properties securing the loans. Serious delinquency rates (90 or more days delinquent) for mortgages purchased by Fannie Mae and Freddie Mac have declined steadily and since 2014 have remained between 1 and 2 percent for both enterprises (see fig. 3). Examining delinquency rates for mortgages by origination year reveals significant differences for mortgages originated before and after the financial crisis. According to Fannie Mae and Freddie Mac reports, mortgages originated since 2009 have had lower delinquency rates than those originated before 2009. For example, in 2017, Fannie Mae’s serious delinquency rate was 6.6 percent for mortgages originated in 2005–2008, compared to 0.5 percent for mortgages originated since 2009. As of October 2018, mortgages originated since 2009 represented more than 90 percent of Fannie Mae’s and 80 percent of Freddie Mac’s outstanding held loans and guaranteed MBS. Serious delinquency rates for mortgages insured by FHA are higher on average than those purchased by the enterprises but generally have followed similar trends. Compared to pre-2007 levels, trends in mortgage originations indicate a smaller-volume market largely composed of prime conforming and government-insured mortgages, as shown in figure 4. During 2008–2017, total mortgage origination volume—the dollar value of mortgage loans— remained below pre-crisis levels. Much of the decrease in volume resulted from large declines in prime jumbo and nonprime originations since 2008. Prime jumbo and nonprime originations represented a significant share of originations (market share) before 2007 but declined sharply since 2008. Prime jumbo market share recovered somewhat, increasing from a low of 6 percent in 2009 to approximately 18 percent of originations each year since 2014. Riskier nonprime originations remain very low compared to their pre-crisis levels. Meanwhile, federally insured mortgages (such as those insured by FHA or guaranteed by VA) grew significantly in 2008 and retained a market share between 19 and 25 percent in 2008–2017. Finally, prime conforming origination volume varied year-to-year but these mortgages have represented the majority of originations since 2007. Federally insured and prime conforming mortgages represented 80 percent or more of originations every year since 2008. The federal government has continued to support a significant share of the mortgage markets since the financial crisis. For instance, while down from the peak in 2009, the federal government has guaranteed more than two-thirds of new mortgages since 2014, either by insuring mortgages or by guaranteeing timely payment to investors on loans purchased and securitized by the enterprises (see fig. 5). Government-insured mortgages declined leading up to the financial crisis, largely due to the availability of nonprime mortgages and securitization by fully private institutions. But when the availability of these products declined sharply, government agencies such as FHA and VA insured or guaranteed significantly higher volumes of mortgages. For instance, the share of mortgages insured or guaranteed by federal agencies grew from 6 percent ($134 billion) in 2007 to more than 20 percent ($328 billion) in 2008. As of 2017, federally insured mortgages were 25 percent ($444 billion) of total originations. Similarly, as the share of conventional mortgages held in banks’ portfolios declined during the financial crisis, the enterprises purchased and securitized large volumes of these mortgages. The share of mortgage originations purchased by the enterprises peaked at 65 percent in 2008 and still accounted for nearly half of new mortgages in 2017. The federal government also has maintained a very substantial role in the secondary mortgage market since the financial crisis. The enterprises and Ginnie Mae guaranteed around 95 percent or more of all MBS issued each year since 2008, despite a nearly decade-long economic expansion. In line with the rise in federally insured originations, Ginnie Mae’s market share increased substantially, from 5 percent ($110 billion) in 2007 to 22 percent ($301 billion) in 2008, and about 33 percent ($455 billion) in 2017 (see fig. 6). Conversely, private-label MBS issuance since 2008 has been minimal, as many private-label issuers left the market and nonprime originations declined. The growth in the market share of Ginnie Mae and the enterprises resulted in part from actions by Congress and the Board of Governors of the Federal Reserve System (Federal Reserve). Congress increased the loan limits for FHA-insured loans and loans eligible for securitization by the enterprises. The federal government also made its backing of securities issued by the enterprises explicit by committing to provide them financial assistance, and Ginnie Mae continued to provide guarantees for securities backed by federally insured mortgages. According to several mortgage originators, securitizers, investors, and researchers with whom we spoke, the enterprises will continue to dominate the MBS market because the federal guarantee through conservatorship offers a competitive advantage over other participants without such a guarantee. In response to the financial crisis, the Federal Reserve provided additional support for the mortgage market, becoming one of the largest purchasers of MBS issued by the enterprises and guaranteed by Ginnie Mae. Among other impacts, this action made these securities somewhat more attractive to secondary market participants. In June 2017, when the Federal Reserve’s MBS holdings had peaked at $1.78 trillion, it announced plans to gradually reduce its MBS holdings as part of its efforts to reduce the size of its balance sheet. As of November 2018, the Federal Reserve had $1.66 trillion in MBS holdings. Recent trends—particularly changes in underwriting standards and borrowers’ credit risk profiles, the rise of nonbank mortgage lenders and servicers, and limited access to affordable housing and homeownership— pose risks and challenges to the housing market and participants, including the enterprises. Indicators of borrower credit risk and surveys of loan officers indicate a loosening of underwriting standards in recent years. More specifically, indicators of borrower credit risk for mortgages the enterprises purchased suggest underwriting standards tightened in 2008 but loosened slightly since 2012, which could pose increased risk to the enterprises. Specifically, average combined loan-to-value ratios (for all loans on the property) and debt-to-income ratios have increased, while average borrower credit scores have declined. The enterprises and FHA include assessments of these measures in setting their underwriting standards. As discussed earlier in the report, mortgages originated since 2009 have performed much better than those originated before 2008, but remain untested by a large-scale stressful economic event. Furthermore, mortgages to refinance an existing mortgage (as opposed to mortgages for purchasing a home) declined since 2012. According to FHFA officials, credit scores, loan-to-value ratios, and debt-to-income ratios tend to be stronger for refinance mortgages than purchase mortgages. FHFA and HUD officials also told us that reduced refinancing volume due to rising interest rates may put additional pressure on lenders to maintain volume and profitability by offering more relaxed credit terms to borrowers. Average combined loan-to-value ratios for mortgages purchased by the enterprises peaked in 2014 and have remained roughly similar to pre- crisis levels (see fig.7). In December 2014, FHFA began allowing the enterprises to purchase mortgages with loan-to-value ratios up to 97 percent. In the first three quarters of 2018, 22 percent of mortgages Fannie Mae purchased included a loan-to-value ratio over 90 percent, which is higher than shares in 2005–2008. FHA’s loan-to-value ratio is limited to 96.5 percent, and the average among borrowers has remained relatively consistent around 93 percent since 2008. The higher the loan- to-value ratio when a loan is originated, the less equity borrowers will have in their homes and the more likely they are to default on mortgage obligations, especially during times of financial stress or falling home values. Additionally, house price valuation—measured by the price-to- rent ratio—has increased substantially since 2012 to levels last seen in 2004. Higher valuations could increase the risk of future price decreases—which would reduce collateral values that protect the enterprises against losses in the event of default—or more modest price increases. This could signal increased risk when associated with higher loan-to-value ratios. Average credit scores for enterprise-purchased loans rose significantly from their pre-crisis lows and remained historically high through 2012 but have since slightly declined (see fig. 8). The average credit score of FHA-insured borrowers, while lower than those for loans purchased by the enterprises, followed a trend similar to those of the enterprises. Generally, a higher score indicates a greater credit quality and potentially lower likelihood of default. Lenders continue to use credit scores as a primary means of assessing whether to originate a loan to a borrower. Average debt-to-income ratios for mortgages purchased by the enterprises remained below their pre-crisis levels but have deteriorated since 2012, and the share of high debt-to-income mortgages rose. Additionally, according to Fannie Mae financial reports, in the first three quarters of 2018, roughly 25 percent of mortgages it purchased included a borrower debt-to-income ratio over 45 percent, up from roughly 7 percent of mortgages in the first three quarters of 2017. The share of high debt-to-income ratios for FHA-insured borrowers also has risen significantly. For example, nearly half (49 percent) of FHA- insured borrowers in fiscal year 2017 had high debt-to-income ratios, surpassing the previous high of 45 percent of borrowers in 2009. According to FHA, as of March 2018, about 24 percent of mortgages included debt-to-income ratios above 50 percent, up from 20 percent of mortgages in March 2017. The Dodd-Frank Act requires mortgage lenders to make “a reasonable, good faith determination” of a borrower’s ability to repay the loan. A lender that originates a “qualified mortgage” is presumed to have met this requirement. All qualified mortgages must meet mandatory requirements including restrictions on points and fees, and loan structure. In addition, the borrower’s debt-to-income ratio must be 43 percent or less; however, loans eligible for purchase by the enterprises or to be insured by the FHA, VA or USDA are not subject to a specific debt-to-income ratio. Additionally, according to results from the October 2018 Senior Loan Officer Opinion Survey on Bank Lending Practices, more loan officers reported loosening than tightening their underwriting standards for enterprise-eligible mortgages every quarter from 2015 through the second quarter of 2018. More officers reported loosening their standards for government-insured mortgages during 12 of the last 16 quarters. Our review found that the increased role of nonbank mortgage lenders and servicers in recent years has helped provide liquidity and access to mortgage credit but also presented additional liquidity risks. FHFA and HUD officials reported that the share of nonbanks mortgage originators and servicers grew since the financial crisis. According to data from Inside Mortgage Finance, nonbanks originated roughly half of all mortgages sold to the enterprises in 2017 and the first three quarters of 2018. Of the top 10 mortgage sellers to the enterprises in the first three quarters of 2018, six were nonbanks that originated more than 20 percent of all enterprise purchases during that period. Nonbank servicers of loans backing enterprise MBS have grown from 25 percent in 2014 to 38 percent as of the third quarter of 2018. For FHA-insured mortgages, nonbank originations represented 74 percent in 2003, declined to 56 percent in 2010, and then increased to 86 percent in fiscal year 2017. While FHFA and HUD officials told us nonbanks have helped provide access to mortgage credit, several stakeholders and experts in all four of our panels identified the increased presence of nonbank lenders as a current risk in the housing finance system. A 2018 paper published by the Brookings Institution cited that nonbanks are exposed to significant liquidity risks in their funding of mortgage originations and servicing of mortgages, because nonbank lenders rely more on credit lines provided mostly by banks, securitizations involving multiple players, and more frequent trading of mortgage servicing rights than banks. For instance, during times of financial stress, lenders to nonbanks have the right to quickly pull their lines of credit and seize and sell the underlying collateral if nonbanks do not maintain certain levels of net worth. HUD officials identified similar risks and added that this may reduce borrower access to credit in the event of financial stress or a liquidity crisis. Additionally, while nonbanks are subject to some federal and state oversight, they are not federally regulated for safety and soundness. State regulators may require nonbanks to be licensed and may examine their financial soundness and compliance with relevant state laws, but there are no such federal regulations, unlike with banks. The Conference of State Bank Supervisors has a series of initiatives with the goal of all state regulators adopting a nationwide nonbank licensing and supervisory system by 2020. CFPB oversees nonbank issuers for compliance with consumer financial protection laws but not for financial safety and soundness. We reported in 2016 that incomplete information on the identity of nonbank servicers may hinder those responsible for their oversight. The lack of federal safety and soundness oversight of nonbank lenders and servicers may pose risks for the enterprises and federal housing finance entities. The enterprises conduct financial and operational reviews of their counterparties in accordance with FHFA guidance. But, as we reported in 2016, FHFA does not have the authority to independently evaluate the safety and soundness of entities that conduct business with the enterprises. In 2014, the FHFA Office of Inspector General found that nonbank lenders may have limited financial capacity and are not subject to federal safety and soundness oversight, creating an increased risk that these counterparties could default on their financial obligations. They also found that rapid business growth among specialty servicers could put stress on their operational capacity or overrun their quality control procedures, potentially increasing representation and warranty claims and credit losses on mortgages they sell to the enterprises. Representation and warranty claims allow the enterprises and other federal entities to recover some losses from lenders in the event of misrepresentation by the seller. From 2009 through 2013, the enterprises received $98.5 billion through repurchase requests to sellers (that is, they required sellers to repurchase the enterprises’ interests in the loans). According to the FHFA Office of Inspector General, due to lower capital levels, nonbanks may be less able to honor these representation and warranty commitments. FHFA and HUD officials also told us nonbanks have helped increase servicing capacity. We previously reported that nonbank servicers provide benefits to the housing market through increased capacity to service delinquent loans and contribute to liquidity by broadening participation in the market for mortgage servicing rights. In particular, larger numbers of individual servicers also can reduce market concentration, suggesting that servicers may be more likely to behave competitively and can, for instance, increase innovation. Furthermore, large nonbanks are generally not as interconnected with the financial system as large banks, potentially limiting broader market effects in the event of the failure of a single large nonbank servicer. But the enterprises and Ginnie Mae likely would incur costs in the event of a failure of a large nonbank servicer whose portfolio cannot be easily absorbed by others. Mortgage servicers must continue making payments to investors when borrowers do not make payments. For mortgages backed by the enterprises, servicers can be reimbursed for principal and interest and certain other expenses, but they must finance them in the interim. Servicers of mortgage pools guaranteed by the enterprises must advance payments until the borrower is 120 days delinquent on the loan. Servicers of Ginnie Mae-guaranteed pools are not limited in how long they must advance principal and interest on delinquent loans, and they additionally may be required to absorb losses not covered by FHA insurance or VA guarantees. In the event of a failure of a large nonbank servicer with a not readily absorbable portfolio, Ginnie Mae and the enterprises likely would bear most of the associated costs, and consumers also likely would see some effects, such as service interruptions. In 2015, FHFA and Ginnie Mae raised their minimum financial eligibility requirements for sellers and servicers (including for net worth, capital ratio, and liquidity criteria for counterparties), but these requirements may not fully account for the high interest rate and default risks that nonbanks face. Challenges related to affordable housing and access to homeownership also remain. Fannie Mae and Freddie Mac are subject to affordable housing goals for their purchases of single-family and multifamily mortgages that benefit families with lower incomes. However, a number of factors affect the development of affordable housing and access to homeownership. For example, according to a 2018 study on the state of the nation’s housing, competition for the historically low supply of existing homes on the market has pushed up home prices in most metropolitan areas, raising concerns about affordability. The study also noted that although better housing quality accounts for some of the increase in housing prices, sharply higher costs for building materials and labor, among other factors, have made housing construction considerably more expensive. Land prices also increased as population growth in metropolitan areas increased demand for well-located sites. Along with rising housing costs, the study also reported that weak income growth among low- and moderate-income households contributed to affordability pressures. As homeownership becomes less affordable with house price increases, the enterprises’ affordable housing goals become more difficult to achieve. For example, for calendar year 2016, Freddie Mac met all of its affordable housing goals, and Fannie Mae met most of its affordable housing goals, but failed to meet its goal for the single-family home purchase, very-low income category. For calendar year 2017, based on FHFA’s preliminary determinations, Fannie Mae met all of its affordable housing goals, but Freddie Mac missed its single-family home purchase goals for both the very low-income and low-income categories. Experts and stakeholders we interviewed identified other contributing challenges. For example, a few experts and stakeholders cited lower levels of lending in minority communities and to low- and moderate- income borrowers, which are typically most in need of affordable housing, as contributing challenges. A few other experts and stakeholders stated that borrowers increasingly have been holding other types of debt, such as student loan debt, which makes it more difficult for them to obtain an affordable mortgage. Lastly, the qualified mortgage rule exception, which may have helped some borrowers with a debt-to-income ratio above 43 percent to obtain a mortgage, expires in 2021 or earlier if conservatorship of the enterprises ends before then. When this happens, this could also hinder the ability of certain borrowers with a debt-to-income ratio higher than 43 percent to obtain mortgages. Fannie Mae and Freddie Mac have taken actions in recent years that could further increase the scope of their activities and present challenges or barriers to entry for other market participants. Both enterprises have recently introduced pilot programs that affect mortgage insurance decisions and terms typically made by lenders. In 2018, Fannie Mae introduced a pilot program to offer an enterprise-paid mortgage insurance option—an alternative to the borrower-paid and lender-paid options currently available. Under the program’s structure, Fannie Mae is the entity responsible for purchasing mortgage insurance on loans with high loan-to-value ratios. To do so, Fannie Mae secures an insurance arrangement from a qualified insurer, which in turn transfers the risk to a panel of approved reinsurers. Fannie Mae pays the mortgage insurance premiums, while the lender is responsible for paying an additional, loan-level price adjustment. Freddie Mac launched a similar pilot program earlier in 2018 known as the Integrated Mortgage Insurance program. Under this program, simultaneous with purchasing single-family mortgages, Freddie Mac purchases mortgage insurance from a panel of pre-approved reinsurance companies that it has allocated risk among. In addition, the reinsurers post collateral to provide further assurance that claims will be paid, and they cannot deny or rescind coverage. According to Fannie Mae and Freddie Mac documents, these pilot programs allow the enterprises to better manage their counterparty risk and streamline the operational requirements of participating lenders. For example, each participating reinsurer undergoes a thorough counterparty review in order to be approved for participation in the programs. Additionally, under the programs, lenders are not required to purchase mortgage insurance for loans with loan-to-value ratios above 80 percent, which would simplify the process of selling loans to the enterprises. However, according to several experts and stakeholders with whom we spoke, by allowing the enterprises to play a role in selecting the mortgage insurer, these pilot programs widen the scope of activities of the enterprises. They also allow them to become more dominant by potentially growing their role beyond the secondary market and into the primary market. They explained that these programs promote greater vertical integration of private-sector activities into the enterprises, and create challenges for market participants. For example, they stated that they promote an uneven playing field in the private market by allowing for different terms and standards for enterprise-paid mortgage insurance versus other sources of private capital. Experts and stakeholders also identified other enterprise pilot programs or activities, such as Freddie Mac’s financing of nonbank mortgage servicers and the enterprises’ standardization efforts, as potential challenges. Freddie Mac’s Mortgage Servicing Rights pilot program provides financing to nonbank servicers, with some limitations, secured by the servicers’ mortgage servicing rights. The program is intended to address impediments nonbank mortgage servicers face in obtaining financing and extends credit to nonbank mortgage servicers when they need access to cash. However several experts and stakeholders with whom we spoke stated that this could lead to certain servicers having a competitive advantage. For example, they stated that under this program, Freddie Mac may target its financing at the biggest servicers and charge comparatively low interest rates, putting small lenders and servicers at a disadvantage. The enterprises also have efforts to standardize appraisal data, loan applications, and closing disclosures. While these efforts are intended to streamline and standardize aspects of the mortgage process, several experts and stakeholders explained that the results of these activities can be costly to smaller lenders and servicers who have to bear the costs of adapting their systems to enterprise requirements. They also indicated that participants in the primary market have become reliant on the enterprises for standards and innovation. Several experts and stakeholders also stated that the cost for market participants to adopt new programs or standards set by the enterprises can be high and could inhibit other participants from entering the housing finance market. In addition, the enterprises are currently developing a common securitization platform to support the issuance of a common single mortgage-backed security by both enterprises. The platform will support the enterprises’ single-family mortgage securitization activities, including issuance by both enterprises of a common mortgage-backed security to be known as the uniform mortgage-backed security. FHFA expects the issuance of the uniform mortgage-backed security to improve the overall liquidity of the enterprises’ securities and promote liquidity of the nation’s housing finance markets. The common securitization platform also would integrate the various securitization infrastructure systems within each enterprise, which is expected to lower costs and increase efficiency. However, several stakeholders we interviewed explained that the platform presents concerns. For example, mortgage securitizers and investor stakeholders who participated on our panels expressed concern about the platform and its availability to other market participants. Specifically, they stated that the goal of the project has, at times, been unclear and that it has been difficult to tell to what extent or when the platform will be accessible to other secondary market participants. They also stated that if the platform would not be accessible to other secondary market participants, it would take away opportunities from participants willing and able to pool eligible securities. FHFA officials told us the platform currently is intended for use only by Fannie Mae and Freddie Mac, but that the agency is aware that potential reforms to the housing finance system may bring about the inclusion of other guarantors. As such, the platform is being designed to be adaptable for use by other participants in the secondary market in the future. (We discuss recent proposals to reform the housing finance system in detail later in this report.) FHFA-directed actions (including retained mortgage portfolio reductions, credit risk transfer, and foreclosure prevention) have improved the condition of the enterprises by mitigating some of the enterprises’ exposures to potential losses. Treasury’s remaining funding commitment through the senior preferred stock purchase agreements leaves taxpayers exposed to risk, especially in the event of adverse market or other external conditions and considering the recent growth in the enterprises’ guarantee business. Total MBS outstanding guaranteed by the enterprises and held by external investors has increased each year since 2012. As of the end of 2017, the enterprises’ combined MBS outstanding held by external investors peaked at $4.8 trillion (see fig. 12). Under the terms of the senior preferred stock purchase agreements with Treasury, Fannie Mae and Freddie Mac do not maintain a capital cushion—as a private financial institution would—to guard against the risk of unexpected losses such as those that might occur during a recession or downturn in the housing market. Instead, Treasury, through taxpayer funds, committed $445.6 billion of financial support to the enterprises. As of August 2018, Treasury had provided the enterprises with $191.4 billion of the total amount since they were placed under conservatorship in 2008, leaving $254.1 billion in potential taxpayer exposure should Treasury need to provide additional support. In return, the enterprises must pay to Treasury as dividends all of their quarterly positive net worth amount (if any) over $3 billion. Thus, any losses on this amount not recovered through loss-mitigation efforts or covered by private investors or insurers would be borne by taxpayers through additional financial support from Treasury. While private institutions could absorb a share of losses on mortgages covered by credit risk transfer and private mortgage insurance (discussed earlier in this section), any additional losses would come from Treasury’s remaining funding commitment through the senior preferred stock purchase agreements. Because of this arrangement, credit rating agencies have linked the enterprises’ strong long-term credit ratings directly to that of the U.S. government and their equity to Treasury’s remaining funding commitment. Since the second quarter of 2012, Fannie Mae and Freddie Mac have not required additional support from Treasury, with the exception of the first quarter of 2018, when both enterprises required Treasury support due to devaluation of their deferred tax assets as a result of changes to the tax code. As of the end of September 2018, the enterprises had cumulatively returned $285.8 billion to Treasury through senior preferred stock agreement dividend payments. However, in addition to economic circumstances, changes in market conditions or other external factors— such as changes in interest rates, house prices, accounting standards, or events such as natural disasters—could lead to volatility in the enterprises’ quarterly financial results, potentially requiring additional taxpayer support. The extended duration of the conservatorships continues to create uncertainty about the goals and future role of the enterprises. We previously reported that FHFA’s priorities can shift, sometimes due to changes in leadership. For example, FHFA initially outlined its understanding of its conservatorship obligations and how it planned to fulfill those obligations in a 2010 letter to Congress. In February 2012, FHFA sent Congress a strategic plan that set three strategic goals for conservatorship and elaborated on how FHFA planned to meet its conservatorship obligations. However, under a new Director in 2014, FHFA issued an updated strategic plan that reformulated its three strategic goals. This same Director’s term expired in early January 2019, and the process is underway for a new, permanent Director to be confirmed. The upcoming change in leadership could shift priorities for the conservatorships again and change enterprise goals. Continuing conservatorship also presents challenges to FHFA, as it has to balance its role as conservator with its role as regulator. FHFA must follow the mandates assigned to it by statute and the missions assigned to the enterprises by their charter. This entails consistently balancing governing of the enterprises, ensuring they employ sound risk-management practices, and ensuring they continue to serve as a reliable source of liquidity and funding for housing finance. In our interviews with experts and stakeholders, at least one expert or stakeholder from each of the groups (mortgage originators, mortgage securitizers and investors, academics and researchers, and consumer advocates) also identified the duration of the conservatorships as a challenge. For example, they said that the duration of the conservatorship has led to a more substantial role for the enterprises than envisioned when they were placed under conservatorship, which could make potential changes to their structure more difficult to implement. The duration of the conservatorships also has led to uncertainties in the housing finance market. As we previously reported, under conservatorship, the enterprises are subject to agency policy decisions and are insulated from competition and other market forces. As a result, according to several mortgage originators and securitizers, and consumer groups with which we spoke, uncertainty about the future of the enterprises also makes it challenging for them to develop their own strategic plans and goals. They explained that they hesitate to make longer-term strategic plans and goals due to potential housing finance reform changes, particularly to the enterprises, that could markedly affect their industries. Additionally, the dominant role of the federal government in guaranteeing MBS since the crisis has continued, and private capital generally has not been positioned to absorb losses in the secondary mortgage market during a potential economic downturn. The current structure of the secondary mortgage market will continue to leave taxpayers at risk to potential losses. The significant federal role in the housing market likely will continue if the enterprises remain under conservatorship and without a defined future role. We assessed 14 proposals for housing finance reform against our framework to assess potential changes to the housing finance system. The framework consists of nine elements we determined to be critically important, such as recognition and control of federal fiscal exposure, protections for investors and borrowers, and clear goals (see the Background for more information). We found that the proposals generally aim to manage fiscal exposure—the risk the housing finance system poses to the federal government and taxpayers—but only six have clear goals and only seven consider other federal housing finance entities, such as FHA or Ginnie Mae, in addition to the enterprises. Reform proposals we reviewed generally fit into four different models: (1) reconstituted enterprises, (2) multiple guarantor, (3) government corporation, or (4) privatization (termination of the enterprises). Based on our review of the proposals, relevant literature, and expert interviews, each model has potential strengths and limitations. Four proposals we reviewed call for the enterprises to be recapitalized and then released from conservatorship, retaining their federal charters. Under these proposals, the enterprises would be regulated by an independent regulator that would oversee their safety and soundness. These proposals also recommend a federal guarantee on MBS under the senior preferred stock purchase agreement or by legislation. To mitigate fiscal exposure from the enterprises, the proposals include the continuation of credit risk transfer programs, and also require the enterprises to have risk-based capital reserves. In its report analyzing alternative housing finance market structures, CBO reported that under this model, taxpayers would have a higher exposure to risk compared with the multiple-guarantor and privatization models. According to industry stakeholders, potential strengths of this model include feasibility, minimal market disruption, and the continuation of policies familiar to key stakeholders. For example, one proposal argues that its reforms could be completed under existing legal authority, with no new legislation required. Five primary market stakeholders in our panels also stated that they would prefer a system similar to the current model with minor reforms because larger changes might disrupt the market and have unforeseen consequences. Industry stakeholders that rely on specific policies of the enterprises also generally support a recapitalization and release model. For example, four associations of small lenders have released statements in support of reconstituting the enterprises to ensure the continuation of the cash window. In addition, groups that advocate for financial inclusion and civil rights also have expressed support for reconstituting the enterprises to ensure the continuation of the affordable housing goals and other policies to help low-income borrowers. However, this model may not include sufficient safeguards to mitigate the risk that the enterprises—even in a reconstituted form—could pose to the stability of the mortgage market. As previously discussed, as of 2017, the enterprises issue more than half of new MBS and, in our panels, two participants from industry groups criticized the enterprises for their expansion into other areas of the housing market. In 2018, a former FHFA director stated in Congressional testimony that the enterprises were more entrenched in the market than ever before, the market depended entirely on them, and any weaknesses in their risk management could disrupt the entire housing market. If the enterprises were recapitalized without sufficient safeguards, shareholders again might have incentive to take on excessive risk. To mitigate these concerns, two of the four proposals recommend that the reconstituted enterprises operate as utilities. Utilities have a regulated rate of return, which supporters say would limit profit-maximizing motivations and encourage more prudential behavior and underwriting standards. The utility model is traditionally used in industries that tend to operate as monopolies or near monopolies, such as the electric power industry. Some industry experts believe that the securitization market operates similarly to a monopoly. Three industry stakeholders, two researchers, and one participant from a consumer protection group we interviewed also supported restructuring the enterprises as utilities. Additionally, three industry groups representing small lenders endorsed turning the enterprises into utilities. Six of the proposals we reviewed recommend transitioning to a system with multiple guarantors operating in the secondary market. Under this model, multiple private-sector firms would purchase eligible mortgages and aggregate them into MBS. The MBS would be eligible for an explicit federal guarantee if the guarantor arranged for private credit enhancements to absorb a certain amount of loss and if it met certain regulatory criteria, such as securitizing mortgages that comply with all qualified mortgage standards. A federal agency—FHFA or a successor— would charge and collect guarantee fees from the guarantors and set capital requirements. The six proposals use the guarantee fees to fund a mortgage insurance fund that would provide the federal guarantee. According to CBO’s analysis, under this model, taxpayers would have less exposure to risk compared with models for reconstituted enterprises or a government corporation, but more than under a fully private market. Proposals within this model vary in a few key ways: Enterprises: Four of the six proposals call for the enterprises to become guarantors in the new system, while two call for them to be put into receivership and replaced with successor entities. One of the proposals that would keep the enterprises recommends that they and other guarantors operate as utilities and another suggests the enterprises remain in the new system but transition to be mutually owned by lenders instead of shareholders. Securitization: Three of the six proposals would retain the common securitization platform, while one proposal would rely on Ginnie Mae- approved issuers, allowing them to issue securities including mortgages that obtained credit enhancement from a private guarantor (instead of just federal programs). One proposal that retains the common securitization platform would convert the platform into a government corporation that issues securities from any regulator- approved entity. The fifth proposal would rely on both Ginnie Mae issuers and the common securitization platform to issue securities. The sixth proposal does not specify an entity to issue securities. Number of guarantors: Proposals vary in the number of guarantors needed in the new system. For example, the Mortgage Bankers Association’s proposal suggests having more than two guarantors, while Moody’s Chief Economist said in a congressional testimony that from five to seven would be feasible (using the private mortgage insurance industry as a guide). The potential strengths of this model include the benefits arising from competition and replacing reliance on two large firms with multiple smaller guarantors. The Mortgage Bankers Association’s proposal stated that, while subject to strong regulations, guarantors can compete on price, products, and service. Multiple guarantors could provide lenders with a variety of options to sell their loans, instead of just the enterprises. More competition also could encourage innovation in the secondary market. The secondary mortgage market also might reduce its reliance on two “too-big-to-fail” entities with multiple guarantors. Because credit risk would be more dispersed across a number of entities, the failure of one firm would be less likely to disrupt the broader system, thus reducing the likelihood the government would have to rescue a struggling firm. According to four representatives of investor groups and a former HUD official we interviewed, a potential limitation of the multiple-guarantor model is that it could be difficult for new firms to enter the market and compete with the enterprises. One proposal addresses this concern by terminating the enterprises. However, if there are only a few guarantors, the failure of any one firm could pose a systemic risk and might require federal assistance. In addition, two researchers we interviewed said that because the guarantors would operate in the same market and thus would face the same market trends, having multiple guarantors might not diversify risk. For example, in a financial crisis, it is possible that all the guarantors would struggle and in such a scenario, the government would have to assist many firms. Some industry experts expressed concern that competition could have negative consequences. We previously reported that leading up to the financial crisis, the enterprises faced new competition from private-label securitizers and, in the absence of strong federal oversight, they relaxed their underwriting standards to regain market share. Thus, two researchers, four primary market stakeholders, and a former HUD official we interviewed warned that a system dependent on competing entities could face similar risks, particularly if oversight and regulation were not strong. Five of the proposals we reviewed would require all guaranteed securitized mortgages to meet qualified mortgage standards, limiting potential reductions in underwriting standards, and one of the five also would address this concern by regulating the guarantors as utilities. Two proposals would replace Fannie Mae and Freddie Mac with a single government corporation that would issue MBS. For example, in one proposal we reviewed, lenders would sell loans meeting certain requirements (such as qualified mortgages) to the corporation, which would operate the common securitization platform to issue MBS with a federal guarantee. The government corporation would manage fiscal exposure by transferring credit risk to the private sector and through capital requirements set by an independent regulator. The two proposals also would use guarantee fees to fund a mortgage insurance fund that would add an additional level of taxpayer protection. Based on its analysis, CBO reported that under this model, taxpayers would have more exposure to financial risk than under the multiple guarantor or privatization models. The potential benefits of a government corporation include stable lending during financial crises, equitable lender access, and better targeting of underserved groups. According to CBO, a government agency is more likely than private actors to promote stable mortgage lending during financial crises due to federal support. Additionally, according to a proposal by a think tank, a government corporation could provide lenders of all sizes with equal access to securitization, potentially reducing barriers to entry for new firms in the primary market. We previously reported that compared with other models, a government corporation would be well-positioned to facilitate lending to targeted groups because it does not have potentially conflicting priorities, such as maximizing shareholder value. Finally, a key benefit of creating a government corporation would be to mitigate the potential challenges posed by relying on private-sector entities (reconstituted enterprises, multiple guarantors, or a fully private market). For example, we previously reported that as for-profit corporations with government sponsorship, the enterprises had an incentive to engage in potentially profitable but risky business practices, in part because of the perception of an implied federal guarantee. In contrast, a government corporation would not be motivated by profit and thus should have less incentive to engage in potentially risky actions. The government corporation also could end reliance on a few large private firms by transferring securitization to a single entity in the public sector. There are potential limitations to relying on a government agency to support the secondary market. According to CBO, under this model, the government would still retain most credit risk and thus originators might not have a strong incentive to thoroughly vet borrowers’ credit risk, which could lead to potential losses. We also reported in 2009 that because of the limitations on government entities relative to private firms, a government corporation might have more difficulty in attracting and retaining capable staff, responding to market developments, or promoting innovation. If unaddressed, these issues could pose safety and soundness concerns because the agency might not have the skills and capabilities to assess risks and manage a complex industry. Two proposals we reviewed would terminate the enterprises and completely privatize the housing finance industry, with no federal guarantee on MBS. Under these proposals, the enterprises’ charters would be revoked and the enterprises would be wound down over a multiyear transition period during which their guarantee fees would increase and their loan limits decrease until they no longer guaranteed new mortgages. One proposal would keep the common securitization platform and make it available to all market participants, but it would operate as a nongovernmental entity and would be prohibited from guaranteeing MBS. The main benefit of this model would be to minimize fiscal exposure by having private firms form the secondary market for mortgages that are not federally insured, similar to the private-label MBS sector before the crisis. CBO noted that private actors should have a stronger incentive to control lending risk without a government backstop. Additionally, if a number of firms replaced the enterprises, then a largely private market likely would reduce the systemic risk of relying on a few large firms. However, a fully privatized market has some potential limitations related to an implied federal guarantee, and credit availability. CBO reported that although taxpayers’ would have less explicit exposure to risk compared to the other models, risk exposure could be very high even without an explicit guarantee. That is, the government likely would assist or prevent the failure of private firms in an economic downturn to ensure financial stability (also known as an implicit federal guarantee). We previously reported that private-sector actors may benefit from an implicit guarantee and this may incentivize firms to engage in potentially risky actions and expose the government to potential losses. Additionally, privatizing the market could increase fiscal exposure through FHA. The CBO report noted that a privatized model could reduce the availability of credit to marginal borrowers, and predicted it would lead to a large increase in FHA-insured loans. A largely private market also might not sustain mortgage lending during periods of economic stress. For example, the private-label market largely disappeared after the 2007–2009 financial crisis and has yet to recover, as previously discussed. Finally, CBO reported that during a financial crisis, there could be large increases in mortgage interest rates, large declines in house prices, and limited availability of 30-year fixed-rate mortgages. The 14 proposals we reviewed generally meet the following elements of our housing finance reform framework: recognizing and controlling federal fiscal exposure, protecting mortgage investors, adhering to an appropriate regulatory framework with government entities that have the capacity to manage risks, emphasizing the implications of the transition to a new housing finance system, protecting mortgage borrowers and addressing market barriers, and considering market cyclicality and impacts on financial stability. Legislative proposals and those from other sources generally address these elements in similar ways. Every reform proposal we reviewed attempts to recognize and control federal fiscal exposure—the risk that the federal government and taxpayers will have to provide financial support to the housing finance system. Twelve of the 14 proposals we reviewed support an explicit government guarantee on MBS. Some supporters of a federal guarantee maintain that if the government were to support the mortgage industry in a crisis, then such support should be explicit, which will allow it to be priced and reflected in the federal budget. In addition, every expert with whom we spoke—including industry stakeholders, consumer advocates, researchers, and former agency officials—supported an explicit government guarantee on MBS. In 11 proposals, the federal guarantee would be administered through a mortgage insurance fund managed by a federal regulator and funded through guarantee fees. To manage and limit fiscal exposure, the 12 proposals structure the federal guarantee so that it would only be accessed after a certain amount of private-sector loss. Private capital would be introduced through increased, risk-based capital requirements for the enterprises, successor entities, or new market entrants (such as guarantors). The proposals also would continue to transfer credit risk to the private sector. These proposals vary in how much private capital would be required ahead of the government guarantee. For example, one proposal would require 10 percent but another proposal would require 5 percent. In its proposed rule for enterprise capital requirements, FHFA reported that capital reserves of about 5.5 percent would have covered the enterprises’ losses during the financial crisis. However, according to CBO, the initial increases in capital requirements could increase mortgage interest rates. The two proposals without an explicit federal guarantee aim to address fiscal exposure by eliminating the enterprises and relying entirely on the private sector. However, some industry experts have asserted that there likely will always be an implied federal guarantee for the housing finance market (even without the enterprises) as the federal government will not allow the market to fail. These experts stated that they believe that this guarantee should be explicitly recognized and accounted for in the federal budget. Thirteen of 14 proposals fully meet the element of providing protections for mortgage securities investors. We previously reported that investors need to receive consistent, useful information to assess risks. We also reported that prior to the crisis, MBS investors may have lacked reliable information to accurately assess the credit risk of their investments. Twelve reform proposals we reviewed attempt to remedy these weaknesses by first providing an explicit federal guarantee on MBS. In a 2017 testimony, a former FHFA Director said that a federal guarantee signaled to MBS investors that they were protected from credit risk and a meaningful segment of investors would not continue to invest in this market without the guarantee. In addition to the federal guarantee, proposals would aim to protect investors in the following ways: Increased transparency: Proposals recommend providing investors with more information on the mortgages underlying MBS. If investors had more information about asset quality, it would help them to more accurately price risk. For example, one proposal would require market participants to make available to investors all documents (including servicing reports) related to the mortgage loans collateralizing the security. Standard securitization platform: Currently, the enterprises each have their own platforms to issue MBS and different rules governing their MBS. To improve investor protections, FHFA and others recommend a standard platform for issuing securities. As previously discussed, FHFA has been developing such a platform, which will result in a both enterprises issuing a uniform security. Twelve of 14 proposals emphasize an appropriate regulatory framework with federal regulators that have the capacity to manage risk. Proposals generally recommend that an independent federal agency, such as FHFA or a successor, regulate housing finance market participants. The regulator also may oversee the securitization platform. Three proposals that would expand Ginnie Mae recommend that Ginnie Mae become an independent agency to strengthen its counterparty oversight capabilities. The proposals also generally recommend that the regulator have risk- management capabilities to determine market participants’ capital requirements. The regulator also would be able to adjust these and other requirements, such as credit risk transfer targets, based on market circumstances. In 11 proposals, the regulator would set and collect guarantee fees and use these fees to create a fund for mortgage insurance that would act as the federal guarantee on MBS. However, we previously noted that federal agencies sometimes have faced challenges in accurately pricing risk in other insurance programs, such as deposit or flood insurance. Eleven of the 14 proposals we reviewed fully consider the implications of transitioning to a new system and mitigating potential disruptions. Because transitioning to a new system could disrupt market operations and consumers’ access to mortgage credit, we previously noted the importance of a deliberate, well-defined transition. In our expert panels, participants from investor groups noted that unless there is a clear transition plan (particularly one that addresses any changes to the enterprises), it would be difficult for new market entrants and investors to plan accordingly. The 11 proposals that meet this element include multiyear transitions to help minimize disruption. For example, one proposal that would eliminate the enterprises would allow for a 10-year transition to a new fully privatized system and create a temporary federal entity to oversee the transition. Five primary market stakeholders and a representative from a consumer advocacy group we interviewed emphasized the importance of minimizing market disruption and maintaining market liquidity. These industry experts noted that some parts of the system currently work well, and these aspects should be maintained and transitioned in reform. The 11 proposals would transition the enterprises to the new market structure or transition their personnel and facilities to successor entities. One proposal that does not meet this element does not discuss transition plans. Two other proposals do not fully meet this element because they do not address what would happen to the enterprises’ current assets, human capital, and intellectual property. Nine of 14 reform proposals explicitly address protections for mortgage borrowers. The relevant policy mechanisms to protect mortgage borrowers include maintaining CFPB’s qualified mortgage and ability-to- repay rules, as well as additional services to support borrowers. For example, one proposal would increase support for programs that help prepare renters to become homeowners. Another proposal recommends modifying servicing guidelines for nonperforming loans to ensure consumers are treated fairly and would establish consistent procedures for servicers. The five proposals that do not fully meet this element do not address it at all or do not describe specific programs or policies. Eleven of 14 proposals explicitly address barriers to accessing the mortgage market. For example, eight proposals aim to maintain access to 30-year fixed-rate mortgages, a key instrument for promoting access to homeownership. Eleven proposals would support funds dedicated to affordable housing, such as the Housing Trust Fund and Capital Magnet Fund, through fees on securitized loans. Five proposals also would collect fees for a new Market Access Fund dedicated to increasing the number of families able to achieve homeownership and access credit. However, two proposals would eliminate the Housing Trust Fund. Proposals vary in their support of the enterprises’ affordable housing goals. Eight proposals call for the affordable housing goals to be eliminated and eight industry stakeholders we interviewed doubted the effectiveness of such goals, stating that homeownership should not be addressed through the secondary market. In 2009, we reported that there was limited evidence to support the effectiveness of the enterprises’ affordable housing goals in supporting homeownership for the targeted groups. However, affordable housing and consumer advocates we interviewed stated that they want to maintain the goals because they believe that the goals improved access to credit for minority and low- to moderate-income borrowers. Regardless of their position on the affordable housing goals, we found that proposals with a federal guarantee generally would require market participants to serve all eligible borrowers in all markets to receive the guarantee. Thirteen proposals also recommend policies that would promote small lender access to the market, such as maintaining the enterprises’ cash windows or creating a similar structure in their successors. Through the cash windows, lenders can sell individual loans directly to the enterprises and retain servicing rights. According to the Center for Responsible Lending, keeping loan servicing within community-based financial institutions often results in better loan performance and customer service outcomes. One former HUD official we interviewed stated that minority communities are often served by smaller lenders and these lenders need the cash window as a way to continue making affordable loans. Ten experts in our panels—including housing advocates, primary and secondary market participants, and researchers—said that reform plans should give fair treatment to all lenders, regardless of size. Nine of 14 reform proposals fully meet the element relating to consideration of the cyclical nature of the housing finance market and its impact on financial stability. We previously reported that the housing finance market is characterized by cyclical fluctuations and its market cycles may pose risks to overall financial and economic stability because housing is a significant part of the economy. The five proposals that do not fully meet this element do not address how the reformed system would attempt to mitigate market cycles. We previously reported that financial regulatory action or inaction can exacerbate housing finance cycles, and thus reform proposals should consider the potential impact of new regulations on market cyclicality. To mitigate market cycles, the nine proposals that meet this element generally include policies that would allow the regulator to adjust regulations based on market cycles. In one proposal, the regulator would establish risk-based capital requirements for the enterprises or successor entities and could adjust the requirements temporarily based on market cycles. One proposal that would create a government corporation also would allow the corporation to maintain a small portfolio to manage distressed loans. Eight of the proposals we reviewed do not have clearly defined goals and seven do not fully consider other entities in the housing finance system— two key elements in our housing finance reform framework. Eight of 14 proposals we reviewed do not have clearly defined goals for the housing finance system, including four legislative proposals. Additionally, none of the proposals prioritize their goals. Among the six proposals with clearly defined goals, we identified some common goals, such as minimizing the risk of taxpayer-funded bailouts, supporting market liquidity, and maintaining a level playing field for lenders of all sizes. We also identified different goals among the proposals, reflecting differences in reform models. For example, proposals similar to the multiple-guarantor model explicitly include market competition as a goal, while a proposal for reconstituting the enterprises includes stable transition as a goal. As we reported in 2015, clearly defined and prioritized goals are a key element to consider when assessing changes to the housing finance system. Clear goals help guide agencies’ activities and establish accountability. Experts with whom we spoke also emphasized the importance of clearly defined goals in housing finance reform proposals. For example, one researcher said it would be difficult to discuss any necessary policy changes until the government clearly articulated goals for its role in the housing finance system. Furthermore, prioritizing goals can help guide agencies’ actions and provide clarity to market participants, particularly if there are conflicting goals. For example, three proposals we reviewed include the goals of both minimizing risks to taxpayers and promoting affordable homeownership, but there is a trade-off between these goals—promoting homeownership may mean encouraging lending to riskier borrowers. As of early January 2019, Congress had not enacted legislation that establishes clear and prioritized objectives for the future federal role in housing finance. The lack of such goals in many of the proposals we reviewed raises questions as to whether the proposals that Congress may consider in the future will give adequate attention to these critical elements of housing finance reform. Without clearly defined and prioritized goals, agencies’ housing finance activities may lack focus and consistency. We previously reported that because Congress did not provide clearly defined and prioritized goals to FHFA for conservatorship, each FHFA director has been able to shift agency priorities within statutory requirements. For instance, the first FHFA director raised guarantee fees to encourage the return of private capital to the MBS market, while the next director stopped the increase out of concern for its effect on credit availability. Additionally, we reported that FHFA’s shifting priorities for conservatorship contributed to uncertainty among market participants. Therefore, by identifying a primary objective for housing finance reform, Congress would be better positioned to determine appropriate steps and policies and provide clarity to market participants. Seven of 14 proposals we reviewed—including proposed legislation—do not consider if and how they would affect other federal entities in the housing finance system, such as FHA and Ginnie Mae. The proposals that consider other federal entities include policies to help them manage the effects of reform and ensure agencies’ policies are consistent with overarching goals. For example, proposals that would expand Ginnie Mae’s guarantee to include the enterprises’ market also recommend that Ginnie Mae become an independent agency to better manage its expanded role. Another proposal with the broad goal of reducing the federal role in the mortgage market by terminating the enterprises also aims to manage fiscal exposure through FHA by increasing its capital reserve ratio from 2 to 4 percent. Finally, one proposal with a goal of promoting market liquidity recommends that FHA should become an independent agency to buttress its countercyclical role (that is, its ability to provide credit availability across market cycles). We previously reported that aligning policies and mechanisms with goals is a key element of housing finance reform, and that reform should have a comprehensive approach that considers all relevant entities. A comprehensive approach would help to promote consistency, transparency, and reduce unnecessary overlap and duplication between the enterprises and other federal entities. As of early January 2019, Congress had not enacted legislation with a system-wide approach to housing finance reform that considers the enterprises and other federal entities. The lack of a comprehensive approach in half of the proposals we reviewed highlights the need for policymakers to consider these key elements when reforming the housing finance system. Housing finance reform that does not consider all federal entities or participants may not account for how changes in the enterprises’ activities could affect risk exposure of other federal entities. For example, CBO reported that transitioning to a fully private market likely would lead to large increases in the volumes of loans insured by FHA. Industry experts with whom we spoke—including stakeholders from the primary and secondary markets, researchers, and former agency officials—also stated that any reforms to the enterprises must consider FHA too. Thus, considering the impacts of potential reforms on other federal entities would help ensure consistency and avoid unintended consequences. The enterprises have remained in conservatorship since 2008 (over 10 years), perpetuating uncertainty about their future and the federal role in the housing finance market. Determining those future roles and the enterprises’ structures has become both more urgent and more challenging as federal fiscal exposures have grown and new risks emerged in the housing finance markets (such as the growing role of nonbank lenders and servicers). Congress and industry stakeholders have introduced a number of proposals to reform the housing finance system, including addressing the prolonged conservatorship of the enterprises, but several proposals lack clearly defined and prioritized goals or do not consider all relevant federal entities in the housing finance system. By incorporating these key elements in future reform efforts, Congress could facilitate a more focused and comprehensive transition to a new housing finance system. Moreover, reform efforts that are both focused and comprehensive could allow market participants to confidently engage in long-term planning and help increase private-sector participation in the markets. Congress should consider legislation for the future federal role in housing finance that addresses the structure of the enterprises, establishes clear, specific, and prioritized goals and considers all relevant federal entities, such as FHA and Ginnie Mae. (Matter for Consideration 1) We provided a draft of this report to FHFA, Treasury, and HUD for review and comment. FHFA provided a technical comment that we incorporated. We also received technical comments from HUD and Treasury on sections of the draft report, which we incorporated as appropriate. Further comments on the full draft report from HUD and Treasury were not available due to the partial government shutdown. We are sending copies of this report to the appropriate congressional committees and FHFA, Treasury, and HUD. This report will also be available at no charge on our website at http://www.gao.gov. Should you or your staff have questions concerning this report, please contact me at (202) 512-8678 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. Our objectives in this report were to examine (1) recent developments in the housing and financial markets that could affect the safety and soundness of Fannie Mae and Freddie Mac, two government-sponsored enterprises (enterprises); (2) risks and challenges that the ongoing conservatorships pose to the status and operations of the enterprises and other aspects of the housing finance system, and (3) housing finance reform options that have been proposed and their relative strengths and limitations. To examine trends in the housing market and assess related risks, we reviewed and analyzed data that we considered relevant to various aspects of risk and developments in the housing market. Specifically, we reviewed and analyzed: house prices from the Federal Housing Finance Agency (FHFA) and Standard and Poor’s (a financial services company); mortgage delinquency rates from FHFA; the Board of Governors of the Federal Reserve System (Federal Reserve); the Bureau of Consumer Financial Protection, also known as the Consumer Financial Protection Bureau (CFPB); and Inside Mortgage Finance (a housing market data provider); mortgage origination and securitization data from Inside Mortgage Finance, FHFA, the Mortgage Bankers Association, and the Securities Industry and Financial Markets Association; and measures of underwriting standards from Fannie Mae, Freddie Mac, the Department of Housing and Urban Development (HUD), and the Senior Loan Officer Opinion Survey on Bank Lending Practices (conducted by the Federal Reserve). We adjusted house prices for inflation using the Bureau of Labor Statistics’ Consumer Price Index and mortgage origination and securitization volume using the Bureau of Economic Analysis’s Implicit Price Deflator for gross domestic product to make dollar amounts reflective of real 2017 dollars. To further inform our assessment of these developments and risks, we reviewed prior GAO work on these issues. Specifically, we reviewed prior GAO work that identified and analyzed key national housing market indicators, including house prices and loan performance, since the 2007– 2009 financial crisis. To examine risks and challenges that conservatorship poses to the status of the enterprises and other aspects of the housing finance system, we reviewed FHFA reports and Fannie Mae and Freddie Mac financial statements. Specifically, we reviewed progress reports and program updates from FHFA regarding its credit risk transfer and foreclosure prevention actions, and reviewed FHFA’s scorecard progress and other FHFA reports (such as the 2017 Report to Congress), strategic plans, and FHFA Office of Inspector General reports. For financial information on Fannie Mae and Freddie Mac, we reviewed filings with the Securities and Exchange Commission, quarterly financial supplements, and reports from credit rating agencies. We also reviewed selected academic literature that reported on risks and challenges identified in these sources and the potential effectiveness of risk-mitigation efforts. We also reviewed our prior work on the enterprises’ instability during the financial crisis. We took a number of steps to assess the reliability of the data, including interviewing agency officials; corroborating trends across data from multiple sources that we analyzed for these two objectives; reviewing related documentation; and reviewing relevant, prior GAO work. We used data that had been collected for prior GAO reports and reviewed the data reliability assessments that had been completed for those reports to determine if the data were reliable for our purposes. Based on these actions, we determined the data were sufficiently reliable to report on recent trends in the housing market and developments under the conservatorships of the enterprises. To address our third objective, we reviewed 14 proposals proposed by Congress, federal agencies, industry groups, or think tanks for reforming the single-family housing finance system. We selected proposals for review based on the following criteria: Time frame: We selected proposals that were released from 2014 through 2018. Source of proposal: We selected proposals from the following sources: (1) Congress (either proposed legislation or discussion drafts by members), (2) federal agencies, and (3) industry groups or think tanks (limited to those that were discussed in congressional hearings). We excluded some proposed legislation that only would modify certain aspects of the conservatorships of the enterprises and did not contain broader reforms. For example, three proposed legislative acts would have amended the terms of the senior preferred stock purchase agreements but did not address other aspects of housing finance and thus we excluded them from our review. We also excluded documents that outlined principles and objectives for reform but did not include specific policies, such as reform principles documents that some industry and advocacy groups released. We used elements of GAO’s framework for assessing potential changes to the housing finance system to analyze the content and assess the potential strengths and limitations of the reform proposals. For each element, we defined a series of responses to determine if the proposal fully, partially, or did not meet the element and provided examples of relevant policies for each element. Generally, a proposal fully met an element if it described specific policies and programs relevant to that element, partially met an element if it the element was addressed but the proposal did not describe specific policies or programs relevant to it, or did not meet an element if it did not address it at all. We also gathered descriptive information on the policies and programs on which the proposals relied. We used the information we collected from the proposals to determine the potential strengths and limitations of the proposals. We generally considered a proposal’s strengths to be the elements it fully met and its limitations to be elements that were partially met or not met. We did not make an individual, overall determination about each proposal, but instead examined whether each proposal fully considered key elements of housing finance reform. For example, a proposal could have useful ideas for reform but had yet to consider some key elements. Using this information, we used the number of proposals that fully met each element to determine which elements were most frequently met. We noted which elements were met least often to determine the gaps in the reform proposals as a whole. We also grouped the individual proposals into the different reform models. We determined the main reform models and their potential strengths and weaknesses based on our review of the proposals, prior GAO reports, Congressional Budget Office reports, industry stakeholder reports, and information we obtained during panels and interviews we conducted. To address all three objectives, we convened four, 2-hour panels of experts and stakeholders representing (1) mortgage originators and insurers, (2) securitizers and investors, (3) consumer and affordable housing advocates, and (4) researchers. We selected the experts and stakeholders based on the extent to which they developed reform proposals, testified before Congress on housing finance reform, or had participated in prior GAO studies of housing finance issues. Each panel had from three to five participants. In cases in which key experts or stakeholders could not attend our discussion panels, we interviewed them separately. We also interviewed officials at FHFA, HUD, and the Department of the Treasury. We conducted this performance audit from March 2018 to January 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. For this report, we reviewed the following housing finance reform proposals released between 2014 and September 2018 (see appendix I for more information about how we selected the proposals): Bipartisan Housing Finance Reform Act of 2018 (discussion draft). Released by House Financial Services Chairman Jeb Hensarling, Representative John Delaney, and Representative Jim Hines on September 6, 2018. Housing Finance Reform and Taxpayer Protection Act of 2014 (S. 1217). Released by Senate Banking Committee Chairman Tim Johnson and Ranking Member Michael Crapo on March 16, 2014. Housing Opportunities Move the Economy (HOME) Forward Act of 2014 (discussion draft). Released by House Financial Services Committee Ranking Member Maxine Waters on March 27, 2014. Mortgage Finance Act of 2015 (S. 495). Introduced by Sen. Johnny Isakson on February 12, 2015. Partnership to Strengthen Homeownership Act of 2014 (H.R. 5055). Introduced by Representative John Delaney on July 10, 2014. Protecting American Taxpayers and Homeowners Act of 2018 (H.R. 6746). Introduced by House Financial Services Chairman Jeb Hensarling on September 7, 2018 (originally introduced on July 22, 2013). Bright, Michael, and Ed DeMarco. Toward a New Secondary Mortgage Market. Washington, D.C.: Milken Institute, September 2016. Federal Housing Finance Agency. Perspectives on Housing Finance Reform. Washington, D.C.: January 2018. Independent Community Bankers of America. ICBA Principles for GSE Reform and a Way Forward. Washington, D.C.: 2017. Moelis & Company LLC. Blueprint for Restoring Safety and Soundness to the GSEs. June 2017. Mortgage Bankers Association. GSE Reform: Creating a Sustainable, More Vibrant Secondary Market. Washington, D.C.: April 2017. National Association of Home Builders. Why Housing Matters: A Comprehensive Framework for Reforming the Housing Finance System. Washington, D.C.: September 2015. Office of Management and Budget. Delivering Government Solutions in the 21st Century: Reform Plan and Reorganization Recommendations. Washington, D.C.: June 2018. Parrott, Jim, Lewis Ranieri, Gene Spalding, Mark Zandi, and Barry Zigas. A More Promising Road to GSE Reform. Washington, D.C.: Urban Institute, March 2016. In addition to the contact named above, Karen Tremba (Assistant Director), Tarek Mahmassani (Analyst in Charge), Miranda Berry, M’Baye Diagne, Michael Hoffman, Risto Laboski, Melanie Magnotto, Marc Molino, Matthew Rabe, Barbara Roesmann, Jessica Sandler, and Andrew Stavisky made significant contributions to this report.", "summary": "Since 2008, the federal government has greatly increased its role in financially supporting housing markets. In September 2008, FHFA placed Fannie Mae and Freddie Mac under conservatorship, which created an explicit fiscal exposure for the federal government. As of October 2018, the dollar amounts of their outstanding MBS have grown by more than $800 billion since the end of 2008. Since 2013, GAO has designated the federal role in housing finance as a high-risk area. GAO examines (1) recent housing market developments, (2) risks and challenges posed by the current federal role, including ongoing conservatorship, and (3) housing finance reform proposals and their strengths and limitations. To address these issues, GAO reviewed housing finance data; FHFA and enterprise reports; and 14 housing finance reform proposals introduced in Congress or proposed by industry stakeholders since 2014. GAO also convened panels with housing finance experts and stakeholders (including consumer advocates, mortgage originators, insurers, and investors), who developed reform proposals, testified before Congress, or participated in prior GAO studies. Federal support of the housing finance market remains significant even though the market has largely recovered since the 2007–2009 financial crisis. While down from the peak in 2009, in 2017, the federal government directly or indirectly guaranteed about 70 percent of single-family mortgage originations. The Federal National Mortgage Association (Fannie Mae) and the Federal Home Loan Mortgage Corporation (Freddie Mac)—two government-sponsored enterprises (enterprises) that purchase and securitize mortgages into mortgage-backed securities (MBS)—securitized and guaranteed about 46 percent of mortgage originations in 2017. In 2017, federal programs, such as those offered by the Federal Housing Administration (FHA), insured about 25 percent of mortgage originations. Together, the enterprises and the Government National Mortgage Association (Ginnie Mae)—a federally owned corporation that guarantees MBS backed by federally insured mortgages—have issued or guaranteed 95 percent or more of all MBS issued annually since 2008 (see figure). However, recent market trends pose risks to these entities and the housing finance system. For example, mortgage lending standards have loosened slightly in recent years, which could increase the risk of borrower default—especially in a recession or downturn in the housing market—and losses to federal entities. Nonbanks have increased their presence in mortgage lending and servicing, which involves collecting monthly mortgage payments, among other duties. For instance, the share of nonbank originations of FHA-insured mortgages increased from 56 percent in fiscal year 2010 to 86 percent in 2017. The share of nonbank servicers of mortgages in enterprise MBS also grew from 25 percent in 2014 to 38 percent as of the third quarter of 2018. While nonbank lenders and servicers have helped provide access to mortgage credit, they are not subject to federal safety and soundness regulations. The Federal Housing Finance Agency (FHFA) has taken actions to lessen some of Fannie Mae and Freddie Mac's risk exposure. For example, under FHFA's direction, the enterprises have reduced the size of their riskier retained mortgage portfolios which hold assets that expose them to considerable interest rate and other risks from a combined $1.6 trillion in 2008 to $484 billion in 2017. Since 2013, the enterprises also have transferred increasing amounts of risk on their guaranteed MBS to private investors and insurers through credit risk transfer programs. However, federal fiscal exposure remains significant. The Department of the Treasury's remaining funding commitment through the senior preferred stock purchase agreements—which provide financial support to the enterprises—leaves taxpayers exposed to risk, especially in the event of adverse market or other conditions and given the recent growth in the enterprises' guarantee business. The value of outstanding MBS on which the enterprises guarantee principal and interest payments to investors grew from about $2.1 trillion in 2003 to about $4.8 trillion in 2017. The long duration of the conservatorships also raises uncertainty among market participants. Several experts and stakeholders GAO interviewed said that they have hesitated to make longer-term strategic plans and goals due to potential housing finance reforms that could markedly affect their industries. The figure below shows 2003–2017 trends in the enterprises' guarantee business and retained mortgage portfolios. GAO reviewed 14 housing finance reform proposals from Congress, agencies, industry groups, and think tanks. The proposals generally fit into four different models: reconstituted enterprises, a multiple guarantor system with an explicit federal guarantee, a government corporation, and a completely privatized market without an explicit federal guarantee. The 14 proposals generally meet key elements of GAO's framework for assessing potential changes to the housing finance system, such as addressing fiscal exposure, protecting investors, and considering the implications of the transition to a new system. However, many proposals lack clearly defined and prioritized goals or do not address the role of other federal entities in the housing finance system, such as FHA and Ginnie Mae—two key elements in GAO's framework. By incorporating these elements, policymakers could facilitate a more focused and comprehensive transition to a new housing finance system and provide greater certainty to market participants. Congress should consider legislation for the future federal role in housing finance that addresses the structure of the enterprises, establishes clear and prioritized goals, and considers all relevant federal entities, such as FHA and Ginnie Mae.", "document_type": "gao"}
{"report": "Many older Americans are retired and rely on different parts of the U.S. retirement system for their financial security. The U.S. retirement system is often described as being composed of Social Security, employer- sponsored pensions and retirement savings plans, and individual savings. In addition, older Americans may work past traditional retirement ages or phase into retirement. Social Security’s Old-Age and Survivors Insurance program is the foundation of the U.S. retirement system and provides benefits to retired workers, their families, and survivors of deceased workers. In 2018, about 53 million retirees and their families received $844.9 billion in Social Security retirement benefits, according to the Social Security Administration. However, Social Security is facing financial difficulties that, if not addressed, will affect its long-term stability. If no changes are made, current projections indicate that by 2034, the retirement program Trust Fund will only be sufficient to pay 77 percent of scheduled benefits. Employer-sponsored pensions include DB plans, which generally promise to offer a monthly payment to retirees for life. Employers also sponsor defined contribution (DC) plans, such as 401(k)s, in which individuals accumulate tax-advantaged retirement savings in an individual account based on employee and/or employer contributions, and the investment returns (gains and losses) earned on the account. Participants in both DB and DC plans receive certain tax preferences provided the plans comply with requirements outlined in the Internal Revenue Code (IRC). For fiscal year 2018, estimated tax expenditures related to retirement plans and savings amounted to about $188 billion. The Employee Retirement Income Security Act of 1974 (ERISA) outlines minimum standards and requirements that must be met by most private sector employer- sponsored retirement plans; it does not, however, require any employer to establish, or continue to maintain, a retirement plan. Assets rolled over from employer-sponsored DC plans when individuals change jobs or retire are the primary source of funding for individual retirement accounts (IRAs). Over the past 40 years, private sector employers have increasingly moved from offering DB plans to offering DC plans. While DC plans offer more portability, some financial risks—such as poor investment returns, decreases in interest rates, and increases in longevity—have shifted from the employer to the employee, with important implications for individuals’ retirement planning and security. Individual savings are any other non-retirement plan savings and investments. Home equity is an important asset for many households. Other sources of savings or wealth may include amounts saved from income or wages, contributions to accounts outside of a retirement plan, non-retirement financial wealth that is inherited or accumulated over time, and equity from other tangible assets such as vehicles. Wealth: For analyses in this report, we defined wealth as net worth, i.e., assets minus debt. Assets could be financial (e.g., savings accounts, stocks, bonds, retirement accounts) or nonfinancial (e.g., the value of any houses or vehicles). Retirement accounts include defined contribution plans, such as a 401(k), or individual retirement account (IRA)s. Net worth is a measure often used by researchers studying retirement security. Present value of future income from Social Security and defined benefit pensions: Older Americans may also have other future retirement resources, not included in net worth, such as the present value of benefits expected from defined benefit (DB) pension plans and Social Security. These present value estimates could be included in a broader definition of economic resources or wealth, and we were able to produce estimates of these additional retirement resources to supplement our analysis of the distribution of income and wealth among older Americans over time. While all estimates produced using survey data are subject to some uncertainty, our present value estimates for these additional retirement resources are also subject to additional uncertainty that arises from using another data source—the Financial Accounts of the United States—to create a measure of aggregate defined benefit entitlements; having limited information about lifetime earnings in the Survey of Consumer Finances; and making assumptions about life expectancy, real discount rates, and retirement ages, which are unlikely to hold for all households. Data limitations prevented us from producing this broader measure of retirement resources for our analysis examining the distributions of income and wealth as a cohort of older Americans aged. Income: For analyses in this report, we defined household income as the sum of income across all sources, including wages and salaries, Social Security benefits, traditional pension benefits from defined benefit plans, withdrawals from retirement accounts, and income from any other sources, such as interest on financial assets or benefits from social safety net programs such as the Supplemental Nutrition Assistance Program (SNAP). See appendix I for more information on our definitions and the methods used to produce estimates of wealth, the present value of future income expected from Social Security and defined benefit plans, and income. Older Americans may also have wages or salaries from working longer as they transition to retirement. According to data from the Bureau of Labor Statistics, more older Americans are working. From 1989—the earliest starting year for our analyses—to 2018, the labor force participation rate for Americans aged 55 or older increased from 30 percent to 40 percent. In addition, some older Americans may receive income from financial assets, such as interest or dividends, and from other benefit programs, such as Social Security Disability Insurance. The number of older Americans is increasing faster than the population as a whole. In 1990, about 52 million, or around 1 in 5, people in the United States were aged 55 or older. By 2030, that number is expected to be about 112 million, or around 1 in 3. The aging of the baby boomers— that is, people born between 1946 and 1964—as well as increasing longevity and lower fertility have contributed to this trend. The oldest baby boomers turned 55 in 2001 and the youngest are turning 55 this year. In addition, average life expectancy for those ages 65 or older has increased significantly over the past century and is projected to continue to increase. For example, a man turning 65 in 2030 is expected to live, on average, to age 85.0, an additional 5.3 years compared to a man who turned 65 in 1980, who was expected to live, on average, to age 79.7. A woman turning 65 in 2030 is expected to live, on average, to age 87.3, an additional 3.5 years compared to a woman who turned 65 in 1980, who was expected to live, on average to age 83.8. Since life expectancies are averages—some individuals will live well beyond their life expectancy— longer life expectancies, combined with the possibility of living well beyond life expectancy, mean that people must now prepare for the potential for more years in retirement with greater risk of outliving their savings. Disparities in income and wealth among older households have become greater over the past 3 decades, according to our analysis of 1989 to 2016 data from the SCF. For our analysis, we divided older households in the data into five groups, or quintiles, based on income or wealth. Each year of data in our analysis used a different set of households. Therefore, each quintile includes different sets of households over time. In other words, the households in the top 20 percent in 1989 are not the same households as those in the top 20 percent in 2016. While the households included in the SCF are different for each year of data we used in our analysis, we were able to examine how the distribution of income and wealth across older households changed over time. We found mostly higher income and wealth across all quintiles over time, disproportionately so for the top quintile. For example, we estimated that average income of households in the top 20 percent in 1989 was about $242,000. In 2016, estimated average income of households in the top 20 percent was about $398,000, which is about 64 percent higher (see fig 1). In comparison, estimated average income of households in the bottom quintile—bottom 20 percent—was about $9,000 in 1989. In 2016, estimated average income of households in the bottom 20 percent was about $14,000, which is about 55 percent higher. We found similar results when we analyzed changes in median income. Our findings were similar when we analyzed changes in wealth (defined as net worth). Estimated average wealth of households in the top 20 percent was about $2.1 million in 1989. In 2016, estimated average wealth of households in the top 20 percent was about $4.6 million, which is more than twice as high. (See fig. 2.) In comparison, average wealth of households in the bottom 20 percent was similar over time from 1989 to 2013. In fact, in both 2010 and 2013, estimated average wealth of households that were in the bottom 20 percent in either of those years was negative, meaning that those households, on average, had more debt than assets. (See text box for discussion of how recessions during the time period of our analysis could affect retirement security.) Within the top quintile, a disproportionate share of income and wealth is held by the top 1 percent compared to the next 19 percent. (See figs. 3 and 4 for average income and wealth of households in the top 1 percent.) For example, we found households in the top 1 percent in 1989 had estimated average wealth that was about $13 million more than estimated average wealth for households in the next 19 percent (about 10 times as much estimated average wealth). By 2016, households in the top 1 percent had about $34 million more in estimated average wealth compared to households in the next 19 percent (about 13 times as much estimated average wealth). Social Security is the foundation of retirement security in the United States, and along with income from traditional DB pensions, can be particularly important for older households with lower wealth. As discussed in the text box above, some older Americans will expect future income from Social Security, DB pensions or both. We analyzed the present value of these sources for two subsets of older Americans: 1) those who expect future income from Social Security but not DB pensions, and 2) those who expect future income from both Social Security and DB pensions. On average, households with lower wealth, and that expect future income from Social Security but not DB pensions, may receive a significant income stream from future Social Security benefits, according to our analysis of SCF data (see fig. 5). The bottom 20 percent have little in wealth, on average, but the estimated present value of future Social Security benefits provides them relatively significant financial security in retirement. On the other hand, for the top two quintiles, wealth was the most important retirement resource, as households in the top quintile have wealth that, on average, far exceeds the estimated present value of benefits provided by any future Social Security or pension benefits. We found similar results for households with lower wealth and that expect future income from Social Security and DB pensions. While the lower quintiles may have little in wealth, on average, they may expect to receive a significant income stream from future Social Security and DB pension benefits (see fig. 6). Wealth was the most important financial retirement resource for the top two quintiles, on average. While disparities remain, the present value of future income expected from Social Security and DB pensions mitigate these disparities to some extent for those households that expected such income, as illustrated by the examples below. Estimates for all older households in 2016 that expect future income from Social Security but not DB pensions: Households in the top quintile had, on average, about $6.1 million in assets, about 272 times as much as the bottom quintile, which had estimated assets of, on average, about $22,000. When looking at a broader definition of retirement resources (assets plus the present value of future income from Social Security), we estimated that the top quintile had, on average, $6.6 million in these resources, about 27 times as much as the bottom quintile, which had, on average, about $241,000. Estimates for all older households in 2016 that expect future income from Social Security and DB pensions: Households in the top quintile had, on average, about $3.2 million in assets, about 61 times as much in assets as the bottom quintile, which had estimated assets of, on average, about $52,000. When looking at a broader definition of retirement resources (assets plus the present value of future income from Social Security and DB pensions), we estimated that the top quintile had, on average, about $4.3 million in these resources, about 8 times as much as the bottom quintile, which had, on average, about $535,000. Recent research has theorized that benefits expected from Social Security “ a long way” to explaining why having little in DC accounts and future income expected from pensions does not necessarily translate into dramatic changes to living standards as people retire. In particular, the progressivity of Social Security, meaning Social Security benefits replace a higher percentage of pre-retirement earnings for lower-earning households, could be helpful for these households, especially in the absence of other resources, such as retirement accounts. Income and wealth were consistently lower over time for older households headed by someone who was a racial minority, single, or hadn’t attended college, according to our analysis of 1989 through 2016 SCF data. (See fig. 7 for an example using the middle quintile.) We found these disparities existed across all quintiles and all years (see fig. 8 for another example, this time using the top quintile). Generally, the largest disparities from 1989 to 2016 were between 1) households in which the head had not attended college and households in which they had and 2) coupled households and single women. These results are consistent with our prior work, which found that women age 65 and older had less retirement income, on average, and live in higher rates of poverty than men in that age group. Disparities were also sizeable for households headed by someone who was white and non-Hispanic compared to those headed by a minority. There are multiple reasons why households headed by someone with at least some college education may have more wealth in retirement. Most notably, those with more education may have access to higher-paying jobs and be able to save more. Our review of the literature identified several other theories to explain this association. These include (1) education increases awareness about the need to save, (2) highly- educated individuals may have more financial education and achieve higher rates of return on savings, (3) those with more education may be willing to work longer, and (4) highly-educated individuals may have wealthier parents and thus may have received larger bequests. Our prior work has explored how recent trends in marital patterns and saving for retirement, among other factors, can negatively affect retirement security for minorities, women, or those who are single. The percentage of households with retirement accounts was higher across all wealth quintiles in 2016 compared to 1989, and it was disproportionately higher for the top quintile, according to our analysis of SCF data. In 1989, the percentage of households with retirement accounts—amounts in DC plans and IRAs—ranged from 4 percent of the bottom quintile to 65 percent of the top quintile (see fig. 9). By 2016, 11 percent of households in the bottom quintile had retirement accounts compared to 86 percent of households in the top quintile. These increases reflect the transition to more employers offering DC plans, among other factors. Further, the percentage of households in the bottom quintile with retirement accounts had not returned to its pre- recession rate. As discussed earlier, households with less wealth may be more reliant on income from Social Security and DB plans. Further, we found the amount in retirement accounts was often low, particularly for the lower quintiles. In 2016, 89 percent of the households in the bottom quintile had no retirement accounts, and another 10 percent had account balances of less than $50,000 (see fig. 10). In comparison, over half the households in the middle quintile had retirement accounts, and almost all of these households had less than $200,000 in their accounts. Older Americans may rely on resources other than those discussed above for financial security in retirement (see fig. 11), and these “non- retirement assets” remained important over the time span of our analysis, regardless of their value relative to retirement account balances or the present value of future income from Social Security or DB pensions. Home equity. We estimated that over 80 percent of households in each of the top four quintiles of the wealth distribution owned a home in each year of our analysis. However, the home ownership rate for households in the bottom quintile in each year of our analysis was consistently much lower than for the other quintiles–ranging between 18 and 32 percent. Further, the home ownership rate for households in the bottom 20 percent in 2016 (19 percent) was significantly lower than the home ownership rate for households in the bottom 20 percent in 2007 (28 percent), the starting year for the most recent recession. In 2016, the estimated average amount of home equity of households in the bottom quintile was about $2,000, and $50,000 for the second-from-the-bottom quintile, compared to about $118,000 for the middle quintile, about $208,000 for the fourth (or second-from-the- top) quintile, and about $559,000 for the top quintile. According to researchers, most households appear to treat a house as a source of reserve wealth that can be tapped in the event of a substantial expense, further pointing to the importance of home ownership for many older Americans. Vehicles. A majority of households in each quintile of the wealth distribution owned a vehicle across all years in our analysis, although the bottom quintile had ownership rates that were disproportionately lower. However, despite this, we estimated that vehicles provided higher value, on average, relative to other non-retirement assets for households in the bottom quintile from 2010 onward. For example, in 2016, the estimated average value of vehicles among households in the bottom quintile was about $7,000 in 2016, compared to estimated average values of less than $2,000 in home equity and about $3,000 in all other non-retirement assets. All-other non-retirement assets. For the top quintile of households, the average value of these “other assets”—which included stocks, bonds, and other savings outside of retirement accounts, among other things—was more than average home equity or the average value of vehicles over the period of our analysis. Estimated average wealth in this other assets category was about $3.3 million in 2016 for the top quintile. Individual income sources and debt were also important factors in older households’ financial security. Researchers have examined the importance of income sources for households and found Social Security is more important for households with lower incomes, while older households with the most income tend to have a diverse range of income sources, such as earnings from financial assets and income from DB plans. We found that debt could have a substantial effect on households’ financial security, particularly for the bottom 20 percent. For example, in 2010 and 2013, average net worth for this group was negative because debt was greater than assets. A substantial number of older Americans born from 1931 through 1941 lived into at least their 70s or early 80s, according to our analysis of data on a cohort of people born in these years. (See text box and app. I for more on how we analyzed Health and Retirement Study (HRS) data on this cohort.) However, this same cohort faced disparities in longevity. Further, our analysis, as well as that of other researchers, found income and wealth each have strong associations with longevity, as do certain demographic characteristics, such as gender and race. However, even among those with multiple factors associated with a shorter life, such as having lower mid-career earnings and not having attended college, a significant proportion from our cohort were alive in 2014, when they were in their 70s or early 80s. Taken all together, individuals may live a long time, even individuals with factors associated with lower longevity, such as low income or education. Those who live a long time and have little or nothing in DC account balances or pension benefits may have to rely primarily on Social Security or safety net programs. Analyzing Income, Wealth and Longevity We examined the association of income and wealth with longevity in a nationally representative sample of Americans born from 1931 through 1941. Throughout this analysis, our references to “older Americans” and “households” apply to that specific subset of older Americans born from 1931 through 1941 and their households. The Health and Retirement Study (HRS) began in 1992 and first surveyed these individuals when they were 51 to 61 years old. The same individuals have been re-interviewed every 2 years since, provided they continued to participate in the survey, and the most recent complete data is from 2014, when those who were still alive were 73 to 83 years old. We were able to measure deaths over a period of 22 years (1992 through 2014). Every 2 years, the HRS attempted to measure whether the original respondents were still alive, but these longevity data were incomplete because some of the original respondents declined to participate in later waves of the survey. Once these respondents left the survey, their actual longevity could not be followed. Therefore, we used survival analysis to estimate the proportion of individuals in the1992 sample alive in 2014. Survival analysis accounts for survey respondents with complete or incomplete longevity data and allowed us to estimate the chance of death by any given time in the observation period. Most importantly, our analysis assumed actual longevity from 1992 to 2014 of the individuals in our analysis did not have a systematic relationship with whether the original HRS respondents continued to participate in the study except that leaving the study implied a later death. We believe this assumption to be reasonable for the purpose of our analysis for two reasons. First, a small percentage (8 percent) of the original respondents dropped out of the survey, so that the impact of any longevity differences among the population who dropped out would likely have been small. Second, while some baseline characteristics of respondents do appear correlated with non-response over time, the population that dropped out of the study does not appear to vary significantly from those completing each wave, except for race and ethnicity. We conducted this analysis, at the individual level, for HRS respondents in 1992, and any spouses or partners also born in 1931 through 1941. Additional details and caveats to this analysis are available in appendix I. We broke the sample into quintiles based on their income or wealth. To determine an individual’s place in the income distribution, we measured mid-career household earnings using administrative records from the Social Security Administration that are linked to the HRS data. Specifically, we defined mid-career household earnings based on average annual earnings reported to the Social Security Administration for years when the survey respondent we identified as the household head was ages 41 to 50 as well as the earnings of their spouse or partner during those years if the respondent was part of a couple in 1992. This measure of earnings provides a relatively stable indicator of the household’s labor market experience, compared to using a single year of earnings, which could be unusually high or low. For wealth, we used the household’s initial net worth in 1992, including any balances in defined contribution accounts or individual retirement accounts, but excluding second homes, which HRS did not consistently capture in all years. In both instances, the sample was broken into quintiles. For additional details on our methodology, see appendix I. Overall, an estimated 63 percent of the individuals in our sample were alive in 2014 (ages 73 to 83), and greater levels of income and wealth were associated with greater longevity in our analysis of HRS data. For income, an estimated 52 percent of individuals from households in the bottom quintile of the mid-career earnings distribution were alive in 2014, compared to an estimated 74 percent of individuals from households in the top quintile. (See fig. 12.) The percentages by wealth quintile were similar. Other researchers have similarly found that greater levels of income and wealth are associated with greater longevity. For example, a researcher at the Social Security Administration has established that men with higher earnings had seen greater gains in longevity than those with lower earnings. Understanding the association among income, wealth, and longevity is complicated because of relationships among the characteristics, as well as their relationships with demographic characteristics (see text box). Besides income and wealth, several demographic characteristics were also associated with longevity in our analysis of HRS data, and these relationships have also been noted in other researchers’ studies. Women tended to live longer than men: Women had greater longevity through 2014, with an estimated 69 percent living to at least ages 73 to 83 compared to an estimated 58 percent of men. Non-Hispanic whites and Hispanics tended to live longer than blacks: For Hispanics, an estimated 68 percent lived to at least 2014, as did an estimated 65 percent of non-Hispanic whites, compared to an estimated 52 percent of non-Hispanic blacks. More educated individuals tended to live longer than those with less education: An estimated 75 percent of college graduates lived to at least 2014, compared to an estimated 65 percent of those who graduated from high school and an estimated 50 percent of those with less than a high school diploma or GED. Individuals who self-reported being in good health tended to live longer than those who reported being less healthy: Among those who self-reported being in excellent health in 1992, an estimated 78 percent lived to at least 2014, compared to an estimated 31 percent of those who reported being in poor health. Income, Wealth, and Demographics Are Interrelated The relationships of income, wealth, and demographics with longevity are complex because of interactions among these characteristics themselves, which make it difficult to determine the direction or extent of causality. For example, there are many potential interactions among educational status, income, and wealth. Higher levels of education could provide access to better job opportunities, increasing income. Education could contribute to greater financial literacy and better financial decision making, increasing wealth. Having access to wealth could make it easier to attain additional education. While income, wealth, and education all are associated with longevity, it is difficult to interpret their individual associations with longevity because of their possible interactions with each other. We estimated that individuals whose households were in the top two quintiles (top 40 percent) of the mid-career earnings distribution were more likely than their counterparts in the bottom 60 percent to be alive in 2014 (ages 73 to 83) in an analysis controlling for race and ethnicity, gender, age, education level, and initial self-reported health status on entry into HRS in 1992. In a similar analysis, we found that individuals from households in the top quintile (top 20 percent) of wealth in 1992 were more likely to be alive than their counterparts in the bottom four quintiles. Our findings are consistent with the work of other researchers who also controlled for such factors. However, such observational studies are only able to demonstrate that a statistical association exists between two characteristics. For example, one study that found a strong association between income and life expectancy specifically notes that unmeasured factors likely affect the association. Similarly, we cannot determine from our analysis the extent to which income or wealth causes differences in longevity. Even among individuals with characteristics associated with decreased longevity, a substantial proportion of older Americans lived at least into their 70s or early 80s, according to our analysis of 1992 to 2014 HRS data. For example, we constructed three scenarios to illustrate how longevity varies for those with different mid-career earnings and education. Among those in the “bottom” scenario–those individuals who had no college education and were from households in the bottom 20 percent of the earnings distribution–an estimated 50 percent were still alive in 2014 (see fig. 13). We estimated that the corresponding percentages for our “middle” scenario and “top” scenario were 65 percent and 80 percent, respectively, of individuals still alive in 2014. Thus, even among those with education and earnings associated with lower longevity, a significant proportion, 50 percent, were still alive in 2014, and these individuals will need to provide for themselves through their remaining years. We also analyzed a subset of our bottom scenario that included those who had no college education and were from households in the bottom 20 percent of the earnings distribution and whose self- reported health status was fair or poor. While the percentage of the individuals who survived was lower, an estimated 39 percent were alive in 2014, which is a substantial proportion. Most individuals have the potential for an unexpectedly long life, including individuals with demographic characteristics associated with lower longevity, income or wealth. In addition, individuals may face major expenses as they age. For example, several experts we spoke with noted that health care costs can pose a particular challenge at older ages. Taken all together, individuals may live a long time and face financial challenges in their later years, including those with less income and wealth. For example, of the individuals in the bottom group of our scenarios illustrating the effects of earnings and education on longevity, an estimated 50 percent were still alive in 2014. Should these individuals not have DC accounts or have little in them, or should they have little to no DB pension benefits, they may have to rely primarily on Social Security (which itself faces financing difficulties) or safety net programs. Using HRS data and following the same households over time, we examined how income and wealth distributions changed and found that, in general, disparities in income decreased while disparities in wealth persisted among a cohort of older Americans as they aged (see text box for more information on our analysis). Households with the top 20 percent of mid-career earnings saw larger drops in income than households in other mid-career earnings groups, decreasing income disparities overall. During the same time period, the amount of wealth held by most households remained steady and wealth disparities persisted. We also found important differences in the distribution of income and wealth among households by race and ethnicity and education level. Analyzing Income and Wealth for Households Over Time We analyzed Health and Retirement Study (HRS) data to estimate how income and wealth distributions changed as a particular cohort of older Americans aged over time. We analyzed income, wealth, and select financial resources for the same group of survey respondents (heads of households) or their spouses or partners who responded to the survey in 1992 and were still alive and responded in 2014, which is the most recent year for which the data are complete. We defined wealth as net worth. Data limitations prevented us from producing estimates of the present value of future income expected from Social Security or defined benefit pensions. The heads of households we analyzed were from the original HRS cohort and were born in 1931 to 1941. If neither the head of household or the spouse or partner interviewed in 1992 was still alive in 2014, their household was not included in our sample. As a nationally representative longitudinal survey, the HRS allows us to follow the same set of Americans from their 50s through the remainder of their lives; these household heads or their spouses or partners had reached their 70s or early 80s by 2014, allowing us to estimate how income and assets changed for the households as they progressed through retirement. We are reporting medians, as our analysis indicated that means were not consistently reliable. Appendix VI contains additional figures examining how assets and income changed for households headed by individuals in HRS’ “War Babies” cohort, who were born from 1942 through 1947. For our analysis, we divided older households in the data into five equally sized quintiles, or earnings groups, based on the number of households and their mid-career household earnings. We defined mid-career household earnings based on earnings reported to the Social Security Administration for years when the survey respondents were ages 41 through 50, as well the earnings of their spouses or partners during those years if the respondents were part of a couple in 1992. For more on our analysis, see appendix I. As described in the textbox above, our analysis included households in which either the head of the household or their spouse or partner were still alive in 2014, and table 1 shows the race and ethnicity and education level of the household head, as well as the composition of the household. As discussed in the previous section, certain demographic characteristics, such as being a minority or being less educated, are associated with a shorter life. However, not everyone with these demographic characteristics will have a shorter life. As the table below shows, there are households in which the head had at least one of these characteristics and lived into his or her 70s or early 80s. We analyzed HRS data and found that household income declined as heads of households born from 1931 through 1941 and their spouses or partners aged, with decreased earnings from work contributing to the decline as people retired. Those households that had the highest mid- career earnings—those in the top earnings group—experienced the largest declines in income from 1992 when the heads of household were ages 51 to 61 to 2014 when the surviving heads of household or their spouses or partners were ages 73 to 83 (see fig. 14). For example, estimated median income for the top earnings group decreased by 53 percent, from about $121,000 in 1992 to about $57,000 in 2014. In comparison, for those with the lowest mid-career earnings—those in the bottom earnings group—estimated median income declined by 36 percent, from about $28,000 to about $18,000 over this same period. The decrease in income disparities may reflect the shift from work-related earnings to Social Security as the largest source of income for households in the top 20 percent, indicating the possible transition from working to retirement. More specifically, in 1992, 94 percent of households in the top mid-career earnings group had work-related earnings, which contributed the largest amount to their income. By 2014, only 25 percent of the top earnings group still had work-related earnings, and Social Security provided the highest median value of all income sources. Among households in the bottom mid-career earnings group, 68 percent had work-related earnings in 1992, and 15 percent continued to have work-related earnings in 2014. Similarly, work-related earnings provided the greatest source of income for these households in 1992, and Social Security provided the highest median value of all income sources for these households in 2014. However, concerns about retirement insecurity for those with lower earnings may remain. Social Security is progressive, meaning it replaces a higher percentage of income for those with lower earnings, but the formula for calculating Social Security benefits provides a higher benefit amount to those with higher lifetime earnings. In addition, those households with higher mid-career earnings maintained relatively higher income in retirement, perhaps due to their having higher levels of other types of non-wage income after retiring. For example, in 2014, a significantly greater percentage of households in the top two earnings groups had income from employer-sponsored retirement accounts compared to those in the bottom earnings groups, although households may not be consistent in how they spend down these funds. We analyzed HRS data from 1992 to 2014—when heads of households were in roughly their 50s to when they were in their 70s or early 80s—and found that for most households, the level of wealth was relatively consistent as they aged, and disparities in wealth persisted over time. As shown in figure 15, wealth remained relatively steady for households in the bottom three mid-career earnings groups over the time period we examined while households in the top two mid-career earnings groups experienced larger fluctuations in wealth. More specifically, households in the top two earnings groups saw their wealth increase overall from 1992 to 2014. However, while wealth increased from 1992 to 2006, this was followed by declines in wealth from 2006 to 2014. Looking at the overall time period of our analysis, wealth disparities persisted between households in the top earnings groups and households in the bottom earnings groups. For example, in 1992, households in the bottom 20 percent had estimated median wealth of about $93,000 while households in the top 20 percent had estimated median wealth of about $432,000, a difference of about $339,000 (or the top had about 4.6 times the median wealth of the bottom). In 2014, households in the bottom 20 percent had estimated median wealth of about $66,000 while households in the top 20 percent had estimated median wealth of about $539,000, a difference of about $473,000 (or the top had about 8.2 times the median wealth of the bottom). Other researchers have found that that some households may not spend down their wealth as much during retirement due to factors including a generally higher propensity to save, a desire to leave bequests, and the desire to self-insure against medical costs. Households in the top 20 percent of mid-career earnings had greater participation in retirement accounts (see sidebar) and increased home equity relative to other households, which may have contributed to wealth disparities over the time period of our analysis. Retirement Accounts. Among households that had retirement accounts, the median value of retirement accounts increased for all of our income groups (see fig. 16); however, the continued wealth disparities between higher- and lower-earning households may be due to significant differences in the value of retirement accounts and in household participation. The value of retirement accounts for households in the top and bottom earnings groups increased substantially between 1992 and 2014 (a 93 percent and 138 percent increase, respectively). Some of the increase in retirement account balances over time may be due to contributions to DC plans and IRAs during years in which individuals worked, as well as waiting until age 70 ½, when many individuals are required to take minimum distributions from their IRAs. Despite this potential for gains in account balances across the distribution, disparities still exist. In 2014, among households that had retirement accounts, we estimated that households in the top 20 percent had about three times more in their retirement accounts compared to households in the bottom 20 percent (about $176,000 compared to about $54,000). Higher-earning households may not spend down their retirement account balances as much in retirement whereas lower-earning households may have spent down all or part of their account balances. In addition to having more in their retirement accounts, a greater percentage of households in the top earnings group had retirement accounts compared to households in the bottom earnings group. For example, in 2014, an estimated 69 percent of households in the top 20 percent had retirement accounts compared to an estimated 19 percent of households in the bottom 20 percent. Home equity. From 1992 to 2014, home equity increased across all mid-career earnings groups for households with home equity; however, households in the top two earnings groups saw greater increases in the value of their home equity compared to households in the bottom two earnings groups (see fig. 17). Over this time period, a greater percentage of households in the top 20 percent had home equity compared to households in the bottom 20 percent. More specifically, from 1992 to 2014, the percentage of households in the bottom 20 percent with home equity ranged from an estimated 61 percent to 70 percent. For the top 20 percent, the percentage of households with home equity ranged from 88 to 94 percent. Despite the recession from 2007 to 2009, which may have caused home values to depreciate, median home equity for households in the top 20 percent that had home equity increased by an estimated 30 percent from 1992 to 2014. At the same time, median home equity for the bottom 20 percent of households with home equity increased by an estimated 14 percent, though this change was not statistically significant. One expert we interviewed also noted recent real estate appreciation as benefiting wealthier retirees. Significant differences in income and wealth associated with race and ethnicity, as well as education levels, continued as households aged, according to our analysis of heads of households and their spouses or partners as they aged from roughly their 50s to their 70s or early 80s using 1992 through 2014 HRS data. Non-Hispanic, white households in the bottom 40 percent of mid-career earnings had higher estimated median incomes, and non-Hispanic, white households across the mid-career earnings distribution generally had greater wealth, than minority households. In terms of income, the gap between non-minority and minority households in the bottom 40 percent persisted even as median income decreased overall for households as they aged. For example, we estimated that, in 1992, non-Hispanic, white households in the bottom 20 percent had about $20,000 more in income than minority households. The income disparity was smaller (about $9,700) in 2014, but still remained. In terms of wealth, non-Hispanic, white households had persistently higher wealth compared to minority households across all levels of the mid-career earnings distribution. For example, among the bottom 20 percent of households, in 1992, non-Hispanic, white households had about $138,000 more in estimated median wealth than minority households. While this difference decreased to about $119,000 in 2014, the wealth difference remained. Similarly, for the top 20 percent of households, in 1992, non-Hispanic, white households had about $170,000 more in estimated median wealth than minority households, and, in 2014, the wealth disparity increased to about $294,000. Households headed by someone with at least some college education generally had higher median incomes and more wealth than households headed by someone who did not attend college. Income disparities existed across the mid-career earnings distribution from 1992 to 2014. For example, we estimated that, in 1992, households in the top 20 percent with heads who attended college had about $44,000 more in income compared to households in the top 20 percent with heads who did not attend college. We estimated that, in 2014, households with heads in the top 20 percent who had attended college still had greater income, though the difference was smaller (about $25,000). Similarly, heads of households in the bottom 20 percent who had attended some college had more income than heads of household who had not. For example, in 1992, households with heads who had attended some college had about $31,000 more in income than households with heads who had not, and that difference decreased to $9,700 in 2014. Wealth disparities generally existed across the mid-career earnings distribution over time. For example, in 1992, households in the top 20 percent with heads who had attended some college had about $166,000 more in estimated median wealth compared to households in the top 20 percent with heads who did not attend college. In 2014, the difference in estimated median wealth between these same groups was about $386,000. Similarly, households in the bottom 20 percent with heads who had attended some college had greater median wealth than households in the bottom 20 percent with heads who had not attended college. For example, we estimated that, in 1992, households in the bottom 20 percent with heads who attended college had about $176,000 more in wealth than heads who had not. In 2014, the difference in median wealth between these groups was about $120,000. Our findings are consistent with those of other researchers, who found that educational attainment was an important determinant of wealth at age 65, and that it was strongly correlated with wealth even after controlling for lifetime earnings. We provided a draft of this report to the Department of Labor, the Department of the Treasury, the Internal Revenue Service, and the Social Security Administration for review and comment. While none of the agencies provided official comments, the Department of Labor and Social Security Administration provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Labor, the Secretary of the Treasury, the Commissioner of the Internal Revenue Service, and the Commissioner of the Social Security Administration. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. To determine how growing disparities in the distributions of income and wealth affect older Americans, we examined (1) the distributions of income and wealth among all older Americans over time; (2) the association between income, wealth, and longevity among older Americans; and (3) how the distributions of income and wealth have changed over time for a cohort of individuals as they aged. This appendix provides a detailed account of the data sources used to answer these questions and the analyses we conducted. The appendix is organized into three sections. Section I describes how we reviewed literature relevant to this report’s objectives and provides information on the interviews we conducted. Section II describes the information sources and methods we used to analyze the distributions of income and wealth among all older Americans over time. Section III describes the information sources and methods we used to analyze how income and wealth among older Americans are associated with longevity, and how the distributions of income and wealth changed as a cohort of individuals aged. For the purposes of our analysis, we defined wealth to be a household’s net worth—that is, total assets minus total debt. Net worth is a measure often used by researchers studying retirement security. Older Americans may have other future retirement resources, such as the present value of future income expected from defined benefit (DB) pension plans and Social Security. We supplemented our data analysis with a literature review and interviewed researchers to identify appropriate background information and context. We had two primary methods for identifying literature to include in our literature review: a snowball technique and a database search. To apply the snowball technique, we first identified possible relevant literature by examining the studies cited in our 2016 report examining the relationship between Social Security benefits and longevity. Then we reviewed the citations included in those studies. Finally, we reviewed relevant literature included in a weekly report called “Current Awareness in Aging Report,” produced by the Center for Demography of Health and Aging at the University of Wisconsin-Madison, which includes a comprehensive list of recently issued materials relating to aging, including retirement security. We compiled relevant citations across these sources and analyzed abstracts to identify working papers, journal articles, and reports that required further review. We identified reports for inclusion based on whether they provided insight into the following relationships: As older Americans age, the relationship between wealth and expenses, and income and wealth. For older Americans, how income and/or wealth inequality are (1) related to the topics below and (2) how, if at all, these relationships have changed over time or generations: Rural vs urban locations Role of inequality (income, wealth, longevity) in reliance on federal income security programs among older Americans To complement the snowball technique search, we also conducted a database search. We searched the Proquest database EconLit for scholarly journals and working papers for a 5-year span, from 2013 through 2018, that matched keywords related to our criteria for relevance. We took additional steps to enhance the robustness of our results. We solicited recommendations for literature from GAO stakeholders, agency officials, and contacts at the Congressional Research Service and Congressional Budget Office and added these recommendations to our list for consideration. During interviews with experts, we discussed contrary opinions and findings in the research and requested full citations as needed. We also attended retirement security events and reviewed news clippings for references to contrary opinions or findings in breaking research. Finally, an economist reviewed the methods and reliability of all studies. We included 26 out of 34 articles from the snowball technique search and expert recommendations and an additional 3 out of 160 articles from the database search (the database search identified some of the same articles as the snowball technique search). These 29 articles that best matched our criteria for inclusion were the articles we reviewed. We also identified and interviewed nine researchers whose work was relevant to our objectives and interviewed them in order to identify researchers’ explanations and theories about the relationships between inequality and longevity, health status, gender, education, and race and ethnicity. To select these researchers, we considered their areas of expertise; whether they worked for a federal agency, university, or other type of organization; and their ideological perspective, if known. This section describes the two main data sources we used to analyze trends in the distribution of income and wealth among all older Americans: the Survey of Consumer Finances (SCF) and the Financial Accounts of the United States (FA). To examine the distributions of income and wealth among all older Americans over time, we used 1989 through 2016 data from the SCF. The SCF is a triennial survey of household assets and income from the Board of Governors of the Federal Reserve System (Federal Reserve) and asks households detailed questions about their income—including pension benefits—and assets—including amounts in retirement accounts. The survey also asks about debt and demographic information, among other topics. A different sample of households was used for each year in our analysis. These data allow for comparison of the experiences of same-age households at different points in time. The SCF is conducted using a dual-frame sample design. One part of the design is a standard, multistage area-probability design, while the second part is a special over-sample of relatively wealthy households. This is done in order to accurately capture financial information about the population at large as well as characteristics specific to the relatively wealthy. The two parts of the sample are adjusted for sample nonresponse and combined using weights to make estimates from the survey data nationally representative of households overall. In addition, the SCF excludes people included in the Forbes magazine list of the 400 wealthiest people in the United States. Furthermore, the SCF omits observations that have net worth at least equal to the minimum level needed to qualify for the Forbes list. For example, the 2016 SCF surveyed 6,254 U.S. households and removed six households that had net worth equal to at least the minimum level needed to qualify for the 2016 Forbes list. Over time, the number of households interviewed has expanded (see table 2). We found the SCF to be reliable for the purposes of our report. While the SCF is a widely used federal data source, we conducted an assessment to ensure its reliability. Specifically, we reviewed related documentation and internal controls, spoke with agency officials, and conducted electronic testing. When we learned that particular estimates were not reliable for our purposes, or had sample sizes too small to produce reliable estimates, we did not use them. Nonetheless, the SCF and other surveys that are based on self-reported data are subject to nonsampling error, including the ability to get information about all sample cases; difficulties of definition; differences in the interpretation of questions; and errors made in collecting, recording, coding, and processing data. These nonsampling errors can influence the accuracy of information presented in the report, although the magnitude of their effect is not known. Estimates from the SCF are also subject to some sampling error since, for any given year, the sample is one of a large number of random samples that might have been drawn. Since each possible sample could have provided different estimates, we express our confidence in the precision of the sample results as 95 percent confidence intervals. These intervals would contain the actual population values for 95 percent of the samples that could have been drawn. In this report, we present 95 percent confidence intervals alongside the numerical estimates that were produced using SCF data. All financial figures using the SCF data are in 2016 dollars. We supplemented the SCF data with data from the Financial Accounts of the United States (FA). The FA include data on transactions and levels of financial assets, and liabilities, by sector and financial instrument; balance sheets, including changes in net worth, for households and nonprofit organizations, nonfinancial corporate businesses, and nonfinancial noncorporate businesses; Integrated Macroeconomic Accounts; and additional supplemental detail. These data provide an aggregate estimate of DB pension entitlements (or liabilities, as the FA refer to them), which can be apportioned across SCF respondents (see detailed explanation below). This section describes the analysis that we conducted using the SCF and FA to analyze trends in income and wealth over time for all older Americans. We chose to look at household-level resources because couples may pool their economic resources and the SCF asks some of its questions about resources for households. The Federal Reserve provides the underlying programming code for creating the variables presented in its publications. Where possible, we relied on variable definitions used for Federal Reserve publications using the SCF. For example, we used the race or ethnicity of the household head, defined as either 1) white, non- Hispanic or 2) non-white or Hispanic (which we renamed “minority” for ease of reporting). We also relied on the Federal Reserve’s definitions for net worth, which we refer to as “wealth” in this report; retirement account balances (DC plans and IRAs); income from withdrawals from retirement accounts; and income from Social Security, pension, or disability benefits or annuities. In other cases, we developed our own variables, based on the raw variables described in the SCF codebooks. For example: Older households: households in which the survey respondent or any spouse or partner were aged 55 or older. Household income: estimated total income by adding up all of the individual income components created by the Federal Reserve. Other assets: any other assets that are not retirement accounts, the present value of future income from Social Security or DB pensions, or the value of the household’s primary residence (if one is owned) or vehicles. Other income: any other income coming from a source besides wages; withdrawals from retirement accounts; and Social Security, pension, or disability benefits or annuities. The SCF is a cross-sectional survey, meaning it presents a nationally representative “snapshot” for each survey wave rather than following the same households over time. To create an income distribution, we rank ordered older households by household income and then broke them into five even groups, or quintiles. The “top” refers to the top 20 percent of households in this ranking while the “bottom” refers to the bottom 20 percent of households. We repeated this exercise for each year of the data. While the households included in the SCF are different every survey year, we were able to examine how the distribution of income and wealth across older households changed over time. We used the same method to create wealth distributions, except we rank ordered households by net worth, one measure of wealth, instead of income. To better understand increases in the top quintile, we also estimated the amount of income and wealth held among the top 10 percent, 5 percent, and 1 percent of households, when possible, for each survey year. We also created distributions of income and wealth for other subcategories of older households. As with the analysis for all older households, we broke the subcategory population into quintiles. We estimated distributions of income and wealth for the following subcategories for each survey year: Households in which the head was white and non-Hispanic Households in which the head was a minority Households in which the head attended at least some college Households in which the head did not attend college For all older households, we also estimated the percentage of households in each survey year that had 1) wage income, 2) income from retirement account withdrawals or 3) income from Social Security, pension, or disability benefits or annuities, as well as the amount of income provided by each source. Similarly, we estimated the percentage of older households that had a retirement account (DC or IRA), owned their home, or owned a vehicle, as well as the value of each of these assets. To better understand the importance of these asset types across the wealth distribution, we also estimated the percentage of households that had a retirement account (DC or IRA) with a balance of at least a $100; owned a vehicle worth at least $100; or had home equity of at least $100. We also analyzed the percentage of households with retirement account balances by bands of $50,000. Additional sensitivity analysis included comparing a household’s location in the income distribution to its location in the wealth distribution for each survey year. We found that the vast majority of households were in the same quintile of the income and wealth distributions or were only one quintile apart. Very few households were in the bottom quintile for income and top quintile for wealth or vice-versa. From 1989 through 2016, the percentage of households who fit these two scenarios was always under 1 percent. The literature on retirement adequacy emphasizes the importance of including measures of the value of future DB and Social Security benefits in measures of the wealth distribution. However, the SCF does not provide estimates of the present value of expected future DB and Social Security benefits. As a result, we did a separate analysis to estimate the present value of future income from DB and Social Security benefits using the SCF and FA data from the Federal Reserve, as well as life expectancy data from the Social Security Administration (SSA). In general, our analysis was done for respondents and spouses/partners separately at the individual level, and estimates were combined to create household totals. We generally followed methods presented in an 2016 paper entitled “Is the U.S. Retirement System Contributing to Rising Wealth Inequality?” by Devlin-Foltz, Henriques, and Sabelhaus (see bibliography for the full citation), but made some changes in the assumptions given our specific focus on older Americans. In order to estimate the present value of income expected from DB plans at the household-level, we started with the aggregate value of accrued DB benefits by survey year from the FA. Following Devlin-Foltz et al. (2016), we calculated aggregate DB pension entitlements as the portion of total pension entitlements not found in DC assets and annuities held in IRAs at life insurance companies. Then, we allocated aggregate DB entitlements across households in a series of steps, ultimately splitting the aggregate DB entitlements between SCF respondents who were already receiving benefits and those who were covered by DB plans but were not yet receiving benefits. In the first step of the allocation, we estimated the present value of promised DB benefits for current DB beneficiaries. The present value of promised DB benefits for those already receiving benefits was based on the reported values for DB benefits in the SCF, life tables from SSA, and an assumed 3 percent real discount rate. After solving for the present value of promised DB benefits for those currently receiving benefits, we subtracted the total amount of DB benefits promised to current DB beneficiaries from the aggregate DB assets to solve for the share to be distributed to future DB beneficiaries. By doing this, we effectively assumed that current DB beneficiaries had first claim to DB pension assets. We allocated the remaining DB assets to future DB recipients by assigning each future DB beneficiary a share of the amount of the residual of aggregate DB entitlements (left over after current beneficiaries claimed their share) based on their earnings, the number of years they participated in a DB plan, their expected retirement age as stated in the SCF, and a 3 percent real discount rate. We also estimated the present value of expected future Social Security benefits for current and future Social Security beneficiaries, using information from the SCF on Social Security benefits for current Social Security beneficiaries and earnings information for future Social Security beneficiaries. With respect to current Social Security beneficiaries, we solved for the present value of Social Security benefits using annual Social Security benefits as reported in the SCF, life tables from SSA, and an assumed 3 percent real discount rate, consistent with our DB analysis. For future Social Security beneficiaries, we used current earnings or earnings from the longest job held as reported in the SCF as the basis for the Social Security benefit. Given that our analysis focused on older Americans, we assumed that future Social Security beneficiaries were close enough to retirement that the earnings information in the SCF provided a reasonable proxy for lifetime earnings. We created a monthly average of these earnings, which we used as a simplified version of the average indexed monthly earnings (AIME). We used these thresholds to compute something similar to the primary insurance amount (PIA) by assigning 90 percent of earnings up to the first bend point, 32 percent of earnings between the first and second bend points, and 15 percent of earnings between the second bend point and the monthly taxable maximum. We assumed everyone who was not yet receiving benefits but would in the future started collecting benefits at 62 or at their current age if older than 62. We applied benefit rules associated with each individual’s birth year to the PIA as set by the Social Security Administration and made adjustments for spousal benefits. We estimated the present value of Social Security benefits for future beneficiaries using the estimated PIA, a retirement age of 62 or their current age if older than 62 and not yet receiving benefits, life tables from SSA, and a 3 percent real discount rate. While adding these present value estimates to wealth better captures the totality of resources available to older Americans, our estimates of the present value of income from future DB and Social Security benefits are subject to uncertainty and should be interpreted with caution. For example, our estimates of the present value of DB benefits for future beneficiaries are not based on SCF respondent-reported expected DB benefits. Instead, we used the aggregate DB entitlements in the FA data and allocated that amount across households with DB plans. We followed this method, in part, because it appears that workers do not have a good understanding of their pension plan parameters and confuse DB benefits with other types of payouts in the SCF data, according to Devlin-Foltz et al. (2016). Moreover, our estimates of the present value of Social Security benefits for future beneficiaries are not based on lifetime earnings since the SCF does not collect all of the inputs needed to project Social Security benefits for respondent-families. However, it is possible to get a sense of the distributional impact of Social Security by focusing on those near retirement in certain points in time. A general limitation of our analysis of the present value of future income from DB pensions and Social Security is that our estimates rely on assumptions about life expectancy, real discount rates, and retirement ages, which are unlikely to hold for all households. As a result, we conducted some sensitivity analyses, particularly with respect to real discount rates and retirement ages. For both the DB and Social Security sensitivity analyses, we varied the real discount rate given the uncertainty about future interest rates. In general, higher discount rates result in lower estimated present values, so our estimates of the present value of future DB and Social Security benefits are sensitive to the assumptions about the discount rate. This is especially important in the DB analysis, as changing the assumed discount rate affects the allocation of aggregate DB assets between current and future DB beneficiaries. For example, using a 2 percent real discount rate, as opposed to a 3 percent real discount rate, yielded a higher allocation of aggregate DB assets for current beneficiaries compared to our baseline estimates. Using a 4 percent real discount rate, as opposed to 3 percent, generated a higher allocation of aggregate DB assets for future DB beneficiaries relative to our baseline estimates. For future beneficiaries, we had to make assumptions regarding the respondent and spouse/partner’s retirement age. For the DB analysis, we used the SCF-reported expected retirement age, given that our focus is older Americans, and older people not yet claiming benefits are relatively close to retirement. Given these assumptions, we also did the analysis assuming that all future DB beneficiaries retired at 62 and 65. Assuming different retirement ages can change the amount of the share of aggregate DB assets allocated to individual future DB beneficiaries in the SCF. For the Social Security analysis, we generally assumed that future Social Security beneficiaries retired at 62, in part because a sizeable proportion of people claim Social Security at 62, despite increases in the full retirement age. In addition, according to Devlin-Foltz et al. (2016), assuming a low retirement age decreases the present value of benefits directly if the reductions for early retirement are not actuarially fair, and indirectly if the individual were to keep working at a high enough income to increase their average indexed monthly earnings. Agency officials raised technical concerns about choosing age 62. It is possible that setting the retirement age at 62 may overstate the present value of future Social Security benefits, depending on various factors including interest rates and mortality. We considered using alternative retirement ages and do not believe that choosing a different retirement age for those not yet retired would substantively change our findings. Alternative methods to using present value estimates of future income expected from Social Security and DB pensions for analyzing distributional disparities in retirement security exist. For example, one option would be to evaluate how future monthly income from Social Security and DB pensions would be expected to affect retirement security, perhaps by assessing how the standard of living for workers would be expected to change. Additionally, disparities in health in adulthood could contribute to subsequent disparities in income and wealth at older ages. However, for our analysis, it was useful to estimate the present value of Social Security and DB pensions so we could compare the value of these sources to retirement account balances. In addition, the SCF does not include sufficient data on health to consider its role in income and wealth disparities for this part of our analysis. This section describes the analysis we conducted to determine how the income and wealth of a specific cohort of older Americans were associated with longevity, and how the distributions of income and wealth changed as this cohort aged. For these analyses, we used data from the Health and Retirement Study (HRS), described below. We analyzed data collected through the HRS, a nationally representative survey of older Americans. The HRS is a longitudinal survey, meaning that it follows the same individuals and households over the course of the study, allowing us determine how households’ income and wealth changed over time. HRS is a project of the University of Michigan’s Institute for Social Research that is funded through a cooperative agreement with the National Institute on Aging (U01AG009740). It collects information on individuals over age 50 and, among other things, contains detailed data on their education, marital status, work history, health, assets, and income. When the HRS began in 1992, it consisted of a representative sample of Americans then aged 51-61, which is called the original or core HRS cohort. Since then, several additional cohorts of individuals have been added to the data to maintain representation of the older population, beginning in 1993 with the Asset and Health Dynamics Among the Oldest Old (AHEAD) cohort. Currently, a new cohort of participants aged 51-56 is added to the study every 6 years (see table 3). Respondents are surveyed every 2 years. We analyzed the HRS original cohort for our examinations of the association between longevity, income, wealth, and other factors; and our analysis of how income and assets change as the original HRS cohort aged. We also analyzed how income and assets changed for the War Babies cohort, which includes individuals born from 1942 through 1947. Figures from this analysis are presented in Appendix VI. We used three forms of HRS data: Public-Use HRS data: Most HRS datasets are available for download from the HRS website. For each wave, HRS makes an early release version of the data available prior to the final version. As of June 2019, final release files are available for each wave of the survey from 1992 through 2014, and the 2016 early release file is available. RAND HRS data: Researchers at RAND have created a more user- friendly version of the public-use HRS data (see below for more details). As of June 2019, RAND files are available through the 2014 final release data. Restricted-use HRS data: Some data resources in the HRS are restricted, meaning they are available only under special agreement because they contain sensitive and/or confidential information. For this report, we used restricted data containing earnings records from SSA. We conducted our analysis of the restricted-use files via a virtual desktop environment data enclave made available by the University of Michigan’s Center on the Demography of Aging (MiCDA). RAND, a research organization, cleans and processes the HRS data to create a user-friendly longitudinal dataset that has consistent and intuitive naming conventions and model-based imputations for missing wealth and income data. In most cases, we used the RAND version of the HRS variables due to the greater ease of use and the additional data cleaning already performed. RAND income and wealth variables were given in nominal dollars. We adjusted these variables to real 2016 dollars using the Consumer Price Index for All Urban Consumers. To calculate mortality, we supplemented the RAND files with information from the early release 2016 public use file to the extent that it provided additional information on mortality through 2014. See the data reliability section below for further discussion of the mortality data. We found the HRS variables presented in this report to be sufficiently reliable. We conducted a data reliability assessment of selected variables by conducting electronic data tests, reviewing documentation on the dataset, and reviewing related internal controls. When we learned that particular variables were not sufficiently reliable, we did not use them in our analysis. We selected our analyses to ensure there was sufficient sample size to produce reliable estimates. We produced variance estimates using a statistical technique chosen to account for the sample design of the HRS and adjusted the sample weights to account for potential bias due to the linkage to SSA administrative data, as described below. We identified additional limitations due to the survey responses being self-reported. As such, they are subject to the respondent’s possible errors in reporting specific financial amounts. We measured mortality from 1992 through 2014. Mortality data in the HRS, including an indicator for a respondent’s death in a given survey year and month and year of death, come from matches with the National Death Index or follow-up interviews with surviving family members. There is complete date of death (specifically month and year of death) information for nearly everyone who died prior to 2012. However, for deaths since 2012, the HRS data linked to the National Death Index was not available, which likely lead to more deaths without information on month and year of death. Since the 2012 and 2014 survey years, there has been time to gather death date information from follow up interviews with families, and less than 10 percent of those who died between the 2012 and 2014 survey years had incomplete data on month and year of death. However, in the 2016 survey year early release public use file, we found that a higher proportion of those who died did not have death dates, likely due to the lack of linkage with the National Death Index and a lack of time to follow up with families since the 2016 survey year to find out when survey participants died. As a result, we determined that we had reliable data on mortality through 2014. HRS contains restricted data drawn from SSA administrative sources for participants who have provided explicit consent to link their responses to administrative data and subsequently were successfully linked with the administrative data. It is possible that respondents who were linked may differ in systematic ways from respondents who were not linked, which would affect the generalizability of estimates derived solely from the subset of participants who were linked. The survey weights provided with HRS data account for the complexity of the survey design (e.g., oversamples of minorities and Floridians), nonresponse, and post- stratification adjustments for demographic distributions, but do not adjust for the administrative linkage. There is evidence that in at least some waves of the survey, there are modest but statistically significant differences in linkage rates on characteristics including race, income, and wealth. One technique to address this potential source of bias is to adjust the sample weights used in variance estimation for observed differences between those with and without linked administrative data. Kapteyn et al. suggest a technique for computing inverse probability weights to account for these differences. Following this technique, HRS has computed a set of weights that account for consent to SSA administrative linkage, but only for the 1992, 1998, and 2004 survey waves. However, this report needed adjusted household weights for all 12 waves and adjusted respondent weights for wave 1. We opted to address the potential non- linkage bias using a logistic model-based propensity score adjustment, rather than a weighting class adjustment for several reasons. First, we had the benefit of many variables with which to model the propensity of non-linkage. Second, weighting class adjustments, which involve creating mutually exclusive classes based on the variables associated with non- linkage, were not feasible because of the large number of variables we included in the adjustment. The number of respondents per cell would be too small. Third, the propensity score adjustment allows us to consider many variables at the same time. Finally, the propensity score adjustment allows us to rank respondents, rather than assume that the characteristics used in a weighting class adjustment would perfectly predict non-linkage. We compared estimates and standard errors obtained using the original weights to the non-linkage adjusted weights. The adjusted weights changed estimates and their standard errors in generally small amounts, but did not affect observed trends in this report. For instance, the median absolute value of the change was less than 1 percent for estimates of median household income for individuals by mid-career earnings quintiles from 1992 to 2014. The median absolute value of the change was 5.7 percent for the standard errors of those estimates. We used the balanced repeated replication method to estimate standard errors for the income and wealth statistics we reported using HRS because the income and wealth statistics were quantiles (i.e., medians). The standard Taylor series (Woodruff) variance estimation method assumes that quantiles can be expressed as a smooth function in the sample and population. However, quantile functions are not considered smooth. After ruling out Taylor series method, we explored replication methods such as jackknife, bootstrap, and balanced repeated replication. Of those, the balanced repeated replication is most suited for the two primary sampling units per stratum design of the HRS. The Fay adjustment stabilizes the estimates across strata when using the normal balanced repeated replication method. This adjustment is particularly relevant for smaller samples. The literature we reviewed suggested that the jackknife produces a poor estimate of the variance of quantiles (Lohr 2009 and Judkins 1990) and that the bootstrap requires more computations than balanced repeated replication. For our analyses, we wanted to classify HRS respondents into income groupings based on a relatively stable measure of income that uses multiple years of administrative data, to reduce measurement error in self- reported survey data and to reduce the chance of basing the income grouping on a single year of unusually low or high income. Several limitations prevent us from classifying households based on their full lifetime income from all sources. HRS does not contain administrative data on income sources besides earnings and Social Security benefits. Moreover, for years before 1978, the administrative earnings records are only available for earnings covered by Social Security and below the taxable maximum. Finally, not all sources of earnings are covered by Social Security. While around 96 percent of employment is currently covered by Social Security, this has not always been the case. In particular, successive expansions of coverage in the 1950s and 1960s greatly increased the proportion of the workforce covered by Social Security, such that relying on SSA earnings records going back to 1951 would underestimate the earnings of large numbers of older HRS participants. Thus, for our analysis, we constructed earnings groupings based on a measure of “mid-career” earnings, based on a household’s average annual reported earnings when the household head was age 41 to age 50. Earnings tend to peak (and remain relatively stable) for workers in their mid-40s through their early 50s. We begin measuring earnings at age 41 to avoid using data prior to expansions of Social Security coverage and to minimize our reliance on imputed earnings above the taxable maximum. In the early years of the study, HRS sought retrospective consent for administrative data linkages. As a result, some participants who only provided consent for the administrative linkage during their initial interview and did not provide consent in subsequent interviews did not have earnings records after age 50. Therefore, we set age 50 as the upper bound for our measure of mid-career earnings. Our goal was to determine how income, wealth, and other demographic and health-related factors are associated with the longevity of older Americans over age 50 in the original HRS cohort. We measured the proportion of original HRS participants still alive at the end of the survey to examine how longevity varied across the income and wealth distributions, as well as across different demographic and health-related variables, including race, educational attainment, gender, and self- reported health status at the beginning of the survey. In order to examine these relationships, we used data from the original HRS cohort to measure deaths over a maximum of 22 years (1992 through 2014). Every 2 years, the HRS attempted to measure whether the original respondents were still alive, but these longevity data were incomplete because some of the original respondents declined to participate in later waves of the survey. Once these respondents left the survey, their actual longevity could not be followed. This incomplete measurement of longevity is generally known as “censored data” in statistics. Special methods of “survival analysis” are required to avoid making inaccurate conclusions about actual longevity from this type of data, when the analyst can only measure longevity up to a certain time before death. Survival analysis accounts for survey respondents with complete or incomplete longevity data. Without making this distinction, ordinary statistical methods, such as linear regression models of the observed longevities, would not include the correct sample of respondents when estimating the chance that a respondent would die at any time within the observation period. In addition, ordinary methods would incorrectly treat the longevities observed in the observation period as actual longevities, when some of them are the shorter, censored longevities observed before the respondents dropped out of the study. Survival analysis methods correct for this problem, in order to reliably estimate the chance of death by any given time in the observation period. Most importantly, our analysis assumed actual longevity during the observation period did not have a systematic relationship with whether the original HRS respondents continued to participate in the study except that leaving the study implied a later death (“noninformative censoring”). In other words, participants with censored and actual longevities did not systematically differ in ways that affected longevity or the variables associated with it. We believe this assumption to be reasonable for the purpose of our analysis for two reasons. First, a small percentage (8 percent) of the original respondents dropped out of the survey, so that the impact of any longevity differences among the population who dropped out would likely have been small. Second, while some baseline characteristics of respondents do appear correlated with non-response over time, the population that dropped out of the study does not appear to vary significantly from those completing each wave, except for race and ethnicity. In our survival analysis, the dependent variable was composed of two parts, including the time in months to death and whether death was observed during the survey period. In general, we used continuous time survival models, including Kaplan-Meier and Cox proportional hazards regression models to estimate survival functions, which estimate the probability of surviving (or dying) up to the end of the survey period, and hazard functions, which estimate the probability of death, per time unit, given that an individual has survived up to that point in time. We used the Kaplan-Meier method to estimate survival probabilities as a function of time and to obtain univariate statistics on survival for different groups. For example, we estimated the percentage of survivors during the survey period across income and wealth quintiles. We also estimated survivorship across the demographic and health-related variables. Moreover, using the Cox proportional hazards regression models, we analyzed the relationship between income and longevity and wealth and longevity, controlling for related demographic and health-related variables, as well as age at the beginning of the survey. These regressions allow the relationships between various characteristics and death to be described as hazard ratios. For example, hazard ratios that are statistically significant and greater than 1.00 indicate that individuals with those characteristics are more likely to die during the survey period compared to a reference group. Hazard ratios that are statistically significant and less than 1.00 indicate that individuals with those characteristics are less likely to die in the study period compared to a reference group. We estimated survivorship among individuals with the following characteristics in combination: bottom income (earnings) quintile and no college; middle of the income (earnings) distribution (third quintile) and high school diploma or some college (excluding GED); and top of the income (earnings) distribution and college diploma. We then ran a subset of these scenarios using different combinations of self-reported health status for each of the three main scenarios. For example, we estimated survivorship among individuals in the bottom income (earnings) quintile, who had not attended college, and reported being in fair or poor health in 1992. Our results have limitations and should be interpreted with caution. Results from the survival analysis present correlations, not causal estimates. Moreover, while our main analysis includes self-reported health status at the beginning of the study period, we also excluded this variable as a sensitivity check given the interconnectedness of income, wealth, and health and the conclusions were similar. Furthermore, due to limitations with respect to the mortality data in later years of the HRS, we did not have specific months and years of death for 60 respondents we know died during the observation period due to death indicators in the interview status variables from HRS. As a result, we imputed their death dates based on the survey year they were indicated to have died in from the HRS interview status questions. While death is continuous in the sense that it can happen to any person at any time, we only observe death within a given month for those with death dates in the data, and only within a year for those whose death information we gathered for the interview status variables. As a sensitivity check, we redid the analysis using survival information at the person-year level and discrete survival analysis techniques and found similar results. This section describes how we used the HRS to determine how the distributions of income and wealth change as older Americans in the original HRS cohort aged. We focused this analysis on the original HRS cohort (born 1931-1941). This cohort entered the study in 1992 at ages 51-61 and had reached their 70s or early 80s by 2014, allowing us to analyze how income and assets changed as these households progressed through retirement. We conducted our analysis and reported results at the household level because couples may pool financial resources or co-own assets. Also, RAND HRS variables on income and wealth are presented at the household level. When necessary, we combined respondent and spouse or partner level variables we used from the public-use file in order to obtain household-level variables. We restricted this analysis to survey respondents (“household heads”), or any spouses or partners, who were still alive in 2014 to ensure we followed the same group of people throughout our analysis. We grouped households into five earnings groups based on their mid-career earnings, as described above. Our primary goal was to examine how the distribution of income and wealth changed over time for households in the original HRS cohort, based on their mid-career earnings groups. We also examined how specific sources of income and wealth changed over time. We also wanted to determine how these trends varied based on household demographic characteristics, including race and ethnicity and education level, without attempting to ascribe causality. Our analysis included survey respondents (heads of households) or their spouses or partners who responded to the survey in 1992 and were still alive and responded in 2014, which is the most recent year for which the data are complete. The heads of households we analyzed were from the original HRS cohort and were born in 1931 to 1941. If neither the head of household or the spouse or partner interviewed in 1992 was still alive in 2014, their household was not included in our sample. In order to do so, we estimated median levels of household wealth and income every 2 years for each earnings group, as well as median levels for specific sources of income and wealth. We estimated the percentage changes and absolute changes in median wealth and income for each earnings group from 1992 through 2014 in order to determine whether income or wealth levels increased or decreased over time. For specific sources of income and wealth, we estimated medians for all households in each earnings group as well as for only those households which reported having the specific source of income or wealth. For example, we determined the median home equity for all households in each earnings group as well as the median home equity for only those households with home equity for each earnings group. Finally, we calculated the percent of our sample having each type of wealth and income (e.g. home equity, Social Security benefits) for each year in the data. As a sensitivity check, we also analyzed how total assets and income changed for the HRS’s “War Babies” cohort (born 1942-1947). For this analysis, we report 99 percent confidence intervals alongside the percentage or other numerical estimates. We chose to use this level of confidence to account for the use of imputation in the RAND HRS data in addition to the sampling error that using survey data introduces. All financial figures using the HRS data are in 2016 dollars. This appendix compares the top 1 percent of the wealth distribution of older households to several other groups in this distribution: (1) the next 19 percent, (2) the top 20 percent, (3) the bottom 80 percent, and (4) the bottom 20 percent. These comparisons provide context for the financial security of the top 1 percent relative to other households at the top of the wealth distribution, the remainder of the wealth distribution, and households at the bottom of the distribution, respectively. To draw these comparisons, we used 2016 data from the Survey of Consumer Finances, a triennial, cross-sectional survey produced by the Board of Governors of the Federal Reserve System. A different sample of households was used for each year in our analysis. These data allow for comparison of the experiences of same-age households at different points in time. We chose to look at household-level resources because couples may pool their economic resources, and the SCF asks some of its questions about resources for households. We conducted our analysis for older households, which were defined as those in which the household head or any spouse or partner were ages 55 or older. We defined wealth as net worth, or assets minus debt. Because the sample size for the top 1 percent is small, we presented dollar values rounded to thousands of 2016 dollars. dollars) Estimated median value (2016 dollars) Vehicle(s) All other assets Debt n/a Not available. There were insufficient data to produce a reliable estimate of median debt. Financial resource Retirement account(s) Home Vehicle(s) loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Estimated median value (2016 dollars) Home Vehicle(s) All other assets n/a Not available. There were insufficient data to produce a reliable estimate of median debt. loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Home Vehicle(s) loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Home Vehicle(s) Estimated median value (2016 dollars) Financial resource Retirement account(s) Home Vehicle(s) 95 percent confidence interval lower bound 434,000 95 percent confidence interval upper bound 556,000 n/a Not available. There were insufficient data to produce a reliable estimate of median debt. loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Home Vehicle(s) mortgages, loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Home Vehicle(s) mortgages, loans, lines of credit, and credit card balances after the last payment. Estimated median value (2016 dollars) Financial resource Retirement account(s) Home Vehicle(s) Financial resource Retirement account(s) Home Vehicle(s) mortgages, loans, lines of credit, and credit card balances after the last payment. Financial resource Retirement account(s) Home Vehicle(s) mortgages, loans, lines of credit, and credit card balances after the last payment. Estimated median value (2016 dollars) Financial resource Retirement account(s) Home Vehicle(s) 95 percent confidence interval lower bound 0 0 3,000 1,000 95 percent confidence interval upper bound 0 0 4,000 1,000 n/a Not available. There were insufficient data to produce a reliable estimate of median debt. mortgages, loans, lines of credit, and credit card balances after the last payment. This appendix contains additional results from our survival analysis, as shown in the tables below. Appendix V: 2014 Population in the Health and Retirement Study (HRS) This appendix compares the demographic characteristics, as of 2014, of the HRS sample we used in our analysis. This appendix contains estimates of income and wealth for households, where the heads of households were born from 1942 through 1947. The Health and Retirement Study (HRS) refers to this cohort as the “War Babies” cohort. In addition to the contact named above, Michael Collins (Assistant Director), Jennifer Gregory (Analyst-in-Charge), Garrick Donnelly, Kathleen McQueeney, Chris Wickham, and Christopher Zbrozek made key contributions to this report. Also contributing to this report were Susan Aschoff, James Bennett, Deborah Bland, Melinda Bowman, Nisha Hazra, Kirsten Lauber, Jeffrey Miller, Oliver Richard, Amrita Sen, Joseph Silvestri, Jeff Tessin, Frank Todisco, Adam Wendel, and Sirin Yaemsiri. Auerbach, Alan J., Laurence J. Kotlikoff, and Darryl R. Koehler. “U.S. Inequality, Fiscal Progressivity, and Work Disincentives: An Intragenerational Accounting.” NBER Working Paper, no. 22032 (2016). Banerjee, Sudipto. “Asset Decumulation or Asset Preservation? What Guides Retirement Spending?” EBRI Issue Brief, no. 447 (2018). Banerjee, Sudipto. “Income Composition, Income Trends and Income Shortfalls of Older Households.” EBRI Issue Brief, no. 383 (2013). Bee, Adam and Joshua Mitchell. “Do Older Americans Have More Income Than We Think?” SESHD Working Paper, vol. 2017, no. 39 (2017). Board of Governors of the Federal Reserve System. “Changes in U.S. Family Finances from 2013 to 2016: Evidence from the Survey of Consumer Finances,” Federal Reserve Bulletin, vol. 103, no. 3 (Washington, D.C.: September 2017). Bosworth, Barry P. and Kan Zhang. “Evidence of Increasing Differential Mortality: A Comparison of the HRS and SIPP.” Center for Retirement Research Working Paper, vol. 2015, no. 13 (2015). Bricker, Jesse, Alice M. Henriques, Jake A. Krimmel, and John E. Sabelhaus. “Measuring Income and Wealth at the Top Using Administrative and Survey Data.” Finance and Economics Discussion Series, vol. 2015, no. 030 (2015). Brookings Economic Studies Program. Later Retirement, Inequality in Old Age, and the Growing Gap in Longevity between Rich and Poor (Washington, D.C.: Brookings Institution, 2016). Burtless, Gary. “What Do Stock Market Fluctuations Mean for the Economy?” Brookings Opinions, February 23, 2018. Accessed March 14, 2019, https://www.brookings.edu/opinions/what-do-stock-market- fluctuations-mean-for-the-economy?/ Chen, Anqi, Alicia H. Munnell, and Geoffrey T. Sanzenbacher. “How Much Income Do Retirees Actually Have? Evaluating the Evidence from Five National Datasets.” Center for Retirement Research Working Paper, vol. 2018, no. 14 (2018). Chetty, Raj, Michael Stepner, Sarah Abraham, Shelby Lin, Benjamin Scuderi, Nicholas Turner, Augustin Bergeron, and David Cutler. “The Association Between Income and Life Expectancy in the United States, 2001-2014.” JAMA, vol. 315, no. 16 (2016). Choi, HwaJung and Robert F. Schoeni. “Health of Americans Who Must Work Longer to Reach Social Security Retirement Age.” Health Affairs, vol. 36, no. 10 (2017). Congressional Budget Office. Measuring the Adequacy of Retirement Income: A Primer. 53191. Washington, D.C.: October 2017. Congressional Budget Office. Trends in Family Wealth, 1989 to 2013. 51846. Washington, D.C.: August 2016. Congressional Research Service. The U.S. Income Distribution: Trends and Issues. R44705. Washington, D.C.: December 8, 2016. Devlin-Foltz, Sebastian, Alice Henriques, and John Sabelhous. “Is the U.S. Retirement System Contributing to Rising Wealth Inequality?” The Russell Sage Foundation Journal of the Social Sciences, vol. 2, no. 6 (2016). Federal Reserve Bank of St. Louis. “When the Stock Market Rises, Who Benefits?” On the Economy Blog, February 27, 2018. Accessed March 14, 2019, https://www.stlouisfed.org/on-the- economy/2018/february/when-stock-market-rises-who-benefits. Ghilarducci, Teresa, Siavash Radpour, and Anthony Webb. “Employer Retirement Wealth Inequality: 1992 and 2010.” Paper presented at the annual meeting of the American Economics Association Meetings, Philadelphia, P.A.: January 6, 2018. Goda, Gopi Shah, Shanthi Ramnath, John B. Shoven, and Sita Nataraj Slavov. “The Financial Feasibility of Delaying Social Security: Evidence from Administrative Tax Data.” Journal of Pension Economics and Finance, vol. 17, no. 4 (2018). Gustman, Alan, Thomas Steinmeier, and Nahid Tabatabai. “Distributional Effects of Means Testing Social Security: Income Versus Wealth.” NBER Working Paper Series, no. 22424 (2016). Johnson, Barry W. and Brian Raub. “How Much Longevity Can Money Buy? Estimating Mortality Rates for Wealthy Individuals.” Statistical Journal of the IAOS, vol. 34 (2018). Johnson, Richard W. Delayed Retirement and the Growth in Income Inequality at Older Ages (Washington, D.C.: Urban Institute, 2018). Kindig, David A. and Erika R. Cheng. “Even As Mortality Fell in Most US Counties, Female Mortality Nonetheless Rose in 42.8 Percent of Counties From 1992 to 2006.” Health Affairs, vol. 32, no. 3 (2013). Olshansky, S. Jay, Toni Antonucci, Lisa Berkman, Robert H. Binstock, Axel Boersch-Supan, John T. Cacioppo, Bruce A. Carnes, Laura L. Carstensen, Linda P. Fried, Dana P. Goldman, James Jackson, Martin Kohli, John Rother, Yuhui Zheng, and John Rowe. “Differences in Life Expectancy Due to Race and Educational Differences Are Widening, and Many May Not Catch Up.” Health Affairs, vol. 31, no. 8 (2012). Owyang, Michael T. and Hannah G. Shell. “Taking Stock: Income Inequality and the Stock Market.” Economic Synopses, No. 7 (2016). Pijoan-Mas, Josep and Jose-Victor Rios-Rull. “Heterogeneity in Expected Longevities.” Demography, vol. 51, no. 6 (2014). Poterba, James M. “Retirement Security in an Aging Population.” The American Economic Review, vol. 104, no. 5 (2014). Poterba, James, Steven Venti, and David A. Wise. “Longitudinal Determinants of End-of-Life Wealth Inequality.” Journal of Public Economics, vol. 162 (2018). Poterba, James M., Steven F. Venti, and David A. Wise. “Were They Prepared for Retirement? Financial Status at Advanced Ages in the HRS and AHEAD Cohorts.” NBER Working Papers, no. 17824 (2012). Poterba, James, Steven Venti, and David Wise. “The Composition and Drawdown of Wealth in Retirement.” Journal of Economic Perspectives, vol. 25, no. 4 (2011). Raskin, Sarah Bloom. “Downturns and Recoveries: What the Economies in Los Angeles and the United States Tell Us.” Remarks at the luncheon for Los Angeles business and community leaders, Los Angeles Branch of the Federal Reserve Bank of San Francisco. April 12, 2012. Ruiz, John M., Patrick Steffen, and Timothy B. Smith. “Hispanic Mortality Paradox: A Systematic Review and Meta-Analysis of the Longitudinal Literature.” American Journal of Public Health, vol. 103, no. 3 (February 2012). Saez, Emmanuel and Gabriel Zucman. “Wealth Inequality in the United States Since 1913: Evidence from Capitalized Income Tax Data.” The Quarterly Journal of Economics, vol. 131, no. 2 (2016). Waldron, Hilary. “Mortality Differentials by Lifetime Earnings Decile: Implications for Evaluations of Proposed Social Security Law Changes.” Social Security Bulletin, vol. 73, no. 1 (2013). Waldron, Hilary. “Trends in Mortality Differentials and Life Expectancy for Male Social Security-Covered Workers, by Socioeconomic Status.” Social Security Bulletin, vol. 67, no. 3 (2007). Wang, Haidong, Austin E Schumacher, Carly E Levitz, Ali H Mokdad, and Christopher JL Murray. “Left Behind: Widening Disparities for Males and Females in US County Life Expectancy, 1985-2010.” Population Health Metrics, vol. 11, no. 8 (2013). Retirement Security: Most Households Approaching Retirement Have Low Savings, an Update. GAO-19-442R. Washington, D.C.: Mar. 26, 2019. The Nation’s Retirement System: A Comprehensive Re-evaluation Needed to Better Promote Future Retirement Security. GAO-19-342T. Washington, D.C.: Feb. 6, 2019. The Nation’s Retirement System: A Comprehensive Re-evaluation Is Needed to Better Promote Future Retirement Security. GAO-18-111SP. Washington, D.C.: Oct.18, 2017. Older Workers: Phased Retirement Programs, Although Uncommon, Provide Flexibility for Workers and Employers. GAO-17-536. Washington, D.C.: June 20, 2017. Retirement Security: Low Defined Contribution Savings May Pose Challenges. GAO-16-408. Washington, D.C.: May 5, 2016. Retirement Security: Shorter Life Expectancy Reduces Projected Lifetime Benefits for Lower Earners. GAO-16-354. Washington, D.C.: Mar. 25, 2016. Retirement Security: Better Information on Income Replacement Rates Needed to Help Workers Plan for Retirement. GAO-16-242. Washington, D.C.: Mar. 1, 2016. Retirement Security: Most Households Approaching Retirement Have Low Savings. GAO-15-419. Washington, D.C.: May 12, 2015. Retirement Security: Trends in Marriage and Work Patterns May Increase Economic Vulnerability for Some Retirees. GAO-14-33. Washington, D.C.: Jan. 15, 2014. Retirement Security: Women Still Face Challenges. GAO-12-699. Washington, D.C.: July 19, 2012. Unemployed Older Workers: Many Experience Challenges Regaining Employment and Face Reduced Retirement Security. GAO-12-445. Washington, D.C.: Apr. 25, 2012.", "summary": "Income and wealth inequality in the United States have increased over the last several decades. At the same time, life expectancy has been rising, although not uniformly across the U.S. population. Taken together, these trends may have significant effects on Americans' financial security in retirement. GAO was asked to examine the distribution of income and wealth among older Americans, as well as its association with longevity, and identify the implication that these trends may have on retirement security. This report examines (1) the distributions of income and wealth among all older Americans over time; (2) the association between income, wealth, and longevity among older Americans; and (3) how the distributions of income and wealth changed over time for a cohort of individuals as they aged. To conduct this work, GAO analyzed data from two nationally representative surveys: the SCF, using data from 1989 through 2016, and the HRS. GAO used 1992 through 2014 HRS data linked to earnings records from the Social Security Administration. While preliminary 2016 HRS data are available, GAO used 2014 data, which contain more complete information for GAO's analysis. GAO also reviewed studies and interviewed researchers to further analyze the relationships between income, wealth, longevity, and retirement security. Disparities in income and wealth among older households have become greater over the past 3 decades, according to GAO's analysis of Survey of Consumer Finances (SCF) data. GAO divided older households into five groups (quintiles) based on their income and wealth. Each year of data in the analysis, and, thus, each quintile, included different sets of households over time. Average income and wealth was generally higher over time (see fig. 1 for average income), disproportionately so for the top quintile (top 20 percent). For example, in 2016, households in the top quintile had estimated average income of $398,000, compared to about $53,000 for the middle quintile and about $14,000 for the bottom quintile. GAO also found that for quintiles with lower wealth, future income from Social Security and defined benefit pensions provide a relatively significant portion of resources in retirement for those who expect such income. A substantial number of older Americans born from 1931 through 1941 lived at least into their 70s or early 80s, according to GAO's analysis of data from the Health and Retirement Study (HRS), a nationally representive survey which follows the same individuals over time. GAO divided individuals born from 1931 through 1941 into quintiles based on their mid-career household earnings using records from the Social Security Administration. GAO's analysis, as well as that of other researchers, shows that differences in income, wealth, and demographic characteristics were associated with disparities in longevity. However, even with these disparities, we found a substantial number of people in the sample were alive in 2014, including those with characteristics associated with reduced average longevity, such as low earnings (see fig. 2) and low educational attainment. Taken all together, individuals may live a long time, even individuals with factors associated with lower longevity, such as low income or education. Those with fewer resources in retirement who live a long time may have to rely primarily on Social Security or safety net programs. GAO's analysis of HRS data also found that disparities in household income decreased while disparities in wealth persisted as a cohort of older Americans aged from approximately their 50s into their 70s or early 80s. Income disparities decreased between higher- and lower-earning households because higher-earning households saw larger drops in income over time, indicating the possible transition from working to retirement. For example, we estimated median income for the top mid-career earnings group decreased by 53 percent while estimated median income for the bottom earnings group decreased by 36 percent over the same period. Wealth remained relatively steady for households in the bottom three earnings groups over the time period GAO examined, while households in the top two earnings groups experienced larger fluctuations in wealth. GAO estimated that median retirement account balances and median home equity increased across earnings groups for households that had these assets. However, the continued wealth disparities may be due to significant differences in the median value of retirement accounts and home equity between higher- and lower-earning households. GAO also found that white households in the bottom two earnings groups had higher estimated median incomes, and white households in all earnings groups generally had greater estimated median wealth, than racial minority households in those earnings groups. In addition, within each earnings group, households headed by someone with at least some college education generally had higher median incomes and wealth than households headed by someone who did not attend college.", "document_type": "gao"}
{"report": "FFRDCs arose from partnerships between the federal government and academic researchers and scientists during World War II. Those partnerships were later restructured into federal research centers to retain scientists, and they became known as FFRDCs by the mid-1960s. Since that time, FFRDCs have continued to perform tasks including technical studies and analyses, research and development, and systems engineering on behalf of federal agencies, such as DOD. In sponsoring an FFRDC, agencies draw on academic and private sector resources that can contribute to an agency’s ability to accomplish tasks that are integral to the mission and operation of the sponsoring agency. FFRDCs may be operated, managed, and/or administered by a university or consortium of universities, other nonprofit organizations, or a private industry firm as an autonomous organization or as a separate unit of a parent organization. As of May 2019, federal agencies sponsored a total of 42 FFRDCs, 10 of which are sponsored by DOD. These 10 DOD-sponsored FFRDCs can be divided into three categories: S&A Centers: These centers deliver independent and objective analyses and advise in core areas important to their sponsors in support of policy development and decision-making, among other things. Research and Development Laboratories: These laboratories conduct research and development, focusing on the development and prototyping of new technologies and capabilities to meet DOD needs. For example, these laboratories engage in research programs that emphasize the evolution and demonstration of advanced concepts and technology, and transfer new technology to the private sector. Systems Engineering and Integration Centers: These centers meet long-term technical and engineering needs to ensure complex systems meet operational requirements. Among other things, Systems Engineering and Integration Centers assist with testing system performance, development and acquisition of system hardware and software, integration of new capabilities, and the continuous improvement of system operations and logistics. Table 1 lists the 10 DOD-sponsored FFRDCs. As shown in table 1, each of the 10 DOD-sponsored FFRDCs is managed by a specific military department or organization within DOD—referred to as the FFRDC primary sponsor. More broadly, the Office of the Under Secretary of Defense for Research and Engineering oversees and manages DOD’s FFRDC program. DOD’s relationships with FFRDCs are defined through sponsoring agreements between the primary sponsor (i.e., the DOD organization responsible for the overall use of the FFRDC) and the FFRDC parent organization. According to the FAR and DOD instruction, sponsoring agreements define the FFRDC’s purpose and mission and may not exceed 5 years in duration. DOD’s instruction also states that sponsoring agreements are to establish conditions under which DOD may award an FFRDC contract and describe the overarching requirements for operation of the FFRDC. For example, the DOD instruction states that sponsoring agreements are to describe constraints on the FFRDC parent organization that are necessary to preserve the integrity of the FFRDC, such as provisions to prevent the occurrence or appearance of organizational or personal conflicts of interest that may undermine the independence, objectivity, or credibility of the FFRDCs. The DOD instruction also states that sponsoring agreements will preclude FFRDCs from performing commercial work. In this regard, the FAR provides that sponsoring agreements are required to address whether or not the FFRDC may accept work from other entities and if so, the procedures to be followed and the limitations as to the work that can be accepted. Further, the DOD instruction and the FAR provide that sponsoring agreements will generally preclude FFRDCs from competing with any organization in response to a formal request for proposals other than the operation of the FFRDC. After the primary sponsor identifies the need for FFRDC work, and has defined FFRDC core competencies, roles, and responsibilities in the sponsoring agreement, the primary sponsor awards a noncompetitive contract to the FFRDC to support the sponsor’s research requirements, such as addressing national security issues and systems development. Prior to extending a contract or sponsoring agreement for an FFRDC, the FAR requires that the primary sponsor conduct a comprehensive review of the use and need for the FFRDC at least every 5 years. The FAR describes elements of what the comprehensive review should include, such as examination of the sponsor’s special technical needs and mission requirements performed by the FFRDC and assessment of the efficiency and effectiveness of the FFRDC in meeting the sponsor’s needs. The FAR further requires that the head of the sponsoring agency approve continuing or terminating sponsorship based on the results of the comprehensive review. FFRDCs initiate work on specific projects at the request of “work sponsors,” or the entities that request the services of the FFRDC. Work sponsors can be the primary sponsor of the FFRDC or another entity. When initiating work at FFRDCs, the primary sponsor determines whether to approve research projects for the FFRDC before projects are placed on contract. Approval of research projects is based on the determination that work proposed is appropriate for the FFRDC and consistent with the FFRDC’s core competencies as documented in the sponsoring agreement. Additionally, the primary sponsor ensures FFRDC work efforts do not exceed available resources. Among other things, FFRDC work sponsors identify project requirements, propose an appropriate research design, confirm the work is appropriate and consistent with FFRDC core competencies, identify the source of project funding, and monitor the progress of the work to ensure FFRDC performance is satisfactory and meeting desired requirements. In some instances, S&A Centers serve only a specific military department or office, while in other cases an FFRDC may serve a range of DOD entities. For example, RAND Arroyo Center broadly supports the analytic requirements of the Army in order to provide timely advice to help senior Army leadership make informed policy choices. Accordingly, the RAND Arroyo Center sponsoring agreement with the Department of the Army provides that the scope of RAND Arroyo Center work is to support Army sponsors throughout the Army requiring comprehensive analytical support. In contrast, the Institute for Defense Analyses (IDA) and RAND National Defense Research Institute serve DOD more broadly on national security issues. For example, according to IDA’s sponsoring agreement with DOD’s Office of the Under Secretary of Defense for Acquisition and Sustainment, the primary mission of IDA is to assist the Office of the Secretary of Defense and other Defense organizations in addressing important national security issues, particularly those requiring scientific and technical expertise. DOD manages the overall level of FFRDC work using a metric known as staff years of technical effort (STE), which is roughly equal to the work of one employee working for 1 year. Congress typically sets an annual limitation on the STE that may be funded for DOD FFRDCs to support non-intelligence programs on behalf of the agency (hereafter, Defense STE). Between fiscal years 2013 to 2017, Congress established an annual ceiling of 5,750 Defense STE available to DOD, of which 1,125 could be allocated to S&A Centers. In fiscal year 2018, Congress raised the ceiling on Defense STE to 6,030; however, the limit on S&A Centers remained unchanged. In managing Defense STE, DOD: consolidates annual Defense STE requirements for each fiscal year based on projected primary sponsor requirements and submits STE requirements to Congress; establishes Defense STE allocations for each DOD-sponsored FFRDC and provides associated funding limitations to each primary sponsor; monitors Defense STE usage and associated obligations; and provides an annual report to Congress at the end of each fiscal year outlining the Defense STE funded and associated DOD funds obligated for each FFRDC. In addition to Defense STE, FFRDCs may support DOD intelligence activities under the Military Intelligence Program and the National Intelligence Program. Oversight for STE usage for these programs is provided by the Office of the Under Secretary of Defense for Intelligence and Office of the Director of National Intelligence, respectively. Military Intelligence Program and National Intelligence Program STE funding may not be used to support Defense STE requirements. In October 2008, we reported that Congress implemented the Defense STE ceiling during the 1990s in response to concerns that DOD was inefficiently using its FFRDCs. In addition, we found that STE ceilings aimed to ensure that FFRDC work was appropriate and that resources, which were limited, were being used on DOD’s highest priorities. In December 2018, we reported that officials in the Office of the Secretary of Defense’s Studies and FFRDC Management Office stated that the ceiling significantly constrains the use of DOD’s FFRDCs and that DOD customer demand for FFRDC services is significantly greater than the annual ceiling set by Congress. Further, officials indicated at that time that FFRDC-related work must be deferred to later years when the limits are reached, since there are no other legally compliant alternatives capable of fulfilling these requirements. We did not make any recommendations related to this issue. Following the completion of FFRDC work, the primary sponsor, with assistance from the work sponsor, reviews FFRDC performance in written assessments via questionnaires. In addition, the primary sponsor assesses FFRDC performance annually, addressing the technical quality, responsiveness, value, and timeliness of the work performed. Some of the information from the annual reviews may be used in support of the comprehensive review, such as to demonstrate the efficiency and effectiveness of the FFRDC in meeting the primary sponsor’s needs. From fiscal years 2013 through 2018, total DOD obligations to the 10 DOD-sponsored FFRDCs generally increased annually from about $2.7 billion in fiscal year 2013 to approximately $3.2 billion in fiscal year 2018. Approximately 70 percent of total annual DOD obligations to DOD- sponsored FFRDCs between these fiscal years went to support non- intelligence programs and were comprised of DOD obligations associated with utilized Defense STE, or Defense STE obligations. Specifically, DOD Defense STE obligations ranged from about $1.9 billion in fiscal year 2013 to $2.2 billion in fiscal year 2018, with S&A Centers representing approximately 18 percent of these obligations. In addition to DOD Defense STE obligations, about 30 percent of total DOD obligations to DOD-sponsored FFRDCs between fiscal years 2013 through 2018 went towards other FFRDC-related activities and costs, such as intelligence program activities through the Military Intelligence Program and National Intelligence Program and capital equipment costs. Figure 1 shows DOD obligations by fiscal year to DOD-sponsored FFRDCs. For fiscal years 2013 to 2018, the FFRDCs we reviewed in-depth—DOD’s S&A Centers—collectively accounted for about 18 percent of DOD Defense STE obligations annually, whereas Research and Development Laboratory FFRDCs and Systems Engineering and Integration Centers accounted for 27 and 55 percent, respectively (see figure 2). DOD Defense STE obligations to S&A Centers rose from about $320 million in fiscal year 2013 to approximately $380 million in fiscal year 2018 totaling about $2.3 billion during this period. Within each S&A Center, obligations remained relatively constant over the 6 years, with obligations for some FFRDCs higher than obligations for others. For example, on average DOD obligated about $134 million annually to IDA between fiscal years 2013 through 2018, whereas DOD obligated approximately $39 million annually to RAND Arroyo Center during this timeframe. DOD Defense STE obligations to S&A Centers were almost entirely awarded to support research projects requested by DOD. In some cases, work was done in response to congressional direction. For example, RAND Project Air Force (PAF) initiated a fiscal year 2017 independent review and assessment of the Ready Aircrew Program to respond to requirements outlined in the National Defense Authorization Act of Fiscal Year 2017. Overall, according to information provided by DOD sponsors and FFRDC representatives, between fiscal years 2013 through 2017, S&A Centers began work on about 600 research projects annually on behalf of DOD, with about 93 percent of these projects initiated at the request of DOD. The dollar value of these S&A Center projects ranged from about $2,000 to $11 million between fiscal years 2013 through 2017. Sponsoring agreements note and primary sponsors reported in comprehensive reviews that S&A Centers are utilized because of DOD’s strategic relationships with FFRDCs. As described in the FAR, FFRDCs meet special, long-term research or development needs of the sponsoring agencies. Sponsoring agreements with S&A Centers outline the importance of strategic relationships that have helped these FFRDCs to develop and maintain in-depth knowledge of their sponsors’ and users’ programs and operations. In our review of S&A Center sponsoring agreements and comprehensive reviews, we identified that strategic relationships between sponsors and S&A Centers are generally characterized by the stability of long-term capabilities in subject areas important to DOD, access to sensitive and proprietary data and information, and objectivity in the form of freedom from conflicts of interest. These documents also indicate that strategic relationships enable S&A Centers to maintain in-depth knowledge of work sponsor programs and operations. For example, in the 2015 sponsoring agreement between the Army and RAND Arroyo Center, the sponsoring agreement states that both the Army and RAND Arroyo Center share a strategic relationship, and that the RAND Arroyo Center is structured to maintain strong analytic expertise related to Army policy and operations. In addition, the sponsoring agreement outlines the importance of RAND Arroyo Center’s continuity of expertise to the Army, long-term research efforts, and high-quality staff. Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) officials told us that S&A Centers are oftentimes chosen to perform work for DOD due to unique long-term strategic relationships with sponsors for independent and knowledgeable expertise within core competencies to address sponsors’ specific analytic requirements. In some cases, these strategic relationships date back to World War II. Regarding these strategic relationships, OUSD(A&S) officials also told us the primary sponsor has a degree of control over an FFRDC’s business affairs that can limit the risks of organizational conflicts of interest at FFRDCs. DOD also cited strategic relationships between DOD and S&A Centers as a reason for using S&A Centers when initiating projects we reviewed. For example: Prior to initiating a 2016 assessment of the impact of long-term fiscal trends on Army capabilities, the Army determined RAND Arroyo Center was uniquely qualified to conduct the research because the project required knowledge of defense planning scenarios that would have given an industry contractor a competitive advantage, potentially leading to a conflict of interest. The Army also identified RAND Arroyo Center’s long-standing expertise on security cooperation when requesting a fiscal year 2013 study on assessing value in Army security cooperation as a reason RAND Arroyo Center was uniquely suited to complete the study. Navy primary sponsor officials identified the long-term relationship between CNA, the FFRDC, and the Navy, which has led to broad subject-matter expertise in naval matters, as a reason they used CNA for the fiscal year 2016 study on the assessment of the effects of possible policy changes to a career track program for military officers trained to work with other military services. CNA leadership chose two researchers to lead the effort, one of which had prior experience in this area. An OUSD(A&S) official cited RAND National Defense Research Institute’s (NDRI) longstanding portfolio on military workforce issues as a reason for using RAND NDRI for a fiscal year 2017 study on the military’s 40-year pay table. An official told us that RAND NDRI’s prior work in this area would allow for a quicker response and more in- depth analysis to respond to the work request. In addition to the strategic relationships, sponsoring agreements and comprehensive reviews cited FFRDC core competencies as key factors in establishing and continuing relationships with S&A Centers, which is consistent with provisions outlined in DOD Instruction 5000.77. The DOD instruction states that FFRDCs maintain long-term competencies and capabilities to meet DOD needs that cannot be met by government or other private sector resources as effectively, and these competencies derive from the sponsor’s analytical requirements. In general, core competencies include expertise in engineering, research and development, and analysis, and are further described in FFRDC sponsoring agreements and comprehensive reviews. For example: The Navy 2015 comprehensive review of CNA states that CNA satisfies the Navy’s need for highly specialized skills and competencies in Navy warfighting and warfighting support— particularly research staff from CNA’s studies and analyses division— to accomplish their operational missions. The 2019 sponsoring agreement between DOD’s OUSD(A&S) and IDA outlined the need for technical and analytical support, citing IDA’s four core competencies as the scope of work of the FFRDC: systems and capabilities evaluations, technology assessments, force and strategy assessments, and resource and support analyses. The Army 2010 and 2014 comprehensive reviews of RAND Arroyo Center stated that RAND Arroyo Center has currency in all requisite Army proficiencies, provides a multidisciplinary research process that integrates and applies competencies with an assurance of consistently high quality, and also has the ability to apply competencies with expedience when an Army request for analytic support requires a quick response. OUSD(A&S)’s sponsoring agreement with RAND NDRI defines RAND NDRI’s research capability and core competencies such as, but not limited to, global and national security, defense acquisition, intelligence, and system risk management as means to satisfy essential needs of the FFRDC’s work sponsors for policy research and analysis. Primary sponsor officials we spoke with also told us that FFRDC staff skills and knowledge related to FFRDC core competencies are important to DOD. For example: Navy officials said CNA is uniquely suited to perform work for the Navy due to CNA’s core competencies relating to maritime defense analysis and how those competencies align with Navy goals and requirements. Army officials told us that RAND Arroyo Center staff has extensive background knowledge and analytical skills relating to reserve affairs, manpower policy, and war game analysis, among other things, in providing work for the Army. Air Force officials told us that RAND PAF has robust knowledge of Air Force processes and maintains top staff and researchers in each core competency. OUSD(A&S) officials also told us that sponsors and FFRDCs have a relationship in which sponsors rely on FFRDCs for independent and knowledgeable expertise within their core competencies to address sponsors’ analytic requirements. As shown in figure 4, DOD’s S&A Center primary sponsors identified 3 to 15 core competencies in their sponsoring agreements with each S&A Center. DOD cited FFRDCs’ core competencies as factors that contributed to using S&A Centers when initiating projects we reviewed, as provided by DOD instruction. For example: When initiating a fiscal year 2016 CNA assessment on the effects of possible policy changes to a career track program for military officers who are trained to work with other military services, DOD’s Office of the Under Secretary of Defense for Personnel and Readiness cited CNA’s core competencies of analysis of maritime resources; maritime program planning; and maritime policies, strategies, and doctrines as justification for using CNA to perform the work, among other things. In initiating a fiscal year 2014 IDA analysis on satellite ground control, DOD’s Office of the Deputy Assistant Secretary of Defense for Space and Intelligence cited IDA’s core competencies related to technology, such as systems and capabilities evaluations, as justification for using IDA for the research. DOD reports that it uses studies and analyses to inform decision-making; shape guidance, policies, and training; and identify opportunities to save time and money. Inform decision-making. For example, a 2016 study conducted by the RAND Arroyo Center on linking Army cost and performance found that the Army needed an updated tool to inform more strategic allocation of its resources. Among other things, the study contributed to updated strategies to measure the Army’s performance regarding force structure and readiness as well as the cost implications for these activities. According to an Army official, the study contributed to the development of updated Army metrics for cost and other performance indicators. In another example, a 2013 research project conducted by RAND NDRI on effectiveness measures of a DOD program to reduce the threat from infectious diseases and biological weapons developed and recommended two sets of metrics to improve program evaluation efforts. According to OUSD(A&S) officials, DOD used the recommended metrics to develop program performance measures. Shape guidance, policies, and training. For example, a 2013 study conducted by RAND NDRI on the root causes related to DOD weapons programs cost overruns found, among other things, that DOD needed to re-examine its assumptions when estimating a program’s cost, schedule, and technical performance. OUSD(A&S) officials told us the study contributed to DOD’s decision to update its policy, processes, management practices, and training curriculum so as to improve estimates. In another example, a 2013 study conducted by RAND Arroyo Center on the value of security missions conducted by the Army’s geographically aligned forces found that the use of these forces improved the efficiency of security planning and preparation and recommended a range of process and planning improvements for the Army. According to an Army official, the Army used several of the recommendations to update guidance for preparation and planning for future missions involving regionally aligned forces. Identify opportunities to improve efficiency. For example, a 2013 study conducted by RAND Arroyo Center on marketing and resources needed for Army recruiting efforts identified strategies aimed at optimizing the Army’s annual spending, estimated at nearly $1 billion for recruiters, enlistment bonuses, and television advertising. An Army official said that the Army has used the recruiting tool developed by RAND Arroyo Center for this study to make decisions and the Army estimates the tool can reduce costs by potentially hundreds of millions of dollars annually. In another example, DOD reported in its 2015 comprehensive review of RAND PAF that a 2010 study conducted by RAND PAF on aircraft maintenance at centralized repair facilities found that these facilities should be consolidated. According to the Air Force primary sponsor, this study helped the Air Force make decisions that led to saving up to $300 million annually as well as saving time on aircraft inspections. In terms of assessing the outcomes of research, we found that DOD primary sponsors took steps to assess the value of S&A Center research and the centers. The DOD instruction requires that primary sponsors assess the efficiency and effectiveness of the FFRDC in meeting DOD needs in comprehensive reviews, including a review and summary of FFRDC accomplishments and their effectiveness utilizing factors such as quality and timeliness of the work produced and value of projects assessed. Additionally, the DOD instruction provides that the factors of technical quality, responsiveness, value, and timeliness be addressed in annual performance reviews. DOD’s FFRDC Management Plan—which preceded the DOD instruction and was in effect until the DOD instruction became effective in January 2018—also required primary sponsors to annually assess the value of FFRDC performance, among other factors, and include summaries of these annual assessments in comprehensive reviews. Primary sponsors generally assess the value of S&A Center research through annual performance reviews (through performance evaluation questionnaires to solicit feedback from work sponsors) and comprehensive reviews. To monitor the execution of research projects, primary sponsors regularly solicit work sponsor input regarding S&A Centers’ performance, including the value, technical quality, responsiveness, and timeliness of the work performed. Time frames for soliciting this input vary by primary sponsor but most do this annually. These questionnaires include one or more sections for work sponsors to add comments about S&A Center work and allow work sponsors to rate S&A Center performance. Some of these questionnaires use a numerical scale. For example, the Air Force questionnaire sent to RAND PAF work sponsors asks respondents to rate project value using a scale from 1 through 10, with 1 indicating “very poor” and 10 “very good.” The OUSD(A&S) questionnaire sent to IDA work sponsors asks respondents to rate the value of IDA’s work and results using a scale from 1 through 5, where 1 symbolizes either “strongly agree” or “outstanding performance” and 5 symbolizes “strongly disagree” or “poor performance.” FFRDC primary sponsors conduct comprehensive reviews at least every 5 years to, among other things, identify the accomplishments made by each FFRDC. In August 2014, we reported that DOD officials described the comprehensive review process as an opportunity to take a broad assessment of the FFRDC and its key competencies beyond the annual assessments of FFRDCs. Included in these comprehensive reviews is a summary of FFRDC accomplishments and effectiveness in meeting work sponsors’ needs since the last comprehensive review. In our examination of the most recent comprehensive reviews for each of the five S&A Centers, we found that the comprehensive reviews summarize the results from the performance evaluation questionnaires and assessed the value of the research in varying ways. For example, the Army questionnaire to RAND Arroyo Center work sponsors assessed value in terms of whether a project was worth the investment monetarily. OUSD(A&S) questionnaires sent to work sponsors assessed the value of IDA work in relation to whether the results were useful, consistent with the level of effort, and if IDA brought competence, expertise, and helpful perspectives to the issues. The Army reported in the 2014 comprehensive review of RAND Arroyo Center that between fiscal years 2010 through 2013, work sponsors provided overwhelmingly positive results that RAND Arroyo Center performance was “worth the level of effort.” DOD’s Office of the Under Secretary of Defense for Acquisitions, Technology, and Logistics—RAND NDRI’s primary sponsor prior to the DOD reorganization in 2018—reported in the 2014 comprehensive review of RAND NDRI that in fiscal year 2013, work sponsors provided overwhelmingly positive results that RAND NDRI performance provided long-term value. We also found that comprehensive reviews included anecdotal examples of how DOD used S&A Center research. For example, the Army 2014 comprehensive review of RAND Arroyo Center highlighted 53 of 114 research projects completed between fiscal years 2010 through 2013 to demonstrate how RAND Arroyo Center work met Army research requirements. Likewise, the Air Force primary sponsor’s 2015 comprehensive review of RAND PAF highlighted 28 of 207 research projects completed between fiscal years 2010 and 2014 to demonstrate how the Air Force leveraged RAND PAF work to improve efficiency in the department. An Air Force official told us that RAND PAF, and not the Air Force, collected 28 project examples for the purposes of the comprehensive review. Another potential way to assess the outcomes of research is to track to what extent a research project’s recommendations were implemented, and how. Neither DOD nor primary sponsors currently track the implementation of S&A Center research project recommendations. While primary sponsors are not tracking recommendations, in 2015 one of the S&A Centers—RAND PAF—began tracking recommendations made to the Air Force. According to a RAND PAF representative, the tracking system captures the issue, approach, conclusions, opportunities, and outcomes for each completed project. A RAND PAF representative told us that tracking recommendations is useful for demonstrating the value that RAND PAF provides the Air Force. In April 2019, a Navy official told us that the Navy is working on a database to track CNA reports, including recommendations, report topic, work sponsor, and project funding, among other things, to prevent duplication of requests. The Navy official said this effort is expected to be completed in 2019. Both OUSD(A&S) and Army officials told us that while they do not currently track recommendations, they are considering doing so as part of their oversight efforts. Further, Army officials told us that it is important for the sponsor that implements the recommendations to track how and whether that information was used. While tracking recommendations is useful according to some primary sponsors, some DOD officials cautioned that tracking recommendations would not provide insights into the overall value across all S&A Center research. DOD officials told us that recommendations are only one potential outcome of S&A Center research and that the value of a study may not be specifically linked to a recommendation. For example, Navy officials said that CNA’s projects may present the Navy with options and associated courses of action rather than formal recommendations, and DOD officials also told us that S&A Center work can provide value to DOD that is not always represented by recommendations, such as presentations or research aimed at contributing to the understanding of a particular issue, but without specific recommendations. In February 2019, DOD’s Office of the Under Secretary of Defense for Personnel and Readiness issued a memorandum related to the oversight of the Personnel and Readiness Studies and Analysis program. The memorandum tasked the program director with developing a studies and analysis program framework that improves accountability for project results and the implementation of study recommendations. Personnel and Readiness also issued a template “action memo” providing for an executive summary of completed projects as well as implementation plans delineating recommendations made, implementation approach, and plan of action for each recommendation. According to a senior Personnel and Readiness official, work sponsors with reports that were completed or published since September 2018 are subject to these actions. This official noted that the purpose is to increase accountability of the Personnel and Readiness staff regarding the use of FFRDCs and to develop an overall picture of the value proposition of FFRDC research. It is too soon to tell to what extent these memorandums will affect DOD’s insights on its implementation of S&A Center recommendations. What are Conflicts of Interest? A Personal Conflict of Interest exists when an individual employed by an organization is in a position that could materially influence research findings or recommendations and may lack objectivity due to their financial interests, personal activity, or relationships. An Organizational Conflict of Interest exists when, because of other interests or relationships, an entity is unable or potentially unable to render impartial assistance or advice to the government or the entity might have an unfair competitive advantage. The Federal Acquisition Regulation (FAR) requires an FFRDC to conduct its business in a manner befitting its special relationship with the government and to be free from conflicts of interest. To perform its responsibilities to the sponsoring agency, an FFRDC and its employees have access beyond that which is common in a normal contractual relationship, including access to sensitive and proprietary data and information, equipment, and property. To accomplish this, the FAR and DOD instruction state that an FFRDC must be free from conflicts of interest and fully disclose financial and outside interests to the sponsoring agency. Conflicts of interest can be personal or organizational. Personal conflicts of interest can be, but are not limited to, financial interests of the employee or close family members, other employment, gifts, consulting relationships, other forms of research funding or support, investment in the form of stock or bonds ownership, real estate, or business ownership. Additionally, the DOD instruction outlines steps FFRDC parent organizations should take to prevent and mitigate conflicts of interest. These steps include, but are not limited to, having procedures in place to screen employees for potential conflicts of interest; requiring disclosure of financial and other interests that might affect the employee’s objectivity; establishing policies and procedures to protect proprietary, privileged, and sensitive information from disclosure; and reporting any conflicts of interest to the applicable contracting officer or contracting officer’s representative and the primary sponsor as soon as it is identified. See figure 5 for DOD’s conflict of interest elements outlined in the DOD instruction that primary sponsors are to require from FFRDC parent organizations. Each of the five S&A Centers we reviewed has corporate-wide conflict of interest policies and practices which incorporate various key elements of the DOD instruction. For example, all S&A Center policies we reviewed have measures that require personnel to protect proprietary, privileged, and sensitive information. S&A Center representatives told us they undertake various approaches in practice that meet key elements in the DOD instruction in order to ensure they operate in the public interest with objectivity and independence. For example: Reviewing all personnel annually or on a task-by-task basis for conflicts of interest. Generally, representatives we spoke with from the five S&A Centers address conflicts of interest annually or task-by- task, which is an option outlined in the DOD instruction. For instance, RAND representatives said they perform task-by-task, instead of annual, conflict of interest reviews because staff do not know which projects they will be working on during the year. In addition, IDA and RAND representatives told us they screen employees upon hire as well as when an employee initiates a new project, and both IDA and RAND have automated their screening processes. IDA representatives explained that their automated tool screens personnel at the initiation of each project, by including, for example, a process to determine if staff assigned to a project have any affiliations with industry or companies and competitors in the particular field of study. If staff or members of their households do have affiliations, IDA may issue a waiver if the financial interest (such as but not limited to stocks, stock options, and bonds) in a single company is below $15,000, the threshold for disclosure outlined in the DOD instruction. IDA representatives also told us that IDA staff are required to self- report any changes to previous financial interest disclosures during the year. In another example, RAND representatives said their automated conflict of interest tool screens for conflicts of interest by comparing areas of work RAND performs to similar areas in the private sector. Additionally, the system will identify any staff that have not submitted a conflict of interest statement within a year. Providing initial and annual conflict of interest training for all personnel. S&A Center representatives told us that they perform training related to or specifically covering conflicts of interest in varying ways. IDA’s corporate-wide conflict of interest policy includes initial and annual conflict of interest training elements, as outlined in the DOD instruction. For example, IDA’s policy states that all employees are to participate in conflict of interest training upon initial hire, and in annual refresher training thereafter. The other four S&A Centers did not explicitly include annual conflict of interest training in corporate-wide policies, but representatives told us they provide annual ethics training, which includes training on conflicts of interest, to their employees. For example, CNA representatives told us they provide ethics and conflicts of interest training to staff, which is required by their contract with the Navy. CNA representatives told us that if CNA staff do not complete the required training, the staff will be blocked from accessing CNA’s time card system and will not receive pay until the training is complete. In another example, RAND representatives told us they have annual training that covers ethics, conflicts of interest, and culture and discrimination issues for newly hired staff. Representatives from each of the S&A Centers told us they attempt to mitigate potential conflicts of interest as soon as the potential conflicts become known and before they become a reportable conflict. For example, CNA representatives told us that in one instance, a CNA employee’s spouse worked for the Navy and CNA mitigated this potential conflict by transferring the employee to another project where the relationship did not pose a potential conflict. In another example, when a RAND employee inherited stock in the middle of a project, a potential conflict of interest was mitigated by the employee selling the inherited stock. In another instance, a RAND employee was initially staffed to a project related to an area of work a spouse worked on commercially, and RAND mitigated the potential conflict by recusing the employee from the project. We provided a draft of this report to DOD for review and comment. In its comments, DOD concurred with our findings. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or LudwigsonJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Table 2 provides detailed information on the 22 projects we selected for review. In addition to the contact named above, Janet McKelvey (Assistant Director), Andrew Burton (Analyst-in-Charge), Mallory Bryan, Lisa Fisher, and Jordan Kudrna made key contributions to this report. Additional assistance was provided by Marie Ahearn, Pete Anderson, Jenny Chanley, Joseph Cook, Julia Kennon, Tind Shepper Ryen, and Roxanna Sun.", "summary": "For decades, the government has contracted and entered into agreements to sponsor academic, nonprofit, or private organizations to operate FFRDCs. DOD military departments and other DOD components sponsor 10 FFRDCs to help develop innovative solutions to diverse national security threats. Five FFRDCs—referred to as S&A Centers—aim to provide independent analyses to support DOD policy development. Federal regulation and DOD guidance specify sponsors' oversight activities, including the establishment, use, and review of FFRDCs. A Senate Armed Services Committee report included a provision that GAO review DOD's use of FFRDCs. This report describes, among other objectives: (1) DOD obligations (in dollars) to DOD's FFRDCs from fiscal years 2013 through 2018; (2) factors that led DOD to use S&A Centers for research; and (3) how DOD used this research. GAO analyzed obligation data for DOD's 10 FFRDCs. GAO focused further review on DOD's five S&A Centers that primarily provide studies and analysis. GAO analyzed sponsoring agreements, comprehensive reviews, and 22 S&A Center research projects selected based on factors such as obtaining a mix of project costs, and interviewed DOD and FFRDC representatives. From fiscal years 2013 through 2018, the Department of Defense (DOD) obligated about $2 billion annually to 10 DOD-sponsored Federally Funded Research and Development Centers (FFRDC), excluding obligations related to two intelligence programs and capital equipment costs (such as antenna or radar systems). Of these obligations, roughly $400 million annually went to a subset of five FFRDCs called Study and Analysis (S&A) Centers. Note: Obligation amounts were not adjusted for inflation and totals may be affected by rounding. a Numbers in parentheses refer to the number of FFRDCs within each category. DOD primarily cited strategic relationships between the sponsor (the agency responsible for the overall use of the FFRDC) and the FFRDC and the core competencies of the FFRDC as factors when sponsoring S&A Centers and initiating projects. For example: Strategic relationships. The Army determined that an S&A Center was uniquely qualified to conduct a research project that required knowledge of defense planning scenarios, noting that awarding the project to an industry contractor would have given that contractor a competitive advantage. Core competencies. The Center for Naval Analyses has core competencies in Navy policy, strategy, and doctrine, among other things. S&A Centers perform hundreds of research projects annually on behalf of DOD, and DOD reported using them to inform decisions, shape guidance, and identify opportunities to improve efficiency. For example, one S&A Center's study on the causes of weapons system cost overruns found DOD needed to re-examine its assumptions when estimating program cost, schedule, and performance. DOD officials told us the study contributed to policy, process, and training updates.", "document_type": "gao"}
{"report": "VA’s mission is to promote the health, welfare, and dignity of all veterans in recognition of their service to the nation by ensuring that they receive medical care, benefits, social support, and lasting memorials. In carrying out this mission, the department manages one of the largest health care delivery systems in the United States that provides enrolled veterans with a full range of services. These services may include primary care; mental health care; and outpatient, inpatient, and residential treatment. The Veterans Health Administration (VHA), one of the department’s three major components, is responsible for overseeing the provision of health care at all VA medical facilities. Information technology (IT) is widely used and critically important to supporting the department in delivering health care to veterans. As such, VA operates and maintains an IT infrastructure that is intended to provide the backbone necessary to meet the day-to-day operational needs of its medical centers and other critical systems supporting the department’s mission. The infrastructure is to provide for data storage, transmission, and communications requirements necessary to ensure the delivery of reliable, available, and responsive support to all VA staff offices and administration customers, as well as veterans. The Office of Information and Technology (OIT) is responsible for managing the majority of VA’s IT- related functions. The office provides strategy and technical direction, guidance, and policy related to how IT resources are to be acquired and managed for the department. VA provides health care services to approximately 9 million veterans and their families and relies on its health information system—VistA—to do so. VistA has been essential to the department’s ability to deliver health care to veterans. It was developed based on the collaboration between staff in the VA medical facilities and VHA IT personnel. Specifically, clinicians and IT personnel at the various VA medical facilities collaborated to define the system’s requirements and, in certain cases, carried out its development and implementation. As a result of these efforts, the system has been in operation since the early 1980s. VistA supports a complex set of clinical and administrative capabilities. It is comprised of an architecture that ties together servers and personal computer workstations with various applications within VA facilities and the supporting infrastructure, such as data centers, storage, and messaging technologies. The core system and database code are programmed in the MUMPS programming language. Among other things, VistA contains an EHR for each patient and supports clinics and medical centers. In addition, the system provides functionality beyond the EHR and exchanges information with many other applications and interfaces. For example, the system also provides the functionality of a time and attendance program, asset management system, library, and billing system, among other things. Users interact with VistA through a number of interfaces that connect stored health data. These interfaces enable the system to communicate (send or exchange data) with other VA systems, as well as with other federal agencies (e.g., DOD), health information exchange networks, and COTS products. According to OIT officials, applications either interface with VistA directly through a messaging protocol or extract data from the system via a reporting mechanism. The Computerized Patient Record System is a graphical user interface to VistA that runs on workstations, laptops, and tablets and enables the department to support clinical workflows. Specifically, the Computerized Patient Record System enables the department to create and update an individual EHR for each VA patient. Among other things, clinicians can order lab tests, medications, diets, radiology tests, and procedures; record a patient’s allergies or adverse reactions to medications; request and track consults; enter progress notes, diagnoses, and treatments for each encounter; and enter discharge summaries. According to VHA officials, there are also more than 100 COTS products that interface with VistA. In addition to these commercial products, medical equipment or devices at local facilities may also require interfaces to the system, and these vary on a site-by-site basis. Over the last several decades, VistA has evolved into a technically complex system that supports health care delivery at more than 1,500 locations, including VA Medical Centers, outpatient clinics, community living centers, and VA vet centers. Customization of the system by local facilities has resulted in about 130 clinical versions of VistA—referred to as instances. According to the department, no two VistA instances are identical. Further, each instance is comprised of over 27,400 routines (executable modules of code), which are logically grouped into products or modules. VistA products or modules can also be comprised of one or more software applications that support health care functions, such as providing care coordination and mental health services. The department reported that there are approximately 140 to 200 products or modules that comprise the system. The 130 clinical instances of VistA are operated from four regional VA data centers. Users interact with the system through the Computerized Patient Record System. Aggregated clinical data from every instance of the system are located on servers hosted at VA’s National Data Center. Over time, VA has identified the need for enhancements and modifications to VistA in order to ensure that the system keeps up with current technology and health care delivery. However, according to the department, the system has become difficult and costly to maintain. This is a result of, for example, being programmed in MUMPS, a language for which there is a dwindling supply of qualified software developers. It is also due to years of decentralized customization of the system by staff members who were permitted to develop and implement applications at the local level. OIT and VHA serve as the technical and functional leaders, respectively, for the department’s health care delivery and, together, they have worked to develop and maintain VistA for decades. Specifically, OIT is responsible for managing the majority of VA’s IT-related functions. The office provides strategy and technical direction, guidance, and policy related to how IT resources are to be acquired and managed for the department. According to the department, OIT’s mission is to collaborate with its business partners (such as VHA) and provide a seamless, unified veteran experience through the delivery of state-of-the-art technology. The Assistant Secretary for Information and Technology/Chief Information Officer (CIO) serves as the head of OIT and is responsible for providing leadership for the department’s IT activities. The CIO also advises the Secretary regarding the execution of VA’s IT systems appropriation, consistent with the Federal Information Technology Acquisition Reform Act. For fiscal year 2019, the department has been appropriated $4.1 billion for IT. According to VA’s budget documentation, about $1.2 billion of this amount is intended to support IT staffing and associated costs for approximately 8,100 full-time employees. VHA provides information and expertise to OIT to support the department’s health-related information systems. For example, VHA officials help identify clinical and business needs used to inform IT requirements development. The Under Secretary for Health is the head of VHA and is supported by the Principal Deputy Under Secretary for Health, four Deputy Under Secretaries for Health, and nine Assistant Deputy Under Secretaries for Health. After nearly 2 decades of pursuing multiple efforts to modernize VistA, in June 2017, the former VA Secretary announced that the department planned to acquire the same EHR system that DOD is acquiring—Cerner Millennium. According to the department, it has chosen to acquire this product because Cerner Millennium should allow VA’s and DOD’s patient data to reside in one system, thus, potentially reducing or eliminating the need for manual and electronic exchange and reconciliation of data between two separate systems. Accordingly, the department awarded an indefinite delivery, indefinite quantity contract to Cerner Corporation in May 2018 for a maximum amount of $10 billion over 10 years. Cerner is to replace the 130 instances of VistA with a standard COTS system to be implemented across VA. This new system is to support a broad range of health care functions including acute care, clinical decision support, dental care, and emergency medicine. When implemented, the new system will be expected to become the authoritative source of clinical data to support improved health, patient safety, and quality of care provided by VA. The Electronic Health Record Modernization (EHRM) program is responsible for managing the Cerner contract implementation. For fiscal year 2019, the program was appropriated about $1.1 billion for planning and managing the transition from VistA to Cerner. Further, the department has estimated that an additional $6.1 billion in funding, above the Cerner contract amount, will be needed to fund additional project management support supplied by outside contractors, government labor costs, and infrastructure improvements over the 10- year contract period. VA plans to deploy the new EHR system at three initial operating capability sites within 18 months of October 1, 2018, with a phased implementation of the remaining sites over the next decade. Each VA medical facility is expected to continue using VistA until the new system has been deployed. The three initial deployment sites, located in the Pacific Northwest, are the Mann-Grandstaff, American Lake, and Seattle VA Medical Centers and related clinical facilities that operate the same instances of VistA. These are the first locations where the system is expected to “go live.” The task order to deploy the Cerner system at the three initial sites provides a detailed description of the steps Cerner needs to take in order to reach initial operating capability at the Mann-Grandstaff site in March 2020, and at the Seattle and American Lake sites in April 2020. According to the schedule, the initial operating capability sites are expected to be operational by July 2020. In order to maintain internal control activities over an IT system and its related infrastructure, organizations should be able to define physical and performance characteristics of the system, including descriptions of the components and the interfaces. Further, consistent with GAO’s Cost Estimating and Assessment Guide, a comprehensive system definition should identify customization and the environment in which the system operates. While defining a complex IT system can be challenging, having an adequate understanding of its characteristics will better position the organization to comprehensively project and account for costs over the life of a system or program as well as identify specific technical and program risks. Definition of VistA remains important because VA plans to continue using the system during the department’s decade-long transition to the Cerner system. VA maintains multiple documents and a database that describe parts of VistA, including various components and interfaces. However, despite these existing sources, OIT officials acknowledged that there is no comprehensive definition of the VistA system. Consequently, VA has completed a number of efforts to better define VistA and understand the environment in which it operates and additional work is planned in the future. Specifically, VA has documented descriptions of the system, including the components that comprise it. These descriptions are documented in multiple sources: the VA Monograph, VA Systems Inventory, and VA Document Library. The VA Monograph is a document maintained by OIT that provides an overview of VistA and non-VistA applications used by VHA. According to VHA officials, the VA Monograph is the primary document that describes the components of the system. The Monograph describes VistA in terms of modules. For modules identified, including VistA modules, information such as the associated business functions, VA Systems Inventory identification number, and a link to the VA Document Library for additional technical information are provided. The VA Systems Inventory is a database maintained by OIT that identifies current IT systems at the department, including systems and interfaces related to VistA. For systems identified, the database includes information such as the system name, the system status (i.e., active, in development, or inactive), and related system interfaces. The VA Document Library is an online resource for accessing documentation (i.e., user guides and installation manuals) on the department’s nationally released software applications, including VistA. VA has taken additional steps to further define the system. For example, EHRM program officials recognized the need to further understand the customization of VistA components at the various medical facilities and have conducted analyses to do so. These analyses include: Variance analysis: As part of its VistA Evolution program, which has focused on standardizing a core set of VistA functionality, the department implemented a process to compare the instances of VistA installed at sites to the Enterprise Standard version. The results of this analysis allowed the department to assess the criticality of each variance, which is expected to help with VA’s transition to the Cerner system. Module analysis: EHRM program subject matter experts undertook an analysis that involved reviewing and assessing capabilities provided by VistA modules. This analysis enabled department officials to determine whether the capability provided by a VistA module could be provided by the Cerner system, or whether another COTS solution would be required to support this function going forward. Visual mapping: EHRM program officials also directed an analysis that involved developing a notional visual mapping of VA’s health care applications, components, and supporting systems within the health delivery environment. The results of this analysis provided a description of the current state of one instance of VistA and the VA health environment, which is intended to inform the department of possible opportunities for business process and IT improvements as it proceeds with the Cerner acquisition. Nevertheless, even with these analyses, VA has not yet fully defined VistA, including, for example, identifying performance characteristics of the system and describing the environment in which it operates. The department’s three sources that describe VistA and the additional analyses undertaken do not provide insight into site specific customizations of the system. For example, the VA Monograph does not include information on module customization at local facilities. In addition, according to OIT officials, the systems inventory does not reflect differences among the 130 different instances of VistA and does not take into consideration regional and local customizations of related components. Further, the visual mapping analysis noted that there was not full insight of the intertwined structure of data and applications or the various local customizations of VistA. EHRM program officials stated that they have not been able to fully define VistA and understand all local customizations due to the decentralization of the development of the system and its evolution over more than 30 years. They explained that VistA’s complexity is partly due to the various instances of the system, compounded by local customizations, which have resulted in differences in VistA instances operating at various facilities. According to EHRM program documentation, Cerner’s contract calls for the company to conduct comprehensive assessments to capture the current state of technical and clinical operations at specific facilities, as well as identify site-specific requirements where the Cerner system is planned to be deployed. As of June 2019, Cerner had completed site assessments for the three initial operating capability sites in the Pacific Northwest and had planned additional assessments at future deployment sites. The initial site assessments included, among other things, an assessment of the unique VistA instances and the environment in which the system operates. The continuation of planned site assessments should provide a thorough understanding of the 130 VistA versions, help the department better define VistA, and position it for transitioning from VistA to Cerner’s COTS solution. When using public funds, an agency must employ effective management practices in order to let legislators, management, and the public know the costs of programs and whether they are achieving their goals. To make those evaluations for a program or for a system as large and complex as VistA, a complete understanding of the system and reliable cost information is required. By following a methodology and utilizing reliable data, an agency can ensure that all costs are fully accounted for, which in turn, better informs management decisions, establishes a cost baseline, and enhances understanding of a system’s performance and return on investment. Fundamental characteristics of reliable costs are that they should be accurate (unbiased, not overly conservative or optimistic), well- documented (supportable with source data, clearly detailed calculations, and explanations for choosing a particular calculation method), credible (identifying any uncertainty or biases surrounding data or related assumptions), and comprehensive (costs are neither omitted nor double counted). Identification of VistA’s costs remains important because VA plans to continue using the system during the department’s transition to the Cerner system over the next decade. VA identified costs for VistA and its related activities adding up to approximately $913.7 million, $664.3 million, and $711.1 million in fiscal years 2015, 2016, and 2017, respectively—for a total of about $2.3 billion over the 3 years. However, the department could not sufficiently demonstrate the reliability of certain costs that were identified. In addition, VA identified other categories of VistA-related costs, but omitted these costs from the total. Of the $2.3 billion total costs for VistA, VA demonstrated that only approximately $1 billion of these costs were reliable. Specifically, OIT officials identified VistA-related costs within seven categories. The officials were able to sufficiently explain why these categories were included in the development and sustainment costs for VistA and how they were documented by the department; the officials also presented detailed source data for our examination. As a result of our review, we determined that the cost data for these seven categories were accurate, well-documented, credible, and comprehensive and, thus, sufficiently reliable. Table 1 provides a summary of the program costs identified for VistA by OIT and VHA for fiscal years 2015 through 2017 that we determined to be reliable. As shown in the table, VA identified costs for the following seven categories for fiscal years 2015 through 2017: VistA Evolution – The VistA Evolution program costs were associated with VistA strategy, system design, product development, and program management. These costs totaled approximately $549.6 million. Interoperability – The Interoperability program focused on sharing electronic health data between VA and non-VA facilities, including private sector providers and DOD. For example, interoperability costs were associated with architecture, strategy, the Interagency Program Office, product development, and program management. These VistA-related costs totaled approximately $140.2 million. Virtual Lifetime Electronic Record (VLER) Health – This program focused on streamlining the transition of electronic medical information between VA and DOD. These VistA-related costs were associated with product development and program management and totaled approximately $81.2 million. Contracts – Contract costs for VistA Evolution included VHA’s obligations associated with workload management, change management, clinical requirements, and clinical interoperability. These VistA-related costs totaled approximately $202.8 million. Intergovernmental personnel acts – Intergovernmental personnel acts are agreements for the temporary assignment of personnel between the federal, state, and local governments; colleges and universities; Indian tribal governments; federally funded research and development centers; and other eligible organizations. These costs accounted for VHA’s need to use outside experts from approved entities for limited periods of time to work on VistA Evolution assignments. The total VistA-related costs were approximately $2.4 million. Memorandums of understanding – According to VHA, memorandums of understanding are agreements used by the administration to obtain the services of personnel between VA entities for VistA-related activities. These agreements accounted for approximately $2.3 million. Pay – Costs in this category included salaries for VHA staff who worked on VistA-related projects as well as travel, training, and supply costs associated with employment. These costs totaled approximately $34.1 million. However, VA was not able to sufficiently demonstrate the reliability of approximately $1.3 billion in costs related to VistA. Specifically, OIT officials identified the additional legacy VistA costs that generally fell into three categories: Legacy VistA: Infrastructure, hosting, and system sustainment – Legacy VistA costs are generally related to the maintenance of fully operational items, such as VistA Imaging and Fileman—two key components related to VistA’s operation. The costs also included obligations for costs related to hosting health data in both VA and non-VA facilities. The OIT officials and subject matter experts estimated these total costs to be approximately $343 million during fiscal years 2015 through 2017. However, we were not able to determine the reliability of these costs because, for example, source data were not well documented; changes in the cost information provided to us during our review indicated that the cost data may not be credible; and subject matter experts were unclear about how to separate VistA costs from non- VistA costs. Related software – Related software costs are associated with the software supporting, or closely integrated with, VistA that were identified by EHRM officials, yet not tracked directly for one of the VistA-related programs. Both OIT and VHA identified software licensing costs as VistA-related obligations. The EHRM program reported these costs to be approximately $389 million in total during fiscal years 2015 through 2017. However, we were not able to determine the reliability of the costs in this category for a variety of reasons, including that source data were not well documented. In addition, VA officials were not clear regarding how the total amounts in each category should be divided between OIT and VHA. Given this confusion, we were not able to determine if the costs were fully accurate or credible. OIT personnel (pay and administrative) – According to EHRM officials, OIT does not track labor costs by program. Instead, the department provided estimations of the amount of salaries paid to OIT government staff working on activities such as VistA Evolution, program management, and overall support of VistA and related applications. OIT personnel costs were estimated by the EHRM program office to be approximately $544 million total during fiscal years 2015 through 2017. However, we were not able to determine the reliability of costs in this category because assumptions made for estimating the personnel and salary costs were not well documented and could not be verified. In addition, VA omitted certain VistA costs from the total costs identified for fiscal years 2015, 2016, and 2017. Specifically, VA omitted the following costs: Additional hosting – OIT officials stated that additional costs related to hosting health data by an outside vendor, as well as hosting backup VistA instances at each of the medical center sites, should also be included in the total costs for VistA; however, VA omitted these costs from the total for fiscal years 2015 through 2017. Specifically, according to the officials, calculating costs for these hosting activities requires subject matter experts to identify equipment, space, utilities, and maintenance costs for resources allocated specifically for VistA. However, the department has not yet developed a methodology to calculate the costs. The officials said they were working on identifying a reliable approach for calculating these costs in the future. Data standardization and testing – OIT officials stated that additional costs related to work on clinical terminology mapping and functional testing were not included in the total costs for VistA for fiscal years 2015 through 2017. This work related to mapping existing clinical data to national standards and making updates to VistA or the Joint Legacy Viewer and included mapping data and building test scripts and reports. OIT officials noted that this work had been critical to the VistA Evolution program, but they did not provide actual cost data in this category. The lack of sufficiently reliable and comprehensive costs indicates that the department is not positioned to accurately report the annual costs to develop and sustain VistA. This is due in part to VA not following a well- documented methodology that describes how the department determined the total costs for the system. In lieu of a methodology, OIT officials said that leadership and staff from the program took efforts to identify and track the cost components and contracts associated with the system. However, they noted that costs associated with VistA were not all clearly labeled as VistA in an IT system and it was necessary to estimate other costs. The officials were also unable to verify how VistA-related costs were separated from other department costs in all areas and subject matter experts were not consistently familiar with the estimation methods employed and how VistA was defined for the purposes of calculating costs. Further, VA officials noted that they were still working on the best approach to identifying and calculating omitted costs. Without documenting the methodology for what costs are to be included and how they were identified and calculated, VA’s total does not accurately reflect the development and sustainment costs for VistA. As a result, the department, legislators, and the public do not have the comprehensive, reliable information needed to understand how much it actually cost to develop and maintain the system. Further, VA does not have the reliable information needed to make critical management decisions for sustaining the many versions of VistA over the next 10 years until the Cerner system is fully deployed. In our report, we are making a recommendation for VA to improve its reporting of VistA’s costs. Specifically, we are recommending that the department develop and implement a methodology for reliably identifying and reporting the total costs of VistA. The methodology should include steps to identify the definition of VistA and what is to be included in its sustainment activities, as well as ensure that comprehensive costs are corroborated by reliable data. In written comments on a draft of the report, the department agreed with the recommendation and stated that it will provide the actions it plans to take to address this recommendation within 180 days. In conclusion, although VA is not likely to be positioned to retire VistA for at least another 10 years, the department lacks the comprehensive and reliable cost information needed to make critical management decisions for sustaining the system. As the department continues to work toward acquiring a new electronic health record, it will be important for VA to take actions to address our recommendation for improving the reporting of VistA costs. Doing so is essential to helping ensure that decisions related to the current system are informed by reliable cost information and that there is an accurate basis for reporting on the return on its investment for replacing VistA. Chair Lee, Ranking Member Banks, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staffs have any questions about this testimony, please contact Carol C. Harris, Director, Information Technology Management Issues, at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony statement. GAO staff who made key contributions to this testimony are Mark Bird (Assistant Director), Rebecca Eyler, Jacqueline Mai, Monica Perez-Nelson, Scott Pettis, Jennifer Stavros-Turner (Analyst in Charge), and Charles Youman. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VA provides health care services to approximately 9 million veterans and their families and relies on its health information system—VistA—to do so. However, the system is more than 30 years old, is costly to maintain, and does not fully support exchanging health data with DOD and private health care providers. Over nearly 2 decades, VA has pursued multiple efforts to modernize the system. In June 2017, the department announced plans to acquire the same system—the Cerner system—that the Department of Defense is implementing. VA plans to continue using VistA during the department's decade-long transition to the Cerner system. GAO was asked to summarize its report that is being released today which discusses, among other things, (1) the extent to which VA has defined VistA and (2) the department's annual costs to develop and sustain the system. In preparing the report on which this testimony is based, GAO analyzed documentation that defines aspects of VistA and identifies components to be replaced; and evaluated the reliability of cost data, including funding obligations associated with the development and sustainment of VistA for fiscal years 2015, 2016, and 2017. The Department of Veterans Affairs (VA) has various documents and a database that describe parts of the Veterans Health Information Systems and Technology Architecture (VistA); however, the department does not have a comprehensive definition for the system. For example, VA has identified components that comprise VistA, identified interfaces related to the system, and collected system user guides and installation manuals. VA has also conducted analyses to better understand customization of VistA components at various medical facilities. Nevertheless, the existing information and analyses do not provide a thorough understanding of the local customizations reflected in about 130 versions of VistA that support health care delivery at more than 1,500 sites. Program officials stated that they have not been able to fully define VistA due to the decentralization of the development of the system for more than 30 years. Cerner's contract to provide a new electronic health record system to VA calls for the company to conduct comprehensive assessments to identify site-specific requirements where its system is planned to be deployed. Three site assessments have been completed and additional assessments are planned. If these assessments provide a thorough understanding of the 130 VistA versions, the department should be able to define VistA and be better positioned to transition to the new system. VA identified costs for VistA and its related activities adding up to approximately $913.7 million, $664.3 million, and $711.1 million in fiscal years 2015, 2016, and 2017, respectively—for a total of about $2.3 billion over the 3 years. However, of the $2.3 billion, the department was only able to demonstrate that approximately $1 billion of these costs were sufficiently reliable. In addition, the department omitted VistA-related costs from the total. The lack of a sufficiently reliable and comprehensive total cost for VistA is due in part to not following a well-documented methodology that describes how the department determined the costs for the system. As a result of incomplete cost data and data that could not be determined to be sufficiently reliable, the department, legislators, and the public do not have a complete understanding of how much it has cost to develop and maintain VistA. Further, VA lacks the information needed to make decisions on sustaining the many versions of the system. In its report being issued today, GAO is recommending that VA develop and implement a methodology for reliably identifying and reporting the total costs of VistA. The department agreed with the recommendation.", "document_type": "gao"}
{"report": "The NHPA requires federal agencies to establish historic preservation programs to ensure the ongoing identification and protection of historic properties. A historic property is any building, structure, object, site, or district listed on or eligible for inclusion in the National Register of Historic Places (National Register). To be eligible for the National Register, a property must meet certain criteria, such as being associated with the lives of significant people from the past or yielding important information about prehistory or history, among others. Generally, properties that have achieved significance within the past 50 years are not considered eligible for the National Register unless they are of exceptional importance. The NHPA also established the ACHP, which advises the President and Congress on matters relating to historic preservation. The ACHP also recommends measures to coordinate activities of federal, state, and local agencies and private institutions and individuals relating to historic preservation. The ACHP can review the relevant policies and programs of federal agencies and make recommendations to improve their effectiveness, coordination, and consistency. Section 106 of NHPA requires federal agencies, including DOD, to take into account the effects of their undertakings (hereinafter referred to as projects) on historic properties, and to afford the ACHP a reasonable opportunity to comment on any such projects on historic properties by a federal agency. Part 800 of title 36, Code of Federal Regulations, establishes procedures to define how DOD and other federal agencies should meet these statutory responsibilities and how to accommodate historic preservation concerns with the mission of the agency, including DOD. Historic preservation concerns are reviewed in consultation with officials from the agency in question and other parties with an interest in the effects of the proposed project on historic properties. The goal of this consultation is to identify historic properties potentially affected by the project, assess its effects, and seek ways to avoid, minimize, or mitigate any adverse effects on historic properties. State Historic Preservation Offices—each led by a State Historic Preservation Officer (SHPO)—advise and assist federal agencies, including DOD, in carrying out their Section 106 responsibilities, and ensure that historic properties are taken into consideration during in project planning. A more detailed description of the relationship between DOD and SHPOs is presented in appendix II. A programmatic agreement is a document that federal agencies can, in consultation with the ACHP, SHPO, and/or other parties, negotiate and execute when a planned project will or may adversely affect historic properties and sets out the measures the federal agency will implement to resolve those adverse effects. Agencies can use programmatic agreements to satisfy their Section 106 responsibilities in the following circumstances: when effects on historic properties are similar and repetitive or are multi-state or regional in scope, when effects on historic properties cannot be fully determined prior to approval of a project, when nonfederal parties are delegated major decision-making where routine management activities are undertaken at federal installations, facilities, or other land-management units, or when other circumstances warrant a departure from the normal Section 106 process. Section 110 of the NHPA requires federal agencies to establish a preservation program to protect, identify, evaluate, and nominate historic properties to the National Register. Section 110 also states that agencies must designate qualified preservation officers to lead their respective agencies’ efforts to adhere to the NHPA, among other requirements. Further, Executive Order 13287, Preserve America, instructs all executive branch departments and agencies to maximize efforts to integrate the policies, procedures, and practices of the executive order and the NHPA into their program activities to advance historic preservation objectives. Preserve America also instructed executive branch departments and agencies to assess the current status of their historic property inventories (including general condition and management needs) and directs agencies with real property management responsibilities to report on efforts to identify, protect, and use historic properties every 3 years. DOD Instruction 4715.16 set forth the framework for a department-wide program that focuses on the management of cultural resources, which include historic properties. According to DOD officials, as part of DOD’s program to preserve historic properties, each military department designates federal preservation officers to coordinate its own separate historic property programs. Each department has an office or division that handles cultural resources and historic preservation and has staff who are generally knowledgeable about NHPA and its requirements. The military departments also issue their own guidance that establishes policies on historic preservation and delineates responsibilities for cultural resources personnel at the service and installation level. Each military department also is responsible for ensuring that military installations with cultural resources under their purview prepare Integrated Cultural Resource Management Plans (ICRMPs). These plans should include an inventory of all known historic properties, an inventory of properties that may be eligible for listing on the National Register, and standard operating procedures covering certain maintenance aspects of historic properties. According to officials from the military departments, installations are responsible for setting up a process where all maintenance/work order requests are reviewed for further action. For example, the review process can take the form of a maintenance/work order request review board and typically includes the installation’s cultural resources manager or members of the cultural resources manager’s staff. If the maintenance/work order request involves a historic property, then additional steps are taken at the installation level to consult with the appropriate stakeholders. Once officials at an installation complete their evaluation of the potential impact a maintenance request/work order would have on a historic property, they consult with the SHPO on how to move forward with the proposed maintenance/work order, according to installation officials. A more detailed description of the review of maintenance/work order requests is presented in appendix III. DOD generally uses its historic properties in one of two ways—to support mission needs or to house service members and their families. Generally, after consultations with the SHPO, historic properties can be repurposed or renovated to fulfill current mission and housing needs. For example, a historic aircraft hangar could be converted into additional administrative space or historic homes could be renovated by a private housing partner to house service members and their families. Figure 1 is an example of how a historic property could be reused. In October 2017, DOD reported that, of its approximately 375,000 properties on installations in the U.S. and its territories, it has identified and evaluated about 60,000 as historic and about 57,000 as not being historic. DOD has not yet evaluated the remaining roughly 258,000 properties for historic significance. Approximately 41,000 of these properties are greater than or equal to 50 years of age, according to DOD. DOD’s Cultural Resource Management Instruction requires DOD to conduct a survey of historic properties that includes the identification and evaluation of all cultural resources against the criteria of the National Register. According to ACHP officials, DOD does not routinely identify and evaluate every property under its purview for historic significance as those properties reach 50 years of age. Instead, DOD’s practice is to identify and evaluate property for historic significance as installations have an identified need for or a project planned for the property, according to both DOD and ACHP officials. Officials said that, generally, federal agencies do not have the funding to proactively identify and evaluate properties for historic significance. Rather, funding to identify and evaluate properties is included within a project’s funding; therefore, generally federal agencies cannot begin to identify and evaluate a property for historic significance until a project for that property is funded, according to officials from the ACHP. The initial process to identify, evaluate, and track real property, such as historic properties, occurs at the installation level. Installation officials are to record transactions; document new acquisitions, changes to existing facilities, and disposals; and collect information on the real property at each installation. Installation officials are then to enter this information into the corresponding military department or WHS real property data systems. The military departments and WHS use these databases to oversee and manage real property needs across DOD installations, such as how property is used to support the installations’ missions and how much to budget for required sustainment, restoration, or construction of real property. Figure 2 shows how data are intended to move from the installation level to the military department databases and then to the DOD-wide real property database, which DOD calls the “Real Property Assets Database (RPAD).” OSD requires that the military departments and WHS submit their real property inventories to be compiled into RPAD. DOD uses these data to provide information on its real property to Congress and other federal agencies, including the Office of Management and Budget and the General Services Administration, in order to assist in the oversight of federal real property. We identified some gaps in data, as well as data discrepancies between the data reported at the installation level and the department level regarding historic properties for fiscal year 2017. For example, one of the 10 installations we visited could not generate a list of historic properties on the installation with corresponding data fields such as the facility condition, plant replacement value, and facility utilization rate. Officials at this installation told us they are working on a long-term project to update their data on historic properties. Additionally, data we collected from three of the 10 installations we visited were inconsistent with data in the installations’ respective military department-level databases. For instance: One installation had 150 more historic properties listed in its installation real property data than were listed in the corresponding military department database. The installation’s data also showed 114 fewer properties coded as “Not Yet Evaluated” for historic significance than did the military department’s database. Similarly, the data in the military department database showed twice the number of privatized homes than did the installation database. A second installation had 119 properties coded as “Not Yet Evaluated” for historic significance, but none with this designation in the data provided by the installation. The data provided by the installation also included 164 privatized homes, none of which were included in the military department database. Further, this installation had nine historic properties that were not included in the military department database but that were included in the installation data, as well as 26 historic properties that were included in the military department database but that were not included in the installation data. A third installation had fewer discrepancies, with two historic properties that were included in the installation data that were not in the military department database. The data in the military department database contained six assets that the installation data did not contain. There were also four discrepancies regarding privatized housing between the installation data and the military department database, with each database containing two entries the other did not include. We asked five installation cultural resource managers about these discrepancies, and they stated that the military department databases most likely had not been updated to reflect the correct installation numbers. In November 2018, we reported that RPAD contained inaccurate and incomplete data due to weaknesses in DOD’s processes for recording and reporting real property, including historic property. The military services lacked complete data regarding real property transactions as well physical inventories of real property, to include historic properties. We also found that the military services have not consistently recorded real property transactions (i.e., the acquisition of, change to, and disposal of real property assets) and the results of physical inventories of assets. Finally, we found that the military services have not corrected previously- identified discrepancies in their data systems, such as missing entries for utilization and facility condition and overdue asset reviews. We recommended that each of the services develop monitoring processes for recording all real property (including historic properties) information. We also recommended that the Under Secretary of Defense for Acquisition and Sustainment work in collaboration with the services to develop corrective action plans to remediate inconsistencies in the data. DOD concurred with these recommendations and identified actions it plans to take to implement them. Implementing these recommendations would help DOD ensure more accurate and complete information on properties of historic significance and prevent further data discrepancies. Also, more accurate and complete information on the identification and evaluation of properties would help installations, military departments, and WHS oversee and manage their real property needs, including informing decisions regarding how much to budget for required sustainment, restoration, or construction of real property. We will continue to monitor DOD’s progress in addressing these recommendations. DOD may transfer the responsibility to identify and evaluate homes for historic significance to the private developers. However, the military department officials we interviewed could not confirm that private developers were meeting those responsibilities. The military departments have flexibility in how they structure their privatized housing projects, but project structures share certain similarities. For a typical privatization project, a military department leases land to a developer for a 50-year term and conveys existing homes located on the leased land to the developer for the duration of the lease. Given the length of these lease agreements, homes may move beyond 50 years of age while being maintained by the private developer. Military department officials told us that when a lease or programmatic agreement is signed with a private developer, the responsibility to identify and evaluate homes for historic significance is generally transferred to the private developer. Navy and Marine Corps officials stated that, when the leases for privatized military homes were signed, a list of historic properties was provided to each private developer. According to Navy officials, those private developers are now responsible for identifying and evaluating privatized homes for historic significance once the lease is signed and the homes are transferred to the private developer. Similarly, Air Force officials stated that, prior to conveying homes to a private developer all homes encompassed in the lease agreement should have been identified and evaluated for historic significance by the Air Force. According to these officials, after the transfer of properties under the lease, the private developer is responsible for identifying and evaluating homes for historic significance. Army officials also stated that the responsibility to manage privatized homes and assess their historic value falls to the private developer. However, private developers at seven of the nine of installations we visited that had privatized historic military housing told us that they do not identify or evaluate additional homes for historic significance. The private developers at the remaining two installations said they hire a third- party to identify and evaluate homes on the installations for historic significance as they age. DOD’s instruction on the management of cultural resources directs the establishment of a process to identify and evaluate cultural resources for historic significance. The need to identify and evaluate privatized military homes for historic significance would arise if a new project were planned for homes that could be of historic significance. Officials from all three military departments told us that they have addressed the identification and evaluation process by formally transferring those responsibilities to the private developers through documents such as land-lease agreements, installations’ programmatic agreements, and installations’ ICRMPs. However, DOD guidance also states that because privatization creates a long-term governmental interest in privatized housing, it is essential that the military departments attentively monitor these privatization projects. Taking steps to ensure that installation personnel verify that private developers are identifying and evaluating privatized properties for historic significance, as appropriate, could help to ensure that private developers do not make renovations or repairs to properties that could compromise their historic nature. Under DOD Instruction 4165.14, once a historic property has been identified, installations are required to complete a review of the real property asset record every 3 years, including a physical inventory that assesses the condition of the property. According to DOD, these inventories are important for planning, analysis, and decision making. However, we found that these required inventories are not routinely being conducted at six of the 10 installations we visited for a variety of reasons. Specifically, cultural resource management officials at six of the 10 installations told us that the inventory was not conducted because they were unaware of the requirement or thought that updating their ICRMPs was sufficient to satisfy the inventory requirements. As previously noted, ICRMPs should include an inventory of all known historic properties, an inventory of properties that may be eligible for listing on the National Register, and standard operating procedures covering certain maintenance aspects of historic properties. Officials at one of the six installations reported that they believe it is a best practice to inventory their historic properties every 5 years if they have sufficient staff to do so. Officials at two installations stated that they do complete the required inventory every 3 years. Officials at the remaining two installations either did not provide any comment or said they were unsure of when the last inventory was completed. However, officials from all of the services’ headquarters reiterated to us that the requirement under DOD Instruction 4165.14 is to inventory historic properties every 3 years. They explained that this inventory is separate and distinct from the annual inventory required under the ICRMP process. For example, Air Force headquarters officials stated that the 3 year inventory should consist of a physical check of the condition of the buildings, while the annual inventory required as part of the ICRMP update is a process to update data, such as status codes, for newly evaluated buildings. Until the military departments clarify the existing 3 year inventory requirement, current and accurate information on the condition of historic properties will not be available. Such information would better position officials who manage these properties to make informed management, maintenance, and planning decisions. We found that misunderstandings about how to maintain historic properties have led, in some instances, to problems with the preservation of these properties at installations. Each of the 10 installations that we visited has an established process and procedures for reviewing and approving maintenance/work orders on historic properties. These processes and procedures, articulated in installations’ ICRMPs, vary by installation and are generally intended to assist in preserving historic properties. However, cultural resource managers at five of the 10 installations said that past maintenance or renovation projects on some of their installations’ historic buildings may have compromised the historic significance of those buildings. In some cases, for instance, maintenance was performed improperly by tenants of historic properties or by contractors, according to installation officials. At one installation we visited, an official said a tenant made changes to a historic building without undergoing the formal approval process at the installation, which includes informing the cultural resource manager of the proposed change. The official said the tenant added additional office space and equipment, such as computers and other systems, in an unused attic without updating the capacity of the electrical panels. As a result, the official said a fire started in the attic, causing extensive damage to the building. An official at another installation we visited told us a contractor pressure washed a historic property that ended up damaging the building. The official said the damage was not intentional, as the contractor did not realize that pressure washing would harm the property. Unit members also noted some instances in which they were told by maintenance personnel that problems the members had reported could not be fixed because of the historic nature of the properties. For instance: At a Marine Corps installation, unit members said that maintenance and facilities management staff ignored or improperly handled issues they raised in their historic buildings. For example, unit members told us that maintenance personnel erroneously informed them they could not replace the air filters or clean out the mold in the ceiling because their building was historic. At an Air Force installation, unit members told us their requests for upgraded electrical outlets and roof fixes were denied because maintenance personnel told them those changes could not be completed because of the historic nature of the building. According to unit members, the existing outlets were not suitable for work on the aircraft being maintained in the building and thus presented a safety risk. Moreover, unit members told us that, to deal with the roof leaks, they ultimately resorted to using buckets to catch water. At an Army installation, unit members told us that maintenance personnel informed them they could not address certain problems, such as leaks, because of the historic nature of the building. For example, unit members at this installation resorted to boarding up their building with plywood during storms to keep rainwater from affecting the secure facility in the basement of the historic building because maintenance division staff told them addressing the leaks was not their responsibility, due, in part, to the historic nature of the building. One reason these problems may have occurred is that the individuals involved were not properly informed or trained about how to conduct maintenance on historic buildings. At nine of the 10 installations we visited, unit members who work in historic buildings told us that, based on their experiences requesting repairs to historic buildings, they believed maintenance personnel did not know what maintenance could or could not be done to the historic buildings. Officials from these installations expressed concerns about training, including a lack of training, related to historic preservation and maintenance of historic properties. For example, maintenance officials at three of the 10 installations we visited stated that they do not receive training on the special requirements associated with maintaining historic buildings; and cultural resource managers from four of the 10 installations told us that more training for installation staff, particularly maintenance staff, on historic preservation requirements would be helpful. Furthermore, officials from two of the four SHPOs representing the states where we visited military installations said they believe that tenants and maintenance personnel at installations do not have the proper training to adhere to historic preservation requirements. Officials from the Office of the Under Secretary of Defense for Acquisition & Sustainment (OUSD(A&S)) also said they were aware of misunderstandings within the military communities about aspects of historic preservation. For example, these officials said there were misunderstandings among installation personnel, including between personnel from department of public works’ offices, environmental offices, installation planners, and cultural resource managers about their roles and responsibilities concerning historic preservation. The OUSD(A&S) is responsible for establishing cultural resource guidance, designating responsibilities, and providing procedures to implement DOD’s cultural resources program. DOD Instruction 4715.16 states that ICRMPs act as the instrument DOD uses to comply with the statutory management requirements of the NHPA. It is also DOD policy that cultural resources under DOD control are to be managed and maintained in a sustainable manner through a comprehensive program that considers the preservation of historic, archaeological, architectural, and cultural values; is mission supporting; and results in sound and responsible stewardship. In addition, the Standards for Internal Control in the Federal Government state that management should communicate quality information down and across reporting lines to enable personnel to perform key roles in achieving objectives, addressing risks, and supporting the internal control system. However, officials from each of the military departments stated that they do not have department-wide or service-wide guidance related to historic preservation training. Instead, the content and frequency of training is determined by the installations, according to military department officials. When we analyzed the installations’ ICRMPs, we found that responsibilities for providing cultural resources training or technical guidance, feedback, and comments to installation personnel regarding historic preservation generally lie with the installation cultural resource manager. Installation personnel rely on individual cultural resource managers and the individual installations’ ICRMPs to ensure that all personnel at an installation have the training they need. Without providing installations with DOD or military department-wide guidance on training related to historic preservation, there could be more instances of improper or incomplete maintenance of historic properties on installations. According to the Advisory Council on Historic Preservation (ACHP), DOD is one of the most compliant federal agencies with regard to historic preservation requirements. DOD uses historic properties to support mission needs as well as to house military service members. Thus far, DOD has identified and evaluated 60,000 properties as historic. However, additional actions could enhance DOD’s efforts to identify, assess, and preserve historic properties. First, we recently made recommendations which DOD concurred with, to improve the quality of DOD’s real property data. Implementing the recommendations would help ensure that DOD has more accurate and complete information on properties of historic significance and prevent further data discrepancies. Second, taking steps to verify that private developers are identifying and evaluating privatized properties that could be historic would help mitigate the risk of developers making renovations to properties that could compromise their historic nature. Additionally, clarifying the requirement to inventory historic properties every 3 years to assess their condition would help ensure that DOD has the information it has identified as important for planning, analysis, and decision-making related to such properties. Further, establishing guidance on training for installation personnel would help ensure they possess the necessary knowledge to properly maintain historic properties on installations. We are making a total of seven recommendations to DOD. The Secretary of the Navy should take steps to ensure that Navy and Marine Corps’ installation personnel verify that private developers are identifying and evaluating privatized properties for historic significance, as appropriate. (Recommendation 1) The Secretary of the Army should take steps to ensure that Army installation personnel verify that private developers are identifying and evaluating privatized properties for historic significance, as appropriate. (Recommendation 2) The Secretary of the Air Force should take steps to ensure that Air Force installation personnel verify that private developers are identifying and evaluating privatized properties for historic significance, as appropriate. (Recommendation 3) The Secretary of the Navy should clarify the requirement for Navy and Marine Corps’ installation personnel to conduct a physical inventory of historic properties every 3 years, including an assessment of each property’s condition to ensure that facilities that have been identified and evaluated as historic are inventoried. (Recommendation 4) The Secretary of the Army should clarify the requirement for Army installation personnel to conduct a physical inventory of historic properties every 3 years, including an assessment of each property’s condition to ensure that facilities that have been identified and evaluated as historic are inventoried. (Recommendation 5) The Secretary of the Air Force should clarify the requirement for Air Force installation personnel to conduct a physical inventory of historic properties every 3 years, including an assessment of each property’s condition to ensure that facilities that have been identified and evaluated as historic are inventoried. (Recommendation 6) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, in collaboration with the military departments, develop and disseminate department-wide or service-wide guidance, on training related to historic preservation to installation personnel, including information on roles and responsibilities. (Recommendation 7) We provided a draft of this report to DOD for review and comment. In written comments, DOD concurred with each of our recommendations. DOD’s comments are reprinted in their entirety in appendix IV. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and to the Acting Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; and Secretaries of the Departments of Air Force, Army and Navy, and the Director of Washington Headquarters Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or our staff have any questions about this report, please contact me, Elizabeth Field, at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are listed on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Senate Report 115-130, accompanying a bill for the Fiscal Year 2018 Military Construction, Veterans Affairs, and Related Agencies Appropriations Act, included a provision that GAO assess the historic properties in use on the Department of Defense’s (DOD) U.S. installations. This report assesses the extent to which (1) DOD identifies and evaluates properties for historic significance, including those that have been privatized, and (2) DOD assesses the condition of its historic properties and has guidance on the training of installation personnel maintaining and those working in historic properties. For both objectives, we reviewed relevant laws, regulations, executive orders, and DOD (including military service) guidance that govern efforts to identify, evaluate, manage, and maintain DOD’s historic properties. We interviewed officials from the Office of the Secretary of Defense (OSD) (the Office of the Under Secretary of Defense for Acquisition and Sustainment); Washington Headquarters Services (Facilities Services Directorate); the Army (Installation Management Command; Office of the Assistant Chief of Staff for Installation Management; Office of the Assistant Secretary of the Army for Installations, Energy and Environment; U.S. Army Corps of Engineers); the Navy (Office of the Assistant Secretary of the Navy for Energy, Installations, and Environment; Office of the Deputy Assistant Secretary of the Navy for Installations and Facilities; Office of the Chief of Naval Operations; Naval Facilities Engineering Command); the Marine Corps (Headquarters Marine Corps; Marine Corps Installations Command; Environmental Management Division); and the Air Force (Headquarters Air Force; Air Force Civil Engineer Center Installations Directorate). We reviewed DOD data, plans, and agreements, and compared DOD’s efforts to address criteria in the National Historic Preservation Act and DOD Instructions. Additionally, we met with officials from the Advisory Council on Historic Preservation and private developers, such as Balfour Beatty, Clark Realty Capital, Lendlease, Lincoln Military Housing, and Hunt Companies, to whom DOD has conveyed property under the Military Housing Privatization Initiative (MHPI). To gather detailed examples of DOD’s historic preservation efforts, we visited historic properties at a non- generalizable sample of 10 installations. We selected these installations by analyzing DOD’s fiscal year 2017 data on real property, limited our analysis to installations in the continental United States, and identified the number of buildings and structures (“properties”) in each state DOD reported as historic. We selected four states, California, Hawaii, Virginia, and Maryland, for reasons including the high concentration of historic properties in the state. To select installations in each state, we considered variation in military service representation, the number of historic properties at each installation, and geographic variation and proximity. During these visits, we interviewed officials representing environmental resource management, cultural resource management, and the department of public works, facilities management, along with privatized installation housing developers. Further, we met with relevant state stakeholders including State Historic Preservation officials in California, Hawaii, Maryland, and Virginia. We obtained documentary and testimonial evidence related to the identification, evaluation, management, and maintenance of historic properties. We also conducted semi-structured group discussions of those who work in historic properties. The results of our interviews and semi-structured group discussions are not generalizable to all DOD installations. To determine the extent to which DOD identifies and evaluates properties for historic significance, including homes that have been privatized, we reviewed prior GAO reports related to this issue, including a recent GAO report on DOD’s real property data, including historic properties. We also requested and reviewed data related to historic properties, for each installation that we visited, including data on: the facility condition, plant replacement value, and facility utilization rate, among other data fields. We reviewed and compared the data from the military departments and from these selected installations. As discussed in this report, we identified limitations of the reported data on historic properties that have been identified and evaluated by DOD. Further, we compared DOD’s efforts to ensure that privatized homes have been identified and evaluated for historic significance to guidelines in Department of Defense Instruction 4715.16, Cultural Resources Management, and Department of Defense Manual 4165.63, DOD Housing Management. We also obtained and assessed testimonial evidence about the process to identify and evaluate privatized homes for historic significance from officials from the military departments and private developers. To determine the extent to which DOD assesses the condition of its historic properties and has guidance on the training of installation personnel maintaining and working in historic properties, we conducted interviews with officials from within OSD, each military department and officials at the 10 installations we visited to identify efforts to manage and maintain historic properties. We also met with U.S. Army Corps of Engineers and DOD’s Washington Headquarters Services to further understand their roles in historic property maintenance. We interviewed major developers who have, under the Military Housing Privatization Initiative, leased military housing from DOD and analyzed the process that is used to manage and maintain historic properties. We compared DOD’s efforts to conduct inventories of historic properties to guidelines in Executive Order 13287, Preserve America, and DOD Instruction 4165.14, Real Property Inventory (RPI) and Forecasting. In addition, related to the maintenance of historic properties, we compared DOD’s efforts to guidelines in DOD Instruction 4715.16, Cultural Resources Management, and the Standards for Internal Control in the Federal Government. In addition, at the 10 installations we visited, we collected physical and documentary evidence of DOD’s management and maintenance practices at the installation level. We analyzed installation-level planning documents related to the management and maintenance of historic properties, specifically the installation Integrated Cultural Resource Management Plans (ICRMPs) of the installations we visited. The ICRMPs were from installations spread out across the country and represented all branches of the military. We analyzed the ICRMPs to determine if there were any common themes. We also reviewed a non-generalizable sample of 10 programmatic agreements—one provided by each installation we visited—to identify common themes. These themes cannot be generalized to all programmatic agreements. We conducted interviews with installation staff to understand their responsibilities for historic property management and maintenance. We interviewed state historic preservation officials to understand the relationship between installations and preservationists and efforts to preserve historic properties on installations. During our site visits to 10 installations, we conducted semi-structured group discussions with individuals who work in historic buildings to supplement our understanding of DOD’s compliance with required policy and guidance, as well as any impact working in historic properties has on DOD employees. We used the military department data that informed our site selection, and queried the data to generate a random list of properties DOD identifies as historic. We provided each installation we visited with a list of 20 randomly selected historic properties and requested the installation’s assistance in inviting unit members who work in these buildings to participate in a semi-structured group discussion. The participants of the semi-structured group discussions were asked to discuss their experiences working in historic buildings. The results of our semi-structured group discussions are not generalizable to all DOD installations. To conduct the analysis and summary of these discussion groups, we developed a record of analysis that listed the installations visited and overall topics posed to the unit discussion groups and assessed the extent to which unit members had similar or different experiences working in historic buildings. We identified themes that emerged for each discussion topic across these group discussions. We conducted this performance audit between March 2018 and June 2019, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Installation cultural resource managers we spoke to at all 10 installations we visited said that they cultivate and maintain active relationships with their state historic preservation office (SHPO) and regularly communicate with them on preservation issues affecting their installations. Five out of the 10 cultural resource managers noted that maintaining a good working relationship with their SHPO made the consultation process more efficient. Officials we interviewed for two of the four SHPOs stated that being involved early in the consultation process with installation officials is more efficient and makes historic preservation an easier process by enabling them to receive feedback on proposed projects on historic properties, approval of programmatic agreements, and concurrence on their Integrated Cultural Resource Management Plans (ICRMPs) in a timely manner. For example, DOD officials at one military installation said they were able to use non-historic materials during renovations on a historic property in place of more costly period-accurate materials because the agreement with that SHPO facilitated such a solution. According to officials at this installation, SHPOs generally prefer the use of period-accurate materials on historic properties when conducting repairs and renovations. The officials, however, stated that they began consultations with the SHPO early in the process and were able to reach agreement that the historic nature of the property would not be adversely affected if non-historic materials were used. See figure 3 below. Officials from two of the four SHPOs said that due to positive working relationships between the installation and the SHPO, a programmatic agreement has been put in place to help manage the installation’s historic properties. These programmatic agreements can be used to address routine maintenance activities for historic properties that can be carried out by the installation with no further consultation with the SHPO. In the four states that we visited, SHPO officials said they executed programmatic agreements with some installations that can save time and reduce the number of required consultation meetings. According to officials from two of the four SHPOs we interviewed, having programmatic agreements in place can increase the efficiency of the historic preservation process. Generally, these programmatic agreements can include the following: Standard operating procedures. Programmatic agreements can include a number of routine maintenance plans pre-approved by the SHPO (such as the replacement of historic windows, repairing leaking historic roofs, and painting historic buildings) that an installation cultural resource manager can then follow without having to go through the consultation process. Inventories of relevant properties. Programmatic agreements can include inventories of historic properties that are relevant to the agreement. Generally, the procedures outlined in the programmatic agreement would apply to all of the properties listed in the inventory. Dispute resolution and emergency plans. Programmatic agreements can also include dispute resolution mechanisms between parties to the agreement and contingency plans for the maintenance and repair of historic properties in the event on an emergency. DOD Instruction 4715.16 on cultural resource management states that installations should adapt and reuse existing structures at their installation before disposal, new construction, or leasing. Installations typically consult with the SHPO before renovation work can proceed on historic properties, but, according to officials at one installation, alternative solutions can be reached if there is a good working relationship. In the figure below, at one military installation we visited, a historic property formerly used by National Aeronautics and Space Administration (NASA) and now used by the installation is in the process of being renovated and converted into additional office space. The concrete dome was used to test the aerodynamics of some of NASA’s satellite and spaceship components and is being converted into a new conference room after the SHPO approved the installation’s plan. See figure 4 below. While all of the installation cultural resource managers we spoke to told us they regularly communicate with their SHPO and five of these cultural resource managers said that good working relationships with the SHPO made the consultation process more efficient, installation officials may still experience challenges when trying to address historic preservation concerns. For example, maintenance officials at four of the 10 installations expressed some concerns about a backlog of consultations due in part to the increased time that they felt it takes to conduct these consultations. According to these officials, consultation backlogs caused delays to maintenance projects on historic properties at their installations. DOD officials from every military service stated that each installation has a process for reviewing maintenance requests and work orders, including those involving historic properties. These procedures, articulated in installations’ Integrated Cultural Resource Management Plans (ICRMPs), vary by installation. For example, at seven of the 10 installations we visited, the ICRMPs state that all maintenance requests and work orders are reviewed by a board (or other body of internal stakeholders) composed of maintenance personnel, cultural resources staff (including the cultural resources manager), and other installation personnel. Officials from the military departments said that these boards are responsible for, among other duties, regularly identifying maintenance requests and work orders that affect historic properties and ensuring that the proper steps are carried out before addressing a maintenance request. Decisions by the board, results of SHPO consultations, and programmatic agreement requirements are then, according to officials from the military departments, passed down to maintenance personnel before they begin work on the historic property. At two of the other installations we visited, the installations’ department of public works reviews all maintenance requests and work orders, and at the remaining installation, the cultural resources manager reviews them, according to installation officials. During our visits to the military installations, cultural resource managers from eight of the 10 installations stated that they play a role in their installation’s maintenance request/work order review process and that maintenance personnel are typically included in the process. For example, one installation we visited set up a work induction board composed of staff from the installation’s Environmental Security Division (which handles cultural resources), maintenance staff, and other internal stakeholders. The senior official within the Environmental Security Division at this installation said the board meets on a weekly basis to determine whether proposed projects (such as maintenance requests and work orders) will affect historic properties at the installation. If the project involves a historic property, the installation’s cultural resources manager becomes involved and determines the extent of the affect to the property’s historic nature. This senior official also told us that the board also checks in regularly on ongoing projects and monitors work being done on historic properties. Officials at another installation we visited said they treat any building that is aged 50 or older in their database as historic and the maintenance division sends every new project to their installation’s historic preservation division to ensure a review of potential impacts of the maintenance requests or work orders. In addition to the contact named above, Brian Lepore, Director (retired); Maria Storts, Assistant Director; Whitney Allen; Ronnie Bergman; Aaron Chua; Christopher Gezon; Alexandra Gonzalez; Lori Kmetz; Amie Lesser; Emily Martin; Natalia Peña; Clarice Ransom; Jodie Sandel; Monica Savoy; and John Van Schaik made key contributions to this report. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP. Washington, D.C.: March 6, 2019. Defense Real Property: DOD Needs to Take Additional Actions to Improve Management of Its Inventory Data. GAO-19-73. Washington, D.C.: November 13, 2018. Military Housing Privatization: DOD Should Take Steps to Improve Monitoring, Reporting, and Risk Assessment. GAO-18-218. Washington, D.C.: March 13, 2018. High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others. GAO-17-317. Washington D.C.: February 15, 2017. Defense Infrastructure: More Accurate Data Would Allow DOD to Improve the Tracking, Management, and Security of Its Leased Facilities. GAO-16-101. Washington, D.C.: March 15, 2016. High-Risk Series: An Update. GAO-15-290. Washington D.C.: February 11, 2015. Federal Real Property: Improved Data Needed to Strategically Manage Historic Buildings, Address Multiple Challenges. GAO-13-35. Washington, D.C.: December 11, 2012. Defense Infrastructure: Military Services Lack Reliable Data on Historic Properties. GAO-01-437. Washington, D.C.: April 6, 2001.", "summary": "The National Historic Preservation Act of 1966 requires each federal agency to establish a preservation program that ensures properties are identified and evaluated for historic significance, as well as managed and maintained in a way that considers their preservation. Senate Report 115-130 accompanying a bill for the Military Construction, Veterans Affairs, and Related Agencies Appropriations Act for fiscal year 2018, included a provision that GAO assess DOD's management of historic properties in use on U.S. installations. This report examines the extent to which DOD (1) identifies and evaluates properties for historic significance, including those that have been privatized, and (2) assesses the condition of its historic properties and has guidance on the training of installation personnel maintaining and those working in historic properties. GAO reviewed DOD fiscal year 2017 real property data and policies and procedures; visited a non-generalizable sample of 10 installations, selecting them based factors such as military service representation and concentration of historic properties; and interviewed DOD officials, privatized housing developers, and installation personnel. The Department of Defense (DOD) reported that it has identified and evaluated about 60,000 of its approximately 375,000 properties on installations as historic as of October 2017. DOD's practice is to identify and evaluate property for historic significance as installations have an identified need for or a project planned for the property, according to DOD officials. However, GAO identified opportunities for DOD to enhance its efforts in several areas. DOD lacks complete and consistent data on historic properties. Specifically, GAO identified data gaps and discrepancies between the data reported at the installation and department levels for fiscal year 2017. For example, for one installation, GAO found that 150 more historic properties were listed in its installation data than were listed in department-level data for that installation. In November 2018, GAO reported on issues concerning DOD's data and made recommendations to improve the data quality. DOD concurred and reported actions it plans to take to improve data quality. Doing so would help DOD to ensure it has complete information on properties of historic significance and prevent further data discrepancies. DOD has limited visibility of privatized homes that could be historic. When the military departments transferred military homes to private developers, DOD officials said they also transferred the responsibility to identify and evaluate homes for historic significance to the private developers. However, the military departments do not verify that private developers are doing so. Private developers at seven of the nine installations with privatized housing that GAO visited said they do not identify or evaluate homes for historic significance. Taking steps to verify that private developers carry out this responsibility could help DOD ensure that renovations or repairs are not made to privatized properties that could compromise their historic nature. Additionally, DOD does not routinely assess the condition of its historic properties and a lack of guidance on training could hamper maintenance and preservation efforts. First, inventories of historic properties, including physical inspections, required every 3 years, are not being conducted at six of the 10 installations GAO visited. Officials at these six installations said that the inventory was not conducted because they were unaware of or misunderstood the requirement. Second, while each installation GAO visited had an established process for approving maintenance work orders, DOD officials reported problems with the maintenance of historic properties at these installations, ranging from maintenance personnel not addressing issues, to maintenance being conducted improperly. At nine of the 10 installations GAO visited, individuals who work in historic buildings said that they believed maintenance personnel did not know what maintenance could or could not be done to the historic buildings, and installation officials expressed concerns about a lack of training related to historic preservation. By clarifying the requirement to conduct a physical inventory and developing guidance on training, DOD would be better positioned to preserve the historic properties under its purview. GAO is making seven recommendations, including that DOD take steps to verify that privatized military homes are identified and evaluated for historic significance; clarify the inventory requirement for historic properties; and develop guidance related to historic preservation training. DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "Federal policy for rental housing has traditionally focused on assisting low-income households through rental assistance and incentives for the development of housing with below-market rents. In fiscal year 2020, Congress appropriated about $43.9 billion for HUD’s three largest federal rental assistance programs: public housing, Housing Choice Vouchers, and Project-Based Rental Assistance. These programs make rents affordable to eligible households, generally by paying the difference between the unit’s rent and 30 percent of a household’s adjusted income. Unlike certain other means-tested programs, federal rental assistance programs are not entitlements. The number of households that the programs can assist is limited by the amount of budget authority that HUD requests and Congress provides through the annual appropriations process. Historically, appropriations for rental assistance programs have not been sufficient to assist all households that HUD has identified as having worst case housing needs—that is, renter households that (1) have very low incomes; (2) do not receive housing assistance; and (3) use more than one-half of their income to pay for rent, live in severely inadequate conditions, or both. In 2017, HUD reported that 8.3 million households had worst case needs in 2015, an increase from 7.7 million in 2013. HUD reported that among very low-income renters in 2015, 25 percent of them received rental assistance, and an additional 43 percent had worst case needs. To determine program eligibility and identify populations in need of assistance, many federal rental assistance programs have specific income eligibility requirements. HUD sets income limits that determine eligibility for its assistance programs based on median family income and market rent estimates. These income limits can vary across different types of localities. The national rentership rate increased from 2001 through 2017 (see fig. 1). In 2004, the estimated rentership rate fell below 33 percent, the lowest in U.S. history, then climbed to 37 percent in 2013, a rate not seen since the 1960s. By 2017, almost 7 million more households rented their homes than in 2001, which brought the rentership rate to an estimated 36 percent. This increase of 7 million households reflects both overall growth in the population as well as the net shift from owning to renting. Many households experienced lasting financial effects of the financial crisis, such as impaired credit or loss of income, which hampered their ability to enter into or transition back into homeownership. Although the national foreclosure rate has slowed significantly in recent years, past research has shown that most households struggle to return to homeownership after foreclosure. Further, median home prices have risen faster than median incomes nationally, which makes achieving homeownership more challenging. Specifically, the gap between rising home prices and wage growth has likely contributed to increases in rentership in many metro areas. Nationally, the rentership rate increased from 2001 through 2017 across all age categories we analyzed, except for older households (65 years or older), as shown in figure 2. The greatest increase was among early middle-aged households (35–49 years old), an estimated increase of nearly 8 percentage points. In addition, rentership for late middle-aged (50–64 years old) and younger (20–34 years old) households increased by 5 percentage points. Renters are, on average, older than they previously were. The late middle-aged group (50–64 years) experienced the largest estimated increase in the number of renter households—an increase of 4 million households—and accounted for more than half of the total increase in renter households from 2001 through 2017 (see fig. 3). Many of these households have not recovered from the financial crisis, and this group has lower incomes and higher rentership rates than in previous generations, Harvard’s Joint Center for Housing Studies has reported. We previously reported that the homeownership rate for the poorest older households was significantly lower after the financial crisis than before it. Black households had higher estimated rentership rates than White, Hispanic, and Asian households, and rentership among Black households increased from 54 percent in 2001 to 58 percent in 2017 (fig. 4). In contrast, rentership among White households was lowest among the race/ethnicity groups and remained generally stable during our analysis period (ranging from 26 to 29 percent from 2001 through 2017). While rentership among Hispanic and Asian households increased slightly in the aftermath of the financial crisis, as of 2017, their rentership rates had returned to levels below those of 2001, although these rates were still higher than those of White households. As of 2017, high-growth and moderate-growth/high-density metro areas we analyzed tended to have more racially diverse renter populations than other areas, and renters in these metro areas were mostly from minority groups. For example, in Dallas, Texas, which is high-growth, an estimated 59 percent of renter households were minority households, and in Miami, Florida, which is moderate-growth/high-density, an estimated 75 percent of renter households were minority households. The most significant change in rentership from 2001 through 2017 by income group was for higher-income households (more than 120 percent of area median income), with the greatest change between 2010 and 2017. Nationally, higher-income households were the second smallest renter group in 2001, with an estimated 6.6 million households, or 17 percent of renter households. In 2017, higher-income households were the second largest renter group, with approximately 10.3 million households, approximately 20 percent of renter households (see fig. 5). Consistent with national trends, in all locality types—that is, those with higher and lower population density or rates of growth—the estimated number and proportion of higher-income renter households increased from 2001 through 2017 (see fig. 6). The greatest increase occurred in high- and moderate-growth metro areas. This trend could reflect (1) a change in income, (2) relocation from moderate-growth/high-density metro areas, and (3) consolidation of households—such as having multiple roommates, extended families occupying one housing unit, or households doubling up with relatives or others to make ends meet. There were modest changes in the number and proportion of low-income households during the same period. Rural areas and metro areas with shrinking populations had the highest proportion of renter households with low incomes as of 2017—for example, an estimated 63 percent of renters in negative-growth metro areas had low to extremely low incomes. Population growth and two other factors appear to have contributed to the growth in higher-income renter households. First, many homeowners who experienced foreclosure during the financial crisis became renters. Second, with rising housing costs, there has been a trend toward consolidated households. The share of households with three or more adults was higher in 2017 than in 2001. Some of these households may have chosen to combine as an alternative to eviction or homelessness, and they may have overcrowded or unstable living arrangements. Most renter households paid a larger share of their income in rent in 2017 than in 2001. Federal housing policy generally considers rents at or below 30 percent of household income to be affordable, and households that pay more than 30 percent of income in rent are considered to be rent burdened. We found that by 2017, an estimated 48 percent of renter households were rent burdened, 6 percentage points higher than in 2001. Severe rent burden, where more than 50 percent of household income is paid in rent, also became more common. Of the households that were rent burdened in 2017, about half were severely rent burdened. These households represented 24 percent of all renter households—an increase of 4 percentage points from 2001 (see fig. 7). The rising rent burden is part of a long-term trend in rental unaffordability, as supply has not kept pace with demand for rental units. With fewer affordable apartments available, rent burdens increased among lower- income households, who were forced to spend a greater proportion of income on rent. Government, academic, and industry research has identified several factors that contribute to this trend: Local regulation and geography have long constrained where and how much rental housing can be built. Cities have adopted zoning and land use regulations that can prohibit or increase costs for new rental units. Metro areas, particularly those in coastal or mountainous regions, have limited available land for new housing. Construction of new rental units has been limited since the 2007– 2009 financial crisis, in part because developers struggled to rebuild workforce capacity after layoffs of skilled construction workers. As a result, since 2009, the construction industry has focused on building luxury apartments, which have higher profit margins, and produce few units affordable to lower-income households. Conversion of lower-rent units to higher-rent units through renovation also reduced the number and share of rental units affordable to lower-income households. Demographic changes, particularly the aging of the millennial and baby boomer generations, have increased demand for rental units. As previously discussed, we found that renters were, on average, older in 2017 than in 2001. In addition, Harvard’s Joint Center for Housing Studies has reported that late middle-age renters (50–64 years) have lower incomes and higher rentership rates than previous generations. Populations with higher rentership rates—including minority households—are forecasted to continue growing through 2030. The spike in foreclosures during the financial crisis resulted in millions of households entering the rental market, increasing competition for available units. Tighter credit standards after the financial crisis have kept many of those who lost their home due to foreclosure from qualifying for a new mortgage. In the United States, rent burden has been most common among minorities and older adults and in dense metropolitan areas (see fig. 8): Rent burden was about 10 percentage points more common among Black and Hispanic households than White households in 2017. This disparity was due to sizable differences in median income. In 2017, estimated median income was $63,704 for White households, $49,793 for Hispanic households, and $40,232 for Black households. Rent burden was more than 10 percentage points more common among older adult (65 and over) households than working-age (20– 64) households in 2017. This disparity was also due to sizable differences in median income, as older adults were less likely to be in the workforce. In 2017, median income was $69,459 for households age 25–64 and $43,735 for households age 65 and over. Rent burden was nearly 10 percentage points more common among renters in high-density metro areas than in nonmetro areas in 2017. According to the Urban Institute, the shortage of affordable rental housing was more acute in urban areas than rural areas in 2014. See appendixes III and IV for more detailed information on rent burden by age, race/ethnicity, and locality type. In 2017, moderate and severe rent burdens were common among low- to extremely-low income households and relatively rare among moderate- to higher-income households (see fig. 9). From 2001 through 2017, the estimated number of renters with moderate or severe rent burdens increased across all income levels, but the increase was more pronounced among lower-income groups (see fig. 10). Specifically, we found the following: The estimated number of higher-income renters increased by more than 3.6 million households from 2001 through 2017, but relatively few of these households experienced rent burden. In contrast, the numbers of low-income, very low-income, and extremely-low income renters also increased over this period, and these groups saw significant increases in rent burden. In more recent years, the estimated number of extremely low-income renter households with severe burden actually decreased—from 7.4 million in 2011 to 6.6 million in 2017. This decrease, however, does not necessarily indicate improved conditions for these households because it was not accompanied by a corresponding increase in either (1) the number of extremely low-income households that were less burdened or (2) the number of very low-income households (the next highest income group). An increase in either of these groups could indicate that the poorest, most burdened households experienced either an increase in income or a decrease in rent burden. However, because these other groups did not increase, it is possible that some of these extremely low-income, severely burdened households moved in with other households or experienced some other form of homelessness. Rent burdens affect households differently depending on their income. Households with lower incomes may pay the same percentage of income in rent as moderate- or higher-income households but have less income left over for other necessities. Even relatively inexpensive units may not leave enough money for lower-income households to cover other necessities like food, clothing, transportation, or medical care. These households may also be sensitive to shocks, such as job loss and health emergencies, and may be at heightened risk of eviction and homelessness. Challenges that lower-income households face can vary across cities and regions due to differences in local market rents and incomes. For example, as figure 11 shows, in the San Francisco area in 2017 a very low-income family of four would experience a severe rent burden if it paid the fair market rent for a two-bedroom apartment ($3,018 per month). Such a family would struggle to pay the rent and afford other necessities even with two or three full-time minimum wage jobs. In contrast, a very low-income family of four in the St. Louis area in 2017 would experience a moderate or no rent burden if it paid the fair market rent for a two- bedroom apartment ($896). Such a family with at least two full-time minimum wage jobs would have relatively more money left over for other necessities. See appendixes III and IV for more detailed information on rent burden by household income. For moderate-income households, the consequences of rent burden are less dire than for lower-income households, but they are still significant. For example, a family of four earning the median income in San Francisco that paid fair market rent for a two-bedroom apartment would be rent burdened. A housing unit that would be considered affordable to them would cost at least $135 per month below fair market rent (or approximately $2,882 or less). Money that a family could save on a unit below fair market rate could help reduce household debt, add to retirement savings, or pay for necessities like child care. Rent burden among moderate-income households tends to be more common in large cities with strong economies and significant geographic and regulatory constraints on new housing, such as San Francisco and New York. The lowest-income households face challenges securing affordable rental units. There are not enough rental units that are affordable to the lowest- income households without rental assistance. Specifically, according to HUD, lower-income households face competition from moderate- or high- income households to rent affordable units. HUD’s analysis showed that although there were enough affordable units nationwide to house 66 percent of extremely-low income renters in 2015, 43 percent of those units were occupied by renters with higher incomes. We also found that for all income groups, rents rose faster than incomes and therefore became less affordable to varying degrees. Specifically, estimated median rent-to-income ratios, which indicate the median proportion of income devoted to rent, generally increased from 2001 through 2017, according to our analysis (see fig. 12). For the lowest- income households, even small declines in affordability have a big impact because these households face the highest rent burdens and have the fewest options in the housing market. See appendix III for more detailed information on rent-to-income ratios. Based on two indexes we created to analyze rental housing conditions using American Housing Survey data, we found that an estimated 15 percent of renter households—more than 5 million—lived in units with serious deficiencies in 2017. Specifically, an estimated 12 percent of renter households (more than 4 million households) lived in units with substantial quality issues. These units typically had a combination of issues, such as cracked walls and the presence of rodents, or multiple heating problems and the presence of rodents. An additional 3 percent of renter households (more than 1 million households) lived in incomplete units—that is, units lacking essential components of a dwelling (such as heating equipment or hot and cold running water). Further, an estimated 28 percent of households—nearly 10 million—rented units with less substantial quality issues. Table 2 presents these findings and how our indexes described different types of rental housing conditions. The proportion of rental units with the three types of deficiencies— substantial quality issues, less substantial quality issues, and absence of essential components of a dwelling—generally remained stable from 2001 through 2017 (see fig. 13). The proportion of rental units that had at least one of these deficiencies ranged from an estimated 39 to 47 percent from 2001 through 2017. We analyzed rental housing conditions by renter household and rental unit characteristics. Households with low incomes (those with low, very low, or extremely low incomes) or with rent burdens comprised half or more of renters living in units with substantial quality issues and incomplete housing units (those lacking essential components of a dwelling). Although incomplete housing units represented a small percentage of rental units overall (about 3 percent), there were more than an estimated 1 million such units in 2017. Low-income renters have fewer affordable options and, as a result, may end up in units with deficiencies out of necessity. Households with low, very low, or extremely low incomes represented an estimated 62 percent of renters overall in 2017. These households occupied an estimated 67 percent of units that had substantial quality issues and nearly 80 percent of incomplete units. Similarly, rent-burdened households represented an estimated 50 percent of renters overall in 2017 and occupied an estimated 53 percent of units with substantial quality issues and 60 percent of incomplete units. There were some notable differences in housing conditions by age and race/ethnicity. Older households (65 and older) were the most likely age group to live in rental units with no deficiencies in 2017. About half of renting households were White in 2017, and White households comprised the largest share of renters in each quality or completeness category we analyzed. The proportions of Hispanic and Asian households that rented incomplete units (estimated at 31 percent and 11 percent, respectively) were higher than the overall proportions of Hispanic and Asian renter households (estimated at 20 percent and 6 percent, respectively). In addition, the proportion of Black households that rented units with substantial quality issues (estimated at 24 percent) was slightly higher than the overall proportion of Black renter households (estimated at 21 percent). Rental housing conditions by unit age or type were generally consistent from 2001 through 2017. As expected, units built after 2000 had fewer deficiencies than those built before. Older rental housing—units built prior to 1980—were more likely to have substantial quality issues than those built after. An estimated 63 percent of units in high-growth metro areas had no quality issues as of 2017, compared to an estimated 55 to 57 percent of units in other types of localities. There was little other variation in housing conditions by locality type. We also found that detached single-family homes and mobile homes were somewhat more likely to have serious deficiencies than multifamily units. The proportion of units with these deficiencies remained relatively steady from 2001 through 2017. One reason for this is single-family units lack on-site building managers and other benefits of shared maintenance that multifamily units may provide. Some researchers and industry participants have noted possible maintenance challenges for a growing number of investor-owners of single-family rentals that manage thousands of properties of varying size, age, and condition. From 2001 through 2017, the proportion of single-family units with serious deficiencies (rental units lacking essential components of a dwelling or units with substantial quality issues) ranged from around 13 to 20 percent (see fig. 14). During the same period, the proportion of single-family units with less substantial quality issues ranged from an estimated 28 to 34 percent. We also analyzed household crowding trends based on American Community Survey data. We defined crowded households as those having more than two people per bedroom. From 2001 through 2017, the incidence of renter household crowding decreased, with the greatest percentage point declines for Hispanic households prior to the housing crisis. Generally, households that were younger, Hispanic or Asian, or had lower incomes were more likely to experience crowding. In addition, crowded households were more common in high-density and high-growth metro areas. Appendix VI includes information on household crowding by race/ethnicity, age, household income, and locality type. We provided a draft of this report to HUD for review and comment. HUD officials told us that they had no comments on the draft report. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Housing and Urban Development, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4529 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. The objectives of this report were to analyze trends in (1) the share of households that rent and their characteristics, (2) the affordability of rental housing, and (3) rental housing conditions. We analyzed 2001–2017 data from the American Community Survey and American Housing Survey to describe renter household characteristics, rent affordability, rental housing conditions, and trends at the national level and across different types of localities. The American Community Survey is an ongoing survey administered by the Census Bureau of around 3.5 million households across the United States; the data we used in our analysis were current as of 2017, the most recently available data at the time of our review. The survey collects data on the economic, social, housing, and demographic characteristics of communities at various geographic levels, including metropolitan areas, states, and counties. The American Housing Survey is a biennial survey sponsored by the Department of Housing and Urban Development (HUD) and administered by the Census Bureau that collects a range of housing information, including the size and composition of the U.S. housing inventory, physical condition of housing units, characteristics of occupants, and other information. Findings from each survey are subject to sampling errors. To assess the reliability of the data, we reviewed technical information for each survey. In addition, we interviewed HUD and Census Bureau officials to identify differences across survey years and understand geographic limitations of publicly available data. We determined that the surveys were sufficiently reliable for purposes of reporting at the national level on renter household characteristics. However, we determined that additional, nonpublic data were needed from each survey to analyze renter household characteristics, rent burden, and rental housing conditions for smaller geographic units. To address this limitation, staff from HUD’s Office of Policy Development and Research provided us with aggregated Census Bureau data. To assess the reliability of these data, we analyzed the underlying programming code and related documentation from agency officials and reviewed for missing data, outliers, and errors. We determined that the data were sufficiently reliable for purposes of analyzing renter household characteristics, rent burden, and rental housing conditions from 2001 through 2017 at the national level and for different types of localities. For all objectives, to describe common trends and differences across localities—that is, localities with different population growth rates and densities—we developed metro area groupings. The groupings provide a general framework for describing metro areas that experienced varying degrees of population growth from 2000 through 2017 and how trends in renter household characteristics, rent affordability, and rental housing conditions compared to trends in other types of areas. To identify the locality types, we analyzed core-based statistical areas by population growth from 2000 through 2017 and population density as of 2017. We identified three growth categories (high, moderate, and negative) and further categorized the moderate growth group by density (high and moderate). We also identified a group of nonmetro areas consisting of all counties in each state that are outside the boundaries of any metro area. These areas included micropolitan areas, small towns, and low-density rural areas. The five locality types were high-growth metro areas, moderate-growth/high-density metro areas, moderate- growth/moderate-density metro areas, negative-growth metro areas, and nonmetro areas. To describe trends in the share of households that rent and their characteristics, we analyzed American Community Survey data from 2001 through 2017 at the national level and across different types of localities, with a focus on renter household age, race/ethnicity, and income. We defined four head-of-household age categories: younger (20–34 years old), early middle age (35–49 years old), late middle age (50–64 years old), and older (65 years and older). We reported on five race/ethnicity categories, combining some Census categories for our analysis: White, Black, Hispanic (an ethnicity that applies to individuals of any racial background), Asian (includes Asian, Native Hawaiian, and Other Pacific Islander), and Other (includes American Indian, Alaska Native, two or more races, and some other race). We defined five income categories based on income ranges that HUD uses for determining rental assistance eligibility or reporting to Congress on worst case needs: extremely low income (up to 30 percent of HUD area median family income (HAMFI)); very low income (more than 30, up to 50 percent of HAMFI); low income (more than 50, up to 80 percent of HAMFI); moderate income (more than 80, up to 120 percent of HAMFI) and higher income (greater than 120 percent of HAMFI). To describe trends in the affordability of rental housing, we analyzed American Community Survey data on gross rent as a percentage of household income from 2001 through 2017 at the national level and across different types of localities. Consistent with other housing research and HUD policies, we defined rent burden as spending more than 30 percent of household income on rent, moderate rent burden as spending more than 30 and up to 50 percent of household income on rent, and severe rent burden as spending more than 50 percent of household income on rent. Further, as described in appendix IV, we developed a supplementary analysis of rental housing affordability for rural areas by state. To describe trends in rental housing conditions, we analyzed data from the American Community Survey and American Housing Survey from 2001 through 2017 at the national level and across different types of localities. HUD designed the American Housing Survey to include indicators of housing quality. HUD analyzes and reports periodically on a housing adequacy measure as part of its worst case housing needs assessments for Congress. HUD’s adequacy measure and related research informed our methodology for developing two indexes to analyze rental housing conditions. We developed the indexes to more specifically define the range of housing conditions. The two indexes include 13 quality-related variables and nine variables we identified as essential components of a dwelling from the American Housing Survey, described in table 3. Appendix II includes more detailed information about our methodology. Appendix V includes information on the similarities and differences between HUD’s adequacy index and the indexes we developed for this report. With our indexes, we analyzed trends in rental housing conditions by renter household characteristics and rental unit characteristics. The renter household characteristics we analyzed included household income and affordability, race/ethnicity, and age. The rental unit characteristics we analyzed included location, age, and structure type. In addition, from American Community Survey data, we analyzed household crowding as another aspect of housing conditions. Further, we reviewed reports and studies on housing conditions and interviewed stakeholders including federal agency officials, academic experts, and research organizations. To further describe trends in renter household characteristics, rent affordability, and rental housing conditions during our review period, we reviewed reports and studies by federal agencies and research organizations and interviewed a variety of stakeholders selected for their knowledge of these issues, including federal agency officials from HUD, the Census Bureau, Congressional Research Service, the Department of Agriculture, the Federal Housing Finance Agency, and the Department of the Treasury; academic experts, including researchers from Harvard’s Joint Center for Housing Studies and others; research organizations that included the Bipartisan Policy Center, various researchers associated with the Board of Governors of the Federal Reserve System, Brookings Institute, Center on Budget and Policy Priorities, Housing Assistance Council, National League of Cities, National Rural Housing Coalition, Urban Land Institute, and Urban Institute; and industry groups that included the National Association of Home Builders, National Association of Realtors, and the National Housing Conference. We conducted this performance audit from February 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objective. This appendix provides additional details on our analysis of the conditions of the national rental housing stock between 2001 and 2017. To assess rental housing conditions, we used data from the national American Housing Survey (AHS), which is administered by the Census Bureau and conducted every odd year. Specifically, we considered two concepts, unit completeness and unit quality, and relied on questions which were consistently asked over the 2001 to 2017 period to define nine completeness and 13 quality variables. These are described in table 4. The survey questions underlying uncomfortably cold periods and heating equipment breakdowns were only asked of respondents who occupied their unit in the winter prior to the survey year, so our main analysis of rental unit quality only considered cash-rent housing units occupied by households since the prior winter, while the analysis of unit completeness considered all cash-rent units. See table 5 for the distributions of the completeness and quality variables in 2017. We used each set of variables to construct two indexes, one of unit completeness (an indicator) and one of unit quality (a continuous measure). We collapsed the continuous quality index into three categories (no quality issues, less substantial quality issues, and substantial quality issues) to facilitate a summary of rental housing quality trends. To determine rental unit completeness, we first summed the number of missing components contained in the nine completeness components for each rental unit in the surveys. We obtained an estimate of Cronbach’s alpha associated with this sum of 0.40, which was low enough to suggest that a simple indicator would be a more appropriate summary measure. We therefore determined that each of the nine completeness components was essential for us to consider a unit livable, and assigned a completeness score to each rental unit based on the absence of any of them. The resulting index therefore measured incompleteness, where a score of 1 indicated that a unit was missing one or more of the essential components. See table 6 for the distribution of the completeness index in the survey years between 2001 and 2017. for inference that is robust to non-normal distributions of the latent continuous variables. Finally, we obtained quality score estimates by empirical Bayes, which selects the mode of the posterior distribution 𝑝𝑝(𝜂𝜂̂|𝑦𝑦𝑖𝑖) evaluated at the estimates of the model’s parameters. Note that because all quality variables increased in the presence or number of issues, the quality index correspondingly increased in poor quality. We first estimated two variants of the factor model, one accounting for the sample weights assigned to units in each survey (our preferred specification), and one that did not account for these weights. The robust root mean square error of approximation from the latter of 0.020 suggested that our single factor model provided an appropriate representation of the AHS data. Estimates of the polychoric correlation matrix and of the factor loadings are reported in tables 7 and 8 respectively. We assessed stability by estimating the model on each AHS year separately and broadly found that factor loadings estimates varied little over time. Given the estimates from our preferred specification, which accounts for the survey design, we then relied on empirical Bayes estimation to assign a quality score to each unit for which responses to all 13 quality variables were observed. The full distributions of the resulting quality index in the survey years between 2001 and 2017 are reported in figure 15. We then selected thresholds in the distribution of the continuous quality index to distinguish between units without any quality issues, units with a quality score indicating the presence of less substantial issues, and units with a score denoting more substantial issues (those with either a combination of some of the most severe issues as determined by the model, or a large number of issues of varying severities). The first threshold between units with no quality issues and units with at least one issue occurred at a score of -0.2280. Units with no issues represented between 54 and 62 percent of the rental units to which we were able to assign quality scores. To further separate units experiencing any issues into two groups, we inspected the quality score distribution for local minima in its density to find a score around which small perturbations in threshold choice would have little effect on the share of units falling into each of the two groups. We examined all quality issue profiles experienced in units with scores in the region around two candidates where the density nearly reached 0, and selected a score of 0.5240 as the second threshold, immediately above which were units with one or more holes in the floor large enough to catch someone’s foot. All units with a quality score of 0.5240 or higher were therefore considered to have substantial issues. Table 9 reports the share of cash-rent, previous-winter-occupied units for each quality level in the survey years between 2001 and 2017, and table 10 reports the most common quality issue profiles in 2017. Our analysis is subject to several limitations. In determining both unit completeness and quality, we were limited to the variables consistently available across all survey years. Therefore, we could not include features not observed in the AHS which could be deemed to be important components of either unit completeness (such as a unit’s access to an internet service provider) or quality (such as the presence of major defects in the structure of the unit’s building). In the quality factor model, we assumed that quality was uncorrelated with the error term from each measurement equation and that the error terms were uncorrelated with each other to obtain estimates of the model’s parameters, and ultimately the quality scores. A violation of these assumptions would bias the estimates. For example, if rental units located in regions with harsh weather were of systematically worse quality than units in fairer weather regions, the estimated effect of poor quality on a variable like the number of outdoor leaks could be overstated, which would in turn overweight the importance of outdoor leaks in the estimation of the quality scores, resulting in overly poor quality score estimates for units experiencing outdoor leaks. Conversely, if units in harsh weather regions were of systematically better quality than those in fairer weather regions (e.g. as a measure of resilience) the estimated effect of poor quality on outdoor leaks would be understated, biasing down the importance of outdoor leaks in the estimation of quality scores. In general, any systematic linear relationship between latent quality (𝜂𝜂) and the unobserved factors (𝜀𝜀𝑖𝑖) affecting one of the 13 unobserved latent continuous variables, or between the unobserved factors themselves, would be a violation of the model’s assumptions. Since the two quality variables recording uncomfortably cold periods and heating equipment breakdowns were only asked of respondents who occupied their unit in the winter prior to the survey year, we could not assign quality scores to the 10 to 25 percent of rental units across years which were occupied by recent movers. To assess potential biases on the quality distribution of the full cash-rent-occupied rental housing stock introduced by excluding this group, we therefore compared both groups along the remaining 11 dimensions Of the 11 observable quality variables, three exhibited an incidence of issues that differed meaningfully across the two groups. These differences were persistent throughout survey years and consistent in their direction: units whose respondents moved in later than the winter prior to the interview were between 5 to 10 percentage points less likely to experience any outside leaks, inside leaks, and to report evidence of rodents. The differences were meaningful in that they corresponded to over a halving of the incidence of the evidence of rodents, and up to a halving of the incidence of both types of leaks in the recent-mover units relative to the units for which all quality variables were available. To evaluate the effect of these differences on the quality distribution of the full universe of cash-rent units, we estimated a modified quality factor model in which we dropped the uncomfortably cold periods and heating equipment breakdowns variables. This allowed us to obtain quality scores for both the units with the original scores and the recent-mover units. The distributions of the modified quality indices in the two groups reached their largest difference at the share of units without any of the set of 11 quality issues, and we estimated that across all survey years, 1.3 to 2.4 percentage points more units would likely have no measured quality issues in the full cash-rent universe than we found in that which excludes the recent movers. Furthermore, the distributions of the modified indices truncated to exclude the respective units without any of the 11 quality issues were largely comparable. In the full universe of cash-rent units, we would therefore expect decreases in each of the shares of less substantial issues and substantial issues units proportional to their respective shares in the partial universe, and in sum corresponding to the magnitude of the increase in units with no issues each year. The alternative of including recent movers in our main model at the expense of the uncomfortably cold periods and heating equipment breakdowns variables would have yielded a share of units without any other quality issues that we estimated to be 3 to 4 percentage points higher than the share calculated using the original index in the partial universe. Because we believed that these variables should ultimately be included in the quality index, and because we considered the biases we estimated to be relatively small, we retained the original index. In this appendix we present our analysis of rentership and housing affordability by age, race/ethnicity, locality type, and income from 2001 through 2017. The data on renter households are from the American Community Survey’s 1-year estimates. In this appendix we present state-level analysis of housing affordability for rural renter households. While rental affordability is a challenge in both rural and urban areas, differences in demographics, economies, housing stock, and federal rental assistance programs make rural rental affordability issues unique We defined rural areas using the U.S. Department of Agriculture’s 2010 rural-urban commuting area (RUCA) codes. The data on renter households living in these areas are from the American Community Survey’s 5-year estimates for 2013 through 2017. While renter households lived in rural areas of all 50 states, generally the most populous states had the largest populations of renter households in rural areas (fig. 16). From 2013 through 2017, more than an estimated 2.2 million renter households lived in rural areas. The states with the largest estimated populations of renter households in rural areas were Texas (119,000), Missouri (96,000), Wisconsin (96,000), and Kentucky (93,000). The prevalence of rural renter households varied significantly by state. While only about 5 percent of renter households lived in rural areas from 2013 through 2017, some states had significantly larger proportions of renters in rural areas. States with higher estimated proportions of rural renter households generally had small populations and were in northern New England or along the Missouri, Mississippi, or Ohio Rivers (fig. 17). The states with the largest estimated proportions of renter households in rural areas were Vermont (39 percent) and Montana (32 percent). Renter households in rural areas generally had lower incomes than other renter households. From 2013 through 2017, while the median income for renter households overall was an estimated $36,653, nearly three in five rural renter households had incomes lower than $35,000. For context, a household with two full-time jobs earning the federal minimum wage in 2017 would earn approximately $30,160. In general, Southern states had the highest estimated proportion of rural renter households with incomes less than $35,000 (fig. 18). The states with the smallest proportion of rural renter households with incomes lower than $35,000 were New Jersey (25 percent), Rhode Island (32 percent), Alaska (35 percent), Hawaii (39 percent), and Connecticut (39 percent). Rent burden was common among renter households in rural areas, but prevalence varied by state. Rent burden was slightly less common among rural renter households from 2013 through 2017 (45 percent) than renter households in general in 2017 (48 percent). In eight of 48 states, at least 50 percent of rural renter households were rent burdened (fig. 19). In general, rural rent burden was most common in the Northeast, South, and West Coast, and least common in the U.S. interior. Louisiana had the highest estimated rate of rent burden among rural renter households (55 percent) and Wyoming had the lowest (33 percent). Rent burdens were more common among rural households with incomes below $35,000. From 2013 through 2017, an estimated 70 percent of these households were rent burdened, and in no individual state were less than 50 percent of these households rent burdened (fig. 20). The five states with the highest proportion of lower-income rural renter households that were rent burdened were Alaska (81 percent), Massachusetts (83 percent), Hawaii (83 percent), California (83 percent), and Delaware (85 percent). As discussed previously in this report, lower-income households with rent burdens may struggle to pay for essential needs like food, transportation, health care, and clothing. Rent burdens were uncommon among rural households with incomes of $35,000 or greater. From 2013 through 2017, only an estimated 9 percent of these households were rent burdened, and in no state were more than 30 percent of these households rent burdened (fig. 21). In 40 of 48 states, less than an estimated 15 percent of rural renter households with incomes of $35,000 or greater were rent burdened. The four states with the highest proportion of rural renter households with income $35,000 or greater that were rent burdened were Connecticut (28 percent), Hawaii (26 percent), California (24 percent), and Massachusetts (22 percent). This appendix describes how the indexes we developed to analyze rental housing conditions compare to an index the Department of Housing and Urban Development (HUD) uses to measure housing adequacy. Although our index uses many of the same American Housing Survey variables as HUD’s adequacy index, differences in our analytic methods allowed us to produce more detailed results on housing conditions. HUD measures housing adequacy as part of its ongoing efforts to analyze and report on worst case housing needs The adequacy index is a measure that is based on 19 variables in the American Housing Survey. It categorizes housing units as severely inadequate, moderately inadequate, or adequate based on whether a surveyed housing unit meets certain conditions or criteria. Severely inadequate housing units represented 2 to 3 percent of all rental units from 2001 through 2017. We developed two indexes based on a factor analysis of 13 quality- related variables and nine variables we identified as essential components of a dwelling. We determined that two indexes were needed to describe rental housing unit conditions based on American Housing Survey data, as relevant variables fell into two categories that required different statistical treatment and interpretation. Figure 22 provides a detailed comparison between the variables and scoring techniques of our indexes and HUD’s adequacy index. We compared HUD’s 2017 housing adequacy findings to the results of our indexes and identified some notable differences. Among rental units that HUD considered adequate in 2017, an estimated 8 percent had substantial quality issues as measured by our quality index—affecting 2.7 million households. In addition, another estimated 9.7 million units had less substantial quality issues. These units did not satisfy HUD’s scoring criteria for inadequate or moderately inadequate units, but they had a combination of issues that exceeded our statistical thresholds for substantial and less substantial quality issues. Figure 23 provides a detailed comparison of how our results compare to HUD’s. This appendix provides additional information on rental housing conditions by household income, affordability (rent burden), race/ethnicity, age, rental unit age, and structure type, based on two indexes we developed to analyze American Housing Survey data The appendix also includes information on household crowding based on our analysis of American Community Survey data by household income, rent burden, race/ethnicity, and age. In addition to the contact named above, Heather Chartier (Analyst in Charge), Jeremy Anthony, Daniel Benson, Abigail Brown, Stephen Brown, Nina Daoud, Davis Judson, John McGrail, Yann Panassie, Dae Park, Lena Richenberg, Paul Schmidt, Jennifer Schwartz, Jena Sinkfield, Farrah Stone, and Jeff Tessin made key contributions to this report.", "summary": "Since the 2007–2009 financial crisis, growth in the share of renter households has reversed a decades-long trend toward homeownership. This change has underscored concerns about the availability, affordability, and condition of rental housing, especially for low-income households. The federal government subsidizes rents for around 4.4 million households per year, but more households qualify for assistance than receive it. GAO was asked to provide a comprehensive assessment of the housing market. This report examines trends in the housing market prior to the COVID-19 pandemic and does not account for the profound impact it will likely have on renter households. This report, one of several GAO plans to issue, focuses on rental housing from 2001 through 2017 and analyzes (1) the share of households that rent, (2) the affordability of rental housing, and (3) rental housing conditions. GAO analyzed American Community Survey and American Housing Survey data from 2001 through 2017 (the most recent data available at the time of this review) at the national level and for different types of localities. GAO also reviewed recent reports by the Department of Housing and Urban Development (HUD), research organizations, and academic researchers on rental housing and obtained views from a variety of stakeholders selected for their knowledge of these issues, including federal agency officials, academic experts, research organizations, and industry groups. In 2017, almost 7 million more households rented their homes than in 2001, which brought the share of households that rent from an estimated 34 percent to 36 percent. Renting became more common after the 2007–2009 financial crisis as foreclosures and changes in household characteristics reduced the proportion of homeowners. Renting was more prevalent across most age and race/ethnicity groups in 2017 than in 2001, with notable increases among higher-income households. Rental affordability declined from 2001 to 2017. In 2017, 48 percent of renter households were rent burdened—that is, they paid over 30 percent of income for rent—which is 6 percentage points higher than in 2001. Rent burden was most common and most severe among lower-income households (80 percent or less than area median income), with almost three-quarters of extremely low-income households (30 percent or less than area median income) paying over half of their income in rent (see figure). Affordability declined because of a range of factors, including more households competing for rental units and the supply of low-cost rental units not keeping up with demand. Note: Estimates in this figure have a margin of error of ±2 percentage points or fewer, at the 95 percent confidence level. An estimated 15 percent of rental units in 2017—more than 5 million—had substantial quality issues (such as cracked walls and the presence of rodents) or lacked essential components of a dwelling (such as heating equipment or hot and cold running water), according to GAO's analysis of American Housing Survey data. The share of units with deficiencies was relatively stable from 2001 to 2017. Serious deficiencies more often affected households with extremely low incomes or rent burdens. In addition, lower-income households rented approximately two-thirds of the units with substantial quality issues and nearly 80 percent of units lacking essential components.", "document_type": "gao"}
{"report": "CERCLA established the Superfund program to clean up contaminated sites to protect human health and the environment from the effects of hazardous substances. CERCLA requires the President to establish procedures and standards for prioritizing and responding to releases of hazardous substances, pollutants, and contaminants into the environment and to incorporate these procedures and substances into the National Oil and Hazardous Substances Pollution Contingency Plan (National Contingency Plan). Under CERCLA, PRPs are liable for conducting or paying for the cleanup of hazardous substances at contaminated sites. EPA and PRPs can undertake two types of cleanup actions: removal actions and remedial actions. Removal actions are usually short-term cleanups for sites that pose immediate threats to human health or the environment. Remedial actions are generally long-term cleanups—consisting of one or more remedial action projects—that aim to permanently and significantly reduce contamination. Remedial actions can take a considerable amount of time and money, depending on the nature of the contamination and other site-specific factors. EPA’s Office of Superfund Remediation and Technology Innovation, which is part of the Office of Land and Emergency Management, oversees remedial actions at NPL sites, including nonfederal NPL sites. At each nonfederal NPL site, the lead official who is responsible for compliance with the National Contingency Plan is the remedial project manager. Management of nonfederal NPL sites is the responsibility of the EPA region in which a site is located. EPA has 10 regional offices, and each one is responsible for executing EPA programs within several states and, in some regions, territories. Figure 1 illustrates EPA’s 10 regions. The Superfund process begins with the discovery of a potentially hazardous site or notifications to EPA regarding the possible release of hazardous substances that may pose a threat to human health or the environment. EPA’s Superfund remedial cleanup process for nonfederal NPL sites includes the actions shown in figure 2. Site assessment. EPA, states, tribes, or other federal agencies evaluate site conditions to identify appropriate responses to releases of hazardous substances to the environment. During this process, EPA or other entities, such as state or tribal agencies, collect data to identify, evaluate, and rank sites using agency criteria. Site listing. EPA considers whether to list a site on the NPL based on a variety of factors, including the availability of alternative state or federal programs that may be used to clean up the site. Sites that EPA proposes to list on the NPL are published in the Federal Register. After a period of public comment, EPA reviews the comments and makes final decisions on whether to list the sites on the NPL. Remedial investigation and feasibility study. EPA or the PRP will generally begin the remedial cleanup process for an NPL site by conducting a two-part study of the site. First, EPA or the PRP conducts a remedial investigation to characterize site conditions and assess the risks to human health and the environment, among other actions. Second, EPA or the PRP conducts a feasibility study to assess various alternatives to address the problems identified through the remedial investigation. Under the National Contingency Plan, EPA considers nine criteria, including long-term effectiveness and permanence, in its assessment of alternative remedial actions. Record of decision. EPA issues a record of decision that identifies its selected remedy for addressing the contamination at a site. A record of decision typically lays out the planned cleanup activities for each operable unit of the site as well as an estimate of the cost of the cleanup. Remedial design and remedial action. EPA or the PRP plans to implement the selected remedy during the remedial design phase, and then, in the remedial action phase, EPA or the PRP carries out one or more remedial action projects. Construction completion. EPA generally considers construction of the remedial action to be complete for a site when all physical construction at a site is complete, including actions to address all immediate threats and to bring all long-term threats under control. Postconstruction completion. EPA, the state, or the PRP performs operation and maintenance for the remedy, if needed, such as by operating a groundwater extraction and treatment system. EPA generally performs reviews of the remedy at least every 5 years to evaluate whether it continues to protect human health and the environment. Deletion from the NPL. EPA may delete a site, or part of a site, from the NPL when the agency and the relevant state authority determine that no further site response is needed. Nonfederal NPL sites may include a variety of contaminants, and EPA may select different types of remedies to clean up the sites. EPA had recorded more than 500 contaminants at nonfederal NPL sites as of fiscal year 2014, the most recently available data. According to the Agency for Toxic Substances and Disease Registry, the highest-priority contaminants—based on a combination of their prevalence, toxicity, and potential for human exposure—are arsenic, lead, mercury, vinyl chloride, and polychlorinated biphenyls. For example, in 2016, the Agency for Toxic Substances and Disease Registry reported that exposure to arsenic in drinking water is associated with various health effects, such as pulmonary and cardiovascular disease, diabetes, and certain cancers. Contaminants may be found in different media at nonfederal NPL sites. In 2017, EPA reported that groundwater and soil were the most common contaminated media, including at the nonfederal NPL sites it analyzed. To clean up a nonfederal NPL site, EPA may select various on-site or off- site remedies. For example, EPA may select on-site remedies that include treatment as well as those that do not, such as on-site containment, monitored natural recovery, and institutional controls. In 2017, EPA reported that about a quarter of the decision documents for sites it analyzed included on-site treatment. EPA may also treat or dispose the contamination off-site. Examples of off-site treatment and disposal include incineration and recycling. EPA reported that sites it analyzed may have various combinations of remedies, including treatment, on-site containment, off-site disposal, and institutional controls. Various federal agencies provide nationwide data on flooding, storm surge from hurricanes, wildfires, and sea level rise. Data on flooding, storm surge, and wildfires are generally based on current or past conditions. NOAA models the extent of inundation for various heights of sea level rise compared to the most recently available data on average high tide. FEMA provides flood hazard and risk information to communities nationwide. Among other information, FEMA provides data on coastal and riverine flooding in the National Flood Hazard Layer, a database that contains the most current flood hazard data. Federal law requires FEMA to assess the need to revise and update the nation’s flood maps at least every 5 years. Among other uses, the flood hazard data are used for flood insurance ratings and floodplain management. The National Flood Hazard Layer identifies areas at the highest risk of flooding, which are those that have a 1 percent or higher annual chance of flooding. In some locations, the National Flood Hazard Layer also identifies areas with 0.2 percent or higher annual chance of flooding, which FEMA considers to be a moderate flood hazard, as well as other flood hazards. The National Flood Hazard Layer also identifies areas with minimal flood hazard, including those with less than 0.2 percent annual chance of flooding, and unknown flood hazard, including areas FEMA had not assessed for flood hazards. In 2018, the Technical Mapping Advisory Council noted that FEMA has produced modernized data (i.e., digital maps) for areas of the United States where 98 percent of the population resides, but has not determined the flood hazard for 40 percent of streams. In general, flood hazards are based on existing conditions in the watershed and floodplains. However, in certain cases, FEMA may include flood hazard information that is based on future conditions, according to FEMA regulations. NOAA provides estimates of hurricane storm surge using a model called Sea, Lake and Overland Surges from Hurricanes. Estimates are available for eastern U.S. coastal areas from Texas through Maine and other areas affected by storm surge, including Hawaii, Puerto Rico, and the U.S. Virgin Islands. As of June 2019, NOAA had not modeled storm surge for the West Coast of the United States or other Pacific islands. The model takes into account a specific locale’s shoreline, incorporating bay and river configurations, water depths, bridges, roads, levees, and other physical features. It estimates the maximum extent of storm surge at high tide by modeling hypothetical hurricanes under different storm conditions, such as landfall location, storm trajectory, and forward speed. NOAA models storm surge from Category 1 through Category 5 hurricanes for the Atlantic coast south of the North Carolina–Virginia border, the Gulf of Mexico, Puerto Rico, and the U.S. Virgin Islands and Category 1 through Category 4 hurricanes for the Atlantic coast north of the North Carolina–Virginia border and Hawaii. According to NOAA’s website, the model is to be used for educational purposes and awareness of the storm surge hazard at a city or community level. In accordance with federal law, the model is also used for other purposes, such as hurricane evacuation studies. According to NOAA’s website, the agency updates the model for portions of the shoreline each year to account for, among other changes, new data and the addition of flood protection devices, such as levees. The model does not account for future conditions such as erosion, subsidence (i.e., the sinking of an area of land), construction, or sea level rise. The U.S. Forest Service maps wildfire hazard potential based on landscape conditions and other observations. According to the U.S. Forest Service, the primary intended use of the wildfire hazard potential map is to identify priority areas for hazardous fuels treatments from a broad, national- to regional-scale perspective. The U.S. Forest Service maps an index of wildfire hazard potential for the contiguous United States, based on, among other factors, annual burn probabilities and potential intensity of large fires. The U.S. Forest Service categorizes the wildfire hazard potential index into five classes of very low, low, moderate, high, and very high. For example, the U.S. Forest Service designates as “high” those areas with wildfire hazard potential index from the 85th to the 95th percentile, and “very high” above the 95th percentile. The U.S. Forest Service also categorizes areas as nonburnable (including agricultural and developed lands) and water. According to the U.S. Forest Service, areas with higher values of wildfire hazard potential represent vegetation that is more likely to burn with high intensity under certain weather conditions. However, areas with moderate, low, and very low wildfire hazard potential may still experience wildfire, particularly if they are near areas that have higher wildfire hazard potential. Wildfire hazard potential is not a forecast or wildfire outlook for any particular season as it does not include any information on current or forecasted weather or fuel moisture conditions. NOAA models the extent of inundations from various heights of sea level rise (up to 10 feet above average high tides) for the contiguous United States, Hawaii, the Pacific islands, Puerto Rico, and the U.S. Virgin Islands and provides the results in a web mapping tool called the Sea Level Rise Viewer. NOAA’s guidance on the Sea Level Rise Viewer states that data are not available for Alaska. The uses of the sea level rise data include planning and education but not site-specific analysis, according to a NOAA document. NOAA labels areas as not mapped if elevation data of sufficient quality for the areas are not available. NOAA does not model natural processes, such as erosion, subsidence, or future construction, or forecast how much sea level is likely to rise in a given area. Rather, for various heights of local sea level rise, NOAA determines extent of inundation based on the elevation of an area and the potential for water to flow between areas. Enterprise risk management is a tool that allows agencies to assess threats and opportunities that could affect the achievement of their goals. In a December 2016 report, we updated our 2005 risk management framework to reflect changes to the Office of Management and Budget’s Circular A-123, which calls for agencies to implement enterprise risk management. We also incorporated recent federal experience and identified essential elements of federal enterprise risk management. Our December 2016 report states that beyond traditional internal controls, enterprise risk management promotes risk management by considering the effect of risk across the entire organization and how it may interact with other identified risks. Additionally, it addresses other topics, such as strategy determination, governance, communicating with stakeholders, and measuring performance. The principles of enterprise risk management apply at all levels of the organization and across all functions, such as those related to managing risk to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites. The six essential elements of enterprise risk management that we identified in our December 2016 report are as follows: 1. Align risk management process with goals and objectives. Ensure that the process maximizes the achievement of agency mission and results. Agency leaders examine strategic objectives by regularly considering how risks could affect the agency’s ability to achieve its mission. 2. Identify risks. Assemble a comprehensive list of risks—both threats and opportunities—that could affect the agency’s ability to achieve its goals and objectives. 3. Assess risks. Examine risks, considering both the likelihood of the risk and the impact of the risk to help prioritize risk response. 4. Respond to the risks. Select risk treatment response (based on risk appetite), including acceptance, avoidance, reduction, sharing, or transfer. 5. Monitor risks. Monitor how risks are changing and whether responses are successful. 6. Communicate and report on risks. Communicate risks with stakeholders and report on the status of addressing the risks. Available federal data on flooding, storm surge, wildfires, and sea level rise suggest that about 60 percent (945 of 1,571) of all nonfederal NPL sites are located in areas that may be impacted by one or more of these potential climate change effects. These data, however, may not fully account for the number of nonfederal NPL sites that may be in such areas because (1) federal data are generally based on current or past conditions; (2) data are not available for some areas; and (3) the NCA has reported that climate change may exacerbate flooding, storm surge, and wildfires in certain regions of the United States. In addition, EPA does not have quality information on the boundaries of nonfederal NPL sites, which could affect its ability to identify the number of sites that may be impacted by one or more of these potential climate change effects. Available federal data suggest that 945 of 1,571 nonfederal NPL sites, or about 60 percent, are located in areas that may be impacted by selected climate change effects—that is, 0.2 percent or higher annual chance of flooding or other flood hazards, storm surge from Category 4 or 5 hurricanes, high and very high wildfire hazard potential, and sea level rise of up to 3 feet. The locations of these sites are shown in figure 3; the full results of our analysis and additional information on these sites is available in the interactive map and downloadable data file, which can be viewed at https://www.gao.gov/products/GAO-20-73. Our analysis, however, may not fully account for the number of nonfederal NPL sites that may be impacted by the effects of climate change for various reasons. First, we represented the areas of nonfederal NPL sites based on a 0.2-mile radius around their primary geographic coordinates, which may not accurately reflect their area (i.e., they may be larger or smaller). We did not analyze site-specific information for these nonfederal NPL sites, including the extent of contamination and location of remedies. Such site-specific analyses would be needed to determine whether there is a risk to human health and the environment at nonfederal NPL sites as a result of these potential climate change effects. Further, according to the NCA, EPA documents, and interviews with EPA officials, there may be other climate change effects that could impact nonfederal NPL sites, such as potential increases in salt water intrusion (the movement of saline water into freshwater aquifers), drought, precipitation, hurricane winds, and average and extreme temperatures; we did not analyze these effects because we did not identify relevant national-level federal data sets. We identified 783 nonfederal NPL sites—approximately 50 percent—in areas that FEMA had identified as having 0.2 percent or higher annual chance of flooding, which FEMA considers moderate flood hazard, or other flood hazards, as of October 2018. Of these 783 sites, our analysis shows that 713—approximately 45 percent of all sites—are currently located in areas with 1 percent or higher annual chance of flooding, FEMA’s highest flood hazard category. We provide information on the number of sites in areas with moderate or other flood hazards because, according to the NCA, heavy rainfall is increasing in intensity and frequency across the United States and is expected to continue to increase, which may lead to an increase in flooding in the future. The full results of our analysis—which include information on the sites in areas that may have 1 percent or higher annual chance of flooding, 0.2 percent or higher annual chance of flooding or other identified flood hazards, unknown flood hazard or no data, and minimal flood hazard—are available in our interactive map, which can be viewed here. For example, there are a number of nonfederal NPL sites in EPA Region 7, where states experienced record flooding in early 2019. Specifically, as seen in figure 4, there are 51 sites that are located in areas with 0.2 percent or higher annual chance of flooding or other identified flood hazards, of which 42 are located in areas with 1 percent or higher annual chance of flooding. Nationwide, the number of nonfederal NPL sites in areas that may be impacted by flooding currently may be higher than 783. Specifically, 217 nonfederal NPL sites are located in areas that FEMA has not assessed for flood hazards or that we did not analyze because the data were not available in a form we could use with our mapping software. We identified 187 nonfederal NPL sites—12 percent—in areas that may be inundated by storm surge corresponding to Category 4 or 5 hurricanes, the highest possible category, based on NOAA’s storm surge model as of November 2018. Of these sites, 102 are located in areas that may be inundated by a storm surge corresponding to Category 1 hurricanes. We analyzed areas that may be inundated by a storm surge corresponding to the highest possible category because, according to the NCA, a projected increase in the intensity of hurricanes in the North Atlantic could increase the probability of extreme flooding because of storm surge along most of the Atlantic and Gulf Coast states, beyond what would be projected based solely on relative sea level rise. However, the NCA stated that there is uncertainty in the projected increase in frequency or intensity of Atlantic hurricanes, and other factors may affect the potential for flooding because of storm surge, such as changes in overall storm frequency or tracks. The full results of our analysis, which include information on the number of sites in areas that may be inundated by storm surge from Category 1 and from Category 4 or 5 hurricanes, are available in our interactive map, which can be viewed here. In EPA Regions 2 and 3, where states experienced damage from two major hurricanes in 2017, there are 87 nonfederal NPL sites located within areas that may be inundated by storm surge from Category 4 or 5 hurricanes. Figure 5 shows these 87 sites, of which 54 sites may be inundated by storm surge from Category 1 hurricanes. Nationwide, the number of nonfederal NPL sites in areas that may be impacted by storm surge may be higher than 187 because NOAA has not modeled areas along the West Coast and Pacific islands other than Hawaii. Further, our analysis did not include other potential impacts from hurricanes, such as rainfall. Figure 6 shows an example of the impact of rainfall caused by a hurricane at the American Cyanamid NPL site. We identified 234 nonfederal NPL sites—15 percent—located in areas that have high or very high wildfire hazard potential—those more likely to burn with a higher intensity, based on a U.S. Forest Service model as of July 2018. For this analysis, we combined the high and very high wildfire hazard potential categories; we did not identify the number of sites in each of these categories separately. We did not analyze areas that currently have moderate or lower wildfire hazard potential because those with moderate or lower wildfire hazard potential are less likely to experience high-intensity wildfire and the extent to which wildfire hazard potential may change in the future is unknown. The full results of our analysis on the number of sites in areas with high or very high wildfire hazard potential are available in our interactive map, which can be viewed here. As seen in figure 7, there are 22 nonfederal NPL sites in areas with high or very high wildfire hazard potential in EPA Region 9, a region that experienced wildfires in 2018, including the highly destructive Carr Fire. Nationwide, the number of nonfederal NPL sites in areas that currently have high wildfire hazard potential may be higher than 234 because wildfire hazard data are only available for the contiguous United States (i.e., there are no data for Alaska, Hawaii and other Pacific islands, Puerto Rico, and the U.S. Virgin Islands). According to the NCA, the incidence of large forest fires in the western United States and Alaska has increased since the early 1980s and is projected to further increase in those regions as the climate changes. However, the NCA noted that analyses regarding the effect of climate change on the incidence of wildfire in other parts of the United States are not readily available, so it is unknown how climate change will affect the number of nonfederal NPL sites in areas rated with high or very high wildfire hazard potential nationwide. As figure 8 shows, wildfires can pose risks at nonfederal NPL sites, such as the Iron Mountain Mine site near Redding, California. We identified 110 nonfederal NPL sites—7 percent—located in areas that would be inundated by a sea level rise of 3 feet, based on our analysis of EPA and NOAA data as of March 2019 and September 2018, respectively. Our analysis shows that if sea level in these areas rose by 1 foot, 97 sites would be inundated. If sea level in these areas rose by 8 feet, 158 sites would be inundated. We also identified 84 nonfederal NPL sites that are located in areas that may already be inundated at high tide. We provide the number of sites in areas that may be impacted by these sea level rise heights because, according to the NCA, global average sea levels are very likely to continue to rise by at least several inches in the next 15 years and by 1.0 to 4.3 feet by 2100. Further, the NCA states that a rise of as much as 8 feet by 2100 cannot be ruled out. The full results of our analysis, which include information on the number of sites in areas that may already be inundated at high tide and that would be inundated if sea level rose by 1 foot, 3 feet, and 8 feet, are available in our interactive map, which can be viewed here. There are 23 nonfederal NPL sites located within areas that may be impacted if sea level rose by up to 3 feet in EPA Region 6, a region that has experienced land loss because of sea level rise and coastal flooding, according to the NCA. In addition, as seen in figure 9, 16—or 70 percent—of these sites may already be inundated at high tide. Nationally, the number of nonfederal NPL sites that may be inundated by various heights of sea level rise will vary from the results of our analysis because different parts of the United States may experience higher or lower sea level rise than the global average. For example, the NCA states that sea level rise will be higher than the global average on the East and Gulf Coasts of the United States and lower than the global average in most of the Pacific Northwest and in Alaska. As can be seen in figure 10, sea level rise and other coastal hazards may impact nonfederal NPL sites, such as the one in the San Jacinto River Waste Pits site in Texas, parts of which are already under water. EPA does not have quality information on the boundaries of nonfederal NPL sites, which could affect its ability to identify the number of sites that may be impacted by one or more of these potential climate change effects. According to EPA officials, EPA has not validated data on site boundaries and EPA’s regional offices do not use a consistent geographic standard, which makes it difficult to produce a national data set. In general, EPA officials told us that information on the boundaries of NPL sites has not been a focus at a national level and is not yet subject to quality standards. For example, EPA officials told us that boundary information for each NPL site represents the remedial project manager’s professional judgment and remedial project managers may determine and record the boundaries of sites differently. EPA has taken some initial actions to improve the quality of information on the boundaries of nonfederal NPL sites. In November 2017, the Office of Superfund Remediation and Technology Innovation issued a directive to all regional Superfund division directors recommending national standards for collecting and maintaining geographic information, including site boundaries. EPA’s 2017 directive notes that using national standards to collect geographic information, including site boundaries, promotes EPA’s reporting and analytical efforts to support program implementation and evaluation. In addition, in May 2018, EPA’s Office of Land and Emergency Management developed technical guidance for all its regions and programs for collecting, documenting, and managing geographic information on Superfund sites, including their boundaries. EPA officials told us that in 2019 and 2020, the agency plans to move toward recording site boundaries in a consistent format across regions and instituting procedures to validate and update them at least annually. However, EPA officials told us that there is no schedule in place for completing this effort and they are uncertain when they will complete it because of competing priorities. By developing a schedule for completing the standardization and improvement of the quality of the information on the boundaries of nonfederal NPL sites, EPA could more reasonably ensure that it would have quality information with which to fully identify nonfederal NPL sites that are located in areas that may be impacted by climate change effects. EPA’s actions to manage risks from the potential impacts of climate change effects align with three of the six essential elements of enterprise risk management. Specifically, for the six essential elements, EPA’s actions do not align with one essential element, aligning its enterprise risk management process with goals and objectives; partially align with two essential elements, assessing risks and responding to risks; and align with three essential elements, identifying risks, monitoring risks, and communicating about and reporting on risks. Table 1 shows the alignment of EPA’s actions with the essential elements of enterprise risk management. This essential element calls for agencies to align their risk management processes with the goals and objectives of the agency, but EPA has not taken action to clearly align its process for managing risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites with agency-wide goals and objectives. For example, the 2018 to 2022 EPA strategic plan does not include goals and objectives related to climate change or discuss strategies for addressing the impacts of climate change effects. Moreover, neither the fiscal years 2018 to 2019 nor fiscal years 2020 to 2021 national program manager guidance for EPA’s Office of Land and Emergency Management mentions climate change among its goals and priorities. In contrast to the current strategic plan, the 2014 to 2018 EPA strategic plan included addressing climate change as one of four strategic goals and specifically discussed climate change as an external factor or emerging issue in the context of planned, current, and completed cleanups, including at nonfederal NPL sites. In addition, the fiscal years 2016 to 2017 national program manager guidance for the office that oversees the Superfund program listed climate change adaptation as one of four national areas of focus for the office. According to an EPA official, when the 2018 to 2022 strategic plan was drafted, senior agency officials were not aware of the potential risks to the Superfund program mission from the impacts of climate change effects. According to this official, senior EPA officials have expressed support for certain activities related to climate change, such as the work of the Cross- EPA Work Group on Climate Adaptation, but have not issued related documents or policy statements. Without clarifying how the agency’s ongoing actions to manage these risks at nonfederal NPL sites align with current agency goals and objectives, EPA will not have reasonable assurance that senior officials will take an active role in supporting these actions, which would help EPA achieve its mission of protecting human health and the environment. EPA’s actions to identify risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites align with this essential element of enterprise risk management. Specifically, EPA identified climate change effects that may impact nonfederal NPL sites—and pose risks to human health and the environment—in studies and climate change adaptation and implementation plans. For example, in a 2012 study of adaptation of Superfund remediation to climate change, EPA identified eight climate change effects that may impact certain NPL site remedies: flooding, sea level rise, extreme storms, large snowfall, wildfires, drought, extreme heat, and landslides. In 2014, EPA issued an agency-wide climate change adaptation plan, which identified climate change effects that may impact NPL sites. The same year, EPA issued a climate change adaptation implementation plan for the office that oversees the Superfund program that identified nine climate change effects that may impact NPL sites. Each of the 10 EPA regional offices identified relevant regional climate change effects in their 2014 climate change adaptation implementation plans. For example, the Region 3 plan states that increased flooding and sea level rise may increase risks of releases of contaminants, salt water intrusion may impact the performance of remedies, and increased temperatures may impact vegetation that prevents erosion. Additionally, five regional offices have conducted or are conducting additional screening-level studies to identify which climate change effects, if any, may impact each of the NPL sites in these regions. For example, Region 10 conducted a study in 2015 that identified, among other effects, sea level rise and wildfires as potential climate change effects that may impact NPL sites in the region. EPA’s actions to assess risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites partially align with this essential element. In a 2012 study of adaptation of Superfund remediation to climate change, EPA assessed the impacts of eight climate change effects on certain remedies to determine the risk they presented to the agency’s mission to protect human health and the environment. EPA issued climate change adaptation implementation plans for the office that oversees the Superfund program and all regions, as described above, which assessed potential impacts of climate change effects. In addition, five EPA regional offices assessed or are assessing potential impacts of climate change effects on NPL sites in their regions as a whole, and one of these regions assessed both the impacts and likelihood of climate change effects, consistent with this essential element. Specifically, Region 4 identified the sites most likely to face major climate change risks and then examined these sites in greater detail. Additionally, Region 3 has developed a mapping tool on climate change vulnerability that provides site-level assessments of sea level rise, among other potential impacts. EPA provides training and direction to remedial project managers—the lead EPA officials at nonfederal NPL sites—on conducting site-level risk assessments that incorporate information on potential impacts of climate change effects. Since 2014, EPA has offered optional training to remedial project managers and others on integrating climate change into the Superfund cleanup process. From 2013 through 2015, EPA issued fact sheets as guidance for assessing the potential impacts of climate change effects for three types of remedies. According to EPA officials, these fact sheets constitute the direction that EPA provides to remedial project managers on assessing risks from climate change effects. EPA plans to update these fact sheets in 2019 and is also in the process of developing a compilation of resources for assessing potential flood risks in coastal areas to inform cleanup and reuse decision-making, according to an EPA official. In addition, EPA provides resources on climate change on the Superfund program website, such as links to tools and data on drought and coastal flooding. EPA also offers technical assistance on incorporating climate change information into risk assessments to remedial project managers through groups such as the Contaminated Sediments Technical Advisory Group and the Cross-EPA Work Group on Climate Adaptation. EPA officials in four regions provided us with site-specific examples of how they used climate change information to assess risks from the potential impacts of climate change effects, but officials from other regions stated that they have not always integrated climate change information into their risk assessments. For example, according to a record of decision for the site, EPA Region 2 incorporated the potential for increased storm flow intensities into the model of the Passaic River used in the remedial investigation and feasibility study at the Diamond Alkali site in Newark, New Jersey. Conversely, officials in six regions told us that they have not used climate change projections for flooding or rainfall in site-level risk assessments. In addition, officials in Region 6 told us that they do not incorporate potential impacts of climate change effects or changes in the frequency of natural disasters into their assessments. EPA officials have not consistently incorporated climate change information into their assessment of site-level risks because they do not always have the climate data they need to do so, according to our review of EPA documents and interviews with EPA officials and stakeholders. For example, officials in three regions told us that they have not used rainfall or flood projections because the data are not available or they were unsure which data to use. In addition, in the record of decision for the Diamond Alkali site in New Jersey, Region 2 officials stated that they did not integrate sea level rise information into their storm flow modeling for the Passaic River at the site because of the uncertainty in expected future sea level rise values, especially at the regional and local levels. We reported on similar challenges with climate data in our 2015 report on climate information, which found that existing federal efforts do not fully meet the climate information needs of federal, state, local, and private sector decision makers, and we made a related recommendation in that report. Further, current EPA practice for assessing risks at NPL sites does not always include consideration of climate change, according to agency documents we reviewed and officials from three regions and a stakeholder we interviewed. EPA’s climate change adaptation plan noted that EPA and its partners will need to alter their standard practices—such as their standard methods for estimating the frequency of floods or runoff of pollutants into rivers—to account for a continuously changing climate. The Region 4 climate change adaptation implementation plan, for instance, noted that preliminary assessments and site investigations are typically based on historic information, not future projections and therefore may not fully address risks. Officials in two regions told us that they do not have direction on how to alter their practices to account for climate change. For example, officials in Region 2 said they do not have instructions that identify a particular set of expectations, data, or maps that they should use when considering future risks from flooding. Officials in Region 5 told us that they do not have any formal direction on how to address risks from climate change and are waiting for EPA headquarters to provide information on how to do so. According to EPA documents and a headquarters official, EPA believes that its existing direction, including general guidance on conducting risk assessments and the fact sheets for assessing potential impacts of climate change effects for three types of remedies, discussed above, provide a robust structure for considering such impacts. However, without providing direction to remedial project managers on how to integrate information on the potential impacts of climate change effects into site- level risk assessments at nonfederal NPL sites across all regions and types of remedies, EPA cannot ensure that remedies will protect human health and the environment in the long term. EPA’s actions to respond to risks that potential impacts of climate change effects may pose to human health and the environment at nonfederal NPL sites partially align with this essential element. In two national studies EPA conducted in 2012 and 2017, EPA examined potential impacts of some climate change effects on selected remedies at NPL sites, including nonfederal NPL sites, and generally found that it has taken actions to respond to risks through its existing cleanup processes. In 2012, as noted above, EPA studied the vulnerability of selected remedies to some climate change effects and found that existing processes—such as EPA’s Five-Year Review and operation and maintenance—could adequately address the potential impacts of climate change effects. In addition, EPA studied the impacts of three hurricanes in 2017 on sites with selected remedies in place, including nonfederal NPL sites, and found that the agency has generally taken resiliency measures to respond to risks at these sites. EPA also provided guidance and training to remedial project managers on responding to risks to human health and the environment from the potential impacts of climate change effects and recently added requirements for certain potential site contractors to describe their capacity to respond to such risks. EPA provided guidance in its fact sheets on integrating climate change information into risk response decisions at nonfederal NPL sites and optional training on integrating climate change into the Superfund cleanup process. In addition, EPA provided relevant information and resources for EPA officials on resiliency measures on the agency website. In 2016, EPA issued performance work statements to potential contractors for environmental services and operations and for remediation environmental services that required contractors to describe their ability to conduct climate change vulnerability analyses and adaptation, as needed, to ensure the resiliency of remedies to climate change impacts. According to an EPA headquarters official, EPA is currently working on developing technical guidance on how remedial project managers can integrate requests for climate change– related analysis into their task orders for contractors. With respect to site-level responses, EPA officials from three regions provided us with examples of site decision documents that described how climate change information will be incorporated into remedy selection and design. For example, the record of decision for the Portland Harbor site in Oregon states that a containment cap will be constructed to withstand more frequent floods with higher peak flows more common with climate change. Officials from Region 3 told us that they take into account a number of factors, including climate change impacts, if any, when they design and select site remedies. However, according to our interviews with regional officials, they have not consistently integrated climate change information into remedy selection and design. For example, officials from two regions stated that they are not aware of any remedial project managers in their regions who are taking action at nonfederal NPL sites to respond to climate change or consider future conditions. EPA officials have not consistently taken the potential impacts of climate change effects into account in site-level risk response decision making because they do not always have sufficient direction to do so, according to our interviews with EPA officials. EPA officials from three regions told us that they are unsure how to translate data on potential impacts of climate change effects into the design of remedies. For example, officials from Region 10 told us that EPA does not have direction for remedial project managers on how to integrate response to climate change impacts into remedial design. These officials noted that it is up to remedial project managers to be aware of this issue and it is done on an ad hoc basis. Further, EPA headquarters officials who review proposed remedies told us that additional guidance from EPA on managing the risks from potential impacts of climate change effects would be useful. According to EPA documents and another EPA headquarters official, EPA has determined that existing direction—guidance and processes— for risk response provide a robust structure to integrate climate change information into remedy selection and design. However, without providing direction for remedial project managers on how to integrate information on potential impacts of climate change effects into site-level risk response decision making at nonfederal NPL sites, EPA cannot ensure that remedies will protect human health and the environment in the long term. EPA’s actions to monitor risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites through its Five-Year Review process align with this essential element. In 2016, EPA introduced a new recommended template for the Five-Year Review that includes a section for officials to document their consideration of whether any newly available information related to climate change may call into question a remedy’s protectiveness. Officials in three regions told us they use the Five-Year Review process to identify and evaluate newly available information on climate change effects that may impact nonfederal NPL sites. For example, in the 2014 Five-Year Review report for the Publicker Industries site in Pennsylvania, Region 3 considered newly available information on projected sea level rise in the region to determine if those projections called into question the protectiveness of the existing remedies at the site. Officials in that region told us that they rely on their biological and technical assistance group to identify any new relevant climate change data to incorporate into their Five-Year Reviews. Region 7 officials also told us that they assess any potential changes in future conditions, especially flooding, during the Five-Year Review process. Officials from two other regions told us that they monitor changes in site conditions that may be related to climate change during the Five-Year Review process. For example, Region 2 officials developed additional guidance to help remedial project managers and site project teams consider changes in site conditions related to climate change in the Five-Year Review process. Region 6 officials told us that during the Five-Year Review process, they take into account any current flood hazard information from FEMA as well as current sea levels, but they do not monitor projections about sea level rise. EPA’s actions to communicate about and report on risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites align with this essential element. For example, as described above, EPA reported on the potential impacts of climate change effects—which may pose risks to human health and the environment—on NPL sites in its 2014 national climate change adaptation plan and the climate change adaptation implementation plans for the office that oversees the Superfund program and all regions. In addition, publicly available site-level documents, such as the records of decision described above, may include information on risks from climate change and EPA’s actions to manage these risks. EPA officials may also communicate this information in response to questions from the public. EPA officials from four regions told us that they have not received many direct questions on risks from climate change from the public. However, members of the public can comment on climate change risks through EPA’s existing public engagement mechanisms, and some have done so. For example, EPA officials in Region 7 received questions on the draft record of decision for the West Lake Landfill site in Missouri during the public comment period and responded to those questions in the final version of the document, describing how they addressed risks of increased flooding from climate change in the remedy selection processes. EPA has also communicated with stakeholders and the public on risks to human health and the environment from the potential impacts of climate change effects in other ways. For example, officials from Region 10 convened a workshop in 2017 to discuss climate change impacts on sediment cleanup and upland source control for the Lower Duwamish Waterway site in Washington with other federal agencies, state and local officials, universities, companies, and community groups. In addition, EPA provides an online mapping tool that can help members of the public identify sites located in areas that would be impacted by up to 6 feet of sea level rise or in flood hazard areas as determined by FEMA. EPA recognizes institutional, resource, and technical challenges in managing risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites, according to agency and other documents that we reviewed and EPA officials and stakeholders we interviewed. According to agency and other documents we reviewed and officials and stakeholders that we interviewed, EPA faces institutional challenges in managing risks to human health and the environment from the potential impacts of climate change effects. As discussed above, officials from three regions told us that they do not have the direction they need to manage these risks. For example, EPA officials in Region 2 told us that during Five-Year Reviews, engineers may analyze several different maps on flooding potential and must use their professional judgment to determine how resilient to design the remedy, because there is no standard guidance on how to do so. Further, EPA officials in two regions and stakeholders we interviewed stated that it may not be clear whether EPA could require PRPs to consider climate change impacts in the cleanup process. However, according to EPA headquarters officials, considering climate change is consistent with the National Contingency Plan and the CERCLA criterion that requires officials to consider the long- term effectiveness of remedies when evaluating cleanup alternatives. Another institutional challenge that EPA faces is that its ability to manage these risks may depend on actions of other entities that are outside of EPA’s control, according to EPA documents we reviewed and EPA officials we interviewed. For example, EPA officials from Region 1 told us that they are not certain whether a hurricane barrier built by the U.S. Army Corps of Engineers that protects the New Bedford Harbor site in Massachusetts is designed to withstand future storms. Managing risks may also require internal coordination within EPA, which presents another challenge. For example, an EPA headquarters official told us that it can be challenging for regional Superfund program staff to connect with EPA experts on climate change, who may be in different program offices. In April 2019, EPA restructured its regional offices, consolidating cross- cutting issue areas in the immediate office of each Regional Administrator and Deputy Regional Administrator. Although it is too early to evaluate the effect of this restructuring, EPA headquarters officials told us that the restructuring may help address this challenge. Furthermore, EPA officials from three regions told us that they face challenges related to the sensitive nature of climate change. For example, officials in Region 6 told us that when they engaged with the local community during the decision making process for the San Jacinto River Waste Pits site in Texas, they avoided using the term climate change because of concerns that the charged term would alienate some community members. Documents from four EPA regions and headquarters officials and officials from three regions we interviewed stated that insufficient or changing resources—specifically funding and staffing—makes managing risks to human health and the environment from the potential impacts of climate change effects challenging for EPA. For example, according to two regional climate change adaptation implementation plans and EPA officials, assessing these risks may require more resources than assessing risks based on current or past conditions. In addition, designing or modifying existing remedies to respond to these risks could increase costs, according to EPA documents we reviewed and EPA officials we interviewed. EPA officials from three regions told us that staffing constraints can make it difficult to manage risks. For example, EPA officials from Region 9 told us that the need for remedial project managers to respond to other emergencies, such as overseeing hazardous materials removal after fires, means that they have less time to oversee cleanup of nonfederal NPL sites. Officials from Region 10 told us that they had a climate change advisor who helped integrate climate change into all aspects of the region’s work, but that person retired, and the region was unable to fill the position because of resource constraints. As noted above, according to an EPA headquarters official, EPA’s recent restructuring of its regional offices may help address this challenge. EPA faces technical challenges in managing risks to human health and the environment from the potential impacts of climate change effects in terms of available expertise and data, according to documents we reviewed and EPA regional officials we interviewed. In its 2014 agency- wide climate change adaptation plan, EPA reported that site vulnerabilities may be difficult to assess because of limited scientific understanding. EPA officials told us that they need additional expertise and training to better manage risks. For example, an EPA official in Region 2 told us that it would be useful to have training on assessing risks for projects located in floodplains. As noted above, EPA has developed training for officials on managing risks from climate change, such as a course on building resilient Superfund remedies that EPA offered at the annual National Association of Remedial Project Managers meeting in August 2019. The course’s focus is to help remedial project managers incorporate consideration of adaptation and build resilience into Superfund remedies at extreme weather event–impacted sites, according to the course agenda. According to EPA documents and EPA officials from two regions, appropriate climate change data may not be available to inform assessments that help manage risk. For example, the Region 4 study of the vulnerability of NPL sites stated that climate model projections of temperature and precipitation patterns are not available at a spatial resolution that is useful for assessing vulnerabilities at the site level. In Region 6, officials told us that when the U.S. Army Corps of Engineers modeled flooding for the San Jacinto River Waste Pits site in Texas, it had to rely on past flooding data because the only information available was on historical storms. In addition, the level of uncertainty inherent in climate change data may make it challenging for EPA to incorporate that information into risk management processes, according to agency documents we reviewed and some agency officials we interviewed. As noted above, we made recommendations to address similar challenges with climate data in a prior report. Climate change may result in more frequent or intense extreme events, such as flooding, storm surge, and wildfires, among other effects, which could damage remedies at nonfederal NPL sites and lead to releases of contaminants that could pose risks to human health and the environment. Our analysis of EPA, FEMA, NOAA, and U.S. Forest Service data has shown that more than half of nonfederal NPL sites—based on a point coordinate with a 0.2-mile radius as a proxy for the site boundaries—are located in areas that may be impacted by selected climate change effects. To help ensure the long-term protectiveness of remedies, it is important for EPA to understand how climate change effects may impact nonfederal NPL sites, and the agency has taken steps to do this. However, EPA does not have quality information on the precise boundaries of nonfederal NPL sites, which could make it difficult to determine the nonfederal sites located in areas that may be impacted by climate change effects. The agency has taken initial steps to develop this information but does not have a schedule in place for completing this effort. EPA has taken actions to manage risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites. These actions align with three of the six essential elements of enterprise risk management. However, EPA has not clarified how its actions to manage risks from these effects at nonfederal NPL sites align with current agency goals and objectives, which could limit its senior officials’ ability to manage these risks. Further, EPA officials do not always have direction to ensure that they consistently integrate climate change information into site-level risk assessments and risk response decisions, according to EPA documents and officials. Without providing such direction for remedial project managers, EPA cannot ensure that remedies at nonfederal NPL sites will protect human health and the environment in the long term. We are making the following four recommendations to EPA: The Director of the Office of Superfund Remediation and Technology Innovation should establish a schedule for standardizing and improving information on the boundaries of nonfederal NPL sites. (Recommendation 1) The Administrator of EPA should clarify how EPA’s actions to manage risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites align with the agency’s current goals and objectives. (Recommendation 2) The Director of the Office of Superfund Remediation and Technology Innovation should provide direction on how to integrate information on the potential impacts of climate change effects into risk assessments at nonfederal NPL sites. (Recommendation 3) The Director of the Office of Superfund Remediation and Technology Innovation should provide direction on how to integrate information on the potential impacts of climate change effects into risk response decisions at nonfederal NPL sites. (Recommendation 4) We provided a draft of this report to EPA for its review and comments. In its comments, reproduced in appendix II, EPA stated that it recognizes the importance of ensuring Superfund sites cleanups are resilient in the face of existing risks and extreme weather events. EPA added that it has taken actions to include vulnerability analyses and adaptation planning in its Superfund activities. We acknowledge that EPA has taken some action to manage risks. However, EPA has not clarified how its risk-related actions align with agency goals and objectives. Further, it has not provided direction to ensure that officials consistently integrate climate change information into site-level risk assessments and risk response decisions. Regarding our recommendations, EPA agreed with one and disagreed with the other three. We continue to believe that all recommendations are warranted. In response to our recommendation that the Director of the Office of Superfund Remediation and Technology Innovation establish a schedule for standardizing and improving information on the boundaries of nonfederal NPL sites, EPA noted that it agrees with our finding and acknowledges a lack of consistent standards to identify site boundaries at the national level. According to EPA, it has taken initial steps to develop an approach to standardize and improve information on nonfederal NPL site boundaries. EPA stated that it expects to establish a schedule for this effort by the second quarter of fiscal year 2020, with the aim to have collected an initial set of site boundaries for all NPL sites by the fourth quarter of fiscal year 2021. In response to our recommendation that EPA clarify how its actions to manage risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites align with the agency’s current goals and objectives, EPA said that it believes managing risks from exposure to contaminants in the environment is integral to EPA’s current strategic goal 1.3, Revitalize Land and Prevent Contamination. We agree that protectiveness is a key part of strategic objective 1.3. However, this strategic objective does not include any measures related to climate change or discuss strategies for addressing the impacts of climate change effects. An essential element of enterprise risk management is to align risk management processes with goals and objectives. Consequently, we believe that our recommendation is still warranted. In response to our recommendations that the Director of the Office of Superfund Remediation and Technology Innovation provide direction on how to integrate information on the potential impacts of climate change effects into risk assessments and risk response decisions at nonfederal NPL sites, EPA said that it strongly believes the Superfund program’s existing processes and resources adequately ensure that risks and any effects of severe weather events are woven into risk assessments and risk response decisions at nonfederal NPL sites. However, as we noted in our report, EPA’s current direction does not address all types of cleanup actions or climate change effects. Further, EPA officials from some regions told us that current EPA practice for assessing risks at NPL sites does not always include consideration of climate change and that they have not consistently integrated climate change information into site- specific remedy selection and design. EPA noted that it may issue a memorandum to reinforce the tools and resources available to NPL site teams and would determine whether to issue this memorandum by the end of January 2020. EPA also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Administrator of the Environmental Protection Agency, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) what available federal data suggest about the number of nonfederal National Priorities List (NPL) sites that are located in areas that may be impacted by selected climate change effects; (2) the extent to which the Environmental Protection Agency (EPA) has managed risks to human health and the environment from the potential impacts of climate change effects at nonfederal NPL sites; and (3) the challenges, if any, EPA faces in managing these risks. To determine what available federal data suggest about the number of nonfederal NPL sites that are located in areas that may be impacted by selected climate change effects, we reviewed the Fourth National Climate Assessment (NCA) to identify potential climate change effects. Based on our review of the NCA, we identified the following potential climate change effects: sea level rise, which may lead to increased frequency and extent of extreme flooding from coastal storms; greater frequency and magnitude of drought; increased intensity and frequency of heavy precipitation events, which may lead to increased local flooding; salt water intrusion; increased incidence of large wildfires; increased frequency and intensity of extreme high temperatures and sustained increases in average temperatures; decreased permafrost; and increased intensity—including higher wind speeds and precipitation rates—and frequency of very intense hurricanes and typhoons. We reviewed EPA documents (such as EPA’s climate change adaptation implementation plans) to identify potential climate change effects that may impact nonfederal NPL sites and interviewed EPA officials. Through a review of federal agencies’ documents and databases and interviews with officials about their data and research on these effects, we identified available national federal data sets on three current hazards: flooding, storm surge, and wildfires—which the NCA reports will be exacerbated by climate change—from the Federal Emergency Management Agency (FEMA), the National Oceanic and Atmospheric Administration (NOAA), and the U.S. Forest Service. We also identified data on sea level rise from NOAA. In this report, we refer to (1) flooding, (2) storm surge, (3) wildfires, and (4) sea level rise as potential climate change effects. We used the most recently available data for each of these climate change effects; these data do not provide estimates of the projected changes in the future. To the extent that data were available, we analyzed a range of these potential climate change effects. For example, we used the maximum extent of storm surge from Category 1 hurricanes as well as Category 4 or 5 hurricanes, the highest possible categories, as modeled by NOAA. We focused on a range because, for three of the four effects, we had data on current hazards, which may become more intense and frequent in the future, according to the NCA. Additionally, the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA) directs EPA to give preference to remedies that would result in the permanent and significant decrease in toxicity, mobility, or volume of the contamination. According to EPA officials, remedies at nonfederal NPL sites may have to be operational indefinitely, during which time the potential effects of climate change may become more extreme. The range of estimates we provide in our report is as follows: For flooding, we used data from FEMA’s National Flood Hazard Layer as of October 2018. FEMA identifies a variety of flood hazards, and for reporting purposes, we grouped flood hazard zones into four categories: (1) 1 percent or higher annual chance of flooding, (2) 0.2 percent or higher annual chance of flooding or other flood hazards, (3) unknown flood hazards, and (4) minimal flood hazard. For storm surge, we used data from NOAA’s model on Sea, Lake and Overland Surges from Hurricanes as of November 2018 for Category 1 and Category 4 or 5 hurricanes. For wildfire, we used data from the U.S. Forest Service’s 2018 wildfire hazard potential map, which the U.S. Forest Service released in July 2018. We used areas with high or very high wildfire hazard potential in our analysis. The U.S. Forest Service based the 2018 map on wildfire likelihood and intensity data from 2016, spatial fuels and vegetation data from 2012, and point locations of past fire occurrence from 1992 to 2013. For sea level rise, we used NOAA data, last updated in September 2018. We downloaded inundation data on 0, 1, 3, and 8 feet of sea level rise and “not mapped” areas. We obtained data from EPA’s Superfund Enterprise Management System on the location and other characteristics of active and deleted nonfederal NPL sites. In our analysis, we used a 0.2-mile radius around the primary geographic coordinate point of each nonfederal NPL site, which may not accurately represent their actual areas because the sites vary in size and shape. The EPA data we used in our analysis on the location of nonfederal NPL sites are current as of March 2019. We also obtained EPA data on contaminants and types of remedies that are current as of fiscal year 2014 to determine the number of contaminants EPA has identified in nonfederal NPL sites. We did not conduct further site-specific analyses, such as those related to the extent of contamination and location of remedies. We reviewed documents from the Agency for Toxic Substances and Disease Registry on the health effects of hazardous substances in nonfederal NPL sites and interviewed officials from that agency. To analyze whether nonfederal NPL sites are located in areas that may be impacted by flooding, we used ArcGIS mapping software to intersect the area of a 0.2-mile radius around the primary coordinate of the sites with the categories we defined from the National Flood Hazard Layer. If a site overlapped with areas in more than one of the four reporting groups, we categorized the site in the group representing the highest flood hazard. For the purposes of our report, we considered the highest flood hazard to be, in descending order, 1 percent or higher annual chance of flooding, other flood hazards (including 0.2 percent or higher annual chance of flooding), unknown flood hazard or no data, and minimal flood hazard. To analyze whether nonfederal NPL sites are located in areas that may be impacted by storm surge, wildfires, and sea level rise, we used MapInfo mapping software to intersect the area of a 0.2-mile radius around the primary coordinates of sites with each of these layers. Overlap indicates that a site is potentially in an area that may be impacted. To assess the reliability of FEMA’s National Flood Hazard Layer, we reviewed FEMA’s methodology, guidelines, and standards; interviewed FEMA officials to assess the timeliness and accuracy of the data as well as any limitations of the data; conducted data testing to check for missing data and inconsistencies; and reviewed internal controls. We also reviewed a prior GAO report on the methodology FEMA uses to map flood hazards. To assess the reliability of NOAA’s data on Sea, Lake and Overland Surges from Hurricanes, we reviewed NOAA’s methodology for developing the model, interviewed NOAA officials to assess the timeliness and accuracy of the data as well as any limitations of the data, and reviewed internal controls. To assess the reliability of the U.S. Forest Service’s wildfire hazard potential data, we reviewed the agency’s documentation of the methodology, interviewed U.S. Forest Service officials to assess the timeliness and accuracy of the data as well as any limitations of the data, and reviewed internal controls. We also reviewed our past reports that cited the 2014 versions of these data. To assess the reliability of NOAA’s data on sea level rise, we reviewed the methodology NOAA used for developing the model, interviewed NOAA officials to assess the timeliness and accuracy of the data as well as any limitations of the data, and reviewed internal controls. To assess the reliability of EPA’s data, we reviewed agency manuals and data dictionaries to understand data elements, interviewed EPA officials to assess the timeliness and accuracy of the data and related internal controls, conducted data testing, discussed inaccuracies with EPA officials; and obtained corrected data. For example, we compared the zip code of each nonfederal NPL site to its coordinate to check the accuracy of site locations. We shared potential errors with EPA officials, who corrected the coordinates of six sites. As a result of the steps described above, we found data from EPA, FEMA, NOAA, and the U.S. Forest Service to be sufficiently reliable for our purposes. To determine the extent to which EPA has managed risks to human health and the environment from the potential impacts of climate change effects on nonfederal NPL sites, we examined relevant provisions in CERCLA, EPA’s implementing regulations, and executive orders. We also reviewed EPA documents, including climate change adaptation and implementation plans; vulnerability studies; training materials; and site- specific documents, our prior work, and relevant documents from other organizations, such as the National Research Council. We identified these documents by conducting a search of (1) websites of relevant agencies and organizations and (2) article databases. We also reviewed documents provided to us by agency officials and stakeholders that we identified as described below. We interviewed EPA officials at headquarters and all regional offices to identify information on agency actions for managing risks. In addition, to obtain their views of EPA’s actions, we interviewed former EPA officials, representatives of two associations representing state officials (the Environmental Council of States and the Association of State and Territorial Solid Waste Management Officials), a professor of environmental law, and a private consultant who has worked on Superfund issues, which we identified in the search described above and recommendations from other interviewees. We generally contacted all stakeholders that we identified who appeared to be currently working on issues related to Superfund and climate change and who agreed to speak with us. We also interviewed stakeholders at the three sites we selected as illustrative examples in order to obtain their views of EPA’s actions. We selected three nonfederal NPL sites as illustrative examples of how EPA has managed risks to human health and the environment from potential impacts of climate change effects and challenges EPA may face in managing these risks. The three sites we selected are the (1) American Cyanamid site in Bridgewater, New Jersey; (2) Iron Mountain Mine site near Redding, California; and (3) San Jacinto River Waste Pits site in Channelview, Texas. To select these sites, we initially identified 43 sites based on information in EPA documents, news articles, and interviews with EPA officials and other stakeholders as described above. We selected relevant sites in three different EPA regions that illustrate a variety of potential climate change effects and that had experienced an extreme weather event in the past 10 years. To gather more in-depth information about these sites, we reviewed EPA and other documents; toured the sites; and interviewed EPA officials and relevant stakeholders at these sites, including state and local officials, representatives of potentially responsible parties, and community organizations. The results from these illustrative examples are not generalizable to nonfederal NPL sites that we did not select. We compared EPA’s actions to manage risks to human health and the environment from the potential impacts of climate change effects with essential elements for managing risk as identified in our prior work on enterprise risk management. These essential elements are as follows: (1) align the risk management process with goals and objectives, (2) identify risks, (3) assess risks, (4) respond to the risks, (5) monitor the risks, and (6) communicate and report on the risks. We assessed information on EPA’s actions to determine the extent to which the agency’s actions aligned with these elements. In assessing EPA’s actions against these essential elements, we used “aligned,” “partially aligned,” or “not aligned” to reflect the extent to which EPA took actions aligned with each essential element. If EPA provided evidence that it had taken major actions in alignment with that essential element, we determined the actions were aligned. If EPA provided evidence that it had taken some actions in alignment with that essential element, we determined the actions were partially aligned. If EPA took only a few or no actions in alignment with that essential element, we determined the actions were not aligned. Two GAO analysts independently reviewed the information on EPA’s actions and then reached consensus on the extent to which EPA’s actions were aligned with each element. To identify the challenges EPA faces in managing these risks, we reviewed EPA documents; our prior work; and relevant documents from other organizations, including the National Research Council, that we obtained as described above. We interviewed EPA officials at headquarters and all regional offices and stakeholders in order to obtain their views on the challenges EPA faces. The views of stakeholders we interviewed are illustrative and not generalizable to all stakeholders. We reviewed the challenges that we identified in these documents and interviews and grouped all the challenges into three categories for reporting purposes: institutional, resource, and technical. Two GAO analysts independently reviewed the information and then reached consensus on the challenges and their grouping in the three categories. We conducted this performance audit from April 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Barbara Patterson (Assistant Director), Ruth Solomon (Analyst in Charge), Breanne Cave, Charles Culverwell, Cindy Gilbert, Richard Johnson, Gwen Kirby, Krista Mantsch, Patricia Moye, Eleni Orphanides, Ernest Powell Jr., Dan Royer, and Kiki Theodoropoulos made key contributions to this report.", "summary": "Administered by EPA, Superfund is the principal federal program for addressing sites containing hazardous substances. EPA lists some of the most seriously contaminated sites—most of which are nonfederal—on the NPL and has recorded over 500 contaminants, including arsenic and lead, at those sites. Climate change may make some natural disasters more frequent or more intense, which may damage NPL sites and potentially release contaminants, according to the Fourth National Climate Assessment. GAO was asked to review issues related to the impact of climate change on nonfederal NPL sites. This report examines, among other objectives, (1) what available federal data suggest about the number of nonfederal NPL sites that are located in areas that may be impacted by selected climate change effects and (2) the extent to which EPA has managed risks to human health and the environment from the potential impacts of climate change effects at such sites. GAO analyzed available federal data; reviewed laws, regulations, and documents; interviewed federal officials and stakeholders; visited three nonfederal NPL sites that experienced natural disasters; and compared EPA actions to manage risk to GAO’s six essential elements of enterprise risk management. Available federal data—from the Environmental Protection Agency (EPA), Federal Emergency Management Agency, National Oceanic and Atmospheric Administration, and U.S. Forest Service—on flooding, storm surge, wildfires, and sea level rise suggest that about 60 percent of all nonfederal National Priorities List (NPL) sites are located in areas that may be impacted by these potential climate change effects. Additional information on these sites can be viewed in an interactive map and downloadable data file, available here (see figure). EPA’s actions to manage risks to human health and the environment from potential impacts of climate change effects at nonfederal NPL sites align with three of the six essential elements of enterprise risk management GAO previously identified, partially align with two essential elements, and do not align with one essential element. For example, EPA has not taken actions consistent with one essential element because it has not aligned its process for managing risks with agency-wide goals and objectives, which do not mention climate change. Without clarifying this alignment, EPA cannot ensure that senior officials will take an active role in strategic planning and accountability for managing these risks. GAO is making four recommendations to EPA, including that it clarify how its actions to manage risks at nonfederal NPL sites from potential impacts of climate change align with current goals and objectives. EPA agreed with one recommendation and disagreed with the other three. GAO continues to believe that all four are warranted.", "document_type": "gao"}
{"report": "DOD acquires new weapon systems for its warfighters through a management process known as the Defense Acquisition System. This system is implemented by two key acquisition policies: DOD Directive 5000.01, which establishes the overarching framework for the Defense Acquisition System; and DOD Instruction 5000.02, which provides detailed procedures for the operation of the Defense Acquisition System and the management of acquisition programs. These policy documents establish the guiding principles for all aspects of the DOD acquisition process. Additionally, each of the military services has its own acquisition policies which incorporate and enhance the DOD acquisition guidance. Figure 2 depicts DOD’s acquisition process beginning with Milestone A in general terms. Several entities in the Office of the Secretary of Defense and the military departments play a role in the oversight of DOD weapon system acquisition programs, including the following: The Under Secretary of Defense for Research and Engineering is responsible for establishing policies on and supervising all aspects of defense research and engineering, technology development, technology transition, prototyping, experimentation, and developmental testing activities and programs, including the allocation of resources for defense research and engineering. DOD’s Reliability and Maintainability Engineering lead reports to this Under Secretary. The Under Secretary of Defense for Acquisition and Sustainment is responsible for establishing policies on and supervising all matters relating to acquisition (including (1) system design, development, and production; and (2) procurement of goods and services) and sustainment (including logistics, maintenance, and materiel readiness). This organization has certain oversight responsibilities for major defense acquisition programs throughout the acquisition process, such as collecting and distributing performance data. The Under Secretary is the Defense Acquisition Executive and serves as the milestone decision authority for certain major defense acquisition programs, meaning the Under Secretary authorizes these programs to proceed through the DOD acquisition process’s major milestones. At the military department level, the service acquisition executive, also known as the component acquisition executive, is a civilian official within a military department who is responsible for all acquisition functions within the department and can serve as the milestone decision authority. Congress has recently devolved much of the decision making authority for major defense acquisition programs from OSD to these service acquisition executives. According to a DOD official the service acquisition executive will normally assign a relevant program manager who will then assign a chief engineer or lead systems engineer and team members with responsibility for the engineering effort of a program, including the reliability engineering effort. The following officials serve as the service acquisition executive for the military departments: the Assistant Secretary of the Air Force (Acquisition, Technology, and Logistics); the Assistant Secretary of the Army (Acquisition, Logistics and Technology); and the Assistant Secretary of the Navy (Research, Development and Acquisition) for both the Navy and the Marine Corps. Major defense acquisition program managers, who can be either civilian or military, are tasked with developing and delivering new weapon systems while balancing factors that influence cost, schedule, and performance and ensuring that systems are high quality, supportable, reliable, and effective. According to DOD guidance, reliability is the probability of an item to perform a required function under stated conditions for a specified period of time. DOD’s acquisition environment has changed over time and this has affected the way the Department addresses reliability. Until the late 1990s, DOD’s goal was to achieve good reliability by focusing on specific reliability engineering tasks during design and manufacturing, and early testing to prevent, detect, and correct design deficiencies. In the late 1990s, in response to various NDAAs, DOD implemented certain acquisition reforms, eliminating and consolidating acquisition functions, and reducing the number of personnel assigned to the remaining functions. According to the Defense Science Board Task Force on Developmental Test & Evaluation, these reforms altered several aspects of the military acquisition process and DOD’s acquisition workforce. As a result, DOD lost experienced acquisition management and technical personnel. DOD officials stated this loss included reliability personnel who contributed to developmental testing and evaluation. DOD also canceled the Military Standard pertaining to reliability at this time. DOD officials explained that, after acquisition reform in the late 1990s, the department shifted much of the responsibility for reliability issues to contractors, and government personnel primarily focused on how systems performed during operational tests at the end of their development program. In the mid to late 2000s, Congress and DOD took actions to increase the focus on reliability engineering during weapon system design and development. Both Congress and DOD took steps to elevate the importance of reliability, which has continued through 2019. Figure 3 depicts selected laws related to reliability and DOD reliability efforts over time. Poor reliability can negatively affect the warfighters through low operational availability; that is, the amount of time a system is available to execute its mission. For example, the MV-22 aircraft was less reliable than intended, and required many more spare parts than expected. When the Marine Corps deployed to Iraq, MV-22 maintainers had to cannibalize parts from some MV-22s to keep other MV-22s flying, and as a result, the Marine Corps had fewer aircraft available to fly missions. Reliability can significantly influence a weapon system’s operating and support costs, which we have previously reported account for approximately 70 percent of a weapon system’s total life-cycle cost. Operating and support costs are a reflection of how programs achieve operational availability for weapon systems. Programs can achieve operational availability by building highly reliable weapon systems or, if the systems are not highly reliable, supporting them with an extensive logistics system that can ensure spare parts and other support items are available when needed. DOD has previously reported that deficiencies in DOD weapon systems—such as high failure rates and an inability to make significant improvements in reliability—have historically limited program performance and increased operating and support costs. In the commercial world, the manufacturer carries most of the risks that would result from developing a product with poor reliability. Such risks include increased warranty expenses that decrease profits. For example, reliability personnel from Ford, Cummins, and Thermo Fisher Scientific explained that more reliable products cost their companies less because they do not have to dedicate as many resources to fixing systems that fail, which would lead to warranty claims. In addition to increased costs, poor reliability can also negatively influence a company’s reputation. Ford representatives said that failures and product recalls are not just financial costs; recalls are highly publicized. A Thermo Fisher Scientific product manager explained that a customer’s bad experience can be shared in the media and negatively influence a company’s reputation. This may alter future buying behavior, especially in industries with relatively small customer bases in closely linked professional communities. This person shared a prior experience at a different company, where a design risk was identified during development. Instead of addressing the risk effectively, a standard cycle test was done to prove or disprove the risk. However, the test did not apply the stress necessary to cause the failure. The product was released to the market based on this successful but inadequate test. In the field, the components failed, and the company had to remove the product from the market. This damaged the company’s reputation and sales. We have previously reported that poor reliability is a concern for commercial companies because their customers demand products that work, or are reliable and do not experience failure, and the companies must develop and produce high-quality products to sustain their competitive position in the marketplace. In the commercial sector, reliability engineers told us their companies proactively address reliability from the beginning of the development process. We reviewed documentation from these companies and the 2019 Reliability and Maintainability Symposium and found engineers strive to identify reliability issues at the component and sub-system level early in the development process to avoid expensive rework after producing an entire system. We identified the following key practices in the commercial sector: leveraging reliability engineers early and often, establishing realistic reliability requirements—for example, not expecting a product to operate twice as long as its predecessor before failing, emphasizing reliability with their suppliers, and employing reliability engineering activities to improve a system’s design throughout development. Figure 4 shows some of the activities involved with these key practices. We found commercial companies in our review include reliability engineers as part of their development teams. In this role, reliability engineers implement reliability tools and methods that integrate statistics, physics, and engineering principles to help develop a reliable product. For example, HBM Prenscia identified that reliability engineers from several commercial companies said it was important to initiate their assessments early in the development life cycle when there is greatest opportunity to influence product design. According to leading reliability engineers, engineering activities can add value to decision-making by providing direction and feedback that helps development teams refine designs that lead to more reliable and cost effective systems. Researchers have reported reliability engineers should be empowered to influence decisions, such as delaying overall project schedule or negotiating for more resources when necessary. In addition, our analysis of reliability engineers’ documentation from the Reliability and Maintainability Symposium and commercial companies found it important that management provide sufficient resources and time dedicated specifically to improving reliability by discovering failures, implementing corrective actions, and verifying their effectiveness. Our analysis found that cost and schedule constraints can negatively influence reliability testing, which can limit development teams’ ability to discover failures and improve designs through corrective actions. Our analysis of documentation from the Symposium also highlighted the importance of having experienced reliability engineers. For example, Ford representatives told us they have a dedicated reliability engineering community that coaches the members of the company’s different product development teams. Ford’s reliability engineers said they focus on teaching development team members to ask the right questions at the right point in time with the right people in the room. We found companies in our review emphasize that reliability requirements should be realistic, be based on proven technologies, and reflect customer usage and the operating environment. To determine feasibility of meeting a requirement, reliability engineers we spoke with at Cummins and Thermo Fisher Scientific recommend conducting comparative analysis with historical data and assessing risk due to new, unique, or difficult technology. In addition, an independent reliability engineer with over 40 years of experience told us programs should provide justifications for how reliability requirements were established to demonstrate they are within the realm of technological possibility. If the reliability requirement turns out not to be technically feasible, it could have broad implications for the intended mission, life-cycle costs, and other aspects of the system. We have previously reported on the importance of making informed trade-offs when considering requirements to reduce program risk or total ownership costs. HBM Prenscia representatives told us the commercial companies they work with regularly make trade-offs involving capability, reliability, and cost requirements. Reliability representatives at Ford told us it is important to have the right people involved in these trade-off decisions, and that they work with user representatives and reliability engineers to define their systems’ reliability requirements. Systems produced by commercial companies in our review include parts or components produced by suppliers, and reliability engineers repeatedly told us the reliability of those parts or components directly impacts the reliability of the overall system. According to a leading reliability engineer, vendor quality can affect a part’s reliability, so it is critical that the reliability of vendors’ parts be evaluated before being approved for use. To emphasize reliability with suppliers, commercial companies in our review engage with suppliers early, clearly specify requirements with the supplier, and evaluate and monitor the supplier. Cummins representatives stated engaging the supplier early is critical. They explained that they engage the supplier early, during concept development, and ask the supplier to demonstrate it can meet requirements. According to Cummins representatives, this is to ensure the supplier is able to meet quality standards and to ensure there is enough lead time and testing of components. Reliability engineers at the Reliability and Maintainability Symposium also emphasized that reliability requirements must be clearly specified with suppliers, and product teams must actively monitor suppliers and assess their deliverables. Cummins representatives explained their engineers work directly with the supplier and hold it responsible for meeting reliability requirements. Ford representatives told us they evaluate and monitor the supplier to ensure the components it is providing are reliable. For example, they visit their suppliers’ testing facilities and evaluate their testing programs, focusing specifically on their failure analysis and reliability activities. We have previously reported that leading commercial companies use disciplined quality management practices to hold suppliers accountable for high quality parts through such activities as regular supplier audits and performance evaluations. A Thermo Fisher Scientific product manager provided a scenario where relying on an external supplier’s quality assurances would be insufficient. For example, a compressor is a critical – and commonly outsourced— component in complex industrial equipment. The product manager recommended in-house testing for critical components like a compressor rather than relying on a supplier’s testing that may not factor in real-world operating conditions. In house testing is recommended to avoid finding a failure after the product is brought to market. Post-sale failures result in dissatisfied customers, reputation damage, warranty claims and similar issues. The Thermo Fisher Scientific product manager said, in some cases, a company should establish a dedicated test facility for vital outsourced components provided by suppliers. Based on our review of commercial sector practices, we found companies use reliability engineering activities to identify potential product failures and their causes. They also use these activities to improve a system’s design early and often throughout development to avoid surprises that lead to expensive rework or excessive repairs after integrating components and subsystems. For example, HBM Prenscia representatives told us that failures should be identified early, and that identification should be viewed as an opportunity to improve the design and make the product better. According to leading reliability engineers, the earlier changes are made to designs, the less costly they are to the program. It is expensive, time consuming, and risky to make changes late in development, as late changes jeopardize product reliability. The commercial company representatives we spoke with also emphasized the need to conduct reliability engineering activities iteratively until the design is optimized. For example, HBM Prenscia has identified that a common mistake is establishing a reliability plan but not actively utilizing it throughout development. Reliability engineers use various reliability engineering activities to increase system reliability, and generally refer to these activities as design for reliability tools. These tools can be tailored to meet the specific needs of a particular development project, and can complement one another and increase reliability prior to any testing. These tools can help identify how long a part or component will work properly, how a part or component’s failure will affect a system, and what actions are needed to correct failures. See table 2 for some examples of design for reliability tools that can be used to help meet reliability goals. We have previously reported that leading commercial companies use a knowledge-based development process that enables decision makers to be reasonably certain that product quality, reliability, and timeliness are assured. Our analysis of documentation from reliability engineers found that reliability engineering activities should be integrated into the product development process, and their outputs should be reviewed at development milestones. These reviews can help ensure that reliability is a robust process rather than a paper exercise by providing an opportunity to assess data from reliability analysis or testing. For example, Cummins incorporates reliability reviews into its product development processes to ensure products meet reliability goals prior to moving to the next phase of development. This helps ensure the company is on track to fulfill its reliability commitments and will be able to deliver the promised product reliability to customers. The leading commercial practices we reviewed highlight the importance of consistently collecting, sharing, and analyzing data from reliability engineering activities to inform development efforts. Commercial companies we spoke with recognized the value of reliability data. For example, Cummins representatives stated they capture reliability data and share it across different product development teams to help inform estimates of reliability for new product development efforts. In addition, Cummins representatives noted that they are moving to an interactive database that personnel throughout the entire company can access. Similarly, HBM Prenscia representatives told us that failures and lessons learned from previous projects should be captured and shared within a company, and that doing so could help inform future product development efforts. We reviewed seven major defense acquisition programs and found they often reactively addressed reliability after identifying issues later in development. As shown below, these programs did not consistently reflect key practices we identified in the commercial sector, and instead prioritized other activities intended to have positive acquisition cost and schedule impacts. However, DOD officials noted that there has recently been a greater emphasis on reliability, and the three programs that started development in 2012 and 2014 reflected more of the key practices than the older programs. See figure 5, which notes a distinction between commercial companies’ suppliers and DOD contractors. For more detailed information on each program, see appendix I. The Expeditionary Fighting Vehicle (EFV) and F-22 programs did not involve reliability engineers early during system development. Instead, these programs leveraged engineers after reliability problems arose, including after they integrated components and subsystems and during system-level testing. At the end of system development, the programs brought in additional engineers and established more concerted reliability growth efforts. In one example, the EFV program did not have an overall systems engineer. Marine Corps acquisition officials stated that reliability was not a priority during the original system development process, and we have previously reported the program was instead focused on achieving other performance parameters, including water speed, survivability, and lethality. Prime contractor representatives identified some of their design engineers who lacked experience and did not comply with engineering standards as a root cause for problems discovered late in the development process. We also reported the lack of early systems engineering discipline and knowledge undermined the EFV program’s ability to develop informed and reasonable reliability requirements, delayed the identification of potential failures until integration, and contributed to poor vehicle reliability. In addition to frequent hydraulic system failures, leaks, and pressure problems, the EFV also suffered main computer failures that froze steering while operating in water. As we have previously reported, the EFV program was subsequently restructured. The program office hired additional engineers and consulted with Army reliability engineers to institute a reliability growth program. This program was intended to mitigate previously identified vehicle design issues related to reliability and other risks before proceeding into a second development and demonstration phase. However, the EFV program never got to fully realize the benefits of its new reliability approach, as less than 3 years after restarting development it was canceled due to continuing technology problems, development delays, and affordability concerns. For the F-22 program, officials stated that at points during development the program did not have a leadership position focused on reliability, and the official who oversaw reliability was also responsible for supply chain management. The officials noted that at the time these were not focus areas because the Air Force expected the contractor to conduct the needed reliability engineering. In 2004, we reported that, as early as low- rate initial production, however, the Air Force identified 68 parts that had a high rate of failure and needed to be removed or replaced, requiring additional contractor work. We also reported the F-22 canopy also experienced failures during testing, allowing it to achieve only about 15 percent of its expected lifetime. In 2014, we reported that later reliability maturation projects intended to address reliability deficiencies had a positive effect on availability over time, but as of 2018 the F-22 still had not met its availability target. As we have found in our prior reports as well as in this review, the EFV, F-22, F-35, and V-22 programs set unrealistic operational requirements for reliability. These requirements were, therefore, unachievable during development and before fielding the systems to warfighters. As we have previously reported, when programs overpromise a weapon’s prospective performance and deliver systems that cannot achieve their requirements, such as reliability goals, the warfighter receives less capability than originally promised. In one example, as we reported in 2019, more than 11 years after the start of F-35 production, none of the three aircraft variants (Air Force, Marine Corps, and Navy) had met the minimum targets for two of the program’s five reliability metrics. These include mean flight hours between part removals for replacement and mean flight hours between critical failures. We found that only the Navy variant had achieved the minimum target for a third goal, mean flight hours between maintenance events. As we reported, while the program has instituted an effort intended to improve reliability, the effort does not align improvement projects with the F-35’s reliability requirements. That is, the reliability improvement projects being funded may not improve the F-35’s performance against its reliability metrics. Ultimately, the program does not expect to achieve the unmet reliability metrics by full aircraft maturity, and program officials have acknowledged that the requirements should be reevaluated. As a result, the warfighter may not receive an aircraft that is as reliable as was expected. In a review of the V-22 program, DOD found that the program integrated complex technologies and unprecedented capabilities into its weapon system without accounting for unknown reliability risks. Specifically, these capabilities included a conceptually new design and multiple service and mission needs. However, officials stated that the program derived its reliability requirements from antecedent helicopters, systems that were not representative of the V-22 given its increased complexity. With a limited understanding of the V-22’s mission profile, program officials stated that they also underestimated the amount of time the system would be used in helicopter mode and its operating time on the ground. Subsequently, when the Marine Corps variant of the V-22—the MV-22—was deployed in Iraq from 2007 to 2009, a number of components experienced high rates of failure, affecting systems such as the engines and engine housing. This situation, combined with an immature parts supply chain, reduced the system’s availability significantly below minimum levels. At the time, as we reported in May 2009, the MV-22 had a stated minimum mission capability rate of 82 percent, but the three MV-22 squadrons in Iraq demonstrated an average of 62 percent. The development and integration of new technologies on the F-22— stealth, supersonics, and integrated avionics—were critical to achieving operational success, but also presented significant reliability risks. Officials told us that the F-22 was initially expected to cost less to acquire and operate than one of its predecessors, the F-15, and be more reliable as well. However, they also stated this was an unrealistic expectation. We have previously reported that the immaturity of technologies at the start of and throughout development weaken a system’s ability to achieve reliability requirements. Since 2005, when full rate production of the F- 22 began, the program has made substantial additional investments in increasing the system’s reliability through various improvement programs. But the program also changed its mean time between maintenance reliability requirement to an operational availability metric, a target that as of 2018 it had yet to meet and may need to reevaluate, according to program officials. If the F-22 cannot achieve its current reliability requirement, warfighters will have to execute their missions with a less capable aircraft than expected. The AMPV, EFV, F-35, and V-22 programs did not effectively emphasize reliability with DOD contractors. Specifically, according to DOD, the AMPV, EFV, and V-22 did not effectively incentivize reliability with the contractor and one program, the F-35, did not include all of the program’s reliability metrics in the contract. Each F-35 aircraft variant is measured against five reliability metrics, two of which are in part of the contract. Contractors are not responsible for achieving reliability requirements if programs do not include them in contracts. As of August 2018, two of the F-35’s three variants had not met minimum targets for any of the three metrics that are not in the contract. The last variant (Navy) has met the minimum target for only one of the three metrics. As we have previously reported, the warfighter may have to accept F-35 aircraft that are less reliable and more costly than originally expected. As we have reported, the F-35 program tried to encourage the aircraft’s manufacturer to improve reliability through an incentive fee in sustainment contracts. These contracts, for sustainment services, included incentives for meeting aircraft availability. Reliability of parts is one of the factors that influences aircraft availability, because broken parts prevent aircraft from flying. Program officials told us they hoped the incentive fee in the sustainment contract would incentivize the contractor to invest in and implement additional reliability activities, which would help improve aircraft availability, but according to the program office, the incentive has not been effective. Program officials told us the contractor has not pursued the incentive fee in the sustainment contract through efforts to improve aircraft reliability because it would have to invest significant resources to design and incorporate changes into production aircraft in order to do so. F-35 aircraft, especially early production aircraft, continue to face challenges related to parts that are failing more often than planned and are in short supply. For example, we have previously reported that DOD found the special coating on the F-35 canopy that helps maintain the aircraft’s stealth failed more frequently than expected and that the manufacturer could not produce enough canopies to meet demand, ultimately degrading system capability. According to program officials, to ensure that reliability growth was on track, the AMPV program offered an incentive fee of up to $16 million if the contractor could demonstrate at least 80 percent of the system’s reliability before low rate production. But officials stated that the AMPV contractor did not achieve the goal. The AMPV was a derivative system of the Army’s Bradley Fighting Vehicle with an accelerated development schedule, and officials stated that for this reason the contractor assumed the government would accept much of the Bradley’s initial design and changes to the AMPV’s performance resulting from legacy reliability issues. As a result of these expectations, officials stated that the contractor did not put enough resources, including a robust reliability team, toward the work that was eventually needed to improve reliability, and the contractor understaffed in this area. The AMPV, EFV, F-22, F-35, and V-22 programs deferred key reliability engineering activities, intended to improve system designs, until later in development. As a result, they missed opportunities to identify, understand, and mitigate reliability issues early in the development process. After realizing reliability shortfalls late in development, some programs initiated expensive redesign efforts that continued well into production and deployment, while others accepted degraded performance. Based on our prior reporting, we found the EFV program did not implement a proactive reliability approach, which would include identifying challenges early and designing reliability into the system in a cost- effective manner. Instead, the program used a test-fix-test approach that relied on identifying failure modes after the system-integration phase. Early in the acquisition process, officials noted in program documentation that the program had conducted little reliability growth planning before starting development, and officials stated that the EFV program did not plan for or conduct dedicated reliability testing. Then, the program prematurely conducted its critical design review, a key review during the development phase which confirms the system’s design is stable and is expected to meet system performance requirements, before the EFV prototype’s system-integration work was complete. The program did not have the time necessary to demonstrate design maturity as scheduled and officials stated that they did not schedule long enough corrective action periods to allow for proper failure mitigation. As a result, during a 2006 operational assessment, the EFV demonstrated very low reliability and failed to complete amphibious, gunnery, and land mobility tests. F-22 program officials stated that many of the aircraft’s components and subsystems had to be tested as part of an integrated system. This limited the discovery of reliability issues early in the development phase. DOD reliability experts told us programs should not use integrated system testing to demonstrate individual component reliability, and should instead use it to focus on how components work together and identify more complex system failure modes. F-22 officials also stated the program office frequently continued with development and other testing before implementing corrective actions for critical reliability issues. As we have previously reported, the F-22 program started a program to improve its reliability in 2005, near the start of full rate production, to mitigate hundreds of known reliability issues deferred from earlier in development. Nonetheless, we reported in 2012—nearly 3 years after DOD announced the end of F-22 production—that reliability deficiencies had increased support costs, and continued to prevent the aircraft from meeting its reliability requirement. According to program officials, the Army selected a derivative of the Bradley Fighting Vehicle to meet the AMPV requirements, even though that vehicle’s transmission had known reliability problems. According to AMPV program officials, the Army selected this vehicle because it had prioritized controlling costs and accelerating schedule. Program officials stated that the focus on cost and schedule caused the contractor to underestimate the necessary reliability work at the start of development and led to a backlog of test incident reports and deferred corrective actions. According to 2018 program documentation we reviewed, the AMPV’s reliability growth did not track to targets during development and the vehicle did not achieve its pre-production reliability goal. Moreover, some of the AMPV’s deferred work may need to be addressed during a future corrective action period that could continue through fiscal year 2021. Although there are differences between the DOD and commercial sector stemming from the statutory and regulatory structures that govern DOD’s acquisition processes, DOD has had long-established policy and guidance at both the department and service level that recognize the four key reliability practices we found in the commercial sector. For example, the Defense Acquisition Guidebook encourages acquisition programs to involve reliability engineers early and often, and DOD Instruction 5000.02 identifies the need for establishing realistic reliability requirements. Additionally, the 2005 DOD Guide for Achieving Reliability, Availability, and Maintainability addresses the importance of emphasizing reliability with contractors, and the service-level policies at all three military departments establish the importance of reliability engineering activities. However, most of these documents cover a wide range of acquisition issues or many aspects of reliability engineering, and they do not specifically emphasize the four key practices we identified in our review of the commercial sector. For example, the DOD Instruction 5000.02 is an overarching policy document covering the entire acquisition life cycle at a high level, from concept development to live fire test and evaluation, and only one section provides significant detail and direction on reliability. The service level instructions and Defense Acquisition Guidebook similarly cover the entire acquisition life cycle, and reliability is one of dozens of characteristics addressed in each document. The DOD Guide for Achieving Reliability, Availability, and Maintainability is largely focused on achieving reliability, but the reliability proponents at OSD, the Army, and the Navy said the guide is not consistently used throughout DOD, noting that it was issued in 2005 and has not been updated since. DOD policy provides decision makers flexibility to tailor regulatory activities that acquisition programs perform when developing weapon systems. The process is inherently complex, and these decision makers must balance many factors when overseeing and executing the programs. In the absence of an emphasis on the key reliability practices we identified, we found decision makers for the programs we reviewed prioritized other activities intended to have positive acquisition schedule and cost impacts. For example, AMPV program officials told us the program eliminated 7,500 miles of contractor reliability testing in order to proceed to the next development phase more quickly, believing that there would be sufficient time later to complete corrective actions. Recently, DOD has begun employing the Middle Tier Acquisition pathway—an alternative acquisition pathway with an objective of beginning production within 6 months and completing fielding within 5 years. This emphasis may encourage decision makers to prioritize activities that promise to reduce schedule. We found that for the programs we reviewed, however, such an approach can come at the expense of other activities, such as implementing effective reliability practices. DOD has recently taken steps that could introduce more balance when decision makers consider trade-offs between schedule and reliability. Specifically, DOD has highlighted the importance of one of the four key reliability practices we identified: emphasizing reliability with contractors, and Congress has passed legislation related to reliability. The NDAA for fiscal year 2018 included a provision mandating DOD program managers to include certain reliability requirements in weapon system engineering and manufacturing development and production contracts. In January 2019, the USD(A&S) implemented the NDAA by issuing a policy memorandum to Service Acquisition Executives and other DOD Directors echoing this key practice. However, USD(A&S) has not similarly emphasized the three other key reliability practices we identified in the commercial sector, nor have the Secretaries of the Air Force, Army, and Navy, who now have ultimate responsibility for most of DOD’s major acquisition programs. Specifically, these senior leaders have not emphasized the value of leveraging reliability engineers early and often, establishing realistic reliability requirements, and employing reliability engineering activities to improve a system’s design throughout development. As a result, it is less likely that acquisition programs will take the actions necessary to recognize and address potential reliability problems early in the development process. Without senior leadership emphasis on a broader range of key reliability practices, DOD runs the risk of delivering less reliable systems than promised to the warfighter and spending more than anticipated on rework and maintenance of major weapon systems. This risk is exacerbated in an environment where decision makers are striving to deliver systems in an accelerated manner. The best opportunity to influence the reliability of a weapon system is early on during the design of the system. Decisions and tradeoffs made at that time can increase the weapon system’s reliability, help warfighters execute their missions, and decrease operating costs for years to come. However, these decisions and tradeoffs are not easy, as acquisition decision makers are tasked with managing competing priorities such as cost, schedule, and performance. Many of the DOD acquisition program examples in this report illustrate what can happen when reliability is not prioritized. The programs often approached reliability in a reactive manner, discovered problems late in the development process, and then tried to fix them through costly and time-consuming rework. The programs did not consistently adhere to key practices we identified in the commercial sector: reliability engineers were not leveraged early in the development process, reliability requirements were not realistic, reliability was not emphasized with contractors, and reliability engineering activities were not utilized throughout design and development. Recent DOD actions have highlighted the importance of emphasizing reliability with contractors. DOD senior leaders can help improve reliability by highlighting the importance of the three other key reliability practices we identified in the commercial sector. In light of the current focus on accelerating the acquisition process, balancing the desire for speed with reliability considerations is critical. Given the delegation of acquisition decision authority to the military services, the Secretaries of the Air Force, Army, and Navy are in the best position to do so. We are making a total of three recommendations: one each to the Air Force, the Army, and the Navy. We recommend the Secretary of the Air Force issue policy emphasizing the following three key reliability practices when planning and executing acquisition programs: leveraging reliability engineers early and often, establishing realistic reliability requirements, and employing reliability engineering activities to improve a system’s design throughout development. (Recommendation 1) We recommend the Secretary of the Army issue policy emphasizing the following three key reliability practices when planning and executing acquisition programs: leveraging reliability engineers early and often, establishing realistic reliability requirements, and employing reliability engineering activities to improve a system’s design throughout development. (Recommendation 2) We recommend the Secretary of the Navy issue policy emphasizing the following three key reliability practices when planning and executing acquisition programs: leveraging reliability engineers early and often, establishing realistic reliability requirements, and employing reliability engineering activities to improve a system’s design throughout development. (Recommendation 3) We provided a draft of this report to DOD for review and comment. DOD’s written comments are reprinted in appendix II. DOD stated that the Air Force, Army, and Navy concur with our recommendations to their respective Departments. The comments also state that the Air Force and Navy plan to update their policies in response to our recommendations. As for the Army, the comments state that the Army Acquisition Executive will issue direction emphasizing the three key reliability practices and highlight an existing Army regulation focused on reliability engineering. In addition to the responses to our recommendations, DOD’s written comments included technical comments that we addressed as appropriate. For example, we provided additional detail on an existing DOD policy, and clarified how a program engaged with a contractor. We are sending copies of this report to the appropriate congressional committees and the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or mackinm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This appendix summarizes key characteristics of seven selected major defense acquisition programs’ approach to reliability. The four key characteristics are categorized as: did not leverage government reliability engineers in decision making initially pursued unrealistic operational requirements for reliability; did not effectively emphasize reliability with contractors; and, deferred key reliability engineering activities until later in development. These summaries do not address all the reliability actions taken by each program; rather they focus on key characteristics we identified in our review of commercial companies and associated deficiencies. See figure 6, which notes a distinction between commercial companies’ suppliers and DOD contractors. In addition to the contact named above, Nathan Tranquilli (Assistant Director), Julie A. Clark (Analyst-in-Charge), Lori Fields, Laura Greifner, Brendan K. Orino, LeAnna Parkey, Christine Pecora, Andrew N. Powell, Timothy Saunders, and Michael J. Sullivan made key contributions to this report.", "summary": "DOD invests tens of billions of dollars each year in major defense acquisition programs, designing and developing technologically advanced weapon systems that warfighters expect will meet specific performance requirements, including reliability requirements. Systems that are not reliable make it more difficult for warfighters to perform their missions. GAO was asked to examine DOD weapon system reliability. This report addresses (1) how selected companies in the commercial sector address reliability, (2) how selected DOD acquisition programs addressed reliability, and (3) the extent to which DOD leadership has highlighted key reliability practices. GAO collected information on leading commercial practices at the 2019 Reliability and Maintainability Symposium and from four commercial companies known for delivering reliable products. GAO also assessed how seven DOD acquisition programs—both older and newer, and representing all the military services—addressed reliability; reviewed key documents and interviewed knowledgeable officials; and reviewed reliability-related guidance and policy from senior DOD leaders. The commercial companies GAO reviewed proactively address reliability. They strive to identify reliability issues at the component level early in the development process to avoid expensive rework after producing an entire system. GAO found these companies focus on the following key practices: 1. Leveraging reliability engineers early and often 2. Establishing realistic reliability requirements 3. Emphasizing reliability with their suppliers 4. Employing reliability engineering activities to improve a system's design throughout development GAO found that the seven Department of Defense (DOD) acquisition programs it reviewed did not consistently adhere to these key practices (see figure). These programs often prioritized schedule and cost over incorporating the key reliability practices, and these systems generally were not as reliable as promised. In 2019, DOD highlighted in a policy memorandum the importance of emphasizing reliability with contractors. However, the other three key practices have not been similarly highlighted. DOD has taken steps to accelerate weapon system development, and decision-making authority has been delegated to the military services. In an environment emphasizing speed, without senior leadership focus on a broader range of key reliability practices, DOD runs the risk of delivering less reliable systems than promised to the warfighter and spending more than anticipated on rework and maintenance of major weapon systems. GAO recommends the Secretaries of the Air Force, Army, and Navy highlight the importance of three key reliability practices: leveraging reliability engineers, establishing realistic reliability requirements, and employing reliability engineering activities to improve a system's design throughout development. DOD agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The Secretary of the Army has the responsibility to recruit personnel, subject to the authority, direction, and control of the Secretary of Defense. The Assistant Secretary of the Army for Manpower and Reserve Affairs serves as the principal advisor to the Secretary for the Army’s management of its manpower and personnel and provides overall governance for marketing, advertising, and research. The Deputy Chief of Staff of the Army, G-1, is the principal military advisor to the Assistant Secretary of the Army for Manpower and Reserve Affairs and the Chief of Staff of the Army for all matters related to manpower across the Army. As of August 2019, the Deputy Chief of Staff of the Army, G-1, has responsibility for overseeing the new Office of the Chief Army Enterprise Marketing (AEMO) once it is fully established, as described later in this report. In addition, multiple other Army organizations from across the accessions enterprise—the collection of Army organizations involved in efforts to recruit and train soldiers for the Army—have roles and responsibilities in carrying out the Army’s marketing and advertising program, as summarized in table 1. The Army contracts with a primary advertising agency to develop and implement its marketing and advertising program. The advertising agency is responsible for providing a range of services from the development of the Army’s marketing and advertising strategy to the production of marketing and advertising activities, including television and print advertisements, event marketing, and social media. In November 2018, the Army awarded a contract to a new advertising agency for up to 10 years with a value not to exceed $4 billion. The contract with the previous advertising agency was awarded in March 2011, and from March 2011 through the end of fiscal year 2018, the Army issued 702 task orders and obligated about $1.6 billion on this contract, according to our analysis of data from the Federal Procurement Data System-Next Generation. The Army conducts a variety of marketing and advertising activities at the national and local levels in support of the Army’s recruiting goals. Figure 1 shows examples of the various types of Army marketing and advertising activities, such as mobile assets used at recruiting events and digital advertising on social media. Different marketing and advertising activities are useful for supporting the three phases—awareness, engagement, and activation—of an individual’s decision-making process, sometimes referred to as the consumer journey. The goal of marketing and advertising is to move a potential recruit through each of the three phases and, ultimately, to the decision to enlist: Awareness: Individuals learn about the opportunity to serve in the Army and the distinct characteristics of serving in the Army. The Army pursues awareness through marketing and advertising activities such as television commercials, print advertisements, banners at events, and billboards. Engagement: Individuals who are aware of the opportunities for service in the Army begin considering the possibility of joining the Army. During this phase, the Army seeks to provide recruits with additional information to aid in their decision-making process. Often this phase of advertising takes place in the digital environment, as the Army seeks to provide informative social media posts and use banner advertisements to attract individuals to visit its website for more information. Activation: Individuals have considered the Army and are ready to talk to a recruiter about enlistment. As such, activation activities seek to encourage these individuals to provide their contact information to schedule an opportunity to meet with a recruiter. Activation is often conducted in person, such as through recruiters’ presence at events like career fairs. Activation may also be conducted through other means—such as direct mail and online or print classified advertisements—as long as the advertisement prompts viewers to provide their contact information. Further, the Army employs the use of mobile assets, such as large trucks and trailers fitted with equipment and activities intended to draw crowds and encourage and facilitate public interaction with a recruiter at an event to generate leads. Figure 2 shows the awareness, engagement, and activation phases and examples of marketing and advertising activities that are used in support of each phase. To implement AAA’s recommendations, the Army has developed processes designed to improve its oversight of the primary contract for executing the Army’s marketing and advertising program. In April 2018, AAA reported that AMRG did not sufficiently evaluate the performance of its primary contractor, effectively oversee deliverables included in its three main marketing and advertising contracts, or effectively oversee the negotiation process of task orders for its primary marketing and advertising contract. AAA made seven recommendations to AMRG to improve its contract oversight, with which AMRG agreed. As shown in table 2, as of September 2019, AAA considered three of the recommendations implemented but not closed, with AMRG still taking steps to address the other four recommendations; as a result, it is too soon to assess the extent to which the Army’s steps have improved contract oversight within the marketing and advertising program. AMRG officials stated that the implementation of these recommendations has been slowed, in part, because of the recent award of its primary marketing and advertising contract to the new advertising agency. Among AMRG’s actions to improve its contract oversight are steps to develop processes for overseeing contractor performance, deliverables, and price negotiations. Specifically, AMRG has taken steps in the following areas: Created a new project management office. AMRG established a project management office to help address the challenges identified by AAA and to serve as a coordinating body that centralizes contract oversight. According to its charter, the office is responsible for maintaining cost, schedule, and performance for Army marketing and advertising programs to help ensure that they are completed on time and within reasonable costs to support the accessions mission. Documents outlining the contract management process indicate that the project management office reviews key contract documents, such as the statement of objectives and the quality assurance surveillance plan, before the documents are submitted to the contracting officer who is responsible for administering the contract. After the contractor submits its proposal for providing the requested product or service, the project management office reviews the proposal to ensure it meets the requirements of the statement of objectives. Also, the project management office coordinates and submits the technical evaluation form for review by the contracting officer’s representative and the contracting officer. Within the newly-formed AEMO, there will be a project management office with six authorized personnel, according to the organizational chart for AEMO. In July 2019, AMRG officials stated that they were developing standing operating procedures and continuity plans that AEMO could use as it establishes its project management office. Implementing training and tools to evaluate contractor performance. AAA found that AMRG did not sufficiently evaluate the performance of its primary contractor and recommended that AMRG require that all program managers receive contracting officer’s representative training and ensure that individual quality assurance surveillance plans are developed for each task order over $150,000. As of September 2019, AAA reported that this recommendation had not been fully implemented. In response to AAA’s recommendations, in April 2019, AMRG reported that all program managers had completed contracting officer’s representative training. Further, as of September 2019, AMRG reported that the Army had developed individual quality assurance surveillance plans for each task order issued in fiscal year 2019. According to AAA officials, AMRG provided them with examples of these quality assurance surveillance plans, and AAA provided AMRG with feedback on additional information that should be included, which AMRG officials stated they were taking actions to address. In September 2019, AMRG also issued standing operating procedures for program managers to provide internal policy and instruction for executing the Army’s marketing and advertising program as well as evaluating its performance, including overseeing contractor performance. We found that the standing operating procedures require contracting officer’s representative training for program managers and that the Director of Marketing, Director of Research, and AMRG contracts team are to monitor compliance quarterly. In addition, the procedures include steps outlining contract oversight mechanisms, such as information on the purpose and contents of quality assurance surveillance plans. Implementing a standardized technical evaluation form. AAA found that AMRG had not effectively negotiated prices for its primary marketing and advertising contract; AAA recommended that AMRG (1) define and implement a well-structured policy for conducting technical evaluations of contractor proposals and (2) establish a standardized form to ensure consistency during the evaluation process. As of September 2019, AAA reported that these two recommendations were implemented but not closed. The standing operating procedures that we reviewed outline the process for program managers to complete a standardized form for evaluating contractor proposals. The form is intended to ensure that program managers are consistently evaluating contractor proposals for performing work under the contract. For example, the form requires program managers to conduct a comparative price analysis by comparing the contractor’s proposed price to total task order cost in prior years. According to the instructions on the form, program managers are to submit the completed form to their supervisor or director for approval. The project management office then coordinates and submits the technical evaluation to the contracting officer’s representative and contracting officer for review. Overseeing contract deliverables. AAA found that AMRG did not effectively oversee deliverables in its marketing and advertising contracts and recommended that AMRG develop procedures to ensure that contracts or task orders do not contain deliverables already provided in other contracts. As of September 2019, AAA reported that this recommendation had not been fully implemented. AMRG and U.S. Army Mission Installation and Contracting Command officials have implemented processes to prevent duplicative deliverables (i.e., services or products to be provided through a contract) in the future, such as the standardized technical evaluation form noted above. We found that the standardized technical evaluation form requires program managers to certify that they have reviewed other tasks and contracts within their purview and to validate that the task order being requested does not duplicate existing or other requested work. In addition, AMRG and U.S. Army Mission Installation and Contracting Command officials stated that they consolidated all contract actions under one team at the U.S. Army Mission Installation and Contracting Command and that both AMRG’s contracting officer’s representative and budget office must verify that contract requests are not duplicative. AAA also found overlapping deliverables between AMRG’s primary marketing and advertising contract and a contract for creative technology support and recommended that AMRG use the creative technology support contract for all of the creative technical services within its scope. As of September 2019, AAA reported that this recommendation had not been fully implemented. AMRG officials told us that they plan to issue a modification to the contract for creative technology support to remove services duplicated in the primary marketing and advertising contract. As of September 2019, an AMRG official told us that the Army expected to issue the modification in November 2019. Revising process for contract award fees. AAA found that AMRG had minimal support to justify its higher award fee ratings for its primary contractor and recommended that AMRG update its award fee plan and award fee review process to include soliciting feedback from program managers, maintaining supporting documentation, and obtaining objective performance data, among other things. As of September 2019, AAA reported that this recommendation had not been fully implemented. We found that AMRG revised its process in fiscal year 2018 for determining award fee incentives for its advertising agency. For example, according to the documentation associated with the award fee decision for the agency’s performance from April 2017 through April 2018, AMRG reported that it, among other things, included feedback from program managers on the advertising agency’s performance and obtained objective performance data from an independent entity, DOD’s Joint Advertising, Market Research & Studies. In future work with the new advertising agency, AMRG officials stated that the Army plans to offer award fees for specific task orders rather than one fee for performance in a given year. According to AMRG officials, this change allows greater flexibility in deciding which programs should be incentivized with an award fee. As of September 2019, AMRG officials stated that they had not issued any task orders with an award fee under the new marketing and advertising contract. To implement AAA’s recommendations, the Army has taken steps to improve how it measures the effectiveness of its marketing and advertising program; these steps are consistent with commercial best practices for assessing the effectiveness of advertising identified in our prior work. In its 2018 report on return on investment, AAA found that AMRG had deficiencies in how it measured the effectiveness of its marketing and advertising efforts and made seven recommendations to AMRG, with which AMRG agreed. Of these recommendations, AAA considered four implemented but not closed as of September 2019, with AMRG still taking steps to address the other three recommendations, as shown in table 3. Since the Army’s steps were recently implemented or are ongoing, it is too early to determine if they will achieve their desired results. Based on our analysis of the Army’s actions, the Army’s steps to implement AAA’s recommendations fall into the following five areas: (1) revising strategic goals, (2) updating and documenting its assessment process, (3) improving the reliability and capabilities of data systems, (4) integrating national and local marketing and advertising efforts, and (5) obtaining new tools to determine required marketing and advertising resources. The steps the Army has taken in these areas thus far are consistent with commercial best practices for assessing the effectiveness of advertising we identified in our prior work. As the Army takes additional steps to establish the newly-formed AEMO, it will be important for the Army to continue to align its efforts with these commercial best practices for assessing the effectiveness of advertising to ensure advertising dollars are used efficiently to help meet stated recruiting goals. Revising strategic goals. AAA found that AMRG did not have specific goals to measure the long-term effects of investments in marketing and advertising efforts to support the Army’s accessions mission and recommended that AMRG develop such goals. As of September 2019, AAA reported that this recommendation was implemented but not closed. AMRG has revised its strategic marketing goals from tracking changes in individuals’ attitudes toward the Army, such as support for the Army among the general population, to tracking the behaviors of these individuals, such as the number of visits to GoArmy.com. For fiscal year 2018, AMRG had seven strategic marketing goals that tracked the attitudes of the general population and prospects toward the Army. For fiscal year 2019, AMRG revised the goals to four that track attitudes, two that track behaviors, one that tracks effectiveness, and one that tracks efficiency. Goals that track attitudes are aligned with the awareness phase of the consumer journey, whereas goals that track behaviors are more aligned with the engagement and activation phases. Figure 3 shows how the fiscal year 2018 and 2019 strategic marketing goals align with the three phases of the consumer journey. Looking ahead, AMRG officials told us that, consistent with feedback they received from marketing industry experts, the strategic goals in the fiscal year 2020 marketing plan will all be behavioral and will target the different stages of what AMRG refers to as a lead nurturing funnel. AMRG officials stated that their goal is to use information so they can quickly shift attention and funding to different stages of the funnel that are not meeting their goals, so as to ensure that those stages get the attention needed to reach mission success. AMRG’s recent and ongoing steps to revise its marketing goals are consistent with the commercial best practice to develop an evaluation framework that identifies the target audience and includes measurable goals. To institutionalize AMRG’s updated processes, AAA recommended that AMRG update Army Regulation 601-208 to reflect the new goals and processes it would implement to improve its program effectiveness. As of September 2019, AAA reported that this recommendation had not been fully implemented. The Army is in the process of revising its marketing and advertising regulation to reflect the updated strategic marketing goals and process. AMRG had drafted a revision to the regulation; however, AMRG officials had put this process on hold while senior Army leaders were making the decision about AMRG’s placement within the Army. Now that AMRG has been redesignated as AEMO and reassigned within the Army, as of August 2019 AMRG officials stated that the Army was revising the regulation to reflect the new organization’s relationship to other entities within the accessions enterprise. AMRG expects the Army to publish the updated regulation in 2020. Updating and documenting its assessment process. AAA found that only three of AMRG’s 23 national events during fiscal year 2016 provided the best value for their intended purpose and recommended that AMRG discontinue efforts that were not cost-effective in comparison to other options and assess the cost-effectiveness of current marketing and advertising efforts. As of September 2019, AAA reported that this recommendation was implemented but not closed. According to AMRG officials, AMRG discontinued all of the events that were deemed to not be cost-effective in AAA’s report. In its report, AAA also found that AMRG’s assessment process did not include USAREC’s and USACC’s marketing and advertising efforts and that AMRG did not formally document that process; AAA recommended that AMRG establish and formally document a process with roles and responsibilities to assess the effectiveness and efficiency of all Army marketing and advertising efforts. As of September 2019, AAA reported that this recommendation was implemented but not closed. We found that AMRG formally documented how it assesses the effectiveness of the marketing and advertising program, consistent with the commercial best practice of seeking to develop an understanding of how outcomes can be attributed to advertising. In January 2019, AMRG issued guidance that outlines its assessment process, including the types of information that are reviewed in each assessment. The guidance we reviewed outlines three levels of assessments: Level I is a review by program managers of their individual programs; level II, to be conducted on a quarterly basis, is a review at the operational level in which the directors of research and marketing review the results of marketing and advertising efforts across multiple marketing channels; and level III, also to be conducted on a quarterly basis, is a review at the strategic level in which the AMRG Director reviews the Army’s progress in meeting its strategic marketing goals. Further, in January 2019, AMRG reviewed a summary of the number, cost, and performance of USAREC’s and USACC’s local marketing and advertising activities as part of the level II assessment process. In addition, to facilitate comparison of options, AMRG developed a tool for comparing different programs within a given marketing channel. The tool, which AMRG calls a decision support matrix, allows officials to comparatively rank different programs based on weighting different factors. For example, based on our review of the decision support matrix, we found that AMRG assigned a higher weight to a program’s effectiveness than its timing. The tool also incorporates qualitative feedback based on how program managers, USAREC, and USACC rank the programs, and quantitative analysis on the cost per lead, impression, or engagement, depending on the type of program. Improving the reliability and capabilities of data systems. AAA identified discrepancies between information in the Enterprise Marketing Management (EMM) system and supporting documentation and recommended that AMRG establish and formally document a process to ensure that all Army marketing and advertising performance and cost data were regularly recorded in an official marketing system of record on a regular basis. As of September 2019, AAA reported that this recommendation had not been fully implemented. The Army has taken steps to improve the reliability of the data in EMM since AAA’s report. In August 2019, the Army issued a task order on its primary marketing and advertising contract covering EMM system support to include overseeing and improving the quality of data in EMM. According to the performance work statement, the Army’s new advertising agency is responsible for, among other things, accurately documenting current data, systems, and business processes, as well as analyzing EMM reports and documentation for completeness and accuracy. Further, the advertising agency is responsible for identifying and documenting business problems and recommending areas for improvement and technology solutions. During the focus groups we held with AMRG personnel, participants told us that AMRG leadership was focused on demonstrating the effectiveness of the Army’s marketing and advertising through reliable and readily-available data. For example, the Army implemented an electronic business reply card, which is a digital form to capture a potential recruit’s eligibility and contact information and a means of identifying the event where the recruit learned about the Army. USAREC and USACC officials told us that prior to the electronic business reply card, recruiters collected prospects’ information at events by using a paper card. Although that card reflected the event where the potential recruit heard about the Army, it would often take several days before the potential recruit’s information appeared in the recruiting system, according to these officials. As a result, recruiters would sometimes not send in the paper card and would instead enter the prospect’s information directly into the system. In these cases, the marketing and advertising event would not receive credit for generating the lead. USAREC and USACC officials stated that the electronic business reply card’s quicker turnaround time for leads showing up in the system should improve data reliability by ensuring that recruiters and recruiting operations officers consistently enter an individual’s demographic data into the system, along with the marketing and advertising activity they interacted with. These steps to better identify the number of leads generated by marketing and advertising activities are consistent with the commercial best practice of conducting ongoing analysis of performance using industry standard measures appropriate for the purpose of the advertising activity. In addition, in August 2019, the Army issued a task order on its new marketing and advertising contract for the maintenance and optimization of its system that tracks analytics on the Army’s marketing and advertising activities, which AMRG refers to as the Intelligence Hub. The advertising agency is responsible for monitoring this system and producing reports that track the effectiveness of marketing and advertising activities based on key performance indicators. The advertising agency is also responsible for upgrading the system to track the multiple marketing and advertising resources that a potential recruit interacts with. AMRG officials told us that the upgrade of this system is intended to equip the Army with more complete data to demonstrate the effectiveness of the Army’s marketing and advertising activities— consistent with the commercial best practice of seeking to develop an understanding of how outcomes can be attributed to advertising. Integrating national and local marketing and advertising efforts. AAA found that AMRG did not integrate and leverage both national and local marketing and advertising efforts to support the Army’s accessions mission and recommended that AMRG revise the Army’s marketing performance framework to include marketing and advertising efforts at both the national and local levels. As of September 2019, AAA reported that this recommendation was implemented but not closed. We found that the Army has created programs and instituted procedures designed to increase coordination of national and local marketing and advertising efforts. For example, AMRG reported that it included other Army components, including USAREC and USACC, in developing the fiscal year 2019 marketing goals and planned to include those organizations in its fiscal year 2020 process. In addition, TRADOC established the Army Accessions Resource Fusion Board, which brings together organizations from across the accessions enterprise for quarterly meetings at which they make operational resource sharing plans for marketing and recruiting assets. For example, according to a March 2019 briefing for an Army Accessions Resource Fusion Board meeting, representatives from USAREC brigades discussed their planned marketing and advertising activities for the first quarter of fiscal year 2020, including any requests they had for support from other Army stakeholders for those planned activities. Further, according to its charter, the Army Accessions Resource Fusion Board is responsible for assessing the effectiveness of local marketing and advertising efforts in the previous quarter. In fiscal year 2018, the Army also created a pilot program designed to improve how the Army’s marketing and advertising program coordinates with its recruiting components and to produce marketing and advertising messages that resonate more effectively with target populations. The Army began implementing the program in Chicago in fiscal year 2019 and as of April 2019 was planning to expand the program to Boston and four other cities. As of July 2019, AMRG had observed positive results from the program in Chicago. For example, AMRG reported an increase of 11 percent in the number of leads and an increase of about 7 percent in the number of recruits who signed contracts with the Army when compared to the prior year in that region. Officials from TRADOC, USAREC, and USACC told us that coordination with AMRG on marketing and advertising efforts has improved since the time AAA conducted its audits. For example, TRADOC officials stated that AMRG senior leaders have supported the accessions enterprise by providing analytic support to USAREC and USACC. Further, USAREC officials stated that in fiscal year 2018 AMRG started to provide funding for local marketing and advertising activities near USAREC’s requested levels, and that this change had been carried forward into fiscal year 2019. Obtaining new tools to determine required marketing and advertising resources. AAA found that AMRG did not use a resource requirements projection model that supported and linked to planned marketing efforts and recommended that AMRG develop such a model. As of September 2019, AAA reported that this recommendation had not been fully implemented. AMRG has contracted with the RAND Corporation and a consulting firm to develop tools to determine the resources AMRG needs to conduct its marketing and advertising activities. The RAND tools include three planned models, one of which is the recruiting resource model recommended by AAA. The recruiting resource model has been partially completed and is being updated with additional data with full completion scheduled for September 2020. According to the Army’s fiscal year 2020 budget request, the Army used the RAND report that developed this model as a justification for increasing its advertising budget for fiscal year 2020. Further, in consultation with a consulting firm, AMRG developed a channel allocation simulator that allows AMRG officials to test different funding levels for its marketing and advertising channels to see potential outcomes. For example, based on our review of the simulator, AMRG can enter a specific amount of funding for events to estimate how many leads it can expect to obtain from that level of funding. AMRG officials stated that they can use this tool to help them plan for their required level of resources for the upcoming fiscal year. The development of this simulator is consistent with the commercial best practice of using sophisticated marketing mix modeling to determine an appropriate spending strategy. ASA(ALT) and OPM conducted reviews of AMRG’s workforce and made recommendations to improve the workforce practices within the marketing and advertising program. From January to May 2018, ASA(ALT) conducted a review of AMRG’s business processes and found high-risk issues that contributed to organizational inefficiencies within five areas: (1) internal communications, (2) business performance, (3) training, (4) program performance and accountability, and (5) personnel. For example, ASA(ALT) found that AMRG personnel were unclear about AMRG’s core mission, objectives, and program priorities. Further, ASA(ALT) found that AMRG’s personnel, skills, training, and physical locations were not aligned to support AMRG’s mission. In addition, OPM conducted an assessment from March to September 2018 to identify organizational inefficiencies and propose solutions intended to transform AMRG into a high-performing organization and improve its workforce morale. Similar to ASA(ALT), OPM identified issues with a lack of mission clarity and insufficient communication and collaboration throughout AMRG’s workforce and with its stakeholders. In addition, OPM identified a number of organizational design issues within AMRG, including workforce acquisition, management, and optimization of its operational components and staff. ASA(ALT) and OPM made multiple recommendations to address these issues within AMRG. For example, ASA(ALT) recommended that AMRG establish and disseminate standard operating procedures and process charts; clarify roles and responsibilities of the various organizational components; and clearly communicate to staff the final annual marketing strategy. OPM recommended a multiphased approach to implementing its overall recommendations, identifying key actions to take in each phase. For example, within the first phase, OPM recommended that AMRG determine the new functional structure for AMRG because it would improve management and accountability, collaboration, and stakeholder satisfaction. In addition, within the second phase, OPM recommended that AMRG develop a human capital management plan and review and update its position descriptions regularly to ensure they align with changing goals, staffing needs, and the organizational structure of AMRG. AMRG took some steps to address ASA(ALT)’s and OPM’s recommendations to improve its workforce practices. Within its report, ASA(ALT) noted that AMRG had started to take actions to implement several recommendations, such as disseminating AMRG’s mission statement, priority objectives, strategic goals, and fiscal year 2019 annual marketing plan guidance to all AMRG personnel. Similarly, OPM noted that AMRG had established task groups to coordinate with stakeholders, participated in meetings with Congress and stakeholders, and was developing a new vision for AMRG. However, as of April 2019, senior AMRG officials stated that they had not taken steps to address all of the reports’ recommendations because the Army was considering broader organizational changes to the placement of AMRG within the Army. While the recommendations in ASA(ALT) and the OPM reports were generally specific to AMRG’s organization and workforce at that time, senior AMRG officials stated that the Army would take additional steps to incorporate ASA(ALT)’s and OPM’s recommendations, as appropriate, after senior Army leadership made decisions about those changes. In our review, AMRG personnel we met with continued to identify poor internal communications and morale as key challenges within AMRG, consistent with the findings from ASA(ALT) and OPM. During our focus groups with AMRG personnel, participants repeatedly stated that senior AMRG leadership did not communicate key information to staff. For example, participants told us that senior AMRG leadership did not communicate information about AMRG’s mission, strategic priorities, or pending organizational changes. As described below, subsequent to our focus groups, the Army began taking steps to fundamentally change the organizational structure, workforce, and leadership of its marketing and advertising program. In light of the timing of these substantial changes, we did not comprehensively assess the extent to which communication issues have been resolved in the reorganization of the marketing and advertising program. It will be important for the new leadership to focus on communication at the outset of this organizational change to establish positive morale within the workforce. The Army recently reorganized its marketing and advertising program to improve its organizational structure; the Army’s early steps to implement the reorganization are consistent with some key practices for agency reform efforts we identified in our prior work, as described below. In May 2019, the Secretary of the Army reassigned, redesignated, and stated that the Army planned to relocate AMRG. The Secretary of the Army redesignated AMRG as AEMO and reassigned the office to the Deputy Chief of Staff of the Army, G-1. The effective date of this reassignment was August 1, 2019. AEMO’s mission is to coordinate the Army’s national marketing and advertising strategy; develop and maintain relationships with the marketing and advertising industry; and develop marketing expertise and talent within the Army to support the Army, Army National Guard, and Army Reserve accessions. The offices will be moved from Arlington, Virginia, and Fort Knox, Kentucky, to Chicago, Illinois. Consistent with the key practice to designate a leader to be responsible for the implementation of the proposed reforms, the Secretary of the Army designated the Assistant Secretary of the Army for Manpower and Reserve Affairs as responsible for establishing AEMO and overseeing the transition. The Assistant Secretary stated that he expected AEMO to be fully operational by early 2020. The Army identified several reasons for transitioning from AMRG to AEMO and reassigning the office to the Deputy Chief of Staff of the Army, G-1, consistent with the key practice to define and articulate a succinct and compelling reason for the reforms. According to the execution order establishing AEMO, the Army needed an organization strategically positioned to: support Army senior leadership in advertising, marketing, and analysis; coordinate with the Army’s primary advertising agency; be talent diverse; provide effective marketing analysis; and be able to provide consistency of message and brand across the Army accessions enterprise. The Assistant Secretary of the Army for Manpower and Reserve Affairs also stated that AEMO is being assigned to the Deputy Chief of Staff of the Army, G-1, in part, because of the continuity in leadership that having a military officer lead the organization will provide. Previously, AMRG was assigned to the Office of the Assistant Secretary of the Army for Manpower and Reserve Affairs, whose leader is politically appointed and had been vacant for two years until January 2019. In addition, the Assistant Secretary stated that AEMO will be located in Chicago to increase its coordination with the new advertising agency, which is also headquartered in Chicago. The Assistant Secretary also told us that the Army hoped to recruit civilian staff and to leverage the marketing and advertising expertise at academic and other marketing and advertising institutions in the region. The Army has taken some initial steps to establish AEMO and its operations. The Army has outlined a three-phased plan with specific tasks and associated dates within each of these phases, which is consistent with the key practice to establish implementation goals and a timeline to build momentum and show progress for the reforms. Phase 1, which was to be completed by August 1, 2019, prioritized tasks to initially establish AEMO, such as publishing the Army directive establishing AEMO, issuing the execution order outlining roles and responsibilities for the transition from AMRG to AEMO, and identifying office space in Chicago. Phase 2, which is to be completed between August 1, 2019, and February 1, 2020, includes tasks to transition AEMO to being fully operational, such as establishing new position descriptions and equipping the permanent office space. Lastly, phase 3 identifies those tasks to be implemented after February 1, 2020, when AEMO is fully operational and conducting daily operations, such as updating roles and responsibilities in the Army’s regulation for its marketing and advertising program and developing policies to direct commission military personnel to the office. The plan also identifies offices and officials who are accountable for implementing specific tasks during the transition. The Assistant Secretary of the Army for Manpower and Reserve Affairs told us that the Army established an operational planning team to execute the transition from AMRG to AEMO. The execution order also identifies key stakeholders, including officials from TRADOC, Office of the Chief, Army Reserve, and National Guard Bureau, who are to participate in weekly working group meetings led by the Assistant Secretary of the Army for Manpower and Reserve Affairs. Looking forward, by January 2020 the Army plans to develop metrics to assess the effectiveness of the new AEMO organization, including the purpose, expectations, and desired outcomes, which is consistent with the key practice that calls for clear outcome- oriented goals and performance measures. In addition, the Army has taken some initial steps to establish AEMO’s workforce. As of September 2019, the Army had authorized 53 positions—31 military and 22 civilian—for AEMO and identified a Brigadier General from the Army Reserve with marketing and advertising experience as its leader. Senior Army leadership stated that they expected to fill almost all of the positions with new military and civilian personnel, in part, because the civilian position classifications in AMRG do not generally align with those in AEMO. As of June 2019, the Assistant Secretary of the Army for Manpower and Reserve Affairs told us that the Army was identifying Active Duty, Reserve, and National Guard officers with marketing and advertising education or experience to fill the military positions. In addition, the Assistant Secretary stated that they were working with OPM to develop position descriptions for the AEMO civilian personnel and to identify the skills and expertise needed within AEMO to fulfill its mission, consistent with the key practice to determine if the agency will have the needed resources and capacity, including the skills and competencies, in place for the reorganization. The Army has also established a working group led by the U.S. Army Office of Economic and Manpower Analysis at West Point to develop a new marketing career path that senior Army leadership stated is intended to create a pool of military personnel who could serve in AEMO and other Army accessions organizations in the future. As the Army carries out its steps to fully establish AEMO and reorganize the marketing and advertising program, it will continue to be important for the Army to consider and use the key practices for agency reform efforts to guide the transition. Doing so will help ensure the success of the new marketing and advertising organization. We provided a draft of this report to DOD for review and comment. The Army provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Secretary of the Army. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This appendix summarizes an Army report to Congress on actions taken to improve its marketing and advertising program. Section 599 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 required the Army to submit a report to Congress that addressed several elements, such as the mitigation and oversight measures implemented to assure improved program return and contract management, and the establishment of a review process to regularly evaluate the effectiveness and efficiency of marketing efforts. The Army submitted the report on February 5, 2019. Table 4 identifies the required elements of the report and the actions that the Army has reported taking to address these elements. This appendix provides a summary of actions that the Army has reported taking to address the recommendations in the April 2018 U.S. Army Audit Agency (AAA) reports about the Army’s marketing and advertising program. One report focused on contract oversight, and the other report focused on what AAA termed “return on investment.” Each report contained seven recommendations, with which the Army Marketing and Research Group (AMRG) concurred. AMRG and AAA officials stated that they have communicated about AMRG’s actions to implement the recommendations and that AAA has provided feedback, as appropriate, on actions taken. AAA officials stated that AAA may conduct a follow-up audit in fiscal year 2020 to determine if the actions have led to improvements in the marketing and advertising program. Table 5 summarizes the recommendations from the AAA report on contract oversight, the actions AMRG has taken to implement them, and the status—as of September 2019—of their implementation as reported by AAA. Table 6 identifies the recommendations from the AAA report on return on investment, the actions AMRG has taken to implement them, and the status—as of September 2019—of their implementation as reported by AAA. In addition to the contact named above, Margaret Best (Assistant Director), Kendall Banks, Timothy J. DiNapoli, Jacob Fender, Alexandra Gonzalez, Amie Lesser, Kristen Kociolek, Steven Lozano, Jonathan Meyer, Eve Nealon, Julia Kennon, Carol Petersen, Richard Powelson, Jerome Sandau, Jared Sippel, and Andrew Stavisky made key contributions to this report.", "summary": "The Army requested nearly $335 million for fiscal year 2020 to conduct marketing and advertising activities intended to increase awareness of Army service and ultimately generate leads for potential recruits. In April 2018, AAA made recommendations in two reports to improve the contract oversight and return on investment of the Army's marketing and advertising program. Further, in May 2018 and October 2018, respectively, the Army and OPM made recommendations to improve the workforce practices and organizational structure of the program. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review the actions taken to implement AAA's recommendations and the effects of these actions on AMRG's leadership, workforce and business practices, and return on investment. This report assesses the extent to which the Army has taken steps to address recommendations (1) from AAA to improve the contract oversight and measurement of the effectiveness of the Army's marketing and advertising program and (2) from the Army and OPM to improve the workforce practices and organizational structure of the marketing and advertising program. GAO analyzed Army marketing and advertising data from fiscal year 2018; reviewed marketing and advertising plans and guidance; conducted focus groups with AMRG personnel; interviewed cognizant officials; and compared the Army's efforts to GAO-identified best practices. The Army provided technical comments, which GAO incorporated as appropriate. The Army has recently taken steps to improve the oversight of its primary marketing and advertising contract and measurement of the effectiveness of its marketing and advertising program in response to two U.S. Army Audit Agency (AAA) reports. In April 2018, AAA found that the Army Marketing and Research Group (AMRG)—the component responsible for conducting the Army's national-level marketing and advertising program—did not fully evaluate the performance of its contracted advertising agency or track the effectiveness of its marketing and advertising efforts. GAO found that AMRG has taken or is taking actions to address AAA's recommendations: Contract Oversight . AMRG has developed processes for overseeing the advertising agency's performance and services. For example, AMRG developed a form program managers use to validate that proposed advertising services are not already provided through other contracts. Program Effectiveness . AMRG has taken steps in several areas related to revising its strategic marketing goals to support Army recruiting, updating how it assesses marketing and advertising effectiveness, and improving the reliability of data systems. AMRG's steps are consistent with commercial best practices that GAO identified for assessing the effectiveness of advertising, such as identifying outcomes from advertising. The Army has also taken steps to improve the workforce practices and organizational structure of its marketing and advertising program in response to two workforce reviews. The two reviews—by an Army organization and the U.S. Office of Personnel Management (OPM)—found that AMRG, among other things, did not have regular communication throughout its workforce and with its stakeholders, and had a poor workforce climate. AMRG took initial steps to address the reviews' recommendations. The Army then established a new office effective August 2019—the Office of the Chief Army Enterprise Marketing—to replace AMRG and to assume all marketing and advertising activities. Some of the Army's early steps to establish the new office are consistent with key practices for agency reform efforts identified previously by GAO. For example, the Army outlined a three-phased plan with specific tasks and associated dates to fully establish the new office by early 2020 consistent with the key practice to establish implementation goals and a timeline.", "document_type": "gao"}
{"report": "According to OMB, federal agencies reported that they operated 432 data centers in 1998, 2,094 in July 2010, and 9,995 in August 2016. Operating such a large number of centers has been, and continues to be, a significant cost to the agencies. For example, in 2007, EPA estimated that the annual cost for electricity to operate federal servers and data centers across the government was about $450 million. Further, according to the Department of Energy (Energy), a typical government data center has 100 to 200 times the energy use intensity of a commercial building. However, in 2009, OMB reported server utilization rates as low as 5 percent across the federal government’s estimated 150,000 servers. All of these factors contributed to OMB recognizing the need to establish a coordinated, government-wide effort to improve the efficiency, performance, and environmental footprint of federal data center activities. Concerned about the size of the federal data center inventory and the potential to improve the efficiency, performance, and environmental footprint of federal data center activities, OMB’s Federal CIO established FDCCI in February 2010. This initiative’s four high-level goals were to reduce the overall energy and real estate footprint of government data centers; reduce the cost of data center hardware, software, and operations; increase the overall IT security posture of the government; and shift IT investments to more efficient computing platforms and technologies. In February 2010, OMB required all of the agencies participating in the FDCCI to submit a data center inventory and a consolidation plan. In October 2010, OMB also clarified the definition of a data center and noted that, for the purposes of FDCCI, a data center was to be defined as any room used for the purpose of processing or storing data that is larger than 500 square feet and meets stringent availability requirements. Under this definition, OMB reported that agencies had identified 2,094 data centers as of July 2010. However, in 2011, the Federal CIO expanded the definition to include a facility of any size and OMB published its revised definition in March 2012. Based on the revised definition, OMB estimated that there were a total of 3,133 federal data centers in December 2011. In addition, its goal was to consolidate approximately 40 percent, or 1,253 of these data centers, for a savings of approximately $3 billion by the end of 2015. Figure 1 shows data center server racks at SSA’s National Support Center in 2017. The number of federal data centers reported by agencies has continued to grow since 2011. In May 2018, we reported that agencies had collectively identified a total of 12,062 data centers in their inventories as of August 2017—an increase of about 9,000 data centers compared to OMB’s October 2011 estimate. According to the Federal CIO, the increase in the number of data centers was primarily due to the expanded definition of a data center (discussed later in this report) and improved inventory reporting by the agencies. See figure 2 for a depiction of the increase in the number of data centers from 1998 through August 2018. Further, OMB placed greater emphasis on data center optimization to improve the efficiency of federal data centers when it issued memorandum M-13-09 in March 2013. Specifically, OMB stated that, to more effectively measure the efficiency of an agency’s data center assets, agencies would also be measured by the extent to which their primary data centers are optimized for total cost of ownership by incorporating metrics for data center energy, facility, labor, and storage, among other things. Subsequently, in May 2014, OMB issued memorandum M-14-08, which established a set of data center optimization metrics to measure agency progress, along with target values for each metric. All agencies were expected to achieve the target values by the end of fiscal year 2015. Recognizing the importance of reforming the government-wide management of IT, Congress enacted FITARA in December 2014. Among other things, the law required agencies to: Submit to OMB a comprehensive inventory of the data centers owned, operated, or maintained by or on behalf of the agency. Submit, by the end of fiscal year 2016, a multi-year strategy to achieve the consolidation and optimization of the agency’s data centers. The strategy was to include performance metrics that were consistent with the government-wide data center consolidation and optimization metrics. Report progress toward meeting government-wide data center consolidation and optimization metrics on a quarterly basis to OMB’s Administrator of the Office of Electronic Government. In addition, according to FITARA, the Office of Electronic Government at OMB was to: Establish metrics applicable to the consolidation and optimization of data centers (including server efficiency), ensure that agencies’ progress toward meeting government-wide data center consolidation and optimization metrics is made publicly available, review agencies’ inventories and strategies to determine whether they are comprehensive and complete, and monitor the implementation of each agency’s strategy. Develop and make publicly available not later than December 19, 2015, a goal broken down by year for the amount of planned cost savings and optimization improvements to be achieved through FDCCI and, for each year thereafter until October 1, 2020, compare reported cost savings and optimization improvements against those goals. OMB issued memorandum M-16-19 in August 2016 to establish DCOI and included guidance on how to implement the data center consolidation and optimization provisions of FITARA. Among other things, the guidance required agencies to consolidate inefficient infrastructure, optimize existing facilities, improve their security posture, and achieve cost savings. For example, each agency was required to maintain a complete inventory of all data center facilities owned, operated, or maintained by or on its behalf, and measure progress toward defined optimization performance metrics on a quarterly basis as part of its data center inventory submission. OMB’s memorandum also directed each agency to develop a DCOI strategic plan that defined its data center strategy for fiscal years 2016 through 2018. Among other things, this strategy was to include a timeline for agency consolidation and optimization activities, with an emphasis on cost savings and optimization performance benchmarks that the agency could achieve between fiscal years 2016 and 2018. For example, each agency was required to develop cost savings targets due to consolidation and optimization actions and report any realized cost savings. OMB required each agency to publicly post its DCOI strategic plan to its agency-owned digital strategy website by September 30, 2016, and to post subsequent strategic plan updates by April 14, 2017 and April 13, 2018. Further, the memorandum stated that OMB was to maintain a public dashboard (referred to as the IT Dashboard) to display government-wide and agency-specific progress in areas such as planned and achieved data center closures, consolidation-related cost savings, and data center optimization performance information. In this regard, OMB began including data center consolidation and optimization progress information on the IT Dashboard in August 2016. OMB’s memorandum also provided new guidance for the classification of a physical data center and expanded the definition of a data center. According to the revised definition, a room with at least one server that provides services (whether in a production, test, staging, development, or any other environment) should be considered a data center, while a room containing only print servers, routing equipment, switches, security devices (such as firewalls), or other telecommunication components, was not to be considered a data center. In light of this new definition, OMB directed each agency to perform a comprehensive review of its data centers and maintain a complete and updated data center inventory. Further, OMB directed each agency to categorize each of its data centers as either a tiered data center or a non- tiered data center. OMB’s memorandum defined a tiered data center as one that uses each of the following: a separate physical space for IT infrastructure; an uninterruptible power supply; a dedicated cooling system or zone; and a backup power generator for a prolonged power outage. According to the memorandum, all other data centers were to be considered non-tiered. Moreover, OMB guidance included a series of performance metrics in the areas of data center closures, cost savings, and optimization progress. Data center closures: According to the guidance, agencies were to close at least 25 percent of tiered data centers government-wide, excluding those approved as inter-agency shared services providers, by the end of fiscal year 2018. Further, agencies were to close at least 60 percent of non-tiered data centers government-wide by the end of fiscal year 2018. OMB’s guidance further notes that, in the long term, all agencies should continually strive to close all non-tiered data centers, noting that server rooms and closets pose security risks and management challenges and are an inefficient use of resources. Cost savings: According to the guidance, agencies were to reduce government-wide annual costs attributable to physical data centers by at least 25 percent, resulting in savings of at least $2.7 billion for fiscal years 2016 through 2018. Data center optimization: According to the guidance, agencies were to measure progress against a series of new data center performance metrics in the areas of server utilization, energy metering, power usage, facility utilization, and virtualization. Further, OMB’s guidance established target values for each metric that agencies were to achieve by the end of fiscal year 2018. OMB’s guidance further noted that agency progress against these performance metrics was to be measured by OMB on a quarterly basis, using agencies’ data center inventory submissions and OMB-defined closures, cost savings, and optimization targets. In November 2018, OMB published proposed changes to DCOI for public comment. The changes focus federal consolidation and optimization efforts on agencies’ larger, tiered data centers and also de-emphasize the consolidation of non-tiered facilities and other smaller spaces. The draft guidance also revises the classification of data centers and data center optimization metrics. The draft guidance redefines a data center as a purpose-built, physically separate, dedicated space that meets certain criteria. Similarly, OMB does not plan to continue to report on spaces not designed to be data centers. According to the draft, OMB also plans to work with agencies to set agency-specific goals for data center closures and cost savings and to update these targets from those set in OMB’s August 2016 memorandum to match agencies’ current status and progress. Additionally, the proposed changes to DCOI make several changes to the metrics currently used by agencies to monitor the performance of their data centers. Specifically, of the five metrics currently in use (described in detail later in this report), OMB proposes updating three, removing two, and adding one new metric. The draft guidance states that public comments will be collected through the end of December 2018, but does not provide a date for when the proposed changes will be finalized and implemented. However, the draft does state that the new guidance will sunset on September 30, 2020, a date that coincides with the extension of FITARA’s data center provisions. Since the enactment of FITARA in December 2014, we have reviewed and verified annually for the quality and completeness of each agency’s (covered by the law) inventory and DCOI strategy. We have also published reports documenting the findings from each of our reviews. In addition, we have examined and reported on agencies’ efforts to optimize their data centers, as well as the challenges encountered and successes achieved. In a report that we issued in March 2016, we noted that agencies had reported significant data center closures—totaling more than 3,100 through fiscal year 2015—with the Departments of Agriculture, Defense (Defense), the Interior (Interior), and the Treasury (Treasury) accounting for 84 percent of the total. Although the agencies fell short of OMB’s fiscal year 2015 consolidation goal, their plans identified about 2,100 additional centers planned for closure through fiscal year 2019. Agencies also reported significant consolidation cost savings and avoidances—totaling about $2.8 billion through fiscal year 2015 and expected to increase to over $8.0 billion in future years. The Departments of Commerce, Defense, Homeland Security (DHS), Transportation (Transportation), and the Treasury accounted for 96 percent of the total planned savings. However, we pointed out that many agencies lacked complete cost savings goals for the next several years despite having closures planned. In addition, we reported that 22 agencies had made limited progress against OMB’s fiscal year 2015 data center optimization performance metrics, such as the utilization of data center facilities. Accordingly, we recommended that the agencies take actions to complete their cost savings targets and improve optimization progress. As of December 2018, 18 of the 32 recommendations from this report had yet to be fully addressed. In May 2017, we reported that the agencies were reporting significant data center closures—totaling more than 4,300 through August 2016— with Agriculture, Defense, Interior, and the Treasury accounting for 84 percent of the total. The agencies’ plans for 2016 had identified more than 1,200 additional centers for closure through fiscal year 2019. Agencies also reported significant consolidation and optimization cost savings and avoidances, which totaled about $2.3 billion through August 2016. However, reductions in the amount of achieved savings reported to OMB, particularly by the Treasury, resulted in a net decrease of more than $400 million in these savings, compared to amounts we previously reported as planned in 2015. Further, our report noted that, as of December 2016, agencies’ total planned cost savings of about $656 million were more than $3.3 billion less compared to the amounts that we reported in 2015, and more than $2 billion less than OMB’s fiscal year 2018 cost savings goal of $2.7 billion. This reduction in planned savings was the result of eight agencies reporting less in planned cost savings and avoidances in their DCOI strategic plans compared to the savings amounts previously reported to us in November 2015. The reduction also reflected the absence of cost savings information for one agency (Defense) that did not submit its strategic plan in time for our review. In addition, our May 2017 report identified weaknesses in agencies’ DCOI strategic plans. Of the 23 agencies that had submitted their strategic plans at the time of our review, 7 agencies—Agriculture, the Department of Education (Education), DHS, and the Department of Housing and Urban Development (HUD); GSA; the National Science Foundation (NSF); and the Office of Personnel Management (OPM)—had addressed all five required elements of a strategic plan, as identified by OMB (such as providing information related to data center closures and cost savings metrics). The remaining 16 agencies that submitted their plans either partially met or did not meet the requirements. We also pointed out that there were inconsistencies in the reporting of cost savings in the strategic plans of 11 agencies. Given these findings, we recommended that OMB improve its oversight of agencies’ DCOI strategic plans and their reporting of cost savings and avoidances. We also recommended that 16 agencies and Defense (which did not submit a plan in time for our review) complete the missing elements in their strategic plans, and that 11 agencies ensure the reporting of consistent cost savings and avoidance information to OMB. As of December 2018, 10 of the 30 recommendations had not been fully addressed. In a subsequent report that we issued in August 2017, we noted that 22 of the 24 agencies required to participate in the OMB DCOI had reported (collectively) limited progress against OMB’s fiscal year 2018 performance targets for the five optimization metrics. The 2 remaining agencies, Education and HUD, did not own any data centers and, therefore, did not have a basis to report on progress. Specifically, for each of the five targets, no more than 5 agencies reported that they had met or exceeded that specific target. We reported that this limited progress against OMB’s optimization targets was due, in part, to agencies not fully addressing our prior recommendations in this area. In addition, we noted in the report that most agencies had not yet implemented automated monitoring tools to measure server utilization, as required by the end of fiscal year 2018. Specifically, 4 agencies reported that they had fully implemented such tools, 18 reported that they had not yet done so, and 2 did not have a basis to report on progress because they did not own any data centers. Accordingly, we recommended that OMB require that agencies include plans, as part of existing OMB reporting mechanisms, to implement automated monitoring tools at their agency-owned data centers. We also recommended that the 18 agencies that did not have fully documented plans take action, within existing OMB reporting mechanisms, to complete plans describing how they intended to achieve OMB’s requirement to implement automated monitoring tools at all agency-owned data centers by the end of fiscal year 2018. As of December 2018, none of our 19 recommendations had been fully addressed. Most recently, in May 2018, we noted that the 24 agencies participating in DCOI had reported mixed progress toward achieving OMB’s goals for closing their data centers by September 2018. Thirteen agencies reported that they had either already met, or planned to meet, all of their OMB- assigned goals by the deadline. However, 4 agencies reported that they did not have plans to meet all of their assigned goals and 2 agencies were working with OMB to establish revised targets. With regard to agencies’ progress in achieving cost savings, 20 agencies reported, as of August 2017, that they had achieved $1.04 billion in cost savings for fiscal years 2016 and 2017. In addition, the agencies’ DCOI strategic plans identified an additional $0.58 billion in planned savings— for a total of $1.62 billion for fiscal years 2016 through 2018. This total was approximately $1.12 billion less than OMB’s DCOI savings goal of $2.7 billion. This shortfall was the result of 12 agencies reporting less in planned cost savings and avoidances in their DCOI strategic plans, as compared to the savings targets established for them by OMB. In addition, the 24 agencies reported limited progress against OMB’s five data center optimization targets for server utilization and automated monitoring, energy metering, power usage effectiveness, facility utilization, and virtualization. As of August 2017, 1 agency had met four targets, 1 agency had met three targets, 6 agencies had met either one or two targets, and 14 agencies reported meeting none of the targets. Further, as of August 2017, most agencies were not planning to meet OMB’s fiscal year 2018 optimization targets. Specifically, 4 agencies reported plans to meet all of their applicable targets by the end of fiscal year 2018; 14 reported plans to meet some of the targets; and 4 reported that they did not plan to meet any targets. Because GAO had made a number of recommendations to OMB and the 24 DCOI agencies to help improve the reporting of data center-related cost savings and to achieve optimization targets, we did not make new recommendations and noted that, as of March 2018, 74 of the 81 prior recommendations had not been fully addressed. While agencies have made considerable progress, as of December 2018, 47 of the 81 recommendations had not been fully addressed. According to OMB guidance, agencies were expected to close at least 25 percent of tiered data centers government-wide, by the end of fiscal year 2018. In addition, agencies were to close at least 60 percent of non-tiered data centers government-wide by this same deadline. Further, agencies were expected to reduce government-wide annual costs attributable to physical data centers by a least 25 percent by the end of fiscal year 2018, resulting in savings of at least $2.7 billion. The 24 agencies reported mixed results regarding their data center closure progress and plans, when compared with OMB’s goal for each agency to close at least 25 percent of their tiered data centers and at least 60 percent of their non-tiered centers. Specifically, as of August 2018, 13 agencies reported that they had already met the goal of closing 25 percent of their tiered data centers, another 3 agencies reported that they planned to meet the goal by the end of fiscal year 2018, and 6 agencies reported that they did not plan to meet the goal. Further, as of August 2018, 11 agencies reported that they had already met the goal for closing 60 percent of their non-tiered centers, 3 agencies reported that they planned to meet the goal by the end of fiscal year 2018, and 9 agencies reported that they did not plan to meet the goal by the end of fiscal year 2018. Table 1 displays a breakdown of the number of reported tiered and non-tiered data centers and completed and planned closures by agency, as of August 2018. As shown in the figure below, the 24 agencies reported a total of 6,250 data center closures as of August 2018, which represented about half of the total reported number of federal data centers. In addition, the agencies planned 1,009 closures by the end of fiscal year 2018, with an additional 191 closures planned through fiscal year 2023 for a total of 1,200 more closures. This would further reduce the number of open data centers to about 39 percent of the number reported in the agencies’ inventories. Figure 3 provides a summary breakdown of agencies’ data center inventories that were closed, planned for closure, or not planned for closure, as of August 2018. As noted, while about half of the agencies had met, or had planned to meet, their OMB targets as of August 2018, the other half planned to miss one or both of them. Officials from the 11 agencies that did not plan to meet one or both of their closure goals provided various reasons for why they had not planned to do so. For example, several agencies indicated that they were seeking revised closure goals because they viewed their goals as unattainable. Specifically, officials from Interior’s Office of the CIO stated that a number of the department’s non-tiered data centers were either mission-critical or not cost effective to close. Thus, the officials said Interior was working with OMB to establish a revised closure goal. Similarly, Transportation’s Director for IT Compliance stated that the department was working with OMB to establish a revised closure goal. The department reported having 186 tiered data centers in Federal Aviation Administration control towers that it believes should be excluded from its count of data centers when OMB sets the department’s goal for closures. In addition, officials in Defense’s Office of the CIO stated that the OMB closure targets for the department were based on including special purpose processing nodes that are mission critical and, therefore, are not subject to being closed. The officials noted that the department intends to continue operating its enterprise data centers, close its smaller data centers, and work with OMB to remove the special purpose processing nodes from DCOI consideration. When OMB launched DCOI in 2016, agencies originally had until the end of fiscal year 2018 to meet OMB’s stated time frame for closing their data centers. However, the extension of FITARA’s data center consolidation and optimization provisions through fiscal year 2020, and OMB’s planned revisions to DCOI goals, provide the 11 agencies that had not planned to meet one or both of OMB’s closure targets with additional time to meet their goals. Until these agencies take action to close enough data centers to meet OMB’s targets, they may not realize the efficiencies and cost savings that were expected from DCOI. Since 2013, federal agencies have been required to report on data center cost savings, with guidance from OMB regarding how agencies were to report cost savings and avoidances. Specifically, the guidance required agencies to report both data center consolidation cost savings and avoidances, among other areas, as part of a quarterly reporting process. FITARA also called for each agency to submit a multi-year strategy for achieving the consolidation and optimization of data centers that included year-by-year quarterly calculations of investment and cost savings through fiscal year 2018, which has now been extended to 2020. In addition, in August 2016, OMB M-16-19 provided guidance on how agencies should implement the requirements of FITARA. Specifically, agencies were to develop a strategic plan that included information on historical cost savings and avoidances due to data center consolidation and optimization through fiscal year 2015. This guidance stated that agency strategic plans were also to include year-by-year calculations of target and actual agency-wide spending and cost savings on data centers from fiscal years 2016 through 2018. Further, the guidance established a DCOI combined cost savings goal of $2.7 billion for all federal agencies to achieve from fiscal years 2016 through 2018. This overall goal was then broken down into agency-specific targets on the IT Dashboard. In August 2018, 22 agencies reported through the quarterly reporting process that they had achieved $1.94 billion in cost savings for fiscal years 2016 through 2018, while 2 agencies reported that they had not achieved any savings. Further, 21 agencies identified an additional $0.42 billion planned through fiscal year 2018, for a total of $2.36 billion in planned savings from fiscal years 2016 through 2018. Nevertheless, this total is about $0.37 billion less than OMB’s goal of $2.7 billion for overall DCOI savings. Figure 4 compares the total achieved savings as reported by the 24 agencies for fiscal years 2016 through 2018 and the agencies’ additional planned savings through 2018 to OMB’s DCOI savings goal for fiscal years 2016 through 2018. The 24 participating DCOI agencies had achieved $1.94 billion in savings as of August 2018. In addition, agencies identified an additional $0.43 billion, for a difference of $0.37 billion between planned and achieved savings from fiscal years 2016 through 2018. Table 2 provides specific data related to each agency’s total planned savings, total achieved savings, and additional planned savings through 2018. As shown in table 2, 13 agencies reported that they had met or planned to meet or exceed their OMB targets, and 3 agencies that did not have an OMB target also identified achieved savings. In contrast, 5 agencies reported that they did not plan to meet their targets. Three agencies did not have a savings target and did not report any achieved savings. Agencies provided various reasons for why they did not plan to meet their savings targets. For example, the Department of Veterans Affairs (VA) reported that the implementation of its DCOI-related projects in fiscal years 2016 through 2018 was dependent on funding approval and might not result in cost savings and avoidances until later in the projects’ life cycles (i.e., fiscal year 2019 or later). In another example, GSA stated that the OMB target may be difficult for the agency to reach due, in part, to the methods OMB used to set the target for fiscal years 2016 through 2018. According to GSA, OMB used the data that GSA had reported on the IT Dashboard regarding the agency’s expenditure for data center infrastructure and reduced that amount by 25 percent. Agencies have now been working toward OMB’s DCOI savings goals since fiscal year 2016; however, almost half of the agencies are still not planning to meet OMB’s targets. Until agencies plan to meet and achieve OMB’s data center-related savings targets, they will likely not realize the expected financial benefits from DCOI. FITARA required OMB to establish metrics to measure the optimization of data centers, including server efficiency, and to ensure that agencies’ progress toward meeting the metrics is made public. Pursuant to FITARA, OMB established a set of five data center optimization metrics intended to measure agencies’ progress in the areas of server utilization and automated monitoring, energy metering, power usage effectiveness, facility utilization, and virtualization. According to OMB, while the server utilization and automated monitoring metric applied to agency-owned tiered and non-tiered data centers, the four remaining metrics applied only to agency-owned tiered centers. OMB’s memorandum also established a target value for each of the five metrics, which agencies were expected to achieve by the end of fiscal year 2018. OMB measures agencies’ progress against the optimization targets using the agencies’ quarterly data center inventory submission and publicly reports this information on its IT Dashboard. Table 3 provides a description of the five data center optimization metrics and target values. As of August 2018, most (22 of the 24) DCOI agencies continued to report limited progress in meeting OMB’s fiscal year 2018 data center optimization targets identified on the IT Dashboard. The remaining 2 agencies—Education and HUD—reported that they did not have any agency-owned data centers in their inventory and, therefore, did not have a basis to measure and report optimization progress. With regard to the data center optimization targets, agencies reported the greatest progress against two metrics: power usage effectiveness and virtualization metrics. Specifically, 8 agencies reported that they had met OMB’s target for power usage effectiveness and 6 agencies reported that they had met the target for virtualization. However, for the energy metering, facility utilization, and server utilization and automated monitoring metrics, no more than 3 agencies reported meeting each. Figure 5 summarizes the 24 agencies’ progress in meeting each optimization target, as of August 2018. As of August 2018, NSF, SSA, and EPA reported the most progress against OMB’s metrics among the 22 agencies with a basis to report— each met 3 targets. Nine agencies reported that they had met only one target, and 10 agencies reported they had not met any of the targets. Further, OMB began requiring the implementation of automated monitoring tools in August 2016; however, as of August 2018, of the 22 agencies with a basis to report, 5 reported that they had either not implemented the tools at any data centers, or had experienced shortcomings in their implementation. For example, the Department of State (State) reported that it had limited centralized monitoring capability and is installing automated monitoring tools in several phases. Thus, these 5 agencies were not able to report any progress against either or both of the server utilization or power usage effectiveness metrics because their data centers lacked the required monitoring tools to measure progress in these areas. The remaining 17 agencies reported that they had implemented the tools in at least one data center. Table 4 depicts the performance of the agencies in meeting OMB targets for data center optimization, as of August 2018. As of August 2018, multiple agencies had made changes to their data center inventory and operational environment, such as closing all agency- owned tiered data centers or implementing automated monitoring tools. These changes impacted which metrics were applicable or an agency’s ability to report on the status of its optimization metrics. For example, GSA reported that it no longer had any agency-owned tiered data centers, and, therefore, did not have a basis to report on four of the five optimization metrics. Additionally, NSF, which previously had only owned one non-tiered data center, migrated from the non-tiered center to a tiered data center as part of its headquarters relocation. Accordingly, NSF began reporting on the metrics applicable to its tiered facility. Further, the Nuclear Regulatory Commission (NRC) did not report on power usage effectiveness due to delays in awarding a new contract that was to include monitoring tools that would impact the ability to report on this metric. Agency officials stated that NRC plans to have the monitoring tools in place during fiscal year 2019. Overall, these changes since last year’s report have resulted in no significant changes to the progression of these agencies on their optimization metrics. In addition, agencies’ limited progress against OMB’s optimization targets was due, in part, to not fully addressing our prior recommendations in this area. As previously mentioned, in March 2016, we reported on weaknesses in agencies’ data center optimization efforts, including that 22 agencies did not meet OMB’s fiscal year 2015 optimization targets. We noted that this was partially due to the agencies having challenges in optimizing their data centers, including in their decentralized organizational structures that made consolidation and optimization difficult, and in competing priorities for resources. In addition, consolidating certain data centers was problematic because the volume or type of information involved required the data center to be close in proximity to the users. Accordingly, we recommended that the agencies take action to improve optimization progress, to include addressing any of the identified challenges. Most agencies agreed with our recommendations or had no comments. However, as of December 2018, only 4 of the 22 agencies had fully addressed them. The continuing shortcomings in data center optimization can also be attributed, in part, to agencies viewing OMB’s optimization metric targets as unrealistic. For example, Transportation stated in its DCOI strategic plan that it could not meet multiple optimization metrics due to funds not being available and competing priorities. In addition, Treasury indicated in its DCOI strategic plan that it struggles to report on automated monitoring because many of its data centers do not have the ability to centrally aggregate and report on central processing unit data. Further, DHS officials noted that it has 7 smaller tiered data centers where it has determined that it is not cost effective to equip those centers with the tools needed to report on metrics such as power usage effectiveness. Given these types of challenges, the targets for each optimization metric may not be realistic for every agency. Unless agencies take action to meet the applicable OMB optimization metrics, their data centers may not operate efficiently enough to provide expected cost savings. In addition to reporting current optimization progress on the IT Dashboard, OMB required agencies to include in their DCOI strategic plans planned performance levels for fiscal year 2018 for each optimization metric. However, according to the 24 agencies’ DCOI strategic plan information as of August 2018, only 2—Commerce and the U. S. Agency for International Development (USAID)—reported plans to fully meet their applicable targets by the end of fiscal year 2018. Of the remaining agencies, 14 reported plans to meet some, but not all, of the targets; 6 reported that they did not plan to meet any targets, and—as already discussed—Education and HUD did not have a basis to report planned optimization milestones because they did not report having any agency- owned data centers. Figure 6 summarizes agencies’ progress, as of August 2018, in meeting OMB’s optimization targets and planned progress to be achieved by September 2018. At the time of our review, only two agencies planned to meet all of their applicable targets, and it was doubtful that the agencies would be able to achieve OMB’s collective optimization target of at least $2.7 billion in cost savings by the end of fiscal year 2018. Until the remaining agencies take the steps necessary to meet their optimization targets, it is unlikely that these agencies will achieve the expected benefits of optimization and the resulting cost savings. As we noted previously in this report, many agencies have reported challenges that have hindered their efforts to meet OMB’s DCOI targets. However, a number of agencies have also reported success in meeting OMB’s targets ahead of DCOI’s end of fiscal year 2018 deadline. As noted in our methodology section, six agencies that were among the best performers in achieving data center closures, cost savings, and optimization performance reported a number of key practices that had contributed to their success. These practices were: obtaining executive leadership support for consolidation and using experiences and lessons learned to refine consolidation increasing the use of cloud and shared services to consolidate or optimize data center operations; emphasizing closing data centers to meet OMB targets and achieve increasing the use of virtualization to optimize data centers; and employing an organization-wide communications plan to facilitate adoption of consolidation and optimization activities. Five of the six agencies (Agriculture, Commerce, Justice, EPA, and GSA) reported that their success in consolidation and optimization activities was due to obtaining support from executive leadership for the agency’s consolidation efforts. Each agency obtained sponsorship and support from its executive leadership (e.g., Deputy Secretary or agency CIO), such as through a memorandum or policy that directed all agency offices to participate in, or comply with, the consolidation effort. For example, The Deputy Secretary for Agriculture issued a memorandum in 2017 that, among other things, declared the department’s intent to consolidate from 39 data centers down to 2 by the end of 2019. According to officials in the Office of the CIO, this memorandum from the Secretary’s office focused all data center owners on the same project task of reducing the data center inventory. The Commerce CIO and the department’s CIO Council provided overall governance through organizational policies, processes, and procedures for the department’s data center consolidation effort. Leveraging this departmental guidance, each component of Commerce developed its own consolidation plan that identified specific approaches and activities. Using these plans, the department and its components focused on reducing spending on redundant software, infrastructure, and data center operations. The Deputy Attorney General issued a memorandum in 2014 to the heads and CIOs of all components. This memorandum formally established Justice’s Data Center Transformation Initiative, established the Department Program Review Board to provide oversight for the initiative, and also directed the consolidation of all data centers into 3 enterprise facilities. In addition, Justice’s CIO issued a memorandum to component CIOs that provided additional details on how to execute planned activities and established further governance associated with the initiative. These memoranda provided clear leadership buy-in and support for the department’s data center consolidation and optimization activities that could be used to resolve any challenges or issues at the departmental level. EPA attributed much of its DCOI success to a top-down approach from its CIO office, saying that such support was critical to achieve data center closures. For example, EPA leadership decided to adopt and enforce geographical consolidation of data centers within major areas to minimize costs of consolidation while still meeting closure objectives. In doing so, the agency leadership provided clear direction and support for the agency’s consolidation effort by adopting the strategy to consolidate data centers within specific geographic regions. GSA reported that it obtained leadership commitment that made its data center consolidation and optimization activities a priority. The agency noted that having strong CIO and executive leadership was important for sponsoring technology modernization. As a result of the buy-in, the agency reported that it had minimized resistance to change and improved acceptance of its consolidation and optimization activities. Four agencies (Agriculture, Commerce, Justice, and SSA) reported that their success with consolidation and optimization activities was due to the use of a refined consolidation plan or process. Each of these agencies developed an initial consolidation plan or process for closing data centers, and then refined their procedures based on their experiences and lessons learned as data centers were closed. For example, Agriculture developed a set of streamlined processes to facilitate DCOI closures that were based on the experiences gained from successful data center closures under FDCCI. The set of processes consisted of 5 steps: The planning step included the discovery and documentation of all data center assets, including applications and IT hardware, in a given data center. In addition, this step involved identifying the necessary resources to move the applications and associated data to a target data center. The preparation step included identification of the target data center and development of a project schedule. The data migration step included moving both applications and data to the target data center or cloud-services, as planned. The testing step included ensuring the applications and data that were moved were integrated into the target data center, and functional testing to ensure that the applications worked and data was accessible. The application cutover step included putting the migrated applications and data into operation and closing the original data center. Using and refining this set of processes allowed the department to become more efficient in closing its data centers. After closing 46 data centers in fiscal years 2011 through 2014, the department closed 2,185 data centers over the next 2 years. In total, Agriculture reported that it had closed 2,253 data centers as of August 2018. Commerce established departmental guidance and then each departmental component leveraged that guidance to develop its own consolidation plan. The plans identified specific approaches and activities intended to achieve the stated goals and milestones. According to Commerce, the department and its components leveraged their IT planning processes and established IT governance to, among other things, reduce spending on redundant commodity software, infrastructure, and operations. Justice’s Office of the CIO developed a master plan for the department’s data center consolidation effort in June 2015. The plan included a planning framework, transformation approach, and a master schedule for data center moves and closures. It also included process steps similar to those used by Agriculture. Further, Justice’s plan noted that the department would use its initial closure efforts to gain experience and to refine its plans. Justice reported that it used the plan’s schedule and semi-monthly progress reports to ensure that consolidation activities stayed on schedule, or the department could make adjustments as needed. As a result, the department closed 84 of its 110 data centers and achieved more than $128 million in cost savings and avoidances as of August 2018. SSA used a project management framework process and controls that it believed efficiently addressed requirements, critical path, and risk management. In addition, SSA reported that it used an incremental development approach to its data center optimization plans, with each project expected to accomplish specific tasks that would lead to another project. Accordingly, SSA noted that the agency used a multi-year plan with many initiatives focused on specific goals. Using this approach, the agency successfully moved SSA’s operations and infrastructure from an older facility to the newly-built National Support Center. The agency reports that this facility is state-of-the-art and provides similar capabilities and efficiencies to major cloud service providers. Three agencies (Commerce, GSA, and SSA) also attributed their success in consolidation and optimization activities to increasing their agency’s use of cloud and shared services. In doing so, each agency emphasized the move of data center assets and systems to cloud services to optimize their data centers and reduce costs. For example, Commerce identified moving to cloud services and utilizing shared services as being most effective in closing data centers. As an example, the department cited the National Oceanic and Atmospheric Administration’s (NOAA) “cloud-first” policy that emphasized using cloud services rather than an agency-owned physical data center whenever feasible. The agency attributed its ability to handle increased traffic as an operational benefit of its increased use of cloud services. For example, NOAA did not have the capacity in its agency- owned facilities to meet the computing demands and requirements of a sudden increase in web traffic on the websites for NOAA and the National Hurricane Center, such as during Hurricanes Irma and Harvey in 2017. Commerce stated that using cloud services allowed NOAA to handle 4.7 billion page hits during Hurricane Harvey over a 6-day span, ensuring the websites were not adversely impacted by the increase in traffic. GSA reported that it focused on moving services from agency-owned tiered and non-tiered data centers to cloud services or to shared centers. As a result, GSA had closed 118 data centers as of August 2018, including all of the agency’s tiered centers. SSA developed an agency cloud initiative that encourages the adoption of cloud technologies as part of the agency’s infrastructure modernization. The agency reported that it is employing a hybrid cloud strategy that is comprised of both private cloud and public cloud services for the agency’s back office applications. By doing so, the agency will consolidate and standardize SSA’s IT infrastructure systems and software to simplify management of those resources and reduce costs. Three agencies (Agriculture, Justice, and EPA) reported that their success in consolidation and optimization activities was due to focusing on the closure of data centers. In doing so, they emphasized the importance of closing data centers to reduce costs and achieve cost savings and avoidances. For example, Agriculture determined that the costs to improve DCOI performance metrics in its agency-owned data centers were prohibitive. Accordingly, the department decided that the only viable alternative was to close data centers to remove underperforming centers and improve optimization metrics performance and reduce costs. As a result, Agriculture reported that it had closed 2,253 data centers through August 2018. In addition, the department reported that it had improved its security posture, reduced its real estate footprint, and achieved realized cost savings and avoidance of $51.8 million from fiscal year 2012 through 2018. Justice reported that it took a practical approach to selecting the data centers that would remain as its enterprise facilities, considering factors such as the number of physical servers that could be eliminated, the efficiency of the remaining hardware, and potential labor savings. The department reported that it focused on retaining more efficient data centers (e.g., those with more efficient use of electricity or virtualization), rather than simply keeping its biggest existing data centers. As a result, Justice has closed 84 of its 110 data centers and achieved more than $128 million in cost savings and avoidances as of August 2018. EPA identified geographical consolidation as its best approach to meeting DCOI goals. Specifically, in its data center consolidation plan, the agency stated that, for geographic areas where it had multiple data centers, a single facility was identified into which data center IT assets would be consolidated. Using this approach, EPA had closed 43 of its 83 data centers as of August 2018. Three agencies (Commerce, EPA, and SSA) reported that their success in consolidation and optimization activities also was due to focusing on the increased use of virtualization to run more software on the same or a reduced amount of servers. In doing so, the agencies expected to reduce costs by avoiding the purchase of additional servers to meet computing demands or eliminating unnecessary hardware and floor space in their data centers. For example, Commerce focused on moving systems from physical hardware to virtual servers, as part of its component offices’ plans to update technology and in cases where the systems did not require a specific type of server. Using this approach, the department reported that it had reduced the number of physical servers in its data centers, and was working to improve server utilization. The department also cited the ability to automatically increase or decrease computing capability through virtualization, such as when NOAA handled the increased traffic to its hurricane-related web pages during Hurricanes Irma and Harvey in 2017. EPA used the agency’s data center consolidation plan to implement an agency-wide “physical-to-virtual” policy that required offices to convert existing physical servers to virtual servers wherever possible. The agency also defined server and software standards for virtualized platforms. SSA reported that the agency’s goal, using its “Virtual 1st” policy, was to have failover capability within the data center, disaster recovery capability for both data centers, and balanced load capacity between data centers. The agency reported that it has continued to virtualize not only servers but storage and network applications, as well. For example, SSA stated that it has taken steps to virtualize as much storage as possible and used similar techniques to reduce the physical hardware footprint on the data center floor, as well as power, cooling, and network bandwidth requirements. Two agencies (Justice and GSA) reported that their success in consolidation and optimization activities was due to employing an organization-wide communications plan. In doing so, the agencies adopted a structured method for communicating with agency offices to improve acceptance and adoption of consolidation and optimization activities. This also facilitated conflict resolution. For example, Justice reported that it prioritized communications related to its Data Center Transformation Initiative and established an all-encompassing approach to initiative-related communications. To help communicate all related directives, strategies, plans, statuses, and accomplishments, the department used a variety of methods that included: regular meetings to share information, a dedicated email box to provide easy communication for answers or information, without the need to know specific individuals, an intranet web page that provided general information, instructions, templates, decisions, status information, and accomplishments related to the initiative; and email broadcasts on an as-needed basis. GSA reported that it communicated and collaborated frequently with business stakeholders to identify the best time frames to move systems, stagger transfers to minimize impact, and determine which systems could be virtualized. The agency indicated that these important factors required continuous communication between system owners, system administrators, and business leadership. As a result, the agency experienced minimal staff resistance to change and a commitment to reach a consensus on moving forward with the agency’s consolidation efforts. The aforementioned practices included elements of sound management techniques, such as gathering leadership support for a project and developing a communications plan to foster adoption of organizational changes. The practices also included activities that aligned with the core tenets of DCOI to consolidate inefficient infrastructure, optimize existing facilities, and achieve cost savings. Further, these practices each proved effective for multiple agencies and, while they were not the only practices that could be effective, they represent concepts that could provide the foundation for an effective data center consolidation and optimization program. Federal data center consolidation efforts have been underway since 2010 and OMB’s fiscal year 2018 targets provided clear and transparent goals that helped define the tangible benefits that DCOI was expected to provide. However, most agencies continue to report mixed progress against those targets. Although agencies have taken action to close about half of the data centers in their combined inventories, 11 agencies did not plan to meet all of their closure targets. Further, the data center closures were expected to drive cost savings and avoidances and, to the agencies’ credit, the closures have led to more than $2.37 billion in planned and achieved cost savings and avoidances from fiscal years 2016 through 2018. However, five agencies did not plan to meet their cost savings targets. Until agencies consolidate the data centers required to meet their targets, as well as identify and report the associated cost savings, they will be challenged to realize expected efficiencies and the full benefits of DCOI will not be fully realized. Similarly, although OMB first established optimization metrics in May 2014, agencies continue to report only limited progress against the current performance targets. While two agencies do not have a basis to report any progress as they do not own any data centers, only two agencies reported that they planned to achieve all of DCOI’s fiscal year 2018 optimization targets. Ensuring the optimized performance of data centers is a key component to meeting OMB’s DCOI-wide savings goal and the 20 agencies that did not have plans to meet their targets call into question whether DCOI will realize its full potential savings. Although many agencies have struggled to meet their individual DCOI targets, other agencies have successfully met OMB’s goals for data center closures, savings, and optimization. Six such agencies that we identified reported on the importance of gathering leadership support, effective communication, and alignment with the core tenets of DCOI. Key practices such as these can play an important role in helping agencies better meet the overall goals and mission of DCOI. We are making a total of 36 recommendations to 22 of the 24 agencies in our review. Specifically: The Secretary of Agriculture should take action to meet the data center optimization metric targets established by OMB under DCOI. (Recommendation 1) The Secretary of Commerce should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 2) The Secretary of Defense should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 3) The Secretary of Defense should identify additional savings opportunities to achieve the targets for data center-related cost savings established under DCOI by OMB. (Recommendation 4) The Secretary of Defense should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 5) The Secretary of Energy should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 6) The Secretary of Energy should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 7) The Secretary of the Department of Health and Human Services (HHS) should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 8) The Secretary of HHS should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 9) The Secretary of DHS should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 10) The Secretary of DHS should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 11) The Secretary of Interior should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 12) The Secretary of Interior should take action to meet the data center- related cost savings established under DCOI by OMB. (Recommendation 13) The Secretary of Interior should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 14) The Attorney General should take action to meet the data center optimization metric targets established for Justice under DCOI by OMB. (Recommendation 15) The Secretary of the Department of Labor (Labor) should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 16) The Secretary of State should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 17) The Secretary of State should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 18) The Secretary of Transportation should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 19) The Secretary of Transportation should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 20) The Secretary of Treasury should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 21) The Secretary of VA should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 22) The Secretary of VA should take action to meet the data center-related cost savings established under DCOI by OMB. (Recommendation 23) The Secretary of VA should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 24) The Administrator of EPA should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 25) The Administrator of EPA should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 26) The Administrator of GSA should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 27) The Administrator of the National Aeronautics and Space Administration (NASA) should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 28) The Director of NSF should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 29) The Chairman of NRC should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 30) The Director of OPM should take action to meet the data center-related cost savings established under DCOI by OMB. (Recommendation 31) The Director of OPM should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 32) The Administrator of the Small Business Administration (SBA) should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 33) The Commissioner of SSA should take action to meet the data center- related cost savings established under DCOI by OMB. (Recommendation 34) The Commissioner of SSA should take action to meet the data center optimization metric targets established under DCOI by OMB. (Recommendation 35) The Administrator of USAID should take action to meet the data center closure targets established under DCOI by OMB. (Recommendation 36) We requested comments on a draft of this report from OMB and the 24 agencies that we reviewed. Of the 22 agencies to which we made recommendations, 11 agencies agreed with our recommendations; three agencies agreed with some portion, but not all of the recommendations; one agency disagreed with our recommendations; and seven agencies did not state whether they agreed or disagreed with the recommendations. In addition, OMB and two agencies to which we did not make recommendations stated that they had no comments. Further, multiple agencies provided technical comments, which we have incorporated, as appropriate. The following 11 agencies agreed with our recommendations: In written comments from Commerce, State, NASA, SBA, and SSA, the agencies stated that they agreed with the recommendations and indicated their intent to address them. State also provided technical comments, which we have incorporated, as appropriate. The agencies’ comments are reprinted in appendices II through VI. In written comments, Energy agreed with our recommendations to meet its data center closure and optimization metric targets, and described actions that the department planned to take in order to address the recommendations. Energy initially estimated that it would complete these actions by March 1, 2019; however, the department subsequently revised its estimated completion date to April 15, 2019. Energy also provided technical comments, which we have incorporated, as appropriate. Energy’s comments are reprinted in appendix VII. In written comments, VA agreed with our recommendations to meet its data center closure, cost savings, and optimization metric targets. In addition, the department requested that we close our recommendation related to data center closures on the basis of its planned actions to implement a new inventory data collection tool and methodology to improve how the department collects data center inventory information, and a positive trend in its data center closures. The department estimated that its planned actions would be completed in March 2019 and reported that, as of November 2018, it had closed 78 data centers in fiscal year 2018, as compared with 24 in fiscal year 2017. However, as noted earlier in this report, we found that VA did not plan to meet the closure goal for either tiered or non-tiered data centers, which was the basis for our recommendation. While we acknowledge and encourage VA’s reported closure progress, the department still has not met its DCOI closure goals, as we recommended. Further, VA did not provide an update on the status of its planned actions in time for us to address them in this report. As such, we maintain that this recommendation is still appropriate. In addition, VA referred to OMB’s proposed changes to DCOI guidance when describing actions that it planned to take to meet the department’s cost savings and optimization metrics targets. However, OMB staff told us that the August 2016 DCOI guidance will remain in effect until the revised DCOI guidance is formally issued. Once OMB’s new DCOI guidance is finalized, we plan to assess agency progress against any revised targets, and we will continue to monitor the department’s efforts to address our recommendation. VA’s comments are reprinted in appendix VIII. We received emails from officials of Agriculture, Justice, Transportation, and OPM which stated that these agencies agreed with the recommendations we directed to them. In addition, three agencies agreed with some portion, but not all of our recommendations directed to them: In written comments, Defense stated that it agreed with our recommendation to meet its data center closure targets. However, the department partially agreed with our two other recommendations: to identify additional data center-related savings opportunities and to meet OMB’s data center optimization metric targets. In partially agreeing with our recommendation on data center savings, Defense asserted that it had already identified significant cost savings through activities such as the identification of system migration candidates and the use of cloud services, among others. The department further stated that, while it would continue to optimize its data centers, the need for IT would continue to grow, and this growth might ultimately lead to an increase in total data center costs, despite overall per unit cost reductions. However, the department’s planned savings of $205.46 million represented only 11 percent of its $1.8 billion savings goal by the end of fiscal year 2018 and, as such, this limited progress by the department formed the basis for our recommendation. As discussed in our report, OMB plans to revise DCOI guidance and work with agencies to set agency-specific targets. According to OMB staff, until the guidance is revised, the current guidance and its targets are still applicable. For these reasons, we maintain that our recommendation is still appropriate. Further, in partially agreeing with our recommendation to meet optimization metric targets, Defense stated that the department will continue to drive towards the achievement of data center optimization targets. It added, however, that it would not invest resources to improve the efficiency of data centers planned for closure and that, as a result, the composite view of Defense’s data center efficiency would fall short of meeting OMB’s targets. Our review found that Defense did not plan on meeting any of OMB’s five data center optimization metric targets by the end of fiscal year 2018. This finding was the basis for our recommendation. We acknowledge Defense’s position that investing resources into optimizing data centers that are already planned for closure would not be the best use of taxpayer dollars. We also noted in our report that OMB had proposed revising its optimization metrics, and that any such changes had not yet been finalized. Our recommendation is not intended to imply that an agency should meet a particular version of OMB targets but, rather, that the agency should meet any targets that are established by OMB. This would include any future changes to DCOI targets. Accordingly, we maintain that our recommendation is still appropriate and will continue to monitor the department’s efforts to address our recommendation. Defense’s comments are reprinted in appendix IX. In written comments, DHS stated that it agreed with our recommendation to meet its data center closure targets and disagreed with our recommendation to meet its data center optimization metric targets. Specifically, the department noted that it had met its tiered data center closure targets, and was reviewing the status of its remaining open non-tiered data centers. The department added that it expected to complete this activity by March 31, 2019. However, the department did not provide an update on its efforts in time to be included in this report. While we encourage DHS’s continued efforts to close its remaining non-tiered data centers, we note that the department’s letter cites an inventory of 18 open non-tiered facilities, which differs significantly from the 202 non-tiered centers counted in our draft report, and which DHS officials confirmed in November 2018. According to the department, this discrepancy is because OMB issued revised inventory reporting requirements in November 2018, and these revised requirements exempted certain types of facilities from DCOI reporting and resulted in the lower number. These changes in reporting requirements are similar to the proposed, but not yet finalized, revisions to the DCOI policy that are discussed earlier in this report. However, OMB staff told us that the August 2016 DCOI guidance will remain in effect until the revised DCOI guidance is formally issued. Once OMB’s new DCOI guidance is finalized, we plan to assess agency progress against any revised targets, and we will continue to monitor the department’s efforts to address our recommendation. Further, in disagreeing with our recommendation on meeting optimization metrics, the department stated that, while the recommendation was applicable under the original DCOI guidance that OMB issued in August 2016, OMB’s proposed changes to DCOI guidance would exempt most, if not all, DHS agency-owned data centers from the optimization metrics. Consequently, the department requested that our recommendation be closed. In our review, we found that the department did not plan on meeting any of OMB’s five data center optimization metric targets established under DCOI. This finding was the basis for our recommendation on meeting optimization metrics. Also, while OMB has proposed changes to its metrics, as we noted previously, it has not provided a date for when any such proposed changes will be finalized and implemented; and, according to OMB staff, until the changes to DCOI guidance are finalized, the current guidance is still applicable. Further, our recommendations do not specify that an agency should meet any particular version of OMB targets, but rather, that an agency should meet the targets established by OMB. This would include any future changes to DCOI targets. Accordingly, we maintain that our recommendation is still appropriate. DHS also provided technical comments, which we have incorporated, as appropriate. DHS’s comments are reprinted in appendix X. In written comments, Interior stated that it partially agreed with our recommendation to meet its data center closure targets and disagreed with our two recommendations to meet its data center-related cost savings target and its data center optimization metric targets. For all three recommendations, the department stated that OMB had proposed changes to DCOI guidance that would result in new targets for closures, cost savings, and optimization metrics and that Interior planned to adopt the new policy and work through OMB to establish its new targets. As noted in our report, Interior met its target for tiered data center closures, but did not plan to meet the closure goal for non-tiered data centers. Further, the department planned on achieving only $15.95 million of its $88.19 million savings target (18 percent) by the end of fiscal year 2018, and did not plan on meeting any of OMB’s five data center optimization metric targets. These three findings were the basis for our recommendations to the department. We also noted that, as part of OMB’s proposed changes to DCOI guidance, it planned to work with agencies to set agency-specific targets for data center closures and planned to modify the metrics currently used by agencies to monitor the performance of their data centers. However, as previously mentioned, OMB has not provided a date for when these proposed changes will be finalized and implemented and, according to OMB staff, until the changes to DCOI guidance are finalized, the 2016 guidance is still applicable. Furthermore, our recommendations do not specify that an agency should meet any particular version of OMB targets, but should meet any targets that are established by OMB. This would include any future changes to DCOI targets. As such, we maintain that our recommendations are appropriate. Interior’s comments are reprinted in appendix XI. One agency disagreed with all of our recommendations: In written comments, HHS disagreed with our two recommendations to meet its data center closure targets and data center optimization metric targets. In regard to both recommendations, the department disagreed with being held to what it termed “expired requirements” from DCOI guidance, pending the assignment of new targets being established by OMB. As noted in our report, HHS met its target for tiered data center closures, but did not plan to meet the closure target for non-tiered data centers. We also found that HHS did not meet any of OMB’s five optimization metric targets and had planned to meet only one of the five by end of fiscal year 2018. These findings were the basis for the two recommendations that we made to the department. We also noted that, as part of OMB’s proposed changes to DCOI guidance, OMB planned to work with agencies to set agency-specific targets for data center closures and planned to modify the metrics currently used by agencies to monitor the performance of their data centers. However, as previously mentioned, OMB did not provide a date for when these proposed changes will be finalized and implemented and, according to its staff, until the changes to DCOI guidance are finalized, the current guidance is still applicable. Further, our recommendations do not specify that an agency should meet any particular version of OMB targets, but rather, that the agency should meet the targets established by OMB. This would include any future changes to DCOI targets. Accordingly, we maintain that our recommendations are still appropriate. HHS’s comments are reprinted in appendix XII. Further, seven agencies did not agree or disagree with the recommendations: In written comments, EPA did not state whether it agreed or disagreed with our recommendations to meet its data center closure and data center optimization metrics targets. However, the agency requested that we close our recommendations, citing its reported progress in closing 21 of 34 targeted data centers and OMB’s proposed changes in its draft DCOI guidance that could result in revised closure targets and optimization metrics. As stated in our report, we found that EPA did not plan to meet its closure target for tiered or non-tiered data centers, nor did it plan to meet its data center optimization targets; these findings were the basis for our recommendations. We also noted that, as part of OMB’s proposed changes to DCOI, OMB planned to work with agencies to set agency-specific targets for data center closures and planned to modify the metrics currently used by agencies to monitor the performance of their data centers. However, OMB has not provided a date for when these proposed changes will be finalized and implemented and, according to OMB staff, until the changes to DCOI guidance are finalized, the current guidance is still applicable. Further, our recommendations do not specify that an agency should meet any particular version of OMB targets, but that it should meet the targets established by OMB. This would include any future changes to DCOI targets. Accordingly, we maintain that our recommendations are appropriate and should remain open. EPA also provided technical comments, which we have incorporated, as appropriate. The agency’s comments are reprinted in appendix XIII. In written comments, GSA did not state whether it agreed or disagreed with our recommendation to meet the agency’s data center optimization metrics targets. Specifically, the agency stated that it had complied with revised inventory reporting requirements, which OMB provided to agencies in November 2018 and which eliminated non- tiered data centers from the requirement to meet optimization targets. As a result, the agency noted that it no longer had a basis to measure and report on the one metric our report cited as applicable to GSA (i.e., server utilization and automated monitoring) and asked that we withdraw the recommendation. These changes in reporting requirements are similar to the proposed, but not yet finalized, revisions to the DCOI policy that are discussed earlier in the report. However, OMB staff told us that the August 2016 DCOI guidance is still in effect until the revised DCOI guidance is formally issued. Until OMB’s new DCOI guidance is finalized and agency progress against any revised targets can be evaluated, we maintain that our recommendation to meet the agency’s optimization metrics targets is appropriate, and we will continue to monitor the agency’s efforts to address it. GSA’s comments are reprinted in appendix XIV. In written comments, NSF did not state whether it agreed or disagreed with our recommendation. The agency’s comments are reprinted in appendix XV. In written comments, NRC agreed with the draft report, but did not state whether it agreed or disagreed with our recommendation. The agency’s comments are reprinted in appendix XVI. In written comments USAID did not state whether it agreed or disagreed with the draft report’s recommendation but agreed with our finding that the agency no longer had any tiered data centers. However, USAID stated that it had met DCOI’s closure targets for the agency by closing its 4 non-tiered data centers, and requested that we close our recommendation to meet those targets. While we encourage USAID’s continued efforts to close its remaining non-tiered data centers, we note that the agency’s letter cites an inventory of 4 non-tiered facilities, which differs significantly from the 83 non-tiered centers counted in our draft report, and which USAID officials confirmed in October 2018. As USAID communicated in subsequent emails, this discrepancy is because OMB issued revised inventory reporting requirements in November 2018 and these revised requirements exempted certain types of facilities from DCOI reporting, which resulted in the lower number. These changes in reporting requirements are similar to the proposed, but not yet finalized, revisions to the DCOI policy that are discussed earlier in the report. However, OMB staff told us that the August 2016 DCOI guidance is still in effect until the revised DCOI guidance is formally issued. Until OMB’s new DCOI guidance is finalized and agency progress against any revised targets can be evaluated, we maintain that our data center closure recommendation is appropriate, and we will continue to monitor the agency’s efforts to address it. The agency’s comments are reprinted in appendix XVII. In emails received from Labor’s GAO liaison in the department’s Office of the Assistant Secretary for Policy on January 8, 2019, and from an audit liaison in Treasury’s Office of the CIO on February 1, 2019, both departments did not state whether they agreed or disagreed with our respective recommendations. Finally, in emails received from a Management and Program Analyst in Education’s Office of the Secretary/Executive Secretariat on January 8, 2019; an audit liaison in HUD’s Office of the CIO, Audit Compliance Branch on February 15, 2019; and a GAO liaison in OMB’s Office of General Counsel on February 25, 2019, these agencies stated that they had no comments on the draft report. We are sending copies of this report to interested congressional committees, the Director of OMB, the secretaries and heads of the departments and agencies addressed in this report, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix XVIII. Our objectives for this engagement were to (1) determine agencies’ progress in data center closures and achievement in related savings to date and describe plans for future savings, (2) evaluate the agencies’ progress against OMB’s data center optimization targets, and (3) identify effective agency practices for achieving data center closures, cost savings, and optimization. To address the first objective, for data center closures, we obtained and analyzed August 2018 data center inventory documentation from the 24 departments and agencies (agencies) that participate in OMB’s Data Center Optimization Initiative (DCOI). To determine data center closures to date, we totaled their reported closures from fiscal year 2010 through August 2018 and to identify future closures, we totaled their reported planned closures through fiscal year 2018. We also compared agencies’ completed and planned closures to OMB’s fiscal year 2018 consolidation goals, as documented in its August 2016 memorandum (M-16-19). To verify the quality, completeness, and reliability of each agency’s data center inventory, we compared information on completed and planned data center closures to similar information reported on OMB’s IT Dashboard—a public website that provides information on federal agencies’ major IT investments. We also checked for missing data and other errors, such as missing closure status information. In some cases identified, we followed-up with agency officials to obtain further information. We determined that the data were sufficiently complete and reliable to report on agencies’ consolidation progress and planned closures. For cost savings and avoidance we obtained and analyzed documentation from the 24 DCOI agencies. This documentation is required by OMB’s March 2013 and August 2016 memorandums and included the agencies’ quarterly reports of cost savings and avoidances posted to their digital services websites and their DCOI strategic plans. To determine cost savings achieved, we totaled agencies’ reported savings and avoidances from the start of fiscal years 2012 through August 2018, as found in the August 2018 quarterly reports posted to the agencies’ digital services websites. To identify future planned savings, we totaled the agencies’ projected savings and avoidances from fiscal years 2016 through 2018, as reported in their DCOI strategic plans. To assess the quality, completeness, and reliability of each agency’s data center consolidation cost savings information, we used the latest version of each agency’s quarterly cost savings report and DCOI strategic plan, as of August 2018. We also reviewed the quarterly reports and DCOI strategic plans for missing data and other errors, such as missing cost- savings information. In addition, we compared agencies cost savings and avoidances with data from our most recent data center consolidation report. As a result, we determined that the data were sufficiently complete and reliable to report on agencies data center consolidation cost-savings information. For our second objective, we analyzed the August 2018 data center optimization progress information of the 24 DCOI agencies. This progress information was obtained from the IT Dashboard—an OMB public website that provides information on federal agencies’ major IT investments. To assess agencies’ planned optimization progress, we obtained the planned optimization performance from the 22 agencies’ DCOI strategic plans. We then compared the agencies’ current and planned optimization progress information to OMB’s fiscal year 2018 optimization targets, as documented in its August 2016 memorandum. Although OMB’s memorandum establishes a single optimization target value for the server utilization and automated monitoring metric, the IT Dashboard displays agencies’ progress for tiered and non-tiered data centers separately. To report consistently with OMB’s implementation memorandum, we combined the progress information for tiered and non-tiered data centers into a single assessment in this report. In addition, to assess the reliability of the planned optimization milestones in the DCOI strategic plans, we reviewed agencies’ documentation to identify any missing or erroneous data. We also compared the planned data center optimization milestones contained in agencies’ documentation against current optimization progress information obtained from the IT Dashboard; we then discussed any discrepancies or potential errors that we identified with agency officials to determine the causes or request additional information. As a result of these efforts, we were able to determine whether each agency’s strategic plan information was sufficiently reliable for reporting on plans to meet or not meet OMB’s fiscal year 2018 optimization targets. To assess the reliability of agencies’ optimization progress information on OMB’s IT Dashboard, we reviewed the information for errors or missing data, such as progress information that was not available for certain metrics. We also compared agencies’ optimization progress information across multiple reporting quarters to identify any inconsistencies in agencies’ reported progress. We discussed with staff from OMB’s Office of the Federal Chief Information Officer any discrepancies or potential errors identified to determine the causes. To identify effective agency practices for achieving data center closures, cost savings, and optimization progress, we selected two of the highest performing departments or agencies for each of those three data center areas that we reported on in our May 2018 report. For the data center inventory closures area, we selected the Departments of Agriculture (Agriculture) and Justice (Justice) from among the five agencies that had, as of August 2017, reached or exceeded both their tiered and non-tiered data center closure targets for the end of fiscal year 2018. For the cost savings area, we identified two departments and two small agencies reporting the highest cost savings DCOI to date, as of August 2017. From those, we selected one department (Commerce) and one small agency (the General Services Administration) to provide balance relative to agency size. For effective practices related to optimization performance, we reviewed agencies’ reported optimization performance as of August 2017 and selected the two highest-performing agencies in this area (the Social Security Administration and the Environmental Protection Agency), since they were the only two agencies reporting that they met more than half of OMB’s optimization targets. Selecting these agencies was designed to provide anecdotal information that could assist agencies struggling with DCOI implementation. The examples they provided are not findings nor should they be taken to be representative of all the agencies participating in DCOI. We asked each selected agency to identify practices that they found effective in implementing DCOI at their agency and in meeting OMB’s established targets in each of the areas, not just the area for which they were selected. We also solicited examples that demonstrated how those practices helped agency implementation or the benefits from implementing DCOI. Additionally, we considered information and examples that these agencies provided as part of our work to identify FITARA best practices. We analyzed the responses to determine the practices and reported those that were identified by at least two agencies. We conducted this performance audit from April 2018 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, individuals making contributions to this report included Dave Powner (director), Dave Hinchman (assistant director), Justin Booth (analyst-in-charge), Alexander Bennett, Chris Businsky, Nancy Glover, and Jonathan Wall.", "summary": "In December 2014, Congress enacted federal IT acquisition reform legislation that included provisions related to ongoing federal data center consolidation efforts. OMB's Federal Chief Information Officer launched DCOI to build on prior data center consolidation efforts; improve federal data centers' performance; and establish goals for inventory closures, cost savings and avoidances, and optimizing performance. The 2014 legislation included a provision for GAO to annually review agencies' data center inventories and strategies. Accordingly, GAO's objectives were to (1) evaluate agencies' progress and plans for data center closures and cost savings; (2) assess agencies' progress against OMB's data center optimization targets; (3) and identify effective agency practices for achieving data center closures, cost savings, and optimization progress. To do so, GAO assessed the 24 DCOI agencies' data center inventories as of August 2018; reviewed their reported cost savings documentation; evaluated their data center optimization strategic plans; and assessed their progress against OMB's established optimization targets. GAO also solicited practices that selected agencies reported to be effective in meeting DCOI goals. The 24 agencies participating in the Office of Management and Budget's (OMB) Data Center Optimization Initiative (DCOI) reported mixed progress toward achieving OMB's goals for closing data centers and realizing the associated savings by September 2018. As of August 2018, 13 agencies reported that they had met, or had plans to meet, all of their OMB-assigned closure goals by the deadline. However, 11 agencies reported that they did not have plans to meet their goals. Further, 16 agencies reported that, as of August 2018, they had met, or planned to meet, their cost savings targets, for a total of $2.36 billion in cost savings for fiscal years 2016 through 2018. This is about $0.38 billion less than OMB's DCOI savings goal of $2.7 billion. This shortfall is the result of 5 agencies reporting less in planned cost savings and avoidances in their DCOI strategic plans, as compared to their savings targets established for them by OMB. Three agencies did not have a cost savings target and did not report any achieved savings. In addition, the 24 agencies reported limited progress against OMB's five data center optimization targets for server utilization and automated monitoring, energy metering, power usage effectiveness, facility utilization, and virtualization. As of August 2018, the agencies reported that 3 had met three targets, 9 had met one target, and 10 met none of the targets. Two agencies did not have a basis to report on progress as they do not own any data centers. Further, as of August 2018, 20 agencies did not plan to meet all of OMB's fiscal year 2018 optimization goals. Specifically, only 2 agencies reported plans to meet all applicable targets; 6 reported that they did not plan to meet any of the targets (see figure). We selected 6 agencies that had demonstrated success towards meeting their DCOI goals and those agencies reported a number of key practices that contributed to their efforts. The officials noted the importance of, among other things, obtaining executive leadership support for consolidation and optimization activities, employing an organization-wide communications plan, and focusing on data center closures. The officials also cited the use of past experience and lessons learned to inform improvements to future consolidation plans and processes. GAO is making 36 recommendations to 22 agencies to improve performance against established DCOI goals. Eleven agencies agreed with the recommendations, three did not fully agree, one disagreed, and seven neither agreed nor disagreed, as discussed in the report.", "document_type": "gao"}
{"report": "TAs are significant given their increasing importance to policymakers, and the growing effects of S&T on society, economy, and other areas. While technological changes can be positive, they can also be disruptive. Therefore, it is critical for Congress to be able to understand and evaluate these changes, to ensure, for example, national security and global competitiveness. Examples of potential uses of TAs related to enhancing knowledge and awareness to assist decision-making include: Highlight potential short, medium, and long-term impacts of a Elaborate on and communicate the risks and benefits associated with a technology, including early insights into the potential impacts of technology Highlight the status, viability, and relative maturity of a technology Plan and evaluate federal investments in S&T GAO TAs are most commonly requested by congressional committees, which may use them to, among other things, make decisions regarding allocating or reallocating resources to address research gaps, support updated rulemaking for a regulatory agency, or inform a legislative agenda or the development of a national strategy. Technologies present opportunities and challenges that may vary, depending in part on the policy context in which they are evaluated. Therefore, part of a TA is considering the policy context surrounding a given technology. GAO may, where appropriate, identify and analyze policy options as part of its TAs, which may also include: clarifying and summarizing policy-related issues and challenges, and providing information that can be used for decision-making. In this situation, policy options can be defined as a set of alternatives or menu of options (including the status quo) that policymakers, such as legislative bodies, government agencies, and other groups, could consider taking. Policy options can be used to articulate a range of possible actions a policymaker could consider in the context of a given technology and policy goal. Policy options do not state what policymakers should do in a given circumstance with a certain technology. Policy options do not endorse or recommend a particular course of action; they are not recommendations or matters for congressional consideration, which GAO makes in its audits. In addition, policy options are addressed to policymakers more broadly, and are not addressed to a specific federal agency or entity. Developing a written TA design helps TA teams agree on and communicate a clear plan of action to the project team and the team’s advisers, requesters, and other stakeholders. Written TA designs also help guide and coordinate the project team’s activities and facilitate documentation of decisions and procedures in the final report. In addition, focusing the TA on answering specific researchable questions can assist teams to define and select the appropriate scope, approach, and type of product, ensuring usefulness of the product to the intended users. More specific reasons for spending time on systematically designing a TA include: Enhance its quality, credibility, and usefulness Ensure independence of the analysis Ensure effective use of resources, including time Data collection and quality assurance of data can be costly and time- consuming. A thorough consideration of design options can ensure that collection and analysis of the data are relevant, sufficient, and appropriate to answer the researchable question(s), and helps to mitigate the risk of collecting unnecessary evidence and incurring additional costs. This chapter highlights design phases, cross-cutting considerations, and GAO TA design examples for sound technology assessment (TA) design. To ensure that the information and analyses in TAs meet policymakers’ needs, it is particularly useful to outline the phases and considerations involved in sound TA design, while remaining aware of the iterative and nonlinear process of designing a TA. The information presented in this chapter is based on review of results of a literature search, an expert forum, select GAO reports, and experiences of GAO teams and technical specialists. For more information, please refer to Appendix I: Objectives, Scope, and Methodology. Below are questions to consider for a sound TA design. Reflecting on these questions may help teams make important decisions (like selecting an appropriate design) and ensure quality TAs. Does the design address the needs of the congressional requester? Will the design yield a quality, independent, balanced, thorough, and objective product? Will the design likely yield information that will be useful to stakeholders? Will the design likely yield valid conclusions on the basis of sufficient and credible evidence? Will the design yield results in the desired time frame? Will the design likely yield results within the constraints of the resources available? How will policy options be identified and assessed, if applicable? Figure 1 outlines three phases and seven considerations for TA design. While Figure 1 presents TA design as a series of phases, actual execution is highly iterative and nonlinear. Teams may need to be prepared to re-visit design decisions as information is gathered or circumstances change. Below are some considerations for the team to think about while designing a TA and throughout the process of performing the TA. This list is not exhaustive, and some of the considerations may not be unique to TAs. of the technology) and context of the technology (such as social, political, legal, and economic factors) circumstances change and new information comes to light, it may be necessary to revisit scope and design. The initial situational analysis may also be used to: Inform the goal(s), purpose, and objectives (also known as researchable questions) challenges to design and implementation of the TA, such as: (1) possible changes in operating environment; (2) characterizing or quantifying anticipatory factors, uncertainty, and future condition(s); and (3) lack of or limitations with data. See Chapter 3 for more specific examples. Communication strategy: Consider potential users of the product(s) and how information regarding the TA will be communicated. How results are communicated can affect how they are used, so it is important for TA teams to discuss communication options. statement. TA teams will need to think about whether the initial policy options are appropriate to the size and scope of the TA, as well as whether they are in line with the policy goal and the overall TA purpose and objectives. In keeping with the iterative nature of TA design and execution, any initial policy option list will be revisited, modified, or refined, as needed, as the work progresses and more information is gained. TA teams may also need to plan to include policy analysis and exploration of the ramifications of each policy option during subsequent design and implementation phases. During this phase, TA teams continue to build on the situational analysis work and gather more background information. In addition, TA teams: Confirm and validate the scope from phase 1 Reach agreement with stakeholders on the initial design May perform an “environmental scan” to further highlight limitations, assumptions, divergent points of view, potential bias, and other factors that may help the team select a design Other specific activities that take place during this phase include: Identify and select appropriate design, methodologies, and analytical approaches (refer to the next section of this chapter for example TA design approaches and App. III for examples of TA methods) Examples of data collection and analytical techniques used in GAO TAs to date include: interviews, literature review, expert forums, site visits, technology readiness assessments, surveys, conceptual models, small group discussion, content analysis such as Delphi, among others. OTA reported using similar methodologies for its TAs (OTA, Policy Analysis at OTA: A Staff Assessment, 1983). Identify and select appropriate data sources, or the need to gather data Identify, select, and possibly develop appropriate dimensions of analysis, if applicable Develop possible policy goal(s) Clarify the possible initial policy options that will be considered and describe how they may be analyzed, if applicable Identify and consult with external experts to inform design and implementation, and assist with external review, as appropriate If policy options are being considered, it is important to determine the relevant dimensions along which to analyze the options. The dimensions will be highly context- specific, vary from TA to TA, and depend on the scope and policy goal statement of the TA. During this phase, the design and project plan are being implemented, potentially while aspects of phase 2 are still underway. It is important to consider changes in the operating context—such as changes in the operating environment, understanding of the issues, and access to information—and review and make changes to the design and project plan accordingly. We reviewed select GAO products that used policy analysis to present policy options. We found that these products used a variety of data collection and analytical approaches, such as: interviews, literature review, survey, expert forum, site visits, case studies, analysis of secondary data, content analysis, among others. If an initial policy options list was developed earlier in design, it may be necessary to revisit the list as work progresses. During this phase, TA teams may gather additional information regarding the policy options, further analyze policy options, and present the results of the analysis. Policy options are to be presented in a balanced way, including presentation of opportunities and considerations, and not resulting in a single overall ranking of policy options. We found that GAO TAs used a variety of design approaches and methodologies to answer various categories of design objectives (researchable questions). GAO TAs generally include one or more of the following categories of design objectives, which are not mutually exclusive: (1) describe status of and challenges to development of a technology; (2) assess opportunities and challenges arising from the use of a technology; and (3) identify and assess cost-effectiveness, other policy considerations, or options related to the use of a technology. Provided below are example questions, design approaches, and GAO TAs, for each of these categories of objectives. GAO TA examples were used given our familiarity with GAO products, though numerous non-GAO TA design examples exist. This is not intended to be a comprehensive list of design examples. For more examples of methodologies, please refer to App. III. Describing the status and challenges to the development of a technology. Table 2 provides example questions, design approaches, and GAO TAs, for design objectives related to describing the status and challenges to the development of a technology. Questions may address, for example, what the current state of the technology is, and may involve identifying and describing the status of the technology, which GAO TAs have done using a variety of methods. Assessing opportunities and challenges that may result from the use of a technology. Table 3 provides example questions, design approaches, and GAO TAs, for design objectives related to assessing opportunities and challenges that may result from the use of a technology. Questions may address, for example, what are the expected or realized benefits of the technology, and may involve gathering and assessing evidence on the results from using the technology, which GAO TAs have done using a variety of methods. Assessing cost-effectiveness, policy considerations, or policy options related to the use of a technology. Table 4 provides example questions, design approaches, and GAO TAs, for design objectives related to assessing cost-effectiveness, policy considerations, or policy options related to the use of a technology. Questions may address, for example, what are the economic trade-offs of a technology, and may involve gathering and analyzing evidence related to cost, which GAO TAs have done using a variety of methods. This chapter describes select challenges regarding technology assessment (TA) design and implementation, as well as possible strategies to mitigate those challenges. The information in this chapter is based on review of results of a literature search, an expert forum, select GAO reports, and experiences of GAO teams and technical specialists. The tables provided below are not intended to be a comprehensive list of challenges or strategies. For more information, please refer to Appendix I: Objectives, Scope, and Methodology. To be useful, TA assessment products must be readable and timely, among other things, which may present a challenge for numerous reasons. Table 5 provides examples of potential mitigation strategies to address these challenges. Another challenge in TA design arises from determining policy goals and policy options, and estimating their potential impacts. Many of the effects of policy decisions may be distant, and policy outcomes may be uncertain at the time of the TA. Table 6 provides examples of potential mitigation strategies to address these challenges. TAs are complex and interdisciplinary, and emerging technologies are inherently difficult to assess. Table 7 provides examples of potential mitigation strategies to address these challenges. An additional challenge in conducting TAs is engaging all relevant internal and external stakeholders, ensuring none are overlooked. Table 8 provides examples of potential mitigation strategies to address this challenge. This handbook identifies key steps and considerations in designing technology assessments (TAs). Below is a summary of methodologies used for all chapters of the handbook. We reviewed GAO documents, including: Designing Evaluations (GAO-12-208G) select GAO products utilizing policy analysis approaches to identify and assess policy options We reviewed and analyzed 14 GAO TAs, including their designs and considerations, using a data collection instrument that contained fields regarding each report’s purpose, methodologies, and key considerations for each methodology used (such as strengths and weaknesses). The data collection instrument also contained fields regarding whether policy considerations were presented or if specific policy options were identified and assessed in each TA report, what methodologies were used to identify and assess policy options, and key considerations associated with the methodologies used. We also reviewed GAO reports from non-TA product lines that utilized policy analysis approaches to assess policy options. An initial pool of 56 GAO reports was generated based on a keyword search of GAO’s reports database. Of the 56 GAO reports, 12 were selected for review based on the following criteria: (1) the reports were publicly released after January 1, 2013 and (2) the reports included identification and assessment of policy options (not solely a presentation of agency actions related to policy options or general policy considerations). Testimonies and correspondence were excluded. We analyzed each of these selected GAO reports according to a data collection instrument that contained the following fields regarding policy options in the report: purpose, methodologies, and key considerations for each methodology used (such as strengths and weaknesses). A list of GAO documents reviewed is provided below. Retirement Security: Some Parental and Spousal Caregivers Face Financial Risks. GAO-19-382. Washington, D.C.: May 1, 2019. GAO Science Technology Assessment, and Analytics Team: Initial Plan and Considerations Moving Forward. Washington, D.C.: April 10, 2019. Retirement Savings: Additional Data and Analysis Could Provide Insight into Early Withdrawals. GAO-19-179. Washington, D.C.: March 28, 2019. Critical Infrastructure Protection: Protecting the Electric Grid from Geomagnetic Disturbances. GAO-19-98. Washington, D.C.: December 19, 2018. Postal Retiree Health Benefits: Unsustainable Finances Need to Be Addressed. GAO-18-602. Washington, D.C.: August 31, 2018. Data Collection Seminar Participant Manual. Washington, D.C.: March 2018. Artificial Intelligence: Emerging Opportunities, Challenges and Implications. GAO-18-142SP. Washington, D.C.: March 28, 2018. Chemical Innovation: Technologies to Make Processes and Products More Sustainable. GAO-18-307. Washington, D.C.: February 8, 2018. Federal Regulations: Key Considerations for Agency Design and Enforcement Decisions. GAO-18-22. Washington, D.C.: October 19, 2017. Medical Devices: Capabilities and Challenges of Technologies to Enable Rapid Diagnoses of Infectious Diseases. GAO-17-347. Washington, D.C.: August 14, 2017. U.S. Postal Service: Key Considerations for Potential Changes to USPS’s Monopolies. GAO-17-543. Washington, D.C.: June 22, 2017. Internet of Things: Status and Implications of an Increasingly Connected World. GAO-17-75. Washington, D.C.: May 15, 2017. Flood Insurance: Comprehensive Reform Could Improve Solvency and Enhance Resilience. GAO-17-425. Washington, D.C.: April 27, 2017. Flood Insurance: Review of FEMA Study and Report on Community- Based Options. GAO-16-766. Washington, D.C.: August 24, 2016. Medicaid: Key Policy and Data Considerations for Designing a Per Capita Cap on Federal Funding. GAO-16-726. Washington, D.C.: August 10, 2016. Municipal Freshwater Scarcity: Using Technology to Improve Distribution System Efficiency and Tap Nontraditional Water Sources. GAO-16-474. Washington, D.C.: April 29, 2016. GAO Memorandum: Quality Assurance Framework Requirements for Technology Assessments. Washington, D.C.: April 6, 2016. Biosurveillance: Ongoing Challenges and Future Considerations for DHS Biosurveillance Efforts. GAO-16-413T. Washington, D.C.: February 11, 2016. Social Security’s Future: Answers to Key Questions. GAO-16-75SP. Washington, D.C.: October 2015. Water in the Energy Sector: Reducing Freshwater Use in Hydraulic Fracturing and Thermoelectric Power Plant Cooling. GAO-15-545. Washington, D.C.: August 7, 2015. Nuclear Reactors: Status and Challenges in Development and Deployment of New Commercial Concepts. GAO-15-652. Washington, D.C.: July 28, 2015. Veterans’ Disability Benefits: Improvements Needed to Better Ensure VA Unemployability Decisions Are Well Supported. GAO-15-735T. Washington, D.C.: July 15, 2015. Debt Limit: Market Response to Recent Impasses Underscores Need to Consider Alternative Approaches. GAO-15-476. Washington, D.C.: July 9, 2015. Temporary Assistance for Needy Families: Potential Options to Improve Performance and Oversight. GAO-13-431. Washington, D.C.: May 15, 2013. Private Pensions: Timely Action Needed to Address Impending Multiemployer Plan Insolvencies. GAO-13-240. Washington, D.C.: March 28, 2013. Designing Evaluations: 2012 Revision. GAO-12-208G. Washington, D.C.: January 2012. Neutron Detectors: Alternatives to Using Helium-3. GAO-11-753. Washington, D.C.: September 3, 2011. Climate Engineering: Technical Status, Future Directions, and Potential Responses. GAO-11-71. Washington, D.C.: July 28, 2011. Technology Assessment: Explosives Detection Technologies to Protect Passenger Rail. GAO-10-898. Washington, D.C.: July 28, 2010. Technology Assessment: Protecting Structures and Improving Communications during Wildland Fires. GAO-05-380. Washington, D.C.: April 26, 2005. Technology Assessment: Cybersecurity for Critical Infrastructure Protection. GAO-04-321. Washington, D.C.: May 28, 2004. Technology Assessment: Using Biometrics for Border Security. GAO-03-174. Washington, D.C: November 15, 2002. We spoke with and gathered input from GAO teams that are in the process of or have successfully assessed and incorporated policy options into GAO products. In addition, to augment our understanding of TA design and implementation challenges, we collected input from GAO staff who had provided key contributions to GAO TAs. Specifically, we asked for their thoughts regarding: (1) the strengths and limitations of TA methodologies and (2) challenges they faced, and strategies to address those challenges. A GAO librarian performed a search for relevant Office of Technology Assessment (OTA) reports, using keyword searches. From this initial list of OTA reports, we selected 17 reports to review that were frameworks, guides, models, or other compilations. We also reviewed the methodologies of the OTA reports selected for review. A list of OTA reports reviewed is included below. Office of Technology Assessment. Insider’s Guide to OTA. Washington, D.C.: January 1995. Office of Technology Assessment. Policy Analysis at OTA: A Staff Assessment. Washington, D.C.: May 1993. Office of Technology Assessment. Research Assistants Handbook. Washington, D.C.: June 1992. Office of Technology Assessment. Strengths and Weaknesses of OTA Policy Analysis. Washington, D.C.: 1992. Office of Technology Assessment. The OTA Orange Book: Policies and Procedures of the Office of Technology Assessment: Communication with Congress and the Public. Washington, D.C.: February 1986. Office of Technology Assessment. What OTA Is, What OTA Does, How OTA Works. Washington, D.C.: March 1983. Office of Technology Assessment. Draft: An OTA Handbook. Washington, D.C.: June 7, 1982. Office of Technology Assessment. Draft: A Management Overview Methodology for Technology Assessment. Washington, D.C.: February 2, 1981.* Office of Technology Assessment. Draft: Technology Assessment in Industry: A Counterproductive Myth. Washington, D.C.: January 30, 1981.* Office of Technology Assessment. Draft: Technology Assessment Methodology and Management Practices. Washington, D.C.: January 12, 1981.* Office of Technology Assessment. Draft: Technology Assessment in the Private Sector. Washington, D.C.: January 9, 1981.* Office of Technology Assessment. Draft: A Process for Technology Assessment Based on Decision Analysis. Washington, D.C.: January 1981.* Office of Technology Assessment. Draft: Technology as Social Organization. Washington, D.C.: January 1981.* Office of Technology Assessment. A Summary of the Doctoral Dissertation: A Decision Theoretic Model of Congressional Technology Assessment. Washington, D.C.: January 1981.* Office of Technology Assessment. Report on Task Force Findings and Recommendations: Prepared by the OTA Task Force on TA Methodology and Management. Washington, D.C.: August 13, 1980. Office of Technology Assessment. Phase I Survey Results: Draft Papers Prepared for the Task Force on TA Methodology and Management. Washington, D.C.: April 10, 1980. We identified a pool of 29 Congressional Research Service (CRS) reports to consider reviewing that were technology assessments or included an analysis of policy options, based on a keyword search of CRS’s website. We also interviewed CRS officials. Of the initial 29 CRS reports we identified, we selected six CRS reports to review, based on the following criteria: (1) published within the past 15 years (2004-2019) and (2) if a review of technology (technology assessment) and/or policy options was included. Reports were excluded based on the following criteria: (1) for technology assessment related reports—if they represented a summary of a technology assessment that was included in our review or (2) for policy options related reports—the report did not indicate how CRS arrived at the policy options (no methodology to review or analyze). A list of CRS reports reviewed is included below. Congressional Research Service. Advanced Nuclear Reactors: Technology Overview and Current Issues. Washington, D.C.: April 18, 2019. Congressional Research Service. Drug Shortages: Causes, FDA Authority, and Policy Options. Washington, D.C.: December 27, 2018. Congressional Research Service. Policy Options for Multiemployer Defined Benefit Pension Plans. Washington, D.C.: September 12, 2018. Congressional Research Service. Shale Energy Technology Assessment: Current and Emerging Water Practices. Washington, D.C.: July 14, 2014. Congressional Research Service. Carbon Capture: A Technology Assessment. Washington, D.C.: November 5, 2013. Congressional Research Service. Energy Storage for Power Grids and Electric Transportation: A Technology Assessment. Washington, D.C.: March 27, 2012. A GAO librarian performed a literature search based on keyword searches for two areas—TA and policy options. For TA literature, the team selected 29 documents to review that were frameworks, guides, models, or other compilations, based on a review of the literature titles and abstracts. In general, we excluded specialized types of TAs, such as health-related TAs, as we focused on TA design more broadly. For policy options literature, the team selected 14 documents to review that were frameworks, guides, models, or other compilations and focused on policy options related to science and technology. We also asked experts we consulted to suggest literature for our review; these suggestions confirmed the literature list noted below. A list of literature reviewed is included below. Grunwald, Armin. Technology Assessment in Practice and Theory. London and New York: Routledge, 2019. Armstrong, Joe E., and Willis W. Harman. Strategies For Conducting Technology Assessments. London and New York: Routledge, 2019. Noh, Heeyong, Ju-Hwan Seo, Hyoung Sun Yoo, and Sungjoo Lee. “How to Improve a Technology Evaluation Model: A Data-driven Approach.” Technovation, vol. 72/73 (2018): p. 1-12. Larsson, A., T. Fasth, M. Wärnhjelm, L. Ekenberg, and M. Danielson. “Policy Analysis on the Fly With an Online Multicriteria Cardinal Ranking Tool.” Journal of Multi-Criteria Decision Analysis, vol. 25 (2018): p. 55-66. Nooren, P., N. van Gorp, N. van Eijk, and R. O. Fathaigh. “Should We Regulate Digital Platforms? A New Framework for Evaluating Policy Options.” Policy and Internet, vol. 10, no. 3 (2018): p. 264-301. Smith, A., K. Collins, and D. Mavris. “Survey of Technology Forecasting Techniques for Complex Systems.” Paper presented at 58th AIAA/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conference, Grapevine, TX (2017). Ibrahim, O., and A. Larsson. “A Systems Tool for Structuring Public Policy Problems and Design of Policy Options.” Int. J. Electronic Governance, vol. 9 , nos. 1/2 (2017): p. 4-26. Christopher, A. Simon. Public Policy Preferences and Outcomes. 3rd ed. New York: Routledge, 2017. Weimer, David L., and R. Aidan Vining. Policy Analysis Concepts and Practice. 6th ed. London and New York: Routledge, 2017. Mulder, K. “Technology Assessment.” In Foresight in Organizations: Methods and Tools, edited by Van Der Duin, Patrick, 109-124, 2016. Coates, Joseph F. “A 21st Century Agenda for Technology Assessment.” Technological Forecasting and Social Change, vol. 113 part A (2016): p. 107-109. Coates, Joseph F. “Next Stages in Technology Assessment: Topics and Tools.” Technological Forecasting and Social Change, vol. 113 (2016): p. 112-114. Mazurkiewicz, A., B. Belina, B. Poteralska, T. Giesko, and W. Karsznia. “Universal Methodology for the Innovative Technologies Assessment.” Proceedings of the European Conference on Innovation and Entrepreneurship (2015): p. 458-467. Sadowski, J. “Office of Technology Assessment: History, Implementation, and Participatory Critique.” Technology in Society, vol. 42 (2015): p. 9-20. Larsson, A., O. Ibrahim. “Modeling for Policy Formulation: Causal Mapping, Scenario Generation, and Decision Evaluation.” In Electronic Participation: 7th IFIP 8.5 International Conference, 135-146, Springer, 2015. Moseley, C., H. Kleinert, K. Sheppard-Jones, and S. Hall. “Using Research Evidence to Inform Public Policy Decisions.” Intellectual and Developmental Disabilities, vol. 51 (2013): p. 412-422. Calof, J., R. Miller, and M. Jackson. “Towards Impactful Foresight: Viewpoints from Foresight Consultants and Academics.” Foresight, vol. 14 (2012): p. 82-97. Parliaments and Civil Society in Technology Assessment, Collaborative Project on Mobilization and Mutual Learning Actions in European Parliamentary Technology Assessment. The Netherlands: Rathenau Instituut, 2012. Blair, P. D. “Scientific Advice for Policy in the United States: Lessons from the National Academies and the Former Congressional Office of Technology Assessment.” In The Politics of Scientific Advice: Institutional Design for Quality Assurance, ed. Lentsch, Justus, 297-333, 2011. Paracchini, M.L., C. Pacini, M.L.M. Jones, and M. Pérez-Soba. “An Aggregation Framework to Link Indicators Associated With Multifunctional Land Use to the Stakeholder Evaluation of Policy Options.” Ecological Indicators, vol. 11 (2011): p 71-80. Roper, A. T., S. W. Cunningham, A. L. Porter, T. W. Mason, F. A. Rossini, and J. Banks. Forecasting and Management of Technology, 2nd ed. New Jersey: Wiley, 2011. Lepori, B., E. Reale, and R. Tijssen. “Designing Indicators for Policy Decisions: Challenges, Tensions and Good Practices: Introduction to a Special Issue.” Research Evaluation, vol. 20, no. 1 (2011): p. 3-5. Russel, A. W., F. M. Vanclay, and H. J. Aslin H.J. “Technology Assessment in Social Context: The Case for a New Framework for Assessing and Shaping Technological Developments.” Impact Assessment and Project Appraisal, vol. 28, no. 2 (2010): p. 109-116. Shiroyama, H., G. Yoshizawa, G., M. Matsuo, and T. Suzuki. “Institutional Options and Operational Issues in Technology Assessment: Lessons from Experiences in the United States and Europe.” Paper presented at Atlanta Conference on Science and Innovation Policy, Atlanta, 2009. Tran, T.A., and T. Daim T. “A Taxonomic Review of Methods and Tools Applied in Technology Assessment.” Technological Forecasting and Social Change, vol. 75 (2008): p. 1396-1405. Brun, G., and G. Hirsch Hadorn. “Ranking Policy Options for Sustainable Development.” Poiesis Prax, vol. 5 (2008): p. 15-31. Tran, T.A. “Review of Methods and Tools applied in Technology Assessment Literature.” Paper presented at Portland International Conference on Management of Engineering and Technology, Portland Oregon, 2007. Burgess, J., A. Stirling, J. Clark, G. Davies, M. Eames, K. Staley, and S. Williamson. “Deliberative Mapping: A Novel Analytic-Deliberative Methodology to Support Contested Science-Policy Decisions.” Public Understanding of Science, vol. 16 (2007): p. 299-322. Decker, M., and M. Ladikas. Bridges Between Science, Society and Policy: Technology Assessment — Methods and Impacts. Berlin: Springer-Verlag, 2004. Guston, D. H., and D. Sarewitz. “Real-time Technology Assessment.” Technology in Society, vol. 24 (2002): p. 93-109. Rip, A. “Technology Assessment.” In International Encyclopedia of the Social & Behavioral Science, vol. 23, edited by Smelster, N. J. and B. P. Baltes, 15512-15515. Amsterdam: Elsevier, 2001. Van Den Ende, J., K. Mulder, M. Knot, E. Moors, and P. Vergragt. “Traditional and Modern Technology Assessment: Toward a Toolkit.” Technological Forecasting and Social Change, vol. 58 (1998): p. 5-21. Wood, F. B. “Lessons in Technology Assessment: Methodology and Management at OTA.” Technological Forecasting and Social Change, vol. 54 (1997): p. 145-162. Janes, M. C. “A Review of the Development of Technology Assessment.” International Journal of Technology Management, vol. 11, no. 5-6 (1996): p. 507-522. Hastbacka, M. A., and C. G. Greenwald. “Technology Assessment - Are You Doing it Right?” Arthur D. Little – PRISM, no. 4 (1994). Rivera, W. M., D. J. Gustafson, and S. L. Corning. “Policy Options in Developing Agricultural Extension Systems: A Framework for Analysis.” International Journal of Lifelong Education, vol. 10, no. 1 (1991): p. 61-74. Lee, A. M., and P. L. Bereano. “Developing Technology Assessment Methodology: Some Insights and Experiences.” Technological Forecasting and Social Change, vol. 19 (1981): p. 15-31. Porter, A. L., F. A. Rossini, S. R. Carpenter, and A. T. Roper. A Guidebook for Technology Assessment and Impact Analysis, vol. 4. New York and Oxford: North Holland, 1980. Pulver, G.C. “A Theoretical Framework for the Analysis of Community Economic Development Policy Options.” In Nonmetropolitan Industrial Growth and Community Change, edited by Summers, G. and A. Selvik, 105-117. Massachusetts and Toronto: Lexington Books, 1979. Ascher, W. “Problems of Forecasting and Technology Assessment.” Technological Forecasting and Social Change, vol. 13, no. 2 (1979): p. 149-156. Majone, G. “Technology Assessment and Policy Analysis.” Policy Sciences, vol. 8, no. 2 (1977): p. 173-175. Berg, M., K. Chen, and G. Zissis. “A Value-Oriented Policy Generation Methodology for Technology Assessment.” Technological Forecasting and Social Change, vol. 4, no. 4 (1976): p. 401-420. Lasswell, Harold D. A Pre-View of Policy Sciences. Policy Sciences Book Series. New York: Elsevier, 1971. We held a forum to gather experts’ opinions regarding TA design. An initial list of experts was prepared based on a review of GAO TA reports, literature, and referral by other experts. Experts were selected based on their knowledge and expertise in the subject, including: (1) prior participation on a National Academy of Sciences panel or other similar meeting; (2) leadership position in one or more organizations or sectors relevant to technology research and development implementation or policy; and (3) relevant publications or sponsorship of reports. Care was also taken to ensure a balance of sectors, backgrounds, and specific areas of expertise (e.g., science, technology, policy, information technology, and law). We also asked the experts to suggest literature for our review; these suggestions confirmed the literature list noted above. A list of external experts consulted is included below. Dr. Jeffrey M. Alexander, Senior Manager, Innovation Policy, RTI International Dr. Robert D. Atkinson, President, Information Technology and Innovation Foundation Mr. David Bancroft, Executive Director, International Association for Impact Assessment Mr. Duane Blackburn, S&T Policy Analyst, Office of the CTO, MITRE Dr. Peter D. Blair, Executive Director, Division of Engineering and Physical Sciences, National Academies of Sciences, Engineering, and Medicine Ms. Marjory Blumenthal, Acting Associate Director, Acquisition and Technology Policy Center; Senior Policy Researcher, RAND Corporation Mr. Chris J. Brantley, Managing Director, Institute of Electrical and Electronics Engineers, Inc., USA Dr. Jonathan P. Caulkins, H. Guyford Stever University Professor of Operations Research and Public Policy, Carnegie Mellon University Mr. Dan Chenok, Executive Director, Center for The Business of Government, IBM Dr. Gerald Epstein, Distinguished Research Fellow, Center for the Study of Weapons of Mass Destruction, National Defense University Dr. Robert M. Friedman, Vice President for Policy and University Relations, J. Craig Venter Institute Mr. Zach Graves, Head of Policy, Lincoln Network Ms. Allison C. Lerner, Inspector General, National Science Foundation Mr. Mike Molnar, Director of Office of Advanced Manufacturing, National Institute of Standards and Technology Dr. Michael H. Moloney, CEO, American Institute of Physics Dr. Ali Nouri, President, Federation of American Scientists Dr. Jon M. Peha, Professor, Engineering and Public Policy; Courtesy Professor, Electrical and Computer Engineering, Carnegie Mellon University Dr. Stephanie S. Shipp, Deputy Director and Professor, University of Virginia, Biocomplexity Institute and Initiative, Social and Decision Analytics Division Dr. Daniel Sarewitz, Co-Director, Consortium for Science, Policy & Outcomes Professor of Science and Society, School for the Future of Innovation in Society, Arizona State University Ms. Rosemarie Truman, Founder and CEO, Center for Advancing Innovation Dr. Chris Tyler, Director of Research and Policy, Department of Science, Technology, Engineering and Public Policy (STEaPP), University College London (UCL) As part of GAO’s Quality Assurance Framework, GAO’s general design and project plan templates contain five phases that are followed in sequential order, with modifications or changes as needed. GAO technology assessments (TAs) use these templates, as applicable. Throughout the phases, the status of the work, including decisions, is communicated to stakeholders and congressional committees that requested the work. Provided below is a summary of the activities GAO staff undertake during each of the phases, and is based on a review of GAO documentation related to engagement phases. Phase I: Acceptance Engagement characteristics such as risk level or internal stakeholders are determined at a high-level Engagement Acceptance Meeting. Engagement teams obtain a copy of and review the congressional request letter(s), as applicable. Phase II: Planning and Proposed Design Staff are assigned to the engagement and set up the electronic engagement documentation set folders. Staff enter standard information regarding the engagement in GAO’s Engagement Management System (EMS), which is used to monitor the status of the engagement throughout the engagement process and regularly updated. Engagement teams hold an initiation meeting with engagement stakeholders to discuss potential research questions, design options, and stakeholder involvement. Engagement teams clarify engagement objectives and approach through discussions with the congressional requesters, as applicable. Engagement teams obtain background information. For example, to gather information about the topic and any work already performed, teams may conduct a literature review, search prior and ongoing GAO work related to the topic, or consult with external stakeholders, outside experts, and agency officials, including the Congressional Research Service, Congressional Budget Office, and Inspectors General of federal agencies. Engagement teams formally notify agencies of the engagement through a notification letter, and hold an entrance conference, as applicable. Engagement teams prepare a design matrix, project plan, risk assessment tool, data reliability assessment, and all participants on engagements, including stakeholders, affirm their independence. The design matrix is a tool that describes: researchable questions; criteria; information required and sources; scope and methodology; and limitations. The project plan identifies key activities and tasks, dates for completing them, and staff assigned. Engagement teams secure approval to move forward with engagement approach at a high-level Engagement Review Meeting. Phase III: Evidence Gathering, Finalizing Design, and Analysis Engagement teams finalize design: teams work with internal stakeholders to confirm soundness and reach agreement on proposed initial design. If engagement teams and stakeholders conclude that additional work is needed or the design faces significant implementation challenges, design is reviewed and modified, as needed. Engagement teams collect and analyze evidence: teams may collect and analyze evidence using a variety of methodologies including document review, interviews, surveys, focus groups, and various forms of data analysis. For example, engagement teams may meet with agency officials and outside experts, as applicable, to gather evidence. Engagement teams assess evidence and agree on conclusions: teams assess whether the evidence collected is sufficient and appropriate to support findings and conclusions reached for each objective. Once sufficient evidence is collected and analyzed, the team discusses how the evidence supports potential findings and shares these findings with stakeholders, generally in the form of a formal message agreement meeting. Engagement teams update congressional requesters, as applicable, on the engagement status and potential findings. Phase IV: Product Development Engagement teams draft product: after drafting the product, teams send draft to internal stakeholders for review. Teams also send draft to relevant external parties, including relevant agencies, to confirm facts and obtain their views. Teams identify sources of all information in the draft and an independent analyst (not on the team) verifies the sources through a process called indexing and referencing. Engagement teams perform exit conferences with agencies, as applicable, to discuss findings and potential recommendations. Agencies and external parties are given the opportunity to comment on the draft, as applicable. Engagement teams communicate findings and potential recommendations, as well as timeframes for issuing the product, to congressional requesters, as applicable. The draft product is copy-edited, prepared for issuance, and publicly released on GAO’s website, as applicable. Phase V: Results Engagement documentation is closed out. Engagement teams conduct follow-up, track the results, and prepare reports on the status of recommendations and financial and non-financial benefits, as applicable, using GAO’s results tracking system. This appendix provides examples of methods and analytical approaches that GAO technology assessment (TA) teams can use to examine different types of evidence. Also included in this appendix are considerations of the strengths, limitations, and synergies among evidence types and methods, which can be useful to consider throughout design to ensure that evidence is sufficient and appropriate to answer the researchable questions. Examples from GAO TAs were used given our familiarity with GAO products, though numerous other (non-GAO) examples of TA methods exist. This appendix included a review of GAO reports and select literature, and is not intended to be comprehensive. This is a simplified presentation of methods, and there is variation in the levels of structure of the example methods. This appendix is divided into several sections, including by evidentiary types: Testimonial, Documentary, and Physical. For each of these types of evidence, example methods are presented with low and high levels of structure, and include examples of considerations (such as general benefits and limitations) that analysts may consider. In general, more highly structured approaches generate increased consistency and comparability of results that allows for stronger quantification. Less structured approaches tend to provide more flexibility and context, and richer illustrative evidence. Testimonial evidence is elicited from respondents to understand their experience, opinions, knowledge, and behavior, and it can be obtained through a variety of methods, including inquiries, interviews, focus groups, expert forums, or questionnaires. Testimonial evidence can be gathered from individuals who may be responding personally based on their own experience in an official capacity to represent agencies or other entities, or groups, who may share individual level responses, or may present a single group response. Group testimony enables interactions that can be used to explore similarities and differences among participants, to identify tensions or consensus in a group, or to explore ideas for subsequent research and collaboration. It is important to evaluate the objectivity, credibility, and reliability of testimonial evidence. Analysts may use a combination of approaches to gather testimonial evidence, depending on the relevant population(s) of respondents, intended analytical approach(es), likely respondent burden, and resource considerations. Table 9 provides more examples. Documentary evidence is existing information, such as letters, contracts, accounting records, invoices, spreadsheets, database extracts, electronically stored information, and management information on performance. It is important to evaluate the objectivity, credibility, and reliability of documentary evidence. Analysts may use a combination of approaches to gather documentary evidence, depending on the relevant sources and types of documents, intended analytical approach(es), and resource considerations. Table 10 provides more examples. Physical evidence is obtained by direct inspection or observation of people, property, or events. The appropriateness of physical evidence depends on when, where, and how the inspection or observation was made and whether it was recorded in a manner that fairly represents the facts observed. Common considerations for physical evidence include the reliability of site selection, intended analytical approaches, and resource considerations. Table 11 provides more examples. GAO may also rely on agency and other secondary data. Considerations for those secondary data are dependent on the type, source, and collection method, and could include all of the considerations above. Use of secondary data is usually more efficient than collecting new data on a topic, and administrative records (a form of documentary evidence) are generally not as prone to self-reporting biases that may be present in testimonial evidence. However, when secondary data are used, more work may be required to assess whether data are reliable and appropriate for a given purpose. For example, analysts will gather all appropriate documentation, including record layout, data element dictionaries, user’s guides, and data maintenance procedures. Depending on the database, procedures and analysis can be very complex—and it would be important to note assumptions, limitations, and caveats pertaining to the data, which may affect the conclusions that can be drawn based on the analyses. Examples of analytical approaches found in the literature to analyze data include: Interpretive structural modeling: shows a graphical relationship among all elements to aid in structuring a complex issue area, and may be helpful in delineating scope. Trend extrapolation: is a family of techniques to project time-series data using specific rules, and may be helpful in forecasting technology. Scenarios: is a composite description of possible future states incorporating a number of characteristics, and may be helpful in policy analysis. Scanning methods, such as checklists: is listing factors to consider in a particular area of inquiry, and may be helpful in identifying potential impacts. Tracing methods, such as relevance trees: includes identifying sequential chains of cause and effect or other relationships, and may be helpful in identifying potential impacts. Cross-effect matrices: are two-dimensional matrix representations to show the interaction between two sets of elements, and may be helpful in analyzing consequences of policy options. Simulation models: are a simplified representation of a real system that is used to explain dynamic relationships of the system, and may be helpful in identifying impacts and forecasting technology. Benefit-cost analysis: is a systematic quantitative method of assessing the desirability of government projects or policies when it is important to take a long view of future effects and a broad view of possible side effects. Decision analysis: is an aid to compare alternatives by weighing the probabilities of occurrences and the magnitudes of their impacts, and may be helpful in determining impacts and assessing policy options. Scaling: is an aid that may include developing a matrix that identifies potential impact related to an activity and stakeholder group, and qualitatively or quantitatively assesses the potential impact, and may be helpful analyzing potential impacts, including of policy options. In addition to the contacts named above, key contributors to this report were R. Scott Fletcher (Assistant Director), Diantha Garms (Analyst-in- charge), Nora Adkins, Colleen Candrl, Virginia Chanley, Robert Cramer, David Dornisch, John De Ferrari, Dennis Mayo, Anika McMillon, SaraAnn Moessbauer, Amanda Postiglione, Steven Putansu, Oliver Richard, Meg Tulloch, Ronald Schwenn, Ben Shouse, Amber Sinclair, Ardith Spence, Andrew Stavisky, David C. Trimble, and Edith Yuh. The Government Accountability Office, the audit, evaluation, and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO’s commitment to good government is reflected in its core values of accountability, integrity, and reliability. The fastest and easiest way to obtain copies of GAO documents at no cost is through our website. Each weekday afternoon, GAO posts on its website newly released reports, testimony, and correspondence. You can also subscribe to GAO’s email updates to receive notification of newly posted products. The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s website, https://www.gao.gov/ordering.htm. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. Connect with GAO on Facebook, Flickr, Twitter, and YouTube. Subscribe to our RSS Feeds or Email Updates. Listen to our Podcasts. Visit GAO on the web at https://www.gao.gov. James-Christian Blockwood, Managing Director, spel@gao.gov, (202) 512-4707 U.S. Government Accountability Office, 441 G Street NW, Room 7814, Washington, DC 20548 Please Print on Recycled Paper.", "summary": "In January 2019, at the direction of Congress, GAO formed the Science, Technology Assessment, and Analytics team to expand its work on cutting-edge science and technology issues, and to provide oversight, insight, and foresight for science and technology. TAs can be used to strengthen decision-making, enhance knowledge and awareness, and provide early insights into the potential impacts of technology. TA design can enhance TA quality, credibility, and usefulness; ensure its independence; and ensure effective use of resources. Under the Comptroller General authority, we developed this handbook using the format of the 2012 GAO methodology transfer paper, Designing Evaluations . Below is a summary of the approach we used to affirm and document TA design steps and considerations for this handbook. Reviewed select GAO documents, including Designing Evaluations (GAO-12-208G), published GAO TAs, select GAO products that presented policy options, and other GAO reports Reviewed select Office of Technology Assessment reports Reviewed select Congressional Research Service reports Reviewed select literature on TAs and related to development and analysis of policy options Held an expert forum to gather experts’ input on TA design Considered experiences of GAO teams that have successfully assessed and incorporated policy options into GAO products, as well as GAO teams that are currently incorporating policy options into their TA design Collected input from GAO staff who provided key contributions to GAO TAs, regarding challenges to TA design and implementation and possible solutions The Technology Assessment Design Handbook identifies tools and approaches GAO staff and others can consider in the design of robust and rigorous technology assessments (TAs). The handbook underscores the importance of TA design (Chapter 1), outlines the process of designing TAs (Chapter 2), and describes approaches for mitigating selected TA design and implementation challenges (Chapter 3). While the primary audience of this handbook is GAO staff, we expect that other organizations engaged or interested in TAs will find portions of this handbook useful. We anticipate modifying and refining this handbook, as needed, based on experience and public comments received. We will accept comments on this handbook at TAHandbook@gao.gov for approximately 1 year after publication. The handbook identifies three general design phases, as appropriate, as shown in the figure below. T terative nature of TA design, the requester’s interests, resources, independence, stakeholder engagement, potential challenges, and communication. In addition, ormulating initial policy options to consider; gathering evidence, determining relevant dimensions to analyze, and analyzing the policy options; and presenting the results of the policy analysis. Summary of Key Phases of Technology Assessment Design We found that GAO TAs have and can use a variety of design approaches and methods. The handbook provides TA design and methodology examples, including related to objectives commonly found in GAO TAs, such as: describe a technology, assess opportunities and challenges of a technology, and assess policy considerations. One example provided is: some GAO TAs include an objective related to describing the status and feasibility of a technology, which GAO teams have done by using methodologies such as expert panels, interviews, literature and document reviews, site visits, and determining the Technology Readiness Level. Also included in the handbook are examples of TA design and implementation challenges we found, along with possible mitigation strategies. We identified four general categories of challenges, including: (1) ensuring TA products are useful for Congress and others; (2) determining policy goals and measuring impact; (3) researching and communicating complicated issues; and (4) engaging all relevant stakeholders. An example of a potential mitigation strategy to the specific challenge of writing simply and clearly about technical subjects includes: allowing sufficient amount of time for writing, including reviewing and revising writing.", "document_type": "gao"}
{"report": "IDEA was enacted to ensure that all children with disabilities have access to a free appropriate public education (FAPE); to protect the rights of those children and their parents; and to assist states, localities, educational service agencies, and federal agencies in educating those children. Part C of IDEA provides grants to states for Early Intervention services for infants and toddlers (birth through 2 years) with developmental delays or diagnosed conditions that have a high likelihood of developmental delay. Part B of IDEA provides grants to states to assist them in providing special education and related services to eligible children with disabilities beginning at age 3 and possibly lasting to the student’s 22nd birthday, depending on state law or practice. In fiscal year 2019, the total appropriation for IDEA Parts B and C was approximately $13.2 billion ($12.8 billion for Part B and $470 million for Part C). These funds are awarded through formula grants to state agencies which, in turn, provide these funds to eligible entities (school districts under Part B and early intervention service providers under Part C) to carry out applicable IDEA requirements. (See table 1.) Each state has a designated lead agency—called a Part C Lead Agency—that is responsible for administering, supervising, and monitoring Part C. Part C requires each state to have a continuous process of public awareness activities and evaluations designed to identify and refer as early as possible all young children with disabilities and their families who are in need of Early Intervention services. By law, public awareness efforts should include disseminating information to parents and those likely to make referrals, especially hospitals and physicians. States have disseminated this information in different ways, including through television ads, pamphlets, and posters describing Part C and how parents can obtain services for their child. Under Part C of IDEA, states must also provide services to any child under 3 years of age who is developmentally delayed. These delays must be measured by appropriate diagnostic instruments and procedures in one or more areas of cognitive development, physical development, communication development, social or emotional development, and adaptive development, or the child must have a diagnosed physical or mental condition that has a high probability of resulting in developmental delay. Once a child who is suspected of having a disability is referred, states must evaluate the child in accordance with applicable IDEA requirements. Figure 1 illustrates the typical process in Early Intervention programs. Infants and toddlers who are still receiving services by about age 2 and a half are evaluated again to determine if they are eligible for services under Part B. Under Part B, states and school districts must make FAPE available to all eligible children with disabilities in mandatory age ranges. FAPE includes special education (specially designed instruction) and related services (support services)—such as speech therapy, psychological services, and physical therapy—tailored to their needs based on an individualized education program (IEP). Figure 2 illustrates the typical process for identifying students for special education under Part B. Figure 3 shows the percentage of children served under IDEA by age and state as of fall 2016. Nationally, for each age group, the percentage of children receiving special education services remained relatively stable from 2012 through 2016, changing by less than 1 percentage point. IDEA requires states to have policies and procedures to ensure that school districts identify, locate, and evaluate all children suspected of having a disability who need special education and related services, regardless of the severity of their disability, but also gives states some latitude in establishing eligibility criteria and defining disability categories. In addition, states have some flexibility to determine their own processes for identifying and evaluating children, provided the state’s procedures are consistent with IDEA requirements. As a result, a child eligible for IDEA services in one state might be ineligible in another. Eligibility criteria. IDEA allows states some flexibility to establish their own definitions of developmental delay (when a child does not reach developmental milestones for certain skills, such as motor or language skills, at the expected times), including the level or severity of the delay. For example, in Maryland, a child must have at least a 25 percent delay in one or more developmental areas to be eligible for Early Intervention services, while in Arizona, a child must demonstrate a 50 percent delay in one or more developmental areas to be eligible. In Massachusetts, Part C lead agency officials we interviewed said that the state had, as IDEA allows, tightened eligibility criteria in 2009 to reduce the number of children eligible for Early Intervention services by narrowing the definition of developmental delay. Officials said that there were no current plans to change the eligibility criteria, but that they would consider tightening eligibility criteria again if the number of eligible children outpaces state fiscal resources for these services. Part C of IDEA also allows but does not require states to provide Part C services to at-risk infants and toddlers. States that choose to provide services to at-risk children may use IDEA risk factors to determine eligibility, such as low birth weight or history of abuse and neglect, or they may develop their own list of risk factors. For example, Massachusetts developed its own at-risk criterion for eligibility, which requires the presence of four or more defined child and family factors, including biological, medical, and trauma-related factors. As of 2018, seven states or territories were serving at-risk infants and toddlers, according to an Education official. Early Intervention process. The processes states use to deliver Part C Early Intervention programs can vary in a number of ways. First, the types of agencies designated as the Part C Lead Agency vary from state to state; these lead agencies are responsible for administering and monitoring Early Intervention programs in their states. For example, Iowa’s State Educational Agency (SEA) administers both its Parts C and B programs; Massachusetts and New York administer their Parts C and B programs through separate agencies; and, Colorado shares these responsibilities between two agencies. Second, the extent to which lead agencies directly provide Early Intervention programs, including locating and evaluating children, or do so through contractors varies. For example, both Colorado and Iowa administer their Early Intervention programs directly, while Massachusetts and New York contract with private entities to do so. In Massachusetts, early childhood officials said that they contract with 31 different vendors that operate 60 Early Intervention programs throughout the state. In addition to providing Early Intervention services, these programs are responsible for locating and evaluating children, according to the early intervention officials. Those officials also said that each of these individual programs have unique relationships with referral sources, which can affect the likelihood that the sources will make referrals to a given program. Regardless of the type of entity responsible for Early Intervention programs, having strong relationships with referral sources is important, according to early childhood officials in all four of the states we visited. Otherwise, according to these officials, some children who are likely to be eligible for Early Intervention services may not be identified or evaluated for needed services. In Colorado, where Early Intervention responsibilities are shared between the Part C lead agency and the SEA, state officials said that this arrangement can make it difficult to ensure a seamless process and can cause delays between evaluation and services. They said that this can result in incorrect identification or services because they do not have control over the evaluations—responsibility for evaluations is assigned to the Part B agency. Part C officials also said this can cause confusion for families as they are moved between agencies. Relatedly, some infants and toddlers may not be identified for Early Intervention services because of the challenges of sharing data between state agencies when more than one agency is responsible for providing special education to children. In three of the four selected states we visited, responsibility for special education services for children was shared by more than one agency and officials in all three states told us that difficulties in sharing Early Intervention program data could hamper efforts to identify potentially eligible children for special education services. Officials in one of the states said that sharing data could allow them to identify children being provided school-aged special education services that had not received Early Intervention services. The officials said that if commonalities were found among these children, it could help them find similar children and ensure they receive Early Intervention services in the future. Eligibility criteria. In practice, IDEA Part B’s disability definitions provide minimum standards that all states must meet. According to Education officials, IDEA allows states the flexibility to adopt more expansive definitions of disabilities than those provided in the IDEA statute and regulation, provided that the state definition would not exclude children who would be covered by the IDEA definition. For example, in New York an intellectual disability is defined as “significantly subaverage general intellectual functioning … that adversely affects a student’s educational performance,” while in Massachusetts an intellectual impairment is defined as occurring when “the permanent capacity for performing cognitive tasks, functions, or problem solving is significantly limited or impaired and is exhibited by…a slower rate of learning .” Also, states must establish their own eligibility criteria for determining the presence of a Specific Learning Disability (SLD)—a broad category of disorders related to understanding and using language. IDEA also requires that states allow the use of research-based procedures in establishing the presence of an SLD, but does not define the specific procedures to be used. Identification process. IDEA requires all states to have Child Find policies and procedures in place, and requires a practical method for determining which children with disabilities are currently receiving needed special education and related services, but does not specify the exact method to be used. In all four of the states we visited, school district officials we interviewed said that the schools in their respective districts were using the same type of approach as part of the Child Find identification process, but that some school districts were in different stages of implementation or that the approach was being used differently by schools within the same districts. Officials in one school district in New York said that, as part of their approach, there was a concerted effort to use student data to make decisions about intervention levels and special education evaluation decisions, while a school district official in Massachusetts said that the district had placed a greater emphasis on improving classroom instruction as a means to reduce the need for special education services rather than on intervention systems used for identifying and making decisions about potentially eligible children. Officials of school districts in two of the states we visited told us that they are in the midst of revising their identification processes to increase accuracy and consistency across the schools in their districts. Officials in one of those districts said that differences in the processes schools used resulted in variations in how the special education identification process worked in each of the schools. Appropriately identifying and evaluating children who may be eligible for special education services can be difficult, according to advocates, subject matter specialists, and state and local officials we interviewed. Representatives of two national special education advocacy organizations and special education subject matter specialists agreed that it may be difficult to identify disabilities and that differences in school district or in school special education processes can add to this challenge. Early Intervention services are intended to enhance the development of infants and toddlers with disabilities, minimize developmental delay, and reduce the need for special education later in life. However, officials we interviewed at state agencies in the four states we visited— Massachusetts, Colorado, New York, and Iowa—said that because of challenges in identifying and evaluating children, some infants and toddlers who are eligible and would benefit from Early Intervention services do not receive them. These challenges include navigating referral processes, obtaining parental consent, and dealing with staffing limitations. State early childhood officials and subject matter specialists we interviewed said it can be difficult to secure a parental or physician referral, which can cause delays in evaluating children and may lead to some infants and toddlers not being provided Early Intervention services. In all four states we visited, officials noted that some parents or physicians did not make referrals because they did not understand the referral process. State officials in Iowa expressed concern that some doctors may take a “wait-and-see” approach instead of referring an infant or toddler for evaluation when indications first arise. Early childhood officials in Colorado as well as Early Intervention subject matter specialists we spoke to said that physicians may also choose not to refer patients because they (1) cannot guarantee families that their children will ultimately receive services, (2) find the referral process difficult, or (3) receive little feedback about whether their referrals ultimately lead to children getting Early Intervention services. Before an infant or toddler can be evaluated for Early Intervention services, the parent(s) must give consent. In Massachusetts and Colorado, state early childhood officials said that parents sometimes do not provide consent for an evaluation, which can delay or even prevent the delivery of needed services. Officials from these states cited various reasons parents might withhold consent, such as opting to wait and see if the child’s problems are resolved over time. State early childhood officials in Massachusetts also said that parents will sometimes refuse to provide consent for evaluation due to a lack of awareness of Early Intervention services or the Early Intervention process. To better address this, officials said that they are working collaboratively with state early education and care providers to inform parents about these issues. Massachusetts officials stated that parents may mistrust government agencies or associate Early Intervention services or providers with child protective services agencies and mistakenly think they are being investigated. Insufficient personnel with the right qualifications to conduct evaluations is another reason infants and toddlers may not be consistently identified and evaluated, particularly in certain types of locations. Officials from lead agencies in Massachusetts, Colorado, New York, and regional education officials in Iowa, noted that it was difficult to find enough Early Intervention personnel with appropriate expertise in low population density areas which can complicate the process of identifying and evaluating children. Officials in Massachusetts noted challenges hiring staff that reflect the communities they serve and in hiring for specific disciplines, such as occupational and physical therapists. In addition, officials in New York said that they sometimes face staffing difficulties when children are located in areas with high crime rates. State and local officials as well as special education advocacy organizations said identifying and evaluating students for Part B special education services can be complicated by many factors, which may result in some students inappropriately being determined eligible or ineligible for services. These factors include confusion over IDEA requirements, challenges implementing Response to Intervention (RTI), a child’s lack of English proficiency, the difficulty of detecting certain types of disabilities, or the Part C to Part B transition. School district officials in Massachusetts said that confusion about IDEA requirements is common. For example, a school district official from that state told us that general education staff do not always understand when special education services are appropriate, versus when other options may meet students’ needs, such as Response to Intervention (RTI) or other supports. (See sidebar for more information about RTI.) Officials in another school district in the same state said there was confusion over and little consistency in the eligibility decisions made for special education and other supports. Additionally, officials in that district said that the expertise level among the decision makers varies and can affect eligibility decisions. Response to Intervention For those students who may need additional academic and behavioral supports to succeed in a general education environment, schools may choose to implement a multi-tiered system of supports, such as Response to Intervention (RTI). Regulations implementing the 2004 amendments to the IDEA include a provision mandating that states allow, as part of their criteria for determining whether a child has a Specific Learning Disability (SLD), the use of a process based on the child’s response to scientific, research-based intervention. See 34 C.F.R. § 300.307(a)(2). RTI is a school-wide approach that attempts to address the needs of all students, including struggling learners and students with disabilities, and integrates assessments and interventions to maximize student achievement. Key characteristics of RTI are: (1) students receive high-quality research- based instruction in the general education setting; (2) schools continually monitor and document student performance; (3) schools screen all students for academic and behavioral problems; and (4) schools provide multiple levels (tiers) of instruction that are progressively more intense, based on the student’s response to instruction. Children who do not respond to interventions are to be referred for evaluation to determine eligibility for special education and related services. School district officials in all of the states we visited and representatives from various advocacy organizations said that there were challenges related to implementing RTI. Representatives from advocacy organizations in all four states we visited cited concerns with school RTI practices that may delay student evaluations or contribute to incorrect eligibility determinations. Advocates in Massachusetts told us that some school districts are more likely than others to put students suspected of a disability through the RTI process for extended periods of time before evaluating them. Further, advocates said using RTI to delay or deny evaluations occurs more frequently at the elementary level and for students with specific types of disabilities, such as mental health and social or emotional disabilities. implementation, the type of disability a student has, the quality and quantity of data gathered on students, and the amount of support provided for the process. In all of the states we visited, school district officials cited efforts to address issues with RTI practices. For example, school district officials in all four states noted that training related to RTI was being provided to their schools. In Massachusetts, New York, and Iowa, school district officials cited recent initiatives specifically aimed at strengthening and implementing the RTI process in schools, such as by integrating social- emotional and behavioral components in RTI and better using student- level data to improve eligibility determinations. In one district, officials specifically noted that efforts to improve their schools’ RTI processes and core curriculum had reduced the number of special education students in their district. According to Education’s 2016-17 school year data, 73 percent of public school districts in the nation had English Learner students; nationwide, English Learner students comprise about 10 percent of public school students, an increase of almost 3 percent since 2010. School district officials we interviewed in all four states we visited described inherent challenges in properly identifying and evaluating English Learner students for special education disabilities. In Massachusetts and New York, school district officials we interviewed explained that they do not always have staff with the necessary expertise to perform evaluations in a child’s first language, which makes it more difficult to determine if a child’s learning difficulties are caused by a disability or by language proficiency issues. State education officials in New York told us that they are concerned about identification issues related to English Learner students, noting that over 200 languages are spoken by their students and about 12 percent of their students with disabilities were also English Learners in 2017-18. In the same state, officials in one school district said that over 100 different languages are spoken by their students and that it was a challenge to properly identify and evaluate them. Representatives of special education advocacy organizations in two states we visited—Massachusetts and New York—made similar observations, noting that English Learner students were at risk of being both over identified and under identified. For example, advocates we interviewed in Massachusetts said that under identification can occur when school districts do not communicate with parents in their home language and, as a result, the parents do not understand how to engage with the special education process. Advocates in both states told us that over and under identification may also occur if the lack of language proficiency is mistaken for a disability or if a disability is mistaken for language learning issues. Education and the Department of Justice have issued guidance to assist schools in meeting their obligations under federal law to ensure that English Learner students who may be eligible for services under IDEA are located, identified, and evaluated for special education services in a timely manner. This guidance instructs schools to consider the English language proficiency of the students appropriately so that they are not identified as students with disabilities because of their limited English language proficiency. Local officials we interviewed in four states said that some disabilities, such as those related to mental health or behavioral disorders, can be difficult to identify and may go undiagnosed. These officials noted that behavioral disabilities can be particularly difficult to correctly identify because they sometimes affect academic performance or behavior in more subtle ways. Some school district officials said they may not have the right tools or staff to identify these students. For example, officials in one school district in Colorado stated that a commonly used disability identification process on its own was not effective for students with mental health and behavioral disabilities. School district officials we spoke to in Massachusetts and Iowa noted that they often struggle to employ staff with the appropriate expertise to address mental health or behavioral issues and that there are fewer resources for schools to use in these areas. Part C to Part B transition Another area of confusion may arise when children transition from Part C services to Part B services, at about age 3. School district officials in the four states we visited said that they identify a significant number of their districts’ school-aged special education students through referrals from the state’s Early Intervention programs during the transition process. State education officials in Massachusetts indicated that the majority of children referred from the early childhood programs for Part B services are not found eligible for school-aged services, which may indicate a lack of a common understanding of the Part B eligibility criteria as the early childhood programs are required to refer the children they think could be eligible for those services. Education’s monitoring of state efforts to implement Child Find requirements is part of a broad framework—known as Results Driven Accountability (RDA)—the department uses to monitor certain aspects of IDEA implementation. Education’s monitoring activities specific to Child Find are based on data and information that states submit annually, as required by IDEA and as part of the RDA process. Because IDEA gives states some discretion in how to meet Child Find requirements, according to Education officials, it focuses on ensuring states have policies, procedures, and systems in place for monitoring local school districts’ special education programs, including their Child Find activities. To monitor state Child Find activities, Education relies, in part, on four indicators specific to the Child Find requirements and requires states to report data on them annually in the State Performance Plan/Annual Performance Report. Three of the indicators pertain to Part C Early Intervention programs and one pertains to Part B. Two Part C Child Find indicators compare the numbers of children served to two data points—the national Part C average (as a percentage) as well as the percentage Education would expect a state to serve based on the state’s population. Education requires states to report these Part C data for two subsets of children—birth to 1 year and birth through 3 years. Education has encouraged states whose Part C enrollment is significantly lower than the national average or below expected levels based on the state’s population, to examine compliance with related Part C requirements. The third Part C Child Find indicator measures state compliance with the 45-day timeline. For this indicator states must report on the number and percentage of children referred to Part C whose evaluations, assessments, and initial individualized family service plan meetings were held within 45 days of referral. The Part B indicator measures the percent of children who were evaluated within 60 days of receiving parental consent for initial evaluation. This indicator is a compliance indicator for which states must establish a target of 100 percent. According to Education officials, the department developed these Parts C and B indicators in response to requirements in the 2004 IDEA reauthorization, which directed the Secretary of Education to monitor the states, and require each state to monitor local educational agencies located in the state or as applicable, the early intervention providers located in the state, using quantifiable indicators in specific priority areas (including Child Find), and using such qualitative indicators as are needed to adequately measure performance in those areas. In developing the indicators, Education officials told us that the department sought to strike a balance between the statutory requirement that they be quantifiable and the inherent challenges in knowing how many children should be identified, evaluated, and found eligible—at the state level or in individual school districts. Education officials said that states and school districts are in a much better position to estimate how many children who have disabilities and who could potentially be found eligible for special education and related services because of their disability. Education officials told us they consulted internal stakeholders, states, school districts, and other special education experts to develop possible quantifiable measures given the inherent challenges in doing so. In addition to the Child Find indicator data submitted annually, under Part B, states provide other information related to Child Find as part of their annual data reporting to Education and the public. These data include the number and percentage of children with disabilities by race, ethnicity, English Learners, gender, and disability category that receive a free appropriate public education; participate in general education; are placed in separate classes, schools, or residential facilities; receive Early Intervention services; and are between birth to 2 years who are no longer receiving Early Intervention services. States are also required to report the number and percentage of infants and toddlers, by race and ethnicity, who are at risk of having substantial developmental delays and who are receiving Early Intervention services. Additionally, Education may receive information about states’ Child Find activities in states’ annual reports as part of the description of IDEA oversight policies and procedures; in explanations of any actions taken in response to Education’s finding of noncompliance with Child Find indicators in prior years; or in the comprehensive multi-year improvement plan Education requires as part of its RDA framework. Education supports states’ implementation of Child Find in a variety of ways, including a network of technical assistance centers, written guidance, and direct assistance from Education staff. The Technical Assistance and Dissemination (TA&D) program is the primary way Education provides educators, administrators, service providers, and parents with information regarding IDEA. This program assists state and local administrators on a range of topics including clarifying Child Find obligations, professional development for staff and administrators on various aspects of Child Find, and federal accountability requirements. Technical assistance offerings include training on data collection and Early Intervention issues for various audiences such as teachers, administrators, and special education service providers. Officials in each of the states we visited said they had used Education’s technical assistance. In addition to the TA&D program, Education has established six centers that specifically support states in the annual data collection process. Education provides written guidance to states through documents such as Dear Colleague Letters, Frequently Asked Questions, and Questions and Answers. These documents clarify provisions of Child Find and other IDEA requirements as well as respond to common inquiries from school administrators or the public. The written guidance may also address information gathered during oversight activities and changes in federal law or regulation. Topics Education has addressed in written guidance on Child Find include school districts’ uses of RTI and requirements for subgroups of children who may be difficult to find. For example, Education issued a memorandum in 2016 reminding states and districts that (1) RTI processes cannot be used to delay or deny a timely evaluation of a child suspected of having a disability and (2) implementation or completion of RTI is not required prior to evaluating a student for special education services. Officials in Colorado said they found this guidance helpful and issued guidance to their school districts based on Education’s memorandum. Additionally, in 2007 and 2008 Education addressed issues regarding Child Find requirements for certain groups of children, such as those who are homeless or those who are residing in Immigration and Customs Enforcement (ICE) residential facilities. Homeless children, for example, are inherently difficult to identify and evaluate for special education services because they and their families are highly mobile. Education’s guidance reminded states and school districts that their Child Find obligations include these hard to find subgroups and directed states to coordinate with emergency shelters and homeless advocacy programs, among others, to help find children suspected of having a disability. Education’s website notes that each state is assigned a customer service representative, a Part B contact, a Part C contact, and a team leader. Education officials we spoke to told us that staff hold monthly check-in meetings with state officials to provide information and discuss issues of concern. They also said that issues needing clarification sometimes arise during these check-in meetings. For example, they said that in a meeting with state directors they identified a lack of clarity around some English Learner issues. As a result, Education developed guidance to explain Child Find obligations regarding English Learner students as well as other obligations under IDEA. Education also has a customer service unit available to assist states with questions about IDEA, special education, and related services. State officials in all four states we visited told us they had good relationships with Education IDEA monitoring staff and rely on them to learn about available technical assistance and other resources. Officials we interviewed in one state said their Education contacts were instrumental in helping them improve their programs. facilities, although Education stated that an ICE facility and the state or local school district could enter into a voluntary agreement to provide Child Find or other educational services. U.S. Department of Education, Office of Special Education and Rehabilitative Services, Letter to David Anderson, General Counsel, Texas Education Agency (Dec. 21, 2007); U.S. Department of Education, Office of Special Education and Rehabilitative Services, Letter to David Anderson, General Counsel, Texas Education Agency, (Apr. 22, 2008). Education officials told us that if these children are released from ICE facilities into the care of a sponsor to await their immigration hearings, they do have a right under federal law to enroll in public elementary and secondary schools and to receive educational services, including special education services, if found eligible. States must monitor their local school districts’ implementation of IDEA requirements. As part of the State Performance Plan/Annual Performance Report, each state must establish measurable and rigorous targets for the indicators, including Child Find, and must analyze the performance of each local school district in the state in implementing the requirements of Part B or as applicable, each Early Intervention provider located in the state in implementing the requirements of Part C. Data analysis and regular audits are the primary means states use to monitor local school districts, according to officials we interviewed in each of the four states we visited. The Part C lead agencies in the four states we visited reported monitoring local implementation of Early Intervention programs through indicator data or on-site visits. In their State Performance Plan/Annual Performance Reports for federal fiscal year 2016, the states we visited reported various monitoring activities. For example: Colorado gathers data from an online system to monitor local programs and analyze performance. In addition to desk audits of local service providers, Colorado’s lead agency does on-site monitoring, selecting local agencies for monitoring visits based on its annual priority areas, or focusing on a cross-section of programs based on size, region, and program structure. Colorado’s annual priority areas have included topics such as increasing public awareness regarding Early Intervention services by providing developmental information to parents of newborns in the hospital and ensuring that the transdisciplinary team members who are responsible for evaluating infants and toddlers are effectively communicating. Massachusetts’ local Early Intervention programs complete and submit to the state lead agency annual reports and self- assessments based on federal indicators. Additionally, the Part C lead agency conducts on-site monitoring of selected sites on a cyclical basis, and focused monitoring to examine specific aspects of local Early Intervention programs. New York conducts comprehensive on-site monitoring of municipalities that administer local Early Intervention programs and approved providers who perform Early Intervention services including reviewing written policies and procedures regarding Early Intervention processes as well as examining a sample of client records at each service location. Iowa monitors all regional grantees on an annual basis. The process includes review of parent surveys and review of family outcome data, among other things. When performance or compliance issues are identified, the lead agency conducts desk audits and data verification checks. Although Part B monitoring activities in the four selected states are similar, they reflect the structure, policies and procedures of individual states. For example, Iowa officials said they monitor both Area Education Agencies and local school districts through desk audits and site visits. Officials told us that the SEA has developed (1) a process to evaluate the performance of the regional agencies regarding the provision of special education services and their oversight responsibilities for the local school districts, and (2) a separate process that examines the performance of school districts with regard to IDEA implementation. The State Performance Plan/Annual Performance Reports for federal fiscal year 2016 for the remaining three states we visited note the following monitoring activities: Colorado collects data and reviews the results of school district self- audits from each of its districts. Massachusetts reported reviewing indicator data and instituting a new monitoring process called Tiered Focus Monitoring. In the first year of the monitoring cycle, all local school districts are to conduct self- assessments on specific criteria related to the special education identification processes and other topics. The self-assessments inform the SEA’s on-site monitoring in the second year. In the third year, school districts are to continue internal monitoring; and in the fourth year, they complete a self-assessment regarding special education and legal requirements. New York reported reviewing data and using school district self- assessments, desk audits, and on-site monitoring. According to the annual report the selection of sites for on-site monitoring depends on a variety of information, including performance on indicator targets. IDEA requires states and lead agencies to provide professional development and technical assistance to local school districts. The State Performance Plan/Annual Performance Reports for federal fiscal year 2016 for each of the four states we visited described professional development activities provided on topics related to Part C Early Intervention and Part B programs. For Part C, states reported that they provided the following professional development activities among others: Colorado provided training on data management to ensure valid and reliable data for monitoring purposes. Iowa provided service coordination training which provides knowledge and skills to understand Early Intervention eligibility, the IDEA, and Early Intervention services. Massachusetts held training sessions for Early Intervention service providers regarding Early Intervention transitions to support children who are exiting Early Intervention services or are referred for Part B services. Early Intervention service providers were also able to receive training concerning functional assessments. New York employed contractors to provide training on best practices for delivering Early Intervention services and training about providing those services in a child’s natural environments. Additionally, they provided training to primary referral sources. For Part B, the states reported that they provided the following professional development activities among others: Colorado provided professional development on topics that were identified by teachers. The SEA surveys teachers, providers, and Special Education Directors annually to determine professional development topics. Officials we interviewed in selected school districts told us that they had received training on Child Find obligations and classroom interventions. Iowa requires each district to develop professional development plans that support the needs of district staff responsible for instruction. Districts officials said they have provided training concerning intervention strategies and Child Find responsibilities. Massachusetts has provided training in social emotional learning and behavioral interventions. New York provides ongoing statewide training regarding classroom and behavioral interventions, as well as a program for school principals regarding special education law and regulations as well as the principal’s responsibilities for implementing IDEA. Officials we interviewed in each of the four states we visited told us that they offer a range of technical assistance, including written guidance, webinars, meetings/conferences, telephone assistance, and one-on-one training to support local school districts and schools in implementing Child Find requirements. For example, New York instituted a Blueprint for Improved Results for Students with Disabilities. This Blueprint establishes expectations to improve instruction and results for students with disabilities, which in turn informs the state’s technical assistance networks. In each of the four states, officials reported (1) offering targeted assistance where there were concerns related to performance or results of Part B programs and (2) examining results and compliance data to identify areas of concern and potential recipients for targeted assistance. For example, Massachusetts reported in its annual report that it had provided one-on-one technical assistance to local school districts where there were performance concerns, while New York reported that its technical assistance improvement specialists review low-performing schools and help to develop tools for improvement. Similarly, the Part C lead agency officials in all of the states we visited told us they provided training and technical assistance to Early Intervention programs. These states offered assistance in a variety of ways including written guidance, information provided via phone or email, and formal training sessions. Officials from Colorado and Iowa reported holding monthly technical assistance calls, while officials from Massachusetts reported holding monthly webinars for local Early Intervention providers. In its annual report, Iowa reported providing training on using technology to provide Early Intervention services, while New York reported offering training on best practices in identifying and evaluating infants and toddlers. Each of the four states we visited reported offering targeted assistance to schools where monitoring efforts identified concerns or compliance issues. The targeted assistance is intended to improve performance in the areas identified. We provided a draft of this report to Education for review and comment. Education provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Education, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. The objectives of this study were to examine (1) factors that may account for differences in the percentage of children receiving special education services, and (2) how the U.S. Department of Education (Education) and selected states monitor and support Child Find requirements. To conduct this work we (1) reviewed federal special education data from school years 2011 through 2016 (the most recent available at the time of our review); (2) reviewed relevant Department information, such as Dear Colleague Letters, Frequently Asked Questions, and Questions and Answers; federal laws; regulations and policies; and selected state laws; (3) interviewed Education officials; (4) interviewed officials from state agencies responsible for administering Parts C and B of the Individuals with Disabilities Education Act (IDEA) special education programs in four states (Colorado, Iowa, Massachusetts, and New York) and fifteen school districts within those states; and (5) interviewed representatives from special education advocacy organizations that represent parents and families of individuals with disabilities and subject matter specialists to discuss issues related to Child Find. The following sections contain detailed information about the scope and methodology for this report. To determine the differences in the percentage of children receiving special education services across states we used Education’s Annual Reports to Congress on the Implementation of the Individuals with Disabilities Education Act (IDEA) to review national and state level special education data. We used the most recent five reports, 2014 through 2018, which reported on data for school years 2012 through 2016, to review the percentages of children that were receiving special education services under IDEA Part C and Part B during school years 2012 through 2016 nationally and by state. These data, known as Section 618 data, are self- reported by school districts. We focused our review primarily on data regarding the percentage of children served under IDEA Part C (ages 0- 2), Part B (ages 3-5), and Part B (ages 6-21), nationally and by state during school years 2012 through 2016. We determined that the data we used from the Annual Reports to Congress on the Implementation of IDEA were sufficiently reliable for the purposes of the report by reviewing technical documentation and interviewing Education officials to determine what mechanisms are in place to ensure data quality. To obtain information on the factors that may account for variation in the percentage of children receiving special education services and to examine how Education and selected states support and monitor Child Find requirements, we reviewed Education documents, such as Dear Colleague Letters, Frequently Asked Questions, and Questions and Answers. We also reviewed Education’s recent annual reports to Congress and documents containing guidance to states on required annual data submissions. Additionally, we reviewed relevant federal laws, regulations, and policies, and selected state laws and regulations. With both Education and state agencies responsible for supporting and monitoring Child Find requirements, we interviewed officials about the agencies’ responsibilities with respect to IDEA, as well as the processes the agencies put in place to monitor implementation of those requirements. We also discussed each agency’s guidance and support to school districts on these issues. In addition, we collected and reviewed relevant agency procedures and guidance documents. To obtain information on the factors that may account for differences among selected states and school districts in the percentage of children receiving special education services and how selected states support and monitor Child Find requirements, we conducted site visits in a non- generalizable sample of four states and 15 school districts. We selected states primarily for diversity in (1) the percentage of special education students; (2) changes in the percentage of special education students over a 5-year period; (3) geography; and (4) the agency responsible for state Early Intervention programs (i.e., the state educational agency or another state agency). We used data from the National Center for Education Statistics (NCES), Common Core of Data (CCD) for the 5-year period, 2011-2015 (the most recent available data at the time of our selection) to identify the percentage of special education students in each state as well as the change in the percentage of special education students in each state over the 5-year period. We determined that the data used were sufficiently reliable for the purposes of the report by reviewing technical documentation and interviewing Education officials to determine what mechanisms are in place to ensure data quality. In each state, we interviewed officials from the state educational agency, the agency responsible for Part B special education, as well as officials from the state agency responsible for Part C special education. In addition, we also interviewed officials from special education advocacy organizations that represent parents and families of individuals with disabilities. We selected school districts primarily for diversity of size. We used state department of education enrollment data for 2017-2018 to sort school districts based on the size of the student population. We selected three school districts in Colorado, five in Iowa, three in Massachusetts and four in New York. In each district, we interviewed district-level officials involved in special education and school Child Find processes. These officials included assistant superintendents, administrators, and directors of special education. While not generalizable, our interviews provided illustrative examples of a range of state and district Child Find processes, and the differences and challenges states and school districts face. To obtain information on the factors that may account for differences among states and school districts in the percentage of children receiving special education services and processes that states and school districts may use in implementing their Child Find requirements, we interviewed representatives from eight special education advocacy organizations that represent parents and families of individuals with disabilities and four special education subject matter specialists to discuss issues related to Child Find. Some of the issues we discussed included Early Intervention eligibility, assessment processes of students including Response to Intervention, and other topics to get a better sense of Child Find processes and issues. We conducted this performance audit from August 2017 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Bill MacBlane (Assistant Director), Mindy Bowman (Analyst-in-Charge), Aaron Karty, Deborah Signer, Phillip Steinberg, and Shelia Thorpe made key contributions to this report. Also contributing to this report were James Bennett, Deborah Bland, Shilpa Grover, Serena Lo, Art Merriam, Sheila R. McCoy, Corinna Nicolaou, James Rebbe, Brian Schwartz, Daren Sweeney, and Kathleen van Gelder.", "summary": "About 13 percent of children aged 3 through 21 enrolled in public schools received special education services in school year 2015-16, and about 3 percent of children from birth through age 2 received special education services. The percentage of the population served under IDEA varies across states. For example, in fall 2016, the percentages of the population aged 6 through 21 served in individual states ranged from 6.4 percent to 15.1 percent. Concerns about the difficulties identifying and evaluating children for special education have been raised by the media, experts, and special education advocates. GAO was asked to examine how states implement Child Find and how Education monitors it. This report examines (1) factors that may account for differences in the percentage of children receiving special education services across states, and (2) how Education and selected states monitor and support Child Find efforts. GAO reviewed federal special education data, agency documentation, federal laws and regulations, and selected state laws; and interviewed Education officials, officials from four state agencies and 15 school districts in those states (Colorado, Iowa, Massachusetts, and New York), and representatives of organizations that advocate for families of individuals with disabilities as well as special education subject matter specialists. GAO selected the four states based on a variety of factors, including the percentage of special education students. Differences in states' eligibility criteria and the difficulty of identifying and evaluating some children suspected of having disabilities may contribute to differences in the percentages of children receiving special education services across states. The Individuals with Disabilities Education Act (IDEA), the primary federal special education law, requires states to have policies and procedures in place to ensure that all children with disabilities residing in the state who need special education services are identified, located, and evaluated. These policies and procedures—known as “Child Find”—are generally implemented by local school districts (see fig.). IDEA gives states some latitude in setting eligibility criteria and defining disability categories. In addition, states may determine their own processes for identifying and evaluating children. As a result, a child eligible for services in one state might be ineligible in another. According to advocates, special education subject matter specialists, and state and local officials GAO interviewed, a number of challenges related to correctly identifying and evaluating children suspected of having a disability can affect eligibility decisions. For example, school district officials in all four states GAO visited cited challenges in properly identifying and evaluating English Learner students, as districts do not always have staff who are conversant in a child's first language and skilled in distinguishing language proficiency from disabilities. The Department of Education (Education) monitors and supports Child Find efforts primarily by reviewing states' annual performance data and providing professional development and technical assistance. The four states GAO visited reported monitoring and supporting school districts' efforts in a similar manner to Education's.", "document_type": "gao"}
{"report": "The Coast Guard has 11 statutory missions, which are divided into homeland security and non-homeland security missions (see appendix II). The Coast Guard’s units that conduct operations to achieve its statutory missions are organized into shore-based forces such as boat stations, maritime patrol forces such as cutters and icebreakers, and Specialized Forces—the latter of which can serve as a force multiplier for the other units, such as by deploying for added capacity during homeland security missions, including port security, drug interdiction, and defense readiness. Table 1 details Specialized Forces teams, types of operations they conduct, and an example of an operation. Specialized Forces units deploy from their home locations, such as major U.S. port areas, to conduct operations in U.S. coastal waters and internationally. For example, some units such as MSRTs, MSSTs and PSUs deploy with specialized boats on trailers that can be towed or air lifted to the site of an antiterrorism patrol or defense readiness operation. Other Specialized Forces units do not maintain the vessels, such as cutters, or air assets, such as helicopters, from which they carry out operations. TACLETs, for example, do not maintain any boats and rely on and deploy via U.S. Navy or Allied vessels, as well as Coast Guard cutters, to conduct drug interdiction operations. Figure 1 shows Coast Guard personnel conducting a drug interdiction operation that included a TACLET member boarding a foreign, semi-submersible vessel, which resulted in seizing 17,000 pounds of cocaine. The Coast Guard is the lead federal maritime law enforcement agency on waters beyond 12 nautical miles offshore of the U.S. coast. The Coast Guard shares responsibility for patrolling the U.S. maritime borders and territorial sea (i.e., maritime approaches 12 nautical miles seaward of the U.S. coast) to interdict drugs and foreign nationals illegally entering the United States with U.S. Customs and Border Protection’s Air and Marine Operations and Border Patrol. Outside of DHS, the Department of Defense (DOD) is the lead federal agency for the detection and monitoring of the aerial and maritime transit of illegal drugs into the United States, and it operates systems, such as radar, that can be used in support of DHS and other federal, state, and local law enforcement activities. Figure 2 depicts the geographic areas in which Specialized Forces operate and resources, such as vessels or aircraft, used to support their operations. In July 2007, the Coast Guard reorganized the command structure of its Specialized Forces and aligned them as an independent Coast Guard command—the Deployable Operations Group. The Deployable Operations Group was intended to enhance operational effectiveness and interagency coordination in responding to a range of national emergencies and events, such as terrorist threats or natural disasters. Prior to the Deployable Operations Group, Specialized Forces aligned geographically under Atlantic Area and Pacific Area commands. In 2010, we found that the unified command structure achieved its intended benefits of standardized training and centrally managing assets. We also reported in 2010 that the Deployable Operations Group faced human resource challenges such as selecting qualified candidates and achieving and maintaining qualifications to perform certain high-skill techniques, such as vertical insertion from a helicopter onto the deck of a ship during maritime interdiction missions. Because of the ongoing program changes at that time, we did not make recommendations. In 2010, a DHS Inspector General report recommended a systematic review and analysis of the MSST program to determine, in part, the optimal staffing levels, training, and competency mix needed. The Coast Guard agreed and cited planned MSST program changes in its response to the Inspector General report. The Coast Guard’s Fiscal Year 2011 budget included a proposal to close five MSSTs and consolidate those forces to achieve cost savings, among other things. A 2011 Coast Guard report recommended that the Coast Guard integrate Specialized Forces units across the Coast Guard, balance the capacity of the Specialized Forces with proficiency and safety levels, and manage risk. In April 2013, the Coast Guard disbanded the Deployable Operations Group, and Specialized Forces units returned to regional commands. Figure 3 shows the evolution of Coast Guard Specialized Forces units since 1970. The April 2013 reorganization of the Coast Guard’s Specialized Forces units under regional commands more closely aligns with its original command structure that existed prior to the 2007 creation of the Deployable Operations Group. Figure 4 details the three command structures—pre-Deployable Operations Group, Deployable Operations Group, and Post-Deployable Operations Group. The Coast Guard generally applied three of five key practices for agency reform and partially applied two of five when developing its report that recommended the 2013 reorganization of its Specialized Forces units. Table 2 identifies the extent to which the Coast Guard’s reorganization applied key practices and considerations. Coast Guard generally applied three of five key practices for Specialized Forces reorganization, including establishing goals and outcomes, involving employees and key stakeholders, and addressing high risk areas and longstanding management challenges. Establishing goals and outcomes of reforms can help decision makers determine what problems genuinely need to be fixed, how to balance differing objectives, and what steps need to be taken to create long-term gains. The Coast Guard generally applied this key practice in its analysis of Specialized Forces units. For example, the Coast Guard’s 2011 report cites personnel safety as a main reason to reform Specialized Forces operations. According to Coast Guard officials, part of the rationale for this focus was because of a training mishap and a problem with equipment requirements. Specifically, officials stated that in 2010, a Coast Guard member drowned while training when he entered the water without self-inflating flotation equipment. Coast Guard officials told us that at the time of the incident, members of Specialized Forces units would carry in excess of 100 pounds of specialized gear and equipment. Officials also noted that at that time there were concerns that members’ self-inflating flotation devices could inflate onboard aircraft, which in the event of a crash in the water could result in personnel being unable to exit the aircraft. The Coast Guard subsequently established a goal for its reorganization to mitigate this safety risk by decreasing gear weight and personal flotation devices. Further, the report recommended reducing or eliminating inconsistencies between the Specialized Forces units and the rest of the Coast Guard. For example, a Coast Guard official told us that integration between the Deployable Operations Group and the rest of the Coast Guard was inconsistent, training programs were not standardized, and training took place at 15 different locations. This resulted in difficulties sharing assets, such as aircraft and boats, for use during training sessions. As a result of the report findings and its recommendation, the 2013 reorganization realigned Specialized Forces units under regional operational commands to integrate its logistics with the rest of the Coast Guard (fig 2.). Involving employees and key stakeholders in the process of developing reforms is part of an integrated approach that helps facilitate the development of reform goals and objectives, as well as incorporate insights from a frontline perspective and increase customer acceptance of any changes. The Coast Guard generally applied this key practice because it involved senior officials representing the agency to develop the goals of the reorganization, how to address them, and to make reform recommendations to improve the efficiency and effectiveness of Specialized Forces operations. The Coast Guard’s 2011 report included and incorporated input from a broad range of subject matter experts including high level officers representing a comprehensive mix of Coast Guard units, with a diverse mix of experience, and it reflected different programs throughout the Coast Guard to ensure a comprehensive review. During site visits, Coast Guard officials told us the reorganization from the Deployable Operations Group to Specialized Forces had a positive effect by helping to ensure tactics, training, and techniques became standardized and ensuring better cooperation within the Coast Guard as well as with other agencies. For example, Coast Guard officials told us that because their area of responsibility is large and busy, they use MSSTs to augment their local capabilities and to apply the MSST’s specialized capabilities that the local unit does not have. Coast Guard officials also emphasized an increase in safety, particularly with a decrease in a risk of drowning while in tactical gear. Addressing long standing weaknesses in how some federal programs and agencies operate is a key practice, which can improve the effectiveness and responsiveness of the federal government. The Coast Guard generally applied this key practice because it considered high risk areas when considering Specialized Forces reorganization. Specifically, the Coast Guard addressed retention and training, which it identified in its 2011 report to be high risk areas and longstanding management challenges. For example, the Coast Guard’s 2011 report identified the need for additional subject matter expertise and made recommendations to implement training standardization across the Specialized Forces. Our work has also identified retention and training as challenges. We found in 2010 that the Coast Guard was unable to retain qualified Specialized Forces personnel, in part because of additional training requirements. For example, while personnel working on a cutter may need a boat driver certification, an MSST or MSRT member would need an additional tactical boat driver course. The Coast Guard subsequently developed detailed guidance for Specialized Forces units that includes standardized training, requirements, and qualifications to be followed regardless of the unit location and to be applied consistently across organizational commands. During site visits to units in the Pacific and Atlantic Areas, we observed that equipment was standardized across Specialized Forces, and officials we spoke with described the benefits of the standardized training and equipment. Figure 5 shows Coast Guard MSST personnel conducting standardized training, which officials said has the added benefit of providing potential deterrence of illegal activities, such as drug smuggling, in the geographic area of the training. Coast Guard officials also told us that, prior to the 2007 reorganization to the Deployable Operations Group, Coast Guard personnel working in Specialized Forces units could not remain in those units and be competitive for promotions. Coast Guard officials told us that this was because the Coast Guard has certain requirements for career progression, including personnel working in various assignments within a given career path. In 2010, we reported that the Coast Guard had developed a career path for maritime law enforcement personnel—who are part of operations that generally address the Coast Guard’s homeland security missions. Coast Guard officials told us that this change was a response to challenges the agency faced retaining law enforcement personnel. Officials said this change created a maritime law enforcement career path within the Specialized Forces community. Coast Guard officials we spoke with also told that us the career path has helped them retain qualified Specialized Forces personnel. Coast Guard partially applied two of five key practices for agency reorganization, including using data and evidence, and considering to some extent the possibility of fragmentation, duplication, and overlap. However, it has not used data and evidence to fully assess Specialized Forces workforce needs and has not comprehensively evaluated the potential for overlaps or gaps in the capabilities among them. We have reported that agencies are better equipped to address management and performance challenges when managers use reliable data and evidence, such as evidence from program evaluations and performance data that provide information on how well a program or agency is achieving its goals. We have previously reported that when reforming a given program, the use of data and evidence is critical for setting program priorities and allocating resources. The Coast Guard used some data and evidence related to a specific management challenge—training mishaps—but did not use data and evidence to fully assess Specialized Forces workforce needs. As previously mentioned, the Coast Guard analyzed equipment weight data and scenarios and made recommendations based on the results of these analyses to reduce the risk of drowning. The 2011 report affirmed the locations of the Specialized Forces units to ensure that unit capabilities were geographically distributed, but it recommended additional analyses of some unit locations, such as TACLETs. The Coast Guard found that the geographic distribution of the Specialized Forces, at the time of the analysis, provided coverage for their tactical law enforcement and waterside operations and did not recommend changes to the geographic locations of these units. The Coast Guard partially applied this key practice because, when it reorganized its Specialized Forces command structure in 2013, it did not assess Specialized Forces workforce needs with regard to the number of personnel required to conduct its operations. The Coast Guard’s 2011 report identified some capability and capacity shortfalls, including inadequate capacity to conduct certain security operations, and recommended an analysis of staffing levels for all Specialized Forces units. Similarly, a 2012 Homeland Security Studies and Analysis Institute peer review of the Coast Guard’s 2011 report on its Specialized Forces noted the need for a more comprehensive analysis of all of the units to ensure the effective use of their specialized capabilities. In the eight years since the Coast Guard study recommended workforce needs analyses, the Coast Guard has not assessed the overall Specialized Forces workforce needs or established such an analysis as a priority. The Coast Guard conducted a unit level analysis of its PSUs in January 2014, but it did not use the results because the analysis focused on non-deployed personnel. Officials stated the analysis identified gaps in personnel and recommended that the Coast Guard expand the size of the units to be able to fulfill mission requirements. However, Coast Guard officials said they did not act on the recommendations of the study to request different resource levels. Officials told us that leadership changes among Specialized Forces can result in units, such as PSUs, getting study results based on scope decisions with which the new leader disagrees. We found that the Coast Guard might not have the right mix and number of personnel relative to the mix and number of operations Specialized Forces conduct to meet mission demands. Our analysis of Specialized Forces data for fiscal years 2016 through 2018 and planned for 2019 found variation in the number of operations requested of some units during this period, even though the number of personnel remained relatively constant. For example, our analysis of Coast Guard data found that PSU requests—and the number of operations carried out—changed from three operations in 2016 to six in 2018, with two operations planned in 2019, spread among a constant of approximately 1,000 personnel. In another example, our analysis of Coast Guard data found that the of number operations requested for MSSTs varied from 85 in 2016 to 67 in 2018, and 39 planned for 2019. Our analysis of Coast Guard data found that the number of MSST operations carried out was 152 in 2016, 141 in 2018, and 379 planned operations in 2019, while the number of personnel assigned to MSSTs decreased from 562 in 2016 to 547 planned for 2019. Such variations may affect the extent to which Specialized Forces units are used efficiently. Officials from some units we interviewed indicated that they experienced periods of underutilization, while other similar units turned down operations for lack of available personnel. For example, an official at one unit described efforts to increase the number of operations carried out by the unit, with officials describing outreach efforts to other Coast Guard units to encourage those units to call on them for specialized assistance. Officials at another unit conducted similar outreach, including passing out flyers describing Specialized Forces capabilities and contact information should the other Coast Guard units need assistance. In contrast, officials from a different Specialized Forces unit described instances where they had to decline operations because they did not have enough personnel to meet the demand. Further, an official from one Area Command responsible for assigning some of the Specialized Forces operations stated approximately 5 percent of requests for Specialized Forces assistance went unfulfilled. Without an analysis of the Specialized Forces units as a whole, the Coast Guard does not have the assurance that it has the requisite number of personnel in the right units to conduct the required missions. Such an analysis would better position the Coast Guard to identify capability gaps between mission requirements and mission performance caused by deficiencies in the numbers of personnel available, as required by the Coast Guard Authorization Act of 2015. Coast Guard officials from Specialized Forces units we interviewed in 2019 acknowledged that an analysis of each unit would be useful and in August 2019, officials from headquarters affirmed this and stated the Coast Guard aims to conduct analyses of the individual units. We found that these analyses consider each unit individually and do not comprehensively consider similar units, such as Specialized Forces. Therefore, without analyzing the Specialized Forces program as a whole, the Coast Guard may miss opportunities to optimize the allocation of personnel among Specialized Forces units, as well as the number of units. Using data and evidence to comprehensively assess workforce needs across Specialized Forces units would better position the Coast Guard to prioritize its Specialized Forces efforts to more effectively achieve desired outcomes. As we have reported since 2011, agencies may be able to achieve greater efficiency or effectiveness by reducing or better managing programmatic fragmentation, overlap, and duplication. We have also reported that these issues should be considered during agency reform efforts. We found that the Coast Guard partially considered how to reduce potential duplication and overlap when reorganizing the Specialized Forces units. The 2011 Coast Guard report identified some duplication of one specialized unit and challenges associated with uncoordinated training and fragmented guidance. The Coast Guard recommended the elimination of one Specialized Forces unit with that specialized capability, and to change training requirements to reduce the duplication of roles within one specific Specialized Forces unit. Further, the report recommended training standardization and associated guidance, which the Coast Guard subsequently addressed by updating its guidance and standardizing training requirements. In addition, the Coast Guard report recommended changes to the capabilities maintained by some units, such as MSSTs. Specifically, the report recommended that the Coast Guard focus MSSTs on waterside security capabilities and eliminate law enforcement roles, among others, to reduce duplicative training costs. Further, according to officials, in response to the Coast Guard Authorization Act of 2010, the Coast Guard eliminated the MSST in San Diego, California and replaced it with MSRT West, a second MSRT. The Coast Guard also placed all regional dive lockers under MSRT West. According to Coast Guard officials, structuring regional dive lockers under a single command in a single geographic location is safer and more efficient, because dive operations require a high level of subject matter expertise in the command as well as personnel actually participating in the dives. However, the Coast Guard partially applied this practice because it has not conducted the analyses necessary to fully identify potential overlap and the extent to which it could be unnecessarily duplicative. The Coast Guard categorizes Specialized Forces missions, such as drug interdiction or defense readiness, as primary, secondary or collateral, and assigns different levels of capabilities according to these categories. Specifically, multiple Specialized Forces are used to support the same Coast Guard missions, which often require similar capabilities from the units, such as the ability to perform enhanced law enforcement boardings. Figure 6 provides a visual representation of the Specialized Forces missions, the capabilities to carry out operations in support of those missions, and the units that address the mission areas. As shown in figure 6, MSSTs and PSUs primary and secondary missions overlap, as do the capabilities necessary to conduct three of the same missions—Ports, Waterways, and Coastal Security; Defense Readiness; and Search and Rescue. MSSTs and PSUs have operational differences, but there may be benefits to assessing when to use PSUs in place of MSSTs or vice versa, such as when one Specialized Force can be deployed more rapidly, or because Specialized Forces are located in close proximity. For example, MSSTs maintain the ability to deploy almost immediately to carry out an operation, while PSUs generally require around 24 months to deploy. PSUs generally have a deployment preparation cycle of at least 24 months and up to 48 months. Moreover, the variance in Specialized Forces utilization and the overlapping capabilities units maintain underscores a challenge and an opportunity, particularly given the close proximity of Specialized Forces units. For example, given that there are certain instances where Specialized Forces units appear to be substitutable, assessing the extent to which co-located units could be better leveraged could help the Coast Guard more efficiently manage its resources. Figure 7 shows the locations of Coast Guard Specialized Forces units and the close proximity of some units, such as co-located MSSTs and PSUs, which have overlapping primary and secondary defense readiness and ports waterways and coastal security missions (fig. 6) and related capabilities. In March 2019, as previously noted, Coast Guard leadership again called for a review of PSUs, citing overlap, personnel shortages, and excessive distance to training areas (such as waterways and weapon ranges). The challenge this new PSU study seeks to address underscores the importance of a contemporary and comprehensive assessment of these units’ workforce needs. It also presents the Coast Guard with an opportunity to consider whether it could more effectively use its co- located Specialized Forces. For example, instead of deploying a PSU within commuting distance of an operation occurring in San Francisco, CA that required surge capacity, the Coast Guard deployed an MSST from Seattle, WA for 7 days, even though both Specialized Forces are to maintain the same capabilities needed for the operation. Coast Guard officials stated that they decided to send the MSST to meet a surge capacity instead of the local PSU because Ports, Waterways and Coastal Security is a secondary mission for PSUs and PSUs do not bring law enforcement capability of boarding officers, among other things. According to Coast Guard officials, each PSU costs around $1 million a year to operate when not deployed to Guantanamo Bay, and two of eight PSUs are deployed annually. Assessing Specialized Forces workforce needs to determine the optimal mix of units and analyzing trade-offs, such as eliminating underutilized units, could identify opportunities for the Coast Guard to save millions of dollars over time. Elimination of even one PSU could save around a million dollars annually. Because the exact amount of savings would depend on the outcomes of those analyses and currently available cost data is not available for making estimates, we cannot precisely estimate the value of potential savings. However, given that the Coast Guard has begun an assessment of PSUs, it is reasonable to expect that a comprehensive analysis of Specialized Forces could find unnecessary duplication and could recommend PSU closures. Coast Guard officials did not state that they are considering this review as part of a comprehensive review of Specialized Forces that would include assessing the overlapping capabilities of other Specialized Forces units. In August 2019, Coast Guard officials told us that overlap or gaps in Specialized Forces’ capabilities could exist. Coast Guard officials also stated that some overlapping capability could be beneficial. While overlap may be beneficial, overlapping capabilities, if unnecessary, could indicate inefficiencies, such as excess capacity in some areas, including geographic areas, to the detriment of others where there may be capability gaps. The Coast Guard is not currently positioned to take action to reduce the risk of some potentially unnecessary overlap or duplication among the Specialized Forces units because it has yet to comprehensively assess the Specialized Forces program. Specifically, as reported above, Coast Guard officials stated that the Coast Guard has conducted some staffing analyses of standalone Specialized Forces units, but has not evaluated the Specialized Forces’ workforce or operations as a whole. Until the Coast Guard comprehensively assesses Specialized Forces’ needs, the Coast Guard will lack a complete picture of the extent to which overlapping capabilities are necessary or appropriate, or where there are capability gaps or areas where certain Specialized Forces units could be better leveraged to meet mission requirements. Assessing the extent to which unnecessary overlap or duplication exists among Specialized Forces’ capabilities, would better position the Coast Guard to identify capability gaps and reallocate resources, as needed, to use them more efficiently. The Coast Guard’s Specialized Forces units include a range of specialized capabilities that are vital to the agency’s ability to fulfill its mission, and they constitute a significant force multiplier to maintain readiness throughout major U.S. ports and cities. The Coast Guard faces the difficult decision of determining how best to invest its limited resources. Without having assessed its operational needs and mix of personnel for Specialized Forces units, the Coast Guard does not have the information it needs to ensure that it is investing its resources efficiently. GAO’s key practices and considerations provide a framework for agency reorganization and a decision-making approach that can help ensure that resources are allocated efficiently and do not result in unnecessary overlap or duplication. The Coast Guard did not fully apply these practices when reorganizing the Specialized Forces. By comprehensively assessing Specialized Forces’ workforce needs and determining the extent to which overlapping capabilities are necessary, or whether capability gaps may exist, the Coast Guard may be able to more efficiently allocate resources for its Specialized Forces. The Coast Guard should conduct a comprehensive analysis of its Deployable Specialized Forces’ workforce needs. (Recommendation 1) The Coast Guard should assess the extent to which unnecessary overlap or duplication exists among Deployable Specialized Forces’ capabilities. (Recommendation 2) We provided a draft of this report to DHS for comment. DHS provided technical comments, which we incorporated as appropriate. On November 5, 2019, DHS also provided comments, reproduced in full in appendix III. DHS concurred with one of our two recommendations, and described actions planned to address it, but did not concur with the other. DHS concurred with our first recommendation that the Coast Guard should conduct a comprehensive analysis of its Specialized Forces’ workforce needs. DHS stated in its comments that the Coast Guard will conduct individual unit analyses, prioritizing for units that were not previously examined. Initial requests, according to the comments, will be submitted to staff responsible for the analyses by January 31, 2020, and estimated completion dates for the analyses are expected to be determined after assessing the availability of funding to support the analyses. These actions, if fully implemented, should address the intent of the recommendation. DHS did not concur with our second recommendation that the Coast Guard assess the extent to which unnecessary overlap or duplication exists among Specialized Forces’ capabilities. In its comments, DHS stated that when the priority of the missions, capabilities, and subsequent geographic operating areas are appropriately considered for each DSF unit type, unnecessary overlap or duplication does not exist among DSF capabilities. DHS further stated that our conclusions illustrate a fundamental misunderstanding of the corresponding missions of DSF units. We note in our report that the way in which the Coast Guard deploys certain Specialized Forces units may not result in overlap, but overlapping capabilities amongst units could indicate inefficiencies in how they are used, such as excess capacity in some areas, including geographic areas, and missed opportunities for use in others. As noted in our report, the Coast Guard has not conducted the analyses necessary to fully identify potential overlap amongst units’ capabilities and the extent to which opportunities may exist to use the units more efficiently. The Coast Guard categorizes Specialized Forces missions, such as drug interdiction or defense readiness, as primary, secondary, or collateral, and assigns different levels of capabilities according to these categories. We found that multiple Specialized Forces are used to support the same Coast Guard missions, which often require similar capabilities from the units, such as the ability to perform enhanced law enforcement boardings. Further, as stated in our report, in August 2019, Coast Guard officials told us that overlap or gaps in Specialized Forces’ capabilities could exist and that some overlapping capability could be beneficial. While overlap may be beneficial, overlapping capabilities, if unnecessary, could indicate inefficiencies, such as excess capacity in some areas, including geographic areas. Also in its comments, DHS stated that we have not identified any substantive examples of unnecessary overlap or duplication nor provided any other compelling reasons for how implementing this recommendation could enhance Coast Guard mission effectiveness. DHS cited our use of MSST and PSU potential overlap as an example of misunderstanding DSF unit missions and active versus reserve personnel. However, MSST and PSU potential overlap is a prime example of why potential unnecessary overlap should be examined by the Coast Guard. Specifically, as noted in our report, MSST and PSU primary and secondary missions overlap, as do the capabilities necessary to conduct three of the same missions—Ports, Waterways, and Coastal Security; Defense Readiness; and Search and Rescue. MSSTs and PSUs have operational differences due to active versus reserve personnel status, but there may be benefits to assessing when to use PSUs in place of MSSTs or vice versa, such as when one Specialized Force can be deployed more rapidly, or when Specialized Forces are located in close proximity. Beyond the MSST and PSU potential overlap, active duty units such as MSSTs and MSRTs provide an additional example. As shown in Figure 6 of our report, MSRTs and MSSTs share the primary missions of Ports, Waterways, and Coastal Security, as well as common secondary missions, including Drug and Migrant Interdiction. Additionally, MSRT- San Diego and MSST-Long Beach are within close proximity to one another, offering an opportunity to examine potential overlap. Also, as noted in our report, officials from some units we interviewed indicated that they experienced periods of underutilization, while other similar units turned down operations for lack of available personnel. For example, an official at one unit described efforts to increase the number of operations carried out by the unit, with officials describing outreach efforts to other Coast Guard units to encourage those units to call on them for specialized assistance. Officials at another unit conducted similar outreach, including passing out flyers describing Specialized Forces capabilities and contact information should the other Coast Guard units need assistance. In contrast, officials from a different Specialized Forces unit described instances where they had to decline operations because they did not have enough personnel to meet the demand. Given that there are certain instances where Specialized Forces units appear to be substitutable, assessing the extent to which units could be better leveraged could help the Coast Guard more efficiently manage its resources. In addition, in March 2019, Coast Guard leadership called for a review of PSUs, citing overlap, personnel shortages, and excessive distance to training areas (such as waterways and weapon ranges). As noted in our report, the challenge this new PSU study seeks to address underscores the importance of a contemporary and comprehensive assessment of these units’ workforce needs and presents the Coast Guard with an opportunity to consider whether it could more effectively use its co- located Specialized Forces. According to Coast Guard officials, each PSU costs around $1 million a year to operate when not deployed to Guantanamo Bay, and two of eight PSUs deploy annually. Assessing Specialized Forces workforce needs to determine the optimal mix of units and analyzing trade-offs, such as eliminating or moving underutilized units, could identify opportunities for the Coast Guard to save millions of dollars over time. As noted in our report, because the exact amount of savings would depend on the outcomes of those analyses and cost data that is not currently available for making estimates, we cannot precisely estimate the value of potential savings. However, given that the Coast Guard has begun an assessment of PSUs, it is reasonable to expect that a comprehensive analysis of Specialized Forces could provide either a defensible basis for the existing structure or find unnecessary duplication and could recommend changes to the number and location of Specialized Forces. In summary, as we state in our report, a comprehensive assessment of Specialized Forces’ needs would, among other things, help the Coast Guard have a more complete picture of the extent to which certain Specialized Forces units could be better leveraged to meet mission requirements. Assessing the extent to which unnecessary overlap or duplication exists among Specialized Forces’ capabilities would better position the Coast Guard to identify capability gaps and reallocate resources, as needed, to use them more efficiently. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or AndersonN@gao.gov. GAO staff who made key contributions to this report are listed in appendix IV. This appendix provides Coast Guard data on Deployable Specialized Force (Specialized Forces) personnel, operations, costs, and resource hours showing a mix of operational tempos, including variation in the number of operations requested of some units such as Tactical Law Enforcement Teams (TACLETs) and Port Security Units (PSUs), but relatively constant numbers of personnel assigned to them. Table 3 provides operational and cost details for Coast Guard Specialized Forces units for fiscal years 2016 through 2018 and planned for 2019. This appendix details the Coast Guard’s 11 missions, which are characterized as non-homeland security and homeland-security missions (see Table 4). Nathan J. Anderson, (202) 512-3841 or AndersonN@gao.gov. In addition to the contact above, Ben Atwater (Assistant Director), Andrew Curry (Analyst-in-Charge), Chuck Bausell, David Dornisch, Michele Fejfar, Tracey King, and Calaera Powroznik made key contributions to this report. Also contributing were: Jason Berman, Dominick Dale, Eric Hauswirth, and Jan Montgomery.", "summary": "The U.S. Coast Guard, within the Department of Homeland Security (DHS), is the principal federal agency charged with ensuring the security and safety of the waters under U.S. jurisdiction. To help carry out its missions, the Coast Guard maintains Specialized Forces units with the capabilities needed to handle drug interdiction, terrorism, and other threats to the U.S. maritime environment. The Coast Guard reorganized the command structure of these units in 2007 and again in 2013. The Maritime Security Improvement Act of 2018 included a provision for GAO to evaluate Specialized Forces units and provide a report to Congress. This report examines the extent to which the Coast Guard addressed key practices and considerations for assessing reorganization of its Specialized Forces units. GAO assessed the Coast Guard report and associated workforce planning documentation and data used for its 2013 reorganization and analyzed the extent to which the agency applied key practices. GAO also analyzed guidance and data on Specialized Forces capabilities and operations to identify potential overlap or gaps and interviewed agency officials. In reorganizing its Deployable Specialized Forces (Specialized Forces) in 2013, the Coast Guard generally applied three of five key practices for agency reorganization, including establishing goals and outcomes, engaging stakeholders, and addressing longstanding management challenges, such as training shortfalls. However, the Coast Guard did not fully apply the other two key practices—using data and evidence and addressing potential overlap and duplication within the Specialized Forces workforce. For example: The Coast Guard has not assessed the overall Specialized Forces workforce needs, as this practice recommends. Officials from some units stated that they experienced periods of underutilization, while other units with the same or similar capabilities turned down operations for lack of available personnel. GAO identified some overlap among the capabilities of the different Specialized Forces units and the Coast Guard missions they support—in some cases Specialized Forces units were co-located with other Specialized Forces units with many of the same capabilities and similar missions. In August 2019, Coast Guard officials acknowledged that the 2013 reorganization did not conduct an analysis of potential overlap or duplication of capabilities and agreed that overlap or gaps in Specialized Forces capabilities could exist. Assessing workforce needs and the extent to which unnecessary overlap or duplication may exist among Specialized Forces would help ensure that the agency effectively allocates resources and uses them efficiently. GAO makes two recommendations to DHS. First, GAO recommends that the Coast Guard conduct an analysis of its Specialized Forces' workforce needs, with which DHS concurred. Second, GAO recommends that the Coast Guard assess the extent to which unnecessary overlap or duplication exists. Although DHS did not concur, GAO continues to believe the findings documented in the report support the recommendation.", "document_type": "gao"}
{"report": "Under the APA, agencies engage in three basic phases of the rulemaking process: they initiate rulemaking actions, develop proposed rulemaking actions, and develop final rulemaking actions. Built into agencies’ rulemaking processes are opportunities for internal and external deliberations, reviews, and public comments. Figure 1 provides an overview of the rulemaking process. The public comment portion of the rulemaking process generally comprises three phases: 1. Comment Intake: During this phase, agencies administratively process comments. This may include identifying duplicate comments (those with identical or near-identical comment text, but unique identity information), posting comments to the agency’s public website, and distributing comments to agency subject-matter experts within responsible program offices for analysis. 2. Comment Analysis: During this phase, subject-matter experts analyze and consider submitted comments. This may include the use of categorization tools within FDMS or outside software systems. 3. Comment Response: During this phase, agencies prepare publicly available responses to the comments in accordance with any applicable requirements. Agencies are required to provide some response to the comments in the final rule, but in some cases, an agency may also prepare a separate report to respond to the comments. As illustrated in figure 1 above, the public has the opportunity to provide input during the development of agencies’ rules. Among other things, the APA generally requires agencies to publish an NPRM in the Federal Register; allow any interested party an opportunity to comment on the rulemaking process by providing “written data, views, or arguments”; issue a final rule accompanied by a statement of its basis and purpose; and publish the final rule at least 30 days before it becomes effective. The APA requires agencies to allow any interested party to comment on NPRMs. The APA does not require the disclosure of identifying information from an interested party that submits a comment. Agencies therefore have no obligation under the APA to verify the identity of such parties during the rulemaking process. Instead, the APA and courts require agencies to consider relevant and substantive comments, and agencies must explain their general response to them in a concise overall statement of basis and purpose, which in practice forms part of the preamble of the final rule. Courts have explained that significant comments are comments that raise relevant points and, if true or if adopted, would require a change in the proposed rule. However, courts have held that agencies are not required to respond to every comment individually. Agencies routinely offer a single response to multiple identical or similar comments. As explained by Regulations.gov’s “Tips for Submitting Effective Comments,” “the comment process is not a vote,” and “agencies make determinations for a proposed action based on sound reasoning and scientific evidence rather than a majority of votes. A single, well-supported comment may carry more weight than a thousand form letters.” The APA includes provisions on the scope of judicial review that establishes the bases under which a court shall find an agency’s action unlawful. Among these APA bases are when the court finds that agency action, findings, and conclusions were “arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law” and “without observance of procedure required by law.” How an agency managed and considered public comments may be relevant during judicial review. For example, one basis for a court’s reversal of an agency action has been that, upon review of the statement of basis and purposes, the court concludes the agency failed to consider or respond to relevant and significant comments. Conversely, courts have upheld agency rules when the courts have found the statement of basis and purposes demonstrate the agency considered the commenter’s arguments. The E-Government Act of 2002 requires agencies, to the extent practical, to accept comments “by electronic means” and to make available online the public comments and other materials included in the official rulemaking docket. Executive Order 13563 further states that regulations should be based, to the extent feasible, on the open exchange of information and perspectives. To promote this open exchange, to the extent feasible and permitted by law, most agencies are required to provide the public with a meaningful opportunity to participate in the regulatory process through the internet, to include timely online access to the rulemaking docket in an open format that can be easily searched and downloaded. Most agencies meet these responsibilities through Regulations.gov, a rulemaking website where users can find rulemaking materials and submit their comments, but all agencies are not required to use that platform. In October 2002, the eRulemaking Program was established as a cross-agency E-Government initiative and is currently based within EPA. The eRulemaking PMO leads the eRulemaking Program and is responsible for developing and implementing Regulations.gov, the public- facing comment website, and FDMS, which is the agency-facing side of the comment system used by participating agencies. As of March 2018, Regulations.gov identified 180 participating and 128 nonparticipating agencies. These agencies may be components of larger departmental agencies. Some nonparticipating agencies, including FCC and SEC, have their own agency-specific websites for receiving public comments. The comment systems within the scope of this report are as follows: FDMS and Regulations.gov: FDMS is federal government-wide document management system structured by dockets (or file folders) that offer an adaptable solution to service a wide range of regulatory activities routinely performed by federal agencies. The public-facing website of FDMS is Regulations.gov, which is an interactive website that allows the public to make comments on regulatory documents, review comments submitted by others, and access federal regulatory information. Regulations.gov allows commenters to submit comments to rulemakings by entering information directly in an electronic form on the Regulations.gov website. This form also allows commenters to attach files as part of their comment submission, and can be customized by each participating agency. Appendix II provides an example of one comment form from Regulations.gov. Additionally, all participating agencies allow comments to be submitted by mail or hand delivery. At their discretion, some participating agencies also allow comments to be submitted via email. See table 1. FCC’s Electronic Comment Filing System (ECFS): ECFS is a web- based application that allows anyone with access to the internet to submit comments to FCC rulemaking proceedings. ECFS allows commenters to submit comments to rulemakings through two main avenues: brief text comments submitted as Express filings, and long- form comments submitted as Standard filings. Both types of filings can be submitted through an ECFS comment form, which requires commenters to enter information directly into an electronic form on the ECFS website. See appendix III for examples of the comment forms used by ECFS. Additionally, interested parties with the appropriate technical capabilities can submit either type of filing directly to ECFS via a direct application programming interface (API) or through a public API that is registered with the website Data.gov. Filing comments through an API allows interested parties the ability to file a large number of comments without having to submit multiple individual comment forms. Finally, to accommodate a large volume of comment submissions for the 2015 Open Internet rulemaking, FCC allowed interested parties to submit Express comment filings in bulk through formatted CSV files that were submitted via a dedicated email address and then uploaded into ECFS. Similarly, for the 2017 Restoring Internet Freedom rulemaking, FCC allowed commenters to submit Express comment filings in bulk through a dedicated file- sharing website, and the comments were then uploaded into ECFS. With the exception of these two rulemakings, FCC does not allow comments to be submitted electronically outside of ECFS. Figure 2 shows how ECFS facilitates public commenting by using the processes discussed above. SEC’s Comment Letter Log: When SEC requests public comments on SEC rule proposals, the public can submit comments to rulemakings through an online form, which requires commenters to enter information in an electronic form on SEC’s website. This form also allows commenters to attach files as part of their submission. When commenters submit a comment, it is sent to SEC staff as an email. SEC also allows comments to be submitted via email and mail. After review, staff upload the comment and any associated data into the Comment Letter Log, which is the internal database that SEC staff use to manage the public comment process, and post the comment to the public website. See appendix IV for an example of a comment form on SEC’s website. Consistent with the discretion afforded by the APA, Regulations.gov and agency-specific comment websites use required and optional fields on comment forms to collect some identity information from commenters. In addition to the text of the comment, each participating agency may choose to collect identity information from the Regulations.gov comment form by requiring commenters to fill in other fields, such as name, address, and email address before they are able to submit a comment. Participating agencies may also choose to collect additional identity information through optional fields. For example, while EPA does not make any fields associated with identity information available to commenters, CFPB makes all fields available and requires that commenters enter something into the first name, last name, and organization name fields before a comment can be submitted. Table 2 shows the fields on Regulations.gov in which each of the participating agencies we analyzed require commenters to enter information and the optional fields available for commenters to voluntarily enter information. FCC requires that all commenters complete the following fields on both the Standard and Express comment forms in ECFS: (1) name, (2) postal address, and (3) the docket proceeding number to which they are submitting a comment. The ECFS comment form also allows commenters to voluntarily provide additional information in optional fields, such as email address. Similarly, SEC’s comment forms require commenters to provide (1) first and last name, (2) email address, and (3) the comment content, before a comment can be successfully submitted. The comment form also allows commenters to voluntarily provide other information in optional fields, such as their city and state. Regardless of the fields required by the comment form, the selected agencies all accept anonymous comments in practice. Specifically, in the comment forms on Regulations.gov, ECFS, and SEC’s website, a commenter can submit a comment under the name “Anonymous Anonymous,” enter a single letter in each required field, or provide a fabricated address. In each of these scenarios, as long as a character or characters are entered into the required fields, the comment will be accepted. Further, because the APA does not require agencies to authenticate submitted identity information, neither Regulations.gov nor the agency-specific comment websites contain mechanisms to check the validity of identity information that commenters submit through comment forms. As part of the Regulations.gov modernization effort, the Office of Information and Regulatory Affairs (within the Office of Management and Budget) and the Department of Justice proposed language for a disclosure statement on every comment form that would require the commenter to acknowledge that they are not using, without lawful authority, a means of identification of another person with any comment they are submitting. Commenters would be required to acknowledge their agreement with the statement before their comment could be submitted. According to PMO officials, even with this disclosure statement, anonymous comments would still be permitted and accepted by Regulations.gov. This disclosure statement was proposed in response to allegations of comments being submitted to rulemakings on behalf of individuals without their permission. As of April 2019, this proposed language has not yet been approved by the Executive Steering Committee for Regulations.gov. However, the proposed disclosure statement would be provided on the Regulations.gov comment form, and it is unclear whether similar information would be made available to commenters submitting comments via email or mail. In contrast to the other selected agencies, according to FCC officials, FCC rules require the submission of the commenter’s name and mailing address, or the name and mailing address of an attorney of record. However, in March 2002, FCC initiated a rulemaking related to the submission of truthful statements to the commission. Among other issues, FCC sought comment on whether rulemaking proceedings should be subject to an already existing rule that prohibited the submission of written misrepresentations or material omissions from entities that are subject to FCC regulation. In its final rule, issued in March 2003, FCC decided to continue to exempt comments to rulemakings from this rule because of the potential that such a requirement would hinder full and robust public participation in such policy-making proceedings by encouraging disputes over the truthfulness of the parties’ statements. According to FCC officials, to comply with APA requirements, the commission tries to minimize barriers that could prevent or discourage commenters from participating in the commenting process, and in practice accepts anonymous comments. See figure 3 for an example of an anonymous comment in ECFS. Additionally, in our survey of program offices with rulemaking responsibilities at selected agencies, 39 of 52 offices reported that they received anonymous comments on some rulemakings for which their office has been responsible since 2013. The remaining 13 offices responded that they did not receive or were unaware of receiving anonymous comments, though most of these offices do not have high levels of rulemaking activity or receive a high volume of comments. Regulations.gov and agency-specific comment websites also collect some information about public users’ interaction with their websites through application event logs and proxy server logs. This information, which can include a public user’s Internet Protocol (IP) address, browser type and operating system, and the time and date of webpage visits, is collected separately from the comment submission process as part of routine information technology management of system security and performance. The APA does not require agencies to collect or verify this type of information as part of the rulemaking process. Regulations.gov collects some information from commenters accessing the website but it is never linked to any specific comment. In Regulations.gov, proxy server logs capture information such as the country from which a user accesses the site, the user’s browser type and operating system, and the time and date of each page visit on the website. According to PMO officials, this information is provided to the eRulemaking PMO in summary statistics that are used to assess what information is of least interest to Regulations.gov visitors, determine technical design specifications of the website, and identify system performance problems. This information is collected about all public users visiting Regulations.gov, regardless of whether they submit a comment. Further, because the PMO receives this information in the form of summary statistics, it cannot be connected to any specific comment. The eRulemaking PMO also monitors IP addresses that interact with Regulations.gov via security firewalls, but, according to PMO officials, the web application firewall (WAF) logs (a type of application event log) have never been connected to specific comments, though in some cases the URL the blocked user was attempting to access may be captured in the log. FCC officials stated that the current ECFS application architecture does not facilitate FCC identifying the source IP address of the submitter of a specific comment filed in ECFS. FCC collects information about public users’ interactions with ECFS through its web-based application proxy server logs, including the IP address from which a user accesses the site and the date and time of the user’s interaction. However, ECFS does not obtain or store IP addresses as part of the comment data it collects when a public user ultimately submits a comment. Within the current architecture, ECFS would require officials to match date and time stamps from the proxy server log to the ECFS comment data to connect a given IP address to a specific comment. SEC officials stated it would be difficult to match the large number of daily hits to their general website to the much smaller number of comments submitted to their rulemaking proceedings. SEC collects information about public users’ interactions with the SEC.gov website through proxy server logs, including the IP address from which a user accesses the website and the user’s date, time, and URL requests. However, according to officials, a public user never directly interacts with the Comment Letter Log, and none of the information from the proxy log is included as part of the data it collects in association with comment submissions. Despite this difficulty, SEC officials stated that linking the proxy log data from the general SEC.gov website to a specific comment in the Comment Letter Log could be done on a case-by-case basis. Seven of 10 selected agencies have documented some internal guidance associated with the identity of commenters during the three phases of the public comment process, but the substance of this guidance varies, reflecting the differences among the agencies and their respective program offices. For example, as shown in table 3, BLM has no internal guidance related to identity information, while CFPB has internal guidance related to the comment intake and response to comments phases. For selected agencies that have guidance associated with the identity of commenters, it most frequently relates to the comment intake or response to comment phases of the public comment process. The guidance for these phases addresses activities such as managing duplicate comments (those with identical or near-identical comment text but varied identity information) or referring to commenters in a final rule. In addition, some agencies have guidance related to the use of identity information during comment analysis. Agencies are not required by the APA to develop internal guidance associated with the public comment process generally, or identity information specifically. For the three selected agencies that did not have identity-related guidance for the public comment process, cognizant officials told us such guidance has not been developed because identity information is not used as part of their rulemaking process. For example, BLM officials stated that the only instance in which identity information would be considered is when threatening comments are referred to law-enforcement agencies. According to our analysis of the internal guidance the selected agencies provided, five of the 10 agencies have documented identity-related guidance associated with the comment intake phase. (See table 4.) Identity-related guidance for the comment intake phase addresses posting comments and their associated identity information to public comment websites. The guidance generally falls into two categories: (1) the treatment of duplicate comments (those comments with identical or near-identical content, but unique identity information) and (2) the management of comments reported to have been submitted using false identity information. Four of the 10 selected agencies have documented guidance on defining and posting duplicate comments, which may also be referred to as mass mail campaigns. However, in accordance with the discretion afforded them under the APA, agency definitions of duplicate comments and recommendations on how to manage them during comment intake vary. Specifically, for EBSA and WHD—the selected agencies within the Department of Labor (DOL)—one comment letter with multiple signers is considered one comment, while the same comment submitted by multiple signers as separate letters is counted separately. In both cases, however, each individual signer may provide unique identity information. In contrast, EPA guidance states that mass mail submissions often include attachments containing either bundled duplicate messages or a single comment with multiple signatures. For EPA, each signature is counted as a duplicate comment submission. As of February 2019, CFPB’s draft guidance does not explicitly define duplicate comments, but it does note that “duplicate identical submissions” are not subject to the agency’s policy of posting all comments. Instead, the official responsible for managing the docket during comment intake may remove duplicate comments from posting or decide not to post them. According to CFPB officials, this policy is only applicable to comments that contain entirely identical comment content and identity information, and does not apply to mass mailing campaigns. Similarly, when DOL agencies receive duplicate comments as part of mass mail campaigns, the agency can choose to post a representative sample of the duplicate comment to Regulations.gov along with the tally of the duplicate or near-duplicate submissions, or post all comments as submitted. EPA guidance states that duplicate comments submitted as part of mass mailings are to be posted as a single primary document in Regulations.gov with a tally of the total number of duplicate comments received from that campaign. However, as discussed later in this report, EPA may post all duplicate comments it receives, depending on the format in which they are submitted. Five of the 10 selected agencies have documented internal guidance on how to manage posting comments that may have been submitted by someone falsely claiming to be the commenter. However, the procedures related to addressing comments with potentially false identity information also vary among agencies. For EBSA and WHD, guidance from DOL states that if a comment was submitted by someone falsely claiming to be the commenter, the identifying information is to be removed from the comment and the comment is treated as anonymous and remains posted. In cases where an individual claims that a comment was submitted to CFPB or SEC using the individual’s identity information without his or her consent, both agencies’ guidance provide staff with discretion to redact, reattribute, or otherwise anonymize the comment letter in question. According to internal guidance from CFPB, EPA, and SEC, if agency officials are able to confirm that a comment was submitted by someone falsely claiming to be the commenter, such as by the agency sending an email to the address associated with the comment, the comment may not be made available to the public. SEC officials stated that although they have discretion to remove the comment from public posting, the typical response is to encourage the individual making the claim to submit another comment correcting the record. Similarly, if a member of the public contacts EPA claiming that a comment was submitted using his or her identity information without consent and agency staff cannot confirm it, EPA guidance directs staff to ask the requester who submitted the claim to submit another comment to the docket explaining that the original comment was submitted without the individual’s consent. Both comments will be included in the docket. According to our analysis of the guidance the selected agencies provided, four of the 10 agencies have identity-related guidance for the comment analysis phase (see table 5). Identity-related guidance for the comment analysis phase includes criteria for coding comments for analysis, including by identifying the type of commenter (such as an individual or interest group). CMS guidance states that, during review, comments should be separated by issue area and tables may be used to assist in the grouping of comments and preparing briefing materials. While this guidance notes that these tables may be used to group commenters based on their identity during review, when summarizing comments later in the process the guidance indicates that CMS officials should avoid identifying commenters by name or organization. FDA training materials address how to prepare comment summaries to help ensure the agency has properly identified all comments regarding an issue. To conduct a quality-control check on the comment review process, FDA sorts the comments by commenter and reviews the comments from a sample of key stakeholders, including interested trade associations and consumer or patient groups, to confirm that relevant issues were identified. For EBSA and WHD, guidance from DOL recommends attaching the “organization name” to comments within a docket to improve transparency and help the agency and public users search for organizations within Regulations.gov. In addition, DOL guidance suggests flagging comments for additional review, including at least one flag based on identity. According to our analysis of the guidance the selected agencies provided, five of the 10 agencies have documented identity-related guidance for responding to comments. (See table 6.) Identity-related guidance for the response to comments phase includes guidance for agency officials on how, if at all, to address identity information related to comments in developing the final rule. As discussed previously, during comment analysis, CMS guidance indicates that officials should avoid identifying commenters by name or organization when summarizing comments. These summaries may then be used as a basis for the agency’s formal comment summary included in the preamble of the final rule. CFPB guidance states that a summary of the rulemaking process should be developed for the preamble of the final rule and include how many comments are received and from which type of commenter. CFPB is to describe both the commenters and comments in general terms rather than identify commenters by name or entity. For example, rather than naming a specific financial institution, CFPB may refer to “industry commenters” in the final rule. For EBSA and WHD, guidance from DOL states that when several commenters suggest the same approach to revising or modifying the proposed rule, the names of specific commenters can be cited as a list in a footnote. When choosing which commenter should appear first in the list, DOL agencies are to select the commenter with the strongest or most detailed discussion on the issue. However, it is not necessary to always identify commenters by name, and, according to DOL officials, the department’s general practice is not to do so. Instead, the agency may use phrases such as “several commenters,” or “comments by the ABC Corporation and others.” DOL agencies may also reference commenters by type rather than name, using terms including “municipal agency, state workforce agency, employer, academic representative, agency, and industry,” among others. FDA training materials recommend that the final rule include a very brief explanation of the number and scope of comments to the proposed rule, including who submitted them. Commenters are not identified as individuals, but rather by commenter type, such as trade associations, farms, or consumer advocacy organizations, among others. Within the discretion afforded by the APA, the 10 selected agencies’ treatment of identity information during the comment intake, comment analysis, and response to comments phases of the public comment process varies. Selected agencies differ in how they treat identity information during the comment intake phase, particularly in terms of how they post duplicate comments, which can lead to identity information being inconsistently presented to public users of comment systems. Selected agencies’ treatment of identity information during the comment analysis phase also varies. Specifically, program offices with responsibility for analyzing comments place varied importance on identity information during the analysis phase. All agencies draft a response to comments with their final rule, but the extent to which the agencies identify commenters or commenter types in their response also varies across the selected agencies. Within the discretion afforded by the APA and E-Government Act, selected agencies vary in how they treat identity information during the comment intake phase, which includes identifying duplicate comments and posting comments to the public website. Further, the way in which the selected agencies treat comments during the comment intake phase results in identity information being inconsistently presented on the public website. Generally, officials told us that their agencies either (1) maintain all comments within the comment system, or (2) maintain some duplicate comment records outside of the comment system, for instance, in email file archives. Specifically, officials from four selected agencies (CMS, FCC, FDA, and WHD) stated that they maintain all submitted comments in the comment system they use. Officials from the other six agencies (BLM, CFPB, EBSA, EPA, FWS, and SEC) stated that their agencies maintain some comment records associated with duplicate comments outside of the comment system. Among the four agencies that maintain all submitted comments within their comment system, our review of comment data showed that practices for posting duplicate comments led to some identity information or comment content being inconsistently presented on the public website. For example, according to CMS officials responsible for comment intake, CMS may post all duplicate comments individually, or post duplicate comments in batches. When duplicate comments are posted in batches, the comment title will include the name of the submitting organization followed by the total number of comments. However, as discussed previously, CMS does not have any documented policies or guidance associated with the comment intake process, and we identified examples where the practices described by CMS officials differed. On one CMS docket, for instance, staff entered more than 37,000 duplicate comments individually, with the commenter’s name and state identified in the comment title. However, the attached document included with each of the posted comments was an identical copy of one specific comment containing a single individual’s identity information. While all the individual names appear to have been retained in the comment titles, and the count of total comments is represented, any additional identity information and any potential modifications made to each duplicate comment submitted have not been retained either online or outside of FDMS, and are not presented on the public website. (See fig. 4.) Similarly, although our analysis of WHD comments did not suggest that any comments were missing from Regulations.gov, on one WHD docket almost 18,000 duplicate comments were associated with a single comment with one individual’s name identified in the comment title. While all of the comments are included within 10 separate attachments, none of the identity information included with these comments can be easily found without opening and searching all 10 attachments, most of which contain approximately 2,000 individual comments. (See fig. 5.) Our review of comment data showed that the selected agencies that maintain some comment records outside of the comment system (six of 10) also follow practices that can inconsistently present some identity information or comment content associated with duplicate comments. For BLM and FWS, agency officials responsible for comment intake stated that all comments received through Regulations.gov are posted, but a single example may be posted when duplicate paper comments are received. As discussed previously, neither BLM nor FWS have internal guidance or policy associated with comment intake. For CFPB, EBSA, EPA, and SEC, the agency may post a single example along with the total count of all duplicate comments, but does not necessarily post all duplicate comments online. Thus, identity information and unique comment contents for all duplicate comments may not be present on the public website. For example, on one CFPB comment, the agency posted an example of a submitted comment containing only the submitter’s illegible signature. None of the other associated identity information for the posted sample, or any of the duplicate comments, is included in the comment data. (See fig. 6.) Similarly, for all duplicate comments received, SEC posts a single example for each set of duplicate comments and indicates the total number of comments received. As a result, the identity information and any unique comment content beyond the first example are not present on the public website. (See fig. 7.) On the basis of the results from our survey, program offices with responsibility for analyzing comments differ in the importance they place on identity information during the analysis phase. Because subject-matter experts are responsible for reviewing public comments and considering whether changes to the proposed rule should be made, program offices generally analyze comments. Officials from all but one of the 52 program offices we surveyed responded that they were responsible, in whole or in part, for analyzing public comments. In our survey of program offices with regulatory responsibilities in the 10 selected agencies, at least one program office in each agency reported that the identity or organizational affiliation of a commenter is at least slightly important to comment analysis. Additionally, five of the 10 selected agencies (CMS, EPA, FCC, FDA, and FWS) had at least one program office that reported that the identity or organizational affiliation of a commenter is not at all important to comment analysis. None of the 52 program offices we surveyed responded that the identity of an individual commenter is extremely important to their analysis, while only one program office responded that the commenter’s organizational affiliation is extremely important to its analysis. (See fig. 8.) According to officials we interviewed from eight of the 10 selected agencies, the substance of the comment is considered during analysis rather than the submitted identity information. Officials from six of these agencies emphasized that because the agency accepts anonymous comments, identity is not relevant to their analysis of comments. However, officials from four of the eight selected agencies stated that, in certain instances, identity information may be noted. In the case of FDA, officials explained that commenters are required to indicate a category to which they belong, such as “individual consumer” or “academia.” According to FDA officials, however, these categories were used to assist in writing the comment response, rather than informing the analysis. Officials from the Department of the Interior’s Office of the Solicitor (responsible for part of the comment process at BLM and FWS) stated that the agency may make particular note of comments submitted by a law firm, as these comments can help the agency understand the position of the law firm and to prepare a defense in the event that a lawsuit is filed. Similarly, officials from EPA stated that they are familiar with many commenters and their positions on certain issues, due to prior legal interactions. In another example of how an agency may consider the identity of a commenter, officials from FWS stated that when scientific data are provided in support of a comment, subject-matter experts will verify the data and their source. All selected agencies draft a response to comments with their final rule, but the extent to which the agencies identify commenters in their response varies. In our survey of program offices with regulatory responsibility, officials from 51 of 52 offices stated that they are responsible in whole or in part for responding to comments. Of those responsible, at least one program office from eight of the 10 agencies (28 of 52 offices) reported that they identified comments by commenter name, organization, or comment ID number in the response to comments for at least some rulemakings since 2013. In the case of WHD, officials we interviewed explained that when they discuss a specific comment in the preamble to the final rule, they provide the name of the organization that submitted the comment so that anyone interested in locating the response to the comment may do so easily. We found that EBSA and FCC also identified commenters by individual or organizational name in their response to comments, while EPA referred to comments by their comment ID number. For example, in a rule finalized in 2018, EPA referred to comment ID numbers in the response to comments: “Two comments: EPA-R06-RCRA-2017-0556-0003 and EPA- R06-RCRA-2017-0556-0005 were submitted in favor of the issuance of the petition.” EPA officials noted that there is variation within the agency in terms of how commenters are identified when the agency is responding to comments, and there may be some situations where the commenter is identified by name. Officials from all program offices within CFPB and BLM responded to the survey that they never identified comments by commenter name, organization, or comment ID in their responses to public comments. In its response to comments in a 2014 final rule, for example, CFPB stated that “industry commenters also emphasized the need to coordinate with the States,” without specifying the organization or specific comments. Similarly, in its response to comments document for a 2016 rule, for example, BLM responded directly to the themes and issues raised by comments while stating that the issue was raised by “one commenter” or “some commenters.” The 10 selected agencies have implemented varied ways of posting identity information during the comment intake process, particularly regarding posting duplicate comments, as allowed by the APA. Our analysis of Regulations.gov and agency-specific comment websites shows that these practices are not always documented or clearly communicated to public users of the websites. Public users are members of the public interested in participating in the rulemaking process via Regulations.gov or agency-specific websites. They may or may not submit a comment. In part to facilitate effective public participation in the rulemaking process, the E-Government Act requires that all public comments and other materials associated with the rulemaking docket should be made “publicly available online to the extent practicable.” There may be situations where it is not practicable to post all submitted items, for example when resource constraints prevent the scanning and uploading of thousands of duplicate paper comments. Because the content of such comments is still reflected in the administrative record, such practices are not prohibited by the APA or the E-Government Act. However, key practices for transparently reporting open government data state that federal government websites—like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. This helps public users make informed decisions about how to use the data provided. In the case of identity information submitted with public comments, for example, public users may want to analyze identity information to better understand the geographic location from which comments are being submitted, and would need information about the availability of address information to do so. The Administrative Conference of the United States has made several recommendations related to managing electronic rulemaking dockets. These include recommendations that agencies disclose to the public their policies regarding the treatment of materials submitted to rulemaking dockets, such as those associated with protecting sensitive information submitted by the public. As described earlier in this report, the varied practices that selected agencies use with regard to identity information during the public comment process results in the inconsistent presentation of this information on the public websites, particularly when it is associated with duplicate comments. Although the APA and E-Government Act do not include any requirements associated with the collection or disclosure of identity information, we found that the selected agencies we reviewed do not effectively communicate the limitations and inconsistencies in how they post identity information associated with public comments. As a result, public users of the comment websites lack information related to data availability and limitations that could affect their ability to use the comment data and effectively participate in the rulemaking process themselves. Public users of Regulations.gov seeking to submit a comment are provided with a blanket disclosure statement related to how their identity information may be disclosed, and are generally directed to individual agency websites for additional detail about submitting comments. The Regulations.gov disclosure statements and additional agency-specific details are provided on the comment form, and a user seeking to review comments (rather than submit a comment) may not encounter them on Regulations.gov. Regulations.gov provides the following disclosure statement at the bottom of each comment submission form: Any information (e.g., personal or contact) you provide on this comment form or in an attachment may be publicly disclosed and searchable on the Internet and in a paper docket and will be provided to the Department or Agency issuing the notice. To view any additional information for submitting comments, such as anonymous or sensitive submissions, refer to the Privacy Notice and User Notice, the Federal Register notice on which you are commenting, and the Web site of the Department or Agency. Similar information is provided to all public users in the Privacy Notice, User Notice, and Privacy Impact Assessment for Regulations.gov and the eRulemaking Program. While all of these note that any information, personal or otherwise, submitted with comments may be publicly disclosed, public users are not provided any further detail on Regulations.gov regarding what information, including identity information, they should expect find in the comment data. We found that when Regulations.gov provides public users with additional agency-specific information about the comment intake process, including accepting and posting comments, it is typically provided in the context of the comment form and does not provide public users enough detail to determine what comment data will be available for use when searching comments that are already submitted. Specifically, each comment form contains a pop-up box under the heading “Alternate Ways to Comment,” which reflects the language associated with comment submission methods included in the NPRM on which individuals are seeking to comment. Additionally, three participating agencies in our review (EPA, FWS, and WHD) provide additional detail about posting practices on the comment form under the heading “Agency Posting Guidelines.” Both FWS and WHD indicate that the entire comment, including any identifying information, may be made available to the public. Although WHD follows DOL policy associated with posting duplicate comments, which allows some discretion in posting practices, according to a WHD official, without exception, all comments are posted to Regulations.gov. In our review of WHD comment data, we did not identify instances where this practice was not followed. The “Agency Posting Guidelines” provided by EPA inform public users that all versions of duplicate or near-duplicate comments as part of mass mail campaigns may not be posted; rather a representative sample will be provided, with a tally of the total number of duplicate comments received. (See fig. 9.) However, this information does not provide enough detail to help public users determine whether all of the individual comments and associated identity information are posted within this docket, because it indicates that samples are provided for duplicate comments, rather than all of the copies submitted. We found that one EPA docket received more than 350 separate sets of duplicate comments comprising a total of more than 4.3 million comments (as reported by Regulations.gov) but there is variation in how these comments were posted. Specifically, EPA inconsistently presented duplicate comments: 198 of the 350 duplicate comment sets in this docket were submitted via email. Of the duplicate comment sets submitted via email, 45 sets have all comments posted in Regulations.gov, while 153 sets have a sample of the comments posted. According to EPA officials, this inconsistency results from the format in which the comments were submitted. For example, when duplicate comments are compiled into a single document and submitted to EPA through one email, all of the comments will be posted, whereas duplicate comments that are emailed separately will be accounted for in the tally accompanying a sample comment. While the APA and the E-Government Act do not require comments to be posted in any particular way, EPA has established detailed internal guidance for the comment intake process for its Docket Center staff. This document is in draft form, but clearly lays out the processes EPA staff are expected to follow when duplicate comments are submitted in different ways, and what naming conventions will be used in different instances. However, EPA does not provide similar information to public users about the process it uses to determine whether all duplicate comments will be posted, making it challenging for public users to determine whether all comments are available on Regulations.gov. The eRulemaking PMO provides participating agencies with flexibility in how they choose to use FDMS and Regulations.gov, with each department or agency responsible for managing its own data within the website. As a result, Regulations.gov directs public users to participating agencies’ websites for additional information about agency-specific review and posting policies. We found that all of the selected participating agencies provide additional information of some kind about the public comment process on their own websites. However, the provided information usually directs users back to Regulations.gov or to the Federal Register. Further, even when selected participating agencies include details on their website about the agency’s posting practices or treatment of identity information associated with public comments, it does not fully describe data limitations that public users need to make informed decisions about how to use the data provided. Specifically, seven of the eight participating agencies (BLM, CMS, CFPB, EPA, FWS, FDA, and WHD) direct public users back to Regulations.gov and the Federal Register, either on webpages that are about the public comment process in general, or on pages containing information about specific NPRMs. As discussed previously, however, the disclosure statement on Regulations.gov directs public users to the agency website for additional information. Although three of these participating agencies (EPA, FWS, and FDA) do provide public users with information beyond directing them back to Regulations.gov or the Federal Register, only FDA provides users with details about posting practices that are not also made available on Regulations.gov. EPA: The additional information provided on EPA’s website largely replicates the “Agency Posting Guidelines” provided on the Regulations.gov comment form, as shown in figure 9. As discussed previously, however, the way in which EPA posts duplicate comments varies, and the provided information does not include details about the process the agency uses to determine whether all duplicate comments will be posted. FWS: One NPRM-specific web page that we identified communicated to public users that all comments will be posted on Regulations.gov, including any personal information provided through the process. This largely replicates the “Agency Posting Guidelines” provided on the Regulations.gov comment form, as well as language included in the NPRM itself. However, according to an FWS official, when the agency receives hard-copy duplicate comments through the mail, only one sample of the duplicate is posted publicly on Regulations.gov. FWS does not have any policies related to this practice and the information FWS provides to public users does not include details about how the agency determines which comment to post as the sample. FDA: On its general website, FDA includes a webpage titled, “Posting of Comments.” On this page, FDA provides users with a detailed explanation about a policy change the agency made in 2015 related to the posting of public comments submitted to rulemaking proceedings. Specifically, prior to October 2015, FDA did not publicly post comments submitted by individuals in their individual capacity. See figure 10. After October 15, 2015, FDA’s policy is to publicly post all comments to Regulations.gov, to include any identifying information submitted with the comment. In our review of FDA comments submitted to dockets opened since October 15, 2015, we did not identify instances where this policy was not followed. The one participating agency in our scope (EBSA) that does not direct public users back to Regulations.gov instead recreates the entire rulemaking docket on its own website. On the main EBSA webpage related to regulations, public users can find links to various websites related to rulemaking, including a “Public Comments” page, but not Regulations.gov. From the “Public Comments” page, public users can access pages that are specific to NPRMs and other activities for which EBSA is requesting public comments. On the NPRM-specific webpages, the rulemaking docket that can be found on Regulations.gov is duplicated, including individual links to each submitted comment. Certain document links, such as those for the proposed rule or final rule, direct a public user to the Federal Register document, but the comment links do not direct users to Regulations.gov. While EBSA follows DOL guidance associated with posting duplicate comments, which allows some discretion in posting practices, EBSA does not have a policy for how comments are posted to Regulations.gov or its own website, and in the examples we reviewed the content of the docket pages does not always match. According to EBSA officials, the agency began this practice prior to the development of Regulations.gov, and has continued it because internal staff and other stakeholders find the webpages useful. However, we have previously reported that reducing or eliminating duplicative government activities can help agencies provide more efficient and effective services. Further, on EBSA’s “Public Comments” webpage, public users are informed that comments with inappropriate content will be removed, but no other information associated with EBSA’s posting practices is provided on this general page. In one instance on an NPRM-specific webpage, public users are informed that identity information has been removed from certain comments due to the inclusion of personal health information, but most of the NPRM-specific webpages we reviewed did not include this disclosure. Additionally, duplicate comments are posted on the NPRM- specific webpages under the heading “Petitions,” and are posted with a number following the title of the comment. While public users are informed that the number represents the total number of comments submitted, not all links include a copy of each individual comment. This practice aligns with DOL guidance, but as a result, the way in which EBSA posts duplicate comments varies even within dockets, and the provided information does not include details about the process the agency uses to determine whether all duplicate comments will be posted. Additionally, because EBSA recreates rulemaking dockets on its own website without referencing Regulations.gov or explaining the process, public users lack assurance about how EBSA’s data sources relate to one another. Because participating agencies are not required to adhere to standardized posting practices, Regulations.gov directs public users to participating agency websites for additional information about posting practices and potential data limitations. However, the additional information provided on the selected agencies’ websites is rarely different from what is provided on Regulations.gov. Further, it does not describe the limitations associated with the identity information contained in publicly posted comments, and in many cases simply directs users back to Regulations.gov. As allowed for under the APA, all of the participating agencies in our review vary in the way in which they post identity information associated with comments—particularly duplicate comments. However, the lack of accompanying disclosures may potentially lead users to assume, for example, that only one entity has weighed in on an issue when, actually, that comment represents 500 comments. The APA, E-Government Act and relevant Executive Orders establish the importance of public participation in the rulemaking process, to include access to electronic rulemaking dockets in formats that can be easily searched and downloaded. Further, key practices for transparently reporting open government data state that federal government websites— like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. Without better information about the posting process, the inconsistency in the way in which duplicate comments are presented to public users of Regulations.gov limits public users’ ability to explore and use the data and could lead users to draw inaccurate conclusions about the public comments that were submitted and how agencies considered them during the rulemaking process. Both SEC and FCC use comment systems other than Regulations.gov and follow standardized posting processes associated with public comments submitted to their respective comment systems, but SEC has not clearly communicated these practices to the public. Although it appears to users of the SEC website that the agency follows a consistent process for posting duplicate comments, this practice has not been documented or communicated to public users of its website. As discussed earlier, SEC posts a single example for each set of duplicate comments and indicates the total number of comments received. As a result, the identity information and any unique comment content beyond the first example are not accessible to the public online. According to SEC officials, this practice is not documented in formal policy, and is not explicitly communicated to public users of the SEC’s comment website. Although SEC does provide public users with some information on its “How to Submit Comments” page, this information is limited to informing public users that all comments will be posted publicly, without any edits to personal identifying information, and no other information related to SEC’s posting process is provided. Without clearly communicated policies for posting comments, public users of SEC.gov do not have information related to data sources and limitations needed to determine whether and how they can use the data associated with public comments. In contrast, FCC identifies its policies for posting comments and their associated identity information in a number of places on the FCC.gov website, and on the ECFS web page within the general website. Regarding comments submitted to rulemaking proceedings through ECFS, public users are informed that all information submitted with comments, including identity information, will be made public. According to FCC officials, all comments are posted directly to ECFS as they are submitted, without intervention by FCC staff. Further, according to officials, all duplicate comments remain in ECFS as individual comments, unless an organization submits a Standard filing with an attached file containing multiple comments. Our review of ECFS comment data did not identify discrepancies with this practice. While the public comment process allows interested parties to state their views about prospective rules, the lack of communication with the public about the way in which agencies treat identity information during the posting process, particularly for duplicate comments, may inhibit users’ meaningful participation in the rulemaking process. While the APA does not include requirements for commenters to provide identity information, or for agency officials to include commenter identity as part of their consideration of comments, key practices for transparently reporting open government data state that federal government websites—like those used to facilitate the public comment process—should fully describe the publicly available data, to include disclosing data sources and limitations. Without clearly communicating how comments and their associated identity information are presented in the data, public users could draw inaccurate conclusions about public comments during the rulemaking process, limiting their ability to participate in the rulemaking process. Five selected agencies do not have a policy for posting comments, and the selected agencies generally do not clearly communicate to public users about the way in which they publicly post comments and their associated identity information. In addition, one agency fully duplicates rulemaking dockets on its own website, without informing users that the information may be found in a searchable database on Regulations.gov. Regulations.gov does not provide detailed information about posting policies, and seven of the eight participating agencies in the scope of our review direct public users back to Regulations.gov or the Federal Register on their own websites. Further, the available information is provided on the comment form, so public users seeking to review comment data that had been previously submitted may not encounter it. Because all of the participating agencies in our review vary in the way in which they post identity information associated with comments—particularly duplicate comments—the lack of accompanying disclosures may potentially lead users to reach inaccurate conclusions about who submitted a particular comment, or how many individuals weighed in on an issue. As a result, public users of Regulations.gov do not have information related to data sources and limitations that could affect their ability to effectively use the comment data and, consequently, participate in the rulemaking process. Similarly, users of SEC.gov do not have information related to data sources and limitations needed to determine whether and how they can use the data associated with public comments, because the agency lacks a policy for posting duplicate comments and associated identity information to the public. In short, more clearly communicated information about posting policies, particularly with regard to identity information and duplicate comments, could help public users make informed decisions about how to use the comment data these agencies provide, and how comments may have informed the rulemaking process. We are making the following eight recommendations to the Directors of BLM, CFPB, and FWS; the Administrators of CMS, EPA, and WHD; the Assistant Secretary of Labor for EBSA; and the Chairman of the SEC, respectively: The Director of BLM should create and implement a policy for standard posting requirements regarding comments and their identity information, particularly for duplicate comments, and should clearly communicate this policy to the public on the BLM website. (Recommendation 1) The Administrator of CMS should create and implement a policy for standard posting requirements regarding comments and their identity information, particularly for duplicate comments, and should clearly communicate this policy to the public on the CMS website. (Recommendation 2) The Director of CFPB should finalize its draft policy for posting comments and their identity information, particularly for duplicate comments, and clearly communicate it to the public on the CFPB website. (Recommendation 3) The Assistant Secretary of Labor for EBSA should 1. create and implement a policy for standard posting requirements regarding comments and their identity information, particularly for duplicate comments; 2. clearly communicate this policy to the public on the EBSA website; 3. evaluate the duplicative practice of replicating rulemaking dockets on the EBSA website, to either discontinue the practice or include a reference to Regulations.gov and explanation of how the pages relate to one another. (Recommendation 4) The Administrator of EPA should finalize its draft policy for posting comments and their identity information, particularly for duplicate comments, and clearly communicate it to the public on the EPA website. (Recommendation 5) The Director of FWS should create and implement a policy for standard posting requirements regarding comments and their identity information, particularly for duplicate comments, and should clearly communicate this policy to the public on the FWS website. (Recommendation 6) The Chairman of the SEC should develop a policy for posting duplicate comments and associated identity information and clearly communicate it to the public on the SEC website. (Recommendation 7) The Administrator of WHD should clearly communicate its policy for posting comments and their identity information, particularly for duplicate comments, to the public on the WHD website. (Recommendation 8) We provided drafts of this product for comment to CFPB, EPA, FCC, SEC, the Department of Health and Human Services, the Department of the Interior, and DOL. We received written comments from three of the selected agencies and the three Departments which are reproduced in appendixes V through X. All of the selected agencies generally agreed with the recommendations directed to them and indicated that they intended to take action to more clearly communicate their posting policies to the public. BLM, EBSA, FWS, and SEC also stated that they intend to develop written policies associated with posting comments. In its written comments, the Department of Health and Human Services stated that CMS already has policies for standard posting requirements. However, CMS could not provide us with this policy during the course of our review, and in the accompanying technical comments, officials stated that guidance associated with posting comments has not been formalized in a written document. Given that we found significant variation in the way that CMS posts comments, even within a single docket, we continue to believe that it is important for CMS to develop and implement a standard policy for posting comments and their identity information, in addition to communicating this policy to the public on the CMS website. CFPB and EPA also stated that they intend to finalize their draft policies for posting comments and their associated identity information. In addition, EPA included technical comments in its letter, which we considered and incorporated in this report as appropriate. FCC had no comments on the draft report, but provided technical comments, which we incorporated as appropriate. The remaining selected agencies and departments also provided technical comments, which we considered and incorporated in this report as appropriate. As arranged with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees; the Director of CFPB; the Administrator of EPA; the Chairmen of FCC and SEC; and the Secretaries of Health and Human Services, the Interior, and Labor. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XI. To determine how selected agencies treat identity information associated with public comments, in October 2018 we surveyed and received responses from 52 program offices within the selected agencies about their practices associated with comment intake (including identifying duplicate comments and posting comments to the public website), comment analysis (including reviewing comments and considering their content), and response to comments. To select the program offices to receive survey questionnaires about the public comment process, we first reviewed agency websites to identify all of the program offices in each of the selected agencies. We then identified program offices with regulatory responsibilities described by the websites and that had issued at least one Notice of Proposed Rulemaking (NPRM) from 2013 through 2017, and provided these lists to the selected agencies for confirmation. Table 7 lists the program offices we surveyed. We developed a draft survey questionnaire in conjunction with another GAO engagement team conducting work on the public comment process, and pretested it with program office officials from four of the selected agencies in August and September 2018. We interviewed these officials to improve the questionnaire and ensure that (1) the questions were clear and unbiased, (2) the information could be feasibly obtained by program office officials, (3) the response options were appropriate and reasonable, and (4) the survey did not create an undue burden on program office officials. The process of developing the survey was iterative, where we used the results of one pretest to modify the questionnaire for the next pretest. We distributed the questionnaires to the program offices as fillable Portable Document Format (PDF) forms, in October 2018 requesting that officials collaborate with others in their office to ensure the responses were reflective of the program office as a whole, rather than one individual’s experience. Two agencies, CMS and SEC, have agency-level administrative offices with centralized responsibilities for certain aspects of the public comment process. For these agencies, the selected program offices were instructed to leave certain questions blank, and we provided separate questionnaires for the administrative offices. All 52 program offices completed the survey, but the results cannot be generalized to program offices outside of the selected agencies. In developing, administering, and analyzing this survey, we took steps to minimize the potential errors that may result from the practical difficulties of conducting any survey. Because we surveyed and received responses from all program offices with regulatory responsibilities in the selected agencies, our results are not subject to sampling or nonresponse error. We pretested and reviewed our questionnaire to minimize measurement error that can arise from differences in how questions are interpreted and the sources of information available to respondents. We also answered questions from program offices during the survey, reviewed completed questionnaires, and conducted follow-up as necessary. On the basis of this follow-up and with agreement from the responding officials, we edited responses as needed. For CMS and SEC, we edited the blank questions in the program office questionnaires with responses from their administrative offices. Comments are submitted to Regulations.gov via an electronic comment form. See figure 11 for an example of a comment form from Regulations.gov. The Federal Communications Commission’s (FCC) Electronic Comment Filing System (ECFS) allows commenters to submit comments to rulemaking proceedings via a Standard filing and Express filing. A Standard filing allows commenters to attach a file to their comment. See figure 12 for an example of a Standard filing. An Express filing does not allow for files to be attached. See figure 13 for an example of an Express filing. One way in which comments are submitted to the Securities and Exchange Commission (SEC) is through an electronic comment form. See figure 14 for an example of a comment form from SEC.gov. In addition to the contact named above, David Bruno (Assistant Director), Elizabeth Kowalewski (Analyst in Charge), Enyinnaya David Aja, Gretel Clarke, Lauren Kirkpatrick, James Murphy, Alexandria Palmer, Carl Ramirez, Shana Wallace, and April Yeaney made key contributions to this report. Other contributors include Tim Bober, Dahlia Darwiche, Colin Fallon, Justin Fisher, James Healy, Katie LeFevre, Barbara Lewis, and Maria McMullen.", "summary": "Federal agencies publish on average 3,700 proposed rules yearly and are generally required to provide interested persons (commenters) an opportunity to comment on these rules. In recent years, some high-profile rulemakings have received extremely large numbers of comments, raising questions about how agencies manage the identity information associated with comments. While the APA does not require the disclosure of identifying information from a commenter, agencies may choose to collect this information. This report examines (1) the identity information collected by Regulations.gov and agency-specific comment websites; (2) the guidance agencies have related to the identity of commenters; (3) how selected agencies treat identity information; and (4) the extent to which selected agencies clearly communicate their practices associated with identity information. GAO selected a nongeneralizable sample of 10 federal agencies on the basis of large comment volume. GAO surveyed 52 program offices within these agencies about their comment process; and reviewed comment websites, agency guidance, and posted comment data. GAO also interviewed relevant agency officials. The Administrative Procedure Act (APA) governs the process by which many federal agencies develop and issue regulations, which includes the public comment process (see figure below). Regulations.gov and agency-specific comment websites collect some identity information—such as name, email, or address—from commenters who choose to provide it during the public comment process. The APA does not require commenters to disclose identity information when submitting comments. In addition, agencies have no obligation under the APA to verify the identity of such parties during the rulemaking process. GAO found that seven of 10 selected agencies have some internal guidance associated with the identity of commenters, but the substance varies, reflecting the differences among the agencies. The guidance most frequently relates to the comment intake or response to comment phases of the public comment process. With the discretion afforded by the APA, selected agencies' treatment of commenters' identity information varies, particularly when posting duplicate comments (identical or near-identical comment text but varied identity information). Generally, officials told GAO that their agencies (1) post all comments within the comment system; or (2) maintain some comments outside of the system, such as in email file archives. For instance, one agency posts a single example of duplicate comments and indicates the total number of comments received. However, within these broad categories, posting practices vary considerably—even within the same agency—and identity information is inconsistently presented on public websites. Selected agencies do not clearly communicate their practices for how comments and identity information are posted. GAO's key practices for transparently reporting government data state that federal government websites should disclose data sources and limitations to help public users make informed decisions about how to use the data. As a result, public users of the comment websites could reach inaccurate conclusions about who submitted a particular comment, or how many individuals commented on an issue. GAO is making a total of eight recommendations to the selected agencies to more clearly communicate to the public their policies for posting comments and associated identity information to Regulations.gov and agency-specific comment websites. The selected agencies generally agreed with the recommendations.", "document_type": "gao"}
{"report": "Local educational agencies (referred to in this report as school districts or districts) receive funding for education primarily from state and local sources. School districts can typically use this funding for a wide range of purposes, including school maintenance and operations. Maintenance may include routine replacement of lighting, filters, or building system parts, as well as emergency repairs to building systems. According to Education, maintenance and operations may also cover care and upkeep of grounds and equipment, vehicles (other than student transportation), and security. When school districts need to construct, renovate, replace, or make major repairs to building systems or features, such as roofing or plumbing, they typically use capital funding, which is separate from funding used for maintenance and operations. School districts use various mechanisms to fund capital projects. The specific funding mechanisms available to a given school district may differ based on state laws or regulations, and may require approval from state or local voters. A common funding mechanism for capital projects is to issue bonds. Bonds are debt securities issued by states, school districts, and other governmental entities and are repaid with interest, often through local property taxes or other types of local revenue. In some states, school districts might also use funding mechanisms called capital reserves and sinking funds to raise funds for school facilities projects. Capital reserves allow districts to hold end-of-year surpluses of general education funding in a capital reserve fund, which typically grows over time and can be used for large-scale projects. Sinking funds are usually generated from local property taxes and allow districts to set aside a percentage of property taxes each year to be used for capital projects. Districts do not pay interest because the funds are not borrowed; however, the funds generated may not be sufficient for large-scale projects. In specific circumstances, some federal funding is available for school facilities. For example, Education administers the Impact Aid program, which compensates local school districts that, among other things, have lost property tax revenue due to federal activities. This may include the presence of tax-exempt federal property, such as a military installation, children in public schools whose parents work and live on federal property, or children living on Indian lands. In fiscal year 2019, Education provided $17.4 million in Impact Aid grants to school districts, specifically for construction, renovation, or repair of school facilities. Additionally, the Federal Emergency Management Agency (FEMA) provides funding for school districts affected by some natural disasters, partly to repair and replace damaged buildings. For example, in 2019, following Hurricane Harvey, FEMA awarded grants to two school districts in Texas to set up a temporary middle school and replace books, equipment, and furniture, among other things. A facilities condition assessment is a systematic inspection of building systems and features using a standardized method for recording observations about condition. For example, one might walk through a building, record the condition of building systems and features, and identify deficiencies. Individuals conducting these assessments may also review documentation on the building systems, conduct interviews with administrators or other stakeholders, and develop cost estimates of physical deficiencies. Facilities condition assessments help districts identify deferred maintenance needs in schools, which can help them plan and budget for facilities. School districts can use data gathered from these assessments to develop a facility condition index (FCI). FCIs provide a point-in-time comparison of the cost of repairing deficiencies in a building with the cost of replacing the building, and can help school districts compare conditions across their facilities. FCIs may also help school districts budget for targeted replacements or improvements of building systems. Based on our nationally representative survey of school districts, we estimate that about half (54 percent) of districts need to update or replace at least two building systems in many of their schools. Further, we estimate about a quarter of districts (26 percent) need to update or replace at least six systems in many of their schools. In terms of specific building systems and features, we estimate that 41 percent of school districts need to update or replace HVAC systems in at least half their schools (about 36,000 schools nationwide). We also estimate about a quarter of districts need to update or replace other building systems, including interior lighting, roofing, safety and security systems, or plumbing in at least half their schools (see fig. 2). We saw similar results among the 55 schools we visited. Of those, 28 had HVAC issues, such as older systems that frequently malfunction or leak and damage flooring or ceiling tiles, according to our observations and discussions with district and school officials. For example, one school we visited in Rhode Island had parts or components of their operating HVAC systems that were nearly 100 years old, according to district officials (see fig. 3). In Michigan, we visited one school that district officials said used an original boiler from the 1920s to heat the building. According to district officials, older boilers are labor-intensive to maintain because city code requires an engineer to be on site when each boiler is operating; without constant monitoring when in operation, the boilers could build up too much pressure and explode. Officials in a New Mexico district said their mechanical systems experience issues because hard water (i.e., water with a high concentration of minerals) damages the systems and causes them to malfunction. Because of the hard water, the district spent $150,000 to replace an 8-year-old boiler that, according to district officials, should have lasted 20 years. District officials said they would like to purchase filtration and water softening systems to address the issue, but that the district cannot afford to do so. If not addressed, HVAC issues can result in health and safety problems. Officials in several school districts we visited said there are serious consequences to not maintaining or updating HVAC systems, including lost educational time due to school closings and the potential for mold and air quality issues (see fig. 4). For example, officials in a Michigan district said about 60 percent of their schools do not have air conditioning, and in 2019, some temporarily adjusted schedules due to extreme heat. Without air conditioning, schools relied on open windows and fans, which were not always effective at cooling buildings to safe temperatures for students and staff, according to district officials. Officials in a Maryland district said the district retrofitted some schools with air conditioning, but did not update pipes and insulation serving the HVAC systems, which has caused moisture and condensation problems in these buildings. Officials were concerned the moisture and condensation could lead to air quality and mold problems, but said that to remedy these issues could cost over $1 million for each building. School districts also reported needing to update or replace other key building systems and features. Based on our school district survey, we estimate that about 30,000 schools need to update or replace interior lighting and about 28,000 schools need to update or replace roofing. Of the 55 schools we visited, some had recently updated or replaced these systems, while others continued to face challenges. For example, 15 schools had installed light emitting diode (LED) systems or incorporated other energy efficient features, such as motion sensors to turn off lights in unused rooms or automatic dimmers that adjust based on the amount of daylight in a given space (see fig. 5). Six schools had not recently updated their interior lighting, but officials expressed a desire to do so in the near future, such as by switching to LED systems. Some district officials said LED systems can reduce energy consumption and utility costs. Of the 55 schools we visited, 18 had problems with their roofing, according to district and school officials. Roofing problems ranged from small leaks to larger issues requiring a costly replacement (see fig. 6). For example, officials in a Rhode Island district said that replacing the roofing at one school would likely cost about $3 million. These officials said, because the district did not have the funds to replace it, they instead planned to spend $20,000 on temporary fixes, with the hope that these fixes would last until funding was available for a full replacement. Based on our survey of school districts, we estimate that 65 percent of districts had conducted a facilities condition assessment of their schools at least once in the last 10 years and about 35 percent had not or did not know if their district had (see fig. 7). Of the districts that had conducted these assessments, almost all did so to evaluate safety and hazards (99.6 percent) and support capital planning, including prioritizing large- scale projects (96.6 percent). Additionally, of these districts, an estimated: 86.2 percent assessed facilities at every school in their district; 68.6 percent evaluated their facilities at least every 5 years; and 39.5 percent hired contractors or professional firms to conduct the assessment. We estimate that at least 53 percent of all students in the nation attended a school that had a facilities condition assessment in the last 5 years. We estimate that 16 percent of districts had not conducted a facilities condition assessment in the last 10 years. In our survey, several districts provided reasons why they had not done so, including a lack of available funding or because they assessed school conditions through other mechanisms, such as informal walkthroughs. In addition to district-level facilities condition assessments, 11 states conducted a state-level facilities condition assessment in the last 10 years, according to our state survey (see fig. 8). Common reasons provided by these states for evaluating school facilities included to assess safety and hazards (9 states) and provide facilities information to the public (9 states). However, most states (38 of 49) either had not conducted or did not know if their state had conducted a state-level facilities condition assessment. Of these 38 states: 15 states reported they required school districts to conduct 21 states reported that they neither conduct statewide assessments nor require school districts to do so; and, Two states did not know if their state had conducted such an assessment. States that had not conducted a statewide facilities condition assessment or required districts to do so frequently said they do not assess school conditions because school districts are primarily responsible for addressing deficiencies with school facilities. Most of the districts we visited said they had conducted a facilities condition assessment. Specifically, of the 16 school districts we visited in six states, officials in 12 districts said they had recently conducted a facilities condition assessment for a variety of reasons, such as to develop facilities master plans or raise support for a bond. For example, officials in one urban California district said they conducted an extensive facilities condition assessment for planning purposes and developed a master plan of issues identified in schools 20 years or older. During the assessment, the district assigned barcodes to certain systems, such as HVAC and water fountains, to track conditions across schools (see fig. 9). District officials said they update facilities data as they complete projects. Officials in a rural Michigan district said they conducted an assessment before asking voters to approve a sinking fund. District staff identified the value, age, cost for repairs, and expected lifecycle of all major systems, which helped them estimate funding needs for the next 10 years. Officials in one Florida district said they do not conduct facilities condition assessments because the district is small and the facilities manager knows the condition of their schools and when facilities’ issues arise. Of the six states we visited, officials from Rhode Island and New Mexico said their states had conducted statewide facilities condition assessments and Florida officials reported requiring school districts to conduct these assessments. Officials in Rhode Island and New Mexico said data from these assessments help determine state funding for districts. For example, according to officials, Rhode Island hired a consulting firm to assess school facilities in order to develop an independent estimate of the statewide funding need; in 2017, that estimate was about $3 billion. Officials in three of the states we visited—Michigan, California, and Maryland—said their states had neither conducted a facilities condition assessment nor reported requiring school districts to do so. Officials in Michigan said their state provides no funding for school facilities nor requires districts to conduct facilities condition assessments because districts are responsible for planning and prioritizing school facilities’ needs. Michigan officials said districts often assess facility conditions before seeking bonds or other local funding to show local voters the level of need. Officials in California similarly said that school districts are primarily responsible for evaluating school conditions and noted that it would be cost-prohibitive for the state to conduct a statewide assessment, given the number of schools in the state. Maryland officials said the state has not had funding to conduct a statewide assessment since 2003, but they are currently planning a future statewide assessment. After this initial assessment, the state plans to assess each school facility every 3 to 4 years, according to these officials. In addition to key building systems such as HVAC, lighting, and roofing, school districts considered the need to ensure schools are free from health hazards, as well as update schools with modern educational spaces and features. Specifically, based on our survey, we estimate that school districts’ high priorities when updating or renovating school facilities are as follows: security (estimated 92 percent), student access to technology (87 percent), monitoring hazards to student and staff health (78 percent), and improving telecommunication features such as wireless internet (74 percent). In comparison, the 100 largest school districts, which serve approximately 10.4 million students, identified security (estimated 99 percent), monitoring health hazards (94 percent), and completing projects to increase physical accessibility for students with disabilities (86 percent) as their high priorities. Overall, in response to our survey, districts ranked the level of priority of each building system or feature on a categorical scale of five levels, which we assigned numerical rankings of 1 (not a priority) to 5 (top priority). Average priority ratings ranged from approximately 4.5 for safety and security to approximately 2.9 for access to natural light (see fig. 10). Similarly, officials in nearly all of the 16 school districts we visited told us that some combination of addressing urgent health hazards, improving security, and upgrading technology were among their top priorities. In addition, district staff told us they were undertaking projects to modernize spaces and improve the learning environment, when possible. Districts implemented these priorities differently based on their needs and resources. Many school district officials said they address facility issues that affect staff and student health with more urgency than many other issues. At schools we visited around the country, officials reported initiatives to address health concerns that ranged from total renovations to temporary mitigation programs (see fig. 11). For example, officials in a district in California told us that in two schools we visited they removed all materials containing lead, as well as replaced all roofs that contained asbestos, in accordance with health and safety regulations. These officials also said staff tests the water quality in all schools per recommended guidelines. In a different district, officials said they had concerns about water quality, but that they did not have the funding to remediate the issue in all schools. Therefore, the district provides bottled water to students in nearly all of its schools, and installs water filtration systems when it constructs or renovates schools. In several schools in five states we visited, officials said there is asbestos in floor or ceiling tiles or other materials that would require abatement during any renovation. Because abatement increases costs, schools may prioritize other projects or find workarounds. For example, at one high school in Florida, the district installed interactive white boards on top of old chalkboards rather than risk disturbing asbestos in the walls by removing the chalkboards. Officials in two districts also told us about addressing potential health hazards related to climate. For example, at a school in Florida, officials said they have to address mold and mildew issues due to frequent flooding and high humidity. During heavy storms, school personnel work to clear drains and place sandbags in an attempt to mitigate water intrusion and flooding. In 13 of the 16 districts we visited, officials told us that security has become a top priority, though the specific measures they took to update their security features varied considerably (see fig. 12). One high school we visited recently experienced a school shooting. District officials said they were implementing a variety of new security initiatives, first at the high school, and then at all other schools in the district. In the high school, officials applied a specialized film to exterior windows to make them bullet resistant. The school has a new security vestibule where visitors wait before entering the school, and staff placed comment boxes throughout the school encouraging students to submit safety tips. In Michigan, we visited a middle school that installed additional barricades on classroom doors, and trained students on how to use them during lockdown drills. In California, we visited an elementary school that added exterior windows to the front office so staff could see visitors approaching, and installed a lockdown alarm button. Officials from some districts we visited said they prioritized security over failing building systems. For example, one district in Rhode Island where we observed problems with key building systems, including ceiling damage from a leaking roof, broken windows, and holes in the walls and foundation of a school building, installed new security features throughout their schools. These included equipping classroom doors with electronic lockdown mechanisms that staff can activate remotely. The district updated the main entrance with heavy, reinforced doors and bulletproof glass. In a district in Florida, we visited an elementary school that updated security systems, including installing new cameras. This was despite the school having major challenges with its HVAC system that require maintenance staff to go up to the roof every day to adjust the air conditioning. In addition, we observed multiple buckets throughout the school to collect water leaking through the roof, and the principal described how it frequently “rained” in her office. District officials said they are seeking state funding to renovate the entire school, but decided to first address security updates because all classrooms have exterior doors, making it difficult to control access to the school. In this same district, officials told us they had recently renovated the middle-high school and ensured that all classrooms had “hard corners”—spaces where students could congregate and not be visible to an active shooter in the hallway. Officials in many school districts we visited said that ensuring adequate access to technology was necessary for students to be successful academically (see fig. 13). All schools we visited had WiFi access, though officials in one rural district in New Mexico described access as spotty. The majority of schools we visited provided a laptop or tablet to all or almost all students or had a goal to do so. Officials in a district in California said their most important project of the past decade was to update their fiber optic capability to have a robust WiFi network. All students in this district receive a laptop or tablet beginning in second grade, and officials said these updates allowed students to easily use devices in school. In some school districts that did not provide individual devices, schools had portable technology carts to store and charge devices, so students could access them as needed. Officials in districts we visited also said they use technology to enhance educational offerings. For example, a high school in Maryland equipped a classroom with cameras and a microphone so students could attend community college classes remotely. When renovating schools, some officials told us they incorporate and anticipate technology needs. For example, a newly renovated school in Florida installed electrical outlets on table surfaces in the media center and microphones in all classrooms so students could hear teachers better. At a newly renovated school in Maryland, officials installed a projector and sound system in the cafeteria for students to watch movies and listen to music during lunch, which they said created calmer lunch breaks. Officials in districts we visited said they chose among other competing facility priorities based on available funding as well as conditions at individual schools, such as the age and condition of buildings, timeframe constraints, public opinion, space constraints, and enrollment projections. In school districts we visited that reported having local taxes or bond funds available for facility projects, officials described both the need to address the condition of basic building systems and the need to renovate schools with modern educational spaces and features. For example, officials in a Rhode Island district said they are using most of the approximately $300 million in their 5-year capital plan to ensure schools are safe, warm, and dry. These district officials estimated their school facilities need over $1 billion in updates and replacements to key building systems, based on a recent assessment. However, they said they are using 25 percent of available capital funds to modernize educational spaces, such as collaborative workspaces, student common areas, and outdoor classrooms (see fig. 14 for examples of school modernizations in districts we visited). Officials said that participants in public forums preferred educational enhancements over facility repairs. In this same district, officials said they prioritized system repairs they can complete over the summer because the district does not have designated swing spaces to accommodate students during the school year. In a district in Florida, officials similarly described using the funding from a $1 billion bond for school facilities to address health and safety concerns, HVAC issues, and roofing. They balanced these building system repairs with projects to modernize buildings, including increasing natural light by replacing the windows, upgrading technology to support engineering and robotics programs, and creating open and collaborative spaces. See textbox for examples of how school officials told us school renovations improved student experiences. Additionally, several districts we visited considered enrollment and building capacity to help prioritize projects, but they faced different challenges. Specifically, some districts experienced space constraints and needed to ensure sufficient space for all students, while others had the opposite challenge of maintaining schools that were under-enrolled (see text box). In a district in California, officials said they built nine schools in the past decade because of the increasing student population. At a high school in Maryland, the principal said his priority was ensuring sufficient space because the school was at capacity and he was struggling to find additional classrooms and furniture. Due to population fluctuations at a nearby military installation, he said he often turns offices and workspaces into classrooms and vice versa. Conversely, in a district we visited in Michigan, officials said they struggled with the inefficiencies of maintaining school facilities with low enrollment because closing schools can be difficult, given how it can affect currently enrolled students and neighborhoods. Based on our survey of school districts, funding for school facilities primarily came from local sources for about half of school districts. Specifically, an estimated 55 percent of districts used local funding as their primary source for school facilities, compared to state (36 percent) and federal (1 percent) funding. Based on our survey analysis, we found significant differences in the primary funding sources for school facilities for high-poverty and low-poverty districts. Specifically, high-poverty districts more commonly relied on state funding to address facility needs than low-poverty districts, whereas low-poverty districts more commonly relied on local funding (see fig. 15). School districts reported using several funding mechanisms to access local funding for school facilities projects. The most common was property taxes, which an estimated 77 percent of all school districts used for school facilities. Other local funding came from grants, bonds, other taxes, and public-private partnerships (see fig. 16). Similar to our findings on the sources of school facilities funding, based on our survey analysis we found significant differences in the local funding mechanisms used by high-poverty and low-poverty districts. Specifically, high-poverty districts used property taxes less commonly than low-poverty districts. As noted above, high-poverty districts instead more commonly relied on state funding to address facility needs. We also analyzed federal data on school district expenditures for school facilities and found differences by poverty level (see text box). Spotlight: Federal Data on School District Expenditures for Capital Construction Each year, Education collects data on school district expenditures for capital construction. In school year 2015-16, this spending totaled $44.6 billion. We analyzed these data by school district characteristics: Poverty: Capital construction expenditures, on average, were about $300 less per student in high-poverty districts ($719 per student) compared to low-poverty districts ($1,016). About 1.5 million more students attended school in high-poverty districts than low-poverty districts in 2015-16. Low-poverty districts spent about $1 billion more on capital construction than high-poverty districts that year. Size: Capital construction expenditures per student were similar in the largest (by number of students enrolled) 100 districts compared to smaller districts. Both groups of districts, on average, spent $837 per student on capital construction in school year 2015-16. Locale: Capital construction expenditures per student were similar, on average, for urban ($838 per student) and rural districts ($834). Officials in school districts we visited described various challenges they faced in securing funding for school facilities and how they have managed with limited funding. For example, officials in a Michigan district said the district had $1.5 billion in outstanding bond repayments and state borrowing related to bond repayments. As a result, the district is unable to issue an additional secured bond to fund new school facilities projects. According to officials, Michigan does not provide state-level funding for school facilities, so the district funded some recent school facilities projects using general education surpluses resulting from staff vacancies. However, as the district hired teachers and other staff, funding for facilities will decline, further limiting the district’s ability to address issues with school facilities. That district has also deferred maintenance in order to handle emergency repairs, according to officials. Officials in a high- poverty district in one state we visited said their tax base generates minimal local revenue for school facilities. According to officials, the district is mostly dependent on state funding. In the past decade, the state established a partnership between various public entities, which provided $1 billion to the district to address school facility needs, according to district officials. Officials said the funding through this partnership was enough to renovate about 25 schools. However, officials estimated the district has about $5 billion in unmet needs, and its 2012 facilities condition assessment recommended it consider replacing 50 schools. We also visited districts that have consistently had access to funding for school facilities. For example, officials in one low-poverty California district said their district is generally able to obtain funds needed for school facilities projects, primarily through local taxes and passing general obligation bonds. Officials said there are currently few challenges with the condition of the district’s school facilities because of routine and preventive maintenance. Though school districts most commonly used local funding to address school facility needs, 36 states provided some level of capital funding to school districts for school construction or renovations, based on our state survey (see fig. 17). In addition, states reported using various criteria to determine funding for capital projects, including the condition of a district’s schools (23 states), type of project, such as HVAC or fire safety (22), and size of the student population (18). Fewer states (17) reported providing districts with funding for maintenance and operations—used for routine upkeep and replacement of building system parts—separate from general education funding. State support for school facilities similarly varied within and among the six states that we visited. Five of the six states we visited reported providing state-level capital funding for school facilities, although the amount and mechanisms differed. For example, according to state officials, New Mexico has a capital fund for schools supported through taxes on the oil and gas industry and bases its state funding on a school’s condition. These officials described how New Mexico assesses and ranks all schools based on the condition of their facilities, and funds projects starting with the highest priority school on the list, until each year’s funds are depleted. The state uses capital funds to match local dollars. The percentage of a project’s cost covered by the state depends on the district’s ability to raise local funds. In one district we visited, the state pays 100 percent. Florida targets funding for school facilities to rural districts and charter schools, both of which have limited access to local funding sources such as property taxes, according to officials. These officials said the state has a specific program to support capital projects in rural districts, and other funding—generated from taxes on landlines and utilities—has in recent years gone to charter schools. In California, districts receive state funding based on the order the state receives eligible applications, until funds are depleted, according to state officials. Michigan officials said the state does not fund school facilities projects at the state level, although the state has a program to review school districts’ local bond measures. The state does not require school districts to submit their bonds for state approval, but doing so allows the district to access the state’s credit rating, which usually lowers the district’s interest rate, among other benefits, according to these officials. In three states we visited, state officials we interviewed told us that financial support for capital projects may fluctuate each year depending on availability of state funding. For example, Rhode Island officials said that after the 2007-2009 recession, the state legislature stopped funding school facilities until 2015. This resulted in deferred maintenance in Rhode Island’s schools that the state and school districts now need to address in addition to any new capital projects, according to officials. Based on our state survey, five states require districts to use a portion of their general education funding for maintenance and operations. Three of these states reported requiring districts to use 3 percent or less of their general education funding for this purpose, one state reported requiring districts to use 6 percent, and one state did not know what percent was required. Officials in Rhode Island said they have a new policy to require districts to set aside a portion of the state funds they receive for maintenance and operations to protect the state’s increasing investment in school facilities, and that the state is phasing in the requirement over 5 years. Officials in New Mexico said that while they do not require this type of set aside, they evaluate how well districts maintain their facilities, and districts that inadequately maintain them may be ineligible for some types of state facilities funding. Many states also reported that they considered state-level priorities for school facilities when providing funding and guidance to school districts. Based on our survey, more than half of states provided financial support, as well as standards and guidance, for specific building systems and features of school facilities (see fig. 18). State funding and guidance related to state-level priorities can affect school district decisions on facilities. For example, Rhode Island approved a $250 million state bond for school facilities in 2018, and will provide higher reimbursements for district expenditures on projects reflecting state priorities, such as health and safety and decreasing overcrowding, according to state officials. In two rural districts within two states, district officials told us they cannot afford to undertake capital projects without state funding, and therefore have to balance state requirements with local needs and preferences for their facilities. For example, one district in New Mexico opted to renovate an existing gym using state matching funds, rather than fully replace it, because this allowed the district to maintain existing square footage. According to officials in that district, the state developed standards for how large a gym can be and still receive state funding for a full replacement, and the district prioritized renovating and maintaining the larger existing space instead. We provided a draft of this report to the Department of Education (Education) for review and comment. We also provided selected draft excerpts to relevant officials we interviewed in state agencies and school districts. Education as well as several state and district officials provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Education, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. In this report, we examined: (1) the common facility condition issues school districts identify in public schools and how they have done so and (2) school districts’ highest priorities for their school facility renovations and updates, and how districts and states fund them. To address these objectives, we used the following methodologies, which we describe in detail below: Surveyed all 50 states and the District of Columbia. Surveyed a nationally representative sample of K-12 public school districts. Visited 16 school districts in six states and interviewed state, district, and school staff. Conducted building walkthroughs at 55 schools (including five charter schools) and observed a standard set of building systems and features in each school. Analyzed federal data on district expenditures for capital construction projects. We took several steps to inform each of our methodologies and provide background for our objectives. To better understand the federal role in school facilities, we interviewed officials from the Department of Education’s (Education) National Center for Education Statistics (NCES), as well as Education’s Office of Impact Aid Programs and the Office for Civil Rights. During these interviews, we asked officials about their role in collecting information on the condition of school facilities, as well as providing funding and guidance on school facilities, among other topics. We also interviewed officials from the National Association of Federally Impacted Schools and the National Indian Impacted Schools Association to learn about facility concerns in public school districts that receive federal Impact Aid. We reviewed federal documentation including NCES’s 2014 report, Condition of America’s Public School Facilities: 2012-13 and the Congressional Research Service’s 2015 report on federal programs related to school facilities. In addition, we reviewed guidance from the Environmental Protection Agency on creating and maintaining healthy and environmentally friendly school facilities. To better understand assessments of building conditions, as well as to obtain information on school building systems and features, we reviewed the Standard Guide for Property Condition Assessments: Baseline Property Condition Assessment Process, an international standard for assessing the condition of a building. Additionally, we interviewed officials at the 21st Century School Fund, the American Society of Civil Engineers, the Association for Learning Environments, the Center for Cities and Schools at the University of California, Berkeley, the Center for Green Schools, the Council of Chief State School Officers, and the Education Commission of the States. We used this information to create two lists of building systems and features, which we asked about in our surveys and asked to observe in the schools we visited. Specifically: The first list focused on key systems and features that may be necessary to a school building’s day to day operations; the second list focused on additional or emerging priorities for systems and features that school districts may consider when modernizing school facilities. We validated these lists of systems and features through survey pretests with facilities personnel in six states. Because some modernization priorities are also key to a school building’s day-to-day operations, there are systems and features that appear on both lists (see app. II for a full list of our survey questions, including all systems and features about which we asked school districts). We modified and combined the above lists for our state survey to ask states about their priorities and support for school building systems and features. To address both research questions, we designed and administered a web-based survey to all 50 states and the District of Columbia. We sent the survey to the relevant state agency that oversees school facilities, or to the state superintendent of education to be forwarded to the state official best equipped to answer questions related to the condition of school facilities. We conducted the survey between September and December 2019. To obtain the maximum number of responses to our survey, we contacted nonrespondents via email and phone throughout the period the survey was open. In total, 49 states responded to the survey; Mississippi and Illinois did not respond. Data in this report are based on the 49 states that responded, unless otherwise noted. To ensure the quality and reliability of the survey, we pretested the questionnaire with three states that vary in their level of involvement in school facilities, among other factors. We conducted the pretests to check (1) the clarity and flow of the questions, (2) the appropriateness of the terminology used, (3) if the information could be easily obtained and whether there were concerns about the reliability of data that would be collected, and (4) if the survey was comprehensive and unbiased. We revised the questionnaire based on the pretests. We reviewed responses to assess if they were consistent and contained all of the relevant information. The survey included open-ended and closed-ended questions about: The state’s role in assessing the condition of school facilities and the level of information the state has about the condition of school facilities. The state’s role in providing funding to school districts for school facilities and the factors it considers in determining funding levels. The extent to which the state provides standards, guidance and other non-financial resources to school districts about their facilities. Whether the state collects information or provides additional assistance to school districts that receive federal Impact Aid funds. To address both research questions, we designed and administered a generalizable survey of a stratified random sample of local educational agencies, which we refer to as school districts throughout this report. We sent the survey to school district superintendents to be forwarded to the district official best equipped to answer questions related to the condition of school facilities. The survey included questions about: School districts’ policies and practices regarding whether they conduct facilities condition assessments. How often school districts conduct or update these assessments. How school districts use the information from assessments to make decisions regarding school repairs, renovations, and replacements. The extent to which the school districts were facing issues with the condition of building systems and features within their schools. The funding mechanisms that school districts use to address issues with the physical condition of public schools. We defined our target population to be all school districts in the 50 U.S. states and the District of Columbia that are not under the jurisdiction of the Department of Defense or Bureau of Indian Education. We used the Local Education Agency Universe database from Education’s Common Core of Data (CCD) for the 2016-2017 school year as our sampling frame. For the purpose of our survey, we limited the sampling frame to school districts that: were located in the 50 states or the District of Columbia; had one or more schools and one or more students; and were not closed according to the 2016-2017 School Year or preliminary 2017-18 School Year CCD data available just prior to survey deployment. The resulting sample frame included 17,248 school districts and we selected a stratified random sample of 664 school districts. We stratified the sampling frame into 19 mutually exclusive strata based on urban classification and poverty classification (see table 1). We selected the largest 100 school districts, based on student enrollment, with certainty. To determine the appropriate sample size for the survey, we first determined the minimum sample size needed to achieve precision levels of percentage estimates within plus or minus 10 percentage points, at the 95 percent confidence level, within each of three sub-groups: low, medium, and high-poverty districts. Within each of these poverty sub- groups, we proportionately allocated the sample across the race and urban classification groups. We then increased the sample size within each non-certainty stratum for an expected response rate of 55 percent in order to achieve the necessary number of completed surveys for our desired precision level. We defined the three locale classifications (i.e., city, suburban, and rural) based on the NCES urban-centric locale codes. The rural classification included school districts classified as either rural or town. To build a general measure of the poverty level for each school district we used the proportion of students eligible for free or reduced-price lunch (FRPL) as indicated in the CCD data and classified these into the following three groups: High-poverty: more than 75 percent of students in the school district were eligible for FRPL; Mid-poverty: Between 25.1 and 75.0 percent of students in the school district were eligible for FRPL; and Low-poverty: 25 percent or fewer students in the school district were eligible for FRPL. We assessed the reliability of the CCD data by reviewing existing documentation about the data and performing electronic testing on required data elements and determined they were sufficiently reliable for the purposes of our reporting objectives. We administered the survey from August to October 2019. We identified that 11 of the 664 sampled school districts were closed or had no physical school buildings, so these were removed from the universe and sample. Six of these out of scope sample districts were discovered soon after survey deployment, thus, we were able to replace these six sample districts with the next randomly selected district within the same strata. This resulted in a final in scope population of 17,237 districts and 659 in scope sample districts. We received 378 valid survey responses from this in scope sample resulting in an unweighted response rate of 57 percent and a weighted response rate of 53 percent. We analyzed the response status to our survey to identify potential sources of nonresponse bias in accordance with best practices in survey research and echoed in Office of Management and Budget, Standards and Guidelines for Statistical Surveys (September 2006). We examined the response propensity of the sampled school districts using both bivariate and multivariate logistic regression models, including several demographic characteristics available for respondents and nonrespondents: urban classification, race, poverty, district size (number of schools and number of students in a district), and the stratification variable that combines these characteristics. We detected a significant association between both strata and number of students within a district and the propensity to respond to our survey. We did not detect a significant association between urban classification, race, or poverty and the response propensity. We adjusted for the characteristics significantly associated with response propensity using weighting class adjustments. Specifically, we grouped the predicted response propensity derived from our logistic regression model that includes strata and the number of students using quintiles of the predicted response propensity distribution to form five weighting adjustment groups. We applied nonresponse adjustments to the sampling weights within these groups to form nonresponse adjusted analysis weights used in our survey analyses. Based on the nonresponse bias analysis and resulting nonresponse adjusted analysis weights, we determined that estimates using these weights are generalizable to the population of eligible school districts and are sufficiently reliable for the purposes of our reporting objectives. We took steps to minimize non-sampling errors, including pretesting draft instruments and using a web-based administration system. We pretested the draft instrument from June to July 2019 with officials in five school districts in different states and with varying characteristics such as size of the student population. In the pretests, we asked about the clarity of the questions and the flow and layout of the survey. Based on feedback from the pretests, we revised the survey instrument. To obtain the maximum number of responses to our survey, and to minimize non-sampling error caused by nonresponse, we sent reminder emails to nonrespondents and contacted some nonrespondents over the telephone. We express the precision of our particular sample’s results as a 95 percent confidence interval (for example, plus or minus 10 percentage points). This interval would contain the actual population value for 95 percent of the samples we could have drawn. As a result, we are 95 percent confident that each of the confidence intervals in this report will include the true values in the study population. We compared—as appropriate—weighted survey estimates generated for school districts by the school district strata described above. For each subgroup, we produced percentage estimates and standard errors for each level and used these results to confirm the significance of the differences between weighted survey estimates. To address both research questions, we visited six states—California, Florida, Maryland, Michigan, New Mexico, and Rhode Island—from June to September 2019. We selected these states because they varied in the amount and type of funding they provided to school districts for school facilities, the level of information they collected on the condition of school facilities, and for geographic variation. Within these states, we visited 16 school districts, which we selected based on variation in the size and population density of the district, poverty level, racial and ethnic composition, and the receipt of federal Impact Aid funding (see table 2). Within each district, we visited between two and five schools, depending on the size of the district and logistical considerations. We also visited five charter schools across four states, chosen based on their proximity to a selected school district. In total, we visited 55 schools that varied in grade level, enrollment, physical size, age, and condition. For resource efficiency, we generally interviewed state and district officials via phone in advance of the site visit, and toured schools with district and school officials. States: We interviewed state officials who were knowledgeable about their state’s role in funding, assessing, or providing other resources to school districts for school facilities. We discussed the agency’s roles and responsibilities related to statewide school facilities condition assessments or data collection initiatives, state-level priorities for school facilities, and funding mechanisms within the state for school facilities. School districts: We interviewed school district officials in each district we visited. Similar to our school district survey, we discussed their policies and practices on facilities condition assessments, how often they conduct or update these assessments, and how they make decisions regarding school repairs, renovations, and replacements. We also asked questions about how the districts prioritize upgrades and repairs to school facilities and the funding mechanisms they use to address issues with the physical condition of public schools. School Observations: To select schools in each district, we used CCD data to randomize the list of all schools in the district and selected the first two to four schools with consideration for different grade levels. We then asked district officials to verify that our random selections showed sufficient variety in the age and overall condition of the building. We substituted recommended schools when appropriate to ensure we had appropriate variety in seeing schools of different ages and conditions. When logistically feasible, we visited a nearby charter school as well. We toured schools with a combination of district and school officials. During these visits, we used a data collection instrument to ask officials about school building systems and features that school personnel identified as particularly in need of repair or replacement, as well as new or upgraded systems. We photographed these as appropriate. Information we gathered from these interviews and observations, while not generalizable, provides insight into the conditions present in the states and school districts we visited at the time of our interviews, and may be illustrative of efforts in other states and school districts. To examine expenditures for capital construction by school district characteristics, we analyzed federal data from Education’s Local Education Agency Finance Survey for school year 2015-16, the most recent available at the time of our analysis. Education collects these data annually as part of the CCD. State educational agencies provide these data on behalf of their school districts to NCES and the U.S. Census Bureau’s Economic Reimbursable Surveys Division. In school year 2015- 16, states reported finance data for 96.7 percent of school districts, according to Education’s survey documentation. We analyzed school district data on capital construction expenditures by poverty level, locale, district size, racial demographics, and receipt of federal funding through Impact Aid or Indian education grants. We normalized data across school districts that fell into these different categories by calculating capital construction expenditures per student and per school. We determined these data were sufficiently reliable for the purposes of our reporting objectives by reviewing relevant documentation, interviewing knowledgeable Education officials, and testing for missing data, outliers, and other potential errors. Through discussions with NCES officials, we determined it was necessary to exclude some school districts from our analysis to develop accurate per pupil and per school calculations. Specifically, we excluded school districts for which the state did not report finance data and school districts where the number of students and schools was zero or missing. We conducted this performance audit from February 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix contains the closed- and open-ended questions from our surveys of (1) local educational agencies (referred to in this report as school districts or districts) and (2) state educational and school facility agencies. In some cases, respondents received different questions based on their response to a prior question. For example, school districts that conducted a facilities condition assessment in the last 10 years received additional questions about those assessments, however school districts that had not conducted such an assessment received questions to explain the reasons why. For a detailed discussion of our survey methodologies, see appendix I. This appendix summarizes key information on the condition of and funding for school facilities in districts that received Impact Aid. The Department of Education (Education) administers the Impact Aid program to assist school districts that experience a financial burden as a result of certain federal activities being carried out there. For example, federal Indian lands and military installations are exempt from property taxes—a key funding source that school districts use to offer a free public education. Impact Aid is intended to compensate school districts, in part, for the lost tax revenue. As noted in this report, property tax revenue was the most common source of funding school districts used for school facilities—an estimated 77 percent of all districts used property taxes for this purpose, based on our nationally representative survey. Districts with reduced property tax revenue, due to tax-exempt federal property or other reasons, may struggle to raise the funds needed for repairs and renovations to their school facilities. School districts that are eligible to receive Impact Aid might qualify for several types of payments under the program. About 90 percent of all Impact Aid funding falls under the category of Basic Support payments. According to the Congressional Research Service (CRS), school districts generally use these funds for current expenditures, such as administration, instruction, and transportation. However, because Impact Aid Basic Support payments are not limited to specific uses, school districts may also use them for capital expenditures. According to Education’s data, approximately 1,040 school districts (of a total of about 14,000 school districts nationwide) received Basic Support payments in fiscal year 2018 totaling $1.26 billion. The amount of these payments varied considerably by district—ranging from a high of about $55 million to a low of $540. Differences in the payments districts received resulted from several factors, including the number and types of federally-connected students the district served, according to CRS. In fiscal year 2018, there were 28 “heavily-impacted” school districts, meaning they were substantially affected by the presence of federally- connected children. Heavily-impacted districts receive increased Basic Support payments. In addition to Basic Support payments, some school districts are eligible for Impact Aid Construction grants for construction and emergency facility repair and renovation. From fiscal year 2014 to 2019, appropriations for Impact Aid Construction funds have consistently been about $17.4 million each year. According to CRS, appropriations language in recent years has determined whether Impact Aid Construction funds are distributed through formula grants to eligible school districts or competitive grants to a limited number of school districts, and from fiscal year 2013 to 2018, distribution alternated between these two types of grants. Approximately 150 school districts are eligible to receive Impact Aid Construction grants, according to Education officials. In fiscal year 2018, these funds were distributed through competitive grants and eight school districts received grants, ranging from $143,000 to $5.3 million. Sixty-seven school districts that received Impact Aid responded to our survey of school districts. In addition, eight of the 16 districts we visited received Impact Aid Basic Support payments in fiscal year 2018. These districts varied based on their proximity to different tax-exempt federal properties (i.e., military installations and Indian lands), as well as the number and percentage of federally-connected students they educated. Two districts we visited received Impact Aid Construction grants. Overall, on our survey of school districts, responses from the nongeneralizable group of districts that received Impact Aid were similar to the generalizable results for all districts nationwide both in terms of the key school building systems and features districts needed to update or replace and district priorities when updating or renovating school facilities. Table 3 shows the number of school districts receiving Impact Aid payments that reported that at least half of their schools needed updates or replacements to each building system or feature listed. As shown, districts most commonly indicated needing to update or replace heating, ventilation, and air conditioning systems (32); followed by safety and security (27), roofing (25), interior light fixtures (23), and plumbing (23). Based on our school district survey, 51 of 66 districts that received Impact Aid had conducted a facilities condition assessment of their schools at least once in the last 10 years. Of those 51 school districts, 34 reported assessing schools at least every 5 years. Nearly all districts (50 of 51) reported conducting the assessment for capital planning purposes and to assess safety and hazards. Similar to generalizable estimates from our nationally representative survey of school districts, districts that received Impact Aid placed a high priority on safety and security (59 of 66 districts), monitoring environmental conditions (55 of 64), and student access to technology (54 of 65). Overall, more than half of districts that received Impact Aid and responded to our survey (36 of 66) reported that local funding was their primary source for funding school facilities projects. In comparison, 19 districts reported state funding as their primary source, eight districts reported federal funding, and three districts selected the “Other” option or did not know. Similar to generalizable estimates from our survey of school districts, about three-quarters of districts that received Impact Aid and responded to our survey (49 of 66) reported using property tax revenue for school facilities. In addition, about two-thirds of them reported using local bonds and local grants for this purpose. Fewer districts reported using public- private partnerships, sales tax revenue, or other tax revenue for school facilities. As noted above, districts may receive Impact Aid because they have lost property tax revenue due to certain federal activities, including being on or near federal property that is exempt from property taxes. Districts that serve a large proportion of federally-connected students, such as those located on or near federal Indian lands or military installations, may look similar to high-poverty districts in their lack of access to local funding mechanisms for school facilities. However, there is wide variety in the amount of Impact Aid payments districts received. This variety was similarly reflected in the eight school districts we visited that received Impact Aid. For example, the Basic Support payments the districts we visited received in fiscal year 2018 ranged from about $16,000 to about $8.6 million, and the percentage of federally-connected students in the districts we visited ranged from 1 to 100 percent. Officials in one of the districts we visited that received Impact Aid explained that, because the district is located on an Indian reservation, there is no property tax base to levy or bond against. In the absence of these local funding options, officials said the district relied on state funding and some federal Impact Aid funding to address facility needs, and noted that the lack of local funding made it difficult for them to reach their goals for their school facilities. For example, officials said the state does not provide funding for designated classrooms for bilingual education. Because the district does not have the local property tax base to fund these spaces, officials said they must be creative with classes and teacher schedules to provide bilingual education. The location of these classes moves to different parts of the school at different times, meaning that teachers cannot set up a stable classroom that is properly equipped to teach bilingual education to students in the district, according to district officials. None of the officials we interviewed in the eight districts that received Impact Aid said their district used Basic Support payments to address issues with the conditions of school facilities. Officials in two districts we visited described receiving Impact Aid construction grants. Officials in one of these districts explained that when these funds are distributed via formula grant, the amounts are not large enough to support a major capital project. An official in the district that had received a competitive grant in recent years said the district used the funds to build a new combined middle and high school. In addition, representatives from the National Association of Federally Impacted Schools and the National Indian Impacted Schools Association told us they have heard anecdotally about some school districts using their Impact Aid funds as the basis for borrowing funds to pay for school facilities projects. They described this as particularly risky because Impact Aid appropriations levels are not guaranteed to remain consistent each year. The representatives said if funding levels for Impact Aid are reduced in the future, the districts would still have to pay back the borrowed funds before allocating funding for other purposes such as general operations, teacher salaries, educational materials, and other essentials for educating students in the school district. On our state survey, eight states reported providing additional school facilities funding or other assistance to districts in the state that receive Impact Aid. For example, an official in New Mexico told us the state has two programs targeted to school districts that get Impact Aid. One program awarded $10 million to districts in 2019 to help them provide teacher housing, according to state officials. State officials said a second state program in New Mexico awarded $24 million in 2019 to districts that received Impact Aid to assist them with projects that were ineligible for funding through New Mexico’s other programs. For example, these officials said this funding could help schools in need of athletic fields, performing arts centers, or administrative buildings. Charter schools comprise a small but growing group of public schools. We previously reported that, in contrast to most traditional public schools, many charter schools are responsible for financing their own buildings and other facilities, i.e., charter school districts may not have access to the same local funding mechanisms as traditional school districts. As a result, charter schools vary in terms of whether they own their own building or pay rent, and whether they operate in buildings originally designed as a school or in buildings that have been redesigned for educational purposes. Sometimes charter schools may also share space in their building with others, such as non-profit organizations. In addition to differences in facility access and finance, charter school governance also varies. We previously reported that in some states, charter schools function as their own school district, while in other states, charter schools have the option to choose between being their own school district or part of a larger school district. The data presented in this appendix are limited to the nongeneralizable responses of the 52 charter school districts that responded to our survey of school districts, unless otherwise noted. In addition, we visited five charter schools across four states (California, Florida, Maryland, and Rhode Island) as part of our school district site visits. This appendix summarizes key information on the condition of and funding for school facilities in these charter school districts and schools. Responses from the nongeneralizable group of charter school districts were similar to the generalizable results for all districts in the nation for key building updates, as well as priorities for modernizing school facilities, but different for how these districts access funding for school facilities. The highest number of charter school districts (20 of 51) indicated needing to update or replace heating, ventilation, and air conditioning systems in the majority of their schools, followed by windows (16), roofing (15), and interior light fixtures (15). School officials at a charter school we visited told us they were having ongoing issues with several key building features, such as doors and windows. The charter school rents their facility from the traditional school district and has a lease that specifies who is responsible for certain maintenance and repair projects. School officials told us the school has a “utilities-only” lease, meaning they should not be responsible for any repairs, but officials told us they had to take on several projects to make the facility usable. Although the traditional school district—of which this charter school is a part—is responsible for many of these projects, district officials said they have not had the funding to address this. For example, before the school opened, school officials said they had to install door handles on interior doors and re-key the building so that they were able to lock and unlock doors. In addition, school officials told us that teachers have complained that windows are nailed shut and cannot be opened. Based on our school district survey, 24 of 52 charter school districts had conducted a facilities condition assessment of their schools at least once in the last 10 years. Of those 24 school districts, 19 reported assessing schools at least every 5 years. Twenty-three charter school districts reported conducting the assessment to assess safety and hazards. Officials at four of the five charter schools we visited told us they were responsible for maintaining their own facilities. The other charter school we visited was part of a larger network of charter schools, and had regional offices that assisted with facilities and operations. When updating or renovating school facilities, charter school districts responding to our survey ranked security and technology as their highest priorities, similar to the generalizable results for all districts in the nation. The top reported priorities were student access to technology (44 of 52), safety and security (43 of 51 districts), and telecommunication systems such as WiFi (36 of 51). An official at a charter school we visited in Florida said safety and security was one of their main focuses when constructing the school. The school and parking lot are gated, and there is a camera to monitor all cars and people entering the campus. School officials told us that all classrooms and common areas are equipped with phones that can broadcast announcements throughout the campus, and that they have a lightening alert system so that they can move students indoors if a storm is approaching. As previously noted, charter schools may or may not be part of a larger school district, and may not be able to access local funding sources such as property tax revenue. As noted in this report, property tax revenue was the most common source of funding that all school districts reported using for school facilities—an estimated 77 percent of all districts nationwide used property taxes for this purpose. Most charter school districts that responded to our survey indicated that state funding was their primary method of funding school facilities (32 of 49) and fewer (8 of 49) reported local funding as their primary method. The most common local funding mechanism that charter school districts reported using for facilities was grant funding (20 of 46 districts), followed by public-private partnerships (12 of 47 districts). A charter school we visited told us about several areas in their school that they had improved with grants from non-profit organizations. For example, a teacher at the school applied for a grant from a foundation to replace the basketball hoops and paint in the gym, and a separate organization had installed a new playground at the school. Based on our state survey, 26 states provide funding to charter schools for facilities—22 states provide direct funding to charter schools and four states provide funding to non-charter school districts, which would indirectly fund certain charter schools. Of the 26 states, 20 states reported doing so either through a funding formula, or a combination of funding formula, charter school requests, and other methods. The most common factor that states considered when determining levels of facilities funding for charter schools was the size of the student population (12 of 25 states). Of the 26 states that provide funding to charter schools for construction or maintenance and operations of charter school facilities, 19 reported using allocated funding from the state legislature to do so. Jacqueline M. Nowicki, Director, (617) 788-0580 or nowickij@gao.gov. In addition to the contact named above, Bill MacBlane (Assistant Director), David Watsula (Analyst-in-Charge), Liz Spurgeon, and Alexandra Squitieri made key contributions to this report. Mariel Alper, Michael Armes, Susan Aschoff, John Bauckman, Alex Galuten, Alison Grantham, Elizabeth Hartjes, Lara Laufer, Sheila R. McCoy, Jean McSween, John Mingus, Lauren Mosteller, Mimi Nguyen, Jean Recklau, Almeta Spencer, Manuel Valverde, Sonya Vartivarian, and Paul Wright provided additional support.", "summary": "Public school facilities primarily serve an educational role, and they also serve a civic role as voting places and emergency shelters. School districts collectively spend tens of billions of dollars each year on facilities construction needs at the nearly 100,000 K-12 public schools nationwide. The Joint Explanatory Statement accompanying the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019 and Continuing Appropriations Act, 2019 included a provision for GAO to study the condition of public school facilities. This report examines (1) the common facility condition issues school districts identify in public schools and how they have done so and (2) school districts' highest priorities for their school facility renovations and updates, and how districts and states fund them. GAO conducted a nationally representative survey of school districts and also surveyed 50 states and the District of Columbia; visited 55 schools in 16 districts across six states, selected for geographic variation and other characteristics; analyzed federal data on school district expenditures for capital construction projects; and interviewed federal, state, district, and school officials. About half (an estimated 54 percent) of public school districts need to update or replace multiple building systems or features in their schools, according to GAO's national survey of school districts. For example, an estimated 41 percent of districts need to update or replace heating, ventilation, and air conditioning (HVAC) systems in at least half of their schools, representing about 36,000 schools nationwide that need HVAC updates (see figure). In about half of the 55 schools GAO visited in six states, officials described HVAC-related problems, such as older systems that leaked and damaged flooring or ceiling tiles. If not addressed, such problems can lead to indoor air quality problems and mold, and in some cases caused schools to adjust schedules temporarily. To determine the condition of their school facilities, an estimated two-thirds of districts conducted a facilities condition assessment at least once in the last 10 years. According to GAO's survey of the 50 states and District of Columbia, most states do not conduct statewide assessments to determine school facilities' needs and instead leave this task to school districts. School districts' highest priorities for their school facilities were improving security (an estimated 92 percent), expanding student access to technology (87 percent), and monitoring health hazards (78 percent), according to GAO's school district survey. In school districts GAO visited, officials said they first address health hazards and safety issues. In nearly all districts GAO visited, security also had become a top priority, with some districts prioritizing security updates over replacing building systems, such as HVAC. In about half of districts nationwide, funding for school facilities primarily came from local sources such as property taxes, based on GAO's survey. High-poverty districts more commonly relied on state funding and used property taxes less commonly than low-poverty districts. According to GAO's state survey, 36 states provided capital funding to school districts for school construction or renovations, including five of the six states GAO visited, though the funding amounts and mechanisms differed considerably within and across states.", "document_type": "gao"}
{"report": "CBP is the nation’s largest federal law enforcement agency. CBP’s Border Patrol and AMO are the uniformed law enforcement arms responsible for securing U.S. borders between ports of entry in the air, land, and maritime environments. Border Patrol has primary responsibility for securing U.S. land borders between ports of entry. Its area of responsibility along the northern border is divided among eight sectors: Blaine, Spokane, Havre, Grand Forks, Detroit, Buffalo, Swanton, and Houlton. Each Border Patrol sector is further divided into Border Patrol stations and each station is assigned a certain geographic area of responsibility within a sector. Along the northern border, there are a total of 49 stations or between four to eight stations per sector. For a map of Border Patrol’s northern border sectors, see figure 1. Border Patrol agents secure the border between ports of entry, in part, through patrolling international land borders and waterways to detect and prevent the illegal trafficking of people, narcotics, and contraband into the United States. AMO has primary responsibility for securing U.S. borders in the air, marine, and land domains and its operations along the northern border are divided among three branches: Bellingham Air and Marine Branch in Washington, Great Lakes Air and Marine Branch in Michigan, and Manassas Air Branch in Virginia. Each branch is further divided into units to conduct air or maritime missions and there are a total of seven air units and nine marine units along the northern border. For a map of AMO’s northern border operating locations, see figure 2. AMO Air Interdiction Agents are federal law enforcement agents who pilot aircraft, while Marine Interdiction Agents are federal law enforcement agents who operate vessels. Air and Marine Interdiction Agents secure the air and maritime environments along the border, in part, through conducting surveillance and investigative activities to interdict smuggled narcotics and other contraband. Additional offices within CBP that support the activities of Border Patrol and AMO along the northern border include the Office of Facilities and Asset Management, Office of Information and Technology (OIT), and Office of Intelligence. The Office of Facilities and Asset Management is responsible for oversight and management of CBP’s real and personal property portfolios, including managing CBP’s facilities and motor vehicle fleets. OIT is responsible for managing CBP’s technology infrastructure and information technology (IT) operations. These, according to OIT, enable CBP mission readiness and improve the ability of all employees, including agents in the field, to be proactive and responsive to new threats. OIT manages all IT networks, computers, systems, data, tactical communications, and other resources to support CBP employees. OIT is also to provide day-to-day field support primarily through Field Technology Officers who provide services to CBP’s offices and components, such as repairing equipment, upgrading systems and networks, restoring system outages, responding to cybersecurity incidents, and deploying new technology and equipment. The Office of Intelligence is to develop, coordinate, and implement CBP’s intelligence capabilities into a cohesive intelligence enterprise that supports CBP’s primary mission to secure the borders while facilitating legitimate trade and travel. The Office of Intelligence’s Field Intelligence Division is to provide CBP law enforcement personnel with current and relevant intelligence to inform decision makers and those who respond to border related crimes, threats, and hazards. In this division, there are two field intelligence groups with areas of responsibility along the northern border—the Pacific Northwest Field Intelligence Group in Washington and the Great Lakes Field Intelligence Group in Michigan. In addition, through CBP’s National Border Geospatial Intelligence Strategy, the Office of Intelligence produces geospatial intelligence products for Border Patrol sectors to identify areas of potential illicit cross-border activity. Border Patrol and AMO use a variety of technologies, facilities, and other resources to secure the northern border between ports of entry. Figure 3 illustrates examples of resources used by Border Patrol and AMO, which include the following: surveillance technology, such as Remote Video Surveillance Systems—systems of towers with cameras that transmit information to video monitors at a Border Patrol facility—and unattended ground sensors—remotely monitored sensors placed in or on the ground, or on ground-based platforms, to detect, track, identify, and differentiate humans, animals, and vehicles—used by Border Patrol agents to detect and identify illicit cross-border activity; radar systems to detect and identify aircraft and vessel incursions; IT and communication systems to conduct operations and ensure the safety and security of agents while on duty, including databases and systems for processing detainees, infrastructure to operate surveillance technology, and tactical communication equipment such as land mobile radios; aircraft, including fixed- and rotary-wing aircraft, vehicles, including all- terrain vehicles and snowmobiles, and large and small vessels; tactical infrastructure, including fencing, roads, and border markers and signs; and facilities, including buildings to house workstations and offices for agents and civilian personnel, short-term detention facilities to process and hold individuals arrested by Border Patrol agents, forward operating bases in remote locations to support Border Patrol agent operations, and hangars for aircraft and vessel storage and repair. CBP participates in a variety of collaborative efforts—including task forces, joint operations, and partnerships with federal, state, and local law enforcement agencies—to support its efforts to secure the northern border between ports of entry. According to CBP officials, collaborative efforts involve sharing intelligence and other information that informs and guides the efficient use of agents and resources to conduct enforcement activities. For example, AMO’s Air and Marine Operations Center coordinates with federal, state, local, and international law enforcement agencies to detect, identify, track, and coordinate interdiction of suspect aviation and maritime activity near and at the borders, including the northern border, and within the United States. Moreover, Border Patrol’s Northern Border Coordination Center serves as a centralized coordination center for information sharing among Border Patrol’s eight northern border sectors, as well as with domestic and international law enforcement partners, focusing primarily on counter-terrorism and illicit criminal networks. Border Patrol also collaborates with county, state, tribal, local, and other law enforcement agencies through administration of the Operation Stonegarden Grant Program, a part of the Homeland Security Grant Program, to support border security activities. The grant program provides funding to state, local, and tribal law enforcement agencies to support joint efforts to secure U.S. borders. For example, grantees may receive reimbursement for operational overtime costs associated with law enforcement activities and equipment purchases, such as sensors, in support of border security activities. CBP’s collaborative efforts along the northern border also include participation in various task forces with federal, state, and local law enforcement agencies. Specifically, Border Patrol and AMO agents may be assigned as task force officers to conduct or support casework, investigations, and coordination among federal, state, and local law enforcement agencies. For example, Border Patrol and AMO agents are assigned as task force officers along the northern border on the U.S. Immigration and Customs Enforcement-led Border Enforcement Security Task Force in Washington, Michigan, and New York to identify, investigate, disrupt, and dismantle transnational criminal organizations. According to Border Patrol and AMO officials, task force officers help enhance partnerships, information sharing, and situational awareness along the northern border. CBP also partners with other DHS components to support its efforts to secure the northern border between ports of entry. For example, through the Puget Sound Regional Coordinating Mechanism, CBP—including Border Patrol and AMO—and the U.S. Coast Guard coordinate daily and conduct joint operations along the maritime border between the state of Washington and province of British Columbia. CBP also works with DHS’s Science and Technology Directorate to identify, develop, and evaluate technology to address capability gaps across the northern border. For example, DHS’s Science and Technology Directorate, in collaboration with Swanton Border Patrol sector, deployed land surveillance technology along the northern border. CBP also collaborates with law enforcement agencies within the government of Canada through the Cross-Border Law Enforcement Advisory Committee and Integrated Border Enforcement Team Program. The Cross-Border Law Enforcement Advisory Committee is a national- level committee—comprised of the Royal Canadian Mounted Police, Canada Border Services Agency, U.S. Immigration and Customs Enforcement, CBP, and U.S. Coast Guard—that provides guidance to initiatives involving partnerships between United States and Canadian law enforcement agencies along the shared border. The Integrated Border Enforcement Team Program includes the Royal Canadian Mounted Police, Canada Border Services Agency, U.S. Immigration and Customs Enforcement, CBP, and U.S. Coast Guard. According to CBP, the priority of the program is to seek and identify mutual national security threats and combat illicit cross-border activity. According to CBP and government of Canada officials, program activities may include real-time tactical intelligence sharing between Canadian and U.S. law enforcement agencies and periodic meetings to coordinate operations. These officials stated that the program helps to facilitate timely information sharing in accordance with Canadian and U.S. laws and regulations. For example, through the Integrated Border Enforcement Team Charter, Border Patrol and the Royal Canadian Mounted Police may share information related to cross-border criminal activity—such as suspected or known illegal entries between ports of entry—without delay. According to DHS’s 2017 Northern Border Threat Analysis Report, the most common threat to U.S. public safety along the northern border continues to be contraband smuggling; specifically, the bidirectional flow of illicit drugs. In its fiscal year 2018 intelligence reports for its eight northern border sectors, Border Patrol also reported contraband smuggling as a significant threat along the northern border between ports of entry, including bidirectional drug smuggling. According to Border Patrol data for fiscal years 2013 through 2017, 2 percent of Border Patrol’s total drug seizures occurred along the northern border. Examples of smuggling activities include criminal groups with known ties to or hired by Mexican drug trafficking organizations suspected of smuggling narcotics into Canada and smuggling bulk currency from Canada into the United States between land border ports of entry. Border Patrol, in its intelligence reports, also identified contraband smuggling for the purpose of evading customs duties, involving products such as tobacco, prohibited fruits, and medicinal products. Further, according to Border Patrol, criminal organizations smuggle contraband between ports of entry because certain items such as tobacco, agricultural, and medicinal products are prohibited for import even if properly declared at a port of entry. In 2017, AMO reported contraband smuggling across the northern border both into and out of the United States between ports of entry. In its 2017 Northern Border Non-Commercial General Aviation Threat Overview, AMO’s Air and Marine Operations Center identified illicit activity along the northern border using general aviation aircraft, including aircraft operating in a suspicious manner at low attitude (low-flying aircraft). According to Border Patrol’s annual fiscal year 2018 intelligence report, violations of U.S. immigration and travel controls, which Border Patrol refers to generally as “illegal immigration,” along the northern border is a threat and is frequently bidirectional between the United States and Canada. Additionally, our analysis of Border Patrol data from fiscal years 2013 through 2017 showed that Border Patrol agents apprehended 14,319 potentially removable aliens—foreign nationals who Border Patrol suspected or determined were removable from the United States—along the northern border or approximately 1 percent of its total nationwide apprehensions of potentially removable aliens (1.97 million aliens). According to DHS’s 2017 Northern Border Threat Analysis Report, known illegal crossings between ports of entry by individuals on the northern border conform to established migration patterns between large population centers. Further, the report states that terrain, weather, and distance are factors that constrain migrant travel between ports of entry in remote areas of the border. According to Border Patrol officials, the majority of individuals apprehended along the northern border are suspected or known to have illegally entered the United States across the southwest border and traveled to the northern border region before being detected, while a smaller number of individuals are suspected or known to have illegally entered the United States from Canada between ports of entry. Specifically, of the potentially removable aliens apprehended by Border Patrol along the northern border during this period, we found that 61 percent (8,727) were individuals suspected or known to have illegally entered the United States from Mexico, while 19 percent (2,782) were individuals suspected or known to have illegally entered the United States from Canada. The Swanton Border Patrol sector apprehended the highest percentage of individuals who illegally entered the United States from Canada between ports of entry during this period, 43 percent (1,206 individuals) of the total number across all eight northern border sectors. Border Patrol, in its fiscal year 2018 intelligence reports for its eight northern border sectors, also identified alien smuggling—bringing into, or harboring or transporting within, the United States, foreign nationals in violation of U.S. immigration law—organizations operating along the northern border between ports of entry as a threat. Examples of alien smuggling activities include alien smuggling organizations using private residences along international waterways to provide locations for staging an illegal entry. According to Border Patrol officials, criminal organizations operating along the U.S.-Canada border frequently conduct bidirectional alien smuggling activities between the United States and Canada as agents encounter numerous types of groups being smuggled into Canada. CBP identified staffing and resource challenges to its operations and enforcement activities across the northern border and has identified actions to address them, but faces competing priorities. Border Patrol and AMO officials we met with identified agent staffing challenges along the northern border across all sectors and branches that limit enforcement activities, including Border Patrol agent availability to conduct patrol missions and a limited number and frequency of AMO missions due to AMO agent availability. Border Patrol and AMO officials also identified resource challenges along the northern border across all sectors and branches, including radar and surveillance technology used to surveil the air, maritime, and land environments; IT and communication technology, including network infrastructure and bandwidth that allow agents to access CBP systems and tactical communications, such as land mobile radios for agent communication during border security missions; and infrastructure and facilities, including tactical infrastructure—roads, fencing, and border markers—and facilities used by agents to secure the border. It is unknown whether the staffing and resource challenges identified by CBP to secure the northern border between ports of entry will be addressed due to competing southwest border security priorities. CBP identified actions and ongoing efforts to address agent staffing and resource challenges to secure the northern border between ports of entry. In June 2018, DHS released a Northern Border Strategy to establish actions that are intended to, among other things, improve DHS’s efforts to safeguard the northern border against various threats. DHS is developing an implementation plan for its Northern Border Strategy which will, among other things, identify actions to address gaps in capabilities to secure the northern border between ports of entry. However, it is unknown whether CBP’s northern border staffing and resource challenges will be addressed due to competing priorities with southwest border security. For example, instructions in Executive Order 13767 require DHS to obtain complete operational control—prevention of all unlawful entries into the United States, including entries by terrorists, other unlawful aliens, instruments of terrorism, narcotics, and other contraband—of the southwest border, in part through hiring thousands of agents and constructing a physical barrier. Border Patrol officials identified staffing challenges across the northern border sectors that have affected enforcement activities. Officials from northern border sectors told us that an insufficient number of agents authorized or onboard at its sectors and stations limits their ability to conduct enforcement activities and may, at times, pose risks to agent safety. In addition, Border Patrol officials from northern border sectors stated that agent availability for enforcement activities is further limited by detainee transportation and supervision duties and requests for law enforcement assistance from other agencies. For example, Border Patrol sector officials stated that detainee transportation duties result in agents being unable to conduct enforcement activities for up to 1 day and duties related to supervision of detainees during court proceedings and meetings with federal prosecutors may result in agents being unable to conduct enforcement activities for up to 1 week. Further, responding to local calls for assistance during assaults may result in agents being unable to conduct enforcement operations for multiple hours. Also, Border Patrol officials from northern border sectors stated that vacancies in civilian Law Enforcement Communication Assistant positions affect enforcement activities. Law Enforcement Communication Assistant duties at each northern border sector are dispatching and officer safety checks, monitoring surveillance camera feeds and unattended ground sensor activation, and conducting intelligence research checks for agents on duty across all stations in the sector. Border Patrol officials told us it is difficult to recruit and retain qualified applicants for vacant positions due to the lower General Schedule grade of the position across Border Patrol, which is not competitive with salaries for similar positions offered through state and local law enforcement agencies. In August 2018, Border Patrol officials stated that they created an additional position, the Law Enforcement Information Specialist, with additional duties and responsibilities at a higher General Schedule grade. AMO identified staffing challenges across its northern border branches which, according to AMO officials, have affected the frequency and number of air and maritime missions. Specifically, officials at AMO branches told us that an insufficient number of agents authorized or onboard at its branches and units limits the frequency and number of air and maritime missions AMO is able to conduct along the northern border. For example, AMO officials stated that an insufficient number of Marine Interdiction Agents limits the number of daily and weekly maritime patrol missions. For air missions, AMO officials stated that an insufficient number of Air Interdiction Agents may limit the ability to fulfill immediate or previously unscheduled requests for air support. AMO officials from northern border branches also cited agent recruitment, hiring, and retention as a challenge for filling vacant positions. For example, officials stated that AMO faces competition with commercial airline companies for recruitment and retention of qualified individuals with commercial pilot certificates, including higher salaries, as well as delays from CBP’s lengthy application process. AMO officials from northern branches also stated that agent availability for air and maritime missions is sometimes limited due to temporary duty assignments to support national missions, which can limit local operations along the northern border. AMO officials stated that these temporary duty assignments involve relocation of Air Interdiction Agents, aircraft, and maintenance staff to other operating locations for multiple weeks. For example, in 2017, Air Interdiction Agents flew missions to support recovery efforts after the hurricanes in Texas, Florida, and Puerto Rico. In 2018, Air Interdiction Agents supported security operations during the Super Bowl in Minneapolis, Minnesota. CBP is taking actions to address agent recruitment, hiring, and retention. We reported in June 2018 on CBP’s actions to address challenges for recruitment, hiring, and retention of Border Patrol and AMO agents, such as increased participation in recruitment events and offering relocation opportunities for existing employees. According to CBP’s Fiscal Year 2019 Congressional Budget Justification, newly hired Border Patrol agents will be assigned to the southwest border to allow for the reassignment of more experienced agents to the northern border. As of August 2019, Border Patrol officials expected that all sectors in fiscal year 2019, including the northern border sectors, would receive an increase in the number of authorized agent positions. Border Patrol officials also stated that as of June 2018, they were completing a Personnel Requirements Determination Initiative to analyze agent allocations across its sectors and stations to develop a staffing allocation model to optimally align staff according to workload and area of responsibility conditions. In June 2018, we also reported that AMO had taken steps to address staffing challenges, such as implementing voluntary paid relocation opportunities and pursuing additional human capital flexibilities to address its difficulty in retaining Air Interdiction Agents, including a group retention incentive and a special salary rate. AMO personnel who are non- bargaining unit employees and have served for at least 3 years in their current location are also eligible for noncompetitive paid relocations. According to AMO officials, these opportunities are posted every few months and eligible personnel can apply for transfers to a specific duty station based on the needs of the operational component. In September 2017, AMO submitted an official request for a 10 percent group retention incentive for Air Interdiction Agents staffed to the northern border, among other locations. According to the request, the incentive is intended to help AMO retain qualified pilots in these hard-to-fill locations by raising their salaries to be more competitive with commercial airlines. Border Patrol officials we met with stated that Border Patrol’s Operational Mobility and Resident Agent Programs have helped northern border sectors to address agent staffing challenges. The Operational Mobility Program provides Border Patrol agents with opportunities for a paid relocation to a more desirable location at a lower cost to CBP than an official permanent change of station transfer. Border Patrol officials stated that the use of the Operational Mobility Program resulted in agents electing to relocate to northern border sectors from other duty stations. The Resident Agent Program operates in locations where Border Patrol’s routine presence is extremely limited and is intended to improve situational awareness by the creation of partnerships, expansion of community outreach, and development and dissemination of intelligence. The Resident Agent location is the physical residence of an agent in a location where there is not an official Border Patrol station. Officials from Border Patrol sectors and AMO branches stated that there are gaps in air radar coverage along the northern border, limiting their ability to detect and identify aircraft incursions. CBP has taken actions to address these gaps in air radar coverage. In December 2017, CBP completed an AMO-led assessment of air radar capabilities, which identified coverage gaps and needs across the United States, including at the northern border. In May 2018, AMO officials stated that they began working with the Department of Defense to test technology along the northern border to address gaps in air radar coverage. Officials from Border Patrol sectors and AMO branches stated that there are limited maritime radar capabilities to detect and identify vessel incursions along the northern border. CBP has taken actions to address these gaps in maritime radar capabilities. Border Patrol, through its Maritime Detection Project, plans to deploy additional maritime radar technology in Detroit and Buffalo sectors to expand maritime radar coverage on Lake Erie. Also, in 2017, CBP participated in a 1-year DHS pilot project with the government of Canada to share radar information in an area along the northern border to detect vessel incursions. AMO, through its Multi-Role Enforcement Aircraft, conducts maritime radar patrols along portions of the northern border to address gaps in maritime radar coverage on some of the Great Lakes and parts of the Pacific Northwest, to detect and identify vessel incursions. Border Patrol sector officials stated that there are challenges with land surveillance technology that is used for agents to detect, identify, and respond to illicit cross-border activity along the northern border. Further, Border Patrol headquarters and sector officials stated that there are gaps in surveillance technology coverage along the northern border to detect and identify illicit cross-border activity. In addition, Border Patrol officials also identified challenges with Legacy Remote Video Surveillance Systems. For example, officials we met with identified system outages due to delays in maintenance and replacement of parts, and poor quality video surveillance camera images. In March 2017, CBP completed a Border Patrol-led assessment of land surveillance capabilities to assess gaps, including gaps in surveillance technology coverage across all Border Patrol sectors. Officials from Border Patrol sectors and AMO branches we met with identified inadequate network infrastructure—including network infrastructure and equipment nearing or past its useful life—and bandwidth that have affected enforcement activities and other required tasks along the northern border. For example, Border Patrol officials stated that inadequate network infrastructure and bandwidth has delayed or prevented the processing of detainees at some stations. AMO officials also stated that inadequate bandwidth limits the ability of agents to use BigPipe, a system used to coordinate operations with partner agencies during air and maritime missions. In September 2017, DHS’s Office of Inspector General found that outdated IT infrastructure and equipment contributed to CBP-wide system performance and availability challenges; a considerable portion of IT equipment and infrastructure had reached its useful life; and OIT was unable to replace infrastructure past its useful life because of financial constraints. CBP’s Fiscal Year 2019 Congressional Budget Justification identifies actions to improve network infrastructure and bandwidth, including deploying new workstations and replacing network infrastructure components that are past their useful life to provide reliable operations and address vulnerabilities. OIT officials stated that pilot projects using virtual private network connections are being implemented at CBP locations to address bandwidth challenges and reduce costs. Officials from Border Patrol sectors and AMO branches we met with identified challenges with tactical communications, including gaps in land mobile radio coverage along the northern border. Border Patrol and AMO agents responsible for securing the northern border depend on land mobile radio systems for secure, reliable, and timely exchanges of critical information to effectively carry out their mission. Border Patrol and AMO officials we met with identified lack of coverage in certain areas, which impacts agent communication during enforcement activities. CBP has taken actions to identify coverage gaps and deploy additional equipment to improve communications coverage along the northern border. For example, CBP has deployed additional equipment to improve tactical communication coverage in Border Patrol’s Houlton sector in Maine through its Tactical Communication Modernization Program from fiscal years 2009 through 2017. Border Patrol officials stated that they are deploying repeater tower sites—technology used for retransmitting and extending the range of radio communications—and other technology to mitigate dead spots and gaps in coverage in three sectors. According to CBP’s Fiscal Year 2019 Congressional Budget Justification, updated handheld and mobile radios are being provided to Border Patrol and AMO, including northern border locations, to improve tactical communications and interoperability with law enforcement partners. Border Patrol sector officials identified challenges due to limited tactical infrastructure, such as a lack of barriers to impede vehicle incursions and access to roads along the border that make it difficult to impede illegal entries. For example in one sector, officials stated that a lack of vehicle barriers leads to a gap in Border Patrol’s ability to impede illicit vehicle incursions. In other sectors, officials stated that Border Patrol agents face challenges accessing border areas due to a lack of roads or access to maintained roads. Officials from northern border sectors also stated that agents face challenges preventing illegal entries due to a lack of barriers and a lack of signs or markers indicating the location of the international border. Officials from Border Patrol sectors and AMO branches we met with noted that certain facilities do not have space to accommodate the number of assigned agents and civilian personnel along the northern border. For example, in one sector, officials stated that there is lack of space to accommodate Law Enforcement Communication Assistants to monitor surveillance technology and direct agents to respond to potential illicit activity. Border Patrol officials in other sectors also stated that certain stations in their sectors do not have adequate facilities to process and house detainees. For example, one station lacks a dedicated processing and interview area and detainees are processed in an open location next to agent workstations, which may pose a safety risk to agents, according to officials. In November 2018, Office of Facilities and Asset Management officials identified 20 new and major construction projects planned for the northern border, including replacement of Border Patrol facilities with identified challenges; however, these projects have been deferred due to lack of funding. Further, according to Office of Facilities and Asset Management officials, CBP has insufficient funds to address deferred maintenance projects and a limited number of maintenance staff to repair facilities. Officials from Border Patrol sectors we met with identified aging vehicles that are beyond their expected service life, which affect enforcement activities along the northern border. According to Border Patrol officials, funding is not available to replace aging vehicles across all sectors, but funds are allocated annually to replace a percentage of vehicles in the northern border sectors that are beyond their expected service life. Further, Border Patrol officials stated that the harsh climate along the northern border creates additional burdens on agent vehicles prior to those vehicles reaching the end of their expected service life. Officials from Border Patrol sectors we met with identified agent vehicles that lack the technology needed to complete monthly motor vehicle utilization reports required by the DHS Stop Asset and Vehicle Excess Act. In August 2018, Border Patrol officials stated that CBP was in the process of awarding a contract for installation of vehicle reporting technology in agent vehicles, including across the northern border sectors. In addition to the actions identified above by CBP to address northern border staffing and resource challenges, DHS is developing an implementation plan for its Northern Border Strategy, which includes a goal to enhance border security operations. The strategy states that the implementation plan is intended to outline roles, responsibilities, programs, and timelines for accomplishing the strategy’s goals and objectives for fiscal years 2020 to 2024. According to DHS officials, the department plans to use the strategy and corresponding implementation plan to prioritize departmental resources and achieve the specified outcomes over the 5-year period. According to DHS officials, the implementation plan is expected to be completed in 2019 and will identify actions to address gaps in capabilities to secure the northern border between ports of entry; for example, gaps in domain awareness and associated technology, among other things. It is unknown whether the staffing and resource challenges identified by CBP to secure the northern border between ports of entry will be addressed due to competing southwest border security priorities. According to Border Patrol and AMO headquarters officials, resources are allocated across their operating areas based on threats and volume of illicit activity, which are greatest on the southwest border. Further, Border Patrol and AMO headquarters officials stated that resource allocation is prioritized to the southwest border to also meet instructions in Executive Order 13767 to obtain complete operational control—prevention of all unlawful entries into the United States, including entries by terrorists, other unlawful (i.e. inadmissible) aliens, instruments of terrorism, narcotics, and other contraband—of the southwest border. While DHS is implementing its Northern Border Strategy, including developing an implementation plan, addressing CBP’s northern border staffing and resource challenge will compete with its other enforcement priorities along the southwest border. While CBP has performance measures (strategic and management) that assess certain border security operations or programs, some of which include data from the northern border, it does not have specific measures to assess its effectiveness at securing the northern border between ports of entry. More specifically, Border Patrol has two strategic measures that include data from the northern border, but these measures do not assess Border Patrol’s effectiveness at securing the northern border between ports of entry. The two measures—the percent of recurring border surveillance implemented in remote, low-risk areas between ports of entry and the percent of time Border Patrol meets its goal of responding to potential illegal activity in remote, low-risk areas—are based on information from CBP’s National Border Geospatial Intelligence Strategy. The measures assess Border Patrol’s use of reports developed using geospatial intelligence technology of potential illicit cross-border activity. However, this technology is not applied in maritime environments, so the measures do not include data from two northern border sectors. Further, Border Patrol’s two strategic measures combine data from the southwest and northern borders. Border Patrol has four management measures that also contain data from the northern border. These measures are (1) the number of joint operations conducted along the northern border by Border Patrol agents and Canadian law enforcement; (2) the percent of apprehensions at Border Patrol checkpoints; (3) the percent of Border Patrol agents who are trained and certified to perform enforcement actions; and (4) the percent of Border Patrol equipment assessed as ready to support law enforcement operations. Border Patrol’s four management measures include data from the northern border, but do not assess Border Patrol’s effectiveness at securing the northern border between ports of entry. Although one management measure tracks the number of joint operations conducted along the northern border by Border Patrol agents and Canadian law enforcement personnel, that measure does not assess Border Patrol’s performance in conducting those joint operations or their effectiveness. Border Patrol’s three additional management measures include data from the northern border combined with other areas, such as the southwest border, and therefore are not specific to the northern border. AMO’s one strategic and one management measure include data from the northern border, but do not assess AMO’s effectiveness at securing the northern border between ports of entry in the air and maritime environments. For the strategic measure, AMO reports the percent of detected conventional aircraft incursions resolved. The measure represents the percent of conventional aircraft detected visually or by sensor technology, suspected of illicit cross-border activity, which are brought to a successful resolution by its Air and Marine Operations Center. For the management measure, AMO reports air mission launch rate, which is the percent of all requests made for aircraft to which AMO was able to respond. These two measures include data across all border areas, including the northern border, but are not specific to the northern border. Border Patrol officials stated that they have not developed or implemented performance measures to assess their effectiveness at securing the northern border between ports of entry because of competing priorities related to developing measures for southwest border security. According to Border Patrol officials responsible for developing and implementing performance measures, Border Patrol’s priority is to develop measures to assess the effectiveness of its efforts to secure the southwest border, such as the effort to achieve complete operational control as outlined in the Executive Order 13767 instructions and the fiscal year 2018 DHS agency priority goal. Specifically, Border Patrol is required to implement a measure to assess operational control for all southwest border sectors by the end of fiscal year 2019. Border Patrol defines operational control as its ability to impede or deny illegal border crossings, maintain situational awareness, and apply appropriate, time- bound law enforcement response and resolution between the ports of entry. According to Border Patrol officials, the ongoing efforts to develop measures for the southwest border will eventually be applied to the northern border, but it is unknown how these ongoing efforts will be implemented to assess Border Patrol’s performance at securing the northern border between ports of entry. Border Patrol officials stated that following the implementation of operational control for the southwest border, Border Patrol plans to implement the operational control measure along the northern border in fiscal year 2020. Border Patrol officials stated that they are in the early stages of this process, and could not provide any information on how operational control will be implemented for its operations along the northern border. Further, Border Patrol officials could not provide information on how operational control will be used to assess Border Patrol’s performance for securing the northern border between ports of entry. Additionally, in 2012 we recommended that Border Patrol establish milestones and time frames for developing performance measures to support implementation of its 2012-2016 Strategic Plan, including assessing progress made in securing the northern border between ports of entry and informing resource identification and allocation efforts. DHS concurred with our recommendations, and Border Patrol made progress in developing new performance measures for border security. However, we closed the recommendations as not implemented in September 2017 because the measures identified did not apply to the entire northern or coastal borders, as well as the remaining uncertainty about when Border Patrol would develop a new strategic plan. AMO officials stated that they have not implemented performance measures to assess AMO’s effectiveness at securing the northern border between ports of entry in the air and maritime environments because of difficulties in creating region-specific performance targets. Specifically, AMO officials stated that it is difficult to set performance targets for a specific region, such as the northern border, because the threat environment is constantly changing. Also, the officials stated that AMO is waiting for completion of the Northern Border Strategy implementation plan before developing any performance measures specific to the northern border. Additionally, Border Patrol and AMO have ongoing efforts to develop border security metrics pursuant to the National Defense Authorization Act for Fiscal Year 2017. The act directs DHS to annually report metrics and associated data and methodology, including metrics for border security between ports of entry. Consistent with GPRAMA, agencies should establish a balanced set of performance measures, which reinforces the need for agencies to have a variety of measures across program areas. Furthermore, Standards for Internal Control in the Federal Government state that management should determine whether performance measures for the defined objectives are appropriate for evaluating the entity’s performance using targets and milestones. The standards also state that management should track entity achievements and compare actual performance to planned or expected results using established activities such as comparisons and assessments. Border Patrol and AMO could leverage and use their ongoing efforts to develop and implement performance measures to assess effectiveness at securing the northern border between ports of entry. For example, Border Patrol and AMO could use the metrics developed in accordance with the Fiscal Year 2017 National Defense Authorization Act to help inform the development of northern border performance measures. Developing and implementing such measures could help Border Patrol and AMO better assess the effectiveness of their northern border operations between ports of entry, including challenges due to limited staffing and resources, and take corrective actions, as necessary. The United States and Canada share the longest common non-militarized border between two countries, spanning nearly 4,000 miles; however, CBP has historically focused attention and resources, including resources to develop and implement performance measures, primarily on the nearly 2,000 mile U.S.-Mexico border. While Border Patrol and AMO have performance measures that assess specific border security operations or programs that include data from the northern border, these measures generally combine data with other border regions and collectively the measures do not assess effectiveness at securing the northern border between ports of entry. Without northern border performance measures, Border Patrol and AMO cannot assess their effectiveness at securing the northern border between ports of entry. Developing and implementing northern border performance measures could help Border Patrol and AMO assess its northern border operations and address identified challenges. We are making two recommendations, one to Border Patrol and one to AMO. The Chief of Border Patrol should develop and implement performance measures to assess its effectiveness at securing the northern border between ports of entry (Recommendation 1). The Executive Assistant Commissioner of AMO should develop and implement performance measures to assess its effectiveness at securing the northern border between ports of entry in the air and maritime environments (Recommendation 2). We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reproduced in full in appendix V, and technical comments, which we incorporated as appropriate. DHS concurred with both recommendations in the report and described actions Border Patrol and AMO plan to take in response. Border Patrol plans to develop and apply a measure of operational control to its northern border sectors; however, to meet the intent of our recommendation, Border Patrol will also need to use its measure of operational control to assess its effectiveness at securing the northern border between ports of entry. AMO plans to develop a performance measure to assess its effectiveness at securing the northern border between ports of entry and seek DHS approval through completion of a Performance Measure Definition Form. These actions, if effectively implemented by AMO, should address the intent of the recommendation. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of the Department of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report addresses the following questions: 1. What threats has U.S. Customs and Border Protection (CBP) identified along the U.S.-Canada (northern) border between ports of entry? 2. What challenges, if any, has CBP identified in its staffing and resources to secure the northern border between ports of entry, and what actions, if any, has CBP taken to address those challenges? 3. To what extent has CBP developed and implemented performance measures to assess the effectiveness of securing the northern border between ports of entry? To address all three questions, we interviewed Department of Homeland Security (DHS) and CBP officials from headquarters and field locations. Specifically, we met with headquarters officials from DHS’s Office of Strategy, Policy, and Plans; Office of Program Analysis and Evaluation; Science and Technology Directorate; U.S. Coast Guard; and U.S. Immigration and Customs Enforcement. From CBP, we met with headquarters officials from the Air and Marine Operations (AMO), U.S. Border Patrol (Border Patrol), Office of Information and Technology, Office of Intelligence, Office of Facilities and Asset Management, and Office of Accountability/Performance Management and Analysis Division. We also met with officials from the government of Canada to discuss their views on northern border security. For a list of government agencies and entities interviewed in field locations, see table 1. In addition, we conducted site visits in Michigan, New York, Vermont, Virginia, and Washington, as well as the Canadian provinces of British Columbia, Ontario, and Quebec. We chose these locations based on deployment of CBP resources—surveillance technology such as Remote Video Surveillance Systems—and reported levels of illicit cross-border activity by Border Patrol, including arrests of individuals and seizures of narcotics. Findings from our site visits cannot be generalized to all CBP locations along the northern border, but provide valuable insights into our research questions. To address the first question, we reviewed DHS and CBP policies, procedures, reports, and assessments describing threats along the northern border between ports of entry. Specifically, we reviewed DHS’s 2017 Northern Border Threat Analysis Report and the June 2018 Northern Border Strategy. We reviewed Border Patrol policies and procedures related to identifying and documenting threats and intelligence reports, referred to as Intelligence Estimates, completed in each northern border sector for fiscal years 2017 and 2018. In addition, we reviewed Border Patrol’s national intelligence estimates for fiscal years 2017 and 2018. We also reviewed documents describing the results of Border Patrol’s Threats, Targets, and Operations Assessments and Intelligence Preparation for the Operation Environment process completed for northern border sectors from 2014 through 2017. To analyze the number apprehensions and drug seizures along the northern border, we obtained data from the Enforcement Integrated Database for fiscal years 2013 through 2017, a time period for which complete data were available at the time of our review. We assessed the reliability of apprehension and seizure data by performing electronic testing for obvious errors in accuracy and completeness, reviewing existing information about the data and the systems that produced them, and interviewing agency officials knowledgeable about the data. As a result of our data reliability assessment, we determined that Border Patrol’s apprehension and seizure data were sufficiently reliable for our intended use. From AMO, we reviewed the 2017 Northern Border Non- Commercial General Aviation Threat Overview and information collected by the Air and Marine Operations Center on vessel and aircraft border incursions detected along the northern border from fiscal years 2013 through 2017. To address the second question, we reviewed CBP’s Fiscal Year 2019 Congressional Budget Justification. We also reviewed the results from Border Patrol’s capability gap assessment process for all eight northern border sectors completed for fiscal year 2017 and associated operational plans completed in September 2018; Border Patrol’s Surveillance Capability Assessment completed in April 2017; and AMO’s capability gap assessment completed in fiscal year 2016. We reviewed CBP capability analysis reports which included requirements along the northern border. In addition, we reviewed our relevant past work and DHS Office of Inspector General reports on northern border security. To determine the staffing and resource challenges across all eight northern border sectors and three AMO branches, we also met with officials at each sector and branch and reviewed supporting documentation. Specifically, we analyzed responses provided by officials in all eight northern border sectors and three AMO branches and supporting documentation to determine challenges mentioned by officials at two or more locations. We also reviewed supporting documentation, including inventories of assets such as vehicles, vessels, aircraft, radar and land surveillance technology, tactical communication equipment, and facilities information. We obtained Border Patrol, AMO, and Office of Information and Technology staffing information as of September 1, 2018, the most recent data available at the time of our review, including the number of authorized, onboard, and vacant positions. To assess the reliability of this staffing information, we examined the information for any anomalies and interviewed agency officials knowledgeable about the data. We found the staffing information data were sufficiently reliable for our purposes of reporting the number of authorized, onboard, and vacant positions. To address the third question, we reviewed and analyzed documentation that describes DHS and CBP processes for developing and implementing performance measures, including DHS’s Annual Performance Report for Fiscal Years 2017-2019, CBP’s Fiscal Year 2019 Congressional Budget Justification, and Performance Measure Definition Forms for recently developed performance measures. We reviewed reports, assessments, and strategies that describe current DHS and CBP performance measure initiatives. We also reviewed information from CBP’s National Border Geospatial Intelligence Strategy, including information on reports derived from geospatial intelligence technology, used as the basis for two of Border Patrol’s performance measures that contain data from the northern border. Additionally, we reviewed DHS’s most recent border security metrics report. We compared CBP’s actions to develop and implement performance measures to Standards for Internal Control in the Federal Government and the principles outlined in Government Performance and Results Act (GPRA) Modernization Act of 2010. We compiled the descriptive information in the northern Border Patrol sector profiles in appendix II from a variety of sources. We obtained information on each sector’s geography and area of responsibility from Border Patrol documentation. We obtained information on the number of authorized agents from Border Patrol as of September 1, 2018. We obtained information on the major urban areas within each sector and population estimates from the U.S. Census Bureau and the data are current as of July 1, 2017, the most recent estimates available at the time of our review. Finally, we obtained geographic information on the location of each northern Border Patrol sector and its stations from Border Patrol and located the data geographically using MapInfo. To analyze the number of apprehensions and drug seizures for each northern Border Patrol sector, we obtained data from the Enforcement Integrated Database for fiscal years 2013 through 2017, a time period for which complete data were available at the time of our review. The data fields we obtained included the individual’s immigration status at entry and country of citizenship and the drug type and quantity in pounds seized. Our analysis categorizes the sector’s apprehensions by the top four to six countries of citizenship of the individuals apprehended by Border Patrol and their immigration status at entry. Present without admission from Canada indicates the individual was suspected to be inadmissible for illegally entering the United States from Canada; present without admission from Mexico indicates the individual was suspected to be inadmissible for illegally entering the United States from Mexico; and the other category is a combination of all remaining categories, such as lawful permanent residents or other foreign nationals who may or may not be lawfully present in the United States. Our analysis also categorizes the sector’s number of drug seizures by the top three to six types of drugs that Border Patrol seized most frequently, as well as the quantity in pounds of those seizures. We assessed the reliability of apprehension and seizure data by performing electronic testing for obvious errors in accuracy and completeness, reviewing existing information about the data and the systems that produced them, and interviewing agency officials knowledgeable about the data. As a result of our data reliability assessment, we determined that Border Patrol’s apprehension and seizure data were sufficiently reliable for our intended use. We compiled the descriptive information in the northern region AMO branch profiles in appendix III from information provided by each branch and AMO headquarters. We obtained information on staffing for the three northern border branches as of September 2018. We obtained the geographic information on location of each northern region AMO branch and unit from AMO and located the data geographically using MapInfo. For total flight and float hours across all AMO operating locations and regions, we reviewed CBP data on flight and float hours from fiscal years 2013 through 2017, a time period for which complete data were available at the time of our review. For Border Patrol riverine float hours across all locations, we reviewed and analyzed float hour data from fiscal year 2017, the most recent year for which complete data were available at the time of our review. For data on air and marine missions across AMO’s northern region branches and units, we reviewed CBP data on seizures of narcotics, apprehensions, and arrests from fiscal years 2013 through 2017, a time period for which complete data were available at the time of our review. To determine the reliability of CBP’s data on flight and float hours, and mission information for seizures of narcotics, apprehensions, and arrests data, we examined the data for any anomalies, reviewed CBP guidance and documents for data collection and entry, and interviewed CBP officials to understand their methods for collecting, reporting, and validating the data. We found these data were sufficiently reliable for our purposes of reporting summary data across fiscal years 2013 through 2017. To obtain information on irregular northbound migration in appendix IV, we met with DHS and Border Patrol officials—including the three sectors (Blaine, Grand Forks, and Swanton sectors) with the highest reported levels of irregular northbound migration at the time of our review—and reviewed intelligence reports and assessments. We obtained the descriptive information in appendix IV on irregular northbound migration from a variety of sources. For data from the government of Canada on the number of asylum claimants, we downloaded publicly reported summary data on asylum claimants from the government of Canada for 2012 through 2017. For data on the number of individuals illegally entering Canada between ports of entry known to Border Patrol, we collected and reviewed information from Blaine, Grand Forks, and Swanton sectors for calendar years 2012 through 2017. To determine the reliability of data, we interviewed officials at each sector to understand their methods for collecting, reporting, and validating the data. According to Border Patrol officials at Blaine, Grand Forks, and Swanton sectors, the number of individuals illegally entering Canada between ports of entry was tracked through agent reporting and detection by land surveillance technology, such as surveillance cameras and unattended ground sensors. Based on Border Patrol’s methods for collecting, reporting, and validating the data, we found these data were sufficiently reliable for our purposes of reporting summary-level data. The performance audit upon which this report is based was conducted from October 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with DHS from March 2019 to June 2019 to prepare this nonsensitive version of the original sensitive report for public release. To provide a descriptive overview of the northern border sectors, we developed a profile for each of the eight U.S. Border Patrol (Border Patrol) sectors located along the U.S.-Canada (northern) border: Blaine, Washington; Spokane, Washington; Havre, Montana; Grand Forks, North Dakota; Detroit, Michigan; Buffalo, New York; Swanton, Vermont; and Houlton, Maine. These profiles are listed in order from the western-most sector to the eastern-most sector and contain an overview of each sector’s geography and area of responsibility and an analysis of apprehensions and drug seizures from fiscal years 2013 through 2017. Within U.S. Customs and Border Protection (CBP), Air and Marine Operations (AMO) conducts multifaceted missions consisting of direct support to U.S. Border Patrol (Border Patrol) and collaborative efforts with U.S. Immigration and Customs Enforcement’s Homeland Security Investigations and other federal, state, and local partner agencies. This includes, but is not limited to, investigative operations, surveillance missions, warrant service, and criminal apprehensions. AMO conducts missions along the U.S.-Canada (northern) border through three branches: Bellingham Air and Marine Branch in Bellingham, Washington; Great Lakes Air and Marine Branch at Selfridge Air National Guard Base, Michigan; and Manassas Air Branch in Manassas, Virginia. Each branch is further divided into units to conduct air or maritime missions. According to AMO data for fiscal years 2013 through 2017, AMO’s Northern Region accounted for 14 percent and 22 percent of total AMO flight and float hours, respectively, as shown in table 10. AMO implements a requirements determination process for annual aircraft flight and vessel float hours based on known mission requirements, funding levels, available assets, and the needs of law enforcement partners. Further, flight and float hours allocated across AMO’s regions are prioritized through CBP’s Flight and Float Hour Executive Oversight Council, which prioritizes flight and float hour allocations considering Department of Homeland Security and CBP’s strategic objectives and border security requirements, threats, and capacity that will be executed over the course of the upcoming year. In February 2018, CBP also created the Flight and Float Hour Executive Steering Committee comprised of Border Patrol and AMO executive leadership to perform periodic audits of flight hour execution, review changing operational environments, validate planning assumptions, and perform an evaluation on overall return on investment to best ensure that CBP asset utilization is consistently aligned with its priorities and threats. AMO’s Bellingham Air and Marine Branch is located in Bellingham, Washington, and is comprised of the Spokane and Montana Air Units and Port Angeles and Bellingham Marine Units. For a map of those operating locations, see figure 20. As of the end of September 2018, Bellingham Air and Marine Branch had 38 authorized Air Interdiction Agent positions and 20 authorized Marine Interdiction Agent positions. According to data provided by AMO for fiscal years 2013 through 2017, missions completed by Bellingham Air and Marine Branch resulted in: 51 apprehensions of potentially removable aliens; 963 arrests of individuals; and 536 drug seizures, including: 204 methamphetamine seizures (1,033 pounds); 93 cocaine seizures (778 pounds); 155 heroin seizures (305 pounds); 65 marijuana seizures (14,132 pounds); and 19 other drug seizures (608 pounds). AMO’s Great Lakes Air and Marine Branch is located at Selfridge Air National Guard Base, Michigan and is comprised of the Buffalo and Chicago Air Units and the Sault Sainte Marie, Port Huron, Trenton, Sandusky, Erie, Buffalo, and Rochester Marine Units. For a map of those operating locations, see figure 21. As of September 2018, Great Lakes Air and Marine Branch had 27 authorized Air Interdiction Agent positions and 49 authorized Marine Interdiction Agent positions. According to data provided by AMO for fiscal years 2013 through 2017, missions completed by Great Lakes Air and Marine Branch resulted in: 157 apprehensions of potentially removable aliens; 2,571 arrests of individuals; and 1,475 drug seizures, including: 553 marijuana seizures (6,974 pounds); 474 cocaine seizures (4,408 pounds); 296 heroin seizures (425 pounds); 87 methamphetamine seizures (1,347 pounds); and 65 other drug seizures (107 pounds). AMO’s Manassas Air Branch is located in Manassas, Virginia, and is comprised of the New York, Plattsburgh, and Houlton Air Units. For a map of those operating locations, see figure 22. As of September 2018, Manassas Branch had 35 authorized Air Interdiction Agent positions. According to data provided by AMO for fiscal years 2013 through 2017, missions completed by Manassas Air Branch resulted in: 57 apprehensions of potentially removable aliens; 1,347 arrests of individuals; and 472 drug seizures, including: 161 marijuana seizures (12,015 pounds); 141 heroin seizures (141 pounds); 134 cocaine seizures (707 pounds); 25 methamphetamine seizures (39 pounds); and 11 other drug seizures (107 pounds). Irregular northbound migration—northbound movement of foreign nationals from the United States across the northern border into Canada between official ports of entry typically to make an asylum claim— increased in 2017. Specifically, in 2017 the Royal Canadian Mounted Police reported approximately 20,000 irregular northbound migrants intercepted between official ports of entry. The majority of interceptions were reported in the province of Quebec (91 percent) with additional interceptions noted in Manitoba (5 percent) and British Columbia (3 percent). In comparison, from 2012 to 2016 the total number of asylum claimants for all of Canada (including at and between official ports of entry) ranged from approximately 10,000 to 24,000 per year. The total number of asylum claimants for all of Canada (including at and between official ports of entry) increased from approximately 24,000 claimants in 2016 to approximately 50,000 claimants in 2017. According to Border Patrol officials, in 2017 the number of individuals crossing from the United States into Canada, other than those crossing through official ports of entry, increased within 3 of 8 Border Patrol sectors along the northern border: Blaine, Washington; Grand Forks, North Dakota; and Swanton, Vermont. Blaine Border Patrol Sector. The number of individuals entering Canada between official ports of entry in British Columbia, north of Blaine sector’s area of responsibility, known to Border Patrol was approximately 1,200 individuals during the 4-year period from 2012 through 2015, according to sector officials. In 2016, the number of individuals known to Blaine sector increased to approximately 1,100 individuals, and then increased again to approximately 1,400 individuals in 2017. Grand Forks Border Patrol Sector. The number of individuals entering Canada between official ports of entry in Manitoba, north of Grand Forks sector’s area of responsibility, known to Border Patrol was approximately 580 individuals during the 4-year period from 2012 through 2015, according to sector officials. In 2016, the number of individuals known to Grand Forks sector increased to approximately 400 individuals, and then increased to approximately 1,000 individuals in 2017. Swanton Border Patrol Sector. The number of individuals entering Canada between official ports of entry in Quebec, north of Swanton sector’s area of responsibility, known to Border Patrol was approximately 1,000 individuals during the 4-year period from 2012 through 2015, according to sector officials. In 2016, the number of individuals known to Swanton sector increased to approximately 1,100 individuals, and then increased to approximately 16,800 individuals in 2017. According to Swanton Border Patrol Sector officials, the majority of known entries into Canada by irregular northbound migrants between official ports of entry have occurred along Roxham Road in Champlain, New York. For a photo of a facility constructed by the government of Canada to process irregular northbound migrants north of Roxham Road, see figure 23. Department of Homeland Security (DHS) and Border Patrol officials we met with identified a bi-national agreement associated with the increased number of irregular northbound migrants from the United States to Canada from 2016 through 2017. Irregular northbound migrants entering Canada between official ports of entry are not subject to the framework established by the 2002 Safe Third Country Agreement signed by Canada and the United States, which governs the processing of asylum claims along the shared land border and applies only to those individuals entering at an official port of entry, not between ports of entry. Therefore, individuals who enter Canada by land between official ports of entry to make an asylum claim may be allowed to stay in Canada rather than have their claim handled by the United States. Individuals seeking to travel to Canada to make an asylum claim, whether or not they may have a valid asylum claim, are made aware of the potential ability to enter and remain in Canada pending an asylum decision due to wide sharing of this information through social media and reporting in the press. Otherwise, for those attempting to enter Canada through an official land port of entry to claim asylum, claimants may be returned to pursue their asylum claim in the country of last presence, which would be the United States, unless they qualify for one of the exceptions in the agreement. According to DHS officials, Canadian data indicates a large percentage of irregular northbound migrants had previously obtained nonimmigrant visas, primarily B1/B2 visas, which authorized their temporary travel to the United States, and subsequently entered Canada between official ports of entry to claim asylum. DHS, in collaboration with the U.S. Department of State, worked to identify, and as appropriate, revoke visas of individuals seeking to enter Canada between official ports of entry. Border Patrol intelligence reporting in 2017 identified visa fraud concerns because individuals obtained visas to enter the United States, when it appeared that their main intention was to enter Canada other than through a port of entry and claim asylum. Border Patrol officials stated that the widespread perception among irregular northbound migrants they encounter is that Canada’s asylum policies are more welcoming than those of the United States, which has also contributed to the increased trend in irregular northbound migration. These officials cited both U.S. and Canadian reporting on the 2016 U.S. Presidential Election, along with a welcoming statement by the government of Canada, and perceived generosity of benefits upon application for asylum in Canada as reasons that migrants seek to enter Canada between official ports of entry and claim asylum. According to Border Patrol officials, the northbound asylum flows from the United States to Canada could potentially lead to future attempts to enter the United States illegally between ports of entry from Canada by individuals whose asylum claims are rejected by the government of Canada. According to anecdotal reporting to Border Patrol officials, some of the irregular northbound migrants who entered Canada from the United States were unable to gain status in Canada or the process was not what they had anticipated. According to the officials, these individuals subsequently attempted to reenter the United States in an effort to gain legal status in the United States. For example, Swanton Border Patrol Sector reported two incidents in April 2018 in which groups of individuals who were apprehended attempting to illegally enter the United States from Canada stated that they were seeking to reenter the United States after their asylum claims were rejected by the government of Canada. In addition to the contact named above, Christopher Ferencik (Assistant Director), David Alexander, Michele Fejfar, Eric Hauswirth, Grant Holyoak, John Mingus, Sasan J. “Jon” Najmi, Claire Peachey, Carl Potenzieri, and Natalie Swabb made key contributions to this report.", "summary": "The United States and Canada share the longest common non-militarized border between two countries, spanning nearly 4,000 miles of land and maritime borders from the states of Washington to Maine. CBP, within DHS, has primary responsibility for securing U.S. borders at and between ports of entry. GAO was asked to review CBP's efforts to secure the northern border between ports of entry. This report examines, among other things, (1) the staffing and resource challenges that CBP identified and actions it has taken to address those challenges and (2) the extent to which CBP has developed and implemented performance measures to assess its effectiveness at securing the northern border between ports of entry. GAO reviewed agency documentation and met with DHS and CBP officials in headquarters and field locations. This is a public version of a sensitive report that GAO issued in March 2019. Information that DHS deemed sensitive has been omitted. U.S. Customs and Border Protection (CBP) identified staffing and resource challenges affecting its enforcement activities along the U.S.-Canada (northern) border and actions to address them, but faces competing priorities. The U.S. Border Patrol (Border Patrol) and Air and Marine Operations (AMO) are the components within CBP responsible for securing U.S. borders between ports of entry in the land, air, and maritime environments. Border Patrol identified an insufficient number of agents that limited patrol missions along the northern border. AMO identified an insufficient number of agents along the northern border, which limited the number and frequency of air and maritime missions. Border Patrol and AMO also identified a variety of resource challenges along the northern border, such as limited radar and surveillance technology coverage and inadequate facilities to process and temporarily hold apprehended individuals. While the Department of Homeland Security (DHS) and CBP identified actions to address staffing and resource challenges, it is unknown whether these challenges will be addressed. This is primarily because CBP's priority is to secure the U.S.-Mexico (southwest) border. Issued in January 2017, Executive Order 13767 directed DHS to take actions to secure the southwest border by, among other things, constructing physical barriers and hiring thousands of agents. While CBP has performance measures that assess selected border security operations or programs, some of which include data from the northern border, it does not have specific measures to assess its effectiveness at securing the northern border between ports of entry. For example, Border Patrol has performance measures that assess security in remote areas on the northern border, but the measures do not include data from maritime border areas. Developing and implementing such measures could help Border Patrol and AMO better assess the effectiveness of their northern border operations between ports of entry, including addressing challenges due to limited staffing and resources. GAO is making two recommendations, that Border Patrol and AMO each develop and implement performance measures to assess their effectiveness at securing the northern border between ports of entry. DHS concurred with both recommendations.", "document_type": "gao"}
{"report": "FEMA’s Public Assistance program provides grant funding to state, territorial, local, and tribal governments as well as certain types of private nonprofit organizations to assist with responding to and recovering from presidentially-declared major disasters or emergencies. As shown in figure 3, Public Assistance grant funds are categorized broadly as “emergency work” or “permanent work.” Within these broad categories are separate subcategories. In addition to the emergency work and permanent work categories, the program includes category Z, which represents indirect costs, direct administrative costs, and any other administrative expenses associated with a specific project. FEMA’s Public Assistance program also provides grant funding for cost- effective hazard mitigation measures to reduce or eliminate the long-term risk to people and property from future natural and man-made disasters and their effects. For example, a community that had a fire station damaged by a disaster could use Public Assistance grant funding to repair the facility and incorporate additional measures such as installing hurricane shutters over the windows to mitigate the potential for future damage. FEMA, the state or territorial government (the recipient), and local or territorial entities (the subrecipient) work together to develop projects under the Public Assistance program. After a project has completed FEMA’s review process and is approved, FEMA obligates funding for the project by placing money into an account where the recipient has the authority to draw down—or withdraw—funding to pay the subrecipient for eligible work upon completion. The Sandy Recovery Improvement Act of 2013 authorized the use of alternative procedures in administering the Public Assistance program, thereby providing new flexibilities to FEMA, states, territories, and local governments for debris removal, infrastructure repair, and rebuilding projects using funds from this program. Unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures allow awards for permanent work projects to be made on the basis of fixed-cost estimates to provide financial incentives for the timely and cost-effective completion of work. Under these procedures, if the actual cost of the project exceeds the fixed-cost estimate agreed upon by FEMA and the recipient, the recipient or subrecipient is responsible for the additional costs at the time of the close-out process. However, if the actual cost of completing eligible work for a project is below the estimate, the recipient may use the remaining funds for additional cost-effective hazard mitigation measures to increase the resilience of public infrastructure. In addition, these funds may also be used for activities that improve the recipient’s or subrecipient’s future Public Assistance operations or planning. In October 2017, Puerto Rico requested, and FEMA approved, the use of the alternative procedures program for all large-project funding for Public Assistance permanent work projects in categories C through G. Although FEMA had approved alternative procedure grants in 30 states as of April 2018, in these cases, alternative procedures were used on a project-by-project basis. Puerto Rico’s recovery from the 2017 hurricanes is the first recovery to use alternative procedures for all large permanent work projects. In addition, in July 2018, FEMA approved a request from the Governor of the USVI to transition to using the Public Assistance alternative procedures program for permanent work in the territory. Unlike in Puerto Rico, the USVI may pursue the alternative procedures on a project-by-project basis. As of April 2019, FEMA had obligated a total of about $7.4 billion in grant funds for Public Assistance projects in both Puerto Rico and the USVI. Specifically, as shown in figure 4, FEMA obligated approximately $5.6 billion for 1,264 Public Assistance projects in Puerto Rico, including approximately $5.1 billion (90 percent) for emergency work (categories A and B) and $377.7 million (7 percent) for permanent work in categories C through G). Puerto Rico had expended approximately $3.5 billion—about 61 percent of total Public Assistance grant obligations in Puerto Rico—as of April 2019. Ninety-six percent of the expended amount went toward emergency work projects in categories A and B while just over one percent went toward permanent work projects. The majority of FEMA’s obligations and the funding Puerto Rico expended as of April 2019 are for emergency work because these projects began soon after the disasters struck and focused on debris removal and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer-term repair and restoration of public infrastructure. In the USVI, FEMA had obligated approximately $1.8 billion for 583 Public Assistance projects across the territory, as of April 2019. Similar to Public Assistance grant funding in Puerto Rico, the majority of funding FEMA obligated and the USVI expended was in emergency work categories A and B. Specifically, FEMA obligated approximately $1.1 billion (63 percent) for emergency work (categories A and B) and $587.3 million (33 percent) for permanent work (categories C through G) in the territory (see fig. 5). Of the $1.8 billion FEMA obligated for Public Assistance projects, the USVI had expended approximately $982.4 million as of April 2019. Specifically, the USVI had expended about $808.1 million (82 percent) for emergency work projects in categories A and B and $163.1 million (17 percent) for permanent work projects in categories C through G. Emergency work. As of April 2019, FEMA had obligated a total of approximately $6.2 billion for emergency work projects in Puerto Rico and the USVI—including about $5.1 billion in Puerto Rico and $1.1 billion in the USVI. These projects focused on debris removal activities and providing assistance to address immediate threats to life and property. For example, as of April 2019, FEMA had obligated $138.9 million for projects focused on debris removal activities in the USVI under category A. This included $45.9 million to the USVI Department of Public Works for USVI-wide debris removal efforts and $39.1 million to the USVI Water and Power Authority for these activities in St. Croix (see fig. 6). In another example, FEMA obligated more than $140.0 million to the Puerto Rico Aqueducts and Sewer Authority under category B to fund emergency protective measures, including using back-up generators to supply water to the island after Hurricane Maria, among other things. Further, as of April 2019, FEMA had obligated $1.1 billion in Puerto Rico and $278 million in the USVI to fund the Sheltering and Temporary Essential Power pilot program. This program, which is implemented as a subprogram under Public Assistance program category B, is intended to provide essential repairs or restore power to private residences to allow affected individuals to return or remain in their homes, thereby reducing the demand for other shelter options. We are continuing to assess this program as part of our ongoing work on recovery efforts in the USVI. Permanent work. As of April 2019, FEMA had obligated approximately $965.0 million for permanent work projects in Puerto Rico and the USVI— including about $377.7 million in Puerto Rico and $587.3 million in the USVI. These projects focused on the restoration of disaster-damaged infrastructure or systems. For example, under category C, FEMA obligated $137.6 million for projects in Puerto Rico focused on the permanent repair of roads and bridges, such as the severely damaged road shown in figure 7 below. In addition, under category E, FEMA obligated $39.2 million and $67.7 million for projects in Puerto Rico and the USVI, respectively, focused on repairing and rebuilding damaged public buildings and equipment, such as the schools shown in figure 8 below. Further, under category F, FEMA obligated $504.9 million for projects in the USVI to repair damaged utilities. Specifically, FEMA obligated $481.8 million—or 95 percent of this total—through the standard Public Assistance program for projects focused on territory-wide permanent electrical distribution system repairs. This includes replacing damaged wooden utility poles with more resilient composite fiberglass poles that can withstand 200 mile per hour winds as well as power transmission lines and transformers (see fig. 9). As the recipients of federal disaster funding, Puerto Rico and the USVI are responsible for monitoring and overseeing the Public Assistance program to ensure it is implemented in compliance with applicable laws, regulations, and requirements as well as FEMA policies and guidance. To address these responsibilities, Puerto Rico and the USVI established recovery offices to manage recovery activities and funding, including through the Public Assistance program. In March 2019, we reported that Puerto Rico, in accordance with Amendment 5 to the President’s disaster declaration, established the Central Office for Recovery, Reconstruction, and Resilience (COR3) to oversee federal recovery funds. We also reported that COR3 was developing an internal controls plan to help ensure better management and accountability of the funds. According to FEMA officials, FEMA instituted a manual reimbursement process due to Puerto Rico’s financial situation, weaknesses in internal controls, and the large amount of recovery funds, among other things, to mitigate risk and help ensure financial accountability. However, from our ongoing work on Puerto Rico’s disaster recovery efforts, we have learned that, on April 1, 2019, FEMA removed the manual reimbursement process and began a transition to allow the central recovery office to take responsibility for the review and reimbursement approval of federal recovery funds. We have also learned from our ongoing work that, in March 2019, COR3 released the Disaster Recovery Federal Funds Management Guide. Among other things, the guide outlines COR3’s roles and responsibilities and the internal controls COR3 put in place to oversee the recovery. For example, COR3 will identify, procure, and administer all federal, territorial, and private resources available to Puerto Rico related to recovery. In addition, it will provide oversight of subrecipients using risk-based monitoring, offer technical assistance, and advise Puerto Rico’s governmental agencies and municipalities regarding any matter related to recovery. COR3 continues to update its online transparency portal intended to provide a breakdown of FEMA Public Assistance and other federal funding obligated for disaster recovery in Puerto Rico. According to our preliminary observations, in February 2019, the USVI established the new Office of Disaster Recovery. This office serves as the primary territorial agency responsible for overseeing all disaster recovery efforts and funding in the territory, and coordinates across all USVI governmental agencies and other pertinent entities. According to USVI officials, following the 2017 hurricanes, key USVI agencies did not have enough employees with the knowledge and expertise necessary to staff recovery-related positions and effectively manage the implementation of recovery efforts. To address this challenge in the short-term, the USVI government hired two contractors in December 2017—Witt O’Brien’s, LLC and Ernst & Young Puerto Rico, LLC—to assist the territory in planning, developing, implementing, and overseeing Public Assistance program projects, among other responsibilities. The Director of the Office of Disaster Recovery told us that while contractor personnel had been valuable in augmenting the USVI’s management capacity in the short term, the territory’s longer-term vision included the establishment of the Office of Disaster Recovery to centrally manage all aspects of federal recovery in the territory. Among other things, the Office of Disaster Recovery is responsible for taking on the USVI’s monitoring and oversight responsibilities for the Public Assistance program in the long term. This includes tracking and reporting on the progress of projects and overseeing reimbursement requests for completed work to ensure compliance with applicable laws and FEMA policies. As of March 2019, the Director of the Office of Disaster Recovery told us the priority is to quickly hire and train qualified individuals to staff the new agency. FEMA officials in the USVI stated that the establishment of the Office of Disaster Recovery and the USVI’s ongoing efforts to hire local residents into recovery-related positions represented a positive step forward in increasing the territory’s capacity to oversee recovery efforts. We will continue to review the monitoring and oversight of recovery efforts in Puerto Rico and the USVI in our ongoing work. Our prior and ongoing work highlight the challenges with implementing the Public Assistance program—and the alternative procedures—in Puerto Rico and the USVI. In particular, our prior and ongoing work have identified challenges related to (1) the clarity of FEMA’s guidance for the Public Assistance program, (2) the time and resources needed to transition to FEMA’s new Public Assistance program delivery model in Puerto Rico, (3) the implementation of flexibilities provided by the Bipartisan Budget Act of 2018, and (4) developing fixed-cost estimates. FEMA has taken some actions, including issuing additional guidance and developing specific training, among other things, to improve Public Assistance implementation in Puerto Rico and the USVI. However, it is too soon to assess their effectiveness in addressing these issues. Clarity of Guidance. In March 2019, we reported that officials from FEMA, COR3, and municipalities said they experienced initial challenges with the recovery process, including concerns about lack of experience and knowledge of the alternative procedures; and concerns about missing, incomplete, or conflicting guidance from FEMA on the alternative procedures. In addition, in our June 2019 testimony statement we continued to report on these challenges and preliminary observations from our ongoing work indicate that these challenges continue. For example, officials from Puerto Rico’s government agencies told us they did not feel they had sufficient guidance on the FEMA Public Assistance program and where they did, written and verbal FEMA guidance was inconsistent or conflicting. For instance, officials from one agency expressed their desire for more FEMA guidance communicated in writing as FEMA officials would frequently interpret existing guidance differently. Similarly, officials from two agencies described situations where they had initially been directed to follow one interpretation of a policy, only to be directed to follow a different, conflicting interpretation in the subsequent months. Puerto Rico agency officials also stated that the lack of sufficient instruction led to a “back and forth” with FEMA for clarifications, which led to delays in the phases of project development. For example, officials from one Puerto Rico government agency stated that conflicting verbal instructions from several FEMA officials contributed to delays in opening the bidding process for recovery-related contracts. FEMA officials in Puerto Rico stated that the agency has developed specific guidance for disaster recovery in Puerto Rico and that there are various ways, such as in-person meetings, where officials from Puerto Rico can obtain clarification. FEMA officials also reported that they developed additional training for new FEMA employees. We are continuing to examine this issue as part of our ongoing review of Puerto Rico’s recovery. FEMA’s new delivery model in Puerto Rico. In May 2019, FEMA’s Federal Disaster Recovery Coordinator for Puerto Rico announced that FEMA was transitioning to using the new Public Assistance program delivery model in Puerto Rico beginning on June 3, 2019. Among other things, the implementation of the new delivery model establishes a new Consolidated Resource Center in Puerto Rico to support grant development for disaster recovery across all recovery sectors and geographic branches. Following the hurricanes, FEMA implemented a program delivery model developed specifically for Puerto Rico which included, among other things, a sector-based approach which coordinated recovery resources across the federal interagency, private sector, and nongovernmental organizations to identify and complete proposed work. According to FEMA officials, the decision to transition from the initial delivery model to the new delivery model in Puerto Rico was due to improvements made since its nationwide deployment in 2017. In response, COR3 officials raised concerns about the scope of the changes and potential challenges with the amount of time and resources needed to transition to the new delivery model. The Bipartisan Budget Act of 2018. We reported in June 2019 that in both Puerto Rico and the USVI, FEMA and local officials have reported challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. This section of the Act allows for the provision of assistance under the Public Assistance alternative procedures to restore disaster-damaged facilities or systems that provide critical services—such as medical and educational facilities— to an industry standard without regard to pre-disaster condition. Officials from Puerto Rico’s central government stated that they disagreed with FEMA’s interpretation of the types of damages covered by section 20601 of the Bipartisan Budget Act of 2018. In response, FEMA officials in Puerto Rico stated they held several briefings with Puerto Rico’s central recovery office to explain FEMA’s interpretation of the section. In addition, FEMA officials in the USVI told us that initially, they had difficulty obtaining clarification from FEMA headquarters regarding how to implement key components of section 20601 of the Act. Further, USVI officials stated that at times, the appropriate process for implementing components of the Act was not clear and that ensuring program participants understood its key components was difficult. However, FEMA officials in the USVI stated that they continue to move forward with developing alternative procedures projects. USVI officials also told us that FEMA had been responsive and helpful in identifying its options for using the new flexibilities the Act provides. Developing Fixed-Cost Estimates. Preliminary observations from our ongoing work indicate that as of May 2019, FEMA had obligated funding for four alternative procedures program projects in Puerto Rico and two projects in the USVI. FEMA officials in Puerto Rico and the USVI stated that the ongoing development of a “cost factor” for use in the fixed-cost estimating process has slowed the pace of FEMA obligations for permanent work projects. Specifically, these factors are intended to ensure that the costs associated with implementing projects in Puerto Rico and the USVI are sufficiently captured when developing the fixed- cost estimates for alternative procedures projects. Since incorporating the cost factor into the fixed-cost estimating process will increase the amount of funding obligated for any given permanent work project, FEMA officials explained that Puerto Rico and the USVI have an incentive to delay the obligation of individual projects until this factor is finalized. For example, FEMA officials in the USVI told us in May 2019 that obligations for permanent work projects in the territory were mostly on hold until the USVI-specific cost factor was finalized. As of June 2019, the cost factors for use in both Puerto Rico and the USVI had not yet been finalized. According to FEMA guidance, the Puerto Rico-specific cost factor is being developed by a third-party center of excellence comprising personnel selected by FEMA and Puerto Rico, through COR3. In March 2019, we reported that while FEMA had identified and chosen personnel, COR3 had not yet finalized its hiring of personnel to staff the center of excellence, which resulted in delaying the cost estimation process. Through our ongoing work we learned that, as of June 2019, COR3 had identified and hired personnel to staff the center; however, FEMA and COR3 have not come to agreement on a cost estimation approach. Further, according to FEMA officials, no timeline has been established for the completion of the center of excellence’s standard operating procedures for developing fixed-cost estimates for permanent work projects in Puerto Rico. In addition, according to FEMA officials, the USVI-specific factor is being developed by an independent contractor. FEMA officials told us that territorial officials disagreed with the initial cost factors this contractor proposed and contended the factors were insufficient in accurately capturing the unique circumstances that influence construction costs in the territory, such as the limited availability of local resources and the need to import materials and labor. As of June 2019, these officials told us the contractor was developing a third and final cost factor for potential incorporation into the fixed-cost estimation process in the USVI. Despite these delays, FEMA officials in the USVI stated that they continue to work with territorial officials to develop alternative procedures projects in the territory. They added that once the cost factor is finalized and incorporated into FEMA’s fixed-cost estimating process, FEMA and the USVI will be well positioned to quickly finalize these projects and obligate funding. However, we reported in June 2019 that the territory plans to take a cautious approach in pursuing permanent work projects using the Public Assistance alternative procedures program. Specifically, USVI officials we interviewed told us that developing fixed-cost estimates for alternative procedures projects that accurately incorporate the future impact of inflation and increases in materials and labor costs for certain projects was difficult. Further, these officials stated that since the territory is financially responsible for any costs that exceed these fixed-cost estimates, the USVI plans to pursue alternative procedures projects that do not include high levels of complexity or uncertainty to reduce the risk of cost overruns, especially given its already difficult financial situation. As established in FEMA guidance, Puerto Rico’s deadline for finalizing fixed-cost estimates for permanent work projects using the alternative procedures—and the Bipartisan Budget Act, as applicable—is October 2019. Since Puerto Rico must use the alternative procedures for all large permanent work, all fixed-cost estimates for Public Assistance program permanent work projects in Puerto Rico must be finalized by this date, or, according to FEMA officials, Puerto Rico must request that FEMA extend this deadline on a project-by-project basis. In contrast, the USVI has the flexibility to pursue either the alternative procedures or the standard procedures on a project-by-project basis. As the USVI’s deadline for finalizing these projects is in March 2020, it is too early gauge the extent to which the alternative procedures will play a role in the USVI’s long-term recovery strategy. We will continue to evaluate these identified challenges and any efforts to address them, as well as other aspects of recovery efforts in the USVI and Puerto Rico, and plan to report our findings in late 2019 and early 2020, respectively. Thank you, Chairman Payne, Ranking Member King, and Members of the Subcommittee. This concludes my prepared statement. I would be happy to respond to any question you may have at this time. If you or your staff has any questions concerning this testimony, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Joel Aldape (Assistant Director), Bryan Bourgault, Aaron Gluck, Taylor Hadfield, Brian Lipman, and Amanda Prichard. In addition, Eric Hauswirth, Susan Hsu, Tracey King, Taylor Matheson, Amanda Miller, Heidi Nielson, and Kevin Reeves made contributions to this statement. Key contributors for the previous work on which this statement is based are listed in each product. 2017 Disaster Relief Oversight: Strategy Needed to Ensure Agencies’ Internal Control Plans Provide Sufficient Information. GAO-19-479 (Washington, D.C.: June 28, 2019). Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight Imperative for Further Improvements, GAO-19-617T (Washington, D.C.: June 25, 2019). Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight the Imperative for Further Improvements, GAO-19-594T (Washington, D.C.: June 12, 2019). Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318 (Washington, D.C.: May 14, 2019). Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery. GAO-19-281 (Washington, D.C.: April 24, 2019). 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296 (Washington, D.C.: April 18, 2019). FEMA Grants Modernization: Improvements Needed to Strengthen Program Management and Cybersecurity. GAO-19-164 (Washington, D.C.: April 9, 2019). Disaster Recovery: Better Monitoring of Block Grant Funds Is Needed. GAO-19-232 (Washington, D.C.: March 25, 2019). Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256 (Washington, D.C.: March 14, 2019). Huracanes de Puerto Rico: Estado de Financiamiento de FEMA, Supervisión y Desafíos de Recuperación. GAO-19-331 (Washington, D.C.: March 14, 2019). High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP (Washington, D.C.: March 6, 2019). U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253 (Washington, D.C.: February 25, 2019). 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93 (Washington, D.C.: December 6, 2018). Continuity of Operations: Actions Needed to Strengthen FEMA’s Oversight and Coordination of Executive Branch Readiness. GAO-19-18SU (Washington, D.C.: November 26, 2018). Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354 (Washington, D.C.: September 6, 2018). 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472 (Washington, D.C.: September 4, 2018). Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18-366 (Washington, D.C.: May 31, 2018). 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335 (Washington, D.C.: February 28, 2018). Disaster Recovery: Additional Actions Would Improve Data Quality and Timeliness of FEMA’s Public Assistance Appeals Processing. GAO-18-143 (Washington, D.C.: December 15, 2017). Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30 (Washington, D.C.: November 8, 2017). Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720 (Washington, D.C.: September 28, 2017). Federal Disaster Assistance: Federal Departments and Agencies Obligated at Least $277.6 Billion during Fiscal Years 2005 through 2014. GAO-16-797 (Washington, D.C.: September 22, 2016). Disaster Recovery: FEMA Needs to Assess Its Effectiveness in Implementing the National Disaster Recovery Framework. GAO-16-476 (Washington, D.C.: May 26, 2016). Disaster Response: FEMA Has Made Progress Implementing Key Programs, but Opportunities for Improvement Exist. GAO-16-87 (Washington, D.C.: February 5, 2016). Hurricane Sandy: An Investment Strategy Could Help the Federal Government Enhance National Resilience for Future Disasters. GAO-15-515 (Washington, D.C.: July 30, 2015). Budgeting for Disasters: Approaches to Budgeting for Disasters in Selected States. GAO-15-424 (Washington, D.C.: March 26, 2015). High-Risk Series: An Update. GAO-15-290 (Washington, D.C.: February 11, 2015). Emergency Preparedness: Opportunities Exist to Strengthen Interagency Assessments and Accountability for Closing Capability Gaps. GAO-15-20 (Washington, D.C.: December 4, 2014). Fiscal Exposures: Improving Cost Recognition in the Federal Budget. GAO-14-28 (Washington, D.C.: October 29, 2013). Federal Disaster Assistance: Improved Criteria Needed to Assess a Jurisdiction’s Capability to Respond and Recover on Its Own. GAO-12-838 (Washington, D.C.: September 12, 2012). Opportunities to Reduce Potential Duplication in Government Programs, Save Tax Dollars, and Enhance Revenue. GAO-11-318SP (Washington, D.C.: March 1, 2011). 1. Review of U.S. Virgin Islands recovery planning and progress; 2. Puerto Rico disaster recovery planning and progress; 3. 2017 wildfire response and recovery; 4. Puerto Rico electricity grid recovery after the 2017 hurricane season; 5. Mass care sheltering and feeding challenges during the 2017 6. Department of Transportation highway and transit emergency relief 7. Drinking water and wastewater utility resilience; 8. Review of disaster death count information in selected states and 9. Department of Health and Human Services disaster response efforts; 10. Disaster and climate change impacts on Superfund sites; 11. FEMA Public Assistance program fraud risk management efforts; 12. Wildland fire fuel reduction efforts; 13. Preparedness challenges and lessons learned from the 2017 14. FEMA workforce management and challenges; 15. Small Business Administration response to 2017 disasters; 16. Development of the GAO disaster resilience framework; 17. FEMA Individuals and Households Program operations and 18. National Flood Insurance Program post-flood enforcement; 19. Emergency alerting capabilities and progress; 20. National Flood Insurance Program buyouts and property acquisitions; 21. Economic costs of large-scale natural disasters and impacts on 22. Community Development Block Grants – disaster recovery; and 23. Disaster Housing Assistance Program. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In September 2017, two major hurricanes—Irma and Maria—struck Puerto Rico and the USVI, causing billions of dollars in damage to infrastructure, housing, and the economy. FEMA—a component of the Department of Homeland Security—is the lead federal agency responsible for assisting Puerto Rico and the USVI to recover from these natural disasters. Among other responsibilities, FEMA is administering the Public Assistance program in partnership with the governments of Puerto Rico and the USVI, providing them grant funding for response and recovery activities, including debris removal efforts, life-saving emergency protective measures, and the repair, replacement, or restoration of public infrastructure. This statement describes (1) the status of FEMA's Public Assistance grant funding in Puerto Rico and the USVI in response to the 2017 hurricanes as of April 2019, (2) the establishment of recovery offices in Puerto Rico and the USVI, and (3) challenges in implementing the Public Assistance program and actions FEMA has taken to address them. This statement is based on GAO reports issued in February, March, and June 2019, and includes preliminary observations from ongoing GAO reviews of FEMA operations. For ongoing work, GAO analyzed program documents and data on obligations and expenditures; interviewed agency officials; and visited disaster-damaged areas in Puerto Rico and the USVI, where GAO also interviewed FEMA and local officials. GAO's prior and ongoing work found that the Federal Emergency Management Agency (FEMA) obligated about $7.4 billion in Public Assistance grant funding to Puerto Rico and the U.S. Virgin Islands (USVI) as of April 2019, in response to the 2017 hurricanes. FEMA obligated about $6.2 billion in Public Assistance grants for emergency work—debris removal activities, power restoration, and other emergency measures—and about $965 million in Public Assistance grants for permanent work—including the repair or replacement of public infrastructure such as roads, electrical utilities, and damaged buildings. Further, FEMA is continuing to work with Puerto Rico and the USVI to develop additional permanent work projects to repair damaged public infrastructure, such as schools and hospitals (see figure). In 2017, Puerto Rico established the Central Office for Recovery, Reconstruction, and Resilience and in 2019 the USVI established the Office of Disaster Recovery to coordinate and oversee federal recovery efforts. Among other things, these recovery offices are responsible for monitoring and overseeing the Public Assistance program and developing internal controls to ensure it is implemented in accordance with applicable laws, regulations, and FEMA requirements. GAO's prior and ongoing work highlighted challenges with the Public Assistance program including concerns about the clarity of FEMA's guidance, and the time and resources needed to transition to a new Public Assistance delivery model in Puerto Rico. Further, Puerto Rico and USVI officials reported difficulties understanding FEMA's implementation of new flexibilities authorized by law as well as delays in jointly developing cost estimates for long-term recovery projects such as the repair or replacement of hospitals, buildings, and other public infrastructure. FEMA has taken some actions to help address these issues, including developing additional guidance and specific training. However, it is too soon to determine the effectiveness of FEMA's actions. GAO will continue to evaluate the Public Assistance program in the USVI and Puerto Rico and plans to report its findings in late 2019 and early 2020, respectively.", "document_type": "gao"}
{"report": "At the federal level, CMS, within the Department of Health and Human Services, is responsible for overseeing the design and operation of states’ Medicaid programs, and states administer their respective Medicaid programs’ day-to-day operations. As a comprehensive health benefit program for vulnerable populations, each state Medicaid program, by law, must cover certain categories of individuals and provide a broad array of benefits. Within these requirements, however, states have significant flexibility to design and implement their programs, resulting in more than 50 distinct state-based programs. These variations in design have implications for program eligibility and services offered, as well as for how expenditures are reported and services delivered. In administering their own programs, states may provide Medicaid services under a fee-for-service delivery model or a managed care service delivery model. Under a fee-for-service model, states make payments directly to providers for services provided, and the federal government generally matches state expenditures for such services on the basis of a statutory formula. Under a managed care model, states pay MCOs a capitation payment, which is a fixed periodic payment per beneficiary enrolled in an MCO—typically, per member per month. MCOs pay health care providers for the services delivered to enrollees. In contrast, ACOs are organizations of health care providers and suppliers that come together voluntarily to provide coordinated care to patients with the goal of reducing spending while improving quality. States vary in terms of the types of managed care arrangements used, the populations enrolled, and the parts of the state covered by managed care. We previously reported that a small share of beneficiaries in each state collectively accounted for a disproportionately large share of total Medicaid expenditures. We found that in fiscal years 2009 through 2011, the most expensive 5 percent of Medicaid beneficiaries consistently accounted for almost half of the expenditures for all Medicaid beneficiaries. (See fig. 1.) Examining beneficiaries who were enrolled only in Medicaid, we also found that the most expensive 5 percent of beneficiaries were much more likely to have certain conditions—such as asthma, diabetes, and behavioral health conditions—than all other beneficiaries enrolled only in Medicaid. Examining 2009 data, we found that about 65 percent of the total expenditures for high-expenditure beneficiaries enrolled only in Medicaid were for hospital services and long-term services and supports, with the remaining 35 percent of expenditures for drugs, payments to managed care organizations and premium assistance, and non-hospital acute care. Other studies have also found similar patterns of service utilization and expenditures within the Medicaid population. For example, a January 2018 report noted that while beneficiaries who are dually eligible for Medicare and Medicaid constituted about 15 percent of Medicaid beneficiaries in 2013, they accounted for nearly one-third of Medicaid spending. A study examining data on children’s use of behavioral health services in Medicaid found that in 2005, about 10 percent of children in Medicaid received behavioral health services, but those services accounted for about 38 percent of spending on the overall Medicaid child population. Care management programs can be used as efforts to manage the cost and quality of health care services delivered to high-expenditure Medicaid populations, with the aim of improving outcomes and achieving cost savings. Generally, care management programs seek to assist consumers manage physical and mental health conditions more effectively, for example, by assessing patient needs and coordinating care across different providers. The general goal of care management is to achieve an optimal level of wellness and improve coordination of care while providing cost effective, non-duplicative services. Specific definitions for care management and other related terms such as care coordination, case management, and disease management vary. For the purpose of this report, we use care management to refer to these activities unless otherwise specified. Officials from most state agencies, MCOs, and the ACO said they used risk scores to identify or predict high-expenditure beneficiaries. Officials from four of the seven selected states, four MCOs, and the ACO said they used software or hired vendors who computed beneficiaries’ risk scores based on Medicaid service utilization data. Washington state officials said that in addition to Medicaid service utilization data, they used utilization data from Medicare Parts A, B, and D to compute risk scores for their dual-eligible population. Officials also discussed using the risk scores they computed in different ways. For example, Washington officials said they considered beneficiaries with a risk score of 1.5 or greater to be high expenditure, and they used that risk score as one of the eligibility criteria that must be met to receive certain care management services. In contrast, officials from an MCO in Nevada said they considered risk scores alongside other contextual information, such as the recent diagnosis of a chronic condition, to predict whether the beneficiary would likely generate high expenditures in the future and should be assigned care management services. Officials from three states, an MCO in South Carolina, and the ACO we interviewed said their software or vendors identified or predicted high-expenditure beneficiaries by using the risk scores they computed to stratify beneficiaries into risk tiers, such as low, medium, and high risk. Officials from South Carolina’s state Medicaid agency and two MCOs from Pennsylvania and Washington said they identified high-expenditure beneficiaries by examining service utilization data to identify statistical outliers or trends. Officials from the two MCOs said they looked for statistical outliers for various types of service utilization, such as emergency department visits, inpatient stays, and pharmacy use. Officials from South Carolina said they built internal software tools to help them easily examine service utilization for various subsets of beneficiaries and services. These officials said they looked for beneficiaries whose utilization appeared to be significantly higher or lower compared with other beneficiaries with similar characteristics, such as among children with Type 1 diabetes or among children in foster care. The officials also said that after they identified those outliers, they examined the reasons for those beneficiaries’ utilization patterns to better understand why those beneficiaries were outliers and to take corrective action if appropriate. The officials explained that they did not simply focus on a discrete list of beneficiaries with the highest overall expenditures, because many of those beneficiaries have medical needs that are inherently expensive and cannot be meaningfully improved through intervention. Officials from three of the seven state Medicaid agencies and four MCOs said they identified high-expenditure beneficiaries based on diagnoses or other group categorization. Officials commonly said they used chronic conditions, such as end-stage renal disease, the human immunodeficiency virus or acquired immune deficiency syndrome, chronic obstructive pulmonary disease, diabetes, or Hepatitis C. Pennsylvania officials said their list was developed based on clinical experience. Officials from South Carolina said their list of diagnoses was based on a review of conditions associated with high expenditures. Officials from two state Medicaid agencies—Indiana and Nevada—and all five MCOs said they identified high-expenditure beneficiaries as beneficiaries who exceed certain service utilization or claims expenditure thresholds. Indiana officials said they used service utilization thresholds, such as visiting the emergency room six or more times in the past 6 months. Nevada officials said one of their programs identified high- expenditure beneficiaries as those whose treatment costs exceeded $100,000 over a 12-month period. Officials from the five MCOs offered varying thresholds, such as claims exceeding $100,000 over a 6-month period; claims exceeding $40,000 during a state fiscal year; or stays in a neonatal intensive care unit exceeding 15 days. Officials from two state Medicaid agencies—Nevada and Pennsylvania— four MCOs, and the ACO said they relied on clinical judgment to decide whether a beneficiary was likely to be high expenditure. Officials from one MCO in Washington said the MCO conducted health assessments of new members to obtain a baseline understanding of their clinical states, which were then used to stratify beneficiaries and identify appropriate staff to address their needs. Similarly, officials from Pennsylvania and three MCOs said clinical reviews of beneficiaries’ needs or histories were triggered by providers, caregivers, or self-referrals for care management or other services. Officials from the ACO said that while risk scores made initial predictions about beneficiaries’ risk for generating high expenditures, those predictions could be overridden by clinical judgment. Officials from all seven selected states, all five MCOs, and the ACO we interviewed said they used care management to manage the costs and quality of care for high-expenditure Medicaid beneficiaries. In addition, some states used other strategies, such as strategies involving coverage policies, payment incentives, and restrictions on the number of providers certain beneficiaries could use. Across states that evaluated these efforts to manage costs and quality of care, results were mixed. Officials from all of the seven state Medicaid agencies we interviewed reported that they provided care management for high-expenditure beneficiaries in their fee-for-service delivery systems, for example, by assessing patient needs and coordinating care across providers, in an attempt to manage costs and ensure quality care. Further, the six selected states with MCOs or ACOs required these organizations to provide care management to high-expenditure beneficiaries enrolled in managed care. Officials also reported barriers to their efforts to provide care management. Officials from all of the seven state Medicaid agencies we interviewed reported that they provided care management for high-expenditure beneficiaries in their fee-for-service delivery system, to manage the cost and quality of their care. The organization and scope of the care management programs they described vary in some cases. For example: Pennsylvania provided care management for beneficiaries in fee-for- service through the state’s “intensive case management” unit, a unit of providers that contact beneficiaries by phone to ensure that they get the care they need. Care management is provided to newly enrolled Medicaid beneficiaries who are identified as high-expenditure until the beneficiary selects a managed care plan, typically within 30 days, and to certain other beneficiaries. State officials said that of the approximately 150,000 beneficiaries in fee-for-service, they provide care management to about 1,000 each month. Nevada implemented mandatory care management services for high- expenditure fee-for-service beneficiaries in rural areas of the state through a contract with a care management organization, which was paid to reach out to high-expenditure beneficiaries, assess their needs, and connect them with their medical providers. The organization delivered care management through regional care teams geographically located in beneficiaries’ communities, which coordinated with the beneficiaries’ providers to implement personalized care plans and manage follow-up appointments and services. High-expenditure beneficiaries were assigned to one of eight care management programs based on the beneficiary’s qualifying condition, such as whether they had cancer, chronic kidney disease, or a mental health diagnosis. South Dakota implemented a health home program in 2013, which paid local primary care clinics, community mental health centers, and Indian Health Service facilities to provide care management to high- expenditure Medicaid beneficiaries. Each clinic or center had a care coordinator who reached out to high-expenditure beneficiaries to initiate care management and connect them with their primary care providers. These beneficiaries were placed in one of four categories indicating the level of care coordination they needed based on the severity of their illness and risk of future costs. The program helped beneficiaries create a care plan, set goals to address their particular care needs, and manage their conditions. In state fiscal year 2018, around 5,800 recipients received services through more than 100 health home clinics in South Dakota. Washington State also implemented a health home program in 2013 in which care management activities were coordinated through “lead” entities, such as Area Agencies on Aging and other community-based organizations. These entities established networks of care coordination organizations representing primary care, mental health, long term care, chemical dependency providers, and specialty providers. The lead entities conducted outreach to high-expenditure beneficiaries to connect them with a care manager, who might be a nurse, physician assistant, social worker, behavioral health professional, or chemical dependency professional. State Medicaid officials who have MCOs and ACOs within their states said that they required these organizations to provide care management to high-expenditure beneficiaries to manage the cost and quality of their care. Examples of states’ care management requirements included steps such as beneficiary and provider outreach, conducting screenings or health assessments, and developing care plans (see sidebar). Some requirements specified the minimum frequency for conducting outreach and what information and data must be reported to the state regarding care management activities (see sidebar). Beneficiaries with excessive utilization or under-utilization for conditions other than those specified diseases in the contract must also be eligible for disease management services. beneficiaries are categorized for different levels of care coordination. (Indiana Medicaid) standard model of care management for high-risk beneficiaries, but each clinical department in the MCO—for example, Obstetrics or Cardiology—established specific plans for care management within their area of care. Care managers in these departments—nurses or social workers—were responsible for coordinating with a beneficiary’s primary care provider to ensure that the beneficiary is appropriately referred to specialists. Care managers can contact beneficiaries by phone, but they are also based in the community, such as at hospitals and state mental health clinics. Officials from the ACO in Vermont said that the ACO paid providers that were part of their network—such as primary care offices, home health agencies, and mental health agencies—to serve as beneficiaries’ care managers. Beneficiaries select one provider to be their “lead care coordinator” based on who they have the strongest relationship and trust with, and this provider receives enhanced payments from the ACO to support coordination with other providers in the beneficiary’s care team. Care team members communicate with each other through a software tool provided by the ACO, which maintains updated information on beneficiaries’ conditions and the care received. Officials we spoke to from the selected states, MCOs, and the ACO identified barriers to implementing care management for some high- expenditure Medicaid beneficiaries, including the inability to contact beneficiaries, the lack of social supports—that are part of what is referred to as “social determinants of health”—and shortages of providers or care management staff in rural areas. Difficulties contacting beneficiaries. The lack of valid contact information can result from missing or outdated information, transiency and homelessness, and beneficiary reliance on cell phones with limited minutes. Officials described efforts they had taken to address this barrier, including asking pharmacies to confirm and get updated information when beneficiaries pick up prescriptions; using e- mail, which officials stated is more consistent than physical addresses; and conducting direct outreach in emergency rooms. Addressing Social Determinants of Health Officials at most of the selected states, managed care organizations (MCO), and the accountable care organization said they took steps to help beneficiaries address social determinants of health, for example, by gathering data to identify which beneficiaries needed help with social supports, helping beneficiaries obtain transportation to medical appointments, assisting beneficiaries in accessing social services, providing short- term housing, and meeting other needs. For example, officials from one MCO described a beneficiary with diabetes, who, despite consistently filling his prescription and adhering to his care plan, regularly visited the emergency department in insulin shock. Through outreach they discovered that the beneficiary could not appropriately store his prescribed insulin, which needed to be refrigerated, because his home did not have running electricity or a refrigerator. The MCO identified resources in the community to provide a refrigerator and restore electricity. Social determinants of health. The effectiveness of care management in addressing the health needs of high-expenditure beneficiaries can be hindered by the lack of social supports. Officials said that in order to help beneficiaries manage their medical needs, care managers sometimes needed to address these social determinants of health, such as lack of transportation to medical appointments, lack of stable housing, and inconsistent access to food and other basic resources (see sidebar). At the same time, states and MCOs can face challenges to addressing social determinants of health, such as lack of data on social determinants of health and a lack of understanding about the effect of social determinants of health on health care utilization, which if available could help bolster program investments in those areas. Staff shortages in rural areas. Efforts to provide care management and medical services can be hindered by staff shortages in rural areas. Officials with one state Medicaid agency’s health home program said there was a shortage of individuals in rural areas willing to provide care management to high-expenditure beneficiaries. MCO officials in another state said their ability to care for beneficiaries in rural areas was also affected by a shortage of care managers. Other strategies, in addition to care management, reported by selected states—South Carolina, Nevada, Pennsylvania, and Indiana—to manage the cost and care for high-expenditure Medicaid beneficiaries included coverage policy changes, payment incentives, and restrictions on the use of providers. Coverage policy changes. South Carolina Medicaid officials said that in certain cases they reviewed their coverage policy to see if changes could reduce costs and improve health outcomes for high-expenditure beneficiaries. For example, according to officials, the state had a small number of high-expenditure beneficiaries with Type 1 diabetes that officials thought could benefit from continuous glucose monitoring, which was not covered by their state Medicaid program. The officials said that they wrote a proposal into their state budget and drafted state plan amendment language to address this, though they noted that the proposal had not been implemented as of January 2019. Payment incentives. Medicaid officials in Nevada and Pennsylvania described efforts to use payment incentives to manage costs for high- expenditure beneficiaries. Nevada officials told us that the state’s arrangement with its care management organization for high-expenditure beneficiaries included payment incentives related to reductions in cost, as well as performance on certain quality measures, such as immunization rates and treatments for specific conditions such as asthma, coronary artery disease, and heart failure. However, state officials said that they faced difficulties measuring these outcomes. The care management organization did not receive incentive payments for the first year of operation of the program (2014-2015) and state officials said they did not have results on incentive payments for subsequent years. Pennsylvania officials told us that in response to the high cost of drugs to treat Hepatitis C, Pennsylvania’s Medicaid agency created a risk-sharing arrangement with MCOs that had high-expenditure beneficiaries with Hepatitis C. According to state officials, the MCOs were required to submit their enrollees’ Hepatitis C test scores to show whether beneficiaries were obtaining treatment and experiencing improvement. The state then allocated additional funds to MCOs that demonstrated positive quality outcomes, thus saving the cost of re-treating beneficiaries who failed to follow through on treatment. The Pennsylvania officials also told us that the state provided payment incentives to MCOs in its Integrated Care Plan Program, in which physical health and behavioral health MCOs coordinate with each other in the care of high-expenditure beneficiaries with persistent serious mental illness, such as schizophrenia, depression, or psychosis. To quality for incentive payments, these MCOs had to create an integrated care plan for each beneficiary with a qualifying condition. The state’s Medicaid agency identified outcome measures that MCOs were held accountable to in calendar year 2018 related to emergency department utilization, inpatient admissions, inpatient readmissions, prescription medication adherence, and engagement in treatment for substance use disorders. As metrics improved, MCOs become eligible for incentives. According to state officials, Pennsylvania allocated $10 million for Integrated Care Plan program incentive payments for calendar year 2018. Restrictions on the use of providers. Indiana Medicaid officials described their program to address over-utilization of services by certain high-expenditure beneficiaries who may be engaged in doctor or pharmacy shopping—a strategy of using multiple providers that results in over-utilization or improper utilization of prescription drugs or other services. According to the officials, if other efforts to address a beneficiary’s over-utilization fail over a 2- to 4-month period, the beneficiary may be enrolled in Indiana’s Right Choices Program. This program restricts, or “locks in,” the beneficiary to a single physician, pharmacy, and hospital. Officials said that this program has helped to ensure that the provider is aware of the beneficiary’s history and has proven effective in getting beneficiaries to change their behavior. In addition to using the program for Medicaid beneficiaries enrolled in fee- for-service, MCOs are provided with a report of their beneficiaries who have high-utilization levels so that the MCO can determine if any of these beneficiaries should be enrolled in the program. While some of the selected state Medicaid agencies reported that their efforts to manage costs and care for high-expenditure beneficiaries showed positive results, officials in other states reported mixed or inconclusive findings. Medicaid officials in four states—Pennsylvania, South Dakota, Vermont, and Washington—said their assessment of efforts to manage costs and care for high-expenditure beneficiaries showed positive results, such as cost savings or reductions in the use of expensive services. Pennsylvania Medicaid officials said that their Integrated Care Plan Program for high-expenditure beneficiaries with persistent serious mental illness resulted in improvements in utilization, including reductions in inpatient hospitalizations and readmissions. South Dakota Medicaid officials found that for 2017, health home participants cost $204 less per month than the comparison group, and experienced an 8 percent decline in emergency room visits from the prior year compared with a 10 percent increase in emergency room visits for the comparison group. The state estimated $7.7 million in costs were avoided. Vermont Medicaid officials analyzed utilization of high-expenditure beneficiaries in care management before and after they enrolled. The state reported in 2018 that the rate of inpatient visits per thousand beneficiaries decreased from 600 to 393, and the annual rate of emergency visits per thousand beneficiaries decreased from 1,536 to 1,003. An independent evaluation of a demonstration program for dually eligible beneficiaries in Washington that incorporated its Health Homes program found $107 million in Medicare cost savings over its first 42 months. As part of the state’s Financial Alignment Initiative, part of those savings went to the state Medicaid program. In contrast with the results reported by the four states, officials from Indiana and Nevada Medicaid agencies reported mixed or inconclusive findings related to the impact on cost or quality of their programs for high- expenditure Medicaid beneficiaries. Officials with Indiana’s Medicaid agency told us that an assessment of the Right Choices Program found relatively low cost savings generally, with the exception of pharmacy costs, where the program curbed excessive drug use among beneficiaries with substance use disorders and led to cost savings. Nevada Medicaid officials said that their fee-for-service care management organization appeared to achieve some cost savings, but had little effect on quality of care after the program was implemented in 2013. They also said that it was difficult to determine the true effect of the program, because the state implemented several other cost savings policies at the same time as the care management organization. Nevada let the program expire in 2018 and is researching other potential ways to manage high-expenditure beneficiaries in the state’s fee-for-service program. CMS offered optional tools, as well as technical assistance and other educational resources that state Medicaid agencies used to identify or better manage high-expenditure beneficiaries. CMS’s optional tools included the Health Home State Plan Option and the Financial Alignment Initiative, though these are not specifically designed for the purpose of identifying and managing high-expenditure beneficiaries. Medicaid officials in two selected states said that these programs improved their efforts to manage care for their high-expenditure beneficiaries. Health Home State Plan Option. The Medicaid Health Home State Plan Option, authorized under the Patient Protection and Affordable Care Act, allowed states to design health home programs to provide comprehensive care coordination for Medicaid beneficiaries with chronic conditions. CMS officials we spoke with said the states who chose the option received access to resources including planning funds and technical assistance from CMS. For example, CMS issued a brief illustrating how states could focus their health home programs on high-expenditure beneficiaries. CMS officials noted that they supported 23 states’ and the District of Columbia’s health home programs. Among the state officials we interviewed, South Dakota Medicaid officials said that when they were establishing their health home program, CMS was helpful in connecting them with other states that had created similar programs so that they could learn from other states’ experiences. South Dakota Medicaid officials stated they would like CMS to continue to bring health home program managers from several states together to discuss their successes, challenges, and innovations. Nevada Medicaid officials stated they were considering establishing a health home program. Financial Alignment Initiative. For the Financial Alignment Initiative, CMS oversaw efforts by states to implement improvements in Medicaid service delivery aimed at achieving savings for both Medicare and Medicaid, with one state we spoke with using the initiative to target high- expenditure beneficiaries. As noted earlier, Washington established its Health Homes demonstration program for dually eligible beneficiaries in association with the Financial Alignment Initiative. Washington targeted the demonstration to high-cost, high-risk Medicare-Medicaid beneficiaries based on the principle that focusing intensive care coordination on beneficiaries with the greatest need provided the greatest potential for improved health outcomes and cost savings. Washington’s Financial Alignment Initiative demonstration was approved through 2020, and Washington officials stated they are hoping to get an extension, because it has yielded cost savings for both Medicaid and Medicare. A feature of the Financial Alignment Initiative is that any cost savings achieved by the program are split between the state Medicaid program and Medicare. CMS also offered state Medicaid agencies access to several resources that, while not designed specifically to target high-expenditure beneficiaries, have been used to support states in identifying or better managing care for this population. These resources included the Medicaid Innovation Accelerator Program, the State Data Resource Center, and the Medicare-Medicaid Data Integration Initiative. Medicaid Innovation Accelerator Program. The Medicaid Innovation Accelerator Program is funded by the Center for Medicare and Medicaid Innovation and run by the Center for Medicaid and CHIP Services, both within CMS. The goals of the program were to improve care for Medicaid beneficiaries and reduce costs by supporting states in their ongoing payment and delivery system reforms through targeted technical support. The program offered participating states targeted technical support to Medicaid agencies in building their data analytic capacity as they design and implement delivery system reforms for high-expenditure beneficiaries, one of the program’s focus areas. The program worked with five states on issues such as identifying and stratifying beneficiaries with complex care needs and high costs, designing effective care management strategies, and incorporating social determinants of health into program design activities. In addition to working directly with five states, the program also offered a national webinar series under the broader topic of Medicaid Beneficiaries with Complex Care Needs and High Costs. The webinar series covered a variety of topics, including a webinar titled “Identification and Stratification of Medicaid Beneficiaries with Complex Care Needs and High Costs,” which provided information about different approaches to targeting and assessing the needs of this population. Vermont Medicaid officials we spoke with said it would be helpful to have more information about how social determinants of health impact beneficiaries’ ability to manage their own care. CMS hosted other webinars on various technical support and data analytics topics for states. Among the state Medicaid officials we interviewed, Nevada officials mentioned participating in the Innovation Accelerator Program. State Data Resource Center. State Medicaid agencies have traditionally been hampered in managing the Medicaid portion of care for dually eligible beneficiaries, because they lacked data on the Medicare services these beneficiaries receive, such as hospitalizations, physician visits, prescription drugs, and skilled nursing facility stays. To address this challenge, CMS established the State Data Resource Center to facilitate state access to and use of Medicare data on dually eligible beneficiaries. Through the program, states had access to technical advisors when working with CMS Medicare data, which have allowed states to better predict and identify high-expenditure dually eligible Medicaid beneficiaries, CMS officials told us. The officials said the State Data Resource Center provided states with learning opportunities through webinars and monthly “Medicare Data Workgroup” calls, during which states shared their data use experiences. CMS officials and CMS contractors we spoke with said 29 states have received Medicare data, including all 10 states that participated in the Financial Alignment Initiative, though not all had projects specifically linked to high- expenditure Medicaid beneficiaries. CMS officials said all states had some contact with the State Data Resource Center, whether through data inquiries or participation in webinars. Medicare-Medicaid Data Integration Initiative. The Medicare-Medicaid Coordination Office and the Center for Medicaid and CHIP Services’ Medicaid Innovation Accelerator Program, both within CMS, jointly sponsored the Medicare-Medicaid Data Integration Initiative. The initiative assisted states with integrating Medicare and Medicaid data in order to enhance care coordination and reduce costs for the dually eligible population, which may have included high-expenditure Medicaid beneficiaries. CMS officials we spoke with said the Medicare-Medicaid Data Integration Initiative had assisted 10 states—five participating in the Financial Alignment Initiative (Colorado, Minnesota, Ohio, Rhode Island, and Virginia) and five participating in the Medicaid Innovation Accelerator Program from October 2015 to March 2019 (Alabama, the District of Columbia, New Hampshire, New Jersey, and Pennsylvania). We provided a draft of this product to the Department of Health and Human Services for review. The department provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-7114 or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contact named above, Lori Achman (Assistant Director), Mary Giffin (Analyst-in-Charge), Matthew Dobratz, Drew Long, and Brandon Nakawaki made key contributions to this report. Also contributing were Julianne Flowers, Vikki Porter, Jennifer Rudisill, and Eric Wedum.", "summary": "Medicaid, a joint federal-state health care financing program, is one of the nation's largest sources of health care coverage for low-income and medically needy individuals. A 2016 report published by the National Governors Association noted that high-expenditure Medicaid beneficiaries typically have poorly managed chronic conditions and a host of unmet social needs that result in potentially preventable use of costly services, such as emergency department visits. The report also noted that identifying and better managing those beneficiaries are key to reducing costs and improving outcomes. GAO was asked to examine state and federal efforts to manage costs and improve care coordination for high-expenditure Medicaid beneficiaries. This report describes (1) approaches selected states used to identify or predict high-expenditure Medicaid beneficiaries; (2) strategies selected states used to manage beneficiaries' health care costs while ensuring quality of care; and (3) resources CMS provided to states to help them identify, predict, or better manage high-expenditure beneficiaries. GAO interviewed officials from CMS, as well as Medicaid officials from a nongeneralizable sample of seven states (Indiana, Nevada, Pennsylvania, South Carolina, South Dakota, Vermont, and Washington) and five MCOs. States were selected for variation in their total Medicaid enrollment, enrollment in Medicaid managed care, percentage of state population living in rural settings, and percentage of state population with disabilities. MCOs were selected based on state suggestions, and varied in terms of whether they operated nationally or on a state or regional basis. GAO previously reported that in fiscal years 2009 through 2011, the most expensive 5 percent of Medicaid beneficiaries accounted for nearly half of the expenditures for all beneficiaries; others have also found that a small percentage of beneficiaries account for a disproportionately large share of Medicaid program expenditures. These high-expenditure beneficiaries are an extremely diverse population with varying needs. GAO found that the seven selected states identified or predicted high-expenditure Medicaid beneficiaries using statistics and other approaches. For example, states used risk scores, which estimate an individual beneficiary's expected health care expenditures relative to the average expenditures for beneficiaries in the group. Other approaches included examining service utilization data to identify statistical outliers and using diagnoses, service utilization and claims expenditure thresholds, or clinical judgment to identify or predict high-expenditure beneficiaries. To manage costs and ensure quality of care for high-expenditure beneficiaries, the seven selected states used care management and other strategies. Care management . All the selected states provided care management—providing various types of assistance such as coordinating care across different providers to manage physical and mental health conditions more effectively—for beneficiaries in their fee-for-service delivery systems. Five of the states also contracted with managed care organizations (MCO) to deliver services for a fixed payment and required the MCOs to ensure the provision of care management services to high-expenditure beneficiaries. Other strategies . Some of the seven selected states used additional strategies to manage care for high-expenditure beneficiaries. For example, Indiana officials described a program to restrict, or “lock in,” a beneficiary who has demonstrated a pattern of high utilization to a single primary care provider, hospital, and pharmacy, if other efforts to change the beneficiary's high utilization were unsuccessful. The Centers for Medicare & Medicaid Services (CMS), which oversees the Medicaid program at the federal level, offered optional tools and other resources to support states' efforts to identify or better manage high-expenditure beneficiaries. For example, CMS officials said states received access to resources and technical assistance on establishing health home programs—which seek to better coordinate care for those with chronic conditions—including how to focus on high-expenditure beneficiaries. CMS officials noted that they supported 23 states' and the District of Columbia's health home programs. CMS also offered several resources that, while not designed specifically to target high-expenditure beneficiaries, have been used to support states in identifying or better managing their care. For example, CMS's Medicaid Innovation Accelerator Program offered targeted technical support to states' Medicaid agencies in building their data analytic capacity as they designed and implemented delivery system reforms, which could be used to identify high-expenditure beneficiaries. Officials in two selected states reported that these tools were beneficial for managing the health care costs associated with high-expenditure beneficiaries. HHS provided technical comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "VA’s mission is to serve America’s veterans and their families, and one of the ways it does so is by providing veterans with medical services. To help meet the health care needs of veterans, VHA is planning to complete approximately 70 new major medical projects between 2020 and 2024. Activation is one of the key steps that must occur before veterans can access care at these facilities. According to VA’s Activation Process Guide, activation typically involves activities such as planning for, purchasing, and installing new furniture, fixtures, and equipment (FF&E), ordering supplies, and hiring staff. For new buildings, the Guide states that activation activities begin when the building is being designed, continue through construction, and end when the facility is fully operational. The expenses associated with activation can reflect either one-time purchases or ongoing expenditures. One time purchases—called non- recurring activation expenses—involve the acquisition of assets such as furniture or equipment, or payment to a contractor for services such as equipment installation. Ongoing expenses, or expenses incurred more than once—called recurring activation expenses—are for staff salaries and consumable supplies, such as gowns and gloves. After a facility opens and begins serving patients, facilities are permitted to treat supplies and the salaries of new staff as activation costs until the site is serving enough patients to receive funding through one of VA’s regular funding processes, known as the Veterans Equitable Resource Allocation (VERA). Figure 1 provides examples of recurring and non-recurring activation expenses. The total cost of activation for major lease and major construction projects can be substantial. The median activation funding that facilities reported spending on major activations from fiscal year 2012 through 2018 was approximately $16 million. The four newest hospitals (in Denver, Las Vegas, Orlando, and New Orleans) spent a cumulative total of more than $1.9 billion for activation during this time period. The types of facilities undergoing activation can vary in size, services provided, and overall purpose within the VHA healthcare system, as shown in figure 2. For example, a community-based outpatient clinic (CBOC) is typically much smaller than a medical center but can provide primary, specialty, subspecialty, mental health, or any combination of delivery services that can be appropriately provided in an outpatient setting. Large medical centers can provide outpatient services as well as a broad range of inpatient services, including emergency services, surgery, and acute psychiatric care. Smaller facilities may refer patients to medical centers for complex treatment. National, regional, and local staffs play different roles in the activation process: National: VHA’s Activations Office—under the Office of Capital Asset Management (OCAM)—historically provided ad-hoc support to sites activating a major lease or construction project, such as providing on-site training related to the activation process and facilitating input from subject matter experts within VHA. The office also determines the base amount of activation funding that sites receive. Officials overseeing the office stated that its role is being reassessed and that the type of support it provides for activations may change in light of an internal reorganization and consideration for VA’s future growth plans. Regional: VHA’s18 regional networks, known as Veterans Integrated Service Networks (VISN), are responsible for the coordination and oversight of all administrative and clinical activities at health care facilities within their specified region. A VISN’s role in activation varies depending on the expertise available at the facility level, but VISNs can help facilities arrange contracts for services (like laundry or hazardous waste removal); review a facility’s budget submissions to VHA; and facilitate discussions with senior management or knowledge-sharing with other sites that have recently completed activation. The VISNs are also responsible for distributing activation funding from VHA. Local: In addition to providing medical services, medical centers function as administrative hubs for services in the area. As a result, the medical center director is ultimately responsible for activating facilities within the center’s administrative boundary. The medical centers can appoint staff to manage the activities required for activation. These staff can include the activations project manager, financial officers, and subject matter experts like interior designers. As a team, the staff are responsible for developing technical requirements, creating risk mitigation strategies, and deciding key acquisition dates, among other tasks. While VHA has not identified standard milestones for activation, based upon our review of VHA documents and interviews with local and regional VHA officials, we found that two events are especially relevant to the planning and execution of activation activities: (1) building acceptance (when VHA formally takes possession of and occupies a building) and (2) providing medical services to the first patient. Figure 3 describes examples of activation activities in relation to these events, although the actual timing of tasks will vary depending on the needs of individual facilities. Officials from selected facilities said that prior to building acceptance, their activation activities typically focus on determining furniture and equipment needs, placing orders, anticipating staffing needs, and hiring new staff. Determining furniture and equipment needs is intertwined with the building design process, according to officials from three VHA facilities, because the design of the physical space can dictate what equipment is purchased. For example, a VHA official from one health-care center said that the activations team showed the medical care providers a mock-up of a treatment room and created cardboard models of furniture to help them select items. The official told us that getting the medical care team’s input early in the planning process can avoid the need to make costly changes in order to make the physical space fit the equipment or furniture requested by the medical care providers. Conversely, the building may be designed to accommodate specific equipment. For example: Officials from one facility shared the specifications of the radiology equipment with the team designing the building in order to leave a proper amount of space for the equipment. Similarly, an annex’s activation staff worked with the resident engineer to design an enclosed area separate from their main building for a mobile MRI machine. This design ensured a new MRI machine could be swapped out in the event of a breakdown without causing a disruption to the facility’s operations. Officials said that they also begin the purchasing process for equipment and furniture prior to building acceptance. VHA officials stated they work backwards from the construction endpoint to determine when to order items. VHA officials told us they need to place orders for certain items— such as high-tech equipment or made-to-order furniture—well in advance of the facility’s opening because the items are known to have long delivery times. For example: Officials from one clinic reported they ordered their facility’s imaging equipment 22 months before they needed it. Similarly, an official from a different clinic said that furniture is often not manufactured until it is ordered, so it can take several months to arrive. In contrast, the official said items like a staff refrigerator could be picked up at a local store within days and do not require substantial advance planning. Facilities also begin planning for their workforce needs prior to building acceptance. For example: An official from one clinic stated that facilities typically identify their staffing needs during this time period by position, title, and pay. Officials from an annex said that before their facility’s construction groundbreaking, they discussed how many staff would move from the old facility to the new facility, and how many new staff they expected to hire. After activation teams determine their staffing needs, facilities hire and begin training new staff. For example: An official from one clinic said that new staff needed to be trained prior to opening day, so it is not uncommon for staff to be hired and brought on-board before the facility begins providing clinical services. In the case of a very large facility, such as a medical center, hiring the required staff can require an extensive search that must commence before the building is finished. An official from a medical center said that a shortage of skilled medical workers required a nationwide search for suitable candidates. Officials said that after a building is accepted as complete, activation typically focuses on tasks associated with moving into the space, such as equipment installation and training staff. For example: One clinic’s project calendar showed in the weeks leading up to opening day that the activations staff planned to install office furniture such as desks and filing cabinets, as well as to perform checks on biomedical equipment to ensure proper functioning. Officials from another clinic coordinated equipment and furniture deliveries between the warehouse (where items were being stored) and the new facility. The extent of staff training after building acceptance depends on the need to familiarize staff with the new facility, and the complexity of services offered. Activation staff might choose to have medical staff become familiar with the new facility by working at the facility prior to new operations. For example: One clinic’s staff started working in the building before their first patient was seen in order to become familiar with the new space. An official from a medical center said that facility staff adjusted to operating newer infrastructure, such as learning to operate a modern computerized boiler system. That official also stated that the medical center might need to conduct extensive training exercises to simulate 24/7 inpatient care. In contrast, outpatient facilities that do not operate around the clock may not have these same training needs. Once a facility begins providing medical care, officials said that activation tasks are typically related to facility operations. These tasks can include on-the-job training in the new space and making necessary adjustments to the facility to ensure it runs properly while concurrently serving new patients. For example: An official at one clinic said that beginning patient care with a decreased workload, known as a “soft opening,” can help facilitate on- the-job training. The same official explained that this approach allows staff to become accustomed to their new facility’s operations and address any issues that may emerge without the demands of operating at full capacity. VHA officials from a health care center said that space adjustments included repositioning exam beds and ordering ergonomic chairs. Officials at several sites stated that they used SharePoint, an internal communication tool, to keep track of needed adjustments. This approach enables staff to monitor ongoing issues during the beginning of new operations, resolve unexpected problems, and track issues as they occur. Several VHA officials also said that some activation tasks —such as hiring staff—may occur after a facility begins serving patients. If a facility plans on a phased opening, in which some services will not be available on the first day, processes that would typically be completed earlier may take place during this time frame instead. For example, a medical center in our review utilized a phased-opening approach, as it expanded its capabilities with new medical services after opening. The facilities included in our review provided most medical services within planned time frames; however, nearly one-third of services were delayed for various reasons. Overall, 59 of the 87 services were offered within planned time frames (69 percent). Of the 28 services that were not provided on time, staffing, equipment size, “commissioning”, and procurement issues contributed to the delays, according to officials. Staffing issues delayed a total of 14 services in two of the seven facilities reviewed. One facility had 13 services with delays that ranged from 4 to 6.5 months. Officials said the delays were due to difficulties recruiting the staff necessary for those services, which included various types of surgery, radiology, and mental health, among others. Similarly, difficulties recruiting a dentist at a second facility delayed dental service 4 months beyond the expected delivery time frame. Equipment at one facility did not fit into some of the rooms and the space needed to be altered in order to accommodate it. Officials said that all 12 services were delayed by approximately 1 month so that the facility could open with all services available, though officials noted that the full extent to which the equipment issues contributed to these delays was unknown (i.e., there could have been other causes that they could not recall.) Commissioning issues delayed women’s healthcare services at one annex by approximately 1 month. Officials said that the air circulation rate—which needed to be higher in rooms where certain procedures are performed—was inadequate. As a result, the air exchange had to be improved before the facility could begin performing the planned clinical procedures. Procurement issues led to delays in providing radiology services at one facility. Officials told us that x-ray services were delayed by 3 months because the equipment was ordered through the centralized purchasing process, which took longer than local officials had anticipated. These delays primarily affected services that were originally planned to be offered within 2 months of building acceptance. While selected facilities planned to offer approximately 92 percent of services within 2 months of building acceptance, as shown in figure 4, 61 percent were actually offered within that time frame. VHA does not provide a guideline for how much time facilities should need after building acceptance to provide clinical services. Officials explained that the appropriate amount of time will vary based upon the scope of the project, including factors such as the number and kinds of services offered and the level of effort associated with installing the equipment (e.g., a replacement hospital will require more effort than a small outpatient clinic). Thus, we did not determine if facilities were allotting appropriate amounts of time to complete activation activities and serve patients. However, VA’s Activation Process Guide provides some information regarding when full services should be available. The Guide states that clinical services can be added for up to 6 months after opening day (i.e., the first day that patients receive any services at the facility). The Guide further states that facilities may expect to offer services gradually—versus all on opening day—when services are new to an area. Of the 87 services offered by the facilities in our review, 86 were offered within 6 months of opening day. The remaining service—a clinic that provides colonoscopy and other related procedures at one facility— opened on schedule approximately 11 months after opening day. This facility was replacing another facility that had not previously offered this service. Officials explained that because the service was new, they needed more time to develop and equip the space as well as hire staff, so they planned on offering this service later than services that were being transferred from the previous facility. VHA lacks processes to develop total cost estimates for major activations. Without total cost estimates, VHA is unable to determine whether actual activation expenses are higher or lower than planned. Furthermore, VHA does not have documentation that defines allowable activation costs, including what facilities can purchase with activation funding and when facilities should cease spending activation funds. As a result, VHA officials lack critical information to support decision-making about resource allocation, and are not well positioned to effectively identify and investigate deviations from planned spending. VHA lacks processes to develop reliable total activation cost estimates for major activation projects and to compare actual costs against these estimates. According to our assessment of information from VHA, the current cost estimation process does not cover the full duration of activation and does not reflect best practices for developing reliable cost estimates. In addition, VHA officials said that until recently, the agency lacked the accounting mechanisms necessary to facilitate comparisons of a project’s total activation costs against estimated costs; however, while VHA now possesses these mechanisms, it has not documented the process for how the new information should be used. The Activations Office and facility activation staff annually develop cost estimates for the upcoming 3 fiscal years using (1) an activation cost model (the model) and (2) a cost template (the template). According to Activations Office officials, the model is managed by the Activations Office and uses inputs such as a facility’s square footage and project schedule. Activations Office officials also said that the template is typically completed by facility activation staff and includes inputs such as planned clinical services as well as estimated staffing, equipment, and supply costs. While the cost estimate is driven primarily by the model, information in the template is also considered before annual activation funds are distributed, according to Activations Office officials. Figure 5 shows the steps for determining and distributing annual activation funds. We determined that the model and template do not estimate costs for the entire duration of a facility’s activation. According to our review of facilities’ spending data, activation spending for a given facility can occur over more than 3 fiscal years. All eight of the facilities in our review, for example, spent activation funds over 4 or 5 fiscal years. Thus, the estimate the Activations Office would have developed at the beginning of these projects would not have reflected total activation costs. Moreover, we did not see evidence that VHA medical facilities independently develop total activation cost estimates that are appropriate to compare against total actual costs. None of the eight selected facilities we reviewed could provide total activation cost estimates appropriate for this use, according to officials at each facility. Officials from five facilities stated that they had not developed such estimates, an official from one facility said that an estimate could not be located and probably had never been done, and officials from two facilities said that such documentation could not be located. VHA officials said that the existing cost estimation tools reflected the budgeting process (i.e., the current fiscal year and two future years) and that they had not previously been required to develop a cost estimate for the entirety of activation. Officials noted that as the Activations Office’s role shifts to include more oversight, it will be important for the Office to have total cost estimates for activation; however, as of September 2019, VHA did not have any specific plans for how to collect estimates for a project’s entire activation cost. We also found that VHA’s current process for developing activation cost estimates does not fully align with best practices for developing cost estimates as established in the GAO Cost Guide (see table 1 below). VHA’s process minimally met 10 and did not meet 2 of the steps—each of which reflects multiple best practices—required to develop reliable cost estimates. A reliable cost estimate is critical to the success of any program, providing the basis for informed decision-making, realistic budget formulation and program resourcing, and accountability for results. VHA officials acknowledged that following these practices would be valuable for the activations process, and explained that the agency did not previously incorporate these practices because they had not assessed the strength of their activation cost estimation process in this manner. Lastly, the Activations Office does not compare existing estimates and actual activation costs. While the Activations Office develops activation cost estimates for the upcoming 3 fiscal years and has some capabilities to track activation costs, to date it has not compared the planned costs to actual expenses. According to Activations Office officials, they have historically been unable to track how activation funding was spent at the facility level, which impeded such comparisons. Starting in fiscal year 2020, officials from the Activations Office plan to use accounting codes associated with each activation project, which will allow them to track expenses at the facility level. An internal review conducted in mid-2019 by the department overseeing the Activations Office concluded that the agency needed to regularly assess the extent to which activations spent funds as planned. As of October 2019, however, officials said the office has not documented the process for how they will deploy their new accounting oversight capabilities, including which personnel would be responsible for conducting such comparisons, the frequency of comparisons, and any follow-up steps that would be considered in the event of significant differences. Without processes for estimating total costs and comparing them against actual expenses, the Activations Office is limited in its ability to improve resource planning, budgeting, and allocation—critical elements that support VA’s stated management priority to enhance data-driven decision-making. Further, guidance from the Office of Management and Budget states that agencies should obtain information on actual project costs and compare them against planned expenses so managers can have a clear understanding of how resources are being used and whether cost goals are being met. Documented processes for cost estimation and comparison would be particularly important in the case of large medical centers, whose activation costs are in the hundreds of millions of dollars. The Activations Office has not clearly defined what officials at local facilities can purchase with activation funding and how long activation funding should continue after opening day. Activations Office officials said that there is a general understanding that some expenses, such as medical equipment for new facilities or services, are activation expenses, and that the Activations Office intends to provide activation funding until the facility begins to receive VERA funding to cover operational expenses. However, there is no policy to inform facility activation staff of what they can purchase with activation funding and when funding will cease. In mid-2019, an internal review conducted by the department overseeing the Activations Office found that the lack of clarity regarding what could or could not be purchased should be remedied; however, as of September 2019, no specific plans have been established to define appropriate purchases. Officials we spoke with—both at the selected medical facilities and VISNs—expressed uncertainty about what expenses they could pay for using activation funding. Officials from two of eight facilities told us that there were times when they did not know if they should charge an expense to activation or another funding source, such as construction accounts. For example, officials at one facility told us that they were unsure whether construction or activation funds would pay for the special window blinds needed for the intensive care units. Officials at four of the VISNs also said that when contacted by medical facility officials for guidance on allowable expenses, there were times when they did not know if facilities should charge an expense to activation or another funding code. In addition, officials from the selected sites held differing views on how long they were eligible to receive activation funding from the Activations Office. Finance officials for one of the selected facilities said that activation funding is provided for up to 5 years, while officials from several other facilities said that activation funding is available until operational expenses are covered by VERA. Activations Office officials said that the latter interpretation is accurate and that this transition to ongoing VERA support should take place within approximately 2 years after opening day. However, an official from the Activations Office said that a few facilities have received funding from the Activations Office for more than 2 years after opening because there was no clear definition for when activation funding should cease. The lack of clear definitions regarding what constitutes allowable activation expenses and when activation funding should end limits VHA’s ability to consistently and accurately estimate and track activation costs. For example, similar facilities could develop varying total cost estimates due to different understandings of what expenses are allowable. VA management priorities include making data-driven decisions to improve resource planning, budgeting, and allocation. In addition, Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. Clear definitions on what expenses facilities should charge to activation accounts, and for how long, would improve the Activations Office’s ability to monitor activation costs and improve resource stewardship. As VHA undertakes the process of replacing facilities to better reflect its focus on outpatient and specialized care, it is poised to spend hundreds of millions of dollars per year to equip and staff these new sites. However, VHA does not have a clear understanding of total costs and whether individual activation projects are spending funds effectively. Because VHA does not have a process for developing an estimate for the entire activation cost of a project, the agency lacks a critical baseline that can inform future spending decisions. In addition, because VHA lacks a process that describes how officials should compare actual expenses to that estimate, the agency has no mechanism to regularly identify and respond to unplanned differences in activation costs. Furthermore, defining allowable activation expenses would better position VHA to ensure total cost estimates are consistent from facility to facility. Lastly, additional clarification on how to estimate activation costs and compare them against actual expenses would help VHA to more effectively manage the activations process. Without processes and clear definitions associated with activation cost measurement, VHA does not have reasonable assurance that it will be able to effectively manage the resources associated with activation. We are making the following four recommendations to VA: The Assistant Deputy Under Secretary for Health for Administrative Operations should develop and document a process for estimating total activation costs for major medical facility projects. This process should reflect the 12 steps for developing a reliable cost estimate outlined in the GAO Cost Guide. (Recommendation 1) The Assistant Deputy Under Secretary for Health for Administrative Operations should develop and document a process for comparing actual activation costs for major medical facility projects to estimates. This process should identify the personnel responsible for comparing the estimated costs to the actual expenses and document their responsibilities. (Recommendation 2) The Assistant Deputy Under Secretary for Health for Administrative Operations should define and document what items and services officials can purchase with activation funds. (Recommendation 3) The Assistant Deputy Under Secretary for Health for Administrative Operations should define and document when facilities should cease to spend activation funds. (Recommendation 4) We provided a draft of our report to VA for review and comment. VA provided written comments, which are reprinted in appendix II. VA concurred with all of our recommendations. VA further provided information on how it intends to address our recommendations, with target dates for completion in December 2020. We are sending this report to the appropriate congressional committees and to the Secretary of the Department of Veterans Affairs. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other key contributors to this report are listed in appendix III. To understand the costs of the activations of the eight selected facilities, we asked activation officials at each facility to provide a breakdown of the activation costs by the following categories: (1) Furniture, Fixtures, and Equipment; (2) Staffing; (3) Supplies; (4) Other; and (5) Total Cost. We used these cost categories because these are the categories in the template that facilities complete to estimate activation costs. In addition to the contact above, Heather Halliwell (Assistant Director); Alison Snyder (Analyst-in-Charge); Rose Almoguera; Brian Bothwell; Geoffrey Hamilton; Jason Lee; Terence Lam; Ethan Levy; Josh Ormond; Daniel Setlow; Laurel Voloder; Mary Weiland; and Elizabeth Wood made key contributions to this report.", "summary": "VHA operates one of the nation's largest health care systems with more than 1,200 sites across the country; however, many facilities were built decades ago and do not align with the agency's current emphasis on outpatient and specialized care. Additionally, new or expanded facilities are needed to accommodate veterans returning from recent conflicts. VHA is constructing and leasing new facilities to respond to these needs. GAO was asked to review VHA's efforts to activate new major medical facilities. This report examines the extent to which VHA is able to compare the actual costs of activation against the estimated costs, among other objectives. GAO analyzed VHA's documentation on estimating activation costs. GAO also interviewed officials and analyzed cost information reported by a non-generalizable selection of eight medical facilities. The facilities had more than $1 million in annual rent or $20 million in construction costs, reported finishing activation in fiscal years 2016 and 2017, and were located in various regions. The Veterans Health Administration (VHA) under the Department of Veterans Affairs (VA) is constructing and leasing new medical facilities, such as outpatient clinics, to better serve and meet the changing needs of veterans. VHA equips and staffs these new facilities in a multi-year process called “activation.” From fiscal year 2012 through 2018, VHA channeled more than $4 billion to major medical facilities undergoing activation, which these facilities could use toward furniture, equipment, and new staffing costs, among other start-up expenses. VHA lacks processes and clear definitions for estimating total activation costs and for comparing actual expenses against these estimates. Specifically, VHA's current cost estimation process does not cover the full duration of activation. Headquarters officials have never compared activation costs against estimated costs because until recently, officials said, VHA lacked the accounting mechanisms to facilitate such comparisons; however, while VHA now possesses these mechanisms, it has not documented the process for how the new information should be used. VHA documentation does not clearly define allowable activation expenses or the appropriate spending timeframes. Local and regional officials expressed confusion over what items could be purchased with activation funds. In addition, local officials held inconsistent beliefs regarding how long expenses could qualify as activation-related. VHA management's priorities include data-driven decision-making. Further, the Office of Management and Budget's guidance states that agencies should compare actual project costs against planned expenses so managers can determine if cost goals are being met. Without processes and clear definitions associated with measuring activation costs, VHA does not have reasonable assurance that it will be able to effectively manage the resources associated with activation. GAO recommends that VA (1) develop and document a process for estimating total activation costs, (2) develop and document a process for comparing actual activation costs to the estimates, (3) define allowable activation expenses, and (4) clarify when facilities should cease to classify expenses as activation-related. VA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "In 2017, transit agencies provided over 10 billion rides to people traveling to and from businesses, homes, and other locations throughout the United States, according to FTA. Transit infrastructure for those rides includes railways, roads, bridges, tunnels, and stations. According to the 2017 American Public Transportation Association’s (APTA) Fact Book, more than 6,700 organizations provided public transportation in a variety of modes in 2015. Transit modes include: fixed-route bus services—the most prevalent transit mode in the country—vehicles operate according to regular schedules along prescribed routes with designated stops; rail services—vehicles operating along railways; ferryboat services—vessels carrying passengers and/or vehicles over a body of water; paratransit services—generally, accessible, origin-to-destination transportation services that operate in response to calls or requests from riders; and other demand-response services—sometimes called “dial-a-ride.” Public transportation, or transit, is statutorily defined as regular, continuing shared-ride surface transportation services that are open to the general public or open to a segment of the general public defined by age, disability, or low income. This definition has multiple statutory exclusions including intercity bus service, school bus service, and charter bus service. The transit infrastructure requires appropriately trained personnel to operate, maintain, and oversee services and assets (e.g., vehicles). APTA estimated that, in 2015, U.S. public transit agencies employed more than 430,000 fulltime and part-time personnel, including contractors. The transit workforce consists of a variety of occupations, such as bus operators, train conductors, dispatchers, mechanics, supervisors, and other occupations (see fig. 1 for examples.) FTA supports transit agencies’ workforce development by providing financial and technical assistance, among other things. FTA’s financial assistance efforts include implementing the Innovative Public Transportation Frontline Workforce Development Program, which provides competitive grants to transit agencies (transit workforce grants) to assist with the development of innovative human resources activities. FTA awarded transit workforce grants in fiscal years 2011, 2012, and 2015. Grant-eligible projects included employment training, outreach to increase minority and female employment in transit, research on transit personnel and training needs, and training and assistance for minority business opportunities. Grant recipients included transit agencies, non- profit community groups, schools, and others. Additionally, recipients can use up to one-half of one percent of certain grant funds, such as Urbanized Area Formula Grants, for eligible human resources and training activities with the approval of DOT. FTA also administers the National Transit Database (NTD), which is intended to provide information to assist in transit planning efforts. All recipients and direct beneficiaries of grants from the Urbanized Area Formula Program and Rural Area Formula Program, such as local transit agencies, are required to report certain data to the NTD. FTA also encourages agencies not receiving grants from these programs to report voluntarily so the NTD can be more complete. In 2016, over 2000 transit agencies submitted full or partial reports to the NTD. The NTD stores information from local transit agencies, such as financial and operating data, to inform transit service planning for government agencies and other organizations. Some workforce data, such as the number of full-time and part-time transit agency employees, is reported to the NTD. NTD data provide information on the transit workforce at the time the data are reported, but are not used to project future transit workforce needs. FTA partners with the National Transit Institute (NTI), hosted and staffed by Rutgers University, to provide workforce development educational resources and training. NTI delivers over 300 courses per year nationwide to public transit employees and government transportation agency employees at all levels. These courses focus on compliance with federal regulations and developing skills to operate a transit agency. At the department level, in August 2015, DOT, DOL, and the Department of Education worked with industry stakeholders to project the employment and skill needs of the transportation industry from 2012 to 2022. Primary sources for the report included the DOL’s Bureau of Labor Statistics (BLS) employment projections, current population survey (demographics), and analysis from Economic Modeling Specialists International. The effort developed a variety of transportation workforce statistics and resulted in the Strengthening Skills Training and Career Pathways Across the Transportation Industry: Data Report on Future Transportation Workforce Needs (Transportation Industry Report). Among other things, the report: projected that an additional 4.6 million transportation workers will need to be hired to fill vacancies created by separations (occupational transfers, retirement, and other exits from the workplace), and net job growth from 2012 to 2022; provided data on current worker distribution (at that time) by age and sex for six transportation sectors and by race and ethnicity for selected transportation occupations; and included top job occupations by sector and projected industry and occupational job openings based on separations and job growth. The extent of future transit workforce needs is unclear due to the absence of transit-specific workforce projections, unclear communication on the data that are available, and because the data that are available do not extend past 2022. The best information available on future transportation workforce needs, according to FTA officials is the August 2015 Transportation Industry Report. The Transportation Industry Report does have projections on transportation workforce needs, but the transit industry data are combined with other ground passenger transportation industries such as intercity buses, charter buses, taxis, school buses, and limousines. Thus, the report does not exclusively reflect the transit workforce. According to researchers who wrote the report, the transit and ground passenger transportation data were reported as one industrial sector because it would be a significant undertaking to focus solely on transit workforce data without funding a study for this specific area. The Transportation Industry Report was developed with data, in part, from BLS, which does not exclusively report on occupational projections for public transportation. BLS develops workforce projections of the U.S. labor market by industry, subsector, and occupational codes, including the number of employees and types of employers. BLS officials we interviewed said that industry and occupational data sets do not allow the level of specificity that would be needed to identify only transit agencies. The Transportation Industry Report predicted 1 million job openings in the transit and ground passenger transportation sector from 2012 to 2022 and listed the top 10 projected job openings. However, these projected job openings include a number of occupations within services that are statutorily excluded from the definition of transit. For example, the three largest categories of job openings—comprising about 72 percent of the projected openings—have the following key transit exclusions: School bus and special client bus drivers made up approximately 33 percent of the projected openings (330,699 job openings). However, school bus services are specifically excluded from the statutory definition of transit, as are sightseeing services, charter bus services, courtesy shuttle services for patrons of one or more specific establishments, and intra-terminal or intra-facility shuttle services. Transit and intercity bus drivers made up almost 20 percent of the projected openings (199,727 job openings). However, intercity bus service (for example, Greyhound bus service) is specifically excluded from the statutory definition of transit. Taxi drivers and chauffeurs made up almost 19 percent of the projected openings (188,895 job openings). However, these services may not meet the statutory definition of transit. However, when communicating about the report, FTA has not always made clear that the data in the Transportation Industry Report combine both transit and ground passenger transportation workforce projections, though this was not intentional, according to FTA officials. FTA has presented the combined data as representing the “transit” or “public transit” workforce in recent annual reports to Congress and a few public presentations. For example, one of the findings in the Transportation Industry Report is that the combined sector of transit and ground passenger transportation has the highest percentage of older workers who are at or nearing retirement age. However, in recent reports to Congress, FTA states that, public transit has the highest percentage of older workers at or nearing retirement age. However, this statement did not reflect that the percentages included transit and ground passenger transportation data. We also found similar information involving retirement percentages and job openings in a number of FTA presentations that are available to the public online. In addition, we found two examples of incorrect numbers in recent reports to Congress that FTA officials said were “typos” that have now been corrected in the most recent fiscal year 2017 report. FTA’s characterization of this data could confuse transit stakeholders, including Congress, on needs, retirements, and growth in the transit industry. When FTA identifies combined information as “transit” projections, the audience may not understand the extent to which the data reflect services that do not meet the statutory definition of transit. We found evidence that this may have already occurred to some extent. During our review, we found examples of stakeholders in the industry repeating the same statistics that FTA has presented as “transit” in publications and in our interviews with them, raising questions about whether the industry may have misconceptions about the future transit workforce. FTA officials told us that the combination of transit and ground passenger transportation is appropriate because of similarities in the industries and the common practice of transit agencies hiring contractors from ground passenger transportation to supplement workforce personnel. However, the context of this information has not always been clear in reports to external parties. Further, the Transportation Industry Report’s projections on the future transportation workforce are only estimated through 2022. DOT officials said that they do not have plans to update the report beyond 2022 or to develop a report that focuses solely on transit workforce projections. FTA officials told us that they plan to hire a data scientist to assist them with transit workforce issues. FTA officials also told us in November 2018, that the report was intended to provide trend information and that they do not plan to use the transit numbers from the Transportation Industry Report in future reports and presentations, and considering that the report will soon reach the end of its projections in 2022, we are not making a recommendation about how to communicate the context of the information in the Transportation Industry Report. Opinions on the need for additional transit workforce data and projections varied among transit stakeholders we interviewed. Several stakeholders cited the difficulties of collecting transit-specific projections or other types of data, while others pointed to the need for more data such as data identifying shortages in specific occupations and retirement age of transit employees. However, officials from the Community Transportation Association of America, which represents small and rural transit agencies, said that requiring additional data from transit agencies could be a time- consuming burden for local transit officials. The association officials suggested that transit stakeholders should work together to use existing workforce data from FTA or BLS to develop workforce projection data. Transportation Research Board officials also said that additional transit workforce data would be costly and difficult for transit agencies to provide. However, the Director of Eno’s Center for Transportation Leadership, a research organization, stated that it is extremely difficult to develop national policies, programs, and grants to address systemic workforce problems because of the gaps in transit workforce data. Federal Internal Control Standards highlight the importance of using quality information to make informed decisions and identifying the information requirements needed to do so while considering the expectations of internal and external users. While the views of stakeholders we interviewed varied on the extent to which additional transit workforce data and projections are needed, new transit workforce projections could inform decision-making on transit workforce planning to address potential future shortages or other needs. We have previously reported that agencies should weigh data collection decisions carefully, noting that there is a cost to data collection, and that only needed data should be collected. Working with stakeholders to understand what, if any, additional transit-specific workforce data transit stakeholders need and the related collection costs could enable FTA to weigh the complete costs and benefits of developing future data for the transit industry and to make informed decisions on allocating the appropriate resources toward those efforts. Transit stakeholders we interviewed highlighted actions they are taking to address transit workforce needs but also noted continuing difficulties with recruiting and retaining staff. Examples of actions they have taken to address workforce needs, either with a transit workforce grant or with other funding include: Career enhancement: Los Angeles County Metropolitan Transportation Authority officials told us that they have developed a program that offers growth opportunities by providing “upskilling” resources at all levels of the agency including employee development, management/leadership, and transportation senior leadership, among other things. Courseware development: The Transportation Learning Center organized three industry consortiums to develop national standards- based courseware—Rail Car, Signals, and Elevator/Escalator Technicians, according to the Transportation Learning Center. For example, under the Signals Training Consortium, 25 new courses have been developed covering the inspection, maintenance, and troubleshooting of transit and commuter rail signaling equipment. The curriculum is planned to include both classroom and on-the-job training. Internships: The Conference of Minority Transportation Officials developed a program to prepare college, university, and vocational school students to enter transit and transportation-related fields, according to conference officials. In 2018, this program placed 29 interns nationwide in architectural and engineering firms as well as state and local government agencies. Managerial training: The Eno Center for Transportation provided classes for mid- and senior-level transit executives and has started one for first-line supervisors, according to an Eno official. This training includes lectures, classes, job shadowing, informal mentoring, field trips, and meetings with counterparts. Research: The Community Transportation Association of America reported on a survey it conducted of its members in June 2018 on the salary and benefits for professional transit positions in the industry. The survey’s 236 respondents provided information on hourly and/or salary information, operating budget, available benefits, services provided, and number of employees, among other things. According to the Association, the members asked for this survey because it helps them make staffing and employment decisions within their agencies. Technology education: Jacksonville Transportation Authority officials told us that they have established a “Workforce of the Future” working group whose charge is to prepare the workforce to incorporate emerging technologies as it transitions its aged elevated, automated people-mover system—the “Skyway”—to autonomous vehicle technology. The working group supports a public automated-vehicle test track as well as employee town halls to develop the tools to discuss these issues in their communities. FTA’s transit workforce grants also supported stakeholder actions to address transit workforce issues including: In fiscal year 2011, FTA awarded 12 workforce grants totaling $3 million. For example, the Chicago Transit Authority received a grant to develop and validate a transit-manager competency model to help supervisors recognize and support skills and leadership potential in their staff. In addition, the Florida Department of Transportation received a grant for its Certified Transit Technician Program, which resulted in 13 hires, each receiving the opportunity for additional certification and a college degree. In fiscal year 2012, FTA awarded 17 grants totaling $7.05 million. For example, the Southwest Ohio Regional Transit Authority (Cincinnati) received a grant to develop a program that provided technical training in hybrid engine technology to improve its maintenance program and hybrid bus fleet. The Corporation to Develop Communities of Tampa, Inc. received a grant to recruit, train, and employ up to 30 people in the transit industry, including transit operations and maintenance workers. In fiscal year 2015, FTA awarded 16 grants for $8.1 million. For example, the Bay Area Rapid Transit District was awarded a grant to create a pathway to employment in the transit industry for traditionally under-represented individuals. The Workforce Development Council of Snohomish County, Washington, received a grant to bring together local partners to create a pipeline of skilled workers ready to enter the transit and construction industries. The partners have targeted women, minorities, and native tribes to access apprenticeships, social services, and job placement programs. Notwithstanding these efforts, the transit stakeholders we spoke with identified ongoing recruiting and retention challenges as shown in table 1. FTA has taken a number of actions to assist transit agencies with future workforce needs including: FTA provides technical assistance, standards development, training, and workforce development projects for the transit workforce. In fiscal year 2017, the active projects totaled over $29 million. Almost 13.3 million (approximately 46 percent) of this funding went to technical assistance projects. For example, FTA spent almost $4 million to assist the National Aging and Disability Transportation Center with efforts that include developing online courses and training materials to assist certain FTA grant recipients with providing transportation services to older adults and people with disabilities. The funds were also used to present a podcast, as part of an online course on the Americans with Disabilities Act of 1990 (ADA). The podcast addressed common ADA questions related to customer service, wheelchairs on vehicles, and service animals. Over $8.3 million (approximately 28 percent) funded 17 active transit workforce development projects from the fiscal year 2015 transit workforce grants discussed previously for developing new training curriculums, or seeking to recruit and train specific groups, especially those who are underrepresented in the transit workforce. $5 million (approximately 17 percent) funded NTI development and delivery of training programs for federal, state, and local transportation employees. For example, NTI delivered 270 training courses throughout the U.S. to 7,298 participants in fiscal year 2017. NTI also supported a workshop to help address industry issues as they arise, such as workforce shortages and issues in recruitment and retention. $2.5 million (approximately 9 percent) funded a Transit Standards Development Program at the Center for Urban Transportation Research (University of South Florida) to provide research and analysis on needs and gaps, and recommendations for new standards, or to modify existing standards. For example, one of the reports discussed fatigue management, among other things. According to FTA, the ultimate effects of this program are increased safety and reduced injuries and fatalities. FTA is collaborating with NTI to conduct an industry workforce needs assessment aimed at identifying training, skills, and educational gaps that exist in the industry as well as within current NTI programs. They are conducting this assessment because of transit’s changing workforce, technologies, and operating environment. This assessment is intended to result in a report that provides a road map for the transit workforce’s development and training and may identify some of the gaps in transit workforce needs. As of November 2018, NTI has held focus groups at key transit conferences, which have provided a preliminary picture of the transit industry’s critical need, according to FTA. NTI has also completed a draft of a survey of transit agency needs and FTA is reviewing it, according to an NTI official. The next steps include conducting the survey, mapping NTI’s curriculum and courses to desired key skills, and developing a national transit competency framework. The researchers are planning to use a statistically significant sample that represents the needs of the industry, both for urban and rural agencies, with estimated completion of the survey and analysis in early 2019. FTA is evaluating the effectiveness of the transit workforce grant program. FTA funded an evaluation of the 12 fiscal year 2011 transit workforce grants. The report discussed whether the projects met goals, the effect of the programs, and whether the programs were worth further investment. The report noted a number of outcomes including introducing 2,608 youth to transit, and training 1,527 people. FTA also plans to evaluate transit workforce grants awarded in fiscal years 2012 and 2015 and to create outreach materials from the grant projects for transit stakeholders. The evaluation is also intended to provide important best practices and lessons learned for other transit operators. FTA is researching the potential effects of automation on the transit workforce. In January 2018, FTA released the Strategic Transit Automation Research Plan, which established a research and demonstration framework. One of the research projects in the plan is an assessment of the effect of automation on the transit workforce. Specifically, the assessment is planned to provide a qualitative analysis of labor-related considerations with transit bus automation including potential workforce changes, perspectives of organized labor, statutory and regulatory provisions, and other societal factors. A follow-on project is planned to evaluate changes in staffing levels, job responsibilities, labor hours, and training needs to provide a quantitative approach to estimating automation’s effects on transit employment levels, workforce needs, and wages. Although FTA has assisted transit stakeholders with workforce needs, it lacks key strategic planning practices that could ensure its efforts are as effective as possible. FTA reported in its fiscal years 2016 and 2017 annual reports to Congress that it planned to develop a transit workforce strategic plan. Federal Internal Control Standards indicate that plans, such as strategic plans, should set up the effective and efficient operations necessary to fulfill desired objectives. Effective operations produce the intended results from operational processes, while efficient operations do so in a manner that minimizes the waste of resources. However, FTA does not have a comprehensive strategy showing the operations and processes to be developed to guide FTA’s efforts to assist transit agencies with addressing future transit workforce needs. FTA has had a number of starts and stops in producing a transit workforce strategy since it first reported this intention to Congress in 2016, but no clear action has been taken to develop a strategy so far. In July 2018, FTA officials told us that the reason they had not yet drafted a comprehensive strategy is because they considered developing their strategy as part of an overall DOT strategy, rather than a transit workforce strategy as a stand-alone product. However, DOT does not currently plan to develop a comprehensive department-wide transportation workforce strategy. Nevertheless, DOT has consistently identified addressing the transportation workforce as a priority over time in key DOT documents, including its last three strategic plans and the last two performance plans. DOT officials told us that the strategic plan is not intended to provide such detail; rather, it is designed to be a top-level strategic plan that provides a broad framework for DOT. In November 2018, FTA officials told us that they intend to create a “workforce consortium” and a new technical assistance project that would result in a strategy. However, FTA officials did not provide a time frame for when these actions would be taken. Considering the importance of the transit workforce to efficient operation of the transit infrastructure, a transit workforce strategy would be consistent with internal controls, such as setting up effective operations, whether this strategy is developed as part of a department-wide strategy, as a stand-alone project, or through a workforce consortium. Without a comprehensive strategy to guide FTA’s ongoing activities to assist with transit workforce needs, FTA lacks a roadmap to ensure it is effectively leveraging its resources to help address future transit workforce needs. In addition, it may be difficult for Congress to understand the merits of investing in future transit workforce programs because it may not be clear absent a vision of how individual programs fit within the overall transit workforce strategy. In addition to not having a comprehensive strategy, FTA lacks key tools to demonstrate the extent to which individual workforce development efforts are addressing future transit workforce needs. In particular, FTA has not established clearly defined performance goals and measures for its transit workforce assistance efforts. Establishing clear goals and measuring progress toward them are consistent with the management principles set forth in GPRA, as enhanced by the GPRA Modernization Act of 2010, and our previous work. Setting long-term strategic goals is essential for results-oriented management, because such goals explain with greater specificity the results an agency is intending to achieve, as we have previously reported. FTA discussed the pending development of transit workforce goals at an October 2016 summit with transit stakeholders, but these goals were not finalized. Further, there are no performance goals for transit workforce development efforts in DOT’s current annual performance plan, and none is referenced in the current strategic plan. FTA has developed some performance measures for evaluating the outcomes of transit workforce grants—but not for its transit workforce development efforts at large. In addition, these measures are not tied to performance goals that FTA expects the grants to achieve. We have previously reported that results-oriented organizations first set performance goals to clearly define desired outcomes and then they develop performance measures that are clearly linked to the program goals and demonstrate the degree to which the desired results are achieved. For example, two of the performance measures for transit workforce grants are “total projected cost per direct participant,” and “number of people expected to be trained overall,” but FTA has not set a goal for what the projected cost per participant should be or the number of people who should be trained by grant awards. By establishing performance measures before establishing specific performance goals that FTA seeks to achieve, FTA may not ensure that the data gained from these performance measures are an effective use of resources. DOT officials said that performance goals and measures for FTA’s transit workforce grant program were not finalized because no funding has been identified for a subsequent round of these grants. However, FTA’s efforts to assist with transit workforce issues are larger than one grant program. Performance goals and measures are consistent with effective management practices with or without funding for a specific grant program. Without documented, clearly defined goals and performance measures linked to those goals, FTA is limited in its ability to make informed decisions about transit workforce development efforts. As a result, FTA risks expending resources on efforts that it may not be able to demonstrate are meeting intended goals. Focusing on the intended results of FTA’s transit workforce efforts can promote strategic and disciplined management decisions that are more likely to be effective because managers are better able to target areas most in need of improvement and to select appropriate interventions. Further, agency accountability can be enhanced when both agency management and external stakeholders—such as Congress—can assess an agency’s progress toward meeting its goals. Without performance goals and related performance measures, it will be more difficult for FTA to determine the success of its strategies, adjust its approach when necessary, and remain focused on results. Much is unknown about the workforce needed in the future to operate the nation’s transit systems and to transport people to and from work, school, and other destinations. Disaggregating transit workforce data from other transportation data has proved to be challenging, and the best projections of the future transportation workforce needs will expire in 2022. Additionally, how vehicle automation and other technology advances will affect the future transit workforce is unclear, and FTA’s presentations on the transit workforce projections that do exist may have contributed to the lack of clarity on the future needs of the industry. Whether additional, refined data on transit workforce needs—for example, an updated version of the Transportation Industry Report—would provide greater benefits to the industry than the cost of collecting these data is something FTA can determine when it better understands the information the industry needs to make effective workforce decisions. At that point, FTA can decide what additional data need to be collected strategically, if any, and at what cost, as part of strategic planning efforts. FTA has identified the need to create a transit workforce strategy, and has expressed its intention to create one in a number of different ways, but has taken no clear action yet to ensure that FTA’s intention will be realized. By taking the initiative to develop a strategy to help address future transit workforce needs, FTA will be in a position to better manage its ongoing transit workforce activities. FTA is undertaking a number of efforts that could provide the foundation for sound strategic planning, including sponsoring an assessment of transit workforce needs, hiring a data scientist, starting a workforce consortium, and initiating research on future automation that could provide more clarity regarding a key aspect of future transit that is, as of now, an unknown factor. Further, FTA has already drafted some performance measures for its transit workforce grants that it may be able to use as a foundation for creating goals and measures for transit workforce development at large. However, more specific strategic planning efforts that include developing a strategy and performance goals and measures can better enable FTA to effectively help transit agencies identify, prepare, and provide a sufficient workforce for the future. We are making three recommendations to the FTA Administrator: The FTA Administrator should determine, in collaboration with transit stakeholders, whether additional transit workforce data are needed to identify potential future occupational shortages in the transit industry and whether the benefits of this collection would outweigh the cost of gathering it. (Recommendation 1) The FTA Administrator should develop and document a strategy that outlines how FTA will help address future transit workforce needs. (Recommendation 2) The FTA Administrator should develop and document clearly defined performance goals and measures for its transit workforce development efforts. (Recommendation 3) We sent a copy of this draft report to DOT for review and comment. DOT responded with a letter in which it concurred with our recommendations and discussed the successes of its Innovative Workforce Development Program. The letter is reprinted in appendix II. DOT also provided technical comments, which we incorporated in the report as appropriate. We are sending copies of this report to appropriate congressional committees and to the Secretary of Transportation. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-2834 or goldsteinm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who contributed to this report are listed in appendix II. This report addresses: (1) the extent to which information exists about future transit workforce needs, (2) the actions selected transit stakeholders are taking to address current and future transit workforce needs, and (3) the extent to which the Federal Transit Administration (FTA) assists with identifying and addressing current and future transit workforce needs. For all objectives, we analyzed key Department of Transportation (DOT) and FTA documents such as DOT strategic plans, annual reports to Congress in fiscal years 2017 and 2016, and public presentations, which discussed workforce needs, grant programs, and data involving the transit industry. We also interviewed government officials from DOT, including from FTA, the Office of the Secretary, and the Federal Highway Administration; from the Department of Labor (DOL) and its Bureau of Labor Statistics (BLS); and from the Department of Education. Further, we interviewed three transit stakeholders—the Eno Center for Transportation, the National Transit Institute (NTI), and the American Public Transportation Association (APTA) to understand available data sources, relevant studies, and grant programs focused on the transit workforce. Based on our research and recommendations from those interviews with those three stakeholders and FTA, we selected a non- generalizable sample of an additional eight transit stakeholders for interviews. These selected stakeholders included: two research organizations (Transportation Learning Center and the Transportation Research Board, which includes the Transit Cooperative Research Program and the Transit Research Analysis Committee); two unions (Amalgamated Transit Union and Transport Workers Union of America); two trade groups (Community Transportation Association of America and Conference of Minority Transportation Officials); and one membership association of workforce boards (National Association of Workforce Boards); one transportation subject-matter expert (Mort Downey Consulting, LLC). In addition, we selected and interviewed officials from six transit agencies to understand their perspectives regarding workforce issues such as recruiting and retention challenges, and efforts to address those challenges. We selected and interviewed three urban transit agencies: Los Angeles County Metropolitan Transportation Authority (CA); Regional Transportation District—Denver (CO); and the Jacksonville Transportation Authority (FL). We selected these agencies because (1) each was recommended by more than one transit stakeholder we interviewed for taking specific actions to address workforce issues; (2) as a group, they represented geographic diversity (western, central, and eastern United States); and (3) each was awarded at least one FTA transit workforce grant. In order to find smaller, more rural agencies for balance we selected three transit agencies: Advance Transit (Wilder, Vermont); Cache Valley Transit District (Logan, Utah); and the Ki Bois Area Transit System (Stigler, Oklahoma) based primarily on recommendations from the Community Transportation Association of America, which represents thousands of the rural and tribal transit agencies, and then considered geographic diversity (western, central, and eastern United States) and a mix of services offered. Although the views of these selected officials and stakeholders are not generalizable to those of all transit agencies and stakeholders, they represent a range of perspectives and expertise regarding the transit workforce. To determine the extent to which information exists about the future transit workforce, we evaluated the Transportation Industry Report, which projected the employment and skill needs of the transportation industry from 2012 to 2022. We evaluated the scope, methodology, and limitations of the Transportation Industry Report’s workforce projections, as that report provided the best available information according to FTA officials. We analyzed the report’s projected job openings data in the transit and ground passenger transportation sector to understand the extent to which the data represented transit-specific data. In addition, we reviewed FTA’s annual reports to Congress for fiscal years 2016 and 2017, and public presentations to document communication to the public involving transit workforce data. We also reviewed FTA’s National Transit Database (NTD) 2017 and 2016 calendar year data on transit agency employees. Further, we interviewed BLS officials and reviewed the most recent BLS employment projections from 2016–2026 to understand the extent to which the data could be separated to represent only transit- specific data. We reviewed the Standards for Internal Control in the Federal Government on communicating and preparing quality information and compared FTA actions to this information. To determine what actions selected transit stakeholders are taking to address current and future transit needs, we reviewed efforts to address transit workforce needs taken by stakeholders whom we interviewed. We also reviewed challenges involving recruiting and retaining transit workers discussed during our interviews with those stakeholders. We judgmentally included examples in our report to demonstrate the breadth of actions that are being taken. We analyzed various FTA reports on transit workforce grants awarded in fiscal years 2011, 2012, and 2015 and included examples to demonstrate the variety of projects that the transit workforce grants covered. We also included examples in our report of challenges that transit stakeholders we spoke with generally discussed, grouped under common themes. Themes that we included in the report were cited multiple times by stakeholders we interviewed. To determine the extent to which FTA is assisting transit agencies with identifying and addressing current and future workforce needs, we interviewed officials from FTA and DOT’s Office of the Secretary to document their efforts to identify and address current and future transit workforce needs. We compared FTA’s actions to address transit workforce needs to Federal Internal Control Standards, the Government Performance and Results Act of 1993 (GPRA), the GPRA Modernization Act of 2010, and our previous work. We conducted this performance audit from January 2018 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Heather MacLeod (Assistant Director); Amy Higgins (Analyst-in-Charge); Nelsie Alcoser; Melissa Bodeau; Lacey Coppage; Terence Lam; Josh Ormond; Pamela Vines; and Elizabeth Wood made key contributions to this report.", "summary": "FTA provides more than $12 billion annually to support and expand transit services. The operation of transit systems depends on a skilled, qualified workforce, but impending transit worker retirements and advances in transit technology may create challenges for the transit workforce such as finding eligible applicants for transit jobs and obtaining the technology expertise needed. GAO was asked to review various issues related to the sufficiency of the transit workforce. This report discusses the extent to which: (1) information exists about future transit workforce needs and (2) FTA assists with addressing current and future transit workforce needs, among other things. GAO reviewed DOT and FTA documents, including strategic and performance plans, and interviewed DOT and FTA officials and other transit stakeholders, including representatives of transit agencies, research organizations, and unions. Stakeholders were selected based on recommendations from other transit stakeholders and for geographic diversity, among other factors. The nation's transit infrastructure requires a trained workforce, consisting of a variety of occupations (see figure), to operate, maintain, and oversee it. Information on future transit workforce needs is limited in part by the absence of transit-specific workforce projections. According to Federal Transit Administration (FTA) officials, the best information available is an August 2015 report developed by the Department of Transportation (DOT) and other federal stakeholders to produce transportation job projections. However, the report's transit data are combined with ground passenger transportation data (e.g., school buses, taxis), and many of these services are specifically excluded from the statutory definition of transit. Transit-specific data were not available and would be costly to obtain, according to the researchers who wrote the report. Thus, the report does not exclusively reflect the transit workforce. The views of stakeholders GAO interviewed varied regarding whether additional workforce data were needed. Working with stakeholders to understand what, if any, additional information is needed could enable FTA to weigh the complete costs and benefits of developing future transit workforce data. This approach could also enable FTA to make informed decisions on allocating the appropriate resources toward transit workforce efforts. While FTA assists transit stakeholders with addressing workforce needs—for example, providing about $29 million in workforce development assistance in fiscal year 2017—it lacks key strategic planning practices that could ensure its efforts are effective. FTA first reported to Congress in 2016 that it planned to develop a transit workforce strategic plan; however, no clear action has been taken to develop one so far. Further, FTA does not have clearly defined performance goals and measures—as outlined in the Government Performance and Results Act of 1993 (GPRA) and the GPRA Modernization Act of 2010—for FTA's transit workforce development efforts. Without these key strategic planning practices, FTA is limited in its ability to make informed decisions about effectively leveraging its resources to address future transit workforce needs and in measuring the effectiveness of its efforts. GAO is making three recommendations to FTA: (1) in collaboration with stakeholders, determine whether additional transit workforce data are needed; (2) develop a comprehensive transit workforce strategy; and (3) develop performance goals and measures for FTA's transit workforce development efforts. DOT concurred with our recommendations.", "document_type": "gao"}
{"report": "CMS uses the Medicare Physician Fee Schedule to pay physicians and other providers for services delivered to beneficiaries. Physicians and other providers bill Medicare for their services using various five-digit billing codes based in part on codes developed by an AMA panel. Each year, the panel receives proposals from provider groups and others to revise existing billing codes or create new codes. The panel requires those who submit proposals to develop a clinical vignette that describes the typical patient who would receive the service, the diagnosis and relevant conditions, and estimates of time that physicians might spend in providing the service for the typical patient. The panel applies several criteria in reviewing these proposals. For example, a new code should represent a unique, well-defined procedure or service clearly identified and distinguished from existing procedures and services; should not fragment an existing procedure or service represented by one or more existing codes; should reflect the typical (not extraordinary) circumstances related to the delivery of the service; should be performed by many physicians or other qualified health care professionals across the United States; and should be consistent with current medical practice. CMS pays providers a fixed amount known as the Medicare fee for each code. The fees are based on relative values—estimates of resources for the physician’s work (time, skill, and level of training), and practice expenses (the costs of running a practice such as salaries of non- physician employees, rent, and overhead) required to provide a service relative to all other services. In setting fees, CMS also does not allow certain codes to be billed together if it deems that payment for one code is already included in another. CMS establishes and updates relative values annually. By law, the effect of any changes to its payment rates generally must be budget neutral. That is, if total spending increases by more than $20 million each year, including due to the creation of new billing codes, fees for all services would have to be reduced accordingly. Services billed under the physician fee schedule may be provided in a variety of settings, including physicians’ offices and institutional settings such as hospitals, skilled nursing facilities and hospices. Non-physicians may also bill or be reimbursed by Medicare for services under certain circumstances. For example, some types of non-physicians practicing independently—such as physician assistants and nurse practitioners— may bill Medicare for certain services that they are legally authorized to perform under their respective state laws. In other instances, physicians may bill as if they had furnished services that were provided by non- physician staff that they employ or with whom they have a contractual relationship as long as the physician has an established relationship with the beneficiary, and is on the premises to provide supervision if necessary. Providers and other stakeholders have noted that they care for an elderly population with increasingly complex medical conditions who receive care from multiple providers across different sites of care including physicians’ offices, hospitals, nursing homes, and hospices. As such, the focus of primary care has shifted from treating specific medical conditions to increased care coordination and planning. CMS also noted that a new trend in care planning is the use of shared care plans between the beneficiary and the provider rather than those created solely by the provider. These jointly developed care plans can be particularly important to improving overall beneficiary outcomes for beneficiaries with serious illnesses and also allow other providers involved in the beneficiary’s care access to timely information that supports planned care. However, stakeholders have suggested that Medicare’s payment system does not fully reimburse providers for such care planning services. For example, some note that the E/M billing codes that primary care physicians generally use to bill for their services were developed at a time when care coordination and planning was not part of the standard practice of medicine; as such, these codes do not reflect time spent on activities that do not require a face-to-face encounter with the beneficiary, including medical conferences with other physicians, or telephone calls to coordinate care with other providers. Some primary care physicians have requested that CMS conduct a comprehensive review of existing E/M codes to ensure they account for time spent on these services, or develop new codes that primary care physicians may exclusively use to bill for these services. However, others have noted that E/M codes have been reviewed and valued by the AMA, and the codes account for the time spent on these services. Moreover, they have stated that care coordination and planning services are delivered by multiple specialties, not just primary care physicians. Our analysis identified at least 58 Medicare Physician Fee Schedule billing codes that providers may use to bill for LCCP-type services. These 58 billing codes generally contain components we determined to be equivalent to the five key components of the LCCP service as defined in the 2018 BBA. For example, all 58 codes included a provision for the development of a care plan that addresses the beneficiary’s goals, values, and preferences, and a provision for coordination with other providers, which is equivalent to the LCCP component related to interdisciplinary care. Providers may choose a single code or a combination of these codes to account for the time, skill, and resources needed to deliver the service based on the unique health needs of each patient. (See app. IV for more information on the 58 codes and the LCCP components they contain as defined in the 2018 BBA.) The 58 billing codes for LCCP-type services include 45 longstanding, broadly-defined codes and 13 narrowly-defined codes that were more recently introduced starting in 2013. Broadly-defined codes. Of the 45 broadly-defined codes, 39 are E/M codes that have existed for decades. E/M codes are broadly defined to include services provided to treat a variety of illnesses (for example, treatment of a particular medical complaint), but they may also be used to bill for LCCP-type services. In general, the E/M codes range in complexity from low to high depending on the amount of time the provider spends with a patient as well as the complexity of the medical condition(s) being treated. E/M codes may also be billed if more than 50 percent of the time allotted for the service is spent on counseling and care coordination—for example, explaining treatment options and ways to mitigate the patient’s health risks—which are key components of the LCCP service as defined in the 2018 BBA. The E/M codes we identified as representing LCCP-type services were the more complex codes that had estimates of time that may be spent providing the service to a typical patient ranging from 30 to 120 minutes of physician time and 3 to 71 minutes of non-physician time. While the majority of E/M codes have existed for decades, CMS added six new E/M codes starting in 2008—referred to as “prolonged” E/M codes—allowing payment for additional time for care planning and care management services for complex conditions. Narrowly-defined codes. Starting in 2013, CMS added 13 narrowly- defined LCCP-type codes to better account for the time spent coordinating care for patients with complex treatment needs. CMS implemented these more narrowly-defined care planning codes largely in response to provider complaints that E/M codes did not sufficiently account for extensive care management/coordination of care that was required across multiple providers and settings. Unlike broadly-defined codes, these narrowly-defined codes can only be used for LCCP-type services. The 13 narrowly-defined LCCP-type codes fall into four types: transitional care management (TCM), chronic care management (CCM), advance care planning (ACP), and behavioral health integration (BHI). (See table 1.) While some pertain to patients with specific types of health conditions or in certain settings, others are more general and may be used for a range of health conditions. The estimates of physician and non-physician time that may be spent on the broadly-defined and narrowly-defined codes vary, as does Medicare’s 2019 fees for these billing codes—see examples of commonly used LCCP-type billing codes in table 2 and see appendix IV for related information on all 58 LCCP-type billing codes. For example, some stakeholders told us they might bill a complex E/M code (99214) along with a CCM code (99487). As our analysis shows, this combination could result in the provider spending 66 minutes of physician time and 113 minutes of non-physician time for a typical beneficiary, and receiving total Medicare fees of about $203 in 2019. Overall Medicare spending on LCCP-type services represented by the 58 billing codes we identified increased from $26 billion in 2013 to $29 billion in 2017, an 11 percent increase. The vast majority of this spending— about $28.3 billion in 2017—was on services represented by the 45 broadly-defined codes we identified earlier (henceforth we refer to these services as “broadly-defined services.”) By comparison, Medicare spending on LCCP-type services represented by the 13 narrowly-defined codes (henceforth referred to as “narrowly-defined services”) was about $467 million in 2017. Though smaller in terms of total dollars, spending on narrowly-defined services grew at a higher rate than spending on broadly-defined services, from about $2 per beneficiary in 2013 to $14 per beneficiary in 2017. This higher rate in growth can mostly be attributed to these four new types of services being introduced during this 4 year period. For example, as Table 1 shows, two TCM codes were introduced in 2013 and four CCM codes were introduced from 2015 to 2017. In contrast, spending growth for broadly-defined services was much smaller, increasing from about $785 per beneficiary in 2013 to $844 per beneficiary in 2017. For all other Medicare Physician Fee Schedule services combined, per-beneficiary spending decreased from about $1,488 in 2013 to $1,426 in 2017. Spending on CCM and TCM services accounted for most of the total spending on narrowly-defined LCCP-type services from 2013 to 2017. (See fig. 1.) For example, in 2017, TCM services accounted for almost half ($213 million of the total spending of $467 million), while spending on CCM services accounted for over a third ($162 million of the $467 million). The growth in spending on narrowly-defined services was driven by increased utilization—that can be attributed in part to the development of new codes for these services—rather than increases in Medicare fees for these services. Specifically, utilization of narrowly-defined services increased from about 9 services per 1,000 beneficiaries in 2013 to about 177 services per 1,000 beneficiaries in 2017. Average Medicare fees for these services remained flat during this period. The number of beneficiaries receiving narrowly-defined LCCP-type services increased substantially from 2013 to 2017, as more of these Medicare billing codes were added and began to be utilized during this time. Specifically, in 2017, about 2.5 million beneficiaries received narrowly-defined LCCP-type services, representing an 839 percent increase from about 267,000 beneficiaries in 2013. (See fig. 2.) While the overall number of beneficiaries receiving narrowly-defined services increased, these services were concentrated among a relatively small share of Medicare beneficiaries. Specifically, one-quarter of beneficiaries who received any of the narrowly-defined services in 2017 received 62 percent of the approximately 6 million services that were provided that year. (See fig. 3.) In 2017, of the total 2.5 million beneficiaries that received narrowly- defined services, 90 percent received only one type of narrowly-defined LCCP-type service. (See fig. 4.) In contrast, only 10 percent of beneficiaries received multiple types of narrowly-defined LCCP-type services, the most common combination being CCM and ACP. Mirroring beneficiary trends, the number of Medicare providers billing for narrowly-defined LCCP-type services also increased significantly from 2013 through 2017, as these Medicare billing codes were established and began to be utilized during this time. In 2017, a total of about 100,000 providers billed for narrowly-defined services, representing a 227 percent increase from about 31,000 providers in 2013. (See fig. 5.) As with beneficiary trends, while the overall number of providers billing narrowly-defined services grew from 2013 to 2017, billing for these services was also increasingly concentrated among a small share of providers. Specifically, in 2017, 10 percent of providers who billed for any narrowly-defined services billed about 76 percent of the approximately 6 million services that were provided in that year. (See fig. 6.) Each year from 2013 through 2017, physicians specializing in internal medicine accounted for the largest share of spending on narrowly-defined LCCP-type services. In 2017, internal medicine accounted for 45 percent of the $467 million in total Medicare spending on narrowly-defined services. (See fig. 7.) Family practice and nurse practitioners were the other specialties accounting for the greatest shares of spending. In terms of the setting in which narrowly-defined LCCP-type services were provided, the majority were provided in nonfacility settings such as physicians’ offices. Specifically, in 2017, 94 percent of narrowly-defined services were provided in nonfacility settings. This trend was consistent over each of the 5 years from 2013 to 2017. Six of the 19 stakeholders we interviewed did not support the creation of a new billing code for an LCCP service as defined in the 2018 BBA. Two of these—representing physician specialties that together accounted for almost one-fifth of total spending on LCCP-type services in 2017—stated that the existing billing codes were sufficient for them to provide and bill for the full range of the LCCP service. They stated that billing either a single code or a combination of an E/M code and one or more of the 13 narrowly-defined LCCP-type codes we identified allowed them to account for the full range of the LCCP service as defined in the BBA. As such, the two stakeholders said, there was no need for a new billing code. The remaining four stakeholders expressed concerns about creating a new billing code for an LCCP service. These concerns included the following: Overlap with existing codes that require the development of care plans: While not explicitly stating that existing codes were sufficient, some stakeholders said that if a new billing code were created for the LCCP service as defined in the 2018 BBA, it would overlap with or duplicate existing billing codes. For example, three stakeholders noted potential overlap with existing billing codes, such as the ACP and CCM. Three stakeholders said that the care plan that would be required under the new LCCP code would duplicate existing care plans that are required by law for beneficiaries in hospices or skilled nursing facilities. In addition, two stakeholders noted that providers in their specialty already prepare detailed care plans as a standard practice of care when evaluating their patients and billing for these services using existing E/M billing codes. They stated that these care plans exceed the components of the care plan specified in the 2018 BBA. Stakeholders noted that the existence of multiple overlapping codes that include the development of a care plan could create confusion for providers in choosing the most appropriate billing code. Concerns about code proliferation or code fragmentation: Several stakeholders were concerned that adding another code to Medicare’s billing system could result in increased Medicare spending and less, rather than more, care coordination. Specifically, two stakeholders stated that having multiple billing codes for care planning and care management, respectively, would have the potential to increase spending because multiple providers could start billing the new codes even though one provider may have primary responsibility for the beneficiary. (In contrast, under the existing billing codes a single code that encompassed both types of services could be billed.) For example, one of these stakeholders said that primary care physicians generally referred beneficiaries with complex treatment needs to a surgeon or specialist who then both planned and managed the beneficiary’s care, yet the primary care physician might also bill the care planning billing code. In addition to the potential for increased Medicare spending, three stakeholders said that code fragmentation—splitting existing billing codes into multiple codes for services that were previously bundled together—was contrary to the comprehensive patient-centered model of care that Medicare was moving towards. Specifically, one provider stated that under such a model, rather than billing multiple different codes for care planning and coordination, a primary care practice is paid a monthly management fee to (among other things) improve care coordination for patients who receive most of their primary care services from that practice. While six of the stakeholders we interviewed did not support creating a new LCCP code, the remaining 13 stakeholders told us that such a billing code is needed. According to the stakeholders, a new LCCP code as defined in the 2018 BBA could address several concerns they identified in Medicare’s existing billing codes related to the provision of the LCCP service. However, some of these concerns could be addressed under the current Medicare billing framework, as shown by our analysis of available data. For example, stakeholders identified the following limitations that could be addressed by a new LCCP code: Inadequate reimbursement for time spent on interdisciplinary care: The 13 stakeholders stated that Medicare’s existing billing codes either did not require or did not sufficiently reimburse them for the time spent on interdisciplinary care. They stated there should be a separate code to reimburse this type of care. However, stakeholders representing two specialties told us they had proposed such a code to the AMA but the AMA had rejected their proposals because interdisciplinary care is already accounted for in the existing billing codes. Moreover, as our analysis of the 58 billing codes shows, the majority of these codes include a provision for consultation and coordination among providers that is equivalent to input from an interdisciplinary team. With regard to inadequate reimbursement, as another stakeholder noted, providers may bill a complex E/M service along with a narrowly-defined LCCP-type service such as CCM. The total reimbursement for such a combination of codes would be about $203 as of 2019. (See table 2.) Insufficient physician time for care planning: Six stakeholders representing a mix of primary care and medical specialties stated the existing billing codes (including the more complex E/M codes) had insufficient physician time to provide both care planning and care management, which they maintained are separate and distinct activities. They stated a new code could include the appropriate time needed. One stakeholder said that care planning requires at least 30 minutes of time, and the complex E/M codes do not allow providers to bill for the time it takes to provide both the care management of a complex patient as well as care planning for the patient. According to the stakeholder, for example, if a provider bills a complex E/M code that allows for 40 minutes of physician time, that is insufficient to provide both types of services. While CMS has recently established new prolonged E/M codes (which allow for an additional 60 minutes of time), the stakeholder noted that they do not address the problem of insufficient time because a prolonged E/M code may only be billed with a companion E/M code, and the threshold of time needed to bill the two codes together is now too high—specifically 40 minutes for the complex E/M code plus 60 minutes for the prolonged E/M code. However, our review of CMS guidance on billing of prolonged E/M codes shows that providers do not have to meet the full 60 minutes of time in order to bill a prolonged E/M code; they may bill it as long as the total time spent on the visit exceeds the typical time for the E/M visit plus 30 minutes. Documentation requirements: Three stakeholders, largely representing primary care and medical specialties, stated that burdensome documentation requirements for the more complex E/M codes hampered their ability to bill these codes. They suggested that a new billing code could be structured similar to the new ACP or CCM codes which do not have the same documentation requirements. While these stakeholders expressed concern regarding documentation as a discouraging factor, our analysis of 2017 Medicare claims data showed that certain specialties, including some that had expressed this concern, billed the more complex codes at a significantly higher rate than the average across all specialties. This may indicate that these documentation requirements do not necessarily preclude providers from billing these codes. For example, 83 percent of all the E/M new patient visits billed by geriatricians in 2017 were billed using the more complex E/M codes, compared to 48 percent on average. Similarly, 80 percent of all the E/M established patient visits billed by clinical psychologists in 2017 were billed using the more complex E/M codes compared to 50 percent on average. See appendix V for details on billing patterns for all medical specialties. Inability of non-physician staff to independently bill for care planning: Seven stakeholders expressed concerns that non-physician staff such as nurses and social workers cannot independently bill the existing Medicare billing codes that we identified as being LCCP-type services. As one stakeholder explained, non-physician staff may spend time providing coordination and care planning services separately rather than concurrently with the physician, but they cannot bill for this time independently because the physician was not present. These stakeholders stated that a new LCCP code that could be billed by physicians and non-physicians that participated in the care planning process could address this issue. However, other stakeholders expressed concerns about the effect on Medicare spending if multiple providers billed for an LCCP service. Moreover, reimbursement for non-physicians is built into Medicare fees. Specifically, Medicare’s fee for each billing code includes reimbursement for physician’s time as well as their practice expenses (which cover the costs of non-physician staff), and when the AMA panel develops resources estimates for each billing code (upon which Medicare fees are based), it considers the amount of non-physician time spent on that code. Certain non-physician practitioners, such as nurse practitioners and physician assistants, may also independently bill services under the Medicare Physician Fee Schedule subject to certain requirements, and as specified in their scope of practice under state law. Stakeholders generally concurred that if a new LCCP code were implemented, the definition of interdisciplinary care should be flexible and not require a social worker. Currently, the LCCP billing code as defined in the 2018 BBA requires that the interdisciplinary team providing care planning services include a social worker. However, 13 stakeholders stated that a typical practice did not include a social worker, but rather included a nurse who might perform the functions of a social worker. They stated that smaller office-based medical practices could not afford to hire a social worker. The stakeholders concurred that social workers were generally available in larger integrated practices (such as a single or multiple groups aligning with each other or with a larger hospital system) and in facility settings such as hospitals or skilled nursing facilities. (Stakeholders also provided other comments on the structure of a potential new billing code for the LCCP service should such a code be established by CMS, which we summarize in app. VI.) We provided a draft of this report to HHS for review and comment. HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VII. Appendix II: Longitudinal Comprehensive Care Planning Service Components in the Balanced Budget Act of 2018 Pub. L. No. 115-123, § 50342(c)(4), 132 Stat. 211. We identified 58 billing codes in Medicare’s physician fee schedule that may be used to bill for LCCP-type services as defined in the Balanced Budget Act of 2018 (2018 BBA). Figure 9 shows relevant information on these billing codes including the short descriptor, beneficiary eligibility criteria, our analysis of whether the billing code’s components are equivalent to the components of an LCCP service as defined in the 2018 BBA, and Medicare’s 2019 fee. Medicare’s physician fee schedule contains evaluation and management (E/M) codes that providers may use to bill for face-to-face visits in their offices or other settings such as hospitals. These codes range in complexity from low to high depending on the amount of time the provider spends with a patient as well as the complexity of the medical decision- making and the medical condition(s) being treated. Table 4 shows the percentage of each specialty’s E/M visits that were billed as complex visits (moderate or high complexity). In general, primary care and medical sub-specialties tended to bill complex visits at a higher rate than the all- specialty average, while surgical specialties tended to bill complex visits at a lower rate than the all-specialty average. We interviewed 19 stakeholders including national umbrella groups of physicians and other providers to obtain their perspectives on the structure of a new billing code for LCCP-type services as defined in the Balanced Budget Act of 2018 (2018 BBA), regardless of whether they supported the creation of a new code. Stakeholders were generally in agreement that a new billing code for LCCP-type services as defined in the 2018 BBA, if implemented, should be broadly defined. Specifically, stakeholders stated that it should not be tied to a specific condition, should allow for both in-person and non-face-to-face services performed when the beneficiary was not present, should be billable more than once, should be available for billing by both primary care physicians and specialists, and should have restrictions to avoid duplicative billing with existing billing that provided overlapping services. However, stakeholders had more mixed views about what these specific restrictions should be. Stakeholder views about the various structural components or restrictions included the following: Applicable medical conditions: The majority of stakeholders (13 of the 17 who responded to this question) stated that the new code should be broadly defined although they differed in their opinions of what broadly-defined meant; one stakeholder cautioned against an overly broad definition, and one suggested pilot testing with a discrete list of conditions. Of the 13 stakeholders in favor of a broad definition, 12 stated that the new billing code should not be tied to any particular specific illness or medical condition but should be flexible in structure. Three stakeholders stated that the extent of beneficiaries’ daily functioning or quality of life should also be considered when defining applicable medical conditions. For example, a beneficiary who is not necessarily suffering from a life-threatening illness but is unable to perform the functions of daily living (such as bathing and eating) needs extensive care planning and should therefore be covered under the new LCCP-type service. Three stakeholders stated that the new code should be billable if a beneficiary’s existing diagnosis of a serious illness changed. Three stakeholders stated that a potential new code could be modeled along the lines of existing billing codes—specifically the advance care planning (ACP) or chronic care management (CCM) codes— which do not specify any particular medical condition. Two stakeholders said that a new code should not be so broad that it could apply to a vast majority of beneficiaries. For example, one stakeholder stated that the American Medical Association would likely not approve a code for a generic serious condition because it would be difficult to differentiate that code from an existing billing code, such as an evaluation and management (E/M) code, which may be used for any medical condition including serious, life-threatening conditions. One stakeholder suggested pilot testing the code with a discrete list of conditions, with the intention of expanding the list afterwards. In-person or non-face-to-face: The majority of stakeholders (12 of the 15 that responded to this question) stated that a potential new code should allow for both in-person and non-face-to-face activities (such as virtual or telehealth—providing clinical care remotely by two-way video, phone calls with the beneficiary or to arrange referrals or coordinate care with other providers when the beneficiary was not present); three said it should only include face-to-face activities. Twelve stakeholders stated that the visit should include both types of activities. For example, one stakeholder said the initial visit for LCCP-type services should be in-person, and follow up activities such as updating a care plan or remote patient monitoring (monitoring of patients outside of conventional settings) could be non-face-to-face. Three stakeholders said it should only include face-to-face activities either because of concerns about the potential for overbilling if the new code included non-face-to-face activities which might be difficult to verify or because other existing codes, such as CCM, already cover non-face-to-face activities. Frequency of billing: All of the 16 stakeholders responding to this question concurred that the new code should be billable more frequently than on a one-time basis, although opinions varied on the exact frequency. Nine stakeholders said the code should be billable on an ongoing basis as the beneficiary’s condition changes. For example, one said that the new code should be on-going because the care planning and treatment would continue to evolve over time as the beneficiary’s condition changes. Seven other stakeholders said that while it should not be an ongoing service, it should be billable more frequently than once. For example, one stakeholder specified that it could be billed once per month or over every three months, but that a target end date must be specified; otherwise, it would be too similar to existing billing codes such as the CCM code that may be billed monthly. Two other stakeholders said it could be billed up to 4-5 times a year. Other billing restrictions: All 12 stakeholders responding to this question indicated that restrictions would be necessary to avoid overlap with existing billing codes. For example, three stakeholders suggested that the new code could be billed along with an E/M code for additional services not covered by the E/M code as long as it does not overlap with other existing codes that account for additional time beyond an E/M visit (such as the prolonged E/M visit billing codes). One suggested that it should not be billed along with any of the existing narrowly-defined LCCP-type codes, including CCM, transitional care management, or the ACP codes. One did not specify any particular code with which the new code should not be billed, but cautioned that care should be taken to ensure that time spent with the beneficiary was reported only once. Providers eligible to bill the code: The majority of stakeholders (13 of the 15 that responded to this question) stated that both primary care physicians and specialists should be eligible to bill the new code. Two of these stakeholders said that there should also be a requirement that the billing physician has an established relationship with the beneficiary. Two stakeholders said that only specialists should bill since they are generally the ones attending to the beneficiary’s serious illness. Two stakeholders stated that non-physicians (including social workers) should also be able to bill the code as long as they are currently allowed to bill separately under the Medicare Physician Fee Schedule. In addition to the contact named above, Karen Doran, Assistant Director; Iola D’Souza, Analyst-in-Charge; Sarah Belford; Krister Friday; John Lalomio; and Daniel Ries made key contributions to this report. Also contributing were George Bogart and Muriel Brown.", "summary": "Medicare's physician fee schedule contains over 8,000 billing codes for office visits, surgical procedures, or other services provided to beneficiaries. Some provider groups have concerns that these codes do not sufficiently account for the LCCP-type services they provide to Medicare beneficiaries with complex medical needs. The BBA included a provision that GAO examine billing codes that may be used for LCCP-type services for beneficiaries with a serious or life-threatening illness. GAO identified, among other things, (1) existing Medicare physician fee schedule billing codes that can be used to bill LCCP-type services; and (2) trends in Medicare spending on these services from 2013 through 2017. GAO reviewed Centers for Medicare & Medicaid Services (CMS) billing code manuals and American Medical Association (AMA) code descriptors to identify existing codes containing key components of LCCP-type services; analyzed Medicare Part B claims data from 2013 to 2017 (the most recent available at the time of GAO's review); and interviewed officials from CMS and 19 stakeholders, including the AMA, national physician groups, and other provider groups that had previously given input on the topic to Congress. GAO provided a draft of this report to the Department of Health and Human Services (HHS). In response, HHS provided technical comments, which GAO incorporated as appropriate. The 2018 Bipartisan Budget Act (BBA) defined longitudinal comprehensive care planning (LCCP) as services involving an interdisciplinary team of providers who develop and communicate a care plan to Medicare beneficiaries diagnosed with a serious or life-threatening illness. GAO identified at least 58 billing codes in Medicare's physician fee schedule that could be used by providers to bill for services that cover some or all of the LCCP service components as defined in the 2018 BBA —referred to by GAO as LCCP-type services. The 58 billing codes may be used individually or in combination, depending on a beneficiary's medical needs. Stakeholders representing providers told GAO their members generally use one or a combination of these codes to bill for LCCP-type services. Forty-five of the 58 codes are broadly-defined longstanding codes that can be used for LCCP-type services as well as other services such as the treatment of a specific medical complaint. The remaining 13 codes are more recent narrowly-defined codes introduced starting in 2013 that only cover LCCP-type services. They include transitional care management services introduced in 2013, chronic care management starting in 2015, advance care planning in 2016, and behavioral health integration in 2017. GAO found that overall Medicare spending on LCCP-type services that were billed to the 58 codes increased from $26 billion in 2013 to almost $29 billion in 2017. While narrowly-defined services accounted for a small share of this total spending ($467 million in 2017), spending on these narrowly-defined services such as chronic care management increased rapidly. Moreover, spending growth on narrowly-defined services was driven by increased use of these services rather than increases in reimbursement rates. From 2013 through 2017, more beneficiaries received and more providers billed for narrowly-defined services. The number of Medicare beneficiaries receiving these services grew from about 267,000 to about 2.5 million. The number of providers billing these services grew from about 31,000 to about 100,000.", "document_type": "gao"}
{"report": "FTC and, most recently, CFPB, are the federal agencies primarily responsible for overseeing CRAs. FTC has authority to investigate most organizations that maintain consumer data and to bring enforcement actions for violations of statutes and regulations that concern the security of data and consumer information. CFPB, created in 2010 by the Dodd- Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), has enforcement authority over all CRAs for violations of certain consumer financial protection laws. In general, it also has the authority to issue regulations and guidance for those laws. CFPB has supervisory authority over larger market participants in the consumer reporting market. In 2012, CFPB defined larger market participant CRAs as those with more than $7 million in annual receipts from consumer reporting. CFPB’s supervision of these companies includes monitoring, inspecting, and examining them for compliance with the requirements of certain federal consumer financial laws and regulations. As discussed below, these laws include most provisions of the Fair Credit Reporting Act (FCRA); several provisions of the Gramm-Leach-Bliley Act (GLBA); and provisions of the Dodd-Frank Act concerning unfair, deceptive, or abusive acts or practices. Although there is no commonly agreed-upon definition of “data breach,” the term generally refers to an unauthorized or unintentional exposure, disclosure, or loss of sensitive information. This information can include personally identifiable information such as Social Security numbers, or financial information such as credit card numbers. A data breach can be inadvertent, such as from the loss of an electronic device; or deliberate, such as the theft of a device or a cyber-based attack by individuals or groups, including an organization’s own employees, foreign nationals, or terrorists. Data breaches have occurred at all types of organizations, including private, nonprofit, and federal and state entities. In the Equifax data breach, Equifax system administrators discovered on July 29, 2017, that intruders had gained unauthorized access via the Internet to a server housing the company’s online dispute portal. The breach compromised the personally identifiable information of at least 145.5 million individuals, and included names, addresses, and birth dates; and credit card, driver’s license, and Social Security numbers. Equifax’s investigation of the breach identified the following factors that led to the breach: software vulnerabilities, failure to detect malicious traffic, failure to isolate databases from each other, and inadequately limiting access to sensitive information such as usernames and passwords. Equifax’s public filings after the breach noted that the company took steps to improve security and notify individuals about the breach. Our August 2018 report provides more information on the breach and Equifax’s response. FTC enforces compliance with consumer protection laws under authorities provided in FCRA, GLBA, and the FTC Act. As we reported in February 2019, according to FTC, in the last 10 years, it has brought 34 enforcement actions for FCRA violations, including 17 against CRAs. In addition, FTC said that it has taken 66 actions against companies (not just in the last 10 years), including CRAs, that allegedly engaged in unfair or deceptive practices relating to data protection. In some circumstances, FTC enforcement authority can include civil money penalties—monetary fines imposed for a violation of a statute or regulation. However, FTC’s civil penalty authority does not extend to initial violations of GLBA’s privacy and safeguarding provisions. These provisions require administrative, physical, and technical safeguards with an emphasis on protection against anticipated threats and unauthorized access to customer records. For violations of GLBA provisions, FTC may seek an injunction to stop a company from violating these provisions and may seek redress (damages to compensate consumers for losses) or disgorgement (requirement for wrongdoers to give up profits or other gains illegally obtained). Determining the appropriate amount of consumer compensation requires FTC to identify the consumers affected and the amount of monetary harm they suffered. In cases involving security or privacy violations resulting from data breaches, assessing monetary harm can be difficult. In addition, consumers may not be aware that their identities have been stolen as a result of a breach and or identity theft, and related harm may occur years in the future. It can also be difficult to trace instances of identity theft to specific data breaches. According to FTC staff, these factors can make it difficult for the agency to identify which individuals were victimized as a result of a particular breach and to what extent they were harmed and then obtain related restitution or disgorgement. Having civil penalty authority for GLBA provisions would allow FTC to fine a company for a violation such as a data breach without needing to prove the monetary harm to individual consumers. FTC staff noted that in the case of a data breach, each consumer record exposed could constitute a violation; as a result, a data breach that involved a large number of consumer records could result in substantial fines. In 2006, we suggested that Congress consider providing FTC with civil penalty authority for its enforcement of GLBA’s privacy and safeguarding provisions. We noted that this authority would give FTC a practical tool to more effectively enforce provisions related to security of data and consumer information. Following the 2008 financial crisis, Congress introduced several bills related to data protection and identity theft, which included giving FTC civil penalty authority for its enforcement of GLBA. However, in the final adoption of these laws, Congress did not provide FTC with this authority. Since that time, data breaches at Equifax and other large organizations have highlighted the need to better protect sensitive personal information. Accordingly, we continue to believe FTC and consumers would benefit if FTC had such authority, and we recommended in our February 2019 report that Congress consider providing FTC with civil penalty authority for the privacy and safeguarding provisions of GLBA to help ensure that the agency has the tools it needs to most effectively act against data privacy and security violations. CFPB enforces compliance with most provisions of FCRA; several provisions of GLBA; and the prohibition of unfair, deceptive, or abusive acts or practices under the Dodd-Frank Act. In our February 2019 report, we noted that since 2015, CFPB has had five public settlements with CRAs. Four of these settlements included alleged violations of FCRA, and three included alleged violations of provisions related to unfair, deceptive, or abusive practices. CFPB also has an ongoing investigation of Equifax’s data breach. Under its existing authority, CFPB has examined several larger market participant CRAs, but may not be identifying all CRAs that meet the $7 million threshold. CFPB staff told us that as of October 2018, they were tracking between 10 and 15 CRAs that might qualify as larger market participants. CFPB staff told us that they believe the CRA market is highly concentrated and there were not likely to be many larger market participants beyond the 10 to 15 they are tracking. However, CFPB staff said that the 10 to 15 CRAs may not comprise the entirety of larger market participants, because CRAs’ receipts form consumer reporting may vary from year to year, and CFPB has limited data to determine whether CRAs meet the threshold. Our January 2009 report on reforming the U.S. financial regulatory structure noted that regulators should be able to identify institutions and products that pose risks to the financial system, and monitor similar institutions consistently. CFPB could identify CRAs that meet the larger market participant threshold by requiring such businesses to register with it, subject to a rulemaking process and cost-benefit analysis of the burden it could impose on the industry. Another method CFPB could use to identify CRAs subject to its oversight would be to leverage information collected by states. We recommended in February 2019 that CFPB identify additional sources of information, such as through registering CRAs or leveraging state information, that would help ensure the agency is tracking all CRAs subject to its authority. CFPB neither agreed nor disagreed with our recommendation. Each year CFPB determines the institutions (for example, banks, credit unions, non-bank mortgage servicers, and CRAs) and the consumer product lines that pose the greatest risk to consumers, and prioritizes these for examinations. CFPB segments the consumer product market into institution product lines, or specific institutions’ offerings of consumer product lines. CFPB then assesses each institution product line’s risk to consumers at the market level and institutional level. To assess risk at the market level, CFPB considers market size and other factors that contribute to market risk. To assess risk at the institution level, CFPB considers an institution’s market share within a product line, as well as field and market intelligence. Field and market intelligence includes quantitative and qualitative information on an institution’s operations for a given product line, including the strength of its compliance management systems, the number of regulatory actions directed at the institution, findings from prior CFPB examinations, and the number and severity of consumer complaints CFPB has received about the institution. CFPB then determines specific areas of compliance to assess by considering sources such as consumer complaints, public filings and reports, and past examination findings related to the same or similar products or institutions. Most recently, CFPB examinations of CRA’s consumer reporting have focused on issues such as data accuracy, dispute processes, compliance management, and permissible purposes. Although CFPB’s examination prioritization incorporates several important factors and sources, the process does not routinely include assessments of data security risk, such as how institutions detect and respond to cyber threats. CFPB staff said the bureau cannot examine for or enforce compliance with the data security standards in provisions of GLBA and FCRA or FTC’s implementing rules, even at larger participant CRAs. After the Equifax breach, however, CFPB used its existing supervisory authority to develop internal guidelines for examining data security, and conducted some CRA data security examinations. CFPB staff said that they do not routinely consider data security risks during their examination prioritization process and have not reassessed the process to determine how to incorporate such risks going forward. Statute requires CFPB to consider risks posed to consumers in the relevant product and geographic markets in its risk-based supervision program. In addition, federal internal control standards state that agencies should identify, analyze, and respond to risks related to achieving defined objectives. This can entail considering all significant internal and external factors to identify risks and their significance, including magnitude of impact, likelihood of occurrence, nature of the risk, and appropriate response. In light of the Equifax breach, as well as CFPB’s acknowledgment of the CRA market as a higher-risk market for consumers, it is important for CFPB to routinely consider factors that could inform the extent of CRA data security risk such as the number of consumers that could be affected by a data security incident and the nature of potential harm resulting from the loss or exposure of information. In our February 2019 report, we recommended that CFPB assess whether its process for prioritizing CRA examinations sufficiently incorporates the data security risks CRAs pose to consumers, and take any needed steps identified by the assessment to more sufficiently incorporate these risks. CFPB neither agreed nor disagreed with our recommendation. In our February 2019 report, we noted that FTC and CFPB provide educational information for consumers on ways to mitigate the risk of identity theft. In addition, after a breach, FTC and CFPB publish information specific to that breach. For example, shortly after Equifax’s announcement of the breach, FTC published information on when the breach occurred, the types of data compromised, and links to additional information on Equifax’s website. Similarly, CFPB released three blog posts and several social media posts that included information on ways that consumers could protect themselves in the wake of the breach and special protections and actions for service members. At any time, consumers can take actions to help mitigate the risk of identity theft. For example, consumers can implement a credit freeze free of charge, which can help prevent new-account fraud by restricting potential creditors from accessing the consumer’s credit report. Similarly, implementing a free fraud alert with a credit bureau can help prevent fraud because it requires a business to verify a consumer’s identity before issuing credit. However, consumers are limited in the direct actions they can take against a CRA in the event of a data breach, for two primary reasons. First, consumers generally cannot determine the source of the data used to commit identity theft. As a result, it can be difficult to link a breach by a CRA (or any other entity) to the harm a consumer suffers from a particular incidence of identity theft, which makes it challenging to prevail in a legal action. Second, unlike with many other products and services, consumers generally cannot exercise choice if they are dissatisfied with a CRA’s privacy or security practices. Specifically, consumers cannot choose which CRAs maintain information on them. In addition, consumers do not have a legal right to delete their records with CRAs, according to CFPB staff, and therefore cannot choose to remove themselves entirely from the CRA market. FTC and CFPB have noted that the level of consumer protection required can depend on the consumer’s ability to exercise choice in a marketplace. For example, when determining whether a practice constitutes an unfair practice, FTC considers whether the practice is one that consumers could choose to avoid. Similarly, according to CFPB staff, the consumer reporting market may pose higher risk to consumers because consumers cannot choose whether or which CRAs possess and sell their information. Chairman Krishnamoorthi, Ranking Member Cloud, and Members of the Subcommittee, this concludes my prepared remarks. I would be happy to answer any questions that you may have. If you or your staff have any questions about this statement, please contact Michael Clements at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact named above, John Forrester (Assistant Director), Winnie Tsen (Analyst-in-Charge), and Rachel Siegel made key contributions to the testimony. Other staff who made key contributions to the report cited in the testimony are identified in the source product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "CRAs collect, maintain, and sell to third parties large amounts of sensitive data about consumers, including Social Security numbers and credit card numbers. Businesses and other entities commonly use these data to determine eligibility for credit, employment, and insurance. In 2017, Equifax, one of the largest CRAs, experienced a breach that compromised the records of at least 145.5 million consumers. This statement is based on GAO's February 2019 report on the CRA oversight roles of FTC and CFPB. This statement summarizes (1) measures FTC has taken to enforce CRA compliance with requirements to protect consumer information, (2) measures CFPB has taken to ensure CRA protection of consumer information, and (3) actions consumers can take after a breach. In its February 2019 report, GAO found that since 2008, the Federal Trade Commission (FTC) has settled 34 enforcement actions against various entities related to consumer reporting violations of the Fair Credit Reporting Act (FCRA), including 17 actions against consumer reporting agencies (CRA). Some of these settlements included civil penalties—fines for wrongdoing that do not require proof of harm—for FCRA violations or violations of consent orders. However, FTC does not have civil penalty authority for violations of requirements under the Gramm-Leach-Bliley Act (GLBA), which, unlike FCRA, includes a provision directing federal regulators and FTC to establish standards for financial institutions to protect against any anticipated threats or hazards to the security of customer records. To obtain monetary redress for these violations, FTC must identify affected consumers and any monetary harm they may have experienced. However, harm resulting from privacy and security violations can be difficult to measure and can occur years in the future, making it difficult to trace a particular harm to a specific breach. As a result, FTC lacks a practical enforcement tool for imposing civil money penalties that could help to deter companies, including CRAs, from violating data security provisions of GLBA and its implementing regulations. Since 2015, the Consumer Financial Protection Bureau (CFPB) has had five public settlements with CRAs. Four of these settlements included alleged violations of FCRA; and three included alleged violations of unfair, deceptive, or abusive practices provisions. CFPB is also responsible for supervising larger CRAs (those with more than $7 million in annual receipts from consumer reporting) but lacks the data needed to ensure identification of all CRAs that meet this threshold. Identifying additional sources of information on these CRAs, such as by requiring them to register with the agency through a rulemaking or leveraging state registration information, could help CFPB ensure that it can comprehensively carry out its supervisory responsibilities. After the Equifax breach, CFPB used its existing supervisory authority to examine the data security of certain CRAs. CFPB's process for prioritizing which CRAs to examine does not routinely include an assessment of companies' data security risks, but doing so could help CFPB better detect such risks and prevent the further exposure or compromise of consumer information. Consumers can take actions to mitigate the risk of identity theft—such as implementing a fraud alert or credit freeze—and can file a complaint with FTC or CFPB. However, consumers are limited in the direct actions they can take against CRAs. Consumers generally cannot exercise choice in the consumer reporting market—such as by choosing which CRAs maintain their information—if they are dissatisfied with a CRA's privacy or security practices. In addition, according to CFPB, consumers cannot remove themselves from the consumer reporting market entirely. In its February 2019 report, GAO recommended that Congress consider giving FTC civil penalty authority to enforce GLBA's safeguarding provisions. GAO also recommended that CFPB (1) identify additional sources of information on larger CRAs, and (2) reassess its prioritization of examinations to address CRA data security. CFPB neither agreed nor disagreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Individual Taxpayer Identification Number (ITIN) An ITIN is a tax processing number issued by IRS to individuals who are required to have a U.S. taxpayer identification number but who do not have and are not eligible to obtain a Social Security number from the Social Security Administration. IRS issues ITINs to help individuals comply with the U.S. tax laws, and to provide a means to efficiently process and account for tax returns and payments for those not eligible for Social Security numbers. Taxpayers may first realize they are victims of employment-related identity fraud when IRS notifies them of discrepancies in the reporting of income earned using their names and SSNs. After filing deadlines have passed, IRS’s Nonfiler and Automated Underreporter (AUR) programs use W-2 information to identify and follow up with taxpayers who appear to owe taxes but either have not filed returns (Nonfiler) or have filed returns but underreported earnings (AUR). Other taxpayers may become aware that their SSNs were used by other people when IRS sends them an Employment-Related Identity Theft (CP01E) notice. IRS sends these notices to taxpayers whose SSNs appear on W-2s that have been attached to tax returns (Forms 1040, U.S. Individual Income Tax Return) that were filed with Individual Taxpayer Identification Numbers (ITIN) (see sidebar). In these cases, IRS marks the taxpayer accounts with an employment-related identity theft indicator. Victims may also notice wages they did not earn appearing on their Social Security earnings record or may be alerted by SSA that their Supplemental Security Income benefits are being reduced or eliminated because of wages earned by someone else using their SSN. The following individuals and agencies are involved in verifying individuals’ eligibility for employment, in processing wage information, or in monitoring identity fraud cases. Employer: Employers are required to complete the Form I-9, Employment Eligibility Verification for new hires. As part of completing the form, employers certify that they have examined documentation demonstrating that new hires are who they say they are, are eligible for employment, and that the documentation appears to be genuine. The employer is required to submit a W-2 to each employee as well as SSA by January 31 each year. Employee: As part of obtaining employment, the employee provides the employer with documentation to authenticate his or her identity. It is at this point that the employee could provide someone else’s SSN or other information. DHS: DHS manages E-Verify, a free, internet-based system that employers can use to verify employees’ employment eligibility. SSA supports DHS in this effort. Federal agencies are required to use E- Verify for federal employees and contractors. Some states also require employers to use E-Verify to verify the eligibility of some or all employees or contracts. According to DHS, by the end of fiscal year 2019, more than 890,000 employers were enrolled in E-Verify. SSA: SSA receives W-2s from employers and uses this information to update earnings records and to make determinations about benefits. After receiving and processing W-2s, SSA sends the W-2 information to IRS as part of the Combined Annual Wage Reporting (CAWR) process. SSA also maintains the Social Security Number Verification Service, a free SSN verification program that registered employers can use to verify that employee names and SSNs match SSA’s records before they submit W-2s to SSA. IRS: IRS uses W-2 information to verify tax return information, such as wages, withholdings, and Employer Identification Numbers (EIN), and to enforce tax law. IRS has legal authority to penalize employers $250 for each inaccurate W-2 they submit up to a maximum of $3 million in total penalties per year. In 2013, the SSA OIG reported that IRS does not routinely penalize employers who consistently submit erroneous or inaccurate wage information. Federal Trade Commission: It collects and reports to the public aggregated data from self-reported victims of identity fraud. Victims can visit www.IdentityTheft.gov to report identity theft and access resources. Our analysis shows that millions of SSNs in NDNH data exhibited risk characteristics associated with employment-related identity fraud in tax year 2016. More than a million of those were also at risk of not meeting all IRS tax return requirements, such as reporting all associated W-2s. However, IRS did not identify all of those noncompliant returns. Further, employment-related identity fraud can diminish tax revenues. IRS’s method for tracking employment-related identity fraud likely understates the extent of the problem. We identified more than 2.9 million SSNs that had risk characteristics associated with SSN misuse, and had evidence of employment activity based on our analysis of NDNH verified quarterly wage records for 122.8 million individuals from August to October 2016. The risk characteristics included: Individuals who had wages reported for three or more employers in the same quarter; Individuals who were deceased; Individuals under age 14; and Individuals over age 84 (see table 1). We previously reported that the existence of three or more wage records in the same time frame for the same individual indicates possible SSN misuse, which could include employment-related identity fraud. We also previously reported, along with the Department of Justice and SSA OIG, that deceased persons, children, and elderly populations are at risk of identity theft (IDT). Fraudsters may target these groups because they believe there is a lower chance the SSNs are being used for legitimate employment. Individuals with three or more employers within the same quarter. Our analysis of NDNH data identified millions of SSNs with three or more wage records from August to October 2016. Specifically, of the 122.8 million SSNs included in the data, we found 2.8 million with three or more wage records in the same quarter. Further, we found almost 10,000 of those SSNs had wages reported by 10 or more employers in the same quarter. It is not uncommon for individuals to have second jobs or to change employers. However, when wages are reported by three or more employers for the same calendar quarter, it can indicate potential misuse of an SSN (see table 2). As an illustrative example of potential SSN misuse, one SSN had wages reported by 15 employers from 14 different states for a 3-month period in 2016 (see figure 1). According to the wage data, on average, each of these employers was paying the employee approximately $26,900 a year. Deceased individuals. We identified several thousand SSNs for deceased individuals included in the NDNH data. Specifically, the NDNH data August-October 2016 showed 13,600 SSNs for individuals SSA identified as deceased prior to May 2016. Of these, 8,400 are reported to have died before 2014. In some cases, we found individuals who had been deceased for a decade. Children. We identified tens of thousands of SSNs for children under the age of 14. Specifically, NDNH data included 33,856 SSNs of individuals who, according to SSA data, were under the age of 14 with earned income reported. One reason children can be at risk of long- term victimization of employment-related identity fraud is because it usually takes children a while before they start working or applying for financial credit. This gives a fraudster ample opportunity to exploit their stolen identities. Still, there are legitimate circumstances for children to be earning wages, such as in the entertainment and advertising industries. Elderly. We identified tens of thousands of wage records from elderly individuals. Specifically, the 2016 NDNH data included 65,823 SSNs with earned income reported that SSA data identified as being over 84. The Federal Trade Commission reported that in 2016, approximately one-fifth of IDT complaints they received involved people age 60 years or older. Further, the elderly have low participation rates in the workforce. The Bureau of Labor Statistics reported that, in 2016, the workforce participation rate for those ages 75 and above was 8.4 percent, compared to a rate of 62.8 percent for the overall workforce. Some SSNs with risk characteristics were sometimes also associated with IRS returns that did not include required W-2 forms. Specifically, more than 1.3 million individuals—of the 2.9 million SSNs we determined to have risk characteristics associated with SSN misuse—had at least one wage record they did not report to IRS. Of these 1.3 million individuals, more than half failed to include at least one W-2 on their tax return, and slightly less than half (43 percent) did not include any W-2s in a tax return (see table 3). IRS has enforcement tools that are intended to detect reporting deficiencies, but these tools did not always detect the reporting issues we identified. IRS can use Automated Underreporter (AUR) and the Nonfiler, as well as seven IDT-related indicators to mark a taxpayer’s account or W-2 if it has determined that the SSN was compromised (see sidebar). We compared data from these enforcement tools and IDT indicators to the 1.3 million individuals identified above and found that IRS did not mark all accounts or W-2s. Action Code 501: closed identity theft cases initiated by a taxpayer. Action Code 506: closed identity theft cases initiated by IRS. Action Code 524: deceased taxpayer. It prevents the use of a deceased taxpayer's identity on a federal income tax return. Action Code 525: mismatch between the identity listed on the W-2 and on the tax return. These are cases where returns filed with an Individual Taxpayer Identification Number include a W-2 with an SSN belonging to another person. Individuals with three or more W-2s for the same period. More than a million individuals with three or more wage records did not declare at least one W-2. Additionally, we found that, in general, the more W-2s an individual had, the less likely it was that all of them would be reported to IRS (see figure 2). For instance, individuals with three W-2s declared all of them 68 percent of time, while individuals with seven declared all of them 29 percent of the time. Using its enforcement tools, IRS identified some of these individuals with three or more W-2s. Of the 1.25 million individuals in our analysis with three or more wage records who did not include all W-2s in tax year 2016, about 600,000 had wages totaling more than $23,200, meaning that they were required to file a tax return. Of these, about 340,000 individuals had at least one of the seven IDT-related indicators or were pursued through AUR or Nonfiler. In addition, IRS pursued—with AUR or Nonfiler—about half of the nearly 100 individuals who had 50 or more W- 2s reported by employers for 2016. In addition, approximately 9,000 individuals with wages totaling more than $23,200 and that did not include all W-2s in tax year 2016 also lived in five or more states (see figure 3 for an illustrative example). Deceased individuals. IRS did not apply IDT-related indicators to some of the accounts of deceased individuals we identified as having employer-reported wages not included on a tax return. Out of the 11,573 deceased individuals who reported earned income, we identified nearly 2,627 who earned at least $23,200, a threshold requiring the filing of a tax return. Of these, about 2,441 had at least one of the seven IDT-related indicators or were pursued under IRS’s AUR or Nonfiler enforcement programs. However, there were still 186 individuals that IRS did not identify. Elderly. Out of the 19,460 elderly individuals who reported earned income, we identified nearly 3,800 who earned enough to be required to file a tax return. Of these, about 1,700 had at least one out of the seven IDT-related indicators on their account or were pursued under IRS’s AUR or Nonfiler enforcement programs. However, there were still about 2,100 individuals that IRS did not identify. Children. For tax year 2016, individuals under age 14 were only required to file taxes if they earned more than $7,850. However, nearly 1,900 met this filing threshold and failed to include at least one W-2 on their tax returns. Of these, nearly 1,000 had at least one of the seven IDT-related indicators applied to their account by IRS or were pursued under IRS’s AUR or Nonfiler enforcement programs. However, there were still about 900 individuals that IRS did not identify. In considering employment-related identity fraud, IRS focuses on only one of the seven IDT-related indicators. Specifically, IRS considers mismatches between the identity listed on the W-2 and the identity on the tax return as a type of employment-related identify fraud. IRS does not consider other characteristics, such as individuals with multiple wage records, in its checks for employment-related identity fraud. Doing so would require the development of new codes or the modifications of existing ones. According to the Fraud Risk Framework, two leading practices for managing fraud risks include (1) identifying specific tools, methods, and sources for gathering information; and (2) designing and implementing control activities such as data-analytics activities to prevent and detect fraud. IRS addressed these leading practices, in part, through the AUR program, Nonfiler program, and seven IDT-related indicators, but there were still individuals in the population we examined that IRS did not identify. By assessing and documenting the feasibility of incorporating additional checks—such as multiple wage records or wage records for children under 14—into its checks of employment-related identity fraud, IRS may be able to develop a method for identifying additional taxpayers at risk of this type of fraud. IRS officials stated that employment-related identity fraud has limited tax consequences, as employees will nonetheless pay required taxes— including federal, state, and payroll taxes—through payroll withholding even if the fraudster fails to file a tax return. However, we found that federal income tax withholding was lower for SSNs that did not declare all the W-2s than for SSNs with all W-2s reported (see table 4). Additionally, we found individuals who did not withhold any federal income taxes across all of their related W-2s in 2016. Specifically, 37,868 individuals had at least one W-2 not declared on a tax return and withheld no federal income tax over the course of the year. Together, these individuals earned approximately $340 million in 2016. Further, 18 W-2s that were not reported on a tax return showed wages earned of more than $100,000 yet had $0 of federal income tax withheld (see figure 4 for example). Of the indicators IRS uses to track IDT, the only action code that directly relates to employment is Action Code 525, “Employment-related Identity Theft.” IRS applies the code to a taxpayer’s account when IRS processes a return filed by an individual with an Individual Taxpayer Identification Number (ITIN), and the return includes a W-2 with an SSN that does not belong to the person identified on the ITIN return. IRS refers to this situation as an ITIN/SSN mismatch. In 2018, IRS marked 818,097 accounts with Action Code 525. IRS officials acknowledged that forms of employment-related identity fraud, other than that captured by Action Code 525, are likely, but they said they do not systematically track these situations for several reasons. First, unless a taxpayer contacts IRS to say he or she did not earn the wages and disclaims them, the agency does not know whether a suspected case is employment-related identity fraud or someone who may not have included legitimate wages on his or her tax return. Second, IRS may be unable to distinguish between employment-related identity fraud and fabricated W-2s for jobs that were not worked (i.e., fake employees of a fake business). Third, while our analysis shows that employment-related identity fraud may be a more widespread problem than the ITIN/SSN mismatch that IRS currently tracks, IRS officials told us that other types of employment-related identity fraud would be identified and addressed through processes the agency applies broadly to all taxpayers, such as the AUR or Nonfiler programs. For example, according to IRS officials, if IRS receives a fraudulent W-2 from an employer using a legitimate taxpayer’s SSN, AUR or the Nonfiler program will detect it as IRS matches W-2s with tax returns. However, our analysis of NDNH and IRS data described earlier in this report shows that there are potential cases that these IRS enforcement programs did not identify. Standards for Internal Control in the Federal Government states that management should use quality information that is appropriate and complete to achieve the entity’s objectives, and that it should communicate quality information externally. However, our analysis of SSNs at risk of employment-related identify fraud indicates that the count of cases that IRS identifies under Action Code 525 likely understates the universe of employment-related identity fraud. By modifying the title of its employment-related IDT action code to more accurately reflect the data covered by the code, IRS can ensure that the agency is appropriately conveying the risk this specific type of employment-related identity fraud poses both to victims and tax administration without suggesting its statistics cover other types of employment-related identity fraud. As illustrated in figure 5, SSA analyzes W-2s to detect inaccuracies. For W-2s determined to be accurate, SSA adds wages to the individual’s record on the Master Earnings File, a database that SSA uses to determine an individual’s eligibility for Social Security benefits and the amount of benefits paid. For W-2s determined to be inaccurate, SSA posts the wage information to the Earnings Suspense File. Inaccurate W- 2s may be attributable to various reasons, including employment-related identity fraud or administrative errors. SSA receives hundreds of millions of W-2s each year. SSA analyzes incoming W-2s to detect inaccuracies and adds inaccurate W-2s to the Earnings Suspense File. Based on SSA data from tax year 2016, SSA added millions of W-2s to the Earning Suspense File. On a daily basis, SSA electronically forwards IRS W-2s that it has analyzed, including both accurate and inaccurate W-2s. SSA monitors the effectiveness of its checks for inaccurate W-2s by testing its software prior to the filing season. Prior to each filing season, SSA creates test data that have characteristics of inaccurate W-2s. SSA then processes these data through the annual wage reporting software to ensure automated checks identify potentially inaccurate W-2s according to SSA’s criteria. SSA also has an electronic reporting system in place that SSA employees can use to identify and document problems for management throughout the year. SSA officials told us they have not identified any problems that have prevented checks from working as intended. This public report omits information that SSA has deemed sensitive related to (1) SSA’s efforts to improve W-2 accuracy checks, and (2) SSA’s challenges in addressing risks associated with employment-related identity fraud. SSA is taking steps to more effectively communicate to both victims and employers information on potentially inaccurate W-2s, including potential employment-related identity fraud W-2s. When SSA detects a potentially inaccurate W-2, SSA may send a letter to the employer or employee listed on the W-2 that notifies them of the potential inaccuracy. SSA first sends letters to employers. Responses can help SSA resolve inaccuracies by identifying correct wage earners. Responses can also support SSA’s efforts to provide taxpayers with correct benefits. SSA sends different letters to employees and employers depending on the type of potential inaccuracy detected: Mismatched name and SSN. In March 2019, SSA resumed sending Educational Correspondence (EDCOR) letters to employers who submitted W-2s electronically, notifying them of the number of W-2s they electronically submitted with mismatched names and SSNs. The letters request that employers use SSA’s Business Services Online portal to view specific names and SSNs that did not match and provide necessary Form W-2C corrections. According to SSA, EDCOR letters are meant to educate employers about mismatches and help SSA post wages to correct earnings records. SSA officials told us that SSA had mailed about 577,000 EDCOR letters for electronically submitted W-2s as of June 2019 since resuming the process. Officials said the agency also began sending EDCOR letters for W-2s submitted on paper beginning in October 2019. SSA previously sent EDCOR notices from 1994 through 2007, but SSA stopped sending these notices in response to litigation surrounding a proposed DHS regulation that would have required employers to follow a prescribed course of action upon learning of an employee name or SSN mismatch. DHS rescinded its proposed rule in October 2009. SSA officials told us the agency decided to resume sending EDCOR notices in 2019 because employers are using Business Services Online to file more W-2s electronically. Therefore, employers may be more familiar with the system used to submit W-2C corrections. SSA has taken action to improve the effectiveness of EDCOR letters since the letters were discontinued in 2007. In 2008, the SSA OIG reported that EDCOR letters were not effective in either communicating wage-reporting problems to employers or identifying correct wage earners. For example, the OIG found that 74 percent of employers who reported W-2s with mismatched names and SSNs did not receive letters. Most employers that did not receive letters submitted 10 or fewer mismatched W-2s whereas SSA only sent letters to employers that submitted more than 10 mismatched W-2s. SSA officials told us that EDCOR letters sent beginning in 2019 are sent to every employer who submits a W-2 with a mismatched name and SSN. Disclaimed wages. When an individual disclaims wages, SSA staff have the option of sending a letter to the employer who paid the wages to attempt to identify the wage earner. In 2008, the SSA OIG found that SSA seldom sent letters to employers, and recommended that SSA consider generating a standard, annual letter to each employer that submitted a W-2, which was later disclaimed. SSA officials told us that, as of May 2019, SSA staff in all SSA region offices routinely send letters to employers notifying them of disclaimed wages. SSA officials reported the agency sent 20,945 letters in fiscal year 2018. IRS uses relevant information to detect inaccurate W-2s, including potentially fraudulent W-2s, and makes this information available to relevant enforcement programs, including Nonfiler, which IRS uses to follow up with individuals who appear to owe taxes but have not filed. IRS detects inaccurate W-2s using the results of SSA’s annual wage reporting checks and its own efforts to reconcile and correct some inaccuracies. As part of this process, IRS receives Earnings Suspense File W-2s that have mismatched names and SSNs from SSA and attempts to locate the wage earner’s correct name and SSN. IRS does so by identifying previously filed tax returns that list the same address as the mismatched W-2s. IRS then compares the names and SSNs listed on W- 2s to those on the tax returns to identify accurate name and SSN combinations. Accurate and inaccurate W-2s are then made accessible to IRS enforcement programs, including Nonfiler. Nonfiler and other programs that support IRS’s efforts to collect taxes owed from wage earners, including potential employment fraudsters, also may deter fraudulent activity by reducing the likelihood fraudsters succeed in not paying taxes owed. In reviewing IRS actions that may help deter employment-related identity fraud, we found that Nonfiler uses W-2 information to identify and follow up with individuals who appear to owe taxes but did not file required returns. However, we also found that IRS’s use of Nonfiler to collect taxes owed by potential employment fraudsters is limited. Nonfiler is capable of addressing cases involving certain types of employment-related identity fraudsters who appear to owe taxes—specifically fraudsters for whom IRS receives W-2s that have mismatched names and SSNs as well as SSNs associated with deceased persons or children. However, the agency has made limited use of Nonfiler to collect taxes owed on such cases and faces the following resource challenges in doing so: Reduced staffing capacity. IRS determines the number of noncompliance cases pursued by its enforcement programs based on available resources. IRS’s budget declined by about $2.1 billion (15.7 percent) from fiscal years 2011 through 2018 after adjusting for inflation, and corresponding staff reductions have been most significant within IRS enforcement programs, such as Nonfiler. In 2018, the Treasury Inspector General for Tax Administration (TIGTA) reported that resource constraints have left IRS with fewer resources to work cases involving individuals who do not respond to nonfiler notices. For example, TIGTA found that IRS created 430,000 new compliance cases in fiscal year 2017 involving individuals who did not respond to nonfiler notices compared to 1.6 million in fiscal year 2013. Competing priorities. IRS is focusing its resources on modernizing its information technology systems and implementing Public Law 115- 97—commonly referred to as the Tax Cuts and Jobs Act. This law was enacted in December 2017 and included significant changes to corporate and individual tax law. Costly follow-up contacts. According to IRS officials, collecting taxes owed by employment-related identity fraudsters typically requires IRS staff to make in-person contact with taxpayers by locating them at their places of work, which is resource intensive. According to IRS, in-person contact is typically required because employment fraudsters are unlikely to provide employers and IRS accurate address information on W-2s; therefore IRS often lacks information needed to reach employment fraudsters through mailed Nonfiler notices. To help reduce the number of nonfilers and underreporters, IRS uses the Withholding Compliance Program (WHC) to pre-emptively identify taxpayers who appear to be substantially underwithholding taxes based on prior year W-2 and other information. Through this program, IRS issues “lock-in letters” to employers of individuals who appear to be underwithholding. Lock-in letters require employers to adjust employees’ withholding amounts to rates specified by IRS rather than the employees. IRS adjusts withholding rates based on the number of withholding allowances IRS determines the taxpayer is entitled to claim. Employees are also sent lock-in letters informing them of changes to their withholding rates. WHC may be a more cost-effective opportunity than Nonfiler for IRS to collect appropriate taxes from those employment-related identity fraudsters who do not otherwise file returns and pay taxes owed. First, WHC lock-in letters would be more likely to reach their intended recipients, making them potentially more effective in obtaining their intended responses. IRS sends lock-in letters to employers, and IRS officials said the agency typically has accurate address information for employers. IRS also sends notices to employees affected by lock-in letters, but these letters do not request or require taxpayer action. Second, businesses that employ employment-related identity fraudsters may be more likely to comply with lock-in letters than fraudsters would to Nonfiler notices. According to a 2018 TIGTA report, compliance with lock- in letters could further be improved if IRS took action against employers who do not comply with the letters and adjust employees’ withholdings accordingly. TIGTA recommended that IRS penalize employers who do not respond. IRS has agreed to consider penalties, and officials told us the agency is evaluating opportunities to do so. Third, we have previously reported that IRS is less likely to collect taxes owed the longer it takes IRS to contact taxpayers. Therefore, it is likely more effective for IRS to use WHC to address potential tax liabilities before they accrue, rather than use Nonfiler to assess and attempt to contact fraudsters and collect taxes owed months after filing deadlines have passed. According to IRS officials, WHC issues lock-in letters to address underwithholding by some employees who use matching names and SSNs; however, the program does not issue lock-in letters for cases involving W-2s with mismatched names and SSNs because of privacy concerns. IRS officials said the agency has an obligation to protect all taxpayers, including potential employment-related identity fraudsters. IRS officials told us that IRS previously sent lock-in letters for cases involving mismatched names and SSNs but stopped in 2012 because the agency wanted to avoid potentially disclosing an employment-related identity fraudster’s identifying information, such as the names of their employers, to those individuals whose SSNs were used to commit employment fraud. However, IRS could also redact personally identifiable information in the lock-in letters as it already does this when mailing tax return transcripts. For example, in response to data privacy concerns, in September 2018 IRS began including just the first four characters of business names on tax return transcripts requested by taxpayers. This approach could also be used for sending lock-in letters to employees to reduce disclosures of personally identifiable information in instances where lock-in letters do not reach their intended recipients. IRS officials told us that WHC’s limited resources prevent the program from addressing all underwithholding cases currently identified by the program. Officials also said that, for that reason, expanding WHC to include cases with mismatched names and SSNs would not result in WHC selecting additional cases. However, by not including cases with mismatched names and SSNs, IRS may be missing an opportunity to identify and select a population of underwithholding cases that could lead to greater revenue collection. This is because some cases with mismatched names and SSNs may have greater underwithholding than those cases that are currently selected by WHC. If IRS were able to allocate more resources toward generating additional lock-in letters in the future, these potential benefits could also increase. In addition, WHC may be more affordable than other enforcement programs to administer on a case-by-case basis because unlike enforcement cases initiated through Nonfiler, WHC does not result in IRS pursuing taxpayers through progressively more costly methods of contact to collect additional revenue. IRS officials acknowledged this possibility and told us the agency has not assessed the potential costs and benefits of expanding WHC to include cases with mismatched names and SSNs. Internal control standards state that federal managers should use quality information to achieve their objectives, communicate relevant information throughout the agency, and both assess and address risks to their mission. Additionally, leading practices in managing fraud risks include considering the benefits and costs of controls for addressing fraud-related risks. Further, IRS’s Strategic Plan has goals to use data analytics to inform decision making and protect the integrity of the tax system. Because IRS has not evaluated and documented the costs and benefits of expanding WHC to address risks posed by employment-related identity fraudsters, the agency cannot determine whether or not expanding WHC to include mismatch cases would enable IRS to collect additional revenue and deter employment fraud. By conducting such an assessment, IRS could determine whether expanding WHC to include mismatch cases would likely enable IRS to collect additional revenue and deter employment fraud. To manage the impacts of employment-related identity fraud on victims, IRS limits the circumstances under which these victims may be selected by enforcement programs. In analyzing IRS data, we found about 3 million taxpayers who have either been identified as “employment-related identity theft” victims by IRS (Action Code 525) or who have identified themselves as victims to IRS (Action Code 501). Automated Underreporter (AUR) programming prevents these taxpayers from being selected due to wage discrepancies. Instead, AUR analyzes these taxpayers for reporting discrepancies for other income types, such as investment income. IRS officials told us excluding these taxpayers from AUR’s W-2 checks helps IRS avoid burdening some victims who may be otherwise selected based on wages earned by a fraudster using the taxpayers’ name and SSN. Selected victims would be required to follow up with IRS to avoid being assessed tax liabilities. Following up would be particularly burdensome for victims whose names and SSNs are used by fraudsters year after year. Taxpayers with IDT action codes on their accounts are eligible for analysis and selection by other enforcement programs based on discrepancies in W-2 reporting; however, these programs’ low selection rates suggest that it is unlikely IRS will follow up with these victims and notify them of these discrepancies. For example, although Nonfiler analyzes these taxpayers for evidence of income indicating a filing requirement, TIGTA found that IRS notified just 25,105 or 14 percent of all 179,878 nonfiler cases identified in fiscal year 2016 of these discrepancies. Likewise, although IDT victims may be selected for examination, IRS data show that the agency examined about 892,000 or 0.6 percent of all individual income tax returns in fiscal year 2018, the most recent year for which data are available. IRS officials acknowledge that some of the approximately three million taxpayers with Action Codes 501 or 525 may underreport their own incomes, and excluding these taxpayers from AUR’s W-2 discrepancy checks creates an enforcement gap, enabling some victims who actually underreported their own wages to avoid enforcement. IRS does not know how many of these taxpayers have underreported wage income. However, some IDT victims excluded from AUR’s wage discrepancy checks may be incentivized to underreport wages and pay less tax than they owe if they learn IRS is unlikely to hold them accountable for paying those taxes. Individuals could learn about this enforcement gap, for example, if they accidentally failed to report wages from an employer and were not later contacted by IRS. In addition other taxpayers may be incentivized to falsely claim they are IDT victims to take advantage of this enforcement gap. In its research into behavioral insights, IRS has found that taxpayers are more likely to be noncompliant when they perceive doing so can yield substantial benefits with minimal costs. We have also previously reported that the extent to which taxpayers misreport income closely aligns with IRS’s ability to detect such noncompliance. In some instances, IRS has information needed to distinguish wages earned by legitimate taxpayers from those potentially earned by employment-related identity fraudsters using that same taxpayer’s name and SSN. For example, IRS can reasonably conclude the legitimate taxpayer earned the wages if they are reported on a current- or prior-year return filed by the taxpayer, as this indicates the taxpayer attests to having worked for the employer who paid the wages. Because IRS excludes IDT victims from AUR’s W-2 discrepancy checks, IRS may not identify or collect taxes owed by some who unintentionally underreport their wages (e.g., by forgetting to include a W-2 from a second employer). In addition, IRS is missing an opportunity to incentivize taxpayers to accurately report their income and avoid intentional underreporting. As previously stated, federal internal control standards call for managers to both use quality information and respond to risks. According to IRS officials, modifying AUR to effectively identify the underreporting of wages actually earned by identity theft victims would require IRS to not only adjust AUR to include wage discrepancy checks for these taxpayers but also to change how AUR identifies wage discrepancies. IRS officials told us that when AUR evaluates a taxpayer’s wage information for discrepancies, the program evaluates taxpayers based on aggregated W- 2 information. AUR is not programmed to evaluate taxpayers by analyzing some of their W-2s but not others, such as potential employment fraud W- 2s. IRS officials told us modifying AUR to include W-2 discrepancy checks of these taxpayers while excluding potentially fraudulent W-2s would not be a cost-effective use of IRS resources at this time. Specifically, officials noted that AUR discrepancy checks are programmed in the legacy assembly language code, a low-level computer language initially used in the 1950s. Although they were unable to provide an estimate for the costs of modifying this code, IRS officials said the effort would be resource intensive. IRS is modernizing outdated information technology systems, and officials said it would be more cost effective for the agency to modify W-2 discrepancy checks once the assembly language is replaced. IRS plans to retire 75 percent of the agency’s legacy assembly language code and Common Business-Oriented Language code legacy by the end of fiscal year 2024. Officials told us the agency does not have a specific timeline in place for updating the assembly code that supports AUR, though doing so is a program goal. Modifying AUR to include wage discrepancy checks for IDT victims as part of IRS’s broader effort to update AUR’s programming code would enable IRS to avoid making costly and redundant changes to legacy coding that IRS plans to replace. It would also be consistent with a goal outlined in IRS’s Strategic Plan to advance the use of data and analytics to inform decision making and could potentially result in IRS collecting additional revenue by enabling IRS to analyze wage information for about three million additional taxpayers to identify any wage reporting discrepancies. Some of these taxpayers may have greater revenue collection potential than cases AUR would otherwise select. SSA and IRS both have responsibility for parts of the Combined Annual Wage Reporting (CAWR) process to exchange W-2 information between the two agencies and to help ensure that taxpayers report and pay the proper amount of taxes on their wages. The CAWR Memorandum of Understanding (MOU), which was signed in 2007, is a key part of their collaborative effort, and SSA and IRS are legally bound to the mutually agreed upon purpose and functions. Specifically, the CAWR MOU covers the collaborative processes through which SSA and IRS share earnings information, including establishing clear roles and responsibilities for this effort, as called for by leading practices for inter- agency collaboration. IRS oversees tax administration, including ensuring compliance with tax laws. SSA acts as an agent to these activities by processing W-2s. As illustrated in figure 6, processes covered by the CAWR MOU include SSA sending accurate and inaccurate W-2s to IRS. Also, if wages are disclaimed through IRS, or IRS is able to correct a Social Security number-name mismatch using tax information, IRS sends this information to SSA. Federal law requires the Commissioner of Social Security and the Secretary of the Treasury to share W-2 information, and permits use of the CAWR MOU to effectuate this process. It also requires that the MOU remain in full force and in effect until modified or otherwise changed by mutual agreement of the heads of each agency. SSA and IRS have taken steps to update the 2007 CAWR MOU, but the effort has been underway for more than 3 years. As we reported in September 2012, continually updating agreements is an important part of the leading practice for written guidance and agreements. SSA and IRS officials told us that discussions about the update began in 2012 and the substantive work of updating the MOU began in August 2016. Since the MOU has not been updated in more than a decade, certain data-exchange materials and provisions in the MOU have become outdated, such as the references to microfilm. According to SSA and IRS officials, the MOU update has been driven by efforts at the staff level with executives briefed on the status. We have previously found that leadership involvement in collaborative efforts is needed to overcome the many barriers to working across agency boundaries. SSA officials noted that having highly involved executives would indicate problems with the MOU update process. IRS officials said that the staff level is the appropriate place to negotiate the MOU update with oversight from executives, as needed. However, at both agencies, officials at the staff level do not have the authority to agree to any updates or modifications of the MOU. SSA and IRS are responsible for ensuring the MOU update process is thorough, complete, and carried out in a timely manner. SSA and IRS officials stated that while the MOU is the cornerstone of SSA-IRS collaboration, completing the update is challenging because there are competing priorities. Additionally, the agencies are not legally required to update the MOU; instead, the MOU is in effect until modified or otherwise changed by mutual agreement of the Commissioner of Social Security and the Secretary of the Treasury (who delegated this authority to the Commissioner of Internal Revenue). In September 2019, SSA and IRS officials told us they plan to complete the update of the MOU in spring 2020, more than 3-and-a-half years after the effort to update the MOU began. Standards for project management call for developing a plan with specific actions and time frames. A plan could also identify the resources, processes, and individuals necessary to carry out the update. SSA and IRS officials acknowledged that they did not develop such a plan for the ongoing effort to update the MOU. By developing a plan for future updates that includes actions, time frames, and responsible individuals, including executive leadership, SSA and IRS would have greater assurance that the MOU would be updated when needed. While SSA and IRS have established joint functions in the CAWR MOU, the agencies do not have shared goals and performance measures to help track progress in implementing these functions and identify potential improvements. As we reported in September 2012, defining short- and long-term outcomes is an important part of the leading practice for outcomes and accountability for collaborative efforts. This includes defining and articulating common goals based on what the group shared in common and developing mechanisms, such as performance goals and measures, to evaluate the results. SSA officials said existing goals and measures in the MOU were sufficiently effective. However, we did not find evidence of goals and measures in the MOU and neither SSA nor IRS officials could provide documentation of specific examples of such. Establishing shared goals and performance measures for the CAWR MOU functions would help SSA and IRS monitor and evaluate its results, as well as identify potential weaknesses and potential improvements. While the MOU lacks goals and measures, it does contain provisions for the agencies to conduct annual studies of the CAWR process and to submit a report to each commissioner on the results. However, the agencies have not consistently implemented these provisions. Monitoring progress is an important part of the leading practice for outcomes and accountability for collaborative efforts. Continually monitoring agreements is an important part of the leading practice for written guidance and agreements. For SSA and IRS, this means monitoring progress toward fulfilling their legal obligation to implement the CAWR MOU. In the 2007 CAWR MOU, SSA and IRS agreed to the following monitoring provisions related to conducting an annual review of the CAWR process. Conduct annual joint studies of the CAWR process. Since the MOU was implemented in 2007, IRS and SSA have not conducted a joint study of the CAWR process. These reviews were intended to assist the required annual review of the MOU and help inform the agencies of potential improvements to the CAWR process. Specifically, the MOU requires that upon completion of the annual review, a joint SSA and IRS report should be sent to each commissioner consisting of the results of the review, a list of any changes that have occurred in the process, and any recommendation for changes. This is intended to serve as an important monitoring function for the MOU. IRS officials said the agencies have been unable to conduct annual joint studies or submit the required annual reports primarily because the MOU is extensive and affects many offices at both agencies. SSA and IRS officials said that they plan to change to a biannual interagency review of the MOU so they can do a better job of keeping the MOU updated and relevant. However, officials did not provide information about any steps they plan to take to ensure that the reviews would occur as required. According to SSA officials, SSA and IRS plan to meet every 3 or 6 months to review existing agreements, including the CAWR MOU. This may be a means of identifying necessary changes to the CAWR process since regular communication can facilitate effective collaboration; however, officials did not provide additional details on these potential new meetings. Conduct annual independent studies of the CAWR process. SSA had no records that it had conducted an independent study of the process in the past 3 years. IRS conducted two independent studies in 2018 on the CAWR process which primarily focused on IRS’s adherence to its policy guidance. Annual independent studies were intended to serve as another feedback mechanism to assist in the review of the MOU. According to SSA and IRS officials, they have not implemented these monitoring provisions because of resource constraints. As previously discussed, the agencies are updating the CAWR MOU and plan to finalize the updated MOU by spring 2020. Officials told us that, similar to the 2007 MOU, the updated MOU will include requirements for periodically reviewing the MOU to identify potential improvements to the CAWR process. However, the time frames may change. Developing and documenting a strategy for implementing the monitoring provisions in the updated MOU would provide greater assurance that SSA and IRS are periodically assessing the CAWR process and identifying opportunities for improvement, as required. As we reported in September 2012, agreeing on common terminology and definitions is an important part of bridging organizational cultures. One way to operate across agency boundaries is to foster open lines of communication. SSA and IRS do this by holding interagency meetings, including quarterly executive-level and monthly technical-level meetings. In addition, officials from SSA and IRS said that the agencies have a strong working relationship and that officials at both agencies have frequent informal communication. The agencies also established a fraud working group, which held introductory meetings in 2018 and 2019. While the group does not have a formal mission statement, the general scope of responsibility for the group is to identify areas of common interest related to mitigating fraud and to collaborating on best practices and efforts to mitigate fraud risks. However, SSA and IRS have developed limited common terminology and definitions related to their CAWR collaboration effort. The agencies have agreed on 10 definitions in their MOU, but these definitions are very limited in scope; for example, two of these definitions simply spell out the agency names and none of the definitions are for the 20 data variables the agencies exchange daily. Both SSA and IRS officials stated that common terminology related to identity fraud would be helpful, and acknowledged that they use different terminology and have to call each other to ask what different terms mean. SSA officials cited the use of different terminology at SSA and IRS as a barrier to collaboration. Because of the absence of common terminology, IRS has been unaware of information it receives from SSA in some cases. For example, through the common format record exchange, SSA shares information with IRS about why SSA determined that a W-2 is inaccurate, but IRS was unaware of this information. SSA told us that it sends a table to IRS annually that includes code combinations for their data transfers and their meanings which explain why the W-2 was accurate or inaccurate. However, SSA officials were unsure of the extent to which IRS officials understood the codes. One reason that SSA determines a W-2 is inaccurate is if earnings with the same name, SSN, and EIN were disclaimed in previous years. SSA communicates this to IRS using codes within the W-2 record that are labeled “invalid due to SWED.” However, SSA and IRS have not defined “SWED” and IRS officials said that they were unaware of receiving information from SSA about previously disclaimed wages. Officials said they interpreted the information to relate to invalid wages due to name and SSN mismatches and spent time trying to resolve the mismatch issue. They said that such information could be useful for future enforcement efforts. Further, IRS officials said that they were also unaware of other code combinations that SSA officials told us they use to inform IRS about accurate and inaccurate wages. IRS attributed its unfamiliarity with the data elements coming from SSA to staff turnover since key IRS officials who were familiar with the data elements retired. However, IRS could have been aware of the meaning of the variables if the agencies had established and documented common definitions for these data elements. In addition, according to IRS officials, they have limited resources for following up on information that SSA is sharing because they have been focused on competing priorities, including implementing the Tax Cuts and Jobs Act of 2017. SSA and IRS officials noted that the next version of the MOU will define additional terminology that was not defined in previous MOU documents. For example, officials said that “EIN” and “TIN” are key IRS terminology that may be defined in the new MOU. Until SSA and IRS clearly define the data elements they exchange as part of the CAWR process, SSA and IRS are at risk of not communicating effectively about CAWR and, thus, missing opportunities to use data more effectively to identify fraudulent or otherwise inaccurate W-2s. This could be done, for example, by developing a shared data dictionary that clearly defines all of the data elements the agencies are exchanging. Employment-related identity fraud can have negative impacts on victims and poses risks to both SSA and IRS. Victims may face IRS enforcement actions or a reduction in benefits for some federal programs based on wages earned by fraudsters. The full scope of this fraud is unknown. In 2018, IRS marked more than 800,000 taxpayer accounts with Action Code 525 “employment-related identity theft.” However, IRS’s use of the term “employment-related identity theft” likely understates the true scope and impact of this type of fraud and may be misleading to both agency decision makers and Congress. Additionally, by assessing the feasibility of incorporating additional compliance checks into its checks of employment-related identity fraud, IRS may be able to develop a method for identifying additional taxpayers at risk of this type of fraud. SSA and IRS rely on accurate W-2 information to carry out their missions and have taken steps to detect the submission of fraudulent W-2s. Evaluating the costs and benefits of expanding IRS’s Withholding Compliance Program (WHC) to include cases with mismatched names and SSNs may provide IRS an opportunity to increase revenue collection. Additionally, while IRS has taken steps to manage the impacts of identity fraud on victims, the agency’s decision to exclude approximately 3 million individuals with IDT action codes from Automated Underreporter’s (AUR) wage discrepancy checks has resulted in a gap in enforcement coverage. IRS plans to update most of the agency’s legacy programming code by the end of fiscal year 2024. Updating AUR’s programming to include these individuals would enable IRS to close this enforcement gap and potentially increase revenue. Further, SSA and IRS’s 2007 CAWR MOU plays an important role in IRS and SSA’s efforts to accurately report wage information and resolve mismatches. While the agencies expect to finalize their first update of the MOU by spring 2020, efforts to update the MOU have been ongoing for more than 3 years. Developing a plan for implementing future updates would provide greater assurance that the MOU would be updated when needed. Additionally, developing performance goals and measures for the MOU as well as a strategy for assuring the studies called for by the MOU are completed within the specified time frames would help ensure that SSA and IRS are periodically assessing the CAWR process, and identifying opportunities for improvement. Moreover, by clearly defining the data elements IRS and SSA exchange as part of the CAWR process, the agencies would be better positioned to effectively use the data to identify fraudulent or otherwise inaccurate W-2s. We are making a total of 12 recommendations, including eight to IRS and four to SSA. The Commissioner of Internal Revenue should modify the title of IRS’s employment-related identity theft action code 525 to reflect the type of employment-related identity fraud encompassed by this action code. (Recommendation 1) The Commissioner of Internal Revenue should assess and document the feasibility of incorporating additional checks into its automated checks of employment-related identity fraud for populations at risk of employment- related identity fraud, such as children, elderly, deceased persons, and individuals associated with multiple wage records. (Recommendation 2) The Commissioner of Internal Revenue should assess and document the costs and benefits of using WHC to address compliance risks posed by potential employment-related identity fraudsters who owe taxes and take appropriate action, as needed. (Recommendation 3) The Commissioner of Internal Revenue should modify AUR to include wage discrepancy checks for victims of employment-related identity fraud once IRS has updated AUR’s legacy programming code. (Recommendation 4) The Commissioner of Internal Revenue should, in collaboration with the Commissioner of Social Security, develop and document a plan for updating future CAWR MOUs. The plan should identify actions, time frames, and responsible parties, including executive leadership. (Recommendation 5) The Commissioner of Internal Revenue should, in collaboration with the Commissioner of Social Security, develop and implement goals and performance measures for the CAWR MOU. (Recommendation 6) The Commissioner of Internal Revenue should, in collaboration with the Commissioner of Social Security, develop and document a strategy for assuring that the reviews required by the updated MOU are completed within the specified time frames. (Recommendation 7) The Commissioner of Internal Revenue should, in collaboration with the Commissioner of Social Security, clearly define data elements they exchange with SSA. (Recommendation 8) The Commissioner of Social Security should, in collaboration with the Commissioner of Internal Revenue, develop and document a plan for updating future CAWR MOUs. The plan should identify actions, time frames, and responsible parties, including executive leadership. (Recommendation 9) The Commissioner of Social Security should, in collaboration with the Commissioner of Internal Revenue, develop and implement goals and performance measures for the CAWR MOU. (Recommendation 10) The Commissioner of Social Security should, in collaboration with the Commissioner of Internal Revenue, develop and document a strategy for assuring that the reviews required by the updated MOU are completed within the specified time frames. (Recommendation 11) The Commissioner of Social Security should, in collaboration with the Commissioner of Internal Revenue, clearly define the data elements they exchange with IRS. (Recommendation 12) We provided a draft of the sensitive version of this report to IRS, SSA, the Federal Trade Commission, the Department of Health and Human Services, and the Department of Homeland Security for comment. In comments reproduced in appendix II, IRS neither agreed nor disagreed with the recommendations. In comments reproduced in appendix III, SSA agreed with the recommendations and noted that SSA and IRS officials are meeting on a recurring basis to complete an updated memorandum of understanding. IRS, SSA, the Department of Homeland Security, and the Federal Trade Commission provided technical comments which were incorporated as appropriate. The Department of Health and Human Services had no comments on the report. We are sending copies of this report to the appropriate congressional committees, the Commissioner of Internal Revenue, Commissioner of Social Security, Chairman of the Federal Trade Commission, Secretary of Health and Human Services, Acting Secretary of Homeland Security, Secretary of the Treasury, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov If you or your staff have any questions about this report, please contact Jessica Lucas-Judy at (202) 512-9110 or LucasJudyJ@gao.gov, or Rebecca Shea at (202) 512-6722 or SheaR@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the potential scope of employment-related identity fraud, including what the Internal Revenue Service (IRS) knows about this type of fraud and what we could determine by analyzing the Department of Health and Human Services’ National Directory of New Hires (NDNH) and IRS data; (2) Social Security Administration (SSA) actions to detect and deter this fraud as well as notify victims; (3) IRS actions to detect and deter this fraud as well as notify victims; and (4) the extent to which SSA and IRS are collaborating to address the issue. To describe and analyze the potential scope of employment-related identity fraud, we took the following steps: 1. Identified groups at risk of identity theft. We first reviewed Treasury Inspector General for Tax Administration, SSA Office of the Inspector General, and our prior reports on Social Security number (SSN) misuse to determine common characteristics of individuals who are at risk of SSN misuse. These characteristics include being deceased, elderly, a child, or having three or more wage records during the 3-month period of our review. Based on these reports, we defined “elderly” as over age 84 and “children” as under age 14 for the purposes of this review. 2. Identified SSNs at risk of SSN misuse. We used SSA’s full death file for dates of death for deceased individuals, and its Numerical Index File (Numident) for dates of birth for living individuals.We next compared full death file and Numident data to a quarterly extract of NDNH data listing the names and SSNs of individuals who earned wages between August and October 2016. We selected data from this quarter because, at the time of our review, these were the oldest data for which relevant IRS tax data were also available. We used this comparison to identify individuals employed between August and October 2016 who also met at least one of these at-risk characteristics. NDNH is a database of individuals employed in the United States. Data are collected and reported by state workforce agencies and federal agencies, and the database is administered by the Department of Health and Human Services’ Office of Child Support Enforcement. NDNH data are comprised of three types: verified, unverified, and unverifiable. The verified data—used in this analysis— have been checked against SSA records to confirm that the name and SSN match SSA records. Unverified data include data that do not match on name or SSN, and unverifiable data include data that did not include enough information to attempt a match (e.g., when states submit partial or missing name information). According to the Department of Health and Human Services, there were 584,013,484 verified wage records, 18,629,720 unverified, and 91,134,352 unverifiable as of December 31, 2018. Verified data were used in this analysis to make the estimate more conservative since cases of potential synthetic identity theft—where the name and SSN do not match—are excluded from verified data. NDNH is designed to assist state child support agencies in locating parents and taking appropriate, interstate actions concerning child support orders. Some authorized agencies also use NDNH data to help prevent overpayments and detect fraud. For example, IRS has access to NDNH to administer the Earned Income Tax Credit. However, IRS and SSA are not authorized to use NDNH information to detect potential employment-related identity fraud. We were authorized to use NDNH through the GAO Access and Oversight Act of 2017, Pub. L. No. 115-3, 131 Stat. 7. Form W-2, Wage and Tax Statement (W-2) was not reported on a 2016 tax return. When possible, we also limited the analysis to cases where the taxpayer had a known filing requirement. We also identified cases that were consistent with misuse of SSNs for employment-related identity fraud, rather than taxpayer noncompliance. However, we were unable to determine the total extent of taxpayer noncompliance for taxpayers included in this analysis. Our analysis is not intended to be a comprehensive effort to identify all potential cases of employment-related identity fraud. We focused our analysis on cases where matching names and SSNs were used to obtain employment. These cases pose a risk to SSA, IRS, and victims, yet little is known about these cases. 4. Analyzed tax characteristics of potential employment-related identity theft victims and other taxpayers. Last, we used CDW to analyze selected tax characteristics of both individuals we identified as having at least one employer-submitted Form W-2 that was not reported on a 2016 tax return as well as those where employer- submitted Forms W-2 were reported. For example, we analyzed data on wage withholding rates, the prevalence of selected IRS identity theft indicators on taxpayers’ accounts, and IRS enforcement actions taken against these individuals. We assessed IRS procedures against the information gathering and data analytics leading practices in the Framework for Managing Fraud Risks in Federal Programs. We did not conduct a comprehensive fraud risk assessment of the IRS enforcement programs. Our assessment was limited to the control activities surrounding employment-related identity fraud. We assessed the reliability of the full death file, Numident, NDNH quarterly wage data, and selected elements of CDW by reviewing relevant documentation, interviewing knowledgeable agency officials, and performing electronic testing to determine the validity of specific data elements in the data. We determined that the data elements used in our analysis were sufficiently reliable for the purpose of our work to describe and analyze the potential scope of employment-related identity fraud. To assess IRS and SSA actions to detect and prevent employment- related identity fraud as well as notify victims, we reviewed relevant documentation including IRS’s Internal Revenue Manual and SSA’s Policy Operations Manual System. We also interviewed knowledgeable officials from both agencies on SSA and IRS processes for detecting and preventing employment-related identity fraud and notifying victims. We compared IRS’s and SSA’s efforts to relevant federal internal control standards. We also assessed the agencies’ efforts against IRS and SSA’s respective strategic plans as well as select leading practices to combat fraud, as identified in the Framework for Managing Fraud Risks in Federal Programs. To evaluate the extent to which IRS and SSA are effectively collaborating to address employment-related identity fraud, we reviewed relevant agency documents, such as IRS and SSA’s Combined Annual Wage Reporting Memorandum of Understanding, other IRS-SSA legal agreements, meeting minutes from IRS-SSA joint meetings, and policy manuals. Because of its role with assisting victims and collecting statistics on identity theft, we interviewed agency officials from the Federal Trade Commission in addition to knowledgeable officials from IRS and SSA. Because of its role helping employers verify the identities of employees, we interviewed officials at the Department of Homeland Security. We focused our assessment on SSA and IRS because those agencies are most directly involved in the wage reporting process used to detect and resolve employment-related identity fraud. We assessed IRS and SSA’s collaboration efforts against leading practices for collaboration we have identified in our prior work and against standards for project management. We identified key elements of each leading practice and assessed the extent to which SSA and IRS collaboration on employment- related identity theft aligned with leading practices or key elements. The performance audit upon which this report is based was conducted from November 2017 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We worked with SSA from October 2019 to May 2020 to prepare this public version of the original sensitive report for public release. This public version was also prepared in accordance with these standards. In addition to the individual named above, the following staff made key contributions to this report: Neil A. Pinney (Assistant Director), Philip D. Reiff (Assistant Director), Melissa L. King (Analyst-in-Charge), Priyanka Sethi Bansal, Heather A. Collins, Ann L. Czapiewski, Celina F. Davidson, Pamela R. Davidson, Julia C. DiPonio, Shannon J. Finnegan, Steven Flint, Robert L. Gebhart, James A. Howard, Grace H. Kwon, Krista Loose, Maria C. McMullen, Kevin C. Metcalfe, J. Daniel Paulk, Lindsay W. Swenson, Sonya Vartivarian, Ariel Vega, and Miranda J. Wickham.", "summary": "Employment-related identity fraud poses risks to IRS's ability to collect taxes owed on wages and to SSA's ability to correctly calculate and manage Social Security benefits. GAO was asked to review employment-related identity fraud. This report examines (1) the potential scope of employment-related identity fraud, including what IRS knows about this type of fraud and what GAO could determine by analyzing Department of Health and Human Services' National Directory of New Hires (NDNH) and IRS data; (2) SSA and IRS actions to detect and deter this fraud as well as notify victims; and (3) SSA and IRS's collaboration on the issue. GAO analyzed 3 months of 2016 NDNH wage data and 2016 IRS taxpayer data to identify potential employment-related identity fraud. GAO also reviewed relevant IRS and SSA documentation and interviewed agency officials. This is a public version of a sensitive report that GAO issued in January 2020. Information that SSA deemed sensitive has been omitted. Employment-related identity fraud occurs when people use a name or Social Security number (SSN) other than their own to get a job. People may do this if they are not authorized to work in the United States or are trying to avoid child support payments, among other reasons. Victims may face Internal Revenue Service (IRS) enforcement actions based on wages earned by fraudsters. IRS identified more than 818,000 cases in 2018, but this included only one form of employment-related identity fraud—mismatches between the identity listed on the Form W-2, Wage and Tax Statement (W-2) and the identity on the tax return. The true scope of employment-related identity fraud is unknown. GAO reviewed additional forms of this fraud and identified 1.3 million SSNs that for 2016 had both (1) characteristics associated with employment-related identity fraud; and (2) wages reported by the employer on a W-2, but not reported by the employee on a tax return. This includes about 9,000 individuals whose employers reported W-2s in five or more states, but who did not include them all on their tax return (see figure). The Social Security Administration (SSA) processes W-2s before sending W-2 data to IRS for enforcement purposes. SSA has developed processes to detect some inaccurate W-2s and notify potential fraud victims. IRS uses W-2 information to deter some potential fraudsters, but has not assessed the costs and benefits of expanding its enforcement efforts to include certain individuals who may underwithhold taxes or not file returns. Doing so could help IRS determine if such an effort would enable the agency to collect additional revenue. SSA and IRS entered into a memorandum of understanding (MOU) to collaborate to exchange wage data. However, they have not established performance goals and measures for the MOU, implemented the MOU's monitoring provisions, or clearly defined the data elements they exchange. GAO is making 12 recommendations to IRS and SSA, including that IRS assess the feasibility of adding checks to its review of employment-related identity fraud, and assess the costs and benefits of expanding enforcement; and that both agencies improve the implementation of their MOU. SSA agreed and IRS neither agreed nor disagreed with the recommendations.", "document_type": "gao"}
{"report": "The military retirement system is a government-funded benefit system that has historically been considered a significant incentive in recruiting and retaining a voluntary, career military force. Until recently, almost all active-duty servicemembers were enrolled in the High-3 (legacy) retirement system. In this system, servicemembers who served at least 20 years earned a DB annuity. Those who were eligible earned 2.5 percentage points per year of service multiplied by the average of their highest 36 months of basic pay, with payments beginning upon retirement from the military and adjusted annually for inflation. Servicemembers also had the option to contribute a portion of their basic pay to a personal TSP account, but DOD provided no contributions. A previous GAO report found that active-duty servicemembers’ rate of reaching 20 years of service varied substantially among the military service branches (see fig. 1). For example, for active-duty servicemembers entering military service in 1992, the estimated probability of reaching 20 years of service was almost 15 percentage points higher—and more than three times higher—for the Air Force than the Marine Corps. Federal law established the Military Compensation and Retirement Modernization Commission (MCRMC) in the NDAA for Fiscal Year 2013 to study the military’s compensation system in detail and make recommendations to modernize servicemembers’ pay and benefits. The MCRMC’s final report, released in January 2015, recommended that Congress revise the military retirement system so DOD could help more servicemembers save for retirement earlier in their careers, leverage the retention power of the legacy retirement system, give the services greater flexibility to retain quality people in demanding career fields, and promote servicemembers’ financial literacy, among other things. The NDAA for Fiscal Year 2016 established BRS to replace the legacy retirement system. As with the legacy retirement system, servicemembers in BRS must serve 20 years to receive a DB annuity. Under BRS, eligible retirees receive a DB monthly benefit equal to 2 percentage points per year of service multiplied by the average of a servicemember’s highest 36 months of basic pay—lower than the 2.5 percentage point multiplier under the legacy retirement system. BRS also provides servicemembers with DC benefits through an employer contribution, which did not exist in the legacy retirement system. For servicemembers who began their service on or after January 1, 2018, DOD automatically contributes 1 percent of a servicemember’s basic pay into the individual’s TSP account after 60 days of service and, after 2 years of service, matches a servicemember’s contributions up to 4 percent of their basic pay, for a maximum military contribution of 5 percent of a servicemember’s basic pay. These servicemembers are automatically enrolled in BRS at a 3 percent default contribution rate. DOD estimates that with automatic enrollment in TSP and the automatic government contribution, 85 percent of new servicemembers covered by BRS will receive at least some retirement benefits when they leave military service. BRS offers servicemembers some additional features and benefits not offered under the legacy retirement system. Servicemembers under BRS are eligible for a one-time continuation payment as a retention incentive at the servicemember’s mid-career point, between 8 and 12 years of service. Servicemembers who accept the continuation benefit incur an additional service obligation. BRS also offers servicemembers who serve 20 years or more the option to convert the present-value equivalent of either 25 or 50 percent of their DB annuity payments for the period from their date of retirement until the date they reach their Social Security full retirement age (FRA) to a lump-sum payment upon retirement from the military. Taking this lump-sum payment would reduce the retiree’s annuity payments only until he or she reaches FRA, after which the annuity payments would revert to the full benefit level (see fig. 2). Active-duty servicemembers with fewer than 12 years of service as of December 31, 2017 were eligible to enroll in BRS until December 31, 2018. The decision to opt in to BRS or remain in the legacy retirement system was irrevocable. Compared to the legacy retirement system, which provided only a DB plan, the BRS’s enhanced DC benefit and reduced DB annuity shifts more of the responsibility for managing servicemembers’ retirement security from DOD to servicemembers. To help ensure that servicemembers have the financial literacy to make sound financial decisions, the NDAA for Fiscal Year 2016 added a requirement for DOD to provide servicemembers ongoing financial literacy training at various career and life stages, including at initial entry, promotions, vesting in the TSP, eligibility for continuation pay, marriage, divorce, and the birth of a first child. GAO’s prior work on financial literacy training compiled testimony from experts from the private sector, federal government agencies, nongovernmental organizations, and academic institutions to: define financial literacy as the ability to use knowledge and skills to manage financial resources effectively for a lifetime of well-being; identify the workplace as a particularly effective venue for providing financial education and helping individuals improve their financial decision making; and summarize the effectiveness of various interventions and how to address the needs of workplace populations traditionally underserved by financial education. DOD developed three courses to help servicemembers make informed decisions about whether to opt in to BRS or remain in the legacy retirement system. The BRS Opt-In Course was available as a 2-hour online or in-person course that servicemembers had to attest they had completed before opting into the new retirement system. DOD reported that 91 percent of an estimated 1.7 million eligible servicemembers attested that they had completed the training during the BRS opt-in period. The course included information on (1) the importance of saving for retirement, (2) the differences between the legacy retirement system and BRS, (3) factors for servicemembers to consider in choosing between the two retirement systems, and (4) tools and resources for servicemembers to consult when making their opt-in decision. DOD developed two additional BRS trainings for key military personnel in an effort to expand the network of in-person resources available to servicemembers eligible to opt into BRS. One course provided installation-level financial management professionals—Personal Financial Managers (PFMs) and Personal Financial Counselors (PFCs)—with more detailed information to reinforce the BRS Opt-In Course curriculum for servicemembers and answer their specific questions about BRS. The other course provided optional training to military supervisors regardless of their eligibility to opt into BRS. DOD officials said it was important to educate military supervisors on BRS since many junior servicemembers discuss personal financial information with their direct supervisors. DOD officials said that the agency released both of these trainings in advance of the BRS Opt-In Course so that PFMs and supervisors would have time to understand the new system and prepare for questions from servicemembers. DOD also developed the BRS New Accession Course for servicemembers who entered the military on or after January 1, 2018 and who are automatically enrolled in BRS. (See fig. 3.) Servicemembers take this course when entering service as part of their mandatory basic training (“boot camp”) or at the first school they attend after basic training. This course explains BRS’s key components, identifies the tools and resources available to help servicemembers save for retirement, and encourages servicemembers to actively manage their TSP accounts. DOD officials said that the New Accession Course is very similar in content to the BRS Opt-In Course but without comparisons to the legacy retirement system. The course facilitator leads servicemembers through a series of short videos on BRS, asks questions at the end of each of the course sections, and is available to answer servicemembers’ questions throughout the course. DOD publicized BRS by creating a central website that links to outreach material in a variety of media formats, including videos available on YouTube, social media content, an interactive online comparison calculator, webinars, and external websites such as Military OneSource and https://www.tsp.gov. For example, DOD’s central BRS website links to its BRS Fact or Fiction video series, which addressed various BRS misconceptions through 20 brief videos. In the video series, DOD introduced the #BlendedRetirement hashtag, then distributed supplementary BRS infographics with this hashtag to link back to additional resources on social media sites. DOD officials said they also are developing a mobile app to provide servicemembers easy access to financial readiness information through tools like calculators and games. Additionally, DOD’s interactive online BRS calculator allowed servicemembers to enter personal financial information, such as their military grade, estimated date of military separation or retirement, and TSP contribution percentage, so those who were eligible to opt into BRS could compare how their retirement savings outcomes might differ under BRS and under the legacy retirement system. DOD’s Office of Financial Readiness also trained financial counselors across the service branches to supplement the information in its BRS trainings as well as to provide servicemembers in-person financial literacy education. DOD officials said that the agency employs at least one PFM at most military installations or uses PFCs, who are government contractors. DOD officials said that PFMs and PFCs travel as needed to provide support at multiple installations. One PFM we interviewed estimated that PFMs provide as many as 10 group presentations per week on retirement issues that they tailor to fit their audiences’ needs. Another said one-on-one counseling sessions allowed servicemembers to share their personal financial situations, receive information germane to their unique circumstances, and explore available tools and resources. DOD officials said that, as outlined in federal statute, the role of PFMs and PFCs is to educate servicemembers about financial options available to them and not to provide financial advice. In addition to the centralized trainings and resources DOD created, the service branches used their internal communication systems for BRS outreach campaigns and created additional training tailored to the needs of their servicemembers (see fig. 4). For example, according to Navy officials, during the final 6 months of the BRS opt-in period, the Navy posted approximately 80 Facebook and Twitter posts to its accounts, with many of these reminding servicemembers of their opt-in choice. The posts linked to additional resources and advertised outreach like the Navy’s Facebook Live event, which utilized social media to provide servicemembers online access to financial experts who could answer their retirement-related questions. Military supervisors also said that most of the service branches sent targeted communications to supervisors to remind eligible servicemembers at regular meetings to complete the BRS Opt-In Course. The service branches also created supplemental BRS trainings tailored to meet their servicemembers’ needs. For example, the Marine Corps developed a classroom-based BRS training that included specific instructions on how to use the Marines’ data systems to make BRS decisions, as well as statistics on the average percentage of Marines that complete 20 years of service. With all incoming servicemembers automatically enrolled in BRS as of January 1, 2018, DOD officials said the agency has shifted its continuing financial literacy training from the opt-in decision to saving for retirement. As with the BRS training, the military provides continuing financial literacy education through both DOD and the service branches. DOD’s Office of Financial Readiness provides policy, education, advocacy, and program oversight to promote servicemembers’ financial readiness. While DOD developed the BRS trainings and conducted outreach, DOD officials said that the service branches have the primary responsibility for developing and providing servicemembers continuing financial literacy education, including on saving for retirement, based on their own resources and their servicemembers’ needs. The service branches use a variety of formats (see fig. 5). DOD is also developing a plan to provide continuing financial literacy education to servicemembers at various career and life stages. DOD officials said the agency plans to improve the consistency of the continuing financial literacy education provided by the service branches and consolidate it so it is delivered at the career and life stages specified by the NDAA for Fiscal Year 2016. DOD’s Office of Financial Readiness released guidance in August 2019 to provide the service branches a common set of learning objectives for financial literacy education aligned with these specific career and life stages. DOD officials told us that the service branches are responsible for delivering the continuing financial literacy education to servicemembers at these stages according to their schedules and resources. We found that DOD’s Blended Retirement System (BRS) trainings met many established financial literacy training effective practices (see sidebar on next page and table 1). However, lack of assessments of some courses affected DOD’s ability to measure how well the courses helped participants and to make any needed changes. Financial education experts have found that financial literacy trainings that meet effective practices can improve employees’ overall financial wellness. These experts identified the workplace as a particularly effective venue for providing financial education and helping individuals improve their financial decision making because employers have the potential to reach large numbers of adults in a cost-effective manner at a place where they make important financial decisions. Effective Financial Literacy Training Practices Information is unbiased: Employers’ financial literacy education programs should provide financial information that avoids even the appearance of conflicts of interest. Links to one-on-one financial help: Programs should provide access to one-on- one financial coaches who can help employees understand and take action on their priorities. Leverages trusted messengers: Programs should use trusted coworkers and other peers to provide or facilitate assistance on financial matters. Assesses employees’ financial literacy to provide assistance and help set priorities: Programs should periodically assess employees’ financial situations and goals to pinpoint how best to provide assistance and help employees set priorities. Enables employees to take action directly from the course: Programs should provide employees the means, for example, through direct links or forms provided in the course, to convert knowledge to financial action. According to DOD officials, servicemembers will make more financial decisions that may impact their ability to successfully save for retirement under BRS than under the legacy retirement system, which makes providing effective financial literacy training to servicemembers particularly important. We found that all of DOD’s BRS trainings met the applicable financial literacy effective practices of presenting unbiased information, directing servicemembers to options for one-on-one financial help, and employing trusted messengers—such as military peers and Personal Financial Managers (PFMs)—to deliver the course information. For example, each of the applicable BRS trainings encouraged servicemembers to work with PFMs to understand how their personal financial circumstances impact saving for retirement. While the BRS trainings met many of the financial literacy effective practices we selected, two of the trainings fell short in assessing servicemembers’ financial literacy, which could allow DOD to better pinpoint how to provide assistance and help servicemembers set priorities. Servicemembers were required to pass a test to complete the BRS Opt-In Course; DOD data show that only 32 percent of servicemembers passed on their first attempt. However, DOD did not revise course material to provide additional information in topic areas where post-test results indicated servicemembers may have needed further training. DOD officials said that the agency consciously avoided making significant changes to its BRS trainings to ensure consistency and course stability throughout the opt-in enrollment period. DOD officials also told us that they were not surprised by the initial low pass rate because they designed the test to be difficult so that servicemembers could demonstrate mastery of the material. DOD’s New Accession Course does not assess individual servicemembers’ understanding of the material, which is information DOD would need to improve its training to provide assistance and help servicemembers set priorities. The course includes a series of knowledge checks, but because the questions are administered to the group as a whole, DOD cannot assess individual servicemembers’ understanding and use this information to revise the course material or to provide servicemembers with additional assistance. DOD officials told us that the agency views the course as successful because it gets students to engage in discussion regarding the basics of BRS and financial readiness. DOD does not have a plan to assess individual servicemembers’ understanding of course material going forward. While servicemember engagement is important, it is not an assessment of their understanding of course material. Servicemembers who do not understand BRS concepts may not save enough for a secure retirement under BRS. Additionally, the BRS Opt-In Course did not meet the financial literacy training effective practice of enabling servicemembers to act on course information directly from the training. For example, the BRS Opt-In Course suggested servicemembers contact PFMs and PFCs if they had further questions about BRS, but the course did not provide direct links for servicemembers to do so. Further, the course did not include forms for servicemembers to enroll in and make contributions to TSP accounts. This standard is considered an effective practice for financial literacy training because research has found that employees who can directly convert their knowledge to immediate action have improved overall financial wellness. DOD addressed this issue in its most recently released training, the BRS New Accession Course, which enables servicemembers to make immediate decisions, such as assigning their initial TSP contribution rates, by providing servicemembers the relevant form within the training. The NDAA for Fiscal Year 2016 included a requirement for DOD to add questions on servicemembers’ financial literacy to its annual survey and use the results as a benchmark to evaluate and update the continuing financial literacy training DOD will provide to servicemembers in the future. The NDAA for Fiscal Year 2016 also requires DOD to develop ongoing financial literacy training for servicemembers to take at key career and life stages. DOD has the opportunity to ensure that individual knowledge assessments are included in the guidance it provides the service branches on the key objectives that must be met in these trainings. Military personnel cited multiple challenges described by servicemembers in taking the BRS Opt-In Course and seeking financial literacy support. In our interviews at five military installations, military supervisors and financial counselors said they believed servicemembers had difficulty (1) understanding the training due to their low financial literacy; (2) taking, and relating to, optional financial literacy training due to mission and short-term life goals; and (3) setting up online access to their TSP accounts. Many military supervisors and Personal Financial Managers (PFMs) we interviewed said that many servicemembers with whom they interacted misunderstood key BRS concepts and lacked the basic knowledge to make sound financial decisions related to BRS even after completing the mandatory BRS Opt-In Course. Providing basic financial education to junior enlisted servicemembers, who can be as young as 17 years old, may be especially challenging due to their limited life and work experience. These servicemembers score the lowest on measures of financial literacy, according to the 2017 Status of Forces Survey, an annual survey of a sample of servicemembers that covers key issues of military life. Some servicemembers said that the training platforms (e.g., computer- based and large group training), while efficient in providing mandatory training to a large group of servicemembers, were not ideal for a group with very limited baseline financial literacy. For example, several military supervisors said some servicemembers advanced through the computer- based BRS Opt-In Course as quickly as possible, and may not have understood the content. One military supervisor said it may be hard for servicemembers to identify the most critical elements in the computer- based training because they could not interact with the material or ask clarifying or personal questions. For example, one group of military supervisors said the current training addresses what TSP is, but there is a need for more training to answer servicemembers’ questions about how to manage and optimize their accounts for retirement savings. In response, DOD officials said that while these topics were not covered in depth in the BRS trainings, servicemembers have access to additional resources, such as PFMs and the TSP website for help with personal questions about managing their savings under BRS. Large group trainings, which could have hundreds of servicemembers in attendance, also may have discouraged servicemembers from asking clarifying questions due to the number of participants. DOD officials acknowledged that servicemembers may need more one-on-one help when making personal financial decisions, which is why the agency trained PFMs and PFCs to address servicemembers’ BRS and financial literacy questions and provide additional support. Some military supervisors said the servicemembers who they directed to optional one- on-one financial counseling sessions asked the PFMs detailed questions their supervisors were not able to answer, ran their own numbers and received personalized information to help them make decisions, and often took action during the session. DOD officials said one challenge to getting servicemembers to seek out more personalized one-on-one financial help is the perception that servicemembers seek PFMs primarily after facing financial hardship. These officials said they are working to shift the military culture so servicemembers seek out PFMs for financial planning purposes similar to how civilians use financial counselors. Military supervisors and PFMs told us that servicemembers had difficulty seeking out financial literacy support because of demanding operational schedules and a focus on short-term life and mission goals. This was especially true for junior servicemembers, who may be uncomfortable requesting time away from their mission duties. Further, some military supervisors said junior servicemembers tended not to recognize the importance of saving for retirement when faced with other, more immediate, financial priorities, such as purchasing a car. One group of military supervisors said that since most junior servicemembers do not seek out retirement advice, they try to find opportunities to weave the topic into other discussions, for example, about how taking out a car loan can impact a junior servicemember’s saving for retirement. Servicemembers can manage their TSP accounts online by viewing current plan information and making or changing contribution allocations; however, setting up an online account depends on servicemembers having a stable mailing address. The Federal Retirement Thrift Investment Board (FRTIB), which administers the TSP, mails participants a time-sensitive TSP password required to access their TSP accounts online. Some military supervisors said that servicemembers reported difficulty receiving their initial TSP password because they relocate often and may lack a permanent mailing address. FRTIB officials acknowledged that this fraud prevention measure might make it more difficult for participants to access their TSP accounts, but noted that they must balance security with ease of use and have not yet found any viable options to address this issue. Federal government internal controls standards state that entities should use appropriate methods to communicate so that information is readily available when needed. Under the Blended Retirement System (BRS), military retirees with 20 or more years of service may choose, when they retire, to convert part of their monthly annuity into a lump sum payment, in exchange for a temporarily lower monthly benefit. The lump-sum payment is partial in two ways: 1) servicemembers may convert either 25 or 50 percent of their annuity payments to a lump-sum payment, and 2) the lump-sum conversion only applies to annuity payments payable prior to the servicemember’s Social Security full retirement age (FRA)—age 67 for those born in 1960 or later. After the service member reaches FRA, the annuity payments revert to the full monthly pension. (See fig. 6.) In its final report, the Military Compensation and Retirement Modernization Commission recommended that the new military retirement system should offer a lump-sum payment option to increase flexibility for retiring servicemembers and remain fiscally sustainable. Since many servicemembers retire from the military at a younger age than most civilians in the workplace, DOD officials said that some military retirees might prefer a lump-sum payment to start a business or buy a house. Personal Discount Rates Personal discount rates can be derived from individuals’ behavior when faced with intertemporal monetary choices. In contrast, more traditional approaches to pension discount rates are based on financial market data or expectations rather than on individual preferences or behavior. In theory, personal discount rates reflect individuals’ valuation of money received today versus in the future. However, behavioral economic research has shown that people do not always make rational choices related to foregoing current benefits for future payoff. given stream of converted pension payments. The NDAA for Fiscal Year 2016 directed the Secretary of Defense to choose a discount rate for BRS lump sums that (1) uses average personal discount rates that take into consideration “applicable and reputable studies of personal discount rates for military personnel and past actuarial experience in the calculation of personal discount rates,” and (2) is in accordance with generally accepted actuarial principles and practices. Researchers have sought to quantify personal discount rates by studying personal choices in a variety of contexts involving the tradeoff of payoffs at different times (see sidebar). Two such studies involved military personnel being offered lump-sum payments in lieu of annuity payments. According to the Institute for Defense Analyses (IDA), the studies computed an estimated average personal discount rate for servicemembers who were presented with the offer, based on the choices by servicemembers to either elect the lump-sum payment or the annuity. DOD officials told us that, to comply with the requirements of the NDAA for Fiscal Year 2016, they considered several factors to set the discount rate for BRS lump-sum calculations. DOD officials said they first contracted with a research organization to estimate a range of personal discount rates based on past studies. They said they then adjusted that range based on differences between the specific features of past lump- sum offers and those of BRS lump sums. They also considered how a lump-sum offer could impact the retention of military personnel, since DOD relies on a percentage of experienced servicemembers to continue serving beyond 20 years. DOD officials told us they wanted to reduce the likelihood a lump-sum payment would lead more people to retire earlier than they would otherwise. Finally, even though past studies had found higher personal discount rates (resulting in smaller lump-sum amounts) for enlisted servicemembers than officers, DOD officials told us it would go against core values of military compensation if the agency did not apply the same discount rate to all lump-sum payments, regardless of the servicemember’s rank. Considering all of these factors, DOD devised a formula for setting what it termed the “Government Discount Rate” (GDR) that would be used in calculating BRS lump-sum amounts. DOD constructed the GDR by starting with a market index of high-quality corporate bond rates and then adding an adjustment factor so that the GDR fell within the range of observed personal discount rates. According to DOD, this current method for setting this rate will be reexamined at least every 4 years. The GDR for 2019 is 6.81 percent, which is a “real” interest rate that does not include an inflation component. To compare the GDR to more common nominal interest rates, an inflation adjustment must be added. For example, if inflation were assumed to be 2.4 percent per year, a GDR of 6.81 percent would be approximately equivalent to a nominal discount rate of 9.37 percent. The method used to determine BRS lump-sum payment amounts is likely to result in a discount rate that is higher—based on recent interest rates, roughly double— than that used to calculate minimum lump-sum distributions from private-sector pension plans, when all other factors are equal. The discount rates for determining minimum lump-sum amounts for private-sector pension plans that offer them are governed by ERISA. The Internal Revenue Service (IRS) publishes the discount rates applicable to minimum lump-sum determinations each month, based on ERISA provisions. For 2018, these rates generally fell in the range of 2.5 to 4.9 percent, on a nominal basis, compared to the GDR, which was about 9 percent, on a nominal basis (depending on assumed inflation). We found, based on recent interest rates, holding age and monthly annuity amounts constant, the higher discount rate applied to BRS lump- sum calculations would significantly reduce servicemembers’ lump-sum payment amounts. Additionally, we found that the percentage difference would be the largest at younger retirement ages, since the difference in discount rates would have an impact over a longer period of time. For a servicemember retiring at age 40, for example, we found BRS lump-sum payments to be about 40 percent smaller, based on recent interest rates, than if calculated following the requirements under ERISA. (See fig. 7.) For more information on ERISA and our methodology for calculating lump-sum payments, as well as sensitivity testing and factors that can affect this comparison at different points in time, please see appendix I. DOD officials told us that the discount rate used for BRS lump-sum payments was different than the rate used in private-sector pension plans for some key reasons. DOD officials said the NDAA for Fiscal Year 2016 required that the BRS discount rate be based on average personal discount rates, which is a different approach to discount rates than that used under ERISA. DOD officials also said the agency relies on maintaining a certain percentage of servicemembers with 20 or more years of service and did not want the offer of a lump-sum offer to entice too large a percentage of servicemembers to leave military service. However, knowledgeable stakeholders expressed some concerns with the higher discount rate used to determine BRS lump-sum payment amounts. For example, the DOD Board of Actuaries stated that a relatively high discount rate, and the lower lump-sum payments that would result, could be perceived as taking advantage of servicemembers. Additionally, the American Academy of Actuaries said those who accept lump-sum payments using higher discount rates are likely to either not understand the financial value of their annuity benefits or have an immediate financial need. On the other hand, stakeholders we interviewed noted that BRS’s lump-sum feature was intended to provide options to servicemembers, which was a central component of implementing BRS. Although current active-duty servicemembers eligible to choose a lump- sum payment are not scheduled to retire until 2026, at the earliest, DOD can take certain steps to help them better understand the tradeoffs associated with the lump-sum option. Decisions about lump-sum options are complicated, and stakeholders knowledgeable about financial literacy have pointed out the importance of providing sufficient information about the tradeoffs involved for those making such decisions. In a 2015 report, we identified key information to help individuals in the private sector make an informed decision when considering a lump-sum payment versus an annuity. (See table 2.) Without this key information, service personnel will be unable to prudently weigh the advantages and disadvantages of the lump-sum option in their retirement decisions. DOD officials said they posted a training video on the BRS lump-sum option to the BRS website in July 2019. Servicemembers also have access to other descriptive material on the BRS website, such as a fact sheet on the BRS lump sum, and the BRS calculator to estimate their lump-sum payment with some assumptions about future pay. The shift from the legacy retirement system to BRS marks a significant change in retirement benefits for an estimated 1.7 million military servicemembers. While more servicemembers will receive retirement benefits under BRS than under the legacy retirement system, BRS will require servicemembers to more actively and continuously manage their retirement decisions throughout their military career and in retirement. As an employer, DOD is well positioned to provide financial literacy training and support to servicemembers as they make retirement decisions. DOD has designed a multi-faceted approach to provide resources over time and in a variety of formats, increasing the likelihood that servicemembers will be able to find guidance when they need it. DOD completed a large undertaking in educating servicemembers about the choice they faced in deciding whether to opt into BRS, but this was only the first step in educating servicemembers about how to maximize and manage their retirement savings under BRS. In educating servicemembers about saving for retirement, DOD would benefit from applying the financial literacy training effective practices identified by experts, especially periodically assessing employees’ financial understanding and using these assessments to revise and tailor ongoing training. Given that young servicemembers are often stationed in multiple locations for short amounts of time and that BRS places increased responsibility on servicemembers to save for retirement through TSP contributions, it is important that servicemembers receive the necessary information to access their TSP accounts online in a timely manner. The current TSP password process has limited some servicemembers’ ability to manage their accounts. It is important for FRTIB to expeditiously address this issue. Of additional concern is how DOD will ensure that servicemembers understand the tradeoffs associated with BRS’s lump-sum feature. BRS lump-sum payments are calculated using a higher discount rate than private-sector pension plans, which results in lower lump-sum payments, by comparison. While the BRS lump sum is limited, and the full annuity amount would resume at servicemembers’ Social Security full retirement age, the reduced annuity paid until then could still have a significant impact on some servicemembers’ financial security. A fundamental element of BRS is the greater responsibility and choice placed on individuals. To work well, such a system requires that sufficient, clear, and accurate information be provided so that servicemembers can make the prudent choices best suited to their personal financial situations. Consistent with this principle, DOD should ensure that the information and tools that it provides to eligible servicemembers about the lump sum clearly lay out the tradeoffs of this decision and allows those eligible to make a well-informed prudent choice that best meets their individual financial circumstances. The Secretary of Defense should evaluate the results of its financial literacy training assessments to determine where gaps in servicemembers’ financial knowledge exist and revise future trainings to address these gaps. (Recommendation 1) The Secretary of Defense should provide servicemembers disclosures that explain key pieces of information about the lump-sum payment, including some measure of its relative value, the potential positive and negative financial ramifications of choosing the lump-sum payment option, and a description of how it was calculated. (Recommendation 2) The Executive Director of the Federal Retirement Thrift Investment Board should work with the Secretary of Defense to explore alternative options (including online resources) for servicemembers to receive their initial Thrift Savings Plan password so that servicemembers can access and manage their online accounts without added delays. (Recommendation 3) We provided a draft of this report to the Secretary of Defense and the Executive Director of the Federal Retirement Thrift Investment Board for review and comment. In its letter, which is reproduced in appendix II, DOD concurred with the report’s recommendations and offered comments on some of our findings. For recommendation 1, regarding the evaluation of its financial literacy training assessments, DOD stated that in 2017 it added questions to its annual Status of Forces Survey to assess the military population’s understanding of basic financial concepts. While these survey results will allow DOD to respond to identified gaps in servicemembers’ financial literacy, Status of Forces survey results have taken years to compile in the past. Assessing servicemembers’ financial literacy as part of mandatory trainings will allow DOD to more promptly identify gaps in servicemembers’ knowledge and adjust trainings to address those gaps. For recommendation 2, regarding the provision of information on the BRS’s lump-sum payment options, DOD stated that it has developed a training course, published information to help educate servicemembers on the BRS’s lump-sum option, and included a lump-sum section in its BRS calculator. While we are encouraged by DOD’s efforts to develop various tools for educating servicemembers on the BRS’s lump-sum option, in this report we identified additional information that is important to include in lump sum disclosures. In its letter, DOD expressed concern that the title of our report focused only on one aspect of our findings. We believe that the title accurately reflects our report’s key findings, conclusions, and recommendations. DOD also said that the agency did not intend for the BRS Opt-In Course to be financial literacy training, and thus were concerned that we evaluated this training based on the effective practice identified in prior GAO work of assessing employees’ financial literacy to provide assistance and help set priorities. However, we believe that our use of this effective practice to evaluate the BRS Opt-in Course is consistent with our prior findings that employers are well-suited to provide financial education and help individuals improve their financial decision making. We compared the BRS Opt-In Course to this effective practice because the course provided DOD an opportunity to assess whether servicemembers understood key aspects of BRS, undoubtedly a key aspect of servicemembers’ financial well-being. In addition, DOD stated that the agency viewed servicemembers’ initial low pass-rate of the BRS Opt-In Course as a positive result because they designed the course to be rigorous and it forced servicemembers to retake the parts of the training where they were failing to comprehend the course material. DOD also stated that revising the training during the 2017 training period was not practical because it would have resulted in some servicemembers receiving disparate training formats and materials. We understand DOD’s concerns; however as DOD continues to develop additional financial literacy training we encourage the agency to consider that low pass rates on post-training tests often indicate a gap in knowledge and a possible need to revise the training. In its final comment, DOD agreed with us that there is a lack of reliable data for comparing the BRS lump-sum feature with those provisions offered by state and local government pension plans. DOD also stated that the BRS lump-sum feature was unique and therefore not comparable to private-sector pension plans governed by ERISA. Although there are differences between BRS and ERISA, the BRS and ERISA lump-sum provisions are the only defined benefit lump sum conversion provisions that are specified under federal law. Further, the lump-sum provisions for both reflect a participant choice that can have important consequences for a participant’s financial security. Our recommendation is premised on the principle that regardless of which particular features a pension plan offers, participants need clear, complete, and accurate information to make prudent decisions regarding their retirement security. The FRTIB also provided comments, reproduced in appendix III, and generally agreed with the report’s findings and conclusions. The FRTIB also concurred with our recommendation regarding the provision of TSP passwords to military personnel and said that they will continue to explore avenues to address how servicemembers receive their initial TSP password while continuing to emphasize the need for security. DOD and FRTIB provided technical comments, which we incorporated into the report as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution of this report until 30 days from the report date. We are sending copies of this report to the Secretary of Defense, the Executive Director of the Federal Retirement Thrift Investment Board, the Director of the Consumer Financial Protection Bureau, and other interested parties. This report is also available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Charles Jeszeck at (202) 512-7215 or jeszeckc@gao.gov or Frank Todisco at (202) 512-2700 or todiscof@gao.gov. Mr. Todisco meets the qualification standards of the American Academy of Actuaries to address the actuarial issues contained in this report. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix discusses in detail our methodology for addressing (1) what actions the Department of Defense (DOD) has taken to help servicemembers understand the Blended Retirement System (BRS) and, more generally, educate servicemembers on saving for retirement; (2) what DOD can learn from financial literacy training effective practices and the implementation of BRS training to continue supporting servicemembers in saving for retirement; and (3) how lump-sum payment amounts are determined under BRS and how they compare to the methods used for private-sector pension plans that offer them. To answer all of these questions, we interviewed officials at DOD, the Federal Retirement Thrift Investment Board (FRTIB), the Consumer Financial Protection Bureau (CFPB), and other organizational stakeholders knowledgeable about the military and retirement. We also reviewed relevant agency documents and federal laws and regulations. To understand how DOD helped servicemembers understand BRS, we reviewed DOD’s centralized training and outreach material. We also conducted group interviews with senior officers and enlisted servicemembers on military installations to learn about some of the informal training and mentorship provided by military leaders. We used the following criteria to select military installations to visit: 1. Sufficient number of BRS-eligible personnel available to participate 2. High number of active-duty servicemembers stationed at the 3. Availability of a Personal Financial Manager (PFM) on the installation 5. Mix of single service versus joint bases 6. Proximity to an urban center 7. Primary mission of the installation is operational (versus training) We selected five military installations to visit: Camp Pendleton (Marine Corps), Fort Sam Houston (Army), Naval Base San Diego (Navy), and Randolph Air Force Base and Scott Air Force Base (Air Force). At each installation, we met with separate groups of 8 to 12 senior enlisted servicemembers and senior officers. These senior servicemembers supervise junior servicemembers who, as a group, were most likely to have had to make a decision on whether to opt into BRS. We also met with the groups’ installation-level financial management professionals— Personal Financial Managers (PFM), Personal Financial Counselors (PFC), or Command Financial Specialists (CFS)—who provide servicemembers additional financial literacy training and one-on-one financial counseling. We asked questions of all group interview participants related to: 1. Information provided to servicemembers about BRS 2. Common needs of servicemembers in making decisions about BRS 3. Common questions servicemembers had about BRS 4. Challenges experienced in providing training and/or support 5. Anticipated future needs for training and/or support These interviews provided insights into senior officers and enlisted servicemembers’ experiences facilitating the rollout of BRS training to junior servicemembers, but did not yield information that was generalizable to all senior officers and enlisted servicemembers. We also reviewed and compared DOD’s financial literacy trainings to financial literacy training effective practices. To identify financial literacy effective practices, we reviewed published articles and reports on the topic. Our review included a March 17, 2015 forum GAO convened with 20 financial literacy leaders and experts focusing on financial education in the workplace, and the subsequent report, Financial Literacy: The Role of the Workplace, GAO-15-639SP (Washington, D.C.: July 2015). The report provided the best single compilation of financial literacy effective practices from a diverse set of experts from the private, non-profit, governmental, and academic sectors. The report summarizes forum participants’ discussions across seven topic areas. Of these seven, we selected two that were most germane to DOD’s BRS training: (1) Employers should address the needs of traditionally underserved workplace populations, and (2) Effective practices can include automatic enrollment in retirement plans, financial health checks, and personalization. Across these two topic areas, we selected the five financial literacy training effective practices that were most relevant to the type of trainings DOD developed for BRS. Specifically, we determined if BRS trainings (1) contain unbiased information, (2) contain links to one- on-one financial help, (3) leverage trusted messengers, (4) assess participants’ financial literacy so DOD can provide assistance and help set priorities, and (5) enable participants to take action directly from the course. To understand how BRS lump-sum payments are determined, we interviewed DOD officials to learn about the issues they considered when designing BRS’s lump-sum feature, how DOD determines the discount rate it uses for lump-sum payments, and how the BRS discount rate used to calculate lump sums relates to personal discount rates. To understand discount rate issues applicable to lump-sum payments in other pension plans, we interviewed stakeholders knowledgeable about other pension plans, consulted with our internal actuarial experts, and reviewed relevant prior work. We also consulted with actuaries at DOD to clarify our technical understanding of the calculation of lump-sum amounts under BRS. We created a lump-sum payment calculator to run simulations of various lump-sum calculations—including those used in private-sector pension plans—to show the effect that varying certain calculation methods and assumptions can have on the value of the lump-sum payment. We calculated and compared illustrative lump-sum amounts under BRS to what those lump-sum amounts would have been under federal laws and regulations applicable to private-sector pension plans. We did not do a similar comparison to public-sector pension plans because of a lack of reliable, generalizable data on the prevalence of lump sums offered by the many state and local government plans and the applicable discount rates used. Some lump-sum options under state and local government plans do not require a discount rate at all because they return employee contributions with interest or are a deferred retirement option provision (DROP) rather than lump sums that involve discounting future promised payments. Different state or local governments might set their own rules regarding any lump sums. In contrast, the lump-sum provisions applicable to both BRS and private-sector pension plans under the Employee Retirement Income Security Act of 1974, as amended (ERISA) are in federal law. The following section provides additional technical detail regarding the methods used to determine the lump-sum discount rate (the Government Discount Rate, or GDR) under BRS; the methods used to determine discount rates for determining minimum lump-sum amounts under ERISA; a discussion of key differences between BRS and ERISA approaches; and the methods and assumptions we used to compare BRS lump-sum amounts to minimum lump sums under ERISA, along with a discussion of how the comparison could vary over time. DOD’s construction of the GDR begins with a 7-year average of estimated high-quality corporate bond real interest rates for maturities of about 23 years, and then adds an add-on factor to bring the discount rate up to a level consistent with applicable studies of personal discount rates, subject to possible adjustments for DOD concerns about retention of servicemembers. DOD officials told us that the 23-year maturity was intended to reflect the average time between a servicemember’s retirement from the military until Social Security full retirement age (FRA). The 7-year averaging is for the purpose of smoothing out short-term fluctuations in interest rates. The add-on for 2018 and 2019 is 4.28 percentage points. The GDR for 2019 is 6.81 percent, which is a “real” discount rate that does not include an inflation component. Interest rates are often regarded, economically, as consisting of two components: a portion to cover expected inflation (the inflation component), plus a portion to provide a return in excess of inflation (the “real” return component). For example, if inflation expectations are 2.50 percent per year, and the interest rate on a bond is 4.50 percent, then the bond is expected to provide a real return (in excess of inflation) of approximately 1.95 percent ( x 100). In this case, 4.50 percent would be referred to as the nominal interest rate and 1.95 percent would be referred to as the real interest rate. In order to convert the GDR into an equivalent nominal discount rate (for comparison to ERISA discount rates), an inflation assumption is needed. We used an inflation assumption of 2.40 percent per year, which is the inflation assumption used by the Congressional Budget Office (CBO) in its 2019 long-term budget outlook. As a result, with this inflation assumption, the nominal discount rate equivalent to the GDR of 6.81 percent is 9.37 percent ( x 100). Military pensions (both under legacy and BRS) are increased each year to fully keep up with inflation. The lump-sum equivalent of such a benefit could be calculated in one of two ways, which mathematically would produce the same result: (1) applying the nominal discount rate (in this example, 9.37 percent) to the projected increasing series of monthly annuity benefits, or (2) applying the real discount rate (in this example, 6.81 percent) to a fixed (not inflation indexed) monthly annuity. For determining minimum lump sums under ERISA, the discount rate is actually a combination of three “segment” rates that reflect bond yields at different maturities: a short-term rate to discount future payments due in the next 5 years, a medium-term rate to discount future payments due between 5 and 20 years out, and a long-term rate to discount future payments due beyond 20 years. These are nominal rates. These rates are published monthly by the Internal Revenue Service (IRS) and are based on an average of high-quality corporate bond rates for the month. Private-sector pension plan sponsors have some flexibility in selecting a method for determining which monthly averages would be used to calculate lump sums offered in a particular plan year. As a result, for a lump sum payable in a particular month, the applicable ERISA segment rates could be those for a month up to 16 months prior to the month of the lump-sum payment, depending on the provisions of the plan. Minimum lump sums under ERISA also include a “mortality discount,” which means that the lump sum is reduced to reflect the fact that for any future scheduled pension payment, there is a probability that the retiree will no longer be alive to receive it. We included this mortality discount in our ERISA calculations. DOD decided not to include a mortality discount in the BRS lump-sum methodology. DOD officials told us that mortality rates from age 44 to age 67 are relatively small, such that the impact of including mortality would be overwhelmed by minor changes in the discount rate. As a result, for simplicity, they decided not to include a mortality discount. Not including a mortality discount has the effect of making the BRS lump sum somewhat more generous than it would be if it included a mortality discount. Thus, key differences in the determination of lump-sum amounts under BRS and for ERISA minimums include the following: The development of the GDR starts with corporate bond rates for a 23-year maturity, whereas the ERISA segment rates are based on corporate bond rates for many maturities that are summarized into three segment rates for three different ranges of maturities. Thus, the comparison at any point in time will be affected by the shape of the yield curve. The development of the GDR starts with a 7-year average of corporate bond rates, whereas the ERISA segment rates are based on more current corporate bond rates. Thus, the comparison at any point in time will be affected by movements in interest rates in the prior 7 years. The GDR includes an add-on, currently 4.28 percentage points, to bring the GDR in line with applicable studies of personal discount rates. According to DOD, the add-on also takes into account considerations of retention of military personnel. Thus, the comparison at any point in time will be affected by any changes DOD makes to the magnitude of the GDR add-on. The determination of the minimum lump sum under ERISA includes a mortality discount; the determination of lump sums under BRS does not. The GDR applies over an entire calendar year, whereas the segment rates change month to month, and the segment rates applicable to a particular month’s lump sum could be the published rates for up to 16 months prior, depending on the plan provisions. For our comparison, we assumed a lump sum payable in June 2019. As noted earlier, the applicable GDR for 2019 is 6.81 percent, and the nominal equivalent rate, based on our inflation assumption of 2.40 percent, is 9.37 percent. For the ERISA minimum lump sum, we used the May 2019 segment rates published by IRS, which are 2.72 percent for the first 5 years’ scheduled payments, 3.76 percent for the next 15 years’ payments, and 4.33 percent for the scheduled payments beyond 20 years. We also included the mortality discount in the ERISA calculation. As noted in the body of this report, the result was that the BRS lump sum was 42 percent smaller than it would have been under ERISA rules for an age-40 retirement, and 32 percent smaller for an age-50 retirement. We also looked at the range of ERISA segment rates over the 16-month period from February 2018 through May 2019 to determine the range of potential results depending on which month’s ERISA rates might apply for a particular plan. The BRS lump sum ranged from 38 percent smaller to 42 percent smaller than on an ERISA basis for an age-40 retirement and from 28 percent smaller to 32 percent smaller for an age-50 retirement. We also calculated sensitivities from varying the inflation assumption. As noted earlier, we used an inflation assumption of 2.4 percent, the inflation assumption used by the CBO in its 2019 long-term budget outlook. If instead we used an inflation assumption of 2.0 percent (and the May 2019 ERISA segment rates), the BRS lump sum would have been 39 percent smaller than on an ERISA basis for an age-40 retirement, and 30 percent smaller for an age-50 retirement. The other key differences, noted earlier, in the determination of lump-sum amounts under BRS and for ERISA minimums could also affect the comparison at any point in time. However, we believe the comparisons presented in this report are a reasonable representation of the general magnitude of the differences in lump-sum amounts under BRS compared to the minimum amount required under ERISA. We conducted this performance audit from March 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contacts named above, Mark M. Glickman (Assistant Director), Anjali Tekchandani (Analyst-in-Charge), Cynthia Nelson, and Stephen C. Yoder made key contributions to this report. Also contributing to this report were Vincent Balloon, Alicia Cackley, Virginia Chanley, Sheila R. McCoy, Mimi Nguyen, Stacy Ouellette, Joseph Silvestri, Adam Wendel, and Seyda Wentworth.", "summary": "DOD's new retirement system, BRS, provides automatic and matching DOD contributions to servicemembers' individual Thrift Savings Plan accounts but reduces the retirement annuity paid to those who serve at least 20 years. BRS also offers servicemembers the option of taking part of their retirement annuity as a lump-sum payment. GAO was asked to describe DOD's financial education efforts under BRS. This report examines (1) actions DOD has taken to help servicemembers understand BRS and saving for retirement, (2) what DOD can learn from financial literacy training effective practices and its implementation of BRS training to continue supporting servicemembers in saving for retirement, and (3) how BRS lump-sum payment amounts are determined. GAO reviewed DOD's efforts to educate servicemembers on retirement decisions, conducted group interviews with senior officers and enlisted servicemembers at five military installations on facilitating the rollout of BRS training to junior servicemembers, and created a lump-sum payment calculator to compare different calculation methods and assumptions on the value of the lump-sum payment. In 2016, the Department of Defense (DOD), along with the military service branches, began a multi-year effort to provide training to help servicemembers make informed decisions about saving for retirement through DOD's new retirement system, the Blended Retirement System (BRS). DOD provided computer-based training to help military supervisors, financial counselors, and eligible servicemembers understand the new retirement system, implemented in 2018, and its impact on saving for retirement. DOD trained financial counselors to provide servicemembers in-person, one-on-one financial counseling and classroom courses on BRS and related topics. In addition, DOD prepared ongoing financial literacy training that servicemembers will take upon reaching specific career and life stages. BRS trainings met many of the effective practices for financial literacy training identified in prior GAO work, but some DOD trainings do not incorporate the practice of assessing servicemembers' financial literacy. DOD could use such assessments to modify course material to bolster training in areas where servicemembers' comprehension was weaker. Without assessing whether its financial literacy training is effectively conveying course information, DOD may be missing opportunities to better support servicemembers' retirement decisions. Servicemembers also reported challenges in taking the Opt-In Course for BRS that may inform ongoing and future DOD training. Examples of Servicemembers' Financial Literacy Challenges on Retirement DOD determines BRS lump-sum payment amounts at retirement by applying an interest rate (or discount rate) to calculate the present value of annuity payments servicemembers forego by taking a lump sum. The BRS discount rate exceeds the rate used by private-sector pension plans, resulting in a lower lump sum than if private-sector rates applied. DOD can take certain steps to help servicemembers understand how to compare the BRS lump-sum payment option with the full annuity option. Without this information, servicemembers may not make informed decisions and potentially risk their retirement savings. GAO recommends 1) DOD assess its course evaluations to improve its financial literacy training on retirement for servicemembers, 2) DOD provide key information on the calculation of retirement lump-sum payments, and 3) Federal Retirement Thrift Investment Board explore alternatives for servicemembers to receive their TSP passwords. Both agencies agreed with their respective recommendations.", "document_type": "gao"}
{"report": "In the United States, authority to regulate elections is shared by federal, state, and local officials. Congressional authority to regulate elections derives from various constitutional sources, depending on the type of election. In addition, Congress has passed legislation in major functional areas of the voting process, such as voter registration and prohibitions against discriminatory voting practices. However, responsibility for the administration of state and federal elections resides at the state level. States regulate various aspects of elections including, for example, registration procedures, absentee and early voting requirements, and Election Day procedures. Within each state, responsibility for managing, planning, and conducting elections is largely a local process, residing with about 10,300 local election jurisdictions nationwide. Some states have mandated statewide election administration guidelines and procedures that foster uniformity in the way their local jurisdictions conduct elections, whereas other states have guidelines that generally permit local election jurisdictions considerable autonomy and discretion in the way they run elections. The result is that elections can be administered differently across states and local jurisdictions. Unless states require otherwise, local jurisdictions generally have discretion over activities such as election officials’ training and, in most states, the selection and purchase of voting technology. Among other things, local election officials register eligible voters; educate voters on how to use voting technology; provide information on the candidates and ballot measures; recruit, train, organize, and mobilize poll workers; prepare and test voting equipment for use; and count ballots. The election process is composed of pre-election, Election Day, and post-election activities: Pre-election activities include providing opportunities for eligible individuals to register to vote, maintaining and updating the voter registration database, recruiting and training poll workers, selecting polling locations, preparing voting materials, testing equipment, qualifying candidates for office, and administering absentee and vote-by-mail voting processes. Election Day activities include opening and closing polling places, setting up voting machines and voting booths, checking in voters and verifying registration status, and providing opportunities for voters to mark and cast ballots. Post-election activities include securing equipment and ballots, transferring physical ballots or records of vote counts to a central location for counting, determining the outcome of the election, publishing unofficial results, certifying official election results, and performing recounts, if required. The election process relies on various assets—such as information technology systems, networks, equipment, and facilities. These assets can be broadly categorized as physical, cyber, and human components of the Election Infrastructure Subsector, as described in table 1. Physical, cyber, and human assets comprising the election infrastructure are susceptible to unintentional and intentional threats. As we have previously reported, unintentional, or nonadversarial, threat sources include equipment failures, software coding errors, or the accidental actions of employees (human errors). Threat sources also include natural disasters and other events that can cause failure within sectors on which the election infrastructure is dependent, such as power grid failures in the energy sector. Intentional, or adversarial, threats can involve targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, disgruntled employees, foreign nations engaged in espionage and information warfare, and terrorists. These adversaries vary in terms of the capabilities of the actors, their willingness to act, and their motives, which can include seeking monetary gain or pursuing an economic, political, or military advantage. Appendix I lists general cybersecurity threat sources that can impact information technology systems that support the election infrastructure. Cyber adversaries may make use of various techniques, tactics, and practices—or exploits—to adversely affect an organization’s computers, software, or networks, or to intercept or steal valuable or sensitive information. These exploits are carried out through various conduits, including websites, email, wireless and cellular communications, internet protocols, portable media, and social media. Further, adversaries can leverage common computer software programs, such as Adobe Acrobat and Microsoft Office, to deliver a threat by embedding malware or other exploits within software files that can be activated when a user opens a file within its corresponding program. DHS and others have identified general cyber and physical threats that are applicable throughout the election process. For example, voting equipment may be susceptible to a supply chain attack in which the malicious actor may use the voting equipment vendor as a pathway to plant malware to modify or compromise ballot definition files before they reach the hands of election officials. Also, the absence of or lack of consistent physical access controls, auditable chain of custody procedures, or vendor installed countermeasures may allow malicious actors or well-placed insiders to manipulate voting equipment and ballots at any stage of the process through unauthorized physical access. In addition, there are certain physical and cyber threats that are applicable to individual assets and stages in the election process. Figure 1 provides examples of threats to various assets and stages in the election process. Additionally, DHS has analyzed and identified common cybersecurity vulnerabilities associated with enterprise networks and voter registration systems supporting election infrastructure that could apply to multiple assets at all stages of the election process. Such vulnerabilities include user susceptibility to malicious email, outdated software patches, the use of default system configurations, passwords that are weak or presented in clear text, and the use of operating systems with known weaknesses that have not been properly addressed. Presidential Policy Directive 21, issued in February 2013, shifted the nation’s focus from protecting critical infrastructure against terrorism to protecting and securing critical infrastructure and increasing its resilience against all hazards, including natural disasters, terrorism, and cyber incidents. The directive identified 16 critical infrastructure sectors and outlined roles and responsibilities for protecting these sectors. Further, the directive established sector specific agencies as the federal entities responsible for providing institutional knowledge and specialized expertise to facilitate or support federal, state, and local governments, as well as private sector entities, in protecting critical infrastructure. The National Infrastructure Protection Plan, updated by DHS in December 2013, further integrates critical infrastructure protection efforts between government and private sectors, among other things. It describes a voluntary partnership model as the primary means of coordinating government and private sector efforts to protect critical infrastructure. As part of the partnership structure, the designated sector-specific agencies serve as the lead coordinators for the security programs of their respective sectors. In accordance with the National Infrastructure Protection Plan, the National Protection and Programs Directorate within DHS was designated the sector-specific agency, or lead federal agency, for the Election Infrastructure Subsector. CISA subsequently assumed the role of sector-specific agency upon its establishment as the successor to the Directorate in November 2018. As the lead agency for the Election Infrastructure Subsector, CISA is responsible for coordinating partnership activities and information sharing and is the primary federal interface with the subsector’s stakeholders with respect to security. The Election Security Initiative, part of CISA’s National Risk Management Center, is responsible for managing the agency’s election subsector partnerships. To implement the voluntary partnership model, the subsector created two complementary coordinating councils—one for governments and one for private sector partners—to facilitate partnerships to support election infrastructure. Specifically, the Election Infrastructure Subsector Government Coordinating Council, created in October 2017, enables federal, state, and local governments to share information and collaborate on best practices to mitigate and counter threats to election infrastructure. The council is composed of 27 members, which include three voting members from the federal government—specifically one from DHS and two from the Election Assistance Commission (EAC)—and 24 from state and local governments. The Federal Bureau of Investigation (FBI), EAC, and National Institute of Standards and Technology (NIST) coordinate with each other, with CISA, and with state and local governments through the Election Infrastructure Subsector Government Coordinating Council. Additionally, the Subsector Coordinating Council was chartered in February 2018 and includes private sector entities whose services, systems, products, or technology are used by or on behalf of state or local governments in administrating the U.S. election process. The Election Infrastructure Subsector Specific Plan outlines actions that CISA, as the sector-specific agency, the Government Coordinating Council, and the Subsector Coordinating Council will take to support election infrastructure. Within the Department of Justice, the FBI supports the Election Infrastructure Subsector by countering foreign influence operations and collecting and processing threat information on election infrastructure. This effort is headed by the FBI’s Foreign Influence Task Force, which integrates the agency’s cyber, counterintelligence, counterterrorism, and criminal law enforcement resources to better understand threats posed by foreign influence operations. Among other things, the task force investigates cyber operations targeting election infrastructure or public officials, and covert influence operations designed to influence public opinion and sow division through disinformation and misinformation on social media. The FBI exchanges threat information with CISA and other federal partners to help states and local jurisdictions detect and prevent operations targeting the election infrastructure. Further, the EAC supports the Election Infrastructure Subsector by carrying out its responsibilities under the Help America Vote Act. Specifically, the EAC develops voluntary voting system guidelines and oversees the testing and certification of voting systems. Under the Help America Vote Act, the EAC works through the Technical Guidelines Development Committee to establish a set of principles, guidelines, and requirements specifying how voting systems are to meet standards of functionality, accessibility, and security. The EAC has also provided states with operational grants to replace voting systems. According to the Acting Executive Director of EAC, states also used the grants to increase the security of election systems, such as voter registration systems, and apply other cybersecurity enhancements. Additionally, the EAC and CISA have collaborated to develop select initiatives—such as web-based training for election officials—to expand outreach to states and local jurisdictions. NIST supports the Election Infrastructure Subsector by conducting research to develop and provide standards, tests, guidelines, best practices, and lab accreditation assistance that EAC and states and local jurisdictions may use at their discretion. The Director of NIST chairs the Technical Guidelines Development Committee. At the request of the Committee, the Director of NIST provides technical support for the Committee to carry out its duties, such as by participating in election and constituency working groups to provide technical leadership in support of the development of voluntary voting system guidelines. NIST also helps election officials identify and prioritize opportunities to improve their cybersecurity posture. For example, it established a joint working group with the Election Infrastructure Subsector Government Coordinating Council and Subsector Coordinating Council to develop a framework of cybersecurity practices tailored to elections. In doing so, NIST works with the election community to identify the resources and outcomes needed to ensure the security of the election infrastructure. As part of this effort, it receives feedback from states and local jurisdictions, as well as from CISA, through the Election Infrastructure Subsector Government Coordinating Council. DHS, through CISA, has taken steps to assist election officials in securing election infrastructure by providing services in three areas: regional support and assistance, education and awareness, and information sharing and analysis among federal, state, and local organizations. Appendix II provides a list of the services that CISA makes available to states and local election jurisdictions. Regional support and assistance. CISA employs personnel with cyber and physical security expertise in its 10 regional offices throughout the country. According to CISA, as of November 2019, these experts included 24 cybersecurity advisors and 100 protective security advisors who perform and coordinate security assessments for the 16 critical infrastructure sectors, including the Election Infrastructure Subsector. A single advisor may be responsible for performing and coordinating assessments for an entire state or region and across multiple critical infrastructure sectors. The cybersecurity advisors and protective security advisors consult with state and local election officials and identify services that CISA can provide on a voluntary, no cost basis. For example, according to CISA Election Security Initiative officials, cybersecurity advisors and protective security advisors have promoted CISA services and assessments, such as an assessment of network security vulnerabilities and an assessment of risks associated with information and communication technology suppliers and service providers. In addition, protective security advisors have conducted physical inspections of the protections over facilities that store election-related equipment such as voting machines or poll books. Protective security advisors told us that they also provide a web-based tool that states or local jurisdictions can use to identify security gaps and preparedness across facilities. CISA officials stated that, although regional personnel promote cybersecurity and physical security services to election officials, personnel based at CISA headquarters conduct the more advanced cybersecurity assessments. For example, the Vulnerability Management Branch provides vulnerability scanning and risk and vulnerability assessments, while the Threat Hunting Branch responds to cyber incidents. In September 2019, officials from the Election Security Initiative told us that, based on the CISA Director’s guidance, the agency gives requests from election infrastructure stakeholders a higher level of priority than requests from the other sectors. The precise length of the wait for service depends on the type of service. For some services, such as vulnerability scanning, there is no wait time, according to CISA officials, because CISA can activate the service within 24 hours. Education and awareness. CISA disseminates educational materials to raise awareness of election security-related issues and services available to state and local election officials. For example, CISA provides a web- based training course to help election officials understand the principles of information technology management and has developed guidance to help states and localities adopt recommended information technology practices to improve their security posture. According to CISA, as of November 2019, 1,201 individuals had completed the online course. Further, CISA conducted two election infrastructure tabletop exercises known as “Tabletop the Vote” in August 2018 and June 2019 to help the Election Infrastructure Subsector community collaborate and identify best practices and areas for improvement in election-related cyber incident planning, identification, response, and recovery. The 2018 tabletop exercise included 44 states, the District of Columbia, 16 federal entities, the National Association of Secretaries of State, and the National Association of State Election Directors. According to CISA officials, the June 2019 exercise included 47 states, the District of Columbia, 15 federal entities, the National Association of Secretaries of State, the National Association of State Election Directors, the National Governors Association, and the National Conference of State Legislatures. CISA officials also noted that CISA personnel, including regional personnel, have presented at numerous national and state meetings of election officials, such as the Election Center’s annual conference in August 2019. In addition, as part of CISA’s Last Mile initiative, the agency collaborates with state and local election officials to create customized posters that highlight efforts to strengthen election security. The purpose of the posters is to describe the state’s or local jurisdiction’s election infrastructure assets and systems, characterize risks, and offer specific measures it should implement to mitigate those risks. Election officials can present the posters to voters, lawmakers, and their own personnel to bolster confidence in the security of their election systems. As of November 2019, CISA reported that it had delivered Last Mile posters to 19 states (including six states since the 2018 election) and 1,202 local election jurisdictions. Information sharing and analysis. CISA collects and analyzes election security-related information—such as threat indicators, incident alerts, and vulnerability data—and shares this information with election officials to help them assess cybersecurity controls, detect threats, and mitigate risks. To further this goal, CISA partnered with the Center for Internet Security and the Election Infrastructure Subsector Government Coordinating Council to create the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC) in February 2018. State and local election offices can join the EI-ISAC at no cost and receive election-focused cyber defense tools and products. According to the Director of the EI-ISAC, as of November 2019, its members included 50 states, the District of Columbia, and 2,267 local jurisdictions. CISA officials stated that the EI-ISAC is the primary mechanism that CISA uses to exchange information throughout the election community. For example, the EI-ISAC produces a quarterly threat report to assist the election community in the analysis of active information security threats. From its inception through September 2019, the EI-ISAC had sent out 263 alerts to its members, including weekly, spotlight, and other emails, according to EI-ISAC officials. EI-ISAC officials added that CISA funds the EI-ISAC to, among other things, deploy an intrusion detection sensor in each state specifically for voter registration systems and other supporting infrastructure to detect malicious activity and provide network security alerts. CISA officials stated that the agency, in coordination with the EI-ISAC, analyzes data from these sensors to identify trends in threats and vulnerabilities across states and local jurisdictions. CISA also manages the National Cybersecurity and Communications Integration Center (NCCIC), which receives reports of suspected malicious cyber activity from state and local officials, analyzes attempts to infiltrate election systems, and shares information about threats and vulnerabilities through the EI-ISAC. The NCCIC has also assisted election officials in responding to incidents, upon request. According to CISA officials, in fiscal years 2018 and 2019, NCCIC’s Hunt and Incident Response Teams provided services to 10 states and 16 local election jurisdictions, such as incident response activities and proactive reviews for malicious activity at the time of service. Table 2 identifies selected services that CISA provided to states and local jurisdictions in 2018 and 2019, as of November 6, 2019. State election officials with whom we spoke were generally satisfied with CISA’s support to secure their election infrastructure. Specifically, officials from seven of the eight states we contacted said that they were very satisfied with CISA’s election-related work, while officials from the eighth state said that they were somewhat satisfied. Officials from five states told us that their relationship with CISA had improved markedly since early 2017, when the elections subsector was established. For example, state officials said that CISA has made progress in this area. The Secretary of Homeland Security’s designation of elections as critical infrastructure was initially controversial among state and local officials. For example, in February 2017, the National Association of Secretaries of State voted to oppose the designation of elections as critical infrastructure, citing the states’ constitutional authority to regulate elections. In addition, CISA officials told us that a lack of trust and communication between DHS and state and local election officials hindered initial efforts to establish the Election Infrastructure Subsector. However, officials from one state told us that, despite initial reservations about DHS’s role in election security, CISA has become a good partner over time. An official from another state expressed appreciation that CISA appears to be honestly and earnestly working to gain states’ trust. Officials representing the National Association of Secretaries of State and the National Association of State Election Directors also stated that CISA had worked to improve its relationships with state election officials. According to these officials, CISA has expanded outreach efforts by attending state association meetings and conferences to present information on CISA’s resources and the threat environment and has impressed election officials with the level of detail provided by CISA’s threat reporting. An official from the Election Center, which represents local election officials, stated that CISA officials attend every cybersecurity and critical infrastructure event hosted by the center. CISA officials stated that, while it is not possible to meet individually with all of the local election jurisdictions nationwide, it can engage with multiple local election jurisdictions at one time at these association conferences. Election officials from selected states and local jurisdictions cited various benefits from CISA’s support to election security. According to officials from six states, CISA’s involvement in election security has increased the officials’ understanding of the threat environment that the election community faces. They also said that CISA’s involvement has helped them to plan for cybersecurity threats and to prioritize their election security efforts. For example, officials from one state said that CISA recommended that the state set priorities and focus on risk assessments and network segmentation. In addition, election officials from five states spoke highly of CISA’s expertise and availability. The officials said, for example, that CISA regional and headquarters personnel were easy to get in touch with and knowledgeable about the election community. As a result, the officials said that they had better access to training opportunities and informal advice. Further, officials from each of the eight states spoke positively about the information that the officials received from the EI-ISAC. For example, state officials said that the EI-ISAC updated them regularly on election security incidents and vulnerabilities nationwide, allowing them to prepare for potential incidents. Officials also stated that the EI-ISAC presented the information in a way that was understandable to election administrators who may not have backgrounds in information technology. For example, in a monthly “spotlight” email, the EI-ISAC defines a key cybersecurity term and explains to the election officials why it should matter to them. One official told us that through membership in the EI-ISAC, the state has learned about election security best practices from other states, and other officials said that EI-ISAC allows them to maintain visibility of nationwide threats and other election security issues. Officials from one state said that their contacts through the EI-ISAC helped them to identify a point of contact at social media companies so that they could inform the companies about election-related misinformation being spread online. In addition, election officials from two states said that they have encouraged or required local election jurisdictions to enroll in the EI-ISAC. According to EI-ISAC officials, the number of local election jurisdictions enrolled in the EI-ISAC increased from 1,384 at the end of 2018 to 2,267 in November 2019, and included all three election jurisdictions that we contacted. Officials from two of the three local jurisdictions said that the EI-ISAC emails were valuable. For example, election officials from one local jurisdiction said that communication from the EI-ISAC is meaningful and targeted to bolster their election security efforts. Election officials from the other jurisdiction said that they use the EI-ISAC information to improve their continuity of operations plans. On the other hand, officials from the third local jurisdiction said that the information provided in EI- ISAC emails was too general and not specific enough to their circumstances. Election officials from five states also spoke positively of the EI-ISAC situational awareness chat rooms, which DHS hosted on its Homeland Security Information Network. These officials stated that they participated in and monitored the chat rooms on Election Day to maintain awareness of any emergent election security issues nationwide. For example, officials from one state said that the chat rooms helped them receive real time notification of issues in other states and possible solutions to those issues. In addition, as previously mentioned, one of CISA’s major efforts was the 3-day tabletop exercises held in August 2018 and June 2019, which state and local officials were able to attend remotely by video teleconference from sites around the country. Elections officials from five states said that the exercises conveyed important information and prompted thoughtful discussions among state and local officials. Election officials from four states said that the exercises helped them build relationships within their states, and election officials from three states also said the exercises helped to build relationships with federal agencies as well. In addition, officials from four states said that they conducted or were planning to conduct tabletop exercises modeled on CISA’s exercises. Election officials from three states said that CISA’s cybersecurity assistance has helped them to assure voters that elections in their states are secure or to promote election security efforts. For example, officials from one state said that, when they get questions from the public about election security, they tell voters that CISA’s assessments have shown that the state’s election systems are free of malicious code. Election officials from another state said that CISA officials’ outspokenness has created opportunities for state officials to discuss the importance of election security issues with local officials. Additionally, officials from five states told us they encourage local election officials to request election security services from CISA to increase the security posture of the local jurisdictions. Even though state and local election officials provided mostly positive feedback on DHS’s election security assistance, officials also identified two challenges linked to DHS’s assistance efforts. First, officials from three states stated that it is challenging to find time to schedule election security services. For example, officials from one state said that their biggest challenge is to find time in their state’s election schedule for receiving CISA services because the state has seven to nine elections in off years (that is, years without congressional or presidential elections). Officials from another state said that they might have requested additional election services from CISA if the state had more time in its election calendar. However, none of the state officials with whom we spoke attributed this difficulty to CISA, as election calendars are outside of CISA’s control. In commenting on this challenge, CISA officials said that they have tried to accommodate states’ and local election jurisdictions’ needs, when possible. For example, CISA started offering remote penetration testing as an alternative to the risk and vulnerability assessment. The officials said that the two services are similar, but the remote penetration testing can be completed in fewer days and does not require CISA personnel to be physically present in the election offices. CISA officials told us that smaller jurisdictions sometimes prefer this option. Election officials also identified an additional challenge related to the intelligence briefings that were provided by DHS’s Office of Intelligence and Analysis for state and local officials with security clearances leading up to the 2018 elections. According to Office of Intelligence and Analysis officials, the briefings allowed state and local officials to become more informed about the national threat picture, which in turn, allowed them to adjust to the threat more effectively. Election officials from two states said that the intelligence briefings had provided helpful contextual information about cyber threats. However, election officials in two other states said that the briefings were not as useful as the election officials had hoped because the briefings only provided information that was already available publicly, and election officials from another state said that they learned about a significant election security issue possibly related to their state through news reports. For example, an election official from a different state said that the state learned about threats from the Department of Justice’s July 2018 indictment against foreign intelligence officers. CISA officials stated that they are aware of this issue and have been trying to improve the communication of intelligence information to state and local election officials. For example, at a October 2019 hearing of the House of Representatives Committee on Homeland Security, a CISA senior cybersecurity advisor testified that DHS has begun working with the Intelligence Community to rapidly declassify relevant intelligence or provide as much intelligence as possible, at the lowest classification level possible, to state and local election officials. CISA officials also told us that the agency has started working with cybersecurity intelligence firms to provide election security information to state and local officials without the need for national security clearances or travel to secure facilities. According to CISA officials, two cybersecurity intelligence firms provided webinars to election officials in September and October 2019. CISA officials said that these firms have sophisticated capabilities that they use to analyze information that is not classified. As a result, the cybersecurity intelligence firms can more easily share information with states and local election jurisdictions. CISA officials said that state and local officials will benefit from these briefings because they provide actionable threat information to election officials without requiring them to have security clearances or travel to secure facilities. According to DHS planning guidance, strategic-level planning provides a framework for guiding homeland security activities and generates the objectives and priorities, which influence the roles, responsibilities, and actions that are detailed in the operational-level plans. Further, subsequent operational-level plans are to identify the tasks and resources needed to execute strategic plans. Prior GAO work has shown that strategic and operations plans can help further define capabilities, including opportunities to leverage resources. Such plans can also provide a roadmap for addressing identified gaps and better position an agency and its components to work collaboratively and strategically with external partners, such as states and local jurisdictions. CISA has begun developing strategic and operations plans for assisting states and local jurisdictions in securing election infrastructure in preparation for the 2020 elections. Specifically, CISA has developed a draft strategic plan for securing election infrastructure, known as the #Protect2020 Strategic Plan. According to the draft, CISA intends for its strategic plan to be used to achieve the high-level goals and outcomes called for in the agency’s August 2019 Strategic Intent. The draft strategic plan focuses on four areas, also referred to as lines of effort: (1) protecting election infrastructure, (2) supporting political campaigns, (3) raising public awareness on foreign influence threats and building resilience, and (4) sharing intelligence and identifying threats. In addition, the draft strategic plan identifies several objectives for each line of effort. For example, it includes three objectives for the protecting election infrastructure line of effort: building stakeholder capacity to manage risks and handle adversaries, through activities such as creating incident response and communication plans and encouraging states to adopt and practice them; providing technology services to stakeholders to monitor and secure their networks, by promoting the use of CISA’s voluntary services and assessments, among other things; and facilitating information sharing between the federal government, private sector, and state and local partners by, among other things, hosting situational awareness chat rooms prior to, during, and after state and federal elections. As another example, the draft strategic plan identifies three objectives for the sharing intelligence and identifying threats line of effort: partnering with private sector firms and vendors to improve cyber threat intelligence, through activities such as developing threat indicators and warnings; cooperating across federal partners—including federal law enforcement and the Intelligence Community—by, among other things, advocating for the creation of a joint memorandum to consolidate and highlight current knowledge on election threat intelligence; and monitoring threat activity through actions such as using network monitoring capabilities to spot malicious activity and reveal key trends. In addition, CISA officials stated that the agency has begun developing a draft operations plan, known as the 2020 Election Security Operations Plan. This plan is to—in conjunction with the strategic plan—describe key organizational functions, processes, and resources employed to carry out the agency’s efforts in support of elections in 2020. CISA officials stated, as of November 2019, that the agency intended to finalize the strategic and operations plans by January 2020. However, as of January 2020, CISA’s plans were not yet complete. According to a CISA official, the plans were not finalized due to an ongoing reorganization within CISA and limited staffing resources within the Election Security Initiative. While CISA has drafted the strategic plan, the agency has not yet completed a draft of its operations plan. CISA officials have noted the importance of the operations plan to help ensure the agency is adequately prepared to support election officials in securing election infrastructure in advance of elections, which begin with presidential primaries in February 2020, as well as subsequent primaries leading up to the November 2020 general election. Further, CISA’s operations plan may not fully address the four lines of effort outlined in its strategic plan when finalized. Specifically, according to CISA officials, the operations plan is expected to identify organizational functions, processes, and resources for certain elements of two of the strategic plan’s lines of effort—protecting election infrastructure and sharing intelligence and identifying threats. However, agency officials did not identify the extent to which the operations plan would address all of the objectives from these lines of effort in the strategic plan. CISA officials also stated that the agency is unlikely to develop additional operations plans for the other two lines of effort—providing security assistance to political campaigns, and raising public awareness on foreign influence threats and building resilience. The officials stated that, given the limited amount of time remaining before election preparation activities commence, the agency decided to prioritize developing a plan for the first line of effort that addresses the primary customers of the agency’s election services. In the absence of completed strategic and operations plans, a CISA official in one region stated in October 2019 that the region is moving forward with its own strategy for assisting states and local jurisdictions because the 2020 election cycle is scheduled to start with state primary elections in the region in March 2020. The lack of finalized plans can affect CISA’s achievement of higher-level objectives that take time to accomplish, such as building stakeholder capacity and public awareness. Until CISA finalizes its strategic and operations plans for supporting elections in 2020 and ensures that the operations plan fully addresses all of the aspects of its strategic plan, CISA will not be well-positioned to execute a nationwide strategy for securing election infrastructure prior to the start of 2020 election activities. DHS’s National Infrastructure Protection Plan, which provides strategic direction for national, critical infrastructure protection efforts, calls for sector-specific agencies to coordinate lessons learned and corrective actions and rapidly incorporate them to improve future efforts. Further, GAO’s Standards for Internal Control calls for management to document corrective action plans to remediate internal control deficiencies in a timely manner following the reporting and evaluation of issues. CISA has identified various challenges related to its election assistance efforts; however, the agency has not yet documented plans that address them. Following the 2018 midterm elections, CISA and the RAND Corporation conducted two reviews of CISA’s efforts supporting the elections, in order to inform strategic planning and strengthen future operations. The first review, conducted by the RAND Corporation under a contract with DHS, assessed election security operations that CISA undertook from January 2017 through the November 2018 midterm elections. The review relied upon input from DHS personnel, the EI- ISAC, associations representing state election officials, and election system vendors to identify lessons learned from CISA’s activities to assist in securing election infrastructure. In the second review, CISA conducted an after action review covering its efforts to assist in securing election infrastructure from September 2018 to December 2018, based on input from personnel within DHS and its federal partners who participated in the agency’s election security operations. Both reviews identified various challenges that CISA needed to address in its planning for 2020. For example, the RAND review cited challenges related to the services and threat briefings CISA provided to states and local jurisdictions. The review noted, among other things, that CISA: lacked an approach for prioritizing its activities based on election security risks, which could limit the agency’s ability to dedicate increased attention and resources to the jurisdictions with the highest risk; did not adequately tailor services, which could have made it more difficult to meet the resource and time constraints of customers such as local election jurisdictions; and did not always provide actionable recommendations in DHS classified threat briefings or make unclassified versions of the briefings available, which may have hindered election officials’ ability to effectively communicate with information technology and other personnel in their agencies who did not have clearances. Additionally, the CISA after action report identified a number of internal operational challenges associated with its election-related efforts in 2018. For example, the report cited: a lack of understanding by CISA headquarters staff of the roles and functions of regional field staff, which led to redundant requests for information from headquarters staff to regional staff; the lack of a single agency-wide platform to maintain an awareness of election threats, which resulted in confusion among CISA personnel about which threat information was accurate and current; and the inability of CISA personnel supporting election security operations to access social media websites from situational awareness rooms, which hindered their collection and analysis of threat information. Further, both reviews cited challenges regarding CISA’s ability to manage incident information and provide Election Day incident response capabilities in the event of a compromise. For example, with regards to the 2018 election, the reviews noted: few capabilities that CISA field staff could quickly provide on Election Day, which could limit the agency’s timeliness in mitigating or responding to an incident; a lack of clarity regarding CISA’s incident response capabilities in the event of a compromise that exhausts state and local resources, which may limit knowledge about agency capabilities that are available; and a lack of outreach and situational reporting on incidents, threats, and trends on Election Day from headquarters to regional staff following the closure of the polls on the East Coast, which hindered CISA’s coordination of such information with state and local officials. While CISA identified challenges related to its prior efforts, it has not developed plans to address them. According to a CISA official, the agency does not intend to develop a separate plan addressing how it will remediate the identified challenges in the RAND report. Rather, CISA officials noted that the agency plans to address the challenges from that report in the strategic plan and operations plan that it is developing. In addition, the officials noted that CISA may address challenges through other actions that the agency expects to take, such as hiring additional staff. However, CISA’s draft strategic plan, as of November 2019, had only addressed three challenges from the RAND report—countering the threat of disinformation, clarifying how CISA is to support political campaigns, and prioritizing outreach to local jurisdictions. The extent to which the strategic plan, when finalized, will address the other outstanding challenges remains unclear. In addition, the extent to which the operations plan will document how the agency is to address challenges in the RAND report remains uncertain as the operations plan has not yet been completed. Further, CISA has not documented how the agency is to address challenges in the RAND report through other actions that it expects to take before the 2020 elections. Similarly, CISA officials stated that the agency intends to address a subset of the challenges from CISA’s after action report in its anticipated operations plan. However, the extent to which the operations plan will document how the agency is to address challenges in the after action report remains unclear, given that the operations plan has not yet been completed. Without documented plans that address prior challenges, CISA will not be well-positioned to effectively address the challenges identified in prior reviews. This includes addressing how CISA will coordinate among its personnel and provide accurate threat information and other capabilities that address the needs of the election infrastructure community in the remaining months ahead of the 2020 elections. With primary elections beginning in February 2020 and culminating in the general election in November 2020, CISA has limited time remaining to help states and local election jurisdictions protect their election infrastructure in advance of these elections. State and local election officials that we contacted have been generally satisfied with CISA’s election security efforts. However, CISA’s unfinished planning means the agency may be limited in its ability to execute a nationwide strategy for securing election infrastructure. In particular, the #Protect2020 Strategic Plan’s higher-level objectives—such as building stakeholder capacity and public awareness—necessarily take time to accomplish. In addition, CISA has not fully assessed and documented how it will address challenges identified in prior assessments, which limits the ability of CISA to address these challenges in its current efforts. We are making three recommendations to the Director of the Cybersecurity and Infrastructure Security Agency: The CISA Director should urgently finalize the strategic plan and the supporting operations plan for securing election infrastructure for the upcoming elections. (Recommendation 1) The CISA Director should ensure that the operations plan fully addresses all lines of effort in the strategic plan for securing election infrastructure for the upcoming elections. (Recommendation 2) The CISA Director should document how the agency intends to address challenges identified in its prior election assistance efforts and incorporate appropriate remedial actions into the agency’s 2020 planning. (Recommendation 3) DHS provided written comments on a draft of this report, which are reprinted in appendix III. In its comments, the department concurred with all three of our recommendations and identified actions that it plans to take to implement each of the recommendations. For example, the department stated that CISA intends to finalize its strategic and operations plans by February 14, 2020. The department noted that these plans are to provide a strategic overview and operational framework in support of the primaries and the general election in 2020. Further, the department stated that the operations plan, when finalized, is to address all lines of effort in the strategic plan. In addition, the department noted that both the strategic and operations plans are to further document DHS’s plans to address challenges identified during the 2017-2018 election cycle. If implemented effectively, the actions that DHS plans to take in response to the recommendations should address the weaknesses that we identified during our review. DHS and CISA officials also provided technical comments, which we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, the Director of the Cybersecurity and Infrastructure Security Agency, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact Vijay A. D’Souza, Director, Information Technology and Cybersecurity, at (202) 512-6240 or dsouzav@gao.gov or Rebecca Gambler, Director, Homeland Security and Justice, at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. The election process relies on various assets—such as information technology systems, networks, equipment, and facilities—that can be broadly categorized as physical, cyber, and human components of the Election Infrastructure Subsector. The assets and components of the election infrastructure are susceptible to a variety of unintentional, or nonadversarial, and intentional, or adversarial, threats. The table below identifies sources of cybersecurity threats to election infrastructure. The Department of Homeland Security, through the Cybersecurity and Infrastructure Security Agency (CISA), has taken steps to assist state and local election officials in securing election infrastructure by providing a variety of services on a voluntary, no cost basis. These services include cybersecurity assessments, detection and prevention activities, and information sharing. The table below identifies voluntary services that CISA offers to states and local election jurisdictions. In addition to the contacts named above, Josh Leiling (Assistant Director), Tom Jessor (Assistant Director), Torrey Hardee (Analyst-in-Charge), Roger Bracy, Rebecca Eyler, Richard Hung, Amanda Miller, Heidi Nielson, Monica Perez-Nelson, Jeff Tessin, Eric Warren, and Haley Weller made significant contributions to this report.", "summary": "In January 2017, the Secretary of Homeland Security designated election infrastructure as a critical infrastructure subsector. The designation allowed DHS to prioritize assistance to state and local election officials to protect key election assets, including voter registration databases and voting equipment. The Conference Report (H. Rep. No. 116-9) accompanying the 2019 Consolidated Appropriations Act included a provision for GAO to examine how DHS is implementing key responsibilities to help protect the election infrastructure and the reported benefits and challenges of such efforts. This report addresses (1) DHS's election security efforts and selected election officials' perspectives on them, and (2) DHS's planning for the 2020 elections. GAO reviewed DHS's strategies, plans, and services provided to election officials. GAO also interviewed DHS officials, representatives of the EI-ISAC, a DHS-funded center responsible for sharing threat information nationwide, and election officials from eight states and three local jurisdictions. GAO selected the states and local jurisdictions to provide geographic diversity and variation in election administration, among other factors. The results from these states and localities are not generalizable, but provide insight into election officials' perspectives on DHS's efforts. Since the 2017 designation of election infrastructure as critical infrastructure, the Department of Homeland Security (DHS), through its Cybersecurity and Infrastructure Security Agency (CISA), has assisted state and local election officials in securing election infrastructure through regional support and assistance, education, and information sharing. Such efforts help state and local election officials protect various election assets from threats (see figure). In August 2019, the CISA Director identified election security as one of the agency's top five operational priorities. CISA security advisors, who are located throughout the country, consult with state and local election officials and identify voluntary, no cost services that CISA can provide. According to CISA, as of November 2019, 24 cybersecurity advisors and 100 protective security advisors perform and coordinate cyber and physical security assessments for the 16 critical infrastructure sectors, including the Election Infrastructure Subsector. Technical teams at CISA headquarters generally provide the services, once requested. To further assist state and local election officials, CISA conducted two exercises simulating real-world events and risks facing election infrastructure in August 2018 and June 2019. According to CISA, the 2019 exercise included 47 states and the District of Columbia. In addition, CISA has funded the Election Infrastructure Information Sharing and Analysis Center (EI-ISAC). According to CISA officials, the EI-ISAC is the primary mechanism for exchanging information about threats and vulnerabilities throughout the election community. The EI-ISAC director reported that, as of November 2019, its members included 50 states, the District of Columbia, and 2,267 local election jurisdictions, an increase from 1,384 local jurisdictions that were members in 2018. As a result of its efforts, CISA has provided a variety of services to states and local election jurisdictions in the past 2 years (see table). State election officials with whom GAO spoke were generally satisfied with CISA's support to secure their election infrastructure. Specifically, officials from seven of the eight states GAO contacted said that they were very satisfied with CISA's election-related work. Also, officials from each of the eight states spoke positively about the information that they received from the EI-ISAC. Further, officials from five states told GAO that their relationship with CISA had improved markedly since 2017 and spoke highly of CISA's expertise and availability. To guide its support to states and local election jurisdictions for the 2020 elections, CISA reported that it is developing strategic and operations plans. CISA intended to finalize them by January 2020, but has faced challenges in its planning efforts due to a reorganization within CISA, among other things. In the absence of completed plans, CISA is not well-positioned to execute a nationwide strategy for securing election infrastructure prior to the start of the 2020 election cycle. Further, CISA's operations plan may not fully address all aspects outlined in its strategic plan, when finalized. Specifically, according to CISA officials, the operations plan is expected to identify organizational functions, processes, and resources for certain elements of two of the four strategic plan's lines of effort—protecting election infrastructure, and sharing intelligence and identifying threats. CISA officials stated that CISA was unlikely to develop additional operations plans for the other two lines of effort—providing security assistance to political campaigns, and raising public awareness on foreign influence threats and building resilience. Moreover, CISA has not developed plans for how it will address challenges, such as concerns about incident response, identified in two reviews—one conducted by CISA and the other done by an external entity under contract—of the agency's 2018 election security assistance. Challenges that the reviews identified include: inadequate tailoring of services, which could have made it more difficult for CISA to meet the resource and time constraints of customers such as local election jurisdictions; not always providing actionable recommendations in DHS classified threat briefings or making unclassified versions of the briefings available, which may have hindered election officials' ability to effectively communicate with information technology and other personnel in their agencies who did not have clearances; the inability of CISA personnel supporting election security operations to access social media websites from situational awareness rooms, which hindered their collection and analysis of threat information; few capabilities that CISA field staff could quickly provide on Election Day, which could limit the agency's timeliness in responding to an incident; and a lack of clarity regarding CISA's incident response capabilities in the event of a compromise that exhausts state and local resources, which may limit knowledge about agency capabilities that are available. Although CISA officials said that the challenges identified in the reviews have informed their strategic and operational planning, without finalized plans it is unknown whether CISA will address these challenges. GAO is making three recommendations to the CISA Director to (1) urgently finalize the strategic plan and the supporting operations plan for securing election infrastructure for the upcoming elections, (2) ensure that the operations plan fully addresses all lines of effort in the strategic plan for securing election infrastructure for the upcoming elections, and (3) document how the agency intends to address challenges identified in its prior election assistance efforts and incorporate appropriate remedial actions into the agency's 2020 planning. DHS concurred with all three recommendations and provided estimated dates for implementing each of them.", "document_type": "gao"}
{"report": "Most communities in the nation experience some kind of flooding, which may occur after substantial spring rains, heavy thunderstorms, winter snow thaws, or heavy storms over a large body of water. Flood risk management includes the appropriate use of structures such as levees and floodwalls, as well as nonstructural measures such as land acquisition and structure relocation, to reduce the risk of loss of life, reduce long-term economic damage to the public and private sectors, and improve the natural environment. Flood risk management is one of the Corps’ three primary missions. For fiscal years 2015 through 2017, the Corps requested more than $3 billion for 71 construction projects that fell within its three missions, of which the largest amount—$1.33 billion—was for 33 construction projects in the flood risk management mission. Located within the Department of Defense, the Corps has both military and civilian responsibilities. Through the Civil Works Program, the Corps plans, constructs, operates, and maintains a wide range of water resources development projects such as navigation and flood risk projects. The Assistant Secretary of the Army for Civil Works, appointed by the President and confirmed by the Senate, sets the strategic direction for the program and has principal responsibility for the overall supervision of functions relating to the Army’s Civil Works Program. The Chief of Engineers, a military officer, is responsible for execution of the civil works and military missions. The Civil Works Program is organized into three tiers: headquarters in Washington, D.C.; eight regional divisions; and 38 local district offices. (See fig. 2.) The Corps develops water resource projects, including flood risk management projects, in conjunction with nonfederal sponsors such as state and local governments. According to Corps guidance, the planning process for these projects begins with the nonfederal sponsor identifying a problem and approaching the Corps to help develop a solution. Upon congressional authorization for a study and appropriations to fund it, the Corps and the nonfederal sponsor establish an agreement to conduct a feasibility study for a potential project. The Corps initiates a feasibility study by forming a project team comprised of Corps engineers, economists, planners, and possibly other specialists such as nonfederal consultants to conduct the study. The planning process the Corps uses to carry out feasibility studies is described later in our report. Nonfederal sponsors are to participate in the planning process, as well as remain involved through project design, construction, and post-project operations and maintenance. For example, for projects in which the Corps constructs infrastructure such as a flood wall, the nonfederal sponsor is to assume responsibility for monitoring and maintenance costs associated with the flood wall after its construction. The U.S. Water Resources Council’s Principles and Guidelines outlines the principles and procedures the Corps is to follow for planning water resources development projects, including those with flood risk management objectives. The Principles and Guidelines states that the federal objective of water resources development projects is to contribute to national economic development while protecting the nation’s environment. The Corps implements the planning process outlined in the Principles and Guidelines by conducting feasibility studies for proposed water resources development projects. The Corps’ Planning Guidance provides detailed guidance on how to implement the general process outlined in the Principles and Guidelines for planning water resource projects. The Corps’ National Economic Development manuals provide supplemental guidance for the economic analysis of different types of projects—including flood risk management—and how to evaluate the benefits and costs associated with each type of project. To identify the beneficial and adverse effects of each alternative plan considered for a project, the Corps uses four categories of analysis established in the Principles and Guidelines: (1) National Economic Development, (2) Environmental Quality, (3) Regional Economic Development, and (4) Other Social Effects, as shown in table 1. The Corps’ Planning Guidance states that feasibility studies may evaluate the effects of alternative plans using the four categories of analysis, but the evaluations under two categories—National Economic Development and Environmental Quality—must be presented in each feasibility study. According to the Corps’ Planning Guidance, the National Economic Development category requires an economic analysis of each plan’s potential economic benefits and costs in monetary terms, while the Environmental Quality category evaluates each plan’s potential nonmonetary effects such as effects on habitat quality and quantity. The Planning Guidance states that using these categories of analysis provides a basis for determining which alternative plans should be eliminated from consideration, modified, or selected for further analysis. The Corps’ followed the six-step planning process for water resources development projects outlined in its Planning Guidance to identify and evaluate the beneficial and adverse effects of alternative plans for flood risk management projects and select a recommended plan for the eight feasibility studies we reviewed. In the initial three steps of the planning process, the Corps (1) identified the objectives and other parameters of the project; (2) inventoried and forecasted water and related land resources conditions within the planning area; and (3) formulated alternative plans for further consideration. In the final three steps of the planning process, the Corps (1) evaluated and analyzed each alternative plan for its economic, environmental, and other effects, (2) compared the alternative plans to each other, and (3) selected a recommended plan. Corps officials told us that this six-step process is the basic template for planning water resources development projects across all Corps mission areas. (See fig. 3.) For each of the eight studies we reviewed, the Corps followed this template and addressed each of the six steps in planning the proposed flood risk management project, as we describe below. Each study identified objectives, problems, opportunities, and constraints for the project. According to the Corps’ Planning Guidance, identification of problems and opportunities is the foundation for scoping the planning process and should begin as soon as practicable after the decision to initiate a feasibility study. Planning objectives describe the desired results of the process by solving the problems and taking advantage of the opportunities identified. Constraints are restrictions that limit the planning process and are unique to each study. Such constraints can be, for example, limitations imposed by policy or law. All of the studies we reviewed had the objective of reducing or managing flood risk and damages in response to problems such as historic river or stream flooding in the planning area. The studies identified opportunities, such as improving the community’s understanding of flood risk and resiliency from flood events. The studies also identified constraints, such as the need for the plan to incorporate extensive transportation infrastructure within some of the planning areas. The studies inventoried historic and existing water and related land resource conditions and forecasted future conditions within the planning area relevant to the identified problems and opportunities from step one. According to the Corps’ Planning Guidance, the Corps is to use quantitative and qualitative descriptions of critical resources in the planning area to define existing and future without-project conditions— that is, the conditions if no project is constructed. The defined without- project conditions provide the basis from which the Corps formulates alternative plans and assesses impacts. The studies we reviewed inventoried the existing conditions for the planning area. This inventory included geology, groundwater, surface water, hydrology, water quality, biological resources, cultural resources, land use, recreation, air quality, climate change, transportation, public health and safety, public services, utilities, socioeconomics, and environmental justice. The Corps used these existing conditions to forecast the future without-project conditions, such as increasing flood risk for residential and industrial development, culturally significant communities, or specific infrastructure such as a regional wastewater facility. The studies formulated alternative plans for the project, including a range of structural and nonstructural measures and strategies. According to the Corps’ Planning Guidance, an alternative plan consists of a system of management measures, that is, structural and/or nonstructural measures, strategies, or programs formulated to meet the project objectives subject to the planning constraints. The Corps is to identify a range of alternative plans at the beginning of the planning process, screen the plans, and refine them in subsequent iterations throughout the planning process. The Planning Guidance also states that as the Corps develops the alternative plans, it must consider the criteria of completeness, efficiency, effectiveness, and acceptability. In the eight studies we reviewed, the Corps followed an iterative approach to identify measures and form alternative plans. For example, the studies generally identified an initial array of structural and nonstructural measures for conceptual screening, followed by the grouping of viable measures into alternative plans for screening under the criteria, resulting in an array of plan alternatives for more detailed analysis of the beneficial and adverse effects (monetary and nonmonetary) of each. According to Corps officials, flood risk management studies must consider a minimum of two plans— no action and an alternative—and one of the plans considered must be nonstructural. All eight studies we reviewed adhered to this requirement and considered a variety of alternative plans for each proposed flood risk management project. The studies evaluated each alternative plan—including its beneficial and adverse effects—through a comparison of the with-project and without- project conditions. According to the Corps’ Planning Guidance, evaluation consists of (1) forecasting the most likely with-project (e.g., with the alternative plan constructed) condition expected under each alternative plan; (2) comparing each with-project condition to the without-project condition and documenting the differences between the two; (3) characterizing the beneficial and adverse effects; and (4) identifying the plans that will be further considered in the planning process. The studies we reviewed used the categories established in Corps guidance— the National Economic Development and Regional Economic Development categories for monetary benefits and costs and the Environmental Quality and Other Social Effects categories for nonmonetary (quantitative and qualitative) effects—to evaluate and display the beneficial and adverse effects of plan alternatives. The categories and specific types of monetary benefits and costs and nonmonetary effects that the Corps evaluated varied for each study depending on the planning area conditions and the measures and strategies included in the alternative plans. In the studies we reviewed, the economic analyses of monetary effects generally resulted in an estimated net dollar value of benefits (benefits minus costs) expected with each alternative in place, while the analysis of nonmonetary effects generally resulted in a Corps judgment about the net qualitative effect or net quantitative effect (e.g., net units of habitat created) for each alternative. The studies compared the alternative plans based on the economic analysis of benefits and costs and on the evaluations of environmental and other effects. According to the Corps’ Planning Guidance, the alternative plans (including the no-action plan) are to be compared with each other, with emphasis on the outputs and beneficial and adverse effects that will have the most influence in the decision-making process. Such a comparison is to include monetary and nonmonetary benefits and costs and identify and document trade-offs to support the final recommendation. In the studies we reviewed, the Corps compared project effects in a variety of ways, for example, in a series of narratives describing the beneficial and adverse effects of alternative plans, or a grid for side-by-side comparison of selected effects for plan alternatives. In some studies, this comparison included an incremental process in which the Corps considered incorporating additional measures or approaches into an alternative to further optimize the trade-off between beneficial and adverse effects. The result of this step was a final group of plans that the Corps considered for recommendation. The Corps recommended a plan based on the comparison of the alternative plans. According to the Corps’ Planning Guidance, the Corps should recommend a single alternative plan that must be shown to be preferable to taking no action (if no action is not recommended) or implementing any of the other alternatives considered during the planning process. In the studies we reviewed, the recommended plan and the rationale for its selection were identified in the analyses and underwent internal technical review at the district, division, and headquarters levels. The Chief of Engineers signed and submitted the proposed plan for the project—known as the Chief’s Report—to the Office of the Assistant Secretary for review, and the Secretary submitted the report to Congress for authorization. All eight of the studies we reviewed included step 4 of the Corps’ six-step planning process: an economic analysis of the benefits and costs of each proposed project as well as an Environmental Quality analysis, as called for in the Corps’ Planning Guidance. The inclusion of the other two types of analyses—Regional Economic Development and Other Social Effects—are not required, but six of the studies included them. The Principles and Guidelines provide the Corps with general flexibility to choose which benefit and cost categories to include in these analyses. The Corps’ Planning Guidance states the federal government’s and project’s objectives guide the planning process, which includes benefit and cost category selection. The monetary benefits most commonly included in the economic analyses of the Corps feasibility studies we reviewed were reduced damages and emergency costs avoided, as shown in table 2. The Corps included reduced damage benefits in each of the eight studies we reviewed. Reduced damages result from actions such as performing physical modifications to property designed to reduce the frequency of flood damage, relocating structures, or installing flood warning and preparedness systems. For example, a feasibility study for a proposed project in the New York District outlined a plan to modify channels that line the Mamaroneck and Sheldrake Rivers with the goal of reducing the risk of life and property damage within the Village of Mamaroneck. The Corps also included emergency costs avoided as benefits in four of the eight studies we reviewed. Emergency costs include expenses resulting from a flood that otherwise would not be incurred. For example, some of the emergency costs avoided for this proposed project in the New York District included the costs of evacuation, reoccupation, flood fighting, and increased operations, police, fire, and military patrol. Depending on the potential effects of the plan alternatives considered, some studies included monetary benefits from recreation, reduced maintenance costs, flood insurance administrative savings, or reduced transportation disruptions in their economic analyses, but these were not commonly considered in the studies we reviewed. The Corps considered a variety of monetized costs in its economic analyses for feasibility studies we reviewed, as shown in table 3. Among the most commonly included costs in each of the eight studies were for construction; operation, maintenance, repair, replacement, and rehabilitation (OMRR&R); and real estate. Specifically: Construction costs. These are the direct costs of installing project measures. For example, the Honolulu District study included the costs of constructing six in-stream debris and detention basins above a watershed, floodwalls along a canal, an earthen levee, and two pump stations. OMRR&R costs. These represent the current monetary value of materials, equipment, services, and facilities needed to operate the project and make repairs, rehabilitations, and replacements necessary to maintain project measures in sound operating condition during the period of analysis. For example, the Wilmington District study included OMRR&R costs for conducting visual inspections of the levee, mowing twice a year, and conducting video inspections of pipes and culverts every 5 years. Real estate costs. These include activities such as buying out residential structures and demolishing them. For example, the San Francisco District study included real estate costs to acquire approximately 900 acres of city-owned land for ecosystem restoration and levee, road, and temporary work easements. Depending on the potential effects of the plan alternatives considered, some of the studies we reviewed included environmental costs; relocations; planning, engineering, and design; and the costs for cultural resource preservation, recreation, and flood warning systems. In addition to the required economic analysis of benefits and costs, the Corps included other analyses to evaluate monetary and nonmonetary project effects in the flood risk management feasibility studies we reviewed. These included the Environmental Quality, Regional Economic Development, and Other Social Effects analyses. All the studies we reviewed included the Environmental Quality analysis; six studies included the Regional Economic Development or Other Social Effects analyses, as shown in table 4. Corps officials said the additional analyses were included in studies because the analyses were needed to determine the best project design, help make planning decisions, or respond to local sponsors’ preferences. Examples of some additional analyses conducted in different districts include the following: Regional Economic Development effects. In the Sacramento District study, the Corps considered ways reduced flooding could increase local business revenue and short-term construction employment but reduce employment because of loss of damage to businesses, among other effects. The Corps also considered how its expenditures for various services and products during the project were expected to generate additional economic activity, such as through additional jobs, income, and sales. In this case, the Corps estimated the project might add 18,930 jobs in the region. According to a 2011 Corps handbook, considering Regional Economic Development effects can provide a better understanding of the overall impact to the region. Doing so also examines the potential impacts mainly to the localized or regional economic area, instead of the nation as a whole. Other Social Effects. In the Wilmington District study, the Corps considered security of life, health, and safety; preservation of historic significance; and the impacts to cultural resources. According to a 2009 Corps handbook, considering the Other Social Effects analysis has great potential value for better ensuring that water resources solutions address a broad array of issues and concerns that better meet stakeholder needs and expectations. In most of the studies we reviewed, the Corps recommended the alternative plan with the greatest net economic benefits based on the results of its economic analyses. In some cases, however, the Corps relied on other analyses to address different project objectives or the preferences of the local nonfederal sponsors. The Corps’ Planning Guidance directs that the project alternative with the greatest net economic benefit, consistent with protecting the nation’s environment, be selected for recommendation unless an exception is granted. The Assistant Secretary of the Army for Civil Works has the authority to grant exceptions if federal, state, local, or international concerns exist. The Planning Guidance states that projects may deviate from the alternative plan with the maximum net benefits if requested by the nonfederal sponsor and approved by the Assistant Secretary of the Army for Civil Works. Such plan alternatives are referred to by the Corps as the locally preferred plan, with the nonfederal sponsor responsible for any project costs in excess of the costs of the plan with the highest net benefits. The Corps conducted economic analyses in each of the eight studies we reviewed, resulting in a wide range of monetary benefits and costs for the recommended project plan alternatives. Table 5 shows the monetized benefit and cost information that helped the Corps select recommended plans in the eight studies. The annualized project benefits ranged from approximately $500,000 to $210.6 million, and annualized project costs ranged from about $1 million to $65 million, resulting in annual net benefit estimates ranging from approximately -$500,000 to $146 million. For five of the eight studies we reviewed, the Corps primarily used the results of the economic analysis of benefits and costs to recommend a plan with the greatest net benefits from among the alternatives, in accordance with the Planning Guidance. These five studies were with the New York, Honolulu, Sacramento, Nashville, and Kansas City Corps districts. Three of the eight studies we reviewed relied on other analyses as allowed under the Planning Guidance to address different project objectives or the preferences of the local nonfederal sponsors. Corps officials said they relied on other analyses when needed to determine the best project design, help make decisions, or respond to local nonfederal sponsors’ preferences. Specifically: Chicago District. The Chicago District recommended a project based on two separate analyses. Specifically, the project team recommended an alternative plan based on an economic analysis for the flood risk management objective and separate analyses for an ecosystem restoration objective. A Corps document stated that by doing so, the proposed project would help both manage flood risks and restore ecosystems in the watershed. In addition, the study said the recommended plan attempts to maximize the net benefits and find balance between both objectives. Wilmington District. The Wilmington District study indicated that the Corps recommended the locally preferred alternative plan, after receiving approval to do so, instead of the alternative plan with the greatest net benefits at the request of the nonfederal sponsor. The locally preferred alternative plan was recommended so it could incorporate consideration of potential other social effects, such as life and safety risk, and regional economic development, such as employment created during and after construction. By doing so, the study indicated Corps officials responded to local priorities and the recommendations provided by the President’s Council on the Future of Princeville, North Carolina. According to the study, the Corps considered impacts to community cohesion, cultural and historical values, local per capita and household incomes in comparison to national averages, and other factors not captured in an economic analysis. San Francisco District. The San Francisco District study indicated that the Corps based its alternative plan recommendation on a combination of multiple objectives and local preference. The recommended alternative plan’s objectives included reducing the risk of tidal floods as well as restoring the ecosystem to tidal marsh habitat. The Corps selected the recommended alternative plan because the nonfederal sponsor wanted to provide additional transitional habitat and greater flood risk management for Federal Emergency Management Agency accreditation over the 50-year study period. Specifically, the local preference was to build the levee about 3 feet higher than the plan with the greatest net benefits— thereby potentially reducing public health and safety risks associated with flooding more than the alternative plan with the greatest net benefit. The economic analyses for the eight studies we reviewed generally met three of the five key methodological elements and partly met two key elements—analysis of effects and transparency. Our Assessment Methodology for Economic Analysis (Assessment Methodology) identifies five key methodological elements to the baseline structure of an economic analysis. For the analysis of effects element, the Corps has either taken steps to address certain best practices or indicated the agency is limited in adopting other practices due to statutory requirements. For the transparency element, Corps officials acknowledged that transparency could be improved through its review process. According to our Assessment Methodology, an economic analysis should state the action examined and the justification for the action. In addition, the objective of the analysis should be stated; the scope of the analysis should be designed to address the objective; and the analysis period should be long enough to encompass the important economic effects of the proposed action. We found that all eight analyses generally met this key element. For example, all eight economic analyses indicated that the actions examined included the evaluation of flood risk management improvements for resolving flooding problems. In addition, the analyses provided specific planning objectives, such as to reduce flood risks in the relevant watershed over the 50-year analysis period and to improve the quality of life for local neighborhoods. Furthermore, all eight analyses used a 50- year analysis period to analyze benefits and costs—a period that should be long enough to encompass important economic effects, though several studies assumed that economic conditions would remain the same over that time period. For example, the analysis for the Honolulu District’s flood risk management study assumed that the inventory of homes and businesses in the flood plain would not change over the 50- year analysis period. According to the analysis, the project area includes sites that are underutilized or not fully developed, but uncertainty about how development might proceed made it difficult to project what changes might occur. The study acknowledged that changes in the business and residential makeup of the watershed over the 50-year period would occur but that the exact nature of these changes could not be projected with any degree of certainty. In addition, two of the eight studies involved multipurpose projects and specified additional economic-related objectives for ecosystem restoration. For example, the analysis for the San Francisco District’s feasibility study indicated that it was designed to evaluate and compare the economic justification and cost effectiveness of various measures to reduce flood risk and provide ecosystem restoration in South San Francisco Bay. Similarly, the Chicago District’s study indicated that in developing an ecosystem restoration plan, undeveloped lands throughout the watershed were evaluated to determine whether cost-effective aquatic ecosystem restoration at that site was possible and what measures would provide the lowest incremental cost per unit of habitat output. Our Assessment Methodology recommends that an analysis used to examine economic effects should identify and compare alternatives. In addition, the analysis should consider a range of relevant alternatives and should justify that the economic conditions specified under each alternative considered represent the best assessment of conditions under that alternative. We found that all eight economic analyses generally met this key element. For example, all eight economic analyses examined the economic effect of the proposed flood control actions by comparing a range of alternatives, including various structures such as levees or bridge modifications, as well as nonstructural measures such as floodplain management activities or acquisition of land and removal of people from the flood plain. Moreover, the economic analyses in the studies generally described and justified the economic conditions that would be expected under each alternative. For the two studies that also evaluated ecosystem restoration alternatives, the studies considered alternatives for restoring ecosystems. Our Assessment Methodology recommends that the economic analysis be clearly written, include a plain language summary, and provide clearly labeled tables that describe the data used and the results. Also, the analysis should document that it complies with a robust quality assurance process. We found that all eight economic analyses generally met this key element. For example, all eight economic analyses were generally clearly written and included tables that generally described data and results. In addition, seven of the feasibility studies included a plain language summary. Six of the studies indicated that the analyses complied with a robust quality assurance process, in which the analyses were reviewed at the Corps district and by technical and policy experts in headquarters. Corps guidance indicates that the quality assurance process for feasibility studies involves reviews for technical quality and policy compliance, among other considerations, at the Corps district and in headquarters. Further, three studies indicated that an independent external peer review had been conducted. While one study completed in the Nashville District did not indicate whether the study complied with a quality assurance process, district officials told us a thorough review was conducted that included multiple district quality control reviews, agency technical review and headquarters policy reviews, and an independent external peer review. In addition, a study completed in the Chicago District did not indicate that it had undergone an independent external peer review. Our Assessment Methodology recommends that an economic analysis quantify the important costs and benefits and monetize these quantitative effects using the concept of opportunity cost—the maximum worth of a good or input among possible alternatives. The criterion of net present value, or related outcome measures, should be applied to compare these effects across alternatives. In addition, the analysis should control for inflation and use economically justified discount rates. Where important costs and benefits cannot be quantified, the analysis should show how they affect the comparison of alternatives. We identified areas in which the studies did not fully align with certain best practices for various reasons, such as the Corps’ concerns about the reliability of available methods and statutory requirements regarding the use of discount rates. These best practices included: Quantifying and monetizing important benefits and costs. The economic analyses in all eight studies quantified and monetized important benefits and costs associated with each alternative, such as property damage reductions and construction costs. The Corps’ Planning Guidance indicates that studies should consider analyzing loss of life in the Other Social Effects category, in either monetary, quantitative, or qualitative terms. Project alternatives that reduce the risk of flooding or that relocate people from the flood plain may lower the risk that individuals living or working in a flood plain will drown or become injured during flood events. However, the analyses in the eight studies we reviewed generally did not quantify and monetize the effect of project alternatives on loss of life. One of the studies we reviewed quantified these effects, but only for the recommended plan. Specifically, the Sacramento District’s flood risk management study found that the recommended plan, which involved the improvement of an existing levee system, could reduce fatalities during flood events by about 67 percent. Of the other seven studies that we reviewed, six analyses included a qualitative discussion of the effects of alternatives on loss of life, and one analysis did not include an assessment of these effects. A recent National Academy of Sciences study on coastal storm flooding indicated that the practice of quantifying and valuing reductions in loss of life is widespread in the federal government, allowing these risk reductions to be included in the economic analysis. In July 2017, after the eight studies that GAO reviewed were completed, the Corps issued revised guidance requiring flood risk management studies to include a quantitative assessment of loss of life for each alternative when it is a significant factor. Corps officials said they had not attempted to monetize loss of life because of concerns about the reliability of available valuation methods but are monitoring other agencies’ efforts to value these effects and following economic research in the area. Using net present value criterion. Analyses for seven studies we reviewed compared the flood risk management alternatives and identified the alternative expected to maximize net benefits on a comparable, present-value basis (that is, on an “annualized” basis). However, one economic analysis did not clearly indicate whether the costs associated with the flood risk management alternatives were annualized and therefore comparable to the annualized benefits. Controlling for inflation and use of economically justified discount rates. Although all the economic analyses in all eight Corps studies we reviewed controlled for inflation by expressing benefits and costs in “real” terms, the discount rates that the studies used to convert future benefits and costs to present values were in nominal terms. In general, real and nominal values are not combined in the same analysis. Specifically, discounting real benefits and costs with a nominal discount rate understates present values when holding all else the same. Corps officials said that they are aware of this inconsistency, but they have no latitude to use a real discount rate because the Water Resources Development Act of 1974 requires the Corps to use nominal discount rates. Corps officials acknowledged areas in which the eight Corps studies we reviewed partly met the Analysis of Effects key methodological element. However, as noted, the Corps has taken some steps to address one best practice. Specifically, the Corps’ recently revised guidance, which requires quantification of loss of life effects when significant, should allow the Corps to provide decision makers and stakeholders with more precise information about the relative magnitude of these effects in future economic analyses. In terms of the best practice regarding economically justified discount rates, the Corps has not taken steps because it is required to use the statutorily specified nominal discount rates. Our Assessment Methodology recommends that analyses be transparent with respect to their analytical choices, assumptions, and data used. The methodology further recommends (1) evaluating how plausible adjustments to each choice and assumption may impact the estimates of the cost-and-benefit effects and results of the comparison of alternatives and (2) clearly explaining the implications of the key limitations in the data and models used. Where feasible, to ensure transparency, the analysis is to adequately quantify how the statistical variability of the key data elements underlying the estimates of the economic analysis impacts these estimates and the results of the comparison of alternatives. We found that the studies we reviewed did not fully use some best practices related to transparency. Specifically: Being transparent with respect to analytical choices, assumptions, and data used. The economic analyses in the eight studies described and justified several, but not all of the analytical choices, assumptions, and data. For example, to approximate the amount of damages to structures at different flood depths, the Wilmington District’s feasibility study relied on standardized “depth- damage curves” developed by the Corps’ New Orleans District. Corps guidance indicates that standardized curves can be used in the absence of regionally developed data. According to the study, data for structures in the study area were unavailable, and flooding characteristics were similar in the two areas, with both study areas covering urbanized and rural areas representing a mix of residential, commercial, and industrial development with similar types of construction. However, other data and assumptions used by the studies in our review were not fully described or justified. For example, in presenting its results for an initial screening of several flood risk management alternatives, the Sacramento District’s economic analysis relied on cost estimates from several different sources, including prior studies and private consultants. The analysis, however, did not explain how the estimates were developed or justify why the estimates were sufficiently reliable for evaluating alternatives. Clearly explaining the implications of key limitations in the data and models used. With one exception, the economic analyses we reviewed generally did not discuss the implications of key limitations in the models used in the studies. Specifically, the economic analysis for the Sacramento District’s study indicated that the Corps’ Hydrologic Engineering Center-Flood Damage Analysis computer program can overstate damage reduction benefits because of an inability to account for the reduced floodplain occupancy and reduced value of damageable property following a flood event. According to the analysis, by not taking into account the potential for reduced floodplain occupancy, the estimated damage reduction benefits may be overstated, particularly in areas that experience more frequent or severe flooding. To account for this limitation, the Sacramento District’s study reduced the overall value of properties in the floodplain, lowering the average annual benefits for the recommended alternative by about 29 percent. All the other studies used the same program to estimate damage reduction benefits but did not indicate whether this limitation would affect the estimated benefits of the alternatives evaluated in those studies. In accordance with best practices, the Corps’ Planning Guidance indicates that studies should provide adequate supporting documentation to allow reviewers to understand the models and assumptions used to estimate benefits and costs. Corps officials stated that a project team’s analysis may not document every step it took because these are understood among team members, although they may not be apparent to others. Quantifying the statistical variability underlying the results of the comparison of alternatives. Although the economic analyses for the eight studies analyzed the effects of uncertainty associated with several key inputs in the economic analysis, the studies generally did not report the key estimates (for example, benefits, costs, and net benefits) on a probabilistic basis. For example, the Chicago District’s flood risk management study presented damage reduction benefits for each alternative in terms of its expected values as well as the probability that the benefit estimate would exceed a particular value. However, estimates for costs and net benefits were presented as point estimates, which may imply a greater sense of precision than is warranted. In accordance with best practices, the Corps’ Planning Guidance requires economic analyses to report net benefits and benefit-to-cost ratios both as expected (mean) values and on a probabilistic basis for each alternative; also, for each alternative, the analyses are to present the probability that net benefits are positive and that the benefit-to-cost ratio is at or above one. Corps officials said the analyses generally did not follow this guidance because it may not have been useful in helping to select a project alternative. Nonetheless, Corps guidance states that information about the probability distributions can help decision making by local sponsors, stakeholders, and federal officials by helping to increase their understanding of the uncertainty inherent in each alternative. In addition, for only one Corps study, the economic analyses included a sensitivity analysis on the discount rate, which is used to convert benefits and costs of the alternatives to present values. Generally, when benefits or costs are separated in time from each other, the difference in timing should be accounted for by discounting benefits and costs. In addition, the specific discount rate may affect the comparison of alternatives. Corps officials told us that they are required to use the statutorily designated discount rate, and their guidance does not require a sensitivity analysis using an alternative discount rate. The officials added that the Office of Management and Budget requires the Corps to compute the benefit-to-cost ratios for recommended plans using a 7 percent discount rate, for budgeting purposes. The results, though, are not reported in the studies, and the 7 percent rate is not applied in the assessment of the net benefits of the alternatives, according to these officials. Corps officials stated that in general there is a high level of transparency within the project team and with the nonfederal sponsor, but they acknowledged that transparency may not always exist for those outside the team. For example, a project team’s analysis may not document every step it took or assumption it made because these are understood among team members, although they may not be apparent to others. As a result, Corps officials acknowledged that some inconsistency exists in the transparency of the analyses across feasibility studies. Corps officials told us that teams rely on the Corps’ internal process for reviewing all planning products to help ensure the quality of its feasibility studies and analyses. The officials stated that to improve transparency, the Corps could strengthen its internal review process, for example, by adding steps so that all of the important decisions and assumptions made in the analyses are consistently and clearly described. By conducting future economic analyses for potential flood risk management projects so they are more consistent with best practices for transparency, the Corps can better ensure that decision makers and stakeholders are clearly and fully informed about potential economic effects associated with such projects. The economic analyses included in Corps feasibility studies provide important information about the potential economic effects of flood risk management projects. While the economic analyses the Corps conducted for the eight studies we reviewed were generally consistent with several best practices, the Corps did not fully employ best practices pertaining to transparency. Because the information in the economic analyses can be complex and technical, following best practices for transparency helps ensure that the methods used to develop estimates and conclusions are clearly and fully presented. By conducting future economic analyses for potential flood risk management projects so they are more consistent with transparency best practices, the Corps can better ensure that decision makers and stakeholders are clearly and fully informed about the potential economic effects associated with flood risk management projects. We are making the following recommendation to the Department of Defense: The Assistant Secretary of the Army for Civil Works should direct the Chief of Engineers and the Commanding General of the U.S. Army Corps of Engineers to strengthen the Corps’ internal review process for feasibility studies by including steps to ensure consistency with best practices for transparency, such as verifying that all of the important assumptions and limitations in models and their implications for the economic analysis are consistently, clearly, and fully described. (Recommendation 1) We provided a draft of this report to the Department of Defense for its review and comment. In its written comments, reproduced in appendix I, the Department concurred with our recommendation. The Department further stated that guidance related to ensuring transparency in feasibility studies and reviews already exists, but acknowledged that it can be strengthened and enforced more consistently by specifically identifying transparency as a review criterion. For example, they stated that the Corps plans to establish systematic guidance for meeting the transparency objective in preparing reports, assure transparency through the agency’s quality assurance process, and assess the degree of transparency as part of agency technical review and quality control assessment. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Assistant Secretary of the Army for Civil Works, the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and of Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. In addition to the contact named above, Vondalee R. Hunt (Assistant Director), Brad C. Dobbins (Analyst in Charge), Tim Carr, David Dornisch, Juan Garay, Tim Guinane, Gwen Kirby, Keesha Luebke, Jeanette Soares, Sara Sullivan, and Kiki Theodoropoulos made key contributions to this report.", "summary": "The Corps, among other things, constructs flood risk management projects to reduce flood damage in threatened communities nationwide in collaboration with nonfederal sponsors. The Corps prepares feasibility studies to inform decision makers whether a proposed project warrants federal investment. In the studies, the Corps formulates and evaluates alternative plans for achieving the project's objectives and assesses whether the benefits of constructing it outweigh its costs. GAO was asked to review the methodology the Corps used in feasibility studies. This report examines, for 2015 through 2017, (1) the Corps' process for identifying and evaluating the benefits, costs, and effects of project alternatives; (2) the analyses the Corps used to recommend projects; and (3) the extent to which the Corps' economic analyses of benefits and costs are consistent with best practices. GAO reviewed Corps guidance; examined planning documents and economic analyses in flood risk studies that the Corps had most recently completed from 2015 through 2017 from eight districts; and compared the Corps' economic analyses with best practices in GAO's Assessment Methodology. In the eight flood risk management feasibility studies GAO reviewed (see figure), the U.S. Army Corps of Engineers (Corps) followed a six-step planning process consistent with its guidance to, among other things, identify and evaluate the beneficial and adverse effects of alternative plans for proposed projects. In doing so, the Corps used economic analyses to evaluate project-specific categories of potential monetary benefits and costs of alternative plans, such as flood damage reduction benefits and project construction costs. The studies also used separate analyses to evaluate other effects, such as on wildlife habitat and the health and safety of communities. In the eight studies GAO reviewed, the Corps typically recommended the alternative plan with the greatest net benefit, but also relied on other analyses in certain cases, as allowed under Corps guidance. Corps officials said they relied on other analyses to determine the best project design, help make decisions, or respond to local sponsors' preferences. For example, in one study, the Corps recommended a plan that provided a levee 3 feet higher than the plan with the greatest net benefits, in response to the nonfederal sponsor's request. The Corps' economic analyses in the eight studies were generally consistent with best practices, but did not fully adhere to practices for transparency. For example, most analyses did not discuss the implications of key limitations in the models and data used. Corps officials acknowledged that transparency could be improved through their review process. By having future analyses align with transparency best practices, the Corps can better inform decision makers about potential economic effects of flood risk projects. GAO recommends that the Corps strengthen its feasibility study review process by including steps to ensure consistency with transparency best practices. The agency concurred with the recommendation.", "document_type": "gao"}
{"report": "The federal Health Center Program was established in the mid-1960s in an effort to help low-income individuals gain access to health care services. The Health Center Program, authorized in Section 330 of the Public Health Service Act, is administered by HRSA’s Bureau of Primary Health Care and makes grants—known as Section 330 grants—to four types of health centers that primarily serve low-income populations: 1. Community health centers. These health centers serve the general population with limited access to health care. They are required to provide primary health services to all residents who reside in the center’s service area. More than three-quarters of health centers are community health centers. 2. Health centers for the homeless. These health centers provide primary care services to individuals who lack permanent housing or live in temporary facilities or transitional housing. These centers are required to provide substance abuse services and supportive services targeted to the homeless population. 3. Health centers for residents of public housing. These health centers provide primary health care services to residents of public housing and individuals living in areas immediately accessible to public housing. 4. Migrant health centers. These health centers provide primary care to migratory agricultural workers (individuals whose principal employment is in agriculture and who establish temporary residences for work purposes) and seasonal agricultural workers (individuals whose principal employment is in agriculture on a seasonal basis but do not migrate for the work). HRSA’s Section 330 grants are funded by a combination of discretionary appropriations and, since 2011, mandatory appropriations provided from the CHCF. From fiscal years 2010 through 2017, total funding appropriated for Section 330 grants—which includes funding from discretionary appropriations and the CHCF—increased from about $2.1 billion to $4.9 billion (see fig. 1). According to HRSA data, approximately 70 percent of appropriations for Section 330 awards in fiscal year 2017—or about $3.5 billion—were funded by the CHCF. HRSA officials also told us that the total amount of CHCF appropriations may differ from the total amount of awards funded because, for example, appropriations may be (1) used for administrative costs, (2) reduced because of sequestration, or (3) carried over between fiscal years. Health centers are required to provide comprehensive primary health services, including preventive, diagnostic, treatment, and emergency health services. (See table 1.) All services that health centers provide must be available to patients at the center regardless of patient payment source or ability to pay and must be available (either directly or under a referral arrangement) to patients at all health center service sites. Services are provided by clinical staff—including physicians, nurses, dentists, and mental health and substance abuse professionals—or through contracts or cooperative arrangements with other providers. In addition to the services they provide, health centers are also required to document the unmet health needs of the residents in their service area and to periodically review their service areas to determine whether the services provided are available and accessible to area residents promptly and as appropriate. Health centers also must have a sliding fee scale based on a patient’s ability to pay and to be governed by a community board of which at least 51 percent of the members are patients of the health center. HRSA determines whether health center grantees meet these and other health center program requirements when making award determinations. Our analysis shows that total revenue received by health centers nationwide more than doubled from calendar years 2010 through 2017— from about $12.7 billion to $26.3 billion (see fig. 2). Over the same time period, both the number of health centers and the number of patients served also increased. The number of health centers increased from 1,124 centers in 2010—operating 6,949 sites—to 1,373 centers in 2017— operating 11,056 sites. In addition, the total number of patients served at health centers over the same time period increased by 7.7 million patients, from 19.5 million to 27.2 million. See appendix I for additional information. While the total revenue received by health centers more than doubled from 2010 through 2017, the share of revenue received from grants— including Section 330 grants and other federal and non-federal grants— decreased, from 38.0 percent of total revenue in 2010 to about 30.2 percent in 2017. During the same time period, the share of revenue health centers received from Medicaid, Medicare, and private health insurance increased (see fig. 3). (See app. II for more information on health centers’ revenue from 2010 through 2017.) While the share of health centers’ total revenue coming from all grants decreased from 2010 to 2017, the share of revenue from one type of grant—Section 330 grants—increased. Specifically, the share of revenue health centers received from Section 330 grants—a portion of which are funded by the CHCF—increased from 15.7 percent of health centers’ total revenue in 2010 to 18.0 percent in 2017 (see figure 4). Our analysis also shows that the share of revenue health centers receive from Section 330 grants varies by state. As figure 5 below shows, in 2017, health centers in 2 states received more than 40 percent of their total revenue from Section 330 grants, while health centers in 18 states received less than 20 percent of total revenue from these grants. Our analysis of HRSA data shows that for the 7-year period from fiscal years 2011 through 2017, HRSA provided health centers with about $15.8 billion in Section 330 grants funded by the CHCF. Most of this funding—$12.6 billion, or nearly 80 percent of all grants awarded through the CHCF during this period—was awarded for the purpose of service area funding, which supports ongoing operations and services across the nearly 1,400 health centers nationwide (see fig. 6). The remaining $3.2 billion in CHCF grants were awarded to increase the amount of services provided at existing health centers; to increase the number of health centers and sites; and for other special initiatives, such as initiatives to support health information technology. Service area funding. From fiscal years 2011 through 2017, HRSA used the CHCF to provide health centers with approximately $12.6 billion in grants for service area funding, which supports ongoing operations and service delivery. HRSA officials told us that these CHCF grants are used to fill the gap between what it costs to operate a health center and the amount of revenue a health center receives. As such, the awards are a primary means through which health centers provide health care services that may be uncompensated, including services for patients who are uninsured or services not typically reimbursed by other payers, such as adult dental care, or other services such as transportation and nutritional education. These awards can cover uncompensated care costs for patients with incomes low enough to qualify for sliding fee assistance, which reduces or waives the cost of services for patients based on their ability to pay. In addition, these awards can cover patients who have private insurance but face substantial deductibles and cost-sharing. Officials we interviewed from the Congressional Research Service, George Washington University’s Milken Institute, and the National Association of Community Health Centers similarly noted that CHCF grants support services not typically covered by public health insurance, such as adult dental care services not generally covered by Medicare or Medicaid. Increasing services at existing health centers. From fiscal years 2011 through 2017, HRSA used the CHCF to provide health centers with about $1.2 billion in grants to help increase the amount of services offered at existing health centers that chose to apply for an award. This amount included funding to increase the availability of specific health care services, such as dental care, as well as funding to support health centers’ efforts to extend service hours or increase the number of available providers. Specifically, these grants were awarded for the following: Behavioral and mental health, substance abuse. Three grants totaling about $400.8 million were awarded to expand access to behavioral health, mental health, and substance abuse services. These awards focused primarily on integrating primary care and behavioral health care services and expanding substance use services at existing health centers, such as medication-assisted treatment for opioid-use disorder. Oral health. A grant for about $155.9 million was awarded to increase access to oral health services and improve oral health outcomes by funding new onsite providers and supporting the purchase and installation of dental equipment. Expanding Services. Two grants—one in fiscal year 2014 for $295.6 million and another in fiscal year 2015 for about $349.6 million—were made to increase access to comprehensive primary health care in various ways, at the discretion of individual health centers. At existing sites, health centers may have chosen to expand service hours, increase the number of health care providers, or expand services such as oral health, behavioral health, pharmacy, and vision services. Increasing the number of health centers and sites. From fiscal years 2011 through 2017, HRSA awarded about $1.1 billion—or about 7 percent of total CHCF funds—to organizations to help establish new health centers or new sites at existing health centers. Specifically, HRSA awarded grants for the following purposes: New Access Point (NAP) Awards. Most of the funding to increase access to health centers—about $648.5 million of the $1.1 billion— was provided through what are called NAP awards. According to HRSA officials, there are two primary ways these funds can be used—either to allow a new organization to become a health center (about 30 percent of grant applicants) or for an existing health center to add one or more service sites (about 70 percent of grant applicants). HRSA officials told us that they funded 1,059 NAP awards to new and existing health centers from fiscal year 2011 through 2017 for a combined total of 1,609 proposed new health centers or sites. These awards included 295 awards to new organizations and 764 awards to existing health centers adding one or more service sites. (See table 2 below for more information on the increase in health centers resulting from NAP awards.) Among the 1,609 total proposed new health centers or sites, 686 were in rural areas, including 191 new health centers and 495 additional sites at existing centers. Construction Grants. HRSA awarded construction grants totaling about $411.3 million through the Health Infrastructure Investment Program to help existing health centers alter, renovate, expand, or construct a facility. According to HRSA officials, construction grants may increase the number of health center sites or may result in the consolidation of sites while still expanding access to care. Health Center Planning Grants. HRSA awarded a Health Center Planning grant in fiscal year 2011 for about $10.3 million to support planning and development of comprehensive primary care health centers. Collectively, a total of 5,536 new health center sites were added in the United States from fiscal year 2011 through 2017. Of these new sites, 3,838 were in urban locations and 1,698 were in rural locations. While many of these new health center sites were from NAP awards, as previously described, other grants either funded by the CHCF or by discretionary appropriations may have contributed to the establishment of new health center sites. For example, HRSA officials told us that health center sites may be added through a change of scope to their service area competition award or through other types of grants funded by the CHCF, such as grants to increase adult dental services. However, according to HRSA officials, the data do not allow for directly associating the number of new sites with those grants, as the grants may be used for multiple purposes. Figure 7 below shows the locations of health center sites added during this time period that are active as of February 2019. Other special initiatives. From fiscal years 2011 through 2017, HRSA awarded about $898.9 million of CHCF funds for grants to health centers to support other special initiatives and to address identified priorities or emerging health care needs. Specifically, HRSA awarded grants to those health centers that chose to apply for the following purposes: Health information technology. Three grants totaling about $243.4 million were awarded to advance the adoption and implementation of health information technology. For example, the purpose of one grant—the Health Center Controlled Networks—was to advance the adoption, implementation, and optimization of health information technology. Another grant provided supplemental funding to improve the electronic reporting capabilities of health centers in Beacon Communities. HIV. Two grants totaling about $23.8 million were awarded with the goal to increase access to HIV care and services. One specifically targeted prevention and treatment services in those communities most affected by HIV. Outreach and enrollment. $222.0 million in grant funding was awarded to support health centers in raising awareness of affordable insurance options and providing eligibility and enrollment assistance to uninsured patients of health centers and residents in their approved service areas. Patient-Centered Medical Home. About $84.6 million in grant funding was awarded to support HRSA efforts to expand the number of patient-centered medical homes with a particular focus of improving quality of care, access to services, and reimbursement opportunities. Quality improvement. Approximately $305.1 million in grant funding was awarded to support health centers that displayed high quality performance so they can continue to strengthen quality improvement efforts. Specifically, the funds were to support health centers to further improve the quality, efficiency, and effectiveness of health care delivered to the communities served. Training and technical assistance. Two grants totaling about $14.3 million were awarded to support training and technical assistance for health centers in order to support programmatic, clinical, and financial operations. One grant focused on the delivery of training and technical assistance by national organizations and the other grant was based on statewide and regional needs. Zika. A grant for about $5.7 million was awarded to health centers that chose to apply to expand their existing activities to strengthen the response to the Zika virus in Puerto Rico, the U.S. Virgin Islands, and American Samoa. These activities included outreach, patient education, screening, voluntary family planning services, and/or treatment services. See appendix III for a complete list of all grants awarded through CHCF by category. We provided a draft of this report to HHS. HHS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further action until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at farbj@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix provides information on health centers and patients served. Specifically, figure 8 illustrates the number and location of health centers in 2017; figure 9 illustrates the growth in health centers and sites since 2010; figure 10 illustrates the growth in patients served at health centers since 2010; and table 3 provides information on how the payer mix for patients served at health centers has changed since 2010. HRSA’s Uniform Data System defines other public insurance as state and/or local government programs, such as Washington’s Basic Health Plan or Massachusetts’ Commonwealth plan, that provide a broad set of benefits for eligible individuals. Other federal grants in HRSA’s Uniform Data System include Medicare and Medicaid Electronic Health Record Incentive grants. HRSA’s Uniform Data System defines non-federal grants and contracts as revenue from contracts that are not tied to the delivery of services and revenue received from state and local indigent care programs. HRSA’s Uniform Data System defines other revenue as non-patient related revenue not reported elsewhere. Examples include revenue from fund-raising, rent from tenants, medical record fees, and vending machines. In addition to the contact named above, Kristi Peterson, Assistant Director; Amy Leone, Analyst-in-Charge; Margot Bolon, Krister Friday, Jeff Tamburello, and Eric Wedum made key contributions to this report. Also contributing were Vikki Porter, Rotimi Adebonojo, Giselle Hicks, and Jennifer Whitworth.", "summary": "In 2017, nearly 1,400 health centers provided care to more than 27 million people, regardless of their ability to pay. Health centers were established to increase the availability of primary and preventive health services for low-income people living in medically underserved areas. Health centers rely on revenue from a variety of public and private sources, including revenue from CHCF grants. HRSA began awarding grants funded by the CHCF in fiscal year 2011. GAO was asked to review the sources and amounts of health center revenue. This report describes (1) trends in health centers' revenue and (2) the purposes for which CHCF grants have been awarded. GAO analyzed HRSA data collected from health centers and compiled in its Uniform Data System to identify the sources and amounts of revenue health centers received from 2010 through 2017, the most recent data at the time of GAO's analysis. GAO also reviewed HRSA grant documentation for grants funded by the CHCF for fiscal years 2011-2017—the most recent data at the time of GAO's analysis—including information on the award amount and purpose of the grant, and reviewed published studies that described the purposes for which CHCF grants have been made. Additionally, GAO interviewed HRSA officials, authors of the published studies, and an association representing health centers. GAO provided a draft of this report to HHS. HHS provided technical comments, which GAO incorporated as appropriate. Health centers' revenue more than doubled from calendar years 2010 through 2017, from $12.7 billion to $26.3 billion. Health centers' revenue comes from a variety of sources, including reimbursements from Medicaid, Medicare, private insurance, and federal and state grants. While total health center revenue increased from 2010 through 2017, the share of revenue from each source changed in different ways. In particular, revenue from federal and state grants decreased from 38.0 percent of total revenue in 2010 to about 30.2 percent of total revenue in 2017 while reimbursements from Medicaid, Medicare, and private insurance increased. Over the same time period, the number of health centers increased from 1,124 centers in 2010 to 1,373 centers in 2017. In addition, the number of patients served over the same time period increased by 7.7 million patients, from 19.5 million to 27.2 million. GAO's analysis of Health Resources and Services Administration (HRSA) data shows that from fiscal years 2011 through 2017, health centers received approximately $15.8 billion in federal grants funded by the Community Health Center Fund (CHCF), which was established by the Patient Protection and Affordable Care Act in 2010. Of this total amount, 79.7 percent—or $12.6 billion—was awarded for the purpose of maintaining operations at existing health centers (see figure). According to HRSA officials, these CHCF grants are used to fill the gap between what it costs to operate a health center and the amount of revenue a health center receives. As such, officials explained, the awards are a primary means through which health centers provide health care services that may be uncompensated, including services for uninsured patients or services not typically reimbursed by other payers, such as adult dental care. The remaining $3.2 billion in CHCF grants were made to increase the amount of services provided at existing health centers; increase the number of health centers and sites; and other special initiatives, such as implementing health information technology.", "document_type": "gao"}
{"report": "SEC is a federal agency responsible for protecting investors, maintaining fair, orderly, and efficient markets, and facilitating capital formation. Among its efforts, SEC requires public companies to disclose meaningful financial and other information to the public, examines firms it regulates, and identifies and investigates potential violations of federal securities laws. Each year, SEC brings hundreds of enforcement actions—including judicial enforcement actions and administrative proceedings—against individuals and companies as a result of its investigations. Examples of actions taken in fiscal year 2018 include charges against a company that allegedly defrauded investors in a Ponzi scheme and charges against a bank for misconduct in its sales practices for certain financial products offered to retail investors. SEC’s responsibilities are divided among five divisions and 24 offices. The Division of Enforcement conducts investigations of potential violations of federal securities laws. Enforcement recommends, when appropriate, that SEC bring enforcement actions, litigates these actions, negotiates settlements on behalf of SEC, and works with other law enforcement agencies to bring criminal cases when warranted. Enforcement is currently led by two co-directors who report to the Chairman. Enforcement staff operate from headquarters in Washington, D.C., and in 11 regional offices. Enforcement maintains a database that tracks enforcement-related activities, including all cases from investigation through litigation, and is the source of statistics used in public reporting (see fig. 1). For tracking purposes, “case” encompasses all stages of a possible enforcement action, beginning either as a matter under inquiry or as an investigation. Some cases advance and become an enforcement action. Enforcement’s database includes all key case data other than data on financial penalties and disgorgements, which SEC’s Office of Financial Management stores and manages. Enforcement’s CMS are responsible for recording key data into the database and conducting quality checks on the data throughout the investigative and litigation processes of a case. There are two groups of CMS: local CMS and national CMS, both of which can be located in SEC regional offices or at SEC headquarters. Local CMS in regional offices report to their regional managers but coordinate with the Enforcement Case Management and Systems Reporting Group. National CMS and local CMS at SEC headquarters report to the Case Management Systems and Reporting Group. National CMS have the responsibility of reviewing and verifying case data input by local CMS. Enforcement has documented procedures for recording and verifying enforcement-related data in its central database. More specifically, the Enforcement database user guide has step-by-step procedures for recording case data and clear descriptions of each data entry field. For example, the guide includes brief descriptions of primary classifications— or categories—used to describe the nature of the enforcement action (such as insider trading or delinquent filing). According to the database user guide and other SEC documentation, local CMS have the primary responsibility for recording most case data used in Enforcement metrics. Local CMS may assist with data recording in the opening of a case as a matter under inquiry or, if it is known the case will advance to the next stage, as an investigation. The user guide also states that local CMS are responsible for recording the advancement of a case from an investigation to an enforcement action. According to the user guide, CMS use information (generally, case documentation) received from the courts or SEC staff responsible for the case to create the action entry in the central database, including the primary classification for the action. CMS also facilitate closing completed cases in the database. Enforcement procedures call for Enforcement staff to perform multiple data reviews for all information in the Enforcement database, according to Enforcement staff and the user guide. According to the user guide, local CMS review the accuracy of key case-related data recorded in the system at certain stages as a case proceeds (see fig. 2). The local CMS add case information by checking any new documentation, such as court filings. In addition to the review by the local CMS, national CMS also are to review newly opened cases, as well as cases that have advanced to an investigation, changed from an investigation to an action, or closed. To do this, national CMS compare information recorded in the system against any primary documents related to the case, such as court documentation. Finally, Enforcement staff told us that they have an informal process whereby a group of attorneys in the Case Management and Systems Reporting Group review all primary classifications for enforcement actions. Enforcement lacks written procedures for generating the Enforcement Annual Report, including for compiling and ensuring the accuracy of the statistics published within. Enforcement staff explained that they follow an informal process to generate the annual report, which includes steps to help ensure reliable reporting and detect and prevent errors (see fig. 3). However, Enforcement was unable to provide documentation of this process or of the implementation of the steps to help ensure accuracy. According to staff, the process for generating the annual report includes selecting what statistics to include and what activities and accomplishments to describe in the report narrative. Specifically, Enforcement staff said that the division’s co-directors hold regular weekly meetings with their staff to discuss management of the division. Staff said program metrics and other measures may be discussed at these meetings, including the types of information and statistics that might be used in the Enforcement Annual Report. According to the staff, at the end of the fiscal year the co-directors determine what information and statistics the division will include in reports. Once decisions have been made about the annual report’s content, Enforcement staff told us a contractor uses software queries of the database to compile statistics for the report based on data parameters defined by Enforcement staff. An Enforcement staff member familiar with the data reviews the queries’ output to verify accuracy, according to Enforcement staff. Staff then add the compiled statistics to the draft annual report. According to staff, the draft report is then sent to the Office of Public Affairs for formatting and publication. Enforcement staff stated that staff familiar with the data perform an additional check to ensure that no data values were mistyped or otherwise edited in the formatting process. Finally, the co-directors of Enforcement are to review the draft report. After they give a final approval, the annual report is published. Control activities such as written procedures help ensure that operational processes are effective and actions are taken to address risks. In particular, federal internal control standards identify documentation— including documentation that demonstrates procedures are being implemented—as a necessary part of an effective internal control system and as a means to help detect and prevent errors. Enforcement staff stated that the division does not have written procedures for generating its annual report or documenting the implementation of review processes because the report is not required by law and is discretionary. The staff said they were confident about the reliability of report data because staff were familiar with enforcement data and the informal processes they currently use to verify accuracy. In contrast, Enforcement uses documented SEC guidelines for reviewing and verifying the data used to support performance metrics in the agency- wide SEC Annual Performance Report. Documenting written procedures for generating both Enforcement’s annual report and the processes it uses to verify published statistics— including documentation that procedures were implemented—would provide Enforcement with greater assurance that staff follow necessary steps to help ensure the reliability and accuracy of reported information. Reliability and accuracy of information are important to maintaining the division’s credibility and public confidence in its efforts. In addition, developing written procedures would better position Enforcement to manage risk associated with staff turnover and help ensure continuity of operations in its public reporting. Since 2009, SEC has made changes to how it reports and presents enforcement or enforcement-related statistics, which are included in a number of reports (see table 1). As previously discussed, we reviewed reports from 2009 through 2018 that included enforcement statistics. More specifically, SEC made the following changes to its public reporting of enforcement statistics, which include the creation of a stand-alone Enforcement Annual Report in 2017. Prior to 2017, Enforcement reported similar statistics in the annual Select SEC and Market Data Report. Definition of enforcement actions. Enforcement staff told us that before 2013, the Select SEC and Market Data Reports changed little from year to year, with the previous year’s report used as a template to create the next one. SEC adjusted its definition of enforcement actions in the 2013 report, and included notes explaining the change and providing what the number of enforcement actions would have been under the previous definition. Presentation of enforcement statistics. Enforcement staff said the Office of the Chief Operating Officer determined changes in presentation (such as the order of enforcement action classifications) in the Select SEC and Market Data Report. In 2015, Enforcement changed how the report presented summary data for enforcement actions. Previously, Enforcement counted enforcement actions as civil actions or administrative proceedings, but the fiscal year 2015 report separately identified and counted the proceedings as stand-alone (initial) or follow-on (after initial action). Enforcement staff said these changes were made possible by better software that allowed for enhanced and expanded presentation of the data. Enforcement Annual Report. As previously mentioned, the Select SEC and Market Data Report was discontinued after the fiscal year 2017 report and the Enforcement Annual Report was first published in November 2017. The annual report included additional data tables of enforcement statistics not previously reported (some comparing statistics to the previous year) and narratives about enforcement priorities and cases. Enforcement staff told us the annual report was created to increase transparency and provide more information and deeper context than previous reporting had. The SEC Division of Enforcement voluntarily issues an annual report that includes statistics and highlights significant enforcement actions and initiatives of the previous fiscal year. Enforcement has documented procedures and has designated staff to input and review enforcement- related data in its case-tracking system. However, the division does not have written procedures for generating its public reporting (currently, the annual report), including for compiling and verifying the report’s statistics, or documenting that procedures were implemented as intended. Written procedures would help Enforcement ensure the reliability and accuracy of reported information, manage risk associated with staff turnover, and promote continuity of operations in its public reporting. The Securities and Exchange Commission’s Co-Directors of Enforcement should develop written procedures for generating Enforcement’s public reports, including procedures for compiling and verifying statistics used in the reports and documenting their implementation. (Recommendation 1) We provided a draft of this report to SEC for review and comment. In written comments (reproduced in appendix I), SEC generally agreed with our findings and concurred with our recommendation. In addition, SEC provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Chairman of the Securities and Exchange Commission, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above Kevin Averyt, John Forrester, (Assistant Directors), Jordan Anderson (Analyst in Charge), Tim Bober, Ryan Braun, Marc Molino, Kirsten Noethen, Barbara Roesmann, and Farrah Stone made key contributions to this report.", "summary": "Enforcement supports SEC's mission by bringing civil and administrative actions against individuals and entities for fraud, financial and accounting irregularities and misstatements, and other misconduct. According to SEC, these enforcement actions serve as a deterrent against future wrongdoing. Since 2017, Enforcement has published an annual report that provides statistics on its enforcement activities and highlights its priorities for the coming year. GAO was asked to examine SEC reporting of enforcement statistics. This report examines (1) the ways that enforcement statistics reporting changed over the last 10 years, and (2) policies and procedures for recording, reviewing, and reporting enforcement statistics. GAO reviewed SEC's internal policies, procedures, and manuals for recording, verifying, and reporting data. GAO also interviewed SEC officials and reviewed past SEC reports containing enforcement statistics. Since 2009, the Division of Enforcement (Enforcement) in the Securites and Exchange Commision (SEC) has made modifications to its reporting of enforcement statistics, including by releasing a stand-alone annual report beginning in fiscal year 2017. The Enforcement Annual Report included additional data on enforcement statistics not previously reported and narratives about enforcement priorities and cases. Enforcement staff told us the annual report was created to increase transparency and provide more information and deeper context than previous reporting had provided. Enforcement has written procedures for recording and verifying enforcement-related data (including on investigations and enforcement actions) in its central database. However, Enforcement does not have written procedures for generating its public reports (currently, the annual report), including for compiling and verifying the enforcement statistics used in the report. To produce the report, Enforcement staff told GAO that staff and officials hold meetings in which they determine which areas and accomplishments to highlight (see figure). Enforcement was not able to provide documentation demonstrating that the process it currently uses to prepare and review the report was implemented as intended. Developing written procedures for generating Enforcement's public reports and documenting their implementation would provide greater assurance that reported information is reliable and accurate, which is important to maintaining the division's credibility and public confidence in its efforts. GAO recommends that SEC's Co-Directors of Enforcement develop written procedures for generating Enforcement's public reports, including procedures for compiling and verifying statistics used in the reports, and documenting their implementation. SEC agreed with the recommendation.", "document_type": "gao"}
{"report": "When Mexico and the United States created the Mérida Initiative in 2007, the Mexican government pledged to tackle crime and corruption and the U.S. government pledged to address domestic drug demand and the illicit trafficking of firearms and bulk currency to Mexico. During the early years of the Mérida Initiative, much of the U.S. funding for the initiative was intended to purchase equipment to support Mexican federal security forces, including about $591 million for aircraft and helicopters from fiscal years 2008 through 2010. In 2011, U.S. and Mexican officials agreed to expand the scope of the initiative to prioritize institution building, and later increased the initiative’s focus on community engagement and human rights efforts. According to State, an Executive Order on TCOs issued in 2017 signaled that the focus of the Mérida Initiative would shift to countering TCOs’ illicit activities, such as drug production and the cross- border movement of drugs, cash, and weapons. State/INL and USAID are the lead U.S. agencies for developing the Mérida Initiative’s programming. In these roles, State/INL and USAID work with GOM officials to help outline Mérida Initiative projects’ plans, objectives, and intended impact. State/INL and USAID both manage and fund the Mérida Initiative with the support of a wide range of project implementers, including DOJ, DHS, DOD, contractors, nongovernmental organizations, and international organizations. All Mérida Initiative projects are currently funded through three appropriations accounts: the International Narcotics Control and Law Enforcement (INCLE) account administered by State/INL, the Economic Support Fund (ESF) account, from which the Mérida Initiative project funding is administered by USAID, and the Development Assistance (DA) account, also from which the Mérida Initiative project funding is administered by USAID. According to State/INL and USAID officials, GOM does not provide direct funding to Mérida Initiative projects. Instead, State/INL considers any GOM funding for justice, national security/defense, and public order and domestic security as indirectly supporting the goals of the Mérida Initiative. In addition, according to USAID data, Mexican nonprofit and private sector entities provided about $23 million in matching funds for USAID-funded Mérida Initiative projects active from fiscal year 2014 through 2018. From fiscal year 2014 through 2018, State/INL and USAID allocated about $723 million for Mérida Initiative projects under the following five U.S. government–wide foreign assistance funding categories: Civil Society, Counternarcotics, Good Governance, Rule of Law and Human Rights, and Transnational Crime. U.S. agencies use these government- wide categories to broadly define foreign assistance programs for planning, budgeting, and reporting, which provides a common language to describe programs across agencies, countries, and regions. Over 80 percent of the funding, or $589 million, went toward Rule of Law and Human Rights, and Counternarcotics efforts. (See fig. 1.) Funding allocated for the Mérida Initiative has decreased over time from $178 million in fiscal year 2014 to $139 million in fiscal year 2018. Of the $723 million, State/INL allocated about $542 million and USAID allocated about $182 million. (See fig. 2.) Four hundred and forty-five Mérida Initiative projects were active from fiscal year 2014 through 2018, with State/INL funding 388 projects and USAID funding 57 generally larger projects. State/INL and USAID each categorized their projects with greater specificity than the broad categories used for overall allocated funding. Both State/INL and USAID funded projects to assist Mexico’s transition to a newly reformed criminal justice system that includes oral arguments and the presumption of innocence, categorized by State/INL as “criminal justice” and by USAID as “rule of law.” In addition to projects related to criminal justice, most funding for State/INL projects was for those that focused on border and port security, professionalizing the police, and counternarcotics. For example, numerous State/INL projects provided training; technical assistance; and equipment—including for drug detection, border surveillance, and forensic drug laboratories—for Mexican law enforcement, border security, justice sector, and military officials. In addition to rule of law projects, most funding for USAID projects was for those that focused on crime and violence prevention, human rights, and transparency and accountability. Similar to State/INL, numerous USAID projects provided technical assistance to Mexican justice sector officials. Other USAID projects were designed to engage with civil society groups to address crime and violence, and corruption, and to promote trust in government. State/INL and USAID implemented these projects primarily through contracts, grants, cooperative agreements, interagency agreements, and agreements with international organizations. State/INL-funded Mérida projects focused on criminal justice, border and port security, professionalizing the police, and counternarcotics. State/INL categorizes its Mérida Initiative projects under priority lines of effort developed by State/INL Mexico specifically for the Mérida Initiative. These lines of effort are defined in State/INL’s Mexico Country Plan: Advance Criminal Justice, Counternarcotics, Disrupt Illicit Finance, Professionalize the Police, and Secure Border and Ports. While State/INL uses these lines of effort to categorize State/INL-funded Mérida Initiative projects, these lines of effort also align with the broader U.S. government–wide foreign assistance funding categories outlined in figure 1 above. See table 1 for a description of State/INL’s lines of effort for the Mérida Initiative, and how these lines of effort align with the U.S. government– wide foreign assistance funding categories. The State/INL projects with the highest percentage of State/INL funding were those focused on Advancing Criminal Justice (28 percent) and Securing Borders and Ports (25 percent). Law enforcement related categories—Counternarcotics and Professionalize the Police—also constituted a substantial proportion (30 percent) of State/INL funding, as shown in figure 3. For a list of State/INL’s highest dollar value projects active from fiscal year 2014 through 2018 by these categories, see appendix I. Below are some examples of State/INL-funded Mérida Initiative projects supporting the agency’s five lines of effort in Mexico: Advance Criminal Justice. These 99 projects, with State/INL funding estimated at $241 million, focused on providing training, technical assistance, and equipment to Mexican justice sector and law enforcement officials as they transition to a new judicial system. These projects also provided tools and guidance to civil society to promote the rule of law and trust in government. For example: One DOJ project supported criminal investigations and prosecutions by providing training to GOM officials to improve their forensic laboratories, and by providing technical assistance to forensic scientists testifying as expert witnesses in criminal cases. Through another project, DOJ developed training materials and instructors to assist the GOM Attorney General’s office with the mechanics of Mexico’s judicial system reforms and to create a culture of professionalization within the Attorney General’s office. Some criminal justice projects engaged with civil society, such as a project that worked to promote a culture of lawfulness among Mexican children who attend elementary school in high-crime areas. Counternarcotics. These 76 projects, with State/INL funding estimated at $115 million, focused on assisting Mexican agencies countering the illicit drug trade in Mexico, primarily through technical assistance and equipment, including for forensic labs, drug detection, and surveillance. For example: Intelligence surveillance and reconnaissance technology has been provided to the Mexican Navy to expand its capacity to conduct counternarcotics operations. The Organization of American States implemented a project that expanded Mexico’s drug treatment courts, which offer rehabilitation services and other nonpunitive alternatives for drug offenders who would otherwise face time in prison. Disrupt Illicit Finance. These nine projects, with State/INL funding estimated at $17 million, provided equipment, training, and a public awareness campaign to assist the GOM in its efforts to address TCO’s money-laundering and other illicit financial activities. For example: One DOJ project provided anti–money laundering training to Mexican prosecutors at the state and federal levels. Another United Nations Office on Drugs and Crime project aims to combat money laundering through a public awareness campaign and complaint call center in Mexico. Professionalize the Police. Many of these 97 projects, with State/INL funding estimated at $144 million, provided training and technical assistance to Mexican law enforcement officials at all levels to improve their effectiveness, accountability, and adherence to the rule of law. An aspect of one project conducted surveys with law enforcement personnel and civil society to better inform effective police practices and to link these practices with levels of citizen trust. Two other projects supported tours to the United States for Mexican officials to study issues related to gender-based violence and women’s access to justice. Secure Borders and Ports. These 68 projects, with State/INL funding estimated at $217 million, focused on various efforts and equipment for GOM border and military officials—including equipment for biometrics, surveillance, and telecommunications—to secure Mexico’s air, land, and sea borders and ports. For example, DHS’s Customs and Border Patrol provided mentors and training to GOM border officials to improve their capacity to stem the northward flow of migrants entering Mexico along its southern border. USAID-funded Mérida Initiative projects focused on crime and violence prevention, rule of law, transparency and accountability, and human rights efforts. USAID categorizes its Mérida Initiative projects under the following development objectives developed by USAID Mexico and outlined in USAID’s Mexico Country Development Cooperation Strategy: Crime and Violence Prevention, Human Rights, Rule of Law, and Transparency and Accountability. Similar to State/INL’s Mérida Initiative lines of effort, USAID Mexico uses its development objectives to categorize USAID-funded Mérida Initiative projects. These objectives also align with the broader U.S. government–wide foreign assistance funding categories outlined in figure 1. See table 2 for a description of USAID’s development objectives for the Mérida Initiative, and how these objectives align with the U.S. government–wide foreign assistance funding categories. The USAID projects with the highest percentage of USAID funding were those focused on Rule of Law (39 percent) or Crime and Violence Prevention (22 percent) with Transparency and Accountability and Human Rights constituting slightly smaller percentages (15 percent and 14 percent, respectively). While funding for USAID projects was concentrated in the Rule of Law category, the number of USAID projects was spread relatively evenly among the categories of Crime and Violence Prevention, Human Rights, and Transparency and Accountability, as shown in figure 4. For a list of USAID’s highest dollar value projects active from fiscal years 2014 through 2018, see appendix II. Below are some examples of USAID-funded Mérida projects supporting the agency’s four development objectives in Mexico for the Mérida Initiative: Crime and Violence Prevention. These 20 projects, with USAID funding estimated at $70 million, worked with civil society, nongovernmental organizations, the private sector, and GOM officials to implement various activities, such as training, workshops, and outreach efforts, to mitigate crime and violence. A number of these projects focused on building the skills and knowledge of at-risk youth, such as those in high-crime areas or at risk of dropping out of school. For example, one project aimed to help at-risk youth in communities and detention centers return to school, gain employment, and improve life skills. Human Rights. These 15 projects, with USAID funding estimated at $46 million, worked to advance human rights through various activities that, for example, focused on protecting journalists and human rights defenders, preventing forced disappearances, and promoting freedom of expression. For example, one project supported the GOM’s efforts to implement its National Human Rights Plan by implementing clear procedures in line with international human rights standards. Rule of Law. These three projects, with USAID funding estimated at $126 million primarily provided technical assistance and outreach to assist Mexican officials as they transitioned to a new judicial system. For example, two large projects—one $68 million project and one $56 million project that has since closed—provided a wide range of technical assistance to GOM judges, public defenders, and attorneys general. Another smaller project worked with law schools to adapt their curricula to the new criminal justice system. Transparency and Accountability. These 15 projects, with USAID funding estimated at $49 million engaged with Mexican officials and civil society to address corruption and promote ethical behavior. Projects helped Mexican officials develop and implement anticorruption policies, strengthen transparency in their procurement processes, and implement GOM’s National Anti-Corruption System. For example, one project aimed to deter corruption and support transparency by improving the quality of investigative and data journalism in Mexico. State/INL and USAID implement Mérida Initiative projects primarily through contracts, grants, and agreements with international organizations, but State/INL also employs agreements with U.S. agencies (DOJ, DHS, and DOD). See tables 3 and 4 for the number of and funding for each type of State/INL and USAID funding mechanism, respectively. We provided a draft of this report to State and USAID for review and comment. State and USAID both provided technical comments, which we incorporated as appropriate. USAID also provided formal comments, which are reproduced in appendix III. In these comments, USAID noted that, with its support, the Mérida Initiative has been instrumental in advancing reforms to the Mexican criminal justice sector, promoting human rights, building strong and resilient communities, and improving integrity and accountability. We are sending copies of this report to the appropriate congressional committees, the Secretary of State, and the USAID Administrator. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7141 or groverj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix IV. This appendix provides a detailed list of the 10 highest dollar value Department of State, Bureau of International Narcotics and Law Enforcement Affairs (State/INL) Mérida Initiative projects active from fiscal year 2014 through 2018 by State/INL’s five lines of effort—Advance Criminal Justice, Counternarcotics, Disrupt Illicit Finance, Professionalize the Police, and Secure Border and Ports. State/INL provided the details in tables 5 to 9 below. This appendix provides a detailed list of the 10 highest dollar value United States Agency for International Development (USAID) Mérida Initiative projects active from fiscal year 2014 through 2018. USAID provided the details in table 10 below. In addition to the contact named above, James Michels (Assistant Director), Teresa Heger (Analyst-in-Charge), Terry Allen, Ashley Alley, Lilia Chaidez, Martin DeAlteriis, Neil Doherty, Francisco Enriquez, John Hussey, and Andrew Kincare made key contributions to this report.", "summary": "For more than a decade, the activities of transnational criminal organizations have led to increased crime, violence, and lawlessness in parts of Mexico. In October 2007, Mexico and the United States created the Mérida Initiative, a bilateral partnership to address crime and violence and enhance the rule of law in Mexico. State/INL and USAID are the lead U.S. agencies for developing programming for the Mérida Initiative. Both State/INL and USAID also manage and fund the Mérida Initiative with the support of a wide range of project implementers, including the Departments of Defense (DOD), Homeland Security (DHS), and Justice (DOJ); contractors; nongovernmental organizations; and international organizations. GAO was asked to describe funding and projects the United States has provided under the Mérida Initiative. This report describes (1) State/INL and USAID funding for the Mérida Initiative from fiscal year 2014 through 2018 and (2) the number and type of Mérida Initiative projects active during these years. GAO reviewed State and USAID documents and data, and interviewed officials from State, USAID, DOD, DHS, and DOJ in Washington, D.C., and Mexico City. From fiscal year 2014 through 2018, the Department of State's (State) Bureau of International Narcotics and Law Enforcement Affairs (State/INL) and the U.S. Agency for International Development (USAID) allocated about $723 million for the Mérida Initiative, which aims to mitigate the impact of the drug trade on the United States and reduce violence in Mexico. State/INL and USAID allocated this funding under the following government-wide foreign assistance funding categories: Civil Society, Counternarcotics, Good Governance, Rule of Law and Human Rights, and Transnational Crime. U.S. agencies use these categories to broadly define foreign assistance programs for planning, budgeting, and reporting across agencies, countries, and regions. Over 80 percent of the funding went toward Rule of Law and Human Rights, and Counternarcotics efforts. Of the $723 million, State/INL allocated about $542 million and USAID allocated about $182 million. There were 445 State/INL and USAID Mérida Initiative projects active from fiscal year 2014 through 2018. State/INL funded 388 of the projects and USAID funded 57, which tended to be larger with higher funding amounts than State/INL projects. State/INL projects generally focused on providing training and assistance to Mexican officials from the justice sector, border security, military, and law enforcement, as well as equipment, including for forensic drug laboratories, drug detection, and border surveillance. Many USAID projects were intended to engage with Mexican civil society organizations and the public to address corruption, promote trust in government, or prevent crime and violence, such as through skill-building for youth, efforts to advance human rights, or technical support for judicial system development. State/INL and USAID implemented their projects mainly through contracts, grants, and interagency agreements, as well as through agreements with international organizations, such as the United Nations Office on Drugs and Crime and the Organization of American States.", "document_type": "gao"}
{"report": "On September 6, 2017, the eye of Hurricane Irma traveled about 50 nautical miles to the north of the northern shore of Puerto Rico as a category 5 hurricane. Less than two weeks later, Hurricane Maria made landfall as a category 4 hurricane on the main island of Puerto Rico on the morning of September 20, 2017, with wind speeds up to 155 miles per hour. The center of the hurricane moved through southeastern Puerto Rico to the northwest part of the island, as shown in figure 1 below. In response to the request of the governor of Puerto Rico, the president declared a major disaster the day after each hurricane impacted Puerto Rico. Major disaster declarations can trigger a variety of federal response and recovery programs, including assistance through FEMA’s Public Assistance program. Under the National Response Framework, DHS is the federal department with primary responsibility for coordinating disaster response, and within DHS, FEMA has lead responsibility. FEMA’s Public Assistance program provides grant funding to state, territorial, local, and tribal governments, as well as certain types of private nonprofit organizations, to assist them in responding to and recovering from major disasters or emergencies. As shown in figure 2, Public Assistance program funds are categorized broadly as either “emergency work” or “permanent work.” Within those two broad categories are separate sub-categories. In addition to the emergency work and permanent work categories, FEMA’s Public Assistance program includes Category Z, which represents any indirect costs, any direct administrative costs, and any other administrative expense associated with a specific project. Given the immense scale and scope of devastation, disaster recovery in Puerto Rico is a complex and dynamic process involving a large number of entities. As shown in figure 3, implementing the Public Assistance program involves recovery partners from the federal government; the Commonwealth of Puerto Rico; and Puerto Rico government agencies, public corporations, municipalities, and eligible nonprofits in Puerto Rico. These recovery partners play a role in implementing the Public Assistance program by developing projects and providing or receiving grants and sub-grants (subawards). FEMA. FEMA administers the Public Assistance program in partnership with Puerto Rico and makes Public Assistance grant funding available to Puerto Rico. Puerto Rico Central Office of Recovery, Reconstruction and Resilience. Puerto Rico was required, as a condition to receiving Public Assistance grant funding, to establish an oversight authority supported by third-party experts and provide centralized oversight over recovery funds. In October 2017, the governor of Puerto Rico established the Central Office of Recovery, Reconstruction, and Resilience (central recovery office) to be the recipient for all Public Assistance funding consistent with the conditions provided in Amendment 5 to the President’s disaster declaration. The central recovery office is a non-federal entity that provides a subaward to an applicant to carry out part of the federal program. As a recipient of federal funds, the central recovery office must oversee subrecipients to ensure that they are aware of and comply with federal regulations. According to central recovery office officials, the office was also established to ensure coordination with FEMA across the numerous partners in recovery. Commonwealth agencies, local entities, and private non-profits. Puerto Rico’s agencies, such as the Department of Housing, and public corporations, such as the Puerto Rico Electric Power Authority, act as subrecipients. Specifically, they work with FEMA and the central recovery office to identify, develop, and implement Public Assistance projects. Local entities, including Puerto Rico’s 78 municipalities and eligible private non-profits that provide critical services, are also subrecipients of FEMA Public Assistance funding. As subrecipients, these entities receive subawards from the central recovery office to carry out work under the Public Assistance program. According to a November 2017 amendment to Puerto Rico’s major disaster declaration, FEMA must obligate all large project funding for Public Assistance permanent work through alternative procedures due to the extraordinary level of infrastructure damage caused by Hurricane Maria, as well as Puerto Rico’s difficult financial position. To develop projects under the Public Assistance program, FEMA and Puerto Rico officials are to collaborate to identify and document the damage caused by a disaster to a particular facility. These officials are to then use the damage description to formulate the scope of work—or activities required to fix the identified damage—as well as the estimated cost of these activities. Under the standard Public Assistance program, FEMA will fund the actual cost of a large project, and will increase or reduce the amount of funding based on the cost of completed eligible work. In contrast, in Puerto Rico, the alternative procedures require that the central recovery office and subrecipients work collaboratively with FEMA to develop a fixed cost estimate. According to FEMA officials, once this fixed cost estimate is agreed to and obligated, subrecipients have flexibility within that fixed cost estimate to rebuild in the manner that they find most appropriate. Subrecipients could do the actual work used to develop the fixed cost estimate, or they could put funds towards another FEMA approved project. Unlike the standard Public Assistance program, the subrecipient is responsible for actual costs that exceed the fixed cost estimate. If actual costs are less than the fixed cost estimate, the subrecipient may use all or part of excess funds for other eligible purposes, such as for additional cost-effective hazard mitigation measures to increase the resiliency of public infrastructure, as detailed in figure 4 below. Section 20601 of the Bipartisan Budget Act of 2018 authorized FEMA, when using the alternative procedures, to provide assistance to fund the replacement or restoration of disaster-damaged infrastructure that provides critical services—such as medical and educational facilities—to an industry standard without regard to pre-disaster condition. It also allows for restoration of components not damaged by the disaster when necessary to fully effectuate restoration of the disaster-damaged components to restore the function of the facility or system to industry standards. For example, through the Act, FEMA may fund the restoration of a disaster-damaged school building—which provides a critical service—to accepted industry standards applicable to the construction of education facilities. Therefore, according to FEMA policy, if the school building was not up to industry standards, or in poor condition prior to the 2017 hurricanes, the Act allows FEMA to fund the restoration of this building to a better condition than it was in prior to the storms. Further, the Additional Supplemental Appropriations for Disaster Relief Act of 2019 (Supplemental Relief Act), which was signed into law on June 6, 2019, provides additional direction to FEMA in the implementation of section 20601. Following the Supplemental Relief Act, FEMA issued additional guidance in September 2019 that includes information on eligibility and applicable industry standards. Since the 2017 hurricanes, FEMA has obligated nearly $6 billion in Public Assistance program funding for 1,558 projects across Puerto Rico, according to our analysis of FEMA’s data as of September 30, 2019 (see fig. 5). Specifically, FEMA had obligated approximately $5.1 billion for emergency work projects (categories A and B), $487 million for permanent work projects (categories C through G), and $315 million for management costs (Category Z). Of the nearly $6 billion FEMA has obligated, Puerto Rico has expended approximately $3.9 billion as of September 30, 2019—about 65 percent of total Public Assistance program obligations to Puerto Rico—to reimburse subrecipients for completed work. As shown in table 1, Puerto Rico has expended about $3.7 billion for emergency work projects, $39 million for permanent work projects, and $104 million for management costs. The majority of FEMA’s obligations and the funding Puerto Rico expended as of September 30, 2019, are for emergency work because these projects began soon after the disasters struck and focused on debris removal and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer- term repair and restoration of public infrastructure, such as a sports center in Caguas, Puerto Rico, as shown in figure 6 below. FEMA and Puerto Rico officials identified challenges in developing Public Assistance projects in Puerto Rico. Specifically, they cited: (1) delays in establishing a cost estimating guidance for projects in Puerto Rico, (2) the large number of damaged sites that require finalized fixed cost estimates, and (3) challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. Delays in establishing cost estimating guidance. Given the importance of reaching mutual agreement on fixed cost estimates for alternative procedures projects, FEMA and Puerto Rico have taken a deliberative approach to establishing the data and procedures that will be used to develop these fixed cost estimates. This includes, among other things, adapting the way FEMA estimates costs to the specific post- disaster economic conditions in the territory, including developing exceptions to FEMA’s cost estimating guidance. According to FEMA, these exceptions were developed to account for risk, including higher anticipated costs due to increased demand for labor, equipment, and materials in Puerto Rico’s post-disaster economy. To develop these exceptions, FEMA and the central recovery office established a Center of Excellence staffed with mutually agreed upon representatives. FEMA used cost estimators from RAND Corporation (RAND) as their chosen representatives, while the central recovery office hired separate contractors as their representatives. According to FEMA officials, the Center of Excellence was established, among other things, to involve Puerto Rico in developing cost estimating guidance and to ensure that the exceptions made to FEMA’s Cost Estimating Format were agreeable to both parties. However, this approach has been beset by delays. For example, it took nearly one year for Puerto Rico to hire its chosen representatives to the Center of Excellence. According to FEMA, the central recovery office did not select members for the Center of Excellence until February 2019, which delayed progress on the development of finalized fixed cost estimates for permanent work. In July 2019, FEMA leadership signed an agreement establishing the exceptions to FEMA’s cost estimating guidance based on an assessment conducted by a panel of FEMA engineers. These exceptions are intended to address certain costs specific to post-disaster conditions in Puerto Rico, for example adjustments to account for increased labor and material costs. Large number of damaged sites requiring a fixed cost estimate. In addition, FEMA and Puerto Rico officials have cited the large number of sites requiring damage assessments, project development, and mutually agreed-upon fixed cost estimates as a challenge. As of September 30, 2019, FEMA identified a total of 9,344 damaged sites in various stages of development. According to FEMA, 6,304 sites (67.5 percent of total sites identified) have completed damage assessments; 3,021 sites (32.3 percent of total sites identified) are pending the completion of damage assessments to begin project development; and 19 projects (0.2 percent of total sites identified) have finalized fixed cost estimates. According to FEMA guidance, October 11, 2019, was the deadline for completing fixed cost estimates for Public Assistance alternative procedures projects. However, on October 8, 2019, officials from the central recovery office requested an extension to the deadline, which FEMA granted. FEMA officials acknowledged that significant work remains on the part of Puerto Rico, subrecipients, and FEMA towards developing fixed cost estimates for all Public Assistance alternative procedures projects in Puerto Rico. According to FEMA officials, as of October 2019, FEMA and Puerto Rico are working together to establish specific time frames for the completion of fixed cost estimates. Implementation challenges with Section 20601 of the Bipartisan Budget Act of 2018. Puerto Rican government and FEMA officials identified challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. As previously discussed, this section of the Act allows for the provision of assistance under the Public Assistance alternative procedures to restore disaster-damaged facilities or systems that provide critical services—such as medical and educational facilities to an industry standard without regard to pre-disaster condition. Officials from Puerto Rico’s central government stated that they disagreed with FEMA’s interpretation of the types of damages covered by section 20601 of the Bipartisan Budget Act of 2018. In response, FEMA officials in Puerto Rico stated they held several briefings with Puerto Rico’s central recovery office to explain FEMA’s interpretation of the section, and released new guidance in September of 2019. It is too soon to assess the impact this guidance may have on current and future projects, but we will continue to examine this in future work. We will continue to monitor the status of FEMA’s cost estimating process, the development of the remaining fixed cost estimates for permanent work and the impact of FEMA’s new guidance on the implementation of section 20601 of the Bipartisan Budget Act. As Puerto Rico is responsible for any costs that exceed fixed cost estimates for large infrastructure projects under the alternative procedures, FEMA has adapted its guidance for estimating costs to ensure that these estimates accurately reflect the total costs of Public Assistance projects. As previously mentioned, FEMA and Puerto Rico established a Center of Excellence to develop proposed exceptions to adapt FEMA’s Cost Estimating Format—the agency’s standard guidance used for Public Assistance cost estimating nationwide—to more accurately estimate costs in Puerto Rico. After consideration of these proposals, FEMA approved two exceptions: (1) a cost factor to account for local labor, equipment, and material costs in Puerto Rico, and (2) a future price factor and price curve to account for anticipated rises in construction costs over time due to the massive influx of disaster recovery funds, coupled with limited material and labor resources in Puerto Rico. Cost Factor: According to FEMA officials, during the development of a cost factor by the Center of Excellence, FEMA learned that Gordian, a company that provides local cost indices called RSMeans which FEMA uses as part of their standard Cost Estimating Format, was developing four localized cost indices to apply to San Juan, urban areas, rural areas, and remote island (the islands of Vieques and Culebra) areas of Puerto Rico. FEMA officials told us that these cost indices compile location-specific construction costs for each of the four areas. In 2019, a panel of FEMA engineers assessed the methodologies proposed by RAND, the Center of Excellence, and the RSMeans localized indices for Puerto Rico. On July 12, 2019, in agreement with the panel’s assessment, FEMA decided to use RSMeans’s localized cost indices to act as the cost factor for fixed cost estimates in Puerto Rico beginning on September 27, 2019. For fixed cost estimates developed before this date, FEMA used a different cost index that RSMeans had previously developed for San Juan. According to FEMA, cost estimates signed before September 27, 2019 using RSMeans’s San Juan cost index as the cost factor are considered final. Future Price Factor and Curve: According to FEMA officials, FEMA began using a future price factor—an economic model based on expected construction conditions to estimate construction costs across ten years—in July 2019 to estimate costs in Puerto Rico. FEMA is using this future price factor along with the cost factor. FEMA has also asked RAND to develop a future price curve, an analysis that will adjust as time goes on to account for changing economic conditions, to eventually replace the future price factor. FEMA estimates that RAND will take until November 2019 to develop the future price curve, and that the future price factor is being used in the meantime. FEMA officials stated that cost estimates produced using the future price factor are considered final and will not be eligible for revisions in the future once FEMA implements the future price curve. According to FEMA officials, the use of the cost factor combined with the future price factor and curve are intended to adapt FEMA’s cost estimating guidance to the specific post-disaster economic conditions in Puerto Rico. FEMA’s cost estimating guidance for Public Assistance fully or substantially met nine of the 12 steps from GAO’s Cost Estimating and Assessment Guide (GAO Cost Guide). However, the guidance partially met two and minimally met one of the remaining cost estimating steps, as shown in figure 7 below. The GAO Cost Guide outlines best practices for cost estimating and presents 12 steps that, when incorporated into an agency’s cost estimating guidance, should result in reliable and valid cost estimates that management can use to make informed decisions. A reliable cost estimate is critical to the success of any construction program. Such an estimate provides the basis for informed decision making, realistic budget formulation and program resourcing, and accountability for results. For example, FEMA, Puerto Rico and subrecipients rely on cost estimates to help ensure that funding is sufficient for the costs of the Public Assistance projects carried out under the fixed cost estimate. Accurate and reliable cost estimating is especially important in Puerto Rico where all large permanent Public Assistance projects are being developed under the alternative procedures, which require a fixed cost estimate that cannot be revised once the award is made. Given Puerto Rico’s financial situation, accurate cost estimates are necessary so that Puerto Rico has adequate funds to complete Public Assistance projects. For example, on the basis of our analysis, we determined that FEMA’s guidance fully met the step to “define the estimate’s purpose” because it describes the estimate’s purpose, level of detail required, and overall scope. In addition, the guidance provides a time frame for which the estimates must be developed and reach agreement. FEMA’s guidance substantially met another step, “identify the ground rules and assumptions”, because it provides measures to ensure assumptions are not arbitrary, are founded on expert judgments, and are documented. However, we rated this step as substantially met instead of fully met because FEMA’s guidance does not address all of GAO’s best practices for ground rules and assumptions. For example, it does not discuss the risk of an assumption being incorrect and the resultant effect on the cost estimate. Additionally, FEMA guidance substantially met the step to “document the estimate” because it contains, among other things, basic information about the project and the estimate; a description of the scope of work; the basis for the estimate; and supporting backup information. However, we assessed this step as substantially met instead of fully met because FEMA policy does not require documentation to include a discussion of high risk areas. Further, we found that FEMA’s guidance for cost estimating does not fully or substantially meet three steps: (1) conduct a sensitivity analysis; (2) obtain the data; and (3) conduct a risk and uncertainty analysis. Sensitivity analysis (Minimally met): We found that FEMA’s cost estimating guidance only minimally met the best practice regarding sensitivity analysis. A sensitivity analysis addresses some of the uncertainty in a cost estimate by testing assumptions and other factors that could change cost. By examining each assumption or factor independently, while holding all others constant, the cost estimator can evaluate the results to discover which assumptions or factors most influence the estimate. A sensitivity analysis also requires estimating the high and low uncertainty ranges for significant cost driver input factors. According to the GAO Cost Guide, when an agency does not identify the effect of uncertainties associated with different assumptions, this increases the chance that decisions will be made without a clear understanding of these impacts on costs. According to FEMA officials, FEMA’s cost estimating guidance accounts for construction, cost, and market risks over time which allows FEMA to plan and estimate costs for unknown or unforeseen circumstances such as cost escalation or overhead. In addition, FEMA officials stated that their use of RSMeans unit costs, a benchmark industry standard based on ongoing iterative analysis of construction costs nationwide, allows FEMA to account for fluctuations and uncertainties in the market. However, we rated this step as minimally met because FEMA guidance does not indicate that cost estimators are to conduct a sensitivity analysis as part of FEMA’s cost estimating process. Specifically, the guidance does not require that an estimator examine the effect of changing assumptions and the effect these changes could have on a cost estimate. Since the guidance does not direct estimators to conduct a sensitivity analysis, estimators may not fully understand which variable most affects the cost estimate and FEMA risks making decisions without a clear understanding of the impact of costs. Obtaining the data (Partially met): We found that FEMA’s cost estimating guidance only partially met the best practice for obtaining data—assembling information to serve as the foundation of a cost estimate. The quality of the data obtained affects a cost estimate’s overall credibility. Depending on the data quality, an estimate can range from a mere guess to a highly defensive cost position. We found that FEMA did not meet some of the best practices for obtaining data. Specifically, FEMA’s guidance did not outline procedures for making sure data was validated using historical data as a benchmark for reasonableness. In addition, FEMA’s guidance did not stipulate that data be normalized to remove the effects of inflation or analyzed with a scatter plot to determine trends and outliers. As mentioned previously, FEMA used a city cost index based on San Juan as an interim measure to estimate costs throughout Puerto Rico until September, 2019 when FEMA began using additional cost indices to target costs in particular regions of Puerto Rico. Similarly, FEMA has been using a static future price factor as an interim measure until a more dynamic and iterative future price curve is finalized. FEMA does not plan to adjust cost estimates developed using these interim measures. Without adjusting these costs when better data becomes available consistent with the obtaining the data step, FEMA risks creating estimates that may not be based on accurate data. According to FEMA, estimates are developed based on historical costs or nationally available industry standard data. In addition, FEMA officials stated that FEMA does not revisit cost estimates to reflect updated market conditions or newly available cost information because FEMA uses an industry standard cost database that is updated quarterly. FEMA officials stated that the interim measures used to estimate costs are intended to enable work to continue and cost estimates to be developed while the future cost curve is being developed. However, we rated the step relating to obtaining data as partially met because without finalizing the future cost curve, and updating estimates to reflect this information, estimates may not be based on accurate data. Additionally, while the use of industry standard cost estimating resources addresses some best practices for this step such as data normalization and data validation, industry data is only one of many sources referenced in FEMA’s guidance. For other data sources identified, FEMA guidance does not describe a process to analyze the data for cost drivers or to adequately document the data. Risk and uncertainty analysis (Partially met): We found that FEMA’s cost estimating guidance does not include best practices consistent with performing a statistical analysis of risk to determine a range of possible costs and the level of confidence in achieving the estimate. By conducting a risk and uncertainty analysis, a cost estimator can model the effect of schedules slipping and missions changing, allowing for a known range of potential costs. Having a range of costs around a point estimate is useful to decision makers because it conveys the level of confidence in achieving the most likely cost and informs estimators about potential risks. We found that FEMA’s cost estimating guidance does not require a statistical analysis of risks to be performed to determine a range of possible costs. While contingencies are accounted for within the guidance, they are not derived from a statistical analysis, nor do they reflect a level of confidence in the estimate. According to FEMA, risks associated with changing costs and conditions over the life of a Public Assistance alternative procedures construction project is not a risk that the federal government takes on. Rather, the risk is transferred to the recipient and subrecipients responsible for executing work using Public Assistance alternative procedures funding. In addition, FEMA officials told us that alternative procedures funding is not always used to restore facilities to pre-disaster condition, and therefore may not represent the final cost of work completed. In addition, the procedures are designed to incentivize subrecipients to manage grants and use excess funds for eligible work, as described earlier. However, GAO’s Cost Guide states that point estimates alone are insufficient for good decision- making. For management to make good decisions, the program estimate must reflect the degree of uncertainty, so that a level of confidence can be given about the estimate regardless of the entity holding the risk. In the case of alternative procedures projects in Puerto Rico, where actual costs that exceed the estimate are borne by the recipient or subrecipient, estimates that accurately reflect the degree of uncertainty are important in establishing a level of confidence about the estimate. While FEMA fully or substantially met nine of the 12 steps in the GAO Cost Guide, FEMA could improve its cost estimating guidance to ensure that all best practices in the 12 steps in the GAO Cost Guide are fully met. In doing so, FEMA could further enhance the reliability of its cost estimating guidance. In response to the complexity of the recovery, as well as the nature of change in a recovery environment, FEMA has developed and issued guidance that is specific to the implementation of the Public Assistance program in Puerto Rico. As previously discussed, disaster recovery in Puerto Rico is a complex and dynamic process that requires the coordination of many entities, including FEMA, the government of Puerto Rico, and numerous subrecipients. Recovery in Puerto Rico also involves the use of Public Assistance structures including alternative procedures and new flexibilities afforded to FEMA under the Bipartisan Budget Act of 2018. FEMA officials told us that many elements of the Public Assistance process in Puerto Rico are the same as in other declared disasters across the United States. Therefore, according to FEMA officials, the standard guidance for the Public Assistance program, Public Assistance Policy and Procedures Guide (Policies and Procedures Guide), generally applies in Puerto Rico. FEMA has also developed policies and guidance to address the specific recovery circumstances in Puerto Rico. For example, in April of 2018 and September of 2019, FEMA published the Public Assistance Alternative Procedures Guide for Permanent Work to clarify how FEMA would implement the program in Puerto Rico. This guidance describes the scope and limitations of the alternative procedures; highlights changes to aspects of the Public Assistance program to which these procedures apply; identifies responsibilities for certain activities; and documents timelines for key actions and decisions. FEMA also issued a policy on the agency’s implementation of section 20601 of the Bipartisan Budget Act as it applies in Puerto Rico in September of 2018, detailing the applicability of the section to specific critical services and outlining eligible industry standards for purposes of authorized projects, among other things. Following the Supplemental Relief Act, FEMA issued guidance in September 2019 that includes additional information on eligibility and applicable industry standards. According to FEMA officials, FEMA has also developed and implemented training specific to recovery in Puerto Rico. This training has included presentations to the central recovery office and subrecipients on the flexibilities of the Bipartisan Budget Act and alternative procedures, among other things. FEMA has iteratively developed, refined, and clarified Public Assistance guidance in Puerto Rico to respond and adapt to changing recovery conditions since the 2017 hurricanes. While iterative and responsive guidance is necessary in a complex and changing recovery, the pace of change necessitates that all involved recovery entities have real-time accessibility to current applicable FEMA guidance. Officials from the central recovery office and four Puerto Rico government agencies we spoke with stated that they did not consistently have the guidance they needed to implement the Public Assistance program. For example, an official from one Puerto Rico agency said that they delayed starting on any large Public Assistance projects through alternative procedures because they were waiting for FEMA to issue additional guidance. Similarly, we reported in March 2019 that four municipal officials stated that they were waiting on additional instruction from FEMA to establish more clear and consistent guidance to begin projects in Puerto Rico. According to FEMA officials, the agency works with Puerto Rico government officials and subrecipients to provide relevant guidance and technical assistance throughout the Public Assistance project development process. However, we found that pertinent guidance may not be shared with key recovery partners. For example, FEMA officials told us that the Standard Operating Procedure for Alternative Procedures (SOP) was available as of March 2019, but remains in draft form as of October 2019, pending finalized information about cost estimating procedures. This SOP provides instruction on specific procedures to implement the Public Assistance alternative procedures guide. In April 2019, FEMA officials described the SOP as a “living document”; they also stated that the draft SOP is in effect and has been sent to the central recovery office for further dissemination to subrecipients. While the SOP document is still in draft, according to FEMA officials, it is operative guidance that FEMA expects the central recovery office to disseminate to subrecipients. However, in June 2019, central recovery office personnel told us they did not view the SOP as being in effect as it was still in draft form. As such, central recovery office officials stated they had not distributed the SOP to subrecipients. FEMA officials stated that they rely on the central recovery office to disseminate at least some FEMA guidance and policy to subrecipients in Puerto Rico, including municipalities and government agencies. As the recipient for all Public Assistance funding in Puerto Rico, the central recovery office is responsible for monitoring and providing technical assistance to subrecipients to ensure that federal funding is used in accordance with federal statutes, regulations, and the requirements of the grant. FEMA officials also stated that subrecipients have an assigned FEMA point of contact to assist them through the project development process, including communicating policy information and updates. However, municipal and Puerto Rico agency officials we spoke to said that confusion persisted in part due to changing points of contact. FEMA’s reliance on the central recovery office or individual FEMA staff to deliver and distribute FEMA guidance poses a risk that the guidance is not made accessible to all partners involved in recovery, including subrecipients. While FEMA officials told us that FEMA assigns a point of contact to subrecipients to provide guidance and other necessary information throughout the project development process, Puerto Rico officials described a significant amount of “back and forth” with FEMA regarding requests for clarification, guidance, or instruction. FEMA officials acknowledge that FEMA has faced difficulties in disseminating information in Puerto Rico. According to FEMA officials, FEMA does not maintain a repository of Public Assistance policies and guidance available to all relevant recovery partners. The accessibility of FEMA guidance is especially important because FEMA releases iterative guidance to respond and adapt to changing recovery circumstances, such as updated legislation, among other things. Misunderstandings across recovery partners about guidance applicability raise concerns that subrecipients do not understand which guidance is currently in effect or how they should proceed in accordance with FEMA policy. Without real-time access to the totality of FEMA’s current applicable guidance, recovery partners risk using guidance that has been revised or replaced. According to FEMA’s National Disaster Recovery Framework, the federal government has the role of ensuring that information is distributed in an accessible manner such that all partners are informed of and aware of the recovery process. Developing a repository of current applicable policy and guidance and making it available to all relevant recovery partners in Puerto Rico, including subrecipients, would improve the accessibility of the information and provide greater assurance that recovery partners are aware of current applicable guidance. Following the 2017 hurricanes, Puerto Rico took several steps to provide management and oversight of the Public Assistance program to ensure the program is implemented in compliance with applicable laws and regulations, as well as FEMA policies and guidance. Specifically, Puerto Rico (1) established a central recovery office to provide management and oversight of recovery funds; (2) developed an administrative plan, as required by FEMA policy; (3) developed an internal controls and recovery management plan; and (4) created a system to oversee and assess subrecipient risk. First, in accordance with Amendment 5 to the President’s disaster declaration, the central recovery office has been supported by third-party experts to help it establish its structure and carry out its management and oversight mission. Specifically, the central recovery office has hired contractors to help perform the following functions: Design a management guide and assess subrecipient risk. According to central recovery office officials, the office hired contractors to develop management protocols and guidance to ensure compliance with federal and state law, regulation, and guidance. The office also tasked these contractors with developing a system to oversee subrecipients using risk-based oversight. Provide technical assistance. Central recovery office officials also hired contractors to provide technical assistance and advise Puerto Rico’s government agencies and municipalities regarding recovery processes. This includes helping subrecipients define the scope of damages, and providing technical assistance to develop Public Assistance projects, among other things. The recovery office also tasked these contractors with overseeing grant accounting and reviewing reimbursement requests from subrecipients for eligible Public Assistance work performed. Develop data systems to track the central recovery office’s work. The central recovery office launched an online transparency portal, with the assistance of contractors, that is intended to provide a breakdown of FEMA Public Assistance and other federal funding made available for disaster recovery in Puerto Rico. According to central recovery office officials, in addition to the development of the online transparency portal, contractor personnel also developed systems to track internal recovery data. Second, to meet FEMA reporting requirements, the central recovery office developed an administrative plan—or FEMA State Agreement—in 2019 for the Public Assistance program following the 2017 hurricanes. This plan outlines the central recovery office’s management and oversight activities as well as the procedures that Puerto Rico must follow in implementing the programs. Puerto Rico is responsible, as required in the FEMA State Agreement, to ensure that subrecipients are in compliance with the conditions of the disaster grant award. For example, the plan emphasizes FEMA’s requirement that Puerto Rico submit quarterly progress and financial reports on the status of projects. Further, the plan describes Puerto Rico’s specific roles and responsibilities for managing and overseeing the program. For example, according to the Puerto Rico 2019 Public Assistance Administrative Plan, the central recovery office is responsible for, among other things, processing requests for time extensions to complete projects and conducting quarterly reviews, site inspections, and audits to ensure program compliance. Third, in addition to the administrative plan, in March 2019, the central recovery office released the Disaster Recovery Federal Funds Management Guide (management guide) that includes an internal controls plan and other policies and procedures for managing recovery funds. The management guide’s 14 chapters outline roles, responsibilities, policies and procedures on various recovery functions including procurement, payment and cash management, and subrecipient management and oversight, among other things. FEMA officials told us that they reviewed portions of the management guide, including sections on the central recovery office’s payment and cash management plan and subrecipient oversight. Further, FEMA worked with the central recovery office to make revisions to the plan, which included, adding clarifying information and correcting instances of duplication in the guidance, among other things. In addition, the central recovery office, with the help of contractors, is taking steps to assist subrecipients in meeting compliance requirements and supplementing their management capacity. FEMA and Puerto Rico government agency officials cited varying levels of capacity to manage federal grant funds, including Public Assistance funding. For example, agency officials at one government agency we spoke with stated that they were performing their own federal grants management and had prior experience managing large federal funds. Other Puerto Rico government officials we interviewed reported that central recovery office contractors have helped augment capacity to oversee federal funds. For example, officials from one subrecipient, a Puerto Rico public corporation, said that their agency did not have prior experience managing federal funds on such a large scale. The official told us that in order to bolster the capacity of the agency to oversee these grant funds, central recovery office contractors work closely with the agency to help them manage Public Assistance funding. Similarly, officials at one Puerto Rico government agency stated that the central recovery office offered help on uploading and validating grant data. Fourth, as detailed in its management guide, the central recovery office has also developed criteria to evaluate subrecipients’ risk of noncompliance with federal laws and regulations, as well as FEMA policy. According to the procedures outlined in the central recovery office’s management guide, each subrecipient is to be assessed annually to determine whether they are at a low, moderate, or high risk for noncompliance. The central recovery office is to place additional award conditions on subrecipients with risk factors identified through the risk assessment process. These may include additional oversight and more frequent on-site visits from the central recovery office. Additionally, central recovery office guidance states that corrective actions are to be taken in cases when deficiencies are found during audits. In March 2019, we reported that FEMA instituted a manual reimbursement process in November 2017 for subrecipients in Puerto Rico for federal funds, including Public Assistance funds, to mitigate fiduciary risk and decrease the risk of misuse of funds. Specifically, FEMA officials stated that they decided to institute this process because the government of Puerto Rico had expended funds prior to submitting complete documentation of work performed. According to FEMA officials, they also decided to institute the manual reimbursement process due to Puerto Rico’s financial situation, weaknesses in internal controls, and the large amount of recovery funds, among other things. The manual reimbursement process required that FEMA review each reimbursement request before providing Public Assistance funds to mitigate risk and help ensure financial accountability. In Puerto Rico, the manual reimbursement process requires that the central recovery office fill out the Office of Management and Budget’s Standard Form 270 and submit supporting documentation to FEMA before obligated funds can be withdrawn by Puerto Rico through the central recovery office and reimbursed to subrecipients. Subsequently, FEMA must review the submitted Standard Form 270 and all project documentation for completeness, compliance, and accuracy before disbursing funds to the recipient. In cases where FEMA requires additional documentation to process a Standard Form 270 request, FEMA will submit requests for information asking the central recovery office to supply the information needed for FEMA to complete the review. On March 25, 2019, FEMA and the government of Puerto Rico, through the central recovery office, signed an agreement allowing the central recovery office to directly access federal grant funds and reimburse subrecipients for Public Assistance work they perform. During FEMA’s review of the central recovery office’s management guide, FEMA asked for revisions to sections, including chapters related to payment and cash management and subrecipient management and monitoring. According to the March 2019 agreement, these policies and procedures were developed in collaboration with FEMA, and comments and concerns provided by FEMA were addressed. FEMA officials also told us that they sampled Public Assistance grant documentation for completeness to ensure that the reimbursement requested was eligible for payment. According to FEMA officials, FEMA communicated minor discrepancies with the central recovery office for resolution, but said that they did not find any significant discrepancies during their completeness review. On April 1, 2019, FEMA removed the manual reimbursement process and began a transition to allow the central recovery office to make direct payments to subrecipients. In July 2019, FEMA announced that it would reinstate the manual reimbursement process due to, “ongoing leadership changes within the Puerto Rican government, combined with continued concern over Puerto Rico’s history of fiscal irregularities and mismanagement.” FEMA said that these additional steps are being taken in order to protect the federal investment in Puerto Rico’s recovery. We previously reported that FEMA and central recovery office officials told us that the manual reimbursement process caused delays in reimbursements, but once FEMA increased the number of personnel devoted to reimbursement reviews, delays decreased. In September 2019, FEMA once again lifted the manual reimbursement process following a meeting between FEMA and Governor Vásquez’s senior leadership. According to FEMA, the agreement to remove the manual reimbursement process is contingent on Puerto Rico’s continued ability to implement the mutually-acceptable internal controls plan. FEMA officials also stated that they are selecting samples from fiscal year 2019 to test Puerto Rico’s internal controls, and plan to move to a quarterly testing routine after testing for fiscal year 2019 is complete. As part of our ongoing review, we will continue to monitor the central recovery office’s management and oversight of Public Assistance funding, as well as of FEMA’s oversight of the federal investment in Puerto Rico’s recovery. After the devastation of the catastrophic 2017 hurricane season, FEMA and Puerto Rico face a recovery of enormous scope. Puerto Rico estimates that $132 billion in funding will be needed to repair and reconstruct the infrastructure damaged by the hurricanes through 2028, and FEMA has identified nearly ten thousand damaged sites in need of Public Assistance funding. FEMA has taken steps to adapt its guidance to estimate costs to post-disaster conditions in Puerto Rico, but strengthening its cost estimating guidance could help FEMA provide greater assurance that its cost estimating guidance for Public Assistance projects is reliable. In addition, given the large number of individuals and entities involved in Puerto Rico’s complex recovery, ensuring that all recovery partners have easy access to the most current applicable policy and guidance could help clarify which FEMA guidance and policies are in effect. We are making the following two recommendations to FEMA: The FEMA administrator should revise FEMA’s cost-estimating guidance for Public Assistance projects to fully align with all 12 steps in the GAO Cost Estimating and Assessment Guide. (Recommendation 1) The FEMA administrator should develop a repository for all current applicable Public Assistance policies and guidance for Puerto Rico and make it available to all recovery partners, including subrecipients. (Recommendation 2) We provided a draft of this product to FEMA, DHS and Puerto Rico’s Central Office of Recovery, Reconstruction, and Resilience (central recovery office) for comment. In its comments, reproduced in appendix III, DHS concurred with our recommendations. FEMA also provided technical comments, which we incorporated as appropriate. DHS concurred with our first recommendation that FEMA revise its cost- estimating guidance for Public Assistance projects to fully align with all 12 steps in the GAO Cost Estimating and Assessment Guide. DHS stated that FEMA will create a quality assurance checklist as an addendum to FEMA’s Cost Estimating Format (CEF) to ensure that cost estimates reflect best practices from the GAO Cost Estimating and Assessment Guide. This action is a positive step to addressing our recommendation and we will monitor FEMA’s efforts to complete this work. In DHS’s concurrence to our second recommendation that FEMA develop a repository for all current applicable Public Assistance policies and guidance for Puerto Rico to be made available to all recovery partners, DHS requested that GAO consider this recommendation resolved and closed as implemented. DHS stated that FEMA maintains Public Assistance policy and guidance documents, including those specific to Puerto Rico, on the agency’s public web site, which FEMA stated it will continue to update. DHS also stated that FEMA maintains non-publicly available reference documents on the agency’s internal web site through the Grants Manager and Grants Portal systems. As we noted in our report, Puerto Rico’s recovery is a complex and dynamic process that requires the coordination of many recovery partners, including numerous municipalities and commonwealth agencies. For this reason, ensuring that information is distributed in an accessible manner would provide greater assurance that all recovery partners are aware of the most current and applicable Public Assistance policies and guidance. We will monitor FEMA’s public and internal web sites, including policy and guidance updates, to assess whether the actions outlined by FEMA meet the intent of our recommendation. COR3 also provided comments to our draft report, which we reproduced in appendix IV. In its comments, COR3 stated that it works with Public Assistance applicants to, among other things, provide technical assistance and training, and to monitor projects. COR3 also stated that it has established joint efforts with FEMA to improve COR3’s technical assistance, as well as compliance and monitoring efforts. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the Administrator of FEMA, the Puerto Rico government, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you and your staff have any questions, please contact me at (404) 679- 1875 or curriec@gao.gov. GAO staff who made key contributions to this report are listed in appendix V. Since September 2017, the Federal Emergency Management Agency (FEMA) obligated nearly $6 billion in Public Assistance grant funding for 1,558 projects across Puerto Rico as of September 30, 2019. Specifically, FEMA had obligated $5.13 billion for emergency work projects (categories A and B), about $487 million for permanent work projects (categories C through G), and $315 million for management costs, (category Z). As of that date, Puerto Rico expended nearly $3.9 billion—about 65 percent of total Public Assistance obligations to Puerto Rico—to reimburse subrecipients for completed work. Of this, Puerto Rico expended about $3.7 billion (96 percent of all expended funds) for emergency work projects, $38.6 million (1 percent) for permanent work projects, and $104 million (3 percent) for management costs. The majority of FEMA’s obligations and the funding Puerto Rico expended as of September 30, 2019 are for emergency work projects because these projects began soon after hurricanes Irma and Maria struck and focused on debris removal and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer-term repair and restoration of public infrastructure. While the data in this appendix represent the status of Public Assistance funding as of September, 2019, the amount of grant funding FEMA obligates and Puerto Rico expends will likely increase over time as additional projects are finalized and approved. Emergency Work. As of September 30, 2019, FEMA obligated a total of $5.13 billion for approximately 1,200 emergency work projects across Puerto Rico. These projects focus on debris removal activities and providing assistance to address immediate threats to life and property. Category A: Debris Removal. FEMA obligated $637.0 million and Puerto Rico expended $427.1 million for 331 projects focused on debris removal activities in Puerto Rico under category A. Category B: Emergency Protective Measures. FEMA obligated nearly $4.5 billion for 871 projects under Category B. Of this, Puerto Rico has expended $3.29 billion. For example, FEMA has obligated more than $140 million to the Puerto Rico Aqueducts and Sewer Authority under category B to fund emergency protective measures, including using back-up generators to supply water to the island after Hurricane Maria, among other things. Permanent Work. As of September 30, 2019, FEMA has obligated about $487.3 million for 159 permanent work (Categories C through G) projects in Puerto Rico. These projects focus on the restoration of disaster- damaged infrastructure or systems. Category C: Roads and Bridges. FEMA obligated $140.5 million and Puerto Rico has expended $32.8 million for 20 projects focused on the permanent repair of roads and bridges in Puerto Rico, such as the damage illustrated in figure 8 below. Category D: Water Control Facilities. As of September 30, 2019, FEMA has obligated $435,493 for three projects, of which approximately $150,000 has been expended. This includes work on heavy water control infrastructure, such as berms or levees. Category E: Buildings and Equipment. FEMA obligated $43.5 million and Puerto Rico expended nearly $4 million for 87 projects focused on repairing and rebuilding damaged public buildings and equipment, such as the school shown in figure 9 below. Category F: Utilities. Of the $487 million FEMA obligated for permanent work projects, the largest share, $282 million was obligated for nine projects related to utilities, such as architectural and engineering design services for design work for electricity grid recovery projects. For example, in June 2019, FEMA obligated $111 million for architectural and engineering design services for design work for electricity grid recovery projects. Puerto Rico has expended just over $1 million of the funding obligated for projects related to repairing utilities. Category G: Parks, Recreational and Other Facilities. FEMA obligated approximately $20.9 million and Puerto Rico has expended just over $600,000 across 40 projects focused on repairing parks, playgrounds, and other facilities. GAO’s Cost Estimating and Assessment Guide (GAO Cost Guide) outlines best practices pertaining to cost estimating principles, presenting 12 steps to create high-quality estimates. These steps are generally applicable in a variety of circumstances and range from defining the purpose of the estimate to obtaining data to presenting the estimate to management for approval. Application of these principles should result in reliable and valid cost estimates that management can use to make informed decisions. To assess the extent to which FEMA’s cost estimating policy aligns with these best practices, we compared FEMA’s information to the GAO Cost Guide. Specifically, we reviewed FEMA documents containing cost estimating information pertinent to Public Assistance projects including FEMA’s Public Assistance Alternative Procedures Guide for Permanent Work FEMA-4339-DR-PR (Alternative Procedures Guide) and FEMA’s Cost Estimating Format (CEF) for Large Projects Instructional Guide V2.1 (dated September 2009). We compared FEMA’s guidance for developing cost estimates outlined in these documents against the 12 best practices described in the GAO Cost Guide. We assessed the extent to which these documents aligned with the best practices on a five point scale. Fully met. FEMA provided complete evidence that satisfies the elements of the step. Substantially met. FEMA provided evidence that satisfies a large portion of the elements of the step. Partially met. FEMA provided evidence that satisfies about half of the elements of the step. Minimally met. FEMA provided evidence that satisfies a small portion of the elements of the step. Not met. FEMA provided no evidence that satisfies any of the elements of the step. Taken together, FEMA’s documents provided cost estimating information that either substantially or fully meets nine of the 12 cost estimating steps. Furthermore, the information partially met two of the 12 steps, and minimally met one of the 12 steps. Table 1 summarizes GAO’s assessment of the extent to which FEMA’s information aligns with the 12 steps identified in the GAO cost guide. Chris Currie, (404) 679-1875 or curriec@gao.gov. In addition to the contact named above, Joel Aldape (Assistant Director), Taylor Hadfield (Analyst in Charge), Michelle Bacon, Brian Bothwell, Lorraine Ettaro, Eric Hauswirth, Heidi Nielson, Danielle Pakdaman, Amanda Prichard, Kevin Reeves, and Mary Weiland made key contributions to this report. U.S. Virgin Islands Recovery: Additional Actions Could Strengthen FEMA’s Key Disaster Recovery Efforts. GAO-20-54. Washington, D.C.: November 19, 2019. Disaster Resilience Framework: Principles for Analyzing Federal Efforts to Facilitate and Promote Resilience to Natural Disasters. GAO-20-100SP. Washington, D.C.: October 23, 2019. Disaster Recovery: Recent Disasters Highlight Progress and Challenges. GAO-20-183T. Washington, D.C.: October 22, 2019. Wildfire Disasters: FEMA Could Take Additional Actions to Address Unique Response and Recovery Challenges. GAO-20-5. Washington, D.C.: October 9, 2019. Puerto Rico Electricity Grid Recovery: Better Information and Enhanced Coordination Is Needed to Address Challenges. GAO-20-141. Washington, D.C.: October 8, 2019. Emergency Management: FEMA’s Disaster Recovery Efforts in Puerto Rico and the U.S. Virgin Islands. GAO-19-662T. Washington, D.C.: July 11, 2019. 2017 Disaster Relief Oversight: Strategy Needed to Ensure Agencies’ Internal Control Plans Provide Sufficient Information. GAO-19-479. Washington, D.C.: June 28, 2019. Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight Imperative for Further Improvements. GAO-19-617T . Washington, D.C.: June 25, 2019. Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight the Imperative for Further Improvements. GAO-19-594T. Washington, D.C.: June 12, 2019. Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318. Washington, D.C.: May 14, 2019. Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery, GAO-19-281. Washington, D.C.: April 24, 2019. 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296. Washington, D.C.: April 18, 2019. FEMA Grants Modernization: Improvements Needed to Strengthen Program Management and Cybersecurity. GAO-19-164. Washington, D.C.: April 9, 2019. Disaster Recovery: Better Monitoring of Block Grant Funds Is Needed. GAO-19-232. Washington, D.C.: March 25, 2019. Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256. Washington, D.C.: March 14, 2019. Huracanes de Puerto Rico: Estado de Financiamiento de FEMA, Supervisión y Desafíos de Recuperación. GAO-19-331. Washington, D.C.: March 14, 2019. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP. Washington, D.C.: March 6, 2019. U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253. Washington, D.C.: February 25, 2019. 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93. Washington, D.C.: December 6, 2018. Continuity of Operations: Actions Needed to Strengthen FEMA’s Oversight and Coordination of Executive Branch Readiness. GAO-19-18SU. Washington, D.C.: November 26, 2018. Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354. Washington, D.C.: September 6, 2018. 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472. Washington, D.C.: September 4, 2018. Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18-366. Washington, D.C.: May 31, 2018. 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335. Washington, D.C.: February 28, 2018. Disaster Recovery: Additional Actions Would Improve Data Quality and Timeliness of FEMA’s Public Assistance Appeals Processing. GAO-18-143. Washington, D.C.: December 15, 2017. Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30. Washington, D.C.: November 8, 2017. Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720. Washington, D.C.: September 28, 2017. Federal Disaster Assistance: Federal Departments and Agencies Obligated at Least $277.6 Billion during Fiscal Years 2005 through 2014. GAO-16-797. Washington, D.C.: September 22, 2016. Disaster Recovery: FEMA Needs to Assess Its Effectiveness in Implementing the National Disaster Recovery Framework. GAO-16-476. Washington, D.C.: May 26, 2016. Disaster Response: FEMA Has Made Progress Implementing Key Programs, but Opportunities for Improvement Exist. GAO-16-87. Washington, D.C.: February 5, 2016. Hurricane Sandy: An Investment Strategy Could Help the Federal Government Enhance National Resilience for Future Disasters. GAO-15-515. Washington, D.C.: July 30, 2015. Budgeting for Disasters: Approaches to Budgeting for Disasters in Selected States. GAO-15-424. Washington, D.C.: March 26, 2015. High-Risk Series: An Update. GAO-15-290. Washington, D.C.: February 11, 2015. Emergency Preparedness: Opportunities Exist to Strengthen Interagency Assessments and Accountability for Closing Capability Gaps. GAO-15-20. Washington, D.C.: December 4, 2014. Fiscal Exposures: Improving Cost Recognition in the Federal Budget. GAO-14-28. Washington, D.C.: October 29, 2013. Federal Disaster Assistance: Improved Criteria Needed to Assess a Jurisdiction’s Capability to Respond and Recover on Its Own. GAO-12-838. Washington, D.C.: September 12, 2012.", "summary": "In September 2017, two major hurricanes—Irma and Maria—struck Puerto Rico, destroying roads and buildings among other things. Puerto Rico estimates that $132 billion will be needed to repair and reconstruct infrastructure and services through 2028. FEMA is the lead federal agency responsible for assisting Puerto Rico to recover from these disasters. FEMA administers the Public Assistance program in partnership with Puerto Rico to provide funds to rebuild damaged infrastructure and restore services. GAO was asked to review federal recovery efforts in Puerto Rico. In this report, GAO examines, among other things, (1) the status of FEMA Public Assistance program funding and any challenges in implementing the program, (2) the extent to which Public Assistance cost estimating guidance addresses conditions in Puerto Rico and aligns with best practices, and (3) the extent to which FEMA has developed policies and guidance for the program and any challenges with these policies and guidance. GAO reviewed FEMA's cost estimation guidance as well as documentation and data on the Public Assistance program through September 2019. GAO conducted site visits to Puerto Rico and interviewed FEMA and Puerto Rico government officials regarding the status of recovery efforts. As of September 30, 2019, the Federal Emeregency Management Agency (FEMA) had obligated nearly $6 billion in Public Assistance grants to Puerto Rico for 1,558 projects since the September 2017 hurricanes. Of this $6 billion, $5.1 billion was obligated for emergency work projects such as debris removal and temporary power restoration. However, FEMA and Puerto Rico faced challenges in developing long-term, permanent work projects under the Public Assistance program. The large number of damaged sites and delays in establishing cost estimation guidance specific to Puerto Rico have also presented challenges to developing projects, according to FEMA and Puerto Rico officials. Both parties must agree to fixed cost estimates for these projects before work can begin. FEMA and Puerto Rico had approved fixed cost estimates for 19 projects as of September 2019, out of 9,344 damaged sites in Puerto Rico, such as schools, hospitals, and roads. FEMA and Puerto Rico have recently taken actions, including extending the deadline for fixed cost estimates, to address these challenges. However, it is too soon to assess the impact of these actions. FEMA has adapted its Public Assistance cost estimating guidance to accurately reflect costs in Puerto Rico but could improve the guidance to further enhance its reliability. GAO found that FEMA's guidance substantially or fully met best practices for nine of 12 steps included in the GAO Cost Estimating and Assessment Guide , such as documenting and defining the purpose of the estimate. However, FEMA could improve the guidance in three areas, including analyzing risks and future uncertainties that could affect these estimates. FEMA has developed Public Assistance policies and guidance to respond to complex recovery conditions in Puerto Rico. However, Puerto Rico government officials GAO spoke with stated that they were not always certain about how to proceed in accordance with FEMA policy because they did not consistently understand what guidance was in effect. Further, FEMA does not maintain a repository of Public Assistance guidance available to all recovery partners that includes current applicable guidance. Without real time access to current applicable guidance, recovery partners risk using guidance that has been revised or replaced. GAO recommends that FEMA (1) revise its cost estimating guidance for Public Assistance to more fully adhere to best practices and, (2) develop a repository of current applicable Public Assistance guidance available to all relevant recovery partners in Puerto Rico. The Department of Homeland Security concurred with these recommendations.", "document_type": "gao"}
{"report": "DOD’s 921 plan identifies eight initiatives across the covered activities and generally addresses most of the elements required under section 921. Specifically, section 921 required the CMO to provide a plan, schedule, and cost estimate for conducting its reforms of the covered activities. DOD’s plan provides a schedule for all eight efforts, and provides a cost estimate for all but one, which OCMO officials indicated was still under development. The plan identifies costs of at least $116.3 million to $116.8 million to implement these initiatives through fiscal year 2021. We discuss DOD’s funding of these costs later in this report. According to DOD’s plan, the eight initiatives have the following objectives: Civilian hiring improvement. Shorten the time needed to hire civilian employees, improve the matching of enterprise needs to employee competencies, and establish standard metrics and reports on performance of an improved hiring process. Human resources regulatory reform. Develop a new proposed legal authority that allows the department to simplify, streamline, and standardize civilian personnel policies. In addition, use regulatory reform to better recruit, compensate, and retain a qualified civilian workforce at DOD. Human resources service delivery. Establish a common human resources business and service delivery model, a standard set of performance measures, and a cost accountability structure that will be applied to all human resources service providers, with a focus on certain defense agencies and field activities. Strategic sourcing of sustainment and commodity procurement. Improve the buying power of the department, increasing data transparency related to sustainment and commodity procurement, and apply best-in-class cost and contract management practices with suppliers to drive higher performance and lower cost. Maintenance work packages and bills of material. Improve the accuracy of depot maintenance work packages and related bills of material and develop recommendations for process improvements. Munitions readiness. Produce an integrated tool capable of providing senior leaders with an effective assessment of all the variables associated with the health and readiness of the munitions inventory and the ability to assess options for correcting negative trends. Service requirements review boards. Expand the use of service requirement review boards—which review, validate, prioritize, and approve contracted services requirements to accurately inform the budget and acquisition process. Category management. Implement best practices for purchasing goods and services, such as consolidating separate requirements into single contracts, allowing DOD to achieve savings from volume discounts and develop tools aimed at focusing spending on contracts that meet certain best practices for management. Several of these initiatives address aspects of our prior recommendations related to the objectives of the initiatives. How findings and recommendations from GAO and agency inspectors general have been addressed in proposed reforms is among the key questions GAO has previously identified for assessing agency reform efforts. We found that DOD’s initiatives address aspects of our findings and recommendations, but in some cases do not fully address them. For example: In September 2018, we reported that at least six organizations within DOD, including three defense agencies and field activities and the three military departments, provide human resources services to other defense agencies or organizations. All perform the same types of human resources services, such as those related to civilian workforce hiring across DOD. We also reported that there is fragmentation and overlap within the defense agencies and field activities that provide human resources services to other defense agencies or organizations within DOD. This fragmentation and overlap has resulted in negative effects, such as inconsistent performance information regarding hiring, fragmented information technology systems, and inefficiencies associated with overhead costs. We recommended, and DOD concurred, that DOD collect consistent performance information and comprehensive overhead cost information as well as establish time frames and deliverables for key reform efforts. DOD’s human resource service delivery initiative is intended, in part, to address our recommendations. This initiative, however, is focused only on the defense agencies and field activities responsible for human resources service delivery, and does not include all human resources service providers we highlighted in our September 2018 report. In June 2016, we reported that the Defense Logistics Agency and the military services have some internal efficiency measures for supply and depot operations; however, they generally have not adopted metrics that measure the accuracy of planning factors that are necessary to plan efficient and effective support of depot maintenance. Additionally, the Defense Logistics Agency and the services do not track the potentially significant costs to supply and depot maintenance operations that are created by backorders. Further, we reported that without relevant metrics on cost and planning factors, DOD, the Defense Logistics Agency, and the services are unable to optimize supply and maintenance operations and may miss opportunities to improve the efficiency and effectiveness of depot maintenance. We recommended, and DOD concurred, that DOD, the Defense Logistics Agency, and the services develop metrics to monitor costs and accuracy of demand planning factors. DOD’s initiative on maintenance work packages and bills of material includes steps that may, in part, address these recommendations. Specifically, the initiative plans to assess the accuracy of bills of material, one of the planning factors we recommended DOD develop and implement metrics for, but does not include assessing the accuracy of other planning factors. In August 2017, we reported that DOD’s service requirement review boards were intended to prioritize and approve contracted services in a comprehensive portfolio-based manner to achieve efficiencies, but the military commands we reviewed did not do so. Instead, commands largely leveraged existing contract review boards that occurred throughout the year and focused on approving individual contracts. As a result, the review boards at these commands had minimal effect on supporting decisions within and across service portfolios or capturing efficiencies that could inform the commands’ programming and budgeting decisions. We recommended, and DOD concurred, that DOD clarify policies concerning the purpose and timing of the review board process. DOD’s initiative on service requirements review boards expands the use of these boards, and indicates that they are timed to inform budgets for the following fiscal year, but does not indicate whether guidance to do so has been provided. In its concurrence, DOD stated it would update the relevant DOD instruction to include this guidance, but, as of June 2019, DOD has not issued an updated instruction that includes this guidance. Although these initiatives intend to address aspects of our prior recommendations, assessing the feasibility of DOD’s reform effort is difficult because many of the planned initiatives entail collecting information that will lay the groundwork for later reforms. For example, the human resources service delivery initiative tasks the reform team to draft a project charter, collect and analyze information on human resources service providers within DOD, and eventually develop recommended courses of action for reform by fiscal year 2020. Similarly, the initiative on maintenance work packages and bills of material tasks the reform team to identify opportunities to improve processes, make recommendations to address deficiencies, improve efficiency, and improve material availability and then to develop an implementation plan for the recommendations by the end of fiscal year 2019, with implementation beginning in fiscal year 2020. OCMO officials told us that DOD is making progress in implementing the 921 plan’s initiatives according to the schedules contained in the plan, and they provided summary documentation stating that progress has been made on five of the eight initiatives. However, OCMO did not provide sufficiently detailed documentation for us to independently assess progress on any of the initiatives. Specifically, OCMO provided us some documentation on the progress of the eight initiatives, but this information varied by initiative and was limited. As a result, we were unable to independently assess and verify DOD’s progress in implementing its initiatives. Specifically: For the human resources regulatory reform, civilian hiring improvement, and human resources service delivery initiatives, OCMO provided briefing materials on the status of each milestone under the initiatives, indicating that those initiatives are progressing according to the schedule in the plan. However, DOD did not provide separate underlying documentation for each milestone. For example, under the plan, the teams conducting these initiatives were to have established by June 2019 a common DOD process and metrics for civilian hiring, prepared drafts of updated DOD policies and fiscal year 2020–2021 talent management guidance, and collected and mapped different human resources service delivery models. However, OCMO did not provide documentation of the common DOD process and metrics for civilian hiring, drafts of updated policies and guidance, or human resources service delivery model maps. For the service requirements review boards initiative, OCMO provided documentation stating that the service requirements review boards had largely been completed on schedule, but did not provide information on the outcomes of these boards. OCMO officials told us that delays in completing 3 of 69 boards had prevented them from fully meeting planned deadlines. For the category management initiative, OCMO officials told us that the first two quarterly “sprints”—reviews of different contracts or categories of goods or services to identify savings—for fiscal year 2019 had been completed and the third was in progress, but did not provide documentation to support this assertion. For example, OCMO did not provide information on the outcomes of the sprints. For the strategic sourcing of sustainment and commodity resources, maintenance work packages and bills of material, and munition readiness initiatives, DOD did not provide any documentation on the progress of the initiatives. While most of DOD’s initiatives included in its plan identify either performance metrics or targets, five of the eight initiatives also state that part of the work of the initiatives will be to establish such metrics or targets. Among our key questions for assessing agency reform efforts is the extent to which the agency has established clear outcome-oriented goals and performance measures for the proposed reforms, and whether the agency has put processes in place to collect the needed data and evidence that will effectively measure the reform’s goals. Identifying and collecting this information can lay the groundwork for further reform efforts. Moreover, we found that objectives for some of the initiatives in DOD’s plan are similar to those presented in prior plans with deadlines that have already passed, suggesting that progress on some initiatives is going more slowly than the department originally anticipated. For example, DOD’s August 2017 report to Congress on restructuring the CMO organization included an initiative to create a single civilian personnel system and rating system for certain employees by the middle of fiscal year 2018. DOD’s 921 plan contains a similar initiative on human resources regulatory reform, which aims to develop standardized civilian personnel policies and processes. Development of the initiative is not scheduled to be completed until the end of fiscal year 2019, and implementation would not occur until fiscal year 2020, at the earliest, compared to the original fiscal year 2018 deadline for the initiative. DOD has stated that its business operations reform efforts—which are not limited to the covered activities under section 921—will produce cost savings; however, DOD did not provide underlying documentation to allow us to independently validate the savings. Specifically, in its budget materials for fiscal year 2020, released in March 2019, DOD reported that its reform efforts had saved $4.7 billion in fiscal years 2017 and 2018, and are expected to save $6.0 billion in fiscal year 2019 and $7.7 billion in fiscal year 2020, the first year of required savings under section 921. Of those $7.7 billion in expected savings for fiscal year 2020, about $2.6 billion were in business process and systems improvements. According to OCMO and Office of the Under Secretary of Defense (OUSD) (Comptroller) officials, the OUSD (Comptroller) has validated these savings and the savings have been programmed or budgeted in the fiscal years reported. Specifically, according to OUSD (Comptroller) officials, all of the savings reported in DOD’s budget materials have been validated against OUSD Comptroller’s own systems that record budget information and decisions that are incorporated into DOD’s programming and budgeting process. OUSD (Comptroller) provided a spreadsheet detailing the various reforms and savings DOD cited in its budget materials, but did not provide the underlying support to allow us to independently validate the savings, such as documentation of budgetary decisions that reflect the savings. Our prior work over the past 7 years has found repeated shortcomings in DOD’s ability to demonstrate that it has achieved its goal for savings from reform efforts. Most recently, in September 2018, we reported that DOD could not demonstrate that it met several cost savings requirements mandated by the NDAA for Fiscal Year 2016, in part because there were no baseline costs established to measure any reductions against and documentation supporting cost savings estimates from other efficiencies was not detailed enough. DOD is taking steps to address this challenge and report on its cost baseline to perform all covered activities by January 1, 2020, as required by section 921. Specifically, in March 2019, we reported that OCMO is taking steps to establish cost baselines for DOD’s major lines of business through the fiscal year 2019–2020 timeframe. According to OCMO officials, they are also regularly adjusting the fiscal year 2019 baseline to reflect savings identified during the fiscal year. As of June 2019, OCMO is reviewing its approach for reporting the savings required by section 921 and plans to complete the review by October 2019. OCMO is coordinating with OUSD (Comptroller) on both establishment of the baseline and reporting of savings. While DOD has already funded some of the initiatives included in its plan through its annual budget request process, it continues to face challenges obtaining funding for others. According to DOD’s plan, four of the eight initiatives had no costs associated with them or the initiative has been funded to date using existing resources through the regular budget process, and DOD does not anticipate any additional costs for the initiatives. Funding needs for the remaining four initiatives have not been fully determined or met. Specifically: 1. Funding needs for the human resources service delivery initiative have not yet been determined. OCMO expects to fund the cost of this initiative as a part of the initial stand-up costs for OCMO’s Office of Fourth Estate Management in fiscal year 2020. OCMO officials told us they are reviewing baseline needs for the office and anticipate realigning resources to support the new office. 2. Funding needs for the human resources regulatory reform initiative have been determined, but OCMO has not confirmed that funding has been obtained. DOD’s plan states that future costs for the initiative may include approximately $500,000 for research and studies. To the extent possible, the plan states, DOD will use funds from the OUSD for Personnel and Readiness for studies, but DOD has not indicated that those funds have been obtained. 3. Funding needs for the strategic sourcing of sustainment and commodity procurement initiative have not been determined. According to OCMO, the Defense Logistics Agency and the military services are developing a detailed cost estimate for this initiative. However, neither the plan nor OCMO officials we spoke with identified where any funding that may be needed will come from once the costs are determined. 4. Funding needs for the plan’s category management initiative to conduct reviews of contracts and categories of goods and services have not been fully met. The initiative includes quarterly “sprints” reviewing different contracts or categories of goods or services to identify savings. According to DOD’s plan, each sprint is assisted by consulting firms and industry analyses and is estimated to cost about $11 million. DOD plans to complete a total of 10 sprints, at a total cost of $110 million. According to OCMO, limited funding has hindered execution of two of the sprints so far. OCMO has requested $12 million in its budget request for fiscal year 2020 to support this effort and expects the remaining sprints to be funded by savings identified through earlier sprints. However, in January 2019, we reported on problems associated with this approach. Specifically, we reported that OCMO officials told us the department initially planned to use available funding from OCMO or the savings generated by reform initiatives to fund development of other initiatives, but has since recognized that additional funding is needed. Among the key questions we previously identified for assessing agency reform efforts is the extent to which the agency has considered how the upfront costs of proposed reforms will be funded. In January 2019, we reported that some reform teams lacked resources to fully implement approved initiatives. We recommended, and DOD concurred, that DOD establish a process to identify and prioritize funding for implementing its cross-functional teams’ business reform initiatives. An OCMO official told us OCMO updated its reform management framework—the process it uses for managing its business reform efforts—in part to address this recommendation. However, in light of the continued challenges related to funding that we identified as part of this review, the effectiveness of changes to this framework at this time is unclear. As a result, we will continue to monitor the extent to which OCMO’s adjustments to its processes have addressed this recommendation as OCMO continues to implement its business reforms. We provided a draft of this report to DOD for review and comment. In response, DOD officials told us they concurred and had no comments on the report. We are sending copies of this report to the appropriate congressional committees and to the Secretary of Defense and Deputy Chief Management Officer. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this are listed in appendix III. Since we last reported on the Department of Defense’s (DOD) business reform efforts in January 2019, the Office of the Chief Management Officer (OCMO) has, among other things, changed the composition of the teams and the framework it is using to manage the efforts. Specifically, OCMO has disestablished the teams on real property management, human resources, and testing and evaluation, split the team on information technology and business systems into two separate teams for information technology and business systems, and made changes to the leadership or composition of each of the remaining teams. See table 1 for a summary of these changes. According to an OCMO official responsible for OCMO’s management of the reform efforts, OCMO has not removed any initiatives from the business reform efforts as a result of the changes to these teams, but some teams’ initiatives were absorbed into other business reform teams or organizations that OCMO believed were more appropriate for leading the initiatives, such as the relevant DOD principal staff assistant. For example, the category management team assumed responsibility for the real property management team’s initiatives. According to the same official, OCMO’s new Fourth Estate Management Office and components of the Office of the Under Secretary of Defense (OUSD) for Personnel and Readiness assumed responsibility for some of the human resources team’s initiatives. In addition, an OCMO official told us OCMO revised its business reform management framework—the process it uses for managing its business reform efforts. According to an overview of the new framework provided by OCMO, the new process is designed to establish a simplified, standardized, and repeatable process for managing these reforms and identifying and prioritizing funding for reform initiatives. An OCMO official told us that one of the goals of the updated process is to improve the uniformity of documentation across business reform teams and initiatives. That official told us the updated process also reduced the number of decision points—through which reform teams receive approval from DOD’s Reform Management Group to proceed with an initiative—from five to two. Further, OCMO introduced new processes for estimating and tracking the costs and potential savings resulting from reform initiatives. Among other things, the updated framework includes input from the OUSD (Comptroller). Specifically, according to OCMO documentation and OUSD (Comptroller) officials, OUSD (Comptroller) officials review estimates of the costs and potential savings recorded in OCMO’s reform management portal—a database OCMO uses to monitor business reform initiatives. OUSD (Comptroller) assigns a confidence score based on the degree to which each initiative has been developed. According to an OUSD (Comptroller) official, initiatives that are less developed will have a lower confidence score because they are further from full implementation and subject to more unknowns than those that are closer to implementation. OUSD (Comptroller) officials told us OUSD (Comptroller) uses confidence scores to adjust estimates of potential savings, and to lower potential savings associated with newer initiatives. According to OUSD (Comptroller) officials, these estimates of potential savings are not included in any savings amounts the department reports externally, such as in DOD budget materials, until they are actually programmed or budgeted. In addition to the contact named above, Margaret Best (Assistant Director), Daniel Ramsey (Analyst-in-Charge), Sierra Hicks, Alexa Kelly, and Richard Powelson made key contributions to this report. Other contributors included Bonnie Anderson, Tracy Barnes, Arkelga Braxton, Timothy J. DiNapoli, Michael Holland, Richard Larsen, Ned Malone, Ron Schwenn, Anne Stevens, John Van Schaik, and Sarah Veale.", "summary": "DOD spends billions of dollars each year to maintain key business operations intended to support the warfighter. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 established requirements for DOD to reform its enterprise business operations. Section 921 of the act required the Secretary of Defense, acting through the Chief Management Officer, to submit to the congressional defense committees by February 1, 2019, a plan, schedule, and cost estimate for reforms of DOD's enterprise business operations to increase effectiveness and efficiency of mission execution. Section 921 also requires GAO to provide a report assessing the feasibility of the plan. GAO's objectives were to assess (1) DOD's 921 plan, including its feasibility in reforming DOD's business operations, and (2) the extent to which DOD has made progress in implementing the plan and its broader reform efforts. GAO reviewed DOD's plan and associated documentation and interviewed DOD officials on efforts to reform business operations of the department, including the development and implementation of the plan. GAO also reviewed its past work on DOD reform efforts and the specific subject areas covered by DOD's reform initiatives. GAO has previously made eight recommendations related to DOD's reform initiatives from three prior reports. DOD concurred with those recommendations and is working to address them, in part through the initiatives GAO discusses. The Department of Defense's (DOD) April 2019 plan for business reform identifies eight initiatives related to civilian resources management, logistics management, services contracting, and real estate management. According to the plan, these initiatives will cost at least $116 million to implement through fiscal year 2021. GAO found that the plan generally contains the elements required under section 921—a schedule and cost estimate—and that several initiatives address aspects of GAO's prior recommendations. However, because many of the planned initiatives entail collecting information that will lay the groundwork for later reforms, assessing the feasibility of DOD's reform effort is difficult. For example, one logistics reform initiative plans to identify opportunities to improve processes, make recommendations, and develop an implementation plan for the recommendations by the end of fiscal year 2019. Although DOD officials told GAO that the department is making progress implementing the plan's initiatives and achieving cost savings on its broader efforts, DOD provided limited documentation of that progress. As a result, GAO could not independently assess and verify this progress. For example: Office of the Chief Management Officer (OCMO) officials provided briefing charts on the status of milestones for DOD's three human resource–related initiatives stating that those initiatives are progressing according to the schedule, but did not provide underlying documentation for each milestone. According to DOD, its broader reform efforts have saved or are expected to save about $18.4 billion between fiscal years 2017 and 2020. According to Under Secretary of Defense (Comptroller) officials, they have validated these savings. However, DOD did not provide any supporting documentation that would allow GAO to independently validate these savings. GAO's prior work has found repeated shortcomings in DOD's ability to demonstrate that it has achieved its goals for savings from reform efforts. DOD is taking steps to address these challenges, including establishing cost baselines for DOD's major lines of business and incorporating Comptroller input into estimates of the costs and potential savings from initiatives as they are developed. Further, according to the plan, DOD has provided funding through its annual budget process for four of the eight initiatives included in its plan. For the four remaining initiatives, OCMO has identified a source of funding but not obtained that funding for two initiatives, is awaiting a cost estimate for one initiative, and has identified only partial funding for one initiative, which is designed to review contracts and categories of goods or services on a quarterly basis to identify savings. OCMO anticipates that savings identified in earlier rounds of this initiative will fully fund later rounds. However, in January 2019, GAO reported that, according to OCMO, DOD initially planned to fund its reform initiatives in part with savings generated by other initiatives, but recognized that this approach did not work because additional funding was needed. GAO recommended that DOD establish a process to identify and prioritize funding for implementing its initiatives. OCMO has updated its processes for managing its reform efforts in part to address this issue, but the effects of this update at this time are unclear.", "document_type": "gao"}
{"report": "The federal government has long recognized the need to protect itself by ensuring contractors have appropriately allocated costs on cost-based contracts. In terms of what is potentially covered by CAS, cost-based contracts include cost-type contracts and certain fixed-price contracts where the contractor’s estimated or actual costs play a role in determining the amount the government pays. The total amount obligated annually by the government on these types of contracts is significant. For example, in fiscal year 2018, the federal government obligated approximately $172 billion on cost-type contracts alone, according to our analysis of Federal Procurement Data System information. In 1968, the House Banking and Currency Committee held hearings to determine whether to renew the Defense Production Act of 1950. A witness at the hearings, U.S. Navy Admiral Hyman G. Rickover, testified that defense suppliers could make excessive profits and disguise them as overhead costs or hide them in other ways in the absence of a set of uniform cost accounting standards. Witnesses at the time testified that it was difficult to compare costs among prospective contractors’ cost estimates or even to assess costs incurred on contracts with the same contractor without a set of uniform and consistent standards. Congress subsequently directed us to study the feasibility of establishing such standards. In January 1970, we reported one of many examples of mischarges involving a contractor that had charged the government for costs above the allowed cost ceiling by moving them under a separate contract cost category. We concluded that then-existing financial reporting standards were neither created nor adequate for contract cost purposes. In addition, we concluded that it was feasible to create a set of cost accounting standards and recommended doing so. In August 1970, Congress created the Board as an independent board within the legislative branch. The Board was initially chaired by the Comptroller General, who appointed four other members. The Board was authorized to promulgate standards designed to achieve uniformity and consistency in cost accounting practices used by federal contractors on defense contracts in excess of $100,000. The Board issued 19 cost accounting standards that went into effect between 1972 and 1980 for applicable DOD contracts. These standards covered areas such as consistency between how actual and estimated costs are calculated and reported, and ensuring that costs are not double- counted. The standards were intended to ensure that incurred costs were appropriately allocated to government contracts. In contrast, GAAP is a set of U.S. accounting standards, conventions, and rules focused on measuring companies’ financial performance. GAAP is meant to establish and improve financial accounting and reporting to provide useful information to investors and other users of financial reports, including measurement and recognition of costs in financial statements. Federal endorsement of generally accepted accounting practices or principles dates back to the Securities Act of 1933. Then, the Securities Exchange Act of 1934 created the Securities and Exchange Commission and gave it authority to oversee accounting and auditing methods for publicly traded companies. Subsequently, various professional accounting groups, with oversight by the Securities and Exchange Commission, began working to establish standards and practices for consistent and accurate financial reporting, which became known as GAAP. In 1973, the Securities and Exchange Commission recognized the Financial Accounting Standards Board (FASB) as the designated accounting standard setter for public companies in the United States, and FASB is responsible for GAAP. In fiscal year 1981, Congress stopped funding the Board. However, after a number of disputes arose as to how to interpret various standards, Congress reestablished the Board in 1988. Congress placed the Board under OFPP, which is part of the Office of Management and Budget (OMB) within the executive branch. Congress also broadened the Board’s authority by applying CAS to all federal contracts—they were previously applicable only to defense contracts. Table 1 provides more information on the differences between CAS and GAAP. The Board met intermittently to address issues associated with interpretations of the standards after it was reestablished in 1988. In the late 2000s, the Board revised two of the standards related to pension contributions by government contractors for their employees. Effective in 2008, Congress changed the minimum contributions required to fund pension plans. This change caused pension contributions to greatly exceed CAS pension costs reflected in contract prices. The Board updated the CAS effective in 2012 to harmonize CAS pension costs with statutory changes to the pension funding requirements. However, the Board’s changes did not address how costs were settled when pension plans were curtailed. In January 2013, we recommended that the Board set a schedule to revise parts of the CAS dealing with settlement of pension plan curtailments. Citing our recommendation, the Board began efforts to resolve this issue in July 2013 and the work is on-going. While Board staff have been working to resolve these pension issues, the Board went several years without holding official meetings of the full board. Figure 1 illustrates the Board’s activities over time. The current Board is comprised of five members. The Administrator of OFFP is a member and serves as Board Chair. The other members include representatives from DOD, the General Services Administration, industry, and another private sector representative with cost accounting expertise. According to OFPP officials, the Board is also assisted by two OFPP staff—one on a full-time basis and one on a part-time basis—and a detailee from DCAA. In addition, OFPP officials said that the Board forms interagency working groups to address specific issues, such as pension harmonization. The Board receives its funding from OMB and does not have a separate funding source. According to OFPP officials, the Board’s main expenses were salary reimbursement for the non-government employees who serve on the Board and publication costs for Federal Register notices. Other federal agencies also have responsibilities to help administer the standards. For example, according to OFPP officials, most CAS-covered contracts are defense related. As such, DCAA reviews federal contractors’ disclosure statements for adequacy and compliance—that is, whether the statements are current, accurate, and complete. Disclosure statements describe the company’s actual or proposed cost accounting practices, including how they distinguish between costs, and how costs are allocated to contracts. DCAA also conducts audits to ensure contractors comply with CAS and with the contractors’ disclosed and established cost accounting practices and procedures. In addition, DCMA monitors contractor performance and the contractor’s business management systems, among other things, to ensure that the contractor is consistently following its cost accounting practices for contracts that are subject to CAS. There is no definitive list of the companies, business segments or units, or contracts that are subject to CAS. Whether a contractor’s business segment is required to comply with the standards on a particular contract depends largely on the value of the government contracts it is awarded during the year that are cost-based. Once a contractor’s business segment exceeds a certain dollar threshold of these “CAS-covered contracts,” the business segment is required to comply with either (1) all 19 standards (termed “full CAS-coverage”) or (2) four standards (termed “modified CAS-coverage”). Full coverage applies to business segments with CAS-covered contracts with a combined value of $50 million or more. Modified coverage may apply to business segments with a single CAS- covered contract of $7.5 million or more, and combined CAS-covered contracts valued at less than $50 million. Table 2 below lists all 19 CAS required under full coverage and the four CAS required under modified coverage. We and congressionally established review panels have previously studied the potential impact of CAS on industry as well as possible changes to the CAS and the Board. For example: In April 1994, we reported that seven of eight companies we reviewed either kept their government contracting work separate from their commercial contracting or assigned additional staff to their government contracting segments due to the increased demands of government contracting, citing, among other things, CAS as a factor in that decision. In January 1997, we reported on DOD’s efforts to address acquisition cost drivers based, in part, on a prior DOD-directed study that identified CAS as one of the 10 largest cost drivers on DOD contracts. In that report, a DCMA official noted that, in his opinion, while the annual cost of maintaining a CAS-compliant system is relatively small, the cost to establish a CAS-compliant system may be significant. Congress asked us to lead a panel of experts to assess the future role of the Board. In April 1999, we issued the panel’s report focused on the Board and CAS in light of acquisition reforms and the evolution of GAAP. The panel concluded that, among other things, the Board should review CAS and its attendant requirements to determine whether standards could be streamlined to reduce unnecessary burden on affected contractors. In addition, the panel made several recommendations, including moving the Board out of OFPP to ensure autonomy. Congress did not act on this recommendation. The panel also recommended reviewing contract applicability and full-coverage thresholds for CAS. Congress subsequently set the modified coverage ceiling at $7.5 million in October 1999. In July 2017, most of the 12 companies we spoke with that had not done business with DOD told us they chose not to do so because it might trigger a large number of contract terms and conditions that would be expensive to implement. One reason provided by the companies for not competing for certain types of DOD contracts was the requirement to establish a government-unique cost accounting system and to disclose and follow cost accounting practices consistently. In June 2018, the Section 809 Panel—having been established to advise Congress on streamlining defense acquisition regulations— released the second of three volumes of its report. In its report, the panel made two recommendations related to CAS, which largely reiterated what the GAO-led panel recommended in 1999. In this regard, the Section 809 panel recommended that the Board should be relocated to the General Services Administration as an independent board with a budget sufficient to support at least three full-time, permanent staff. The panel also recommended raising CAS applicability threshold levels again to further reduce burden on contractors. Subsequently, in 2019, OMB submitted a legislative proposal on raising the CAS applicability threshold from $2 million to $15 million. OMB officials also indicated that they would continue analyzing the effects of additional threshold changes. Congress had not enacted the proposal into law at the time of this report. The CAS Board generally has complied or is in the process of complying with the administrative and reporting requirements prescribed by Section 820 of the National Defense Authorization Act for Fiscal Year 2017, including initial efforts to assess the extent to which CAS can be conformed with GAAP. To do so, the Board is taking steps to follow its statutorily prescribed four-step rulemaking process. The Board’s initial efforts focus on the extent to which two of the 19 standards might be modified or eliminated; however, Board members indicated that these efforts may take several more years to complete. The Board has generally complied with the administrative requirements prescribed under Section 820 thus far, including meeting regularly, generally publishing notices and agendas in advance of meetings, and reviewing disputes involving cost accounting-related matters. According to officials from the Office of Federal Procurement Policy, the Board is working on the first of its annual reports on its efforts, including those associated with efforts to conform the standards with GAAP where practicable. Table 3 highlights the steps the Board is taking to address some of the administrative and reporting requirements mandated by Section 820. The Board has also taken initial steps to address Section 820’s requirement that the Board review the standards and conform them to GAAP, where practicable (see table 4). In carrying out this work, the Board is taking steps to follow a statutorily prescribed four-step rulemaking process for promulgating CAS or interpretations. Figure 2 below outlines these requirements. In line with this process, between March and November 2018, the Board discussed the opportunities and methods available for conforming CAS to GAAP. The Board held informal discussions with its staff, industry representatives, and government agencies, such as DCAA. One of the messages coming from the feedback was for the Board to focus first on those standards that offered the greatest potential for change. By the end of 2018, the Board had completed development of the staff discussion paper. The Board expected to release this document in the Federal Register for public comment in January 2019; however, a partial shutdown of the federal government due to lapsed funding delayed its release until March 2019. The March 2019 staff discussion paper (1) outlined a set of five guiding principles that the Board would use to assess whether proposed CAS changes are necessary and whether those changes would reduce the burden on contractors while protecting the government’s interests, (2) identified a roadmap that prioritized the Board’s proposed review of standards, and 3) included a preliminary comparison of two standards to GAAP. Guiding Principles. The guiding principles outlined in the staff discussion paper describe the elements the Board will consider when determining whether changes to the CAS will reduce burden on contractors while continuing to protect the interests of the federal government. As stated in the staff discussion paper, the Board will: 1) reduce CAS requirements where practicable; 2) consider whether the proposed action would reduce burden on 3) consider whether other CAS or federal rules would protect the government’s interests in case of any gaps created by relying on GAAP; 4) monitor future changes to GAAP and the Federal Acquisition Regulation (FAR) to identify and evaluate their impact on CAS and revise CAS, as necessary; and 5) monitor future significant disputes related to the conformance to GAAP and evaluate whether the Board should address them through clarifying guidance or rulemaking. Prioritization. The Board grouped the 19 CAS into four categories based on the Board’s assessment of which standards are most likely to have overlap with GAAP (see figure 3). The Board plans to focus its initial efforts on the seven standards in the first group, which focus on cost measurement and assigning costs to accounting periods. According to its staff discussion paper, the Board’s proposed approach is to assess the standards by developing side-by-side comparisons of CAS requirements to corresponding GAAP requirements and identifying any gaps between the two. The Board will then evaluate the potential risk of any gaps identified, taking into account coverage by other CAS requirements and related regulations; for example, the FAR. The Board will also assess whether there is a history of compliance issues for those standards. According to OFPP officials, such assessments will help the Board determine whether they need to update guidance related to a particular CAS. Lastly, the Board plans to assess changes that have occurred in GAAP relative to CAS and to evaluate the need to conform CAS to the updated GAAP. For example, the Board has identified two recent changes in GAAP that it states may not align with CAS. Comparison. The Board has begun this effort by looking at two standards focused on measuring and assigning costs (CAS 408 and CAS 409), since it believes that GAAP potentially provided additional coverage compared to when the two CAS were established in 1975. OFPP officials stated that these two standards provided a good opportunity to modify and potentially eliminate duplicative coverage while testing the soundness of the Board’s approach to conform CAS to GAAP where practicable. The Board received seven separate comment letters on the staff discussion paper from five industry organizations, one commercial business, and one private individual. Our review of the comments found that they were largely supportive of the Board’s guiding principles, but some commenters raised concerns regarding the Board’s approach to its conformance effort and questioned whether it would ease the burden on contractors. For example, four respondents commented that the Board should not limit its focus to only revising or eliminating particular CAS when it was clear that GAAP provided adequate coverage. Instead, these industry groups stated that each CAS should be eliminated unless proven to be absolutely necessary due to the barriers to contractors that these groups believe the CAS create. The Board members we met with stated that all options for refining CAS requirements were on the table. However, they also stated that GAAP and CAS are focused on two separate goals—the former on a business’s high-level financial statement, the latter on individual contract costs. Board members, as well as DCAA and DCMA officials, noted that eliminating CAS requirements to rely purely on GAAP standards would limit the government’s ability to compare contract proposals, assess actual costs to avoid overcharges by contractors, and protect its interests. For example, DCMA officials stated that the government has $3.1 billion in pending litigation for identified CAS noncompliances. Recovery of increased costs is accomplished in part through contract clauses that entitle the government to recover specific cost increases on affected CAS-covered contracts. Were CAS and the associated contract clauses eliminated, DCAA and DCMA officials noted that the government’s ability to recover these costs would be greatly reduced. In addition, the Board is concerned that in modifying or perhaps even eliminating certain CAS requirements, and instead using GAAP, there is the risk that future GAAP changes would no longer cover the areas of CAS concern. This would leave the government vulnerable to the issues that the modified or eliminated CAS were originally created to address. Members of the Board and staff we spoke with indicated that the Board is reviewing and assessing the public comments on the staff discussion paper to determine whether the Board needs to make changes to the paper’s guiding principles or methodology going forward. According to the Board members, the Board will issue a Federal Register notice explaining any changes resulting from public input and its own additional deliberations. Additionally, they said the Board will consult with the Financial Accounting Standards Board—which is responsible for GAAP— to answer technical questions and ensure that the Board has an accurate understanding of GAAP coverage as they continue to perform side-by- side comparisons of CAS and GAAP. Further, the Board stated that it will publish a notice to address public comments on CAS to GAAP conformance projects and that additional staff discussion papers and associated notices will be published in the Federal Register for public comment as they are completed. In addition to streamlining or eliminating CAS standards, some of the comments in response to the staff discussion paper pointed to other areas that the Board may want to consider to reduce the burden on government contractors. For example, some comments encouraged the Board to consider increasing CAS full-compliance dollar thresholds. Reassessing the CAS full-compliance threshold aligns with findings from congressionally established panel reports from 1999 and 2018. According to both panels’ findings, increasing compliance thresholds is a way to decrease burden on many government contractors while still protecting the bulk of the government’s contracting dollars. As previously noted, OMB recently submitted a legislative proposal to raise the threshold from $2 million to $15 million. OMB also indicated that it intends to continue studying available data to understand the costs and benefits of CAS threshold changes and whether additional changes to the threshold need to be made. We provided a draft of this report to DOD, the Office of Management and Budget, and the Cost Accounting Standards Board for their review and comment. DOD had no comments on the report. The Office of Management and Budget and the Board provided technical comments, which we incorporated where appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense; the Director, Defense Procurement and Contracting; the Director, Defense Contract Audit Agency; the Director, Defense Contract Management Agency; the Director, Office of Management and Budget; and the Administrator, Office of Federal Procurement Policy. In addition, this report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by e-mail at dinapolit@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. Cost Accounting Standards Applicability. In general, a business segment is not subject to Cost Accounting Standards (CAS) until it receives a non-exempt contract of $7.5 million or more from the federal government. Generally, a non-exempt contract is a contract that does not meet any of the exemptions listed below. Typically, once a business segment receives a non-exempt contract of $7.5 million or more, all of its prospective non-exempt contracts or subcontracts over $2 million are considered CAS-covered. Summary of Exemptions. The following categories of contracts and subcontracts are exempt from all CAS requirements: Sealed bid contracts; Negotiated contracts and subcontracts not in excess of the Truth in Negotiations Act (TINA) threshold, as adjusted for inflation (41 U.S.C. 1908 and 41 U.S.C. 1502(b)(1)(B)). For purposes of this exemption, an order issued by one segment to another segment shall be treated as a subcontract; Contracts and subcontracts with small businesses (Federal Acquisition Regulation (FAR) Subpart 19.3 addresses determination of status as a small business.); Contracts and subcontracts with foreign governments or their agents or instrumentalities or, insofar as the requirements of CAS other than CAS 401 and CAS 402 are concerned, any contract or subcontract awarded to a foreign concern; A contract or subcontract where the price is set by law or regulation; A contract or subcontract authorized in FAR § 12.207 for the acquisition of a commercial item; A contract or subcontract with a value of less than $7,500,000 if, at the time of award, the business segment of the contractor or subcontractor that will perform the work has not been awarded at least one contract or subcontract with a value of $7,500,000 or more that is covered by the standards. Subcontracts under the North Atlantic Treaty Organization’s Patrol Missile Hydrofoil Ship programs to be performed outside of the United States by a foreign concern; A firm-fixed price contract or subcontract awarded on the basis of adequate price competition without submission of certified cost or pricing data. In addition, in cases where the prime contract is exempt from CAS under any of the exemptions at 48 C.F.R. § 9903.201-1 any subcontract under that prime is always exempt from CAS. Also, Title 41 of the U.S. Code was amended effective in 2018 to allow executive agency heads can waive CAS requirements for a contract or subcontract with a value of less than $100 million if the business segment is primarily engaged in commercial work and would not otherwise be subject to CAS, or for exceptional circumstances where waiving CAS is necessary to meet agency needs. Compliance. There are two levels of CAS coverage—full and modified. Full coverage applies to business segments with CAS-covered contracts valued at $50 million or more; those business segments must comply with all 19 standards. Modified coverage may apply to business segments with CAS-covered contracts valued less than $50 million. Business segments that have contracts awarded with modified coverage must comply with four of the standards. Business segments with full CAS-covered contracts are also required to submit disclosure statements describing the company’s actual or proposed cost accounting practices and procedures, including how they distinguish direct costs from indirect costs and the basis used for allocating indirect costs. The Defense Contract Audit Agency (DCAA) reviews disclosure statements for adequacy and compliance—that is, whether the statement is current, accurate, and complete—prior to contract award and during contract performance. DCAA may also complete CAS compliance audits at the request of the cognizant federal agency official after contract award. In some circumstances, the Defense Contract Management Agency (DCMA) will review disclosure statements that are not audited by DCAA. According to officials, both DCAA and DCMA provide audit findings to the cognizant federal agency official, who then disposes the audit findings by making the final determination of adequacy and compliance. The purpose of disclosure statement audits is to determine whether the contractor’s disclosed or established practices are in compliance with CAS rules, regulations, and standards, as well as appropriate acquisition regulations. A CAS-related noncompliance may be found if a contractor with a CAS-covered contract proposes a practice that will violate CAS or a government acquisition regulations cost principle, or if the contractor’s actual practices are either inconsistent with their own disclosure statement or noncompliant with the cost standards or principles. For example, in 1970, we, along with DCAA auditors, found instances where contractors charged costs as both direct and indirect costs to the same contract, resulting in the contractors recovering the same charge twice. If an auditor discovers a noncompliance issue, the auditor will submit an advisory report to the cognizant federal agency official who makes the final determination. The consequences of a CAS noncompliance can range from a contract adjustment to litigation. According to the DCMA’s Contract Dispute Resolution Center, there were 15 judicial decisions issued in CAS-related board and court cases in the last five years. In addition to the contact named above, Bruce H. Thomas, Assistant Director; Peter Anderson; Jennifer Baker; Miranda Riemer; Jenny Shinn; Ryan Stott; and Roxanna T. Sun made key contributions to this report.", "summary": "Each year, the federal government obligates billions of dollars on contracts for which the final costs depend, in part, on the amount of overhead and other costs charged to the contract. Congress created the Board in 1970. The standards it created ensure contractors appropriately charge costs to government contracts. In contrast, GAAP is a set of financial reporting principles that commercial firms may use in preparing financial statements and which include the basis for recognizing and measuring costs in such statements . Industry representatives and others have raised concerns that complying with CAS may be burdensome and questioned whether the government could rely on GAAP. In 2016, Congress included a provision in law that the Board, among other things, conform CAS with GAAP, where practicable. Congress also included a provision for GAO to assess Board efforts. This report assesses the extent to which the Board is taking steps to meet legislative requirements and describes the Board's efforts to conform CAS to GAAP. GAO reviewed applicable laws, regulations and guidance, Federal Register notices and other documentation on the Board's activities. GAO also examined the Board's methodology for comparing CAS to GAAP and its preliminary analysis of two of the cost accounting standards. Finally, GAO interviewed Board members and federal procurement officials. The Cost Accounting Standards Board (the Board) is generally meeting recent legislative requirements and has taken initial steps to assess the extent to which the government's Cost Accounting Standards (CAS) can be conformed with a set of 12commercial financial reporting principles known as Generally Accepted Accounting Principles (GAAP). Comprising five members representing the government and industry, the Board issued 19 standards between 1972 and 1980. After that point, the Board met intermittently until 2016. At that time, Congress included a provision in the National Defense Authorization Act for Fiscal Year 2017 to require the Board to meet quarterly, to review CAS-related disputes, to conform CAS with GAAP where practicable, and to report annually to Congress on its efforts, among other things. Since the legislation went into effect, the Board has met regularly, has been briefed on CAS-related disputes, and is preparing its initial report to Congress. The Board has also taken initial steps to assess the extent to which CAS can be conformed with GAAP. The Board summarized its approach in a March 2019 staff discussion paper, which it released for public comment. In it, the Board: outlined a set of five guiding principles to assess whether proposed CAS changes are necessary and whether those changes would reduce the burden on contractors while protecting the government's interests, identified a roadmap that prioritized the Board's proposed review of the standards, and included a preliminary comparison of two of the seven standards identified as having the most overlap with GAAP (see figure). Some comments submitted in response to the discussion paper by industry groups stated that each of the 19 CAS should be eliminated unless proven to be absolutely necessary. Board members told GAO they were considering all options for refining CAS but noted that GAAP and CAS are focused on two separate goals—GAAP on businesses' high-level financial performance, CAS on allocating costs to individual government contracts. The Board and other government officials said that eliminating CAS requirements to rely purely on GAAP would limit the government's ability to protect its interests.", "document_type": "gao"}
{"report": "Selected agencies’ funding for university STEM research. The five federal agencies included in our preliminary analysis provide billions of dollars annually for university research in STEM fields, with NIH providing more than the other four agencies combined. Table 1 details the total amount of research funding provided to universities by each agency in fiscal year 2017. Sexual harassment. As defined in the National Academies of Sciences, Engineering, and Medicine (NASEM) 2018 report, sexual harassment encompasses three types of behavior: Sexual coercion: Favorable treatment conditioned on sexual activity. Unwanted sexual attention: Verbal or physical unwelcome sexual advances, which can include assault. Gender harassment: Sexist hostility and crude behavior. The most common form of sexual harassment is gender harassment, which generally involves hostility, exclusion, or other discrimination based on a person’s gender. The 2018 report found that sexual harassment in academia is significantly more common among female students in engineering and medical majors than in non-STEM fields. According to the report, at least five factors create the conditions under which sexual harassment is likely to occur in STEM programs and departments in academia: Perceived tolerance for sexual harassment Environments where men outnumber women and leadership is male Environments in which the power structure of an organization is hierarchical with strong dependencies on those at higher levels or in which people are geographically isolated Increased focus on symbolic compliance with Title IX Uninformed leadership on campus Title IX of the Education Amendments of 1972. Title IX of the Education Amendments of 1972 is the primary federal law that addresses sex discrimination in all federally funded grant programs at educational institutions. Under Title IX, federal agencies that award grants to educational institutions have enforcement responsibilities to ensure such institutions do not discriminate based on sex. Enforcement responsibilities include issuing regulations, conducting periodic compliance reviews of funding recipients, and investigating timely written complaints of sex discrimination against recipients. DOJ and the Department of Education have other responsibilities for administering Title IX. DOJ is designated by Executive Order No. 12250 to coordinate Title IX compliance across federal agencies, including information sharing. Federal grant awards and grant life cycle. In general, federal agencies administer grants through a common administrative life cycle: pre-award, award, implementation, and closeout. During the pre-award stage, most of the agencies we reviewed require grantees to submit an “assurance of compliance” form as part of their grant application to attest compliance with anti-discrimination laws, including Title IX. For the award stage, the federal agency awarding the grant enters into an agreement with grantees stipulating the terms and conditions for the use of grant funds. During the implementation stage, among other things, the federal agency manages and oversees the grant, including any Title IX compliance reviews. A Title IX compliance review is an agency’s assessment of whether a grantee is complying with the law. Federal agencies may conduct these reviews onsite at an institution (grantee) or via a desk audit. In the closeout stage, the awarding federal agency and grantee bring the grant to its conclusion, once all the work associated with the grant agreement is complete, the grant end date has arrived, or both. Among the federal agencies we reviewed, different offices handle various aspects of grant compliance. Generally, each agency’s civil rights or diversity office conducts Title IX compliance reviews, develops policies and procedures for grantees, and investigates allegations and complaints involving university researchers supported by their agency’s federal STEM grants. The office that awards grants generally creates and modifies grant terms and conditions. Our preliminary analysis indicates that the selected federal agencies’ staff and budget available to address sexual harassment complaints from individuals at grantee universities varies according to the duties and funding for the primary agency offices responsible for addressing the complaints, as well as with the number of complaints received from grantees. Duties and funding for offices responsible for addressing complaints. Our preliminary analysis shows that all five agencies (DOE, HHS, NASA, NSF, and USDA-NIFA) primarily address sexual harassment complaints through their civil rights or diversity offices. However, these offices are responsible for more than just addressing complaints and preventing sexual harassment at grantee universities; they also oversee a number of civil rights, diversity and inclusion efforts for the entire agency. Moreover, most of these offices also address internal employee sexual harassment complaints and other discrimination issues. For example, HHS officials described how staff in their Office for Civil Rights at headquarters and eight regional offices conduct compliance reviews and investigate all complaints alleging sexual harassment and other forms of discrimination against recipients of HHS federal financial assistance, including recipients of NIH grants. USDA- NIFA said their civil rights and diversity office staff are not always available when sexual harassment issues arise because they have other duties and also cover other discrimination issues. In addition, some agencies noted challenges in ensuring adequate staffing levels. For example, USDA-NIFA officials cited the need to fill vacant positions in their civil rights office, and NSF officials described a need to find staff with expertise in this complicated, specialized area. All five agencies fund their civil rights and diversity offices separately from their STEM research funding, and there is little relationship between the two budgets. For more information on selected agencies’ civil rights and diversity office staffing and budgets planned for fiscal year 2019, see table 2. Number of complaints received. Our preliminary analysis of sexual harassment complaint information indicates that four of the five selected agencies received three or fewer complaints from individuals at grantee universities from fiscal year 2015 through 2019. See table 3. Officials from DOE told us that because they receive so few sexual harassment complaints from individuals at grantee universities, they have enough resources to address those that are reported to their civil rights or diversity offices. In addition, officials from HHS told us that because they receive so few complaints, their civil rights office has used other oversight mechanisms, like Title IX compliance reviews, to examine whether sexual harassment is occurring at universities receiving HHS funds, including funds from NIH. However, as agencies continue to strengthen grantee policies or requirements, it may affect the number of complaints an agency receives from individuals at grantee universities, as well as the amount of resources an agency needs to address them. For example, NSF officials described how the number of sexual harassment complaints they receive has increased since the agency implemented new grant terms and conditions that require university grantees to report any sexual harassment findings involving a Principal Investigator or co-Principal Investigator for NSF-funded research. NSF officials also described an increased number of questions and calls about how to report incidents, requests for training and presentations, and meetings with program officers, awardee representatives and other stakeholders, among other items. Based on our preliminary review, all five of the selected agencies have established and communicated their own sexual harassment prevention policies to grantees within the last 2 fiscal years, but agency communication mechanisms and the content of these grantee policies vary. Specifically, our preliminary analysis shows that NASA, NIH, and NSF communicate their policies on sexual harassment in multiple forms, such as grantee policy manuals, best practices documents, and online FAQs. The result is that grantees receive a relatively high level of detail about preventing sexual harassment and mechanisms for reporting complaints. In contrast, Cabinet agencies DOE and USDA-NIFA provide fewer forms of guidance, either through their website or agency director and Secretary-level policy statements and documents, which focus more generally on the broader category of sex discrimination or provide different levels of information on sexual harassment prevention policies for grantees. See table 4 for more information. Regarding the content of the policies, our preliminary analysis shows that DOE, NIH, NSF, and USDA-NIFA updated their definitions of behaviors or actions that qualify as sexual harassment in their grantee policies and procedures, and NASA is in the process of doing so. The definitions are more specific than previous definitions; for example, they include descriptions of gender harassment, the most common form of sexual harassment. The increased specificity may make clear the behaviors or actions grantees are expected to address in their efforts to prevent sexual harassment. The agencies continue to develop and revise policies and communication mechanisms for grantees. Also, NSF and NASA have modified, or are taking steps to modify their grant terms and conditions to strengthen requirements for university grantees to report on findings of sexual harassment to the funding agency. Officials from both agencies told us these modifications will help hold grantees accountable for reporting sexual harassment; the NSF Director states on the agency’s website that these changes are “intended to provide targeted, serious consequences for harassers” while also providing “tools to make harassment stop without disturbing others’ careers and lives.” The requirement also supports the NASEM 2018 report recommendation for institutions to be transparent about reporting sexual harassment findings, which is intended to foster a culture and climate that does not tolerate sexual harassment at universities. Officials from cabinet agencies DOE, NIH (a component of HHS), and USDA-NIFA stated they would need to go through formal rulemaking processes to alter their grant terms and conditions in a similar manner. In addition, our preliminary analysis shows that two of the five selected agencies are taking steps to evaluate the effectiveness of their sexual harassment prevention policies and procedures for grantees. NSF officials told us that they are in the process of determining how best to evaluate the effectiveness of the new sexual harassment reporting requirements and how the requirements have affected grantees. Similarly, DOE is in the process of comparing its policies and procedures against other federal agencies’, according to officials. To date, the other three agencies have not yet evaluated the effectiveness of their policies, but officials at these agencies told us that they focus on ensuring grantees comply with Title IX regulations as a way to measure the effect of their policies. For example, NASA established a goal to promote compliance and encourage best practices among grantees, and the agency measures progress towards this goal through verifying grantee compliance with Title IX. USDA-NIFA officials are also in the process of creating a tool to provide a comprehensive blueprint for civil rights compliance—including Title IX compliance—and are planning to implement the tool in fiscal year 2020. We will continue to examine and assess the selected agencies’ sexual harassment prevention policies for university grantees and steps they are taking to evaluate them in our ongoing work. Based on our preliminary review, all five selected agencies have taken some steps to promote information sharing and collaboration among agencies on Title IX compliance reviews through DOJ’s Title IX STEM working group. According to officials, the group discusses strategies for conducting joint Title IX compliance reviews to leverage limited agency resources and share best practices. For example, DOE and NSF have conducted three joint compliance reviews, and NASA and NSF told us that they are in the process of conducting a joint review. These joint reviews can be helpful, as the selected agencies conduct a small number of compliance reviews (two to four) annually relative to the number of university grantees who must comply with Title IX. Despite this collaboration, all five selected agencies reported challenges in obtaining and sharing information. For example, all five selected agencies told us they rarely discuss sexual harassment cases at DOJ’s Title IX STEM working group meetings unless they are directly related to an ongoing or planned compliance review. In addition, DOE, NASA, NIH, and NSF stated they rarely learn about instances of sexual harassment from voluntary reporting from universities or other federal agencies and instead must rely on other sources, such as news reports. This situation may change at NSF and NASA, which have taken steps to modify their grant terms and conditions to require reporting of sexual harassment findings by grantees. Challenges in obtaining and sharing information on sexual harassment cases may increase the risk of a situation known as “pass the harasser,” in which a researcher with substantiated findings of sexual harassment obtains employment at another university or grants from another funding agency without the university or funding agency being aware of the researcher’s history. Officials from all five selected agencies noted a willingness to participate in an interagency working group to address the culture of sexual harassment in STEM research that moves beyond conducting Title IX compliance reviews. The White House’s Office of Science and Technology Policy (OSTP) has taken steps to establish an interagency working group. In May 2019, OSTP established a joint committee under the National Science and Technology Council to address challenges in the research environment. OSTP, NIH, NSF, DOE, and the National Institute of Standards and Technology Directors were selected as joint committee chairs to engage with the academic and science community for policymaking insight and to convene interagency efforts. According to DOE officials, the committee will address several priorities, including the development of policies and procedures across the federal government regarding sexual harassment in the research environment. Three of the five selected agencies (NSF, NASA, and DOE) stated OSTP would be the appropriate entity to establish uniform sexual harassment policy guidelines to help provide consistency across the federal government. NSF and NASA officials suggested that DOJ or the Department of Education would be the appropriate agencies to collaborate with OSTP on the ongoing monitoring of sexual harassment policy guidelines. All five selected agencies reported taking collaborative steps with universities and federal agencies to address the culture and climate for women in STEM. For example, in 2019, NIH established a working group with university experts to collaborate with other federal agencies to assess the current state of sexual harassment allegation investigation, reporting, remediation, and disciplinary procedures at NIH-funded organizations and advise on oversight, accountability, and reporting measures for grantees, among other things. In addition, all five agencies provided examples of collaborative efforts that would help address the culture of sexual harassment in STEM research. For example, NASA officials told us that it would be helpful to conduct joint meetings with other university grantees across agencies to discuss sexual harassment in science. Lastly, efforts to improve information sharing and collaboration across agencies beyond conducting Title IX compliance reviews are consistent with findings in the 2018 NASEM report, which states, “adherence to legal requirements is necessary but not sufficient to drive the change needed to address sexual harassment.” We will continue to examine and assess selected agencies’ Title IX reviews and efforts to collaborate and share information in our ongoing work. In closing, I note that we are continuing our ongoing work on this topic. Sexual harassment is not only degrading to individual researchers, it undermines the quality and fairness of our nation’s research enterprise. It is therefore important that federal agencies ensure their grantees effectively prevent and address sexual harassment in STEM research. We look forward to continuing our work to determine whether additional federal actions may be warranted to promote this objective. Chairwoman Johnson, Ranking Member Lucas, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact John Neumann, Managing Director, Science, Technology Assessment, and Analytics, at (202) 512-6888 or NeumannJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this testimony include Rob Marek (Assistant Director), Michelle St. Pierre (Assistant Director), Kristy Kennedy (Analyst-In-Charge), Nora Adkins, Caitlin Cusati, Nkenge Gibson, Amanda Postiglione, Janay Sam, and Ben Shouse. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In fiscal year 2017, U.S. universities were awarded over $15 billion in federal grant funding for STEM research. Federal agencies are required to enforce Title IX—a law prohibiting discrimination on the basis of sex in education programs receiving federal financial assistance—including at universities they fund. Sexual harassment is not only degrading and illegal, it has a negative effect on the ability of women to engage in research at the same level as men. GAO was asked to review federal efforts to help prevent sexual harassment by STEM research grantees. This testimony is based on ongoing GAO work and provides preliminary observations on selected agencies: (1) availability of staff and budget to address sexual harassment complaints at universities they fund for STEM research; (2) efforts to establish and communicate policies and procedures for university grantees on preventing sexual harassment; and (3) steps taken to promote information sharing and collaboration among agencies to prevent sexual harassment at universities they fund for STEM research. GAO selected five federal agencies that together funded approximately 80 percent of STEM research from fiscal year 2015 through 2017, the latest data available. GAO reviewed these agencies' relevant regulations and documentation. GAO also interviewed agency officials as part of GAO's ongoing work. Based on preliminary information, the availability of agency staff and budget varies across the five selected agencies for efforts to address sexual harassment complaints at universities that use federal funds for Science, Technology, Engineering, and Mathematics (STEM) research. While four of the five agencies received three or fewer sexual harassment complaints from individuals at grantee universities from 2015 through 2019, changes to agency grantee policies or requirements could impact the number of complaints an agency receives and the amount of resources an agency needs to address them. The five selected agencies have established and communicated sexual harassment prevention policies to university grantees to varying degrees. Agencies vary in how they have: Provided detailed policies to grantees on sexual harassment. Three agencies—the National Aeronautics and Space Administration (NASA), Health and Human Services (HHS) National Institutes of Health (NIH), and the National Science Foundation (NSF)—have communicated relatively detailed policies on sexual harassment by issuing multiple forms of guidance, such as grantee policy manuals and best practices documents. In contrast, the Department of Energy (DOE) and Department of Agriculture (USDA) National Institute of Food and Agriculture (NIFA) communicated through more general documents, including policy statements that do not specifically address grantees. Modified grant terms and conditions . Two agencies are modifying the terms and conditions of grants to require grantees to report sexual harassment. NSF now requires grantees to increase transparency by reporting findings of sexual harassment to NSF, and NASA plans to implement the same requirement. Evaluated effectiveness of grantee policies. To date, the five agencies have not evaluated the effectiveness of their grantee policies and procedures to prevent sexual harassment, although two agencies are in the process of planning such evaluations. Based on our preliminary analysis and interviews, all five selected agencies have taken some steps to promote information sharing and collaboration among agencies on the prevention of sexual harassment. But they also noted challenges to these efforts, such as the lack of information on sexual harassment cases. These challenges may increase the risk that universities or agencies are unknowingly funding researchers with a history of past sexual harassment findings. The White House's Office of Science and Technology Policy has taken steps to create an interagency working group by establishing a joint committee in May 2019 under the National Science and Technology Council with NIH, NSF, DOE, and the National Institute of Standards and Technology Directors. The committee plans to address challenges in the research environment, including the lack of uniform federal sexual harassment policies. GAO is not making recommendations at this time but will consider making them, as appropriate, as it finalizes its work.", "document_type": "gao"}
{"report": "GSA’s existing government-wide telecommunications program is called Networx. As part of this program, in 2007 GSA awarded two sets of Networx contracts, which had an estimated combined value of $20 billion. These sets of contracts had differing characteristics: GSA awarded Networx Universal contracts to AT&T, Verizon Business Services, and Qwest Government Services. Networx Universal offers voice and data services, wireless services, and management and application services, including video and audio conferencing, as well as mobile and fixed satellite services, with national and international coverage. Networx Universal contracts were set to expire in March 2017; however, GSA has twice extended these contracts. According to GSA officials, the most recent extension, which GSA announced in November 2018, is to include one base year and two 1-year options, plus an additional option for the number of months required for the contracts to reach May 31, 2023. If the extension is executed and all options are exercised, the contracts will expire in May 2023. GSA awarded Networx Enterprise contracts to AT&T, Verizon Business Services, Qwest Government Services, Level 3 Communications, and Sprint Nextel. Networx Enterprise offers services similar to those of Networx Universal, with a focus on those that are internet-based. Networx Enterprise requires telecommunications services to be available in a smaller geographic area than Networx Universal. Networx Enterprise contracts were set to expire in May 2017; however, GSA has twice extended these contracts to each participating vendor, except one. According to GSA officials, the most recent extension, which GSA announced in November 2018, is to include one base year and two 1-year options, plus an additional option for the number of months required for the contracts to reach May 31, 2023. If the extension is executed and all options are exercised, the contracts will expire in May 2023. In addition, GSA provides telecommunications services through programs called Washington Interagency Telecommunications System 3 and Regional Local Service Agreements. Washington Interagency Telecommunications System 3: these contracts support a variety of telecommunications services available to all federal agencies in Washington, D.C., and surrounding Maryland and Virginia counties. For example, among other things, these contracts provide data and voice services, as well as cloud services. These contracts were set to expire on or before May 2020. As of December 2019, GSA planned to extend these contracts. GSA officials stated that the extension is to include one base year and two 1-year options, plus an additional option for the number of months required for the contracts to reach May 31, 2023. If the extension is executed and all options are exercised, the contracts will expire in May 2023. Regional Local Service Agreements: these contracts provide local telecommunications services in every state and major city in the United States. According to GSA officials, the expiration dates for these contracts ranged from October 2019 through March 2023. As of December 2019, GSA was in the process of extending these contracts. In particular, GSA officials reported that certain contracts had already been extended to May 2023, and the officials planned to extend the remaining contracts through May 2023, as well. According to data provided by GSA officials, in fiscal year 2019, federal agencies spent approximately $2.5 billion on services acquired through Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements contracts. About $2 billion of this spending was on services acquired through Networx alone. EIS is the replacement for Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements telecommunications contracts. GSA intends for EIS to address federal agencies’ global telecommunications and IT infrastructure requirements. GSA plans for EIS to provide agencies with traditional and emerging services to meet current and future requirements by: simplifying the government’s process of acquiring IT and telecommunications products and services; providing cost savings to each agency through aggregated volume buying and pricing (with generally lower costs for services on EIS compared to the costs for similar services on Networx), and spending visibility; enabling the procurement of integrated solutions; promoting participation by small businesses and fostering competition; offering a flexible and agile suite of services supporting a range of government purchasing patterns into the future; and providing updated and expanded security services to meet current and future government cybersecurity requirements. In addition, GSA has identified several benefits that EIS is expected to provide to the agencies that participate in its telecommunications programs. These projected benefits include streamlined contract administration, a possible 15-year period of performance, simplified pricing, and enhanced management and operations support. On August 1, 2017, GSA announced that it had awarded EIS contracts to 10 vendors. These contracts have a combined value of up to $50 billion and are for a possible period of up to 15 years (one 5-year base period and two 5-year option periods). According to GSA’s plans as of November 2019, the transition to EIS is expected to be completed by May 2023, when the current Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements telecommunications contracts are expected to expire (if all contract options are exercised, as discussed earlier). To help ensure that agencies’ services are fully transitioned to EIS before the current contracts expire, GSA issued guidance that identified several critical milestones that agencies should meet. These milestones include: (1) releasing all planned fair opportunity solicitations to EIS vendors by March 31, 2019; (2) issuing all planned task orders by September 30, 2019; and (3) achieving 100 percent transition of services by September 30, 2022. Figure 1 provides a timeline of the planned transition to EIS, including GSA’s critical milestones, as of November 2019. Central to the successful transition from GSA’s current telecommunications services contracts to EIS are transition planning and execution activities that involve GSA, federal agencies, the incumbent telecommunications contractors, and EIS contractors. GSA serves as the facilitator for all transition management activities. The agency is using contractors to assist in tracking transition activities, in order to avoid delays and other problems that can arise throughout the process. In particular, GSA’s primary responsibility is to provide program management for the current telecommunications programs (Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements) and EIS. As part of this, GSA is responsible for conducting government-wide strategy and project management; providing tailored assistance to agencies for transition planning and help with contractor selection and ordering; tracking and reporting the use of metrics that convey the relative complexity and transition progress; and providing customer support, training, and self-help tools and templates. GSA developed two contracting vehicles to provide transition assistance to agencies: (1) a Transition Coordination Center vehicle that includes assistance with inventory validation, transition planning, and solicitation development; and (2) a Transition Ordering Assistance vehicle that addresses tasks including requirements development and source selection assistance, and proposal evaluation. The Coordination Center vehicle was put in place in January 2016 and the Ordering Assistance vehicle was initially awarded in September 2016, but was not finalized until March 2017, after the conclusion of a bid protest. Agencies have principal responsibility for the transition. They are responsible for coordinating transition efforts with the incumbent contractors and EIS contractors to ensure that existing telecommunications services are disconnected and that new services are ordered under EIS. According to GSA, agencies’ responsibilities under EIS include: identifying key personnel, chiefly a Senior Transition Sponsor, Lead Transition Manager, and Transition Ordering Contracting Officer; engaging expertise from Chief Information Officers, Chief Acquisition Officers, and Chief Financial Officers to build an integrated transition team of telecommunications managers, acquisition experts, and financial staff; developing a financial strategy and budget for transition costs beginning in fiscal year 2017; analyzing and confirming the accuracy of the inventory of active services that must be transitioned; developing a transition plan that describes technological goals, a transition schedule that includes GSA’s major transition milestones (e.g., releasing all fair opportunity solicitations by March 31, 2019, and issuing all task orders by September 30, 2019), a strategy for issuing task orders on EIS for transitioning services, and any constraints or risks; preparing solicitations for task orders; placing task and service orders; coordinating resources to facilitate scheduling and communications for implementing and maintaining services; and reviewing, accepting or rejecting, and paying for services. At the agencies we reviewed, the staff responsible for the transition were part of their agencies’ offices that were headed by the Chief Information Officers. Finally, the incumbent and EIS contractors are responsible for disconnecting existing services under the current contracts and installing new services that agencies order under EIS. They are also to collaborate with GSA and agencies to share transition planning and execution best practices and help resolve issues. We have previously reported on efforts by GSA and agencies to transition from one telecommunications program to another. In a June 2006 report, we identified a range of transition planning practices that can help agencies reduce the risk of experiencing adverse effects of moving from one broad telecommunications contract to another. These planning practices were to: (1) develop an accurate inventory of telecommunications assets and services, (2) perform a strategic analysis of telecommunications requirements, (3) develop a structured transition management approach, (4) identify the resources needed for the transition, and (5) develop a transition plan. In that report, we also noted the progress of six selected agencies in preparing for the transition to Networx and found that the agencies generally had not implemented the practices, but were planning to do so. We recommended, among other things, that two of the agencies take actions to address gaps in their transition planning efforts. Both agencies agreed with the recommendations and implemented them. In addition, in 2008, we reported on the extent to which six selected agencies were following the transition planning practices during the Networx transition. We noted that the agencies were generally implementing the practices, but three of them had not fully implemented some of the key activities of the practices and were not planning to do so. For example, one agency was not planning to clearly define all key transition roles and responsibilities and another agency was not planning to identify local and regional points of contact. We made recommendations focused on addressing the gaps in transition planning to the three agencies that had not implemented key practice activities and did not plan to do so. One of the three agencies agreed with the recommendations and two agencies partially agreed with them. One agency implemented the recommendation we made to it, one implemented one of the two recommendations directed to it, and one agency implemented one of the seven recommendations we made to it. In 2013, we reported on factors that had contributed to the delay in the Networx transition and the consequences of the delay. We pointed out that weak project planning and complex acquisition processes were factors that had contributed to the delay. As a result, we recommended, among other things, that GSA take two actions to improve planning and execution of the next telecommunications transition. GSA agreed with these recommendations. The agency then implemented one of the recommendations and did not implement the other one, which was to examine, in coordination with the Office of Personnel Management, potential government-wide telecommunications expertise shortfalls and use the study to shape the next telecommunications acquisition (now called EIS). More recently, we reported in 2017 that, among other things, the five agencies we selected had yet to fully apply most of the five planning practices. Specifically, we noted that one agency fully implemented one practice, partially implemented three practices, and did not implement another. The other four agencies partially implemented each of the five practices. Accordingly, we recommended, among other things, that the five agencies complete adoption of the planning practices to avoid schedule delays and unnecessary costs. Four of the five agencies agreed with all of our recommendations. The other agency agreed with two recommendations, partially disagreed with one, and disagreed with two recommendations. All five agencies have efforts underway to address our recommendations, but had not yet fully implemented them as of November 2019. The 19 selected agencies have varied plans for transitioning from their current telecommunications contracts to EIS program contracts. As of October 2019, these agencies were also in different stages of their EIS transitions. All of the selected agencies reported that they plan to fully transition their telecommunications services to EIS before the current contracts are set to expire in May 2023. However, over half of the selected agencies did not plan to complete the transition by GSA’s September 30, 2022, milestone. In addition, the majority of selected agencies did not meet GSA’s two critical EIS transition milestones in 2019—to (1) release all fair opportunity solicitations by March 31, 2019, and (2) issue all task orders by September 30, 2019. The 19 selected agencies had various plans for completing their transitions to EIS. In particular, eight of the selected agencies reported that they planned to finish their transitions to EIS by GSA’s September 30, 2022, milestone. The 11 remaining agencies did not plan to complete their transitions by that date. Table 1 identifies the 19 selected agencies’ plans for completing the transition to EIS by GSA’s September 30, 2022, milestone. Officials from the 11 selected agencies that did not plan to finish their transitions to EIS by GSA’s September 30, 2022, milestone—the Departments of Agriculture, Commerce, Energy, HHS, Homeland Security, the Interior, Justice, Transportation, the Treasury, and VA; and the Social Security Administration—reported that they planned to complete the transitions before the current telecommunications contracts are set to expire in May 2023. Specifically, Commerce and the Social Security Administration planned to complete their transitions in December 2022; the Department of Transportation planned to do so in January 2023; the Departments of Agriculture, HHS, Homeland Security, and the Treasury planned to complete their transitions in March 2023; and the Departments of Energy, the Interior, Justice, and VA planned to complete their transitions in May 2023, just before the current telecommunications contracts are set to expire. In addition, the planned scope and amount of effort that is expected to be required to fully transition to EIS varied among the selected agencies. Specifically, agencies varied in the scope of their planned efforts related to two of GSA’s critical transition milestones—to release EIS fair opportunity solicitations and issue EIS task orders. Specifically, Eighteen of the selected agencies planned to release between one and six EIS fair opportunity solicitations, and the final agency—the Department of Defense—planned to release 54 solicitations. Thirteen of the agencies planned to issue between one and five EIS task orders, while the remaining six agencies—the Departments of Defense, Homeland Security, Labor, the Treasury, and VA; and NASA—planned to issue more than five task orders. Table 2 identifies the estimated number of planned EIS fair opportunity solicitations and task orders for the 19 selected agencies, as of November 2019. Further, the selected agencies had different plans for the types of transitions that they would implement. Specifically, as of November 2019, four of the selected agencies planned to implement primarily a like-for-like transition of their services. The remaining 15 agencies planned to conduct a combination of a like-for-like transition and upgrading or transforming services. Table 3 identifies the 19 selected agencies’ plans for the types of transitions to EIS that they will implement, as of November 2019. As of October 2019, the 19 selected agencies were in different stages of their EIS transitions. Eighteen of the agencies were in the acquisition planning and/or acquisition decision phases, during which the agencies release fair opportunity solicitations for vendor proposals and issue task orders to selected vendors, respectively. GSA established two critical milestones for agencies to complete these acquisition activities: (1) release all fair opportunity solicitations by March 31, 2019, and (2) issue all task orders by September 30, 2019. Regarding the first milestone—to release all EIS fair opportunity solicitations by March 31, 2019—five of the 19 selected agencies reported that they released all of their solicitations by this date. The 14 remaining selected agencies reported that they did not release all of their solicitations by this date. Table 4 identifies the 19 selected agencies’ status in meeting GSA’s milestone to release all EIS fair opportunity solicitations by March 31, 2019. Officials from each of the five agencies that met GSA’s milestone to finish releasing all of their planned EIS solicitations by March 31, 2019, reported that their agencies released either one or two solicitations. In particular, officials from GSA and the Departments of Justice and Transportation reported that their agencies each released one solicitation, and Commerce and Social Security Administration officials reported that their agencies each released two solicitations. While eight of the 14 other selected agencies had also planned to release either one or two solicitations in total for their transitions, officials from these agencies reported that they did not finish releasing them by March 31, 2019. These agencies were the Departments of Agriculture, Education, Energy, HHS, Housing and Urban Development, Labor, and State; and the Small Business Administration. We asked officials from the 14 selected agencies that did not release all of their planned EIS solicitations by March 31, 2019, to identify the key factors that contributed to their agencies’ delays in releasing these solicitations. In response, agency officials cited numerous key factors for the delays, including the complexity of their telecommunications requirements, changes to the agency’s or GSA’s contracting strategy, and insufficient staff availability. Figure 2 identifies the key factors that contributed to delays in releasing all EIS solicitations by GSA’s March 31, 2019, milestone, as identified by agency officials. In addition, regarding GSA’s second milestone—to issue all EIS task orders by September 30, 2019—one of the selected agencies (the Small Business Administration) reported that it issued all of its task orders by this date. The 18 other agencies reported that they did not issue all of their EIS task orders by this date. Table 5 identifies the 19 selected agencies’ status in meeting GSA’s milestone to issue all EIS task orders by September 30, 2019. Officials from the Small Business Administration—the only agency that met GSA’s September 30, 2019, milestone—reported that the agency issued its lone task order on September 27, 2019. We asked officials from the 18 agencies that did not issue all of their EIS task orders by September 30, 2019, to identify the key factors that contributed to their agencies’ delays in issuing these task orders. In response, agency officials cited 19 key factors that led to the delays. Nine of the identified factors were the same factors that officials cited for their agencies’ delays in releasing EIS solicitations, including the complexity of requirements and having insufficient staff available. The officials also identified 10 other factors unique to their delays in issuing EIS task orders. For example, officials from two agencies reported that the EIS vendors needed clarification on the agencies’ requests for proposals. In addition, officials from three agencies reported that they needed clarification from the EIS vendors on the proposals that the agencies received. Figure 3 identifies the key factors that contributed to delays in issuing all EIS task orders by GSA’s September 30, 2019, milestone, as identified by agency officials. Several of the identified factors, such as the partial government shutdown and the need for vendors to receive authorities to operate, have subsequently been resolved. For other factors, agencies can leverage GSA’s available EIS training and customer support to help minimize delays in meeting GSA’s transition milestones. However, given that the majority of the selected agencies did not meet these transition milestones in 2019, it will be important for agencies to meet the remaining transition milestones to ensure that they complete the transition before the current telecommunications contracts expire in May 2023. In a June 2006 report, we identified five transition planning practices that can help agencies reduce the risk of experiencing adverse effects of moving from one broad telecommunications contract to another. Implementing these transition planning practices represents a comprehensive and rigorous management approach that can help agencies make the most of the opportunity for change that such a major telecommunications transition provides. Each of the five transition planning practices that we identified consists of various activities that should be implemented to fully address the planning practices. Table 6 identifies the five established transition planning practices and their associated activities. All five selected agencies—Commerce, HHS, NASA, State, and VA—had taken steps to implement the five established transition planning practices. However, none of these agencies had fully implemented any of the practices. The five selected agencies had all partially implemented the first established transition planning practice—to develop an accurate inventory of telecommunications assets and services. In particular, all of the selected agencies had partially implemented the two activities associated with this practice. Table 7 summarizes the extent to which the selected agencies had implemented the transition practice to develop an accurate inventory of telecommunications services. Identify a complete telecommunications inventory at every site, facility, and component. The five selected agencies had all partially implemented this activity. While all of these agencies had developed inventories of their telecommunications assets and services, none of the inventories were complete. Specifically, the inventories that Commerce, NASA, and VA developed included the enterprise-wide assets and services in use at their agencies; however, the inventories did not include all of the assets and services that individual mission offices ordered for their own use. In addition, HHS’s and VA’s inventories did not include their assets and services that were associated with commercial contracts not managed by GSA. Moreover, none of the agencies’ inventories included all of the relevant contractors that were listed on USASpending.gov as having received telecommunications-related contracts from those agencies in fiscal years 2018 or 2019. As such, the inventories also did not include assets and services provided by those contractors. Establish a documented process for updating and maintaining the inventories. All five selected agencies partially implemented this activity by taking steps to document their inventory update and maintenance processes. However, none of the agencies had fully documented these processes. Specifically, Commerce, HHS, NASA, and State had documented and finalized their processes for updating and maintaining certain telecommunications assets and services within their inventories. However, these processes did not apply to all assets and services in use at the agencies. For example, NASA’s inventory maintenance processes applied to the agency’s enterprise- level assets and services, but did not apply to assets and services ordered by individual mission centers. VA had developed draft procedures for updating its inventories when new service requests were submitted, but it had not finalized these processes. In addition, VA had not documented processes for maintaining its inventories (e.g., removing telecommunications services from the inventories when they are disconnected). Officials from three of the selected agencies—Commerce, NASA, and VA—cited the same cause for not having complete inventories or associated inventory maintenance procedures. Specifically, the officials from these agencies—all of whom were responsible for their agencies’ transitions to EIS—stated that they did not track all of the assets and services ordered by the agencies. The officials added that they were not responsible for maintaining inventories of all of their agencies’ assets and services. Further, officials in NASA’s and VA’s offices of the Chief Information Officer did not provide inventories of the assets and services ordered by those agencies’ individual mission offices, or any documentation of their agencies’ associated inventory maintenance processes. Commerce officials acknowledged their lack of a complete telecommunications inventory and stated that they were working to identify the agency’s assets and services associated with individual mission offices. The officials stated that they planned to complete this identification effort by 2023, but this schedule was not documented. State officials said that their telecommunications inventories did not include all of the relevant contractors that were listed on USASpending.gov as having received telecommunications-related contracts from the agency in fiscal years 2018 or 2019 because some of the contracts listed on USASpending.gov were for telecommunications services that State does not plan to purchase from EIS. State officials said that their initial focus for the EIS transition is to replace their current domestic services that are ordered through GSA’s telecommunications contracts before those contracts expire. However, all of the relevant telecommunications contractors used by State and reported at USASpending.gov should be included in State’s telecommunications inventory. The lack of a complete inventory that includes these contractors and their associated services will likely limit State’s ability to fully identify areas for optimization and the sharing of telecommunications resources across the agency. Officials from the one remaining agency—HHS—attributed their agency’s lack of a complete telecommunications inventory and associated maintenance procedures to the agency’s decentralized structure. Specifically, the HHS officials stated that the agency’s components are responsible for managing the services that are unique to them, including those associated with commercial contracts not managed by GSA. However, the officials stated that the agency did not have a policy that required its components to maintain an inventory of telecommunications assets and services that they acquired independently. Without complete and accurate telecommunications inventories, the selected agencies may be unable to avoid unnecessary transition delays related to an inability to plan for services not identified in the inventory. The agencies will also likely be limited in their ability to determine areas for optimization and the sharing of telecommunications and IT resources across the agencies. In addition, without documented processes for maintaining inventories of all of their telecommunications assets and services in use, the agencies may not be able to consistently and accurately incorporate into their telecommunications inventories any changes made during and after the transition (e.g., adding new services or removing disconnected services), thus hindering their ability to ensure that they are billed appropriately by the vendor. All of the selected agencies had partially implemented the second established transition planning practice—to perform a strategic analysis of telecommunications requirements. In particular, of the four activities associated with this practice, NASA had fully implemented three of the activities and partially implemented one activity; HHS and VA had fully implemented two of the activities and partially implemented the other two activities; State had fully implemented one of the activities and partially implemented the other three activities; and Commerce had partially implemented each of the four activities. Table 8 summarizes the extent to which the selected agencies had conducted strategic analyses of their telecommunications requirements. Identify current and future telecommunications needs using an inventory of existing services. All of the selected agencies had partially implemented this activity by identifying certain current and future telecommunications needs. However, as discussed earlier, none of the agencies had a complete inventory of current services. As a result, the agencies could not use such an inventory to fully identify their needs. Identify areas for optimization or sharing of telecommunications and IT resources. Three agencies—HHS, NASA, and VA—had fully implemented this activity by completing strategic analyses to identify areas for optimization or sharing of telecommunications resources. The two remaining agencies—Commerce and State—had partially implemented this activity. Specifically, while Commerce had developed a draft strategic analysis to justify the potential optimization and sharing across the agency of a telecommunications service for how hardware devices connect to the internet, it had not yet finalized this analysis. One Commerce bureau had also conducted a strategic analysis to justify potentially optimizing or sharing multiple telecommunications services and IT resources within that bureau, but Commerce was unable to provide documentation demonstrating that its remaining bureaus had conducted similar analyses. Further, while State had conducted a strategic analysis to identify services that could be optimized across the agency and agency officials had also identified potential areas for sharing of resources, State did not provide a documented analysis to justify the sharing of those resources. Evaluate the costs and benefits of any new technology and alternative options. Four agencies—HHS, NASA, State, and VA— had fully implemented this activity by evaluating the costs and benefits of various technologies and alternative options for telecommunications services that they could implement as part of the transition. The one remaining agency—Commerce—had partially implemented this activity. Specifically, while Commerce demonstrated that it had evaluated the costs and benefits of upgrading one service by which hardware devices connect to the internet, and two Commerce bureaus had analyzed the costs and benefits of implementing another type of service for connecting to networks, the remaining Commerce bureaus did not conduct such analyses. Determine that identified telecommunications needs and opportunities are aligned with the agency’s mission, long-term IT plans, and enterprise architecture plans. One agency—NASA— had fully implemented this activity by determining that its telecommunications needs aligned with its mission and plans. The four remaining agencies had partially implemented this activity. Specifically, HHS had determined that its telecommunications needs aligned with its mission and enterprise architecture, but it did not demonstrate a similar alignment with its long-term IT plans. In addition, State had demonstrated that its needs aligned with its mission, but it did not determine and document that these needs aligned with the agency’s long-term IT plans and enterprise architecture. Further, one Commerce bureau had determined that its needs aligned with its mission, long-term IT plans, and enterprise architecture. However, the remaining Commerce bureaus did not determine and document that their telecommunications needs were aligned with the agency’s long-term IT plans and enterprise architecture. VA also had determined that its identified needs aligned with its mission and enterprise architecture, as they relate to an ongoing telecommunications modernization project. However, while VA officials stated that their telecommunications needs were aligned with the agency’s long-term IT plans, the officials did not provide documentation demonstrating this alignment. Agency officials cited several reasons for not fully implementing the activities associated with this practice. For example, NASA did not use a complete inventory of existing telecommunications assets and services to identify its future telecommunications needs because, as discussed earlier, NASA officials stated that the agency’s telecommunications inventory included only enterprise-level assets and services, and did not include assets and services ordered by individual mission centers. The officials further explained that they were not responsible for maintaining inventories of those mission offices’ telecommunications assets and services and, therefore, did not track all of those assets and services. In addition, Commerce officials stated in May 2019 that the majority of the agency’s bureaus did not conduct cost-benefit analyses that considered implementing new telecommunications technologies because Commerce was planning to transition its services on a like-for-like basis in order to complete the transition before May 2020, which was when the current telecommunications contracts were previously set to expire. As such, the officials stated that the agency was not planning to implement new technologies and, thus, a cost-benefit analysis of such technologies was not necessary. However, in October 2019, Commerce officials stated that the agency’s EIS solicitation included options for vendors to propose the implementation of new technologies. State officials explained that they had not conducted and documented an analysis to identify areas for the sharing of telecommunications resources because they did not believe that there were any additional State telecommunications resources that could be shared. State officials attributed this to the agency’s security requirements and regulations, and noted that services on State’s classified network may not be shared with services on its unclassified network. Nevertheless, while services may not be able to be shared between these networks, State did not provide documentation that demonstrated that the agency had determined that there were no additional resources that could be shared on State’s unclassified network. In November 2019, VA officials stated that they thought their telecommunications needs were aligned with the agency’s long-term IT plans. However, the officials did not provide documentation demonstrating this alignment. HHS officials stated that they intend to align the agency’s telecommunications needs and IT strategic plans after the agency establishes a centralized transition program management office. Specifically, the agency decided to centralize its transition management approach in March 2019 and, as of December 2019, HHS officials expected the office to be fully established by March 2020. However, the officials did not have documented plans for when they would align the agency’s telecommunications needs and IT strategic plans. Agencies that do not use complete inventories of their current telecommunications services to identify their future needs are likely not fully identifying these needs. They may also miss opportunities to optimize or share services by consolidating them on EIS. In addition, by not using a rigorous management approach that includes strategically analyzing, identifying, and documenting areas for optimization and sharing of resources, agencies may miss opportunities to upgrade their telecommunications services or to shift these services to more cost- effective technologies. Further, agencies that do not fully assess the costs and benefits of alternatives for meeting their telecommunications needs may miss the opportunity that the transition provides to optimize their telecommunications services. Moreover, without aligning their telecommunications needs and opportunities with their missions and plans, agencies risk missing opportunities to use the new contract to address their highest priorities, or may make decisions that are not aligned with their long-term goals. All of the selected agencies had partially implemented the third transition planning practice—to develop a structured management approach for the telecommunications transition. Specifically, of the three activities associated with this practice, NASA had fully implemented two activities and partially implemented one activity; HHS and VA had fully implemented one activity and partially implemented the other two activities, and Commerce and State had partially implemented each of the three activities. Table 9 summarizes the extent to which the selected agencies had established a structured management approach. Establish a transition management team and clearly define responsibilities for key transition roles. One agency—VA—had fully implemented this activity by establishing a transition management team and defining all key transition responsibilities for the planning and execution phases of the transition, including for project, asset, human capital, and information security management; and contract and legal expertise. The remaining four agencies had partially implemented this activity by establishing transition management teams, but none had defined all key roles and responsibilities for their transitions. Specifically, NASA had not defined a role and related responsibilities for managing human capital throughout the transition, nor for providing legal expertise during the execution phase of the transition. While Commerce had identified the need for managing human capital and telecommunications assets throughout the planning and execution phases of the transition, and for providing legal expertise during the execution phase of the transition, it had not yet assigned these roles and related responsibilities to staff members. In addition, Commerce, State, and HHS had identified the need for an information security management role during the transition. However, Commerce and State had not yet finalized the responsibilities for this role, and Commerce and HHS had not yet assigned this role to a staff member. State and HHS had also not identified roles and responsibilities for managing telecommunications assets throughout the transition, nor for providing legal expertise during the execution phase of the transition. Moreover, while HHS officials stated that a staff member was providing human capital management-related assistance to the agency’s centralized EIS program management office, the agency had not documented this role for the transition, nor defined specific responsibilities for this role. Develop transition communications plans in order to facilitate information sharing during transition planning and execution. Two agencies—HHS and NASA—had fully implemented this activity by developing transition communications plans and identifying all key parties that need to be involved during the agency’s transition effort. The remaining three agencies—Commerce, State, and VA—partially implemented this activity. For example, each of these agencies identified stakeholders responsible for communicating transition information to other stakeholders. While Commerce and VA also identified the frequency with which transition status updates and meetings are to occur, State did not identify this frequency. In addition, State and one bureau within Commerce did not include a description of how changes and disruptions related to the transition would be communicated to end users. Further, Commerce, State, and VA did not identify the key local and regional agency transition officials responsible for disseminating information about the transition to employees and working with the vendor to facilitate transition activities. While VA had identified a potential list of these officials in a previous version of the agency’s transition communications plan, the agency removed this list from the latest version of the plan. Use established project, configuration, and change management processes in the agency’s transition planning efforts. One agency—NASA—had fully implemented this activity by demonstrating the use of all established management processes called for in the activity. The four remaining agencies—Commerce, HHS, State, and VA—had partially implemented this activity by demonstrating the use of project management processes for their transitions, such as tracking transition costs and developing schedules and risk logs. However, VA did not demonstrate that it was applying approved cost and schedule management processes to its transition. In addition, Commerce, HHS, and State did not demonstrate that they were applying established configuration management processes to their transitions. Further, Commerce and HHS did not demonstrate that they had implemented change management processes for their transitions. Officials from four of the selected agencies—Commerce, HHS, NASA, and VA—generally attributed their lack of full implementation of this practice to the fact that, at the time of our review, the agencies were early in their transition planning processes. For example, NASA officials stated that they had not defined a role or responsibilities related to human capital management because their human capital needs for the transition will depend on the vendors selected (incumbents or new vendors). As such, the officials stated that they had not yet determined whether a human capital management role was needed for the transition. The officials said that they would consider adding such a role after they issue their EIS task orders. However, NASA did not conduct an analysis to determine whether there was a need for a human capital manager during the planning phase of the transition. As a result, NASA is risking delays that could lengthen its transition due to the lack of an assigned staff member to manage its human capital needs during the transition planning phase. In addition, State officials said that they did not identify the key local and regional agency transition officials responsible for working with the vendor to facilitate transition activities because, as part of State’s security processes, vendors must work with State’s bureau-level points-of-contact to be escorted to State facilities, as necessary. The State officials said that their bureau-level points-of-contact would coordinate with the local and regional agency transition officials, as appropriate. VA officials stated that they removed from their transition communications plan the list of key local and regional agency transition officials because, in part, as of November 2019 it was still early in the agency’s transition and they expected the contacts to change as the transition is implemented. As such, VA officials also stated that they only identified key transition positions, rather than individuals, in order to ensure the accuracy of the information in the communications plan. Commerce officials explained that they had not yet implemented all of the key management processes for the transition because they planned to work with their selected EIS vendors to establish those processes. These officials further stated that they planned to implement this activity after they issue their EIS task orders. Moreover, HHS officials attributed their lack of established configuration and change management processes to the agency’s previous decentralized management approach, which did not require HHS’s components to establish such processes for the transition. As discussed earlier, in March 2019, the agency decided to centralize its transition management approach. HHS officials stated that, as part of the centralized approach, they planned to develop change and configuration management processes for the transition. However, they did not have documented time frames for establishing and implementing these processes. While the selected agencies were early in their transition planning processes at the time of our review, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information that is available. Agencies that do not define all key roles and related responsibilities for their transition management teams risk extending their transition period as they attempt to assign appropriate personnel and update them on transition progress and issues. Further, without identifying all of the key officials that need to be involved with the transition, including the local and regional agency points of contact, agencies may lack the information that is necessary for comprehensive understanding, accountability, and shared expectations among all those with transition responsibilities. Finally, by not using a rigorous management approach that implements established configuration management and change management processes for the transition, agencies risk additional financial costs, extended timelines, and disruptions to the continuity of their telecommunications systems. The limited time available for agencies to complete the transition makes it more important for them to use rigorous management processes in their transition efforts. All of the selected agencies had partially implemented the fourth established transition planning practice—to identify their transition resource needs. In particular, of the four activities associated with this practice, NASA had fully implemented one of the activities and partially implemented the remaining three activities; and the four other agencies— Commerce, HHS, State, and VA—had partially implemented each of the activities. Table 10 summarizes the extent to which the selected agencies had identified their transition resource needs. Identify the level of funding needed to support transition planning. One of the selected agencies—NASA—had fully implemented this activity by identifying the costs needed to support its transition management team and all years of its transition planning efforts. The four other agencies—Commerce, HHS, State, and VA— had partially implemented this activity. In particular, HHS had developed a cost estimate that partially identified the funding needed for its transition management team, but this estimate did not identify the costs for all transition management staff at each of the agency’s components. Commerce had developed a draft analysis that identified the funding needed for government and contractor staff working on the transition, but this analysis was not approved. In addition, one Commerce bureau had not yet identified the funding needed for all years of transition planning support. Further, while State had partially identified the funding needed to support federal and contractor staff working on the transition, it had not identified the funding needed for all transition staff or for all years of transition planning support. Moreover, while VA officials stated that they had identified the costs needed for the transition, the officials did not provide documentation that identified costs for all years of transition planning support. Identify the organizational need for investments and justify resource requests. The five selected agencies had all partially implemented this activity by identifying the need for investments, including funding to obtain GSA transition assistance; however, none of the agencies had fully justified their resource requests for the transition. Specifically, Commerce, State, and VA had not justified their resource requests related to transition program management staff. In addition, HHS lacked justification for its requests for hardware and software upgrades. Moreover, while NASA had identified anticipated cost savings as part of its justification for resource requests related to hardware and software upgrades, it was unable to provide documentation of an analysis to support these identified savings. NASA also did not justify its resource requests related to transition program management staff. Identify human capital needs for the entire transition effort. All of the selected agencies had partially implemented this activity by identifying the need for certain staff to work on the transition, including government and contractor staff. However, none of the agencies had conducted and documented analyses of their human capital needs, to determine the total number of staff required to support their entire transition efforts. Identify and require training for the transition. All of the agencies had partially implemented this activity by identifying training needed by certain transition management staff. In addition, four of the agencies—Commerce, HHS, NASA, and State—had also provided training to transition support staff. However, Commerce, HHS, NASA, and VA had not conducted and documented analyses to identify all of the training needed for their transitions, including training for staff carrying out the transition or operating and maintaining new equipment or services. In addition, while State had developed a draft analysis to identify training needed by staff carrying out the transition, it had not finalized this analysis. Officials from these agencies cited several reasons for not fully identifying their transition resource needs. In general, Commerce, HHS, and VA officials explained that they were too early in their transition efforts to identify all of the funding, human capital, and training needed for their transitions. NASA and State officials also cited this as the reason for why they had not identified all of their human capital needs. In particular, officials from all five of the agencies stated that they will not be able to determine their complete transition resource needs until after they issue their EIS task orders. For example, officials from all of these agencies explained that their human capital needs will depend on which vendors are selected and what new technology will be implemented, if any. Officials from these agencies also stated that they planned to identify all of their human capital needs after they issue their EIS task orders, but none of the agencies had documented plans for doing so. In addition, Commerce officials said that they did not document a cost- benefit justification for using contractor staff to assist with transition program management because they knew that their existing resources (i.e., government staff) were not sufficient. As such, the officials stated that the agency determined that further analysis for justification of using contractor staff was not necessary. State officials also explained that they had not identified all of the funding needed to support transition planning because, per agency policy, they were not required to do so. In particular, the officials explained that the division responsible for the EIS transition operates under a working capital fund. As part of this, the division provides telecommunications services to State customers and charges those customers for the services provided. In accordance with State policy, the division determines the costs for these services on an annual basis. As such, the officials stated that they were not required by agency policy to determine the total funding needed for the entire transition. However, although State policy does not require the agency to identify all of the funding needed to support transition planning, as part of a comprehensive management approach to the transition State should identify its complete transition funding requirements to ensure that sufficient resources are available when needed during the transition. While these agencies may be early in their transition efforts, there is limited time remaining to complete the transition before the current telecommunications contracts expire. If the agencies do not conduct early planning to identify and justify all of their resources needed for the transition, they may underestimate the complexity and demands of their transition efforts. In addition, without using a rigorous management approach to analyze and document the total number of staff required to support the transition and to identify all of the required training for transition staff, agencies risk having insufficient staff available or may experience gaps in staff competencies. Such gaps may lead to delays and unexpected costs as the agencies try to quickly address the lack of resources during the transition’s limited time frame. All of the selected agencies had partially implemented the fifth established transition planning practice—to develop transition plans. Specifically, of the three activities associated with this practice, three agencies—Commerce, NASA, and State—had fully implemented two activities and partially implemented the remaining activity; and two agencies—HHS and VA—had fully implemented one activity and partially implemented the other two activities. Table 11 summarizes the extent to which the selected agencies had developed transition plans. Identify agency-specific transition objectives and measures of success. Three agencies—Commerce, NASA, and State—had fully implemented this activity by identifying transition objectives and associated measures of success that were based on the transition objectives. The remaining two agencies—HHS and VA—had partially implemented this activity. In particular, while these agencies had identified transition objectives and measures of success, their measures were unable to be used to assess transition progress. Specifically, HHS and VA had identified measures that could be used to determine success at the completion of the transition (e.g., all planned services have been transitioned to EIS). However, the measures did not enable the agencies to compare expected performance with actual results in order to track progress during the course of the transition (e.g., identifying the expected number of services that would be moved to EIS during each year of the transition). Identify risks that could affect transition success, including information security risks, and evaluate the importance of these risks relative to the agency’s mission critical systems and continuity of operations plans. All of the selected agencies— Commerce, HHS, NASA, State, and VA—had fully implemented this activity. Specifically, each of the agencies had identified transition risks and evaluated the importance of those risks relative to the agencies’ mission critical priorities. Clearly define transition preparation tasks and develop a time line that takes into account the agency’s mission critical systems, contingency plans, and identified risks. All of the selected agencies partially implemented this activity by developing time lines with clearly defined transition preparation tasks. However, none of these time lines accounted for all key priorities identified in the activity. Specifically, while a 2016 version of Commerce’s transition time line took into account one of the agency’s identified transition risks, Commerce’s more recent transition time lines did not account for its transition risks or for priorities related to its mission critical systems and contingency plans. In addition, NASA’s time lines took into account its transition risks, but did not account for priorities related to its mission critical systems and contingency plans. State’s and VA’s transition time lines did not account for any of these priorities. Further, while HHS had developed time lines with clearly defined transition preparation tasks for certain components of the agency, it did not develop time lines that defined such tasks for all of its components. The time lines that HHS had developed also did not account for priorities related to all of HHS’s mission critical systems, contingency plans, and identified risks. Agency officials identified several reasons for not yet fully implementing the activities associated with developing a transition plan. For example, HHS officials attributed their lack of transition measures of success that could be used to assess transition progress to the agency’s previous decentralized transition management approach. The HHS officials stated that, as part of their new centralized management approach, they planned to develop such measures by the time the agency issues its EIS task order. However, the officials did not have documented plans for developing these measures. In addition, VA officials stated that they had not identified agency-specific transition measures of success that could be used to assess transition progress because these measures will be dependent on the EIS vendors that the agency selects. The officials stated that they expected to define these measures after they issue their EIS task orders. However, as of November 2019, the officials did not have documented plans for finalizing these measures. Moreover, officials from all of the selected agencies generally said that they had not yet developed complete transition time lines because they were focused on activities associated with the acquisition planning phase of the transition, including developing their EIS solicitations. Officials from all of the agencies said that they planned to develop complete transition time lines after they issue their EIS task orders. While agencies’ lack of issued EIS task orders contributed to delays in developing complete transition plans, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information that is available. In addition, agencies that do not identify transition objectives and measures of success that can be used to assess transition progress may find it difficult to provide those involved in their transitions with clear expectations. Without measurable metrics, managers will also lack information that could be used to track progress toward transition objectives and inform management decisions. Further, agencies that do not assess risks relative to their mission critical systems and do not incorporate agency priorities related to those systems and contingency plans into transition time lines, may encounter problems and delays during the transition because they are not adequately prepared to mitigate such risks. Although the 19 selected agencies reported that they plan to fully transition to EIS before the current telecommunications contracts expire in May 2023, over half of the agencies do not plan to complete the transition by GSA’s September 30, 2022, milestone to do so. By waiting until close to the end of the current contracts to finish the transition, these agencies are at risk of experiencing disruptions in service if any issues arise that result in transition delays, such as inadequate human capital resources or the need to transition previously unidentified services. Moreover, given agencies’ poor performance during the last two transitions—which resulted in significant delays and cost increases—and their lack of meeting GSA’s two critical EIS transition milestones for 2019, agencies are again at high risk of experiencing delays during this transition. Further, agencies will miss out on potential cost savings by delaying their transitions to the new contracts, which generally have lower rates for services. The five agencies we reviewed had taken steps to prepare for the transition of their telecommunications services to EIS contracts. However, these agencies’ lack of full implementation of established planning practices increases the risk that they will experience adverse effects— such as schedule delays or cost increases—while transitioning to the new contracts. Several agencies stated that they intend to implement the planning practices after they have issued their EIS task orders. However, limited time remains to complete the transition before the current telecommunications contracts expire. Further, inadequate project planning was a key factor that contributed to delays during the prior transition to Networx. Accordingly, it is critical for agencies to apply a rigorous management approach from the start of the current transition using the information that is currently available, even though changes may be necessary as conditions evolve. Agencies that do not fully adopt the comprehensive approach captured in these planning practices may not make the most of the opportunity for change, and the potential to save costs, that such a major telecommunications transition provides. We are making a total of 25 recommendations to five agencies, which includes five each to Commerce, HHS, NASA, State, and VA. The Secretary of Commerce should ensure that the agency’s Chief Information Officer updates the telecommunications inventory to include all telecommunications assets and services in use at the agency, and updates Commerce’s process for ongoing maintenance of the inventory to include the complete inventory. (Recommendation 1) The Secretary of Commerce should ensure that the agency’s Chief Information Officer completes efforts to identify future telecommunications needs using a complete inventory of existing telecommunications services; conducts and documents a comprehensive strategic analysis at all bureaus to identify areas for optimization and sharing of telecommunications resources; evaluates the costs and benefits of implementing new telecommunications technology and alternative options at all bureaus; and fully aligns Commerce’s telecommunications needs with its long-term IT plans and enterprise architecture. (Recommendation 2) The Secretary of Commerce should ensure that the agency’s Chief Information Officer finalizes the responsibilities related to the information security management role during the telecommunications transition, and assigns the roles for providing legal expertise during the transition, as well as for managing human capital, telecommunications assets, and information security during the transition, to staff members; describes how changes and disruptions related to the transition will be communicated to end users at all bureaus and identifies the key local and regional agency transition officials responsible for disseminating information about the transition to employees and working with the vendor to facilitate transition activities in Commerce’s transition communications plan; and establishes and implements configuration and change management processes for its transition. (Recommendation 3) The Secretary of Commerce should ensure that the agency’s Chief Information Officer identifies all of the funding needed to support the telecommunications transition; justifies requests for resources related to transition program management staff; conducts an analysis to identify staff resources needed for the entire transition effort; and analyzes training needs for staff assisting with the transition. (Recommendation 4) The Secretary of Commerce should ensure that the agency’s Chief Information Officer takes into account the agency’s telecommunications transition risks, mission critical systems, and contingency plans in Commerce’s transition time line. (Recommendation 5) The Secretary of Health and Human Services should ensure that the agency’s Chief Information Officer develops a policy that requires the agency’s components to maintain an inventory of the telecommunications assets and services that they acquire independently from headquarters; updates the telecommunications inventory to include all telecommunications assets and services in use at HHS, and updates the agency’s process for ongoing maintenance of the inventory to include the complete inventory. (Recommendation 6) The Secretary of Health and Human Services should ensure that the agency’s Chief Information Officer completes efforts to identify future telecommunications needs using a complete inventory of existing telecommunications services; and aligns HHS’s telecommunications needs with its long-term IT plans. (Recommendation 7) The Secretary of Health and Human Services should ensure that the agency’s Chief Information Officer identifies and documents telecommunications transition roles and responsibilities related to (1) managing assets and human capital during the planning and execution phases of the transition and (2) providing legal expertise during the execution phase of the transition, and assigns the transition information security management role to a staff member; and establishes and implements configuration and change management processes for HHS’s transition. (Recommendation 8) The Secretary of Health and Human Services should ensure that the agency’s Chief Information Officer identifies all of the funding needed to support the telecommunications transition at each of the agency’s components, justifies requests for transition resources related to hardware and software upgrades, conducts an analysis to identify staff resources needed for the entire transition effort, and analyzes training needs for staff assisting with the transition. (Recommendation 9) The Secretary of Health and Human Services should ensure that the agency’s Chief Information Officer completes efforts to identify telecommunications transition measures of success that can be used to assess transition progress; and takes into account all of the agency’s components, as well as its mission critical systems, contingency plans, and telecommunications transition risks, in HHS’s transition time line. (Recommendation 10) The Secretary of State should ensure that the agency’s Chief Information Officer updates the telecommunications inventory to include all telecommunications assets and services in use at the agency, and updates State’s process for ongoing maintenance of the inventory to include the complete inventory. (Recommendation 11) The Secretary of State should ensure that the agency’s Chief Information Officer completes efforts to identify the agency’s future telecommunications needs using a complete inventory of existing telecommunications services; conducts and documents a strategic analysis to justify the sharing of telecommunications resources; and aligns State’s telecommunications needs with its long-term IT plans and enterprise architecture. (Recommendation 12) The Secretary of State should ensure that the agency’s Chief Information Officer identifies telecommunications transition roles and responsibilities related to (1) managing assets during the planning and execution phases of the transition and (2) providing legal expertise during the execution phase of the transition, and finalizes the responsibilities related to the information security management role for the transition; includes in State’s transition communications plan the frequency with which transition status updates and meetings will occur throughout the transition, a description of how changes and disruptions related to the transition will be communicated to end-users, and the key local and regional agency transition officials responsible for disseminating information about the transition to employees and working with the vendor to facilitate transition activities; and establishes configuration management processes for the agency’s transition. (Recommendation 13) The Secretary of State should ensure that the agency’s Chief Information Officer identifies all of the funding needed to support the telecommunications transition, justifies requests for resources related to transition program management staff, conducts an analysis to identify staff resources needed for the entire transition effort, and finalizes its analysis of training needs for staff assisting with the transition. (Recommendation 14) The Secretary of State should ensure that the agency’s Chief Information Officer takes into account the agency’s telecommunications transition risks, mission critical systems, and contingency plans in State’s transition time line. (Recommendation 15) The Secretary of Veterans Affairs should ensure that the agency’s Chief Information Officer updates the telecommunications inventory to include all telecommunications assets and services in use at the agency, and updates and finalizes VA’s process for ongoing maintenance of the inventory to include the complete inventory. (Recommendation 16) The Secretary of Veterans Affairs should ensure that the agency’s Chief Information Officer completes efforts to identify future telecommunications needs using a complete inventory of existing telecommunications services, and determines and documents that VA’s telecommunications needs are aligned with its long-term IT plans. (Recommendation 17) The Secretary of Veterans Affairs should ensure that the agency’s Chief Information Officer includes in its telecommunications transition communications plan the key local and regional agency officials responsible for disseminating information about the transition to employees and working with the vendor to facilitate transition activities; and establishes and uses cost and schedule management processes in the agency’s transition. (Recommendation 18) The Secretary of Veterans Affairs should ensure that the agency’s Chief Information Officer identifies and documents all of the funding needed to support the telecommunications transition, including costs for all years of transition planning support; justifies requests for transition resources related to program management staff; conducts an analysis to identify staff resources needed for the entire transition effort; and analyzes training needs for staff assisting with the transition. (Recommendation 19) The Secretary of Veterans Affairs should ensure that the agency’s Chief Information Officer completes efforts to identify telecommunications transition measures of success that can be used to assess transition progress; and takes into account the agency’s telecommunications transition risks, mission critical systems, and contingency plans in VA’s transition time line. (Recommendation 20) The Administrator of the National Aeronautics and Space Administration should ensure that the agency’s Chief Information Officer updates the telecommunications inventory to include all telecommunications assets and services in use at the agency, and updates NASA’s process for ongoing maintenance of the inventory to include the complete inventory. (Recommendation 21) The Administrator of the National Aeronautics and Space Administration should ensure that the agency’s Chief Information Officer completes efforts to identify the agency’s future telecommunications needs using a complete inventory of existing telecommunications services. (Recommendation 22) The Administrator of the National Aeronautics and Space Administration should ensure that the agency’s Chief Information Officer identifies telecommunications transition roles and responsibilities related to (1) managing human capital during the planning and execution phases of the transition and (2) providing legal expertise during the execution phase of the transition. (Recommendation 23) The Administrator of the National Aeronautics and Space Administration should ensure that the agency’s Chief Information Officer conducts an analysis to support the anticipated cost savings identified as part of the agency’s justification for its resource requests related to hardware and software upgrades for the telecommunications transition, and justifies its resource requests for transition program management staff; conducts an analysis to identify staff resources needed for the entire transition effort; and analyzes training needs for staff assisting with the transition. (Recommendation 24) The Administrator of the National Aeronautics and Space Administration should ensure that the agency’s Chief Information Officer takes into account the agency’s mission critical systems and contingency plans in NASA’s telecommunications transition time line. (Recommendation 25) We provided a draft of this report to the 19 selected agencies for their review and comment. In response, all five agencies to which we made recommendations (Commerce, HHS, State, VA, and NASA) stated that they concurred with the recommendations. In addition, of the 14 agencies to which we did not make recommendations, one (the Department of the Treasury) provided comments on the report, and one (the Small Business Administration) provided a technical comment via email, which we incorporated into the report, as appropriate. The remaining 12 agencies did not have any comments on the report. The following five agencies concurred with our recommendations: In written comments (reprinted in appendix II), Commerce concurred with our five recommendations to the agency and stated that it will take steps to implement them. In written comments (reprinted in appendix III), HHS concurred with our five recommendations to the agency and described actions it has taken or plans to take to address them. For example, with regard to our recommendation that HHS identify and document key telecommunications transition roles and responsibilities, among other things, the agency stated that it had (1) established an integrated program team to coordinate all telecommunications transition activities, in conjunction with its EIS program management office; (2) assigned two legal counsel staff to support the EIS transition during its current procurement phase, as well as for the transition; and (3) included the agency’s Office of Information Security in reviewing and providing input into its EIS solicitation. The agency also stated that it intends to engage the Office of Information Security throughout the lifecycle of the EIS transition, among other things. HHS also provided general comments in response to the findings in the report. Specifically, the agency described actions that it had taken to improve its management of the EIS transition. For example, the agency stated that the Assistant Secretary for Administration decided to centralize HHS’s EIS transition efforts in March 2019, after it had conducted a study of risks and costs associated with the decentralized transition approach that the agency had been taking since 2017. HHS further stated that it had identified the issues that we brought up during our review and had proactively worked since March 2019 to establish processes and procedures to manage its transition in a comprehensive manner. In particular, the agency stated that it established a fully funded, centralized EIS program management office to support all of HHS’s operating divisions during the transition. Establishing and effectively implementing such management processes will be critical to the agency’s successful transition to EIS. In written comments (reprinted in appendix IV), State concurred with our five recommendations to the agency. In written comments (reprinted in appendix V), VA stated that it agreed with our conclusions and concurred with our five recommendations to the agency. VA also stated that it would provide the actions it plans to take to address the recommendations in its 180- day update to the final report. In written comments (reprinted in appendix VI), NASA concurred with our five recommendations to the agency. It also described actions it has taken or plans to take to address each recommendation. For example, the agency described actions it has taken to address our recommendation calling for NASA to update its telecommunications inventory to include all telecommunications assets and services in use at the agency, among other things. Specifically, the agency stated that the NASA communications contractor, under NASA management oversight, maintains an inventory of telecommunications assets and services. The agency added, nevertheless, that unique mission assets are not included in the inventory, are managed by programs and projects, and are available to the NASA Office of the Chief Information Officer. We agree that NASA has established an inventory of certain telecommunications assets and services in use at the agency. However, as discussed earlier in this report, this inventory includes only the enterprise-wide assets and services in use at the agency; it does not include all of the assets and services that individual mission offices ordered for their own use. During our review, we asked NASA’s Office of the Chief Information Officer to provide an inventory of the assets and services ordered by the agency’s individual mission offices and NASA did not provide such an inventory. We maintain that NASA should have a complete inventory of all of its telecommunications assets and services in order to ensure that it is able to transition all services to EIS, as appropriate, before the current GSA telecommunications contracts expire. A complete inventory is also needed for the agency to be able to strategically plan for the transition, including fully identifying the agency’s future telecommunications needs and opportunities to optimize or share services by consolidating them on EIS. In addition, NASA described actions it has taken to address our recommendation calling for the agency to complete efforts to identify its future telecommunications needs using a complete inventory of existing telecommunications services. Specifically, the agency stated, among other things, that it (1) maintains an inventory of telecommunications services that are within the scope of the EIS program, and (2) continually identifies and plans for future NASA telecommunications needs using this inventory. However, as discussed earlier, NASA’s inventory of telecommunications assets and services is not complete because it does not include the assets and services ordered by the agency’s individual mission offices. Identifying NASA’s future telecommunications needs using a complete inventory of telecommunications services, as we recommended, would help to ensure that the agency fully identifies these needs. It would also reduce the likelihood that the agency may miss opportunities to optimize or share services by consolidating them on EIS. In written comments (reprinted in appendix VII), the Department of the Treasury offered additional information intended to clarify our findings regarding the agency’s compliance with GSA’s milestones to (1) release all EIS fair opportunity solicitations by March 31, 2019; (2) issue all EIS task orders by September 30, 2019; and (3) fully transition to EIS by September 30, 2022. In this regard, the agency stated that it had released four of its six EIS fair opportunity solicitations—which the agency said represented the majority of its telecommunications requirements—prior to GSA’s March 31, 2019, milestone; and had released its two other solicitations in July 2019. issued one of its six EIS task orders in September 2019, prior to GSA’s September 30, 2019, milestone and planned to issue its five remaining EIS task orders in March and April 2020. expected to transition all of its telecommunications services associated with its largest EIS solicitation by GSA’s milestone date of September 30, 2022. The agency stated that this solicitation is to provide enterprise managed services (e.g., voice and data services) for all Treasury bureaus except the Office of the Comptroller of the Currency. The agency also stated that it believes it will meet its transition goals for its other five solicitations. While the Department of the Treasury did not specify in its written comments a date for completing the transition of services associated with these other five solicitations, agency officials stated during our review that they planned to complete the transition to EIS in March 2023. The additional clarifications provided by the Department of the Treasury did not change our findings that the agency did not (1) meet GSA’s March 31, 2019, milestone to release all EIS fair opportunity solicitations; (2) meet GSA’s September 30, 2019, milestone to issue all EIS task orders; and (3) plan to fully transition to EIS by GSA’s September 30, 2022, milestone. Finally, 12 agencies responded that they did not have any comments on the report. Ten of these agencies responded via email: the Departments of Agriculture, Defense, Education, Energy, Homeland Security, the Interior, Justice, Labor, and Transportation; and the General Services Administration. Two agencies (the Department of Housing and Urban Development and the Social Security Administration) provided written responses, which are reprinted in appendices VIII and IX, respectively. We are sending copies of this report to the appropriate congressional committees, the Administrator of the General Services Administration, Administrator of the National Aeronautics and Space Administration, Secretary of Commerce, Secretary of Health and Human Services, Secretary of State, Secretary of Veterans Affairs, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Carol Harris at (202) 512-4456 or HarrisCC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix X. their plans for the transition to EIS, including the total number of fair opportunity solicitations and task orders planned; their planned schedules for transitioning to EIS contracts; and key factors that contributed to delays, if any, in meeting two critical transition milestones that GSA established for 2019—to (1) finish releasing all EIS fair opportunity solicitations by March 31, 2019, and (2) finish issuing all EIS task orders by September 30, 2019. After receiving the agencies’ survey responses, we electronically extracted the survey data and examined the results to identify missing data, inconsistencies, and other indications of error. We then addressed such issues, as necessary, including through follow-up communications with the selected agencies. In addition, due to the open-ended responses related to the key factors for delays, we conducted a content analysis of the responses we received in order to identify categories for the reported factors. We also interviewed relevant agency officials for further information regarding their agencies’ plans for transitioning to EIS. Further, for the seven agencies that reported in their survey responses that they planned to meet GSA’s milestone to finish issuing all EIS task orders by September 30, 2019, we asked those agencies in October 2019 to identify whether they actually met that milestone. One of the seven agencies reported that it met the milestone. For the six other agencies that did not meet the milestone, we asked them to identify the key factors that contributed to their delays in issuing the task orders. In November 2019, we also asked all of the 19 selected agencies to provide updated responses regarding their planned dates for fully transitioning to EIS contracts. To address the second objective, we selected for review a nongeneralizable subset of five agencies included in the first objective and assessed those agencies against activities associated with established transition planning practices. To select these five agencies from the 19 agencies included in our first objective, we first excluded the four Chief Financial Officers Act agencies that were included in our most recent prior review of agencies’ telecommunications transition planning efforts. We then used the telecommunications billing data provided by GSA to categorize the 15 remaining agencies based on the total charges billed to the agencies for fiscal year 2018. Specifically, in order to ensure that we would select agencies with different levels of telecommunications spending, we used the following three cost ranges to categorize the agencies as large, medium, or small: large – $100 million or more, medium – $25 million to less than $100 million, and small – less than $25 million. We also identified whether each agency had a centralized or decentralized structure related to its Chief Information Officer office. Further, we identified the number of fair opportunity EIS solicitations that each agency had released, as of October 31, 2018, and the total number of solicitations each agency planned to release, as reported on GSA’s website for tracking agencies’ EIS transition progress. Based on the above considerations, we selected five agencies that exhibited a variety of sizes and structures, and a range of planned and released fair opportunity EIS solicitations. The selected agencies were Commerce, HHS, NASA, State, and VA. Because we did not review a statistically representative sample of federal agencies, we could not conclude that our results represent the entire federal government’s level of preparation. However, the five cases we studied illustrate the levels of planning that these agencies had put into their transitions to EIS. We then obtained and reviewed relevant transition planning documentation from the agencies and assessed it against the following five telecommunications transition planning practices identified in our prior work: 1. develop an accurate inventory of telecommunications assets and services, 2. perform a strategic analysis of telecommunications requirements, 3. develop a structured transition management approach, 4. identify the resources needed for the transition, and 5. develop a transition plan. Specifically, for each of the agencies, we obtained and analyzed documentation, such as EIS transition plans; telecommunications inventories; telecommunications inventory maintenance documentation; EIS fair opportunity solicitations; documentation of strategic analyses completed while the agencies reviewed their telecommunications requirements (e.g., cost-benefit analyses of new technology and alternative options); program management documentation applicable to the transition, including program management plans, communications plans, cost estimates, integrated master schedules, risk logs, and oversight board briefing slides and meeting minutes; agency staffing plans for the EIS transition; and training completion documentation specific to the EIS transition. We also interviewed agency officials—including those that were responsible for managing their agencies’ transitions to EIS—regarding their agencies’ implementation of the established transition planning practices. Regarding our assessments of the agencies’ implementation of each of the activities associated with the five transition planning practices, we assessed an activity as “fully implemented” if agency officials provided evidence that they had implemented all of the aspects of the practice activity, or the agency had approved plans and related policies to fully implement the practice activity at a later time during the transition. We assessed an activity as “partially implemented” if agency officials provided evidence that they had implemented some, but not all, aspects of the practice activity. To assess the reliability of the fiscal year 2018 telecommunications billing data that we used to select the agencies for review, we reviewed the GSA-provided data to identify outliers, missing data, and other potential errors (e.g., components that were not associated with the correct agency). We also interviewed knowledgeable GSA officials about the reliability of the billing data provided. In addition, to assess the reliability of the agency-reported information we used to support the findings in this report, we reviewed relevant program documentation to substantiate evidence obtained through interviews with agency officials. For computer-processed data, such as the telecommunications inventories, we reviewed the data to identify outliers, missing data, and other potential errors; interviewed agency officials regarding the completeness and accuracy of the data; and reviewed related documentation, where available. For example, regarding the telecommunications inventories, we assessed agency documentation of the quality control procedures and practices related to ensuring the accuracy of the inventories. We also interviewed knowledgeable agency officials about the systems and processes in place to collect and verify the inventory data. Further, to determine if the agencies had established complete telecommunications inventories, we searched the data on USASpending.gov to identify the contractors that received telecommunications-related contracts from the selected agencies in fiscal years 2018 and 2019. We then compared the resulting list of contractors to those identified in the agencies’ inventories and, when the list of contractors identified did not match, we interviewed agency officials about the completeness of their inventories. We determined that the data used to select the agencies for review and to support the findings in this report were sufficiently reliable for the purposes of our reporting objectives, with the exception of agencies’ telecommunications inventories. Specifically, we determined that the inventory information provided by all five of the agencies was not reliable, due to the lack of documented procedures to ensure the completeness and accuracy of the data. This conclusion was considered during our assessment of the agencies’ efforts to implement the planning practice to develop an accurate inventory of telecommunications assets and services. We discuss limitations of these data in the report. We have also made appropriate attribution indicating the sources of the data. We conducted this performance audit from November 2018 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, the following staff made key contributions to this report: James R. Sweetman, Jr. (Assistant Director), Emily Kuhn (Analyst-in-Charge), James Brefo, Chris Businsky, Rebecca Eyler, Javier Irizarry, Amber McCants, and Andrew Stavisky.", "summary": "GSA is responsible for contracts that provide telecommunications services for federal agencies. In preparation for the expiration of current telecommunications programs, including one called Networx, GSA has developed a successor program, known as EIS. GSA and agencies now must carry out the task of successfully transitioning to EIS contracts. Previous contract transitions experienced significant delays. Those delays during the transition to Networx resulted in hundreds of millions of dollars in missed savings. GAO was asked to review agencies' EIS transition preparations. This report discusses (1) selected agencies' plans for, and status in, transitioning to EIS; and (2) the extent to which selected agencies were implementing established transition planning practices. GAO administered a survey to 19 selected agencies that spent at least $10 million on telecommunications in fiscal year 2018 regarding their plans for and status in transitioning to EIS. GAO also selected five of these agencies for further review—Commerce, HHS, NASA, State, and VA—based on, among other things, agency size and structure. For these agencies, GAO evaluated documentation to determine the extent to which they had implemented five planning practices identified in a previous GAO report. As of October 2019, the 19 selected agencies were in different stages of transitioning from their soon-to-be-expiring telecommunications contracts to the new Enterprise Infrastructure Solutions (EIS) program. All of these agencies reported that they plan to fully transition to EIS before current contracts expire in May 2023. However, 11 agencies did not plan to fully transition by the General Services Administration's (GSA) September 30, 2022, milestone. The majority of the selected agencies also did not meet GSA's milestones for completing critical contracting actions in 2019 (see table). While transitioning to EIS is a complex undertaking, delaying this transition will cause agencies to miss potential cost savings that would result from the generally lower rates for services on EIS. Five selected agencies—the Departments of Commerce (Commerce), Health and Human Services (HHS), State (State), and Veterans Affairs (VA); and the National Aeronautics and Space Administration (NASA)—had partially implemented established planning practices that can help agencies successfully transition their telecommunications services to new contracts. These practices are to: (1) develop an accurate inventory of telecommunications services, (2) perform a strategic analysis of telecommunications requirements, (3) develop a structured transition management approach, (4) identify the resources needed for the transition, and (5) develop a transition plan. The agencies provided several reasons for partially implementing the practices. For example, transition officials at Commerce, NASA, and VA said that they were not responsible for tracking all of the telecommunications services in use at their agencies; as such, they were unable to provide complete telecommunications inventories. The agencies also planned to implement certain practices after they issue their EIS task orders. However, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information available and fully implement these transition planning practices to reduce the risk that the agencies experience the types of delays that occurred in previous transitions. GAO is making a total of 25 recommendations to Commerce, HHS, NASA, State, and VA, to fully implement the established transition planning practices. These agencies concurred with all of the recommendations.", "document_type": "gao"}
{"report": "State reviews and approves FMS purchases, while DOD is responsible for program implementation. DSCA administers the FMS program for DOD, including exercising financial management responsibilities for the FMS trust fund, and DFAS provides DSCA’s accounting services for FMS. Additionally, various other DOD components have responsibilities related to collecting and expending transportation funds, as shown in figure 1. Several DOD publications provide regulations and guidance for the FMS program, including: DOD Financial Management Regulation (FMR). Managed by the Under Secretary of Defense (Comptroller), the FMR defines financial management requirements for all DOD components, and states that DSCA administers the FMS program and is responsible for monitoring the use of the FMS trust fund. The FMR also states that DOD components should maintain documentation that constitutes a complete audit trail. Defense Transportation Regulation. Managed by the U.S. Transportation Command (TRANSCOM), the Defense Transportation Regulation defines requirements for the transportation of items within the Defense Transportation System, such as the use of unique identifiers for all shipments and how to use and pay commercial carriers, when applicable. Security Assistance Management Manual (SAMM). Managed by DSCA, SAMM provides guidance to the DOD components that manage or implement the FMS program. Foreign partners that purchase items and services through the FMS program may use their own funds or, if provided, U.S. funds, such as grants or loans provided through Foreign Military Financing. In addition, some FMS purchases are made using funds appropriated to DOD, State, or other U.S. government agencies for Building Partner Capacity (BPC) programs. These programs purchase items or services for foreign partners through FMS. The FMS process begins when an eligible entity requests information on defense articles or services for purchase. The responsible DOD component then prepares a Letter of Offer and Acceptance (LOA), which is the legal instrument used by the U.S. government to sell defense articles to a foreign country or international organization under authorities provided in the Arms Export Control Act. The LOA itemizes the defense articles or services offered and, when implemented, becomes an official tender by the U.S. government. Signed LOAs are referred to as “FMS cases,” and the individual items or services included for purchase in the FMS case are referred to as “case lines.” Once the LOA is signed, the DOD component responsible for the FMS case then manages the contracting or requisition of the equipment or services specified in the agreement, which are then delivered to the foreign partner. Foreign partners have different options available to them for transporting items they purchase through FMS. Other than when purchasing certain hazardous or sensitive items that must be transported via the Defense Transportation System, foreign partners have the option to arrange for their own transportation of FMS items they purchase—such as using a freight forwarder—for all or part of the transportation needed to reach the final destination. On the other hand, BPC programs use the Defense Transportation System to move all their FMS purchases. When all items have been delivered, all ordered services have been performed, and no new orders exist or are forthcoming, the DOD component responsible for managing the FMS case may mark it as closed. DOD most commonly calculates the FMS transportation fee using a percentage rate applied to the price of the item. The percentage rate varies depending on the extent of the U.S. government’s responsibility for transporting the items purchased, as agreed to between DOD and the foreign partner in the LOA. DOD first determines the estimated transportation fees for shipping FMS purchases based on the terms agreed upon in the LOA. When an item is shipped, the transportation fee is collected from the FMS purchaser’s account into the FMS transportation accounts. Eight transportation accounts within the FMS trust fund are used to hold transportation fees collected from FMS purchasers’ accounts, and to pay FMS transportation bills. Seven separate accounts hold transportation funds for certain larger BPC programs. These seven BPC accounts allow BPC program transportation fee collections and expenditures to be tracked. In addition, one main account holds transportation funds for all foreign partner purchasers and smaller BPC programs. Individual shipments trigger collections into and expenditures from the FMS transportation accounts. As shown in figure 2, after DOD ships an item and DFAS is notified of that shipment—through a process known as delivery reporting—DFAS moves the amount of the related transportation fee from the FMS country or BPC program account into the main transportation account or corresponding BPC program transportation account and records the amount as a collection. DFAS receives monthly bills that include the costs for FMS transportation, which DFAS pays out of the main transportation account, recording the amount paid as an expenditure. Subsequently, DFAS reviews the transportation bills and associated expenditure transaction data to identify any expenditures associated with the seven BPC programs with dedicated transportation accounts. For any BPC transactions identified, DFAS reimburses the main transportation account for the cost of the expenditure by moving funds from the relevant BPC transportation account into the main transportation account through a process DOD refers to as realignment. DOD and DSCA guidance to DOD components identifies controls over the information used to calculate the fees collected into the FMS transportation accounts. For example, DOD has various codes that identify the percentage rate used to calculate the transportation fee charged to FMS purchasers. DSCA provides guidance to components on how to use those codes, and components are responsible for managing the use of those codes. Both DSCA’s guidance and the FMR require that components maintain documentation, such as documentation of significant events related to delivery transactions and authorized exceptions to normal billing procedures. Additionally, both the FMR and DSCA’s guidance to components identifies that components are responsible for submitting delivery reporting within 30 days of completion, which triggers collection of the transportation fee. DSCA’s guidance to components requires components to perform various case reviews and reconciliations, including annual case reviews to verify the accuracy of information, such as the accuracy of the codes applied to case lines, as well as the timeliness of delivery reporting. DSCA’s guidance to DOD components requires components to review FMS cases at least annually to verify the accuracy of data—including the accuracy of the transportation fee collected and the timeliness of delivery reporting—but DSCA does not have a routine process to oversee those reviews. DSCA’s guidance to components also states that DSCA may request copies of components’ annual case reviews for oversight purposes, and DSCA officials told us that they request copies on an ad hoc basis. Although DSCA has oversight responsibility over collections into the FMS transportation accounts, DSCA officials said they do not have a standard process for selecting and examining components’ annual case reviews, and do not document their reviews. Federal internal control standards state that management should establish and implement activities to monitor internal control systems and evaluate results, and ensure that activities are performed routinely and consistently. Management may use ongoing monitoring, separate evaluations, or a combination of the two to obtain reasonable assurance of the operating effectiveness of the controls in place. Without routine oversight of components’ annual case reviews—which could include a process to select annual case reviews for examination, and guidance on how to perform and document examinations—DSCA increases the risk that components may not complete such reviews consistent with DSCA’s guidance, thereby increasing the likelihood that fees collected may be inaccurate. Additionally, according to DOD, the FMS program is intended to operate on a “no profit, no loss” basis, and inaccuracies in the collection of the FMS transportation fee could lead to over- or under- collecting fees from an FMS purchaser. DSCA officials told us that they have begun to work on an initiative to analyze a sample of annual case reviews on a routine basis. According to DSCA officials, the process will include reviewing and documenting cases based on certain events and is expected to be implemented in April 2020. The successful implementation of this initiative may help DSCA ensure that components’ annual case reviews comply with DSCA guidance. However, until DSCA fully implements this initiative, the risk remains that components may not complete annual case reviews consistent with DSCA’s guidance. DSCA does not have a process to monitor the timeliness of DOD components’ delivery reporting of shipments of items, which triggers collections into the FMS transportation accounts. According to DOD regulations, components are required to submit delivery reporting in their systems within 30 days of shipment. Although DSCA has financial responsibility over collections into the FMS transportation accounts, DSCA officials told us that they do not monitor components’ compliance with this regulation. Federal internal control standards state that management should design internal control activities to achieve control objectives and respond to risks, ensure the accurate and timely recording of transactions, and evaluate and document the results of ongoing monitoring activities. Further, the FMR incorporates the federal accounting standards into DOD accounting and financial reporting policy. The federal accounting standards state that revenue transactions—such as the FMS transportation fee—should be recorded when services are provided. DSCA officials told us that they rely on DFAS to monitor components’ delivery reporting. During the course of our review, DFAS officials told us that they began providing a report to DSCA and other components that detailed information on each components’ delivery reporting, which was based on a prior FMR requirement. Both DSCA and DFAS officials told us that they are working on an agreement that would formalize DFAS’s reporting, but have not finalized this agreement as of February 2020. However, DFAS officials told us that they have not followed up with components to verify the accuracy of the delivery reporting, and are not required to do so. While DSCA officials told us that DFAS’s reporting may help provide transparency, without a process to oversee that reporting, DSCA’s lack of monitoring of components’ delivery reporting raises the risk that such reporting may not be timely. As timeliness is an element of accuracy, untimely component delivery reporting may result in the inaccurate collection of related transportation fees into the FMS transportation accounts. A documented process to review reporting and monitor the timeliness of components’ delivery reporting—which could include DSCA’s review of DFAS’s reporting to identify and follow up on discrepancies—could help reduce the risk that transportation fees may not be collected into the FMS transportation accounts in a timely manner. Further, such oversight could assist components during other required reviews, such as annual case reviews. DSCA has limited financial oversight of expenditures from the FMS transportation accounts. While DSCA established internal guidance related to monthly reviews of expenditures from the accounts, that guidance lacks procedures to review expenditures and is not fully documented. In addition, DSCA has not provided guidance to DFAS on preparing the reports DSCA uses for its monthly review. Also, DFAS’s internal guidance on reviewing and realigning expenditures is inconsistent and lacks key controls and details, such as procedures to provide reasonable assurance that all transportation expenditures are reviewed. As a result, DSCA’s financial oversight of the FMS transportation accounts is insufficient to provide reasonable assurance that expenditures paid from the FMS transportation accounts are allowable and paid from the correct account, which limits DSCA’s ability to help ensure that relevant BPC program expenditures are paid from the related BPC accounts. During the course of our audits of the FMS program, DSCA officials told us that they began developing new internal guidance to address financial oversight of expenditures from the FMS transportation accounts, and expect it to be implemented by May 2020. However, until DSCA finalizes and implements that guidance, the risk remains that DSCA may use the FMS transportation accounts to pay for unallowable costs, or pay transportation costs from the incorrect account. In fiscal year 2016, DSCA established a Managers’ Internal Control Program to oversee the FMS transportation accounts, according to DSCA officials. This internal guidance identified the risk that DSCA may use the FMS transportation accounts to pay for unallowable costs—such as those not related to FMS transportation and that may be a result of misuse—or that DSCA may pay transportation costs from the incorrect account. To address these risks, the guidance identified procedures for DSCA to review expenditures. As shown in figure 3, the procedures state that DSCA will review expenditures from the FMS transportation accounts on a monthly basis to ensure costs are valid and applied to the proper account, and to identify and correct discrepancies. DSCA officials told us that to perform their monthly review they use reports provided by DFAS, and DFAS officials told us they provide those reports to DSCA on a monthly basis based on internal guidance. These reports include information on the FMS transportation account balances, and, in addition, DFAS provides supporting documentation that includes: copies of bills paid from the accounts and detailed analysis of individual transportation expenditures; an analysis of discrepancies DFAS identified for each transaction; and financial transactions DFAS performed to reimburse the main transportation account for specific BPC transportation expenditures, through a process DOD refers to as realignment. Both DSCA and DFAS officials said they use two pieces of information from the reports and analyses: The transportation account code, which identifies the DOD component responsible for a particular expenditure, and may provide information on the country or program associated with the transportation expenditure. The transportation control number, which is a unique 17-character code that is associated with a shipment and used throughout the Defense Transportation System for shipment tracking and payment processing. For FMS shipments, the transportation control number includes information that identifies the DOD component and foreign partner, and may be used to tie a particular transportation expenditure to an FMS case. The transportation account code and the transportation control number are entered by DOD components directly involved in ordering and processing shipments into their individual systems. Figure 4 provides additional details regarding the composition of the transportation control number. DSCA’s internal guidance does not contain procedures explaining how DSCA staff should review transportation expenditures. Federal internal control standards state that management should design control activities to respond to risks, implement activities that address those controls, and identify the information requirements needed to achieve objectives. DSCA’s monthly review of expenditures from the FMS transportation accounts is meant to provide financial oversight of the accounts, and DSCA’s internal guidance establishes that, as part of its monthly review, DSCA should review expenditures to ensure they are allowable and paid from the correct account, and follow up on any discrepancies. However, DSCA’s internal guidance does not explain how to review expenditures, and DSCA officials told us that they do not have internal guidance identifying the data needed to oversee expenditures or explaining how they should evaluate expenditure data, which could include steps such as identifying and correcting discrepancies including mismatched, missing, or incomplete entries. To assess transportation expenditure data reviewed by DFAS and DSCA, we analyzed a nongeneralizable sample of expenditure data for the FMS transportation accounts provided by DFAS for the period from May through July 2019. Over that 3-month period, DFAS reported about 6,200 transportation expenditures totaling approximately $21.6 million. Our review of those expenditures identified discrepancies or missing data such as transactions with: Mismatched DOD component codes. Approximately 19 percent of expenditures we examined—representing around $4 million—had transportation account codes and transportation control numbers identifying different DOD components. According to DFAS officials, if the transportation account code and transportation control number for an expenditure do not identify the same component, the mismatch may be a discrepancy. For example, a mismatch could indicate that staff at a component entered an incorrect transportation account code, or misapplied a transportation account code, which may result in the payment of a non-FMS expenditure from the FMS transportation account. Missing or misformatted control numbers. Approximately 3 percent of the number of expenditure transactions in our sample— representing around $40,000—either lacked transportation control numbers or included transportation control numbers that did not contain 17 digits. Without a valid transportation control number, DSCA may not be able to determine whether an expenditure is allowable or paid from the correct account. Because DSCA’s internal guidance lacks procedures—including those explaining what expenditure data is needed to perform oversight and how to evaluate that data for and address discrepancies—DSCA cannot provide reasonable assurance that it appropriately reviews expenditures from the FMS transportation accounts. Without guidance that addresses the risk that unallowable costs may be paid from the transportation account, DSCA raises the risk of misuse of funds of the FMS transportation accounts. Additionally, without guidance that identifies and addresses discrepancies—such as missing transportation control numbers—DSCA raises the risk that transportation expenditures may not be paid from the correct account. DSCA officials told us that they were developing new internal guidance and collaborating with DFAS on an initiative to follow up on discrepancies, and expect both to be implemented by May 2020. However, until DSCA finalizes and implements that guidance, the risk remains that DSCA may use the FMS transportation accounts to pay for unallowable costs, or pay transportation costs from the incorrect account. DSCA’s internal guidance does not identify how DSCA officials should document their monthly review of expenditures. Additionally, DSCA officials confirmed that they do not document their monthly review of expenditures. DSCA officials told us that while DSCA staff conducted regular monthly reviews, DSCA has not issued specific internal guidance explaining how staff should conduct and document these reviews. Federal internal control standards state that management should develop documentation of its internal control system, document internal control activities such as by documenting that activities occurred, and ensure that activities are performed routinely and consistently. Without internal guidance that identifies how staff should perform and document monthly reviews as well as a process to ensure reviews are documented, DSCA cannot provide reasonable assurance that staff perform monthly reviews consistently. DSCA officials told us that their planned internal guidance should address how the monthly review process is conducted, and should be implemented by July 2020. However, until DSCA finalizes and implements that guidance, DSCA will not have guidance on documenting its monthly review of expenditures consistent with federal internal control standards. DSCA officials have not provided written guidance to DFAS on preparing the reports and analyses DSCA uses for its monthly review, and, as a result, those reports and analyses may be inconsistent and incomplete. Federal internal control standards state that management should design control activities that respond to risks, document internal controls, communicate required information to external parties, and obtain relevant data from external sources based on information requirements. DFAS officials confirmed that they do not have written guidance from DSCA regarding how to generate the reports for DSCA, such as what analyses to perform on expenditure data. We found that DFAS’s analyses vary and lack key procedures. For example, our review of the expenditure data DSCA received from DFAS for May through July 2019 showed that DFAS performed certain analyses—such as verifying the validity of the transportation control number—on some transactions, but not on others. Additionally, DSCA did not provide DFAS with a complete list of transportation account codes to use to identify transactions for review. As a result, DSCA’s review of expenditures based on DFAS’s reports—both for allowability, as well as to ensure those transactions are paid from the correct account—excludes some transactions. Because DSCA has not provided written guidance to DFAS on how to generate the reports needed for its monthly review process—including what analysis to perform on expenditure data—or provided DFAS with the necessary transportation account codes, DSCA cannot provide reasonable assurance that all expenditures from the FMS transportation accounts are allowable and paid from the correct account. Additionally, the lack of consistent identification and review of all transactions by DSCA raises the risk of misuse of funds in the FMS transportation accounts. DSCA officials told us that they are developing guidance in coordination with DFAS, and that it should be implemented by July 2020. However, until DSCA finalizes that guidance to DFAS, DSCA may review inconsistent analyses and may not review all transportation expenditures, and the risk remains that DSCA may use the FMS transportation accounts to pay for unallowable costs, or pay transportation costs from the incorrect account. DFAS established procedures to review FMS transportation expenditures and to realign BPC expenditures to the correct FMS transportation accounts in part based on direction from DSCA. However, these procedures lack key steps to ensure that DFAS reviews all expenditures and identifies discrepancies, as well as to address discrepancies that may limit DFAS’s ability to identify transactions for realignment. Federal internal control standards state that management should design control activities to respond to risks, implement activities that address those controls, and ensure that activities are performed consistently. DFAS maintains a separate set of procedures for each of the three transportation service providers that submit FMS transportation bills. The results of DFAS’s procedures—such as how transportation expenditures were realigned—are included as supporting documentation for the monthly reports provided to DSCA. Our review of DFAS’s realignment procedures determined that the procedures are inconsistent or missing key steps that could help address the risk that expenditures paid from the FMS transportation accounts may be unallowable or paid from the incorrect account. We found that DFAS’s procedures do not ensure that DFAS reviews all transactions, including those that may require realignment. For example, DFAS’s procedures for DOD’s commercial transportation payment system—known as Syncada—do not include a step for reconciling the amount of the payment to the service provider against a list of detailed expenditure transactions, which may provide assurance that the list of transactions is complete. Specifically, for Syncada, DFAS queries the provider’s system using only nine transportation account codes provided by DSCA, which do not include any account codes associated with Navy, and only some associated with Air Force. Conversely, the realignment procedures for the Air Mobility Command and the Surface Deployment and Distribution Command include a step for reconciling the amount of the payment to the service provider against a list of detailed expenditure transactions, which helps to provide assurance that the list of transactions being reviewed is complete. Table 1 shows the results of our review of DFAS’s realignment procedures and analysis. Because DFAS’s procedures do not include steps to identify all Navy and Air Force transportation account codes, DFAS does not have reasonable assurance that all expenditures are reviewed by DFAS for realignment and provided to DSCA with the monthly report, which DSCA subsequently uses to review the validity of expenditures. As a result, any of these transactions that should be paid from a BPC transportation account are instead paid from the main FMS transportation account. As shown in figure 5, our review of Syncada expenditure data for May through July 2019 found that the use of DFAS’s procedures resulted in approximately 15 percent of expenditures not being reviewed. Those transactions represent 11 percent of the dollar value of transportation expenditures for that period, or approximately $392,000. In addition, we found that DFAS’s procedures do not address how to correct or follow up on discrepancies. Specifically, all three sets of realignment procedures state that analyzing the list of detailed transactions may identify transactions with discrepancies in their data, but none of the procedures fully address the types of discrepancies or their implications, such as if the expenditure does not include a transportation control number. Rather, according to DFAS officials, if DFAS identifies such a discrepancy with a specific expenditure, that cost remains as an expenditure from the main transportation account. Because DFAS’s procedures do not include steps to reconcile the amount of payments to all service providers against a list of detailed cost transactions or to identify all transportation expenditure transactions, DFAS may not review all FMS transportation expenditures and may not pay all expenditures from the correct transportation account. Additionally, because the list of transportation account codes provided to DFAS does not include all FMS account codes, neither DFAS nor DSCA review all expenditures from the FMS transportation accounts, which raises the risk of unallowable or unapproved expenditures. As a result, DSCA’s ability to provide reasonable assurance that all transportation expenditures are allowable and paid from the correct account is limited. DSCA officials told us that they are developing guidance in coordination with DFAS to identify and follow up on discrepancies and clarify how DFAS is to perform its analysis, and that the guidance should be implemented by July 2020. However, until DSCA finalizes that guidance to DFAS, DSCA may review inconsistent analyses and may not review all transportation expenditures, and the risk remains that DSCA may use the FMS transportation accounts to pay for unallowable costs, or pay transportation costs from the incorrect account. DSCA has developed financial oversight procedures for overseeing the billions of dollars that are collected into and expended from the FMS transportation accounts, but we found weaknesses in oversight of both collections and expenditures. Regarding collections, gaps in DSCA’s oversight of DOD components’ annual case reviews and delivery reporting increase the risk that transportation fees collected may be inaccurate. Similarly, regarding expenditures, we identified gaps in DSCA’s oversight. Specifically, DSCA has not established procedures for conducting monthly reviews of expenditures and correcting discrepancies, or defined the information it needs from DFAS. Further, DFAS’s procedures to review and realign costs between FMS transportation accounts—which are based on guidance from DSCA—do not ensure that all transactions are included. By improving financial oversight of the FMS transportation accounts, DSCA could better ensure the accuracy of fees collected and help provide reasonable assurance that expenditures are allowable and paid from the correct account. DSCA officials told us that they are developing guidance to address these issues, and plan to implement that guidance in 2020. However, until DSCA finalizes and implements that guidance, the risks remain that DSCA may collect inaccurate transportation fees, use the FMS transportation accounts to pay for unallowable costs, or pay transportation costs from the incorrect account. We are making the following five recommendations to DOD: The Secretary of Defense should ensure that the Director of DSCA implements the planned initiative to routinely examine annual case reviews performed by DOD components to help ensure that fees collected into the FMS transportation accounts are accurate. (Recommendation 1) The Secretary of Defense should ensure that the Director of DSCA works with DFAS and DOD components to establish a written process to monitor the timeliness of components’ delivery reporting to help ensure that fees collected into the FMS transportation accounts are accurate. (Recommendation 2) The Secretary of Defense should ensure that the Director of DSCA finalizes and implements internal guidance on how to conduct and document DSCA’s monthly review of expenditures from the FMS transportation accounts, including what information should be reviewed and how to identify and follow up on discrepancies. (Recommendation 3) The Secretary of Defense should ensure that the Director of DSCA works with DFAS to finalize written guidance to DFAS on how to generate the reports needed for DSCA’s monthly review of expenditures from the FMS transportation accounts, including the type of analysis needed. (Recommendation 4) The Secretary of Defense should ensure that the Director of DSCA works with DFAS and other DOD components to finalize the planned guidance to DFAS for the review and realignment of expenditures from the FMS transportation accounts to ensure reviews are consistent and include all expenditures. (Recommendation 5) We provided a draft of this report to DOD and State for review and comment. DSCA provided written comments on behalf of DOD, which are reprinted in appendix II. DSCA concurred with all of our recommendations, and indicated that it had developed plans to address them and had begun implementing some of those plans. DOD noted that annual case reviews and delivery reporting are not directly related to financial transactions tied to the FMS transportation account. However, both annual case reviews and delivery reporting provide an opportunity for oversight that can help verify the accuracy of data, which affects the accuracy of transportation fees collected from FMS purchasers’ accounts into the FMS transportation accounts. We also received technical comments from DOD, which we incorporated in our report as appropriate. State did not provide any written or technical comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of State, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or BairJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) the Defense Security Cooperation Agency’s (DSCA) oversight of Department of Defense (DOD) components’ activities that affect fees collected into the Foreign Military Sales (FMS) transportation accounts, and (2) DSCA’s financial oversight of expenditures from the FMS transportation accounts. To obtain information on both of our objectives, we reviewed DSCA’s guidance related to the FMS program and FMS transportation, and analyzed fiscal years 2007 to 2018 summary collections and expenditures data for the FMS transportation accounts maintained by the Defense Finance and Accounting Service (DFAS) in the Defense Integrated Financial System. We chose to review data from these fiscal years based on data availability. Under a prior review of the management oversight of FMS transportation fees, we assessed the reliability of these data by reviewing for duplicate entries, gaps, and obvious errors, comparing the data to similar data obtained under prior reviews, and interviewing agency officials to clarify questions about how to interpret the data. On the basis of this assessment, we determined these data to be reliable for the purposes of summarizing the total collections into and expenditures from the FMS transportation accounts during fiscal years 2007 to 2018. To examine DSCA’s oversight of DOD components’ activities that affect fees collected into the FMS transportation accounts, we reviewed DOD’s current guidance related to the FMS transportation fee, as well as other documentation and internal guidance developed by DSCA. We interviewed DSCA and DFAS officials on their implementation of oversight procedures. To determine and assess the controls DSCA should be using to manage and oversee the account, we reviewed DOD’s Financial Management Regulation, DSCA’s Security Assistance Management Manual, other internal DSCA guidance, federal accounting standards, federal internal control standards, and our prior report on DSCA’s management oversight of the FMS transportation account balances. To examine DSCA’s financial oversight of expenditures from the FMS transportation accounts, we reviewed DOD’s current regulations related to financial oversight and transportation, including DOD Financial Management Regulation and DOD Defense Transportation Regulation. Additionally, we reviewed DSCA’s Managers’ Internal Control Program procedures for monthly FMS transportation account reviews, and we interviewed DSCA officials responsible for these reviews. We also reviewed DSCA’s Security Assistance Management Manual, which provides guidance to DOD components related to the FMS program, and DFAS’s internal guidance on reviewing and realigning expenditures from the FMS transportation account. We analyzed a nongeneralizable, 3-month sample of expenditure data for the FMS transportation accounts provided by DFAS for the period from May through July 2019, including transportation service provider bills and detailed transaction-level expenditures. These data included the transportation account codes and transportation control numbers that DSCA and DFAS use to verify that individual expenses are allowable, and to realign transportation expenditures to the correct FMS transportation account. We initially obtained 1 month of transportation expenditure data, but decided to expand our analysis to 3 months of data to account for any variability between months. Additionally, we chose to review data from this period because they were the most current at the time of our request, and therefore the data were compiled using DFAS’s current process. We determined this period to be sufficient for our analysis of the data, which DSCA and DFAS use to provide assurance that expenditures from the FMS transportation accounts are allowable and paid from the correct account. To assess the reliability of these data, we reviewed the data for internal consistency by reviewing for duplicate entries, gaps, and obvious errors; compared them to DOD regulations on transportation account code and transportation control number construction; and interviewed DSCA and DFAS officials about their data collection and verification procedures. We found the data to be sufficiently reliable for our purpose of presenting the total number and dollar amount of transportation expenditures reviewed by DSCA and DFAS for each month, and to identify the number and dollar amount associated with expenditure records where we identified discrepancies. We found instances of blank or incorrectly formatted transportation account codes and transportation control numbers, and instances where the first characters of the transportation account code and transportation control number did not match, which DFAS officials identified as possible discrepancies in the data. As we discuss in the report, these instances raise questions about the reliability of the data for financial oversight, since DSCA and DFAS use this information to ensure that expenditures are allowable and paid from the correct FMS transportation accounts. We did not conduct any independent testing of the data to determine whether the amounts reflected correct payments made toward accurate billings. To review DFAS’s internal guidance for reviewing and realigning expenditures from the FMS transportation account, we reviewed copies of the procedures provided by DFAS for each of the three transportation service providers. We identified major steps in the procedures related to reviewing expenditure data, as well as various internal controls related to analyzing data. We reviewed each of the procedures against one another to determine the extent to which they addressed the same elements, and we compared relevant procedures against standards for internal control related to obtaining, evaluating, and correcting data, to determine whether they were sufficient to provide financial oversight. Additionally, we interviewed DFAS officials responsible for these procedures. In order to determine whether DFAS’s procedures included all expenditures, we requested and obtained information from Army, Navy, and Air Force on the transportation account codes that each component used in fiscal year 2019, and compared them to the account codes provided to DFAS by DSCA and used to query the third-party transportation service provider system for relevant FMS transportation expenses. We identified a list of transportation account codes not queried as part of DFAS’s procedures, and we requested that DFAS query the third-party transportation service provider’s system for the period of May through July 2019 using that list. We requested data from this period to be consistent with the expenditure data DFAS initially provided us for the same period. We reviewed the resulting data and compared it to the previously-provided data in order to determine the relative size of each data set for this period. We did not independently test to determine whether the lists of transportation account codes provided to us were complete, and therefore the data reviewed may not include all relevant transportation expenditures. We conducted this performance audit from May 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Jason Bair, (202) 512-6881 or BairJ@gao.gov In addition to the contact named above, Cheryl Goodman (Assistant Director), Benjamin L. Sponholtz (Analyst-in-Charge), Adam Peterson, and Heather Rasmussen made key contributions to this report. Martin de Alteriis, John Hussey, Christopher Keblitis, Heather Latta, and Grace Lui also contributed to this report.", "summary": "From fiscal years 2007 to 2018, DOD collected about $2.3 billion in fees into the FMS transportation accounts and expended about $1.9 billion from the accounts. Foreign partners can pay DOD a fee to cover the costs of DOD transporting items. Fees are collected into transportation accounts in the FMS Trust Fund, and expenditures for related transportation are paid from those accounts. DSCA is responsible for financial oversight of the accounts, and DFAS—a service provider to DSCA—also has some accounting responsibilities related to the accounts. House Report 114-537 and Senate Report 114-255 included provisions that GAO review DSCA's management of FMS fees. This report examines (1) DSCA's oversight of DOD components' activities that affect fees collected into the FMS transportation accounts, and (2) DSCA's financial oversight of expenditures from the FMS transportation accounts. GAO reviewed DOD guidance, analyzed 3 months of DOD expenditure data, and interviewed DOD officials. The Foreign Military Sales (FMS) program is one of the primary ways the U.S. government supports its foreign partners, by annually selling them billions of dollars of military equipment and services. However, gaps in the Defense Security Cooperation Agency's (DSCA) oversight of Department of Defense (DOD) components' activities increase the risk that fees collected into the FMS transportation accounts may be inaccurate. While DSCA requires components to perform annual reviews of FMS cases to verify the accuracy of transportation fees collected, DSCA does not routinely oversee these reviews. Additionally, DSCA lacks oversight of the timeliness of DOD components' reporting of deliveries, which should occur within 30 days. DSCA officials indicated that they are developing guidance and processes to help address these challenges, but had not completed them as of February 2020. DSCA's financial oversight of expenditures from the FMS transportation accounts does not provide reasonable assurance that expenditures are allowable and paid from the correct account. In fiscal year 2016, DSCA established internal guidance for financial oversight of expenditures from the accounts. While that guidance includes a process to review expenditures on a monthly basis, DSCA has not established procedures for conducting that review, including how to analyze expenditure data, or identify and address discrepancies. As a result, DSCA may not review FMS transportation expenditures consistently or identify and address discrepancies. GAO found that approximately 19 percent of expenditures reported to DSCA over a 3-month period in fiscal year 2019 inconsistently identified the DOD component responsible for the transaction. For example, a transaction may indicate that both Navy and Air Force are responsible for the shipment. Further, DSCA has not documented how the Defense Finance and Accounting Service (DFAS) should generate the reports DSCA uses for its review, and DFAS's review of expenditures excludes some expenditures from two DOD components. Without a routine process to review expenditures and correct discrepancies, DSCA cannot provide reasonable assurance that all expenditures are allowable and paid from the correct account, raising the risk of misuse of funds. DSCA officials told GAO that they are developing guidance to help address these challenges, and expect to implement it in 2020. GAO is making five recommendations to DOD to strengthen financial oversight of the FMS transportation accounts, including two recommendations to strengthen DSCA's oversight of fees collected into the accounts, and three recommendations to strengthen DSCA's and DFAS's oversight of expenditures from the transportation accounts. DOD concurred with all of the recommendations and identified actions it plans to take to address them.", "document_type": "gao"}
{"report": "Federal agencies conduct a variety of activities related to animal research. These activities include: funding intramural research conducted by agency personnel at federal facilities; funding extramural research conducted by universities, industrial firms, and other nonfederal entities through contracts, grants, or cooperative agreements; establishing guidelines for regulating products that may have been tested for safety or efficacy using animals; and overseeing the welfare of animals used for research. Table 1 shows key activities related to animal research or use that HHS, USDA and EPA and their component agencies and offices are involved in through their funding of intramural and extramural research and regulation of products. Some agencies within USDA and HHS have roles in overseeing animal welfare at federal and nonfederal research facilities. Under the Animal Welfare Act and its implementing regulations, USDA’s APHIS oversees federal and nonfederal research facilities to ensure the humane treatment of covered species of warm-blooded animals when they are used in research, teaching, testing, or experimentation. These species include dogs, cats, nonhuman primates, guinea pigs, hamsters, rabbits, horses used for research purposes, and (with certain exceptions) other warm- blooded animals. Requirements under the act related to consideration of alternatives to animal research include the following: Under the act, research facilities are to appoint an animal care and use committee to, at least semiannually, review the facility’s program for humane care and use of covered animals, inspect all facilities, and prepare reports of its evaluation. The committee is responsible for reviewing research proposals to determine whether the proposed activities are in accordance with the act. This includes a review of research proposals to determine whether researchers have (1) considered alternatives to procedures that may cause more than momentary or slight pain or distress to covered animals and (2) have provided a written narrative description of the methods and sources they used to determine that alternatives were not available. The committee can ask a researcher to explain why any alternatives found are not used in the researcher’s proposal or withhold approval of the proposal. Facilities that used or intended to use live covered animals in research are to submit a retrospective annual report about those animals to APHIS on or before December 1 of each calendar year. In particular, the annual reports are to include an assurance that each researcher considered alternatives to painful procedures. HHS’s NIH is responsible for establishing guidelines implementing certain provisions of the Health Research Extension Act of 1985. NIH’s responsibilities under the act include reviewing federal and nonfederal research facilities’ vertebrate animal care and use programs to determine whether they meet relevant standards and are thereby eligible to receive funding from HHS agencies covered by the act, including NIH. NIH implements the animal care provisions of the act through its Public Health Service Policy. The policy’s requirements related to research facilities’ consideration of alternatives include the following: Consistent with the act, NIH’s Public Health Service Policy directs facilities to provide for NIH’s approval a document that describes their vertebrate animal care and use program and that provides assurances that the research institution meets applicable standards. Such assurances must include a synopsis of training or instruction in research or testing methods that minimize the number of vertebrate animals required to obtain valid results and minimize animal distress and that the facility offers to scientists, animal technicians, and other personnel involved in animal care, treatment, or use. As a condition of receiving funding for animal research from HHS agencies, facilities must, for the most part, adhere to the eighth edition of the Guide for the Care and Use of Laboratory Animals (Guide). The Guide states that in preparing and reviewing research protocols, researchers and animal care and use committees should consider the availability or appropriateness of using less invasive procedures, other species, isolated organ preparation, cell or tissue culture, or computer simulation. The Guide does not limit this to research that is painful or distressful. NIH conducts site visits at selected research facilities to assess compliance with the act. Whereas the Animal Welfare Act applies to certain warm-blooded animals, the definition of animals used for the purposes of the Health Research Extension Act covers all vertebrates, including the mice, rats, and fish species commonly used in laboratory research. Other laws relevant to the consideration of alternatives include the following: The National Institutes of Health Revitalization Act of 1993 directs the Director of NIH to prepare a plan to conduct or support research into methods of biomedical research and experimentation that do not require the use of animals, that reduce the number of animals used in such research, and that produce less pain and distress in such animals. The act also directs NIH to prepare a plan for establishing the validity and reliability of the new methods it develops, encouraging the scientific community’s acceptance of these methods, and training scientists in using such methods. The act further directs NIH to periodically review this plan and, as appropriate, make revisions and include those revisions in a biennial report. In response to the act, in September 1994 NIH established ICCVAM as an ad hoc committee. The ICCVAM Authorization Act of 2000 directed NIH to establish the ICCVAM as a permanent interagency committee under NIH’s National Toxicology Program Interagency Center for the Evaluation of Alternative Toxicological Methods. ICCVAM is administered by the National Institute of Environmental Health Sciences. The act specifies that ICCVAM be composed of the heads (or their designees) of 15 agencies or subagencies, including EPA, agencies within HHS, and USDA. The National Institutes of Standards and Technology joined voluntarily in 2016. The act directed ICCVAM to, among other things, review and evaluate alternative test methods that may be acceptable for specific regulatory uses and to prepare biennial progress reports. Under the act, an alternative test method is one that reduces the number of animals required; refines procedures to lessen or eliminate pain or distress to animals or enhances animal well-being; or replaces animals with non- animal systems or one animal species with a species presumed to have less ability to feel pain, such as replacing a mammal with an invertebrate. In January 2018, ICCVAM published a strategic roadmap articulating its vision to meet its purpose. The Frank R. Lautenberg Chemical Safety for the 21st Century Act amended the Toxic Substance Control Act in 2016 to include language on the use of alternative methods. The act directs the Administrator of EPA to reduce and replace, to the extent practicable, scientifically justified, and consistent with the policies of the Toxic Substances Control Act, the use of vertebrate animals in the testing of chemical substances or mixtures under the Toxic Substances Control Act. The act also directs the Administrator to develop a strategic plan to promote the development and implementation of alternative test methods and strategies to reduce, refine, or replace vertebrate animal testing. Methods HHS, USDA, and EPA have used to ensure that researchers consider alternatives to animal research include requiring researchers to describe and document their consideration of alternatives. In addition, USDA’s APIHS and HHS’s NIH help ensure that researchers consider alternatives by overseeing research facilities and these facilities’ animal care and use committees, including the committees’ review of animal research protocols. USDA and NIH also provide training to researchers and animal care and use committees to help ensure researchers have considered alternatives. For research that they conduct or fund, component agencies and offices within HHS, USDA, and EPA call for individual researchers to describe their consideration of alternatives to animal research. USDA’s APHIS and HHS’s NIH require research facilities to consider alternatives through the agencies’ implementation of the Animal Welfare Act regulations and Public Health Service Policy, respectively. EPA research is covered by the two laws to the extent that it uses animals covered by the Animal Welfare Act or Health Research Extension Act. Table 3 summarizes the factors that determine whether researchers are required under the acts to consider alternatives. The steps HHS, USDA, and EPA take to help ensure that agency researchers and the researchers that they fund or oversee meet the requirement to consider alternatives include (1) calling for written descriptions of researchers’ consideration of alternatives and (2) prescribing or recommending that researchers use searches, such as of databases of published scientific literature, to identify alternatives. Call for written descriptions. As specified in the Animal Welfare Act regulations and Public Health Service Policy, HHS, USDA, and EPA call for researchers to send written descriptions of research projects involving animals to animal care and use committees for their review and approval. In particular, the Animal Welfare Act regulations require these committees to determine that researchers have provided a written narrative description of the methods and sources they used to determine that alternatives were not available. The Public Health Service Policy requires that researchers’ institutions submit written descriptions of research projects to the committees and for the committees to determine that researchers’ procedures avoid or minimize discomfort, distress, and pain to animals, consistent with sound research design, among other things, and that researchers follow the U.S. Government Principles for the Utilization and Care of Vertebrate Animals Used in Testing, Research, and Training. The principles require the consideration of alternatives. In our review of protocol forms from our sample of 12 research facilities (including HHS, USDA, and EPA facilities), we found that all of the forms requested information on researchers’ consideration of alternatives, though the forms varied in the particular information they requested. The types of information requested included a rationale for involving animals and for the number of animals to be used, assurance that research activities do not unnecessarily duplicate previous experiments, and a description of the methods and sources used to determine that alternatives were not available. Several of the protocol forms required researchers to identify alternatives considered but not adopted. Recommended method for identifying alternatives. In their implementation of the Animal Welfare Act and Health Research Extension Act, respectively, USDA and NIH consider database searches as a best practice for researchers using animals covered by the acts to identify and consider alternatives to animal testing. A database search involves a researcher using keywords related to the planned use of animals to query citations in databases of published scientific literature. From April 1997 through July 2018, USDA maintained a policy, known as Animal Care Policy #12, in its animal care policy manual. In Policy #12, the agency recommended a database search as the most effective and efficient method for demonstrating compliance with the requirement to consider alternatives to painful or distressful procedures. According to USDA’s Deputy Administrator responsible for implementation of the Animal Welfare Act regulations, in July 2018, USDA placed the policy in inoperative status after determining that some research facilities and agency inspectors had misinterpreted the policy as a requirement. Moreover, in response to the 21st Century Cures Act, USDA is reviewing its animal care policy manual, including Policy #12, to ensure the policies in the manual conform with the Animal Welfare Act and its implementing regulations, harmonize with NIH guidance, and reduce researcher burden where possible. According to the Deputy Administrator, as of June 2019, USDA had not decided what, if anything, it would do to revise or replace Policy #12. According to a draft interagency report in response to the 21st Century Cures Act, USDA will make any revised and future policies involving the use of animals available for public comment using regulations.gov or a similar service. However, according to the Deputy Administrator, even though Policy #12 is inoperative, USDA continues to advocate for database searches, particularly through the USDA Animal Welfare Information Center’s provision of information to the scientific community about how to search for alternatives. According to a senior NIH official, NIH requires that agency researchers conduct database searches. Also, in a sample animal study proposal form NIH has provided to animal care and use committees, NIH recommends that researchers at other facilities conduct database searches. Furthermore, 11 of the 12 research facilities we reviewed (including HHS, USDA, and EPA facilities) used research protocol forms that required or recommended that their researchers conduct a database search for alternatives to animal research. Agencies may apply additional requirements to individual researchers at their own facilities or through grants they fund, in addition to applying the requirements of the Animal Welfare Act and Health Research Extension Act. For example, CDC’s Fort Collins, Colorado, facility requires researchers to provide assurance on their protocol forms that the facility’s animal care and use committee’s statistician reviewed the form to determine whether the research would use an appropriate number of animals or explain why a review of the number of animals did not occur. Similarly, the Chairman of APHIS’s National Wildlife Research Center committee told us that its animal care and use committee includes a biostatistician who conducts an analysis to ensure that the numbers of animals to be used will produce statistically significant results. USDA’s National Institute for Food and Agriculture requires applicants for funding from the agency’s Agriculture and Food Research Initiative Competitive Grants Program to use statistical power analysis, when appropriate, to determine the sample sizes of animals to be used in research. USDA officials told us that this type of analysis provides a justification for the number of animals needed to provide valid results and helps prevent the unnecessary use of animals. Agencies may also require information on animal use in proposals submitted by extramural researchers. For example, NIH instructs researchers to describe the use of animals in their work in a section of grant applications, contract proposals, and cooperative agreements. Specifically, when submitting a proposal, researchers must justify to agency officials and other reviewers that the species used is appropriate for the proposed research and explain why research goals cannot be accomplished using an alternative model, such as computational, human, invertebrate, or in vitro models. APHIS and NIH help ensure that researchers consider alternatives through the agencies’ oversight of research facilities and these facilities’ animal care and use committees, including the committees’ review of animal research protocols. In particular, APHIS collects and reviews annual reports from federal and nonfederal research facilities in which the facilities are required to provide an assurance that researchers considered alternatives. The Animal Welfare Act requires APHIS to annually inspect nonfederal research facilities to determine whether the facilities are in compliance with the act. As part of a facility inspection, APHIS inspectors are to examine whether researchers have met the requirement to consider alternatives to any procedure likely to produce pain in or distress to species of animals covered by the act. According to APHIS officials, inspectors examine a sample of approved animal research protocols to check whether the protocol forms include a written narrative on the consideration of alternatives and to ensure that the facility’s animal care and use committee approved the protocol forms. The inspectors may issue citations of noncompliance if they find inadequate documentation that researchers associated with one or more protocols considered alternatives to procedures that may cause more than momentary or slight pain or distress to animals. APHIS provided us with inspection reports for fiscal years 2015 through 2018 in which inspectors issued 57 citations to research facilities for noncompliance with the Animal Welfare Act regulations that require researchers to consider alternatives to animals or issued “teachable moments.” The inspection reports included some citations that, according to APHIS officials, were incorrectly issued because inspectors interpreted the Policy #12 recommendations on database searches as requirements. In addition, NIH’s Office of Laboratory Animal Welfare is responsible for the general administration and coordination of the Public Health Service Policy and provides specific guidance, instruction, and materials to research facilities that receive funding from agencies covered by the act. For all such facilities, NIH is to review the facilities’ assurance documents describing their animal care and use programs. In particular, the Animal Welfare Assurance document is to describe the procedures—including review of animal research protocols—that the animal care and use committees follow to fulfill the directives of the NIH Public Health Service Policy. Further, NIH conducts site visits at a small number of facilities. The Public Health Service Policy states that each awardee institution is subject to review at any time by agency staff and advisors to assess the adequacy and accuracy of the institution’s compliance or expressed compliance with the policy, and this review may include a site visit. According to NIH officials, when agency staff conduct site visits, they examine the facility’s protocol form to confirm that its animal care and use committee requests information from researchers about their consideration of alternatives. NIH officials may also examine a sample of approved protocol forms during a site visit. According to NIH officials, the Office of Laboratory Animal Welfare conducted 38 site visits in fiscal years 2015 through 2018 and found one deficiency related to the consideration of alternatives. USDA and NIH have provided training to researchers and animal care and use committee members on the requirements of the Animal Welfare Act and the Health Research Extension Act. The training has addressed, among other things, the requirement to consider alternatives and has included advice on how to search for alternatives. Through its Animal Welfare Information Center, USDA provides training on how to conduct database searches for alternatives to animal research and assists individual researchers with their literature searches. According to USDA staff, the information center provides three workshops per year on meeting the requirements of the Animal Welfare Act, each lasting a day and a half. The workshops are open to anyone working with animals in research, including scientists, veterinarians, librarians, and animal care and use committee members. The center also gives workshops upon request at specific facilities. Additionally, the center’s website contains resources for conducting literature searches, and, according to a senior information center official, the center plans to put workshops into an online format that will be available upon demand. According to the official, the center conducted 137 database searches upon request in fiscal years 2014 through 2018. NIH has also provided training on the consideration of alternatives to help researchers meet their requirements under the Health Research Extension Act. For example, in 2014 NIH presented a webinar on searches for alternatives. The webinar, titled Meeting Requirements for Alternatives Searches and available on NIH’s website, provides advice on how to conduct database searches. For example, the webinar provided advice on the timing of the search, the search strategy, and particular databases to use. In September 2015, NIH presented a webinar demonstrating how to use NIH’s database of research projects to find researchers, projects, and publications that may help replace, reduce, and refine the use of animals in research. The NIH Office of Laboratory Animal Welfare provides on its website a sample animal study protocol form that emphasizes database searches for any procedures that cause more than momentary or slight pain or distress to the animals. In addition, according to a senior official from the NIH office overseeing the agencies’ intramural research using animals, researchers at NIH must complete an online course regarding animal use every 3 years. The course includes a section on replacing, reducing, and refining animal use and outlines how researchers are to report literature searches in order to show they considered alternatives. EPA, HHS, and USDA have facilitated the development, use, and promotion of alternative research methods through individual and collaborative efforts, including strategies for promoting the use of alternative methods and development of policies and guidance on alternative methods. The three agencies have also developed alternative research methods that rely on non-animal models and procedures to test how various products would affect humans. Additionally, the agencies have worked collaboratively with each other and with nonfederal stakeholders to promote alternative methods, in particular through ICCVAM, which is required to report to the public on its progress. However, ICCVAM and its member agencies have not routinely developed or reported metrics for assessing the effect that their efforts are having on animal use. EPA has issued a strategic plan and FDA has issued a roadmap for the use of methods that may reduce animal use in assessments of the safety and efficacy of various products. Both agencies and others within HHS and USDA have also issued guidance on using alternatives to animal research in particular contexts, such as vaccine testing. In June 2018, EPA’s Office of Chemical Safety and Pollution Prevention issued a strategic plan for the reduction of vertebrate animal testing for toxic chemicals regulated under the Toxic Substances Control Act. The office developed and issued this strategic plan to implement a provision in the Frank R. Lautenberg Chemical Safety for the 21st Century Act (Lautenberg Act) calling for such a plan. The strategic plan describes a multi-year process with incremental steps for adopting and integrating methods that do not use vertebrate animals in evaluating chemicals regulated by the Toxic Substances Control Act for their effect on human health and the environment. The strategic plan states that the agency’s long-term goal is to reduce and eventually eliminate vertebrate animal testing for chemicals regulated under the act. Pursuant to the strategic plan, in June 2018 EPA published a list of methods the agency had identified that require no vertebrate testing and that are capable of providing information of equivalent or better scientific reliability and quality than that which would be obtained from vertebrate animal testing. According to EPA, the agency plans to update the list at least once a year. EPA’s strategic plan calls for other near-term activities such as retrospectively identifying and evaluating the studies that it has requested and received for both new and existing chemicals. The plan states that EPA will complete this analysis in 2019 and use the results to support the future development of alternative methods to fit the agency’s needs. In May 2011, EPA’s Office of Chemical Safety and Pollution Prevention issued a strategic plan in response to a 2007 National Academies report calling for a more efficient and informative risk assessment process to predict and characterize potential human health and environmental hazards from exposures to pesticides. The office’s strategic plan envisions using a combination of computational and predictive modeling approaches, in vitro techniques, and targeted in vivo testing to supplement or replace the existing toxicity tests required in federal regulations for pesticide registration under the Federal Insecticide, Fungicide, and Rodenticide Act. Pursuant to this strategic plan, EPA’s Office of Chemical Safety and Pollution Prevention has issued guidance on data requirements for assessing pesticide safety that may reduce animal use. For example, EPA issued guidance in May 2013 on the data that the agency needs in order to adequately assess pesticide risks. The guidance also provided information to manufacturers on how to request waivers from the data requirements, which would enable the manufacturers to reduce animal use. EPA also issued guidance in November 2016 that allows pesticide manufacturers to request a waiver from the requirement to provide data on acute toxicity tests and that contains a policy statement waiving all acute lethality dermal studies for formulated pesticide products; such waivers can reduce the need for pesticide manufacturers to conduct tests using animals. For example, EPA reported granting a total of 223 waivers in fiscal years 2016 and 2017, pursuant to the agency’s May 2013 guidance for toxicity studies, which the agency estimated avoided the use of 85,000 animals and saved pesticide manufacturers $26.4 million in conducting toxicity studies. In February 2016, EPA announced an effort to evaluate and implement alternative methods for tests involving acute oral, dermal, and inhalation toxicity; skin and eye irritation; and skin sensitization. As part of this effort, in April 2018, EPA issued a draft policy to reduce the use of animals in testing chemicals to evaluate whether they cause an allergic reaction, inflammation, or sensitization of the skin. EPA’s policy describes conditions under which the Office of Chemical Safety and Pollution Prevention will accept alternative approaches to laboratory animal studies for identifying skin sensitization hazards. In December 2017, in response to direction from the FDA Commissioner, FDA developed a roadmap to foster the development and evaluation of emerging tools and methods that can improve toxicology methods for assessing the safety of FDA-regulated products. The roadmap does not have an explicit goal to replace, reduce, or refine animal testing but states that new methods may have the potential to do so. In that regard, the roadmap states that FDA will encourage medical product sponsors to submit a scientifically valid approach for using a new method early in the regulatory process and to engage in frequent communication with the agency about the suitability of that method. In addition, the roadmap recommended that FDA establish an organizing committee; conduct training; foster communication and collaboration with stakeholders, such as industry and academia; engage in research; and track and report annually on its progress. In June 2019, FDA posted its first annual report on its progress in implementing the roadmap. Previously, FDA had taken steps to reduce animal use by issuing guidance to members of industry seeking approval for FDA-regulated products. In general, FDA guidance states that industry may choose to use an approach—such as a non-animal testing method—other than one set forth in guidance as long as it complies with relevant statutes and regulations. FDA has also taken more specific steps to modify guidance to promote the use of alternative methods. For example, in 2012, FDA issued guidance to industry that states that firms may use non-animal alternative methods to test the toxicological safety of pharmaceutical drugs if the methods are appropriate or scientifically justified. In 2013, FDA issued guidance that, among other things, allowed industry to use in vitro assays rather than mice to detect toxins in shellfish meant for human consumption; this guidance subsequently played a role in the adoption of additional methods that do not employ animal use. Other HHS and USDA agencies within our scope do not have strategic plans or roadmaps that promote a comprehensive strategy for alternative research methods, but some of the agencies have issued guidance to their own researchers or to regulated entities that may reduce animal use. For example, in 2017, APHIS updated its guidance to allow manufacturers of animal vaccines, inactivated bacterial products, and antibody products to request an exemption to animal safety testing if the products have a documented history of acceptable safety results and controlled manufacturing processes that ensure batch consistency and sterility. APHIS also issued a notice in 2017 of a testing option that can reduce by up to 50 percent the number of hamsters required for potency testing of vaccines for the bacterial disease leptospirosis, according to the notice. In addition, APHIS issued memorandums in 2013 and 2015 that provide guidance on in vitro techniques that researchers may use instead of animals to test the potency of vaccines. Some agencies have also adopted alternative methods for their researchers without issuing specific guidance to do so. For example, in September 2018, CDC began routine use of an in vitro procedure developed by the agency that allows its laboratories to test for botulism in human serum specimens without using mice. CDC officials stated that this method is fast and inexpensive and would reduce the need for hundreds of mice. CDC officials told us that their researchers plan to expand use of the in vitro procedure to test other types of specimens, further reducing the use of animals. HHS, USDA, and EPA have made multiple efforts to develop alternative research methods that, according to the agencies, have reduced animal use or have the potential to do so. Some of these efforts target reducing the use of animals in a particular research context while others have broader applications in toxicology and computer modeling. In some cases, agency officials provided estimates of how their targeted efforts have reduced or may reduce animal use. Examples of targeted efforts include the following: CDC researchers told us they have evaluated a method that reduces the number of animals and time needed to produce kits that are distributed worldwide to identify influenza virus subtypes and thereby aid in strain selection for the influenza vaccine each season. Under the original method, antibodies for the kits were generated from blood samples in sheep that were later euthanized. The CDC researchers concluded that an alternative automated method that draws antibody-rich plasma from goats instead of blood from sheep could reduce the time needed to produce the kits and require fewer animals. According to FDA officials, FDA is collaborating with others on the development of an in vitro assay that will be used to test the potency of human rabies vaccines that manufacturers submit to FDA for approval. This new method will replace the animal-based assay that is part of the current license to manufacture rabies vaccine. The officials said that the animal-based assay uses 600 mice, on average, for each batch of vaccine submitted by a manufacturer. According to an ARS research paper, ARS worked with academic researchers to develop an in vitro method for feeding blood to ticks. According to ARS officials, the method allows researchers to reduce the number of animals used when studying disease transmission in animals via tick-borne pathogens. APHIS currently holds federal pesticide registrations with EPA for active ingredients formulated into end-use products, such as rodenticides, that APHIS uses to prevent damage to agriculture, endangered species, or critical habitats. According to APHIS officials, the agency uses an EPA- approved method for testing the risks to human health from new pesticide products that substantially reduces animal use. The method generally involves progressively increasing the pesticide dose on a relatively small number of animals compared to the previous method and waiting to observe whether the dose causes mortality before deciding whether to increase the dose in further testing. APHIS officials said the new method reduces animal use by 50 percent or more per test. EPA’s Endocrine Disruptor Screening Program Uses Alternatives to Animals Led by its Office of Science Coordination and Policy, EPA established the Endocrine Disruptor Screening Program in 1998 to fulfill a congressional mandate in the 1996 Food Quality Protection Act to develop a program to screen for certain chemicals (e.g., pesticides) that affect human hormones. EPA expanded the scope of the program to include screening the effects of chemicals on the human thyroid system and wildlife. The program began using automated, large-scale screening methods and computational models to evaluate and screen chemicals and, according to EPA, allows EPA to screen more chemicals in less time, use fewer animals, and reduce cost. Agencies’ broader efforts include the integration of advances in biology, chemistry, and computer science into areas of research, such as toxicology, that currently rely heavily on animal use. For example, EPA launched the Toxicity Forecaster in 2007 as an effort to use automated technologies to expose living cells or isolated proteins to chemicals and screen the cells or proteins when exposed to chemicals for changes in biological activity that suggest potential toxic effects. According to EPA documents, these methods could limit the number of required laboratory animal-based toxicity tests while quickly and efficiently screening large numbers of chemicals. According to EPA documents, in the first phase of this effort, which the agency completed in 2009, EPA evaluated more than 300 well-studied chemicals (primarily pesticides) that had extensive data from traditional animal-based toxicity testing; the agency then compared results from automated screening technologies with the results from the traditional animal tests. As of 2018, EPA had developed and made publicly available a library of toxicity data on more than 4,500 chemicals. The availability of the Toxicity Forecaster data has enabled EPA to reduce the need for animal testing in its Endocrine Disruptor Screening Program for identifying chemicals that may affect human hormone systems (see sidebar). Similarly, FDA has initiated a broad effort to incorporate greater use of computer modeling and simulation into its decision-making on FDA- regulated products. For example, FDA formed an agency working group on modeling and simulation in 2017. According to the Chair of the working group, it does not have an explicit objective to reduce animal testing, but such reduction is a potential benefit of the testing approaches the group is advancing. For example, the Chair said that modeling and simulation can help refine questions about products submitted for FDA approval and therefore could reduce the number of animal studies needed before clinical trials. EPA and NIH have provided funding to extramural researchers to develop alternative research methods. For example, from 2013 through 2018, EPA provided $24 million in funding for research on 3-D models containing human cells (these devices are also known as tissue chips) that can be used for tests that otherwise might be conducted using animals. In 2018, EPA also announced $4.25 million in funding for research to promote the development and use of alternative methods that reduce, refine, or replace vertebrate animal use for toxicity testing. Similarly, in 2017, NIH awarded a $962,000 grant to a research facility to conduct studies of an in vitro human bronchial tissue model for predicting the toxicity of inhaled chemicals. Additionally, while USDA’s National Institute for Food and Agriculture did not set aside a specific amount of funding, in May 2019 the agency made clear to applicants for its Welfare and Well-being of Agricultural Animals grant program that proposals that study ways to reduce the need for animals in research are eligible for funding in fiscal years 2019 and 2020. HHS, USDA, and EPA have joined partnerships to develop, use, and promote alternative testing methods. For example, the agencies participate in ICCVAM, which states that its mission is to facilitate the development, validation, and regulatory acceptance of test methods that replace, reduce, or refine the use of animals. ICCVAM itself does not conduct research or validation studies on alternative methods. Instead, it relies on stakeholders including federal agencies that generate, require, or use toxicological data; companies that develop toxicological tests; and animal welfare organizations. According to committee guidelines, stakeholders can submit the results of their research to ICCVAM, and the committee then conducts evaluations and makes recommendations on submissions for regulatory uses that align with the needs and priorities of member agencies. Zebrafish Are Used as Alternatives to Other Animals in Research A zebrafish is a freshwater, tropical vertebrate fish that is widely used in pharmaceutical development and medical and scientific research due to certain qualities of its morphology and development as well as its inexpensive cost to use and maintain. Some of these qualities include genetic and structural similarities to other vertebrates that mimic human responses to certain genes involved in human diseases and its transparent embryonic development that enables researchers to use it as an alternative model for toxicity screening of drugs and chemicals. These qualities have led to the use of zebrafish embryonic models for automated, large-scale screening programs by the National Toxicology Program and the Environmental Protection Agency, among others. ICCVAM’s website contains information on current ICCVAM- recommended protocols for specific test methods, such as methods to test for eye corrosion and irritation and skin sensitization, and on events organized by NIH and others that are relevant to the replacement, reduction, or refinement of animal use in research. For example, the website has a link to a page on NIH’s website that has the slide presentations given at six webinars from 2017 through 2018 on the use of zebrafish in toxicology testing. Researchers may use zebrafish and their embryos in particular as a replacement for other animals, such as mice (see sidebar). ICCVAM maintains on its website a list of 108 alternative methods that, as of June 2019, had been accepted by one or more federal agencies. These include methods that ICCVAM and its member agencies contributed to developing or validating. However, according to ICCVAM’s strategic roadmap issued in January 2018, the committee concluded that its evaluations of new methods during its first 15 years were lengthy, inefficient, and resource intensive. ICCVAM concluded that researchers and test method developers often initiated the development of alternative methods with little input from federal agencies or regulated industries and, therefore, these methods did not always meet the needs of federal agencies. Consequently, these methods were either not accepted by federal agencies or were accepted by the agencies but not used by the regulated community. Recognizing these limitations, ICCVAM initiated a strategic shift in 2013 aimed at adjusting the validation of new test methods to be more responsive to the needs of federal agencies and other stakeholders. Accordingly, ICCVAM’s 2018 strategic roadmap set new objectives for reducing animal use, including the following: Connect the developers of alternative methods with the regulatory agencies and the regulated industries that would ultimately use the new technologies to increase the likelihood of the methods being successfully developed and implemented. Foster the use of efficient and flexible practices, such as public-private partnerships to promote communication and cooperation, to establish confidence in new methods. Encourage the adoption and use of new methods and approaches by federal agencies and regulated industries, such as through training programs on the use of new methods. ICCVAM has established workgroups to develop detailed implementation plans to address roadmap goals. According to the strategic roadmap, the implementation plans will include four key elements: (1) definition of testing needs; (2) identification of any available alternative tests and computer models; (3) a plan to develop integrated approaches to testing and assessment and defined approaches for interpreting data; and (4) a plan to address both scientific and nonscientific challenges, including regulatory challenges, such as international harmonization. As of June 2019, workgroups on acute systemic toxicity, eye and skin irritation, and skin sensitization had posted information concerning these elements on ICCVAM’s website. For example, each workgroup authored an article published in a peer-reviewed journal and posted on the ICCVAM website about the testing needs of regulatory agencies and information about available alternatives. Another interagency effort that has a goal of promoting the use of alternative methods is the Toxicology in the 21st Century (Tox21) Program. Formed in 2008, the program is a collaborative effort among NIH, FDA, and EPA to characterize the potential toxicity of chemicals by using cells and isolated molecular targets instead of laboratory animals. A central component of the program is its focus on developing and evaluating automated in vitro screening methods to assess the hazards of chemical substances. As of February 2018, the program had used this method to assess approximately 10,000 chemicals for their potential impacts on biological systems. According to NIH’s Tox21 website, these automated methods have yielded high-quality toxicity data on environmental substances in a fraction of the time that would have been required with traditional animal testing. To address key challenges in toxicology testing, the program’s federal partners developed a strategic and operational plan in March 2018 that expanded the focus of Tox21’s research activities to include developing alternative test systems that predict chemical toxicity in humans and addressing the technical limitations of and strengthening scientific confidence in current in vitro test systems. According to NIH, activities under the plan will lead to better predicting chemical toxicity to humans through using non-animal alternatives such as stem cells and computational models. Since 2011, federal agencies have also collaborated to develop devices containing human cells that can be used for tests that otherwise might be conducted using animals. See figure 1 for an example of such devices, known as tissue chips or human microphysiological systems. According to NIH officials, this evolving technology may reduce animal testing and produce results more relevant to human health. The interagency effort was initiated in September 2011 when the President announced the formation of a collaborative project between NIH, the Defense Advanced Research Projects Agency, and FDA to develop tissue chips loaded with living human cells to screen the efficacy, safety, and toxicity of drugs, vaccines, or biological products for humans. Subsequently, in July 2012, NIH launched the Tissue Chip for Drug Screening program, which provided 19 grants to research facilities to develop tissue chips that accurately model the structure and function of the human lung, liver, heart, and more. In September 2014, NIH announced a second phase of the program in which researchers would refine existing tissue chips and combine them into an integrated system that can mimic the complex functions of the human body. In one example of this collaboration, two project teams funded by the Defense Advanced Research Projects Agency—the Massachusetts Institute of Technology and the Wyss Institute at Harvard University—are working with NIH-funded researchers to develop platforms that integrate 10 tissue chips that each represent a separate human organ. Federal agencies have also collaborated with nongovernmental organizations on training to promote the use of alternative methods. For example, NIH and the People for the Ethical Treatment of Animals (PETA) International Science Consortium offered a webinar series from March through September 2016 on alternative approaches for assessing acute inhalation toxicity. Webinar presenters described alternative approaches for identifying substances likely to cause acute systemic toxicity through inhalation. Similarly, EPA collaborated with the PETA International Science Consortium and the Physicians Committee for Responsible Medicine on webinars in November 2018, February 2019, and April 2019 that addressed alternative methods for testing the effect of chemicals on skin, for predicting the effect of inhaled substances, and for identifying substances that cause irritation or inflammation in human respiratory systems. ICCVAM’s strategic roadmap calls for its members to identify appropriate metrics for prioritizing activities, monitoring progress, and measuring success toward the goals described in the roadmap. However, ICCVAM and its member agencies have not routinely developed metrics that they could report to the public to demonstrate how their individual or collective efforts to encourage the use of alternative methods have affected or will affect animal use. HHS, USDA, and EPA officials, as well as ICCVAM’s roadmap, have cited challenges to measuring the results of ICCVAM and its member agencies’ efforts. For example, according to agency officials, differences in the regulatory contexts in which agencies use data generated through animal research—for example, in regulation of pesticides versus human or animal drugs—limit agencies’ ability to develop metrics that can be applied across multiple agencies. Furthermore, the ICCVAM roadmap states that measuring the actual impact of encouraging the adoption and use of new methods is difficult in the United States due to the limited ability to quantify animals used for toxicity testing. In particular, the Animal Welfare Act does not cover several species commonly used in research, including mice, rats, and birds bred for research and cold-blooded species such as fish. Therefore, research facilities are not required under the act to report their use of those species to APHIS, and the data APHIS receives from research facilities can only be used to track a subset of the total number of animals used for research in the United States. Although ICCVAM and its member agencies face challenges in developing metrics, the roadmap also states that agency-specific mechanisms to measure progress may exist, such as tracking the number of waivers granted for a particular animal test. For example, as discussed above, EPA has estimated the extent to which its granting of data waivers to pesticide manufacturers has reduced animal use and research costs. Additionally, some agencies have estimated the effect that a new alternative method could have on animal use. Moreover, officials from FDA and EPA said that their agencies are able to accept non-animal test data in lieu of animal test data if the data meet their regulatory needs. Measuring the frequency with which the agencies receive non-animal test data instead of animal data could be another mechanism for estimating changes in animal use. In addition, the ICCVAM Authorization Act of 2000 requires ICCVAM to prepare biennial public reports on its progress under the act—including its efforts to ensure that new and revised test methods are validated to meet the needs of federal agencies and to reduce, refine, or replace the use of animals in testing, among other things. ICCVAM, with support from NIH’s National Institute of Environmental Health Sciences, has issued the required biennial progress reports since 2001, including the most recent report issued in July 2018 that covers 2016 and 2017. However, the committee’s biennial progress reports, including the July 2018 report, provide few quantitative or qualitative assessments of the progress the member agencies have made, individually or collectively, toward reducing, refining, or replacing animal use in testing. ICCVAM’s strategic roadmap states that it envisions that workgroups will play a key role in implementing the goals of the strategic roadmap, but ICCVAM has not designated a workgroup to address the challenges related to metrics, similar to other workgroups that the committee has established to address the roadmap’s goals. According to officials from NIH’s National Institute of Environmental Health Sciences, which manages the committee, the strategic roadmap is a work in progress and developing metrics is the third of three roadmap goals. The ICCVAM Authorization Act of 2000 does not provide the National Institute of Environmental Health Sciences with authority to direct agencies to develop and report metrics. However, agency officials agreed that ICCVAM could facilitate the establishment or designation of a workgroup of member agencies to identify a range of potential quantitative and qualitative metrics that member agencies could use to assess their progress toward reducing, refining, or replacing animal use. By establishing or designating such a workgroup to develop metrics that the agencies could use to assess their individual or collective progress toward reducing, refining, or replacing animal use in testing and by incorporating those metrics in ICCVAM’s biennial progress reports, ICCVAM and its member agencies could better monitor progress across the range of the committee’s efforts and report the members’ progress to the public. HHS, USDA, and EPA use a variety of methods to ensure that researchers—whether employed by or receiving research funding from these agencies—consider alternative methods to animal research. The agencies also have engaged in multiple efforts to expand the range of available alternatives. Under one of these efforts, ICCVAM’s strategic roadmap calls for its members to identify appropriate metrics for prioritizing activities, monitoring progress, and measuring success. The roadmap envisions that workgroups will play a key role in implementing the goals of the strategic roadmap. However, ICCVAM has not designated a workgroup to address the challenges related to developing and reporting metrics. In addition, ICCVAM has issued the required biennial progress reports since 2001, but the reports provide few quantitative or qualitative assessments of the progress member agencies have made, individually or collectively, toward reducing, refining, or replacing animal use in testing. By establishing or designating a workgroup to develop metrics to assess the progress member agencies have made, individually or collectively, toward reducing, refining, or replacing animal use in testing and by incorporating those metrics in ICCVAM’s biennial progress reports, ICCVAM and its member agencies could better monitor progress across the range of the committee’s efforts and report the members’ progress to the public. The Director of the NIH’s National Institute of Environmental Health Sciences should (1) facilitate the establishment or designation of a workgroup of representatives of ICCVAM member agencies to develop metrics that the agencies could use to assess the progress they have individually or collectively made toward reducing, refining, or replacing animal use in testing and (2) incorporate those metrics into the committee’s biennial progress reports. (Recommendation 1) We provided a draft of this report to HHS, USDA, and EPA. HHS provided written comments on the draft, which are presented in appendix I. In its written comments, HHS stated that NIH concurred with our recommendation. NIH further commented that ICCVAM’s activities in support of promoting alternatives for animal use in testing do not extend to animal use in any other context, such as research or training. NIH explained that our use of the terms research and researcher to refer more generally to research, testing, teaching, or experimentation could cause misunderstanding. We understand that ICCVAM’s activities are focused on animal use in product testing. In addition, we intended our recommendation that the Director of the National Institute of Environmental Health Sciences facilitate the establishment or designation of an ICCVAM workgroup to be focused on product testing rather than on other types of animal research. However, for editorial reasons, we did not modify our report’s use of the terms research or researcher. HHS and EPA also provided technical comments, which we incorporated as appropriate. Among those comments, HHS’s FDA officials stated that the agency encourages the use of alternatives to animal testing and supports the principles of replacement, reduction, and refinement, but if no alternative exists, animal testing may be the most appropriate way to meet certain regulatory requirements to ensure the safety and efficacy of medical products. In its technical comments, EPA cited a September 2019, memorandum EPA’s Administrator issued after we sent our draft report to the agencies for comment. The memorandum commits the agency to take several steps to reduce, replace, and refine animal testing requirements. For example, the Administrator committed EPA to reducing its requests for, and funding of, whole and live mammal studies by 30 percent by 2025 and eliminating all mammal study requests by 2035. We acknowledge EPA’s announcement but did not assess it in our review of federal efforts to facilitate the use of alternative research methods. We are sending copies of this report to the appropriate congressional committees, the Secretary of Agriculture, the Secretary of Health and Human Services, the Administrator of the Environmental Protection Agency, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact us at (202) 512-3841 or morriss@gao.gov or neumannj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the individuals named above, Joseph Cook (Assistant Director), Rodney Bacigalupo, Kevin Bray, Ross Campbell (Analyst-in- Charge), Tara Congdon, Hayden Huang, Amber Sinclair, and Kari Terrio made key contributions to this report.", "summary": "methods and computer modeling. HHS, USDA, and EPA conduct and fund animal research and regulate products tested on animals. HHS and USDA also oversee federal and nonfederal research facilities including researchers' consideration of alternatives to animal use. GAO was asked to review issues related to alternatives to animal research. This report (1) describes how HHS, USDA, and EPA ensure researchers consider the use of alternatives to animals and (2) examines the steps the agencies have taken to facilitate the use of alternative research methods and to assess the effect of their efforts on animal use. GAO reviewed documents, such as agency policies and practices relevant to the consideration of alternatives and interviewed agency officials. GAO also interviewed representatives of a nongeneralizable sample of 12 federal and nonfederal research facilities randomly selected across agencies and facilities. The Department of Health and Human Services (HHS), U.S. Department of Agriculture (USDA), and Environmental Protection Agency (EPA) use a variety of methods to ensure researchers consider alternatives to animal use in research (see figure). Two of these methods are (1) requiring researchers to obtain approval of their research protocols, including their consideration of alternatives, from their institutions, and (2) calling for or recommending researchers to use database searches to identify alternatives. HHS and USDA also help ensure that researchers consider alternatives through the agencies' oversight of research facilities. For example, USDA is to conduct annual inspections of nonfederal research facilities. Futhermore, the agencies have provided training to researchers on the consideration of alternatives. HHS, USDA, and EPA have facilitated the development and use of alternatives to animal use in research through individual and collaborative efforts. These efforts include agency strategies and policies for promoting the use of alternative methods and the development of testing methods that rely on non-animal models. Additionally, the agencies are members of the Interagency Coordinating Committee on the Validation of Alternative Methods, which is managed by HHS's National Institute of Environmental Health Sciences. The committee promotes testing methods that protect human health and the environment while reducing animal use. The interagency committee's 2018 strategic roadmap calls for it to identify appropriate metrics for monitoring progress and measuring success in adopting alternatives. However, the committee and its member agencies have not routinely developed or reported metrics that demonstrate how their efforts to encourage the use of alternative methods affect animal use. They have also not designated an interagency workgroup to address the challenges related to developing and reporting such metrics. Facilitating the establishment of such a workgroup would help the committee and its member agencies better monitor their progress across the range of their efforts to reduce animal use and report members' progress to the public. GAO recommends that HHS's National Institute of Environmental Health Sciences facilitate the establishment of an interagency workgroup to develop metrics for assessing progress on the development and promotion of alternatives to animal use and incorporate those metrics into public reports. HHS agreed with our recommendation.", "document_type": "gao"}
{"report": "The ISM Code was established to provide an international standard for the safe management and operation of ships and for pollution prevention. The code establishes safety management objectives, such as preventing human injury or loss of life, and identifies a framework of key elements required to be considered for inclusion in an SMS. According to the ISM Code, each vessel operator should develop, implement, and maintain an SMS that is to include functional requirements, such as procedures to prepare for and respond to emergency situations. An SMS is typically not a single plan and can take different forms. It is up to the vessel operator to determine how best to operationalize these requirements. The SMS plan documents generally contain proprietary information and are not retained by the Coast Guard or the ROs performing services on the Coast Guard’s behalf. There are three key entities involved in vessel SMS activities—vessel operators, ROs, and the U.S. Coast Guard. These entities’ SMS responsibilities are described below. Vessel operators are responsible for developing an SMS in accordance with ISM Code requirements if they operate U.S-flagged vessels that are subject to the ISM Code, such as a vessel engaged in a foreign voyage that is carrying more than 12 passengers, or a tanker or freight vessel of at least 500 gross tons, among other vessel types. Vessel operators are required to perform an internal audit of their company’s SMS each year to ensure it is being implemented effectively. Vessel operators are also responsible for obtaining the requisite evidence that the company and each of its applicable vessels are in compliance with the ISM Code. In practice, this means that the vessel operators obtain certification from ROs, which are described below. According to the Coast Guard, there were approximately 1,170 U.S.-flagged vessels that maintained SMS certifications in 2019. An RO refers to an international classification society authorized by the Coast Guard to conduct applicable vessel oversight and certification services on its behalf. The Coast Guard has authorized several ROs to conduct SMS audits and issue applicable certificates, but over 95 percent of these vessel oversight and compliance activities are conducted by a single RO, the American Bureau of Shipping. ROs have to meet specific requirements for authorization, such as making information about vessel class and inspections available to the Coast Guard. In order to be authorized, the RO needs to have been an international classification society for 30 years and have a history of taking appropriate corrective actions in addressing, among other things, vessel deficiencies. ROs are to conduct the following SMS activities on the Coast Guard’s behalf: review SMS documents and conduct initial company and vessel audits to verify compliance with the ISM Code and applicable national and international requirements; issue a Document of Compliance to the vessel operator and a Safety Management Certificate for the vessel, which is valid for up to 5 years; conduct annual SMS compliance audits of the vessel operator; conduct an intermediate SMS compliance audit for the vessel at least once during the 5-year period; and conduct renewal SMS compliance audits of vessel operator and vessel(s) prior to expiration of the 5-year certificate. The U.S. Coast Guard is ultimately responsible for guaranteeing the effectiveness of SMS compliance activities and audits that ROs perform on its behalf. The Coast Guard’s oversight activities of ROs are conducted by the Office of Commercial Vessel Compliance. This office oversees a range of different activities to help ensure SMS compliance with the ISM Code and applicable federal regulations. Such activities include managing the commercial vessel inspection program, developing related guidance, and overseeing SMS audits and related activities performed by ROs. In addition to oversight provided by officials at Coast Guard headquarters, marine inspectors within local Coast Guard field units are also responsible for conducting vessel inspections, which routinely include assessing SMS effectiveness for applicable vessels. The Coast Guard verifies SMS compliance as part of its overall vessel compliance activities, such as conducting annual inspections of applicable U.S.-flagged vessels. According to the Coast Guard, recurrent vessel inspections are important opportunities for its marine inspectors to verify the effectiveness of the vessels’ SMS, even if SMS oversight is not the primary purpose of the vessel inspections. When conducting an annual vessel inspection, Coast Guard marine inspectors are to look for material deficiencies, such as poor condition of vessel structures, missing or defective equipment, or hazardous conditions that could indicate a potential SMS nonconformity. According to Coast Guard officials, marine inspectors routinely review the Coast Guard’s internal database for a record of any past deficiencies and are to inspect the vessel’s SMS documentation to determine if the Safety Management Certificate is up- to-date and the drill logs are current, among other things. The Coast Guard advises vessel operators to self-report or, in other words, proactively manage their vessels and report any deficiencies identified by the vessel’s crew and report them at the beginning of any Coast Guard inspection. When conducting an annual vessel inspection, Coast Guard marine inspectors are to follow a five-step process to identify any SMS-related deficiencies, determine if there are clear grounds for an expanded vessel inspection, and specify any applicable compliance options. The process requires distinguishing between normal wear and tear to the vessel and deficiencies that could be the result of failures to implement an effective SMS. (See appendix II for further details on this five-step process.) A more in-depth inspection, if warranted, may include a review of maintenance schedules and records, crew training records and certifications, emergency procedures, and associated interviews with the vessel master and crew. Marine inspectors are to record any identified deficiencies on a Form 835V, which specifies the time frames and procedures required to address the identified deficiencies. See figure 1 for a blank copy of the Form 835V. The Coast Guard uses a range of options for addressing SMS-related deficiencies. Some deficiencies, such as improperly secured wiring or missing documentation, can sometimes be corrected by the vessel’s crew during the course of a Coast Guard inspection. According to Coast Guard guidance, if marine inspectors identify serious deficiencies that could indicate broader SMS failures, such as an absence of required equipment or failure by the company to notify the Coast Guard of reportable marine casualties and hazards, the inspectors record an SMS-related deficiency and require an internal SMS audit. An internal SMS audit is for technical or operational deficiencies that individually or collectively do not warrant the detention of the vessel but indicate a failure or lack of effectiveness of the SMS. The internal SMS audit and any corrective actions are to be completed by the vessel operator within three months from the date of the Coast Guard vessel inspection. If during the course of a vessel inspection Coast Guard inspectors observe more serious deficiencies or failures, such as defective or missing fire-fighting or life-saving equipment, the vessel is to be detained and an external audit is to be performed by the RO prior to the vessel being released from detention. Figure 2 shows the Coast Guard’s process for ensuring SMS compliance during vessel inspections. In addition to the annual vessel inspections it conducts, the Coast Guard also maintains a list of vessels that require additional oversight, referred to as the “fleet risk index.” The Coast Guard Office of Commercial Vessel Compliance evaluates vessels enrolled in the Alternate Compliance Program and the Maritime Security Program to develop the fleet risk index using modeling that considers and weighs multiple risk factors to assign each vessel a risk score. This list is used internally by Coast Guard inspectors when prioritizing vessels for additional oversight and more frequent inspections. Assessed risk factors include vessel detentions, marine violations/enforcement actions, vessel deficiencies, vessel type, and vessel age, among others. According to Coast Guard officials, the Coast Guard uses the fleet risk index to identify approximately 50 vessels each year that are subject to inspections every 6 months rather than annually. In 2018, the Coast Guard stipulated that traveling inspectors would accompany the local inspection team to conduct all inspections aboard vessels designated for additional oversight. According to Coast Guard officials, traveling inspectors have additional training and inspection expertise, including supplemental coursework in auditing and quality management systems, and they routinely conduct additional background research on these vessels prior to participating in the inspections. Based, in part, on recommendations in the EL FARO investigative report, in 2018 the Coast Guard took steps to improve its management of the Alternate Compliance Program, including efforts to improve data reporting. For example, the Coast Guard revised its form for documenting deficiencies during annual vessel inspections. In particular, since March 2018, the Form 835V has included a checkbox to indicate if a deficiency is related to an SMS. According to the Coast Guard, this revision will allow for enhanced annual reporting of safety-related deficiencies identified during compliance activities. The Coast Guard reported it conducts approximately 1,200 inspections each year of vessels that are either required to maintain a Safety Management Certificate, or do so voluntarily. According to the Coast Guard, in calendar year 2018, the Coast Guard issued between 70 and 130 SMS-related deficiencies (reporting available for April through December only), and for calendar year 2019, the Coast Guard issued between 183 and 212 SMS-related deficiencies. Given the limited data and time frames available, we were not able to identify any trends regarding SMS deficiencies. However, we noted that the highest number of safety-related deficiencies cited in 2019 were related to maintenance of vessels and equipment—43 of the 212 annual deficiencies. The second-highest number of deficiencies addressed issues related to emergency preparedness—37 of the 212 annual deficiencies. Some specific examples in this category relate to the posting of applicable emergency instructions and providing updated records of emergency drills. According to Coast Guard headquarters officials, the Coast Guard plans to review and assess the SMS deficiency data to provide feedback to inspectors, vessel operators, and ROs. The officials also stated that SMS deficiencies will be included in future risk-based vessel inspection programs, including the fleet risk index discussed earlier. Following the investigative reports of the EL FARO sinking, the Coast Guard initiated several efforts in 2018 to enhance oversight of the ROs that perform SMS-related services and certifications on its behalf. These efforts were largely driven by actions identified by the Commandant of the Coast Guard in December 2017 in response to EL FARO investigative report recommendations. In particular, the Coast Guard established a new group to monitor ROs, developed new SMS-related guidance and associated work instructions, increased direct observations of ROs, developed key performance indicators, and developed guidance to request internal investigations for certain RO deficiencies. It is too early for us to assess the overall effectiveness of these Coast Guard efforts; however, we believe they are positive steps toward enhancing oversight of ROs. Further information on each of these efforts is provided in the sections that follow. Established a new group within the Office of Commercial Vessel Compliance. The Coast Guard established a new group within its Office of Commercial Vessel Compliance in 2018 to help monitor the global performance of the U.S.-flagged fleet, provide enhanced oversight of ROs performing vessel safety management functions, and implement any necessary changes to related roles and responsibilities. Developed SMS-related guidance and work instructions. The Office of Commercial Vessel Compliance developed several new work instructions to help inform mariners, the public, the Coast Guard, and other federal and state regulators in applying SMS-related statutory and regulatory requirements. The following are examples of applicable guidance issued since 2018: CVC-WI-003(1): USCG Oversight of Safety Management Systems on U.S. Flag Vessels (March 23, 2018). This document contains guidance for assessing the effectiveness of the SMS on U.S.-flagged vessels, including directions for evaluating potential deficiencies and compliance options during the course of a vessel inspection. CVC-WI-004(1): U.S. Flag Interpretations on the ISM Code (April 16, 2018). This document provides guidance regarding the Coast Guard’s interpretations on the application and implementation of the ISM Code. Increased the number of Coast Guard direct observations of ROs performing vessel and company audits. The Coast Guard reported it has increased the number of direct observations of ROs conducting vessel and company SMS audits since 2018. According to the Coast Guard, audit observations aboard vessels are routinely performed by traveling inspectors. Additionally, staff from the new Commercial Vessel Compliance group are observing an increased number of company audits. This group has eight staff available for direct observations of ROs, all of whom have received training in international auditing and safety management standards. The Coast Guard reported that the number of audit observations attended by the Commercial Vessel Compliance staff increased from three in 2018 to 21 in 2019. According to the Coast Guard, these additional observations serve as a mechanism to provide increased oversight of the ROs and the companies or vessels being audited, as well as to verify that the services provided by ROs are effectively executed in accordance with established requirements. Developed key performance indicators for assessing ROs. In mid- 2018, Coast Guard officials identified 10 key performance indicators to be used to evaluate the performance of ROs. Due, in part, to challenges with collecting and synthesizing the requested data from the different ROs, the Coast Guard reported on limited performance information in the 2018 Domestic Annual Report. According to Coast Guard officials, the Coast Guard is working with each of the ROs and the International Association of Classification Societies to standardize the key performance indicator data to better integrate the data into the Coast Guard’s data system. The Coast Guard said that it plans to include a subset of the key performance indicators in its 2019 annual report, which is scheduled for issuance in April 2020. See appendix III for more information on these key performance indicators. Developed guidance for ROs on “quality cases.” In May 2018, the Coast Guard also issued guidance that describes a new oversight mechanism, referred to as a “quality case.” If a Coast Guard marine inspector observes evidence during the course of a vessel inspection that an RO is not adequately performing its required SMS-related functions, the Coast Guard can request that the RO conduct a root-cause analysis to help identify the underlying issue(s). This analysis would generally involve the RO evaluating its quality management system and reporting findings and corrective actions to the Coast Guard. From May 2018 to November 2019, the Coast Guard reported it initiated 13 quality cases; one of which was SMS-related. Each of the 12 SMS plans (or plan excerpts) for U.S.-flagged vessels that we reviewed identify potential shipboard emergencies and applicable response procedures, but they do not address the full range of emergency scenarios included in Coast Guard guidance. While the 12 SMS plans do not address all potential emergencies included in Coast Guard guidance, the plans do address the broad, functional requirement to identify potential shipboard emergencies and applicable response procedures to address them, as required by the ISM Code and applicable federal regulations. In reviewing the 12 SMS plans, we also found variation among the specific scope and formats of the emergency preparedness sections. Four of the 12 SMS plans are large documents spanning hundreds of pages that incorporate various component manuals. For example, one vessel operator provided a comprehensive SMS plan document of nearly 600 pages that includes six different procedural manuals covering the following issues: Management, Vessel, Safety, Environmental, Cargo Operations, and Emergency Response. For the other eight SMS plans we reviewed, the vessel operators provided us with either a stand-alone manual specifically addressing shipboard emergency preparedness and response procedures, or individual chapters and excerpts that included this information. According to Coast Guard and RO officials, the ISM Code does not require a specific format or level of detail for SMS plans and, rather, allows vessel operators flexibility to choose how they will implement and document SMS requirements based on their specific operations and business processes. In addition to reviewing the SMS plans for content and format, we also reviewed each of the 12 SMS plans (or excerpts) to determine the extent to which they address 21 different potential shipboard emergencies identified in 2018 Coast Guard guidance related to the application and implementation of the ISM Code (see table 1). The number of unique, potential shipboard emergency scenarios addressed in the SMS plan documents we reviewed generally range from five to 16. Ship routing procedures related to heavy weather, which is an emergency scenario highlighted in the EL FARO investigative report, is clearly identified in five of the 12 SMS plans reviewed. However, one additional SMS plan makes reference to a separate heavy weather plan that was not included in the primary SMS plan documents that we reviewed. The most frequently addressed shipboard emergency scenarios—that are addressed in at least 10 of the 12 SMS plans we reviewed—are Fire, Collision, Grounding, Abandon Ship, and Man Overboard. In addition, 10 of the 12 SMS plans we reviewed also identify additional potential emergency shipboard scenarios not included in the 2018 Coast Guard guidance, such as breakaway from dock, emergency towing, or confined space rescue. While none of the SMS plans that we reviewed specifically address all 21 potential shipboard emergencies identified in the 2018 Coast Guard guidance, the guidance states that it is not a substitute for applicable legal requirements, nor is it itself a rule. According to officials from the two ROs with whom we discussed this program, their auditors are provided the 2018 Coast Guard guidance to use as part of their SMS audit criteria. The officials noted, however, that their auditors may be limited to issuing an “observation” to the vessel operator if any potential shipboard emergency listed in Coast Guard guidance is not addressed in SMS plan documents. Under the ISM Code, an “observation” is not the same as an SMS “nonconformity,” which would require specific corrective action. Officials from one RO noted that any nonconformities identified would need to be based on specified mandatory requirements, such as ISM Code provisions, U.S. statutes, or applicable U.S. or international regulations, and not solely on the 2018 Coast Guard guidance. In addition to the fact that the emergencies listed in the guidance are not required to be included in SMS plans, there are other factors to explain why the SMS plans we reviewed may not address all 21 potential shipboard emergency scenarios identified in the 2018 Coast Guard guidance. Such factors include the following: Size and nature of vessel operations. According to RO and Coast Guard officials, not all of the 21 potential shipboard emergency scenarios contained in the 2018 Coast Guard guidance are applicable for each type of vessel or for all geographical operating areas. For example, specific emergency procedures related to piracy or terrorism, cargo-related accidents, helicopter rescue operations, or loss of key personnel may not be necessary for towing vessels, given the nature of their operations, their limited size, and the reduced number of crew required to operate that type of vessel. Similarly, icing conditions would not be expected to be included in the SMS plans for those vessels that operate solely in temperate waters. Additional time may be needed to incorporate expanded potential shipboard emergency scenarios into existing SMS plans. Although the Coast Guard guidance identifying the 21 potential shipboard emergency scenarios was issued in April 2018, vessel operators may still be in the process of revising their SMS plans to include additional potential shipboard emergency scenarios and applicable emergency response procedures. For example, we observed that six of the 21 scenarios included in the 2018 Coast Guard guidance are not listed in related guidance provided by the International Association of Classification Societies. These six scenarios are among those observed with the lowest frequency during our review of SMS plans. It is feasible that information related to these scenarios—such as loss of key personnel, or loss of communications with a vessel—may exist elsewhere in vessel operators’ SMS documents or in other vessel plans, but not incorporated as potential shipboard emergency response scenarios as proposed in the 2018 Coast Guard guidance. Along these lines, officials from the ROs with whom we spoke also noted that, in accordance with the ISM Code, they routinely use a sampling approach when conducting annual company SMS audits, and would generally not review the entire scope of an SMS plan each year. As a result of the sampling process, the annual audits occurring since April 2018 may not have addressed any potential “observations” related to the expanded scope of potential shipboard emergencies included in the Coast Guard guidance for SMS plans. As noted previously, the ISM Code and corresponding U.S. regulations and Coast Guard guidance allow vessel operators flexibility in how they address SMS functional requirements, including the documentation of potential shipboard emergencies and applicable response procedures in their SMS plans. Following the EL FARO incident, in 2018 the Coast Guard developed guidance to help inform vessel operators and ROs of potential shipboard emergency scenarios to consider. However, similar to the SMS-compliance and oversight practices used by comparable agencies in other developed countries, we found that the Coast Guard does not have a direct role in reviewing or approving vessel SMS plan documents, including response procedures for potential shipboard emergency scenarios. Rather, as described earlier, the Coast Guard relies on periodic vessel inspections and oversight of ROs that perform more rigorous ISM audits on the Coast Guard’s behalf. Although the Coast Guard has taken positive steps since 2018 to develop additional guidance and increase the number of observations of RO audits and inspections, the extent to which these efforts will result in any specific changes to the content of SMS plans by vessel operators in the future is yet to be determined. We requested comments on a draft of this report from DHS and the Coast Guard. Officials from the Coast Guard provided technical comments, which we incorporated into the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the U.S. Coast Guard, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (206) 287-4804 or AndersonN@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. Federal regulations allow the Commandant of the Coast Guard to delegate certain functions to authorized classification societies. In order for a classification society to be recognized by the Coast Guard and receive statutory authority to carry out delegated functions as a Recognized Organization (RO), the classification society must meet certain requirements, including having functioned as an international classification society for at least 30 years and having established a history of appropriate corrective actions in addressing vessel casualties and deficiencies, among other things. With respect to safety management systems (SMS), ROs—once authorized by the Coast Guard—are able to perform SMS-related audits and issue SMS-related certifications and documentation. The following information summarizes the key roles and responsibilities of ROs related to International Safety Management (ISM) Code certification services and the key activities that ROs perform to fulfill their delegated SMS compliance functions on behalf of the Coast Guard. Interim verification. When a new company (i.e., vessel owner/operator) is established, or an existing company wants to add a new vessel type to its current Document of Compliance, the RO is to first verify that the company has an SMS that complies with ISM Code requirements. If the RO determines that the company is in compliance, it issues the company an interim Document of Compliance (which applies to the entire company) that is valid for up to 12 months. Initial verification. After receiving an interim Document of Compliance, a company applies for ISM Code certification, and an RO conducts an SMS audit of the company’s shoreside management system that is to include a visit to the company’s physical offices. Following the satisfactory completion of the audit and verification that the company’s SMS has been in operation for at least 3 months, the RO would issue the company a Document of Compliance that is valid for 5 years. After the RO issues the Document of Compliance, the RO is to verify that the company’s SMS has been functioning effectively for at least 3 months for each of the vessels for which the company is seeking a Safety Management Certificate. A Safety Management Certificate is vessel- specific and may only be issued to a vessel if the company holds a valid Document of Compliance. To perform the initial verification, the RO is to assess each vessel to determine if the company’s SMS is being employed effectively on that vessel. Annual or intermediate verification. The RO is responsible for verifying a company’s Document of Compliance every year and for verifying the company’s Safety Management Certificates at least once during the 5- year period covered by the issued certificates. ROs generally verify Safety Management Certificates between 2 and 3 years after their issuance. Annual and intermediate verifications are opportunities for the RO to verify whether the company has taken appropriate actions to sufficiently address any deficiencies the RO may have identified during previous audits. Renewal verification. Up to 3 months before a company’s Document of Compliance or a vessel’s Safety Management Certificate expires, the RO is to conduct a renewal verification. The renewal verification is to address all elements of the SMS, including activities required under the ISM code. Additional Verification. The Coast Guard may also require additional verification to ensure that an SMS is functioning effectively—for example, to make sure that the company has sufficiently implemented appropriate corrective actions to address any identified deficiencies. This appendix provides summary information on the Coast Guard’s process for evaluating safety management system (SMS) deficiencies and corrective action options if a Coast Guard marine inspector identifies any SMS-related deficiencies during a vessel inspection. In mid-2018, Coast Guard officials identified 10 key performance indicators to be used to evaluate the performance of Recognized Organizations (RO). Information on these 10 performance indicators is summarized below. 1: Number of RO-issued statutory findings divided by the number of statutory surveys conducted (e.g., 100 findings / 10 surveys = 10 Key Performance Indicators). 2: Number of RO Safety Management Certificate audit findings divided by the number of Safety Management Certificate audits conducted 3: Number of RO Document of Compliance audit findings divided by the number of Document of Compliance audits conducted (includes all types of Document of Compliance audits). 4: Number of RO associations to Port State Control Detentions under the Paris and Tokyo Memoranda of Understanding, and Coast Guard Port State Control programs. 5: Number of International Association of Classification Societies Procedural Requirement-17s (IACS PR-17) issued divided by the total number of RO applicable surveys conducted. 6: Total number of U.S. commercial vessel casualties divided by the total number of commercial vessels in the U.S. fleet of responsibility. 7: Total number of RO nonconformities issued by the Coast Guard divided by the number of statutory surveys and International Safety Management (ISM) audits conducted. 8: Total number of Coast Guard-issued deficiencies related to statutory certificates divided by the total number of Coast Guard inspections conducted. 9: Total number of RO-associated Flag State Detentions divided by the total number of statutory surveys and audits performed. 10: Number of Coast Guard-issued ISM-related deficiencies divided by the total number of Coast Guard inspections completed. Nathan Anderson, (206) 287-4804 or AndersonN@gao.gov In addition to the contact named above, Christopher Conrad (Assistant Director), Ryan Lambert (Analyst-in-Charge), Ben Nelson, Elizabeth Dretsch, Tracey King, Kevin Reeves, and Benjamin Crossley made key contributions to this report.", "summary": "In October 2015, the U.S cargo vessel EL FARO sank after encountering heavy seas and winds from Hurricane Joaquin, killing all 33 crew members. Subsequent investigations cited deficiencies in the vessel's SMS plans as a factor that may have contributed to the vessel's sinking. Some in Congress have raised questions about the effectiveness of vessel SMS plans and the Coast Guard's oversight of third parties responsible for ensuring vessels comply with international standards and federal regulations. The Hamm Alert Maritime Safety Act of 2018 included a provision for GAO to review Coast Guard oversight and enforcement of vessel SMS plans. Accordingly, this report addresses (1) how the Coast Guard (a) verifies domestic commercial vessels' SMS plans comply with federal regulations and (b) conducts oversight of ROs, and (2) the extent to which domestic vessels' SMS plans identify potential shipboard emergencies and include applicable response procedures. To address these objectives, GAO reviewed Coast Guard regulations and guidance, accompanied marine inspectors on vessel inspections and audits, and analyzed available data on identified vessel deficiencies. GAO also reviewed the format and content of a nongeneralizable sample of 12 SMS plans representing various types of vessels and interviewed relevant Coast Guard and RO officials. The Coast Guard verifies that domestic commercial vessels comply with safety management system (SMS) requirements through activities that include conducting annual inspections of applicable U.S.-flagged vessels. In practice, the Coast Guard delegates primary vessel SMS compliance activities to third party entities, called Recognized Organizations (ROs). Among their responsibilities, ROs coordinate with vessel operators to review SMS plans, issue applicable vessel certificates, and conduct SMS compliance audits at the company level and aboard each vessel. Because the Coast Guard relies on ROs to perform SMS certification services on its behalf, it has initiated a series of efforts to enhance its oversight of ROs since 2018. The efforts include: establishing a new group within the Coast Guard to monitor ROs, developing new SMS-related guidance and work instructions, increasing direct observations of ROs performing SMS audits, developing key performance indicators for assessing ROs, and requesting internal investigations for certain RO deficiencies. It is too soon to assess the effectiveness of these efforts; however, GAO believes these are positive steps toward enhancing the Coast Guard's oversight of ROs. Each of the 12 domestic vessel SMS plans GAO reviewed include potential shipboard emergencies and applicable response procedures to address them. None of the plans address all 21 potential shipboard emergencies included in 2018 Coast Guard guidance. However, these 21 potential emergencies are not required to be included in SMS plans; rather, they are suggested as part of the 2018 guidance. Further, GAO found that the SMS plans may not address all potential shipboard emergencies because not all emergency scenarios are applicable for each type of vessel or geographical operating area. Also, vessel operators may still be in the process of revising their SMS plans to include additional emergency scenarios and applicable response procedures.", "document_type": "gao"}
{"report": "The Secret Service’s primary responsibility is to physically protect the President, Vice President, their immediate families, and visiting foreign dignitaries as well as the White House complex. The Office of Protective Operations is the principal office responsible for providing protection. Within the Office of Protective Operations, agents may be assigned to a number of divisions, such as PPD, VPD, or one of the other divisions that is responsible for protecting former presidents and visiting heads of state or heads of government. The Uniformed Division, which is also part of the Office of Protective Operations, is charged with protecting facilities and venues for Secret Service protectees. Uniformed Division officers control access to the White House complex—which includes the White House itself, the Eisenhower Executive Office Building, and the Department of the Treasury building—and the Vice President’s residence. The Secret Service’s secondary responsibility is to conduct criminal investigations in areas such as financial crimes, identity theft, counterfeiting of U.S. currency, computer fraud, and computer-based attacks on banking, financial, and telecommunications infrastructure. Over time, its investigative mission has grown to encompass a wide range of financial and cybercrimes. In addition to investigating financial and electronic crimes, special agents conduct protective intelligence— investigating threats against protected persons, including the President, and protected facilities, such as protectee residences. These activities are conducted through the Office of Investigations, which oversees the agency’s field office structure. Agents assigned to the field offices also support protective operations by, for example, providing physical protection with the assistance of federal, state, and local law enforcement entities when a protectee travels. Because agents are trained to conduct both criminal investigations and to provide protection, agents assigned to investigations in field offices can contribute to protective operations when needed. The Secret Service has experienced a number of protection-related security incidents on the White House complex since April 2012. Incidents have included attempts to gain access to the White House complex by foot, car, and air. These incidents, among others, highlight some of the many challenges the Secret Service confronts while providing protection. See figure 1 for a description of selected security incidents. The PMP’s 2014 report made 19 recommendations regarding (1) training and personnel; (2) technology, perimeter security, and operations; and (3) leadership. We found that the Secret Service fully implemented 11 recommendations and is in the process of implementing the remaining eight recommendations. Table 1 summarizes the progress that the agency has made implementing each recommendation. Appendix I provides further details on the actions the Secret Service has taken to address each recommendation. Following the PMP’s recommendation that the Secret Service should “clearly communicate agency priorities, give effect to those priorities through its actions, and align its operations with its priorities,” the Secret Service took steps toward communicating internally and externally the precedence of protection. For example, the agency hired a Senior Executive Director of Communications in 2016 and formed the Office of Communications and Media Relations in 2018 to manage the agency’s public affairs efforts and to oversee internal agency communication. Additionally, each year the Director of the Secret Service issues a strategic priority memorandum that identifies priority areas for the upcoming fiscal year budget. Further, from fiscal year 2014 through fiscal year 2018, special agents across the entire agency worked more hours on protection assignments and fewer hours on investigations. Specifically, in fiscal year 2014, agents spent 4.3 million hours (54 percent) on protection and 2.8 million hours (36 percent) on investigations, whereas in fiscal year 2018, agents spent 4.9 million hours (59 percent) on protection and 2.2 million hours (26 percent) on investigations. The number and percentage of hours spent on protection peaked in fiscal year 2016, but was higher in fiscal year 2018 than in fiscal year 2014. Figure 2 shows the distribution of agent work hours. The Secret Service has identified protection as its priority, and the Secret Service has identified training as an essential component of protection. In its December 2014 report, the PMP found that the security incident at the White House on September 19, 2014, arose from a “catastrophic failure of training”. The PMP therefore recommended, and Secret Service agreed at the time, that special agents assigned to PPD and VPD train for 25 percent of their work time. This was to be accomplished by allowing agents time to train during the designated training shift, known as the “fourth shift”. However, while training for special agents agencywide increased to 10 percent by 2018—more than triple the amount from fiscal year 2014— training for those assigned to PPD and VPD did not increase accordingly. Specifically, special agents assigned to PPD and VPD reported attending training for about 5.9 percent and 2.9 percent of their regular work hours in fiscal year 2018, respectively, compared with 3.3 percent and 1.9 percent in fiscal year 2014. (See figure 3.) According to our analysis of Secret Service self-reported data, in fiscal year 2018, special agents assigned to PPD and VPD missed achieving the 25- percent training target by 76 and 88 percent each. Figure 3 shows the share of regular work hours that agents assigned to PPD and VPD spent in training in fiscal years 2014 through 2018 compared to the annual target. The Secret Service established the 25 percent training target for agents assigned to PPD and VPD, and senior officials reaffirmed the target in March 2019. However, according to a senior Office of Protective Operations official, the fast operational tempo (i.e., heavy workload) hampered agents’ ability to participate in training. This official told us that the amount of protection that the Secret Service provides dictates how often agents are assigned protection assignments during the training shift. Senior Secret Service officials further added that the number of protectees and the amount of travel for the current protectees is higher for the current administration than for prior administrations, which reduces the time agents have available for training. According to Secret Service officials, the Secret Service’s ability to meet the PPD and VPD training targets is dependent on increased staffing levels. The Secret Service outlined its plans to increase staffing levels in the Secret Service FY 2018–FY 2025 Human Capital Strategic Plan, which was published in May 2017. The plan describes, among other things, the agency’s human capital strategic goals, the process used to determine staffing needs, and annual hiring targets. By the end of fiscal year 2025, the agency plans to employ 9,595 individuals overall, including 4,807 special agents—an increase of 1,193 special agents from the end of fiscal year 2018. To meet the special agent target, the Secret Service assumes an average net growth of about 182 special agents per year between fiscal years 2019 through 2025. However, the Secret Service’s human capital strategy does not address the immediate need to help PPD and VPD meet training targets. Even though the special agent staffing level increased from fiscal years 2014 to 2018 by 332 agents, training levels for agents assigned to PPD and VPD remained below the 25- percent target at 6 and 3 percent, respectively, in fiscal year 2018. Because of the agency’s zero-fail responsibility to protect the President and Vice President, the PMP concluded that it is imperative that the Secret Service strive to address training deficits as soon as possible. In addition, according to leading management practices related to training and development efforts, adequate planning allows agencies to establish priorities and determine the best ways to leverage investments to improve performance. As part of the planning, agencies may need to compare various training strategies in terms of, among other things, the availability of resources and risk of unfavorable consequences if training investments are not made. The agency has focused on increasing training as part of its eight-year human capital strategy, but the Secret Service has not developed a plan to ensure that it meets near-term protection-related training targets. One way that the agency could address PPD and VPD training needs in the short term is to shift agents from investigations to protection assignments. Because all agents are trained to provide protection and to conduct investigations, they can be moved between investigations and protection when dictated by operational circumstances. For example, in fiscal year 2016 agents worked about 548,000 fewer investigative hours in order to support protection than they did in fiscal year 2015. This shift was made to accommodate increased protection demand from candidates in the November 2016 presidential election. See figure 5. In fiscal year 2018, agents across the agency spent nearly 2.2 million hours on investigations. By comparison, agents assigned to PPD and VPD would have needed an additional 136,000 hours and 66,000 hours of training, respectively, in fiscal year 2018 to reach the training targets. Shifting agents from investigations to protection would reduce field offices’ capacity to complete investigations. However, the agency’s stated priority is protection, and training was identified by the PMP as a key component of protection. Increasing staffing levels, as planned, over the long term may adequately support the protective and the investigative priorities at the levels defined by the agency. However, the Secret Service is relying on hiring goals alone to achieve its training-related targets, and it may not be able to achieve its hiring goals because of, among other things, uncertainty about whether enough funding will be requested and appropriated to expand the agency at planned levels. For example, an increase of 89 special agents was requested in the fiscal year 2020 budget submitted to Congress, 88 special agents short of the 177 planned for in the Secret Service FY 2018–FY 2025 Human Capital Strategic Plan. Further, the Secret Service has not developed a plan specifically for meeting training targets for agents assigned to PPD and VPD given current and planned staffing levels. While reviewing a draft of this report and after further consideration of the resources required to achieve the PMP-recommended training targets, in May 2019 the Secret Service stated that it no longer agrees with the training target recommended by the PMP and plans to reevaluate it. Developing and implementing a plan for meeting established training targets given current and planned staffing levels will help ensure that protection-related training targets are met in the near term and that agents assigned to PPD and VPD are prepared to carry out Secret Service’s priority—protection. The PMP recommended, and Secret Service agreed, that Uniformed Division officers—who provide protection at the White House—train for 10 percent of their work time. However, the Secret Service cannot fully assess progress towards achieving the 10-percent training target because it lacks complete and appropriate protection-related training data for Uniformed Division officers. Standards for Internal Control in the Federal Government state that management should design control activities to achieve objectives and respond to risks, and that management should implement control activities through policies. Appropriate types of control activities include, for example, the accurate and timely recording of transactions. Internal control standards also state that management should use quality information to achieve the entity’s objective. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. According to Secret Service officials, training data for Uniformed Division officers are collected through various means and systems. For example, officials stated that they use a database called ePerson to capture certain types of training, such as firearms and physical training requalification sessions. In addition, officials report that Secret Service separately uses DHS’s Performance and Learning Management System (PALMS), which DHS designed to consolidate existing learning management systems for each of DHS’s agencies. PALMS collects data on computer-based training and training provided at the James J. Rowley Training Center automatically, but requires manual entry for training provided at offsite locations. According to Secret Service officials, there are a significant amount of internal on-the-job training instances that do not get recorded. As a result, training data collected on Uniformed Division training hours are incomplete. Further, we reviewed the training data that the Uniformed Division provided to us and identified a number of data quality issues affecting the data’s completeness and appropriateness. For example, certain training was identified by location only or lacked descriptions to clearly link the training to the skills Uniformed Division officers require while working at the White House. Additionally, Secret Service counted training unrelated to protection, such as training on electronic travel vouchers and retirement planning, towards achievement of the 10-percent protection- training target. This occurred because the Secret Service lacks a policy with a documented process identifying how to capture Uniformed Division training information and the type of training to be captured. According to Uniformed Division management, the Secret Service initiated a process in 2017 to enhance the collection and compilation of Uniformed Division training information. Specifically, each Uniformed Division branch training coordinator is to send a list of completed training to Uniformed Division management every 2 weeks. That training information, along with information captured in other systems such as PALMS, is then to be manually compiled by a Uniformed Division staff person at Secret Service’s headquarters. However, the Secret Service has not consistently employed the new process since initiating it in 2017. For example, according to Secret Service officials, the individual responsible for compiling the data was absent from the position for 3 months, and they did not know whether the data for that period were compiled at that time. As personnel—such as the branch training coordinators or the individual responsible for compiling the data—change positions, it is important that the Secret Service have a policy with a documented process to ensure that data collection continues over time and given staff changes. Further, the process does not include information on how or whether to capture internal on-the-job training instances, or instruction on the type of training to be captured to demonstrate that the training is protection-related training. Developing and implementing a policy with a documented process to collect complete and appropriate Uniformed Division officer training data would better position Secret Service to assess Uniform Division officer training data and make informed decisions about whether and how training needs and the 10-percent training are being met. Protecting the White House, the President, and the Vice President, among others, is a zero-fail responsibility. As such, the Secret Service must be prepared to face every evolving threat in a rapidly changing environment. This involves having certain specific security skills and routine training on an ongoing basis. In December 2014, the PMP recommended that the Secret Service align its operations with its priorities, and chief among these is protection. It further recommended, and the Secret Service agreed to, achieving specified training targets. While training alone will not guarantee the safety of the Secret Service’s protectees, developing and implementing a plan for meeting protection- related training targets would better prepare special agents to effectively respond to the security threats faced by the President and other protectees. Further, the Secret Service lacks a documented process for collecting Uniformed Division training data that the agency can use to determine whether officers trained for 10 percent of their work hours, as recommended by the PMP. Implementing such a policy could help the Secret Service make informed decisions about Uniformed Division training. We are making the following two recommendations to the Secret Service: The Director of the Secret Service should develop and implement a plan to ensure that special agents assigned to PPD and VPD reach annual training targets given current and planned staffing levels. (Recommendation 1) The Director of the Secret Service should develop and implement a policy that documents the process for collecting complete Uniformed Division officer training data and establishes the types of information that should be collected. (Recommendation 2) We provided a copy of this report to DHS for review and comment. DHS provided written comments, which are reproduced in appendix II. DHS also provided technical comments, which we incorporated as appropriate. In its comments, Secret Service, through DHS concurred with the two recommendations. However, related to the first recommendation— develop and implement a plan to ensure that special agents assigned to PPD and VPD reach annual training targets given current and planned staffing levels— Secret Service also stated that after further consideration, the agency no longer believes that the annual training target for Presidential and Vice Presidential Protective Divisions should be set at 25 percent of their work time. We incorporated this change in our report. In its comments, the agency stated that the Secret Service Office of Training will work with the Office of Protective Operations to evaluate the training metric for PPD and VPD and develop a plan focusing on increasing capacity at training facilities, achieving staffing growth, and creating efficiencies in protective division scheduling. With respect to the second recommendation—to develop and implement a policy that documents the process for collecting complete Uniformed Division officer training data and establish the types of information that should be collected—Secret Service, through DHS stated that it will develop rigorous and uniform standards for collecting and reporting training data related to the Uniformed Division branch. The agency also stated that it will continue to add training programs to the Performance and Learning Management System and capture informal and on-the-job training hours for the Uniformed Division. DHS stated that the Secret Service expects to review the Enterprise Personnel Schedule System within the next 2 months and anticipates these efforts will result in a more accurate and expansive method for reporting Uniformed Division training. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or AndersonN@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In October 2014, the then-Secretary of Homeland Security established the United States Secret Service Protective Mission Panel (PMP) and tasked the independent panel to review the security incident that occurred at the White House on September 19, 2014 as well as related security issues. The PMP made 19 public recommendations—as well as additional classified recommendations—to the U.S. Secret Service (Secret Service) in three areas: (1) training and personnel; (2) technology, perimeter security, and operations; and (3) leadership. In this appendix, we list the 19 recommendations and accompanying text as published in the Executive Summary to Report from the United States Secret Service Protective Mission Panel to the Secretary of Homeland Security, dated December 15, 2014. The Secret Service Recruitment and Retention Act of 2018 includes a provision that we report on a detailed summary of the Secret Service’s progress implementing the PMP’s recommendations. Specifically, for each recommendation, we provide our assessment of the Secret Service’s progress, describe some of the actions the Secret Service has taken to implement the recommendations, and identify the actions the agency said it plans to complete. Provide a true “Fourth Shift” for training the Presidential and Vice Presidential Protective Divisions, so that they spend two weeks out of every eight in training, and ensure that Uniformed Division officers are in training for no less than 10 percent of their time. According to the PMP, “Only with constant training can all of the teams at the White House perform the coordinated actions needed to effectively respond.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: The Secret Service instituted a fourth and fifth shift for its Presidential Protective Division (PPD) and a fourth shift Vice Presidential Protective Division (VPD). The fourth shift was created to provide agents with time to participate in training educational opportunities, conduct advances, and take leave. Implementation is still in progress because neither PPD nor VPD special agents consistently used this time to train and are missed the training targets established by this recommendation. In commenting on a draft of this report in May 2019, the Secret Service stated that it no longer agrees with the training target and plans to reevaluate it. The Secret Service does not have a documented process for collecting complete and appropriate Uniformed Division training data that the agency can use to determine whether officers trained for 10 percent of their work hours. The Secret Service adopted the PMP goal for agents assigned to PPD and VPD to train for 25 percent of their regular work hours. However, in fiscal year 2018, according to self-reported data, these agents attended training for about 5.9 percent and 2.9 percent of their regular work hours, respectively. Although the fourth shift was developed to provide special agents assigned to PPD and VPD time away from shift work during which they could attend training, agents have largely not attended training during the fourth shift, according to agency officials. Agents are instead assigned to additional advance assignments or use leave, as agents are not allowed to take leave during the three regular shifts except in an emergency. Additional action(s) Secret Service plans to take: In its FY 2018–FY 2025 Human Capital Strategic Plan and FY 2018 – FY 2025 Training Strategic Plan, the Secret Service stated that increasing staffing levels would allow the agency more flexibility with how it schedules shifts and advance assignments, thereby freeing up special agents’ and Uniformed Division officers’ time for training. The agency plans to have 4,807 agents and 1,797 Uniformed Division officers by the end of fiscal year 2025, up from 3,614 agents and 1,559 officers at the end of fiscal year 2018. The Secret Service also plans to reevaluate the training target for special agents assigned to PPD and VPD. Implement integrated training focused on ensuring that all teams at the White House know their roles in responding to specific threats. According to the PMP, “Teams need to train with the full complement of forces with which they will operate in real life, and the training needs to be provided force-wide, not just to those on duty on the day that training is scheduled.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: To provide integrated training between different Secret Service units, the agency conducted 10 live training exercises and six discussion-based tabletop exercises with personnel from different units in fiscal year 2017. About every two weeks, agents assigned to PPD and VPD each conduct drills and training scenarios, some of which incorporate Uniformed Division officers. In addition, the Secret Service began offering Emergency Action and Building Defense training in October 2014 to Uniformed Division personnel. In fiscal year 2017, the Secret Service conducted 10 live training exercises and 6 discussion-based tabletop exercises with personnel from different units. Among the live exercises, the Secret Service conducted a readiness exercise at the White House in December 2017. About every two weeks, agents assigned to the PPD and VPD conduct drills and training scenarios, some of which incorporate Uniformed Division officers, according to a Secret Service official. These drills take place at the White House, the Naval Observatory, the Department of Treasury building, and the Rowley Training Center. Secret Service began offering Emergency Action and Building Defense training in October 2014 to Uniformed Division personnel. Topics addressed in the course include judgment, firearm control, constitutional law, and emergency medicine. The Emergency Action and Building Defense course is part of the training that new Uniformed Division recruits take. In recent years, the Secret Service conducted joint training exercises with local, state, federal, and foreign tactical units. According to Secret Service officials, the agency conducted 53 of these joint training exercises in fiscal year 2015 through 2018. Train in conditions that replicate the physical environment in which they will operate. According to the PMP, “A security team should also be trained so that it is intimately familiar with the space in which it is operating.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: To train in conditions that replicate the White House, the Secret Service secured approval to build a White House Mockup Training Facility at the James J. Rowley Training Center in Beltsville, Maryland. However, the Department of Homeland Security’s (DHS) fiscal year 2019 budget request to Congress did not include funding for the facility. In 2017, the National Capital Planning Commission approved the Secret Service’s revised master plan for the Rowley Training Center, which includes the White House Mockup Training Facility. The fiscal year 2019 Resource Allocation Plan request submitted by the Secret Service to DHS included $77.4 million for the construction project over 5 years. However, the fiscal year 2019 DHS budget request did not include funding for the facility. Some agent and officer training takes place in the operating environment. According to a Secret Service official, agents assigned to the PPD and VPD run drills and training scenarios about every two weeks. Some of the training takes place at the White House, the Naval Observatory, and the Department of the Treasury building, although most training takes place at the Rowley Training Center. These drills and scenarios sometimes also include Uniformed Division officers. In December 2017, the Secret Service conducted a readiness exercise involving multiple units at the White House. Additional action(s) Secret Service plans to take: The Secret Service will proceed with construction of the White House Mockup Training Facility when funding is available. It was not included in DHS’s fiscal year 2019 budget request. Increase the Uniformed Division, as quickly as can be appropriately managed, by an initial 200 positions, and the Presidential Protective Division by 85 positions. Perform additional analyses and, likely, further increases as necessary. According to the PMP, “Both the Uniformed Division and the Presidential Protective Division are currently stretched beyond their limits.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service increased the number of Uniformed Division officers and the number of agents assigned to PPD by 214 and 151 persons, respectively, from the end of fiscal year 2014 to the end of fiscal year 2018. Further, special agent and Uniformed Division officer external attrition rate declined year-over-year from fiscal year 2016 to fiscal year 2018. The Secret Service also conducted additional analyses to determine optimal staffing levels to be reached by the end of fiscal year 2025. The Secret Service met or exceeded its hiring goals for special agents and Uniformed Division officers in fiscal year 2016 and fiscal year 2018. From the end of fiscal year 2014 to the end of fiscal year 2018, the Secret Service increased the number of agents assigned to PPD from 248 to 399—a net increase of 151 agents—and the number of Uniformed Division officers from 1,345 to 1,559—a net increase of 214 officers. The Secret Service conducted additional analyses and set hiring goals in the FY 2018–FY 2025 Human Capital Strategic Plan. Specifically, by the end of fiscal year 2020, the Secret Service aims to have 3,927 special agents, 1,657 Uniformed Division officers, and 2,366 Administrative, Professional, and Technical staff. By the end of fiscal year 2025, the Secret Service aims to have 4,807 special agents, 1,797 Uniformed Division officers, and 2,991 Administrative, Professional, and Technical staff. Additional action(s) Secret Service plans to take: The Secret Service is planning to continually validate the human capital strategic plan to ensure that staffing levels are responsive to changes in the agency’s operational tempo. The Secret Service also plans to fill administrative jobs that are currently filled by Uniformed Division officers with Administrative, Professional, and Technical employees, so that the Uniformed Division personnel are more focused on protection. Reform and professionalize recruiting, hiring, promotion, and rotation process that puts the most talented, capable individuals in place as efficiently as possible. According to the PMP, “The Secret Service must continue efforts to develop a professionalized recruiting and hiring process that finds talented individuals, evaluates candidates rigorously for the Presidential Protective Division, and hires them quickly.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service hired a Chief Human Capital Officer to run the new Office of Human Resources. In addition, the agency implemented several initiatives to strengthen recruiting, expedite hiring, and clarify the promotion process. The Secret Service reorganized the Office of Human Resources as a stand-alone directorate and hired a Chief Human Capital Officer, who is a professional administrator. The Secret Service developed a National Recruitment Strategy for FY 2016–FY 2020 and the Recruitment and Outreach Plan for FY 2018 to help ensure that the agency is able to meet its staffing requirements through effective and targeted recruitment strategies. Recruitment strategies include increasing the agency’s social media presence, improving the training of its recruiters, and expanding cooperation with the Department of Defense to recruit service members departing the military. The Secret Service developed a number of hiring initiatives, which according to agency officials, reduced time-to-hire for special agents and Uniformed Division officers from an average of 395 days in fiscal year 2016 to 285 days in fiscal year 2018. For example, the agency created Entry Level Assessment Centers that allow applicants to complete several application steps in one week, including the entrance examination, the Special Agent and Uniformed Division Pre- employment Review, and the security interview. The agency also established the Applicant Coordination Center to track applicant processing. In particular, the Applicant Coordination Center brings together a polygraph examiner, a nurse, a security clearance adjudicator, and a human resources specialist to usher candidates through the hiring steps. The agency also began using the web-based Applicant Lifecycle Information System to view applicant materials, process security investigations, send conditional job offers, and track candidates’ progress in one place. The Secret Service published special agent Career Progression guidelines in September 2015 and published a revision to the special agent Merit Promotion Process for agents in May 2017. Additional action(s) Secret Service plans to take: According to agency officials, the Secret Service is currently revising the Uniformed Division Merit Promotion Process and is implementing the Administrative, Professional, and Technical Career Progression Plan. The agency also plans to update and consolidate internal policies for agent and Uniformed Division officer recruitment and hiring. Ensure that the Office of Technical Development and Mission Support proactively reviews and refreshes the Service’s technological footprint. The Service should receive dedicated funds for technology, both within its own budget and within DHS Science and Technology’s budget, to accomplish these tasks. According to the PMP, “Technology systems used on the complex must always remain on the cutting edge, and the Secret Service must invest in technology, including becoming a driver of research and development that may assist in its mission.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: To address current technical capabilities and future needs, Secret Service officials stated that, as of October 2018, the Office of Technical Development and Mission Support was drafting a strategic investment plan. According to Secret Service officials, the agency is continuing to explore new technology to enhance its technological capabilities to mitigate threats, including threats to airspace. According to an agency official, as of October 2018, the Office of Technical Development and Mission Support is drafting a five-year strategic investment plan. The plan is to address current technical capabilities as well as needs into the future. According to Secret Service officials, for more than 10 years, the Secret Service’s Science and Technology Review Committee has met quarterly to discuss protection-related technology requirements. The committee is chaired by the Chief Technology Officer, overseen by the Enterprise Governance Council, and open to representatives from all Secret Service directorates. The Enterprise Governance Council is composed of Deputy Assistant Directors from several Secret Service offices and is responsible for overseeing the agency’s investments in science and technology, information technology, and other capital assets. Also according to agency officials, the Secret Service works with the DHS Science and Technology Directorate, partner agencies, and external stakeholders on technological issues. In particular, the Science and Technology Directorate develops pilot programs based on the Secret Service’s technical requirements. According to an agency official, the Secret Service conducts performance reviews of different technology systems each month with the aim of evaluating the performance of every deployed system at least once per year. In fiscal year 2017, Congress appropriated $2.5 million to the Secret Service for research and development. In addition, the Act appropriated $1.8 billion to the Secret Service for Operations and Support, and the Secret Service allocated $98.2 million to the Secret Service for the Operational Mission Support, which helps to protect the President, Vice President, and others from emerging explosive, chemical, biological, radiological, and cyber threats. The funding for the Operational Mission Support program is divided between technology operations and support; procurement, construction, and improvements; and research and development. According to agency officials, the Secret Service does not receive dedicated technology funds through the DHS Science and Technology Directorate. Additional action(s) Secret Service plans to take: Complete and execute the Office of Technical Development and Mission Support’s 5- year strategic investment plan. The plan is intended to address research and development regarding, among other things, ways to mitigate emerging physical and technical threats and identify additional threats. Replace the outer fence that surrounds the 18 acres of the White House complex to give Secret Service personnel more time to react to intrusions. According to the PMP, “The current seven-and-a-half-foot fence, not just along Pennsylvania Avenue but around the compound’s entire perimeter, must be replaced as quickly as possible.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: As of March 2019, the Secret Service was planning to begin construction of the first phase of the new White House fence in May 2019. As a temporary measure, in 2015, the Secret Service and the National Park Service installed bike-rack barricades about 12 feet in front of the permanent fence. As a temporary measure, in 2015 the Secret Service and the National Park Service installed bike rack barricades about 12 feet in front of the permanent White House fence. According to Secret Service officials, the bike-rack barricades give Secret Service personnel more time to respond to fence-jumpers. The Secret Service additionally installed several interim countermeasures to the existing fences, including additional spikes. The Secret Service is preparing to break ground and begin construction on the Phase I sections of the White House fence in May or June 2019, according to an agency official in December 2018. Phase I includes a fence surrounding the White House and its immediate grounds. The Commission of Fine Arts and the National Capitol Planning Commission approved the Phase I project in January and February 2017, respectively. Additional action(s) Secret Service plans to take: Phase I fence construction is scheduled to begin in May or June 2019. Phase II planning and construction. In its fiscal year 2019 budget request, the Secret Service requested $3 million for preliminary design development of Phase II of the White House fence project. Phase II is to expand the new fence to the Treasury Building and the Eisenhower Executive Office Building. Clearly communicate agency priorities, give effect to those priorities through its actions, and align its operations with its priorities. According to the PMP, “Secret Service’s leadership must make those choices in a manner to ensure that its core protective mission remains first priority.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: The Secret Service has taken steps to communicate that protection is its priority. The agency reiterated its priorities in its 2018– 2022 Strategic Plan and hired a Director of Communications in 2016 to manage the agency’s public affairs efforts and to oversee internal agency communication. However, the Secret Service has not fully aligned its operations with its priorities. For example, in response to the PMP’s 2014 report identifying that the security incident of September 2014 arose from a “catastrophic failure of training,” the Secret Service agreed to having its Presidential and Vice Presidential Protective Divisions train 25 percent of their work hours. Implementation of this recommendation is in progress because its operations do not fully align with the stated priorities, as these divisions are not training at agreed-upon levels. To implement this recommendation, the Secret Service sought to improve internal and external communication efforts. The agency did so by hiring a senior executive Director of Communications in 2016 and forming the Office of Communications and Media Relations in 2017 to manage the agency’s public affairs efforts and to oversee internal agency communication. In addition, in October 2015, the Secret Service developed an internal agency communication platform known as Spark!. The Spark! platform allows all employees to share ideas and submit suggestions on how to improve the agency’s performance and efficiency, thereby improving communication within the agency. The DHS Office of Policy reviewed the dual missions of the Secret Service and issued a report that emphasized the importance of the protective and investigative missions (January 2017). Secret Service officials cited this report as evidence that the agency evaluated its priorities and resource allocation decisions. Secret Service data show that agents increased the share of work hours spent on protection compared with investigation from fiscal year 2014 to fiscal year 2018. Overall, based on our analysis of Secret Service data, 59 percent of special agent hours in fiscal year 2018 were spent on protection and 26 percent on investigations. This is in contrast to 54 percent protection and 36 percent investigations in fiscal year 2014. However, agents worked an average of 2.2 million hours annually on investigations over that period, even though agents assigned to the PPD and VPD did not meet training targets during that time. Despite shifting resources toward protection, the Secret Service’s operations and associated resource allocation do not fully align with its stated priority, protection, because training is an essential component of agents’ protection assignments. Promote specialized expertise in its budget, workforce, and technology functions. According to the PMP, “Filling important administrative functions with agents rather than professional administrators may not be optimal.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: To promote specialized expertise in certain business functions, the Secret Service hired a Chief Operating Officer to run the agency’s business functions and elevated senior civilian (non-agent) executives, including the Chief Technology Officer and the Chief Financial Officer, to lead key staff offices. The agency also hired new professional administrators, instead of promoting special agents, to serve in other senior positions, such as Chief Human Capital Officer and Chief Strategy Officer. The Secret Service reorganized the agency to promote specialized expertise in certain functions. In 2015, the Secret Service established the position of Chief Operating Officer. This principal administrator, who is equivalent in rank to the Deputy Director, directs the agency’s business and programmatic activities, with a focus on improving performance, hiring and retaining personnel, and aligning budgetary and strategic planning efforts. The Secret Service professionalized the leadership of several directorates by elevating or hiring civilian senior executives, instead of placing special agents in these specialized positions. For example, in 2015, the civilian who was serving as Chief Financial Officer was placed in charge of the newly created Office of the Chief Financial Officer. Similarly, the Chief Information Officer was placed in charge of the newly created Office of the Chief Information Officer. Also, in 2015, the civilian Chief Technology Officer was placed in charge of the Office of Technical Development and Mission Support, and the Secret Service hired a civilian from outside of the agency to become Chief Human Capital Officer—a position that was formerly held by a special agent. In 2016, the agency created two additional senior, civilian positions: Chief Strategy Officer and Director of Communications. Secret Service officials stated that the agency is currently developing a training course to instruct senior special agents in the agency budget process. Present a zero-based or mission-based budget that will provide sufficient resources to accomplish its mission, beginning immediately by working within DHS to adopt a workforce staffing model. According to the PMP, “The Service must build a new budget from the ground up by defining its mission, determining what it will take to achieve it, and asking for that. The mission is important enough to justify that approach.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: The Secret Service has incorporated principles of mission- based budgeting in its budget formulation process. According to Secret Service officials, modeling staffing needs is a key part of mission-based budgeting, and personnel costs accounted for about 71 percent of the Secret Service’s fiscal year 2018 budget. The Secret Service developed—and continues to refine—four staffing models that use internal and external data to establish the optimal staffing levels across the agency. Under mission-based budgeting, also known as zero-base budgeting, the agency is to rebuild the budget by clearly defining its mission and desired outcomes and determining what funding level is needed to obtain those outcomes. This process is in contrast to making incremental changes from the prior year’s budget. budgeting process into its overall budget formulation. The Director annually issues priority memos to guide the development of the Secret Service Resource Allocation Plan submissions to DHS. In The Secret Service has worked to incorporate a mission‐based 2016, the Office of the Chief Financial Officer introduced a mission‐ based budgeting approach for developing the FY 2018 – FY 2022 Resource Allocation Plan submission. Further, the Secret Service’s Resource Allocation Plan prioritizes the agency’s needs for inclusion in DHS’s annual budget request to Congress. Part of the Secret Service’s mission-based budgeting approach involved assessing human capital needs. The Secret Service developed four workforce staffing models that provided a basis to identify valid baseline staffing levels for the agency, a key component to the mission-based budgeting process. According to Secret Service officials, these staffing models are designed to ensure that the agency is staffed in such a way that its personnel are properly trained, overtime is minimized, and proper support personnel are in place so that it is fully prepared to meet mission demands. The Secret Service used the results of the staffing models to develop the Secret Service FY 2018–FY 2025 Human Capital Strategic Plan, published in May 2017, which detailed the agency’s plan to increase the workforce to 9,595 total employees by the end of fiscal year 2025. Secret Service officials acknowledge that they still have to strengthen their budget processes. Specifically, they would like to make the budget process more analytical and data-driven. For example, agency officials want to make better use of budget data to support planning and budget requests, such as by combining financial data with programmatic information to better inform budget decisions. Agency officials want to hire one or more individuals who can better interpret and use those data. Additional action(s) Secret Service plans to take: Secret Service officials said they plan to continue to hone the staffing models. For example, the agency plans to include annual leave and increased training levels in the next iterations of the models. Create more opportunities for officers and agents to provide input on their mission and train its mid- and lower-level managers to encourage, value and respond to such feedback. According to the PMP, “Leadership and, even more critically, mid- and lower-level managers, need to make clear that their mission requires that they get things right—and thus that the agency values information out of sync with the status quo or the leadership’s views.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: To improve communication between the workforce and senior leaders, the Secret Service created a platform on its intranet known as Spark! that encourages employees to submit ideas to senior leaders on how to improve the agency’s performance. In October 2015, the Secret Service deployed the Spark! platform, which allows all employees to share ideas and submit suggestions on how to improve the agency’s performance and efficiency. The platform allows two-way communication between leadership and the workforce. The Secret Service reported that in 2017, 96 percent of employees have contributed to a discussion on the site. The agency also reported that, as of June 2018, 51 workforce-generated ideas had been implemented or were being implemented. According to Secret Service officials, several ideas that originated from employees have prompted changes at the agency. These developments include the formation of a new category of employees, known as Technical Law Enforcement in 2018; the introduction of a chaplaincy program in 2017; and the development of the Administrative, Technical, and Professional Career Track. Since 2015, the Secret Service offered a training course on workplace communication called “Enhancing Workplace Communication”. According to agency data, 72 employees took the course in fiscal year 2017 and 2018. From November 2014 to December 2015, the Secret Service contracted with Eagle Hill Consulting to conduct an independent assessment of quality-of-life issues at the Secret Service. The agency workforce was able to provide input through 47 focus groups and an agency-wide anonymous survey. In its final report dated August 22, 2016, Eagle Hill Consulting provided Secret Service management with 22 recommendations to improve quality of life for agency employees. Additional action(s) Secret Service plans to take: The Secret Service plans to introduce additional leadership courses for personnel at all levels. It also plans to remove potential barriers to communication between employees and supervisors by revising merit promotion processes for Uniformed Division officers and for special agents. Lead the federal protective force community. According to the PMP, “Collaboration with protective forces like the Federal Protective Service, the Pentagon Force Protection Agency, the FBI Police, and the State Department’s Bureau of Diplomatic Security and other agencies, especially on technology, could significantly increase opportunities for innovation.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service has engaged with other protective forces, across the federal government, such as the Federal Protective Service, through various mechanisms, including a leadership symposium and technology sharing efforts. According to Secret Service officials, the agency has provided assessments and assistance to other government partners in this area. In 2015, the Secret Service chaired a leadership symposium with other federal agencies to discuss roles, responsibilities, and procedures in the event of a critical incident in the National Capital Region and specifically at the White House. Secret Service officials stated that the agency often consults with federal peers to benchmark capabilities and organizational structures to identify possibilities for improvement. In addition, officials stated that the Secret Service partners with other agencies, leading to technological developments. Developments to date include deployment of a fixed-site sub-sonic detection capability with the Metropolitan Police Department of the District of Columbia; a fixed- site super-sonic detection capability with the U.S. Army; and a vehicle motorcade detection capability with the Department of Defense. The Secret Service’s Protective Intelligence and Assessment Division participates in the International Security Events Group when a Secret Service protectee will be traveling to a high-profile international event, such as the Olympics Games. The International Security Events Group is a working group for over 20 federal security and law enforcement agencies and is managed by the Department of State. According to Secret Service officials, at the request of the Office of Management and Budget, the Secret Service has shared expertise with other agencies, including the U.S. Marshals Service, to help to standardize the protection of cabinet-level government officials. Also according to agency officials, the Secret Service leads the federal force protective community in many areas. For example, the agency’s Hazardous Agent Mitigation Medical Emergency Response team has the capability to detect, mitigate, and response to chemical, biological, radiological, and nuclear attacks on protectees, and the team consults with other agencies on these issues, according to agency officials. Additional action(s) Secret Service plans to take: None. Receive periodic, outside assessments of the threats to and strategies for protecting the White House compound. According to the PMP, “The Secret Service should engage other federal agencies to evaluate the threats that the agency faces and its ways of doing business.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service regularly engages with outside partner(s) to have the threats to and strategies for protecting the White House complex assessed. The Secret Service has a memorandum of agreement in place with partner agencies to ensure that the outside assessments continue. Between 2015 and 2018, non-Secret Service partner(s) assessed the threats to and strategies for protecting the White house compound between two and four times per year. Resume participation in international fora with comparable protective services of friendly nations. According to the PMP, “While most national protective forces do not compare to the Secret Service, those of certain nations are much more similar than they are different.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service, through the Office of Investigations and the Office of Strategic Intelligence and Information, maintains relationships with international partners to share information. In 2018, the Secret Service, among other things, provided training at International Law Enforcement Academies, which are administered by the Department of State, and provided threat assessments to European partners. The Office of Investigations’ International Programs Division provides training to foreign law enforcement organizations through the Department of State’s International Law Enforcement Academies. The Secret Service provides training at all five of the academy’s locations: Bangkok, Thailand; Budapest, Hungary; Gaborone, Botswana; San Salvador, El Salvador; and Roswell, New Mexico. According to agency officials, the Secret Service provided instruction on the agency’s protection methods to over 900 personnel in 2018. The Office of Strategic Intelligence and Information maintains international partnerships to enable the sharing of information and best practices. For example, in 2018, agency officials presented threat assessments to European partners on at least two occasions. Secret Service officials noted that the agency hosts groups of foreign law enforcement personnel for dignitary protection seminars. The seminars are intended to, among other things, encourage future cooperation. Additional action(s) Secret Service plans to take: The Secret Service plans to establish a process for developing proposals to enhance intelligence and operational activities with foreign partners. The agency also plans to formalize a process for senior executive approval of these proposals. Give leadership’s priorities and reform the organization’s sustained attention and hold the agency accountable through to their completion. According to the PMP, “Following through on reforms and recommendations has been an issue for the Secret Service in the past.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: To ensure that the agency implemented the PMP’s recommendations, the Office of Strategic Planning and Policy (OSP) was tasked with overseeing and tracking the PMP’s recommendations. This office also coordinated the development of key strategy documents to guide the agency’s efforts. Secret Service executive leaders tasked OSP to oversee and track the implementation of the PMP’s recommendations. The Office of Strategic Planning and Policy coordinated the development of three key strategy documents: the FY 2018 – FY 2022 Strategic Plan, the FY 2018 – FY 2025 Training Strategic Plan, and the FY 2018 – FY 2025 Human Capital Strategic Plan. Additionally, the OSP refined existing performance measures and is developing additional mechanisms to enhance reporting on performance goals to senior leadership. This includes monthly and quarterly reports on key performance metrics and indicators. In January 2017, the agency revived its Enterprise Governance Council, a deliberative body made up of the deputies from each Secret Service directorate. The Enterprise Governance Council oversees agency-wide priorities, including managing the Resource Allocation Plan process, which prioritizes the Secret Service’s needs for inclusion in the annual budget request. Implement a disciplinary system in a consistent manner that demonstrates zero tolerance for failures that are incompatible with its zero-failure mission. According to the PMP, “It is clear that the rank-and-file—and even very senior current and former members of the Secret Service—do not have confidence that discipline is imposed in a fair and consistent manner.” Status: Implemented; ongoing work may be required to ensure recommendation is sustained. Actions Taken by the Secret Service Summary: The Secret Service established the Office of Integrity in 2013 to centralize and standardize the disciplinary system across the Secret Service. According to agency officials, for each substantiated incident of employee misconduct, the Chief Integrity Officer and Deputy Chief Integrity Officer determine what formal disciplinary action, if any, is warranted. Further, the Discipline Review Board, composed of senior representatives from each directorate, oversees the discipline system and hears appeals from most personnel. (A separate process is in place for members of the Senior Executive Service.) Disciplinary outcomes are detailed in an annual report so as to increase transparency within the agency. The Office of Integrity was established in 2013 to centralize the disciplinary system across the agency. Previously, Special Agents in Charge of field offices had the responsibility of addressing employee misconduct and determining the penalty, according to an agency official. In 2015, the Office of Integrity began publishing an annual discipline report which provides an overview of disciplinary actions taken by deciding officials and analyzes misconduct trends. Additional action(s) Secret Service plans to take: The Secret Service plans to conduct a formal review and periodic analysis of the Office of Integrity to ensure that it is fulfilling its intended purpose. Hold forces accountable for performance by using front-line supervisors to constantly test readiness. According to the PMP, “To be ready for a job where quick reactions and reflexes are critical, supervisors need to drive home to their officers and agents that the front line is constantly being tested.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: The Secret Service introduced new policies and plans to study whether to introduce a “random check” program to test employees’ readiness. In addition, according to Secret Service officials, special agents assigned to PPD and VPD run biweekly drills and training scenarios at the White House complex and at the Vice President’s Residence, while Uniformed Division officers are briefed on emergency actions and responsibilities at shift changes. This recommendation is in progress because it requires additional tests for readiness. In December 2017, the Secret Service conducted scenario readiness exercise involving multiple units at the White House. According to Secret Service officials, the agency runs drills and training scenarios about every 2 weeks. These drills have taken place at the White House, the Naval Observatory (the Vice President’s Residence), and at the Department of the Treasury building. Agents assigned to PPD and VPD are the primary training participants, but Uniformed Division officers are often involved as well. More recently, the training scenarios have included other groups if the practice incident is off, or near the edge, of the White House complex. For example, training scenarios may include U.S. Park Police or Secret Service personnel assigned to the Washington Field Office. The Uniformed Division conducts daily personnel shift briefs, which cover emergency actions and responsibilities. The Office of Protective Operations instituted training classes for personnel assigned to the Joint Operations Center. The Joint Operations Center is located away from the White House and is responsible for managing day-to-day Secret Service operations and coordinating emergency response. Additional action(s) Secret Service plans to take: The Secret Service plans to study whether to introduce a “random check” program to test employees on their responsibilities at operational posts. The next director of the Secret Service should be a strong leader from outside the agency who has a protective, law enforcement, or military background and who can drive cultural change in the organization and move the Secret Service forward into a new era. According to the PMP, “The need to change, reinvigorate, and question long-held assumptions—from within the agency itself—is too critical right now for the next director to be an insider.” Status: Implemented. Actions Taken by the Secret Service Summary: Randolph “Tex” Alles was appointed the Secret Service director in 2017 and was in that position until 2019. He had not worked at the Secret Service prior to taking on this role, but he served previously as Acting Deputy Commissioner of U.S. Customs and Border Protection and in the U.S. Marine Corps. This recommendation was implemented through presidential action, as the Secret Service does not select its own director. Establish a leadership development system that identifies and trains the agency’s future managers and leaders. According to the PMP, “To promote from within and move the agency forward, however, the Secret Service needs to do a better job of identifying future leaders and preparing them for the role.” Status: Implementation in progress. Actions Taken by the Secret Service Summary: The Secret Service has taken steps to improve its leadership development system and has provided leadership training at different levels with a focus on first-line supervisors. The agency is also developing the “Framework for Leadership Development,” which is to identify courses and training opportunities to promote leadership skills at all levels. The Secret Service adopted the DHS Leadership Development Program in 2015 to encourage leadership development at all levels. The agency has provided leadership training at different levels. For example, 409 employees have attended the Seminar for First Line Supervisors since 2015. Since 2016, 178 employees attended the Antietam Leadership Experience, which is a course for supervisors, managers, and senior team leads that focuses on leadership development and capabilities. Since 2018, 41 employees attended the Building Leaders Training Course, which is designed for non- supervisory team leads. The Office of Human Resources, in coordination with the Rowley Training Center, has begun to develop a “Framework for Leadership Development” program to craft effective courses and training requirements tailored to individuals throughout their careers. The Secret Service put on a number of events to emphasize the importance of leadership within the agency in fiscal year 2018 as part of the DHS’s “Leadership Year,” a department-wide effort to promote leadership skills. An intranet site on Leadership Year Resources was also created to centralize information on leadership development resources. In addition, the Director of the Secret Service recorded a video message on leadership that was posted on the agency’s intranet. The agency also established a peer-to-peer award recognition program. The agency established the Leadership Development Council in March 2018, with representatives from each of the four occupation groups (special agents; Uniformed Division officers; Administrative, Professional, and Technical staff; and Technical Law Enforcement staff) and across all grade levels. Additional action(s) Secret Service plans to take: Finalize the Framework for Leadership Development and roll out the program to the agency. Complete development of the Strategic Leadership Course for Managers, which is designated to be a two-week course to promote leadership and strategic planning. Nathan Anderson, (202) 512-3841 or andersonn@gao.gov. In addition to the contact above, Joseph P. Cruz (Assistant Director), Kisha Clark (Analyst-in-Charge), Willie Commons III, Elizabeth Dretsch, Eric Hauswirth, and Eric Warren made key contributions to this report.", "summary": "The Secret Service, a component of the Department of Homeland Security (DHS), is responsible for protecting the President, the Vice President, and their families, as well as the White House complex. In October 2014, following several security lapses, the Secretary of Homeland Security established the Panel, an independent panel of experts, to review White House security and other aspects of Secret Service operations. The Secret Service Recruitment and Retention Act of 2018 contains a provision for GAO to report on the progress made by the Secret Service in implementing the Panel's recommendations. This report addresses the extent to which the Secret Service has implemented the recommendations in the Panel's 2014 report. GAO reviewed Secret Service documents, analyzed agency training and labor-distribution data from fiscal years 2014 through 2018, and interviewed agency officials and Panel members. The U.S. Secret Service (Secret Service) has made progress implementing the 19 recommendations related to training and personnel; technology, perimeter security, and operations; and leadership made by the U.S. Secret Service Protective Mission Panel (Panel). The Secret Service fully implemented 11 of the recommendations. For example, the agency increased the number of agents and officers in the divisions that protect the President and White House and secured approval to build a new fence around the White House complex. The Secret Service is in the process of implementing the remaining eight recommendations. The Panel found that the security incident of September 19, 2014, when an intruder jumped the north fence and entered the White House, arose from a “catastrophic failure of training.” The Panel recommended, and the Secret Service agreed, that the Presidential and Vice Presidential Protective Divisions train for 25 percent of their work time. However, the Secret Service has not met this target and lacks a plan for achieving it. In fiscal year 2018, special agents assigned to these divisions trained for about 6 percent and 3 percent, respectively, of their regular work hours (see figure). In commenting on a draft of this report in May 2019, the Secret Service stated that it no longer agrees with the training target and plans to reevaluate it. Developing and implementing a plan for ensuring that the established training target is met given current and planned staffing levels would better ensure that agents assigned to the Presidential and Vice Presidential Protective Divisions are prepared to carry out Secret Service's protection priority. In addition, the Secret Service does not have a policy with a documented process for collecting complete and appropriate (i.e., protection-related) training hour data for Uniformed Division officers. Implementing such a policy will better position the Secret Service to assess the training data and make informed decisions about whether and how training needs are being met. GAO is making recommendations to the Secret Service: (1) develop and implement a plan to ensure that special agents assigned to the Presidential and Vice Presidential Protective Divisions reach annual training targets, and (2) develop and implement a policy that documents the process for collecting complete and appropriate data on Uniformed Division officer training. DHS concurred with the two recommendations.", "document_type": "gao"}
{"report": "In February of each year, the President submits the budget request for VHA health care, which includes requested funding for the upcoming fiscal year as well as an advance appropriation request to Congress. VHA allocates funds by the beginning of each fiscal year—October 1—to VISNs and medical centers based on the amount VA received in the advance appropriation. Once appropriations are enacted for the upcoming fiscal year, VHA updates the allocated funding levels for VISNs and medical centers. For example, VHA’s appropriations for fiscal year 2018 included advance appropriations for fiscal year 2019. VHA allocated funds by October 1, 2018 (the beginning of fiscal year 2019), based on the advance appropriation for fiscal year 2019 and updated the funding levels once appropriations for fiscal year 2019 were enacted. VHA allocates general purpose funds to its 18 VISNs through the Veterans Equitable Resource Allocation (VERA) model. It uses a separate model, called the Medical Center Allocation System (MCAS), to allocate each VISN’s general purpose funds—as determined by the VERA model—to the medical centers within each network. VHA guidance permits VISNs to make adjustments to the general purpose funding levels determined by MCAS for each medical center. VHA uses other methods to allocate specific purpose funds to VHA program offices that manage various health care programs, such as those for community care, prosthetics, and homelessness. The program offices, in turn, typically allocate funds for these programs directly to medical centers. (See fig. 1.) Once funds are allocated and distributed to VISNs and medical centers, these funds may be redistributed in accordance with law across VA’s health care system. These redistributions can help address unfunded needs or surpluses that may arise. For example, according to officials, a medical center may need additional funds to provide care for veterans when natural disasters occur. From fiscal year 2015 to fiscal year 2019, general purpose funds increased by 33 percent- from $37 to $49 billion—while specific purpose funds increased by 24 percent—from $19 to $23 billion. (See fig. 2.) In fiscal year 2019, community care accounted for $10.5 billion—46 percent—of the $23 billion allocated in specific purpose funds. Patient care services, homelessness programs, non-recurring maintenance, and medical residency programs also accounted for large portions of specific purpose funds. As of fiscal year 2017, VA primarily receives appropriated funds for all health care it provides or purchases through four appropriation accounts. The amount of funds in each appropriation account is determined by VA’s annual appropriation. VHA allocates both general and specific purpose funds from these appropriation accounts. These accounts include the following: Medical Services: health care services provided to eligible veterans and other beneficiaries in VA facilities and non-VA facilities, among other things. Medical Community Care: health care services that VA authorizes for veterans and other beneficiaries to receive from community providers. Medical Support and Compliance: the administration of the medical, hospital, nursing home, domiciliary, supply, and research activities authorized under VA’s health care system, among other things. Medical Facilities: the operation and maintenance of VHA’s capital infrastructure, such as the costs associated with nonrecurring maintenance, leases, utilities, facility repair, laundry services, and groundskeeping, among other things. Separate from VA’s health care appropriation accounts, the Veterans Access, Choice, and Accountability Act of 2014 established the Veterans Choice Fund and provided $10 billion in funds for the Veterans Choice Program (Choice Program), which was implemented in early fiscal year 2015 and authorized until funds were exhausted or through August 7, 2017, whichever occurred first. The Choice Program allowed veterans to elect to receive care from community providers when the services needed were not available at a VA medical center, were not available within VHA’s wait-time goals, or when veterans did not reside near a VA medical facility with a full-time primary care provider. Eligible veterans could also elect to receive care in the community if they met other eligibility criteria as well. VA received additional authority and funds to maintain the Choice Program through June 6, 2019, when it sunsetted, and the new Veterans Community Care Program (VCCP) went into effect. The VCCP was established by the VA MISSION Act and consolidated the Choice Program along with several other community care programs. The VCCP is primarily funded through specific purpose funds in the Medical Community Care appropriation account. The VCCP is similar to the former Choice Program in allowing veterans to elect to receive care from community providers when certain eligibility criteria are met, including criteria relating to the availability and accessibility of the services at VHA. Under the VCCP, VHA adopted designated access standards for VCCP eligibility determinations that are broader than the eligibility criteria that existed under the Choice Program. VHA’s VERA model uses a national, formula-driven approach that considers the number and type of veterans served and the complexity of care provided—collectively referred to as patient workload—as well as certain geographic factors, such as local labor costs, to determine the amount of general purpose funds each VISN should receive. VHA uses VERA to establish funding levels for each VISN in the following areas: patient care, equipment, education support, and research support, the largest of which is patient care. After determining the amount of funds VISNs should retain for VISN-level initiatives, administrative purposes, and reserves, VHA uses its MCAS model to distribute the remainder of each VISN’s general purpose funds to medical centers within the VISN. MCAS is based on a workload measure developed by VHA, called patient-weighted work (PWW) that accounts for medical center-level factors such as patient volume, case- mix, and specialized services. According to VHA officials, PWW establishes an equitable measure of workload among medical centers that vary significantly in their geographic location, and types and costs of services provided. Furthermore, PWW lessens the impact of cost differences between medical centers, by recognizing the varying costs and levels of resource intensity associated with providing care for each patient at each medical center. For example, PWW would result in more funds being allocated to a medical center that provides more complex care, such as open heart surgery, than a workload measure based solely on a count of each individual patient, which would not account for the additional costs associated with more complex care. Similar to MCAS, VHA’s Office of Community Care uses a patient workload-based model to allocate community care funds—which are specific purpose funds—to medical centers, based on each medical center’s community care patient workload in prior years. To determine the community care funding needs for each medical center, VHA calculates the PWW associated with community care. VHA determines the total amount of funds available for community care based on the amounts appropriated to the Medical Community Care appropriation account and the amount available for community care in the Veterans Choice Fund. VHA distributes the funds to each medical center in proportion to each medical center’s PWW. VHA officials told us that VHA is considering making changes to the methodology for allocating community care funds under the new VCCP, but as of July 2019, updates to the methodology had not been developed or implemented. The other four program offices we reviewed developed other methodologies for allocating other specific purpose funds. In general, these methodologies involve coordination between VISNs and their medical centers on needs for these funds and allocating available funds based on identified needs. For example, the Office of Patient Care Services which manages prosthetics and hepatitis C drugs allocates available funds based on identified needs by each of the medical centers. Appendix 1 provides an overview of the methodologies used by these four program offices to allocate special purpose funds. To allocate funds for an upcoming fiscal year, VHA’s allocation models rely on actual patient workload data from prior fiscal years, but not the most recently completed fiscal year. VHA’s VERA model relies on actual patient workload data from two to six years prior to the upcoming fiscal year, in addition to future workload projections. For example, to allocate funds for fiscal year 2019, the VERA model relied on actual workload data from fiscal years 2013 and 2017, in addition to some future projected workload, but did not take into account actual workload data from fiscal year 2018. VHA’s MCAS and community care models rely on actual patient workload data from two years prior to the upcoming fiscal year. For example, the 2019 MCAS and community care models were based on actual workload data from fiscal year 2017, but did not take into account actual workload data from fiscal year 2018. According to VHA officials, patient workload data from the most recently completed fiscal year are not yet available when VHA runs the preliminary VERA, MCAS, and community care models for each fiscal year in August. However, these officials told us that these data would be available in December of each year and therefore could be incorporated into the final model run after VHA receives its enacted appropriation amount for the upcoming fiscal year. These officials told us that doing so would result in little to no delay in when the final model run and the final distribution of funds takes place, which occurs after the appropriation act is enacted. Specifically, according to officials from VHA’s Office of Finance, if the full fiscal year appropriation is enacted prior to the start of the fiscal year on October 1, VHA will be able to perform the final model runs by mid- November. As a result, incorporating data from the most recent fiscal year would result in a one month delay in the final model run. Should the enactment of a full year appropriation be delayed, the timing of the final model would not be impacted by using data from the most recently completed fiscal year. (See fig. 3.) A VHA Office of Finance official told us that VHA had not previously considered using patient workload data from the most recently completed fiscal year because VHA did not believe that using updated data would have a significant impact on the model. However, the official told us that the implementation of the VCCP in June 2019 may result in more significant year-to-year workload changes due to veterans increasing their use of VHA health care services. As a result, the official told us that using more up to date information would be more useful in informing allocation levels. Federal standards for internal control related to information calls for management to use quality information to achieve the entity’s objectives. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Because the VERA, MCAS, and community care models do not use the most up-to-date patient workload data available, the models may not reflect the most recent workload trends affecting medical centers. This may result in funding levels determined by the models that may not be commensurate with medical centers’ actual patient workload. For example, VHA data we reviewed show that some medical centers experienced workload changes in fiscal year 2018—changes that were not captured by the models for fiscal year 2019 allocations. Specifically, from fiscal years 2017 through 2018, while PWW for care provided by VA medical centers grew over 1 percent VHA-wide, 34 medical centers experienced growth of over 3 percent, and 9 experienced a decline of over 3 percent. Similarly, the PWW for care in the community grew over 6 percent VHA-wide from fiscal year 2017 to fiscal year 2018, with 97 medical centers experiencing growth of over 3 percent and 25 experiencing a decline in community care of over 3 percent over this time period. Additionally, officials we interviewed at six VISNs told us that the models have not accounted for recent workload growth their medical centers were experiencing due to an increase in the number of veterans they serve, the addition of new services, or changes in the medical centers’ reliance on community care. Two of these VISNs analyzed recent workload trends at the medical centers within their VISN and allocated additional funds to those medical centers with recent growth not accounted for by MCAS. If VHA were to incorporate the most recent available workload data into its allocation models, the need for such funding changes would likely be reduced. As part of the allocation process, VISNs may make adjustments to the amounts of general purpose funds calculated by MCAS and allocated to medical centers. VHA guidance requires VISNs to provide a written explanation to VHA for any adjustments. However, we found that VHA does not adequately monitor these adjustments and that some of these adjustments may lead to inefficiencies. We found that VHA Office of Finance officials did not adequately review the fiscal year 2019 MCAS adjustments to ensure that adjustments were documented and fully explained. Specifically, VHA did not provide evidence that they sought an explanation for MCAS adjustments made by 2 VISNs that provided no written explanation for their adjustments, even though these explanations are required by VHA guidance. VHA Office of Finance officials said they use informal methods via email to learn about the adjustments and follow-up as needed, but could not provide documentation that follow-up and review had occurred. Additionally, VISN officials we interviewed from all 18 VISNs stated that they had not received questions or other feedback from the VHA Office of Finance on the adjustments they made, even if they had not documented and explained the adjustments. Furthermore, even if VISNs follow the requirement and submit written explanations for the adjustments, they may not provide the type of information VHA needs to adequately monitor the adjustments. This is because VHA guidance does not require VISNs to provide information on how they determined how much and for what reasons they are making the adjustments. For example, we found that 6 VISNs provided limited explanations for their fiscal year 2019 MCAS adjustments, such as stating that they had decided to reallocate funds among medical centers to ensure “continuity of operations,” which is insufficient information to allow VHA to determine if the adjustments were appropriate. Federal standards for internal control related to monitoring state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. These monitoring activities could include establishing a formal process to document VHA’s review of VISN adjustments to medical center allocations. Additionally, monitoring activities could include requiring VISNs to provide information on how they determined how much and for what reasons they are making the adjustments and then reviewing such information. As VHA evaluates the adjustments, documenting the results of its monitoring and having the information needed to help determine the appropriateness of the adjustments will help VHA identify areas for improvement in the allocation process. Without adequate monitoring, VHA cannot reasonably ensure these adjustments are justified and align with VA’s strategic plan, which calls for the efficient allocation of funds. Based on interviews with VISN officials, we found that, in fiscal year 2019, seven VISNs adjusted the allocations determined by MCAS to ensure that every medical center within their VISN received either the same level of funding or a minimum funding increase of up to 2 percent relative to the prior year. According to VISN officials, funds were often shifted from medical centers that had received relatively large increases in funds due to growing workload to medical centers that had received a decrease or relatively flat funds compared to the prior year due to either declining or relatively flat workload. According to VISN officials, declining workload may be the result of medical centers serving fewer patients or patients obtaining care from community providers rather than VA providers. When asked about these adjustments, officials at the seven VISNs stated that they were necessary to ensure that affected medical centers could continue to cover the costs for the services they offer and the staff they employ, including providing federally mandated annual salary increases for those staff. Officials from four of these VISNs stated that it is difficult for medical centers to absorb a funding cut or only a small increase in funding from one year to the next due to rising costs they face. While VISNs are allowed to make adjustments to medical centers’ allocated general purpose funds, these adjustments may lead to inefficiencies because medical centers are not required to improve efficiency—such as, adjust the level of services they offer—to account for their decreases in workload. Additionally, officials from VHA’s Allocation Resource Center within the Office of Finance, which is responsible for developing and executing VHA’s allocation models, told us that because allocations made through MCAS are based on medical center workload, VISNs should avoid reallocating funds so that all medical centers receive a minimal increase. These officials said that doing so results in medical centers failing to adjust the level of services to meet workload needs. However, we found that for medical centers with declining workload, VHA guidance on allocation of funds does not require VISNs—in conjunction with these medical centers—to develop and submit approaches to improve the efficiency of medical center operations. Such improvements in efficiency would help lower overall costs. As we have previously stated, VHA’s strategic plan calls for the efficient allocation of funds. In addition, federal internal control standards related to control activities state that management should design control activities to achieve agency objectives. Such an activity could include having guidance on the allocation and adjustment of funds that promotes the efficient use of funds for delivering health care services to veterans. Without requiring VISNs—in conjunction with medical centers—to develop and submit an approach to change how medical centers with decreasing workload should operate, VHA increases the risk that these adjustments will not align with VA’s strategic plan. Once funds are allocated and distributed to VISNs and medical centers, VHA uses multiple mechanisms to monitor the balance of general purpose and specific purpose funds. VA uses these mechanisms to ensure that VISNs and medical centers operate within their allocated funding levels and are in compliance with the Anti-Deficiency Act. VHA’s primary monitoring mechanism is through VA’s financial management system, which is used to track obligations and prevent VISNs and medical centers from obligating amounts that are greater than the funds they have available. VHA also employs additional mechanisms to monitor the use of general and specific purpose funds. These additional mechanisms are described below. VHA’s Office of Finance requires each VISN to prepare an annual operating plan after the initial allocation of general purpose funds for each fiscal year that reflects the total planned obligations for the medical centers they oversee. These operating plans describe the planned obligation of funds throughout the fiscal year for various budget categories, such as personnel, equipment, transportation, and supplies and materials. VHA requires planned obligations reported in operating plans to align with the funding levels available to each VISN, which include allocated funds as well as anticipated collections, reimbursements, and funds carried over from previous years. VISNs are required to revise their operating plans during the fiscal year if major changes are made to their available funding levels, due to, for example, the enactment of a final appropriation bill, which results in final allocations. To monitor VISNs’ use of general purpose funds, VHA uses the operating plans to compare each VISN’s planned obligations with actual obligations on a monthly basis. VHA does not compare planned obligations with actual obligations for each medical center individually; instead, each of the 18 VISNs as well as the five medical centers we reviewed developed their own tools to monitor the use of funds. According to VHA officials, VHA requires each VISN to provide an explanation to VHA’s Office of Finance on a monthly basis about any variances of 5 percent or more above or below the amount between planned obligations in their operating plans and actual obligations. Based on VHA documents we reviewed, all 18 VISNs provided explanations for situations in which their actual obligations were equal to, higher, or lower than 5 percent from their planned obligations in fiscal years 2018 and 2019 and in some cases, also explained the actions they were planning to take to address the variance. VISNs reported several reasons for the variances. For example, some VISNs reported that their actual obligations exceeded planned obligations in some months because contracts or equipment purchases were executed earlier than anticipated in the year. Conversely, some VISNs reported that contracting delays led to actual obligations lagging behind planned obligations reported in their operating plans. An official from the VHA Office of Finance told us that they may contact VISN leadership—including the Director and Chief Financial Officer—if the variations are significant and additional actions needed to be taken. VHA Office of Finance officials also told us that they may review other reports if they become aware of an issue of significant interest to VHA leadership regarding a VISN’s or medical center’s obligations. Based on our review of VHA documents and interviews with program office officials, VHA program offices use various monitoring processes developed by each program office to monitor the use of specific purpose funds. Specifically, officials from the Office of Community Care told us that they monitor the use of community care funds by comparing actual obligations to planned obligations based on authorized community care. According to VHA officials, as of February 2019, VHA was in the process of developing an updated process to monitor the use of community care funds, which—starting in fiscal year 2019—were obligated at the time of claim payment rather than when care in the community was authorized. The other four VHA program offices we reviewed monitor the use of the funds they manage by generating a monthly or quarterly budget status report that compares each medical center’s actual obligations against their planned obligations. For example, officials from the Office of Patient Care Services told us that to monitor the use of funds for prosthetics, they conduct monthly reviews of obligations and ask the VISNs and medical centers to explain deviations between the actual and planned expenditures and provide an action plan. After funds are allocated and distributed to VISNs and medical centers, VHA can redistribute funds across the VA health care system in accordance with law. VHA officials told us these redistributions are done to address unfunded needs and surpluses as they are identified and occur throughout the year. However, we found that VHA does not adequately monitor redistributions. We identified the following instances in which allocated funds are redistributed: VHA officials told us that VHA’s Office of Finance redistributes any surplus general purpose and specific purpose funds to medical centers based on VHA priorities and to address needs identified by VISNs. These officials said that these redistributions typically occur after the middle of the fiscal year. As of June 2019, according to VHA officials, one VISN had identified unfunded needs to VHA, but the VISN was working on addressing the funding needs using its own internal resources. Officials from another VISN told us that the VISN anticipated unfunded needs, but had not made a request to VHA for additional funds as of the end of May 2019. VISNs may also exchange funds with other VISNs. For example, if a VISN has excess medical facilities funds but a shortage of medical services funds, the VISN may exchange these funds with another VISN that has excess medical services funds but a shortage of medical facilities funds. According to VHA officials, VISNs must inform VHA about these exchanges of funds, but are not required to provide an explanation and do not require VHA approval for the exchanges. VHA officials told us that VISNs also have the flexibility to redistribute funds throughout the year from medical centers within their VISN that are experiencing a funding surplus to ones with unfunded needs. However, VISNs are not required to inform VHA about these redistributions and are not required to provide an explanation or get approval from VHA. For example, officials at one medical center told us that in recent years, its VISN redistributed an average of $15 million per year above allocated funding levels to this medical center to address unfunded needs. While the redistribution of funds throughout the year gives VHA flexibility to move funds where they are needed, VHA’s Office of Finance does not adequately monitor these redistributions. Specifically, VHA’s Office of Finance does not require VISNs to identify the reasons why they redistribute funds between VISNs and medical centers, and a VHA Office of Finance official told us VHA does not examine the amount of funds that are redistributed. For example, VHA’s Office of Finance could not provide us the total amount of redistributions that occurred throughout fiscal year 2018. As a result, VHA’s Office of Finance does not know why VISNs redistributed funds and the extent to which redistributions resulted in a deviation from VHA’s workload-based allocation levels. Monitoring the redistributions would provide VHA with information on the effectiveness of the allocation models and how they might be improved. VHA’s actions are inconsistent with federal internal control standards related to monitoring, which state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. Without requiring VISNs to provide this information and without requiring VHA to document the results of its review of the redistributions, VHA cannot ensure that these redistributions align with VHA’s workload-based allocation of funds. As a result, VISNs and medical centers may not be efficiently operating within available funding levels, which include allocated funds, collections, reimbursements, and carry over from previous years. VA’s strategic plan calls for the efficient use of funds for delivering health care services to veterans. Accordingly, it is critical that VHA closely monitor and account for how its funds are allocated to VA medical centers and redistributed throughout the year to help ensure the most efficient use of funds. Especially as the number of veterans eligible to receive care from a community provider potentially expands, it will be important for VHA to ensure allocated funding levels accurately reflect individual medical center funding needs. However, VHA has opportunities to strengthen its processes for allocating and monitoring funds distributed across its health care system. VHA could improve how it allocates funds to its VISNs and medical centers if it were to use the most up-to-date workload data available as part of its allocation models. This would allow VHA to account for significant changes in workload from year-to-year. VHA could also improve how it monitors VISN adjustments to medical center allocation levels as well as redistributions that may occur after medical centers receive their allocations. While these adjustments and redistributions afford flexibility and may be appropriate in certain circumstances, VHA does not have the information it needs to monitor these changes to ensure that they are appropriate and consistent with department goals. Specifically, VHA does not require VISNs and medical centers to provide information on how they determined the amount and reasons for adjustments, nor does VHA require VISNs—in conjunction with medical centers— to develop and submit an approach to improve efficiency at medical centers with declining workload, such as adjusting the level of services offered. Additionally, VHA does not require VISNs to identify the reasons why they redistribute funds between VISNs and medical centers after allocations have been made, and VHA does not document its review of these redistributions. As a result, VHA lacks reasonable assurance that adjustments and redistributions align with its strategic goals for efficient use of funds to best serve the needs of veterans across its healthcare system. We are making the following five recommendations to VHA: The VA Under Secretary of Health should use workload data from the most recently completed fiscal year as part of the models that inform VISNs’ and medical centers’ general purpose funding needs, when doing so would not significantly delay the allocation of funds. (Recommendation 1) The VA Under Secretary of Health should establish a formal process to document VHA’s review of VISNs’ adjustments to medical center allocation levels. (Recommendation 2) The VA Under Secretary of Health should revise VHA’s existing guidance to require VISNs to provide information on how they determined how much and for what reasons they made adjustments to medical center allocation levels. (Recommendation 3) The VA Under Secretary of Health should revise its existing guidance to require VISNs—in conjunction with medical centers—to develop and submit approaches to improve efficiency at medical centers with declining workload that received adjusted funding levels. These approaches could include adjusting the level of services offered. (Recommendation 4) The VA Under Secretary of Health should require VISNs to provide explanations on the amount of funds redistributed between VISNs and medical centers and VHA to document its review of these redistributions. (Recommendation 5) We provided a draft of this report to VA for review and comment. In its written comments, reprinted in appendix II, VA concurred with four recommendations and concurred in principle with one recommendation. VA also described steps that it plans to take to implement the recommendations. In addition, VA provided a technical comment, which we incorporated as appropriate. Specifically, VA concurred with the first recommendation, stating that it will re-run the VERA model to allocate funds based on prior year workload data if an enacted budget is passed after the start of the second quarter of the current fiscal year. VA also concurred with the second and third recommendations, stating that it will update guidance to establish a formal process to document the review of VISN adjustments to medical center allocation levels and will require VISNs to provide information on how they determined adjustments prior to processing the adjustments. VA concurred in principle with the fourth recommendation, stating that VHA is conducting market assessments over a multi-year period to increase access and quality of care to veterans. VA said that after completing the market assessments and reviewing information from other VHA efforts, it may consider adjusting the level of services along with other alternatives. VA also concurred with the fifth recommendation, stating it will require review of redistributions between VISNs to ensure adequate explanations are included. According to VA, the department will also run a monthly report identifying redistributions between medical centers in a VISN that exceed 1.5 percent of the VISN’s funding allocation. We are sending copies of this report to the Secretary of Veterans Affairs, appropriate congressional committees, and other interested parties. This report is also available at no charge on the GAO Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or silass@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the Office of Community Care, which managed $10.5 billion, or 46 percent, of specific purpose funds in fiscal year 2019, we contacted four other Veterans Health Administration (VHA) program offices that managed the largest amounts of specific purpose funds in fiscal year 2019—these included funds for patient care services, homelessness programs, non-recurring maintenance, and medical residency programs. These four program offices managed at least $1 billion of funds and collectively managed about 36 percent of all specific purpose funds in fiscal year 2019. The four program offices developed methodologies for allocating specific purpose funds that involve coordinating with VISNs and their medical centers on the purposes for which the funds would be used and allocating available funds based on these needs. See table 1. In addition to the contact named above, Rashmi Agarwal (Assistant Director), Michael Zose (Analyst-in-Charge), and Carmen Rivera-Lowitt made key contributions to this report. Also contributing were Krister Friday, Cathleen Hamann, Jacquelyn Hamilton, and Ethiene Salgado- Rodriguez. VA Health Care: Estimating Resources Needed to Provide Community Care. GAO-19-478. Washington, D.C.: June 12, 2019. VA’s Health Care Budget: In Response to a Projected Funding Gap in Fiscal Year 2015, VA Has Made Efforts to Better Manage Future Budgets. GAO-16-584. Washington, D.C.: June 3, 2016. Veterans’ Health Care Budget: Improvements Made, but Additional Actions Needed to Address Problems Related to Estimates Supporting President’s Request. GAO-13-715. Washington, D.C.: August 8, 2013. Veterans’ Health Care: Improvements Needed to Ensure That Budget Estimates Are Reliable and That Spending for Facility Maintenance Is Consistent with Priorities. GAO-13-220. Washington, D.C.: February 22, 2013. Veterans’ Health Care Budget: Better Labeling of Services and More Detailed Information Could Improve the Congressional Budget Justification. GAO-12-908. Washington, D.C.: September 18, 2012. Veterans’ Health Care Budget: Transparency and Reliability of Some Estimates Supporting President’s Request Could Be Improved. GAO-12-689. Washington, D.C.: June 11, 2012. VA Health Care: Estimates of Available Budget Resources Compared with Actual Amounts. GAO-12-383R. Washington, D.C.: March 30, 2012. VA Health Care: Methodology for Estimating and Process for Tracking Savings Need Improvement. GAO-12-305. Washington, D.C.: February 27, 2012. Veterans’ Health Care Budget Estimate: Changes Were Made in Developing the President’s Budget Request for Fiscal Years 2012 and 2013. GAO-11-622. Washington, D.C.: June 14, 2011. VA Health Care: Need for More Transparency in New Resource Allocation Process and for Written Policies on Monitoring Resources. GAO-11-426. Washington, D.C.: April 29, 2011. Veterans’ Health Care: VA Uses a Projection Model to Develop Most of Its Health Care Budget Estimate to Inform the President’s Budget Request. GAO-11-205. Washington, D.C.: January 31, 2011. VA Health Care: Challenges in Budget Formulation and Issues Surrounding the Proposal for Advance Appropriations. GAO-09-664T. Washington, D.C.: April 29, 2009. VA Health Care: Challenges in Budget Formulation and Execution. GAO-09-459T. Washington, D.C.: March 12, 2009. VA Health Care: Long-Term Care Strategic Planning and Budgeting Need Improvement. GAO-09-145. Washington, D.C.: January 23, 2009.", "summary": "VHA operates one of the largest health care systems in the nation with an estimate of $81 billion for providing care to over 6.9 million veterans in fiscal year 2019. Recently, VHA has repeatedly requested that Congress provide supplemental funding due to higher-than-expected needs for care. GAO was asked to examine how VHA allocates funds and monitors use of these funds. This report examines (1) VHA's processes for allocating general purpose and specific purpose funds to its VISNs and medical centers and (2) the extent to which VHA monitors the use of these funds. GAO reviewed VHA's processes for allocating funds, analyzed data on allocation levels for fiscal years 2015 through 2019, and reviewed documentation on VHA's processes for allocating funds and monitoring. GAO interviewed officials from VHA; all 18 VISNs; and a non-generalizable sample of five medical centers selected based on size, facility complexity, growth in funding, and geographic variation. The Department of Veterans Affairs' (VA) Veterans Health Administration (VHA) has developed processes for allocating health care funds to its regional Veterans Integrated Service Networks (VISN) and medical centers. Each year, VHA allocates about two-thirds of funds for general patient care—known as general purpose funds—using two, main allocation models. The first model allocates general purpose funds to each VISN and a second model then allocates these funds to the medical centers that report to each VISN. These models are based on patient workload—that is, the number and type of veterans served and the complexity of care provided. VHA allocates its remaining one-third of funds—known as specific purpose funds—to program offices that manage various, specific programs, such as community care and prosthetics. Program offices, in turn, allocate these funds directly to medical centers using different methodologies, including a workload-based model for community care. GAO found the following weaknesses in VHA's processes for allocating funds: VHA's allocation models do not use workload data from the most recently completed fiscal year. For example, the fiscal year 2019 allocation levels determined by the models were based on data from fiscal years 2013 through 2017 but did not include data from fiscal year 2018. The models do not use more recent data because officials believed that doing so would not significantly affect allocations. By not using the most recent data available when it makes final allocations, VHA's allocations may not accurately reflect medical centers' funding needs if they experience workload changes. For example, from fiscal years 2017 through 2018, 34 medical centers had patient workload growth of over 3 percent, and 9 experienced a decline of over 3 percent, which was not reflected in the fiscal year 2019 allocations. VISNs are allowed to make adjustments to allocated funding levels determined by the models and must submit written explanations for doing so according to VHA guidance. However, VHA officials did not adequately review adjustments for fiscal year 2019 to ensure adjustments were documented. Specifically, VHA officials did not provide evidence they sought an explanation for adjustments made by two VISNs that provided no written explanation for their adjustments. Furthermore, GAO also found that VHA guidance does not require VISNs to explain how they determined adjustment amounts and why they made them. Without requiring this information, VHA cannot ensure that these adjustments lead to efficient use of funds. Once VISNs have made adjustments to allocated funding levels and funds are distributed to VISNs and medical centers, VHA uses multiple mechanisms to monitor the balance of funds. Throughout the year, VHA redistributes funds across the VA health care system to address unfunded needs and surpluses that are identified. However, GAO found that VHA does not adequately monitor the redistribution of allocated funds between VISNs and medical centers. VHA does not require VISNs to provide explanations for redistributions and does not review the amount redistributed. As a result, VHA does not know the extent to which redistributions deviate from workload-based allocations and if VISNs and medical centers are operating efficiently. GAO is making five recommendations including that VHA use workload data from the most recently completed fiscal year to allocate funds; take steps to review adjustments; revise existing guidance to require VISNs to provide information on adjustment amounts and the reasons for doing so; and require VISNs to provide explanations for redistributions of allocated funds between VISNs and medical centers and then review the amounts redistributed. VA concurred with four recommendations and concurred in principle with one recommendation.", "document_type": "gao"}
{"report": "Congress appropriated $12.8 billion in federal funds under Part B of IDEA for fiscal year 2019. Under IDEA, Education awards funds to state educational agencies (SEA), which provide these funds to local educational agencies (LEA). SEAs also monitor Part B implementation by the school districts. As a condition of receiving IDEA funds, states are required to have policies and procedures in effect that are consistent with IDEA requirements, including requirements related to procedural safeguards and due process procedures. IDEA requires states to make dispute resolution options available, which parents may use to resolve disagreements regarding a school district’s decisions related to the identification, evaluation, and educational placement of their child with a disability, or the provision of a free appropriate public education (FAPE) to the child. These options include: Mediation. Mediation is a confidential, voluntary process in which a trained, qualified, and impartial mediator, paid for by the SEA, works with the parents and school district to try to reach an agreement about the IDEA-related issue in dispute. Mediations can be initiated by either the parent or the school district to resolve any dispute related to IDEA, including matters that arise before filing of a due process complaint. If agreement is reached through the mediation process, the parties must execute a legally binding agreement. Due process complaint. A due process complaint is a request for a formal due process hearing. A due process hearing is conducted before a qualified and impartial hearing officer and involves presentation of evidence, sworn testimony, and cross-examination. It often involves attorneys and expert witnesses, and thus may be more costly than other dispute resolution options for all parties involved. Because a due process hearing is a formal proceeding, it may be more adversarial in nature than other dispute resolution options. Either party can appeal a hearing officer’s decision by bringing a civil action in any state court of competent jurisdiction or in a U.S. district court. Not all due process complaints result in a due process hearing. For example, some due process complaints may be withdrawn by the parents or not meet the requirements for a filing a complaint under IDEA regulations. In addition, in some cases, the parents and school district may resolve the complaint through alternative means, such as mediation. The 2004 IDEA reauthorization added the requirement for a resolution meeting to the due process complaint process to try to resolve the issues in a parent’s due process complaint collaboratively before the parties may proceed to the formal and often costly due process complaint hearing procedure. A resolution meeting must take place within 15 days of a parent filing a due process complaint and before any due process hearing involving a hearing officer, unless both parties agree in writing to waive the meeting or agree to use the IDEA’s mediation process. Settlement agreements reached through resolution meetings must be in writing and are legally binding. State complaint. An individual or an organization, including one from another state, may file a complaint with the SEA alleging that a public agency has violated a requirement of Part B of IDEA or its implementing regulations. Once the SEA receives such a complaint, it must engage in specified procedures to resolve the complaint, including conducting an on-site investigation, if the SEA determines that it is necessary. Generally, the SEA must issue a written decision within 60 calendar days unless exceptional circumstances warrant an extension or the parties agree to extend the timeline to engage in an alternative dispute resolution procedure. The SEA’s written decision must include findings of fact and conclusions and the reasons for the SEA’s final decision. The state’s complaint procedures must include steps for effective implementation of the SEA’s final decision, including any corrective actions to achieve compliance, if needed. IDEA also requires school districts to provide parents with a procedural safeguards notice, which explains all of the procedural safeguards available to them under IDEA. Education’s Office of Special Education Programs (OSEP) administers IDEA, and is responsible for data collection and monitoring, among other responsibilities. Data collection. Under IDEA, SEAs are required to annually report to Education data on the use of mediation and due process procedures. Specifically, SEAs report data to OSEP, including the total number of: mediation requests received, mediation agreements reached (related to a due process complaint or not related to a due process complaint), due process complaints filed, resolution meetings that result in a written settlement agreement, and due process hearings conducted. Each state also reports data on the timely resolution of state complaints and timely adjudication of due process complaints. According to Education officials, all dispute resolution data are aggregated at the state level and Education does not collect dispute resolution data at the school or district level. According to Education officials, Education’s collection of state-level dispute resolution data is consistent with the manner in which grant awards are made for Part B of IDEA. Because states are the grantees, it is the states that report data to Education. Education’s monitoring. IDEA requires Education to monitor SEAs to ensure they meet program requirements. According to Education officials, Education uses multiple methods to monitor states’ implementation of IDEA, including reviewing data submitted by the states in their state performance plans and annual performance reports, conducting on-site monitoring visits to some states each year, and following up on concerns raised via customer calls and letters. Based on its monitoring and review of state dispute resolution data, among other information, Education is required under IDEA to annually determine whether each state meets the IDEA requirements or needs assistance or intervention. Education’s technical assistance. In addition to providing technical assistance to states, Education provides technical assistance to parents and the general public through its Parent Training and Information Centers (PTI) and CADRE. PTIs are designed to help parents of children with disabilities participate effectively in their children’s education. Education’s technical assistance covers a range of topics, including IDEA dispute resolution options. States’ responsibilities. While Education monitors states, IDEA requires states to monitor and conduct enforcement activities in their school districts. States are also responsible for investigating state complaints and producing reports with the results of their investigation, as well as providing mediators as needed to mediate disputes between school districts and parents. States may also provide other support and direct services such as training and technical assistance among other activities. For the 6.8 million students from ages 3 to 21 who were served under IDEA Part B in school year 2016-17, there were a total of 35,142 mediation requests, due process complaints filed, and state complaints filed nationwide. Over about the last decade, this total decreased by about 2 percent, according to data from the Center for Appropriate Dispute Resolution in Special Education (CADRE). In addition, the mix of dispute resolution options used has changed. Since school year 2004-05, the number of due process complaints declined, while the number of mediation requests increased. However, due process complaints still made up more than half the total number of dispute resolution options used in school year 2016-17 (see fig. 1). Due process complaints. While the overall number of due process complaints has declined since school year 2004-05 (from 21,118 to 18,490) the percentage of fully adjudicated due process hearings (i.e., due process complaints that went all the way through the hearing process and a hearing officer rendered a decision) has declined more sharply. In school year 2004-05, about 35 percent of all due process complaints were fully adjudicated; in school year 2016-17, 11 percent were fully adjudicated. Due process complaints may not be fully adjudicated for several reasons. For example, complaints may be withdrawn by the filer, dismissed by the hearing officer, or resolved through other means, such as a resolution meeting or an agreement to try to resolve the dispute through mediation. CADRE’s data show that resolution meetings were held less than half the time due process complaints were filed in 6 of the 12 school years between 2005-06, the first year resolution meetings were used, and 2016- 17. When resolution meetings did occur, they resulted in resolution agreements less than 30 percent of the time in 10 of these 12 years. Mediation. According to CADRE, mediation is viewed as less adversarial than due process hearings, in part, because parties work together to try to reach an agreement. CADRE also reports that mediation is generally believed to be less costly than due process hearings because it typically requires less time and may require less involvement from attorneys and other experts. The number of mediation requests increased from school year 2004-05 to 2016-17 as Education and the states encouraged dispute resolution options that stakeholders told us were less costly and confrontational. In school year 2016-17, there were 11,413 mediations requested, the largest number of requests from school year 2004-05 to 2016-17. In addition, mediation requests resulted in mediation meetings at least 60 percent of the time in each of these school years. Those meetings resulted in agreements at least two-thirds of the time in every year but one (see fig. 2). Furthermore, more than half of the mediation meetings held stemmed from due process complaints that had been filed, which suggests that parties involved in the complaints may have been using mediation meetings to try to avoid a due process hearing. State complaints. State complaints were the least commonly used dispute resolution option. There were 5,239 state complaints filed in school year 2016-17, down from 6,201 in school year 2004-05 (see fig. 3). On average, from school year 2004-05 to 2016-17, approximately two-thirds of complaints filed resulted in the state issuing a report, and about two-thirds of those reports included findings of noncompliance with some aspect of IDEA on the part of the school district. According to state officials we spoke with, a state that receives a complaint will issue a report unless the filer withdraws the complaint, the state determines that the complaint is not about an issue covered under IDEA, or the complaint is resolved through other means. The rate at which all three dispute resolution options were used varied widely across states. Some states and territories had much higher rates of dispute resolution activity than others. In school year 2016-17, due process complaints were generally used at a higher rate nationwide than mediation requests and state complaints, according to CADRE data (27.2, 16.8, and 7.7 per 10,000 IDEA students served, respectively). However, the rate of due process complaints filed in states ranged from a high of 252.1 in the District of Columbia to a low of fewer than 1 per 10,000 IDEA students served in Nebraska, respectively. Similarly, some states had much higher rates of mediation requests and state complaints filed than others. Within states, the mix of dispute resolution options used also varied. In some states, due process complaints were used much more frequently than mediation requests and state complaints, while other states saw mediation requests or state complaints used most frequently. According to state officials, Parent Training and Information Center (PTI) staff, Protection and Advocacy (P&A) agency staff, and other stakeholders we interviewed, parents most commonly engage in IDEA dispute resolution because of concerns they have about the evaluations, placement, services and supports, and discipline related to the educational services their child receives. For example, a dispute related to placement may arise if a parent wants their child to spend more time in a regular education classroom as opposed to a self-contained classroom with only special education students. A parent might also object if a school district wants to place their child in an alternative school. On the other hand, some parents may seek an out-of-district placement for their child if they feel that more services will be available. A dispute over services may center on a parent asking for services for their child that the school district refuses to provide, or a parent believing that the school district is not providing services that are included in their child’s individualized education program. Research we reviewed generally supported what stakeholders told us were the main causes of disputes, although discipline issues were not reported as frequently. Other issues that led to disputes less frequently, according to those we spoke with, included, lack of progress on the part of the student, parental participation in decision making, transition services, and other accommodations for students. When we analyzed five states’ dispute resolution data we found that dispute resolution activity varied based on districts’ income levels. In general, a greater proportion of very high-income districts had dispute resolution activity, and these districts also had higher rates of dispute resolution activity than very low-income districts (see fig. 4.) This pattern was mostly consistent for all three types of dispute resolution options. Specifically, Mediation requests and due process complaints: In all five states, a greater proportion of very high-income districts tended to have mediation or due process activity than very low-income districts. Similarly, very high-income districts generally had a higher rate of such activity than very low-income districts. (See app. III for data on the individual states.) State complaints: A greater proportion of very high-income districts had state complaint activity in four of the five states. In addition, very high-income districts also had a higher rate of state complaints compared to very low-income districts in three of the five states. (See app. III for data on the individual states.) When we looked at districts’ racial and/or ethnic characteristics in our five states, we found that a smaller proportion of very high-minority districts had dispute resolution activity than very low-minority districts, but generally had higher rates of activity (see fig. 5, and app. III for data by state). We also analyzed the results of initiated disputes by districts’ income level and racial and/or ethnic characteristics—meaning the percentage of disputes that resulted in a meeting or an agreement for mediation requests, adjudication for due process complaints, and a report with findings for state complaints. As shown in tables 1-3, there was no consistent pattern in the results of dispute activity for all three types of disputes across districts with different income levels and racial/ethnic characteristics. Stakeholders we interviewed identified several types of challenges parents may face in using IDEA dispute resolution options, such as the cost of attorneys for due process hearings. While parents may hire an attorney to help with dispute resolution, stakeholders consistently told us the cost of attorneys and expert witnesses was a significant barrier to parents’ ability to use the due process complaint option in particular—especially low-income parents. Parents are not required to use an attorney at a due process hearing, but stakeholders told us that prevailing is difficult without legal representation and expert witnesses to testify on the parents’ behalf. An Education official told us that school districts may provide a list of free and low-cost attorneys to parents. According to stakeholders we interviewed, in some cases, Protection and Advocacy agencies (P&A)— which are funded by the Department of Health and Human Services (HHS)—provide legal services to parents at no cost, or refer clients to other attorneys. In general, however, very few attorneys will work on a pro-bono basis to handle IDEA dispute cases, according to stakeholders. Further, under IDEA, a court may award parents reasonable attorney’s fees and costs if they prevail in a due process hearing; however, parents cannot recoup expert witness costs regardless of the outcome. Also, if parents do not prevail at a due process hearing, they may be responsible for the school district’s legal costs in addition to their own, which can be a disincentive to going through a hearing. Education regulations allow parents to be accompanied and advised in due process hearings by individuals with special knowledge about children with disabilities, and according to IDEA regulations, whether those individuals can legally represent them is determined by state law. According to Education officials, bringing non-attorneys to support them may help reduce costs. However, the school district is likely to still have legal representation. The amount of direct legal services P&As provide varies across, and even within, states. P&A staff we interviewed in one state told us that their attorneys in one city spend most of their time assessing parents’ cases, reviewing documentation, giving advice, answering questions, and conducting training for parents, but little time participating in actual hearings. In contrast, the P&A attorneys we spoke with in another city in the same state said that 50 to 70 percent of their work is direct representation at hearings. Staff at other P&As we spoke with work primarily on cases that fall within their priority areas or cases they believe will have wide-reaching or systemic effects. The availability of attorneys can also be a challenge. According to stakeholders we interviewed, some areas, particularly rural ones, may have fewer available attorneys. However, Education officials told us that school districts in rural or sparsely populated areas may be more likely to have an incentive to resolve a dispute before it goes to a due process hearing because smaller school districts are unlikely to have in-house attorneys, and hiring an attorney is expensive. According to stakeholders, many parents feel they are at a disadvantage in a conflict with the school district due to an imbalance of power and so may be reluctant to engage in dispute resolution and take on the associated costs when they feel they are unlikely to prevail. Stakeholders also said that some parents who live in less populated and more rural areas may be reluctant to initiate dispute resolution out of concern for their privacy and because, for example, in these communities they and their children are more likely to see the teachers, principals, and district officials at the grocery store or at church, which may be awkward. Furthermore, these families may have no other educational options in the area to turn to if the dispute becomes too contentious. In some cultures, according to stakeholders, it is less common to challenge an authority figure, such as a school district official or teacher. In addition, according to stakeholders, parents may fear the school district will retaliate against their children or them if the parents initiate a dispute, such as by threatening to stop providing services. Stakeholders also told us that they are aware of cases in which the school district has called the state’s child protective services agency in what they believe was retaliation for parents bringing a dispute against the district, and that parents who are undocumented may fear that raising a dispute might result in unwanted attention from immigration officials. Further, according to stakeholders, some parents face other challenges, such as language barriers, difficulty obtaining time off from work, transportation, or internet access that could affect their use of IDEA dispute resolution and their ability to take advantage of resources, such as IDEA dispute resolution training, workshops, and online information. Education and SEAs provide technical assistance to support parents’ understanding of their rights under IDEA and to facilitate their use of dispute resolution options. According to stakeholders we interviewed, the area of special education in general and the federal law, IDEA, are complicated, and parents often do not understand the IDEA dispute resolution process. Education supports several efforts to help parents understand and use dispute resolution options afforded to them under IDEA. Procedural safeguards notice. To receive IDEA funds, states must ensure school districts notify parents of their rights under IDEA, including the right to initiate dispute resolution about the educational services provided to their child. School districts must provide a notice, referred to as a procedural safeguards notice, to parents that explains their rights under IDEA. According to Education officials, to help states meet their IDEA requirements, the agency developed a model notice, which states can, but are not required to, have school districts use to notify parents of their rights under IDEA. States may also develop their own procedural safeguards notice as long as it includes all the information required under IDEA. Technical assistance. Education established and funds different types of technical assistance centers that provide information, training, workshops, and advocate services, and collect and disseminate data on dispute resolution, among other activities. Specifically, Education officials reported that Education provided about $21 million to the network of Parent Training and Information Centers (PTI), about $2.9 million to the network of Community Parent Resource Centers, and $750,000 to CADRE in fiscal year 2019. In addition, Education’s technical assistance centers collaborate with P&As in some cases. Further, P&A staff we interviewed in some of our selected states told us they conduct trainings for advocates to attend meetings with parents, other attorneys working on special education issues, community organizations and agencies, and parents. Education officials told us that, in the past, the agency has facilitated meetings between PTIs and P&As, to improve collaboration between these organizations. According to Education officials, these meetings resulted in informal agreements between PTIs and P&As. In addition, Education’s Center for Parent Information and Resources, the national technical assistance center to the PTIs, provides resources on its website to help parents learn about their rights and the procedural safeguards notice they receive from schools. For example, the center’s website contains an explanation of the procedural safeguards notice and online training on procedural safeguards, among other issues. The website also provides contact information for the PTI(s) in each state. Further, CADRE, part of Education’s technical assistance and dissemination network, has developed concise, easy-to-read materials that it distributes to parent centers and others to help them understand the procedural safeguards and how to resolve disputes with school districts. Stakeholders we interviewed told us that parents often do not understand IDEA dispute resolution procedures, but that PTI staff are available to explain them, discuss the procedural safeguards notice, and offer other assistance at no cost to the parents. According to stakeholders, the IDEA procedural safeguards notice is usually a lengthy document that uses complex, legal language and that parents say the notice is hard to understand. Education officials told us their model notice is complex in part because it must reflect all the applicable provisions of the IDEA statute and regulations. To help parents understand the notice and their dispute resolution options, the PTIs in our selected states offer a variety of assistance, such as staffing telephone helplines, meeting with parents in person, offering workshops and training for parents, and developing or making available easy-to-read documents and other resources. PTI staff can also attend mediation meetings with parents and help parents write state complaints, including parents for whom English is not their first language. In addition, PTI staff told us they try to help specific populations, including parents who are not native English speakers, understand and navigate the dispute process. In some cases, PTI staff will attend mediation meetings with or provide interpreters for non-English speaking parents. PTI staff are also available to help parents who have lower levels of formal education or who have disabilities, which stakeholders identified as other factors that could affect parents’ use of dispute resolution options. Our five selected states provide technical assistance and training to help parents understand and use dispute resolution options, including how to file a state complaint. State officials in some of our selected states said they make available plain language documents that can supplement the legally required procedural safeguards notice. For example, all of the states created a parents’ rights handbook and several have one- or two- page documents describing the IDEA dispute resolution processes that they make available on the state’s public website (see fig. 6 for an example of such a document). In addition, the states we contacted post information about IDEA on their websites in multiple languages. For example, one state’s parents’ rights handbook is available in English and 11 other languages. Regarding the cost of due process hearings discussed earlier, one state we contacted provides information about free and low-cost services along with the state’s parents’ rights booklet, and several states include contact information for the PTIs and sometimes P&As in their booklet. State officials we interviewed also said their states offer telephone helplines that parents can call with questions about their dispute resolution options and the processes involved. Some state officials told us they have staff available by phone to explain the dispute options to parents, including to parents who do not speak English or have lower levels of formal education. One state has a phone line that connects parents to an early resolution specialist who will try to help parents resolve the dispute before a formal complaint becomes necessary. Officials in one state told us that the state has installed voice interpretation technology for its helpline so that parents who need assistance with hearing or speaking can communicate with staff. Some states also employ staff who can serve as interpreters to better assist non-English speaking parents. Officials in some states told us that staff answering the helpline are available to answer questions about dispute resolution documents for parents who have difficulty reading. In addition, some of the states we contacted said they made requesting mediation and/or filing state complaints easier by posting the required initiation forms on their websites. According to staff from one state, after the state posted its state complaint form online, the number of complaints doubled in 5 years. Further, some of our selected states provide training and technical assistance to school districts, parent advocate groups, and parents related to accessing IDEA dispute options. One of our selected states uses 16 regional support teams to provide training and technical assistance to school districts. Another state conducts parent training jointly with the Education-funded PTI in the state. We have previously reported on other efforts some states have taken to help parents understand their dispute rights and reduce the need for parents to initiate formal disputes. For example, some states have offered conflict resolution skills training to school district staff and parents, and support facilitated IEP meetings, among other initiatives. We provided a draft of this product to the Department of Education for review and comment. We received written comments from Education, which are reproduced in appendix I. Education also provided technical comments that we have incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Education, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines the use of dispute resolution options available under the Individuals with Disabilities Education Act (IDEA). In particular, this report examines (1) how often IDEA dispute resolution options are used, and whether use in selected states varies across school district-level socioeconomic or demographic characteristics; and (2) what challenges parents face in using IDEA dispute resolution options and how Education and selected states help facilitate parents’ use of these options. To address our first objective, we obtained publicly available dispute resolution data at the national and state levels and collected and analyzed data on the number and types of dispute resolution options used from selected states at the school district level. To address how often dispute resolution options are used, we reviewed and analyzed publicly available data from the Center for Appropriate Dispute Resolution in Special Education (CADRE) from school years 2004-05 to 2016-17, the most recent data available when we conducted our analysis. We assessed the reliability of these data by interviewing knowledgeable CADRE staff and comparing CADRE data to other publicly available data. In addition, we interviewed staff at Parent Training and Information Centers (PTI) funded by the Department of Education (Education) and Protection and Advocacy (P&A) agencies funded by the Department of Health and Human Services, as well as state educational agency (SEA) officials in our five selected states to determine the reasons parents use dispute resolution. We also interviewed various national organizations that advocate for parents and local educational agencies (LEA) and SEAs. To determine whether the use of dispute resolution options varied by socioeconomic or racial and/or ethnic characteristics, we analyzed dispute resolution data we collected at the LEA level from five states for school year 2017-18, the most recent data available at the time of our analysis. We selected these states—Massachusetts, Michigan, New Jersey, Ohio, and Pennsylvania—based on a combination of criteria including the amount of dispute activity within the state (that is, the number of mediations, due process complaints, and state complaints); the large number of LEAs in the state with highly homogenous student populations to allow us to compare across LEAs with different student populations; the large number of IDEA-eligible students in the state; and the states’ ability to provide reliable LEA level data on disputes. We used Education’s Common Core of Data (CCD) to categorize each LEA in our selected states based on (1) income level, as measured by the percentage of students eligible for free or reduced-price school lunch; (2) racial and/or ethnic makeup, as measured by the percentage of Black and/or Hispanic students; and (3) population density, as categorized by CCD. We used Education’s school year 2016-17 CCD data, which was the most recent data available at the time of our analysis. In some cases, states had not reported 2016-17 free or reduced-price school lunch data to CCD so we used CCD data from a previous year. We assessed the reliability of the CCD data by (1) reviewing existing information about the data and the system that produced them and (2) reviewing data reliability assessments of the data from other recent GAO reports. We assessed the reliability of dispute resolution data provided by the states by (1) performing electronic testing of required data elements, (2) conducting interviews with knowledgeable agency officials and reviewing written responses to data reliability questions, and (3) reviewing existing information about the data and systems that produced them, where available. We determined that the CCD and data collected from the states were sufficiently reliable for the purposes of this report. We matched the LEA-level dispute data provided by our states to the LEA-level socioeconomic, race/ethnicity, and population density data from CCD to determine whether the frequency of use of dispute resolution options or the types of options used varied across LEAs with different characteristics. Because our analyses are at the LEA level, and not the individual student or family level, it is impossible to know with certainty whether the families using the dispute resolution options in our school districts match the categorization of the districts themselves. To address this concern to the greatest extent possible, we report on LEAs that are highly homogenous. These districts are those in which: 90 percent or more of the students were eligible for free or reduced- price school lunch (very low-income districts) compared to districts in which 10 percent or fewer of the students were eligible (very high- income districts), and 90 percent or more of the students were Black and/or Hispanic (very high-minority districts) compared to districts in which 10 percent or fewer of the students were Black and/or Hispanic (very low-minority districts). We conducted two separate analyses on the combined data. We analyzed and compared: 1. the percentage of all the “very low” districts in our data that had dispute resolution activity to the percentage of all the “very high” districts in our data with dispute resolution activity, as measured by whether the district had one or more mediation requests, due process complaints, or state complaints. We also conducted this analysis to compare the percentages of urban, suburban, and rural districts with dispute resolution activity. 2. the rate of dispute resolution activity in our “very low” districts and our “very high” districts, as measured by the number of mediation requests, due process complaints, and state complaints per 10,000 students served under IDEA. We also conducted this analysis for urban, suburban, and rural districts. This first analysis compared the percentages of school districts with different income and racial and/or ethnic characteristics that had at least one mediation request, due process complaint, or state complaint. In essence, it shows the differences in whether there is any dispute resolution activity in districts with different income and racial and/or ethnic characteristics, in our selected states. Because our analysis counts districts in which a single dispute resolution was initiated in the same manner as those with more activity, it is not potentially skewed by individual districts that may have unusually high or low levels of dispute resolution activity. To supplement this analysis, our second analysis compares the rate of dispute activity in these types of districts, which shows the magnitude of the various types of dispute resolution activity. Although we use this 90-10 threshold in the body of the report, we also conducted these analyses for districts where 75 percent or more of students were eligible for free or reduced-price lunch and 25 percent or fewer were not eligible. Similarly, we conducted our race/ethnicity analyses at this same level as well. These additional analyses can be found in appendix III. The results from our five states are not generalizable to all states. To address both research objectives, we reviewed relevant federal laws and regulations. We also reviewed Education documents, including its model Notice of Procedural Safeguards, PTI and CADRE documents, and relevant literature related to challenges parents face using dispute resolution. In addition, we interviewed Education officials about challenges families face in using dispute resolution options and Education’s efforts to assist families. We also interviewed PTI, P&A, and advocacy organization staff, and SEA officials from the five states from which we collected data. We conducted this performance audit from June 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix contains tables that show data based on analyses we conducted using dispute resolution data collected from five states– Massachusetts, Michigan, New Jersey, Ohio, and Pennsylvania–for school year 2017-18, and the Department of Education’s Common Core of Data for school year 2016-17. In some cases, states did not report free or reduced-price school lunch data for school year 2016-17. In those cases, we used the most recent year for which the state reported those data. The total number of local educational agencies and the total number of students served in our income analysis and our race/ethnicity analysis are slightly different. Jaqueline M. Nowicki, Director, (617) 788-0580 or nowickij@gao.gov. In addition to the contact named above, Bill MacBlane (Assistant Director), David Barish (Analyst-in-Charge), and Linda Siegel made key contributions to this report. In addition, key support was provided by James Bennett, Deborah Bland, Holly Dye, Sheila R. McCoy, Jean McSween, John Mingus, Amy Moran Lowe, Moon Parks, James Rebbe, Kelly Snow, Joy Solmonson, and Greg Whitney.", "summary": "Almost 7 million children aged 3 to 21 received special education services under Part B of the Individuals with Disabilities Education Act (IDEA) in school year 2016-17. IDEA contains options parents and school districts may use to address disputes that arise related to the education of a student with a disability. These options include mediation and due process complaints, which can be used by parents and school districts; and state complaints, which can be used by any organization or individual, including the child's parent, alleging an IDEA violation. GAO was asked to review parents' use of IDEA dispute resolution options. This report examines (1) how often IDEA dispute resolution options are used, and whether use in selected states varies across school district-level socioeconomic or demographic characteristics; and (2) what challenges parents face in using IDEA dispute resolution options and how Education and selected states help facilitate parents' use of these options. GAO reviewed publicly available data on dispute resolution at the state level and collected data at the school district level from five states—Massachusetts, Michigan, New Jersey, Ohio, and Pennsylvania—selected based on the number of disputes initiated and school district characteristics, among other factors. GAO also reviewed relevant federal laws, regulations, and Education and state documents; and interviewed Education officials, state officials, staff from organizations providing technical assistance in these five states, and other national advocacy organizations. In school year 2016-17, 35,142 special education disputes were filed nationwide, and in five selected states GAO reviewed, dispute resolution options varied across school districts with different socioeconomic and demographic characteristics. The Individuals with Disabilities Education Act (IDEA) provides parents several ways to file and resolve disputes about plans and services that school districts provide to students with disabilities. A greater proportion of very high-income school districts had dispute resolution activity as well as higher rates of dispute activity than very low-income districts in most of the five states GAO reviewed. GAO also found that in most of these states, a smaller proportion of predominately Black and/or Hispanic districts had dispute resolution activity compared to districts with fewer minority students; however, predominately Black and/or Hispanic districts generally had higher rates of such activity. Technical assistance providers and others told GAO that parents used dispute resolution most often for issues related to school decisions about evaluations, placement, services and supports, and discipline of their children. Note: “Very high-income” districts are those in which 10 percent or fewer of students are eligible for free or reduced-price school lunch (FRPL). In “Very low-income” districts, 90 percent or more of students are eligible for FRPL. Parents may face a variety of challenges in using IDEA dispute resolution, and the Department of Education and states provide several kinds of support that, in part, may address some of these challenges. Stakeholders cited challenges such as paying for attorneys and expert witnesses at a due process hearing, parents' reluctance to initiate disputes because they feel disadvantaged by the school district's knowledge and financial resources, and parents' lack of time off from work to attend due process hearings. Education and state agencies provide technical assistance to support parents' understanding of their rights under IDEA and to facilitate their use of dispute resolution options, for example, by providing informational documents and phone help lines to parents.", "document_type": "gao"}
{"report": "Since 1990, generally every 2 years at the start of a new Congress, we call attention to agencies and program areas that are high risk due to their vulnerability to mismanagement or that are most in need of transformation. Our high-risk program is intended to help inform the congressional oversight agenda and to improve government performance. Since 1990, a total of 62 different areas have appeared on the High-Risk List. Of these, 26 areas have been removed, and 2 areas have been consolidated. On average, the high-risk areas that were removed from the list had been on it for 9 years after they were initially added. Our experience with the High-Risk List over the past 29 years has shown that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency leaders grounded in the five criteria for removing high-risk designations, which we reported on in November 2000. When legislative and agency actions, including those in response to our recommendations, result in our finding significant progress toward resolving a high-risk problem, we will remove the high- risk designation. However, implementing our recommendations alone will not result in the removal of the designation, because the condition that led to the recommendations is symptomatic of systemic management weaknesses. In cases in which we remove the high-risk designation, we continue to closely monitor the areas. If significant problems again arise, we will consider reapplying the high-risk designation. The five criteria for removing high-risk designations are as follows: Leadership commitment. Demonstrated strong commitment and top leadership support to address the risks. Capacity. Agency has the capacity (i.e., people and other resources) to resolve the risk(s). Action plan. A corrective action plan that defines the root causes, identifies solutions, and provides for substantially completing corrective measures in the near term, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated progress. Ability to demonstrate progress in implementing corrective measures and in resolving the high-risk area. These five criteria form a road map for efforts to improve and ultimately address high-risk issues. Addressing some of the criteria leads to progress, and satisfying all of the criteria is central to removal from the list. Figure 1 shows the five criteria for removal for a designated high-risk area and examples of agency actions leading to progress toward removal. Importantly, the actions listed are not “stand alone” efforts taken in isolation of other actions to address high-risk issues. That is, actions taken under one criterion may be important to meeting other criteria as well. For example, top leadership can demonstrate its commitment by establishing a corrective action plan, including long-term priorities and goals to address the high-risk issue and by using data to gauge progress—actions that are also vital to addressing the action plan and monitoring criteria. When an agency meets all five of these criteria, we can remove the agency from the High-Risk List. We rate agency progress on the criteria using the following definitions: Met. Actions have been taken that meet the criterion. There are no significant actions that need to be taken to further address this criterion. Partially met. Some, but not all, actions necessary to meet the criterion have been taken. Not met. Few, if any, actions toward meeting the criterion have been taken. Officials from Indian Affairs, BIE, BIA, and IHS expressed their commitment to addressing the issues that led to the high-risk designation for federal management of programs that serve tribes and their members. Since we last testified before this committee on June 13, 2018, we met with agency leaders and worked with each agency to identify actions the agencies took or plan to take to address the concerns that contributed to the designation. We determined that Indian Affairs, BIE, BIA, and IHS demonstrated some progress to partially meet each of the criteria for removing a high-risk designation. However, additional progress is needed for the agencies to fully address the criteria and related management weaknesses. As we reported in the March 2019 high-risk report, when we applied the five criteria for High-Risk List removal to each of the three segments— education, energy, and health care—we determined that Indian Affairs, BIE, BIA, and IHS have each demonstrated some progress. Overall, the agencies have partially met the leadership commitment, capacity, action plan, monitoring, and demonstrated progress criteria for the education, health care, and energy areas. However, the agencies continue to face challenges, particularly in retaining permanent leadership and a sufficient workforce. The following is a summary of the progress that Indian Affairs, BIE, BIA, and IHS have made in addressing the five criteria for removal from the High-Risk List. To meet the leadership commitment criterion for removal of a high-risk designation, an agency needs to have demonstrated strong commitment and top leadership support to address management weaknesses. The following examples show actions Indian Affairs, BIE, BIA, and IHS took to partially meet the leadership commitment criterion. Education. Indian Affairs’ leaders have demonstrated commitment to addressing key weaknesses in the management of BIE schools in several ways. For example, the BIE Director formed an internal working group, convened meetings with other senior leaders within Indian Affairs, and publicly stated that his agency is committed to ensuring implementation of our recommendations on Indian education. In addition, the BIE Director and other Indian Affairs leaders and senior managers have met with us frequently to discuss outstanding recommendations, actions they have taken to address these recommendations, and additional actions they could take. We also met with the new Assistant Secretary-Indian Affairs, who expressed her commitment to supporting the agency’s efforts to address weaknesses in the management of BIE schools. However, it is important that Indian Affairs leaders be able to sustain this level of commitment to solving problems in Indian education. Since 2012, there have been seven Assistant-Secretaries of Indian Affairs and five BIE Directors. There has also been leadership turnover in other key offices responsible for implementing our recommendations on Indian education. We have previously reported that leadership turnover hampered Indian Affairs’ efforts to make improvements to Indian education. We believe that ensuring stable leadership and a sustained focus on needed changes is vital to the successful management of BIE schools. Energy. BIA officials demonstrated leadership commitment by, among other things, meeting with us to discuss the agency’s progress in addressing our recommendations. In June 2018, a permanent Assistant Secretary for Indian Affairs was confirmed. This action provided an opportunity to improve Indian Affair’s oversight of federal actions associated with energy development. According to the BIA Acting Director and the Acting Director for Trust Services, BIA held a number of meetings with the Assistant Secretary to discuss agency action plans for our recommendations. However, BIA does not have a permanent Director, and BIA’s Office of Trust Service—which has significant responsibility over Indian energy activities—does not have a permanent Director or Deputy Director. We have seen turnover in these leadership positions as officials have been brought in to temporarily fill these roles. As officials are brought in temporarily, previously identified plans and time frames for completing some activities have changed, and BIA has found itself starting over on the process to identify or implement corrective actions. Health Care. IHS officials demonstrated leadership commitment by regularly meeting with us to discuss the agency’s progress in addressing our recommendations. In addition, IHS has chartered a policy advisory council that will focus on issues related to strategic direction, recommended policy, and organizational adjustments. According to IHS, this advisory council will, among other things, serve as a liaison among IHS leadership for issues involving strategic direction and policy, as well as monitor and facilitate related policy workgroups. However, IHS still does not have permanent leadership—including a Director of IHS—which is necessary for the agency to demonstrate its commitment to improvement. Additionally, since 2012, there have been five IHS Acting Directors, and there has been leadership turnover in other key positions, such as area directors. To fully meet the leadership commitment criterion, all agencies will need, among other things, stable, permanent leadership that has assigned the tasks needed to address weaknesses and that holds those assigned accountable for progress. For a timeline of senior leadership turnover in Indian Affairs, BIE, BIA, and IHS from 2012 through March 2019, see Figure 3. To meet the capacity criterion, an agency needs to demonstrate that it has the capacity (i.e., people and other resources) to resolve its management weaknesses. Indian Affairs, BIE, BIA, and IHS each made some progress in identifying capacity and resources to implement some of our recommendations, but BIE and IHS continue to face significant workforce challenges. The following examples show actions Indian Affairs, BIE, BIA, and IHS took to partially meet the capacity criterion. Education. BIE and other Indian Affairs offices that support BIE schools have made some progress in demonstrating capacity to address risks to Indian education. For example, BIE hired a full-time program analyst to coordinate its working group and help oversee the implementation of our recommendations on Indian education. This official has played a key role in coordinating the agency’s implementation efforts and has provided us with regular updates on the status of these efforts. BIE has also conducted hiring in various offices in recent years as part of a 2014 Secretarial Order to reorganize the bureau. For example, it has hired school safety officers and personnel in offices supporting the oversight of school spending. However, about 50 percent of all BIE positions have not been filled, including new positions that have been added as a result of the agency’s restructuring, according to recent BIE documentation. Moreover, the agency reported that it has not filled the position of Chief Academic Officer, a top-level BIE manager responsible for providing leadership and direction to BIE’s academic programs. Furthermore, BIE has not completed a strategic workforce plan to address staffing and training gaps with key staff, which we previously recommended. Such a plan is important to allow BIE and other Indian Affairs offices to better understand workforce needs and leverage resources to meet them. In February 2019, BIE drafted a strategic workforce plan and reported it is currently gathering feedback on the plan from internal stakeholders. BIE officials indicated they are planning to finalize and implement the plan in 2019. Energy. In November 2016, we recommended that BIA establish a documented process for assessing the workforce at its agency offices. BIA has taken a number of actions, such as conducting an internal survey to identify general workforce needs related to oil and gas development. This survey information supported staffing decisions for the recently created Indian Energy Service Center. In February 2019, BIA officials told us they have drafted a long-range workforce plan to ensure BIA has staff in place to meet its organizational needs. We will review the plan to determine if the planned actions will help BIA identify critical skills and competencies related to energy development and identify potential gaps. Health Care. IHS has made some progress in demonstrating it has the capacity and resources necessary to address the program risks we identified in our reports. For example, among other actions, IHS officials stated that the agency is expanding the role of internal audit staff within its enterprise risk management program to augment internal audits and complement audits by the HHS Inspector General and GAO. In addition, IHS has developed a new Office of Quality, which is expected to develop and monitor agency-wide quality of care standards. However, IHS officials told us there are still vacancies in several key positions, including the Director of the Office of Resource Access and Partnerships, and the Office of Finance and Accounting. Additionally, our August 2018 report found that IHS’s overall vacancy rate for clinical care providers was 25 percent. To fully meet the capacity criterion, all of the agencies need to assess tradeoffs between these and other administration priorities in terms of people and resources, and the agencies should provide to decision makers key information on resources needed to address management weaknesses. To meet the action plan criterion, an agency needs to have a corrective action plan that defines the root causes, identifies solutions, and provides for substantially completing corrective measures in the near term, including steps necessary to implement the solutions we recommended. The following examples show actions Indian Affairs, BIE, BIA, and IHS took to partially meet the action plan criterion. Education. Among other actions, BIE implemented a new action plan for overseeing BIE school spending, including written procedures and risk criteria, which fully addressed two priority recommendations. Also, BIE completed a strategic plan in August 2018, which we recommended in September 2013. The plan provides the agency with goals and strategies for improving its management and oversight of Indian education, and establishes detailed actions and milestones for the implementation. However, Indian Affairs has not provided documentation that it has completed action plans on other important issues, such as a comprehensive, long-term capital asset plan to inform its allocation of school facility funds, which we recommended in May 2017. Energy. In meetings, BIA officials identified actions they have taken towards implementing our recommendations. For instance, BIA officials told us they have recently completed modifications to BIA’s database for recording and maintaining historical and current data on ownership and leasing of Indian land and mineral resources—the Trust Asset and Accounting Management System (TAAMS). The officials said that the modifications incorporate the key identifiers and data fields needed to track and monitor review and response times for oil and gas leases and agreements. BIA officials we met with have demonstrated an understanding that addressing long-standing management weaknesses is not accomplished through a single action but through comprehensive planning and continued movement toward a goal. However, the agency does not have a comprehensive action plan to identify the root causes of all identified management weaknesses and address the problems. Health Care. In February 2019, IHS finalized its strategic plan for fiscal years 2019 through 2023, and is developing a related work plan to address certain root causes of management challenges and define solutions and corrective measures for the agency. The strategic plan divides these challenges into three categories: (1) access to care, (2) quality of care, and (3) program management and operations. We will examine the strategic plan and IHS’s work plan, once issued, to determine whether they contain the needed elements of an action plan. To fully meet the action plan criterion, a comprehensive plan that identifies actions to address the root causes of its management shortcomings would have to come from top leadership with a commitment to provide sufficient capacity and resources to take the necessary actions to address management shortcomings and risks. To meet the monitoring criterion, an agency needs to demonstrate that a program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. We have been working with the agencies to help clarify the need to establish a framework for monitoring progress that includes goals and performance measures to track their efforts and ultimately verify the effectiveness of their efforts. The following examples show actions Indian Affairs, BIE, BIA, and IHS took to partially meet the monitoring criterion. Education. Indian Affairs, in consultation with Department of Interior’s Office of Occupational Safety and Health, has taken actions to monitor corrective measures that address weaknesses with the agency’s safety program—which covers safety at BIE schools. However, the agency has not yet demonstrated that it is monitoring several other areas, such as whether relevant employees are being held to the agency’s required performance standards for safety inspections. Energy. BIA has taken steps to improve monitoring by holding frequent meetings to assess its progress in implementing our recommendations. However, BIA has not yet taken needed steps to monitor its progress in addressing the root causes of management weaknesses. Health Care. IHS has taken some steps toward monitoring the agency’s progress in addressing the root causes of their management weaknesses. In addition to developing its new Office of Quality, IHS has taken steps to develop a patient experience of care survey, as well as standards for tracking patient wait times. These efforts should be reflected in the agency’s corrective plan, as part of an overall framework for monitoring progress that includes goals and performance measures to track their efforts and ultimately verify the effectiveness of their efforts. To fully meet the monitoring criterion, the agencies need to establish goals and performance measures as they develop action plans and take further actions to monitor the effectiveness of actions to address root causes of identified management shortcomings. To meet the demonstrated progress criterion, an agency needs to demonstrate progress in implementing corrective measures and in resolving the high-risk area. The following examples show actions Indian Affairs, BIA, and IHS took to partially meet the demonstrated progress criterion. Education. As of February 2019, Indian Affairs had addressed 11 of the 23 outstanding education recommendations we identified in our September 2017 testimony. Three of these recommendations were closed after the June 2018 hearing, including a recommendation from our 2013 report for BIE to develop a strategic plan and two recommendations from our 2017 report on improving the oversight and accountability for BIE school safety inspections. Overall, Indian Affairs’ efforts since we issued our High-Risk List update in February 2017 represent a significant increase in activity implementing our recommendations. Substantial work, however, remains to address our outstanding recommendations in several key areas, such as in accountability for BIE school safety and school construction projects. For example, Indian Affairs has not provided documentation that the inspection information its personnel collect on the safety of BIE schools is complete and accurate. As of late February 2019, 12 recommendations related to this high-risk area remain open and Indian Affairs concurred with all 12 recommendations. For a full description of the status of these open recommendations, see in table 1 in appendix I. Energy. BIA has shown significant progress developing data collection instruments and processes needed to track and review response times for a number of different actions associated with energy development. For example, in our June 2015 report, we recommended that BIA take steps to improve its geographic information system (GIS) capabilities to ensure it can verify ownership in a timely manner. We closed this recommendation as BIA has made significant progress in enhancing its GIS capabilities by integrating map-viewing technology and capabilities into its land management data system. In addition, we recommended that BIA take steps to identify cadastral survey needs. BIA’s enhanced map- viewing technology allows the bureau to identify land boundary discrepancies, which can then be researched and corrected. To address the recommendation, BIA identified unmet survey needs that were contained within the defunct cadastral request system. BIA developed a new mechanism for its regions and agency offices to make survey requests and a new database to maintain survey requests. In fall 2018, BIA completed enhancements to TAAMS that will allow the agency to track time frames and status of oil and gas revenue-sharing agreements-called communitization agreements (CA) through the review process. BIA held training on the enhancements in November 2018 and requested staff input information on any newly submitted CAs in the system. In a meeting on February 25, 2019, the Acting Director of BIA said that BIA had also completed efforts to modify TAAMS, incorporating the key identifiers and data fields needed to track and monitor review and response times for oil and gas leases and agreements. We believe these actions show significant progress in addressing management weaknesses associated with outdated technology and data limitations for tracking and monitoring the review and approval of energy related documents. However, BIA needs to collect data from its updated system, develop time frames, and monitor agency performance to close open recommendations. For a full description of the status of the agency’s open recommendations, see in table 2 in appendix II. Health Care. IHS has made progress in implementing corrective actions related to the management of health care programs. Specifically, since our 2017 High-Risk Report, IHS implemented four of our 13 open recommendations. For example, in response to our April 2013 recommendation, to ensure that IHS’s payment rates for contracted services do not impede patient access to physician and other nonhospital care, IHS developed an online tool that enables the agency to track providers that do not accept IHS’s payment rates. As of March 2019, six out of the 13 recommendations in our 2017 High- Risk Report remain open, and we have added one additional recommendation—for a total of seven open recommendations related to this high-risk area. IHS officials told us that they plan to complete the implementation of additional recommendations in 2019. For a full description of the status of the agency’s open recommendations, see in table 3 in appendix III. To fully meet the demonstrating progress criterion, agencies need to continue taking actions to ensure sustained progress and show that management shortcomings are being effectively managed and root causes are being addressed. In conclusion, we see some progress in meeting all of the criteria, at all agencies, especially related to education programs. However, permanent leadership that provides continuing oversight and accountability is needed. We also see varying levels of progress at all of the agencies in understanding what they need to do to be removed from the High-Risk List, and identifying steps that can be incorporated into corrective action plans. We look forward to working with the agencies to track their progress in implementing a framework for monitoring and validating the effectiveness of planned corrective actions. Among the greatest continuing challenges for the agencies is developing sufficient capacity, including demonstrating that they have the people and other resources required to address the deficiencies in their programs and activities. This challenge cannot be overcome by the agencies without a commitment from their leadership and the administration to prioritize fixing management weaknesses in programs and activities that serve tribes and their members. Sustained congressional attention to these issues will help ensure that the agencies continue to achieve progress in these areas. Chairman Hoeven, Vice Chairman Udall, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staff have any questions about health care issues in this testimony or the related reports, please contact Jessica Farb at (202) 512-7114 or farbj@gao.gov. For questions about education, please contact Melissa Emrey-Arras at (617) 788-0534 or emreyarrasm@gao.gov. For questions about energy resource development, please contact Frank Rusco at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement include Kelly DeMots, (Assistant Director), Christina Ritchie (Analyst-in-Charge), Edward Bodine, Christine Kehr, Elizabeth Sirois, and Leigh White. As of late February 2019, 12 of the 23 recommendations to the Department of the Interior on Indian education we identified in our September 13, 2017, testimony remain open. As of February 2019, 12 of the 14 recommendations to the Department of Interior’s Bureau of Indian Affairs cited in our 2017 High-Risk Report remain open. As of March 2019, six out of the 13 recommendations in our 2017 High- Risk Report remain open, and we have added one additional recommendation—for a total of seven open recommendations related to this high-risk area.", "summary": "GAO's High-Risk List identifies federal program areas that are high risk due to their vulnerability to mismanagement, among other things. GAO added the federal management of programs that serve Indian tribes and their members to its February 2017 biennial update of high-risk areas in response to management weaknesses at Interior and HHS. GAO's recommendations identified in this high-risk area are neither reflective of the performance of programs administered by tribes nor directed at any tribally operated programs and activities. This testimony, which is based on GAO's March 2019 High Risk report, provides examples of actions taken and progress made by these agencies to address the five criteria GAO uses for determining whether to remove a high-risk designation. For this statement, GAO also drew on findings from its reports issued from September 2011 through August 2018 and updated that work by reviewing agency documentation and interviewing agency officials. GAO designated the federal management of programs that serve tribes and their members as high risk in 2017. Officials from the Department of the Interior's Office of the Assistant Secretary-Indian Affairs (Indian Affairs), the Bureau of Indian Education (BIE), the Bureau of Indian Affairs (BIA), and the Department of Health and Human Services' (HHS) Indian Health Service (IHS) have expressed their commitment to addressing the issues that led to the designation. Since GAO last testified before this committee on June 13, 2018, Indian Affairs, BIE, BIA, and IHS have demonstrated progress to partially meet each of the five criteria for removing a high-risk designation (leadership commitment, capacity, action plan, monitoring, and demonstrated progress). However, additional progress is needed to fully address management weaknesses—particularly in the areas of retaining permanent leadership and a sufficient workforce. For example, to meet the capacity criterion, an agency needs to demonstrate that it has the capacity (i.e., people and other resources) to resolve its management weaknesses. While Indian Affairs, BIE, BIA, and IHS each made progress identifying capacity and resources to partially meet this criterion, BIE and IHS continue to face significant workforce challenges. Specifically, although BIE has conducted hiring in recent years as part of an effort to reorganize the bureau, about 50 percent of all BIE positions have not been filled according to recent BIE documentation. IHS also faces workforce challenges—GAO's August 2018 report found that IHS's overall vacancy rate for clinical care providers was 25 percent. GAO has identified varying levels of progress at the agencies in understanding what they need to do to be removed from the list and will continue to closely monitor their progress. GAO has made more than 50 recommendations related to this high-risk area to improve management weaknesses at some Interior and HHS agencies—specifically BIE, BIA, and IHS—of which 31 recommendations are still open. Sustained focus by Interior and HHS in fully implementing these recommendations and continued oversight by Congress are essential to achieving progress in these areas.", "document_type": "gao"}
{"report": "In developing our June 2018 report to assist the Congress, OMB, and agencies in assessing agency reform plans, we reviewed our prior work and leading practices on organizational transformations; collaboration; government streamlining and efficiency; fragmentation, overlap, and duplication; and high-risk and other long-standing agency management challenges. The resulting June 2018 report includes 58 key questions to aid in assessing reform efforts. These questions are organized into four broad categories and 12 subcategories. We determined that the questions most relevant to the current implementation stage of State’s reform efforts are found in two subcategories: (1) Leadership Focus and Attention and (2) Managing and Monitoring. Table 1 lists the key questions in these subcategories. In response to the March 2017 Executive Order 13781 and the ensuing OMB memo, State launched a “listening tour” intended to gather ideas and feedback from State and USAID employees. As a key component of this outreach effort, State hired a contractor to design and administer a confidential online survey, which was sent to all State and USAID employees in May 2017. According to the contractor’s report, the survey had a 43 percent response rate, with 27,837 State employees and 6,142 USAID employees responding to the survey. The contractor also conducted in-person interviews with a randomly selected cross section of personnel, which included 175 employees from State and 94 from USAID. The contractor’s report on the results of the survey and the interviews highlighted five areas for State reforms. In July 2017, the Deputy Secretary of State created five planning teams to develop multiple projects in those five areas. The Deputy Secretary also established an Executive Steering Committee composed of senior State and USAID officials to guide the five planning teams and provide direction during the reform process. Led jointly by State and USAID, each planning team comprised participants from a cross section of overseas and domestic workforces. The planning teams were tasked with gathering information and conducting analysis as described below: Foreign Assistance Programs: Analyze current foreign assistance programs at State and USAID to develop a future vision, ensuring alignment with national priorities. Overseas Alignment and Approach: Assess key diplomatic activities and identify required platforms, including the balance of work between headquarters and the field. Human Capital Planning: Identify ways to promote an agile and empowered workforce as part of an overarching talent map. Management Support: Identify opportunities to streamline administrative support functions at the bureau and agency levels to ensure front line effectiveness. Information Technology (IT) Platform Planning: Focus on improving the employee experience through increased use of cutting- edge technology and streamlining duplicative systems and processes. Figure 1 shows a timeline of key events in State’s initial reform efforts. The planning teams developed specific reform projects, listed below in table 2, which State described in the fiscal year 2019 budget justification it submitted to Congress in February 2018. According to implementing officials, all these projects predated the Executive Order and OMB memo issued in the spring of 2017. They also noted, however, that the administration’s reform-related directives helped advance State’s preexisting efforts by focusing management attention and agency resources on these projects. As of April 2019, according to State officials and status reports, State had completed one of its 17 reform projects; 13 projects were continuing; two projects were stalled pending future decisions or actions; and one project was discontinued. Table 3 provides additional details on each project and a summary of the results of our analysis. As State shifted into the implementation phase of its reform efforts in early 2018, multiple transitions within the agency contributed to a loss of leadership focus on the efforts, resulting in uncertainty about leadership’s support for some reform projects. In February 2018, State reported to Congress in its fiscal year 2019 budget justification that it was pursuing the reform projects we described above. In March 2018, the first transition affecting the implementation of those projects occurred when the President removed the then Secretary of State and nominated the then CIA director to replace him; in April 2018, the Senate confirmed the current Secretary. According to senior State officials, when the new Secretary took office, his top priority was ending the hiring freeze and restarting a concerted recruitment effort because vacancies in key positions and a general staffing shortfall would otherwise have led to what one senior official described as a “cataclysmic failure” at State. These senior officials noted that the new Secretary decided some of the existing reform projects were not well designed and that he wanted greater emphasis on cybersecurity and data analytics. They said he also wanted to pursue other initiatives, including a new proposal to create a Global Public Affairs Bureau by merging two existing bureaus. The senior officials told us that the Secretary authorized responsible bureaus and offices to determine whether to continue, revise, or terminate existing reform efforts or launch new initiatives. However, State did not formally communicate other changes in its reform priorities to Congress, such as its plan to no longer combine State and USAID’s real property offices. State initiated another transition in leadership of the reform efforts in April 2018 when it disbanded the dedicated planning teams overseeing the reform efforts and delegated responsibility for implementing the reform projects to relevant bureaus and offices. As the planning teams finished working on their particular reform efforts and prepared to transfer these projects to the bureaus, some planning teams provided memos and reports on the status of their efforts and offered recommendations for the bureaus to consider when determining next steps in implementing the projects. Some implementing officials, however, reported that they received little or no direction regarding their projects or any other indication of continued interest in their project from department or bureau leadership aside from the initial notification that the project had been assigned to them. For example, in separate discussions with implementing officials responsible for three different projects, the officials reported that they had not received any direction or other guidance related to their assigned project since it was delegated to them in April 2018. In one case, this lack of communication continued for nearly a year. In addition, although implementing officials said that they have managed to incorporate reform-related work into their daily responsibilities, they noted that there were multiple benefits from having had dedicated planning teams to lead earlier phases of State’s reform efforts. For example, they said that the dedicated teams included senior officials and the regular involvement of high-level leadership facilitated by these teams had helped advance the reform efforts. These dedicated teams also required staff to set aside time to focus on reform initiatives, which allowed them to develop holistic solutions to reform-related challenges. Conversely, implementing officials reported negative implications of not having dedicated teams. For example, one implementing official described how positive work initiated under the leadership of these dedicated teams—including efforts to eliminate redundancies and identify opportunities for consolidation—ended when the teams were disbanded because the staff and resources needed to continue these efforts were no longer available. Various State officials noted that the prolonged absence of Senate- confirmed leadership in key positions posed additional challenges. We have previously testified that it is more difficult to obtain buy-in on long- term plans and efforts that are underway when an agency has leaders in acting positions because federal employees are historically skeptical of whether the latest efforts to make improvements are going to be sustained over a period of time. For example, State did not have a Senate-confirmed Under Secretary for Management from January 2017 to May 2019. In November 2018, the Deputy Secretary of State told us that the lack of a confirmed Under Secretary for Management was hindering State’s ability to conduct business and implement reforms. The bureaus and offices responsible for 12 of State’s 13 continuing reform projects reported directly to an Acting Undersecretary for Management from January 2017 through May 2019. Moreover, State officials told us that both projects that we determined to be stalled were, among other things, awaiting the confirmation of an Under Secretary for Management to make key decisions. Furthermore, some implementing officials told us that the lack of confirmed officials in leadership positions within the bureaus responsible for implementing the projects added to a lack of leadership focus on implementing some of State’s reform projects. According to State officials, as of April 2019, although 13 of the reform projects described in the fiscal year 2019 Congressional Budget Justification were considered by State to be continuing, some had been scaled back, slowed down, or both as a result of senior leadership’s shifting priorities and attention. For example, one of State’s initial reform projects was related to better management of real property. However, State ultimately scaled back this project, effectively splitting it into two projects: One project focused on real property process improvements is continuing, but State has discontinued the other project to consolidate its and USAID’s real property function. Implementing officials told us in November 2018 that they were still pursuing the internal real property process improvements. They said then that they expected this reform project would likely progress at a slower pace without the dedicated team that previously had provided direct access and frequent interaction with senior department leadership. However, these officials recently informed us that the pace of progress on this project actually increased under the leadership of the bureau’s Senate-confirmed Director. The bureau was led by acting directors from January 2017 through September 2018. We have identified leadership focus and attention as practices vital to successfully implementing reform efforts. These practices include communicating clear and compelling reasons for the reforms, having a dedicated implementation team to manage the transformation process, and designating leaders responsible for implementing reforms and holding them accountable. Dedicating a strong and stable implementation team responsible for a transformation’s day-to-day management is important to ensuring that reforms receive the focused, full-time attention needed to be sustained and successful. One of the key responsibilities of a dedicated team is communication, particularly answering questions about the reform process from employees and other stakeholders. An implementation team is also important to ensuring that reform efforts are implemented in a coherent and integrated way. Because an agency’s transformation process is a large undertaking, we have found that an implementation team must have direct access to and be accountable to top leadership. In turn, top leadership must vest the team with the necessary authority and resources to set priorities, make timely decisions, and move quickly to implement top leadership’s decisions regarding the transformation. In addition, we previously reported that the single most important element of successful improvement initiatives is the demonstrated commitment of top leaders. This commitment is most prominently demonstrated through top leaders’ personal involvement in developing and directing reform efforts. Federal standards for internal control in the federal government also emphasize the importance of maintaining leadership continuity in order to achieve agency objectives. As a result, in other reports, we have recognized that agency reform efforts can take years to implement and that the time frame required for change typically takes longer than the tenures of political leaders. Similarly, the time it takes to nominate and confirm officials for senior management positions can also hamper efforts to initiate reforms or sustain momentum needed to successfully implement reform initiatives. For these reasons, and others, we have highlighted the need to ensure that top leadership drives the transformation and establishes dedicated teams to manage the transformation process. Taken together, the leadership transitions at State had two significant effects on State’s reform efforts. First, the transition of departmental leadership and lack of direction and communication about subsequent changes in leadership’s priorities contributed to uncertainty among implementing officials about the future of individual reform projects. Second, according to implementing officials, the transition of project responsibility from dedicated teams to bureau-level implementing officials resulted in fewer resources and a lack of senior leadership involvement and attention for some projects. Absent leadership decisions, implementing officials will continue to struggle with understanding leadership priorities with regard to State’s reform efforts. Similarly, for any projects that are determined to be leadership priorities, day-to-day implementation activities will continue to be hampered by the lack of a dedicated team to guide and manage the agency’s overall reform effort. Although uncertainty exists about the leadership priorities regarding reform efforts, the bureaus and offices responsible for implementing State’s reform projects have taken steps to manage and monitor their reform projects. Our previous work has identified monitoring as another important practice when implementing reform efforts, including, among other things, developing implementation plans and ensuring transparency by publicly reporting on progress toward milestones. These practices are also incorporated into State’s Foreign Affairs Manual and other department policies. We found that the relevant bureaus and offices responsible for implementing reform projects had developed implementation plans and that these plans identified milestones and deliverables for the projects. For example the Human Resources Services Delivery project had an implementation plan with milestones and deliverables, such as identifying programs and functions for consolidation in 2019 and reducing human resource delivery costs by 14 percent by 2022. Similarly, we found that the implementation plan for the IT Modernization project incorporated milestones that including, among other things, implementing a comprehensive enterprise IT risk management program by fiscal year 2020; reducing average deployment time for new IT capabilities by 10 percent annually from fiscal year 2019 through fiscal year 2021; and increasing workforce access to cloud-based email and business data from 10 percent to 100 percent by September 30, 2019. With regard to monitoring, while there is no centralized mechanism for reporting progress on all projects, we found that each of the ongoing projects currently has some form of progress reporting. For example, State reports progress on projects with IT components—such as Real- Time Collaboration and Work Anytime, Anywhere and Improve Enterprise-Wide Data Accessibility—as part of its quarterly reporting on IT Modernization under the Government Performance and Results Modernization Act of 2010. As a result, these projects have continued within a formal monitoring structure that involves regular web-based status updates and progress reporting. Other reform efforts—such as human capital and real property projects—are monitored against milestones established in State’s Joint Strategic Plan and progress is reported in State’s Annual Performance Reports. Progress for certain projects is also monitored and reported in other reports, such as State’s joint strategic plan, IT strategy, or human capital plan. Finally, other reform projects, such as State’s acquisition reform efforts, are reported at the government-wide level as part of the Cross-Agency Priority Goals outlined in the President’s Management Agenda. State collects data and evidence in order to measure progress in achieving outcome-oriented goals it sets for these projects. State reports these goals and relevant performance data in its annual performance plans and reports. For example, State uses the U.S. General Services Administration’s Customer Satisfaction Survey to measure and report the performance of its Human Capital Delivery Services reform efforts. State also uses data collected through the Office of Personnel Management’s Federal Employee Viewpoint Survey to measure employee satisfaction, which State established as a performance indicator for this project. Effectively implementing major reforms can span several years and must be closely managed. In 2017, State began a reform effort that led to 17 reform projects, most of which are unimplemented but still continuing. State notified both OMB and the Congress of these projects. Nevertheless, State leadership has not provided the focus necessary to support the officials responsible for implementing all these reform projects. When a new Secretary of State took charge in March 2018, he transferred responsibility for implementing the reform efforts from dedicated teams led by senior department leadership to bureaus and offices. In addition, key political appointee positions remained filled by officials in an acting capacity until only recently. These transitions at State have had an effect on its reform efforts. Without explicit direction from senior leadership, some implementing officials involved in the reform efforts remain unclear about whether their projects are an agency priority. Further, for the reform efforts that remain an agency priority, a dedicated team to oversee implementation could help accelerate State’s efforts to improve the efficiency and effectiveness of its operations. We are making the following two recommendations to State: The Secretary of State should determine which of the unimplemented reform projects included in its fiscal year 2019 Congressional Budget Justification, if any, should be implemented and communicate this determination to Congress and appropriate State personnel. (Recommendation 1) The Secretary of State should establish a single dedicated team to manage the implementation of all reform efforts that the Secretary decides to pursue. (Recommendation 2) We provided a draft of this report to State, USAID, and OMB for review and comment. We received comments from State and USAID, which are reprinted in appendixes II and III, respectively. In response to our recommendation that State determine which reform projects should be implemented and communicate that information to Congress and appropriate State personnel, State indicated that it concurred but suggested it should inform OMB instead of Congress. While we agree that it is important for State to share information regarding its reform efforts with OMB, we remain concerned about State’s lack of communication with Congress regarding the status of the projects State initially reported in its fiscal year 2019 Congressional Budget Justification. Congress is a key stakeholder in State’s reform efforts and should be informed of changes in State’s priorities and the status of these projects to help ensure successful implementation. In response to our recommendation that State establish a dedicated team to manage the implementation of all reform projects, State suggested that leadership of its reform projects should be decided on a case-by-case basis with the latitude to determine whether projects will be assigned to a higher level or within individual bureaus. We stand by our recommendation that State should establish a single dedicated team to manage the implementation of all its reform efforts. This is a key practice for implementing agency reforms identified in previous GAO reports, as well as in State’s Foreign Affairs Manual (1 FAM 014.2), which calls for State to “dedicate an implementation team to manage the transformation process” for major reorganizations of bureaus or offices. Because reform efforts can span several years, dedicating a strong and stable team is important to ensure that the transformation receives the needed attention to be sustained and successful. In its comments, USAID expressed several concerns about the leadership of State’s reform efforts and State’s coordination with USAID. OMB did not provide written comments on the report. We also received technical comments from State and USAID, which we incorporated throughout our report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of State, the Administrator of USAID, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-6881 or BairJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. We prepared this report under the authority of the Comptroller General to conduct work to assist Congress with its oversight responsibilities. This report examines (1) the status of the reform efforts that the Department of State (State) reported to Congress in its fiscal year 2019 Congressional Budget Justification and (2) the extent to which State addressed key practices we previously identified as critical to the successful implementation of agency reform efforts. For the purposes of this review, we use the term “reform efforts” to refer to all reform-related projects, proposals, plans, activities, and documents related to the 16 projects identified in State’s fiscal year 2019 Congressional Budget Justification. The term “projects” refers specifically to the 16 reform projects identified in State’s fiscal year 2019 Congressional Budget Justification. State subsequently split one of these 16 projects into two separate projects; thus, we refer to 17 reform projects throughout the report. For both objectives, we reviewed State’s reform plans, proposals, and related documents. We also interviewed four senior officials—generally at or above the assistant secretary level—that had responsibility for the reform efforts as a whole, as well as all implementing officials responsible for each of the continuing reform projects. To determine the status of State’s reform efforts, we reviewed documents and reports related to each of the reform projects described in State’s fiscal year 2019 Congressional Budget Justification. To determine the extent to which State addressed key practices for implementing agency reforms, we assessed State’s reform efforts against key questions identified in the implementation category of our June 2018 report. Specifically, we assessed State’s implementation efforts against key questions from the two implementation-related subcategories of our 2018 report: (1) Leadership Focus and Attention and (2) Managing and Monitoring. We considered the nature of each of State’s reform projects and the efforts taken to implement them, reviewed project-specific reports and other relevant State documents, interviewed State officials responsible for implementing each project, and then made qualitative determinations about the extent to which State’s overall reform efforts addressed these criteria. A second analyst then independently reviewed and validated each determination. Subsequently, other GAO staff reviewed and concurred with these determinations. We only applied criteria from our June 2018 report that we determined were relevant to the scope of our review, which was limited to the implementation phase of State’s reform efforts—from April 2018 to the present—to avoid duplicating the reviews of earlier phases of State’s reform efforts conducted by State’s and the U.S. Agency for International Development’s Offices of Inspector General (OIG). Because State’s OIG was also reviewing State’s reform efforts, we coordinated regularly with State’s OIG to avoid duplication. We did not consider criteria from the first two categories of our June 2018 report—(1) Goals and Outcomes and (2) Process for Developing Reforms—because these applied to the initial phases of State’s reform efforts, which were outside the scope of our work and central to the broader historical review that State’s OIG was conducting at the time of our review. We also did not apply criteria from the final category of our June 2018 report—Strategically Managing the Federal Workforce—to avoid duplicating work State’s OIG recently conducted on State’s workforce management. For the two sub- categories that we selected, we considered the key questions in the report in light of their relevance to State reforms efforts, and also employed other relevant criteria, where appropriate, most notably criteria for leadership from federal internal control standards. We conducted this performance audit from October 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Jason Bair, (202) 512-6881, or bairj@gao.gov. In addition to the contact named above, Thomas Costa (Assistant Director), Joshua Akery (Analyst in Charge), Peter Beck, David Dayton, Martin de Alteriis, Emily Gupta, Patrick Hickey, Chris Keblitis, Sarah Veale, and Alex Welsh made key contributions to this report.", "summary": "In 2017, State initiated a series of reform efforts in response to an executive order by the President and guidance issued by the Office of Management and Budget aimed at reorganizing and streamlining the government. GAO's prior work has shown that successful agency reform efforts follow key implementation practices, such as establishing a dedicated team to manage the implementation of reforms, and ensuring transparency by setting public goals and milestones to monitor progress. This report examines (1) the status of the reform efforts that State reported to Congress in February 2018 and (2) the extent to which State addressed key practices critical to the successful implementation of agency reform efforts. GAO reviewed State's reform plans, proposals, and related documents; met with officials involved in State's reform efforts; and assessed implementation of the reform efforts against relevant key practices identified in GAO's prior work. The Department of State (State) is implementing most of the 17 reform projects it reported to Congress in February 2018, but a few are stalled or discontinued. State completed one project streamlining policy formulation, and continues working to implement 13 projects on topics including human resources, information technology, and data analytics. Progress on two projects related to overseas presence has stalled, and State has discontinued a project to consolidate real property management. State has not addressed certain key practices related to leadership focus and attention in implementing its reform efforts. Multiple transitions in State's leadership and changing priorities contributed to uncertainty about leadership support for reform projects.Top leadership is expected to drive any needed transformation by clarifying priorities and communicating direction to employees and stakeholders. In March 2018, the President replaced the Secretary of State, a transition that created uncertainty within the agency regarding the future of ongoing reform projects. While some officials stated that the new Secretary had expressed support for data analytics and cyber security reform efforts, other officials said they were unclear as to whether their projects remained a priority. According to senior officials, the current Secretary has focused on critical needs, such as ending the hiring freeze and increasing recruitment, and on launching new initiatives. In April 2018, State disbanded the dedicated teams overseeing its reform efforts and shifted responsibility to bureaus and offices. In some cases, officials assigned to lead reform projects reported receiving little or no direction from department leadership. GAO's prior work has highlighted the benefits of having a dedicated team to manage agency transformations. In addition, State officials indicated that the challenges posed by these transitions were compounded by a lack of Senate-confirmed leadership in key positions. Specifically, during the first 2 years of State's reform efforts, bureaus and offices responsible for implementing 12 of State's 13 continuing reform projects reported directly to one or more officials serving in an acting capacity. For example, State did not have a Senate-confirmed Under Secretary for Management from January 2017 to May 2019, which, according to senior officials, hindered State's reform efforts. According to State officials, taken together these leadership transitions led to several projects being scaled back, slowed down, or both. Although uncertainties exist about leadership priorities regarding the reform efforts, the bureaus and offices responsible for implementing reform projects have taken steps to manage and monitor them, consistent with key practices. Each of the continuing projects has implementation plans that include milestones and deliverables, and some report their progress publicly. For example, State reports on the progress of some projects in its annual performance plans and reports. The lack of a dedicated team to manage the reform process, however, could slow State's overall efforts. The Secretary of State should (1) determine which unimplemented reform projects, if any, should be implemented and communicate this determination to Congress and appropriate State personnel, and (2) establish a single dedicated team to manage the implementation of all reform efforts that the Secretary decides to pursue. State generally concurred with the recommendations.", "document_type": "gao"}
{"report": "Data from CDC’s 2015 NISVS indicate that about 43.6 million women (36.4 percent) and 37.3 million men (33.6 percent) in the United States have experienced sexual violence, physical violence, and stalking by an intimate partner. Approximately 21.4 percent of women and 14.9 percent of men in the United States experienced severe physical violence by an intimate partner. About 30 million women (25.1 percent) and 12 million men (10.9 percent) reported experiencing some effect from the violence. (See fig. 1 for the most commonly reported effects of intimate partner violence, as reported by NISVS.) Intimate partner violence can also result in death. Data from U.S. crime reports suggest that 16 percent of homicide victims (about one in six) are killed by an intimate partner. Strangulation victims, in particular, are at greater risk for being killed, according to the Training Institute on Strangulation Prevention. Research has shown that certain factors increase the risk that someone may experience intimate partner violence. For example, a review of research on risk factors for women who experience intimate partner violence identified younger age, less education, unemployment, pregnancy, childhood victimization, and mental illness as being associated with higher rates of intimate partner violence. Exposure to intimate partner violence between a child’s parents or caregivers is also associated with a greater risk of intimate partner violence in adulthood, according to CDC. Adults with disabilities are also at a higher risk of violence than those without disabilities. However, research indicates that victims of intimate partner violence may be less likely than others to obtain medical or other services. Even when services are obtained, victims may be less likely than others to identify the source or extent of their injuries out of fear for their safety or reprisal. Brain injuries, including those that may result from intimate partner violence, can have several causes, including physical trauma and strangulation; range in severity; and can result in a number of health consequences. TBI refers to a brain injury caused by external physical force, such as a blow to the head or shaking of the brain. Anoxic (a complete disruption of oxygen to the brain) or hypoxic (a partial disruption of oxygen to the brain) brain injury may result from strangulation or other pressure applied to the neck that restricts blood flow and air passage. TBIs and anoxic or hypoxic brain injuries may result in irreversible psychological and physical harm. Specifically, people who suffer from TBI and anoxic or hypoxic brain injuries may experience cognitive symptoms, including depression and memory loss, as well as behavioral symptoms, such as changes in mood, or difficulty sleeping, among others. The symptoms individuals experience can also vary. The signs and symptoms of an anoxic or hypoxic brain injury from strangulation can be similar to those of mild TBI, which is often referred to as a concussion. (See fig. 2.) According to the Brain Injury Association of America, a severe brain injury can be clearly identified by reviewing an individual’s symptoms, but when the brain injury is mild or moderate, providers may need to conduct further assessments or screening to diagnose the brain injury. According to NIH, providers have several options for assessing brain injury that can help determine the severity of the injury. For example, providers may evaluate a person’s level of consciousness and the severity of brain injury by attempting to elicit body movements, opening of the eyes, and verbal responses. Providers may also evaluate an individual’s speech and language skills or cognitive capabilities. Both HHS and DOJ support activities for individuals affected by intimate partner violence through several of their agencies. Within HHS, for example, ACF provides federal funding to support emergency shelter and services for the victims of domestic violence and their dependents, as well as the National Domestic Violence Hotline. CDC provides grants to state and local entities to develop programs aimed at preventing intimate partner violence. Additionally, HRSA—which provides funding to federally qualified health centers—provides funding to develop educational materials for health care workers, in partnership with ACF, to increase the number of individuals screened for intimate partner violence and referred to treatment services, among other things. DOJ, through its Office of Justice Programs and Office on Violence Against Women, conducts research and provides funding to help states, local governments, and nonprofit organizations’ develop programs to reduce violence against women. Many DOJ programs aim to strengthen responses at the local, state, tribal, and federal levels to domestic violence, dating violence, sexual assault, and stalking. Further, the Violence Against Women Reauthorization Act of 2013 amended federal laws to establish criminal penalties for strangulation or suffocation. Additionally, DOJ increased its support of activities focused on training to recognize and prosecute strangulation. HHS agencies also conduct work related to recognizing and responding to TBI. For example, NIH funds research aimed at developing knowledge about the brain and nervous system in order to reduce the effect of brain- related diseases on individuals. In addition, CDC conducts research on the prevention of TBIs, and ACL provides grants to states to help them to support individuals with brain injuries and to promote the rights of, and provide advocacy support to, those living with TBI. We identified 12 initiatives led by non-federal entities that focused on (1) education on brain injuries resulting from intimate partner violence by developing materials or offering training; (2) screening victims of intimate partner violence for potential brain injuries; or (3) treatment involving individuals with brain injuries resulting from intimate partner violence. Our list represents initiatives identified during the course of our review and may not be exhaustive. Some of these initiatives focus on only TBI or strangulation, while others focused on both. See appendix II for additional information on the initiatives. Training for Domestic Violence Program Staff Domestic violence program advocates we spoke to told us that before they participated in the Ohio Domestic Violence Network training, they knew their clients were having a hard time remembering things or getting their thoughts across; however, they did not know this could be the result of a brain injury. The training helped advocates identify signs and symptoms in their clients and make others aware of these symptoms. For example, advocates told us they may inform a prosecutor that a client may have a brain injury and may have difficulty remembering or sharing their experiences. The Ohio Domestic Violence Network—as a part of its Connect, Acknowledge, Respond, Evaluate (CARE) initiative—trained staff at five domestic violence programs on brain injuries, and developed educational materials for shelter staff to share with intimate partner violence victims, according to network officials. For example, we spoke to staff at a domestic violence program in Ohio who told us how the education they received from the network helped them identify the signs and symptoms of brain injury in their clients. Staff from another domestic violence program in Ohio told us as a result of CARE training they now suggest strategies to clients to assist them with their memory issues, such as writing appointment information on a whiteboard or in a planner. The Swedish Hospital Violence Prevention Program, in Illinois, provided education to physicians, medical residents, and hospital staff to increase health care provider and staff awareness of and ability to respond to brain injuries among victims of intimate partner violence, according to officials with the initiative. The Safe Futures initiative, in Connecticut, developed strangulation training materials for emergency medical personnel, law enforcement, prosecutors, and providers, as well as hosted trainings throughout Connecticut on intimate partner violence and brain injuries, according to officials with the initiative. Screening. Six of the 12 initiatives used screening tools to identify potential brain injuries among intimate partner violence victims, according to officials. Based on our review of documentation from these initiatives, we found that the screening tools generally had a series of questions about injuries to the head, the loss of consciousness, or behavior changes—symptoms that may indicate a potential brain injury. For example: Officials from three initiatives that screened victims for potential brain injuries reported using a version of the HELPS screening tool. (See fig. 4 for an example of a modified version of this screening tool used by one initiative.) Officials from one initiative told us that screening typically occurred at domestic violence shelters where staff and advocates receive training on how to screen intimate partner violence victims. Officials from the other three initiatives told us they developed their own screening methods. For example, staff at the Maricopa County Collaboration on Concussions in Domestic Violence in Arizona screen victims using a tool that measures near point of convergence, which refers to an individual’s ability to focus both eyes on a target, an approach that can be used to detect a concussion. Police officers from two participating departments in Arizona have used this tool to screen individuals when they respond to a domestic violence call, according to officials with the collaboration. Treatment. Two of the 12 initiatives included a treatment component. Officials with the Barrow Concussion and Brain Injury Center in Arizona and the Northside Hospital Duluth Concussion Institute in Georgia told us they provided treatment to victims who were referred by local domestic violence shelters. Providers affiliated with one of these initiatives told us that treatment for brain injuries resulting from intimate partner violence does not differ from treatment for other brain injuries. A provider with one of these initiatives said that treatment could include exercises and movements that decrease dizziness, vertigo, and imbalance; occupational, physical, or speech therapies; or treatment for pain management. An Intimate Partner Violence Victim’s Brain Injury Treatment Jane Doe was abused by her partner. An advocate at a domestic violence shelter screened Jane for a brain injury and referred her for assessment. She was diagnosed and began treatment for a brain injury. Jane Doe told us that the treatments she received, which included nerve blockers—often used by neurologists to lessen chronic pain—helped to relieve the persistent headaches and debilitating migraines she experienced in the aftermath of her abuse. She told us that as a result of the treatment she received, she feels better able to function. Officials from the Barrow Concussion and Brain Injury Center told us that individuals with brain injuries resulting from intimate partner violence may face a longer period of recovery compared to others with brain injuries, in part, because of living in unsafe home environments. As a result, special considerations are sometimes needed due to additional barriers faced by domestic violence victims. For example: Victims may need safety planning and housing. As a part of the Barrow Concussion and Brain Injury Center’s domestic violence initiative, a social worker will help ensure that victims’ other needs are met. Officials from the Northside Hospital Duluth Concussion Institute noted that transportation could also be a barrier for victims of intimate partner violence. As such, the Georgia Department of Public Health’s Injury Prevention Program, which partnered with the Northside Hospital Duluth Concussion Institute, planned to use CDC grant funding to provide domestic violence victims transportation from area shelters to the concussion institute for treatment. Officials from the Barrow Concussion and Brain Injury Center also told us about other considerations, such as the need to have a flexible appointment policy to account for the possibility of victims missing or canceling appointments. Of the 12 initiatives we identified, eight received federal grants from HHS or DOJ, while officials from the other four initiatives told us they were funded with state, local, or private dollars. According to HHS and DOJ officials, the grants did not have specific requirements to address the intersection of brain injuries and intimate partner violence. However, based on our review of documentation, the eight initiatives used the federal funds to focus on the intersection of these two issues. Six of these eight initiatives received funding from HHS. Of them, four were funded by HRSA or ACL grants that focused on TBI-related services and activities, and two were funded by CDC grants focused on injury and violence prevention activities. The other two initiatives were funded by DOJ’s Office of Justice Programs through grants that provide funds to support victims of crime. In addition to the federal funding received by some of the 12 initiatives, we identified other efforts and grants funded by HHS and DOJ. These efforts made educational materials on intimate partner violence and brain injuries accessible online, made ad-hoc or internal trainings available to external parties, or provided education that touched on the connection between intimate partner violence and brain injury, according to HHS and DOJ officials. For example: ACF has funded the National Resource Center on Domestic Violence and Futures Without Violence’s National Health Resource Center on Domestic Violence, which provide information related to intimate partner violence and brain injuries via websites. ACF, in collaboration with HRSA, funded an effort led by Futures Without Violence, which includes some information on TBI and strangulation in trainings for select state leadership teams working to address intersections of health, intimate partner violence, and human trafficking. DOJ’s Office on Violence Against Women provided grant funds to support the Training Institute on Strangulation Prevention, which offers training to individuals and outside entities to help them understand, recognize, and appropriately serve strangulation victims, as well as investigate and prosecute strangulation cases. DOJ’s Office on Violence Against Women has also provided grant funds used by local organizations, such as police departments, to provide ad-hoc or internal training activities on brain injuries and to serve victims with brain injuries, including those caused by strangulation. Based on our review of the literature, as well as interviews with HHS officials and other non-federal stakeholders, we found that data on the overall prevalence of brain injuries resulting from intimate partner violence are limited. Specifically, available data do not provide an overall estimate of the prevalence of brain injuries resulting from intimate partner violence nationwide. While there are studies that estimate the prevalence of these injuries, these studies are also limited. Specifically, among the 28 articles we reviewed, six included an objective to estimate the prevalence of brain injuries resulting from intimate partner violence, while the remaining 22 articles examined other areas, such as health effects or awareness of brain injuries resulting from intimate partner violence, but did not have an objective to estimate prevalence. The six articles are also specific to a certain subpopulation or certain geographic locations and used different approaches to identify individuals with brain injuries. As a result, the range of reported prevalence rates on victims of intimate partner violence with brain injuries (brain injuries caused by trauma or strangulation) varied greatly (from 11 percent to about 79 percent) and were based on a range of sample sizes, from 95 people to about 1,000 people. HHS agencies also have some data collection and research efforts related to this issue; however, these efforts are limited as well. For example, CDC and NIH have efforts that may assist in better understanding the connection between brain injuries and intimate partner violence, but CDC’s efforts do not account for all causes of brain injuries and NIH has only one study focused on this connection. Further, HHS agencies treat brain injuries and intimate partner violence as separate public health issues and pursue their efforts separately—which limits their ability to better understand the connection between the issues and the overall prevalence of brain injuries that result from domestic violence. CDC officials told us that the agency’s data on the connection between brain injuries and intimate partner violence are limited, but the agency plans to address some of the limitations. For example, the officials said CDC analyzes health care claims data from emergency department visits to determine the causes of TBI. However, CDC officials told us that these data likely underestimate TBI among victims of intimate partner violence, because many do not seek medical care; for domestic violence victims who seek care, providers are unlikely to designate the individual as a victim of intimate partner violence. CDC also collects data on intimate partner violence through its NISVS. According to CDC reports, NISVS data are a key source of information on intimate partner violence, but the survey does not collect data on all types of brain injuries related to intimate partner violence. For example, the NISVS estimates the prevalence of victims of intimate partner violence who have been “knocked out after getting hit, slammed against something, or choked.” However, published estimates are based on responses to a survey question that asks individuals about being “knocked out,” which is a colloquial term commonly used to indicate a loss of consciousness. CDC officials stated that in most known incidents of mild brain injury, people do not lose consciousness. As a result, NISVS data likely understate the number of intimate partner violence victims who may have brain injuries. In order to better estimate TBIs resulting from intimate partner violence, CDC officials told us they plan to add a survey question to the NISVS to ask respondents about whether they have experienced a concussion—a common term for mild forms of TBI—due to a current or ex-partner. CDC officials told us that they have begun initial testing on several aspects of the survey, including on the additional question with the goal to begin data collection by the end of 2022, plans which are pending approval. Once the NISVS data are collected and analyzed, CDC officials said the data could help them provide a nationally representative prevalence estimate of intimate partner violence victims’ who experienced a TBI in their lifetimes. However, adding the question to the NISVS may not ensure that these data can provide a comprehensive estimate of the prevalence of brain injuries resulting from intimate partner violence. In particular, The NISVS question will focus on TBIs, and will not account for individuals with brain injuries caused by strangulation. According to educational materials developed by the Training Institute of Strangulation Prevention and used by HRSA in the training of providers and advocates, more than two-thirds of intimate partner violence victims are strangled at least once. CDC officials told us that they are able to measure acts of choking or suffocation through the NISVS, but this measure cannot be used to account for brain injuries resulting from strangulation. Additionally, CDC officials told us that the agency’s priority is to focus on TBI specifically rather than accounting for other brain injuries. Despite the focus on TBIs, CDC officials told us the NISVS data are not designed to examine whether intimate partner violence is a leading cause of TBI in comparison with other causes, such as sports or motor vehicle crashes. CDC officials said that some research and NISVS data suggest that intimate partner violence is not as large a contributor of TBIs when compared to other contributors. However, they noted that they do not have data on the proportion of TBIs resulting from intimate partner violence. Absent the ability to compare intimate partner violence as a cause of TBI against other contributors through the NISVS or other representative studies, CDC officials will continue to lack an understanding of the full scope of TBIs, their primary causes, and who is affected by them. NIH officials identified two agency efforts that could help improve what is known about the connection between brain injuries and intimate partner violence. NIH began funding a study in September 2019 that will use advanced brain imaging, blood analyses, and cognitive and psychological testing to study the effects of multiple brain injuries on women subjected to intimate partner violence. The objectives of the study are not to measure prevalence, but to examine the health effects of brain injuries resulting from intimate partner violence. NIH officials told us that this is the first study funded by NIH using brain images to investigate brain injuries resulting from intimate partner violence. NIH is also developing blood biomarkers—which are clinical diagnosis tools—for identifying mild TBI. Currently, mild TBI is generally diagnosed by taking an inventory of symptoms, but symptoms can lead to misdiagnoses, including for mental illness or a substance use disorder. NIH officials said they are in the initial stages of developing these biomarkers, which could take the place of screening tools in diagnosing a brain injury. While this effort was not initiated to better understand brain injuries among victims of intimate partner violence, biomarkers have the potential to improve the identification of TBIs, provided they are applied to domestic violence victims. Two other HHS agencies—ACL and HRSA—also have efforts that address brain injuries or intimate partner violence. However, these agencies’ efforts are generally not focused on the connection of the two issues, so they are not likely to result in more complete data on the prevalence of brain injuries resulting from intimate partner violence. Specifically: ACL provides grants to states to establish support services for individuals with brain injuries through its TBI State Partnership Program. As part of these efforts, ACL officials told us that they have begun to gather information to determine how many TBI grant recipients are using the funds to support particular populations, including individuals with TBI resulting from intimate partner violence. As of December 2019, ACL officials told us that two states (Idaho and Iowa) have used the grants to focus on individuals with TBI as a result of intimate partner violence. HRSA has proposed an effort to collect data that may assist in further understanding the health consequences of intimate partner violence. As part of its strategy to address intimate partner violence, HRSA officials recently began requiring federally qualified health centers to capture International Classification of Diseases-10 codes for intimate partner violence on health care claims beginning in 2020. This effort is not aimed at the intersection of intimate partner violence and brain injuries; the purpose of this data collection is to better understand the effect of intimate partner violence on victims’ health outcomes. While these data may currently underestimate the number of individuals affected by intimate partner violence, HRSA officials told us that their goal in collecting these data is to underscore the significance of intimate partner violence and help position providers to assist victims. Further, knowing the prevalence of brain injuries resulting from intimate partner violence and using these data could help officials further target education campaigns to providers on the potential injuries associated with intimate partner violence. Officials from HHS agencies acknowledge that the lack of prevalence data on brain injuries resulting from intimate partner violence is a challenge in addressing the intersection of these issues. However, HHS and its agencies do not have a plan for how they would collect better prevalence data, including a plan that specifies the extent to which HHS agencies should collaborate on data collection efforts. Although HHS agencies have some efforts underway, these efforts are limited or do not examine the connection between the issues. For example, CDC is working to add a question to NISVS to improve what is known about the prevalence of TBIs among victims of intimate partner violence; however, this effort overlooks brain injuries resulting from strangulation—which HRSA reports is often also experienced by these victims—because CDC’s priorities are to focus on TBIs specifically. Further, the newly funded NIH study is not intended to estimate the overall prevalence of brain injuries resulting from intimate partner violence. Having complete data on the prevalence of brain injuries resulting from intimate partner violence could strengthen HHS’s efforts to address this public health issue. HHS and its agencies acknowledge that enhancing the health and well-being of Americans is critical to their public health mission and intimate partner violence and TBIs are both prominent injury and violence issues. As part of this mission, CDC uses its Public Health Approach to guide its public health related efforts. The first step of this approach is to define the problem, which includes collecting prevalence data to understand the magnitude of the problem, where the problem exists, and whom it affects. According to CDC, such data are critical to ensuring that resources are focused on the individuals most in need. Collecting data on the prevalence of brain injuries resulting from intimate partner violence is a critical first step. With better data comes a better understanding of the overall prevalence of brain injuries resulting from intimate partner violence. This would give HHS and its agencies the information necessary to inform their efforts and allocate resources, including grant funding, to address victims of brain injuries resulting from intimate partner violence. Intimate partner violence affects over 30 percent of women and men in the United States, and research has raised concerns about brain injuries sustained by these domestic violence victims. Officials from HHS agencies acknowledge the lack of overall prevalence data on brain injuries resulting from intimate partner violence and the adverse effect this lack of data has on understanding the intersection of these two issues. While HHS agencies have some efforts underway to address brain injuries and intimate partner violence, they are limited and address these issues separately. Therefore, HHS and its agencies have missed an opportunity to improve their public health efforts to address this issue, particularly the prevalence of the problem, where the problem exists, and whom it affects. By working together, HHS and its agencies can identify ways that each agency’s efforts could result in better prevalence data and a better overall understanding of brain injuries resulting from intimate partner violence. Improved data, in turn, could also help ensure that federal resources are allocated to the appropriate areas and used as efficiently and effectively as possible to address this public health issue. We are making the following recommendation to HHS: The Secretary of HHS should develop and implement a plan to improve data collected on the prevalence of brain injuries resulting from intimate partner violence and use these data to inform HHS’s allocation of resources to address the issue. (Recommendation 1) We provided a draft of this report to HHS and DOJ for review and comment. In its written comments (reproduced in app. III), HHS concurred with our recommendation and noted that it is coordinating a plan amongst its relevant agencies to augment data collection on the prevalence of brain injuries resulting from intimate partner violence. HHS noted that these data will continue to inform the needs of this vulnerable population. HHS and DOJ also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, Secretary of Health and Human Services, Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or yocomc@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. We identified articles for our literature review through a search of bibliographic databases, including Harvard Library Think Tank Search, MEDLINE, and Scopus, using terms such as “intimate partner violence,” “domestic violence,” “traumatic brain injury,” and “strangulation.” We determined there were 57 relevant articles from 2009 through August 2019 discussing brain injuries resulting from intimate partner violence. We reviewed the 57 articles to examine brain injuries resulting from intimate partner violence, including background information on the concerns of brain injuries resulting from intimate partner violence and challenges that researchers may have identified in conducting this work. Of the 57 articles, we identified 28 that had conducted their own data analyses. We analyzed these 28 articles to examine data on prevalence rates, as well as research on health effects, treatment, and screening tools for identifying brain injuries resulting from intimate partner violence. The following articles are based on an original analysis of data. Brown, Joshua, Dessie Clark, and Apryl E. Pooley. “Exploring the Use of Neurofeedback Therapy in Mitigating Symptoms of Traumatic Brain Injury in Survivors of Intimate Partner Violence.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 6 (2019): 764-783. Campbell, Andrew M., Ralph A. Hicks, Shannon L. Thompson, and Sarah E. Wiehe. “Characteristics of Intimate Partner Violence Incidents and the Environments in Which They Occur: Victim Reports to Responding Law Enforcement Officers.” Journal of Interpersonal Violence (2017): 1-24. Campbell, Jacquelyn C., Jocelyn C. Anderson, Akosoa McFadgion, Jessica Gill, Elizabeth Zink, Michelle Patch, Gloria Callwood, and Doris Campbell. “The Effects of Intimate Partner Violence and Probable Traumatic Brain Injury on Central Nervous System Symptoms.” Journal of Women’s Health, vol. 27, no. 6 (2018): 761-767. Cimono, Andrea, N., Grace Yi, Michelle Patch, Yasmin Alter, Jacquelyn C. Campbell, Kristin K. Gunderson, Judy T. Tang, Kiyomi Tsuyuki, and Jamila K. Stockman. “The Effect of Intimate Partner Violence and Probable Traumatic Brain Injury on Mental Health Outcomes for Black Women.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 6 (2019): 714-731. Crowe, Allison, Christine E. Murray, Patrick R. Mullen, Kristine Lundgren, Gwen Hunnicutt, and Loreen Olson. “Help-Seeking Behaviors and Intimate Partner Violence-Related Traumatic Brain Injury.” Violence and Gender, vol. 6, no. 1 (2019): 64-71. Gagnon, Kelly L., and Anne P. DePrince. “Head Injury Screening and Intimate Partner Violence: A Brief Report.” Journal of Trauma & Dissociation, vol. 18, no. 4 (2017): 635-644. Higbee, Mark, Jon Eliason, Hilary Weinberg, Jonathan Lifshitz, and Hirsch Handmaker. “Involving Police Departments in Early Awareness of Concussion Symptoms during Domestic Violence Calls.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 7 (2019): 826-837. Hunnicutt, Gwen, Christine Murray, Kristine Lundgren, Allison Crowe, and Loreen Olson. “Exploring Correlates of Probable Traumatic Brain Injury among Intimate Partner Violence Survivors.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 6 (2019): 677-694. Hux, Karen, Trish Schneider, and Keri Bennett. “Screening for traumatic brain injury.” Brain Injury, vol. 23, no. 1 (2009): 8-14. Joshi, Manisha, Kristie A. Thomas, and Susan B. Sorenson. “‘I Didn’t Know I Could Turn Colors’: Health Problems and Health Care Experiences of Women Strangled by an Intimate Partner.” Social Work in Health Care, vol. 51, no. 9 (2012): 798-814. Linton, Kristen Faye. “Interpersonal violence and traumatic brain injuries among Native Americans and women.” Brain Injury, vol. 29, no. 5 (2015): 639-643. Messing, Jill T., Kristie A. Thomas, Allison L. Ward-Lasher, and Nathan Q. Brewer. “A Comparison of Intimate Partner Violence Strangulation Between Same-Sex and Different-Sex Couples.” Journal of Interpersonal Violence, vol. 00, no. 0 (2018): 1-19. Messing, Jill T., Michelle Patch, Janet S. Wilson, Gabor D. Kelen, Jacquelyn Campbell. “Differentiating among Attempted, Completed, and Multiple Nonfatal Strangulation in Women Experiencing Intimate Partner Violence.” Women’s Health Issues, vol. 28, no. 1 (2018): 104-111. Mittal, Mona, Kathryn Resch, Corey Nichols-Hadeed, Jennifer Thompson Stone, Kelly Thevenet-Morrison, Catherine Faurot, and Catherine Cerulli. “Examining Associations between Strangulation and Depressive Symptoms in Women with Intimate Partner Violence Histories.” Violence and Victims, vol. 33, no. 6 (2019): 1072-1087. Nemeth, Julianna M., Cecilia Mengo, Emily Kulow, Alexandra Brown, and Rachel Ramirez. “Provider Perceptions and Domestic Violence (DV) Survivor Experiences of Traumatic and Anoxic-Hypoxic Brain Injury: Implications for DV Advocacy Service Provision.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 6 (2019): 744-763. Pritchard, Adam J., Amy Reckdenwald, Chelsea Nordham, and Jessie Holton. “Improving Identification of Strangulation Injuries in Domestic Violence: Pilot Data From a Researcher-Practitioner Collaboration.” Feminist Criminology, vol. 12, no. 2 (2018): 160-181. Ralston, Bridget., Jill Rable, Todd Larson, Hirsch Handmaker, and Jonathan Lifshitz. “Forensic Nursing Examination to Screen for Traumatic Brain Injury following Intimate Partner Violence.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 6 (2019): 732-743. Reckdenwald, Amy, Ketty Fernandez, and Chelsea L. Mandes. “Improving law enforcement’s response to non-fatal strangulation.” Policing: An International Journal (2019): 1-15. Reckdenwald, Amy, Chelsea Nordham, Adam Pritchard, and Brielle Francis. “Identification of Nonfatal Strangulation by 911 Dispatchers: Suggestions for Advances Toward Evidence-Based Prosecution.” Violence and Victims, vol. 32, no. 3 (2017): 506-520. Shields, Lisa B.E., Tracey S. Corey, Barbara Weakley-Jones, and Donna Stewart. “Living Victims of Strangulation.” American Journal of Forensic Medicine and Pathology, vol. 31, no. 4 (2010): 320-325. St. Ivany, Amanda, Linda Bullock, Donna Schminkey, Kristen Wells, Phyllis Sharps, and Susan Kools. “Living in Fear and Prioritizing Safety: Exploring Women’s Lives After Traumatic Brain Injury From Intimate Partner Violence.” Qualitative Health Research, vol. 28, no. 11 (2018): 1708-1718. St. Ivany, Amanda, Susan Kools, Phyllis Sharps, and Linda Bullock. “Extreme Control and Instability: Insight Into Head Injury From Intimate Partner Violence.” International Association of Forensic Nursing, vol. 14, no. 4 (2018): 198-205. St. Ivany, Amanda, and Donna Schminkey. “Rethinking Traumatic Brain Injury from Intimate Partner Violence: A Theoretical Model of the Cycle of Transmission.” Journal of Aggression, Maltreatment & Trauma, vol. 28, no. 7 (2019): 1-23. Sullivan, Karen A, and Christina Wade. “Assault-Related Mild Traumatic Brain Injury, Expectations of Injury Outcome, and the Effects of Different Perpetrators: A Vignette Study.” Applied Neuropsychology: Adult, vol. 26, no. 1 (2019): 58-64. Sullivan, Karen A, and Christina Wade. “Does the Cause of the Mild Traumatic Brain Injury Affect the Expectation of Persistent Postconcussion Symptoms and Psychological Trauma?” Journal of Clinical and Experimental Neuropsychology, vol. 39, no. 4 (2017): 408- 418. Valera, Eve M., Aihua Cao, Ofer Pasternak, Martha E. Shenton, Marek Kubicki, , Nikos Makris, and Noor Adra. “White Matter Correlates of Mild Traumatic Brain Injuries in Women Subjected to Intimate-Partner Violence: A Preliminary Study.” Journal of Neurotrauma, vol. 36 (2019): 661-668. Valera, Eve, and Aaron Kucyi. “Brain Injury in Women Experiencing Intimate Partner-Violence: Neural Mechanistic Evidence of an “Invisible” Trauma.” Brain Imaging and Behavior, vol. 11 (2017): 1664-1677. Zieman, Glynnis, Ashley Bridwell, and Javier F. Cardenas. “Traumatic Brain Injury in Domestic Violence Victims: A Retrospective Study at the Barrow Neurological Institute.” Journal of Neurotrauma, vol. 33, (2016): 1- 5. The following table provides a brief overview of each of the 12 initiatives we identified based on information provided by the Department of Health and Human Services, the Department of Justice, and other stakeholders. These initiatives engage in various efforts to address intimate partner violence and brain injuries, including traumatic brain injury and anoxic injuries resulting from strangulation. Our list includes those efforts identified during the course of our review and may not be exhaustive. The descriptions of initiatives are based on our review of documentation and information obtained from interviews with officials. In addition to the contact named above, Shannon Slawter Legeer (Assistant Director), Danielle Bernstein (Analyst-in-Charge), and Ashley Dixon made key contributions to this report. Also contributing were Leia Dickerson, Kaitlin Farquharson, Drew Long, and Ethiene Salgado- Rodriguez.", "summary": "Research has found brain injuries to be common among victims of intimate partner violence, and that such injuries are under-diagnosed and under-treated. House Report 115-952 included a provision for GAO to report on the relationship between intimate partner violence and brain injuries. GAO (1) describes efforts to provide education, screen for, or treat brain injuries resulting from intimate partner violence; and (2) examines what is known about the prevalence of brain injuries resulting from intimate partner violence, including HHS efforts to determine prevalence. GAO reviewed peer-reviewed literature, federal websites, and documentation from HHS and DOJ. GAO also interviewed officials from HHS, DOJ, and 11 non-federal stakeholders, such as domestic violence organizations. GAO identified 12 initiatives, though this list may not be exhaustive, and conducted site visits to three of them. According to the Centers for Disease Control and Prevention (CDC), one in three adults have experienced domestic violence, also known as intimate partner violence. Intimate partner violence includes physical violence, sexual violence, stalking, and psychological aggression. Victims of intimate partner violence may experience brain injury, resulting from blows to the head or strangulation. To address this issue, the Department of Health and Human Services (HHS) and the Department of Justice (DOJ) provide grants to state and local entities that work with victims. GAO identified 12 non-federal initiatives that provide education, screen for, or treat brain injuries resulting from intimate partner violence. All 12 developed and distributed education and training materials to domestic violence shelter staff, victims, health care providers, and others. Six of the 12 initiatives used screening tools to identify potential brain injuries among intimate partner violence victims, and two included a treatment component. Additionally, eight of the 12 initiatives received HHS or DOJ grant funding, although agency officials told us the funding had no specific requirements to address brain injuries resulting from intimate partner violence. Based on its review of the literature, as well as interviews with HHS officials and other non-federal stakeholders, GAO found that data on the overall prevalence of brain injuries resulting from intimate partner violence are limited. HHS officials acknowledged that the lack of data on the prevalence of these issues is a challenge in addressing the intersection of the issues. However, HHS does not have a plan for how it would collect better prevalence data. HHS agencies have some related efforts underway; however, the efforts are limited and generally do not examine the connection between brain injuries and intimate partner violence. Enhancing the health and well-being of Americans is critical to HHS's public health mission. As part of this mission, CDC, within HHS, uses its Public Health Approach, which includes collecting prevalence data to understand the magnitude of public health issues. With better data comes a better understanding of the overall prevalence of brain injuries resulting from intimate partner violence. This, in turn, could help ensure that federal resources are allocated to the appropriate areas and used as efficiently and effectively as possible to address this public health issue. HHS should develop and implement a plan to improve data collected on the prevalence of brain injuries resulting from intimate partner violence and use these data to inform its allocation of resources to address the issue. HHS concurred with our recommendation and is coordinating with its agencies to augment data collection.", "document_type": "gao"}
{"report": "In most cases, a noncitizen must be a LPR to enlist in the U.S. Armed Forces. Special provisions of the INA authorize the naturalization of current and recently discharged service members. Qualifying military service includes active or reserve service in the U.S. Army, Navy, Marine Corps, Air Force, Coast Guard, or service in a National Guard unit. A person who has served honorably in the U.S. Armed Forces for 1 year during peacetime may be eligible to apply for naturalization. In addition, during designated periods of hostilities, such as World War I and World War II and the current global war on terrorism, members of the U.S. Armed Forces who serve honorably in an active duty status, or as members of the Selected Reserve of the Ready Reserve, are eligible to apply for naturalization without meeting any minimum required period of service. DOD determines if a service member meets the qualifying service requirement by certifying Form N-426, Request for Certification of Military or Naval Service, or by issuing Forms DD-214, Certificate of Release or Discharge from Active Duty, NGB-22, National Guard Report of Separation and Record of Service, or an equivalent discharge document. The information provided in those forms determines whether or not the service member completed all requirements for honorable service, including whether the service member served honorably and, if he or she has separated from service, whether his or her separation was under honorable conditions. In order to naturalize, a member of the U.S. Armed Forces must also meet the requirements and statutory qualifications to become a citizen. Specifically, he or she must demonstrate good moral character and have sufficient knowledge of the English language, U.S. government, and history. Additionally, an applicant must show attachment to the principles of the Constitution and favorable disposition toward the good order and happiness of the United States. However, qualified members of the U.S. Armed Forces are exempt from other naturalization requirements, including application fees and requirements for continuous residence and physical presence in the United States. DOD also has authority to expand military recruiting to certain nonimmigrants and other lawfully present aliens. Beginning in December 2008, the Military Accessions Vital to the National Interest (MAVNI) program allowed certain U.S. nonimmigrant visa holders, asylees, refugees, and individuals with Temporary Protected Status to enlist in the military if they possessed medical, language, and other types of skills deemed vital for military operations. DOD ended the MAVNI program in fiscal year 2016, citing counterintelligence concerns. Between 2008 and 2016, 10,400 individuals enlisted in the U.S. military through the MAVNI program, according to DOD data. DHS is responsible for arresting, detaining, litigating charges of removability against, and removing foreign nationals who are suspected and determined to be in the United States in violation of U.S. immigration laws. Trial attorneys from ICE’s OPLA represent the U.S. government as civil prosecutors in immigration court removal proceedings. ICE’s ERO is responsible for arresting and detaining potentially removable foreign nationals pending the outcome of their immigration court cases and removing individuals subject to an immigration judge’s final order of removal. ICE’s HSI is responsible for investigating a range of domestic and international activities arising from the illegal movement of people and goods into, within, and out of the United States. Individuals may be subject to removal for a wide variety of reasons, including entering the United States illegally, staying longer than their authorized period of admission, being convicted of certain crimes, or engaging in terrorist activity. LPRs are foreign nationals under U.S. immigration law and therefore may be subject to immigration enforcement and removal from the United States for reasons such as controlled substance violations or conviction of an aggravated felony. Both HSI agents and ERO officers may encounter potentially removable individuals and are to decide whether to issue them a charging document, known as a NTA, ordering the individual to appear before an immigration judge to respond to removal charges. If the judge finds that the respondent is removable and not otherwise eligible for relief, the judge will issue an order of removal, subjecting the respondent to removal by ERO once the order is administratively final. The VA is responsible for administering benefits and services, such as health care and disability compensation, to veterans in the United States and abroad, including veterans who have been removed from the United States. VA pays monthly disability compensation to veterans for disabilities caused or aggravated by military service, known as service- connected disabilities. Veterans with service-connected disabilities may also be eligible for other VA benefits and services, such as job training. VA staff in regional offices process disability compensation claims. After a veteran submits a disability claim to VA, a VA Veterans Service Representative reviews the claim and assists the veteran with gathering relevant evidence, such as military service records, medical examinations, and treatment records from VA medical facilities and private providers. If necessary to provide support to substantiate the claim, VA will provide a medical examination, known as a Compensation and Pension (C&P) exam, to obtain evidence of the veteran’s disabilities and their connection to military service. Within the United States, medical providers who work for the Veterans Health Administration often conduct these exams. VA also contracts with private firms to perform these exams. Outside the United States, VA contracts with private firms to perform exams in 33 countries. In countries where VA contractors do not perform exams, VA coordinates with State staff at embassies and consulates to schedule exams with private providers. Once VA receives the claim evidence, a Rating Veterans Service Representative evaluates the claim and determines whether the veteran is eligible for benefits, and if so, assigns a percentage rating. After a rating is assigned, VA provides VSO staff assisting a veteran with a claim up to 48 hours to review the claim decision prior to finalizing the decision. A Veterans Service Representative then determines the amount of the award, if any, and drafts a decision notice. A senior Veterans Service Representative then reviews and authorizes the award for release to the veteran. See figure 1 for details on the 5 phases of VA’s disability compensation claims process. From fiscal years 2013 through 2018, VA received over 8.9 million disability compensation claims from over 3.9 million veterans and awarded over $20.2 billion in benefits, according to VA data. ICE has developed policies that govern the handling of cases involving potentially removable veterans. When HSI agents and ERO officers learn that they have encountered a veteran, these policies require they conduct additional assessments, create additional documentation, and obtain management approval in order to proceed with the case. Specifically, in June 2004, ICE’s Acting Director of Investigations issued a memo giving the HSI Special Agent in Charge (SAC) in each field office the authority to approve issuance of a NTA in cases involving current service members or veterans. Similarly, in September 2004, ICE’s Acting Director of Detention and Removal Operations issued a memo giving the ERO Field Office Director (FOD) in each field office the authority to approve issuance of a NTA in cases involving current service members or veterans. In order to issue a NTA to a veteran, the SAC and FOD must consider, at a minimum, the veteran’s overall criminal history, evidence of rehabilitation, family and financial ties to the United States, employment history, health, and community service. The SAC and FOD must also consider factors related to the veteran’s military service, such as duty status (active or reserve), assignment to a war zone, number of years in service, and decorations awarded. To authorize issuance of the NTA, the SAC and FOD are to complete a memo to include in the veteran’s alien file and update ICE’s EARM database with a brief overview of the facts considered. Additionally, in November 2015, ICE’s Director issued a policy establishing ICE’s procedures for investigating the potential U.S. citizenship of individuals encountered by ICE. The policy states that prior military service is one of several indicators that an individual could be a U.S. citizen. Therefore, before issuing a NTA to a veteran or anyone with an indicator of potential U.S. citizenship, the ICE component that first encounters the individual (either HSI or ERO) is to conduct a factual examination, legal analysis, and a check of all available DHS systems, such as USCIS’s Person-Centric Query Service, to assess whether the individual is a U.S. citizen. ERO or HSI (whichever conducted the factual examination) and OPLA’s Office of Chief Counsel must jointly prepare a memorandum that assesses the individual’s citizenship status and recommends a course of action, then submit that memorandum for review and approval by ICE headquarters. The policy also requires that a copy of the memorandum be placed in the individual’s alien file. Our analysis of removed veterans’ alien files found that ICE does not consistently follow these policies. Specifically, ICE policies require agents and officers to document the decision to issue a NTA to a veteran, but do not require agents and officers to identify and document veteran status when interviewing potentially removable individuals. Our analysis found that ICE did not satisfy the 2004 requirement for FOD approval in 18 of 87 (21 percent) cases that OPLA’s check box indicated involved veterans who were placed into removal proceedings and ERO data indicated had been removed from fiscal years 2013 through 2018. Our analysis also found that ICE did not meet the requirements of the 2015 policy requiring elevation to headquarters in 26 of the 37 cases (70 percent) of the cases for which the policy applied. Further, in December 2018 HSI officials told us that HSI has not been adhering to either the 2004 or the 2015 policies because they were unaware of the policies prior to our review. HSI officials stated that they do not distinguish between veterans and nonveterans when conducting administrative or criminal investigations or when deciding whether to issue a NTA. ERO officials stated that the absence of documentation in the alien file does not necessarily indicate that officers did not adhere to the policies; however, as noted above, the policies specifically require ICE to add documentation to the alien file. Because ICE did not consistently follow these policies, some veterans who were removed may not have received the level of review and approval that ICE has determined is appropriate for cases involving veterans. Taking action to ensure consistent implementation of its policies for handling cases of potentially removable veterans, such as issuing guidance or providing training, would help ICE better ensure that potentially removable veterans receive appropriate levels of review and consideration prior to the initiation of removal proceedings. ICE has not developed a policy to identify and document all military veterans it encounters. According to ERO officials, when ERO officers encounter an individual, they interview that individual and complete the Form I-213, “Record of Deportable/Inadmissible Alien,” which documents information on, among other things, the individual’s country of citizenship and most recent employer. Officials stated that ERO officers would generally learn about the individual’s veteran status during that interview. However, ICE does not have a policy requiring agents and officers to specifically ask about and document veteran status. According to ERO officials, ERO does not need such a policy because ERO’s training for new officers, the Basic Immigration Enforcement Training Program, instructs officers to ask about veteran status when interviewing potentially removable aliens. The Basic Immigration Enforcement Training Program includes one lesson plan and one practice exercise stating that the I-213 “Record of Deportable/Inadmissible Alien” should include information on military service, as applicable. The lesson plan also includes a list of mandatory questions that ERO officers must ask in every encounter with an alien; however, that list of mandatory questions does not include any questions about military service. Further, the I-213 “Record of Deportable/Inadmissible Alien” does not have a specific field to indicate veteran status, and ERO’s cover sheet that supervisors use to review the legal sufficiency of NTAs does not contain information about veteran status. For cases processed by HSI, HSI officials stated that agents would generally learn about the individual’s veteran status through the initial interview or through background checks or other information obtained in the course of an HSI investigation. However, during the course of our review, HSI officials stated that there was no policy requiring agents to ask about or document veteran status because, as discussed above, HSI does not handle veterans’ cases differently from other cases. Without mechanisms in place to identify and document veterans, ICE is not positioned to determine whether or not individuals it encounters are potentially veterans and for which individuals the 2004 and 2015 policies discussed above for handling cases of potentially removable veterans should be applied. Standards for Internal Control in the Federal Government state that management should design control activities—that is, the policies, procedures, techniques, and mechanisms that enforce management’s directives to achieve the entity’s objectives. ICE officials told us that the 2004 and 2015 policies are intended to provide guidance and direction to ICE agents and officers for handling cases of potentially removable veterans. ICE officials believe that these policies could be updated with additional guidance to agents and officers to ask about and document veteran status during interviews of potentially removable individuals. Without developing and implementing a new policy or revising its 2004 and 2015 policies to require agents and officers to ask about and document veteran status, ICE has no way of knowing whether it has identified all of the veterans it has encountered and, therefore, does not have reasonable assurance that it is consistently implementing its policies and procedures for handling veterans’ cases. Because ICE has not developed a policy to identify and document all military veterans it encounters, ICE does not maintain complete electronic data on veterans who have been placed in removal proceedings or removed. In the instances in which ICE agents and officers learn that they have encountered a veteran, none of the three ICE components who encounter veterans—ERO, OPLA, and HSI—maintain complete electronic data on the veterans they identify. ERO does not have a specific field for tracking veterans in its database, EARM. According to ERO officials, ERO officers can note veteran status on the Form I-213, “Record of Deportable/Inadmissible Alien,” but ERO does not have the ability to electronically search those notes to identify all of the veterans it has encountered. ERO officials stated that they do not maintain data on veteran status because they do not specifically target veterans for enforcement operations. OPLA has a check box tracking veteran status in its database, PLAnet, but the field is not mandatory. PLAnet also includes a case notes section, where an OPLA attorney may choose to document veteran status information. OPLA officials stated that the reliability of the veteran status box and case notes depends on the diligence of the attorney inputting the case information into PLAnet. HSI officials stated that they do not track veteran status at all because, as discussed above, veteran status does not affect their handling of cases. Our analysis of removed veterans’ alien files identified limitations with the only electronic data on veteran status ICE maintains—OPLA’s check box in the PLAnet database. Specifically, though OPLA’s check box indicated that all 87 of the aliens whose files we reviewed were veterans, we found that 8 of the 87 individuals (9 percent) did not serve in the U.S. Armed Forces, according to the information in their alien files. After reviewing these cases, OPLA officials stated that the individuals were incorrectly designated as veterans due to human error. OPLA officials stated that OPLA does not require attorneys to systematically track veteran status information in PLAnet because the database is not intended to be a data repository, but rather serves as a case management system for OPLA attorneys. OPLA officials stated that the official record of the alien’s case is the paper alien file. Because ICE does not maintain complete electronic data on potentially removable veterans it encounters, ICE does not know exactly how many veterans have been placed in removal proceedings or removed, or if their cases have been handled according to ICE’s policies. Standards for Internal Control in the Federal Government state that management uses quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. While tracking veteran status in the paper alien file may allow ICE to review whether a specific individual is a veteran, it does not provide the type of complete and accessible electronic data that would allow the agency to systematically evaluate its performance in adhering to its policies. Maintaining complete electronic data on veterans it encounters would assist ICE in determining the extent to which the agency has adhered to its policies for handling cases involving potentially removable veterans. For example, ICE could obtain quality information through a mandatory field, such as a check box to track veteran status. Based on the limited information available in OPLA’s PLAnet database, approximately 250 veterans were placed in removal proceedings or removed from the United States from fiscal years 2013 through 2018. As noted above, ICE does not maintain complete electronic data on veterans it encounters. While OPLA’s PLAnet includes some data on veterans who have been placed in removal proceedings, because the entry of veteran status data in PLAnet is not mandatory, there could be additional veterans who were placed in removal proceedings or removed during the timeframe of our review who were not noted in PLAnet or included in our analysis, as discussed below. We reviewed the data that were included in PLAnet on veterans who were placed in removal proceedings from fiscal years 2013 through 2018 and identified approximately 250 military veterans. This includes those individuals for whom the check box indicating veteran status was checked in PLAnet but, as noted above, does not represent complete data on all possible veterans placed in removal proceedings during the time period we reviewed. Among the approximately 250 individuals who were noted in PLAnet as veterans in removal proceedings, the most common countries of nationality were Mexico (about 40), Jamaica (about 30), El Salvador (about 10), Trinidad and Tobago (about 10), Germany (about 10), and Guatemala (about 10). At the end of fiscal year 2018, about 115 had been ordered removed, about 25 had been granted relief or protection from removal by an immigration judge, and about 5 had their cases administratively closed. The remainder of the cases were still open as of November 2018. From fiscal year 2013 through 2018, ERO had removed 92 of the approximately 250 military veterans from the United States, of which 90 were foreign nationals with one or more criminal convictions, according to ERO data. Nine of the removed veterans had service-connected disabilities recognized by VA, including four removed veterans who had service-connected post-traumatic stress disorder. Based on our review of the alien files of 87 of the individuals that OPLA’s check box indicated were veterans and ERO indicated had been removed, we identified the following characteristics: 26 veterans (30 percent) received an honorable discharge; 26 (30 percent) received a general discharge under honorable conditions; 13 (15 percent) received an other than honorable discharge; 8 (9 percent) received an uncharacterized discharge; 3 (3 percent) received a bad conduct discharge; 2 (2 percent) received a dishonorable discharge; 8 (9 percent) had no evidence of military service in their alien file; and 1 (1 percent) did not have a discharge characterization listed in the alien file. 74 veterans (85 percent) were LPRs, 6 (7 percent) were citizens of the Marshall Islands, the Federated States of Micronesia, and Palau who enlisted under the Compact of Free Association, 6 (7 percent) did not have evidence of lawful status, and 1 (1 percent) was a recipient of Deferred Action for Childhood Arrivals. 26 veterans (30 percent) had previously applied for naturalization with USCIS; 3 of whom submitted multiple applications. Seventeen of those naturalization applications were denied by USCIS, 9 were administratively closed, and 2 were withdrawn. 68 veterans (78 percent) were ordered removed because of at least one aggravated felony conviction, while the remaining 19 (22 percent) were ordered removed for non-aggravated felony convictions. Of the convictions ICE cited on the 87 veterans’ NTAs: 32 veterans had drug-related convictions; 20 had convictions related to sexual abuse, of which 18 involved minors; 21 had convictions related to homicide, assault, or attempted homicides or assaults; 16 had theft-related convictions; and 9 had convictions related to firearms, explosives, or explosive material. USCIS and DOD have policies facilitating the naturalization of noncitizen service members and veterans, and both agencies provide informational resources to noncitizen service members seeking naturalization. USCIS facilitates the application and naturalization process for current and recently discharged members of the U.S. Armed Forces through a dedicated Military Naturalization Unit, which processes military naturalization applications and assists field officers with administrative naturalization tasks overseas, among other things. USCIS interviews and naturalizes active-duty service members abroad at certain U.S. embassies, consulates, and military installations. To provide information to noncitizen service members and veterans, USCIS maintains a toll-free “Military Help Line” and an e-mail box exclusively for members of the military and their families and publishes an “Immigration 101” presentation for relevant stakeholders, including DOD personnel on military bases. In addition, USCIS provides DOD with a checklist of required documents for military naturalization applications and communication guidelines for naturalization application inquiries, according to USCIS officials. DOD determines whether a service member meets the qualifying service requirement for naturalization by certifying whether the service member has served “honorably,” and if he or she has separated from service, whether their separation was under honorable conditions. Additionally, according to DOD officials, every military installation generally designates a naturalization advisor within its Legal Services Office. The advisor, among other things, assists service members with preparation of their naturalization application packets and serves as an intermediary with USCIS staff. For example, at many Army installations, the Army Community Services Office typically performs this function. Although USCIS approved military naturalization applications at a fairly consistent rate from fiscal years 2013 through 2018, the number of applications received declined sharply from fiscal years 2017 to 2018, resulting in a decrease in the number of service members approved for naturalization in fiscal year 2018. From fiscal years 2013 through 2018, USCIS received 54,617 military naturalization applications; USCIS approved 46,835 (86 percent) and denied 3,410 (6 percent). Applicants’ most common countries of nationality were the Philippines (6,267 or 11 percent), Mexico (5,760 or 11 percent), Jamaica (3,510 or 6 percent), China (3,213 or 6 percent), and the Republic of Korea (2,982 or 5 percent). While the number of military naturalization applications was relatively stable between fiscal years 2013 and 2017, applications declined by 72 percent from fiscal year 2017 to fiscal year 2018, from 11,812 in fiscal year 2017 to 3,291 in fiscal year 2018, as shown in figure 2. As a result of this decline in applications, the number of service members approved for naturalization also declined, from 7,303 in fiscal year 2017 to 4,309 in fiscal year 2018. USCIS and DOD officials attributed the decline in military naturalization applications to several DOD policy changes. First, DOD suspended the MAVNI program in September 2016, which reduced the number of noncitizens joining the military. According to DOD officials, due to counterintelligence concerns, DOD suspended the program at the end of fiscal year 2016 and decided not to renew the program in fiscal year 2017. Second, in October 2017, DOD issued policies expanding background check requirements for LPR and MAVNI recruits. The policies specify that LPRs must complete a background check and receive a favorable military service suitability determination prior to entering any component of the U.S. Armed Forces. According to DOD officials, due to backlogs in the background check process, these new recruits were delayed in beginning their service, and officials stated that it may take DOD up to a year to complete enhanced requirements for certain recruits. DOD officials stated that they believe background check backlogs will decrease by the end of fiscal year 2019 and, as a result, the number of noncitizen service members eligible to apply for naturalization will increase. Third, in October 2017, DOD increased the amount of time noncitizens must serve before DOD will certify their honorable service for naturalization purposes. Under the new policy, noncitizens must complete security screening, basic military training, and serve 180 days for a characterization of service determination. Previously, DOD granted that determination in as little as a few days of service. USCIS made several changes to its military naturalization processes in response to or in tandem with DOD’s policy changes. First, in July 2017, USCIS determined that the completion of DOD background checks was relevant to MAVNI recruits’ eligibility for naturalization. USCIS thus began requiring currently-serving MAVNI recruits seeking military naturalization to complete all required DOD background checks before USCIS interviewed them, approved their applications, or administered the Oath of Allegiance to naturalize them. Second, in January 2018, USCIS ended its initiative to naturalize new enlistees at basic training sites. This initiative, known as the “Naturalization at Basic Training Initiative”, began in August 2009 as an effort to conduct outreach to new enlistees at the Army’s five basic training sites and provide noncitizen enlistees an opportunity to naturalize prior to completion of basic training. Because of DOD’s October 2017 policy change increasing the amount of time noncitizens must serve before they are eligible for a characterization of service determination, noncitizen service members no longer meet the requirements for naturalization while they are completing basic training. As a result, USCIS closed naturalization offices in Fort Sill, Fort Benning, and Fort Jackson. USCIS’s processing time for military naturalizations also increased, from an average of 5.4 months in fiscal year 2017 to 12.5 months in fiscal year 2018, according to USCIS data. USCIS officials attributed this increase to the backlog in DOD background checks for MAVNI recruits, as well as an increased volume of naturalization applications from non-military applicants. Citizenship status, including immigration enforcement or removal history, does not affect a veteran’s eligibility for VA benefits and services, according to VA officials. As a result, veterans who have been removed by ICE are entitled to the same VA benefits and services as any other veteran living abroad. Although being removed for violation of immigration law does not in and of itself affect eligibility for VA benefits and services, living abroad affects eligibility for certain benefits and services, as shown in table 1. These differences pertain to all veterans living abroad, including both veterans who have been removed by ICE and veterans who choose to reside abroad. Removed veterans may face additional obstacles in receiving certain benefits for which they are otherwise eligible because they may be barred from traveling to the United States. For example, a removed veteran may not be able to attend a hearing to appeal a VA disability rating decision because VA conducts those hearings exclusively in the United States. Additionally, a removed veteran may not be able to obtain certain Vocational Rehabilitation and Employment services if the veteran is unable to travel to the United States for medical referrals and case management. Veterans living abroad, including removed veterans, may experience challenges accessing certain benefits and services, including slower disability claim processing and Foreign Medical Program (FMP) claim reimbursement, difficulties related to the scheduling and quality of C&P exams, and difficulties communicating with VA. According to VA officials, VA’s processing time for disability compensation claims for veterans living abroad (foreign claims) has improved since fiscal year 2013. For example, in fiscal year 2013, VA processed foreign claims in an average of 521 days and in fiscal year 2018, VA’s processing time for foreign claims decreased to an average of 131 days. However, as of September 2018, VA was not meeting its timeliness goal of 125 days for processing foreign claims and VA took an average of 29 days longer to process foreign claims than domestic claims. VA officials attributed the longer processing times for foreign claims to unreliable foreign mail systems and issues with retrieving and translating foreign records, among other things. From fiscal years 2013 through 2018, VA received disability compensation claims from 26,858 veterans living abroad and awarded over $85 million in benefits, according to VA data. According to VA officials, VA’s processing time for health care claims reimbursements to veterans or their medical providers for treatment of service-connected conditions through FMP has also improved. For example, in October 2018, FMP was processing 53.8 percent of claims in 40 days compared to 70 percent of claims in 40 days in March 2019. However, as of March 2019, VA was not meeting its timeliness goal to process 90 percent of claims reimbursements through FMP in 40 days. FMP officials attributed these delays to the loss of four staff positions in April 2017, as well as FMP assuming responsibility for claims from the Philippines in October 2017. To improve FMP’s processing timeliness, FMP officials stated that VA funded three new full-time equivalent positions for fiscal year 2019. From fiscal years 2013 through 2018, VA reported receiving 373,916 claims reimbursements from veterans and providers living abroad and awarding over $169 million in claims reimbursements. According to both VA and VSO officials, veterans living abroad, including removed veterans, face challenges related to the scheduling and quality of C&P exams. As previously noted, veterans living abroad do not receive C&P exams from VA medical providers, but may receive exams from either a VA contractor or, in countries where VA does not have contractors, from a private provider scheduled by the U.S. embassy or consulate. From fiscal years 2013 through 2018, VA completed over 27,000 exams abroad through contractors and 6,800 exams through U.S. embassies and consulates, according to VA data. For contract exams, as of March 2019, VA had contractors in 33 countries and U.S. territories. This included Mexico, Germany, Belize, Canada, the Dominican Republic, the Federated States of Micronesia, the United Kingdom, the Philippines, Thailand, Costa Rica, Korea, and Poland, which were among the most common countries of nationality for removed veterans in our analysis. VA officials stated that contract C&P exam locations are determined by historical and pending claims data. Moreover, VA contractors abroad are generally located near military installations or areas in which VA determined there is a large veteran population. For embassy-scheduled exams, both VA and VSO officials told us that the effectiveness of coordination between VA and the embassies varies by country. For example, VA staff told us that they have been unable to schedule exams through embassies in Iraq or Afghanistan. State officials told us that processes for scheduling C&P exams and communicating with VA vary depending on the location, activity, and size of the embassy or consulate. State officials also told us that access to specialized providers to conduct exams, including mental health or audio exams, depends on the location of the embassy or consulate. In addition, both VA and VSO officials told us that veterans who receive embassy-scheduled exams from private providers abroad may receive lower-quality exams than veterans who live in the United States. For example, providers abroad may misinterpret VA exam requirements due to language barriers or unfamiliarity with U.S. medical terminology. These providers also do not have access to veterans’ service records, and therefore cannot assess whether a particular condition is service- connected. For these reasons, VA officials told us that VA staff submit C&P exams completed by private providers abroad to the VA Medical Center in Pittsburgh, Pennsylvania for an additional medical opinion. According to VA officials, VA is improving the scheduling and quality of C&P exams by expanding the number of countries where veterans may receive exams from VA contractors. According to VA and VSO officials, veterans living abroad experience challenges communicating with the VA. For example, staff from all four VSOs we interviewed stated that unreliable foreign mail systems and differences in time zones make it challenging for veterans to communicate with the VA, particularly because VA uses paper mail to communicate with veterans living abroad. In addition, VA and VSO officials also told us that veterans living abroad may face challenges applying for and managing their benefits through an online portal maintained by VA and DOD, eBenefits. VA requires veterans to register for a “premium account” in order to access all of the functions of eBenefits, such as applying for benefits online and checking the status of a claim, among other things. To be eligible for a “premium account,” veterans must first verify their identity with DOD. If the veteran provides valid government identification (e.g. driver’s license) and documentation of a financial account (e.g. checking account), DOD may be able to verify the veteran’s identity through an online registration process and VA may be able to verify the veteran’s identity by telephone. If a veteran is unable to verify their identity in this manner, the veteran must verify their identity in-person at a VA regional office in the United States. Therefore, removed veterans who cannot travel to the United States would not be able to obtain a “premium account” if they had not previously registered prior to their removal. VA officials stated that these processes are intended to ensure compliance with National Institute of Standards and Technology guidance for online credentialing. Throughout U.S. history, noncitizens have contributed to the United States through service in the Armed Forces. Through its policies, ICE has established that these noncitizen veterans warrant special consideration in the event that they become subject to immigration enforcement and removal from the United States. However, because ICE did not consistently adhere to these policies, some veterans who were removed may not have received the level of review and approval that ICE has determined is appropriate for cases involving veterans. Moreover, without developing and implementing a new policy or revising its 2004 and 2015 policies to require ICE agents and officers to ask about and document veteran status while interviewing potentially removable individuals, ICE has no way of knowing whether it has identified all of the veterans it has encountered and, therefore, does not have reasonable assurance that it is consistently implementing its policies and procedures for handling veterans’ cases. Further, maintaining complete electronic data on veterans it encounters would also allow ICE to better assess whether ICE has adhered to its policies for handling cases involving potentially removable veterans. We are making the following three recommendations to ICE: The Director of ICE should take action to ensure consistent implementation of ICE’s policies for handling cases of potentially removable veterans. (Recommendation 1) The Director of ICE should develop and implement a policy or revise its current polices to ensure that ICE agents and officers identify and document veteran status when interviewing potentially removable individuals. (Recommendation 2) The Director of ICE should collect and maintain complete and electronic data on veterans in removal proceedings or who have been removed. (Recommendation 3) We provided a copy of this report to DHS, VA, DOD, and State for review and comment. DHS provided written comments, which are reproduced in full in appendix I and discussed below. DHS, VA, and DOD also provided technical comments, which we incorporated as appropriate. State indicated that it did not have any comments on the draft report. In its comments, DHS concurred with our three recommendations and described actions planned to address them. With respect to our first recommendation that ICE should ensure consistent implementation of its policies for handling potentially removable veterans, DHS concurred stating that ICE plans, among other things, to update its guidance and training materials to include information about military service. With respect to our second recommendation that ICE should develop and implement a policy or revise its current policies to ensure agents and officers identify and document veteran status when interviewing potentially removable individuals, DHS concurred, stating that ICE plans to review and clarify existing guidance on the issuance of NTAs to veterans. DHS also concurred with our third recommendation that ICE collect and maintain complete and electronic data on veterans in removal proceedings or who have been removed. Specifically, DHS stated that ICE plans to add data elements for veteran status to its existing systems. The actions described above, if implemented effectively, should address the intent of our recommendations. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, the Secretary of Veterans Affairs, the Acting Secretary of Defense, the Secretary of State, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 202-512-8777 or gamblerr@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of our report. GAO staff who made key contributions to this report are listed in appendix II. Appendix II: GAO Contacts and Staff Acknowledgements Error! No text of specified style in document. In addition to the contact named above, Meg Ullengren (Assistant Director), Ashley Davis, Eric Hauswirth, Khaki LaRiviere, Sasan J. “Jon” Najmi, Claire Peachey, Mike Silver, Natalie Swabb, and James Whitcomb made key contributions to this report.", "summary": "Throughout U.S. history, noncitizens have served in the U.S. Armed Forces. Although the Immigration and Nationality Act allows noncitizen service members to acquire citizenship, some veterans may not apply or may not satisfy all eligibility criteria. If the Department of Homeland Security (DHS) determines that a noncitizen veteran is potentially removable, the veteran may be subject to administrative immigration enforcement and removal. ICE, among other things, is responsible for identifying and removing aliens who violate U.S. immigration law. GAO was asked to review issues related to the removal of noncitizen veterans. This report examines (1) the extent to which ICE has developed and implemented policies for handling and tracking cases of potentially removable veterans; (2) how federal agencies facilitate the naturalization of noncitizen service members and veterans, and what is known about the number who have applied for naturalization; and (3) how removal affects veterans' eligibility for and access to VA benefits and services. GAO reviewed documentation, met with agency officials, analyzed available data on veterans placed in removal proceedings, and conducted a review of removed veterans' alien files. GAO also analyzed data on military naturalization applications. U.S. Immigration and Customs Enforcement (ICE) has developed policies for handling cases of noncitizen veterans who may be subject to removal from the United States, but does not consistently adhere to those policies, and does not consistently identify and track such veterans. When ICE agents and officers learn they have encountered a potentially removable veteran, ICE policies require them to take additional steps to proceed with the case. GAO found that ICE did not consistently follow its policies involving veterans who were placed in removal proceedings from fiscal years 2013 through 2018. Consistent implementation of its policies would help ICE better ensure that veterans receive appropriate levels of review before they are placed in removal proceedings. Additionally, ICE has not developed a policy to identify and document all military veterans it encounters during interviews, and in cases when agents and officers do learn they have encountered a veteran, ICE does not maintain complete electronic data. Therefore, ICE does not have reasonable assurance that it is consistently implementing its policies for handling veterans' cases. U.S. Citizenship and Immigration Services (USCIS) and the Department of Defense (DOD) have policies facilitating the naturalization of noncitizen service members and veterans, and provide informational resources to noncitizen service members seeking naturalization. The number of military naturalization applications received by USCIS declined sharply from fiscal years 2017 to 2018, resulting in a decreased number of applications approved in fiscal year 2018. USCIS and DOD officials attributed this decline to several DOD policy changes that reduced the number of noncitizens joining the military . Citizenship status, including removal history, does not affect a veteran's eligibility for Department of Veterans Affairs (VA) benefits and services. However, living abroad affects eligibility for certain VA benefits and services. Veterans living abroad may also experience challenges accessing certain benefits and services, such as slower disability claim processing. GAO recommends that ICE (1) ensure consistent implementation of its existing policies for handling veterans' cases; (2) develop a policy or revise its current policies to identify and document veterans; and (3) collect and maintain complete data on veterans in removal proceedings or who have been removed. DHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The purposes of TRIA are to (1) protect consumers by addressing market disruptions and ensuring the continued widespread availability and affordability of commercial property/casualty insurance for terrorism risk; and (2) allow for a transitional period for the private markets to stabilize, resume pricing of such insurance, and build capacity to absorb any future losses, while preserving state insurance regulation and consumer protections. TRIA only applies to certain commercial property/casualty lines of insurance (we refer to them as TRIA-eligible lines) and excludes lines such as health and life insurance. While the law requires insurers to make terrorism risk coverage available to commercial policyholders, commercial policyholders are not required to buy it. Additionally, the law requires an insurer to make coverage for terrorism losses available that does not differ materially from the terms, amounts, and other coverage limitations applicable to losses arising from events other than acts of terrorism. For example, an insurer offering $100 million in commercial property coverage must offer $100 million in coverage that is not materially different for property damage from a certified terrorist event. Insurers may charge a separate premium to cover their terrorism risk, although some include the coverage in their base rates for all-risk policies. The majority of terrorism risk insurance is purchased as part of these embedded policies. The remainder is purchased as stand-alone coverage. Neither insurers nor the federal government charge for the federal coverage of terrorism risk under TRIA, but the government must recoup at least some of its losses following a terrorist event. For eligible commercial lines of property/casualty insurance, TRIA covers insured losses resulting from an act of terrorism, which is defined, in part, as a “violent act or an act that is dangerous” to human life, property, or infrastructure. TRIA is silent about losses from attacks with nuclear, biological, chemical, or radiological (NBCR) weapons. Although TRIA and its reauthorizations do not specifically include cyber risk insurance as a TRIA-eligible line, Treasury issued guidance about such coverage in 2016. The guidance stated that TRIA provisions apply to cyber risk insurance written under an embedded or stand-alone policy in TRIA- eligible lines. A cyberterrorism event could cause minor-to-severe business disruption and physical damage to property. In this report, we include losses resulting from cyberterrorism events with conventional terrorism events. Any catastrophic terrorist event presents both explicit and implicit fiscal exposure for the federal government. TRIA alleviates some of the implicit exposure through loss sharing. Under TRIA, the federal government is legally required to make payments (reimbursements to insurers): this represents an explicit fiscal exposure. Even without a loss-sharing program, the federal government also faces implicit fiscal exposure through a potential expectation to provide policyholders or insurers assistance to address long-term effects after a terrorist event. We have defined implicit fiscal exposures as situations that create expectations for future federal spending based on current policy, past practices, or other factors. Under TRIA, the government and insurers share losses in the event of a certified act of terrorism with insured losses above the program trigger of $200 million and below the program cap of $100 billion. According to the statute, Treasury cannot certify an event as an act of terrorism under TRIA if the aggregate property/casualty “insurance losses” resulting from the event are less than $5 million. Additionally, TRIA is not triggered unless the aggregate property/casualty “insured losses” resulting from one or more certified acts in a particular calendar year reach $200 million. Annual coverage for losses is limited (capped) so that neither the private insurers nor the federal government are responsible for paying aggregate insured losses in excess of $100 billion. Specifically: “Insured losses” are defined in statute and regulation as any losses resulting from an act of terrorism (including an act of war in the case of worker’s compensation) generally occurring in the United States that are covered by primary or excess property/casualty insurance issued by an insurer. TRIA refers to insured losses in defining the program trigger and program cap. “Insurance losses” are not defined in statute or regulation, but TRIA refers to insurance losses in defining the event certification amount. TRIA’s loss-sharing structure requires that insurers pay claims on covered terrorism losses and that Treasury reimburse individual insurers for losses that exceed a specified amount. According to the coshare provision, Treasury reimburses the insurer for a certain percentage (80 percent) of its losses above the insurer deductible, and the insurer is responsible for the remaining portion (20 percent). The policyholder also may retain losses from a terrorist event in the form of an insurance deductible or self-insurance retention. According to Treasury, losses retained by the policyholder are not considered to be “insured losses” under TRIA and do not count toward losses included in the $200 million program trigger or $100 billion program cap. However, this retention may be counted toward the $5 million event certification threshold because it is calculated based on “insurance losses.” TRIA provides for two types of recoupment—mandatory and discretionary—of the federal share of losses after a terrorism event. Figure 1 shows the claim and recoupment processes after a terrorism event resulting in losses covered by insurers and the government. Mandatory recoupment. TRIA requires recoupment of at least a portion of the federal share of losses if the aggregate sum of all insurers’ deductibles and coshares are below an amount prescribed by TRIA—known as the industry aggregate retention amount. Under mandatory recoupment, the insurers must impose and remit to Treasury a premium surcharge on all policies in TRIA-eligible lines until total industry payments reach 140 percent of any mandatory recoupment amount. TRIA specifies the collection time frame (from 1 year and 9 months to about 6.5 years, based on the date of the event). Treasury considers the collection time frame when establishing the amount of the mandatory recoupment surcharge. Discretionary recoupment. TRIA permits discretionary recoupment when the federal share of losses exceeds the mandatory recoupment amount. Under the discretionary recoupment provision, Treasury may consider a number of factors, such as economic conditions in the commercial marketplace, in determining the amount to recoup. To help in its decision-making, Treasury may issue a data call for insurer deductible and insured loss information. Treasury also sets the surcharge for discretionary recoupment, but the increase to TRIA- eligible premiums must not exceed 3 percent per calendar year. TRIA does not specify a collection time frame for discretionary recoupment. Since the 2015 reauthorization, insurers have been required to submit information to Treasury about their coverage of terrorism risk, including the lines of insurance with exposure to such risk, the premiums earned on such coverage, and the participation rate for such coverage. Treasury’s 2017–2019 data calls included loss scenarios in which insurers estimate and report expected losses given a defined terrorist attack at a specified location, date, and time. Treasury’s defined loss scenarios were located in New York City in 2016, Chicago in 2017, and San Francisco in 2018. Treasury’s reporting requirements for insurers vary, based on the following categories: Small insurers. Insurance companies that had both policyholder surplus and prior year TRIA-eligible direct-earned premium of less than five times the program trigger. For example, TRIA’s program trigger in 2020 is $200 million. Thus, Treasury would categorize insurers with less than $1 billion in 2019 direct-earned premiums and less than $1 billion in policyholder surplus as small. Treasury does not require small insurers to report on a number of items, including the loss scenarios. Nonsmall insurers. Insurance companies with either policyholder surplus or prior year TRIA-eligible direct-earned premium greater than the small insurer thresholds. Captive insurers. Special-purpose insurance companies set up by commercial businesses to self-insure risks arising from the owners’ business activities. Alien surplus lines insurers. Insurance companies headquartered in a foreign country that have been qualified to do business in the United States through an NAIC-administered process, which assesses the financial stability and trustworthiness of the insurer. Each reauthorization of TRIA through 2015 reduced the magnitude of the government’s explicit fiscal exposure. Since 2003, changes to TRIA provisions have increased insurers’ share of losses and thus decreased explicit federal fiscal exposure in the event of certified acts of terrorism (see fig. 2). For example, the program trigger rose over time, from $5 million in 2003 to $200 million in 2020. These changes reduced explicit fiscal exposure because they increased the amount of insured losses required before the government would share in the losses. The insurer deductible increased from 7 percent in 2003 to 20 percent for 2020, also reducing the federal share of payments. The 2015 reauthorization required incremental reductions in the federal share of losses over 5 years. The 2019 reauthorization extended the program until 2027, but did not make any changes to the program parameters. See appendix II for more details of the changes in the reauthorizations. Currently, following a certified act of terrorism Treasury pays insurer claims for 80 percent of insurers’ losses above their individual deductibles once losses in a calendar year exceed the program trigger of $200 million (see fig. 3). For example, based on the scenario from Treasury’s 2019 data call, the federal government could have an explicit exposure of about $4.4 billion in reimbursements to insurers. Specifically, insurers estimated that a hypothetical 2018 terrorist event in San Francisco could generate $39.7 billion dollars in overall losses, of which insurers could pay about $17 billion in claims to policyholders and the government could pay about $4.4 billion in reimbursements to insurers after a policyholder retention amount. According to our analysis of Treasury data on insurer direct-earned premiums, federal losses following a terrorist event under the loss-sharing provision in effect in 2020 would be smaller than they would have been for a similar event under the loss-sharing provision in effect in 2015, across all event sizes and subsets of insurers. In addition, more of the federal losses would be recovered through mandatory recoupment (see fig. 4). As we found in 2017, the amount of federal losses depends on event size and how many and which insurers were affected. Additionally, the government share depends on the aggregate TRIA- eligible direct-earned premium of the insurers with losses. Specifically, the federal share of losses is smaller when losses are shared among insurers with larger aggregate premium bases. As the share of losses for which insurers are responsible has increased under TRIA, the ability of insurers to absorb the extra exposure also has increased. Insurers use risk-mitigation strategies to reduce or offset their exposures. These can include purchasing reinsurance—insurance for insurers—to cover their deductibles or coshare payments, or diversifying their portfolios (for instance, reducing concentrations of risk in certain locations or lines of insurance). Insurers told us that they considered the potential effect of program changes in each reauthorization and modified risk-mitigation strategies, as needed. Furthermore, other industry stakeholders, including a broker and an industry association, told us that because program changes have been gradual and expected, insurance companies have been able to adjust their coverage accordingly. Available evidence indicates that TRIA has been largely effective in meeting its statutory objectives of stabilizing the terrorism risk insurance market. First, terrorism risk insurance is available in the market for a relatively low cost and is purchased by the majority of commercial policyholders in the United States, according to industry reports. Second, private reinsurance capacity for terrorism risk insurance increased since the creation of the program, according to Treasury. Third, our analysis of Treasury data suggests there is market stability. Insurers in all of Treasury’s reporting categories largely remained in the market. Furthermore, the market share and number of insurers in the reporting categories generally remained stable. For example, using data on direct- earned premiums of insurers from 2016 to 2018, nonsmall insurers (92 insurers in 2018) held about 80 percent of the TRIA-eligible insurance market. Small insurers (186 insurers in 2018) held about 10 percent. Captive and alien surplus lines insurers (598 and 98 insurers, respectively, in 2018) each held 4 or 5 percent (see fig. 5). Our interviews indicate that some insurers’ interpretation of whether policyholder retention amounts count toward the program threshold, trigger, and cap may differ from Treasury’s. Some large policyholders may retain large amounts of loss in the form of a deductible or self- insurance retention following a terrorist event. Treasury officials said policyholder retention amounts are not counted toward the program’s $200 million trigger or its $100 billion cap, but could be counted toward the $5 million threshold for event certification. They stated that the law utilizes “insured losses” when referring to the program trigger and cap, and “insurance losses” when referring to the certification threshold. If Treasury counted policyholder retention amounts toward the program trigger, the program would be triggered and capped with a smaller amount of overall losses. For example: To illustrate, we use a hypothetical terrorist event resulting in $290 million in overall losses, of which $100 million would be retained by policyholders. Using Treasury’s interpretation that excludes policyholder retention amounts, “insured losses” would be $190 million, which is below the program trigger of $200 million. As a result, the government would not be required to pay insurers a coshare. In contrast, if Treasury included policyholder retention amounts, “insured losses” would be $290 million, which exceeds the program trigger. In this case, the government would pay $112 million to insurers in coshares. In either case, losses would not reach the program cap of $100 billion. We asked 12 industry stakeholders about their understanding of how Treasury would use policyholder retention amounts to calculate the program threshold, trigger, and cap. The distinction between “insured losses” and “insurance losses” in Treasury’s explanation was clear to one insurer. However, some aspect of this distinction was unclear to six industry stakeholders, including an insurer association and three insurers, potentially resulting in uncertainty about how Treasury would calculate losses in the aftermath of a terrorist event. For example, representatives of an insurer association and two insurers told us they interpreted insured losses as including the policyholder retention amounts because insurers could be responsible for paying this amount. This is because some insurers pay the entire claim, including all or a portion of the policyholder retention, up front and then seek reimbursement from the policyholder. In addition, if a policyholder cannot pay its retention, the insurance company is responsible for it. Differences in interpretation could lead to disputes between insurers and Treasury following a terrorist event. We previously found that insurers are concerned about the long-term consequences of disputes related to terrorist events. One purpose of TRIA is to stabilize the market following a terrorist event. Furthermore, federal internal control standards state that management should externally communicate the necessary quality information so that external parties can help the entity achieve its objectives and address related risks. Treasury’s program regulations define “insured losses” and do not define “insurance losses.” Furthermore, the regulations do not explain how such losses are calculated and therefore how the policyholder retention amount does or does not count toward the program threshold, trigger, or cap, as applicable. Treasury uses different methods to communicate program information and clarify program details to stakeholders, such as program regulations and interpretive letters, but has not clarified this issue using these or other methods because officials believe the distinction is understood in the industry. By closing the information gap of how it would calculate losses for the program threshold, trigger, and cap, Treasury would create a common understanding of a critical feature of the program. Furthermore, Treasury may prevent uncertainty in the insurance market and potential litigation following a terrorist event that could delay insurance payments and economic recovery. TRIA explicitly limits federal exposure following a terrorist event, but the federal government could be expected to provide assistance beyond what is explicitly outlined in TRIA. Expectations for the government to provide assistance through its recoupment decisions and to policyholders and insurers, as described below, represent implicit fiscal exposures. Although the government may not act on these expectations, to the extent that it does, the implicit exposure would become an explicit exposure. In certain circumstances under mandatory and discretionary recoupment, such as potential effects on market stability, public expectation may lead the federal government to cancel recoupment or reduce the amount of funds recouped. Any portion of the federal coshare not recouped represents an implicit fiscal exposure. Some mandatory recoupment scenarios may or may not be perceived as burdensome to policyholders, prompting an expectation of federal assistance to ease the burden. Treasury determines mandatory recoupment surcharges based on the statutory deadlines for collecting mandatory recoupment. If a large terrorism act occurs in a year in which the statute requires the collection of mandatory recoupment in a short time frame, Treasury may need to set a high surcharge percentage on premiums for policies with TRIA-eligible lines. In this case, some policyholders may find it difficult to pay the surcharge, making collection of the mandatory recoupment amount burdensome. Large recoupment amounts or surcharges could prompt public expectation, and political will, for reducing or cancelling recoupment to alleviate this burden. Because mandatory recoupment time frames are based in statute, reducing or canceling this recoupment would require congressional action. One insurer told us that they are skeptical that Congress would allow Treasury to collect mandatory recoupment after a large event. Under current program provisions, the maximum mandatory recoupment amount will increase if the TRIA-eligible direct-earned premium increases. Industry stakeholders told us that, with this change, eventually all recoupment could be mandatory. While the amount to be recouped may increase, the recoupment time frame remains unchanged. Therefore, over time, surcharge amounts could increase, which may increase burden on policyholders and increase the expectation for Congress to cancel recoupment. If Congress were to cancel the collection of mandatory recoupment, the explicit fiscal exposure would include both the federal share of losses paid to insurers and the decreased corporate tax receipts from deductions for the recoupment charges policyholders may claim (such deductions otherwise were intended to be offset by the 140 percent recoupment). Changes in legislation following premium rate increases in the National Flood Insurance Program (NFIP) provide an example of Congress changing a law to ease policyholder burden. Congress enacted the Biggert-Waters Flood Insurance Reform Act of 2012, which was intended to strengthen the future financial solvency and administrative efficiency of NFIP by implementing provisions to reduce and eventually eliminate most subsidized premium rates. However, after public outcry claiming negative effects on home values, Congress enacted the Homeowner Flood Insurance Affordability Act of 2014, which repealed some of the premium rate increases in the 2012 act. Discretionary recoupment presents an implicit fiscal exposure because Treasury may decide not to collect the full discretionary recoupment amount. Under TRIA, Treasury decides whether and how much of the discretionary portion of the federal share of losses to recoup. Treasury may recoup some or all nonmandatory funds, or cancel discretionary recoupment. For any amount that Treasury chose not to collect, the fiscal exposure would be the dollar-for-dollar amount of the federal share of losses paid to insurers. As defined in statute, Treasury may consider several factors when determining whether to collect discretionary recoupment, in full or partially, or cancel recoupment. These factors include ultimate cost to taxpayers of no additional recoupment; the economic conditions of the commercial marketplace; the affordability of commercial insurance for small and medium-sized businesses; and other factors Treasury deems appropriate. According to agency officials, decisions regarding discretionary recoupment would be based on the parameters of the specific terrorism act, such as the size of the federal share of losses, location of the event, and length of the collection period. In our analysis of explicit exposure, we found that under some scenarios, the discretionary recoupment amount resulting from a terrorist event could exceed $50 billion. Depending on Treasury’s analysis of these factors, some or all of the discretionary recoupment amount may not be collected. For example, currently, much of the recoupment amount resulting from the most catastrophic losses would be considered discretionary under TRIA’s provisions. Because TRIA mandates an annual 3 percent cap on the increase of premium rates in TRIA-eligible lines for discretionary recoupment, in extreme cases Treasury might need to collect a premium surcharge for a protracted period of time to fully recoup the discretionary portion of losses. The effects of a protracted period of premium surcharges could be a factor in Treasury’s determination to cancel discretionary recoupment. Based on previous federal action following natural disasters or financial market crises, there may be an expectation that the government would provide financial assistance to businesses for uninsured or underinsured losses related to a terrorist event, regardless of whether a loss-sharing program existed. For example, the federal government uses the Disaster Relief Fund to provide compensation for property damage or financial losses to victims of Presidentially declared major disasters and emergencies. In fiscal years 2005–2018, the federal government designated $138 billion in supplemental appropriations to this fund for extreme weather events. And following the financial crisis of 2007– 2009, the federal government provided financial assistance directly to General Motors Company and Chrysler Holdings to help stabilize the U.S. automobile industry and to avoid economic disruptions. Treasury officials and industry stakeholders described several terrorist event scenarios that could produce a large amount of uninsured or underinsured losses that affected businesses might not be able to absorb and that might lead to the expectation of federal assistance. NBCR events present an implicit exposure. Historically, insurance coverage for losses related to a NBCR terrorist event has been limited or unavailable. Stakeholders told us that there likely would be an expectation of federal financial assistance for businesses with uninsured losses related to such an event. Treasury officials and stakeholders we interviewed agreed that primary and reinsurance coverage for NBCR events is limited, resulting in many businesses having limited or no coverage. Stakeholders also told us that, without TRIA, insurers would no longer offer the limited amount of NBCR coverage currently available. Stakeholders attribute the limitations to the potentially catastrophic losses associated with NBCR events and the difficulty in modeling and underwriting such events. Representatives of a policyholder association whose members purchase NBCR coverage stated that available coverage likely was insufficient to cover expected losses. Furthermore, they said some policyholders forgo NBCR coverage because of its limited availability, high cost, and the low perceived risk of a NBCR event. As a result, many businesses may be exposed to high loss. Treasury officials and industry stakeholders described possible NBCR terrorism events in which a significant amount of losses could be uninsured or underinsured. Treasury’s 2019 Small Insurers Report found that a NBCR terrorism event likely posed the greatest risk of total catastrophic terrorism losses, far outpacing a conventional attack. Although modeling these types of losses is difficult, NAIC’s Center for Insurance Policy and Research estimated, taking into account the program cap, that a NBCR event in New York City could generate nearly $60 billion of uninsured loss, 38 percent of the total loss. It also found that a larger NBCR event could create $850 billion in uninsured loss, or 90 percent of total losses. Furthermore, this research estimated large uninsured losses in other cities, such as Houston, where a large nuclear event was estimated to generate $67 billion in uninsured losses, or 40 percent of total losses. Such catastrophic losses could create a strong public expectation of federal financial assistance for uninsured losses. The expectation of financial assistance to policyholders if insured losses exceeded the program cap also creates implicit fiscal exposure. By law, insurers that have met their individual deductible and the federal government are not responsible for losses exceeding the TRIA program cap. However, industry stakeholders we interviewed expected that, in the event the program cap were exceeded, the federal government would provide some form of assistance to those who experienced loss. For example, losses from a NBCR event could be over $1 trillion, with TRIA- insured losses exceeding the $100 billion program cap. While a single conventional attack would be unlikely to exceed the program cap, according to stakeholders, a series of conventional attacks could. Although determining the frequency of terrorist events is difficult, one modeling firm with which we spoke estimates losses great enough to exceed the program cap in a conventional attack to have a 0.0005 percent (or 1/2,000) chance of occurring in a single year. This is less likely than severe natural catastrophes, such as Hurricanes Sandy and Harvey. As we found in a 2019 report on fiscal exposures, Congress demonstrated its willingness to fund the implicit exposure of policyholder claims that exceeded the amount NFIP was authorized to borrow from Treasury. In October 2017, when NFIP was about to exhaust its borrowing authority, Congress passed a supplemental appropriation, which the President signed into law, that cancelled $16 billion of NFIP debt to Treasury. Implicit fiscal exposure also exists in the expectation that the federal government would assist policyholders unable to pay their retained losses. Policyholders with very large retained losses may face financial insolvency after a terrorist attack, which may create an expectation of government assistance. Stakeholders told us that policyholders may choose larger retention amounts to reduce premiums or because insurance for high-risk, high-value properties is unavailable. Insurers we interviewed said that most businesses have small deductibles, but some large businesses may choose higher retention amounts to reduce the high insurance cost in locations considered to be higher-risk and for high- profile properties. For example as shown in figure 6, Treasury’s 2017– 2019 data call scenarios explored estimated losses in locations with high- profile properties such as Rockefeller Center in New York City (2017), Willis Tower and O’Hare International Airport in Chicago (2018), and Embarcadero Center and Union Square in San Francisco (2019). Although the actual amounts may be lower than the estimates insurers reported, the aggregated policyholder retention could exceed losses paid through the program. This demonstrates the potential for large losses that could create an expectation of government assistance if policyholders with large retention amounts were unable to absorb the losses. An implicit fiscal exposure exists from the potential expectation that the government might help stabilize markets by assisting insurers with (1) losses that do not trigger the program’s loss sharing, or (2) losses from lines ineligible for TRIA. While these risks exist, the current market has some protections in place and stakeholders viewed this exposure as unlikely. Loss sharing not triggered. If the total losses from a certified act of terrorism were below the program trigger (currently $200 million), insurers with deductibles below the program trigger could sustain losses larger than their deductible without receiving any federal coshare. Because the amount of the program trigger has increased over time, more insurers potentially face this scenario. Stakeholders told us that small insurers and those that offer workers’ compensation insurance are most affected by changes to the program trigger. Our analysis of Treasury data shows about 97 percent of insurers have deductibles lower than the $200 million program trigger and thus could receive no coshare following a certified act of terrorism. This includes all small, captive, and alien surplus lines insurers, and more than half of the nonsmall insurers. Furthermore, our analysis of 2016–2018 Treasury data shows that these insurers are sometimes concentrated in certain insurance lines. For example, small insurers may be concentrated in commercial multiple peril lines. Additionally, market shares of small insurers and captive insurers increased in the aircraft (all perils) line. Such concentrations could destabilize specific insurance lines following a terrorist event. Although the market is currently stable, some insurers may leave the market to mitigate their risks if their losses are unlikely to trigger the program’s loss sharing, which could reduce the availability of insurance in certain markets. A reduction in the availability of insurance could lead to more uninsured losses in the event of a subsequent terrorist event and could result in an increased expectation for losses to be covered through federal assistance. In its 2019 report, Treasury recognized the potential for small insurers to not provide insurance in certain markets. Additionally, the report cautions that if the program trigger increased, the number of insurers that would face the possibility of a gap between their deductible and the program trigger also would increase. However, analysis of Treasury data indicate that, to date, insurers in this situation largely have not left the market. As previously noted, because the changes to program parameters were gradual, insurers have had time to adjust to the changes. Insurers facing this scenario also can mitigate their risk by purchasing reinsurance to cover the difference between their deductible and the program trigger. However, it is not clear that the reinsurance market can absorb all of this risk. For example, industry stakeholders told us that reinsurers are sensitive to accumulation of exposure and reinsurance is limited in perceived high-risk areas such as New York City, Washington D.C., Los Angeles, and Philadelphia where there are large concentrations of people and high-value properties. In addition, reinsurance premiums may be too costly for some insurers. According to state insurance commissioners, high reinsurance costs may not qualify as a reason for insurers to increase premiums in some states. As a result, insurers would be unable to pass reinsurance costs on to policyholders. Furthermore, limited availability and affordability of reinsurance for high-risk areas and NBCR could be exacerbated following a terrorist event. Alternative forms of reinsurance, such as catastrophe bonds, are not widely used for terrorism risk. Treasury officials said that widespread market instability and an expectation for federal assistance may be unlikely in the case of a certified act of terrorism that produces significant losses for insurers that do not reach the program trigger. They said any market effects would be localized because a smaller terrorist event likely would affect a small number of insurers with a gap between their deductibles and the program trigger. Industry stakeholders said that it is possible that such an event could cause insurers to reduce coverage offered, but other stakeholders said that small insurers were well aware of the risk and their reactions would not create market instability. Additionally, state guarantee funds may provide support to policyholders in case of insurer insolvency before expectations for federal financial assistance arose. Insurance lines not eligible for TRIA. Federal assistance may be expected for insurers if large terrorism losses occur in insurance lines— such as life or health insurance—that are not eligible for TRIA, according to industry stakeholders. A 2019 Insurance Information Institute report found life insurance losses resulting from the attacks of September 11, 2001, were $1.4 billion (about 3 percent of total insurance losses from the attacks), an amount that far exceeds the TRIA program trigger. The report notes that standard homeowner, condo or co-op, standard renters, automobile insurance, and travel insurance policies also could be affected by terrorism and are not covered under TRIA. Adding group life insurance coverage under TRIA has been proposed, but never passed into law. According to some perspectives in congressional debate, other insurance lines were not viewed as needing explicit federal assistance. Insurers have adjusted to changing TRIA program parameters that increased the share of the losses for which they would be responsible. However, some insurers may not clearly understand whether Treasury would include policyholder retention amounts in calculating losses to certify a terrorist event, trigger loss sharing, or determine when the program cap has been reached. External communication to develop a clear understanding of how Treasury calculates “insured losses” and “insurance losses,” specifically as they relate to policyholder retention amounts, would help insurers understand when the program would be activated or capped ahead of any terrorist event. Furthermore, communicating this explanation could help Treasury alleviate uncertainty in the insurance market following a terrorist event. The Director of the Federal Insurance Office should communicate to insurers in writing how it would utilize policyholder retention amounts in calculating “insurance losses” and “insured losses” in determining the program certification threshold, trigger, and cap, as applicable. (Recommendation 1) We provided a draft of this report to Treasury and NAIC for review and comment. Treasury provided written comments through the Federal Insurance Office, which are reproduced in appendix III. Additionally, Treasury provided technical comments, which we have incorporated, as appropriate. NAIC did not provide technical comments. In Treasury’s written response, the Federal Insurance Office agreed that limiting uncertainty in the insurance market following a certified act of terrorism was an important goal. The office accepted the recommendation and stated that it would work to implement it in the coming months. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Chief Executive Officer of NAIC, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The objectives of our report were to (1) examine the changes in explicit fiscal exposure under the Terrorism Risk Insurance Act (TRIA) and how insurers have adjusted to the changes; and (2) describe situations in which implicit fiscal exposures may arise and might become explicit. To address these objectives, we reviewed the Terrorism Risk Insurance Act of 2002, Terrorism Risk Insurance Extension Act of 2005, Terrorism Risk Insurance Program Reauthorization Acts of 2007, 2015, and 2019, implementing regulations, and congressional records. We also reviewed prior GAO work on TRIA and federal fiscal exposures. We reviewed reports from the Department of the Treasury (Treasury), the Congressional Budget Office, and Congressional Research Service. We also reviewed relevant reports from academic researchers and industry stakeholders. We used Treasury’s data calls from 2017 to 2019 for aggregated direct- earned premiums, numbers of insurers, and hypothetical loss scenarios throughout this report. We evaluated the reliability of the data by performing electronic tests and interviewing staff from Treasury and its data contractor, and industry stakeholders. We found the data sufficiently reliable for the purposes described below. We interviewed Treasury officials and representatives from the National Association of Insurance Commissioners (NAIC) and industry stakeholders, including insurers, insurance trade associations, a rating agency, risk modelers, and an insurance broker. We selected a nongeneralizable sample of five insurers to interview. These insurers were selected because they provide terrorism coverage to businesses and reflect a mix of sizes and types of insurance. In interviews, we asked about aspects of the program and the insurance market, and risks that could lead to implicit exposure. To describe the potential explicit fiscal exposure to the federal government, we reviewed the relevant laws and analyzed the changes made in each reauthorization. To quantify and compare the federal explicit exposure from potential terrorist events in 2015 and 2020, we estimated the TRIA-eligible direct-earned premiums for those years and used simulated loss scenarios similar to those we previously developed. To estimate the TRIA-eligible direct-earned premiums for 2015 and 2020, we used aggregated direct-earned premiums for 2016–2018 from Treasury’s data calls. Specifically, first we calculated the annual percentage change in direct-earned premiums for 2016–2017 and 2017–2018. Second, we found the average change to be an increase of about 0.4 percent. This estimate was smaller than the percentage change we used in the 2017 report, but we found the estimate reasonable because our current estimate was based on Treasury’s data, specific to TRIA-eligible lines of insurance. Our 2017 estimate was based on annual estimates of terrorism risk revenue. Third, we estimated the 2015 and 2020 direct-earned premiums using the 0.4 percent average annual change and the reported 2016 and 2018 direct-earned premiums, respectively. To check for reliability, we used the same method to estimate direct-earned premiums for 2014. Our 2014 estimate matched the 2014 data used in our 2017 report. We calculated the change in both nominal and real dollars and decided to use nominal dollars, which is consistent with how Treasury reports direct-earned premiums. We found the data to be sufficiently reliable for estimating the TRIA-eligible direct-earned premiums for 2015 and 2020. To compare events occurring under the program provisions in effect in 2015 and 2020, we analyzed how losses would be shared between the government and insurers by modeling terrorist events with insured losses of $5 billion, $25 billion, $50 billion, $75 billion, and the maximum terrorism event size ($100 billion in insured losses) in 2015 and 2020. In each case, we modeled the affected insurers to have an aggregate direct-earned premium base of 25, 35, 55, and 100 percent of all TRIA-eligible premiums. To demonstrate how the program trigger may affect insurers, we also modeled a smaller terrorist event with $290 million in losses and assumed that the affected insurers had an aggregate direct-earned premium base of $750 million. In all cases, we estimated the portion of federal losses that would be subject to mandatory and discretionary recoupment. To determine how insurers have adjusted to changes in TRIA and measure market stability, we reviewed Treasury and past GAO reports and relevant literature, analyzed Treasury data, and interviewed industry stakeholders. We conducted a literature search to determine how changes in the TRIA program parameters affected insurers and we summarized relevant findings from our review of the literature we identified. Additionally, we summarized Treasury and industry stakeholders’ views on insurers’ ability to cover their share of losses following an event and their willingness and ability to continue providing coverage after a large event without access to the federal share of losses to cover claims from the event. We also analyzed Treasury data to determine whether insurance lines have experienced changes in premiums or coverage availability since 2016. Specifically, we computed market shares by insurer category for calendar years 2016–2018, using direct-earned premiums from Treasury’s data calls. Using Treasury’s insurer categories (alien surplus lines, captive, nonsmall, and small), we computed market shares overall, and for TRIA-eligible lines of coverage in the U.S. terrorism risk insurance market, which includes all the states, the District of Columbia, U.S. territories, and other areas. We did not use number of policies because number of policies was not available in Treasury’s data for all insurer categories for all years. In the course of assessing data reliability for Treasury’s scenario data, we found some lack of clarity regarding two key terms under TRIA: “insured losses” and “insurance losses.” The external communication component of internal control—that management should externally communicate the necessary quality information to achieve the entity’s objectives—was significant to this objective, along with the related principle that management communicate quality information externally through reporting lines so that external parties can help the entity achieve its objectives and address related risks. We assessed Treasury’s external communications about these terms. Specifically, we reviewed the content of TRIA statutory language and program regulations and guidance. We obtained an interpretation of the terms from Treasury officials and also obtained industry stakeholders’ views on them. We determined Treasury’s scenario data to be reliable for the purpose of reporting the loss sharing as it was reported and for illustrating loss sharing examples. To identify potential situations in which implicit federal fiscal exposure may arise, we analyzed TRIA’s program design and reviewed our prior work for sources of implicit fiscal exposures, such as those faced by other disaster insurance programs. To ensure the reasonableness and completeness of our list of identified sources, we consulted with industry stakeholders and made modifications as appropriate. We grouped the sources of implicit fiscal exposures into three broad categories: (1) any unrecouped program expenditures; (2) federal assistance for uninsured or underinsured terrorism losses (including uninsured losses in a nuclear, biological, chemical, or radiological event, losses in excess of the $100 billion program cap, and policyholders’ retained losses); and (3) federal assistance to stabilize the insurance market for insurers that may be unable to access the loss-sharing feature of the program or for lines of insurance not included under TRIA. To describe the potential exposure resulting from not executing the recoupment of program expenditures, we summarized prior GAO reports and industry stakeholder views on the risks and challenges of collecting mandatory and discretionary recoupment funds, including the associated collection time frames. To describe the potential exposure resulting from federal assistance for uninsured or underinsured losses, we reviewed and summarized findings in prior GAO reports on past instances in which the federal government provided disaster assistance (such as following the September 11 terrorist attacks, the financial crisis, and large natural disasters). We summarized Treasury, NAIC, and industry stakeholder views on the likelihood of terrorist events reaching the program cap, their expectations for federal intervention in that case, and the importance of the cap to the terrorism risk insurance market. To describe the potential exposure resulting from federal assistance to stabilize the insurance market following a terrorist event, we interviewed industry stakeholders about scenarios that could produce an expectation for government assistance (implicit exposure), the stability of the terrorism insurance industry, how program details could affect different insurer groups, and insurers’ options for covering their share of losses. We used Treasury’s data to quantify the number and share of insurers that might not be able to access TRIA’s loss-sharing provision and to illustrate estimated loss sharing in Treasury’s scenarios of losses that would have occurred in three hypothetical events: New York City (2016), Chicago (2017), and San Francisco (2018). We also interviewed various insurer associations. We conducted this performance audit from July 2019 to April 2020, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. As shown in table 1, Terrorism Risk Insurance Act (TRIA) reauthorizations through 2015 changed several loss-sharing provisions, which decreased the federal share and increased the insurer share of losses. The 2015 reauthorization required incremental decreases in the federal share of losses over 5 years. The 2019 reauthorization extended the program until the year 2027, but did not make any changes to the program parameters discussed below. In addition to the contact named above, Jill Naamane (Assistant Director), Karen Jarzynka-Hernandez (Analyst in Charge), Rudy Chatlos, Giselle Cubillos-Moraga, Kaitlan Doying, Lijia Guo, John Karikari, Barbara Roesmann, Jessica Sandler, Jena Sinkfield, Frank Todisco, and Rachel Whitaker made key contributions to this report.", "summary": "Congress enacted TRIA to help ensure the availability and affordability of commercial property/casualty insurance for terrorism risk and to address potential effects on the economy in the absence of such coverage. Under the TRIA program, which is set to expire December 31, 2027, the government and insurers share losses following a certified act of terrorism. TRIA creates explicit fiscal exposure because the government is legally required to make payments to insurers after such an event, but there also may be some implicit exposure from an expectation of federal spending. To date, Treasury has not certified any acts of terrorism. GAO was asked to examine federal fiscal exposure under the TRIA program. This report (1) examines changes in explicit fiscal exposure under TRIA and how insurers have adjusted to the changes, and (2) describes situations in which implicit fiscal exposures may arise and might become explicit. To conduct this work, GAO reviewed the TRIA statute and related studies, analyzed Treasury data, and interviewed a nongeneralizable sample of insurers of different sizes providing various types of insurance. Terrorism Risk Insurance Act (TRIA) reauthorizations through 2015 have decreased federal fiscal exposure, and insurers have adjusted by managing their increased risk. Changes in the TRIA program that the Department of the Treasury (Treasury) administers—particularly incremental changes since 2015—reduced the government's explicit fiscal exposure from a certified act of terrorism (see figure). For example, by increasing the program trigger—minimum amount of industry-insured losses needed to activate the program—Congress potentially reduced the number of events that qualify for federal payments. As explicit federal fiscal exposure has decreased, insurer exposure has increased. Nevertheless, the market for terrorism risk has remained stable. However, some insurers are uncertain how Treasury defines insured losses for the purposes of calculating whether the program's $200 million trigger or $100 billion cap have been reached. For example, some insurers interpreted insured losses to include the portion of losses policyholders retain, which was different from Treasury's interpretation. Differences in interpretations could lead to disputes between insurers and Treasury following a terrorist event. One purpose of TRIA is to stabilize the market following a terrorist event. Communicating how it would calculate losses toward these program amounts could help Treasury alleviate uncertainty in the insurance market following a terrorist event. The government also has implicit fiscal exposure following a terrorist event, arising from expectations based on current policy or past practices that it may provide assistance, even when it is not legally required to do so. Although the government may not act on these expectations, the government's implicit exposure might become explicit if it chooses not to recoup the full federal share of losses from property/casualty policies, as allowed under TRIA, to prevent further stresses on the insurance market after a major terrorist event; assists companies with uninsured or underinsured losses after a terrorist event or when losses exceed the program cap; covers uninsured losses from a nuclear, biological, chemical, or radiological terrorism event; or assists insurers with losses that did not meet TRIA's trigger for loss sharing, or that were incurred in excluded lines of coverage, such as life and health insurance. GAO recommends that Treasury communicate how it would calculate losses, as they relate to policyholder retention amounts, in determining the TRIA program trigger and cap. Treasury agreed with the recommendation.", "document_type": "gao"}
{"report": "When complete, JWST will be a large, deployable space telescope, optimized for infrared observations. It is the scientific successor to the aging Hubble Space Telescope launched 29 years ago. JWST is being designed for a 5-year mission to find the first stars, study planets in other solar systems, search for the building blocks of life elsewhere in the universe, and trace the evolution of galaxies from their beginning to their current formation. JWST is intended to operate in an orbit approximately 1.5 million kilometers—or 1 million miles—from Earth. With a 6.5-meter (21.3 foot) diameter mirror, JWST is expected to operate at about 100 times the sensitivity of the Hubble Space Telescope. Its science instruments are designed to observe faint infrared sources and therefore are required to operate at extremely cold temperatures. To help keep these instruments cold, the JWST project will rely on a multi-layered, tennis court-sized sunshield to protect the mirrors and instruments from the sun’s heat. The JWST project is divided into three major segments: observatory, ground, and launch. When complete, the observatory segment will include several elements (Optical Telescope Element, Integrated Science Instrument Module, and spacecraft) and major subsystems (sunshield and cryocooler). Additionally, JWST is dependent on software to deploy and control various components of the telescope, and to collect and transmit data back to Earth. The elements, major subsystems, and software are being developed through a mixture of NASA, contractor, and international partner efforts. See figure 1 for the elements and major subsystems of JWST and appendix I for more details, including a description of the elements, major subsystems, and instruments. JWST depends on more deployment events—steps after launch that configure the observatory for its mission and place it in orbit—than a typical science mission. Due to the observatory’s large size, it is nearly impossible to perform deployment tests of the fully assembled observatory in a thermal vacuum chamber to simulate the space environment, so the verification of deployment elements is accomplished by a combination of lower level component tests in flight-simulated environments; ambient deployment tests for subsystem, element, and observatory levels; and detailed analysis and simulations at various levels of assembly. Figure 1 shows the multiple layers of integration and testing for major components of the JWST observatory. For the majority of work remaining, the JWST project is relying on two contractors: Northrop Grumman and the Association of Universities for Research in Astronomy’s Space Telescope Science Institute. Northrop Grumman plays the largest role, developing the sunshield, the Optical Telescope Element, the spacecraft, and the Mid-Infrared Instrument’s cryocooler, in addition to integrating and testing the observatory. Space Telescope Science Institute’s role includes soliciting and evaluating research proposals from the scientific community, and receiving and storing the scientific data collected, both of which are services that the Institute currently provides for the Hubble Space Telescope. Additionally, the Institute is developing the ground system that manages and controls the telescope’s observations and will operate the observatory on behalf of NASA. JWST will be launched on an Ariane 5 rocket, provided by the European Space Agency. The JWST program has a history of significant schedule delays and project cost increases, which resulted in both the 2011 and 2018 replans. Prior to approving the project’s development, cost estimates for JWST ranged from $1 billion to $3.5 billion, with expected launch dates ranging from 2007 to 2011. Due to early technical and management challenges, contractor performance issues, and low levels of cost reserve, the JWST program experienced schedule overruns, launch delays, and cost growth. The program underwent a replan in September 2011 and then a rebaseline; further, Congress placed an $8 billion cap on the formulation and development costs for the project. However, in June 2018, after a series of launch delay announcements due to technical and workmanship issues identified during spacecraft element integration, NASA notified Congress that it had revised the JWST program’s cost and schedule estimates again. NASA estimated that it would now require $828 million in additional resources over the program’s lifecycle and 29 more months beyond the estimates agreed to in the 2011 rebaseline to complete the project. Since the project’s costs and schedule were baselined in 2009, costs have increased by 95 percent and its launch date has been delayed by over 6.5 years. Prior to this more recent replan, NASA established an Independent Review Board (IRB) in April 2018, comprised of technical experts from outside the JWST program to evaluate all factors that may affect the successful completion of remaining mission steps. The board released its final report in May 2018 in which it made 32 recommendations that address a range of technical, organizational, and other factors. The IRB took into account varying technical and workmanship errors, human mistakes, adequacy of integration and test staff, and other considerations when it analyzed the project’s organizational and technical issues. The IRB recommended, among other actions, that the project conduct an audit to identify potential embedded design flaws; establish corrective actions to detect and correct human mistakes during integration and testing; establish a coherent, agreed-upon, and factual narrative on project status and communicate that status regularly across all relevant stakeholders; and, finally, augment integration and test staff to ensure adequate long-term staffing and improve employee morale. These recommendations also included reconsidering the proposed launch date. In March 2019, we found that NASA had considered many of the program’s risks while developing its 2018 replan schedule and cost baseline but recommended that additional analysis be completed to provide NASA and Congress with better insight into project resourcing and affordability. A Joint Cost and Schedule Confidence Level is an integrated analysis of a project’s cost, schedule, risk, and uncertainty, the result of which indicates a project’s likelihood of meeting cost and schedule targets. The project did not complete such an analysis as part of its second replan. NASA policy says this tool may be used to inform planning. Though not required by NASA policy, we recommended that one be conducted given the long history of program challenges and the significant and complex integration events that still needed to be completed. NASA agreed with our recommendation and completed this analysis in October 2019. GAO plans to conduct a separate, more detailed engagement on this analysis and its findings in the future. See appendix II for more information on this and other GAO recommendations. The JWST project, like other complex development efforts we have reviewed, faces numerous risks and potential unforeseen technical challenges, which often become apparent during integration and testing. To accommodate unanticipated challenges and manage risk, projects include extra time in their schedules, referred to as schedule reserve, and extra funds in their budgets, referred to as cost reserve. Schedule reserve is allocated to specific activities, elements, and major subsystems in the event of delays or to address unforeseen risks. Each JWST element and major subsystem has been allocated schedule reserve. When an element or major subsystem exhausts schedule reserve, it may affect schedule reserve on other elements or major subsystems whose progress is dependent on prior work being finished. Cost reserve is additional funding within the project manager’s budget that can be used to address and mitigate unanticipated issues for any element or major subsystem. Goddard—the NASA center with responsibility for managing JWST— issued procedures detailing the cost and schedule reserve requirements for formulating and executing spaceflight programs. When NASA constructed its 2018 replan for the JWST project, it took into account the remaining integration and test activities planned prior to launch, known technology challenges that presented risks to schedule, as well as potential future risks. The project’s replan reflected a planned schedule reserve above the level indicated by Goddard policy, which would have been approximately 5 months at that time. Instead, the new schedule included a total of 293 days or 9.6 months of schedule reserve, with approximately 6 months of this reserve to be managed at the project level and the remainder held by the program at NASA headquarters. Following the replan, the project and the contractor worked toward a launch date in November 2020, which would have required none of the schedule reserve managed at the NASA headquarters level. However, the committed launch date under the replan, where all available schedule reserve is utilized, is now March 2021. NASA’s cost-plus-award-fee contract with Northrop Grumman has spanned approximately 17 years, during which time there have been significant variances in performance. These types of contracts are suitable when uncertainties in scope of work or cost of services prevent the use of contract types where prices are fixed. Award fee contracts provide contractors the opportunity to obtain additional fee beyond the costs charged to the government for enhanced levels of performance in areas identified in the contract’s award fee plan. Award fees may be used when key elements of performance cannot be defined objectively, and, as such, require the project officials’ judgment to assess contractor performance. For JWST’s contract with Northrop Grumman, these areas include cost, schedule, technical, and business management and are established in the contract’s award fee plan, which allows for the award of a scaled fee based on assessed performance. This plan has been revised over the life of the contract to incentivize performance in certain areas, but it has always required Northrop Grumman to meet a minimum standard to receive any award fee. Over the course of the JWST contract, nearly $250 million dollars will have been available to Northrop Grumman through this incentive. We have found that when NASA and the contractor have made revisions to fee evaluation criteria to focus on certain aspects of performance, the contractor has been responsive to the new criteria during its work on the JWST project. Though the JWST project has made significant progress since our last report in March 2019, technical challenges have required the use of most of the project’s available schedule reserve. According to NASA officials, the contractor has found ways to replenish reserve, but NASA is still reviewing some of these methods and the project continues to work through significant integration and testing events with less than a quarter of the schedule reserve allotted to it in June 2018. The technical challenges have resulted in prolonged employment of the contractor workforce, which is the primary driver for increased costs. Following the June 2018 replan, the project has achieved a number of integration and testing milestones and has taken steps to address previously identified technical challenges. Since our March 2019 JWST report, the program has completed testing on the individual component elements of the observatory and has integrated them to start observatory level testing, the last of five phases of integration and testing. Leading up to observatory integration, the project completed thermal vacuum testing of the spacecraft element in May 2019. This testing helped to ensure that JWST hardware will function properly in the vacuum of space and withstand significant temperature variations during deployment and operation, and provided data to corroborate modelling on which the observatory’s mission is based. Further, the project completed the last major testing milestone for optical telescope and science instrumentation elements—deployment of the secondary mirror assembly—in August 2019. This secondary mirror focuses the light collected by the 18 hexagonal primary mirrors of JWST into a beam and directs it toward scientific equipment aboard the observatory. Integration of the observatory components was completed in August 2019, and the program has deployed the sunshield as part of observatory integration and testing. NASA has also taken steps to address challenges noted in our previous reports. For example, In February 2018, we found that Northrop Grumman planned to modify the design of the sunshield’s membrane tensioning system in response to a risk of a cable snagging during deployment. NASA approved this redesign in May 2019 and employed a new approach to cable management that involves modification and replacement of certain cable clips and routing cables differently to manage slack that could cause snags. We found in March 2019 that the project office identified concerns that trapped air in the folded sunshield membrane could put too much stress on the observatory when the launch vehicle fairing depressurizes—the fairing is the part of the rocket that encapsulates JWST during flight. NASA, Northrop Grumman, European Space Agency, and European vendors responsible for operating and producing the launch vehicle have worked together to study this issue and have designed vents for the fairing that will mitigate the risk of damage to JWST. The new fairing vent design is expected to be tested aboard a rocket planned to launch in the spring of 2020. Despite the major accomplishments of the past year, the program has identified new technical issues that present risk for meeting the 2018 replan’s schedule requirements. Multiple technical issues have contributed to the use of schedule reserve since the June 2018 replan, but two identified in March and April 2019 have had the most significant effect. The program identified two significant anomalies during pre-testing events for the spacecraft element’s thermal vacuum testing, which first delayed thermal vacuum testing and then required additional time for investigation and implementation of solutions. Specifically, a traveling wave tube amplifier and a command and telemetry processor had errant powering issues during testing. These are important components of the observatory’s communication systems that enable JWST to send large amounts of science data and telemetry to the ground segment at high speed. Though the anomalies occurred at the same time and were both power- related, NASA does not believe they are related and has initiated separate review boards to determine solutions. The amplifier failure is attributed to workmanship issues on the part of a subcontractor. As of October 2019, the exact cause of the processor anomaly remained under investigation, but the electrical problem had been isolated to faults within specific circuit cards. NASA has taken steps to address the risks presented by both anomalies: it has received replacement amplifiers and has upgraded and tested an engineering model processor to replace the faulty one aboard the observatory if necessary. As a result of technical issues discovered since the June 2018 replan, the JWST program has had to use significantly more schedule reserve than it planned to and has been working towards the replan’s formally committed launch date of March 2021. As of October 2019, the project had used 224 days of schedule reserve, or about 76 percent of the total project and program-held schedule reserve incorporated into the June 2018 replan. All project-held schedule margin was used by March 2019, a point at which the project would have retained approximately 4 months of reserve according to its original plan. At one point since our March 2019 report, the project had as little as 18 percent of its total schedule reserve left, but contractor-led corrective action plans regained time through found efficiencies. As a result of these challenges, the project’s reserve fell below what is indicated by Goddard policy. NASA determined in May 2019 that the November 2020 launch date that the project had hoped to achieve was no longer feasible, and switched focus to meeting the committed launch date of March 2021. Figure 2 shows the level of planned reserve for JWST, reserve indicated by Goddard policy, and the project’s actual use of schedule reserve. Since then, however, the JWST project has determined that the March 2021 launch readiness date may not be feasible either, based on a detailed assessment of risks, costs, and schedule. In October 2019, the project completed a joint cost and schedule confidence level analysis in response to a GAO recommendation made in a previous report on the JWST program. Because of schedule delays resulting from technical challenges coupled with remaining risks faced by the project, the analysis assessed only a 12 percent confidence level for the project’s ability to meet the March 2021 launch readiness date. NASA typically establishes its cost and schedule baseline commitments at 70 percent confidence level. According to the analysis, this 70 percent baseline confidence level is associated with a July 2021 launch date. The project does not currently intend to change the launch readiness date in response to this analysis alone, but plans to assess the feasibility of the launch readiness date again in spring 2020 after significant technical tasks are completed. NASA and Northrop Grumman have a plan to recover schedule reserve but certain portions of the plan remain under technical review. Following the amplifier and processor anomalies, Northrop Grumman developed a corrective action plan to recover schedule reserve, and the contractor and NASA continue to look for ways to gain efficiencies. In June 2019, Northrop Grumman suggested a number of potential schedule optimization steps that were reviewed by NASA management. Northrop Grumman has begun to be implement some of these steps. If all steps are taken, the contractor estimates 65 days of project schedule will be recovered, nearly doubling the amount of reserve available to the project when the anomalies were discovered. Among the efforts described in this corrective action plan are to streamline aspects of vibration testing and to modify build and repair schedules so that a major panel on the spacecraft will only have to be opened once. Combined, these two steps would save an estimated 46 days. However, officials noted that for the plan for a single panel opening to remain viable, corrective actions for the amplifier and processor replacements would need to remain on schedule. The project continues to review some of Northrop Grumman’s proposed efficiencies, but more than half of these schedule savings have already been incorporated into the schedule reserve forecast. The project also continues to identify and monitor risks that could potentially result in further use of schedule margin. As suggested by the IRB, the project has led a number of audits looking for embedded risks. As of November, most of the audits planned have been completed and NASA identified some new risks. The following are some of the risks the project is monitoring that could affect schedule: The project found that certain bolts, determined to be deficient on another Northrop Grumman program, were used during the construction of the observatory. A study of this issue found that the bolts used did not meet specifications and could pose a mechanical strength risk. The unused bolts have been identified and isolated, but 501 were installed in the observatory. NASA is performing strength testing to determine if the bolts are strong enough, but some of the deficient bolts may need to be replaced, pending the findings of these tests. The project reported in August 2019 that grounding straps on the spacecraft’s momentum flap came loose during vibration testing. This flap will act as balance against solar pressure that could cause unwanted movement of the observatory while in orbit. Observatory- level vibration testing cannot begin until the flap is removed, repaired, and replaced aboard the spacecraft. In September 2019, the project found that a non-explosive actuator on one of its membrane retention devices did not fire as planned. These devices, which help to unfurl the sunshield of the spacecraft, are supposed to be electrically redundant, but only one of the two mechanisms used to fire the actuator worked during the test. The program reports that there are approximately 180 actuators on the JWST and the failure of any one of these actuators could result in the total loss of JWST science mission objectives. If the redundancy for the actuators is reduced, it would have a major impact on system reliability. The project is evaluating whether it needs to replace certain membrane retention devices that may not be able to withstand the coupled pressure placed upon them by the launch and newly designed fairing ventilation. Testing in the past did not account for all aspects of the pressures placed upon this hardware during launch and spaceflight. The project indicated that it is completing an analysis to determine if stronger devices need to be installed. The JWST project office reviews and reports on these and other risks monthly. As of October 2019, the project is tracking 50 risks—three more than when we last reported on JWST—of which 12 continue to be assessed as moderate concerns. Of the 50, 23 have been assessed to be at acceptable levels of risk but continue to be monitored should changes affect their status. For example, the risk associated with cabling within the sunshield was elevated in October 2019 when the project found that further testing was needed to ensure slack did not present an unacceptable threat to the spacecraft during deployment. Finally, nine of the 50 risks currently tracked by the project are related to the more than 300 single points of failure aboard the observatory. The project must conduct significant integration and testing activities in the coming months that could present further challenges. Our previous work on major NASA acquisition programs found that integration and testing is the phase when challenges are most likely to be found and schedules can slip. The science elements and the spacecraft have only recently been integrated. NASA will have to manage seven top-level integration and testing steps between October 2019 and December 2020 to include observatory-level vibration testing, sunshield deployment and stow, and electrical testing and repairs. Currently, this will all have to be completed with a diminished amount of schedule reserve. Northrop Grumman and NASA officials we interviewed agreed that no other major complication, such as those on the scale of the traveling wave tube amplifier and command and telemetry processor anomalies, can happen without putting the March 2021 launch date in jeopardy. As we found in March 2019, changes to JWST project’s life-cycle cost estimate are principally driven by schedule extension, which requires keeping the contractor’s workforce longer than expected to complete integration and testing. We also found that NASA’s cost estimate for the 2018 replan was based on a more gradual workforce reduction schedule than previously used by the Northrop Grumman. NASA continues to forecast an overall reduction in contractor and government workforce following the project’s launch readiness date with continued, steady support by the Space Telescope Science Institute during remaining development and post-launch phases of the program (see figure 3). The program reports that cost reserve is generally sufficient for planned work but technical challenges could cause workforce costs to increase. The cost and schedule analysis completed by the project in October 2019 indicated that the project will not exceed the cost commitment established in the 2018 replan even if launch is delayed further by a few months. According to officials, funding is sufficient to continue work even if the launch date slips 3-4 months past the March 2021 launch date. However, the technical issues identified during integration and testing activities have required the contractor workforce to remain engaged, instead of drawing down as planned. Rather than see a temporary drop in contractor work hours as hardware deliveries were completed ahead of observatory-level testing and integration activities, the project has maintained contractor workforce levels to address the issues described above. The contractor now forecasts approximately 15 percent more workforce hours between 2019 and 2022, the year following launch (see figure 4). Approximately $133 million in cost reserve funding will be used by the project over the next 2 fiscal years to accommodate increasing workforce retention costs. Since the June 2018 replan, NASA has taken steps to improve the JWST project by implementing Independent Review Board (IRB) recommendations, pursuing other oversight initiatives, and continuing to incentivize contractor performance through the use of award fees. NASA addressed all IRB recommendations even though the agency did not always agree with the IRB on the specific steps needed to address the recommendations. Further, NASA has sustained, and in some cases expanded, the oversight initiatives that were started prior to our last report. The cost plus award fee contract used for JWST development efforts provides the project with a means to incentivize contractor performance related to cost, schedule, technical, and business management goals. Since the 2018 replan, Northrop Grumman’s award fee evaluations have improved but remain below its average for the contract. NASA assessed all IRB recommendations as closed in October 2019. The IRB made 32 recommendations covering a range of topics from improving communication with stakeholders to identifying embedded problems. NASA implemented its recommendation to establish March 2021 as the committed launch date for JWST through the June 2018 replan. Responsibility for implementing the remaining 31 recommendations was split among headquarters, the program office, and the project. The 10 headquarters- and program-level recommendations covered high-level recommendations dealing with entities outside of the project or communication between upper-level NASA management and the project. The remaining 21 recommendations were implemented at the project level and included lower-level actions related to assessing, preparing for, and improving day-to-day work. NASA assessed most recommendations as implemented prior to an IRB follow-up assessment, but the IRB found that more work was required for some to completely align with the board’s intent. In February 2019, the IRB found that the steps NASA took for approximately one-third of its recommendations were either inadequate or needed additional work, with the remainder found to be appropriate. Specifically, the IRB categorized 21 of the recommendation responses as appropriate, eight responses as appropriate with additional work needed, and three responses as inadequate. The IRB’s monitoring of the JWST project ended with the February 2019 follow up (see figure 5). Though NASA agreed with the intent of all the IRB recommendations, it took a different approach than described in the IRB report when implementing the three recommendations where the agency’s response was assessed to be inadequate. NASA conducted additional work for the majority of recommendations assessed by the IRB to be incomplete. However, NASA determined that a few of the IRB recommendations managed at the headquarters level should not be implemented the way they were delineated in the IRB report. Specifically, The IRB found that the JWST reporting structure was complex, confusing, and ineffective. The IRB made two recommendations for NASA to update its reporting chain. The IRB believed the Science Mission Directorate Associate Administrator should have responsibility of the entire JWST program and the Goddard Space Flight Center Director should be responsible for all aspects of the JWST project. The IRB asserted that restricting the involvement of the Goddard director will reduce the probability of JWST success. NASA agreed that it is important to have clear organizational roles and responsibilities but had a difference of opinion about the best course of action. In November 2018 and July 2019, NASA announced updates to the JWST reporting structure. However, both times it reduced the role of the Goddard director in favor of more direct line of accountability from the JWST program to the Science Mission Directorate Associate Administrator and the NASA Associate Administrator. NASA asserts that these changes will provide more clear accountability for program performance and allow for expedited decision making. The IRB recommended that NASA’s Launch Services Program should have accountability for the JWST launch. NASA has taken actions to increase the involvement of the Launch Services Program but NASA maintains that it is not prudent or possible for the Launch Services Program to be accountable for the launch because the European Space Agency is contributing the launch vehicle and managing the launch. The IRB recognized the unique circumstances of using an international launch vehicle but continued to assert the importance of Launch Services Program accountability. A minority of IRB members were of the opinion that NASA took appropriate action. NASA has sustained increased oversight and involvement with Northrop Grumman following the announcement of an anticipated cost cap breach in March 2018. Previously reported improvements included both the implementation of IRB recommendations and the pursuit of self-initiated activities, like greater NASA on-site coverage and Northrop Grumman’s culture change campaign designed to shift focus toward quality assurance. Our March 2019 report, provided examples of these changes and initiatives. Table 1 below provides a summary of our previous report findings and the current status of the changes NASA and Northrop Grumman made in providing oversight and ensuring quality. Since we last reported in March 2019, NASA has made additional oversight changes to further enhance communication with and oversight of the contractor. Most of these changes emphasize greater involvement of NASA specialists in meetings and reviews. NASA officials reported that its increased presence with the contractor has had positive effects for both ensuring project outcomes and increasing morale of the government and contractor workforce. For example, NASA integration and testing leadership is present and embedded in Northrop Grumman’s meetings— directly participating in planning sessions, reporting, and reviews of failures and anomalies. As a result, the project was able to plan for early integration of the observatory and completed key integration activities without being the primary driver of the project’s schedule. According to officials, expanded participation has helped to ensure more realistic exercises that include procedural concerns as well as engineering considerations. NASA officials said that the increased participation has allowed NASA input to be incorporated early—potentially reducing issues in the future. Further, NASA officials believe that the consistent presence of NASA personnel has improved morale—an item highlighted by the IRB—and helped foster greater unity of effort between government and contractor workforces. NASA has regularly assessed contractor performance through award fee assessments since the beginning of the contract in 2002. Award fee documentation over the course of the Northrop Grumman contract indicates that contractor performance was assessed as below its average before periods of significant cost and schedule growth. On average, Northrop Grumman has been rated as very good with about three-fourths of evaluations assessing its performance as either excellent or very good. For the award fee evaluations that fall below Northrop Grumman’s average score, cost performance has contributed to the majority of these dips and schedule performance has contributed to almost half. In particular, schedule performance has reduced the contractor’s overall evaluation for all award fee periods since April 2017. The latest dip below the contractor’s average preceded lifecycle cost growth of $828 million and schedule growth of nearly 2.5 years (see figure 6). Since our March 2019 report, Northrop Grumman’s ratings have improved but remain below its average. For the award fee period from October 2017 through March 2018, Northrop Grumman received an unsatisfactory rating, which resulted in the contractor receiving no award fee for the first and only time in the life of the contract. The unacceptable rating was driven by cost and schedule performance—including the anticipation of breaching the $8 billion congressional cost cap established in response to the 2011 rebaseline. In the following two periods, Northrop Grumman has improved its evaluation, but schedule performance remains a concern. During the last award fee period assessed, NASA was internally managing to a November 2020 launch date. Shortly after the award fee period ended, the project found it could no longer support the November 2020 date and began managing to the March 2021 launch date. We are not making recommendations in this report. We provided a draft of this report to NASA for comment. NASA provided technical comments that, among other things, clarified implementation of schedule recovery steps and updated progress on observatory repairs. We incorporated suggested technical changes as appropriate. We are sending copies of this report to the appropriate congressional committees, the NASA Administrator, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions on matters discussed in this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In its previous reports on the James Webb Space Telescope (JWST), the GAO has made several recommendations. These recommendations are listed below. Comments reflect the status of the program at the time GAO closed the recommendation. Appendix III: List of Independent Review Board (IRB) Recommendations Telescope (JWST) launch success at the same level of responsibility they have for U.S. launches, or the National Aeronautics and Space Administration (NASA) should contract with Aerospace Corporation for similar accountability. 2 The Goddard Space Flight Center (Goddard) and Northrop Grumman Project Offices should be established as consistent and factual source of all JWST mission status 3 Communications of status and details appropriate for stakeholders need to be presented clearly and frequently. 4 NASA headquarters should be responsible for developing a “communication plan” (messaging strategy) for JWST. 5 Communicating complexity, risk, and science return for JWST is critically important. 6 Use the same criticality and assessment charts for all JWST reporting. 7 NASA should implement a JWST reporting structure where the Science Mission Directorate Associate Administrator has responsibility for the entire JWST program and the Goddard Space Flight Center Director is responsible for all aspects of the project. 8 NASA should revise NASA policy directives to be consistent with the recommendation. 9 Assure consistent, sustained and meaningful engagement of the Science Working Group (SWG). 10 Appoint an executive committee of NASA-selected members of the SWG to act as conduits to the broader community on mission challenges. 11 NASA should designate a Commission Manager. 12 NASA should implement sunshield hardware and simulation elements to aid in sunshield anomaly identification and resolution. 13 Northrop Grumman should establish corrective actions in1) processes, 2) training, 3) personnel certification, 4) discipline to ensure individual accountability and 5) a failure-proof “safety net” through a robust testing, analysis, and inspection process. 14 Goddard and Northrop Grumman should conduct an audit including forensic engineering, hardware pedigree assessment, drawing checks, etc., to identify potential embedded problems. 15 Goddard should conduct an audit of the JWST project residual risk, reviewing the objective evidence of (a) the completed Test As You Fly and Single Point Failures mitigation plans, and (b) failure corrective action effectiveness to determine the “as built” residual risk. 16 The project should reconcile the “as built” residual risk with the expected “as designed” residual risk. 17 NASA should define security requirements and plan for JWST transport to launch site. 18 Develop contingency operations and sparing plan for spacecraft/launch site operations. 19 Develop “pathfinder” JWST simulator and contamination protection systems for integration “dry runs.” 20 Assess shipping vessel contamination environment and develop contingency plans for off-nominal shipping operation. 21 It is critically important that Goddard JWST Project Office maintain responsibility and provide adequate support to ensure Space Telescope Science Institute (STScI) mission operations readiness 22 The Project should review all simulators/testbeds and required usage against pre-launch tests and rehearsals, post-launch deployment anomaly resolution, fault isolation, and correction. 23 The Goddard JWST Project Office should develop a staffing plan that meets the needs of integration and test and operational readiness. 24 The project should develop and approve a transition plan that defines the level of mission operations responsibility for STScI as a function of time with independent gate reviews at transition points. 25 Management should unambiguously emphasize the priority of mission success to “working level” personnel. 26 Employees must feel empowered to stop or slow down if the pace or procedures can jeopardize mission success. 27 NASA should assess “top ten” mission success enhancements and implement where appropriate. 28 Responsible Design Engineers should be involved and responsible for their element through the successful commissioning of the observatory. 29 The project should augment integration and test staff; this is critically important to execute the integration and test program. 30 Augment integration and test staff to achieve more realistic work schedules. 31 Implement strategies for improving team morale, such as periodic science lectures for Northrop Grumman personnel and families. 32 The Webb IRB recommends the launch date be established as March 2021 (based upon the Project’s 5/18 assessment of the impact of the membrane cover assembly acoustic anomaly). In addition to the contact named above, Raj Chitikila (Assistant Director), Christina Cota-Robles, Carrie Rogers, Ajani Skeete, Jay Tallon, and Thomas Twambly made key contributions to this report. Assistance was also provided by Hannah Brookhart, Brian Bothwell, Lorraine Ettaro, Emile Ettedgui, Laura Greifner, Kaelin Kuhn, Christine Pecora, Roxanna Sun, and Alyssa Weir.", "summary": "JWST, a large, deployable telescope, is one of NASA's most complex projects and top priorities. Problems discovered during integration and testing caused multiple delays that led NASA to replan the project in June 2018. Now estimated to cost $9.7 billion, the project's costs have increased by 95 percent and its launch date has been delayed by over 6.5 years since its cost and schedule baselines were established in 2009. Prior to the replanning process, an independent review board assessed the project and made recommendations to improve performance and oversight. Conference Report No. 112-284 included a provision for GAO to assess the project annually and report on its progress. This is GAO's eighth report. This report assesses the extent to which (1) the project is executing within its revised cost and schedule targets and (2) NASA has implemented and sustained key improvements to performance and oversight established following the June 2018 replan. GAO reviewed relevant NASA policies, analyzed NASA and contractor data, and interviewed NASA and contractor officials. The National Aeronautics and Space Administration's (NASA) James Webb Space Telescope (JWST) project has made significant progress since GAO's last report in March 2019, such as completing testing of the observatory's individual elements and integrating them together in August 2019. However, new technical challenges have required the project to use more schedule reserve—extra time set aside in the project's schedule to accommodate unforeseen risks or delays—than planned. As of October 2019, the project had used about 76 percent of its available schedule reserve and no longer plans to launch in November 2020 (see figure). The project is now managing to a March 2021 launch date but estimates only a 12 percent likelihood that this date will be achieved. NASA plans to reassess the launch date in the spring of 2020. The project used much of the schedule reserve in April 2019 to address issues with two components needed to transmit science data to ground control. The contractor has been able to mitigate some of the schedule loss and continues to look for new efficiencies. Technical challenges also resulted in longer employment of the contractor workforce than planned, which could result in additional cost increases. NASA continues to monitor multiple, other risks that could place further schedule and cost strains on the project. Since NASA replanned the project again in June 2018, the agency has taken steps meant to improve performance and oversight. NASA has addressed all recommendations from an independent review board, but in doing so sometimes took actions that differed from those outlined in the board's report. NASA has sustained, and in some cases expanded, oversight initiatives following the revised cost and schedule commitments that, in many cases, were designed to enhance communication between the government and the contractor. GAO is not making any new recommendations at this time. GAO has made several recommendations to NASA on the management of this project in previous reports and NASA has agreed with and taken action on many of them. Most recently, in March 2019, GAO recommended that NASA complete a joint cost and schedule confidence level analysis for JWST. NASA concurred and completed the analysis in October 2019 to support a key project review.", "document_type": "gao"}
{"report": "FAA is responsible for overseeing and authorizing any flight operations in the national airspace system for both manned and unmanned aircraft. FAA’s UAS Integration Office, located in the Office of Aviation Safety, seeks to integrate UAS operations into the national airspace system while ensuring the safety of the public and integrity of the airspace. In July 2018, FAA released the 2018 UAS Integration Roadmap, a second edition of the agency’s 5-year plan outlining its most current phased approach for integration, with each step toward full integration allowing UAS operations of increasing complexity. FAA’s vision for fully integrating UAS into the national airspace system entails UAS operating safely and routinely—i.e., without requiring prior approval for UAS flights—in the same airspace as manned aircraft. While safety is FAA’s paramount concern, the integration of UAS is important because of the potential economic benefits that progress in UAS integration could bring, including more investment in uses such as large passenger operations, as well as the potential safety benefits, such as more effective firefighting and other disaster response efforts. Currently, FAA only allows certain routine UAS operations under specific conditions while authorizing other UAS operations on a case-by-case basis. For example, since August 2016, operators of small UAS—defined as those UAS weighing less than 55 pounds, including any attachments— who have obtained a remote pilot certificate have generally been allowed to operate without prior FAA approval in certain airspace during the day, under 400 feet, and not over people or beyond an operator’s line of sight, among other requirements under FAA’s Part 107 rule. Small UAS operators may seek a waiver of certain FAA operational requirements (referred to as a Part 107 waiver) from the agency on a case-by-case basis, such as a waiver that would allow an operator to fly drones above 400 feet. In contrast, no routine operations—meaning those that can occur without any prior authorization—are currently allowed for large UAS (55 pounds and over) for any purpose (see fig. 1 for examples of small and large UAS). Rather, operators of large UAS must seek authorization from FAA to fly the aircraft on a case-by-case basis, and the processes for accessing the airspace vary. More specifically, civil large UAS operators must, in most cases, obtain a Certificate of Waiver or Authorization (COA) that demonstrates FAA’s approval of airspace access, and may also require approval for the aircraft itself. A COA allows any certificate holder to fly UAS outside of generally allowable operations, such as at certain altitudes, locations, or airspace classes (e.g., near airports). FAA grants this approval to an entity for a specific activity and time period, and sometimes for a specific make and model of UAS. Public entities—which include federal, state and local governments, public academic institutions, and law enforcement agencies—may apply for a COA in order to obtain authorized access to fly in the national airspace for when they are conducting governmental operations, as defined by statute. In such cases, the COA allows for the certificate holder to operate UAS in ways that would otherwise not comply with airspace requirements, such as operating the drone beyond the pilot’s line of sight. In its 2018 UAS Integration Roadmap, FAA outlined some key topics and operational capabilities to be researched that are associated with specific UAS integration phases (see fig. 2). For example, both government and industry entities have research and testing of technologies underway to provide UAS the capability to detect obstacles in midair, such as other aircraft, and automatically maneuver to avoid collision; this capability is commonly referred to as “detect and avoid.” FAA officials have stated that this key capability is necessary before allowing certain UAS operations on a routine basis, such as flights beyond the operator’s line of sight. According to FAA, the agency plans to use data from several UAS research programs—including the test site program—and from other sources to inform its future decisions regarding UAS integration. In 2012, FAA was required by statute to establish a program to integrate UAS into the national airspace system and to establish six UAS test sites in order to develop a process for allowing research to occur at these test sites, among other requirements. In response to Congress’ mandate, in 2013 FAA selected six public entities to be designated as test sites based on a number of factors, including geography, climate, and the respective institutions’ expertise, and added another entity in response to legislation in 2016 for a total of seven designated test sites. According to FAA officials, the test site program was intended to enable industry stakeholders to test complex UAS operations and conduct research on the corresponding technologies. Each test site is a public entity, such as a public academic institution or branch of the state government, which FAA authorizes to conduct various UAS operations through the COA process. UAS stakeholders, including manufacturers or entities seeking to use UAS for various purposes, can pay to work with any of the seven FAA- designated test sites to conduct test flights or receive training on UAS operations and regulations, among other activities, based on the test site staff’s expertise. FAA has not directly funded the test sites’ general operations, so the sites have had to rely on other funding sources, such as revenues generated from users, state funds, federal research grants, and commercial investment. Congress recently appropriated $6 million to FAA to provide matching funds to qualified commercial entities seeking to test UAS technologies at FAA designated test sites. FAA manages the test site program using formal agreements and by providing support to test site staff. The test sites signed individual Other Transaction Agreements (OTA) with FAA that establish their agreement to meet specific requirements aimed to support FAA’s UAS integration efforts. For example, these agreements lay out that test sites must follow safety processes and data procedures, as well as provide certain deliverables to FAA. Specifically, the agreements outline that the test sites will provide FAA certain operations and safety-related data for specific test flights, which FAA stores in a database it created specifically for test site data. In addition, once the test sites were operational, FAA designated an official to serve as the test site program manager for all seven sites who, among other duties, facilitates regular meetings with test site representatives to discuss ongoing issues and regularly communicates with other FAA lines of business to keep them informed about key efforts underway at test sites. According to FAA, the designated test sites have the equipment and infrastructure to support UAS flight testing, such as UAS pilots, launch pads, command centers, and, if required, chase aircraft (see fig. 3). Test site staff can facilitate UAS flight operations under a test site’s COA or by complying with the Part 107 rule. Since 2015, the test sites have held a “blanket” COA that allows them to conduct government functions for small UAS in Class G (uncontrolled) airspace anywhere in the United States except within restricted or prohibited areas. In addition, test sites have applied for and been granted COAs to operate UAS of different sizes in locations (referred to as “test ranges”) outside their state, and in a variety of airspaces at various elevations (see fig. 4 for a sample of test site COAs). For example, as of October 2019, the Alaska test site had COAs for test ranges in many states including Alaska, Hawaii, Tennessee, and Oregon—one of which allows operations up to 15,000 feet above mean sea level within three classes of airspace around Pendleton, Oregon. Some test ranges are located at airports, such as Griffiss International Airport in New York, which can help facilitate the testing of UAS that may require runways for take-off and landing, as well as testing of UAS flying in areas with manned aircraft. However, stakeholders, such as UAS manufacturers or companies interested in using UAS for various purposes, are not required to use an FAA-designated test site for UAS flight testing. In addition to seeking authorization directly from FAA to conduct their own flights or flying according to current rules such as Part 107, UAS stakeholders can work with other entities—such as military airports, public academic institutions or other public test sites—to which FAA has granted COAs to conduct complex UAS operations. For many stakeholders, however, working with a designated test site may provide quicker access to testing than seeking their own authorization from the FAA. For example, a UAS manufacturer might work with a test site to test the company’s UAS prototype at a certain elevation under a test site’s existing COA (following all applicable COA guidelines, such as performing a government function with the operation) because the test site already had that authorization in place. Additionally, it may be beneficial for a UAS manufacturer or operator to work with a test site because the test site has experience in obtaining authorizations or waivers from FAA for similar types of operations or aircraft. According to FAA’s MLS data, the test sites facilitated about 15,000 total UAS test flights occurring under test site COAs from April 2015 through December 2018 (see table 1). However, according to test site representatives, staff at these sites facilitated more UAS flights during this time frame than is reflected in the MLS data, because additional flights were conducted using different allowances than COAs, such as under the Part 107 rule that allows certain routine small UAS operations. According to FAA officials, the decrease—starting in 2017—in the annual number of reported test flights by the test sites, as reflected in table 1 above, is due in part to a change in regulations. Specifically, when FAA’s Part 107 rule took effect in August 2016, it provided a new avenue for small UAS operators, including test site staff and other airspace users, to test certain small UAS operations without requiring a COA or other authorization, effectively reducing the number of test flights logged into FAA’s MLS. Agency officials also told us that Part 107 changed the type of research users request from the test sites, which may have reduced the number of test flights facilitated through the test sites. While there have been fewer flight tests, according to some test site representatives and users we spoke to, recent testing has been for more complex research. For example, one test site representative stated that now the site’s users have bigger, more extensive research projects involving more tasks than just test flights, such as developing the operational models, performing testing on various technologies, and installing equipment to support complex UAS operations. Research conducted at the test sites has provided information to FAA that, according to agency officials, supports its efforts to integrate UAS into the national airspace system. Test site representatives told us that they have supported over 440 public and private users to conduct research and development on UAS to be used for a variety of UAS activities. While FAA officials told us that they cannot direct specific types of research to be conducted at the test sites unless the agency funds that research, we found that users have nevertheless conducted UAS research and development activities that FAA has identified as important for UAS integration. For example, users conducted research on the safety risks of UAS, such as concussion collision studies, and have tested UAS capabilities, such as the ability to carry loads of varying weights. Also, based on our analysis, we found that users have tested UAS technologies at the test sites that align with some of the key capabilities identified by FAA as necessary for the upcoming phases of UAS integration (see table 2). Test site users also reported benefits from working with test sites. According to the users we interviewed, the test sites have provided them an opportunity to explore and improve UAS technologies, and to learn more about how they could use UAS for their own purposes in the national airspace. For example, one user of the New York test site had tested communication equipment and detect-and-avoid capabilities on large UAS that they manufacture and sell to other entities for conducting surveillance activities, such as drug interdiction. Many of the test site users (11 of 18) we spoke to stated that using a test site provided a significant benefit for advancing their entity’s UAS research and development efforts. In addition, according to 9 of the 18 users we spoke to, test sites provided them with direct and immediate access to tools that helped them test their technologies. For example, users stated that it was beneficial that test sites have specific authorities from FAA for certain types of testing under a COA as well as infrastructure to allow for advanced UAS research. Some activities the test site users we spoke to plan to conduct with UAS are already regularly occurring—meaning FAA either allows these to occur on a routine basis or has allowed them to occur through additional authorization on a regular basis. Others are not yet occurring on a regular or routine basis due either to legal restrictions, such as restrictions on operating UAS beyond the operator’s visual line of sight or needed technological advancements, but FAA expects them to occur routinely in the future (see table 3). Some users we spoke to have also worked with a test site to conduct extensive hazard and risk mitigation testing to build safety cases and get approval from FAA to conduct complex UAS operations. FAA generally requires safety cases when a user is seeking approval to deviate significantly from current UAS requirements, such as when seeking to conduct beyond-visual-line-of-sight operations using a small UAS. For example, according to representatives from an insurance company we spoke to, they worked with the Virginia test site for over a year to build a safety case to prove that the company could safely operate its small UAS beyond the operator’s line of sight and over people. According to test site representatives, this risk mitigation testing entailed dozens of experiments, including how to address the risk of an UAS abruptly losing power. For instance, if a UAS operating over a house for an insurance inspection loses power, it could fall, potentially causing damage to the building as well as injuring someone standing on the ground below. In November 2018, FAA granted approval for the company to fly its fleet of UAS over people and beyond the operator’s line of sight in sparsely populated communities nationwide for insurance claim inspections. All test sites have competed for and were selected by federal agencies to participate, to varying degrees, in additional UAS research efforts designed to inform aspects of FAA’s integration plans. The projects include: The Department of Transportation’s (DOT) UAS Integration Pilot Program (IPP): In May 2018, DOT selected 10 project teams—which included the Alaska, North Dakota, and Virginia test sites—to participate in this program aimed at evaluating different concepts for certain UAS operations in specific communities. According to DOT, the IPP is an opportunity for state, local, and tribal government agencies to partner with private sector entities, such as UAS operators or manufacturers, to, among other things, accelerate the approval of operations that currently require case-by-case authorizations. Two key intended outcomes of the IPP are to assess the respective communities’ acceptance of low-altitude UAS operations, and to balance national and local interests in furthering UAS integration. For example, the Alaska test site is a member of the University of Alaska Fairbanks IPP team, with a primary focus of enabling complex UAS technology for pipeline inspections in the area’s harsh climatic conditions through testing technologies, such as using detect and avoid technology at night. While project awardees do not receive any federal funding for this program, FAA officials told us they are collecting data from IPP efforts to inform future decision- making. FAA’s Center of Excellence for UAS: In May 2015, FAA selected a team of 15 research institutions, including the Alaska and New Mexico test sites, called the Alliance for System Safety of UAS through Research Excellence (ASSURE), to serve as FAA’s Center of Excellence for Unmanned Aircraft Systems and to conduct academic research critical to safe and successful UAS integration. Congress has appropriated funds to ASSURE since fiscal year 2014 to pay for operational expenses and research, and according to FAA officials, ASSURE institutions are eligible to receive grant funding from FAA’s Research, Engineering, and Development appropriations. ASSURE institutions receive federal grants to conduct research to assess specific technologies or risks with the intent to inform FAA regulations and policies. For example, ASSURE institutions have received grants from FAA to study UAS noise certification, ground and airborne collision severity and impacts, and UAS detect and avoid technologies. According to FAA, funding from non-federal entities, such as international civil aviation authorities can be applied to ASSURE. Some of ASSURE’s research has been peer reviewed and published. According to an ASSURE representative we spoke to, all of the research conducted through ASSURE is in alignment with FAA’s plans for UAS integration as outlined in the 2018 UAS Integration Roadmap. FAA’s and NASA’s UAS Traffic Management (UTM): The UTM program is a collaborative effort of FAA and NASA to design a system with a similar concept as FAA’s air-traffic-control system for manned aviation that would enable small UAS to operate safely at low altitudes around other aircraft. NASA is leading the research, development, and testing of various technologies that would comprise the system, and plans to transfer the results of the research to FAA to determine next steps. NASA selected six test sites—Alaska, Nevada, New York, North Dakota, Texas, and Virginia—to participate, to varying degrees, in the four different phases of this project. NASA has provided funding to the six test sites through contracts for their participation in testing the system. UTM research is divided into four phases, called technology capability levels, each with specific technical goals. For example, technology capability level three entailed testing technologies that maintain a safe distance between two UAS flying over moderately populated areas. All six sites participated in the first three phases, which according to NASA officials brought in about 35 industry partners for this research effort. The Nevada and Texas test sites are currently participating in the fourth and final phase, which— as of October 2019— NASA expected to complete in 2019. In addition, FAA selected the North Dakota, Nevada, and Virginia test sites to participate in its UTM Pilot Program. The program’s goals are to develop, demonstrate, and provide services that will support the implementation of UTM operations. NASA’s UAS Integration in the National Airspace System: Beginning in 2015, NASA provided funding to the New York and Virginia test sites, among other entities, for this project, which is intended to demonstrate solutions to technical challenges to inform FAA’s development of operational standards for UAS. For example, through this project, NASA intends to test detect and avoid technologies by assessing UAS performance during a variety of scenarios, and then by recommending a minimum set of performance standards to FAA for consideration. According to NASA officials, the agency has completed work at the New York test site related to developing standards for routine operations by large UAS. As of October 2019, NASA had ongoing research at the Virginia test site on command and control communications that officials expected to complete in 2019. FAA’s UAS Detection at Airports: According to FAA, six test sites— Nevada, New Mexico, New York, North Dakota, Texas, and Virginia— participated in this program alongside various industry partners to evaluate technologies that can be used to safely detect UAS near airports. Funded by FAA, this research project included evaluating the capabilities of various UAS detection technologies by different manufacturers at four U.S. airports in 2016 and 2017. This research was used to inform minimum performance standards for UAS detection systems deployed at airports. All test site representatives stated that FAA has improved both its management of the UAS test sites and collaboration with representatives in recent years as the program has matured. According to test site representatives, initially, as the program began, there was considerable turnover among FAA test site managers, which made it more difficult for the staff at the test sites to collaborate with FAA officials to undertake research efforts. FAA officials acknowledged that because they had not established test sites before, it took time to determine the best approach for managing this program. However, according to most representatives, in the last few years, FAA has begun to better collaborate with the test sites. Specifically, FAA has solicited input from test site representatives on various issues related to UAS integration and helped facilitate information sharing between the test sites and various FAA lines of business. For example, agency officials told us that they invited air traffic specialists from a regional FAA office to participate in a recent UAS Test Site program semi-annual meeting. Through this meeting, these FAA regional staff learned about the test sites’ initiatives and about unique aspects of the test sites’ COAs, which, as previously noted, they use to conduct flight tests. According to FAA officials, with the better understanding about test sites’ operations gained at the meeting, these regional FAA staff will be able to process the test sites’ COA requests more efficiently. Most test site representatives also told us that FAA’s current UAS test site program manager and other FAA staff are responsive to, for example, questions or requests for guidance on a particular issue. Further, based on our interviews with test site representatives and our analysis of test sites’ reports submitted to FAA, the agency has taken steps to address some challenges from the past. In our March 2015 testimony and July 2015 report on FAA’s progress in integrating UAS into the national airspace, we outlined initial challenges that stakeholders most frequently cited as affecting test sites’ ability to attract users and to generate sufficient revenue to remain in operation during their first year. Since 2015, FAA has taken several steps to address these challenges, by providing additional guidance, streamlining the COA process for test sites, and improving the agency’s collaboration with and management of the test sites (see table 4). However, based on our analysis of interviews conducted for this review with test site representatives and users, these previously identified challenges persist. Lack of FAA guidance on priority research: Most test site representatives reported that while FAA has improved its management of the program, available FAA guidance still lacks the needed detail about research areas to prioritize in order to promote overall UAS integration efforts. For example, some test site representatives told us that the 2018 UAS Integration Roadmap should provide more information about the agency’s planned timeframes for implementing various steps to achieve full UAS integration, such as how and when FAA plans to integrate large UAS. Without such details, representatives say they cannot fully inform potential users when it might be possible to routinely use some complex UAS operations that are in demand by industry but currently only allowed on a case-by-case basis, such as the ability to fly small UAS beyond the operator’s line of sight or over people. Several representatives told us they are concerned that some potential test site users may postpone their research or conduct it abroad because of this lack of detail on when FAA plans to routinely allow such complex UAS operations. According to FAA officials and as noted in table 4 above, the agency has issued strategic plans and provided briefings to test site representatives and stakeholders on relevant research needed to achieve UAS integration. However, FAA officials told us that there are limitations on how much guidance they can provide the test sites. They said that the Anti-Deficiency Act prevents FAA from directing specific test site activities and obtaining research data, other than the operations and safety data required by the COA, without providing compensation. Officials also noted that until standards and regulations are developed—an effort for which the agency has not set a targeted completion date—a case-by-case approval basis will be needed for allowing complex UAS operations. With regard to the concern that some potential test site users may be conducting research abroad, FAA officials told us that testing abroad will not provide these stakeholders the same experience as testing in the United States, given that the U.S. national airspace system is more complex than those abroad in terms of traffic and congestion. Complex and lengthy COA process: Most test site representatives and users we interviewed told us that FAA should implement a less complex and time-consuming COA process for the test sites. According to test site representatives, FAA’s actions have decreased the time it takes to obtain simple COAs and Part 107 waivers, but for applications to conduct more complex research activities, FAA’s process remains lengthy and uncertain. This challenge makes it more difficult for test sites to meet users’ needs, according to representatives, and can subsequently lead companies to conduct UAS research in other countries. For example, some representatives told us that one test site’s request for a waiver to fly UAS beyond visual line of sight had taken 3 years for FAA to approve, and they could not understand why. Representatives also told us that for COA applications involving requests to research complex UAS operations, it was not always clear why FAA denied their requests, leading to uncertainty. According to FAA officials, the waiver that took 3 years to approve was an outlier and the agency’s processing of such waivers usually takes 90 days or less. However, in January 2018, DOT’s OIG similarly reported that FAA has had difficulty keeping pace with the volume of Part 107 waiver requests received and, in particular, has been slow to approve complex UAS waivers—such as requests to operate beyond the operator’s visual line of sight. In this report, the DOT OIG made recommendations related to improving the waiver process, which FAA is working to address. Generating sufficient revenue to maintain test site operations: Most test site representatives told us that securing sufficient funding to develop future capabilities and infrastructure in order to attract industry users and partners, remains a major challenge that they predict will continue. Some test site representatives told us that their respective contracts with NASA for projects such as UTM have been their largest single revenue source. Another representative mentioned that the U.S. Coast Guard has been a test site user, which has helped the site to generate revenue. Test sites have attempted to generate revenue in other ways, for example by obtaining state and local government funds to build infrastructure to attract users, applying for competitively awarded research contracts, and consulting and conducting research with potential users in different locations. FAA officials acknowledged that the test sites will need to continue to generate sufficient revenues to support their operations, but noted that, whenever possible, the agency provides the test sites with opportunities to compete to participate in funded research efforts, such as those related to the UTM program. Most test site representatives and users we interviewed also identified technology-related challenges affecting test sites’ ability to conduct research as continuing issues. These mostly relate to technology-related capabilities that will be vital for achieving full UAS integration, but which are currently still in development (see fig. 5). As we have previously reported, integrating UAS into the national airspace will require FAA to address key technology-related challenges to enable routine UAS operations with manned aircraft. For example, in our July 2015 report, we identified such challenges affecting test sites, in addition to the management-related challenges discussed above. According to test site representatives and FAA officials, these key technology challenges and concerns could affect broader UAS integration and research efforts, and thus impact the pace of or stop the progress toward full integration into the national airspace system. Such key technology-related challenges and related efforts to address them include: Availability of dedicated radio-frequency spectrum: Radio- frequency spectrum provides communication links between a UAS and its control station or operator. According to FAA, dedicated radio- frequency spectrum is important to ensure UAS safety and security in order to operate in the national airspace. For example, radio- frequency spectrum is needed for command and control, detect and avoid, and beyond visual-line-of-sight capabilities of UAS. Without a dedicated radio-frequency spectrum, the intentional or unintended interference of radio transmissions could sever the UAS means of control because other consumer products also use radio frequencies that could cause interference. FAA officials and test site representatives told us this spectrum-availability problem is the one challenge that has the potential to bring UAS research efforts to a halt if not addressed. Representatives from five of seven test sites indicated that availability of spectrum affects their ability to conduct their research operations and, more broadly, also affects the progress of other efforts contributing to UAS integration. Similarly, some test site users told us that when deciding on a potential test site to contract with for conducting their research, they asked about whether the test site faced any radio frequency interference. According to FAA officials, the agency is assisting test sites in addressing this challenge by collaborating with the Federal Communications Commission (FCC), which is responsible for allocating spectrum to nonfederal users for various purposes and assigning spectrum licenses. FAA’s Spectrum Office is a participant in the regularly occurring meetings between FAA officials and test site representatives. These representatives said they have been communicating with FAA to clarify guidance on the different frequency bands to use at various operating altitudes related to an FCC rule. Nevertheless, according to FAA officials, in the near future, more issues will likely surface related to spectrum because of the industry’s interest in conducting flights beyond visual line of sight for both small and large UAS. FAA officials told us spectrum reserved for aviation safety communications are limited. Therefore, the officials are investigating how to get the maximum UAS capacity in the national airspace by efficient management of the current allocated spectrum. Furthermore, FAA is preparing a report for Congress that covers the use of spectrum allocated for possible UAS activities. FAA officials told us that the report will not delay or prohibit the use of any licensed spectrum for UAS. FAA expects to submit its report to Congress in April 2020. Limitations to conducting counter-UAS detection and research: Counter-UAS activities involve using technology to help detect, track, and defend against illegal or unauthorized activities. Pursuant to federal law, it is illegal to damage or destroy aircraft, and this statute may apply to UAS. Other provisions of federal law may prohibit the use of certain detection systems and mitigation systems. FAA does not support the use of counter-UAS systems, which includes interdiction capabilities, by any entities other than the federal agencies with explicit statutory authority to use these technologies, including for the testing and evaluation of such systems. In addition, FAA has limited authority for testing UAS detection and mitigation systems at airports. Federal agencies with the authority to mitigate risks of UAS under certain circumstances are the Departments of Defense, Energy, Justice, and Homeland Security. According to one test site representative, industry’s ability to conduct research on counter-UAS technologies is limited because it requires the participation of one of the four agencies listed above. FAA officials told us that these federal agencies have the authority to conduct counter-UAS operations. These agency officials noted that the test sites could support counter-UAS research activities, for example, by providing the expertise and any infrastructure needed for the test flights, such as a chase aircraft. Some test site representatives and users we spoke to suggested that it would be helpful if more counter-UAS research were allowed. For example, they said that further research is needed to understand how to address counter-UAS threats—such as someone illegally trying to interfere with the radio frequency of a UAS delivering a package. One test site representative told us that multiple users want to fly swarms of UAS (where one operator flies multiple UAS simultaneously in proximity) to conduct counter-UAS operation research, but it is a challenge to support users’ desired research because of current restrictions. However, some stakeholders pointed out that the available technology for conducting such research, such as detect and avoid technology, is not developed enough yet to allow for effective research in this area. FAA regularly gathers information from the test sites in the following ways: Meeting with test site representatives: In the previously described regular meetings between FAA and test sites—monthly by teleconference and semi-annually in-person—participants share information on experiences conducting research and challenges faced. According to FAA officials, the meetings are helpful in informing the agency about the types of UAS research that users are pursuing, among other things. Representatives of all seven test sites agreed that these meetings are helpful. For example, some representatives noted that such meetings facilitate information sharing about, for example, the status of other FAA-affiliated UAS research efforts— such as UTM and the IPP—and the status of other FAA initiatives underway, such as UAS rulemakings. Collecting data from test sites: Test sites have provided several types of data to FAA since 2015, including: Entering data on flight tests into the MLS—the system that FAA established for this purpose. MLS data include details about flight tests, such as duration, whether the test involved complex operations such as beyond the operator’s line of sight, and any accidents or incidences that occurred. According to FAA officials, MLS is used for collecting test site data—which will be used to, among other things, inform the final report to Congress that is required by statute. Submitting data into FAA’s aforementioned COA application processing system, which FAA uses to process COAs. Submitting quarterly and annual reports to FAA, which summarize activities completed by each test site, including research and development efforts for users, milestones met and the key challenges faced in undertaking activities. According to FAA officials, their efforts related to the UAS test site program have been primarily focused on meeting requirements such as those related to test sites outlined in the 2012 Act. Among other things, the 2012 Act required FAA to: Establish test sites to provide a way to access airspace to conduct research and development. Develop standards and requirements for UAS flight operations at test sites. At the end of the test site pilot program, submit a final report to Congress with findings and conclusions about projects facilitated through the program. In response to the 2012 Act’s requirements, as previously noted, FAA established the test sites and developed requirements for how test sites should conduct UAS flight testing. As FAA has been focused on collaborating with the test sites and meeting the 2012 Act’s and other requirements, agency officials have not prioritized determining how to use data gathered from the sites to advance UAS integration. To date, FAA has only used data from test sites in a few cases to directly inform the agency’s UAS integration efforts. For example, in one case, FAA used data from an ASSURE project conducted at a test site to develop a noise certification standard; these data were not from MLS. In another example, FAA officials told us that— as of February 2019—they were planning to use MLS and other test site data to make a decision about an applicant that had submitted a request to conduct UAS package delivery operations. According to officials, FAA intends to use the data collected from test sites to a greater extent in the future to further integration, such as in the following ways: In November 2018, FAA asked ASSURE to review test site data to identify data FAA could use to approve safety cases. As previously noted, FAA generally requires safety cases to be submitted as part of any application to use a UAS operation that is not yet routinely allowed in the national airspace due to risk, such as flights beyond the operator’s line of sight. Safety cases include evidence of how the applicant will address any risks that the new complex UAS operation would introduce into the airspace, such as the risks of the UAS abruptly losing power. According to FAA officials, this research was initiated in December 2018 with a plan to complete it by March 2020. According to these officials, the results of this research should help the overall UAS integration effort. Specifically, the results may help FAA officials to more clearly define the information UAS operators should submit to demonstrate how the safety risks associated with their proposed operation will be mitigated. Officials indicated that FAA also intends to use MLS and other test site data to continue developing, evaluating, and validating the aforementioned UTM system. FAA officials told us that while they have not fully leveraged test site data, they are using other information from the test sites—such as information shared in meetings—to support the agency’s efforts to integrate UAS into the national airspace. According to FAA officials, the test site program supports UAS integration not only by providing industry stakeholders with an avenue for testing complex UAS operations and concepts, but also by helping FAA officials stay informed about issues related to integration. Specifically, these officials told us that the informal information sharing that occurs in regular meetings between FAA officials and test site representatives has been valuable. Through such informal exchanges, FAA officials keep abreast of the various types of research being requested by industry stakeholders and challenges faced by such stakeholders pursuing such research. For example, as noted previously, test site representatives have used these meetings to discuss challenges—such as related to dedicated spectrum—with FAA officials. In addition, based on what FAA officials have observed at test sites, the agency has been able to grant other airspace users more flexible authorizations, for example COAs covering larger geographical areas. Specifically, these agency officials told us that because they observed that the test sites have been able to maintain an acceptable level of safety after being allowed more flexibility in their aforementioned nationwide blanket COAs, the agency felt confident enough to give more flexibility to other airspace users with COAs for using complex UAS operations. FAA’s UAS integration plans specify the importance of not only collecting data but also using the data to inform strategic planning efforts. FAA’s publicly available plans state that FAA intended to use information from the test site program to inform its UAS integration efforts. Specifically, according to the 2018 UAS Integration Roadmap, the test site program plays a critical role in UAS integration as one of the program’s goals is to provide information so that FAA can determine technical and operational trends that could support safety-related decision making for integration, and develop policy and standards required to address new and novel aspects of UAS flight operations. In addition, FAA’s Unmanned Aircraft Systems Test Site Data Collection and Analysis document issued in 2016, indicates that by September 2016, FAA planned to analyze the data to determine operational trends, communicate them via dashboards, and share the collected and analyzed data with stakeholders. Further, federal internal control standards state that agencies should use quality information to achieve the agency’s objectives and support informed decisions. Specifically, agencies should first identify what data are needed to achieve the entity’s objectives, then obtain the needed data from internal and external sources in a timely manner, and finally process and evaluate the obtained data into quality information that supports the entity’s objectives. While FAA has indicated plans to analyze and use test site data in the future, it has not yet developed a data analysis plan to do so. FAA officials told us that having an analysis plan for MLS data could be useful and that—as of September 2019— they were considering creating such as plan but had not taken steps to do so. According to FAA officials and some test site representatives, and based on our review, some currently collected data could be useful in informing integration efforts. Specifically, FAA officials and two test site representatives told us that some MLS data—for example on accidents and lost control links—could be useful. For example, data on accidents and lost communication links could be combined with other MLS data on the respective test flights—such as the time of day, type of UAS being flown, and other factors—to determine whether certain conditions or UAS models are at a greater risk of a crash or other incident. According to FAA officials, this combined data could theoretically help the agency to measure risk and to determine if there are any factors that contribute to lost control links between the UAS and the remote pilot in the flight testing environment. The results of such a data analysis could help inform integration efforts, such as in developing operational standards for UAS. Without a plan for analyzing the data, FAA could miss opportunities to leverage what was intended to be a cornerstone of the test site program—information to help FAA move UAS further toward full integration into the national airspace. Having such an analysis plan could help FAA articulate how the agency will use test site data more in the future and identify other data that are within the agency’s authority to request from test sites that would help inform integration. Representatives from three test sites told us that their staff currently collects other data that FAA is not collecting but which could help to inform the agency’s UAS integration efforts. Based on our review of test sites’ annual reports to FAA, for instance, all test sites have been involved in facilitating test flights of UAS operations beyond the operator’s line of sight. FAA may be able to use data from such flight tests as it develops standards for allowing these types of UAS operations on a routine basis in the national airspace. Further, the National Academy of Sciences reported in 2018 that FAA has underutilized the test sites because it has not determined which test site data could inform the agency’s risk assessments for UAS (which FAA conducts before allowing any new complex UAS operation to be used on a routine basis) nor collected that specific data from test sites. FAA provides limited information to the public, including stakeholders and test site users, about how the research being conducted at test sites helps to inform FAA’s UAS integration efforts. FAA officials point to two main public efforts related to the test sites program: FAA’s 2018 UAS Integration Roadmap, described earlier, includes a high-level overview of how the test sites program informs the agency’s integration efforts. For example, it states that test sites provide information that FAA can use to determine technical and operational trends that could support safety-related decision making. However, it does not provide any information about, for example, how the research at test sites directly relates to FAA’s next planned phases of integration. FAA’s UAS Test Sites website is the agency’s main public outreach effort, and provides information such as links to the websites of the test sites. However, in examining the website, we found little description of how this program relates to FAA’s broader integration plans and no discussion of desired outcomes from the research under way at test sites. In contrast, the websites for two other UAS research efforts that FAA is involved in—the UTM program and DOT’s IPP— have program descriptions that include the purpose of the program, and some intended research outcomes. These two program descriptions make it relatively easy for the reader to understand how those programs fit into FAA’s broader UAS integration efforts. See figure 6, which shows the program descriptions on FAA’s respective websites for the test site program and the IPP. FAA also compiles some information on test sites that is not publicly available. For example, FAA staff annually compile information about the types of research conducted at test sites and present it in the Test Sites Fact Book, which links the information to key capabilities needed for the incremental integration of UAS into the national airspace. However, this document is only available to FAA staff and, according to officials, contains some data that test site users could deem proprietary. FAA officials told us that they also plan to submit the aforementioned final report to Congress on the test site program, which is currently due in late 2023. According to these officials, however, this report is not intended to be made public. All test site representatives and many users in our review (13 of 18) reported that publicly available information on research efforts underway at test sites is limited. Many users we spoke to (11 of 18) stated that FAA should include more information about the test sites on its website, and in FAA’s planning documents, such as the 2018 UAS Integration Roadmap. These representatives and users also told us improved FAA communication could increase the UAS stakeholders’ awareness of test sites’ capabilities, expertise, and services, and their understanding about how the program fits into FAA’s broader integration efforts. According to FAA, collaboration and cooperation across industry and government is important for UAS integration—a complex endeavor involving multiple stakeholders from different sectors. As FAA’s 2018 UAS Integration Roadmap states, given the large scale of the UAS integration effort, FAA must rely on crucial relationships across government and industry to ensure its integration efforts are harmonized and consistent. It further states that all the work needed to resolve collective challenges requires collaboration between partners at local, state, tribal, and national levels as well as with partners across the UAS stakeholder community. In addition, federal internal control standards and leading practices for reporting on research and development activities emphasize the importance of making the status of such activities transparent to stakeholders. Specifically the federal internal control standard for communicating information calls on federal agencies to externally communicate quality information so that external parties can help the entity achieve its respective objectives. Further, this standard suggests that agencies should select appropriate methods to communicate externally, taking into consideration factors such as the intended audience and the availability and ease of access to the information. In addition, as we have reported, leading practices for reporting on research and development efforts include clearly communicating the status of such efforts to the public and stakeholders. For example, in a 2017 report about FAA’s management of its aviation research and development portfolio—which includes UAS research efforts—we found that FAA could more fully adhere to leading practices if it provided more information for Congress and other stakeholders, such as on the status of various research and development activities. We noted that with more complete and transparent information, Congress and industry and other stakeholders are better able to make informed decisions. In another example, in several reports on FAA’s implementation of the Next Generation Air Transportation System— another complex endeavor involving coordination with industry and other stakeholders—we emphasized the importance of sharing information about the status of various projects with stakeholders whose participation will be essential to the progress of the overall effort. FAA officials told us that they were wary of providing more public information about the test sites, based on concerns about potentially being perceived to be promoting the designated test sites and concerns about sharing data that could be proprietary. For example, officials told us that when potential test site clients approach FAA, they simply direct these potential clients to the FAA’s UAS Test Sites website. The officials told us that they do not wish to be seen as promoting or advertising one of the FAA-designated UAS test sites over the others, because such promotion would conflict with FAA’s role as a regulator. They also said that FAA wants to avoid suggesting that operators seeking to research complex UAS operations are required to contract with a designated test site. They noted that the decision about whether or not to use a designated test site should be left to the potential client. In addition, FAA officials expressed concerns about sharing any information that the test site users could deem to be proprietary, such as information about their research projects currently underway. For example, the officials noted that some test site users do not want to be identified as such. In our assessment, however, it would be possible for FAA to share more information publicly about how the test site program fits into the agency’s broader UAS integration effort without promoting any particular test site or sharing any proprietary information. For example, some context in the Test Sites Fact Book could be informative because it links research underway at test sites to FAA’s integration plans. This book includes a section on current test site research with examples that, if shared, could help increase stakeholders’ understanding of how FAA could use the research being conducted at test sites to inform its decisions. This section indicates that test sites are involved in research aimed at, for example: Advancing UAS standardization, meaning the FAA and all the test sites working together to advance the industry from a systems perspective to develop standardized UAS training, maintenance, and safety risk mitigation. Data from such research could help inform FAA decisions such as, for example, setting standards for drone spacing and mitigating risks. Using UAS for wildfire operations, including test sites and users— such as emergency response agencies—finding effective ways to use UAS to respond to such situations. Data from such research could help FAA improve, for example, its response time when an emergency COA is requested by such agencies. Such additional information, if shared, could help FAA to clearly demonstrate to the wider audience of UAS stakeholders that the agency is fostering research through test sites that directly relates to its UAS integration plans. As noted above, the test site users we interviewed told us they were conducting research at test sites related to FAA’s upcoming phases of its UAS integration plan, including research on large cargo and passenger operations. Although some UAS stakeholders—such as users of test sites—may currently be aware of the research underway at test sites, the audience for UAS integration is larger and includes others such as those from the information technology and agricultural industries, and local government agencies whose stakeholders may be less familiar with FAA’s efforts. Further, with more accessible information on how research at the test sites relates to FAA’s UAS integration efforts, more stakeholders may choose to use a test site to conduct their own research. Given that one of the primary goals of the test site program is to provide information to FAA to help the agency develop the policies and standards required to address new and novel aspects of UAS flight operations, having more test site users could help the agency achieve this goal by making more data available to FAA. As noted previously, many selected users we interviewed told us that using a test site provided a significant benefit for advancing their entity’s UAS research and development efforts. However, some UAS stakeholders who could benefit from a test site’s assistance— such as those outside of the aviation industry seeking to submit a safety case to FAA for approval of complex UAS operations—may not currently be aware of the option for conducting research through a test site. For instance, a stakeholder interested in conducting research involving, for example, using UAS for small package delivery, may be unaware that test sites have already helped to facilitate such research for their users. FAA officials told us that stakeholders outside of the aviation industry can particularly benefit from a test site’s expertise since they may be less familiar with FAA’s processes for approving UAS operations on a case- by-case basis. All test site representatives and some users in our review told us that if FAA communicated more clearly about the role of the test site program in the overall UAS integration effort, more stakeholders would likely leverage the test sites. FAA’s designated UAS test sites provide significant benefits to the UAS industry, offering their users a variety of services, with minimal operating investment from FAA. Many users in our review told us that their decision to work with a test site proved invaluable in helping achieve their respective goals. As FAA proceeds with its plans to incrementally integrate UAS into the national airspace—a large effort requiring collaboration with many stakeholders—the agency could benefit from better leveraging all of its available resources. According to FAA, additional research and development work—including data on UAS operations—is needed to inform its decisions as it allows for more complex UAS operations to be routinely used in the national airspace. UAS stakeholders working with FAA test sites are testing complex UAS operations and various capabilities identified by FAA as needed to inform integration policies and rules moving forward. However, without a plan for analyzing the test site data, FAA could miss opportunities to better use the data to inform the overall UAS integration effort, such as by applying the data to inform UAS operational standards. Having such an analysis plan could help FAA articulate how the agency will use test site data more in the future and identify other data that are within the agency’s authority to request from test sites that would help inform integration. In addition, by sharing more information about how the program relates to FAA’s integration efforts, the broader community of UAS stakeholders may have a greater awareness of the types of research and testing being conducted at test sites and thus be better able to participate in the effort. Further, without more accessible information, such as examples of how research underway at test sites aligns with FAA’s planned phases of UAS integration, some UAS stakeholders may not be aware of their options for pursuing research through a test site, thus potentially limiting the usefulness of the test site program for UAS stakeholders and for FAA. We are making the following two recommendations to FAA: The Administrator of FAA should develop a plan for analyzing currently-collected UAS test site data to determine how they could be used to advance UAS integration, and whether the collection of any additional test site data, within the agency’s authority to request, could be useful for informing integration. (Recommendation 1) The Administrator of FAA should publicly share more information on how the test site program informs integration while continuing to protect information deemed proprietary. This information could be shared, for example, on the agency’s UAS Test Sites website. (Recommendation 2) We provided a draft of this report to DOT and NASA for their review and comment. In its written comments, reproduced in appendix II, DOT partially agreed with the first recommendation and agreed with the second recommendation. FAA also provided technical comments, which we incorporated as appropriate. NASA officials reviewed our draft, but did not have any comments. FAA partially agreed with the first recommendation to develop a plan for analyzing test site data, noting a concern about using such a plan to determine if the collection of any additional test site data could be useful for informing integration. Specifically, FAA noted that the agency cannot require test sites to share data from their privately contracted users, other than the data required for the test sites’ COAs or for their OTAs with FAA. FAA also noted a concern that our draft report incorrectly assumes that the data collected through the test site program are adequate to meet FAA’s UAS integration needs when this program is limited in the data that can be collected. However, our report states that the test site program is only one of several sources of data to inform FAA’s future decisions regarding UAS integration, and that a data analysis plan could help FAA determine whether any additional data could be useful for informing integration. To address FAA’s comments, we added language to our recommendation to clarify that the consideration of potential additional data would be for data that are within the agency’s authority to request from test sites, such as through the OTAs. We continue to believe that implementing this recommendation would enable the agency to better leverage test site research and data to inform its decisions related to UAS integration. FAA agreed with our second recommendation to share more information on how the test site program informs the agency’s UAS integration effort. However, FAA stated that the agency’s integration plans and Test Site Fact Book cannot be made publicly available due to future rulemaking and proprietary information contained in these documents. We acknowledge in our report that these documents could include information that test site users deem proprietary. We include in our recommendation that FAA should continue to protect any information deemed proprietary while making information about the test site program’s contribution to UAS integration publicly available. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Entity Griffiss International Airport (New York) - Northeast UAS Airspace Integration Research Alliance New Mexico State University – Physical Science Laboratory North Dakota Department of Commerce – Northern Plains UAS Test Site State of Nevada – Nevada Institute for Autonomous Systems Texas A&M University-Corpus Christi – Lone Star UAS Center of Excellence and Innovation University of Alaska Fairbanks – Alaska Center for UAS Integration Virginia Polytechnic Institute and State University – Mid-Atlantic Aviation Partnership Agricultural Research Service, United States Department of Agriculture Alliance for System Safety of UAS through Research Excellence, Mississippi State University Association for Unmanned Vehicle Systems International JHW Unmanned Solutions, LLC Massachusetts Institute of Technology Lincoln Lab National Emergency Response and Recovery Training Center, Texas A&M Engineering Extension Service Project Vahana, Airbus A3 Vanilla Aircraft (now Vanilla Unmanned) Heather Krause at (202) 512-2834 or krauseh@gao.gov. In addition to the individual named above, Vashun Cole (Assistant Director); Jessica Bryant-Bertail (Analyst-in-Charge); Jon Felbinger; Camilo Flores; Richard Hung; Josh Ormond; Amy Rosewarne; Alexandra Rouse; Kelly Rubin; Marc Schwartz; and Larry Thomas made key contributions to this report.", "summary": "UAS could provide significant economic and social benefits, for example by delivering packages or aiding in search and rescue missions. FAA is conducting a phased approach to incrementally integrate UAS safely into the national airspace. As directed by statute, FAA established UAS test sites to allow industry to assess the safety and feasibility of complex UAS operations, such as flying beyond an operator's line of sight. FAA has stated that this program provides research results and other data needed to reach full integration. GAO was asked to review FAA's management of the test sites. This report examines, among other things: (1) the research conducted at FAA's designated UAS test sites, and (2) how FAA is leveraging and sharing information from the test site program to advance integration. GAO reviewed relevant statutes and regulations, reports, and FAA guidance; analyzed test sites' efforts, including flight test data submitted to FAA from 2015 through 2018; and interviewed FAA officials, test site representatives from all 7 test sites, and 18 test site users, selected to include a range of perspectives. The Federal Aviation Administration's (FAA) seven designated test sites for unmanned aircraft systems (UAS) have facilitated about 15,000 UAS flight tests since 2015 and supported a wide range of research. Both public and private entities have used the test sites to test technologies in preparation for varied UAS activities, from inspecting utilities to carrying passengers. Research conducted at test sites provides data on the performance of various UAS capabilities and technologies; such data could support FAA's integration efforts. While FAA collects this data from test sites, it has not fully leveraged the data or the program to advance UAS integration. According to FAA's 2018 Roadmap for UAS Integration a key goal of this program is to provide data to support FAA's decisions on drone integration. FAA officials said the agency intends to use the data to a greater extent in the future to advance integration. Without an analysis plan, however, FAA could miss opportunities to better use the data to inform the overall integration effort, such as to inform UAS operational standards. Also, FAA reports limited public information about how test sites' research relates to the agency's integration plans. Agency officials told GAO they were wary of sharing more information about the test sites, citing concerns about, among other things, protecting test site users' proprietary data. All test site representatives and most users GAO interviewed, however, said that more information on test sites' research would be helpful for UAS stakeholders' research efforts. According to FAA plans, the agency must rely on relationships with stakeholders across government and industry to ensure that integration efforts are harmonized. By sharing more information publicly, FAA could demonstrate to such stakeholders how the agency is fostering and using research to inform and advance integration. Further, with more information, more stakeholders may opt to use a test site to conduct their own research, thus potentially increasing data available to FAA to inform its integration decisions. GAO recommends that FAA (1) develop a data analysis plan for test site data and 2) share more information on how this program informs integration, while protecting proprietary data. FAA partially agreed with the first recommendation and agreed with the second. GAO added language to the first recommendation to address the issue that FAA raised, as discussed in this report.", "document_type": "gao"}
{"report": "The U.S. government supports various types of democracy assistance, which State and USAID categorize under their democracy, human rights, and governance portfolios. State and USAID use the Updated Foreign Assistance Standardized Program Structure and Definitions to categorize democracy assistance activities in six program areas: rule of law, good governance, political competition and consensus building, civil society, independent media and free flow of information, and human rights. Table 1 shows these six program areas and their elements. State bureaus and offices—in particular, DRL and INL—and USAID provide funding for democracy assistance. State. State’s democracy assistance is provided by DRL, INL, and other State bureaus and offices. DRL. As the U.S. government’s primary foreign policy entity advocating for democracy globally, DRL funds programs in every region of the world to promote human rights, democracy, and transparent and accountable governance. INL. INL provides funding for programs that combat crime and narcotics trafficking, including democracy assistance to promote the rule of law, combat corruption, and promote good governance. Other bureaus and offices. Other State bureaus and offices, such as the regional bureaus and the Bureau of International Organization Affairs, provide democracy assistance related to their geographic or functional areas. USAID. As the lead U.S. government agency for international development, USAID considers democracy, human rights, and governance to be central to its core mission. USAID missions overseas play a primary role in providing democracy assistance, and the regional bureaus in Washington, D.C., provide oversight of this assistance. USAID’s Bureau for Democracy, Conflict, and Humanitarian Assistance, headquartered in Washington, D.C., consists of several offices, including two that support the bureau’s mission to promote democratic and resilient societies: the Center of Excellence on Democracy, Human Rights, and Governance and the Office of Transition Initiatives. State and USAID allocated a total of more than $8.8 billion for democracy assistance in fiscal years 2015 through 2018. State allocated 33 percent of this amount—a total of $2.9 billion, averaging approximately $727 million annually—to DRL, INL, and other bureaus to provide democracy assistance. USAID allocated the remaining 67 percent—$5.9 billion, averaging approximately $1.5 billion annually. Figure 1 shows the total amounts that State and USAID allocated for democracy assistance in fiscal years 2015 through 2018. In fiscal years 2015 through 2018, DRL, INL, and USAID directed allocations for democracy assistance to many of the same countries, although the program areas they supported varied. DRL, INL, and USAID directed democracy assistance allocations to a combined total of 100 countries, including 33 countries where all three entities provided such assistance (see fig. 2). DRL directed democracy assistance allocations to 67 countries; INL, to 45 countries; and USAID, to 84 countries. State officials said that, because the countries have serious democracy-related challenges, the agencies providing this assistance may address these challenges from different perspectives and with different objectives. Although DRL and USAID directed democracy assistance allocations to many of the same countries, DRL focused a greater percentage of its funding in countries where citizens enjoy fewer democratic freedoms. DRL directed 70 percent of its allocations for democracy assistance in fiscal years 2015 through 2018 to less democratic countries—those rated as “not free” by Freedom House’s 2018 “Freedom in the World” survey. In contrast, USAID directed about half of its allocations for democracy assistance during this period to “not free” countries. Similarly, although DRL, INL, and USAID directed their allocations for democracy assistance to many of the same countries, the entities concentrated funding in different program areas. In fiscal years 2017 and 2018, DRL and INL directed the largest percentages of democracy assistance allocations to encouraging human rights and promoting the rule of law, respectively, while USAID directed about half of its democracy assistance allocations to promoting good governance (see fig. 3). As figure 3 shows: DRL directed 36 percent (about $203 million) of democracy assistance allocations to projects supporting human rights, 19 percent (about $107 million) to projects supporting civil society, and 14 percent (about $76.4 million) to projects supporting independent media and free flow of information. DRL directed the smallest amounts to projects supporting rule of law, political competition and consensus building, and good governance. INL directed more than 98 percent (about $580 million) of democracy assistance allocations to promote the rule of law. USAID directed 49 percent (about $1.5 billion) of its democracy assistance allocations to projects promoting good governance and 19 percent (about $600 million) to projects supporting civil society. USAID distributed the remainder across the other four democracy assistance program areas, allocating the smallest amounts to projects supporting human rights and independent media and free flow of information. State’s DRL and INL and USAID have strategies that define their roles in democracy assistance, and their funding obligations in the selected countries in fiscal years 2015 through 2018 generally aligned with these roles. DRL and INL strategies identify various program areas as aspects of the bureaus’ respective roles in providing democracy assistance. For example, DRL supports a range of democracy program areas and emphasizes human rights, while INL focuses on the rule of law. In fiscal years 2015 through 2018, DRL’s and INL’s funding obligations for democracy assistance in the countries we selected for our review—the DRC, Nigeria, Tunisia, and Ukraine—generally aligned with the roles defined in bureau strategies and described by bureau officials. USAID plays the leading role in U.S. development assistance overseas, including democracy assistance, according to its 2013 strategy on democracy, human rights, and governance. We found that USAID’s democracy assistance in the four selected countries generally aligned with its strategic goal of supporting democratic change to achieve broader development goals. DRL’s 2018 bureau strategy states that the bureau’s mission is to “champion American ideals as a means of combating the spread of authoritarianism, terrorism, and subversion of sovereign democracies.” According to the strategy, DRL works through diplomatic channels to support democracy-related areas; support human rights, labor, and democracy defenders; and publish reports on human rights in all countries, among other activities. In a 2015 report to Congress, State noted that 90 percent of DRL’s programs operate in restrictive or challenging environments. Although the report did not define restrictive or challenging environments, DRL officials said that the bureau’s assistance focuses on building civil society and supporting diplomatic initiatives to improve governance, particularly in repressive and closed societies. According to the officials, the bureau supports democracy and human rights globally, including in areas where such programs face threats from host governments, and is not constrained to working in countries with a U.S. presence. DRL designs and manages all of its democracy assistance projects from Washington, D.C. DRL officials noted that DRL projects typically receive total allocations of at least $500,000, have a duration of 1 to 5 years, and are implemented by U.S.- based or other large organizations. INL’s most recent bureau strategy states that INL is at the forefront of responding to international security challenges and that INL promotes U.S. leadership by advancing rule-of-law principles. INL officials said that the bureau conducts democracy assistance work to support its provision of security assistance and that INL programming helps governments provide accountability to their citizens. According to agency officials, INL’s funding for democracy assistance generally supports host-country governments through bilateral agreements and is not always project based. INL programs can be managed by INL staff at State’s headquarters in Washington, D.C., and at embassies overseas. INL’s democracy assistance is implemented by its own staff, other U.S. agencies, and U.S.-based or international organizations. DRL and INL officials told us that they ensure consistency between their democracy-related strategic goals and the goals in overarching strategies, such as the government-wide National Security Strategy and State and USAID’s Joint Strategic Plan. The most recent Joint Strategic Plan notes that State and USAID will work to “counter instability, transnational crime, and violence that threaten U.S. interests by strengthening citizen-responsive governance, security, democracy, human rights, and the rule of law.” The Joint Strategic Plan also notes that State and USAID will focus on places that pose the greatest threat to U.S. interests. DRL’s and INL’s total obligations of funding for democracy assistance in the four selected countries for fiscal years 2015 through 2018 generally reflected their defined roles. DRL’s obligations for projects in the selected countries generally reflected the bureau’s focus on supporting democracy and human rights, as defined in DRL’s bureau strategy and described by officials. Overall, the majority of DRL obligations in the four selected countries focused on projects supporting civil society, human rights, and independent media and the free flow of information. In fiscal years 2015 through 2018, 60 to 100 percent of project-level funding was dedicated to these program areas. DRL obligations for democracy assistance projects in the selected countries averaged more than $800,000 for 2 years. Consistent with its stated role of protecting human rights globally, DRL obligated at least a quarter of this funding in three of the four countries to projects that supported human rights (see fig. 4). Similarly, INL’s democracy assistance obligations in the selected countries during the same period generally reflected the bureau’s focus on supporting the rule of law, as defined in its bureau strategy and described by officials. Data for the four countries show that INL obligated $3.2 million in the DRC, $12.5 million in Nigeria, $$3.9 million in Tunisia, and $5 million in Ukraine for democracy assistance for fiscal years 2015 through 2018. In Nigeria, Tunisia, and Ukraine, 100 percent of INL’s democracy-related obligations supported the rule of law. In the DRC, 92 percent of INL’s democracy-related obligations supported the rule of law and the remaining 8 percent supported good governance. (See apps. III through VI for more information on State’s democracy assistance in the DRC, Nigeria, Tunisia, and Ukraine, respectively.) The 2013 USAID Strategy on Democracy, Human Rights and Governance states that USAID plays the leading role in U.S. development assistance overseas, including democracy assistance. The strategy explains that support for democracy, human rights, and governance is essential to achieving the agency’s broader social and economic development goals, which, USAID has noted, contribute to self-reliance. USAID officials told us that, to support democracy from a development perspective, USAID generally funds multiyear, multimillion-dollar democracy assistance projects that are implemented by U.S.-based or international organizations. USAID’s democracy strategy also identifies the roles of various USAID units involved in implementing U.S. democracy assistance. For example, according to the strategy, USAID missions are to play the primary role in implementing it by both designing and managing democracy-focused programs, while USAID’s Center of Excellence on Democracy, Human Rights, and Governance is to provide technical and other assistance to the missions and manage some mechanisms to support programs, among other things. Further, the strategy clarifies relationships in terms of leading and supporting units in areas of democracy assistance and identifies roles of various other agencies, including State. In all four selected countries, USAID’s democracy assistance, as reflected in country-level strategies and projects, generally aligned with the Joint Strategic Plan and with the agency’s democracy strategy to support democratic change in order to achieve broader development goals. We found that the USAID country development cooperation strategy for each of the selected countries articulated democracy assistance objectives to support the country’s overall development. According to USAID officials, these strategies guide the type of democracy assistance provided in a particular country on the basis of the country’s needs and generally focus on supporting sectoral change, such as through policy reform or institution building. For example, the 2016 USAID strategy for Tunisia included a development objective to promote social cohesion through democratic consolidation. Objectives for selected USAID projects in the four countries also reflected the agency’s goal of effecting long-term, development-based change through democracy assistance. For instance, consistent with its country strategy for Tunisia, USAID obligated nearly $22 million in fiscal years 2017 and 2018 for a project designed to improve the relationship between Tunisians and their civic and government institutions, in part by enhancing the responsiveness of government institutions (see fig. 5). Other characteristics of USAID’s democracy assistance projects in the selected countries also reflected the agency’s defined role. In each of the four countries, a democracy office in USAID’s mission in the country managed democracy assistance, consistent with USAID’s democracy strategy. Overall, USAID’s democracy assistance projects in the selected countries demonstrated that the agency implemented multiyear, multimillion-dollar projects, consistent with what USAID officials told us was needed to support long-term development. Data for the four countries showed that USAID’s total obligations for democracy assistance ranged from $49.5 million to $126 million for fiscal years 2015 through 2018 (see fig. 6). Per project, USAID’s obligations in the four countries averaged about $7.2 million, with each project’s implementation period averaging just over 4 years. USAID’s implementing partners were, for the most part, U.S.-based or international organizations. Although USAID democracy assistance obligations in the selected countries covered a variety of program areas, they concentrated on political competition and consensus building, good governance, and civil society. As figure 6 shows, USAID’s obligations for rule-of-law and human rights projects made up less than a quarter of total project-level funding obligated in each country in fiscal years 2015 through 2018. See appendixes III through VI for more information about USAID’s democracy assistance projects in the DRC, Nigeria, Tunisia, and Ukraine, respectively. State and USAID use various mechanisms to coordinate democracy assistance at the headquarters level, such as interagency roundtable discussions of budget allocations. Officials at embassies in the selected countries described interagency coordination efforts at the country level, such as working groups, and provided examples of how coordination helped avoid duplication and improved the effectiveness of democracy assistance efforts. Despite the use of these mechanisms and other steps that DRL takes to coordinate with embassies, embassy officials in all four selected countries reported having incomplete information about DRL’s projects in those countries. State and USAID use various mechanisms, including budget roundtables and proposal review panels, to coordinate democracy assistance between the agencies at headquarters. For instance, State’s Office of U.S. Foreign Assistance Resources manages the annual allocations budget process, which facilitates interagency coordination through structured conversations about democracy assistance and various bureaus’ priorities, according to State and USAID officials. These annual democracy discussions also enable the participants to identify policy changes and share lessons learned. USAID officials added that USAID’s Center of Excellence on Democracy, Human Rights, and Governance serves as the technical lead on democracy assistance issues during these interagency budget discussions. INL officials told us that they take the lead in democracy assistance discussions concerning security sector assistance. In addition, some of State’s regional bureaus, including the Bureaus of Near Eastern Affairs and of European and Eurasian Affairs, maintain assistance coordination offices to coordinate U.S. foreign assistance to countries in those regions, including through strategic planning and budget formulation processes. These offices, based in Washington, D.C., coordinate with embassies, other State bureaus, and USAID at various stages of strategic planning and budget formulation. For example, country coordinators from the Bureau of Near Eastern Affairs’ assistance coordination office are to lead roundtable discussions at least annually to share information among U.S. government agencies and contribute to improved planning and implementation. Some U.S. embassies in these regions, including those in Tunisia and Ukraine, have an assistance coordination unit to coordinate all U.S. foreign assistance in the country, and these units work with State regional bureaus’ Washington, D.C.– based offices. Further, when considering potential democracy assistance projects, DRL coordinates with State and USAID counterparts both in Washington, D.C., and overseas through its proposal review process. DRL proposal review panels include representatives from USAID, State regional bureaus, and other agencies that may have relevant expertise. State and USAID also use various interagency mechanisms to coordinate democracy assistance at the country level within embassies overseas. Examples of coordination mechanisms include the following. Working groups. According to State and USAID officials in the four selected countries, interagency working groups facilitate formal discussions about democracy assistance projects and provide opportunities to identify areas where agencies’ projects might complement or duplicate one another. Working groups at each embassy vary in number, theme, and meeting frequency, depending on the country context and U.S. government priorities. For example, the U.S. embassy in Ukraine has about 10 democracy-related working groups, focused on themes including elections, anticorruption, human rights, and the justice sector. At the U.S. embassies in the DRC and Nigeria, agency officials told us they convened working groups on elections, given the U.S. government’s interest in the countries’ recent and upcoming elections. In Tunisia, where USAID reestablished a presence in 2012 and a mission in June 2019, an interagency development assistance working group that addresses democracy issues, among other things, began meeting in September 2018, according to agency officials. The officials also said that a security assistance working group coordinated assistance related to rule-of- law issues. These working groups meet bimonthly, monthly, or weekly, according to officials. State and USAID officials generally said that they found the working groups were effective in helping to coordinate democracy assistance. Assistance coordination units. U.S. embassies in Tunisia and Ukraine have assistance coordination units designed to coordinate U.S. foreign assistance, including democracy assistance. Unlike the assistance coordination unit in Ukraine, State’s Foreign Assistance Unit in Tunisia managed democracy assistance projects in fiscal years 2015 through 2018 while also coordinating other State and USAID assistance in the country (see app. V for more information about democracy assistance in Tunisia during this period). According to a State document, the assistance coordinator at an embassy in Europe or Eurasia can be a “touch point” for agencies at the embassy to work together on assistance issues and communicate effectively with Washington. The assistance coordination units in both Tunisia and Ukraine have established mechanisms to coordinate U.S. foreign assistance within the embassies, according to officials. For instance, the foreign assistance unit in Tunisia formalized a process by which the ambassador’s office approves all State and USAID assistance projects in the country. Additionally, in both countries, the assistance coordinator participates in working groups and is involved in the design or review of all assistance projects, according to officials. USAID and State officials in these countries expressed varying opinions about the units’ usefulness for coordination. State and USAID officials in the selected countries provided the following additional examples of coordination that, according to the officials, helped avoid duplication and improved the effectiveness of democracy assistance efforts. According to State and USAID, informal coordination and information sharing among agency officials at the embassies occur during regularly scheduled meetings, such as weekly meetings of USAID staff, State’s political unit staff, or embassy senior staff, and through daily interaction. State has developed a tool kit to help embassies with strategic planning, including the development of action plans to document units’ roles. For example, agencies at the U.S. embassy in Nigeria created an action plan that identified the various units supporting assistance for elections to help prevent duplication of efforts. (Fig. 7 shows citizens participating in Nigeria’s elections.) State and USAID officials at embassies described other coordination of the agencies’ democracy assistance. For example, in Nigeria, USAID does not fund any rule-of-law projects because, according to USAID officials, they and INL officials have decided on a clear division of labor: INL manages all rule-of-law projects, including judicial strengthening, judicial reforms, and anticorruption, while USAID manages all other aspects of democracy assistance. In Ukraine, USAID and INL developed a concept paper to guide their collaboration to help the government establish the country’s High Anti- Corruption Court. The concept paper outlined the key roles of USAID and INL and designed complementary projects based on each agency’s strengths. For example, USAID was responsible for developing training programs for judges and INL was responsible for vetting potential judges. Officials told us that this concept paper helped agencies maximize the potential impact of their limited resources. Although DRL takes steps to coordinate with embassies in countries where it funds democracy assistance projects, embassy officials in all four selected countries reported having incomplete information about DRL’s projects in those countries. DRL has various practices and processes to coordinate with embassies. For example, DRL established a standard operating procedure to clarify methods for coordination between itself and State’s regional bureaus, which includes defined steps on engaging with embassies. The procedure outlines steps in DRL’s annual planning process, during which priorities and program strategies are set; in the process for submitting proposed projects and awards; and in the process for proposal review panels. DRL officials in Washington, D.C., also pointed to various methods that they use to coordinate with embassies. Such methods include distributing a description of DRL’s projects by country on an annual basis, training new Foreign Service officers in DRL’s funding mechanisms and awards process, and providing contact information for DRL staff at headquarters to embassy personnel. Additionally, DRL officials said that embassy officials have at least four opportunities to provide official input during the approximately 18-month process of designing and awarding a project. According to DRL officials, embassy personnel designated as human rights officers serve as DRL’s overseas points of contact. However, at the embassies in all four countries, human rights officers or other officials from the political units told us that they were not actively engaged in DRL’s projects and generally lacked updated information about DRL projects in their countries, including descriptions and funding amounts. Embassy officials also said that, although DRL sought their input during the process of selecting proposed democracy assistance projects, DRL did not subsequently communicate its final selection of projects. DRL officials said that sharing complete information can be difficult because of the sensitivity of some DRL projects and the need to safeguard the identities of some local partners. In addition, DRL officials said that managing projects from Washington, D.C., instead of overseas may affect their ability to collaborate with embassy officials. DRL officials commented that embassy personnel’s colocation facilitates their collaborating with one another and that the political and other State officers who may function as in-country DRL points of contact have numerous other duties, with limited capacity to focus on DRL projects. DRL officials also said that frequent turnover among State personnel makes it challenging to maintain embassy officials’ awareness of DRL’s in-country projects. In addition, they said that DRL is sometimes unaware of democracy assistance projects that embassies may be funding. Moreover, we found that existing information-sharing mechanisms, including data systems and strategies, do not consistently address embassy personnel’s information gaps. DRL and other State officials said that embassy personnel may not be able to use State’s data systems to retrieve information on projects, partly because some personnel lack sufficient training or the permissions to access project data in certain systems. Furthermore, the Office of Management and Budget has found the quality of State’s publicly reported data to be low in terms of completeness and accuracy. State’s Office of Inspector General found that, while State has standardized and centralized its foreign assistance budget planning and request processes, State’s inability to provide authoritative foreign assistance financial information is a program management challenge. In addition, the integrated country strategies for the four selected countries for fiscal years 2015 through 2018 do not mention DRL’s projects or general goals when discussing U.S. government democracy-related objectives for each country. Overseas officials’ lack of complete information about DRL’s projects could lead to potential duplication in U.S. democracy assistance and may inhibit State’s efforts to coordinate with other agencies, implementing partners, and other donors. We have previously found that it is helpful when participants in a collaborative effort have full knowledge about the relevant resources available and have the appropriate knowledge, skills, and abilities to contribute. Since 2015, Congress has made available to agencies at least $2 billion annually for democracy assistance programs abroad. State’s DRL and INL, as well as USAID, have articulated their roles in democracy assistance through strategies that include specific democracy-related goals. Although State and USAID use various mechanisms to coordinate democracy assistance at headquarters and in the field, we found that relevant embassy officials in each of the four selected countries did not have ready access to information about DRL projects. As a result, embassy officials lacked an understanding of the full scope of U.S. democracy assistance in their countries. Ensuring access to information about DRL projects could improve State’s overseas coordination, both internally and with other U.S. agencies, implementing partners, and donors, as well as State’s ability to achieve important democracy assistance goals. The Secretary of State should direct the Assistant Secretary of State for Democracy, Human Rights, and Labor to develop a mechanism to facilitate the active sharing of information about democracy assistance projects between DRL and relevant staff at embassies. We provided a draft of this report to State, USAID, and NED for their review and comment. In its written comments, reproduced in appendix VII, State agreed with our recommendation and noted steps that it plans to take to implement it. USAID also provided written comments, which are reproduced in appendix VIII, as well as technical comments that we incorporated as appropriate. NED officials reviewed our draft but did not provide any comments. We are sending copies of this report to the appropriate congressional committees and to the Secretary of State, the Administrator of USAID, the President of NED, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IX. The National Endowment for Democracy (NED) is a private, nonprofit, nongovernmental organization based in Washington, D.C., whose stated purpose is to encourage democracy throughout the world by supporting nongovernmental organizations and actors that are working for democratic goals. NED is funded through a grant from the Department of State (State) pursuant to an annual congressional appropriation and receives additional funding from State to support congressionally directed or discretionary programs. In addition to providing grants to local organizations in other countries, NED provides grants to its four affiliated organizations known as the “core institutes”: the Center for International Private Enterprise, the International Republican Institute, the National Democratic Institute, and the Solidarity Center. In fiscal years 2015 through 2018, NED allocated a total of about $541 million for democracy assistance projects in 100 countries— approximately $114 million in fiscal year 2015, $141 million in fiscal year 2016, $144 million in fiscal year 2017, and $142 million in fiscal year 2018. During this period, NED directed 55 percent of its funding for local organizations to groups in countries rated “not free” by Freedom House’s 2018 “Freedom in the World” survey. Figure 8 shows the countries where NED allocated funding for democracy assistance in fiscal years 2015 through 2018. As figure 9 shows, in fiscal years 2017 and 2018, NED directed funding to projects in six democracy assistance program areas. NED allocated the largest amount during that period—about $100 million (36 percent)—to promote good governance and allocated the next largest amount—about $72.5 million (26 percent)—to promote political competition and consensus building. NED allocated the smallest amount—about $8.5 million (3 percent)—to support the rule of law. According to NED’s 2012 strategy, the organization focuses on providing grants to grassroots activists in response to local needs and “seeks out newly-emerging groups in both democratizing and authoritarian countries around the world, helping to empower the most effective grassroots activists.” The strategy notes that NED is guided by its founding legislation, which established NED as an independent institution whose mission is to promote democracy through grants to nongovernmental organizations. These include the core institutes, whose key roles NED’s strategy also defines. NED officials said that the organization focuses on building the institutional capacity of local civil society organizations, which contributes to building democratic societies. Such capacity building can include institutional support, including funding for basic functions such as operational costs, and management assistance such as budget training, which other donors tend not to provide. NED officials commented that the organization is “demand driven” and responds to funding requests for projects proposed by nongovernmental organizations. According to NED documents, it supports approximately 1,500 organizations in 90 countries with grants averaging $50,000. NED officials noted other elements that distinguish NED’s support from that of U.S. agencies, including continuity in its staff composition; the significant linguistic ability of its staff, enabling close ties with local organizations in other countries; and the relative stability of its mission and priorities, which facilitates long-term engagement on countries’ democratic issues. In addition, NED’s nongovernmental status allows it to provide democracy assistance in difficult environments, where, according to NED officials, staff of local grantees face risks as a result of their work in challenging the government and status quo. The officials said that such risks range from detention and harassment to being killed or “disappeared.” NED’s democracy assistance projects in the countries we selected for our review—the Democratic Republic of the Congo (DRC), Nigeria, Tunisia, and Ukraine—generally aligned with the organization’s strategy of supporting democracy by providing funds for indigenous civil society organizations. (Fig. 10 shows examples of NED’s democracy assistance projects in the DRC and Ukraine.) Consistent with NED’s strategy of providing grants to grassroots activists, data for projects in the four selected countries show that NED provided grants primarily to local civil society organizations in addition to its core institutes. NED grants to civil society organizations in the selected countries averaged approximately $46,000 for year-long projects, and NED renewed support for nearly all organizations on an annual basis, reflecting the long-term support that officials said was necessary to strengthen civil society. Grantees in the DRC told us that NED worked closely with local partners to identify needs and design programs and that this helped to build the partners’ organizational capacity. Consistent with NED’s mission to support democracy in general, grantees in the selected countries worked on projects that included all democracy assistance program areas. NED primarily supported projects to promote political competition and consensus building and good governance, obligating an average of 40 percent and 36 percent of its funding for these two program areas, respectively, across the four countries (see fig. 11). NED’s country priorities are articulated in country summaries that it updates each year on the basis of each country’s political context and democratic challenges. For example, NED’s 2018 Tunisia summary included a priority of supporting civil society to promote effective, democratic governance and advocate for the transparency and accountability of public institutions. The NED project that we reviewed in Tunisia aimed to “enhance the capacity of civil society to advocate for transparency, good governance, and promote social accountability in the six southern governorates of Tunisia.” See appendixes III through VI for more information about NED’s democracy assistance projects in the DRC, Nigeria, Tunisia, and Ukraine. NED’s annual planning documents, which generally outline objectives for each country where NED provides funding, include some statements about coordination and collaboration with other donors. NED officials said that NED senior leaders typically have standing relationships with senior leaders at State’s Bureau of Democracy, Human Rights, and Labor (DRL) because NED receives funding from DRL for particular countries. NED officials also told us that the U.S. Agency for International Development (USAID) has reached out to them to strategically coordinate, although NED does not receive funds from USAID. NED officials added that coordination and collaboration on specific countries largely occur between officials at the regional and country levels. For example, officials said that NED consults with counterparts at State and USAID in the regional bureaus and DRL and shares its list of grantees with DRL. Furthermore, officials said that NED is aware of funding that its grantees receive from State or USAID, because NED obtains information from potential grantees about other funding sources during the grant proposal process. According to NED, State, and USAID officials, additional collaboration occurs between headquarters and overseas officials. NED, which does not have staff overseas, manages its grants in Washington, D.C., but collaborates with overseas counterparts. NED, State, and USAID officials told us that when NED officials conduct site visits, which occur at least annually, they often meet with State and USAID officials at embassies to share information. This report examines (1) the Department of State’s (State) and the U.S. Agency for International Development’s (USAID) allocations of funding for democracy assistance in fiscal years 2015 through 2018, (2) State’s and USAID’s roles in providing democracy assistance and the extent to which their projects in selected countries during this period were consistent with defined roles, and (3) the extent to which State and USAID coordinate in providing democracy assistance. In addition, appendix I provides information about the National Endowment for Democracy’s (NED) democracy assistance allocations, role, and coordination. To examine aspects of State’s, USAID’s, and NED’s democracy assistance roles and coordination efforts, we selected a nongeneralizable sample of four countries—the Democratic Republic of the Congo (DRC), Nigeria, Tunisia, and Ukraine—where the three entities provided democracy assistance in fiscal years 2015 through 2018. In selecting these countries as illustrative examples, we considered the following factors, among others: (1) countries to which all three entities allocated or obligated democracy assistance funding in fiscal years 2015 through 2017, the most recent period for which data were available; (2) democracy assistance allocation amounts that were in the top quartile for each entity for the same period for USAID and State, according to data from State’s Office of U.S. Foreign Assistance, and for NED; (3) democracy assistance obligation amounts that were in the top half of such obligations for the same period for State’s Bureau of Democracy, Human Rights, and Labor (DRL), according to data from USAID’s Foreign Aid Explorer; (4) democracy assistance obligations data that confirmed the presence of the Bureau of International Narcotics and Law Enforcement Affairs (INL) in those countries for the same period; (5) geographical dispersion of the countries; (6) ratings that countries received from Freedom House’s 2018 “Freedom in the World” survey; and (7) suggestions from State, USAID, and NED officials as well as others with relevant expertise. We excluded countries where we had recently reviewed U.S. democracy assistance for other reports. We traveled to the DRC in May 2019, where we met with officials from State, USAID, nongovernmental organizations that had implemented U.S.-funded democracy assistance projects, and the United Kingdom’s Department of Foreign and International Development regarding its coordination with U.S. agencies. We conducted interviews with State and USAID officials who were knowledgeable about democracy assistance, interviewing officials at the embassies in Nigeria, Tunisia, and Ukraine by phone and interviewing officials in Washington, D.C., in person. To examine allocations for democracy assistance, we analyzed State, USAID, and NED global democracy assistance data for fiscal years 2015 through 2018, including the total allocations, the allocations for specific program areas, and the countries for which funding was allocated. We used the six democracy assistance program areas included in USAID’s and State’s Updated Foreign Assistance Standardized Program Structure and Definitions—rule of law, good governance, political competition and consensus building, civil society, independent media and free flow of information, and human rights. Because NED categorizes its democracy assistance using its own program definitions, we cross-referenced NED’s democracy assistance awards with the U.S. government’s six program areas, using information that NED provided. We assessed the reliability of State’s, USAID’s, and NED’s data and determined the data to be sufficiently reliable for reporting the total amount of democracy assistance allocated by each entity as well as the program areas and countries for which the funding was allocated. We also compared funding allocations with the country’s ratings in Freedom House’s 2018 “Freedom in the World” survey to determine the amount of funding that the entities allocated to countries rated as free, partly free, or not free. To identify State’s, USAID’s, and NED’s roles in providing democracy assistance and the extent to which their projects in the selected countries were consistent with their defined roles, we reviewed documents, assessed information on democracy assistance projects, and interviewed officials. While State’s regional bureaus provide some democracy assistance, we focused on State’s democracy assistance roles and projects for DRL and INL, both of which State has identified as leading the provision of its democracy assistance. See appendixes III through VI for regional bureaus’ obligations data for the four selected countries. We reviewed State’s and USAID’s Joint Strategic Plan, FY2018-2022; functional bureau strategies for DRL and INL; the 2013 USAID Strategy on Democracy, Human Rights, and Governance; integrated country strategies and country development cooperation strategies for the four selected countries; and NED’s 2012 Strategy Document. We also reviewed other documents that described aspects of State’s and USAID’s roles, including agencies’ democracy-related reports to Congress and standard operating procedures. We assessed these documents for clarity of roles and responsibilities, based on leading collaboration practices that we have previously identified, and we reviewed agencies’ overarching goals related to democracy and governance. We reviewed information about State, USAID, and NED democracy assistance projects in the DRC, Nigeria, Tunisia, and Ukraine. We reviewed project documents, including award agreements, for selected State, USAID, and NED projects that supported a variety of democracy program areas, among other factors. We assessed State, USAID, and NED obligations data for projects that they funded in the selected countries in fiscal years 2015 through 2018. We determined that these data were sufficiently reliable for reporting the total obligations, by entity and country, for fiscal years 2015 through 2018 and for reporting types of democracy assistance. We also determined these data to be sufficiently reliable for reporting the number of active projects during this time period; the average award amount or average annualized award amount; and the average duration of projects for DRL, USAID, and NED. Because INL’s democracy assistance generally supports the host government through bilateral agreements and is not always project based, we were unable to report these project characteristics for INL. In prior work, we have recommended that State identify and address factors that affect the reliability of INL’s democracy assistance data. State reported that as of July 2019, INL was continuing efforts to improve data reliability; however, because of missing data, we determined that data for INL democracy assistance in the selected countries were unreliable for reporting project characteristics. We also determined that because of missing data, such as project end dates, the data from State’s Bureau of African Affairs were unreliable for reporting some project information for Nigeria; however, the bureau’s project data for the DRC were sufficiently reliable for reporting on democracy assistance and obligations in that country. In addition, we determined the data from the Bureaus of European and Eurasian Affairs and Near Eastern Affairs were sufficiently reliable for reporting on State’s democracy assistance obligations and projects in Ukraine and Tunisia. We interviewed officials in Washington, D.C., and in the four selected countries regarding State’s, USAID’s, and NED’s roles defined in strategies and other documents and regarding democracy assistance projects. In addition, we interviewed agency officials regarding democracy assistance program areas; implementation methods (such as managing programs from headquarters or overseas as well as types of implementing partners); and other features, including typical scale of project funding. To examine the extent to which the agencies coordinated their democracy assistance, we reviewed relevant documents, such as State’s and USAID’s standard operating procedures, to identify the agencies’ mechanisms and practices for coordinating democracy assistance. We drew on our prior work identifying key practices that can enhance and sustain collaboration at federal agencies. We interviewed officials in Washington, D.C., and in the four selected countries to describe any mechanisms that agencies use to coordinate democracy assistance. We conducted this performance audit from September 2018 to January 2020, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Democratic Republic of the Congo (DRC) has experienced more than 2 decades of violence and war, exacerbated by the failure of President Joseph Kabila to hold elections when his term ended in 2016. In this context, the U.S. government’s key policy priority was to encourage the DRC’s government to support credible and peaceful elections in December 2018, according to the Department of State (State). U.S. government democracy assistance projects aimed to build the capacity of the DRC government, political parties, civil society, armed forces, civilian law enforcement, and justice systems to support credible elections and improve governance. (Fig. 12 shows examples of U.S.- funded government assistance to support the DRC’s 2018 elections.) Other U.S. government democracy-related priorities included promoting the rule of law and fighting corruption. The National Endowment for Democracy’s (NED) 2018 country summary for the DRC noted that NED should support DRC civil society’s ability to retain its independence and to continue advocating for a peaceful and democratic transition of power. The summary states that NED’s 2018 priorities for the DRC included supporting civil society’s engagement in elections and ability to promote freedom of information before, during, and after the elections. In fiscal years 2015 through 2018, State, the U.S. Agency for International Assistance (USAID), and NED obligated over $73 million for democracy assistance in the DRC. State’s Bureau of Democracy, Human Rights, and Labor obligated $5.5 million (8 percent) of this assistance, while State’s Bureau of International Narcotics and Law Enforcement Affairs obligated $3.2 million (4 percent). State’s Bureau of African Affairs also obligated about $500,000, for one project, through the Africa Women Peace Security Initiative. USAID obligated the majority of U.S. democracy assistance—$54.7 million (74 percent). In addition, NED obligated $9.6 million (13 percent). Figure 13 shows State’s, USAID’s, and NED’s total obligations, by program area, in the DRC during this period. Table 2 shows characteristics of projects funded by State’s Bureau of African Affairs, DRL, USAID, and NED. Three of DRL’s five projects were implemented by organizations that also implemented USAID projects, and the Bureau of African Affairs’ project was implemented by an organization that also implemented USAID and DRL projects. Table 3 shows examples of democracy assistance projects funded by State, USAID, and NED in the DRC in fiscal years 2015 through 2018. While Nigeria has made important gains in democracy and institution building, those gains are fragile, according to the U.S. Department of State (State). The U.S. government’s recent priorities with regard to Nigeria have included helping to strengthen the country’s democratic governance. Challenges to democratic governance in Nigeria include widespread intercommunal violence, terrorism, poverty, and corruption. At the same time, Nigeria has a free press and a political environment that is largely committed to civilian leadership, and the 2015 elections resulted in the first peaceful transfer of power to an opposition party. In this context, the U.S. government’s goals include strengthening Nigerian democratic institutions, governance, and respect for human rights, such as by assisting Nigerians to conduct credible national elections in 2019. To achieve this goal, the U.S. government’s objectives are to (1) strengthen good governance; (2) strengthen democratic institutions, including rule of law, respect for human rights, and transparency and accountability in government; and (3) reduce corruption at all levels of government. Similarly, the National Endowment for Democracy’s (NED) 2018 country summary for Nigeria notes the success of the country’s 2015 elections while also acknowledging challenges including corruption, economic stagnation, insecurity, and the political marginalization of minority groups. NED’s 2018 priorities in Nigeria were to expand political inclusion and strengthen rule of law by supporting NED’s core institutes and local organizations. In fiscal years 2015 through 2018, State, the U.S. Agency for International Development (USAID), and NED obligated nearly $95 million for democracy assistance projects in Nigeria. State’s Bureau of International Narcotics and Law Enforcement Affairs obligated $12.5 million (13 percent), while State’s Bureau of Democracy, Human Rights, and Labor obligated $5.4 million (6 percent). State’s Bureau of African Affairs also obligated $1.8 million for six projects. According to officials, the Bureau of African Affairs funded these projects through the Africa Regional Democracy Fund and the Trans-Sahara Counterterrorism Partnership program. USAID obligated the majority of U.S. democracy assistance— $66.6 million (70 percent). In addition, NED obligated $8.2 million (9 percent). Figure 14 shows State’s, USAID’s, and NED’s total obligations for democracy assistance, by program area, in Nigeria during this period. Table 4 shows characteristics of projects funded by the Bureau of African Affairs, DRL, USAID, and NED in Nigeria during fiscal years 2015 through 2018. Table 5 shows examples of democracy assistance projects funded by State, USAID, and NED in Nigeria during fiscal years 2015 through 2018. Since its 2011 revolution, Tunisia has been on a steady path toward consolidating its democratic transition, but it still needs to establish critical institutions, advance human rights, counter corruption, and improve government transparency, according to the U.S. Department of State (State). In this context, the U.S. government’s goals include helping Tunisia consolidate and advance its democracy. To achieve this goal, the U.S. government’s objectives are to (1) assist Tunisian government institutions to become more transparent, accountable, and responsive to citizens; (2) help Tunisian citizens understand and exercise their rights and responsibilities in a democratic system; and (3) promote social cohesion through democratic consolidation. The National Endowment for Democracy’s (NED) 2018 country summary for Tunisia similarly notes the country’s democratic progress since the 2011 revolution and adds that Tunisian civil society has been developing quickly and freely and seeks to engage with elected officials as they continue to consolidate democracy. NED’s 2018 priorities in Tunisia were to (1) support civil society to promote effective, democratic governance and advocate for transparency and accountability; (2) encourage citizens to influence policymaking; (3) foster political inclusion of marginalized groups; and (4) enhance the role of independent media. In fiscal years 2015 through 2018, State, the U.S. Agency for International Development (USAID), and NED obligated over $90 million for democracy assistance projects in Tunisia. State’s Bureau of Near Eastern Affairs obligated $20.7 million (23 percent) of these funds; the Bureau of Democracy, Human Rights, and Labor obligated $9.1 million (10 percent); and the Bureau of International Narcotics and Law Enforcement Affairs obligated $3.9 million (4 percent). USAID obligated the majority of U.S. democracy assistance—$49.5 million (54 percent). In addition, NED obligated $8.7 million (9 percent). Figure 15 shows State’s, USAID’s, and NED’s total obligations for democracy assistance, by program area, in Tunisia in fiscal years 2015 through 2018. State’s Bureau of Near Eastern Affairs provided the majority of its democracy assistance through the U.S.–Middle East Partnership Initiative, which generally aims to improve governance and economic opportunity. Many of the 11 projects funded by the bureau supported objectives that were similar to those typically supported by DRL, INL, and USAID projects, including promoting human rights, supporting anticorruption institutions, and strengthening political parties. The Bureau of Near Eastern Affair’s Foreign Assistance Unit at the embassy managed these projects. Table 6 shows information on the characteristics of the projects funded by DRL, the Bureau of Near Eastern Affairs, USAID, and NED. Table 7 shows examples of democracy assistance projects funded by State, USAID, and NED in Tunisia during fiscal years 2015 through 2018. Ukraine’s various democratic challenges include overcoming the legacy of Soviet authoritarian rule, addressing mismanagement, and responding to Russian aggression, according to the Department of State (State). In this context, the U.S. government aims to support Ukraine’s democracy by helping the country combat corruption, advance justice reforms, bolster civil society, create responsive government, and encourage independent media. Overall, the U.S. government seeks to help Ukraine advance its political reforms with more transparent, responsive, and accountable governance, becoming less corrupt and more democratic. U.S. objectives to accomplish this goal include enhancing anticorruption and rule-of-law processes and improving governance processes and outcomes. The National Endowment for Democracy’s (NED) 2018 country summary for Ukraine noted similar challenges to the country’s democracy— Russian aggression, corruption, and a government that is not responsive to its citizens. NED’s 2018 priorities in Ukraine included strengthening the capacity of civil society groups, promoting reconciliation, and fostering the development of new media. In fiscal years 2015 through 2018, State, the U.S. Agency for International Development (USAID), and NED obligated more than $170 million for democracy assistance projects in Ukraine. State’s Bureau of European and Eurasian Affairs obligated $16.7 million (10 percent) of this assistance; the Bureau of Democracy, Human Rights, and Labor obligated $9.6 million (6 percent); and the Bureau of International Narcotics and Law Enforcement Affairs obligated $5.0 million (3 percent). USAID obligated the majority of U.S. democracy assistance—$126 million (73 percent). In addition, NED obligated $16.3 million (9 percent). Figure 16 shows State’s, USAID’s, and NED’s total obligations for democracy assistance, by program area, in Ukraine during fiscal years 2015 through 2018. State’s public affairs unit at the embassy in Ukraine obligated funding for, and managed, all but one of the 613 democracy assistance projects supported by funds from the Bureau of European and Eurasian Affairs. State’s public affairs unit awarded the projects through funding mechanisms that were intended to support civil society and independent media and were specifically designed for locally based implementing organizations. Table 8 shows characteristics of democracy assistance projects funded by DRL, State’s Bureau of European and Eurasian Affairs, USAID, and NED. Table 9 shows examples of democracy assistance projects funded by State, USAID, and NED in Ukraine during fiscal years 2015 through 2018. In addition to the contact named above, Mona Sehgal (Assistant Director), Farhanaz Kermalli (Analyst-in-Charge), Daniela Rudstein, Tom Zingale, Neil Doherty, Reid Lowe, and Alex Welsh made key contributions to this report. Justin Fisher and Sarah Veale provided technical assistance.", "summary": "Congress made at least $2 billion available to agencies annually for democracy assistance abroad in fiscal years 2015 through 2018. State and USAID are the primary U.S. agencies funding democracy assistance. This assistance supports activities related to enhancing rule of law, good governance, political competition and consensus building, civil society, independent media, and human rights. Congress included a provision in the Joint Explanatory Statement accompanying the fiscal year 2015 Continuing Appropriations Act for GAO to review agencies' roles and responsibilities in promoting democracy abroad. This report examines (1) State's and USAID's democracy assistance allocations, (2) State's and USAID's roles in providing democracy assistance and the extent to which their projects in selected countries are consistent with their defined roles, and (3) how State and USAID coordinate on democracy assistance. GAO reviewed State and USAID data and documents for fiscal years 2015 through 2018 and interviewed officials in Washington, D.C., and in the DRC, Nigeria, Tunisia, and Ukraine. GAO selected these countries because they received relatively high amounts of democracy assistance funding from State and USAID, among other factors. The Department of State (State) and U.S. Agency for International Development (USAID) allocated more than $8.8 billion for democracy assistance in fiscal years 2015 through 2018. a According to agency officials, language in the 2015 appropriations act permitted State and USAID to allocate less than the full amount directed to democracy programs by the act. State and USAID have defined roles for democracy assistance and have obligated funding for projects in selected countries accordingly. State has identified its Bureau of Democracy, Human Rights, and Labor (DRL) as the U.S. lead for promoting democracy and protecting human rights abroad and has identified its Bureau of International Narcotics and Law Enforcement Affairs (INL) as the lead for promoting the rule of law. In fiscal years 2015 through 2018, DRL's and INL's obligated funding for democracy assistance in the countries GAO reviewed—the Democratic Republic of the Congo (DRC), Nigeria, Tunisia, and Ukraine—generally reflected their defined roles. For example, 24 to 77 percent of DRL's obligated funding in these countries supported human rights, and at least 90 percent of INL's obligated funding for democracy assistance in the countries supported the rule of law. USAID's democracy assistance strategy states that USAID has the leading role in U.S. development assistance. USAID's obligations for democracy assistance in the four countries supported multiyear, multimillion-dollar projects, consistent with what USAID officials told GAO was needed for long-term development. State and USAID coordinate on democracy assistance in various ways, but embassy officials reported gaps in information about DRL assistance. Examples of coordination mechanisms include budget allocation discussions at headquarters and working groups at embassies to help avoid project duplication. However, State officials in all four selected countries said they generally lacked information about DRL democracy assistance projects, including project descriptions and funding amounts. State's existing information-sharing mechanisms, including data systems and strategies, do not consistently address these gaps. Overseas officials' lack of complete information about DRL's projects may inhibit State's efforts to coordinate with other agencies, implementing partners, and other donors. GAO recommends that the Secretary of State direct DRL to develop a mechanism for the sharing of democracy assistance project information between DRL and relevant embassy staff. State concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Like all DOD working capital funds, the DWWCF received its initial working capital through an appropriation or a transfer of amounts from existing appropriations to finance the initial cost of products or services. Ongoing DWWCF operations and maintenance of a minimum cash balance are funded through reimbursements to the DWWCF comprised of customer payments made to DFAS, DISA, and DLA. The flow of funding and provision of goods and services between the DWWCF agencies, their customers, and the DWWCF is shown in figure 1. DFAS, DISA, and DLA use funds from the DWWCF to provide goods and services across six activity groups, as shown in table 1. Activities of the DWWCF agencies operate on a break-even basis. As part of the annual budget submission for each upcoming fiscal year, rates are required to be established at levels estimated to recover the budgeted costs of goods and services, including all general and administrative overhead costs, prior period gains and losses, and applicable surcharges. Predetermined or “stabilized” rates developed during the budget process are applied to orders received from DWWCF customers during the fiscal year. The Office of the Under Secretary of Defense (Comptroller) is responsible for reviewing, coordinating, and publishing reimbursable rates for DOD. Where feasible, the Office of the Under Secretary of Defense (Comptroller) publishes applicable reimbursable rates prior to the beginning of each new fiscal year. The military departments are the primary consumers of goods and services provided by the DWWCF agencies. In fiscal year 2018, the reported total dollar value of goods and services ordered from DFAS, DISA, and DLA was approximately $49.4 billion, with the military departments collectively ordering about $36.3 billion (or 74 percent of the total dollar value of orders in fiscal year 2018) in goods and services. Most of the goods and services they purchased fell under two activity groups—supply chain management and energy management. Specifically, approximately $29.4 billion (60 percent of the total dollar value of orders in fiscal year 2018) were for supply chain management and approximately $10.8 billion (22 percent of the total dollar value of orders in fiscal year 2018) were for energy management, as shown in figure 2. Prior to the beginning of the fiscal year, Annual Operating Budgets are issued for each DWWCF activity group managed by DFAS, DISA, and DLA. Budget formulation for a particular fiscal year begins approximately 18 months prior to the beginning of that fiscal year. Each activity’s Annual Operating Budget identifies total budgetary resources authorized for use during the fiscal year. In addition, each DWWCF agency is responsible for maintaining positive cash balances sufficient to allow their operations to continue uninterrupted. As of the end of fiscal year 2017, the DWWCF as a whole held a reported cash balance of about $3.0 billion, which decreased to $2.6 billion by the end of fiscal year 2018. According to DWWCF agency officials, it can be challenging to maintain an appropriate cash balance within the DWWCF because setting accurate rates that reflect their agencies’ actual costs is difficult. If rates are set too low during the budget formulation process, higher-than-expected costs or lower-than-expected sales of goods or services during the fiscal year may result in losses for the DWWCF, which in turn may lead to insufficient balances to meet the minimum current or future financing operational requirements. Similarly, if rates are set too high, lower-than-expected costs or higher-than-expected customer sales during the fiscal year may generate excessive gains for the DWWCF. Excessive gains may be transferred out of the DWWCF into other appropriation accounts or rescinded by Congress. In 2017, we described the DWWCF’s reported monthly cash balances and the extent to which they fell within targeted upper and lower cash requirements. We found that the DWWCF’s reported monthly cash balances were outside the targeted upper and lower cash requirements for 87 of 120 months during that time frame. This was caused by DLA charging its customers more or less than it cost to purchase, refine, transport, and store fuel and by DOD transferring funds into or out of the DWWCF to pay for combat fuel losses or other higher priorities, among other things. As we noted in our report, DOD revised its cash management policy to require a positive cash balance throughout the year and an adequate ending balance to support continuing operations into the subsequent year. According to this revised policy, in setting the cash requirement goals, DOD working capital funds are to consider four elements: (1) the rate of disbursement, which is the average amount disbursed between collection cycles; (2) the range of operation, or the difference between the highest and lowest expected cash levels based on budget assumptions and past experience; (3) risk mitigation, which requires some amount of cash beyond the range of operations to mitigate the inherent risk of unplanned and uncontrollable events; and (4) reserves, which are cash amounts held for known future requirements. DOD officials said they are in the process of adding additional guidance to the DOD Financial Management Regulation about when DOD managers should use available tools to help ensure that monthly cash balances are within the targeted upper and lower cash requirements, as we recommended in our 2017 report. For this report, we updated the 2017 analysis to include the DWWCF’s reported monthly cash balances and targeted upper and lower cash requirements for fiscal years 2017 and 2018, as shown in figure 3. For fiscal year 2017, the monthly cash balances were above and below the targeted upper and lower cash requirements one time each, and for fiscal year 2018 the targeted upper cash requirement was raised and the monthly cash balances were all within the revised targeted upper and lower cash requirements. In our prior work, we identified four key operating principles to guide the management of working capital funds. These key operating principles call for (1) working capital fund self-sufficiency, which includes establishing transparent pricing; (2) clearly delineated roles and responsibilities; (3) performance measurement; and (4) built-in flexibility to obtain customer input and meet customer needs. As we describe later in this report, each of these key operating principles has three underlying components describing specific actions agencies should take to adhere to the principle. For further information about each key principle and its components, see appendix I. We found that DFAS, DISA, and DLA have applied two of the three components of the key operating principle for working capital fund self- sufficiency by setting rates that are designed to cover actual costs and establishing a management review for rate setting. However, despite taking steps intended to allocate costs equitably among their customers, DFAS, DISA, and DLA have not fully applied the third component of the key operating principle by establishing pricing methodologies that are transparent to their customers. DFAS, DISA, and DLA each develop budget proposals annually that are designed to recover their projected costs, while also accounting for any gain or loss from previous years. The three DWWCF agencies generally set rates that are intended to mitigate prior year gains or recover all prior year losses in the current fiscal year of execution, although they can spread the return actions over several fiscal years to minimize the impact on customers from rate fluctuations. The rate-setting processes used by DFAS, DISA, and DLA include management reviews. Each agency’s management reviews and approves the budget proposals for its DWWCF activities during the budget formulation process. The agencies then send the budget proposals to the Office of the Under Secretary of Defense (Comptroller) for further review and approval, and the Office of the Under Secretary of Defense (Comptroller) issues a memo finalizing the rates to be charged by DFAS, DISA, and DLA during the fiscal year. DFAS, DISA, and DLA each use multiple approaches to set rates on an annual basis and adjust these rates, as appropriate, during DOD’s programming and budget development process. All three agencies include direct and indirect costs in their rates, and these costs vary due to differences in the agencies’ missions, including the goods and services they provide. In general, the DWWCF agencies describe direct costs as those costs that can be directly attributed to an output and a customer. For example, DFAS officials told us that DFAS includes the cost of the labor that supports civilian pay services for a customer as a direct cost. DISA officials said that DISA includes the cost of servers as a direct cost. DLA officials indicated that materiel costs, such as the cost to acquire fuel or a spare part, are considered direct costs. Alternately, the three agencies describe indirect costs as costs that cannot be attributed to one specific output and customer. For example, costs for information technology systems that support multiple customers, supervisory staff that support more than one customer, and general and administrative (overhead) costs such as a DWWCF agency’s general counsel services or physical facility maintenance are all indirect costs. DFAS, DISA, and DLA set rates during DOD’s annual programming and budget development process. The three DWWCF agencies begin the process of setting rates approximately 18 months prior to the fiscal year in which the rates will be applied. Setting rates in advance helps ensure that adequate resources are requested in the customers’ fund accounts to pay the established rates and prices. The Office of the Under Secretary of Defense (Comptroller) reviews and approves finalized rates for a particular fiscal year in a rate memo circulated during the prior fiscal year. DFAS, DISA, and DLA use a combination of the following three approaches when setting the rates. Table 2 shows instances in which each of the three DWWCF agencies use the following rate-setting approaches. Per Unit: Determines a specific dollar rate per unit that, when multiplied by the projected workload, will produce revenue sufficient to recover the full costs, including direct and indirect costs, of providing the good or service. Portion of Total Costs: Charges a portion of the agency’s total costs (both direct and indirect costs) of providing a service based either on the proportion of total workload projected for a specific customer or a uniform percentage across all customers. Percentage Markup on Direct Costs: Adds a fee based on a percentage of the direct costs of a service as a proxy for expected indirect costs. DFAS, DISA, and DLA officials described their approaches to allocating costs when setting rates. DFAS allocates costs to each of the services it provides and to each customer using those services through 29 predetermined business rules. DISA groups its services by the costs associated with providing them and allocates these costs to the services in each group based on factors such as the cost of equipment used to provide each service. Similarly, DLA uses various methods to allocate indirect costs to some or all of DLA’s goods or services based on factors such as the number of employees supporting the provision of a given good or service and the total sales of that good or service. In each case, these costs are then included in the rates DFAS, DISA, and DLA charge customers for each good or service. See appendixes II through IV for more information on each agency’s rate-setting approach. We found that DFAS, DISA, and DLA have taken steps intended to establish an equitable pricing methodology. However, customers from the military departments told us, and our review of related documentation provided at rate briefings and cost summits found, that the information they receive regarding the pricing of goods and services is not transparent. Officials from all three DWWCF agencies described efforts to more equitably allocate costs associated with a given good or service to the customers who use that good or service, as described below. DFAS, for fiscal year 2019, changed its method for allocating the costs of its facilities to its customers in an effort to more equitably allocate these costs. Previously, the costs for each DFAS facility were charged directly to the customers whose work was performed in that facility. Since the costs of facilities differ and customers do not choose the location that provides their service, DFAS changed this methodology so that customers now pay a uniform percentage of their direct costs to cover the total cost of DFAS facilities. DISA, for fiscal year 2017, changed the pricing structure for Defense Information System Network Infrastructure Services in response to recommendations from two DOD internal reviews. The structure changed from one designed to encourage adoption of the network across DOD to a consumption-based model that aligns customer billing with consumption so that customers have greater control over their costs. According to DISA officials, this change has enhanced collaboration between DISA and its customers, providing customers more frequent inventories of the services they require so that the customers can determine that the bills for those services reflect their requirements. DLA is implementing two changes to the pricing methodology it uses for distribution services, part of its Supply Chain Management activity group. The first change, which DLA refers to as distribution price equitability, was implemented during fiscal year 2017. This pricing methodology allocates overhead costs to reimbursable distribution services (special services not included in DLA’s standard rate structure). Previously, only rate-driven distribution services were charged for overhead. DLA proposed the second change, market basket pricing, for implementation in fiscal year 2020. Market basket pricing changes this pricing from being based solely on the weight of the items being distributed to a method that considers the level of effort required by DLA to distribute the items. For example, bulky, fragile, and hazardous items will be charged higher rates than small, easy-to-ship items. While we found that DFAS, DISA, and DLA have taken steps intended to establish an equitable pricing methodology, military department officials from the offices we contacted said that they lack visibility into the factors that determine their costs at one or more of the three defense agencies. Specifically, they said they had a limited understanding of the types of indirect costs that are included in the rates they are charged and how those costs are allocated, the specific changes that have been made to the methods used to set rates, or how changes in the customer’s use of the services, which would also change an agency’s workload, would affect overall costs. DFAS, DISA, and DLA have produced documentation for their customers to explain their rates and have developed ways to communicate with their customers—for instance, through the use of customer liaisons. However, officials from the military departments told us this documentation does not contain the level of detail they need to fully understand the rates. For example, DFAS. Navy and Army officials we spoke with regarding DFAS said that their departments lack visibility into how DFAS’s rates and bills are calculated because DFAS informational briefings do not describe the types of costs included in rates and how those costs are calculated and allocated to customers. As a result, officials said they are confused by why declines in their use of DFAS’s services have not resulted in reduced costs. These officials said that this information would make it easier for them to determine how to manage their costs and verify that costs are equitably allocated and reflect usage. DISA. Air Force officials we interviewed regarding DISA told us that DISA does not provide sufficient pricing transparency because, although DISA has provided some documentation of its rates, this documentation does not explain the methodology used to calculate the rates and the costs included in those calculations. Although Army officials who discussed DISA said that DISA rate briefings provide the level of information necessary for customers, the Air Force officials said that this lack of information on how DISA calculates rates makes it difficult for the Air Force to determine how it can manage its costs with DISA or whether the rates it pays reflect the costs of the services it uses. DLA. Navy and Air Force officials we interviewed regarding DLA told us that DLA does not provide sufficient pricing transparency despite the rate briefings DLA conducts for its customers. Although the Army officials who discussed DLA said that the rate briefings provide sufficient information for customers, the Navy officials told us that the lack of detailed information on the costs included in DLA’s rates makes it difficult for the Navy to determine how to lower its costs. They also said this lack of information prevents them from determining whether the rates they pay actually reflect the costs of the services they use, as intended. Similarly, the Air Force officials told us that DLA’s communication regarding its market basket pricing initiative, discussed during the DLA briefings, was confusing and did not include all the information they needed to prepare their budget, such as when the change would be implemented and how the initiative would affect the Air Force’s costs. Officials noted that, despite initially being told by DLA that the Air Force would experience a reduction in its distribution costs as a result of this initiative, they subsequently learned through a Resource Management Decision that the Air Force’s costs would increase instead. DFAS, DISA, and DLA officials told us they make efforts to communicate with their customers and to improve the transparency of their rates. For example, DFAS officials noted that they have one-on-one discussions with each of their customers during the customer rate briefings. DISA officials said that they respond to customer questions regarding rates and share information on the costs included in those rates. DLA officials said they discuss rates at a variety of customer forums and share documentation of changes to their rate-setting methodologies, such as market basket pricing, with customers. Officials from the military departments acknowledged these efforts by the DWWCF agencies to share information. However, as described in the examples above, officials told us that one or more of the agencies have not provided them with the information needed to fully understand their costs, to have assurance that costs are being allocated fairly, or to identify actions they could take to affect their overall bills, in some cases, despite requests for more detailed cost information. In addition, DFAS, DISA, and DLA provided us copies of documents that they present at rate briefings and cost summits to share information about their pricing methodologies with their customers. In our review of those documents, we found that they contained high-level information, such as the rates themselves and the estimated workloads, and did not contain detailed information about the types of costs included in the rates and how those costs are calculated. For example, although DLA provides its cost recovery rate for the materiel supply chains in its rate briefing documentation, the documentation does not provide information on the specific costs that go into that rate. As a result, based on these documents, we also were not able to fully understand the agencies’ costs and how those costs are allocated among their customers. By providing more complete and transparent information on methodologies used to calculate rates, the costs used in those calculations, and how changes in workload affect a customer’s rates, DFAS, DISA, and DLA could improve their communication with their customers and allow their customers to better understand and make decisions to help them manage the costs of the goods and services that they obtain. Such information would also better inform customers of any changes to the assumptions underlying rates and the impact those changes might have on their future costs. We found that DFAS, DISA, and DLA have applied all of the components of the three remaining key operating principles for effective management of working capital funds. These principles relate to delineating roles and responsibilities, measuring performance, and assessing resource requirements and customer needs. By implementing these principles, the DWWCF agencies are better positioned to: Promote a clear understanding of who will be held accountable for specific tasks or duties, reduce the risk of mismanaged funds and tasks or functions “falling through the cracks,” and educate customers about whom to contact if they have questions. Measure their operational performance, assess their performance against strategic goals, and identify opportunities to improve performance. Enable customers to provide input about working capital fund services or voice concerns about their needs, enable agencies to prioritize customer demand, and enable agencies to use resources most effectively. We found that all three DWWCF agencies have fully applied the three components of the principle for clearly delineating roles and responsibilities in that they define key areas of authority and responsibility, segregate duties to reduce fraud, and have a management review and approval process. Define key areas of authority and responsibility. DFAS, DISA, and DLA define key areas of authority and responsibility and provide customers with clear information on who to contact if they encounter issues or have questions. DFAS defines the responsibilities of key offices, such as those responsible for tracking revenue, in its Doing Business with DFAS catalog of services. This document lists points of contact, specific to each customer, who can provide support and address customers’ questions. DFAS also maintains service level and audit agreements with its customers, called mission work agreements, to document the specific level of effort and service it will provide. DISA’s instructions define the roles and responsibilities for key officials and offices involved in managing the agency’s DWWCF activities. DISA also provides contact information for its customer account representatives in its DWWCF Rate Book and on its website. DLA’s customer assistance handbook explains the roles of different offices within DLA and contains contact information for each of DLA’s activity groups and for customer-specific representatives. DLA also defines roles and responsibilities of interagency groups in the performance-based agreements it signs with the military departments and services. For example, an agreement between the Department of the Army and DLA defines roles and responsibilities for the Partnership Agreement Council, the organization that addresses and prioritizes issues related to improving logistics coordination between DLA and the Army. Segregate duties to reduce error or fraud. DFAS, DISA, and DLA segregate duties across their organizations and document this segregation. DFAS documents the segregation of responsibilities for tracking and recording transactions for each of its service offerings in its Doing Business with DFAS catalog of services. For example, DFAS’s Retired and Annuitant Pay section tracks the number of individuals serviced under those pay systems, and DFAS’s Central Revenue Office records these transactions in DFAS’s billing system. DISA describes its processes for segregating duties in the documentation of its working capital fund disbursements and collections processes. For example, when DISA charges a customer agency, an accounts receivable technician records the billing information and a certifying officer verifies and certifies the transaction. DLA documents its segregation of key roles and responsibilities for authorizing, processing, and reviewing transactions according to DOD and DLA guidance. For example, the DOD manual that outlines sales accountability and documentation processes for energy commodities assigns responsibility to DLA Energy for ensuring that DLA customers meet the criteria or have received waivers to purchase fuel through DLA, while DLA Transaction Services provides activity codes to authorized customers to manage their transactions. Additionally, individual fuel handlers at DLA Energy stock points are required to record customer data for sales and credits on a source document. Establish a management review and approval process. DFAS, DISA, and DLA have established management review and approval processes to promote the appropriate tracking and use of funds. DFAS documents its processes for tracking and reviewing transactions in its Doing Business with DFAS document. DISA describes the review of transactions in its documentation of its funds disbursements and collections processes. Each of DLA’s activity groups tracks transactions and funding using DLA’s accounting system of record—the Enterprise Business System. However, each group uses its own unique order validation process that is documented for each DLA activity group. We found that all three DWWCF agencies are applying the three components of the key operating principle for measuring performance in that they have established performance measures and goals, aligned performance measures with strategic goals, and established a management review of DWWCF performance. Establish performance measures and goals. DFAS, DISA, and DLA have each established performance measures and goals. DFAS uses financial and mission-focused performance measures, called business models, which include metrics for service timeliness and accuracy, among others. DISA has operational performance metrics, such as service downtime, and collects customer feedback on service provision through its Mission Partner Engagement Office. DLA establishes performance measures and corresponding thresholds in the performance- based agreements it signs with its customers from the military departments and services. These performance measures include materiel availability and backorders, among other measures. Align performance measures with strategic goals. DFAS, DISA, and DLA have performance measures that are aligned with their strategic goals. Each DWWCF agency is responsible for maintaining positive cash balances sufficient to allow their operations to continue uninterrupted. To achieve this, all three agencies monitor their monthly cash balances and whether each of its activity groups is experiencing gains or losses. DFAS, DISA, and DLA also have aligned operational performance measures with their strategic goals as illustrated by the following examples. DFAS’s Fiscal Year 2017-2021 Strategic Plan identifies achieving cost, schedule, and performance targets that support delivery of best value services. DFAS monitors the timeliness and accuracy of its services reflecting this strategic outcome in its performance measurement. For example, DFAS measures the percentage of commercial payments it processes accurately and the percentage of military pay problem cases that it resolves in a timely manner. DISA’s Strategic Plan 2019-2022 states that optimizing enterprise services and capabilities to minimize costs while delivering high availability, among other benefits, is a strategic objective. To that end, DISA monitors data center and equipment availability through performance measures such as the average number of minutes of facility downtime per fiscal year. DLA’s Strategic Plan 2018-2026 identifies strengthening readiness and lethality as its highest priority line of effort. DLA monitors how its own performance affects readiness of critical weapon systems using its Service Readiness Dashboard, which includes a measure for the number of weapon systems that are non-mission capable due to DLA supply items being unavailable. Defense-Wide Working Capital Fund Midyear Rate Changes Agency officials said that rates are generally fixed for the entire fiscal year, but the Office of the Under Secretary of Defense (Comptroller) can approve midyear rate changes if required. For example, we previously reported that the Defense Logistics Agency (DLA) collected about $3.7 billion more from the sale of fuel than it cost in fiscal year 2015 because of lower fuel prices. Conversely, during fiscal year 2018, DLA’s cost of procuring fuel increased significantly due to increases in the price of the fuel procured from the market. As a result, in April 2018, DOD increased the rate from $90.30 per barrel to $115.92 per barrel to cover its costs. Establish management review of working capital fund performance. DFAS, DISA, and DLA regularly monitor and have management reviews of agency performance against these financial and mission-related performance measures. Officials from each agency said they review the financial performance of the agencies’ activities throughout the year the programs and budgets will be executed to identify how differences between budgeted rates and actual costs affect the fund’s gains, losses, and cash balances. This allows them to coordinate with the Office of the Under Secretary of Defense (Comptroller) to propose price changes when needed, although officials said that a midyear rate change is rare (see sidebar). The agencies also regularly review their non-financial performance based on the previously described measures to identify areas for improvement. We found that all three DWWCF agencies are applying the three components of the key operating principle of building in flexibility to obtain customer input and meet customer needs by communicating with customers regularly and in a timely manner, developing processes to assess resource needs, and establishing processes to prioritize requests for service. Communicate with customers regularly and in a timely manner. DFAS, DISA, and DLA each routinely communicate with customers through annual rate briefings, customer forums, surveys, and other meetings. These meetings enable these agencies to provide high-level rate information to their customers and discuss the goods and services that their customers will need in the coming budget year. For example, DFAS communicates with the military services’ budget offices through an annual briefing at a meeting hosted by the Office of the Under Secretary of Defense (Comptroller) and surveys finance officers and end-user customers on their satisfaction with military pay services. Similarly, DISA holds routine meetings at the working group and senior official levels to discuss service offerings, among other things. In addition to its biannual cost summits where DLA discusses its pricing strategies with representatives from the military services, the Office of the Under Secretary of Defense (Comptroller), and the Office of the Under Secretary of Defense for Acquisition and Sustainment, DLA also holds an annual demand planning summit with the military services to discuss their projected requirements for the upcoming budget year. Develop process to assess resources needed to meet changes in customer demand. DFAS, DISA, and DLA each take steps to communicate with customers regarding future demand and requirements. All three agencies have customer-specific representatives that obtain information on future requirements and facilitate communication between the agencies and their customers. DFAS uses client executive liaisons to resolve issues and collect information about customer needs for its goods and services. DISA uses its Mission Partner Engagement Office to address customer concerns and conduct surveys about customer needs. DLA has national account managers that represent each military service and facilitate DLA’s engagement with the services regarding requirements and customer service representatives with select customers to meet their specific needs for DLA’s goods and services. Establish process to prioritize requests for services. DFAS, DISA, and DLA each have processes to adjust resources in response to the needs of their customers. This primarily occurs during the budget formulation process. DFAS officials told us that labor accounts for about 75 percent of the agency’s costs, and management can decide to adjust its workforce resources depending on customer needs, often by shifting personnel and workload among customers, temporarily hiring additional staff, or reducing staffing levels through attrition. DISA’s Strategic Resourcing Council is responsible for addressing issues such as resourcing strategies for existing and emerging programs. DLA uses its Enterprise Operations Planning Council, a group of DLA executives responsible for actively balancing customer needs and supply chain constraints, to ensure that resources are aligned with customer requirements during the budget formulation process. The agencies whose operations are financed through the Defense-Wide Working Capital Fund have applied all but one of the components of the key operating principles for effective management of working capital funds—establishing a transparent and equitable pricing methodology, a component of the principle of ensuring self-sufficiency by recovering the agency’s actual costs. Transparent pricing helps ensure that customers understand their costs and can make choices to manage these costs. Officials from the military departments—the largest customers of DFAS, DISA, and DLA—said they lack visibility into the types of costs included in their rates and some do not understand how changes to rate-setting methodologies or defense agency workload can affect their overall costs. By providing this information to customers, DFAS, DISA, and DLA would better equip them to reduce their costs and improve efficiency. Further, DOD would have greater assurance that the DWWCF was operating as intended. We are making the following three recommendations to DOD: The Secretary of Defense should ensure that the Director of the Defense Finance and Accounting Service provides customers with more complete information on the agency’s rate-setting methodologies in rate documentation, briefings, and other forums where rates are discussed, including the costs included in rates, how those costs are calculated, and how changes in DFAS’s workload affect customers’ overall costs. (Recommendation 1) The Secretary of Defense should ensure that the Director of the Defense Information Systems Agency provides customers with more complete information on the agency’s rate-setting methodologies in rate documentation, briefings, and other forums where rates are discussed, including the costs included in rates, how those costs are calculated, and how changes in DISA’s workload affect customers’ overall costs. (Recommendation 2) The Secretary of Defense should ensure that the Director of the Defense Logistics Agency provides customers with more complete information on the agency’s rate-setting methodologies in rate documentation, briefings, and other forums where rates are discussed, including the costs included in its rates, how it calculates those costs, and how and when proposed changes to its rate-setting methodologies will affect customers’ overall costs. (Recommendation 3) We provided a draft of this report to DOD for review and comment. In an email accompanying its written comments, DOD concurred with our recommendations. In the department’s written comments, DFAS, DISA, and DLA stated that they intend to take steps to provide their clients with additional information on rates. These steps include reaching out to customers to better understand their information needs and providing additional information on potential pricing methodology changes. DOD’s comments are reprinted in appendix V. DOD also provided technical comments during this review, which we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional addressees and the Secretary of Defense. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Elizabeth Field at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Examples of evidence supporting principle the agency’s actual costs Transparent and equitable pricing methodologies allow agencies to ensure that rates charged recover agencies’ actual costs and reflect customers’ service usage. If customers understand how rates are determined or changed including the assumptions used, customers can better anticipate potential changes to those assumptions, identify their effect on costs, and incorporate that information into budget plans. A management review process can help to ensure the methodology is applied consistently over time and provides a forum to inform customers of decisions and discuss as needed. Published price sheets for services are readily available. Documentation of pricing formulas supports equitable distribution of costs. Pricing methodology and accompanying process ensures that, in aggregate, charges recover the actual costs of operations. Management review process allows fund managers to receive and incorporate feedback from customers. Discussions with customers confirm an understanding of the charges and that they are viewed as transparent and equitable. Written roles and responsibilities specify how key duties and responsibilities are divided across multiple individuals/offices and are subject to a process of checks and balances. This should include separating responsibilities for authorizing transactions, processing and recording them, and reviewing the transactions. Written description of all WCF roles and responsibilities in an accessible format such as a fund manual. Discussions with providers and clients confirm a clear understanding. A routine review process exists to ensure proper execution of transactions and events. Performance goals and measures are important management tools applicable to all operations of an agency, including the program, project, or activity level. Performance measures and goals could include targets that assess fund managers’ responsiveness to customer inquiries, the consistency in the application of the funds’ rate-setting methodology, the reliability of cost information, and the billing error rates. Performance measures that are aligned with strategic goals can be used to evaluate whether, and if so how, WCF activities are contributing to the achievement of agency goals. A management review process comparing expected to actual performance allows agencies to review progress towards goals and potentially identify ways to improve performance. Performance indicators and metrics for WCF management (not just for the services provided) are documented. Indicators or metrics to measure outputs and outcomes are aligned with strategic goals and WCF priorities. WCF managers regularly compare actual performance with planned or expected results and make improvements as appropriate. In addition, performance results are periodically benchmarked against standards or “best in class” in a specific activity. input and meet customer needs. Opportunities for customers to provide input about WCF services, or voice concerns about needs, in a timely manner enable agencies to regularly assess whether customer needs are being met or have changed. This also enables agencies to prioritize customer demands and use resources most effectively, enabling them to adjust WCF capacity up or down as business rises or falls. Established forum, routine meetings, and/or surveys solicit information on customer needs and satisfaction with WCF performance. Established communication channels regularly and actively seek information on changes in customer demand and assess the resources needed to accommodate those changes. Established management review process that allows for trade-off decisions to prioritize and shift limited resources needed to accommodate changes in demand across the organization. DFAS reported receiving total Defense-Wide Working Capital Fund orders for services valued at approximately $1.4 billion in fiscal year 2018. DFAS employs around 12,000 civilian personnel and provides services to DOD and other federal entities through a single activity group—Finance and Accounting Services. Approach to Allocating Costs: The Defense Finance and Accounting Service (DFAS) establishes rates for each of the services it provides. DFAS first links direct costs to each service and to each customer benefitting from that service. Then, DFAS applies 29 predetermined business rules to allocate indirect costs, which include mission-related indirect costs and general and administrative costs. These business rules identify costs associated with specific combinations of mission-related indirect costs necessary to provide a service and then apply a “fair-share” percentage of general and administrative indirect costs, which allows DFAS to determine the rates it needs to charge to recover all costs. General and administrative costs associated with supporting the entire DFAS organization are allocated at a uniform percentage within DFAS’s rates for all systems, services, and customers based on total direct costs. Services Provided: DFAS provides centralized finance, accounting, human resources, and financial systems management services. DFAS categorizes its services into three types: rate-based services (which include military and civilian pay services and accounting services), direct systems reimbursements (i.e., legacy accounting systems), and support- to-others (i.e., reimbursable services that are outside of DFAS’s core mission or reflect emerging mission workload). Indirect Costs: DFAS differentiates between two types of indirect costs: (1) indirect costs that are necessary to support DFAS’s direct mission but are not direct costs because they support multiple types of work or customers (e.g., information technology network infrastructure, senior operations management, and facilities costs) and (2) general and administrative costs that support DFAS as a whole and are not linked to specific services (e.g., costs for DFAS’s internal review office and other headquarters-related costs). rate for each service that includes direct and indirect costs as allocated by its predetermined business rules. For civilian pay services, the number of units sold is based on the number of active civilian pay accounts in a given month (e.g., the number of civilian leave and earnings statements generated). For accounting services, the number of units sold is based on the number of labor hours DFAS employees recorded supporting a given task and customer. 2. Portion of Total Costs: DFAS charges a portion of the agency’s total legacy systems costs (direct costs and both mission-related and general and administrative indirect costs) of providing a service based on the proportion of total workload projected for a specific customer. DFAS uses this approach for its direct systems reimbursement services, as described below. Direct Systems Reimbursement. DFAS charges customers a percentage of the total costs—including direct and both types of indirect costs—of each legacy accounting system based on each customer’s portion of total system usage. 3. Percentage Markup on Direct Costs: DFAS adds a percentage markup to its direct costs in support of non-core or emerging mission workload to recover general and administrative indirect costs of the associated support. DFAS uses this approach for its support-to-others services, as described below. Support-to-Others. DFAS charges customers the actual direct cost of providing a support-to-others service plus the general and administrative percentage markup. DISA reported receiving total Defense-Wide Working Capital Fund (DWWCF) orders for services valued at approximately $7.5 billion in fiscal year 2018. DISA employs around 8,700 military and civilian personnel and provides its services through two activity groups: Computing Services and Telecommunications Services and Enterprise Acquisition Services. Services Provided: Computing Services operates the DISA Data Centers, which provide mainframe and server processing operations, data storage, and other information technology services and support across the Department of Defense (DOD). Telecommunications Services provides secure telecommunications services, including the Defense Information Systems Network. Enterprise Acquisitions Services provides contracting services for information technology and telecommunications acquisitions from the commercial sector and contracting support to the Defense Information Systems Network programs and other customers through DISA’s Defense Information Technology Contracting Organization. Approach to Allocating Costs: The Defense Information Systems Agency (DISA) groups its services by the costs associated with providing them. These costs are specific to the service being provided and are influenced by factors such as the cost of equipment used to provide the service. Computing Services has a large collection of billing rates, tailored to the services provided to a customer, such as mainframe and server processing; storage; and other services. Approximately half of DISA’s business in Telecommunications Services is for the Defense Information Systems Network, for which DISA sets a standard rate to recover costs. The remaining half is for reimbursable services that cover services such as commercial satellite phones, instant message services, global videoconferencing services, and support for secure portable electronic devices (both smartphones and tablets). The commercial satellite communications program recovers costs through a management fee that is added to the direct contract costs. According to DISA officials, cost reimbursable services are those services that are not included in DISA’s standard offerings and thus do not have a standard rate. DISA recovers the cost for these services, including direct, indirect (overhead), and general and administrative costs, and the total cost is negotiated with customers up front. Approaches Used to Calculate Rates for DISA Services: DISA uses three approaches for calculating rates: 1. Per Unit: DISA determines a specific dollar rate per unit that, when multiplied by the projected workload, will produce revenue sufficient to recover the full costs, including direct and indirect costs, of providing the good or service. DISA uses this approach for most Computing Services and some Telecommunications Services. Computing Services. DISA calculates most of its Computing Services rates by dividing the total costs of providing a service by total projected units. Total costs of a service comprise direct and indirect costs, including general and administrative costs. Indirect Costs: These include costs that are associated with a particular service, such as facilities costs, and those that are associated with support provided to all services, such as personnel support. Contract management costs are included for all services but are recovered differently. Telecommunications Services. DISA’s mobility program, which provides support for portable electronic devices, recovers costs by charging a rate per device per month. Similarly, DISA’s cross- domain services, which provide the ability for customers to transfer information across different security domains (unclassified and classified systems) at a price for each filter supported. 2. Portion of Total Costs: DISA charges a portion of its total costs, including direct and indirect costs, of providing a service based on the proportion of total workload projected for a specific customer. DISA uses this approach for several of its Telecommunications Services. DISA’s Telecommunications Services charges customers a portion of the total costs for the Defense Information Systems Network based on each customer’s portion of total network usage. Total costs includes bandwidth, circuits, maintenance, sustainment costs, network support and operations labor, outage monitoring, and contract management, among others. This approach is also used for DISA’s Global Video Services (video teleconferencing capabilities) and Organizational Messaging Services (command and control messaging). 3. Percentage Markup on Direct Costs: DISA adds a percentage markup on its direct costs as a proxy for indirect costs. DISA uses this approach to calculate some rates for its Computing Services and for its Telecommunications Services and Enterprise Acquisition Services activity groups. Computing Services.There are some services within the Computing Services activity group which DISA charges on a reimbursable basis, such that customers pay the direct cost of the service provided plus an additional percentage of the direct cost to cover general and administrative costs. Telecommunications Services and Enterprise Acquisition Services. DISA charges the customer for the full cost of the contract plus an additional percentage of the direct costs to cover DISA’s indirect costs associated with contract management through the Defense Information Technology Contracting Organization. This fee ranges from 1.75 to 2.5 percent of the contract amount and is based on the expected support costs for associated information technology systems, billing support personnel and systems, financial management, and space and facility costs. This standard contracting fee may change from year to year, but it remains fixed within any given year. DLA reported receiving total Defense-Wide Working Capital Fund (DWWCF) orders for goods and services valued at approximately $40.6 billion in fiscal year 2018. DLA employs around 26,000 military and civilian personnel. DLA provides its services through three activity groups: Energy Management, Supply Chain Management, and Document Services. Approach to Allocating Costs: The Defense Logistics Agency (DLA) allocates direct costs to the individual good or service for which the costs were incurred. For indirect costs, DLA determines whether each cost is associated with providing specific goods or services (such as labor that supports a specific materiel supply chain) or is associated with supporting DLA as a whole (such as the DLA general counsel). DLA uses various methods to allocate these indirect costs, taking into account factors such as the number of employees supporting the provision of a given good or service and the total sales of that good or service. Services Provided: DLA provides fuel and other energy commodities through its Energy Management activity group; consumable materiel (i.e., supplies and parts), distribution services for this materiel, and disposition services for excess property through its Supply Chain Management activity group; and printing, electronic document management and invoicing, and other document services through its Document Services activity group. Indirect Costs: These include costs for information technology systems, facilities, and labor that support the provision of multiple goods and services. Costs for information technology systems and labor that provide enterprise-level support to all of DLA (such as DLA’s accounting system and headquarters staff), among other costs, are also included. The indirect costs included in rates vary among the different goods and services that DLA provides. rates that are calculated by dividing the total processing costs (excluding transportation costs) for items in each weight category by the projected number of units shipped for each category.a uniform percentage across all customers. DLA uses this approach for disposition and some document services, as described below. Disposition. DLA charges each customer a portion of the total direct and indirect costs of providing disposition services based on the customer's portion of total disposition service usage. When applicable, DLA subtracts the revenue it generates through the sale of excess property, reimbursements it receives from customers for hazardous waste management, and funding it receives for Overseas Contingency Operations from the total costs before assigning costs to customers. Document Services Electronic Document Access and Wide Area Workflow (Invoicing). For Electronic Document Access, DLA charges all customers a uniform percentage of its total costs for providing that service. For Wide Area Workflow, DLA charges each customer a portion of the total costs based on the customer’s portion of total system usage. 3. Percentage Markup on Direct Costs: DLA adds a percentage markup on the cost to acquire each good (i.e., the product cost) as a proxy for non-aqcuisition costs associated with that good (i.e., non- product costs). DLA uses this approach for its weapons systems and troop support materiel supply chains. Materiel Supply Chains.To calculate the cost recovery percentage, DLA divides the projected non-product costs for each materiel supply chain by the projected product costs of that materiel supply chain. The rate charged is the sum of the product cost of the good and an additional percentage of this product cost corresponding to the markup percentage. In addition to the contact named above, Alex Winograd (Assistant Director), Karyn Angulo, Martin de Alteriis, Garrick Donnelly, Christopher Gezon, Felicia Lopez, Keith McDaniel, Susan Murphy, Suzanne Perkins, Carol Petersen, Richard Powelson, Lauren Shaman, Kevin Walsh, and Doris Yanger made key contributions to this report. Document Services: DOD Should Take Actions to Achieve Further Efficiencies. GAO-19-71. Washington, D.C.: October 11, 2018. Defense-Wide Working Capital Fund: Action Needed to Maintain Cash Balances within Required Levels. GAO-17-465. Washington, D.C.: June 30, 2017. Bulk Fuel: Actions Needed to Improve DOD’s Fuel Consumption Budget Data. GAO-16-644. Washington, D.C.: September 12, 2016. Department of Justice: Working Capital Fund Adheres to Some Key Operating Principles but Could Better Measure Performance and Communicate with Customers. GAO-12-289. Washington, D.C.: January 20, 2012. Intragovernmental Revolving Funds: Commerce Departmental and Census Working Capital Funds Should Better Reflect Key Operating Principles. GAO-12-56. Washington, D.C.: November 18, 2011. Federal User Fees: A Design Guide. GAO-08-386SP. Washington, D.C.: May 29, 2008.", "summary": "As DOD continues to focus its resources on improving military readiness and modernizing its forces, it seeks to minimize costs associated with its business operations. DFAS, DISA, and DLA are financed through the Defense-Wide Working Capital Fund (DWWCF). Collectively, they provide shared services and goods to their customers, including finance and accounting services; information technology services; and fuel provision and inventory management. Senate Report 115-262, accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019, includes a provision that GAO evaluate the activities DWWCF agencies fund through overhead charges and fees collected from customers. This report evaluates the extent to which DFAS, DISA, and DLA (1) have a process for setting rates to recover costs and provide transparent pricing to customers and (2) clearly delineate roles and responsibilities, measure performance, and assess resource requirements and customer needs. GAO reviewed relevant sections of DOD's Financial Management Regulation and agency documentation and interviewed officials from DFAS, DISA, and DLA and the military departments in comparing the agencies' management practices to the key operating principles for effective management of working capital funds. The Defense Finance and Accounting Service (DFAS), Defense Information Systems Agency (DISA), and Defense Logistics Agency (DLA) use a combination of approaches to set rates that are intended to recover their costs and equitably allocate costs to customers. However, DFAS, DISA, and DLA have not provided transparent pricing to the military departments, which are their largest customers. Each agency annually develops budget proposals designed to recover projected costs and account for gains or losses from prior years. DFAS, DISA, and DLA have taken steps intended to establish an equitable pricing methodology. For example, DLA changed its pricing method for distribution services to align the rates customers pay with DLA's costs of providing the service. However, customers from the military departments said they lack visibility into the factors that determine their overall costs at one or more of the three defense agencies, including how indirect costs are allocated and included in the rates they are charged. GAO's review of cost and rate documentation provided to the military departments also found that they provide high-level information, such as the rates and estimated workloads, and did not include details about the types of costs included or how they are calculated. Specifically, (1) DFAS informational briefings do not describe the types of costs included in rates and how those costs are calculated and allocated. As a result, customers from the Army and Navy said they were confused about why declines in their use of DFAS's services have not resulted in reduced costs. (2) DISA does not include in its documentation the methodology it uses to calculate its rates, making it difficult for officials from the Air Force to determine how they can manage their costs with DISA. (3) DLA does not provide detailed information on the costs included in its rates, making it difficult for customers from the Navy and Air Force to determine how to lower their costs or, in the case of the Air Force, understand the cost implications of DLA's newly announced pricing initiative. Because DFAS, DISA, and DLA share only high-level information on their rate-setting methodologies, the military departments have been limited in their abilities to understand and manage the costs they pay for the services they obtain. By providing more complete information on rate setting, including the calculation and use of costs, DFAS , DISA , and DLA could help their customers better manage their costs and make more informed budgeting decisions. Improved transparency could also help customers anticipate how potential changes to the assumptions underlying rates could affect future costs. GAO also found that DFAS, DISA, and DLA clearly delineate roles and responsibilities, measure performance, and assess resource requirements and customer needs for goods and services, as called for by the three remaining key operating principles for effective working capital fund management. As a result, these agencies are positioned to promote a clear understanding of who will be held accountable for specific tasks or duties, reduce the risk of mismanaged funds, measure their operational performance and identify opportunities to improve performance, and use resources most effectively. GAO recommends that DFAS, DISA, and DLA provide more complete information to customers on their rate-setting methodologies. DOD concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Antibiotics are drugs that work by killing bacteria or slowing their growth. However, some bacteria have developed ways to resist the effects of antibiotics, for example, by preventing antibiotics from entering the cell or pumping them out after the antibiotic enters. Bacteria that are able to survive in the presence of antibiotics will multiply and pass on their new genetic material that confers resistance to future generations of bacteria and, in some cases, to other types of bacteria. Resistance can arise in bacteria in humans, animals, and the environment, including in health care settings, and can spread through contact with infected people or animals, contact with contaminated water, soil or surfaces, or consumption of contaminated food. The spread of antibiotic resistance threatens not only the ability to fight bacterial infections but also threatens to reverse some significant medical gains. For example, in addition to treating infections, antibiotics have allowed for numerous medical procedures, such as joint replacements, caesarian sections, organ transplants, chemotherapy, and dialysis—all of which would be significantly riskier without effective antibiotics. Antibiotic resistance also poses a significant economic burden resulting from the direct costs of treating those with resistant infections and the loss of economic productivity from those who get sick or die. In the 2013 Threats Report, CDC identified 17 bacterial pathogens that the agency considers to be “urgent,” “serious,” or “concerning” because they have developed enough resistance to antibiotics to be considered a threat to human health. (See fig. 1.) According to CDC, certain types of bacteria, called gram-negative bacteria, are particularly worrisome because they are becoming resistant to nearly all drugs that would be considered for treatment. The most serious gram-negative infections can be acquired in hospitals or other health care settings and can cause pneumonia, bloodstream infections, wound or surgical site infections, and meningitis. Nine of the 17 bacterial threats on CDC’s threat list are gram-negative. One of the bacteria CDC considers to be an urgent threat—Clostridioides difficile (C. difficile)—is classified as a threat not because it is resistant to antibiotics, but because it is caused by the same factors that drive antibiotic resistance, such as antibiotic use. CDC estimates that C. difficile alone accounted for 12,800 deaths in U.S. hospitals in 2017. CDC’s 2013 Threats Report also identified one type of fungus—Candida auris—that it considered to be a serious threat (see text box). Candida auris Is a Resistant Fungal Threat Candida auris (C. auris) is an emerging infectious fungus that, according to the Centers for Disease Control and Prevention (CDC), presents a global health threat in part because it is highly resistant to anti-fungal drugs and is challenging to address. C. auris was first identified in Japan in 2009. CDC reported 806 confirmed cases in the United States, as of August 31, 2019. According to CDC, C. auris is highly transmissible and some commonly used hospital surface disinfectants appear to be less effective against C. auris. A CDC official told us C. auris is a good example of an emerging threat that requires more research and associated efforts to properly address. Addressing C. auris is challenging for reasons including the rise of resistance and limitations in diagnostic tests. According to CDC, there are three classes of antifungals available to treat C. auris. However, CDC has identified strains that are resistant to all three classes. A CDC official noted that getting new antifungals to market is challenging because, among other things, the demand for antifungals, relative to antibiotics, is low. Additionally, according to FDA, although reliable tests for identifying C. auris exist, commonly used laboratory tests may misidentify this fungus, posing a barrier to correct diagnosis. In 2018, the Food and Drug Administration (FDA) cleared a test based on mass spectrometry to identify C. auris, but this test cannot characterize resistance. FDA officials told us there are three FDA-cleared tests available for testing for other Candida species’ resistance to fluconazole. However, none of these tests can provide rapid results, such as within an hour. Finally, interpretation of culture-based diagnostic tests, which examine how well bacteria grow in the presence of an antibiotic, is challenging due to the lack of established interpretive criteria for C. auris, by both the Clinical and Laboratory Standards Institute, which promotes the development and use of voluntary laboratory consensus standards and guidelines within the health care community, and by FDA. U.S. spending on antibiotics in health care from 2010 through 2015 was estimated in one study to be nearly $56 billion, ranging from $8.4 billion to $10.6 billion annually. While CDC states that antibiotic prescribing improved nationally with a 5 percent decrease from 2011 to 2016, the agency estimated in 2017 that at least 30 percent of antibiotics used across both outpatient and inpatient settings are still prescribed unnecessarily or incorrectly and, therefore, are considered inappropriate. According to CDC, approximately 85 to 95 percent of the nation’s antibiotic use, by volume, occurred in outpatient settings from 2010 through 2015; and roughly 270 million antibiotic prescriptions— equivalent to 836 per 1,000 persons in the United States—were written in these settings in 2016. (For more information on antibiotic use in the United States, see text box.) Antibiotic Use in the United States A 2017 Centers for Disease Control and Prevention (CDC) report estimates that about 30 percent of antibiotics used in U.S. hospitals are inappropriate (unnecessary or prescribed incorrectly), and as much as 50 percent of antibiotics prescribed in outpatient settings—such as physicians’ offices, emergency departments, urgent care centers, and retail clinics—may be inappropriate. For example, CDC reports that each year, an estimated 47 million unnecessary antibiotic prescriptions are written in physicians’ offices and emergency departments. Most of these unnecessary prescriptions are for respiratory conditions most commonly caused by viruses— including common colds, viral sore throats, and bronchitis—that do not respond to antibiotics, or for bacterial infections that do not always need antibiotics, like many sinus and ear infections. Furthermore, CDC reports that even when antibiotics are needed, prescribers often favor drugs that may be less effective and may carry more risk over more targeted, “first-line” drugs recommended by nationally recognized antibiotic prescribing guidelines. (First-line drugs are the drugs generally recommended for initial treatment for a given diagnosis, often combining the best efficacy with the best safety profile or the lowest cost.) According to CDC, antibiotics are among the most frequently prescribed medications in nursing homes, with up to 70 percent of residents receiving one or more courses of systemic (non-topical) antibiotics in a year; CDC also cites studies showing that 40 to 75 percent of antibiotics prescribed in nursing homes may be inappropriate. CDC further reports that harms from antibiotic overuse include the risk of serious diarrheal infections from C. difficile, increased adverse drug events and drug interactions, and increased risk of infection with antibiotic-resistant organisms. According to CDC officials, “unnecessary” antibiotic use means the antibiotic was prescribed when no antibiotic was needed, based on clinical practice guidelines. “Inappropriate” antibiotic use includes both unnecessary antibiotic use, as well as inappropriate antibiotic selection, dosing, or duration when antibiotics are indicated. CDC officials also told us they consider “misuse” and “inappropriate use” to be synonymous terms. Vaccines Can Also Help Prevent Antibiotic Resistance While we did not include vaccines in the scope of this report, vaccines play a role in helping combat antibiotic resistance because they are designed to prevent infections, including resistant infections. In addition, by preventing infections from occurring, they can reduce the need to use antibiotics, which in turn, can slow the development of antibiotic resistance. For example, according to the Centers for Disease Control and Prevention (CDC), since introduction of the pneumococcal conjugate vaccine among children in 2000, rates of antibiotic-resistant infections caused by certain Streptococcus pneumoniae strains decreased by 97 percent among children under 5 and by more than 60 percent among adults. However, few vaccines are available that target antibiotic-resistant bacteria on CDC’s threat list. In September 2014, the President signed Executive Order No. 13676 (Executive Order), which directed that several federal actions be initiated related to antibiotic resistance. For example, the Executive Order directed the creation of the National Action Plan, which the White House released in 2015, to provide a roadmap for federal agencies to respond to the threat of antibiotic resistance. The National Action Plan set five major goals over 5 years related to (1) slowing the emergence of resistant bacteria and preventing the spread of resistant infections; (2) strengthening national One-Health surveillance efforts to combat resistance; (3) advancing the development and use of rapid and innovative diagnostic tests for the identification and characterization of resistant bacteria; (4) accelerating basic and applied R&D for new antibiotics, other therapeutics, and vaccines; and (5) improving international collaboration and capacities related to the first four goals. In addition, the National Action Plan discusses the importance of preventing and controlling infections, such as through rapid detection, to combat antibiotic resistance domestically and globally (see text box). Within each of these five goals, the National Action Plan contains numerous objectives, sub-objectives, agency-specific milestones, and other performance targets called significant outcomes. For example, the National Action Plan set a significant outcome of reducing inappropriate antibiotic use by 50 percent in outpatient settings and by 20 percent in inpatient settings by 2020. According to the World Health Organization (WHO), effective infection prevention and control measures are a practical and scientific approach to reduce health care- associated infections in patients and health care workers, and help combat antibiotic resistance. Infection prevention and control measures serve as the cornerstone of actions needed to address epidemics, pandemics, and antibiotic resistance. Such measures include implementing hand hygiene practices, providing vaccinations, cleaning and disinfecting hospital rooms, isolating patients with infectious diseases, decontaminating and sterilizing medical equipment, and tracking data about emerging infectious diseases. WHO states that health care-associated infections are a global challenge from which no country or health care facility is immune. The Centers for Disease Control and Prevention (CDC) has taken actions to address and track health care-associated infections, including antibiotic-resistant infections. For example, in 2009, CDC issued guidance for infection control targeting Enterobacteriaceae that may be resistant to carbapenem, a class of antibiotics. In 2018, CDC published a study suggesting that a tracked decline in the proportion of resistant bacteria, including carbapenem-resistant Enterobacteriaceae, observed in some health care settings, could be attributable—at least in part—to actions such as those outlined in its 2009 guidance. In addition, CDC has reported that U.S. hospitals have made major progress since 2005 in declining rates of methicillin-resistant Staphylococcus aureus (MRSA) bacteremia because of infection prevention measures. The interagency CARB Task Force, which was created by the Executive Order to issue and monitor the implementation of the National Action Plan, is co-chaired by the Secretaries of Defense, Agriculture, and HHS, and is additionally comprised of representatives from VA and several other agencies. Representatives from HHS agencies—including BARDA, CDC, CMS, FDA, and NIH—make up nearly two-thirds of the task force’s participants (see table 1). According to the HHS Assistant Secretary for Planning and Evaluation officials who coordinate it, the task force is developing a new National Action Plan that will span the years 2020 through 2025. To provide additional advice to the CARB Task Force and the Secretary of HHS, the Executive Order also created the Presidential Advisory Council on Combating Antibiotic-Resistant Bacteria (PACCARB), which is composed of 15 non-governmental members. The Executive Order also charged the CARB Task Force with providing annual updates to the President regarding progress made in implementing the National Action Plan, plans to address any barriers preventing its full implementation, and recommendations for any new or modified actions, taking federal government resources into consideration. Since 2015, the CARB Task Force has produced four progress reports, which summarize agency actions toward meeting the goals and milestones laid out in the National Action Plan; these reports were provided to the President and are publicly available. Since the National Action Plan was released in 2015, CDC has made progress in expanding surveillance for antibiotic resistance in the United States and abroad. However, the magnitude of the problem and its trends over time remain unknown, in part because of challenges in three areas: (1) tracking antibiotic resistance across all health care settings, (2) reporting complete and timely information on magnitude and trends of antibiotic resistance, and (3) tracking and assessing the global antibiotic resistance threat. To better assess the full extent of antibiotic resistance, CDC has expanded its surveillance of priority bacteria in the United States in order to better assess the full extent of antibiotic resistance since the 2015 National Action Plan was released. CDC tracks antibiotic resistance through several infectious disease surveillance systems in collaboration with state and local health officials, health care providers and facilities, and laboratories. Rather than establishing a single surveillance system for antibiotic resistance, CDC generally incorporates tracking of antibiotic resistance into broader surveillance systems, according to agency officials. The surveillance systems are spread across various divisions within CDC that specialize in specific types of infection or certain settings. (See table 2 for a description of each system and the resistant bacteria it tracks.) According to CDC and other officials and documents we reviewed, including the National Action Plan Year 3 Progress Report, CDC has taken the following actions, among others, to expand surveillance in order to better assess the scope of antibiotic resistance: Established the Antibiotic Resistance Laboratory Network in 2016 to improve testing capacity to better identify antibiotic resistance in the United States. The network consists of 55 state and local (including Puerto Rico), and seven regional, public health laboratories and the National Tuberculosis Molecular Surveillance Center. The network is improving and expanding laboratory capacity response at public health laboratories around the country, as well as at regional centers, according to representatives from two national professional organizations of state and local health officials and epidemiologists. Expanded antibiotic resistance-related efforts in its Emerging Infections Program (EIP), a network that seeks to monitor, prevent, and control emerging infectious diseases. For example, since 2015, more of the existing 10 EIP sites are conducting surveillance for invasive Staphylococcus aureus infections, carbapenem-resistant Enterobacteriaceae, and C. difficile, among others. Separately, the National Action Plan had included a goal for CDC to expand EIP by adding up to 10 sites within 3 years. However, CDC officials told us that in light of resource limitations, they chose to instead increase the number of pathogens reported at existing EIP sites. They told us they determined this was a better use of the limited funds, and that existing EIP sites are sufficient for current EIP efforts related to antibiotic resistance. Updated the domestic tuberculosis surveillance system by incorporating advanced drug susceptibility testing and reporting and by developing capacity for state surveillance systems to report their tuberculosis test data electronically to CDC laboratories. Supported state and local health departments to better track, investigate, and prevent resistant foodborne disease, among other things, through the National Antimicrobial Resistance Monitoring System for Enteric Bacteria (NARMS). For example, the system can now carry out whole genome sequencing for all the pathogens it tracks, which enhances its detection and response capabilities, such as by expanding CDC’s ability to detect new and emerging resistance, according to CDC officials. Launched the Enhanced Gonococcal Isolate Surveillance Program (eGISP), which augments the main Gonococcal Isolate Surveillance Program (GISP). Whereas GISP only collects samples from the urethras of men with symptoms of gonorrhea, in select sexually transmitted disease clinics, eGISP also collects samples from women and from other sites on the body, such as the throat. The specimens are sent to regional laboratories for resistance testing. CDC has also worked with international partners to expand surveillance of antibiotic resistance abroad. These efforts involved CDC collaborations with WHO, the European Center for Disease Prevention and Control, the government of the United Kingdom, other governments, and other multi- country efforts, such as the Surveillance and Epidemiology of Drug- Resistant Infections Consortium and the Transatlantic Taskforce on Antimicrobial Resistance (TATFAR). The collaborations aimed to develop technical guidance to help improve surveillance in other nations and to organize an international forum. CDC also launched its Antibiotic Resistance (AR) Solutions Initiative, which invests in national and international infrastructure to address resistant infections across health care settings and communities and from food. CDC faces three general challenges in tracking and reporting trends in antibiotic resistance. First, it faces limitations in data reporting and resistance testing from hospitals, as well as challenges ensuring that its resistant gonorrhea surveillance system is representative of the U.S. population. Second, CDC faces challenges in reporting complete and timely information on the magnitude of and trends in antibiotic resistance. Finally, CDC faces challenges to detecting resistance threats abroad. The first challenge CDC faces in tracking trends in resistance is addressing low hospital participation in a new option of CDC’s National Healthcare Safety Network (NHSN) system intended to address some limitations in NHSN. NHSN is, among other things, an online system for tracking health care-associated infections. It provides facilities, states, regions, and the nation with data needed to identify problem areas, measure the progress of prevention efforts, and ultimately eliminate health care-associated infections, according to CDC. Patients in settings such as hospitals and long-term care facilities (e.g., nursing homes) in many cases already have a weakened immune system or an underlying illness, making an antibiotic-resistant infection especially dangerous, according to the Centers for Disease Control and Prevention (CDC). A high proportion of the morbidity and mortality associated with antibiotic resistance is seen in health care-associated infections. Tracking resistance in health care settings is therefore critical to national surveillance efforts. CDC established three modules within NHSN that allow hospitals to report select antibiotic-resistant infections, among other things, which include reporting required by states or by CMS, according to agency officials. Two modules track patients who have an infection associated with a medical device or resulting from a surgical procedure. Hospitals only report on resistance in these modules for specific combinations of antibiotics and bacteria, such as carbapenem-resistant Enterobacteriaceae. The third module tracks certain hospital patients who test positive for certain multidrug-resistant infections, including methicillin- resistant Staphylococcus aureus (MRSA)—a type of bacteria found on people’s skin that is usually harmless but can cause serious infections, according to CDC. However, according to CDC, many antibiotic- resistant infections detected during hospital care do not fall into one of these three modules and therefore would not be captured in NHSN, limiting CDC’s ability to identify important new resistances or trends. In 2014, to help address this limitation, CDC officials told us they introduced a new option for hospitals to report data on antibiotic resistance—the Antimicrobial Resistance Option (AR Option). This option allows for reporting of data on antibiotic resistance for certain bacteria, regardless of whether the patient has a health care-associated infection. In contrast to the other three modules, reporting to the AR Option is voluntary. As a result, while about 86 percent of the 17,529 eligible U.S. health care facilities participate in at least one of the older three antibiotic-resistance reporting modules, only about 10 percent of the 6,836 eligible hospitals participate in the newer, voluntary AR Option, according to our analysis of NHSN hospital participation data as of January 2020. The hospital participation rate among U.S. states and territories ranged from no participation (in nine states and territories) to about 27 percent. Representatives from a national association of state public health officials we interviewed said that this low rate limits the value of the data, a view that echoed the findings of a 2018 report by the Joint Public Health Informatics Task Force. CDC officials acknowledged that participation in the AR Option is low and cited reasons for this, including hospital resource limitations, and—in many cases because participation is voluntary—because hospitals do not prioritize submitting data to the AR Option. According to CDC officials, it is particularly challenging for many smaller hospitals and Indian Health Service facilities with resource constraints to participate, as it requires significant information technology investment. The Joint Public Health Informatics Task Force report noted two other common challenges: low capacity for information technologies needed to support data submission to the AR Option, and a lack of motivated leadership, such as a facility “champion,” to oversee the development and maintenance of needed reporting infrastructure. For example, the maintenance of reporting infrastructure could address changes to electronic medical records that are not immediately compatible with the AR Option reporting format. CDC officials told us the agency is taking some steps to increase participation in the AR Option. For example, it is encouraging the over 1,500 hospitals (as of December 31, 2019) that are participating in a related reporting effort—known as the Antimicrobial Use Option (AU Option)—but not in the AR Option to participate in both. In addition, the agency is working with vendors of equipment and electronic health record software to make it easier for hospitals to participate in the AR Option. One of CDC’s goals for the AR Option is to use reported data to conduct regional and national assessments of resistance. To help meet this goal, officials said they would like participation by all eligible hospitals in the AR Option, but they have not determined the needed participation rates or appropriate distribution of participating hospitals. Our past work has shown that leading practices for federal strategic planning include articulating specific goals, establishing a method to assess progress toward these goals, and aligning the plans and goals with the agency’s mission. By taking steps to determine the participation rates and distribution of participation hospitals needed for CDC to meet its goal of conducting regional and national assessments of antibiotic resistance of public health importance, CDC would have more reasonable assurance that it can achieve its goal. The second challenge CDC faces is ensuring representativeness of its resistant gonorrhea surveillance system. CDC has classified resistant gonorrhea as one of the most urgent antibiotic-resistance threats in the nation, affecting over half a million patients annually. According to the agency, resistant gonorrhea warrants this designation because of the limited remaining treatment options, the high number of gonorrhea infections, potential adverse outcomes (such as increased transmission of HIV), and the prospect that gonorrhea may become incurable if new resistance arises and spreads. The Urgent Threat of Resistant Gonorrhea According to the Centers for Disease Control and Prevention (CDC), gonorrhea is the second most commonly reported notifiable disease in the United States, with over 500,000 infections reported in 2017. However, CDC estimates that the true number could be as many as 820,000 each year. In addition to being a very common infection, gonorrhea is developing resistance to treatment options. As recently as 2006, CDC had five recommended options, but it estimates that nearly half of U.S. infections are now resistant to available antibiotics, including combinations. Consequently, it now recommends only one regimen. In 2014, a case of dual-therapy failure was reported in the United Kingdom, and in February 2018, a similar case in the United Kingdom was reported that also failed to respond to the last-resort therapy, spectinomycin, resulting in treatment failure. As of June 2019, CDC reported that it had not received any reports of verified clinical treatment failures to any cephalosporin in the United States. It is not clear, however, that GISP data are representative of the general U.S. population because GISP draws on a limited sample of that population. Specifically, GISP collects culture specimens—-called isolates—and accompanying epidemiologic data from only the first 25 men with inflammation of the urethra consistent with gonorrhea visiting each participating sexually transmitted disease clinic each month. It does not collect culture specimens from women. In addition, the number of participating clinics each year has varied from 21 to 30 (see fig. 2 for the current sites). CDC estimates that the cases of gonorrhea identified through GISP surveillance represent only about 1 to 2 percent of all reported cases of gonorrhea in the United States each year. Further, the GISP sample design also over-represents cases in the western United States, where antibiotic-resistant gonorrhea has tended to initially emerge, according to CDC. According to CDC, this design allows for more rapid detection of emerging resistance by ensuring a sufficient sample size from the western United States because resistance tends to emerge from that area. CDC has two projects—Strengthening the United States Response to Resistant Gonorrhea (SURRG) and eGISP— intended to, among other things, enhance domestic gonorrhea surveillance and learn more about the representativeness of GISP through limited testing of women and of body sites other than urethras, respectively. However, CDC’s current methodology may limit its ability to establish a representative trend. According to CDC officials, GISP could improve its representativeness by adding clinics or covering more of the population at its current sites. However, efforts to expand GISP would be difficult due to limited local capacity (see text box). Barriers to Expanding the Gonococcal Isolate Surveillance Program (GISP) GISP currently tracks a limited sample of the U.S. population. According to Centers for Disease Control and Prevention (CDC) officials, a more thorough expansion of GISP would be more difficult because of limited local capacity to conduct culture-based testing for resistance in gonorrhea. Specifically, laboratories increasingly use newer gonorrhea testing technology that gives more rapid results but cannot currently be used to test for resistance. This trend has contributed to the reduced capability of many laboratories to perform the gonorrhea culture-based testing for antibiotic susceptibility testing, to the point that many clinics cannot collect specimens for testing, according to CDC officials. Furthermore, officials said that adding new clinics to GISP would require financial and other resources for, among other things, establishing culture testing for resistance and information technology needed to report data to the system. Most gonorrhea cases are diagnosed outside sexually transmitted disease clinics. However, expanding GISP to non-sexually transmitted disease clinic sites could be particularly costly and inefficient, officials said, because these sites tend to see many fewer gonorrhea cases per year compared to sexually transmitted disease clinics; therefore they may not be able to contribute significant data to GISP. Through the Strengthening the United States Response to Resistant Gonorrhea (SURRG) project, CDC is currently exploring options to work with states to enhance gonorrhea testing capacity. This program was established in 2016 but has not received the funding needed to expand capacity to the extent CDC had planned. In addition, physicians and other providers have limited time to devote to data collection and reporting needed to participate in GISP. CDC officials also told us the reimbursement rates for providers for these services are inadequate. CDC has taken some steps to assess the representativeness of the current GISP design, but it has not conducted a comprehensive study to assess the representativeness of the trends identified in GISP. A 2015 CDC evaluation concluded that the representativeness of GISP was “good” on a scale of fair, good, or great. However, the evaluation covered only part of fiscal year 2014 and consisted of a limited comparison of selected demographic characteristics captured in gonorrhea cases identified in GISP to those captured through the National Notifiable Diseases Surveillance System, according to CDC officials, and which has its own limitations. Further, the results of this evaluation have not resulted in any changes to the GISP design. CDC officials told us they hope to learn more about the representativeness of GISP urethral isolates from testing women, patients in non-sexually transmitted disease clinic sites in the SURRG project and eGISP, and testing at other body sites, and then comparing some of these results to those of GISP. However, these efforts overall were not specifically designed to fully assess the representativeness of GISP and may not provide a sufficient assessment for impacting changes to the GISP design. CDC’s guidelines of efficient and effective public health surveillance systems state that, in order to be representative, the data from a public health surveillance system should accurately reflect the characteristics of the health-related outcome—such as resistant gonorrhea—under surveillance. A more precise evaluation of the representativeness of the surveillance system can be done via carefully designed studies to obtain complete and accurate data for the health event in question—namely, the urgent threat of antibiotic-resistant gonorrhea. By evaluating the surveillance system for resistant gonorrhea to ensure that it includes measures of its representativeness, such as by comparing the trends in the sample population with those in the overall U.S. population, using specially designed studies if needed, CDC would have better assurance that the trends detected in GISP accurately reflect the characteristics of the health-related outcome the system is designed to monitor. In addition to the limited design of GISP, CDC faces the challenge of competing priorities under reduced funding that precluded it from completing its plans to expand the SURRG project. The SURRG expansion was designed to address a National Action Plan goal of controlling resistant gonorrhea, among other things, but also affects surveillance, as CDC officials told us SURRG was established to address some limitations in GISP surveillance. Specifically, one of the plan’s milestones assigned to CDC is to maintain advanced capacity for rapid response to antibiotic-resistant gonorrhea for at least 20 state health departments. Such capacity includes detection, diagnosis, and investigation of suspected resistant cases within their state or region and assistance for health care providers in appropriately treating infected patients. CDC officials told us that because they received about half of the appropriations they had requested, CDC had to make cuts in some of their projects, and SURRG was one of those that CDC chose to reduce. Eight SURRG sites, rather than the 20 recommended by the National Action Plan, collect and analyze data. However, in its progress reports covering the first 4 years of the National Action Plan’s implementation, the CARB Task Force did not identify plans to address barriers related to expanding the SURRG project. The CARB Task Force coordinators told us that the progress reports have not identified plans to address barriers largely because the task force focused on reporting the agencies’ accomplishments in implementing the National Action Plan. The coordinators also said that, in response to our inquiries during this review, the task force intends to identify agencies’ plans for addressing barriers in the progress report to be published in fall 2020. The Executive Order directs the CARB Task Force to provide annual updates to the President on federal government actions to combat antibiotic resistance, including progress made in implementing the National Action Plan, plans for addressing any barriers preventing its full implementation, and recommendations for any new or modified actions, taking federal government resources into consideration. Without reporting its plans to address such barriers, the CARB Task Force has not provided all the information required by the Executive Order and has not fully carried out its role to facilitate and monitor implementation of the National Action Plan, which may reduce the effectiveness of federal efforts to combat antibiotic resistance. The third challenge CDC faces tracking antibiotic resistance is addressing limitations to the use of test results in surveillance in health care settings. For example, some health care facilities are not using the most up-to-date testing methods for determining whether the bacteria causing an infection are resistant to certain antibiotics, according to CDC officials and a report from the Antibiotic Resistance Surveillance Task Force. In addition, laboratories may only report an interpretation of the test result to CDC (e.g., whether the bacteria is resistant or susceptible to an antibiotic) and not the quantitative results (e.g., measures of the growth of bacteria in the presence of the antibiotic). This presents a challenge for comparing data from different laboratories, since they may not be using consistent testing thresholds for determining antibiotic resistance. Another limitation is that some test equipment may be designed to give limited results for the purposes of guiding treatment recommendations and stewardship efforts, which may also limit the information available to CDC. For example, the test may inform the user that the infection is susceptible to one antibiotic but “suppress” information on susceptibility to other antibiotics, in order to guide the user toward treatment with the preferred first-line treatment. The Antibiotic Resistance Surveillance Task Force report noted that some suppression is done by the testing equipment itself and some by software systems that record, manage, and store data for clinical laboratories. CDC officials told us they are working with some diagnostic test manufacturers to explore these issues and develop solutions to address them. The Antibiotic Resistance Surveillance Task Force is also working to address the diagnostic test challenges related to antibiotic resistance surveillance. CDC also faces challenges in reporting timely and complete information on the magnitude of and trends in antibiotic resistance in the agency’s Threats Reports. One challenge is in providing information in these reports on the uncertainties in reported numbers of deaths from antibiotic- resistant infections. Another challenge is in issuing such reports in regular, timely intervals. As a result of these challenges, among others, the true magnitude of, and trends in, antibiotic resistance over time are unknown, including trends in various places and among people with various characteristics. Surveillance for antibiotic resistance is complex and costly, according to experts at our meeting, CDC officials, and literature we reviewed. Experts told us such surveillance encompasses diverse pathogens, diseases, and health care settings and requires a variety of data sources and collection efforts. Furthermore, experts from our meeting told us the fundamental data required—such as data on the number of illnesses and deaths attributable to resistance and data on related health care costs—are currently insufficient. One expert added that there is a lack of real-time monitoring data, such as data that are available within hours or days of being generated. The data gaps are especially large for infections acquired in the community, as opposed to in a health care setting, because there is very limited tracking of such infections and whether they are resistant. As a result, CDC officials said, it is challenging to provide ranges of uncertainty, a critical component of any effort to measure and report on magnitude and trends. Neither the 2013 Threats Report nor the 2019 Threats Report provided quantitative measures of uncertainty, such as confidence intervals, for CDC’s estimates of morbidity and mortality resulting from antibiotic- resistant infections. For example, the report stated that there are at least 23,000 deaths a year as a direct result of antibiotic-resistant infections, but it did not include an upper limit or a single point estimate for this number. Similarly, the 2019 Threats Report stated that there are at least 35,900 deaths a year, without an upper limit or a single point estimate. A recent re-estimate by a group of scientists has put the likely minimum number of deaths annually in the United States at approximately 153,000, or about four times the 2019 CDC minimum estimate. CDC officials told us that because of several limitations, its estimates were the best that could be derived from the data available. For example, for the 2013 Threats Report, CDC only had data from a national hospital survey intended to produce estimates of all health care-associated infections and indirect estimates of the proportion of infections that were resistant. These data did allow CDC to calculate confidence intervals for infections by specific pathogens, but this information was not disclosed in the Threats Reports. Because the data sources were not intended for this purpose, the 2013 intervals were wide, from approximately 26 percent to 380 percent of the point estimates for each pathogen. CDC officials told us they elected not to include these ranges of uncertainties to avoid confusion in the 2013 Threats Report, because the report was intended for a variety of audiences, including the general public. Officials told us they planned to provide confidence intervals in an appendix of the 2019 Threats Report, but they did not. CDC officials explained that they elected not to include confidence intervals in the 2019 Threats Report because several publications are pending that provide more granular data for many of the estimates included in the report. It is thus unclear whether CDC plans to include any measures of uncertainties in future Threats Reports. Federal standards for agency dissemination of information it produces stipulate that when information products are disseminated, error estimates are calculated and disseminated to support assessment of the appropriateness of the uses of the estimates or projections. Providing measures of uncertainties in antibiotic resistance estimates, such as standard errors or confidence intervals, as appropriate, in its Threats Reports would help CDC and others compare information within and across reporting efforts, without having to consult multiple documents over time. CDC and others could use this information to draw appropriate conclusions about the characteristics of antibiotic resistance in the United States, including limitations associated with reported findings and conclusions. Additionally, CDC does not have a plan for timely, regular issuance of their Threats Reports. It took CDC over 6 years to update the 2013 Threats report. CDC officials told us this length of time between reports was in part because, following issuance of the 2013 Threats Report, the agency was focused on implementing priority actions to improve antibiotic resistance surveillance data, including those efforts prescribed by the National Action Plan. In some cases, implementing these actions involved new data collection efforts that took time to establish, including that it can take up to 2 years to get new surveillance variables cleared by the Office of Management and Budget (OMB), CDC officials told us. In addition, CDC officials said it is time consuming to coordinate across the decentralized structure of antibiotic-resistance tracking at CDC to compile a consolidated report. However, lack of timely, regular updates may affect the information available to the public as well as policy-makers. For example, the 2013 Threats Report stated that there are at least 23,000 deaths a year as a direct result of antibiotic-resistant infections. The 2019 report stated the number of deaths each year to be at least 35,900 deaths a year. This report also revised the 2013 estimate from 23,000 to 44,000 deaths a year, suggesting a nearly two-fold revision to the initial 2013 estimate. CDC officials told us they would like to publish the report more frequently than every 6 years, and that it is reasonable they would develop such a plan for frequency of publication following the 2019 report. However, they said the agency does not currently have a plan for how often it will release future consolidated reports. CDC’s attributes of efficient and effective public health surveillance systems include timely data dissemination for planning, implementing, and evaluating public health policies and programs. By developing a plan for more frequent dissemination of consolidated reporting on priority pathogens at regular intervals, CDC would have more timely trend data and other information necessary for users of the data, including policymakers, to prioritize, plan, implement, and evaluate public health actions to address antibiotic resistance. In October 2015, the World Health Organization (WHO) launched the Global Antimicrobial Resistance Surveillance System (GLASS). The objectives of GLASS are to foster national surveillance systems and harmonized global standards and estimate the extent and burden of antimicrobial resistance globally by selected indicators, among other things. As of November 2019, 86 countries were enrolled in GLASS, a 25 percent increase over 2018. Participants were in various stages of economic development (13 lower-income countries, 23 lower-middle- income countries, 17 upper-middle-income countries, and 33 high-income countries) and in all WHO regions. Seventy-five countries provided descriptive information on their surveillance systems for tracking antimicrobial resistance, and 57 countries provided resistance data for 2018. antibiotic resistance from the national surveillance systems of some countries are incomplete because of a lack of capability and resources for implementing standardized protocols, according to WHO officials. Moreover, most information on antibiotic-resistant infections is limited to laboratory test data and does not include epidemiological data, such as data on the patient and location, which could provide additional insight about the circumstances around the resistant infection. Also, a lack of a sampling strategy for the detection of cases that are antibiotic-resistant may bias the representativeness of the data and interpretation of results. Specifically, when case identification is done only on the population of patients that seeks medical care and is tested, or when testing of the population varies such as across health care settings, the incidence and trends determined from this population may not represent the total population of concern. Aggregated data reporting. Some countries report aggregated, rather than isolate, or infection-level, data to the WHO’s Global Antimicrobial Resistance Surveillance System (GLASS), a practice that WHO officials stated creates a challenge for data analysis and results interpretation. According to officials, such aggregation limits statistical analysis that can be performed and limits analysis of factors such as the specific antibiotic-resistant bacteria, or the age or gender of the patient, among other things. Surveillance is a complex function. Many different health care and public health professionals are involved in the multistep process for generating data, according to a WHO report on GLASS. According to WHO officials, obtaining the staff commitment and training needed to ensure high-quality data can pose a challenge to public health agencies and health care organizations. As we noted above, CDC has worked with, and continues to work with, international partners to expand surveillance of antibiotic resistance abroad, including through U.S. participation in GLASS. For example, CDC has helped develop technical guidance for surveillance programs in other countries and has organized international forums for surveillance. CDC officials also told us portions of domestic surveillance systems data collection include collection of patient travel history. Federal agencies have helped advance the development of new FDA- authorized tests and the use of existing tests for diagnosing antibiotic- resistant infections, but these efforts have limitations. Specifically, HHS and DOD have funded studies and taken other steps to advance testing, but they have not defined leadership, roles, and responsibilities to address a key barrier to the use of tests: a lack of clinical outcome studies. FDA has taken additional steps to advance testing; however, it has not regularly monitored test updates. HHS and DOD have awarded grants and contracts for the development of new FDA-authorized tests for diagnosing antibiotic-resistant infections. Some of these awards address specific needs in the current availability of FDA-authorized tests, while others support more general research and development efforts. In addition, these agencies have taken steps to help reduce the chances of duplicative funding. According to experts, tests for antibiotic resistance not only help clinicians decide what antibiotics to use, they also provide important information for surveillance, including the number of cases of resistant infections in a population and the mechanisms of resistance. to the 2013 Threats Report. Differentiate between viral and bacterial infections. Such a test would be useful primarily in preventing use of antibiotics for viral infections, which can contribute to the development of resistance in bacteria, among other things. HHS and DOD have awarded funding to address these needs. For example: CARB-X—a program supported by NIH and BARDA within HHS—has awarded funding to a company to develop a rapid test to both diagnose gonorrhea and test for antibiotic resistance. CARB-X is funding other companies to, among other things, develop rapid testing for identification of and resistance in bloodstream infections, including for some priority bacteria. In September 2016, NIH and BARDA announced the Antimicrobial Resistance Rapid, Point-of-Need Diagnostic Test Challenge. As of December 2019, there were five finalists, working on such projects as developing a rapid test to differentiate viral from bacterial infections and developing a test that can identify or detect antibiotic-resistant bacteria, including antibiotic-resistant gonorrhea. Within DOD, the Defense Advanced Research Projects Agency officials told us that the agency used fiscal year 2015 funding on contracts for the development of rapid molecular tests for resistant gonorrhea and to distinguish between viral and bacterial infections. Federal agencies have also funded more general research and development efforts related to resistance testing. For example: NIH officials told us their agency has supported extramural projects related to the development of tests for antibiotic resistance by issuing grants and entering into contracts since fiscal year 2015. Separately from the Antimicrobial Resistance Diagnostic Challenge, BARDA entered into contracts with three organizations to develop tests focusing on the advanced stages of test development, including clinical trials, according to BARDA officials. Within DOD, the Defense Threat Reduction Agency is funding three projects using Other Transaction Authority or direct funding to a DOD Service laboratory, for developing tests. Federal agencies have also taken steps to help reduce the chances of duplicative funding, including working with some international efforts to develop tests, according to agency officials. For example, NIH reviews current and pending support of key project personnel prior to issuing of any research award, to help ensure NIH support complements support from other agencies and organizations. Similarly, officials from HHS’s Office of Global Affairs worked during the creation and launch of the NIH- BARDA challenge and an analogous United Kingdom innovation foundation competition called the Longitude Prize to help ensure these programs were designed to support different aspects of needed diagnostics. HHS has funded some studies to assess the extent to which testing patients to identify whether they have antibiotic-resistant infections leads to improved clinical outcomes, such as more effective treatment for patients or more judicious use of antibiotics. However, HHS has not identified relevant leadership, roles, and responsibilities among the HHS agencies that could fund such studies. Clinical outcome studies are important for encouraging the use of diagnostic tests for antibiotic resistance, among other things, because such studies can demonstrate the benefits of those tests. According to PACCARB, there is very limited information on why clinicians sometimes forgo diagnostic testing, but one possible explanation is that there may be limited data demonstrating the value of such testing. In the absence of such data, a clinician may choose to treat the patient immediately rather than using a test for antibiotic resistance that has unknown value. Research into the clinical outcomes associated with such testing could therefore be used to help promote the use of those resistance tests that are found to be beneficial. As a result, patient care could be improved and clinicians could be guided towards appropriate antibiotics to prescribe. Two HHS agencies have awarded grants for studies on the clinical outcomes of resistance testing, according to agency officials. For example, NIH provided grant support for a study that found, among other things, that using a rapid blood test for a range of potential bacteria and antibiotic resistance led to more judicious use of antibiotics. Similarly, officials from the Agency for Healthcare Research and Quality (AHRQ) stated that the agency is funding investigator-initiated grant studies to assess the impact of tests on antibiotic stewardship. However, agency officials only mentioned these and a few other examples of studies they have funded on clinical outcomes. International Needs for Diagnostic Tests for Antibiotic Resistance To better understand international needs for antibiotic resistance tests, we interviewed officials from international organizations and the Office of Global Affairs within the Department of Health and Human Services (HHS). A Public Health England official told us that United Kingdom users are not confident that these tests will have a clinical impact or be cost effective. Similarly, an official from a trade organization of British medical test manufacturers told us that the value of tests for antibiotic resistance needs to be captured and disclosed, especially because people are more willing to pay for treatment than for tests. However, other factors could also be important in determining which tests will be useful internationally. World Health Organization officials told us that they are working to determine what characteristics health care providers worldwide identify as key to making tests useful, so industry can develop such tests. They noted that tests designed for use in the United States may not be suitable for use in other countries. They also noted that laboratories in developing countries may not have the capacity to culture bacteria, so many need to use culture- independent tests. Office of Global Affairs officials told us that a big challenge is developing accessible tests for use internationally. Their ideal test would be inexpensive, rapid, and capable of point- of-care use. They noted that cost and usability are the barriers to test use, not technology, and that use of existing tests remains limited, including within the United States. Agency officials and experts agree that more needs to be done to evaluate clinical outcomes associated with use of diagnostic tests for antibiotic resistance. For example, in 2017, PACCARB reported that “there is a lack of clinical and economic outcome studies showing that any diagnostic test could prevent the emergence of antibiotic-resistant bacteria and would be cost effective.” Officials we interviewed from AHRQ, BARDA, CDC, FDA, and NIH all agreed with that PACCARB statement. Additionally, experts told us that such studies are lacking but important for advancing the use of tests. For example, one health care organization official told us the decision to adopt a test is based at least in part on whether there will be a clinical benefit. An infectious disease expert noted that to provide incentives for test use there needs to be some evidence that tests affect and improve care, but that most tests do not come with any evaluation of how they perform in practice. International organizations expressed similar opinions. One reason for the relatively low number of studies is that those agencies that could conduct or fund diagnostic outcome studies have not clearly identified leadership, roles, and responsibilities for doing so. Although they agree that more such studies are needed, they have not identified which agency or agencies should take the lead, and what the roles of the other agencies should be. Instead, agencies have offered differing views on what each agency could do. For example, BARDA officials told us their agency has not funded such studies because it generally does not play a role in test adoption. BARDA officials, as well as officials from DOD and NIH, said that CDC should play a role in funding or conducting the studies. However, CDC officials told us that a lack of resources has prevented their agency from doing so, and that the responsibility should fall at least partly on BARDA. Our previous work shows that key practices for interagency collaboration include identifying a lead agency (or, if leadership is shared, clearly identifying roles and responsibilities among the lead agencies), as well as clarifying the roles and responsibilities of all participating agencies. By taking these actions, agencies—including AHRQ, BARDA, CDC, FDA, and NIH—could more effectively address the need for clinical outcome studies. Those studies, in turn, could help demonstrate the value of diagnostic tests for antibiotic resistance, potentially increasing their use, improving patient care, and enhancing stewardship efforts. CMS and FDA have taken some steps to advance the use of tests, including those to identify antibiotic-resistant bacteria. For example, FDA established a Payor Communication Task Force, which helps facilitate communication between test manufacturers and payors. Such communication is important because payors decide whether tests will be covered by insurance, among other things. According to an FDA web page, by communicating with payors, test manufacturers could, for example, learn what data payors need to approve a test for coverage and then use this information to design clinical trials to provide that information. This process could reduce the time between when a test is cleared or approved by FDA and when it is covered. A similar step FDA and CMS took to advance the use of tests was to extend the Parallel Review program indefinitely, a move they announced in 2016. This program established a mechanism for FDA and CMS to simultaneously review clinical data, with the aim of reducing the time between FDA’s approval and CMS’s decision on whether to pay for the test. Experts told us challenges remain with test payments that may result in lower test use. For example, a PACCARB report states that “currently, for many diagnostic tests is not aligned with the value of the test,” and noted that supplementing payments for tests could drive test development and use. BARDA officials also told us that a major factor affecting adoption of new tests is the cost of the test relative to reimbursement. Additionally, experts, including those at our meeting, told us that test payments remain insufficient to encourage broad test use. For example, two experts from our meeting said that there is not always a clear link between the medical value of a test and the payment level for that test. One of these experts added that their laboratory decided not to adopt a test because low payment levels relative to costs made doing so a money-losing proposition. Three other experts we interviewed agreed that disparities between cost and payment can discourage test adoption. Regarding federal payments for tests involving CMS and their payments through Medicaid and Medicare, there are limits to CMS’s ability to address any disparities. For example, CMS officials told us the payments for some tests are based on a weighted, median, private-payor rates pursuant to the Protecting Access to Medicare Act of 2014, so CMS cannot specify the methodology used to set those rates. Further, for inpatient tests, Medicare pays hospitals a single, bundled payment per patient stay, which is based on multiple factors, including the patient’s diagnosis and treatment strategy, rather than on a specific service. As such, a separate payment for individual tests is not made under Medicare. FDA has taken steps toward the development of FDA-authorized tests for resistance for newly approved antibiotics—a process that currently can take months to years, according to experts and agency officials. The delay stems in part from the need for a critical testing threshold known as a breakpoint—the threshold that is used to help a clinician decide whether or not a pathogen is resistant to the antibiotic (see text box). The breakpoint of a new antibiotic is generally finalized only when FDA has approved the antibiotic. This means that breakpoints may often not be available for test manufacturers until after a new antibiotic is FDA- approved. As a result, test manufacturers generally may not be able to complete developing FDA-authorized culture-based tests for resistance to a specific antibiotic until after the antibiotic is commercially available. The result is that the development of such culture-based tests may be generally delayed even after the new antibiotic is approved by FDA. This delay could affect the ability of clinicians to treat patients. For example, according to an expert, such a delay could lead to underuse of a newly available antibiotic, among other things, because a clinician may not be willing to prescribe the antibiotic without test results to guide treatment. How Breakpoints Are Used to Interpret Tests According to officials from the Food and Drug Administration (FDA), breakpoints, also referred to as “susceptibility test interpretive criteria,” are used to define susceptibility and resistance to antibiotics to help guide patient care. Culture-based tests rely on breakpoints to provide a determination of resistance to clinicians. In the United States, breakpoints (based on clinical or microbiological data) are established by standards- development organizations such as the Clinical and Laboratory Standards Institute (CLSI) and FDA. One example of how breakpoints are used involves the Kirby-Bauer disk diffusion test. This test is conducted by spreading bacteria on a laboratory agar plate containing bacterial nutrients, and then placing paper disks containing a known amount of antibiotics on the “lawn” of bacteria. Plates are observed after overnight incubation to determine the extent of bacterial growth. Closer to the disk, there is a higher concentration of antibiotic, and the concentration declines with distance. Around most disks, there is a “zone of inhibition,” where the concentration of antibiotic is too high for bacteria to grow. After allowing the bacteria to grow for a defined period of time, the diameter of the zone of inhibition is measured in millimeters. Procedure for Assessing Antibiotic Resistance Using Breakpoints If the diameter is larger than or equal to the breakpoint, then the strain of bacteria is considered susceptible to the antibiotic, suggesting that the antibiotic can be used to treat infections caused by that strain. If the diameter is smaller than the breakpoint, then the strain is considered resistant, suggesting that the antibiotic should not be used. According to FDA, in most cases, there is a range of “intermediate” or “susceptible dose-dependent” diameters for which treatment might be effective. Other types of culture-based diagnostic tests for resistance have analogous breakpoints for interpreting the test. For example, the minimum inhibitory concentration—the lowest concentration of an antibiotic that prevents growth of bacteria—can be compared to a breakpoint to establish whether the bacteria are considered resistant. In addition to antibiotic developers waiting until FDA approves an antibiotic before a breakpoint is finalized, there are technical hurdles in developing a test for some new antibiotics, according to FDA officials. For example, it may be challenging for certain automated test manufacturers to address unique growth properties of certain bacteria in the presence of specific antibiotics or combinations of antibiotics. According to a test manufacturer, these hurdles include the need for additional studies, and such studies may not be straightforward because of the need to determine what clinical data FDA requires. In addition, in the case of automated tests, a representative from a test manufacturer association told us the software used to run and interpret a new test needs to be revised, which can be time consuming. The delay between approval of an antibiotic and the availability of a test for resistance could result in suboptimal treatment and increase burdens on the health care system. For example, one expert stated that during this delay, laboratories need to create or modify tests and then validate those tests instead of using a FDA-authorized test, which increases the time required and places demands on facility personnel and budgets. This expert added that to conduct validation studies, the laboratories need a variety of samples for testing, called “isolates,” which may not be available. A second expert said that the delay leads to both overuse and underuse of the new antibiotic: in the absence of a test, some clinicians will prescribe the antibiotic when it may be inappropriate, leading to overuse; some other clinicians refrain from prescribing the antibiotic, even if appropriate, leading to underuse. To help address this delay, FDA has created a process known as coordinated development, whereby test manufacturers can submit a coordinated development plan to FDA describing the test manufacturer’s intent to coordinate with the antibiotic manufacturer. The plan is submitted prior to, or shortly after, submission of an application to market a new drug. Under the coordinated development program, FDA shares breakpoint information from the antibiotic manufacturer with a prospective test manufacturer. It then reviews the test application at the same time as the antibiotic application and takes other steps to facilitate more timely clearance of the test. FDA officials told us this process has significantly reduced the delay between approval of the antibiotic and clearance of the test. Another FDA step to help test manufacturers speed development of tests is the establishment, in collaboration with CDC, of a centralized repository of bacterial strains with well-characterized antibiotic resistance profiles. These strains are available to test manufacturers and others to help them design, validate, and evaluate tests by checking that they give the correct results for bacteria whose profile of antibiotic resistance is known. Finally, FDA officials also said that they offer pre-submission advice, whereby a test manufacturer can ask for initial guidance on the design of clinical studies for their tests. In the United States, breakpoints are established and updated by organizations such as the Clinical and Laboratory Standards Institute (CLSI). After CLSI establishes a breakpoint, FDA may review and recognize the breakpoint, according to FDA officials. Test manufacturers rely on breakpoints recognized by FDA to support marketing authorization of their tests. An expert who works for CLSI identified more than 50 breakpoints that have not been recognized by FDA, and for which CLSI considers FDA recognition important in order to help make FDA-authorized tests available. Experts, including one from our meeting, cited the following examples of breakpoints needing recognition: CDC recommends a dual therapy of antibiotics—azithromycin and ceftriaxone—to be taken together to treat gonorrhea. However, FDA does not recognize any azithromycin breakpoints for N. gonorrhoeae, which an expert from our meeting told us could be a barrier to developing FDA-authorized culture-based tests for N. gonorrhoeae resistance to the recommended dual therapy. Colistin is an antibiotic used in hospitals because of its efficacy against carbapenem-resistant bacteria, according to one manufacturer of a test for colistin resistance. This manufacturer markets its test in many countries but not in the United States, because FDA does not recognize colistin breakpoints. FDA has taken some steps to address unrecognized breakpoints, which are a potential barrier to developing some tests for antibiotic resistance. For example, FDA officials told us that the agency conducts regular internal reviews of breakpoints. According to FDA officials, the agency reviewed the 2019 CLSI breakpoint standards and updated FDA’s website with changes to recognized breakpoints as of June 2019. FDA has been posting such updates since December 13, 2017. FDA also accepts public comments requesting the recognition of new breakpoints, according to agency officials. However, we found there was some confusion between CLSI officials and experts and the FDA involving the number of comments FDA could review each year, which FDA later clarified on its website. One expert at our meeting later told us that CLSI adjusts its process for submitting comments based in part on their understanding of FDA’s communication. This expert added that FDA making a public commitment to a specific number of comments they would review would help CLSI improve its planning. FDA officials told us there is no legal requirement for FDA to communicate the number of comments the agency can review, but that in previously published notices of opportunities for public comments, there was nothing that indicated there would be limits. However, after we informed FDA officials of concerns by experts regarding the number of comments FDA could review, FDA updated their webpage to clarify that they will review all submitted comments. FDA has taken limited steps to monitor whether FDA-authorized tests are using new breakpoints after these breakpoints are updated and accepted by FDA. Because bacteria can develop increasing resistance to antibiotics, it is sometimes important to change the breakpoints used for determining whether or not bacteria are resistant to a given antibiotic. Using tests with out-of-date breakpoints could result in misidentifying a resistant infection as non-resistant, which can lead to treating a patient with an ineffective antibiotic and the further spread of the infection. FDA officials told us the agency has taken limited steps to monitor the status of breakpoint updates, and that out-of-date breakpoints being used in tests should be a rare occurrence. In contrast, a CDC official told us that keeping tests updated is a significant concern. This official cited the example of carbapenem- resistant Enterobacteriaceae infection, which triggers specific procedures to limit the spread of these bacteria. If the test breakpoint is out of date, the infection may not be detected in a timely manner, and the pathogen could spread broadly as a result. A recent study looking at hypothetical scenarios in one U.S. county estimated that a 32-month delay in updating tests to match CLSI breakpoints for carbapenem-resistant Enterobacteriaceae would have resulted in an average of almost 2,000 additional carriers of these bacteria county-wide. Additionally, an expert told us that use of out-of-date breakpoints could lead to improper patient care, improper surveillance reporting, and slower detection of emerging resistance. However, the true impact of this issue is challenging to discern (see text box). The Extent of Any Negative Effects of Out-of-Date Breakpoints on Public Health Is Unclear Experts and agency officials voiced a range of opinions on the public health effects of tests with out-of-date breakpoints. For example, one Centers for Disease Control and Prevention (CDC) official told us that despite the lack of breakpoint updates, cases of a type of carbapenem-resistant Enterobacteriaceae were likely ultimately caught by hospitals because a second test was used by all but a small number of hospitals. One expert stated that how quickly test breakpoints are updated is less important when deciding what test to adopt than other factors, such as ease of use. However, another expert noted that laboratories addressing emerging threats may feel the need to use non-Food and Drug Administration (FDA) cleared tests, because they are aware that FDA-cleared tests may not be updated as quickly as needed. Test updates may be an issue for smaller laboratories, which do not have dedicated personnel keeping track of breakpoint revisions, Department of Veterans Affairs officials told us. FDA officials told us that because manufacturers are strongly motivated to keep their tests current, only a few tests have out-of-date breakpoints. However, the only confirmation FDA officials offered for this statement was to mention an unofficial internal survey of FDA’s database of existing tests, conducted in March 2019, which concluded that all FDA-authorized tests had implemented breakpoint updates made since December 13, 2017. They said this survey is not conducted regularly. They also stated that it is possible that some tests have not been updated to reflect breakpoint updates made prior to December 13, 2017, but that FDA is unaware of any such tests that also pose a public health threat. To assess the extent to which there are FDA-authorized tests using out- of-date breakpoints, we spoke with experts and stakeholders and reviewed studies they identified. We identified several FDA-authorized tests with breakpoints that were changed nearly a decade ago. Some of these tests could be used for diagnosing infection with carbapenem- resistant Enterobacteriaceae, which CDC identified as an urgent threat. One manufacturer told us that one of their tests has not been updated with new breakpoints nearly 10 years after a breakpoint revision. FDA officials acknowledged it is possible some FDA-authorized tests might continue to rely on outdated breakpoints. Further, in 2019, a scientific article listed four different test manufacturers offering tests that have not been fully updated to reflect revised breakpoints, including some affecting antibiotics for some types of carbapenem-resistant Enterobacteriaceae. Finally, CDC officials told us they asked hospital laboratories in a survey for 2017 and 2018 if they had updated their tests to reflect revisions in breakpoints for carbapenem-resistant Enterobacteriaceae that were implemented in 2010. According to CDC, nearly 1,000 of over 5,000 responding hospital laboratories had not implemented the revised breakpoints, and, of these, over 85 percent were using FDA-authorized tests. One CDC official stated that there is significant concern for patient safety associated with out-of-date breakpoints, and another said that there are few justifications for failing to update the tests after 8 years. FDA officials told us they have not received reports of suspected device-associated deaths, serious injuries, or malfunctions that are specific to out-of-date carbapenem-resistant Enterobacteriaceae breakpoints in FDA-authorized tests using such breakpoints. The officials added that it is possible to detect carbapenem-resistant Enterobacteriaceae under certain situations, even if the test had an out-of-date breakpoint for a given antibiotic against these bacteria. However, FDA does not know the actual negative effect, if any, of out-of- date breakpoints because it does not know how many FDA-authorized tests rely on such breakpoints. Since December 2017, FDA has conducted one unofficial survey of tests to assess breakpoint updates that was limited in scope and is not a regular event. Other than that, FDA is relying on market incentives to drive manufacturers to make sure their devices are updated. According to FDA and others, the extent of the problem is not clear. However, PACCARB identified updating test breakpoints as an important issue in a 2017 report. Additionally, one of the sub-objectives in the National Action Plan notes that rapid updating of breakpoints is essential to provide accurate information to guide appropriate drug treatment. Finally, the Standards for Internal Control in the Federal Government directs management to establish and operate monitoring activities to monitor its internal control systems and evaluate the results. In this case, monitoring and evaluation of the status of breakpoint updates in FDA-authorized tests could help FDA identify and address the National Action Plan sub-objective, as well as a strategic priority in the mission statement of its Center for Devices and Radiological Health: “FDA assures that patients and providers have timely and continued access to safe, effective and high-quality medical devices.” FDA officials said they do not believe the issue is a significant problem, but the agency has also not regularly evaluated any effects of using tests for antibiotic resistance with out-of-date breakpoints. FDA officials stated that there may be resource constraints to their ability to conduct regular monitoring and evaluation. By regularly monitoring and evaluating FDA-authorized tests, FDA would be better positioned to determine the extent of tests relying on out-of-date breakpoints and may be better positioned to provide assurance that patients and providers have timely access to safe and effective tests. Furthermore, by regular monitoring, FDA would be able to determine whether test manufacturers are updating breakpoints as needed, and help ensure that patient care and infection control efforts are effective. Experts, federal officials, and antibiotic developers have identified economic and other challenges to developing new antibiotics. Federal agencies, including HHS and DOD, have engaged in efforts to address some of the challenges; however, experts said these efforts are not sufficient and that additional federal incentives are needed to encourage the development of new antibiotics. Experts are concerned about a void in the discovery of new antibiotic classes and the current pipeline of antibiotics in development. According to The Pew Charitable Trusts, a nonprofit public policy organization that tracks the pipeline of antibiotics, no new classes of antibiotics approved for human use have been discovered since 1984. In addition, experts are concerned that the number of antibiotics in clinical development is insufficient to meet the threat of antibiotic resistance. For example, according to The Pew Charitable Trusts, only 42 antibiotics were in clinical development globally—meaning clinical trials were being conducted to test their safety and efficacy in humans—as of June 2019, and only 24 of them targeted bacteria on CDC’s or WHO’s priority lists. According to a recently published analysis, the authors found that the pipeline of antibiotics that target gram-negative bacteria is dominated by derivatives of existing classes of antibiotics and “does not sufficiently address the problem of extensively drug-resistant gram-negative bacteria”. For example, one study estimated the average cost per new molecular compound that received FDA approval between 2005 and 2013 to be $1.4 billion. See J. A. DiMasi, H. G. Grabowski, and R. W. Hansen, “Innovation in the Pharmaceutical Industry: New Estimates of R&D Costs,” Journal of Health Economics, vol. 47 (2016): pp. 20-33. Other studies suggest lower development costs. For example, another study estimated a median cost to develop cancer drugs of $0.6 billion. See V. Prasad and S. Mailankody, “Research and Development Spending to Bring Single Cancer Drug to Market and Revenues After Approval,” JAMA Internal Medicine, vol. 177, no. 11 (2017): pp. 1,569-1,575. for antibiotic-resistant infections have a narrow set of patients for whom the treatment would be appropriate. As a result of the perceived poor return on investment, many large pharmaceutical companies have discontinued their antibiotic development in recent years. In 2018, according to The Pew Charitable Trusts and other published sources, four large pharmaceutical companies worldwide had antibiotics in clinical development globally compared to 1990, when 18 were involved in antibiotic R&D. Two antibiotic companies declared bankruptcy in 2019; in the case of one, the company filed for bankruptcy only 10 months after its antibiotic, which targets resistant bacteria, received FDA approval. The majority of antibiotics in the development pipeline are being developed by smaller companies that do not have other drugs on the market to help cover their R&D costs. However, representatives from three small antibiotic developers we spoke with noted that their field is struggling because it is difficult to raise funds from private investors due to the low return on investment potential. with bacterial infections into certain clinical trials prior to initiating treatment can be difficult due to a lack of available rapid diagnostic tests to identify the type of infection and the urgent need to begin treatment immediately for acute infections. According to FDA officials, this is problematic for clinical trials because any prior treatment could obscure the true efficacy of the drug under investigation. Recognizing this often unavoidable issue, FDA has issued guidance giving antibiotic developers additional, but limited, flexibility with their clinical trial protocols in certain cases. Superiority trials, which aim to show that the drug being investigated is more effective than an existing drug. Non-inferiority trials, which aim to demonstrate that the difference between the effectiveness of the drug being investigated and an existing drug is small enough to show that the drug being studied is also effective. Typically, there are three phases of clinical trials, with the sizes of the trials increasing with each phase. FDA generally prefers that when conducting clinical trials, developers demonstrate the effectiveness of a new drug by showing its impact on a clinical endpoint— a direct measure of how a patient feels, functions, or survives. FDA also accepts surrogate endpoints, which are laboratory measures or physical signs used as a substitute for a clinical endpoint that reasonably predict a clinical benefit. developers told us that, for most antibiotics, it is difficult to conduct superiority clinical trials and more feasible to conduct non-inferiority trials, because the latter allows for smaller enrollment. (See side bar for an explanation of clinical trial types.) They told us that the inability to demonstrate their drug’s superiority limits their ability to market the drug, because it can be difficult to convince purchasers (e.g., hospitals) to choose the newly approved antibiotic over existing antibiotics, especially when the new antibiotic is significantly more expensive. Gaining approval for multiple indications. FDA generally approves drugs for a specific indication; therefore, antibiotic developers told us they tend to design their clinical trials around common infection types, largely because of the relative ease of enrolling patients. However, some antibiotics can treat infections in multiple parts of the body, which may not have been studied in a clinical trial. While providers are able to prescribe drugs for “off-label” use—that is, for a condition or patient population for which the drug has not been approved—they may lack information on the safety and efficacy of the drug for such use. In addition, such off-label use may not be reimbursed by the patient’s insurance. According to The Pew Charitable Trusts, there were 29 nontraditional antibacterial products in clinical development for the U.S. market in June 2019. Among the 29 products in the pipeline, nine were antibodies, seven were vaccines, seven were live biotherapeutic products, and six were other types of products. No bacteriophages were in clinical development. More than half of these products are for the treatment of Clostridioides difficile or Staphylococcus aureus infections. Experts, antibiotic developers, and federal officials also said it is scientifically challenging to develop new antibiotics that can overcome existing mechanisms of resistance. One expert at our meeting explained that it is necessary to develop an antibiotic that works differently than existing antibiotics so that bacteria are not resistant to it. In particular, experts and federal officials have noted that it is challenging to develop antibiotics that can kill certain types of bacteria, called gram-negative bacteria, largely due to their double membrane that makes it difficult for antibiotics to enter the bacterial cell, and to pumps that can remove the drug once it enters. Three antibiotic developers we spoke to explained that as bacteria continue to evolve new ways to resist antibiotics, it is difficult for scientists to keep pace by developing new treatments that can overcome those mechanisms. In addition, experts noted that scientists have already discovered most of the antibiotics from known sources, such as soil. As a result, scientists are now exploring new sources of chemicals with antibiotic properties, such as insects. As the rate of antibiotic discovery has slowed, scientists have also begun to explore alternatives to traditional antibiotics—which we call “nontraditional products” in this report. Many types of nontraditional products are currently being researched and developed to treat antibiotic- resistant infections, including, among others, live biotherapeutic products, antibodies, and bacteriophages. For example, one type of nontraditional product in use for the treatment of recurrent C. difficile- associated disease—which causes diarrhea, abdominal cramps, and an estimated 15,000 deaths in the United States each year, according to CDC—is fecal microbiota for transplantation, more commonly known as fecal transplants. (See text box.) However, scientists and companies researching and developing certain types of nontraditional products face development challenges. For example, according to a paper written by BARDA officials and others, certain types of nontraditional products target only one or a few types of bacteria, which makes enrollment of patients in clinical trials difficult and potentially cost-prohibitive. The authors also stated that additional research is needed to evaluate side effects and measure the efficacy of some types of nontraditional products. According to another published paper, more than half of the nontraditional products in development are intended to be used concurrently with a traditional antibiotic, and it can be difficult to demonstrate the additional clinical benefit of adjunctive therapies in clinical trials. The authors also noted that additional clinical trial endpoints still need to be developed and validated for such nontraditional products. Fecal Transplants The goal of a fecal transplant—which involves collecting stool from healthy donors and transferring it to patients via enema, oral capsule, or another modality—is to restore a healthy gut microbiome for recipients. According to the National Institutes of Health (NIH), multiple research studies have indicated that these transplants are effective, but their long-term safety has not been established. Questions remain about the Food and Drug Administration’s (FDA) policy regarding stool banks that collect, prepare, and distribute fecal transplant products. FDA issued guidance in 2013 indicating its intention to exercise enforcement discretion regarding Investigational New Drug requirements for the use of fecal transplants to treat Clostridioides difficile infections, provided that the treating physician obtained adequate consent from the patient or his or her legally authorized representative. In other words, FDA’s guidance indicated it would not require fecal transplant products to satisfy the Investigational New Drug requirements— which refer to the requirements for FDA’s approval before beginning clinical trials to test a product on humans. [FDA, Enforcement Policy Regarding Investigational New Drug Requirements for Use of Fecal Microbiota for Transplantation To Treat Clostridium difficile Infection Not Responsive to Standard Therapies; Guidance for Industry; Availability, 78 Fed. Reg. 42965 (Jul. 18, 2013).] However, FDA later issued draft guidance in 2016 stating that FDA did not intend to extend enforcement discretion with respect to the Investigational New Drug requirements applicable to stool banks distributing fecal products. [FDA, Enforcement Policy Regarding Investigational New Drug Requirements for Use of Fecal Microbiota for Transplantation To Treat Clostridium difficile Infection Not Responsive to Standard Therapies; Draft Guidance for Industry; Availability, 81 Fed. Reg. 10632 (Mar. 1, 2016).] FDA has not finalized the 2016 draft guidance, which leaves the final guidance from 2013 as the current policy. According to FDA, the agency received many comments from patients and industry groups in response to the 2016 draft guidance expressing concern about the effect that the requirement for clinical trials would have on access to these products. In March 2019, FDA officials told us they were still reviewing comments to the 2016 draft guidance and were unable to say whether or not it would be finalized. In November 2019, FDA held a public hearing to obtain further input on the use of fecal transplants to treat C. difficile infection not responsive to standard therapies and to better understand the effect of FDA’s enforcement policy on product development. Multiple federal agencies have supported the development of new antibiotic treatments, including providing funding for antibiotic R&D, issuing guidance related to antibiotic clinical trials, and implementing Medicare payment mechanisms. Agencies have made available both “push” incentives, which directly support antibiotic R&D, and “pull” incentives, which offer financial benefit, either directly or indirectly, to developers of successful antibiotics after they reach the market. Federal funding for antibiotic R&D. Several federal agencies award grants or contracts, create public-private partnerships, or use other approaches to provide researchers the funding for R&D of new treatments for antibiotic-resistant infections (see table 3). This type of pre- market R&D support is considered a “push incentive.” See appendix III for additional examples of efforts to support antibiotic R&D by NIH and DOD. Among the products in the CARB-X portfolio, 12 would represent a new antibiotic class (if approved) and 14 target a novel molecular bacterial target. Awardees were based in six countries. Issued guidance to support clinical trials. FDA has implemented programs and issued guidance that help address some regulatory challenges and encourage antibiotic development. In 2012, through the Generating Antibiotic Incentives Now provisions of the Food and Drug Administration Safety and Innovation Act, Congress created the Qualified Infectious Disease Product (QIDP) designation. Drugs that FDA designates as QIDPs, which include antibiotics and antifungals, may qualify for 5 years of additional exclusivity and fast-track or priority review designation during the FDA review process. The additional exclusivity conferred to QIDP designees is a type of “pull incentive,” because it offers the potential for enhanced financial gain after a drug receives FDA approval and reaches the market. According to FDA officials, as of September 2019, FDA had granted 192 QIDP designations, 24 of which it has approved for marketing. Also in response to the Generating Antibiotic Incentives Now Act, FDA released final guidance in August 2017 to streamline clinical development of antibiotics for patients with an unmet medical need—that is, those with a serious bacterial disease that has few or no treatment options. FDA explains in this guidance that it may consider drugs for these patients that have higher risks than would be acceptable for a broad patient population and provides information on types of antibiotics that could be eligible for approval based on smaller, shorter, or fewer—as few as only one— clinical trials. The 21st Century Cures Act required FDA to establish a Limited Population Pathway for Antibacterial and Antifungal Drugs (LPAD). In June 2018, FDA issued draft LPAD guidance, as required by the Act. Under LPAD, eligible products—which are drugs and biologics intended to treat a serious or life-threatening infection in a limited population of patients with unmet needs—may follow a streamlined development program, similar to the approaches described in its earlier unmet medical need guidance. A biotechnology association noted in its public comments to the draft LPAD guidance the need for FDA to issue additional guidance to clarify its expectations for acceptable types of efficacy data when clinical trials are small and to clarify its interpretation of a “limited population of patients” for the purpose of the LPAD pathway. An expert who attended our meeting later told us there is a great need to address how to develop narrow-spectrum antibiotics—those designed to treat a single or small number of bacterial pathogens—using LPAD. FDA held a public meeting in July 2019 to solicit stakeholder comments on the draft LPAD pathway guidance, and FDA officials told us they expect to finalize the guidance by February 2020. However, as of March 17, 2020, FDA had not yet issued final guidance. In addition to issuing guidance, and to help inform future guidance, FDA engages with industry stakeholders to discuss and identify possible solutions to challenges related to the clinical development of antibiotics and nontraditional products. For example, FDA has held multiple public workshops, including one in November 2019 with experts from NIH’s National Institute of Allergy and Infectious Diseases, the Infectious Disease Society of America, and The Pew Charitable Trusts to better understand the current state of antibiotic clinical trials in the United States, and how to enhance enrollment and research in these trials. FDA officials told us they believe it is too early to issue guidance that would be broadly applicable and useful to nontraditional product developers. They explained that for certain types of nontraditional products, the approaches and specifics of product development are varied and evolving quickly. Instead, FDA’s Center for Biologics Evaluation and Research has a program in place that allows developers to meet with FDA prior to beginning clinical trials to obtain advice on a wide range of development-related topics. Implemented Medicare payment mechanisms. CMS uses Medicare payment mechanisms to help increase reimbursement to hospitals for certain antibiotics. For qualifying antibiotics, these payments are a form of indirect pull incentive because they have the potential to increase the demand for the new antibiotics after they reach the market, which could in turn improve their financial performance. Beginning in fiscal year 2020, CMS updated how it will pay hospitals for treating Medicare patients who have an antibiotic-resistant infection. Specifically, CMS changed the eligibility criteria and payment amount for antibiotics that qualify for “new technology add-on payments” and how it pays hospitals for treating Medicare patients with antibiotic-resistant infections. These payment changes are: Revised eligibility criteria for and amount of add-on payments. New technology add-on payments provide hospitals with additional compensation for a period of 2 or 3 years when they use qualifying new technologies or drugs that offer substantially improved clinical treatment, and when regular Medicare payments for the hospital stay are inadequate to cover the cost of the new technology or drug. Generally, medical services and technologies must be new and must demonstrate a substantial clinical improvement over existing services or technologies to receive the additional payment. However, CMS has acknowledged the difficulty antibiotic developers face in demonstrating such substantial clinical improvement due to manufacturers seeking FDA approval for most antibiotics on the basis of noninferiority clinical trials, as described above. To make it easier for antibiotics to qualify for the additional payments, under the revisions to the CMS payment policy beginning in fiscal year 2021, CMS will consider all antibiotics with a QIDP designation from FDA to be “new” for purposes of the add-on payment, and these antibiotics will not have to meet the substantial clinical improvement criteria. In addition, CMS has increased the amount of the temporary add-on payment for qualifying antibiotics. Prior to this change, the add-on payments for qualifying antibiotics were limited to 50 percent of the cost of the drug. Under the new policy, the payment percentage increased to a maximum of 75 percent of the cost of the drug. CMS has specified that two antibiotics are eligible for new technology add- on payments in fiscal year 2020. Increased payment for hospital stays. CMS changed the severity level designation for certain antibiotic resistance-related diagnosis codes, in recognition of the added clinical complexity and cost of treating patients with antibiotic resistance. This change in severity level can result in higher payments to hospitals when treating patients diagnosed with antibiotic resistance, which, according to the Administrator of CMS in an August 2019 blog post, will create “financial flexibility for physicians to prescribe the appropriate new antibiotics.” The Administrator also noted that CMS made this policy change because it recognized that new technology add-on payments are temporary and “further action was needed to realign financial incentives for antibiotics for the long-term.” See appendix III for additional examples of efforts to support antibiotic R&D by these and other federal agencies. Experts and antibiotic developers told us that the economic challenges have remained despite the available federal push and pull incentives for antibiotic R&D. Currently available premarket push incentives include grants and awards from NIH and BARDA that fund antibiotic R&D; currently available postmarket pull incentives include the additional market exclusivity available through QIDP designation and Medicare add- on payments for antibiotics. (See fig. 3.) Both of the antibiotic companies that declared bankruptcy in 2019 had received push incentives from BARDA and pull incentives through Medicare New Technology Add-on Payments and the QIDP 5-year extension of market exclusivity. While experts at our meeting and antibiotic developers told us that push incentives have been helpful, they also said push incentives alone are not sufficient to sustain antibiotic development. For example, two antibiotic developers we spoke with explained that push incentives have provided needed funding for conducting R&D, but said that push incentives will not help cover the costs they will incur after their drug reaches the market— for example, to manufacture and market their product. Experts and antibiotic developers have indicated that the effects of the existing pull incentives, QIDP market exclusivity, and Medicare add-on payments on stimulating development of new antibiotics have been limited for the following reasons: QIDP and market exclusivity. As we previously reported, several pharmaceutical companies told us that the market exclusivity incentive may not stimulate the development of new antibiotics, because the extension is unlikely to extend past the typical patent life of a new drug. In addition, a representative from The Pew Charitable Trusts said that, while the passage of the Generating Antibiotic Incentives Now Act initially bolstered private investments in antibiotics, it did not ultimately stabilize the pipeline of antibiotics in development, noting that since then, several large pharmaceutical companies have discontinued their antibiotics R&D programs. Medicare updates to hospital payments. While CMS recently increased new technology add-on payments for certain antibiotics beginning in fiscal year 2020 to help improve access to antibiotics, these payments are limited to antibiotics used to treat Medicare patients. In addition, although Medicare increased the add-on payment amount to up to 75 percent of the estimated costs of qualifying antibiotics in excess of the regular Medicare payment, hospitals could still face costs for providing these drugs that are not covered by the Medicare payment. Furthermore, representatives from an antibiotic company and a biotechnology trade association told us the add-on payments do not directly incentivize hospital pharmacies to purchase the drug, because the add-on payment may not flow back to the pharmacy department’s budget. For these reasons, it remains to be seen whether the Medicare new technology add-on payments to hospitals for inpatient antibiotics will help improve the return on investment for antibiotic developers and further stimulate the antibiotic development pipeline. Similarly, it remains to be seen how CMS’s policy change that provides increased payments for hospital stays when Medicare patients have been diagnosed with certain types of antibiotic-resistant infections will affect hospitals’ use of new antibiotics. In light of the limitation of existing incentives for antibiotic development, experts, federal officials, and antibiotics developers have called for additional postmarket pull incentives to reinvigorate the pipeline of antibiotics under development. For example, PACCARB issued recommendations to the Secretary of HHS in September 2017 and July 2019 for the adoption of pull incentives, calling for the development of market entry rewards and options for plausible business models. In addition TATFAR—of which officials from BARDA, CDC, FDA, and NIH are members—reported that it is critical to develop a pull incentive strategy now to ensure that enough antibiotics are available in the future. Former FDA Commissioner Dr. Scott Gottlieb also stated in 2018 that he was “deeply concerned that without stronger pull incentives that encourage more R&D, we’ll see a far less robust pipeline of products than we need to address antimicrobial resistance.” Eight of the antibiotic developers we interviewed told us they think additional financial incentives are needed. For example, one developer said that sales revenues from antibiotics will never be sufficient to justify R&D investments, and another noted that financial incentives are needed during the first few years after a new antibiotic reaches the market to cover not only these costs, but also to conduct additional clinical trials to help expand the drug’s possible market. Finally, several experts at our expert meeting noted that, without pull incentives, most of the small companies currently developing antibiotics are unlikely to survive, and large pharmaceutical companies will likely continue to exit the antibiotic market. Advisory groups and others have identified multiple options for how postmarket pull incentives could be designed, including market entry rewards—either in the form of lump sum payments or transferable vouchers that could be sold to confer additional market exclusivity to other pharmaceutical drugs—or reimbursement reform, such as licensing arrangements or add-on payments for hospital-administered antibiotics. (See fig. 4.) The four advisory groups whose papers we reviewed each recommended market entry rewards as effective pull incentive options. While Commissioner of the FDA, Dr. Scott Gottlieb proposed an antibiotics licensing arrangement, which he called a subscription model, in a 2018 speech. Views on the utility of reimbursement reform as a pull incentive strategy are mixed. For example, representatives from The Pew Charitable Trusts stated their view that, while CMS’s recent changes to Medicare payment for antibiotics will likely be helpful to some degree, no reimbursement policy on its own would be able to increase antibiotic sales revenues sufficiently to transform the business model for antibiotics. An antibiotic developer we spoke to also told us that reimbursement policies would not be sufficient to support their business model because of low sales volumes for new antibiotics. The developer explained that it can take 2 or 3 years of antibiotic sales to recoup their R&D costs and finance their ongoing business operations, and that while larger pharmaceutical companies can rely on other profitable drugs to offset those costs, they could not because they did not have other drugs on the market. However, a representative from a biotechnology trade association told us that increasing reimbursement could help alleviate some of the economic challenges faced by developers of antibiotics that are already on or about to reach the market while policy makers explore longer-term pull incentive strategies. TATFAR cautioned that simply increasing reimbursement for antibiotics could potentially limit patient access, particularly for patients without health insurance—including those in low-and middle-income countries—and it could incentivize only antibiotics for common types of infections with a large market potential, rather than for rare, yet dangerous, types of pathogens. Advisory groups and others have evaluated potential market entry reward models, taking into consideration factors such as format, value, funding sources, and eligibility criteria. Some have proposed that receipt of a market entry reward should be delinked, fully or partially, from sales revenues—that is, the developer would have to forgo some or all sales revenue as a condition of receiving the reward. Proponents of delinkage believe that separating revenues from antibiotics sales volumes would discourage aggressive sales that could lead to overuse. An expert who attended our meeting later told us that policies to incentivize use of new antibiotics must be balanced with policies to monitor prescribing of new drugs to prevent inappropriate use. Generally, advisory groups stipulate that to maximize the public health benefit, only antibiotics that treat what are deemed to be high priority bacteria should be eligible for a reward. Specific recommendations and conclusions included the following: TATFAR concluded in 2017 that a partially delinked market entry reward of approximately $500 million would be the least disruptive option but noted that additional assessment would be necessary to select the most appropriate model and determine governance and other design elements. PACCARB expressed support for a delinked model, in which a company accepting a market entry reward would be required to forgo marketing activities and profits based on sales volume. In addition, they suggested the establishment of an antibiotic incentive fund supported by an antibiotic usage fee or the sale or auction of transferable exclusivity vouchers as plausible options for financing pull incentives. The Duke University Margolis Center for Health Policy recommended in 2017 a delinked, public-private market entry reward model. This model was comprised of publicly funded market entry rewards for qualifying antibiotics for the first 5 or 6 years, followed by privately funded “value-based” contracts between antibiotic developers and health care payors, in which the payor could agree, for example, to pay a predetermined amount for full access to the antibiotics for a given population. The Duke-Margolis Center proposal did not specify a funding source, but it noted multiple options for consideration, including general government funds, antibiotic use taxes, or the sale of transferable exclusivity vouchers. The European DRIVE-AB project recommended in 2018 an internationally funded, partially delinked market entry reward valued at approximately $1 billion per antibiotic, paid over the course of 5 or more years. Recipients of a market entry reward would be allowed to sell their drug on the private market, but they would agree to certain marketing restrictions to discourage inappropriate use. HHS may need to request authority and appropriations to create and implement certain types of market entry rewards. For example, HHS does not currently have authority to offer transferable exclusivity vouchers to antibiotic developers, since that would require a change in statute. Advisory groups also noted that the various pull incentive approaches would require additional public or private expenditures and offered possible sources of funding. For example, in addition to general fund revenues, PACCARB suggested that pull incentives could be funded through antibiotic usage fees, the auctioning of transferable exclusivity vouchers, or by allowing developers of new antibiotics to earn a transferable exclusivity voucher. The Duke-Margolis Center suggestions included funding market entry rewards through a yearly per-member fee for all health insurance plans. Transferable exclusivity vouchers may not require an independent funding source, because the value of the reward is based on the sale of the voucher to another drug developer. However, vouchers would still increase public and private health care expenditures, because expenditures would likely increase for drugs for which the extra period of exclusivity was purchased due to the delayed entry of lower- priced generics. Finally, reimbursement reform could increase health care expenditures for health care payors, including Medicare and private health insurance carriers. Although PACCARB, TATFAR, and other experts have called for additional postmarket pull incentives to increase the antibiotic pipeline, as of January 2020 HHS has not developed a strategy for creating these incentives. HHS officials told us that the department created an interagency workgroup within HHS in spring 2019 to identify possible pull incentive options, among other things. The recently convened HHS interagency workgroup is a step in the right direction toward exploring options for new antibiotic development incentives. Through this workgroup, HHS has an opportunity to determine which types of postmarket incentives it believes would most effectively incentivize the development of new treatments for antibiotic-resistant infections. However, it is unclear whether the HHS interagency workgroup’s efforts will include consideration of such incentives because, according to HHS officials in January 2020, the interagency workgroup was still considering possible recommendations for HHS leadership and had not produced any specific documents to share with us. The Government Performance and Results Act of 1993 (GPRA) and the GPRA Modernization Act of 2010, which significantly enhanced agencies’ responsibilities under GPRA, include principles for federal agencies to consider related to developing strategies for achieving results, among other principles. We have previously reported that these principles can serve as leading practices for planning at lower levels within agencies, such as individual programs or initiatives. Our past work has shown that strategic frameworks can serve as a basis for guiding policy makers, including congressional decision makers and agency officials, when making decisions about resources, programs and activities, particularly in relation to issues that are national in scope, such as antibiotic development. Developing a strategic framework that outlines new postmarket pull incentives and their key design elements—such as monetary value, eligibility criteria, and guidelines to prevent overuse— would be a first step toward identifying potential authorities and resources that may be needed to create the incentives, and toward determining agency roles for implementation and oversight of the incentives. Until such incentives are developed, more drug companies may exit the antibiotic development sector, and the pipeline of new treatments for antibiotic-resistant infections may continue to decrease. Furthermore, the current significant federal investment in push incentives to support antibiotic R&D will remain a high-risk enterprise, if companies receiving large R&D grants are unable to sustain their business once their treatment reaches the market. Federal agencies have undertaken several efforts to promote the appropriate use of antibiotics through stewardship programs and activities. However, four key challenges remain that have limited this progress. To promote the appropriate use of antibiotics across health care settings through antibiotic stewardship programs and activities, federal agencies have undertaken several efforts that aim to reduce inappropriate antibiotic use, reduce health care costs, improve patient outcomes, and combat antibiotic resistance. Selected examples of these efforts are discussed below. (For more detailed information on agencies’ efforts to promote the appropriate use of antibiotics, see app. IV.) Federal agencies require certain types of health care facilities to implement antibiotic stewardship programs, as follows: CMS. In September 2019, CMS finalized new health and safety requirements for hospitals and critical access hospitals to implement antibiotic stewardship programs by March 30, 2020, as a condition of their participation in the Medicare and Medicaid programs. Under these requirements, hospitals and critical access hospitals are required, among other things, to implement these programs facility- wide (which includes emergency departments) and to adhere to nationally recognized antibiotic prescribing guidelines. Nearly 3 years prior, CMS published similar requirements for nursing homes and skilled nursing facilities—collectively known as long-term care facilities—to establish antibiotic stewardship programs by December 4, 2017. Experts, including those at our meeting and the PACCARB, credit these requirements with being a powerful lever for promoting the appropriate use of antibiotics; Medicare comprises a significant portion of the nation’s health care expenditures—$741 billion in 2018, covering 59.9 million beneficiaries. DOD. DOD published a policy, effective October 2017, requiring the establishment of antibiotic stewardship programs within its military medical treatment facilities and, one year later, issued guidance for implementation. Among other things, the policy specified that these facilities’ antibiotic stewardship programs include components such as (1) leadership commitment by each facility; (2) accountability; (3) pharmacy expertise, including antibiotic prescribing and use evaluation; (4) implementation of action for change that would demonstrate commitment to the program; and (5) training for clinicians regarding antibiotic resistance and prescribing practices. DOD officials told us that all of these facilities (both inpatient and outpatient) were in different stages of implementing the antibiotic stewardship policy. VA. In January 2019, VA updated its 2014 policy directive for the implementation and maintenance of antibiotic stewardship programs in its health care facilities, which provide both inpatient and outpatient services to veterans. This policy directive includes requirements for its facilities to develop a written policy, conduct an annual evaluation of stewardship activities, ensure that adequate staff and resources are in place, and identify medical and pharmacy personnel as stewardship “champions.” According to department officials, VA has successfully implemented antibiotic stewardship programs in all of its health care facilities. CMS has developed incentives for eligible clinicians in any type of health care facility to improve antibiotic use and stewardship, as part of the agency’s broader efforts to improve care for Medicare patients. Through the Merit-based Incentive Payment System (MIPS) launched in 2017, CMS offers hundreds of quality measures and nearly 100 “improvement activities” on a wide range of topics—including the appropriate use of antibiotics—on which eligible clinicians can choose to report their performance to the agency. CMS then adjusts payments higher for clinicians who report data and achieve a performance-based, final score above a certain threshold—and penalizes clinicians who do not achieve that threshold with lower payments. Federal agencies have published guidance for health care facilities on how to implement antibiotic stewardship, as follows: AHRQ. Through a 5-year nationwide project, the AHRQ Safety Program for Improving Antibiotic Use has provided technical assistance and CDC’s guidance to hospitals, long-term care settings, and physicians’ offices to promote implementation of antibiotic stewardship activities and help clinicians select optimal antibiotic treatment regimens. In December 2018, AHRQ completed implementation of this guidance in more than 400 hospitals, which included six DOD facilities and 79 critical access hospitals, according to AHRQ officials. CDC. Since 2014, CDC has published a series of guidance documents—called the Core Elements of Antibiotic Stewardship (Core Elements)—to promote the appropriate use of antibiotics in health care. The Core Elements are tailored to hospitals, nursing homes, outpatient settings, small and critical access hospitals, and low- and middle-income countries with limited resources. Common elements in these guidance documents include (1) leadership commitment, (2) implementation of policies and interventions to improve antibiotic use, (3) tracking and reporting antibiotic use, and (4) education to providers on appropriate antibiotic use. For more information on MIPS, see GAO, Health Care Quality: HHS Should Set Priorities and Comprehensively Plan Its Efforts to Better Align Health Quality Measures, GAO-17-5 (Washington, D.C.: Oct. 13, 2016) and Medicare: Small and Rural Practices’ Experiences in Previous Programs and Expected Performance in the Merit-based Incentive Payment System, GAO-18-428 (Washington, D.C.: May 31, 2018). other sources. In particular, CDC has focused its efforts to expand antibiotic use data collection from hospitals, where an estimated one in two patients receives an antibiotic for at least one day during an average hospital stay. CDC launched its AU Option in 2011 as a voluntary, electronic reporting tool added on to the pre-existing NHSN. The AU Option allows the nation’s 6,849 hospitals that are already reporting to the NHSN to submit their antibiotic use data in a standardized format. CDC then aggregates such data to calculate national benchmarks and allows hospitals to compare their actual antibiotic use against those benchmarks. In addition, CDC has periodically conducted prevalence surveys through the EIP to gather data on health care-associated infections and antibiotic use in about 200 hospitals and 161 nursing homes in 10 states. With regard to outpatient settings, CDC has acquired, through a proprietary source, 8 years of pharmacy data on antibiotic prescriptions since 2011, which the agency is using to better characterize patterns in outpatient prescribing and to develop targeted interventions for high-prescribing areas. Federal agencies have developed training on antibiotic stewardship, as follows: CDC. In 2018, CDC launched a free, online training course for various types of clinicians—including physicians, dentists, pharmacists, physician assistants, and nurses—to inform them about proper antibiotic prescribing and strategies for communicating with patients. Clinicians can receive credit for partial completion (at least 50 percent) or full completion of this training as improvement activities under MIPS in 2019. CMS. CMS has provided training, technical assistance, and other learning opportunities to more than 4,000 hospitals, 2,400 nursing homes, and 7,600 outpatient settings on best practices for antibiotic stewardship and guidance on C. difficile prevention. In addition, CMS and CDC have developed and launched free, online training to help nursing homes implement antibiotic stewardship and prevent and manage C. difficile infections. DOD and VA. These departments have also offered antibiotic stewardship training to their health care facilities through webinars, workshops, or briefings. Federal agencies have funded research on antibiotic stewardship, as follows: AHRQ. Since 2015, AHRQ has increased its support for research to develop improved methods to combat antibiotic resistance and promote antibiotic stewardship, including through grants for research that will total more than $57 million, according to AHRQ officials. This research includes studies on the role of diagnostic tools in improving antibiotic use and reducing antibiotic resistance. AHRQ has also published numerous research studies on antibiotic or antimicrobial stewardship that the agency funded or authored. CDC. CDC supports research to identify, develop, and implement practices to stop the spread of resistance and to promote appropriate use of antibiotics in health care. CDC also supports research to fill gaps in knowledge related to aspects of antibiotic use and resistance that have public health impact. According to agency officials, CDC has provided approximately $110 million since 2016 to support this research through cooperative agreements and contracts. In 2017, CDC revised a national campaign to promote public awareness about appropriate antibiotic use. The campaign, called “Be Antibiotics Aware: Smart Use, Best Care,” is aimed at both health care providers and the general public and refines the message from CDC’s earlier campaign (“Get Smart: Know When Antibiotics Work”). HHS’s Office of Global Affairs has collaborated with other countries, including those participating in the TATFAR program, to promote the appropriate use of antibiotics internationally. In addition, CDC and the Office of Global Affairs launched the Antimicrobial Resistance Challenge at the United Nations General Assembly in September 2018 to catalyze global action against antibiotic resistance. A year later, CDC announced this challenge had resulted in nearly 350 commitments from government health officials, pharmaceutical and health insurance companies, and others from 33 countries to make formal commitments that further the progress against antimicrobial resistance, such as by improving appropriate antibiotic use. We identified four key challenges that have limited progress in federal efforts to promote the appropriate use of antibiotics, based on our analysis of documents, interviews with agency officials and experts, and other information. First, federal requirements for antibiotic stewardship programs apply only to certain types of health care facilities, and federal incentives for clinicians to adopt antibiotic stewardship activities are optional, limiting implementation of antibiotic stewardship across the health care spectrum. Second, CDC faces challenges in collecting complete antibiotic use data, limiting the agency’s ability to monitor and improve antibiotic use. Third, the CARB Task Force has not identified and reported on agencies’ plans to address the challenges related to expanding antibiotic stewardship programs and antibiotic use data collection across health care settings, so these plans are not publicly known. Fourth, antibiotic stewardship training for health care providers may have limited success in improving antibiotic prescribing behavior, and federal agencies indicate that it is challenging to evaluate the effectiveness of such training. Federal requirements for antibiotic stewardship programs are limited to certain types of health care facilities, and federal incentives for antibiotic stewardship activities are optional and limited to eligible Medicare clinicians, such as physicians. Federal requirements for antibiotic stewardship programs are limited to certain types of health care facilities. As previously noted, federal requirements for antibiotic stewardship programs are currently limited to hospitals and critical access hospitals, long-term care facilities such as nursing homes, and DOD and VA health care facilities. However, CMS has not yet developed requirements for ambulatory surgery centers or dialysis centers to implement antibiotic stewardship programs, which the National Action Plan called for being implemented by March 2018. CMS officials told us that the agency would develop those requirements once the rule for hospitals and critical access hospitals—which was delayed—was finalized. In addition, CMS’s health and safety requirements do not extend to other types of outpatient settings—such as physicians’ offices, retail clinics, and urgent care centers—where inappropriate antibiotic use has been found to be high. In the absence of regulatory levers, CDC and AHRQ encourage those types of facilities to establish antibiotic stewardship programs on a voluntary basis. Experts, including those at our meeting, indicate that expansion of antibiotic stewardship across the health care spectrum is likely to remain limited without additional federal requirements or other meaningful incentives—thus hindering the nation from fully achieving the benefits of appropriate antibiotic use. Such benefits include better patient outcomes, lower health care costs, and slower growth of antibiotic resistance. CMS incentives for clinicians to improve antibiotic use are optional, and implementation has been limited. The MIPS program’s effect on incentivizing appropriate use of antibiotics is limited, in part, because the incentives are available only to clinicians who meet MIPS eligibility criteria and because eligible clinicians can choose not to report data to CMS. In addition, participating clinicians have a wide range and number of quality measures and improvement activities, beyond those related to antibiotics, from which the clinicians can choose to report data to CMS to meet program requirements; thus, the likelihood that clinicians will choose to report on antibiotics- related measures or activities may remain low. For example, in 2017, MIPS-eligible clinicians were generally required to select and submit data to CMS on six out of 271 available quality measures; we identified nine of those measures as being related to antibiotics. MIPS-eligible clinicians were also generally required to select and submit data that year for up to four out of 93 available improvement activities; we identified one such activity as being related to antibiotics. Our analysis of CMS data on MIPS participation in 2017, the program’s first performance year and the most recently available data, indicates that implementation of the antibiotics-related quality measures and improvement activities was limited. According to a CMS report, a total of 1,057,824 clinicians were eligible for MIPS in 2017, of which 1,006,319 clinicians, or 95 percent, reported data. Based on our analysis of data contained in the CMS report’s appendix, the number of 2017 MIPS-participating clinicians who reported to CMS on the nine antibiotics-related quality measures ranged from 844 clinicians to 33,631 clinicians; the measure on appropriate treatment for children with an upper respiratory infection was the most reported antibiotics-related measure. By contrast, the most frequently reported quality measures overall in 2017 were controlling high blood pressure (510,723 clinicians), preventive care and screening for tobacco use (492,357), and breast cancer screening (473,819). CMS’s data also show that for the 2017 MIPS improvement activities, 47,645 of the 1,006,319 participating clinicians reported on the one improvement activity related to antibiotics that year: implementation of an antibiotic stewardship program. Specifically, this activity referred to implementation of an antibiotic stewardship program that measured the appropriate use of antibiotics for several different conditions (upper respiratory infections in children, pharyngitis, and bronchitis in adults), according to clinical guidelines for diagnostics and therapeutics. CDC’s ability to monitor and improve appropriate antibiotic use is limited by challenges it faces in collecting complete antibiotic use data across health care settings. According to CDC, experts we interviewed, and documents we reviewed, more data are needed to identify the extent of antibiotic use, including inappropriate use. In turn, CDC and experts say that more antibiotic use data would enable health care providers, federal agencies, and others to identify and target areas for improvement, track results over time, and adjust antibiotic stewardship activities as needed. We have also previously reported that monitoring antibiotic use over time in both inpatient and outpatient settings is important for understanding patterns in antibiotic resistance and for targeting stewardship activities. In addition, WHO notes that data on global antibiotic use is essential for obtaining a comprehensive picture of antibiotic resistance and for identifying areas where actions are needed. Despite progress in collecting antibiotic use data (as previously discussed), CDC faces several challenges in its efforts to collect complete antibiotic use data. For example, health care providers across various inpatient and outpatient settings do not record such data in one centralized, electronic database. In addition, CDC officials told us that there are no uniform requirements at the federal level (with the exception of DOD and VA hospitals) for providers to report their antibiotic use data to a centralized database such as the NHSN AU Option, and, according to CDC officials and experts we interviewed, data collection can be costly for CDC and health care providers. Because of these and other challenges, CDC relies on data voluntarily reported by hospitals through the AU Option, and the agency collects its own data or purchases proprietary pharmacy data to estimate antibiotic use—and, to some degree, to assess appropriateness of use—across health care settings. However, these data are incomplete owing to several limitations, as described by type of setting below. Hospitals. Our analysis of CDC data shows that although the number of hospitals participating in the AU Option has gradually risen since its launch in 2011, participation remains limited, with 1,561, or 23 percent, of the 6,849 eligible hospitals reporting at least one month of antibiotic use data as of January 1, 2020. (See fig. 5 for a map showing the percentage of U.S. hospitals reporting antibiotic use data to the AU Option, by state, plus the District of Columbia and Puerto Rico, as of August 2019.) While CDC officials told us they considered this level of participation to be an accomplishment given that participation is voluntary, the National Action Plan set 95 percent participation in the AU Option by 2020 as a significant outcome to support the plan’s goal to strengthen national surveillance efforts to combat resistance. Experts, including those at our meeting, cite multiple challenges that CDC faces in collecting hospitals’ antibiotic use data through the AU Option. For example, The Pew Charitable Trusts has stated that current, voluntary data are limited and that mandatory reporting would provide the data needed to establish a more accurate baseline of antibiotic use, identify stewardship interventions that would be most effective, and measure progress toward reducing inappropriate prescribing. An expert who attended our meeting later suggested that CMS could implement a pay-for-reporting program to incentivize hospitals to report data to the AU Option, and that the program could transition to a pay-for-performance program over time. In addition, experts we interviewed told us that a participating hospital must be willing to spend as much as tens of thousands of dollars for a vendor to customize software for their electronic health record systems to use the AU Option, in addition to investing time training staff on how to use it. CDC officials also told us that the agency lacks the authority to require hospitals to report their antibiotic use data, and that there is currently no federal funding available to assist hospitals with the investment needed to participate in the AU Option. Furthermore, hospitals’ voluntary participation in the AU Option may remain limited until CDC’s benchmark measures are adequately risk- adjusted for different locations and patient populations. For example, one expert we interviewed said that because the AU Option currently aggregates data on the volume of antibiotics used without adequate risk adjustment, a hospital with a patient population that might warrant higher use of antibiotics may be reluctant to report its antibiotic use data to avoid looking like an unnecessarily high prescriber. Regarding another data source for antibiotic use in hospitals, CDC’s EIP provides more granular data at the patient level that allows CDC to assess the appropriateness of antibiotic use. However, CDC officials told us that the agency has been unable to repeat its hospital prevalence survey since 2015 due to insufficient resources (the next survey is expected in 2020) and that the survey encompasses a limited number of hospitals, patients, and states. Nursing homes. According to CDC, nursing homes may be the most challenging health care setting from which the agency collects antibiotic use data; CDC officials stated that this is because electronic health record systems, from which data could be easily accessed, are less common in nursing homes. In addition, CDC officials stated that the agency’s collection of antibiotic use data through the EIP nursing homes prevalence survey has been limited in scope and frequency due to insufficient resources. Outpatient settings. Collecting data for outpatient settings, such as retail pharmacies, is also challenging. For example, CDC officials stated that one proprietary source from which CDC purchases data reflects the volume of pharmacy antibiotic prescriptions, but the data do not contain diagnostic information, preventing the agency from evaluating the appropriateness of those prescriptions. Other CDC or proprietary data sources from which the agency collects or purchases antibiotic use data are limited by the frequency with which those sources release such data, the age range of patients included in the data (i.e., whether they are over or under 65 years), or other characteristics. As previously noted, approximately 85 to 95 percent of the nation’s antibiotic use, by volume, occurred in outpatient settings from 2010 through 2015. The National Action Plan calls for strengthening antibiotic stewardship and for the timely reporting of antibiotic use data across health care settings. Executive Order No. 13676, as previously noted, directs the CARB Task Force to provide annual updates to the President on federal government actions to combat antibiotic resistance, including progress made in implementing the National Action Plan and plans for addressing any barriers preventing its full implementation. These annual updates are to include specific goals, milestones, and metrics for proposed actions and recommendations, taking into consideration federal resources. However, in its progress reports covering the first four years of the National Action Plan’s implementation—which were provided to the President and the public—the CARB Task Force has not identified plans to address barriers that agencies face in expanding antibiotic stewardship programs across health care settings. For example, the task force did not include in the progress reports CMS’s plans to address barriers to expanding its requirements for antibiotic stewardship programs in hospitals, which were delayed, or in certain other types of health care facilities. In addition, in its progress reports to date, the CARB Task Force has not identified plans to address the barriers to expanding the collection of antibiotic use data across health care settings. For example, the task force did not include in the progress reports CDC’s plans to address barriers to achieving the significant outcome of 95 percent of eligible hospitals participating in the AU Option by 2020, although participation was only 23 percent as of January 1, 2020. The CARB Task Force coordinators said, in response to our inquiries during this review, that the task force intends to identify agencies’ plans for addressing barriers in the Year 5 progress report to be published in fall 2020. However, the coordinators also stated that the progress reports to date have not identified plans to address barriers largely because the task force focused on reporting the agencies’ accomplishments in implementing the National Action Plan. Until the CARB Task Force identifies and reports on agencies’ plans to address barriers related to the expansion of antibiotic stewardship programs and the collection of antibiotic use data across health care settings to the extent feasible, the federal government will not have reasonable assurance that it is fully implementing the National Action Plan and addressing antibiotic resistance. While training is recognized as one component of an antibiotic stewardship program, such training may have limited success in improving antibiotic prescribing behavior, and federal agencies indicate that it is challenging to evaluate the training’s effectiveness. CDC officials and experts say that inappropriate antibiotic use could be improved through stewardship training, but it is challenging because antibiotic prescribing behavior is driven by multiple factors and can be difficult to change. For example, a PACCARB report stated that prescribers often feel pressure to prescribe antibiotics—even when antibiotics may not be warranted—because of their perception that a patient is demanding such a prescription, or a patient’s actual demand. In addition, CDC notes that antibiotics are frequently prescribed for respiratory conditions most commonly caused by viruses such as the common cold, against which antibiotics are ineffective. Other factors that drive antibiotic prescribing behavior, as cited by experts, include habit, which may stem from what physicians and other prescribers learn during their residencies or observe in the workplace; the time it takes to explain to a patient why an antibiotic is inappropriate; and “decision fatigue” caused by tiredness or hunger. (See table 4 for examples of factors that drive or deter antibiotic prescribing behavior.) Nevertheless, federal agencies plan to evaluate the effectiveness of their antibiotic stewardship training programs to some extent, although the National Action Plan does not require the agencies to do so. For example, CDC officials told us that their online training course for various types of clinicians allows participants to fill out an evaluation that includes questions about whether the participant will be able to apply knowledge gained from the course, which the agency will use to refine and update the course. In addition, for the antibiotic stewardship training for nursing homes that CDC and CMS jointly developed, CDC officials told us that participants will be asked 6 months after the training whether participants implemented stewardship practices—and whether there have been reductions in antibiotic use—as a result of the training. However, CMS, DOD, and VA officials noted that it is difficult to isolate and measure the effectiveness of antibiotic stewardship training specifically on antibiotic prescribing behavior—compared to other, concurrent federal efforts, such as requirements and guidance to promote appropriate antibiotic use. For example, DOD officials told us that their department has looked at antibiotic use data from DOD health care facilities as a “surrogate” to evaluate whether antibiotic stewardship in general has been effective—but noted that is an imperfect measure since there are many factors that affect antibiotic prescribing behavior, and training is only one of several interventions aimed at reducing inappropriate antibiotic use. Antibiotic resistance has been characterized as one of the greatest public health threats the world faces. A concerted effort involving coordination of multiple stakeholders and countries and across health fields is critical to helping ensure that bacterial infections remain treatable. Steps by federal agencies to expand surveillance, facilitate the development and use of new diagnostic tests, fund R&D for the development of new treatments, and issue requirements and guidance for antibiotic stewardship programs are important efforts toward addressing the problem of antibiotic resistance and implementing the National Action Plan. Significant challenges to conducting surveillance remain. For example, CDC has not determined the participation rates or appropriate distribution of participating hospitals needed by the voluntary antibiotic-resistance reporting option to achieve CDC’s goal of conducting regional and national assessments of resistance. By taking steps to determine the participation rates and distribution needed for this option, CDC would have more reasonable assurance that it can achieve its goal. CDC classified gonorrhea as one of the most urgent resistant threats in the nation, but collects limited specimens—representing an estimated 1 to 2 percent of the reported cases in the United States—for GISP, its primary surveillance system for resistant gonorrhea. However, CDC has not fully evaluated the representativeness of the trends identified by this surveillance system. By evaluating GISP to ensure that it includes measures of its representativeness, such as comparing the trends in the sample population with those in the overall U.S. population, using specially designed studies if needed, CDC would have better assurance that the trends detected in GISP accurately reflect the characteristics of the health-related outcome the system is designed to monitor. Further, neither the 2013 nor the 2019 Threats Reports provided quantitative measures of uncertainty for CDC’s estimates of morbidity and mortality resulting from antibiotic-resistant infections. Providing such measures, such as standard errors or confidence intervals, as appropriate, in its Threats Reports would help CDC and others compare information within and across reporting efforts, and draw appropriate conclusions about the characteristics of antibiotic resistance in the United States, including limitations associated with reported findings and conclusions. Finally, there has been a 6-year interval between CDC’s reports on antibiotic resistance threats. By developing a plan for more frequent dissemination of consolidated reporting on priority pathogens at regular intervals, CDC would have more timely trend data and other information necessary for users of the data, including policymakers, to prioritize, plan, implement, and evaluate public health actions to address antibiotic resistance. HHS has funded some studies to assess whether certain tests for antibiotic resistance lead to improved clinical outcomes, including more effective treatment for patients or more judicious use of antibiotics. However, HHS agencies that are in a position to conduct or fund such studies have not identified leadership, roles, and responsibilities to help further such efforts. By taking steps to identify leadership, roles, and responsibilities, agencies could more effectively address the need for clinical outcomes studies, potentially increasing test use, improving patient care, and enhancing stewardship efforts. In addition, for its part, FDA has not regularly monitored tests for antibiotic resistance to assess breakpoint updates or evaluated any effects of using tests for antibiotic resistance with out-of-date breakpoints. By regularly monitoring and evaluating FDA-authorized tests that rely on breakpoints, FDA would be able to determine whether test manufacturers are updating breakpoints as needed and help ensure that patient care and infection control efforts are effective. While government push incentives to support antibiotic R&D have been helpful, experts and antibiotic developers have indicated that push incentives alone are not sufficient to sustain antibiotic development. PACCARB, TATFAR, and other experts have called for additional postmarket pull incentives to increase the antibiotic pipeline, but HHS does not have a strategy for doing so. Developing a strategic framework that outlines key design elements of new incentives would be a first step toward identifying potential authorities and resources that may be needed and determining agency roles for implementation and oversight of the incentives. Until such incentives are developed, more drug companies may exit the antibiotic development sector, and the pipeline of new treatments may continue to decrease. Finally, in its progress reports covering the first four years of the National Action Plan’s implementation, the CARB Task Force did not identify plans, as required by the Executive Order, to address barriers that agencies face in fully implementing the National Action Plan, such as expanding (1) a CDC program designed to strengthen the U.S. response to resistant gonorrhea; (2) antibiotic stewardship programs across health care settings; and (3) antibiotic use data collection, to the extent feasible. Without identifying plans to address these and other challenges, the federal government cannot assure that the country is prepared to overcome the urgent health consequences of antibiotic resistance. Until the CARB Task Force, which is coordinated by HHS officials, identifies and reports on agencies’ plans to address barriers preventing full implementation of the National Action Plan, the federal government will not have reasonable assurance that it is fully implementing the National Action Plan and addressing antibiotic resistance. We are making a total of eight recommendations, including four to CDC, three to HHS, and one to FDA. Specifically: The Director of CDC should take steps to determine participation rates and distribution needed in the AR Option of the National Healthcare Safety Network for conducting regional and national assessments of antibiotic resistance of public health importance. (Recommendation 1) The Director of CDC should ensure that CDC’s evaluation of its surveillance system for antibiotic-resistant gonorrhea includes measures of its representativeness, such as comparison of the trends in the sample population with those in the overall U.S. population, using specially designed studies if needed. (Recommendation 2) The Director of CDC should provide information on uncertainties for antibiotic resistance estimates in its consolidated Threats Reports, including standard errors or confidence intervals, as appropriate. (Recommendation 3) The Director of CDC should develop a plan for timely, consolidated reports of antibiotic resistance in priority pathogens at regular intervals. (Recommendation 4) The Secretary of HHS should identify leadership and clarify roles and responsibilities among HHS agencies to assess the clinical outcomes of diagnostic testing for identifying antibiotic-resistant bacteria. (Recommendation 5) The Commissioner of FDA should direct the Center for Devices and Radiological Health to conduct additional monitoring and evaluation of the status of FDA-authorized tests that rely on breakpoints, on a regular basis, to determine whether test manufacturers are updating breakpoints, seeking additional resources as needed. (Recommendation 6) The Secretary of HHS should develop a strategic framework to further incentivize the development of new treatments for antibiotic-resistant infections, including through the use of postmarket financial incentives, and, if appropriate, make recommendations to Congress for necessary authority. (Recommendation 7) The Secretary of HHS should direct the CARB Task Force to include in its annual updates to the President plans for addressing any barriers preventing full implementation of the National Action Plan and, as appropriate, make recommendations for new or modified actions. Specifically, the CARB Task Force should identify plans to address barriers, such as those related to expanding (1) a CDC program designed to strengthen the U.S. response to resistant gonorrhea; (2) antibiotic stewardship programs across health care settings; and (3) antibiotic use data collection across health care settings, to the extent feasible. (Recommendation 8) We provided a draft of this report to DOD, VA, and HHS for review and comment. DOD and VA did not provide formal comments but generally agreed with our report. In its comments, reproduced in appendix V, HHS generally concurred with our findings and seven of our recommendations, and did not concur with one of our recommendations, as discussed below. HHS identified several actions it intends to take to address our recommendations. DOD and HHS also provided technical comments, which we incorporated as appropriate. In response to our first recommendation, HHS concurred and CDC stated it is working with public health partners to promote the voluntary use of the AR Option, providing technical support to states that may be considering a state or local mandate to require AR and AU reporting, and developing pilot programs to assess AR Option data and other data sources for certain types of antibiotic resistance. While these actions are helpful, we believe taking additional steps, such as determining goals for participation rates and distribution for AR Option reporting, would give CDC more reasonable assurance that hit can conduct regional and national assessments of resistance. In response to our second recommendation, HHS concurred and CDC stated it is taking additional efforts to examine the representativeness of data collected through its primary surveillance system for resistant gonorrhea, including working to develop laboratory methods to reduce dependence on cultured isolates. CDC stated that steps to refine and improve collection of resistant gonorrhea data require additional resources. We believe that CDC requesting such resources would help ensure that such data are representative of the overall U.S. population. HHS generally concurred with our third recommendation. CDC stated it feels that it is critical to publish the data after peer review and then plans to link the publications back to online resources of the 2019 Threats Report. We believe that peer-reviewed publication is important, but it is also important for CDC to take additional steps to establish and report uncertainties for the national estimates or summary data that would help CDC and others draw appropriate conclusions about the characteristics of antibiotic resistance in the United States. In response to our fourth recommendation, HHS concurred and CDC stated it has plans to update its enterprise-wide AR Threats Report every three years, and that it also issues regular reports on specific groups of pathogens. In response to our fifth recommendation, HHS concurred and stated that the CARB Task Force leadership will work with relevant HHS agencies to clarify roles and responsibilities and identify leadership, if appropriate, for supporting research on clinical outcomes delated to diagnostic tests. HHS concurred with our sixth recommendation, and FDA concurred with conducting additional monitoring and evaluation of tests relying on breakpoints when FDA identifies or recognizes new breakpoints. FDA stated that it has taken major steps to help address challenges associated with updating such tests to reflect the most current breakpoints. We believe that in addition to these steps, monitoring and evaluation of current FDA-authorized tests that may still be using out-of- date breakpoints will enhance FDA’s ability to provide assurance that patient care and infection control efforts are effective. HHS did not concur with our seventh recommendation that HHS should develop a strategic framework to further incentivize the development of new treatments for antibiotic-resistant infections, including through the use of postmarket financial incentives. HHS noted that, while it agrees that additional incentives are needed to address the limited pipeline for novel and innovative treatments to combat antibiotic resistance, it is still conducting analyses to understand whether postmarket incentives should be included as a component of its forthcoming strategic framework to further incentivize the development of new treatments. However, HHS did not specify when its framework would be released. We support HHS’s efforts to develop such a framework, as this is a complex issue with multiple factors to consider. However, we believe our recommendation is still warranted. Antibiotic resistance is one of the greatest global public health threats, and experts, including the WHO, have warned that the pipeline of new antibiotics in development is insufficient to combat the threat. Without an adequate arsenal of treatments, we are likely to see increasing mortality caused by these deadly infections. As we reported, experts, advisory groups, federal officials, and antibiotic developers have all called for additional postmarket incentives to reinvigorate the pipeline of antibiotics under development. The current significant federal investment in push incentives to support antibiotic R&D is helpful but will ultimately be ineffective if companies receiving this investment are unable to sustain their business once their treatment reaches the market. Therefore, we maintain that it is important that HHS not delay the development of a strategic framework that includes postmarket incentives, which is just an initial step toward the creation of these incentives. Until additional postmarket incentives are developed, more drug companies may exit the antibiotic development sector, and the pipeline of new treatments for antibiotic-resistant infections may continue to decrease. In response to our eighth recommendation, HHS concurred and stated that beginning in 2020 and continuing annually thereafter, the CARB Task Force’s progress reports will include discussion of any barriers preventing full implementation of the National Action Plan, including, as appropriate, barriers that GAO has identified. We emphasize that the CARB Task Force should also identify plans to address such barriers—and, as appropriate, make recommendations for new or modified actions—in future progress reports, in accordance with Executive Order No. 13676. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to appropriate congressional committees; the Secretaries of DOD, HHS, and VA; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact us at (202) 512-6888 or personst@gao.gov, or (202) 512-7114 or deniganmacauleym@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report examines: (1) the Centers for Disease Control and Prevention’s (CDC) efforts to address surveillance of antibiotic resistance and any challenges to these efforts; (2) federal efforts to advance the development and use of diagnostic tests for identification and characterization of resistant bacteria and to address barriers to the development of diagnostic tests; (3) challenges to developing new treatments for antibiotic-resistant infections and federal efforts to address the challenges; and (4) federal efforts to promote the appropriate use of antibiotics and any challenges that remain. We focused our review primarily on agency actions since 2015, when the National Action Plan for Combating Antibiotic-Resistant Bacteria (National Action Plan) was published. We also focused our review on human health, as we have reported on federal efforts to address the use of antibiotics in food animals and recommended actions to improve these efforts for more than 20 years. Additionally, we focused our review on antibiotic-resistant bacteria. We generally excluded federal efforts related to infection prevention and control in human health care, on which we have previously reported. To address all four objectives, we reviewed relevant agency reports and documents, such as CDC’s report, Antibiotic Resistance Threats in the United States, 2013 (2013 Threats Report); conducted interviews with officials from federal agencies, experts, and stakeholder organizations; and we reviewed relevant literature, policy papers, and GAO reports. We interviewed officials from federal agencies responsible for implementing the aspects of the National Action Plan related to our research objectives: the Department of Health and Human Services’ (HHS) Office of the Assistant Secretary for Planning and Evaluation, the Biomedical Advanced Research and Development Authority (BARDA), CDC, the Centers for Medicare & Medicaid Services (CMS), the Food and Drug Administration (FDA), the National Institutes of Health (NIH), and the Office of Global Affairs; as well as the Department of Defense (DOD) and the Department of Veterans Affairs. We also interviewed experts and representatives from organizations involved in public health and epidemiology, infectious diseases and microbiology, antibiotic research and development (R&D), antibiotic stewardship, and other issues relating to antibiotic resistance. Because antibiotic resistance is a global problem, we also interviewed officials from the World Health Organization (WHO), the European Centre for Disease Prevention and Control, the European Medicines Agency, the Wellcome Trust, Public Health England, and the Surveillance and Epidemiology of Drug-Resistant Infections Consortium about various aspects of our review; and we reviewed relevant documents from these entities. We identified experts and organizations through literature and other documents we reviewed and through referrals from agency officials and other experts we interviewed. In addition, we attended several meetings and reviewed summaries of meetings held by the Presidential Advisory Council on Combating Antibiotic-Resistant Bacteria (PACCARB). Furthermore, we attended two conferences related to antibiotic resistance: the World Anti-Microbial Resistance Congress and the Gordon Research Conference on chemical and biological threat defense, the latter of which had a session devoted to antibiotics and antibiotic resistance. For each of our objectives, we identified and reported on actions taken by federal agencies and key challenges that the agencies face in addressing antibiotic resistance. We evaluated the actions taken by federal agencies against relevant criteria, as applicable. In addition, in September 2018, we convened a meeting of experts in antibiotic resistance epidemiology, diagnostic testing, antibiotic development, and antibiotic stewardship. This meeting of experts was planned and convened with the assistance of the National Academy of Sciences to better ensure that a breadth of expertise was brought to bear in its preparation; however, all final decisions regarding meeting substance and expert participation are the responsibility of GAO. Any conclusions and recommendations in GAO reports are solely those of the GAO. The Board on Population Health and Public Health Practice within the National Academy of Sciences solicited expert nominations from academia, public health laboratories, industry, and other organizations working in topics relating to antibiotic resistance. From their list of 51 nominees, and additional nominees we independently identified, we convened a meeting of 18 experts selected for their knowledge and expertise related to antibiotic resistance epidemiology, diagnostic testing, antibiotic development, and antibiotic stewardship. Eleven of the 18 experts who participated in our meeting also reviewed and provided comments on a draft of our report. We refer to such experts in this report as “experts at our meeting;” appendix II contains a list of the expert participants. To examine CDC’s efforts to address surveillance for antibiotic resistance and any challenges to these efforts, we reviewed documentation and conducted interviews with agency officials and other key stakeholders on each of the surveillance systems across CDC that track antibiotic resistance and reviewed CDC’s 2013 Threats Report and CDC’s Antibiotic Resistance Threats in the United States, 2019 data. We further focused our review on the 17 priority disease-causing bacteria listed in CDC’s 2013 Threats Report. The CDC surveillance systems included: Antibiotic Resistance Laboratory Network Emerging Infections Program (EIP) Gonococcal Isolate Surveillance Program (GISP) National Antimicrobial Resistance Monitoring System (NARMS) National Healthcare Safety Network (NHSN) National Notifiable Diseases Surveillance System National Tuberculosis Surveillance System For NHSN, we also assessed health care facility participation data by state and territory. We assessed the reliability of these data by reviewing them for any outliers or anomalies and by inquiring with agency officials about their source and any known reliability issues. We determined that these data were sufficiently reliable for assessing facility participation rates by U.S. state and territory. Stakeholder organizations we interviewed represented state and territorial epidemiologists and other public health officials (the Council of State and Territorial Epidemiologists and the Association of State and Territorial Health Officials) and an international consortium to address challenges in surveillance of antibiotic resistance (the Surveillance and Epidemiology of Drug-resistant Infections Consortium). We also reviewed reports on antibiotic resistance surveillance challenges from the Public Health Informatics Task Force and the Antibiotic Resistance Surveillance Task Force. We also reviewed documents from WHO’s global surveillance system and interviewed WHO and CDC officials to identify challenges that limit CDC’s ability to assess threats from abroad. We evaluated challenges and steps CDC has taken against CDC’s “Updated Guidelines for Evaluating Public Health Surveillance Systems;” Standards for Internal Control in the Federal Government; prior GAO work; the Government Performance and Results Act of 1993 (GPRA) and the GPRA Modernization Act of 2010; the Office of Management and Budget Circular No. A-11 and Standards and Guidelines for Statistical Surveys; relevant National Action Plan objectives, aims, and milestones; and Executive Order No. 13676, September 2014. To examine federal efforts to advance the development and use of diagnostic tests, we also interviewed representatives from a nongeneralizable selection of six diagnostic test manufacturers to identify challenges they face in developing tests for antibiotic resistance and challenges in increasing user adoption of their tests. We further focused our review on the 17 priority disease-causing bacteria listed in CDC’s 2013 Threats Report. The six manufacturers we interviewed were Accelerate Diagnostics, Beckman Coulter, BioFire and its parent company, BioMerieux, Bruker, Cepheid, and Roche Diagnostics. We identified these manufacturers by compiling a list based on previous work we conducted, interviews with select experts, and internet search. We selected six manufacturers that were identified by more than one source while encompassing different types of tests (culture and genotypic). We limited our scope to FDA-authorized tests—that is, tests that have been reviewed and cleared by FDA for marketing in the United States—that can identify resistance in at least one type of bacteria categorized as priority bacteria in CDC’s 2013 Threats Report. Some of these tests are called antibiotic susceptibility tests, but we refer to the entire class of such tests as “tests.” We included in our scope tests that can differentiate between viral and bacterial infection because these types of tests are included in the National Action Plan. We evaluated the actions taken by federal agencies against the Standards for Internal Control in the Federal Government, relevant National Action Plan objectives, aims, and milestones under Goal 3, and relevant sections in the PACCARB Recommendations for Incentivizing the Development of Vaccines, Diagnostics, and Therapeutics to Combat Antibiotic Resistance. We also evaluated federal agency actions against the “leadership” and “clarity of roles and responsibilities” leading practices from GAO’s Managing for Results: Key Considerations for Implementing Interagency Collaborative Mechanisms. We focused on these key practices when there was a lack of specifically assigned roles in either the National Action Plan or the PACCARB report for key activities. To identify challenges to developing new treatments for antibiotic- resistant infections and examine federal efforts to address these challenges, we also interviewed 11 randomly selected companies that conduct research and development on new treatments for bacterial infections. We included companies that are researching or developing both traditional antibiotics and alternatives to antibiotics—which we call “nontraditional products” in this report—and we included companies that had and had not received funding from the Combating Antibiotic- Resistant Bacteria Biopharmaceutical Accelerator (CARB-X) and companies that do and do not have existing FDA-approved drugs on the market. We asked company representatives about challenges in developing new antibiotics they have identified, support they may have received from federal agencies, how effective the support has been to them, and their views on additional incentives that would promote the development of new antibiotics. We also interviewed experts on the topic of antibiotic development and industry stakeholders, specifically The Pew Charitable Trusts and the Biotechnology Innovation Organization. We interviewed federal officials from BARDA, CMS, DOD, FDA, and NIH to learn about their programs and actions to support the development of treatments for antibiotic-resistant infections and requested information about funding for antibiotic R&D from BARDA, DOD, and NIH. We included relevant agency actions that began before the National Action Plan was issued in 2015 if they continued after 2015. Finally, we reviewed literature related to antibiotic development and reports about antibiotic pull incentives written by health policy advisory groups, including the PACCARB, the Transatlantic Taskforce on Antimicrobial Resistance (TATFAR), the DRIVE-AB project, and the Duke Margolis Center for Health Policy. We evaluated the actions taken by federal agencies to help address the challenges to developing new treatments against experts’ and advisory groups’ views on additional actions needed and against the principles related to developing strategies outlined in GPRA and the GPRA Modernization Act of 2010. We did not assess challenges to developing products designed to prevent infections, such as vaccines, nor federal actions related to these types of products. To examine federal agency efforts to promote the appropriate use of antibiotics and any challenges that remain, we also analyzed CMS data and related documentation on the quality measures and improvement activities related to antibiotics as part of CMS’s Merit-based Incentive Payment System (MIPS) in 2017. Specifically, we identified CMS’s antibiotics-related quality measures and improvement activities by conducting a search for the words “antibiotic,” “antimicrobial,” “bacteria,” “resistance,” and “resistant” on CMS’s MIPS website. We then reviewed CMS’s data on the number of MIPS-eligible clinicians who selected and reported on these measures and activities in 2017, the most recently available data. In 2017, there were nine MIPS quality measures related to antibiotics, as follows: (1) acute otitis externa: systemic antimicrobial therapy - avoidance of inappropriate use; (2) adult sinusitis: antibiotic prescribed for acute sinusitis (overuse); (3) adult sinusitis: appropriate choice of antibiotic: amoxicillin with or without Clavulanate prescribed for patients with acute bacterial sinusitis (appropriate use); (4) appropriate testing for children with pharyngitis; (5) appropriate treatment for children with upper respiratory infection; (6) appropriate treatment of Methicillin-sensitive Staphylococcus aureus bacteremia; (7) avoidance of antibiotic treatment in adults with acute bronchitis; (8) perioperative care: selection of prophylactic antibiotic – first- or second-generation Cephalosporin; and (9) total knee replacement: preoperative antibiotic infusion with proximal tourniquet. In addition, there was one MIPS improvement activity related to antibiotics in 2017: implementation of antibiotic stewardship program. We reviewed the MIPS data for any obvious outliers or anomalies, and we determined that these data were sufficiently reliable for reporting the number of clinicians who reported implementing these quality measures and improvement activities. In addition, we reviewed aggregated data from CDC on the total number of eligible U.S. hospitals voluntarily reporting their antibiotic use data to a CDC system (the NHSN’s Antimicrobial Use Option); we then calculated the percentage of eligible hospitals reporting such data as of January 1, 2020. We assessed the reliability of the aggregated data by reviewing them for any obvious errors or missing data totals and inquiring with CDC officials about their source and any known reliability issues. We determined that these data were sufficiently reliable for reporting hospital participation rates in the system. We also reviewed selected articles on antibiotic use and stewardship— compiled from a variety of sources, including CDC documents and experts we interviewed—published in literature. In addition, we interviewed experts on antibiotic use and stewardship, including representatives from PACCARB, Emory University’s School of Medicine, the University of Minnesota’s Center for Infectious Disease Research and Policy, The Joint Commission, the Society of Infectious Diseases Pharmacists, The Pew Charitable Trusts, and the Association for Professionals in Infection Control and Epidemiology. We evaluated federal efforts and challenges against relevant National Action Plan objectives and milestones and Executive Order No. 13676. We focused on antibiotic use in the United States, rather than global antibiotic use. We conducted this performance audit from February 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We collaborated with the National Academy of Sciences to convene a two-day meeting of experts to inform our work on federal efforts to address antibiotic resistance; the meeting was held on September 17 and 18, 2018. The experts who participated in this meeting are listed below. Many of these experts gave us additional assistance throughout our work, including by providing additional technical expertise and answering questions, and 10 of these experts reviewed and provided comments on our draft report for technical accuracy. This appendix contains additional examples of efforts by agencies within the Departments of Health and Human Services, Defense, and Energy to provide support for antibiotic research and development beyond those mentioned in the report. These examples do not comprise the full extent of agencies’ efforts. This appendix contains more detailed information on federal efforts to promote the appropriate use of antibiotics in health care through antibiotic stewardship programs and activities, organized by agency. These examples do not comprise the full extent of agencies’ efforts. In addition to the contacts named above, John Neumann (Managing Director); Will Hadley, Anne K. Johnson, and Sushil K. Sharma, PhD, DrPH (Assistant Directors); Josey Ballenger, Hayden Huang, PhD, and Laura Tabellion (Analysts-in-Charge); and Amber Sinclair, PhD, made key contributions to this report. Nora Adkins, George Bogart, Jehan Chase, Anika McMillon, Laurie Pachter, Eric Peterson, Sarah Sheehan, Ben Shouse, Sara Sullivan, Walter Vance, Harris Weisz, and Emma Williams also made important contributions.", "summary": "Bacterial infections have become more difficult, and sometimes impossible, to treat due to antibiotic resistance, which occurs when bacteria develop the ability to defeat the available drugs designed to kill them. Concerns about rising rates of resistance to available treatment options prompted the federal government to create the 5-year National Action Plan in 2015. The plan called for federal agencies to strengthen surveillance, advance the development of diagnostic tests and new antibiotics, and slow the emergence of resistant bacteria, among other things. GAO was asked to review federal efforts to address antibiotic resistance. This report examines federal efforts and challenges related to (1) surveillance of antibiotic resistance, (2) the development and use of diagnostic testing to identify antibiotic resistance, (3) the development of treatments for resistant infections, and (4) appropriate antibiotic use. GAO reviewed literature and agency documents; interviewed agency officials and health care industry, drug industry, and other stakeholders; and held a meeting of international and U.S. experts to obtain their views. The precise magnitude of the problem of antibiotic resistance is unknown. The Centers for Disease Control and Prevention (CDC) has made progress in expanding surveillance of infections from certain antibiotic-resistant bacteria in the United States and abroad but faces several challenges. Note: This figure tracks a type of carbapenem-resistant Enterobacteriaceae (CRE), which, according to CDC, is a “nightmare bacteria” resistant to nearly all available antibiotics. Shading indicates CDC confirmed the presence of these bacteria within that state in that year or a previous one. CDC faces challenges in conducting surveillance for antibiotic resistance due to the limited data it is able to collect through various surveillance systems. For example, CDC's primary surveillance system for gonorrhea—which CDC classified as an urgent antibiotic resistance threat affecting over half a million patients annually—currently tracks only an estimated 1 to 2 percent of all U.S. cases and only in males. CDC has not fully evaluated the representativeness of the gonorrhea surveillance system's results. However, it could do so, for example, by comparing the trends in their limited sample population with trends it can establish in the overall U.S. population via additional studies. Such an evaluation could give CDC more confidence that the system's data accurately reflect national trends. Federal agencies have taken steps to advance the development and use of diagnostic tests to identify antibiotic-resistant bacterial infections, but these efforts have limitations. For example, agencies have conducted some studies to establish whether testing can lead to positive health care outcomes, such as reduced rates of antibiotic-resistant infections. However, more such studies are needed, according to experts and agency officials. Without information to guide test usage, clinicians may not be able to select appropriate treatments for their patients. One reason for the insufficient number of studies is that Department of Health and Human Services (HHS) agencies that are in a position to conduct or fund such studies—such as CDC and the Biomedical Advanced Research and Development Authority—disagree about what each agency should do. By clarifying roles and responsibilities, HHS agencies could more effectively address the need for more studies. The resulting studies could help demonstrate the value of diagnostic tests for antibiotic resistance, potentially increasing their use and improving patient care. Experts warn that the current pipeline of antibiotics in development is insufficient to meet the threat of resistance. Several challenges impede the development of new treatments for resistant infections, notably inadequate return on investment for drug companies largely due to low prices and a limited patient population for whom these treatments would be appropriate. While HHS and Department of Defense agencies have provided financial premarket incentives to support antibiotic research and development, experts, federal officials and antibiotic developers agree that more postmarket incentives are needed to overcome the economic challenges. Advisory groups, including a presidential advisory council, and others have called for new postmarket incentives and identified multiple options for their design, including market entry rewards and reimbursement reform (see figure). However, HHS has not developed a strategy to further incentivize development of new treatments for antibiotic-resistant infections, and it may need to request authority and appropriations to create and implement certain types of incentives. Until such incentives are developed, more drug companies may exit the antibiotic development sector, and the pipeline of new treatments may continue to decrease. Federal agencies have made several efforts to promote the appropriate use of antibiotics across health care settings through antibiotic stewardship—giving patients the right antibiotic at the right time, in the right dose, and for the right duration. However, key challenges remain. For example, federal agencies require only certain types of health care facilities to implement stewardship programs. In addition, CDC is limited in its ability to monitor and improve appropriate antibiotic use, in part because providers are not generally required to report antibiotic use data to a centralized database. The 5-year National Action Plan for Combating Antibiotic-Resistant Bacteria (National Action Plan) calls for strengthening antibiotic stewardship and for the timely reporting of antibiotic use data across health care settings. An executive order directs an interagency task force—the Combating Antibiotic-Resistant Bacteria (CARB) Task Force, coordinated by HHS—to provide annual updates to the President on, among other things, plans for addressing any barriers to full implementation of the National Action Plan. However, in its progress reports covering the first 4 years of the National Action Plan's implementation, the task force did not identify plans to address barriers to expanding antibiotic stewardship programs or the collection of antibiotic use data. Until it does so, the government will not have reasonable assurance that it is fully implementing the National Action Plan and addressing antibiotic resistance. GAO is making eight recommendations to strengthen the federal response to combating antibiotic resistance. HHS concurred with seven recommendations and did not concur with one. More details are provided on the next page. In response to the findings presented in this Highlights, GAO recommends that: CDC ensure that its evaluation of its surveillance system for antibiotic-resistant gonorrhea includes measures of the system's representativeness of the U.S. population; HHS identify leadership and clarify roles and responsibilities to assess the clinical outcomes of diagnostic testing; HHS develop a strategy to further incentivize the development of new treatments for antibiotic-resistant infections, including through the use of postmarket financial incentives; HHS direct the CARB Task Force to include in its annual updates to the President plans for addressing any barriers preventing full implementation of the National Action Plan. In addition, GAO is making four recommendations to address other CDC efforts in surveillance and reporting and to address FDA efforts in monitoring diagnostic tests. HHS did not concur with the recommendation that it develop a strategy that includes the use of postmarket financial incentives to encourage the development of new treatments for antibiotic-resistant infections, citing its ongoing analysis to understand whether postmarket incentives should be included in such a strategy. GAO recognizes the complexity of this issue and maintains that this recommendation is warranted given that experts and others have called for additional postmarket incentives and the insufficiency of the current pipeline of new treatments for antibiotic-resistant infections. or Mary Denigan-Macauley at (202) 512-7114 or deniganmacauleym@gao.gov .", "document_type": "gao"}
{"report": "Federal law and regulations require that contractors receiving a contract with a value greater than the simplified acquisition threshold must ensure that small businesses have the “maximum practical opportunity” to receive subcontracting work. In addition, a prospective contractor generally must submit a subcontracting plan for each solicitation or contract modification with a value of more than $700,000—or $1.5 million for construction contracts—whenever subcontracting opportunities exist. Contractors with federal contracts typically use one of three types of subcontracting plans: Individual subcontracting plan, which applies to a specific contract, covers the entire contract period including option periods, and contains subcontracting goals; Commercial subcontracting plan, which covers the company’s fiscal year and the entire production of commercial items sold by either the entire company or a portion of it (such as a division, plant, or product line) and contains subcontracting goals; and Comprehensive subcontracting plan, which is similar to a commercial subcontracting plan and applies only to DOD contracts. Each company reports on subcontracting goals and achievements for a specific fiscal year on a plant, division, or corporate-wide basis. A comprehensive plan may cover a large number of individual contracts. Federal contractors use these plans to document subcontracting goals as a specific dollar amount planned for small business awards and as a percentage of total subcontracting dollars available to small businesses and socioeconomic categories of small businesses. Contractors also may establish, for specific facilities, a master subcontracting plan that contains all the required elements of an individual plan, except the subcontracting goals. Because a master plan does not include specific subcontracting goals, an individual subcontracting plan or an addendum typically provides the goals for specific contracts associated with the master subcontracting plan. After a contract is awarded, the contractor must periodically submit to the government a subcontracting report that describes progress towards meeting these goals. Individual subcontracting plans require reporting on a single contract and commercial and comprehensive subcontracting plans allow for consolidated reporting of multiple contracts on a division- or company-wide basis. Contractors must report their subcontracting achievements through eSRS, a web-based government-wide system that both contractors and agency contracting officers can access. The FAR requires contractors to submit individual subcontracting reports (ISR) and summary subcontract reports (SSR) (see table 1). These reports show contractors’ progress toward meeting their small business subcontracting goals. Several regulations, processes, and procedures dictate contracting officers’ responsibilities for oversight of subcontracting plans during the pre-award and post-award phases of the acquisitions process. Before making an award, the FAR requires that contracting officers review the subcontracting plan to help ensure that the required information, goals, and assurances—such as a contractor committing to submit periodic reports to the government to determine the extent of compliance with the subcontracting plan—are included. Additionally, the FAR requires contracting officers to provide the SBA Procurement Center Representative (PCR)—SBA staff whose responsibility includes supporting agency contracting opportunities for small businesses—with an opportunity to review the proposed contract, including the subcontracting plan and supporting documentation. After a contract or contract modification containing a subcontracting plan is awarded or an existing subcontracting plan is amended, the FAR requires that contracting officers monitor the prime contractor’s compliance with its subcontracting plan. In carrying out their post-award oversight responsibilities, the FAR requires contracting officers to (1) ensure contractors file their subcontracting reports in eSRS within 30 days of the close of each reporting period (a report is also required for each contract within 30 days of contract completion); (2) review ISRs, and where applicable SSRs, in eSRS within 60 days of the reporting end date; and (3) acknowledge receipt of, accept, or reject the reports in eSRS (see fig.1). The FAR requires agencies to perform annual evaluations of and report on a contractor’s performance when work under the contract has been completed. Small business subcontracting is one evaluation area for which agencies rate a contractor’s performance. Agencies use the Contractor Performance Assessment Reporting System to collect and manage the library of Contractor Performance Assessment Reports. Agency contracting officers are to consider information on a contractor’s past performance from these reports when making future contract award decisions, including a contractor’s actions for previously awarded contracts that had a small business subcontracting plan. The FAR also requires contractors to comply in good faith with the agreed-upon subcontracting plan goals and requirements. When a contractor fails to meet the small business goals in the subcontracting plan, the contractor must provide a rationale for not being able to meet the goals. In determining whether a contractor failed to make a good-faith effort, a contracting officer must look at the totality of the contractor’s actions, consistent with the information and assurances provided in its subcontracting plan, and consider the rationale the contractor provided. The contractor’s failure to meet its subcontracting goals does not, in and of itself, constitute failure to make a good-faith effort. Failure to submit required subcontracting reports as required by the FAR also may factor into contracting officers’ determinations. If a contracting officer determined that a contractor failed to make a good-faith effort, the FAR requires the contracting officer to assess liquidated damages (monetary assessments for breaching the contract) against the contractor. SBA’s Office of Government Contracting administers SBA’s subcontracting assistance program. In this office, headquarters and field staff have responsibilities to assist small businesses in meeting requirements to receive government contracts as subcontractors. SBA staff have related responsibilities in both the pre- and post-award acquisition phases. For example, SBA’s PCRs and Commercial Market Representatives (CMR) play a role in helping to ensure that small businesses gain access to subcontracting opportunities. In particular, a PCR’s key responsibilities include reviewing proposed agency contracts and making recommendations to agency contracting officers. PCRs also review proposed subcontracting plans and provide advice and recommendations on them to contracting officers. Key responsibilities of CMRs include counseling small businesses on obtaining subcontracts and conducting reviews, including compliance reviews, of large prime contractors with subcontracting plans. SBA’s standard operating procedure (SOP) for the subcontracting assistance program provides guidance for how CMRs conduct reviews. Although SBA conducts monitoring activities, the awarding federal agency remains responsible for overseeing and enforcing compliance with a subcontracting plan throughout the life of the contract. In the case of DOD, in addition to the components within the agency that award and monitor contracts, the Defense Contract Management Agency (DCMA) also provides contract administration services for certain DOD contracts. SBA and DCMA may conduct compliance reviews jointly to evaluate prime contractor subcontracting programs supporting specific DOD contracts administered by DCMA. SBA is also authorized to enter into agreements with other federal agencies to conduct compliance reviews and further the objectives of the subcontracting program. We discuss SBA oversight in more detail later in the report. Annually, SBA negotiates with agencies to establish individual small business subcontracting goals based on recent subcontracting achievement levels by each agency. Agencies awarding contracts with small business subcontracting plans aim to provide opportunities to promote the use of small businesses, veteran-owned small businesses, service-disabled veteran-owned small businesses, Historically Underutilized Business Zone small businesses, small disadvantaged small businesses, and women-owned small businesses. These efforts can help agencies achieve their individual small business subcontracting goals. The four agencies we reviewed—DLA, GSA, Navy, and NASA— demonstrated that contracting officers reviewed and approved subcontracting plans in most of the contracts in our sample. However, they could not demonstrate they followed procedures for making a determination of subcontracting possibilities for all of the contracts we reviewed without a subcontracting plan. Agencies also could not demonstrate they followed procedures related to PCR reviews in about half of the contracts reviewed. The four agencies provided documentation to show that contracting officers reviewed and approved subcontracting plans in most of the 26 contracts that had subcontracting plans. FAR §§ 19.705-4 and 19.705-5 contain contracting officer responsibilities related to reviewing a proposed subcontracting plan and determining its acceptability. For 25 of the 26 contracts we reviewed with a subcontracting plan, the agencies provided documentation showing the contracting officer reviewed the subcontracting plan. In some instances, we also found specific agency guidance for, and checklists or memorandums documenting the reviews of, subcontracting plans. For example: GSA has guidance for its contracting officers when reviewing subcontracting plans. Specifically, GSA’s Acquisition Manual includes a checklist for reviewing subcontracting plans and ensuring the plans meet FAR requirements. Contracting officers used the checklist in their reviews for five of the six GSA contracts we reviewed with a subcontracting plan. The checklist also documents whether the total planned subcontracting dollars and percentages, the method for developing these goals, and information about supplies or services that will be subcontracted are acceptable to the contracting officer. DOD’s guidance on subcontracting program business rules and processes contains a specific DOD checklist for subcontracting plan reviews. Contracting officers used the DOD checklist for three of 14 DLA and Navy contracts with a subcontracting plan that we reviewed. In addition to documenting the extent to which a subcontracting plan meets FAR and Defense Federal Acquisition Regulation Supplement requirements, the checklist also reflects certain requirements related to master and commercial subcontracting plans. The checklist is optional for contracting officers to use when reviewing subcontracting plans. NASA also has guidance that includes steps contracting officers should take when conducting subcontracting plan reviews. For two of the six NASA contracts with a subcontracting plan that we reviewed, we found a checklist that the contracting officer used or a memorandum the contracting officer prepared that detailed the subcontracting plan review, including proposed subcontracting goals. For almost all the contracts we reviewed that did not have a specific checklist or memorandum to document the contracting officer’s review, we found other evidence, such as a contracting officer’s signature on the subcontracting plan, acknowledging review of the plan. Additionally, for one Navy contract with a contract award value of more than $13 million and with an individual subcontracting plan, we found evidence that, after reviewing the subcontracting plan, the contracting officer requested that the contractor make corrections to it. For one DLA contract we reviewed, based on the limited documentation provided, we were unable to determine the extent to which the subcontracting plan was reviewed. DLA officials stated at the time of our review that they were unable to determine if the subcontracting plan was reviewed. We also obtained documentation that demonstrated the subcontracting plan was approved for most of the contracts—21 of 26—we reviewed with a subcontracting plan. For example, we obtained documentation with the contracting officer’s signature on the subcontracting plan (approving the plan), the contracting officer’s signature approving the contract (which included the subcontracting plan), or a signed memorandum that documented approval of the plan. However, we identified five contracts across DLA, Navy, and GSA that had limited documentation (three contracts) for approval of the subcontracting plan, or for which we could not determine whether the subcontracting plan was approved (two contracts). For one DLA contract with an award amount of $15 million and with an individual subcontracting plan, we were unable to determine if the subcontracting plan was approved. Documentation we reviewed, including DLA emails, did not indicate whether the subcontracting plan was approved. In our review of the subcontracting plan, the section of the plan documenting its approval was not completed. Additionally, according to DLA officials, the contract file does not contain any record of the contracting officer’s signature on the subcontracting plan. For two Navy contracts with award amounts of about $17 million and about $32 million and both with individual subcontracting plans, we found limited documentation demonstrating approval of the subcontracting plan for the first contract and, based on the lack of documentation, were unable to determine if the second contract was approved. For the first contract, we found a checklist with signatures demonstrating review of the subcontracting plan by the contracting officer and other officials. However, the subcontracting plan was not signed by the contracting officer as the approval/signature field in the subcontracting plan was empty. For the other contract, Navy officials could not provide any documentation showing approval of the subcontracting plan. The subcontracting plan was not signed by a Navy contracting officer or other Navy staff, and according to Navy officials, they were unable to find a signed subcontracting plan in the pre-award contract file. For two GSA contracts with individual subcontracting plans, we also found limited documentation approving the subcontracting plan. Similar to one of the Navy contracts discussed above, we found checklists with signatures demonstrating reviews of the subcontracting plan by the contracting officer and other officials. However, in both of these instances, the contracting officer did not sign the approval section of the subcontracting plan. Additionally, for one DLA contract we reviewed with an individual subcontracting plan and contract award amount of about $18 million, while we found documentation indicating that the contract had been approved, DLA could not provide documentation for a DOD requirement related to a socioeconomic subcontracting goal. Specifically, the subcontracting plan for this contract listed the small disadvantaged business goal at less than 1 percent. According to Defense Federal Acquisition Regulations Supplement § 219.705-4, a small disadvantaged business goal of less than 5 percent must be approved one level above the contracting officer. In our review of this contract, DLA could not provide documentation specifically showing a higher-level approval for the goal of less than 1 percent. DLA provided an interoffice record and a signed price negotiation memorandum approval document, but these documents did not reference the small disadvantaged business subcontracting goal of less than 1 percent. As a result, we were unable to determine that this subcontracting goal was approved at the appropriate level. In addition to the 26 contracts with subcontracting plans, we also reviewed another six contracts that initially appeared to require a subcontracting plan (based on data in FPDS-NG) but did not have one. For three of the six contracts, the contracting officer or relevant official did not document why a subcontracting plan had no subcontracting possibilities, or prepared the required documentation years after the contract award. For contracts over $700,000, the FAR generally requires contracting officers to award the contract with a subcontracting plan or to make a determination that no subcontracting possibilities exist. If the contracting officer determines that there are no subcontracting possibilities, the determination should include a detailed rationale, be approved at one level above the contracting officer, and be in the contract file. GSA accounted for one of the three contracts and NASA for the remaining two. A subcontracting plan was not included in a GSA construction contract with an award amount of about $7 million (which met requirements for a small business subcontracting plan based on the award amount and type of contract). GSA did not have any documentation and could not tell us why the contract did not require a subcontracting plan or had no subcontracting possibilities, or why a subcontracting plan was not included in the contract. Specifically, GSA provided a response explaining the agency did not have documentation to support why the contracting officer (who is no longer with the specific contracting center that awarded the contract) determined there were no subcontracting possibilities. For two NASA contracts, NASA officials provided documentation signed by one level above the contracting officer, but the documentation was prepared years after the contract award. For the first contract, with an award value of almost $8 million and awarded in March 2016, the determination providing the rationale for no subcontracting possibilities was created and signed in March 2019, about 3 years after the contract was awarded instead of when the award was made. For the second NASA contract, awarded in September 2017 with a contract award amount of about $2 million, NASA officials explained that in 2017, the initial procurement was estimated at a dollar amount below the threshold for a subcontracting plan and therefore no subcontracting plan was required in the solicitation. The contract value was later changed to add two option periods, which put the estimate over the subcontracting plan threshold. NASA officials said the contracting officer’s documentation to determine the need for a subcontracting plan was inadvertently omitted from the file. As a result of our document request, the reviewing contracting officer noted that the file did not properly address the issue of the increased estimate relative to subcontracting plan requirements. NASA then conducted a review to determine if the award met the requirements for a subcontracting plan or if it would have been waived in 2017. Based on the recent review, NASA officials determined that a requirement for a subcontracting plan would have been waived in 2017 based on, among other factors, the specific product purchased through the contract and the structure of the contract, and they prepared a memorandum (in July 2019) documenting this review and conclusion. A 2018 DOD OIG report on small business subcontracting at two Army contracting command locations found similar issues. Specifically, the report found that of 50 contracts the DOD OIG reviewed, the two contracting command locations awarded six contracts, valued at $330.7 million, without a subcontracting plan or a contracting officer’s determination that no subcontracting possibilities existed. The three other contracts we reviewed—two at DLA and one at GSA— had appropriate documentation directly explaining or a rationale supporting why no subcontracting plan was in place. For example, for one contract, DLA officials provided a memorandum signed at one level above the contracting officer that documented the specific nature of the contract for a particular type of metal, the work required, and ability of the contractor to perform the work in-house. For the second contract, DLA officials provided information that the contract was awarded through the AbilityOne Program—which does not require a subcontracting plan. The GSA contract was an automotive contract in which the vendor initially represented itself as a large business and had submitted a subcontracting plan. However, after the contract award, GSA documented a modification to the contract that reclassified the vendor as a small business, based on size standards for the North American Industry Classification System codes for the specific acquisition. Therefore, the subcontracting plan was no longer required. For half of the contracts we reviewed with a small business subcontracting plan (individual or commercial), the agencies could not demonstrate that procedures related to PCR reviews were followed for one or more contracts. According to FAR § 19.705-5(a)(3), when an agency is making a contract award that includes a subcontracting plan, contracting officers should notify the appropriate PCR of the opportunity to review the proposed contract, including the associated subcontracting plan and supporting documentation. More specifically, for 12 of 24 contracts we reviewed with an individual or commercial subcontracting plan, the agencies could not provide documentation or we were unable to determine from the documentation provided whether the contracting officer gave the SBA PCR a review opportunity and whether the PCR may have conducted a review. Of these 12 contracts, DLA and Navy accounted for 10, while GSA and NASA accounted for one each. Five of the six DLA contracts we reviewed did not have any documentation or lacked sufficient documentation to determine if the contracting officer or other official provided the PCR with an opportunity to review the contract, and whether a PCR review occurred. More specifically, DLA was unable to provide any documentation related to the PCR review process for three contracts with a subcontracting plan and told us they could not locate such documentation in the contract file. For one of these three contracts, DLA referred us to DCMA for additional documentation, but the documentation DCMA provided did not confirm whether the PCR had an opportunity to review the contract. For the remaining two of five contracts, DLA provided documentation, including a review by DCMA’s Small Business Office for one of the contracts, but this documentation did not demonstrate the contract was provided to an SBA PCR for review. Five of six Navy contracts we reviewed that had individual subcontracting plans also lacked this documentation. Specifically, Navy was unable to provide documentation specific to the PCR review process for three contracts. For two other contracts, Navy provided documentation of various internal reviews. For example, Navy provided a checklist for one contract showing that the contract was reviewed and signed by the contracting officer and a small business specialist. However, the section of the checklist where the PCR would sign indicating review of the contract and subcontracting plan was left blank. For the other contract, Navy provided documentation that an Assistant Deputy Director for the procuring contracting command center had reviewed and signed the subcontracting plan, but the PCR signature field was blank. In both cases, no other documentation indicated whether the contract was sent to the PCR for review. Therefore, we were unable to determine if a PCR reviewed the plan or was provided the opportunity to review the plan. GSA and NASA each had one contract (of the six we reviewed for each) for which they could not provide any documentation related to the PCR review process. Both of these contracts had an individual subcontracting plan. For the remaining 12 contracts across the four agencies, the agencies provided documentation demonstrating that the PCR was given the opportunity to and had reviewed the contract and associated subcontracting plan. For these contracts, we obtained documentation such as a memorandum, checklist, or email showing the PCR had reviewed and provided concurrence with the subcontracting plan, or commented on the proposed goals in the plan. According to officials from three of the four agencies we reviewed, contracting officers have a large workload with responsibility for a large number of processes and reviews, which may result in a specific process or task—such as coordinating the PCR review—being missed. Additionally, according to NASA officials, the PCR review process may occur but not be documented for some NASA contracts. The selected agencies provide some training to contracting officers on monitoring subcontracting plans. But, for most of the 26 contracts we reviewed with a subcontracting plan, contracting officers did not ensure contractors met their subcontracting reporting requirements. Contracting officers also accepted subcontracting report submissions with erroneous subcontracting goal information for several contracts. For more than half of the 26 contracts, contractors reported that they met or were meeting their small business subcontracting goal. Officials from all four agencies told us that they provide periodic training to contracting officers related to monitoring subcontracting plans, as illustrated in the following examples: NASA: According to a NASA official, NASA conducted training at the Kennedy Space Center in October 2018 and October 2019 that focused on whether contracting officers should accept or reject an ISR, and how to assign a Compliance Performance Assessment Report rating. The agency also conducted training at the Goddard Space Flight Center in October 2018. GSA: GSA’s Office of Small Business Utilization provided a refresher on eSRS reporting, including how to review the report in eSRS, for contracting officers in May 2018. They also provided training to contracting officers in October 2019 on reviewing ISRs and SSRs, including understanding how to review an ISR and ensuring timely submissions of SSRs. DLA: According to DLA staff with the DLA Contracting Services Office, when a contract requires a subcontracting plan, the office’s eSRS coordinator recommends that contracting personnel responsible for administering subcontracting plans take the Defense Acquisition University online course about eSRS. Navy: According to a Navy official, DOD has conducted extensive training to address eSRS known issues and data collection and guidance on the proper review of ISRs. Additionally, Navy contracting officers can enroll in a 5-day course on subcontracting offered by the Defense Acquisition University. According to Defense Acquisition University staff, in addition to the 5-day classroom course, the university also offers other training online related to subcontracting. For more than half of the 26 contracts we reviewed with a subcontracting plan, agency contracting officers did not ensure contractors met their reporting requirements. Specifically, 14 of 26 contracts with subcontracting plans did not have all required ISR or SSR submissions. Three of the four agencies—DLA, NASA, and Navy—accounted for the 14 contracts without all the required submissions. For the remaining 12 contracts we reviewed, the agencies provided documentation showing that contractors submitted all required ISR or SSR submissions for these contracts. FAR § 19.705-6(f) requires contracting officers to monitor the prime contractor’s compliance with subcontracting plans to ensure that subcontracting reports (ISRs and, where applicable, SSRs) are submitted in eSRS in the required time frames. The contracting officer is also to review the reports in the required time frames, acknowledge receipt of, and accept or reject the reports. Our review of 26 contracts with subcontracting plans found limited monitoring of contractor report submissions. Specifically, we found the following for each agency (see table 2): DLA. Five of the six DLA contracts we reviewed did not have all of the required ISR or SSR contractor submissions. For example, for a $6.6 million contract, with a commercial subcontracting plan that was awarded in fiscal year 2016, we could not locate any SSRs in eSRS. Based on limited documentation DLA provided, the contractor submitted only one SSR for the duration of the contract and did so by email to the contracting officer in November 2018. This document was not an official SSR and it did not include required information such as the vendor’s number, information on who submitted the report from the contractor, a self-certification statement attesting to the accuracy of the report, or acceptance or sign off by a DLA official. Four other DLA contracts with individual subcontracting plans had multiple missing submissions. For two of these contracts, the agency could not explain why the reports were missing, and for the other two contracts, the contractors were not aware of the SSR reporting requirement, according to a DLA official. NASA. Similar to DLA, five of the six NASA contracts we reviewed did not have all of the required ISR or SSR submissions. For example, for a $4.6 million contract with an individual subcontracting plan awarded in fiscal year 2016, the contractor submitted ISRs for 2016 and 2017 and the SSR for 2016. However, according to information we reviewed in eSRS and a NASA official, the contractor did not submit any ISRs for 2018 and 2019, and did not submit any SSRs for 2017 or 2018. The official stated that there was contracting officer turnover during this contract, and the contracting officer monitoring the contract at the time of our review could not find any documented explanation for the reports not being submitted. The same agency official explained that for another contract, the contractor experienced issues submitting documents in the electronic system initially and that there were personnel changes around the time the missing report was due. Additionally, for another contract awarded in 2017 for $3.8 million, the contractor did not submit any SSRs. We discuss the two remaining NASA contracts in our discussion of contracts with subcontracting report submissions that were submitted well past their due dates. Navy. Four of the eight Navy contracts we reviewed did not have all the required report submissions. For example, for one contract awarded for $16.6 million, the contractor submitted the first two required ISRs and an SSR for fiscal year 2016, the year in which the contract was awarded. However, we did not locate any other required submissions in eSRS for subcontracting activity in fiscal year 2017, the year in which the contract ended. A Navy official told us it is not unusual for information related to monitoring and compliance of subcontracting plans to be missing from the contract files. Three remaining contracts with individual subcontracting plans also had missing SSRs. However, the agency did not explain why these submissions were missing. GSA. The six GSA contracts all had the required report submissions. Additionally, contractors submitted ISRs or SSRs well past their required due dates for at least four contracts. For example, for one Navy contract and one DLA contract, we found that the contractors submitted an ISR more than 125 days late, and almost 50 days late, respectively. For two NASA contracts, contractors submitted reports after they were due. For one of these NASA contracts, we found that the March 2016 and September 2016 ISRs were submitted well past their due dates—more than 400 days and more than 150 days, respectively. For the second NASA contract, the contractor did not submit any of the required reports during the life of the contract and only submitted one final ISR when the contract ended. This contract was awarded in fiscal year 2016 and ended in August 2018. According to a NASA official, failure to submit the required subcontract report was an error by the contractor and insufficient contracting officer oversight. Additionally, the contractor did not submit any SSRs for this contract as required by the FAR. In another four instances, contractors began submitting the required reports (ISRs and SSRs) after we inquired about the specific contracts with the respective agencies. For example, the contractor for one NASA contract, which also had some missing subcontracting reports, submitted its 2017 SSR more than 600 days after it was due, and after we inquired with NASA about the SSR. We also found that while contractors for two DLA contracts submitted the required ISRs, they did not submit the required SSRs. In one of these two instances, an agency official told us that the contracting officer was unaware of the need for the contractor to submit both an ISR and SSR, and did not inform the contractor of this requirement. For this contract, which was awarded in fiscal year 2017, the contractor submitted its first SSR in October 2019, after we inquired with DLA officials about the lack of SSR submissions. For the second of these two contracts, which also was awarded in fiscal year 2017, the contractor informed the agency that they had not submitted SSR reports in the past because they were unaware of this requirement, and did not submit an SSR until October 2019. Finally, for one other DLA contract, the only ISR we found in eSRS was submitted by the contractor in October 2019, after we inquired about the ISR and more than 2 years after the contract was awarded. This contractor submitted reports outside of eSRS for two of the four prior reporting periods. These reports did not have acceptance or sign off by the accepting DLA official. In addition, while a DCMA staff member told us that the contractor did not submit its September 2017 and March 2018 ISR reports, the staff member did not provide an explanation why these reports were not submitted. Additionally, officials from all four agencies told us they conduct some type of periodic review related to oversight of subcontracting plans, which can include determining compliance with the subcontracting plan and related reporting requirements. In some of these reviews, the agencies had similar findings to ours. For example, NASA: According to an agency official, NASA’s Office of Small Business Programs conducts procurement management reviews of subcontracting plans every 2–3 years. The official told us that these reviews serve to monitor whether (1) prime contractors submitted the required ISRs and (2) contracting officers assessed the subcontracting plans and reviewed the ISRs, among other things. The results of a review conducted in May 2017 identified missing ISRs and reports that were accepted with incomplete information. Navy: According to a Navy official, the Navy Office of Small Business Programs conducts Procurement Performance Management Assessment Program reviews. The official stated that these reviews are conducted every 3 years at each of Navy’s command centers that conduct buying activities. If a command center receives an unsatisfactory or marginal rating, then the Deputy Assistant Secretary of the Navy for Acquisition and Procurement will perform follow-up reviews every 6–12 months until the issues are addressed. As part of the review process, Navy reviews subcontracting plans and data in eSRS to determine how subcontracting plans are monitored and evaluated. A review conducted in June 2018 concluded that monitoring of prime contractor’s subcontract reporting and compliance was inadequate. GSA: According to agency officials, GSA’s Office of Small Business Utilization, in conjunction with GSA’s Procurement Management Review team, conducts Small Business Compliance Reviews. Annually, the agency selects 4–6 regions from which to select a sample of contracts to review for both pre-award and post-award compliance. According to agency officials, these reviews are designed to help determine if subcontracting goals were met, among other subcontracting-related requirements. A review GSA conducted in March 2019 for one contract noted that the subcontracting plan could not be located in the contract file and that there was a lack of post- award subcontracting plan oversight, including contractor reports on subcontracting activities. DLA: According to a DLA official, various DLA offices, including the DOD Office of Small Business Programs, monitor eSRS regularly to ensure contracting officers are reviewing and processing contractor submissions through the system. The official stated that these reviews happen at various times throughout the year. For example, the Small Business Director at DLA Distribution—an organization within DLA— checks eSRS on a biweekly basis and DLA Aviation—another organization within DLA—conducts semi-annual reviews of eSRS. The DOD OIG had similar findings regarding oversight of contractor compliance with subcontracting plan requirements, including contractor reporting requirements. For example, in 2018 the DOD OIG reported that contracting officers at two Army contracting commands did not monitor prime contractors’ compliance with subcontracting plans. The DOD OIG made three recommendations to address the findings, which have been implemented according to the DOD OIG. As previously mentioned, contracting officers are responsible for a large number of processes and reviews, which may result in a specific process or task being missed. According to officials from Navy and NASA, other factors also contributed to the existence of limited documentation for certain post-award requirements for the contracts we reviewed. For example, the agency officials stated that contracting officers focus more on the award process than on contract administration and fail to properly consider the requirement that subcontracting plans become a material part of the contract on award, resulting in a lack of due diligence after the award. Officials from NASA and Navy also cited eSRS not providing notifications to contracting officers and contractors when reports are not submitted, among other things, as a contributing factor in missing ISR reports. Additionally, according to NASA officials, eSRS does not generate a list of prime contractors who are delinquent in submitting their SSRs. For the 26 contracts we reviewed with a subcontracting plan, contracting officers accepted several report submissions containing incorrect information about subcontracting goals. According to FAR § 19.705-6(j), after a contract containing a subcontracting plan is awarded, the contracting officer must reject a contractor’s subcontracting report submission if it is not properly completed—for example, if it has errors, omissions, or incomplete data. In fulfilling their responsibilities related to FAR § 19.705-6(j), contracting officers can identify omissions that a contractor may need to address. For example, in reviews of ISRs for a $31.8 million Navy contract awarded in fiscal year 2017, the contracting officer noted concerns about the contractor not meeting its socioeconomic goals and asked the contractor to provide an explanation for why the goal was not being met. The contracting officer rejected the September 2018 ISR and later rejected the September 2019 ISR twice because the contractor either did not provide an explanation for not meeting certain socioeconomic goals or failed to describe good-faith efforts to do so. The contractor submitted a revised ISR in December 2019, which included a description of its good-faith efforts to meet the socioeconomic goals. Upon review, the contracting officer accepted the submission stating that it seemed clear from the information provided that the contractor put forth a good-faith effort to meet the goals. However, for the 21 contracts we reviewed in total that required contractor ISR submissions (which provide information on approved subcontracting goals and achievements towards them), we found that for nine contracts, the contracting officers accepted one or more submissions with errors or unexplained conflicting information related to subcontracting plan goals (see table 3). Specifically, all nine contracts lacked explanations of the discrepancies in the ISR or other documentation we reviewed. We discuss the nine contracts in more detail below: NASA: Contracting officers accepted multiple ISRs with errors or unexplained conflicting information for three NASA contracts. In one of the three contracts, awarded in fiscal year 2017 for $3.8 million, the contractor combined small business subcontracting goals (listed as whole dollars and percent of total subcontracting dollars) from two different subcontracting plans associated with the contract into one ISR. However, the dollar amount reported in the ISR as the subcontracting goal—about $177,000—reflected the small business goal from only one of the subcontracting plans, rather than the two subcontracting plans, which would have been a total of about $309,000. As a result, the actual percentage of subcontracting to small businesses of total subcontracting and of the total amount of the contract value was incorrect. In the second contract, awarded in 2016 for $4.6 million with a planned small business subcontracting total of about $2 million, the contractor listed an overall small business subcontracting goal different from the approved subcontracting goal in three ISRs, and there was no documentation explaining the difference. For the third contract, awarded in fiscal year 2016 for $45.2 million with a planned small business subcontracting goal of 10 percent of total subcontracting dollars, the contractor listed this goal incorrectly in two ISRs. According to a NASA official, at the time of our review, the contracting officer was working with the contractor to correct the error. DLA: For one contract awarded in 2017 for $34.1 million with a planned subcontracting total of about $11 million, a DLA contracting officer accepted a September 2019 ISR that listed the small business goal at 90 percent of the total subcontracting dollars for the contract instead of the 87.4 percent (base) or 87.6 percent (option years) in the contract addendum. The actual cumulative subcontracting percentage reported in the ISR was 88.1 percent, which met the goal in the addendum, but not the 90 percent goal in the accepted September 2019 ISR. We could not identify any information in the ISR explaining the conflicting information. Additionally, when calculating the amount of cumulative dollars awarded to small business concerns, the contractor appeared to have excluded about $54,000 in subcontracting, which was included in a separate line item in the ISR for women-owned small business concerns. As a result, we were unable to determine whether this contractor had been meeting its small business goal. For a second contract also awarded in 2017 for $74.9 million with a planned subcontracting total of about $23 million, the contractor reported the approved small business goal of 96 percent of total subcontracting dollars in the March 2018 and September 2018 reports. However, in March 2019 and September 2019 ISR submissions for this contract, the contractor reported a small business goal of 98.5 percent and 74.8 percent, respectively. We found no documentation explaining why the contractor reported goals in the 2019 ISRs that were different from the approved 96 percent goal. Navy: For one Navy contract, which was awarded for $13.5 million in fiscal year 2018 with a planned subcontracting total of $2.7 million, the contracting officer notified the contractor in the September 2018 and March 2019 ISRs that the small disadvantaged business goal of 0 percent of total subcontracting dollars in these submissions did not match the 25 percent goal in the approved subcontracting plan. The contractor corrected the error and the contracting officer accepted the revised reports. In the September 2019 submission, the contractor once again reported that particular goal as 0 percent, but the contracting officer did not note the recurring error in this submission. For another contract, awarded for $16.6 million in fiscal year 2016 with a planned subcontracting total of about $5.9 million, the March 2016 ISR listed a small business goal of 693 percent (the goal in the approved subcontracting plan was 69.3 percent) of total subcontracting dollars. The contracting officer did not address the incorrect percentage. Moreover, in the September 2016 submission, the goal was reduced to 61.8 percent, which was less than the goal in the approved subcontracting plan. There was no explanation for the discrepancies in either submission. GSA: For one GSA Public Building Service contract, which was awarded in fiscal year 2018 for $7.5 million, we found discrepancies between the goals listed in multiple accepted ISRs and the approved subcontracting plan. This contract involved janitorial services performed at two locations. Each location had a different approved small business goal—96 percent and 87 percent of total subcontracting dollars. However, the contractor reported only one small business goal in the three ISRs submitted for September 2018, March 2019, and September 2019, and this reported goal varied from 89 to 97 percent in the three ISRs. According to a GSA official, the contractor submitted one ISR in each reporting period to convey the combined progress toward meeting its subcontracting goals for both locations, but the small business goal the contractor reported in each ISR did not accurately reflect the combined goals for both locations. The GSA official told us the combined goal the contractor should have reported for this contract was about 91 percent. According to the GSA official, these submissions contained data entry errors by the contractor, perhaps due to the contractor not knowing how to properly report its subcontracting data. For one GSA Federal Acquisition Service contract awarded in fiscal year 2017 for $3.6 million, we found a discrepancy between the small business goal reported in multiple ISR submissions—5 percent of total subcontracting dollars—and the 25 percent goal of total subcontracting dollars in the approved subcontracting plan, and we notified the agency of the discrepancy. However, none of these submissions included an explanation for the discrepancy and the agency’s reviewing official accepted the submissions without addressing the conflicting information. We also found one instance involving unclear oversight responsibilities among the 26 contracts we reviewed. We were unable to determine which agency actively monitored one DLA contract, which was awarded in fiscal year 2017 for $23.3 million. According to DLA staff, DCMA is responsible for monitoring, evaluating, and documenting performance of the contractor for the associated small business subcontracting plan. However, DCMA officials provided responses that DLA is the entity that should be conducting oversight of the subcontracting plan. If oversight responsibility of contracts involving two agencies is not apparent, it is unlikely that the contractor’s compliance with their subcontracting plans is being properly monitored. According to agency officials, several factors contributed to contracting officers accepting subcontracting reports with erroneous information. For example, as previously stated, agency officials told us that contracting officers’ large workload and focus on the award process (rather than on contract administration) can contribute to not always considering subcontracting plans as material parts of contracts and, thus, not conducting related due diligence after the contract award. GSA officials also noted that contracting officers may not have read or understood FAR requirements for oversight of contracts. For 16 of the 26 contracts we reviewed with a subcontracting plan, contractors reported that they met their small business subcontracting goal or were meeting the goal in situations where the contract had not yet ended. For the remaining 10 contracts, three ended without the contractor meeting the small business goal, five were not meeting the small business goal but the contract had not yet ended, and two had limited documentation available and we were unable to determine whether the goal was met. For the three contracts that ended without the contractor meeting the small business goal, two contracts had documentation that included a rationale for why the goal was not met. For one NASA contract, the contracting officer documented in a memorandum that a decision was made that there was no longer any subcontracting possibilities. The other instance involved a GSA Federal Acquisition Service contract, in which the assessing official documented in the final Compliance Performance Assessment Report that the low goal achievement was due to the nature of the automotive manufacturing industry. We could not identify a rationale for one Navy contract for why the small business subcontracting goal was not met and the agency could not provide documentation explaining why the goal was not met. The FAR requires contracting officers to assess liquidated damages against a contractor if a contracting officer determined the contractor failed to make a good-faith effort to comply with the subcontracting plan. However, a contractor’s failure to meet its subcontracting plan goals does not, in and of itself, constitute a failure to make a good-faith effort. Of the three contracts we reviewed that did not meet their small business subcontracting goal, we found no instances in which a contracting officer pursued liquidated damages or other actions against a contractor. As previously mentioned, two of these three contracts had a documented rationale for not meeting the small business subcontracting goal. Agency officials told us that contracting officers rely on Compliance Performance Assessment Reports or other performance assessment measures to rate a contractor’s performance relative to their subcontracting goals. Officials from three of the four agencies also told us a contractor’s past performance could affect their future ability to obtain government contracts, which can incentivize contractors to take steps to meet their subcontracting goals. SBA provides training to federal agencies’ contracting officers and contractors to assist in complying with small business subcontracting plan requirements. As part of its Small Business Subcontracting Program, SBA conducts certain reviews to assess overall effectiveness of small business subcontracting, including compliance reviews that are designed to assess contractor compliance with small business subcontracting plans. However, SBA could only provide limited documentation on compliance reviews it conducted from fiscal years 2016 through 2018, and limited information on compliance reviews conducted in fiscal year 2019. SBA provides training for contracting officers yearly to assist them in their reviews of subcontracting plans, including training related to pre-and post- award subcontracting activities for contracting officers. Beginning in 2017, SBA made available annual training for contracting officers to assist them in reviewing subcontracting plans. SBA also provides training to contractors, which provides them with information on meeting subcontracting plan requirements. If a prime contractor receives a less than satisfactory rating on a compliance review, the prime contractor must attend a mandatory training to address the issues found in the initial rating. According to SBA officials, the agency also has been developing new electronic-based training to coincide with new compliance review processes. According to the officials, the training is intended to educate prime business contractors with a subcontracting plan and federal agencies awarding contracts with a subcontracting plan on how to comply with post-award subcontract program requirements. SBA plans to make this training available in July 2020 in an electronic format that will provide information and require the participant to answer a series of questions to ensure they comprehend and retain the information. In addition to providing training, SBA’s CMRs conduct reviews related to SBA’s Small Business Subcontracting Program. In particular, SBA’s Standard Operating Procedure (SOP) 60 03 6, which was effective from December 4, 2006 through July 17, 2018, identified CMR responsibilities and included guidance for conducting reviews related to the Small Business Subcontracting Program. According to this SOP, CMRs were to conduct different types of reviews: In Performance Reviews (also referred to as desk reviews), CMRs were to review ISRs and SSRs that contractors submitted to determine which large business contractors in their portfolios they should visit, and what type of compliance review would be most effective. In Small Business Program Compliance Reviews (compliance reviews), CMRs were to evaluate a contractor’s compliance with subcontracting program procedures and goals in a contractor’s small business subcontracting plan. CMRs also were to conduct follow-up compliance reviews on areas found deficient during a compliance review or previous follow-up review. SOP 60 03 6 also described some orientation or outreach activities as reviews. In Subcontracting Orientation and Assistance Reviews, CMRs were to visit a large business contractor’s facility or telephone the contractor to introduce them to the Small Business Subcontracting Program and provide an overview of the roles and responsibilities of a prime contractor. According to SBA, the agency conducted 417 of these reviews from fiscal years 2016–2018. According to SBA, the agency’s CMRs conducted hundreds of various reviews in fiscal years 2016 through 2018, and a total of 118 compliance reviews specifically during that period (see table 4). SBA staff said SBA also conducts surveillance reviews to evaluate the overall effectiveness of an agency procurement center’s small business program by reviewing contract files and procedures. According to SBA documentation, these reviews allow SBA to recommend changes to improve small business participation at procurement centers. A surveillance review also examines the procurement center’s subcontracting program. SBA staff examine subcontracting files to determine if procurement center staff routinely perform subcontracting plan reviews, route the subcontracting plans to the PCR for review during the contract award process, incorporate approved subcontracting plans into contracts, and ensure that prime contractors submit the subcontracting plan ISRs into eSRS. For example, in a 2019 surveillance review (for which we obtained a copy) SBA found the center that conducted the procurements did not have a subcontracting plan in the file for two contracts and the subcontracting plan was not sent to the appropriate SBA Area Director for four contracts. In July 2018, SBA issued a new SOP entitled Subcontracting Assistance Program Post Award, which revised SBA’s compliance review process. According to SBA officials and a high-level outline SBA provided, SBA intends to have the following three phases for the new review processes that will implement the new SOP: 1. Subcontract Reporting Compliance – In this phase, CMRs are to review and rate a prime contractor’s compliance with subcontracting reporting requirements (that is, the contractor’s ISR and SSR reporting requirements). According to SBA officials, SBA also intends to inform contract awarding and administering agencies of their findings. 2. Subcontracting Plan Goal Attainment Compliance – In this phase, CMRs are to review whether a prime contractor has met or is on track to meet the goals listed in the subcontracting plan. 3. Subcontract Regulation Compliance – In this phase, CMRs are to review the prime contractor’s actions in adhering to all the elements in the subcontracting plan and meeting subcontracting plan goals, among other related actions. According to SBA officials, the new compliance review process is intended to standardize compliance reviews based on the new SOP. SBA developed a broad outline of the three-phase compliance review process, and to implement this process, developed a CMR portfolio tracking document, in the form of a spreadsheet, and a draft compliance review guidance document, both of which SBA is currently using for the first phase of the process. However, SBA officials told us they could not provide detailed procedures for implementing the second and third phases and they continue to refine the compliance review spreadsheet in conjunction with the compliance review guidance. As of mid-March 2020, they stated that they intend to complete phase 2 guidance by July 30, 2020, and phase 3 guidance by October 30, 2020. SBA could not provide us with requested information and almost no documentation on the compliance reviews its CMRs conducted in fiscal years 2016–2018. SBA could not provide basic information such as the list of contractors reviewed, the specific type of compliance reviews (such as reviews conducted individually or conducted jointly with another agency), which agencies may have assisted in the reviews (in the case of any joint reviews), and contractor ratings resulting from the reviews. SBA could only provide one CMR compliance review and two follow-up compliance reviews for this time frame, and all three were conducted in fiscal year 2017. The one CMR compliance review SBA provided included general observations from the review, specific findings, follow-up actions required, best practices for the contractor, and the rating provided to the contractor. The follow-up compliance reviews from fiscal year 2017 identified steps that contractors took to address deficiencies found in the initial compliance review and steps to enhance their subcontracting program. According to SBA officials, the agency’s CMRs conducted 680 compliance reviews in fiscal year 2019 and SBA was able to provide some documentation related to these reviews. To conduct these reviews, SBA officials explained that they selected about 4,000 prime contracts from FPDS-NG with individual subcontracting plans that ended in fiscal year 2019 or later. From these approximately 4,000 contracts, SBA officials told us that CMRs randomly selected 680 for review during fiscal year 2019. The CMRs assessed the selected sample of contracts against the first phase of the new compliance review process—the extent to which contractors complied with their reporting requirements. In our review of the documentation SBA provided, we could not clearly identify how many reviews they conducted. For example, the summary information from the reviews was not documented or maintained in a single document, but was in multiple spreadsheets with some inconsistencies, making it difficult to determine how reviews were counted. Additionally, one spreadsheet contained a summary tab for many contracts, but a count of the unique contracts did not add up to 680. Other spreadsheets did not have a summary tab, and contained information on the reviewed contracts in tabs organized by contractor. According to its latest SOP, SBA conducts compliance reviews to determine whether prime contractors that are not small businesses complied with their post-award subcontracting responsibilities outlined in the subcontracting plan to ensure small business subcontracts are being properly awarded and reported. However, based on our review of the limited documentation provided, SBA lacks specific guidance in its SOP on how CMRs should maintain information for compliance reviews they conduct. SBA has draft guidance on the new compliance review process, including some specific information regarding what CMRs are to record as part of the compliance review. However, SBA does not have clearly documented and maintained records on the first phase of these compliance reviews. Requirements for small business subcontracting plans in certain contracts enhance opportunities for small businesses to participate in federal contracting. However, weaknesses in selected agencies’ oversight of subcontracting plans—such as not following all procedures and not reviewing contractor submissions for errors or omissions—can reduce those opportunities and limit agencies’ knowledge about the extent to which contractors fulfill obligations to small businesses. The frequency with which issues arose in our sample suggests agencies can do more to improve oversight. For contracts we reviewed which used checklists or memorandums to document the PCR review process, we found that those contracts generally demonstrated compliance with the requirement for the opportunity for a PCR review. Taking steps to ensure that contracting officers provide PCRs the opportunity to review contracts with subcontracting plans would help agencies identify subcontracting opportunities and benefit from suggestions for increasing small business participation. In turn, such efforts could help agencies achieve their small business subcontracting goals. Similarly, improved monitoring of submitted contractor reports on subcontracting activities would identify errors in the submissions and increase agencies’ ability to assess contractor performance. Without complete and accurate information on a contractor’s subcontracting goals, agencies cannot adequately assess a contractor’s performance in meeting its subcontracting plan responsibilities. Given the many responsibilities of contracting officers, steps to ensure that contractor report submissions on meeting subcontracting goals are accurate would assist agencies’ oversight efforts. SBA also has opportunities to significantly enhance oversight related to its subcontracting program. It lacks documentation for almost all compliance reviews conducted in three of the four fiscal years from 2016 through 2019, has not fully implemented revisions to the compliance review process, and has not yet developed procedures for ensuring clear and consistent records of all compliance reviews are documented and maintained. By having clear and consistent documentation for compliance reviews and maintaining those records, SBA would better position itself to track contractor compliance for contracts it reviews and would be able to use this information to inform subsequent reviews. Additionally, contracting agencies would be able to leverage the information from SBA for their own reviews of contractor performance and subcontracting plans. We are making a total of 10 recommendations to five agencies (three to DLA, one to GSA, two to NASA, three to Navy, and one to SBA): The Director of DLA should include a step for the opportunity for PCR review of the proposed contract and subcontracting plan in agency procedures and memorandums, and develop a mechanism for documenting whether the opportunity for PCR review was provided. (Recommendation 1) The Secretary of the Navy should include a step for the opportunity for PCR review of the proposed contract and subcontracting plan in agency procedures and memorandums, and develop a mechanism for documenting whether the opportunity for PCR review was provided. (Recommendation 2) The Director of DLA should take steps to fulfill the requirement that contracting officers ensure that subcontracting reports are submitted by contractors in a timely manner. For example, the agency could require contracting officers to verify that prior reports were submitted when reviewing current submissions. (Recommendation 3) The NASA Administrator should take steps to fulfill the requirement that contracting officers ensure that subcontracting reports are submitted by contractors in a timely manner. For example, the agency could require contracting officers to verify that prior reports were submitted when reviewing current submissions. (Recommendation 4) The Secretary of the Navy should take steps to fulfill the requirement that contracting officers ensure that subcontracting reports are submitted by contractors in a timely manner. For example, the agency could require contracting officers to verify that prior reports were submitted when reviewing current submissions. (Recommendation 5) The Director of DLA should take steps to ensure contracting officers compare subcontracting goals in contractor report submissions to goals in the approved subcontracting plan and address any discrepancies. (Recommendation 6) The Administrator of the GSA should take steps to ensure contracting officers compare subcontracting goals in contractor report submissions to goals in the approved subcontracting plan and address any discrepancies. (Recommendation 7) The NASA Administrator should take steps to ensure contracting officers compare subcontracting goals in contractor report submissions to goals in the approved subcontracting plan and address any discrepancies. (Recommendation 8) The Secretary of the Navy should take steps to ensure contracting officers compare subcontracting goals in contractor report submissions to goals in the approved subcontracting plan and address any discrepancies. (Recommendation 9) The SBA Administrator should ensure Commercial Market Representatives clearly and consistently document compliance reviews and maintain these records. (Recommendation 10) We provided a draft of this report to DOD, GSA, NASA, and SBA for review and comment. DOD provided a written response, reproduced in appendix II, in which it concurred with our recommendations. DOD described steps that DLA and Navy intend to take to address the recommendations, including actions to remind contracting officers or to provide additional guidance related to giving the PCR an opportunity to review the proposed contract and subcontracting plan. DOD also described actions that DLA and Navy intend to take to remind contracting officers of the requirement to ensure that subcontracting reports are submitted in a timely manner and to remind contracting officers to compare subcontracting goals in contractor report submissions to goals in the approved subcontracting plan and address any discrepancies. GSA provided a written response, reproduced in appendix III, in which it concurred with our recommendation. NASA provided a written response, reproduced in appendix IV, in which it concurred with our recommendations. NASA described steps it intends to take, such as requiring procurement offices to monitor contracting officer reviews of contractor report submissions and comparisons of subcontracting goals for consistency with the subcontracting plan. NASA also provided technical comments on the draft report that we incorporated where appropriate. SBA provided a written response, reproduced in appendix V, in which the agency partially concurred with our recommendation. SBA also asked us to consider rewording a few statements that it considered to have appeared for the first time in the draft report. In the draft report we sent to SBA, we provided additional information about how we could not clearly identify how many reviews the CMRs conducted. SBA stated in its written response that it has comprehensive documents and records for fiscal year 2019 compliance reviews and while its CMRs maintain a separate workbook of spreadsheets for reviews they conduct, the agency maintains a summary document that combines the compliance reviews performed collectively by its CMRs. During our audit and as part of its written response to our draft report, SBA did not provide a summary document that showed all reviews conducted by its CMRs for fiscal year 2019. SBA also acknowledged in its written response that it could not provide requested documentation for compliance reviews conducted during fiscal years 2016 through 2018. SBA stated it has developed detailed procedures for maintaining consistent records for compliance reviews and that while CMRs are using these procedures currently, the agency intends to finalize the procedures on May 29, 2020 to ensure that SBA continues to fully document its compliance reviews. Based on the documentation we reviewed and analyzed during our audit, we maintain that SBA does not have clearly documented and maintained records of compliance reviews and should clearly and consistently document its compliance reviews and maintain these records. We will review any additional documentation of records of compliance reviews when SBA provides it in response to this recommendation. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to appropriate congressional committees and members, the Secretary of DOD, the Administrator of GSA, the Administrator of NASA, the Administrator of SBA, and other interested parties. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. Our objectives in this report were to examine (1) the extent to which select agencies conduct oversight related to small business subcontracting plans in the pre-award phase of the federal contracting process; (2) the extent to which select agencies conduct oversight of such subcontracting plans in the post-award phase; and (3) steps the Small Business Administration (SBA) has taken to encourage agencies to conduct oversight activities related to small business subcontracting plans. To address the first two objectives, we reviewed the Federal Acquisition Regulation (FAR) and agency-specific procedures. We also reviewed requirements for contractor submissions on subcontracting activity related to subcontracting plans, and corresponding agency oversight requirements for the submissions. We reviewed documentation on agency training for contracting officers related to subcontracting plans and requirements. We judgmentally selected two military agencies—the Defense Logistics Agency (DLA) and the Department of the Navy (Navy)—and two civilian agencies—the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA)— to review based on our analysis of Federal Procurement Data System- Next Generation (FPDS-NG) data and other factors. More specifically, we selected the agencies because they (1) included a mix of military and civilian agencies, (2) had relatively high dollar amounts of federal contracts awarded in fiscal years 2016–2018, and (3) included a range of performance related to subcontracting based on SBA’s annual procurement scorecard. We also reviewed documentation for a nongeneralizable sample of 32 contracts—eight per agency—awarded in fiscal years 2016–2018 across the four agencies. We randomly selected these 32 contracts from a set of contracts that met several criteria. Specifically, the criteria were contracts with dollar amounts above $1.5 million, that had a mix of subcontracting plans (individual, commercial, and comprehensive) or reasons for not including subcontracting plans in a contract (such as no subcontracting possibilities for the contract or the contract not requiring a subcontracting plan), and a mix of their current status at the time of our selection (completed or active). We selected contracts as follows: We first randomly selected six contracts per agency (total of 24) that had a small business subcontracting plan at the time of award. To do this, we used a random number generator for the universe of contracts meeting the above criteria and selected contracts in the order of the random number generator, but skipped a contract if it was too similar to already-selected contracts (for example, same type of subcontracting plan or similar dollar amount). We then selected another set of contracts—two per agency (total of eight)—that seemed to meet criteria for requiring small business subcontracting plans, such as exceeding the dollar threshold, but were coded in FPDS-NG as not having a plan in place. We also obtained reports on contractor submissions on small business subcontracting activity, where applicable, and agency reviews of the submissions from the Electronic Subcontracting Reporting System (eSRS). Specifically, we searched eSRS for any contractor-submitted individual subcontracting reports (ISR) or summary subcontract reports (SSR), where applicable, for each contract with a subcontracting plan and reviewed the reports along with agency contracting officer comments, approvals, or rejections related to the reports. If we were unable to locate any ISRs or SSRs in eSRS, we asked the procuring agency to provide copies of the reports. We also requested agency documentation for any actions contracting officers took, if applicable, for each contract where the contractor had not met the small business subcontracting goal. We also interviewed officials from each agency about their efforts related to oversight of small business subcontracting plans and these contractor submissions. We assessed the reliability of FPDS-NG data by reviewing available documentation and prior GAO data reliability assessments and by electronically testing for missing data, outliers, and inconsistent coding. We found the data to be reliable for the purposes of selecting agencies and contracts to review. We assessed the reliability of eSRS by reviewing available documentation and verifying information with agencies. We found the information in eSRS to be reliable for purposes of assessing the extent to which agencies conduct oversight related to contractor submission reports in the system. To address the third objective, we reviewed documentation on several types of SBA reviews, including compliance reviews, related to contractor compliance with and agencies’ oversight of subcontracting plans. Specifically, we reviewed documentation on reviews SBA conducted related to its subcontracting program during fiscal years 2016–2019. We also reviewed SBA’s standard operating procedures for the subcontracting program, documentation on processes implementing the new procedures, and documentation on SBA training programs for the small business subcontracting program. We interviewed SBA officials regarding steps the agency takes to encourage agency oversight of subcontracting plans. For all the objectives, we reviewed relevant federal laws and regulations and reviewed previous GAO reports and reports from the Department of Defense Office of Inspector General (DOD OIG). We also interviewed officials from the DOD OIG to obtain an understanding of their work on DOD’s oversight of subcontracting plans at selected DOD components and command centers. We conducted this performance audit from January 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Andrew Pauline (Assistant Director), Tarek Mahmassani (Analyst in Charge), Suellen Foth, Jonathan Harmatz, Julia Kennon, Jill Lacey, Yola Lewis, John McGrail, Marc Molino, and Barbara Roesmann made key contributions to this report.", "summary": "Certain federal contracts must have a small business subcontracting plan if subcontracting opportunities exist. But recent Department of Defense Inspector General reports raised concerns about agency oversight of subcontracting requirements. GAO was asked to review oversight of subcontracting plans. Among its objectives, this report discusses (1) the extent to which selected agencies (DLA, GSA, NASA, and Navy) oversee small business subcontracting plans, and (2) how SBA encourages agency compliance with subcontracting plan requirements. GAO reviewed data and documentation for a non-generalizable sample of 32 federal contracts (including 26 contracts with a subcontracting plan) at four agencies, selected to include contracts over $1.5 million at both civilian and military agencies awarded in fiscal years 2016–2018. GAO also reviewed the Federal Acquisition Regulation, SBA and selected agency documentation, and interviewed agency officials. GAO found selected agencies did not consistently follow all required procedures for oversight of small business subcontracting plans, both before and after contracts were awarded. GAO reviewed 26 contracts with a subcontracting plan at four agencies—Defense Logistics Agency (DLA), General Services Administration (GSA), National Aeronautics and Space Administration (NASA), and the Department of the Navy (Navy). For about half of the 26 contracts, agencies could not demonstrate that procedures for Procurement Center Representative (PCR) reviews were followed. These representatives may review small business subcontracting plans and provide recommendations for improving small business participation. When an agency is awarding a contract that includes a subcontracting plan, contracting officers are required to notify these representatives of the opportunity to review the proposed contract. Without taking steps to ensure these opportunities are provided, agencies may not receive and benefit from suggestions for increasing small business participation. For 14 of the 26 contracts, contracting officers did not ensure contractors submitted required subcontracting reports. After a contract is awarded, contracting officers must review reports contractors submit that describe their progress towards meeting approved small business subcontracting goals. In some cases, contracting officers accepted reports with subcontracting goals different from those in the approved subcontracting plans, with no documentation explaining the difference. Without complete and accurate information about a contractor's subcontracting goals, an agency cannot adequately assess a contractor's performance in meeting its subcontracting plan responsibilities. The Small Business Administration (SBA) encourages agency compliance with small business subcontracting plan requirements by providing training to contracting officers and contractors, and by conducting reviews. For instance, SBA Commercial Market Representatives conduct compliance reviews to evaluate a large prime contractor's compliance with subcontracting program procedures and goal achievement. However, SBA could not provide documentation or information on almost all compliance reviews conducted in fiscal years 2016–2018. SBA has developed new procedures for conducting compliance reviews, but as of mid-March 2020, had yet to fully implement them. SBA has conducted fiscal year 2019 compliance reviews that reflect a first phase of their new procedures. SBA has draft guidance on the new compliance review process, including some specific information regarding what Commercial Market Representatives are to record as part of the compliance review. SBA has begun to conduct compliance reviews in accordance with the guidance, but does not have clearly documented and maintained records for the first phase of these reviews. Without consistent, clear documentation and records that will be maintained going forward, SBA's ability to track contractor compliance and agency oversight efforts will be limited. GAO is making 10 recommendations for ensuring procedures for PCR reviews are followed, contractor subcontracting reports are monitored and reviewed for accuracy, and SBA compliance reviews are clearly documented and maintained. DLA, GSA, NASA, and Navy concurred with our recommendations. SBA partially concurred with our recommendation. GAO maintains that its recommendation is warranted.", "document_type": "gao"}
{"report": "VA, through VHA, operates the nation’s largest integrated health care system. At the local level, VA has 172 VA medical centers that are organized into 18 Veterans Integrated Service Networks (VISN). At the national level, VHA’s central office includes approximately 75 national program offices as of October 2019, which perform a range of clinical or administrative functions. For example, some program offices are responsible for specific clinical areas, such as spinal cord injury or mental health care, and may develop policy for those areas. To support VA’s health care delivery system, VA’s intramural research program aims to improve veterans’ health by funding research on issues that affect veterans, developing effective treatments for veterans, and recruiting and retaining VA researchers. VA’s medical and prosthetic research appropriation—$722 million in fiscal year 2018—funds VA’s intramural research program. VA also uses funding from its other appropriation accounts—$544 million in fiscal year 2018—to support VA’s intramural research by paying some costs associated with this research, such as equipment maintenance. According to VA, more than 60 percent of VA researchers are also clinicians who provide direct patient care, which helps translate VA research into clinical practice. ORD manages VA’s intramural research program. Within ORD, there are four research and development services that are responsible for administering and supporting research; each research service has a specific focus, such as biomedical research and rehabilitation research. Each of the four research services is led by a director and has scientific program managers who are responsible for specific research portfolios (or topic areas) within their service. In addition to the four research services, ORD has a Cooperative Studies Program that is responsible for large-scale clinical trials and epidemiological studies within VA. (See Table 1.) All five of these ORD components support research by funding VA research projects. See appendix II for details on research funding and awards. Organizationally, ORD falls within the Office of Discovery, Education and Affiliates Networks, which was created in November 2018 to foster collaboration in addressing veterans’ health concerns. ORD funds VA intramural research in a number of ways, such as the following: Merit Review Program. This program supports VA research projects that are typically led by one VA researcher at one VA facility. ORD’s four research services administer this program and are responsible for soliciting, reviewing, selecting, and funding research proposals submitted by VA researchers. Researchers may submit proposals either in response to a request for applications on a specific topic (sometimes called targeted or focused requests) or to a general request for applications, for which researchers can propose projects on a wider range on topics. To be considered for funding, research proposals must be veteran-centric and meet other requirements. Each ORD research service typically evaluates Merit Review Program research proposals in two review cycles per year. Selected projects are funded for a set number of years and have a maximum budget— typically for four years with a maximum amount of $1.2 million. The Merit Review Program accounts for the majority of VA-funded research studies that ORD funds. Cooperative Studies Program. This program funds larger-scale, multi-site clinical trials and epidemiological research studies on diseases that affect veterans. VA researchers can submit proposals at any time during the year. ORD’s Chief Research and Development Officer and Cooperative Studies Program leadership evaluate proposals in two review cycles per year. The time frame and budget for selected studies varies, depending on features of specific studies. Career Development Program awards. The research services’ Career Development Program provides funding to support, train and mentor individuals early in their career as VA researchers, which can include funding for specific research projects. Funding to support VA research centers and entities. In addition to funding individual research projects and researchers, ORD funds research centers and entities that focus on specific research areas. For example, the rehabilitation research service provides “core funding” to support 12 research centers focusing on areas such as limb loss, spinal cord injury, vision loss, and auditory disorders. This type of funding is competitive, and VA researchers must recompete in 5-year cycles. Once research has been completed, the findings can inform additional research. For example, research findings from a study on tissue could be used to inform a study done on humans in a controlled clinical setting, such as a clinical trial, which could in turn inform research that tests the effectiveness of a particular intervention in a less-controlled community setting. This concept is referred to as the “research pipeline.” Research findings leading to broad changes in clinical practice that affect public health is considered the end of the pipeline. Within VA, research findings can be translated into clinical practice in a number of ways, such as by implementing a new diagnostic tool, changing the treatment protocol for a particular disease, adding a new prompt for providers in the electronic health record, or developing a new clinical policy or a clinical practice guideline. The specific outcome might vary depending on the study or type of research. For example, one body of VA research has confirmed the utility of an intimate partner violence screening tool for female veterans in primary care settings. These findings will be used in developing national guidelines for screening for, and responding to, intimate partner violence. In addition, VA research contributed to the development of a clinical practice guideline for the management of upper extremity amputation rehabilitation. This guideline is a tool to assist clinicians and health care professionals with their decision-making when caring for individuals with upper extremity amputation. ORD leadership sets VA’s national research priorities based on input from internal and external stakeholders and other factors. The directors of ORD’s four research services, in turn, set their own service-level research priorities based on the national priorities, veterans’ specific needs, and other considerations. Once these research priorities are set, ORD officials use a range of approaches to incorporate them when funding research, such as by funding collaborative research efforts focused on specific priorities. ORD officials said in funding research, they also consider other clinical and research needs that are not identified as priorities but are still important to veterans’ health, such as encouraging researchers to test new ideas. At the national level, ORD leadership sets VA’s overall research priorities based on input from internal and external stakeholders and other factors. ORD sets these priorities annually, and its priority-setting process involves discussions with stakeholders and reviews of relevant VA data, according to ORD officials. For example, ORD sets priorities using the following methods: Input from internal VA stakeholders. The directors of ORD’s research services provide input to the Chief Research and Development Officer on issues they see as priorities. Officials outside of ORD, such as the leadership of VA’s new Office of Discovery, Education, and Affiliated Networks, of which ORD is a part, and other VA leaders also provide input, according to ORD officials. Input from external stakeholders. ORD officials said they also consider input from the National Research Advisory Council, a 12- member federal advisory committee that provides advice to VA on its research and development efforts, such as recommending which topics to include among the agency’s research priorities. According to ORD officials, the office also obtains input on research priorities by meeting with veterans service organizations and by hearing from veterans through veterans’ engagement opportunities. In addition, Congress provides direction and input on topics that VA should study, such as through legislation or committee reports. Other factors. ORD officials said, for example, they set research priorities using VHA data on the prevalence of health conditions among veterans and Veterans Benefits Administration data on military deployment-related conditions. Based on stakeholder input and other factors, ORD established three types of national research priorities: strategic, cross-cutting clinical, and other priorities. (Figure 1 shows these research priorities for fiscal years 2019 and 2020.) As of October 2019, ORD officials told us they were determining what these priorities will be for fiscal year 2021. Strategic priorities are broad long-term priorities that focus on VA’s research capability, resources, and operations, rather than on specific clinical conditions, according to ORD officials. For example, one of VA’s strategic priorities is to “put VA data to work for veterans.” As part of this priority, VA aims to improve its ability to leverage the agency’s medical data to improve veterans’ care. ORD officials said they plan to revisit these priorities about every 5 years, though the specific initiatives that fall within each priority can change annually. As an example of how the initiatives within the strategic priorities can change, ORD officials said that given VA’s plans to implement a new electronic health records system, the National Research Advisory Council advised ORD in 2019 to focus on mitigating any unintended consequences of this transition on research, as part of the strategic priority on data. ORD officials said that as a result of this input, they are increasing the intensity and scope of their efforts pertaining to this transition. Cross-cutting clinical priorities, in contrast, focus on predominant clinical conditions seen in veterans and can change yearly, according to ORD officials. For example, one current cross-cutting clinical priority is PTSD. As part of this priority, VA supports research to better understand the underlying biology of PTSD, refine approaches for diagnosing this condition, and develop and test new treatments. ORD officials said they plan to add precision oncology as a new cross- cutting clinical research priority for fiscal year 2021, based on input from VA leadership. ORD officials also said they plan to broaden the Gulf War illness cross-cutting clinical priority to include the effects of military service-related toxic exposures, more generally. This planned change is based in part on veterans service organization and Gulf War veteran input. Other priorities are those that VA will focus on in the near term, based primarily on input from Congress, veterans service organizations, and other non-ORD stakeholders, according to ORD officials. For example, several of these priorities for fiscal year 2020— such as addressing the prosthetic needs of women veterans and exploring ways to use an “exoskeleton” for veterans who have experienced strokes or traumatic brain injury (TBI)—were identified by Congress as research needs. In addition to national priorities for research funding, ORD permits its four research services to set their own service-level research priorities, which are based in part on the national priorities. According to ORD officials, the directors of the four ORD research services—the biomedical laboratory, clinical science, health services, and rehabilitation research and development services—have latitude to set their own priorities, given their expertise in, and the particular focus of, their respective research areas. These directors told us they may consider a range of internal and external factors when setting priorities, including: Internal factors. The four research service directors told us they take into account VA’s national research priorities when determining their priorities. For example, the director of the biomedical laboratory service identified VA’s five cross-cutting clinical research priorities as priorities for this research service. Also helping shape research priorities are VA stakeholders, such as the Secretary of VA and scientific program managers—the ORD staff who are responsible for specific topic areas within their services. In addition, service directors told us they use VA data on veterans’ health conditions when setting research priorities. The leadership of ORD’s rehabilitation research service, for example, told us they review VA data on the top service- connected conditions for which veterans are receiving disability benefits, and take that factor into consideration, along with less prevalent conditions such as spinal cord injuries, that also have a significant impact on veterans’ function and independence when setting priorities. (See text box for examples of research projects on spinal cord injury, which is one of the rehabilitation research service’s priorities.) Exoskeleton-assisted walking Exoskeletons are motorized prostheses that are worn outside a person’s clothes and provide powered hip and knee motion, to help veterans with spinal cord injuries stand and walk. In this photograph, a research participant with a spinal cord injury uses an exoskeleton at the Bronx VA medical center. Department of Veterans Affairs (VA) Research on Spinal Cord Injuries VA provides care for about 27,000 veterans with spinal cord injuries. Veterans with spinal cord injuries may have secondary bone loss, muscle atrophy, and other conditions. They also have an increased prevalence of diabetes, heart disease, stroke, bowel and bladder incontinence, chronic pain, and reduced quality of life, according to VA. VA’s National Center for the Medical Consequences of Spinal Cord Injury, located at the Bronx VA medical center, is one of the VA’s rehabilitation research service’s research centers. The Center’s mission is to improve quality of life and increase longevity in individuals with spinal cord injuries by identifying and intervening to reduce and prevent the secondary consequences of spinal cord injuries. Examples of the Center’s VA-funded research include: Studying the safety and efficacy of exoskeleton-assisted walking in rehabilitation settings and in home and community environments, Developing and testing innovative approaches to improve bowel function, Studying the impact of low blood pressure and developing approaches to help individuals maintain normal blood pressure, Studying individuals’ difficulties regulating their body temperature, and developing interventions to address this problem, and Using magnetic and electrical stimulation to enhance arm and leg function. External factors. Congress can play a role in shaping the research services’ priorities. For example, the health services research service has identified research on policies and programs included in recently enacted legislation, including the VA MISSION Act of 2018 and the Comprehensive Addiction and Recovery Act of 2016, as a priority. Input from other federal partners, such as the National Institutes of Health (NIH) or the Department of Defense (DOD), also can influence the priorities of ORD’s research services. Officials with the rehabilitation research service, for example, said they meet with DOD officials about research efforts and that input from DOD on the health issues seen among active-duty service members can help them anticipate what health issues those service members might face when they transition to veteran status. They can then use that information when deciding which clinical areas to prioritize. In addition, one director said that input from veterans service organizations can shape research priorities, while another director obtains input from veterans through a VA veteran engagement group that provides information on the needs of veterans. ORD’s service-level research priorities cover a wide range of areas, such as service-connected conditions and conditions that veterans may experience as they age. As of October 2019, the services had each identified between 10 and 20 research priorities. (See the box below for examples.) Examples of Office of Research and Development’s Service-Level Research Priorities, as of October 2019 Traumatic brain injury (TBI) is a research priority for all the services. For example, the effect of prolonged opioid use on TBI outcomes is a priority for the rehabilitation research service. Post-traumatic stress disorder (PTSD) is a research priority for several services. For example, PTSD and the conditions that commonly co-occur with this condition is a priority for the clinical science research service. Pain is a research priority for all the services. For example, pain mechanisms and treatments, including alternatives to opioids, is a priority for the clinical science research service. Spinal cord injuries are a research priority for some services. For example, disability—including spinal cord injury and TBI— is a priority for the health services research service. Suicide prevention is a research priority for multiple services. The biomedical laboratory service, for example, has an emphasis on biological markers of suicide. Aging-related issues are a research priority for several services. For example, “long-term care, aging, and caregiver support” is a priority for the health services research service. Once priorities are set, ORD officials told us they use a range of approaches to incorporate those priorities when funding research projects, such as: encouraging researchers to study priority topics, considering priorities when deciding which projects to fund, and funding collaborative research efforts that are focused on specific priorities. In addition to the research priorities, ORD officials said they also consider other clinical and research needs when funding VA research, such as encouraging researchers to test new ideas in clinical areas that are not identified as priorities but are still important to veterans’ health. ORD officials’ approaches to incorporating priorities when funding research included the following examples: Encouraging researchers to study priority topics. ORD’s research services highlight their research priorities in their requests for research proposals. In some cases, they use targeted requests for research proposals solely on priority topics. In fiscal year 2019, ORD issued targeted requests for proposals linked to priorities such as suicide prevention, TBI, and the VA MISSION Act. In other cases, the research services highlight their research priorities in general requests for applications, which permit VA researchers to submit proposals on both priority and non-priority topics. For example, in 2019, the rehabilitation research service issued a general request for research proposals, stating that four research priorities—the prosthetic needs of women veterans, exoskeleton research related to patients with stroke and TBI, non-pharmacological interventions for chronic pain, and the effects of prolonged opioid use on long-term outcomes from TBI—were of particular interest for that funding cycle. (See text box for examples of VA research projects on priority topics.) Department of Veterans Affairs (VA) Research on Traumatic Brain Injury (TBI) and Stress Disorders Traumatic brain injury (TBI), a common injury among veterans of conflicts in Iraq and Afghanistan, can lead to a number of physical, cognitive, and emotional problems, such as memory and attention issues. These veterans may also experience post-traumatic stress disorder (PTSD), which can lead to anger, irritability, depression, substance abuse, and other symptoms, according to VA. VA’s Translational Research Center for TBI and Stress Disorders, located at the Jamaica Plain (Boston, Mass.) VA medical center, is one of VA’s rehabilitation research service’s research centers. The Center seeks to better understand the complex cognitive and emotional problems faced by these returning veterans, with the goal of developing better treatment options. The Center runs a longitudinal cohort study that collects imaging, genetic, and other data on returning veterans. Examples of the Center’s VA-funded research projects include: A study to assess the efficacy of the STEP-Home program, a 12-week workshop to help veterans who have served in Iraq or Afghanistan. The program aims to strengthen behavioral and emotional skills so that veterans are better equipped to rejoin their families and civilian communities. Studies to identify sub-types of PTSD, and to assess the long-term effects of PTSD and mild TBI. Research on the use of non-invasive brain stimulation to help patients with PTSD. Development of the Boston Assessment of Traumatic Brain Injury- Lifetime tool, a clinical interview to characterize head injuries and diagnose TBI throughout a patient’s lifespan. Considering priorities when deciding which projects to fund. Directors from all of ORD’s four research services stated that the scientific merit of research proposals—based on the proposals’ significance to veterans’ health, feasibility, and other criteria—is a key factor in funding decisions. Several directors said they may decide to fund a meritorious project that addresses one of their research priorities in lieu of another project that was ranked similarly or higher but does not address a priority. Some of the directors noted that this only applies to a small share of funded projects, but is part of how they align research projects with priorities. Funding collaborative research efforts. The biomedical laboratory service has funded field-based meetings to plan collaborative multi- site research programs to speed the development of treatments for service-related illnesses and injuries. The director of this research service said that in 2019, these research-planning meetings focused on ORD’s national research priorities, such as TBI, PTSD, and pain and opioids, among other topics. Also, starting in 2019, the health services research service is providing funding for its research centers to collaborate with other VA researchers on three of its priority areas: suicide prevention, opioid reduction and pain, and access to care. Officials from this research service said they also hold “State of the Art” conferences that can help VA make progress on priority areas. For instance, VA officials held a September 2019 conference on managing pain and addiction, specifically focusing on strategies to improve opioid safety. VA officials said this conference involved a wide range of VA staff and resulted in recommendations about research priorities, including areas where more research is needed. In addition to the research priorities, ORD officials said they consider other clinical and research needs when determining which health care research efforts to fund. Rehabilitation research service officials specifically noted that if they did not fund research in non-priority clinical areas, it would hinder their goal of encouraging researchers to test new ideas in other areas that are important to veterans’ health, which the officials say can lead to discoveries. The importance of innovation was echoed by other ORD officials, as well. Some ORD research service directors said that while new research needs emerge over time—as stakeholders highlight particular clinical needs, or VA leadership changes—it is important for VA research efforts to anticipate veterans’ longer-term needs and focus on more enduring issues, too. Officials from one research service said, for example, that they encourage researchers to focus on issues that will still be important in several years, such as women veterans’ care, because research can take years to yield results. In addition, some ORD research service directors said that although service-connected conditions are key parts of their research portfolios, they also work to address other conditions. Clinical science service officials said, for example, that they have a broad charge to support research into any disease or condition that affects veterans’ health. One of their priorities is researching diseases with a high health care burden among veterans, which may or may not be related to veterans’ military service. Rehabilitation service officials noted that their work focuses on veterans’ disabilities and impairments incurred through military service but is not limited to service-connected conditions. The officials said that because VA provides lifetime care to veterans, their research portfolio addresses events that cause impairment and disability throughout a veteran’s lifespan, including the aging process. For example, their research portfolio includes research on medical conditions that veterans may experience as they age, such as stroke, and chronic conditions like diabetes and kidney disease. As part of their efforts to consider multiple clinical and research needs, officials from the health services research service told us they are analyzing their overall research portfolio to determine where more or less research funding may be warranted. The officials explained that as part of their strategic planning efforts, they are identifying any areas they have “under-invested” in, and any areas that have received significant funding in the past but might no longer need that degree of investment. Among other things, they are considering the extent to which research on health conditions is already being done by other research organizations, such as NIH. They noted that while addressing chronic diseases is important to VA and its veteran population, it is possible that research on certain diseases is being covered by other research partners. In contrast, they said, there are areas where VA may have a unique ability to contribute to research because of its nationwide health care system or because it is ahead of the curve in health care trends, such as in telehealth and in integrating mental health care into primary care settings. Officials said their portfolio analysis could result in some “resetting” of research priorities and funding after the analysis is completed in 2020. Looking forward, ORD officials shared examples of approaches they are taking to boost the agency’s ability to address its research priorities. For example, ORD officials said there are a limited number of VA researchers working in certain priority areas, such as suicide prevention, which the officials said can hinder their efforts to fund new research projects. Among the efforts to boost the number of researchers working on priority areas, officials from one research service said they recently began incorporating their research priorities into the service’s Career Development Program funding awards. In addition, in 2019, ORD implemented a new method to spur and track ORD progress in addressing priorities. According to ORD leadership, as part of this method, ORD staff will identify the actions and resources needed to address specific priorities, and meet quarterly with the Chief Research and Development Officer to review their progress and identify next steps. VA has a variety of efforts to facilitate translating research findings into clinical practice to improve the care veterans receive. These efforts include those undertaken by ORD’s QUERI program, its health services research service, and VA’s Diffusion of Excellence Initiative, as discussed below. ORD’s QUERI provides a link between the research program, VA program offices, and VA providers. According to the QUERI director, QUERI serves as the center of VA’s efforts to translate research into clinical practice. QUERI’s overall mission is to improve veteran health by rapidly implementing research findings and interventions into clinical practice. QUERI is housed within ORD, but funded separately by non- research dollars. QUERI facilitates research implementation through activities such as the National Network of QUERI programs. According to the director of QUERI, these programs are partnered with VA national program offices, and they take various practices—often identified or developed through VA studies—and implement them at the regional or national level. For example, through its “Bridging the Care Continuum” QUERI investigators focus on improving the health of vulnerable veteran populations, such as homeless veterans, by implementing a co-occurring mental health and substance use treatment within multiple VA medical centers. (See text box for an example of implementation through a QUERI National Program.) In addition, QUERI funds resource centers with technical experts who can help promote and review best practices for implementation. Specifically, one resource center—the Center for Evaluation and Implementation Resources in Ann Arbor, Mich.—is available to VA researchers for consulting on strategies to translate research. Example of Quality Enhancement Research Initiative (QUERI) Research Translated into Clinical Practice: Telemedicine Outreach for Post-Traumatic Stress Disorder (PTSD) in Small Rural Community-Based Outpatient Clinics The goal of the Virtual Specialty Care QUERI National Program is to implement and evaluate promising clinical practices that incorporate technologies to improve access to specialty care for veterans in rural settings. One example of its efforts is the telemedicine program, based on VA-funded research demonstrating the effectiveness of using telemedicine outreach for veterans with PTSD. The Office of Rural Health and the Virtual Specialty Care QUERI partnered to implement this telemedicine program which provides evidence-based psychotherapy for veterans with PTSD via interactive video either from their homes or at community-based outpatient clinics, and connects veterans with care managers to coordinate their treatment. According to VA, as of June 2019 the telemedicine program is being implemented in six states and 1,073 “hard to reach” veterans have been engaged via the program. In 2019, QUERI published the “Implementation Roadmap,” a new resource—intended for a variety of users, including researchers, clinicians, and leadership—to advance research translation at VA and provide information on how to identify, implement, and sustain evidence- based practices to improve the quality of care for veterans. The Roadmap outlines the different stages of research implementation, specifically delineating when research is ready to be implemented into clinical practice. The QUERI director told us staff created the Roadmap as a teaching tool to provide guidance on how to implement research at VA and when to collaborate with QUERI. In addition, the director of QUERI told us the Roadmap demonstrates the cyclical nature of research and how implementation is part of a continuous scientific process, not an “end game.” QUERI officials said that throughout the process of implementation, new research questions might be generated, which QUERI can use to inform further investigation or follow up studies. ORD’s health services research service funds studies that focus on direct application of research in clinical practice. ORD’s health services research service supports research translation by funding studies focused on how interventions work in “real world” settings and on implementing VA research findings into clinical practice. For example, little is known about the quality of non-VA care for sex-specific services such as mammography, according to VA, despite increasing numbers of women veterans relying on such care due to limited availability within VA. One study funded by this research service looked at strategies for provision, coordination, and quality of oversight of non-VA care for women, and assessed perceptions and experiences with non-VA care among women veterans. Among other things, the study found VA sites providing mammography were more likely to notify women more quickly of abnormal results than non-VA sites, but non-VA sites were more likely to meet guidelines for timely follow-up. In addition to funding individual research studies through merit review, the health services research service funds 18 Centers of Innovation (COIN), each of which focus on one or more areas of research that address questions significant to clinical and operational partners. For example, officials from the dual-site COIN in Seattle and Denver, which focuses on veteran-centered and value-driven care, told us they are participating in a study co-funded by VA, NIH, and DOD evaluating non-pharmacological options to treat pain and co-occurring mental health conditions in veterans with chronic pain; the study will be overseen by VA’s Office of Patient-Centered Care and Cultural Transformation. According to the research service officials, the COINs are designed to bring researchers from multi-disciplinary research teams together to engage in research and establish partnerships that can affect VA policies, practices, and health care outcomes. (See text box for an example of research funded by the health services research service that has been translated into clinical practice.) Example of Research Translated into Clinical Practice across VA: Reducing Catheter-Associated Urinary Tract Infections The Center for Innovation (COIN) in Ann Arbor, Mich., partners with VA clinical, policy, and operations leaders to implement and evaluate ways to make health care safer, more effective, and affordable for veterans. For example, an investigator from this COIN, funded in part through a Career Development Award, conducted research on enhancing patient safety by reducing catheter-related infections. Then, in partnership with another VA researcher, this investigator conducted a study funded by the health services research service and created a “bundle” of activities to implement in VA hospitals throughout Michigan. This included removing catheters as soon as possible and increasing the use of recommended infection control practices. VA researchers assisted the National Center for Patient Safety in implementing the practices, and the success of the “bundle” resulted in its national implementation in more than 1,000 hospitals. VA reported that catheter-associated urinary tract infection rates decreased by 32 percent in participating general medical and surgical units. According to officials from the health services research service, in addition to funding studies and COINs, the service maintains four resource centers, which provide support to VA researchers in several areas, including data, health economics, and dissemination. For example, the Center for Information Dissemination and Education Resources circulates research findings through VA newsletters, cyberseminars, and publications and educates clinicians and researchers on sharing findings. In addition, the center coordinates meetings and conferences—such as the service’s joint national conference with QUERI—which provides an opportunity for VA researchers to present scientific findings and discuss the implementation of findings into practice. In 2017, the conference focused on accelerating the adoption and spread of practices and improving VA’s ability to utilize healthcare data to enhance care for veterans. Officials from the health services research service told us that, starting in 2019, they began implementing two new strategies to increase the impact of VA research on veterans’ health care. First, the service began a new effort to bring together and fund consortiums of researchers from multiple COINs each with a particular focus on implementing evidence-based practices in a given priority area. VA officials told us that as of October 2019, the health services research service established two consortiums of researchers to focus on suicide prevention and opioids and pain management. The service is planning to add two additional consortiums in 2020 to focus on access to care and telehealth and connected care. Second, in 2019 the research service provided additional funding opportunities for COINs to submit research proposals that include five- year goals for the impact of their research, such as VA policy changes or spreading the research to additional sites, and yearly milestones for achieving those goals. Per the request for applications, applicants’ proposals must provide information on how the COINs plan to apply health services research methods, including implementation research. According to VA, as of October 2019, 20 proposals had been selected to receive funding through this new strategy. Diffusion of Excellence Initiative aims to encourage practitioner implementation of research-based practices outside of ORD. VA’s Diffusion of Excellence Initiative, created in 2015, established an annual competition—known as VA’s “Shark Tank”—to engage employees in implementing innovative practices that will positively impact veterans. According to officials from the Diffusion of Excellence Initiative, many of these practices are based on evidence-based research. Under the competition, “investors” (directors from VA medical centers and VISNs) make offers on practices that have been successfully implemented in at least one VA medical center, and the winning investor receives facilitated implementation support so that the practice can be implemented at the investor’s medical center. The officials told us that several of these practices have been identified as exemplary practices and are now being used nationally across multiple VA health care settings. For example, they described one such practice, a tooth-brushing routine implemented for hospitalized veterans to decrease the risk of oral bacteria getting into the veterans’ lungs, which research had shown could increase their risk of pneumonia. According to officials from the Diffusion of Excellence Initiative, the practice decreased hospital-acquired pneumonia by 90 percent at the pilot site, and is being implemented in other VA health care settings. Other VA efforts to facilitate research translation into clinical practice. In addition to the changes to the existing efforts for facilitating research translation, VA has recently taken other actions to help ensure findings from VA research are integrated into practice. In response to ORD’s current strategic priority to “increase the substantial real-world impact of VA research,” the director of ORD established a workgroup to create “The Research Lifecycle,” which was published in October 2019. The lifecycle is a resource that specifies processes to help move research to direct application in routine clinical care. It describes the research and implementation process from identifying innovations that align with clinical priorities to ensuring practices are sustained in clinical care, beyond research and implementation. For example, one phase of the process involves evaluating interventions to determine if they are ready to be implemented into clinical practice. The director of QUERI told us that the information in the publication is broadly applicable across all ORD research and that like the QUERI Implementation Roadmap, the publication reiterates that research is a continuous process rather than a straight line with an endpoint. In addition to the research lifecycle, an official from the agency’s Cooperative Studies Program—which funds large, multi-center clinical trials—told us the program established a new requirement in 2019 that research proposals include an implementation plan. The goal of this change is to encourage researchers to think about research translation from the beginning—and how their work might be translated into clinical practice, according to the program official. Researchers planning to conduct these types of clinical trials will have the opportunity to consult with internal implementation experts to develop plans to translate the research into clinical practice, according to ORD officials. VA officials from both ORD and the national program offices we spoke with described their experiences coordinating on research. Coordination can help both to inform research priorities to make them most useful and applicable, and to encourage the translation of research into clinical practice, which can help VA meet its broader goal of ensuring its research is benefiting veterans’ health. National program offices—such as those for clinical specialties including mental health or spinal cord injury care—provide input to ORD both on research priorities and on efforts to translate research findings into clinical practice within their respective issue areas. For example, officials from the Office of Mental Health and Suicide Prevention told us that their lead staff for suicide prevention participated in strategic planning efforts with ORD to determine a “road map” for current and future research in this area. This VA program office official described working with ORD to provide clinical perspective on gaps in research and clinical care related to suicide prevention, among other things. Given the disproportionately higher rate of suicide among veterans compared with the civilian population, such coordination can help maximize VA’s efforts both in research and in clinical care. Among other things, the road map identifies remaining questions related to suicide prevention to be addressed by VA and other researchers, categorized by type of research (e.g., epidemiological or intervention). Coordination between the research program and national program offices also can facilitate the conduct of the research itself, encouraging research that is viable and relevant to be conducted and translated into practice. For example, ORD leadership told us that program office buy-in on VA research priorities and efforts can lead to VA clinicians being more willing and able to participate in VA research. ORD leadership also told us that ORD has recently begun requesting that researchers engage and collaborate with relevant program offices during the planning process for large multi-site clinical trials, including seeking input from program offices on research proposals. Potential questions for researchers to ask include: does the relevant program office think the proposal’s topic is clinically important; is the research proposal feasible; and will it answer a question that is important from a clinical perspective? According to ORD officials, because VA funds a small number of these types of trials—which are intended to provide a definitive answer to a clinical question—researchers want to be sure the studies are relevant to the needs of the program offices. One specific example both ORD and program office officials provided was related to their coordination on research on osseointegration—a medical procedure through which a metal rod is inserted into the bone at the site of an amputation, allowing a prosthetic limb to be attached through the skin directly to the remaining bone of the amputated limb. Officials from the rehabilitation research service told us that they have been working with program office officials to consider aspects of implementation prior to beginning a clinical trial, including the availability of the surgical procedure throughout VA and the types of post-operative care patients would need. These officials told us that their goal is to ensure the clinical trial is designed for translation. In addition, because national program offices establish policies that affect the provision of care across VA, program office officials told us that collaboration with ORD can help them to incorporate evidence-based practices in developing and rolling out these policies. For example, an official from the Spinal Cord Injury and Disorders System of Care program office told us that it incorporated research findings when it revised its national policy—including a new requirement for all spinal cord injury centers to have vocational rehabilitation counselors on staff. A program office official told us that the addition of this requirement resulted from VA research—led by a researcher clinician—that found that veterans with spinal cord injuries who received specialized vocational support services had the best chance of success for job placement and continued employment. In another example, ORD officials told us that VA researchers were serving as subject matter experts to the national program office developing the protocol and clinical guidelines for implementing intranasal ketamine as a new treatment for certain veterans with treatment-resistant depression. ORD and program office officials described using both informal and formal approaches to coordinate on research priorities and translation. For example, program office officials told us about occasional participation of ORD staff in their regular meetings and calls, as well as relationships between program office staff and individual researchers. ORD officials from one service told us that their scientific portfolio managers serve as a sort of liaison between researchers and clinical program office partners. These officials told us that because VA’s research program is intramural, there is an ongoing discussion with researchers and others within VA in setting research priorities. Although VA officials were mostly positive in describing coordination between the research program and program offices, some officials noted opportunities for improvement, as well. Specifically, officials from the three national program offices we spoke with said it would be beneficial to have a more formal or systematic approach for coordination with ORD. An official from one national program office said a more systematic process would be helpful, so that collaboration is not so dependent on individual relationships or personalities. Officials from another national program office noted that they considered having one staff person as a dedicated resource to liaise with ORD, but lacked resources to do so. Given limited time and competing priorities for researchers and program office officials, ORD officials told us that it would be best to focus on strategic coordination, and noted that some such efforts are underway. Specifically, ORD leadership acknowledged that it would be helpful for ORD and program offices to engage more in general—particularly related to ORD’s research priorities. However, because ORD leadership said it would not be efficient to have to go “door to door” to each individual program office or VISN to have those discussions, it would be more helpful to find more strategic ways to engage. For example, ORD leadership said that ORD’s inclusion in larger annual VHA strategic planning sessions could be a way to facilitate strategic coordination. Similarly, health services research service officials told us that service’s new effort to build consortiums of researchers focused together on a particular priority area may also facilitate coordination between researchers and clinical program offices, particularly on key topics for VA, such as suicide prevention and opioids. In addition, ORD leadership told us that ORD is focusing its efforts on “big ticket items”—such as larger studies or clinical trials through the Cooperative Studies Program—where there can be a big impact through collaboration with program offices, because a single study generally does not lead to changes in clinical practice. Another mechanism available to facilitate strategic coordination between the research program and national program offices is ORD’s QUERI— particularly its Partnered Evaluation Initiatives—through which researchers partner with national program offices to evaluate specific initiatives with potentially high impact on VA national policy. For example, QUERI investigators have partnered with the Office of Mental Health and Suicide Prevention to evaluate an upcoming initiative to send “caring letters” to veterans who have called the Veterans’ Crisis Line and have been engaged in VA care recently. Caring letters, letters noting that the veteran is cared about and matters, are an intervention shown to be effective in reducing suicides in various at-risk populations. In addition, VA program office officials told us that while most VA program offices have their own internal program evaluation services, they do not have sufficient resources to evaluate the effectiveness of all of their programs and policies, motivating them instead to work with QUERI and ORD. For example, the Office of Mental Health and Suicide Prevention has also partnered with QUERI on the STAR VA program, to examine non- pharmacological approaches to treating agitation and other issues in veterans with dementia. Program office officials told us that they can use the results of these evaluations to influence policy, standard operating procedures, and treatment in the field. In summary, VA is uniquely positioned to implement research into clinical practice because of the research program’s adjacency to such a large, integrated health care system. As we have noted, coordination between the research program and partner entities could help ensure VA-funded research results in the spread and adoption of evidence-based practices. VA recognizes the importance of this coordination and continues to actively pursue effective coordination strategies. We provided a draft of this report to VA for review and comment. VA provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of the Department of Veterans Affairs and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In fiscal year 2018, VA’s appropriation for its intramural research program totaled $722 million. Of this amount, $558 million was for awards made by the Office of Research and Development’s (ORD) four research services and the Cooperative Studies Program. Table 3 below presents data on VA’s intramural research program funding and awards for fiscal year 2018. In addition to the contact named above, Raymond Sendejas (Assistant Director), Julie T. Stewart (Analyst-in-Charge), Lauren Anderson, Jennie F. Apter, Robin Burke, and Taylor German made key contributions to this report. Also contributing were Jacquelyn Hamilton and Vikki Porter.", "summary": "In addition to providing health care services, VA funds research on veterans' health conditions, including chronic conditions (such as diabetes) as well as illnesses and injuries resulting from military service (such as TBI). VA's ORD manages the agency's research program, including its intramural research. In fiscal year 2018, VA resources for its intramural research program included an appropriation of $722 million. GAO was asked to review aspects of VA's research program. In this report, which focuses on VA's intramural research, GAO describes 1) how VA sets priorities for funding research, 2) VA efforts to facilitate translation of research into clinical practice, and 3) coordination between VA's research program and other VA entities. To perform this work, GAO reviewed VA policies, reports, and other documents about VA research efforts. GAO also interviewed officials from ORD, three VA national clinical program offices, and two VA offices that focus on implementing evidence-based practices. In addition, GAO conducted site visits with four VA medical centers. GAO selected those locations because they house VA-funded research centers that focus on a range of topics and ORD programs that focus on disseminating and translating research. At each location, GAO interviewed medical center officials and VA researchers. GAO also reviewed VA summary data on research projects and funding for fiscal year 2018. VA provided technical comments on a draft of this report, which GAO incorporated as appropriate. The Department of Veterans Affairs (VA) uses stakeholder input and other information to set priorities for funding research projects. VA's Office of Research and Development (ORD) manages VA's intramural research program—that is, research funded by and conducted within VA, by VA researchers. To set priorities, ORD considers input from VA and non-VA stakeholders (such as agency leaders and a federal research advisory council, respectively) and data on veterans' health conditions. ORD encourages VA researchers to study—and collaborate with other VA researchers on—priority topics, such as post-traumatic stress disorder (PTSD) and traumatic brain injury (TBI). ORD's Quality Enhancement Research Initiative (QUERI) and other VA entities facilitate translating research findings into clinical practice to improve care for veterans. QUERI is VA's central point of focus for research translation and provides a link between ORD, VA program offices, and providers. For example, one QUERI program is studying delivery of an evidence-based treatment for PTSD using telemedicine, specifically, by providing psychotherapy via video to veterans in rural areas. Another program recently adopted a new research translation strategy by establishing a requirement that research proposals for large, multi-center clinical trials include an implementation plan. VA officials said the goal of the new requirement is to encourage researchers to think about research translation from the beginning of a study—and how their work might be translated into practice. VA officials from both ORD and the national program offices GAO spoke with described a variety of efforts coordinating on research. Such coordination can help inform research priorities and help program offices incorporate evidence-based practices in developing and rolling out national policies. For example, ORD officials said that VA researchers were serving as subject matter experts to the national program office developing a protocol and clinical guidelines for a new treatment for certain veterans with depression that is resistant to existing treatments.", "document_type": "gao"}
{"report": "States have three options for designing their CHIP programs: Medicaid expansion CHIP, separate CHIP, and combination CHIP. Medicaid expansion CHIP. States may operate CHIP as an extension of their Medicaid programs. Under Medicaid expansion CHIP, states expand income eligibility levels for children beyond those of the state’s Medicaid program. Medicaid expansion CHIP programs must follow Medicaid rules, including providing all Medicaid covered benefits to enrolled children. Separate CHIP. States may operate their CHIP programs separate from their Medicaid programs. In so doing, the states are not required to follow the same rules as Medicaid; thus, these states have some additional flexibility in designing CHIP, such as determining which benefits to offer and how, if at all, to charge premiums. Combination CHIP. States may have a combination program, where they operate a separate CHIP program, as well as a Medicaid expansion CHIP program, each for a different population of children. For example, some states that operate combination CHIP programs apply different age or income eligibility requirements for their Medicaid expansion CHIP and separate CHIP programs. Similar to Medicaid, CHIP program expenditures are shared between the states and the federal government, but federal matching rates for CHIP are higher than for Medicaid and federal funding for CHIP is capped, with states receiving annual CHIP allotments. The type of CHIP program a state designs may affect the amount of federal funding available to that state in the event the state exhausts available CHIP funding for the year. A state with a Medicaid expansion CHIP program that exhausts available CHIP funding may apply Medicaid funds at the Medicaid matching rate to remaining expenses for enrolled children for that year. However, a state with a separate CHIP program that exhausts available funding would not have access to such funding. In general, states administer CHIP under broad federal requirements that permit flexibility in how they design their programs, including in the services they cover, their upper income eligibility limits, and the fees they charge to participate. In terms of income eligibility, as of January 2019, 19 states, including the District of Columbia, had CHIP upper income eligibility limits of 300 percent of the FPL or higher compared with 32 states whose CHIP upper income eligibility limits were below 300 percent of the FPL. (See fig. 1.) In addition, states can charge beneficiaries fees for CHIP coverage. These fees can vary depending on whether they are enrollment fees, premiums, or other types of cost sharing. Among the states that charge CHIP premiums, the premiums can vary based on family income and the number of children in CHIP. (See table 1.) Although states may charge premiums or have other cost sharing, according to CMS, CHIP provides more affordable coverage than is generally available in the private health insurance market. CHIP crowd-out may occur when employers modify or decide not to offer health insurance to their employees or to their dependents, because of CHIP availability. For example, employers who are aware of CHIP may decide not to offer health insurance to employees or their dependents due to concerns about the costs of providing insurance, especially for smaller sized firms, or as a result of changes in federal or state policies, such as requirements resulting from PPACA. Crowd-out may also occur when employees drop or decide not to enroll in insurance offered by their employers and enroll their children in CHIP, because of CHIP availability. As we have identified in prior work, assessments of the potential for crowd-out must take into account an understanding of the extent to which private health insurance is available and affordable to low-income families who qualify for CHIP. National survey results show that private health insurance is the most prevalent source of insurance for children; however, there is substantial variation across states in coverage rates. Additionally, the extent to which employers offered individuals insurance varies by family income. For additional information on factors that may affect crowd-out, see appendix I. For information on sources of health insurance for children under age 19, including CHIP and employer sponsored insurance, see appendix II. The type of CHIP program a state designs affects its responsibilities for monitoring and mitigating the potential for CHIP crowd-out. The 42 states with separate CHIP programs—including those in combination CHIP states—are required to submit CHIP plans that describe reasonable procedures to prevent crowd-out and to report annually to CMS on certain crowd-out related indicators, such as the number of CHIP applicants with access to private health insurance; however, CMS provides states flexibility to decide which crowd-out prevention procedures to use. For example, states can require CHIP applicants to undergo a period of uninsurance prior to enrollment, known as a waiting period, to deter families that have access to private health insurance from dropping that insurance to enroll in CHIP. In contrast, states are not required to take steps to prevent crowd-out for their Medicaid expansion CHIP programs and may only do so if consistent with the Medicaid statute, or if under an approved section 1115 demonstration, which allows states to implement policies that waive certain Medicaid requirements. For states with separate and combination CHIP programs, CMS provides general guidance for minimizing crowd-out, which the agency has modified over time. (See table 2 for a description of the crowd-out related responsibilities.) For example, in 2013, CMS issued regulations to align with a PPACA provision for health plans and health insurance issuers that limited waiting periods to a maximum of 90 days, and established mandatory waiting period exemptions. The regulations also eliminated the application of a CHIP policy requiring that states with separate CHIP programs have different crowd-out prevention procedures in place for children at different income levels. In making this change, CMS noted that available research called into question the prevalence of crowd-out. CMS indicated that its policy still required states to monitor crowd-out and, if a high rate of crowd-out were to occur, states should consider implementing prevention procedures, such as public outreach about other health care options available in the state. In response to crowd-out related recommendations we made in 2009, CMS modified its guidance to collect additional information from states in their 2009 through 2013 annual reports on how they assess the availability and affordability of private health insurance for CHIP applicants. For example, from 2009 through 2013, states were required to report to CMS if the state’s CHIP application asked if applicants had access to private health insurance. Additionally, states that operated a waiting period without affordability exceptions were asked if the state collected data on the cost of health insurance for an individual or family. However, CMS officials stated that the agency eliminated the questions regarding affordability of private health insurance in 2013, as part of efforts to update the electronic system states use to submit their CHIP annual reports to reflect PPACA enrollment simplification and coordination requirements. CMS officials said some of the questions were duplicative of other state reporting requirements and other questions were deemed irrelevant in light of the establishment of affordability exceptions to waiting periods. States reported indicators of potential crowd-out to CMS in their annual reports, although some do not report on these indicators and those that do may calculate them differently. The states also varied in the extent to which they have processes for directly estimating crowd-out; however, CMS officials and officials in selected states told us they understand the occurrence of crowd-out to be low. Further, we identified few published research studies that directly estimated crowd-out; each used different methodologies, resulting in varied estimates. States with separate CHIP programs—including those in combination states—are required to annually report indicators of potential crowd-out; states must also describe in their CHIP plans other indicators of potential crowd-out they collect. CMS’s 2017 CHIP annual report asks these states to report on crowd-out related questions, including two indicators of crowd-out: (1) the percentage of individuals who enrolled in CHIP that have access to private health insurance, and (2) the percentage of CHIP applicants who cannot be enrolled, because they have private health insurance—an indicator of potential crowd-out averted. However, not all states with separate CHIP programs track and report information related to these two indicators of potential crowd-out, and those that do may calculate these indicators differently. For example, of the 42 states with separate CHIP programs, the 2017 annual reports showed the following: Four of the 42 states reported that they tracked the number of individuals who have access to private health insurance; the remaining 38 states either did not report tracking this information or did not respond to this question. Of the four states tracking this information, the percentages reported ranged between 0.5 percent and 7 percent of CHIP applicants who have access to private health insurance. Twenty-one of the 42 states reported that they tracked the percentage of applicants who could not be enrolled in CHIP because they were enrolled in private health insurance; the remaining 21 states did not report this percentage to CMS. This is a measure of crowd-out averted due to state oversight of its enrollment process. The percentages reported by the 21 states tracking this information ranged from 0 percent in several states to 18 percent in one state. Among the states that reported they do not track individuals with access to private insurance and did not provide a percentage of applicants not enrolled in CHIP because of enrollment in private health insurance, five states indicated that either their electronic eligibility systems did not allow them to capture this information or the data to report this information were not available. CMS officials acknowledged that not all states report on these indicators; however, they noted that states operating separate CHIPs have other processes in place to prevent children with other health insurance from enrolling in CHIP. Further, some states that operate separate CHIP programs describe approaches for directly estimating crowd-out in their CHIP plan amendments. The results of these estimates are not reported to CMS unless they reach a threshold defined by each state. In 2013, CMS required separate CHIP states to submit state plan amendments to CMS to update their eligibility-related policies, including their crowd-out prevention procedures. In response, 17 of the 42 states submitted these amendments and described approaches they would use to directly measure crowd-out. For example: Colorado reported conducting a biennial survey to estimate the percentage of enrollees who dropped group health insurance without good cause to gain eligibility for CHIP, according to its CHIP plan. Connecticut reported comparing the number of children denied CHIP enrollment because they were enrolled in private health insurance to those same applicants who reapplied for CHIP 6 months later, but did not have private health insurance. The crowd-out threshold defined by Colorado and Connecticut is 10 percent; therefore, if these states’ crowd-out estimates were to exceed 10 percent, each state would collaborate with CMS to identify other procedures to reduce crowd-out. According to CMS officials, no state using this approach to estimate crowd-out has exceeded the percentages established or expressed concerns with crowd-out. States we interviewed varied in the extent to which they estimate crowd- out; however, most states did not view crowd-out to be of concern. Among our six selected states with separate CHIP programs, one state— New York—directly measures crowd-out. New York asks applicants that dropped their private insurance in the last three months the reasons why they dropped this coverage, which includes responses such as the family’s preference for the child to have CHIP benefits over their previously held private health insurance. New York state officials told us they consider instances of crowd-out to include when individuals drop private insurance because CHIP costs and benefits are more favorable. For the last 9 months of 2014, the officials estimated crowd-out in New York to be about 1.9 percent. If New York estimates crowd-out to be higher than 8 percent, state officials told us they will report this to CMS and work with CMS on implementing additional crowd-out prevention procedures. Officials from the other five selected states said they do not actively measure crowd-out, some of them citing limited resources and difficulties developing estimates, and noted that crowd-out was not a high priority for them, because they did not think crowd-out was prevalent in their states. For example, officials from two states said they had not heard any concerns regarding crowd-out from their state legislature, state insurance agencies, or others. CMS officials also told us that no state had reported concerns about crowd-out. Our review identified few research studies that directly estimated CHIP crowd-out. Specifically, we identified three research studies published from 2013 to 2018; each used different methods and arrived at varying estimates of crowd out. One study estimated crowd-out across 15 states that expanded their CHIP income eligibility requirements between 2008 and 2012 by examining health insurance enrollment changes in a sample of children after they became newly eligible for CHIP. This study estimated that public insurance among children under age 19 increased about 2.9 percentage points during this period, and private insurance decreased by 1.8 percentage points. The study reported that 63 percent of the 2.9 percentage point increase in public insurance was due to crowd-out. The researchers also produced state-level estimates for the effects of CHIP income eligibility expansions on insurance coverage in newly eligible children. These estimates varied by state, suggesting that crowd-out also varies by state. In particular, three states had an increase in public insurance ranging from about 4 to 12 percentage points, and three states had a decrease in private insurance that ranged from about 7 to 14 percentage points. The researchers noted they did not account for factors that may have caused privately insured individuals to increase their use of public insurance, such as changes in the affordability of private health insurance. Another study estimated the effect of CHIP income eligibility expansions on crowd-out in Illinois. This study examined the differences in public and private health insurance between children in Illinois, where CHIP income eligibility was expanded, and children from a combination of other states that did not expand CHIP—and were chosen to resemble the demographic characteristics and health insurance profile of Illinois. This study found a 6.5 percentage point increase in CHIP enrollment in 2010 among families between 200 percent and 300 percent of the FPL, and estimated that 35 percent of this increase in CHIP enrollment was due to crowd-out. At other income levels higher than 300 percent of the FPL, the study found either no net effect on private health insurance, or an increase. The third study estimated public and private insurance under different CHIP income eligibility thresholds and different premium schedules. While the study estimated that a CHIP expansion from 200 to 400 percent of the FPL with no premium contribution and a 4 month waiting period increased CHIP enrollment by about 4.5 percentage points and decreased private coverage by about 2.2 percentage points, these estimates do not provide evidence of crowd-out, because the differences in these percentage point estimates were not statistically significant. Although not reporting direct estimates of CHIP crowd-out, we identified other studies that provide related information. For example: In one study, researchers surveyed the parents of current and former CHIP enrollees in 10 states to examine access to private coverage for children enrolled in CHIP. This study found that about 13 percent of new CHIP enrollees had private health insurance in the year before enrolling in CHIP. Among the 13 percent, about 18 percent reported that they dropped their private health insurance, because CHIP was more affordable, and about 5 percent dropped their private health insurance, due to a preference for CHIP. The authors noted that access to private coverage among CHIP enrollees is low and when access is available, affordability is a serious concern for parents. The authors concluded that this suggests limited potential for crowd-out. A study published in 2015 that surveyed the parents of about 4,100 new CHIP enrollees to understand why children enrolled in CHIP, among other things, found that 35 percent of these parents reported applying for CHIP, because it was more affordable than the other health insurance options they could obtain for their children. Representatives from national organizations, researchers, and CMS officials we interviewed noted some of the challenges measuring the extent of CHIP crowd-out, including the limitations of available data sources; however, they did not consider crowd-out to be prevalent. For example: Some data sources do not separately collect or categorize CHIP information. For example, the ACS does not specifically ask respondents if their children have health insurance through CHIP; thus, researchers have to manipulate the data to separate CHIP coverage from other forms of public health insurance, such as Medicaid. The methodologies available to separate CHIP from Medicaid respondents have many limitations, according to researchers and U.S. Census Bureau officials we contacted. Accurate crowd-out estimates require researchers to account for the reasons why someone dropped his or her health insurance and enrolled in CHIP, and this information is not captured by national surveys. Researchers may also vary in what they consider to be crowd-out; for example, some may not consider dropping private health insurance and enrolling a child in CHIP because of a job loss or change in employment to constitute crowd-out. Others do not consider it to be CHIP crowd-out when parents drop their private health insurance and enroll in CHIP, because CHIP is more affordable. CMS officials also noted complexities in measuring crowd-out—such as variation in definitions of crowd-out and methodologies for measuring it—and they said that the agency has not conducted or commissioned its own evaluation. However, CMS officials reiterated that no state has reported concerns with crowd-out and based on their review of studies conducted by researchers understand that its prevalence is likely low. CMS monitors states’ CHIP crowd-out prevention procedures and offers technical assistance, while states ask CHIP applicants about other sources of health care coverage, and use waiting periods and cost- sharing procedures, such as enrollment fees and premiums. Several state officials we interviewed told us that their crowd-out prevention procedures are effective; however, they could not speak to the effectiveness of any particular procedure and few studies have examined the issue. CMS officials told us that they track the information states submit about their CHIP crowd-out prevention procedures as part of their annual report review process to identify any inconsistencies between the information contained in their state plans and the information submitted in states’ annual reports, among other reasons. When CMS officials identify any noticeable differences in the information reported by states from year-to- year in the annual reports—such as the percentage of CHIP applicants with access to private insurance—they told us they follow-up with the state to obtain additional information about these differences, and, if needed, advise states on ways they can prevent crowd-out. CMS officials also told us they provide technical assistance, when requested, to assist states in developing crowd-out prevention procedures. For example, CMS officials said they provided states with technical assistance after issuing regulations in 2013 on the use of waiting periods that also required states to update their state plan amendments. CMS officials said they have no plans to develop additional strategies for collecting states’ crowd-out information, because states have not reported crowd-out to be a concern, and there is no need to re-examine states’ oversight if prevalence as measured in research is likely low. All 42 states with separate CHIP programs reported to CMS that they had implemented at least one of the following six types of procedures to prevent crowd-out: (1) asking about other health insurance and denying CHIP coverage if other sources of health insurance are identified; (2) implementing cost sharing for CHIP coverage; (3) conducting database checks for other health insurance; (4) implementing a waiting period for CHIP coverage; (5) measuring crowd-out and taking steps if certain thresholds are exceeded; and (6) offering premium assistance for private health insurance. The majority of these states (36 of the 42 states with separate CHIP programs) implemented at least three crowd-out procedures. All 42 states with separate CHIP programs asked applicants about other insurance coverage on their CHIP applications to deny applicants CHIP coverage if private insurance coverage was found, and CMS officials told us that 35 of those states required CHIP enrollees to pay premiums or make other financial contributions to the cost of the coverage. (See table 3.) Among our six selected states with separate CHIP programs, there were differences in how some crowd-out procedures were implemented. For example, three states conducted database checks to see if applicants had other sources of health insurance; however, one state checked prior to enrollment, another checked at enrollment and during application renewal, and one state ran weekly checks. Among our six selected states with separate CHIP programs, none planned to change procedures to prevent potential crowd-out. Among the 42 states with separate CHIP programs, some crowd-out prevention procedures vary or have changed over time. For example, while many states use a private company to collect state and national health insurance coverage information to conduct database checks, another state developed a database that contains information on insurance coverage available through over 40,000 employers in the state. Additionally, prior to 2014, 36 states imposed waiting periods, during which applicants could not have health insurance for a specified time before CHIP enrollment, to prevent crowd-out. In 2017, 14 states used waiting periods. Prior to PPACA and the implementation of CMS regulations that limited waiting periods to 90 days, waiting periods could range from 1 to 12 months. After CMS updated its regulation, 21 states eliminated their waiting periods and five states shortened them. Among our four selected states with separate CHIP programs that shortened or eliminated their waiting periods, none of the state officials expressed concerns that this change contributed to CHIP crowd-out. Administering a waiting period may involve the state tracking or determining whether the applicant meets any of the state and federal waiting period exemptions, the number of months for the waiting period before the applicant can be enrolled in CHIP, and informing the federally facilitated exchange if an exemption to the waiting period applies to the applicant. As a result, some officials noted that reducing waiting periods eased their state’s administrative burdens, as well as eliminated gaps in children’s health insurance. Among the four selected states, officials from New York said they eliminated their waiting periods because, after undergoing the various administrative steps to verify each application and apply the waiting period, the majority of the CHIP applicants met at least one waiting period exemption. However, three of the selected states with separate CHIP programs maintained waiting periods, and state officials from Texas told us that few individuals met the waiting period exemptions. Some state officials told us they attributed waiting periods—which require children to go uninsured for a period of time—to gaps in health care, and their states eliminated the waiting period in an attempt to provide continuity in children’s access to health care. Although not required by law, officials from two of our selected states with Medicaid expansion CHIP programs told us their states previously had approved 1115 demonstration waivers permitting their states to use a CHIP waiting period, but eliminated them in 2013 and 2014 to close gaps in children’s health insurance coverage. Currently, these states use similar procedures as separate CHIP states to prevent crowd-out, according to state officials. Of our three selected states with Medicaid expansion CHIP programs, one state monitors CHIP enrollment trends; a second state requires its managed care organizations to check CHIP enrollees for other sources of insurance as part of their claim processing activities; and one state conducts database checks for other health insurance at the time of enrollment and re-enrollment. The effect of some of the states’ procedures on preventing CHIP crowd- out is unclear and, according to selected state officials and stakeholders, some crowd-out prevention procedures may have unintended consequences. For example, state officials and stakeholders told us waiting periods result in coverage gaps, which, as one stakeholder noted, could be catastrophic for a family with a sick child who would not have coverage during the waiting period. Several CHIP officials we interviewed believed their procedures are effective in preventing crowd- out; however, they either had not studied the effectiveness of their procedures or could not speak to the effectiveness of any particular procedure. Relatively few of the studies we reviewed examined the effectiveness of state procedures for preventing crowd-out. Specifically, two studies looked at this issue. Both studies concluded that cost-sharing procedures, such as premiums, can reduce the potential for crowd-out among higher- income CHIP-eligible families. A 2014 study used CHIP-related data from 2003 and found that CHIP premiums discourage individuals with private health insurance from dropping their insurance to enroll in CHIP. The study compared health insurance outcomes across 19 states for children with incomes slightly above states’ CHIP income eligibility thresholds with children in families with incomes slightly below the thresholds. The results indicated that there is an association between CHIP premiums and private insurance coverage; that is, a $1 increase in the CHIP premium above the income cut-off is associated with a 2.2 percentage point higher probability of the child being privately insured for families within 15 percent of the upper income level, and a 1.7 percentage point higher probability for families within 25 percent of the upper income level. These findings suggest that private health insurance may be a preferable alternative for CHIP eligible families at higher income levels who face higher CHIP premiums. A 2013 study used survey data from 50 states and the District of Columbia from 2002 to 2009 to estimate the effect CHIP premium contributions have on enrollment in CHIP, private insurance, and rates of uninsurance among children in families with income eligibility levels of 200 to 400 percent of the FPL. The study found that if CHIP programs expand eligibility to those at higher income levels and charge those families a higher premium, the families may be more likely to choose private health insurance, nullifying the effects of CHIP expansion among higher income families. We provided a draft of this report to HHS for review and comment. The department provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the Administrator of CMS, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or at yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report are listed in appendix III. Crowd-out may occur when employers modify or decide not to offer health insurance to their employees or to their dependents because of Children’s Health Insurance Program (CHIP) availability. For example, employers who are aware of CHIP may decide not to offer health insurance to employees due to concerns about the costs of providing insurance, especially for smaller sized firms, or as a result of changes in federal or state policies, such as requirements resulting from the Patient Protection and Affordable Care Act (PPACA). For example, PPACA required employers with a certain number of employees to offer their full-time employees a health insurance option meeting certain criteria, including affordability, or face tax penalties. Some researchers and policymakers expressed concern that this requirement may encourage employers to change how they offer insurance to employees, such as no longer offering family and dependent coverage, instead only offering health insurance to the employees, thereby causing employees with children to seek public insurance or insurance through health insurance exchanges. Other researchers and organizations point to PPACA increasing the availability of private health insurance offered by employers and through health insurance exchanges, particularly in areas and among populations where employer sponsored health insurance may not be as readily available. Crowd-out may also occur when employees drop or decide not to enroll in insurance offered by their employers and enroll their children in CHIP because of CHIP availability; however, as we have reported in the past, assessments of crowd-out should consider the affordability and availability of the employer sponsored insurance. For example, families with access to employer sponsored insurance may find CHIP more affordable or find CHIP benefits more comprehensive than employer sponsored insurance. Alternatively, they may find that CHIP provides better access to services specific to their child’s health care needs. For example, an evaluation of CHIP published in 2014 found that CHIP enrollees had better access to dental benefits than children with private insurance, although they were less likely to have a regular source of medical care and nighttime or weekend access to a provider. As we have identified in prior work, assessments of the potential for crowd-out must take into account an understanding of the extent to which private health insurance is available and affordable to low-income families who qualify for CHIP. American Community Survey (ACS) data showed that for 2013 through 2017, the most prevalent source of insurance for children in the United States under the age of 19 was private health insurance available through a parent’s employer or union. (See fig. 2.) Although private health insurance is the most prevalent source of insurance for children, there is substantial variation across states in coverage rates. (See fig. 3.) For example, in eight states, fewer than 40 percent of children were insured through an employer in 2017. In contrast, in Utah, more than 60 percent of families with children were insured by an employer in 2017. Medical Expenditure Panel Survey (MEPS) data show that the extent to which employers offered individuals insurance in 2013 through 2015 varied by family income. For example, MEPS Household Component data—which includes information on whether individuals were offered insurance by their employers—show that over 90 percent of families with incomes greater than 400 percent of the federal poverty level (FPL) were offered insurance by their employers from 2013 through 2015. The percentage of families offered insurance by their employers ranged from about 35 percent for families with incomes less than or equal to 138 percent of the FPL to about 85 percent for families with incomes above 300 and less than 400 percent of the FPL. (See fig. 4.) An Agency for Healthcare Research Quality (AHRQ) analysis of MEPS Insurance Component data—which includes information on whether employers offered insurance to their employees and the cost of that insurance— shows that in 2017, 24.2 percent of small employers (less than 50 employees) with a predominately lower-wage workforce offered their employees health insurance compared with 57.6 percent for small employers with a higher-wage workforce. In contrast, in 2017, offer rates at larger employers—that is, employers with more than 50 employees— was 94 percent for those with predominately lower-wage employees and 98.7 percent for large employers with predominately higher wage employees. With regard to affordability, the MEPS Insurance Component data show that average employee premium contributions for family coverage from 2013 through 2017 increased. Over this period, employees who work for employers with a predominantly lower-wage workforce—that is, employers that paid 50 percent or more of their workforce $12 or less per hour—contributed a larger amount and percentage of premiums to their employer-sponsored insurance than did employees who work for non- low-wage employers. (See fig. 5.) MEPS Insurance Component data also show that employees who work at establishments with a predominately lower-wage workforce enroll in insurance offered by their employers at a lower rate than employees of other establishments, though it is not known if this is due to affordability reasons. Finally, MEPS Insurance Component data show that the percentage of employees with deductibles and the amount of the deductibles have increased from 2004 to 2017. Between 2013 and 2017, average family deductibles increased about 36 percent, from $2,491 in 2013 to $3,396 in 2017. In addition, research published in 2018 on high deductible health insurance plans showed both increasing enrollment in these plans and that larger employers (1,000 or more employees) contributed more toward health insurance premiums for these plans than smaller employers (less than 25 employees). For example, according to this study: From 2006 to 2016, there was a 35 percentage point increase (11.4 percent to 46.5 percent) in enrollees in high-deductible health plans, with enrollees from smaller employers more likely to be enrolled in these plans compared with enrollees from larger employers (56.4 percent of enrollees from small firms compared with 42 percent of enrollees from large firms). A lower percentage of enrollees from the smaller firms had a plan with an employer-funded account, which defray health care costs, compared with enrollees from larger firms. For example, in 2016, only about one-third of enrollees in high-deductible health insurance plans from the smallest employers had an employer funded account to help pay for medical expenses compared with 89.3 percent of enrollees from the largest employers. High-deductible health insurance plan enrollees of the smallest employers were also more likely to not have the choice of an alternative plan type compared with enrollees from the largest employers. Although private health insurance is the most prevalent source of insurance for children, there is substantial variation across states in coverage rates. Figure 6 provides information on the percentage of children under age 19 insured through employer sponsored insurance, Medicaid, and the Children’s Health Insurance Program, as well as those who were uninsured in 2017. Carolyn L. Yocom, (202) 512-7114 or yocomc@gao.gov. In addition to the contact named above, individuals making key contributions to this report include Shannon Legeer (Assistant Director), Toni Harrison (Analyst-in-Charge), Mollie Lemon, and Courtney Liesener. Also contributing were Alison Binkowski, George Bogart, Jill Center, Leia Dickerson, Giselle Hicks, Drew Long, Kristeen McLain, Yesook Merrill, Jasleen Modi, Vikki Porter, Lisa Rogers, and Merrile Sing.", "summary": "CHIP is a public insurance program established in 1997 that finances health care for over 9 million low-income children whose household incomes do not qualify them for Medicaid. States have flexibility in structuring their CHIP programs under broad federal requirements, and their income eligibility limits vary. Policymakers have had concerns that some states' inclusion of children from families with higher income levels could result in some families substituting CHIP for private insurance (i.e., crowd-out). Crowd-out may occur when, because of CHIP availability, (1) employers make decisions about offering health insurance; or (2) employees make decisions about enrolling in employer-sponsored health insurance. GAO was asked to examine CHIP crowd-out. This report describes (1) the information on potential indicators of crowd-out reported by states and estimates of crowd-out; and (2) the procedures CMS and states use to address potential crowd-out. GAO reviewed federal laws and guidance and state CHIP documentation, including their 2017 annual reports (the latest available at the time of GAO's review); conducted a literature review of studies published between 2013 and 2018; and interviewed CMS officials, stakeholders from national health policy organizations, and researchers. GAO also interviewed a non-generalizable selection of officials from nine states chosen to obtain variation in CHIP programs, such as income eligibility levels and geography. HHS provided technical comments on a draft of this report, which GAO incorporated as appropriate. Limited information exists about Children's Health Insurance Program (CHIP) crowd-out—that is, substituting CHIP for private health insurance. The Centers for Medicare & Medicaid Services (CMS), within the Department of Health and Human Services (HHS), asked the 42 states that have separate CHIP programs to report on two crowd-out indicators for the 2017 annual reports: (1) the percentage of individuals who are enrolled in CHIP that have access to private health insurance and (2) the percentage of CHIP applicants who cannot be enrolled because they have private health insurance. The 2017 reports showed that: 4 states reported 0.5 percent to 7 percent of CHIP applicants had access to private health insurance; and 21 states reported denying CHIP enrollment to 0 percent to 18 percent of applicants because they had private insurance. Not all of these 42 states reported on these indicators and GAO found that those that do may calculate them differently. CMS officials acknowledged that not all states report on these indicators; however, they noted that states operating separate CHIPs have other processes in place to prevent children with other health insurance from enrolling in CHIP. Further, some states may have other processes for directly measuring CHIP crowd-out. GAO also identified three studies published between 2013 and 2018 that estimated CHIP crowd-out. However, these studies used different methods to calculate crowd-out, and as a result produced varied estimates. For example, one study attributed a portion of increased enrollment in CHIP and other public insurance to crowd-out, while another study found no evidence of crowd-out. According to CMS's 2017 annual reports and other information, the 42 states with separate CHIP programs reported implementing at least one of six types of crowd-out prevention procedures. Source: GAO analysis of information from the Centers for Medicare & Medicaid Services, state Children's Health Insurance Programs (CHIP), and a Kaiser Family Foundation and Georgetown Center for Children and Families survey on Medicaid and CHIP programs. │GA O-20-12", "document_type": "gao"}
{"report": "Explosives include high explosives, propellants, and pyrotechnics. Propellants and pyrotechnics are sometimes referred to as low explosives. All three types of explosives serve essential functions in nuclear weapons. Figure 1 illustrates key explosive-containing components found in a generic nuclear weapon as well as the types of explosives these components contain. High explosives are the most common explosive by volume in nuclear weapons. There are two classes of high explosives used in nuclear weapons: insensitive high explosives (IHE) and conventional high explosives (CHE). An IHE is less susceptible to accidental detonation than a CHE and less violent upon accidental ignition, therefore it is safer to handle. NNSA places a premium on safety throughout all phases of explosives activities, including research and development, testing, production, and storage, because handling any explosive material is inherently dangerous, according to NNSA officials and contractor representatives. Producing a high explosive material generally follows four steps, as shown in figure 2: (1) synthesis—producing raw explosive molecules; (2) formulation—mixing raw explosive molecules with binding ingredients to form an explosive mixture; (3) pressing—compacting formulated explosives into shapes of the required density; and (4) machining— cutting away excess material to achieve the final shape. Analytical, mechanical, safety, and performance testing are to occur after each step. During synthesis, technicians use chemicals to produce fine, powder-like raw explosives. During formulation, technicians combine the explosive powder with plastic binder ingredients to produce a mixture that exhibits the physical and performance properties desired. Formulated explosives used by NNSA often appear like small, irregularly shaped pebbles, known as prills, as shown in figure 3. During pressing, the third step, technicians compact formulated explosives into a solid form. During machining, the fourth step, technicians use computer-controlled equipment to cut and shape the explosive into its final shape. After the explosive has been machined, technicians join explosive and non-explosive parts into functional components during subassembly. Small-scale synthesis and formulation and production-scale pressing, machining, and subassembly activities are carried out at multiple NNSA sites. After each step of the production process, NNSA’s sites conduct tests to ensure that explosives meet NNSA’s safety and performance requirements. During safety testing, scientists conduct a variety of tests to ensure that explosives meet DOE’s safety requirements. Regarding performance testing, scientists conduct other tests that require specialized equipment. For example, scientists use scanning equipment, like heat flow sensors, for thermal testing on formulated explosive material. Scientists also conduct tests using X-ray imaging equipment to evaluate weapon characteristics by detonating a “mockup.” The mockup uses a high explosive main charge—the explosive material that surrounds the nuclear core, known as the pit—and a nonfissile surrogate material that has similar physical properties to plutonium. The mock implosion is called a hydrodynamic test because the surrogate material and other components become hot enough to flow like fluid. High explosive molecules used in U.S. nuclear weapons include but are not limited to high melting explosive (HMX), pentaerythritol tetranitrate (PETN) and triaminotrinitrobenzene (TATB). First fielded in conventional weapons in World War II, HMX and PETN were later introduced into several components in the U.S. nuclear weapons stockpile and are still used in them today. DOE first introduced TATB into the nuclear stockpile in 1979, and it is still the only molecule that DOE considers to be an IHE (see sidebar). In all U.S. nuclear weapons, the main charge is made of formulations of HMX or TATB. DOD also uses HMX and TATB in certain conventional weapons. TATB: NNSA’s Key Insensitive High Explosive Triaminotrinitrobenzene (TATB) is a key insensitive high explosive that is currently used in National Nuclear Security Administration (NNSA) and Department of Defense (DOD) military applications, including nuclear and conventional weapons. Scientists first synthesized TATB in 1888 but did not initially recognize it as an explosive. In 1966, Los Alamos National Laboratory developed the industrial method for synthesizing TATB. From the late 1970s to the late 1980s, two domestic manufacturers supplied TATB to DOD and NNSA. However, when the Cold War ended and a U.S. nuclear test moratorium began, the demand for TATB declined, and both manufacturers ceased production by 1993. DOD then acquired TATB from a U.K.-based firm until its plant closed in 2005. Beginning in 2007, DOD and NNSA collaborated to re-establish a manufacturing capability for TATB in the United States. Specifically, DOD’s Holston Army Ammunition Plant (Holston), which is located in Kingsport, Tennessee, began producing TATB in 2014. DOD has qualified the Holston-produced TATB for use in conventional weapons but NNSA has not yet qualified it for use in nuclear weapons because the material properties of the formulated material are not yet up to NNSA standards, according to NNSA documentation. available binding ingredient to create a plastic bonded explosive. Each explosive formulation is designed for a specific application. The performance requirements for explosive formulations in nuclear weapons are more stringent than those for conventional weapons for DOD formulations to ensure both performance and safety. Explosives scientists commonly use the term “recipe” to describe the ingredients and many variables in the process—such as the temperature, mixing speed, or container size—used to make explosive molecules and formulations that meet specific performance requirements. In December 2018, NNSA completed the last production unit for the W76- 1 LEP, marking the completion of warhead production for the first LEP in which NNSA undertook full-scale design activities for weapon systems since 1982. Five other LEPs and stockpile modernization efforts were ongoing as of January 2019, as shown in table 1. As we concluded in an April 2017 report, this is a particularly challenging time for NNSA, as the agency plans to simultaneously execute LEPs and modernization efforts along with major construction projects, such as efforts to modernize NNSA’s uranium and plutonium manufacturing capabilities. NNSA’s nuclear security enterprise consists of eight government-owned sites managed and operated by seven contractors. Five of these sites conduct explosives activities: Livermore, Los Alamos, Sandia, Pantex, and Nevada. In addition to these sites, NNSA relies on several third-party suppliers of explosive materials and related equipment. The largest of these is Holston, which is a government-owned, contractor-operated facility that primarily produces explosives for DOD. Holston is NNSA’s sole supplier of explosives used in main charges. The infrastructure that supports NNSA’s explosives activities consists of thousands of real property assets, which are to be tracked in FIMS. The database is managed for NNSA missions by its Office of Safety, Infrastructure and Operations. According to NNSA officials and DOE documents, FIMS helps managers understand the current state of NNSA infrastructure and inform infrastructure modernization funding decisions. We have previously reported on concerns about the accuracy of the FIMS database with respect to certain data fields that were not assessed as part of this review. DOE has taken sufficient steps to address recommendations we have previously made about FIMS. Workforce levels for explosives activities have generally increased in recent years, which contractor representatives attribute to the increase in workload because of LEP and modernization efforts. Table 2 shows NNSA contractor representatives’ estimates for actual full-time equivalents (FTE) and percentages of FTEs engaged in explosives activities at each of the five sites over the last 5 fiscal years. The Government Performance and Results Act of 1993 as amended (GPRA) requires, among other things, that federal agencies develop strategic plans. The Office of Management and Budget (OMB) provides guidance to federal executive branch agencies on how to prepare their agency-wide strategic plans in accordance with GPRA requirements, as updated and expanded by the GPRA Modernization Act of 2010. We have reported that these requirements also can serve as leading practices for strategic planning at lower levels within federal agencies, such as planning for individual divisions, programs, or initiatives. In addition, we have reported in the past on federal agencies’ strategic planning efforts and have identified additional useful practices to enhance agencies’ strategic plans. The leading practices in federal strategic planning that we selected are: (1) involving stakeholders, such as federal agencies, state governments, or others, in defining the mission and desired outcomes, which helps ensure that their expectations and interests are met and that resources and efforts are targeted at the program’s highest priorities; (2) assessing external and internal forces, which helps managers anticipate future challenges and make adjustments before potential problems become crises; and (3) covering at least a 4-year period while making adjustments as needed to reflect the operating environment. Further, our past work has shown that effective strategic plans should include several specific elements. These elements include: (1) a comprehensive mission statement that explains why a program exists and what it does; (2) long-term goals and objectives that specify how an agency will carry out its mission and explain what results are expected from the program; (3) strategies to achieve the goals and objectives that are specific enough to allow an agency to assess whether the strategies will help achieve those goals; (4) a description of how performance measures will be used to assess progress toward long-term goals; and (5) the identification of external factors that could significantly affect achievement of the strategic goals. NNSA’s five sites involved in explosives conduct interdependent activities to design and produce explosives and about 100 different nuclear weapon components that contain explosive materials. Each of the sites assumes primary responsibility for certain explosives activities—such as Livermore conducts design, research, and development of new IHE main charge formulations; Pantex produces all main charges; Los Alamos conducts design and production of main charge detonators as well as explosives research and development; Sandia conducts design and production of nonnuclear explosive components; and Nevada conducts large experimental explosive shots to support design activities. However, most of these activities require the participation of multiple sites. The following examples illustrate some of the collaborative, interdependent activities that NNSA’s sites and their suppliers undertake to design and produce explosive components found in nuclear weapons. Main charge for the W80-4 LEP. Livermore manages design activities for the W80-4 LEP, including for its main charge. The main charge used in the W80-4 warhead will consist of newly synthesized TATB, formulated with a new binding ingredient, according to contractor representatives. As NNSA officials and contractor representatives explained during our site visits to Livermore and Pantex, Livermore scientists redeveloped the specific process for TATB synthesis and formulation that is being used in the W80-4 LEP, first in small test batches and then in larger amounts. Next, Livermore sent its specifications for synthesis and formulation to Holston, which has produced successively larger batches. As the design and cost study phase of the W80-4 LEP continues, Livermore and Pantex continue to receive and test these batches of formulated explosive and work with Holston to ensure that production lots meet NNSA specifications. In coordination with Livermore, Pantex will press and machine the finished main charges for the W80-4 when the LEP reaches the production phase. Pantex will receive formulated TATB from Holston and conduct its own tests to ensure the quality of the initial production lots and pressing, machining, and subassembly processes. Detonators. The design and production of main charge detonators involves several NNSA sites and their suppliers. According to contractor representatives, Livermore and Los Alamos share the responsibility for designing the main charge detonators, and Los Alamos will produce all the detonators. As part of production, Los Alamos reprocesses the PETN used in detonators from a stockpile of DOD-grade material purchased 30 years ago. Other detonator parts come from third-party suppliers and from NNSA’s Kansas City National Security Campus, another NNSA site that does not have a role in designing or producing explosives, according to contractor representatives. Los Alamos produces and tests completed detonators and then sends them to Pantex for weapon assembly, according to contractor representatives. Spin rocket motors. Sandia plays the primary role in designing spin rocket motors. Spin rocket motors use pyrotechnics and propellants and are a key component in the B61 and B83 bombs. Contractor representatives at Sandia said that they supply the explosives to third- party suppliers, who produce the motors. The completed spin rocket motors are sent to Sandia for inspection and testing, and after Sandia approves the components, they are shipped to Pantex for weapon assembly, according to contractor representatives. Component manufacturing research. In addition to designing and producing components for LEPs and modernization efforts, NNSA sites also collaborate on other explosives research and development programs, such as on component manufacturing processes. For example, Los Alamos, Livermore, Sandia, and Pantex are collaborating on additive manufacturing processes for explosives. Additive manufacturing differs from traditional manufacturing in that it builds components by depositing material rather than by cutting material away during machining. This research effort seeks to introduce additive manufacturing into the explosives production process, producing explosive parts with highly complex geometries while meeting NNSA’s safety and performance requirements, according to a contractor representative. In May 2018, according to NNSA documentation, NNSA began implementing a new enterprise-wide approach to improve the management and coordination of explosives activities across its sites. In the past, each program that used explosives—such as an LEP or a research and development program—developed or procured them independently of other programs, without formal coordination to ensure each program’s awareness of other programs’ requirements or time frames. Under the new enterprise-wide approach, NNSA has taken several steps to centralize management at an enterprise level and to coordinate explosives activities across its sites. Specifically: In May 2018, NNSA established the Energetic Materials Enterprise Manager (enterprise manager) position to help coordinate NNSA’s explosives activities. The agency issued a May 2018 memorandum formally establishing the position, signed by the Acting Deputy Administrator for Defense Programs. The memorandum specified that the enterprise manager should encourage collaboration among the sites and programs that conduct explosives activities. In September 2018, the enterprise manager established NNSA’s Energetics Coordinating Committee (coordinating committee) to identify coordination challenges across the enterprise and emerging needs for critical explosive materials, among other purposes. The coordinating committee is composed of NNSA officials and contractor representatives from NNSA’s sites, is chaired by the enterprise manager, and is expected to meet at least once a year. According to NNSA documents, the coordinating committee met twice in 2018 and identified a number of future actions requiring input from the sites, such as defining future needs associated with the production of main charge explosive materials. In December 2018, NNSA issued the strategic plan for energetic materials. This strategic plan states that it will help NNSA organize its efforts to meet weapon delivery schedules for the overall energetics community. Prior to the strategic plan’s final issuance, the enterprise manager provided a draft to coordinating committee members to solicit their comments. However, more recent action taken by NNSA indicates that the enterprise approach to managing high explosives is continuing to evolve. First, according to NNSA officials, in 2019 NNSA is planning to reorganize the Office of Defense Programs—which is responsible for all stockpile activities. This reorganization could affect the approach to managing high explosives activities. Specifically, officials said part of this reorganization is the creation of a new organization for production activities, which is expected to divide production activities into several groups oriented around different weapons components. It is currently unclear under which production group explosives activities will fall because there are production activities associated with explosives for both nuclear and nonnuclear components, according to NNSA officials. Second, in December 2018, NNSA officials indicated that they are considering elevating high explosives to a “strategic material” and managing it more similarly to NNSA’s existing approach for managing other strategic materials, such as plutonium. NNSA’s strategic materials managers are overseen by a senior NNSA official and appointed to manage each material as a program, with a budget and dedicated staff, according to NNSA documentation. NNSA does not consider the high explosives enterprise manager to be managing a program; therefore, the enterprise manager does not have an explosives budget or dedicated staff, according to NNSA officials. NNSA officials said they anticipate issuing an analysis of alternatives study in spring 2019 that will contain a recommendation to the NNSA Administrator on how explosives activities should be managed going forward, which could reflect a shift toward managing high explosives as a strategic material. NNSA officials and contractor representatives have identified a number of challenges related to NNSA’s supply of explosive materials, infrastructure, and staff recruitment and training. First, NNSA’s supply of certain highly specialized explosive materials is dwindling, and NNSA officials and contractor representatives stated that it is challenging to reproduce or procure these materials. Second, officials and contractor representatives identified infrastructure that is aging and deteriorating, inaccurate information on that infrastructure, and storage areas filled to near capacity as challenges. Finally, according to NNSA contractor representatives, there are difficulties in recruiting and training qualified staff. NNSA has taken some actions to address these challenges, such as starting to recreate “recipes” for specialized materials and modernize aging infrastructure, according to NNSA officials and contractor representatives. However, taking additional steps to improve the quality of information about its explosives infrastructure would give the agency more reasonable assurance that officials, contractor representatives, and the enterprise manager have the quality information necessary to support management decisions. NNSA’s Challenges Producing Fogbank The National Nuclear Security Administration (NNSA) has had challenges in the past producing materials other than explosives that are essential to the successful operation of nuclear weapons. In 2000, NNSA began a life extension program (LEP) to replace or modernize components for W76 warheads, which are delivered by submarine-launched ballistic missile systems. NNSA had to delay production of the refurbished warheads when it encountered problems in manufacturing an important material that NNSA refers to as “Fogbank.” In March 2009, we reported that NNSA had lost knowledge of how to manufacture the material because it had kept few records of the process when the material was made in the 1980s, and almost all staff with expertise on production had retired or left the agency, leaving the production process for Fogbank dormant for about 25 years. As we reported, NNSA’s loss of the technical knowledge and expertise to manufacture Fogbank resulted in a 1-year delay in the W76-1 LEP and an unexpected cost increase of nearly $70 million. According to NNSA officials, production challenges with Fogbank have since been resolved, and the last production unit for the W76-1 LEP was completed in December 2018. NNSA’s supply of certain highly specialized explosive materials is dwindling. These materials have specific chemical and physical characteristics that fulfill precise performance requirements in nuclear weapons, such as detonation within nanoseconds, according to contractor representatives. One such material, titanium sub-hydride potassium perchlorate (THKP), is used in actuators to open valves, among other things, according to contractor representatives. TATB, the IHE molecule used in main charges, is another such material, according to contractor representatives. In some cases, contractor representatives said that only one container or production lot of specialized material was ever produced that met NNSA’s specifications. The inventories of these materials have dwindled as ongoing LEPs, modernization efforts, and research and development activities draw on them. For example, only a small container of THKP remains. Additional inventory will be required to meet the needs of four of the five ongoing LEPs and modernization efforts, as well as for any future needs, according to contractor representatives from Sandia. Similarly, although Pantex has a stockpile of legacy TATB for the B61-12 LEP, contractor representatives said that new material will be needed to meet the requirements of planned and future LEPs and modernization efforts. NNSA officials stated that reproducing and procuring these highly specialized materials presents challenges for the agency. According to NNSA documents and officials, lost recipes and a fragile supplier base contribute to these challenges (see sidebar). Some specialized materials were created decades ago, and the knowledge base to successfully produce them is now gone. According to NNSA documents, technical knowledge of material production processes can be lost when long intervals occur between production orders. In some cases, processes were not well documented or were infrequently practiced and proven. Thus, NNSA sites must spend considerable effort to recreate the recipes and techniques for producing these materials. Sandia representatives explained that sometimes a single company or even an individual created these materials and has since ceased production or is now deceased. For example, THKP was produced exclusively for Sandia by DOE’s Mound Site near Dayton, Ohio, which closed in 1994. The THKP production process was designed by an individual at the Mound Site who is now deceased. In some cases, according to contractor representatives, a single container of explosives (or a single production lot) met anticipated future needs for quality and quantity when it was originally produced, so production was discontinued. Contractor representatives explained that replicating the material exactly is nearly impossible because of the large number of variables, such as the mixing speed and temperature, that must be controlled for, even if the ingredients are identical to those used many years ago, which is not often the case. To address the challenge of lost recipes, Los Alamos, Sandia, Livermore, and Pantex are all working to reproduce materials with performance and physical properties similar to those of legacy materials and prepare for their full-scale production. For example, Livermore scientists said they are conducting research to synthesize new TATB that is uniquely suited to NNSA’s needs. According to NNSA contractor representatives, the synthesis process will be refined until it can be replicated by Holston for the W80-4 LEP. Additionally, Los Alamos scientists are researching the formulation process with legacy TATB for the B61-12 main charges. The chemical formulation of binder material used in the past has slightly changed, affecting the structural strength of formulated TATB. Without the proper strength, this formulated explosive cannot be pressed effectively, according to contractor representatives. Sandia is also working to re-establish the THKP production process. NNSA is also working to address the challenge of lost recipes by developing a comprehensive master list for explosive materials. The list tracks information such as the suppliers involved and specific production challenges. According to NNSA and contractor officials, collecting and sharing such information across the sites related to explosive production processes, specifications, and performance will help prevent lost recipes in the future. Even if the sites can replicate lost recipes for explosive materials, NNSA’s supplier base for those materials is fragile. As previously reported and according to NNSA documentation, finding suppliers willing and able to provide required parts and materials can be difficult. Contractor representatives told us that this difficulty arises because of the small quantities of explosive parts and materials NNSA procures, the irregular nature of NNSA’s procurements, and the agency’s exacting performance requirements. For example, neutron generators contain explosive parts that Sandia orders irregularly, in batches numbering only in the hundreds. These parts have such exacting requirements for size and timing that they are hand-made under microscopes. Sandia contractor representatives explained that sometimes the laboratory’s part and material orders may represent only 1 to 3 percent of a company’s total production. To address this challenge, NNSA is working to purchase materials more consistently to ensure that companies can rely on NNSA as a steady customer and be comfortable working to meet NNSA’s exacting requirements. Contractor representatives said that ensuring consistency in production can help maintain the expertise needed to avoid having to reconstitute a specialized process, which can be costly. For example, the effort to restart TATB synthesis and formulation cost approximately $13 million and added 3-1/2 years to the original TATB production schedule, according to Los Alamos contractor representatives. Contractor representatives at Pantex and Los Alamos said that they plan to support continuous production of synthesized TATB and formulated explosives at Holston in the future to avoid delays in restarting production (see sidebar). A Fragile Supplier Base for Other Material The National Nuclear Security Administration (NNSA) has identified challenges with a fragile supplier base for other specialized materials that are used in explosives-related experiments and research. For example, Los Alamos National Laboratory (Los Alamos) in New Mexico requires highly specialized test vessels to conduct essential nuclear weapons research. Specifically, Los Alamos’s Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) uses X-ray machines to record three-dimensional interior images of mock nuclear materials that are imploded using explosives. The exploding components are contained in steel vessels. This facility is unique because it is the world’s most powerful X-ray machine for analysis of these implosions (called hydrodynamic tests). The vessels used at DARHT are made of specialized steel that does not need to be heat-treated during repairs, allowing the laboratory to easily repair them after explosive testing. There is currently a small supplier base (domestic and international) for manufacturing these vessels. Los Alamos contractor representatives are concerned with vendor availability, capability, and willingness to produce vessels because of the small number the laboratory has purchased in the past—they currently have seven operational vessels. Also, contractor representatives said they are concerned that the workforce which knows how to create this specialized steel is nearing retirement. To help ensure a continued future supply of the vessels, Los Alamos is working with Lawrence Livermore National Laboratory in California and the Nevada National Security Site, which use similar vessels, to develop a multi-year procurement plan to encourage suppliers to continue to produce the specialized steel used in their manufacture. NNSA supplier challenges are complicated further when a supplier is foreign or there is only one domestic supplier. According to NNSA documentation, using a foreign supplier may leave NNSA vulnerable to a potential national security risk. Even when the only supplier is domestic, single-point failure is a concern should that supplier delay or cease production, according to contractor representatives. NNSA officials provided an example involving Holston, NNSA’s sole supplier of TATB. According to NNSA officials and contractor representatives, Holston also serves DOD customers that order far larger quantities of explosives, and Holston is required to prioritize those customers’ orders using DOD procurement priority ratings, which may mean that NNSA orders are delayed. For example, Livermore placed an order for the W80-4 main charge explosives at Holston that was to be fulfilled by March 2019, but that order was delayed while the plant worked to finish a DOD order with a higher-priority rating. In addition to this delay, Livermore’s order will be further delayed because Holston had an explosive incident in January 2019 and ceased operations for 3 weeks, according to Livermore and DOD contractor representatives. As a result of both these delays, the W80-4 LEP will have to postpone a hydrodynamic test and other studies, complicating an already tight design and development schedule. This will delay the W80-4 LEP at least 2 months, according to Livermore officials. To minimize the potential for future production delays at Holston, NNSA is working to elevate the priority of all its orders for explosives. Some DOD nuclear weapon delivery platforms have the highest-priority DOD rating, and NNSA officials said they have received permission from DOD to apply this rating to the DOE explosives orders for the nuclear warheads associated with those delivery platforms, including explosive orders for the B61-12 LEP. NNSA officials said they cannot currently use the highest-priority rating for orders associated with the W80-4 LEP because the delivery platform for that LEP does not have the highest-priority rating. NNSA officials are working with DOD and DOE attorneys to obtain permission for using DOD’s highest-priority rating. A contractor representative at Livermore said that in addition to NNSA’s efforts, the Air Force is working separately to obtain permission to use the highest- priority rating for this delivery platform. If the Air Force is successful, NNSA could use that delivery platform’s new high-priority rating for its W80-4 LEP orders. The Livermore contractor representative said that they believe the Air Force will receive permission to use the highest- priority rating before NNSA does. In situations where a supplier cannot or will not produce a specialized material or related component, NNSA is exploring options for producing those materials or components itself. NNSA officials said that they are conducting an analysis of alternatives to meet synthesis, formulation, and production requirements to be completed by the spring of 2019. The analysis will include an option for in-house production of TATB at Pantex. NNSA documentation indicates that Pantex could independently produce the TATB needed for current and future LEPs and modernization efforts with a substantial investment, exact figures for which may be reported upon completion of the analysis of alternatives. Similarly, contractor representatives from Sandia said that in the absence of qualified suppliers, they are working to produce explosive materials, such as THKP as discussed above. NNSA has also identified challenges with its explosives infrastructure, infrastructure data, and workforce. Specifically, NNSA’s infrastructure is aging and deteriorating, some infrastructure data are inaccurate, and some storage areas are near capacity. In addition, recruiting and training qualified staff have presented a challenge to NNSA. As we have previously reported, these challenges are shared across the nuclear security enterprise and are not confined to explosives activities. NNSA is taking several actions to address these challenges, as described below, but data inaccuracies remain related to NNSA’s explosives-related assets. According to NNSA documentation, no mission risk is greater than the state of the agency’s aging infrastructure. The NNSA 2019 Master Asset Plan states that 40 percent of the explosives infrastructure of NNSA’s sites is insufficient to meet mission needs, which can lead to contamination of explosive products or limit the use of facilities. Contractor representatives told us that such contamination has occurred. For example, Pantex contractor representatives said that batches of explosives have been contaminated in its main formulation building by rust falling from the rafters and grass blowing through cracks in the walls. Similarly, Los Alamos contractor representatives said that detonator subassemblies have been rejected at the laboratory because of contamination from foreign debris, such as dust particles that enter through cracks in exterior doors. In addition, older facilities were not built to modern safety standards and pose risks to explosives activities and employees, according to contractor representatives and NNSA documents. At Los Alamos, the design of several older facilities is insufficient to meet current needs, which negatively affects both productivity and safety. For example, the Los Alamos’s High Explosives Chemistry Laboratory is a 1950s era building that is difficult to adapt to modern instrumentation, and electrical and other system failures cause approximately 20 percent downtime, according to contractor representatives. This building is also under a state of continuous limited operation because the laboratory must work under a decreased net explosive limit to keep employees safe while handling explosive materials because the facility lacks adequate blowout walls, according to contractor representatives. Contractor representatives at Los Alamos said that the decreased explosive limits in this facility have hampered their productivity levels. Contractor representatives at Pantex stated that the intrusion of water in key facilities poses electrocution risks, can damage expensive equipment, and can affect production because of downtime when explosives activities must be suspended because of severe weather. Further, we observed facilities at Pantex with water leaks in the roof and floor; some of these facilities house expensive equipment that must be stored under plastic sheeting to prevent water damage. One such facility is Pantex’s Analytics and Chemistry Laboratory, built in 1943 and shown in figures 4 and 5. NNSA and its sites have taken some actions to address this infrastructure challenge. For example, Los Alamos plans to replace its High Explosives Chemistry Laboratory by 2026, and Pantex recently constructed a new building to replace an aging pressing facility and has plans to begin construction on a new analytical laboratory and a formulation building in the 2020s. NNSA documentation states that the new pressing facility will improve operational safety and security thereby enhancing the quality and efficiency of operations. Pantex’s planned analytical laboratory and formulation buildings, however, will not be completed in time to support the currently scheduled B61-12 LEP and W88 alteration modernization effort. Further, according to NNSA officials and contractor representatives, site infrastructure modernization plans are budget dependent and funding for infrastructure modernization efforts is not always certain. Contractor representatives told us and we observed during site visits that some of the data on explosives-related assets in the FIMS real property database were inaccurate and out of date. NNSA policy and the FIMS user’s guide state that NNSA and sites should review and update the capabilities, or programmatic mission(s) associated with each asset, such as being explosives-related, every 5 years, or more frequently if mission requirements change or there are changes in an asset’s physical condition or use. However, 8 of the 22 randomly selected assets from the four sites that we observed contained data in FIMS that were inaccurate because either the information on an asset was out of date or the asset should never have been listed as explosives-related. Some contractor representatives told us that they did not understand why some of their sites’ assets had been characterized as primary assets related to the high explosives mission. For example, an inert storage closet at Pantex and a tool shed at Livermore were labeled as primary explosives-related assets, but according to contractor representatives, they can no longer be used to store explosives because they do not meet appropriate safety standards. Figure 6 illustrates the inert storage at Pantex, which officials said had not been used for any explosives operations for at least 20 years, despite “explosives storage” labeling on the door, but was still characterized as a primary explosives-related asset. However, according to NNSA officials, NNSA was, at the time of our review, in the process of revising guidance on how to associate capabilities with assets. The contractor representatives may not have been aware of the initial guidance the asset was characterized under or of the change underway at the time of our site visit. In other cases, contractor representatives told us that the asset name did not indicate its current use. For example, FIMS data on explosives-related assets at Los Alamos has a “plastics building” that had not been used for manufacturing and assembling plastics for 20 years. Although it currently houses explosives-related work, the building’s name in FIMS had not been updated. Additionally, Los Alamos’s FIMS data indicated that the site had a “day room” that to contractor representatives’ knowledge had never been used for any explosives activities although its purpose has changed over time. We found additional inaccuracies related to various measures of explosives-related assets reported in FIMS. For example, we found at least 94 erroneous entries on the gross square footage of the 1,266 assets identified as having some type of explosives-related capability. For example, FIMS data indicated that a road at Livermore, a bunker at Sandia, and an asset named “recreational/fitness” at Pantex were 3, 1, and 2 gross square feet, respectively. The data listed replacement values of at least $1 million for each of these assets. Los Alamos’s data contained similar errors, such as electrical cables recorded as measuring zero square feet. NNSA officials and contractor representatives identified potential causes for inaccuracies in the FIMS data. For example, contractor representatives who work on explosives activities do not enter explosives- related asset information in FIMS, according to NNSA officials and contractor representatives. Instead, FIMS administrators, who manage information on infrastructure across NNSA sites, said they update FIMS using information that subject matter experts or building managers provide to them, typically in an annual data call. FIMS administrators may therefore not be aware of information that is dated or otherwise incorrect for explosives-related assets. In addition, entering information in certain data fields in FIMS was difficult for assets that were not buildings, according to one FIMS administrator. For example, piping and other utilities may be replaced or updated in sections over time, and it can be difficult to know which date to record for age in FIMS. Because our review included only a limited sample of explosives-related assets, we could not determine the full extent of the FIMS data inaccuracies. NNSA managers use data from FIMS for planning purposes on infrastructure modernization decisions. According to NNSA officials, data from FIMS feeds into other databases that are used to inform infrastructure funding decisions, such as developing the Integrated Priority List that helps NNSA determine the most critical infrastructure modernization projects. While NNSA relies on these data to make planning and funding decisions, our observations of explosives-related assets shows that these data may not be useful in informing the agencies’ infrastructure modernization decisions. Federal internal control standards state that managers should make decisions using quality information that is appropriate, current, complete, accurate, accessible, and provided on a timely basis. By taking steps to improve the accuracy of FIMS data— such as by reviewing and updating information about associations of assets with their primary and secondary programmatic missions, ensuring that those who provide asset information to FIMS administrators understand the data they need to provide, and clarifying how to accurately enter information in FIMS for assets that are not buildings— NNSA would have more reasonable assurance that officials, contractor representatives, and the enterprise manager have the quality information necessary to support management decisions on explosives-related activities. DOE’s requirements for explosives storage limit the amount and type of explosives that can be stored in a single location, since certain explosives may react when stored together. Explosives must be properly stored throughout their life cycles, from the synthesis of raw explosives to their use in weapon assembly or testing. According to a senior NNSA official and site contractor representatives, some sites are running out of space where they can safely store explosives. As contractor representatives from Pantex told us and we observed on our site visit, bunkers for storing explosives are filled to or near capacity, especially for storage in high- security areas. According to contractor representatives, this is problematic because Pantex has the greatest need of all NNSA sites for explosives storage because of its role in producing explosives, receiving and holding explosive parts from across the nuclear security enterprise prior to weapon assembly, and assembling and disassembling weapons. Contractor representatives from Los Alamos also voiced concern about being near their capacity to store detonator cable assemblies and other explosives awaiting shipment for installation in weapons or for testing. NNSA officials and contractor representatives said that they are tracking the shortage of sufficient explosives storage and in some cases have plans to expand current capacity. Los Alamos contractor representatives also said that they are moving forward with constructing a small staging facility that will be collocated with their detonator production facility. It is expected to cost less than $5 million so it will not affect larger line item infrastructure projects. Contractor representatives at Pantex explained that although some storage areas have been identified for replacement, they are, as yet, unfunded projects. In the near term, contractor representatives said that they have other, more pressing infrastructure modernization project needs than explosives storage. They said that they are closely monitoring their storage capacity and expect ongoing modernization efforts to free up some storage space as weapons are assembled. According to NNSA documents and contractor representatives, the contractor workforce at NNSA sites needs to grow to meet the demands of ongoing and future explosives work, but contractors face difficulty recruiting and training qualified new staff to perform this specialized work, which often requires a security clearance. In 2018, Pantex estimated that it needed 211 FTE contractor staff to adequately carry out the site’s explosives activities. However, Pantex contractor representatives indicated that as of November 2018, they had 172 FTEs on board. A major recruitment challenge is competition from industry. Contractor representatives at multiple sites told us that they often compete with large corporations and industries in the local area that offer well-paying jobs for qualified new staff, such as for engineers. For example, site contractor representatives told us that Los Alamos and Sandia compete with Facebook in Albuquerque to attract qualified staff; and Pantex competes with various oil and gas companies in Texas. To address this challenge, contractor representatives from Pantex have recently expanded outreach to local colleges and universities, and NNSA has held job fairs to attract new staff. Lengthy training and clearance processes that are required for specialized explosives work present another challenge. Pantex representatives said recent graduates are required to undergo on-the-job training that can take years before they are ready to safely engage in certain explosives activities. NNSA officials and contractor representatives said that this training challenge is exacerbated by the delays in processing security clearances. NNSA contractor representatives said that some new hires have waited more than a year, and some more than 2 years, to receive clearances to conduct required work or training. In December 2017, we identified delays in obtaining personnel security clearances as a government-wide risk. We also added this issue to our March 2019 High-Risk List. To mitigate this challenge, contractor representatives from Pantex said that they are hiring students before they finish college so that security clearances can be granted by the time students are ready to begin their first day on the job or at least closer to that time. Los Alamos has decided to hire and train individuals without clearances, who must wear red vests and be escorted at all times while their clearances are finalized. We observed numerous workers in this temporary and escorted status during our site visit. Contractor representatives at Livermore said that they also use escorts for new staff without clearances. However, contractor representatives said that requiring additional staff as escorts is costly, can decrease productivity, and has safety impacts because additional staff must be present during activities involving high explosives. NNSA’s 2018 strategic plan for energetic materials describes some identified explosives-related challenges discussed above, as well as further actions to address these challenges, but does not describe other challenges NNSA officials and contractor representatives identified. This strategic plan incorporates some leading practices for strategic planning. However, some of the strategic plan’s elements have not been fully developed consistent with selected leading practices for strategic planning. The strategic plan for energetic materials, which includes comments from coordinating committee members, describes some of the challenges that NNSA officials and contractor representatives identified in conducting explosives activities, which we discussed above. Specifically, it describes some challenges related to the supply of explosive materials and to infrastructure modernization, including the following: Supply of explosive materials. The strategic plan describes both the supply of explosive materials as well as the supply of pre-cursor ingredients as a challenge facing NNSA. The strategic plan also identifies a number of actions NNSA is taking to bolster the supply chain, such as re-establishing the capability to manufacture THKP. Infrastructure modernization. The strategic plan notes that explosives-related “facilities require recapitalization to support LEP activities, improve efficiencies, reduce downtime, and maintain baseline capabilities.” It also identifies several interrelated actions NNSA is taking to address infrastructure challenges, such as re- purposing some facilities and eliminating others that are inadequate, too costly to maintain, or no longer needed. In addition, the strategic plan describes the challenge of adequate storage for explosives and includes actions to annually monitor and track storage conditions at the sites as well as provide long-term, low-temperature, moisture-free storage for explosives. However, based on our review of the strategic plan, it does not discuss three of the challenges that NNSA officials and contractor representatives had identified: the quality of data on infrastructure information, workforce levels, and safety. First, the data quality challenge related to infrastructure information, such as inaccuracies in FIMS, is not discussed in the strategic plan, although NNSA officials and contractor representatives we interviewed identified it as a challenge that may affect its planning and decision-making related to explosives activities. Second, the strategic plan does not discuss workforce challenges. While the strategic plan states that NNSA “recognize(s) that staffing is an important aspect for supporting energetics, it assumes that ongoing efforts across the nuclear security enterprise related to workforce are successful.” Since the enterprise manager does not track workforce levels across the enterprise, as previously noted, it is unclear how NNSA can determine if its contractors’ workforce efforts across the enterprise are successful and whether levels are adequate to achieve the goals of the strategic plan for explosives over time. Third, outside of infrastructure improvement, the strategic plan also does not directly discuss the challenge of safety, although it affects all explosives activities and challenges that NNSA has identified. Because of the inherent danger of explosives activities, safety is important, and even when protocols are followed, unintended events can occur that affect human safety—as illustrated by a safety incident last year. The incident occurred at a Los Alamos facility in April 2018 when a small explosive pellet deflagrated during pressing, causing two people to incur short-term hearing loss. One of those people was an escort and was only required to be present because of the delay in security clearance processing, a challenge discussed above. According to a December 2018 Los Alamos document, pressing operations had resumed at the facility. Although the cause of the incident is still unclear, it provided an opportunity to make safety improvements in the facility at Los Alamos, according to contractor representatives. According to a Los Alamos document about the incident, a key lesson learned was that safety records like maintenance logs, blast calculations, and materials safety testing results need to be archived and readily accessible to staff before the start of any work activities. The inherent challenge of safety in explosives and key lessons learned, such as this one, are not discussed in the strategic plan. NNSA officials said that they are planning to revise the strategic plan for energetic materials in 2020 but did not state that they would include the challenges of data quality, workforce, or safety. All three of these challenges may impede NNSA’s ability to achieve the goals described in the plan for explosives activities. We have previously identified selected leading practices in strategic planning. These practices specify that agencies should define strategies that address management challenges that threaten an agency’s ability to meet its long-term strategic goals. As NNSA revises its strategic plan for energetic materials, by discussing the data, workforce, and safety challenges it faces and the actions it plans to address them, as appropriate, or documenting the rationale for why the challenges were not included, NNSA would have better assurance that its strategies address these challenges. In developing its strategic plan for energetic materials, NNSA followed several key leading practices in strategic planning that we have identified in our past work, including the following: Involving stakeholders, such as federal agencies, state governments, or others, in defining the mission and desired outcomes helps ensure that their expectations and interests are met and that resources and efforts are targeted at the program’s highest priorities. When developing the strategic plan, NNSA shared a draft with members of the coordinating committee and incorporated their comments to ensure that their interests and expectations were met. Assessing external and internal forces helps managers anticipate future challenges and make adjustments before potential problems become crises. For example, external forces (e.g., emerging technological trends and new statutory requirements) and internal forces (e.g., culture, management practices, and business processes) may influence the program’s ability to achieve its goals. When developing the strategic plan, NNSA officials and coordinating committee members considered external and internal forces. For example, the officials and members discussed the availability of explosives from external suppliers, such as Holston, compared to the potential costs or challenges related to internal NNSA production of explosives. Covering at least a 4-year period, while making adjustments as needed to reflect significant changes to the operating environment, is also a key strategic planning practice. The strategic plan covers more than 4 years of explosives activities. For example, there is a performance goal to re-establish a reliable THKP supply by 2024. In addition, NNSA officials have discussed their intention to update the plan as their operating environment changes. Our past work has also shown that effective strategic plans should include specific elements. We reviewed NNSA’s Defense Programs Strategic Plan for Energetic Materials and found that the strategic plan includes most of these elements, but we also found that some of the strategic plan’s elements have not been fully developed. Specifically: Mission statement. According to leading federal strategic planning practices, a comprehensive mission statement should explain why a program exists and what it does. The strategic plan does not clearly identify a mission statement but includes an overarching “strategy to ensure the availability of energetic materials and products for the stockpile.” When asked to identify the energetics mission statement, the two contractor representatives who led the development of the strategic plan told us that they consider this “strategy” to be the energetics mission. However, a strategy cannot be a mission, since a strategy is how a mission may be achieved. Long-term strategic goals and objectives, strategies, and performance goals. There are several interrelated elements on long- term strategic goals, objectives, strategies, and performance goals, according to leading strategic planning practices. These include that long-term strategic goals and objectives should specify how an agency will carry out its mission and explain what results are expected from the program. The strategic plan includes four long-term strategic goals for meeting its mission, some strategies for achieving its goals, and some performance goals to assess progress related to ensuring the availability of explosives. They are also logically linked to each other. For example, the strategic plan’s goal to sustain and modernize the energetics infrastructure relates to the strategic plan’s strategy to eliminate facilities that are inadequate, too costly to maintain, or no longer needed. However, we found that responsibilities for achieving the strategic plan’s four goals are not clearly assigned within NNSA, and the four goals are not consistently quantifiable. For example, the third goal is to “manage the energetics supply chain,” but the strategic plan does not specify who is responsible for achieving this goal within NNSA. Further, this long-term strategic goal is not quantifiable because it describes a general process and does not define the expected results, which may make it difficult for NNSA to assess progress in meeting the goal. According to leading strategic planning practices, strategies should be specific enough to allow an assessment of whether they will help achieve those goals, such as by describing the resources needed, including the staff responsible to achieve a program’s goals and objectives. We found that the strategic plan contains several strategies for achieving goals, but some of them are not specific enough to clearly identify the types of resources required, such as the parties responsible for achieving them. For example, under the goal of managing the energetics supply chain, there is a strategy to “plan, track and assess the energetics strategic posture,” but the strategic plan does not specify what is meant by the energetics strategic posture or who is responsible for undertaking these actions. This strategy is also limited because it does not describe the resources needed to achieve the broader goal. According to leading strategic planning practices, performance goals should be used to assess progress toward long-term goals and should include (1) the specific activities within the program that will be assessed for performance and (2) the level of performance to be achieved for each measure. We found that the strategic plan has 50 performance goals, most of which were quantifiable—or able to be assessed for performance or progress. However, some were not quantifiable, such as to “enhance or advance energetics formulations for additive manufacturing.” This performance goal also does not set milestones, such as a time frame for completion, or staff assigned to achieve it, contrary to leading strategic planning practices. Further, the level of performance for some goals was not fully developed. For example, the performance goal “to reduce substandard mission- critical facilities below 10 percent” does not clarify whether the goal is to reduce the current number of inadequate and substandard facilities by 10 percent (a change of about 50 facilities) or reduce the total number of inadequate and substandard facilities to be less than 10 percent of all facilities (a change of about 500 facilities). This performance goal also does not set time frames for measuring performance or list responsible parties associated with it. Another performance goal that was not fully developed is to “manage the energetics supply chain,” which falls under the long-term strategic goal of “sustaining and modernizing the infrastructure.” In addition, this performance goal is identical to a long-term strategic goal in the strategic plan titled “manage the energetics supply chain.” A performance goal should not replicate a strategic goal, since long- term strategic goals are broader in nature than performance goals. Moreover, this particular performance goal is not quantifiable, does not set a time frame for completion, and does not list a responsible party to carry out specific activities to achieve the goal. External factors. According to leading strategic planning practices, external factors that could significantly affect achievement of the strategic goals, such as economic trends or actions by Congress, state and federal agencies, or other entities, should be identified. The strategic plan identifies some external factors that could significantly affect the achievement of strategic goals. Specifically, the strategic plan notes that DOD’s demand for explosives from Holston could affect NNSA’s ability to achieve its goals. According to NNSA officials and documents, DOD’s demand for explosives is increasing, and Holston is already struggling to meet DOD’s needs. According to Holston contractor representatives, DOD is expanding Holston’s production capabilities for HMX, research development explosive (RDX), and insensitive munitions explosive (IMX) which when completed will relieve pressure on TATB production. In addition, the strategic plan identifies challenges to its supplier base, such as the difficulty of sourcing explosive materials from non-U.S. suppliers and that the small size of NNSA’s orders provides limited economic incentive for commercial vendors. However, the strategic plan does not identify other external factors that could significantly affect the achievement of strategic goals, such as actions taken or not taken by Congress. Specifically, modernizing the explosives infrastructure will require appropriations for the significant capital investment needed, but the uncertainty of future appropriations in a challenging fiscal environment is an external factor not identified in the strategic plan. In addition, the strategic plan does not acknowledge that other NNSA programs may compete for funds or affect infrastructure modernization priorities at a given site. NNSA officials, including the enterprise manager, stated that they are aware that the strategic plan for energetic materials has limitations, such as performance goals that are not specific or are difficult to quantify. NNSA officials said that they released the strategic plan quickly as it was the first of its kind for explosives activities, and they believed the explosives community would receive the most benefit it if it was published as soon as possible, though it was not fully complete. Further, they said that they intend to revise the strategic plan in the next year or so. As NNSA revises its strategic plan for energetic materials, including fully developed elements of an effective plan—such as a clear mission statement and quantifiable performance goals that set time frames for completion and list responsible parties who will carry out specific activities for all strategic goals—would help NNSA make the strategic plan useful in measuring goal achievement and assessing accountability. NNSA is undertaking an extensive, multifaceted effort to sustain and modernize U.S. nuclear weapons, and explosives are essential to the functioning of these weapons. Five NNSA sites conduct a range of interdependent activities to design and produce explosives. NNSA has identified several challenges in carrying out these activities and is taking actions to address them. For example, NNSA officials and contractor representatives identified challenges related to producing highly specialized materials and are working to re-establish their supply. However, NNSA managers may be relying on inaccurate FIMS data on infrastructure related to explosives activities to make modernization decisions, because we found a number of inaccuracies in FIMS data on explosives activities. NNSA officials and contractor representatives identified a few potential causes for these inaccuracies; however, because our review included only a limited sample of explosives-related assets, we could not determine the full extent of the FIMS data inaccuracies. According to NNSA officials, NNSA has taken some initial steps to revise guidance, which we find encouraging as these revisions may help improve accuracy of FIMS data. By taking additional steps to improve the accuracy of FIMS data—such as reviewing and updating information about associations of assets with their primary and secondary programmatic missions, ensuring that those who provide asset information to FIMS administrators understand the data they need to provide, and clarifying how to accurately enter information in FIMS for assets that are not buildings—NNSA would have more reasonable assurance that officials, contractor representatives, and the enterprise manager have the quality information necessary to support management decisions on explosives-related activities. In addition, the strategic plan for energetic materials—which represents a positive step toward managing explosives in a forward-looking, enterprise-wide approach—does not discuss three of the significant challenges that NNSA officials and contractor representatives identified related to explosives activities. NNSA officials said that they are planning to revise the strategic plan in 2020 but did not state that they would incorporate data quality, workforce, or safety challenges. As the agency revises its strategic plan for energetic materials, by discussing these challenges and actions planned to address them, as appropriate, or documenting the rationale for why the challenges were not included, NNSA would have better assurance that it is effectively managing challenges that present risks to achieving its objectives. The strategic plan for energetic materials also does not contain fully developed elements that we have previously reported that effective strategic plans should include, such as a fully developed mission statement and performance goals that are quantifiable, set time frames for completion, and list responsible parties to carry out specific activities. NNSA officials said that they intend to revise the strategic plan in 2020. As NNSA revises its strategic plan for energetic materials, by including fully developed elements of an effective strategic plan—such as a fully developed and clearly identified mission statement and performance goals that are quantifiable, have time frames for completion, and list responsible parties to carry out specific activities for all strategic goals— NNSA would help make the strategic plan more useful in measuring goal achievement and assessing accountability. We are making the following three recommendations to NNSA: NNSA’s Energetic Materials Enterprise Manager and relevant NNSA officials and contractor representatives at NNSA sites should take steps to improve the accuracy of FIMS data related to NNSA’s infrastructure supporting explosives activities. These steps should include reviewing and updating information about associations of assets with primary and secondary explosives missions; ensuring that those who provide asset information to FIMS administrators understand the data they need to provide; and clarifying how to accurately enter information in FIMS for explosives assets that are not buildings. (Recommendation 1) NNSA’s Energetic Materials Enterprise Manager, in consultation with members of NNSA’s Energetics Coordinating Committee, should, as the agency revises its Defense Programs Strategic Plan for Energetic Materials, include discussion of identified challenges related to explosives activities, such as data quality, workforce levels, and safety as well as any actions to address them, as appropriate, or document the rationale for why identified challenges were not included. (Recommendation 2) NNSA’s Energetic Materials Enterprise Manager, in consultation with members of NNSA’s Energetics Coordinating Committee, should, as the agency revises its Defense Programs Strategic Plan for Energetic Materials, include fully developed elements of an effective strategic plan, such as a clearly identified mission statement and performance goals that are quantifiable, set time frames for completion, and list responsible parties to carry out specific activities for all strategic goals. (Recommendation 3) We provided a draft of this report to DOE and NNSA for review and comment. In its written comments, which are summarized below and reproduced in full in appendix I, NNSA concurred with the report’s recommendations and described actions that it intends to take in response to our recommendations. NNSA also provided technical comments, which we considered and incorporated in our report as appropriate. DOE did not comment on our findings and recommendations. In response to our first recommendation, NNSA stated that it recognizes the need to improve infrastructure data consistency and accuracy and intends to complete several actions by March 31, 2020 to improve its infrastructure data. For example, DOE’s Infrastructure Executive Committee is conducting a comprehensive review of the existing 178 data elements in FIMS and has proposed deleting or adjusting 66, which it believes will sharpen its focus on data quality for the remaining data elements. In addition, among other actions, NNSA stated it is implementing the Mission Dependency Index 2.0 initiative, which is expected to provide greater consistency and accuracy on reporting asset capability and determining consequence to mission. In response to our second and third recommendations, NNSA stated that it is planning to revise its Strategic Plan for Energetic Materials by October 31, 2019. NNSA stated that the update to its plan will include a discussion of the identified challenges to explosives activities as well as fully developed elements of an effective strategic plan. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or at bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Jonathan Gill (Assistant Director), Eric Bachhuber (Analyst in Charge), Natalie Block, Scott Fletcher, Ellen Fried, Rob Grace, and Dennis Mayo made key contributions to this report. Also contributing to this report were Cindy Gilbert, Penney Harwell Caramia, Dan C. Royer, Jeanette Soares, Kiki Theodoropoulos, and Khristi Wilkins.", "summary": "NNSA is responsible for the management and security of the U.S. nuclear stockpile. NNSA has ongoing and planned efforts to modernize nearly all of the weapons in the stockpile, which require new explosive components. The production of some key explosives ceased in the early 1990s, and much of the infrastructure supporting this work is aging, making it expensive and difficult to maintain. The Senate Report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 included a provision for GAO to review NNSA's high explosive capabilities specific to nuclear weapons. This report examines (1) explosives activities that NNSA and its sites conduct and how NNSA manages them; (2) challenges NNSA officials and contractor representatives identified in conducting these activities and the extent to which NNSA has taken actions to address them; and (3) the extent to which NNSA's strategic plan for explosives activities describes further actions, if any, to address the challenges identified and follows leading practices for strategic planning. GAO reviewed NNSA documents related to explosives activities, including its strategic plan; compared the plan with leading practices; and interviewed NNSA officials and site representatives. Five National Nuclear Security Administration (NNSA) contractor-operated sites conduct activities to design and produce explosive materials. There are about 100 different nuclear weapon components that contain explosive materials (see figure). Each site assumes primary responsibility for certain activities, but most activities require collaboration by multiple sites, according to NNSA officials and contractor representatives. In 2018, NNSA began adopting a centralized approach to managing these activities and coordinating them across its sites. NNSA officials and contractor representatives identified several challenges related to explosives activities, such as the agency's dwindling supply of explosive materials, aging and deteriorating infrastructure, and difficulty recruiting and training qualified staff. For example, only a single container of one specialized material remains. NNSA officials and contractor representatives indicated that the agency is taking some actions to address these challenges, such as working to replenish the supply of dwindling, highly specialized materials. NNSA's strategic plan for explosives activities addresses some of the challenges agency officials and contractor representatives have identified, and NNSA followed several key leading practices in developing its strategic plan. However, some of the plan's elements have not been fully developed consistent with selected leading practices. For instance, the plan does not include a fully developed mission statement, and some performance goals are not quantifiable. NNSA officials stated that they are aware of the strategic plan's limitations and that they released it quickly to ensure that the explosives community could use it as soon as possible. NNSA officials said that they intend to revise the strategic plan in the next year or so. As NNSA revises its strategic plan, by including fully developed elements of an effective strategic plan, NNSA would help make the strategic plan more useful in measuring goal achievement and assessing accountability. GAO is making three recommendations, including that NNSA, as it revises its strategic plan for explosives activities, include fully developed elements of an effective strategic plan. NNSA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Our experience has shown that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency leaders grounded in the five criteria for removal from the High-Risk List, as well as any needed congressional action. The five criteria for removal that we issued in November 2000 are as follows: Leadership commitment. Demonstrated strong commitment and top leadership support. Capacity. Agency has the capacity (i.e., people and resources) to resolve the risk(s). Action plan. A corrective action plan exists that defines the root cause, solutions, and provides for substantially completing corrective measures, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated progress. Ability to demonstrate progress in implementing corrective measures and in resolving the high-risk area. Starting in our 2015 update, we added clarity and specificity to our assessments by rating each high-risk area’s progress on the five criteria and used the following definitions: Met. Actions have been taken that meet the criterion. There are no significant actions that need to be taken to further address this criterion. Partially met. Some, but not all, actions necessary to meet the criterion have been taken. Not met. Few, if any, actions towards meeting the criterion have been taken. We are removing two areas—DOD Supply Chain Management and Mitigating Gaps in Weather Satellite Data—from the list due to the progress that was made in addressing the high-risk issues. As we have with areas previously removed from the High-Risk List, we will continue to monitor these areas to ensure that the improvements we have noted are sustained. If significant problems again arise, we will consider reapplying the high-risk designation. We added two areas to the High-Risk List since our 2017 update—Government-Wide Personnel Security Clearance Process and VA Acquisition Management. We are removing the area of DOD Supply Chain Management from the High-Risk List because, since 2017, DOD has addressed the remaining two criteria (monitoring and demonstrated progress) for the asset visibility and materiel distribution segments. Congressional attention, DOD leadership commitment, and our collaboration contributed to the successful outcome for this high-risk area, which had been on GAO’s High-Risk List since 1990. DOD’s actions for the asset visibility segment of this high-risk area included (1) providing guidance for the military components to consider key attributes of successful performance measures during metric development for their improvement initiatives; (2) incorporating into after- action reports, information relating to performance measures; and (3) demonstrating sustained progress by, for example, increasing its visibility of assets through radio-frequency identification (RFID), an automated data-capture technology that can be used to electronically identify, track, and store information contained on a tag. According to DOD, the use of RFID tags to provide visibility of sustainment cargo at the tactical leg (i.e., the last segment of the distribution system) resulted in $1.4 million annual cost savings. DOD’s actions for the materiel distribution segment of this high-risk area included (1) making progress in developing its suite of distribution performance metrics; (2) incorporating distribution metrics, as appropriate, on the performance of all legs of the distribution system, including the tactical leg; (3) making progress in refining its Materiel Distribution Improvement Plan and incorporating additional actions based on interim progress and results; and (4) improving its capability to comprehensively measure distribution performance, identifying distribution problems and root cause, and implementing solutions. According to DOD, initiatives focused on distribution process and operational improvements have resulted in at least $1.56 billion in distribution cost avoidances to date. As we have with areas previously removed from the High-Risk List, we will continue to monitor this area to ensure that the improvements we have noted are sustained. Appendix I provides additional information on this high-risk area. We are removing the area of Mitigating Gaps in Weather Satellite Data from the High-Risk List because—with strong congressional support and oversight—the National Oceanic and Atmospheric Administration (NOAA) and DOD have made significant progress since 2017 in establishing and implementing plans to mitigate potential gaps in weather satellite data. The United States relies on polar-orbiting satellites to provide a global perspective on weather every morning and afternoon. NOAA is responsible for the polar satellite program that crosses the equator in the afternoon while DOD is responsible for the polar satellite program that crosses the equator in the early morning orbit. NOAA’s actions for polar- orbiting weather satellites that addressed the remaining criteria of action plan and demonstrated progress included (1) issuing three updates to its gap mitigation plan between January 2016 and February 2017 to address shortfalls we had identified previously; and (2) successfully launching the NOAA-20 satellite in November 2017, which is currently operational and is being used to provide advanced weather data and forecasts. Moreover, NOAA is also working to build and launch the next satellites in the polar satellite program. DOD’s actions for polar-orbiting weather satellites, pursuant to statutes and accompanying congressional direction, included DOD leadership (1) developing and implementing plans to acquire satellites as part of a family of systems to replace its aging legacy weather satellites, including awarding a contract for its Weather System Follow-on–Microwave program, planned for launch in 2022; (2) establishing plans to meet its highest-priority weather monitoring data collection needs that will not be covered by the Weather System Follow-on–Microwave program, including by acquiring and launching the Electro-Optical/Infrared Weather Systems satellite in 2024; and (3) monitoring the Weather System Follow-on- Microwave satellite program’s progress toward addressing critical needs and assessing its operations and sustainment costs. As we have with areas previously removed from the High-Risk List, we will continue to monitor this area to ensure that the improvements we have noted are sustained. Appendix I provides additional information on this high-risk area. Executive branch agencies are not meeting investigation timeliness objectives, and these processing delays have contributed to a significant backlog that the National Background Investigations Bureau (NBIB)—the agency responsible for personnel security clearance investigations— reported to be approximately 565,000 investigations as of February 2019. In addition, the executive branch has not finalized performance measures to ensure the quality of background investigations and some long- standing key reform initiatives remain incomplete. Further, information technology (IT) security concerns may delay planned milestones for the development of a new background investigation IT system. We included the DOD program on our High-Risk List in 2005 and removed it in 2011 because of improvements in the timeliness of investigations and adjudications, and steps toward measuring the quality of the process. We put the government-wide personnel security clearance process on our High-Risk List in January 2018 because of significant challenges related to the timely processing of security clearances and completing the development of quality measures. In addition, the government’s effort to reform the personnel security clearance process, starting with the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, has had mixed progress, and key reform efforts have not been implemented government-wide. Since adding this area to the High-Risk List, the Security Clearance, Suitability, and Credentialing Performance Accountability Council (PAC), including its four principal members—the Deputy Director for Management of the Office of Management and Budget (OMB), the Director of National Intelligence (DNI); the Under Secretary of Defense for Intelligence; and the Director of the Office of Personnel Management (OPM)—have not fully met the five criteria for high-risk removal. Several issues contribute to the risks facing the government-wide personnel security clearance process: Clearance processing delays. Executive branch agencies are not meeting most investigation timeliness objectives. The percentage of executive branch agencies meeting established timeliness objectives for initial secret clearances, initial top secret clearances, and periodic reinvestigations decreased each year from fiscal years 2012 through 2018. For example, 97 percent of the executive branch agencies we reviewed did not meet the timeliness objectives for initial secret clearance investigations in fiscal year 2018. Lack of quality measures. While the executive branch has taken steps to establish government-wide performance measures for the quality of background investigations—including establishing quality assessment standards and a quality assessment reporting tool—it is unclear when this effort will be completed. Security clearance reform delays. The executive branch has reformed many parts of the personnel security clearance process— such as updating adjudicative guidelines to establish common adjudicative criteria for security clearances; however, some long- standing key initiatives remain incomplete—such as completing plans to fully implement and monitor continuous evaluation. IT security. DOD is responsible for developing a new system to support background investigation processes, and DOD officials expressed concerns about the security of connecting to OPM’s legacy systems since a 2015 data breach compromised OPM’s background investigation systems and files for 21.5 million individuals. As of December 2018, OPM has not fully taken action on our priority recommendations to update its security plans, evaluate its security control assessments, and implement additional training opportunities. However, since we added this area to our High-Risk List, the PAC has demonstrated progress in some areas. For example, NBIB reported that the backlog of background investigations decreased from almost 715,000 cases in January 2018 to approximately 565,000 cases in February 2019. NBIB officials credit an Executive Memorandum—issued jointly in June 2018 by the DNI and the Director of OPM and containing measures to reduce the investigation backlog—as a driver in backlog reduction. Further, in response to a requirement in the Securely Expediting Clearances Through Reporting Transparency (SECRET) Act of 2018, in September 2018, NBIB reported to Congress, for each clearance level, (1) the size of the investigation backlog, (2) the average length of time to conduct an initial investigation and a periodic reinvestigation, and (3) a discussion of the factors contributing to investigation timeliness. The PAC is also reporting publicly on the progress of key reforms through www.performance.gov, and for fiscal year 2018, the website contains quarterly action plans and progress updates, which present figures on the average timeliness of initial investigations and periodic reinvestigations for the executive branch as a whole, investigation workload and backlog, and investigator headcounts. We have made numerous recommendations to PAC members to address risks associated with the personnel security clearance process between 2011—when we removed DOD’s personnel security clearance program from the High-Risk List, and 2018—when we placed the government-wide personnel security clearance process on the High-Risk List. We consider 27 of these recommendations key to addressing the high-risk designation. Eight recommendations key to the high-risk designation have been implemented, including three since January 2018. Nineteen of these key recommendations remain open—including recommendations that the principal members of the PAC (1) conduct an evidence-based review of investigation and adjudication timeliness objectives, (2) develop and report to Congress on investigation quality measures, (3) prioritize the timely completion of efforts to modernize and secure IT systems that affect clearance holders government-wide, and (4) develop and implement a comprehensive workforce plan that identifies the workforce needed to meet current and future demand for background investigations services and to reduce the investigations backlog. See page 170 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. VA spends tens of billions of dollars to procure a wide range of goods and services—including medical supplies, IT, and construction of hospitals, clinics, and other facilities—to meet its mission of providing health care and other benefits to millions of veterans. VA has one of the most significant acquisition functions in the federal government, both in obligations and number of contract actions. The Veterans Health Administration (VHA) provides medical care to veterans and is by far the largest administration in the VA. Since we began focusing on VA’s acquisition management activities in 2015, we have reported numerous challenges in this area. Since 2015, we have made 31 recommendations, 21 of which remain open, that cover a range of areas to address challenges in VA’s acquisition management. In fiscal year 2019, VA received the largest discretionary budget in its history—$86.5 billion, about $20 billion higher than in 2015. About a third of VA’s discretionary budget in fiscal year 2017, or $26 billion, has been used to contract for goods and services. VA’s acquisition management continues to face challenges including (1) outdated acquisition regulations and policies; (2) lack of an effective medical supplies procurement strategy; (3) inadequate acquisition training; (4) contracting officer workload challenges; (5) lack of reliable data systems; (6) limited contract oversight and incomplete contract file documentation; and (7) leadership instability. In light of these challenges and given the significant taxpayer investment, it is imperative that VA show sustained leadership commitment to take steps to improve the performance of its procurement function so that it can use its funding in the most efficient manner possible to meet the needs of those who served our country. This area has been added to the High-Risk List for the following reasons in particular: Outdated acquisition regulations and policies. VA’s procurement policies have historically been outdated, disjointed, and difficult for contracting officers to use. In September 2016, we reported that the acquisition regulations contracting officers currently follow have not been fully updated since 2008 and that VA had been working on completing a comprehensive revision of its acquisition regulations since 2011. VA’s delay in updating this fundamental source of policy has impeded the ability of contracting officers to effectively carry out their duties. We recommended in September 2016 that VA identify measures to expedite the revision of its acquisition regulations and clarify what policies are currently in effect. VA concurred with this recommendation but has not yet fully implemented it. Lack of an effective medical supplies procurement strategy. VA’s Medical Surgical Prime Vendor-Next Generation (MSPV-NG) program for purchasing medical supplies to meet the needs of about 9 million veterans at 172 medical centers has not been effectively executed, nor is it in line with practices at leading hospitals that have launched similar programs. We reported in November 2017 that VA’s approach to developing its catalog of supplies was rushed and lacked key stakeholder involvement and buy-in. As a result, VA was not able to accomplish some of the key efficiencies the program was intended to achieve, such as streamlining the purchase of medical supplies and saving money. We recommended in November 2017 that VA develop, document, and communicate to stakeholders an overarching strategy for the program. VA concurred with this recommendation and reported that it would develop a new strategy by March 2019. Contracting officer workload challenges. The majority of our reviews since 2015 have highlighted workload as a contributing factor to the challenges that contracting officers face. Most recently, in September 2018, we reported that about 54 percent of surveyed VA contracting officers said their workload was not reasonable. In addition, in September 2016, we reported that VHA contracting officers processed a large number of emergency procurements of routine medical supplies, which accounted for approximately 20 percent of VHA’s overall contract actions in fiscal year 2016, with obligations totaling about $1.9 billion. Contracting officers told us that these frequent and urgent small-dollar transactions reduce contracting officers’ efficiency and ability to take a strategic view of procurement needs. We recommended in November 2017 that VHA network contracting offices work with medical centers to identify opportunities to more strategically purchase goods and services frequently purchased on an emergency basis. VA concurred with this recommendation and reported in December 2018 that it is utilizing a supply chain dashboard to track items purchased on an emergency basis and determine which of those items to include on the catalog. VA noted that it added 13,300 items to the catalog from June 2018 to December 2018, including items often purchased on an emergency basis. We requested documentation showing which items added to the catalog were previously purchased on an emergency basis, but as of January 2019, VA had not yet provided it. Among other things, VA should implement our 21 open recommendations and specifically needs to take the following steps to demonstrate greater leadership commitment and strategic planning to ensure efficient use of its acquisition funding and staffing resources: Prioritize completing the revision of its acquisition regulations, which has been in process since 2011. Develop, document, and communicate to stakeholders a strategy for the Medical Surgical Prime Vendor program to achieve overall program goals. Identify opportunities to strategically purchase goods and services that are frequently purchased on an emergency basis. See page 210 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. In addition to specific areas that we have designated as high risk, other important challenges facing our nation merit continuing close attention. One of these is the use of illicit drugs and the misuse of prescription drugs and the ways they affect individuals, their families, and the communities in which they live. Over 70,000 people died from drug overdoses in 2017—about 191 people every day—according to the Centers for Disease Control and Prevention, with the largest portion of these deaths attributed to opioids. Further, drug overdoses are the leading cause of death due to injuries in the United States. They are currently at their highest ever recorded level and, since 2011, have outnumbered deaths by firearms, motor vehicle crashes, suicide, and homicide, according to the Drug Enforcement Administration. The Council of Economic Advisors estimates that in 2015, the economic cost of the opioid crisis alone was more than $500 billion when considering the value of lives lost due to opioid-related overdose. Federal drug control efforts spanning prevention, treatment, interdiction, international operations, and law enforcement represent a considerable federal investment. According to the President’s fiscal year 2019 budget, federal drug control funding for fiscal year 2017 was $28.8 billion. Multiple federal agencies have ongoing efforts to respond to this crisis, including efforts to reduce the supply and demand for illicit drugs, to prevent misuse of prescription drugs, and to treat substance use disorders. However, we previously found that many efforts lacked measures to gauge the success of the federal response. Further, we have long advocated an approach to decision-making based on risk management. Such an approach would (1) link agencies’ plans and budgets to achieving their strategic goals, (2) assess values and risks of various courses of actions to help set priorities and allocate resources, and (3) provide for the use of performance measures to assess progress. The Office of National Drug Control Policy (ONDCP) is responsible for overseeing and coordinating the implementation of U.S. drug policy, including developing the National Drug Control Strategy (Strategy). ONDCP released the 2019 Strategy on January 31, 2019. The Strategy focuses on approaches related to prevention, treatment and recovery, and steps to reduce the availability of illicit drugs in the United States. We will continue to monitor the extent to which ONDCP and other federal agencies are employing a risk management and coordinated approach to their efforts to limit drug misuse. In particular, we have ongoing and planned work to assess ONDCP’s operations, including its (1) leadership and coordination of efforts across the federal government; (2) the effects of the drug crisis on labor force participation and productivity and on people with disabilities and other vulnerable populations; (3) key federal efforts to reduce the availability of illicit drugs; and (4) agency efforts around drug education and prevention. We will determine whether this issue should be added to the High-Risk List once we have completed this ongoing and planned work. Agencies can show progress by addressing our five criteria for removal from the list: leadership commitment, capacity, action plan, monitoring, and demonstrated progress. As shown in table 1, 24 high-risk areas, or about two-thirds of all the areas, have met or partially met all five criteria for removal from our High-Risk List; 20 of these areas fully met at least one criterion. Compared with our last assessment, 7 high-risk areas showed progress in one or more of the five criteria without regressing in any of the criteria. Ten high-risk areas have neither met nor partially met one or more criteria. Two areas showed mixed progress by increasing in at least one criterion and also declining in at least one criterion. Three areas declined since 2017. These changes are indicated by the up and down arrows in table 1. Figure 1 shows that since our 2017 update, the most progress was made on the action plan criterion—four high-risk areas received higher ratings. We rated two areas lower on leadership commitment and two areas lower on monitoring. Table 2 shows that 17 of the 34 high-risk areas we rated have met the leadership commitment criterion while two high-risk area ratings regressed on leadership commitment from met to partially met since our last report. Leadership commitment is the critical element for initiating and sustaining progress, and leaders provide needed support and accountability for managing risks. Leadership commitment is needed to make progress on the other four high-risk criteria. Table 2 shows that only three high-risk areas met the criterion for capacity, six met the criterion for action plan, and two met the criterion for demonstrated progress. One high-risk area—U.S. Government’s Environmental Liability—has partially met only one criterion since we added the area to our list in 2017 and the rest are not met. As noted, seven areas showed improvement in one or more criterion without regressing in any criteria. Two areas showed sufficient progress to be removed from the High-Risk List. The other five high-risk areas remaining on the 2019 list demonstrated improvement and are described below. Three of these five improving high-risk areas are the responsibility of the Department of Defense (DOD)—DOD Support Infrastructure Management, DOD Financial Management, and DOD Business Systems Modernization. The two other improving areas are Department of Energy’s (DOE's) Contract Management for the National Nuclear Security Administration and Office of Environmental Management, and Medicare Program & Improper Payments. DOD Support Infrastructure Management: DOD manages a portfolio of real property assets that, as of fiscal year 2017, reportedly included about 586,000 facilities—including barracks, maintenance depots, commissaries, and office buildings. The combined replacement value of this portfolio is almost $1.2 trillion and includes about 27 million acres of land at nearly 4,800 sites worldwide. This infrastructure is critical to maintaining military readiness, and the cost to build and maintain it represents a significant financial commitment. Since our 2017 High-Risk Report, DOD’s rating for two criteria—leadership commitment and action plan—improved from partially met to met. DOD has demonstrated leadership commitment by stating its commitment to addressing key recommendations we have made by, for example, (1) better forecasting the initial Base Realignment and Closure (BRAC) costs for military construction, IT, and relocating military personnel and equipment; (2) better aligning infrastructure to DOD force structure needs by, for example, improving the accuracy and sufficiency of its excess capacity estimates; and (3) pursuing an effort to consolidate and standardize leases, which includes analyzing whether it is feasible to relocate functions from commercial leased space to existing space on an installation, thereby reducing leases and better utilizing excess space. DOD has developed action plans to better identify excess infrastructure and thus be positioned to dispose of it. For example, in the 2017 High- Risk Report, we stated that DOD’s Real Property Efficiency Plan includes DOD’s goals for reducing the footprint of its real property inventory and metrics to gauge progress, to be implemented by the end of 2020. We also found in 2018 that DOD was achieving cost savings and cost avoidances as it had begun using intergovernmental support agreements between military installations and local governments to obtain installation services, such as waste removal, grounds maintenance, and stray animal control. As a result of these and other actions, DOD now meets the action plan criterion for this high-risk area. As of December 2018, 23 recommendations related to this high-risk area remain open. DOD continues to partially meet the criteria for capacity, monitoring, and demonstrated progress. See page 158 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. DOD Financial Management: Since our 2017 High-Risk Report, ratings for the DOD Financial Management high-risk area improved for the criteria of leadership commitment and monitoring. For the leadership commitment criterion, the high-risk area rating improved from partially met to met in 2019 due to several DOD leadership actions. For example, in 2018, DOD leadership met the goal of undergoing an agency-wide financial statement audit and established a process to remediate any audit findings—ultimately to improve the quality of financial information that is most valuable in managing the department’s day-to-day operations. In addition, according to a DOD official, audit remediation efforts have produced benefits in certain inventory processes that have led to operational improvements. DOD leadership demonstrated its commitment to making needed improvements by developing a database that tracks hundreds of findings and recommendations that came out of the audits. In addition, senior leadership has been meeting bimonthly with military services’ leadership for updates on the status of corrective action plans to address audit findings and recommendations, and the Under Secretary of Defense (Comptroller) has been meeting frequently with the Secretary of Defense to review the plans. These same DOD actions also led to the high-risk area’s rating for the criterion of monitoring to improve from not met to partially met. For example, the database mentioned above is intended to capture, prioritize, and assign responsibility for auditor findings and related corrective action plans, which are meant to be used to measure progress towards achieving a clean audit opinion. Further, DOD leadership has held frequent meetings to discuss the status of corrective action plans. In addition, DOD also established councils in certain areas (e.g., financial reporting) to review the status of audit remediation activities and challenges. All of these actions demonstrate an improvement in DOD’s monitoring activities for its financial management function. However, DOD’s efforts to improve its financial management continue to be impaired by long-standing issues—including its decentralized environment; cultural resistance to change; lack of skilled financial management staff; ineffective processes, systems, and controls; incomplete corrective action plans; and the need for more effective monitoring and reporting. DOD remains one of the few federal entities that cannot accurately account for and report on its spending or assets. As of December 2018, 53 recommendations for this high-risk area are open. The DOD Financial Management high-risk area continues to partially meet the capacity and action plan criteria and not meet the demonstrated progress criterion. See page 147 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. DOD Business Systems Modernization: DOD spends billions of dollars each year to acquire modernized systems, including systems that address key areas such as personnel, financial management, health care, and logistics. This high-risk area includes three critical challenges facing DOD: (1) improving business system acquisition management, (2) improving business system investment management, and (3) leveraging DOD’s federated business enterprise architecture. DOD’s capacity for modernizing its business systems has improved over time and, since our 2017 High-Risk Report, DOD’s overall rating for the criterion of action plan improved from not met to partially met in 2019. DOD established a plan for improving its federated business enterprise architecture (i.e., description of DOD’s current and future business environment and a plan for transitioning to the future environment). Specifically, the rating improved for DOD’s federated business enterprise architecture segment of the high-risk area because DOD’s assistant deputy chief management officer approved a business architecture improvement plan in January 2017. Since 2017, we have made 10 recommendations related to this high-risk issue. As of December 2018, 27 recommendations are open. The leadership, capacity, monitoring, and demonstrated progress criteria remain partially met as in 2017. See page 152 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. DOE's Contract Management for the National Nuclear Security Administration and Office of Environmental Management: DOE oversees a broad range of programs related to nuclear security, science, energy, and waste cleanup, among other areas. As the largest civilian contracting agency in the federal government, DOE relies primarily on contractors to carry out its programs. For instance, DOE spends about 90 percent of its annual budget on contracts and acquiring capital assets. In fiscal year 2018, DOE’s budget was $34.5 billion. The high-risk area focuses on contracts, as well as major projects—those with an estimated cost of $750 million or greater—managed by DOE’s National Nuclear Security Administration (NNSA) and Office of Environmental Management (EM). Since our 2017 High-Risk Report, DOE has made progress by improving from a not met to a partially met rating for the demonstrated progress criterion. Specifically, through its Office of Cost Estimating and Program Evaluation, NNSA has enhanced its capability to estimate costs and schedules, and to assess alternatives for programs and projects, among other things. NNSA also made progress by adopting best practices in several areas, such as those for estimating costs and schedules in nuclear weapons refurbishment activities and capital asset acquisitions. For example, we determined that DOE’s revised cost estimate of $17.2 billion to construct a Mixed Oxide Fuel Fabrication Facility to dispose of surplus, weapons-grade plutonium substantially met best practices— providing assurance that the estimated costs could be considered reliable. This finding contributed to DOE’s reevaluation of the project and ultimate termination, in October 2018, in favor of a potentially less costly disposal approach. Fifty-one of our recommendations were open as of December 2018; 15 recommendations were made since the last high-risk update in February 2017. DOE continues to meet the criterion of leadership commitment, partially meet the criteria for action plan and monitoring, and not meet the criterion for capacity. See page 217 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Medicare Program & Improper Payments: In calendar year 2017, Medicare, which is overseen by the Centers for Medicare & Medicaid Services (CMS), financed $702 billion worth of health services for approximately 58 million elderly and disabled beneficiaries. Medicare faces a significant risk with improper payments—payments that either were made in an incorrect amount or should not have been made at all— which reached an estimated $48 billion in fiscal year 2018. Since our 2017 High-Risk Report, estimated improper payment rates declined more than one percent across the Medicare program. In addition, CMS’ rating for the capacity criterion of the improper payments segment improved from partially met to met in 2019 due to several actions. First, the Center for Program Integrity’s (CPI) budget and resources have increased over time and the agency has established work groups and interagency collaborations to extend its capacity. For example, CMS allocated more staff to CPI after Congress provided additional funding. CPI’s full-time equivalent positions increased from 177 in 2011 to 419 in 2017. Additionally, in August 2017, we reported that CMS’s Fraud Prevention System, which analyzes claims to identify health care providers with suspect billing patterns, helped speed up certain fraud investigation processes. Further, the Healthcare Fraud Prevention Partnership helped improve information sharing among payers inside and outside of the government. Since 1990, when we added Medicare to our High-Risk List, we have made many recommendations related to the Medicare program, 28 of which were made since the last high-risk update in February 2017. As of December 2018, more than 80 recommendations remain open. CMS continues to meet the criterion of leadership commitment and to partially meet the remaining three criteria of action plan, monitoring, and demonstrated progress. See page 241 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Congress enacted several laws since our last report in February 2017 to help make progress on high-risk issues. Table 3 lists selected examples of congressional actions taken on high-risk areas. Congressional oversight also plays a vital role in addressing high-risk issues. For example, at a May 2018 hearing, we testified that the Census Bureau’s (Bureau) cost estimate was not reliable, and that the actual cost could be higher than planned. Further, the Secretary of Commerce created a dedicated team to provide oversight and guidance to the Bureau on cost estimation. In addition to its instrumental role in supporting progress in individual high-risk areas, Congress also enacted the following statutes that, if implemented effectively, will help foster progress on high-risk issues government-wide: Fraud Reduction and Data Analytics Act of 2015 (FRDAA):FRDAA is intended to strengthen federal antifraud controls. OMFRDAA requires OMB to use our Fraud Risk Framework to create guidelines for federal agencies to identify and assess fraud risks, and then design and implement control activities to prevent, detect, and respond to fraud. Agencies, as part of their annual financial reports beginning in fiscal year 2017, are further required to report on their fraud risks and their implementation of fraud reduction strategies, which should help Congress monitor agencies’ progress in addressing and reducing fraud risks. To aid federal agencies in better analyzing fraud risks, FRDAA requires OMB to establish a working group tasked with developing a plan for creating an interagency library of data analytics and data sets to facilitate the detection of fraud and the recovery of improper payments. This working group and the library should help agencies coordinate their fraud detection efforts and improve their ability to use data analytics to monitor databases for potential improper payments. The billions of dollars in improper payments, some of which may be a result of fraud, are a central part of the Medicare Program, Medicaid Program, and Enforcement of Tax Laws (Earned Income Tax Credit) high-risk areas. We reported in 2018 that, among other things, OMB did not involve all agencies subject to the act as required by FRDAA or hold the required minimum number of working-group meetings in 2017. As shown in figure 2, a majority of the 72 agencies surveyed indicated a lack of involvement with and information from the working group as challenges in implementing FRDAA. We made three recommendations, including that OMB ensure the working group meets FRDAA’s requirements to involve all agencies that are subject to the act and ensure that mechanisms to share controls, best practices, and data-analytics techniques are in place. OMB did not concur with our recommendations. We continue to believe the recommendations are valid, as discussed in the 2018 report. IT Acquisition Reform, statutory provisions known as the Federal Information Technology Acquisition Reform Act (FITARA): FITARA, enacted in December 2014, was intended to improve how agencies acquire IT and better enable Congress to monitor agencies’ progress in reducing duplication and achieving cost savings. Since the enactment of these provisions, OMB and federal agencies have paid greater attention to IT acquisition and operation, resulting in improvements to the government-wide management of this significant annual investment. These efforts have been motivated in part by sustained congressional support for improving implementation of this law, as highlighted in agencies’ FITARA implementation scores issued biannually by the House Committee on Oversight and Reform. This continuing oversight has produced positive results. For example, in the committee’s December 2018 FITARA implementation scorecard, 18 of the 24 major federal agencies received the highest possible rating for their efforts to improve the management of software licenses, of which we have found there are thousands annually across the government. Seven months earlier, in the prior scorecard, only eight agencies had achieved this rating. Moreover, federal agencies have taken actions to address 106 of the 136 related recommendations that we have made in this area since 2014. FITARA includes specific requirements related to seven areas: the federal data center consolidation initiative, enhanced transparency and improved risk management, agency Chief Information Officer authority enhancements, portfolio review, expansion of training and use of IT acquisition cadres, government-wide software purchasing, and maximizing the benefit of the federal strategic sourcing initiative. In November 2017, Congress extended or removed the sunset dates of several of these statutory requirements that were originally to end in 2018 and 2019. While all of the 24 federal agencies covered by this law have developed FITARA implementation plans, the agencies need to effectively execute these plans. Successfully addressing FITARA requirements is central to making progress in Improving the Management of IT Acquisitions and Operations, which has been on our High-Risk List since 2015. Program Management Improvement Accountability Act (PMIAA): Enacted in December 2016, the act is intended to improve program and project management in certain larger federal agencies. Among other things, the act requires the Deputy Director for Management of OMB to adopt and oversee implementation of government-wide standards, policies, and guidelines for program and project management in executive agencies. The act also requires the Deputy Director to conduct portfolio reviews to address programs we identify as high-risk. It further creates a Program Management Policy Council to act as the principal interagency forum for improving practices related to program and project management. The council is to review programs identified as high-risk and make recommendations to the Deputy Director or designee. OMB has produced a general strategy for implementing the law through 2022 and met some initial milestones required by PMIAA. For example, in June 2018, OMB issued OMB Memorandum M- 18-19, which includes: (1) agency guidance for implementing PMIAA, (2) a five-year strategic outline for improving program and project management, and (3) initial program management standards and principles. Further, agencies have designated Program Management Improvement Officers to guide their implementation of PMIAA. According to OMB, it began implementing PMIAA’s requirement to conduct portfolio reviews on high-risk areas by requiring relevant agencies to provide several items for discussion during the 2018 Strategic Review meetings. These annual meetings are to consist primarily of a discussion of agency progress towards each of the strategic objectives outlined in their strategic plans, but also cover other management topics such as enterprise risk management and high-risk area progress. According to OMB documents, in advance of these meetings, OMB required agencies to provide a high-level summary of (1) any disagreements with our recommendations, (2) progress barriers, and (3) actions needed by OMB, other agencies, or Congress to help the agency achieve progress towards removal from our High-Risk List. OMB officials told us their 2018 Strategic Review meetings did not address each high-risk area but did address government-wide high-risk areas, such as cybersecurity, information technology, and strategic human capital as they related to the President’s Management Agenda. In the past, senior management officials from OMB, applicable agencies, and our agency have met to address areas where additional management attention could be beneficial to high-risk issues. These trilateral meetings, beginning in 2007 and pre- dating PMIAA’s 2016 enactment, have continued across administrations. However, OMB has organized only one of these high-risk meetings since the last high-risk update in 2017, on the Government-wide Personnel Security Clearance Process. In November 2018, OMB told us of plans to hold additional meetings on priority high-risk areas, including the 2020 Decennial Census, Strategic Human Capital Management, Ensuring the Cybersecurity of the Nation, National Aeronautics and Space Administration (NASA) Acquisition Management, and Managing Federal Real Property. Effective implementation of PMIAA provides an important opportunity to enhance progress on high-risk areas by focusing leadership attention through the portfolio reviews and trilateral meetings. Further, a number of high-risk areas have longstanding or significant program and project management concerns, including the acquisition-related high-risk areas for DOD, DOE, NASA, and VA. These and other programs can benefit from improving program and project management. In December 2019, we will report on OMB’s progress in implementing PMIAA, including what further steps it has taken to use the portfolio review process required in PMIAA to address issues on our High-Risk List. Agency leaders took actions to implement our recommendations. These resulted in numerous improvements to programs and operation and improved service. Further, these actions to implement our recommendations resulted in significant financial benefits. Table 4 shows some examples of the financial benefits achieved since our last High-Risk Report. In the 2 years since our last High-Risk Report, three areas—NASA Acquisition Management, Transforming EPA's Process for Assessing and Controlling Toxic Chemicals, and Limiting the Federal Government's Fiscal Exposure By Better Managing Climate Change Risks—have regressed in their ratings against our criteria for removal from the High- Risk List. In addition, while progress is needed across all high-risk areas, we have identified nine additional areas that require significant attention to address imminent, longstanding, or particularly broad issues affecting the nation. NASA plans to invest billions of dollars in the coming years to explore space, improve its understanding of the Earth’s environment, and conduct aeronautics research, among other things. We designated NASA’s acquisition management as high risk in 1990 in view of NASA’s history of persistent cost growth and schedule delays in the majority of its major projects. Following several years of continuing a generally positive trend of limiting cost growth and schedule delays for its portfolio of major projects, we found that NASA’s average launch delay increased from 7 to 12 months between May 2017 and May 2018. Further, the overall development cost growth increased from 15.6 percent to at least 18.8 percent over the same time period. NASA’s largest science project, the James Webb Space Telescope, has experienced schedule delays of 81 months and cost growth of 95 percent since the project’s cost and schedule baseline was first established in 2009. NASA is at risk for continued cost growth and schedule delays in its portfolio of major projects. Since our 2017 high-risk update, we have lowered NASA acquisition management from meeting the rating to partially meeting the rating in two criteria—leadership commitment and monitoring. The other three criteria ratings remained the same as in 2017. Ratings for capacity and demonstrated progress remain partially met and the rating for action plan remains met. Over the next several years, NASA plans to add new, large, and complex projects to the portfolio, including a lunar Gateway—currently being discussed as a platform in a lunar orbit to mature deep space exploration capabilities. In addition, many of NASA’s current major projects, including some of the most expensive ones, are in the phase of their life cycles when cost growth and schedule delays are most likely. NASA acquisition management requires significant attention for the following reasons: NASA leadership has approved risky programmatic decisions for complex major projects, which compounded technical challenges. For example, leadership has approved some programs to proceed (1) with low cost and schedule reserves, (2) with overly aggressive schedules, and (3) without following best practices for establishing reliable cost and schedule baselines. NASA leadership has also not been transparent about cost and schedule estimates for some of its most expensive projects. Without transparency into these estimates, both NASA and Congress have limited data to inform decision making. NASA has not yet instituted a program for monitoring and independently validating the effectiveness and sustainability of the corrective action measures in its new action plan, which NASA finalized in December 2018. In addition, while NASA has taken some steps to build capacity to help reduce acquisition risk, including updating tools aimed at improving cost and schedule estimates, other areas still require attention. For example, we reported in May 2018 that several major NASA projects experienced workforce challenges, including not having enough staff or staff with the right skills. NASA has also identified capability gaps in areas such as scheduling, earned value management, and cost estimating, and has efforts underway to try to improve capacity in these areas. Since 2017, we have made 9 recommendations on this high-risk area, and as of December 2018, 15 recommendations remain open. These recommendations include that NASA needs to improve transparency of major project cost and schedule estimates, especially for its human spaceflight programs, as well as continue to build capacity to reduce acquisition risk. NASA will also need to implement its new action plan and track progress against it. See page 222 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The Environmental Protection Agency’s (EPA’s) ability to effectively implement its mission of protecting public health and the environment is dependent on it assessing the risks posed by chemicals in a credible and timely manner. Such assessments are the cornerstone of scientifically sound environmental decisions, policies, and regulations under a variety of statutes. Based on our work since our 2017 High-Risk Report, the overall rating for leadership commitment decreased from met to partially met due to limited information for completing chemical assessments and proposed budget cuts in the Integrated Risk Information System (IRIS) Program. The ratings for the remaining four criteria remain unchanged and are partially met. The EPA Acting Administrator indicated his commitment to fulfill the agency’s obligations under the Toxic Substances Control Act (TSCA) as amended by the 2016 Frank R. Lautenberg Chemical Safety for the 21 Century Act (Lautenberg Act) and ensure chemicals in the marketplace are safe for human health and the environment. Nonetheless, EPA needs to give more attention to several areas to fully realize the benefits of the new law, and to demonstrate additional progress in the IRIS Program, such as: While EPA released a document in late December 2018 called the IRIS Program Outlook, the Outlook fails to list the projected date for most of the assessments and includes no information regarding assessment prioritization—including how these assessments will meet program and regional office needs. The Lautenberg Act increases both EPA’s responsibility for regulating chemicals and its workload. EPA recently issued a rule under the act to collect fees from certain companies to defray a portion of the implementation costs, but it is unclear whether the fees collected will be sufficient to support relevant parts of the program. EPA issued a First Year Implementation Plan in June 2016 noting that this document is intended to be a roadmap of major activities EPA will focus on during the initial year of implementation. As of mid-February 2019 the plan has not been updated, according to publically available information, although EPA had indicated that it is a living document that will be further developed over time. EPA needs to ensure that the people and resources dedicated to the IRIS Program and TSCA implementation are sufficient. Our March 2019 report on chemical assessments provides information on what remains to be done to address challenges in the IRIS program and implement the Lautenberg Act. Since we added this area to our High-Risk List in 2009, we have made 12 recommendations to EPA related to IRIS and TSCA. As of February 2019, seven recommendations remain open. See page 204 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Numerous studies have concluded that climate change poses risks to many environmental and economic systems and creates a significant fiscal risk to the federal government. The rising number of natural disasters and increasing reliance on the federal government for assistance is a key source of federal fiscal exposure. As of December 2018, total federal funding for disaster assistance since 2005 is approaching half a trillion dollars (about $430 billion), most recently for catastrophic hurricanes, flooding, wildfires, and other losses in 2017 and 2018. The costliness of disasters is projected to increase as extreme weather events become more frequent and intense due to climate change. There are five areas where government-wide action is needed to reduce federal fiscal exposure, including, but not limited to, the federal government’s role as (1) the insurer of property and crops; (2) the provider of disaster aid; (3) the owner or operator of infrastructure; (4) the leader of a strategic plan that coordinates federal efforts and informs state, local, and private-sector action; and (5) the provider of data and technical assistance to decision makers. Neither global efforts to mitigate climate change causes nor regional adaptation efforts currently approach the scales needed to avoid substantial damages to the U.S. economy, environment, and human health over the coming decades, according to the November 2018 Fourth National Climate Assessment. Government-wide action is needed to improve the nation’s resilience to natural hazards and reduce federal fiscal exposure to climate change impacts. Congress continues to show its commitment to progress on this high-risk issue by enacting legislation. For example, in October 2018, the Disaster Recovery Reform Act was enacted, which, among other things, allows the President to set aside, with respect to each major disaster, a percentage of certain grants to use for pre-disaster hazard mitigation. In addition, the National Defense Authorization Act of 2018, required, among other things, DOD to report on climate impacts to its installations. However, the federal government has not made measurable progress since 2017 to reduce its fiscal exposure to climate change, and in some cases, has revoked prior policies designed to do so. Specifically, since 2017, the ratings for four criteria remain unchanged—three at partially met and one at not met. The rating for one criterion—monitoring—regressed to not met. Limiting the federal government’s fiscal exposure to climate change requires significant attention because the federal government has revoked prior policies that had partially addressed this high-risk area and has not implemented several of our recommendations that could help reduce federal fiscal exposure. For example, since our 2017 high-risk update, the federal government: revoked Executive Order 13690, which had established a government-wide federal flood risk management standard to improve the resilience of communities and federal assets against the impacts of flooding. This action could increase federal fiscal exposure, as taxpayer-funded projects may not last as long as intended because they are not required to account for future changes in climate-related risk. rescinded its guidance directing agencies to consider climate change in their National Environmental Policy Act of 1969 reviews for certain types of federal projects. has not implemented our July 2015 recommendation to establish a comprehensive investment strategy identifying, prioritizing, and implementing federal disaster resilience investments that could reduce federal fiscal exposure to climate change. has not implemented our November 2015 recommendations to create a national climate information system providing authoritative, accessible information useful for state, local, and private-sector decision making. We have made 62 recommendations related to this high-risk area, 12 of which were made since our February 2017 high-risk update. As of December 2018, 25 remain open. The federal government needs a cohesive strategic approach with strong leadership and the authority to manage climate change risks across the entire range of federal activities. See page 110 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Federal agencies and the nation’s critical infrastructures—such as energy, transportation systems, communications, and financial services— are dependent on information technology systems to carry out operations. The security of these systems and the data they use is vital to public confidence and national security, prosperity, and well-being. The risks to systems underpinning the nation’s critical infrastructure are increasing as security threats evolve and become more sophisticated. We first designated information security as a government-wide high-risk area in 1997. This was expanded to include protecting cyber critical infrastructure in 2003 and protecting the privacy of personally identifiable information in 2015. In 2018, we updated this high-risk area to reflect the lack of a comprehensive cybersecurity strategy for the federal government. Since 2010, we have made over 3,000 recommendations to agencies aimed at addressing cybersecurity shortcomings, including protecting cyber critical infrastructure, managing the cybersecurity workforce, and responding to cybersecurity incidents. Of those 3,000 recommendations, 448 were made since our last high-risk update in February 2017. Although many recommendations have been addressed, about 700 have not yet been implemented. Despite the number of unimplemented recommendations, since our 2017 High-Risk Report, the administration has made progress in this high-risk area as it continues to meet the leadership commitment criterion through various actions. These include the President issuing (1) an executive order in May 2017 requiring federal agencies to take a variety of actions, including better managing their cybersecurity risks and coordinating to meet reporting requirements related to cybersecurity of federal networks and critical infrastructure and (2) a National Security Strategy in December 2017 citing cybersecurity as a national priority and identifying needed actions. Further, the administration issued a government-wide reform plan and reorganization recommendations in June 2018 with, among other things, proposals for solving the federal cybersecurity workforce shortage. Additionally, the administration released a National Cyber Strategy in September 2018 outlining activities such as securing critical infrastructure, federal networks, and associated information. However, additional actions are needed. We have identified four major cybersecurity challenges facing the nation: (1) establishing a comprehensive cybersecurity strategy and performing effective oversight, (2) securing federal systems and information, (3) protecting cyber critical infrastructure, and (4) protecting privacy and sensitive data. To address the four major cybersecurity challenges, we identified 10 critical actions the federal government and other entities need to take. These critical actions include, for example, developing and executing a more comprehensive federal strategy for national cybersecurity and global cyberspace; addressing cybersecurity workforce management challenges; and strengthening the federal role in protecting the cybersecurity of critical infrastructure (see figure 3). Until these shortcomings are addressed, federal agencies’ information and systems will be increasingly susceptible to the multitude of cyber- related threats that exist. See page 178 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The expanded federal role in housing finance that began during the 2007–2009 financial crisis has substantially increased the government’s exposure to potential mortgage losses. Federally supported mortgages include those backed by the Federal National Mortgage Association (Fannie Mae) and the Federal Home Loan Mortgage Corporation (Freddie Mac)—collectively, the enterprises—which the Federal Housing Finance Agency (FHFA) placed into government conservatorships in 2008. Federal support also occurs through Federal Housing Administration (FHA) mortgage insurance and Government National Mortgage Association (Ginnie Mae) guarantees on mortgage-backed securities. The substantial financial assistance the enterprises required during and after the crisis, coupled with the large fiscal exposure they and other federal mortgage entities represent today, underscore the need to reform the federal role in housing finance. Delay in resolving the federal role in housing finance poses considerable risks. Through the enterprises, FHA, and Ginnie Mae, the federal government is exposed to potential losses on several trillion dollars in mortgage debt. A severe economic downturn could trigger significant taxpayer assistance to one or more of these entities. Congress and federal agencies have taken some steps to facilitate the transition to a revised federal role, such as holding hearings, introducing legislation, issuing regulations, and developing market monitoring tools. For example, in 2013 and 2014, housing and regulatory agencies finalized rules designed to prevent a recurrence of risky practices in originating and securing mortgages that contributed to the financial crisis. Additionally, FHFA and the Consumer Financial Protection Bureau have developed a representative database of mortgage information that could be useful for examining the effect of mortgage market reforms. However, overall progress on resolving the federal role will be difficult to achieve until Congress provides further direction by enacting changes to the housing finance system. Several issues contribute to the risks facing federal housing finance, including the following: More than 10 years after entering federal conservatorships, the enterprises’ futures remain uncertain and billions of taxpayer dollars remain at risk. Under agreements with the Department of the Treasury (Treasury), the enterprises have received $191.4 billion in capital support as of the end of fiscal year 2018 and have paid dividends to the department exceeding that amount. If they were to incur major additional losses, they would draw required amounts from their remaining $254.1 billion in Treasury commitments. In addition, prolonged conservatorships could hinder development of the broader mortgage securities market by creating uncertainty and crowding out private investment. Nonbanks (lenders and loan servicers that are not depository institutions) have played an increasingly large role in the mortgage market in recent years. While nonbanks have helped provide access to mortgage credit, they also may pose additional risks, in part because they are not federally regulated for safety and soundness. However, FHFA lacks statutory authority to examine nonbank mortgage servicers and other third parties who do business with and pose potential risks to the enterprises. The statutory 2 percent capital requirement for FHA’s $1.26 trillion mortgage insurance fund is not based on a specified risk threshold, such as the economic conditions the fund would be expected to withstand. As a result, it may not provide an adequate financial cushion under scenarios in which Congress may anticipate the fund would be self-sufficient. During the last housing downturn, the fund’s capital ratio fell below the required level and remained there for 6 consecutive years. At the end of fiscal year 2013, the fund required supplemental funds—about $1.7 billion—for the first time in its history. Six of our federal housing recommendations remain open, including those we made in June 2015 on assessing the effects of mortgage reforms already in place. Further, as we previously recommended in November 2016 and January 2019, Congress should consider housing finance reform legislation that: establishes objectives for the future federal role in housing finance, including the role and structure of the enterprises within the housing finance system; provides a transition plan to a reformed system that enables the enterprises to exit federal conservatorship; and addresses all relevant federal entities, including FHA and Ginnie Mae. As we recommended in March 2016 and November 2017, respectively, Congress also should consider granting FHFA explicit authority to examine nonbank servicers and other third parties that do business with the enterprises, and specifying the economic conditions FHA’s insurance fund would be expected to withstand without a substantial risk of requiring supplemental funds. See page 95 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Due to the significance and risk associated with Resolving the Federal Role in Housing Finance, we are separating it from the high-risk area of Modernizing the U.S. Financial Regulatory System. These areas were combined in our 2017 High-Risk report. See page 95 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The Pension Benefit Guaranty Corporation (PBGC) is responsible for insuring the defined benefit pension plans for nearly 37 million American workers and retirees, who participate in about 24,800 private sector plans. PBGC faces an uncertain financial future due, in part, to a long- term decline in the number of traditional defined benefit plans and the collective financial risk of the many underfunded pension plans that PBGC insures. PBGC’s financial portfolio is one of the largest of all federal government corporations. While PBGC’s single employer program had a net surplus of about $2.4 billion at the end of fiscal year 2018, its multiemployer program had a net deficit of about $54 billion—or a combined net accumulated financial deficit of over $51 billion. Its deficit has increased by nearly 45 percent since fiscal year 2013. PBGC has estimated that, without additional funding, its multiemployer insurance program will likely be exhausted by 2025 as a result of current and projected pension plan insolvencies. The agency’s single-employer insurance program is also at risk due to the continuing decline of traditional defined benefit pension plans, as well as premiums that are not well aligned to the financial risk presented by the plans it insures. While Congress and PBGC have taken significant and positive steps to strengthen the agency in the past 5 years, challenges related to PBGC’s funding and governance structure remain. Congress established a temporary Joint Select Committee on multiemployer pension plans in 2018—with the goal of improving the solvency of the multiemployer program. However, the committee did not release draft legislation. Addressing the significant financial risk and governance challenges that PBGC faces will require additional congressional action. Over the years since we added PBGC to the High-Risk List, we have suggested a number of matters for congressional consideration, including: (1) authorizing a redesign of PBGC’s single employer program premium structure to better align premium rates with sponsor risk; (2) adopting additional changes to PBGC’s governance structure—in particular, expanding the composition of its board of directors; (3) strengthening funding requirements for plan sponsors as appropriate given national economic conditions; (4) working with PBGC to develop a strategy for funding PBGC claims over the long term as the defined benefit pension system continues to decline; and (5) enacting additional structural reforms to reinforce and stabilize the multiemployer system, and balance the needs and potential sacrifices of contributing employers, participants, and the federal government. Absent additional steps to improve PBGC’s finances, the long-term financial stability of the agency remains uncertain, and the retirement benefits of millions of American workers and retirees could be at risk of dramatic reductions. See page 267 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. VA operates one of the largest health care delivery systems in the nation through its Veterans Health Administration (VHA), with 172 medical centers and more than 1,000 outpatient facilities organized into regional networks. VA has faced a growing demand by veterans for its health care services—due, in part, to the needs of an aging veteran population—and that trend is expected to continue. The total number of veterans enrolled in VA’s health care system rose from 7.9 million to more than 9 million from fiscal year 2006 through fiscal year 2017. Over that same period, VHA’s total budgetary resources have more than doubled, from $37.8 billion in fiscal year 2006 to $92.3 billion in fiscal year 2017. Given the importance of VHA’s mission, coupled with its lack of progress in addressing its high-risk designation, we continue to be concerned about VHA’s ability to ensure its resources are being used effectively and efficiently to improve veterans’ timely access to safe and high-quality health care. We have identified five areas of concern: (1) ambiguous policies and inconsistent processes; (2) inadequate oversight and accountability; (3) IT challenges; (4) inadequate training for VA staff; and (5) unclear resource needs and allocation priorities. VHA has begun to address each of these areas but, prior to Secretary Robert Wilkie’s July 2018 confirmation, its efforts were impeded by leadership instability. Since taking office, Secretary Wilkie has demonstrated his commitment to addressing the department’s high-risk designation by, among other things, creating an office to direct an integrated, focused high-risk approach and communicating to VA leaders the importance of addressing our recommendations. While VHA completed root cause analyses for each area of concern and developed an action plan in response, the plan lacks milestones and metrics needed to effectively monitor its implementation and demonstrate progress made in addressing the high-risk designation. Additionally, many of VHA’s capacity-building initiatives are either in the initial stages of development or are lacking necessary funding and resources. As such, VHA has not made sufficient progress since our 2017 update to improve its overall ratings, as two high-risk criteria remain partially met and three criteria remain unmet. We remain concerned about VHA’s ability to oversee its programs, hold its workforce accountable, and avoid ambiguous policies and inconsistent processes that jeopardize its ability to provide safe, high-quality care to veterans: In November 2017, we reported that, due in part to misinterpretation or lack of awareness of VHA policy, VA medical center officials did not always document or conduct timely required reviews of providers when allegations were made against them. As a result, we concluded that VA medical center officials may have lacked necessary information to reasonably ensure that their providers were competent to provide safe, high-quality care to veterans and to grant approvals about these providers’ privileges to perform specific clinical services at VA medical centers. We made four recommendations related to this and other findings, all of which remain open. In June 2018, we reported that VHA could not systematically monitor the timeliness of veterans’ access to Veterans Choice Program (VCP) care because it lacked complete, reliable data to do so. We also found that veterans, who were referred to the VCP for routine care because health care services were not available in a timely manner, could potentially wait for care up to 70 calendar days if the maximum amount of time allowed by VA processes is used. This wait time exceeds the statutory requirement that veterans receive VCP care within 30 days of the dates their VA health care providers indicated they should receive appointments, or if no such date existed, within 30 days of the veteran’s preferred date. We made 10 recommendations related to this and other findings, all of which remain open. Similarly, in July 2018, we reported that VA collected data related to employee misconduct and disciplinary actions, but data fragmentation and reliability issues impeded department-wide analysis of those data. Additionally, we found that VA did not consistently ensure that allegations of misconduct involving senior officials were reviewed according to its investigative standards or ensure these officials were held accountable. We made 16 recommendations related to this and other findings, all of which remain open. In November 2018, we reported that VHA’s suicide prevention media outreach activities declined in recent years due to leadership turnover and reorganization. Additionally, we found that VHA did not assign key leadership responsibilities or establish clear lines of reporting for its suicide prevention media outreach campaign, which hindered its ability to oversee the campaign. Consequently, we concluded that VHA may not be maximizing its reach with suicide prevention media content to veterans, especially those who are at-risk. This is inconsistent with VHA’s efforts to reduce veteran suicides, which is VA’s highest clinical priority. We made two recommendations related to this and other findings, both of which remain open. VA needs to further develop its capacity-building initiatives and establish metrics to monitor and measure its progress addressing the high-risk areas of concern. It is also important that our recommendations continue to be implemented. The department has implemented 209 of the 353 recommendations related to VA health care that we made from January 1, 2010 through December 2018, but more than 125 recommendations remain open as of December 2018. This includes 17 that are older than 3 years. In addition to addressing our recommendations, VA needs to make systemic change to department management and oversight in order to fully address the high-risk issues and improve the health care provided to our nation’s veterans. See page 275 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Mission-critical skills gaps both within federal agencies and across the federal workforce impede the government from cost-effectively serving the public and achieving results. For example, the difficulties in recruiting and retaining skilled health care providers and human resource staff at VHA’s medical centers make it difficult to meet the health care needs of more than 9 million veterans. As a result, VHA’s 168 medical centers have large staffing shortages, including physicians, registered nurses, physician assistants, psychologists, physical therapists, as well as human resource specialists and assistants. OPM continues to demonstrate top leadership commitment through its numerous efforts to assist agencies’ in addressing mission-critical skills gaps within their workforces. This includes providing guidance, training and on-going support for agencies on the use of comprehensive data analytic methods for identifying skills gaps and the development of strategies to address these gaps. However, since we first added strategic human capital management to our High-Risk List in 2001, we have reported on the need for agencies to address their workforce skills gaps. As of December 2018, OPM had not fully implemented 29 of our recommendations made since 2012 relating to this high-risk area. Staffing shortages and the lack of skills among current staff not only affect individual agencies but also cut across the entire federal workforce in areas such as cybersecurity and acquisition management. Skills gaps caused by insufficient number of staff, inadequate workforce planning, and a lack of training in critical skills are contributing to our designating other areas as high-risk. As table 5 shows, of the 34 other high-risk areas covered in this report, skills gaps played a significant role in 16 of the areas. Over the years since we added this area to our High-Risk List, in addition to recommendations to address critical skills gaps in individual high-risk areas, we have made numerous recommendations to OPM related to this high-risk issue, 29 of which remain open. Agencies also need to take action to address mission-critical skills gaps within their own workforces – a root cause of many high-risk areas. See page 75 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The 2010 Census was the costliest in history at about $12.3 billion; as of October 2017, the 2020 Census is projected to cost about $15.6 billion, a 27 percent increase. For the 2020 Census, the U.S. Census Bureau (Bureau) plans to implement several innovations, including new IT systems. Implementing these innovations, along with other challenges, puts the Bureau’s ability to conduct a cost-effective census at risk. The decennial census is mandated by the U.S. Constitution and provides vital data for the nation. Census data are used, among other purposes, to apportion seats in the Congress and allocate billions of dollars in federal assistance to state and local governments. To ensure its success, this complicated and costly undertaking requires careful planning, risk management, and oversight. Census activities, some of which are new for the 2020 cycle, must be carried out on schedule to deliver the state apportionment counts to the President by December 31, 2020. The Bureau and the Department of Commerce (Commerce) have strengthened leadership commitment with executive-level oversight of the 2020 Census by holding regular meetings on the status of IT systems and other risk areas. In addition, in 2017 Commerce designated a team to assist senior Bureau management with cost estimation challenges. These examples demonstrate both the Bureau’s and Commerce’s strong leadership commitment to implementing the 2020 Census. One of the Bureau’s major challenges is to control any further cost growth and develop cost estimates that are reliable and reflect best practices for the 2020 Census. According to the Bureau, the total cost of the 2020 Census is now estimated to be approximately $15.6 billion, more than $3 billion higher than previously estimated by the Bureau. The higher estimated life-cycle cost is due, in part, to the Bureau’s failure to previously include all cost associated with the decennial census. The Bureau’s schedule for developing IT systems has experienced delays that have compressed the time available for system testing, integration testing, and security assessments. These schedule delays have contributed to systems experiencing problems after deployment, as well as cybersecurity challenges. For example, as of December 2018, the Bureau had identified nearly 1,100 system security weaknesses that needed to be addressed. Continued schedule management challenges may compress the time available for the remaining system testing and security assessments, and increase the risk that deployed systems will either not function as intended, have security vulnerabilities, or both. As of January 2019, 30 of our recommendations related to this high-risk area had not been implemented. To make continued progress, the Bureau needs to ensure that its approach to strategic planning, IT management, cybersecurity, human capital management, internal collaboration, knowledge sharing, as well as risk and change management are all aligned toward delivering more cost-effective outcomes. Among other things, the Bureau needs to ensure cost growth is controlled and that the development and testing of key systems is completed and fully integrated with all census operations before the 2020 Census. In addition, the Bureau needs to address cybersecurity weaknesses in a timely manner and ensure that security risks are at an acceptable level before systems are deployed. See page 134 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. An improper payment is any payment that should not have been made or that was made in an incorrect amount (including overpayments and underpayments) under statutory, contractual, administrative, or other legally applicable requirements. Reducing improper payments—such as payments to ineligible recipients or duplicate payments—is critical to safeguarding federal funds. However, the federal government has consistently been unable to determine the full extent of improper payments and reasonably assure that appropriate actions are taken to reduce them. Since 2003—when certain agencies were required by statute to begin reporting improper payments—cumulative improper payment estimates have totaled about $1.5 trillion. As shown in figure 4, for fiscal year 2018, federal entities estimated about $151 billion in improper payments. Medicare and Medicaid improper payments and the Earned Income Tax Credit (EITC) improper payments—a part of the Enforcement of Tax Laws high-risk area—accounted for about 68.5 percent of this total. Federal spending for Medicare programs and Medicaid is expected to significantly increase in the coming years, so it is especially critical to take appropriate measures to reduce improper payments in these programs. Internal Revenue Service estimates also show that the EITC has consistently had a high improper payment rate. OMB has designated Medicare programs, Medicaid, and EITC as high-priority programs for improper payments, indicating they are amongst the highest-risk programs where the government can achieve the greatest return on investment for the taxpayer by ensuring that improper payments are eliminated. Our work has identified a number of strategic and specific actions agencies can take to reduce improper payments, which could yield significant savings, and help ensure that taxpayer funds are adequately safeguarded. Continued agency attention is needed to (1) identify susceptible programs, (2) develop reliable methodologies for estimating improper payments, (3) report as required by statute, and (4) implement effective corrective actions based on root cause analysis. Absent such continued efforts, the federal government cannot be assured that taxpayer funds are adequately safeguarded. See pages 241, 250, and 235 of the report (respectively) for additional detail on the Medicare Program & Improper Payments, Strengthening Medicaid Program Integrity, and Enforcement of Tax Laws high-risk areas, including more details on actions that need to be taken. The Internal Revenue Service (IRS) continues to face two pressing challenges in enforcing tax laws: addressing the tax gap—amounting to hundreds of billions of dollars each year when some taxpayers fail to pay the taxes that they owe—and combatting identity theft (IDT) refund fraud. Enforcement of Tax Laws has been on GAO’s high risk list since 1990. IRS enforcement of tax laws helps fund the U.S. government by collecting revenue from noncompliant taxpayers and, perhaps more importantly, promoting voluntary compliance by giving taxpayers confidence that others are paying their fair share. In 2016, IRS estimated that the average annual net tax gap, the difference between taxes owed and taxes paid on time, was $406 billion, on average, for tax years 2008-2010. While IRS continues to demonstrate top leadership support to address the tax gap, IRS’s capacity to implement new initiatives and improve ongoing enforcement and taxpayer service programs remains a challenge. For example, IRS’s strategic plan includes a goal to facilitate voluntary compliance and deter noncompliance that could address the tax gap. However, IRS could do more to identify specific efforts for improving compliance in its strategic plan, measure the effects of compliance programs—such as those used for large partnerships—and develop specific quantitative goals to reduce the tax gap. Such efforts would help IRS make more effective use of its resources and gauge the success of its strategies. The second challenge facing IRS is IDT refund fraud, which occurs when an identity thief files a fraudulent tax return using a legitimate taxpayer’s identifying information and claims a refund. IRS estimates that at least $12.2 billion in individual IDT tax refund fraud was attempted in 2016, of which it prevented at least $10.5 billion (86 percent). Of the amount attempted, IRS estimated that at least $1.6 billion (14 percent) was paid. IRS’s ability to combat IDT fraud continues to be challenged as more personally identifiable information has become readily available as a result of large-scale cyberattacks on various entities. This makes it more difficult for IRS to distinguish between fraudsters and legitimate taxpayers. While IRS has demonstrated some progress by developing tools and programs to further detect and prevent IDT refund fraud, it has not completed updating its authentication procedures to be in compliance with new government standards. As a result, IRS may be missing an opportunity to implement the most secure, robust technologies to protect taxpayers. As of December 2018, 189 GAO recommendations related to this high- risk area had not been implemented. To make continued progress on closing the tax gap, IRS needs to re-establish goals for improving voluntary compliance and develop and document a strategy that outlines how it will use its data to help address this issue. Reducing the tax gap will also require targeted legislative actions, including additional third- party information reporting, enhanced electronic filing, expanded math error authority (also referred to as correctible error authority), and paid preparer regulation. To help stay on top of IDT refund fraud, IRS should develop a comprehensive process to evaluate alternative options for improving taxpayer authentication. Given that IDT refund fraud continues to be a challenge, targeted legislative action, such as requiring a scannable code on returns prepared electronically but filed on paper could help IRS address such fraud. See page 235 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The federal government currently invests more than $90 billion annually in IT, and OMB has implemented several key initiatives intended to help better manage this investment. Additionally, enactment of FITARA, in conjunction with greater attention paid to the acquisition and operation of IT, has helped further improve the government-wide management of this significant annual investment. OMB’s current level of top leadership support and commitment to ensure that agencies successfully execute its guidance on implementing FITARA and related IT initiatives has helped this high-risk area meet the leadership commitment high-risk criteria. Additional positive government-wide actions have enabled this high-risk area to partially meet the four remaining high-risk criteria. For example, OMB has established an IT Dashboard—a public website that provides detailed information on major IT investments at 26 federal agencies—and agencies’ data center consolidation efforts have resulted in a total savings of slightly more than 80 percent of the agencies’ planned $5.7 billion in savings since 2011. However, major federal agencies have yet to fully address the requirements of FITARA and realize billions of dollars in planned or possible savings and improved government performance through more efficient budgeting and management of IT. As government-wide spending on IT increases every year, the need for appropriate stewardship of that investment increases as well. However, OMB and federal agencies have not made significant progress since 2017 in taking the steps needed to improve how these financial resources are budgeted and utilized. While OMB has continued to demonstrate its leadership commitment through guidance and sponsorship of key initiatives, agencies still have not fully implemented all requirements of FITARA, such as putting into place authorities the law requires for chief information officers (CIO). Additionally, while the President’s Management Agenda has a goal to improve IT spending transparency, agencies are underreporting IT contract obligations by billions of dollars. OMB and the agencies also have not yet implemented hundreds of our recommendations on improving shortcomings in IT acquisitions and operations. In an August 2018 review of the 24 federal agencies covered by FITARA, none had IT management policies that fully addressed the role of their CIOs consistent with federal laws and guidance. Specifically, the majority of the agencies only minimally addressed, or did not address, their CIO’s role in assessing agency IT workforce needs and developing strategies and plans for meeting those needs. Correspondingly, the majority of the 24 CIOs acknowledged that they were not fully effective at implementing IT management responsibilities, such as IT strategic planning and investment management. Further, in January 2018, we reported that the majority of 22 agencies did not identify all of their IT acquisition contracts, totaling about $4.5 billion in IT-related contract obligations beyond those reported by agencies. In addition, in November 2018 we reported that four selected agencies lacked quality assurance processes for ensuring that billions of dollars requested in their IT budgets were informed by reliable cost information. Until agencies properly identify IT contracts and establish processes for ensuring the quality of cost data used to inform their budgets, agency CIOs are at risk of not having appropriate oversight of IT acquisitions and may lack adequate transparency into IT spending to make informed budget decisions. As of December 2018, OMB and federal agencies had fully implemented only 59 percent of the recommendations we have made since fiscal year 2010 to address shortcomings in IT acquisitions and operations. OMB and agencies should work toward implementing our remaining 456 open recommendations related to this high-risk area. These remaining recommendations include 12 priority recommendations to agencies to, among other things, report all data center consolidation cost savings to OMB, plan to modernize or replace obsolete systems as needed, and improve their implementation of PortfolioStat—an initiative that is to consolidate and eliminate duplicative systems. OMB and agencies need to take additional actions to (1) implement at least 80 percent of our open recommendations related to the management of IT acquisitions and operations, (2) ensure that a minimum of 80 percent of the government’s major IT acquisitions deliver functionality every 12 months, and (3) achieve at least 80 percent of the over $6 billion in planned PortfolioStat savings. See page 123 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Our high-risk program continues to be a top priority at GAO and we will maintain our emphasis on identifying high-risk issues across government and on providing recommendations and sustained attention to help address them, by working collaboratively with Congress, agency leaders, and OMB. As part of this effort, we hope to continue to participate in regular meetings with the OMB Deputy Director for Management and with top agency leaders to discuss progress in addressing high-risk areas. Such efforts have been critical for the progress that has been made. This high-risk update is intended to help inform the oversight agenda for the 116th Congress and to guide efforts of the administration and agencies to improve government performance and reduce waste and risks. Thank you, Chairman Cummings, Ranking Member Jordan, and Members of the Committee. This concludes my testimony. I would be pleased to answer any questions. For further information on this testimony, please contact J. Christopher Mihm at (202) 512-6806 or MihmJ@gao.gov. Contact points for the individual high-risk areas are listed in the report and on our high-risk website. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. The following pages provide overviews of the two areas removed from the High-Risk List. Each overview discusses (1) why the area was high risk, and (2) why the area is being removed from the list. Each of these high- risk areas is also described on our High-Risk List website, http://www.gao.gov/highrisk/overview. Since our 2017 High-Risk Report, DOD has continued to meet the criteria of leadership commitment, capacity, and action plan for asset visibility. Further, DOD has fully addressed the three remaining actions and outcomes we outlined in 2017 in order to mitigate or resolve long-standing weaknesses in asset visibility. Consequently, DOD has met the monitoring and demonstrated progress criteria for asset visibility to remove this area from our High-Risk List. Leadership commitment: met. Senior leaders have continued to demonstrate commitment through their involvement in groups such as the Supply Chain Executive Steering Committee—senior-level officials responsible for overseeing asset visibility improvement efforts—and through the Asset Visibility Working Group, which identifies opportunities for improvement and monitors the implementation of initiatives by issuing its Strategy for Improving DOD Asset Visibility (Strategy) in 2014, 2015, and 2017. Capacity: met. DOD continues to demonstrate that it has the capacity— personnel and resources—to improve asset visibility. For example, DOD’s 2015 and 2017 Strategies advise the components to consider items such as staffing, materiel, and sustainment costs when documenting cost estimates for the initiatives in the Strategy, as we recommended in January 2015. Action plan: met. A provision in the National Defense Authorization Act for Fiscal Year 2014 required DOD to submit to Congress a comprehensive strategy and implementation plans for improving asset tracking and in-transit visibility. In January 2014, DOD issued the Strategy and accompanying implementation plans, which outlined initiatives intended to improve asset visibility. DOD updated its 2014 Strategy in October 2015 and in August 2017. Importantly, since 2017 DOD addressed the three remaining actions and outcomes related to the monitoring and demonstrated progress criteria through updates to and implementation of the Strategies (see table 6). Monitoring: met. DOD provided guidance in its 2017 update to the Strategy for the military components to consider key attributes of successful performance measures during metric development for their improvement initiatives. As appropriate, the military components have followed the guidance and provided high-level summary metrics updates to the Asset Visibility Working Group. In addition, DOD has taken steps to monitor asset visibility by incorporating into after-action reports, as appropriate, information relating to performance measures. These after- action reports serve as closure documents and permanent records of each initiative’s accomplishments. Demonstrated progress: met. DOD has demonstrated sustained progress by completing 34 of the 39 initiatives to improve asset visibility and continues to monitor the remaining 5 initiatives. These initiatives have supported DOD’s goals and objectives, which include: (1) improving visibility efficiencies of physical inventories, receipt processing, cargo tracking, and unit moves; (2) ensuring asset visibility data are discoverable, accessible, and understandable to support informed decision-making across the enterprise; and (3) increasing efficiencies for delivery accuracy and cycle times. Also, the Asset Visibility Working Group meets regularly to identify opportunities to further improve asset visibility within DOD. DOD has taken the following actions to demonstrate sustained progress: (1) created an integrated single portal system providing 7,500 users access to near-real-time, in-transit visibility of eight million lines of items of supply and transportation data; and (2) increased its visibility of assets through radio-frequency identification (RFID), an automated data-capture technology that can be used to electronically identify, track, and store information contained on a tag. There are two main types of RFID tags, passive and active, which show whether assets are in-storage, in-transit, in-process, or in-use. Passive tags, such as mass transit passes, do not contain their own power source and cannot initiate communication with a reader; while active tags, such as an “E-Z pass,” contain a power source and a transmitter, and send a continuous signal over longer distances. DOD closed nine initiatives from its Strategies by implementing RFID technology. For example, the Marine Corps implemented long-range passive RFID for visibility and accountability of items, resulting in improvements that include an increased range for “reading” an item— from 30 feet to 240 feet—and reduced inventory cycle times from 12 days to 10 hours. Also, the Navy reported that the use of passive RFID technology to support the overhaul of its nuclear-powered attack submarines enabled the Navy to better track parts, resulting in 98 percent fewer missing components and an average cost avoidance of $1.3 million per boat. Additionally, according to DOD, the use of RFID tags to provide visibility of sustainment cargo at the tactical leg resulted in $1.4 million annual cost savings. Further, DOD reported that the migration of the active RFID enterprise from a proprietary communication standard to a competitive multivendor environment reduced the cost of active RFID tags by half, resulting in an estimated $5.7 million annual reduction in costs. Since our 2017 High-Risk Report, DOD has continued to meet the criteria of leadership commitment, capacity, and action plan for materiel distribution. Further, DOD has fully addressed the four remaining actions and outcomes we outlined in 2017 in order to mitigate or resolve long-standing weaknesses in materiel distribution. Consequently, DOD has met the monitoring and demonstrated progress criteria for materiel distribution to remove this area from our High-Risk List. Leadership commitment: met. Senior leaders continue to demonstrate commitment through their involvement in groups such as the Supply Chain Executive Steering Committee—senior-level officials responsible for overseeing materiel distribution corrective actions—and through the Distribution Working Group, which helped develop the Materiel Distribution Improvement Plan (Improvement Plan) in 2016. Capacity: met. DOD has continued to demonstrate that it has the personnel and resources, such as key organizations and the associated governance structure, to improve materiel distribution. The Improvement Plan recognizes that additional resources will be required to accomplish its corrective actions and close any identified performance gaps within the time frame specified. Action plan: met. In 2016, DOD developed its corrective action plan to address the department’s materiel distribution challenges. The Improvement Plan details specific goals and actions to better measure the end-to-end distribution process, ensure the accuracy of underlying data, and strengthen and integrate distribution policies and the governance structure. Importantly, since 2017, DOD has fully addressed the four remaining actions and outcomes related to monitoring and demonstrated progress to mitigate or resolve long-standing weaknesses in materiel distribution (see table 7). Monitoring: met. DOD has monitored materiel distribution by making progress in developing its suite of distribution performance metrics, improving the quality of their underlying data, and sharing metrics information with stakeholders. For example, in January 2017, DOD developed a suite of performance metrics that provides a comprehensive picture of the distribution process, including whether supplies are delivered on time and at sufficient quantity and quality. Also, DOD implemented checklists to assess the quality of data underlying each performance metric based on relevance, accuracy, comparability, and interpretability. The checklists and their standards assist in identifying root causes and addressing areas where performance data quality may be lacking. DOD has also incorporated internal control requirements in its supply chain management guidance to increase confidence in the performance data. Additionally, DOD has revised its policy documents to require stakeholders to routinely capture and share distribution performance metrics, including cost data, and the department maintains websites to provide current performance information to distribution stakeholders. DOD has also incorporated distribution metrics, as appropriate, on the performance of all legs of the distribution system, including the tactical leg (i.e., the last segment of the distribution system). We previously reported on DOD’s deficiencies to accurately assess its distribution performance at the tactical leg, such as missing delivery dates for shipments in Afghanistan. Since that time, the geographic combatant commands have been tracking metrics at the tactical leg, including required delivery dates, to determine the movement and causes of delays for shipments, and have been sharing distribution performance information with the U.S. Transportation Command (TRANSCOM) through their deployment and distribution operations centers. DOD is implementing a cost framework to incorporate transportation costs for all legs of the distribution system, which will provide an additional metric for distribution stakeholders to assess the efficiency of the system. The first phase of the cost framework began operating in August 2018 and is expected to be fully implemented in 2019. DOD is making progress in refining its Improvement Plan and is incorporating additional actions based on interim progress and results. Since DOD issued the Improvement Plan in September 2016, the agency has (1) documented the results and monitored the status of each corrective action, (2) revised completion dates as needed, and (3) periodically provided decision makers with summary action charts, plans, and milestones. DOD is also updating its instruction on management and oversight of the distribution enterprise to clarify the roles and responsibilities of all distribution stakeholders. DOD officials have not determined a date for when this instruction will be issued. Demonstrated progress: met. DOD has demonstrated sustained progress in improving its capability to comprehensively measure distribution performance, identify distribution problems and root causes, and implement solutions. DOD has implemented 10 of 18 corrective actions in its Improvement Plan and is on track to implement the remaining 8 by September 2019. Because of this progress, DOD’s monthly shipment reports have assessed performance against enhanced metrics across the distribution system. For example, in December 2017, TRANSCOM investigated performance standards for truck deliveries from its Defense Logistics Agency warehouses in Bahrain to customers in Kuwait due to frequent delays in shipments. TRANSCOM determined that inadequate time for clearing customs in Kuwait resulted in an unrealistic delivery standard. TRANSCOM, in coordination with distribution stakeholders, adjusted the delivery standard to adequately account for the in-theater customs process. In addition, TRANSCOM, in partnership with the Defense Logistics Agency and the General Services Administration, developed and implemented initiatives focused on distribution process and operational improvements to reduce costs and improve distribution services to the warfighter. According to DOD, these efforts have resulted in at least $1.56 billion in distribution cost avoidances to date. DOD has demonstrated commendable, sustained progress improving its supply chain management. This does not mean DOD has addressed all risk within this area. It remains imperative that senior leaders continue their efforts to implement initiatives and corrective actions to maintain visibility of supplies, track cargo movements, meet delivery standards, and maintain delivery data for shipments. Continued oversight and attention are also warranted given the recent reorganization of the Office of the Under Secretary of Defense for Acquisition and Sustainment and the resulting change in the oversight structure of Supply Chain Management. We will therefore continue to conduct oversight of supply chain management at DOD. Defense Logistics: Improved Performance Measures and Information Needed for Assessing Asset Visibility Initiatives. GAO-17-183. Washington, D.C.: Mar. 16, 2017. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine its Asset Visibility Strategy. GAO-16-88. Washington, D.C.: Dec. 22, 2015. Defense Logistics: Improvements Needed to Accurately Assess the Performance of DOD’s Materiel Distribution Pipeline. GAO-15-226. Washington, D.C.: Feb. 26, 2015. Since our last high-risk update in 2017, NOAA continues to meet the criteria of leadership commitment, capacity, and monitoring and now also meets the criteria of action plan and demonstrated progress. Leadership commitment: met. NOAA program officials met the leadership commitment criteria in 2015 and have continued to sustain their strong leadership commitment to mitigating potential satellite data gaps since that time. For example, NOAA issued and frequently updated its polar satellite gap mitigation plan, which identifies the specific technical, programmatic, and management steps the agency is taking to ensure that satellite mitigation options are viable. In addition, NOAA executives continue to oversee the acquisition of polar-orbiting satellites through monthly briefings on the cost, schedule, and risks affecting the satellites’ development. Capacity: met. NOAA continues to meet the criterion of improving its capacity to address the risk of a satellite data gap. In December 2014, we recommended that NOAA investigate ways to prioritize the gap mitigation projects with the greatest potential benefit to weather forecasting, such as by improving its high-performance computing capacity. NOAA agreed with this recommendation and implemented it. For example, NOAA upgraded its high-performance computers, which allowed the agency to move forward on multiple other mitigation activities, including experimenting with other data sources and assimilating these data into its weather models. Action plan: met. NOAA now meets the criterion for having a plan to address the risk of a polar satellite data gap, which is an increase over its rating in 2017. In June 2012, we reported that, while NOAA officials communicated publicly and often about the risk of a polar satellite data gap, the agency had not established plans to mitigate the gap. We recommended that NOAA establish a gap mitigation plan, and the agency did so in February 2014. However, in December 2014, we recommended that NOAA revise its plan to address shortfalls, including (1) adding recovery time objectives for key products, (2) identifying opportunities for accelerating the calibration and validation of satellite data products, (3) providing an assessment of available alternatives based on their costs and impacts, and (4) establishing a schedule with meaningful timelines and linkages among mitigation activities. mitigation plan between January 2016 and February 2017. With the last of the updates, the agency addressed the shortfalls we had identified. Monitoring: met. NOAA met this criterion in 2017, and continues to meet it now, by implementing our recommendations to more consistently and comprehensively monitor its progress on gap mitigation activities. For example, all three NOAA organizations responsible for gap mitigation projects regularly brief senior management on their progress. Demonstrated progress: met. NOAA now meets the criterion for demonstrated progress, which is an increase over its prior rating. In our 2017 High-Risk Report, we noted that NOAA had identified 35 different gap mitigation projects and was making progress in implementing them. These projects fell into three general categories: (1) understanding the likelihood and impact of a gap, (2) reducing the likelihood of a gap, and (3) reducing the impact of a gap. Nevertheless, one of the most important steps in reducing the likelihood of a gap—keeping the launch of the next polar satellite on schedule—had encountered problems. Specifically, agency officials decided to delay the launch due to challenges in developing the ground system and a critical instrument on the spacecraft. This delay exacerbated the probability of a satellite data gap. More recently, however, NOAA was able to demonstrate progress by successfully launching the satellite in November 2017. That satellite, now called NOAA-20, is currently operational and is being used to provide advanced weather data and forecasts. Moreover, the agency is also working to build and launch the next satellites in the polar satellite program. Since our last high-risk update in 2017, DOD now meets all five high-risk criteria. Leadership commitment: met. With strong congressional oversight, DOD now meets this criterion. Pursuant to enactment of the Carl Levin and Howard P. ’Buck’ McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA for FY 2015), the National Defense Authorization Act for Fiscal Year 2016 (NDAA for FY 2016), and the Consolidated Appropriations Act, 2016, DOD leadership committed to developing and implementing plans to address its weather satellite requirements. For example, in late 2017, the department awarded a contract for its Weather System Follow-on— Microwave satellite to fulfill core weather requirements. Capacity: met. With strong congressional oversight, DOD now meets the capacity criterion. Specifically, the NDAA for FY 2015 restricted the availability of 50 percent of the FY 2015 funds authorized for the Weather Satellite Follow-on System (now called the Weather System Follow-on— Microwave satellite program) until DOD submitted to the congressional defense committees a plan to meet weather monitoring data collection requirements. In addition, the explanatory statement that accompanied the Consolidated Appropriations Act, 2016, recommended that the Air Force focus on ensuring that the next generation of weather satellites meet the full spectrum of requirements and work with civil stakeholders to leverage appropriate civil or international weather assets. As called for in the law and the explanatory statement, DOD established plans to meet weather monitoring data collection needs, including by acquiring satellites as part of a family of systems to replace its aging legacy weather satellites. Additionally, DOD formally coordinated with NOAA on weather monitoring data collection efforts. In January 2017, the Air Force and NOAA signed a memorandum of agreement, and in November 2017, signed an annex to that agreement, to allow for the exchange of information and collaboration on a plan for collecting weather monitoring data. The Air Force and NOAA are now developing plans to relocate a residual NOAA satellite over the Indian Ocean, an area of concern for cloud characterization and area-specific weather imagery coverage. Action plan: met. In our 2017 High-Risk Report, we reported that DOD was slow to establish plans for its Weather System Follow-on–Microwave program and had made little progress in determining how it would meet weather satellite requirements for cloud characterization and area-specific weather imagery. Pursuant to the NDAA for FY 2015, the NDAA for FY 2016, and the explanatory statement that accompanied the Consolidated Appropriations Act, 2016, the department developed and began implementing plans to address its weather satellite requirements. As mentioned above, in late 2017, the department awarded a contract for its Weather System Follow-on–Microwave satellite to fulfill core weather requirements. Under this program, the department may launch a demonstration satellite in 2021 and plans to launch an operational satellite in 2022. capabilities. DOD plans to launch Operationally Responsive Space-8 as early as 2022. Monitoring: met. DOD now meets the monitoring criterion as evidenced by its actions to initiate a major acquisition program, the Weather System Follow-on–Microwave, and award a contract for the first satellite. In addition, program officials stated that they plan to monitor the program’s progress toward addressing critical needs and assess its operations and sustainment costs. Demonstrated progress: met. DOD now meets the demonstrated progress criterion because it has developed plans and taken actions to address gaps in weather data through its plans to launch the Weather System Follow-on–Microwave satellite in 2022. The department also plans to launch the Electro-Optical/Infrared Weather Systems satellite in 2024 and provide interim capabilities beginning as early as 2022. By developing these plans, DOD has reduced the risk of a gap in weather satellite data and addressed the concerns about a lack of planning that we identified in our 2017 High-Risk Report. DOD’s effective implementation of its plans will be key to further reducing the risks of gaps in weather satellite data in the future. Moving forward, we will continue to monitor both NOAA and DOD efforts to develop and launch the next satellites in their respective weather satellite programs. NOAA plans to launch its next geostationary weather satellite in 2021 and to launch its next polar weather satellite in 2022. DOD plans satellite launches in 2021 (potentially), 2022, and 2024. In addition, we will continue to monitor DOD’s efforts to develop long-term plans to meet its weather satellite requirements. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: Apr. 25, 2018. Satellite Acquisitions: Agencies May Recover a Limited Portion of Contract Value When Satellites Fail. GAO-17-490. Washington, D.C.: June 9, 2017. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: Mar. 30, 2017. Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs. GAO-16-769T. Washington, D.C.: July 7, 2016. Polar Satellites: NOAA Faces Challenges and Uncertainties that Could Affect the Availability of Critical Weather Data. GAO-16-773T. Washington, D.C.: July 7, 2016. Polar Weather Satellites: NOAA Is Working to Ensure Continuity but Needs to Quickly Address Information Security Weaknesses and Future Program Uncertainties. GAO-16-359. Washington, D.C.: May 17, 2016. Defense Weather Satellites: Analysis of Alternatives Is Useful for Certain Capabilities, but Ineffective Coordination Limited Assessment of Two Capabilities. GAO-16-252R. Washington, D.C.: Mar. 10, 2016. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal government is one of the world's largest and most complex entities; about $4.1 trillion in outlays in fiscal year 2018 funded a broad array of programs and operations. GAO's high-risk program identifies government operations with vulnerabilities to fraud, waste, abuse, and mismanagement, or in need of transformation to address economy, efficiency, or effectiveness challenges. This biennial update describes the status of high-risk areas, outlines actions that are still needed to assure further progress, and identifies two new high-risk areas needing attention by the executive branch and Congress. Solutions to high-risk problems save billions of dollars, improve service to the public, and would strengthen government performance and accountability. GAO uses five criteria to assess progress in addressing high-risk areas: (1) leadership commitment, (2) agency capacity, (3) an action plan, (4) monitoring efforts, and (5) demonstrated progress. The ratings for more than half of the 35 areas on the 2019 High-Risk List remain largely unchanged. Since GAO's last update in 2017, seven areas improved, three regressed, and two showed mixed progress by improving in some criteria but declining in others. Where there has been improvement in high-risk areas, congressional actions have been critical in spurring progress in addition to actions by executive agencies. GAO is removing two of the seven areas with improved ratings from the High-Risk List because they met all of GAO's five criteria for removal. The first area, Department of Defense (DOD) Supply Chain Management, made progress on seven actions and outcomes related to monitoring and demonstrated progress that GAO recommended for improving supply chain management. For example, DOD improved the visibility of physical inventories, receipt processing, cargo tracking, and unit moves. Improvements in asset visibility have saved millions of dollars and allow DOD to better meet mission needs by providing assets where and when needed. The second area, Mitigating Gaps in Weather Satellite Data, made significant progress in establishing and implementing plans to mitigate potential gaps. For example, the National Oceanic and Atmospheric Administration successfully launched a satellite, now called NOAA-20, in November 2017. NOAA-20 is operational and provides advanced weather data and forecasts. DOD developed plans and has taken actions to address gaps in weather data through its plans to launch the Weather System Follow-on–Microwave satellite in 2022. There are two new areas on the High-Risk List since 2017. Added in 2018 outside of GAO's biennial high-risk update cycle, the Government-Wide Personnel Security Clearance Process faces significant challenges related to processing clearances in a timely fashion, measuring investigation quality, and ensuring information technology security. The second area, added in 2019, is Department of Veterans Affairs (VA) Acquisition Management. VA has one of the most significant acquisition functions in the federal government, both in obligations and number of contract actions. GAO identified seven contracting challenges for VA, such as outdated acquisition regulations and policies, lack of an effective medical supplies procurement strategy, and inadequate acquisition training. Overall, 24 high-risk areas have either met or partially met all five criteria for removal from the list; 20 of these areas fully met at least one criterion. Ten high-risk areas have neither met nor partially met one or more criteria. While progress is needed across all high-risk areas, GAO has identified nine that need especially focused executive and congressional attention, including Ensuring the Cybersecurity of the Nation, Resolving the Federal Role in Housing Finance, addressing Pension Benefit Guaranty Corporation Insurance Programs, Managing Risks and Improving VA Health Care, and ensuring an effective 2020 Decennial Census. Beyond these specific areas, focused attention is needed to address mission-critical skills gaps in 16 high-risk areas, confront three high-risk areas concerning health care and tax law enforcement that include billions of dollars in improper payments each year, and focus on a yawning tax gap. This statement describes GAO's views on progress made and what remains to be done to bring about lasting solutions for each high-risk area. Substantial efforts are needed by the executive branch to achieve progress on high-risk areas. Addressing GAO's hundreds of open recommendations across the high-risk areas and continued congressional oversight and action are essential to achieving greater progress.", "document_type": "gao"}
{"report": "DOD describes military commissions as a form of military tribunal convened to try individuals for unlawful conduct associated with war. According to DOD, military commissions—as they came to be known in the 19th century—were preceded by military tribunals during previous conflicts, beginning from the Revolutionary War. After the September 11, 2001 terrorist attacks on the United States, the President issued an order, directing the Secretary of Defense to establish commissions to try certain individuals for violations of the laws of war and other offenses. In 2006, the United States Supreme Court invalidated the military commissions established under the President’s order. In response to the court’s ruling, Congress passed the Military Commissions Act of 2006. In 2009, the President ordered a review of military commissions and detention at NSGB which led to a halt in all pending military commissions’ proceedings. In 2009, Congress passed the Military Commissions Act of 2009 which replaced the Military Commissions Act of 2006 and led to the reinstatement of criminal proceedings against certain detainees. Held on NSGB, Cuba, current commissions’ proceedings include alleged terrorists accused of engaging in attacks against the United States, such as the USS Cole attack in which 17 people were killed and the September 11, 2001 attack in which 2,976 people were killed. The Military Commissions Act of 2009 establishes procedures governing the use of military commissions to try alien unprivileged enemy belligerents engaged in hostilities against the United States for violations of the law of war and other offenses triable by military commission. The Act defines an alien unprivileged enemy belligerent as a person who has engaged in hostilities against the United States or its coalition partners; has purposefully and materially supported hostilities against the United States or its coalition partners; or was a part of al Qaeda at the time of the alleged offense. While the Military Commissions Act of 2009 also provides protections for the accused individuals undergoing trial (the accused) similar to rights afforded to defendants in a federal criminal trial, the Act is more closely aligned with military court-martial practice. For example, the Act states that procedures for military commissions are based upon the procedures for trial by general courts-martial under the Uniform Code of Military Justice, Chapter 47 of the U.S. Code, except for certain provisions such as provisions related to speedy trial and pretrial investigations. Article 36 of the Uniform Code of Military Justice states that the President may prescribe regulations for pretrial, trial and post-trial procedures for cases triable in courts-martial and military commissions which shall, so far as the President considers practicable, apply the principles of law and the rules of evidence generally recognized in the trial of criminal cases in the United States district court but which may not be contrary to other provisions of the Uniform Code of Military Justice. Article 36 also states that all rules and regulations prescribed by the President or the Secretary of Defense as his designee shall be uniform insofar as practicable. In addition to relevant law, commissions’ proceedings are conducted in accordance with certain DOD manuals and regulations and rulings by military judges who preside over the proceedings. There are a number of DOD organizations responsible for conducting the commissions’ proceedings included in the scope of our review. Each has separate functions and responsibilities, as shown in figure 1. The Convening Authority is responsible for the overall management of the commissions’ process and is empowered to convene the commissions, refer charges to trial, negotiate pre-trial agreements, review records of trial, and maintain the public website, among other responsibilities. The Office of the Chief Prosecutor includes attorneys, paralegals, and support staff from each branch of the United States Armed Forces, DOD, and attorneys from the Department of Justice. These attorneys coordinate investigative efforts, prepare charges, and represent the United States government in commissions’ proceedings. Located in the Office of the Chief Prosecutor, DOD’s Victim and Witness Assistance Program provides services to approximately 2,000 victims and their family members. The Military Commissions Defense Organization maintains a structure separate from the structure of OMC, to help ensure fairness and independence of the commissions’ legal system. Defense attorneys representing the accused can be military and/or civilian, either employed by DOD and/or a civilian attorney retained by the accused at their own expense. These attorneys are appointed by the Chief Defense Counsel to represent the accused. In capital cases, i.e. those cases in which the United States government is seeking the death penalty for the accused, the Military Commissions’ Defense Organization will also appoint a “learned counsel”—that is, an attorney with specialized training and experience in trials involving the death penalty. The Military Commissions’ Trial Judiciary consists of military judges nominated by the Judge Advocate Generals of the military departments to preside over trials. The Trial Judiciary also includes the judges’ support staff that, among other responsibilities, manages court documents—such as legal motions and judges’ rulings—that are part of the commissions’ process. According to OMC officials, the Trial Judiciary has also established certain practices—followed by OMC— for the review of these documents before they are posted on OMC’s public website. The Expeditionary Legal Complex at NSGB was completed in January 2008 and consists of various facilities, including a courtroom in which classified and unclassified proceedings may be conducted, office space and equipment for court administration employees as well as the prosecution and defense legal teams, and expeditionary lodging capable of housing up to 300 personnel, according to an OMC official. Key elements of this complex are highlighted below. The courtroom, shown in figure 2, is a multi-defendant courtroom capable of trying up to six defendants jointly. The courtroom can accommodate a case with the possibility of the death penalty, and has unique features that permit the use of highly-classified information at the Top Secret/Sensitive Compartmented Information level or below during closed proceedings. The courtroom within the Expeditionary Legal Complex has a viewing gallery (gallery), as shown in figure 3, where selected members of the public may view commissions’ proceedings, through soundproof glass. This is because the gallery was designed to permit public viewing of the proceedings even in the event that classified information is inadvertently disclosed. Specifically, according a DOD official, the gallery has video display monitors that play a closed-circuit television feed of the proceedings, on a 40-second delay between live action in the courtroom and the video transmitted to the gallery. This system provides United States government officials with time to prevent any inadvertent disclosure of classified information from being disseminated to the public. If victims or family members are present in the gallery, they enter last and are seated nearest to the exit. A curtain is available to separate the victims and family members from other members of the public, if they desire privacy. Commissions’ proceedings that are open to the public are transmitted by closed-circuit television to the media operations center located outside of, but nearby, the Expeditionary Legal Complex courtroom. The media operations center, shown in figure 4, also includes telephone and computer support, which enables up to 60 members of the media to simultaneously watch the proceedings, with the 40-second delay to prevent the inadvertent disclosure of classified information, while they work. The center also has a room for conducting press briefings. DOD has taken various steps to facilitate public access to commissions’ proceedings, using four primary methods to do so. Rule 806 of DOD’s Manual for Military Commissions specifies that, except in certain instances, such as to protect national security, that military commissions shall be publicly held. In accordance with this guidance, DOD facilitates public access to commissions’ proceedings by (1) communicating directly with victims and their family members about the status of scheduled hearings and other administrative matters; (2) enabling selected members of the public to view proceedings in-person at NSGB; (3) providing CCTV sites within the United States for viewing proceedings remotely; and (4) making information, such as court documents that will be used during proceedings, available to the public on the commissions’ website. In figure 5, we summarize key DOD efforts to facilitate public access to commissions’ proceedings, followed by a description of each method. According to officials, DOD established its Victim and Witness Assistance Program in June 2004 to provide support services to the approximately 2,000 victims and their family members who opted to participate in the program. The program, which falls within the Office of the Chief Prosecutor, provides updates to victims and their family members on pending military commission cases, notifies them of scheduled hearings, and assists with the logistics associated with viewing proceedings at NSGB or a CCTV site. In our survey of victims and family members, we asked about their perspectives on communication originating from the prosecution team and found that a majority of those who responded (72 percent) were satisfied or very satisfied with DOD’s efforts. Due to space limitations, DOD is currently able to allot 52 seats for selected members of the public to view “open” commissions’ proceedings in-person from the courtroom gallery on NSGB. DOD is responsible for selecting these individuals who generally fall into three categories: (1) victims and their family members, (2) non-government stakeholders, and (3) the general public. DOD provides air transportation to and from NSGB for all individuals approved to view the proceedings in-person. Further details about DOD’s selection process and seating allocation, by category, are provided below. Victims and their family members: Per DOD policy, up to 5 victims or their family members and the person accompanying them to provide support are allotted seating in the courtroom gallery. There are also seats reserved for a grief counselor and an escort from the Victim and Witness Assistance Program for a total of 12 seats. Due to the limited number of total seats and lodging currently available, DOD asks the approximately 1,140 victims and family members who have expressed an interest in attending proceedings to identify the proceedings they would prefer to attend. DOD then uses these preferences to select victims and family members to travel to NSGB for each week that proceedings are held. According to DOD officials, this procedure works better than the lottery system that the Victim and Witness Assistance Program previously used because it provides victims and their family members more flexibility with their travel dates. Non-government stakeholders: This category includes individuals who represent 25 non-governmental organizations pre-approved by DOD to view proceedings in-person, as well as members of the media. DOD currently allots 12 seats in the courtroom gallery to representatives of approved non-governmental and civic organizations and 10 seats to the media. All individuals within this category who are approved for travel to NSGB are required to sign a list of “ground rules” developed by DOD and to be escorted by military personnel while on the base. General public: The remaining 18 seats are filled on a “first come, first served” basis by members of the public who live on NSGB or who have been cleared by the Navy to visit the base. In 2012, DOD established five CCTV sites on the East Coast of the United States where individuals may view commissions’ proceedings remotely. Specifically, four CCTV sites are reserved for victims and their family members, and are located at Fort Hamilton, New York; Fort Devens, Massachusetts; Joint Base Dix/McGuire/Lakehurst, New Jersey; and Naval Station Norfolk, Virginia. The fifth CCTV site is located at Fort Meade, Maryland, and is open to victims and their family members, non- government stakeholders, and the general public. According to officials, at these sites, large video display monitors display the same video feed that appears on monitors in the viewing gallery at NSGB, with the same 40-second delay to prevent the inadvertent disclosure of classified information. This feed is delivered to CCTV sites by both fiber optic cable and satellite transmission. According to court documents, these sites are the result of DOD acknowledging both the importance of the public’s physical access to proceedings held at NSGB and the limited ability of the general public to do so. According to our analysis of available data from DOD on attendance at NSGB and the CCTV sites, there have been a total of 2,304 recorded visitors, beginning in 2011. It is important to note that DOD did not record the number of visitors from the general public at NSGB until approximately September 2018. Also, according to officials, DOD did not begin recording visitors from the general public at the Fort Meade CCTV site until September 2018, and did not record data on non-government stakeholder visitors to the Fort Meade CCTV site from 2012 to 2015. However, our review of available data indicates that of the recorded visitors, the majority—64 percent—were non-government stakeholders, while victims and family members made up 34 percent of attendees, and the general public made up 2 percent. Table 1 summarizes available DOD data on attendance at NSGB and CCTV sites, from November 2011 to September 2018. According to a DOD official, DOD established the Office of Military Commissions’ website as an online resource for the public in March 2005 to provide a variety of information about OMC’s organization, its facilities and services on NSGB, active and inactive cases, and court documents approved for public dissemination, among other things. Court documents may include legal motions (motions) filed by the prosecution and defense, docket-related documents (e.g., documents that list motions to be argued during a specific hearing), judges’ rulings on motions, and transcripts of hearings. According to officials, DOD updated the website in 2011 and 2014, which government and non-government stakeholders told us made it easier to use and provided additional information, thereby facilitating public access to information about the commissions’ proceedings. In addition, DOD officials told us the website has the only official, public calendar of scheduled hearings. The public faces a number of challenges in gaining access to commissions’ proceedings or obtaining information about them. These challenges can be categorized into two groups: (1) those that DOD has limited ability to address, and (2) those that DOD has greater ability to address. During our review, we identified several aspects of commissions’ proceedings that constrain the extent of public access that DOD is able to provide. Specifically, DOD has limited ability to address these challenges because they result, in part, from factors that are not under the department’s control. As confirmed by DOD officials, these challenges are (1) the location of proceedings, (2) the prevalence of classified information associated with them, and (3) the duration of time awaiting trial—each of which are discussed in more detail below. We also identified other public access challenges that DOD has a greater ability to address because the challenges result largely from factors under DOD’s control. As confirmed by DOD officials, these challenges to public access of military commissions’ proceedings involve limitations related to in-person viewing of proceedings at NSGB, remote viewing of proceedings, and the timeliness with which key information is posted on the commissions’ website. DOD policy and processes, the size of the gallery DOD built, and the limited logistical support DOD provides to non-government stakeholders substantially constrain the public’s ability to view commissions’ proceedings at NSGB. As discussed previously, DOD policy and the size of the courtroom gallery on NSGB currently limit in-person attendance to a total of 52 seats for each week of hearings—12 of which are reserved for victims or their family members, as well as the support people and DOD escorts accompanying them. The relatively limited number of seats means that—in the 10 years since victims and their family members were permitted to travel to NSGB—according to a DOD official, fewer than half have been selected to do so. According to our review of DOD data on total attendance at NSGB since 2011, victims and family members comprise 21 percent of attendees. The limited weekly attendance for all visitors to commissions’ proceedings is in contrast to United States district court that conducts federal criminal trials and can generally accommodate a new set of attendees each day, if those attendees are in the local area or can travel to the court house. However, as discussed previously, DOD provides air transportation to and from NSGB, the department must approve all individuals who fly to NSGB to view the proceedings in-person, and the seats available to the general public in the gallery are filled on a “first come, first served” basis by members of the public who live on NSGB or who have been cleared by the Navy to visit the base. These constraints do not exist at federal courthouses. Thus, the portion of the general public that can attend commissions’ proceedings is substantially smaller than the portion of the public that can attend federal criminal trials. In addition, according to non-government stakeholders, DOD provides limited logistical support for their work at NSGB, which constrains their ability to provide the public with access to information about the commissions’ proceedings. Based on discussions with non-government stakeholders, the logistics of traveling to NSGB and the inherent limitations of working in a challenging environment made it difficult for some of these non-government stakeholders to be able to view proceedings in-person with the frequency that they believe is needed. For example, one national security policy expert told us that they “cannot afford the time required to attend another hearing.” This is because “…hearings are frequently cancelled or closed to the public,” and as a result, attendees “…typically spend at least a week there to see maybe two days of hearings.” We also spoke with a legal expert who explained that the lack of reliable internet and phone service while on NSGB presented challenges in maintaining contact with the individual’s law practice, thus limiting their ability to travel to NSGB and view proceedings in-person. Similarly, a member of the media told us that the conditions of reporting the commissions’ proceedings are “an extreme hindrance.” This member of the media noted that while at NSGB, visitors have access to limited and unreliable internet and telephone service. This has made covering the trials “extremely difficult,” according to the freelance journalist because the cost, lack of resources and unreliable schedule make it increasingly difficult to take a week away from reporting on other events “in order to cover only a couple of days of open hearings.” For many of the non-government stakeholders included in our review, their role as observers, scholars, or reporters on the commissions’ proceedings is not their full-time job. Instead, they do so as one part of their professional responsibilities or as volunteers. In this context, they told us generally that the time required to travel to NSGB due to infrequent flights, the difficulty of working there, and the frequent closings or cancellations of hearings discourage non-government oversight and reporting on the proceedings. This, in turn, reduces the amount and quality of the information that they can provide to the public. Also, while selected victims and family members and non-government stakeholders are able to view proceedings in-person on NSGB, the vast majority of the general public cannot, due to DOD policy. The exceptions are—according to a DOD official—civilians traveling to NSGB on official business and those who have a sponsor living at NSGB. DOD’s decision to locate all CCTV sites on military bases on the East Coast of the United States has resulted in several challenges that limit the current usefulness of CCTV sites in facilitating public access to commissions’ proceedings. First, all five CCTV sites are concentrated within a 600 mile span on the East Coast of the United States. However, victims and their family members—the primary intended users of these sites—are located throughout the world or are concentrated in areas of the United States that are a significant distance from one of these five locations. According to our survey of victims and their family members, a majority of those who responded (71 percent) said that it was important to have the location of the hearings close to where they live. For example, the victim and family member population served by DOD’s Victim and Witness Assistance Program has a significant presence in California and Florida, as well as smaller populations in eight other countries. Further, survey respondents from Texas, Florida, and the United Kingdom noted that it was impractical for them to travel to the current CCTV sites, especially considering the unpredictable hearing schedule. Figure 7 shows the location of the CCTV sites along with the dispersion of victims and their family members served by DOD’s Victim and Witness Assistance Program. The logistics of traveling to the CCTV site at Fort Meade, Maryland—the only location open to non-government stakeholders and the general public—is also a factor that limits the public’s access to information about commissions’ proceedings. For example, non-government stakeholders who observe the commissions’ proceedings and were included in our review explained that the majority of their organizations are located in cities that either do not have a CCTV site, or are not near a site to which they have access. Examples include Los Angeles, California, and New York City, New York. Non-government stakeholders also expressed that there are challenges associated with the amount of time and travel it takes to get to Fort Meade, which can be difficult especially when hearings are often cancelled or closed with little or no notification, according to these stakeholders. Further, although the CCTV site at Fort Meade is open to the general public, DOD officials acknowledged that there is no practical way for the department to advertise the availability of the opportunity to view proceedings at the CCTV site on Fort Meade. In addition to the challenges of traveling to CCTV sites, some victims and family members and non-governmental stakeholders noted challenges regarding their ability to access military bases that host these sites. For example, some victims and family members told us that they or their relatives had been denied access to certain CCTV sites because, according to DOD, they did not meet the department’s definition of a victim or family member. Further, non-government stakeholders who are foreign nationals are required to be escorted while on Fort Meade, per DOD policy. However, DOD officials told us that Fort Meade does not always have the personnel necessary to escort these individuals, which could preclude certain non-government stakeholders from being able to access the site. Further, a senior DOD official acknowledged that by locating CCTV sites on military bases, DOD is running the risk that—in certain scenarios—no member of the public would be able to access the sites. This is because, in the event of a threat to base security, it may be closed to civilians who do not live or work on the installation. As discussed previously, OMC’s website is a key enabler of public access to information about commissions’ proceedings because it provides the public with a way to retrieve unclassified court documents related to the commissions’ proceedings, such as legal motions and transcripts, and a schedule of the proceedings’ hearings. According to DOD’s Regulation for Trial by Military Commission (Regulation), court documents are provided by OMC to an inter-agency review team, which examines them and removes any classified or protected information that is identified. Once this examination is completed, the inter-agency review team returns the document to OMC to be posted to its website. DOD’s Regulation’s sets a timeliness standard for reviewing and posting court documents—noting that the entire process generally should take no longer than 15 business days. However, based on our analysis of available data, we determined that DOD has generally not met this standard for the timely posting of documents, which substantially limits public access to information about proceedings. Specifically, we obtained and analyzed data on when court documents were filed with OMC and the date on which the inter-agency review team returned them to OMC for posting and found that from October 2011 to October 2018, DOD frequently missed the timeliness standard laid out in its Regulation. For example, since 2011, we found that 8 percent of court documents reviewed by the inter-agency review team were returned to OMC after the 15 business day standard. Further, we found that—since 2015—DOD missed its timeliness standard with greater frequency. For example, approximately 7 percent of documents reviewed in 2015 were returned to OMC after the 15 business day standard whereas in 2018, more than 50 percent of the documents submitted for review missed the timeliness standard. Our analysis of data from the inter-agency review team is summarized in table 2. In addition to the data provided by the inter-agency review team, we independently collected and analyzed data from the commissions’ website on the filing and posting dates for more than 11,000 court documents filed between June 19 and November 19, 2018. Our analyses of these data further demonstrate DOD’s challenges with timely posting of court documents. For only one category of court documents— unofficial, unauthenticated transcripts from open hearings—our analysis of data collected from the website from June to November 2018 show that these transcripts were posted in a timely manner. For the remainder, over a five month period, nearly 1,300 court documents either remained unposted or were posted to OMC’s website after the 15 day business standard. Furthermore, the total for the median number of business days these documents were filed after the 15 business day standard ranged from 90-103.5 days—that is, from almost four months to more than five months past DOD’s timeliness standard. Table 3 summarizes our analysis for the five cases in the scope of our review. We reviewed relevant case studies in federal criminal proceedings involving both terrorism charges and certain matters related to commissions’ cases, and identified instances in which federal judges adopted processes for review and release of classified documents that are similar to processes specified in DOD’s regulation. However, we also identified differences, such as shorter timeframes in the federal court systems for the government’s review and public release of documents with the potential for classified information. For example, in one case, court security experts had 48 hours—and in another, 72 hours—to complete this process. According to various non-government stakeholders, DOD’s inability to post court documents in a timely manner has negatively impacted their ability to perform their role in facilitating public access to information about commissions’ proceedings. For example, according to our analysis, DOD posted legal motions filed by the prosecution and defense teams a median of 97 business days past DOD’s timeliness standard; military judges’ rulings were posted a median of 69 days past DOD’s timeliness standard. One member of the media explained that DOD’s delayed posting of court documents limits their access to information needed to justify travel to NSGB. They further explained that not being able to travel to NSGB impedes their ability to conduct interviews and research about the proceedings, which are needed to inform the general public. Similarly, other stakeholders told us that they believe the delays in posting docket- related documents have made it difficult for them to assess the proceedings and communicate their assessments to the public. According to our analysis, DOD posted these documents a median of 99 business days past DOD’s timeliness standard. Further, for hearings held between June 19, 2018 and November 19, 2018, we found that of the 74 docket- related documents filed with the court, three were posted in advance of the hearing. We also found that the hearing schedule posted on the commissions’ website—the only official, publicly-accessible schedule of proceedings, according to DOD officials—frequently is not updated in a timely manner to reflect schedule changes. According to DOD officials, this is because information on schedule changes is often not provided to the webmaster for timely updates, as the inter-agency review team is examining it; much like the inter-agency review team does with court documents. As a result, several non-governmental stakeholders told us that it is difficult to justify the time and costs of traveling to Fort Meade, Maryland—the only CCTV site open to them—given the risk of arriving only to learn that the scheduled hearing has been canceled or closed to the public. We observed the effect of these cancellations on public access firsthand during our review. For example, we attempted to attend hearings at Fort Meade on various occasions. On several of those occasions, the hearing was canceled. While we learned this information directly from our DOD contact, none of these changes were reflected on the website’s schedule. Also, when we asked for updates on scheduled hearings, multiple DOD officials told us that we should not bother checking the website’s hearing schedule. Instead, they recommended that we check the Twitter feed of a certain reporter who spends a lot of time at NSGB and routinely provides updates on hearings. In addition, according to DOD officials, victims and family members who attempt to access the website from certain locations outside of the United States are sometimes unable to do so. OMC officials are aware of this issue and an OMC information technology expert told us that while OMC has tried to fix this issue several times, it is based on security for the website. In addition, according to DOD officials, victims and family members who attempt to access the website from certain locations outside of the United States are sometimes unable to do so. OMC officials are aware of this issue and an OMC information technology expert told us that while OMC has tried to fix this issue several times, restricting access from certain locations outside of the United States is based on security for the website. DOD officials acknowledged that they are regularly not meeting their timeliness standard for posting court documents to OMC’s website— something that they largely attribute to the volume of documents submitted and the government-wide security classification review process to which they are subjected. Specifically, in this process for the military commissions’ proceedings, there are two DOD and two non-DOD intelligence agencies with the chief responsibility for conducting the security classification review of court documents filed for commissions’ proceedings. The Defense Intelligence Agency (DIA) is responsible for coordinating the process and all four agencies may be required to review a document depending on the type of information it contains. In accordance with DOD’s Regulation and the interests of national security, a review of certain documents submitted must be conducted to confirm that such filings are in publicly releasable form. Due to the multiple levels of review and depending on the amount and complexity of classified information involved, intelligence agency officials told us that— in the course of the inter-agency review team’s efforts—it can take anywhere from one day to several weeks to review a single document. These officials also told us that it is very difficult to hire personnel with the requisite expertise and experience to serve as reviewers, given that classified information that may be in these documents can be complex, esoteric, and decades old. Thus, it is unlikely that a significant number of new reviewers could be hired to help expedite the review team’s processes. According to our review of available information from intelligence agency officials, the agencies have a relatively small number of personnel reviewing large numbers of documents. Further, those personnel responsible for reviewing OMC-related documents spend only a portion of their time reviewing court documents for the purpose of posting them on the commissions’ website. This is because inter-agency review team personnel are also responsible for reviewing documents not released on the commissions’ website. According to a senior official from the review team, it has been tasked with competing requests for document reviews that have impacted the team’s ability to review court documents for posting on OMC’s website. For example, the official explained that—from May 2017 to February 2018—the review team completed seven of these large-scale, time- sensitive tasks, involving about 31,400 pages of document review, according to the official’s estimate. Table 4 summarizes available information about the agencies’ review of court documents to be posted on the website. Based on our discussions with officials from DOD and the inter-agency review team, factors such as—the complexity of documents, relative scarcity of qualified reviewers, and other document review tasks unrelated to web posting—are somewhat out of DOD’s control. For example, a senior official from the inter-agency review team explained, the complexity of court documents is the responsibility of the prosecution and defense teams that write them; the other document review tasks are often driven by the schedule of individual cases or military judges’ rulings. However, there is a key factor driving the timeliness challenge that may be in the department’s control. According to our discussions with DOD officials, they attributed document posting delays to a policy decision by the department to subject the extremely large volume of court documents filed—including schedule changes—to the same type of security review. Through our review of agency documentation and discussions with DOD officials, victims and family members, and non-government stakeholders, we identified a variety of potential options for expanding access to commissions’ proceedings. We have organized these options into three categories, as shown in table 5. The majority of both victims and family members who responded to our survey and non-government stakeholders who responded to our questionnaire support most potential options for expansion of public access. Specifically, the majority of victims and family members who responded to our survey supported six of the seven potential options about which we asked. The majority of non-government stakeholders supported seven of the ten potential options. There was general agreement between these two groups on the potential options they supported. This information is summarized in figures 8 and 9. Options exist that may potentially help DOD address the challenges the public faces attending hearings at NSGB. Specifically, a physical expansion of the courtroom viewing gallery that increases the number of seats open to the public, along with a change in DOD policy to allow more visitors, would enable NSGB to accommodate more people wishing to view proceedings in-person. An OMC official responsible for management of the office’s infrastructure at NSGB acknowledged that an expansion of the NSGB gallery and the number of the people it can accommodate is theoretically possible, potentially in the context of an ongoing project to renovate the complex of buildings that contains the courtroom, gallery, and other facilities that support the commissions’ proceedings. DOD officials expressed a number of concerns with this option. First, an OMC official cautioned that expanding the gallery’s capacity would likely increase the cost of the current $14 million expansion project, though the official was unable to estimate by how much. Second, an increase in the number of visitors would require a commensurate increase in logistical support—for example, more lodging and utilities—which an OMC official said may not be supported by the current level of resources. Third, according to an OMC official, an expansion of the gallery would require it to be temporarily closed, thus delaying commissions’ proceedings. This is because, the official explained, the current courtroom is the only venue at NSGB that can accommodate a multi-defendant trial and any highly classified evidence required for the proceedings. Further, according to a senior DOD official, renovation of the gallery will require it to be re- accredited before DOD could resume discussing highly classified evidence in the adjoining court room. This could result in a substantial increase in both the period of time in which the gallery and court room are unavailable, as well as the cost of a renovation. In our review of DOD documents and discussions with department officials, we learned that there may be ways to address some of these concerns. For example, DOD is planning to accommodate at least some additional visitors to NSGB. According to OMC documentation, it is planning to support about 350 total attendees per week of hearings during the trial phase of Khalid Shaikh Mohammad et al (2). This is an increase of about 260 percent, compared to the average total number of visitors for a week of pre-trial hearings in this case. Based on our review of relevant court documents and discussions with DOD officials and stakeholders, we identified two broad categories of potential options that may help DOD address the public access challenges associated with CCTV sites: (1) adding or changing the locations of CCTV sites and (2) broadcasting video from NSGB using other technologies, such as the internet. CCTV sites: Additional CCTV sites—that are more evenly distributed across the country—could potentially be established for the general public or for use solely by victims and their family members. DOD officials acknowledged that most military bases have the requisite technology and physical infrastructure to host a CCTV site and that expanding the number of CCTV sites would require a relatively small outlay of resources. Further, they also acknowledged that there may be opportunities to establish CCTV sites at locations other than military bases, such as federal courthouses, which may help address the public access challenges posed by bases’ security procedures, such as foreign nationals’ difficulty when serving as observers or reporters. DOD officials noted however, that expanding CCTV sites would require approval by the Secretary of Defense or a military judge, because— according to DOD’s Manual for Military Commissions—the broadcasting of proceedings in the court room, to include video and audio recording or television broadcasting, shall not be permitted. The military judge, however, may permit contemporaneous closed-circuit video or audio transmission. For example, the prosecution requested this permission in 2012 and the military judge authorized the transmission of all open proceedings, by CCTV, to several sites. Similarly, based on our review of relevant selected case studies of terrorism trials in U.S. federal court, there are previous examples of federal terrorism trials using CCTV sites for the benefit of the public, victims and family members. Further, DOD officials were hesitant to support such an expansion based on their perception that relatively few people have utilized the current CCTV sites, but they were unable to provide complete or fully accurate and reliable data on attendance of certain groups, such as the media and general public. In addition, according to DOD officials, the demand for public access during the current cases’ decade-long pre-trial phase likely does not represent the magnitude of future public interest, which DOD officials believe will increase significantly once the trial phase begins. Television and internet broadcast: Broadcasting video of hearings via other technologies, such as the television or internet would increase opportunities for the general public to view commissions’ proceedings remotely. An OMC information technology expert told us that it would be relatively simple and inexpensive to transmit the existing video feed from the proceedings on NSGB to either television stations, such as C-SPAN, or through the internet using the same cyber security protocols used for CCTV sites. Further, internet broadcasts could either be password- protected so that they could be viewed only by a specific group, such as victims and family members, or they could be made available to the general public. This option raised mixed views from the experts and officials we interviewed. According to Rule 806(c) of the Manual for Military Commissions, television or internet broadcasting would require express authorization by the Secretary of Defense—and as previously noted—this rule is consistent with federal criminal practice which prohibits the broadcasting of judicial proceedings from the courtroom. Legal experts who we contacted had varying perspectives on this issue. For example, officials from the Office of the Chief Prosecutor had concerns that parallel those of the Judicial Conference of the United States—the national policy- making body for the federal courts—on the negative impact of cameras in the courtroom on jurors and witnesses, among other reasons. Specifically, the Judicial Conference cited concerns such as publicity that could threaten jurors’ privacy and witnesses that could be by subjected to distractions, intrusions or influences. In contrast, a senior official in the Military Commissions’ Defense Organizations generally supported television and internet broadcasting of proceedings. This perspective was shared by the American Bar Association, which stated that it would support adoption of such an initiative in the future to protect the integrity of the military commissions’ process and better educate the public about these proceedings. Also, in our discussions with DOD officials, they too expressed mixed perspectives regarding internet or television broadcast of proceedings from NSGB. On one hand, according to an OMC information technology expert, broadcasting is technologically possible and could use certain existing security procedures. Specifically, because safeguarding classified information is critical, any television or internet broadcast of proceedings would use the same video feed currently transmitted to the NSGB gallery and CCTV sites, and thus would use the same safeguards provided by the 40-second delay previously discussed. Further, DOD information technology experts suggested that using a limited internet broadcast, it could be possible for DOD to create temporary viewing sites almost anywhere they are needed; for instance, in a hotel conference room. On the other hand, senior DOD officials expressed several concerns regarding the security implications of broadcasting video outside of the current CCTV framework. For example, they highlighted the potential for adversaries of the United States to copy and alter the video feed from an unsecured broadcast—thus creating a new and inaccurate record of proceedings that could be used as propaganda. Further, while internet broadcasts could be password-protected for victims and their family members only, DOD officials were concerned that the size of the group may make it more likely that the password would be shared with people outside of the group. In regard to these concerns, DOD’s technology experts suggested that they could potentially be addressed, at least in part, by using security procedures already in place at the NSGB gallery and CCTV sites. Specifically, at the temporary viewing sites they proposed, DOD officials would not allow recording of the video feed, following the rules currently in place at NSGB and CCTV sites. However, regarding this proposal, senior DOD officials conveyed force protection concerns for government personnel and any attendees. For example, an official noted that there have been investigations into allegations that OMC personnel have been surveilled by unknown persons, both in the United States and overseas, when on official travel. Also, in a relatively unsecure civilian location like a hotel, DOD would not be able to enforce the rules of the commissions. For instance, according to this official, if someone wanted to attend a temporary viewing site but refused to relinquish their electronic recording devices, per rules currently in place at NSGB and CCTV sites, DOD’s only recourse would be to call local law enforcement authorities. DOD’s Regulation suggests two possible approaches the department can take when reviewing court documents, prior to posting on the website, and one of these could help the department post court documents in a timelier manner. The first approach would allow for an OMC security classification expert to independently determine whether a court document may contain classified information. If it is determined that the document does not contain classified information, the document is to be posted within 1 business day of it being filed. In contrast, according to OMC officials, the second approach provided by the Regulation—and since at least 2014—has been interpreted as directing that every document filed must undergo a security review before it is posted to the OMC website. As discussed previously, DOD officials told us that they attributed the department’s document posting delays to DOD’s policy decision to subject the extremely large volume of court documents filed, including schedule changes, to the same type of security review. DOD’s practice has resulted in nearly every document filed with the commission undergoing a security review before it could be posted to the OMC website. However, at the end of our review, a military judge’s ruling on a pre-trial motion in the case of U.S. v. Khalid Shaikh Mohammad et al.(2) is expected to substantially change DOD’s previous practice of submitting every document for security review prior to posting to the OMC website. Specifically, in December 2018, a military judge found that DOD’s practice, based on the interpretation of the relevant provisions of the Regulation by the previously assigned military judge and the office of the convening authority, resulted in all pleadings—classified or not— undergoing a more laborious classification review intended for classified (or arguably classified) filings. As a result, the military judge found that compliance with DOD’s timeliness standard has, since at least 2017, been the exception rather than the rule. In this ruling, the military judge ordered that commencing on January 16, 2019, the OMC Trial Judiciary’s Chief Clerk will instead send all filings that do not require a classification security review directly to the OMC Webmaster for posting within one business day of filing. Further, per the regulation, filings requiring a classification security review will be sent to the inter-agency review team to coordinate the classification review. Implementation of the military judge’s ruling is expected to reduce the volume of documents submitted for security classification review and thus may improve the timeliness of posting information to OMC’s website. Current law and DOD guidance establish a framework in which DOD and military judges are to weigh the interests of public access to commissions’ proceedings against other considerations, including national security. For example, paralleling the statutory requirement for public access found in the Military Commissions Act of 2009, DOD’s Regulation for Trial by Military Commission states that its goal is to make commissions’ proceedings accessible to the public to the maximum extent possible, consistent with the interests of national security, the rights of the accused, and other interests protected by law. Standards for Internal Control in the Federal Government state that agencies should identify and analyze risks related to achieving their defined goals. These standards also maintain that—based on an agency’s assessment of risks—it should design specific actions as part of their response to the risks. However, DOD has not yet assessed the tradeoffs made by maintaining its current approach in pursuit of its goal of maximizing public access to the extent possible versus expanding public access by implementing other options. This is because the department has not yet identified these options and analyzed the risks associated with them for expanding public access. For example, we spoke to senior DOD officials who expressed strong support for public access to commissions’ proceedings. While they were not necessarily opposed to the concept of expanding public access, they did express concerns about the potential risks and challenges associated with how it may be achieved. Specifically, according to the former Acting Convening Authority, open and transparent commissions’ proceedings are “very important,” adding that public access must be weighed against the need to protect the proceedings’ large amounts of classified information. Similarly, the current Chief Prosecutor for Military Commissions stated that public access to commissions’ proceedings is “hugely important” and that they are “owned by the American People,” but also noted the importance of protecting classified information, especially the sources and methods of the intelligence community. Further, the current head of the Military Commissions Defense Organization, while acknowledging the necessity of processes to protect classified information, stated that “nothing is more important” than public access to the proceedings, calling them “the most important cases of our lifetime.” While these officials generally acknowledge that there are tradeoffs to be made, for example, in facilitating public access while protecting classified information, they have not identified how this could be accomplished or assessed the extent of the tradeoffs associated with any potential options for expanding public access to proceedings. As discussed previously, there are a number of potential options for expanding public access—well supported by victims, their family members that we surveyed, and non-government stakeholders. However, DOD officials have cited various tradeoffs, in the form of concerns over resources and national security, among others. While DOD officials’ concerns may be warranted, until it fully assesses these tradeoffs by identifying and analyzing the potential risks and challenges, it may be missing an opportunity to expand public access. For example, DOD officials have expressed concern with the potential cost and logistical challenge of expanding the viewing gallery on NGSB. However, DOD officials have not assessed such options for increasing public access to proceedings at NSGB while weighing the risks of doing so—such as cost or potentially delaying hearings—and not doing so—such as the current situation, with hundreds of victims and family members who have not been able to attend hearings. Our prior work on leading practices for effective strategic planning has also shown that agencies should define strategies that address management challenges and identify resources needed to achieve their goals. However, according to DOD officials, the department has not developed a strategy that explains how DOD will achieve its goal of maximizing public access to the military commissions’ proceedings in the context of public access challenges and the expected increase in demand for public access, once the cases’ trial phases begin. For example, DOD officials acknowledged that there are large populations of victims and family members who are “underserved” by the current number and locations of CCTV sites and that they need to be expanded. Further, the former acting convening authority noted that there would be a substantial amount of time required to plan for additional sites. Some DOD officials estimate that there will likely be 12-24 months advance notice before trials are held and therefore believe that this will provide sufficient time to develop a strategy that addresses challenges with opening additional sites. However, based on our discussions with DOD officials, this may not be enough time given the substantial planning and coordination that will need to take place within and outside the department on such efforts and the lengthy lead time typically needed to secure additional resources through DOD’s budget process. For example, DOD officials told us that they do not have many facilities anymore in urban communities, which necessitates that they have partners in these areas to facilitate additional CCTV sites. DOD officials said that they have tried working with government officials in New York City—a city with a high concentration of victims and family members—to identify ways to expand options for remote viewing of proceedings. However, DOD officials said that the coordination has been challenging, given management challenges—such as finding adequate space that is accessible for victims, family members, and the media—and required resources—such as reimbursing the City of New York for required security. In addition, while other agencies’ facilities could potentially be used, DOD officials noted that they have not begun coordinating with other agencies because the trial dates are currently unknown. But, given the logistical constraints and budget challenges, if DOD waits until the announcement of a trial dates, the department runs the risk of not having adequate time to plan and budget for a new CCTV site in New York City or any other appropriate location. This example illustrates the complexities of addressing public access, the usefulness of assessing the tradeoffs between DOD’s current approach to public access and options for expanding access, and a strategy that addresses management challenges and identifies needed resources. Until DOD comprehensively identifies and analyzes the risks of maintaining its current approach compared with those posed by potential options for expanding public access, it cannot be assured that it has met its objective of maximizing public access to the extent possible. Furthermore, until DOD develops a strategy, as appropriate, to deal with potential options and describes how the department plans to achieve its public access goals, it cannot ensure that it is well-positioned for the substantial increase in demand for public access that is anticipated when the commissions’ proceedings move into the trial phase. With the responsibility to carry out military commissions’ proceedings for cases that many believe to be the most consequential in United States history, DOD also has—according to its guidance—the responsibility to provide the public with as much access as possible, consistent with national security interests. Although this is a complex set of responsibilities, DOD has facilitated public access to commissions’ proceedings in a variety of ways. These complexities and constraints notwithstanding, there are a number of challenges posed to the public’s ability to access commissions’ proceedings and obtain information about the proceedings. While there are potential options to address these challenges, there are also potential risks that need to be assessed. Whether or not DOD should expand public access—as outlined by these potential options—is a determination the department must make. Given that the public’s demand for access will most likely increase substantially when the commissions’ enter into their trial phases, the longer DOD waits to determine its strategy, the greater the risk of not fully meeting the demand from victims and family members, non-government stakeholders, and the general public. The Secretary of Defense should ensure that the Deputy Secretary of Defense assesses the tradeoffs of potential options for expanding public access to military commissions’ proceedings by identifying and analyzing associated risks, and, as appropriate, developing a strategy to implement any viable options. We provided a draft of this report to the DOD, Department of Justice, and relevant intelligence agencies for review and comment. In written comments provided by DOD (reproduced in appendix IV), DOD concurred with our recommendation, noting planned actions to address it. DOD and certain intelligence agencies also provided technical comments, which we incorporated in the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, the Office of Military Commissions, Department of Justice, and four relevant intelligence agencies. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or FarrellB@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report describes (1) how the Department of Defense (DOD) currently facilitates public access to military commissions’ proceedings; (2) the challenges, if any, that the public faces in gaining access to or obtaining information on these proceedings; and (3) what is known about potential options to address public access challenges, including any related tradeoffs. Specifically, the military commissions’ cases included in our review are 9/11: Khalid Shaikh Mohammad et al (2), USS Cole: Abd al-Rahim Hussein Muhammed Abdu Al-Nashiri, Majid Shoukat Khan, Abd al Hadi al-Iraqi, and Ahmed Mohammed Ahmed Haza al Darbi. To address our first objective, we reviewed relevant guidance, policies, and regulations related to public access to military commissions’ proceedings. We attended military commissions’ proceedings at U.S. Naval Station Guantanamo Bay (NSGB) from April 30, 2018, to May 4, 2018 to observe how the public accessed and viewed the proceedings, in person. During this visit we also visited the facilities relevant to public access. For example, in the Expeditionary Legal Complex, where proceedings are held, we inspected the courtroom where hearings occur, discussing the equipment used to facilitate the 40-second delay used to ensure that classified information is not transmitted to Closed Circuit Television (CCTV) sites during open hearings. We also inspected the gallery, from which the public watches hearings. In addition, we visited facilities where certain of the accused are detained, discussing with DOD officials the access granted by the department to visiting victims and family members and non-government stakeholders. We also discussed key issues with DOD officials, such as the Chief Prosecutor and the Military Commissions Defense Organization. To observe how the public utilized remote viewing sites we viewed military commissions’ proceedings remotely at one CCTV site, and visited another. These include Fort Meade, Maryland, which is a site for victims and their family members, as well as being the site for use by the media, non-governmental organizations, and members of the general public. In addition, we visited the Norfolk Naval Station, Virginia CCTV site, which is open to victims and family members only. In addition to watching the hearings, we spoke with Office of Military Commissions (OMC) representatives at the sites regarding their responsibilities and they provided us with an overview of how the sites operate. In addition, to determine what information was available on OMC’s public website and how it is organized, we reviewed its content, including the portion of the site reserved for victims and their family members. Further, to obtain information on how public access is provided in federal criminal courts, we conducted interviews with officials from the Department of Justice and the Administrative Offices of the U.S. Courts, also discussing with these organizations whether they provided support to DOD’s public access procedures for the commissions’ proceedings. To address our second objective, we reviewed applicable sections of the U.S. Constitution, relevant case law, executive orders, DOD guidance and reports from experts on public access to military commissions’ proceedings to understand the role that current laws, policies, and judicial precedence play in decisions about public access to military commissions’ proceedings. We then took selected examples of public access issues at military commission proceedings and compared them to the access afforded to the public at terrorism trials held in U.S. federal courts. To identify and understand any challenges facing public access, we obtained the perspectives of both victims and their family members and other non-government stakeholders on any challenges associated with public access to commissions’ proceedings. We developed a non- generalizable survey to obtain perspectives on public access from a sample population of victims and their family members associated with terrorist attacks being adjudicated by military commissions’ proceedings, such as the attacks on the USS Cole and September 11, 2001. See appendix II for further details regarding our survey of victims and family members. We also developed a standardized set of 10 questions that was used to obtain the perspectives of 55 selected non-government stakeholders on challenges to public access to military commissions’ proceedings. The questions were delivered to these stakeholders in the form of a self- administered questionnaire. To identify the non-government stakeholders included in our review, we first obtained a list of the non- governmental organizations that DOD has approved to observe military commissions’ proceedings in-person at NSGB. These organizations include victim advocacy groups, universities, civic organizations, and independent professional associations. During the course of our review, we identified additional individuals with relevant expertise, such as legal and national security policy experts and members of the media whom we also asked to complete our self-administered questionnaire. We pre-tested the self-administered questionnaire with four non- government stakeholders to ensure functionality and ease of understanding—after which we distributed the questionnaires via email to the remaining non-government stakeholders included in our review. Of the 55 non-government stakeholders who received our questionnaire, 25 completed it. The analysis was conducted by two analysts who reviewed and coded responses according to a pre-determined coding scheme. A third analyst was used to reconcile any conflicting conclusions from the first two analysts. The results of our analysis were used to describe non- government stakeholders’ perspectives in the report, as appropriate. We supplemented data obtained through our survey and self-administered questionnaire with interviews of victims and their family members, DOD officials, and observers from non-governmental organizations to better understand their perspectives. To assess the timeliness of information posted on OMC’s website, we gathered and analyzed data from an inter-agency review team that reviews documents to be posted on OMC’s website, as well as the website itself. In regard to data from the inter-agency review team, we obtained and analyzed data on when court documents were filed with OMC and the date on which the inter-agency review team returned them to OMC for posting; comparing that amount of time to a timeliness standard laid out in DOD’s Regulation for Trial by Military Commission (Regulation). According to the Regulation, DOD is supposed to post documents to the OMC website generally no later than 15 business days after documents have been filed with OMC’s Trial Judiciary, known as the “file date.” In regard to our analysis of data from OMC’s website, we collected this information using a “web-scraping tool” that we developed to regularly visit OMC’s website and capture data about a court document’s file date and the date on which it was posted on OMC’s website. We selected these two dates because they allowed us to compare the time DOD took to post court documents to the department’s timeliness standard. Using our analysis of data from the review team and OMC’s website, we determined the extent to which DOD posted court documents in a timely manner. Please refer to appendix III for additional details on the scope and methodology for our collection of data using the web-scraping tool and our analysis of these data. For data provided by DOD, we performed a number of assessments. As a result of discussions with the Defense Intelligence Agency about the timeframes and completeness of available data, the agency clarified timeframes and explained why the data are not fully complete. As a result of these assessments, we determined that data from DOD on timeliness of information posted to the commissions’ website are sufficiently reliable to serve as one of several sources of information used to determine that DOD faces challenges in the timeliness with which it posts court documents to the commissions’ website. In addition, through discussions with OMC officials about the way information is added to the commissions’ website, we determined that the data we independently collected and analyzed from the website are sufficiently reliable to serve as another source of information used in our determination of challenges that DOD faces. To address our third objective, we reviewed relevant reports to identify potential options for expanding public access to commissions’ proceedings and any concerns associated with doing so. To determine potential options for expanding public access to the commissions’ proceedings, we obtained the perspectives of victims and their family members, other non-government stakeholders, and DOD officials on (1) what potential options for expansion or improvement exist, and (2) any associated concerns with potential options for expansion or improvement. We conducted a survey of victims and their family members to determine the extent to which respondents support various options for expanding public access and their views on the timeliness of court document postings to OMC’s website. Similarly, we provided standardized question sets to non-government stakeholders and analyzed responses from the completed questionnaires to determine the extent to which respondents support various options for expanding public access as well as their views on other issues, such as the timeliness with which court document are posted to OMC’s website. Further, to examine the potential risks associated with these options for expansion—and ways to mitigate those risks—we discussed these potential options with DOD officials. Finally, we asked OMC officials to identify any DOD-led efforts to assess the current level of public access to commissions’ proceedings. We then compared any related efforts with Standards for Internal Control in the Federal Government, which state that agencies should identify and analyze risks related to achieving its defined objectives, and to develop leading practices for sound strategic management planning. Further, we compared any related DOD efforts to leading practices of effective federal strategic planning, which we derived in part from the Government Performance and Results Act (GPRA), as updated by the GPRA Modernization Act of 2010, associated guidance, and our prior work. To assess the extent to which DOD has applied selected principles of effective federal strategic planning in its facilitation of public access to military commissions’ proceedings, we compared actions DOD has taken to address challenges that it faced with meeting its goal of maximizing public access, consistent with the interests of national security, to these leading practices of effective federal strategic planning. We conducted this performance audit from January 2018 to February 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To obtain information about the perspectives of victims and their family members on public access to military commissions’ proceedings, we administered a survey to the memberships of three victim’s organizations. In the survey questionnaire, we asked victims and their family members to provide their perspectives on the different ways they access information about, or participate in viewing military commissions’ proceedings. We administered the survey from July to September 2018. A reproduction of the questions and answers in the questionnaire and aggregate responses from the survey are included in this appendix. We informed our methodology approach and survey development through interviews and other communications with representatives from eight victim’s organizations. From these interviews we gathered information from the organizations about their membership, such as, the number of members, criteria for becoming a member, and how information about the members was recorded and stored. We also ascertained their willingness to share contact information for their membership with us for the sole purpose of administering the survey. We defined and identified the survey’s target population of victims and family members through interviews with victims’ organizations whose memberships were impacted by the attack on the USS Cole, the events of 9/11, or other terrorist attacks for which there are military commissions cases being tried or that have been completed. Our survey population was composed of the memberships of the Department of Defense’s (DOD) Victim and Witness Assistance Program (VWAP) (1,928 eligible members), which includes victims who were impacted by the attack on the USS Cole, the events of 9/11, or other terrorist attacks, for which Hadi Al-Iraqi is accused, as well as Massachusetts 9/11 Fund, Inc. (470 eligible members), and 9/11 Families for Peaceful Tomorrows (200 eligible members). Membership in these organizations, and inclusion in our survey population, was limited to those family members or surviving victims who chose to join one or more of these organizations. In addition, we added 42 other qualifying victims and family members (who may not have been members of the three organizations) that we identified in answers to a survey question that respondents were asked. Our survey’s population totaled 2,640 victims and family members, and we attempted to contact each one in our survey. Our survey population was limited to the memberships of these organizations because of concerns from some other victims’ organizations about the applicability of their data. However, many more people were significantly impacted by the events of 9/11 than are represented in our survey population. For example, according to the World Trade Center Health Program there are 88,484 individuals who have received medical treatment for 9/11 related injuries or illnesses. Thus, the survey results presented in the body of this report represent the views of only those responding, and are not generalizable to any broader population because it is difficult to determine with certainty the total population that was impacted by the events of 9/11 and would therefore have an interest in access to military commissions’ proceedings. We informed the development of our methodological approach and the actual questionnaire through four meetings with eight victims and their family members during our visit to Naval Station Guantanamo Bay (NSGB). In these meetings, we piloted an interviewer administered questionnaire that included items that (1) related to their views on various topics related to the military commissions’ proceedings, and (2) solicited input on the best approaches for gathering the views of victims and family members. These meetings confirmed that a survey would be a valuable method for gathering the views of a broad range of victims and family members and informed the development of a draft instrument for further pre-testing. In developing, administering, and analyzing this survey, we took steps to minimize the five types of potential errors that the practical difficulties of conducting any survey may introduce. Because we surveyed all members of the population we identified, there was no statistical uncertainty in our estimates due to sampling error. A different issue, measurement error, can result from differences in how a particular question is interpreted, and the sources of information available to respondents. We conducted 4 pre- tests of the draft questionnaire with 4 victim family members and made revisions to (1) ensure that survey questions were clear, (2) obtain any suggestions for clarification, (3) determine whether victims and their family members would be able to provide responses to questions with minimal burden, and (4) ensure that the survey was comprehensive and unbiased. We also provided GAO contact information in our communications for respondents who had questions about the survey or experienced technical problems. To minimize the effects of coverage error—the exclusion of some eligible members of the population, duplicate responses, or inclusion of ineligible members—we consulted the three victims’ organizations to determine the coverage of their membership lists and what survey methodology options for contacting them existed based on their willingness to provide us with contact information for their membership. All three of the organizations preferred to retain their member contact information citing privacy concerns, but agreed to send their membership unique usernames and passwords provided by GAO via email that their members could use to access the survey. Additionally, DOD VWAP also agreed to send postal mail questionnaires provided by GAO to approximately 500 of their members who did not have email addresses on record. GAO also provided an introductory email or letter, and postal questionnaires. Survey respondents received the email and used their associated username and password to access the survey website, and before opening their questionnaire, were required to change their password to further prevent unauthorized access to their responses. Those respondents who received postal mail questionnaires were given the option to complete the paper questionnaire or to log into and complete the web-based version. Because we did not obtain contact information from the organizations we worked with we were unable to determine if more than one survey was sent to any of the respondents. For example, if a respondent was a member of both 9/11 Families for Peaceful Tomorrows and DOD VWAP it is possible that they would have received two sets of unique usernames and passwords. However, we did include statements in the introductory email that directed respondents to disregard the email if they had already received a copy of the survey. Non-response error can result when a survey fails to capture information from all population members selected into the survey. To encourage survey response, for emails that were undeliverable, their respective organizations contacted them via telephone and attempted to obtain new email addresses. We were also able to send reminder emails out to respondents who were members of the two private victims’ organizations. However, DOD VWAP preferred not to send reminder emails to its members because of concerns of being overly intrusive. In an effort to increase the number of respondents to the survey we included a question asking respondents if they wanted to provide contact information for any other victims and family members who might be eligible to respond to the survey, and we administered the survey to them as well. We received 248 responses to the 2,640 questionnaires that were sent out, which after removing two ineligible population members confirmed to have died, resulted in a response rate of 9.4 percent. We anticipated a fairly low response rate because in our discussions with the leadership of each of the victims’ organizations they had pointed out that this population was quite private. In addition, the issues were sensitive, and not all organization members may wish to engage in discussions or surveys regarding activities related to the terrorist events. There were 70 responses by mail and the remaining 178 responses were to the web based survey. Also, there were 11 partial, but usable responses and 22 partial, but not usable responses. Finally, to limit the possibility of processing error, survey responses were checked for invalid or illogical answer patterns, and edits were made as necessary. All analysis programming was verified by a separate data analyst. Reproduced below are the questionnaire text and question and answer wording presented to victims and family members in our survey. The percentage of responses for each answer to a question is displayed. Not all 248 respondents to the survey answered each question—some questions were only asked of a subset of respondents giving a qualifying answer to an earlier question, and not all qualifying respondents may have answered a particular question. Percentages may not sum to 100 percent due to rounding. Narrative answers to open-ended text questions are not displayed for brevity and to limit the possibility of identification of individual respondents. This survey is being done by the Government Accountability Office, or GAO. GAO is sometimes called the Congressional Watchdog because it reviews federal programs for the United States Congress. Congress directed us to consider if it’s possible, and a good idea, to expand the public’s access to Military Commission proceedings (usually referred to as hearings) that are open to the public. As part of this effort, Congress also asked us to speak with those affected by terrorism and their families. We are very appreciative of your willingness to respond to this survey. We will combine your answers with those of many others, and we will not publish any information that could identify you. We will not share any identifiable information from this survey unless required by law or a member of Congress. If you have any questions about this survey, or the GAO study, please contact ________, an analyst on this study, at proceedings@gao.gov ________. 1. To better understand your perspective on the events of 9/11 or the attack on the USS Cole, which one of the following best describes you? Family member of a victim (parent, sibling, daughter, son) Family member of a victim (aunt, uncle, niece, nephew, grandparent) We used these data collected from the commissions’ website in three analyses, as discussed below. Analysis, as of June 19, 2018: According to our research, the first document recorded as being filed with the Trial Judiciary, and included in our scope, on the current OMC website has a file date in April of 2011. On June 19, 2018, we began data collection using the web-scraping tool, as described above. While the website provides a file date for all documents, the website does not provide a date when documents are uploaded. Thus, for documents uploaded before June 19, 2018, we were not able to assess the Department of Defense’s (DOD) timeliness performance with data from the web-scraping tool. However, our analysis as of June 19, 2018, allowed us to asses other aspects of performance. Specifically, we determined the following: On June 19, 2018, the number of documents that had been filed with the Trial Judiciary, number that had been uploaded, or number that had yet to be uploaded. On June 19, 2018, the number of documents that had not been uploaded within 15 business days of the file date. We refer to these documents as having missed DOD’s 15 business day timeliness standard. On June 19, 2018, for documents that missed the 15 business day standard, the median number of days that they were uploaded after the timeliness standard. On June 19, 2018, DOD’s performance in these parameters, for five different types of court documents: motions, rulings, transcripts from open hearings, transcripts from closed hearings, and docket-related documents. Recent performance analysis, June 19 to November 19, 2018: While the website does not provide a date when documents are uploaded, our web-scraping tool provided this information for each document uploaded on or after June 19, 2018. Thus, for the five months we used the tool, we were able to assess DOD’s timeliness performance for each document filed with the Trial Judiciary or uploaded. For these documents, we determined the following: The number and percentage of documents that were uploaded after DOD’s 15 business day timeliness standard. For documents uploaded after the 15 business day standard, the median number of days that the standard was missed. DOD’s performance in these parameters, for five different types of court documents: motions, rulings, transcripts from open hearings, transcripts from closed hearings, and docket-related documents. Docket availability analysis, June 19 to November 19, 2018: According to DOD guidance and an OMC official, there is a set of documents that list the legal motions on which the military judge plans to hear arguments from the prosecution and defense during a specific hearing. We refer to these documents as docket-related documents. This set of documents includes dockets and amended dockets, among others, that are a sub-category of all the court documents that we discuss in this report. For hearings that occurred during the five months in which we used the web-scraping tool, we reviewed the commissions’ public website to identify hearings that occurred during this timeframe, cross-referencing the hearings with the posted court documents to identify docket-related documents related to these hearings. Because docket-related documents for a specific hearing share an alphanumeric designation, we were able to use this information to determine DOD’s timeliness performance for posting docket-related documents for these five hearings. For these documents, we determined the following: For each hearing that occurred from June 19, 2018, whether the relevant docket-related documents for a hearing were posted at least one day before the hearing for which those docket-related documents list the motions to be argued in the hearing. In addition to the contact named above, Kimberly Mayo, Assistant Director; Tracy Barnes; Kathryn Bassion; Steven Campbell; Signe Janoska-Bedi; Jill Lacey; Ronald La Due Lake; Amie Lesser; Ying Long; Ned Malone; Samuel Moore; Christina Murphy; Samuel Portnow; Carl Ramirez; Clarice Ransom; Paul Seely; Chris Turner; and John Van Schaik made key contributions to this report.", "summary": "DOD is in the pre-trial phase of the military commissions' proceedings it is conducting to try the alleged perpetrators of terrorist attacks on the USS Cole and September 11, 2001. The Military Commissions Act of 2009 specifies that proceedings shall be publicly held unless the judge makes findings that justify a closed session, such as national security concerns. The National Defense Authorization Act for Fiscal Year 2018 included a provision for GAO to study the feasibility and advisability of expanding access to commissions' proceedings that are open to the public. This report describes (1) how DOD currently facilitates public access to proceedings; (2) challenges the public faces in gaining access to or obtaining information on proceedings; and (3) what is known about potential options to address public access challenges, including any related tradeoffs. GAO analyzed relevant laws and guidance; conducted a non-generalizable survey that received responses from 248 victims of terrorist attacks and their family members; collected data from DOD's website to analyze timeliness of court document postings; and interviewed relevant DOD officials and other government and non-government stakeholders. The Department of Defense (DOD) currently facilitates public access to and information about military commissions' proceedings at Naval Station Guantanamo Bay (NSGB) in Cuba by: communicating directly with victims and their family members about hearings; enabling selected members of the public to view proceedings in-person; providing five sites in the United States to view proceedings remotely via closed circuit television (CCTV); and making information such as court documents available on the Office of Military Commissions' website. The public faces various challenges in gaining access to military commissions' proceedings or obtaining information about them. First, some aspects of the proceedings limit public access, but addressing them is largely outside of DOD's control. For example, proceedings, by law, are held on NSGB—a location that is largely inaccessible to the general public. Further, cases currently before the military commissions have spent 4-10 years in pre-trial hearings with trials yet to be scheduled, which some suggest has lessened media coverage and public visibility. Second, there are other challenges that DOD officials have acknowledged that they have a greater ability to address. For example, the courtroom gallery is limited to 52 seats for those permitted to travel to NSGB. Additionally, all five CCTV sites are located within a span of 600 miles on the East Coast of the United States. However, victims and their family members—the primary intended users of these sites—often live a significant distance from these locations. A number of options may potentially address some of the public access challenges identified. DOD could potentially expand the viewing gallery to accommodate more people as part of an ongoing project to renovate the NSGB courtroom. However, DOD officials cautioned that it would require a commensurate increase in the lodging needed to house more visitors, which may not be supported by current levels of resources. Further, DOD has two potential options for addressing challenges with the remote viewing of proceedings. First, DOD could potentially increase the number and geographic dispersion of CCTV sites. Second, DOD could potentially maximize public access by broadcasting proceedings via the television or internet. DOD officials acknowledged that both options are possible and likely would require a relatively small outlay of resources. However, broadcasting proceedings via the television or internet is currently prohibited by DOD's regulation, and DOD officials were especially concerned with the security implications of this option. DOD has not assessed the tradeoffs nor identified or analyzed the risks of options for expanding public access to military commissions' proceedings. Consequently, DOD has not developed a strategy to address challenges or identified the resources needed to achieve its public access goals. Until DOD does so, it cannot be sure that it is meeting its goal of maximizing public access and may not be prepared for the potential increased demand for public access that is anticipated when proceedings move into the trial phase. GAO recommends that DOD identify and analyze the risks associated with potential options for expanding public access to proceedings, and develop a strategy, as appropriate, for how it will meet its public access goals with the expected increase in public interest. DOD concurred with the recommendation.", "document_type": "gao"}
{"report": "Overall, component agencies reviewed proposals and notified awardees within the required time for 12,890 of the 15,453 SBIR and STTR awards that we reviewed (84 percent), for fiscal years 2016 through 2018. The Small Business Act and SBIR/STTR policy directive require most agencies notify applicants of the agency’s decision within 90 calendar days and require NIH and NSF do so in 1 year. Agencies notified awardees after the required time period for 2,533 of 15,453 awards (16 percent). Three of the 28 component agencies met the notification requirement for every award in the data we reviewed, and nine additional component agencies did so for at least 90 percent of their awards. The remaining 16 component agencies met the notification requirement for less than 90 percent of their awards. Table 2 lists the mean and median notification times and the percentage of awardees notified within the required time period for each component agency. Some notifications occurred within days after the required time period, while others occurred months later. For example, all of the notifications by the Department of Education from fiscal year 2016 through 2018 that took longer than 90 days occurred in 91 days. Department officials attributed the one day difference to interpreting the 90-day requirement as a 3- month requirement. Similarly, all of the notifications for Army STTR awards that occurred after the 90-day requirement occurred within 92 days. Of the 2,533 awards with notifications after the required time, notifications occurred on average about 1 ½ months later. During the 3 fiscal years that we reviewed, some component agencies had substantial changes from year to year in the percentage of awardees that they notified within the required time period, while other component agencies consistently notified about the same percentage of awardees. For example, the Department of Energy’s Office of Science and the Army SBIR program each had a single fiscal year during which they notified less than 50 percent of awardees within the required time period, substantially less than during the other fiscal years we examined. Table 3 describes the percent of awardees notified within the required time by each component agency for each of the 3 fiscal years we examined. Agency officials described several factors that affect the time spent reviewing proposals and notifying awardees, including (1) the availability of reviewers, (2) the number of proposals to review, and (3) other agency- specific factors. Availability of reviewers. Officials from some component agencies we interviewed said the availability of agency staff or external reviewers affected the time they spent reviewing proposals. For example, USDA officials told us that the agency cannot notify awardees within 90 days because they need additional time to identify and recruit experts for their external peer review system. USDA officials compared their review process to that of the NSF and NIH, the two agencies that are directed to complete proposal review and notification within 1 year. Similarly, Navy officials said that the availability of reviewers was the biggest variable in completing their proposal review and notification process. These reviewers are Navy employees who contribute part of their time to reviewing SBIR and STTR proposals while continuing to perform their regular duties. According to Navy officials, although they give reviewers deadlines based on the number of proposals they have to review, conflicts with their regular duties or higher priority tasks may cause reviewers to miss their deadlines. In contrast, Department of Education officials said that they identify and train reviewers before the agency receives proposals so that the reviews may begin as soon as possible. Other agencies, however, may not know what areas of expertise reviewers will need until the agency has examined the proposals it received. Number of proposals. Officials from some component agencies we interviewed said the number of proposals they receive affected the time spent reviewing proposals and notifying awardees. For example, officials from the Department of Transportation said that the number of proposals they receive can range between two and 40, which makes it difficult to predict the workload of agency evaluators who perform the proposal reviews. Similarly, National Institute of Standards and Technology officials said that the number of proposals they receive fluctuates from year to year. Because agencies must review all proposals that meet the minimum requirements, an increase in the number of proposals directly increases the workload of proposal reviewers. Other agency-specific factors. Some component agency officials identified factors specific to their agency or process as factors affecting the time needed. For example: Two component agencies within the Department of Health and Human Services—the Centers for Disease Control and Prevention (CDC) and Food and Drug Administration (FDA)—notified none of their awardees within the required time in fiscal years 2016 through 2018. CDC and FDA participate in the solicitation and review process led by the NIH. However, while the NIH has 1 year to notify awardees, these agencies are required to notify awardees within 90 calendar days. CDC officials said that participating in the longer NIH program is more efficient than creating their own review process and allows them to leverage additional programs at NIH that support small business awardees. Environmental Protection Agency officials told us that their review process includes three consecutive reviews, which leads the agency to regularly request waivers to exceed the 90-day notification requirement. These reviews include an administrative review for responsiveness to the solicitation, an external peer review process, and an internal review by the SBIR program office. Some agency officials also identified continuing resolutions, sequestration, or government shutdowns as factors that could slow proposal review. Proposal review and notification activities could be affected because the availability or amount of funds for agency activities is uncertain in these instances. For example, a Defense Microelectronics Activity official told us that their agency generally completes its proposal review process within 90 days, but does not notify awardees until it has determined funding availability for awards later in the fiscal year. National Institute of Standards and Technology officials described a delay notifying one awardee, a replacement awardee, due to the initial awardee being determined ineligible during a pre-award assessment. The agency made a replacement selection immediately, but this replacement awardee was notified approximately 20 days after the 90-day requirement. Overall, component agencies issued 11,710 of the 15,453 awards we reviewed (76 percent) within the recommended time period, for fiscal years 2016 through 2018. The SBIR/STTR policy directive recommends that most agencies issue an award within 180 days and recommends that NIH and NSF do so in 15 months. Agencies issued 3,743 of the 15,453 awards (24 percent) after the recommended time period. Three of 28 component agencies issued every award in the data we reviewed within the recommended time, and five additional component agencies did so for at least 90 percent of their awards. The remaining 20 component agencies issued less than 90 percent of their awards within the recommended time period. For the 3,743 awards that agencies issued after the recommended time period, the average award was issued about two and a half months after the recommended time. Table 4 lists the mean and median award issuance times and the percent of awards issued within the recommended time for each component agency. During the 3 fiscal years that we reviewed, some component agencies had substantial changes from year to year in the percentage of awards they issued within the recommended time period, while other component agencies consistently issued about the same percentage of awards within the recommended time period. For example, the Department of Energy’s Advanced Research Projects Agency-Energy issued no awards within the recommended time in each of the three years we examined. Table 5 describes the percent of awards issued within the recommended time period by each component agency for each of the 3 fiscal years we examined. Agency officials described several factors that increased the time spent issuing awards, including (1) additional time needed to issue certain types of contracts, (2) the availability of grants and contracting officers, (3) delays coordinating among agency officials, (4) the responsiveness of awardees, and (5) the availability of funding for the awards. Cost reimbursement contracts. Officials from some component agencies we interviewed said that the contract type was a factor that affected the time needed to issue SBIR and STTR awards. Specifically, officials said cost reimbursement contracts took longer to issue because of the need to review the awardee’s accounting system in accordance with federal acquisition regulations. For example, officials from the Defense Advanced Research Projects Agency (DARPA) said cost reimbursement contracts routinely take more time to award than fixed- price contracts because of this accounting system review. According to DARPA officials, this review can add 45 days or more to the awards process. In February 2019, we found that the Department of Defense does not have a mechanism to monitor and ensure that contractor business system reviews and audits are conducted in a timely manner and recommended that the department develop such a mechanism. Our analysis of the SBIR and STTR award data confirmed that component agencies spent more time issuing awards identified as cost reimbursement contracts than issuing fixed price contracts. We found that SBIR and STTR awards identified as cost reimbursement contracts in the fiscal year 2016 through 2018 data took significantly longer to issue than those identified as fixed-price, as shown in figure 1. Fixed-price contracts took on average 152 days and cost reimbursement contracts took 231 days (79 days longer). Cost reimbursement contracts also took on average 40 days longer than contracts that were not specified as fixed or cost reimbursement. Availability of grants or contracting officers. The availability or experience of agency staff to negotiate the contract or grant can be a factor, according to some component agency officials. First, some officials said limited availability of grants or contracting officers was a factor in the time to issue awards and may result in delays. For example, officials from both Army program offices said that the workload for contracting officers is high, and SBIR and STTR awards are part of a larger contracting backlog. Similarly, officials from the National Institute of Standards and Technology and National Oceanic and Atmospheric Administration also said that the availability of grants and contracting officers is a pervasive issue for federal agencies that can affect award timeliness. Second, officials from some component agencies said that the contracting officer’s level of experience with small business awards affects the time needed to issue SBIR and STTR awards. Coordination among agency officials. Air Force officials said that the need for coordination among agency officials, such as between the contracting officer and proposal evaluators, can create delays. Because the proposal review and award process can require coordination among multiple officials who are not always immediately available, delays may occur as one official waits for input or information from another. Beginning in fiscal year 2018, the Air Force made changes to its proposal review and award process for a subset of awards that included scheduling dedicated time for reviewers, contracting officers, and other agency officials to jointly evaluate proposals and process awards. This change guaranteed the availability of agency officials and reduced the time needed for coordination among these officials. Overall, it allowed the agency to issue awards within a few days or weeks. According to agency officials, the Air Force awarded about 150 awards in 2018 through this process and they expect about one-third of Air Force awards in fiscal year 2019 and half of awards in fiscal year 2020 will use this expedited process. Responsiveness of awardees. Some component agency officials said that the responsiveness of the small business was a factor in delays. For example, officials from USDA said that the majority of SBIR grantees at USDA are first-time grantees who have never worked with the federal government, and this can extend the time it takes to issue the award. In order to receive an SBIR or STTR award, the small business must, among other things, submit a certification that it meets size, ownership, and other requirements. Delays in providing these certifications or other information required by the awarding agency can therefore delay award issuance. In our July 2018 report that reviewed DOD’s weapon-systems- related contracts awarded from fiscal year 2014 through fiscal year 2016, contracting officials stated that quicker contractor responses to requests for additional information could help reduce the time between when a solicitation is issued to when a contract is awarded. Availability of funding. Some component agency officials said that delays in determining the amount of funding available for small business awards due to continuing resolutions or delays in intradepartmental fund transfers may delay the issuance of awards. For example, NASA officials said that they estimate the agency’s R&D budget at the start of the fiscal year to calculate the amount required for SBIR and STTR awards. According to these officials, if NASA is operating under a continuing resolution at the start of the fiscal year, the estimate may be smaller than the final appropriated amounts. In this case, NASA would go back to its proposals to make additional awards from the pool of proposals that were rejected under the original estimate, and this would lead to longer issuance times for some awards. We provided a draft of this report to SBA and the 11 agencies that participated in the SBIR and STTR programs in fiscal years 2016 through 2018 for their review and comment. The SBA, Department of Defense, and Department of Education provided written comments that are reproduced in Appendix II, III, and IV. In addition, the Department of Energy, the NIH within the Department of Health and Human Services, Department of Transportation, and the National Institute of Standards and Technology within the Department of Commerce provided technical comments, which we incorporated as appropriate. The remaining agencies told us they had no comment. In its formal comments, the Department of Education stated that it has taken steps to ensure that future awardees will be notified within the required period. In their comments, SBA and the Department of Defense suggested phase I and II awards should be evaluated separately in future reports. In this report, we combined phase I and II awards because we did not find a statistically significant difference in notification time between phase I and II awards in the fiscal year 2016 through 2018 data that we examined. However, some analyses showed that phase II awards took longer to issue. We may further examine differences between phase I and phase II awards in subsequent reports. SBA also described the importance of minimizing delays between phase I and phase II awards. We did not evaluate the time between phase I and subsequent phase II awards in this report, but agree that the time between awards may be of interest in future reports because, as noted by SBA, the time between awards may affect small businesses' ability to retain key personnel. SBA also sought explanations for various dates and figures used in our analysis and we updated the report to include the definitions used when collecting award data and to describe our figures in more detail. The Department of Defense also stated that the SBIR and STTR policy directive does not explicitly include phase II awards in its 90 and 180-day timeliness requirements. However, we confirmed with SBA—the agency that issues the directive—that the 90-day requirement for notification of selection and the 180-day recommendation for award issuance apply to both phase I and phase II awards. The Department of Defense further stated that subsequent phase II awards could occur several years after the end of the initial phase II award and should not be included in the analysis of phase II awards. In this report, we took steps to eliminate these outliers from the data. We are sending copies of this report to the appropriate congressional committees, the Acting Administrator of the SBA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6888 or neumannj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This appendix describes the awards made by agencies participating in the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs, based on the data provided to GAO for fiscal years 2016 through 2018. These data include figures showing the (1) proposal review and notification time, (2) award issuance time, and (3) distribution of awards by fiscal year and phase. The fiscal year and phase figure describes the number of phase I and phase II awards issued in fiscal years 2016 through 2018 and is based on the first year of the award activities. For example, if an agency obligated funding to a phase II award in fiscal years 2017 and 2018, the award is counted among the fiscal year 2017 phase II awards. NIST participated in SBIR only. NOAA participated in SBIR only. Air Force participated in SBIR and STTR. Small Business Award Timeliness (Fiscal Year 2016-2018 Awards) Small Business Award Timeliness (Fiscal Year 2016-2018 Awards) Navy participated in SBIR and STTR. MDA participated in SBIR and STTR. DARPA participated in SBIR and STTR. DHA participated in SBIR and STTR. SOCOM participated in SBIR and STTR. DLA participated in SBIR and STTR. DTRA participated in SBIR and STTR. CBD participated in SBIR and STTR. NGA participated in SBIR and STTR. DMEA participated in SBIR and STTR. Education participated in SBIR only. Office of Science participated in SBIR and STTR. ARPA-E participated in SBIR and STTR. NIH participated in SBIR and STTR. CDC participated in SBIR only. FDA participated in SBIR only. DHS S&T participated in SBIR only. DNDO participated in SBIR only. DOT participated in SBIR only. EPA participated in SBIR only. NASA participated in SBIR and STTR. NSF participated in SBIR and STTR. USDA participated in SBIR only. In addition to the contact named above, Rob Marek (Assistant Director), Tind Shepper Ryen (Analyst-in-Charge), Nora Adkins, David Aja, Jenny Chanley, Robert Letzler, Anika McMillon, Amanda Postiglione, and Ben Shouse made key contributions to this report.", "summary": "Since the SBIR and STTR programs began in 1982 and 1992, respectively, federal agencies have awarded at least 162,000 contracts and grants totaling around $46 billion to help small businesses develop and commercialize new technologies. Eleven agencies participate in the SBIR program and five of them also participate in the STTR program. Each agency issues a solicitation requesting proposals at least once a year. Agencies then review proposal submissions and issue awards using grants or contracts. The SBIR and STTR policy directive recommends that most agencies issue awards no more than 180 calendar days from solicitation close. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to report on the timeliness of agencies' SBIR and STTR proposal review and award issuance. This report examines the time agencies spend issuing SBIR and STTR awards and the factors that affect the time spent, among other things. Within the 11 agencies, GAO reviewed 28 component agencies that participate in these programs. GAO analyzed agency-provided award data from fiscal years 2016 to 2018 for 15,453 awards and interviewed officials from the Small Business Administration and 26 of the component agencies. In fiscal years 2016 through 2018, agencies issued 11,710 of the 15,453 Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) awards we reviewed (76 percent) within the recommended time period. However, component agencies varied in the percentage of awards that they issued within the recommended time (see figure). Agency officials described a number of factors that can affect award issuance timelines, including: Some agencies use cost reimbursement contracts, which require additional agency review under federal acquisition regulations. Some contracting officers have limited expertise in issuing SBIR and STTR awards and their overall workloads can be heavy. Small businesses may be slow to respond to agency requests for information, such as requests for information needed to meet government contracting requirements.", "document_type": "gao"}
{"report": "States have flexibility within broad federal requirements to design and implement their Medicaid programs. For example, while states must cover certain mandatory groups and benefits, they have the option to cover certain other groups of individuals and benefits. States’ Medicaid plans outline the services provided, the populations covered by their programs, and how they implement and comply with other federal requirements. States share responsibility for oversight of Medicaid eligibility with CMS. States are primarily responsible for assessing applicants’ eligibility for, and enrolling eligible individuals into, Medicaid. These responsibilities include verifying individuals’ eligibility at the time of application, performing redeterminations of eligibility, and promptly disenrolling individuals who are no longer eligible. In verifying individuals’ eligibility, states must assess specified financial and nonfinancial information. Financial: Individuals applying for Medicaid generally must have an income below a certain limit. PPACA requires states to calculate the income for most nondisabled, nonelderly applicants using a uniform method based on modified adjusted gross income (MAGI), which is derived from a federal tax-based definition of income. States have more flexibility in determining how to calculate incomes for individuals whose eligibility is determined on the basis of age or disability, because their income is not calculated using MAGI-based methods. For example, states may disregard certain types or amounts of income for these MAGI-exempt populations. Additionally, individuals eligible on the basis of age or disability generally must also have assets—cash or real or personal property that are owned and can be converted to cash—below specified standards that vary by state. Nonfinancial: Individuals applying for Medicaid must also satisfy certain nonfinancial criteria. For example, to be eligible for Medicaid individuals generally must be residents of the state in which they are applying and must be either citizens of the United States or certain noncitizens, such as lawful permanent residents. States generally have flexibility in the sources of information they use to verify applicants’ financial eligibility and citizenship or immigration status. However, to the extent practicable, states must use third party sources of data for these verifications prior to requesting documentation from the applicant. When data from reliable third party sources are inconsistent with information from an application, the state must have processes in place to resolve these inconsistencies, such as through requesting additional documentation or accepting the applicant’s attestation. Additionally, states may accept self-attestation for some eligibility criteria, such as residency in the state and household composition (which is used in determining if applicants’ income is below the limit). Once a state determines that an individual meets relevant financial and nonfinancial eligibility criteria, the state enrolls the individual into Medicaid under one basis of eligibility. Examples of bases of eligibility include those applicable to children, pregnant women, individuals eligible for Supplemental Security Income (SSI)—a program that provides cash assistance to low-income adults and children with disabilities—and other low-income adults under age 65 in states that expanded their Medicaid populations under PPACA. (See table 1.) Since individuals may meet the criteria for more than one category and eligibility group, they could have more than one basis of eligibility. For example, a child who is pregnant could meet the criteria applicable to children and those applicable to pregnant women. However, a state would enroll each individual under one basis of eligibility. CMS regulations specify that when states determine applicants eligible based on MAGI criteria, they must notify these individuals of the benefits and services available through any MAGI-exempt bases of eligibility for which they may qualify, in order to provide the individual information about whether to request a MAGI-exempt eligibility determination. However, CMS officials explained that they advise states that they do not need to inform applicants of benefits and services under other eligibility groups if there is no meaningful difference in the benefits or cost-sharing that the individual would receive under one basis compared to another. CMS officials also noted that they have provided further guidance to states on assigning bases of eligibility, including that if an individual meets the criteria for more than one basis, the state should enroll the person into the most beneficial coverage in terms of factors such as the benefit package and out-of-pocket costs. In 2014, CMS issued a framework based on federal rules for states to use in developing their systems to assess individuals’ bases of eligibility. The framework describes a hierarchy for states to use in developing their eligibility systems that begins with bases related to receipt of other federal benefits, such as SSI and federally funded foster care and adoption assistance, which often result in automatic eligibility for Medicaid. Following these bases of eligibility, states are to assess eligibility for bases subject to MAGI-based income rules, and should first evaluate for mandatory coverage before evaluating for optional coverage. Federal rules allow for some exceptions to this sequence, such as when an individual who may be eligible for bases subject to MAGI-based income rules requests consideration under a MAGI-exempt basis to access certain additional benefits, such as long-term services and supports. CMS has historically operated two distinct, but complementary programs to oversee states’ eligibility determinations in the Medicaid program. The Medicaid Eligibility Quality Control (MEQC) program, which is implemented by states and overseen by CMS, was created in 1978 to monitor the accuracy and timeliness of Medicaid eligibility determinations in order to avoid inappropriate payments and eligibility decision delays. MEQC was also designed to identify methods to reduce and prevent errors related to incorrect eligibility determinations by having states review sample cases to independently verify eligibility criteria and then report the results to CMS. The Payment Error Rate Measurement (PERM) program is CMS’s process to estimate the national Medicaid improper payment rate in accordance with the Improper Payments Information Act of 2002, as amended, and Office of Management and Budget guidance. To calculate the Medicaid improper payment rate through PERM, CMS computes an annual rolling average of improper payment rates across all states based on a 3-year rotation cycle of 17 states each year. PERM is comprised of three components, including one that measures errors in state determinations of Medicaid eligibility. For fiscal years 2015 through 2018, CMS suspended MEQC and the eligibility component of PERM to provide states with time to adjust to eligibility process changes in PPACA; in its place, CMS required states to implement pilots to assess the accuracy of their eligibility determinations. As a result, CMS did not publish an updated national estimate of improper payments due to Medicaid eligibility errors for fiscal years 2015 through 2018. Eligibility reviews under PERM, which are conducted by a federal contractor, resumed in July 2017 for fiscal year 2019. In November 2019, CMS released an updated national estimate of Medicaid eligibility errors, which reflected results of the first 17 states reviewed under the new PERM process. Going forward, states are to resume MEQC reviews in the 2 years between their PERM reviews. The MEQC reviews will focus, in part, on specific areas of improvement for each state. For example, states might choose to focus on specific populations, such as whether pregnant women were assigned to the appropriate eligibility group, or specific processes, such as asset verification. The Medicaid statute includes a provision for CMS to recoup, or disallow, federal funds related to erroneous payments for ineligible individuals and overpayments for eligible individuals. The provision generally requires CMS to recoup funds from states for eligibility-related improper payments if the state’s eligibility error rate exceeds 3 percent. CMS has general authority to recoup funds from states when it determines that an expenditure of federal funding is not an allowable expense; according to CMS, however, this general authority does not apply to eligibility-related errors, given the separate specific statutory authority. Therefore, it is the view of the agency that CMS cannot recoup funds from states whose eligibility-related improper payment rate is below the 3 percent threshold. In addition to the PERM and MEQC oversight, state auditors review Medicaid eligibility determinations, including through audits conducted at the auditors’ initiative and as part of audits required by provisions of the Single Audit Act of 1984. To guide auditors in performing reviews under the Single Audit Act, the Office of Management and Budget issues a document referred to as the Compliance Supplement, which identifies important compliance requirements that the federal government expects to be considered as part of such an audit. Beginning in fiscal year 2014, the Compliance Supplement directed auditors to forgo review of eligibility determinations for individuals whose income is calculated based on MAGI. The supplement noted that testing was being performed under Medicaid eligibility review pilots, which would serve as CMS’s oversight during the initial years of PPACA implementation when the MEQC and the eligibility component of PERM were suspended. In June 2019, the Office of Management and Budget issued the 2019 Compliance Supplement that included changes to permit state auditors to test eligibility determinations of both MAGI and MAGI-exempt populations to ensure enrollees qualify for the Medicaid program and are in the appropriate enrollment category. The five selected states in our review considered similar factors when ranking the bases of eligibility to which individuals are assigned—such as bases related to children, pregnant women, or disabled individuals—but the resulting basis of eligibility in which individuals were placed could vary. Each of the five states ranked bases of eligibility by comparing how beneficial they were for enrollees across several key factors, and ordered the bases into a hierarchy starting with the most beneficial, according to officials. The states’ eligibility systems were programmed to apply these hierarchies in deciding each individual’s basis of eligibility; when an individual was potentially eligible for more than one basis of eligibility, the system would assign them to the basis highest in the ranking. The key factors the selected states considered in ranking the bases of eligibility, according to state officials, included (1) whether eligibility was related to the receipt of benefits from other programs, (2) the services provided through the benefit package, and (3) the financial implications for the individual. Eligibility related to other programs. The selected states ranked bases of eligibility associated with enrollment in other federal and state assistance programs at or near the top of their hierarchies. For instance, eligibility associated with receipt of SSI was generally at the top of the states’ hierarchies, and eligibility associated with receipt of federal foster care and adoption assistance benefits was ranked above other bases for which a child might be eligible. Services included in the benefit package. Bases of eligibility that conveyed additional benefits, such as long-term services and supports, were ranked higher. Similarly, bases that offered limited benefits, such as only covering family planning services or assistance with cost-sharing for Medicare beneficiaries (i.e., the Medicare Savings Program) were ranked lower in the selected states’ hierarchies. Financial impact. The selected states ranked bases of eligibility lower if they were associated with additional financial requirements for the individual, such as asset tests as a condition of eligibility, or out- of-pocket costs once enrolled. For example, bases of eligibility that required applicants to make copayments to receive certain services, or to pay a monthly premium, were ranked lower than those without such costs. Although the selected states considered similar factors when deciding an individual’s basis of eligibility for Medicaid, a similarly situated individual could be enrolled under a different basis of eligibility in one state versus another state. Decisions varied across states, in part, because of differences in (1) how states factored in the length of the enrollment period; and (2) the degree to which states’ eligibility systems and processes were integrated. Length of the enrollment period. Officials in selected states considered the length of the enrollment period when deciding bases of eligibility for certain populations, such as pregnant mothers (pregnant women who were also eligible as caretakers of dependent children). Pregnant women who are eligible for Medicaid have continuous eligibility, which guarantees enrollment through at least 60 days postpartum regardless of income changes. For this reason, Oklahoma enrolled pregnant mothers under a basis of eligibility applicable to pregnant women. In contrast, Virginia enrolled pregnant mothers under a basis of eligibility applicable to caretakers, because it has a 12-month enrollment period. However, pregnant women have continuous eligibility through at least 60 days postpartum regardless of income changes or whether they are enrolled as caretakers or on some other basis. As such, if a pregnant woman enrolled as a caretaker no longer met the income standard for a caretaker, for example, she could still remain eligible through her postpartum period. Alternatively, a woman enrolled under a pregnancy-related basis of eligibility would be redetermined for eligibility at the end of her postpartum period and could continue enrollment as a caretaker if she continued to meet the financial and other eligibility criteria. CMS noted that such variations in eligibility policies are allowable and expected among state Medicaid programs. Eligibility system integration. Differences in the degree to which selected states integrated their eligibility systems affected how individuals were assessed for potential bases of eligibility and potentially resulted in different eligibility determinations. Officials in four of our five selected states—New Mexico, Oklahoma, Tennessee, and Virginia—reported operating unified or integrated eligibility systems through which individuals could be considered for both MAGI and MAGI-exempt bases of eligibility. The fifth state, Maryland, had separate eligibility systems for MAGI and MAGI-exempt bases of eligibility, so an individual would need to apply through both systems to have all potential bases of eligibility considered. As such, an individual who is over age 65 and a caretaker of a dependent child would have to submit two separate applications to be assessed for all potential bases of eligibility in Maryland. Depending on the system to which he or she applied, that individual could be enrolled in a less beneficial basis of eligibility or denied eligibility for Medicaid. For example, the individual might be determined ineligible for full Medicaid benefits and enrolled in a Medicare Savings Program, in which Medicaid covers out-of-pocket costs related to Medicare benefits. (See fig. 1.) Our review of 47 state and federal audits across 21 states identified multiple issues affecting the accuracy of states’ Medicaid eligibility determinations. The accuracy issues identified in the audits we reviewed generally fell into nine broad categories, such as eligibility determinations made with incorrect or incomplete income or asset information, unresolved discrepancies between what applicants reported as their income and electronic data sources, and unidentified or unaddressed changes in circumstances, such as changes in household income or size. (See table 2.) Within these nine broad categories, the audits identified several specific accuracy issues, including states that were not conducting income checks for individuals reporting no income; not terminating the enrollment of individuals who had moved out of enrolling individuals who did not provide required information (such as proof of citizenship) on a timely basis; months or years behind schedule in conducting required eligibility not acting on—or not having adequate systems in place to detect— changes in enrollees’ circumstances that could affect eligibility, such as changes in income or household composition. See table 3 for examples of audit findings related to each of the accuracy issue categories, and appendix I for an overview of the key findings for each audit we reviewed. In some cases, the accuracy issues identified by auditors resulted in errors in eligibility determinations, such as instances when applicants were determined eligible even though their incomes were above the applicable limit, or instances in which the state did not enroll eligible individuals. However, in other instances, the accuracy issues identified by auditors did not result in erroneous eligibility determinations. For example, in some cases the audit found that a state determined that an applicant was eligible based on incorrect or incomplete financial information; however, auditors found that the applicant would have still been eligible for Medicaid even after reviewing additional financial information. In other cases, auditors found that eligibility determinations complied with state policies and federal requirements, but that changes in state policies— such as using additional data sources or checking sources more frequently—could provide more information that could be used to improve eligibility determinations. For example, audits in three states found that the quarterly wage data the states used to verify income did not detect certain nonwage income; that income could have been identified had the states chosen to use state or federal tax data as a verification source. Auditors in one of these states (Louisiana) also found that checking income data during individuals’ coverage period, such as on a quarterly basis, could have saved the state tens of millions of dollars in managed care fees for individuals whose incomes exceeded eligibility thresholds during their enrollment period. The selected states we reviewed reported having processes in place that were designed to avoid or address many, but not all, of the accuracy issues identified. The following are examples of the states’ processes related to specific accuracy issues. Incorrect or incomplete income or asset information. All five selected states we reviewed reported checking electronic data sources to verify income, including for individuals who report $0 in income. Officials from some states noted, however, that the electronic sources they have chosen to use do not include all relevant types of income, such as self- employment income. The five states also reported having electronic asset verification systems to verify financial assets, such as bank and retirement accounts for applicants subject to asset limits. One state (New Mexico) reported that it recently implemented an asset verification system that includes information from financial institutions, property ownership records, and vehicle licensing. Eligibility redeterminations not made in a timely manner. To help ensure that redeterminations are made in a timely manner, all five selected states reported conducting automatic redeterminations for at least some MAGI enrollees using electronic data sources to confirm continued eligibility. The proportion of MAGI enrollees whose eligibility was automatically redetermined ranged from about 10 to 80 percent. Officials from Virginia, which was cited by auditors in 2015 as having significant delays in conducting redeterminations, reported that automatic redeterminations have helped improve timeliness. Where automatic eligibility redeterminations are not conducted—such as for enrollees whose incomes could not be confirmed through electronic sources or who are eligible on a MAGI-exempt basis—the five selected states reported having systems in place to generate a redetermination packet or notice to be sent to enrollees prior to the end of their eligibility period. Officials reported that enrollees who do not complete their redetermination would be disenrolled, with states varying in how quickly they would take such action. For example, Oklahoma officials reported that the state automatically terminates enrollment for individuals who do not reply with the required information by the end of their coverage period. In contrast, Virginia officials reported that redeterminations for which no response was provided are kept open, pending eligibility worker action; the state’s systems do not automatically terminate enrollment. Unresolved income discrepancies. Officials in the five selected states reported that their eligibility systems automatically identify income discrepancies. For example, Oklahoma officials indicated that if there is more than a 5 percent difference in the income reported on the application and the income from electronic data sources, their system either alerts eligibility workers or automatically sends a request for additional information to the enrollee. Individuals enrolled in incorrect basis of eligibility. According to state officials, their eligibility systems have automated checks to reassess the eligibility for individuals reaching certain milestones, such as the maximum age for their basis of eligibility (i.e., children reaching adulthood and adults reaching age 65) and pregnant women who are approaching the end of their 60-day postpartum period. For example, to help ensure individuals are correctly assigned to the appropriate basis of eligibility, officials in Maryland noted that they apply system edits that preclude individuals who are pregnant, age 65 or older, or enrolled in Medicare from being incorrectly assigned to the new adult group. Unidentified or unaddressed changes in circumstances. Officials from the five selected states indicated that they generally had systems in place to identify if an enrollee had died or moved out of state. For example, officials from the five selected states reported conducting periodic checks of residency through the Public Assistance Reporting Information System—a federal data source that identifies individuals receiving benefits in other states—and following up with identified enrollees to see if they still reside in the state. None of the selected states conducted regular reviews to identify changes in MAGI enrollees’ incomes during the enrollment period, although one state—Oklahoma— planned to implement interim checks of income in response to a recent change in state law. Oklahoma also reported that it conducted quarterly checks of wage data for MAGI-exempt enrollees. Use of incomplete or incorrect information on household composition. The selected states generally did not have processes in place to detect accuracy issues related to household composition, although officials in four of the five states—Maryland, New Mexico, Oklahoma, and Virginia—noted that eligibility information from other benefit programs may be compared with Medicaid files to detect changes or discrepancies in household membership. In 1983, CMS implemented its statutory requirement to recoup funds associated with Medicaid eligibility-related improper payments for states with an eligibility error rate above 3 percent through its MEQC program. The MEQC program required states to randomly sample Medicaid enrollees to verify eligibility. Claims related to enrollees determined ineligible were tallied and compared with total claims for the sample universe to calculate an error rate. Following federal validation, states were subject to recoupment of all or part of the federal funds expended related to erroneous state payments over the 3 percent error rate threshold. However, in 1992, HHS’s Departmental Appeals Board—the department’s final level of administrative review—concluded that the MEQC error rate was not sufficiently accurate to provide reliable evidence to support recoupment of funds due to the small sample size from which the error rate was calculated. Consequently, the appeals board stated that it was “impossible to conclude with a reasonable certainty that the States failed to meet their target rates….” As a result of this opinion, CMS provided states the option, beginning in 1994, to either continue operating a traditional MEQC program or to conduct what CMS referred to as “MEQC pilots,” which focused on prospective improvements in eligibility determinations, rather than calculation of error rates. Since the “MEQC pilots” did not produce an error rate, CMS could not recoup federal funds expended due to erroneous eligibility determinations for states participating in the pilots. Between 2012, the earliest year for which CMS has maintained records, and 2014 when CMS suspended the MEQC program, 39 states participated in these “MEQC pilots” exempting them from possible recoupment of funds due to eligibility errors. While the other 12 states that continued to operate traditional MEQC programs could still be subject to recoupment of funds, CMS officials reported that no recoupments related to eligibility errors had occurred since the 1992 appeals board ruling, because none of these states had an error rate exceeding the 3 percent threshold. Thus, CMS has not recouped federal funds due to eligibility errors in decades. However, the agency has introduced new procedures through which it can, under certain circumstances, begin to recoup funds based on eligibility errors in fiscal year 2022. Specifically, in July 2017, CMS issued new regulations that included changes to its PERM process to satisfy the statutory requirements for recouping funds that MEQC was previously designed to operationalize. Under the revised PERM rules, CMS calculated an eligibility error improper payment rate beginning with the cohort of states under review for the fiscal year 2019 reporting period. However, it will not recoup funding from states with error rates exceeding the 3 percent threshold until states have a second review under the revised PERM rules, which will occur for the first cohort of states in fiscal year 2022. This allows each state the opportunity to implement improvements based on its initial PERM review and the MEQC review it will conduct in the off-cycle years to reduce the error rate or demonstrate a “good faith effort” to do so. CMS officials recognize the benefits of using state and federal audits, such as audits we reviewed for this report, as part of a broader strategy to improve program integrity and oversee states’ eligibility determination processes. However, CMS officials told us they do not have the authority to recoup federal funds related to eligibility errors identified outside of the PERM process, such as through state single audits. According to CMS officials, this is because of the specific statutory instruction limiting recoupments to instances when eligibility-related errors exceed the 3 percent error rate threshold, and because PERM is the process that CMS uses to calculate that error rate. The President’s fiscal year 2020 budget request included a legislative proposal to expand HHS’s authority to issue disallowances for eligibility errors. Specifically, the proposal requests legislative authority to permit HHS to issue disallowances outside of PERM and allow HHS, including the HHS-OIG, to extrapolate findings on beneficiary eligibility to ensure federal recovery of incorrect eligibility determinations; and eliminate the current 3 percent threshold for states’ eligibility-related improper payments. In place of the current 3 percent disregard, HHS would issue rulemaking specifying criteria for the recoupment of funds, including limiting them to instances of monetary loss, such as cases in which ineligible individuals received benefits. Determining whether individuals are eligible for Medicaid is a complex process that is vulnerable to error. The processes used to measure the extent of eligibility errors have been, and will continue to be, in a state of transition over the next several years as CMS implements its new PERM procedures and states implement improvements after their initial PERM reviews under these new procedures. Because CMS has not had a complete national estimate of improper payments due to eligibility errors since 2014, policymakers and other stakeholders have had an incomplete picture of the extent of eligibility errors in the Medicaid program nationally. This state of flux will make the findings from federal and state audits an even more important source of information on the accuracy of states’ eligibility determinations. As we have previously reported, oversight of the Medicaid program could be further improved through leveraging and coordinating program integrity efforts with state auditors to further improve the integrity of the Medicaid program. We provided a draft of this report to HHS for review and comment. HHS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of HHS, the Administrator of the CMS, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or yocomc@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Table 4 provides a summary of key findings from the 47 federal and state audits that discussed the accuracy of states’ Medicaid eligibility determinations, published from 2014 through 2018, which we identified and reviewed. In addition to the contact named above, Michelle Rosenberg (Assistant Director), Perry Parsons (Analyst-in-Charge), and Heather Tompkins made key contributions to this report. Also contributing were Drew Long, Vikki Porter, and Jenny Rudisill.", "summary": "In fiscal year 2018, Medicaid covered approximately 75 million individuals at an estimated cost of $629 billion, $393 billion of which were federal funds. Medicaid eligibility is governed by a network of federal and state laws and regulations. In assessing eligibility for Medicaid, states must determine whether applicants meet eligibility criteria, such as financial and citizenship requirements. The accuracy of eligibility decisions has implications for federal and state spending. The Patient Protection and Affordable Care Act made significant changes to Medicaid eligibility rules beginning in 2014, including new ways of calculating income and new requirements related to electronically verifying applicants' information. Yet, little is known about the accuracy of states' Medicaid eligibility determinations since these changes were implemented. GAO was asked to review Medicaid eligibility determinations. This report describes, among other things, what is known about the accuracy of Medicaid eligibility determinations, and CMS's efforts to recoup funds related to eligibility errors. GAO reviewed 47 state and federal audits of Medicaid eligibility determinations across 21 states published between 2014 and 2018. GAO also reviewed relevant federal laws and regulations, and interviewed CMS officials. The Department of Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate. States are responsible for determining applicants' eligibility for Medicaid, including verifying eligibility at application, redetermining eligibility, and disenrolling individuals who are no longer eligible. The Centers for Medicare & Medicaid Services (CMS) oversees states' Medicaid eligibility determinations. CMS did not publish an updated national Medicaid eligibility improper payment rate from 2015 through 2018 as states implemented the Patient Protection and Affordable Care Act. CMS released an updated rate in November 2019 that reflected new information on eligibility errors from 17 states. In lieu of complete and updated data, GAO reviewed 47 state and federal audits published between 2014 and 2018 related to 21 states' eligibility determinations. The identified accuracy issues did not always result in erroneous eligibility determinations. For example, some audits found applicants were determined eligible based on incomplete financial information, but when the audits reviewed additional information they found that the applicants still would have been eligible for Medicaid; and eligibility determinations complied with state policies and federal requirements, but noted that changes in state practices—such as using additional data sources to verify applicant information or checking sources more frequently—could improve eligibility determinations. While CMS is generally required to disallow, or recoup, federal funds from states for eligibility-related improper payments if the state's eligibility error rate exceeds 3 percent, it has not done so for decades, because the method it used for calculating eligibility error rates was found to be insufficient for that purpose. To address this, in July 2017, CMS issued revised procedures through which it can recoup funds for eligibility errors, beginning in fiscal year 2022. In addition, the President's fiscal year 2020 budget request includes a legislative proposal to expand the agency's authority to recoup funds related to eligibility errors. During this period of transition, federal and state audits will continue to provide important information about the accuracy of states' eligibility determinations.", "document_type": "gao"}
{"report": "The MIECHV program provides voluntary, evidence-based home visiting services for at-risk eligible families with children up to kindergarten entry. HRSA allocates MIECHV program formula grant funds to states based partly on the proportion of children under age 5 living in poverty in each state, among other factors. In fiscal year 2018, states received an average of $6.9 million in MIECHV program formula grant funding, ranging from $1.2 million provided to North Dakota to $21.4 million to California (see appendix I for a list of all states and their fiscal year 2016 through 2018 funding). Generally, the state’s public health or social services department is the lead agency that receives and administers the funds. States target MIECHV program resources to at-risk communities and have the flexibility to tailor the program to serve the specific needs of their communities. States are generally required to provide home visiting services using an HHS-approved evidence-based program model. Currently, HHS has determined through its Home Visiting Evidence of Effectiveness review that 18 evidence-based home visiting models meet HHS-established criteria for evidence of effectiveness, and are therefore eligible for MIECHV funding. States may select programs to implement from the models that have been approved by HHS, or states may choose to implement a home visiting service delivery model that qualifies as a promising approach, as defined in the statute. In MIECHV-funded home visiting programs, professionals meet regularly with families and provide services tailored to the families’ specific needs, such as teaching parenting skills, promoting early learning in the home, or conducting screenings and providing referrals to address caregiver depression, substance abuse, and family violence. According to HHS, the MIECHV program builds upon decades of scientific research showing that home visits by a nurse, social worker, or early childhood educator during pregnancy and early childhood have the potential to improve the lives of children and families. From fiscal years 2013 through 2018, the number of families served and number of home visits conducted nearly doubled (see table 1). The MIECHV program is the primary federal program focusing exclusively on evidence-based home visiting, according to HHS. However, in addition to administering the MIECHV program, states may have other home visiting programs that may be supported by funds from other federal programs, such as Temporary Assistance for Needy Families and the Maternal and Child Health Services Block Grant. These home visiting programs may provide services that differ from those provided under the MIECHV program. For example, states may provide home visiting services through these programs that use program models that are different from the MIECHV program models approved by HHS. The MOE requirement in the MIECHV program’s authorizing statute provides that funds provided to an eligible entity receiving a MIECHV grant “shall supplement, and not supplant, funds from other sources for early childhood home visitation programs or initiatives.” To demonstrate their compliance with this statutory requirement, states are required by HRSA to report in their annual grant applications their MOE spending for the prior fiscal year. HRSA provides guidance to states on how to report their MOE spending in the annual NOFOs. For example, since fiscal year 2013, the MOE guidance in the NOFOs generally has directed states to only report spending that meets the following criteria: paid for with state general funds, spent in the prior fiscal year on HHS approved evidence-based programs that include home visiting as a primary service delivery strategy, implemented in response to findings from the most current statewide needs assessment, and offered on a voluntary basis to pregnant women or caregivers of children from birth to kindergarten entry. Over time, HRSA has clarified the MOE guidance provided in the NOFOs to help address questions received from states, according to HRSA officials. We previously reported that certain grant design features affect the likelihood that states will use federal funds to supplement, rather than supplant (or replace), their own spending. One such design feature requires grant recipients to contribute their own funds in order to obtain grant funds. Requiring grant recipients to contribute their own funds can take the form of a match or MOE requirement. According to our prior report, matching grants typically contain either a single rate (e.g., 50 percent) or a range of rates (e.g., 50 to 80 percent) at which the federal government will match state spending on a particular program. An MOE requirement, in contrast, requires states to maintain existing levels of state spending on a particular program as a condition of receiving federal funds. Depending on the specific program and its MOE requirement, if a state did not previously spend any state funds on covered activities, then the state could be allowed to maintain MOE spending of $0. The MOE requirement is one of many MIECHV program requirements that HRSA is responsible for monitoring. HRSA also monitors MIECHV’s programmatic and technical requirements, such as evidence-based model implementation, policies and procedures, data collection, and organizational structure and capacity. HRSA also monitors fiscal and administrative requirements, such as those related to accounts payable and cash flow, accounting systems, and cost allocations. From fiscal years 2016 through 2018, state-reported MOE spending varied from $0 to more than $25 million, according to our review of MIECHV program grant applications (see fig. 1). For example, 28 states reported MOE spending of $0 in fiscal year 2018. Most of the 23 states that reported MOE spending greater than $0 in fiscal year 2018 reported spending less than $3 million, while three states reported spending more than $9 million. See appendix II for each state’s reported MOE spending for fiscal years 2016 through 2018. State-reported MOE spending does not necessarily reflect all state spending on all home visiting services. When states report their prior year’s MOE spending on their MIECHV grant applications, they are only required to include home visiting spending if it meets the criteria specified by HRSA in the NOFO. In addition to reporting their MOE spending in grant applications, some states also noted that they spent funds on home visiting services that did not meet those criteria. In fiscal year 2017, for example, one state reported that it had spent funds on home visiting services for a non-evidence-based model (i.e., a model not approved by HHS), and the state also funded an evidence-based program with funds other than state general funds. However, the state did not include either in its reported MOE spending because that spending did not meet the criteria for MOE spending in the NOFO. An update to the MIECHV program’s MOE guidance in the NOFO for fiscal year 2018 further impacted some state reported MOE spending. The update clarified the MOE guidance, stating that states should only report MOE spending by the recipient entity administering the MIECHV grant, and not report spending by other state agencies. According to HRSA officials—because the states were now directed to exclude some previously reported home visiting spending—five states decreased their reported MOE spending to $0. In addition, three other states reported a decrease in their MOE spending ranging from about $1.2 million to about $9.3 million because of this change (see table 2). HRSA determined that states generally met the MIECHV program’s MOE requirement because there was no supplantation of federal funds, including in states that reported no MOE spending and those that reported decreased MOE spending from the prior fiscal year. States may be permitted to report $0 in MOE spending if the non-federal spending on home visiting does not meet the criteria in the MOE guidance in the NOFO. For example, if the state had not previously funded home visiting programs that met HRSA’s MOE criteria for the MIECHV program, then the state could maintain state spending of $0, according to HRSA officials. States may report MOE spending of $0 if state general funds were spent on a home visiting model that was not approved by HRSA, if the state supports an evidence-based home visiting program with funds other than state general funds, or if the state did not support a home visiting program prior to implementation of MIECHV. HRSA determined that state-reported year-to-year decreases in MOE spending did not constitute supplantation (or replacement) of state funds with federal funds, because as described more fully below, HRSA determined there were valid reasons for the decreased MOE spending, according to agency officials. Based on our analysis of grant applications, 15 states reported decreases in MOE spending from fiscal years 2016 through 2018 (see table 3). These decreases ranged from $75,000 to $71,539 in one state, and $25,207,294 to $0 in another state. According to HRSA officials, there were three different reasons why states might have reported a decrease in MOE spending compared to the prior year: 1. The state made a technical error in its MOE calculation that subsequently was corrected. For example, some states reported a decrease in MOE spending compared to the prior year because the state previously included erroneous funding sources, such as funding for a home visiting program that did not meet the MIECHV program’s MOE criteria. 2. Circumstances outside of the state agency’s control contributed to the state reporting decreased funding, such as when a state legislature authorized budget cuts that affected home visiting funding or failed to pass a budget. For example, according to HRSA officials, one state experienced state budget challenges in fiscal years 2016 and 2017, which resulted in decreased funding for some home visiting services. The officials said this funding would have been included in the state’s reported MOE spending and these budget reductions resulted in a reduction to the reported MOE spending from the prior year. 3. The clarification to the MOE guidance that HRSA made in the fiscal year 2018 NOFO limited the spending states should report, as previously discussed. HRSA uses several methods to monitor the MIECHV program and the program’s MOE requirement is addressed to some extent as part of each, according to our review of HRSA grants monitoring documentation and interviews with HRSA officials. These monitoring methods include grant application reviews, site visits, and financial assessments, among others. The monitoring methods vary in terms of the extent to which the MOE requirement is specifically examined, who conducts the monitoring, and the frequency of monitoring (see table 4). The primary mechanism for monitoring the MIECHV program’s MOE requirement is the review of grant applications, according to HRSA officials. HRSA project officers review the MOE chart in states’ grant applications for 2 fiscal years to compare state reported MOE spending— actual non-federal expenditures—and determine if states maintained their level of spending (see table 5). If there is a missing MOE chart or potentially inaccurate MOE spending information, project officers work with states to resolve the issue. While HRSA primarily relies on its review of grant applications to monitor state compliance with the MIECHV program’s MOE requirement, the agency supplements these reviews with other monitoring techniques, and some of these techniques have identified issues with state-reported MOE spending. For example, operational site visits provide HRSA an opportunity to ask detailed questions about state-reported MOE spending and obtain supporting documentation. As a result of operational site visits, HRSA identified inaccurate state-reported MOE spending in some states. We reviewed four completed site visit reports from 2017—the most recently completed reports at the time of our review—and two of these reports had findings related to inaccurate state-reported MOE spending. For example, one site visit report noted that the state incorrectly included home visiting spending that did not use an evidence-based model in its reported MOE spending. HRSA also found some deficiencies with states’ reported MOE spending through the agency’s review of state single audits. According to HRSA officials, there were five state single audits with MIECHV MOE findings from fiscal years 2014 through 2017. We found that four of these audits identified deficiencies with how states monitored and accounted for their MOE spending. For example, one audit found that the state did not have internal controls in place to ensure that state spending met the minimum MOE requirement. In three of the four single audits that identified deficiencies, the state agencies concurred with the findings and prepared corrective action plans to address the deficiencies. As of June 2019, HRSA officials said they have taken steps, or are planning steps, to modify or provide additional guidance related to how the agency monitors the MOE requirement for the MIECHV program. Specifically: HRSA officials told us that beginning with the formula grant NOFO for fiscal year 2019, HRSA added an additional column to the MOE chart for states to provide the expenditures for the 2 years prior to the current fiscal year of the application. According to HRSA officials, this will streamline HRSA’s process to compare state-reported MOE spending across 2 prior fiscal years without having to go back to the previous year’s grant application. In February 2019, HRSA published an internal grants policy bulletin that specifically addressed MOE requirements and the agency’s monitoring of those requirements for all HRSA programs. HRSA is currently working on MIECHV program standard operating procedures that are intended to clarify staff monitoring roles and responsibilities across the agency. Completion of this resource is targeted for the end of fiscal year 2019. HRSA is also planning to add the MOE table to future MIECHV program Final Reports submitted by grantees, beginning with the fiscal year 2017 Final Report, which is due to HRSA in December 2019. According to officials, this will allow for a formal resubmission of MOE spending if there have been any changes since the submission of the most recent grant application. We provided a draft of this report to HHS for review and comment. HHS provided technical comments that we have incorporated in the report as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Washington, D.C. In addition to the contact named above, Elizabeth Morrison (Assistant Director), Andrea Dawson (Analyst in Charge), David Reed, and Kelly Snow made key contributions to this report. In addition, key support was provided by Jennifer Cook, Sarah Cornetto, Thomas James, Jean McSween, Mimi Nguyen, Stacy Ouellette, Michelle Sager, Almeta Spencer, and Matthew Valenta.", "summary": "The MIECHV program provides grants to states to support evidence-based home visiting services for at-risk pregnant women and parents with young children. HHS was appropriated $400 million per year for the MIECHV grant program for fiscal years 2018 through 2022. Families volunteer to participate in the MIECHV program and are provided regular home visits and support services from a nurse, social worker, or other professional. According to HHS, the program builds upon decades of scientific research showing that home visits during pregnancy and early childhood can improve the lives of children and families. States began receiving federal MIECHV program funds in fiscal year 2010, but many states provided home visiting services prior to the MIECHV program using state or other funds. To meet the program's MOE requirement, states are required to maintain home visiting spending that meets MIECHV program criteria. GAO was asked to review the MIECHV program's MOE requirement. GAO examined (1) what is known about the MOE spending reported by states that receive federal MIECHV program funds and (2) how HHS monitors states to ensure the MOE requirement is met. GAO reviewed MIECHV program notices of funding opportunity for fiscal years 2013 through 2018 and state grant applications for fiscal years 2016 through 2018, the most recent three years available. GAO also reviewed HHS grants monitoring documentation and interviewed HHS officials. From fiscal years 2016 through 2018, state reported maintenance of effort (MOE) spending varied from $0 to more than $25 million for the Maternal, Infant, and Early Childhood Home Visiting (MIECHV) Program, according to GAO's review of MIECHV program grant applications. The program's authorizing statute requires states to meet an MOE requirement. MOE requirements in federal programs generally require grantees to maintain a certain level of spending to ensure grantee dollars are not replaced with federal dollars. To demonstrate their compliance with the MIECHV program's MOE requirement, states report in their annual grant applications their MOE spending for the prior fiscal year. HHS determined that states generally met the MIECHV program's MOE requirement because states did not replace state funds with federal funds, including states that reported no MOE spending or decreased MOE spending. States may be permitted to report $0 in MOE spending in certain circumstances; for example, if a state's only home visiting spending was on programs that did not meet MIECHV program criteria. According to HHS officials, state-reported decreases in MOE spending were due to errors in calculations that were subsequently corrected, clarifications to HHS's MOE guidance, or because of circumstances outside of the state agency's control. HHS uses multiple methods to monitor state compliance with the MOE requirement, according to GAO's review of HHS documentation and interviews with HHS officials. The agency's monitoring strategy includes reviews of grant applications, reviews of state single audits, and operational site visits, among other techniques. According to HHS officials, grant application reviews are the primary mechanism used to monitor state compliance, through which HHS compares state-reported MOE spending in grant applications across two fiscal years to determine if states maintained their level of spending. In addition, HHS identifies and resolves issues with state-reported MOE spending through its operational site visits and the agency's review of state single audits.", "document_type": "gao"}
{"report": "NNSA is responsible for managing national nuclear security missions: ensuring a safe, secure, and reliable nuclear deterrent; supplying nuclear fuel to the Navy; and supporting the nation’s nuclear nonproliferation efforts. NNSA largely relies on management and operating contractors to carry out these missions and to manage the day-to-day operations at eight sites collectively known as NNSA’s nuclear security enterprise. The Y-12 National Security Complex in Tennessee is the primary site among these with enriched uranium capabilities. Y-12’s primary mission is processing and storing uranium, processing uranium for naval reactors for the Navy, and developing associated technologies, including technologies to produce uranium-related components for nuclear warheads and bombs. According to NNSA documents, Y-12’s enriched uranium operations have key shortcomings, including an inefficient workflow, continually rising operations and maintenance costs stemming from facility age, and hazardous processes that could expose workers to radiological contamination. To address these shortcomings, NNSA developed plans to replace aging infrastructure at Y-12 and relocate key processing equipment without jeopardizing uranium production operations. In 2004, NNSA initially proposed relocating Y-12’s main uranium processing equipment into a new facility referred to as the UPF. NNSA planned to construct this single, consolidated facility that would reduce the overall size of existing uranium processing facilities, reduce operating costs by using modern equipment, and increase worker and environmental health and safety. NNSA estimated in 2007 that the UPF would cost approximately $1.4 billion to $3.5 billion to design and construct. In June 2012, the Deputy Secretary of Energy approved an updated cost estimate range for the UPF of $4.2 billion to $6.5 billion, with the latter being the project’s maximum allowable cost. However, by August 2012, the UPF contractor concluded that the UPF as designed would not provide enough space to house all of the uranium processing and other equipment. In October 2013, an external review estimated that the UPF project could cost as much as $11 billion. In 2014, because of the high cost and scheduling concerns of a solution focused solely on constructing new buildings, NNSA established its uranium program within its Office of Defense Programs. NNSA also prepared a high-level strategic plan based on its objectives of 1) completing the UPF project with a reduced scope within the cost and schedule limits established for the original UPF project and 2) phasing out mission dependency on Building 9212. Under NNSA’s revised approach, the agency plans to transition production operations out of Building 9212 and into the re-scoped UPF or existing buildings at Y-12 after they have been upgraded as described in further detail below. Building 9212. Constructed in 1945, the building’s design predates modern nuclear safety codes. It consists of a number of interconnected buildings that contain capabilities for uranium purification and casting, among other things. One of NNSA’s key goals is to shut down the Building 9212 operations that have the highest nuclear safety risks. Because of these risks, NNSA is implementing a four-phase exit strategy to systematically phase out mission dependency on Building 9212. According to NNSA’s September 2018 implementation plan for the exit strategy, the first three phases focus on reducing inventory, system isolation and clean out, and relocating capabilities from Building 9212 to other existing Y- 12 facilities or to the UPF once startup is complete. Building 9212 will then enter a phase of post-operational clean out, during which operations will be limited to simple processing, recovery, and inventory accountability. By about 2035, management of the building will transition to DOE’s Office of Environmental Management for decontamination and decommissioning activities. Building 9215. Constructed in the 1950s, the building’s design predates modern nuclear safety codes. It consists of three main structures, and its current primary function is fabrication, which involves metal machining operations for enriched uranium. As part of the Building 9212 exit strategy, NNSA plans to move capabilities into Building 9215, such as the uranium purification and the processing of uranium metal scraps resulting from machining operations. The uranium program is managing the development and deployment of new technologies to increase the efficiency and effectiveness of these capabilities. NNSA initially intended to house these two capabilities in the UPF before re-scoping the project to meet its cost and schedule goals. According to NNSA documents, NNSA is identifying and prioritizing infrastructure investments for Building 9215 that are to ensure its reliability through the 2040s. Building 9995. Constructed in the mid-1950s, this building’s design predates modern nuclear safety codes. It consists of a laboratory with capabilities for analytical chemistry operations, which can sample enriched uranium for material assay, chemistry content, and metallography in support of production. NNSA initially intended to house the analytical chemistry capabilities to support enriched uranium processing and material characterization in the UPF before re-scoping the project to meet its cost and schedule goals. According to NNSA documents, NNSA is identifying and prioritizing infrastructure investments for Building 9995 that are to ensure its reliability through the 2040s and its continued analytical chemistry support for the UPF and Y-12 more broadly. Building 9204-2E. Constructed in the late 1960s, this building’s design predates modern nuclear safety codes. It consists of a three- story, reinforced concrete frame structure that includes capabilities for assembly and disassembly of enriched uranium components with other materials. According to NNSA officials, the agency installed its radiography capability in Building 9204-2E in April 2017. According to NNSA documents, NNSA is identifying and prioritizing infrastructure investments for Building 9204-2E that are to ensure its reliability through the 2040s. Highly Enriched Uranium Materials Facility (HEUMF) (also called Building 9720-82). Beginning operations in January 2010, this building was built to modern nuclear safety codes. It is a reinforced concrete and steel structure that provides long-term storage of enriched uranium materials and accepts the transfer of some legacy enriched uranium from older facilities. HEUMF is the central repository for highly enriched uranium. Figure 1 shows NNSA’s planned relocation of uranium processing capabilities out of Building 9212 and into the re-scoped UPF and existing Y-12 facilities. The figure also indicates which existing facilities will require infrastructure investments to support enriched uranium operations. Under the new approach, the re-scoped UPF will be smaller than the UPF project’s original design and will house capabilities for casting, oxide production, and salvage and accountability of enriched uranium. NNSA has stated that the re-scoped UPF is to be built for no more than $6.5 billion by the end of 2025 through seven subprojects, described below. Site Readiness. This subproject included work to relocate an existing road, construct a new bridge, and extend an existing haul road. Site Infrastructure and Services. This subproject included demolition, excavation, and construction of a parking lot, security portal, concrete batch plant, and support building. Substation. This subproject included construction of an electrical power substation to provide power to the UPF and Y-12, replacing an existing substation at Y-12. Process Support Facilities. This subproject includes work to provide chilled water and storage of chemical and gas supplies for the UPF. Salvage and Accountability Building. This subproject includes construction of a nuclear facility for the decontamination of wastes and recovery of chemicals associated with uranium processing. Main Process Building. This subproject includes construction of the main nuclear facility to contain casting and special oxide production capabilities and a secure connecting portal to the HEUMF. Mechanical Electrical Building. This subproject includes construction of a building to house mechanical, electrical, heating, ventilation, air conditioning, and utility equipment for the Salvage and Accountability Building and Main Process Building. NNSA is required to manage construction of capital asset projects with a total project cost of greater than $50 million, such as the UPF, in accordance with DOE Order 413.3B. NNSA’s Office of Acquisition and Project Management manages the UPF project under DOE Order 413.3B with funding from NNSA’s Office of Defense Programs through the uranium program. DOE Order 413.3B requires that the project go through five management reviews and approvals, called “critical decisions” (CD), as the project moves from planning and design to construction and operation. (See fig. 2.) DOE Order 413.3B also requires that, before project completion (CD-4), NNSA issue a transition-to- operations plan, which is to ensure efficient and effective management as a project becomes operational and provide a basis for attaining initial and full operational capability. For projects likely to have an extended period of transition to the start of operations, an August 2016 memorandum from DOE requires that NNSA develop a more detailed plan to attain full operational capability. The plan must be developed earlier in the project management process— before start of construction (CD-3). In addition, NNSA must provide quarterly updates to DOE’s Project Management Risk Committee after completing construction until full operational capability is attained. The memorandum notes that DOE’s complex nuclear facilities can have significant risks that continue after project completion. These ongoing risks may impact achievement of full operational capability and thus require more efficient management. In September 2019, we reported that DOE officials stated that the August 2016 memorandum was largely created in response to experience with the Integrated Waste Treatment Unit facility at Idaho National Laboratory. This facility, which is intended to treat two forms of nuclear waste, is not operating as expected approximately 7 years after the completion of its construction. DOE Order 413.3B also states that projects with a total estimated cost of more than $100 million should have an independent cost estimate and external independent review prior to approval of the project’s performance baselines for cost and schedule (CD-2). Further, appropriations acts since fiscal year 2012 have included a limitation that prohibits the use of funds to approve CD-2 (approval of the project’s performance baselines for cost and schedule) or CD-3 (approval to start construction) for capital asset projects where total project costs exceed $100 million until a separate independent cost estimate has been developed. According to DOE’s standard operating procedure for conducting independent cost estimates, an independent cost estimate is prepared by an organization independent of the project sponsor—DOE-PM, in this case—using the same detailed technical and procurement information that was used to make the initial project estimate. The purpose of the estimate is to validate the project’s performance baselines—which include cost and schedule estimates—to determine these estimates’ accuracy and reasonableness. DOE-PM may use the independent cost estimate as supporting information in developing the external independent review. The external independent review is a broader analysis of the project to provide an unbiased assessment of whether NNSA can execute the project within the proposed scope, schedule, and cost commitments while meeting key performance requirements and fulfilling the mission need. Many of the federal government’s more costly and complex capital asset projects, including the UPF, require the development of cutting-edge technologies and integration of those technologies into large and complex systems. For example, DOE and NNSA use a systematic approach for assessing how far a technology has matured to evaluate the technology’s readiness to be integrated into a system—Technology Readiness Levels (TRL). This approach is intended to ensure that new technologies are sufficiently mature in time to be used successfully when a project is completed. TRLs progress from the least mature level, in which the basic technology principles are observed (TRL-1), to the highest maturity level, in which the total system is used successfully in project operations (TRL- 9). DOE Order 413.3B requires that each critical technology item or system on which a project depends must be demonstrated as a prototype in an operational environment (TRL-7) before the project’s performance baselines are approved (CD-2). According to our guide on evaluating technology readiness, assessing technology readiness does not eliminate the risk of relying on new technology but can identify concerns and serve as the basis for realistic discussions on how to mitigate potential risks associated with the project’s scope, for example. According to the Project Management Institute, Inc. (PMI), effective program management, in addition to effective project management, is important to the success of efforts such as NNSA’s uranium program. According to PMI’s standard for program management, effective program management helps ensure that a group of related projects and program activities are managed in a coordinated way to obtain benefits not available from managing them individually. Program management involves aligning multiple components to achieve the program’s goals. Other general standards relevant to program management for the uranium program include our cost-estimating guide and schedule assessment guide. In March 2009, we issued our cost-estimating guide to provide a consistent methodology that is based on cost-estimating best practices and that can be used across the federal government for developing, managing, and evaluating program cost estimates. The methodology outlined in the guide is a compilation of best practices that federal cost-estimating organizations and industry use to develop and maintain reliable cost estimates throughout the life of a government acquisition program. According to the guide, developing accurate life- cycle cost estimates has become a high priority for agencies in properly managing their portfolios of capital assets and in decision-making throughout the process. A life-cycle cost estimate provides an exhaustive and structured accounting of all resources and associated cost elements required to develop, produce, deploy, and sustain a particular program. The guide also states that a reliable cost estimate reflects all costs associated with a program—meaning that the estimate must be based on a complete scope of work—and the estimate should be updated to reflect changes in requirements (which may affect the scope of work). In December 2015, we issued our schedule guide, which develops the scheduling concepts introduced in our cost-estimating guide and presents them as best practices associated with developing and maintaining a reliable, high-quality schedule. According to the schedule guide, a well- planned schedule is a fundamental management tool that can help government programs use funds effectively by specifying when work will be performed and by measuring program performance against an approved plan. An integrated master schedule integrates all of the planned work in the program, the resources necessary to accomplish that work, and the associated budget, and it should be the focal point for program management. This schedule can show, for example, the completion dates for all activities leading up to major events or milestones, which can help determine if the program’s parameters are realistic and achievable. An integrated master schedule may consist of several or several hundred individual project or other activity schedules that represent the various efforts within a program. It should include the entire known scope of work, including the effort necessary from all government, contractor, and other key parties for a program’s successful execution. In addition, NNSA has various program management policies and guidance that apply to uranium program efforts that are not capital asset projects and that fall outside of DOE Order 413.3B. For example: NNSA issued a program management policy in January 2017 that defines general roles and responsibilities for the program managers for all of its strategic materials, such as uranium. This policy broadly outlines the managers’ authority and responsibilities for managing the strategic materials; these responsibilities include developing program documentation and managing risk. NNSA issued a program management policy in February 2019 that states program managers should establish and document the requirements for scope, schedule, and cost management using a tailored approach to their program. These requirements include the development of schedule and cost estimates that cover the life cycle of a program where appropriate, among other things. NNSA’s program guidance—applicable to the uranium program and others that fall under the Office of Defense Programs—recommends the development of an integrated master schedule and states that having one supports effective management of a program’s scope, risk, and day-to-day activities. Specifically, the guidance states that during the initial phases of a program, an integrated master schedule provides an early understanding of the required scope of work, key events, accomplishment criteria, and the likely program structure by depicting the progression of work through the remaining phases. The guidance allows for tailoring of the agency’s management approach based on the particular program being managed. According to NNSA documents and officials, the UPF project is on schedule and within budget, and NNSA has developed a plan to receive start-up authorization for UPF operations in 2025 and attain full operational capability in 2026. NNSA documents and officials reported that the UPF project is on track to meet its cost and schedule baseline estimates, and thus is expected to be constructed for $6.5 billion by the end of 2025. According to DOE’s project report and NNSA officials, three of the seven UPF subprojects are complete and four are ongoing as of December 2019. When we last reported in September 2017, NNSA had completed the Site Readiness subproject. In February 2018, NNSA completed the Site Infrastructure and Services subproject—about 2 months early and about $18 million under budget. In December 2019, NNSA completed the Substation subproject—about 6 months early and $13 million under budget. As shown in table 1, by March 2018 all UPF subprojects’ formal scopes of work and cost and schedule baseline estimates were approved (CD-2), and NNSA gained approval to start construction on them (CD-3). Since establishing these cost and schedule baseline estimates, NNSA officials stated that they have not made any significant changes that would require DOE executive-level approval. According to DOE policy, changes that affect the project’s ability to satisfy the mission need or that increase costs by the lesser of $100 million or half the project costs must be approved by the DOE Deputy Secretary as DOE’s Chief Executive for Project Management. According to DOE’s project report and NNSA officials, the four ongoing subprojects were progressing on schedule and within budget as of December 2019. NNSA officials stated that they expect these subprojects to meet their respective cost and schedule performance baselines and that the overall UPF project will be constructed for $6.5 billion by the end of 2025. (See fig. 3 for photograph of Main Process Building and Salvage and Accountability Building’s construction progress as of September 2019.) NNSA and its contractor for Y-12 have developed a plan to receive start- up authorization for UPF operations in 2025 and then will likely attain full operational capability for the UPF in 2026, according to NNSA officials and contractor representatives. DOE and NNSA approved this plan, which is required by DOE policy, in February 2018. This plan outlines three major risks associated with the UPF project that NNSA will need to address so that the project can attain full operational capability: 1. Capabilities and systems integration within the UPF. Addressing this risk includes actions to ensure that all of the UPF’s systems, and the capabilities that those systems provide (e.g., casting, oxide production), can function together as designed through testing. 2. Process prove-in and design authority qualification. Addressing this risk includes actions to ensure that the UPF’s systems meet certain metrics and are qualified for mission work. Aspects of this include laboratory analysis, statistical validation of repeatability, and engineering evaluations. 3. Integration of UPF with other facilities. Addressing this risk includes actions to ensure that the UPF systems can interface with other facilities’ systems (e.g., those in Buildings 9215, 9204-2E, and 9995) as designed and that all systems are able to support full-scale operations. NNSA officials estimated that construction of the UPF will be completed in 2022. According to the plan, the UPF will then go through various preoperational testing and operational readiness reviews to demonstrate the capabilities using nonhazardous surrogate material. Following testing and readiness reviews, the UPF will gain startup authorization, go through additional testing and first use, and then attain full operational capability— also referred to as “operational release.” NNSA officials and contractor representatives stated in June 2019 that the UPF should receive startup authorization sometime in 2025, before the project’s estimated completion (CD-4) date of December 2025. These officials and representatives estimated that the UPF would attain full operational capability about a year from receiving that startup authorization—that is, sometime in 2026. (See fig. 4.) NNSA officials stated in October 2019 that in fiscal year 2020 they will update the plan to attain full operational capability to include a schedule with more specific time frames for startup authorization, hot functional testing, first use, and operational release, among other things. According to NNSA’s plan, attaining full operational capability for the UPF is the final step that will ultimately lead to and enable the cessation of uranium operations in Building 9212, which could then be turned over to DOE Office of Environmental Management for final disposition in 2035. NNSA followed requirements to obtain independent cost estimates for the UPF (i.e., the four largest UPF subprojects) whose total estimated costs exceeded $100 million. NNSA then used those estimates to help negotiate with contractors and inform baseline estimates. NNSA obtained independent cost estimates from DOE-PM for the four UPF subprojects for which total costs exceeded $100 million. As noted above, projects with total costs that exceed $100 million are subject to an appropriations limitation unless independent cost estimates are obtained, and DOE policy requires such estimates for such projects. DOE-PM, an office independent from NNSA and its management of the UPF project, conducted the independent cost estimates for the four larger subprojects: the Mechanical Electrical Building, Process Support Facilities, Salvage and Accountability Building, and Main Process Building subprojects. In addition, NNSA officials stated that they obtained independent reviews for the three subprojects for which costs did not exceed $100 million. DOE policy does not require independent cost estimates for projects whose total estimated costs are less than the $100 million threshold. However, a NNSA policy states that NNSA should obtain an independent cost estimate or independent cost review to validate a project’s cost baselines for those projects for which estimated costs are between $20 million and $100 million. NNSA organized the independent cost estimates for the four larger subprojects so that some of the independent cost estimates included work for more than one subproject. Specifically, DOE-PM completed two estimates—one in March 2016 and one in December 2016—that included site preparation work and long lead procurements for the Salvage and Accountability Building and Main Process Building subprojects. In November 2016, DOE-PM completed the independent cost estimate for the Mechanical Electrical Building, which was the only estimate to include a single UPF subproject. NNSA officials explained that they handled the estimate for this subproject differently because work for the Mechanical Electrical Building could be separated easily from the other subprojects, and it was largely designed as a commercial-grade building. Lastly, in November 2017, DOE-PM completed the independent cost estimate for the majority of the work for the Process Support Facilities, Salvage and Accountability Building, and Main Process Building subprojects. NNSA officials stated they organized the independent cost estimates in this way to meet DOE requirements and appropriations limitations but still be able to begin work on the aspects of the overall UPF project that need to be completed earliest. DOE-PM conducted the four UPF subprojects’ independent cost and schedule estimates using our cost estimating and scheduling best practices, according to DOE-PM’s independent cost estimate reports. DOE-PM reviewed the project’s key cost drivers—elements whose sensitivity significantly affects the total project cost. The DOE-PM team then established independent estimates for those cost drivers, which may include vendor quotes for major equipment and detailed estimates for other materials, labor, and subcontracts. The team also prepared an independently generated resource-loaded schedule that allowed them to check for adequate funding compared with the project’s funding profile developed by the project team. DOE-PM’s analyses are based on their review of the UPF project’s work breakdown structure and associated documents, which include all of the activities that make up the project’s scope. DOE-PM also compared the UPF project estimates with our cost estimating and scheduling best practices, according to DOE-PM’s independent cost estimate reports. For example, DOE-PM’s November 2017 report found that the three larger UPF subproject’s cost and schedule estimates partially met the best practices and recommended some changes to the contractor to address those estimates that did not. DOE-PM reconciled the results of its independent cost estimates with the initial project estimates, as required by DOE’s standard operating procedure and NNSA’s business operating procedure for conducting independent cost estimates. During the reconciliation, DOE-PM worked with the UPF project team to adjust both the initial project estimates and its own independent cost estimates to correct any errors or misinterpretations of project requirements, according to the independent cost estimate reports. Under DOE’s and NNSA’s independent cost estimate procedures and according to DOE-PM officials, any remaining differences should be identified and explained, but estimates should not be changed. DOE-PM drew from the independent cost estimates for the Mechanical Electrical Building subproject to complete an external independent review of that subproject in November 2016. Then, DOE-PM drew from the independent cost estimates that included work for the Main Process Building, Salvage and Accountability Building, and Process Support Facilities subprojects to complete its external independent review of the UPF project in March 2018. NNSA officials stated that they used information from DOE-PM’s independent cost estimate and external independent review reports to help negotiate remaining work with the contractor and finalize the overall UPF project’s baseline estimates before starting construction. In June 2018, NNSA prepared a strategy to guide its negotiation of the remaining UPF project work that had not yet been priced with the contractor. Based on our review of NNSA’s negotiation strategy, we found that NNSA used DOE-PM’s independent cost estimate and external independent review reports to negotiate at least 14 of the 22 major and minor issues identified for discussion. These 14 issues included, for example, reducing concrete and freight direct costs, reducing the margin added to cover any increase in design scope, reducing subcontractor indirect costs, and increasing accuracy of other cost and schedule estimates. DOE approved NNSA’s cost and schedule baseline estimates (CD-2) and start of construction (CD-3) in March 2018 for three UPF subprojects. (See table 2 for the recommended cost and schedule baselines from the external independent review report and the final cost and schedule baseline estimates for all UPF subprojects.) In five of the seven subprojects, the final cost baseline estimates were close to or below the recommended baselines from DOE-PM’s external independent review. Also, in four of the seven subprojects, the final schedule baseline estimates were close to the recommended baselines. According to NNSA officials, the UPF project final baseline cost estimate includes cost contingency, and the December 2025 final schedule baseline estimate includes a year of schedule contingency. NNSA officials stated that, if necessary, they could use available funds to expedite the schedule. NNSA officials also expressed confidence that the UPF project will meet its goal of construction for $6.5 billion by the end of 2025. Since we last reported in September 2017, NNSA identified and made progress in implementing the uranium program’s scope of work and developed an integrated master schedule and life-cycle cost estimate— key management information for the program. The uranium program’s integrated master schedule extends through fiscal year 2035, and the life- cycle cost estimate includes the $7.4 billion in program costs from fiscal years 2016 through 2026. Since we last reported in September 2017, NNSA identified the uranium program’s scope of work and made progress in carrying out key activities. Specifically, NNSA identified the uranium program’s scope of work as required under NNSA program management policy and which we identified as a leading practice in our cost estimating and schedule guides. According to NNSA documents we reviewed and officials we interviewed, NNSA developed the uranium program’s scope of work in a work breakdown structure, which defines in detail the work or activities necessary to accomplish the program’s objectives. NNSA officials stated that the uranium program’s scope of work includes the UPF project as well as the capabilities and other activities necessary for the overall modernization effort that are not part of the UPF project. NNSA made progress implementing the following three main areas of the uranium program’s scope of work: Process Technology Development. Since we last reported in September 2017, NNSA’s uranium program has made progress in three of the four process technology projects that it manages to develop new uranium processing capabilities. According to NNSA officials, these capabilities are not included in the UPF project but are necessary to complete the suite of uranium capabilities required to meet weapons program needs. NNSA approved the electrorefining project’s cost and schedule performance baselines and start of construction (CD-2/3) in February 2019. This project, along with the direct chip melt projects discussed further below, are designed to provide a capability that was scoped out of the UPF project. Specifically, the electrorefining project is to provide the capability to purify uranium metal. NNSA officials stated that the calciner project will have its cost and schedule baselines and start of construction approved (CD- 2/3) in May 2020. This project is to provide the capability to convert uranium-bearing solutions to uranium oxide (a dry solid) so that it can be stored pending further processing in the future. The project will be located in Building 9212 and supports the exit of that building by enabling the processing of certain uranium- bearing solutions (such as the solutions resulting from cleaning out the building’s pipes and vessels) into a dry solid oxide that can be stored pending further processing. According to NNSA officials, the direct chip melt projects include two related efforts—a front-loading furnace and a bottom- loading furnace—that will provide the capability to process uranium scrap metal. Officials stated that the front-loading furnace direct chip melt project received approval to start work in September 2019 and has an estimated project completion of May 2021. This will provide near-term capability to process uranium scrap metal until the bottom-loading furnaces are designed and constructed. Officials said NNSA initiated the bottom-loading furnace direct chip melt project in July 2019 and expects to start construction in January 2021. Because the direct chip melt projects fall below the $50 million threshold for management under DOE Order 413.3B, they do not have CD dates. However, NNSA officials stated they will manage and oversee the bottom- loading furnace project under the Office of Defense Programs’ authorization-to-proceed memorandum and follow the sound project management principles outlined in the order. NNSA officials stated that the agency requires an oxide-to-metal conversion capability. In June 2019, NNSA issued a Notice of Intent to enter into a sole-source contract to provide the uranium oxide to metal conversion capability. According to NNSA officials, this potential sole-source contract is a near-term strategy that could cover any gap caused by phasing out operations in Building 9212. According to NNSA, under this contract the contractor could provide conversion services in 2023, effectively covering any gap caused by phasing out conversion operations in Building 9212. NNSA officials stated that the agency intends to continue pursuing the direct electrolytic reduction technology to provide the oxide-to-metal conversion capability after the sole-source contract, but the technology has not progressed since we last reported in 2017. Extended Life Programs. In December 2017, NNSA developed the implementation plan for the extended life programs for Buildings 9215 and 9204-2E. NNSA also developed an extended life program for Building 9995 in November 2017 and the implementation plan for that program in September 2018. NNSA updated both of these implementation plans in September 2019. Further, in September 2018, NNSA developed an implementation plan for its strategy to stop operations in Building 9212 and begin post-operations clean-out activities. These implementation plans identify a specific scope of work, and the necessary funding, that NNSA must execute in order to extend the operational lives of Buildings 9215, 9204-2E, and 9995 through the 2040s. Reducing Material at Risk in Older Buildings. Since we last reported in September 2017, NNSA has made progress in its efforts to move uranium materials out of older facilities and into the HEUMF. Specifically, NNSA officials said in November 2019 that they were about 77 percent done with this effort and had moved more than 50 metric tons of uranium out of older facilities and into the HEUMF since fiscal year 2015. In June 2019, NNSA officials said that their current strategy focuses on incorporating near-just-in-time inventory practices and further reducing material at risk by 2023. According to NNSA officials, this strategy is to further minimize the amount of material that is staged in Y-12’s older buildings. Also, according to NNSA officials, NNSA achieved a target working inventory of material in Building 9215 in 2016 and in Building 9204-2E in 2019. NNSA officials stated that, as of November 2019, they were on schedule to complete the remaining efforts by their estimated time frames. NNSA officials stated that the program’s scope of work includes elements for which additional analyses may be required and that any additional program work identified by those analyses will be incorporated into the scope of work, as appropriate. For example, NNSA identified the additional environmental and seismic analyses necessary to develop the scope of work for addressing certain structural deficiencies in Buildings 9215 and 9204-2E. NNSA is under a court order to complete additional environmental and seismic risk analyses following a 2014 update in the seismic hazard map for the area, which showed a greater risk than the previous version. According to Defense Nuclear Facilities Safety Board officials, in response to its 2015 report, NNSA identified their approach for re-evaluating the facilities’ conditions and risks and addressing some of the board’s seismic-related concerns. According to board officials, NNSA plans to start the re-evaluation of these structures in early fiscal year 2020. NNSA officials stated that if the additional analyses identify additional necessary work for the uranium program, NNSA will update the scope of work and revise the extended life program implementation plans to include that work. In December 2019, NNSA developed an integrated master schedule through fiscal year 2035 and a life-cycle cost estimate for the program through fiscal year 2026 that includes over $850 million in costs in addition to the UPF project. Successful management of federal acquisition programs, such as NNSA’s uranium program, partly depends on developing this key management information, as stated in our cost estimating and schedule guides. In September 2017, we found that NNSA had not yet developed an integrated master schedule or life-cycle cost estimate for the uranium program and recommended that NNSA set a time frame for doing so. NNSA agreed with this recommendation and has made progress in implementing it. A complete scope of work is required to develop an integrated master schedule and life-cycle cost estimate. (See fig. 5.) In December 2019, NNSA developed an integrated master schedule based on the uranium program’s scope of work to help manage its uranium program, as recommended in NNSA’s program guidance as well as our schedule guide and other best practices. According to PMI’s Program Management Standard, a program-integrated master schedule is the top-level planning document that includes individual program elements’ schedules and defines their dependencies among those required to achieve the program’s goals. According to NNSA officials, NNSA included all of the uranium program’s capabilities and elements that make up its scope of work, as well as other work that may affect the program, through fiscal year 2035. NNSA officials stated that the schedule includes the key milestones for each uranium program capability and element, such as project completion (CD-4) and operational release, since these key milestones are important for tracking the uranium program’s critical path of activities and for overall program management. NNSA officials stated that they will start reporting the uranium program’s progress against this integrated master schedule beginning in 2020. NNSA officials stated that they expect the integrated master schedule to be iterative and that they will update it to capture any changes or additions to the program’s scope of work. In December 2019, NNSA developed a life-cycle cost estimate through fiscal year 2026 for the uranium program, as called for in our cost estimating guide and other best practices. NNSA estimated that the uranium program will spend a total of approximately $7.4 billion from fiscal years 2016 through 2026 to support its uranium processing modernization efforts. Specifically, NNSA officials stated that the life-cycle cost estimate includes $6.5 billion in UPF project costs and over $850 million in program costs that include developing the uranium processing capabilities that are not part of the UPF project, integrating those capabilities with the UPF, improving the infrastructure of existing buildings, and transitioning out of Building 9212. NNSA officials stated that they estimated uranium program life-cycle costs from fiscal years 2016 through 2026 because they could not accurately estimate some of the activities in the program’s scope of work that are enduring for the nuclear security enterprise rather than specific projects with finite schedules for construction. According to our cost- estimating guide, a reliable cost estimate reflects all costs associated with a program’s scope of work, and the estimate should be updated to reflect any changes in requirements—that is, a life-cycle cost estimate can be iterative. NNSA officials stated that they expect to update the life-cycle cost estimate with additional program costs, once known, and will include any additional future scope added to the program. Schedule milestones and cost estimates included in NNSA’s integrated master schedule and life-cycle cost estimate for the uranium program are summarized in table 3. We are encouraged that NNSA may be able to better manage the day-to- day activities of the uranium program and mitigate any risks associated with integrating the UPF project with other aspects of the program through its development of key program management information—a scope of work, an integrated master schedule, and a life-cycle cost estimate. Successful program management through the life of a program depends in part on all of these efforts and may provide decision makers such as Congress with needed information on the program’s complete scope of work, key events, and expected long-term program costs. We provided DOE and NNSA with a draft of this report for review and comment. NNSA provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of the National Nuclear Security Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the individual mentioned above, Jonathan Gill (Assistant Director), Elizabeth Luke (Analyst in Charge), Danny Baez, John Bauckman, Brian Bothwell, Juaná Collymore, Jennifer Echard, Justin Fisher, Juan Garay, William Gerard, Cynthia Norris, Dan Royer, and Kiki Theodoropoulos made key contributions to this report.", "summary": "A supply of enriched uranium is crucial to support the nation's nuclear weapons stockpile and the U.S. Navy, but the infrastructure of several U.S. uranium-processing facilities is outdated. In 2014, NNSA began plans to meet the nation's uranium needs by redirecting processing capabilities to the UPF and to other existing buildings NNSA plans to upgrade at Y-12 in Oak Ridge, Tennessee. The National Defense Authorization Act for Fiscal Year 2013, as amended, includes a provision for GAO to periodically review the UPF. Also, a Senate report accompanying the National Defense Authorization Act bill for fiscal year 2012 provides for GAO to review the independent cost estimates for the UPF. This report, which is GAO's sixth on the UPF, examines (1) the status of the UPF project and plans for starting UPF operations; (2) the extent to which NNSA has followed requirements to obtain independent cost estimates for the UPF, and how NNSA has used information from those estimates; and (3) the extent to which NNSA has made progress in developing uranium program management information since GAO's September 2017 report. GAO reviewed project and program documents on planning, schedule, cost, and implementation, and interviewed program officials. National Nuclear Security Administration (NNSA) documents and officials reported that the new Uranium Processing Facility (UPF) is on schedule and within budget. As of December 2019, three of the seven UPF subprojects were complete, and four were ongoing. NNSA officials told GAO they estimate that construction of the UPF will be complete in 2022 and that they expect to meet NNSA's goal of completing the UPF project for $6.5 billion by the end of 2025. As required, NNSA and its contractor developed a plan for starting operations at the UPF, which officials stated will likely occur in 2026. According to NNSA's plan, attaining full UPF operational capability will be the final step to enable NNSA to stop certain operations in Building 9212—the oldest building with the highest nuclear safety risk at the Y-12 National Security Complex (Y-12)—and turn it over to the Department of Energy (DOE) for final disposition by 2035. In managing the UPF project, NNSA obtained independent cost estimates for the four largest UPF subprojects whose total estimated costs exceeded $100 million. Such estimates are required by DOE policy and to satisfy limitations in appropriations laws. Moreover, based on its review of NNSA documents, GAO found NNSA used those estimates to help inform the UPF's approved cost and schedule baseline estimates. NNSA officials stated that they used information from the independent cost estimate and other sources to help negotiate remaining work with the contractor and finalize the overall UPF's baseline estimates before starting construction. Since GAO last reported on NNSA's broader uranium program in September 2017, NNSA identified and made progress in implementing the uranium program's scope of work that includes capabilities and other activities that are not part of the UPF project but are needed for weapons program. Specifically, NNSA made progress in the following areas: 1. developing process technologies that are expected to increase the efficiency and effectiveness of certain uranium processing capabilities; 2. investing in infrastructure to extend the operational lives of older uranium facilities; and 3. reducing the amount of uranium stored and used in these older uranium facilities. NNSA has also made progress in implementing GAO's 2017 recommendation to develop key management information for the uranium program. Specifically, NNSA developed an integrated master schedule covering the scope of work for the program through fiscal year 2035 and a life-cycle cost estimate that includes program costs through fiscal year 2026. NNSA estimated that, in addition to completing the UPF project for $6.5 billion, the uranium program will spend over $850 million from fiscal years 2016 through 2026 to support modernizing other needed uranium processing capabilities and transitioning out of Building 9212.", "document_type": "gao"}
{"report": "Priority and Standard Review For a priority review, the Food and Drug Administration (FDA) directs its resources to applications for new drugs that prevent, diagnose, or treat a serious condition and, if approved, would provide significant improvements in safety or effectiveness compared to available drugs. A drug may also receive priority review if the drug sponsor redeems a priority review voucher, among other things. FDA’s goal is to complete the review of a priority application within 6 months. Drugs that do not receive priority review receive standard review. FDA’s goal is to complete the review of a standard application within 10 months. FDA, an agency within the Department of Health and Human Services (HHS), is responsible for overseeing the safety and efficacy of drugs and biological products, such as vaccines, sold in the United States. Before a drug sponsor can market a new drug, it generally must submit evidence of the drug’s safety and effectiveness to FDA in a new drug application or biologics license application. While FDA reviews most drug applications using its standard review process, FDA’s priority review designation is intended to reduce the review time needed to bring a drug to market for certain drugs that treat serious conditions. A drug application typically receives a priority review designation if the drug would provide a significant improvement in the safety or effectiveness of the prevention, diagnosis, or treatment of a serious condition when compared to available drugs, among other things (see sidebar). FDA reviews all applications to determine if they qualify for priority review. FDA is also responsible for the implementation of the three PRV programs, which are intended to encourage development of drugs for tropical diseases, rare pediatric diseases, and medical countermeasures. Qualifying diseases and conditions for the tropical disease PRV program and criteria for the rare pediatric disease PRV program are set forth in statute—though the list of eligible tropical diseases can be updated by order of the Secretary of HHS. For the medical countermeasure PRV program, HHS publishes a list of high- priority threats that qualify for a PRV, including those that the Department of Homeland Security determines to pose a material threat sufficient to affect national security. (See table 1 for the types of drugs eligible for a PRV.) In order to be awarded a PRV, drug applications must meet additional criteria. For example, for all three PRV programs, the drug application must be eligible for priority review and a drug may be disqualified if its active ingredient has been previously approved by FDA in another drug application. If a drug application meets the eligibility criteria for one of the PRV programs, the drug sponsor can include a request for a PRV in its application, including supporting documentation demonstrating how the application meets the PRV eligibility criteria. Once FDA receives a sponsor’s drug application and PRV request, it reviews the information and considers whether the drug should be approved. If FDA approves the drug application, it includes its decision regarding whether to award a PRV in its approval letter. Once FDA awards a PRV to a drug sponsor, the sponsor can redeem the PRV with the submission of a future drug application for a drug intended to treat any disease or condition, shortening FDA’s targeted review time from the 10-month standard review to 6 months, even if the drug in that future application would not qualify for priority review on its own merits. The drug sponsor also has the option of selling or transferring the PRV to another drug sponsor, which may then choose to use it or similarly sell or transfer it. PRVs may be transferred any number of times before they are used. When the drug sponsor possessing the PRV ultimately decides to redeem it, the sponsor must notify FDA at least 90 days in advance of submitting its drug application that is using the PRV. Figure 1 provides a general overview of the PRV programs. The drug sponsor redeeming a PRV must also pay a PRV user fee (about $2.5 million in fiscal year 2019), in addition to other user fees required for all drug applications. Because drug applications submitted to FDA with a PRV would not otherwise qualify for priority review, PRV user fees are intended to cover FDA’s additional costs incurred when reviewing new drug applications with a PRV. When a drug sponsor notifies FDA of its intent to redeem a PRV, its notification serves as a legally binding commitment to pay the PRV user fee. Of the three PRV programs, two—the rare pediatric disease and the medical countermeasure PRV programs—are set to expire in the coming years, unless they are reauthorized by Congress. The rare pediatric disease PRV program will begin to expire on September 30, 2020, and the program will end in September 2022. The medical countermeasure PRV program will expire on October 1, 2023. After these end dates, FDA could no longer award a PRV for a rare pediatric disease or a medical countermeasure; however, the expiration dates do not affect PRV redemptions, as drug sponsors may redeem PRVs earned at any point in the future. As of September 30, 2019, FDA awarded 31 PRVs across the three PRV programs, with the majority being awarded through the rare pediatric disease PRV program (see fig. 2). According to FDA, all PRVs were awarded for drugs that met unmet medical needs. The 31 PRVs were awarded to 26 different drug sponsors; three sponsors were awarded two PRVs each and one sponsor was awarded three PRVs. FDA awarded the 31 PRVs for drugs that treat 27 different diseases. For five diseases— malaria, tuberculosis, smallpox, spinal muscular atrophy, and Duchenne muscular dystrophy—FDA awarded PRVs to two different drugs for their treatment, and FDA awarded one PRV for a drug that prevents two different diseases. (See appendix I for more information about the drugs for which FDA awarded PRVs.) The first PRV was awarded in fiscal year 2009, 2 years after the start of the tropical disease PRV program, and none were awarded in fiscal years 2010 through 2012. The first rare pediatric disease PRV was awarded in fiscal year 2014—about 2 years after that PRV program was authorized— and, beginning in fiscal year 2015, the majority of PRVs awarded were for rare pediatric diseases. In fiscal year 2018, FDA awarded eight PRVs, including the first medical countermeasure PRV, the most awarded in a single fiscal year (see fig. 3). Of the 31 PRVs that FDA awarded to drug sponsors, available data indicate 17 PRVs were subsequently sold to another drug sponsor, providing revenue to the sponsor selling the PRV. For 14 of these 17 PRVs, we were able to determine a sales price, which ranged from $67.5 million for a PRV sold in fiscal year 2014 to $350 million for a PRV sold in fiscal year 2015. However, the available sales prices of the PRVs sold since February 2017 have varied less than those sold previously, ranging from $80 to $130 million (see fig. 4). Because drug sponsors are only required to notify FDA of sales of rare pediatric disease PRVs at the time the sale occurs, additional transfers or sales of PRVs may have occurred. The drug sponsors, stakeholders, and researchers we interviewed noted that several factors could influence whether a drug sponsor keeps a PRV for future use, sells the PRV to another drug sponsor, or purchases a PRV to use on a drug that would not otherwise qualify for priority review. The PRV programs allow PRVs to be transferred multiple times, and according to stakeholders and drug sponsors we spoke with, the revenue gained from such sales may be a motivating factor for drug sponsors to sell them. For example, three stakeholders we interviewed said they believe drug sponsors consider the drugs in their development pipeline when deciding to keep, sell, or purchase a PRV, and one stated that drug sponsors need to determine if they would benefit more from using the PRV or the money they could make from selling it. One researcher commented that price variation for PRVs can affect how a drug sponsor perceives the incentive and that low prices for PRVs may signify the need for additional incentives for drug development. However, two drug sponsors told us that they would continue to pursue PRVs as long as they were available and useful for a particular drug in their pipeline. As of September 30, 2019, drug sponsors redeemed 16 of the 31 PRVs— that is, they submitted the PRV to obtain priority review for a drug application for a drug that would not otherwise qualify for a priority review. The drugs for which the PRVs were redeemed treat or prevent a variety of conditions and diseases, including human immunodeficiency virus (HIV), type 2 diabetes, and different forms of arthritis. (See appendix II for a complete list of PRV redemptions.) The first PRV was redeemed in fiscal year 2011, about 2 years after the first PRV was awarded, and the second PRV was redeemed in fiscal year 2015. Since 2017, drug sponsors have redeemed between three and six PRVs each year (see fig. 5). The 16 PRVs were redeemed by 10 different drug sponsors. Twelve of the 16 redeemed PRVs were purchased and redeemed by a drug sponsor different from the original PRV awardee. All 16 redeemed PRVs were redeemed within 4 years of FDA awarding them (see fig. 6). Of the 15 PRVs that were not redeemed as of September 30, 2019, 12 were awarded in fiscal years 2018 or 2019, and one was awarded in early fiscal year 2016. (See fig. 7.) Drug sponsors we contacted told us that decisions on when to redeem PRVs are largely strategic and take into consideration their drug development pipeline and market competition. For example, three of the drug sponsors told us they might choose to redeem a PRV to help a drug reach the market faster than a competitor’s drug, and two drug sponsors told us they may hold a PRV to use to obtain priority review for a particular drug that is in development. Another drug sponsor told us it considers the likelihood of a drug receiving approval from FDA when deciding when to use a PRV (since the PRV only affects the time frames for FDA’s review and does not guarantee approval), and if a drug in its pipeline could receive priority review from FDA on its own merit. Almost half of the awarded PRVs had not been redeemed as of the end of fiscal year 2019, which may affect FDA’s ability to forecast resources needed in the future. In 2016, we reported that FDA told us that the rare pediatric disease PRV program placed a substantial strain on its workload, explaining that performing a priority review on a drug that would otherwise merit a standard review requires the agency to conduct significant work in a compressed time frame. Between fiscal years 2011 and 2018, PRV redemptions have accounted for less than 1 percent of FDA’s reviews in any given year, according to FDA. While FDA receives 90 days’ notice of a PRV redemption, the notice period may not be enough time to ensure the appropriate staff are available to review a drug application that the agency does not consider to be a public health priority, according to FDA. However, one researcher noted that this uncertainty exists for all drug applications, as FDA cannot know in a given year how many drug applications will be submitted in any particular therapeutic area or how many of these applications will qualify for priority review. Furthermore, two drug sponsors, one researcher, and one stakeholder we spoke with noted that FDA collects additional user fees for PRV redemptions specifically to support the priority review for a drug that would not normally qualify for one. Since fiscal year 2011, FDA has collected almost $44 million in PRV user fees for the 16 redeemed PRVs. FDA does not track the resources it uses specifically for the PRV programs, so the agency cannot determine if the PRV user fees paid when PRVs are redeemed cover the associated costs. According to FDA, the agency cannot anticipate the therapeutic area for which a PRV will be redeemed, so PRV user fees may not ameliorate the effect of PRV redemptions on the review divisions or provide for rapid hiring of additional review staff with relevant experience and technical expertise. FDA officials told us that each new PRV program—and changes made to existing PRV programs—requires additional resources to implement. The agency reports that the services of over 11 offices within FDA are required to work on some aspect of the PRV programs, which may at times require FDA to shift resources from its public health priorities. According to FDA, the PRV programs also expend and divert agency resources to draft and revise PRV-related guidance; update webpages; research, draft, and publish notices and orders to add or decline to add diseases to the list of eligible tropical diseases; respond to inquiries from sponsors, potential sponsors, investors, attorneys, and other interested individuals; and respond to requests for a rare pediatric disease designation. Our literature review found three studies—one for each of the PRV programs—that examined and drew conclusions about how PRV programs affect drug development; of these, one study found evidence of an effect of a PRV program on drug development. Specifically, it found that drugs to treat rare pediatric diseases, which could be eligible for a rare pediatric disease PRV, were more likely to advance from phase I to phase II clinical trials when compared to rare adult disease drugs. The studies examining the other two PRV programs did not find an effect on drug development. Rare pediatric disease PRV program. A 2019 study found that the rare pediatric disease PRV program was not associated with an increase in the number or rate of new pediatric disease drugs that started or completed clinical trials. However, the study found that, after the creation of the rare pediatric disease PRV program, drugs the study authors determined could be eligible for a rare pediatric disease PRV were more likely to advance from phase I to phase II clinical trials compared to rare adult disease drugs, which are not eligible for a PRV under this program. Additionally, the study found the time it took for drugs to progress to the next stage of development was shorter among drugs eligible for a rare pediatric disease PRV compared to drugs for rare adult diseases, across all three phases of clinical development. Tropical diseases PRV program. A 2017 study found that this PRV program was not associated with an increase in tropical disease drugs starting clinical testing. The study found the proportion of tropical disease drugs among all drugs in development decreased slightly after the PRV program was created. Study authors suggested the relatively small number of approved tropical disease products in the last decade indicates the PRV program did not serve as a stimulus for completing late-stage drug development. Medical countermeasure PRV program. A 2018 study reported that 25 of 26 medical countermeasures undergoing clinical trials received direct or indirect public support, such as funding from the Department of Defense. Authors stated that, given the extent to which development of medical countermeasures already occurs via direct or indirect federal funding, alternatives other than the PRV program could better stimulate development of medical countermeasures. While the few studies of the PRV program found little to no effect on drug development, the seven drug sponsors we contacted told us the PRV programs were an incentive—that is, a factor in their decisionmaking—for drug development. In contrast, the seven researchers and seven stakeholders we contacted reported mixed views of the PRV programs as an incentive for drug development. Drug sponsors. All seven drug sponsors told us the PRV programs were a factor in drug development decisions—six sponsors said it was one of a number of factors, and one sponsor said it was pivotal in its development of a drug. For example, three drug sponsors told us PRVs were important to help fund drug development and one of these drug sponsors told us the PRV program supported its decision to move a drug already under development to market. Four drug sponsors told us PRV programs may be a more significant incentive for small drug sponsors, with one small, nonprofit drug sponsor noting that it entirely relied on the profits from the sale of its PRV to ensure its drug would become available to those who need it. Additional factors drug sponsors reported considering included whether the sponsor has a drug in their development pipeline that could particularly benefit from a PRV, and whether its drug development program has public financial support, such as direct federal funding. Researchers. The seven researchers reported mixed views of the PRV programs as an incentive for drug development, and their perceptions of the three programs varied. For example, when asked to describe the incentive for drug development provided by the tropical disease PRV program, two researchers described it as “not significant,” and two researchers described it as “somewhat significant.” However, one of these researchers told us the tropical disease PRV program encouraged drug development, particularly for diseases such as tuberculosis and malaria for which a drug is potentially more commercially viable. Regarding the rare pediatric disease PRV program, three researchers told us they have heard anecdotally that the program is an incentive to develop or continue development of rare pediatric disease drugs. In contrast, one researcher told us many drug sponsors have received a rare pediatric disease PRV for drugs they would have produced anyway, and another told us he did not believe the rare pediatric disease PRV provided an adequate incentive for adding new drugs into a drug sponsor’s pipeline. Finally, four researchers told us it was too early to evaluate the medical countermeasure PRV program as an incentive. Stakeholders. The seven stakeholders also reported mixed views on the PRV programs as an incentive for drug development. For example, one stakeholder told us that drug sponsors have entered particular drug development areas because of the PRV programs, and the PRV program has been pivotal to the financial planning of small drug sponsors working in the medical countermeasures and rare pediatric disease spaces. In contrast, two other stakeholders told us the PRV programs are an incentive to obtain FDA approval for a drug that has already been developed and marketed outside of the United States but are not an incentive for developing new drugs. One of these stakeholders and an additional stakeholder also noted that PRVs are often a source of additional revenue to drug sponsors that would have developed their PRV drug anyway and did not need the PRV to finance drug development. The number of PRVs awarded by FDA could influence the effectiveness of the PRV programs as incentives, according to several drug sponsors, researchers, and stakeholders we contacted. Specifically, some indicated that the potential revenue from the sale of a PRV could decline if more PRVs are awarded, and there is an increased supply of PRVs available for sale. Specific comments included the following: One drug sponsor told us that, while the number of PRVs on the market was a concern, they have remained valuable. Another drug sponsor told us it was not concerned with the relative value of PRVs, because it did not plan to sell its remaining PRVs and would purchase more in the future if PRVs would benefit drugs in its pipeline. One researcher told us lower prices for PRVs merited concern, because the PRV alone might not be sufficient to motivate drug development. The researcher indicated that a drug would also need either sufficient sales or additional government incentives. Two stakeholders told us the sales prices of PRVs (and potential revenue from selling them) might be more of a concern for small drug sponsors than large drug sponsors, as these stakeholders told us small drug sponsors are more likely to sell their PRV instead of using it for another drug in their portfolio. Drug sponsors, researchers, and stakeholders we contacted also reported mixed views on whether the rare pediatric disease and medical countermeasure PRV programs—set to expire by 2022 and 2023, respectively—should be reauthorized. While FDA officials reported that, as of April 2019, the agency does not have a position on the reauthorization of these two PRV programs, drug sponsors generally indicated support for their reauthorizations, with some noting that PRV program expirations may negatively affect overall drug development and the willingness of drug sponsors to work in these areas. The researchers we contacted offered mixed opinions on reauthorization. For example, one recommended reauthorizing both PRV programs, but indicated that his opinion could change if a better incentive was developed. In contrast, another researcher supported the expiration of these two programs, noting that their expiration could ultimately raise the potential revenue from the sale of an available PRV and could also make the tropical disease PRV program, which does not require reauthorization, more popular to encourage drug development. Most stakeholders we contacted did not offer a clear opinion on reauthorization; those that did generally supported reauthorization. Drug sponsors, researchers, and stakeholders we contacted suggested several improvements to the PRV programs, including those described below. Require innovation for PRV-eligible drugs. Two researchers and two stakeholders noted that the PRV programs, particularly the tropical disease PRV program, have been criticized for not providing incentives for innovation and suggested PRV awards be limited to drugs new to the global market. Currently, drug sponsors can receive a PRV for a drug that has already been developed and marketed outside of the United States, but which qualifies for a PRV because the drug has not been approved for marketing in the United States. One researcher suggested the federal government should not provide an incentive, like a PRV, for drugs already in existence outside of the United States, for which most research and development was already completed. However, one drug sponsor told us that requiring a tropical disease drug to be approved first in the United States to qualify for a PRV would delay entry of the drug into the international markets that need it the most. Additionally, two stakeholders told us that drugs that have already been developed may have significant benefits to patients when combined or used to treat other diseases. Require drug sponsors to guarantee access to PRV-eligible drugs. One researcher and two stakeholders suggested drug sponsors submit an access plan to help ensure the drug reaches the populations in need of the treatment, and one drug sponsor suggested they supply at cost the drugs for which the PRV was awarded. One of these stakeholders noted that a weakness of the PRV program is that drug sponsors awarded a PRV have no obligation to make the approved drug available at an affordable price. It suggested that requiring an access plan may result in drugs for which a PRV was awarded being more available and accessible to the populations that need them. However, three stakeholders noted that FDA may not have the resources or authority to enforce such access commitments. Limit PRVs to drug sponsors with financial need. One drug sponsor and one researcher suggested awarding a PRV only to drug sponsors that financially require it to develop their drug, such as a nonprofit organization that must leverage potential revenue from the PRV to help offset drug development costs. Make administrative changes. One drug sponsor told us FDA’s process for determining the list of tropical diseases eligible for a PRV was not transparent and wanted clarification on FDA’s timeline for editing this list. Another drug sponsor told us it wanted clarification on whether a drug would merit priority review on its own, so the sponsor could determine whether to redeem a PRV for that drug. In addition to suggesting improvements to the PRV programs, drug sponsors, researchers, and stakeholders we contacted, as well as our literature review, identified potential alternatives to the PRV programs that provide incentives for drug development (see table 2). We provided a draft of this report to HHS for review and comment. HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on GAO’s website at http://www.gao.gov/. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix IV. Sales price (dollars in millions) Gilead Sciences, Inc. Gilead Sciences, Inc. Novartis Pharmaceuticals Corporation Dengvaxia Sanofi Pretomanid The Global Alliance for TB Drug Development (TB Alliance) BioMarin Pharmaceutical Inc. Treatment of mucopolysaccharidosis type IVA (MPS IVA; Morquio A syndrome) PRV Sale date purchaser August 2015 AbbVie Inc. Drug name Drug sponsor Unituxin United Therapeutics Corporation Cholbam Asklepion Pharmaceuticals, LLC Xuriden Wellstat Therapeutics Corporation Strensiq Alexion Pharmaceuticals Inc. Kanuma Alexion Pharmaceuticals Inc. Exondys 51 Sarepta Therapeutics, Inc. Teva Pharmaceutical USA, Inc. Treatment of hypophosphatasia (HPP) Spinraza Biogen, Inc. Gilead Sciences, Inc. Treatment of Duchenne muscular dystrophy (DMD) Treatment of tripeptidyl peptidase 1 (TPP1) deficiency (Batten disease) Marathon Pharmaceuticals, LLC Brineura BioMarin Pharmaceutical Inc. Kymriah Novartis Pharmaceuticals Corporation Mepsevii Ultragenyx Pharmaceutical Inc. Luxturna Spark Therapeutics, Inc. Sales price (dollars in millions) Vertex Pharmaceuticals Inc. Crysvita Ultragenyx Pharmaceutical Inc. Epidiolex GW Research, Ltd. Treatment of X-linked hypophosphatemia (XLH) Inc. Biohaven Pharmaceuticals, Inc. Leadiant Biosciences, Inc. Gamifant Novimmune S.A. Zolgensma Avexis, Inc. Treatment of seizures associated with Lennox Gastaut-Syndrome and Dravet syndrome Treatment of adenosine deaminase-severe combined immunodeficiency (ADA- SCID) Treatment of primary hemophagocytic lymphohistiocytosis (HLH) Treatment of pediatric patients with spinal muscular atrophy (SMA) Legend: ✓ = transferred from original drug sponsor; ✗ = no public announcement of transfer; — = not applicable. Appendix II: Redeemed Priority Review Vouchers (PRV) Appendix II: Redeemed Priority Review Vouchers (PRV) Appendix III: Key Milestones of the Priority Review Voucher Programs FDA may not award any rare pediatric disease priority review vouchers after September 30, 2020, unless the drug has received a rare pediatric disease designation by that date, and FDA has approved the drug application by September 30, 2022. In addition to the contact named above, Kim Yamane (Assistant Director), Erin C. Henderson (Analyst-in-Charge), Kaitlin Farquharson, Laurie Pachter, Vikki Porter, Helen Sauer, Meghan Shrewsbury, and Merrile Sing made key contributions to this report. Also contributing were Leia Dickerson, Hayden Huang, and Yesook Merrill.", "summary": "Few drugs are currently available to treat certain tropical and rare pediatric diseases and to use as medical countermeasures, given their small market or potentially limited profitability. To help provide incentives for the development of such drugs, Congress created three PRV programs, which award PRVs to drug sponsors that develop drugs for tropical diseases, rare pediatric diseases, and medical countermeasures (e.g., drugs to mitigate harm from biological, chemical, radiological, or nuclear agents). FDA, an agency within the Department of Health and Human Services (HHS), administers these programs. The 21st Century Cures Act included a provision for GAO to study the PRV programs. GAO examined the number of PRVs awarded and redeemed and the drugs for which they were awarded or redeemed, and what is known about the extent to which the PRVs provide incentives for developing drugs to meet unmet needs. GAO analyzed FDA data on awarded and redeemed PRVs for fiscal years 2009 through 2019 and other publicly available information on their transfers and sales. GAO conducted a literature review of peer-reviewed articles published from January 2009 through May 2019 that examined the PRV programs and interviewed FDA officials. GAO also interviewed seven stakeholder groups, seven academic researchers, and seven drug sponsors selected based on factors such as familiarity with PRV programs or drug development. HHS provided technical comments on a draft of this report, which were incorporated as appropriate. The Food and Drug Administration (FDA) awards priority review vouchers (PRV) to drug sponsors that develop drugs for tropical diseases or rare pediatric diseases or to use as medical countermeasures. The PRV—which can be sold to another drug sponsor—may be redeemed later to receive priority review from FDA with a targeted review time of 6 months, rather than the 10-month standard review, for a drug application of the PRV holder's choice. The potential for additional revenue from either marketing a drug about 4 months sooner or from selling the PRV could provide an incentive for drug sponsors to develop drugs for these diseases or conditions. From fiscal year 2009, when the first PRV was awarded, through fiscal year 2019, FDA awarded 31 PRVs, mostly for drugs to treat rare pediatric diseases. Of the 31 PRVs awarded by FDA,17 were sold to another drug sponsor for prices ranging from about $67 million to $350 million, according to available data. As of September 30, 2019, available data show that drug sponsors had redeemed 16 of the 31 PRVs to obtain a shorter FDA review time for drugs to treat conditions and diseases such as human immunodeficiency virus (HIV), type 2 diabetes, and different forms of arthritis. These drug applications may not otherwise qualify for priority review. GAO found few studies that examined the PRV programs, and those that did found the programs had little or no effect on drug development. However, all seven drug sponsors GAO spoke with stated that PRVs were a factor in drug development decisions—six sponsors said they were one of a number of factors, while one sponsor said they were pivotal in its development of a drug. Some academic researchers and stakeholders expressed concerns about the PRVs as incentives for drug development, including the potential for the expected revenue from the sale of a PRV to decline as more are awarded and available for sale.", "document_type": "gao"}
{"report": "The federal government and states share responsibility for the financing and administration of the Medicaid program. With regard to financing, Medicaid is funded jointly by the federal government and states, with FMAP rates ranging from a statutory minimum of 50 percent to a statutory maximum of 83 percent. Under PPACA, expenditures for Medicaid expansion enrollees are matched at 90 percent for fiscal year 2020. Program administrative responsibilities are shared between states and the federal government. State administrative responsibilities include, among other things, determining eligibility, enrolling beneficiaries, and adjudicating claims. With regard to eligibility, states are primarily responsible for verifying eligibility and enrolling Medicaid beneficiaries. These responsibilities include verifying and validating individuals’ eligibility at the time of application and periodically thereafter, accurately assigning enrollees to the appropriate eligibility group, and promptly disenrolling individuals who are not eligible. PPACA requires states to use third-party sources of data to verify eligibility to the extent practicable. Consequently, states have had to make changes to their eligibility systems, including implementing electronic systems for eligibility determination and coordinating systems to share information. In addition, states have had to make changes to reflect new sources of documentation and income used for verification. In certain circumstances, states may delegate responsibility to the federal government to make eligibility determinations. At the federal level, CMS is responsible for overseeing states’ design and operation of their Medicaid programs and ensuring that federal funds are appropriately spent. CMS oversees state enrollment of beneficiaries and reporting of expenditures. For example: CMS reviews and approves states’ Medicaid eligibility verification plans, which rely primarily on information available through data sources—including federal data sources such as the Social Security Administration and the Internal Revenue Services, or state data sources such as state tax records or unemployment information— rather than paper documentation from families. CMS has various review processes in place to ensure that expenditures reported by states are supported and consistent with Medicaid requirements. The agency also has processes to check whether the correct federal matching rates were applied only to expenditures receiving a higher than standard federal matching rate, which can include certain types of services and populations. CMS estimates Medicaid improper payments, including improper payments due to erroneous beneficiary eligibility determinations. Although CMS has not calculated the improper payments related to beneficiary eligibility determinations since 2014, it plans to begin reporting this estimate in November 2019. Our previous work has identified gaps in CMS oversight of Medicaid eligibility determinations, which affect the federal matching rate. An accurate determination of eligibility is critical to ensuring that only eligible individuals are enrolled, that they are enrolled in the correct eligibility group, and that states’ expenditures are appropriately matched with federal funds for Medicaid enrollees. The implications of inaccurate eligibility determinations can be significant, especially given the growth in enrollment and spending of the expansion population, which represented nearly one quarter of program enrollment and federal expenditures in fiscal year 2017. (See fig. 1.) In September 2016, we reported on our undercover testing for determining Medicaid eligibility and the vulnerabilities we found. We found weaknesses that led to inaccurate eligibility determinations. For example, three of eight fictitious applications we submitted to federal and state marketplaces were approved for Medicaid, despite having identity information that did not match Social Security Administration records. These results, while illustrative of the challenges of assuring accurate eligibility determinations, cannot be generalized. With respect to CMS’s reviews of eligibility determinations, in 2015, we also found that CMS did not review federal Medicaid eligibility determinations in the states that delegated such authority to the federal government. Based on our findings, we made the following recommendations. CMS should use information obtained from state and federal eligibility reviews to inform the agency’s review of expenditures for different eligibility groups in order to ensure that expenditures are reported correctly and matched appropriately. In February 2019, we considered this recommendation implemented, as CMS confirmed that it was sharing information between its eligibility reviews and quarterly expenditure reviews regarding Medicaid expansion enrollees. CMS should conduct reviews of federal Medicaid eligibility determinations to ascertain their accuracy and institute corrective action plans where necessary. CMS has taken some action to review federal eligibility determinations; however, until the review results are publicly reported, which CMS expects to occur in November 2019, this recommendation is not fully implemented. We will continue to monitor CMS’s implementation of this recommendation. In August 2018, we reported that improvements in oversight of state expenditures could help CMS ensure that individuals are enrolled in the correct Medicaid eligibility group. CMS processes for reviewing expenditures reported by states and FMAP rates collectively have had a considerable federal financial benefit, with CMS resolving errors that reduced federal spending by over $5.1 billion in fiscal years 2014 through 2017. However, we identified weaknesses in how CMS targets its resources to address risks when reviewing whether states’ expenditures are supported and consistent with Medicaid requirements. For example: CMS devotes similar levels of staff resources to review expenditures despite differing levels of risk across states. For example, the number of staff reviewing California’s expenditures—which represent 15 percent of federal Medicaid spending—is similar to the number reviewing Arkansas’ expenditures, which represents 1 percent of federal Medicaid spending. Additionally, CMS reviews a sample of claims for expansion enrollees to examine Medicaid expansion expenditures, but the sample size does not account for previously identified risks in a state’s program. Specifically, as we noted in a 2015 report, CMS’s sampling review of expansion expenditures was not linked to or informed by reviews of eligibility determinations conducted by CMS, some of which identified high levels of eligibility determination errors. To address these weaknesses, we made three recommendations, including that the Administrator of CMS revise the sampling methodology for reviewing expenditures for the Medicaid expansion population to better target reviews to areas of high risk. CMS concurred with this recommendation, but in November 2018, CMS officials indicated that given the agency’s resources, they believe the current sampling methodology is sufficient and have no plans to revise it. However, we continue to believe action is needed to better target areas of high risk and this recommendation remains unimplemented. Our examination of Medicaid eligibility determinations will continue as we have work underway that will describe how selected states decide the basis of eligibility for individuals who may qualify for Medicaid under more than one category of eligibility, such as a low-income individual with a disability; what is known about the accuracy of Medicaid eligibility determinations and selected states’ processes to improve the accuracy of determinations; and CMS efforts to recoup funds related to eligibility errors. We expect to complete this work early next year. Improvements in Medicaid data could benefit program oversight, including ensuring that only eligible beneficiaries are enrolled. CMS has acknowledged the need for improved Medicaid data and the Transformed Medicaid Statistical Information System (T-MSIS) initiative is the agency’s primary effort—conducted jointly with states—to improve its collection of Medicaid expenditure and utilization data. According to CMS officials, aspects of T-MSIS are designed to broaden the scope and improve the quality of state-reported data, as well as the data’s usefulness for states. T-MSIS also includes automated quality checks that should improve the quality of data that states report. In addition, T-MSIS is designed to capture significantly more data from states than was previously reported. For example, T-MSIS will include a beneficiary eligibility file that will have expanded information on enrollees, such as their citizenship, immigration, and disability status; and expanded diagnosis and procedure codes associated with their treatments. T-MSIS also is intended to benefit states by reducing the number of reports CMS requires them to submit, and by improving program efficiency by allowing states to compare their data with other states’ data in the national repository or with information in other CMS repositories, including Medicare data. With the continued implementation of T-MSIS, CMS has taken an important step toward developing a reliable national repository for Medicaid data. While recognizing CMS’s progress, we have made several recommendations aimed at improving the quality and usefulness of T- MSIS data. For example, we recommended in 2017 that CMS refine its T- MSIS data priority areas to identify those that are critical for reducing improper payments and expedite efforts to assess and ensure their quality. CMS has implemented this recommendation, yet other recommendations that CMS concurred with related to T-MSIS have not been fully implemented, including outlining a specific plan and associated time frames for using T-MSIS data for oversight. We have previously reported that oversight of the Medicaid program could be further improved through leveraging and coordinating program integrity efforts with state agencies, state auditors, and other partners. CMS has engaged state agencies and other partners to promote program integrity through the Medicaid Integrity Institute, a national training program for states, and other partnerships to combat Medicaid fraud. These efforts have created more opportunities for program integrity professionals to collaborate, share best practices, and ultimately increase the effectiveness of their oversight activities. We have also testified that state auditors are uniquely positioned to help CMS in its oversight of state Medicaid programs, because of their roles and responsibilities—which can include carrying out or overseeing their state’s single audits. Through their program integrity reviews, state auditors have identified improper payments in the Medicaid program and deficiencies in the processes used to identify them. For example, state auditors have found that in some cases their state Medicaid agencies’ eligibility determinations did not identify or address beneficiaries’ changes in circumstances, and in other cases relied on incorrect or incomplete income or asset information. A 2018 audit of New Jersey’s Medicaid program found the state was not identifying and disenrolling some deceased individuals. When state auditors conducted a data match to a Social Security number verification service, they found managed care payments of $510,834 and fee-for-service claims of $217,913 for 41 individuals after their reported date of death. Auditors recommended that the eligibility system be reconciled with a Social Security number validation service on a periodic basis to better identify deceased individuals. In 2017, state auditors in North Carolina found that most of the 10 sample county departments of social services did not consistently provide adequate oversight or controls for the eligibility determination of new applications and re-certifications. For new applications, the auditors showed accuracy error rates ranging from 1 percent to nearly 19 percent; for redeterminations of eligibility, accuracy error rates ranged from 1 percent to 23 percent. Based on information from an independent verification service, state auditors in New York found, during a 9-month period in 2014, that 354 Medicaid enrollees were actually deceased, and that the state made $325,030 in Medicaid payments for a subset of these individuals. Auditors noted that the state’s eligibility system did not have a standard process to periodically verify the life status of all enrollees and end coverage for deceased individuals. In April 2019, the Comptroller General and representatives from the National State Auditors Association sent a letter to CMS requesting changes to the Compliance Supplement to leverage state auditors’ ability to examine key areas of Medicaid, including improvements in the oversight of Medicaid eligibility processes. The Compliance Supplement—which is issued by the OMB based on agency input and direction—is used by state auditors during their annual audit of state entities that administer federal financial assistance programs, including Medicaid. In June 2019, OMB issued the 2019 Compliance Supplement, which included changes related to overseeing testing of eligibility determinations that GAO and the state auditors had proposed. Specifically, the supplement now permits state auditors to test eligibility determinations to ensure that beneficiaries qualify for the Medicaid program and are in the appropriate enrollment category. The supplement also notes a requirement for states to coordinate with other state and federal insurance affordability programs, including the federally facilitated exchanges. These changes to the Compliance Supplement will better enable state auditors to audit states’ eligibility determinations to ensure beneficiaries qualify for the Medicaid program and are enrolled in the correct eligibility group. Such eligibility determinations will supplement CMS’s eligibility determination reviews and may yield insights into program weaknesses that CMS could learn from and potentially address nationally. We continue to believe that CMS could help improve program integrity by further providing state auditors with a substantive and ongoing role in auditing their state Medicaid programs. Chairman Toomey, Ranking Member Stabenow, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions you may have. If you or your staff members have any questions concerning this testimony, please contact me at (202) 512-7114 or yocomc@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals who made key contributions to this testimony include Leslie V. Gordon (Assistant Director), Kristin Ekelund (Analyst-in-Charge), Michael Erhardt, Arushi Kumar, and Drew Long. Also contributing were Susan Anthony, Vikki Porter, and Emily Wilson. Take immediate steps to assess and improve the data available for Medicaid program oversight, including, but not limited to, the Transformed Medicaid Statistical Information System (T-MSIS). Such steps could include (1) refining the overall data priority areas in T- MSIS to better identify those variables that are most critical for reducing improper payments, and (2) expediting efforts to assess and ensure the quality of these T-MSIS data. (GAO-17-173) Recommendation implemented; no action needed. Take additional steps to expedite the use of data for program oversight. Such steps should include, but are not limited to, efforts to (1) obtain complete information from all states on unreported T-MSIS data elements and their plans to report applicable data elements; (2) identify and share information across states on known T-MSIS data limitations to improve data comparability; and (3) implement mechanisms, such as the Learning Collaborative, by which states can collaborate on an ongoing basis to improve the completeness, comparability, and utility of T-MSIS data. (GAO-18-70) Status of recommendation; actions needed to implement recommendations Not fully implemented. Continue taking steps to make T-MSIS data usable for Medicaid program oversight, such as (1) obtaining information on the completeness and comparability of T-MSIS data, (2) notifying states of their compliance status and obtaining corrective action plans, and (3) establishing mechanisms for ongoing feedback and collaboration across states. Articulate a specific plan and associated time frames for using T-MSIS data for oversight. (GAO-18-70) Not fully implemented. Outline a specific plan and associate time frames for using T- MSIS data for oversight. GAO, Medicaid: Additional Efforts Needed to Ensure that State Spending is Appropriately Matched with Federal Funds, GAO-16-53 (Washington, D.C.: Oct. 16, 2015). GAO, Medicaid: Further Action Needed to Expedite Use of National Data for Program Oversight, GAO-18-70 (Washington, D.C.: Dec. 8, 2017). Medicaid: CMS Has Taken Steps to Address Program Risks but Further Actions Needed to Strengthen Program Integrity. GAO-18-687T. Washington, D.C.: August 21, 2018. Medicaid: CMS Needs to Better Target Risks to Improve Oversight of Expenditures. GAO-18-564. Washington, D.C.: August 6, 2018. Medicaid: Actions Needed to Mitigate Billions in Improper Payments and Program Integrity Risks. GAO-18-598T. Washington, D.C.: June 27, 2018. Medicaid: Opportunities for Improving Program Oversight. GAO-18-444T. Washington, D.C.: April 12, 2018. Federal Health-Insurance Marketplace: Analysis of Plan Year 2015 Application, Enrollment, and Eligibility-Verification Process. GAO-18-169. Washington, D.C.: December 21, 2017. Medicaid: Further Action Needed to Expedite Use of National Data for Program Oversight. GAO-18-70. Washington, D.C.: December 8, 2017. Improper Payments: Improvements Needed in CMS and IRS Controls over Health Insurance Premium Tax Credit. GAO-17-467. Washington, D.C.: July 13, 2017. Medicaid: Program Oversight Hampered by Data Challenges, Underscoring Need for Continued Improvements. GAO-17-173. Washington, D.C.: January 6, 2017. Patient Protection and Affordable Care Act: Results of Enrollment Testing for the 2016 Special Enrollment Period. GAO-17-78. Washington, D.C.: November 17, 2016. Health Care: Results of Recent Undercover Testing for Patient Protection and Affordable Care Act Coverage, and Review of Market Concentration in the Private Insurance Markets. GAO-16-882T. Washington, D.C.: September 14, 2016. Patient Protection and Affordable Care Act: Results of Undercover Enrollment Testing for the Federal Marketplace and a Selected State Marketplace for the 2016 Coverage Year. GAO-16-784. Washington, D.C.: September 12, 2016. Patient Protection and Affordable Care Act: Final Results of Undercover Testing of the Federal Marketplace and Selected State Marketplaces for Coverage Year 2015. GAO-16-792. Washington, D.C.: September 9, 2016. Patient Protection and Affordable Care Act: CMS Should Act to Strengthen Enrollment Controls and Manage Fraud Risk. GAO-16-29. Washington, D.C.: February 23, 2016. Medicaid: Additional Efforts Needed to Ensure that State Spending is Appropriately Matched with Federal Funds. GAO-16-53. Washington, D.C.: October 16, 2015. Medicaid: Additional Actions Needed to Help Improve Provider and Beneficiary Fraud Controls. GAO-15-313. Washington, D.C.: May 14, 2015. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Medicaid, a joint federal-state health care program, is one of the nation's largest sources of funding for medical and other health-related services for tens of millions of low income and medically needy individuals. In fiscal year 2018, estimated federal and state expenditures for Medicaid were $629 billion. The size and complexity of Medicaid make the program particularly vulnerable to improper payments—including payments made for people not eligible for Medicaid. States have significant flexibility to design and implement their Medicaid programs based on their unique needs. These programs are administered at the state level, overseen at the federal level by CMS, and jointly funded by the states and federal government. The federal government matches most state expenditures for Medicaid services based on a statutory formula. Under the Patient Protection and Affordable Care Act, states have the option to expand their Medicaid programs to cover nearly all adults with incomes at or below 133 percent of the federal poverty level. States that choose to expand their programs receive a higher federal matching rate for the Medicaid expansion enrollees. This testimony will cover improvements needed to ensure accurate eligibility determinations and focuses on (1) CMS's oversight of Medicaid eligibility and related expenditures; (2) CMS's efforts to improve Medicaid data; and (3) other opportunities to improve oversight and ensure appropriate enrollment. This testimony is generally based on GAO findings and recommendations on the Medicaid program issued from 2015 through 2018, and steps taken to address them through September 2019. The Centers for Medicare & Medicaid Services (CMS) has taken steps to improve its oversight of the Medicaid program; however, GAO has identified areas where additional actions could improve program oversight and ensure that only eligible individuals are enrolled in the Medicaid program. These actions include closing gaps in oversight of eligibility determinations and related expenses, improving data, and furthering federal-state collaboration. Gaps in oversight of Medicaid eligibility determinations and related expenses. Since 2014, CMS has not estimated improper payments due to erroneous eligibility determinations; it plans to report these estimates in November 2019. GAO found that for fiscal year 2017 Medicaid expansion enrollees accounted for nearly a quarter of all Medicaid enrollees and federal Medicaid expenditures. GAO's prior work has identified gaps in CMS oversight, which affects the federal match. An accurate determination of eligibility is critical to ensuring that only eligible individuals are enrolled, that they are enrolled in the correct eligibility group, and that states' expenditures are appropriately matched with federal funds for Medicaid enrollees. GAO recommended that CMS conduct reviews of federal Medicaid eligibility determinations to ascertain their accuracy and institute corrective actions where necessary, and revise the sampling methodology for reviewing expenditures for the expansion population. CMS concurred with these recommendations, though has since indicated that it will not revise the sampling methodology. We continue to believe that additional steps are needed to fully implement these recommendations. Better Medicaid data. Improvements in Medicaid data could aid program oversight to ensure that only eligible beneficiaries are enrolled. CMS officials acknowledged the need for improved data and cited the Transformed Medicaid Statistical Information System (T-MSIS) initiative as its primary effort—conducted jointly with states—to improve the collection of Medicaid expenditure and utilization data. According to CMS officials, aspects of T-MSIS are designed to broaden the scope and improve the quality of state-reported data, as well as the data's usefulness to states. GAO made a series of recommendations related to T-MSIS. CMS concurred with the recommendations, but some have not been fully implemented, including expediting the use of T-MSIS data for oversight, and outlining a plan and associated time frames for using the data for oversight. Further federal-state collaboration needed for oversight and appropriate enrollment. GAO has previously reported that collaborative activities between the federal government and the states are important to improving oversight of the Medicaid program. CMS has ongoing efforts to engage state agencies and others through a national Medicaid training program for state officials and partnerships to combat Medicaid fraud. Recently, steps were taken to better enable state auditors to audit states' eligibility determinations to ensure beneficiaries qualify for the Medicaid program and are enrolled in the correct eligibility group. GAO has previously suggested that CMS could leverage the unique qualifications of state auditors and help improve program integrity by further providing state auditors with a substantive and ongoing role in auditing state Medicaid programs.", "document_type": "gao"}
{"report": "VA provides or pays for long-term care—ranging from assistance with dressing and bathing to clinical care for spinal injuries or dementia— through three institutional and 11 noninstitutional programs. (See fig. 1 for a list of VA’s institutional and noninstitutional long-term care programs and app. I for brief descriptions of these programs.) VA’s long-term care programs serve over 500,000 veterans with a wide range of characteristics and needs. Further, certain Community Nursing Homes, Adult Day Health Care, and Hospice and Respite Care programs have specially trained staff to serve veterans with dementia, and the Spinal Cord Injury and Disability Home Care program and certain VA Community Living Centers are equipped to serve veterans needing ventilator care. All veterans enrolled in the VA health care system are eligible for VA’s basic medical benefits package, which includes coverage for certain institutional and noninstitutional long-term care services. A veteran’s eligibility for fully or partially covered nursing home care is determined by the veteran’s priority for care, which is generally based on the veteran’s service-connected disability status. VA must cover the full cost of nursing home care for veterans who need this care for a service-connected disability and for veterans with service-connected disabilities rated at 70 percent or more. Veterans’ placement into particular long-term care programs may depend on their clinical needs, disability ratings, preferences, and the availability of VA programs. When funds are limited, the agency may prioritize program placement based on veterans’ service- connected disability ratings. Decisions about which long-term care programs may be the best fit are made at the VA medical center (VAMC) level between VA providers, veterans, and their families. As we reported in February 2020, VA data shows that utilization of and spending for VA long-term care programs generally increased from fiscal years 2014 through 2018. Specifically, the number of veterans receiving care in VA’s long-term care programs increased 14 percent from fiscal years 2014 through 2018, from 464,071 to 530,327 veterans, while spending grew 33 percent from $6.8 billion to $9.1 billion. Further, we found that VA projects utilization and expenditures for long-term care to increase for most of the programs included in VA’s EHCPM from fiscal years 2017 through 2037. Specifically, over that time period VA’s model projects the following: Utilization of long-term care—in terms of various VA workload units— is projected to grow in one of the two institutional programs and nine of the 10 noninstitutional programs included in the EHCPM from fiscal years 2017 through 2037. Spending, which VA reports as expenditures, is projected to more than double from fiscal years 2017 through 2037, increasing from $6.9 billion to $14.3 billion. (See fig. 2.) VA also projects that the proportion of expenditures for institutional long-term care will decrease from 63 percent to 53 percent while the proportion of noninstitutional program expenditures is projected to grow from 37 percent to 47 percent in that same time period. According to VA officials, these projected increases are due to a variety of factors, including that VA plans to continue expanding the availability of noninstitutional care, and plans on providing care to an increasing number of aging veterans and veterans rated in the highest service- connected disability groups. Officials also noted that expanding veterans’ access to noninstitutional care programs is less costly than institutional care, and veterans prefer to delay or reduce the amount of institutional care they receive. VA’s strategies to meet the growing demand for long- term care are operationalized by GEC at the program level and implemented at the regional and VAMC level. In our February 2020 report, we found that VA faces a number of key challenges in meeting veterans’ growing demand for long-term care: workforce shortages, geographic alignment of care, and difficulty meeting veterans’ needs for specialty care. While GEC recognizes and has taken some steps to address the challenges it faces, it has not established measurable goals for its efforts to address these three key challenges: GEC has not established measurable goals to address workforce shortages, such as staffing targets to address the waitlist for the Home-Based Primary Care program. GEC has not established measurable goals for its efforts to address the geographic alignment of care, such as specific targets for providing long-term care within the Home Telehealth and Veteran Directed Care programs. GEC has not established measurable goals for its efforts to address difficulties meeting veterans’ needs for specialty care, such as specific targets for the number of available ventilators or the number of caregivers educated to help veterans with dementia. As we noted in our report, without measurable goals, VA is limited in its ability to better plan for and understand progress towards addressing the challenges it faces meeting veterans’ long-term care needs. To address this issue, we recommended that GEC develop measurable goals for its efforts to address these key long-term care challenges. VA concurred with this recommendation. In our February 2020 report we also found that VA had identified, but had not planned to take steps to fully address, challenges at the VAMC level that affect VA’s ability to meet veterans’ long-term care needs: VA identified that VAMCs do not have a consistent approach to managing VA’s 14 long-term care programs. At VAMCs where there are not GEC staff, long-term care programs could be run by one or more departments within the VAMC, for example the Nursing department or the Social Work department. GEC officials told us that this fragmentation hinders standardization and the ability to get veterans the appropriate care. VA also identified that VAMCs use different approaches to assess the amount of noninstitutional long-term care services veterans need. While GEC has developed a tool to improve the consistency in these determinations, VA has not required the tool be used in all VAMCs, as of October 2019. As a result, decisions about the amount of services veterans receive may vary by VAMC. To address these issues, we recommended that GEC leadership set time frames for and implement (1) a consistent GEC structure at the VAMC level and (2) VAMC-wide standardization of the tool for assessing noninstitutional program needs of veterans. VA concurred with our recommendations. Chairwoman Brownley, Ranking Member Dunn, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact A. Nicole Clowers, Managing Director, Health Care at (202) 512- 7114 or clowersa@gao.gov or Sharon Silas, Director, Health Care, at (202) 512-7114 or silass@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contacts named above, key contributors to this statement were Karin Wallestad (Assistant Director), Luke Baron (Analyst-in-Charge), Summar C. Corley, and Laurie Pachter. Also contributing to the underlying report for this statement were Kye Briesath, Vikki Porter, Corinne Quinones, and Jennifer Rudisill. Appendix I: Department of Veterans Affairs’ (VA) Institutional and Noninstitutional Long- Term Care Program Descriptions This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Department of Veterans Affairs (VA) provides or purchases long-term care for eligible veterans through 14 long-term care programs in institutional settings like nursing homes and noninstitutional settings like veterans' homes. From fiscal years 2014 through 2018, VA data show that the number of veterans receiving long-term care in these programs increased 14 percent (from 464,071 to 530,327 veterans), and obligations for the programs increased 33 percent (from $6.8 to $9.1 billion). VA projects demand for long-term care will continue to increase, driven in part by growing numbers of aging veterans and veterans with service-connected disabilities. Expenditures for long-term care are projected to double by 2037, as shown below. According to VA officials, VA plans to expand veterans' access to noninstitutional programs, when appropriate, to prevent or delay nursing home care and to reduce costs. VA currently faces three key challenges meeting the growing demand for long-term care: workforce shortages, geographic alignment of care (particularly for veterans in rural areas), and difficulty meeting veterans' needs for specialty care. VA's Geriatrics and Extended Care office (GEC) recognizes these challenges and has developed some plans to address them. However, GEC has not established measurable goals for these efforts, such as specific staffing targets for programs with waitlists or specific targets for providing telehealth to veterans in rural areas. Without measurable goals, VA is limited in its ability to address the challenges it faces meeting veterans' long-term care needs.", "document_type": "gao"}
{"report": "IHS was established within the Public Health Service in 1955 in order to meet federal treaty obligations to provide health services to members of federally recognized AI/AN tribes primarily in rural areas on or near reservations. IHS oversees its provision of health care services through a decentralized system of 12 area offices, which are led by area directors and located in 12 geographic areas. IHS’s headquarters office is responsible for setting national health care policy, ensuring the delivery of quality comprehensive health services, and advocating for the health needs and concerns of AI/AN people. The area offices are responsible for monitoring federally operated IHS facilities’ operations and finances, and providing guidance and technical assistance. IHS’s 12 area offices oversee 168 service units which provide care at the local level through a total of 742 federally operated and tribally operated hospitals, health centers, and other health facilities. The types of services offered by these facilities vary, but most commonly include primary care and emergency care, as well as some ancillary and specialty services. Table 1 displays the number of federally operated and tribally operated facilities as of February 2019. If federally operated or tribally operated facilities are unable to provide needed care, they may contract for health services from private providers through the PRC program. Patients must meet certain eligibility and administrative requirements in order to qualify for this care—including having exhausted all other health care resources available to them and living on a federally recognized Indian reservation or within a designated PRC delivery area. The PRC program is funded through the annual appropriations process and administered at the local level by individual PRC programs that are often affiliated with local facilities. Individual PRC programs may be federally or tribally administered, and as of fiscal year 2018, IHS administered 39 percent of PRC appropriations, and tribes administered the remaining 61 percent. PRC funding is limited and has traditionally been reserved for the most critical cases. IHS has established five medical priority levels. Funds permitting, federally administered PRC programs first pay for all of the highest priority services, and then all or some of the lower priority services. IHS’s five PRC medical priority levels are 1. Emergent and acutely urgent care services, which include treatment for threats to life, limb, or senses; 2. Preventive care services, which include prenatal care and 3. Primary and secondary care services, which include scheduled ambulatory services for nonemergent conditions, and specialty consultations; 4. Chronic tertiary and extended care services, which include rehabilitation care, skilled nursing facility care, and organ transplants; and 5. Excluded services, which include cosmetic and experimental procedures. Beginning in 2014, PPACA allowed states to expand Medicaid eligibility to non-elderly, non-pregnant adults who are not eligible for Medicare and whose income does not exceed 133 percent of the federal poverty level. As of September 2018, there were 32 “expansion states”—those states including the District of Columbia that chose to expand Medicaid eligibility to this additional adult population—and 19 “non-expansion states”—those that had not expanded Medicaid eligibility. PPACA also required the establishment of health insurance exchanges in 2014—marketplaces where individuals may compare and select among health insurance plans offered by participating private insurers. PPACA included a number of provisions that reduced these plans’ costs— including premiums and cost-sharing, such as deductibles and copayments—for eligible enrollees, including certain AI/AN. Our analysis of IHS data shows that from fiscal year 2013 through fiscal year 2018, the percent of patients at 73 federally operated IHS hospitals and health centers who reported having health insurance coverage increased an average of 14 percentage points, from 64 percent in fiscal year 2013 to 78 percent in fiscal year 2018. The majority of coverage gains occurred in fiscal years 2014 through 2016 (see fig. 1). Patients at federally operated IHS facilities reported obtaining health insurance coverage from several sources. The largest increase in coverage occurred among those reporting Medicaid coverage. On average, 41 percent of IHS patients in fiscal year 2013 reported they had coverage through Medicaid at some point during the year; this number increased to 53 percent in fiscal year 2018. In comparison, the percent of patients at each facility who reported having Medicare and the percent who reported having private insurance at some point during the year each increased an average of two percentage points from fiscal years 2013 to 2018. (See fig. 2.) While the average percent of patients reporting health care coverage increased across all federally operated IHS facilities, our analysis of IHS data showed substantial variation in the magnitude of these increases. Specifically, from fiscal year 2013 through fiscal year 2018, increases at each of the 73 facilities ranged from a low of 2 to a high of 31 percentage points. Forty-four federally operated IHS facilities experienced an increase in the percent of patients with coverage over this time period of more than 10 percentage points (see fig. 3). Our analysis of IHS data shows that federally operated IHS facilities in states that expanded Medicaid had larger increases in health insurance coverage compared with such facilities in states that had not expanded Medicaid. Specifically, federally operated IHS facilities in Medicaid expansion states experienced an average 17 percentage point increase in patients reporting any form of health coverage, compared with an average 8 percentage point increase at federally operated IHS facilities in states that did not expand Medicaid. However, these increases in coverage were not spread evenly among the facilities. (See fig. 4.) IHS officials we interviewed also reported that a variety of factors in addition to Medicaid expansion likely affected the number of patients at federally operated IHS facilities who reported having health insurance coverage. Specifically, officials we interviewed at all of the 11 selected federally operated IHS facilities cited efforts at their facilities that helped increase coverage, such as increasing the number of onsite patient benefits coordinators to help enroll patients in all forms of health coverage and enhancing efforts to ensure that all patients were screened for coverage. For example, one federally operated IHS facility reported renovating its office to, among other things, move the patient benefits coordinator near the waiting room, which allowed patients to be immediately screened after walking in for an appointment. Officials we interviewed at nearly all of the selected federally operated IHS facilities also noted that their outreach and education efforts about the importance of health insurance coverage may have helped to increase enrollment. Officials we interviewed at all of the selected federally operated IHS facilities said they were engaged in such activities which included broadcasting public service announcements, posting newspaper advertisements, and promoting insurance during community events. Officials from most of the 12 IHS area offices also reported collaborating with tribes to conduct outreach and education to enhance enrollment. Officials at many IHS area offices also noted that external factors may have also played a role in increasing coverage levels, such as improvements in the local economy, which officials said led to increases in the number of patients with private health insurance. Additionally, entities outside of IHS also implemented initiatives to increase coverage for patients at federally operated IHS facilities. For example, IHS officials stated that some patients obtained health insurance through the health insurance exchanges, and in some cases, the tribe paid all premiums, coinsurance, and deductibles for these plans. In addition, a number of area Indian health boards worked together to develop a train-the-trainer program to disseminate information and resources to encourage enrollment and share information on the benefits of having health coverage. Third-party collections across all federally operated IHS facilities increased 51 percent from fiscal year 2013 through fiscal year 2018, according to our analysis of IHS data. Specifically, total third-party collections increased from $708 million in fiscal year 2013 to about $1.07 billion in fiscal year 2018 while the number of patients seeking care remained constant. Medicaid collections accounted for 65 percent of the total $360 million increase, though collections from Medicare, private insurance, and Veterans Affairs also increased during this period. For example, Medicaid collections grew 47 percent, from $496 million in fiscal year 2013 to $729 million in fiscal year 2018. (See fig. 5.) While third-party collections at federally operated IHS facilities collectively increased from fiscal year 2013 through 2018, there was significant variation in changes for individual facilities. IHS officials we interviewed noted several reasons why third-party collections may vary over time and by location, including the size of the facility and any changes in the number of providers, patients, or business office staff that process billing and collections; the ability to collect payment from certain tribal health insurance, which may opt to not pay for services provided to enrolled members; and the number of patients enrolled in Medicaid managed care plans, which may identify IHS facilities as out-of-network providers and not pay for covered services. IHS and federally operated facility officials we interviewed noted that gains in health insurance coverage during this time period contributed to increases in collections. In addition, officials we interviewed from most of the 12 area offices and 11 selected federally operated IHS facilities described steps they took to enhance collections. More specifically, officials from seven area offices discussed initiating steps to improve billing and collections functions for federally operated IHS facilities in their area; at one area office this involved creating a new area-level position focused on revenue enhancement at federally operated IHS facilities. Additionally, officials we interviewed at six federally operated IHS facilities identified steps they took to enhance the accuracy and efficiency of facilities’ collections, noting efforts such as improving training related to coding and billing. For example, officials at one of these facilities described convening a team to review why all claims related to a specific service were being rejected. The team then instituted changes to their billing procedures that resulted in the facility collecting payments for these services. Officials we interviewed at selected tribally operated facilities and tribal organizations—including national tribal organizations and area Indian health boards—described increases in health insurance coverage and collections at some tribally operated facilities that occurred from 2013 through 2018. Specifically, some tribal organization officials reported increases in coverage at facilities located in states that had expanded their Medicaid programs, compared with those that had not. For example, officials at one tribally operated facility noted that the percent of their patients with health coverage increased by 10 percentage points from 2013 to 2018. Similar to federally operated IHS facilities, officials we interviewed from some tribally operated facilities said they focused on screening patients for coverage at the time of service, including by increasing the number of patient benefits coordinators and always having staff available to help enroll patients in coverage. These officials also noted that they conducted outreach and enrollment activities to inform patients of the importance of having coverage and benefitting from outreach and education activities conducted directly by local tribes, including through messages that emphasized the importance of coverage for the tribe and tribally operated facility. Officials from a national tribal organization told us that one tribally operated facility placed stickers on all equipment purchased with third- party collections as a way to educate patients about the benefits of having health insurance coverage and to encourage further enrollment in coverage. Officials we interviewed at selected tribally operated facilities and national tribal organizations also described increases in third-party collections that occurred from 2013 through 2018 at many tribally operated facilities— particularly those located in Medicaid expansion states. For example, officials from one tribally operated facility told us that they anticipated that their third-party collections for 2018 would be more than twice the amount they collected for 2013. Similar to federally operated IHS facilities, officials we interviewed from some tribally operated facilities noted that their facilities had enhanced collections by making improvements to their billing processes and taking steps to increase patient volume. For example, officials at one tribally operated facility said they recently began allowing non-tribal members to receive care at their facility—an option available to tribally operated facilities but not to federally operated IHS facilities—as a way to increase third-party collections and bolster the facility’s long-term sustainability. Some officials also noted that not all tribally operated facilities experienced increases in collections, in part because of decreases or limitations in the number of providers, patients, or business office staff that process billing and collections. Similar to federally operated IHS facilities, officials from tribally operated facilities noted that the enrollment of patients in Medicaid managed care plans also reduced their ability to collect payment for covered services because these plans often identify the facilities as out-of-network providers and therefore do not pay for covered services provided onsite. Officials we interviewed from selected federally operated and tribally operated facilities stated that increases in coverage and third-party collections helped them to (1) continue their facilities’ operations, (2) expand the services they offer onsite at their facilities, and (3) expand the services they cover offsite through IHS’s PRC program. Officials we interviewed from all 17 selected federally operated and tribally operated facilities noted that they used increased third-party collections to fund their continued operations. Even as officials we interviewed from nearly all of the 11 selected federally operated IHS facilities reported that their facilities’ third-party collections had grown from fiscal years 2013 to 2018, officials from most of these facilities also said they relied more heavily on these collections to support their continued operations. Officials we interviewed from all of the IHS area offices told us that third-party collections provide a vital source of funding for federally operated IHS facilities in their area. These collections allowed them to maintain a level of operations that would otherwise be challenging, for reasons such as increasing costs of payroll and of maintaining an aging infrastructure. In addition, officials we interviewed from most of the selected federally operated IHS facilities reported using third-party collections to fund a substantial and increasing portion of their payroll costs. Officials at many of the IHS area offices and most of the selected federally operated IHS facilities we interviewed also reported using third-party collections to ensure that their facility met all required standards, including those required for ongoing accreditation, or to undertake any needed maintenance such as by repairing roofs and heating systems. Some of these officials also reported using third-party collections to repair or replace medical equipment that was broken or had exceeded its intended lifespan. Table 2 displays examples of how selected federally operated and tribally operated facilities reported using third-party collections. Officials we interviewed from most of the 17 selected federally operated and tribally operated facilities told us they used increased third-party collections to expand the volume or scope of services they offered onsite as a way to better meet patients’ medical needs. With respect to increasing the volume of services provided, officials at most of these facilities said they added providers and medical equipment to provide patients with more timely access to services. In one example, officials from a federally operated IHS hospital said they added about 30 additional nurses from 2013 to 2018 as a result of increased third-party collections. As a result of increases in the number of providers at their facilities, officials we interviewed from several federally operated IHS facilities said they were able to schedule appointments for patients more quickly, which reduced wait times for an appointment—including two facilities that reported being able to newly offer same-day appointments. Officials from facilities that expanded the scope of services provided said they did so by adding new specialties, such as behavioral health and dentistry, purchasing new medical equipment such as hospital beds, dental chairs, and magnetic resonance imaging machines, and funding health promotion and education activities such as those related to diabetes education. (See fig. 6.) To support efforts to expand services and bolster their sustainability, officials from most of the 17 federally operated and tribally operated facilities said they used third-party collections to offer more competitive salaries and bonuses for providers. In addition, officials from a few of the 12 IHS area offices told us that federally operated facilities in their area used third-party collections to fund projects to construct nearby housing for providers. In another example, officials from a national tribal organization noted that the use of third-party collections to enhance provider salaries at one facility led to a decrease in provider turnover from about 40 percent prior to 2014 to 14 percent in 2018. In addition, officials from many of the IHS area offices told us that some federally operated facilities in their area reported using third-party collections accumulated over multiple years to make investments in expanding their facilities to provide the space necessary to support these additional services. For example, according to IHS officials, one federally operated IHS facility reported using $7 million in third- party collections to fund an over 11,000 square foot expansion to house an expanded emergency room and a new urgent care clinic; two federally operated IHS facilities reported using third-party collections to purchase modular buildings to provide medical services such as audiology, behavioral health, and dental services; and one federally operated IHS facility reported saving third-party collections for six years to fund the construction of a new 23,000 square foot building to provide additional space for an increased volume of services, including dental, optometry and physical therapy services, and to pay for the new medical equipment to support these services (see fig. 7). Officials from some IHS area offices stated that the extent to which federally operated IHS facilities in their area invested in expanding onsite services largely depended on the level of facilities’ third-party collections. Specifically, facilities experiencing larger increases in collections, such as larger facilities or those located in Medicaid expansion states, were able to invest more heavily in an expansion of onsite services compared to those that had lower increases in collections, according to these officials. To identify their facilities’ needs, officials from federally operated and tribally operated facilities reported using a variety of approaches. For example, officials from three IHS area offices and one tribally operated facility said they analyzed PRC data to identify the services that patients were obtaining through that program, and worked to bring those services onsite. Officials from two federally operated IHS facilities also noted that they incorporated local tribal input as they identified local needs and projects to fund. For example, these officials told us that their facilities were in the process of adding new specialty services onsite, including acupuncture, chiropractor, and eye clinic services, at the request of their local tribes. The recent growth in third-party collections has made it possible for many federally operated IHS facilities to consider funding a range of projects, and IHS officials said they relied on established procedures to fund these projects. According to IHS officials, local facility officials draft annual spending proposals to identify the resources, including third-party collections, that they would like to use to address their facilities’ needs. These proposals are provided to each facility’s governing board for review; the governing board is comprised of area office and facility officials whose top priority is maintaining accreditation and ensuring patient safety at each facility, according to IHS officials. Once these basic needs are met, IHS officials told us that facilities may begin to identify and fund projects to expand access to health services. Officials from IHS, as well as some of the 17 selected federally operated and tribally operated facilities, told us that increased coverage and collections allowed for an expansion in the complexity of services provided offsite through the PRC program. Specifically, officials reported that an increase in the percent of patients with health insurance, coupled with facilities’ enhanced onsite services, has led PRC programs to be able to expand the level of care that they can offer. For example, they stated that increases in the health insurance coverage of patients have led to a smaller percent of patients needing to access PRC, since patients may use their coverage to obtain needed services directly from other private providers. In addition, an expansion of available services onsite at federally operated and tribally operated facilities resulting from increased collections reduced the need for some patients to use PRC. From 2013 through 2018, most IHS-administered PRC programs moved from covering only the most acute and emergent cases to funding nearly all types of care covered through the PRC program, according to our analysis of IHS data and interviews with agency officials. Specifically, IHS officials we interviewed told us that prior to 2014, most PRC programs administered by the agency were only able to fund care for the most acute and emergent cases—referred to as priority level 1. Our analysis of IHS data showed that these PRC programs were increasingly able to fund additional medical priority levels of care each year from fiscal year 2015— the first year that such data were available—through fiscal year 2018, with most IHS-administered programs funding care through priority level 4 in fiscal year 2018. (See fig. 8.) Officials we interviewed at some of the 17 selected federally operated and tribally operated facilities that had been able to both expand services onsite and offsite through PRC funds told us that these changes have made a large impact on patients’ health and quality of life. For example, officials at some federally operated IHS facilities reported that having more providers onsite has allowed them to offer patients more rapid access to care, and officials from some tribally operated facilities reported that an expansion of onsite services has allowed them to serve more patients. Officials at some of the selected federally operated and tribally operated facilities reported that an expansion of onsite services has also reduced the need for some patients to travel long distances to obtain diagnostic services and specialty care through the PRC program. In addition, officials from two IHS area offices noted that PRC has been able to pay for services such as patients’ long-awaited knee and hip replacements, which have enabled patients to return to normal activities of life and reduce their need for pain management. We provided a draft of this report for review and comment to the Secretary of Health and Human Services. The Department did not have any comments on the draft report. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of the Department of Health and Human Services and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In the years since the Patient Protection and Affordable Care Act (PPACA) authorized states to expand access to Medicaid and offer health insurance through the exchanges in 2014, the percent of American Indian and Alaska Native (AI/AN) in the general population with health insurance has increased. Specifically, according to an analysis of U.S. Census Bureau’s American Community Survey data, the percent of nonelderly AI/ANs with health insurance coverage increased from 70 percent in 2013 to 78 percent in 2017. (See fig. 9.) While the estimated percent of AI/AN nationwide reporting health insurance coverage increased from 2013 to 2017, these increases in coverage were not evenly distributed among the states, according to an analysis of U.S. Census Bureau’s American Community Survey data. The estimated percent of AI/AN reporting health insurance increased more in states that expanded Medicaid compared to those that did not. (See fig. 10.) In addition to the contact named above, Kristi Peterson, Assistant Director; Patricia Roy, Analyst-in-Charge; Michelle Duren; and Lisa Rogers made key contributions to this report. Also contributing were Todd Anderson, Krister Friday, Ethiene Salgado-Rodriguez, and Emily Wilson Schwark. Tribal Consultation: Additional Federal Actions Needed for Infrastructure Projects. GAO-19-22. Washington, D.C.: March 20, 2019. Indian Health Service: Spending Levels and Characteristics of IHS and Three Other Federal Health Care Programs. GAO-19-74R. Washington, D.C.: December 10, 2018. Indian Health Service: Considerations Related to Providing Advance Appropriation Authority. GAO-18-652. Washington, D.C.: September 13, 2018. Indian Health Service: Agency Faces Ongoing Challenges Filling Provider Vacancies. GAO-18-580. Washington, D.C.: August 15, 2018. High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others. GAO-17-317. Washington, D.C.: February 15, 2017. Indian Health Service: Actions Needed to Improve Oversight of Quality of Care. GAO-17-181. Washington, D.C.: January 9, 2017. Indian Health Service: Actions Needed to Improve Oversight of Patient Wait Times. GAO-16-333. Washington, D.C.: March 29, 2016. Indian Health Service: Opportunities May Exist to Improve the Contract Health Services Program. GAO-14-57. Washington, D.C.: December 11, 2013. Indian Health Service: Most American Indians and Alaska Natives Potentially Eligible for Expanded Health Coverage, but Action Needed to Increase Enrollment. GAO-13-553. Washington, D.C.: September 5, 2013. Indian Health Service: Increased Oversight Needed to Ensure Accuracy of Data Used for Estimating Contract Health Service Need. GAO-11-767. Washington, D.C.: September 23, 2011. Indian Health Service: Updated Policies and Procedures and Increased Oversight Needed for Billings and Collections from Private Insurers. GAO-10-42R. Washington, D.C.: October 22, 2009. Indian Health Service: Health Care Services Are Not Always Available to Native Americans. GAO-05-789. Washington, D.C.: August 31, 2005.", "summary": "IHS provides care to American Indians and Alaska Natives through a system of health care facilities. The Patient Protection and Affordable Care Act (PPACA) provided states with the option to expand their Medicaid programs, and created new coverage options beginning in 2014, including for American Indians and Alaska Natives. GAO was asked to review how PPACA has affected health care coverage and services for American Indians and Alaska Natives. In this report, GAO describes (1) trends in health insurance coverage and third-party collections at federally operated and tribally operated facilities from fiscal years 2013 through 2018, and (2) the effects of any changes in coverage and collections on these facilities. To address these objectives, GAO analyzed IHS data on coverage, third-party collections, and PRC. GAO interviewed IHS officials from headquarters and all 12 area offices, as well as from 17 facilities selected to include a mix of federally operated and tribally operated hospitals and health centers in states that both had and had not expanded their Medicaid programs as of September 2018. GAO interviewed officials from 11 federally operated IHS facilities and 6 tribally operated facilities. GAO provided a draft of this report to the Secretary of Health and Human Services for comment. The Department did not have any comments on the draft report. GAO's analysis of Indian Health Service (IHS) data shows that from fiscal years 2013 through 2018, the percent of patients at federally operated IHS hospitals and health centers that reported having health insurance coverage increased an average of 14 percentage points. While all federally operated IHS facilities reported coverage increases, the magnitude of these changes differed by facility, with those located in states that expanded access to Medicaid experiencing the largest increases. Federally operated IHS facilities' third-party collections—that is, payments for enrollees' medical care from public programs such as Medicaid and Medicare, or from private insurers—totaled $1.07 billion in fiscal year 2018, increasing 51 percent from fiscal year 2013. Although exact figures were not available, tribally operated facilities, which include hospitals and health centers not run by IHS, also experienced increases in coverage and collections over this period, according to officials from selected facilities and national tribal organizations. Increases in health insurance coverage and third-party collections helped federally operated and tribally operated facilities continue their operations and expand the services offered, according to officials from 17 selected facilities. These officials told GAO that their facilities have been increasingly relying on third-party collections to pay for ongoing operations including staff payroll and facility maintenance. Officials at most facilities with increases in third-party collections also stated that they expanded their onsite services, including increasing the volume or scope of services offered by, for example, adding new providers or purchasing medical equipment. Increased coverage and collections also allowed for an expansion in the complexity of services provided offsite through the Purchased/Referred Care (PRC) program, which enables patients to obtain needed care from private providers if the patients meet certain requirements and funding is available. According to IHS and facility officials, increases in coverage have allowed some patients to access care offsite using their coverage, and an expansion of onsite services has reduced the need for some patients to access PRC. Officials GAO interviewed from federally operated and tribally operated facilities stated that facilities' expansion of onsite and offsite services has led to enhancements in patients' access to care in some instances.", "document_type": "gao"}
{"report": "In 2015, the President signed Executive Order 13693, “Planning for Federal Sustainability in the Next Decade.” This executive order called for federal agencies to, among other things, advance waste prevention and pollution prevention in federal facilities, operations, and vehicles by diverting at least 50 percent of nonhazardous solid waste, including food and compostable material, but not construction and demolition debris, in their internal operations annually, and pursue opportunities for net-zero waste or additional diversion opportunities. In May 2018, Executive Order 13693 was revoked and replaced by Executive Order 13834, “Efficient Federal Operations,” which directed federal agencies to implement waste prevention and recycling measures but no longer included the specific direction to divert at least 50 percent of nonhazardous solid waste, including food and compostable material, annually or to pursue opportunities for net-zero waste or additional diversion opportunities. CEQ and OMB are responsible for implementing and tracking progress for these executive orders. Among its duties, EPA oversees municipal solid-waste management. For example, EPA regulates the management of household, industrial, and manufacturing solid and hazardous wastes under the Resource Conservation and Recovery Act. The objectives of the act include protecting the United States from the hazards of waste disposal, to conserve energy and natural resources by recycling and recovery, and to minimize the generation of hazardous waste. However, the management of nonhazardous solid waste, such as food waste, is left primarily to the states and local governments. Under the act, EPA established solid- waste management guidelines for municipalities that encouraged recycling, including composting food and yard waste. EPA’s Sustainable Materials Management Program, including the Sustainable Management of Food strategic priority area, seeks to reduce the environmental impact of materials through their entire life cycle. Furthermore, available landfill space is decreasing in various parts of the United States; EPA’s FLW activities may help extend the life of those existing landfills and provide opportunities for energy generation. According to USDA officials, USDA has developed a broad range of programs and policies to reduce FLW as a means to support its overarching objectives related to reducing food insecurity, improving food safety, increasing market efficiencies, and enhancing farmer income and rural development. USDA also conducts education and outreach through its network of state and local offices, the Cooperative Extension Service, state Departments of Agriculture, land-grant university partners, and nongovernmental, nonprofit, community, and faith-based organizations. Additionally, the 2018 Farm Bill requires the Secretary of Agriculture to take a number of actions to address FLW: (1) create a FLW Reduction Liaison to coordinate federal, state, local, and nongovernmental programs, and other efforts, to measure and reduce the incidence of FLW; (2) conduct a study on food waste in consultation with the FLW Reduction Liaison and report data collected on food waste and efforts to reduce and prevent such waste; (3) issue guidance outlining the best practices to minimize food waste for donated commodities; (4) enter into cooperative agreements with local or municipal governments to develop and test strategies for planning and implementing municipal compost plans and food waste reduction plans; (5) establish a milk donation program to encourage the donation of milk products produced and processed in the United States, assist individuals in low-income groups, and reduce food waste; and (6) establish a Local Agriculture Market Program to, among other things, promote new business opportunities and marketing strategies to reduce on-farm food waste. Finally, FDA, which is responsible for, among other things, overseeing the safety of about 80 percent of the nation’s food supply, has a limited mission related to FLW. FDA was not involved with establishing the national FLW reduction goal in 2015 but, according to agency officials, has become more engaged in consumer education and outreach to the food industry, hunger relief and food rescue organizations, state and local governments, academia, and other stakeholders on issues related to FLW. By signing the 2018 formal agreement on collaboration and coordination with EPA and USDA, FDA has committed to taking further actions to reduce FLW. Definitions of FLW vary among the various organizations, including federal agencies, working in this area, which inform different methodologies for measuring and reporting FLW. For example, consistent with its focus on advancing the sustainable use of materials, including food, throughout their life cycle to minimize waste and environmental impacts, EPA uses the term “wasted food” instead of “food waste” for food that is not used for its intended purpose because it conveys that a resource with value is being wasted, whereas “food waste” implies that the food no longer has value and needs to be managed as waste. EPA states that “wasted food” is managed in a variety of ways, including through donations to food banks, conversion to animal feed, composting, anaerobic digestion, or sending it to landfills. In contrast, USDA’s Economic Research Service (ERS) defines food loss as edible food that is available for human consumption but that is not eaten. According to ERS, food losses may occur for any number of reasons, including cooking loss and natural shrinkage; loss from mold, pests, or inadequate climate control; and plate waste, which refers to edible food that is served but discarded. In addition, ERS defines food waste as a component of food loss that refers to food discarded by retailers and consumers due to quality concerns, such as blemished food. ERS takes this approach in support of its effort to estimate the nation’s available food supplies, which it adjusts to account for nonedible parts of foods and losses throughout the food supply chain. USDA has noted that definitions of FLW vary worldwide. For example, FAO differentiates food loss from food waste based on the stage of the food supply chain in which the amount of edible food decreased. FAO refers to food loss as the decrease in edible food that occurs throughout the production and processing stages of the food supply chain, whereas food waste occurs at retail and consumer stages of the food supply chain. These varying definitions have led to different methodologies for measuring and reporting FLW. For example, EPA estimates the amount of food from residences, commercial establishments (such as grocery stores), and institutional establishments (such as schools) that is disposed of through landfills or converted to energy, while ERS estimates the amount, value, and calories of postharvest food losses at the retail and consumer stages of the food supply chain. In addition, ERS and FAO FLW estimates do not include inedible parts, whereas, with its focus on materials management, EPA’s estimates do. FLW can occur across the entire food supply chain, occur at more than one stage (e.g., spoilage), or be unique to a specific stage, as seen in figure 1 below. However, the share of total FLW due to each of these causes is currently unknown, according to a USDA report. EPA’s Food Recovery Hierarchy, shown in figure 2 below, focuses on different options for reducing FLW. According to EPA, the top levels of the hierarchy are the best ways to reduce FLW because they create the most benefits for the environment, society, and the economy. Source reduction is the preferred option for reducing FLW because it provides the greatest benefits in terms of environmental sustainability. This is because growing food requires resources, such as land, water, fertilizer, and pesticides. In contrast, food that is sent to landfills generates greenhouse gases, such as methane. Prevention refers to reducing the amount of surplus food generated at any stage of the food supply chain. For example, businesses, such as restaurants, may prevent FLW through better planning and food preparation techniques. Diversion includes recovering food by donating edible food to feed hungry people or sending food scraps to feed animals. Diversion also includes recycling food scraps for industrial uses, such as waste-to- energy generation or anaerobic digestion, or for composting. Disposal refers to food that is sent to landfills, incinerators, or washed into sewers. According to USDA, some FLW is inevitable and, therefore, entirely eliminating FLW is unrealistic. For example, USDA ERS reports that there is a practical limit to how much FLW in the United States could be reduced, given different factors, such as food safety concerns, the perishability of foods, storage and temperature considerations, and risk management for production and marketing uncertainties, and resource constraints to recover uneaten food for another use, among others. According to USDA officials, to be successful, FLW reduction strategies should consider the economic incentives and disincentives faced by stakeholders across the food supply chain. Nonfederal stakeholders we interviewed cited various challenges that exist to reducing FLW in the United States. Through our analysis of those interviews, we identified three key areas: (1) limited data and information about the amounts and causes of FLW; (2) a lack of awareness and education about FLW; and (3) limited infrastructure and capacity, which can hamper efforts to reduce FLW. In some instances, the nonfederal stakeholders also provided their views for ways federal agencies could potentially address the identified challenge areas. Through interviews with nonfederal stakeholders, we identified limited data and information about the amounts and causes of FLW as a challenge to reducing FLW in the United States. For example, several stakeholders told us that data gaps associated with the different food supply-chain stages make it challenging to estimate FLW. For example: An international organization published a study in 2011 that included estimates of FLW by different regions and different stages of the food supply chain. The organization reported in its study that there were major data gaps in the knowledge of global FLW, such as the causes of FLW. Representatives of this organization told us that a challenge to measuring and estimating FLW is the lack of data on the various stages of the food supply chain. They are proposing a new methodology intended to help countries measure FLW along the supply chain in a cost-effective manner and monitor progress in reducing FLW. Researchers from two academic institutions told us there are challenges to estimating farm-production food losses. For example, researchers from one of these academic institutions told us that farm- production losses fluctuate from year to year based on changes in markets and growing conditions, such as weather, which can make estimating FLW more challenging. In addition, these researchers told us more information is needed about how different economic factors, such as the existence of secondary (alternative) markets to sell excess food, or changes in farming costs such as increases in labor costs, may influence FLW. One nonprofit organization reported that data at the farm-production stage of the food supply chain are limited, including data on what happens to some food at that stage. For example, there are limited data about whether produce that goes unsold is tilled back into the farmland, composted, or sent to a landfill. This nonprofit organization reported the limitations of its estimate of FLW across the food supply chain in the United States. For example, the nonprofit organization documented in its FLW estimate methodology that its farm-production FLW data analysis focused on estimating imperfect-produce rates, but noted that FLW may occur at this stage for a variety of reasons, including inclement weather, pests, or overproduction. It also documented that future research efforts could assess actual produce imperfection and loss rates for each produce type using geographical differences to improve estimate accuracy. Representatives from another nonprofit organization that has published an estimate of FLW told us there are data gaps about FLW along the food supply chain. For example, this nonprofit organization reported in 2017 that improved research is needed regarding farm- production data and FLW estimates of the consumer stage of the food supply stage. In addition, this nonprofit organization reported that one challenge is the absence of standardized measurement methodologies and common metrics to help entities representing all food supply-chain stages accurately estimate FLW, develop strategies to reduce FLW, and measure progress. In this report, they noted that federal agencies’ efforts to develop a mechanism to aggregate and disseminate FLW information as it is gathered by businesses and institutions, among others, would be beneficial to all stakeholders. Representatives of a third nonprofit organization stated that FLW measurement methodologies need to be tailored to the particular stages of the food supply chain and that the strategies to reduce FLW need to respond to the conditions associated with specific foods. Nonfederal stakeholders identified a lack of education and awareness about FLW as a challenge to reducing FLW. For example, an official from one state told us that there is a lack of awareness among various organizations about the benefits of preventing FLW. Specifically: One state official told us that there is a lack of awareness among food producers, businesses, and consumers about the benefits of preventing FLW. According to this official, to address this challenge the state developed a strategic action plan that prioritizes focusing upstream in the food supply chain to prevent FLW, as opposed to the more traditional focus on increasing FLW diversion, such as through composting. This official also told us that implementing organic waste (e.g., food waste or other plant and animal materials) bans, which prohibit specified waste generators from sending food waste to landfills, as several states are doing to reduce FLW, tends to promote FLW reduction activities further down on EPA’s Food Recovery Hierarchy. As a result, organic waste bans may contribute relatively little to reducing FLW or maximizing the benefits of such reductions. This official emphasized that additional steps are needed to increase awareness about the benefits of prioritizing prevention through shifts in supply chains, purchasing, and consumption patterns to reduce FLW. Officials from two states told us there is a lack of resources to support efforts to educate consumers about FLW. For example, one state official told us that the state agency has insufficient staff resources to do effective outreach regarding FLW, and current staff members do not yet have the expertise to fully educate and assist consumers and businesses about all options available to reduce FLW. Another state official told us that the state would like to do a state-wide social marketing campaign to disseminate education and information about FLW to household consumers, but the state lacks sufficient resources to launch such an effort. Representatives of a nonprofit food donation organization identified a lack of education and awareness about date labeling as one of the challenges to reducing FLW. For example, the representatives told us that consumer confusion about date labels may be an impediment to reducing FLW among consumers. However, in these representatives’ view, reducing date labeling confusion is unlikely to lead to additional food donations. In addition, an academic institution representative, in collaboration with other authors, reported that a driver of household FLW is consumer confusion over date labels and conducted a survey to gain information about consumer perceptions of date labels. They concluded from their research that increasing consumer education on the meaning of date labels can help to reduce FLW. A representative of a nonprofit food donation organization told us that education and awareness about liability protections and compliance are lacking for various potential food donors and may hinder some food producers from donating food and, by extension, reducing FLW. Through interviews with nonfederal stakeholders, we identified that limited infrastructure and capacity is a challenge that can hamper efforts to reduce FLW. For example: Representatives of a nonprofit food donation organization that receives food donations cited a lack of sufficient capacity and logistical support to collect and distribute available food. For example, representatives told us that food pantries may not have a sufficient volunteer workforce or enough food storage capacity to be able to distribute all donated food to needy people. Food industry representatives told us that businesses have infrastructure limitations, such as a lack of transportation options to deliver excess food to food pantries or composting facilities. For example, representatives told us that if such facilities were available, food scraps, such as produce peels, could be used as animal feed or composted. However, if the infrastructure to utilize these options is not available, the companies generating the FLW may opt to send it to landfills instead. An official from one state told us that the state does not have access to the infrastructure and capacity needed to separate contaminants in order to be able to divert FLW for other uses, such as animal feed, composting, or anaerobic digestion. For example, this state official told us that the state does not have access to the necessary equipment to separate plastic and other packaging materials from food waste in order to be able to process FLW through anaerobic digesters. Officials of another state provided a study stating that removing packaging from food waste can be an obstacle to successful FLW diversion and that separation of food waste for composting or other diversion can be costly. In addition, a representative of one international organization told us that federal agencies could facilitate a collaborative approach with industry stakeholders to develop voluntary industry standards on food packaging materials and food portion sizes to help reduce FLW in the United States. Officials from another state told us that a lack of food recycling infrastructure limits their ability to enforce the state’s organic waste ban and reduce FLW. A state official told us that the state has one anaerobic digester facility to process food waste, but additional recycling infrastructure would be needed statewide to enable food waste generators, such as hospitals or schools, to recycle their food waste instead of sending it to landfills. Since announcing the national FLW reduction goal in 2015, EPA and USDA have taken initial actions to address challenges in the three key areas that nonfederal stakeholders identified to reduce FLW. For example, EPA and USDA have taken actions to provide improved data and information about FLW in the United States; educate and increase awareness of FLW along the food supply chain; and expand the infrastructure and capacity to support efforts to reduce FLW. EPA and USDA have provided some data and information about FLW in the United States. Specifically: In a 2018 report, EPA published trends of food waste materials generation, among other materials, and provided updated information about municipal solid waste being generated, recycled or composted, landfilled, and combusted with energy recovery using 2015 data from residential, commercial, and institutional sources. According to EPA, food waste represents the largest percentage of landfilled material in municipal solid waste, as seen in figure 3 below. EPA relies on gathering these data on food waste generation and management from studies conducted by other organizations, such as state and local governments and food waste generators. EPA measures certain FLW diversion activities (i.e., divert food to a destination other than landfill or incineration). For example, in September 2018 EPA completed an effort to quantify the number and capacity of anaerobic digestion facilities in the United States. EPA also aggregates and publishes data submitted by EPA’s Food Recovery Challenge program participants on recycling fats, oils, and grease, which may otherwise be disposed of through wastewater. For example, participating restaurants may submit data on the amount of fats from their fryer grease containers that they send for recycling through rendering, conversion to biofuels, or to an anaerobic digester. In addition, EPA develops estimates of food waste composting based on a review of state environmental agency websites, as well as published reports. EPA updates its FLW estimates annually. EPA officials stated that these annual estimates are the most comprehensive annual estimates of generated and managed FLW and that EPA plans to use these estimates to track progress. However, EPA officials acknowledged certain limitations in using these estimates to track annual progress against the 2030 goal. For example, EPA officials stated that data challenges include limited studies available for some sectors and the lack of geographic coverage, among others. EPA is taking steps to improve its FLW estimates. For example, officials stated that in 2017 EPA embarked on an effort to improve its food measurement methodology to reflect all potential FLW generating sectors for which there are data, and to characterize how food is being managed beyond composting and landfill. USDA has also provided some data and information about FLW at various stages of the food supply chain in the United States since 2015. Specifically: ERS is working on initiatives to refine and improve its data system in order to support its ongoing efforts to estimate FLW at the retail and consumer stages of the food supply chain. For example, USDA officials told us they are developing a proposal for an external expert panel to analyze food loss estimates at the consumer stage of the food supply chain and make recommendations for data updates. In addition, USDA officials told us that work is under way to update the retail-level loss estimates of selected foods. In addition, in December 2017, ERS initiated work on a study to identify gaps in information about farm-level FLW. According to ERS officials, as part of the study, ERS will describe the existing data- collection challenges and address the economic factors that influence farmers’ decisions as they relate to FLW at the farm level. For example, one factor could involve a farmer deciding to plow excess produce into the fields instead of harvesting or processing the crop if the potential additional labor or operations costs exceed the potential revenue. One senior ERS official told us that ERS expects to issue the study by the end of calendar year 2019. Additionally, ERS officials told us that USDA could use the final study to inform USDA’s policy approaches to reducing FLW. For example, the report may inform USDA’s efforts to assist farmers in implementing best practices in reducing FLW and expanding market opportunities for imperfect fruits and vegetables or excess harvest. USDA’s National Institute for Food and Agriculture has provided grant funding to projects related to FLW. For example, the institute awarded a grant in 2018 to an academic institution to study the effect of secondary markets as alternative channels for usable food. To advance the research mission of the agency, among other reasons, USDA has a memorandum of understanding with the Foundation for Food and Agriculture Research, an organization that Congress authorized as part of the 2014 Farm Bill. The Foundation for Food and Agriculture Research conducts research in six defined challenge areas, including one area that focuses research on inefficiencies in the food system, such as FLW. EPA and USDA have taken some actions to educate and build awareness about FLW in the United States since announcing the national FLW reduction goal in 2015. For example, EPA published its Sustainable Materials Management Program Strategic Plan, Fiscal Years 2017-2022 in October 2015. One of the plan’s three strategic priority areas is Sustainable Food Management, which includes an action area of promoting opportunities to reduce wasted food and the food’s associated effects over the entire food supply-chain life cycle with a preference for using approaches that are higher on the agency’s Food Recovery Hierarchy. EPA’s strategic plan describes delivering tools and education; working with states and local communities to help provide regional or sector-based support; and sharing best practices on wasted-food reduction efforts. In addition to the planned actions identified in the Sustainable Food Management area, EPA has also provided the following FLW education and awareness tools, among others: Food: Too Good to Waste. This community-based social marketing campaign, implementation guide, and toolkit aim to reduce wasteful household food management practices and keep FLW out of landfills. The toolkit is designed for community organizations, local governments, households, and others interested in reducing wasteful household food management practices. The implementation guide is designed to teach local governments and community organizations how to implement a Food Too Good to Waste campaign in their community using the toolkit. In a 2016 report, EPA listed 17 communities in various states, including Rhode Island and Vermont, that had implemented Food Too Good to Waste campaigns and, as part of this implementation, could use outreach and engagement tools adaptable to the needs of their communities based on their available resources. The campaigns focused on helping households make small shifts in how they shop, prepare, and store food to prevent it from being wasted. Waste Reduction Model. According to the agency’s website, EPA created this tool to help solid-waste planners and organizations track greenhouse gas emissions reductions from several different waste- management practices, including source reduction, recycling, anaerobic digestion, combustion, composting, and landfilling. For example, a food service establishment can use the tool to create an estimate of the greenhouse gas savings associated with decreasing the amount of bread and produce landfilled. Tip sheets. EPA developed tip sheets about reducing FLW for different sectors involved in the food supply chain, including manufacturers and restaurants, to emphasize FLW prevention options. EPA officials told us that they make these tip sheets available online on the agency’s website and attend conferences to disseminate information. For example, the officials said that they attended the Midwest Food Recovery Summit in September 2018 and provided these tip sheets at the EPA information booth during the conference. In addition, USDA has been involved in the following FLW reduction efforts to raise awareness and educate various stakeholders along the food supply chain: FLW roundtable meeting. In May 2018, the Secretary of Agriculture hosted a roundtable meeting with members of Congress, food industry representatives, and nonprofit groups to raise awareness about FLW and discuss potential solutions. FoodKeeper application. In 2015, USDA, in partnership with Cornell University and the Food Marketing Institute, launched the FoodKeeper application, a tool to provide consumers with specific storage advice, including storage timelines for the refrigerator and freezer for food and beverage items. USDA officials stated that the agency updated the application in October 2018 to include various features including searching for food and beverages in Spanish and increasing the number of food items with storage information. USDA has continued to highlight the FoodKeeper application as part of USDA and EPA’s Food Waste Challenge effort to help educate consumers to reduce FLW. Infographic. Also in 2015, the USDA Center for Nutrition Policy and Promotion issued an infographic, “Let’s Talk Trash,” to help inform American consumers about the benefits of reducing FLW, as shown in figure 4. USDA made the infographic available on its www.choosemyplate.gov website, which includes additional resources to help consumers think about the amount of FLW at home. Strategies for schools. In 2015, USDA’s Food and Nutrition Service issued a summary of strategies for schools to reduce FLW that included a list of resources to encourage FLW diversion by donating uneaten food to nonprofit institutions and information about composting. The Food and Nutrition Service also recommended that schools introduce “share tables” into cafeterias so that students could exchange unwanted but otherwise edible food items. In June 2016, USDA issued a memorandum to remind states’ Child Nutrition Program directors of the opportunities to use share tables to reduce FLW in a number of Child Nutrition Programs, such as the National School Lunch Program. In July 2016, the Food and Nutrition Service issued guidance directed at school staff members and students, among others, with tips to prevent FLW, including encouraging students to use share tables. To further provide information, raise awareness, and educate different stakeholders along the food supply chain, EPA and USDA have collaborated on the following FLW reduction efforts: A Guide to Conducting Student Food Waste Audits. In 2017, EPA, USDA, and the University of Arkansas collaborated to create this guide for students and school personnel about the amount of FLW in their cafeterias. The guide provides information on why and how to do a food waste audit and what to do with the data collected. It also offers FLW prevention ideas. Public/private partnerships. EPA and USDA support public/private partnerships to provide key information, solutions, and best practices to reduce FLW across the food supply chain. For example, EPA and USDA established the U.S. Food Loss and Waste 2030 Champions initiative in November 2016 as a way to increase efforts to meet the national FLW reduction goal. This 2030 Champions initiative recognizes organizations that have committed to cutting FLW in their own operations in half by 2030 and encourages Champions to report on their progress. In May 2018, EPA hosted a public webinar to highlight the actions of three 2030 Champions to share best practices, tools, and resources these organizations created to prevent food from going to waste. In March 2019, USDA officials told us that eight additional businesses have joined the 15 Champions involved in the initiative since its launch. In addition, EPA and USDA also support Further With Food, an online hub developed by EPA, USDA, and 10 other organizations that provides information and solutions to raise public awareness and reduce FLW. Participation in external conferences. EPA and USDA have conducted outreach, including through participation in conferences and seminars, and have disseminated resources related to FLW. For example, EPA and USDA each sent an official to attend and present at the National Academies of Science’s Reducing Food Loss and Waste: A Workshop on Impacts in October 2018. USDA officials told us they helped fund this workshop and helped develop the workshop’s objectives, which were to explore the effects of reducing FLW on food availability and other factors; to examine the role of governments, nongovernmental organizations, and the private sector in adopting best practices to improve the benefits and reduce the costs of reducing FLW; and to discuss opportunities for partnerships to address FLW. USDA has also collaborated with FDA to address FLW. For example, USDA and FDA are both on the Executive Board of the Conference for Food Protection, an organization that brings together representatives from the food industry, government, academia, and consumer organizations to identify and address emerging problems of food safety. In April 2016, this group released a Comprehensive Resource for Food Recovery Programs to reduce FLW through the recovery of consumable food. This report is intended to assist stakeholders involved in the recovery, distribution, or service of food to people who are food insecure. The report references the national food standards at the retail level, as expressed in the FDA Food Code, to minimize the occurrence of risk factors that contribute to foodborne illness. FDA contributed to the submission of an issue to the 2018 Biennial Meeting of the Conference for Food Protection that sought to promote uniformity in the way in which state and local governments regulate food donation and recovery operations in retail and foodservice establishments. In addition, FDA has disseminated information to the public about strategies to reduce FLW while maintaining food safety and has referred to USDA’s FoodKeeper application as a resource for learning how to store perishable food and employ safe storage practices. EPA and USDA have each taken some actions to increase infrastructure and capacity to support efforts to reduce FLW in the United States. EPA has taken some actions to increase infrastructure and capacity to reduce FLW in the United States. For example: Technical assistance. EPA provides technical assistance to state and local governments in developing anaerobic digestion projects, a technology to process wasted food that is more desirable than landfilling or incineration, according to EPA’s Food Recovery Hierarchy. Excess Food Opportunities Map. EPA’s Excess Food Opportunities Map displays the locations of more than 500,000 industrial, commercial, and institutional food generators that may potentially produce excess food and more than 4,000 potential recipients of that excess food. The map also provides information at the specific establishment–level, including estimates of excess food generation that may help users identify alternatives to sending excess food to landfills. The map helps users identify potential infrastructure gaps for managing excess food, inform FLW management decisions at the local level, and identify potential sources of food for rescue and reuse, among other purposes. An EPA official told us that the communication plan for the launch of the Excess Food Opportunities Map included a webinar announcing the map in July 2018 and providing presentations about the map at various conferences, including during the National Academies Reducing Food Loss and Waste Workshop in October 2018. The official also stated that emails about the map were sent to over 13,000 people and approximately 700 people attended the webinar EPA hosted in July 2018. Recycling infrastructure. EPA’s Sustainable Materials Management program’s strategic plan describes EPA’s role in providing states, businesses, and other stakeholders with, among other things, tools, guidelines, and technical support to more effectively manage waste, including by helping increase recycling infrastructure. In May 2018, EPA cohosted a recycling infrastructure workshop to identify solutions for creating infrastructure for anaerobic digestion and composting. In addition, EPA officials told us that the agency is in the process of updating its recycling guide for state and local governments and they anticipate completing it by the end of 2020. USDA also has taken some actions to increase infrastructure and capacity to reduce FLW in the United States. For example: Food programs. USDA officials told us that USDA food programs, such as The Emergency Food Assistance Program, support efforts to feed people and to provide access to affordable and nutritious food. For example, food donation organizations that are recipients of program funds may use these funds to pay the direct expenses associated with the distribution of USDA foods, such as fruits, vegetables, and beans. New FLW-reduction technologies. USDA’s Agricultural Research Service has various research programs, including one to enhance the quality and utilization of agricultural products. Potential benefits listed as part of this research program are minimizing food product losses and reducing FLW through the development of farm production technologies, such as the development of an apple-sorting system that will help reduce apple harvest losses. According to USDA officials, most of the innovations of this research program involve creating value-added products from “ugly produce” or from food processing byproducts, such as orange peel or mushroom-stalk waste, or creating new technologies to prolong the shelf life of food products. Meat and poultry donation rules. USDA’s Food Safety and Inspection Service issued a directive that outlines procedures for donating certain meat and poultry products to nonprofit organizations. The Food Safety and Inspection Service has also begun, under certain circumstances, to recognize food banks as “retail-type” establishments, which allows food banks to break down bulk shipments of federally inspected meat or poultry products, wrap or rewrap those products, and label the products for distribution to consumers. In one case, this recognition enabled a nonprofit organization engaged in food donations to gain 2.6 million pounds of food donations from manufacturers in 2016, according to USDA documents. Grant funding. USDA’s Rural Utilities Service has provided some funding to support FLW reduction infrastructure in rural communities. For example, USDA awarded a 2016 USDA Rural Utilities Service Solid Waste Management grant to the University of Iowa’s Waste Reduction Center, which has worked toward addressing the issue of FLW disposal. More recently, in 2018, USDA awarded a solid-waste management grant to the Center for EcoTechnology, a nonprofit that provides technical assistance to implement FLW diversion programs. Low-interest loans. USDA’s Farm Storage Facility Loan Program provides low-interest loans for producers to store, handle, and transport the food they produce. The loans are designed to assist a diverse range of farming operations, including small and midsized businesses and operations supplying local food and farmers markets. The program helps keep food from being damaged by pests or inclement weather, among other things, so that more food can reach store shelves. Funding for renewable energy systems. USDA’s Rural Energy for America Program provides grants and loan guarantees to farmers, ranchers, and eligible small businesses to install renewable energy and energy-efficiency systems. For example, according to a Rural Energy for America Program Fact Sheet, funds may be used for the purchase, installation, and construction of renewable energy systems, such as anaerobic digesters. In a 2016 USDA Rural Development report, USDA provided examples of anaerobic digesters that use FLW to produce a biogas that is converted into energy. EPA and USDA have each taken some actions to plan and organize their efforts toward achieving the national FLW reduction goal, such as issuing strategic plans and establishing working groups. Additionally, EPA, USDA, and FDA signed a joint agency formal agreement in October 2018 aimed at increasing collaboration and coordination among the agencies on FLW reduction efforts. EPA, USDA, and FDA only recently initiated their interagency collaboration on FLW reduction efforts toward achieving the national FLW reduction goal, but have not yet taken certain steps that align with key practices for interagency collaboration. EPA has taken actions to guide its own efforts toward achieving the national FLW reduction goal. For example, in 2015, EPA issued a strategic plan that included a strategic priority area of sustainable food management. Subsequently, EPA developed an internal planning document (U.S. EPA Sustainable Management of Food Strategy, Fiscal Year 2018-2022). This planning document established action areas, goals, and activities for reducing FLW to achieve the national FLW reduction goal. For example, the plan identified five action areas, including addressing data and measurement issues, collaboration and partnerships, technical assistance, infrastructure and capacity, and communication and outreach. According to EPA officials, the agency intends to use the plan to track its progress and measure results towards the national FLW reduction goal. USDA has also taken actions to guide its own efforts toward achieving the national FLW reduction goal. For example, according to USDA officials, the department established a FLW working group in 2015 that currently meets on a monthly basis. According to officials from the Office of the Chief Economist and ERS, the department also designated an individual within the Office of the Chief Economist to guide USDA’s FLW efforts. In addition, in March 2016, the National Institute for Food and Agriculture’s Pilot Science Outcome Committee on Environmental Sustainability identified FLW as a top science priority area to address environmental sustainability. According to the committee, FLW is an integral component of environmental sustainability, and mitigating FLW has the potential to create economic, environmental, and social benefits while contributing to food security, resource conservation, and the mitigation of climate change. Furthermore, EPA and USDA have contributed to the work of the Commission for Environmental Cooperation, an intergovernmental organization established by the governments of Canada, Mexico, and the United States to facilitate effective cooperation on the conservation, protection, and enhancement of the environment in their territories. The organization has an initiative to identify challenges, opportunities, and solutions related to increasing organic waste diversion and processing capacity in North America. This organization issued a report in 2017 about, among other things, the management of organic waste and best practices for reducing FLW and diverting other organic waste materials away from landfills. EPA is on the steering committee for this effort. According to an EPA announcement in March 2019, the commission issued a practical guide and technical report on FLW measurement. Moreover, in October 2018, the Secretary of Agriculture hosted a public meeting to promote FLW reduction. During this meeting, EPA, USDA, and FDA signed a formal interagency agreement referred to by the agencies as the Winning on Reducing Food Waste initiative. Under this 2-year agreement, the agencies committed to developing an interagency strategic plan to increase collaboration and coordination among the agencies on their FLW reduction efforts. According to the agreement, this additional collaboration is intended to strategically align each agency’s efforts to better educate Americans on the impacts of reducing FLW. The agencies also agreed to, where appropriate, educate actors throughout the supply chain on the best practices to reduce FLW in the growing, manufacturing, transporting, selling, and disposing of food and the handling, preparation, and storage of food, as well as creating new uses for excess food. The formal agreement mentions public-private partnerships and, according to EPA officials, the agencies intend to use the views of stakeholders in the public, private, and nonprofit sectors to inform their strategic plan. According to EPA officials, the agencies intend to discuss common goals and to identify additional initiatives as appropriate to achieve the national FLW reduction goal. In announcing this initiative, the Secretary of Agriculture affirmed the importance of reducing FLW by saying that “an unacceptable percentage of our food supply is lost or wasted” and that “as the world’s population continues to grow and the food systems continue to evolve, now is the time for action to educate consumers and businesses alike on the need for food waste reduction.” In addition, the FDA Commissioner stated that “by taking steps to address obstacles that food donation and recovery programs may face in giving unsold foods a second opportunity and helping food producers find ways to recondition their products so that they can be safely sold or donated, our aim is to both reduce food waste and nourish Americans in need.” In April 2019, the agencies held a public event to announce their Winning on Reducing Food Waste Federal Interagency Strategy. This strategic plan identified six prioritized action areas for activities to reduce FLW. For example, the agencies plan to, among other things, increase consumer education and outreach efforts; increase coordination and guidance on FLW measurement; and clarify and communicate information on food safety, food date labels, and food donations. In addition, the agencies signed a formal agreement with ReFED to, among other things, better evaluate and improve upon strategies to reduce FLW. For example, according to the 2019 agreement, the agencies and ReFED intend to leverage existing partnerships to advance data-collection and measurement activities related to FLW. Finally, EPA announced that it had selected three recipients to receive EPA funding to support infrastructure projects to help reduce FLW and divert FLW from landfills. In our prior work, we have found that key practices to enhance and sustain interagency collaboration include agreeing on roles and responsibilities and developing mechanisms to monitor, evaluate, and report on results. In addition, we have found that key practices for agency collaboration call for clearly defining short- and long-term outcomes. Furthermore, such interagency efforts benefit from identifying how leadership commitment will be sustained. Lastly, we identified a key practice that calls for ensuring that the relevant stakeholders have been included in the collaborative effort. This collaboration can include other federal agencies, state and local entities, and private and nonprofit organizations. According to the strategic plan, the agencies built on information from several sources, including prior GAO work on implementing interagency collaborative mechanisms, to develop the Winning on Reducing Food Waste Federal Interagency Strategy. However, this strategic plan does not align with certain key practices for interagency collaboration. For example, the first priority area identified in the strategic plan is to enhance interagency collaboration, and the strategic plan states that an interagency, collaborative mechanism will be established to reduce programmatic redundancies and leverage complementary activities. However, the strategic plan does not identify how this mechanism will be used to monitor, evaluate, or report on results, establish a time frame for developing this collaborative mechanism, or describe how the agencies will engage relevant stakeholders, such as other federal, state, and local agencies, nonprofit organizations, academic institutions, food industry entities, international organizations, and tribal organizations. In addition, several of the strategic plan’s priority areas address specific aspects of reducing FLW, such as encouraging FLW reduction by federal agencies in their respective facilities. However, the strategic plan does not identify the roles and responsibilities of the respective agencies for taking action in these areas and it does not clearly define what specific short- and long- term outcomes the agencies intend to achieve. Furthermore, the agencies have not identified how they intend to sustain leadership commitment to this goal. For example, the Winning on Reducing Food Waste formal interagency collaborative agreement is a 2-year agreement among the agencies, but the national FLW reduction goal calls for reducing FLW by half by 2030, which falls well beyond this 2-year time frame. According to a USDA official, the agencies do not have plans for how they will continue their interagency collaboration beyond the life of the current agreement. This official noted that the agencies do not intend to update the strategic plan for the duration of the 2-year agreement and that the agencies will release more information to the public about specific actions and timelines as it becomes available. By incorporating leading practices for interagency collaboration as they implement their interagency strategic plan, EPA, USDA, and FDA would have better assurance that they are effectively collaborating toward achieving the national FLW reduction goal. Achieving the national FLW reduction goal could provide significant economic, environmental, and social benefits to the United States, such as helping to lower consumer expenses, reducing harmful greenhouse gas emissions, and providing additional meals to feed food-insecure people through increased food donations. This is an important issue that requires action across the food supply chain and collaboration among federal agencies and nonfederal stakeholders, such as states and businesses. EPA and USDA have taken steps to develop programs and policies that aim to reduce FLW and to collaborate on their various initiatives. In addition, EPA, USDA, and FDA have taken some actions to plan and organize their efforts toward achieving the national goal of reducing FLW by half by 2030, including announcing an interagency strategic plan to reduce FLW. However, this strategic plan does not align with key practices in interagency collaboration that we have identified, such as agreeing on roles and responsibilities; developing mechanisms to monitor, evaluate, and report on results; clearly defining short- and long- term outcomes; identifying how leadership commitment will be sustained; and ensuring that the relevant stakeholders have been included in the collaborative effort. By incorporating such leading practices for interagency collaboration as they implement their interagency strategic plan, EPA, USDA, and FDA would have better assurance that they are effectively collaborating toward achieving the national FLW reduction goal. We are making three recommendations to the agencies in our review. Specifically: The Administrator of EPA should work with the Commissioner of FDA and Secretary of Agriculture to incorporate leading collaboration practices as they implement their interagency FLW reduction strategic plan, to include (1) agreeing on roles and responsibilities; (2) developing mechanisms to monitor, evaluate, and report on results; (3) clearly defining short- and long-term outcomes; (4) identifying how leadership commitment will be sustained; and (5) ensuring that the relevant stakeholders have been included in the collaborative effort. (Recommendation 1) The Commissioner of FDA should work with the Administrator of EPA and Secretary of Agriculture to incorporate leading collaboration practices as they implement their interagency FLW reduction strategic plan, to include (1) agreeing on roles and responsibilities; (2) developing mechanisms to monitor, evaluate, and report on results; (3) clearly defining short- and long-term outcomes; (4) identifying how leadership commitment will be sustained; and (5) ensuring that the relevant stakeholders have been included in the collaborative effort. (Recommendation 2) The Secretary of Agriculture should work with Administrator of EPA and Commissioner of FDA to incorporate leading collaboration practices as they implement their interagency FLW reduction strategic plan, to include (1) agreeing on roles and responsibilities; (2) developing mechanisms to monitor, evaluate, and report on results; (3) clearly defining short- and long-term outcomes; (4) identifying how leadership commitment will be sustained; and (5) ensuring that the relevant stakeholders have been included in the collaborative effort. (Recommendation 3) We provided a draft of this report to EPA, USDA, and the Department of Health and Human Services for review and comment. We also provided CEQ and OMB a draft of this report for review. In its comments, reproduced in appendix I, EPA agreed with our recommendation to the agency and described current and future actions to implement the recommendation. Similarly, in its comments, reproduced in appendix II, USDA agreed with our recommendation to it and described current and future actions to implement the recommendation. In addition, in its comments, reproduced in appendix III, the Department of Health and Human Services concurred with our recommendation to it and described current and future actions to implement the recommendation. USDA and CEQ provided technical comments, which we incorporated as appropriate. In response to our recommendations, EPA, USDA, and the Department of Health and Human Services said that they will work with each other to incorporate leading collaboration practices as they implement the interagency FLW reduction strategic plan. Both EPA and USDA also stated that they intend to complete implementation of their respective recommendations by October 2020, to align with the duration of the 2- year formal agreement between EPA, USDA, and FDA. The Department of Health and Human Services stated that FDA issued a letter to the food industry supporting the industry’s efforts to standardize voluntary quality date labeling. We are sending copies of this report to the appropriate congressional committees, the Administrator of EPA, the Secretary of Agriculture, the Secretary of Health and Human Services, the Director of OMB, the Chair of CEQ, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions concerning this report, please contact me at (202) 512-3841 or morriss@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In addition to the contact named above, Anne K. Johnson (Assistant Director), Joseph Capuano (Analyst in Charge), David Bennett, Carol Bray, Tara Congdon, Juan Garay, Serena Lo, Greg Marchand, Jordan Mettica, Oliver Richard, Dan Royer, Marie Suding, Kiki Theodoropoulos, and Sarah Veale made key contributions to this report.", "summary": "The Natural Resources Defense Council reported that in the United States up to 40 percent of the food supply goes uneaten. FLW has significant economic, environmental, and social effects on various stakeholders, including businesses and consumers. In 2015, EPA and USDA announced a national goal to reduce FLW in the United States by half by 2030. In 2018, FDA joined EPA and USDA in these efforts. GAO was asked to examine efforts by federal agencies to reduce FLW. This report (1) describes nonfederal stakeholder views on key challenges to reducing FLW in the United States, (2) describes actions EPA and USDA have taken to address key challenges to reducing FLW in the United States, and (3) examines federal planning efforts toward achieving the national FLW reduction goal. GAO reviewed federal reports on FLW; analyzed agency documents; interviewed officials from EPA, FDA, USDA, and states and representatives of nonfederal stakeholders, such as academic institutions, industry, international organizations, nonprofit organizations, and a tribal organization, based on their demonstrated expertise on FLW; and attended conferences on FLW. GAO identified three key areas in which challenges exist to reducing food loss and waste (FLW) in the United States: (1) limited data and information about FLW; (2) a lack of awareness and education about FLW; and (3) limited infrastructure and capacity. For example, the causes of FLW vary across the stages of the food supply chain (see figure), but the share of total FLW due to each of these causes is currently unknown, according to a U.S. Department of Agriculture (USDA) report. GAO identified these challenges through interviews with selected stakeholders. The Environmental Protection Agency (EPA) and USDA have taken initial actions to address key challenges to reducing FLW in the United States since announcing a national FLW reduction goal in 2015. These actions include conducting a study to identify gaps in information about farm-level FLW and building public awareness about ways to reduce FLW. EPA, USDA, and the U.S. Department of Health and Human Services' Food and Drug Administration (FDA) have taken some actions to plan and organize their efforts toward achieving the national FLW reduction goal. For example, EPA developed an internal plan that established action areas, goals, and activities for reducing FLW, and USDA designated an individual to guide USDA's FLW efforts. In October 2018, EPA, USDA, and FDA signed an interagency agreement committing them to developing a strategic plan to improve their collaboration and coordination in reducing FLW. In April 2019, the agencies announced an interagency strategic plan with prioritized action areas to reduce FLW, but this strategic plan does not address how it will incorporate key practices for interagency collaboration that GAO identified, including (1) agreeing on roles and responsibilities; (2) developing mechanisms to monitor, evaluate, and report on results; (3) clearly defining short- and long-term outcomes; (4) identifying how leadership commitment will be sustained; and (5) ensuring that the relevant stakeholders have been included in the collaborative effort. By incorporating such practices as they implement their interagency strategic plan, EPA, USDA, and FDA would have better assurance that they were effectively collaborating toward achieving the national FLW reduction goal. GAO is making three recommendations in this report. GAO is recommending that EPA, FDA, and USDA incorporate leading collaboration practices as they implement their interagency strategic plan to reduce FLW.", "document_type": "gao"}
{"report": "VA has been providing veterans educational assistance benefits since 1944. We previously reported that these benefits have been put in place over time to compensate for compulsory service, encourage voluntary service, avoid unemployment, provide equitable benefits to all who served, and promote military retention. The Post-9/11 GI Bill, which took effect on August 1, 2009, is now VA’s largest educational program. This program generally provides benefits to veterans who served on active duty for at least 90 days beginning on or after September 11, 2001. Full benefits are generally available to those who served on active duty for 36 months, for which VA will pay the net cost for in-state tuition and fees at public schools and up to an annual maximum amount at nonprofit and for- profit schools ($24,477 in academic year 2019-2020). VA pays schools directly for tuition and fees and sends additional payments for housing and books directly to veterans who are eligible for these payments. To receive education benefits through the Post-9/11 GI Bill, students submit applications to VA, schools certify enrollments, and VA processes claims and payments. For help covering the costs of their postsecondary education, veterans may also be eligible for grants and loans available from federal student aid programs administered by Education, such as Pell Grants and Direct Loans. According to Education data, an estimated 32 percent of student veterans had received Pell Grants and 28 percent had taken out Direct Loans, during school year 2015-16. VA education payments, such as Post-9/11 GI Bill benefits, are not considered when calculating eligibility for federal student aid and do not affect the amount of aid a veteran can receive from Education. Student veterans may also be eligible for state and institutional aid (scholarships from state governments or schools, for example). Nearly 700,000 student veterans received Post-9/11 GI Bill tuition and fee benefits to attend almost 6,000 schools in fiscal year 2017. VA paid about 40 percent of the Post-9/11 GI Bill tuition and fee payments to public schools, 30 percent to nonprofits, and 30 percent to for-profits (see fig. 1). Most student veterans used Post-9/11 GI Bill tuition and fee payments to attend schools that provided 4-year undergraduate programs (see fig. 2). Veterans may also use Post-9/11 GI Bill benefits for training opportunities at schools that do not offer college degrees, including training in areas such as driving, emergency medical training, and barber or beautician skills. These programs received about $360 million Post-9/11 GI bill tuition and fee payments in fiscal year 2017. A relatively small number of schools received a large share of Post-9/11 GI Bill tuition and fee payments. In fiscal year 2017, the 50 schools that received the highest total amount of Post-9/11 GI Bill tuition and fee payments accounted for over 30 percent of all such benefits, collectively receiving $1.4 billion for over 190,000 beneficiaries. These 50 schools consisted of 14 public, 16 nonprofit, and 20 for-profit schools (see fig. 3). In fiscal year 2017, the 50 schools received between $11 million and $191 million each in tuition and fee payments and enrolled between around 350 and 28,000 Post-9/11 GI Bill beneficiaries. In contrast, among all schools receiving Post-9/11 GI Bill benefits in fiscal year 2017, the majority of them enrolled fewer than 15 veterans. Student outcomes at the 50 schools that received the most Post-9/11 GI Bill tuition and fee payments were, on average, generally comparable to the national average, but varied more widely across sectors. Since available data on student veteran outcomes is currently limited, we analyzed common outcome measures for the broader student populations at each school: 4-year program graduation rates: the percent of first-time full-time students who completed a 4-year program within 6 years. Full- and part-time retention rates: the percent of first-time students who enrolled in one fall and either successfully completed their program or re-enrolled in the next fall. When examined as a whole, the average student outcomes for the 50 schools that received the most Post-9/11 GI Bill tuition and fee payments were generally comparable to the national average. For example, the average 4-year program graduation rate at the top 50 schools was 61— the same as the national average. For one of the outcome measures— full-time retention rate—the average was higher for the top 50 schools (83 percent) than the national average (75 percent). Within the 50 schools that received the most Post-9/11 GI Bill tuition and fee payments, student outcomes varied across schools in different sectors (see fig. 4). For-profit schools had lower 4-year program graduation and retention rates compared to public and nonprofit schools among these 50 schools, although there was wide variation among schools in each sector. Although a relatively small number of schools close each year, these closures can affect thousands of student veterans. In 2017 we reported that about 95 schools closed in school year 2015-16, according to Education data, which was higher than in previous years, primarily due to a rise in for-profit school closures (see fig. 5). Schools can close in different manners and for a variety of reasons, including declining enrollments, financial problems, loss of accreditation, and legal actions. When a school ceases operations in an orderly process over several months it gives students time to complete the current school term and make arrangements to transfer and continue their education at another school. The effect of school closures is often worse when the closures occur abruptly with little or no advance warning, because these schools generally do not have time to establish transfer arrangements that allow students to easily continue their education at another school. Abrupt closures of large schools, although infrequent, can affect thousands of student veterans and result in large financial losses for the federal government and taxpayers. For example, Corinthian Colleges Inc. (Corinthian) enrolled more than 72,000 students before its closure in April 2015. The following year, ITT Educational Services Inc. (ITT), another large for-profit provider of higher education, closed all of its 136 campuses in September 2016, affecting more than 35,000 students. More than 7,000 Post-9/11 GI Bill students were pursuing educational programs at schools operated by ITT and Corinthian at the time of their closures, according to VA. More recently, closures at Education Corporation of America in 2018 and Dream Center Education Holdings in 2019, which operated schools under multiple brands, including Argosy University and several campuses of The Art Institutes, affected tens of thousands of students, including thousands of Post-9/11 GI Bill recipients. Student veterans attending a school that closes may be eligible to have some or all of their Post-9/11 GI Bill benefits restored. As a result of the Harry W. Colmery Veterans Educational Assistance Act of 2017, VA restores GI Bill entitlements to eligible beneficiaries affected by recent and future school closures. Student veterans may also be entitled to a discharge on eligible federal student loans they may have received from Education or to have their Pell Grant eligibility restored if they are unable to complete a program because their school closed. Despite these options for having benefits restored and loans discharged, school closures can still create hardships for veterans. As we have previously reported, college students in general can face challenges transferring credits and continuing their education at a new school under any circumstances. Students who transferred lost, on average, an estimated 43 percent of their credits, and credit loss varied depending on the transfer path, based on data from 2004 to 2009. For example, students who transferred between public schools—the majority of transfer students—lost an estimated 37 percent of their credits. In comparison, students who transferred from for-profit schools to public schools—which happens less frequently—lost an estimated 94 percent of their credits. Even if a student’s credits transfer, they may not apply toward fulfilling degree requirements for their intended major. In these cases, a student will likely have to take additional courses at their new school, which could potentially delay graduation and result in additional costs to pay for repeated courses. Further, some student veterans with credits that do not transfer may exhaust their Post-9/11 GI Bill benefits before completing their degree. School closures can also exacerbate other challenges veterans may face pursuing their education. As we have previously reported, many student veterans already cope with challenges transitioning from the military to an academic environment. For example, they can face challenges navigating the academic bureaucracy, whether in attempting to receive transfer credit for previous college courses or in determining what other sources of financial aid may be available to them. Many student veterans are also trying to balance school with family and work obligations or dealing with the effects of combat-related physical and psychological injuries. When a school closes, the burden of finding and enrolling in a new school may be especially difficult for these veterans. Closures can also pose a financial risk for the government and taxpayers to the extent that Post-9/11 GI benefits are restored and federal student loans are discharged. For example, in 2017 the Congressional Budget Office estimated that restoring Post-9/11 GI Bill benefits and other VA education benefits to student veterans who attend schools that closed will increase direct spending by $320 million over the 10 year period from 2018 to 2027. School closures can also result in hundreds of millions of dollars in financial losses for the federal government and taxpayers due to discharged federal student loans. In conclusion, the Post-9/11 GI Bill has provided valuable education benefits to millions of veterans who attend a wide range of schools. However, when schools abruptly shut their doors, it can leave student veterans—who already face unique challenges in an academic environment—without a clear path to continuing their education and can force taxpayers to cover the cost of restoring their benefits and discharged student loans. Student veterans who continue their education at another school may also find that many of the credits they earned will not ultimately help them after they transfer, delaying their degrees and resulting in additional costs. As the number of school closures has increased in recent years, the risks and challenges associated with such closures are particularly salient for student veterans, their families, and the federal government. Chairman Levin, Ranking Member Bilirakis, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Melissa Emrey-Arras, Director, Education, Workforce, and Income Security Issues at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Will Colvin (Assistant Director), Brian Schwartz (Analyst-in-Charge), and Jeffrey G. Miller. In addition, key support was provided by James Bennett, Deborah Bland, Benjamin DeYoung, Alex Galuten, Theresa Lo, John Mingus, Corinna Nicolaou, and Michelle St. Pierre. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Post-9/11 GI Bill is VA's largest educational program. It provides payments for eligible veterans to cover tuition and fees, housing and other costs while they pursue a higher education. However, for some veterans this pursuit is interrupted when the school they attend unexpectedly closes. This testimony addresses (1) the distribution of Post-9/11 GI Bill tuition and fee payments among schools, (2) outcomes of students at schools that receive the most Post-9/11 GI Bill payments, and (3) how school closures can affect student veterans. To address these topics, GAO reviewed VA data on Post-9/11 GI Bill tuition and fee payments to schools for fiscal year 2017, the most recent school-level data available. GAO analyzed student outcome measures for these schools using Department of Education data reported for school year 2017-2018. GAO also reviewed its prior reports issued between 2013 and 2017 on school closures, credit transfers, and related challenges faced by student veterans. In fiscal year 2017, nearly 700,000 student veterans used their Post-9/11 GI Bill benefits from the Department of Veterans Affairs (VA) to attend programs at almost 6,000 schools. Of the almost $4.5 billion in Post-9/11 GI Bill tuition and fee payments VA made to schools in fiscal year 2017, about 40 percent went to public schools, 30 percent to nonprofits, and 30 percent to for-profits. A small number of schools received a large share of the tuition and fees paid, with 30 percent of payments totaling $1.4 billion going to 50 schools that enrolled over 190,000 veterans in fiscal year 2017. The average student outcomes at the 50 schools that received the highest total amount of Post-9/11 GI Bill tuition and fee payments in fiscal year 2017 were generally comparable to the national averages, but varied widely when examined by school sector. For example, the average 4-year program graduation rate for the top 50 schools was the same as the national average (61 percent). Within the top 50 schools, average graduation rates varied between public (73 percent), nonprofit (66 percent) and for-profit schools (22 percent). Although a relatively small number of schools close each year, these closures can affect thousands of student veterans. School closures, which have increased in recent years, are particularly harmful when they involve large schools that close abruptly with little or no advance warning. For example, more than 7,000 veterans receiving Post-9/11 GI Bill benefits were attending schools operated by Corinthian Colleges and ITT Educational Services when they abruptly closed in 2015 and 2016, respectively. Although veterans affected by school closures may qualify to have their GI Bill benefits restored, these closures can create hardships for veterans and significant costs for taxpayers. For example, veterans can face challenges transferring credits and continuing their education at a new school. This may make it more difficult for veterans to complete their degrees before exhausting their eligibility for Post-9/11 GI Bill benefits. School closures also pose a financial risk for the government and taxpayers due to the costs associated with restoring benefits.", "document_type": "gao"}
{"report": "The FSS program is directed and managed by GSA and provides federal agencies with a simplified process for obtaining commercial supplies and services at prices associated with volume buying. Schedules are catalogs of related products and services, from pre-approved vendors, with established pricing that can be used by federal agencies to obtain goods and services, ranging from office furniture to medical equipment and supplies. Since 1960, GSA has delegated authority to VA to manage health care related schedules, currently totaling nine schedules. (Throughout this report, we use the term “FSS” to refer to VA’s FSS program, unless otherwise noted.) These nine VA schedules, as shown in figure 1, are designed to provide FSS users at VA and other agencies with a menu of items—including medical equipment, supplies, and services—they can order from in a streamlined manner. Sales to VA on the pharmaceutical schedule were $33.5 billion from fiscal years 2014 through 2018. We omitted the pharmaceutical schedule from our review because it differs substantially from the other eight schedules, particularly in its use of a prime vendor. VA’s FSS program is managed by the National Acquisition Center (NAC), a VA-wide contracting organization which is also responsible for procuring items like high-tech medical equipment for medical centers. NAC is part of VA’s Office of Procurement, Acquisition and Logistics, which is overseen by VA’s Office of Acquisition, Logistics, and Construction. Within NAC, the FSS Service, which is comprised of about 80 staff, is divided into teams of contracting staff who are responsible for individual schedules. Another team, NAC’s Program Management and Resource Support, manages functions such as issuing guidance and providing training. In 2016, NAC issued a Procedural Guideline that generally sets a goal for its contracting staff to complete their review of and award decision for vendor-submitted FSS offers within 180 calendar days. Like GSA’s FSS program, users of the VA FSS program are charged a fee on the price of their FSS purchases, called the Industrial Funding Fee (IFF). VA’s FSS fee is 1 percent for services and 0.5 percent for goods. Fees generated by VA FSS fund its operations and other VA procurement operations. NAC facilitates collection of the IFF from vendors that sell products or services under VA FSS contracts, and vendors remit the IFF to VA’s Supply Fund, a self-supporting revolving fund. The Supply Fund, in turn, is used to provide funding to NAC for the operation of the FSS Service, the office that manages VA’s FSS program. VA’s schedules are used by organizations across the federal government, including the Department of Defense, Department of Health and Human Services, and the Department of Homeland Security. In this review, we focus on how the Veterans Health Administration (VHA) uses VA’s schedules. VHA, the only VA administration that uses the VA schedules, provides medical care to about 9 million veterans at 170 medical centers. These medical centers are organized into 18 Veterans Integrated Service Networks (VISN), organizations that manage medical centers and associated clinics across a given geographic area. Each VISN is served by a corresponding Network Contracting Office (NCO), which is responsible for awarding contracts for medical goods and services that the medical centers need. Two primary groups of VHA staff place FSS orders: 1. VHA contracting officers, who are authorized to enter into contracts on behalf of the government, may place orders against the schedules. They handle purchases over the micro-purchase threshold, which is generally $10,000. 2. Certain VHA medical center logistics staff are authorized to make smaller purchases at or below the micro-purchase threshold, including placing FSS orders. Many of these staff are in the medical centers’ logistics offices, which are responsible for managing the supply chain for VHA’s medical centers. Figure 2 provides an overview of VA’s procurement structure and FSS users. In addition to purchasing goods and services through FSS, VHA logistics staff at VA’s medical centers can also buy them through the MSPV-NG program. In this program, VA medical centers use contractors called medical-surgical prime vendors to obtain many of the supplies they use on a daily basis, such as bandages and scalpels. These prime vendors operate local warehouses and deliver supplies ordered by medical centers. The prices for these medical supplies are established by separate contracts or agreements that are awarded by contracting officers within VA’s Strategic Acquisition Center (SAC). The MSPV-NG program is managed by SAC and VHA. As we reported in 2018, for over a decade, each medical center used VHA’s legacy MSPV program to order medical supplies. Many of those items were purchased using VA’s FSS, which provided medical centers with a great deal of flexibility to order from a catalog containing hundreds of thousands of items. However, this flexibility prevented VHA from standardizing the items used across its medical centers and also affected its ability to leverage its buying power to achieve greater cost avoidance. In December 2016, VHA transitioned to a new iteration of this program called MSPV-NG, which has a narrower catalog of medical supplies than the legacy program, which offered hundreds of thousands of items. As of September 2019, the catalog offers about 22,000 supply items to medical centers. In June 2016, a Supreme Court decision clarified that VA must apply the Veterans First Contracting Program preference before contracting with a non-veteran-owned business, including purchases made through FSS. This program, referred to in this report as Veterans First, provides preference within VA for contracting with veteran-owned small businesses. Specifically, VA contracting officers must apply the “VA Rule of Two,” meaning they must conduct market research to determine whether there is a reasonable expectation that two or more veteran- owned small businesses will submit offers for a particular good or service at a fair and reasonable price that offers best value to the government. If two or more such businesses are found, contracting officers must set aside the procurement for the veteran-owned small businesses. VHA used NAC’s FSS to purchase billions of dollars in medical supplies and services over the past 5 years. Sales for the eight non- pharmaceutical schedules, however, have been largely flat, as compared to the rise in VHA’s total health care spending. Though we found vendor- submitted sales reports to be sufficiently reliable for describing overall trends, we found that NAC does not have controls in place to ensure that vendors are providing complete data—used to calculate fees that finance the program. In an attempt to assess data completeness, NAC recently began comparing vendor data to Federal Procurement Data System-Next Generation (FPDS-NG) data for verification. However, because agencies do not report micro-purchases made via purchase card in FPDS-NG, this approach alone is not effective. We also found that NAC does not analyze existing data on the number of veteran-owned small businesses that hold FSS contracts, the types of goods and services they offer, or which schedules have the most or least participation by these businesses. This information is important because VHA contracting officers must apply the Veterans First preference to contracts. The existence or lack of veteran-owned small businesses on FSS affects whether these staff can use FSS to fulfill their needs. Finally, we found that NAC has limited visibility into the FSS user experience. Those insights could help NAC identify potential areas for improvement. VHA obligated $291 billion from fiscal years 2014 to 2018 for health care services provided at its medical facilities—$12 billion of which was for medical supplies and services obligated using the eight non- pharmaceutical VA schedules. In contrast to VHA obligations for health care at its medical centers, which increased nearly 20 percent during this 5-year period, VA FSS purchases on these schedules were flat. See figure 3. We found that the VHA sales trends varied among our three selected schedules during this period, as shown in figure 4. Specifically, VHA sales on the FSS for Medical Equipment and Supplies, the largest of the three, were generally flat. VHA sales on the FSS for Patient Mobility Devices, which includes items such as wheelchairs, increased nearly 50 percent, while sales on the Healthcare Staffing schedule fell by more than 30 percent. NAC does not have controls in place to ensure that vendors provide complete data in their sales reports. These sales reports—required per an FSS contract clause—are NAC’s only means of tracking FSS sales and related fees that finance the FSS program. In fiscal year 2018, vendors on VA’s nine schedules remitted $82 million in IFF from customers to VA’s Supply Fund. Figure 5 provides an overview of key steps in VA’s FSS vendor sales report and IFF collection process. Like NAC, GSA also depends on vendor-reported data to track its FSS sales. However, we found that GSA takes additional steps for its FSS program to ensure the completeness of vendor-reported data. GSA has internal controls to ensure data completeness, including a staff of 43 Industrial Operations Analysts who implement GSA procedures to ensure that, among other things, vendors have sound sales data reporting processes. We did not evaluate GSA’s use of these analysts, but, according to GSA FSS officials, these analysts review vendor sales data, educate vendors about GSA’s requirements, and conduct checks on vendor internal controls and compliance with GSA policies. Having internal controls in place is essential to ensure completeness of vendor-reported sales data. In February 2019, NAC officials told us they had tried to use obligation data reported in FPDS-NG to verify the completeness of vendor sales data. However, they found that FPDS-NG did not contain a substantial portion of vendor sales. These officials stated that the difference between the vendor sales data and the obligations in FPDS-NG was likely due in large part to purchases under the micro-purchase threshold (currently $10,000) that agencies do not report to FPDS-NG. Because agencies do not report micro-purchases made via purchase cards to FPDS-NG, per the Federal Acquisition Regulation, this approach alone is not effective to ensure data completeness. To estimate what portion of vendor-reported sales were below the micro- purchase threshold, we compared sales data that vendors reported to VA to the obligations included in FPDS-NG data for fiscal year 2018 for the eight schedules we reviewed. We found that 54 percent of VA FSS sales as reported in vendor data were not included in FPDS-NG. VA procurement officials we interviewed told us that the 54 percent were likely micro-purchases made by medical center logistics staff using their government purchase cards. For a more detailed view, we also reviewed the percentage of fiscal year 2018 sales included in FPDS-NG for our three selected VA schedules, and found that 65 percent and 71 percent of FSS sales for the Medical Equipment and Supplies and the Patient Mobility Devices schedules, respectively, were not included in FPDS-NG, as shown in figure 6. Finally, we compared FPDS-NG data to FSS sales reports for non-VA agencies. We found instances where obligations in FPDS-NG reported by these agencies exceeded those reported by vendors in FSS sales reports—sometimes significantly. Specifically, from fiscal years 2014 to 2018, FPDS-NG reflected a cumulative $533 million more than the sales that vendors reported to NAC for non-VA agencies for the Healthcare Staffing schedule. This difference between reported sales and obligations indicates a risk that vendors are under-reporting VA FSS sales to other agencies. Standards for Internal Control in the Federal Government require that management have adequate controls for ensuring the quality of data. NAC FSS officials told us that they would like to do more to mitigate the risk that vendors may not be reporting complete VA FSS sales data, given the differences we found and that NAC also found between reported sales and obligations. Additional internal controls, similar to the process used by GSA, would help NAC to ensure vendor-reported sales are complete, and that the appropriate IFF sales fees that finance the FSS program are collected. We found that NAC does not assess data on the participation of, and items and services offered by, veteran-owned small businesses in NAC’s FSS program. This information is important because VHA contracting staff must apply the “VA Rule of Two” preference before contracting with a non-veteran-owned business. This preference for veteran-owned small businesses under the Veterans First program—which VA implemented more expansively after the 2016 Supreme Court decision—has had a major impact on VA procurement, as we reported in 2018. Thus, the availability of information about goods and services offered by veteran- owned small businesses on FSS affects whether contracting officers can use FSS as a simplified means of making purchases. However, NAC officials do not track the types of goods and services offered by veteran- owned small businesses holding FSS contracts, or which schedules have the most or least participation by these businesses. In interviews for this review and from our prior work, 10 contracting officers told us they use FSS less often than in the past. They cited the Veterans First requirement and instances where their market research showed a lack of veteran- owned small businesses holding FSS contracts. Instead, these contracting officers said, they found the goods and services they needed from veteran-owned small businesses on the open market. In addition, officials with VA’s Office of Small and Disadvantaged Business Utilization told us that that they do not analyze existing data on veteran-owned small businesses to assess these businesses’ participation in the FSS program. To conduct our own analysis, we looked at March 2019 data for the three selected VA schedules and found that goods and services provided by veteran-owned small businesses ranged from 11 to 23 percent of all the line items offered on these schedules, as shown in figure 7. According to the Standards for Internal Control in the Federal Government, program officials need quality information on how well their programs are serving end users—in this case, VHA contracting officers. Without analyzing veteran-owned small business participation in its FSS program, NAC cannot assess whether its program is meeting the needs of its users in light of the Veterans First preference, which requires contracting officers to apply the VA Rule of Two before purchasing through a non-veteran-owned business. Because the number of veteran- owned small businesses available on FSS directly affects how often contracting officers are able to use FSS, taking steps to better understand these data would enable NAC to, if necessary, make adjustments to its program to ensure contracting officers can use FSS as a regular, reliable, and simplified source for obtaining goods and services. NAC is not consistently obtaining and analyzing feedback from FSS users on their experience with the FSS program, despite having some tools in place to gather such information. To provide support to users, NAC’s website provides links to the FSS Help Desk and to a customer survey, among other contact information. However, while these tools could be used to gather feedback on whether the products and services offered on VA’s schedules meet user needs, NAC has received minimal user feedback via these tools. FSS leadership acknowledged the importance of user feedback, and stated they would like to develop a more comprehensive feedback mechanism, such as email surveys sent to users on a periodic basis with questions specific to their FSS program experience. Without such a feedback mechanism, NAC officials lack information on users’ experience with the program that could provide insights on areas for improvement. These insights, including whether program improvements are needed, are especially important given that FSS sales did not keep pace with the increased VHA spending over the past 5 years. Standards for Internal Control in the Federal Government state that, in order to formulate a strategy and achieve program objectives, management needs quality information to make informed decisions and evaluate performance. The NAC FSS program office faces numerous challenges—some of which are VA-wide issues we have identified in prior reports—including inadequate training and leadership instability. For example, NAC FSS guidance and training for contracting staff is not comprehensive, which poses a risk of inefficient use of contracting staff. Further, limited collaboration between FSS leadership at both NAC and GSA has resulted in missed opportunities to share tools and practices. These and other challenges faced by NAC were further exacerbated by a 3-year leadership gap in the FSS program; these positions have since been filled. The Federal Acquisition Regulation, along with GSA and VA’s FSS regulations and policies, form the basis for NAC’s management of the VA FSS program. NAC issues additional guidance to operationalize these higher-level policies into NAC’s FSS work processes. This internal guidance takes several forms, including Procedural Guidelines, FSS Bulletins, and Standard Operating Procedures. We found that NAC’s internal guidance does not provide contracting staff with a comprehensive overview of key aspects of their jobs, creating confusion for the staff that implements the guidance. For example, NAC contracting staff members we interviewed stated that, for offers from resellers and distributors without significant commercial sales, assessing price reasonableness was a challenge. They said NAC’s standard processes assume that commercial sales data would be available to form the foundation of price analysis, but no NAC guidance outlines how to approach this analysis for distributors and resellers that lack significant commercial sales. Additionally, several contracting staff we interviewed told us that FSS team chiefs and supervisors provide them guidance informally, which can create confusion and variation in applying requirements across the VA FSS teams. For example, one member of the contracting staff told us that some teams require vendors to submit new commercial sales data when exercising an option to extend an FSS contract. But he told us this is not the case across all of VA’s FSS teams. Standards for Internal Control in the Federal Government state that management should periodically review policies, procedures, and related control activities for continued relevance and effectiveness in achieving objectives or addressing related risks. Reviewing NAC FSS policies and procedures, including those given informally, will allow NAC FSS leadership to provide more comprehensive guidance to all FSS contracting staff on these basic, but critical, steps to help ensure an even application of the FSS offer review process. We found that training for NAC FSS contracting staff is not comprehensive, posing another challenge to NAC’s management of its FSS program; we also cited inadequate training when adding VA Acquisition Management to GAO’s High Risk list. NAC contracting staff attend training at VA’s Acquisition Academy, and several staff members we interviewed said they found it helpful. However, according to NAC officials, and based on our review of course materials and VA-wide training, the Academy does not provide FSS-specific training. There are differences between awarding and managing FSS contracts and other types of federal contracts. For instance, before awarding an FSS contract, NAC FSS contracting staff must take steps that in some cases are specific to the evaluation of FSS contract offers, such as seeking to obtain discounts from a vendor’s commercial pricelist that are equal to or greater than the discounts offered to the vendor’s most favored customer. In addition, while NAC has provided some FSS-specific training to its contracting staff, such training is not offered on a regular basis, and no overall FSS training program or curriculum exists to guide NAC training for contracting staff. According to the NAC FSS official responsible for training, the last comprehensive office-wide FSS training provided to staff was about 3 years ago (since then, 16 new contracting staff have joined NAC FSS). We interviewed 16 other NAC contracting staff, and six of them expressed the need for more extensive training on FSS-specific contracting. In mid-2018, the NAC FSS Director created Team Lead positions to help train and mentor FSS contracting staff. This effort is still in development. The NAC official responsible for training, among other things, stated that other training and mentoring efforts are underway since he joined NAC in November 2018, specifically among individual NAC schedule teams, which sometimes provide informal training to their contracting staff. However, some of these informal training efforts are not offered on a consistent basis. For example, a senior member from the contracting staff on the Medical Equipment and Supplies schedule team provided a series of training sessions to his team on evaluating offers from distributors and resellers without significant commercial sales to the general public. However, this training was not provided to all NAC FSS contracting staff, even though contracting staff working on most of the eight schedules must review offers from distributors and resellers. NAC officials are in the early stages of exploring ways to improve training for their contracting staff. In the summer of 2019, NAC officials told us they plan to post materials from all prior training on NAC’s intranet. They also developed new orientation training for the nine new contracting staff who joined NAC in July 2019, covering topics such as FSS policies and where to find them, as well as an introduction to contract systems. The NAC FSS official responsible for training emphasized that these topics were covered at a basic level and said he would like to develop more comprehensive training that would be offered on a consistent basis. Standards for Internal Controls in the Federal Government state that well- trained staff, among other things, are essential to effective program execution. In addition, GAO’s guide for assessing federal government training states that in order to ensure training is effective, training programs should be guided by an overall strategy, informed by assessing priorities and evaluating results. While NAC has taken some steps to improve training for FSS contracting staff, NAC has yet to implement a comprehensive and consistently offered FSS training curriculum. Doing so could enable NAC to provide its staff with the tools and clarity needed to perform their roles and increase efficiency. We found that NAC faces challenges effectively collaborating with GSA, the agency that oversees all FSS for the federal government. GSA has longstanding processes and established tools—such as its use of analysts to review vendors’ internal controls, as well as its automated offer-intake system—stemming from its decades of experience running an FSS program that is larger than VA’s program. However, collaboration and knowledge-sharing between NAC and GSA is limited. For example, in the past, NAC and GSA held meetings quarterly, but since 2015, these meetings have been held on an ad hoc basis. Neither organization took action until recently to ensure that meetings continued at regular intervals. GSA officials told us that during 2016 through 2018, they met with NAC a number of times in response to questions from NAC FSS officials. However, these meetings covered general policy questions, and according to NAC, did not focus on discussing cross-agency roles and responsibilities or on sharing practices for managing the FSS program. Separately, VA Office of the Inspector General’s Office of Contract Review officials told us of a 2010 working group formed to collaboratively discuss revisions to GSA’s regulations, which included representatives from GSA, NAC, the VA Office of the Inspector General, and others. According to these VA Inspector General officials, this group was disbanded about a year after it began due to disagreements among the participants. Upon NAC’s FSS Director’s request, in February 2019, NAC and GSA resumed quarterly meetings. However, NAC officials noted instances where collaboration is still limited. For example, GSA did not provide NAC officials with advance notice about the publication of a final rule establishing changes to GSA’s FSS regulations that were relevant to NAC’s administration of its FSS program. NAC discovered the final rule had gone into effect after it was published, independent of any communication from GSA. NAC officials stated they would like to have additional opportunities for input on GSA regulations that affect the VA FSS program. Our prior work has found that clearly defining roles and responsibilities is a key practice for cross-agency collaboration. Without a clear and shared understanding of their respective responsibilities, and processes to ensure they share tools and practices, NAC will not have the opportunity to learn from GSA’s experience or have timely input on GSA actions that affect the VA FSS program. GSA and VA are also missing a document—namely, GSA’s updated delegation of authority to VA—that could guide their collaboration efforts. This delegation should state what authority is granted to VA, and cite the limitations on that authority. We found a January 2008 Federal Register notice mentioned a 2004 update to the delegation, but the GSA Director of Policy for the Federal Acquisition Service was unable to locate or provide this update. VA was also unable to locate a copy of the 2004 update. Instead, GSA and VA gave us a number of documents, including memorandums and other communications that spanned from the 1960s to the 1990s. The documents were fragmented and outdated. Further, many of these older documents referred to outdated laws, regulations, or organizations, raising questions about their current applicability. Standards for Internal Control in the Federal Government state that the roles of those responsible for carrying out programs should be clearly outlined in policy, and GAO has also reported that written guidance and agreements on collaboration are key features of successful cross-agency collaboration. The lack of current documentation related to GSA’s delegation to VA, alongside the limitations in NAC and GSA communication, undermine a firm foundation on which to build collaboration. Without a clear delineation of roles and responsibilities—and effective overall coordination—NAC and GSA risk misunderstandings and missed opportunities to share information and tools that could improve NAC’s management of the VA FSS program. From 2015 until 2018, senior VA FSS leadership positions were vacant, which affected VA’s FSS program management and directly contributed to many of the challenges we identified above. Namely, the FSS program director position was vacant for over 2 years and the role of FSS Program Management and Resource Support team chief was vacant for about 19 months. During that time, chiefs of individual VA schedules held the Director or Chief positions on an acting and rotational basis. During these rotations, these chiefs were dual-hatted as they maintained responsibility for their primary job role. The Associate Executive Director of the NAC stated that he was reluctant to make long-term, strategic policy decisions while the FSS Director position was vacant. In late 2017 and late 2018, respectively, NAC permanently filled these two FSS program positions. However, by then, broader changes had taken place within VA contracting that affected the VA FSS program: namely, the Supreme Court ruled in 2016 that before VA may contract with a non-veteran-owned business, VA must apply the “VA Rule of Two,” including instances when VA makes purchases through FSS. Also in late 2016, VA launched the MSPV-NG program, which offers items similar to those items offered on two VA schedules. Figure 8 provides a timeline of these FSS leadership vacancies and events. Although both of these leadership positions have since been filled, the effect of the gaps is still evident in some cases. According to NAC FSS officials, hiring to fill open FSS contracting staff positions was slowed by the leadership gaps, which added to workload pressures; more contract offers were received than completed in fiscal years 2015 and 2016, creating a backlog. Contracting staff workload is a VA-wide issue we previously identified, and is one of the areas of concern we cited in adding VA Acquisition Management to GAO’s High Risk List in 2019. In late 2018, the FSS Director sought approval for 10 additional contracting staff; 9 of these positions were filled in July 2019. NAC leadership stated that these positions should help address some of the backlog faced by FSS contracting staff. NAC has experienced major delays in awarding vendor contracts and missed its timeliness goal for contract award 75 percent of the time from fiscal years 2014 through 2018. NAC’s inefficient offer intake system and fragmented vendor guidance likely contributed to these delays. NAC FSS leadership has acknowledged these challenges and is working to address some of them. Assessing the appropriateness of these timeliness goals and taking steps to comprehensively identify and address barriers to achieving them will better position NAC’s contracting workforce to improve contract award timeliness. Our analysis shows that from fiscal years 2014 through 2018, NAC did not meet its timeliness goals for 75 percent of its FSS contract awards. To do this analysis, we compared NAC FSS contract award data for the eight non-pharmaceutical schedules against the timeliness goal of 180 calendar days for contracting staff reviews and decisions on vendor contract awards, as set forth in a NAC Procedural Guideline. Specifically, we found that 319 of the 803 FSS contract awards took at least double the 180-day goal. In addition, 12 of them exceeded the goal by more than 1,080 days—six times the goal. During fiscal years 2015 and 2016, the program accumulated a backlog of FSS offers, which coincided with a vacancy in the FSS Director position starting in October 2015. While NAC staff made some progress on mitigating this backlog, timeliness remains an issue. For example, during fiscal year 2018, NAC missed its timeliness goal 73 percent of the time. Figure 9 portrays NAC’s timeliness of FSS contract awards over this 5-year period. We also analyzed the timeliness of awards for the three selected VA schedules from fiscal years 2014 through 2018, as shown in figure 10. This analysis shows that NAC consistently missed its timeliness goals across the three different schedules. However, for contract modifications—typically changes to contract items or prices—NAC met its timeliness goal—set at 60 calendar days—80 percent of the time over this 5-year period. We reviewed data on about 14,000 modifications executed by NAC for the eight non-pharmaceutical schedules from fiscal years 2014 to 2018. About 2,300 of these modifications were executed to add new items to existing contracts. For these, NAC met the timeliness goal only 54 percent of the time. The ability to quickly add new items to FSS contracts is important to ensure that agency users have access to up-to-date medical supplies and services through the VA FSS program. These timeliness goals apply across all of NAC’s eight non- pharmaceutical schedules, regardless of how complex a contract award or modification might be. Various factors can affect contracting staff’s ability to meet these goals, including the complexity of the award, staff’s workload, and whether or not vendor documentation is complete. NAC FSS leadership has acknowledged these challenges and is working to address some of them. However, NAC has not assessed if the current timeliness goals are appropriate, or performed a comprehensive assessment of the barriers that prevent FSS contracting staff from achieving timeliness goals. Standards for Internal Control in the Federal Government state the importance of management making well-informed decisions and conducting meaningful evaluations of their organization’s performance. Assessing the appropriateness of current timeliness goals and taking steps to comprehensively identify and address barriers to achieving them will better position NAC contracting staff to meet these goals. Moreover, timelier contract awards enable medical centers to obtain needed goods and services and, as a result, help FSS to remain useful to medical centers. When seeking a VA schedule contract award, NAC processes require vendors to submit an offer and required documents. Because NAC’s offer intake system is not automated, NAC officials must manually check a general FSS email inbox for vendor submissions and manually review the vendor’s offer and required documents to determine if all information is included. Further, there are no automated checks for completeness of vendor documentation. We analyzed a non-generalizable sample of 26 selected FSS contracts awarded beginning in fiscal year 2014 through January 2019 on three schedules—Medical Equipment and Supplies, Patient Mobility, and Healthcare Staffing—and found that in 14 instances, VA contracting staff identified incomplete documentation and had to follow up with the vendors to receive revisions. NAC officials told us that tracking vendor offers and associated documents from email is cumbersome and time consuming because they have to sort through several separate vendor email messages to splice together vendor offer submissions, due to file size limitations. The inefficient offer intake process also led to delays in assigning offers to contracting staff. NAC did not always assign offers to contracting staff immediately after vendor submission, delaying the start of work. Our review of 26 selected VA FSS contract files identified 10 instances where NAC took more than 20 days after receipt to assign the offer to contracting staff. NAC officials told us that these delays were caused by both the non-automated offer-intake process as well as the team chiefs’ lack of time to assign these offers to contracting staff for their review. According to the FSS Director, in mid-2018 he created a team lead for each NAC schedule team to assign offers to contracting staff and monitor these offers to better ensure timeliness. Figure 11 summarizes key steps in NAC’s FSS manual offer intake and award process, as described by FSS contracting officials. In contrast to VA’s manual system, since 2004, GSA has used an online system called eOffer to manage its FSS offer intake process. This system includes automated system checks to ensure documentation is complete before it is submitted by vendors. Once offers are submitted, supervisors in GSA FSS offices review offers in the system and assign them to contracting staff for review. We have not evaluated whether the eOffer system increases efficiency or reduces errors in submitted offers, but, according to GSA officials, eOffer achieves efficiency and accuracy due to the automated checks that will not let vendors submit an incomplete offer package. NAC contracting staff told us that they could benefit from a more efficient system to accept offers from vendors. In late 2018, NAC and GSA discussed the possibility of adopting GSA’s eOffer online system, as well as its companion eMod, which is used to process modifications. In November 2018, GSA’s estimate to add VA to the system was about $9 million for the first year, and nearly $8 million annually thereafter, which, according to NAC’s FSS Director, is cost-prohibitive. GSA officials told us that to determine this cost, they compared the number of NAC FSS contracts to the number of GSA FSS contracts, and apportioned 10 percent of the overall system development and operation cost to VA. Despite the cost of GSA’s systems, if VA does not address limitations in its own manual offer-intake process, such as implementing a system that can provide automated checks for completeness, delays in assigning offers to contracting staff will continue. Further, FSS contracting staff will continue to spend additional resources and time to gather and complete offer documentation before they can determine whether to award the contract. We also reviewed NAC’s website and found that guidance for vendors was fragmented. Pieces of guidance were spread out among a number of documents as opposed to being located in one document or section of the website for vendors to easily locate. This also contributes to vendors submitting incomplete offer documentation, which, in turn, contributes to delays in contract awards. Incomplete documentation for pricing and sales data is particularly common—namely, information that enables contracting staff to compare the prices vendors offer the government and commercial customers for the same goods. As stated in Standards for Internal Control in the Federal Government, clear communication with outside parties, like vendors, is essential to ensuring that NAC is able to help achieve its program objectives. Clearer guidance would provide vendors with a reminder of program requirements that could reduce VA FSS contracting staff review time and improve their efficiency in reviewing contract offers. Over the past few years, the FSS and MSPV programs have transitioned from functioning together to existing as separate programs serving similar VA medical center needs. However, VA leaders have not assessed if the overlapping offerings are a necessary and effective use of resources, or allow VA to fully leverage its buying power—a stated goal of both the MSPV-NG and FSS programs. As we reported in November 2017, for over a decade, VA’s medical centers used VHA’s legacy MSPV program to order medical supplies—many of which were purchased using NAC’s FSS program. When VHA transitioned to its MSPV-NG program in late 2016, it significantly narrowed the catalog to 6,000 items, and VHA contracting officials told us that they modified the contracting approach in March 2018 to have the prime vendor supply the items directly, separate from FSS. At the outset, VHA set goals for the MSPV-NG program, including standardization of requirements for supply items and cost avoidance by leveraging VA’s substantial buying power. However, the MSPV-NG program recently revised its goals from focusing on standardization to increasing the number of catalog items available for medical centers’ use—the catalog contains more than 20,000 items as of September 2019. We compared the MSPV-NG catalog to the VA Medical Equipment and Supplies schedule to determine whether they offered similar products, and found overlap. For example, we found that as of June 2019, about two-thirds (139 of 206) of the MSPV-NG catalog suppliers also offered items on the Medical Equipment and Supplies schedule. Also, in March 2019, NAC FSS leadership provided analysis to the MSPV-NG program office showing that 41 percent of items that the MSPV-NG program planned to include in an update of the MSPV catalog were already available under VA FSS contracts. This duplication could result in inefficiencies whereby different sets of contracting staff within the FSS and MSPV-NG programs award, modify, and manage contracts for the same or similar medical supplies for VA medical center use. The MSPV-NG program office is currently developing the next iteration of the program, called MSPV 2.0, which it plans to roll out in February 2021. In April of 2019, a senior VHA procurement official announced at a vendor forum that the VA FSS program would be used as a source for its MSPV 2.0 supply catalog. However, in June of 2019, MSPV-NG program officials and VHA procurement leadership told us they decided against using FSS for this purpose and provided several reasons for this decision. First, these officials stated that FSS was not comprehensive enough to fulfill the MSPV 2.0 catalog; as noted above, FSS could provide about 40 percent of needed items. These officials also stated that the effort needed to create new FSS contracts or add new items to existing VA FSS contracts to fulfill the remaining 60 percent of the required MSPV 2.0 catalog would be too time consuming. Further, these officials also stated that there were not enough veteran-owned small businesses that offer items on VA FSS to support the MSPV 2.0 requirements. They stated this could result in extra time and resources to solicit both within FSS and the open market to ensure that they meet the VA Rule of Two. NAC FSS leaders told us that they communicated their willingness to support the MSPV 2.0 program by offering to work with vendors to quickly add the needed items; however, the MSPV-NG program office did not involve them in their final decision not to use FSS as a source for the MSPV 2.0 program. VA procurement leaders have informally discussed the future of the FSS program, according to a senior VHA procurement official. According to this official, VA has not determined whether it will change the strategy for FSS, or if the duplication between the FSS and MSPV-NG programs is a necessary and efficient use of resources. VA’s Strategic Plan for Fiscal Years 2018-2024 calls for related efforts to be coordinated with each other to achieve cross-organizational unity of purpose. When adding VA Acquisition Management to our High Risk List in March of 2019, we reported that VA lacks an effective medical supplies procurement strategy. While this finding stemmed from our review of VA’s MSPV-NG program and was related to the recommendation that VA develop an overarching strategy for this program, the same applies for VA’s FSS program in that VA does not have a strategic approach for its procurement of medical supplies through these two programs. Further, we reviewed VHA’s Modernization Campaign Plan, dated March 2019, and VHA’s Modernization Plan briefing slides, dated October 2019, which describe several modernization initiatives. One of these initiatives is to transform the supply chain through modernization. This modernization plan includes the planned MSPV 2.0 program and VA’s planned changes to its supply chain management system; however, it does not include FSS. As VA is undertaking these efforts, it is unclear how and whether FSS fits into VA’s vision of a modernized supply chain. Taking steps to assess VA FSS and MSPV program duplication will allow VA to determine if it is efficiently using its contracting staff. Moreover, communicating its decision to managers of these two programs will allow these managers to focus and coordinate their resources accordingly. This assessment will also help VA determine if it is leveraging its buying power to improve the effectiveness and efficiency of services for veterans and their families. The continued utility of parts of VA’s FSS program is in question amid flat sales in recent years and competing programs available to medical center staff for supplies, such as MSPV-NG. VA has the opportunity to improve its FSS program by ensuring that it has complete vendor sales data and better information on participation by veteran-owned small business and user experiences. Obtaining such information would enable NAC to ensure it is collecting all fees it is owed which support program operations, and ensure that FSS can remain a regular, reliable and simplified source for contracting officers to obtain goods and services on behalf of the medical centers. Other steps are necessary, however, to address challenges VA faces with its FSS program. Specifically, the FSS program needs to provide comprehensive guidance and training to its contracting officers, and assess timeliness goals and barriers to achieving these goals to ensure the program remains useful to customers—namely medical centers that rely on the goods and services provided by FSS. In working to improve its FSS program, NAC has the opportunity to gain insights and experience from GSA on how it manages its much larger schedules program. However, lack of collaboration between GSA and NAC has resulted in missing opportunities for such information sharing. Finally, both VA’s FSS and MSPV-NG programs support VA’s overall medical supply chain, yet VA has not assessed whether duplication between them is a necessary and effective use of resources. Without this assessment, VA could be missing opportunities to leverage buying power and improve efficiency in procuring goods and supplies for its medical centers. We are making a total of 11 recommendations, including nine to VA and two to GSA: The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC puts controls in place to better ensure the completeness of vendor FSS sales reporting. (Recommendation 1) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC assesses data on the participation of and items and services offered by veteran-owned small businesses in NAC’s FSS program, in order to determine whether their program is meeting the needs of VHA contracting officers who use it given the Veterans First requirements they must meet. (Recommendation 2) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC directs the FSS Director to develop a mechanism to consistently obtain and analyze VHA user feedback on the FSS program. (Recommendation 3) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC provides FSS contracting staff with comprehensive FSS guidance. (Recommendation 4) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC develops an FSS-specific training program to include essential skills and processes to meet ongoing training needs for new and existing contracting staff. (Recommendation 5) The Administrator of GSA should work with the Secretary of VA to develop a memorandum of understanding outlining the roles and responsibilities of GSA and NAC for collaborating under GSA’s delegation of authority to VA for the healthcare-related Federal Supply Schedules, including the processes through which the two organizations will coordinate and share useful tools and practices. (Recommendation 6) The Secretary of Veterans Affairs should work with the Administrator of GSA to develop a memorandum of understanding outlining the roles and responsibilities of GSA and NAC in collaborating under GSA’s delegation of authority to VA for the healthcare-related Federal Supply Schedules, including the processes through which the two organizations will coordinate and share useful tools and practices. (Recommendation 7) The Administrator of GSA should take steps to document its delegation of authority for the healthcare-related Federal Supply Schedules to VA. (Recommendation 8) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s NAC assesses the appropriateness of NAC’s current timeliness goals for FSS contract awards and takes steps to comprehensively identify and address barriers to achieving them. (Recommendation 9) The Secretary of Veterans Affairs should ensure that the Associate Executive Director of VA’s National Acquisition Center takes measures to ensure greater efficiency in the offer-intake process, such as providing additional guidance for vendors or by adopting a system that includes checks for completeness of required vendor documentation. (Recommendation 10) The Secretary of Veterans Affairs should take steps to assess duplication between VA’s FSS and MSPV programs, to determine if this duplication is necessary or if efficiencies can be gained. (Recommendation 11) We provided a draft of this report to the Department of Veterans Affairs and to the General Services Administration for review and comment. In VA’s comments, reproduced in appendix II, it concurred with all of our nine recommendations. In GSA’s comments, reproduced in appendix III, it concurred with our two recommendations. We are sending copies of this report to the appropriate congressional committees. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of the Department of Veterans Affairs and the Administrator of the General Services Administration. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by email at oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report assesses: (1) what is known about the Department of Veterans Affairs’ (VA) use of its Federal Supply Schedule (FSS) program for fiscal years 2014 through 2018; (2) challenges the National Acquisition Center (NAC) faces in effectively managing the FSS program, (3) the extent to which NAC awarded FSS contracts in a timely manner from fiscal years 2014 through 2018, and (4) the extent to which FSS and the Medical-Surgical Prime Vendor-Next Generation (MSPV-NG) programs provide overlapping or duplicative offerings. To assess what is known about VA’s use of its FSS program from fiscal years 2014 through 2018, we analyzed quarterly vendor sales report data provided by NAC. To assess the reliability of these data, we reviewed documentation and other information on the internal controls of the data systems used by NAC to collect and verify VA FSS sales reports. We found these data to be sufficiently reliable for analyzing overall trends in sales on VA’s FSS for this time period. We also obtained contracting data from the Federal Procurement Data System-Next Generation (FPDS-NG) for fiscal years 2014 through 2018, as well as a listing of VA FSS contracts active during that period from NAC. We used these data to analyze contract obligations on VA FSS contracts over this time period. Further, we compared total obligations based on FPDS-NG data to vendor-reported sales data provided by NAC by schedule and fiscal year. We found the FPDS-NG data sufficiently reliable for our purpose of comparing reported obligations to vendor sales data. We also used information obtained from a prior GAO review of VA’s Veterans First Program when discussing FSS use and used Standards for Internal Control in the Federal Government as criteria to assess this use. We selected the Medical Equipment and Supply (65IIA), Patient Mobility (65IIF), and Healthcare Staffing (621I) schedules as the focus of our review, based on total number of active contracts; they collectively represented about two-thirds of the approximately 1,700 active VA FSS contracts at the time we began our review. We excluded the pharmaceutical schedule from our review because, unlike the other schedules, orders are placed almost exclusively through the pharmaceutical prime vendor, and participation is a statutory requirement. We also reviewed and compared VA, Veterans Health Administration (VHA), and General Services Administration (GSA) policies, guidance, and memorandums related to the program and interviewed VHA- and VA- wide procurement officials regarding factors that affect use of the VA schedules, including the Veterans First program. We also analyzed data on items offered by vendors on the three selected schedules to determine the percent of items offered by veteran-owned small businesses. We interviewed VHA contracting staff and supply chain logistics staff at VA medical centers—users of the program—on factors that affect their use of FSS. We conducted site visits at a non-generalizable selection of two Veterans Integrated Service Networks (VISNs), visiting one medical center within each. Additionally, we interviewed Network Contracting Office (NCO) officials within each selected VISN, either in person or via telephone: VISN 12: VA Great Lakes Health Care System Clement J. Zablocki VA Medical Center (Milwaukee, Wisc.) Great Lakes Acquisition Center, NCO 12 (Milwaukee, Wisc.) VISN 10: VA Healthcare System Cincinnati, Ohio VA Medical Center NCO 10 (via telephone) We selected VISNs and medical centers primarily based on geographical proximity to NAC and GAO offices, as well for higher total obligations in fiscal year 2018. At each selected medical center, we interviewed the Facility Chief Supply Chain Officer and other members of the logistics staff. At each selected NCO, we interviewed leadership, branch chiefs, and contracting officers on teams that cover goods and services included on the three VA schedules we selected. Separately, we also spoke with representatives of the Coalition for Government Procurement, a group representing a number of FSS vendors, and attended a conference for vendors organized by NAC. To assess challenges NAC faces in effectively managing the FSS program, we reviewed GSA and VA procurement regulations, policies, and guidance as well as NAC FSS guidance. We analyzed the content of training offered by the Veterans Affairs Acquisition Academy and by NAC FSS. We also reviewed systems and processes used by NAC FSS staff to accept and review FSS offers and award contracts. We also interviewed NAC FSS leadership, contracting staff, and other staff regarding management of the FSS program during a site visit to NAC. We obtained and analyzed information on NAC FSS staffing, including leadership vacancies. We obtained documentation on analogous GSA practices for managing its FSS program, as well as documents delegating management of healthcare-related schedules to VA. We also interviewed officials in GSA’s Federal Acquisition Service who are responsible for overseeing its FSS program. To determine the extent to which NAC met its timeliness goal for processing FSS offers and modifications, we analyzed timeliness data collected by NAC for fiscal years 2014 through 2018, for the eight non- pharmaceutical schedules; we also performed limited analysis of timeliness for the pharmaceutical schedule, and additional analysis for our three selected schedules. We focused our analysis of timeliness on offers resulting in a contract award, because these are the cases that are relevant to users of the FSS program. To provide context for overall workload, we also analyzed timeliness for offers that were withdrawn, or where contracting staff decided not to make an award. We excluded offers that were reviewed by the VA Inspector General, Office of Contract Review, from our overall timeliness analysis because NAC policy does not count the time required for these reviews against its timeliness goal. To assess the reliability of timeliness data, we collected information on the system and processes used to maintain the data, performed electronic testing, and compared reported dates to source documents for selected contracts. We found these data sufficiently reliable for the purpose of assessing overall performance and trends in NAC FSS timeliness. From the three selected schedules, we selected a non-generalizable sample of 26 NAC FSS contracts awarded in fiscal years 2014 through January 2019. Eight of the contracts were randomly selected from all active contracts on the three schedules as of January 2019, while the remaining 18 contracts were selected by stratified random sample of contracts awarded in fiscal year 2018, focusing on those which exceeded the 180-day timeliness goal and omitting those with few or no sales. Thirteen of the contracts were under the Medical Equipment and Supplies schedule, seven of the contracts were under the Healthcare Staffing schedule, and the remaining six were under the Patient Mobility schedule. For each selected contract, we reviewed documents in the contract file; we also interviewed cognizant members of the contracting staff for 16 of the contracts. We selected this non-generalizable sample to provide illustrative examples of process steps and factors affecting timeliness; it was not the sole source of our findings on factors contributing to timeliness, which also included analysis of policies, guidance, and data, and interviews with NAC officials. To assess the extent to which the FSS and MSPV-NG programs provide overlapping or duplicative offerings, we reviewed policy and guidance related to both programs and interviewed VHA- and VA-wide procurement leaders. To assess the extent of overlap between the MSPV-NG and VA FSS catalogs, we also analyzed data on the items available through MSPV-NG and VA FSS, as well as the vendors participating in each, to assess extent of duplication. We interviewed VA officials from NAC, the Office of Acquisition and Logistics, the Strategic Acquisition Center, and VHA regarding the relationship between MSPV-NG and the FSS program. We analyzed policies related to these programs that affect management and use of VA FSS, and interviewed VA officials about their impact. We also reviewed documents and interviews with MSPV program office staff from an ongoing GAO review of the MSPV program. We used information obtained from an ongoing GAO review as well as published GAO reports on VA’s MSPV-NG program. Finally, we reviewed documents, including VA’s 2018-2024 Strategic Plan and VHA supply chain modernization plans. We conducted this performance audit from November 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Shelby S. Oakley, 202-512-4841 or oakleys@gao.gov. In addition to the individual named above, Lisa Gardner, Assistant Director; Teague Lyons, Analyst-in-Charge; Erin Stockdale; Sarah Amer; Maurice Robinson; Emily Bond; Rashmi Agarwal; Andrew Burton; Virginia Chanley; Matthew T. Crosby; Susan Ditto; Lori Fields; Gina Flacco; Suellen Foth; and Alyssa Weir made key contributions to this report.", "summary": "Through the FSS program, VA manages nine healthcare-related schedules—groups of contracts used to order medical supplies and services—under authority delegated by GSA. VA's FSS program management, including the speed with which it adds new contracts, affects VA medical centers' ability to use it to easily obtain goods and services. Further, recent changes in VA's medical procurement have also raised questions about the future role of the program. GAO was asked to examine VA's management and use of its FSS program. This report assesses (1) what is known about VA use of its FSS program for fiscal years 2014-2018; (2) program management challenges faced by NAC; (3) the extent to which NAC awarded FSS contracts to vendors in a timely manner from fiscal years 2014-2018; and (4) the extent to which the FSS and MSPV-NG programs provide overlapping or duplicative offerings. GAO reviewed eight VA schedules, excluding pharmaceutical due to the use of a prime vendor, among other things. GAO also analyzed three of these schedules representing about two-thirds of VA's FSS contracts; analyzed policies, guidance, and processes; and interviewed senior VA procurement, contracting, and supply chain logistics staff at NAC and two medical centers. Over the past 5 years, Department of Veterans Affairs (VA) medical spending increased, but spending on its eight non-pharmaceutical Federal Supply Schedules (FSS) was flat. GAO found the vendor-submitted sales reports to be sufficiently reliable for describing these trends. However, GAO found that VA's National Acquisition Center (NAC)—the VA-wide contracting organization responsible for FSS—lacks controls to ensure the completeness of vendor sales data, which is used to calculate fees that finance the program. The FSS program faces numerous challenges. For instance, NAC FSS guidance and training are not comprehensive, posing a risk of inefficiency and uneven application of requirements by contracting staff. Limited collaboration between FSS leadership at both NAC and the General Services Administration (GSA) also resulted in missed opportunities to share tools and practices. A 3-year FSS leadership gap further exacerbated challenges; these positions are now filled. NAC also failed to meet its 180-day timeliness goal for 75 percent of the non-pharmaceutical FSS contracts it awarded from fiscal years 2014 through 2018 (see figure), though NAC met its goal for contract modifications 80 percent of the time. By assessing timeliness goals and identifying barriers to achieving them, NAC leadership can take steps to better enable its contracting workforce to provide an efficient and reliable means to obtain needed goods and services through FSS. Moreover, VA's procurement leaders have not assessed, and communicated to program managers, whether the duplication between FSS and the Medical Surgical Prime Vendor-Next Generation (MSPV-NG) program is a necessary and effective use of resources. These two programs feature many of the same items, and different contracting staff manage different contracts for the provision of the same or similar medical supplies for VA medical centers. Without assessing duplication between these two programs, VA is at risk of inefficient use of its contracting workforce, and may be unable to fully leverage its buying power. GAO is making 11 recommendations: nine to VA and two to GSA; including that VA provide comprehensive guidance and FSS-specific training, improve NAC and GSA collaboration, evaluate timeliness goals and barriers, and assess FSS and MSPV-NG program duplication. VA and GSA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Since 2008, both the number of pedestrian fatalities and the share of pedestrian fatalities as a percentage of overall highway fatalities have increased (see fig. 1). In 2008, pedestrian fatalities represented about 12 percent of overall highway fatalities, while in 2018 they represented about 17 percent. In addition to fatalities, the estimated number of pedestrians injured in crashes has increased from about 71,000 in 2008 to about 79,800 in 2018. A range of factors can influence pedestrian fatalities including exposure of pedestrians to crashes, roadway characteristics, and driver and pedestrian behavior. According to DOT officials, there is little nationwide information about pedestrian exposure to potential crashes and that data may be more available on the state or local level. Some national data, however, shows that there may have been some change in people walking. For example, the U.S. Census Bureau’s American Community Survey estimated that in 2018, 4 million people reported walking to work compared with an estimated 3.8 million people in 2010. Regarding roadways, in 2018 the National Transportation Safety Board (NTSB) reported that most pedestrian fatalities occur in urban areas on principal arterial roads that carry high volumes of traffic, traveling at the highest speeds. In 2015, we noted that behavior such as distracted driving, walking, and cycling may contribute to pedestrian and cyclist fatalities. When drivers and pedestrians use cell phones or are otherwise distracted, they may be less aware of their surroundings and more likely to be involved in a crash. Finally, NHTSA data shows that most pedestrian fatalities occurred after dark and at places other than intersections. Specifically, in 2018, of the 6,300 reported fatalities, over 4,700 pedestrians (about 75 percent) were killed after dark and about 4,600 pedestrians (about 73 percent) were killed at non-intersection locations. See appendix II for additional information on pedestrian fatalities from 2008 through 2018. Automakers have developed vehicle features intended to avoid pedestrian crashes and mitigate the extent of injury to pedestrians. Crash avoidance features (also known as “active” safety features) rely on cameras, radar, and other devices to detect a pedestrian and then act to alert a driver to take action, or automatically apply a vehicle’s brakes to slow or stop the vehicle to avoid striking a pedestrian (see fig. 2). One pedestrian crash avoidance system is referred to as pedestrian automatic emergency braking, which uses a camera, radar, or a combination, to automatically apply brakes to avoid a collision. Crash mitigation features (also known as “passive” safety features) generally involve the use of pedestrian-friendly vehicle components that are designed to reduce the severity of injuries should a pedestrian be hit. Passive safety features can include energy absorbing bumper material, hoods that provide space between the hood and the hard components in the engine compartment, and contoured vehicle front-ends intended to reduce harm to pedestrians (see fig. 3). In executing its mission, NHTSA administers NCAP and issues federal motor vehicle safety standards (FMVSS) and the federal bumper standard, among other things. In general, NCAP tests supplement safety standards established in law or regulation. NCAP. Created in 1978, this program tests new vehicles to determine how well they protect drivers and passengers during a crash (front and side) and how well vehicles resist rollovers. NHTSA tests and rates vehicles using a five-star safety rating system with five stars being the highest safety rating and one star the lowest. NHTSA communicates the results of its vehicle tests through window labels on new vehicles and on its website. In 2010, NHTSA also began recommending various safety technologies for consumers to consider when purchasing vehicles. Recommended technologies include such things as forward collision warning (an alert that warns drivers to brake or steer to avoid a crash if they are too close to a car in front of them); lane departure warning (an alert that warns drivers of unintentional lane shifts); and automatic emergency braking, which can automatically activate a vehicle’s brakes if a driver takes no action to avoid an imminent crash with a preceding vehicle. NHTSA has not yet included pedestrian automatic emergency braking systems as recommended technologies. Recommended technologies are not included in star ratings, but rather are features NHTSA believes consumers may wish to look for in new vehicles. Pedestrian safety tests are not currently part of NCAP. FMVSS. These are minimum performance standards established in regulation for new motor vehicles and items of motor vehicle equipment. According to NHTSA officials, FMVSS have test procedures and performance criteria with minimum thresholds for motor vehicles and motor vehicle equipment, such as minimum light intensity requirements for headlamps. Bumper standard. In addition, while not in the FMVSS, NHTSA’s bumper standard prescribes performance requirements in regulation for passenger cars in low-speed front-end and rear collisions. According to NHTSA officials, the bumper standard is intended to prevent damage to the car body and safety related equipment at speeds equivalent to a 5 miles-per-hour (mph) crash into a parked vehicle of the same weight. The standard applies to front and rear bumpers on passenger cars, but not to other multipurpose passenger vehicles, such as SUVs, minivans, or pickup trucks. The United States is also involved with pedestrian safety internationally. In June 1998, the United States signed an international agreement administered by the United Nations concerning the establishment of global technical regulations for motor and other wheeled vehicles. The purpose of the agreement was to establish a global process for jointly developing technical regulations regarding such things as safety, environmental protection, and energy efficiency of vehicles. As part of this agreement, in 2008, Global Technical Regulation No. 9 was established to improve pedestrian safety by requiring vehicle hoods and bumpers to absorb energy more efficiently when impacted in a vehicle-to-pedestrian collision. This international standard has two sets of performance criteria: head impact requirements that ensure vehicle hoods provide protection to a pedestrian’s head when impacted; and leg protection requirements for the front bumper that would require bumpers to subject pedestrians to lower impact forces. According to NHTSA, as a signatory to the 1998 agreement, the United States is obligated to consider adopting global technical regulations, but is not obligated to adopt them. NHTSA officials told us the agency has not yet initiated the rulemaking process for Global Technical Regulation No. 9. Although pedestrian safety testing is not currently a part of the U.S. NCAP, it is a part of similarly established new car assessment programs in other countries. For example, since 2016 both the European New Car Assessment Programme (Euro NCAP) and a program in Japan (known as the Japan New Car Assessment Program (JNCAP)) have tested vehicle pedestrian crash avoidance systems using a variety of scenarios and vehicle speeds. Euro NCAP tests include an adult dummy walking or running perpendicular to a test vehicle and walking parallel to a vehicle. Tests are also conducted with a child dummy running out from parked cars (see fig. 4). Euro NCAP tests are also conducted in daylight and at night. In the United States, two nongovernmental organizations have also conducted pedestrian safety testing. IIHS began a program to test pedestrian crash avoidance systems on 2018 and 2019 vehicles, and in 2020 began using the results to help determine its Top Safety Pick awards. The American Automobile Association (AAA) also recently conducted tests of crash avoidance systems. Moreover, crash mitigation tests that measure the potential for head and leg injuries resulting from pedestrian-motor vehicle crashes have been in place for many years in Europe and Japan. Euro NCAP began head and leg testing in 1997 and Japan began pedestrian head protection testing in 2003 and pedestrian leg protection testing in 2011. In general, these tests launch projectiles designed to simulate a person’s legs or head into various locations on a vehicle’s hood and bumper to assess the effectiveness in limiting pedestrian injury (see fig. 5). We found that several vehicle characteristics including the age and body type of the vehicle and the speed at which the vehicle was being driven at the time of the crash are associated with the increase in pedestrian fatalities from 2008 through 2018. However, NHTSA lacks complete data on the relationship between vehicle characteristics and pedestrian injuries, including detailed information on injury type and severity. Although NHTSA initiated a pilot program to improve its data collection protocol for pedestrian injuries, NHTSA lacks a plan for this program to evaluate its results and determine whether and how it should be expanded. Through FARS, NHTSA annually collects and analyzes data on all crashes involving pedestrian fatalities, including vehicle-related characteristics. Based on these data and relevant research, we analyzed the relationship between pedestrian fatalities and the age, body type, and speed of vehicles. Our analysis of FARS data shows that from 2008 through 2018, the number of pedestrian fatalities increased more for crashes involving vehicles that were: 11 years old or older (123 percent increase) compared with newer vehicles (9 percent increase); SUVs (68 percent increase) compared with other light trucks (25 percent increase), and passenger cars (47 percent increase); and traveling at reported speeds 31 mph and above (45 percent increase), compared to vehicles traveling at lower speeds (28 percent increase). The number of pedestrians struck and killed by vehicles 11 years old or older (older vehicles) increased more relative to the number of pedestrians struck and killed by vehicles 10 years old or newer (newer vehicles). In 2008, 1,139 pedestrian fatalities involved older vehicles, which represented about a quarter (26 percent) of reported pedestrian fatalities (see fig. 6). By 2018, that number more than doubled to 2,537 pedestrian fatalities, or 40 percent of reported pedestrian fatalities. Over that same time period, the number of pedestrian fatalities involving newer vehicles also increased from 2,800 in 2008 to 3,044 in 2018. However, this increase was less than fatalities involving older vehicles, and the overall share of pedestrian fatalities involving newer vehicles decreased from 63 to 48 percent over that period. The rise in the number of older vehicles involved in pedestrian fatalities may reflect the rise in the average age of vehicles in operation. According to data from DOT’s Bureau of Transportation Statistics, the average age of all vehicles in operation in the United States increased by about 1.5 years from 10.1 years old in 2008 to 11.7 years old in 2018. In comparison, the average age of passenger vehicles that struck and killed pedestrians increased by roughly 2 years from 8.1 years in 2008 to 10 years in 2018. Another possible contributing factor to the increased share of pedestrian fatalities resulting from crashes with older vehicles may be the prevalence of safety features in newer vehicles compared with older vehicles. As discussed below, vehicle manufacturers are offering new vehicles with pedestrian safety features such as pedestrian crash avoidance and crash mitigation systems, which may reduce pedestrian injuries and fatalities. The number of pedestrian fatalities where passenger cars, SUVs, or other light trucks were reported as striking vehicles all increased from 2008 to 2018 (see table 1). However, the number of SUVs involved in fatal pedestrian crashes increased by a higher percentage than passenger cars and other light trucks. As table 1 shows, pedestrian fatalities involving SUVs increased by about 68 percent, while pedestrian fatalities involving passenger cars increased by 47 percent and light trucks and vans increased by 25 percent. Additionally, although the number of SUVs involved in pedestrian fatalities increased the most in this timeframe, passenger cars still accounted for the largest share of fatalities. Data on the growth of SUVs within the U.S. vehicle fleet and academic research identify potential contributing factors as to why the number of SUVs involved in pedestrian fatalities increased between 2008 and 2018: Increasing SUV market share. SUVs represent a growing share of the total U.S. vehicle fleet. According to the Highway Loss Data Institute, the share of new vehicles in the United States that were SUVs grew from 30 percent in model year 2008 to 48 percent in model year 2018. In addition, 11 of the 13 auto manufacturers we interviewed stated that SUV sales, either market-wide or at their company, increased relative to passenger car sales in the United States since 2008. Increased risk of injuries based on vehicle size and weight. Research suggests that if a pedestrian is struck by a vehicle with greater mass the crash is more likely to result in serious injuries or a fatality than if the pedestrian is struck by a lower-mass vehicle. For example, one study we reviewed that cited work from five other studies found that the chief determinants for the severity of injuries in motor vehicle collisions are vehicle size and weight. According to one NHTSA-funded study, which used information from NHTSA’s Pedestrian Crash Data Study, researchers found that the probability of death for pedestrians struck by light trucks (including SUVs) was 3.4 times higher than for pedestrians struck by passenger cars. Between 2008 and 2018, the number of pedestrian fatalities involving higher speeds (31 mph and above) at the time of the crash increased more sharply than the number involving lower speeds (30 mph and below). Although vehicle speed was missing or not reported for 62 percent of pedestrian fatalities (as discussed below), our analysis of FARS data showed that when speed data are recorded, the number of pedestrian fatalities involving vehicles reportedly travelling at higher speeds increased from 1,315 to 1,912 (45 percent) between 2008 and 2018 (see fig. 7). The number of pedestrian fatalities involving vehicles reportedly traveling at lower speeds also increased, but at a smaller percentage (28 percent) than vehicles at higher-speed. During this time period, about 79 percent of pedestrian fatalities involved vehicles travelling 31 mph and above, and about 21 percent involved vehicles traveling at lower speeds. Multiple studies have found that when vehicles travel at higher speeds and strike pedestrians, they are more likely to kill or severely injure the pedestrian. For example, the NTSB reported in 2018 that the relationship between speed and the severity of injuries is consistent and direct— higher crash speeds result in injuries that are more severe. The NTSB added that the effect of speed is especially critical for pedestrians because they lack protection. In addition, according to a 2019 report from the National Cooperative Highway Research Program, a pedestrian’s risk of fatality is 90 percent when struck by vehicles travelling between 54 and 63 mph compared with a 10 percent risk of fatality between 24 and 33 mph. We also found that between 2008 and 2018, the speed of the striking vehicle was not reported for about 62 percent of pedestrian fatalities. This omission is likely because it is difficult for police officers to determine a vehicle’s speed after a crash occurs. Further, some organizations we spoke with told us that low speed collisions were typically underreported. According to NHTSA officials, the speed recorded is generally up to the discretion of the responding police officer. NHTSA officials and other stakeholders we interviewed identified limitations in NHTSA’s data on the relationship between vehicle characteristics and pedestrian injuries. These include (1) incomplete and inconsistent injury designations, (2) crash and vehicle information not linked to medical data, and (3) outdated pedestrian crash investigation data. Incomplete and inconsistent injury information. Within CRSS, NHTSA relies on information provided in police reports to determine national estimates of injured pedestrians. According to NHTSA officials, data from the police reports are typically after-the-fact descriptions of events and NHTSA conducts little, or no, follow up investigations of these reports. As a result, CRSS data may not include the cause of crashes or pedestrian injuries, and for some crashes it may be missing detailed information on specific characteristics of the striking vehicle. In addition, there may be inconsistencies in pedestrian injury information. NHTSA’s injury severity data rely on reporting from states and localities, which may define injury severity differently, year-to-year. As we have reported, NHTSA standardized the injury severity definitions nationally in April 2019; however, it will take time for states to adopt this standard. Crash and vehicle data are not linked to medical records. According to NTSB and some researchers we spoke with, the five point injury severity scale used on police crash reports does not effectively capture injury severity or actual injury outcomes because NHTSA does not link crash data with medical and hospital records. Without crash and vehicle information linked to medical records, researchers cannot crosscheck injury severity designations with actual injury outcomes or identify specific injury types. NHTSA previously sponsored a program to help link crash data with injury data contained in medical records, but federal funding for the program was discontinued in 2013. Outdated pedestrian crash investigation data. NHTSA last collected detailed data on pedestrian crash and injury characteristics from 1994 to 1998. The Pedestrian Crash Data Study collected information from over 500 pedestrian crashes, including data on pedestrian injury types, severity, and potential causation. The study also reported the vehicle’s type and the part of the vehicle that caused the injury, such as the front bumper. In its 2018 report, NTSB stated that while this study was the most complete set of pedestrian crash data available in the United States, the data are over 20 years old. NTSB recommended that NHTSA develop a detailed and current pedestrian crash data set for local and state analysis and to model and simulate pedestrian collision avoidance systems. As of February 2020, however, NHTSA had not fully implemented the recommendation. Some automakers and equipment suppliers we spoke with noted that improved real world injury data would help them better develop pedestrian safety features. NHTSA has recognized that it needs to collect more detailed and complete data on pedestrian injuries. For example, in a 2011 report to Congress on the agency’s data gaps, NHTSA noted that internal stakeholders (those within NHTSA) requested an updated Pedestrian Crash Data Study with crashes involving late-model-year vehicles and detailed injury data on the body region impacted rather than the vehicle’s point of contact. Further, in its 2016 to 2020 strategic plan, NHTSA stated that it would work to improve the quality, timeliness and relevance of safety data collected. In 2018, NHTSA initiated a pilot program to evaluate existing and new protocols for collecting pedestrian crash and injury data as part of its Crash Injury Research and Engineering Network (CIREN). The purpose of this pilot program is to develop a data collection protocol and collect preliminary data for pedestrian-motor vehicle crashes, including analysis on injury causation. Further, NHTSA stated that it intends to use this protocol and data as the foundation for subsequent pedestrian crash studies such as research related to injury trends and testing tools. NHTSA officials also told us that the pilot will help update and build upon the data collection and analysis protocols for pedestrian-motor vehicle crashes used in the 1990s in the Pedestrian Crash Data Study. According to NHTSA officials, the pilot will collect data on nine cases from two hospitals. A third hospital will provide engineering support. NHTSA officials stated that they limited the pilot study to nine cases so they would be able to act quickly on the pilot to determine if a full project was worth pursuing and to avoid delays. According to NHTSA officials, they expect initial results to be available by fall 2020. We have reported that a well-developed and documented pilot program can help ensure that agency assessments produce information needed to make effective program and policy decisions. Well-designed pilot programs use five leading practices including: 1. establishing clear, appropriate, and measurable objectives; 2. articulating an assessment methodology and data gathering strategy; 3. developing a data analysis and evaluation plan to track pilot 4. identifying criteria for determining whether and how to scale the pilot and integrate it into overall efforts; and 5. ensuring two-way stakeholder communication through the pilot program. Through our review of the CIREN pedestrian pilot program documentation, we determined that NHTSA met most of the criteria for a well-developed pilot program, but not all. Specifically, NHTSA documented clear, appropriate, and measureable project objectives; identified an assessment methodology and data gathering strategy; developed a data analysis plan; and communicated with stakeholders. NHTSA, however, did not establish an evaluation plan that includes criteria to determine if the pilot program’s data collection and analysis protocol should or could be continued or expanded, once the data have been collected from the nine cases. Although NHTSA officials reported that they had a plan to review and evaluate individual cases, NHTSA does not have an evaluation plan for the pilot program that includes criteria or standards for identifying lessons learned or determining whether the new data collection and analysis procedures would satisfy data needs related to pedestrian’s injuries. NHTSA officials told us that they did not develop an evaluation plan or criteria for determining the success or scalability of the pedestrian pilot program because they were not required to create one. They also said they did not have enough information to tell if the pilot program should be integrated into overall efforts, although they expect the tools developed by the pilot to be incorporated into later efforts to increase the number of pedestrian crashes reviewed under the CIREN program. Pedestrian crash avoidance and crash mitigation safety features are commonly available on many 2019 model year vehicles offered in the United States, according to the 13 automakers we interviewed. As previously discussed, crash avoidance features rely on cameras or radar or both to detect a pedestrian and take action to avoid a crash. Crash mitigation generally involves use of pedestrian-friendly vehicle components (such as energy absorbing bumper components or hoods) that are designed to reduce the severity of injuries should a pedestrian be hit. The 13 automakers we interviewed responded that they, collectively, offered 262 model year 2019 vehicles for sale in the United States. Of those vehicle models, almost 60 percent included pedestrian automatic emergency braking as either a standard or an optional feature (see fig. 8). About 62 percent of their model year 2019 vehicles had some type of standard pedestrian crash mitigation feature. In total, 12 of 13 automakers that we interviewed responded that they offered one or more 2019 model year vehicles with pedestrian automatic emergency braking as either a standard or optional feature; similarly, 12 of 13 automakers told us they offered crash mitigation features in at least one of their 2019 model year vehicles. Some stakeholders we interviewed told us that a combination of crash avoidance and crash mitigation features can be effective in minimizing pedestrian injury. For example, NHTSA officials told us that crash avoidance features, such as pedestrian automatic emergency braking can slow a vehicle to a speed where it will be less damaging to a pedestrian once struck, and if the vehicle also has crash mitigation features the impact of the crash can be further mitigated. We found that almost half of 2019 vehicle models had some combination of both pedestrian automatic emergency braking and crash mitigation features. For example, about 47 percent of 2019 vehicle models had pedestrian automatic emergency braking as either standard or optional equipment along with crash mitigation features, such as softer hoods. However, 24 percent of vehicle models had neither of these (see fig. 9). Officials from the 13 automakers we interviewed identified a variety of factors that influenced their decisions to offer vehicles with pedestrian safety features in the United States. These include a desire to achieve high safety ratings for their vehicles, as well as the following: New car assessment programs: New car assessment programs in the United States and other countries also influence why automakers may offer pedestrian safety features. For example, officials from nine of 10 automakers that responded to this question in our interview replied that Euro NCAP was a major factor to them in providing pedestrian safety features, while seven of 10 automakers responded that JNCAP was a major factor. In contrast, three of 11 automakers responded that the U.S. NCAP was a major factor in their decisions to offer vehicles with pedestrian safety features. As previously discussed, the United States, unlike the European Union and Japan, does not incorporate pedestrian safety tests into its NCAP. Independent safety testing: Independent safety testing was also a factor in why automakers may offer pedestrian safety features on vehicles. For example, officials from five automakers said that they considered IIHS safety ratings to be a major factor in their company’s decision to offer pedestrian safety features on vehicles sold in the United States. As previously discussed, IIHS began testing pedestrian crash avoidance systems on 2018 and 2019 vehicles. These tests are known as pedestrian automatic emergency braking tests and in 2020 IIHS began using the results to help determine their Top Safety Pick awards. Officials from two automakers said a company’s goal is to earn an IIHS top safety-pick rating for each of their models. Cost: Cost appeared to be less of a factor influencing whether pedestrian safety features were offered on vehicles. Officials from seven of eight automakers who responded to this question replied that costs either were a minor factor, or did not apply, in their decisions to offer vehicles with pedestrian safety features. However, officials from four automakers told us that, in general, while customers want safer vehicles, automakers have to consider what safety features could be included without increasing the overall cost. Further, one automaker’s representative said that as more manufacturers and customers are buying crash avoidance systems the costs are decreasing. The future availability of crash avoidance features may depend on several factors. Specifically, in 2016, 20 automakers voluntarily committed to making automatic emergency braking systems standard in vehicles sold in the United States by 2022. Officials from three automakers said that they planned to incorporate pedestrian automatic emergency braking into their vehicles’ automatic emergency braking systems as part of this commitment. Another factor is customer demand. One automaker said that the number of models that include pedestrian safety features in the future would depend on consumer demand or changes in regulation. Officials from another automaker said their customers often ask for features they see in Europe and ask why such features are available there but not in the United States. The auto industry officials we interviewed identified benefits and challenges with commonly available pedestrian safety features. Benefits of crash avoidance systems include the potential of eliminating or reducing car-to-pedestrian accidents. For example, officials from six automakers said that crash avoidance features were more effective than crash mitigation features because the purpose of crash avoidance features is to prevent the collision from occurring in the first place. Almost half of the automakers we interviewed (six of 13), however, reported that a primary challenge with a camera-based pedestrian automatic emergency braking system was the camera’s ability to work in low lighting or poor weather. Recently issued research has raised questions about the overall effectiveness of crash avoidance systems. In October 2019, AAA reported that based on its own assessment, some vehicles’ pedestrian safety systems were inconsistent at either slowing down or stopping a vehicle to avoid hitting a pedestrian. Specifically, the association reported that none of the crash avoidance systems on the four vehicles they tested worked in dark conditions. Auto industry officials also identified benefits and challenges with pedestrian crash mitigation features. For example, 12 of 13 automakers reported that crash mitigation features have the overall benefit of reducing the risk or severity of pedestrian injuries. Officials from eight automakers, however, said that the current federal bumper standard created challenges to offering softer, more pedestrian-friendly bumpers in the United States. Officials from the eight automakers said they offered softer bumpers in Europe or elsewhere—where there is no similar bumper standard—but do not offer softer bumpers in the United States. NHTSA officials told us the current bumper standard is primarily a cost savings standard in that it is intended to reduce repair costs and not necessarily to offer safety protection for vehicle occupants. NHTSA officials told us trade-offs are required to establish a bumper standard that addresses pedestrian safety, yet minimizes bumper damage and repair costs. NHTSA officials told us they are in the process of reevaluating the bumper damageability standard, as part of a Notice of Proposed Rulemaking, which they expect to publish in 2020. Appendix III discusses the benefits and challenges of commonly available pedestrian safety features. NHTSA has considered pedestrian safety for many years by conducting research, considering implementation of global regulations for pedestrian crash mitigation tests, and proposing pedestrian crash avoidance and mitigation tests for NCAP (see fig. 10). NHTSA’s last substantial update of NCAP was in July 2008 (with changes effective for model year 2011 vehicles). This update established additional crash tests and technical standards to protect vehicle occupants, but did not include pedestrian safety tests. In the past 10 years, NHTSA has considered but has not yet initiated a rulemaking process related to international standards for crash mitigation tests, among other actions. For example, in 2008, the United States along with other countries approved a United Nation’s international standard for pedestrian crash mitigation tests. This international standard, if implemented in the United States in a domestic regulation, would require U.S. vehicles to meet minimum performance requirements in pedestrian crash mitigation tests. The United States approved the international standard in 2008; however, NHTSA has yet to initiate a rulemaking to implement it either as part of the FMVSS or adopt it as a testing protocol through NCAP. According to NHTSA officials, implementation of the standard would require NHTSA to initiate a regulatory proceeding. Although the United States formally agreed to the standard more than 10 years ago, NHTSA officials told us that the rulemaking initiative is classified as a long-term action and that there is no timeline for such a rulemaking to implement pedestrian crash mitigation requirements. NHTSA has also conducted a range of research on pedestrian crash avoidance and mitigation tests. Specifically, NHTSA has published, contributed to, or sponsored over 55 studies and presentations on pedestrian safety issues since 2008, and NHTSA officials provided information stating that NHTSA has spent over $8.4 million to research pedestrian safety, including pedestrian automatic emergency braking and passive safety features from 2008 through 2019. In addition, officials stated that NHTSA has conducted a number of additional studies related to pedestrian safety, studies that NHTSA is currently reviewing for final publication, though officials did not provide expected publication dates. NHTSA officials told us this research serves as a body of work that supports and facilitates agency decisions and policies with respect to pedestrian safety. NHTSA’s pedestrian safety research has focused on several key issues, including developing objective test protocols and reliable test instruments for inclusion in NCAP and assessing the potential safety benefits. NHTSA officials told us there are three important elements associated with any safety tests (including pedestrian safety tests). These elements are (1) creating test protocols that measure a vehicle’s safety performance objectively, (2) validating test instruments that measure human injury, and (3) estimating the potential safety benefit of the tests. NHTSA’s pedestrian safety research includes work related to all three of these elements, as follows: Objective Test Protocols. One NHTSA study developed objective test protocols to evaluate the effectiveness of pedestrian crash avoidance systems based on analyses of crash scenarios from real- world crash data. Another NHTSA study applied pedestrian crash mitigation test protocols used by Euro NCAP to the U.S. vehicle fleet. NHTSA found that the European protocols could be used to assess the pedestrian safety performance of vehicles in the United States, but that the performance of different U.S. vehicle types could vary. Specifically, NHTSA found that “global platform” vehicles (i.e., models that include a U.S. and European variant of the same vehicle) offered more pedestrian safety than vehicles that are only marketed in the United States. Valid Test Instruments. NHTSA has been a key contributor in the development of pedestrian test instruments. For example, NHTSA has presented information on mannequins for evaluating the repeatability and accuracy of pedestrian crash avoidance systems, concluding that mannequins should be durable, realistic, and comparable in size and movement to humans. In addition, NHTSA found there are instruments that produce repeatable and reproducible measurements of pedestrian head, upper leg, and lower leg injuries on tests. Potential Safety Benefits. NHTSA has studied the potential benefits of pedestrian crash avoidance, and estimated that these technologies could reduce the number of annual vehicle-pedestrian crashes by between 620 and 5,000, and reduce the number of annual fatal vehicle-pedestrian crashes by between 110 and 810. NHTSA has also reported that Europe and Japan have responded to the high proportion of pedestrian fatalities compared to all traffic fatalities by including pedestrian protection in their respective NCAPs and requiring pedestrian protection through regulation. According to NHTSA, these actions have likely contributed to a downward trend in pedestrian fatalities in Europe and Japan. Further, an international study found that including pedestrian safety testing in consumer testing programs has real world benefits by reducing pedestrian fatalities and injuries. For example, a European study concluded that vehicles that score well in Euro NCAP pedestrian crash mitigation tests are less likely to severely injure pedestrians. As previously noted, Euro NCAP and JNCAP have included pedestrian crash mitigation tests since 1997 and 2003, respectively, and both Euro NCAP and JNCAP incorporated pedestrian crash avoidance tests in 2016. In December 2015, NHTSA proposed pedestrian crash avoidance and mitigation safety tests for NCAP by publishing a Request for Comments notice in the Federal Register. In the 2015 Request for Comments, NHTSA indicated that including these tests in NCAP could lead to a decrease in vehicle-pedestrian crashes and resulting pedestrian injuries and fatalities. In this request, NHTSA also reported that it believed the greatest gains in highway safety in coming years would result from widespread application of crash avoidance technologies and that its proposed safety tests for crash avoidance technologies, including pedestrian detection and automatic emergency braking, met NHTSA’s four prerequisites for updating NCAP. Those four prerequisites include that: a safety need is known or capable of being estimated; vehicle and equipment designs exist (or are anticipated in prototype design) that are capable of mitigating the safety need; a safety benefit is estimated based on the anticipated performance of the existing or prototype design; and a performance-based, objective test procedure exists to measure the ability of the vehicle technology to mitigate the safety issue. With regard to crash mitigation tests, NHTSA reported that it intended to use the Euro NCAP test procedures rather than those used in Japan because the European fleet make-up, including vehicle sizes and classes, is more similar to the U.S. fleet. NHTSA also reported in its 2015 Request for Comments that including pedestrian crash mitigation tests in NCAP is necessary to stimulate improvements in pedestrian crashworthiness in new vehicles sold in the United States. NHTSA, however, did not state in its 2015 Request for Comments whether the proposed crash mitigation tests met NHTSA’s prerequisites for updating NCAP, as it had for the crash avoidance tests. The proposed changes in the 2015 Request for Comment were to take effect for model year 2019 vehicles. In response to the 2015 Request for Comment, NHTSA officials told us they received 290 comments, 31 of which addressed pedestrian safety. According to the officials, the comments received were generally supportive of including pedestrian safety testing in NCAP, and commenters proposed that the U.S. tests should be consistent, or harmonized, with the tests already conducted by Euro NCAP. NHTSA officials also noted that some commenters expressed concern with test tools and proposed test scenarios. Since the 2015 proposal to include pedestrian tests in NCAP, NHTSA has continued to solicit updated information in additional Requests for Comments. Most recently, in October 2019 NHTSA announced it would seek comment on NCAP updates in 2020, and in November 2019, NHTSA requested comments on draft research test procedures for forward and rear pedestrian crash avoidance, among other technologies. However, NHTSA stated that its draft test procedures were developed for research purposes only, and the fact that it was soliciting comments on these procedures was not an indication that it would then, or at any time in the future, initiate a rulemaking related to that technology or include that technology in NCAP. NHTSA officials told us there are many actions that go into their decision- making on whether to update NCAP and that this decision-making process can take years. These actions include such things as reviewing data, ensuring the reliability and repeatability of proposed tests by validating protocols at multiple independent test laboratories, and conducting market research to obtain consumer input. In addition, NHTSA officials told us that it also uses its four prerequisites for updating NCAP, and while these prerequisites are not required by law, they represent good governance practices and are in consumers’ best interest. However, since NCAP is considered a consumer testing information program and not a regulation, there are no particular requirements for when or how final decisions would be made as to whether pedestrian safety should or should not be included in NCAP. NHTSA officials told us that ultimately the NHTSA Administrator decides whether to go forward with changes to NCAP. Although NHTSA officials told us NCAP is not a regulation, they said NHTSA generally follows the processes in the Administrative Procedure Act for informal rulemaking to update NCAP. This process includes a notice, comment, and decision process in the Federal Register for transparency. NHTSA, however, has not used this process to communicate to stakeholders the additional steps that it must take before it can make its decision on NCAP testing. In addition, although NHTSA requested and received numerous comments on including pedestrian safety tests in NCAP in 2015, as of April 2020, it has yet to respond to those comments. Leading practices for program management emphasize the importance of milestones and decision points, documentation, and clearly communicating to external stakeholders. The Project Management Institute, Inc., The Standard for Program Management stresses the importance of program management plans that align with organizational goals and objectives. Elements of such plans are to provide a roadmap that identifies such things as milestones and decision points to guide programs forward. In addition, Standards for Internal Control in the Federal Government, state that entities should externally communicate the necessary quality information to achieve the entity’s objectives. In particular, entities should communicate to external stakeholders significant matters related to risks or changes. These standards also state that documentation is necessary for design, implementation, and operating effectiveness. Compared to these leading practices, NHTSA’s process does not provide documentation of the process, decision points, or milestones to guide the program. For example, NHTSA officials could not provide us with documentation as to how it determined that the pedestrian crash avoidance tests proposed in 2015 met the four prerequisites, or how the proposed crash mitigation tests compared to the prerequisites. Other NCAPs have used various methods for documenting their process for updating their testing. For example, Euro NCAP uses a roadmap to communicate to stakeholders the planned changes for NCAP tests, the timeline of steps toward the changes, and when those changes will be effective. Officials from Euro NCAP told us the test and assessment protocols are developed in conjunction with working groups made up of automakers, equipment suppliers, test facilities, and Euro NCAP member organizations. Further, officials told us the working groups and roadmaps provide automakers with the opportunity to provide real-time input and obtain information to support their investment decisions. The lack of a documented overall process for updating NCAP affects NHTSA’s ability to achieve NCAP’s goals to provide manufacturers an incentive to improve the safety performance of new vehicles and to assist consumers with their vehicle purchasing decisions. Specifically, without a transparent process for NHTSA’s decision-making on NCAP, automakers lack information on NHTSA’s progress in evaluating proposed changes— such as those offered in the 2015 Request for Comment—and the timing of the implementation of any specific testing procedures. This is particularly important because automakers need quality information to make investments to support the development and deployment of new technologies and equipment in their product lines to meet testing requirements. For example, representatives from one automaker told us that vehicle design is a 6 to 8 year product cycle and that if NHTSA decides to implement certain tests in the middle of that cycle, it would be difficult and costly to make changes. Without a clearly documented process for making changes to NCAP, including established criteria and milestones for decisions, automakers and the public lack clarity on NHTSA’s plans for improving vehicle safety to inform investment and purchasing decisions. NHTSA has yet to make or communicate a decision as to whether it intends to include pedestrian safety tests in NCAP. As discussed above, NHTSA has conducted extensive research and requested comments on pedestrian crash avoidance and mitigation tests in 2013 and 2015. Although NHTSA reported in 2015 that these tests could lead to a decrease in vehicle-pedestrian crashes and resulting pedestrian injuries and fatalities, it has yet to make or communicate a decision about the future of NCAP in relation to pedestrian safety to stakeholders. Nine of 13 automakers we interviewed told us that a lack of communication from NHTSA on its plan for addressing pedestrian safety issues has presented a challenge to them, often because they require long lead times to develop, test, and launch new technologies. Leading practices for program management also stress the importance of communication with stakeholders and that effective stakeholder communications are key to executing program endeavors, addressing risks, and, ultimately, delivering benefits. Specifically: The Project Management Institute, Inc., The Standard for Program Management stresses the importance of managing external communications, stating that communication provides critical links for successful decision making. It also stresses the importance of providing decision-making stakeholders with adequate information to make the right decisions at the right time in order to move programs forward. Standards for Internal Control in the Federal Government states that entities should identify, analyze, and respond to risks related to achieving the defined objectives and should externally communicate the necessary quality information to achieve the entity’s objectives. As discussed above, these standards also state that management should externally communicate quality information to external stakeholders significant matters related to risks or changes. Further, the statute underlying NCAP requires NHTSA to communicate certain vehicle safety information to the public. Specifically, DOT is to provide the public with information on crash avoidance, crashworthiness, and damage susceptibility. Such information is to be provided in a simple and understandable form to allow comparison among vehicles to assist a consumer in buying a new car. NHTSA officials told us that it has not made or communicated a decision as to whether it will include pedestrian safety testing in NCAP because administration priorities have shifted since publication of the 2015 Request for Comments. Specifically, NHTSA officials told us that the agency drafted technical specifications and testing protocols for pedestrian safety tests for NCAP and posted those tests to its public web site in January 2017. After the administration changed, however, those specifications were withdrawn and not published in the Federal Register. NHTSA officials told us that, since that time, the agency has sought to conduct additional review before final decisions could be made. Although the policy decision as to whether to include pedestrian safety tests in NCAP ultimately resides within NHTSA’s discretion, NHTSA’s lack of a decision and its related rationale limits NHTSA’s ability to address emerging safety risks and to meet its strategic objectives. Specifically, in the Department of Transportation’s Enterprise Risk Profile for 2019, NHTSA recognized that increases in roadway fatalities in general—and pedestrian fatalities in particular—represent one of the top strategic risk areas for the Department. The document states that to meet its objectives, NHTSA must focus on areas where there have been increases in road deaths, including pedestrian fatalities, and advance crash avoidance and mitigation technology to prevent crashes from occurring. NHTSA also recognized the importance of using a data-driven and systematic approach that is timely and complete when making decisions. In the absence of a decision on whether to include pedestrian safety testing in NCAP, and the rationale for that decision, stakeholders lack clarity on whether NHTSA is using all of the policy tools at its disposal to address emerging safety risks and to achieve its strategic objectives. The design of vehicles and the safety features they offer can play an important role in reducing the frequency and severity of pedestrian crashes. NHTSA’s pedestrian pilot program is an important step toward addressing data gaps on the relationship between vehicle characteristics and pedestrian injuries. Without an evaluation plan that includes criteria for assessing the scalability of the pilot program, however, NHTSA lacks the tools necessary to assess whether and how the pilot should be expanded into a more robust effort to inform NHTSA’s understanding of pedestrian injury mitigation efforts. Although NHTSA has recognized that the increase in pedestrian fatalities presents a risk to the safety of the nation’s roadways, it is not well positioned to address this risk through NCAP because NHTSA does not have a clear process for making changes to the program. Documenting and communicating the process for updating NCAP, with clear criteria and decision points, would enhance NHTSA’s accountability to key stakeholders—including Congress, automakers, and consumers—and help NHTSA communicate the important policy decision as to whether to include pedestrian safety tests in NCAP. Making and communicating a decision regarding pedestrian safety testing would give automakers clarity on whether NHTSA intends to establish performance standards and tests to evaluate the pedestrian safety features that are commonly available on new vehicle models. Communicating a decision and the rationale for that decision would provide transparency and accountability to the public. We are making the following three recommendations to NHTSA. The Administrator of NHTSA should document an evaluation plan for the Crash Injury Research and Engineering Network pedestrian pilot program that includes criteria for determining whether and how to scale the pilot program to ensure that the piloted data-collection and analysis procedures will address NHTSA’s data needs related to pedestrian injuries and vehicle characteristics. (Recommendation 1) The Administrator of NHTSA should document the overall process for making changes to NCAP, including established criteria and milestones for decisions, and share this process with external stakeholders. (Recommendation 2) The Administrator of NHTSA should decide whether to include pedestrian safety tests in NCAP and NHTSA should communicate this decision and rationale to relevant stakeholders and the public. (Recommendation 3) We provided a draft of this report to the Department of Transportation for review and comment. The department provided a written response, which is reprinted in appendix IV, and technical comments that we incorporated as appropriate in the report. The department concurred with all three of our recommendations. It described various activities NHTSA has underway related to pedestrian safety, including the CIREN study, a special study initiated this year to gather detailed data on a selection of fatal pedestrian crashes, and continuing research on pedestrian crash test procedures. Regarding Recommendation 2, the department stated that it has made its procedures to change NCAP transparent and inclusive of the public. Specifically, the department stated it has published and requested comment on its proposals in the Federal Register, as we described in this report. However, the department agreed that documenting the overall process on its website would generate increased public awareness of NCAP as a consumer safety tool. While such a step could increase public awareness of NCAP, we continue to believe that any steps taken to document the overall process for making changes to NCAP should also include established criteria and milestones for decisions to enhance NHTSA’s accountability to Congress, automakers, and consumers. We are sending copies of this report to the appropriate congressional committees, the Secretary of Transportation, and the Administrator of the National Highway Traffic Safety Administration. In addition, we will make copies available to others upon request, and the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834, or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report: (1) examines what is known about the relationship between motor vehicle characteristics and pedestrian injuries and fatalities, (2) describes approaches automakers have taken to address pedestrians’ safety and discusses stakeholders’ perspectives on these approaches, and (3) evaluates actions the National Highway Traffic Safety Administration (NHTSA) has taken to assess whether pedestrian safety testing should be included in its New Car Assessment Program (NCAP). For all of our objectives we reviewed pertinent federal statutes and regulations and applicable program documents. Our work covered the 2008 through 2018 timeframe, with 2018 being the most recent data available at the time of our analysis. We focused on motor vehicles as opposed to infrastructure (e.g., roadway design, highway lighting) or driver/pedestrian behavior. Although infrastructure and behavior may also contribute to pedestrian fatalities and injuries, the scope of this report was to assess motor vehicles and their role in pedestrian safety. We defined motor vehicles as passenger cars, sport utility vehicles, and light trucks and vans that were offered for sale in the United States. We excluded commercial vehicles, motorcycles, and buses. The intent was to include those vehicles that a typical consumer would purchase and the pedestrian safety features that may or may not be offered on such vehicles. Our scope also included gaining an understanding of pedestrian safety testing activities in Europe (European New Car Assessment Programme (Euro NCAP)) and Japan (Japan New Car Assessment Program (JNCAP)). We selected these programs since pedestrian safety testing is part of their NCAPs and some auto industry stakeholders identified them as being in the forefront of this type of testing. Both Europe and Japan began testing crash avoidance systems as part of their NCAPs in 2016. We interviewed officials with Euro NCAP, received a written response to questions from JNCAP, and obtained information on pedestrian safety testing from both organizations. To examine what is known about the relationship between vehicle characteristics and pedestrian injuries and fatalities, we analyzed data from three NHTSA databases for the period of 2008 through 2018: (1) Fatality Analysis Reporting System (FARS); (2) Crash Report Sampling Systems (CRSS); and (3) National Automotive Sampling System/General Estimates System (NASS/GES). To ensure the accuracy of our analysis we reviewed agency technical documentation related to these databases and ensured that our figures matched publicly available injury and fatality data contained in NHTSA publications such as its annual Traffic Safety Fact Sheets. FARS data are derived from a census of all fatal motor vehicle traffic crashes within the 50 states, Puerto Rico, and the District of Columbia and provide uniformly coded, national data on police reported fatalities. We analyzed FARS data to determine the total number of pedestrian fatalities each year as well as the number of pedestrian fatalities by vehicle age, vehicle body type, and vehicle travelling speed (speed just prior to the crash). These variables were selected based on our interviews of NHTSA officials and a review of relevant research about the relationship between pedestrian fatalities and motor vehicle characteristics. We also analyzed FARS data on the number of pedestrian fatalities by environmental characteristics such as type of roadway, light condition, and relationship to intersection, selecting these characteristics based on our interviews and research. CRSS is a sample of police reported motor vehicle crashes involving all types of motor vehicles, pedestrians, and cyclists that is used to develop national estimates of the number of injuries associated with motor vehicle crashes, among other things. The CRSS police crash report sample is selected in multiple stages to produce a nationally representative probability sample, and the target annual sample size is 50,000 police accident reports. We analyzed CRSS data from 2016 through 2018, the only years CRSS data were available, to better understand the estimated total number of pedestrian crashes as well as the estimated number of pedestrian crashes by vehicle age, vehicle body type, vehicle speed, and level of pedestrian injury severity. Similar to our analysis of FARS data, these variables were selected based on our interviews with NHTSA officials and a review of relevant research about the relationship between motor vehicle characteristics and pedestrian crashes. NASS/GES preceded CRSS and obtained its data from a nationally representative probability sample of police accident reports. We analyzed NASS/GES data from 2008 through 2015, the most recent years available within the database, to better understand historical trend data on the variables we analyzed in CRSS. Although NHTSA collected similar variables in CRSS and NASS/GES, differences in the sampling methodologies of each may contribute to differences in the estimated number of pedestrian crashes between 2008 through 2015 and 2016 through 2018 timeframes. We used agency technical documentation for CRSS and NASS/GES as well as guidance from NHTSA statisticians to estimate the sampling error associated with our estimates derived from CRSS and NASS/GES data. We express confidence levels of estimates derived from CRSS and NASS/GES data at the 95 percent confidence interval. This level means that we are 95 percent confident that the actual population values are within this interval. Additionally, for our analysis, we used CRSS and NASS/GES variables that included imputed values for items missing data on the estimated number of pedestrian crashes by vehicle age, vehicle body type, and pedestrian injury severity. We reviewed and assessed NHTSA technical documentation for their statistical imputation methodology and determined it was sufficiently reliable for us to make use of the vehicle age, body type, and injury severity variables with imputed data. In addition to analyzing NHTSA databases, we analyzed data from the Highway Loss Data Institute (HLDI), an organization affiliated with the Insurance Institute for Highway Safety (IIHS), to better understand how the U.S. vehicle fleet has changed, specifically between 2008 and 2018. HLDI collected and decoded vehicle identification numbers (VINs) for each model year between 1983 and 2018. For HLDI’s analysis, it used VINs from its member companies, among other sources, and information encoded in the VIN to determine the body styles for these VINs. According to HLDI, passenger cars include regular two-door models, regular four-door models, station wagons, minivans, sports models and luxury models, while SUVs are vehicles with conventional front-end constructions and large passenger and cargo areas which can be built on either heavy-duty chassis capable of off-road use or passenger car platforms. HLDI definitions for vehicle body type classifications differ from those used by NHTSA. According to HLDI officials, however, the classifications are comparable. For our analysis, we used these data to calculate the proportion of vehicles that were passenger cars, light trucks, or SUVs from 2008 through 2018. We also conducted interviews with federal government and non- governmental organizations about the relationship between vehicle related characteristics and pedestrian injuries and fatalities, as well as issues related to NHTSA’s pedestrian safety data and potential data gaps and limitations. To discuss NHTSA’s pedestrian safety data, we spoke with NHTSA officials from the Data Reporting and Information Division, Mathematical Analysis Division, and Vehicle Research and Test Center. We also spoke with officials from the National Transportation Safety Board, which conducts independent accident investigations and advocates for safety improvements, including those related to pedestrian safety and motor vehicles. Non-governmental organizations we spoke with included IIHS and major auto industry trade associations, such as the Alliance of Automobile Manufacturers, Association of Global Automakers, the Motor and Equipment Manufacturers Association, and the Automotive Safety Council. We also spoke with vehicle safety advocates, such as the Governors Highway Safety Association. These organizations were selected based on their relationship to the auto industry, referrals from other interviewees, and recent publications on pedestrian-motor vehicle safety issues. We also identified and reviewed studies either published or referenced by these organizations to better understand research related to pedestrian injuries and fatalities and motor vehicle characteristics. Where appropriate, we conducted a methodological review of these studies. Further, we spoke with academic researchers from six research centers across four universities with expertise in human-vehicle interaction and pedestrian-motor vehicle safety, including injury biomechanics and auto industry data analysis. These researchers were selected based on referrals from other interviewees and reviews of their organization’s websites to ensure that their research would be informative for our purposes. Although these organizations had, or have, relationships with NHTSA or the auto industry, we included them based on their expertise with issues related to our work. Based on these criteria we interviewed officials at the University of Virginia (Center for Applied Biomechanics); the Ohio State University (Center for Automotive Research; Injury Biomechanics Research Center); the University of North Carolina (Highway Safety Research Center), and the University of Michigan (University of Michigan Transportation Research Institute; International Center for Automotive Medicine). We conducted interviews with these researchers to better understand general information on the relationship between vehicle-related characteristics and pedestrian injuries and fatalities, uses and limitations of NHTSA data, and potential areas for further research. Results of our interviews are not generalizable to the universe of non-governmental organizations or researchers studying pedestrian-motor vehicle safety. We also spoke with automakers and equipment suppliers about pedestrian safety and data needs. The automakers and equipment suppliers were the same as those contacted about how automakers are addressing pedestrian safety (discussed below). Finally, we reviewed documents and interviewed NHTSA officials about the Crash Injury Research and Engineering Network (CIREN) and the associated CIREN pedestrian pilot program NHTSA recently initiated. This pilot will assess data collection approaches and methodologies for pedestrian injuries resulting from motor vehicle crashes. Specifically, we reviewed CIREN contract and methodology documents such as the 2016 CIREN Request for Proposal, 2018 CIREN Pedestrian Pilot Study Request for Proposal, Task Orders for CIREN centers participating in the pedestrian pilot study, CIREN Pedestrian Crash Process and Coding Manual, and the Pedestrian Crash Inclusion Criteria. We also interviewed NHTSA officials responsible for managing the CIREN program and the pedestrian pilot study. We assessed this program using criteria for designing successful pilot programs developed during prior GAO work. To describe the approaches automakers have taken to address pedestrian-motor vehicle safety and discuss stakeholder perspectives on these approaches, we contacted automakers that sell new vehicles in the United States. Specifically, NHTSA provided us with a list of 17 automakers that participated in the 2018 New Car Assessment Program. NHTSA officials told us they do not necessarily include automakers with low sales volumes in NCAP testing. As a result, to better ensure that we had a complete list of automakers that sell vehicles in the United States we compared the names on NHTSA’s listing to the membership lists of the Alliance for Automobile Manufacturers and the Association of Global Automakers—two major trade associations of the auto industry. Officials told us that between the two organizations we would account for most, if not all, of the automakers that sell new vehicles in the United States. Finally, we compared our list with 2018 market share data from Ward’s Automotive to identify the automakers with the highest U.S. sales. Based on our analysis, we identified 17 automakers to include in our work. However, during our contacts with automakers, we determined that one of the 17 automakers—Porsche—was part of the Volkswagen Group. Thus, our final review resulted in a total of 16 automakers to contact as part of our study (see table 2). Thirteen of the 16 automakers responded to our request for information. We developed a semi-structured interview instrument to collect information from the automakers. This instrument focused on the approaches that automakers took to address pedestrian-motor vehicle safety. The semi-structured interview instrument was peer reviewed by an independent survey specialist and pretested with two automakers before we began collecting data. Based upon on their responses, we revised and clarified the semi-structured interview instrument. In total, 13 of 16 automakers completed and submitted the semi-structured interview instrument. Those 13 automakers represented approximately 70 percent of new vehicle sales in the United States for 2018. The interview instrument asked automakers to identify pedestrian safety features on their 2019 model year vehicles, as these vehicles would have the most recent pedestrian safety features available at the time of our work. Although 12 of the 13 automakers did not respond in full to all the questions on the semi-structured interview instrument, we obtained additional information through telephone and in-person interviews conducted from May 2019 through October 2019. The results of these interviews are not generalizable to the universe of automakers that may sell vehicles in the United States. Upon completion of all the interviews, a GAO methodologist compiled the individual responses from each of the 13 automakers into a database. We used this database to perform a qualitative content analysis to identify common themes and the frequency with which the automakers identified certain issues related to pedestrian safety. A GAO analyst independently verified the themes and certain other information we received from the automakers to ensure accuracy and completeness. We also used semi-structured interview instruments to obtain information on stakeholders’ perspectives on the approaches automakers have taken to pedestrian safety. For purposes of this report, we define stakeholders as automakers, auto equipment suppliers, and auto industry trade associations. These organizations develop or deploy pedestrian safety technology in motor vehicles, or, in the case of the trade associations, are knowledgeable about the legal and regulatory issues related to pedestrian safety and the auto industry. In addition to interviewing 13 automakers, we interviewed officials from five auto equipment suppliers and four auto industry trade associations (see table 3). The five auto equipment suppliers included in our work were identified with the assistance of the Motor and Equipment Manufacturers Association, a trade association for auto industry suppliers. The organization provided us the names of seven equipment suppliers, five of which agreed to participate in our semi- structured interviews. In general, these equipment suppliers develop or produce equipment used in motor vehicle crash avoidance or crash mitigation systems. The semi-structured interview instrument asked questions about such things as crash avoidance and crash mitigation technology and the benefits and challenges of this technology. We did not assess the effectiveness of these features. Additionally, we interviewed officials from four auto industry trade associations. We conducted telephone and in-person interviews with these stakeholders from March 2019 through September 2019. In addition to automakers, equipment suppliers, and auto industry trade associations, we also interviewed NHTSA and IIHS about crash avoidance and crash mitigation technology and reviewed applicable federal regulations related to pedestrian safety. These include federal headlight and bumper standards. We also reviewed an October 2018 Notice of Proposed Rulemaking in which NHTSA agreed to evaluate proposed amendments to current federal motor vehicle headlight requirements. We discussed with NHTSA the federal headlight and bumper standards and how these relate to pedestrian safety, as well as any potential changes to these standards to better accommodate pedestrian safety. Lastly, we reviewed an October 2019 IIHS press release and an October 2019 American Automobile Association study discussing the results of pedestrian crash avoidance tests each organization performed. To assess NHTSA’s actions related to pedestrian safety and NCAP, we reviewed applicable federal laws and regulations related to vehicle safety as well as documents published in the Federal Register, such as Requests for Comments, soliciting comments on proposed NCAP changes related to pedestrian safety. NHTSA provided a high-level summary of comments received from Requests for Comments issued in 2015 and 2018 that we reviewed. We reviewed selected comments and supporting documents submitted to NHTSA as part of the docket in support of the Requests for Comment, such as those provided by auto industry trade associations, automakers, and auto equipment suppliers. We also reviewed program documents discussing how NHTSA assesses new car safety, performs NCAP safety tests, and reports the results to the public. Further, we reviewed over 55 studies and presentations on the agency’s work related to pedestrian safety. NHTSA highlighted 22 of these reports and presentations as being representative of the body of research that supported and facilitated agency decisions and policies with respect to pedestrian safety, including the 2015 and 2018 Requests for Comments. We reviewed the 22 reports and presentations and determined that 14 met our inclusion criteria, in that the reports and presentations were focused on potential pedestrian safety tests and their applicability to the U.S. vehicle fleet, the use of various test instruments, and the potential safety effects associated with technologies intended to avoid and mitigate crashes. Where appropriate, we conducted a methodological review of these studies. In addition, NHTSA officials provided additional studies after our interviews, which we also reviewed. To better understand pedestrian safety testing and issues related to incorporating such testing into NCAP, we visited NHTSA’s Vehicle Research and Test Center in East Liberty, Ohio. We interviewed officials there about NHTSA pedestrian safety research and how it supported NHTSA’s proposed pedestrian safety tests for NCAP. We also discussed the applicability of pedestrian safety tests to the U.S. vehicle fleet, including tests used by Euro NCAP. During our visit, we observed examples of a pedestrian crash mitigation test for lower leg injury and a rear-facing pedestrian crash avoidance test. We reviewed NHTSA’s budget documentation on pedestrian safety research from fiscal year 2008 to 2019, the most recent year for which data were available. We also visited and discussed pedestrian safety issues with officials of IIHS’ Vehicle Research Center in Ruckersville, Virginia. We observed a forward-facing pedestrian crash avoidance test. Further, we interviewed NHTSA officials about such things as the process for making changes to NCAP and activities associated with this process, documentation of this process, how NCAP changes are communicated to stakeholders, and NHTSA plans for determining whether to incorporate pedestrian safety tests in NCAP. Finally, we interviewed automakers, auto industry equipment suppliers, and IIHS about incorporating pedestrian safety tests into NCAP. To understand how other NCAPs address pedestrian safety, we interviewed officials from Euro NCAP and received written responses from JNCAP to a set of questions we sent them. We also reviewed supporting documents from both Euro NCAP and JNCAP on pedestrian crash avoidance and mitigation tests they perform and how such tests are scored when determining star ratings. Further, we discussed with Euro NCAP how it works with the auto industry to test vehicles and to develop future changes to Euro NCAP, including the Euro NCAP roadmap. We also reviewed selected international studies related to the real-world benefits of pedestrian safety testing performed by Euro NCAP. We determined those studies to be sufficiently reliable for our purposes. To assess how NHTSA’s process for making changes to NCAP compares to leading practices, we reviewed the Project Management Institute, Inc., The Standard for Program Management, and GAO’s Standards for Internal Control in the Federal Government. The Project Management Institute’s standards are utilized worldwide and provide guidance on how to manage various aspects of projects, programs, and portfolios. In particular, according to The Standard for Program Management, this standard provides guidance that is generally recognized to support good program-management practices for most programs, most of the time. We conducted our work from February 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix contains additional information on pedestrian fatalities and the estimated number of pedestrians injured from 2008 through 2018. Although we included much of our pedestrian fatality analysis in the report, this appendix includes data on the number of pedestrian fatalities involving particular light conditions and relationships to intersections— environmental factors relevant to pedestrian crashes—as well as data on vehicle body types (see fig. 11, 12, and 13). We used data from the National Highway Traffic Safety Administration’s (NHTSA) Fatality Analysis Reporting System (FARS) to compile information on pedestrian fatalities. The following figures show information about the estimated number of pedestrians injured from 2008 through 2018 (see figs. 14, 15, 16, 17, and 18). These figures show pedestrians injured by age of the striking vehicle, body type of vehicle, reported speed of the vehicles, and estimated number of pedestrians with serious or fatal injuries. We used data from NHTSA’s Crash Report Sampling System (CRSS) for years 2016 through 2018, and National Automotive Sampling System/General Estimates Survey (NASS/GES) for years 2008 through 2015 to compile information on pedestrians injured. Within CRSS and NASS/GES databases, we specifically analyzed data on pedestrians injured by vehicle related characteristics such as the age, body type, and speed of vehicles that struck and injured pedestrians, as well as the estimated number of severe and fatal pedestrians injured. As part of our analysis on how automakers are addressing pedestrian safety through crash avoidance and crash mitigation technologies, we obtained the views of 13 automakers and five auto equipment suppliers. As discussed below, auto industry officials provided their views on the benefits and challenges of commonly available crash avoidance and crash mitigation technologies. Automaker and auto equipment supplier officials identified various benefits and challenges with pedestrian crash avoidance features. For example, 12 of 13 automakers reported and two of five auto equipment suppliers said that crash avoidance features have the overall potential benefit of eliminating or reducing car-to-pedestrian accidents. The Highway Loss Data Institute reported in 2017 that one automaker’s pedestrian automatic emergency braking system reduced pedestrian- related bodily injury liability claims by 35 percent compared to other vehicles manufactured by that automaker. In addition, the automaker itself found that, in Japan, its vehicles equipped with the system experienced 60 percent fewer accidents with injury compared to its vehicles without the system. Officials from automakers and auto equipment suppliers we interviewed also identified challenges with pedestrian crash avoidance technologies. Specifically, stakeholders cited some distinctions between the performance of camera-based and radar-based pedestrian automatic emergency breaking systems. Almost half of the automakers we interviewed (six of 13) reported that a primary challenge with a camera- based pedestrian automatic emergency braking system was the camera’s ability to work in low lighting and poor weather. As previously noted in this report, about 75 percent of all reported pedestrian fatalities occurred in 2018 after dark. In contrast, several automakers stated that radar based pedestrian detection systems are not dependent on light to function, but that they are less effective at identifying pedestrians than camera-based systems. Officials from another automaker said manufacturers have attempted to offset the challenges of cameras and radar by developing “fusion” systems (combination of camera and radar). These officials said, however, these systems add complexity and processing time to the technology because the system must manage two separate functions that must be processed together to identify a pedestrian. Officials from automakers said that a challenge affecting both camera- and radar-based systems was limiting the occurrence of false positives, or the activation of these systems when they are not required. Recently issued research has raised questions about the overall effectiveness of crash avoidance systems. In October 2019, the American Automobile Association (AAA) reported that, based on its own assessment, some vehicles’ pedestrian safety systems were inconsistent at either slowing down or stopping a vehicle to avoid hitting a pedestrian. For example, AAA reported that dark conditions could affect the effectiveness of available pedestrian detection systems and that none of the crash avoidance systems on the four vehicles they tested worked in dark conditions. Automaker officials told us that the performance of crash avoidance systems could be improved through updates to current vehicle headlight standards. Specifically, officials from four automakers indicated that the National Highway Traffic Safety Administration (NHTSA) should update federal standards for headlights to permit the use of adaptive driving beam headlights on new vehicles. Adaptive driving beam headlights are currently in use in European and other countries, and are different from the combination high- and low-beam systems used in the United States. In general, adaptive driving beam headlights use advanced sensors and computing technology to shape the headlamp beams to provide enhanced illumination of unoccupied portions of the road and avoid glaring other vehicles. In October 2018, NHTSA published a Notice of Proposed Rulemaking in which it tentatively concluded that federal standards for headlights do not permit adaptive driving beam systems because those systems would not comply with some of the standards. NHTSA, however, has said adaptive driving beam headlights have the potential to create significant safety benefits in avoiding collisions with pedestrians, cyclists, animals, and roadside objects by providing additional front-end illumination. Five automakers we interviewed said that they offer adaptive driving beam headlamps as a crash avoidance technology on their vehicles sold in other countries. In its October 2018 Notice of Proposed Rulemaking, NHTSA sought public comment on amending federal standards to allow the use of adaptive driving beam systems in response to a petition from an automaker. NHTSA officials said that it is in the process of developing a final rule but did not have a period for when it would be issued. Another challenge for crash avoidance systems is the federal standard for bumpers. As previously discussed in this report, this standard requires that vehicles, including their bumpers, meet specified damage criteria when bumpers are hit at 2.5 miles-per-hour (mph). Officials from five automakers said that this standard presented challenges with the placement of crash avoidance sensors. On some vehicles, crash avoidance sensors are placed in the same area where the vehicles are tested for compliance with the bumper standard. As a result, the test could damage or destroy the crash avoidance sensor. Two automaker officials told us that they have addressed this challenge by relocating the sensors to another part of the vehicle to avoid conflicts with the bumper standard. NHTSA officials told us they are in the process of reevaluating the bumper damageability standard, including the placement of sensors, as part of a Notice of Proposed Rulemaking, which they expect to publish in early 2020. Officials from automakers and auto equipment suppliers we interviewed identified benefits and challenges for pedestrian crash mitigation features. For example, 12 of 13 automakers reported and one of five auto equipment suppliers said that pedestrian crash mitigation features have the overall benefit of reducing the risk or severity of pedestrian injuries. Officials from four automakers, however, said that crash mitigation features do not protect pedestrians from the secondary impact of an accident, such as the residual injuries from hitting the pavement. Additionally, officials from six automakers said that crash avoidance features were more effective than crash mitigation features because the purpose of crash avoidance features is to prevent the collision from occurring in the first place. Similar to crash avoidance, the federal bumper standard may also affect crash mitigation systems. Officials from eight automakers said that the bumper standard created challenges to offering additional crash mitigation features in the United States, such as softer, more pedestrian friendly bumpers. Officials from the eight automakers said they offered softer bumpers in Europe or elsewhere—where there is no similar bumper standard—but do not offer softer bumpers in the United States. Some stakeholders told us the current bumper standard runs counter to pedestrian safety, and softer bumpers would help mitigate the severity of pedestrian injuries. Similarly, NHTSA officials told us the current bumper standard is primarily a cost savings standard in that it is intended to reduce repair costs and not necessarily to offer safety protection for vehicle occupants. NHTSA officials told us that establishing a bumper standard that addresses pedestrian safety, yet minimizes bumper damage and repair costs requires tradeoffs. The officials told us as part of the Notice of Proposed Rulemaking it is reviewing the broader damageability requirement. Andrew Von Ah, Director, (202) 512- 2834 or vonaha@gao.gov In addition to the contact named above, Matt Barranca (Assistant Director), Richard Jorgenson (Analyst-in-Charge), Carl Barden, Namita Bhatia-Sabharwal, Melissa Bodeau, Breanne Cave, Michelle Everett, Susan Fleming, Geoff Hamilton, Hannah Laufe, Regina Morrison, Joshua Ormond, Terry Richardson, and Michael Steinberg made significant contributions to this report.", "summary": "In 2018, about 6,300 pedestrians—17 per day—died in collisions with motor vehicles in the United States, up from about 4,400 in 2008. Many factors influence pedestrian fatalities, including driver and pedestrian behavior. Vehicle characteristics are also a factor. NHTSA tests and rates new vehicles for safety and reports the results to the public through its NCAP. Currently, pedestrian safety tests are not included in NCAP. This report examines: (1) what is known about the relationship between vehicle characteristics and pedestrian fatalities and injuries, (2) approaches automakers have taken to address pedestrian safety, and (3) actions NHTSA has taken to assess whether pedestrian safety tests should be included in NCAP. GAO analyzed data on pedestrian fatalities and injuries from 2008 through 2018 (the most recent available data); reviewed NHTSA reports; and interviewed NHTSA officials. GAO also obtained information about pedestrian safety features from 13 automakers that represented about 70 percent of new vehicle sales in the United States in 2018, and compared NHTSA's actions with leading program management practices. National Highway Traffic Safety Administration (NHTSA) data show that certain vehicle characteristics related to age, body type, and the speed of the vehicle at the time of the crash are associated with increases in pedestrian fatalities from 2008 to 2018. Specifically, the number of pedestrian fatalities during this time period increased more for crashes involving vehicles that were: 11 years old or older compared to newer vehicles, sport utility vehicles compared to other passenger vehicles, and traveling over 30 miles per hour compared to vehicles traveling at lower speeds. GAO also found that NHTSA does not consistently collect detailed data on the type and severity of pedestrian injuries, but began a pilot program in 2018 to improve its data collection efforts. NHTSA, however, lacks an evaluation plan with criteria to assess whether to expand the pilot program, as called for in leading practices. As a result, NHTSA lacks information to determine how and whether it should expand the pilot to meet the agency's data needs. Automakers offer a range of approaches to address pedestrian safety. For example, pedestrian crash avoidance technologies use cameras or radar to detect an imminent crash with a pedestrian and engage a vehicle's brakes to avoid a crash. GAO found that about 60 percent of the model year 2019 vehicles offered in the United States by 13 automakers had pedestrian crash avoidance technologies as standard or optional equipment. In 2015 NHTSA proposed pedestrian safety tests for its New Car Assessment Program (NCAP), but NHTSA has not decided whether it will include such tests in the program. NHTSA has reported that crash avoidance technologies could lead to a decrease in pedestrian fatalities. Nine automakers that GAO interviewed reported that NHTSA's lack of communication about pedestrian safety tests creates challenges for new product development. NHTSA has also not documented a clear process for updating NCAP with milestones for decisions. NHTSA officials said that updating NCAP involves many actions and can take years. However, absent a final decision on whether to include pedestrian safety tests in NCAP and a documented process for making such decisions, the public lacks clarity on NHTSA's efforts to address safety risks. GAO is recommending that NHTSA (1) develop an evaluation plan with criteria for expanding its pilot program, (2) make and communicate a decision about whether to include pedestrian safety tests in NCAP, and (3) document the process for making changes to NCAP. The Department of Transportation concurred with our recommendations.", "document_type": "gao"}
{"report": "Our experience has shown that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency leaders grounded in the five criteria for removal from the High-Risk List, as well as any needed congressional action. The five criteria for removal that we issued in November 2000 are as follows: Leadership commitment. Demonstrated strong commitment and top leadership support. Capacity. Agency has the capacity (i.e., people and resources) to resolve the risk(s). Action plan. A corrective action plan exists that defines the root cause, solutions, and provides for substantially completing corrective measures, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated progress. Ability to demonstrate progress in implementing corrective measures and in resolving the high-risk area. Starting in our 2015 update, we added clarity and specificity to our assessments by rating each high-risk area’s progress on the five criteria and used the following definitions: Met. Actions have been taken that meet the criterion. There are no significant actions that need to be taken to further address this criterion. Partially met. Some, but not all, actions necessary to meet the criterion have been taken. Not met. Few, if any, actions towards meeting the criterion have been taken. We are removing two areas—DOD Supply Chain Management and Mitigating Gaps in Weather Satellite Data—from the list due to the progress that was made in addressing the high-risk issues. As we have with areas previously removed from the High-Risk List, we will continue to monitor these areas to ensure that the improvements we have noted are sustained. If significant problems again arise, we will consider reapplying the high-risk designation. We added two areas to the High-Risk List since our 2017 update—Government-Wide Personnel Security Clearance Process and VA Acquisition Management. We are removing the area of DOD Supply Chain Management from the High-Risk List because, since 2017, DOD has addressed the remaining two criteria (monitoring and demonstrated progress) for the asset visibility and materiel distribution segments. Congressional attention, DOD leadership commitment, and our collaboration contributed to the successful outcome for this high-risk area, which had been on GAO’s High-Risk List since 1990. DOD’s actions for the asset visibility segment of this high-risk area included (1) providing guidance for the military components to consider key attributes of successful performance measures during metric development for their improvement initiatives; (2) incorporating into after- action reports, information relating to performance measures; and (3) demonstrating sustained progress by, for example, increasing its visibility of assets through radio-frequency identification (RFID), an automated data-capture technology that can be used to electronically identify, track, and store information contained on a tag. According to DOD, the use of RFID tags to provide visibility of sustainment cargo at the tactical leg (i.e., the last segment of the distribution system) resulted in $1.4 million annual cost savings. DOD’s actions for the materiel distribution segment of this high-risk area included (1) making progress in developing its suite of distribution performance metrics; (2) incorporating distribution metrics, as appropriate, on the performance of all legs of the distribution system, including the tactical leg; (3) making progress in refining its Materiel Distribution Improvement Plan and incorporating additional actions based on interim progress and results; and (4) improving its capability to comprehensively measure distribution performance, identifying distribution problems and root cause, and implementing solutions. According to DOD, initiatives focused on distribution process and operational improvements have resulted in at least $1.56 billion in distribution cost avoidances to date. As we have with areas previously removed from the High-Risk List, we will continue to monitor this area to ensure that the improvements we have noted are sustained. Appendix II provides additional information on this high-risk area. We are removing the area of Mitigating Gaps in Weather Satellite Data from the High-Risk List because—with strong congressional support and oversight—the National Oceanic and Atmospheric Administration (NOAA) and DOD have made significant progress since 2017 in establishing and implementing plans to mitigate potential gaps in weather satellite data. The United States relies on polar-orbiting satellites to provide a global perspective on weather every morning and afternoon. NOAA is responsible for the polar satellite program that crosses the equator in the afternoon while DOD is responsible for the polar satellite program that crosses the equator in the early morning orbit. NOAA’s actions for polar- orbiting weather satellites that addressed the remaining criteria of action plan and demonstrated progress included (1) issuing three updates to its gap mitigation plan between January 2016 and February 2017 to address shortfalls we had identified previously; and (2) successfully launching the NOAA-20 satellite in November 2017, which is currently operational and is being used to provide advanced weather data and forecasts. Moreover, NOAA is also working to build and launch the next satellites in the polar satellite program. DOD’s actions for polar-orbiting weather satellites, pursuant to statutes and accompanying congressional direction, included DOD leadership (1) developing and implementing plans to acquire satellites as part of a family of systems to replace its aging legacy weather satellites, including awarding a contract for its Weather System Follow-on–Microwave program, planned for launch in 2022; (2) establishing plans to meet its highest-priority weather monitoring data collection needs that will not be covered by the Weather System Follow-on–Microwave program, including by acquiring and launching the Electro-Optical/Infrared Weather Systems satellite in 2024; and (3) monitoring the Weather System Follow-on- Microwave satellite program’s progress toward addressing critical needs and assessing its operations and sustainment costs. As we have with areas previously removed from the High-Risk List, we will continue to monitor this area to ensure that the improvements we have noted are sustained. Appendix II provides additional information on this high-risk area. Executive branch agencies are not meeting investigation timeliness objectives, and these processing delays have contributed to a significant backlog that the National Background Investigations Bureau (NBIB)—the agency responsible for personnel security clearance investigations— reported to be approximately 565,000 investigations as of February 2019. In addition, the executive branch has not finalized performance measures to ensure the quality of background investigations and some long- standing key reform initiatives remain incomplete. Further, information technology (IT) security concerns may delay planned milestones for the development of a new background investigation IT system. We included the DOD program on our High-Risk List in 2005 and removed it in 2011 because of improvements in the timeliness of investigations and adjudications, and steps toward measuring the quality of the process. We put the government-wide personnel security clearance process on our High-Risk List in January 2018 because of significant challenges related to the timely processing of security clearances and completing the development of quality measures. In addition, thITe government’s effort to reform the personnel security clearance process, starting with the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, has had mixed progress, and key reform efforts have not been implemented government-wide. Since adding this area to the High-Risk List, the Security Clearance, Suitability, and Credentialing Performance Accountability Council (PAC), including its four principal members—the Deputy Director for Management of the Office of Management and Budget (OMB), the Director of National Intelligence (DNI); the Under Secretary of Defense for Intelligence; and the Director of the Office of Personnel Management (OPM)—have not fully met the five criteria for high-risk removal. Several issues contribute to the risks facing the government-wide personnel security clearance process: Clearance processing delays. Executive branch agencies are not meeting most investigation timeliness objectives. The percentage of executive branch agencies meeting established timeliness objectives for initial secret clearances, initial top secret clearances, and periodic reinvestigations decreased each year from fiscal years 2012 through 2018. For example, 97 percent of the executive branch agencies we reviewed did not meet the timeliness objectives for initial secret clearance investigations in fiscal year 2018. Lack of quality measures. While the executive branch has taken steps to establish government-wide performance measures for the quality of background investigations—including establishing quality assessment standards and a quality assessment reporting tool—it is unclear when this effort will be completed. Security clearance reform delays. The executive branch has reformed many parts of the personnel security clearance process— such as updating adjudicative guidelines to establish common adjudicative criteria for security clearances; however, some long- standing key initiatives remain incomplete—such as completing plans to fully implement and monitor continuous evaluation. IT security. DOD is responsible for developing a new system to support background investigation processes, and DOD officials expressed concerns about the security of connecting to OPM’s legacy systems since a 2015 data breach compromised OPM’s background investigation systems and files for 21.5 million individuals. As of December 2018, OPM has not fully taken action on our priority recommendations to update its security plans, evaluate its security control assessments, and implement additional training opportunities. However, since we added this area to our High-Risk List, the PAC has demonstrated progress in some areas. For example, NBIB reported that the backlog of background investigations decreased from almost 715,000 cases in January 2018 to approximately 565,000 cases in February 2019. NBIB officials credit an Executive Memorandum—issued jointly in June 2018 by the DNI and the Director of OPM and containing measures to reduce the investigation backlog—as a driver in backlog reduction. Further, in response to a requirement in the Securely Expediting Clearances Through Reporting Transparency (SECRET) Act of 2018, in September 2018, NBIB reported to Congress, for each clearance level, (1) the size of the investigation backlog, (2) the average length of time to conduct an initial investigation and a periodic reinvestigation, and (3) a discussion of the factors contributing to investigation timeliness. The PAC is also reporting publicly on the progress of key reforms through www.performance.gov, and for fiscal year 2018, the website contains quarterly action plans and progress updates, which present figures on the average timeliness of initial investigations and periodic reinvestigations for the executive branch as a whole, investigation workload and backlog, and investigator headcounts. We have made numerous recommendations to PAC members to address risks associated with the personnel security clearance process between 2011—when we removed DOD’s personnel security clearance program from the High-Risk List, and 2018—when we placed the government-wide personnel security clearance process on the High-Risk List. We consider 27 of these recommendations key to addressing the high-risk designation. Eight recommendations key to the high-risk designation have been implemented, including three since January 2018. Nineteen of these key recommendations remain open—including recommendations that the principal members of the PAC (1) conduct an evidence-based review of investigation and adjudication timeliness objectives, (2) develop and report to Congress on investigation quality measures, (3) prioritize the timely completion of efforts to modernize and secure IT systems that affect clearance holders government-wide, and (4) develop and implement a comprehensive workforce plan that identifies the workforce needed to meet current and future demand for background investigations services and to reduce the investigations backlog. See page 170 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. VA spends tens of billions of dollars to procure a wide range of goods and services—including medical supplies, IT, and construction of hospitals, clinics, and other facilities—to meet its mission of providing health care and other benefits to millions of veterans. VA has one of the most significant acquisition functions in the federal government, both in obligations and number of contract actions. The Veterans Health Administration (VHA) provides medical care to veterans and is by far the largest administration in the VA. Since we began focusing on VA’s acquisition management activities in 2015, we have reported numerous challenges in this area. Since 2015, we have made 31 recommendations, 21 of which remain open, that cover a range of areas to address challenges in VA’s acquisition management. In fiscal year 2019, VA received the largest discretionary budget in its history—$86.5 billion, about $20 billion higher than in 2015. About a third of VA’s discretionary budget in fiscal year 2017, or $26 billion, has been used to contract for goods and services. VA’s acquisition management continues to face challenges including (1) outdated acquisition regulations and policies; (2) lack of an effective medical supplies procurement strategy; (3) inadequate acquisition training; (4) contracting officer workload challenges; (5) lack of reliable data systems; (6) limited contract oversight and incomplete contract file documentation; and (7) leadership instability. In light of these challenges and given the significant taxpayer investment, it is imperative that VA show sustained leadership commitment to take steps to improve the performance of its procurement function so that it can use its funding in the most efficient manner possible to meet the needs of those who served our country. This area has been added to the High-Risk List for the following reasons in particular: Outdated acquisition regulations and policies. VA’s procurement policies have historically been outdated, disjointed, and difficult for contracting officers to use. In September 2016, we reported that the acquisition regulations contracting officers currently follow have not been fully updated since 2008 and that VA had been working on completing a comprehensive revision of its acquisition regulations since 2011. VA’s delay in updating this fundamental source of policy has impeded the ability of contracting officers to effectively carry out their duties. We recommended in September 2016 that VA identify measures to expedite the revision of its acquisition regulations and clarify what policies are currently in effect. VA concurred with this recommendation but has not yet fully implemented it. Lack of an effective medical supplies procurement strategy. VA’s Medical Surgical Prime Vendor-Next Generation (MSPV-NG) program for purchasing medical supplies to meet the needs of about 9 million veterans at 172 medical centers has not been effectively executed, nor is it in line with practices at leading hospitals that have launched similar programs. We reported in November 2017 that VA’s approach to developing its catalog of supplies was rushed and lacked key stakeholder involvement and buy-in. As a result, VA was not able to accomplish some of the key efficiencies the program was intended to achieve, such as streamlining the purchase of medical supplies and saving money. We recommended in November 2017 that VA develop, document, and communicate to stakeholders an overarching strategy for the program. VA concurred with this recommendation and reported that it would develop a new strategy by March 2019. Contracting officer workload challenges. The majority of our reviews since 2015 have highlighted workload as a contributing factor to the challenges that contracting officers face. Most recently, in September 2018, we reported that about 54 percent of surveyed VA contracting officers said their workload was not reasonable. In addition, in September 2016, we reported that VHA contracting officers processed a large number of emergency procurements of routine medical supplies, which accounted for approximately 20 percent of VHA’s overall contract actions in fiscal year 2016, with obligations totaling about $1.9 billion. Contracting officers told us that these frequent and urgent small-dollar transactions reduce contracting officers’ efficiency and ability to take a strategic view of procurement needs. We recommended in November 2017 that VHA network contracting offices work with medical centers to identify opportunities to more strategically purchase goods and services frequently purchased on an emergency basis. VA concurred with this recommendation and reported in December 2018 that it is utilizing a supply chain dashboard to track items purchased on an emergency basis and determine which of those items to include on the catalog. VA noted that it added 13,300 items to the catalog from June 2018 to December 2018, including items often purchased on an emergency basis. We requested documentation showing which items added to the catalog were previously purchased on an emergency basis, but as of January 2019, VA had not yet provided it. Among other things, VA should implement our 21 open recommendations and specifically needs to take the following steps to demonstrate greater leadership commitment and strategic planning to ensure efficient use of its acquisition funding and staffing resources: Prioritize completing the revision of its acquisition regulations, which has been in process since 2011. Develop, document, and communicate to stakeholders a strategy for the Medical Surgical Prime Vendor program to achieve overall program goals. Identify opportunities to strategically purchase goods and services that are frequently purchased on an emergency basis. See page 210 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. In addition to specific areas that we have designated as high-risk, other important challenges facing our nation merit continuing close attention. One of these is the use of illicit drugs and the misuse of prescription drugs and the ways they affect individuals, their families, and the communities in which they live. Over 70,000 people died from drug overdoses in 2017—about 191 people every day—according to the Centers for Disease Control and Prevention, with the largest portion of these deaths attributed to opioids. Further, drug overdoses are the leading cause of death due to injuries in the United States. They are currently at their highest ever recorded level and, since 2011, have outnumbered deaths by firearms, motor vehicle crashes, suicide, and homicide, according to the Drug Enforcement Administration. The Council of Economic Advisors estimates that in 2015, the economic cost of the opioid crisis alone was more than $500 billion when considering the value of lives lost due to opioid-related overdose. Federal drug control efforts spanning prevention, treatment, interdiction, international operations, and law enforcement represent a considerable federal investment. According to the President’s fiscal year 2019 budget, federal drug control funding for fiscal year 2017 was $28.8 billion. Multiple federal agencies have ongoing efforts to respond to this crisis, including efforts to reduce the supply and demand for illicit drugs, to prevent misuse of prescription drugs, and to treat substance use disorders. However, we previously found that many efforts lacked measures to gauge the success of the federal response. Further, we have long advocated an approach to decision-making based on risk management. Such an approach would (1) link agencies’ plans and budgets to achieving their strategic goals, (2) assess values and risks of various courses of actions to help set priorities and allocate resources, and (3) provide for the use of performance measures to assess progress. The Office of National Drug Control Policy (ONDCP) is responsible for overseeing and coordinating the implementation of U.S. drug policy, including developing the National Drug Control Strategy (Strategy). ONDCP released the 2019 Strategy on January 31, 2019. The Strategy focuses on approaches related to prevention, treatment and recovery, and steps to reduce the availability of illicit drugs in the United States. We will continue to monitor the extent to which ONDCP and other federal agencies are employing a risk management and coordinated approach to their efforts to limit drug misuse. In particular, we have ongoing and planned work to assess ONDCP’s operations, including its (1) leadership and coordination of efforts across the federal government; (2) the effects of the drug crisis on labor force participation and productivity and on people with disabilities and other vulnerable populations; (3) key federal efforts to reduce the availability of illicit drugs; and (4) agency efforts around drug education and prevention. We will determine whether this issue should be added to the High-Risk List once we have completed this ongoing and planned work. Agencies can show progress by addressing our five criteria for removal from the list: leadership commitment, capacity, action plan, monitoring, and demonstrated progress. As shown in table 1, 24 high-risk areas, or about two-thirds of all the areas, have met or partially met all five criteria for removal from our High-Risk List; 20 of these areas fully met at least one criterion. Compared with our last assessment, 7 high-risk areas showed progress in one or more of the five criteria without regressing in any of the criteria. Ten high-risk areas have neither met nor partially met one or more criteria. Two areas showed mixed progress by increasing in at least one criterion and also declining in at least one criterion. Three areas declined since 2017. These changes are indicated by the up and down arrows in table 1. Figure 1 shows that since our 2017 update, the most progress was made on the action plan criterion—four high-risk areas received higher ratings. We rated two areas lower on leadership commitment and two areas lower on monitoring. Table 2 shows that 17 of the 34 high-risk areas we rated have met the leadership commitment criterion while two high-risk area ratings regressed on leadership commitment from met to partially met since our last report. Leadership commitment is the critical element for initiating and sustaining progress, and leaders provide needed support and accountability for managing risks. Leadership commitment is needed to make progress on the other four high-risk criteria. Table 2 shows that only three high-risk areas met the criterion for capacity, six met the criterion for action plan, and two met the criterion for demonstrated progress. One high-risk area—U.S. Government’s Environmental Liability—has partially met only one criterion since we added the area to our list in 2017 and the rest are not met. As noted, seven areas showed improvement in one or more criterion without regressing in any criteria. Two areas showed sufficient progress to be removed from the High-Risk List. The other five high-risk areas remaining on the 2019 list demonstrated improvement and are described below. Three of these five improving high-risk areas are the responsibility of the Department of Defense (DOD)—DOD Support Infrastructure Management, DOD Financial Management, and DOD Business Systems Modernization. The two other improving areas are Department of Energy’s (DOE's) Contract Management for the National Nuclear Security Administration and Office of Environmental Management, and Medicare Program & Improper Payments. DOD Support Infrastructure Management: DOD manages a portfolio of real property assets that, as of fiscal year 2017, reportedly included about 586,000 facilities—including barracks, maintenance depots, commissaries, and office buildings. The combined replacement value of this portfolio is almost $1.2 trillion and includes about 27 million acres of land at nearly 4,800 sites worldwide. This infrastructure is critical to maintaining military readiness, and the cost to build and maintain it represents a significant financial commitment. Since our 2017 High-Risk Report, DOD’s rating for two criteria—leadership commitment and action plan—improved from partially met to met. DOD has demonstrated leadership commitment by stating its commitment to addressing key recommendations we have made by, for example, (1) better forecasting the initial Base Realignment and Closure (BRAC) costs for military construction, IT, and relocating military personnel and equipment; (2) better aligning infrastructure to DOD force structure needs by, for example, improving the accuracy and sufficiency of its excess capacity estimates; and (3) pursuing an effort to consolidate and standardize leases, which includes analyzing whether it is feasible to relocate functions from commercial leased space to existing space on an installation, thereby reducing leases and better utilizing excess space. DOD has developed action plans to better identify excess infrastructure and thus be positioned to dispose of it. For example, in the 2017 High- Risk Report, we stated that DOD’s Real Property Efficiency Plan includes DOD’s goals for reducing the footprint of its real property inventory and metrics to gauge progress, to be implemented by the end of 2020. We also found in 2018 that DOD was achieving cost savings and cost avoidances as it had begun using intergovernmental support agreements between military installations and local governments to obtain installation services, such as waste removal, grounds maintenance, and stray animal control. As a result of these and other actions, DOD now meets the action plan criterion for this high-risk area. As of December 2018, 23 recommendations related to this high-risk area remain open. DOD continues to partially meet the criteria for capacity, monitoring, and demonstrated progress. See page 158 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. DOD Financial Management: Since our 2017 High-Risk Report, ratings for the DOD Financial Management high-risk area improved for the criteria of leadership commitment and monitoring. For the leadership commitment criterion, the high-risk area rating improved from partially met to met in 2019 due to several DOD leadership actions. For example, in 2018, DOD leadership met the goal of undergoing an agency-wide financial statement audit and established a process to remediate any audit findings—ultimately to improve the quality of financial information that is most valuable in managing the department’s day-to-day operations. In addition, according to a DOD official, audit remediation efforts have produced benefits in certain inventory processes that have led to operational improvements. DOD leadership demonstrated its commitment to making needed improvements by developing a database that tracks hundreds of findings and recommendations that came out of the audits. In addition, senior leadership has been meeting bimonthly with military services’ leadership for updates on the status of corrective action plans to address audit findings and recommendations, and the Under Secretary of Defense (Comptroller) has been meeting frequently with the Secretary of Defense to review the plans. These same DOD actions also led to the high-risk area’s rating for the criterion of monitoring to improve from not met to partially met. For example, the database mentioned above is intended to capture, prioritize, and assign responsibility for auditor findings and related corrective action plans, which are meant to be used to measure progress towards achieving a clean audit opinion. Further, DOD leadership has held frequent meetings to discuss the status of corrective action plans. In addition, DOD also established councils in certain areas (e.g., financial reporting) to review the status of audit remediation activities and challenges. All of these actions demonstrate an improvement in DOD’s monitoring activities for its financial management function. However, DOD’s efforts to improve its financial management continue to be impaired by long-standing issues—including its decentralized environment; cultural resistance to change; lack of skilled financial management staff; ineffective processes, systems, and controls; incomplete corrective action plans; and the need for more effective monitoring and reporting. DOD remains one of the few federal entities that cannot accurately account for and report on its spending or assets. As of December 2018, 53 recommendations for this high-risk area are open. The DOD Financial Management high-risk area continues to partially meet the capacity and action plan criteria and not meet the demonstrated progress criterion. See page 147 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. DOD Business Systems Modernization: DOD spends billions of dollars each year to acquire modernized systems, including systems that address key areas such as personnel, financial management, health care, and logistics. This high-risk area includes three critical challenges facing DOD: (1) improving business system acquisition management, (2) improving business system investment management, and (3) leveraging DOD’s federated business enterprise architecture. DOD’s capacity for modernizing its business systems has improved over time and, since our 2017 High-Risk Report, DOD’s overall rating for the criterion of action plan improved from not met to partially met in 2019. DOD established a plan for improving its federated business enterprise architecture (i.e., description of DOD’s current and future business environment and a plan for transitioning to the future environment). Specifically, the rating improved for DOD’s federated business enterprise architecture segment of the high-risk area because DOD’s assistant deputy chief management officer approved a business architecture improvement plan in January 2017. Since 2017, we have made 10 recommendations related to this high-risk issue. As of December 2018, 27 recommendations are open. The leadership, capacity, monitoring, and demonstrated progress criteria remain partially met as in 2017. See page 152 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. . DOE's Contract Management for the National Nuclear Security Administration and Office of Environmental Management: DOE oversees a broad range of programs related to nuclear security, science, energy, and waste cleanup, among other areas. As the largest civilian contracting agency in the federal government, DOE relies primarily on contractors to carry out its programs. For instance, DOE spends about 90 percent of its annual budget on contracts and acquiring capital assets. In fiscal year 2018, DOE’s budget was $34.5 billion. The high-risk area focuses on contracts, as well as major projects—those with an estimated cost of $750 million or greater—managed by DOE’s National Nuclear Security Administration (NNSA) and Office of Environmental Management (EM). Since our 2017 High-Risk Report, DOE has made progress by improving from a not met to a partially met rating for the demonstrated progress criterion. Specifically, through its Office of Cost Estimating and Program Evaluation, NNSA has enhanced its capability to estimate costs and schedules, and to assess alternatives for programs and projects, among other things. NNSA also made progress by adopting best practices in several areas, such as those for estimating costs and schedules in nuclear weapons refurbishment activities and capital asset acquisitions. For example, we determined that DOE’s revised cost estimate of $17.2 billion to construct a Mixed Oxide Fuel Fabrication Facility to dispose of surplus, weapons-grade plutonium substantially met best practices— providing assurance that the estimated costs could be considered reliable. This finding contributed to DOE’s reevaluation of the project and ultimate termination, in October 2018, in favor of a potentially less costly disposal approach. Fifty-one of our recommendations were open as of December 2018; 15 recommendations were made since the last high-risk update in February 2017. DOE continues to meet the criterion of leadership commitment, partially meet the criteria for action plan and monitoring, and not meet the criterion for capacity. See page 217 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. . Medicare Program & Improper Payments: In calendar year 2017, Medicare, which is overseen by the Centers for Medicare & Medicaid Services (CMS), financed $702 billion worth of health services for approximately 58 million elderly and disabled beneficiaries. Medicare faces a significant risk with improper payments—payments that either were made in an incorrect amount or should not have been made at all— which reached an estimated $48 billion in fiscal year 2018. Since our 2017 High-Risk Report, estimated improper payment rates declined more than one percent across the Medicare program. In addition, CMS’ rating for the capacity criterion of the improper payments segment improved from partially met to met in 2019 due to several actions. First, the Center for Program Integrity’s (CPI) budget and resources have increased over time and the agency has established work groups and interagency collaborations to extend its capacity. For example, CMS allocated more staff to CPI after Congress provided additional funding. CPI’s full-time equivalent positions increased from 177 in 2011 to 419 in 2017. Additionally, in August 2017, we reported that CMS’s Fraud Prevention System, which analyzes claims to identify health care providers with suspect billing patterns, helped speed up certain fraud investigation processes. Further, the Healthcare Fraud Prevention Partnership helped improve information sharing among payers inside and outside of the government. Since 1990, when we added Medicare to our High-Risk List, we have made many recommendations related to the Medicare program, 28 of which were made since the last high-risk update in February 2017. As of December 2018, more than 80 recommendations remain open. CMS continues to meet the criterion of leadership commitment and to partially meet the remaining three criteria of action plan, monitoring, and demonstrated progress. See page 241 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Congress enacted several laws since our last report in February 2017 to help make progress on high-risk issues. Table 3 lists selected examples of congressional actions taken on high-risk areas. Congressional oversight also plays a vital role in addressing high-risk issues. For example, at a May 2018 hearing, we testified that the Census Bureau’s (Bureau) cost estimate was not reliable, and that the actual cost could be higher than planned. Further, the Secretary of Commerce created a dedicated team to provide oversight and guidance to the Bureau on cost estimation. In addition to its instrumental role in supporting progress in individual high-risk areas, Congress also enacted the following statutes that, if implemented effectively, will help foster progress on high-risk issues government-wide: Fraud Reduction and Data Analytics Act of 2015 (FRDAA):FRDAA is intended to strengthen federal antifraud controls. FRDAA requires OMB to use our Fraud Risk Framework to create guidelines for federal agencies to identify and assess fraud risks, and then design and implement control activities to prevent, detect, and respond to fraud. Agencies, as part of their annual financial reports beginning in fiscal year 2017, are further required to report on their fraud risks and their implementation of fraud reduction strategies, which should help Congress monitor agencies’ progress in addressing and reducing fraud risks. To aid federal agencies in better analyzing fraud risks, FRDAA requires OMB to establish a working group tasked with developing a plan for creating an interagency library of data analytics and data sets to facilitate the detection of fraud and the recovery of improper payments. This working group and the library should help agencies coordinate their fraud detection efforts and improve their ability to use data analytics to monitor databases for potential improper payments. The billions of dollars in improper payments, some of which may be a result of fraud, are a central part of the Medicare Program, Medicaid Program, and Enforcement of Tax Laws (Earned Income Tax Credit) high-risk areas. We reported in 2018 that, among other things, OMB did not involve all agencies subject to the act as required by FRDAA or hold the required minimum number of working-group meetings in 2017. As shown in figure 2, a majority of the 72 agencies surveyed indicated a lack of involvement with and information from the working group as challenges in implementing FRDAA. We made three recommendations, including that OMB ensure the working group meets FRDAA’s requirements to involve all agencies that are subject to the act and ensure that mechanisms to share controls, best practices, and data-analytics techniques are in place. OMB did not concur with our recommendations. We continue to believe the recommendations are valid, as discussed in the 2018 report. IT Acquisition Reform, statutory provisions known as the Federal Information Technology Acquisition Reform Act (FITARA): FITARA, enacted in December 2014, was intended to improve how agencies acquire IT and better enable Congress to monitor agencies’ progress in reducing duplication and achieving cost savings. Since the enactment of these provisions, OMB and federal agencies have paid greater attention to IT acquisition and operation, resulting in improvements to the government-wide management of this significant annual investment. These efforts have been motivated in part by sustained congressional support for improving implementation of this law, as highlighted in agencies’ FITARA implementation scores issued biannually by the House Committee on Oversight and Reform. This continuing oversight has produced positive results. For example, in the committee’s December 2018 FITARA implementation scorecard, 18 of the 24 major federal agencies received the highest possible rating for their efforts to improve the management of software licenses, of which we have found there are thousands annually across the government. Seven months earlier, in the prior scorecard, only eight agencies had achieved this rating. Moreover, federal agencies have taken actions to address 106 of the 136 related recommendations that we have made in this area since 2014. FITARA includes specific requirements related to seven areas: the federal data center consolidation initiative, enhanced transparency and improved risk management, agency Chief Information Officer authority enhancements, portfolio review, expansion of training and use of IT acquisition cadres, government-wide software purchasing, and maximizing the benefit of the federal strategic sourcing initiative. In November 2017, Congress extended or removed the sunset dates of several of these statutory requirements that were originally to end in 2018 and 2019. While all of the 24 federal agencies covered by this law have developed FITARA implementation plans, the agencies need to effectively execute these plans. Successfully addressing FITARA requirements is central to making progress in Improving the Management of IT Acquisitions and Operations, which has been on our High-Risk List since 2015. Program Management Improvement Accountability Act (PMIAA): Enacted in December 2016, the act is intended to improve program and project management in certain larger federal agencies. Among other things, the act requires the Deputy Director for Management of OMB to adopt and oversee implementation of government-wide standards, policies, and guidelines for program and project management in executive agencies. The act also requires the Deputy Director to conduct portfolio reviews to address programs we identify as high-risk. It further creates a Program Management Policy Council to act as the principal interagency forum for improving practices related to program and project management. The council is to review programs identified as high-risk and make recommendations to the Deputy Director or designee. OMB has produced a general strategy for implementing the law through 2022 and met some initial milestones required by PMIAA. For example, in June 2018, OMB issued OMB Memorandum M- 18-19, which includes: (1) agency guidance for implementing PMIAA, (2) a five-year strategic outline for improving program and project management, and (3) initial program management standards and principles. Further, agencies have designated Program Management Improvement Officers to guide their implementation of PMIAA. According to OMB, it began implementing PMIAA’s requirement to conduct portfolio reviews on high-risk areas by requiring relevant agencies to provide several items for discussion during the 2018 Strategic Review meetings. These annual meetings are to consist primarily of a discussion of agency progress towards each of the strategic objectives outlined in their strategic plans, but also cover other management topics such as enterprise risk management and high-risk area progress. According to OMB documents, in advance of these meetings, OMB required agencies to provide a high-level summary of (1) any disagreements with our recommendations, (2) progress barriers, and (3) actions needed by OMB, other agencies, or Congress to help the agency achieve progress towards removal from our High-Risk List. OMB officials told us their 2018 Strategic Review meetings did not address each high-risk area but did address government-wide high-risk areas, such as cybersecurity, information technology, and strategic human capital as they related to the President’s Management Agenda. In the past, senior management officials from OMB, applicable agencies, and our agency have met to address areas where additional management attention could be beneficial to high-risk issues. These trilateral meetings, beginning in 2007 and pre- dating PMIAA’s 2016 enactment, have continued across administrations. However, OMB has organized only one of these high-risk meetings since the last high-risk update in 2017, on the Government-wide Personnel Security Clearance Process. In November 2018, OMB told us of plans to hold additional meetings on priority high-risk areas, including the 2020 Decennial Census, Strategic Human Capital Management, Ensuring the Cybersecurity of the Nation, National Aeronautics and Space Administration (NASA) Acquisition Management, and Managing Federal Real Property. Effective implementation of PMIAA provides an important opportunity to enhance progress on high-risk areas by focusing leadership attention through the portfolio reviews and trilateral meetings. Further, a number of high-risk areas have longstanding or significant program and project management concerns, including the acquisition-related high-risk areas for DOD, DOE, NASA, and VA. These and other programs can benefit from improving program and project management. In December 2019, we will report on OMB’s progress in implementing PMIAA, including what further steps it has taken to use the portfolio review process required in PMIAA to address issues on our High-Risk List. Agency leaders took actions to implement our recommendations. These resulted in numerous improvements to programs and operation and improved service. Further, these actions to implement our recommendations resulted in significant financial benefits. Table 4 shows some examples of the financial benefits achieved since our last High-Risk Report. In the 2 years since our last High-Risk Report, three areas—NASA Acquisition Management, Transforming EPA's Process for Assessing and Controlling Toxic Chemicals, and Limiting the Federal Government's Fiscal Exposure By Better Managing Climate Change Risks—have regressed in their ratings against our criteria for removal from the High- Risk List. In addition, while progress is needed across all high-risk areas, we have identified nine additional areas that require significant attention to address imminent, longstanding, or particularly broad issues affecting the nation. NASA plans to invest billions of dollars in the coming years to explore space, improve its understanding of the Earth’s environment, and conduct aeronautics research, among other things. We designated NASA’s acquisition management as high risk in 1990 in view of NASA’s history of persistent cost growth and schedule delays in the majority of its major projects. Following several years of continuing a generally positive trend of limiting cost growth and schedule delays for its portfolio of major projects, we found that NASA’s average launch delay increased from 7 to 12 months between May 2017 and May 2018. Further, the overall development cost growth increased from 15.6 percent to at least 18.8 percent over the same time period. NASA’s largest science project, the James Webb Space Telescope, has experienced schedule delays of 81 months and cost growth of 95 percent since the project’s cost and schedule baseline was first established in 2009. NASA is at risk for continued cost growth and schedule delays in its portfolio of major projects. Since our 2017 high-risk update, we have lowered NASA acquisition management from meeting the rating to partially meeting the rating in two criteria—leadership commitment and monitoring. The other three criteria ratings remained the same as in 2017. Ratings for capacity and demonstrated progress remain partially met and the rating for action plan remains met. Over the next several years, NASA plans to add new, large, and complex projects to the portfolio, including a lunar Gateway—currently being discussed as a platform in a lunar orbit to mature deep space exploration capabilities. In addition, many of NASA’s current major projects, including some of the most expensive ones, are in the phase of their life cycles when cost growth and schedule delays are most likely. NASA acquisition management requires significant attention for the following reasons: NASA leadership has approved risky programmatic decisions for complex major projects, which compounded technical challenges. For example, leadership has approved some programs to proceed (1) with low cost and schedule reserves, (2) with overly aggressive schedules, and (3) without following best practices for establishing reliable cost and schedule baselines. NASA leadership has also not been transparent about cost and schedule estimates for some of its most expensive projects. Without transparency into these estimates, both NASA and Congress have limited data to inform decision making. NASA has not yet instituted a program for monitoring and independently validating the effectiveness and sustainability of the corrective action measures in its new action plan, which NASA finalized in December 2018. In addition, while NASA has taken some steps to build capacity to help reduce acquisition risk, including updating tools aimed at improving cost and schedule estimates, other areas still require attention. For example, we reported in May 2018 that several major NASA projects experienced workforce challenges, including not having enough staff or staff with the right skills. NASA has also identified capability gaps in areas such as scheduling, earned value management, and cost estimating, and has efforts underway to try to improve capacity in these areas. Since 2017, we have made 9 recommendations on this high-risk area, and as of December 2018, 15 recommendations remain open. These recommendations include that NASA needs to improve transparency of major project cost and schedule estimates, especially for its human spaceflight programs, as well as continue to build capacity to reduce acquisition risk. NASA will also need to implement its new action plan and track progress against it. See page 222 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The Environmental Protection Agency’s (EPA’s) ability to effectively implement its mission of protecting public health and the environment is dependent on it assessing the risks posed by chemicals in a credible and timely manner. Such assessments are the cornerstone of scientifically sound environmental decisions, policies, and regulations under a variety of statutes. Based on our work since our 2017 High-Risk Report, the overall rating for leadership commitment decreased from met to partially met due to limited information for completing chemical assessments and proposed budget cuts in the Integrated Risk Information System (IRIS) Program. The ratings for the remaining four criteria remain unchanged and are partially met. The EPA Acting Administrator indicated his commitment to fulfill the agency’s obligations under the Toxic Substances Control Act (TSCA) as amended by the 2016 Frank R. Lautenberg Chemical Safety for the 21 Century Act (Lautenberg Act) and ensure chemicals in the marketplace are safe for human health and the environment. Nonetheless, EPA needs to give more attention to several areas to fully realize the benefits of the new law, and to demonstrate additional progress in the IRIS Program, such as: While EPA released a document in late December 2018 called the IRIS Program Outlook, the Outlook fails to list the projected date for most of the assessments and includes no information regarding assessment prioritization—including how these assessments will meet program and regional office needs. The Lautenberg Act increases both EPA’s responsibility for regulating chemicals and its workload. EPA recently issued a rule under the act to collect fees from certain companies to defray a portion of the implementation costs, but it is unclear whether the fees collected will be sufficient to support relevant parts of the program. EPA issued a First Year Implementation Plan in June 2016 noting that this document is intended to be a roadmap of major activities EPA will focus on during the initial year of implementation. As of mid- February 2019 the plan has not been updated, according to publically available information, although EPA had indicated that it is a living document that will be further developed over time. EPA needs to ensure that the people and resources dedicated to the IRIS Program and TSCA implementation are sufficient. Our March 2019 report on chemical assessments provides information on what remains to be done to address challenges in the IRIS program and implement the Lautenberg Act. Since we added this area to our High-Risk List in 2009, we have made 12 recommendations to EPA related to IRIS and TSCA. As of February 2019, seven recommendations remain open. See page 204 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Numerous studies have concluded that climate change poses risks to many environmental and economic systems and creates a significant fiscal risk to the federal government. The rising number of natural disasters and increasing reliance on the federal government for assistance is a key source of federal fiscal exposure. As of December 2018, total federal funding for disaster assistance since 2005 is approaching half a trillion dollars (about $430 billion), most recently for catastrophic hurricanes, flooding, wildfires, and other losses in 2017 and 2018. The costliness of disasters is projected to increase as extreme weather events become more frequent and intense due to climate change. There are five areas where government-wide action is needed to reduce federal fiscal exposure, including, but not limited to, the federal government’s role as (1) the insurer of property and crops; (2) the provider of disaster aid; (3) the owner or operator of infrastructure; (4) the leader of a strategic plan that coordinates federal efforts and informs state, local, and private-sector action; and (5) the provider of data and technical assistance to decision makers. Neither global efforts to mitigate climate change causes nor regional adaptation efforts currently approach the scales needed to avoid substantial damages to the U.S. economy, environment, and human health over the coming decades, according to the November 2018 Fourth National Climate Assessment. Government-wide action is needed to improve the nation’s resilience to natural hazards and reduce federal fiscal exposure to climate change impacts. Congress continues to show its commitment to progress on this high-risk issue by enacting legislation. For example, in October 2018, the Disaster Recovery Reform Act was enacted, which, among other things, allows the President to set aside, with respect to each major disaster, a percentage of certain grants to use for pre-disaster hazard mitigation. In addition, the National Defense Authorization Act of 2018, required, among other things, DOD to report on climate impacts to its installations. However, the federal government has not made measurable progress since 2017 to reduce its fiscal exposure to climate change, and in some cases, has revoked prior policies designed to do so. Specifically, since 2017, the ratings for four criteria remain unchanged—three at partially met and one at not met. The rating for one criterion—monitoring—regressed to not met. Limiting the federal government’s fiscal exposure to climate change requires significant attention because the federal government has revoked prior policies that had partially addressed this high-risk area and has not implemented several of our recommendations that could help reduce federal fiscal exposure. For example, since our 2017 high-risk update, the federal government: revoked Executive Order 13690, which had established a government-wide federal flood risk management standard to improve the resilience of communities and federal assets against the impacts of flooding. This action could increase federal fiscal exposure, as taxpayer-funded projects may not last as long as intended because they are not required to account for future changes in climate-related risk. rescinded its guidance directing agencies to consider climate change in their National Environmental Policy Act of 1969 reviews for certain types of federal projects. has not implemented our July 2015 recommendation to establish a comprehensive investment strategy identifying, prioritizing, and implementing federal disaster resilience investments that could reduce federal fiscal exposure to climate change. has not implemented our November 2015 recommendations to create a national climate information system providing authoritative, accessible information useful for state, local, and private-sector decision making. We have made 62 recommendations related to this high-risk area, 12 of which were made since our February 2017 high-risk update. As of December 2018, 25 remain open. The federal government needs a cohesive strategic approach with strong leadership and the authority to manage climate change risks across the entire range of federal activities. See page 110 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Federal agencies and the nation’s critical infrastructures—such as energy, transportation systems, communications, and financial services— are dependent on information technology systems to carry out operations. The security of these systems and the data they use is vital to public confidence and national security, prosperity, and well-being. The risks to systems underpinning the nation’s critical infrastructure are increasing as security threats evolve and become more sophisticated. We first designated information security as a government-wide high-risk area in 1997. This was expanded to include protecting cyber critical infrastructure in 2003 and protecting the privacy of personally identifiable information in 2015. In 2018, we updated this high-risk area to reflect the lack of a comprehensive cybersecurity strategy for the federal government. Since 2010, we have made over 3,000 recommendations to agencies aimed at addressing cybersecurity shortcomings, including protecting cyber critical infrastructure, managing the cybersecurity workforce, and responding to cybersecurity incidents. Of those 3,000 recommendations, 448 were made since our last high-risk update in February 2017. Although many recommendations have been addressed, about 700 have not yet been implemented. Despite the number of unimplemented recommendations, since our 2017 High-Risk Report, the administration has made progress in this high-risk area as it continues to meet the leadership commitment criterion through various actions. These include the President issuing (1) an executive order in May 2017 requiring federal agencies to take a variety of actions, including better managing their cybersecurity risks and coordinating to meet reporting requirements related to cybersecurity of federal networks and critical infrastructure and (2) a National Security Strategy in December 2017 citing cybersecurity as a national priority and identifying needed actions. Further, the administration issued a government-wide reform plan and reorganization recommendations in June 2018 with, among other things, proposals for solving the federal cybersecurity workforce shortage. Additionally, the administration released a National Cyber Strategy in September 2018 outlining activities such as securing critical infrastructure, federal networks, and associated information. However, additional actions are needed. We have identified four major cybersecurity challenges facing the nation: (1) establishing a comprehensive cybersecurity strategy and performing effective oversight, (2) securing federal systems and information, (3) protecting cyber critical infrastructure, and (4) protecting privacy and sensitive data. To address the four major cybersecurity challenges, we identified 10 critical actions the federal government and other entities need to take. These critical actions include, for example, developing and executing a more comprehensive federal strategy for national cybersecurity and global cyberspace; addressing cybersecurity workforce management challenges; and strengthening the federal role in protecting the cybersecurity of critical infrastructure (see figure 3). Until these shortcomings are addressed, federal agencies’ information and systems will be increasingly susceptible to the multitude of cyber- related threats that exist. See page 178 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The expanded federal role in housing finance that began during the 2007–2009 financial crisis has substantially increased the government’s exposure to potential mortgage losses. Federally supported mortgages include those backed by the Federal National Mortgage Association (Fannie Mae) and the Federal Home Loan Mortgage Corporation (Freddie Mac)—collectively, the enterprises—which the Federal Housing Finance Agency (FHFA) placed into government conservatorships in 2008. Federal support also occurs through Federal Housing Administration (FHA) mortgage insurance and Government National Mortgage Association (Ginnie Mae) guarantees on mortgage-backed securities. The substantial financial assistance the enterprises required during and after the crisis, coupled with the large fiscal exposure they and other federal mortgage entities represent today, underscore the need to reform the federal role in housing finance. Delay in resolving the federal role in housing finance poses considerable risks. Through the enterprises, FHA, and Ginnie Mae, the federal government is exposed to potential losses on several trillion dollars in mortgage debt. A severe economic downturn could trigger significant taxpayer assistance to one or more of these entities. Congress and federal agencies have taken some steps to facilitate the transition to a revised federal role, such as holding hearings, introducing legislation, issuing regulations, and developing market monitoring tools. For example, in 2013 and 2014, housing and regulatory agencies finalized rules designed to prevent a recurrence of risky practices in originating and securing mortgages that contributed to the financial crisis. Additionally, FHFA and the Consumer Financial Protection Bureau have developed a representative database of mortgage information that could be useful for examining the effect of mortgage market reforms. However, overall progress on resolving the federal role will be difficult to achieve until Congress provides further direction by enacting changes to the housing finance system. Several issues contribute to the risks facing federal housing finance, including the following: More than 10 years after entering federal conservatorships, the enterprises’ futures remain uncertain and billions of taxpayer dollars remain at risk. Under agreements with the Department of the Treasury (Treasury), the enterprises have received $191.4 billion in capital support as of the end of fiscal year 2018 and have paid dividends to the department exceeding that amount. If they were to incur major additional losses, they would draw required amounts from their remaining $254.1 billion in Treasury commitments. In addition, prolonged conservatorships could hinder development of the broader mortgage securities market by creating uncertainty and crowding out private investment. Nonbanks (lenders and loan servicers that are not depository institutions) have played an increasingly large role in the mortgage market in recent years. While nonbanks have helped provide access to mortgage credit, they also may pose additional risks, in part because they are not federally regulated for safety and soundness. However, FHFA lacks statutory authority to examine nonbank mortgage servicers and other third parties who do business with and pose potential risks to the enterprises. The statutory 2 percent capital requirement for FHA’s $1.26 trillion mortgage insurance fund is not based on a specified risk threshold, such as the economic conditions the fund would be expected to withstand. As a result, it may not provide an adequate financial cushion under scenarios in which Congress may anticipate the fund would be self-sufficient. During the last housing downturn, the fund’s capital ratio fell below the required level and remained there for 6 consecutive years. At the end of fiscal year 2013, the fund required supplemental funds—about $1.7 billion—for the first time in its history. Six of our federal housing recommendations remain open, including those we made in June 2015 on assessing the effects of mortgage reforms already in place. Further, as we previously recommended in November 2016 and January 2019, Congress should consider housing finance reform legislation that: establishes objectives for the future federal role in housing finance, including the role and structure of the enterprises within the housing finance system; provides a transition plan to a reformed system that enables the enterprises to exit federal conservatorship; and addresses all relevant federal entities, including FHA and Ginnie Mae. As we recommended in March 2016 and November 2017, respectively, Congress also should consider granting FHFA explicit authority to examine nonbank servicers and other third parties that do business with the enterprises, and specifying the economic conditions FHA’s insurance fund would be expected to withstand without a substantial risk of requiring supplemental funds. See page 95 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Due to the significance and risk associated with Resolving the Federal Role in Housing Finance, we are separating it from the high-risk area of Modernizing the U.S. Financial Regulatory System. These areas were combined in our 2017 High-Risk report. See page 95 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The Pension Benefit Guaranty Corporation (PBGC) is responsible for insuring the defined benefit pension plans for nearly 37 million American workers and retirees, who participate in about 24,800 private sector plans. PBGC faces an uncertain financial future due, in part, to a long- term decline in the number of traditional defined benefit plans and the collective financial risk of the many underfunded pension plans that PBGC insures. PBGC’s financial portfolio is one of the largest of all federal government corporations. While PBGC’s single employer program had a net surplus of about $2.4 billion at the end of fiscal year 2018, its multiemployer program had a net deficit of about $54 billion—or a combined net accumulated financial deficit of over $51 billion. Its deficit has increased by nearly 45 percent since fiscal year 2013. PBGC has estimated that, without additional funding, its multiemployer insurance program will likely be exhausted by 2025 as a result of current and projected pension plan insolvencies. The agency’s single-employer insurance program is also at risk due to the continuing decline of traditional defined benefit pension plans, as well as premiums that are not well aligned to the financial risk presented by the plans it insures. While Congress and PBGC have taken significant and positive steps to strengthen the agency in the past 5 years, challenges related to PBGC’s funding and governance structure remain. Congress established a temporary Joint Select Committee on multiemployer pension plans in 2018—with the goal of improving the solvency of the multiemployer program. However, the committee did not release draft legislation. Addressing the significant financial risk and governance challenges that PBGC faces will require additional congressional action. Over the years since we added PBGC to the High-Risk List, we have suggested a number of matters for congressional consideration, including: (1) authorizing a redesign of PBGC’s single employer program premium structure to better align premium rates with sponsor risk; (2) adopting additional changes to PBGC’s governance structure—in particular, expanding the composition of its board of directors; (3) strengthening funding requirements for plan sponsors as appropriate given national economic conditions; (4) working with PBGC to develop a strategy for funding PBGC claims over the long term as the defined benefit pension system continues to decline; and (5) enacting additional structural reforms to reinforce and stabilize the multiemployer system, and balance the needs and potential sacrifices of contributing employers, participants, and the federal government. Absent additional steps to improve PBGC’s finances, the long-term financial stability of the agency remains uncertain, and the retirement benefits of millions of American workers and retirees could be at risk of dramatic reductions. See page 267 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. VA operates one of the largest health care delivery systems in the nation through its Veterans Health Administration (VHA), with 172 medical centers and more than 1,000 outpatient facilities organized into regional networks. VA has faced a growing demand by veterans for its health care services—due, in part, to the needs of an aging veteran population—and that trend is expected to continue. The total number of veterans enrolled in VA’s health care system rose from 7.9 million to more than 9 million from fiscal year 2006 through fiscal year 2017. Over that same period, VHA’s total budgetary resources have more than doubled, from $37.8 billion in fiscal year 2006 to $92.3 billion in fiscal year 2017. Given the importance of VHA’s mission, coupled with its lack of progress in addressing its high-risk designation, we continue to be concerned about VHA’s ability to ensure its resources are being used effectively and efficiently to improve veterans’ timely access to safe and high-quality health care. We have identified five areas of concern: (1) ambiguous policies and inconsistent processes; (2) inadequate oversight and accountability; (3) IT challenges; (4) inadequate training for VA staff; and (5) unclear resource needs and allocation priorities. VHA has begun to address each of these areas but, prior to Secretary Robert Wilkie’s July 2018 confirmation, its efforts were impeded by leadership instability. Since taking office, Secretary Wilkie has demonstrated his commitment to addressing the department’s high-risk designation by, among other things, creating an office to direct an integrated, focused high-risk approach and communicating to VA leaders the importance of addressing our recommendations. While VHA completed root cause analyses for each area of concern and developed an action plan in response, the plan lacks milestones and metrics needed to effectively monitor its implementation and demonstrate progress made in addressing the high-risk designation. Additionally, many of VHA’s capacity-building initiatives are either in the initial stages of development or are lacking necessary funding and resources. As such, VHA has not made sufficient progress since our 2017 update to improve its overall ratings, as two high-risk criteria remain partially met and three criteria remain unmet. We remain concerned about VHA’s ability to oversee its programs, hold its workforce accountable, and avoid ambiguous policies and inconsistent processes that jeopardize its ability to provide safe, high-quality care to veterans: In November 2017, we reported that, due in part to misinterpretation or lack of awareness of VHA policy, VA medical center officials did not always document or conduct timely required reviews of providers when allegations were made against them. As a result, we concluded that VA medical center officials may have lacked necessary information to reasonably ensure that their providers were competent to provide safe, high-quality care to veterans and to grant approvals about these providers’ privileges to perform specific clinical services at VA medical centers. We made four recommendations related to this and other findings, all of which remain open. In June 2018, we reported that VHA could not systematically monitor the timeliness of veterans’ access to Veterans Choice Program (VCP) care because it lacked complete, reliable data to do so. We also found that veterans, who were referred to the VCP for routine care because health care services were not available in a timely manner, could potentially wait for care up to 70 calendar days if the maximum amount of time allowed by VA processes is used. This wait time exceeds the statutory requirement that veterans receive VCP care within 30 days of the dates their VA health care providers indicated they should receive appointments, or if no such date existed, within 30 days of the veteran’s preferred date. We made 10 recommendations related to this and other findings, all of which remain open. Similarly, in July 2018, we reported that VA collected data related to employee misconduct and disciplinary actions, but data fragmentation and reliability issues impeded department-wide analysis of those data. Additionally, we found that VA did not consistently ensure that allegations of misconduct involving senior officials were reviewed according to its investigative standards or ensure these officials were held accountable. We made 16 recommendations related to this and other findings, all of which remain open. In November 2018, we reported that VHA’s suicide prevention media outreach activities declined in recent years due to leadership turnover and reorganization. Additionally, we found that VHA did not assign key leadership responsibilities or establish clear lines of reporting for its suicide prevention media outreach campaign, which hindered its ability to oversee the campaign. Consequently, we concluded that VHA may not be maximizing its reach with suicide prevention media content to veterans, especially those who are at-risk. This is inconsistent with VHA’s efforts to reduce veteran suicides, which is VA’s highest clinical priority. We made two recommendations related to this and other findings, both of which remain open. VA needs to further develop its capacity-building initiatives and establish metrics to monitor and measure its progress addressing the high-risk areas of concern. It is also important that our recommendations continue to be implemented. The department has implemented 209 of the 353 recommendations related to VA health care that we made from January 1, 2010 through December 2018, but more than 125 recommendations remain open as of December 2018. This includes 17 that are older than 3 years. In addition to addressing our recommendations, VA needs to make systemic change to department management and oversight in order to fully address the high-risk issues and improve the health care provided to our nation’s veterans. See page 275 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Mission-critical skills gaps both within federal agencies and across the federal workforce impede the government from cost-effectively serving the public and achieving results. For example, the difficulties in recruiting and retaining skilled health care providers and human resource staff at VHA’s medical centers make it difficult to meet the health care needs of more than 9 million veterans. As a result, VHA’s 168 medical centers have large staffing shortages, including physicians, registered nurses, physician assistants, psychologists, physical therapists, as well as human resource specialists and assistants. OPM continues to demonstrate top leadership commitment through its numerous efforts to assist agencies’ in addressing mission-critical skills gaps within their workforces. This includes providing guidance, training and on-going support for agencies on the use of comprehensive data analytic methods for identifying skills gaps and the development of strategies to address these gaps. However, since we first added strategic human capital management to our High-Risk List in 2001, we have reported on the need for agencies to address their workforce skills gaps. As of December 2018, OPM had not fully implemented 29 of our recommendations made since 2012 relating to this high-risk area. Staffing shortages and the lack of skills among current staff not only affect individual agencies but also cut across the entire federal workforce in areas such as cybersecurity and acquisition management. Skills gaps caused by insufficient number of staff, inadequate workforce planning, and a lack of training in critical skills are contributing to our designating other areas as high-risk. As table 5 shows, of the 34 other high-risk areas covered in this report, skills gaps played a significant role in 16 of the areas. Over the years since we added this area to our High-Risk List, in addition to recommendations to address critical skills gaps in individual high-risk areas, we have made numerous recommendations to OPM related to this high-risk issue, 29 of which remain open. Agencies also need to take action to address mission-critical skills gaps within their own workforces – a root cause of many high-risk areas. See page 75 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The 2010 Census was the costliest in history at about $12.3 billion; as of October 2017, the 2020 Census is projected to cost about $15.6 billion, a 27 percent increase. For the 2020 Census, the U.S. Census Bureau (Bureau) plans to implement several innovations, including new IT systems. Implementing these innovations, along with other challenges, puts the Bureau’s ability to conduct a cost-effective census at risk. The decennial census is mandated by the U.S. Constitution and provides vital data for the nation. Census data are used, among other purposes, to apportion seats in the Congress and allocate billions of dollars in federal assistance to state and local governments. To ensure its success, this complicated and costly undertaking requires careful planning, risk management, and oversight. Census activities, some of which are new for the 2020 cycle, must be carried out on schedule to deliver the state apportionment counts to the President by December 31, 2020. The Bureau and the Department of Commerce (Commerce) have strengthened leadership commitment with executive-level oversight of the 2020 Census by holding regular meetings on the status of IT systems and other risk areas. In addition, in 2017 Commerce designated a team to assist senior Bureau management with cost estimation challenges. These examples demonstrate both the Bureau’s and Commerce’s strong leadership commitment to implementing the 2020 Census. One of the Bureau’s major challenges is to control any further cost growth and develop cost estimates that are reliable and reflect best practices for the 2020 Census. According to the Bureau, the total cost of the 2020 Census is now estimated to be approximately $15.6 billion, more than $3 billion higher than previously estimated by the Bureau. The higher estimated life-cycle cost is due, in part, to the Bureau’s failure to previously include all cost associated with the decennial census. The Bureau’s schedule for developing IT systems has experienced delays that have compressed the time available for system testing, integration testing, and security assessments. These schedule delays have contributed to systems experiencing problems after deployment, as well as cybersecurity challenges. For example, as of December 2018, the Bureau had identified nearly 1,100 system security weaknesses that needed to be addressed. Continued schedule management challenges may compress the time available for the remaining system testing and security assessments, and increase the risk that deployed systems will either not function as intended, have security vulnerabilities, or both. As of January 2019, 30 of our recommendations related to this high-risk area had not been implemented. To make continued progress, the Bureau needs to ensure that its approach to strategic planning, IT management, cybersecurity, human capital management, internal collaboration, knowledge sharing, as well as risk and change management are all aligned toward delivering more cost-effective outcomes. Among other things, the Bureau needs to ensure cost growth is controlled and that the development and testing of key systems is completed and fully integrated with all census operations before the 2020 Census. In addition, the Bureau needs to address cybersecurity weaknesses in a timely manner and ensure that security risks are at an acceptable level before systems are deployed. See page 134 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. An improper payment is any payment that should not have been made or that was made in an incorrect amount (including overpayments and underpayments) under statutory, contractual, administrative, or other legally applicable requirements. Reducing improper payments—such as payments to ineligible recipients or duplicate payments—is critical to safeguarding federal funds. However, the federal government has consistently been unable to determine the full extent of improper payments and reasonably assure that appropriate actions are taken to reduce them. Since 2003—when certain agencies were required by statute to begin reporting improper payments—cumulative improper payment estimates have totaled about $1.5 trillion. As shown in figure 4, for fiscal year 2018, federal entities estimated about $151 billion in improper payments. Medicare and Medicaid improper payments and the Earned Income Tax Credit (EITC) improper payments—a part of the Enforcement of Tax Laws high-risk area—accounted for about 68.5 percent of this total. Federal spending for Medicare programs and Medicaid is expected to significantly increase in the coming years, so it is especially critical to take appropriate measures to reduce improper payments in these programs. Internal Revenue Service estimates also show that the EITC has consistently had a high improper payment rate. OMB has designated Medicare programs, Medicaid, and EITC as high-priority programs for improper payments, indicating they are amongst the highest-risk programs where the government can achieve the greatest return on investment for the taxpayer by ensuring that improper payments are eliminated. Our work has identified a number of strategic and specific actions agencies can take to reduce improper payments, which could yield significant savings, and help ensure that taxpayer funds are adequately safeguarded. Continued agency attention is needed to (1) identify susceptible programs, (2) develop reliable methodologies for estimating improper payments, (3) report as required by statute, and (4) implement effective corrective actions based on root cause analysis. Absent such continued efforts, the federal government cannot be assured that taxpayer funds are adequately safeguarded. See pages 241, 250, and 235 of the report (respectively) for additional detail on the Medicare Program & Improper Payments, Strengthening Medicaid Program Integrity, and Enforcement of Tax Laws high-risk areas, including more details on actions that need to be taken. The Internal Revenue Service (IRS) continues to face two pressing challenges in enforcing tax laws: addressing the tax gap—amounting to hundreds of billions of dollars each year when some taxpayers fail to pay the taxes that they owe—and combatting identity theft (IDT) refund fraud. Enforcement of Tax Laws has been on GAO’s high risk list since 1990. IRS enforcement of tax laws helps fund the U.S. government by collecting revenue from noncompliant taxpayers and, perhaps more importantly, promoting voluntary compliance by giving taxpayers confidence that others are paying their fair share. In 2016, IRS estimated that the average annual net tax gap, the difference between taxes owed and taxes paid on time, was $406 billion, on average, for tax years 2008-2010. While IRS continues to demonstrate top leadership support to address the tax gap, IRS’s capacity to implement new initiatives and improve ongoing enforcement and taxpayer service programs remains a challenge. For example, IRS’s strategic plan includes a goal to facilitate voluntary compliance and deter noncompliance that could address the tax gap. However, IRS could do more to identify specific efforts for improving compliance in its strategic plan, measure the effects of compliance programs—such as those used for large partnerships—and develop specific quantitative goals to reduce the tax gap. Such efforts would help IRS make more effective use of its resources and gauge the success of its strategies. The second challenge facing IRS is IDT refund fraud, which occurs when an identity thief files a fraudulent tax return using a legitimate taxpayer’s identifying information and claims a refund. IRS estimates that at least $12.2 billion in individual IDT tax refund fraud was attempted in 2016, of which it prevented at least $10.5 billion (86 percent). Of the amount attempted, IRS estimated that at least $1.6 billion (14 percent) was paid. IRS’s ability to combat IDT fraud continues to be challenged as more personally identifiable information has become readily available as a result of large-scale cyberattacks on various entities. This makes it more difficult for IRS to distinguish between fraudsters and legitimate taxpayers. While IRS has demonstrated some progress by developing tools and programs to further detect and prevent IDT refund fraud, it has not completed updating its authentication procedures to be in compliance with new government standards. As a result, IRS may be missing an opportunity to implement the most secure, robust technologies to protect taxpayers. As of December 2018, 189 GAO recommendations related to this high- risk area had not been implemented. To make continued progress on closing the tax gap, IRS needs to re-establish goals for improving voluntary compliance and develop and document a strategy that outlines how it will use its data to help address this issue. Reducing the tax gap will also require targeted legislative actions, including additional third- party information reporting, enhanced electronic filing, expanded math error authority (also referred to as correctible error authority), and paid preparer regulation. To help stay on top of IDT refund fraud, IRS should develop a comprehensive process to evaluate alternative options for improving taxpayer authentication. Given that IDT refund fraud continues to be a challenge, targeted legislative action, such as requiring a scannable code on returns prepared electronically but filed on paper could help IRS address such fraud. See page 235 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. The federal government currently invests more than $90 billion annually in IT, and OMB has implemented several key initiatives intended to help better manage this investment. Additionally, enactment of FITARA, in conjunction with greater attention paid to the acquisition and operation of IT, has helped further improve the government-wide management of this significant annual investment. OMB’s current level of top leadership support and commitment to ensure that agencies successfully execute its guidance on implementing FITARA and related IT initiatives has helped this high-risk area meet the leadership commitment high-risk criteria. Additional positive government-wide actions have enabled this high-risk area to partially meet the four remaining high-risk criteria. For example, OMB has established an IT Dashboard—a public website that provides detailed information on major IT investments at 26 federal agencies—and agencies’ data center consolidation efforts have resulted in a total savings of slightly more than 80 percent of the agencies’ planned $5.7 billion in savings since 2011. However, major federal agencies have yet to fully address the requirements of FITARA and realize billions of dollars in planned or possible savings and improved government performance through more efficient budgeting and management of IT. As government-wide spending on IT increases every year, the need for appropriate stewardship of that investment increases as well. However, OMB and federal agencies have not made significant progress since 2017 in taking the steps needed to improve how these financial resources are budgeted and utilized. While OMB has continued to demonstrate its leadership commitment through guidance and sponsorship of key initiatives, agencies still have not fully implemented all requirements of FITARA, such as putting into place authorities the law requires for chief information officers (CIO). Additionally, while the President’s Management Agenda has a goal to improve IT spending transparency, agencies are underreporting IT contract obligations by billions of dollars. OMB and the agencies also have not yet implemented hundreds of our recommendations on improving shortcomings in IT acquisitions and operations. In an August 2018 review of the 24 federal agencies covered by FITARA, none had IT management policies that fully addressed the role of their CIOs consistent with federal laws and guidance. Specifically, the majority of the agencies only minimally addressed, or did not address, their CIO’s role in assessing agency IT workforce needs and developing strategies and plans for meeting those needs. Correspondingly, the majority of the 24 CIOs acknowledged that they were not fully effective at implementing IT management responsibilities, such as IT strategic planning and investment management. Further, in January 2018, we reported that the majority of 22 agencies did not identify all of their IT acquisition contracts, totaling about $4.5 billion in IT-related contract obligations beyond those reported by agencies. In addition, in November 2018 we reported that four selected agencies lacked quality assurance processes for ensuring that billions of dollars requested in their IT budgets were informed by reliable cost information. Until agencies properly identify IT contracts and establish processes for ensuring the quality of cost data used to inform their budgets, agency CIOs are at risk of not having appropriate oversight of IT acquisitions and may lack adequate transparency into IT spending to make informed budget decisions. As of December 2018, OMB and federal agencies had fully implemented only 59 percent of the recommendations we have made since fiscal year 2010 to address shortcomings in IT acquisitions and operations. OMB and agencies should work toward implementing our remaining 456 open recommendations related to this high-risk area. These remaining recommendations include 12 priority recommendations to agencies to, among other things, report all data center consolidation cost savings to OMB, plan to modernize or replace obsolete systems as needed, and improve their implementation of PortfolioStat—an initiative that is to consolidate and eliminate duplicative systems. OMB and agencies need to take additional actions to (1) implement at least 80 percent of our open recommendations related to the management of IT acquisitions and operations, (2) ensure that a minimum of 80 percent of the government’s major IT acquisitions deliver functionality every 12 months, and (3) achieve at least 80 percent of the over $6 billion in planned PortfolioStat savings. See page 123 of the report for additional detail on this high-risk area, including more details on actions that need to be taken. Our high-risk program continues to be a top priority at GAO and we will maintain our emphasis on identifying high-risk issues across government and on providing recommendations and sustained attention to help address them, by working collaboratively with Congress, agency leaders, and OMB. As part of this effort, we hope to continue to participate in regular meetings with the OMB Deputy Director for Management and with top agency leaders to discuss progress in addressing high-risk areas. Such efforts have been critical for the progress that has been made. This high-risk update is intended to help inform the oversight agenda for the 116th Congress and to guide efforts of the administration and agencies to improve government performance and reduce waste and risks. Thank you, Chairman Johnson, Ranking Member Peters, and Members of the Committee. This concludes my testimony. I would be pleased to answer any questions. For further information on this testimony, please contact J. Christopher Mihm at (202) 512-6806 or MihmJ@gao.gov. Contact points for the individual high-risk areas are listed in the report and on our high-risk website. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. The following pages provide summaries of selected high-risk areas. These summaries are included in our High-Risk Report and are also available on our High-Risk List website, http://www.gao.gov/highrisk/overview. Embassy Construction: Pace is Slower Than Projected, and State Could Make Program Improvements. GAO-18-653. Washington, D.C.: September 25, 2018. Tax Administration: Opportunities Exist to Improve Monitoring and Transparency of Appeal Resolution Timeliness. GAO-18-659. Washington, D.C.: September 21, 2018. Information Technology: IRS Needs to Take Actions to Address Significant Risks to Tax Processing. GAO-18-298. Washington, D.C.: June 28, 2018. Cybersecurity Workforce: Agencies Need to Improve Baseline Assessments and Procedures for Coding Positions. GAO-18-466. Washington, D.C.: June 14, 2018. Defense Acquisition Workforce: Opportunities Exist to Improve Practices for Developing Program Managers. GAO-18-217. Washington, D.C.: February 15, 2018. Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements. GAO-18-175. Washington, D.C.: February 6, 2018. Bureau of Prisons: Better Planning and Evaluation Could Help Ensure Effective Use of Retention Incentives. GAO-18-147. Washington, D.C.: December 7, 2017. National Weather Service: Actions Have Been Taken to Fill Increasing Vacancies, but Opportunities Exist to Improve and Evaluate Hiring. GAO-17-364. Washington, D.C.: May 24, 2017. Strategic Human Capital Management: NRC Could Better Manage the Size and Composition of Its Workforce by Further Incorporating Leading Practices. GAO-17-233. Washington, D.C.: April 27, 2017. Veterans Health Administration: Actions Needed to Better Recruit and Retain Clinical and Administrative Staff. GAO-17-475T. Washington, D.C.: March 22, 2017. The ratings for capacity and action plan improved since our 2017 High-Risk Report and the remaining three criteria remain unchanged. Leadership commitment: met. OMB and GSA continue to take action to reduce costly leasing. For example, OMB proposed the creation of a capital revolving fund designed to facilitate ownership over operating leases for large-dollar buildings, although no action has been taken to implement it. An OMB staff member said that the legislative proposal to establish a capital fund was similar to an option we identified in a 2014 report. Additionally, GSA has developed a strategy to reduce leasing costs by a projected $4.7 billion by fiscal year 2023, through steps that include focusing resources on high-value lease renewals. Capacity: partially met. GSA made improvements and now partially meets the capacity criterion. Specifically, GSA implemented our September 2013 recommendation to develop a strategy to increase ownership investments for a prioritized list of high-value leases. These leases are for properties where it would be less expensive in the long run to own. GSA plans to purchase at least one leased building in 2019. In addition, as noted in our 2017 high-risk update, GSA could potentially help tenant agencies save millions of dollars from some leases by loaning them funds to improve newly leased spaces instead of agencies financing these costs with private-sector owners at private-sector interest rates. While GSA officials agreed that doing so would save money in interest fees, it has not yet developed a legislative proposal to obtain the needed authority, as we recommended in 2016. Action plan: met. GSA has made improvements and now meets the action plan criterion. GSA created an action plan to purchase buildings when it is more cost-effective than leasing by establishing criteria to rank and prioritize leased spaces that would benefit from federal ownership as discussed above. Additionally, GSA is implementing strategies to better manage leases that include avoiding short-term extensions and identifying opportunities to enter into long-term and lower cost leases. Monitoring: partially met. GSA continues to partially meet this criterion through implementation of the National Strategy, as noted in our 2017 high-risk update. However, GSA should also implement our recommendations to reduce the costs to tenants by exploring strategies to enhance competition for GSA leases and reducing unneeded fees. Additionally, GSA has identified actions to better monitor leases at different points along the process in order to minimize the need to enter into short-term, costly lease extensions. Demonstrated progress: partially met. GSA has made some progress in reducing the long-term costs of leasing by stemming the growth in leasing according to GSA data and committing to further reducing leasing costs. However, GSA must follow through on its plans to purchase leased buildings and reduce costs. GSA could also further reduce costs by loaning tenant agencies the funds needed to improve newly leased spaces but still needs to develop a legislative proposal to obtain authority to do so. GSA should develop a legislative proposal to obtain authority to loan agencies funds needed to improve newly leased spaces, as we recommended in 2016. Ratings for one criterion improved since our 2017 High-Risk Report and the other four criteria remain unchanged. Leadership commitment: met. In December 2017, GSA continued efforts to improve data reliability by completing a major effort to make the Federal Real Property Profile (FRPP) public. Also, as we reported in our 2017 High-Risk Report, GSA issued its Federal Real Property Data Validation and Verification (V&V) Guidance in May 2016 and required agencies to address 13,257 data anomalies it found in fiscal year 2016 data. Capacity: met. OMB and GSA continue to help agencies’ increase their capacity to submit accurate data. For example, GSA revised certain data elements’ definitions in 2016 and incorporated them in the 2018 FRPP Data Dictionary. In addition, OMB and GSA have further increased the capacity of FRPP to act as a government-wide database since additional agencies are required to report. Action plan: met. GSA has made progress by developing an action plan in 2017 for federal agencies to develop processes to assess, address, and track FRPP data quality. Specifically, this plan identifies data elements to appropriately indicate data quality, identifies best practices and other methods that help agencies measure and assess improvements, and enables federal agencies to develop performance metrics. Monitoring: partially met. While GSA required agencies to research the anomalies it found in its V&V process, only some agencies have identified and committed to correct mistakes. Further, of the 13,257 anomalies GSA identified in the fiscal year 2016 data, agencies overall acknowledged that less than 8 percent of the anomalies (1,004 anomalies) represented erroneous data to be corrected, while indicating that the others were correct. Furthermore, some agencies acknowledged less than 1 percent of the anomalies represented erroneous data. In addition, we found in 2018 that DOD did not correct discrepancies identified by its own V&V process. Demonstrated progress: partially met. While GSA and some agencies have taken action to correct data, serious data reliability challenges remain with some individual agencies that undermine the reliability of the FRPP. In 2018, we found that DOD’s real property data continue to be inaccurate and incomplete, and that DOD lacks a plan for making the necessary improvements. OMB and GSA should continue working with federal agencies to improve the reliability of their real property data through V&V efforts and encouraging agencies to implement action plans to better assess, address, and track data quality, as discussed in the above action plan. In particular, DOD should take steps to ensure that DOD improves the reliability of its real property data, as we recommended in 2018. Ratings for this segment remain unchanged since our 2017 High-Risk Report. Leadership commitment: met. DHS’s Federal Protective Service (FPS) continues to take action to address our recommendations. The Interagency Security Committee (ISC), an organization chaired by DHS that sets standards for physical security for federal nonmilitary facilities, also continues to implement the updated Risk Management Process—a consolidated set of standards for physical security at federal facilities. In addition, in 2018, GSA, the Administrative Office of the U. S. Courts (AOUSC), the U.S. Marshals Service, and FPS implemented our 2017 recommendation to establish a national-level working forum for courthouse security, known as the Interagency Judicial Security Council. Capacity: partially met. FPS has taken several actions to address identified physical security issues since our 2017 High-Risk Report. For example, in 2018 FPS improved its risk assessment tool to incorporate all necessary elements recommended by the ISC, which has now certified it. In 2018, FPS also addressed our recommendation related to improving training for instructors and identified actions to address our recommendations associated with tracking guard training. Finally, in 2018, FPS also implemented several actions associated with our recommendation to develop human capital-related performance measures to evaluate progress towards agency goals. Some agencies may not have the capacity to conduct adequate risk assessments because their processes do not fully align with the ISC Risk Management Process. To improve their capacity, the U.S. Customs and Border Protection, Federal Aviation Administration, and the Department of Veterans’ Affairs still need to complete an assessment of their policies against the ISC’s standards in response to our 2017 and 2018 recommendations. Action plan: partially met. In September 2018, FPS and GSA signed a memorandum of agreement (MOA) clarifying their respective roles and responsibilities for federal facility security. However, FPS, GSA, and the Department of Justice have not yet addressed our 2011 recommendation to address a number of courthouse security challenges. Specifically, FPS, the U.S. Marshals Service, AOUSC, and GSA are still working to finalize the draft MOA on courthouse security. Monitoring: partially met. FPS continues to develop a system that will allow FPS to verify independently that FPS’s contract guards are current on all training and certification requirements, and are taking steps to close this recommendation as implemented. FPS expects that system to be in place in 2019. In 2018, we also found that actions were needed to better address various emerging security threats to federal facilities. Demonstrated progress: not met. The federal government has not demonstrated progress to improve physical security. Although agencies have taken some actions, time is needed for agencies to demonstrate the results of these actions. Additionally, agencies need to complete other actions. For example, once FPS, the U.S. Marshals Service, AOUSC, and GSA sign their MOA on courthouse security, they will be able to better protect federal facilities. Further, once FPS fully implements its guard management system and it interacts with its training system, FPS will be able to obtain information to assess its guards’ capability to address physical security risks across its portfolio. To improve the physical security of federal buildings, the following steps are necessary: Clarify roles and responsibilities for the protection of federal facilities by finalizing the MOA for federal courthouse security between GSA, FPS, the U.S. Marshals, and AOUSC, as we recommended in 2011. FPS must validate training information being entered to ensure that guards are getting critical training, as we recommended in 2012. Implement our recommendations for agencies to improve their monitoring of collaborative efforts to protect federal facilities, as we recommended in 2015. Take actions to better address emerging security threats to federal facilities, as we recommended in 2018. Federal Facility Security: Actions Needed to Better Address Various Emerging Threats. GAO-19-32SU. Washington, D.C.: October 17, 2018. Defense Real Property: DOD Needs to Take Additional Actions to Improve Management of Its Inventory Data. GAO-19-73. Washington, D.C.: November 13, 2018. Federal Buildings: More Consideration of Operations and Maintenance Costs Could Better Inform the Design Excellence Program. GAO-18-420. Washington, D.C.: May 22, 2018. Federal Real Property: Agencies Make Some Use of Telework in Space Planning but Need Additional Guidance. GAO-18-319. Washington, D.C.: March 22, 2018. Federal Buildings: Agencies Focus on Space Utilization As They Reduce Office and Warehouse Space. GAO-18-304. Washington, D.C.: March 8, 2018. VA Facility Security: Policy Review and Improved Oversight Strategy Needed. GAO-18-201. Washington, D.C.: January 11, 2018. Federal Facility Security: Selected Agencies Should Improve Methods for Assessing and Monitoring Risk. GAO-18-72. Washington, D.C.: October 26, 2017. Federal Real Property: GSA Should Inform Tenant Agencies When Leasing High-Security Space from Foreign Owners. GAO-17-195. Washington, D.C.: January 3, 2017. Postal Retiree Health Benefits: Unsustainable Finances Need to Be Addressed. GAO-18-602. Washington, D.C: August 31, 2018. U.S. Postal Service: Projected Capital Spending and Processes for Addressing Uncertainties and Risks. GAO-18-515. Washington, D.C.: June 28, 2018. International Mail: Information on Changes and Alternatives to the Terminal Dues System. GAO-18-112. Washington, D.C.: October 12, 2017. U.S. Postal Service: Key Considerations for Potential Changes to USPS’s Monopolies. GAO-17-543. Washington, D.C.: June 22, 2017. U.S. Postal Service: Key Considerations for Restoring Fiscal Sustainability. GAO-17-404T. Washington, D.C.: February 7, 2017. U.S. Postal Service: Continuing Financial Challenges and the Need for Postal Reform. GAO-16-651T. Washington, D.C.: May 11, 2016. U.S. Postal Service: Financial Challenges Continue. GAO-16-268T. Washington, D.C.: January 21, 2016. Information Technology: Departments Need to Improve Chief Information Officers’ Review and Approval of IT Budgets. GAO-19-49. Washington, D.C.: November 13, 2018. Federal Chief Information Officers: Critical Actions Needed to Address Shortcomings and Challenges in Implementing Responsibilities. GAO-18-93. Washington, D.C.: August 2, 2018. Data Center Optimization: Continued Agency Actions Needed to Meet Goals and Address Prior Recommendations. GAO-18-264. Washington, D.C.: May 23, 2018. Information Technology: Agencies Need to Involve Chief Information Officers in Reviewing Billions of Dollars in Acquisitions. GAO-18-42. Washington, D.C.: January 10, 2018. Information Technology: OMB Needs to Report On and Improve Its Oversight of the Highest Priority Programs. GAO-18-51. Washington, D.C.: November 21, 2017. Information Technology Reform: Agencies Need to Improve Certification of Incremental Development. GAO-18-148. Washington, D.C.: November 7, 2017. Data Center Optimization: Agencies Need to Address Challenges and Improve Progress to Achieve Cost Savings Goal. GAO-17-448. Washington, D.C.: August 15, 2017. Data Center Optimization: Agencies Need to Complete Plans to Address Inconsistencies in Reported Savings. GAO-17-388. Washington, D.C.: May 18, 2017. Information Technology: Opportunities for Improving Acquisitions and Operations. GAO-17-251SP. Washington, D.C.: April 11, 2017. 2020 Census: Additional Steps Needed to Finalize Readiness for Peak Field Operations, GAO-19-140. Washington, D.C.: December 10, 2018. 2020 Census: Continued Management Attention Needed to Address Challenges and Risks with Developing, Testing, and Securing IT Systems, GAO-18-655. Washington, D.C.: August 30, 2018. 2020 Census: Census Bureau Improved the Quality of Its Cost Estimation but Additional Steps Are Needed to Ensure Reliability, GAO-18-635. Washington, D.C.: August 17, 2018. 2020 Census: Bureau Has Made Progress with Its Scheduling, but Further Improvement Will Help Inform Management Decisions, GAO-18-589. Washington, D.C.: July 26, 2018. 2020 Census: Actions Needed to Address Challenges to Enumerating Hard-to-Count Groups, GAO-18-599. Washington, D.C.: July 26, 2018. 2020 Census: Actions Needed to Improve In-Field Address Canvassing Operation, GAO-18-414. Washington, D.C.: June 14, 2018. 2020 Census: Actions Needed to Mitigate Key Risks Jeopardizing a Cost- Effective and Secure Enumeration, GAO-18-543T. Washington, D.C.: May 8, 2018. 2020 Census: Continued Management Attention Needed to Mitigate Key Risks Jeopardizing a Cost-Effective and Secure Enumeration, GAO-18-416T. Washington, D.C.: April 18, 2018. 2020 Census: Actions Needed to Mitigate Key Risks Jeopardizing a Cost- Effective Enumeration, GAO-18-215T. Washington, D.C.: October 31, 2017. 2020 Census: Continued Management Attention Needed to Oversee Innovations, Develop and Secure IT Systems, and Improve Cost Estimation, GAO-18-141T. Washington, D.C.: October 12, 2017. 2020 Census: Bureau Is Taking Steps to Address Limitations of Administrative Records, GAO-17-664. Washington, D.C.: July 26, 2017. Personnel Security Clearances: Additional Actions Needed to Implement Key Reforms and Improve Timely Processing of Investigations. GAO-18- 431T. Washington, D.C.: March 7, 2018. Personnel Security Clearances: Additional Actions Needed to Ensure Quality, Address Timeliness, and Reduce Investigation Backlog. GAO-18- 29. Washington, D.C.: December 12, 2017. Personnel Security Clearances: Plans Needed to Fully Implement and Oversee Continuous Evaluation of Clearance Holders. GAO-18-117. Washington, D.C.: November 21, 2017. Information Security: OPM Has Improved Controls, but Further Efforts Are Needed. GAO-17-614. Washington, D.C: August 3, 2017. Information Security: Agencies Need to Improve Controls over Selected High-Impact Systems. GAO-16-501. Washington, D.C.: May 18, 2016. Personnel Security Clearances: Funding Estimates and Government-wide Metrics Are Needed to Implement Long-Standing Reform Efforts. GAO- 15-179SU. Washington, D.C.: April 23, 2015. Information Security: OPM Has Implemented Many of GAO’s 80 Recommendations, but Over One-Third Remain Open. GAO-19-143R. Washington, D.C.: November 13, 2018. Cybersecurity: Office of Federal Student Aid Should Take Additional Steps to Oversee Non-School Partners’ Protection of Borrower Information. GAO-18-518. Washington, D.C.: September 17, 2018. High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation. GAO-18-622. Washington, D.C.: September 6, 2018. Information Security: IRS Needs to Rectify Control Deficiencies That Limit Its Effectiveness in Protecting Sensitive Financial and Taxpayer Data. GAO-18-391. Washington, D.C.: July 31, 2018. Data Protection: Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach. GAO-18-559. Washington, D.C.: August 30, 2018. High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation. GAO-18-645T. Washington, D.C.: July 25, 2018. Information Security: Supply Chain Risks Affecting Federal Agencies. GAO-18-667T. Washington, D.C.: July 12, 2018. Electronic Health Information: CMS Oversight of Medicare Beneficiary Data Security Needs Improvement. GAO-18-210. Washington, D.C.: March 6, 2018. Critical Infrastructure Protection: Additional Actions Are Essential for Assessing Cybersecurity Framework Adoption. GAO-18-211. Washington, D.C.: February 15, 2018. Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements. GAO-18-175. Washington, D.C.: February 6, 2018. DHS Acquisitions: Additional Practices Could Help Components Better Develop Operational Requirements. GAO-18-550 Washington, D.C.: August 8, 2018. Homeland Security Acquisitions: Leveraging Programs’ Results Could Further DHS’s Progress to Improve Portfolio Management. GAO-18-339SP Washington, D.C.: May 17, 2018. Cybersecurity Workforce: Urgent Need for DHS to Take Actions to Identify Its Position and Critical Skill Requirements. GAO-18-175, Washington, D.C.: February 6, 2018. DHS Financial Management: Better Use of Best Practices Could Help Manage System Modernization Project Risks. GAO-17-799 Washington, D.C.: September 26, 2017. Homeland Security: Progress Made to Implement IT Reform, but Additional Chief Information Officer Involvement Needed. GAO-17-284 Washington, D.C.: May 18, 2017. Homeland Security Acquisitions: Identifying All Non-Major Acquisitions Would Advance Ongoing Efforts to Improve Management. GAO-17-396 Washington, D.C.: April 13, 2017. Homeland Security Acquisitions: Earlier Requirements Definition and Clear Documentation of Key Decisions Could Facilitate Ongoing Progress. GAO-17-346SP Washington, D.C.: April 6, 2017. Error! No text of specified style in document. The following pages provide overviews of the two areas removed from the High-Risk List. Each overview discusses (1) why the area was high risk, and (2) why the area is being removed from the list. Each of these high- risk areas is also described on our High-Risk List website, http://www.gao.gov/highrisk/overview. Since our 2017 High-Risk Report, DOD has continued to meet the criteria of leadership commitment, capacity, and action plan for asset visibility. Further, DOD has fully addressed the three remaining actions and outcomes we outlined in 2017 in order to mitigate or resolve long-standing weaknesses in asset visibility. Consequently, DOD has met the monitoring and demonstrated progress criteria for asset visibility to remove this area from our High-Risk List. Leadership commitment: met. Senior leaders have continued to demonstrate commitment through their involvement in groups such as the Supply Chain Executive Steering Committee—senior-level officials responsible for overseeing asset visibility improvement efforts—and through the Asset Visibility Working Group, which identifies opportunities for improvement and monitors the implementation of initiatives by issuing its Strategy for Improving DOD Asset Visibility (Strategy) in 2014, 2015, and 2017. Capacity: met. DOD continues to demonstrate that it has the capacity— personnel and resources—to improve asset visibility. For example, DOD’s 2015 and 2017 Strategies advise the components to consider items such as staffing, materiel, and sustainment costs when documenting cost estimates for the initiatives in the Strategy, as we recommended in January 2015. Action plan: met. A provision in the National Defense Authorization Act for Fiscal Year 2014 required DOD to submit to Congress a comprehensive strategy and implementation plans for improving asset tracking and in-transit visibility. In January 2014, DOD issued the Strategy and accompanying implementation plans, which outlined initiatives intended to improve asset visibility. DOD updated its 2014 Strategy in October 2015 and in August 2017. Importantly, since 2017 DOD addressed the three remaining actions and outcomes related to the monitoring and demonstrated progress criteria through updates to and implementation of the Strategies (see table 7). Monitoring: met. DOD provided guidance in its 2017 update to the Strategy for the military components to consider key attributes of successful performance measures during metric development for their improvement initiatives. As appropriate, the military components have followed the guidance and provided high-level summary metrics updates to the Asset Visibility Working Group. In addition, DOD has taken steps to monitor asset visibility by incorporating into after-action reports, as appropriate, information relating to performance measures. These after- action reports serve as closure documents and permanent records of each initiative’s accomplishments. Demonstrated progress: met. DOD has demonstrated sustained progress by completing 34 of the 39 initiatives to improve asset visibility and continues to monitor the remaining 5 initiatives. These initiatives have supported DOD’s goals and objectives, which include: (1) improving visibility efficiencies of physical inventories, receipt processing, cargo tracking, and unit moves; (2) ensuring asset visibility data are discoverable, accessible, and understandable to support informed decision-making across the enterprise; and (3) increasing efficiencies for delivery accuracy and cycle times. Also, the Asset Visibility Working Group meets regularly to identify opportunities to further improve asset visibility within DOD. DOD has taken the following actions to demonstrate sustained progress: (1) created an integrated single portal system providing 7,500 users access to near-real-time, in-transit visibility of eight million lines of items of supply and transportation data; and (2) increased its visibility of assets through radio-frequency identification (RFID), an automated data-capture technology that can be used to electronically identify, track, and store information contained on a tag. There are two main types of RFID tags, passive and active, which show whether assets are in-storage, in-transit, in-process, or in-use. Passive tags, such as mass transit passes, do not contain their own power source and cannot initiate communication with a reader; while active tags, such as an “E-Z pass,” contain a power source and a transmitter, and send a continuous signal over longer distances. DOD closed nine initiatives from its Strategies by implementing RFID technology. For example, the Marine Corps implemented long-range passive RFID for visibility and accountability of items, resulting in improvements that include an increased range for “reading” an item— from 30 feet to 240 feet—and reduced inventory cycle times from 12 days to 10 hours. Also, the Navy reported that the use of passive RFID technology to support the overhaul of its nuclear-powered attack submarines enabled the Navy to better track parts, resulting in 98 percent fewer missing components and an average cost avoidance of $1.3 million per boat. Additionally, according to DOD, the use of RFID tags to provide visibility of sustainment cargo at the tactical leg resulted in $1.4 million annual cost savings. Further, DOD reported that the migration of the active RFID enterprise from a proprietary communication standard to a competitive multivendor environment reduced the cost of active RFID tags by half, resulting in an estimated $5.7 million annual reduction in costs. Since our 2017 High-Risk Report, DOD has continued to meet the criteria of leadership commitment, capacity, and action plan for materiel distribution. Further, DOD has fully addressed the four remaining actions and outcomes we outlined in 2017 in order to mitigate or resolve long-standing weaknesses in materiel distribution. Consequently, DOD has met the monitoring and demonstrated progress criteria for materiel distribution to remove this area from our High-Risk List. Leadership commitment: met. Senior leaders continue to demonstrate commitment through their involvement in groups such as the Supply Chain Executive Steering Committee—senior-level officials responsible for overseeing materiel distribution corrective actions—and through the Distribution Working Group, which helped develop the Materiel Distribution Improvement Plan (Improvement Plan) in 2016. Capacity: met. DOD has continued to demonstrate that it has the personnel and resources, such as key organizations and the associated governance structure, to improve materiel distribution. The Improvement Plan recognizes that additional resources will be required to accomplish its corrective actions and close any identified performance gaps within the time frame specified. Action plan: met. In 2016, DOD developed its corrective action plan to address the department’s materiel distribution challenges. The Improvement Plan details specific goals and actions to better measure the end-to-end distribution process, ensure the accuracy of underlying data, and strengthen and integrate distribution policies and the governance structure. Importantly, since 2017, DOD has fully addressed the four remaining actions and outcomes related to monitoring and demonstrated progress to mitigate or resolve long-standing weaknesses in materiel distribution (see table 8). Monitoring: met. DOD has monitored materiel distribution by making progress in developing its suite of distribution performance metrics, improving the quality of their underlying data, and sharing metrics information with stakeholders. For example, in January 2017, DOD developed a suite of performance metrics that provides a comprehensive picture of the distribution process, including whether supplies are delivered on time and at sufficient quantity and quality. Also, DOD implemented checklists to assess the quality of data underlying each performance metric based on relevance, accuracy, comparability, and interpretability. The checklists and their standards assist in identifying root causes and addressing areas where performance data quality may be lacking. DOD has also incorporated internal control requirements in its supply chain management guidance to increase confidence in the performance data. Additionally, DOD has revised its policy documents to require stakeholders to routinely capture and share distribution performance metrics, including cost data, and the department maintains websites to provide current performance information to distribution stakeholders. DOD has also incorporated distribution metrics, as appropriate, on the performance of all legs of the distribution system, including the tactical leg (i.e., the last segment of the distribution system). We previously reported on DOD’s deficiencies to accurately assess its distribution performance at the tactical leg, such as missing delivery dates for shipments in Afghanistan. Since that time, the geographic combatant commands have been tracking metrics at the tactical leg, including required delivery dates, to determine the movement and causes of delays for shipments, and have been sharing distribution performance information with the U.S. Transportation Command (TRANSCOM) through their deployment and distribution operations centers. DOD is implementing a cost framework to incorporate transportation costs for all legs of the distribution system, which will provide an additional metric for distribution stakeholders to assess the efficiency of the system. The first phase of the cost framework began operating in August 2018 and is expected to be fully implemented in 2019. DOD is making progress in refining its Improvement Plan and is incorporating additional actions based on interim progress and results. Since DOD issued the Improvement Plan in September 2016, the agency has (1) documented the results and monitored the status of each corrective action, (2) revised completion dates as needed, and (3) periodically provided decision makers with summary action charts, plans, and milestones. DOD is also updating its instruction on management and oversight of the distribution enterprise to clarify the roles and responsibilities of all distribution stakeholders. DOD officials have not determined a date for when this instruction will be issued. Demonstrated progress: met. DOD has demonstrated sustained progress in improving its capability to comprehensively measure distribution performance, identify distribution problems and root causes, and implement solutions. DOD has implemented 10 of 18 corrective actions in its Improvement Plan and is on track to implement the remaining 8 by September 2019. Because of this progress, DOD’s monthly shipment reports have assessed performance against enhanced metrics across the distribution system. For example, in December 2017, TRANSCOM investigated performance standards for truck deliveries from its Defense Logistics Agency warehouses in Bahrain to customers in Kuwait due to frequent delays in shipments. TRANSCOM determined that inadequate time for clearing customs in Kuwait resulted in an unrealistic delivery standard. TRANSCOM, in coordination with distribution stakeholders, adjusted the delivery standard to adequately account for the in-theater customs process. In addition, TRANSCOM, in partnership with the Defense Logistics Agency and the General Services Administration, developed and implemented initiatives focused on distribution process and operational improvements to reduce costs and improve distribution services to the warfighter. According to DOD, these efforts have resulted in at least $1.56 billion in distribution cost avoidances to date. DOD has demonstrated commendable, sustained progress improving its supply chain management. This does not mean DOD has addressed all risk within this area. It remains imperative that senior leaders continue their efforts to implement initiatives and corrective actions to maintain visibility of supplies, track cargo movements, meet delivery standards, and maintain delivery data for shipments. Continued oversight and attention are also warranted given the recent reorganization of the Office of the Under Secretary of Defense for Acquisition and Sustainment and the resulting change in the oversight structure of Supply Chain Management. We will therefore continue to conduct oversight of supply chain management at DOD. Defense Logistics: Improved Performance Measures and Information Needed for Assessing Asset Visibility Initiatives. GAO-17-183. Washington, D.C.: Mar. 16, 2017. Defense Logistics: DOD Has Addressed Most Reporting Requirements and Continues to Refine its Asset Visibility Strategy. GAO-16-88. Washington, D.C.: Dec. 22, 2015. Defense Logistics: Improvements Needed to Accurately Assess the Performance of DOD’s Materiel Distribution Pipeline. GAO-15-226. Washington, D.C.: Feb. 26, 2015. Since our last high-risk update in 2017, NOAA continues to meet the criteria of leadership commitment, capacity, and monitoring and now also meets the criteria of action plan and demonstrated progress. Leadership commitment: met. NOAA program officials met the leadership commitment criteria in 2015 and have continued to sustain their strong leadership commitment to mitigating potential satellite data gaps since that time. For example, NOAA issued and frequently updated its polar satellite gap mitigation plan, which identifies the specific technical, programmatic, and management steps the agency is taking to ensure that satellite mitigation options are viable. In addition, NOAA executives continue to oversee the acquisition of polar-orbiting satellites through monthly briefings on the cost, schedule, and risks affecting the satellites’ development. Capacity: met. NOAA continues to meet the criterion of improving its capacity to address the risk of a satellite data gap. In December 2014, we recommended that NOAA investigate ways to prioritize the gap mitigation projects with the greatest potential benefit to weather forecasting, such as by improving its high-performance computing capacity. NOAA agreed with this recommendation and implemented it. For example, NOAA upgraded its high-performance computers, which allowed the agency to move forward on multiple other mitigation activities, including experimenting with other data sources and assimilating these data into its weather models. and impacts, and (4) establishing a schedule with meaningful timelines and linkages among mitigation activities. The agency agreed with the recommendation and subsequently addressed it. Specifically, NOAA issued three updates to its gap mitigation plan between January 2016 and February 2017. With the last of the updates, the agency addressed the shortfalls we had identified. Monitoring: met. NOAA met this criterion in 2017, and continues to meet it now, by implementing our recommendations to more consistently and comprehensively monitor its progress on gap mitigation activities. For example, all three NOAA organizations responsible for gap mitigation projects regularly brief senior management on their progress. Demonstrated progress: met. NOAA now meets the criterion for demonstrated progress, which is an increase over its prior rating. In our 2017 High-Risk Report, we noted that NOAA had identified 35 different gap mitigation projects and was making progress in implementing them. These projects fell into three general categories: (1) understanding the likelihood and impact of a gap, (2) reducing the likelihood of a gap, and (3) reducing the impact of a gap. Nevertheless, one of the most important steps in reducing the likelihood of a gap—keeping the launch of the next polar satellite on schedule—had encountered problems. Specifically, agency officials decided to delay the launch due to challenges in developing the ground system and a critical instrument on the spacecraft. This delay exacerbated the probability of a satellite data gap. More recently, however, NOAA was able to demonstrate progress by successfully launching the satellite in November 2017. That satellite, now called NOAA-20, is currently operational and is being used to provide advanced weather data and forecasts. Moreover, the agency is also working to build and launch the next satellites in the polar satellite program. Since our last high-risk update in 2017, DOD now meets all five high-risk criteria. Fiscal Year 2015 (NDAA for FY 2015), the National Defense Authorization Act for Fiscal Year 2016 (NDAA for FY 2016), and the Consolidated Appropriations Act, 2016, DOD leadership committed to developing and implementing plans to address its weather satellite requirements. For example, in late 2017, the department awarded a contract for its Weather System Follow-on—Microwave satellite to fulfill core weather requirements. Capacity: met. With strong congressional oversight, DOD now meets the capacity criterion. Specifically, the NDAA for FY 2015 restricted the availability of 50 percent of the FY 2015 funds authorized for the Weather Satellite Follow-on System (now called the Weather System Follow-on— Microwave satellite program) until DOD submitted to the congressional defense committees a plan to meet weather monitoring data collection requirements. In addition, the explanatory statement that accompanied the Consolidated Appropriations Act, 2016, recommended that the Air Force focus on ensuring that the next generation of weather satellites meet the full spectrum of requirements and work with civil stakeholders to leverage appropriate civil or international weather assets. As called for in the law and the explanatory statement, DOD established plans to meet weather monitoring data collection needs, including by acquiring satellites as part of a family of systems to replace its aging legacy weather satellites. Additionally, DOD formally coordinated with NOAA on weather monitoring data collection efforts. In January 2017, the Air Force and NOAA signed a memorandum of agreement, and in November 2017, signed an annex to that agreement, to allow for the exchange of information and collaboration on a plan for collecting weather monitoring data. The Air Force and NOAA are now developing plans to relocate a residual NOAA satellite over the Indian Ocean, an area of concern for cloud characterization and area-specific weather imagery coverage. requirements. Under this program, the department may launch a demonstration satellite in 2021 and plans to launch an operational satellite in 2022. DOD also developed plans for providing its two highest-priority capabilities—cloud characterization and area-specific weather imagery data collection—that will not be covered by the Weather System Follow- on–Microwave satellite program. The department is planning a longer- term solution, called the Electro-Optical/Infrared Weather Systems program, to meet these needs, with a planned satellite launch in 2024. Meanwhile, DOD is in the process of acquiring a small prototype satellite, called the Operationally Responsive Space-8 satellite, to provide interim capabilities. DOD plans to launch Operationally Responsive Space-8 as early as 2022. Monitoring: met. DOD now meets the monitoring criterion as evidenced by its actions to initiate a major acquisition program, the Weather System Follow-on–Microwave, and award a contract for the first satellite. In addition, program officials stated that they plan to monitor the program’s progress toward addressing critical needs and assess its operations and sustainment costs. Demonstrated progress: met. DOD now meets the demonstrated progress criterion because it has developed plans and taken actions to address gaps in weather data through its plans to launch the Weather System Follow-on–Microwave satellite in 2022. The department also plans to launch the Electro-Optical/Infrared Weather Systems satellite in 2024 and provide interim capabilities beginning as early as 2022. By developing these plans, DOD has reduced the risk of a gap in weather satellite data and addressed the concerns about a lack of planning that we identified in our 2017 High-Risk Report. DOD’s effective implementation of its plans will be key to further reducing the risks of gaps in weather satellite data in the future. Moving forward, we will continue to monitor both NOAA and DOD efforts to develop and launch the next satellites in their respective weather satellite programs. NOAA plans to launch its next geostationary weather satellite in 2021 and to launch its next polar weather satellite in 2022. DOD plans satellite launches in 2021 (potentially), 2022, and 2024. In addition, we will continue to monitor DOD’s efforts to develop long-term plans to meet its weather satellite requirements. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: Apr. 25, 2018. Satellite Acquisitions: Agencies May Recover a Limited Portion of Contract Value When Satellites Fail. GAO-17-490. Washington, D.C.: June 9, 2017. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: Mar. 30, 2017. Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs. GAO-16-769T. Washington, D.C.: July 7, 2016. Polar Satellites: NOAA Faces Challenges and Uncertainties that Could Affect the Availability of Critical Weather Data. GAO-16-773T. Washington, D.C.: July 7, 2016. Polar Weather Satellites: NOAA Is Working to Ensure Continuity but Needs to Quickly Address Information Security Weaknesses and Future Program Uncertainties. GAO-16-359. Washington, D.C.: May 17, 2016. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal government is one of the world's largest and most complex entities; about $4.1 trillion in outlays in fiscal year 2018 funded a broad array of programs and operations. GAO's high-risk program identifies government operations with vulnerabilities to fraud, waste, abuse, and mismanagement, or in need of transformation to address economy, efficiency, or effectiveness challenges. This biennial update describes the status of high-risk areas, outlines actions that are still needed to assure further progress, and identifies two new high-risk areas needing attention by the executive branch and Congress. Solutions to high-risk problems save billions of dollars, improve service to the public, and would strengthen government performance and accountability. GAO uses five criteria to assess progress in addressing high-risk areas: (1) leadership commitment, (2) agency capacity, (3) an action plan, (4) monitoring efforts, and (5) demonstrated progress. The ratings for more than half of the 35 areas on the 2019 High-Risk List remain largely unchanged. Since GAO's last update in 2017, seven areas improved, three regressed, and two showed mixed progress by improving in some criteria but declining in others. Where there has been improvement in high-risk areas, congressional actions have been critical in spurring progress in addition to actions by executive agencies. GAO is removing two of the seven areas with improved ratings from the High-Risk List because they met all of GAO's five criteria for removal. The first area, Department of Defense (DOD) Supply Chain Management, made progress on seven actions and outcomes related to monitoring and demonstrated progress that GAO recommended for improving supply chain management. For example, DOD improved the visibility of physical inventories, receipt processing, cargo tracking, and unit moves. Improvements in asset visibility have saved millions of dollars and allow DOD to better meet mission needs by providing assets where and when needed. The second area, Mitigating Gaps in Weather Satellite Data, made significant progress in establishing and implementing plans to mitigate potential gaps. For example, the National Oceanic and Atmospheric Administration successfully launched a satellite, now called NOAA-20, in November 2017. NOAA-20 is operational and provides advanced weather data and forecasts. DOD developed plans and has taken actions to address gaps in weather data through its plans to launch the Weather System Follow-on–Microwave satellite in 2022. There are two new areas on the High-Risk List since 2017. Added in 2018 outside of GAO's biennial high-risk update cycle, the Government-Wide Personnel Security Clearance Process faces significant challenges related to processing clearances in a timely fashion, measuring investigation quality, and ensuring information technology security. The second area, added in 2019, is Department of Veterans Affairs (VA) Acquisition Management. VA has one of the most significant acquisition functions in the federal government, both in obligations and number of contract actions. GAO identified seven contracting challenges for VA, such as outdated acquisition regulations and policies, lack of an effective medical supplies procurement strategy, and inadequate acquisition training. Overall, 24 high-risk areas have either met or partially met all five criteria for removal from the list; 20 of these areas fully met at least one criterion. Ten high-risk areas have neither met nor partially met one or more criteria. While progress is needed across all high-risk areas, GAO has identified nine that need especially focused executive and congressional attention, including Ensuring the Cybersecurity of the Nation, Resolving the Federal Role in Housing Finance, addressing Pension Benefit Guaranty Corporation Insurance Programs, Managing Risks and Improving VA Health Care, and ensuring an effective 2020 Decennial Census. Beyond these specific areas, focused attention is needed to address mission-critical skills gaps in 16 high-risk areas, confront three high-risk areas concerning health care and tax law enforcement that include billions of dollars in improper payments each year, and focus on a yawning tax gap. This statement describes GAO's views on progress made and what remains to be done to bring about lasting solutions for each high-risk area. Substantial efforts are needed by the executive branch to achieve progress on high-risk areas. Addressing GAO's hundreds of open recommendations across the high-risk areas and continued congressional oversight and action are essential to achieving greater progress.", "document_type": "gao"}
{"report": "In 2012, the Secretary of Homeland Security issued a memorandum directing TSA to take a number of actions in response to allegations of profiling by behavior detection officers. These actions included, among others, working with the DHS Office of Civil Rights and Civil Liberties to (1) review, and revise as necessary, behavior detection officer training policies, training curriculum, and supervisory guidance to ensure they adequately address and train against profiling; (2) enhance data collection to facilitate appropriate supervision and monitoring of behavior detection activities; and (3) ensure passengers are aware of complaint mechanisms and ensure complaints are appropriately handled. TSA has taken some actions to address these directives. For example, TSA has revised its standard operating procedures and training materials to more clearly instruct personnel trained in behavior detection and other TSA personnel on how to avoid unlawful profiling; initiated a study to collect data on the race and national origin of passengers referred for behavior detection screening and examine whether disparities exist in the referral trends, and if so, whether these differences suggest discrimination or bias in the referral process; and issued a Management Directive establishing TSA policy and procedures for receiving, documenting, and referring passenger screening complaints resulting from the application of TSA security screening policies and procedures, including processes for all involved offices in headquarters and the field that handle passenger complaints. The Aviation and Transportation Security Act established TSA as the federal agency with primary responsibility for securing the nation’s civil aviation system, which includes the screening of all passengers and property transported by commercial passenger aircraft. At the approximately 440 TSA-regulated airports in the United States, all passengers, their accessible property, and their checked baggage are screened prior to boarding an aircraft or entering the sterile area of an airport pursuant to statutory and regulatory requirements and TSA-established standard operating procedures. TSA began using behavior detection in 2006 as an added layer of security to identify potentially high- risk passengers. Through the end of fiscal year 2016, TSA’s behavior detection screening process was a stand-alone program that used specially trained behavior detection officers to observe passengers at the screening checkpoint and engage them in brief verbal exchanges. During this period, behavior detection officers had brief interactions with passengers in the queue leading up to the screening checkpoint. If the behavior detection officers determined during this interaction that a passenger exhibited a certain number of behavioral indicators, the behavior detection officer was to refer the passenger for additional screening or, if circumstances warranted, contact a law enforcement officer. According to TSA procedures, if a passenger was referred for additional screening, one behavior detection officer conducted a pat-down of the passenger and search of his or her personal property while another checked documents and conversed with the passenger, attempting to understand why the behavioral indicators were being displayed and continuing to look for additional behavioral indicators. If a passenger did not exhibit a certain number of additional indicators, he or she was allowed to proceed to the boarding gate. If the passenger did exhibit a certain number of additional indicators, or other events occurred, such as the discovery of a fraudulent document, the behavior detection officer was to call a law enforcement officer. The law enforcement officer then would determine next steps, which could include questioning the passenger or conducting a criminal background check. The law enforcement officer then determined whether to release the passenger, refer the passenger to another law enforcement agency, or arrest him or her. In fiscal year 2017, consistent with the Aviation Security Act of 2016, TSA eliminated the stand-alone behavior detection officer position. TSA transferred the former behavior detection officers to serve as part of the screener workforce and began assigning them to the checkpoint to screen passengers. According to TSA officials, when screeners trained in behavior detection are assigned to a position, TSA policies and procedures permit them to use behavior detection when applicable. Furthermore, TSA’s checkpoint standard operating procedures do not currently include the use of behavior detection, as behavior detection’s use continues to be guided by its own policies established in 2016. However, some screeners trained in behavior detection continue to use behavior detection to support passenger screening canine teams as part of expedited screening. As part of this process, screeners trained in behavior detection work in conjunction with canine teams to observe passenger behavior and identify passenger behaviors that may indicate that a passenger poses a higher risk to the aviation system. The Training and Development Division (Training Division), within TSA headquarters, oversees the development, delivery, and evaluation of training programs for TSA employees. The National Training Plan, developed annually by the Training Division and Security Operations, contains the core curriculum for screeners to meet their yearly training requirements. In addition, Security Operations works with the Traveler Engagement Division to develop and deliver specific training on topics such as disability profiling, racial profiling, and screening transgender persons. In August 2017, TSA began training screeners on its new behavioral indicators. TSA revised the behavioral indicators by eliminating and combining some of the indicators used to observe passenger behavior, which TSA refers to as Optimized Behavior Detection. According to TSA officials, Optimized Behavior Detection includes 36 revised behavioral indicators—which TSA pared down from a list of 96 indicators. As of January 2019, TSA officials told us out of the approximately 43,000 screeners nationwide, a total of 2,541 screeners had been trained at 117 airports in Optimized Behavior Detection. Screeners must be trained in passenger and accessible property screening before they are eligible to attend Optimized Behavior Detection training. Upon successful completion of Optimized Behavior Detection training, screeners are permitted to utilize behavior detection in accordance with the standard operating procedures, such as when operating in conjunction with canine teams or screening airport and airline workers. In addition, screeners must complete all requirements in the National Training Plan which includes elements of training on TSA’s mechanisms for preventing unlawful profiling. TSA’s Security Operations is responsible for overseeing the use of behavior detection. TSA’s behavior detection policies and procedures prohibit screeners from selecting passengers for additional screening based on race, ethnicity, religion, and other factors, whether through behavior detection or other security measures. This responsibility includes overseeing officers trained in behavior detection to ensure they conduct behavior detection without regard to race/ethnicity, color, gender/sex, gender identity, religion, national origin, sexual orientation, or disability, in accordance with constitutional, statutory, regulatory, and other legal and DHS policy requirements to protect the civil rights and civil liberties of individuals. Although the stand-alone behavior detection officer position was eliminated and the program ended in 2017, the requirement to conduct oversight and verify compliance with TSA policies still applies when behavior detection is used, such as when behavior detection is used in conjunction with passenger screening canine teams. According to TSA’s policies and procedures, supervisors must conduct oversight observations of behavior detection activities a minimum of 8 hours every 14 days to verify and document compliance with behavior detection policies, standard operating procedures, the handbook, and training, among other things, and submit a compliance checklist documenting the review to TSA Security Operations. The TSA Contact Center (TCC) is the primary point of contact for collecting, documenting, and responding to public questions, concerns, or complaints regarding passengers’ screening experience; reports and claims of lost, stolen, or damaged items; and complaints submitted by TSA employees. The TCC may refer screening complaints for resolution to other TSA headquarters offices, depending on the specific allegation. For example, complete complaints alleging violations of civil rights and civil liberties, which include allegations implicating color, race, ethnicity, gender, genetic information, national origin, religion, sexual orientation, and parental status, must be referred to the Multicultural Branch. Figure 1 describes the TCC’s complaint review process. TSA’s Multicultural Branch is responsible for collecting, monitoring, and adjudicating passenger complaints alleging civil rights and civil liberties violations at the passenger screening checkpoint, including complaints alleging unlawful profiling and discrimination, among other things. The Multicultural Branch receives complaints alleging civil rights and civil liberties violations from several sources within TSA including the TCC. When TCC officials determine a complete complaint involves a potential civil rights or civil liberties violation, they are to forward the complaint to the Multicultural Branch where staff are to input the complaint into a database and track the resolution of each complaint they receive. The Multicultural Branch, in consultation with Security Operations, determines whether a screener followed standard operating procedures while screening the complainant by reviewing available video of an incident or interviewing witnesses who saw the incident. Depending on the nature and severity of the allegation, TSA airport staff may also elevate the complaint and evidence to the airport’s Assistant Federal Security Director (FSD) for Screening. If the investigation finds fault with the screener, the screener’s supervisor or manager is to determine the corrective action to be taken. Corrective actions specified in TSA’s guidelines for disciplinary actions to address misconduct range from mandating that the screener take additional training to correct the behavior to terminating the screener’s employment for multiple repeat offenses or a single egregious action. Following the outcome of the complaint review and any resulting corrective actions, the TSA headquarters unit or the TSA customer support manager at the airport is to communicate the status of the resolution, if any, to the complainant— such as by using a template letter that explains TSA’s policies and procedures or issuing an apology. According to Multicultural Branch protocols for reviewing passenger complaints, complaints may be resolved in three ways: Closed-Administratively: If the complainant does not respond within 10 days to the Multicultural Branch’s first contact for additional information, such as a request for additional information on the alleged civil rights and civil liberties violation, the complaint is to be closed. Closed-No Jurisdiction: Complaints that are not within the Multicultural Branch’s jurisdiction, such as complaints involving rude and unprofessional conduct that are not related to allegations of civil rights and civil liberties violations, are to be closed and referred to other TSA offices or the TSA designated point of contact at the airport for further handling. Closed-Resolved: Following the outcome of the investigation, the Multicultural Branch is to send a letter to the complainant summarizing the allegations reviewed, explaining whether TSA procedures were followed, and in some cases, issuing an apology or informing the complainant of the type of training offered to the screener(s). The Multicultural Branch may recommend training and provide refresher training materials for distribution at the airport to the screener(s) involved, if identified, or for all screeners at the airport’s checkpoint at which the complaint originated. According to TSA officials, the Multicultural Branch recommends training when standard operating procedures for screening were not followed or when it determines that the proactive measure of refresher training would be useful. According to TSA, the designated TSA point of contact at the airport is required to verify when the training is completed. Before screeners are eligible to conduct any behavior detection activities, they must first complete a 5-day Optimized Behavior Detection Basic Training course, and undergo on-the-job training at their local airport. This course includes an overview of DHS and TSA policies that prohibit unlawful profiling, and trains screeners to apply behavioral indicators to passengers without regard to race/ethnicity, color, gender/sex, gender identity, religion, national origin, sexual orientation, or disability. Participants must complete the Optimized Behavior Detection Basic Training course and pass a 40 question job knowledge test at the end of the class, in addition to completing 32 hours of on-the-job training under the supervision of an officer already trained in behavior detection. If a participant fails the job knowledge test, he or she is to receive 1 hour of remedial training before retaking the test. Screeners must pass the test in two attempts to be eligible to conduct behavior detection activities. In the four Optimized Behavior Detection Basic Training courses we attended, the training instructors covered TSA’s policies on prohibiting unlawful profiling on day one of the course, and explained that profiling passengers based on discernible traits was not only illegal, but that such practices are ineffective at identifying potentially high-risk passengers. In addition, the course manual included a copy of DHS’s 2013 memorandum defining racial profiling, which all participants were required to review. To test their understanding of TSA policy and the Optimized Behavior Detection Standard Operating Procedures, the instructors presented various scenarios to engage participants in practicing how they would apply behavior detection at the checkpoint. The 2018 National Training Plan required behavior detection–trained screeners to complete four recurrent technical training courses related to behavior detection, including two that contain material reinforcing DHS’s and TSA’s policies prohibiting unlawful profiling. Screeners participate in each of the four interactive training courses using a computer and the courses contain knowledge checks that the participant must answer correctly before completing the training. Table 1 describes the training courses screeners trained in behavior detection are required to complete and appendix I includes a list of additional training related to unlawful profiling. TSA determines the effectiveness of particular training programs using the Kirkpatrick Evaluation Model, a commonly accepted training evaluation model endorsed by the Office of Personnel Management and used throughout the federal government. In May 2018, TSA updated its training standards based on the ADDIE model, a methodology comprising five phases: Analysis, Design, Development, Implementation, and Evaluation (ADDIE). TSA uses the Kirkpatrick model as part of the evaluation stage of ADDIE. The Kirkpatrick model consists of a four-level approach for soliciting feedback from training course participants and evaluating the impact the training had on individual development, among other things. TSA conducts Levels 1 and 2 evaluations on selected training courses. Table 2 provides an overview of the Kirkpatrick model and the evaluation levels for courses related to behavior detection and unlawful profiling. TSA officials told us they will continue to evaluate the Optimized Behavior Detection Basic Training course and Level 3 evaluations are under development, as they roll out their training evaluation process. According to TSA’s Training Standards, a review team determines the frequency of curriculum review, which should occur at least once every 5 years. As part of this review, TSA plans to leverage data reported in evaluations at Kirkpatrick Levels 1 through 3. TSA’s 2016 Optimized Behavior Detection Program Handbook and Operational Oversight Compliance Guidance require supervisors to conduct routine checks of behavior detection operations to monitor compliance with standard operating procedures. TSA’s behavior detection Operational Oversight Compliance Guidance outlines seven specific assessments of behavior detection operations and includes a checklist for each assessment for managers to document completion of these routine oversight tasks. According to TSA officials, these assessments should occur when screeners use behavior detection in conjunction with canine operations and while screening airline and airport workers, among other activities. When conducting these assessments, supervisors are to conduct 1-hour observations and use detailed checklists to document how screeners trained in behavior detection perform the behavior detection in practice. For example, one checklist requires supervisors to observe how screeners trained in behavior detection monitor passenger flow and communicate with passengers while observing for behavioral indicators, such as ensuring screeners using behavior detection do not ask passengers intrusive or offensive questions, among other activities related to the use of behavior detection. However, our review of the oversight checklists found that they do not specifically instruct supervisors to monitor for compliance with procedures intended to prohibit unlawful profiling. According to TSA officials, TSA’s guidance and checklists do not include this type of monitoring for unlawful profiling because officials believe that the training screeners receive, adherence to the standard operating procedures, and the general supervisory oversight in place are sufficient to prevent unlawful profiling and could alert supervisors to situations where unlawful profiling happens. However, the 2013 DHS memorandum on DHS’s policy on unlawful profiling states that each component, including TSA, should both implement specific policy and procedures on racial profiling, and ensure all personnel are trained and held accountable for meeting the standards set forth in DHS policy. In addition, Standards for Internal Control in the Federal Government states that management should establish and implement activities to monitor the internal control system and evaluate the results, as well as remediate identified internal control deficiencies. Such a mechanism could be an item added to a checklist for supervisors to document, based on their observations, whether screeners selected individuals for additional scrutiny in a manner consistent with policies and procedures. Another oversight mechanism, as noted in DOJ’s guidance on the use of race and other factors, could be studying the implementation of policies and procedures that prohibit unlawful profiling through targeted, data- driven research projects. As previously discussed, in 2013, TSA initiated a study and collected data through October 2017 on passengers referred for secondary screening to monitor compliance with policies that prohibit unlawful profiling. TSA discontinued the study and did not analyze the data collected because the stand-alone behavior detection program ended in November 2017. As a result of not conducting the analysis, TSA does not know what the data would have shown regarding compliance with policies that prohibit unlawful profiling. TSA officials said they plan to update the behavior detection and checkpoint screening policies, procedures, and guidance during fiscal year 2019. As a part of this update, TSA officials told us they plan to include language in the standard operating procedures reinforcing the use of behavior detection simultaneously with other checkpoint duties, such as the document checker position. However, TSA officials told us they are not planning to add an oversight mechanism specific to profiling as part of the updates because, as previously noted, they believe screener training, adherence to the standard operating procedures, and general supervisory oversight are sufficient. Developing a specific oversight mechanism, such as a checklist or a data-driven study, to monitor screeners’ compliance with policies that prohibit unlawful profiling would provide TSA with greater assurance that its personnel are adhering to these policies when using behavior detection, and better position TSA to identify potential incidents of unlawful profiling. The TCC received 3,663 complaints related to passenger screening alleging violations of civil rights and civil liberties from October 2015 through February 2018. These complaints are not specific to behavior detection activities and generally reflect alleged conduct occurring at the screening checkpoint through the application of screening measures. We analyzed the 3,663 complaints and found that the majority (2,251 of 3,663) of the complaints alleged discrimination or profiling based on personal attributes and characteristics. For example, the TCC received complaints alleging discrimination that involved assertions by passengers that they had been selected for pat-downs based on race and ethnicity, among other reasons, when the passengers believed they did not trigger an alarm prompting the pat-downs. The TCC also received complaints related to passengers’ transgender identity alleging selection for additional screening because of their transgender status. Additionally, the TCC received passenger complaints alleging that screening procedures were aggressive or inappropriate for senior citizens. Table 3 provides a list of complaint types based on our analysis. In addition, appendix II provides additional detail about our content analysis of complaints alleging civil rights and civil liberties violations, and appendix III provides a list of 10 airports most often identified in the complaints. As TSA’s primary point of contact for passenger complaints, the TCC is responsible for the initial review and referral of all complaints that involve allegations of civil rights and civil liberties violations to the Multicultural Branch. According to the TCC standard operating procedures, TCC analysts review the complaints to ensure that they contain the necessary information to be considered complete, including the airport, passenger’s name, date of the incident, and description of the alleged civil rights and civil liberties violation. In addition, complaints reported over the phone or made on behalf of another person without the person’s consent are initially considered incomplete. For complaints that are not complete, the TCC sends the passenger a document request for information when the passenger has provided correct contact information. According to TCC officials, passengers often do not provide the correct contact information or do not respond with the necessary information to complete the complaint. TCC officials said that incomplete complaints are typically sent to the Multicultural Branch for informational purposes. Multicultural Branch officials told us that they consider information from incomplete complaints to inform its policy and training initiatives, and to improve how TSA engages with the public. From October 2015 through February 2018, the TCC referred 51 percent (1,865) of the 3,663 complaints it received to the Multicultural Branch for review. The TCC reported that 48 percent (1,764) of the 3,663 complaints did not have complete information necessary for further review, such as the airport and date of the incident. According to TSA officials, these complaints were sent to the Multicultural Branch for informational purposes. TCC’s passenger complaint data show that the remaining 1 percent (34) of the complaints were from TSA employees and were referred to other TSA offices for review. TSA’s Multicultural Branch receives and reviews complete complaints related to allegations of violations of civil rights and civil liberties that are referred to it from the TCC, DHS’s Office of Civil Rights and Civil Liberties, TSA’s Disability Branch, and TSA personnel at airports. From October 2015 through February 2018, the Multicultural Branch received 2,059 complaints alleging violations of civil rights and civil liberties, as shown in figure 2. Multicultural Branch officials stated that the majority of these complaints were referred from the TCC. As shown in figure 2, for 1,066 (52 percent) of the complaints, Multicultural Branch staff found indications of potential discrimination, such as instances of rude or unprofessional conduct that included the use of race or other protected characteristics. According to Multicultural Branch staff, to resolve the 1,066 complaints, they recommended a range of refresher training. Multicultural Branch staff explained that when issues are identified, their policy is to address the issues through screener training. Multicultural Branch officials reported that these trainings were provided through National Shift Briefings, which were circulated across TSA, or through training provided at a particular airport. For example: In one of the complaint cases we reviewed, a passenger alleged profiling based on headwear. Multicultural Branch officials used camera recordings and statements from officers involved in the encounter to substantiate that screening procedure violations had occurred. As a result, Multicultural Branch officials recommended refresher training to the airport on headwear screening protocols for all screeners at the airport to review. In another complaint case we reviewed, a passenger alleged profiling based on the use of a tribal-issued photo identification card. In response, Multicultural Branch officials sent refresher training on verifying tribal identification and the screening of Native American passengers to the TSA designated point of contact at the airport involved for distribution to TSA personnel identified in the complaint. In a third complaint reviewed, a passenger alleged being profiled at the screening checkpoint, without including any additional details. According to TSA officials, based on the particular allegations of the complaint and the lack of details, TSA was unable to substantiate the allegations made in the complaint. As a result, Multicultural Branch sent National Shift Briefings on TSA’s policies and procedures that prohibit unlawful profiling and inappropriate comments to the TSA designated point of contact at the airport involved for distribution to TSA personnel identified in the complaint. As shown in figure 2, there were 993 complaints that the Multicultural Branch reviewed but did not address through training. The Multicultural Branch closed 121 of these complaints because it determined that the complainant did not provide sufficient information about the alleged civil rights and civil liberties violation for Multicultural Branch review and the complainant did not respond with additional information requested by the Multicultural Branch within 10 days. The Multicultural Branch determined that the remaining 872 complaints were not substantiated based on its review of the camera recording of the alleged incident, or were not within its jurisdiction. For the complaints not within its jurisdiction, the Multicultural Branch referred them to other TSA offices, to TSA officials at the airport or airports identified in the complaints for review, or to other federal agencies (e.g., U.S. Customs and Border Protection, Department of Transportation, or the Federal Aviation Administration) as appropriate. These complaints involved allegations of unprofessional conduct and other issues that did not involve allegations of civil rights and civil liberties violations. According to Multicultural Branch guidance, the designated TSA point of contact at the airport along with the Multicultural Branch analyst are to determine appropriate next steps for resolving complaints, such as preparing a briefing for screeners that is tailored to address the concerns raised by the complainant. TSA officials stated that resolutions to the complainant are tailored to reflect the allegation, type of inquiry conducted, and investigation of the facts and evidence underlying the complaint. TSA’s responses to the complainant include, but are not limited to, apologizing for the screening experience or informing the complainant about the next steps such as the agency’s plans to address the complaint or underlying conduct that gave rise to the complaint. For example, in a letter we reviewed, TSA apologized for the “unprofessional and inappropriate personal questions” the passenger experienced during screening, and stated that refresher training would be distributed to screeners at the airport involved. According to documentation we reviewed related to this complaint, the Multicultural Branch sent refresher training materials on avoiding inappropriate comments to the designated TSA point of contact at the airport involved. In addition, TSA’s office of Human Capital Employee Relations reported that it took a range of disciplinary actions—from letters of reprimand to termination—for 100 screeners from October 2015 through February 2018, in part in response to passenger complaints alleging civil rights and civil liberties violations. TSA’s Multicultural Branch regularly collects and analyzes data on passenger civil rights and civil liberties and discrimination complaints and their resolution status, and shares this information with TSA executive leadership, TSA airport customer service managers, and screeners in the field, among others. Multicultural Branch officials told us their staff are assigned to specific airports based on geographic region, and they continually analyze passenger complaints referred to their office from the TCC to identify trends. Staff members meet weekly to discuss trends in complaints for their geographic regions, and they review weekly, quarterly, and annual reports on the number and category of complaints referred to their office by the TCC. In addition, Multicultural Branch officials track the resolution of the cases for which they have jurisdiction and submit this information to their senior leadership each week. Specifically, the Multicultural Branch uses a database to track complaints by type, airport, submission date, and resolution status, such as how many cases are open, closed, or whether they have been resolved. Multicultural Branch officials share trends in complaints throughout TSA in several ways, including conference calls, monthly briefings, reporting metrics to TSA executive leadership, and on-site training events at airports each year. For example, Multicultural Branch officials hold monthly conference calls with customer service managers at airports to review complaint trends, upcoming on-site airport trainings, and job aids they have developed to help screeners understand issues, such as screening passengers wearing religious headwear. Multicultural Branch officials stated they also share information with screeners and supervisors through National Shift Briefings that are distributed at all airports, and focus on bringing awareness to screeners on events they need to be aware of when screening passengers, such as religious observances occurring that month. According to TSA officials, the Multicultural Branch uses its analysis of passenger complaints and the results of complaint investigations to develop training aids and materials on areas where they determine screeners need more training, such as multicultural awareness or screening of transgender passengers. For example, the Multicultural Branch has developed briefings focusing on unlawful profiling and unconscious bias which reiterated that unlawful profiling is against TSA policy, defined unconscious bias, and provided scenario-based examples. Additionally, members from the Multicultural Branch hold on-site training for screeners at selected airports each year based on complaint data analysis and other factors. These training sessions last three days, include topics stemming from complaint data TSA has analyzed, and can include webinars, role-playing, and other forms of instruction. DHS and TSA have policies prohibiting unlawful profiling—using race, ethnicity, gender, or other protected characteristics to identify passengers for additional screening—when using behavior detection, as well as other screening measures. While TSA has oversight guidance and checklists to monitor screeners’ use of behavior detection, these policies and procedures do not include a specific mechanism to monitor whether screeners may be using behavior detection to unlawfully profile passengers. Although TSA officials report that they are working to update the standard operating procedures in 2019, they currently have no plan to add a specific mechanism to monitor compliance with policies that prohibit unlawful profiling. Developing a specific oversight mechanism would provide TSA with greater assurance that screeners are adhering to such policies and help TSA identify any potential incidents of unlawful profiling. We are making the following recommendation to TSA. The TSA Administrator should direct Security Operations to develop a specific oversight mechanism to monitor the use of behavior detection activities for compliance with DHS and TSA policies that prohibit unlawful profiling. (Recommendation 1) We provided a draft of this report to DHS for review and comment. DHS provided written comments which are reproduced in appendix IV. In its comments, DHS concurred with our recommendation and described actions planned to address it. Security Operations, TCC, and the Multicultural Branch also provided technical comments, which we incorporated as appropriate. DHS correctly noted in its letter that GAO’s analysis of civil rights and civil liberties complaints related to every aspect of TSA’s passenger and baggage screening and is not specific to behavior detection. We agree with DHS’s observation, as this analysis provides information on what passengers alleged in their complaints and how TSA addressed them. It is important to note that the complaint data provided by TSA did not preclude behavior detection activities as a potential contributing factor to any number of the complaints submitted. With regard to our recommendation, that the TSA Administrator should direct Security Operations to develop a specific oversight mechanism to monitor the use of behavior detection activities for compliance with DHS and TSA policies that prohibit unlawful profiling, DHS stated that TSA plans to take additional steps to continue to ensure behavior detection activities adhere to polices that prohibit unlawful profiling. In fiscal year 2019, TSA plans to modify existing oversight checklists used by managers and supervisors to include specific terminology for monitoring unlawful profiling. DHS estimated that this effort would be completed by September 30, 2019. This action, if fully implemented, should address the intent of the recommendation. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees and the Secretary of Homeland Security. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact William Russell at (202) 512-8777 or RussellW@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. The Transportation Security Administration (TSA) provided examples of refresher training materials that are provided to screeners on TSA’s prohibition on the use of unlawful profiling at the passenger screening checkpoint. Table 4 provides information on these materials, including the methods used to distribute the materials to screeners. From October 2015 through February 2018, the Transportation Security Administration (TSA) Contact Center (TCC) received 3,663 complaints that it classified as alleging violations of civil rights and civil liberties. Of the 3,663 complaints, the TCC received 707 complaints, or about 19 percent, by phone. Table 5 summarizes our analysis of the complaints the TCC received. From October 2015 through February 2018, the Transportation Security Administration (TSA) Contact Center (TCC) received 3,663 complaints that it classified as alleging violations of civil rights and civil liberties. The TCC received 707 of these complaints, or about 19 percent, by phone. Of the 3,663 complaints, Los Angeles International Airport was identified most often in the complaint data. Table 6 lists the 10 airports most often identified in these complaints. William Russell, (202) 512-8777 or RussellW@gao.gov. In addition to the contact named above, Ellen Wolfe (Assistant Director), Natalie Maddox (Analyst in Charge), Saida Hussain, and Brendan Kretzschmar made key contributions to this report. Also contributing to the report were Alyssa Bertoni, David Dornisch, Ben Emmel, Eric Hauswirth, Susan Hsu, Tom Lombardi, Amanda Miller, Sam Portnow, Rachel Stoiko, and Adam Vogt.", "summary": "In 2016, TSA began using behavior detection in a more limited way to identify potentially high-risk passengers who exhibit certain behaviors it asserts are indicative of stress, fear, or deception, and refer them for additional screening or, when warranted, to law enforcement. TSA's policies and procedures prohibit unlawful profiling, i.e., screeners are prohibited from selecting passengers for additional screening based on race, ethnicity, or other factors. Allegations of racial profiling have raised questions about TSA's use of behavior detection. GAO was asked to review TSA's measures to prevent behavior detection activities from resulting in unlawful profiling. This report examines, among other things, (1) TSA's oversight of behavior detection activities and (2) the number of complaints alleging violations of civil rights and civil liberties related to passenger screening and actions taken by TSA to address them. GAO reviewed TSA policies and procedures; analyzed passenger complaint data received by TSA from October 2015 through February 2018 and actions taken to address them; and interviewed TSA officials. Complaint data we analyzed alleged conduct that occurred at the screening checkpoint and was not specific to behavior detection activities. Transportation Security Administration (TSA) policy requires managers to ensure behavior detection is conducted without regard to race or ethnicity, among other factors. TSA uses seven oversight checklists to assess whether behavior detection activities are conducted in accordance with TSA policy, such as monitoring whether screeners trained in behavior detection observe and engage passengers correctly. However, these checklists do not instruct supervisors to monitor for indications of profiling. TSA officials stated that the training screeners receive, adherence to operating procedures, and general supervisory oversight are sufficient to alert supervisors to situations when unlawful profiling may occur. However, developing a specific mechanism to monitor behavior detection activities for compliance with policies prohibiting unlawful profiling would provide TSA with greater assurance that screeners are adhering to such policies. From October 2015 through February 2018, TSA received about 3,700 complaints alleging civil rights and civil liberties violations related to passenger screening. These complaints are not specific to behavior detection activities. The TSA Contact Center (TCC), the office that initially receives these complaints, reported that about half of the complaints did not have complete information from passengers necessary for further review, such as the airport and date of the incident. According to TCC officials, they attempt to obtain the additional information from passengers, but often the complaint does not include the correct contact information or the passenger does not respond to the TCC's request for additional information. The TCC complaint data show that the remaining 51 percent (about 1,900) of complaints were referred to the TSA Multicultural Branch, the office responsible for reviewing complaints alleging civil rights and civil liberties violations. The Multicultural Branch reported reviewing 2,059 complaints, including approximately 1,900 complaints from TCC, as well as complaints referred from other TSA offices. For about half of the complaints (1,066) the Multicultural Branch reviewed, it found indications of potential discrimination and unprofessional conduct that involved race or other factors and recommended a range of refresher training across airports or for screeners at individual airports identified in the complaints. TSA's Multicultural Branch Reviewed 2,059 Complaints Alleging Violations of Civil Rights and Civil Liberties from October 2015 through February 2018 TSA should develop a specific oversight mechanism to monitor behavior detection activities for compliance with policies that prohibit unlawful profiling. DHS concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "In its fiscal year 2018 financial statement, DOE reported an estimated environmental liability of $494 billion. The majority of this liability was for cleanup work overseen by EM. We reported in January 2019 that in recent years, EM’s environmental liability has grown annually at a level that has outpaced the department’s annual spending on cleanup activities, and its liability may continue to grow. In its fiscal year 2018 financial statement, DOE reported its estimated environmental liability at $494 billion. In the financial statement, EM accounted for $377 billion (over 75 percent) of DOE’s total liability. In developing its environmental liability estimate, EM estimates the costs of storing, treating, or disposing of a variety of waste types. Storing and treating radioactive tank waste account for the largest portion of EM’s costs. For example, in January 2019 we reported that, in fiscal year 2017 (the most recent year for which these data were available at the time of our review), EM’s responsibilities to store and treat radioactive waste stored in underground tanks accounted for nearly half of EM’s total environmental liability, and its responsibilities for addressing contaminated facilities and remediating soil and groundwater contamination accounted for about one-quarter. Figure 2 shows the percentage and dollar amount of EM’s environmental liability by cleanup activity for fiscal year 2017. In January 2019, we also found that, of the 16 sites across the United States at which EM has cleanup responsibilities, two sites accounted for more than 70 percent of EM’s environmental liability in fiscal year 2017: the Hanford site and the Savannah River site (see fig. 3). These sites also include the majority of EM’s radioactive tank waste and the majority of radioactive contamination, which is particularly costly and complicated to treat. The Hanford site has 177 tanks containing 55 million gallons of waste, and the Savannah River site has 43 tanks containing 36 million gallons of waste. We reported in January 2019 that in recent years, EM’s environmental liability has grown annually at a level that has outpaced the department’s annual spending on cleanup activities. This growth has occurred at the same time as the number of contaminated sites has decreased. In fiscal years 2011 through 2018, EM spent over $48 billion, primarily to address radioactive tank waste as well as treat and dispose of other nuclear and hazardous materials. Nonetheless, since 2011, EM’s environmental liability grew by $214 billion, from $163 billion to $377 billion, according to our analysis of DOE financial data and documents (see fig. 4). EM’s environmental liability may continue to grow because its currently estimated environmental liability does not include the costs of all cleanup activities for which the agency will likely be responsible in the future and because the cost of addressing some of EM’s largest projects is still underestimated. First, not all of the cleanup activities EM must undertake are captured in the current liability because, according to federal accounting standards, only work that is probable and reasonably estimable is required to be reported in an agency’s liability. For example, EM has not yet developed a cleanup plan or cost estimate for the Nevada National Security site and, as a result, the cost of future cleanup of this site was not included in EM’s reported environmental liability. The nearly 1,400-square-mile site has been used for hundreds of nuclear weapons tests since 1951. These activities have resulted in more than 45 million cubic feet of radioactive waste at the site, but the costs for the cleanup of this waste are excluded from EM’s annually reported environmental liability. Second, the current cost associated with some of EM’s cleanup efforts may be underestimated. For example, as of April 2018, EM and its contractor had still not negotiated a cost for completing the WTP—DOE’s largest and most complex construction project. Further, although EM typically spends about $6 billion per year on cleanup activities, a large amount of its cleanup budget does not support actual cleanup activities. Instead, this funding goes toward recurring activities necessary to maintain the sites rather than toward reducing the environmental liability. EM refers to these activities as “minimum safety” work. According to EM officials, examples of such work include physical security, health and radiation protection, or critical facility and infrastructure maintenance for safe conditions. These officials said that minimum safety work constitutes 30 to 60 percent of individual sites’ budgets, for a total of at least $2.7 billion of EM’s fiscal year 2018 budget, as we reported in February 2019. The Assistant Secretary for EM noted in September 2018 that much of DOE’s environmental liability is associated with managing minimum safety work and that significant potential cost savings could result from reducing minimum safety work. Accordingly, she stated that EM planned an initiative in fiscal year 2019 to examine how EM can reduce this work. EM has undertaken several ad hoc studies and initiatives to address the growing costs in its cleanup program. However, EM has not conducted a formal root cause analysis to identify the causes for the growth in its environmental liabilities. Specifically, EM headquarters officials we interviewed said they were aware of the increases to the environmental liability from year to year, as well as the areas in which the liability changed; however, they said they had not done a detailed analysis of the root causes of the growth. A leading practice for program management is monitoring and controlling the program, which includes conducting root cause analyses and developing corrective action plans. However, in February 2019, we found that EM’s cleanup policy does not follow this leading practice because it does not include any such requirements. We recommended that EM review and revise its policy to include program management leading practices in its requirements, including for monitoring and controlling the program. DOE agreed with our recommendation and stated that it plans to revise its policy. EM has not resolved long standing management challenges that affect its cleanup program and contracts. In March 2019, we issued our 2019 High- Risk Series, which included updates related to DOE’s environmental liability and its contract management. While officials at EM have taken some steps toward management improvements aimed at reducing its environmental liabilities, we found that EM has not demonstrated progress toward resolving these challenges. We have identified several unresolved issues including the following: EM does not have a program-wide cleanup strategy. We reported in January 2019 that EM relies primarily on individual sites to locally negotiate cleanup activities and establish priorities. Our analysis of DOE documents identified instances of decisions involving billions of dollars where such an approach did not always balance overall risks and costs. For example, we reiterated what we found in May 2017 that two EM sites had plans to treat similar radioactive tank waste differently, and the estimated costs for treating the waste at one site— Hanford—may be tens of billions more than those at the other site— Savannah River. In addition, EM sites generally do not consider other sites’ risks and priorities when making cleanup decisions. We reported in January 2019 that this approach is not consistent with recommendations we and others have made over the last 2 decades that EM develop national priorities to balance risks and costs across and within its sites. Moreover, EM has not developed a program- wide strategy that sets such priorities and describes how EM will address its greatest risks. Instead, according to agency officials, it continues to prioritize and fund cleanup activities by individual site. We recommended in January 2019 that EM develop a program-wide strategy that outlines how EM will direct available resources to address human health and environmental risks across and within sites. DOE agreed with our recommendation and has since said it is working toward this goal. EM manages most of its cleanup work as operations activities, under less stringent requirements than capital asset projects. In February 2019, we reported that EM manages its cleanup work under different requirements, depending on whether it classifies the work as a capital asset project or an operations activity. EM currently manages most of its work as operations activities. In its fiscal year 2019 budget, operations activities accounted for 77 percent of EM’s budget (about $5.5 billion), and capital asset projects accounted for 18 percent (about $1.3 billion). Operations activities have less stringent requirements. For example, unlike capital asset projects, operations activities are not required to go through a thorough upfront planning process to determine the scope of work to be completed. In addition, under EM cleanup requirements, operations activities are not subject to independent oversight by entities outside EM. As a result, DOE management does not have information on how EM manages operations activities and cannot hold EM accountable for cost- effective and timely completion of this cleanup work. Since 2015, experts in DOE’s Office of Project Management have raised concerns that some operations activities, such as cleanup of radioactive tank waste, should be classified as capital asset projects. In February 2019, we recommended that EM work with DOE’s Office of Project Management—which is responsible for providing DOE-wide leadership and assistance pertaining to project management—to establish requirements for classifying cleanup work as capital asset projects or operations activities and then work together to asses EM’s ongoing operations activities to determine if they should be reclassified as capital asset projects based on the newly established requirements. DOE generally agreed with our recommendations and committed to review and revise its requirements as appropriate. EM’s cleanup policy does not follow program and project management leading practices. In February 2019, we also found that EM’s 2017 cleanup policy, which outlines procedures that govern the EM program and its operations activities, does not follow most selected leading practices for program and project management. Specifically, we found that EM’s 2017 cleanup policy does not follow any of 9 selected program management leading practices related to scope, cost, schedule performance, and independent reviews. For example, the policy does not require the program management leading practice of monitoring and controlling the program, including conducting root cause analyses and developing corrective action plans. Further, EM’s 2017 cleanup policy follows only 3 of 12 selected project management leading practices related to these areas. For example, EM’s 2017 cleanup policy does not require any independent reviews of its operations activities by anybody outside of EM. We recommended that DOE review and revise EM’s cleanup policy to include program and project management leading practices related to scope, cost, schedule performance, and independent reviews. DOE agreed with our recommendations. In addition, broader DOE management challenges affect EM and have implications for EM’s ability to effectively manage its cleanup work and begin reducing its environmental liability. EM, like DOE, executes its program activities primarily through the use of contracts. We have reported that about 90 percent of DOE’s budget is spent on contractors that manage the laboratories and carry out DOE’s programs. DOE’s contract management, however, is one of the areas we have identified as posing a high risk of fraud, waste, abuse, and mismanagement because of DOE’s record of inadequate management and oversight of contractors. As a result, DOE’s contract and project management has been on our High Risk List since 1990. Most recently, we found in March 2019 that DOE did not always ensure that contractors audited subcontractors’ incurred costs as required in their contracts. We identified more than $3.4 billion in subcontract costs incurred over a 10-year period that had not been audited as required, and some subcontracts remained unaudited or unassessed for more than 6 years. Completing audits in a timely manner is important because of a 6-year statute of limitations to recover unallowable costs that could be identified through such audits. We recommended that DOE develop procedures that require local offices to monitor contractors to ensure timely completion of required subcontract audits. DOE partially concurred with this recommendation and stated that it plans to review existing requirements and guidance and to consider the extent to which it requires monitoring of contractors’ progress in completing required subcontract audits. As we noted in the March 2019 report, we believe that DOE’s plans to further examine the issues raised in our report is a positive step toward resolving the issues; however, we continue to believe that the actions called for in our recommendations remain valid and that DOE could more efficiently resolve the issues by proceeding to implement those actions. Accurate and reliable information on the status and progress in a program is essential for effective management and to ensure key stakeholders are provided the information they need to fulfill their oversight, advisory, and other essential roles. However, EM’s performance measures for operations activities do not provide a clear picture of overall performance, and EM has not followed best practices in implementing its performance reporting systems. In addition, EM has historically not provided all of the statutorily required information about the status of its cleanup effort, and the information EM has reported has been incomplete or inaccurate. Finally, in its recent budget materials, EM did not include the funding it says it needs to meet its schedule cleanup milestones. In February 2019, we found that EM’s performance measures for operations activities—which constitute most of its cleanup activities—do not provide a clear picture of overall performance. According to EM documentation and officials, EM uses three tools to measure the overall performance of operations activities: earned value management (EVM), performance metrics, and cleanup milestones. We found problems with EM’s use of each of these tools. Figure 5 summarizes our findings on these three performance measures and how they affect EM’s ability to effectively manage the cleanup effort. First, we found in February 2019 that EM does not always ensure that its EVM data are comprehensive or reliable. EVM measures the value of work accomplished in a given period and compares it with the planned value of work scheduled for the period and with the actual cost of the work accomplished. EM relies primarily on EVM data to measure the overall performance of its operations activities. EM relies on contractors’ EVM systems to measure the performance of its contractors’ operations activities. We reviewed all 20 EM contracts covering operations activities and found that EM requires its contractors to maintain EVM systems for 17 of all 20 contracts. We also found that EM paid its contractors to maintain these systems and provide EVM reports to EM. However, we found that EM has not followed best practices to ensure that these systems are (1) comprehensive, (2) provide reliable data, and (3) are used by EM leadership for decision-making—which are the three characteristics of a reliable EVM system. For example, only about half of the EVM systems met the best practices for conducting integrated baseline reviews and performing ongoing surveillance. Among those, many of the reviews were not rigorous enough to ensure that the performance measurement baseline captured all of the work. We found that EM officials were not performing thorough surveillance reviews to ensure that EVM systems were in alignment with EVM guidelines and that the data being reported by the EVM systems were reliable. In addition, the EVM data for contracts covering operations activities contained numerous, unexplained anomalies in all the months we reviewed, including missing or negative values for some of the completed work to date. Even though EM requires most of its contractors for operations activities to maintain EVM systems and pays them for doing so, EM’s 2017 cleanup policy generally does not require that EVM systems be maintained and used in a way that follow EVM best practices. The use of EVM as a management tool is considered an industry standard and a best practice for conducting cost and schedule performance analysis for projects. EVM data can alert project managers to potential problems sooner than expenditures alone can. Because EM does not follow best practices in administering its EVM systems, EM leadership may not have access to reliable performance data to make informed decisions in managing billions of dollars’ worth of cleanup work every year and to provide to Congress and other stakeholders. We recommended that EM update its cleanup policy to require that EVM systems be maintained and used in a way that follows EVM best practices. DOE agreed with this recommendation, and said it would implement it. Second, we found that EM’s performance metrics do not link performance to cost. EM collects performance metrics from the sites monthly to measure progress toward completing the scope of work for the contract and against a goal set at the beginning of each year. We found in February 2019 that EM’s performance metrics do not link that work to the cost of completing it. For example, EM reported that it eliminated 72,000 gallons of radioactive liquid waste out of a target of 342,000 gallons for fiscal year 2017 at the Savannah River site and disposed of 1,734 cubic meters of low-level waste out of a target of 360 cubic meters at the Idaho site. However, in neither case did EM indicate how much that work cost to accomplish, such as whether those costs were above or below what had been planned. Because EM’s metrics do not link performance to cost, the performance information EM has provided to Congress does not indicate whether EM received good value from the contractor since it does not show how much that work cost to accomplish. We recommended that EM integrate EVM data into EM’s performance metrics for operations activities. DOE agreed with this recommendation and said it would implement it. Finally, we found in February 2019 that sites regularly renegotiate cleanup milestones they are at risk of missing, and EM does not track data on the history of postponed milestones or the reasons why milestones were postponed. As a result, milestones have limited value as a means of tracking cleanup progress since EM does not track the original (or any previously revised) milestone dates, which could provide some data to measure the progress of cleanup activities. We recommended that EM track and report original milestones dates as well as changes to its cleanup milestones. DOE agreed with our recommendation and said it is already tracking this information at the site level. In response, we reiterated the importance of tracking these changes and reporting that information at the headquarters level to help inform Congress. We reported in January 2019 that EM has not submitted congressionally mandated reports on its cleanup program and the information EM has reported has been incomplete or inaccurate. These reports are intended to provide Congress with information on the progress, challenges, and expected future costs of the EM cleanup program. Under the fiscal year 2011 National Defense Authorization Act, EM must annually develop and report to Congress a Future-Years Defense Environmental Management Plan that reflects estimated expenditures and proposed appropriations included in the DOE budget for defense environmental cleanup activities. It must do so at or about the same time that it submits its budget request. The plan is to cover the fiscal year for which the budget is submitted and at least the 4 succeeding fiscal years. The plan is required to describe the cleanup activities to be carried out during the period specified by the plan, estimated expenditures and proposed appropriations necessary to support them, and each milestone in an enforceable agreement governing the cleanup activity. For each milestone, EM is to identify whether the milestone will be met and, if not, explain why not and provide the date by which EM expects to meet it. EM submitted the required plan in fiscal year 2012 but did not submit plans from fiscal year 2013 through fiscal year 2016, as we found in January 2019, or in fiscal year 2018. EM’s most recent Future-Years Defense Environmental Management Plan, which DOE submitted to Congress in August 2017, included little of the information required by the fiscal year 2011 National Defense Authorization Act . Table 1 shows our assessment of the information EM provided in its 2017 Future-Years Defense Environmental Management Plan against the reporting requirements. We also found in February 2019 that the forecast completion dates for milestones listed in the 2012 and 2017 plans may not present an accurate picture of the status of the milestones and EM’s cleanup efforts. For example, in the 2012 plan, DOE reported that only four out of 218 milestones were at risk of missing their planned completion date, while the rest were on schedule. When comparing these milestones to the 2017 plan, we found that at least 14 of them had been postponed. Similarly, the 2017 plan listed only one milestone out of 154 as forecast to miss its due date. However, because EM does not have a historical record of the changes made to the milestones, it is unclear how many of these milestones were recently revised or actually represented their original due dates because the report does not include this information. Because DOE is not consistently and comprehensively submitting complete information about the status of its cleanup, Congress and other stakeholders may not have access to reliable information to make informed decisions about billions of dollars of cleanup work. We recommended that DOE submit in EM’s annually required Future-Years Defense Environmental Management Plan all mandated requirements, as well as information on annual growth in environmental liability estimates by site, the key factors causing that growth, and an explanation of significant differences between environmental liability estimates and life cycle cost estimates. DOE agreed with our recommendation and has since said it is working toward this goal. In addition to the Future-Years Defense Environmental Management Plan, DOE is to submit a budget request each fiscal year to Congress along with an explanation of what EM cleanup activities the funding will accomplish. However, in January 2019 we found that the information EM provided to Congress in its fiscal years 2016, 2017, and 2018 budget requests did not reflect the funding some senior DOE officials said EM needs to meet its scheduled cleanup milestones. We reported that in a 2015 presentation on cleanup priorities, EM’s Deputy Assistant Secretary noted that EM’s anticipated long-term funding needs for the full costs of cleanup far exceeded the office’s annual budget requests and noted that in fiscal years 2016, 2017, and 2018, EM anticipated that it needed nearly $8 billion annually to meet scheduled milestones called for in compliance agreements. However, DOE’s budget requests for those fiscal years were $5.8 billion, $6.1 billion, and $6.5 billion, respectively—a shortfall of at least $1.5 billion per year. The Deputy Assistant Secretary also noted that if EM continued to receive about $6 billion per year in the coming 2 decades, it would face a funding shortfall of about $28 billion. He also said that the time frame for EM’s cleanup mission would likely be extended for years, thereby increasing cleanup costs and raising the environmental liability. Similarly, we reported that in a 2017 site cleanup meeting, EM’s Associate Principle Deputy Assistant Secretary for Field Operations said that in order for EM to meet all of the cleanup requirements reflected in agreements with federal and state regulators, EM would need a much larger budget than was requested in fiscal year 2018. For example, this official said that EM’s Hanford site, which received about $2.5 billion in fiscal year 2018, needed more than $4 billion per year to meet scheduled milestones to construct and operate the WTP—one of many cleanup activities at the site—for the duration of its planned mission. The official added that EM’s annual budget will not cover all needs, particularly because infrastructure maintenance, repair, and replacement needs are growing and extending the completion of cleanup further into the future. We recommended that DOE disclose the funding EM needs to meet all of its scheduled milestones. DOE agreed with this recommendation and said it plans to request the funding needed to meet its cleanup agreements. Chair DeGette, Ranking Member Guthrie, and Members of the Subcommittee, this concludes my prepared remarks. I would be happy to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact David C. Trimble, Director, Natural Resources and Environment, at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. GAO staff who made key contributions to this testimony are Amanda Kolling (Assistant Director), Chad Clady, Kelly Friedman, Cristian Ion, Jeff Larson, Cynthia Norris, Dan Royer, and Kiki Theodoropoulos. Department of Energy Contracting: Actions Needed to Strengthen Subcontract Oversight. GAO-19-107. Washington, D.C.: March 12, 2019. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP. Washington, D.C.: March 6, 2019. Nuclear Waste Cleanup: DOE Could Improve Program and Project Management by Better Classifying Work and Following Leading Practices. GAO-19-223. Washington, D.C.: February 19, 2019. Nuclear Waste: DOE Should Take Actions to Improve Oversight of Cleanup Milestones. GAO-19-207. Washington, D.C.: February 14, 2019. Department of Energy: Program-Wide Strategy and Better Reporting Needed to Address Growing Environmental Cleanup Liability. GAO-19-28. Washington, D.C.: January 29, 2019. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "EM's cleanup responsibilities include remediating contaminated soil and groundwater, deactivating and decommissioning contaminated facilities, and treating millions of gallons of radioactive waste that resulted from nuclear weapons produced during World War II and the Cold War. GAO has reported on a wide range of challenges facing EM, including management challenges and the office's increasing environmental liability. In 2017, GAO added the U.S. government's environmental liability to the list of program areas that are at high risk for fraud, waste, abuse, and mismanagement or in need of transformation. DOE is responsible for over 80 percent of the federal government's environmental liability. This testimony discusses (1) the status of DOE's environmental liability, (2) management challenges at EM, and (3) EM's reporting on its cleanup efforts. It is based on five GAO reports issued from January to March 2019, updated with information from DOE's recent Fiscal Year 2018 Agency Financial Report and 2020 budget request. In fiscal year 2018, the Department of Energy's (DOE) estimated environmental liability—that is, its estimated probable costs of future environmental cleanup—was $494 billion. Of this amount, DOE's Office of Environmental Management (EM)—which is responsible for most of DOE's cleanup activities—accounted for $377 billion. EM's portion of the liability reflects cleanup estimates for 16 sites across the United States. Two of these, the Hanford site in Washington and Savannah River site in South Carolina, have most of EM's nuclear waste stored in tanks, which is particularly costly and complicated to treat. EM's environmental liability grew by $214 billion in fiscal years 2011 through 2018, even though EM spent over $48 billion on cleanup. GAO found that this liability may continue to grow for several reasons: EM's environmental liability does not include the costs of all future cleanup responsibilities. For example, as of April 2018, DOE and its contractor had not negotiated a cost for completing a large waste treatment facility, called the Waste Treatment and Immobilization Plant, at the Hanford site. About 30 to 60 percent of EM's cleanup budget goes toward recurring activities necessary to maintain the sites—such as physical security and infrastructure maintenance—rather than toward reducing EM's environmental liability. EM officials have not analyzed the root causes of the cost growth. GAO found that EM has not resolved long-standing management challenges. First, EM does not have a program-wide cleanup strategy and relies primarily on individual sites to locally negotiate cleanup activities and establish priorities, which does not always balance overall risks and costs. For example, the Hanford and Savannah River sites plan to treat similar radioactive tank waste differently, with Hanford's efforts possibly costing tens of billions more than Savannah River's. In addition, EM manages most of its cleanup work as operations activities, under less stringent requirements than other environmental remediation projects. For example, operations activities are not subject to independent oversight outside EM, and therefore DOE cannot hold EM accountable for its performance. GAO also found that EM has not consistently reported to Congress on its cleanup efforts as required, and the information EM has reported has been incomplete or inaccurate. Under the National Defense Authorization Act for Fiscal Year 2011, EM must annually report estimated costs and detailed funding needs for future cleanup activities. EM's fiscal year 2017 submission to Congress was only the second one since fiscal year 2011, and it did not include a detailed list of upcoming activities or funding needed to meet those activities. Finally, GAO found that information provided in EM's fiscal year 2016 to 2018 budget requests did not reflect the funding some DOE officials said it needs to meet its milestones. Budget requests for those years were for at least $1.5 billion less than the $8 billion a senior EM official said EM anticipated was needed annually to meet milestones called for in legally enforceable agreements. Since January 2019, GAO has made 20 recommendations to DOE to address the growing environmental liability and management challenges and will continue to monitor DOE's implementation of these recommendations. DOE has generally agreed with all but one of these recommendations and has noted plans to implement many of the recommendations.", "document_type": "gao"}
{"report": "The Bureau is charged with counting every person in the decennial census once, only once, and in the right place. To ensure fairness and consistency in where people are counted, for the first decennial in 1790, Congress established the concept of counting people where they usually reside. The Bureau has relied on that concept ever since. Building on the concept of usual residence, the Bureau subsequently established criteria, which it refers to as residence criteria, to determine where people should be counted during each decennial (see text box). Residence criteria 1. Count people at their usual residence, which is the place where they live and sleep most of the time. 2. People in certain types of group facilities on Census Day are counted at the group facility. 3. People who do not have a usual residence, or who cannot determine a usual residence, are counted where they are on Census Day. For most people, applying the concept of usual residence and the Bureau’s associated residence criteria is straightforward. For others who may be more mobile, like members of the military, college students, migrant farm workers, and people living in group quarters, determining where to count them can be more complicated. Therefore, for each decennial the Bureau issues guidance describing how the criteria should be applied to certain complex living situations for which people commonly request clarification. The guidance is intended to inform the public about how to respond and to assist enumerators and other Bureau staff in administering a proper count. In addition to counting the nation’s population accurately, the Bureau must complete the count and tabulate it against a backdrop of immutable deadlines. The Bureau is required by law to count the population as of April 1, 2020 (Census Day); deliver state apportionment counts to the President by December 31, 2020; and provide redistricting data to the states by April 1, 2021. To meet these deadlines and ensure an accurate count, the Bureau carries out thousands of interrelated activities before, during, and after data collection (see figure 1 for a timeline of selected key activities). The Bureau plans to use its concept of usual residence and its associated residence criteria to determine where to count people in the 2020 Census generally as it did in 2010, but in 2018 the Bureau updated its guidance on how to apply that concept to count people in six complex living situations (see figure 2 for an overview of these changes). In developing the guidance for 2020, the Bureau sought input from external stakeholders on needed changes and solicited public comments on the draft guidance through the Federal Register. In response, the Bureau received input and comments from a variety of entities including federal, state, local, and tribal governments, as well as civil rights and other advocacy organizations. Military and civilian employees of the United States deployed overseas. In 2010, overseas military and civilian employees of the United States who were U.S. citizens were counted at their home state of record for apportionment purposes only. For 2020, the Bureau decided to count these personnel differently depending on whether their permanent duty station was in the United States. Personnel assigned or stationed overseas will continue to be counted as they were in 2010. Personnel stationed in the United States while deployed overseas, however, will instead be counted at their usual home address in the United States for both apportionment and redistricting purposes. According to Bureau documentation, this change resulted from Bureau analysis of data from the Department of Defense which found that personnel deployed overseas were there for shorter periods and were likely to return to their prior usual place of residence, whereas personnel assigned or stationed overseas generally remained overseas for greater periods and often did not return to their prior stateside location. Military and civilian employees of the United States deployed, stationed, or assigned overseas who are legal U.S. residents but not citizens. For 2020, the Bureau plans to count this population the same way it counts U.S. citizens working for the federal government overseas, as described above. According to a Bureau assessment of how it counted personnel overseas in 2010, its guidance for federal agencies that provide the Bureau with data on overseas personnel was unclear on the treatment of non-citizens. According to Bureau officials, it is therefore likely that other federal agencies following that guidance generally excluded non-citizens from the 2010 count. Based on the Bureau’s assessment, the Bureau plans to make clear in its 2020 guidance that U.S.-resident non-citizens working for the federal government overseas are to be counted the same way as U.S. citizens. Bureau officials stated that this change should ensure that U.S.-resident non-citizens are counted more consistently with other U.S. residents. Crews of U.S. maritime and merchant vessels sailing between a U.S. and a foreign port. In 2010, if a U.S. maritime or merchant vessel was sailing between a U.S. and a foreign port on Census Day, then the crewmembers were not counted. For 2020, the Bureau plans to count these crewmembers at their onshore usual residence in the United States or, if they have none, then at the vessel’s U.S. port of departure or arrival. This matches how the Bureau counts crewmembers if their vessel is at a U.S. port or sailing between two U.S. ports. According to Bureau documentation, this change resulted from Bureau analysis and consultation with stakeholders (including the Maritime Administration) which found that crewmembers in each of these situations usually retain an onshore residence in the United States where they live and sleep most of the time so they should be counted in the same way. Juveniles in non-correctional residential treatment centers. For 2020, the Bureau plans to count this population at the U.S. residence where they live and sleep most of the time or, if they have no usual home address, then at the facility. In 2010, they were counted at the facility. The Bureau made this change after concluding that these juveniles typically only stay at residential treatment center facilities temporarily and generally have a usual home elsewhere to which they return after treatment is completed. Religious group quarters residents. For the 2020 Census, the Bureau will count this population at the religious group quarters facility. In 2010, this population was counted at their usual home address or, if they had no usual home address, then at the facility. The Bureau made this change after concluding that this population typically does not have a place of usual residence elsewhere. According to Bureau officials, the Bureau expects the updated guidance will provide greater clarity and result in more informed responses and, thus, higher quality data. Among other things, Bureau officials stated that the data will more accurately reflect the composition of local communities. For the 2020 Census, the Bureau did not change its guidance regarding where to count people in other complex living situations. For example, the Bureau did not make changes to where it will count college students, who will continue to be counted at their parents’ or guardians’ home if they live and sleep there most of the time or, if they live away from their parents’ or guardians’ home, then at their on- or off-campus residence. See table 1 for an overview of where the Bureau will count people in complex living situations the same as it did in 2010. In addition, the Bureau’s guidance includes examples of situations in which people should not be counted in the census, such as the following: people living outside the United States on Census Day who are not military or civilian employees of the U.S. government and are not dependents living with military or civilian employees of the U.S. government; babies born after Census Day or people who die before Census Day; college students living at and attending college outside the United States; and citizens of foreign countries visiting the United States, such as on vacation or a business trip. To help census respondents understand who and where to count household members and others, the Bureau is translating key terms from its census form for 2020 into 59 languages and making it available to community partners and others who may be in a position to help linguistically isolated groups provide accurate responses. It is translating scripted responses to questions about complex living situations into 12 foreign languages to be used by staff who will help answer questions about and take responses over the telephone. The Bureau reports that stakeholder feedback on where to count prisoners largely urged the Bureau to count them at their pre- incarceration addresses to avoid shifting political power to the prison locations at the expense of the prisoners’ home communities. However, the Bureau concluded that counting prisoners anywhere other than the correctional facility would be less consistent with the concept of usual residence, since the majority of people in prisons live and sleep there most of the time. Therefore, for 2020, the Bureau decided that it will continue to count prisoners at the correctional facility as it did in 2010. However, the Bureau will make available to states two tools to allow them to “move” their prisoner population to the prisoners’ pre-incarceration addresses for redistricting purposes. The tools are intended to support such movement within but not across state boundaries. The Bureau is providing states with an online tool that will identify the census geographical block that the population would be tabulated in for any state-provided addresses. If a state wants to “move” the tabulation of specific prisoners within its boundaries, this information will let state officials know which block tabulations to adjust. On November 4, 2019, the Bureau launched the web page that will support states in using this tool. The Bureau plans to update it with 2020 Census geographic data in February 2021, before the Bureau is required to provide redistricting data to the states. The Bureau also plans to provide states with data on group quarters, which will contain a separate count of their prisoner populations, as part of each state’s redistricting file. By including group quarters data in the redistricting file, the Bureau plans to provide these group quarters data to users 1 to 2 months earlier than it did in 2010 when it provided group quarters data separately from the redistricting file. According to the Bureau, this earlier release will benefit many users, including state officials who must consider whether to include or exclude certain populations when redrawing boundaries as a result of state legislation. Once the Bureau has completed its decennial data collection efforts, it generally finds that a small proportion of responses have data quality issues that were not resolved during preceding operations. In these cases, (1) some addresses have multiple responses, (2) some households are missing responses altogether, or (3) some responses include answers that are incomplete or conflict with one another. The Bureau has a variety of plans to resolve these issues (see figure 3). The Bureau may receive multiple census responses from a household for various reasons. For example, different members of the same household could each respond by mail or over the internet, or one member could mail a response and another answer a census worker’s questions in person during the Bureau’s non-response follow-up operation. The Bureau assessed its response processing in 2010, and identified about 14 million responses for households that already had another response (roughly 10 percent of the total number of households included in the final 2010 count). The widespread option to respond over the internet is new for 2020, and while having included it in multiple census tests, Bureau officials have not set expectations on the extent to which it may increase the number of addresses at which it gets multiple responses. To guard against overcounting, as it has in prior decennials, for 2020 the Bureau plans to use an automated routine—referred to as the Primary Selection Algorithm—to determine whom to count at addresses for which it has received multiple responses once data collection is complete. According to Bureau officials, in making this determination, the algorithm takes into account a wide range of information, including results from its fraud detection efforts. We did not examine the algorithm for this review. In addition, to help ensure the integrity of these determinations, the Bureau does not disclose the details of the algorithm publicly and permits only Bureau officials with an operational need to know to access the algorithm. According to Bureau documentation, the Bureau has updated the algorithm for 2020 based on its review of various response scenarios and data from past censuses and census tests. When the Bureau, after its data collection efforts are completed, has been unable to reach anyone able and willing to respond at a particular address or to obtain information about the address and its potential occupants in other ways—such as through neighbors or a building manager—it may be left not knowing whether a housing unit even exists at the address or whether it is occupied, and, if so, by how many people. As it did in 2010, for 2020 the Bureau plans to use a statistical technique it refers to as count imputation to fill in missing data about the existence and number of people living at an address in question. Count imputation has three types. Residence status. This is used when the Bureau does not know whether an address is a real and livable residence. In contrast, it could be a business or in such disrepair that no one could live there. Occupancy status. This is used when the Bureau knows that an address is a real housing unit, but not whether it is vacant or occupied. Household size. This is used when the Bureau knows an address is a real, occupied home, but not how many people live there. To carry out each of these types of count imputation, the Bureau uses a technique referred to as hot-deck imputation which employs continually updated census data from similar nearby households as the basis for filling in the missing statuses and household size. The Bureau has been using some form of hot-deck imputation since at least the 1960 Census. According to Bureau reporting, in 2010, about 500,000 of 137 million addresses counted in the decennial (0.4 percent) were missing an entire response and the Bureau therefore used count imputation to determine a combination of their residence and occupancy status and household size. The Bureau’s count imputation in 2010 added about 1.2 million people to the final census count. For 2020, however, some of the missing responses which otherwise would have required count imputation will instead be resolved through the use of administrative records in conjunction with the Bureau’s door-to-door non-response follow-up effort. Specifically, the Bureau plans to draw on relevant data from records of sufficient quality thereby reducing the amount of follow-up field work needed and the number of households in need of count imputation. According to Bureau officials, they plan to finalize a decision memorandum in December 2019 specifying the Bureau’s thresholds for determining whether administrative records are of sufficient quality for such uses. According to Bureau officials, tests and evaluations performed during the preceding decade demonstrate that these uses of administrative records will provide more accurate results than traditional methods of seeking information about the address from neighbors and others or from count imputation alone. Bureau testing and evaluation also identified improvements to its count imputation technique for 2020, including enhanced use of administrative records in its hot-deck imputation, which it expects will generate results better aligned with actual data for those addresses where it had been missing. Once the Bureau has determined the total number of households and people as of Census Day for apportionment purposes, it resolves incomplete and conflicting information within individual household responses for redistricting and final tabulation purposes. Specifically, for 2020, the Bureau plans to ensure that each household response includes complete and consistent information regarding, for occupied housing units, the age, date of birth, sex, race, and ethnicity (Hispanic or non- Hispanic origin) of each household resident; their relationship to the householder; whether the housing unit is rented or owned by a member of the household; for group quarters, the type of such quarters, such as federal detention center or in-patient hospice facility; and, if the unit is vacant, why (see figure 4). These characteristics (which the Bureau refers to as person and housing characteristics) may be incomplete or conflicting for various reasons, including intentional or accidental omissions or errors by the person filling out the form. According to Bureau data, in 2010, responses for 13 percent of the people counted in the decennial (about 40 million of the about 300 million counted) contained incomplete or conflicting person characteristics that the Bureau had to resolve. For 2020, as it did for 2010, the Bureau plans to use a technique it refers to as edit and characteristic imputation to fill in incomplete and reconcile conflicting information in individual household responses. As summarized in table 2 and described below, it does so using one of three methods, depending on which characteristics are incomplete or conflicting and on what other information the Bureau has about those characteristics. The Bureau has been using some form of characteristic imputation since at least the 1940 Census. Use existing information about same person or household. This method is used when some, but not all, person and household characteristics are incomplete or conflicting and those characteristics can be filled in or reconciled using other information about the same person or household reported within the 2020 response or in prior census or other administrative records. For example, if a person’s date of birth is reported but not his or her age, the Bureau will fill in the age based on the date of birth. If neither age nor date of birth is reported, the Bureau will look to the 2010 Census to fill in both characteristics, adjusting for the intervening years. Use existing information about other people or households. As with the prior method, this method is used when some, but not all, person and household characteristics are incomplete or conflicting. However, unlike the prior method, the incomplete or conflicting characteristics cannot be filled in or reconciled using other information about the same person or household reported within the 2020 response or in prior census or other administrative records. Therefore, the Bureau will look instead to information about other people included in the same 2020 response or to nearby people or households from other 2020 responses. For example, if race is reported for a parent but not a child, the Bureau will fill in the child’s race using the race provided for the parent. If there is no information within the household response that can be used to fill in the child’s race, the Bureau will use a hot-deck imputation method. As discussed earlier, this method employs continually updated census data from similar nearby households as the basis for filling in the needed information. Use existing information about same or other households. This method is used when all person characteristics are incomplete. In this instance, the Bureau will first look to prior census and other administrative records. If the household size reflected in those records matches the household size reflected in the 2020 response, the Bureau will use those records to fill in all person characteristics available in previous census and administrative records. Remaining characteristics not filled in by previous census and other administrative records will be filled in using the methods discussed above. If the household size totals do not match, the Bureau will use a hot-deck imputation method, drawing the missing information from continually updated census data from similar nearby households. As with other areas of the 2020 Census, the key change in the Bureau’s plan for resolving incomplete and conflicting information is the enhanced use of prior census and other administrative records. Specifically, in 2010 the Bureau relied on such records to fill in only race and ethnicity. In contrast, as discussed above, for 2020 the Bureau plans to use prior census and other administrative records as an integral part of its edit and characteristic imputation methods. The Bureau believes this will result in improved data quality and more accurate results. We provided a copy of this draft report to the Department of Commerce. The Census Bureau provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Commerce, the Director of the U.S. Census Bureau, and the appropriate congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report please contact me at (202) 512-2757 or goldenkoff@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contact named above, Ty Mitchell (Assistant Director), Karen Cassidy and Emmy Rhine Paule (Analysts-in-Charge), Mark Abraham, Joy Booth, Ann Czapiewski, Brenda S. Farrell, Robert Gebhart, Gretta Goodwin, Amalia Konstas, Lisa Pearson, Cynthia Saunders, Andrea Starosciak, Jon Ticehurst, and Peter Verchinski made significant contributions to this report. The Government Accountability Office, the audit, evaluation, and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO’s commitment to good government is reflected in its core values of accountability, integrity, and reliability. The fastest and easiest way to obtain copies of GAO documents at no cost is through our website. Each weekday afternoon, GAO posts on its website newly released reports, testimony, and correspondence. You can also subscribe to GAO’s email updates to receive notification of newly posted products. The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s website, https://www.gao.gov/ordering.htm. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. Connect with GAO on Facebook, Flickr, Twitter, and YouTube. Subscribe to our RSS Feeds or Email Updates. Listen to our Podcasts. Visit GAO on the web at https://www.gao.gov. James-Christian Blockwood, Managing Director, spel@gao.gov, (202) 512-4707 U.S. Government Accountability Office, 441 G Street NW, Room 7814, Washington, DC 20548 Please Print on Recycled Paper.", "summary": "The decennial census produces data vital to the nation. The data are used for congressional apportionment and redistricting; to allocate billions each year in federal funds; and to provide a social, demographic, and economic profile of the nation to guide policy decisions at all levels of government. Given census data's importance, it is incumbent upon the Bureau to ensure their quality. If people are counted in the wrong place, some states and localities may unduly lose or gain political power through apportionment and redistricting disproportionate to their actual population. Poor outcomes can also result if some households are over counted due to multiple responses, not counted due to missing responses, or miscounted due to incomplete or conflicting responses. GAO was asked to describe the Bureau's plans for the 2020 Census to resolve multiple, missing, incomplete, and conflicting responses. This report describes how, for 2020, the Bureau plans to (1) determine where to count people, including those in complex living situations, and how this differs from 2010; and (2) resolve multiple, missing, incomplete, and conflicting responses after data collection, and how this differs from 2010. GAO reviewed relevant Bureau documents and interviewed officials responsible for the 2020 Census. GAO provided a draft of this report to the Bureau. The Bureau provided technical comments, which were incorporated as appropriate. To determine where people should be counted during each decennial census, the Census Bureau (Bureau) has established residence criteria (see figure). For most people, applying these criteria is straightforward. For others who may be more mobile, like members of the military, college students, migrant farm workers, and people living in group quarters such as federal detention centers or in-patient hospice facilities, it can be more complicated. Therefore, for each decennial the Bureau issues guidance describing how the criteria should be applied to certain complex living situations. For the 2020 Census, the Bureau has updated its guidance on where to count people in six complex living situations, such as U.S. employees deployed overseas. The Bureau plans to count people in other living situations in the same manner as it did in 2010. As in 2010, the Bureau will count prisoners at the correctional facility where they are housed, but also plans to make other resources available to states that want to use prisoners' in-state, pre-incarceration addresses for redistricting purposes instead of their prison addresses. To resolve multiple responses for a single address, for 2020 the Bureau plans to use a longstanding automated routine—its Primary Selection Algorithm—to determine who to count at the address. For 2020, Bureau documents indicate it updated the algorithm after reviewing various response scenarios and data from past censuses and tests. To resolve missing household responses following data collection, as it did in 2010, the Bureau plans to use for 2020 a technique it refers to as count imputation, which draws data from similar nearby households to determine whether a housing unit exists, whether it is occupied, and, if so, by how many people. However, for 2020, the Bureau will also try to reduce the number of households which otherwise would have required count imputation and help reduce follow-up field work by drawing on relevant data from administrative records of sufficient quality in conjunction with its non-response follow-up field work. To resolve incomplete and conflicting information within a household response, the Bureau plans to use a technique it refers to as edit and characteristic imputation. This technique involves drawing data from the same household response, prior census and other administrative records or similar nearby households, which the Bureau believes will improve data quality and produce more accurate results.", "document_type": "gao"}
{"report": "According to the 2015 report ordered by the Secretary of Defense and issued by the Military Justice Review Group, the military justice system is designed to ensure discipline and order in the armed forces, since crimes committed by servicemembers have the potential to destroy the bonds of trust, seriously damage unit cohesion, and compromise military operations. The jurisdiction of the UCMJ extends to all places and applies to all active-duty servicemembers. UCMJ jurisdiction applies to other individuals as well, such as members of the National Guard or reserves who are performing active-duty service; retired members who are entitled to pay or are receiving hospitalization in a military hospital; prisoners of war in custody of the armed forces; persons serving with or accompanying the armed forces in the field in time of declared war or contingency operations, such as contractors; and members of organizations such as the National Oceanic and Atmospheric Administration and the Public Health Service when assigned to and serving with the armed forces. In creating the military justice system, Congress established three types of military courts, called courts-martial: summary, special, and general. Each of these types respectively is intended to deal with progressively more serious offenses, and each court-martial type may adjudicate more severe maximum punishments as prescribed under the UCMJ. In addition, an accused servicemember can receive nonjudicial punishment under Article 15 of the UCMJ, by which a commander can punish a servicemember without going through the court-martial process. Table 1 provides an overview of nonjudicial punishments and the three different types of courts-martial. The Military Justice Act of 2016 enacted significant reforms to the UCMJ, most of the provisions of which became effective on January 1, 2019. These reforms included changes such as limitations on the types of punishments permitted with nonjudicial punishments, changes to required size of the panel, or jury, and changes to what judicial outcomes are subject to automatic appeal. There are some areas where individual services supplement but remain consistent with the UCMJ. For example, the Air Force provides a right to counsel in certain forums where the services are not required to do so. In addition to the reforms affecting the UCMJ, the Military Justice Act of 2016 also directed changes to military justice data collection and accessibility. Specifically, section 5504 of the Military Justice Act of 2016 directed the Secretary of Defense to prescribe uniform standards and criteria pertaining to case management, data collection, and accessibility of information in the military justice system. As a result, the DOD Office of General Counsel authorized the establishment of the Article 140A Implementation Subcommittee of the Joint Service Committee on Military Justice to, among other things, assess each service’s case management system, recommend what data fields the services should collect, propose uniform definitions for the data fields the services should collect, and recommend standardized methods and data field definitions to improve the collection of data concerning race and ethnicity of individuals involved in the military justice system. The subcommittee conducted a study and submitted its recommendations to the Joint Service Committee Voting Group on July 2, 2018, and the Voting Group submitted a report and its agreed upon recommendations to the DOD Office of General Counsel on August 24, 2018. The Military Justice Act of 2016 provides that the Secretary of Defense was to carry out this mandate by December 23, 2018, and that the Secretary’s decisions shall take effect no later than December 23, 2020. On December 17, 2018, the General Counsel of the Department of Defense issued uniform standards and criteria, which directed that each military justice case processing and management system be capable of collecting uniform data concerning race and ethnicity. From fiscal years 2013 through 2017, more than 258,000 active-duty servicemembers were disciplined for a violation of the UCMJ, out of more than 2.3 million unique active-duty servicemembers who served across all of the military services during this period. Figure 1 shows the number of cases of each type of court-martial and of nonjudicial punishments in each of the military services. There are several steps in the discipline of a servicemember who allegedly commits a crime under the UCMJ, which are summarized in figure 2 below. The military justice process begins once an offense is alleged and an initial report is made, typically to law enforcement, an investigative entity, or the suspect’s chain of command. Policies for initiating criminal investigations by military criminal investigative organizations (MCIO) and procedures for investigating criminal allegations are set forth in DOD and service guidance. At this time, the commanding officer or law enforcement will conduct an inquiry or investigation into the accusations and gather all reasonably available evidence. MCIOs have the authority and independent discretion to assume investigative jurisdiction, and do not require approval from any authority outside of the MCIO to conduct such an investigation—commanders outside of the organization are not to impede or interfere with such decisions or investigations by the MCIO. If an MCIO is involved in the inquiry, the investigative entity is to gather all reasonably available evidence and provide the commanding officer with unbiased findings that reflect impartiality as required by DOD instruction. According to service officials, during the conduct of the criminal investigation, the subject of the investigation has the right to obtain legal counsel at any time. After an investigation, the first step toward initiation of a court-martial is when the accused is presented with a list of charges signed by the accuser under oath, which is called preferral of charges; the accuser who prefers the charges may be anyone subject to the UCMJ. After charges are preferred, the charges are forwarded to an officer with sufficient legal authority to convene a court-martial, also known as the “convening authority.” The convening authority in receipt of preferred charges may, among other actions and depending on the nature of the charges and the level of the convening authority, refer the case to its own court or forward the case to a superior commander for disposition, for example, to a general court-martial convening authority. The general court-martial convening authority would have similar options: to dismiss the charges, refer them to a general or special court-martial, or take some lesser action. Before any case is referred to a general court-martial, the case must proceed through a preliminary hearing under Article 32 of the UCMJ, unless waived by the accused. The Article 32 hearing is presided over by an impartial judge advocate, or another individual with statutory authority, who is appointed by the convening authority and makes a recommendation to the convening authority. We analyzed general and special courts-martial that were preceded by investigations recorded in databases maintained by MCIOs, which we refer to as recorded investigations, and general and special courts-martial that did not have a record within an MCIO database. As shown in figure 3 below, the majority of general and special courts-martial, ranging from 53 percent to 74 percent across the services, had a recorded investigation, while the remaining cases would have been investigated by other sources, such as local civilian law enforcement, command investigations, or in the case of the Air Force, their military law enforcement forces. Once referred to a general or special court-martial, an accused servicemember may be tried by a military judge alone or by a military judge with a military jury, referred to as members of the court-martial. If the accused servicemember is tried by a military jury, the members of the court-martial determine whether the accused is proven guilty and, if the accused requests sentencing by the members, adjudicate a sentence. Otherwise, the military judge adjudicates the sentence. If the accused is tried by a military judge alone, the judge determines guilt and any sentence. In a summary court-martial, a single commissioned officer who is not a military judge adjudicates minor offenses and a sentence. Convictions at the general and special court-martial level are subject to a post-trial process and may be appealed to higher courts in cases where the sentence reaches a certain threshold. For example, depending on the forum and the adjudged sentence, the accused may be entitled to appellate review by the service Court of Criminal Appeals, and may be able to request or waive assignment of appellate defense counsel, or waive appellate review entirely. Depending, again, on forum and sentence, some cases that do not qualify for appellate review will receive review by a judge advocate to, among other things, determine that the court had jurisdiction and that the sentence was lawful. Some cases may then be further reviewed by the Court of Appeals for the Armed Forces, as well as by the U.S. Supreme Court at their discretion, if the case was reviewed by the Court of Appeals for the Armed Forces. The military justice system, like the civilian criminal justice system, provides avenues for accused servicemembers to raise allegations of discrimination, improprieties in investigations, improprieties in disposition, and improprieties in the selection of panel members at the court-martial proceeding, before a military judge and on appellate review. The Military Justice Act of 2016 requires that legal training be provided to all officers, with additional training for commanders with authority to take disciplinary actions under the UCMJ. The Office of Management and Budget (OMB) has established standards for collecting, maintaining, and presenting data on race and ethnicity for all federal reporting purposes. These standards were developed in cooperation with federal agencies to provide consistent data on race and ethnicity throughout the federal government. OMB standards establish the following five categories of race: American Indian or Alaska Native: A person having origins in any of the original peoples of North and South America (including Central America), and who maintains tribal affiliation or community attachment. Asian: A person having origins in any of the original peoples of the Far East, Southeast Asia, or the Indian subcontinent including, for example, Cambodia, China, India, Japan, Korea, Malaysia, Pakistan, the Philippine Islands, Thailand, and Vietnam. Black or African American: A person having origins in any of the black racial groups in Africa. Native Hawaiian or Other Pacific Islander: A person having origins in any of the original peoples of Hawaii, Guam, Samoa, or other Pacific Islands. White: A person having origins in any of the original peoples of Europe, the Middle East, or North Africa. The OMB standards also establish two categories of ethnicity. Hispanic or Latino: A person of Cuban, Mexican, Puerto Rican, South or Central American, or other Spanish culture or origin, regardless of race. Not Hispanic or Latino: A person not having the above attributes. In addition to defining race and ethnicity for federal administrative reporting and record keeping requirements, OMB standards provide two methods for federal agencies to follow regarding the collection of data on race and ethnicity. 1. Separate questions shall be used for collecting information about race and ethnicity wherever feasible. In this case, there are 5 categories of race noted above which individuals can select, and individuals can identify with more than one category of race. In addition to race, individuals can select one of the two ethnicity categories above. 2. If necessary, a single question or combined format can be used to collect information about race and ethnicity, where the following categories are provided for individuals: American Indian or Alaska Native, Asian, Black or African American, Hispanic or Latino, Native Hawaiian or other Pacific Islander, and White. In this instance, individuals can also select more than one category. Information collected on servicemembers’ gender is governed by DOD guidance. DOD Instruction 1336.05 provides that information collected on a servicemember’s gender is based on reproductive function. It provides that there are three options that can be selected when inputting a servicemember’s gender: male, female, or unknown. Racial and gender disparities in the civilian criminal justice system have been the subject of several studies in the past decade. While the civilian and military justice systems differ from each other, we reviewed information about racial and gender disparities in the civilian criminal justice system to enhance our understanding of the complexities of the issues, including how others had attempted to measure disparities. Some studies have assessed the rates at which minority groups are policed. For example, a Department of Justice study of data from the Bureau of Justice Statistics’ 2011 Police-Public Contact survey found that Black drivers were more likely than White or Hispanic drivers to be pulled over in a traffic stop; specifically, the study found that 10 percent of White drivers and 10 percent of Hispanic drivers were pulled over in a traffic stop, compared to 13 percent of Black drivers. This study also found that Black and Hispanic drivers were more likely to be searched once they were pulled over by the police; specifically, the study found that 2 percent of White drivers stopped by police were searched, compared to 6 percent of Black drivers and 7 percent of Hispanic drivers. In addition, U.S. government data shows that racial disparities exist among individuals who are arrested. For example, data from the Federal Bureau of Investigation’s Uniform Crime Reporting Program, which compiles data from law enforcement agencies across the country, indicates that in 2016, Black individuals represented 26.9 percent of total arrests nationwide, but comprised 13.4 percent of the U.S. population according to U.S. census data estimates as of July 1, 2017. This data also shows that 69.6 percent of all arrested individuals were White, while White individuals comprised 76.6 percent of the U.S. population. Studies have also identified racial and gender disparities in civilian justice sentencing. In 2010 and 2017, the U.S. Sentencing Commission reported that Black male offenders received longer sentences than similarly situated White male offenders. Specifically, in 2017, the Commission analyzed federal sentencing data and reported that Black male offenders received sentences that on average were 19.1 percent longer than similarly situated White males for fiscal years 2012 to 2016. This analysis controlled for factors such as type of offense, race, gender, citizenship, age, education level, and criminal history. This study also found that female offenders of all races received shorter sentences than White male offenders. Similarly, the Commission’s 2010 report found that Black offenders received sentences that were 10 percent longer than those imposed on White offenders from December 2007 through September 2009, and male offenders received sentences that were 17.7 percent longer than female offenders, after controlling for the same factors as noted for the 2017 study, among others. Finally, racial and gender disparities have been identified among incarcerated populations. According to data from the Bureau of Justice Statistics, for prisoners with sentences of 1 year or more under the jurisdiction of state or federal correctional officials in 2016, Black males were six times more likely to be imprisoned than White males, and Hispanic males were 2.7 times more likely to be imprisoned than White males. The racial disparities were more pronounced for younger males, where Black males aged 18 to 19 were approximately 11.8 times more likely than White males of the same age to be imprisoned. The Bureau also reported that Black females were imprisoned at approximately twice the rate of White females. We did not assess the methodologies used in any of these studies or the reliability of the data cited in the studies; these studies are discussed here to provide broader context for the discussion about racial and gender disparities in the military justice system. The military services collect and maintain gender information, but they do not collect and maintain consistent information about race and ethnicity in their investigations, military justice, and personnel databases. This limits the military services’ ability to collectively or comparatively assess these demographic data to identify any racial or ethnic disparities in the military justice system within and across the services. The military services use different databases to collect and maintain information for investigations, courts-martial, and nonjudicial punishments. All of the databases collect and maintain gender information, but the Coast Guard’s military justice database does not have the capability to query or report on gender data. While the military services’ databases collect and maintain complete data for race and ethnicity, the information collected and maintained about race and ethnicity is not consistent among the different databases within and across the services. Moreover, the Coast Guard, the Navy, and the Marine Corps do not collect and maintain complete and consistent servicemember identification data, such as social security number or employee identification number, in their respective military justice databases, although DOD leadership recently directed improvements in this area. Finally, the military services do not report data that provides visibility into disparities in the military justice system, and DOD and the services lack guidance about when potential racial, ethnic, or gender disparities should be further reviewed, and what steps should be taken to conduct such a review if needed. Each military service uses a different database to collect and maintain information on investigations and courts-martials, and, in some services, nonjudicial punishments, as shown in figure 4. For three of the military services—the Army, the Navy, and the Coast Guard—the databases listed in figure 4 include information about some, but not all, of their nonjudicial punishment cases. Additionally, the nature of the information collected by each of the services’ databases varies, as noted below. Investigations. The Army collects and maintains information on investigations conducted by the Army Criminal Investigation Command in the Army Law Enforcement Reporting and Tracking System database. According to Army officials, the Office of the Provost Marshal General and the Army Criminal Investigation Command developed this database to replace a 2003 system, the Army Criminal Investigation and Intelligence System, and a significant part of the military police’s 2002 system, the Centralized Operations Police Suite. The officials said that the Army Law Enforcement Reporting and Tracking System has been operational since 2015, and has become the primary case management system for all Army law enforcement professionals. However, Army officials said that cases involving commander-led investigations are unlikely to be recorded in this database. Courts-martial and nonjudicial punishments. The Army uses Military Justice Online and the Army Courts-Martial Information System to collect data on court-martial cases. According to Army officials, Military Justice Online, created in 2008, is a document- generating system that primarily is used by the Army’s judge advocate general corps and promotes uniformity in case processing among the Army’s staff judge advocate offices. Military Justice Online includes information about courts-martial, some nonjudicial punishments, administrative separations, and administrative reprimands of servicemembers. Army officials said that the Army Courts-Martial Information System, which has been used since 1989, serves as the Army trial judiciary’s case tracking system and is used by the Army’s trial judiciary to track court-martial cases. Investigations. The Air Force military criminal investigative organization, the Office of Special Investigations, uses a system called the Investigative Information Management System to collect and maintain information related to investigations. According to Air Force officials, the Investigative Information Management System has been in use since 2001. Courts-martial and nonjudicial punishments. The Air Force uses the Automated Military Justice Analysis and Management System, which is designed to be a case management system to collect comprehensive information for both court-martial cases and nonjudicial punishments. According to Air Force officials, the Automated Military Justice Analysis and Management System has been in use since 1974. Investigations. According to Navy officials, the Navy and Marine Corps’ joint system for maintaining and collecting information related to investigations is the Consolidated Law Enforcement Operations Center, which has been in use since 2004. Navy officials said that this database initially contained information regarding Navy and Marine Corps law enforcement incidents and criminal investigations, but began to include investigations conducted by the Naval Criminal Investigative Service in 2012. Courts-martial. The Navy and the Marine Corps both use the Case Management System to collect and maintain information about military justice matters with involvement by a Navy or Marine Corps legal office, including special and general court-martial cases. This system was initially developed by the Marine Corps to track information about legal services provided by their legal offices. According to Navy and Marine Corps officials, the system has been in use by the Marine Corps since 2010 and by the Navy since 2013. Officials from the Marine Corps said that although the Case Management System has been in use since 2010, the system was not widely used until 2012. Nonjudicial punishments. The Marine Corps Total Force System, the Marine Corps personnel database, collects and maintains information on summary courts-martial and nonjudicial punishments for cases where there was a conviction or punishment. According to Marine Corps officials, this system has been in use since 1995. Navy officials said that their personnel database records information about nonjudicial punishments if the punishment involved a change in pay or grade. The services’ military justice Case Management System includes information on some nonjudicial punishment cases in the Navy and the Marine Corps, which Navy and Marine Corps officials said was for those cases that had involvement by their legal offices. Investigations. The Coast Guard Investigative Service uses the Field Activity Case Tracking System to collect and maintain information on servicemembers investigated for violations of the UCMJ. According to Coast Guard officials, this system has been in use since July 2014. Courts-martial. According to Coast Guard officials, the Coast Guard uses Law Manager to collect and maintain administrative information on court-martial cases. Law Manager has been in use since 2000, but was not used for court-martial data until 2003. Nonjudicial punishments. Coast Guard officials said that their military justice database contains records of nonjudicial punishments if a case involved their legal offices. In addition, according to Coast Guard officials, Direct Access, the Coast Guard’s personnel database, also collects and maintains information about some court-martial cases and nonjudicial punishments if the punishment resulted in a change in rank or pay or an administrative action against the accused servicemember. All of the military services collect and maintain gender information in their investigations, military justice, and personnel databases, but are inconsistent in whether they allow an unknown or unspecified gender, and the Coast Guard’s military justice database does not allow Coast Guard officials to query or report on gender data. Table 2 below summarizes how data regarding the servicemember’s gender is entered into the services’ databases and the number of potential gender options. Each database identifies at least two potential options—male and female—for data related to the servicemember’s gender, while about half of the databases (8 of 15) provide a third option to indicate that the gender is either unknown or not specified. Each of the military services’ investigations, military justice, and personnel databases maintained gender data for almost 100 percent of servicemembers, except we were unable to determine this completion rate for the Coast Guard’s military justice database. We could not determine the completeness of the Coast Guard’s gender data in its military justice database because, as previously noted, its military justice database does not have the capability to query on gender data. Standards for Internal Control in the Federal Government states that management should use quality information and obtain data on a timely basis so they can be used for effective monitoring. However, the Coast Guard does not have visibility over the gender of servicemembers prosecuted for UCMJ violations without merging data from multiple databases, which can be a labor-intensive and time-consuming process. According to Coast Guard officials, information regarding the gender of servicemembers prosecuted for UCMJ violations can be recorded in its military justice database, but gender is not a field that can be searched on or included in the reports they run using information from their military justice database, because of the way the military justice module in the database was designed. Coast Guard officials told us that the military justice database—Law Manager—was designed to determine the status of court-martial cases, and captures attributes that are generated by relevant UCMJ documents. Those official documents do not require the annotation of demographics such as gender, so this information is not used in Law Manager. A Coast Guard official indicated that it would be feasible to modify Law Manager to make it easier to run reports and queries that include gender information. The ability to query and report on the gender of servicemembers in its military justice database would provide the Coast Guard with more readily available data to identify or assess any gender disparities that may exist in the investigation and trial of military justice cases. Each of the military services’ databases collect and maintain complete data for race and ethnicity, but the military services do not collect and maintain consistent information regarding race and ethnicity in their investigations, military justice, and personnel databases. Additionally, the military services have not developed a mechanism to aggregate the data into consistent categories of race and ethnicity to allow for efficient analysis and reporting of consistent demographic data. The number of potential responses for race and ethnicity within the 15 databases across the military services ranges from 5 to 32 options for race and 2 to 25 options for ethnicity, which can complicate cross-service assessments. For example, the Army’s personnel database maintains 6 options for race and 23 options for ethnicity, whereas the Coast Guard’s personnel database maintains 7 options for race and 3 for ethnicity. Table 3 summarizes how the databases used by the military services vary in how the servicemember’s race is entered and the number of potential race options. Table 4 shows that the military services’ databases also vary in how information about servicemembers’ ethnicity is entered into the databases and the number of potential ethnicity options that are collected. Although the data collected and maintained was not consistent within and across the military services, each of the military services’ databases maintained race and ethnicity data for at least 99 percent of the servicemembers, with the exception of the Coast Guard. The Coast Guard does not track information about race or ethnicity in its military justice database. Coast Guard officials stated that this is because Law Manager was designed to determine the status of court-martial cases, and captures attributes that are needed to generate relevant UCMJ documents, such as court pleadings. Demographic information such as race and ethnicity is not included in these official documents, so this information is not input into Law Manager. Further, four of the databases we reviewed—including both of the Army’s military justice databases, and the Navy and the Marine Corps’ military justice databases—collect information on race and ethnicity in a combined data field as shown in table 4, whereas the other databases collect and maintain race and ethnicity information in two separate fields. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. Among other things, attributes of this internal control principle call for management to identify information requirements; obtain relevant data from reliable sources that are reasonably free from error; ensure that the data it receives is timely and reliable; and process the data obtained into quality information— information that is appropriate, current, complete, and accurate. In addition, federal internal control standards call for management to design the entity’s information system and related control activities to achieve objectives and respond to risks, thereby enabling information to become available to the entity on a timelier basis. Further, the Military Justice Act of 2016 required the Secretary of Defense to prescribe uniform standards and criteria for various items, including data collection and analysis for case management at all stages of the military justice system, including pretrial, trial, post-trial, and appellate processes, by December 2018. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140a of the Military Justice Act of 2016. As part of these uniform standards, the services were directed to collect data related to race and ethnicity in their military justice databases, and to collect racial and ethnic data in separate data fields. The standards provide that the services may have their military justice databases capture expanded ethnic or racial categories; however, for reporting purposes, expanded categories will aggregate to those categories listed in the standards. For race, the services will choose from six designations: (1) American Indian/Alaska Native, (2) Asian, (3) Black or African American, (4) Native Hawaiian or Other Pacific Islander, (5) White, or (6) Other. For ethnicity, the services will choose from two options: (1) Hispanic or Latino, or (2) Not Hispanic or Latino. These categories are consistent with the OMB standards for collecting and presenting such data. The military services are to implement the Secretary’s direction no later than December 23, 2020. However, DOD has applied these newly issued standards only to the military justice databases and not to the investigations and personnel databases. DOD officials stated that the investigations and personnel databases do not fall under the charter of the DOD General Counsel, which issued the standards for the military justice databases. Hence, these uniform standards do not apply to the military services’ investigations and personnel databases. We were able to analyze data across the investigations, military justice, and personnel databases by merging data from these databases, but this took multiple, detailed steps and would not be an efficient approach for routine analyses. Taking steps to develop the capability to present the race and ethnicity data in the military services’ personnel and investigations databases using the same categories included in the December 2018 standards for the military justice databases would allow for more efficient analysis of consistent demographic data. This could be done through either collecting and maintaining race and ethnicity data in the investigations and personnel databases using the December 2018 uniform standards or developing a capability to aggregate the data into the race and ethnicity categories included in the standards. The Navy, the Marine Corps, and the Coast Guard did not collect and maintain complete servicemember identification data, such as social security number or employee identification number, in their military justice or investigations databases; however, DOD recently directed them to do so. In the course of conducting our analysis, in some instances, we could not match personnel records with military justice records because the social security number or employee identification number in the military justice database did not match the information in the personnel database. In other instances, we could not match personnel records with military justice records because the military justice records did not contain a social security number or employee identification number to match with information found in their personnel record. As shown in table 5, we initially were unable to match 5 percent of Navy military justice cases, 12 percent of Marine Corps military justice cases, 18 percent of Coast Guard investigation cases, and 6 percent of Coast Guard military justice cases. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140a of the Military Justice Act of 2016. As part of these uniform standards, the services were directed to collect either the social security number or DOD identification number in their military justice databases. The military services are to implement the Secretary’s direction no later than December 23, 2020. Although some military services report demographic information about the subjects of military justice actions internally, the military services do not externally report data that provides visibility into, or would enable an analysis of, the extent of racial, ethnic, or gender disparities in the military justice system. Service officials from all of the military services told us that they compile internal quarterly or monthly staff judge advocate reports, which include the total number of each type of court-martial handled by their legal offices and of nonjudicial punishments. According to service officials, in the Air Force and the Army these reports include demographic information about servicemembers involved in these cases, such as the total number of each type of case broken out by the subject’s race, ethnicity, or gender, but the Navy, Marine Corps, and Coast Guard reports do not include this demographic information, and there is no requirement to do so. Regarding external reporting, the UCMJ directs the Court of Appeals for the Armed Forces, the Judge Advocates General, and the Staff Judge Advocate to the Commandant of the Marine Corps to submit annual reports on the military justice system to the Congressional Armed Services Committees, the Secretary of Defense, the secretaries of the military departments, and the Secretary of Homeland Security. These reports are to include information on the number and status of pending cases handled in the preceding fiscal year, among other information. The annual reports include the total number of cases each service handled for each type of court-martial and for nonjudicial punishments. However, these annual reports do not include demographic information about servicemembers who experienced a military justice action, such as breakdowns by race or gender, because the reporting requirement does not direct the services to include such information. A DOD official expressed concern about expanding the reporting requirement to have public dissemination of race, ethnicity, and gender information due to the potential for misinterpretation, but stated that such reporting requirements for internal use would be beneficial. However, Congress and members of the public have expressed an interest in this information. Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Furthermore, these standards state that management should use quality information to make informed decisions and evaluate the entity’s performance. According to DOD guidance, the Joint Service Committee on Military Justice, a committee comprised of representatives from each service’s legal office, is responsible for reviewing the Manual for Courts-Martial and the UCMJ on an annual basis. The Joint Service Committee can consider suggested changes to the UCMJ or the Manual for Courts-Martial or its supplementary materials from the services or from the general public. The Joint Service Committee then determines whether to propose any desired amendments to the UCMJ, or the Manual for Courts-Martial or its supplementary materials. If the Joint Service Committee finds that an amendment to either the Manual for Courts-Martial or the UCMJ is required, the committee will provide the General Counsel of DOD with a draft executive order containing the recommended amendments or will forward a legislative proposal to amend the UCMJ. While it is unclear whether the committee has ever considered or proposed an amendment to the UCMJ or Manual for Courts-Martial that would require the external reporting on an annual basis of demographic information about the race, ethnicity, and gender of servicemembers charged with violations of the UCMJ, no such change has been made. Reporting this information would provide servicemembers and the public with greater visibility into potential disparities and help build confidence that DOD is committed to a military justice system that is fair and just. Furthermore, DOD has not issued guidance that establishes criteria to specify when any data indicating possible racial, ethnic, or gender disparities in the investigations, trials, or outcomes of cases in the military justice system should be further reviewed, and to describe what steps should be taken to conduct such a review if it were needed. GAO’s Standards for Internal Control in the Federal Government provides that an agency needs to establish a baseline in order to perform monitoring activities. The baseline helps the agency understand and address deficiencies in its operations. While equal employment opportunity enforcement is a very different context than the military justice system, other federal agencies have developed such criteria in the equal employment opportunity context that can indicate when disparities should be examined further. For example, the Department of Justice, the Department of Labor, the Equal Employment Opportunity Commission, and the Office of Personnel Management use a “four-fifths” test to determine when differences between subgroups in the selection rates for hiring, promotion, or other employment decisions are significant. These criteria, though inexact, provide an example of the type of criteria that DOD could consider using as a basis for determining when disparities among racial or gender groups in the military justice process could require further review or analysis. By issuing guidance that establishes criteria for determining when data indicating possible racial and gender disparities in the investigations, trials, or outcomes of cases in the military justice system should be further examined, and describes the steps that should be taken to conduct such further examination, DOD and the services would be better positioned to monitor the military justice system to help ensure that it is fair and just, a key principle of the UCMJ. Racial and gender disparities exist in investigations, disciplinary actions, and punishment of servicemembers in the military justice system, and gender disparities exist in convictions in the Marine Corps. Our analysis of available data from fiscal years 2013 through 2017, which controlled for attributes such as race, gender, rank, education, and years of service, found racial and gender disparities were more likely in actions that first brought servicemembers into the military justice system. Specifically, we found that: Black, Hispanic, and male servicemembers were more likely than White and female servicemembers to be the subjects of recorded investigations in all of the military services, and were more likely to be tried in general and special courts-martial in the Army, the Navy, the Marine Corps, and the Air Force. There were fewer statistically significant racial and gender disparities in most military services in general and special courts-martial that were preceded by a recorded investigation than in general and special courts-martial overall. We also found that statistically significant racial and gender disparities in general and special courts-martial that did not follow a recorded investigation were similar to those we identified for general and special courts-martial overall. Black and male servicemembers were more likely than White and female servicemembers to be tried in summary courts-martial and to be subjects of nonjudicial punishment in the Air Force and the Marine Corps. The Army and the Navy did not maintain complete data, and the Coast Guard had too few summary courts-martial for us to analyze, and did not maintain complete nonjudicial punishment data. We identified fewer statistically significant racial or gender disparities in case outcomes—convictions and punishment severity. Specifically: Race was not a statistically significant factor in the likelihood of conviction in general and special courts-martial in the Army, the Navy, the Marine Corps, and the Air Force, but gender was a statistically significant factor in the Marine Corps. Black servicemembers were less likely to receive a more severe punishment in general and special courts-martial compared to White servicemembers in the Navy but there was no statistically significant difference for Black servicemembers in the Marine Corps, the Army, and the Air Force. Additionally, there were no statistically significant differences for Hispanic servicemembers in the Navy, the Marine Corps, the Army, or the Air Force; and males were more likely than females to receive a more severe punishment in the Marine Corps, the Army, and the Air Force. Finally, DOD and the military services have taken some steps to study racial and gender disparities in the military justice system over the last several decades, but they have not comprehensively studied the extent or causes of any disparities. Black, Hispanic, and male servicemembers were more likely than White or female servicemembers to be the subjects of recorded investigations in all of the military services, after controlling for other attributes, as shown in figure 5. Servicemembers in the Other race category were more likely than White servicemembers to be the subjects of recorded investigations in the Navy, but were less likely in the Army. Our analyses did not identify any statistically significant differences for servicemembers in the Other race category from the Air Force, the Marine Corps, or the Coast Guard. For the Army, the Navy, the Marine Corps, and the Air Force, Black, Hispanic, and male servicemembers were more likely than White and female servicemembers to be tried in general and special courts-martial after controlling for other attributes, as shown in figure 6 below. Servicemembers in the Other race category were more likely than White servicemembers to be tried in general and special courts-martial in the Navy, but we found no statistically significant differences in the likelihood of servicemembers in the Other race category in the Army, the Marine Corps, and the Air Force to be tried in general and special courts-martial compared to White servicemembers. We could not analyze Coast Guard cases due to the small number of general and special courts- martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. When separating general and special court-martial cases into those that either were or were not preceded by an investigation recorded in an MCIO database, we found fewer statistically significant racial and gender disparities in most of the military services in general and special courts- martial that were preceded by a recorded investigation. However, statistically significant racial and gender disparities were also present in general and special courts-martial that did not follow a recorded investigation in all services included in this analysis, which would include cases where the investigation was performed by the servicemember’s command. Specifically, as shown in figure 7 below, we found that Black, Hispanic, Other, and male servicemembers in the Army, Hispanic servicemembers in the Marine Corps, and males in the Air Force were more likely than White or female servicemembers to be tried in general and special courts- martial following a recorded investigation, after controlling for other attributes. We found no statistically significant differences in the likelihood of any other racial or gender groups to be tried in general and special courts-martial following a recorded investigation in any other services. Our analyses of general and special courts-martial with a recorded investigation generally found fewer statistically significant differences compared to the results of our analyses for all special and general courts martial. We also found that Black and male servicemembers in all of the military services were more likely than White and female servicemembers to be tried in general and special courts-martial without a recorded investigation after controlling for other attributes, as shown in figure 8 below. Further, Hispanic servicemembers in the Army were more likely than White servicemembers to be tried in general and special courts-martial without a recorded investigation, but we found no statistically significant differences in the likelihood of Hispanic servicemembers to be tried in general and special courts-martial without a recorded investigation in the Marine Corps, the Navy, or the Air Force. We found no statistically significant differences in the likelihood of servicemembers in the Other race category to be tried in general and special courts-martial compared to White servicemembers in all of the military services. Our findings of racial and gender disparities in general and special courts-martial without a recorded investigation found statistically significant differences for Black and male servicemembers consistent with the differences we identified for general and special courts-martial overall, as shown in figure 6 above. Black and male servicemembers were more likely than White or female servicemembers to be tried in summary courts-martial in the Air Force and the Marine Corps after controlling for other attributes, as shown in figure 9 below. We did not identify any statistically significant differences in summary courts-martial rates for servicemembers who identified as Hispanic or in the Other race category in either the Air Force or the Marine Corps. We could not determine whether there were racial or gender disparities for summary courts-martial in the Army, the Navy, and the Coast Guard due to data limitations. We could not analyze Coast Guard cases due to the small number of summary courts-martial adjudicated in the Coast Guard from 2013 through 2017. We could not determine whether disparities existed among servicemembers tried in summary courts-martial in the Army and the Navy because the Army and the Navy did not collect complete summary courts-martial data in their investigations, military justice, or personnel databases. Specifically, as part of our data reliability checks, we identified the total number of summary courts-martial that the Army and the Navy reported in the Court of Appeals for the Armed Forces annual reports for fiscal years 2013 through 2017, and compared these totals to the number of cases we identified in their military justice databases. While our comparisons are not exact, due to differences in the dates we used to count the number of cases, we found that approximately 60 percent of the Army’s reported summary courts-martial cases and less than 50 percent of the Navy’s reported summary courts-martial cases were included in their military justice databases. Army and Navy officials cited several reasons why complete summary courts-martial information was not collected. First, they said that the services are not required to collect and maintain complete data on summary courts-martial because these cases result in non-criminal convictions under the UCMJ. Summary courts-martial are typically used for minor offenses, and the accused is not guaranteed the right to be represented by a military attorney. As a result, military attorneys may not be involved in summary courts-martial. Army and Navy officials said that if military attorneys are not involved in the case, there is not likely to be a record of the case in their service’s military justice database. In contrast, Air Force officials said that they provide a military attorney to represent the accused in summary courts-martial; as a result, Air Force officials said their attorneys create records for these cases in the Air Force’s military justice database. The Marine Corps does not maintain summary court- martial data in its military justice database but tracks summary courts- martial in its personnel database. Officials in the Navy and the Army told us that the lack of complete summary court-martial data in their military justice databases is also in part because these systems were not designed to serve as repositories for complete military justice data. Instead, the officials said that the military justice databases were primarily created to assist attorneys in generating trial documents, meeting timeframes, and other aspects of case management. Nevertheless, Army officials said they plan to start collecting more complete summary court-martial information. Specifically, Army officials said that the Army is encouraging their judge advocate general staff to create records for all summary courts-martial in the service’s military justice database. The absence of complete summary court-martial data in the military justice databases of the Army and the Navy limits these services’ visibility into any disparities that may exist among servicemembers involved in these types of military justice proceedings. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140A of the Military Justice Act of 2016. As part of these uniform standards, the services were directed to collect certain information about all cases in their military justice databases, which a DOD official said includes summary courts-martial cases. The military services are to implement the Secretary’s direction no later than December 23, 2020. Black and male servicemembers were more likely than White or female servicemembers to be subject to nonjudicial punishments in the Air Force and the Marine Corps, after controlling for other attributes, as shown in figure 10 below. In the Air Force, we found that Hispanic servicemembers were more likely than White servicemembers to receive nonjudicial punishments, while we observed no statistically significant differences in nonjudicial punishment rates for Hispanic servicemembers in the Marine Corps. Servicemembers in the Other race category in the Marine Corps were less likely to receive nonjudicial punishments, but we observed no statistically significant differences in nonjudicial punishment rates for servicemembers in the Other race category in the Air Force. However, we could not determine whether there were racial or gender disparities among servicemembers subject to nonjudicial punishments in the Army, the Navy, and the Coast Guard because these services do not collect complete nonjudicial punishment data, such as data on the servicemember’s race, ethnicity, gender, offense, and punishment, in any of their databases. As part of our data reliability checks, we identified the total number of nonjudicial punishments that the Army, the Navy, and the Coast Guard reported in the Court of Appeals for the Armed Forces annual reports for fiscal years 2013 through 2017, and compared these totals to the number of cases we identified in their military justice and personnel databases. As shown in figure 11 below, we found that 65 percent of the Army’s reported nonjudicial punishments, 8 percent of the Navy’s reported nonjudicial punishments, and 82 percent of the Coast Guard’s reported nonjudicial punishments were recorded in their military justice databases. Officials from these services cited several reasons why they did not have complete information about all nonjudicial punishments. First, they said that the services are not required to track nonjudicial punishment cases because they are non-criminal punishments that are typically imposed for less serious offenses. Army and Navy officials noted that complete records of these punishments are not recorded at least in part because nonjudicial punishments are not meant to follow servicemembers throughout their career, but instead are intended to incentivize servicemembers to correct their behavior. Because nonjudicial punishments are not criminal punishments, the process afforded to servicemembers in nonjudicial punishment proceedings differs as well. For example, the servicemember is not guaranteed the right to representation by a military attorney. Army and Navy officials noted that their military justice databases contain records of nonjudicial punishments if there was legal involvement by the Judge Advocate General’s Corps in the case. Similarly, Coast Guard officials said that their military justice database contains records of nonjudicial punishment if a case originated as a criminal case involving a judge advocate, for example, if charges were preferred. According to Air Force and Marine Corps officials, the Air Force maintains complete nonjudicial punishment data in its military justice database, and the Marine Corps maintains complete nonjudicial punishment data in its personnel database. Standards for Internal Control in the Federal Government state that management should use quality information to achieve an entity’s objectives. Additionally, management should identify information requirements; ensure that the data it receives are timely and reliable; and process the data obtained into quality information. Officials from the Army, the Navy, and the Coast Guard expressed concerns regarding the feasibility of collecting and maintaining information about all nonjudicial punishments. Army officials stated that the collection and maintenance of all nonjudicial punishment data would be a substantial administrative burden due to the number of nonjudicial punishments awarded to servicemembers every week. Navy officials also stated that it would be a significant challenge to collect and maintain information about all nonjudicial punishments in either the Navy’s military justice database or its personnel database. They stated that there are few individuals who have access and can input data into the military justice database, and to expand the scope of criminal justice data collected in that manner, more people would have to be hired or assigned to assist with data entry. Similarly, Coast Guard officials said that tracking all nonjudicial punishment cases would be a difficult addition to their current data collection and maintenance workload. Coast Guard officials further stated that in addition to providing commanders with an essential means of providing good order and discipline, nonjudicial punishment also may promote positive change. Some Coast Guard officials stated concerns that recording all nonjudicial punishments in a database may inhibit the rehabilitative component of nonjudicial punishment. While the Army, Navy, and Coast Guard officials expressed these concerns, none of these military services had formally assessed the feasibility of collecting data on nonjudicial punishments. The absence of complete nonjudicial punishment data limits the military services’ visibility into the vast majority of legal punishments imposed on servicemembers under the UCMJ every year. Without such data, these three services will remain limited in their ability to assess or identify disparities among populations subject to this type of punishment. Among the servicemembers convicted in general and special courts- martials, we found no statistically significant differences regarding the likelihood of conviction among racial groups in the Army, the Navy, the Marine Corps, and the Air Force, while controlling for other attributes, as shown in figure 12 below. In the Marine Corps, male servicemembers were more likely to be convicted compared to female servicemembers. We found no statistically significant differences in the likelihood of convictions between males and females in the Army, the Air Force, and the Navy. In the military services that maintained complete punishment data—the Army, the Navy, the Marine Corps, and the Air Force—we found that minority servicemembers were either less likely to receive a more severe punishment in general and special courts-martial compared to White servicemembers, or there were no statistically significant differences in punishments among racial groups. Our findings regarding gender varied among the services. Male servicemembers were more likely to receive a more severe punishment compared to females in the Marine Corps, the Army, and the Air Force; for the Navy, we found there were no statistically significant differences in punishments between males and females. Navy and Marine Corps: Among servicemembers that were convicted in general and special courts-martial in the Marine Corps, we found no statistically significant differences regarding minority servicemembers being more likely or less likely to receive a dismissal or discharge punishment versus some other punishment, while controlling for other attributes, as shown in figure 13 below. In the Navy, among servicemembers that were convicted in general and special courts- martial, Black servicemembers were less likely than White servicemembers to receive a discharge or dismissal. We found no statistically significant differences regarding Hispanic servicemembers or those of Other races in the Navy. In the Marine Corps, among servicemembers that were convicted in general and special courts-martial, male servicemembers were more likely than female servicemembers to receive a discharge or dismissal. In the Navy, there were no statistically significant differences in punishments between males and females. Army and Air Force: We found no statistically significant differences regarding Black or Hispanic servicemembers being more likely or less likely to receive a more severe punishment in the Air Force or the Army, while controlling for other attributes, as shown in figure 14 below. We also found that servicemembers in the Other race group were less likely to receive a more severe punishment compared to White servicemembers in the Army, but punishment results for servicemembers in the Other race group in the Air Force were not statistically significant. Additionally, we found that male servicemembers were more likely to receive a more severe punishment compared to female servicemembers in the Army and the Air Force. We could not determine disparities in case outcomes—convictions and punishment severity—in the Coast Guard’s general and special courts- martial for fiscal years 2013 through 2017 because the Coast Guard did not collect and maintain complete conviction and punishment data in its military justice database. Specifically, 16 percent of all Coast Guard cases were missing conviction and punishment data. When broken down by court-martial type, 20 percent of general court-martial cases, 15 percent of special court-martial cases, and 4 percent of summary court- martial cases were missing conviction and punishment data. Coast Guard officials acknowledged that incomplete conviction and punishment data entry is a consistent problem. They said that data entry had improved recently. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140a of the Military Justice Act of 2016. As part of these uniform standards, the services were directed to collect information about the findings for each offense charged, and the sentence or punishment imposed. The military services are to implement the Secretary’s direction no later than December 23, 2020. DOD and the military services have conducted some assessments of disparities in the military justice system. We previously reported in 1995 on DOD studies on discrimination and equal opportunity, and found DOD and the services conducted seven reviews of racial disparities in discipline rates between 1974 and 1993. Since our 1995 report through 2016, DOD and service assessments of military justice disparities have been limited. Officials in the Office of Diversity, Equity and Inclusion (ODEI) noted DOD has not conducted any department-wide assessments of racial or gender disparities in military justice during this period. The military services’ diversity offices also were not able to identify any service-specific reviews of disparities in military justice. However, the military services have some initiatives to examine and address disparities in military justice. For example, Air Force officials said that in May 2016, the Air Force conducted a servicewide data call to solicit information about cases involving a challenge to a member of a court-martial based on race or a motion for selective prosecution. The officials said that a thorough review revealed no evidence of selective prosecution in Air Force courts-martial. In addition, the Air Force has conducted analyses of its own military justice data. Specifically, the Air Force routinely analyzes military justice data using a rates-per-thousand analysis to identify whether certain demographic groups are tried by court-martial or subject to nonjudicial punishments at higher rates than others. These Air Force analyses found that Black and male servicemembers were more likely than White and female servicemembers to be subject to courts-martial and nonjudicial punishments from fiscal years 2013 through 2017, which is consistent with what we found. However, the other services do not routinely conduct such analyses. Moreover, DOD has conducted climate surveys to address servicemembers’ perceptions of bias. In 2013, for example, DOD conducted service-wide equal opportunity surveys that queried servicemembers on whether they believed they received nonjudicial punishment or a court martial they should not have, and whether they believed their race or ethnicity was a factor. The survey responses showed that 1.3 percent of servicemembers indicated experiencing a perceived undue punishment, a result that was unchanged from the 2009 survey. Minority members were more likely to indicate experiencing perceived undue punishment than White members, but there were no significant differences between racial or ethnic groups who indicated experiencing undue punishment. ODEI officials told us that their office did not make any recommendations related to military justice as a result of these 2013 survey results because the findings were too small to warrant such steps. Moreover, ODEI officials said that while they have not completed their analysis of the 2017 survey data, the question about receiving nonjudicial punishment or court-martial had been removed from the 2017 survey. ODEI officials explained that the question was removed because the perception of unfair punishment was not the goal of the survey, although they said that the question could be reinstated for future surveys if the goals for the survey change. In June 2017, ODEI initiated a review of the military justice system following the publication of a report by a non-profit organization that found racial disparities in military justice actions. According to ODEI officials, their review assesses disparities in the military justice system using a similar analysis to that in the non-profit organization’s report, which analyzed rates of military justice actions per thousand servicemembers. ODEI officials told us they also observed racial and gender disparities among servicemembers involved in the military justice system in their own analysis of the service data. The officials said that the report on the results of their review will not directly address the issue of whether bias exists in the military justice process or the causes of any disparities, but will serve as a precursor to a future research study that looks more comprehensively into the issue of whether bias exists in the military justice system. ODEI officials said that their report should be issued in 2019. Standards for Internal Control in the Federal Government state that management uses quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. The standards further provide that management should evaluate issues identified through monitoring activities and determine appropriate corrective actions. Officials from DOD and the military services acknowledged that they do not know the cause of the racial and gender disparities that have been identified in the military justice system. This is because they have not conducted a comprehensive evaluation to identify potential causes of these disparities and make recommendations about any appropriate corrective actions to remediate the cause(s) of the disparities. By conducting a comprehensive analysis into the causes of disparities in the military justice system, DOD and the military services would be better positioned to identify actions to address disparities, and thus help ensure that the military justice system is fair and just, a key principle of the UCMJ. The single overarching principle of the UCMJ is that a system of military law can foster a highly disciplined force if it is fair and just, and is recognized as such by both members of the armed forces and by the American public. DOD and the military services collect and maintain data on the race, ethnicity, and gender of all servicemembers. However, these data vary within and across the services, limiting the ability to collectively or comparatively assess military justice data to identify any disparities. DOD has recently taken steps to address this issue by directing the military services to, no later than December 23, 2020: collect uniform race and ethnicity data in their military justice databases, or aggregate any expanded ethnic or racial categories to the categories listed in the standards; collect either the social security number or DOD identification number in their military justice databases; and collect complete summary courts-martial information. It will be important for the military services to complete these actions to allow for efficient analysis and reporting of consistent military justice data. However, the newly issued standards apply only to the military justice databases and not to the investigations and personnel databases. The ability to query and report on the gender of servicemembers in its military justice database would provide the Coast Guard with more readily available data to identify or assess any gender disparities that may exist in the investigation and trial of military justice cases without merging data from multiple databases. Moreover, taking steps to develop the capability to present the race and ethnicity data from the military services’ personnel and investigations databases using the same categories included in the December 2018 standards for the military justice databases would enable DOD and the military services to more easily and efficiently assess the extent to which there are any racial or ethnic disparities throughout the military justice process. Further, DOD’s annual reports about the number and status of pending military justice cases do not include demographic information, such as breakdowns by race or gender, about servicemembers who experienced a military justice action. Reporting this information would provide servicemembers and the public with greater visibility into potential disparities and help build confidence that DOD is committed to a military justice system that is fair and just. Moreover, DOD does not have guidance that establishes criteria to determine when data indicating possible disparities among racial, ethnic, or gender groups in the investigations, trials, or outcomes of cases in the military justice system should be further reviewed, or describes the steps that should be taken to conduct such further review. By establishing such criteria, DOD and the services would be better positioned to monitor the military justice system to help ensure that it is fair and just, a key principle of the UCMJ. Our analysis of available data identified racial and gender disparities in all of the military services for servicemembers with recorded investigations, and for four of the military services for trials in special and general courts- martial, but these disparities generally were not present in the convictions or punishments of cases. These findings suggest disparities may be limited to particular stages of the military justice process for the period covered by our analysis. However, we were unable to determine whether there were disparities among servicemembers subject to nonjudicial punishments in the Army, the Navy, and the Coast Guard because these services do not collect complete nonjudicial punishment data, such as data on the servicemember’s race, ethnicity, gender, offense, and punishment for all nonjudicial punishments, in any of their databases. The absence of complete nonjudicial punishment data in the Army, the Navy, and the Coast Guard limits their visibility into the vast majority of legal punishments imposed on servicemembers under the UCMJ every year. Without such data, these three services will remain limited in their ability to assess or identify disparities among populations subject to this type of punishment. Finally, DOD recently conducted a study of racial and gender disparities in the military justice system, and expects to complete its report in 2019. However, this study will not assess the causes of the racial and gender disparities identified in the military justice system. Our findings of racial and gender disparities, taken alone, do not establish whether unlawful discrimination has occurred, as that is a legal determination that would involve other corroborating information along with supporting statistics. By conducting a comprehensive evaluation of the causes of these disparities, DOD and the military services would be better positioned to identify actions to address disparities, and thus help ensure that the military justice system is fair and just, a key principle of the UCMJ. We are making a total of 11 recommendations, including 3 to the Secretary of Homeland Security, 3 to the Secretary of Defense, 2 to the Secretary of the Army, 2 to the Secretary of the Navy, and 1 to the Secretary of the Air Force. The Secretary of Homeland Security should ensure that the Commandant of the Coast Guard modifies the Coast Guard’s military justice database so that it can query and report on gender information. (Recommendation 1) The Secretary of the Army should develop the capability to present servicemembers’ race and ethnicity data in its investigations and personnel databases using the same categories of race and ethnicity established in the December 2018 uniform standards for the military justice databases, either by (1) modifying the Army’s investigations and personnel databases to collect and maintain the data in accordance with the uniform standards, (2) developing the capability to aggregate the data into the race and ethnicity categories included in the uniform standards, or (3) implementing another method identified by the Army. (Recommendation 2) The Secretary of the Air Force should develop the capability to present servicemembers’ race and ethnicity data in its investigations and personnel databases using the same categories of race and ethnicity established in the December 2018 uniform standards for the military justice databases, either by (1) modifying the Air Force’s investigations and personnel databases to collect and maintain the data in accordance with the uniform standards, (2) developing the capability to aggregate the data into the race and ethnicity categories included in the uniform standards, or (3) implementing another method identified by the Air Force. (Recommendation 3) The Secretary of the Navy should develop the capability to present servicemembers’ race and ethnicity data in its investigations and personnel databases using the same categories of race and ethnicity established in the December 2018 uniform standards for the military justice databases, either by (1) modifying the Navy’s investigations and personnel databases to collect and maintain the data in accordance with the uniform standards, (2) developing the capability to aggregate the data into the race and ethnicity categories included in the uniform standards, or (3) implementing another method identified by the Navy. (Recommendation 4) The Secretary of Homeland Security should ensure that the Commandant of the Coast Guard develops the capability to present servicemembers’ race and ethnicity data in its investigations and personnel databases using the same categories of race and ethnicity established in the December 2018 uniform standards for the military justice databases, either by (1) modifying the Coast Guard’s investigations and personnel databases to collect and maintain the data in accordance with the uniform standards, (2) developing the capability to aggregate the data into the race and ethnicity categories included in the uniform standards, or (3) implementing another method identified by the Coast Guard. (Recommendation 5) The Secretary of Defense should ensure that the Joint Service Committee on Military Justice, in its annual review of the UCMJ, considers an amendment to the UCMJ’s annual military justice reporting requirements to require the military services to include demographic information, including race, ethnicity, and gender, for all types of courts-martial. (Recommendation 6) The Secretary of Defense, in collaboration with the Secretaries of the military services and the Secretary of Homeland Security, should issue guidance that establishes criteria to specify when data indicating possible racial, ethnic, or gender disparities in the military justice process should be further reviewed, and that describes the steps that should be taken to conduct such a review. (Recommendation 7) The Secretary of the Army should consider the feasibility, to include the benefits and drawbacks, of collecting and maintaining complete information for all nonjudicial punishment cases in one of the Army’s databases, such as information on the servicemembers’ race, ethnicity, gender, offense, and punishment imposed. (Recommendation 8) The Secretary of the Navy should consider the feasibility, to include the benefits and drawbacks, of collecting and maintaining complete information for all nonjudicial punishment cases in one of the Navy’s databases, such as information on the servicemembers’ race, ethnicity, gender, offense, and punishment imposed. (Recommendation 9) The Secretary of Homeland Security should ensure that the Commandant of the Coast Guard considers the feasibility, to include the benefits and drawbacks, of collecting and maintaining complete information for all nonjudicial punishment cases in one of the Coast Guard’s databases, such as information on the servicemembers’ race, ethnicity, gender, offense, and punishment imposed. (Recommendation 10) The Secretary of Defense, in collaboration with the Secretaries of the military services and the Secretary of Homeland Security, should conduct an evaluation to identify the causes of any disparities in the military justice system, and take steps to address the causes of these disparities as appropriate. (Recommendation 11) We provided a draft of this report to DOD and the Department of Homeland Security for review and comment. Written comments from DOD and the Department of Homeland Security are reprinted in their entirety in appendixes X and XI, respectively. DOD and the Department of Homeland Security provided additional technical comments, which we incorporated in the report, as appropriate. In written comments, DOD concurred with six recommendations, and partially concurred with two recommendations that were directed to the Secretary of Defense. The Department of Homeland Security concurred with the three recommendations directed to the Secretary of Homeland Security. DOD concurred with our six recommendations to present servicemembers’ race and ethnicity data in each of the military services’ respective investigations and personnel databases using the same categories of race and ethnicity established for their military justice databases; consider an amendment to the UCMJ’s annual military justice reporting requirements to require the military services to include demographic information for all types of courts-martial; and consider the feasibility of collecting and maintaining complete information for all nonjudicial punishment cases. DOD partially concurred with two of our recommendations, agreeing with the content, but requesting that we modify the recommendations to direct them to more appropriate entities. Specifically, DOD concurred with our recommendations that guidance should be issued to establish criteria specifying when data indicating possible racial, ethnic, or gender disparities require further review and the steps that will be taken to conduct the review; and to conduct an evaluation to identify the causes of any racial or gender disparities in the military justice system and, if necessary, take remedial steps to address the causes of these disparities. For both recommendations, DOD suggested that the Secretary of Homeland Security be added, and that we remove the DOD Office for Diversity, Equity and Inclusion and the Commandant of the Coast Guard, as they fall under the Secretary of Defense and the Secretary of Homeland Security, respectively. We agree with DOD’s suggestions, and we have modified both recommendations accordingly. In an email correspondence, the Department of Homeland Security and the Coast Guard concurred with the updates. In its written comments, the Department of Homeland Security concurred with our three recommendations to modify the Coast Guard’s military justice database so that it can query and report on gender information, to present servicemembers’ race and ethnicity data in its investigations and personnel databases using the same categories of race and ethnicity established for the military justice database, and to consider the feasibility of collecting and maintaining complete information for all nonjudicial punishment cases. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, and the Acting Secretary of Homeland Security. In addition, this report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your members of your staff have any questions regarding this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix XII. The objectives of this report were to assess the extent to which (1) the military services collect and maintain information about the race, ethnicity, and gender of servicemembers investigated and disciplined for violations of the Uniform Code of Military Justice (UCMJ) that can be used to assess disparities; and (2) there are racial and gender disparities in investigations, disciplinary actions, and case outcomes in the military justice system, and whether the Department of Defense (DOD) and the military services have taken steps to study any identified disparities. To address both of our objectives, we analyzed data collection, data maintenance, and military justice disciplinary actions involving active-duty servicemembers in the Army, the Navy, the Marine Corps, the Air Force, and the Coast Guard. Although the Coast Guard is part of the Department of Homeland Security, the Coast Guard is a military service and a branch of the armed forces at all times. We analyzed military justice actions initiated and recorded in service investigations and military justice databases between fiscal years 2013 through 2017. We chose this time period because it provided the most recent history of available military justice data at the time of our review. We requested record-level data from each of the military services’ personnel, investigations, and military justice databases, which resulted in a total of 15 data requests. Table 6 below provides an overview of the databases included in our review, broken out by database type. We sent individual data requests that were tailored based on our conversations with service officials and our own analysis of the availability of data. In addition to requesting the race, ethnicity, and gender of servicemembers subject to military justice actions, we also requested other demographic and administrative attribute data—such as rank, age, years of service, duty station, and occupation—from the services’ personnel databases to include in our statistical models. We identified these attributes by reviewing relevant literature and interviewing agency officials. Personnel databases. We requested and received monthly snapshots with record-level data on all active-duty servicemembers in each of the military services from fiscal years 2013 through 2017. Specifically, we requested demographic and administrative data, including race, ethnicity, gender, rank, education, age or date of birth, years of service, occupation, location or duty station, deployed status, administrative or disciplinary actions and dates, character of service separation, and servicemembers’ unique identifiers (social security number and employee identification number). Investigations databases. We requested and received record-level data on all investigations recorded in a military service military criminal investigative organization (MCIO) database that were initiated from fiscal years 2013 through 2017, where the subject of the investigation was an active-duty servicemember. For each case, we requested certain attribute data on the investigation subject, including race, ethnicity, gender, rank, age or date of birth, service and component, offense(s) investigated, case initiation date, investigation source, investigating entity, investigation outcome and date, incident location, and the subject’s unique identifier, such as social security number or employee identification number. In some services not all of these attributes were available or requested. For example, since the Air Force database only included investigations conducted by the Air Force Office of Special Investigations, we did not request information about the investigating entity. In addition, the Navy Criminal Investigative Service provided us with data about and we analyzed closed cases only, whereas the Army and the Air Force MCIOs provided us with data about and we analyzed all cases in their database during the period of our review. Military justice databases. We requested and received record-level data on all cases where a servicemember was subject to disciplinary proceedings under the Uniform Code of Military Justice (UCMJ) from fiscal years 2013 through 2017. For each case where charges were preferred against a servicemember during this period, we requested demographic and administrative data on the servicemember as well as key information related to their case, including race, ethnicity, gender, rank, age or date of birth, component, case type and forum, offense(s) charged, case disposition and date, appeals status, case outcome or sentence, disciplinary action taken, date charges were first preferred, and the servicemember’s unique identifier, such as social security number or employee identification number. We received general and special courts- martial data from all of the services from their military justice databases. For the Army, in addition to data from their military justice database, Military Justice Online, we also received courts-martial data from a separate database, called the Army Court-Martial Information System (ACMIS), which is used by the service’s trial judiciary to track courts- martial. For summary courts-martial and nonjudicial punishments, the services varied in the extent that and the location where they collected and maintained complete data for these two military justice actions, as is discussed further earlier in this report. In the Air Force, summary courts-martial and nonjudicial punishment data is maintained in the service’s military justice database, the Automated Military Justice Analysis and Management System. The Marine Corps did not collect and maintain complete data about summary courts-martial or nonjudicial punishments in its military justice database, however, its personnel database included information about all summary courts-martial and nonjudicial punishments imposed on servicemembers during the period of our review. The Army and the Navy did not collect and maintain complete data about summary courts-martial or nonjudicial punishments in their military justice databases, or other databases. In these services, summary courts-martial and nonjudicial punishments were recorded in their military justice databases if these actions had involvement by the services’ legal offices. Further, summary courts-martial and nonjudicial punishments were recorded in the personnel databases used by these services only if these actions resulted in an administrative action against the accused, such as a forfeiture of pay or reduction in grade. The Coast Guard did not collect and maintain complete data about nonjudicial punishments in its military justice database or other databases; nonjudicial punishments were recorded in its military justice database if a legal office was involved in the action. Further, nonjudicial punishments were recorded in the Coast Guard’s personnel database if they resulted in an administrative action against the accused, such as a forfeiture of pay or reduction in grade. To evaluate the extent to which the military services collect and maintain race, ethnicity, and gender data about servicemembers investigated and disciplined for violations of the UCMJ, we first reviewed service guidance, user manuals, and other documents related to the services’ investigations, military justice, and personnel databases. We reviewed these documents to determine: the types of data officials are required to collect and maintain; and the internal procedures the services follow in inputting information about race, ethnicity, and gender data into each type of database. For example, we determined whether collection of this information was mandatory, and how this information was entered into and recorded in each database. Specifically, we determined whether information about race, ethnicity, and gender was entered into each database manually, using a drop-down menu, or was auto-populated from another database. Further, we identified the number of possible response options that each database contained for each of these demographic fields. Second, we interviewed service officials who manage and use the military justice, investigations, and personnel databases to discuss: which fields in each database track the race, ethnicity, and gender of how these data are input and their insights regarding the reliability of these data. Specifically, we interviewed officials from the legal branches of the military services, including the Army Office of the Judge Advocate General, the Navy Judge Advocate General’s Corps, the Marine Corps’ Judge Advocate Division, the Air Force Judge Advocate General’s Corps, and the Coast Guard Office of the Judge Advocate General. In addition, we spoke with officials in the military criminal investigative organizations (MCIO), including the Army Criminal Investigation Command, the Naval Criminal Investigative Service, the Air Force Office of Special Investigations, and the Coast Guard Investigative Service. We also interviewed officials from the manpower and personnel offices of the services with responsibility for the services’ personnel databases, including the Army’s Human Resources Command and the Office of the Deputy Chief of Staff; the Navy’s Personnel Command; the Marine Corps Manpower and Reserve Affairs Manpower Information Systems Branch; the Air Force Personnel Center; and the Coast Guard’s Personnel Service Center. Finally, we analyzed the data we received from the investigations, military justice, and personnel databases to determine the completeness of the race, ethnicity, and gender information that was recorded in each of the databases. We assessed the military services’ systems and procedures for collecting data against DOD and service guidance and relevant federal internal control standards. To evaluate the extent to which there are racial, ethnic, and gender disparities in investigations, disciplinary actions, and case outcomes, we analyzed data from the military services’ investigations, military justice, and personnel databases to determine summary statistics and we then conducted bivariate and multivariate regression analyses. Investigations. We focused on alleged violations of the UCMJ that were recorded in databases used by service-specific MCIOs. Investigations are recorded in the MCIO databases when a servicemember is the subject of a criminal allegation made by another person; for purposes of this report, we say the servicemember had a “recorded investigation” to describe these cases. We analyzed investigation information from the databases used by each of the military services’ MCIOs. Specifically, we analyzed data from the Army’s Criminal Investigation Command, which included cases investigated by military police and Criminal Investigation Command; the Navy and Marine Corps’ Naval Criminal Investigative Service, which included cases investigated by the Naval Criminal Investigative Service and military police; the Air Force’s Office of Special Investigations, which included only Office of Special Investigations cases; and the Coast Guard Investigative Service, which included only Coast Guard Investigative Service cases. Our analysis of recorded investigations data did not include investigations conducted by a servicemember’s command, because those investigations are not recorded in the MCIO databases. Military Justice Discipline. We included in our definition of servicemembers disciplined for a violation of the UCMJ those servicemembers with cases that resulted in a trial in any type of court- martial (general, special, and summary), or servicemembers who were subject to a nonjudicial punishment from fiscal years 2013 through 2017. We analyzed data for trials in general and special courts-martial separately from trials in summary courts-martial because general and special courts-martial result in a criminal conviction if the servicemember is found guilty, while summary courts-martial are not a criminal forum and do not result in a criminal conviction. We analyzed general and special courts-martial cases together due to the small number of cases for some racial or gender groups. In addition, we also separated general and special courts-martial into cases that either were or were not preceded by an investigation recorded in an MCIO database. Our analysis of general and special courts-martial cases without a recorded investigation included those general and special courts-martial that were investigated by a servicemember’s command or other law enforcement entities. We used the preferral date, or the date when an accused servicemember was first charged with a violation, to count the number of courts-martial that occurred in a given fiscal year. However, each military service uses the date in which the court-martial judgment was given when reporting the number of each type of court-martial in their annual reports to the Court of Appeals for the Armed Forces. As a result, the number of court-martial cases in a given year analyzed for our review differs from what was reported in the annual reports. In discussions with officials after we had completed our preliminary analyses, they recommended that we use the referral date instead of the preferral date, so that our total number of cases would be more consistent with the number of cases that they reported. However, changing the date for grouping cases would have required us to request new military justice data from each of the military services, and conduct additional work. Above all, using the preferral date would not impact the findings of racial and gender disparities. In addition, our analyses only counted cases that were ultimately tried at general, special, or summary courts-martial, and excluded those cases where charges were dismissed, withdrawn, or subject to some alternate resolution. For nonjudicial punishments, we used the date that the punishment was imposed. To prepare the data for our analyses and ensure that we had consistent profiles for the race, ethnicity, and gender of the servicemembers, we merged records from the military services’ investigations, military justice, and personnel databases. We merged records using servicemembers’ unique identifiers, such as social security number or employee identification number, that were common among a particular service’s databases. In some instances—a small proportion of cases—we could not match personnel records with military justice records because the social security number or employee identification number in the military justice database did not match the information in the personnel database. In other instances, we could not match personnel records with military justice records because the military justice records did not contain a social security number or employee identification number to match with information found in their personnel record. We first tried to match these cases using the servicemembers’ name and date of birth; however, in some cases we were unable to match personnel records with investigations or military justice cases. As a result, we compiled lists of those cases we were unable to match, and we provided the services with lists of these cases. Service officials manually looked up this data and provided us with the missing social security numbers or employee identification numbers for these cases so that we could complete our analyses. These manual look up efforts increased our match rates so that we had a data set that we determined was sufficiently complete to perform our analyses. For servicemembers who were the subjects of military justice actions, we used the attribute data that was available in the personnel database at the time an investigation or disciplinary action was initiated (the preferral date for courts-martial). For our total service populations, which included servicemembers who were not the subject of a military justice action, we used their attribute data from the “median” snapshot of the five fiscal years of personnel data we received. Based on discussions with service officials, we treated the personnel databases as the authoritative sources for servicemembers’ demographic and administrative data. For some services when needed, if we identified a discrepancy in the race or gender value for a servicemember between the data in the personnel and military justice databases, we used the value recorded in the personnel database because service officials had told us that the personnel databases were the official sources for demographic data such as race and gender, and would be more likely to contain more reliable data for these fields than the investigations or military justice databases. For some services where there were cases where an attribute value was missing in the personnel database, we used the military justice or investigative database as a secondary source for this information. In merging the records from the personnel, military justice, and investigations databases, we created a single data file for each service that contained attribute data for all active-duty servicemembers, as well as complete information on the investigation and discipline of servicemembers who were the subject of a military justice action from fiscal years 2013 through 2017. In using this methodology to merge the records, the total number of servicemembers we use in our report when discussing the total service populations for each service is greater than the total active-duty force end strength of that service in any given fiscal year. This is because our total service populations represent the number of unique individuals who served on active duty from fiscal years 2013 through 2017. In addition, as part of our data preparation, we consolidated the various race and ethnicity values in the service personnel databases to the five groups for race and the two groups for ethnicity established by Office of Management and Budget (OMB) standards for maintaining, collecting, and presenting data on race and ethnicity for all federal reporting purposes. The five race groups in the standards are American Indian or Alaska Native; Asian; Black or African American; Native Hawaiian or Other Pacific Islander; and White. The two ethnic groups are Hispanic or Latino and Not Hispanic or Latino. First, we collapsed race and ethnicity data into a single combined field. Specifically, we grouped individuals of Hispanic ethnicity together, regardless of their racial identification, so that we could compare those of Hispanic ethnicity to other racial groups. We did this in part because of the ways in which some of the services record these data in their databases. For example, the Navy’s and the Marine Corps’ military justice databases do not have separate fields for race and ethnicity; instead, the values are tracked in a single field. Throughout the discussion for objective 2 of this report, we refer to the combined race and ethnicity values as race. We then consolidated races to the five racial groups in the OMB standards. When military service personnel databases included different or additional possible options for race and ethnicity than the groups established by the OMB standards, we consolidated the options in accordance with the definitions for each race and ethnicity listed in the OMB standards. Given the small number of cases in some racial groups, we collapsed certain racial groups into an “Other” group in order to report statistically reliable results. The “Other” group includes individuals who identified as Asian, Native Hawaiian/Other Pacific Islander, American Indian/Alaska Native, and multiple races. Summary statistics. We analyzed data from the military services’ investigations, military justice, and personnel databases to determine the extent to which racial and gender groups were the subjects of recorded investigations, tried in courts-martial, and subject to nonjudicial punishments (for Army and Marine Corps, services for which we had complete data) at higher rates or lower rates than each racial and gender group’s proportion of the overall service populations. Other than our analysis of recorded investigations, we did not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. To conduct this analysis, we used data on all active-duty servicemembers to identify what proportion each racial group (White, Black, Hispanic, and Other) and gender group (male, female) made up of the overall service population from fiscal years 2013 through 2017. We then used data from the services’ military justice or personnel databases to calculate the representation of each racial and gender group as a percent of the population subjected to each type of military justice action. We also examined the rates at which certain racial and gender groups were charged with drug offenses (Article 112a) and sexual assault offenses (Article 120) compared to their proportions of the overall service populations. See Appendix III for information regarding recorded investigations and general and special courts-martial of drug and sexual assault offenses. We analyzed these two specific UCMJ offenses because officials from some services told us that an investigation into these offenses may frequently be mandatory, and thus could potentially mitigate the risk of bias. To conduct this analysis, we used offense data from the services’ military justice databases to determine each racial and gender group’s representation in the population that was the subject of a military justice action for a drug, sexual assault, or other offense type. Bivariate and Multivariate Regression Analyses. We developed a logistic regression model using the data we received from the services’ investigations and military justice databases to determine the extent that certain attributes were associated with higher rates of investigation or discipline of servicemembers. We conducted bivariate logit analyses to estimate the association between select attribute factors (or independent variables) and the outcome variables (the dependent variable) in a binary format, except for the two offense outcome variables. Table 7 below lists all of the dependent and independent variables we used in our analyses. To conduct our statistical analyses, we created groups for each demographic and administrative attribute (independent variable) that we tested in our regression model. We created these groups based on input and guidance from service officials. While the modeling subgroups we created are largely consistent across services, some values are different for certain services. Table 8 summarizes the modeling groups we constructed for each service for each attribute included in our regression analyses. When analyzing the severity of punishments, we developed two groups for the Navy and the Marine Corps, and three groups for the Air Force and the Army, as shown in table 9 below. We did not create a third punishment group for confinement without dismissal or discharge for the Navy and the Marine Corps because of the small number of cases with confinement that did not also include some sort of discharge. Based on discussions with service officials, we determined that a sentence resulting in a dismissal or discharge was the most severe punishment outcome. Typically, a logistic regression model is appropriate when the model outcome is a binary (yes/no) response. Because the punishment groups for the Army and the Air Force were not binary, they could not be analyzed using a multivariate logistic regression. Instead, we used an ordered logit model, also called an ordered logistic regression model, to analyze punishment severity in the Army and the Air Force. An ordered logistic regression is an extension of the logistic regression model that applies to dependent variables where there are more than two response categories. This model allowed us to examine the degree to which a racial or gender group was more likely or less likely than another group to receive a more severe punishment in general and special courts-martial, while controlling for other attributes, such as gender, education, rank, composition of panel, and offense type. To conduct this analysis, we reviewed outcome data from the services’ personnel, investigations, and military justice databases. Based on our bivariate analyses, we determined which variables were significantly associated with military justice actions, and that appeared to be statistically significant predictors of an individual’s likelihood to be subject to a military justice action. Appendix IX includes a summary of those indicators for each of the services. We also examined correlation matrices of the independent variables to determine where there were high correlations between two variables. Where variables were highly correlated, we chose one variable over the others or created a hybrid variable combining those two variables. Specifically, we excluded age and years of service for most of the military services, due to high correlation with the rank variable. Based on our discussions with service officials, they indicated that rank would be the preferred variable to include in our analyses if selecting only one variable among rank, age, and years of service. However, for the Air Force, based on discussion with Air Force officials, we did control for years of service among the lower enlisted ranks (E1-E4). In addition, we could not include education for the Army due to variability and overlapping values in the data. Further, we chose not to model attributes such as occupation and location due to the great variability in these data and the difficulty in creating groups and reaching agreement about those groups with service officials. Based on these results, we then conducted a series of multivariate logistic regression models. Multivariate logistic regression modeling is a statistical method that examines several variables simultaneously to estimate whether each of these variables are more likely or less likely to be associated with a certain outcome. A multivariate regression analysis analyzes the potential influence of each individual factor on the likelihood of a binary outcome (e.g., a specific military justice action) while simultaneously accounting for the potential influence of the other factors. This type of modeling allowed us to test the association between servicemember characteristics, such as race or gender, and the odds of a military justice action (shown as the outcome variables in table 7 above), while holding other servicemember attributes constant (such as gender, rank, and education, shown as the independent variables in table 7 above). We conducted a separate regression for each of the military justice actions listed as an outcome variable. We selected this type of model because it could account for the attributes simultaneously. For the purposes of consistency, in our multivariate regression analyses, we made all racial comparisons with White servicemembers as the reference category. Similarly, we made all gender comparisons with female servicemembers as the reference category. A logistic regression model provides an estimated odds ratio, where a value greater than one indicates a higher or positive association; in this case, between the race, ethnicity, or gender of a servicemember (the independent variables) and the likelihood of being the subject of a military justice action (the dependent, or outcome, variable). An estimated odds ratio less than one indicates lower odds or likelihood of being the subject of a military justice action when a factor—here, a specific demographic or administrative attribute—is present. The statistical significance of the logistic regression model results is determined by a p-value of less than 0.05. As a result, in our report we state that odds ratios that are statistically significant and greater than 1.00 or lower than 1.00 indicate that individuals with that characteristic are more likely or less likely, respectively, to be the subject of a particular outcome or military justice action. In cases where the p-value was greater than 0.05, we report that we could not identify any statistically significant differences, which means that we could not conclude that there was an association between race or gender and the likelihood of a military justice action. We report the results from our regression models as odds ratios. We generally report multivariate results from testing associations between key attributes—including race, ethnicity, gender, rank, and education—on a servicemember’s likelihood of being investigated and disciplined for a UCMJ violation. In the body of this report, we focused on race and gender disparities among servicemembers investigated and disciplined for violations of the UCMJ, while holding other factors constant; however, our analyses of recorded investigations and general and special courts- martial for drug and sexual assault offenses are discussed in Appendix III. In all of these analyses for the Air Force, we also controlled for years of service among the lower enlisted ranks (E1-E4). In the analyses we conducted for the Army, we could not control for education, but we were able to control for age. All regression models are subject to limitations. For our analyses, the limitations included: Results of our analyses are associational and do not imply a causal relationship. We did not identify the causes of any racial or gender disparities, and the results of our work alone should not be used to make conclusions about the military justice process. Our analyses of these data in finding the presence or absence of racial or gender disparities, taken alone, do not establish the presence or absence of unlawful discrimination, as that is a legal determination that would involve other corroborating information along with supporting statistics. We could not assess some attributes that potentially could be related to a servicemember’s likelihood of facing a military justice action in the data analyzed for this review. For example, a servicemember’s socioeconomic background or receipt of a waiver upon entering the service could potentially be related to the likelihood of being investigated, tried in a court-martial, or subject to a nonjudicial punishment. However, we were unable to test these associations because most services indicated they did not have information about socioeconomic status or waivers in the databases that we requested data from. Furthermore, while some other attributes may have been available—such as marital status of the subject or the number of dependent children—we did not include these attributes in our data requests because we prioritized analyzing other demographic factors based on our background research and conversations with service officials. As outlined above, we incorporated input from service officials to the extent possible as we prepared our modeling groups for the demographic and administrative attributes we tested, such as rank, education, and years in service. However, this process was necessarily imprecise. Our modeling results may have been impacted by our discretionary decisions to include certain values in the groups we created for these variables. Data reliability. We conducted data reliability assessments on the datasets we received from the databases in our review. We examined the documentation officials provided to us on each database and conducted electronic tests on the data we received to check for completeness and accuracy. We also sent data reliability questionnaires to database managers about how the data are collected and their appropriate uses, and had discussions with database managers to discuss the reliability of the data in their databases. When we determined that particular fields were not sufficiently reliable, we excluded them from our analysis. For example, we did not use data in our analysis where a substantial number of values were missing. We also checked to see that the values for variables were internally consistent and that results were not affected unduly by outlier values that might suggest miscoded values. For the purposes of our analysis, we found the variables we ultimately reported on to be sufficiently reliable. Furthermore, due to the sensitivity of the information analyzed in this report, we did not include information in instances where the number of servicemembers subjected to a particular military justice action was fewer than 20, to protect privacy. Literature review. To assess the extent to which disparities in the military justice system and the civilian justice system had been previously assessed, we conducted a literature review. To identify relevant publications about disparities in the military justice system and the civilian justice system, we performed a literature search of a number of bibliographic databases, including ProQuest Academic, ProQuest Dialog, Scopus, EBSCO, and HeinOnline. We also searched two think tank search engines: Policy File and the Think Tank Search (from the Harvard Kennedy School). We received the following types of publications: scholarly/peer reviewed material, dissertations, and association/think tank/nonprofit publications. To identify publications by DOD and the services related to the military justice system, we reviewed prior GAO reports and asked officials at the DOD Office of Diversity, Equity and Inclusion, and in the services’ respective diversity and inclusion offices to identify relevant publications. We concluded our searches in October 2018. We also asked the service Judge Advocate General offices for publications relevant to disparities in military justice. We also identified publications in our own background information search. We reviewed those publications that assessed racial, ethnic, or gender disparities among servicemembers in the military justice system. While the civilian and military justice systems differ from each other, we selected a few nationwide studies examining disparities in the civilian justice system to summarize in the background section of our report, in order to enhance our understanding of the complexities of the issues, including how others have attempted to measure disparities. We did not assess the methodologies used in any of these studies or the reliability of the data cited in the studies; the studies related to the civilian justice system are discussed in our report to provide broader context for the discussion about racial and gender disparities in the military justice system. We conducted this performance audit from November 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform an audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. As shown in figure 15 below, our analysis of data contained in the military services’ military criminal investigations databases found that Black servicemembers were subjects of recorded investigations at a higher rate compared to their proportion of the overall service population in all of the military services. Hispanic servicemembers were the subjects of recorded investigations at a higher rate compared to their proportion of the overall service population in the Navy and the Air Force, at a lower rate in the Marine Corps, and at the same rate in the Army. Additionally, we found that males were the subjects of recorded investigations at higher rates than their share of the general service population in all of the military services. In addition, figure 15 above also shows the results of our bivariate analyses, which calculated the degree to which one racial or gender group was more likely or less likely than another racial or gender group to be the subject of recorded investigations. Our bivariate analyses found that Black and male servicemembers in all of the military services were statistically significantly more likely to be the subjects of recorded investigations for alleged UCMJ violations than servicemembers of all other races or females. Hispanic servicemembers were statistically significantly more likely in the Navy, the Air Force, and the Coast Guard, and were statistically significantly less likely in the Army to be the subjects of recorded investigations than servicemembers of all other races. Servicemembers in the Other race category were statistically significantly less likely than servicemembers of all other races to be the subjects of recorded investigations in the Army and the Marine Corps. Our bivariate analyses did not show any statistically significant differences for servicemembers in the Other race category in the Navy, the Air Force, or the Coast Guard, or Hispanic servicemembers in the Marine Corps. As shown in figure 16 below, Black, Hispanic, and male servicemembers in all of the military services included in this analysis were represented at a higher rate than their proportions of the overall service population. White and female servicemembers in all of the military services were represented at a lower rate than their proportions of the overall service population. Servicemembers in the Other race category were represented at a higher rate in the Navy, at a lower rate in the Army and the Air Force, and at the same rate in the Marine Corps compared to their proportion of the overall service population. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. The bivariate regression analysis results in figure 16 above calculate the degree to which one racial or gender group was more likely or less likely than servicemembers of all other races and genders to be tried in general and special courts-martial. We found that Black and male servicemembers in all of the military services were more likely to be tried in general and special courts-martial than servicemembers of all other races or females. Our bivariate analyses found that Hispanic servicemembers in the Army were more likely to be tried in general and special courts-martial than servicemembers of all other races. We found no statistically significant differences in the likelihood of Hispanic servicemembers to be tried in general and special courts-martial compared to servicemembers of all other races in the Navy, the Marine Corps, and the Air Force. White and female servicemembers in all of the military services were less likely to be tried in general and special courts- martial than servicemembers of other races or males. Furthermore, servicemembers in the Other race category were more likely in the Navy and less likely in the Army to be tried in general and special courts-martial than servicemembers of other races. We found no statistically significant differences in the likelihood of servicemembers in the Other race category to be tried in general and special courts-martial in the Marine Corps and the Air Force compared to servicemembers of other races. As shown in figure 17 below, for trials in general and special courts- martial that followed a recorded investigation, Black servicemembers were represented at a lower rate in the Army, the Navy, and the Marine Corps, and at the same rate in the Air Force compared to their proportions of the service population that had recorded investigations. Hispanic servicemembers in trials of general and special courts-martial following a recorded investigation were represented at a higher rate than their proportion of the overall service population that had recorded investigations in the Army and the Marine Corps, and at the same rate in the Navy and the Air Force. White servicemembers were represented at a lower rate in the Army, the Navy, and the Marine Corps, and at the same rate in the Air Force compared to their proportions of the service population with recorded investigations. Servicemembers in the Other race category were represented at a higher rate in the Army, the Navy, and the Marine Corps, and at the same rate in the Air Force compared to their proportions of the overall service population with recorded investigations. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. Male servicemembers with trials in general and special courts-martial that followed a recorded investigation were represented at a higher rate in all of the military services compared to their proportions of the service population that had recorded investigations. Females were represented at a lower rate in all of the military services compared to their proportions of the service population that had recorded investigations. As shown in figure 17 above, our bivariate regression analyses showed that, in the Army, White servicemembers were statistically significantly less likely to be tried in general and special courts-martial following a recorded investigation than servicemembers of all other races, whereas Hispanic servicemembers were statistically significantly more likely to be tried following a recorded investigation. In the Navy, servicemembers in the Other race category were statistically significantly more likely to be tried in general and special courts-martial following a recorded investigation than servicemembers of all other races. Males were more likely, and females were less likely, to be tried in general and special courts-martial following a recorded investigation in the Army and the Air Force. The remaining odds ratios shown in figure 17 above were not statistically significant. We identified racial and gender disparities in the rate and likelihood of trial in general and special courts-martial in cases without a recorded investigation in all of the military services. Specifically, as shown in figure 18 below, for trials in general and special courts-martial without a recorded investigation, Black and male servicemembers in all of the military services were represented at a higher rate than their proportion of the service population that did not have a recorded investigation. Hispanic servicemembers were represented at a higher rate in the Army and the Marine Corps, and at the same rate in the Navy and the Air Force compared to their proportions of the service population that did not have a recorded investigation. Servicemembers in the Other race category were represented at a lower rate in the Marine Corps and the Air Force, and at the same rate in the Army and the Navy compared to their proportion of the overall service population that did not have a recorded investigation. White and female servicemembers in all of the military services were represented at a lower rate than their proportions of the overall service population without a recorded investigation. We could not analyze Coast Guard cases due to the small number of general and special courts- martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. The bivariate regression analysis results in figure 18 above calculate the degree to which one racial or gender group was more likely or less likely than servicemembers of all other races and genders to be tried in general and special courts-martial without a recorded investigation. We found that Black and male servicemembers in all of the military services were more likely to be tried at special and general courts-martial that were not preceded by a recorded investigation than servicemembers of all other races or females. White and female servicemembers in all of the military services were less likely to be tried at special and general courts-martial that were not preceded by a recorded investigation than servicemembers of all other races and males. We found no statistically significant differences in the likelihood of Hispanic servicemembers or servicemembers in the Other race category in any of the military services being tried in general and special courts-martial without a recorded investigation compared to servicemembers of all other races. We identified racial and gender disparities in the rate and likelihood of trial in summary courts-martial in the Air Force and the Marine Corps. Specifically, as shown in figure 19 below, Black and male servicemembers were tried in summary courts-martial for UCMJ violations at higher rates than their share of the overall service population in the Air Force and the Marine Corps. White and Hispanic servicemembers were tried in summary courts-martial at lower rates than their share of the overall service population in both services. Servicemembers that were included in the Other race category were tried at higher rates in the Air Force, and at lower rates in the Marine Corps. We could not determine whether there were any racial or gender disparities for summary courts-martial in the Army and the Navy because these services did not collect complete summary court-martial data— information about all summary court-martial cases, to include demographic information about the subject—in their investigative, military justice, or personnel databases, as discussed above in the report. We could not analyze Coast Guard cases due to the small number of summary courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. The bivariate regression analysis results in figure 19 above calculate the degree to which one racial or gender group was more likely or less likely than servicemembers of all other races and genders to be tried in summary courts-martial. We found that Black servicemembers in the Marine Corps and the Air Force were more likely to be tried in summary courts-martial than servicemembers of all other races. We also found that male servicemembers were more likely than their female counterparts to be tried in summary courts-martial in the Marine Corps and the Air Force. We observed no statistically significant differences in summary court- martial rates for servicemembers in the Other race category in either the Marine Corps or the Air Force, or for Hispanic servicemembers in the Marine Corps. As shown in figure 20 below, we found that Black and male servicemembers were subject to nonjudicial punishment for UCMJ violations at a higher rate than their share of the overall service population in the Marine Corps and the Air Force. White servicemembers were subject to nonjudicial punishments at lower rates than their share of the overall service population in both services, and Hispanic servicemembers were subject to nonjudicial punishments in a proportion equal to their share of the general service population in both services. Servicemembers that were included in the Other race category were subject to nonjudicial punishment at lower rates than their share of the overall service population in the Marine Corps and the Air Force. We could not analyze nonjudicial punishments in the Army, the Navy, and the Coast Guard because these services do not collect complete nonjudicial punishment information. The bivariate regression analyses in figure 20 above calculate the degree to which one racial or gender group was more likely or less likely than another racial or gender group to be subject to nonjudicial punishment. We found that Black and male servicemembers were more likely than servicemembers of all other races or female servicemembers to receive nonjudicial punishments in the Marine Corps and the Air Force. We also found that Hispanic servicemembers in the Air Force were less likely to be subject to nonjudicial punishment, but we observed no statistically significant difference for Hispanic servicemembers in the Marine Corps. Servicemembers in the Other race category were less likely to be subject to nonjudicial punishment than servicemembers of all other races in the Marine Corps and the Air Force. As shown in figure 21 below, we found that Black servicemembers were convicted in general and special courts-martial at a lower rate in the Army and the Air Force, and at an equal rate in the Navy and the Marine Corps compared to their proportion of the overall general and special courts- martial population. In the Army, the Navy, and the Marine Corps, Hispanic servicemembers were convicted in general and special courts- martial at an equal rate compared to their proportion of the overall general and special courts-martial population. Compared to their proportion of the overall general and special courts-martial population, Hispanic servicemembers were convicted at a lower rate in the Air Force. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. As shown in figure 21 above, bivariate regression analyses found that, in the Army, White servicemembers were statistically significantly more likely to be convicted, whereas Black servicemembers were statistically significantly less likely to be convicted in general and special courts- martial compared to all other servicemembers. White servicemembers in the Air Force were also statistically significantly more likely to be convicted in general and special courts-martial compared to all other servicemembers. In the Marine Corps, we found that males were more likely to be convicted than females, whereas in the Air Force, males were less likely to be convicted than females. The remaining odds ratios shown in figure 21 above were not statistically significant. As shown in figures 22 and 23 below, we found that Black servicemembers received a more severe punishment at a lower rate compared to their share of the convicted service population in the Army, the Navy, and the Air Force. We also found that Hispanic servicemembers received a more severe punishment at a lower rate compared to their share of the convicted service population in the Air Force, but at a higher rate in the Marine Corps. We found that male servicemembers in the Marine Corps and the Air Force received a more severe punishment at a higher rate, and at the same rate in the Army and the Navy, compared to their share of the convicted service population. Females received a more severe punishment at a lower rate in the Air Force and the Marine Corps, and at the same rate in the Army and the Navy, compared to their share of the convicted service population. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. The bivariate regression analyses in Figures 22 and 23 above calculated the degree to which one racial or gender group was more likely or less likely than another racial or gender group to be dismissed or discharged after a conviction in general and special courts-martial. In the Navy, we found that Black servicemembers were statistically significantly less likely to be dismissed or discharged after conviction in general and special courts-martial compared to all other servicemembers. We found no statistically significant differences regarding minority servicemembers being more likely or less likely to be dismissed or discharged after conviction in general and special courts-martial in the Marine Corps, or to receive a more severe punishment in the Army or the Air Force. We found that males in the Marine Corps and the Air Force were more likely to be dismissed or discharged or receive a more severe punishment after conviction than females, but we did not find any statistically significant differences regarding male servicemembers in the Army or the Navy. This appendix contains several figures that show the underlying data related to drug and sexual assault offenses from fiscal years 2013 through 2017 for the Army, the Navy, the Marine Corps, and the Air Force. Across most military services, Black, Hispanic, and male servicemembers were the subjects of recorded investigations and tried in general and special courts-martial at higher rates than their shares of the overall service population for drug offenses, sexual assault offenses, and all other offenses. We found that the likelihood of conviction varied among the services for these two offenses. We analyzed these two specific Uniform Code of Military Justice (UCMJ) offenses separately from all other offenses because service officials told us that an investigation into these offenses may frequently be mandatory, and thus could potentially mitigate the risk of bias. We analyzed data for these offenses for recorded investigations, trials in general and special courts-martial, and convictions from fiscal years 2013 through 2017 to assess the extent to which racial and gender disparities may exist. Our analyses of the services’ investigation, military justice, and personnel databases, as reflected in these figures, taken alone, do not establish the presence or absence of unlawful discrimination. We identified racial and gender differences in recorded investigation rates for drug offenses, sexual assault offenses, and all other offenses compared with the total service populations. Our analysis focused on alleged UCMJ violations for these offenses that were recorded in the Military Criminal Investigative Organization (MCIO) investigations databases. Other investigations conducted within the military, such as command investigations, were not considered in this analysis. For example, as shown in figure 24 below, Black servicemembers were the subjects of recorded investigations for drug offenses, sexual assault offenses, and all other offenses at a higher rate than their share of the overall service population across all military services. Hispanic servicemembers were the subjects of recorded investigations for drug offenses, sexual assault offenses, and all other offenses at a higher rate than their share of the overall service population in the Air Force, but were the subjects of recorded investigations for drug offenses at a lower rate than their share of the overall service population in both the Army and the Marine Corps. Male servicemembers were the subjects of recorded investigations for drug offenses and sexual assault offenses at a higher rate than their share of the overall service population across all of the military services. We found that White servicemembers were tried for drug offenses, sexual assault offenses, and all other offenses in general and special courts- martial at lower rates than their share of the overall service population across all of the military services. Black servicemembers were tried for drug offenses, sexual assault offenses, and all other offenses in general and special courts-martial at a higher rate than their share of the overall service population in all of the military services. Hispanic servicemembers were tried for drug offenses in general and special courts-martial at a lower rate in the Navy and the Marine Corps, and at a higher rate in the Air Force, compared to their share of the overall service population. Hispanic servicemembers were tried for sexual assault offenses at a higher rate than their proportion of the overall service population in all of the military services. Female servicemembers were tried for drug offenses, sexual assault offenses, and all other offenses in general and special courts-martial at lower rates than their share of the general service population in the Army, the Navy, and the Air Force, and were tried for sexual assault offenses and all other offenses at lower rates than their share of the overall service population in the Marine Corps. Figure 25 below shows the gender and racial composition of general and special court-martial trials for drug offenses, sexual assault offenses, and all other offenses. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. We conducted multivariate regression analyses to calculate the degree to which servicemembers charged with drug offenses and sexual assault offenses were more likely or less likely than a composite variable comprised of all other offenses to be convicted in general and special courts-martial, while controlling for other attributes, such as race, gender, education, and rank. As shown in figure 26 below, we did not identify any statistically significant difference in conviction rates for drug offenses compared to all other offenses in the Army, the Navy, the Marine Corps, and the Air Force. Sexual assault offenses were less likely to result in a conviction in the Army, the Navy, and the Air Force, and there was no statistically significant difference for the Marine Corps. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. This appendix contains several tables that show the underlying data and analyses used throughout this report relating to Army personnel and military justice disciplinary actions from fiscal years 2013 through 2017. We did not include populations that contained fewer than 20 servicemembers in the total populations presented in these tables to ensure the protection of sensitive information. As a result, the total populations presented in this appendix may vary among the different tables and may vary from the total populations presented in the body of the report. Our analyses of the Army’s investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. The multivariate results listed below in table 17 show the odds ratios for the multivariate regression analyses of the Army data. We used logistic regression to assess the relationship between the independent variables, such as race, education, rank, or gender, with the probability of being subject to a military justice action. Logistic regression allows for the coefficients to be converted into odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with that characteristic are more likely to be subject to a military justice action. For example, an odds ratio of 1.55 for Black servicemembers would mean that they are 1.55 times more likely to be subject to a military justice action compared to White servicemembers. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with that characteristic are less likely to be subject to a military justice action. We excluded years of service from the Army analyses due to high correlation with the rank variable. This appendix contains several tables that show the underlying data and analyses used throughout this report relating to Navy personnel and military justice disciplinary actions from fiscal years 2013 through 2017. We did not include populations that contained fewer than 20 servicemembers in the populations presented in these tables to ensure the protection of sensitive information. As a result, the populations presented in this appendix may vary among the different tables and may vary from the populations presented in other places in this report. Our analyses of the Navy’s investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. The multivariate results listed below in table 26 show the odds ratios for the multivariate regression analyses of Navy data. We used logistic regression to assess the relationship between the independent variables, such as race, education, rank, or gender, with the probability of being subject to a military justice action. Logistic regression allows for the coefficients to be converted into odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with that characteristic are more likely to be subject to a military justice action. For example, an odds ratio of 1.55 for Black servicemembers would mean that they are 1.55 times more likely to be subject to a military justice action compared to White servicemembers. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with that characteristic are less likely to be subject to a military justice action. We excluded age and years of service from the Navy multivariate regression analyses due to high correlation with the rank variable. This appendix contains several tables that show the underlying data and analyses used throughout this report relating to Marine Corps personnel and military justice disciplinary actions from fiscal years 2013 through 2017. We did not include populations that contained fewer than 20 servicemembers in the populations presented in these tables to ensure the protection of sensitive information. As a result, the populations presented in this appendix may vary among the different tables and may vary from the populations presented in other places in this report. Our analyses of the Marine Corps investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. The multivariate results listed below in table 35 show the odds ratios for the multivariate regression analyses of Marine Corps data. We used logistic regression to assess the relationship between the independent variables, such as race, education, rank, or gender, with the probability of being subject to a military justice action. Logistic regression allows for the coefficients to be converted into odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with that characteristic are more likely to be subject to a military justice action. For example, an odds ratio of 1.55 for Black servicemembers would mean that they are 1.55 times more likely to be subject to a military justice action compared to White servicemembers. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with that characteristic are less likely to be subject to a military justice action. We excluded age and years of service from the Marine Corps multivariate regression analyses due to high correlation with the rank variable. This appendix contains several tables that show the underlying data and analyses used throughout this report relating to Air Force personnel and military justice disciplinary actions from fiscal years 2013 through 2017. We did not include populations that contained fewer than 20 servicemembers in the populations presented in these tables to ensure the protection of sensitive information. As a result, the populations presented in this appendix may vary among the different tables and may vary from the populations presented in other places in this report. Our analyses of the Air Force’s investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. The multivariate results listed below in table 45 show the odds ratios for the multivariate regression analyses of Air Force data. We used logistic regression to assess the relationship between the independent variables, such as race, education, rank, or gender, with the probability of being subject to a military justice action. Logistic regression allows for the coefficients to be converted into odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with that characteristic are more likely to be subject to a military justice action. For example, an odds ratio of 1.55 for Black servicemembers would mean that they are 1.55 times more likely to be subject to a military justice action compared to White servicemembers. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with that characteristic are less likely to be subject to a military justice action. We controlled for years of service among the lower enlisted ranks (E1- E4), but excluded age from the Air Force multivariate regression analyses due to high correlation with the rank and years of service variables. This appendix contains several tables that show the underlying data and analyses used throughout this report relating to Coast Guard personnel and military justice disciplinary actions from fiscal years 2013 through 2017. We did not include populations that contained fewer than 20 servicemembers in the populations presented in these tables to ensure the protection of sensitive information. As a result, the populations presented in this appendix may vary among the different tables and may vary from the populations presented in other places in this report. Our analyses of the Coast Guard’s investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. The multivariate results listed below in table 52 show the odds ratios for the multivariate regression analyses of Coast Guard data. We used logistic regression to assess the relationship between the independent variables, such as race, education, rank, or gender, with the probability of being subject to a military justice action. Logistic regression allows for the coefficients to be converted into odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with that characteristic are more likely to be subject to a military justice action. For example, an odds ratio of 1.55 for Black servicemembers would mean that they are 1.55 times more likely to be subject to a military justice action compared to White servicemembers. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with that characteristic are less likely to be subject to a military justice action. We excluded age and years of service from the Coast Guard analyses due to high correlation with the rank variable. We found that age, rank, length of service, and education were indicators of a servicemember’s likelihood of being the subject of a recorded investigation, court-martial, or nonjudicial punishment across the military services. To analyze age, rank, length of service, and education, we used bivariate regression analyses to determine which sub-population of each attribute was most likely to be subject to a recorded investigation, court-martial, or nonjudicial punishment. This appendix contains several tables that show the rank, education, length of service, and age groups most likely to be subject to a recorded investigation, tried in general and special courts-martial, tried in summary court-martial, and receive a nonjudicial punishment for all services from fiscal years 2013 through 2017. For the Coast Guard, we could not analyze age, rank, length of service, and education as indicators for courts-martial or nonjudicial punishment due to the small number of recorded military justice cases from fiscal years 2013 through 2017. Our analyses of the services’ investigations, military justice, and personnel databases, as reflected in these tables, taken alone, do not establish the presence or absence of unlawful discrimination. Brenda S. Farrell, (202) 512-3604 or farrellb@gao.gov. In addition to the contact named above, key contributors to this report were Kimberly C. Seay, Assistant Director; Parul Aggarwal; Christopher Allison; Renee S. Brown; Vincent M. Buquicchio; Won (Danny) Lee; Amie M. Lesser; Serena C. Lo; Dae B. Park; Samuel J. Portnow; Clarice Ransom; Christy D. Smith; Preston Timms; and Schuyler Vanorsdale.", "summary": "The Uniform Code of Military Justice (UCMJ) was established to provide a statutory framework that promotes fair administration of military justice. Every active-duty servicemember is subject to the UCMJ, with more than 258,000 individuals disciplined from fiscal years 2013-2017, out of more than 2.3 million unique active-duty servicemembers. A key principle of the UCMJ is that a fair and just system of military law can foster a highly disciplined force. House Report 115-200, accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018, included a provision for GAO to assess the extent that disparities may exist in the military justice system. This report assesses the extent to which (1) the military services collect and maintain consistent race, ethnicity, and gender information for servicemembers investigated and disciplined for UCMJ violations that can be used to assess disparities, and (2) there are racial and gender disparities in the military justice system, and whether disparities have been studied by DOD. GAO analyzed data from the investigations, military justice, and personnel databases from the military services, including the Coast Guard, from fiscal years 2013-2017 and interviewed agency officials. The military services collect gender information, but they do not collect and maintain consistent information about race and ethnicity in their investigations, military justice, and personnel databases. This limits their ability to collectively or comparatively assess these data to identify any disparities (i.e., instances in which a racial, ethnic, or gender group was overrepresented) in the military justice system within and across the services. For example, the number of potential responses for race and ethnicity across the military services' databases ranges from five to 32 options for race and two to 25 options for ethnicity, which can complicate cross-service assessments. The services also are not required to and, thus, do not report demographic information in their annual military justice reports—information that would provide greater visibility into potential disparities. GAO's analysis of available data found that Black, Hispanic, and male servicemembers were more likely than White or female members to be the subjects of investigations recorded in databases used by the military criminal investigative organizations, and to be tried in general and special courts-martial in all of the military services when controlling for attributes such as rank and education. GAO also found that race and gender were not statistically significant factors in the likelihood of conviction in general and special courts-martial for most services, and minority servicemembers were either less likely to receive a more severe punishment than White servicemembers or there was no difference among racial groups; thus, disparities may be limited to particular stages of the process. The Department of Defense (DOD) has taken some steps to study disparities, but has not comprehensively evaluated the causes of racial or gender disparities in the military justice system. Doing so would better position DOD to identify actions to address disparities and help ensure the military justice system is fair and just. Note: These analyses, taken alone, should not be used to make conclusions about the presence or absence of unlawful discrimination. These multivariate regression analysis results estimate whether a racial or gender group is more likely or less likely to be the subject of an investigation or a trial in general or special courts-martial after controlling for race, gender, rank, and education, and in the Air Force, years of service. GAO made all racial comparisons to White servicemembers and all gender comparisons to females. GAO grouped individuals of Hispanic ethnicity together, regardless of race. GAO is making 11 recommendations, including that the services develop the capability to present consistent race and ethnicity data, and DOD include demographic information in military justice annual reports and evaluates the causes of disparities in the military justice system. DOD and the Coast Guard generally concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Our past work has identified five key challenges related to the nation’s ability to detect and respond to biological events that transcend what any one agency can address on its own. They include: (1) enterprise-wide threat determination, (2) situational awareness and data integration, (3) biodetection technologies, (4) biological laboratory safety and security, and (5) emerging infectious disease surveillance. The complexity and fragmentation of roles and responsibilities across numerous federal and nonfederal entities presents challenges to ensuring efficiency and effectiveness across the entire biodefense enterprise. In September 2018, the White House issued the National Biodefense Strategy and through NSPM-14 established a governance structure to guide its implementation. The activities and responsibilities assigned to the interagency governance body by the strategy and NSPM-14 may create new opportunities to make progress on these longstanding and complex issues. However, because implementation of the Strategy and NSPM-14 are in early stages, it remains to be seen how or to what extent they are able to do so. We have ongoing work assessing the strategy and early efforts to implement it. We plan to report in fall 2019. We reported in October 2017 that opportunities remain to enhance threat awareness across the entire biodefense enterprise, leverage shared resources, and inform budgetary tradeoffs among various threats and agency programs. As depicted in figure 1, we reported in October 2017 that key biodefense agencies, including DHS, DOD, HHS, USDA, and EPA, rely on intelligence and global surveillance information, scientific study of disease agent characteristics, and analysis to better understand threats and help make decisions about biodefense investments. These activities are often conducted to support the agencies’ mission or to understand a specific threat. Additionally, to facilitate collaboration among government partners, federal agencies with key roles in biodefense share biological threat information through many different mechanisms including interagency bodies, working groups at the agency and executive level, formalized agreements, colocation, joint projects and funding efforts, and shared expertise (see figure 2). The collaborative mechanisms in which the key agencies in our October 2017 review participated may facilitate information sharing in support of specific federal activities and in individual programs, or in response to specific biological events after they begin to unfold. However, as we reported in October 2017, there was no existing mechanism that could leverage threat awareness information to direct resources and set budgetary priorities across all agencies for biodefense. The nation faces many biological threats, including naturally occurring diseases that affect human, animal, and plant health, and biological weapons used by state or nonstate actors. Without a mechanism that is able to assess the relative risk from biological threats across all sources and domains, the nation may be limited in its ability to prioritize resources, defenses, and countermeasures against the most pressing threats. The Strategy and NSPM-14 outline requirements for participating agencies that lay the ground work for a more systematic, cross- government examination of existing programs. The effort offers the potential for the nation to progress toward more integrated and enterprise-wide threat awareness and to use that information to identify opportunities to leverage resources, but this will take time and entails a change in the way participating agencies have traditionally operated. Because implementation of the strategy is in its early stages, it is too soon to assess how, if at all, it might address this challenge. We have reported that DHS’s National Biosurveillance Integration Center (NBIC), which was created to integrate data across the federal government with the aim of enhancing detection and situational awareness of biological events, has suffered from long-standing issues related to its clarity of purpose. In 2009, we reported that some of NBIC’s partners were not convinced of the value that working with NBIC provided because NBIC’s mission was not clearly articulated. We also reported that NBIC was not fully equipped to carry out its mission because it lacked key resources—data and personnel—from its partner agencies, which may have been at least partially the result of collaboration challenges it faced. In the 2009 report, we recommended that NBIC develop a strategy for addressing barriers to collaboration and develop accountability mechanisms to monitor these efforts. DHS agreed, and in August 2012 NBIC issued the NBIC Strategic Plan, to provide its strategic vision, clarify the center’s mission and purpose, and articulate the value that NBIC seeks to provide to its partners, among other things. In September 2015, we reported that despite NBIC’s efforts to collaborate with interagency partners to create and issue a strategic plan that would clarify its mission and efforts, a variety of challenges remained. We identified options for policy or structural changes that could help a federal data integrator like NBIC better fulfill its mission, given the complexity and difficulty inherent in achieving truly integrated situational awareness that makes new meaning out of disparate data, but we did not make specific recommendations. The National Biodefense Strategy identified biosurveillance data integration among several information sharing activities that need to be enhanced. Interagency attention to the goals, opportunities, and challenges of enterprise-wide data integration offers the potential for the nation to better define what kind of integrated situational awareness is possible, what it will take to effectively and efficiently achieve it, and what value it has. However, it remains to be seen how or whether the interagency efforts to implement the Strategy will be able to address ongoing situational awareness and data integration challenges. Since 2012, we have reported that DHS has faced challenges in clearly justifying the need for the BioWatch program and its ability to reliably address that need (to detect aerosolized biological attacks). In September 2012, we found that DHS approved a next-generation BioWatch acquisition in October 2009 without fully developing knowledge that would help ensure sound investment decision making and pursuit of optimal solutions. We recommended that before continuing the acquisition, DHS reevaluate the mission need and possible alternatives based on cost-benefit and risk information. DHS concurred and in April 2014, canceled the acquisition because an alternatives analysis did not confirm an overwhelming benefit to justify the cost. DHS continues to rely on the currently-deployed BioWatch system for early detection of an aerosolized biological attack, but in 2015 we found that DHS lacked reliable information about the current system’s technical capabilities to detect a biological attack, in part because DHS had not developed technical performance requirements for the system. We reported in September 2015 that DHS commissioned tests of the current system’s technical performance characteristics, but without performance requirements, DHS could not interpret the test results and draw conclusions about the system’s ability to detect attacks. At the time of our report in October 2015, DHS was considering upgrades to the Gen-2 system, but we recommended that DHS not pursue upgrades until it establishes technical performance requirements to meet a clearly defined operational objective and assesses the system against these performance requirements. DHS concurred and reported it was working to address the recommendation. DHS has since begun to acquire a different type of biodetection system, BioDetection 21 (or BD21), intended to replace BioWatch. BD21 is currently in a pilot phase; therefore we cannot yet determine how it will be implemented in the future or what decisions DHS will ultimately make regarding the existing BioWatch system. In August 2017, we reported that from a homeland security and public health perspective, threats of bioterrorism, such as anthrax attacks, and high-profile disease outbreaks, such as Ebola and emerging viruses like dengue, chikungunya, and Zika, highlight the continued need for diagnostic tests that provide early detection and warning about biological threats to humans. Multiplex point-of-care technologies are technologies that can simultaneously test for more than one type of human infectious disease pathogen from a single patient sample (such as blood, urine, or sputum) in one run at or near the site of a patient. Multiplex point-of-care technologies can be used for diagnosing different diseases, including more common diseases such as influenza, emerging infectious diseases, or diseases caused by select agents in minutes to a few hours. We further reported that, while potential benefits of these technologies include more appropriate use of antibiotics and improved ability to limit the spread of disease, among others, developers and users disagreed on the strength of evidence showing the extent of multiplex point-of-care technologies’ improvement on patient outcomes and identified the need for more clinical studies to establish the benefits of these technologies. Additionally, implementation challenges include lack of familiarity with such technologies, cost considerations, false positive results for rare diseases, and the challenges related to the regulatory review process for developers to get approval or clearance to market their technologies. The National Biodefense Strategy and its interagency governing leadership offer the potential for the nation to better define the role of detection technologies in a layered national biodefense capability to help those that pursue these technologies better articulate the mission needs and align requirements and concepts of operation accordingly. Because implementation of the strategy is in its early stages, it remains to be seen how or whether the interagency will be able engage on this issue in a way that helps to drive informed investment tradeoff decisions about technology alternatives. We—along with Congress and various federal committees—have, for many years, identified challenges and areas for improvement related to the safety, security, and oversight of high-containment laboratories. These laboratories conduct research on hazardous pathogens—such as the Ebola virus and the bacteria that causes anthrax—and toxins that may pose a serious threat to humans, animals, or plants. In 2008 and 2009, we found a proliferation of high-containment laboratories across the United States, with the number of such laboratories in the government, academic, and private sectors increasing since 2001. We recommended that the National Security Advisor name an entity charged with government-wide strategic evaluation of high-containment laboratories. National Security Staff disagreed with this recommendation. After reporting on these issues again in 2013, the Office of Science and Technology Policy implemented this recommendation. In January 2013, we also found that, for the subset of these laboratories subject to federal oversight, the oversight was duplicative, fragmented, and dependent on self-policing. We recommended that HHS’s Centers for Disease Control and Prevention and USDA’s Animal and Plant Health Inspection Service work with DHS and DOD to coordinate inspections and ensure consistent application of inspection standards; the departments generally agreed with our recommendations and noted various actions they had already taken, or planned to take, to coordinate inspection efforts, such as conducting joint inspections. More recently, in response to reported lapses in laboratory safety at HHS and DOD in 2014 and 2015, we examined how federal departments oversee their high-containment laboratories. In March 2016, we found that most of the 8 departments and 15 agencies that we reviewed had policies that were not comprehensive or were not up to date. Also, while the departments and agencies we reviewed primarily used inspections to oversee their high-containment laboratories, some of them were not routinely reporting inspection results, laboratory incidents, and other oversight activities to senior officials. We made 33 recommendations in total, including that departments develop and update policies to include missing elements and ensure that oversight activity results are reported to senior officials. To date, 12 of the 33 recommendations have been implemented—including updating policies and reporting requirements. We continue to monitor agency progress in implementing the 21 that remain open. In response to several incidents involving the shipment of improperly inactivated pathogens, in August 2016 we reported on issues related to the inactivation of pathogens in high-containment laboratories and found that both the science and the federal guidance around pathogen inactivation are limited and inconsistently implemented. Additionally, we found that federal officials did not know how many incomplete inactivation incidents have occurred because laboratories do not have to identify them in incident reports, and are only required to report incidents involving certain pathogens. We made 11 recommendations to HHS and USDA that they improve the oversight of inactivation by revising reporting forms, improving guidance for development and validation of inactivation protocols, and developing consistent criteria for enforcement of incidents involving incomplete inactivation. To date, 6 of the 11 recommendations have been addressed and we continue to monitor the 5 that remain open. Safety lapses continued to occur at laboratories in the United States that conduct research on hazardous pathogens, raising concern about the efficacy of federal oversight. In October 2017, we found that the Federal Select Agent Program—jointly managed by HHS and USDA—oversees laboratories’ handling of certain hazardous pathogens known as select agents, but the program does not fully meet all key elements of effective oversight. For example, the Federal Select Agent Program was not independent from all laboratories it oversees, and it had not assessed risks posed by its current structure or the effectiveness of its mechanisms to reduce organizational conflicts of interest. We made 11 recommendations for the Federal Select Agent Program, including to (1) assess risks from its current structure and the effectiveness of its mechanisms to reduce conflicts of interest and address risks as needed, (2) assess the risk of activities it oversees and target reviews to high-risk activities, and (3) develop a joint workforce plan; to-date, 5 of 11 recommendations have been addressed and we continue to monitor the progress for the 6 that remain open. In September 2018 we found that DOD had made progress by taking a number of actions to address the 35 recommendations from the Army’s 2015 investigation report on the inadvertent shipment of live anthrax; however, DOD had not yet developed an approach to measure the effectiveness of these actions. Additionally, we reported that although DOD had implemented a Biological Select Agents and Toxins Biosafety and Biosecurity Program to improve management, coordination, safety, and quality assurance, DOD had not developed a strategy and implementation plan for managing the program. Also, we found that the Army had not fully institutionalized measures to ensure that its biological test and evaluation mission remains independent from its biological research and development mission so that its test and evaluation procedures are objective and reliable. Finally, DOD had not completed a required study and evaluation of its Biological Select Agents and Toxins infrastructure that will affect the future infrastructure of the Biological Select Agents and Toxins Biosafety and Biosecurity Program. DOD officials had no estimated time frames for when DOD will complete the study and evaluation. We recommended that DOD develop an approach to assess the effectiveness of the recommendations, a strategy and implementation plan for its Biological Select Agents and Toxins Biosafety and Biosecurity Program, measures to ensure independence, and time frames to complete a study. To date, all of these recommendations remain open. In agency comments, DOD concurred with all four of our recommendations and discussed the actions the department intended to take to address them, including finalizing the development of a long-term strategy and implementation plan by September 1, 2019. The National Biodefense Strategy highlights the need for continuous improvement of biosafety and biosecurity for laboratories and other facilities. However, it is not yet known how, if at all, the strategy will drive interagency partners to develop additional oversight or other practices to mitigate the risk of bioincidents at high containment laboratories, because implementation of the strategy is in its early stages. We have reported that establishing and sustaining biosurveillance capabilities can be difficult for a myriad of reasons. For example, maintaining expertise in a rapidly changing field is difficult, as is the challenge of accurately recognizing the signs and symptoms of rare or emerging diseases. Additionally, we reported in October 2011 that funding targeted for specific diseases does not allow for focus on a broad range of causes of morbidity and mortality, and federal officials have said that the disease-specific nature of funding is a challenge to states’ ability to invest in core biosurveillance capabilities. Further, we reported in May 2018 that although the awards funded by supplemental appropriations have allowed state and local public health departments, laboratories, and hospitals to surge during a threat—for example, the H1N1influenza and Zika viruses—most of the 10 non-federal stakeholders we interviewed, as well as HHS officials said that the timing of these awards can result in challenges to carrying out preparedness and response activities during infectious disease threats. An effective medical response to a biological event depends in part on the ability of individual clinicians and other professionals to identify, accurately diagnose, and effectively treat diseases, including many that may be uncommon. For example, in May 2017, we reported that because Zika virus disease was a newly emerging disease threat in the United States and relatively little was known about the virus prior to 2016, HHS and state and local public health agencies were not fully equipped with information and resources needed for a rapid response at the outset of the recent outbreaks. They faced challenges establishing and implementing surveillance systems for Zika virus disease and infection and its associated health outcomes. Additionally, in March 2019, we reported that USDA would likely face surveillance challenges that could delay detection of the first cases in a foot-and-mouth disease outbreak in livestock, which could have a devastating impact on our economy and trade agreements. For example, foot-and-mouth disease can spread without detection as signs can be difficult to notice in some species, take up to 4 days to manifest after an animal is infected, and infection in wild animals could go undetected and continue to spread the virus. In 2011, while reporting on nonfederal biosurveillance efforts, we found state and local agriculture, public health, and wildlife departments were completely or largely dependent on federal funding for biosurveillance- related activities. At that time, we also reported that the common federal approach of disease-specific funding—for example, West Nile virus— limited nonfederal efforts to develop core capabilities that could provide surveillance capacity that cut across health threats and for emerging- disease threats. According to federal, state, and local officials, early detection of potentially serious disease indications nearly always occurs first at the local level, making the personnel, training, systems, and equipment that support detection at the state and local level a cornerstone of our nation’s biodefense posture. In May 2018, we reported that officials from HHS told us that their grant awards funded by annual appropriations are intended to establish and strengthen emergency preparedness and capacity building, but may not fully support the need for surge capacity that states and other jurisdictions require in order to respond to an infectious disease threat. We reported that during recent infectious disease threats, HHS received supplemental appropriations to respond to Zika in 2016, Ebola in 2014, and H1N1 pandemic influenza in 2009. However, as mentioned above, officials also said that the timing of these awards can result in challenges to carrying out preparedness and response activities during infectious disease threats. HHS officials, as well as all 10 selected non-federal stakeholders, also noted in May 2018 that a funding mechanism to fund rapid response activities when additional support is needed would be beneficial and could help address timing challenges. However, we reported that concerns were also raised about (1) when such a mechanism for funding infectious disease threats should be used, and (2) that any type of emergency fund should not be used to make up for a lack in investments at all levels of government for current preparedness and capacity-building activities. We did not make recommendation as part of this work. However, part of our May 2018 reporting included perspectives from various stakeholders on such a fund. Stakeholders cited six factors that may be considered for a new emergency response fund: (1) who determines when to use an emergency fund, (2) what factors would trigger the use of an emergency fund, (3) methods to determine the amount of available funding, (4) activities to fund with an emergency fund, (5), accountability for use of an emergency fund, and (6) whether an emergency fund would be specific to infectious disease threats. The National Biodefense Strategy and its interagency governance structure offer the opportunity to design new approaches to identifying and building a core set of surveillance and response capabilities for emerging infectious diseases. However, it is too early into implementation to determine how effective, if at all, the new strategy will be in addressing this challenge. How and to what extent implementation of the Strategy is able to efficiently leverage and effectively sustain capacity across both nonfederal and federal stakeholders will affect how prepared the nation is to more quickly gear up for whatever challenges emerge when outbreaks of previously non-endemic diseases threaten the nation. Thank you, Chairman Lynch, Ranking Member Hice, and Members of the Subcommittee. This concludes my prepared statement. I would be happy to respond to any question you may have at this time. If you or your staff has any questions concerning this testimony, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this statement include Kathryn Godfrey (Assistant Director), Susanna Kuebler (Analyst-In-Charge), Nick Bartine, Jeffrey Cirillo, Michele Fejfar, Eric Hauswirth, Tracey King, Dawn Locke, and Adam Vogt. Key contributors for the previous work that this testimony is based on are listed in each product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Catastrophic biological events have the potential to cause loss of life, and sustained damage to the economy, societal stability, and global security. The biodefense enterprise is the whole combination of systems at every level of government and the private sector that contribute to protecting the nation and its citizens from potentially catastrophic effects of a biological event. Since 2009, GAO has identified cross-cutting issues in federal leadership, coordination, and collaboration that arise from working across the complex interagency, intergovernmental, and intersectoral biodefense enterprise. In 2011, GAO reported that there was no broad, integrated national strategy that encompassed all stakeholders with biodefense responsibilities and called for the development of a national biodefense strategy. In September 2018, the White House released a National Biodefense Strategy. This statement discusses GAO reports issued from December 2009 through March 2019 on various biological threats and biodefense efforts, and selected updates to BioWatch recommendations made in 2015. To conduct prior work, GAO reviewed biodefense reports, relevant presidential directives, laws, regulations, policies, strategic plans; surveyed states; and interviewed federal, state, and industry officials, among others. GAO's past work has identified a number of challenges related to the nation's ability to detect and respond to biological events that transcend what any one federal department or agency can address on its own. They include, among others: Assessing enterprise-wide threats. In October 2017, GAO found there was no existing mechanism across the federal government that could leverage threat awareness information to direct resources and set budgetary priorities across all agencies for biodefense. GAO said at the time that the pending biodefense strategy may address this. Situational awareness and data integration. GAO reported in 2009 and 2015 that the Department of Homeland Security's (DHS) National Biosurveillance Integration Center (NBIC)—created to integrate data across the federal government to enhance detection and situational awareness of biological events—has suffered from longstanding challenges related to its clarity of purpose and collaboration with other agencies. DHS implemented GAO's 2009 recommendation to develop a strategy, but in 2015 GAO found NBIC continued to face challenges, such as limited partner participation in the center's activities. Biodetection technologies. DHS has faced challenges in clearly justifying the need for and establishing the capabilities of the BioWatch program—a system designed to detect an aerosolized biological terrorist attack. In October 2015, GAO recommended that DHS not pursue upgrades until it takes steps to establish BioWatch's technical capabilites. While DHS agreed and described a series of tests to establish capabilities, it continued to pursue upgrades. Biological laboratory safety and security. Since 2008, GAO has identified challenges and areas for improvement related to the safety, security, and oversight of high-containment laboratories, which, among other things, conduct research on hazardous pathogens—such as the Ebola virus. GAO recommended that agencies take actions to avoid safety and security lapses at laboratories, such as better assessing risks, coordinating inspections, and reporting inspection results. Many recommendations have been addressed, but others remain open, such as finalizing guidance on documenting the shipment of dangerous biological material. In September 2018, the White House issued the National Biodefense Strategy and associated plans, which could help to address some of the ongoing challenges GAO has previously identified. However, because implementation of the strategy is in early stages, it remains to be seen how or to what extent the agencies responsible for implementation will institutionalize mechanisms to help the nation make the best use of limited biodefense resources. GAO is currently reviewing the strategy and will report out later this year. GAO has made numerous agency recommendations in its prior reports designed to address the challenges discussed in this statement. As of June 2019, agencies have taken steps to address many of these, and GAO is monitoring ongoing efforts.", "document_type": "gao"}
{"report": "Over the next 10 years, the Navy plans to continue developing critical technologies, complete detail design, and begin construction of the lead Columbia class submarine. In December 2017, we found that the schedule to deliver the lead submarine was aggressive, with extensive overlap—or concurrency—between development, design, and construction, as shown in figure 1. Our prior work reviewing shipbuilding programs has shown that the programs with the greatest amount of overlap between shipbuilding phases often have the highest cost and schedule growth, as well as quality and performance issues. The National Defense Authorization Act for Fiscal Year 2018 included reporting requirements for the Columbia class program. As part of these annual reporting requirements, the Navy must submit to Congress matrices that identify (1) key milestones, events, and performance goals for the design and construction of the Columbia class program; and (2) costs associated with the design and construction period of the Columbia class program. The Navy submitted its initial matrices to Congress in February 2018 and an update to the matrices in October 2018. The next matrices update is due in March 2019 and annually, thereafter, until the lead Columbia submarine is delivered. The Navy is developing a number of new technologies related to submarine propulsion, missile tubes, and survivability that are planned to ensure that the Columbia class will remain operationally relevant throughout its planned 42.5-year service life, as shown in figure 2. In 2015, as part of its technology readiness assessment, the Navy identified two technologies—the advanced carbon dioxide removal unit and the stern area system—as critical technology elements. However, as we found in 2017, several Columbia class technologies that met GAO’s definition of a critical technology element were not identified by the Navy as critical technologies. In addition, several of these were immature, with technology readiness levels (TRL)—used to describe the maturity of critical technologies—of less than 7. See appendix II for a description of TRLs. As part of its matrices to Congress, the Navy is required to report on the TRLs of the integrated power system, nuclear reactor, propulsor, coordinated stern features, stern area system, and common missile compartment—which are the critical technologies we identified in our prior report. Table 1 lists each GAO-identified critical technology and its TRL as of October 2018, as reported by the Navy. Two shipbuilders—General Dynamics Electric Boat (Electric Boat) and Huntington Ingalls Industries Newport News (Newport News)—design and build nuclear submarines. Electric Boat is the prime contractor for both design and construction of the Columbia class program, with Newport News serving as a subcontractor. Similar to the Virginia class program, each shipbuilder will construct segments of the submarine, but Electric Boat will complete final outfitting and deliver the submarines to the Navy. The Navy awarded a detail design contract in September 2017 to Electric Boat for work including completion of the submarine’s design, component and technology development, and prototyping efforts. The detail design process for the Columbia class program encompasses three activities, which began after the Navy set the technical requirements for the submarine in 2016: Arrangements outline the steel structure and routes distributive systems—such as electrical or piping systems—throughout the submarine. At this time, the shipbuilder generates a three-dimensional computer-aided design model for the area. Disclosures complete the design work for even the lowest-level items of the submarine, including material information. After these are completed, the shipbuilder can begin ordering material and long lead items for the submarine. Work instructions are three-dimensional electronic products that shipyard workers use to construct the submarine. Figure 3 illustrates the design phases for the Columbia class program. The shipbuilder will design and construct Columbia class submarines in six large hull segments, referred to as super modules, a method also used to construct most of the Virginia class submarines. During construction, the modules will largely be outfitted with systems and connections prior to being attached together during final assembly. According to the shipbuilder, this method is more efficient than outfitting the hull after it is constructed because more workspace is available to install equipment. Figure 4 illustrates the super modules within the submarine. A reliable cost estimate is critical to program success. It provides the basis for informed investment decision making, realistic budget formulation and program funding, meaningful progress measurement, proactive course correction when warranted, and accountability for results. GAO’s Cost Estimating and Assessment Guide states that reliable cost estimates reflect four characteristics, which encompass 19 best practices. These characteristics—comprehensive, well documented, accurate, and credible—are shown in table 2. For Navy shipbuilding programs, including the Columbia class, several different entities are involved in cost estimating: The Naval Sea Systems Command (NAVSEA) Cost Engineering and Industrial Analysis Group develops the program life-cycle cost estimate, which is an estimate accounting for the total cost to the government of acquisition and ownership of a system over its full life. NCCA develops an independent cost assessment for certain Navy programs, such as the Columbia class program, at milestone events in the defense acquisition system. This assessment is not a separate estimate, but rather a review of the NAVSEA program life-cycle cost estimate. A cost review board, comprised of multiple Navy offices, establishes a service cost position based on their review of the program life-cycle cost estimate and the independent cost assessment. The Office of the Secretary of Defense’s CAPE conducts or approves independent cost estimates for major defense acquisition programs. Independent cost estimates are statutorily required for major defense acquisition programs at milestone events. The milestone decision authority, which in the case of the Columbia class program is the Under Secretary of Defense for Acquisition and Sustainment, reviews the service cost position and independent cost estimate and selects the cost estimate to baseline and fund the program. The most recent milestone event for the Columbia program was the Milestone B decision in January 2017, where the program received approval to proceed to the next acquisition phase—engineering and manufacturing development, which includes detail design of the lead submarine. In a memo documenting that decision, the milestone decision authority noted that significant development risks remain for the Columbia program and cost control must remain a priority. To limit program cost growth, the milestone decision authority established an affordability cap: the average submarine procurement cost should not exceed $8.0 billion in constant year 2017 dollars. Figure 5 summarizes the cost estimating process for the Columbia class program’s Milestone B review. The Navy is attempting to mitigate an aggressive schedule for lead submarine construction by (1) setting a goal to mature a significant amount of the submarine’s design prior to the start of construction and (2) beginning advance construction of submarine modules prior to October 2020. The shipbuilder is working to improve design performance and would have to maintain this increased pace to achieve its design goal, which is necessary to mitigate schedule risk associated with constructing the lead submarine. This may prove challenging as it must complete an increasingly higher volume and complexity of design products. At the same time, the Navy is continuing to develop several critical technologies and recent manufacturing defects with the integrated power system and missile tubes are among the challenges that the Navy is facing in ensuring timely delivery of critical components to the shipyard. Finally, to achieve Columbia’s aggressive construction schedule, while simultaneously building Virginia class submarines, the shipbuilder is working to ensure that it has sufficient shipyard capacity—including new facilities, additional suppliers, and an increased workforce. The shipbuilder has failed to achieve its planned rates for completing design arrangements and disclosures to meet its design maturity goal in recent months—hampered by implementation of a new design software tool and an insufficient number of designers to meet monthly design completion rates. As we reported in December 2017, the Navy’s priority is to complete a high level of design—specifically, 100 percent of design arrangements and 83 percent of design disclosures—by the start of lead submarine construction in October 2020. By maturing the design before beginning construction on the lead submarine, the Navy is attempting to mitigate the risk of costly rework from design changes and subsequent delays to the Columbia class program’s 84-month construction schedule, which the Navy has acknowledged is aggressive. The Navy established the design maturity goal for Columbia based on lessons learned from the Virginia class program, when the shipbuilder began constructing the lead submarine with only 76 percent of arrangements and 43 percent of disclosures completed and, subsequently, realized 21 percent cost growth. Since the shipbuilder began work on the detail design, it has generally met its overall goal of completing the arrangements on schedule. As detail design continues, however, the shipbuilder is transitioning from relatively simple designs for the hull to the more complex designs for the submarine’s internal systems, increasing the pace needed to complete the remaining designs, as shown in figure 6. Navy officials stated that design disclosures are generally considered the most challenging phase of design work, where the shipbuilder specifies the lowest-level items and defines all aspects of the submarine. The shipbuilder has to maintain this increased pace in order to achieve the design maturity goal by the start of lead submarine construction. However, the shipbuilder’s design progress in completing disclosure products has fallen short of its plan in recent months as the planned pace and complexity of the design has increased. Using data from the program’s cost performance reports, we analyzed the shipbuilder’s monthly design progress according to a schedule performance index that measures the value of the work completed against the work scheduled. For example, if the schedule performance index is less than 1.00, then the shipbuilder has completed less than a dollar’s worth of work for each dollar that was scheduled. As shown in figure 7, since January 2018, schedule performance has consistently fallen below 1.00. Both DOD and Navy officials attributed the shipbuilder’s design delays to challenges adapting to a new design software tool. Beginning with the Columbia class program, the shipbuilder transitioned to a new customized software tool for design and construction because its prior software was no longer supported by the original developer. However, the shipbuilder has experienced problems developing the tool, which has resulted in slower progress to complete both design arrangements and disclosures, as certain aspects of the software’s functionality were delayed. Navy officials stated that, as of June 2018, they believe that design software functionality was performing at a level that no longer impeded design progress. While the designers have gained proficiency with the new design tool to complete arrangements and disclosures, according to Navy officials, the shipbuilder is now facing similar challenges using the tool to generate work instructions. Navy program officials also stated that the shipbuilder has not delivered some of the software functionality needed to produce work instructions as scheduled. Further, Navy officials noted that the process to create work instructions from completed disclosures takes longer with the new design software so the shipbuilder has begun generating work instructions earlier. According to Navy officials and shipbuilder representatives, the shipbuilder hired 150 additional designers in an effort to recover its design schedule and meet future monthly design goals. However, adding designers to recover and maintain the shipbuilder’s design schedule ultimately increases the program’s design costs. Similar to the schedule analysis above, we used data from cost performance reports to analyze the shipbuilder’s monthly design progress according to a cost performance index that measures the budgeted value of the work completed against what it actually costs to complete it. For example, if the cost performance index is less than 1.00, then less than a dollar’s worth of work has been completed for each dollar spent. As shown in figure 8, the shipbuilder’s cost performance has consistently fallen below 1.00 since December 2017. If the shipbuilder cannot address challenges associated with using the software tool to generate work instructions discussed above, it will likely need additional design hours in the future, resulting in higher costs in order to mature the design on schedule. Navy officials and shipbuilder representatives expect to mitigate risks associated with the Columbia construction schedule by accelerating the building of certain components more than a year in advance of the formal start of construction. They anticipate that this advance construction strategy will allow them to gain 2 months of schedule margin for final assembly and testing prior to delivery of the lead submarine. Starting in December 2018, the shipbuilder will begin constructing modules of the submarine as part of its advance construction effort. In 2017, we reported that the Navy had planned to begin advance construction for four of the submarine’s six super modules, but since our report was issued, it now plans to begin construction on all six super modules including building components like the stabilizers, impulse tanks, and others. Figure 9 shows the start of advance construction for each super module. Navy officials estimate that the current advance construction efforts will require approximately 631,000 labor hours. In addition, advance construction efforts would require that the Navy accelerate delivery of equipment provided to the shipbuilder for installation on the submarine, such as pumps and valves. Shipbuilder representatives stated that a lesson learned from the Virginia class program was that construction of certain complex components should begin as early as possible if capability requirements and designs are stable. However, based on its plan, the shipbuilder will begin advance construction having completed less than 40 percent of the total design disclosures for the Columbia class submarine, as shown in figure 10. The number of disclosures completed at the start of advance construction is less than half of those the shipbuilder plans to complete by the start of lead submarine construction in October 2020. Navy officials stated that they believe the risk associated with beginning construction with a less mature overall design is mitigated because the program selected components for advance construction that are well understood and unlikely to be affected by design changes, like ballast tanks, decking, and hull segments. In addition, Navy officials stated that they will not begin construction on the component or hull unless the arrangements associated with the structure of that area of the submarine are complete. However, based on the shipbuilder’s design plans, the arrangements and disclosures of adjoining areas of the super module may not be complete, which could negatively affect construction. Specifically, the shipbuilder’s design plans indicate that it will have completed 100 percent of disclosures for only one super module at the start of advance construction. As we have found in our prior work, proceeding with construction despite having completed fewer designs than planned increases the likelihood of design changes later that may, in turn, require costly and time-intensive re-work to change components that have already been built. Shipbuilder representatives acknowledged that there is risk in starting construction of some components prior to completing the design for individual super modules or the entire submarine. However, shipbuilder representatives stated that they believe this risk is reduced by only starting construction on components for which the disclosures are complete. While ship design is underway, the Navy is continuing to develop and mature the critical technologies related to the Columbia class program. While these critical technologies are not required at the shipyard for several years, recent challenges have eroded available schedule margin, as illustrated below: Integrated Power System: In 2017, we reported that the Navy experienced manufacturing problems associated with the integrated power system. We found that the Navy continues to experience problems with the electric drive of the integrated power system that could potentially affect construction of the lead submarine. A manufacturing defect that affected the system’s first production- representative propulsion motor required extensive repair that consumed 9 months of schedule margin at the land-based test facility. The Navy now plans to test the motor at the same time it had originally scheduled to make any final design changes before starting production. This could constrain opportunities to implement timely, corrective actions if problems are discovered during testing. Common Missile Compartment: Navy officials stated that, in July 2018, the shipbuilder identified substantial weld defects in missile tubes from one of three tube suppliers and resulted in investigations of the missile tubes from all suppliers. These defects were discovered after seven tubes in various stages of outfitting had already been delivered to the shipyard and five additional tubes under production have been affected. Navy program officials stated defects occurred because inexperienced welders performed the complex work and inspectors at the supplier’s facility subsequently failed to identify the defects. While the Navy and shipbuilder are still determining the cost and schedule impacts of the weld defects, program officials estimated that addressing this issue will consume up to 15 of the 23-month schedule margin for these components. In addition, program officials stated that the Navy likely will be responsible for some of the cost associated with investigating the root cause of the defects and risk mitigation efforts going forward. Given the erosion of available schedule margin, there is less time available to address issues without resulting in schedule delays. For example, the shipbuilder’s construction plans for two super modules do not include schedule margin to accommodate any delays that may occur as the technologies are matured and detail design is completed. One of these, the stern super module contains three technologies that are not fully mature—the integrated power system, stern area system, and advanced propulsor bearing. The integrated power system is not expected to reach full maturity until October 2019 and the remaining two technologies will not be mature until after the shipbuilder begins construction on the lead submarine, not including those components that begin advance construction years earlier. Without schedule margin to accommodate any changes or issues, any delays in delivering equipment to the shipyard on time could disrupt the shipbuilder’s construction sequence for the lead submarine. To meet the Navy’s aggressive construction schedule for the lead submarine, the shipbuilder has to ensure that it has the capacity to meet a substantially higher workload and effectively balance Columbia and Virginia class construction. At the same time as construction on Columbia begins in 2020, the shipbuilder will also have begun constructing two modified Virginia class attack submarines per year. To accommodate the construction of both submarine classes, the shipbuilder is planning an extensive expansion of its facilities, including new buildings, a pier, an ocean transport barge, and a floating dry dock. The anticipated increases in workload at the shipyard will also require the shipbuilder to manage a higher volume of build materials and an expansion of its workforce. While construction of new facilities is progressing on schedule, according to shipbuilder representatives, it faces other challenges preparing for Columbia class construction. Achieving the planned construction schedule will require the Navy and shipbuilder to ensure that materials arrive on time and meet quality expectations, but according to Navy officials, supplier oversight has been a challenge for this shipbuilder in the past. Both Navy officials and shipbuilder representatives stated that they are concerned about the capacity of its suppliers to meet the demand for high-quality components given an industrial base that has diminished significantly since previous major submarine construction efforts in the 1980s. Many of the parts and equipment on Columbia class are common with those used on Virginia class submarines but, in other instances, suppliers are producing components for the first time after a considerable break, such as missile tubes that have not been produced since the early 1990s. Navy program officials and shipbuilder representatives stated that they monitor supplier capacity and quality—among other areas—and they have several methods to intervene if a supplier is not able to perform as needed. The shipbuilder and the Navy have formed a group to assess the three primary areas of supplier performance: Capability: includes the uniqueness of the supplier’s product on the market, challenges in shifting to a different supplier due to intellectual property rights or technical knowledge, and the ability for the supplier to sustain their own supply base. Capacity: includes the supplier’s ability to increase production without decreasing quality, maintain that capacity over the program’s production, their financial dependence on Navy programs for revenue, lead time needed to meet new orders, and the capacity of their own suppliers. Cost: includes the costs of increasing production spread out across demand from Navy programs. In 2017, the shipbuilder assessed its supplier base using these areas, identified the criticality and risk of each supplier based on their potential impact to the program and potential alternate suppliers, and conducted a gap analysis comparing the supplier’s current performance to the program’s desired performance. Based on the results of the analysis, the shipbuilder identified and is monitoring at-risk suppliers in coordination with the Navy to determine if immediate intervention is needed, such as investing in new facilities for the supplier, improving manufacturing workflow, or finding new sources of material from that supplier. Despite these efforts, supplier oversight remains an issue, because—in the instance of the missile tube welds mentioned above—the shipbuilder focused on managing certain anticipated risks, as opposed to actively managing the supplier’s quality and performance with on-site independent inspections, according to Navy officials. In response to the missile tube issues, the shipbuilder has proposed additional supplier oversight by assessing the need for on-site inspection teams depending on the risk each supplier poses to the program. Navy officials stated that they have begun some assessments but, as of March 2019, had yet to determine who will pay for this additional oversight. We plan to more fully assess the Navy and shipbuilder’s oversight of its suppliers for the Columbia class program in future work. According to shipbuilder representatives, the start of lead submarine construction for the Columbia class, combined with expanding Virginia class construction, increases the demand for hiring and retaining skilled workers at levels not seen at this shipyard since the 1980s. Navy officials expressed concerns about the risk of adding large numbers of new workers, including an influx of inexperienced welders and inspectors— issues that also contributed to the defects in missile tubes discussed above. To support growing workload from both the Columbia and Virginia submarine programs, the shipbuilder plans to increase workforce at its two facilities over the next decade: by 66 percent at Quonset Point, Rhode Island—where the components and individual submarine modules will be constructed—and 174 percent at Groton, Connecticut—where the super modules will undergo final outfitting and assembly. To meet this increased demand in a skilled workforce, the shipbuilder assessed future demographic trends in the area surrounding its facilities and found that, while sufficient labor will likely be available, more training will be necessary. Consequently, the shipbuilder established internal and external training programs and partnerships with educational institutions in the area to grow the qualified workforce in time to begin lead submarine construction in October 2020. The influx of inexperienced workers can temporarily decrease construction efficiency as compared to a current, more experienced workforce. For example, when the Virginia class program expanded its workforce to build a second submarine each year, the addition of new staff contributed to an 8 percent decrease in cost efficiency for the program. Shipbuilder representatives at one production facility have already reported reduced efficiency following increased hiring of new workers. The shipbuilder’s goal is to maintain an average of 8 years of experience for workers in core trades, such as welding. However, the shipbuilder’s projections show that the new workforce ramp-up at the Groton facility will reduce workers’ average experience from 13.1 years to a low of 5.6 years in 2028—just after the shipbuilder plans to deliver the lead Columbia class submarine. If workforce growth or efficiency assumptions are not met, the shipbuilder may resort to scheduling overtime work or outsourcing some activities to meet the program’s construction schedule, which would have cost impacts for the program. The Navy’s procurement cost estimate of $115 billion to construct Columbia class submarines is not reliable because it does not reflect likely program costs and risks. We assessed the Columbia class cost estimate by comparing it with the best practices identified in GAO’s Cost Estimating and Assessment Guide. We found that it substantially met the criteria for the comprehensive characteristic of a reliable cost estimate, and partially met the criteria for the remaining characteristics, including accurate and credible. In particular, we found that the cost estimate does not accurately reflect program costs because it is based on overly optimistic labor hour assumptions, and is not fully credible because while the Navy conducted risk and sensitivity analyses to test the likelihood of achieving its assumptions, it selected a specific cost estimate that informs the program’s budget which does not include any margin in case those assumptions are not achieved. In addition, the cost estimates and assessments conducted by other entities produced a range of results, indicating that there is a high degree of uncertainty regarding program costs. See appendix III for the full results of our assessment of the Navy’s cost estimate. Navy officials stated they plan to update the Columbia class cost estimate in support of DOD’s decision to authorize construction of the lead submarine and this decision is expected to occur in summer 2020. Navy officials also stated that they expect that the cost estimate will be complete by the end of fiscal year 2019, followed by an independent cost assessment to support the authorization decision. However, this timeframe does not provide assurance that both the update and the independent assessment will be complete before the Navy requests funding from Congress for lead submarine construction, as part of its fiscal year 2021 budget request, which could be submitted as early as February 2020. If so, decision makers may be basing their decisions on outdated or incomplete information. The Columbia class cost estimate relies on optimistic program assumptions and does not reflect the likely labor hour costs that the Navy will incur to construct the submarines. As part of our assessment of the Columbia program cost estimate, we found that it did not fully meet the best practices for an accurate estimate. A cost estimate is considered accurate when it is based on an assessment of the most likely costs—that is, it is neither overly conservative nor overly optimistic. The Navy estimates that it will need $115 billion to design and construct 12 submarines and NAVSEA cost estimators identified labor costs as a primary source of cost risk. As discussed below, if the program’s optimistic assumptions are not realized, the program may require more funding than originally planned to construct the Columbia class. The Navy anticipates that it will need 12 million labor hours to directly construct the lead submarine—referred to as touch labor. This represents 17 percent fewer labor hours than what was needed for the lead Virginia class submarine, when adjusted for weight differences. To develop this estimate, NAVSEA estimators relied heavily on historical touch labor hour data from the construction of the lead Virginia class submarine and cost data from the Ohio class submarine program for unique ballistic submarine components, such as missiles. NAVSEA estimators took the following steps to develop the Columbia lead submarine estimate: In general, heavier ships cost more to construct, so NAVSEA cost estimators calculated a weight-adjusted estimate based on Virginia class labor hours to account for the heavier weight of the Columbia class. This resulted in an initial estimate of 14.5 million touch labor hours for the lead submarine. NAVSEA cost estimators then made numerous adjustments in the cost estimate that reduced the expected number of labor hours based on multiple assumptions that differences in the design and construction process would lead to more efficient construction of Columbia class submarines than previous submarine classes. These adjustments subsequently decreased the estimate to 12 million touch labor hours for the lead submarine. NAVSEA cost estimators then used the lead Columbia submarine estimate as the basis to calculate labor hours for follow-on submarines, estimating an average of 8.9 million touch labor hours. Figure 11 illustrates NAVSEA’s touch labor hour calculation for the lead submarine. However, the touch labor hour estimate is overly optimistic—with assumptions on construction efficiencies that are either unsubstantiated or unprecedented compared to Virginia class and other shipbuilding historical data. Compared to the Navy’s estimate, Columbia’s estimated touch labor hours, as calculated by other organizations, are more conservative. For example, CBO questioned the Navy’s assumption that ballistic submarines are less expensive to build than attack submarines, after accounting for weight differences and estimated that for the overall class, including the lead and follow-on submarines, the Navy would more likely realize an 8 percent reduction rather than the 19 percent reduction estimated by the Navy. While the shipbuilder will likely realize some efficiencies from initiatives to improve design and construction processes, our analysis of the Navy’s assumptions used to develop the cost estimate indicates that they likely overstate the labor hour reduction the shipbuilder can realistically achieve. These assumptions include that the program (1) achieves its design goals at the start of construction; (2) is constructed more efficiently than Virginia class submarines; and (3) successively reduces the number of hours needed to construct follow-on submarines. If these assumptions are not realized, overall program costs could be higher than the Navy’s procurement estimate of $115 billion. Navy officials stated that they believe that these assumptions are valid and that the cost estimate is achievable. However, our assessment indicates that the assumptions for the cost estimate are overly optimistic, as discussed below. The Navy’s cost estimate does not reflect the risk that the shipbuilder may not achieve its planned design completion goals. As we reported above, design performance to date has slowed and the shipbuilder has had to hire additional designers in an effort to mature its design on schedule. NAVSEA cost estimators stated that they recognize that an incomplete design at the start of ship construction was a significant driver of cost growth on other shipbuilding programs. For the Columbia class, NAVSEA cost estimators assumed that achieving the design maturity goal would eliminate 2 million labor hours by reducing costs associated with rework and out of sequence work. In October 2018, NCCA officials stated that they recently reviewed shipbuilder data and the expected design completion at construction start continues to range between 55 and 75 percent complete—the same range that they estimated in their independent assessment. While this lower rate would be an improvement over the Virginia class program, it would still fall short of the 84 percent assumption built into the cost estimate. If the shipbuilder does not complete the design at its planned rate and begins construction with a less mature design, it may need additional labor hours to construct the ship, resulting in increased program costs. The Navy’s cost estimate includes assumptions that reduce Columbia’s estimated touch labor hours due to efficiencies from constructing Columbia and Virginia class submarines concurrently, an assumption with which the shipbuilder does not agree. NAVSEA cost estimators calculated a 1.1 million-labor hour reduction, attributing the decrease to efficiencies gained from constructing multiple submarines at the same time, basing their assessment on shipbuilder estimates of the Virginia class. However, it is unclear how increased shipyard production would result in fewer labor hours to construct each submarine. Shipbuilder representatives stated that rather than a reduction in touch labor hours, they expect to realize efficiencies from increased production primarily from reduced overhead rates and material costs. Further, the Navy’s independent assessment analyzed labor hour data for Virginia class construction and found that there was no correlation between the number of submarines constructed at a time and the total number of labor hours. However, increasing shipyard production to include both Virginia and Columbia class construction may increase schedule risk for the shipbuilder, which could result in additional costs if the shipbuilder does not achieve planned increases in its workforce and facility upgrades. When the number of Virginia class submarines under construction increased, both shipyards experienced inefficiencies due to poorly planned ramp-up requirements. In addition, DOD officials stated that problems encountered on one program could affect the other as the shipbuilder is relying on the same workforce and vendor base for both programs. The Navy’s cost estimate also assumed construction efficiencies— because the Columbia class submarine will be less dense than the Virginia class submarine—another assumption with which the shipbuilder does not agree. Navy officials stated that less dense submarines are less costly to construct as the additional space within the hull allows for faster and more efficient work. However, the shipbuilder conducted analysis to compare the density of various areas of the Virginia class and Columbia class submarines and found that areas had very similar density. Specifically, there was only a 1 percent and 3 percent difference, between the forward compartments and aft compartments, respectively—some of the more complex areas of the submarine. If the shipbuilder does not realize these construction efficiencies, more total labor hours would be required to construct the submarine, resulting in increased cost. The Navy’s cost estimate assumes that the costs for follow-on Columbia class submarines will decrease at a rate that may overstate the improvements the shipbuilder can realistically achieve. The Navy expects the number of labor hours to construct Columbia class follow-on submarines to decrease based on an assumed learning curve rate. Learning occurs when construction is consistent and continuous and the shipbuilder learns how to do repetitive tasks more efficiently. The decrease in the number of expected labor hours is expressed as a learning curve rate, where a lower percentage indicates that less labor is required for follow-on units. NAVSEA cost estimators calculated a learning curve of 88.9 percent for Columbia class submarines. A learning curve indicates that as the number of units doubles, unit cost decreases by a constant percentage. In this case, the cost estimate assumed that the fourth submarine would require only 88.9 percent the amount of labor to build the second submarine. NAVSEA’s assumption may overstate the potential learning rate that Columbia can expect to achieve. The first four Virginia class submarines, hull numbers SSN 774 through 777, incorporated modular construction techniques where submarines were built in 10 modules. The next six Virginia class submarines, hull numbers SSN 778 through 783, were constructed using four modules. As a result of the improvements in the modular construction process, construction across the first ten submarines was not consistent, which is a condition that is necessary to determine the learning curve rate. Therefore, there is no way to determine what share of the labor hour reduction on later submarines was due to learning or process improvements. Rather, SSN 778, the first Virginia class submarine to use the four modular construction approach is a better starting point to determine the shipbuilder’s capacity for learning. The Navy’s independent assessment included a separate learning curve analysis for Virginia class submarine hulls SSN 778 through 791 and calculated a potential learning curve rate of 93.9 percent. A learning curve assumption applies to all follow-on submarines and has a cumulative effect on the number of labor hours and, ultimately, the cost of these submarines. In the case of the Columbia program, the rate will apply to the second through twelfth submarines. Figure 12 shows how the difference in the learning curve rate can affect the estimated labor hours for follow-on submarines. Therefore, a small change in the assumed learning curve rate can have a significant effect on the cost estimate for follow-on submarines. For example, the Navy’s independent assessment of the cost estimate calculated that production costs could increase by $3.59 billion in constant year 2010 dollars if a learning curve of 93.9 percent was realized, rather than the 88.9 percent rate estimate. Our previous work on Navy shipbuilding performance has shown that the Navy has consistently underestimated the costs for follow-on ships, with costs for Virginia class submarines underestimated by close to 40 percent. The Columbia program cost estimate did not fully meet the best practice criteria to be considered credible because, in part, Navy program management did not sufficiently account for program risks when it selected the final estimate. To determine the estimate’s credibility, we examined the extent to which NAVSEA cost estimators tested, among other things, the sensitivity of key cost elements such as labor hours and conducted uncertainty analyses to quantify risks; and an independent cost estimate and assessment were conducted by groups outside the acquiring organization (specifically, CAPE and NCCA) to determine whether other estimating methods produced similar results. We found that while the Navy program management’s $115 billion procurement cost estimate for the Columbia class is overly optimistic in some of its assumptions, the estimate does not reflect any contingency to offset the likely effects of not meeting the assumptions, which is a best practice. In addition, the independent cost estimates and assessments conducted by other organizations had varying results, indicating the high level of uncertainty regarding Columbia program costs. We further address these issues below. Navy leadership’s decision to select $115 billion as the program cost estimate means that there is no margin in the program budget to cover likely program costs if risks are realized. The best practices identified in GAO’s cost estimating guide state that the results of a risk analysis should be used to select a cost estimate that is sufficient to manage program risks. NAVSEA cost estimators conducted a risk analysis to identify and quantify program risks, and determined the effects of changing key cost driver assumptions and factors—important steps in creating a high quality estimate. However, while NAVSEA cost estimators identified 54 risk parameters for construction costs, we found that some of the inputs for these ranges resulted in a cost estimate that understates the potential impact of program cost risks. For example, the risk ranges do not sufficiently account for the issues we identified above, including that increased shipyard construction could result in similar inefficiencies that occurred in the production of the Virginia class, requiring more labor hours than estimated; and shipbuilder workforce ramp-up could result in decreased efficiency and quality due to the influx of new workers even greater than the issues observed on the Virginia class when shipyard construction increased. For other risk parameters, such as cost of material provided by the shipbuilder, the cost estimate documentation was not sufficient for us to analyze whether the risk ranges included in the estimate were reasonable (i.e., not overly optimistic or pessimistic). As a result, we could not determine whether the risk analysis sufficiently captures the risk of program cost growth, or what the probability is of achieving the $115 billion procurement cost estimate. Further, Columbia’s program management and the milestone decision authority selected $115 billion as the program’s procurement cost estimate, without adjusting for the likelihood of cost growth in the design or construction of Columbia class submarines identified in the risk analysis. As we reported in December 2017, the risk analysis developed by NAVSEA indicated that there is only a 45 percent probability that the overall program cost estimate will be sufficient to cover program costs. The cost estimating best practices identified in our cost estimating guide state that a risk-adjusted cost estimate helps ensure that sufficient funding will be available for the expected program costs. Additionally, a risk-adjusted cost estimate is consistent with federal internal control standards, which indicate that risk mitigation efforts should be selected to sufficiently respond to risks. However, Columbia program officials stated that they believe program risks can be managed within the current cost estimate—which they consider to be conservative—as it does not account for all of the program’s potential cost savings. Specifically, the Navy anticipates that the program will realize up to $1.9 billion in additional cost savings from use of authorities associated with the National Sea-Based Deterrence Fund (the Fund), such as the authority to purchase components for multiple submarines—which we discuss later in this report. As a result, the program office estimate represents the program manager’s cost goal for the Columbia program, rather than the risk- adjusted estimate. Even if the Navy were to achieve the full anticipated $1.9 billion savings, these savings represent only 1.5 percent of program costs. Such cost savings are unlikely to cover program cost overruns for a high-risk program, such as Columbia, given that historically shipbuilding programs experience 27 percent cost growth. As the current estimate does not include any reserves for cost overruns, program management is relying on these potential savings to help mitigate likely cost growth. Several entities have conducted independent reviews of the Columbia program cost estimate, with varying results. CAPE conducted an independent cost estimate and NCCA conducted an independent cost assessment of the program estimate in support of the Columbia class program’s Milestone B review. CAPE’s independent cost estimate was 3 percent lower than the Navy’s service cost position, which it stated was due to CAPE’s use of lower shipyard labor rates. However, NCCA’s assessment did not produce similar results as the program cost estimate and concluded that the program is at risk of up to $6.14 billion in cost growth. The program manager reviewed the recommendations in the independent cost assessment and determined that the program office estimate appropriately weighs program risks. Navy leadership selected the program office estimate to serve as the Navy’s service cost position because program officials stated that they believe program risks can be managed within the program cost estimate. CBO also conducted a cost estimate and projected that procurement of 12 submarines would be 6 percent higher than the program estimated. The results of these cost estimates and NCCA’s assessment are summarized in table 3. As part of the Milestone B review, the milestone decision authority reviewed the service cost position and CAPE’s independent cost estimate. The independent cost assessment was reviewed by Navy leadership as part of the service cost position process and, therefore, was not briefed as part of the milestone review. The milestone decision authority accepted the Navy service cost position and directed the Navy to use this estimate as the basis of its fiscal year 2018 budget request. It also established an $8 billion affordability cap for the average procurement cost of all 12 submarines to control future program costs. Navy officials stated that they plan to update the cost estimate for the lead submarine in support of a planned Defense Acquisition Board review, in the third quarter of fiscal year 2020. At that point, the Navy will be seeking approval from the milestone decision authority to award the contract for construction of the lead submarine. However, the Navy and DOD’s general timeframes do not provide assurance that the planned update of the cost estimate would be completed prior to the fiscal year 2021 budget request, which will include funding for lead submarine construction, as shown in figure 13 below. The milestone decision authority has directed CAPE, with assistance from NCCA, to assess the lead submarine cost estimate to support the decision to authorize the Navy to award the contract for lead submarine construction. Since this assessment will occur after the Navy has updated the lead submarine cost estimate, it is even less likely that the program budget request will reflect the results from the independent cost assessment. Additionally, the current program cost estimate the Navy developed for the Milestone B review does not reflect the program’s current strategy to use authorities associated with the Fund to achieve cost savings, as discussed further below. The best practices identified in GAO’s cost estimating guide state that cost estimates should be regularly updated and reflect the program acquisition baseline. Updating the cost estimate and risk analysis to include these anticipated savings and current program data would improve its reliability and help ensure that budget requests are sufficient to execute the Columbia program as planned. After we provided our draft report to DOD for comment, Navy officials briefed us on the changes they had made to the program’s estimate to date, stating that they updated the cost risk analysis as part of an internal program review. While the Navy plans to update the lead submarine cost estimate again by the end of fiscal year 2019 to support the Defense Acquisition Board review in the summer of 2020, it has yet to provide specific details on the steps it will take to update this estimate to ensure that it would include likely program costs and risks, such as the cost data it plans to include or the assumptions it may reassess. Further, since the Navy will likely submit its budget request to Congress as early as February 2020, Congress may be asked to authorize and fund lead submarine construction without the benefit of any changes to the estimate that may occur as a result of recommendations stemming from an independent review of the update. Further, although the Navy reports Columbia program cost information to Congress through annual matrices submissions, updates to the program cost estimate will not be reflected in these reports. For example, the Navy plans to report program manager and contractor cost estimates for individual submarines in the matrices once the submarines are under construction. Since these estimates are based on shipbuilder contract performance, they are initially calculated only after construction of each submarine is 15 percent complete, when sufficient data are available to show performance trends. While the Navy plans to award the contract for the lead submarine in October 2020, limited contractor performance data will be available in time for the February 2021 matrix submission. As a result, the earliest opportunity to report on the cost of the lead submarine would be the Navy’s next submission in February 2022, at which point the Navy will have already requested funding for the second and third Columbia submarine. In 2014, Congress created a National Sea-Based Deterrence Fund (the Fund) that provides DOD with greater discretion to fund the design, construction, purchase, alteration, and conversion of the Columbia class. Since then, Congress has provided the Navy with enhanced acquisition authorities to buy and construct submarines and certain key components early, in bulk, and continuously, when using these funds. The Navy anticipates saving over $1.9 billion through use of these authorities, but these savings, which were not included in the Columbia class program’s cost estimate, may be overestimated. Since its inception in 2014, Congress has expanded the special acquisition authorities under the Fund, in part, to allow the Columbia class program to gain economic efficiencies and realize cost savings. The timeline of the establishment of the Fund and legislative changes are shown in figure 14. The following authorities have been included as part of the use of the Fund: Economic order quantity: Permits awarding of contracts that provide a quantity of supplies that will result in a total cost and unit cost most advantageous to the government by achieving economic efficiencies based on production economies. Advance construction: Allows for manufacturing and fabrication efforts prior to ship authorization. Multiyear procurement authority: Permits a single contract for more than one year of critical components. Incremental funding authority: Facilitates the purchase of long lead items through partial funding of a contract with the expectation that full funding will be provided later. Using the Fund’s associated authorities, the Navy is able to purchase significant components and start advance construction prior to receiving Congress’s authorization of and funding to purchase each submarine. In total, the Navy will have requested and received $8.6 billion in funding, including 33 percent of funding for the lead submarine, before it receives authorization and funding to begin construction of the lead submarine in October 2020. At that point, the Navy will also have already requested funding for the propulsor and advance construction for the second submarine. Under law, the Navy is required to deposit all appropriations for the Columbia class construction and design into the Fund. To date, the Navy has made three deposits from the Shipbuilding and Conversion, Navy account into the Fund, totaling over $1.6 billion. The Navy is using initial deposits of $773 million in fiscal year 2017 and $862 million in fiscal year 2018 for detail design and continuous production of missile tube components. The Navy Comptroller initiates all deposits into the Fund, which are approved by the DOD Comptroller as internal reprogramming actions, as shown in figure 15. The Navy anticipates achieving over $1.9 billion in savings through the use of the Fund’s associated authorities, but the Navy did not evaluate these savings when it developed the program office cost estimate. Table 4 provides a description of each authority and the Navy’s plans and estimated potential savings resulting from use of the authorities. Overall, while we were unable to fully assess the methodology and assumptions the Navy used to estimate anticipated savings, the information we reviewed indicated that the Navy may have overestimated some of the savings the program can realistically achieve through use of the Fund’s associated authorities. While the Navy provided some documentation of the cost estimate methodologies, we could not fully validate that the estimated savings were realistic because, in general, the documentation provided by the Navy did not include a detailed description of how the estimates were calculated or how historical data were used to develop the estimate—a best practice identified in GAO’s cost estimating guide. In some cases, such as for individual critical components, the total value of the component costs was not documented. For other savings, such as advance construction, the Navy could not provide documentation of the calculations or a rationale for the estimated savings. In addition, the Navy assumes a higher rate for Columbia multiyear procurement savings than what has been typically achieved for other programs. The Navy has generally used multiyear procurement contracts after production has begun and some units have already been purchased. For example, according to the Navy, it did not receive multiyear procurement authority for the DDG 51 Arleigh Burke-class destroyer program—until 1998—more than 10 years after the contract for the lead ship was awarded and 38 ships had been purchased. We have reported that DOD typically overestimates savings from multiyear procurement authority. Further, in a 2017 presentation to Congress, the Navy stated that multiyear procurement savings are historically 10 to 12 percent. When the Navy requested multiyear procurement authority for the DDG 51 program in fiscal year 2013, it estimated achieving a savings of 8.7 percent. Similarly, when planning material purchases for the Virginia class submarine, the shipbuilder estimated that it would achieve 10 to 15 percent savings through the use of multiyear procurement authority. However, the Navy estimates that the Columbia class program will realize savings of 15 to 20 percent using multiyear procurement authority. A realistic estimate of savings is essential because program management is essentially relying on these savings as the only cost reserve to address any issues that arise during design and construction of the submarines. Updating the cost estimate to reflect these savings will provide program management with a more realistic assessment of the margin available and resources needed to achieve their costs. The Columbia class program is driven by the continued and pressing need to meet the Navy’s nuclear deterrent requirements as the legacy submarine fleet cannot extend its life any longer. From the outset this has translated into an aggressive and concurrent schedule for lead submarine construction. To counterbalance this schedule risk, the program plans to complete a substantial amount of the design before starting construction, which may prove challenging as the shipbuilder must complete an increasingly higher volume and complexity of disclosures. This, coupled with failures in missile tubes already delivered to the shipyard, highlight the potential for management challenges ahead. This is not to suggest that in a program of this size and complexity that some issues are not to be expected. Rather, the challenge for the Columbia class program is that the Navy has a limited ability to slow the pace of the program given the mission imperatives. At present, the need for additional resources appears likely because the Navy’s margin to mitigate any cost growth from issues that develop during design and construction relies on overestimated savings from use of the Fund’s associated authorities. The steps that the Navy takes between now and the fiscal year 2021 budget request to understand and plan for likely program costs will determine whether sufficient funding is in place to cover potential cost growth. The Navy plans to update the lead submarine cost estimate to reflect its current acquisition strategy and, in doing so, the Navy has the opportunity to incorporate more realistic information into the risk analysis and lead submarine cost estimate. In addition, a realistic and well-documented estimate of savings from use of the Fund’s associated authorities would help ensure that the Navy has allocated the necessary resources to address any issues that emerge during design or construction of the lead submarine. Such steps will likely improve the reliability of the lead submarine cost estimate and would position the Navy to better align its fiscal year 2021 budget request with funding it will likely need to construct the lead submarine—the next key decision point in the Columbia class program. Without an updated cost estimate with more realistic assumptions, Congress will be asked to commit billions of dollars for the lead submarine without knowing the full potential cost of construction and the possible effect on other shipbuilding programs. We are making three recommendations to the Secretary of the Navy: The Secretary of the Navy should direct NAVSEA to incorporate current cost and program data and an updated cost risk analysis in its planned update of the Columbia class lead submarine cost estimate. (Recommendation 1) The Secretary of the Navy should direct NAVSEA to develop a realistic and well-documented estimate of savings from use of the authorities associated with the Fund and incorporate the savings associated with the lead submarine into the Columbia lead submarine cost estimate. (Recommendation 2) The Secretary of the Navy should direct the Columbia class program office to update the lead submarine cost estimate and cost risk analysis prior to requesting funds for lead submarine construction. (Recommendation 3) We provided a draft of the sensitive report to DOD for comment. DOD’s written comments on the sensitive report are reprinted in appendix IV and summarized below. DOD concurred and described the actions they have taken or plan to take in response to all three of our recommendations. Regarding our recommendations to update its cost estimate update prior to requesting funds for lead submarine construction, the Navy has stated that it incorporated current cost and program data and an updated risk analysis into its cost estimate for the lead submarine in 2018, as part of an annual review. The Navy also stated that it will continue to update the lead submarine cost estimate with current data prior to requesting funding for lead submarine construction in fiscal year 2021. Until the updated estimate is independently validated—an essential cost estimating step— we cannot determine that the updated estimate is credible. Further, in response to our recommendation regarding the development of a realistic and well-documented estimate of savings from use of the Fund’s associated authorities, the Navy stated that it incorporated savings in its updated cost estimate. However, it has not provided any additional evidence to demonstrate that estimated savings from use of the Fund’s associated authorities are realistic and well-documented. Based on documentation that the Navy provided to us, it did not include a detailed description of how the estimates were calculated or how historical data were used to develop the estimate. Until these estimates are independently validated, the Navy cannot be confident that the program will achieve the planned amount of savings. The Navy also provided technical comments, which we incorporated as appropriate. DOD also raised a number of issues related to our assessment of the cost estimate, advance construction, and technology development, which we address in appendix IV. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, the Secretary of the Navy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. Should you or your staff have questions, please contact me at (202) 512- 4841 or oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report evaluates the Navy’s Columbia class submarine program. Specifically, we assessed (1) the Navy’s progress and challenges, if any, associated with meeting design goals and preparing for lead submarine construction; (2) the reliability of the Navy’s cost estimate for the Columbia class submarine program; and (3) how the Navy is implementing the National Sea-Based Deterrence Fund (the Fund) and associated authorities to construct Columbia class submarines. This report is a public version of a sensitive report that we issued in March 2019. The Department of Defense (DOD) deemed some of the information in our March report to be sensitive, which must be protected from public disclosure. Therefore, this report omits sensitive information about the Navy’s development of critical technologies for the Columbia class program, including specific details about the technologies. Although the information provided in this report is more limited, the report addresses the same objectives as the sensitive report and uses the same methodology. To assess the Navy’s progress and what challenges, if any, are associated with meeting design goals and preparing for lead submarine construction, we reviewed Navy and shipbuilder documents, including program briefings, schedules, and contract status reports to assess the schedule and performance risks of the Columbia class program. To evaluate the shipbuilder’s progress in maturing the Columbia class design, we reviewed the Navy’s plans for design management and completion, evaluated the shipbuilder’s design schedule, and compared them against design progress reports to identify any delays. To evaluate the Navy’s plans for advance construction, we analyzed metrics reported in Navy and shipbuilder documents, briefing slides, and other documentation including key dates and estimated construction plans. We compared design knowledge on the Columbia class program to our prior work on shipbuilding best practices. We reviewed ongoing development efforts and schedules for the Columbia class program’s critical technologies to determine remaining risks to their development and integration. We also reviewed the matrices submitted by the Navy to Congress in February and October 2018, to determine the status of the program and identify any changes to the Navy’s design and construction goals for the program since our last report in December 2017. We also analyzed available documentation related to the status of the nuclear reactor and integrated power system. We reviewed the shipbuilder’s construction plans for its new facilities and its workforce hiring plans. We also reviewed the shipbuilder’s and Navy’s process for evaluating its suppliers. To corroborate documentary evidence and gather additional information in support of our review, we met with officials from the Navy’s Columbia class submarine program office; Naval Nuclear Propulsion Directorate; Naval Surface Warfare Center Philadelphia; Office of the Chief of Naval Operations; Supervisor of Shipbuilding, Groton; the Office of the Deputy Assistant Secretary of Defense for Systems Engineering; and the Office of Undersecretary of Defense for Acquisition and Sustainment. Additionally, we met with shipbuilding representatives from General Dynamics Electric Boat—the prime contractor—as well as their main subcontractor, Huntington Ingalls Industries Newport News Shipbuilding to understand their role in Columbia class design and construction. To assess the reliability of the Navy’s cost estimate for the Columbia class submarine program, we determined the extent to which the estimate met best practices as identified in GAO’s Cost Estimating and Assessment Guide. We examined cost estimate documentation, such as the Columbia class program life-cycle cost estimate, briefs, memoranda, and other documents that contain cost, schedule, and risk information. We also examined the independent cost estimate conducted by the Office of the Secretary of Defense’s Office of Cost Assessment and Program Evaluation (CAPE), the independent cost assessment conducted by the Naval Center for Cost Analysis (NCCA), and the cost estimate conducted by the Congressional Budget Office, to determine what methodologies and assumptions differed from the program cost estimate. We met with Navy officials who were responsible for developing the cost estimate to understand the processes used by the cost estimators, to clarify information, and to allow the Navy to provide additional documentation on the data and methodologies used in the estimate. We also observed portions of the Columbia class program’s cost model during a presentation and discussion with Navy cost estimators. We also reviewed the matrices submitted by the Navy to Congress to identify any changes to the Navy’s cost goals and reported information. To further corroborate documentary evidence and gather additional information in support of our review, we conducted interviews with relevant DOD and Navy officials responsible for developing, updating, and assessing the Columbia class program cost estimate, including CAPE; NCCA; the Naval Sea Systems Command’s (NAVSEA) Cost Engineering and Industrial Analysis Group; and the Columbia class program office. To evaluate how the Navy is implementing the Fund and associated authorities to construct Columbia class submarines, we reviewed the legislation establishing and modifying the Fund, program budget request documents, and DOD reprogramming approvals. We also reviewed the Navy’s basis of estimate for the savings it plans to achieve from these authorities. To further corroborate documentary evidence and gather additional information in support of our review, we met with officials from the Office of the Assistant Secretary of the Navy for Financial Management and Comptroller; Office of the Under Secretary of Defense (Comptroller); and the Columbia class program office to discuss the Navy’s plans to use and execute the Fund and DOD’s role in approving transfers into the Fund. The performance audit upon which this report is based was conducted from December 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with DOD from February 2019 to April 2019 to prepare this unclassified version of the original sensitive report for public release. This public version was also prepared in accordance with these standards. Appendix II: Technology Readiness Levels Description Lowest level of technology readiness. Scientific research begins to be translated into applied research and development. Examples might include paper studies of a technology’s basic properties. Invention begins. Once basic principles are observed, practical applications can be invented. The application is speculative and there is no proof or detailed analysis to support the assumption. Examples are still limited to paper studies. Active research and development is initiated. This includes analytical studies and laboratory studies to physically validate analytical predictions of separate elements of the technology. Examples include components that are not yet integrated or representative. Basic technological components are integrated to establish that the pieces will work together. This is relatively “low fidelity” compared to the eventual system. Examples include integration of “ad hoc” hardware in a laboratory. Fidelity of breadboard technology increases significantly. The basic technological components are integrated with reasonably realistic supporting elements so that the technology can be tested in a simulated environment. Examples include “high-fidelity” laboratory integration of components. Representative model or prototype system, which is well beyond the breadboard tested for TRL 5, is tested in a relevant environment. Represents a major step up in a technology’s demonstrated readiness. Examples include testing a prototype in a high-fidelity laboratory environment or in a simulated realistic environment. Prototype near or at planned operational system. Represents a major step up from TRL 6, requiring the demonstration of an actual system prototype in a realistic environment, such as an aircraft, vehicle, or space. Examples include testing the prototype in a test bed aircraft. Technology has been proven to work in its final form and under expected conditions. In almost all cases, this TRL represents the end of the true system development. Examples include developmental test and evaluation of the system in its intended weapon system to determine if it meets design specifications. Actual application of the technology in its final form and under mission conditions, such as those encountered in operational test and evaluations. In almost all cases, this is the end of the last “bug fixing” aspects of true system development. Examples include using the system under operational mission conditions. To assess the reliability of the Navy’s cost estimate, we determined the extent to which the estimate was consistent with cost estimating best practices as identified in GAO’s Cost Estimating and Assessment Guide. This guide groups the best practices into four general characteristics: well documented, comprehensive, accurate, and credible. We reviewed documentation the Navy submitted for its cost estimate including limited portions of the Navy’s cost model, conducted numerous interviews, and reviewed relevant sources. We determined that the Columbia class cost estimate substantially met one, and partially met three of the four characteristics of a reliable cost estimate, shown in figure 16. We determined the overall assessment rating by assigning each individual rating a number: Not Met = 1, Minimally Met = 2, Partially Met = 3, Substantially Met = 4, and Met = 5. Then, we calculated the average of the individual assessment ratings to determine the overall rating for each of the four characteristics as follows: Not Met = 1.0 to 1.4, Minimally Met = 1.5 to 2.4, Partially Met = 2.5 to 3.4, Substantially Met = 3.5 to 4.4, and Met = 4.5 to 5.0. We consider a cost estimate to be reliable if the overall assessment ratings for each of the four characteristics are substantially or fully met. If any of the characteristics are not met, minimally met, or partially met, then the cost estimate does not fully reflect the characteristics of a high-quality estimate and is not considered reliable. In addition to responding to our recommendations, DOD also provided observations on a number of issues related to our assessment of the cost estimate, advance construction, and technology development. Our response to DOD’s observations is as follows. In paragraph 4, page 1 of the letter above, the Navy did not agree with our assessment of the accuracy of the cost estimate and stated that the life cycle cost estimate includes accurate calculations, proper inflation tables, and updates to requirements. DOD also stated that GAO or other stakeholders did not identify any errors. This is incorrect. While the Navy allowed us to observe the model, we did not independently check the accuracy of the calculations because Navy officials stated that the cost model, which contains the cost calculations, could not be released. We informed the Navy that this would affect parts of our assessment. After we provided a draft of the report, the Navy provided a briefing summarizing the results of a program office cost checkpoint conducted in September 2018. At the briefing, we received information on updates that the Navy made to the program cost estimate. As a result, we updated our assessment to reflect that the Navy substantially met the best practice to regularly update the cost estimate to reflect significant changes. However, the additional information provided by the Navy did not change our assessment of the accuracy and, therefore, our overall assessment of the Columbia cost estimate remains valid. In paragraph 1, page 2, the Navy did not agree with our assessment of the credibility of the cost estimate and stated that the life cycle cost estimate includes analyses that address sensitivity, risks, and uncertainty within the estimate. As we point out in the report, the estimate is based, in part, on optimistic assumptions regarding the number of labor hours needed to construct Columbia class submarines. The Navy has made updates to the program cost estimate based on a 2018 checkpoint review and stated that the cost risk analysis has been updated and program costs are less than originally estimated. The Navy provided us with a high-level brief of these updates. However, due to the timing of this report, we were not able to fully assess the update to the cost model. Given the size and complexity of the Columbia class program, we continue to believe that the program’s cost estimate does not adequately account for program risks. In paragraph 3, page 1, DOD stated that our findings were largely informed by an assessment conducted by the Naval Center for Cost Analysis (NCCA). However, our process for assessing program cost estimates is based on the extent to which the estimate met best practices outlined in GAO’s Cost Estimating and Assessment Guide. In conducting our assessment, we examined multiple sources of information, including the Columbia class program life cycle cost estimate, NCCA’s independent cost assessment, DOD’s Office for Cost Assessment and Program Evaluation’s (CAPE) independent cost estimate, and the cost estimate conducted by the Congressional Budget Office (CBO), to determine what methodologies and assumptions differed from the program cost estimate. We also relied on prior experience examining and reporting on the cost performance of Navy shipbuilding programs, issuing 26 reports over the past 10 years. We found, for example, that the cost estimate is based on optimistic labor assumptions which, while in agreement with NCCA’s assessment and CBO’s estimate, results from our independent assessment of the evidence we reviewed and on our prior work. In paragraph 2, page 2, the Navy stated that it identified super modules and selected components where acceleration would reduce construction schedule risk. We acknowledge in the report that the design for these components will be complete prior to starting construction. However, we continue to believe that starting construction for components of the lead submarine before the arrangements for the submarine are complete increases design and construction risk. Even if the components included in advance construction are fully designed, risk remains for the adjoining and interfacing components within the module that may have ongoing design work, potentially requiring costly and time-intensive rework. In paragraph 4, page 2, the Navy notes that fully maturing all of the key technologies identified in our 2017 report—such as the advanced propulsor bearing—would require substantial investments in money and time. However, we continue to reinforce that a tenet of achieving design maturity is based on demonstrating a prototype in its final form, fit, and function in a realistic environment—which requires a design resembling the final configuration. In paragraph 6, page 2, the Navy stated that it does not agree with our characterization that the Navy is continuing to experience manufacturing problems with the electric drive of the integrated power system. DOD stated that while the vendor experienced delays in manufacturing the prototype motor, it has taken proactive measures to deliver the motor to the shipyard, as scheduled. However, the Navy’s plan to concurrently test and finalize the design increases risk that any issues identified in testing could delay the delivery of the system to the shipyard. As a result, we continue to identify this as a key risk to the program. Additional details on this system are classified. Shelby S. Oakley, (202) 512-4841 or oakleys@gao.gov. In addition to the contact above, the following staff members made key contributions to this report: Diana Moldafsky, Assistant Director; Laura Jezewski; Jessica Karnis; and Nathaniel Vaught. Other contributions were made by Brian Bothwell; Daniel Glickstein; Kurt Gurka; Stephanie Gustafson; and Robin Wilson.", "summary": "The Navy has identified the Columbia class submarine program as its top acquisition priority. It plans to invest over $100 billion to develop and purchase 12 nuclear-powered ballistic missile submarines to replace aging Ohio class submarines by 2031. The National Defense Authorization Act for Fiscal Year 2018 and House Report 115-200 included provisions that GAO review the status of the program. This report examines (1) the Navy's progress and challenges, if any, in meeting design goals and preparing for lead submarine construction; (2) the reliability of the Navy's cost estimate; and (3) how the Navy is implementing a special fund and associated authorities to construct Columbia class submarines. GAO reviewed Navy and shipbuilder progress reports, program schedules, and construction plans. GAO assessed the Navy's cost estimate and compared it to best practices for cost estimating. GAO also reviewed certain Navy funding and acquisition authorities and interviewed program officials. This is a public version of a sensitive report that GAO issued in March 2019. Information that the Department of Defense (DOD) deemed sensitive has been omitted. The Navy's goal is to complete a significant amount of the Columbia class submarine's design—83 percent—before lead submarine construction begins in October 2020. The Navy established this goal based on lessons learned from another submarine program in an effort to help mitigate its aggressive construction schedule. Achieving this goal may prove to be challenging as the shipbuilder has to use a new design tool to complete an increasingly higher volume of complex design products (see figure). The shipbuilder has hired additional designers to improve its design progress. The Navy also plans to start advance construction of components in each major section of the submarine, beginning in fiscal year 2019, when less of the design will be complete. The Navy's $115 billion procurement cost estimate is not reliable partly because it is based on overly optimistic assumptions about the labor hours needed to construct the submarines. While the Navy analyzed cost risks, it did not include margin in its estimate for likely cost overruns. The Navy told us it will continue to update its lead submarine cost estimate, but an independent assessment of the estimate may not be complete in time to inform the Navy's 2021 budget request to Congress to purchase the lead submarine. Without these reviews, the cost estimate—and, consequently, the budget—may be unrealistic. A reliable cost estimate is especially important for a program of this size and complexity to help ensure that its budget is sufficient to execute the program as planned. The Navy is using the congressionally-authorized National Sea-Based Deterrence Fund to construct the Columbia class. The Fund allows the Navy to purchase material and start construction early on multiple submarines prior to receiving congressional authorization and funding for submarine construction. The Navy anticipates achieving savings through use of the Fund, such as buying certain components early and in bulk, but did not include the savings in its cost estimate. The Navy may have overestimated its savings as higher than those historically achieved by other such programs. Without an updated cost estimate and cost risk analysis, including a realistic estimate of savings, the fiscal year 2021 budget request may not reflect funding needed to construct the submarine. GAO is making three recommendations: that the Navy update the lead submarine cost estimate with cost risk analysis using current cost data, develop a realistic estimate of savings from use of the Fund's authorities, and use this updated cost estimate to inform its budget request for lead submarine construction. DOD concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Federal land management agencies have law enforcement divisions that protect their employees and secure their facilities across nearly 700 million acres of federal lands (see fig. 1). To do so, the four agencies’ law enforcement divisions employ uniformed law enforcement officers who patrol federal lands, respond to illegal activities, conduct routine investigations, and, depending on the agency, may also provide expertise in assessing facilities’ security. Each agency also maintains a law enforcement data system in which law enforcement officers record and track incidents of suspected illegal activity on federal lands. These systems can be used in conducting investigations, identifying trends in crime data, and assisting with decision making regarding staffing, resource allocations, and budgetary needs. BLM. BLM’s Office of Law Enforcement and Security is charged with promoting the safety and security of employees and visitors, as well as environmental protection, across approximately 245 million acres of BLM lands in 12 states. At the end of fiscal year 2018, BLM had 194 field law enforcement officers engaged in such duties. According to agency documentation, these law enforcement officers also coordinate with state agencies and county law enforcement officers on large-scale recreational events, such as Burning Man. These field law enforcement officers may also be tasked with conducting facility security assessments. FWS. FWS’s division of Refuge Law Enforcement helps ensure the safety and security of visitors, employees, government property, and wildlife and their habitats on approximately 150 million acres of land. At the end of fiscal year 2018, FWS had 231 field law enforcement officers on the agency’s 567 wildlife refuges. According to agency documents, FWS law enforcement officers serve as ambassadors by providing important services to the public beyond law enforcement, such as providing visitors with information and guidance regarding fishing, hunting, hiking, and wildlife viewing opportunities. These field law enforcement officers may also be tasked with conducting facility security assessments. Forest Service. The Forest Service’s Law Enforcement and Investigations division is charged with protecting natural resources, employees, and visitors on approximately 193 million acres of National Forest System lands in 44 states. At the end of fiscal year 2018, the Forest Service had 417 field law enforcement officers. Additionally, law enforcement officers may be tasked with conducting facility security assessments. Park Service. The Park Service’s division of Law Enforcement, Security, and Emergency Services is charged with protecting resources, managing public use, and promoting public safety and visitor enjoyment across the agency’s 85 million acres, 418 park units, 23 national scenic and national historic trails, and 60 wild and scenic rivers. At the end of fiscal year 2018, the Park Service had 1,329 field law enforcement officers stationed at 240 of the Park Service’s units. Field law enforcement officers may also be tasked with conducting facility security assessments. The ISC Standard applies to all facilities in the United States occupied by federal employees for nonmilitary purposes, including federal land management agencies’ facilities. This includes existing facilities, new construction, or major modernizations; facilities owned, to be purchased, or leased; stand-alone facilities; special-use facilities; and facilities on federal campuses. Among other things, the ISC Standard requires agencies to assess the risks faced by each of their facilities. According to Department of Homeland Security officials, since 2010, executive departments and agencies responsible for protecting their own facilities have been required to conduct facility security risk assessments as part of the ISC Standard’s risk management process. The ISC Standard states that risk is a measure of potential harm from an undesirable event that encompasses threat, vulnerability, and consequence. The ISC Standard then defines these terms as follows: Undesirable event: An incident, such as vandalism, active shooters, and explosive devices that has an adverse impact on the facility occupants or visitors, operation of the facility, or mission of the agency. Threat: The intention and capability of an adversary to initiate an undesirable event. Vulnerability: A weakness in the design or operation of a facility that an adversary can exploit. Consequence: The level, duration, and nature of the loss resulting from an undesirable event. Based on the assessed level of risk, the ISC Standard provides a method for agencies to identify which countermeasures, such as security cameras or security gates, should be implemented to protect the facility against each of the undesirable events. According to the ISC Standard, once an initial assessment is completed, facility security reassessments should be conducted at least once every 3 to 5 years, depending on the facility’s security level, to reassess whether existing countermeasures remain adequate for mitigating risks. Beginning in fiscal year 2020, the ISC will require departments and agencies to report their compliance with the requirement to conduct facility security assessments on occupied facilities. Figure 2 shows the steps of the ISC Risk Management Process, and figure 3 shows some examples of facility countermeasures. Because facility security assessments are a key component of the ISC’s risk management framework, the ISC Standard includes requirements for agencies’ risk assessment methodologies. Specifically, among other things, the ISC Standard requires that agencies use facility security assessment methodologies that (1) consider all 33 of the undesirable events identified in the ISC Standard, and (2) evaluate the three factors of risk (threat, vulnerability, and consequence) to each undesirable event. During facility security assessments, ratings are assigned to the threat, vulnerability, and consequence of an undesirable event, and the combined ratings produce an overall measurement of risk. In our hypothetical facility security assessment example shown in figure 4, each component of risk is assigned a rating of between 1 (very low) and 5 (very high) based on the facility’s conditions. These ratings are then multiplied to produce an overall estimate of risk for each undesirable event. Agencies can use this and other information resulting from a facility security assessment to make security-related decisions and direct resources to implement countermeasures to address unmitigated risk. Available federal law enforcement data show a range of threats and assaults against the four federal land management agencies’ employees in fiscal years 2013 through 2017. For example, incidents ranged from threats conveyed by telephone to attempted murder against federal land management agency employees. Additionally, FBI data on its investigations into potential domestic terror threats to land management agencies show a wide variety of statutes and regulations that may have been violated. However, not all incidents are captured in the federal land management agencies’ data because not all incidents are reported to the agencies’ law enforcement officials. Additionally, some incidents are investigated by state or local law enforcement and recorded in their data systems rather than in land management agencies’ systems. As a result, the number of actual threats and assaults is unclear and may be higher than what is represented in available data. Our analysis of data from each of the four land management agencies and the FBI showed the following: BLM. BLM data for fiscal years 2013 through 2017 included 88 incidents of threats and assaults against BLM employees and cited eight different statutes or regulations. A federal law prohibiting people from assaulting, resisting, or impeding certain federal officers or employees, 18 U.S.C. § 111, was the statute most frequently cited in BLM’s data. Examples of incidents that identified this statute include an individual harassing a BLM law enforcement officer by repeatedly swerving and cutting off the officer on the highway, an individual making threats against a BLM employee on Facebook and YouTube, and an incident during which an employee was stabbed outside a federal building. Twenty-one of the 88 incidents occurred in fiscal year 2013, when BLM categorized incidents using uniform crime reporting codes rather than federal statutes, regulations, or state laws. These incidents include, for example, an incident in which an individual attempted to murder a law enforcement officer with a firearm. Table 1 provides additional information on threats and assaults against BLM employees for fiscal years 2013 through 2017. FWS. FWS data for fiscal years 2013 through 2017 included 66 incidents of threats and assaults against FWS employees and cited nine different statutes and regulations. A federal law prohibiting people from assaulting, resisting, or impeding certain federal officers or employees, 18 U.S.C. § 111, was the statute most frequently cited in FWS’s data and included a variety of incidents, such as a law enforcement officer who was assaulted with a tree branch during a suspected drug trafficking incident at the border. According to FWS officials, when law enforcement officers cite violations of state statutes, they enter the violation into the law enforcement data system under a generic description such as “Assault: simple, on officer,” and then manually enter the relevant state statute. Of the total FWS incidents, 26 were recorded under unspecified state statutes. These incidents included, for example, an officer who was assaulted while arresting an individual driving under the influence and an officer who received a death threat during an arrest. Table 2 provides additional information on threats and assaults against FWS employees for fiscal years 2013 through 2017. Forest Service. Forest Service data for fiscal years 2013 through 2017 included 177 incidents of threats and assaults against Forest Service employees and cited seven different statutes or regulations. Officials said that the data provided to us generally included only the most serious offense that occurred during an incident, due to limitations on linking records in Forest Service’s data system. For example, if both a verbal threat and physical assault occurred during an incident, only the physical assault would be included in the data. Therefore, potential violations of some statutes or regulations that occurred during incidents of threats and assaults may not be recorded in the data. About half of the Forest Service incidents involved potential violations of 36 C.F.R. § 261.3(a), which includes interfering with a forest officer, among other things. Such incidents included: an individual telling a Forest Service employee that his dog would “rip her head off” if she approached his camp; threatening graffiti written on a law enforcement officer’s personal residence; and a death threat to a law enforcement officer. Table 3 provides additional information on threats and assaults against Forest Service employees for fiscal years 2013 through 2017. Park Service. Park Service data for fiscal years 2013 through 2017 included 29 incidents of threats and assaults against Park Service employees and cited six different offense descriptions. According to a Park Service official, some incident records cite a statute or regulation. However, all agency incident records include offense codes that are unique to the Park Service and are associated with the type of violation, such as assault or disorderly conduct. Unlike with statutes and regulations, a perpetrator does not need to be identified for the law enforcement officer to cite an offense code. Three of the six Park Service offense codes relate to assault. Incidents that cited these codes included an individual ramming an employee’s patrol vehicle and a death threat left on an employee’s personal cell phone. Table 4 provides additional information on threats and assaults against Park Service employees for fiscal years 2013 through 2017. FBI. FBI data for fiscal years 2013 through 2017 show that the FBI initiated under 100 domestic terrorism investigations into potential threats to federal land management agencies, and that these investigations most frequently cited eight specific statutes. Investigations can either be initiated by the FBI or referred to the FBI by land management agencies. Land management agency officials said they refer only the most serious incidents to the FBI—such as the armed occupation of Malheur National Wildlife Refuge. The FBI receives information from a variety of sources, including from confidential human sources; public tips; and state, local, tribal, and federal partners. According to FBI officials, an investigation into a domestic terrorism threat may only be initiated if there is information indicating potential violent criminal activity committed in furtherance of ideology. Our analysis of FBI data showed that the majority of the domestic terrorism investigations involved BLM, and the majority involved individuals motivated by anti-government ideologies. Most of the domestic terrorism investigations cited more than one statute or regulation as having been potentially violated, and the severity of the threat varied. For example, some investigations involved written threats and threats conveyed by telephone to government officials. In one example, the investigation involved a subject posting a BLM law enforcement officer’s personal information on Twitter, which resulted in over 500 harassing phone calls and several death threats. Table 5 provides information on the percentage of FBI investigations citing various statutes and regulations related to threats to federal land management agencies for fiscal years 2013 through 2017. incidents of threats. According to officials at all four agencies, employees do not always report threats to agency law enforcement. For example, some field unit employees said that in certain circumstances, they consider receiving threats a normal part of their job. Specifically, field unit employees we interviewed at three land management agencies cited incidents in which they were yelled at, for example, by hunters, permittees, or attendees of public planning meetings. While this behavior may be threatening, some employees told us it was “a part of the job,” and they did not report such incidents. In addition, some officials described being threatened while off-duty, such as by being harassed in local stores or being monitored at their home, which officials said in some cases they did not report because it was a common occurrence. Additionally, according to agency officials, threats are subject to interpretation, so employees may be reluctant to report an incident unless it involves an explicit threat of physical harm or death. During an incident, some threats and assaults may not be recorded in agency data systems by agency law enforcement officers. BLM and Forest Service officials told us that when a single incident involves multiple offenses, the less serious offenses are unlikely to be recorded in the data system. Therefore, the entirety of what occurred during the incident may not be captured in the data system. For example, according to one BLM official we interviewed, if an incident involved a verbal threat and a physical assault, it would likely be recorded into the data system as an assault. there were trucks regularly parked outside their homes, with individuals holding anti- government beliefs, who appeared to be monitoring them and their families. One official stated that “They were holding us hostage in our own homes.” Some incidents are investigated by state or local law enforcement and recorded in their data systems, rather than in land management agencies’ systems. Some incidents of threats and assaults to federal employees may be investigated by state or local law enforcement entities. Specifically, during our site visits, officials from all four land management agencies stated that their employees are instructed to call 911 in the case of an emergency, such as a threat or assault, and that, generally, a local law enforcement officer—such as a county sheriff’s deputy—will respond to the call. Land management agency officials said that when state or local law enforcement respond to an incident, even those that occur on federal lands, the incident would be recorded in those entities’ data systems and may not be entered into the land management agency’s law enforcement data system. Additionally, according to agency officials at all four land management agencies, due to resource constraints, many of their field units do not have any law enforcement officers or have a limited law enforcement presence, which limits the agencies’ ability to respond to and therefore record incidents of threats and assaults. For example, according to agency officials, as of October 2018, 178 of 418 Park Service units had no law enforcement presence. Furthermore, even when field units had dedicated law enforcement officers, the officers might not have been available to immediately respond to incidents, so employees might instead have contacted local law enforcement. Given these reasons, the actual number of incidents of threats and assaults is unclear and may be greater than the number reported and entered in the land management agencies’ law enforcement data systems, according to federal land management agency officials. Federal land management agencies use various approaches to protect their employees from threat and assaults, including building relationships with external law enforcement entities and the public; receiving, collecting, and disseminating intelligence; and offering training to agency employees. Agency officials we interviewed cited four factors that can affect their ability to protect employees, including that employees often work in remote locations. Federal land management agencies use various approaches to protect their employees from threats and assaults. Specifically: Agencies deploy their law enforcement officers to protect employees and resources. All four federal land management agencies have their own law enforcement divisions with law enforcement officers who are tasked with protecting employees and resources in the field. According to agency officials we interviewed, where available, agency law enforcement officers respond to incidents, including threats and assaults against employees. When necessary, agencies also deploy additional law enforcement officers to assist local officers. For example, during the armed occupation of the Malheur National Wildlife Refuge, FWS officials said the agency deployed FWS law enforcement officers from around the country to field units in western states to provide additional security for FWS employees. Similarly, according to BLM documents, BLM officers are sometimes deployed from their home field units for various reasons, such as assisting with large-scale recreational events and supporting fire investigations and natural disaster recovery. Agencies build relationships with local, state, and other federal agency law enforcement entities, as well as the public. Federal land management agencies build relationships with local, state, and other federal agency law enforcement entities to help protect employees and resources in the field and to assist with coordinating law enforcement responses, according to agency officials. These officials said such relationships are important because not all field units have a law enforcement officer, and those that do often rely on local law enforcement for assistance with incidents of threats or assaults against agency employees. For example, officials at one field unit in Nevada stated that during a high-profile court case involving the agency, the Las Vegas Metropolitan Police Department kept a patrol car outside the field unit for several days to help ensure the safety of the field unit’s employees. Agency field officials said that building relationships with the public—both visitors and local citizens—can help keep their employees safe by cultivating trust and reducing potential tension over federal land management practices. For example, officials at one field unit drafted talking points for employees in the event that visitors asked them about a high-profile incident of anti-government behavior directed at a federal land management agency. The talking points outlined the agency’s responsibilities and authorities and, according to agency officials, were aimed at dispelling misunderstandings about federal land management policies. Additionally, officials at several field units we visited stated that their law enforcement officers are focused on educating, rather than policing, visitors. Agencies receive, collect, and disseminate intelligence information. To varying degrees, federal land management agencies receive, collect, and disseminate intelligence information, which helps them anticipate, prepare for, and react to threats against employees and facilities. For example, officials we interviewed from all four agencies said that they receive intelligence information from various sources, including Interior’s Office of Law Enforcement and Security, the Department of Homeland Security, FBI, Federal Protective Service, and Joint Terrorism Task Forces. Additionally, after the armed occupation of Malheur National Wildlife Refuge, FWS created a new risk and threat assessment coordination unit to collect intelligence, inform decision-making, and improve coordination with other Interior bureaus. Agency officials said they disseminate intelligence information about potential threats to their field units so that field personnel can respond appropriately to the threat—including encouraging employees to telework, directing employees to temporarily stop field work, or temporarily closing their field unit. Agencies have developed plans and guidance to promote employee safety. Agency officials have developed a variety of written plans and guidance to promote employee safety. For example, agencies are required to develop occupant emergency plans for most occupied facilities. Occupant emergency plans we obtained covered employee safety, including what to do in the event of a bomb threat or active shooter event. Additionally, some field units developed other documents that outlined actions employees are to take to remain safe, such as plans to address critical incidents or protests at their field unit. Agencies offer various types of safety training. All four federal land management agencies offer a variety of training to help protect employees and promote their safety, according to agency documents and officials. Examples of topics addressed in agencies’ training include understanding anti-government ideologies, communicating techniques for de-escalating conflicts, and responding to an active shooter event. Agency officials cited four factors that can affect agencies’ efforts to protect their employees: Agency employees work with the public and are often easily recognizable. Agency officials said their employees are required to interact with the public as part of their official duties, which can put them at risk of being threatened or assaulted. FWS officials said they temporarily closed field units in an adjacent state during the beginning of the armed occupation of the Malheur National Wildlife Refuge to reduce the likelihood that their employees would interact with members of the public who were traveling to Malheur to participate in the occupation. FWS and Park Service officials stated that their employees are easily recognizable because they typically wear uniforms, which may put them at greater risk of being harassed or threatened by individuals who hold anti-government beliefs. (See figure 5 for examples of uniforms.) In response, on certain occasions, some agency officials direct their employees to wear street clothes instead of their uniforms. Officials we interviewed indicated that whenever they are concerned about a potential safety issue at their field unit, such as a protest, they may encourage eligible employees to telework from home instead of reporting to their work station. Employees often work in remote locations to fulfill agency missions. Agency officials stated that it can be difficult to protect employees because, as part of their field work, employees may be dispersed across hundreds of miles of federal lands and may be located hours or days away from the nearest agency law enforcement officer. (See figure 6 for an example of a remote location.) As a result, some agency officials said they sometimes direct employees to postpone fieldwork if there is a known or anticipated risk of threats or assaults. In addition, according to officials, various field units have developed check-in and check-out procedures to keep track of employees when they are in the field and to help verify that they report back to the office after concluding their fieldwork. Additionally, some field units have purchased satellite communication devices that operate when cell or radio signals are not available, so that employees conducting remote field work can call for help if needed. The number of agency field law enforcement officers has declined. As of the end of fiscal year 2018, the overall number of field law enforcement officers at each of the four land management agencies had declined from fiscal year 2013, which agency officials noted as a factor straining their efforts to protect employees. For example, the Park Service had the lowest decrease of 7 percent, whereas the Forest Service had the greatest decrease of 22 percent. (See table 6.) Figure 7 shows the total number of acres for which federal land management agencies are responsible, the number of field law enforcement officers they had as of the end of fiscal year 2018, and the ratio of officers to acres of federal land. In addition, field officials from the three Interior agencies stated that as a result of various requirements to send law enforcement officers to support border protection efforts, their law enforcement officers are occasionally absent from their field units when deployed 14 days or more to the border. To help address the effects of border deployments, some agency officials told us that they seek opportunities to share law enforcement resources among field units and with other land management agencies and that they typically deploy law enforcement officers from field offices across the agency to minimize the effects on any one unit. Anti-government sentiment can be unpredictable, difficult to respond to, and disruptive. Agency officials we interviewed said that the risk to employee safety posed by individuals holding anti- government sentiments can be unpredictable and that incidents of threats and assaults against employees by such individuals are generally sporadic. For example, BLM, FWS, and Forest Service officials said it would have been difficult to predict that armed individuals would occupy FWS’s Malheur National Wildlife Refuge, since they were protesting BLM actions. BLM and FWS agency officials said they believed that the occupiers chose Malheur National Wildlife Refuge because it was an easier target. In addition, some agency field unit officials told us that incidents of threats and assault from individuals holding anti-government beliefs generally occur when agency personnel are conducting normal operating activities, such as during routine traffic stops or when they are collecting park entrance fees, making them difficult to predict. Officials from one field unit also noted that while their agency wants to ensure employee safety, it is contrary to their mission to close a field unit every time there is a potential anti-government threat—such as threats made on social media. However, during the armed occupation of the Malheur National Wildlife Refuge, refuges in an adjacent state were closed out of caution, and FWS employees turned away visitors who had driven hundreds of miles to view wildlife, according to FWS officials. To help address the potential disruption posed by unpredictable anti- government threats, some agencies and field units developed plans and guidance that prescribed various actions field units and their employees could take to help ensure employees’ safety while also counteracting the disruptive effects of threats and attacks on a facility’s operations. The four federal land management agencies have completed some but not all of the facility security assessments on their occupied federal facilities as required by the ISC Standard and three do not have a plan for doing so. Furthermore, the Forest Service has a facility security assessment methodology that complies with key requirements described in the ISC Standard, but BLM, FWS, and the Park Service do not. The ISC Standard requires that agencies complete facility security assessments on all occupied facilities and suggests that agencies establish annual objectives for conducting assessments. As suggested in the ISC Standard, to do so, agencies may need to consider several things, such as: the number and locations of needed facility security assessments, by establishing which facilities in the agency’s inventory are occupied and grouping them into campuses, if desired; the agency’s organizational structure, to determine entities responsible for conducting the assessments; training needs of entities responsible for conducting the assessments; which facilities or campuses should be prioritized for assessments, if a schedule for completing the assessments, given the agency’s available resources and priorities. The four land management agencies have not completed facility security assessments on all occupied facilities, and agency officials cited various reasons for not doing so. FWS has a plan to complete its assessments, but BLM, the Forest Service, and the Park Service do not. Specifically: FWS. FWS has conducted five facility security assessments on its approximately 465 occupied facilities and has a plan for completing the remaining assessments. According to FWS headquarters officials, FWS employees have limited physical security expertise to conduct facility security assessments; therefore, the agency has developed a plan to meet the ISC Standard’s requirement using contractors. Specifically, in May 2019, FWS hired a project manager to implement a new facility security assessment program and, according to agency documentation, the new program will, among other things, employ contracted assessors to conduct facility security assessments agency-wide. Agency officials said FWS will hire the assessors after the project manager and other agency officials complete preliminary tasks such as developing ISC-compliant policies and procedures, establishing the number and locations of facility security assessments needed, and developing an electronic tracking system for the assessors to use while conducting assessments. Once these tasks are completed—which could take up to 1 year, according to officials—FWS is to develop a schedule for assessors to complete the remaining assessments. BLM. BLM has conducted 21 facility security assessments on its approximately 280 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan to do so. BLM headquarters officials we interviewed said that the agency is decentralized and its state offices are responsible for the security of facilities in their states, including scheduling and conducting facility security assessments. However, some BLM state and field officials we interviewed said they do not have the resources or expertise to conduct the assessments, and BLM does not offer relevant training. In June 2019, the agency issued a hiring announcement for a headquarters-level security manager. According to officials, once hired, the security manager is to establish training for field employees to conduct facility security assessments and monitor state offices’ compliance with the requirement to conduct assessments. Headquarters officials noted that state offices will remain responsible for scheduling and conducting their own assessments. However, as of June 2019, the agency had not developed a plan for how the security manager would implement agency-wide training given available resources, or ensure state offices’ compliance with the requirement to conduct assessments. Forest Service. The Forest Service has conducted at least 135 facility security assessments on its approximately 1,135 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan for doing so. Forest Service headquarters officials we interviewed said that the agency is decentralized and its regional offices are responsible for the security of facilities in their regions, including scheduling and conducting facility security assessments. However, some regional officials we interviewed said they do not have resources or sufficient staff expertise to conduct the assessments. Forest Service headquarters officials stated that they have partnered with the U.S. Department of Agriculture’s Office of Homeland Security to offer facility security assessment training to Forest Service regional employees. Additionally, Forest Service headquarters officials stated that with the assistance of the U.S. Department of Agriculture’s Office of Homeland Security, they were restructuring their physical security program. Under the new structure, headquarters will oversee compliance at a national level and each region will have a team responsible for facility security assessments in their region, which agency officials said will establish lines of authority to account for the agency’s decentralized structure. However, the Forest Service headquarters official responsible for leading this effort said that, due in part to staff turnover, restructuring the physical security program has been difficult. As of June 2019, the Forest Service does not have a documented plan for how the restructured program will operate, how to ensure sufficient staff are trained to complete the assessments given available resources, or how and when regions will complete all of their assessments. Park Service. The Park Service has conducted at least 148 facility security assessments on its approximately 1,505 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan to do so. Park Service headquarters officials we interviewed said that the agency is decentralized and the superintendents of its 418 park units are responsible for the security of facilities within their parks, including scheduling and conducting facility security assessments. However, some park unit officials we interviewed said they do not have the resources or sufficient staff with expertise to conduct the assessments. Park Service headquarters officials stated that they have developed a program to offer facility security assessment training to park employees. In February 2019, according to agency officials, the Park Service hired a security manager who will standardize the agency’s facility security assessment practices, expand facility security assessment training opportunities, and monitor parks’ compliance with the requirement to conduct assessments. Headquarters officials noted that park units will remain responsible for scheduling and conducting their own assessments. However, as of June 2019, the agency had not developed a documented plan for how to ensure sufficient staff are trained to complete the assessments given available resources, or how the security manager would ensure park units’ compliance with the requirement to conduct assessments. Not complying with the ISC Standard’s requirement to complete facility security assessments on all occupied facilities could leave federal agencies exposed to risks in protecting their employees and facilities. Specifically, without conducting all of the required assessments, agencies may not identify the degree to which undesirable events can impact their facilities or identify the countermeasures they could implement to mitigate the risks of those events. Officials from BLM, the Forest Service, and the Park Service acknowledged that completing the remaining facility security assessments is important and that developing an agency-wide plan to do so may help them as they work towards compliance with this ISC Standard requirement. In the process of developing their plans, the agencies could take into consideration their organizational structure, available resources, and training needs, all of which may affect how quickly they can complete their assessments. Furthermore, developing a plan for completing facility security assessments will require agencies to identify the number and locations of their required assessments, which may help them fulfill the fiscal year 2020 ISC compliance reporting requirement. Three of the four federal land management agencies have not developed a facility security assessment methodology that complies with two key requirements in the ISC Standard. Specifically, according to the ISC Standard, methodologies must, among other things, (1) consider all 33 of the undesirable events identified in the Standard, such as active shooters, vandalism, and explosive devices; and (2) evaluate the three factors of risk—threat, vulnerability, and consequence—for each undesirable event. According to our analysis of agency documentation and interviews with agency officials, the extent to which each agency’s facility security assessment methodology complied with the two key ISC Standard requirements we evaluated varied. As of June 2019, the Forest Service’s facility security assessment methodology met the two key ISC Standard requirements we evaluated, and the Park Service’s methodology partially met the requirements. BLM and FWS did not have established facility security assessment methodologies as of June 2019. Specifically: Forest Service. The Forest Service utilizes an ISC-compliant facility security assessment methodology developed by the U.S. Department of Agriculture. The methodology adheres to the two key ISC Standard requirements that we evaluated. Park Service. The Park Service developed a risk assessment methodology, but it only partially adheres to the two key ISC Standard requirements we evaluated. Specifically, the Park Service’s risk assessment methodology does not include a step to assess the consequences of specific undesirable events, as required by the ISC Standard. Park Service officials indicated the agency’s commitment to conducting facility security assessments using an ISC-compliant methodology and said that they plan to submit the Park Service’s risk assessment methodology to the ISC to be certified as compliant with requirements in the ISC Standard. A Park Service official acknowledged, however, that the agency needs to update its methodology to include a step to assess the consequences of specific undesirable events, and the official stated that the agency does not plan to submit the methodology to the ISC until those changes have been made. As of June 2019, officials did not have a timeframe for doing so. BLM. BLM officials said that, as of June 2019, the agency did not have an established methodology for conducting facility security assessments. Officials told us that, once hired, the new BLM security manager will develop an assessment methodology and that the agency intends to employ a methodology that complies with the ISC Standard. However, BLM officials do not know when the security manager will be hired, and the agency has not documented requirements for the security manager to adhere to the ISC Standard’s requirements. FWS. FWS officials said that, as of June 2019, the agency did not have an established methodology for conducting facility security assessments., Officials told us that the agency intends to employ a methodology that complies with the ISC Standard and provided a high-level description of what they expect the methodology to include. However, this description did not indicate that the agency would evaluate consequences of specific undesirable events, as required by the ISC Standard. According to FWS officials, because staff do not have the expertise to conduct facility security assessments, in 2011, the agency developed physical security survey checklists as an interim solution for assessing facilities. These checklists allowed staff to document the presence or absence of countermeasures identified in the ISC Standard. However, FWS headquarters officials acknowledged that these checklists were not an ISC- compliant risk assessment methodology since they do not consider undesirable events or measure risk, as required by the ISC Standard. By not using a methodology that fully complies with the ISC Standard, agencies could face adverse effects, such as an inability to make informed resource allocation decisions for their physical security needs and providing facilities—and the facilities’ occupants—with an inappropriate or insufficient level of protection. Specifically, according to the ISC Standard, when agencies do not use methodologies that comply with risk assessment requirements in the ISC Standard, facilities may have either less protection than needed, resulting in unmitigated risks, or more protection than needed, resulting in wasted resources. To carry out their critical missions to manage the resources on over 700 million acres of federal lands, BLM, FWS, Forest Service, and Park Service officials and facilities are often the most visible and vulnerable representatives of the federal government in remote areas and have been subject to a range of threats and assaults. One way for these agencies to address the safety risks posed by unpredictable anti-government sentiment or other threats is to follow the ISC Standard requirements for conducting facility security assessments. However, BLM, FWS, the Forest Service, and the Park Service have not conducted all required facility security assessments, and BLM, the Forest Service, and the Park Service do not have a plan for doing so. Agency officials stated that this is due, in part, to decentralized organizational structures, limited available resources, and insufficient training. Without a plan for conducting all of the remaining assessments, agencies may not identify the degree to which undesirable events can impact their facilities or identify countermeasures they could implement to mitigate the risks of those events. In addition, as of June 2019, BLM, FWS, and the Park Service do not have facility security assessment methodologies that fully comply with two key requirements in the ISC Standard—namely, to consider the 33 undesirable events identified in the Standard and to evaluate risk factors for each of these events. Without using a methodology that complies with the ISC Standard, the agencies could face adverse effects, including an inability to make informed resource allocation decisions for their physical security needs and providing facilities—and the facilities’ occupants—with an inappropriate or insufficient level of protection. We are making a total of six recommendations, including two to BLM, one to FWS, one to the Forest Service, and two to the Park Service. Specifically: The Director of BLM should develop a plan to conduct all required facility security assessments agency-wide, taking into consideration the agency’s organizational structure, available resources, and training needs. (Recommendation 1) The Chief of the Forest Service should develop a plan to conduct all required facility security assessments agency-wide, taking into consideration the agency’s organizational structure, available resources, and training needs. (Recommendation 2) The Director of the Park Service should develop a plan to conduct all required facility security assessments agency-wide, taking into consideration the agency’s organizational structure, available resources, and training needs. (Recommendation 3) The Director of the Park Service should update the agency’s facility security assessment methodology to comply with requirements in the ISC Standard, including a step to consider the consequence of each undesirable event. (Recommendation 4) The Director of BLM should develop a facility security assessment methodology that complies with requirements in the ISC Standard to assess all undesirable events and consider all three factors of risk for each undesirable event. (Recommendation 5) The Director of FWS should develop a facility security assessment methodology that complies with requirements in the ISC Standard to assess all undesirable events and consider all three factors of risk for each undesirable event. (Recommendation 6) We provided a draft of this report to the Departments of Agriculture, Homeland Security, Interior, and Justice for their review and comment. The Forest Service, responding on behalf of the U.S. Department of Agriculture, generally agreed with the report and our recommendation and cited its efforts to develop a plan to complete required facility security assessments. The Forest Service’s written comments are reproduced in appendix III. Interior, responding on behalf of BLM, FWS, and the Park Service, concurred with our recommendations and provided examples of actions the three agencies planned to take. Specifically, regarding our recommendation that BLM and the Park Service develop a plan to conduct facility security requirements agency-wide, BLM intends to revise its policy and develop such a plan, and the Park Service intends to develop a plan that includes training and tools so that park unit staff can conduct the required assessments. Regarding our recommendation that BLM, FWS, and the Park Service develop methodologies that comply with requirements in the ISC Standard, the agencies cited various efforts to do so, including revising policies and developing new tools, training, and data system modules. Interior’s written comments are reproduced in appendix IV. The Department of Homeland Security provided a technical comment that we incorporated. The Department of Justice told us that they had no comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees; the Attorney General; and the Secretaries of Agriculture, Homeland Security, and the Interior. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made key contributions to this report are listed in appendix V. Our objectives were to examine for the four federal land management agencies, (1) what is known about the number of threats and assaults against their employees, (2) the approaches the agencies used to protect their employees from threats and assaults and any factors affecting their ability to do so, and (3) the extent to which agencies met facility security assessment requirements. For the first objective, we obtained and analyzed data on threats and assaults against land management agency employees from the law enforcement databases of the Forest Service within the U.S. Department of Agriculture and the Bureau of Land Management (BLM), Fish and Wildlife (FWS), and National Park Service (Park Service) within the Department of the Interior for fiscal years 2013 through 2017. These data were the most recent available at the time we began our review. We also obtained and analyzed data from the Federal Bureau of Investigation (FBI) regarding its investigations into potential domestic terror threats to land management agencies. Each land management agency’s law enforcement division records data on threats and assaults to employees, as part of its broader mission to enforce laws that safeguard employees and protect resources. The data systems, however, were not specifically designed for reporting threats and assaults against employees, and they do not include the suspect’s motivation for a crime, such as anti-government extremist ideologies. Since each agency collects and maintains data in a different data system and has agency-specific reporting requirements for incidents, the data differ in how they were originally recorded by field law enforcement officers and how they were queried and reported by headquarters officials responding to our request for data. As such, if data were not entered, or not entered correctly, they would not have been captured in agency queries. According to agency officials at the four land management agencies, they queried their data systems to identify records of incidents that pertained to threats and assaults against employees. BLM, Forest Service, and Park Service officials then conducted record-level reviews and removed records that they determined were not threats or assaults, contained errors, were duplicative, or did not contain sufficient information to make a conclusive determination. We did not systematically review the records they removed. Information about each agency’s data system and limitations related to the agency’s data are as follows: BLM. BLM maintains its data in the Incident Management, Analysis, and Reporting System (IMARS). IMARS is used by most Interior bureaus for incident management and reporting and to prevent, detect, and investigate known and suspected criminal activity. Each bureau uses a different, customized version of IMARS. BLM officials said that beginning in fiscal year 2014, BLM began collecting data on violations of federal statutes, regulations, and state laws during incidents. Prior to that, BLM used a generic description of each offense. Officials also said that when multiple offenses occur during an incident, the less serious offenses are unlikely to be entered into the system. Therefore, some offenses that occurred during incidents of threats and assaults may be excluded from these data. FWS. FWS maintains its data the agency’s Law Enforcement Management Information System (LEMIS). According to FWS documents, LEMIS is used to process and store investigations, intelligence, and other records. FWS officials said the agency changed data systems during our reporting time frame. Specifically, FWS originally stored fiscal year 2013 and 2014 data in the Law Enforcement-Information Management and Gathering System and imported the data into LEMIS in July 2014. We assessed the data across the two systems by comparing incidents per year and types of violations that occurred, and we found that the data were comparable. According to agency officials, they did not review the incidents before providing them to us; therefore, some incidents may not have been actual threats or assaults. Forest Service. The Forest Service maintains its data in the Law Enforcement and Investigations Management Attainment Reporting System (LEIMARS). Forest Service officials said LEIMARS is used to record criminal and claims activity in the national forests, which include verified violations of criminal statutes and agency policy, as well as incidents that may result in civil claims for or against the government. Incidents are recorded in LEIMARS in one of three types of law enforcement report categories: (1) an incident report, which records when an offense occurred but the perpetrator was unknown; (2) a warning notice, which is issued when an offense occurred but the law enforcement officer determined that the offense was inadvertent or committed due to lack of understanding or misinformation; and (3) a violation notice, which is issued for an offense that violates the U.S. Code or Forest Service regulations and the perpetrator was known. We present these three types of reports as incidents. A Forest Service official identified 125 incidents for which the agency could not determine whether a threat or assault to an employee occurred. We excluded these 125 incidents from our analysis. Officials told us that they only provided data on the most serious offense occurring during an incident due to limitations on linking records in the Forest Service’s data system; they also told us that there may be a minor amount of overlap between violation notices and incident reports. Park Service. As with BLM, Park Service data is maintained in the IMARS data system. According to a Park Service official, some but not all Park Service incident records cite a federal statute or regulation. However, all Park Service incident records include offense codes—which are unique to the Park Service—that are associated with the type of violation, such as assault or disorderly conduct. Unlike with the statutes and regulations, a perpetrator does not need to be identified for the law enforcement officer to cite an offense code. Therefore, the Park Service provided data to us by offense code, and we were not able to present the data by the statute or regulation that was potentially violated. We also obtained data from the FBI on investigations into potential domestic terror threats to land management agencies. FBI investigation data is maintained in the Sentinel data system, which is FBI’s case management system. FBI officials provided data from the FBI’s domestic terrorism program on three types of investigations: assessments, preliminary investigations, and full investigations. We reported data on the full investigations because of the limited information available on assessments and preliminary investigations. Before providing the data to us, an FBI official reviewed the record of each domestic terrorism investigation initiated in fiscal years 2013 through 2017 to determine whether the investigation was relevant to threats to BLM, FWS, the Forest Service or the Park Service. These data represent all potential violations known at the time the FBI agent first opened the case and therefore include various potential violations beyond threats and assaults against federal employees. According to agency officials, in some cases, the FBI agent opening the case may not have been able to fully identify all relevant subsections of the statute or regulation that was potentially violated. To account for this, we report FBI’s data at the statute or regulation level. Since we relied on the professional judgement of agency officials to review and interpret incident data, we may be unable to replicate the final data selection drawn from each agency’s database, even if we retrieved the data using the same method and search criteria. We independently assessed the reliability of each agency’s data by (1) reviewing related documentation about the data system; (2) conducting manual reviews of the data for missing data, outliers, and obvious errors; (3) reviewing related internal controls; and (4) interviewing agency officials knowledgeable about the data, among other things. In our interviews, we asked agency officials about data entry practices, data system capabilities and limitations, and circumstances whereby incidents of threats and assaults might not appear in the database. Based on our review, we determined that the data were sufficiently reliable for the purposes of reporting descriptive summary information on the number of threats and assaults against federal land management employees during fiscal years 2013 through 2017. To address our second objective, we examined policies and requirements regarding federal land management agencies’ responsibilities for protecting employees against threats and assaults. We also interviewed headquarters and selected field unit officials about the agencies’ approaches to protecting their employees from threats and assaults and factors that may affect their ability to do so, and we obtained supporting documentation where available. We conducted site visits from March through July 2018 to a nongeneralizable sample of 11 of the 35 regional or state offices and 14 field units across the federal land management agencies. We selected sites in Colorado, Nevada, Oregon, and Utah, since the majority of federal lands are located in the West and some field units in these states had been affected by actions of individuals motivated by anti-government ideologies. Specifically, we conducted site visits to five BLM field units, nine FWS field units, seven Forest Service field units, and four Park Service field units. The number of field units we interviewed varied on several factors, including how many field units regional and state offices invited to the meeting. Findings from the interviews we conducted at our site visits provide useful insights but cannot be generalized to those units we did not include in our review. Based on our site visit interviews, we identified four primary factors affecting agencies’ abilities to protect their employees from threats and assaults. We also collected information from each agency on the number of field law enforcement officers they had at the end of fiscal years 2013 and 2018, the most recent year for which data were available—to analyze any changes in resources. We took steps to assess the reliability of these data, including comparing the data to agency budget justifications and interviewing agency officials, and found them to be sufficiently reliable for the purpose of reporting the number of field law enforcement officers agencies had in fiscal years 2013 and 2018. For the third objective, we examined government-wide requirements promulgated by the Interagency Security Committee (ISC) and documented in ISC’s Risk Management Process for Federal Facilities, which we refer to in this report as the ISC Standard, and its related appendixes. We interviewed ISC officials to learn more about the development of the requirements in the ISC Standard and variations, if any, in how agencies are expected to implement them. To determine whether agencies met the requirement to conduct facility security assessments on all of their occupied facilities, we obtained documents on the agencies’ inventories of occupied facilities and assessed whether the agencies had conducted security assessments on those facilities. We interviewed headquarters and field officials about their inventories and their plans, if any, for completing the remaining assessments. We also examined the extent to which agencies’ facility security risk assessment methodologies complied with two key requirements in the ISC Standard. These included that methodologies must: (1) consider all 33 of the undesirable events identified in the Standard and (2) evaluate the three factors of risk—threat, vulnerability, and consequence—for each undesirable event. We analyzed the agencies’ methodologies and compared them against requirements in the ISC Standard. We also interviewed agency officials about the methodologies. We conducted this performance audit from November 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Anne-Marie Fennell, (202) 512-3841 or fennella@gao.gov. In addition to the individual named above, Casey L. Brown (Assistant Director), Tanya Doriss (Analyst in Charge), Charles W. Bausell, Charles A. Culverwell, John W. Delicath, Emily E. Eischen, Cindy K. Gilbert, Richard P. Johnson, Vanessa E. Obetz, Dan C. Royer, and Breanna M. Trexler made key contributions to this report.", "summary": "A 2014 government report predicted that the rate of violent domestic extremist incidents would increase. In recent years, some high-profile incidents have occurred on federal lands, such as the armed occupation of a FWS wildlife refuge in 2016. Federal land management agencies manage nearly 700 million acres of federal lands and have law enforcement divisions that protect their employees and secure their facilities. GAO was asked to review how land management agencies protect their employees and secure their facilities. For the four federal land management agencies, this report examines, among other things, (1) what is known about the number of threats and assaults against their employees and (2) the extent to which agencies met federal facility security assessment requirements. GAO analyzed available government data on threats and assaults; examined agencies' policies, procedures, and documentation on facility security assessments; compared the agencies' methodologies against ISC requirements; and interviewed land management agency, ISC, and FBI officials. Data from the four federal land management agencies—the Forest Service within the U.S. Department of Agriculture and the Bureau of Land Management (BLM), Fish and Wildlife (FWS), and National Park Service (Park Service) within the Department of the Interior—showed a range of threats and assaults against agency employees in fiscal years 2013 through 2017. For example, incidents ranged from telephone threats to attempted murder against federal land management employees. However, the number of actual threats and assaults is unclear and may be higher than what is captured in available data for various reasons. For example, employees may not always report threats because they consider them a part of the job. Federal Bureau of Investigation (FBI) data for fiscal years 2013 through 2017 also showed that the FBI initiated under 100 domestic terrorism investigations into potential threats against federal land management agencies. The majority of these investigations involved BLM and individuals motivated by anti-government ideologies. The four federal land management agencies have completed some but not all of the facility security assessments on their occupied federal facilities as required by the Interagency Security Committee (ISC). Officials at the four agencies said that either they do not have the resources, expertise, or training to conduct assessments agency-wide. FWS has a plan to complete its assessments, but BLM, the Forest Service, and the Park Service do not. Such a plan could help these agencies address the factors that have affected their ability to complete assessments. The ISC also requires that agencies conduct assessments using a methodology that meets, among other things, two key requirements: (1) consider all of the undesirable events (e.g., arson and vandalism) identified as possible risks to facilities, and (2) assess the threat, vulnerability, and consequence for each of these events. The Forest Service's methodology meets these two requirements and the Park Service's methodology partially meets the requirements, but BLM and FWS have not yet established methodologies for conducting facility security assessments. Without developing a plan for conducting all of the remaining facility security assessments and using a methodology that complies with ISC requirements, agencies may not identify the risks their facilities face or identify the countermeasures—such as security cameras or security gates—they could implement to mitigate those risks. GAO is making six recommendations: that BLM, the Forest Service, and the Park Service develop a plan for completing facility security assessments and that BLM, FWS, and the Park Service take action to ensure their facility security assessment methodologies comply with ISC requirements. The agencies generally concurred with the recommendations.", "document_type": "gao"}
{"report": "The 340B Program was created in 1992 following the creation of the Medicaid Drug Rebate Program and gives 340B covered entities—certain eligible hospitals, clinics, and other entities—discounts on covered outpatient drugs comparable to those made available to state Medicaid agencies. According to HRSA, which administers and oversees the 340B Program, the program’s purpose is to enable participating hospitals and other providers to stretch scarce federal resources to reach more eligible patients and provide more comprehensive services. In addition to realizing substantial savings through 340B Program price discounts— which HRSA estimates as 25 to 50 percent of the cost of drugs—covered entities can generate revenue through their participation in the 340B Program. For example, they can purchase covered outpatient drugs at the 340B Program price for all eligible patients regardless of the patients’ income or insurance status and generate revenue by receiving reimbursement from patients’ insurance that may exceed the 340B prices paid for the drugs. Entities are generally eligible for the 340B Program—that is, are covered entities—if they receive one of 10 federal grants or are one of six types of hospital. Hospitals must also meet additional requirements, such as being owned or operated by a state or local government, being formally granted governmental powers, or being nongovernmental. The 340B statute requires nongovernmental hospitals to be nonprofit and to have contracts with state or local governments to provide health care services to the 340B-specified low-income population. However, the requirement does not specify criteria for these contracts, such as the amount or type of services to be provided to these low-income individuals. Generally, hospitals must also meet other requirements to participate, such as treating a disproportionate number of low-income Medicare and Medicaid patients. Hospital participation in the 340B Program has more than tripled over the last decade, due, in part, to the enactment of the Patient Protection and Affordable Care Act in 2010, which expanded the types of hospitals that could qualify for the program. According to data from HRSA, in 2009, prior to the law’s enactment, there were more than 800 340B-participating hospitals, compared to more than 2,500 in 2019. The majority of participating hospitals are nongovernmental hospitals. Specifically, 1,690, or 67 percent, of the hospitals participating as of January 1, 2019 were nongovernmental hospitals. (See figure 1.) HRSA is responsible for verifying hospitals’ and other covered entities’ eligibility to participate in the 340B Program. HRSA reviews nongovernmental hospitals’ eligibility for the 340B Program at registration, recertification, and through audits. Registration. Prior to participation in the 340B Program, hospitals must register with HRSA, at which point they must self-attest to meeting the program’s eligibility requirements. Additionally, HRSA’s hospital registration instructions specify that, at the time of registration, a nongovernmental hospital must have documentation that shows it is nonprofit (such as copies of Internal Revenue Service documentation) and a copy of its contract with a state or local government to serve the 340B-specified low-income population. This documentation must be provided to HRSA upon request. During each quarterly registration period, HRSA conducts contract integrity checks for a random sample of 20 percent of newly registering nongovernmental hospitals. For the selected hospitals, HRSA requests a copy of the hospital’s contract with the state or local government, which it reviews to verify that the contract is signed by officials from both organizations, is in effect, and does not expire before program participation would begin. HRSA policy states that a hospital that cannot provide a state or local government contract when selected for a contract integrity check at registration will not be registered for the 340B Program. Recertification. To remain in the 340B Program, hospitals must annually recertify their eligibility. During recertification, hospitals are to ensure that their information (e.g. name, address, point of contact) is correct in HRSA’s internal 340B Program database and self-attest that the hospital still meets program requirements. HRSA collects documentation from the hospital if it reports changes to its name, classification (i.e., whether it is government owned or operated, delegated governmental powers, or nongovernmental), or nonprofit status. Audits. HRSA audits 200 covered entities—a combination of hospitals and federal grantees—per year. HRSA’s audits include covered entities (including hospitals) that are selected based on risk-based criteria (approximately 90 percent of the audits conducted each year), and entities that are targeted based on, for example, stakeholder allegations of noncompliance (10 percent of audits conducted). The criteria for risk- based audits include a covered entity’s changes in the volume of 340B Program drug purchases, time in the program, complexity of its program, and history of violations or allegations of noncompliance. Among other things, HRSA’s audits include assessments of each hospital’s 340B eligibility status. For a nongovernmental hospital, HRSA’s guidance indicates that auditors are expected to review the hospital’s contract with the state or local government to ensure that it is for serving the 340B-specified low-income population and is signed by both a hospital and state or local government official. Auditors are also expected to review the contract’s start and end dates to ensure that it is effective during a specific period of review. HRSA defines the audit’s period of review as the time frame beginning the first day of the audit’s sample period—a six-month period that predates and is not contiguous with the beginning of the onsite audit—and ending on the last day of the onsite audit. For example, a hospital with an onsite audit in March of 2017 may have a sample period from July 1, 2016 through December 31, 2016, which means that auditors should verify that the hospital’s contract was in effect from at least July 1, 2016 through the end of the March 2017 onsite audit. If HRSA identifies deficiencies in hospitals’ contracts, the agency may issue (1) findings of noncompliance, which are made public on HRSA’s website, or (2) areas for improvement, which are not made public. When an audit results in a finding of noncompliance, the hospital is required to submit a corrective action plan within 60 days of the audit report being finalized for HRSA’s approval. HRSA closes the audit once the hospital attests that the corrective action plan has been fully implemented, and any necessary repayments have been made to affected manufacturers. For example, if a nongovernmental hospital were unable to demonstrate that it had a contract with a state or local government when audited, HRSA policy states that the hospital would be issued a finding of noncompliance and may be subject to termination from the 340B Program for not meeting eligibility criteria. In addition, the hospital may be responsible for repayment to manufacturers for discounts it received during the period it lacked a contract. Most of the contracts we reviewed between nongovernmental hospitals and state or local governments obligated the hospitals to provide health care services to low-income individuals, but they included few details about those obligations. The 340B statute requires participating nongovernmental hospitals to have state or local government contracts to provide health care services to the 340B-specified low-income population, but does not otherwise specify details for the content of these contracts. Of the 240 contracts we reviewed, 224 (93 percent) required the hospital to provide services to low-income individuals. Of these 224 contracts, 169 (75 percent) specifically mentioned providing services to the 340B-specified low-income population (low-income individuals not eligible for Medicaid or Medicare). 55 (25 percent) specified a more general obligation to provide services to individuals who are likely low-income, uninsured, or underinsured, such as enrollees in a county program for the medically indigent, inmates at a local detention center, or individuals receiving treatment through a county mental health program. Less than one-third of the contracts we reviewed defined “low-income” or included detailed requirements for the amount or type of services to be provided. Of the 224 contracts that contained an obligation to provide services to low-income individuals, 14 (6 percent) specified what was considered low income. Of these contracts, the specific income threshold varied, generally ranging from 100 percent to 400 percent of the federal poverty level. 71 (32 percent) specified the amount of services the hospitals were to provide to low-income individuals. The contracts generally defined the amount of services as a range in the cost of care the hospital was expected to provide; the amount varied by contract. For example, one contract specified that the hospital would provide $60,000 to $100,000 of services per year, while another included a range of $62 million to $85 million per year. Contracts that did not specify dollar amounts included, for example, provisions regarding the number of staff available to provide services or requirements to provide services at certain times. One such contract required a hospital to provide at least one full-time-equivalent behavioral health provider for specified sites, while another required a hospital to administer influenza vaccines at two clinics on two Fridays each year during influenza season. 53 (24 percent) identified specific types of services that hospitals were to provide, often specifying multiple categories of services. For example, one contract required a hospital, among other things, to provide inpatient and outpatient services, obstetrics, and cardiovascular surgery. Other contracts only identified a single category of service that the hospital was required to provide. For example, nine of the 53 contracts specified that the hospitals were required to provide emergency services, although hospitals that operate emergency departments are already required, as a condition of participating in Medicare, to screen, and if necessary stabilize patients who seek emergency care, regardless of their ability to pay. Additionally, four of the contracts reviewed required the provision of behavioral health services, two specified the provision of vaccinations, and one was for the evaluation and treatment of tuberculosis. 46 of the 224 contracts (21 percent) specified that state or local governments would pay hospitals for the services provided. In some cases, the contracts specified that the hospitals would be paid to provide care for low-income individuals at rates established under other programs–such as the state’s Medicaid program. Others established rates specifically for services provided to the population covered under the contract. Finally, approximately one-third of the contracts reviewed included provisions that would allow the state and local governments contracting with hospitals to ensure that the contractually required services are being provided. Specifically, 68 of the 224 contracts (30 percent) included provisions for reporting, monitoring or enforcement, as shown below in Figure 2; some contracts included more than one type of provision. Of the 68 contracts, 56 required hospitals to report information to the state or local government. Of these 56, 40 required reporting on the services provided under the contract, including types, dollar amounts, or number of services provided to certain populations, such as “medically indigent,” “uninsured persons,” and “underinsured persons.” For example, one contract required the hospital to provide the government with an annual report containing information about the value of free care provided to indigent persons, the total value of discounted care provided to uninsured patients, and the number of declined requests for free or discounted care. The remaining 16 contracts included more general reporting requirements, such as to provide copies of any reports requested by state or federal licensing, regulatory, or accrediting entities, to the state or local government. 29 contracts included provisions for governments to monitor the hospitals’ provision of care. Specifically, 10 contracts required regular reviews, with some of those at specific time intervals (e.g. annually, quarterly), while 19 contracts required that hospitals be available for periodic audits or to provide the government access, upon request, to medical records and documents which could be used to review or evaluate the services being provided under the contract. 34 contracts included enforcement mechanisms for the government to apply consequences if the hospital did not meet the terms of the agreement. For example, one contract allowed the state government to terminate the contract 90 days after providing notice of the state’s determination that the hospital was not providing sufficient services to low-income individuals. Contracts for eight hospitals provided for monetary fines or withholding of funds if hospitals were found to be in breach of the contract. HRSA uses self-reported data to determine whether hospitals are nonprofit without assessing whether the data are reliable for that purpose. Additionally, HRSA relies primarily on nongovernmental hospitals’ self- attestations to verify the existence of state or local government contracts, and weaknesses in the reviews of contracts it does conduct hamper the identification of potential eligibility issues. HRSA uses Medicare cost report data from CMS to determine whether hospitals are nonprofit, but these data may not be sufficiently reliable for this purpose. Specifically, HRSA relies on self-reported information from cost reports on whether hospitals operate as nonprofit, proprietary, or governmental organizations. HRSA reviews this information at registration to check that hospitals have indicated that they are nonprofit organizations. Additionally, in April 2019, HRSA began conducting quarterly checks of cost report data to identify hospitals that list themselves as proprietary for further review, as this designation could be used by for-profit, rather than nonprofit, hospitals, contrary to 340B Program eligibility requirements. HRSA officials told us that the agency has not independently evaluated the reliability of the cost report data for determining nonprofit status. Additionally, a CMS official responsible for oversight of Medicare cost reports told us that CMS does not have any formal processes to assess the reliability of the data on whether a hospital is nonprofit, proprietary, or governmental, because these data do not affect Medicare reimbursement. The official added that the question on the cost report used to collect these data was not intended to assess nonprofit status, is not clearly defined, and may not be reported accurately. For example, the cost report instructions do not include definitions of nonprofit and proprietary for providers to refer to when they are completing their cost reports. HRSA requires hospitals to maintain additional documentation, such as Internal Revenue Service forms for tax-exempt organizations or documents from the state, to demonstrate their nonprofit status, but does not collect or review this documentation if hospitals indicate that they are nonprofit on their cost reports. In August 2019, HRSA submitted a proposal to the Office of Management and Budget to require hospitals registering for the 340B Program to submit documentation supporting the hospital classification that they select during registration, which would include requiring nongovernmental hospitals to submit documentation of their nonprofit status. However, this requirement, if it goes into effect, would apply only to newly registering hospitals and would not affect the nearly 1,700 nongovernmental hospitals currently participating in the 340B Program. For those hospitals, HRSA would continue to rely on the Medicare cost report data. Relying on the self-reported data from Medicare cost reports is inconsistent with federal internal control standards related to information and communication, which state that management should use quality information to achieve the entity’s objectives, such as by obtaining relevant data, based on identified information requirements, that are reasonably free from error and bias, and that management should evaluate the data for reliability. Without ensuring that the information it uses on hospitals’ nonprofit status is reliable, HRSA cannot effectively determine if nongovernmental hospitals participating, or seeking to participate, in the 340B Program meet the statutory eligibility requirements, creating a risk that for-profit hospitals could receive discounted pricing for which they are not eligible. HRSA primarily relies on self-attestations from nongovernmental hospitals to verify that they have contracts in place with state or local governments as required to participate in the 340B Program. Specifically, HRSA relies on the attestations that hospitals are required to make during registration and recertification that they meet the program’s eligibility requirements. Although HRSA requires nongovernmental hospitals to have copies of their contracts, and to provide them upon request, it does not require most hospitals to submit those contracts at either registration or recertification. Additionally, while HRSA previously required each nongovernmental hospital to submit a certification of contract form during registration that was signed by a government official and attested to the existence of a contract to serve the 340B-specified low-income population, officials said the agency stopped requiring submission of this form in July 2014. At that time, officials said HRSA initiated a process of contacting government officials directly through an online certification process to confirm that newly registering hospitals had contracts in place. However, that process was eliminated in September 2017, and HRSA no longer has a process that requires state and local government officials to confirm the existence of contracts with nongovernmental hospitals. HRSA does collect and review contracts with state or local governments for a sample of nongovernmental hospitals through its audit and contract integrity check processes, but these reviews are currently limited in number and scope. Specifically, in fiscal years 2017 and 2018, HRSA audited about 7 percent of nongovernmental hospitals per year (108 and 109 hospitals in fiscal years 2017 and 2018, respectively). Additionally, at the time of our review, HRSA conducted contract integrity checks for 20 percent of newly registering hospitals; this equated to 41 hospitals in calendar years 2017 and 2018 combined. HRSA’s August 2019 proposed information collection request, if approved, would require all newly registering nongovernmental hospitals to submit their state or local government contracts at registration. However, as previously mentioned, this new requirement would only affect newly registering hospitals and not those already participating. Consequently, for the large majority of nongovernmental hospitals already registered for the 340B Program, self-attestations made electronically at registration and recertification would remain HRSA’s sole method of verifying that hospitals have state or local government contracts as required by the 340B statute. Additionally, HRSA officials told us that when the agency does collect documents from nongovernmental hospitals through its audits or contract integrity checks, they do not review them to determine if they are contracts (i.e., mutually binding agreements to provide services or supplies in exchange for something of value). Based on our review of documentation submitted to HRSA from 258 hospitals, 18 hospitals submitted documents that did not appear to meet this common definition of a contract; examples included certification of contract forms without accompanying contracts, articles of incorporation, and descriptions of community programs. Nevertheless, these hospitals were permitted to participate in the 340B Program. HRSA’s reliance on hospitals to attest that the required contracts are in place is contrary to federal internal control standards related to information and communication, which state that management should use quality information to achieve the entity’s objectives, such as by obtaining relevant data from external sources in a timely manner based on the identified information requirements. Without a process to verify that all nongovernmental hospitals have contracts in place, HRSA does not have reasonable assurance that nongovernmental hospitals participating in, or seeking to participate in, the 340B Program have contracts with state and local governments. Consequently, this increases the risk that nongovernmental hospitals that do not have the statutorily required contracts and are thus ineligible may register for, and participate in, the program. In addition to not determining whether the documentation provided by nongovernmental hospitals during contract integrity checks and audits are contracts, weaknesses in HRSA’s reviews hamper its ability to identify and address issues that affect the hospitals’ eligibility for the 340B Program. Specifically, we identified three weaknesses: (1) contract integrity checks do not assess whether contracts require hospitals to serve the 340B-specified low-income population; (2) guidance for auditors’ review of contracts has not been consistently documented and lacks detail; and (3) HRSA allows hospitals to avoid audit findings by entering into new contracts with state and local governments while audits are being conducted. HRSA’s contract integrity checks for newly registering hospitals do not assess whether the contracts require the provision of services to the 340B-specified low-income population. HRSA’s contract integrity checks for newly registering nongovernmental hospitals are limited to verifying that contracts clearly list the names of the hospital and unit of government and have appropriate signatures and dates; procedures for conducting these checks do not instruct staff to review whether the contracts require hospitals to provide health care services to the 340B-specified low-income population, as required to participate in the 340B Program. Of the 38 contracts submitted to HRSA for contract integrity checks in 2017 and 2018, two (5 percent) did not appear to require the hospitals to serve the 340B-specified low-income population, yet HRSA allowed the hospitals to begin participating in the 340B Program. Specifically, one hospital submitted a contract with a state government that was limited to providing services to beneficiaries of the state’s Medicaid program, although nongovernmental hospitals are to have contracts to provide services to individuals who are not entitled to Medicaid benefits. The other hospital submitted an agreement with a nonprofit company for management services, including accounting and payroll services, for their hospital and nursing home facilities. To participate in the 340B Program, nongovernmental hospitals must have a contract with a state or local government to provide health care services to the 340B-specified low-income population. Thus, allowing hospitals to participate when the state or local government contracts they submitted for review do not require them to serve this population is inconsistent with HRSA’s responsibilities for oversight of the 340B Program, including ensuring that participating hospitals meet the statutory eligibility requirements. Without amending its contract integrity checks to include verifying that newly registering hospitals have contracts that meet statutory eligibility requirements, HRSA risks allowing hospitals that are not eligible, and which may not be providing services to the 340B- specified low-income population, to participate in the 340B Program. Guidance for contract reviews during audits has not been consistently documented over time and lacks detailed instructions. Although HRSA officials told us they have always expected auditors to look for a contract through which a nongovernmental hospital would be eligible for the 340B Program, we found that HRSA’s guidance for auditors has not clearly documented these expectations and lacks detailed instructions. HRSA did not document key elements to look for— signatures, dates, and a requirement to serve the 340B-specified low- income population—in its guidance for auditors until August 2018. Further, the agency has made frequent changes to its guidance and procedures. For example, between November 2017 and July 2019, HRSA modified its guidance for auditors at least six times. In addition, HRSA’s guidance states that auditors are expected to perform a “simple logic test” to determine whether contracts require the hospital to serve the 340B- specified low-income population, but HRSA has not provided any additional information about how auditors are expected to conduct such a test. The guidance also advises auditors not to “dive too deep” when reviewing contracts. Of the 202 contracts submitted by hospitals as part of HRSA’s audits that we reviewed, 11 contracts (5 percent) did not appear to require hospitals to provide care to the 340B-specified low- income population, yet HRSA allowed the hospitals to continue their participation in the program. One such contract was a consent order that stated that the state’s attorney general would defer enforcement action based on the hospital’s agreement to abide by certain medical debt collection practices, such as adopting a zero tolerance policy for abusive, harassing, oppressive, false, deceptive, or misleading language or collections conduct. Furthermore, HRSA’s procedures for audits do not require auditors to separately affirm and record their review of the dates, signatures, and services required in the contracts. Thus, HRSA has no way of knowing whether auditors have checked and verified each of these elements. In addition to the 11 contracts that did not appear to obligate the hospitals to provide health care services to the 340B-specified low-income population, our review of 202 contracts submitted to HRSA by audited hospitals found 16 contracts (8 percent) were missing one or both signatures; 15 contracts (7 percent) were missing effective dates or were expired; at least 8 contracts had dates that did not cover the audit’s period of review, which includes a 6-month sample period before the start of the audit. For at least some of these contracts, HRSA was unaware of the issues we identified; HRSA did not issue audit findings in response to any of these contracts. HRSA has taken steps to address expired contracts. Specifically, in May 2019, HRSA revised its procedures for hospital registration and contract integrity checks to include language specifying that a hospital should not be approved for registration unless a contract is currently in place and that the contract must not expire before the participation start date. In addition, HRSA officials told us that in January 2020 the agency plans to implement a quarterly check of its 340B database to identify hospitals with expired state or local government contracts. However, these efforts do not address other date-related issues such as missing effective dates, or the issues with signatures or contract service requirements. Federal internal control standards related to control activities and enforcing accountability state that agencies should (1) implement control activities through policies, such as by documenting policies in the appropriate level of detail to allow management to effectively monitor the control activity; and (2) evaluate performance and hold individuals accountable for their internal control responsibilities, such as by communicating with the service organizations contracted to perform roles about the agency’s objectives and related risks, assigned responsibilities and authorities, and the expectations of competence to enable the service organization to perform its responsibilities. Without more specific guidance for auditors’ review of contracts, and procedures requiring auditors to separately document their review of each contract element, HRSA lacks reasonable assurance that the audits are appropriately identifying deficiencies in nongovernmental hospitals’ contracts with state or local governments. As a result, some hospitals appear to be participating in the 340B Program based on contracts that are inconsistent with program requirements or HRSA’s guidance. HRSA allows audited hospitals to avoid audit findings by entering into new contracts with state and local governments while audits are being conducted. As previously noted, our review of contracts submitted to HRSA by audited hospitals found that eight hospitals provided contracts that did not appear to cover the audit’s period of review. Three of the eight hospitals entered into the contracts while the audit was ongoing. According to HRSA policy, a hospital that does not demonstrate that it had a contract for the entire audit period should be issued a finding of noncompliance and held responsible for repayment to manufacturers for any discounts received improperly during the period for which it did not have a contract. However, HRSA did not issue such findings or penalties for any of the hospitals we identified with contracts that did not cover the audit’s period of review. For example, in one case, officials said HRSA had included a finding in its draft audit report, but withdrew it when presented with a new contract with an effective date made retroactive to cover the audit’s entire period of review. in another case, a hospital that had been government-owned was sold to a private company in 2013, but did not switch its classification to nongovernmental until 2015, and did not sign a contract with a state or local government until it was audited in fiscal year 2018. The hospital’s contract, signed in 2018, included a retrospective attestation that the hospital had been providing care for the 340B-specified population since 2013. HRSA officials told us that they accept such retroactive documentation in conjunction with current, valid contracts on a case-by-case basis. As such, a hospital may avoid findings, and potential repayments to manufacturers, by asserting that it had been providing care even when a contract was not in place. To participate in the 340B Program, a nongovernmental hospital is required by statute and HRSA policy to have a contract with state or local government to serve the 340B-specified low-income population. Allowing hospitals to submit retroactive contracts after they have already begun participation in the program is inconsistent with HRSA’s responsibilities for oversight of the 340B Program, including ensuring that participating hospitals meet the statutory eligibility requirements. Further, allowing hospitals that are unable to demonstrate that they have contracts in place that cover the audit’s period of review to continue to participate in the 340B Program without consequence undermines the effectiveness of HRSA’s audit process and increases the risk that ineligible hospitals will receive discounts under the program. The 340B Program allows hospitals and certain other providers to stretch federal resources to reach more eligible patients and provide more comprehensive services. Participation in the 340B Program also can be beneficial for hospitals and other covered entities as they can realize substantial savings on covered outpatient drugs and generate revenue on those drugs. Hospital participation in the 340B Program, and hospital purchases of discounted drugs through the 340B Program, has risen rapidly over time. However, HRSA’s current processes and procedures do not provide reasonable assurance that nongovernmental hospitals seeking to participate and benefit from the 340B Program meet the program’s eligibility requirements. Given the weaknesses in HRSA’s oversight, some hospitals that do not appear to meet the statutory requirements for program eligibility are participating in the 340B Program and receiving discounted prices for drugs for which they may not be eligible. Although HRSA has initiated some efforts to strengthen its processes for assessing hospitals’ eligibility, continued growth in the number of participating hospitals and 340B- purchased drugs highlights the need for HRSA to improve its oversight processes. This is critical to safeguarding the integrity of the 340B Program. We are making the following six recommendations to HRSA: The Administrator of HRSA should ensure that the information it uses to verify nonprofit status for all nongovernmental hospitals that participate in the 340B Program is reliable—for example, by requiring and reviewing the submission of official documentation hospitals must already maintain or by ensuring the reliability of the data the agency uses. (Recommendation 1) The Administrator of HRSA should implement a process to verify that every nongovernmental hospital that participates in the 340B Program has a contract with a state or local government as required by statute. (Recommendation 2) The Administrator of HRSA should amend its contract integrity check procedures for the 340B Program to include a review of whether hospitals’ contracts with state and local governments require the provision of health care services to low-income individuals not eligible for Medicaid or Medicare as required by statute, and should provide guidance for staff to conduct these reviews. (Recommendation 3) The Administrator of HRSA should provide more specific guidance for 340B Program auditors on how to determine if nongovernmental hospitals’ contracts with state and local governments require the provision of health care services to low-income individuals not eligible for Medicaid or Medicare. (Recommendation 4) The Administrator of HRSA should revise its 340B Program audit procedures to require auditors to document their assessments of whether nongovernmental hospitals’ contracts with state and local governments are appropriately signed, cover the time periods under review, and require hospitals to serve low-income individuals not eligible for Medicaid or Medicare, such as by requiring auditors to separately affirm and record their review of each of these elements. (Recommendation 5) The Administrator of HRSA should require nongovernmental hospitals participating in the 340B Program to demonstrate that they have contracts with state or local governments in effect prior to the beginning of their audits’ periods of review and should apply consistent and appropriate consequences for hospitals that are unable to do so. (Recommendation 6) HHS provided written comments on a draft of this report, which are reproduced in appendix II, and technical comments, which we have incorporated as appropriate. In its written comments, HHS concurred with five of our six recommendations; it did not concur with one of them. In concurring with five of our recommendations, HHS stated that HRSA is evaluating its audit process and other program integrity efforts, and noted that HRSA has made improvements to strengthen its program integrity efforts that align with some of our recommendations. With respect to our recommendation to require auditors to document their assessments of the required elements of contracts, HHS concurred and noted that HRSA updated its audit procedures. Specifically, HRSA’s draft procedures for fiscal year 2020 audits require auditors to specify if the hospital provided a contract that includes the names and signatures for both the hospital and government agency, effective dates that cover the entire audit period, and that requires the provision of services to the 340B-specified low- income population. We are pleased that HRSA has already taken this step to implement our recommendation. To fully implement this recommendation, HRSA should incorporate these changes into its final audit procedures for fiscal year 2020. HHS also concurred with our recommendation to require nongovernmental hospitals to demonstrate that they have contracts in effect prior to the beginning of the audits’ periods of review, and to apply consistent and appropriate consequences if they do not. Also, as noted above, HRSA has updated its draft audit procedures to specify that auditors should look for effective dates that cover the entire audit period. While this is an important step, HRSA must also show that it has applied consistent and appropriate consequences when auditors find that nongovernmental hospitals did not have contracts in effect prior to the beginning of their audit periods. On a related issue, HHS expressed concern over and disagreed with our finding that HRSA allows hospitals to avoid audit findings by entering into new contracts while audits are being conducted, noting that HRSA assesses potential audit findings on a case-by-case basis to ensure that any necessary steps are taken to address issues. However, as we reported, HRSA officials have indicated that they accept retroactive contract documentation on a case-by-case basis; we continue to believe that this practice—accepting new contracts that are retroactive— effectively allows hospitals to avoid audit findings. In addition, while we agree that working with hospitals to address noncompliance is appropriate, we continue to believe that such efforts should be in addition to, not instead of, documenting noncompliance by issuing findings and applying appropriate consequences, in accordance with HRSA’s audit policies and procedures. To do otherwise undermines the integrity of HRSA’s audits, and increases the risk that ineligible hospitals will receive discounts under the program. HHS also concurred with our recommendation to ensure that the information HRSA uses to verify nonprofit status is reliable, but stated that HRSA believes that the information it uses from hospitals’ Medicare cost reports is reliable, because hospital administrators attest to the accuracy of their cost reports. However, as discussed in our report, neither HRSA nor CMS has evaluated the reliability of the cost report data for verifying nonprofit status, and a CMS official responsible for oversight of the cost reports told us that the question on the cost report is not clearly defined and may not be reported accurately. As such, we continue to believe that HRSA needs to assess the reliability of the Medicare cost report data should it continue to use those data for determining hospitals’ nonprofit status. Alternatively, HRSA could require hospitals to submit documentation of their nonprofit status, such as Internal Revenue Service documents, which HRSA acknowledged hospitals are required to maintain as part of their auditable records. HHS did not concur with our recommendation to implement a process to verify that every nongovernmental hospital that participates in the 340B Program has the statutorily required contract with a state or local government. HHS noted that it has requested authority to require hospitals registering for the 340B Program to submit documentation supporting the hospital classification that they select during registration. According to HHS, if approved, HRSA would begin collecting and reviewing contracts from all newly registering nongovernmental hospitals. However, HHS stated that HRSA does not have the resources to collect, review, and verify that every participating nongovernmental hospital has a contract with a state or local government. While we understand that verifying the existence of contracts for all participating nongovernmental hospitals would require additional effort on HRSA’s part, our review found that relying on hospitals’ attestations is not sufficient to ensure hospitals’ eligibility. Additionally, implementing a process to verify the existence of a contract does not necessarily require that HRSA collect and review contracts from every hospital. There are other potential options, such as obtaining confirmation from the state or local government that they indeed have a contract with the hospital to provide services to the 340B-specified low-income population. HHS also commented that implementing our recommendation would create a significant burden on covered entities. However, as we noted in our report, HRSA already requires hospitals to maintain copies of their state or local government contracts. Therefore, it is unclear how implementing a process to verify the existence of those contracts would represent a significant burden for nongovernmental hospitals already registered for the program. Ensuring the eligibility of covered entities that participate in the 340B Program is essential for program integrity. As such, we continue to believe that HRSA needs to take action, beyond relying on hospitals’ self-attestations, to verify that all participating nongovernmental hospitals have contracts with state or local governments that meet the statutory requirements of the program. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of HHS, the Administrator of HRSA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or draperd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other major contributors to this report are listed in appendix III. Table 1 provides information about the 240 contracts between hospitals and state or local governments that were included in our review, including information about the type of hospital and the level of government that were parties to the contract. In at least two cases, the hospitals contracted with other health care providers who were themselves 340B Program participants, such as a community health center operated by a local health department. Officials signing on behalf of state and local governments included individuals with executive positions, such as the heads of state agencies, mayors, and county executives, but also included a city alderman, a vice-chancellor for finance at a state university health system, and a juvenile court judge. In addition to the contact named above, Michelle Rosenberg, Assistant Director; Hannah Locke, Analyst-in-Charge; Jennie Apter; George Bogart; Kaitlin Farquharson; Matthew Green; Vikki Porter; Daniel Ries; Brienne Tierney; and William T. Woods made key contributions to this report.", "summary": "The number of nongovernmental hospitals participating in the 340B Program has grown over time. HRSA requires participating hospitals to register and annually recertify their eligibility. HRSA also reviews hospitals' eligibility through audits of a small sample each year. GAO was asked to provide information on 340B-participating hospitals' contracts with state and local governments. This report (1) describes any obligations in selected nongovernmental hospitals' contracts to serve low-income individuals, and (2) examines HRSA's processes to assess nongovernmental hospitals' eligibility. GAO examined contract documentation from all 258 nongovernmental hospitals HRSA reviewed in 2017 and 2018; and HRSA's policies, procedures, and guidance related to 340B hospital eligibility. GAO also interviewed HRSA officials. Under the 340B Drug Pricing Program (340B Program), administered by the U.S. Department of Health and Human Services' (HHS) Health Resources and Services Administration (HRSA), drug manufacturers provide discounted prices on outpatient drugs to certain hospitals and other entities. About two-thirds of hospitals participating in the 340B Program (approximately 1,700) are nongovernmental hospitals (private, nonprofit hospitals), which qualify for the program, in part, based on having contracts with state or local governments to provide health care services to the 340B-specified low-income population—low-income individuals not eligible for Medicaid or Medicare. GAO's review of contract documentation for 258 nongovernmental hospitals found that most contracts obligated these hospitals to provide health care services to low-income individuals. However, few of the contracts reviewed included details about those obligations, such as the amount or type of care hospitals were required to provide. The statute does not require the contracts to contain such details. GAO found that HRSA's processes do not provide reasonable assurance that participating nongovernmental hospitals meet eligibility requirements. For example, HRSA primarily relies on hospitals' self-attestations to verify the existence of contracts with state and local governments. The agency reviewed contract documentation for less than 10 percent of nongovernmental hospitals per year in 2017 and 2018. GAO also identified several weaknesses in HRSA's review of the nongovernmental hospital contracts: HRSA does not conduct reviews to determine whether the documents submitted by nongovernmental hospitals are actual contracts, namely that they are mutually binding agreements to provide services or supplies in exchange for something of value. GAO found that 18 of the 258 hospitals reviewed submitted documents that did not appear to be contracts, such as descriptions of community programs, yet all of these hospitals were permitted to participate in the program. When audits have identified hospitals that did not have contracts in place throughout the audits' periods of review, HRSA has allowed hospitals to avoid audit findings by, for example, entering into new contracts with retroactive start dates. This practice undermines the integrity of HRSA's audits. HRSA's contract reviews do not always include assessments of whether contracts are consistent with the statutory requirement to provide health care services to the 340B-specified low-income population and HRSA's guidance for conducting such assessments, when required, lacks detailed instructions. As a result, GAO found that contracts for 13 hospitals reviewed did not appear to require hospitals to serve the 340B-specified low-income population. Despite this, these 13 hospitals were permitted to participate in the program. Given these weaknesses, some nongovernmental hospitals that do not appear to meet the statutory requirements for program eligibility are participating in the 340B Program and receiving discounted prices for drugs for which they may not be eligible. GAO is making six recommendations, including that HRSA implement a process to verify that all nongovernmental hospitals have contracts in place, including throughout hospitals' audit periods; amend its contract reviews to include an assessment of whether contracts meet statutory requirements; and provide better guidance on contract reviews. HHS concurred with all of the recommendations except the one to implement a process to verify that all nongovernmental hospitals have contracts. GAO continues to believe this action is needed to ensure that only eligible hospitals are allowed to participate in the 340B Program.", "document_type": "gao"}
{"report": "As shown in figure 2, a number of activities led up to OMB publishing the reform plan in June 2018, and subsequently OMB has provided updates on the proposals in the reform plan. In March 2017, the President issued an executive order requiring comprehensive reorganization plans for executive branch agencies. In April 2017, OMB provided guidance to federal agencies for developing their respective reform plans. According to this guidance, the government-wide reform plan was to have been based on the agency reform plans, OMB-coordinated crosscutting proposals, and public input. In addition, OMB’s guidance indicated that OMB would track the progress of the reforms in coordination with the President’s Management Council. OMB’s guidance also stated that it would track progress of the reforms by leveraging the federal performance planning and reporting framework that was originally put into place by the Government Performance and Results Act of 1993 (GPRA), and significantly enhanced by the GPRA Modernization Act of 2010 (GPRAMA). Accordingly, OMB’s guidance explained that progress would be tracked through the use of cross- agency priority (CAP) goals, agency priority goals, and Performance.gov. In March 2018, OMB released the President’s Management Agenda, which identified a set of CAP goals, required under GPRAMA. The CAP goals target areas where multiple agencies must collaborate to effect change, and agencies must report CAP goal progress in a manner the public can easily track. In June 2018, the administration released its government-wide reform plan, Delivering Government Solutions in the 21st Century: Reform Plan and Reorganization Recommendations (reform plan). In July 2019, the administration reported on the first year of progress toward its reform proposals. According to the 1-year update, the President’s Fiscal Year 2020 Budget included 18 of the proposed reform proposals in whole, or in part, and also described administrative actions by agencies to implement more than 20 of its 32 proposals. Of these proposals, the administration reported progress toward four of the five reforms we selected for review: (1) moving personnel security clearance background investigations from OPM to DOD; (2) solving the cybersecurity workforce shortage; (3) establishing the GEAR Center; and (4) reorganizing OPM. OMB officials said that they are not planning to move forward with the customer experience improvement capability reform during fiscal year 2020 because they are pursuing other customer experience activities, such as those included in the CAP goal for Improving Customer Experience with Federal Services. We added the government-wide personnel security clearance process to our High-Risk List in January 2018 because it continues to face challenges in the timely processing of clearances, measuring the quality of investigations, and ensuring the security of related information technology (IT) systems. The National Defense Authorization Act (NDAA) for Fiscal Year 2018 included provisions that resulted in the transfer of background investigations from OPM’s National Background Investigations Bureau (NBIB) to DOD for certain DOD personnel, which represented approximately 70 percent of all federal background investigations performed by NBIB. Subsequently, the selected reform proposal recommended moving the remaining 30 percent of investigations to DOD. According to the reform plan, this transfer would provide an opportunity to conduct the background investigations more efficiently and economically than having them be performed by separate agencies. In January 2019, DOD formally established the Personnel Vetting Transformation Office (PVTO) to implement and oversee activities related to the transfer of NBIB functions. In April 2019, the President issued Executive Order 13869 which generally provided for the transfer of the remaining background investigation operations from OPM to DOD. The executive order also called on the Secretary of Defense to enter into an agreement with the Director of OPM to set forth expectations and designate the appropriate support functions for the transfer. As directed, in June 2019, OPM and DOD signed an interagency memorandum that set forth expectations for activities necessary for the transfer of functions of NBIB and associated employees and resources from OPM to DOD, including measurable deliverables, key considerations for executing deliverables, and processes for coordination and governance. According to documents we received from DOD, the transfer of NBIB functions to DOD occurred by September 30, 2019, as required by the April executive order. As shown in figure 3, OMB, OPM, and DOD have generally addressed most key reform practices in implementing the transfer of background investigations from OPM to DOD. According to DOD, more than 99 percent of NBIB employees, totaling 2,979 individuals, accepted positions transferring them to DOD’s Defense Counterintelligence and Security Agency (DCSA) by September 30, 2019. According to the DOD’s PVTO Director, 17 individuals chose not to transfer, and instead retired as permitted. Going forward, we will continue to monitor the government- wide personnel security clearance process as part of our work to identify and assess high-risk issues across the government. OMB, OPM, and DOD have generally addressed key practices related to establishing goals and outcomes. The NDAA for Fiscal Year 2018 and Executive Order 13869 established a goal and related requirements for the transfer of OPM’s NBIB personnel, resources, and functions to DOD. Specifically, the executive order established a goal to complete the transfer of all NBIB administrative and operational functions to DOD by September 30, 2019. The executive order also outlined a series of deliverables and objectives for OMB, OPM, and DOD to achieve during the transfer. For example, the executive order required DOD to execute a written agreement with OPM to establish expectations for the transition period related to detailing personnel, safeguarding information technology, contracting, and funding background investigations, among others. OPM and DOD achieved their intended goal, and as of September 30, 2019, DOD is the primary provider of national security background investigations for the federal government. As directed, OPM and DOD signed an interagency agreement in June 2019 to address expectations, including governance, information technology, contracting, and funding issues, among others. According to documents provided by DOD, the Transfer Tollgate group and the Executive Steering Committee provided interagency leadership including an executive-level decision venue for implementation, resourcing, and other decisions. According to DOD, these interagency groups also provided accountability for implementation milestones. Under the leadership of these two groups, DOD officials shared with us that they worked with OPM to resolve a host of issues such as the transfer of personnel, funding for transfer costs, transfer of information technology assets, financial management issues, and acquisition concerns, among other critical issues. To help address differences in the financial management and funding of background investigations between OPM and DOD, the agreement required DOD to establish a Working Capital Fund to fund DCSA’s background investigation mission by September 1, 2019. According to DOD officials and the agency’s Transfer Status Dashboard, the Working Capital Fund was established prior to the September 1, 2019, deadline; and, as of October 7, 2019, the fund had a balance of approximately $1 billion. Neither the NDAA for Fiscal Year 2018 nor the executive order outlined measurable outcomes related to the efficient and effective delivery of background investigations, but rather goals and deliverables related to transferring NBIB functions to DOD, among other things. According to DOD officials we spoke with, the reform’s objective was the timely transfer of background investigation functions and coordination between affected agencies and stakeholders. DOD officials explained that following completion of the transfer, on October 1, 2019, PVTO, in coordination with other DOD components and federal stakeholders, began work transforming DCSA’s processes and procedures, including the background investigation process, to improve outcomes. OMB, OPM, and DOD generally addressed key practices related to involving employees and key stakeholders. OPM and DOD generally communicated with affected employees and key stakeholders and involved them in the implementation of the transfer of NBIB functions to DOD. Agencies’ communication included email correspondence to affected staff from agency leaders including OPM’s Acting Director, and the Director of NBIB. These emails provided NBIB staff regular updates on the status and details surrounding the transfer of NBIB functions to DOD. Based on documents provided by OPM, communication to affected staff began in June 2017, informing staff that Congress was considering a legislative proposal to move certain NBIB functions to DOD. According to documents we received, communication with staff has continued regularly since this time, including a July 29, 2019, message to affected staff with an official notice that NBIB employees would be offered an appointment to DOD’s DCSA effective September 29, 2019. This notice explained that OPM’s NBIB employees accepting this appointment would transfer to DOD without changes to their duty stations, grades, or benefits. In addition to email communication, in-person town hall meetings were held between agency leaders and affected staff to provide updates on the status of the transfer and answer questions. According to OPM’s then NBIB Director, a July 2017 town hall was held addressing the congressional proposal to move the majority of NBIB staff to DOD. The Director also reported that OPM and DOD had worked via meetings, information exchanges, site visits, and communication at all levels in the organization to assemble information on the implication of the transfer and its potential impacts. OPM officials testified at a number of hearings in 2018 and 2019 related to the transfer, and OPM officials told us that they joined DOD in providing quarterly briefings required by the NDAA for Fiscal Year 2018, on the status and progress of the transfer. DOD and OPM also developed a Joint Transfer Plan that described strategic communication activities with affected employees, contractors, and other stakeholders including public media outlets, ourselves, and state and local law enforcement agencies, among others. DOD officials at the PVTO explained that they developed a more detailed communication plan in March 2019 that was implemented prior to the transfer. OMB, OPM, and DOD have partially addressed key practices related to addressing high-risk areas and longstanding management challenges. As previously mentioned, we placed the government-wide personnel security clearance process on our High-Risk List because of continuing challenges in the timely processing of clearances, measuring the quality of investigations, and ensuring the security of related IT systems. While OMB and lead agencies have considered our related high-risk work, the reform proposal and implementation plans do not demonstrate how the transfer and delegation of background investigation functions from OPM to DOD will address these challenges. Moreover, in November 2019, OPM’s Inspector General identified the background investigation legacy information systems as an ongoing top management challenge that will need to be addressed by both OPM and DOD moving forward. The Director of the PVTO told us that the office’s initial goal was to ensure a smooth and timely transition of functions from OPM’s NBIB to DOD by the beginning of fiscal year 2020. The Director also told us that after the transfer occurred, the office would shift its focus to address our high-risk area by, among other things, transforming these security clearance services to optimize processes government-wide. Specifically, the PVTO charter established a goal to “identify efficiencies to be gained, areas where the organizational structure and business services may be incomplete, maximize synergy where possible, and propose mitigation strategies to address gaps and shortfalls.” We will continue to monitor the government’s progress toward addressing security clearance challenges as part of our work to track high-risk issues across the government. OMB, OPM, and DOD have generally addressed key practices related to leadership focus and attention. In particular, Executive Order 13869 outlined the roles and responsibilities of OMB, OPM, and DOD, and authorized a new office (PVTO) to assist in the execution of the transfer. The executive order also clarified agencies’ roles and requirements for coordinating the transfer, delegation, and other activities. Specifically, the executive order directed the Secretary of Defense and the OPM Director, in consultation with the OMB Director and the Security Executive Agent, to provide for the transfer of the bulk of OPM’s investigative functions to the DCSA, along with any appropriate OPM-associated personnel and resources, including infrastructure and certain investigation-related support functions. With regard to a dedicated implementation team, PVTO was responsible for ensuring coordination and resource alignment during the transfer, as well as ensuring that personnel security background investigations continued without disruption during the transfer. The PVTO Director told us in July 2019 that his team reports directly to the Office of the Under Secretary of Defense for Intelligence. The Director stated that he has experience in the areas of acquisitions, mergers, and reorganizations, and has support from experts and top leadership throughout the department. In addition, the PVTO charter states that the office be composed of employees with extensive experience and expertise in personnel vetting processes and reform efforts, as well as business and technology innovation, program evaluation, acquisitions and mergers, and organization and change management. OMB, OPM, and DOD have generally addressed key practices related to managing and monitoring. Specifically, PVTO developed a joint transfer plan outlining critical assumptions for the transfer, major activities, and time frames across nine functional areas, including personnel, training, information technology, financial management, acquisitions, strategic communications, and security, among others. For each functional area, the transfer plan provided a summary of the functional area’s objective and a set of recommended major activities. For example, the functional area for IT had an objective to provide secure, current hardware and software in compliance with DOD and federal standards, and promote the unique requirements of a highly mobile, geographically dispersed workforce managing significant volumes of personally identifiable information and other sensitive data. Major activities included: (1) the transfer of IT infrastructure, (2) the completion of a gap analysis to determine which NBIB systems and hardware are transferrable or require new acquisitions, and (3) the provision of secure devices that support mobile operations. The PVTO Director also showed us a detailed implementation plan organized around the nine functional areas identified in the broader joint transfer plan. The implementation plan tracked thousands of activities and provided a detailed timeline for completion. The Director also provided us a dashboard that his team used to track implementation progress. The Director told us that his office used the dashboard to manage and monitor the transfer daily. The dashboard allowed the implementation team to identify areas where attention was needed using red, yellow, and green stoplight indicators signaling the status of major objectives. The annual assessments of timeliness and quarterly briefings required by the NDAA for Fiscal Year 2018 also serve as mechanisms for Congress and the executive branch to monitor timeliness, costs, and continuous evaluation, among other things. OMB also publishes quarterly milestone progress and metrics on the related Security Clearance, Suitability, and Credentialing Reform cross-agency priority goal on Performance.gov. OMB, OPM, and DOD have generally addressed key practices related to employee engagement. In addition to the communication and outreach activities described above, OPM and DOD have undertaken additional efforts to engage affected employees and monitor levels of employee engagement at both agencies. For example, according to DOD officials, to engage and communicate with affected employees the agency held several town hall meetings to provide information and answer questions. They also said that DOD leadership regularly emailed affected staff providing updates on the status of the transfer and held separate question-and-answer sessions to keep staff informed and engaged. According to PVTO planning documents, the office also developed a strategy to achieve stakeholder buy-in through empowering leaders and through efforts to build a coalition of stakeholders around a common vision for the future of the background investigation function at DOD. In April 2019, OPM also conducted an internal survey of agency staff to collect information on employees’ perceptions of the transition to DOD, personal work experiences, satisfaction with their job, and any intent to leave DOD and reasons for leaving. The survey asked NBIB employees the extent to which they felt informed about the upcoming transition to DOD. According to the roughly one-third of staff who responded, 35 percent felt extremely or moderately informed, 32 percent felt somewhat informed, and 33 percent felt slightly or not at all informed. Approximately 75 percent of the survey respondents reported that they had enough information to do their job well, and 74 percent reported that they were proud to tell others they worked at their organization. When asked about satisfaction with involvement with decisions that affect their work, 38 percent of respondents were positive, 34 percent were neutral, and 28 percent were negative. OPM officials told us that they continued to monitor engagement of NBIB staff throughout the transition. OPM and DOD have partially addressed key practices related to strategic workforce planning. In March 2019, we reported that, to make progress on removing the Government-wide Personnel Security Clearance Process from our High-Risk List, OPM and DOD should develop and implement a comprehensive strategic workforce plan that identifies the workforce needed to meet the current and future demand for its services, as well as reduce the current backlog to a manageable level. OPM completed this action in September 2019 with the release of the NBIB Strategic Workforce Plan for the Background Investigation Mission. The strategic workforce plan includes initiatives to strengthen investigative workforce capacity and training, promote the use of different hiring authorities, and provide succession planning, among other initiatives. According to the plan, senior leadership will build upon the strategic workforce plan to create an implementation strategy. While OPM has taken action, DOD has yet to complete its workforce plan. As of October 2019, DOD’s strategic workforce plan for the new DCSA enterprise was under development. In response to our request for information, OPM, DOD, and OMB provided information regarding the authorities they are using to implement the reform proposal to move all background investigations from OPM to DOD. According to OPM and OMB, the legal authorities by which NBIB moved to DOD consisted of section 925 of the National Defense Authorization Act for Fiscal Year 2018 (NDAA 2018) and Executive Order 13869, issued in April 2019, which re-designated DOD’s DCSA as the primary investigative service provider for national security investigations. OPM also cited 5 U.S.C. § 1104, which permits OPM to delegate certain personnel management functions to other agencies. Section 925 of the NDAA 2018 authorized DOD to conduct its own background investigations and required DOD to begin carrying out an implementation plan required under the National Defense Authorization Act for Fiscal Year 2017 (NDAA 2017) by October 1, 2020. The NDAA 2018 also required the Secretary of Defense, in consultation with the OPM Director, to provide for a phased transition of DOD background investigations from OPM to DOD. According to OPM, the DOD background investigations, consisting of investigations for civil service, military, contract, and non-appropriated fund personnel, constitute approximately 70 percent of the work performed by NBIB. Executive Order 13869 provided for the transfer of the primary responsibility for conducting national security background investigations, government-wide, from OPM to DOD. The executive order designated DOD, rather than OPM, as the agency to serve as the primary entity for conducting background investigations for national security adjudications, pursuant to and consistent with the NDAA 2018 and section 3001(c) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). According to OPM, this has the effect of moving the remaining national security investigations, not already transferred by section 925 of the NDAA 2018, to DOD. The Executive Order also acknowledged that OPM will delegate, pursuant to 5 U.S.C. § 1104, other background investigation functions to DOD for non-DOD personnel, such as investigations performed to enable the adjudication of the subject’s suitability or fitness for federal employment, eligibility for logical or physical access to systems and facilities, fitness to perform work for a federal agency under a government contract, and fitness to work as a nonappropriated fund employee. In accordance with the executive order, DOD and OPM signed an agreement on June 25, 2019 that set forth the expectations for necessary activities for the transfer of functions of the NBIB from OPM to DOD. The agreement provided that the period of transition was from June 24, 2019, through September 30, 2019. The agreement covered such areas as personnel, information technology, facilities and property, contracting, administrative support, records access, claims, and funding. This reform proposal directs OMB and DHS, in coordination with other agencies, to prioritize and accelerate efforts to recruit, evaluate, hire, pay, and distribute cybersecurity talent across the federal government. Ensuring the cybersecurity of the nation is a longstanding challenge that has been on our High-Risk List for more than two decades. Efforts to solve the cybersecurity workforce shortage will help to address a number of high-risk issues we have previously identified. To accomplish the objective of filling cybersecurity vacancies, the reform lays out a series of projects and activities intended to identify and close workforce skills gaps and develop a standardized approach to hiring, training, and retaining qualified cybersecurity professionals. Specifically, the proposal calls for: identifying and categorizing the federal cybersecurity workforce using the National Initiative for Cybersecurity Education Cybersecurity Workforce Framework (NICE framework), implementing DHS’s Cyber Talent Management System (CTMS) with options to expand the capability across the government, rationalizing and expediting the security clearance process, standardizing training for cybersecurity employees, increasing the mobility of cybersecurity positions, developing plans to establish a cybersecurity reservist program to provide needed surge capacity, reskilling federal employees to fill critical cyber positions, and rationalizing the size and scope of federal cybersecurity education programs. As shown in table 2, OMB, DHS, and other federal agencies have made progress in implementing certain projects and activities included in the reform proposal. Although OMB and DHS have several projects and activities underway related to this reform, they did not provide us with information about the government-wide goals or implementation plans for the proposal. In November 2019, OMB staff told us that they did not have additional information to share regarding their application of key reform practices because they are still developing this reform. As a result, we found that most of the key reform practices were partially met (see figure 4). We did obtain information showing that OMB and DHS addressed key practices for some of the projects and activities included in the reform proposal, but the extent to which these practices were being applied to the reform proposal as a whole, or being coordinated government-wide, was unclear. OMB and DHS have partially addressed key practices related to establishing goals and outcomes. We found that this reform established an objective to solve the cybersecurity workforce shortage across the government, and DHS established outcome-oriented goals and performance measures for certain agency-specific projects that are part of the reform. For example, as shown in table 2, DHS established a measure to hire at least 150 cybersecurity professionals at the agency during fiscal year 2020 using its new Cyber Talent Management System. In addition, DHS provided us its 2017 Comprehensive Cybersecurity Workforce Update, which includes an array of data and analysis, including cybersecurity workforce trends, metrics on DHS components’ vacancies, attrition, capacity gaps, hiring, and other information describing the status of the agency’s cybersecurity workforce. The administration also released a National Cyber Strategy in September 2018 outlining broad activities related to the government-wide reform such as building a talent pipeline, reskilling employees, and improving the process of recruiting and retaining qualified cybersecurity professionals. These documents may provide a first step toward developing clear outcome-oriented goals and performance measures for the reform as a whole. However, OMB and DHS have not yet established measurable outcome- oriented goals for the government-wide projects and activities outlined in the reform proposal. For example, there are not government-wide measurable goals for hiring cybersecurity professional across the government, reductions to attrition, training, or other aspects of the reform. As shown in table 2, OMB and agencies have made progress on a number of areas related to the reform; however, without establishing government-wide measurable goals and outcomes, OMB and DHS will not be able to determine whether progress is being made across the federal government to solve the cybersecurity workforce shortage. OMB and DHS have partially addressed key practices related to involving employees and key stakeholders. We obtained information on targeted outreach to employees and stakeholders for certain projects and activities outlined in the reform, but as of November 2019, OMB and DHS did not have information on how they were addressing these key practices for the reform as a whole. For example, DHS’s Cybersecurity and Infrastructure Security Agency (CISA) officials told us that they participate in interagency coordination activities related to the NICE framework with OMB, the Department of Commerce National Institute of Standards and Technology (NIST), the Federal Chief Information Officers Council, and outside stakeholders. CISA officials said they worked with government and industry stakeholders to develop the NICE framework, and are working with educators and certification vendors to help build a pipeline of cybersecurity talent. Additionally, in March 2019, we reported that OPM and NIST coordinated with academia and the private sector to develop a cybersecurity coding structure that aligns with the work roles identified in the NICE framework. While OMB and DHS conducted outreach for certain projects and activities included in the reform proposal, it is unclear what, if any, outreach occurred for other projects. However, without a government- wide or project-by-project plan for communicating with and involving employees and stakeholders across the government, OMB and lead agencies will not know if certain agencies or employee groups are being adequately involved and informed. We have previously reported that creating an effective, ongoing communication strategy is essential to implementing a government-wide reform. The most effective strategies involve communicating early and often, ensuring consistency of message, encouraging two-way communication, and providing information to meet the specific needs of affected employees. This reform will be more likely to achieve its intended objective if OMB and DHS establish effective lines of communication with affected federal employees and the broader cybersecurity community. OMB and DHS have partially addressed key practices related to addressing high-risk areas and longstanding management challenges. We have designated information security as a government-wide high-risk area since 1997. We expanded this high-risk area in 2003 to include protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of personally identifiable information. OMB and DHS generally considered areas that we previously identified as high-risk. OMB staff and DHS officials told us that they considered our high-risk reports when developing reform proposals, and have provided some documentation of these considerations. For example, OMB’s former Deputy Director for Management stated that, when developing the Solving the Cybersecurity Workforce Shortage reform, OMB used our 2017 High-Risk Series and noted that of more than 2,500 past recommendations, about 1,000 still needed to be implemented. OMB also identified several of our reports that touch on cybersecurity workforce issues. Although OMB and DHS have considered our prior work, as of November 2019, they had not demonstrated how the projects and activities outlined in the reform proposal would address our related high-risk issues and open recommendations. Without more detailed information describing how our high-risk issues are being addressed across the reform projects and activities, it is unclear which issues and recommendations are being targeted, and which are outside of the scope of this reform. OMB and DHS have partially addressed key practices related to leadership focus and attention. In May 2019, the President issued Executive Order 13870 requiring federal agencies to take a variety of actions related to cybersecurity, including efforts to enhance the mobility of cybersecurity practitioners, support the development of cybersecurity skills, and create organizational and technological tools to maximize cybersecurity talents and capabilities. Many of the actions outlined in this executive order align with the stated objectives and components outlined in the reform proposal. However, neither OMB nor DHS have created a dedicated team with necessary resources to manage and implement this reform on a government-wide scale. Moreover, DHS staff we spoke with told us that OMB was the government-wide lead for this reform, and their agency was responsible for a subset of the projects and activities outlined in the reform proposal. OMB staff did not provide us with any plans or other documents regarding the individuals or team responsible for implementation across the government. OMB staff explained that DHS’s CISA and the Federal Chief Information Security Officer Council have some responsibility for federal cybersecurity workforce issues; however, they did not clarify which organization, team, or individuals were responsible for coordinating and implementing the reform government- wide. Our prior work has shown that establishing a strong and stable team that will be responsible for the transformation’s day-to-day management is important to ensuring that it receives the resources and attention needed to be successful. A dedicated leadership team responsible for overseeing and implementing the reform can also help ensure that various change initiatives are sequenced and implemented in a coherent and integrated way. OMB and DHS have partially addressed key practices related to managing and monitoring. DHS has developed some agency-specific implementation plans and mechanisms to monitor progress. For example, DHS provides progress updates to Congress related to its continued efforts to code cybersecurity positions and to review the readiness of the cybersecurity workforce to meet DHS mission requirements, among other agency-specific assessments. However, OMB and DHS have not yet developed a government-wide implementation plan with goals, timelines, key milestones, and deliverables for the reform proposal as a whole. As previously discussed, OMB staff told us that they did not yet have a government-wide reform plan because they are still developing this reform. Without a government-wide implementation plan to track and communicate implementation progress, OMB and DHS will be unable to determine whether the reform is achieving its intended objectives, or whether unanticipated challenges or negative workforce trends are impeding efforts to close the cybersecurity workforce gaps across the government. OMB and DHS have not addressed key practices related to employee engagement. In February 2019, DHS officials told us that the agency had not yet reached the stage of implementation for its projects and activities where they were considering employee engagement in this reform. According to DHS officials, they have started collecting data on employees, but have not interacted with individual employees on specific reform initiatives. As of November 2019, OMB had not provided information on its efforts to engage affected employees across the government on this reform. We have reported that employee engagement affects attrition, absenteeism, and productivity. Moreover, we have found that failure to adequately address a wide variety of people and cultural issues, including employee engagement, can also lead to unsuccessful change. We identified six key drivers of engagement based on our analysis of selected questions in the Federal Employee Viewpoint Survey, such as communication from management. Given that the objective of this reform is to address a critical workforce skills gap, it is important that OMB and DHS remain attentive to the engagement levels of cybersecurity employees across the government to ensure that productivity and morale are not adversely affected. As previously discussed, OMB and DHS lack a government-wide or project-by-project plan for communicating with and involving employees across the government. Such a communications strategy could be used to inform and, as appropriate, involve employees on implementation of the reform. OMB and DHS have partially addressed key practices related to strategic workforce planning. As set forth in the Cybersecurity Workforce Assessment Act, DHS developed and published its Cybersecurity Workforce Strategy for 2019 through 2023. DHS’s strategy contains a 5- year implementation plan and a set of goals and objectives. Goals and objectives include an analysis of DHS’s cybersecurity workforce needs, a multi-phase recruitment strategy, professional and technical development opportunities, and plans to develop a talent management system, among others. OMB and DHS have yet to develop a government-wide cybersecurity strategic workforce plan that addresses the needs of all federal agencies. However, because this reform is focused on addressing a government- wide workforce shortage, it is particularly important that OMB and DHS complete their efforts to develop a strategic workforce plan for cybersecurity professionals that takes into account existing workforce capabilities, workforce trends, and shortages across the government. Without this information, DHS and OMB will not be able to determine if they are making progress or when they have addressed the government’s cybersecurity workforce shortage. DHS identified some existing legal authority for implementing aspects of the reform proposal, but neither DHS nor OMB provided us with a legal analysis for full implementation of the reform. OMB’s General Counsel stated, in a November 2019 letter to us, that OMB continues to collaborate with DHS and other federal agencies on a wide range of measures to address the cybersecurity workforce shortage. OMB stated that efforts had been within the confines of various current laws and appropriations, and that new legislation had not been required for any of these efforts. OMB did not provide additional details on the existing legal authorities on which it is relying. OMB also stated that the administration would seek legislation for any efforts beyond the scope of what is permitted under current law. DHS identified activities it is currently implementing related to the reform proposal that were previously authorized or required by law. For example, the CISA Chief Counsel identified DHS’s effort in establishing the forthcoming Cyber Talent Management System (CTMS) as a reform activity authorized by statute. The Chief Counsel noted DHS was authorized to establish this new personnel system for recruitment and retention of cybersecurity workers by the Border Patrol Agent Pay Reform Act of 2014. Under the act, DHS may establish cybersecurity positions; appoint personnel; fix rates of pay; and provide additional compensation, incentives, and allowances, subject to certain restrictions. The authority to implement this new system, however, is limited to DHS, and DHS officials acknowledged that CTMS cannot be implemented government-wide without statutory authorization. Additionally, DHS officials identified work being conducted at DHS to identify and categorize cybersecurity workforce positions, another activity related to the reform proposal and required by statute. Specifically, DHS was required by the Homeland Security Cyber Workforce Assessment Act of 2014, to: identify all cybersecurity workforce positions, determine the cybersecurity work category and specialty area of such assign data element codes developed by OPM in alignment with the NICE framework for each position. Furthermore, the Federal Cybersecurity Workforce Assessment Act of 2015 required OPM, in consultation with DHS, to identify critical needs for the IT, cybersecurity, or cyber-related workforce across federal agencies and to report to Congress on the identification of IT, cybersecurity, or cyber-related work roles of critical need. DHS officials also explained that, consistent with the 2015 act, it is currently working with other agencies and with industry to catalogue the federal cybersecurity workforce. The CISA Chief Counsel also identified DHS authorities that, under subchapter II of chapter 35 of Title 44 of the United States Code, CISA could leverage when implementing reform activities having government- wide or interagency impacts. Under these authorities, CISA (in consultation with OMB) administers the implementation of agency information security policies and practices, assists OMB with carrying out its responsibilities for overseeing agency information security policies and practices, and coordinates government-wide efforts on information security policies and practices. The Chief Counsel added that CISA “continues to consider, new, more specific…statutory authority aligned to specific reform responsibilities.” The administration is working toward establishing the GEAR Center, which it described in the reform plan as a vehicle for applied research that would help improve government operations and decision-making. OMB staff stated that the GEAR Center would be administered as a public- private partnership, and that the administration spent about $3 million for it in fiscal years 2018 through 2020 from available appropriations (see table 3). On Performance.gov, OMB provided options for the GEAR Center’s structure; it could be housed in a physical location, composed of a network of researchers working in multiple locations, or follow a different model. The administration does not envision that the GEAR Center will require government funds to conduct all of its initiatives in the long term. Instead, OMB staff said that the private sector would help fund its work after an initial stand-up period. According to the reform plan, GEAR Center research could help inform, for example, how the government responds to technological advances, how to provide better customer service experiences, and how to better leverage government data. In March 2019, OMB staff told us that they planned to establish the GEAR Center in fiscal year 2019, but as of February 2020, the center had not been formally established. To date, OMB staff have conducted preparation activities for establishing the GEAR Center, such as gathering stakeholder input through a Request for Information and a GSA- administered GEAR Center challenge competition to learn more about the types of projects a GEAR Center could facilitate. Through the challenge, GSA requested ideas on possible research projects, as well as related materials such as a project plan and ways to measure success. The challenge competition judges, which included OMB staff, selected three winning project plans with a prize of $300,000 each (for a total of $900,000). GSA specified that the cash prizes were for high potential project plans, and not grants to execute work on behalf of the government. In September 2019, GSA announced and awarded the winners of the GEAR Center challenge. The grand prize winners submitted 1-year project plans to: (1) help solve the federal cybersecurity workforce shortage by involving neurodiverse individuals, such as those with autism; (2) integrate currently disparate datasets to measure the impact of a federally funded program; and (3) train federal employees on how to better use their data for decision-making and accountability. In addition to the challenge competition, OMB contracted with the Center for Enterprise Modernization, a Federally Funded Research and Development Center operated by the MITRE Corporation, to examine options for operating the GEAR Center, in two projects. The first project— conducted from July 2019 through September 2019—was to explore a number of options for operating the GEAR Center. Following the first project, OMB staff laid out three tasks to accomplish during calendar year 2020 that they said would help them establish the GEAR Center: (1) establish a central coordinating function for the GEAR Center, (2) build the GEAR Center’s network of research partners, and (3) develop a draft government-wide learning agenda with input from federal agencies to inform the GEAR Center’s research and piloting activities. For the second project—which began in September 2019 and is scheduled to be completed in July 2020—the contractor is to provide additional detail on options for operating the GEAR Center, including on creating a network of research partners to support the GEAR Center. Table 3 provides details on these expenditures. As shown in figure 5, OMB has generally addressed most of our relevant key reform practices, and partially addressed the others. OMB staff generally addressed key practices related to determining the appropriate role of the federal government for the GEAR Center. While OMB staff have not developed a detailed governance structure for the GEAR Center, they have determined, with input from the private sector, that the GEAR Center will be a public-private partnership. Specifically, OMB staff considered the private sector’s ability or likelihood to invest its own resources in the initiatives the GEAR Center undertakes and otherwise contribute to the GEAR Center’s work. OMB did this by formally seeking the private sector’s input on these topics first through a Request for Information, and subsequently through a challenge competition. OMB has partially addressed key practices related to establishing goals and outcomes. Specifically, OMB has initiated a process for developing outcome-oriented goals and performance measures for the GEAR Center, but has not finalized them. The GEAR Center challenge competition asked respondents to provide short- and long-term outcome- focused measures of success for the proposed projects in their submissions. However, as of November 2019, OMB staff told us they have not finalized these goals and measures for the GEAR Center. They stated that this is because they have not yet analyzed the results of the progress made by the challenge competition’s grand prize winners, and because they believe the purpose, or broad goal, of the GEAR Center is sufficient for their purposes at this stage of implementation. OMB staff told us that while they acknowledge that grand prize winners are not required to complete the projects they proposed, they anticipate the winners will carry them out to some extent, and they plan to monitor their work to inform GEAR Center planning activities. As OMB moves forward with establishing the GEAR Center, OMB staff should complete their efforts to develop goals and measures, because they will be necessary to track and communicate the GEAR Center’s progress over time. In addition, OMB staff have not yet fully assessed the costs and benefits of the various options OMB is considering for operating the GEAR Center. As previously discussed, OMB has stated that the GEAR Center could be housed in a physical location, composed of a network of researchers working in multiple locations, or follow a different model. Also, as previously stated, MITRE is currently exploring details of options for operating the center, and plans to provide them to OMB in July 2020. However, OMB has not yet conducted an analysis of the costs and benefits of the options for operating the center. In July 2018, OMB’s then Deputy Director for Management said that defining costs and benefits is dependent on refining and finalizing implementation plans. As of November 2019, OMB had not developed an implementation plan for establishing the GEAR Center. As OMB moves forward with establishing the center, assessing the costs and benefits of the various options for operating it will enable OMB to communicate the value of each option to Congress and other stakeholders. This assessment can help build a business case for OMB’s ultimate choice of how to operate the GEAR Center that presents facts and supporting details among competing alternatives. OMB has generally addressed key practices related to involving employees and relevant stakeholders. Specifically, OMB has coordinated with internal government stakeholders, sought input from the private sector, and publicly communicated GEAR Center progress. For example, OMB staff said that they have worked to develop the GEAR Center with the President’s Management Council, the National Science Foundation, and DOD’s National Security Technology Accelerator group. Also, OMB held a Virtual Stakeholder Forum to provide information about the GEAR Center and to gather stakeholder input. During the forum, OMB sought attendees’ input through live polls, and announced that attendees could ask questions and provide additional input by sending messages to an OMB email account. OMB also sought stakeholder input through the GEAR Center Request for Information and challenge competition. Finally, as shown in figure 6, OMB has publicly reported on the GEAR Center’s progress on Performance.gov. OMB has generally addressed key practices related to leadership focus and attention. To accomplish this, OMB has designated leaders, including OMB’s former Deputy Director for Management, a member of OMB’s Performance Team, and other staff to be responsible for implementing the reform. OMB has partially addressed key practices related to managing and monitoring the reform to establish the GEAR Center. Specifically, OMB has gathered input from stakeholders on what research it could pursue, and from both stakeholders and a contractor on how the GEAR Center could be operated. OMB has done some analysis of that input, but has neither determined how the GEAR Center will operate nor developed an implementation plan. For example, OMB’s analysis of Request for Information responses shows that OMB is considering several options for how to execute the GEAR Center’s public-private partnership—a network of researchers, a physical location, etc.—but has not decided on one. In addition, as discussed previously, OMB contracted with MITRE to further assist with determining how the GEAR Center will operate. As OMB moves forward with establishing the GEAR Center, it will be able to track the GEAR Center’s progress, and communicate these results to Congress and key stakeholders, by developing and communicating an implementation plan with key milestones and deliverables. In response to our request to identify the legal authority OMB will need to implement this reform, OMB’s General Counsel stated in a November 2019 letter to us that it and its agency partners have relied upon existing legal authorities and available appropriations to develop the Request for Information, obtain external submissions for ideas to develop the GEAR Center, and issue the prize challenge. OMB stated that in conducting any future implementation activities, it would seek new legislative authority, if necessary. While planning and implementation progress has been made since the administration’s government-wide reform plan was released in June 2018, important details surrounding the implementation of certain reform proposals have not been developed or communicated. OMB has a central role in overseeing and prioritizing these reforms for implementation, with support from lead agencies. In our previous work on government reorganization and reforms, we have found that there are key practices that, if followed, can help manage the risk of reduced productivity and effectiveness that often occurs as a result of major change initiatives. Important practices such as engaging and communicating with Congress, employees, and key stakeholders; dedicating a senior leadership team; and developing implementation plans, can help to ensure the successful implementation of reorganizations and reforms. OMB and DHS partially addressed most of the leading practices through their efforts to implement several projects related to the cybersecurity workforce reform, including efforts to reskill employees to fill vacant cybersecurity positions, establish a cybersecurity reservist program to provide needed surge capacity, and streamline relevant hiring processes. However, OMB, in coordination with DHS, has not yet followed relevant key practices to implement its reforms government-wide. Specifically, OMB and DHS have not yet developed a communications strategy to involve Congress, employees, and other stakeholders; established a dedicated government-wide leadership team; or developed a government-wide implementation plan with outcome-oriented goals, timelines, key milestones, deliverables, and processes to monitor implementation progress. In addition, OMB and DHS have not demonstrated how the projects and activities outlined in the reform proposal would address our related high-risk issues and major management challenges, or developed workforce plans that assess the effects of the proposal on the current and future workforce. If OMB, in coordination with DHS, applied key reform practices government-wide, they would be better positioned to manage the reform, and track progress across all agencies facing cybersecurity workforce shortages. OMB has taken steps toward determining how the GEAR Center will operate, such as, by determining the appropriate role of the federal government; providing leadership focus and attention; and collecting input from the public, academia, and industry on how the center could operate and on ideas for possible research projects. However, OMB has neither assessed the costs and benefits of the options it is considering for operating the center, nor developed an implementation plan with outcome-oriented goals and performance measures for it. As OMB moves forward with establishing the GEAR Center, completing these two activities can help OMB (1) make a case for why OMB’s ultimate decisions on how to operate the center are the most optimal, and (2) provide greater transparency to the public and private partners involved in its development, help build momentum, and demonstrate the center’s value. We are making a total of seven recommendations to OMB. The Director of OMB, working with DHS, should develop a government- wide communications strategy to inform and, as appropriate, involve Congress, employees, and other stakeholders in implementation of the reform proposal to solve the cybersecurity workforce shortage. (Recommendation 1) The Director of OMB, working with DHS, should establish a dedicated government-wide leadership team with responsibility for implementing the reform proposal to solve the cybersecurity workforce shortage. (Recommendation 2) The Director of OMB, working with DHS, should develop a government- wide implementation plan with goals, timelines, key milestones, and deliverables to track and communicate implementation progress of the reform proposal to solve the cybersecurity workforce shortage. (Recommendation 3) The Director of OMB, working with DHS, should provide additional information to describe how the projects and activities associated with the reform proposal to solve the cybersecurity workforce shortage will address our high-risk issues related to ensuring the cybersecurity of the nation. (Recommendation 4) The Director of OMB, working with DHS, should develop a government- wide workforce plan that assesses the effects of the reform proposal to solve the cybersecurity workforce shortage on the current and future federal workforce. (Recommendation 5) The Director of OMB should assess the costs and benefits of options for operating the GEAR Center. (Recommendation 6) The Director of OMB should develop an implementation plan that includes outcome-oriented goals, timelines, key milestones, and deliverables to track and communicate implementation progress of the reform proposal to establish the GEAR Center. (Recommendation 7) We provided a draft of this report for review and comment to the Directors of OMB and OPM, the Secretary of DOD, the Acting Secretary of DHS, and the Administrator of GSA. OMB did not comment on the report. DHS and DOD provided technical clarifications, which we incorporated as appropriate. OPM and GSA responded that they did not have comments on the report. We are sending copies of this report to the Director of OMB and the heads of the agencies we reviewed as well as appropriate congressional committees and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or Mcneilt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In a 2018 report, we developed key questions based on our prior work on key practices that can help assess agency reform efforts. The 58 questions are organized into four broad categories and 12 subcategories, as shown in table 4. For the purpose of this review, we selected those subcategories and key questions that were most relevant to the selected reforms based on the information contained in the reform proposals, agency documentation, and interviews with the Office of Management and Budget and lead agencies for each of the reforms. The administration’s proposal to reorganize the Office of Personnel Management (OPM) evolved from June 2018 through November 2019, and was effectively halted by Congress in December 2019. In the June 2018 government-wide reform plan, the administration proposed: (1) moving OPM’s policy functions to a new office in the Executive Office of the President, which would also provide a government-wide view of human capital policy issues, (2) merging a number of OPM’s responsibilities with the General Service Administration’s (GSA) or other government entities’ to be determined at a later date, and (3) renaming GSA as the Government Services Agency. The goals of this proposal were to help elevate the importance of these functions, improve efficiency of operations, and save money, according to the reform plan. Specifically, the administration suggested integrating the following duties into the Government Services Agency or other government entities: administration of healthcare and insurance programs, Human Resources Solutions (HRS), which provides products and services to other federal agencies on a reimbursable basis, and information technology services. In addition, the reform plan contained another proposal to move all of OPM’s national security background investigation functions to the Department of Defense (DOD). The President’s Fiscal Year 2020 Budget, published in March 2019, expanded and modified the original OPM reorganization proposal. It proposed that all of OPM’s functions beyond those moving to the Executive Office of the President and DOD be transferred to GSA, rather than merging a portion of them into a newly formed Government Services Agency. It also called for creating a new GSA service area to house certain functions, and for moving OPM’s Office of the Inspector General to GSA. In May 2019, the administration submitted a legislative proposal to Congress requesting new authority to implement aspects of the OPM reorganization reform proposal. As of December 2019, this proposal had not been introduced in Congress. In May 2019, we testified on issues to consider in the proposed reorganization of OPM. We found that the Office of Management and Budget (OMB) and the two lead agencies (OPM and GSA) had generally not addressed key practices for reforms, such as establishing outcome- oriented goals, assessing costs and benefits, or developing an implementation plan, and had not fully involved or communicated their efforts with Congress, employees, and other key stakeholders. We also found that OMB, OPM, and GSA had not shown how they would address management challenges that may affect their ability to successfully reorganize the government’s central human capital functions. Between May and September 2019, OPM provided us with additional information, which contributed to our assessment of the extent to which OMB, OPM, and GSA addressed key practices for this reform (see figure 7). In October and November 2019, OMB staff and OPM and GSA officials provided us with updates on the status of the OPM reorganization reform proposal. OMB staff and OPM and GSA officials told us that the transfer of major functions from OPM to GSA, such as retirement services and HRS, was on hold until Congress, through legislation, provided the necessary authority to move these functions. They also told us that they were working together on moving the following functions from OPM to GSA through their existing authorities: (1) administrative responsibilities for the Chief Human Capital Officers (CHCO) Council; (2) the Program Management Office for the Security, Suitability, and Credentialing Performance Accountability Council (PAC); and (3) management of two OPM office buildings—the Theodore Roosevelt Building, which houses OPM’s headquarters in Washington, D.C., and the Federal Executive Institute located in Charlottesville, Virginia. OMB staff and OPM and GSA officials stated that the primary purpose of these moves was to achieve greater efficiency of operations, and that these transfers were not components of the OPM reorganization reform proposal. In November 2019, OPM’s Inspector General expressed concern over ongoing efforts to merge these functions with GSA, noting that the specific details of the full merger continued to evolve, and every iteration of the proposed reorganization would fundamentally alter how agency functions and duties are performed. In the National Defense Authorization Act (NDAA) for Fiscal Year 2020, signed into law in December 2019, Congress effectively halted actions to reorganize OPM pending the completion of reports by the National Academy of Public Administration (NAPA) and OPM. The law directed OPM to enter into a contract with NAPA to conduct a study to identify challenges associated with OPM’s execution of its functions and make recommendations for addressing them, including a cost-benefit analysis of proposed changes, and the identification of statutory or regulatory changes needed to execute recommended actions, among other things. Approximately 6 months after the NAPA report, OPM must submit a report providing its views on the NAPA report and its recommendations for changes to its functions. OPM is also to include a business case analysis associated with such changes and a proposal for legislative and regulatory action required to effect the changes. Many of these requirements reflect the issues we raised in our May 2019 testimony on the extent to which the proposal to reorganize OPM was consistent with our key reform practices. According to the President’s fiscal year 2021 budget request, the administration continues to pursue implementation of OPM’s reorganization. Specifically, it proposes to transfer the functions of OPM to GSA, contingent upon enactment of authorizing legislation. OMB, OPM, and GSA partially addressed the key practices related to establishing goals and outcomes. First, OMB, OPM, and GSA considered how the upfront costs of the reform would be funded by, for example, requesting funds through the President’s Fiscal Year 2020 Budget. However, OMB, OPM, and GSA did not fully address other aspects of the key practices. Specifically, since our May 2019 testimony, OPM provided us information on additional draft goals and measures for some portions of the reform. For example, according to a document we received from OPM in August 2019, a team leading the reform effort was developing “critical to quality” metrics in areas such as cost reduction, employee engagement, and flexible operations. However, these metrics did not have targets and had not been finalized. In November 2019, OMB staff told us that metrics were not yet final because they were still working with Congress to develop a legislative proposal authorizing the reform, and implementation of the merger was not yet underway. The NDAA for Fiscal Year 2020 requires NAPA and OPM to make recommendations for changes to OPM’s structure, functions, responsibilities and authorities, which may differ from those the administration proposed. We have also previously reported that major change initiatives should be based on either a clearly presented business case or analysis of costs and benefits grounded in accurate and reliable data, both of which can show stakeholders why a particular initiative is being considered and the range of alternatives considered. While OPM officials had some information on the costs and benefits they planned to achieve by merging functions with other agencies, they did not have an analysis or underlying data supporting their conclusions. Specifically, OPM provided us with its rationale for the reform in several documents, including: a summary of the agency’s financial and management challenges, a qualitative business case, a list of state and foreign governments’ administrative models where human resources and administrative functions are merged, and a presentation providing OPM’s estimate of the annual savings that could be realized by “fully integrating OPM’s operations into GSA.” However, the information that OPM provided did not include measurable performance or outcome metrics, or quantify benefits relative to costs, to provide a complete assessment of the costs and benefits and any alternative solutions to the reform proposal. OPM’s Office of Inspector General also found, in its fiscal year 2020 top management challenges report, that OPM had not developed a thorough analysis of costs and benefits. Shortly after OMB published the reform plan, OMB’s then Deputy Director for Management, who also served as OPM’s Acting Director, said that defining costs and benefits was dependent on refining and finalizing implementation plans. Since then, in the NDAA for Fiscal Year 2020, Congress required that NAPA’s study include an analysis of the benefits, costs, and feasibility of each recommendation, and a timetable for implementing these options. In addition, the law requires that OPM’s report include a business case analysis that describes the operational efficiencies and cost savings (both short- and long-term) associated with its recommendations. OMB, OPM, and GSA partially addressed the key practices related to involving employees and key stakeholders. Specifically, since our May 2019 testimony, OPM officials provided us with documents to demonstrate that the agency took additional actions in this area, as discussed in more detail below. However, we found that OPM’s early outreach efforts to employees and stakeholders were insufficient, the agency did not have a plan for incorporating employee and stakeholder feedback, and it did not share relevant implementation details that may have affected employees and stakeholders. For example, OPM provided us with a communications tracker that listed meetings and correspondence with Congress, staff, and employee groups from OPM’s Acting Director, Deputy Director, and Deputy Chief of Staff. While this document listed a number of meetings and calls, it showed that most of OPM’s efforts to involve Congress, employees, and employee groups began in April 2019, more than 9 months after OMB published the reform plan, and more than 8 months after OPM’s Director and GSA’s Administrator testified before Congress about their plans for carrying out the reform proposal. In addition, both members of Congress and employee groups expressed dissatisfaction with initial outreach from OMB, OPM, and GSA, including lack of transparency. For example, during a House Committee on Oversight and Reform Subcommittee on Government Operations hearing on May 21, 2019, members of Congress and employee groups testified that they felt insufficiently involved in the reform. Both groups stated that OPM officials communicated with them on few occasions, and members of Congress said that they had not received key documents they requested from OPM, including an implementation plan. In August 2019, OPM provided us with a strategic communications plan that included high level messages and strategies for reaching out to Congress, employees, and the public. This and other OPM documents demonstrated that OPM communicated with employees and key stakeholders, and provided opportunities for its employees to ask questions and provide comments about the reform, activities consistent with our key practices. However, the documents did not indicate how senior OPM officials planned to use the feedback they received from their employees. Similarly, neither OMB nor GSA described how they planned to use employee feedback to inform their reform efforts. The NAPA study required by the NDAA for Fiscal Year 2020 must include methods for involving, engaging with, and receiving input from other federal agencies, departments, and entities potentially affected by any change in OPM that NAPA recommends. The study must also incorporate the views of stakeholders. OMB, OPM, and GSA partially addressed the key practices related to addressing high-risk areas and longstanding management challenges, consistent with our assessment in May 2019. Since then, OPM provided additional documents related to (1) our relevant high-risk area of strategic human capital management, as well as (2) longstanding challenges at OPM we and OPM’s Inspector General have reported. However, OMB, OPM, and GSA did not explain how the OPM reorganization reform proposal would address our high-risk issue or mitigate major management challenges, and did not have plans to monitor the potential effects of the reform on these issues. As a result, OMB, OPM, and GSA did not fully consider the potential risks of transferring OPM systems with longstanding weaknesses to GSA, and of GSA taking on duties in areas such as information technology, where it faces major management challenges. They also lacked a means of monitoring the reform’s potential effects on our strategic human capital management high-risk area and on major management challenges. Moreover, in November 2019, OPM’s Office of the Inspector General continued to identify the proposed merger of OPM with GSA as a top management challenge because the proposal did not include an implementation plan, and created a burden for the agency to fully study, plan, and execute reorganization activities. In November 2019, OMB staff told us that, because the proposed merger was a long-term effort and plans were still under development, they had not yet determined how our high-risk and other management challenges would be addressed. The NDAA for Fiscal Year 2020 requires the NAPA study to include analyses of OPM’s challenges and a recommended course of action for resolving them. OMB, OPM, and GSA generally addressed the key practices related to leadership focus and attention. Specifically, since our May 2019 testimony, OPM officials provided us with documents demonstrating that OMB, OPM, and GSA made progress in this area. For example, OPM documents showed that OPM, OMB, and GSA leaders approved a governance structure for leading reform efforts that included: an executive steering committee that provided guidance and made decisions. Its members included the OMB Deputy Director for Management (serves as executive sponsor and chair), the OPM Director (serves as a vice-chair), and the GSA Administrator (serves as a vice-chair). The group used the Lean Six Sigma management approach to make decisions related to planning and implementing the reform during Tollgate meetings. an interagency task force that led activities to implement the reform, and that raised issues to the Executive Steering Committee as needed. Its members included leaders from OMB, OPM, and GSA. interagency teams, which provided subject matter expertise and performed tasks and activities to implement the reform. Their members were OPM and GSA officials. From August 2018 through April 2019, our analysis of OPM documents showed that these groups met and communicated frequently—from every few days to every few weeks, depending on the group. From May 2019— when the administration transmitted their legislative proposal to Congress to reorganize OPM—to November 2019, these groups met less frequently, according to OMB staff and GSA officials. OMB, OPM, and GSA partially addressed the key practices related to managing and monitoring. Since our May 2019 testimony, OPM provided us with documents that demonstrated improvements in this area, but as of November 2019, had yet to finalize an implementation plan. Specifically, the documents showed that OMB, OPM, and GSA held leadership meetings and systematically tracked various aspects of the reform. For example, OPM officials tracked the status of certain activities associated with the reform, such as progress on developing a plan for communicating with employees and stakeholders, through leadership meetings. Also, OPM had a document identifying risks associated with the reform, such as ensuring continuity of services, as well as mitigation strategies, such as including provisions in OPM-GSA interagency agreements. The document also specified individual agency officials responsible for each risk. OMB, OPM, and GSA did not develop an implementation plan for the OPM reorganization reform that included key milestones and deliverables. In November 2019, OMB staff told us that their plans were still being developed because they were waiting for Congress to pass the administration’s legislative proposal authorizing the reform. The NDAA for Fiscal Year 2020 requires NAPA and OPM to make recommendations for changes to OPM’s structure, functions, responsibilities, and authorities, which may differ from those the administration proposed. OMB, OPM, and GSA partially addressed the key practices related to employee engagement. Specifically, while OMB and agencies undertook activities to measure employee engagement, such as surveying and communicating with employees, they did not develop a comprehensive strategy for sustaining and strengthening employee engagement during and after the reform. For example, GSA officials told us that they established a GSA-OPM change management and communications workgroup, which developed a change management and communications plan that included employee engagement activities. Also, in April 2019, OPM conducted an internal survey of agency staff to measure employee engagement, among other factors. OPM officials also identified employee morale issues as a risk in a document identifying risks associated with the reform and risk mitigation strategies. To address employee dissatisfaction and low morale, OPM officials, including OPM’s then-Acting Director, shared the survey results with employees, held listening sessions to determine employees’ preferences for communications about the OPM reorganization reform proposal, and developed a communications strategy. However, OPM officials did not determine how they planned to use these communications to sustain and strengthen employee engagement. In November 2019, OMB staff told us that because they were still in the planning stages of the reorganization, the proposed reform had not yet involved major changes for employees, so they put employee engagement efforts on hold. The NAPA study required by the NDAA for Fiscal Year 2020 is to include methods for involving, engaging with, and receiving input from other federal agencies, departments, and entities potentially affected by any change in OPM that NAPA recommends. The study is to also incorporate the views of stakeholders. OMB, OPM, and GSA did not address the key practices related to strategic workforce planning. OPM and GSA officials told us that they were conducting workforce planning activities associated with the OPM reorganization reform. Also, the President’s Fiscal Year 2020 Budget provided some information about staff levels at OPM and GSA. However, OMB, OPM, and GSA did not produce strategic workforce plans for OPM and GSA employees. OPM and GSA officials stated that they had not provided us with these plans because they were under development. In November 2019, GSA officials added that they were waiting for congressional authorization to carry out the reform proposal, so they had put their efforts to develop a workforce plan on hold. The NDAA for Fiscal Year 2020 requires that NAPA and OPM make recommendations on changes to OPM, which may differ from the administration’s proposed reorganization of OPM. As part of our review, our Office of General Counsel sent letters to the Offices of General Counsel at OPM, GSA, and OMB requesting they provide us with a description of the legal authorities they were using to support the proposed OPM reorganization. OMB, OPM, and GSA provided responses to our letter, but did not identify which aspects of the OPM reorganization could be carried out under existing law and which would require legislative authority. GSA, OPM, and OMB officials stated that they had not yet finalized their legal analysis, and that they were still determining which legal authorities they could use to implement elements of the reform. OMB General Counsel stated that to implement the administration’s proposed reorganization, both legislative and administrative actions would be necessary and dependent on each other “in the long run.” In May 2019, the administration submitted a legislative proposal requesting authority to transfer OPM functions—such as Human Resources Solutions, Information Technology, Retirement, and Health and Insurance Services—to GSA. As of December 2019, the proposal had not been introduced in Congress. OMB staff told us that the legislative proposal was an effort to communicate transparently about the extent to which new authorities would be required. As discussed earlier, in December 2019, Congress passed the NDAA for Fiscal Year 2020. In the NAPA study required under the NDAA, NAPA is to provide a comprehensive assessment and analysis of the statutory or regulatory changes needed to implement any recommended course of action, and to submit this report to Congress and the Director of OPM. The Director of OPM is then to submit a report to Congress that lays out OPM’s views on the findings and recommendations of the NAPA study, along with OPM’s recommendations for change. Any recommendation submitted by OPM for change is to include a business case analysis that sets forward the efficiencies and cost savings (both short- and long-term) associated with the change, and a proposal for legislative or administrative action required to effect the change. The statutory provisions in the act generally provide that no aspect of the agency that is assigned in law to OPM may be moved to GSA, OMB, or the Executive Office of the President until 180 days after OPM’s report is submitted to congressional committees, and subject to the enactment of any required legislation. This reform proposal aims to modernize and streamline the way citizens interact with the federal government, and to raise customer experience to a level comparable with leading private sector organizations. With support from the United States Digital Service (USDS) and GSA’s Technology Transformation Service, OMB has stated that it will lead an effort to establish a government-wide capability that will enable agencies to identify their customers, map their interactions (or journeys) with federal programs or services, and leverage digital tools and services to improve their experiences and overall satisfaction. For example, as reported in the reform plan, the U.S. Department of Agriculture created a “digital front door,” accessible at Farmers.gov, that is organized around the user experience rather than the government’s structure. The reform plan further explains that the improved capability provided by USDS and GSA would also provide for a government-wide resource to manage organizational change, including improved project planning, facilitating interagency collaboration, and sharing best practices on change management. OMB staff told us in early 2019 that they have delayed implementation of this reform, and instead will focus on other customer experience activities, such as those outlined in the related Cross-Agency Priority (CAP) goal. Upon release of the President’s Fiscal Year 2020 budget in March 2019, we confirmed that this reform was not included in the administration’s reorganization priorities, and OMB confirmed that no funding was requested for its implementation. OMB and agencies are also pursuing a related but distinct CAP goal under the President’s Management Agenda–Improving Customer Experience with Federal Services–with the aim of providing a modern, streamlined, and responsive customer experience across government, comparable to leading private-sector organizations. According to OMB, the reform proposal is meant to stand up a central capacity, or office, within GSA to manage customer experience government-wide; whereas, the CAP goal is intended to support capacity growth and accountability within agencies to develop and manage their own customers’ experience and satisfaction. Because OMB has not yet begun to implement this reform, and no actions are planned for fiscal year 2020, we are not able to assess the extent to which the reform is adhering to key reform practices. When the administration moves forward with implementing this reform, it will be better positioned for its successful implementation if the key reform practices are followed. In response to our request to identify the legal authority OMB will need to implement this reform, OMB’s General Counsel responded in a November 2019 letter that the initiative will not require new legislation. OMB stated the reform can be implemented within current law and available appropriations. Triana McNeil at (202) 512-6806 or Mcneilt@gao.gov. In addition to the contact named above, Sarah E. Veale (Assistant Director, Strategic Issues), Peter Beck (Analyst-in-Charge, Strategic Issues), Colenn Berracasa, Karin Fangman, Steven Putansu, Janet Temko-Blinder, Peter Verchinski, and Kellen Wartnow made key contributions to this report. Timothy Carr, Jacqueline Chapin, Tom Costa, Sara Cradic, Brenda Farrell, Patrick Hickey, Shirley Jones, Tammi Kalugdan, Brian Mazanec, Kimberly Seay, Gregory Wilshusen, and Alicia White also contributed to this report.", "summary": "In June 2018, the administration released its government-wide reform plan, which included 32 proposals aimed at achieving management improvements and organizational efficiencies, among other things. OMB has a central role in overseeing these reform proposals, with support from various lead agencies. In July 2018, GAO reported on key questions to consider when developing and implementing reforms. GAO was asked to examine reform implementation. This report discusses three selected reforms that the administration prioritized: (1) moving background investigations from OPM to DOD, (2) solving the cybersecurity workforce shortage, and (3) establishing the GEAR Center. For each selected reform, GAO determined the extent to which OMB and the lead agencies addressed key practices for effectively implementing reforms, among other issues. GAO reviewed relevant documentation and interviewed OMB staff and agency officials. GAO assessed OMB's and lead agencies' efforts against relevant key practices for effective reforms. In working to implement three selected government-wide reforms that GAO reviewed, the Office of Management and Budget (OMB) and lead agencies followed some, but not all, of the key practices associated with effective reforms. Following key practices, such as those reflected in the questions below, would better position OMB and lead agencies to effectively implement such major change initiatives and achieve their intended objectives. Moving background investigations from the Office of Personnel Management (OPM) to the Department of Defense (DOD) : As required, the transfer of background investigations took place by September 30, 2019. OMB, OPM, and DOD generally addressed most key reform practices in this transfer, including involving employees and stakeholders, establishing an implementation team, and developing implementation plans. With the transfer complete, DOD officials told GAO they are shifting focus toward addressing GAO's high-risk area on the government-wide personnel security clearance process. Solving the cybersecurity workforce shortage : OMB and the Department of Homeland Security (DHS) partially addressed most leading practices through their efforts to implement several projects, such as reskilling employees to fill vacant cybersecurity positions, and streamlining hiring processes. However, GAO found that OMB and DHS have not established a dedicated implementation team, or a government-wide implementation plan, among other practices. Without these practices in place, OMB and DHS may not be able to monitor implementation activities and determine whether progress is being made toward solving the cybersecurity workforce shortage. Establishing the Government Effectiveness Advanced Research (GEAR) Center : According to OMB, the GEAR Center will bring together researchers from private and public sectors to inform and develop ways to improve government services and operations. OMB is working toward establishing the GEAR Center by collecting input from the public, academia, and industry for how the Center could be structured and ideas for possible research projects. However, OMB has not yet developed an implementation plan with key milestones and deliverables to track its progress. Developing and communicating an implementation plan will help OMB track the GEAR Center's progress and communicate its results. GAO is making 7 recommendations to OMB to follow certain key practices to help solve the cybersecurity workforce shortage and to establish the GEAR Center. OMB did not comment on the report.", "document_type": "gao"}
{"report": "In the Santa Cruz River Basin and Tijuana River Valley watersheds, which straddle portions of the 1,954-mile U.S.-Mexico border, water flows north from higher elevations in Mexico into the United States. Both countries have infrastructure along the border to manage, divert, and treat wastewater, including sewers, pipelines, and treatment plants, in addition to the two international wastewater treatment plants in the United States. The Nogales and South Bay plants are located in the middle and lower end of the Santa Cruz River Basin and Tijuana River Valley, respectively. Figure 1 shows the location of the international wastewater treatment plants along the border. In 2018, USIBWC treated more than a combined 14 billion gallons of sewage at the Nogales and South Bay international wastewater treatment plants. At the Nogales plant, USIBWC treated 4.5 billion gallons of sewage—an average of 12.45 million gallons per day from the city of Nogales in Sonora, Mexico. In addition, the plant treats an average of 2 million to 2.5 million gallons per day of sewage from the Arizona cities of Nogales and Rio Rico. The Nogales plant discharges treated wastewater into the Santa Cruz River. At the South Bay plant, USIBWC treated 9 billion gallons of sewage in 2018—an average of 24.8 million gallons per day from the City of Tijuana in Baja California, Mexico. The South Bay plant discharges treated wastewater though a pipeline, called the South Bay Ocean Outfall, into the Pacific Ocean. Both watersheds are located in arid regions characterized by infrequent but sometimes intense precipitation that forms short-lived streams or washes that fill with water during such events but may be dry at other times. These high-precipitation events lead to high levels of stormwater runoff. Urban stormwater is a major contributor to pollution in the nation’s waterbodies, including rivers and oceans, and can contribute to disease outbreaks and beach closings, as well as flooding. IBWC’s mission is to provide binational solutions to issues that arise during the application of U.S.-Mexico treaties regarding, among other things, water quality and flood control in the border region including constructing and operating wastewater treatment plants, as directed by Congress. The U.S. and Mexican governments established IBWC (then the International Boundary Commission) in 1889, initially to resolve boundary-related differences arising along the border. Various agreements between the United States and Mexico added water distribution and flood management in the transboundary rivers to IBWC’s responsibilities, including management of the border reaches of the Rio Grande and Colorado rivers. In the 1944 treaty, Utilization of Waters of the Colorado and Tijuana Rivers and of the Rio Grande, the United States and Mexico agreed to apportion their shared waters, distributing the waters of the Colorado River and the Rio Grande between both countries. As part of the 1944 treaty, the United States agreed to annually provide a guaranteed amount of water from the Colorado River to Mexico—unless deliveries were limited by extraordinary drought—and to allocate the waters of the Rio Grande between the two countries, as well as authorizing jointly built and operated dams, reservoirs, and hydroelectric plants to manage water from the Rio Grande River. USIBWC manages this infrastructure and ensures annual compliance with the 1944 treaty water delivery requirements. As part of its flood control efforts, IBWC maintains and manages over 500 miles of levees for flood protection. The 1944 treaty established the key organizational components of IBWC and its two sections—USIBWC and the Mexican Section—which are federal agencies of their respective governments. Under the treaty, USIBWC and the Mexican Section are each headed by a commissioner who is an engineer. The treaty allows each commissioner to employ engineers, legal advisers, and assistants as needed and established certain positions—two principal engineers, legal counsel, and a secretary (that is, a foreign officer)—as entitled to diplomatic status in the other country’s territory. USIBWC is headquartered in El Paso, Texas, and the Mexican Section is headquartered in the adjoining city of Ciudad Juarez, Chihuahua, Mexico. USIBWC and the Mexican Section also have their own field offices along the border that operate and oversee joint work. USIBWC operates under the foreign policy guidance of the Department of State and implements treaties between the United States and Mexico related to boundary preservation and water management, including border sanitation and flood control in the border region. USIBWC is headed by the U.S. Commissioner and is made up of six executive offices and three departments, with about 240 full-time equivalent employees as of fiscal year 2017, the most recent data available at the time of our review. The six offices include the Foreign Affairs Office and a Legal Affairs Office; the former houses the foreign officer responsible for diplomatic communications and provides advice for the interpretation of treaties and minutes, and the latter houses legal counsel. The three departments in USIBWC are the Administrative Department, which supports all agency functions through acquisitions, budget, finance, accounting, and information management; Engineering Department, which is headed by a Principal Engineer of Engineering who provides technical and policy advice to the U.S. Commissioner and technical support in planning, engineering, environmental management, and construction management; and Operations Department, which is headed by the Principal Engineer of Operations who through the agency’s field offices oversees the maintenance and operations of the two international wastewater treatment plants as well as more than 100 hydrologic gaging stations, 500 miles of levees, four diversion dams, two international storage dams and associated hydroelectric power plants, more than 600 hydraulic structures, and one-half of all international boundary monuments and markers on the U.S.-Mexico land border and at international ports of entry. USIBWC’s annual budget, which has averaged $75 million per year since fiscal year 2010, is submitted to Congress as part of the Department of State’s overall budget. Under State’s budget process, USIBWC submits a budget request 2 years in advance of the funding to be spent. Once the department’s leadership approves USIBWC’s budget, it is incorporated into the overall departmental budget request for review by OMB. After OMB’s review, the budget is included as part of the President’s annual budget request to Congress. The agency receives its appropriated funding in two budget line items: (1) Salaries and Expenses and (2) Construction. As shown in figure 2, USIBWC funding has declined, when considering inflation (fiscal year 2018 dollars). According to USIBWC officials, the agency’s funding has increased about 1.1 percent per year since fiscal year 2010 and has been relatively flat since fiscal year 2017. According to a USIBWC budget official, the agency’s costs are increasing at an average inflation rate of nearly 3 percent per year. USIBWC’s budget from fiscal years 2010 through 2019, however, was more than double its budget from fiscal years 2003 through 2007. According to the official, starting in fiscal year 2010, the agency received an increase in its construction appropriations to fund dam and levee improvements along the border. Before that, in fiscal year 2008, USIBWC received additional appropriations of $55.6 million to pay for levee repairs; and in fiscal year 2009, under the American Recovery and Restoration Act, received $220 million for construction projects. In addition to USIBWC, other federal agencies that manage or collaborate on water infrastructure projects in communities along the U.S.-Mexico border include the following: U.S. Army Corps of Engineers (Corps). The Corps provides assistance for flood control, wastewater treatment, drinking water, and water supply projects in communities across the United States, as directed by Congress. To provide flood control assistance, the Corps’ Emergency Streambank and Shoreline Protection program plans, designs, and constructs erosion control projects that protect public infrastructure. It conducts these directly or under contract with other federal agencies, such as USIBWC. Congress has also authorized the Corps to provide assistance to nonfederal interests for carrying out water-related environmental infrastructure and resource protection and development projects, including waste water treatment and related facilities. In addition, the Corps’ Planning Assistance to States program helps states, local governments, and tribes with preparing comprehensive plans for the development and conservation of water and related land resources. The Corps has worked on various projects along the U.S.-Mexico border. For example, to address stormwater that flows downhill from Nogales, Sonora into Nogales, Arizona, near USIBWC’s Nogales plant, USIBWC requested an evaluation by the Corps on possible flood protection improvements in Mexico, which was completed in 2004. Based on the Corps’ recommendations, the local and federal governments in Mexico constructed several dams and detention basins. To address flooding of the Tijuana River in southern California, USIBWC contracted with the Corps to implement the U.S. portion of the Tijuana Flood Control Project in 1978. For this project, the Corps prepared construction plans and supervised the construction of a quarter-mile concrete channel in the United States that extends downstream from the U.S.-Mexico border. EPA. In 1983, the United States and Mexico signed the Agreement on Cooperation for the Protection and Improvement of the Environment in the Border Area (the La Paz Agreement). In the agreement, the United States and Mexico agreed to coordinate their efforts to address problems of air, land, and water pollution in the border area, defined as the area situated within 100 kilometers (approximately 62 miles) of either side of the border. The agreement names EPA as the national coordinator responsible for its implementation and provides EPA with a formal means of working with its federal counterpart in Mexico on binational programs. In addition, EPA and its Mexican counterpart created a binational program to fund environmental improvement projects for communities along the border, called the U.S.-Mexico Border Water Infrastructure Program. The most recent plan developed under the agreement—U.S.- Mexico Border 2020—is an 8-year cooperative program initiated in 2013 that identified five goals to protect the environment and public health in both countries. The second goal—to improve access to clean and safe water—includes protecting and restoring binational watersheds by addressing the inadequate collection and treatment of wastewater. Under the program, EPA works with federal agencies—including USIBWC—and state and local agencies to build grant-funded projects to improve water quality in the border area, including wastewater infrastructure projects that connect to or are related to USIBWC’s two international wastewater treatment plants in Arizona and California. North American Development Bank (NADB). In 1993, another agreement between the United States and Mexico led to the creation of two entities—NADB and the Border Environmental Cooperation Commission—to develop the environmental infrastructure of the U.S.- Mexico border region. NADB’s supervisory board includes representatives from EPA and the Departments of State and Treasury. NADB also established the Border Environment Infrastructure Fund to administer grant funds provided by EPA, for the implementation of high- priority municipal water and wastewater infrastructure projects located within 62 miles north of the U.S.-Mexico border, as well as 187 miles south of the border. NADB funds wastewater and sewer projects in communities along the border, including projects at USIBWC’s two international wastewater treatment plants. IBWC’s two wastewater treatment plants are required to meet water quality standards under the Clean Water Act. The act establishes the basic structure for regulating surface water quality, including regulation of discharges of such pollutants as E. coli bacteria and heavy metals, such as arsenic and lead, into the waters of the United States. The act requires states to establish water quality standards that protect public health and the environment and consider aquatic wildlife and human consumption and recreation, among other uses. The act also requires EPA to maintain and improve water quality by assisting and overseeing states’ efforts, among other responsibilities. The states are required to monitor and assess the conditions of water bodies, and those that do not meet state water quality standards are considered impaired. Other provisions of the Clean Water Act include the following: NPDES permits. The Clean Water Act prohibits the discharge of pollutants from point sources (sources of pollution, such as wastewater treatment plants and industrial facilities) into waters of the United States without a permit from EPA or an authorized state. Under the act, EPA and authorized states issue NPDES permits for point sources of pollution, which among other things regulate the amount of pollutants that can be discharged. Another component of the NPDES program is the pretreatment program, to prevent the introduction of pollutants into a publicly owned wastewater treatment plant that will interfere with its operation. According to EPA, by reducing or eliminating waste from industries, fewer toxic pollutants are discharged to and treated by the publicly owned wastewater treatment plant, providing benefits to both these plants and the industrial users. EPA has authorized most states, including Arizona and California, to administer clean water discharge permits. The Arizona Department of Environmental Quality administers the NPDES permit for the Nogales plant. The plant is also subject to state permits, such as an aquifer permit required in Arizona to limit the impact of the plant’s discharge on groundwater in the vicinity. The San Diego Regional Water Quality Control Board administers the NPDES permit for the South Bay plant. Stormwater runoff. Stormwater runoff is generated from rain and snowmelt events that flow over land or impervious surfaces—such as paved streets, parking lots, and building rooftops—and does not soak into the ground. The NPDES stormwater program regulates some stormwater discharges from three potential sources: certain municipal storm sewer systems, construction activities, and industrial activities. Operators of these sources might be required to obtain an NPDES permit before they can discharge stormwater. This permitting mechanism is designed to prevent stormwater runoff from washing harmful pollutants into local surface waters. Total Maximum Daily Load. Under the Clean Water Act, states must establish water quality standards; for waters that do not meet these standards, states must develop Total Maximum Daily Loads (TMDLs), which EPA approves. TMDLs set targeted limits for pollutants but are not self-implementing; EPA and states help reduce pollutants by issuing permits for point sources, whereas they provide voluntary incentives to reduce nonpoint source pollution (pollution that cannot be traced to a single source). Wastewater and stormwater utilities in the United States and Mexico are managed, for the most part, by local municipal governments. In the United States, local governments own and operate the majority of drinking water and wastewater utilities and charge users for their service through water rates. In Mexico, local and state governments, including Nogales and Tijuana, own and operate drinking water and wastewater utilities. Each city has its own sewer and wastewater infrastructure, including wastewater treatment plants. For example, the state of Tijuana Public Service Commission of Tijuana is responsible for the operation and maintenance of wastewater collection and treatment infrastructure, and of the drinking water distribution system. In the United States and Mexico, stormwater may be managed by a wastewater utility or a local municipality. Asset management is a widely recognized tool used across a variety of infrastructure sectors to manage physical assets, such as highways, machinery, and buildings. In the case of water infrastructure, those assets include pipelines, tanks, pumps, sewers, and other facilities. In a March 2004 report, we found that water utilities may benefit from implementing asset management practices to better identify and manage their infrastructure needs. To assist water utilities in adopting asset management, in 2003, EPA developed an asset management framework for water utilities. In 2008, EPA incorporated this framework into a best practices guide for water utilities based on similar frameworks used by water utilities in Australia and New Zealand. In a March 2004 report, we reported that federal law does not require water utilities to use asset management, but large water utilities may be more likely to use asset management than small water utilities. In a January 2016 report, we identified leading asset management practices for wastewater utilities that include identifying key assets—such as pipelines, treatment plants, and other facilities—and assessing their life-cycle costs. We have also previously identified key capital planning principles that apply to large capital acquisitions, such as infrastructure. For example, in a February 2007 report, we identified five key planning principles in OMB guidance on capital programming contained in OMB Circular A-11. These include developing links between strategic goals and infrastructure; developing a needs assessment and identifying gaps in infrastructure; evaluating alternatives; using a review and approval framework with criteria for selecting capital investments; and developing a long-term capital investment plan. Further, OMB’s capital planning guidance states that each capital asset should have an operations and maintenance plan that outlines the procedures and responsibilities for scheduled preventive and regular or routine corrective maintenance. In addition, in November 2019, OMB issued a memorandum to federal agencies that reinforced the need to implement the capital programming guidance in OMB Circular A-11 that agencies develop, document, and implement a capital planning process. We have also previously found that economic guidance generally states investment decisions such as those made for infrastructure should be informed by a consideration of both benefits and costs of relevant alternatives. For example, OMB has issued guidance on estimating costs and benefits to help federal agencies efficiently allocate resources through well-informed decision making about activities. This guidance includes OMB Circular A-94, which we have previously identified as providing leading practices for economic analysis. OMB Circular A-94 directs agencies to follow certain economic guidelines for estimating costs and conducting cost-effectiveness analyses of federal programs or policies to promote efficient resource allocation through well-informed decision making in certain circumstances. The guidance applies to federal agencies and programs, but we have previously found that it provides leading practices for economic analysis of investment decisions. Under OMB Circular A-94, a cost estimate is to include a comprehensive assessment of the costs. Under the 1944 Treaty, USIBWC and the Mexican Section have negotiated minutes laying out the countries’ roles and responsibilities in managing and operating the two wastewater treatment plants in the United States. Under this authority, both sections have also established cost-sharing agreements for the ongoing operation and maintenance of each plant. The 1944 treaty establishes the jurisdiction, structure, and functions of IBWC under the treaty, largely establishing IBWC’s present form and processes. Specifically, IBWC is authorized to jointly study, investigate, and develop solutions to transboundary problems related to water and the international boundary. Under the treaty, when a new or anticipated boundary or water problem is identified, USIBWC and the Mexican Section are to discuss solutions and make recommendations to their respective governments for its resolution before negotiating a formal solution through a minute. The early detection and evaluation of the problem, followed by the development of measures for resolution, are a part of IBWC’s mission, according to USIBWC’s website. The proposal for a new IBWC project may be initiated by one or both governments, or by state or local authorities in either country through their respective IBWC section. The project is then to be jointly investigated. If the findings of the IBWC joint investigations show that a cooperative project is feasible and is justified as a binational project, USIBWC and the Mexican Section may endorse the findings in a minute and recommend the project to the United States and Mexico governments. Under the 1944 Treaty, IBWC is also authorized to resolve disputes between the two countries arising from the interpretation or application of the treaty. In ratifying the treaty, the U.S. Senate resolution specified that USIBWC should only conduct work related to the eight projects identified in the treaty and not undertake any other construction projects without congressional authorization. As a result, USIBWC has received separate authorizations from Congress for projects implemented through treaty minutes, including the two international wastewater treatment plants. Specifically, USIBWC constructed the Nogales and South Bay plants under a series of statutory authorizations enacted in several Congresses from the 1930s to the 2000s. USIBWC officials said that IBWC can develop documents that are an alternative to a minute but serve the purpose of gaining consensus between the two sections. Alternatives include an exchange of letters, a signed term of reference, and a joint report drafted by principal engineers from USIBWC and the Mexican Section. A letter exchange would provide the approval of an activity from both the U.S. and Mexican Commissioners, such as flood operations criteria in any given year or emergency notification protocols for communities along the border. A term of reference would provide the scope of work for a project or protocol, describe the work that the two sections will do, and how they will do it. A joint report of the principal engineers is a technical document that can describe ongoing activities or that can commit IBWC to a new activity. These reports can be adopted as a minute, or, if the activity is already under way, not adopted. As a diplomatic agency under the Department of State, USIBWC can negotiate agreements with Mexico on its own, but State gets involved in certain situations, such as the negotiation and conclusion of an IBWC minute, or with respect to large and costly projects, according to State officials. For example, under the Department of State’s Circular 175 procedure, authorization to negotiate and conclude binding international agreements is obtained via approval of a memorandum by the Secretary of State or another Department of State senior official. The Department of State may also provide diplomatic support in a variety of ways. For example, State may draw attention to an issue by sending a diplomatic note to the Mexican Embassy to formally request the need for action to resolve a problem. Further, in coordination with USIBWC, the U.S. Embassy and Consulates may engage with Mexican government officials to advocate actions to address problems, such as water quality problems, including during meetings with Mexican federal and local officials, according to State officials. The IBWC commissioners and staff from both USIBWC and the Mexican Section work together in formal and informal ways, according to officials from both sections. The commissioners meet on a regular basis to discuss ongoing and, if appropriate, new, projects to carry out the treaty. Between meetings, the commissioners exchange information through formal channels with letters. In addition, according to USIBWC officials, the two sections’ staff are in frequent contact, through formal and informal communication. For example, USIBWC officials said staff from both sections will exchange daily emails and telephone calls to discuss information and collaboration on various IBWC projects. Under Article 3 of the treaty, the joint use of international waters “is subject to any sanitary measures or works which may be mutually agreed upon by the two Governments, which hereby agree to give preferential attention to the solution of all border sanitation problems.” Under this article and the articles authorizing joint investigations and solutions, IBWC has negotiated a series of minutes related to sanitation issues, one of which dealt with the issue broadly and others of which dealt with specific geographic locations. Each minute is pursuant to various statutory authorizations in the United States. In 1979, IBWC signed Minute 261, which provides that that the two countries should take timely measures to prevent any border sanitation problem. The minute also provides that for each border sanitation problem, IBWC would prepare a minute that would identify the problem, the course of action for resolution, and a specific time schedule for implementation. Other minutes were executed for sanitation issues in Nogales and Tijuana, pursuant to various statutory authorizations in the United States. For the Nogales plant, Minute 206, signed in 1958, approved a jointly operated and maintained wastewater plant in Arizona based on a Joint Report by the principal engineers. Minute 227, signed in 1967, provided for the relocation of the plant to its current location and expanded the treatment capacity of the plant. Minute 276, signed in 1988, approved a further increase in the capacity of the plant. For the South Bay plant, Minute 283, signed in 1990, approved the construction of the South Bay plant in San Ysidro, California. This minute described the water quality situation, discussed alternatives to fix the problem, and recommended a plan to fix it. The recommended plan included the building of the international wastewater treatment plant, as well as completion of Mexico’s sewage system for Tijuana, and other steps. The Nogales plant provides secondary treatment for wastewater generated in both Nogales, Arizona, and Nogales, Sonora, Mexico. USIBWC and the City of Nogales, Arizona, own the plant, which began operating in 1972. In 1945, IBWC recommended that a plant be built 1.5-miles north of the border with a treatment capacity of 1.6 million gallons per day. The plant was completed in 1951. An underground pipeline, referred to as the “trunkline,” was also constructed to transport the sewage under the border from Mexico 1.5-miles to the plant for treatment. As the population grew in both cities, the communities recognized the need for a larger plant. At the request of the City of Nogales, Arizona, the new plant—with a treatment capacity of 8.2 million gallons per day according to USIBWC documents—was constructed 9-miles north of the border, at the confluence of the Nogales Wash with the Santa Cruz River (see fig. 3). Construction on the new plant began in 1970 and was completed in 1972. In 1988, IBWC signed a minute upgrading the plant, adding additional treatment capacity for Mexican wastewater. Then to comply with more stringent federal and state regulations, the plant was upgraded in 1992 and 2009. At present, USIBWC manages the plant, which has treatment capacity for up to 17.2 million gallons of wastewater from Mexico and the United States per day according to USIBWC documents. Wastewater treatment plants collect sewage from residences and businesses and treat it to remove pollutants such as sediment, bacteria, and other materials. There are three types of treatment at wastewater treatment plants in the United States. States are required to meet standards for two of them. Primary treatment involves physical processes such as screening and sedimentation to remove a portion of pollutants that settle or float. Secondary treatment augments physical treatment with biological processes to remove organic matter. The treatment involves the use of bacteria to consume waste material. Secondary treatment, combined with disinfecting chemicals, such as chlorine, can reduce about 85 percent of pollutants. Tertiary treatment involves specialized or advanced treatment that is specific to the pollutant. For example, some treatment plants try to reduce nutrients such as nitrogen and phosphorus. Tertiary treatment can include additional filtration, reverse osmosis, or additional chemical or biological processes. The South Bay plant provides secondary treatment for wastewater generated in Tijuana, Mexico. USIBWC operates the plant. In the decades, before the plant was built in 1997, untreated sewage reached the Tijuana River, which flows north from Mexico to San Diego, California. The river transported raw sewage to the Pacific coast at Imperial Beach, California, creating a nuisance and public health risk in the United States. To address the problem, IBWC signed Minute 283 in 1990, which provided the framework for a project to treat wastewater from Tijuana, Mexico, at a plant located in the United States. Construction began in 1994. In 1997, the South Bay plant opened with discharge through an emergency connection to the City of San Diego’s wastewater treatment facility. The South Bay plant became fully operational in 1999, providing advanced primary treatment for 25 million gallons of sewage coming from Mexico daily and discharging treated wastewater 3-miles offshore in the Pacific Ocean through the South Bay Ocean Outfall, which is a 3.5-mile-long pipe, according to USIBWC documents. The plant was upgraded with secondary treatment facilities in 2010. It is designed to treat up to 25 million gallons per day of Tijuana’s sewage, with the ability to treat up to 50 million gallons per day for a short period of time, according to USIBWC officials. The City of Tijuana also operates five wastewater treatment plants in Mexico to treat its remaining sewage, though these plants are not always fully operational. The South Bay plant’s facilities include five canyon collectors located along the border in five of the six cross-border canyons. During normal operations, smaller amounts or “low-flows” of urban runoff and wastewater from Mexico are diverted by these canyon collectors and conveyed to the plant through underground pipelines (see fig. 5). IBWC minutes, with the approval of the U.S. and Mexican governments, establish each country’s roles and responsibilities, outline the costs of the Nogales and South Bay plants, and describe the cost-sharing arrangements between the United States and Mexico for operating and maintaining the plants. Minutes for each plant specify the cost-sharing arrangement for construction. See appendix II for details of the IBWC minutes that authorize the construction, management, and operation of the two plants. For the original Nogales plant, the U.S. government authorized the funding in the Department of State, Justice, Commerce, and the Judiciary Appropriation Act for 1947 and provided funding with certain conditions, including that the City of Nogales agreed to furnish the lands or easements free of cost and that the city operate and maintain the project once it was completed. Under Minute 227, signed in 1967, Mexico agreed to participate in funding the expansion of the capacity of facilities at the Nogales plant. This Minute also authorized the relocation of the plant; however, the Minute provided that Mexico’s share of the construction costs of enlarging the international sewage treatment facilities would not change if the United States for domestic reasons constructed the enlarged treatment plant north of its existing site. Mexico conditioned its approval of the relocation on the agreement that Mexico not bear any costs associated with the extension of the IOI pipeline necessary for the relocation, according to USIBWC officials. Further, under Minute 227, the United States, Mexico, and the City of Nogales, Arizona, shared the construction costs of the treatment plant. During the relocation of the plant and resulting extension of the IOI, the City of Nogales acquired all easements in land or the land necessary for the relocation and contributed $791,000 for the expanded plant and IOI, according to USIBWC officials. Mexico’s share was based on the costs of enlarging the treatment plant at the site used for the initial 1951 plant. Since the City of Nogales, Arizona, wanted the plant to be located away from the city limits, the additional IOI costs were not borne by Mexico. The second plant was upgraded in 1988, 1992, and 2009. In 1988, Mexico provided $1 million to pay for the additional capacity built at the plant, as the total capacity allotted to Mexico after the upgrade was 9.9 million gallons per day, and the City of Nogales, Arizona, was allotted a total capacity of 4.84 million gallons per day. The United States and the City of Nogales, Arizona, shared the costs for the 2009 upgrade to the facility. During the 2009 upgrade, EPA provided a $65 million grant to the City of Nogales, Arizona; the City of Nogales, Arizona, contributed $700,000; and USIBWC provided an additional $2 million for the construction of an ultraviolet disinfection system according to USIBWC documents. For the South Bay plant, the United States and Mexico agreed to construct the plant under Minute 283 and to share the costs for construction, operation, and maintenance for the plant under Minute 296. Congress authorized USIBWC’s participation in 1987 amendments to the Clean Water Act. The construction cost for the plant was $241.1 million. The United States contributed $224.6 million—specifically, EPA provided $127.4 million to USIBWC for costs associated with the construction of the plant and related infrastructure, $89.2 million to the City of San Diego and the Corps to construct the South Bay Ocean Outfall, and $8 million to the Corps for additional environmental work. Mexico contributed $16.8 million, which was the amount that it would have had to pay to construct and maintain a plant in Mexico. As part of Minute 283, IBWC also built a diversion infrastructure just south of the border to capture low-volume, dry-weather flows in the Tijuana River to prevent northbound transboundary flows into the United States. This diversion system is operated by Mexican entities and includes pumps and pipelines that send wastewater to the South Bay plant. Minutes also specify cost-sharing arrangements for the ongoing operation and maintenance of the plants. Under the cost-sharing agreements in relevant minutes, the Mexican government generally reimburses USIBWC annually for a portion of the treatment costs at each plant. The reimbursement rate is annually adjusted based on what it would cost to treat a similar amount of wastewater in Mexico according to USIBWC officials. In addition, USIBWC has a separate agreement with the City of Nogales, Arizona, for the Nogales plant that stipulates reimbursements for their sewage treatment. These minutes and cost-sharing arrangements are as follows: Cost-Sharing Agreements for the Nogales plant. Under Minute 206, Mexico agreed to pay for some operations and maintenance costs, based on its proportion of wastewater flows to the Nogales plant for treatment, at a discounted rate for a predetermined amount of sewage. IBWC commissioners periodically review this discounted rate. Specifically, USIBWC assesses the percentage of sewage (up to 9.9 million gallons per day) Mexico sends to the Nogales plant and adjusts the rate to what it would cost to perform the same service in Mexico, according to USIBWC officials. Furthermore, the Mexican government has agreed to pay full U.S. cost for any flow above the treaty-allotted 9.9 million gallons per day, according to these officials. Meters located at three sites along the U.S-Mexico border continuously measure the sewage flow, and if the amount of sewage treated by the plant exceeds the 9.9 million gallons per day, Mexico is billed by USIBWC for the full cost of sewage treatment, according to USIBWC officials. Separately, USIBWC charges a rate for treatment of the city’s sewage under a Memorandum of Agreement with the City of Nogales, Arizona. Cost-Sharing Agreements for the South Bay plant. Under Minute 296, Mexico agreed to pay for operations and maintenance costs for the plant based on the treatment of up to 25 million gallons per day. The pump that diverts Tijuana’s wastewater into the South Bay plant can pump as much as 29 million gallons per day, and the plant can treat more than 25 million gallons per day if needed. Similar to the Nogales plant, USIBWC, on a quarterly basis, bills the Mexican government a prorated amount for the treatment services based on the amount of flow. For example, in fiscal year 2018 Mexico paid USIBWC about $2.4 million for treatment of its wastewater. In fiscal year 2018, the plants’ operational and maintenance costs totaled $4.5 million for the Nogales plant and $15 million for the South Bay plant, and in that fiscal year, the Mexican government reimbursed USIBWC $4.4 million for both plants, according to USIBWC documents. In addition, according to USIBWC officials, the City of Nogales, Arizona is behind in its payments for the Nogales plant by $3 million, and Mexico owes $3 million, according to officials. USIBWC initially pays for the operations and maintenance costs at all its facilities, including the two wastewater treatment plants, and then seeks reimbursement from Mexico and the City of Nogales, Arizona, for their portions of the operation and maintenance costs. The operation and maintenance costs for each plant include the plant’s employees, such as water operators and skilled technical employees, who manage nonstop operations such as running the equipment, controlling the processes, and monitoring the facilities. The Nogales plant employed 17 people as of 2019. USIBWC has used a third-party contractor (Veolia Water Operating Services) to conduct operational and maintenance activities at the South Bay plant since 1998, according to officials. USIBWC Salaries and Expenses budget line item includes funding for each plant’s operation and maintenance. According to federal officials in the United States and Mexico, the operations and maintenance of wastewater infrastructure in Mexico is an ongoing challenge. According to these officials, Mexican wastewater utilities do not have the resources or the long-term technical expertise to address equipment maintenance problems in a timely manner to prevent spills. Although NADB has provided financing to wastewater infrastructure utilities that send wastewater to USIBWC’s Nogales and South Bay plants, utilities often the lack the resources necessary to adequately maintain the infrastructure and equipment after the construction loan ends, according to NADB officials. NADB could condition financing for every wastewater infrastructure project on capacity to adequately manage operations and maintenance of the infrastructure, as it has for a few projects, according to USIBWC and EPA officials. In the United States, as we reported in January 2016 the U.S. Department of Agriculture includes as one of its loan conditions the capacity of the wastewater utility to pay for operations and maintenance of infrastructure. USIBWC has identified numerous projects related to operating the plants or building new infrastructure that remain unfunded under the agency’s current appropriations level, according to an agency document. USIBWC’s Budget Office, as part of its Fiscal Year Year-end Budget Procedures and Guidance, annually sends its staff a report with the projected balances for the Salaries and Expenses and Construction line items for the remainder of that fiscal year. The guidance directs that each department—Engineering, Operations, and Administration—identify work or projects for which they need funding. Each projected balance is to be calculated by subtracting expenses from each group’s allocated funding for the year. The departments are to identify any outstanding requirements and associated costs for the remainder of the fiscal year. For fiscal year 2018, USIBWC identified $9 million in potential operations and maintenance work and $2.8 million for potential construction projects, based on agency documents. For example, USIBWC identified the need for $149,000 for new pumps and motors for pump stations at the South Bay plant but deferred the purchase due to other funding needs, according to an official. Several factors can affect each plant’s operations. IBWC and others have taken some actions to address the factors affecting each plant’s operation, including initiating an informal binational rapid response team to address breaking and failing wastewater infrastructure along the border. However, IBWC has not taken the necessary steps to formalize this rapid response team, and raw sewage continues to periodically spill into the Santa Cruz River Basin and Tijuana River Valley watersheds. USIBWC’s Nogales and South Bay plants are subject to NPDES permits issued by the states of Arizona and California, respectively, which generally prohibit the discharge of pollutants from the plants unless specifically allowed under the permit. Generally, a NPDES permit is issued for a term of 5 years to a single facility and reflects site-specific conditions of that facility. The Nogales plant’s NPDES permit requirements are based on a maximum monthly average of 17.2 million gallons per day to be treated and discharged into the Santa Cruz River. The permit allows the discharge of certain pollutants within specified limits, including some heavy metals, such as mercury and copper. Under the permit, USIBWC must also meet several monitoring requirements, including monitoring the pollutants in the water coming into the plant from the IOI, the amount of treated wastewater discharged into the Santa Cruz River, and the presence of pollutants named in the permit. USIBWC is to submit this information to Arizona Department of Environmental Quality (ADEQ) for monthly or annual review. The Nogales plant permit also requires USIBWC to remove sludge produced as part of the treatment process and dispose of it at an offsite location that is certified to receive that type of byproduct. Since 2014, ADEQ has issued four Notices of Violation to USIBWC for the Nogales plant’s permit. The notices cited the exceedances of certain substances above permit limits, including some heavy metals in the discharge (in 2019); the presence of pollutants toxic to human, animals, plants, or other organisms (in 2018); untreated sewage spilled into a tributary of the Santa Cruz River (in 2017); and USIBWC’s failure to accurately monitor and report specific substances to ADEQ as outlined in the permit (in 2014). Each notice outlined actions that USIBWC was required to take to improve the water quality problem identified within a specific time frame. The South Bay plant has not received any Notices of Violation under its current NPDES permit, which was issued in 2014, according to USIBWC officials. The current permit covers the South Bay plant and other infrastructure including five canyon collectors and the South Bay Ocean Outfall. The permit sets a discharge limit of 25 million gallons per day of treated wastewater, on a monthly average, to the Pacific Ocean through the South Bay Ocean Outfall. The permit limits the pollutants that can be discharged, such as zinc and mercury. Under the permit, USIBWC and the City of San Diego conduct a joint monitoring program of the wastewater discharge at the South Bay Ocean Outfall and are required to submit the data collected from this joint monitoring effort to the San Diego Water Board. The permit also includes monitoring requirements for other parameters, including heavy metals and organic chemicals that are considered harmful to the environment and public health. The South Bay plant has not violated the permit’s discharge limits through the South Bay Ocean Outfall since secondary treatment began in 2010, according to USIBWC officials. During rainstorms or wet weather in Tijuana and when pipelines or pumps break, the plant does not treat all the water flowing from Mexico. During these events, water flows to the Tijuana River and canyons and mixes with unknown amounts of urban runoff, treated effluent from the Tijuana River, and wastewater in Mexico and then flows into the Tijuana River Valley watershed in the United States. During dry weather, the runoff is largely groundwater and some untreated discharge from illegal connections (dry-weather flows); during storms, this runoff mixes with large amounts of rainfall (wet-weather flows). There are several factors that can affect the operation of the Nogales plant. Lack of heavy metal pretreatment in Mexico. In Mexico, metal treatment and plating facilities operate in Nogales, Sonora and directly discharge wastewater that contains heavy metals into the city’s sewer systems, which end up at the Nogales plant for treatment. While a municipal pretreatment program exists in Nogales, Sonora, it is designed to meet Mexico’s minimum federal requirements and is insufficient to detect and respond to the dumping of industrial contaminants when they occur, according to ADEQ documentation and officials. Deteriorating sewage infrastructure in Mexico. Sewage infrastructure in the City of Nogales, Sonora, is not adequately maintained, according to USIBWC officials. As a result, the city of Nogales, Sonora, sends wastewater amounts to the plant in excess of the amount agreed upon in the minute between USIBWC and the Mexican section. Due to the proximity of the plants to the U.S.- Mexico border, USIBWC’s international wastewater treatment plants in southern California and southern Arizona are located in areas patrolled by Customs and Border Protection (CBP) agents. In southern California, the waterways in which sewage pipelines connect to the South Bay International Wastewater Treatment Plant provide a natural crossing point at the border, which CBP has blocked with gates. In southern Arizona, drug smugglers use the International Outfall Interceptor pipeline— which transports sewage from Mexico to the Nogales International Wastewater Treatment Plant—to transport drugs. According to CBP officials, smugglers in Mexico drop drug bundles into manholes that connect to the pipe, and smugglers in the United States cut into the pipe to retrieve the bundles. These holes in the pipe can cause sanitary sewer spills in Nogales, Arizona. CBP agents patrol along the pipeline to catch smugglers and retrieve the drug bundles, according to CBP officials. Deteriorating infrastructure in the United States. In the United States, the deteriorating condition of the IOI causes untreated sewage to periodically spill into the Santa Cruz River watershed and Nogales Wash. The deterioration is due to the age of the pipe, as well as ongoing corrosion and erosion of the pipeline (see fig. 6). See appendix III for more details on the factors that affect the operations of the Nogales plant. One key factor affects the operation of the South Bay plant: insufficient sewage infrastructure in Mexico contributes to transboundary sewage flows that, if not diverted, can reach the plant and disrupt its operations. According to a 2019 study, Tijuana has not built sufficient sewage infrastructure to serve the area’s exponential population growth and urbanization. When problems arise with Tijuana’s treatment facilities, the city diverts a portion of its wastewater for treatment at the South Bay plant. In these instances, the Mexican utility may also shut down Pump Station CILA, a main pump located in the Tijuana River that diverts the river to the treatment plant. If the South Bay plant is not notified and does not shut down its pump and canyon collectors, it may receive additional flows. While the plant can treat additional wastewater and has not violated its NPDES permit, the plant is experiencing an increase in the number of days that it treats above capacity, according to USIBWC officials. In addition, USIBWC officials stated that the South Bay plant is not designed and operated to address some of the wastewater that flows into the Tijuana River Valley watershed. These wastewater flows are due to: Limited Tijuana Basin diversion infrastructure. The Tijuana Basin diversion system consists of the Mexican-operated Pump Station CILA and the South Bay plant’s canyon collectors. This system captures dry-weather flows for treatment at the South Bay plant or for a wastewater treatment plant in Mexico. However, it is not designed to capture high flows that result from pipe breaks or pump failures. To avoid affecting the South Bay plant’s wastewater treatment operations, during incidents of high flows, Pump Station CILA and the five canyon collectors are shut off. During these events, the water bypasses the South Bay wastewater treatment plant and flows untreated into the Tijuana River and watershed. For example, a February 2017 spill from a broken pipeline in Mexico released 143 million gallons of sewage-contaminated water into the Tijuana River that bypassed the South Bay plant and was not treated. Lack of maintenance for existing sewage infrastructure in Mexico. A lack of maintenance for Tijuana’s existing sewage infrastructure causes excess wastewater flows into the Tijuana River according to USIBWC officials. For example, in August 2019, USIBWC reported that on June 19, 2019, 1.9 million gallons of wastewater were released into the Tijuana River because of trash buildup at one of Tijuana’s pumps that caused the pump to fail. A 2019 study also reported that the poor condition of critical wastewater infrastructure in Mexico results in approximately 30 percent of Tijuana’s wastewater entering the Tijuana River or Pacific Ocean without treatment. See appendix III for more details on these factors that affect the operations of the South Bay plant. USIBWC and the Mexican Section have taken some actions to address the factors that can impede plant operations. However, raw sewage is still released from Mexico into the Santa Cruz River Basin and Tijuana River Valley watersheds and continues to have significant public health and environmental impacts. USIBWC and others have taken various actions to address the factors that affect Nogales plant operations, including the following: Sending letters to heavy metal dischargers. To address the presence of heavy metals in the wastewater stream, in October 2018, USIBWC, ADEQ, and EPA sent joint letters to four American companies affiliated with the metal treatment and plating facilities in Nogales, Sonora, Mexico. The letters asked for the companies’ cooperation in addressing the issue and offered to meet with each company to discuss possible solutions. According to USIBWC officials, they received a response from one company, but not the other three. However, in continued monitoring, USIBWC has seen fewer instances of heavy metals in the wastewater that it treats at the Nogales plant according to agency officials. Maintaining treatment capacity in Nogales, Sonora. To address the inadequate wastewater infrastructure in Nogales, Sonora, IBWC has collaborated with other stakeholders to maintain wastewater treatment capacity in Mexico. For example, the U.S. State Department sent a diplomatic note to the Mexican government in February 2019 regarding the failing pumps and asked the Mexican government to quickly respond and eliminate the discharges that end up at the Nogales plant. USIBWC officials stated that the Mexican Section of the IBWC purchased two new pumps, which were expected to arrive at the pump station in Nogales, Sonora, in late 2019. The Mexican Section also plans to work with the local utility to install equipment to remove grit from the wastewater and prevent degradation of the new pumps. Upgrading infrastructure in the United States. In 2005, USIBWC proposed a five-phase plan to rehabilitate the IOI’s pipe that uses a process referred to as “cured-in-place pipe.” In this process, a polyester tube is inserted into the pipe and inflated, which then hardens to become a pipe within a pipe. This process has an estimated cost of $50 million. As of November 2019, the rehabilitation had not started due to funding disagreements between USIBWC and the state of Arizona. According to USIBWC officials, the agency does not want to fund the entire project but has secured $28.1 million for it. According to USIBWC officials, the City of Nogales will not contribute any funding without a change to the current cost-sharing agreement on reimbursements between the city and USIBWC for sewage treatment. The cured-in-place pipe process will address some of the IOI’s deferred maintenance issues but will not resolve ongoing disagreements about which entity is responsible for funding annual maintenance and operations. According to USIBWC officials, the annual maintenance needs include more than the work to repair the IOI. For example, lateral pipelines that connect City of Nogales sewers to the IOI also need to be maintained; occasional breaches in the pipeline need to be repaired; and vegetation management along the pipeline is necessary to prevent root intrusion into the pipeline. USIBWC officials estimated the annual cost for operations and maintenance, including infrastructure repair and personnel costs, at about $1.5 million to $2 million. IBWC and others have also taken actions to address the pump failures and pipeline breaks in Tijuana that send polluted flows downstream, affecting the Tijuana Basin diversion infrastructure and subsequently the South Bay plant. These actions include the following: Negotiating a Binational Tijuana River Spill Notification Protocol. In August 2017, IBWC negotiated a notification protocol for raw sewage discharges into the Tijuana River that may enter the United States. The protocol was prompted by the February 2017 spill from a broken pipeline in Mexico of 143 million gallons of sewage- contaminated water that flowed into the Tijuana River. The initial protocol stated that a formal memorandum of understanding would be developed at a later date to formalize the protocol; however, the initial protocol remains in place. According to an USIBWC official, Mexico has since adhered to the protocol twice by warning USIBWC of imminent raw sewage flows when pipelines in Tijuana, Mexico, ruptured. However, in August 2019, USIBWC reported that most of the transboundary flows were detected by an automated alert system on the U.S. side of the border that was deployed by USIBWC in October 2018 to better monitor and detect any transboundary flows. The system relies on river gage data recorded at the Tijuana River that is also posted to the USIBWC website. Upgrading infrastructure in Mexico. In April 2018, the Department of State sent a diplomatic note to the Mexican government after failures in Tijuana’s sanitation infrastructure led to sewage flows on multiple days in 2017 and 2018. The diplomatic note requested that the Mexican government take appropriate measures (as outlined in Minute 283) to stop sewage flows from crossing into the United States, including making short-term repairs and longer-term upgrades. According to USIBWC officials, Mexico does not have much funding for its infrastructure. However, in March 2019, Mexico and EPA, through NADB, funded the replacement of three segments of the Poniente Collector in Tijuana, Mexico, to eliminate a key source of untreated discharges into the Tijuana River in the United States. Participating in the Tijuana River Diversion Study. In 2019, NADB funded the study of alternatives to expand or adapt the diversion infrastructure in the Tijuana River to identify potential infrastructure projects (and associated costs) to divert dry-weather flows and possibly some flows that result from wet weather mixed with wastewater and raw sewage. The study developed project alternatives in Mexico, the United States, or both countries that would reduce the number of days that transboundary flows occur, including by diverting more wastewater through the South Bay plant to prevent its release in the United States. The alternatives range in cost from $8 million to $236 million. USIBWC, the Mexican Section, the EPA, the Mexican National Water Commission, and the Tijuana water utility also coordinated on the study, which was completed in July 2019. Even with the efforts of IBWC and others, raw sewage continues to be released in both watersheds due to deteriorating and insufficiently maintained sewage infrastructure primarily in Mexico, with the exception of the IOI in the United States. In the Santa Cruz River, the presence of raw sewage in Nogales Wash and the river continues to threaten public health and the survival of fish and wildlife, including endangered species, according to representatives of Friends of the Santa Cruz River, a local nonprofit organization. Similarly, raw sewage containing E. coli and other pathogens continues to flow into the Tijuana River and watershed primarily during storm events or breaks in infrastructure in Tijuana, contributing to public health concerns and beach closures in southern California. To address the continuing release of raw sewage due to pipe breaks and pump failures, at an IBWC meeting in spring 2019, USIBWC proposed the development of a rapid response team comprised of technical experts from both countries that could immediately respond to infrastructure problems, such as pipe breaks and pump failures. This team would take actions to mitigate sewage leaks along the border such as those in Nogales, Sonora, and Tijuana. For example, the team would respond immediately to situations in which a pipe break in Mexico causes wastewater to flow into the United States and would put in place appropriate diversions and equipment to repair the break. Members of the team would come from both countries, and funding for their deployment would come primarily from the United States. USIBWC has not estimated the cost to form and annually support the binational team. The principal engineers from both USIBWC and the Mexican Section have agreed to start building the team with their respective staff, according to a USIBWC official. However, this agreement is informal, and IBWC has not taken the necessary steps to formalize the team. Such steps could include preparing a minute. Specifically, Minute 261 states that for each border sanitation problem, IBWC is to prepare a minute identifying: (1) the problem; (2) the conditions which require solution; (3) specify quality standards that should be applied; (4) the course of action that should be followed for its solution; and (5) the specific time schedule for its implementation. According to IBWC officials, the benefit of a minute is that it functions as a formal agreement between the respective governments, encouraging them to provide greater support through funding and other resources to ensure the solutions and projects are implemented. According to USIBWC officials, they also have alternatives to negotiating a minute, such as issuing a joint report, and a minute may not be necessary for the countries to formalize their commitment. For example, IBWC could exchange formal letters signifying their intent to form the team or issue a joint report written by each IBWC section’s principal engineers. By formalizing a binational rapid response team to address sewage infrastructure failures along the U.S.-Mexico border, including the watersheds around the Nogales and South Bay plants, USIBWC would have better assurance that it is able to more effectively address the urgent and recurring sewer breaks and pump failures in Mexico that contribute to raw sewage spills. USIBWC has taken some actions to address water quality problems at both plants, but USIBWC and the Mexican Section have not taken actions to address unmanaged stormwater flows and their associated water quality problems. USIBWC officials stated that the agency does not have the authority to manage stormwater problems in the Santa Cruz River Basin or Tijuana River Valley watersheds without direction by Congress. Further, USIBWC has not fully incorporated key planning principles for long-term capital planning that would help it identify alternative approaches for resolving the ongoing water quality problems along the border. USIBWC and others have taken some actions to address the water quality problems that exist in the two watersheds, but USIBWC has not taken actions that include identifying alternatives to address stormwater and stormwater quality in the Santa Cruz River Basin watershed or in the Tijuana River Valley watershed. As a result, unmanaged stormwater flows largely untreated downhill from Mexico, carrying bacteria, trash, and sediment into the lower portions of the Santa Cruz River Basin and Tijuana River Valley watersheds where the Nogales and South Bay plants are located, threatening key infrastructure and complicating water quality management in the watersheds. The stormwater carries the pollutants across the border, depositing them in the river channel, shorelines, nearby wetlands, and—in the case of the Tijuana River—ultimately the ocean, causing public health and environmental concerns in the United States. In addition, stormwater can damage plant infrastructure. The Nogales Wash is the main drainage for the cities of Nogales, Sonora, and Nogales, Arizona. Stormwater from the upper watershed flows into the wash and crosses the border, carrying bacteria and sediment into the United States. According to IBWC officials, because Nogales, Sonora, does not have adequate stormwater sewers, Mexican citizens remove manhole covers to allow stormwater to drain from the streets into the sanitary sewers during heavy rainstorms. The IOI essentially becomes a combined sewage system—one in which wastewater and stormwater flow in the same pipelines—even though it was not designed as such, according to USIBWC officials. The excess stormwater causes increased pressure in the IOI that is released when the manholes in the United States overflow, sending sewage into the streets of Nogales, Arizona. In July 2018, ADEQ documentation noted that Nogales, Sonora, experiences frequent flooding during heavy rain events in the summer and uses the IOI to mitigate flood events, which results in releases of untreated sewage into the residential and business neighborhoods in the City of Nogales, Arizona and the Santa Cruz River watershed. For example, in 2017, Santa Cruz County Health Services and the Arizona Department of Health Services released public health advisories for elevated E. coli for the City of Nogales, Arizona, due to untreated sewage leaking from the IOI. According to one of these advisories, stormflows are typically high in pollutants that can be harmful to human health such as bacteria and pathogens. Unmanaged stormwater flowing into the Nogales Wash can destabilize the IOI, which runs inside or below the wash, from the border to the Nogales plant. Stormwater rushing down the wash erodes and removes natural and manmade materials covering the pipeline, such as the cement panels lining the middle portion of the wash (see fig. 7). For example, in July 2017, flooding in the Nogales Wash eroded the soil around a manhole in the IOI, partially shearing the pipe and causing untreated wastewater to flood into the wash and into the streets of Nogales, Arizona, resulting in elevated levels of E. coli in the wash and Santa Cruz River. As a result, the Arizona Governor’s Office declared a State of Emergency in Santa Cruz County and sent a notice of the Nogales plant’s permit violation to USIBWC. To date, USIBWC’s actions have focused on emergency repairs and cleanup when untreated sewage has leaked from the IOI into the Nogales Wash and Santa Cruz River. During the July 2017 event, for example, to prevent further contamination of the wash due to the release of raw sewage leaking from the broken section of the IOI, USIBWC hired a contractor to install a bypass system to divert the raw sewage spilling into the wash to the Nogales plant for treatment. Other stakeholders also took action. For example, at the request of the Arizona governor’s office, the Corps stabilized earthen banks along the Nogales Wash that had eroded. The Arizona Army National Guard and Arizona Department of Transportation also took part in similar efforts. In general, the Nogales Wash is not regularly maintained to stabilize the earthen banks and concrete panels to prevent erosion. According to USIBWC officials, operations and maintenance of the Nogales Wash and management of stormwater in the Nogales Wash is a municipal responsibility and not the responsibility of the IBWC. As a result, USIBWC has not taken action to manage the Wash to prevent stormwater damage to the IOI. Instead, it has—as with the example above—sought to bring in other federal agencies that USIBWC says have authority over domestic water management. However, Nogales city managers do not accept responsibility for managing the wash, stating that it is IBWC’s responsibility. USIBWC and other federal agencies have conducted some studies in Mexico to address stormwater management in the watershed. For example, USIBWC contracted the Corps to conduct an evaluation to develop measures to reduce the threat of flooding and alternatives to reduce potential flood damage in Nogales, Sonora. The study was completed in 2004. Based on the recommendations in the evaluation, Nogales, Sonora, and the Mexican federal water agency, constructed 14 dams and detention basins from 2008 through 2015. However, according to USIBWC officials, the basins that are in Mexico and maintained by the local utility are full of sediment and have not been cleared because the local Mexican utility does not have funds to maintain them. In addition, USIBWC and the U.S. Geological Survey have collaborated on joint studies of the watershed surrounding Nogales, Sonora, for many years according to USIBWC officials. For example, one study completed in 2016 was to be the basis of further work to identify stormwater management projects, but that work has not been planned or conducted. (See app. IV for details of additional studies.) In the absence of an entity that regularly maintains the wash, the IOI is still threatened when stormwater runs through the wash. IBWC has not contracted for or conducted a study to identify long-term solutions to the stormwater quality problems in the watershed, like was done with the Tijuana River Diversion Study. Instead, since 2005, USIBWC has responded to events that threaten the IOI as they occur at the request of the City of Nogales, Arizona, and used an emergency response authority that is applicable to the U.S.-Mexico border, according to USIBWC officials. The Mexican Section also has not addressed maintenance of the already insufficient stormwater conveyance infrastructure in Nogales, Sonora. Without resolution, the unmaintained wash and inadequate stormwater infrastructure in Mexico threaten the stability of the IOI with additional stormwater damage. Stormwater carries trash into the canyons that cross the border area, as well as bacteria from illegal sewer connections and infrastructure breaks in Tijuana, and sediment that erodes from the steep hills of Tijuana. As part of routine operation and maintenance, USIBWC annually removes trash and clears sediment from the grates in the South Bay plant’s five canyon collectors according to agency officials (see fig. 8). The pollutants carried in the transboundary stormwater also cause ongoing degradation to the riparian and estuarine habitats within the lower Tijuana River Valley, impacting ecological diversity, wildlife, and ceremonial and recreational use of the area. For example, from 2003 through 2017, the City of Imperial Beach, California, closed public beaches for at least one-quarter of the year and half the year in some years due to bacterial contamination in the Tijuana River, according to city officials. Although the parties dispute the source of pollution causing the closures, the raw sewage that enters into the Tijuana River Valley and flows with stormwater into the ocean is a likely source of pollution. In response to the bacteria and trash problems caused by flows from Mexico into the Tijuana River Valley, the California Regional Water Quality Control Board, San Diego Region, initiated the development of two TMDLs—for bacteria and trash—for the Tijuana River. If the TMDLs are applied, USIBWC would be responsible for meeting the TMDL requirements, according to a California state official; USIBWC disagrees. If it were subject to a TMDL, USIBWC would be expected to oversee the trash collection and removal in the United States even if the trash originated in Mexico. USIBWC maintains that its ownership of the Tijuana Flood Control Project does not make it responsible for the quality of water flowing in that project from Mexico under the Clean Water Act. As of November 2019, the issue of whether USIBWC should take action to resolve these pollutant problems is in litigation. In 2015, IBWC also negotiated a minute to address stormwater effects in the Tijuana River Valley, Minute 320, General Framework for Binational Cooperation on Transboundary Issues in the Tijuana River Basin. According to USIBWC officials, the minute was developed after local stakeholders in California asked Mexico to take action to address stormwater problems in the United States. Mexico responded that it participates in binational solutions to issues through IBWC. Under Minute 320, the United States and Mexico acknowledged that binational coordination is required to address stormwater flows that carry bacteria, trash, and sediment, as well as other pollutants that threaten the Tijuana River Basin. growth of aquatic vegetation and decrease spawning areas and habitats for fish and other organisms. rubber, and construction material—settles on the bottom of waterways, affecting bottom feeding organisms. In response, IBWC formed three binational working groups composed of local, state, and non-governmental stakeholders to conduct studies to identify the sources of bacteria, trash, and sediment that stormwater flows carry into the Tijuana River Valley. The working groups are tasked with recommending solutions to the problems based on the studies’ findings. However, Minute 320 did not set a timeline for completion of the studies nor did it identify sources of funding for potential projects recommended by the working groups. According to USIBWC officials, Minute 320 anticipates that there may be variety of sponsors and funding resources for projects recommended by the working groups. The three groups stopped meeting in 2017. In June 2019, the water quality and sediment groups resumed meetings, but as of September 2019, the trash working group had not reconvened. According to USIBWC officials, as of November 2019, IBWC is convening a meeting of a reconstituted Minute 320 Binational Core Group, following up on stakeholder recommendations to re-establish and strengthen the Minute 320 process: Water quality working group. The water quality group is working on an ongoing binational water quality monitoring program that began in December 2018 and was to end in November 2019. The group is sampling sewage and other flows at various locations in the United States and Mexico to establish baseline data for pollutants in the waters of the Tijuana River watershed according to USIBWC officials. Sediment working group. The sediment group is working on an ongoing sediment detention feasibility study funded by USIBWC to identify the most effective means of sediment management within the Tijuana River channel. The sediment working group had recommended the study. USIBWC estimates the cost of removing sediment at $15 million per year, based on an estimated 492,000 tons of sediment entering the river each year and about three-quarters of it being removed. According to USIBWC officials, the sediment working group expects to complete the study in early 2020. Trash working group. The working group has developed the scope of work for a binational study of trash booms in different sites along the Tijuana River. It is waiting on funds to perform a feasibility study. USIBWC and several state and local agencies have taken further actions to address these water quality problems in the Tijuana River Valley Watershed, including the following: Constructing a temporary earthen berm in the Tijuana River Channel. In 2018, USIBWC constructed a temporary earthen berm in the U.S. section of the concrete channel of the Tijuana River, close to the border. The purpose of the berm was to hold back low-volume, dry-weather flows contaminated with untreated sewage; however, some sediment and sewage still enters the Tijuana River Valley during high-volume flows or storm events because those flows permeate the berm according to USIBWC documents. USIBWC officials said the berm is just a temporary measure to capture low- volume flows of sediment and trash during dry weather and is not intended as a long-term solution for the river channel. Monitoring water quality in the Pacific Ocean. To understand the sources of beach pollution, USIBWC contracts with the City of San Diego to regularly monitor water quality in the Pacific Ocean, in particular around the discharge points for the city’s wastewater treatment plant and the South Bay plant. Starting in 2018, the City of San Diego and USIBWC began a joint program to track the extent of dispersion of sediment into the Pacific Ocean where the Tijuana River empties into the ocean according to USIBWC and City of San Diego officials. Collecting and disposing of trash and sediment. Several state and local agencies collect and remove sediment from their land parcels in the Tijuana River Valley. For example, California State Parks placed a boom across the floor of one of the five canyons to collect trash and sediment from stormwater flows (see fig. 9). Since 2015, California State Park employees annually collect and remove trash and sediment from the rack and disposes of it at a local landfill and quarry, at a cost of $1.8 million per year. In addition, the U.S. Customs and Border Protection agency also removes trash and debris from grates associated with four of the five cross-border canyons as often as necessary to protect the health of agents conducting daily patrol operations. Identifying projects to reduce sewage, trash, and sediment, in the Tijuana River Valley. The County of San Diego is funding an assessment to identify and prioritize potential projects that could be implemented in the United States to improve the water quality in the Tijuana River Valley by addressing transboundary flows of sewage, trash, and sediment. The county expects the assessment to be completed in March 2020, and intends to work with partners in the region to identify funding and other resources necessary to implement the highest priority projects, according to San Diego County officials. (See app. IV for additional studies.) As of October 2019, USIBWC officials said they were reviewing alternatives outlined in the 2019 study of alternatives to expand or adapt the diversion structure for the South Bay plant to address transboundary sewage flows. In December 2019, local government officials in California passed a resolution supporting a set of projects to be built on the U.S. side of the border to resolve the water quality problems. The mayors of several California municipalities endorsed EPA to receive funding to construct projects on the U.S. side of the border to help resolve water quality problems in the Tijuana River basin. In January 2020, a large trash buildup in a storm drain on the border caused putrid water to back up in Tijuana, highlighting the nature of the trash and sediment problem in the upper watershed, which also affects the lower watershed. In December 2019, a congressional committee identified the need for EPA to lead the efforts to resolve these problems. According to USIBWC officials, while the most cost-effective solutions are in Mexico, the Mexican government lacks resources to make all of the infrastructure improvements. However, officials told us the proposed solutions on the U.S. side of the border may be more expensive or difficult to implement in part due to other constraints to the United States. For example, one of the alternatives would divert untreated sewage to the South Bay Ocean Outfall for direct discharge into the Pacific Ocean, but the discharge likely would not meet Clean Water Act standards. According to USIBWC officials, solutions that lead to violations of Clean Water Act standards would not be acceptable to USIBWC, EPA, or other U.S. stakeholders. According to EPA officials, USIBWC has expertise in operating and managing water and wastewater infrastructure, while EPA has expertise in addressing water pollution. In addition, EPA officials stated that USIBWC’s binational presence and ability to work across the border is important to deal with operations and maintenance issues, such as clearing stormwater channels. EPA officials stated that their role in coordinating with USIBWC is important for identifying and addressing specific water quality problems. For example, joint efforts by both agencies through the Mexicali Binational Sanitation Observation and Technical Committee led to successful solutions to wastewater pollution and trash problems through joint monitoring and site visits, according to EPA officials. USIBWC officials stated that the agency does not have the specific authority to manage stormwater problems in the Santa Cruz Basin or Tijuana River Valley watersheds without the direction of Congress. Minute 261 states that IBWC shall “give permanent attention to border sanitation problems and give currently existing problems immediate and priority attention.” In addition, OMB Circular A-94 calls for agencies to assess the benefits and costs of alternative projects. Although IBWC, USIBWC, and others have taken some actions to address stormwater quality problems in the Santa Cruz River Basin and Tijuana River Valley watersheds, such as conducting studies of stormwater and building some retention basins, the problems have nevertheless continued to occur over many years, and no entity has taken action to identify alternatives, cost estimates, funding sources, or time frames for implementing them. USIBWC officials stated that feasibility studies and analyses are necessary steps in justifying requests for funding a project and investigating the cost and technical feasibility of a project. While USIBWC has conducted some feasibility studies on different individual solutions, it has not done a comprehensive study to recommend any overall solutions to address the transboundary stormwater problems of bacteria, trash, and sediment in either watershed. According to USIBWC officials, previous projects it has built in Nogales and South Bay were developed with federal, state, and local partnerships and with congressional approval. In particular, USIBWC officials stated that the agency does not have specific authorization for stormwater management in the watersheds surrounding the Nogales and South Bay plants because the 1944 Treaty and accompanying legislation did not authorize that the agency carry out projects for stormwater management along the border. USIBWC’s role in addressing certain transboundary stormwater flows and associated water quality problems is in dispute in ongoing litigation involving the Santa Cruz and Tijuana River basins, and USIBWC officials stated that they would not take action to resolve the stormwater quality problems without congressional direction. Yet without action, the long-standing environmental and health problems associated with transboundary stormwater flows in the watersheds of both rivers will continue. Under these circumstances, Congress has the opportunity to provide direction and specific authorization for USIBWC to take action. Such action would include identifying alternatives, cost estimates, funding, and time frames. USIBWC has not fully incorporated key capital planning principles that would help identify alternative approaches to address water quality problems in the Santa Cruz or Tijuana River Valley watersheds. In 2019, OMB issued a Capital Programming Guide that supplements Circular A- 11, which provides guidance on capital programming, including key capital planning principles (see table 1). In February 2007, we reported that OMB’s guidance on capital planning requires long-range planning and a disciplined decision-making process as the basis for managing assets to achieve an agency’s goals and objectives. We also reported that the planning phase is the most important for the capital decision-making process and that it links capital asset investments to an organization’s overall mission and long-term strategic goals. We emphasized that agencies should evaluate a full range of alternatives to bridge any performance gap and recommended that Congress require agencies to develop long-term capital plans and submit them for review. Furthermore, in January 2016, we reported that asset management planning for water utilities includes key components such as assessing the current state of their assets (for example pipelines and treatment plants), incorporating life-cycle costs, and developing a strategy for the long-term funding of the repair and replacement of their assets. In our review of documents and interviews with USIBWC officials, we found that the agency incorporates aspects of the key planning principles in its capital planning and budgeting but has not fully incorporated the principles. For example, the agency has a strategic plan that identifies its goals, including a goal to improve the quality of water along the border. We have stated, along with OMB, the importance of linking capital asset investments to an organization’s overall mission and long-term strategic goals. However, in its capital planning and budget process, USIBWC does not fully assess or identify future needs, as called for in OMB’s key capital planning principles. Those principles state that a needs assessment identifies the resources needed to fulfill both immediate requirements and anticipated future needs, based on the agency’s goals and objectives. According to USIBWC officials, the agency conducts and funds capital planning on a project-by-project basis because it uses year-end money to fund studies or evaluations to identify project needs or alternatives. Specifically, USIBWC engineers identify the need for a project, and the agency identifies year-end appropriations to pay for a study of that project. For example, in one case described by a USIBWC official, the agency contracted with the Corps of Engineers to conduct a study of USIBWC flood control levees and their condition. The agency used year- end funds in its Salaries and Expenses budget line item to pay for the study, and USIBWC officials stated that the study has since been the basis for its request for levee repair and replacement projects. In addition, we found that USIBWC conducts alternative evaluations of potential projects, as directed by OMB’s guidance that states an evaluation should be conducted of a wide range of alternative approaches to determine how to bridge performance gaps in capital infrastructure. According to USIBWC officials, the agency is considering a range of alternatives and plans to conduct an analysis of costs associated with the projects, as leading practices for benefit-cost analysis and alternative comparison suggest. For example, the contractor for the 2019 study of alternatives to expand or adapt the diversion infrastructure for the South Bay project has assessed alternatives and costs to reduce the number of days that transboundary flows cross the border bringing bacteria, trash, and sediment into the United States. However, this was done for one part of the water quality problems created by transboundary flows and will not solve the problems associated with water quality problems created by all stormwater flows. USIBWC has not evaluated alternative approaches or costs for managing stormwater and associated water quality problems in the Santa Cruz River Basin and Tijuana River Valley watersheds that will continue to impact water quality along the border, and states it has no responsibility to do so. USIBWC also has not developed a comprehensive, long-term capital plan to help achieve its strategic goal for water quality. Instead USIBWC has elements of a plan, such as asset management documents for each of its two wastewater plants that identify key equipment replacement costs and schedules. The Nogales plant manager provides USIBWC officials with 10-year cost projections for major equipment, which include information on cyclic maintenance and life-cycle replacements. The operator of the South Bay plant prepares a 5-year plan that assesses the condition of equipment and recommends repair and replacement. However, neither plan identifies gaps in infrastructure needed to resolve water quality problems that are separate from the plants and their normal operation, such as stormwater problems that destabilize the Nogales plant’s IOI pipeline and cause polluted water to be diverted around the South Bay plant. USIBWC states it has no responsibility to do so. As noted above, USIBWC’s role in addressing certain transboundary stormwater flows and associated water quality problems is in dispute in ongoing litigation involving the Santa Cruz and Tijuana River Valley basins. Under OMB’s capital planning principles, conducting long-term capital planning should enable USIBWC to more systematically assess its long- term needs, including its future needs and identify alternative approaches and costs to address stormwater problems in the watersheds. Furthermore, a long-term capital plan should identify the capital projects that USIBWC needs to achieve the strategic goal it seeks to accomplish—in this case, improvement of water quality along the border. In February 2007, we reported that a long-term capital plan can include elements such as (1) a baseline assessment and identification of performance gaps; (2) justification of spending on proposed new assets; (3) the basis for selecting proposed assets; and (4) cost schedules and performance goals. In addition, OMB’s capital planning guidance states that each capital asset should have an operations and maintenance plan that outlines the procedures and responsibilities for scheduled preventive and regular or routine corrective maintenance. Currently, USIBWC has not comprehensively developed this information into a long-term capital plan. A long-term capital plan would help USIBWC budget for capital projects and investments in the watersheds and provide justification for funds requested for capital investment in future water quality projects. OMB Circular A-11 also encourages agencies to use a summary of the capital plan for budget justification to OMB, congressional authorizations of projects, and justification for congressional appropriations. In November 2019, OMB issued a memorandum to federal agencies that reinforced the need to implement the capital programming guidance in OMB Circular A-11 that agencies develop, document, and implement a capital planning process. In its budget process, USIBWC requests funding for individual capital projects for the budget year in which the projects are needed. Specifically, for each annual budget cycle, USIBWC’s Principal Engineers provide information to agency budget officials on the projects they have identified and funds needed for each plant. USIBWC budget officials use this information to prepare budget requests that are then reviewed by the State Department and OMB, and, ultimately, Congress. According to USIBWC’s Administrative Officer, the agency previously provided capital needs in an attachment to the budget requested in OMB Circular A-11. The official told us preparing the information was time-intensive yet helpful. For example, the information helped the agency understand the scope and life-cycle costs of a project. However, when OMB no longer collected agencies’ information, USIBWC stopped providing the information in its budget. According to Department of State budget examiners, USIBWC notifies them of potential infrastructure projects and funding needs; however, this information is not included in the agency’s budget request and is therefore not available to identify funding needs. According to USIBWC officials, they do not provide the information in a budget request to State because they are told to conduct agency operations within a flat budget. By conducting long-term capital planning for the Santa Cruz River Basin and Tijuana River Valley watersheds, following the principles in OMB Circular A-11, USIBWC would have more information to address the water quality problems resulting from unmanaged stormwater in either the Santa Cruz River Basin or Tijuana River Valley watersheds; and could provide the information to State, OMB, or Congress as part of annual budget deliberations. USIBWC and the Mexican Section of IBWC have successfully developed binational solutions to water quality issues along the U.S.-Mexico border, including constructing two international wastewater treatment plants to treat raw sewage that would otherwise flow into the United States. Nonetheless, in the decades since construction of the plants, the communities along the border have experienced exponential growth in populations and development that has, exacerbated by aging and deteriorating infrastructure, resulted in ongoing transboundary flows of raw sewage, trash, and sediment. USIBWC and the Mexican Section have discussed some alternatives to deal with ongoing water quality problems at both plants and in both watersheds. However, water quality problems, including unmanaged and untreated stormwater, bring bacteria, trash, and sediment into the lower watersheds in the United States. To date, USIBWC and the Mexican Section have only studied or monitored the problems; they have not taken actions to resolve the problems by proposing and analyzing alternatives, analyzing costs, identifying solutions, or establishing time frames. The long-standing environmental and health problems associated with transboundary stormwater flows in the watersheds of both rivers continue. USIBWC officials’ statement that it lacks the authority to resolve the problems suggests that congressional direction may be needed to specifically authorize USIBWC to take action. This action could include identifying alternatives, cost estimates, funding, and time frames. Such action would help address the environmental and health problems associated with transboundary stormwater flows in the Santa Cruz River Basin and the Tijuana River Valley watersheds. To help address some of the infrastructure problems in Mexico that cause the transboundary flows—such as pipe breaks and pump failures— USIBWC has proposed the development of a binational rapid response team comprised of technical experts in both countries that would immediately respond to infrastructure problems. However, it has not taken the necessary steps to formalize the team within IBWC. By formalizing the binational rapid response team to address sewage infrastructure failures along the U.S.-Mexico border, USIBWC would have better assurance that it is able to more effectively address the urgent and recurring sewer breaks and pump failures in Mexico that contribute to raw sewage spills. In addition, USIBWC has not fully incorporated key capital planning principles that would help identify alternative approaches for the agency to address stormwater problems in the Santa Cruz River Basin or Tijuana River Valley watersheds. By conducting long-term capital planning in the Santa Cruz River Basin and Tijuana River Valley watersheds, following the principles in OMB Circular A-11, USIBWC would have better information to address the water quality problems resulting from unmanaged stormwater in either the Santa Cruz River Basin or Tijuana River Valley watersheds. USIBWC would also have capital planning information available to provide to State, OMB, and Congress, as part of the budget process, as directed in the 2019 OMB memorandum. Congress should consider providing direction and specific authorization for USIBWC to take action to resolve the long-standing water quality problems associated with transboundary stormwater flows in the Santa Cruz River Basin watershed, including identifying alternatives, cost estimates, funding sources, and time frames, in coordination with federal, state, and local partners. (Matter for Consideration 1) Congress should consider providing direction and specific authorization for USIBWC to take action to resolve the long-standing water quality problems associated with transboundary stormwater flows in the Tijuana River Valley watershed, including identifying alternatives to include cost estimates, funding sources, and time frames, in coordination with federal, state, and local partners. (Matter for Consideration 2) We are making the following two recommendations to the U.S. Commissioner of the IBWC. The U.S. Commissioner of the IBWC should work with the Mexican Commissioner to formalize a binational rapid response team to address sewage infrastructure failures along the U.S.-Mexico border, including the Nogales and South Bay wastewater treatment plants. (Recommendation 1) The U.S. Commissioner of the IBWC should direct USIBWC staff to conduct long-term capital planning for the Santa Cruz River Basin and Tijuana River Valley watersheds, following the principles in OMB Circular A-11. (Recommendation 2) We provided a draft of this report to USIBWC, EPA, and the Departments of State and Homeland Security for comment. USIBWC provided written comments, which are reproduced in appendix V. The other three agencies did not provide written comments on our draft report; however, they provided technical comments that we incorporated as appropriate. In its written comments, USIBWC concurred with our first recommendation that it work to formalize a binational rapid response team to address sewage infrastructure failures along the U.S.-Mexico border. The agency noted that it has held extensive consultations with the Mexican Section of the IBWC, and once there is agreement on the designated responsibilities and funding of the team, USIBWC will seek to formalize the arrangement through a written agreement or exchange of letters between the U.S. and Mexican Sections, approaches we outlined in the report. USIBWC also noted that the United States and Mexico have not agreed upon each country’s share of expenses and that the U.S. financial contribution is subject to legislative approval and contributions, including in-kind contributions, from domestic nonfederal entities. USIBWC partly concurred with our second recommendation that the U.S. Commissioner of the IBWC direct staff to conduct long-term capital planning for the Santa Cruz River Basin and Tijuana River Valley watersheds. The agency noted that it provided us the long-term capital planning information previously required by the Office of Management and Budget and that the practice had been useful. However, the agency also noted that to the extent our report envisions USIBWC undertaking long-term capital planning for (1) nonfederal infrastructure; (2) infrastructure that does not yet exist; and/or (3) infrastructure that the USIBWC is not yet authorized to construct or maintain, it does not concur. USIBWC stated that Congress may not view it as the lead agency, and therefore Congress does not need to provide it with the authorization to oversee cross-border pollution matters. Regardless of whether Congress considers USIBWC as the lead agency in resolving transboundary water quality, the agency is a key player in managing water quality on the border and has the infrastructure and organization that will be part of the solution. To date, the agency has been more reactive than proactive in participating in planning efforts and studies to resolve water quality problems and has told us that it does not have the authority to do so. Yet, without the information that USIBWC would generate by comprehensively assessing its long-term needs, such as through long-term capital planning efforts, Congress cannot authorize specific work that needs to be done. We recommended that the agency conduct long-term planning, including for infrastructure that does not exist and for infrastructure that is not yet authorized specifically to address this problem. We continue to believe that USIBWC should recognize its role along the border and, as we recommended, start planning for it, including by undertaking long-term capital planning for existing and potential future infrastructure and identifying alternatives to address the long-standing water quality problems. The agency also commented on our two Matters for Congressional Consideration in which we said that Congress should consider providing direction and specific authorization for USIBWC to take action to resolve long-standing water quality problems associated with transboundary stormwater flows in the watersheds. In its comments, USIBWC stated that it partly concurred with the Matters. USIBWC also stated that the phrasing of the Matters suggests that Congress should assign USIBWC specific duties and responsibilities, including identifying time frames for a comprehensive solution of pollution problems associated with transboundary stormwater flows and binational watershed management. This is correct. In our report, we highlighted the role USIBWC plays along the border and the infrastructure USIBWC manages and operates to address transboundary flows from Mexico. Given the location of the USIBWC’s wastewater treatment plants, along with its expertise and role working with Mexico, the agency would need to be centrally involved in any transboundary solution. However, it is incorrect, as USIBWC’s letter further stated, that our Matters imply that USIBWC would have the lead role in resolving water quality problems along the border. USIBWC’s letter stated that while the Matters acknowledge that USIBWC might coordinate with a wide range of partners, the language implies that Congress would designate USIBWC as the lead agency. Further, the agency stated that such a designation may run counter to past and current congressional intent and reasoning, as evidenced in very recent developments. In our matters, we stated that Congress should authorize USIBWC to take action to resolve water quality problems because it is a central actor in managing water and water quality along the border and because, during the course of our review, USIBWC stated that it needed specific congressional authorization to manage stormwater problems and to construct and maintain new infrastructure. We included the need for USIBWC to coordinate its action with other agencies because USIBWC would not be the sole lead actor. We note that USIBWC did not state what its role would be. Moreover, USIBWC stated that Congress may be in the process of designating EPA as the lead agency in developing major new infrastructure in the Tijuana Valley watershed to mitigate problems resulting from transboundary flows from Mexico. USIBWC also cited a recent bill to show that Congress is considering, consistent with proposals from California stakeholders, an appropriation request for as much as $300 million for the EPA to build this infrastructure. The agency stated that the bill lists USIBWC as one of 11 eligible public entities with which EPA may coordinate its efforts, as opposed to identifying the USIBWC as the lead agency. It also stated that the United States-Mexico-Canada Agreement Implementation Act accompanying this bill explains that EPA’s designation as the lead agency was premised on Congress’s determination that EPA has the expertise and experience necessary to lead and coordinate efforts involving wastewater, stormwater, nonpoint sources of pollution, and related matters in the Tijuana watershed. At a minimum, USIBWC will be a key partner with EPA if it is given the authority to help resolve stormwater quality problems in the Tijuana River watershed. Yet, as discussed in our report, USIBWC stated it needs congressional authorization to participate in addressing stormwater issues along the border. We note that the bill to which USIBWC refers does not specifically address USIBWC’s authority to develop and implement stormwater projects near the border. Our report shows that this authorization is necessary for the agency to take action, whether as a lead agency or as an eligible partner that may coordinate with others. We added a discussion of the bill in our report, as well as about the expertise that EPA and USIBWC have to address transboundary flow problems. Specifically, we described that according to EPA officials, EPA lacks the expertise to construct and maintain water infrastructure projects on its own. Further, EPA officials stated that EPA will need to carry out any work in the area through contracts with other agencies, as EPA does not have expertise in operating and maintaining water infrastructure, as USIBWC does. EPA also noted that USIBWC is one of the only federal agencies that works across the border because it has consistent communication and contacts in Mexico. Finally, USIBWC stated in its comments that the reasoning for designating EPA in the bill and the accompanying act as the lead agency for pollution reduction for the Tijuana River watershed—because of EPA’s unique qualifications—also applies in any border area, including the Santa Cruz watershed in Arizona. Again, our report showed that USIBWC is a central actor in managing water and water quality on the border and that congressional authorization is needed for USIBWC to help address transboundary stormwater flows, including identifying alternatives for solutions, in the Santa Cruz watershed. We did not change our Matters, but added a discussion in our report of the proposed congressional legislation to address the water quality problems in Tijuana specifically and the expertise that EPA and USIBWC each bring to addressing transboundary flow problems. We are sending copies of this report to appropriate congressional committees; the Commissioner of the U.S. Section of the International Boundary and Water Commission; the Secretaries of Homeland Security and State; the Administrator of the EPA; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VI. This report (1) describes the authorities and roles involved in developing, managing, and sharing costs for the International Boundary and Water Commission’s (IBWC) two international wastewater plants in the United States; (2) examines factors that affect the operation of the two plants and steps IBWC has taken to address these; and (3) examines the extent to which the U.S. Section of the International Boundary and Water Commission (USIBWC) has taken steps to address water quality problems in the two watersheds, including through the use of key capital planning principles. To address these three objectives, we visited the Nogales International Wastewater Treatment Plant (Nogales plant) in Arizona and the South Bay International Wastewater Treatment Plant (South Bay plant) in California. At each facility, we interviewed USIBWC officials and toured each wastewater treatment plant and its associated infrastructure. We also met with other federal, state, and local government officials and representatives of non-governmental organizations to discuss USIBWC’s management and operations of the plant. Specifically, in Arizona we met with officials from the Department of Homeland Security’s Custom and Border Protection (CBP), the City of Nogales, the Arizona Department of Environmental Quality, the County of Santa Cruz, and the nonprofit Friends of the Santa Cruz River. In California, we met with officials from CBP; Environment Protection Agency Region 9; the California Water Quality Regional Control Board; the City of San Diego; the County of San Diego; the California State Parks; the City of Imperial Beach; and Surfrider Foundation San Diego Chapter, Wildcoast, and 4Walls International (all nongovernmental organizations). We visited USIBWC Headquarters in El Paso, Texas, to meet with agency officials, including the U.S. Commissioner and budget, engineering, and general counsel staff. We also met with the Mexican Commissioner of the IBWC in Ciudad Juarez, Chihuahua, Mexico. To describe authorities and roles involved in developing, managing, and sharing the costs of USIBWC’s two international wastewater plants in the United States, we reviewed the 1944 treaty between the United States and Mexico, Treaty Relating to the Utilization of Waters of the Colorado and Tijuana Rivers and of the Rio Grande, and associated IBWC minutes. For cost-sharing of operational and maintenance expenses at the plants, we reviewed minutes between USIBWC and the Mexican Section and a memorandum of agreement between USIBWC and the City of Nogales, Arizona. We reviewed USIBWC’s budget for fiscal years 2003 through 2019, including appropriated funding information for fiscal years 2003 through 2019. We also met with budget officials at USIBWC and the Department of State. To determine if these data are reliable, we interviewed a USIBWC official about the source of the data and reviewed documentation to determine that the data were sufficiently reliable for the purposes of discussing USIBWC budget and project costs. To examine factors, if any, that affect the operation of the two plants and steps IBWC has taken to address these factors, we reviewed each plant’s permit from the National Pollutant Discharge Elimination System, violation notices, and USIBWC documentation, such as plans for projects to resolve the violations. We interviewed USIBWC officials about their plans and projects to resolve any water quality problems at the plants. We also interviewed Arizona and California state environmental officials responsible for developing and enforcing the permits, to discuss permit violations and water quality problems at the plants and actions to resolve them. To examine the extent to which USIBWC has taken steps to address water quality problems in the two watersheds, including using key capital planning principles, we reviewed and analyzed IBWC minutes, USIBWC’s annual financial reports for fiscal years 2015 through 2019, USIBWC’s most recent strategic plan covering fiscal years 2011 through 2016, the South Bay plant’s 5-year and Nogales plant’s 10-year equipment investment plans, and documentation from USIBWC’s citizen forums in each location. In addition, we reviewed prior GAO reports on federal agency capital planning and asset management, the Office of Management and Budget’s (OMB) Capital Programming Guide (Version 3.0) Supplement to OMB Circular No. A-11, and OMB’s 2019 guidance on implementing agency-wide real property capital planning. We compared USIBWC’s capital planning efforts against OMB’s Capital Programming Guide and past GAO reports on capital planning leading practices. Further, we interviewed USIBWC officials and stakeholders at each plant, including local government officials and environmental group representatives, about the water quality problems and solutions they have discussed. We also reviewed studies conducted in the two watersheds. We conducted this performance audit from September 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides information about some of the factors that can affect the operations of the Nogales and South Bay plants. For the Nogales plant, the factors that can affect the operations include: Lack of heavy metal pretreatment. Numerous metal treatment and plating facilities operate in Nogales, Sonora, Mexico. These facilities directly discharge their wastewater, which contains heavy metals such as chromium, zinc, and nickel, into the city’s sewer system. The heavy metals are comingled with the other sewage and sent to the Nogales plant (in Arizona) for treatment. In the United States, similar types of facilities would be required to pretreat the wastewater to remove metals and other pollutants before discharging it into the public sewer system. In the United States, the mechanism used to limit industrial discharges into a sewer system is a pretreatment program that can ultimately cause dischargers to be shut off from the system or fined if they do not limit the industrial contaminants in their discharges to the system. While a municipal pretreatment program exists in Nogales, Sonora, it is designed to meet Mexico’s minimum federal requirements and is insufficient to detect and respond to the dumping of industrial contaminants when they occur, according to the Arizona Department of Environmental Quality documentation and officials. According to U.S. Section of the International Boundary and Water Commission (USIBWC) officials, the Nogales plant is not designed to separate out heavy metals during its treatment processes, and as a result the heavy metals contaminate the plant’s sludge. Furthermore, due to the presence of heavy metals, USIBWC disposes of the sludge at a municipal landfill, a process that is more expensive than other disposal options, which has led to increased operational costs for the plant. According to USIBWC officials, it would cost about $60 million to update the Nogales plant to a tertiary treatment system that could remove the heavy metals from the sludge. Deteriorating sewage infrastructure in Mexico. Sewage infrastructure in the City of Nogales, Sonora, is not adequately maintained, according to USIBWC officials. As a result, USIBWC officials told us that the amount of wastewater Nogales, Sonora, sends exceeds the amount agreed upon in a minute between the two sections. Although Nogales, Sonora, built a new plant—the Los Alisos Plant—that can treat 5.5 million gallons per day, wastewater has to be pumped uphill from Nogales, Sonora, into the plant. After the first year of operation, the Mexican government could not maintain the plant due to funding constraints, according to USIBWC officials. The pumps responsible for delivering the wastewater uphill to the Los Alisos plant continually break or fail. For example, as of July 2019, only one of the five pumps at the Los Alisos plant was operational, according to USIBWC officials. When these pumps fail, Mexico releases the 2 million to 4 million gallons per day of wastewater—which normally would have been intercepted and sent to the Los Alisos plant— through the International Outfall Interceptor (IOI) to the Nogales plant. Deteriorating infrastructure in the United States. The deteriorating condition of the IOI has caused untreated sewage to periodically spill into the Santa Cruz watershed and Nogales Wash. The IOI is over 45 years old, and according to USIBWC officials, the typical lifespan of a similar pipeline is 50 years. Maintenance has been deferred because of continuing disagreement between USIBWC and the City of Nogales, Arizona, regarding which entity owns the pipeline and is therefore responsible for its maintenance, according to USIBWC officials. The IOI’s condition continues to worsen and requires a significant amount of rehabilitation to address structural damage. Erosion and corrosion are continuously occurring, according to a 2005 assessment of the IOI prepared for the City of Nogales, Arizona. Specifically, gases released by the sewage corrode the pipeline, and root intrusion and groundwater cause erosion. According to the 2005 assessment, half of the thickness of the pipe had been eroded and corroded For the South Bay plant, the factor that may affect the operations is: Insufficient sewage infrastructure in Mexico. According to the 2019 study of alternatives to expand or adapt diversion infrastructure, Tijuana has not built sufficient sewage infrastructure to serve the area’s increasing population and urbanization, contributing to transboundary sewage flows. According to USIBWC officials, the city of Tijuana does not prioritize wastewater issues and is experiencing exponential population growth and urbanization. As a result, areas of Tijuana are not connected to the city’s sewer system. A 2017 study prepared by a Mexican state agency estimated that over $340 million would be required to fix and develop adequate wastewater treatment and reuse systems for the city of Tijuana. When there are problems with Tijuana’s treatment facilities, Tijuana diverts a portion of its wastewater to be treated at the South Bay plant. If the South Bay plant is not notified and does not shut down the pump and canyon collectors, it may receive additional flows. While treating the excess wastewater does not violate the plant’s National Pollutant Discharge Elimination System permit, the plant is experiencing an increase in the number of days that it treats flows above capacity, according to USIBWC officials. This could eventually cause violations to occur as the plant is not supposed to operate above capacity for prolonged periods. In addition, USIBWC officials stated that the South Bay plant is not designed and operated to address some of the wastewater that flows into the Tijuana River Valley watershed. These wastewater flows are due to: Limited Tijuana Basin diversion infrastructure. The Tijuana Basin diversion system is comprised of Mexican-operated Pump Station CILA and the South Bay plant’s five canyon collectors. This system captures dry-weather flows for treatment at the South Bay plant or a wastewater treatment plant in Mexico. However, it is not designed to capture high flows that result from pipe breaks or pump failures. Specifically, the system has a peak capacity of 29 million gallons per day, while Pump Station CILA can only operate at 23 million gallons per day. To avoid affecting the South Bay plant’s wastewater treatment operations, during incidents of high flows, Pump Station CILA and the canyon collectors are shut off. During these events, the water bypasses the South Bay wastewater treatment plant and flows untreated into the Tijuana River and watershed. The Senate committee report accompanying the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2019 required the USIBWC to submit a report quantifying the total annual volume of transboundary flows entering the United States from Mexico in the Tijuana River watershed. USIBWC issued this report in August 2019. Lack of maintenance for existing sewage infrastructure in Mexico. A lack of maintenance for Tijuana’s existing sewage infrastructure causes excess wastewater flows into the Tijuana River according to USIBWC officials. For example, in August 2019, USIBWC reported that on June 19, 2019, nearly 1.9 million gallons of wastewater were released into the Tijuana River because trash buildup at one of Tijuana’s pumps caused the pump to fail. In the last 2 decades, according to a 2019 study, the local Mexican utility that operates and manages the city’s sewage infrastructure has invested in expanding the city’s wastewater collection infrastructure to address direct dischargers or inadequate disposal practices, according to USIBWC officials. However, the overall system has not kept pace with the region’s rapid growth, nor has the existing infrastructure in Mexico received sufficient maintenance. In addition, the local utility that manages and operates Tijuana’s wastewater system has a limited number of personnel. The study also reported that existing personnel were “very knowledgeable, dedicated, and creative in their efforts” to maintain and operate the sewage infrastructure. Nonetheless, Tijuana’s existing sewage pipes consistently break and its pump stations fail. Another 2019 study also reported that the poor condition of critical wastewater infrastructure in Mexico results in approximately 30 percent of Tijuana’s wastewater enters the Tijuana River or Pacific Ocean without treatment. In addition to the contact named above, Susan Iott (Assistant Director), Heather Dowey (Analyst-in-Charge), Farah Angersola, Mark Braza, Chuck Bausell, Tara Congdon, Carol Henn, Richard P. Johnson, Anika McMillon, Sara Sullivan, and Kiki Theodoropoulos made key contributions to this report.", "summary": "Ongoing sewage spills and stormwater runoff carrying trash, sediment, and other pollutants in the Santa Cruz River Basin and Tijuana River Valley watersheds along the U.S.-Mexico border have affected public health, the environment, and local economies. Under the 1944 treaty, the United States and Mexico agreed to work together through IBWC to address these water quality problems. As part of this effort, USIBWC manages two wastewater treatment plants in Arizona and California. In 2018, the plants treated more than 14 billion gallons of sewage from Mexico. This report (1) describes the authorities and roles for developing and managing the plants and sharing their costs; (2) examines factors affecting the operation of each plant and steps taken to address them; and (3) examines the extent to which USIBWC has taken actions to address water quality problems in the watersheds. GAO reviewed U.S-Mexico treaties, IBWC minutes and permits, and planning and budget data for USIBWC. GAO also interviewed officials from IBWC and other federal agencies, local and state governments, and non-governmental groups. A 1944 treaty designated the International Boundary and Water Commission (IBWC) and authorized it to resolve water and boundary issues along the U.S.-Mexico border, including providing wastewater treatment. IBWC's two sections—the U.S. Section (USIBWC) and the Mexican Section, negotiated agreements to construct, manage, and operate two wastewater plants in Nogales, Arizona, and San Ysidro (South Bay), California, to resolve ongoing water quality problems stemming from sewage flowing downhill from Mexico into the United States (see figure). Several of these agreements describe each country's roles, such as sharing costs for the operation and maintenance of each plant. Several factors can affect the plants' operations, including deteriorating infrastructure in Mexico and the United States that results in raw sewage spills around the plants. USIBWC has taken steps to resolve some of these factors. For example, USIBWC proposed a binational rapid response team to address broken pipes and failing pumps that can send sewage from Mexico into the United States; however, the team has not been formalized to ensure its long-term operation. By taking steps to formalize the team, USIBWC would have assurance it can more effectively address recurring infrastructure failures contributing to sewage spills. USIBWC and others have taken some actions to address stormwater problems, such as studying stormwater flows in the Tijuana River Valley watershed and building some retention basins. However, USIBWC has not taken action, in coordination with federal, state, and local partners, to identify alternatives, cost estimates, funding sources, and time frames for implementing solutions in either watershed. USIBWC officials said without direction from Congress, it does not have specific authorization for stormwater management in the watersheds because the 1944 treaty and accompanying legislation did not authorize it to carry out such projects. The long-standing stormwater quality problems and their associated environmental and health effects suggest congressional direction is needed to authorize USIBWC to take action. Such action would include identifying alternatives, cost estimates, funding sources, and time frames. GAO believes that Congress should consider providing direction and specific authorization to USIBWC to take action to resolve stormwater quality problems in the Santa Cruz River Basin and Tijuana River Valley watersheds. GAO is also making two recommendations to USIBWC, including that it formalize the rapid response team. USIBWC concurred with that recommendation and partly concurred with the other.", "document_type": "gao"}
{"report": "A reverse mortgage is a nonrecourse loan against home equity that does not require mortgage payments as long as the borrower meets certain conditions. In contrast to traditional forward mortgages, reverse mortgages typically are “rising debt, falling equity” loans (see fig. 1). As the borrower receives payments from the lender, the lender adds the principal and interest to the loan balance, reducing the borrower’s home equity. Also unlike traditional forward mortgages, reverse mortgages have no fixed term. Prospective borrowers must meet a number of requirements to be eligible for a HECM (see sidebar). The amount of money a borrower can receive from a HECM—called the principal limit—depends on three things: (1) the age of the youngest borrower or eligible nonborrowing spouse, (2) the lesser of the appraised value of the home or the FHA mortgage limit as of the date of loan closing (for calendar year 2019, $726,525), and (3) the expected average interest rate. The borrower can receive funds in a variety of ways—for example, as monthly payments, a line of credit, a combination of the two, or a single lump sum. A large majority of borrowers choose the line of credit option. The interest rate lenders charge is typically an adjustable rate, although the lump sum option can be chosen at a fixed interest rate. session given by a HECM counselor approved by the Department of Housing and Urban Development (HUD) make timely payment of ongoing property charges (e.g., taxes and insurance) HECMs that are due and payable because the borrower has not paid property charges, met occupancy requirements, or maintained the home. HECM borrowers (or their heirs) satisfy the debt by (1) paying the loan balance using their own funds, (2) selling the home and using the proceeds to pay off the loan balance, (3) providing a deed-in-lieu of foreclosure (which transfers title for the property to the lender to satisfy the debt), or (4) selling the home for at least the lesser of the loan balance or 95 percent of the property’s appraised value (also known as a short sale). According to FHA regulations, the borrowers or their heirs generally have 30 days after being notified that the loan is due and payable to satisfy the debt or bring the loan out of due and payable status. Servicers generally have 6 months to take first legal action to initiate foreclosure from the date that they, as applicable, notified, should have notified, or received approval from FHA that the HECM is due and payable. According to FHA regulations, the borrower is generally allowed to correct the condition that resulted in the due and payable loan status and reinstate the loan, even after foreclosure proceedings have begun. Figure 2 illustrates the reasons why HECMs terminate and how borrowers typically satisfy the debt under various termination scenarios. If the servicer experiences a loss because the loan balance exceeds the recovery from selling the property, the lender can file a claim with FHA for the difference. Additionally, when the loan balance reaches 98 percent of the maximum claim amount (the lesser of the appraised value of the home at origination or FHA’s loan limit), the lender can “assign” the loan to FHA and file a claim for the full amount of the loan balance, up to the maximum claim amount. Lenders can only assign HECMs in good standing to FHA (that is, assignments can only be for HECMs not in a due and payable status). FHA continues to service the assigned loans using a contractor until the loans become due, either due to the death of the borrower or for other reasons. Additionally, the FHA insurance guarantees borrowers will be able to access their loan funds, even if the loan balance exceeds the current value of the home or if the lender experiences financial difficulty. Further, if the borrower or heir sells the home to repay the loan, he or she will not be responsible for any loan amount above the value of the home. As of the end of fiscal year 2018, FHA had insured over 1 million HECMs. According to FHA data, these include an active HECM portfolio of approximately 551,000 loans serviced by various FHA-approved servicers, 79,000 FHA-assigned loans serviced by an FHA contractor, and about 468,000 terminated loans (see fig. 3). HECM terminations have exceeded new originations every year since fiscal year 2016, and the number of HECMs assigned to FHA has grown substantially since fiscal year 2014. As of the end of fiscal year 2018, FHA’s total insurance-in-force for HECMs (total insured mortgage balances outstanding) was roughly $100 billion. HECMs are held in two FHA insurance funds. HECMs originated prior to fiscal year 2009 are in the General Insurance and Special Risk Insurance Fund (roughly 27 percent of all HECMs), and those originated in fiscal year 2009 and later are in the Mutual Mortgage Insurance Fund (roughly 73 percent of all HECMs). When the post-2008 HECM portfolio became part of FHA’s Mutual Mortgage Insurance Fund, it also was included in the fund’s capital ratio assessment and became subject to annual actuarial reviews. As we found in a November 2017 report, subjecting HECMs to the annual actuarial review requirements has improved the transparency of the program’s financial condition and has highlighted the financial risks of the HECM portfolio to FHA. According to FHA, the financial performance of the HECM portfolio has been historically volatile, largely due to uncertainty in future home prices, interest rates, and other factors. In recent years, FHA has responded with several policy changes to help strengthen the portfolio’s financial performance and mitigate risks. Because FHA’s projected losses on HECMs depend on factors such as maximum claim amount, the length of time the borrower stays in the home, changes in home prices, and interest rates, most of FHA’s policy changes have been aimed at better aligning expected revenues (charging borrowers premiums) with expected costs (cash outflows due to paying insurance claims). For example, FHA has made changes to insurance premiums and principal limits, the most recent of which took effect in fiscal year 2018. Effective in fiscal year 2019, FHA also revised property appraisal practices for new HECMs to guard against inflated property valuations. According to agency officials, FHA made this change to address appraisal bias concerns identified in research by an economist in HUD’s Office of Policy Development and Research. The HECM market includes various participants. After a lender originates a HECM, the loan must be serviced until it terminates. HECM lenders and servicers must be FHA-approved and can be the same entity but often are not. HECM lenders often sell the mortgage to another entity, which FHA refers to as an investor, and this entity has the right to enforce the mortgage agreement. HECM servicers are typically third parties that contract with lenders or investors but do not have ownership in the loans they service. As previously discussed, HECM servicers perform a number of functions, such as making payments to the borrowers and providing monthly account statements. Servicers also must monitor borrower compliance with various mortgage conditions and, if necessary, communicate with borrowers about any violation of these conditions (defaults) and, as appropriate, ways they can avoid being foreclosed on. HECM servicers also transfer up-front and annual insurance premiums to FHA each month and file claims with FHA for losses on insured HECMs. In carrying out these duties, servicers are responsible for complying with various requirements, including FHA regulations, policies, and procedures, as well as federal consumer financial laws. Historically, commercial banks, thrifts, and credit unions were the primary lenders and servicers of mortgage loans. Following the 2007–2009 financial crisis and subsequent revisions to regulatory bank capital requirements, banks reevaluated the benefits and costs of being in the mortgage lending market, as well as retaining mortgages and the right to service them. Since the financial crisis, some banks have exited or reduced their mortgage lending and servicing businesses. This development, among others, created an opportunity for nonbank servicers to increase their presence in the mortgage market. Nonbank issuers such as mortgage originators and servicers are not subject to the same comprehensive federal safety and soundness standards as banks. While banks offer a variety of financial products to consumers, nonbank servicers are generally involved only in mortgage-related activities and do not take deposits from consumers. Almost all HECMs are originated, owned, and serviced by nonbank entities: Lenders. According to FHA, in fiscal year 2018, 54 lenders originated HECMs, including 49 nonbank entities and five banks. Investors. As of the end of fiscal year 2018, six investors (all nonbank entities) and the Federal National Mortgage Association (Fannie Mae) owned roughly 92 percent of the privately owned (non-FHA-assigned) HECM portfolio, while the remaining 8 percent was owned by a mixture of bank and nonbank entities. Servicers. Five nonbank entities serviced over 99 percent of the privately owned HECM portfolio as of the end of fiscal year 2018. As previously noted, FHA has a contractor (also a nonbank entity) that services FHA-assigned HECMs. A number of federal agencies have roles in overseeing the reverse mortgage market, including the following: FHA. Insures HECMs and administers the HECM program, including issuing program regulations and enforcing program requirements. FHA supplements regulations through additional policies, procedures, and other written communications for the HECM program. For example, FHA officials said the agency utilizes its Single Family Housing Handbook, HECM handbook, and mortgagee letters to communicate changes about the HECM program. In 2013, Congress enacted a law that allowed FHA to make changes to HECM program requirements by notice or mortgagee letter in addition to regulation. Since then, FHA has made several policy changes to the HECM program through mortgagee letters. CFPB. Supervises nonbank reverse mortgage lenders and servicers for compliance with, and enforces violations of, federal consumer financial protection laws. CFPB can also issue regulations under the federal consumer protection laws addressed specifically to protecting consumers considering reverse mortgages. Additionally, CFPB examines entities for compliance with federal consumer financial laws to obtain information about an institution’s compliance management systems and procedures and to detect and assess risks to consumers and markets. Further, CFPB collects consumer complaints regarding consumer financial products or services (including reverse mortgages) and educates consumers about their rights under federal consumer financial protection laws. Federal depository institution regulators. These regulators monitor compliance with relevant laws and regulations, such as provisions of the Federal Trade Commission Act and the Truth in Lending Act, primarily through periodic examinations, for federally regulated lenders that originate HECMs. Several features and requirements of the HECM program provide consumer protections to borrowers. For example, borrowers must undergo preloan counseling, the program limits costs and fees lenders can charge, and lenders must provide certain disclosures. In addition, FHA has made several changes to the HECM program in recent years to help borrowers who have defaulted due to unpaid property charges. As previously discussed, if a HECM borrower does not pay his or her property charges, FHA regulations generally require the servicer to pay the property charges on the borrower’s behalf to help avoid a tax foreclosure by the local authority and protect the investor’s and FHA’s interest in the home. FHA regulations also allow servicers to charge certain fees once a loan is called due and payable. These are typically amounts related to attorney or trustee fees, property preservation, and appraisal fees during the foreclosure process. The payments and fees that servicers make on behalf of borrowers—referred to as servicer advances in this report—are added to the loan balance and accrue interest. In 2010, HUD’s Office of Inspector General reported that HUD was not tracking borrower defaults or servicer advances for the HECM program and made several recommendations to FHA. To address these recommendations, FHA took several steps. For example, in 2011, FHA stopped the practice of allowing servicers to defer foreclosing on loans that were in default due to unpaid property changes and issued a mortgagee letter addressing how to handle these loans. Additionally, in September 2012, FHA announced the launch of a new data system for the HECM program, the Home Equity Reverse Mortgage Information Technology (HERMIT) system which would be used starting in October 2012. With this new system, FHA combined former legacy systems that had been used to collect insurance premiums, service FHA-assigned loans, and process claims. According to FHA, adopting the HERMIT system allowed FHA to better monitor and track the HECM portfolio in real time and to automate insurance claim processing. Finally, FHA modified program features to help minimize potential borrower defaults and help strengthen borrower eligibility requirements. For example, in 2013, FHA reduced the amount of equity borrowers could generally withdraw during the first year from 100 to 60 percent of the principal limit. According to FHA, this change was designed to encourage borrowers to access their equity slowly over time rather than all at once to reduce risks to borrowers and FHA’s insurance fund. In 2015, the financial requirements for HECMs changed to include a financial assessment of the prospective borrower prior to loan approval. FHA began requiring HECM lenders to look at the prospective borrower’s credit history, income, assets, and financial obligations. Based on the results of the financial assessment, the lender may require a set-aside for the payment of property charges. Additionally, FHA made several program changes to help distressed HECM borrowers by allowing servicers to offer options to help borrowers delay or in some cases avoid foreclosure if they are behind on paying property charges. These foreclosure prevention options include repayment plans, at-risk extensions, and extensions for low-balance arrearage, as described later in this report. FHA also has taken steps to help nonborrowing spouses stay in their homes after a borrowing spouse dies by deferring repayment of the HECM as long as the nonborrowing spouse fulfills certain conditions. In these cases, the servicer can assign the HECM to FHA under what FHA refers to as the mortgagee optional election assignment process. Our analysis of FHA data found that about 272,155 HECMs terminated from fiscal years 2014 through 2018. Over that period, the number of terminations rose from about 24,000 in fiscal year 2014 to a peak of roughly 82,000 in fiscal year 2016, before declining to about 60,000 in fiscal year 2018, as previously shown in figure 3. As shown in figure 4, death of the borrower was the most common reported reason for HECM terminations, followed by borrower defaults. The relative size of each termination category varied from fiscal years 2014 through 2018, with borrower defaults accounting for an increasing proportion of terminations in recent years. In fiscal year 2018, borrower defaults made up 18 percent of terminations. Specific results for all major termination categories over the 5-year period were as follows:  Death. About 34 percent of terminations (approximately 87,000 loans) were due to the death of the borrower. Borrower deaths ranged from roughly 29 percent to 40 percent of annual terminations over the 5- year period.  Default. About 15 percent of terminations (approximately 40,000 loans) were due to borrower defaults. As discussed in appendix IV, this percentage varied widely by location and was highest in Michigan (36 percent) and lowest in the District of Columbia (1 percent). About 29,000 defaults were for noncompliance with occupancy or residency requirements, about 11,000 were for nonpayment of property charges, and about 200 were for not keeping the property in good repair. The borrowers of these loans likely lost their homes through foreclosure or a deed-in-lieu of foreclosure. However, it is possible that some of these borrowers would have ultimately lost their homes even if they had not taken out a HECM. For example, as noted in CFPB’s 2012 report to Congress on reverse mortgages, some borrowers may have taken out a HECM to help pay off their traditional mortgage rather than as a way to pay for everyday expenses. In these cases, the money borrowers received from their HECMs may have helped them temporarily but may ultimately have been prolonging an unsustainable financial situation. In addition, some borrowers who did not meet occupancy or residency requirements may have permanently moved out of their homes—for example, to assisted living or nursing home facilities. Borrower defaults as a percentage of annual HECM terminations grew from 2 percent of terminations in fiscal year 2014 to 18 percent in fiscal year 2018. Noncompliance with occupancy requirements was the primary cause of defaults each year, but unpaid property charges represented a growing share. From fiscal years 2014 through 2018, property charge defaults as a percentage of all defaults grew from 26 percent to 45 percent, and property charge defaults as a percentage of all terminations grew from less than 1 percent to 8 percent. Loan balance repaid. About 9 percent of terminations (approximately 23,000 loans) were due to the borrower repaying the loan balance. This category accounted for a declining share of terminations over the 5-year period, falling from 24 percent in fiscal year 2014 to 4 percent in 2018. Refinanced. About 8 percent of terminations (about 20,000 loans) were due to the borrower refinancing into a new HECM. This category remained relatively stable over the 5-year period, accounting for about 5 percent to 10 percent of terminations each year. Borrower moved or conveyed title. About 3 percent of terminations (approximately 8,000 loans) were due to the borrower either moving or conveying title to the property to someone else. The percentage of terminations in this category declined from 6 percent in fiscal year 2014 to 2 percent in fiscal year 2018. Unknown. For about 30 percent of terminations (roughly 78,000 loans), we were unable to readily determine a termination reason from FHA’s data. Over the 5-year period, this category accounted for over 25 percent of terminations each year and reached a high of 39 percent in fiscal year 2018. We discuss challenges related to determining termination reasons later in this report. For HECMs that terminated in fiscal years 2014 through 2018, servicers advanced almost $3 billion on behalf of borrowers for unpaid property charges or various other costs that are charged once a loan becomes due and payable. The advances increased from $508 million in fiscal year 2014 to a peak of $731 million in fiscal year 2016, before declining to $453 million in fiscal year 2018 (see fig. 5). This pattern aligns with the overall trend in terminations, which also peaked in fiscal year 2016. Over the 5-year period, advances for property charges made up 58 percent of the total. The remaining 42 percent consisted of advances for other costs, many of them foreclosure-related, such as attorney fees and appraisal costs. From fiscal years 2014 through 2018, HECM servicers advanced a total of $567 million on behalf of living borrowers who defaulted on their HECMs due to unpaid property charges. For these loans, the median advance was $7,007. From April 2015 (the effective date of FHA’s current repayment plan policy) through the end of fiscal year 2018, 22 percent of HECM borrowers with overdue property charges had received repayment plans, and FHA’s information on the use of other foreclosure prevention options was limited. As previously noted, property charge defaults and issues surrounding nonborrowing spouses not being included on the mortgage have been long-standing problems in the HECM program. Since 2015, FHA has made program changes to allow servicers to offer different types of foreclosure prevention options to distressed HECM borrowers and nonborrowing spouses of deceased borrowers (see table 1). These options can help delay and, in some cases, avoid foreclosure. According to officials from HUD’s Office of General Counsel, HUD does not have the statutory authority to require servicers to provide HECM borrowers foreclosure prevention options. Our analysis of FHA data found that servicers’ use of selected foreclosure prevention options for HECM borrowers was limited or that FHA did not have readily available information to assess the extent of use, as follows: Mortgagee optional election assignments. According to information generated by FHA, HECM servicers submitted 1,445 requests for mortgagee optional election assignments from June 2015 (when FHA made this option available) through September 30, 2018 (see table 2). In total, FHA approved roughly 70 percent (1,013) of the requests and denied the remaining 30 percent (432). According to FHA officials, the top two reasons for denying mortgagee optional election assignments were HECM servicers not meeting the deadline for electing to pursue the assignment and not meeting the deadline to initiate the assignment. FHA officials told us the third most common reason for denial was a nonborrowing spouse not submitting evidence of marketable title to the property or the legal right to remain in the property for life within required time frames. With respect to the 432 denials, FHA provided information indicating that as of May 31, 2019, 79 percent (342) of the associated loans had not terminated; 14 percent (62 loans) terminated because the loan balance had been paid off; and the remaining 7 percent ended in foreclosure (22 loans), deed-in-lieu of foreclosure (four loans), or short sale (two loans). Estimating the universe of HECMs potentially eligible for mortgagee optional election assignments is difficult because nonborrowing spouses were not listed on loan documentation for HECMs originated prior to August 4, 2014. As a result, FHA does not know how many eligible nonborrowing spouses could have, but did not, apply for the mortgagee optional election assignment, or how many are potentially eligible to apply for it in the future. FHA officials told us they have relied on an industry association and HECM servicers to estimate how many nonborrowing spouses may be associated with pre-August 2014 HECMs. FHA officials told us they sent letters to borrowers with FHA-assigned HECMs that were originated prior to August 4, 2014, to inform them of the mortgagee optional election process and ask them to self-identify whether there was a nonborrowing spouse associated with their loan. FHA officials also noted they were drafting a similar letter for servicers to send to borrowers with HECMs not assigned to FHA. As of August 2019, the servicer letter was still in draft form, pending completion of an ongoing internal review of FHA’s mortgagee optional election assignment processes and the related time frames. FHA officials said once the ongoing review is complete, they anticipated that FHA would issue a new mortgagee letter with revised time frames that would afford both HECM servicers and borrowers more time to meet FHA requirements for mortgagee optional election assignments. Repayment plans. Our analysis of FHA data showed that 22 percent of borrowers with property charge defaults were granted a repayment plan from April 2015 (the effective date of FHA’s current repayment plan policy) through the end of fiscal year 2018. All five legal aid organizations we interviewed said the availability of repayment plans was a top concern. For example, for some of their clients, repayment plans were unavailable because the borrowers did not meet certain financial requirements. In contrast, representatives of the top five HECM servicers told us they generally do offer repayment plans when feasible to help borrowers delay or avoid foreclosure. Servicers we interviewed noted that while repayment plans can delay or avoid foreclosure, they are rarely successful in the long-run and borrowers in such plans often miss payments. Servicers said the same reasons that typically contribute to initial defaults also explain why repayment plans are rarely successful. For example, borrowers on limited incomes may struggle to pay increasing property tax and insurance costs or may fall behind on property charges when the death of a spouse reduces their income. At-risk extensions. Our analysis of FHA data found that from April 2015 (the effective date of FHA’s at-risk extension policy) through the end of fiscal year 2018, about 2 percent of borrowers with property charge defaults received an at-risk extension. To grant an at-risk extension, FHA requires HECM servicers to provide valid documentation that the youngest living borrower is at least 80 years of age and has critical circumstances such as a terminal illness, long-term physical disability, or a unique occupancy need (for example, terminal illness of family member living in the home). Representatives from one legal aid organization told us that some HECM servicers have straightforward requirements for the documentation borrowers must submit to obtain an at-risk extension, while others do not. Representatives from another legal aid organization said that meeting FHA’s annual renewal requirement for at-risk extensions was challenging for some borrowers because they have to submit documentation to HECM servicers every year as they age and continue to struggle with serious health issues or disabilities. Low-balance extensions. FHA officials told us they do not track how often HECM servicers use the option to delay calling a loan due and payable if the borrower has unpaid property charges of less than $2,000. Our analysis of FHA data on servicer advances found that approximately 8,800 HECMs that terminated in fiscal years 2014 through 2018 had unpaid property charges of less than $2,000 at the time of termination. Some of these HECMs may have been eligible for a low-balance extension when they terminated. Representatives from one legal aid organization said they represented a HECM borrower who was at risk of foreclosure for having 27 cents in unpaid property charges. HECM servicers told us they use the low-balance extension option to varying degrees. For example, representatives from one servicer said the servicer follows instructions from the entity that owns the HECM and, in some cases, the owners of the loan do not want to offer the low-balance extension to the borrower. In these cases the servicer calls the loan due and payable for any amount in unpaid property charges and initiates the foreclosure process in accordance with FHA regulations. Another HECM servicer told us it tries to use the low-balance extension every time a borrower owes less than $2,000 in unpaid property charges. Since fiscal year 2013, FHA has used the HERMIT system to collect data on the servicing of HECMs, but the system does not contain comprehensive and accurate data about the reasons why HECMs terminate, a key servicing event. According to the HERMIT User Guide, servicers should provide a reason in HERMIT when they terminate a HECM. However, as noted previously in figure 4, for about 30 percent of HECM terminations from fiscal years 2014 through 2018 (roughly 78,000 loans), we were unable to determine the reason for termination. Specifically, for these loans we could not identify in HERMIT any associated borrower death or default, or evidence that the borrower repaid, refinanced, moved, or conveyed title. Instead, these loans were coded as terminating for “other reasons” or coded based on how the debt was satisfied rather than an actual termination reason. The HERMIT User Guide provides a list of termination codes available in the system, but the list and guide have shortcomings that limit analysis of HECM terminations. First, the list includes codes servicers can use to indicate that a loan terminated for “other reasons,” but the guide does not specify what these other reasons are. However, servicers have been using the “other reasons” code increasingly over the past 5 years. We asked servicers how they used the “other reasons” code and found inconsistency in and uncertainty about its use. For example, servicers’ responses ranged from not using it at all, to using it when they did not intend to file an insurance claim with FHA, to not being sure under what circumstances they used it. Second, the list of termination codes consists of both reasons for termination and descriptions of how the debt was satisfied. As a result, the final status code of some loans in HERMIT shows only the way in which the debt was satisfied—for instance, a deed-in-lieu of foreclosure, foreclosure, or short sale. These codes could apply to terminations resulting from the borrower dying, defaulting, or moving and do not ultimately provide a specific reason for loan termination. FHA officials were unaware of any proxy variables that we could use to help identify the underlying termination reasons for these loans. The officials said the termination reasons are available on an individual loan basis in the HERMIT system but not in an extractable form. As discussed later in this report, FHA does not regularly track and report on HECM termination reasons, due partly to this system limitation. The limitations in FHA’s data are inconsistent with federal internal control standards, which require agencies to use quality information to achieve their objectives. To meet this internal control standard, agencies can obtain relevant data that are reasonably free from error and bias and evaluate sources of data for reliability. FHA’s annual report to Congress states that the HECM program helps seniors remain in their homes and age in place. However, without comprehensive and accurate data on HECM terminations, FHA does not have a full understanding of loan outcomes—information FHA and Congress need in order to know how well the HECM program and FHA’s policies are working to help seniors age in place. While FHA has taken steps to improve the performance of the HECM program in recent years, it has not incorporated key elements of performance assessment into its management of the program. We have previously reported that a program performance assessment contains three key elements: program goals, performance metrics, and program evaluations. Performance assessment can provide important information about whether, and why, a program is working well or not. Additionally, OMB Circular A-129 states that agencies must establish appropriate performance indicators for federal credit programs, such as the HECM program, and that such indicators should be reviewed periodically. It states further that agency management structures should clearly delineate accountability and responsibility for defining performance indicators and monitoring and assessing program performance. We found limitations in FHA’s performance assessment of the HECM program, specifically a lack of performance indicators and recent program evaluations: Lack of HECM performance indicators. According to HUD’s strategic plan for fiscal years 2018–2022 and the agency’s most recent annual performance report, the HECM program falls under the strategic goal of advancing economic opportunity and the strategic objective of supporting fair, sustainable homeownership and financial viability. The strategic plan and annual performance report include some strategies for achieving this objective, such as modernizing FHA underwriting guidelines, lending standards, and servicing protocols to serve the needs of borrowers, protect taxpayers, and ensure the sustainability of FHA’s program. However, none of the six performance indicators associated with this strategic objective and discussed in the strategic plan or corresponding performance report are HECM-specific. Four of the indicators focus on FHA-insured forward mortgages. Another indicator focuses on construction of manufactured housing. The remaining indicator— maintaining a capital reserve ratio for FHA’s Mutual Mortgage Insurance Fund that meets or exceeds the statutory minimum requirement— encompasses both forward mortgages and HECMs but does not provide specific information about HECM loan outcomes, risk factors, or loan characteristics. Additionally, FHA’s annual reports to Congress on the financial status of the insurance fund contain multiple tables of HECM data but limited information on loan outcomes. For example, among other things, the fiscal year 2018 report provides the number of new HECM originations, the average age of new borrowers, the amount of HECM insurance claims paid, and estimates of the HECM portfolio’s capital position. However, the report does not include other information that would provide insight into loan outcomes, such as the percentage of HECM terminations due to borrower defaults, the proportion of active HECMs with delinquent property charges, or the percentage of distressed HECM borrowers who have received foreclosure prevention options. Limited program evaluations. The last comprehensive evaluations of the HECM program were done in 2000 and 1995. Officials said they were in the planning phase for a new evaluation of the HECM program but had not set a start date and did not expect the evaluation to include an analysis of reasons for HECM terminations or the use of foreclosure prevention options for borrowers in default. Instead, the officials told us the evaluation would focus on the impact of an FHA policy change implemented in 2015 that requires prospective HECM borrowers to undergo a financial assessment to evaluate their ability to pay ongoing property charges. While financial assessments could help reduce tax and insurance defaults, and ultimately foreclosures, they only apply to new HECMs issued on or after the effective date of the policy (April 27, 2015) and are not relevant to other HECMs within the portfolio. Therefore, for most of the HECM portfolio, an equally important consideration is the impact of FHA’s policy changes that created foreclosure prevention options for distressed borrowers. As previously noted, borrower defaults have accounted for an increasing proportion of terminations in recent years, and in fiscal year 2018, borrower defaults made up 18 percent of terminations. Expanding the program evaluation to include the impact of foreclosure prevention options would provide a more complete picture of how well FHA is reducing defaults in the HECM portfolio and helping HECM borrowers. FHA officials acknowledged the need for more performance assessment of the HECM program. The officials said their recent focus has been on financial aspects of the program, in particular losses associated with insurance claims. According to the FHA Commissioner, a key challenge for the HECM program is that FHA has historically administered it without a designated program head. The 2000 program evaluation noted that lenders and servicers found it frustrating that FHA did not have one person with responsibility for the HECM program. Further, the 2000 program evaluation noted that the division of responsibility for the program fell across many offices and that it was hard to find senior managers with a sense of ownership for the HECM program. In January 2019, an economist from HUD’s Office of Policy Development and Research transferred to the Office of Housing (which includes FHA) to serve as a Senior Advisor to the Deputy Assistant Secretary for Single Family Programs, with a focus on the HECM program. Without more comprehensive performance indicators and program evaluations, FHA lacks information that could be useful for monitoring the effects of recent policy changes and may be missing evidence of the need for further program improvements. Additionally, in the absence of performance indicators and reporting, FHA and Congress lack insight into how well the HECM program is helping senior homeowners. According to OMB Circular A-129, agencies must have monitoring, analysis, and reporting mechanisms in place to provide a clear understanding of a program’s performance. The circular says these mechanisms should be sufficiently flexible to perform any analysis needed to respond to developing issues in the loan portfolio. However, we found shortcomings in FHA’s internal reporting. We also found that FHA had not analyzed the implications of its foreclosure prioritization process for FHA-assigned loans. Internal reporting for the HECM program is limited. Although FHA adopted the HERMIT system to improve oversight of the HECM portfolio, it has not used program data to regularly report key loan performance information—for example, HECM termination reasons, servicer advances, and use of foreclosure prevention options. FHA officials said they have been more focused on the analysis and reporting of claims and other financial data for the HECM program. However, according to OMB Circular A-129, effective reporting provides accurate, timely information on program performance, early warnings of issues that may arise, and analytics to drive decision-making. FHA has generated some reports from HERMIT to help oversee the HECM portfolio, but it has been slow to develop regular and comprehensive reporting mechanisms. FHA officials told us that while data on defaults and use of foreclosure prevention options have generally been available in HERMIT since 2015, FHA was unable to obtain reports on these topics until the summer of 2018 because of contract funding limitations. FHA officials said that starting in September 2018, FHA began receiving regular reports from its HERMIT system contractor on issues such as HECMs assigned to FHA; HECM origination, assignment, and termination activity by month; summary information on the number and dollar amount of HECMs originated each year; and HECMs with a default date. Additionally, around the same time, FHA requested and received ad hoc reports (one-time reports created for specific purposes) from the contractor that included spreadsheets of all active HECMs with a repayment plan and all active HECMs for which there was an identified nonborrowing spouse. FHA officials said the purpose of the reports generated from HERMIT is to help FHA better manage HECM program performance. However, our review of these regular and ad hoc reports found that many are lists of loans that meet certain criteria and do not provide summary statistics that could be used to readily identify patterns or trends in metrics, such as the number of or reasons for HECM terminations or use of different foreclosure prevention options. The reports require additional analysis to generate meaningful management information. According to OMB Circular A-129, graphics, tables, and trend analysis that compare performance over time and against expectations and other information can provide critical context for understanding program performance. Further, the circular says dashboards (easy-to-comprehend summaries of key quantitative and qualitative information) and watch lists are tools that can help all levels of the organization receive appropriate information to inform proactive portfolio management and ensure program decisions are informed by robust analytics. FHA’s lack of analysis and internal reporting on HECM termination reasons hampered the agency’s ability to respond to a 2017 Freedom of Information Act request about the number of and reasons for HECM foreclosures. FHA’s response contained data showing that over 99 percent of HECM foreclosures occurring from April 2009 through December 2016 resulted from the death of the borrower. However, FHA officials told us they subsequently looked more closely into the issue and redid the analysis using more reliable and updated information from January 2013 through December 2017. The revised analysis showed that 61 percent of foreclosures over that period were due to borrower deaths, 37 percent were due to borrower defaults, and 2 percent were due to conveyance of title. If FHA had regular and meaningful management information about HECM terminations, it could have initially responded to the 2017 request with more reliable information. FHA officials told us that HERMIT is an accounting system to process HECM claims and has limitations as a broader portfolio monitoring tool. However, our analysis of HERMIT data and reports generated by FHA’s HERMIT contractor suggest that the system can be used for this broader purpose. Without more robust program analysis and internal reporting, FHA is not well positioned to detect and respond to any emerging issues and trends in the HECM portfolio. As previously discussed, these trends include growing numbers of HECMs entering default and an increasing number of loans being assigned to FHA. FHA has not evaluated its foreclosure prioritization process for FHA- assigned HECMs. As previously noted, FHA-assigned loans are a growing part of the HECM portfolio. According to FHA officials, the agency generally does not foreclose on borrowers whose HECMs have been assigned to FHA and who are in default due to unpaid property charges. According to FHA, the properties associated with these loans are typically occupied. FHA officials said the agency prioritizes processing foreclosures on assigned HECMs for which the property is vacant (because the borrower passed away, for example). FHA officials said that prioritizing foreclosure processing for those loans and delays by the Department of Justice in completing those foreclosures has effectively resulted in few foreclosures on assigned loans with property charge defaults. However, FHA regulations state that servicers generally must initiate foreclosure within 6 months of calling a loan due and payable due to a death or default (if the borrower or heirs have not yet paid the debt off). FHA’s prioritization of processing vacant properties for foreclosure and generally not foreclosing on FHA-assigned HECMs with a property charge default raises issues and potential risks that FHA has not fully analyzed. First, defaulted borrowers whose loans are privately owned (that is, have not been assigned to FHA) face a greater risk of foreclosure than defaulted borrowers with FHA-assigned loans. According to a representative from one HECM servicer we interviewed, FHA’s practice is unfair because it treats HECM borrowers inconsistently. Second, FHA’s foreclosure prioritization processing may create a financial incentive for HECM borrowers with assigned loans to not pay their property charges, which, in turn, can have negative financial consequences for FHA, localities, and taxpayers. For example, because FHA does not foreclose on assigned loans in tax and insurance default, FHA advances tax and insurance payments on behalf of the borrower and adds them to the loan balance to secure and maintain its first-lien position on the mortgaged property. This makes it more likely that the loan balance will increase to a point that it exceeds the value of the home. When the borrower dies or vacates such a property, FHA may not be able to recoup the loan balance in a foreclosure sale, resulting in a loss to the insurance fund. As of August 2019, FHA had not evaluated the various risks of generally not foreclosing on assigned HECMs with property charge defaults. As a result, FHA does not know how its process for prioritizing foreclosures for assigned loans affects the HECM portfolio, HECM borrowers, neighborhoods, and FHA’s insurance fund. FHA’s oversight of HECM servicers is limited. FHA requires HECM servicers, among other things, to inform borrowers of their loan status, including any conditions resulting in a loan becoming due and payable; to notify struggling borrowers of the availability of housing counseling and foreclosure prevention options; to inform surviving nonborrowing spouses of conditions and requirements for the deferral period; and to manage the transfer of loan servicing from one entity to another. These requirements are identified in FHA regulations, handbooks, and mortgagee letters. If properly implemented, these requirements can help ensure that HECM borrowers and nonborrowing spouses are aware of their mortgage responsibilities, options for resolving situations that can result in foreclosure, and who to contact with loan servicing questions. FHA officials said they maintain communication with HECM servicers, including through an industry working group, about their compliance with FHA requirements. The officials also noted that FHA conducts reviews of due and payable requests and insurance claims, which can include checks for some of the requirements discussed above. However, FHA has not performed comprehensive on-site reviews of HECM servicers’ compliance with program requirements since fiscal year 2013 and does not have current procedures for conducting these reviews. The lack of on-site reviews of HECM servicers is inconsistent with OMB requirements for managing federal credit programs. OMB Circular A- 129 states that agencies should conduct on-site lender and servicer reviews biennially where possible and annually for lenders and servicers with substantial loan volumes or those with other risk indicators such as deterioration in their credit portfolio, default rates above acceptable levels, or an abnormally high number of reduced or rejected claims. The purpose of these reviews is to evaluate and enforce lender and servicer performance and identify any noncompliance with program requirements. The circular encourages agencies to develop a risk-rating system for lenders and servicers to help establish priorities for on-site reviews and to monitor the effectiveness of required corrective actions. The circular also says that agencies should summarize review findings in written reports with recommended corrective actions. FHA previously conducted on-site reviews of HECM servicers. However, according to agency data, FHA has not performed on-site reviews since fiscal year 2013. From fiscal years 2010 through 2013, FHA’s Quality Assurance Division (a component of the Office of Lender Activities and Program Compliance) conducted 14 on-site reviews of HECM servicers (see table 3). These reviews examined compliance with FHA servicing requirements and included detailed reviews of samples of loans. FHA provided us three examples of HECM servicing reviews conducted in fiscal year 2013. While not representative of all reviews, the three reviews identified multiple violations of FHA requirements, as follows: Quality control plans. Two of the three reviews found that the servicers’ quality control plans—an internal control mechanism to help ensure compliance with FHA requirements—were missing required elements. For example, one review found that the servicer’s plan lacked 13 required elements, including those intended to ensure compliance with fair lending laws and immediate reporting of fraud or other serious violations. Another review found deficiencies with the servicer’s plan, including in the areas of customer service, servicing transfers, and fees and charges. Communication with borrowers. In these same two reviews, FHA found that the servicers did not always provide borrowers with a designated contact person or timely and accurate information about their loan status. For both servicers, FHA’s reviews of files for a sample of active loans found no evidence that the servicer had provided the borrower a contact person to handle inquiries. FHA requires servicers to designate for borrowers a contact person knowledgeable about servicing and provide the name of the person annually and whenever the contact person changes. Additionally, both reviews found that the servicers’ annual loan statements to borrowers were missing critical information, such as the net principal limit (total loan funds available), and that the servicers did not provide borrowers with statements after every loan disbursement, as required. Filing claims. In two of the three reviews, FHA found deficiencies in the servicers’ filing of insurance claims. For example, in one review, FHA identified multiple cases where the servicer submitted claims that were greater than the amounts warranted, including excess attorney and appraisal fees, property preservation and protection expenses, and interest costs. In another review, FHA found numerous instances where the servicer missed various deadlines—including for submitting claims, commencing foreclosure, and obtaining appraisals—and therefore was not entitled to the full claim amounts it received. Loan disbursements. One of the three reviews found numerous instances in which the servicer did not respond to borrowers’ requests for payment plan changes within the required time frame of 5 business days, and therefore did not make timely loan disbursements to borrowers. FHA required these servicers to take corrective actions, including updating quality control plans, revising policies and procedures, reimbursing FHA for unwarranted claim amounts, indemnifying FHA for losses on a loan, and paying late charges to borrowers who did not receive timely loan disbursements. FHA has the option of referring violations of FHA requirements to HUD’s Mortgagee Review Board, which can take administrative actions such as issuing letters of reprimand, suspending or withdrawing approval to participate in FHA programs, entering into settlement agreements to bring an entity into compliance, and imposing civil money penalties. FHA officials said they had not referred any HECM servicers to the board as a result of findings from on- site reviews. According to FHA’s current Director of the Quality Assurance Division, under previous leadership, the division suspended on-site reviews of HECM servicers after fiscal year 2016 because of servicers’ concerns about the clarity and consistency with which FHA was conducting the reviews and applying enforcement remedies. He said the Quality Assurance Division had intended to revise its guidance for conducting the reviews and then resume them, but the effort had stalled during a change in leadership. The current Director said he was not aware that HECM servicing reviews had been suspended until the fall of 2017, when the division began targeting on-site reviews for fiscal year 2018, and noticed that HECM servicers were not included in the prior year’s targeting methodology. The lack of recent HECM servicer reviews is problematic for a number of reasons. First, as previously noted, the number of HECM borrowers defaulting on their loans has grown in recent years. As a result, knowing whether servicers are providing borrowers with accurate and timely communications about their mortgage obligations and the status of their loans has become increasingly critical. Second, FHA has recently made program changes and implemented foreclosure prevention options, such as at-risk extensions and mortgagee optional election assignments, to help struggling borrowers and nonborrowing spouses delay or avoid foreclosure. But FHA does not know how effectively servicers inform borrowers of these options and use these tools due to its lack of oversight. Third, as discussed earlier, the majority of HECM servicers are nonbank entities that may pose risks because they are not subject to the same comprehensive federal safety and soundness regulations as banks and rely on funding sources, such as lines of credit, that may be less stable than deposits. The Director of the Quality Assurance Division said FHA plans to begin conducting HECM servicer reviews in fiscal year 2020 but will first need to revise its procedures for reviewing HECM servicers, which were last updated in 2009. However, the Director told us the division decided not to develop criteria for selecting HECM servicers for review. Instead, he said FHA plans to review all HECM servicers with significant portfolios at least once every 3 years, starting with the three servicers that account for 96 percent of the HECM portfolio. While FHA’s plan to review HECM servicers with significant portfolios captures one aspect of portfolio risk (loan volume), it does not account for other risk indicators that OMB Circular A-129 says agencies should consider. The circular also encourages agencies to develop risk-rating systems that incorporate these indicators. While the current HECM servicing market is dominated by a small number of companies, the ability to prioritize on-site reviews based on risk ratings will be important if the market becomes less concentrated in the future. Additionally, some HECM servicers may warrant review more frequently than once every 3 years if their business volume or performance poses substantial risks to FHA or to borrowers. FHA’s plans do not account for these contingencies. CFPB oversees reverse mortgage servicers through examinations designed, among other things, to identify whether servicers engage in acts or practices that violate federal consumer financial laws. CFPB issued its Reverse Mortgage Examination Procedures in 2016 and began conducting examinations in 2017. CFPB’s procedures include reviewing servicers’ compliance with the Real Estate Settlement Procedures Act of 1974 and its implementing regulations (which, among other things, contain requirements for notifying borrowers of servicing transfers, responding to borrowers’ written information requests and notices of error, and disclosures relating to force-placed insurance); the Truth In Lending Act and its implementing regulations (which impose requirements on servicers governing the use of late fees and delinquency charges, provisions for payoff statements, and disclosures regarding rate changes for adjustable-rate mortgages); and other consumer protection laws. Additionally, CFPB’s procedures include a review of whether a HECM servicer is following selected elements of FHA’s HECM program requirements. For example, CFPB’s examiners are directed to determine whether information provided to the borrowers about life expectancy set- aside accounts (an FHA requirement) is clear, prominent, and readily understandable, and whether the borrower incurred penalties or unnecessary charges in the event the servicer failed to make disbursements of set-aside funds for insurance, taxes, and other charges with respect to the property in a timely manner. CFPB examiners also are directed to determine whether the servicer referred a HECM to foreclosure improperly after the death of a borrower, such as when an eligible nonborrowing spouse still occupies the home. If CFPB’s reverse mortgage examinations identify violations, CFPB may require the examined entity to take corrective actions, which are recorded in the examination results as matters requiring attention. CFPB examinations of reverse mortgage servicers have found deficiencies in monitoring of servicing actions, compliance with consumer protection laws, and communications with consumers. For example, CFPB reported in the March 2019 edition of its Supervisory Highlights that one or more reverse mortgage servicing examinations found cases where the servicer did not provide the heirs of deceased borrowers a complete list of the documents needed to evaluate their case for a foreclosure extension. (Extensions can give heirs additional time to sell or purchase the property and delay or avoid foreclosure.) As a result, in some instances, one or more servicers foreclosed rather than seeking a foreclosure extension from FHA. According to CFPB, in response to the examinations, one or more servicers planned to improve communications with borrowers’ heirs, including specifying the documents needed for a foreclosure extension and the relevant deadlines. CFPB officials said they plan to continue examining reverse mortgage servicers. In addition to conducting examinations and issuing matters requiring attention, CFPB officials said the bureau has other options—including issuing warning letters and taking enforcement actions—to stop unlawful practices or promote future compliance by supervised entities. Warning letters advise companies that certain practices may violate federal consumer financial law. Enforcement actions are legal actions against an entity initiated through federal district court or by an administrative adjudication proceeding. CFPB officials told us the bureau had not issued any warning letters or enforcement actions against HECM servicers as of August 2019. While CFPB has examined reverse mortgage servicers and plans to continue doing so, CFPB officials said the bureau and FHA do not have an agreement in place to share supervisory information, which inhibits sharing of examination results. Information-sharing agreements may address topics such as what and how information will be shared and handling of sensitive information. CFPB officials said that an agreement with FHA would be needed to ensure that supervisory information in the bureau’s examinations is kept confidential. Under the Dodd-Frank Wall Street Reform and Consumer Protection Act, CFPB must share results of the examination of a supervised entity with another federal agency that has jurisdiction over that entity, provided that CFPB received from the agency reasonable assurances as to the confidentiality of the information disclosed. In addition, in previously issued work, we noted that interagency collaboration can serve a number of purposes, including, among other things, policy development, oversight and monitoring, and information sharing and communication. CFPB officials said CFPB and FHA had taken initial steps in 2017 toward developing an information-sharing agreement. However, as of August 2019, an information-sharing agreement had not been completed. CFPB officials told us there were existing ways for the two agencies to share examination findings, but that an information-sharing agreement would facilitate the process. CFPB officials said developing information- sharing agreements can be a lengthy process and that both agencies had other competing priorities. However, because of the limited information sharing between CFPB and FHA, FHA is not benefiting from oversight findings about servicers it could rely on to help implement the HECM program. Having this information is particularly important given that FHA does not comprehensively review HECM servicers itself and CFPB’s examinations address a number of FHA requirements. Access to CFPB’s examination results could enhance FHA’s oversight of HECM servicers and potentially help it respond to consumer protection issues facing HECM borrowers. CFPB collects, analyzes, and reports on consumer complaints related to reverse mortgages. The bureau began collecting reverse mortgage consumer complaints in December 2011 and has collected about 3,600 complaints since then. CFPB collects complaints through an online forum on its website called the Consumer Complaint Database, as well as via email, mail, phone, fax, or referral from another agency. CFPB’s authority to collect complaints comes from the Dodd-Frank Wall Street Reform and Consumer Protection Act, which states that one of the bureau’s primary functions is collecting, investigating, and responding to consumer complaints. CFPB officials told us the bureau uses consumer complaints as part of its criteria for selecting entities to examine, including reverse mortgage servicers, and to inform its educational publications. For example, in June 2015, CFPB released a report on reverse mortgage advertising and consumer risks. In August 2017, CFPB released an issue brief on the costs and risks of using a reverse mortgage to delay collecting Social Security benefits. In February 2015, CFPB issued a report on reverse mortgage consumer complaints it received from December 2011 through December 2014. CFPB found that consumer complaints indicated frustration and confusion over the terms and requirements of reverse mortgages. CFPB also found that many complaints were about problems with loan servicing. For example, some consumers complained that they were at risk of foreclosure due to nonpayment of property taxes or homeowners insurance and that they faced obstacles when trying to prevent a foreclosure. CFPB officials told us they did not currently have plans to publish additional reports on reverse mortgage complaints, but that CFPB would continue to produce educational materials on reverse mortgages and internally review the data on a routine basis. For this report, we performed a high-level analysis of roughly 2,500 reverse mortgage complaints received by CFPB from calendar years 2015 through 2018. We analyzed patterns in the number of complaints by year, state, submission method, and company. By year. Complaint volumes varied across the 4 years, with the most complaints received in 2016 and the least received in 2018 (see table 4). By state. The states with the most complaints were California (accounting for 16 percent of reverse mortgage complaints), Florida (11 percent), New York (8 percent), and Texas (7 percent). These states are among the most populous, and three of them (California, Florida, and Texas) also had the greatest numbers of HECMs. By submission method. A majority of reverse mortgage complaints (56 percent) were submitted through CFPB’s website. The remaining complaints were submitted through referrals to CFPB from other agencies (22 percent), by phone (12 percent), by postal mail (7 percent), and by fax (3 percent). Compared to the percentage of all types of mortgage complaints filed during the 4-year period, the percentage of reverse mortgage complaints filed through the website (56 percent) was lower than the corresponding percentage for complaints about all types of mortgages (67 percent). Representatives from legal aid organizations representing HECM borrowers said that reverse mortgage consumers may be less likely to file a complaint through a website because of limitations sometimes related to aging— for example, lack of internet access or computer skills. Additionally, representatives from three of the five organizations said seniors may suffer from health or capacity issues, such as hearing, vision, or memory loss, that may make it difficult for them to file or follow up on a complaint. For these reasons, seniors may not be submitting complaints through CFPB’s website and seniors’ complaints about reverse mortgages may be underreported in general. By company. Companies that were the subject of reverse mortgage complaints included both lenders and servicers. From 2015 through 2018, five companies were the subject of more than 100 complaints each, ranging from a low of 116 to a high of 506. Together, these five companies accounted for 61 percent (1,509) of the reverse mortgage complaints CFPB received. Additionally, one company received the most complaints in 4 out of the 5 years reviewed. We also conducted a more detailed analysis of a random, generalizable sample of 100 consumer complaint narratives from among the 2,472 total reverse mortgage complaints CFPB received in calendar years 2015 through 2018. The purpose of this analysis was to identify patterns in consumer-described issues about reverse mortgages. We created issue categories by reading the consumer narratives. Figure 6 shows the estimated percentage of reverse mortgage complaints received by CFPB over the 4-year period by consumer-described issue categories, based on our sample of 100 complaint narratives. Among the largest consumer-described issue categories were foreclosures; poor communication from lenders or servicers; problems at loan origination; estate management; and unfair interest rates, fees, or costs. Being at risk of foreclosure or in foreclosure. The largest consumer-described issue category (47 percent) involved consumers (or someone complaining on behalf of the consumer) who said they were at risk of foreclosure or in the foreclosure process. For example, some consumers said they or the borrower they represent had received a notice of default, were in due and payable status, or were at risk of foreclosure. Some consumers sought help in preventing foreclosure or felt they were wrongly being foreclosed on. In 16 of the 47 complaints about being at risk of or in foreclosure, consumers also cited concerns about property taxes, insurance, or other property charges. Poor communication on a servicing or lending issue. The second largest consumer-described issue category (42 percent) involved complaints about poor communication on a reverse mortgage servicing or lending issue. These complaints included concerns about a lack of communication or communications that were unclear or unresponsive to the consumer’s needs. Complaints in this category often overlapped with those about being at risk of or in foreclosure. For example, some of these complaints included consumers’ concerns that they had not received information about the status of or reason for a possible foreclosure from their servicer or did not get responses to their inquiries. Loan origination issues. The third largest complaint category involved problems occurring at loan origination (29 percent). These complaints included consumers’ concerns that the amount of funds available from their reverse mortgage was less than expected or that interest rates or fees were not disclosed or explained to them. The complaints also included cases where the adult children of borrowers said they felt the lender took advantage of their parents. Estate-management issues. Twenty-seven percent of consumer complaints were about estate management issues. Complaints involving estate-management were often submitted by deceased borrowers’ families or heirs. In some cases, heirs said that they were unable to get information about the status of the reverse mortgage. In other cases, the heirs said that because of the reverse mortgage, they were at risk of losing the home, which was also their place of residence. Unfair interest rates, fees, or costs. Twenty-seven percent of consumer complaints were about being charged higher-than-expected costs, fees, or interest. For example, in a few complaints, consumers said that their servicers required them to pay for insurance products (for example, flood insurance) that they felt were not needed. According to CFPB officials, the bureau (1) refers consumer complaints about financial products and services to the companies the complaints are about or other federal regulators with supervisory jurisdiction over those companies or (2) makes complaint information available to other federal agencies with jurisdiction over the relevant product or service. CFPB officials said the bureau does not currently refer reverse mortgage complaints to FHA; however, they told us reverse mortgage complaints are available to FHA through CFPB’s public website and through a secure portal FHA can access that has more data available than on the public website. FHA collects and records inquiries and complaints about HECMs and, as previously mentioned, has access to CFPB data on reverse mortgage complaints. However, FHA does not use its inquiry and complaint data to help inform HECM program policies and oversight, and the way data are collected does not produce quality information for these purposes. Additionally, FHA has not leveraged CFPB’s complaint data for HECM program oversight. Federal internal control standards state that agencies should use quality information to achieve the entity’s objectives, including using relevant data from reliable internal and external sources. Additionally, in prior work we identified practices to enhance collaboration across agencies, including leveraging agency resources. According to agency officials, FHA’s two main methods for collecting customer inquiries and complaints are hotlines operated by the agency’s National Servicing Center and the FHA Resource Center. Historically, the National Servicing Center was FHA’s primary method for collecting inquiries and complaints about the HECM program. From calendar years 2015 through 2018, the National Servicing Center received about 105,000 HECM-related calls. During this same period, the FHA Resource Center received 147 HECM-related calls. In April 2019, the FHA Resource Center became the primary entity for collecting, recording, and responding to all HECM-related calls. FHA officials told us they transferred these responsibilities from the National Servicing Center to the FHA Resource Center to help improve call management. While this change could help improve customer service, it would not fully resolve limitations we found in FHA’s approach to collecting and recording HECM inquiries and complaints that diminish the usefulness of the information for program oversight. These limitations include the following: Information is not suitable for thematic analysis. Both the National Servicing Center and the FHA Resource Center do not collect call information in a way that would allow FHA to readily analyze the data for themes. For example, both centers do not reliably differentiate between inquiries and complaints—a potentially important distinction for determining appropriate agency-level responses (for example, creating informational materials to address frequently asked questions from borrowers or investigating problematic servicing practices after repeated complaints). Additionally, while both the centers collect data on the reason for calls, neither did so in a systematic way that would allow FHA to readily determine how frequently issues are being raised. For example, neither centers’ data systems contained standardized categories or menus with options for recording reasons for calls. As a result, the FHA Resource Center’s data from 2015 through 2018 contained more than 100 separate reasons for 147 HECM-related calls. Some of the reasons the center recorded were too specific (for example, a property address or a case number) to be useful for identifying themes, while others were so similar that they do not provide meaningful distinctions (but could be combined into fewer, potentially more useful categories). We noted similar limitations in the National Servicing Center’s data, which included ambiguous call reasons such as “history” and “documents,” and categories that could be collapsed, which hinders thematic analysis. Customer type is not recorded. The National Servicing Center, which received the large majority of HECM-related calls to FHA, did not record information on the type of customer that made the call. National Servicing Center guidance for staff says customers include borrowers, nonprofit organizations, government entities, real estate brokers and agents, title companies, attorneys, lenders and servicers, and HUD employees, but its data system does not include these categories. Information on customer type could be useful in identifying issues facing different populations of callers and could help FHA tailor strategies for addressing their concerns. In contrast, the FHA Resource Center’s data system does include categories for customer type for the smaller number of HECM-related inquiries and complaints it received. Because the FHA Resource Center’s system is now FHA’s primary repository for new HECM-related calls, information on customer type should be available for future inquiries and complaints. However, this information is not available for the bulk of HECM-related calls FHA received in prior years. FHA officials said the agency uses customer complaint and inquiry data to improve customer service. For example, FHA officials said the National Servicing Center monitors calls on a daily basis to ensure that prompt responses are provided. Similarly, FHA officials said they review call data monthly to identify training needs of servicers or contractors and potential process changes to improve customer experience with the call process. However, FHA does not analyze data for other purposes that could enhance program oversight, such as determining which HECM servicers and lenders receive the most complaints, targeting entities for on-site reviews, or identifying topics that may need additional borrower education. FHA also does not use CFPB’s consumer complaint data to inform management and oversight of the HECM program, even though some of the information could be useful to the agency. For example, according to CFPB’s complaint data for 2015 through 2018, approximately 6 percent of reverse mortgage complaints were about FHA’s servicing contractor. FHA officials said they do not review CFPB’s complaint data because they believe the data are too limited to be useful and because they have concerns about CFPB’s controls over data integrity. However, as our analysis shows, CFPB’s data can be used to identify consumer concerns—such as difficulties avoiding or navigating foreclosure or problems communicating with servicers—that may merit additional attention by FHA. Additionally, CFPB’s Office of Inspector General recently reviewed CFPB’s management controls for the Consumer Complaint Database and did not identify major data integrity issues that would preclude use of the data for general oversight purposes. Periodically analyzing CFPB consumer complaint data and internally collected consumer complaint data could help FHA to detect and respond to consumer protection issues regarding HECMs. Since 2000, the take-up rate—the ratio of HECM originations to eligible senior homeowners—has been limited (see fig. 7). This rate, which provides an indication of how popular HECMs are among the population of senior homeowners, has not reached 1 percent and has fallen in recent years. In addition, since calendar year 2010, the volume of HECM originations has declined and is about half of what originations had been at their peak. For example, in calendar years 2007–2009, more than 100,000 new HECMs were originated each year, compared with roughly 42,000 in calendar year 2018. The relatively high homeownership rate and low retirement savings of U.S. seniors suggest that reverse mortgages could be a way for many older Americans to tap their home equity and supplement retirement income. However, the popularity of reverse mortgages has declined in recent years for a number of possible reasons. We developed an econometric model to examine the relationship between HECM take-up rates and a number of explanatory variables. For additional information and detailed results from our econometric model of factors associated with HECM take-up rates, see appendix II. Among other factors, our model results indicate that house price changes, home equity, and prior use of other home equity lending products were statistically significant (at the 1 percent level) in explaining the decrease in HECM take-up rates since 2010. Changes in house prices. The decline in take-up rates may reflect lower house prices, which have limited the number of households with sufficient home equity (as a percentage of home value) to benefit from a HECM. Our model estimated that, controlling for other factors, take- up rates were higher when house price growth was large and there was a history of house price volatility compared to either relatively low house price appreciation or stable house prices. This result is consistent with senior homeowners using reverse mortgages to insure against house price declines. For example, researchers have noted that in states where house prices are volatile and the current level is above the long-term norm, seniors anticipate future reductions in house prices and lock in their home equity gains by obtaining a reverse mortgage. Home equity and prior home equity borrowing. Additionally, we found that controlling for other factors, take-up rates were higher where home equity (house value minus any mortgage debt) was high. In these cases, senior homeowners tap into their high home equity to help supplement income with proceeds from the HECM. Further, we found that among seniors who had previously used other home equity lending products, such as home equity loans, take-up rates were high. This result is consistent with seniors using HECMs to pay off these loans. Academics and industry experts have also noted possible reasons why the popularity of reverse mortgages is limited. For example, senior homeowners can tap their home equity by other means, such as home equity loans, home equity lines of credit, and cash-out refinancing. Some of these options may be less expensive than reverse mortgages. Seniors can also downsize––sell their current home and buy or rent a less expensive one—and keep the difference to supplement retirement savings. Seniors have other ways to supplement their retirement income and age in place—for example, one academic noted that some seniors rent out rooms in their homes, potentially using online marketplaces such as Airbnb. Additionally, our literature review and interviews with academics identified other factors that have may have contributed to limited interest in reverse mortgages, including the following: Exit of large bank lenders. As previously noted, banks, thrifts, and credit unions were historically the primary lenders and servicers of mortgage loans. Following the 2007–2009 financial crisis and subsequent revisions to regulatory bank capital requirements, banks reevaluated the benefits and costs of being in the mortgage lending market, as well as retaining mortgages and the right to service them. Today, the reverse mortgage market is dominated by a relatively small number of nonbank entities. The exit of large, well-known lenders, such as Bank of America and Wells Fargo, from the HECM market created opportunities for smaller nonbank lenders to enter the market. According to an academic we spoke with, in addition to new capital requirements, large banks may have exited the market partly out of concern that they risked damage to their reputations if they foreclosed on seniors who defaulted on their HECMs. Additionally, a 2018 survey of lenders found a variety of reasons why lenders have stopped originating HECMs, including potential reputation risk and concerns about HECMs being a distraction from their forward mortgage business. Although the HECM market is currently served by several nonbank lenders, their smaller scale, limited access to capital, and limited name recognition may limit their ability to reach more potential borrowers. FHA policy changes to the HECM program. FHA has made several policy changes in recent years to help stabilize the financial performance of the HECM portfolio and strengthen financial criteria for HECM borrowers. Although many of the HECM policy changes introduced since 2010 were intended to minimize program losses, they also may have reduced take-up rates. For example, in 2010 FHA reduced the amount of money a borrower can get from a HECM. Some academics we interviewed said reductions in the loan amounts that borrowers can receive likely reduced demand for HECMs. In 2015, FHA changed financial requirements for HECMs to include a financial assessment of the prospective borrower prior to loan approval. Some academics said these changes made other home equity extraction options that already had similar requirements more competitive with HECMs. Consumers’ misunderstanding and product complexity. A 2013 survey of U.S. homeowners aged 58 and older revealed a lack of knowledge of reverse mortgages. The survey found that awareness of reverse mortgages is high, but knowledge of mortgage terms is limited. Additionally, the survey found that respondents perceived reverse mortgages to be fairly complex. Consumers’ perception of the product. Academics we spoke with told us that consumers’ negative perception of reverse mortgages likely has a negative influence on take-up rates. For example, three academics elaborated that consumers build their perception of the product based on the industry’s marketing and advertising, which includes television commercials with celebrity spokespeople that may appeal to individuals facing economic hardship. Additionally, a 2016 survey of Americans aged 55 to 75 found that many respondents had reservations about reverse mortgages, including that they are often considered a financial tool of last resort. For example, only 27 percent of survey respondents stated that, in general, it was better to use a reverse mortgage earlier in retirement as opposed to using it as a last resort. Relatively high origination costs and fees. HECMs also may be unpopular with borrowers because they can be more expensive than other home equity lending products, such as home equity lines of credit. For example, HECM borrowers are charged various fees, such as the up-front insurance premiums that FHA charges as compensation for its insurance guarantee and origination fees lenders charge. The up-front insurance premium is 2 percent of the mortgage’s maximum claim amount. Also, for origination fees, lenders can charge the greater of $2,500 or 2 percent of the first $200,000 of the mortgage’s maximum claim amount plus 1 percent of the maximum claim amount over $200,000. However, origination fees are currently capped at $6,000. Further, because borrowers do not make monthly payments on the loans, the interest will accumulate over time, and compounding the interest, the loan balance can rise quickly. Seniors’ attitudes toward debt and desire to leave a bequest. Some academics have noted that seniors tend to be financially conservative and avoid debt in old age––behavior driven by their desire to leave a bequest or save for emergency expenses or long- term care costs. For example, academics have noted that some impediments to home equity extraction are behavioral and have to do with seniors’ long-held values, beliefs, and attitudes, such as to maximize wealth transfer to heirs by leaving a bequest. As a result, they may be reluctant to take out a HECM, even if it could help pay for some future expenses. HECMs allow seniors to tap a portion of their home equity to supplement their retirement income, but these loans can present risks to borrowers and their spouses. The growing number of borrowers who have defaulted on their HECMs and faced foreclosure in recent years highlights the importance of monitoring loan outcomes and overseeing loan servicing policies and practices in the HECM program. FHA has taken some steps to enhance the data it receives from servicers and has created foreclosure prevention options for distressed borrowers. However, FHA could significantly improve its monitoring of loan outcomes and oversight of servicing in the HECM program in the following areas: FHA’s lack of comprehensive termination data limits understanding of the reasons why HECMs end, how the debt is satisfied, and how well the program is helping seniors age in place. By, for example, updating and providing more guidance to servicers on how to record termination reasons, FHA could improve the completeness and accuracy of HECM termination data. FHA has not effectively assessed the performance of the HECM program. By establishing performance indicators and periodically assessing them, FHA could better oversee the program and communicate information on program performance to Congress. Further, FHA could use the performance data to help make informed decisions about any needed program changes in the future. FHA’s internal monitoring and reporting on loan outcomes has been limited. Adopting analytic tools could better position FHA to evaluate loan outcomes and help ensure senior officials have information needed to make key decisions. FHA has not fully analyzed the implications of how it prioritizes foreclosures for assigned HECMs. FHA’s current process generally results in no foreclosures on assigned loans with property charge defaults. Analyzing the implications of this process could help FHA optimize how it services assigned loans. Because FHA does not currently perform on-site reviews of HECM servicers, it lacks assurance that servicers are complying with rules and program requirements. While FHA plans to begin reviewing HECM servicers in fiscal year 2020, its plan does not include development of a risk-rating system to prioritize reviews and identify servicers that should be reviewed more frequently. CFPB does not share the results of its examinations of HECM servicers with FHA, in part because the two agencies have not completed a formal information-sharing agreement. Sharing these results could aid FHA’s oversight of HECM servicers by providing additional information about the servicers’ performance and operations. FHA’s collection and use of consumer complaint data could be improved. More organized collection of complaints and better monitoring of internal and external complaint data could help FHA detect and respond to emerging consumer protection issues regarding HECMs. By addressing these issues, FHA could help ensure that the HECM program achieves program goals, effectively oversees servicers, and provides appropriate borrower protections. We are making a total of nine recommendations, eight to FHA and one to CFPB: The FHA Commissioner should take steps to improve the quality and accuracy of HECM termination data. These steps may include updating the termination reasons in the HERMIT system or updating the HERMIT User Guide to more clearly instruct servicers how to record termination reasons. (Recommendation 1) The FHA Commissioner should establish, periodically review, and report on performance indicators for the HECM program—such as the percentage of terminations due to borrower defaults, the proportion of active HECMs with delinquent property charges, the amount of servicer advances, and the percentage of distressed borrowers who have received foreclosure prevention options—and examine the impact of foreclosure prevention options in the forthcoming HECM program evaluation. (Recommendation 2) The FHA Commissioner should develop analytic tools, such as dashboards or watch lists, to better monitor outcomes for the HECM portfolio, such as reasons for HECM terminations, defaults, use of foreclosure prevention options, or advances paid by servicers on behalf of HECM borrowers. (Recommendation 3) The FHA Commissioner should evaluate FHA’s foreclosure prioritization process for FHA-assigned loans. Such an analysis should include the implications that the process may have for HECM borrowers, neighborhoods, and FHA’s insurance fund. (Recommendation 4) The FHA Commissioner should develop and implement procedures for conducting on-site reviews of HECM servicers, including a risk-rating system for prioritizing and determining the frequency of reviews. (Recommendation 5) The FHA Commissioner should work with CFPB to complete an agreement for sharing the results of CFPB examinations of HECM servicers with FHA. (Recommendation 6) The CFPB Director should work with FHA to complete an agreement for sharing the results of CFPB examinations of HECM servicers with FHA. (Recommendation 7) The FHA Commissioner should collect and record consumer inquiries and complaints in a manner that facilitates analysis of the type and frequency of the issues raised. (Recommendation 8) The FHA Commissioner should periodically analyze available internal and external consumer complaint data about reverse mortgages to help inform management and oversight of the HECM program. (Recommendation 9) We provided HUD and CFPB with a draft of this report for review and comment. HUD provided written comments, which are reproduced in appendix V, that communicate FHA’s response to the report. CFPB’s written comments are reproduced in appendix VI. CFPB said that it did not object to our recommendation to complete an agreement for sharing the results of CFPB examinations of HECM servicers with FHA (recommendation 7) and that it would work to complete such an agreement with FHA. FHA agreed with six of our eight recommendations and neither agreed nor disagreed with the remaining two. Recommendation 1. FHA agreed with our recommendation to improve HECM termination data and said it would convene a working group to update the HERMIT system and User Guide and develop clear directions for HECM servicers to record termination reasons in HERMIT. Recommendation 2. Regarding our recommendation on HECM performance indicators and program evaluation, FHA agreed that periodic review and reporting of HECM performance indicators is critically important and said it would work to expand its reporting to include the level of foreclosure prevention activity. However, FHA added that there were no HECM metrics for early default or delinquency rates, as those measures are linked to the amortizing nature of forward mortgages. We agree that early default and delinquency rates are not suitable metrics for HECMs, and our draft report did not suggest that they are. Our report focuses on metrics that would be pertinent to HECMs and that would provide additional insight into HECM loan performance. These include the percentage of HECM terminations due to borrower defaults, the proportion of active HECMs with delinquent property charges, and the amount of funds servicers have advanced on behalf of borrowers. We revised the recommendation in our final report to more specifically describe the types of performance indicators that FHA should establish and report on. In addition, FHA disagreed with a statement in our draft report that its evaluation of the HECM program has been limited. FHA said it engages in robust HECM program evaluation and cited an example that led to recent changes in FHA’s appraisal practices for HECMs. While our draft report described the change in FHA’s appraisal practices, we updated our final report to include reference to the FHA study that prompted the appraisal change. However, we maintain that FHA’s evaluation of the HECM program has been limited because the last comprehensive program evaluation was completed 19 years ago and FHA has not assessed the impact of HECM foreclosure prevention options. Recommendations 3 and 4. FHA agreed with our recommendations to develop analytic tools for monitoring HECM loan outcomes and to evaluate its foreclosure prioritization process for FHA-assigned loans. Regarding the latter, FHA said that it is evaluating alternative disposition options to reduce the number of loans that must go through foreclosure and that it would take steps to evaluate the impact of its prioritization process to assist in future decision-making. Recommendation 5. FHA agreed with our recommendation to develop and implement procedures for conducting on-site reviews of HECM servicers, including a risk-rating system for prioritizing and determining the frequency of reviews. As noted in our draft report, FHA said it is in the process of updating procedures for on-site reviews and plans to implement them in fiscal year 2020. FHA disagreed with a statement in our draft report that FHA’s oversight of HECM servicers is limited. FHA said the HECM servicing community is small, which allows the agency to maintain regular communication with HECM servicers, including through training sessions and industry working group meetings. Our draft report acknowledged FHA’s communications with servicers, but these activities are not a substitute for in-depth compliance reviews of servicers’ operations. As our draft report stated, FHA has not conducted on-site HECM servicer reviews since fiscal year 2013. Given the 5-year lapse in FHA’s use of this key oversight tool, we maintain that FHA’s oversight of HECM servicers has been limited. Recommendation 9. FHA agreed with our recommendation to periodically analyze internal and external consumer complaint data about reverse mortgages. FHA said it is expanding its data and reporting capabilities as part of an information technology modernization initiative. FHA also said that routing consumer inquiries through the FHA Resource Center should improve data collection and analysis. FHA did not explicitly agree or disagree with our recommendations to work with CFPB to complete an agreement for sharing examination results and to collect and record consumer inquiries and complaints in a manner that facilitates analysis (recommendations 6 and 8, respectively). FHA said it would explore opportunities to coordinate with CFPB where appropriate. FHA also said that routing inquiries through the FHA Resource Center would help identify common issues, track servicer performance, and inform policy decisions. Fully implementing our recommendations will help ensure that FHA has the information it needs to effectively oversee the HECM program. We are sending copies of this report to the Secretary of the Department of Housing and Urban Development, the Director of the Consumer Financial Protection Bureau, appropriate congressional committees, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or CackleyA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. This report examines issues related to reverse mortgages made under the Home Equity Conversion Mortgage (HECM) program administered by the Department of Housing and Urban Development’s (HUD) Federal Housing Administration (FHA). The Consumer Financial Protection Bureau (CFPB) also plays a role in overseeing reverse mortgages, including HECMs. Our objectives were to examine (1) what FHA data show about HECM terminations, servicer advances, and the use of foreclosure prevention options; (2) FHA’s assessment and monitoring of HECM portfolio performance, servicer advances, and foreclosure prevention options; (3) FHA’s and CFPB’s oversight of HECM servicers; (4) how FHA and CFPB collect, analyze, and respond to consumer complaints about HECMs; and (5) how and why the market for HECMs has changed in recent years. To address all of our objectives, we reviewed relevant laws, regulations, and requirements, such as HECM authorizing legislation, the Reverse Mortgage Stabilization Act of 2013, FHA regulations, and mortgagee letters governing the HECM program. We also interviewed FHA and CFPB officials and staff from other relevant HUD offices such as the Office of Policy Development and Research and the Office of General Counsel. We reviewed FHA’s annual reports to Congress on the financial status of the Mutual Mortgage Insurance Fund, actuarial reports on the HECM portfolio, and FHA’s annual management reports. We also reviewed our prior reports and reports by HUD’s Office of Inspector General about the HECM program. Additionally, we identified the largest HECM servicers using FHA data on the number of loans serviced as of the end of fiscal year 2018. We found that five companies serviced more than 99 percent of the HECM portfolio (excluding loans assigned to FHA, which are serviced by an FHA contractor) as of the end of fiscal year 2018. We developed a questionnaire to solicit information applicable to our objectives from these five servicers. We took steps to verify the information gathered in the questionnaire. We reviewed responses for completeness and held teleconferences with each HECM servicer to discuss, clarify, and amend responses. Where possible, we corroborated servicers’ responses with information or analysis from other sources, such as our analysis of FHA loan-level data or FHA documents. We use summary statements and illustrative examples from these questionnaires and our interviews with the five servicers throughout the report. We also interviewed representatives from five legal aid organizations representing HECM borrowers in the states of California, Florida, New York, Texas, and Washington. We selected these states because they had the highest number of HECM originations in the past decade and because they provided some geographic diversity; the five states span the West (California), Northwest (Washington), Northeast (New York), Southeast (Florida), and South (Texas). We selected the specific legal aid organizations within those states because they represented a large number of HECM borrowers, according to organization representatives. We conducted semistructured interviews with organization representatives that included questions on the top consumer protection issues facing HECM borrowers, how recent HECM program changes may have helped borrowers delay or avoid foreclosure, and characteristics of HECM borrowers that may affect their ability to file consumer complaints. We use summary statements and illustrative examples from these interviews throughout the report. To address the first objective, we analyzed FHA data to determine the number of and reasons for HECM terminations, the amounts of servicer advances, and the number of borrowers approved for selected foreclosure prevention options (for example, repayment plans). We used data from the Home Equity Reverse Mortgage Information Technology (HERMIT) system, which FHA adopted in fiscal year 2013. FHA provided us a HERMIT case detail table from its Single Family Data Warehouse that contained loan-level information as of the end of fiscal year 2018. We separately obtained several ad hoc HERMIT reports from FHA’s HERMIT system contractor, as described below. For some of our analyses, we merged data from the ad hoc reports with data from the case detail table using the unique FHA case number for each HECM. Unless otherwise noted, we analyzed data for the 5-year period spanning fiscal years 2014–2018. We assessed the reliability of data from the HERMIT system by reviewing FHA documentation about the data system and data elements. For example, we reviewed the HERMIT User Guide and notes on HERMIT system updates. Additionally, we interviewed FHA and contractor staff knowledgeable about the HERMIT system and data to discuss interpretations of data fields and trends we observed in our analyses. We also conducted electronic testing, including checks for duplicate loans, outliers, missing data fields, and erroneous values. Where appropriate, we removed from our analyses any loans missing an endorsement (insurance approval) date as well as cases with erroneous values. When possible, we corroborated our analyses with external reports such as FHA’s annual reports to Congress, management reports, and production reports. Based on these steps, we determined the data we used from the HERMIT system were sufficiently reliable for summarizing trends and generating descriptive statistics for HECM terminations, servicer advances, and selected foreclosure prevention options over the 5-year period. We analyzed FHA loan-level data from the HERMIT system to determine the total number of terminated HECMs and reasons for terminations by fiscal year. We first identified terminations occurring in fiscal years 2014– 2018 using data fields for case status and termination date (see table 5). We then removed any terminated loans that had previously been assigned to FHA (16,008) using the data field that records the date FHA accepted assignment of the loan. We removed these loans because FHA officials told us the agency generally does not foreclose on FHA-assigned HECMs that default and keeping them in the analysis would have resulted in understating the proportion of terminations stemming from defaults. Accordingly, the denominator for our terminations analysis was 256,147 loans (272,155 total terminations minus the 16,008 loans previously assigned to FHA). We then identified the reported termination reasons for the 256,147 loans. We analyzed loan-level data from the HERMIT system to identify the number of loans that fell into various termination reason categories. To identify terminations stemming from a HECM becoming due and payable, we used data from two reports that we obtained from FHA’s HERMIT system contractor: the Default Key Dates Report and the Due and Payable Delinquency Report. From these reports, we identified the number of terminations due to a borrower’s death, conveyance of title, default due to unpaid property charges, default due to failure to meet occupancy or residency requirements, and default due to failure to keep the home in good repair. To identify terminations stemming from repayment, refinancing, moving, or other (undetermined) reasons, we used information on case substatus from the HERMIT case detail table from the Single Family Data Warehouse. Our undetermined reasons category included loans for which the case substatus either was labeled “terminate-other” or showed how the debt was satisfied (such as through a deed-in-lieu of foreclosure, foreclosure, or short sale) rather than providing a termination reason. For the full results of our terminations analysis, see appendix III. We analyzed servicer advances to HECM borrowers using data from an ad hoc HERMIT report we requested from FHA’s HERMIT system contractor. We analyzed the data to determine the amounts and types of servicer advances in fiscal years 2014 through 2018 for terminated HECMs. We distinguished between servicer advances for unpaid property charges and servicer advances for other costs. Examples of the latter are attorney, trustee, and appraisal fees typically incurred during the foreclosure process. For each year and for the 5-year period as a whole, we calculated total servicer advances and the amount and percentage of advances for property charges and for other costs. Additionally, we distinguished between servicer advances for unpaid property charges before and after a HECM borrower’s death using the date of death of the last surviving borrower in HERMIT. This allowed us to determine the amount of servicer advances for unpaid property charges on behalf of living borrowers. We calculated the total amount of these advances over the 5-year period as well as the mean, median, and 25th and 75th percentile values. We also calculated the number and percentage of loans for which property charge advances on behalf of living borrowers were less than $2,000 (the threshold for one of FHA’s foreclosure prevention options). We analyzed data from HERMIT on the use of selected foreclosure prevention options—repayment plans and at-risk extensions—for borrowers who defaulted because of unpaid property charges. We analyzed data from April 2015 (the effective date of FHA’s current repayment plan and at-risk extension policies) through fiscal year 2018. To conduct the analysis of repayment plans, we used the HERMIT Due and Payable Delinquency Report noted previously, which includes data fields for loan default status and the dates borrowers were approved for a repayment plan. We calculated the percentage of borrowers with property charge defaults who were approved for repayment plans during the period examined. To conduct the analysis of at-risk extensions, we requested an ad hoc report from FHA’s HERMIT system contractor showing whether and when borrowers had been approved for at-risk extensions and appended it to the default status within the Due and Payable Delinquency Report using FHA case numbers. We calculated the percentage of borrowers with property charge defaults who were approved for at-risk extensions during the period examined. We also reviewed and summarized information that FHA provided us from HERMIT on nonborrowing spouses who applied for mortgagee optional election assignments from June 2015 (the effective date of FHA’s mortgagee optional election assignment policy) through fiscal year 2018. FHA provided information on the number of requested, approved, and denied mortgagee optional election assignments during that period. We also reviewed documentation from FHA and interviewed agency officials about the mortgagee optional election assignment process and reasons for denials. For the denied mortgagee optional election assignments, we reviewed information that FHA provided us from HERMIT on the current status of the associated loans as of May 31, 2019. For example, for the denied mortgagee optional election assignments, FHA determined whether the loan had been terminated as of that date. For those that had terminated, we summarized whether the debt was paid off or whether the debt was satisfied because of a foreclosure, deed-in-lieu of foreclosure, or short sale. To address the second objective, we reviewed agency reports and interviewed agency officials to determine how the agency assesses the performance of the HECM program, including the use of any performance indicators or program evaluations. For example, we reviewed HUD’s strategic plan for fiscal years 2018–2022 and its most recent annual performance report to identify any goals and performance indicators related to the HECM program. Additionally, we reviewed program evaluations completed for the HECM program. We also interviewed FHA and HUD Office of Policy Development and Research officials about previous program evaluations and HUD’s plans for forthcoming evaluations of the HECM program. We compared FHA’s practices against leading practices identified in our previous work on assessing program performance and against Office of Management and Budget (OMB) policies and procedures on managing federal credit programs (OMB Circular A-129). Additionally, we reviewed FHA documents and interviewed FHA officials concerning the agency’s internal reporting and analysis of the HECM portfolio. For example, we reviewed examples of regular and ad hoc reports FHA received from its HERMIT system contractor. These internal reports contained information on HECM origination, assignment, and termination activity and HECM defaults. We interviewed FHA officials to understand the purpose of the reports, when they were developed, and how agency management uses them. We compared FHA’s internal reporting practices to OMB Circular A-129 on reporting mechanisms and formats for federal credit programs. To address the third objective, we reviewed FHA and CFPB policies and procedures for overseeing HECM servicers and interviewed agency staff with oversight responsibilities. To assess the extent to which FHA oversees HECM servicers’ compliance with servicing requirements, we requested information on the number of on-site monitoring reviews of HECM servicers that FHA completed from fiscal years 2010 through 2019. We also reviewed corrective actions FHA can take to address noncompliance. We reviewed and summarized a nongeneralizable sample of three reports from on-site servicer reviews FHA conducted in fiscal year 2013, the most recent year in which FHA had completed a review. Additionally, we interviewed the director of FHA’s Quality Assurance Division, which is responsible for conducting on-site reviews of FHA-approved lenders and servicers, about the division’s past practices for reviewing HECM servicers and plans for future reviews. We compared FHA’s practices and plans to criteria in OMB Circular A-129 regarding the frequency, targeting methodology, and other aspects of on-site lender and servicer reviews. Further, we interviewed FHA officials about the extent of information sharing between FHA and CFPB on HECM servicer oversight. To examine CFPB’s oversight of HECM servicers, we reviewed CFPB’s reverse mortgage examination procedures and the examinations completed under those procedures as of fiscal year 2018. We also reviewed CFPB’s methodology for selecting reverse mortgage servicers for examination and documentation on its plans for future examinations. We reviewed CFPB’s examination findings and corrective actions as of August 2019. We interviewed CFPB officials about the examination process and agency efforts to share examination results with FHA. We reviewed statutes and regulations related to CFPB’s authority to share the results of its examinations, and we compared CFPB’s information-sharing efforts with FHA against practices for interagency collaboration we identified in previous work. To address our fourth objective, we analyzed CFPB data on reverse mortgage consumer complaints from the bureau’s online website, called the Consumer Complaint Database. The database includes information provided by consumers on their location (state), the company they are complaining about, and the nature of their complaint. For example, consumers can submit narratives describing their complaints about reverse mortgage lenders or servicers. Because CFPB had published an analysis of reverse mortgage consumer complaints using data from calendar years 2011 through 2014, we analyzed reverse mortgage complaints and narratives received by the bureau from calendar years 2015 through 2018. We analyzed all 2,472 complaints filed in those 4 years to determine the number of complaints by year, state, submission method (for example, internet, phone, or email), and company. For the analysis by submission method, we compared the results to those for complaints about all types of mortgages filed during the same period. To identify patterns in consumer-described issues about reverse mortgages, we reviewed a generalizable sample of 100 complaint narratives and categorized these complaints by topic. For this analysis, two independent reviewers read the complaints and categorized them into predetermined topics based on their content. We used nine complaint issue topics, including complaints where the consumer (or someone complaining on behalf of the consumer) said he or she (1) was at risk of foreclosure or in foreclosure; (2) was charged unfair interest rates, fees, or costs; (3) experienced problems after the loan was transferred to a new servicer; (4) had issues with, or defaulted as a result of, property taxes, insurance, or other property charges; (5) experienced poor communication on a servicing or lending issue; (6) had an issue involving occupancy requirements; (7) had concerns or issues involving the management of the estate after the borrower died or left the property; (8) had difficulties gaining approval for a mortgagee optional election assignment or recognition of a nonborrowing spouse; or (9) experienced problems during loan origination. If a complaint narrative in our sample did not contain enough information or was not clear enough to determine a complaint topic, we replaced it with another randomly selected complaint narrative. In cases where the two reviewers categorized a complaint differently, a third independent analyst read the complaint narrative and adjudicated the difference to place the complaint in a topic category. We calculated confidence intervals for these categories at the 95 percent confidence level. We determined that the CFPB data were sufficiently reliable for the purposes described above by reviewing CFPB documentation and reports from CFPB’s Office of Inspector General on CFPB’s consumer complaint database and by interviewing CFPB officials about our interpretation of data fields. Also, we interviewed CFPB officials about their collection, analysis, and use of the consumer complaint data. To determine the extent to which FHA collects consumer inquiries and complaints about HECMs, we reviewed the HECM-related calls received by FHA’s National Servicing Center and the FHA Resource Center from calendar years 2015 through 2018. We calculated the total number of HECM-related calls each center received over that period. The data from both centers included fields to capture a description of the issue raised by the caller. However, unlike CFPB’s consumer complaint data, the information in the issue description was recorded by FHA customer service staff (rather than the complainants themselves) and did not differentiate between inquiries and complaints. We determined there was not enough information in these descriptions to perform an analysis similar to the one we performed on CFPB’s consumer complaints. Both the National Servicing Center and the FHA Resource Center record the reasons for calls. However, neither entity records this information in a consistent or standardized way that would allow for analysis. For example, the data we reviewed from the National Servicing Center included about 100 reasons. Additionally, we reviewed CFPB and FHA policies and procedures for collecting and addressing consumer complaints and interviewed officials on how consumer complaints were incorporated into their oversight of HECM servicers. We interviewed officials from both agencies about their collection and use of customer complaint data. We also interviewed CFPB and FHA officials about the extent to which they share consumer complaint data or access and use the other agency’s data. Finally, we compared CFPB’s and FHA’s efforts against federal internal control standards for using quality information and against approaches we identified in prior work for enhancing collaboration across agencies. To address our fifth objective, we analyzed FHA data on HECM originations from calendar years 1989 through 2018 to identify any trends in HECM program activity. Additionally, using FHA and Census Bureau data, we calculated HECM take-up rates—the ratio of HECM originations to eligible senior homeowners—from calendar years 2000 through 2017. We also developed an econometric model to examine, to the extent possible, factors affecting HECM take-up rates from calendar years 2000 through 2016 (the last year we could include in the model due to data constraints). Following the existing research literature, we hypothesized that HECM loan originations could be affected by several demand- and supply-related factors that could be represented by demographic and socioeconomic characteristics, housing market conditions, and product features. Accordingly, our model used a variety of data from FHA, the Census Bureau, the Federal Housing Finance Agency, and other sources. For a detailed description of our econometric model—including the model specification, factors used, data sources, and results—and a list of selected studies we consulted to develop the model, see appendix II. We also reviewed relevant literature and interviewed academic and HUD economists about FHA policy changes and behavioral and structural factors (for example, consumers’ perception of reverse mortgages) that we could not account for in our econometric model but that may influence HECM take-up rates. These individuals included three academic economists who have conducted extensive research on reverse mortgages and economists from FHA and HUD’s Office of Policy Development and Research. We present summary information about these factors in this report. We conducted this performance audit from July 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We developed an econometric model to examine, to the extent possible, factors associated with Home Equity Conversion Mortgage (HECM) take- up rates—the ratio of HECM originations to eligible senior homeowners— using data from calendar year 2000 through 2016. Take-up rates provide an indication of how popular HECMs are among the population of senior homeowners. A number of factors may have affected the take-up rates over this period. For instance, it has been asserted that demand for HECMs would be high for elderly people that are house-rich but cash- poor, but behavioral factors such as their desire to leave a bequest could limit demand. Also, the limited number of large, well-known lenders could constrain supply of HECMs. Furthermore, several FHA policy changes to the HECM program may have affected the number of loan originations. Following the existing literature, we hypothesized that HECM loan originations could be affected by several demand- and supply-related factors that could be represented by demographic and socioeconomic characteristics, housing market conditions, product features, program policy changes, and behavioral and structural factors. The general specification of the model we used, which is a quasi-reduced form of the net effect of demand and supply factors on HECM take-up rates, is as follows: Yit = θ + α + γ + Xit β + εit. Y is the dependent variable, the take-up rate, representing the ratio of HECM originations to eligible senior homeowners in state (i) in year (t). An eligible senior homeowner is an owner-occupied householder aged 65 or older. Both α and γ control, respectively, for state-specific (but time-invariant) and year-specific (but state-invariant) observable and unobserved factors. They help to minimize omitted variable bias that could be caused by excluding time-invariant or state-invariant variables. The latter, which are year fixed-effects (that is, variables that change over time but are constant across the states), would pick up average differences in take-up rates over the years. These factors would include changes in HECM program policies and market conditions over time, such as the exit of large, well-known HECM lenders or investors. In general, using the year fixed-effects precluded the estimation of the impact of variables that are state-invariant (for example, interest rates).The state fixed-effects are used to control for average differences in take-up rates across the states (that is, variables that differ across the states but are constant over time). These effects would include regulatory variations across states. The vector X captures measured variables represented by demographic and socioeconomic characteristics, housing market conditions, and product features that vary across states and over time. Given that the time-invariant and state-invariant factors would be accounted for by the state fixed-effects and year fixed-effects, respectively, the measured variables capture how changes in these variables within states (that is, over time) could affect take-up rates. θ is the constant term. ε, the regression error term, represents random and other unobserved factors that could vary across the states and over time, such as random changes in risk behavior of HECM borrowers and lenders. It also captures errors due to misspecification and measurement. The data sources for our analysis are as follows: Census Bureau. The data include demographic, socioeconomic, and housing characteristics in geographic areas. The data are from the Integrated Public Use Microdata Series National Historical Geographic Information System (IPUMS NHGIS) for 2000; 1-year American Community Survey data from the American FactFinder for 2005–2009, and 1-year American Community Survey data from IPUMS NHGIS for 2010–2016. We interpolated the data for 2001– 2004 using all data available for the other years: 2000 and 2005– 2016. All the data are for seniors aged 65 years or older and at the state level. Federal Housing Finance Agency. House price indexes at the state level, 2000–2016. Federal Reserve Bank of New York. Federal Reserve Bank of New York Consumer Credit Panel/Equifax: Mortgage debt balances of seniors 62 years or older, state level, 2003–2016. Survey of Consumer Finances: Triennial data on family net worth, national level, 2000–2016. Federal Reserve Bank of St. Louis’s Federal Reserve Economic Data. Consumer price index for all urban consumers, national level, 2000–2016. Effective federal funds rate, national level, 2000–2016. Federal Housing Administration (FHA). HECM loan-level data from the Single Family Data Warehouse, available yearly, 2000–2017. The data include when the loan was endorsed by FHA, property location, appraised home value, and maximum claim amount. The list of potential explanatory variables we used in the model is provided below. The data are measured at the state level and are available from 2000 through 2016 (unless indicated otherwise). Also, the variables are for senior householders, aged 65 or older (unless indicated otherwise). All monetary values are in 2016 dollars using the Consumer Price Index for All Urban Consumers. The data sources are indicated in brackets (see the data sources above for details). Demographic and socioeconomic characteristics [Census Bureau]. Fraction 75 years or older in occupied housing units. Fraction of senior householders who are married or those who are unmarried females. Fraction African American or Hispanic. Fraction of individuals 65 years or older with high school education or some college education, or with college, graduate, or professional degree. Fraction in the labor force: the ratio of the labor force (the employed and the unemployed) to civilian noninstitutionalized adult population (65 years or older). Fraction in poverty. Median household income (natural logarithm). Ratio of family net worth of individuals 65 years or older to house value. Net worth is measured as the difference between families’ gross assets and liabilities using triennial data at the national level . House value is measured as the ratio of aggregate house value to number of owner-occupied housing units. Housing market conditions. House price changes : o House price growth: 5-year intervals prior to the observation. o House price volatility: standard deviation of annual house price percent change in the 5 years prior to the observation. Effective federal funds rate (percent). [Federal Reserve Bank of Home equity per senior homeowner (natural logarithm), 1-year lag. Home equity is measured as the aggregate house value of owner-occupied housing units minus total mortgage debt. Total mortgage debt comprises aggregate mortgage, home equity loan, and home equity line of credit balances of individuals 62 or older (2003–2016). [Census Bureau; Federal Reserve Bank of New York/Equifax] Ratio of individuals aged 62 or older with home equity loan to senior homeowners, 1-year lag (2003–2016). [Federal Reserve Bank of New York/Equifax; Census Bureau] Ratio of individuals aged 62 or older with home equity line of credit to senior homeowners, 1-year lag (2003–2016). [Federal Reserve Bank of New York/Equifax; Census Bureau] Fraction of owner-occupied housing units with ratio of selected monthly housing costs to household income greater than or equal to 35 percent. Product features. FHA loan limit: proportion of HECM loans in a state and year for which the appraised home value is more than the maximum claim amount; that is, the FHA loan limit is binding. The maximum claim amount equals the minimum of the appraised home value and the FHA loan limit. Although we did not directly include other variables that could affect HECM take-up rates in our model partly due to lack of data, we included year fixed-effects and state-fixed effects to minimize omitted variables problem associated with state-invariant variables and time-invariant variables, respectively. These included several FHA policy changes to the HECM program and behavioral and structural factors, as discussed earlier in this report. We used a state as the geographic area instead of a smaller area, such as ZIP code. The data on HECM originations are available at the household (or family) level from FHA. However, the factors used in the model (demographic and socioeconomic characteristics and housing market conditions) are generally available at the state level or at the ZIP code level from the Census Bureau and other sources. There are advantages and disadvantages to using state-level or ZIP-code-level data. Given the low HECM take-up rates (see fig. 7 earlier in this report), using ZIP-code data would generally imply very low, if not zero, take-up rates across a large number of ZIP codes, which would make it harder to identify effects from our model. Also, not all of the data for the factors used in the model are available for every ZIP code with a HECM origination—including the home equity extraction variables—which would lead to exclusion of some areas, resulting in potential sample-selection bias. On the other hand, using ZIP code-level data could allow for more heterogeneity in certain states, and certain variables such as house price changes when measured at the ZIP code level could be closer to what the homeowner experiences. We decided to use state-level data because of our concern for potential sample-selection bias and the quality of data at the ZIP code level, although using state-level data could limit heterogeneity in the data across geographic areas. We estimated panel data of state-year observations of the model specified above using fixed-effects estimation. Because of data limitations with some of the key variables—home equity and home equity extraction via loans or lines of credit—and because we used a 1-year lag of these variables, we estimated the model from 2004 through 2016. We also excluded the District of Columbia, which was an outlier, with a take- up rate that was 4.5 times the national average. The list of the variables we used and the estimation results are provided in tables 6 and 7, respectively, at the end of this appendix. The standard fixed-effects estimates are reported in column 1 (the base model) of table 7. We also report fixed-effects estimates that account for spatial and temporal dependence in columns 2 through 4—column 2 estimates the base model, column 3 excludes the variables for home equity extraction from the base model, and column 4 excludes the year fixed-effects from the base model. We focused on these estimates because spatial correlations may be present as states are likely to be subject to both observable and unobservable common disturbances, and failure to account for these would yield inconsistent estimates of the standard errors. Our econometric estimates indicated that several demographic and socioeconomic characteristics and housing conditions are associated with take-up rates, using data across states from 2004 through 2016. The results discussed below, which are based primarily on the estimates in column 2 of table 7, are statistically significant at the 10, 5, or 1 percent levels or lower. Because the fixed-effects technique controls for the effects of both observable and unobservable factors that vary across states (but are time-invariant), the estimates of the measured effects are for only within-state variations and the results are interpreted accordingly. House price changes. The interaction term for house price growth and house price volatility is positive and significant at the 1 percent level. This implies that within states, take-up rates were higher when house price growth was large and when there was a history of house price volatility compared to either relatively low house price appreciation or stable house prices. This result is consistent with senior homeowners using reverse mortgages to insure against house price declines, which is supported by the positive and significant effects of the house price volatility by itself. On the other hand, the weak significance of house price growth by itself (at the 10 percent level) provides only modest support for senior homeowners using reverse mortgages purely to extract home equity. Home equity. Within states, take-up rates were higher when home equity of senior homeowners was high, significant at the 1 percent level. Fractions of senior homeowners with a home equity loan or home equity line of credit. Within states, take-up rates were higher when the fractions of senior homeowners with a home equity loan or home equity line of credit were high, significant at the 1 percent and 10 percent levels, respectively. Because these loans were outstanding as of the prior year, it is likely that borrowers used HECMs to pay them off. Fraction of owner-occupied housing units with ratio of housing costs to household income greater than or equal to 35 percent. Within states, take-up rates were higher when the ratio of housing costs to household income was high, significant at the 1 percent level. Fractions of seniors with high school or college education. Within states, take-up rates were higher when the fractions of seniors with high school or college education were high, significant at the 1 percent and 10 percent levels, respectively. Median household income. Within states, take-up rates were higher when incomes of senior households were high, significant at the 5 percent level. Fraction of senior households who were married. Within states, take-up rates were lower when the fraction of married senior households was high, significant at the 10 percent level. Fraction of homes in states with binding FHA loan limit. Although the effect was generally not statistically significant, the effect of the FHA loan limit on take-up rates was negative. We estimated other specifications of our model to test the robustness and reasonableness of our results. The alternative specifications, described below, yielded estimates similar to those of our original model. We estimated the model excluding the variables for home equity loans and home equity lines of credit, which are alternative channels of home equity extraction, because they could be endogenous (see column 3 of table 7). We estimated the model excluding the year fixed-effects (see column 4 of table 7). We estimated the model using the number of senior housing units (instead of senior homeowners) within a state to normalize the number of HECMs in order to account for nonhomeowners who might become homeowners. We note the following caveats and limitations of our study: We were not able to include some factors that could affect HECM take-up rates, including FHA program policy changes and behavioral and structural factors previously discussed in this report. Some of our estimates could be different if we used areas smaller than a state as the units of observation, such as ZIP codes or counties. The estimates represent the average effects for all states and for all periods we analyzed, but the effects could differ for specific states or specific periods. Our analysis pertains to the period that we analyzed and may not be generalizable to other periods. To help develop our HECM take-up rate model, we consulted the following studies. 1. Banks, James, Richard Blundell, Zoe Oldfield, and James P. Smith. “Housing Price Volatility and Downsizing in Later Life.” National Bureau of Economic Research Working Paper 13496. Cambridge, Mass.: National Bureau of Economic Research, October 2007. Accessed April 30, 2019. http://www.nber.org/papers/w13496. 2. Chatterjee, Swarn. “Reverse Mortgage Participation in the United States: Evidence from a National Study.” International Journal of Financial Studies, vol. 4, no. 5 (2016): pp. 1–10. 3. Consumer Financial Protection Bureau. Reverse Mortgages: Report to Congress. Washington, D.C.: June 28, 2012. 4. Davidoff, Thomas. Reverse Mortgage Demographics and Collateral Performance. February 25, 2014. Accessed November 19, 2018. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2399942. 5. Davidoff, Thomas. “Supply Constraints Are Not Valid Instrumental Variables for Home Prices Because They Are Correlated With Many Demand Factors.” Critical Finance Review, vol. 5, no. 2 (2016): pp. 177–206. 6. Davidoff, Thomas, Patrick Gerhard, and Thomas Post. Reverse Mortgages: What Homeowners (Don’t) Know and How It Matters. October 24, 2016. Accessed November 19, 2018, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2528944. 7. Driscoll, John C., and Aart C. Kraay. “Consistent Covariance Matrix Estimation with Spatially Dependent Panel Data.” Review of Economics and Statistics, vol. 80 (1998): pp. 549–560. 8. Golding, Edward, and Laurie Goodman, “To Better Assess the Risk of FHA Programs, Separate Reverse and Forward Mortgages.” Urban Wire (blog), Urban Institute. November 29, 2017. Accessed August 14, 2019. https://www.urban.org/urban-wire/better-assess-risk-fha- programs-separate-reverse-and-forward-mortgages. 9. Goodman, Laurie, Karan Kaul, and Jun Zhu. What the 2016 Survey of Consumer Finances Tells Us about Senior Homeowners. Washington, D.C.: Urban Institute, November 2017. 10. Haurin, Donald, Chao Ma, Stephanie Moulton, Maximilian Schmeiser, Jason Seligman, and Wei Shi. “Spatial Variation in Reverse Mortgages Usage: House Price Dynamics and Consumer Selection.” Journal of Real Estate Finance and Economics, vol. 53 (2016): pp. 392–417. 11. Integrated Financial Engineering, Inc. “Appendix E: HECM Demand Model” in HECM Demand Model Actuarial Review of the Federal Housing Administration Mutual Mortgage Insurance Fund HECM Loans For Fiscal Year 2015. Prepared at the request of the Department of Housing and Urban Development. November 16, 2015. 12. Kaul, Karan, and Laurie Goodman. Seniors’ Access to Home Equity: Identifying Existing Mechanisms and Impediments to Broader Adoption. Washington, D.C.: Urban Institute, February 2017. 13. Lucas, Deborah. “Hacking Reverse Mortgages.” (Working paper, October 26, 2015). Accessed June 14, 2019. http://mitsloan.mit.edu/shared/ods/documents/?DocumentID=4596. 14. Mayer, Christopher J., and Katerina V. Simons. “Reverse Mortgages and the Liquidity of Housing Wealth.” Journal of the American Real Estate and Urban Economics Association, vol. 22, no. 2 (1994): pp. 235–255. 15. Mummolo, Jonathan, and Erik Peterson. “Improving the Interpretation of Fixed Effects Regression Results.” Political Science Research and Methods, vol. 6 (2018): pp. 1–7. 16. Moulton, Stephanie, Donald R. Haurin, and Wei Shi. “An Analysis of Default Risk in the Home Equity Conversion Mortgage (HECM) Program.” Journal of Urban Economics, vol. 90 (2015): pp. 17–34. 17. Moulton, Stephanie, Cazilia Loibl, and Donald Haurin. “Reverse Mortgage Motivations and Outcomes: Insights from Survey Data.” Cityscape: A Journal of Policy Development and Research, vol. 19, no. 1 (2017): pp. 73–97. 18. Moulton, Stephanie, Samuel Dodini, Donald Haurin, and Maximilian Schmeiser. “Seniors’ Home Equity Extraction: Credit Constraints and Borrowing Channels.” May 20, 2019. Accessed August 12, 2019. https://ssrn.com/abstract=2727204. 19. Nakajima, Makoto, and Irina A. Telyukova. “Reverse Mortgage Loans: A Quantitative Analysis.” The Journal of Finance, vol. 72, no. 2 (2017): pp. 911–949. 20. Redfoot, Donald L., Ken Scholen, and S. Kathi Brown. Reverse Mortgages: Niche Product or Mainstream Solution? Report on the 2006 AARP National Survey of Reverse Mortgage Shoppers. Washington, D.C.: December 2007. 21. Shan, Hui. “Reversing the Trend: The Recent Expansion of the Reverse Mortgage Market.” Real Estate Economics, vol. 39, no. 4 (2011): pp. 743–768. 22. Warshawsky, Mark J. “Retire on the House: The Possible Use of Reverse Mortgages to Enhance Retirement Security.” The Journal of Retirement, vol. 5, no. 3 (2018): pp. 10–31. In addition to the contact named above, Steve Westley (Assistant Director), Beth Faraguna (Analyst in Charge), Steven Campbell, William Chatlos, Holly Hobbs, John Karikari, Matthew Levie, Risto Laboski, Marc Molino, Jennifer Schwartz, Tyler Spunaugle, and Khristi Wilkins made key contributions to this report.", "summary": "Reverse mortgages allow seniors to convert part of their home equity into payments from a lender while still living in their homes. Most reverse mortgages are made under FHA's HECM program, which insures lenders against losses on these loans. HECMs terminate when a borrower repays or refinances the loan or the loan becomes due because the borrower died, moved, or defaulted. Defaults occur when borrowers fail to meet mortgage conditions such as paying property taxes. These borrowers risk foreclosure and loss of their homes. FHA allows HECM servicers to offer borrowers foreclosure prevention options. Most HECM servicers are supervised by CFPB. GAO was asked to review HECM loan outcomes and servicing and related federal oversight efforts. Among other objectives, this report examines (1) what FHA data show about HECM terminations and the use of foreclosure prevention options, (2) the extent to which FHA assesses and monitors the HECM portfolio, and (3) the extent to which FHA and CFPB oversee HECM servicers. GAO analyzed FHA loan data and FHA and CFPB documents on HECM servicer oversight. GAO also interviewed agency officials, the five largest HECM servicers (representing 99 percent of the market), and legal aid groups representing HECM borrowers. The vast majority of reverse mortgages are made under the Federal Housing Administration's (FHA) Home Equity Conversion Mortgage (HECM) program. In recent years, a growing percentage of HECMs insured by FHA have ended because borrowers defaulted on their loans. While death of the borrower is the most commonly reported reason why HECMs terminate, the percentage of terminations due to borrower defaults increased from 2 percent in fiscal year 2014 to 18 percent in fiscal year 2018 (see figure). Most HECM defaults are due to borrowers not meeting occupancy requirements or failing to pay property charges, such as property taxes or homeowners insurance. Since 2015, FHA has allowed HECM servicers to put borrowers who are behind on property charges onto repayment plans to help prevent foreclosures, but as of fiscal year-end 2018, only about 22 percent of these borrowers had received this option. FHA's monitoring, performance assessment, and reporting for the HECM program have weaknesses. FHA loan data do not currently capture the reason for about 30 percent of HECM terminations (see figure). FHA also has not established comprehensive performance indicators for the HECM portfolio and has not regularly tracked key performance metrics, such as reasons for HECM terminations and the number of distressed borrowers who have received foreclosure prevention options. Additionally, FHA has not developed internal reports to comprehensively monitor patterns and trends in loan outcomes. As a result, FHA does not know how well the HECM program is serving its purpose of helping meet the financial needs of elderly homeowners. FHA has not conducted on-site reviews of HECM servicers since fiscal year 2013 and has not benefited from oversight efforts by the Consumer Financial Protection Bureau (CFPB). FHA officials said they planned to resume the reviews in fiscal year 2020, starting with three servicers that account for most of the market. However, as of August 2019, FHA had not developed updated review procedures and did not have a risk-based method for prioritizing reviews. CFPB conducts examinations of reverse mortgage servicers but does not provide the results to FHA because the agencies do not have an agreement for sharing confidential supervisory information. Without better oversight and information sharing, FHA lacks assurance that servicers are following requirements, including those designed to help protect borrowers. GAO makes eight recommendations to FHA to, among other things, improve its monitoring and assessment of the HECM portfolio and oversight of HECM servicers, and one recommendation to CFPB to share HECM servicer examination information with FHA. FHA and CFPB generally agreed with the recommendations.", "document_type": "gao"}
{"report": "TSA began implementing its Secure Flight program in 2009 to identify passengers who may pose security risks before boarding an aircraft. The program requires U.S. and foreign commercial aircraft operators traveling to, from, within or overflying the United States, as well as U.S. commercial aircraft operators with international point-to-point flights, to collect information from passengers and transmit it electronically to TSA. This information includes personally identifiable information, such as full name, gender, date of birth, passport information (if available), and certain non-personally identifiable information, such as itinerary information and the unique number associated with a travel record (record number locator). The Secure Flight program matches the passenger-provided personally identifiable information against federal government watchlists and other information to determine if passengers may pose a security risk and to assign them a risk category. Since January 2009, Secure Flight has matched passengers to two subsets of the Terrorist Screening Database—the No Fly List, composed of individuals who should be precluded from boarding an aircraft or entering the sterile area of a U.S. airport, and the Selectee List, composed of individuals who should receive enhanced screening prior to boarding an aircraft or entering an airport sterile area. The risk categories are not specifically communicated to the air carriers, but for each passenger Secure Flight provides responses to air carriers commensurate with the risk levels identified (e.g., an air carrier will receive a response of “inhibited” if the passenger was identified as being in the highest-risk category, or the boarding pass printed for a high-risk passenger will identify that passenger as a selectee for enhanced screening at the security checkpoint). In April 2011, in response to the December 25, 2009 attempted attack, TSA also began matching passengers to a third subset of the Terrorist Screening Database—the Expanded Selectee List—to designate known or suspected terrorists not otherwise included on the No Fly or Selectee Lists as selectees for enhanced screening. The Expanded Selectee List, in general, includes all records in the Terrorist Screening Database with a full name (first name and surname) and full date of birth not otherwise included on the No Fly or Selectee Lists. The Secure Flight system, which also screens passengers against the Silent Partner and Quiet Skies Lists, among others, results in passengers receiving one of four prescreening outcomes: Low risk (expedited screening). Passengers who are eligible for expedited screening, such as those with TSA Pre®, Unknown Risk (standard screening). Passengers who warrant standard screening, High Risk (enhanced screening). Passengers who receive enhanced screening such as a pat down and explosives trace detection, because they have been identified as matches to government watchlists, including the Selectee, Expanded Selectee, Silent Partner and Quiet Skies Lists, or Highest Risk (denied boarding). Passengers who are not permitted to board a commercial aircraft, such as passengers who are on the No Fly List or the Centers for Disease Control and Prevention Do Not Board List (see fig. 1). Secure Flight also randomly identifies passengers for enhanced screening. Although subject to the same screening measures as high risk passengers, they have not been determined to be high risk. Similarly, individuals included on the Silent Partner and Quiet Skies Lists have not been determined to be of high risk, but rather have been identified using rules based on current intelligence and other factors that may indicate an elevated risk. TSA leverages CBP information and targeting capabilities to create the Silent Partner List. Specifically, TSA leverages (1) data CBP collects regarding passengers traveling internationally (such as citizenship, passport country of issuance, and address information), and (2) CBP’s Automated Targeting System. CBP uses the Automated Targeting System to identify potentially high risk passengers arriving or departing the United States by comparing passenger information with law enforcement, intelligence, and other enforcement data using risk-based targeting scenarios and assessments. Analysts within TSA I&A’s Threat Analysis Division review intelligence to identify factors that may indicate elevated passenger risk. TSA works with CBP to create Silent Partner and Quiet Skies rules in the Automated Targeting System based on these factors. The system returns information on passengers who match with the rules and are scheduled to fly on U.S.- bound flights. TSA then omits any individuals on the Silent Partner cleared list (i.e. travelers exempted from further enhanced screening based on a specific rule) before placing the remaining passengers on the Silent Partner List. The Secure Flight program designates passengers who are on the Silent Partner List as selectees for enhanced screening for a particular international flight. In April 2012, TSA’s Quiet Skies List became fully operational. The Quiet Skies List is a subset of passengers on the Silent Partner List. Specifically, TSA identifies certain Silent Partner rules that warrant continued enhanced screening for passengers’ subsequent domestic or outbound travel after arriving in the United States. Passengers identified via these rules—the Quiet Skies rules—comprise the Quiet Skies List. Passengers matched to the Quiet Skies List are designated as selectees and receive enhanced screening on any subsequent domestic flights for a designated period of time, or for a designated number of flights, whichever comes first. After the designated time period has elapsed (or number of flights is flown), passengers’ names and identifying information are moved to a cleared list. Pursuant to the TSA Modernization Act, TSA I&A is to identify and review its Silent Partner and Quiet Skies screening rules, in coordination with DHS and TSA stakeholders, every 120 days and provide notification to these stakeholders no later than two days after making a change to a rule. Table 1 lists the DHS and TSA stakeholders TSA I&A must coordinate with under the Act. According to DHS and TSA officials, TSA has coordinated quarterly rule review meetings with DHS and TSA stakeholders since the inception of the Silent Partner and Quiet Skies programs. We reviewed documentation of the reviews that occurred from December 2018 through March 2019. The quarterly review meetings are called for in DHS’s Automated Rule Review SOP and its Quiet Skies Implementation Plan. Pursuant to the TSA Modernization Act, TSA I&A is to identify and review its screening rules in coordination with DHS and TSA stakeholders every 120 days—or at least three times a year. TSA I&A officials stated that they plan to continue convening four times a year because, given the difficulty of scheduling these large meetings, it will help them ensure they meet the 120 day requirement. Since October 2018, TSA I&A has also included representatives of DHS’s Traveler Redress Inquiry Program and the Federal Air Marshal Service in these quarterly review meetings, as required by the Act. Officials from these offices told us in August 2019 that they are still determining their role in the rule review process, but expect the coordination to be beneficial. DHS and TSA SOPs set forth the process for the quarterly review meetings. TSA I&A and stakeholder officials stated that the process generally happens as described in the SOP. Two weeks prior to the meeting, TSA I&A sends out materials including a list of new rules, rule changes, archived (discontinued) rules, and the rationale and links to the underlying intelligence supporting each rule change. According to TSA officials, TSA and DHS stakeholders review the rules from their particular areas of expertise. For example, TSA Chief Counsel officials reported that they review rules and the supporting intelligence to ensure that the rules meet legal sufficiency standards. A TSA Privacy official stated that they review rules and the supporting intelligence to ensure rules do not violate passengers’ rights. All stakeholders review the rules to ensure they are based on current intelligence that identify specific threats. If a stakeholder finds that there is insufficient current intelligence to support the rule, TSA I&A officials stated that they would modify it to ensure it is tailored to current intelligence or archive a rule when the intelligence- based threat is no longer relevant. For example, during the March 2019 quarterly review meeting TSA I&A officials discussed archiving a Silent Partner rule due to insufficient current intelligence to support it. According to TSA I&A officials, the rule was archived in April 2019. TSA I&A officials and stakeholders generally agreed that the quarterly reviews provide a good mechanism for oversight of both programs. Stakeholders told us these meetings provide a forum to discuss the scope of the rules and whether or not they were supported by current intelligence or if they are sufficiently specific. For example, a TSA stakeholder questioned the basis for a rule that identified a particular travel pattern as a high risk factor. As a result, TSA I&A officials reviewed the intelligence and revised the rule. TSA I&A officials stated that since enactment of the TSA Modernization Act in October 2018, they have also notified DHS and TSA stakeholders within two days of making changes to a rule. We reviewed the eight notifications that TSA I&A sent to stakeholders regarding rule changes during the period from October 2018 through May 2019. These notifications detailed changes to rules, new rules, and rules that were archived. DHS and TSA stakeholders we spoke with said that the two day notifications are helpful in keeping them informed in between quarterly meetings. In addition, stakeholders said it allowed them to proactively reach out to TSA I&A to ask questions and share more timely feedback about rule changes. TSA I&A has implemented the two day notifications and other steps required in the TSA Modernization Act, but TSA I&A’s Standard Operating Procedures have not yet been updated to reflect these changes. TSA I&A officials stated that they have plans to do so in fall 2019. TSA I&A’s standard operating procedures establish two situation- dependent processes for reviewing and approving rule changes, as shown in figure 2. First, under standard circumstances, TSA I&A’s standard operating procedures detail a four-part vetting process by which TSA I&A drafts support for the rule change and it is subsequently approved by TSA Chief Counsel, the TSA I&A Assistant Administrator, and ultimately TSA senior leadership. TSA procedures specify that in standard circumstances, all rule changes are to be supported and approved in writing prior to implementation. Specifically, TSA I&A is to draft a memo with the nature of the threat and how all components of the rule address the concerns from intelligence reporting. The memo, along with all pertinent intelligence sources, is then required to be routed through TSA Chief Counsel and TSA leadership for intelligence, legal, and policy review. TSA’s April 2012 Quiet Skies Implementation Plan specified that the Chief Counsel’s review is to ensure that the proposed rule targets the threat presented in the assessment, the assessment properly documents the reasons for the recommendation, and the recommendation is in compliance with relevant legal authorities, regulations, and DHS policies. Upon approval, the memo is referred to TSA senior leadership—the TSA Administrator or TSA Deputy Administrator—for final written approval. Following this, the rule change can be implemented. A second process, called exigent, is also briefly described in the SOPs. In exigent circumstances—circumstances requiring immediate action—the TSA I&A Assistant Administrator or his or her designee may direct that the rule be implemented immediately without a signed decision memo. The signed memo is still required, but can be drafted, reviewed, and approved after the change is implemented. TSA I&A officials stated that the exigent process entails verbal direction to implement a rule. It is unclear if TSA I&A has followed the exigent rule review process in standard circumstances because the SOP is unclear on the criteria for each process. TSA’s SOP states that the exigent review process may be used “if TSA determines that exigent circumstances require immediate implementation of a Silent Partner rule.” However, the SOP does not clarify who or which office within TSA makes this determination or what types of circumstances would be appropriately characterized as exigent. TSA I&A officials told us that exigent circumstances were very rare. They estimated that in the last 3 years exigent circumstances had occurred once. Yet, the same officials also estimated that they implemented approximately 90 percent of the rule changes following verbal approval from either TSA or I&A leadership and drafted the required memos after the fact. This indicates that TSA I&A officials have not followed the standard review process when implementing rule changes in circumstances they regard as standard, and the process followed appears to be closer to what would occur in exigent circumstances. These TSA I&A officials explained that drafting and processing the approval memo after they implement a rule change allows them to more quickly respond to changing intelligence. TSA’s SOP provides flexibility for this in exigent circumstances. However, given the absence of clarity in the SOP about when the exigent process is to be used and who is to make that decision, it is unclear whether or not TSA I&A used the exigent review process—a process which is not, initially, contingent upon TSA’s legal review or I&A’s written support—in circumstances that DHS and TSA leadership who oversee the program would regard as standard. According to Standards for Internal Control in the Federal Government, management should implement control activities through policies by, for example, documenting responsibilities in policies and periodically reviewing policies and procedures for continued relevance and effectiveness. As TSA I&A updates its Silent Partner and Quiet Skies SOPs in fall 2019, clarifying the criteria for standard and exigent rule review procedures would provide greater assurance that screening rule changes are reviewed as intended. TSA I&A officials further told us that they do not document or otherwise have a way of determining what proportion of rule changes have been reviewed in accordance with the standard process versus the exigent process because they had not identified a need to do so. According to the 2012 TSA memo establishing Quiet Skies as a permanent program, at the program’s outset a working group of DHS and TSA stakeholders identified the need for transparency as the first of seven key areas of consensus. Further, DHS’s Integrated Risk Management Framework establishes transparency and documentation as important characteristics of homeland security risk management. Documenting which review process TSA I&A uses for each rule change could improve transparency. TSA I&A monitors some operational data on its passenger screening rules. For example, TSA I&A officials track the number of individuals on the Silent Partner and Quiet Skies Lists, and the number of Silent Partner and Quiet Skies rules triggered by the passengers’ travel. TSA I&A officials stated that rule matches and list size are helpful for oversight purposes because they allow TSA I&A to monitor for Secure Flight system errors. Officials identified one example in which a Secure Flight software update created a system error that prevented 808 passengers from being moved to the Quiet Skies cleared list after a designated number of flights. According to the officials, monitoring list size and the number of rules triggered by passengers’ travel allowed them to identify and correct this error within 10 days of identifying the system error. TSA I&A has not identified a means to comprehensively measure rule effectiveness. TSA I&A officials explained that they would find it helpful to demonstrate the effectiveness of the program, but had not yet done so because it was difficult to measure. TSA I&A officials reported that the approach they have used was to count the number of Quiet Skies passengers who were later identified as a known or suspected terrorist and added to the Terrorist Screening Database. TSA I&A officials reported that in January 2019 they reviewed all Quiet Skies passengers from January 2014 through July 2018 to determine how many were subsequently added to the Terrorist Screening Database. However, because it included Quiet Skies only, this analysis excluded about 93 percent of the rules. TSA officials reported that it is not feasible to do a similar analysis for Silent Partner rules because of the higher numbers of rules and matches and the difficulty matching Silent Partner rules to data in the Terrorist Screening Database. Further, TSA officials noted that without comparable information on the rate that non-Quiet Skies passengers were added to the Terrorist Screening Database during that time period, it is difficult to interpret what the results indicate about rule effectiveness. TSA’s April 2012 Quiet Skies Implementation Plan established that TSA would continually evaluate the performance of the rules in the Silent Partner and Quiet Skies programs. Further, GAO and the Office of Management and Budget have previously identified useful practices to enhance performance management and measurement processes. GAO has previously reported that measuring performance allows organizations to track the progress they are making toward their goals and gives managers critical information on which to base decisions for improving their progress. Office of Management and Budget guidance has also focused specifically on common challenges associated with measuring effectiveness, including data availability and identifying measurable outcomes for a program. This guidance suggests using a variety of approaches such as outlining short-term milestones, identifying target outcomes, and using proxy measures to assess these programs. Assessing the effectiveness of Silent Partner and Quiet Skies rules may be difficult, but I&A could explore using other data sources to assess program effectiveness in addition to further developing their consideration of Terrorist Screening Database additions. For example, TSA I&A could consider analyzing TSA data on the outcomes of the enhanced screening of Silent Partner and Quiet Skies passengers at passenger security checkpoints. CBP officials said that they review secondary inspection results to help them assess CBP’s rules-based program. TSA I&A officials noted that they were considering this measure and would need to determine what comparison group would make sense, and if they want to focus on specific screening outcomes versus all outcomes. TSA I&A could also consider using the results of air marshals’ monitoring of Quiet Skies passengers. According to senior Federal Air Marshal Service officials, the service—with a budget of approximately $780 million for fiscal year 2019—began deploying air marshals on as many flights as possible with Quiet Skies passengers in March 2018. According to TSA’s Privacy Impact Assessment for Silent Partner and Quiet Skies and a Federal Air Marshal Service official, after air marshals complete a flight with a Quiet Skies List match, they file a report saying either “nothing to report” or, if they observe that the individual was involved in a security incident or suspicious activity, they will describe this in an after-action report. TSA I&A officials told us that while they have seen individual after-action reports, they do not review them regularly. These after-action reports are another source of information TSA I&A could consider using to gauge program effectiveness. Given the TSA resources being devoted to the enhanced screening and in-flight monitoring of many passengers matching the Silent Partner and Quiet Skies Lists, and the burden on the traveling public, it is important that TSA understand the value of its screening rules programs. Exploring additional data sources—such as checkpoint screening results and Federal Air Marshal Service after-action reports—could help TSA refine and supplement their existing efforts to measure program effectiveness. The attempted attack of December 25, 2009, highlighted the unknown threats to U.S. civil aviation. TSA has created the Silent Partner and Quiet Skies Lists to help address these unknown threats by ensuring that certain potentially higher risk passengers receive enhanced screening when traveling to, from, or within the United States. TSA created an oversight process that was further bolstered by the TSA Modernization Act, and DHS and TSA officials we met with generally regard the process as effective. However, TSA SOPs are not clear about when it is appropriate for TSA to use an expedited review process and they do not document which review process they used. The lack of clear SOPs inhibits program oversight. By establishing clear criteria for and documentation of each review process, TSA could increase transparency and ensure rule changes are reviewed as intended. Moreover, TSA has not identified a means to comprehensively measure the effectiveness of its Silent Partner and Quiet Skies rules. Exploring additional data sources—such as checkpoint screening results and Federal Air Marshal Service after-action reports—could help TSA refine and supplement their existing efforts to measure program effectiveness. We are making the following three recommendations to TSA: The Administrator of TSA should clarify the criteria for exigent circumstances and standard rule review procedures; (Recommendation 1) The Administrator of TSA should document which rule review process TSA I&A uses (exigent or standard) for each new rule or rule change; (Recommendation 2) The Administrator of TSA should explore additional data sources measuring the effectiveness of Silent Partner and Quiet Skies rules. (Recommendation 3) We provided a draft of our report to DHS for comment. In written comments, which are included in appendix I, DHS concurred with our three recommendations and described steps they plan to take to address them. DHS also provided technical comments, which we have incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees and to the Acting Secretary of Homeland Security. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix II. Appendix II: GAO Contacts and Staff Acknowledgments Error! No text of specified style in document. William Russell, (202) 512-8777 or russellw@gao.gov. In addition to the contact named above Claudia Becker, Assistant Director; Imoni Hampton, Analyst-in-Charge; Melissa Greenaway, John De Ferrari, Michele Fejfar, Eric Hauswirth, Tom Lombardi, and Kevin Reeves made key contributions to this work.", "summary": "On December 25, 2009, while on a flight from Amsterdam to Detroit, a person attempted to detonate explosives hidden in their underwear. This person was not included in the government's consolidated database of known or suspected terrorists at the time. In response, in 2010, TSA began identifying passengers who are not known or suspected terrorists, but who TSA determined should receive enhanced screening. Specifically, TSA identifies passengers for enhanced screening through the application of screening rules, which TSA develops by considering current intelligence and other factors. TSA refers to these rules and lists as Silent Partner and Quiet Skies. The TSA Modernization Act includes a provision for GAO to review the current oversight mechanisms and effectiveness of Silent Partner and Quiet Skies. This report examines the extent to which TSA has (1) coordinated with relevant DHS and TSA stakeholders to review passenger screening rules; and (2) assessed the effectiveness of these rules. GAO analyzed TSA documents, including standard operating procedures, and interviewed senior DHS and TSA officials involved in managing and overseeing the programs. The Transportation Security Administration (TSA) coordinates reviews of its intelligence-based screening rules known as Silent Partner and Quiet Skies. Specifically, TSA's Intelligence and Analysis office (I&A) coordinates quarterly rule reviews and notifies Department of Homeland Security (DHS) and TSA stakeholders of rule changes. According to stakeholders, these review processes provide a good mechanism for program oversight. TSA has established guidance for rule changes that involve TSA stakeholders reviewing rules in advance of their implementation. In some instances, TSA uses an alternate process, allowed by guidance in exigent circumstances, where rule changes go into effect before some stakeholders review them. However, agency guidance does not define the conditions for using the standard or exigent processes. Further, TSA officials do not document which review process—standard or exigent—they use for each rule change. Clarifying guidance and documenting which review process is used could improve transparency and better ensure screening rule changes are adequately reviewed. TSA tracks some data on rule implementation, but has not identified a means to comprehensively measure rule effectiveness. TSA officials explained that they had not yet fully assessed the rules' effectiveness because it was difficult to measure. Silent Partner rules identify passengers for enhanced screening on inbound flights to the United States. Quiet Skies rules—a subset of the Silent Partner rules—identify passengers for enhanced screening on subsequent domestic and outbound flights. TSA officials said that the one method they had used to assess effectiveness was to count Quiet Skies passengers who were later added to the government's watchlist of known or suspected terrorists. However, because this analysis was limited to Quiet Skies, it excluded 93 percent of the screening rules, making it difficult to interpret what the results indicate about effectiveness. TSA has access to data, such as the outcomes of enhanced screening of Silent Partner and Quiet Skies passengers, that could be explored to better assess rule effectiveness. Exploring additional data sources could help TSA refine and supplement their existing efforts to measure program effectiveness. GAO is making three recommendations. DHS should (1) clarify the criteria for exigent and standard rule review procedures; (2) document which review process is used for each new rule or rule change; and (3) explore additional data sources for measuring rule effectiveness. DHS concurred with these recommendations.", "document_type": "gao"}
{"report": "In 1992, the Prescription Drug User Fee Act (PDUFA) was enacted, in part, to provide additional funds for FDA to support the process of reviewing NDAs. PDUFA authorized FDA to collect user fees from drug sponsors to supplement its annual appropriation for salaries and expenses. PDUFA has been reauthorized every 5 years since 1992; most recently PDUFA VI reauthorized the prescription drug user fee program from fiscal year 2018 through fiscal year 2022. As part of each reauthorization process, FDA identifies goals in a commitment letter to Congress. In general, these goals identify a percentage of certain types of applications that FDA is expected to review within specified time frames, including goals for the time the agency takes to complete reviews of different types of NDAs upon initial submission and resubmission. For example, in its commitment letters for PDUFA V and VI, FDA committed to completing its initial review of 90 percent of priority NDAs that involve previously marketed or approved active ingredients within 6 months of receipt. As previously noted, four key features of NDAs are linked to drug development and review processes. For initial NDA reviews, the time frames for FDA’s review that would meet its PDUFA V and VI commitments—its PDUFA goals—vary and are linked to three key features of the NDA. (See table 1.) The target time frame for the initial review of any specific NDA under these user fee commitments reflects the goals associated with all three of the key features. The fourth key feature of NDAs is whether they qualify for one of FDA’s expedited programs. Whether designated as priority or standard, FDA may determine that NDAs for drugs intended to treat serious or life- threatening conditions qualify for development and review under one or more expedited programs. These programs confer specific benefits with the potential to help reduce the development or review time needed to bring a drug to market. For example, some expedited programs provide for more intensive drug development guidance from FDA officials or allow the applicant to submit completed sections of the NDA for review before submitting the entire application. FDA’s expedited programs include accelerated approval, breakthrough therapy designation, and fast track designation. (See table 2.) NDAs must include substantial evidence of a drug’s effectiveness, which is typically drawn from clinical trials. In traditional clinical trials, patients receiving a new drug are often compared with patients receiving a placebo or a different drug. To maximize data quality, these clinical trials are usually randomized (patients are randomly assigned to either the group receiving the new drug or a comparison group) and double-blinded (neither the patients nor the investigators know who is receiving a particular treatment). According to FDA, although this type of study design is often the most powerful tool for evaluating the safety and effectiveness of new drugs, many traditional clinical trials are becoming more costly and complex to administer. Additionally, according to FDA, many new drugs are not easily evaluated using traditional approaches. For example, drugs intended for patients with rare diseases are difficult to evaluate due to the limited number of patients affected by the disease and available for study. The Cures Act was enacted on December 13, 2016, to accelerate the discovery, development and delivery of new treatments—including drugs—for patients. Among other things, the Cures Act includes provisions for FDA to evaluate and facilitate the use of evidence from sources other than traditional clinical trials to support safety and effectiveness determinations for new drugs. For example, FDA was directed to evaluate the potential use of evidence based on data that is routinely collected outside of traditional clinical trials from sources such as electronic health records, medical claims data, and disease registries; evidence from such data sources is referred to as real-world evidence. In the commitment letter associated with PDUFA VI, which was enacted on August 18, 2017, the agency agreed to certain goals relating to the use of real-world evidence in regulatory decision-making and also agreed to certain activities intended to facilitate the development and application of an additional source of evidence known as model-informed drug development. Although these nontraditional sources of evidence were included in NDAs prior to the enactment of the Cures Act and PDUFA VI, at the time this legislation was enacted, most of them were not widely used. For example, according to FDA officials, the NDAs that included real-world evidence were generally for drugs to treat oncology diseases or rare diseases. Our analysis of the 637 original NDAs submitted from fiscal years 2014 through 2018 indicates that divisions differed in the proportions of NDAs they reviewed that had any one of three key features that are linked to time frames for initial review under FDA’s PDUFA goals. As examples: 6 percent of the NDAs reviewed by the dermatology and dental division had a priority review designation, while 56 percent of the NDAs reviewed by the anti-infective division had a priority review designation; 4 percent of the NDAs reviewed by the anesthesia, analgesia, and addiction division involved a new molecular entity, while 52 percent of the NDAs reviewed by the neurology division involved one; and None of the NDAs reviewed by the transplant and ophthalmology division involved a major amendment, while 36 percent of the applications reviewed by the gastroenterology and inborn errors division involved one. (See fig. 1. App. IV provides more detailed information about differences between divisions in the number and proportion of NDAs with these key features.) We also found differences between divisions in the proportion of NDAs that they reviewed under an expedited program—the fourth key feature of NDAs. For example, none of the NDAs reviewed by the metabolism and endocrinology division qualified for one or more expedited programs, while 52 percent of the NDAs reviewed by the antiviral division qualified for one or more expedited programs. (See fig. 2. App. V provides more detailed information about differences between divisions in the number and proportion of NDAs that qualified for one or more expedited programs.) It is not unexpected that divisions differ in the proportion of their applications with key features linked to FDA’s time frames for review or qualification for expedited programs because the divisions are responsible for different products. For example, some divisions, such as the oncology divisions, regulate products for conditions that are more likely to be serious or life-threatening, and therefore the NDAs reviewed by these divisions are more likely to qualify for priority review designation and expedited programs, compared with other divisions, such as the dermatology and dental division. Our analysis of review times for the 637 original NDAs submitted from fiscal years 2014 through 2018 shows that FDA divisions differed in the number of days they took to complete their initial reviews. For example, the median time taken to complete an initial review of an NDA by the anti- infective division was about 2 months faster than the median time taken by the gastroenterology and inborn errors division. (For more information about initial review times, see app. VI.) We found, however, that these differences in initial review times largely reflected key features of the NDAs reviewed by the divisions, particularly those features linked to FDA’s time frames for review under its PDUFA goals. We analyzed initial review times using a statistical regression with two variables reflecting key features of the NDAs—target time frame for review of the application under FDA’s PDUFA goals (in days, from FDA’s receipt of the NDA to FDA’s targeted date for completion of the initial review) and number of expedited programs (0, 1, or 2 or more)—along with division as independent variables. We found that each of these variables was a significant determinant of initial review times. Specifically, our regression analysis shows that on average The shorter the target time frame for initial review of the NDA under FDA’s PDUFA goals, the shorter the initial review, and this target time frame was responsible for the majority of variation in initial review times. The greater the number of expedited programs for which the NDA qualified, the shorter the time FDA took to complete the initial review. Controlling for the effects of these key NDA features, however, we found that most of the divisions’ average review times were similar to (within 2 weeks of) each other. In contrast, the hematology and oncology divisions reviewed applications a bit more rapidly—about 2 or 3 weeks faster—than other divisions. Figure 3 illustrates the results of our analyses. The panel on the left shows the variation in the divisions’ actual average review times. The panel on the right shows the estimated average review times, after accounting for key application features, that is, what the review times would have been if each division had reviewed equal numbers of applications with these key features. We asked FDA officials what might contribute to somewhat faster review times by the hematology and oncology divisions, and FDA officials told us that a number of variables could have contributed to these differences. For example, the officials told us that applicants differ in their level of experience, which can affect the quality of the NDA or the speed of response to FDA’s requests for information; applications differ in complexity; and the oncology and hematology divisions could differ from others in their risk/benefit considerations. As previously noted, some divisions, such as the oncology divisions, regulate products for conditions that are more likely to be serious or life-threatening compared with other divisions, such as the dermatology and dental division, and risk/benefit considerations can differ across conditions that vary in how serious or life- threatening they are. For example, the potential benefits of drugs that carry substantial risks for dangerous side effects would likely be weighed differently if the drug is intended to address a life-threatening illness for which there is no other treatment than if the drug is intended to address an illness that is not life-threatening or for which there is an alternative treatment. FDA has several initiatives underway to evaluate and facilitate FDA review divisions’ and drug sponsors’ use of evidence derived from sources other than traditional clinical trials to support NDAs. (See table 3 for a description of these different evidence sources and each initiative.) According to FDA officials, implementing these initiatives can help ensure that when drug sponsors utilize these sources of evidence in NDAs, the evidence is of sufficient quality to be used in regulatory decision-making and that there is consistency across FDA review divisions in their evaluation of the evidence. FDA officials also said that although complex innovative trial designs might replace traditional clinical trials as evidence in NDAs, real-world evidence is more likely to be used to supplement clinical trial data. Although the initiatives are not restricted to any particular type of disease or patient population, according to FDA officials, some initiatives may be more relevant for certain types of diseases or patient populations than others. For example, according to FDA officials: real-world evidence may be most relevant for diseases that have outcomes that are consistently collected in the health care system. clinical outcome assessments (one aspect of patient-focused drug development) may be most relevant for diseases that are chronic, symptomatic, or affect functioning and activities of daily living. complex innovative trial designs may be most relevant for situations in which the population size is small or limited, such as pediatric populations, or where there is an unmet medical need, such as rare diseases. Our review of FDA documentation and interviews with FDA officials show that FDA has taken steps to implement each of these five initiatives. These steps include conducting public workshops with key stakeholders, issuing guidance for industry and FDA staff, initiating pilot programs, and developing FDA staff capacity, including by providing training and other educational resources. (See table 4 for examples of key activities by initiative.) These and future planned activities—including issuing additional guidance and revising relevant FDA policies and procedures— are intended to address deliverables for FDA to accomplish through 2021 that are outlined in the Cures Act and the PDUFA VI commitment letter. According to FDA officials, the agency intends to meet these deliverables, though, according to these officials, some of the activities implemented under the initiatives, such as certain pilot programs, will likely extend beyond 2021. Although implementation is still in progress for all of the initiatives, FDA officials reported some outcomes. For example, since the launch of the model-informed drug development pilot program, the agency has received two NDA supplements that incorporated model-informed drug development concepts discussed during pilot program meetings. Additionally, officials told us there has been a recent increase in investigational new drug submissions utilizing complex innovative trial designs. FDA officials also reported an increase in biomarker submissions under the drug development tool qualification program, and continued growth of the clinical outcome assessment qualification program. FDA expects that fully implementing the initiatives will lead to further increases in the use of evidence from sources other than traditional clinical trials. We provided a draft of this report to the Department of Health and Human Services for review and comment. The department provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. To determine (1) how Food and Drug Administration (FDA) divisions differ in the proportion of new drug applications (NDA) they review with key features linked to review time goals and expedited programs and (2) how FDA review divisions differ in the time taken to complete initial reviews and the extent to which key features of NDAs contribute to those differences, we analyzed data from FDA. We also interviewed FDA officials about the data and their review processes. We obtained data regarding all NDAs submitted to FDA’s Center for Drug Evaluation and Research (CDER) from fiscal years 2014 through 2018. These data included information about features that distinguish NDAs from one another, including which division was responsible for the review. The data also included information through March 31, 2019, about the dates when FDA received and completed a review of each NDA, along with the target dates for completion of review under FDA’s goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI). To ensure meaningful analysis of review times, we excluded NDAs for which FDA had not completed an initial cycle of review. Of 686 NDAs submitted in fiscal years 2014 through 2018, the applicant withdrew 10 NDAs prior to completion of FDA’s initial review and 39 NDAs were still under FDA review as of March 31, 2019, leaving 637 NDAs for which FDA had completed an initial review. To assess the reliability of these data, we conducted a series of electronic and logic tests to identify missing data or other anomalies. These analyses were informed by our review of relevant documentation and interviews with knowledgeable FDA officials. As part of our assessment of reliability, we worked with FDA to identify and correct information about certain NDAs in a small number of instances in which we identified discrepancies. Using these methods, we determined that the remaining data were sufficiently reliable for our purposes. Unless otherwise specified, the results we present are statistically significant at the 0.05 level. To determine how FDA divisions differ in the proportion of NDAs they review with key features linked to FDA’s time frames for initial reviews and expedited programs, we conducted a series of chi-square tests comparing the distributions of the 637 NDAs with and without specific features across divisions. These key features included: whether the NDA had a priority review designation (a designation applied by FDA if the product would provide a significant therapeutic improvement in the safety and effectiveness of the prevention, diagnosis, or treatment of a serious condition when compared to available drugs) or instead had a standard designation; whether the NDA did or did not involve a new molecular entity—an active ingredient that had not previously been marketed or approved for use as a drug in the United States, whether the NDA did or did not involve a major amendment (a submission, while a pending NDA is under FDA review, of additional information that may include a major new clinical safety or efficacy study report or major new analyses of studies, among other things); and whether the NDA did or did not qualify for an expedited program (accelerated approval, breakthrough therapy designation, or fast track designation), programs intended to help reduce the time involved in developing or reviewing certain drugs that have the potential to treat serious or life-threatening conditions. (See table 5 for relevant statistics from these chi-square tests.) To determine how FDA review divisions differ in the time taken to complete initial reviews, we conducted a preliminary regression analysis of 637 NDAs with the number of days an FDA division took to complete its initial review as the dependent variable and division as a single independent variable. We defined the time to complete a review as the number of days from FDA’s receipt of the NDA to the agency’s completion of the initial review by taking regulatory action. To determine the extent to which key NDA features contributed to differences between divisions in the time taken to complete initial reviews, we conducted a multiple regression analysis of the number of days FDA took to complete its initial review with division as an independent variable, along with two other independent variables to control for the key NDA features: Target time frame for initial review of the NDA under FDA’s PDUFA goals. Three key NDA features are linked to time frames for FDA’s initial review under its PDUFA goals—whether the NDA was priority or standard, did or did not involve a new molecular entity, and did or did not involve a major amendment. To control for these three features simultaneously, we counted the number of days from FDA’s receipt of the NDA until FDA’s target date for completion of the initial review under FDA’s PDUFA goals, and used that variable—the target time frame for review under FDA’s PDUFA goals—as an independent variable. We identified five NDAs for which FDA’s review time was exceptionally long in comparison to the target time frame for review under its PDUFA goals, and we asked FDA officials about them. FDA officials stated that these reviews were substantially delayed because of complicated manufacturing site issues, complicated legal and regulatory issues, or emerging public health issues requiring last minute advisory committee meetings—conditions that we deemed sufficiently unusual to exclude these five NDAs from further statistical analyses of review times. Number of expedited programs for which the NDA qualified. Another key NDA feature is whether it qualified for one or more expedited programs, programs with the potential to help reduce the development or review time needed to bring a drug to market. We controlled for this feature by including number of expedited programs (0, 1, or 2 or more) as an independent variable in our multiple regression analysis. Thus, we tested the effect of division on initial review times for 632 NDAs while controlling for the target time frame for review under FDA’s PDUFA goals and qualification for expedited programs. (See tables 6 and 7 for relevant statistics from this multiple regression analysis.) Our multiple regression analysis allowed us to test a specific hypothesis about the effect of division on review times, namely, whether divisions differed in their review times after controlling for the key features of NDAs. This regression analysis did not test a model of review times—that is, we did not attempt to identify all variables that affect review times, nor did we seek to identify the specific set or combination of variables within our data that had maximum explanatory power. Our analyses indicated that variation remained in initial review times, even after we controlled for these variables. It is important to note that an array of factors might be expected to influence review times, including not just those factors that were captured in our analysis, but also factors such as state of the science and quality of the application. With data from 632 NDAs distributed unevenly across 15 divisions, meaningful tests of additional variables or their interactions were not possible. Nonetheless, we conducted exploratory analyses that included other potentially relevant variables in addition to the target time frame for review under FDA’s PDUFA goals, number of expedited programs, and division. In separate regression analyses, we examined (a) the fiscal year in which FDA received the NDA and (b) whether the application was a BLA, an NDA based on information from studies conducted by the applicant, or an NDA based on at least some information from studies not conducted by or for the applicant. We did not find evidence of a consistent effect of either of these additional factors on review times, but in light of the number of NDAs, we cannot exclude the possibility that one or more of these factors affects review times. In a third exploratory analysis, we examined the outcome of the initial review—(a) approval; (b) tentative approval, which FDA grants if the NDA meets requirements for approval, but cannot be approved due to a patent or exclusivity period for a listed drug; or (c) issuance of a letter to the applicant called a complete response letter, in which FDA describes the specific deficiencies the agency identified and recommends ways to make the application viable for approval. This analysis suggested that NDAs that were approved for marketing at the end of the initial cycle of review were reviewed slightly faster on average than other NDAs, but this result should be viewed with caution because a small number of NDAs with certain initial review outcomes were distributed unequally. For example, very few of the NDAs (11) reviewed through one or more expedited programs resulted in tentative approval. The Food and Drug Administration’s (FDA) Center for Drug Evaluation and Research (CDER) divisions differed in the total number of days they took to complete reviews of 637 new drug applications (NDA) submitted from fiscal years 2014 through 2018 and completed by March 31, 2019. (See fig. 4.) Importantly, these times reflect differences associated with the number of completed review cycles, FDA’s target time frames for review under its goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI), and number of expedited programs. Number of review cycles. The number of cycles of review to which the NDAs we examined were subject was largely dependent on factors that were not under FDA’s control, namely, the applicant’s actions and timing. When a cycle of review ends with an FDA action, that action can be (a) approval, which allows the applicant to market the drug, (b) tentative approval, which FDA grants if the NDA meets requirements for approval, but cannot be approved due to a patent or exclusivity period for a listed drug, or (c) issuance of a letter to the applicant called a complete response letter, in which FDA describes the specific deficiencies the agency identified and recommends ways to make the application viable for approval. The applicant may respond to either tentative approval or a complete response letter by resubmitting a revised application, triggering a new cycle of review; it is up to the applicant to decide whether to resubmit the application. In addition, NDAs that were submitted earlier in time would have a greater chance of being resubmitted and reviewed by March 31, 2019, than applications submitted later in time. The number of completed review cycles ranged from one to four cycles: 637 NDAs went through a completed first (initial) cycle review; 99 of those 637 NDAs went through a completed second cycle review; 20 of those 99 NDAs went through a completed third cycle review; 3 of those 20 NDAs went through a completed fourth cycle review. Target time frames for review. Review times reflect differences in time frames for review under FDA’s PDUFA goals. The target time frames for review ranged from less than 6 months to 15 months for the first cycle and from less than 2 months to 9 months for later cycles of review. Number of expedited programs. These review times also reflect differences associated with the number of FDA’s expedited programs for which NDAs qualified. In general, these expedited programs are designed to help reduce the development or review time needed for drugs intended to treat serious or life-threatening conditions. Two of the Food and Drug Administration’s (FDA) expedited programs for new drugs intended to treat serious or life-threatening conditions— breakthrough therapy designation and fast track designation—must be requested by the drug sponsor. These programs are intended to help reduce the development or review time needed to bring a drug to market by offering benefits such as more intensive drug development guidance from FDA officials or by allowing the applicant to submit completed sections of the NDA for review before submitting the entire application. The request is normally made while the drug sponsor is conducting clinical trials or when seeking FDA’s permission to collect clinical trial data, although the request may also be made when submitting a new drug application (NDA) or while the NDA is under review. FDA’s Center for Drug Evaluation and Research (CDER) divisions are responsible for determining whether requests qualify for these expedited programs based on evidence the drug sponsors provide in support of the requests. To qualify for breakthrough therapy designation, the drug sponsor must present preliminary clinical evidence involving one or more clinically significant endpoints that indicate that the drug may demonstrate substantial improvement over available therapies. To qualify for fast track designation, the drug sponsor must either provide evidence demonstrating the drug’s potential to address unmet need or document that the drug is designated as a qualified infectious disease product. FDA may grant or deny the request, or the drug sponsor may withdraw the request before FDA renders a decision. If FDA grants the designation, the drug sponsor may subsequently withdraw from the designation, or FDA may rescind either designation if the drug no longer meets the qualifying criteria. We obtained data regarding all requests for breakthrough therapy and fast track designations submitted to CDER from fiscal years 2013 through 2018. These data included information about which division was responsible for the review and the outcome of the request—whether it was granted or denied or whether the drug sponsor withdrew the request before FDA reached a decision. To assess the reliability of these data, we conducted a series of electronic and logic tests to identify missing data or other anomalies. These analyses were informed by our review of relevant documentation and interviews with knowledgeable FDA officials. Using these methods, we determined that the data were sufficiently reliable for our purposes. We examined these data to determine whether there were any material differences between divisions in the frequency of possible outcomes. Our analyses focused on the outcomes and did not allow us to determine whether divisions differed in their application of the stated criteria. Breakthrough therapy designation. We found few differences across divisions in the frequency of the possible outcomes of requests for breakthrough therapy designation: Of 634 requests for breakthrough therapy designation (including nine requests submitted with or after the NDA submission), 39 percent were granted, 48 percent were denied, and 13 percent were withdrawn by the drug sponsor before FDA reached a decision. Divisions differed widely in the number of requests for breakthrough therapy designation they received, from 0 for the nonprescription drug division to 102 for one of FDA’s two oncology divisions. With two exceptions, the numbers of these requests that were granted, denied, or withdrawn for each division were similar to what would be expected based on the overall frequency of the possible outcomes. Requests to the hematology division were withdrawn more frequently than requests to other divisions (32 percent) and that division denied requests less frequently (17 percent) than other divisions. The neurology division denied more (81 percent), and granted fewer (13 percent), requests for breakthrough therapy designation than other divisions. Within the time period we studied, the drug sponsor withdrew from breakthrough therapy designation after it was granted in six cases and FDA rescinded the designation in 14 cases. Fast track designation. Similarly, we found few differences across divisions in the frequency of the possible outcomes of requests for fast track designation: Of 965 requests for fast track designation (including 35 requests submitted with or after the NDA submission), 71 percent were granted, 24 percent were denied, and 5 percent were withdrawn by the drug sponsor before FDA reached a decision. Again, divisions differed widely in the number of requests for fast track designation they received, from 2 for the nonprescription drug division to 133 for the neurology division. The numbers of these requests that were granted, denied, or withdrawn for each division were generally similar to what would be expected based on the overall frequency of the possible outcomes, although the anti-infective division granted more (91 percent), and denied fewer (6 percent), requests for fast track designation than other divisions. Within the time period we studied, no drug sponsor withdrew from fast track designation after it was granted, nor did FDA rescind any such designation. Pursuant to the Prescription Drug User Fee Act (PDUFA) and its subsequent reauthorizations, the Food and Drug Administration (FDA) collects user fees from drug sponsors to supplement its annual appropriation for salaries and expenses. As part of each reauthorization process, FDA identifies goals in a commitment letter to Congress, including goals for the time the agency takes to complete reviews of different types of drug applications upon initial submission and resubmission. In general, these goals identify a percentage of certain types applications that FDA is expected to review within specified target time frames. For initial NDA reviews—reviews of the NDA as originally submitted—FDA’s target time frames for review that would meet its PDUFA goals vary and are linked to three key NDA features that reflect the drug or the applicant’s action: (1) whether or not the application receives priority review designation, which indicates that the drug could provide significant therapeutic improvements in the safety and effectiveness of the prevention, diagnosis, or treatment of a serious condition when compared to available drugs; (2) whether or not the application involves a new molecular entity—an active ingredient that has not been previously marketed or approved for use in the United States; and (3) whether or not the applicant submitted a major amendment while the NDA was pending, that is, while under FDA’s review. The target time frame for review for any specific NDA reflects all three of these features. Reviews are conducted by one of the agency’s Center for Drug Evaluation and Research (CDER) divisions, each of which specialize in a specific group of drug products, such as hematology or neurology. As shown in table 8, divisions differed in the numbers and proportions of NDAs they reviewed that had the features linked to time frames for review under FDA’s PDUFA goals. The Food and Drug Administration (FDA) may determine that NDAs for drugs intended to treat serious or life-threatening conditions qualify for one or more expedited programs. These programs confer specific benefits with the potential to help reduce the development or review time needed to bring a drug to market, for example, some expedited programs provide for more intensive drug development guidance from FDA officials or allow the applicant to submit completed sections of the NDA for review before submitting the entire application. FDA’s expedited programs include accelerated approval, breakthrough therapy designation, and fast track designation. Reviews are conducted by one of the agency’s Center for Drug Evaluation and Research (CDER) divisions, each of which specialize in a specific group of drug products, such as hematology or neurology. As shown in table 9, divisions differed in the proportions of NDAs they reviewed that qualified for expedited programs. The Food and Drug Administration’s (FDA) Center for Drug Evaluation and Research (CDER) divisions differed in the total number of days they took to complete initial reviews of new drug applications (NDA) received from fiscal years 2014 through 2018 and completed by March 31, 2019. (See fig. 5.) These review times reflect differences associated with FDA’s target time frames for initial review under its goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI). These target time frames for review are linked to specific features of the NDA and ranged from less than 6 months to 15 months for the initial review. These review times also reflect differences associated with the number of expedited programs for which NDAs qualified. John E. Dicken, (202) 512-7114 or dickenj@gao.gov. In addition to the contact named above, William Hadley (Assistant Director), Geri Redican-Bigott (Assistant Director), Aubrey Naffis (Analyst- in-Charge), and Kristen Joan Anderson made key contributions to this report. Also contributing were Sam Amrhein, Todd D. Anderson, Leia Dickerson, Kaitlin Farquharson, Rich Lipinski, and Ethiene Salgado- Rodriguez.", "summary": "Before a drug can be marketed in the United States, FDA must determine that the drug is safe and effective for its intended use through a review of evidence that a drug sponsor—the entity seeking to market the drug—submits in an NDA. The review is conducted by one of FDA's divisions (17, at the time of GAO's review) that each specialize in a specific group of drug products, such as hematology products. NDA reviews are complex, and may involve not only an initial review, but also reviews of resubmissions if the initial review does not result in approval. Under FDA's PDUFA commitments, FDA's goal is to complete reviews of 90 percent of NDAs within specific time frames linked to key features of the NDAs. GAO was asked to examine NDA review times across FDA's divisions. In this report, GAO examines (among other things) differences between FDA divisions in the key features of the NDAs they review and initial review times, as well as the extent to which key NDA features contribute to these differences. GAO analyzed data from FDA's Center for Drug Evaluation and Research regarding 637 NDAs submitted from fiscal years 2014 through 2018. These data also included biologic license applications submitted to the center. GAO excluded NDAs that were withdrawn by the applicant before FDA completed a review, as well as NDAs for which FDA had not completed a review by March 31, 2019. GAO also interviewed FDA officials about the agency's review process and these review times. The Department of Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate. Four key features of new drug applications (NDA) are linked to the time the Food and Drug Administration (FDA) takes to complete initial reviews of NDAs. Three key NDA features determine the time frames for initial review that would meet FDA's goals under the Prescription Drug User Fee Act (PDUFA) and its reauthorizations, which authorize FDA to collect user fees from drug sponsors: Whether or not the NDA qualifies for the priority review program, which is generally an expedited program for drugs that provide significant therapeutic improvements in the prevention, diagnosis, or treatment of a serious condition when compared to available drugs. The PDUFA goal for review of a priority NDA is 4 months less than for an otherwise similar standard NDA, for which the goal is to complete the review in 10 months. Whether or not the NDA involves a new molecular entity (an active ingredient that has not been previously marketed or approved in the United States). The PDUFA goal for review of an NDA with a new molecular entity is 2 months longer than for an NDA without one. Whether or not the applicant submits a major amendment (additional or new information, such as a major new clinical study) while the NDA is under review. The PDUFA goal for a review of an NDA may be extended by 3 months if the applicant submits a major amendment. The fourth key NDA feature is whether or not it qualified for one or more of three other expedited programs for drugs intended to treat serious or life-threatening conditions. GAO's analysis of 637 NDAs submitted from fiscal years 2014 through 2018 indicated that the proportion of NDAs with these key features differed among FDA review divisions. For example, 6 percent of the NDAs reviewed by the dermatology and dental division had a priority designation, compared to 56 percent for the anti-infective division. FDA has reported that some divisions, such as the oncology divisions, generally regulate products for conditions that are more likely to be serious or life-threatening, and, therefore, those products may be more likely to qualify for priority designation and other expedited programs. GAO found that FDA's divisions differed in the average number of days they took to complete an initial review of NDAs, and these differences largely reflected the key features of the NDAs they reviewed. GAO's analysis shows that the time FDA took to complete an initial review of NDAs was affected by (1) the target time frame for completion of the review under the agency's PDUFA goals, (2) the number of expedited programs for which the NDA qualified, and (3) the division performing the review. GAO also found that the target time frame for review was largely responsible for differences in initial review times. Specifically, NDAs with key features that resulted in shorter target time frames for review under FDA's PDUFA goals had shorter initial review times. Controlling for the effects of these target time frames and the number of expedited programs for which the NDA qualified, GAO found that most of the divisions' average review times were similar to (within 2 weeks of) each other.", "document_type": "gao"}
{"report": "Federal agencies are dependent on information technology (IT) systems and electronic data to carry out operations and to process, maintain, and report essential information. These systems are highly complex and dynamic, technologically diverse, and often geographically dispersed. However, the IT systems supporting federal agencies and our nation’s critical infrastructures are at risk. Information and systems are subject to serious threats that can have adverse impacts on organizational operations and assets, individuals, other organizations, and the nation. These threats can include purposeful attacks, environmental disruptions, and human/machine errors, and may result in harm to the national and economic security interests of the United States. In recognition of the growing threat, we designated information security as a government-wide high-risk area since 1997. In 2003, we expanded the information security high-risk area to include the protection of critical cyber infrastructure. We further expanded the information security high- risk area in 2015 to include protecting the privacy of personally identifiable information. Cybersecurity incidents continue to impact federal agencies, as well as entities across various critical infrastructure sectors. In fiscal year 2017, federal executive branch civilian agencies reported 35,277 incidents to the U.S. Computer Emergency Readiness Team. These incidents included web-based attacks, phishing, and the loss or theft of computing equipment. These incidents and others like them can pose a serious challenge to economic and national security and personal privacy. The following examples highlight the impact of such incidents: In January 2019, the Department of Justice (Justice) announced that it had indicted two Ukrainian men for their roles in a large-scale, international conspiracy to hack into the Securities and Exchange Commission’s computer systems and profit by trading on critical information they stole. The indictment alleges that the two hacked into the Commission’s Electronic Data Gathering, Analysis, and Retrieval system and stole thousands of files, including annual and quarterly earnings reports containing confidential, non-public, financial information, which publicly traded companies are required to disclose to the Commission. In March 2018, a joint alert from DHS and the Federal Bureau of Investigation stated that Russian government actors had been targeting the systems of multiple U.S. government entities and critical infrastructure sectors since at least March 2016. These Russian government actors had affected multiple organizations in various sectors, to include energy, nuclear, water, aviation, construction, and critical manufacturing. DHS and the Federal Bureau of Investigation characterized this activity as a multi-stage intrusion campaign by Russian government cyber actors who targeted small commercial facilities’ networks where they staged malware, conducted spear phishing, and gained remote access into energy sector networks. In June 2015, the Office of Personnel Management (OPM) reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate, but related, incident had compromised its systems and the files related to background investigations for 21.5 million individuals. In total, OPM estimated 22.1 million individuals had some form of personally identifiable information stolen, with 3.6 million being a victim of both breaches. The risks to IT systems supporting the federal government and the nation’s critical infrastructure are increasing as security threats continue to evolve and become more sophisticated. These risks include insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, steady advances in the sophistication of attack technology, and the emergence of new and more destructive attacks. Therefore, it is imperative for agency leaders and managers at all levels to manage the risks associated with the operation and use of information systems that support their missions and business functions. Cybersecurity risk management comprises a full range of activities undertaken to protect IT and data from unauthorized access and other cyber threats; maintain awareness of cyber threats; detect anomalies and incidents adversely affecting IT and data; and mitigate the impact of, respond to, and recover from incidents. Information sharing facilitates and supports all of these activities. Several federal laws, executive orders, and policies establish requirements for protecting federal systems and managing cybersecurity risks. Specifically, FISMA is intended to provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, as well as the effective oversight of information security risks. The act requires each agency to develop, document, and implement an agency- wide information security program to provide risk-based protections for the information and information systems that support the operations and assets of the agency, including those provided or managed by another entity. FISMA also assigns government-wide responsibilities to key agencies: OMB is responsible for developing and overseeing implementation of policies, principles, standards, and guidelines on information security in federal agencies, except with regard to national security systems. DHS is responsible for certain operational aspects of agencies’ information security policies and practices, including assisting OMB in fulfilling its FISMA authorities, issuing binding operational directives, monitoring agencies’ security policies and practices, and assisting them with implementation. NIST is responsible for developing standards for categorizing information and information systems, security requirements for information and systems, and guidelines for detection and handling of security incidents. More recently, the administration has re-emphasized the importance of improving agencies’ cybersecurity risk management capabilities through the issuance of an executive order. Further, OMB has issued minimum requirements, standards, and guidance to ensure federal managers are effectively managing cybersecurity risks. OMB has also issued policies for enterprise risk management (ERM), which considers all key risks that agencies face and their potential impacts on the agency’s mission. Cybersecurity risk is just one type of risk that agencies consider in their enterprise approach to risk management. Table 1 identifies the administration’s May 2017 executive order and relevant OMB publications and guidance on cybersecurity risk management. In its responsibility for certain operational aspects of agencies’ implementation of cybersecurity practices, DHS is spearheading several initiatives to assist federal agencies in protecting their computer networks and electronic information. Examples of DHS’s initiatives are described in table 2. Implementing effective cybersecurity requires any organization—whether a private sector company; a non-profit entity; or an agency at the state, local, or federal level—to identify, prioritize, and manage cyber risks across its enterprise. Risk management is a comprehensive process that requires organizations to (1) frame risk (i.e., establish the context for risk- based decisions), (2) assess risk, (3) respond to risk once determined, and (4) monitor risk on an ongoing basis using effective organizational communications and a feedback loop for continuous improvement in the risk-related activities of organizations. In accordance with its responsibilities under FISMA, as well as other laws and executive orders, NIST has developed a framework for managing risk to federal information and information assets. This framework calls for a multi-tiered approach to risk management, with activities at the information system (system), business/mission, and organization (e.g., agency) level. Cybersecurity risk management activities at the organization level provide the foundation for activities at the mission/business process and system levels, such as the selection and implementation of security controls and decisions about the operation of systems based on a determination of risk. Figure 1 illustrates an organization-wide approach to cybersecurity risk management. Guidance for federal agencies’ cybersecurity risk management processes is found in a suite of NIST special publications. Table 3 highlights key NIST cybersecurity risk management publications. OMB and NIST guidance identify practices for establishing agency-wide cybersecurity risk management programs. Among other things, these activities are intended to facilitate better communication between senior leaders and executives and system owners and operators; align agency priorities with resource allocation and prioritization at the system level; and convey acceptable limits regarding the selection and implementation of controls within the established organizational risk tolerance. Practices that provide a foundation for an agency’s cybersecurity risk management program are summarized in table 4. Establish the role of a cybersecurity risk executive: In order to ensure that cybersecurity risks are being addressed across the agency, NIST Special Publication 800-39 states that agencies should establish a cybersecurity risk executive. This can take the form of an individual or group that provides agency-wide oversight of cybersecurity risk activities and facilitates collaboration among stakeholders and consistent application of the cybersecurity risk management strategy. The cybersecurity risk executive should ensure that risk-related considerations for information systems are viewed from an agency-wide perspective regarding the strategic goals and objectives. The cybersecurity risk executive also should ensure that cybersecurity risk is managed consistently across the agency, reflects organizational risk tolerance, and is considered along with other types of risk to ensure mission/business success. Develop a cybersecurity risk management strategy: According to NIST Special Publication 800-39 and other guidance, agencies should develop a cybersecurity risk management strategy to provide a foundation for managing risk and delineate the boundaries for risk-based decisions. The strategy should describe the strategic-level decisions and considerations that senior leaders and executives are to use to manage security and privacy risks to agency operations, assets, individuals, other organizations, and the nation. The strategy should also guide and inform how security and privacy risks are framed, assessed, responded to, and monitored. The strategy should include (1) a statement of the agency’s risk tolerance, (2) how it intends to assess risk (e.g., acceptable risk assessment methodologies), (3) acceptable risk response strategies (e.g., acceptance, mitigation, avoidance), and (4) how the agency intends to monitor risk over time. Document risk-based policies: NIST Special Publication 800-37 identifies foundational activities at the agency and information system levels that should be included in policies to help prepare agencies to manage security and privacy risks. These activities should be guided by risk-based decisions. Specific elements of such risk-based policies include (1) identifying and assigning individuals with key roles for executing the risk management framework; (2) requiring an agency-wide assessment of cyber risks; (3) identifying and documenting common security controls that can be inherited by multiple information systems; (4) developing an agency-wide strategy for monitoring control effectiveness; (5) requiring system-level risk assessments to be performed and regularly updated; (6) tailoring system security controls based on risk; (7) prioritizing remedial actions to correct vulnerabilities identified in plans of action and milestones (POA&M) based on risk; and (8) using a determination of risk to make decisions about system operation and use. Conduct an agency-wide cybersecurity risk assessment: According to NIST Special Publications 800-39 and 800-37, agencies should assess cybersecurity and privacy risks and update the results on an ongoing basis. Risk assessment at the agency level is based primarily on aggregated information from system-level risk assessment results, continuous monitoring, and any relevant strategic risk considerations. The assessment is intended to help the agency consider the totality of risk derived from the operation and use of its information systems and from information exchanges and connections with other internally and externally owned systems. Such assessments may identify systemic weaknesses or deficiencies discovered in multiple information systems and assess the overall risks that these present to operations, assets, and individuals. Establish coordination between cybersecurity and enterprise risk management: ERM, as a discipline, deals with identifying, assessing, and managing risks. OMB has stated that an effective enterprise risk management program should promote a common understanding for recognizing and describing potential risks that can impact an agency’s mission and the delivery of services to the public. Such risks include strategic, market, cyber, legal, reputational, political, and a broad range of operational risks. Toward this end, OMB Circular A-123 directs agencies to implement a capability for enterprise risk management. Specifically, it encourages agencies to establish a risk management governance structure, such as a risk management council, which may be integrated with existing management structures; develop “risk profiles” that identify risks arising from mission and mission-support operations; and consider those risks as part of the annual strategic review process. Because cybersecurity is a key risk facing virtually every federal agency, it is important for coordination to exist between agencies’ ERM functions and their cybersecurity risk management programs, particularly the cybersecurity risk executive. NIST SP 800-39 states that effective risk management requires an agency’s mission/business processes to explicitly account for information security risk when making operational decisions and that cybersecurity risk information should be shared with key stakeholders throughout the organization. According to NIST, the risk executive should serve as a common risk management resource for senior leaders, mission/business owners, and other organization officials and as a focal point for communicating and sharing information security risk-related information among key stakeholders. OMB has also raised concerns that agencies’ ERM programs do not effectively identify, assess, and prioritize actions to mitigate cybersecurity risks in the context of other enterprise risks. GAO has also emphasized the importance of sharing risk information with stakeholders as part of an effective risk management program. The 23 civilian CFO Act agencies varied in the extent to which they had established key elements of their cybersecurity risk management programs. Specifically, 22 of the 23 agencies established the role of cybersecurity risk executive, and most of the 23 agencies had established policies that include elements to ensure their activities are guided by risk- based decisions. However, fewer than half of the agencies developed an agency-wide cybersecurity risk management strategy or fully established coordination with their enterprise risk management function. Figure 2 summarizes the extent to which the agencies had established these elements as of April 2019. Twenty-two of the 23 civilian CFO Act agencies established a cybersecurity risk executive to provide agency-wide oversight of cybersecurity risk activities. Agencies varied in assigning this responsibility to the chief information officer (CIO), chief information security officer (CISO), or another official or entity. For example: At the Department of Health and Human Services (HHS), the CIO serves as the risk executive for the department, and is responsible for executing the Risk Management Framework tasks outlined in NIST SP 800-37. The United States Agency for International Development (USAID) designated the CISO with responsibility for carrying out the risk executive functions for the agency. Among other things, the CISO is responsible for developing, implementing, and managing an agency- wide security authorization process and a threat awareness program. The Department of the Treasury (Treasury) assigned the function of risk executive to its department CIO Council. The council’s responsibilities include ensuring the cybersecurity program is consistent with the provisions of NIST SP 800-39; providing guidance to and oversight of the organization’s risk management program and developing the cybersecurity risk management strategy; communicating organization-wide threat, vulnerability, and risk-related information; and providing a strategic view for managing cyber risk throughout the organization. One agency, the General Services Administration (GSA), had not defined the role of its cybersecurity risk executive in its policy. Officials in GSA’s Office of the CIO stated that they had not formally designated this role because the agency’s risk executive responsibilities were shared among the CIO, CISO, authorizing officials, and other GSA officials for risk management. However, without clearly defining and documenting the responsibility for the risk executive function, the agency may lack consistent implementation and oversight of cybersecurity risk management activities and an effective agency-wide view for managing risk. Additional details on the 23 agencies’ cyber risk executive positions are provided in appendix II. Among the 23 civilian CFO Act agencies, seven had developed a cybersecurity risk management strategy that fully addressed the four elements called for in the NIST guidance. Specifically, each of the seven agencies (the Department of Commerce (Commerce), the Department of Labor (Labor), the Department of State (State), USAID, GSA, OPM, and the Social Security Administration (SSA)) had developed a strategy to guide how cybersecurity risk is to be framed, assessed, responded to, and monitored. For example, some of the strategies discussed risk tolerance in terms of thresholds based on essential mission functions and the processing of personally identifiable information or system impact levels, types of data processed, and accessibility of systems, among other factors. The strategies also included breakdowns of appropriate risk response strategies and how the agencies intended to assess and monitor risk. In addition, five of the 23 agencies (the Department of Education (Education), Environmental Protection Agency (EPA), National Science Foundation (NSF), the Department of Transportation (Transportation), and the Small Business Administration (SBA)) had partially developed cybersecurity risk management strategies, but their strategies did not address certain required elements. Specifically, while these agencies developed strategic documents, these documents did not include all of the required elements, such as a statement of risk tolerance or acceptable risk mitigation strategies. EPA officials stated that they intended to update their strategy documents to address how the agency intends to assess risk, while Education and NSF officials did not state whether they intended to update their strategy to include a statement of risk tolerance, among other missing elements. Transportation and SBA officials stated that they believed their existing strategy documents addressed all the elements; however, neither agency’s strategy included an expression of departmental risk tolerance and risk mitigation strategies. Further, Transportation’s strategy did not include a description of acceptable risk assessment methodologies. The remaining 11 agencies had not developed an agency-wide cybersecurity risk management strategy. These agencies offered a variety of reasons for not doing so. Seven agencies—the Department of Agriculture (Agriculture), Department of Energy (Energy), HHS, Department of the Interior (Interior), Treasury, the National Aeronautics and Space Administration (NASA), and the Nuclear Regulatory Commission (NRC)—acknowledged that they had not developed a cybersecurity risk management strategy that includes the key elements. According to agency officials, this was due to the federated nature of the agency or difficulty in establishing an agency-wide understanding of risk tolerance, among other factors. Further, these agencies stated that they intended to develop such a strategy or were considering doing so. The other four agencies—DHS, the Department of Housing and Urban Development (HUD), Department of Justice (Justice), and Department of Veterans Affairs (VA)—stated that they believed their existing documents and policies constituted a risk management strategy. However, we determined that these documents did not constitute an integrated strategy that addressed key elements such as risk tolerance and risk mitigation strategies. Without a comprehensive risk management strategy, the agencies may lack an organization-wide understanding of acceptable risk levels and appropriate risk response strategies to protect their systems and data. Additional details regarding the 23 agencies’ establishment of cybersecurity risk management strategies are discussed in appendix III. Most of the 23 agencies had established policies that include elements to ensure their activities are guided by risk-based decisions. However, many agencies had gaps in one or more of these areas. Specifically, six agencies (DHS, Education, Justice, Treasury, NSF, and SSA) addressed all of these areas in their policies and procedures, while the remaining 17 agencies had not addressed at least one area. Table 5 discusses, for each of these elements, which of the 23 agencies had addressed it in their policies. Eleven agencies—Agriculture, Commerce, Energy, HHS, Interior, Labor, EPA, GSA, NASA, NRC, and OPM—generally agreed that their policies lacked identified elements and either stated that they intended to update policies to include them or would consider doing so. The remaining six agencies—HUD, State, Transportation, VA, USAID, and SBA—stated that they believed their policies addressed these elements or that they carried out these activities in practice, but did not provide documentation of policies that addressed them. Without ensuring that their policies include all key risk management activities, the agencies may not be taking the foundational steps needed to effectively identify and prioritize activities to mitigate cybersecurity risks that could result in the loss of sensitive data or compromise of agency systems. Additional details on the agencies’ risk management policies are provided in appendix IV. Twelve of the 23 civilian CFO Act agencies had developed a process or mechanism for conducting an agency-wide cybersecurity risk assessment. Specifically, these agencies (Agriculture, Education, Energy, DHS, HUD, Interior, Justice, Labor, State, Transportation, NSF, and SSA) had developed processes for aggregating system-level data and analyzing them to assess overall cybersecurity risk to agency operations and assets. For example, these 12 agencies developed scorecards or dashboards that provided agency-wide views of key indicators aggregated from system-level information and risk scores for agency components. Officials from seven of these agencies described how these assessments enable them to make enterprise-wide decisions on prioritizing and remediating risks. The remaining 11 agencies (Commerce, GSA, HHS, NASA, NRC, Treasury, VA, EPA, OPM, SBA, and USAID) offered a variety of reasons for why they did not develop a process for assessing cybersecurity risks at the agency level. Five agencies stated that they were still working to develop or acquire tools that will allow them to aggregate system-level data, and three of these noted that they expected further implementation of DHS’s CDM initiative to provide this capability. The other six agencies stated that they did conduct such an assessment in practice, but did not provide sufficient documentation of the process they use. Without a means of aggregating and assessing cybersecurity risks arising from their information systems to the organizational level, these 11 agencies may be missing opportunities to identify trends or prioritize investments in cybersecurity risk mitigation activities in order to target widespread or systemic risks to the systems and organization. Additional details of agencies’ processes for conducting organization-wide cyber risk assessments are contained in appendix V. Ten of the 23 civilian CFO Act agencies provided evidence of having a fully established process for coordination between their cybersecurity risk executive and the entity responsible for overall ERM functions. Five agencies provided evidence of a partially established process, and eight could not provide evidence of such a process. The ten agencies with fully established processes included this coordination as part of their defined and documented ERM governance structure and process. The agencies took steps to ensure such coordination in a variety of ways. For example, eight agencies, including Education and USAID, established a specific body, such as a risk management council, with responsibility for ERM. These agencies included their cybersecurity risk executive in the council’s membership in order to facilitate coordination. Other agencies, such as the National Science Foundation, ensured coordination through regular reporting or briefings between their cybersecurity risk executive and their ERM governance structure. In addition, five agencies partially established an approach to coordination in this area. These agencies provided some evidence of coordination activities, but had not formally defined or documented this coordination as part of their ERM structure or process. Specifically, four of these agencies (Justice, the Department of Transportation (Transportation), the Environmental Protection Agency (EPA), and the Social Security Administration (SSA)), provided evidence of occasional coordination between their cybersecurity risk executive and officials responsible for ERM. However, they did not fully define and document their ERM governance structures and processes, including how coordination with the cybersecurity risk executive was to take place. One agency—GSA—had not formally documented the position or responsibilities of the cybersecurity risk executive in its policy. Thus, the agency could not show that the risk executive was involved in ERM activities, although the agency board responsible for ERM does include the agency CIO as a co-chair. Although they did not provide evidence of a fully documented process, officials from these five agencies stated that they perform this coordination in practice. However, documenting these processes would help ensure a consistent, rather than ad-hoc, approach to communication and coordination. Lastly, eight agencies had not established an approach to coordination in this area. In particular, these agencies (Agriculture, HHS, Interior, VA, DHS, State, Treasury, and NRC) either did not have an ERM governance structure and/or did not provide evidence of a process for coordination between their ERM governance structure and their cybersecurity risk executive. Officials from two of these agencies stated that they were still in the process of formalizing their approach to ERM, while the other six stated that such coordination occurs, even if processes may not be fully documented. However, as noted previously, documenting these processes would help ensure a consistent, rather than ad-hoc, approach to communication and coordination. Without regular coordination between the cybersecurity risk executive and broader ERM entity, senior leadership responsible for ERM may not be fully aware of significant cybersecurity risks and, thus, may not be positioned to address them in the context of other risks and their potential impacts on the mission of the agency. Additional details on agencies’ coordination processes are provided in appendix VI. Officials responsible for cybersecurity risk management at a majority of the 23 civilian CFO Act agencies reported eight challenges in establishing and implementing cybersecurity risk management programs. Most commonly cited were challenges related to hiring and retaining qualified personnel, competing priorities between cybersecurity and agency mission or operations, and establishing and implementing consistent cybersecurity risk management policies and procedures. Figure 3 shows the challenges identified and the number of agencies reporting each challenge. All of the 23 civilian CFO Act agencies reported hiring and retaining personnel to fill key cybersecurity risk management positions as a challenge in establishing a cybersecurity risk management program. In particular, six agencies cited the lengthy federal hiring process, and 14 noted the difficulty in competing with private-sector companies in salary and other benefits. Further, 11 agencies noted that there is a shortfall in candidates with the skills needed for cybersecurity risk management. For example: NASA’s Chief Cyber Risk Officer noted that cybersecurity risk management is a multi-disciplinary field that blends technical cyber expertise with project management principles and a business-focused management background. This official stated that it is difficult to find talent that possesses this multi-disciplinary experience, in part, because current government marketing for cybersecurity skill sets advertise for purely technical skills. The official added that, currently, the government lacks clearly defined roles for cyber risk management as a dedicated job function. HUD’s CIO saw this challenge as part of a larger shortfall of this highly in-demand resource and noted that HUD must compete with tech giants and Silicon Valley startups for qualified personnel. The official stated that the executive order providing direct hiring authorities for cybersecurity positions provides assistance, though the department still needs to be creative in enhancing retention and recruitment efforts through bonuses and other incentives. A key to having a successful cybersecurity program is having a well- trained, highly qualified workforce that is versed in identifying cyber threats and recognizes steps to take once confronted with them. Our work has identified difficulties in recruiting and retaining qualified cybersecurity professionals as a continuing challenge. If agencies are unable to hire and retain qualified cybersecurity risk management personnel, they will be hindered in establishing effective programs for cybersecurity risk management. Nineteen of the 23 civilian CFO Act agencies reported competing priorities between agency mission operations and cybersecurity as a challenge. In particular, 12 agencies noted that cybersecurity requirements are sometimes perceived as impeding mission activities, such as deploying systems, sharing information, or providing public services. In addition, four agencies highlighted the competition for limited resources between cybersecurity risk management activities and operational or mission needs. For example: HHS’s Acting Deputy CISO stated that, due to the federated nature of the agency and the broad spectrum of its missions and business functions, there is often a disconnect between security and operational personnel. As an example, the official stated that Operating Divisions that are research or academics focused will require increased information sharing and flexibility, but this often conflicts with cybersecurity concepts and processes. Interior’s Deputy CIO stated that the need to balance mission priorities with those related to cybersecurity risk management leads to fiscal and operational challenges when making investment, architectural, and operational decisions. NIST emphasizes determining the relative importance of the mission/business functions in order to make the appropriate level of risk management investment. If agencies are unable to establish priorities among cybersecurity and operational needs, they may be challenged in allocating resources appropriately to ensure their systems and information are appropriately secured. Eighteen of the 23 civilian CFO Act agencies reported challenges in establishing and implementing consistent cybersecurity risk management policies and procedures across the organization. Eight agencies cited challenges in this area arising from the difficulty in ensuring consistency across a federated or decentralized organization, while other factors included training staff and making them aware of policies, and the need to integrate cybersecurity policies with missions and operations. For example: EPA’s CISO related that challenges in consistent implementation of policies and procedures include the need to train individuals involved in the risk management process, address different views of risk appetite within the agency, and deal with varying perspectives on the importance of cybersecurity, among other things. OPM’s Deputy CISO highlighted that frequent changes in the agency’s leadership (e.g., having eight CIOs since 2012) had led to challenges with the agency’s ability to implement consistent policies in an ongoing, streamlined manner. As we have previously reported, CIOs and former agency IT executives believed it was necessary for a CIO to stay in office for 3 to 5 years to be effective and 5 to 7 years to fully implement major change initiatives in large public sector organizations. In addition, the Deputy CISO stated that the establishment and implementation of cybersecurity risk management policies and procedures has been viewed as a secondary responsibility, to be accomplished when more pressing and immediate operational concerns do not need attention. NIST has emphasized the importance of a consistent approach in order for cybersecurity risk management to succeed at all levels of an agency. If agencies are unable to establish consistent cybersecurity risk management policies and procedures, they may not be able to effectively prioritize and implement security and privacy activities to protect their most critical assets and systems. Eighteen of the 23 civilian CFO Act agencies reported challenges in establishing and implementing standardized IT capabilities across the organization. Eleven of these agencies noted that decentralized or federated organizations create difficulty in implementing standardized, agency-wide tools and solutions to manage cybersecurity risks. In addition, four agencies cited issues with legacy systems, which may not always be compatible with capabilities intended to be used agency wide. For example: The Department of Commerce’s (Commerce) Deputy CISO stated that, because Commerce is a largely federated agency, with each bureau operating and maintaining its own environment, managing a truly enterprise solution is challenging in numerous areas. For example, the official stated that the department cannot control access at bureaus due to disconnected networks, different security offices and policies, and even different logical access policies. The official added that a change in governance and thinking toward common enterprise tools and solutions requires a shift in management and thinking across the department and its bureaus. Energy’s Acting Deputy CIO for Cybersecurity stated that the department is working, to the degree possible, to implement enterprise solutions for cybersecurity and continuous monitoring; however, because the enterprise is comprised of laboratories and sites with very diverse mission sets, doing so is always challenging. This official added that the department has embraced the DHS CDM initiative, which will be leveraged to standardize some IT cybersecurity capabilities, but it does not have a single standardized solution across the enterprise. OMB recently noted that an agency’s ability to mitigate security vulnerabilities becomes more complex in federated agencies, where there are not standardized procedures or technology across the organization. The challenges in implementing standardized IT capabilities may hinder these agencies in applying a consistent level of protection to their systems and data. Eighteen of the 23 civilian CFO Act agencies reported that they had experienced challenges in receiving quality data (e.g., accurate, timely information on threats and vulnerabilities). Twelve of these agencies expressed challenges in receiving data from all parts of their agencies or stated that they relied on manual reporting from their components, which did not provide real-time visibility into risks. In addition, six agencies cited difficulties in combining data from disparate sources into an agency-wide view of risk. For example: DHS’s Acting Director of Governance and Executive Management noted that the department’s management currently depends on its components to submit timely and accurate information on cybersecurity vulnerabilities instead of having real-time, centralized reporting of data. The official added that DHS expects to address this challenge through implementation of CDM centralized reporting to the DHS Dashboard on a near real-time basis and other tools and processes for enterprise data collection. State’s Enterprise Risk Officer for Cybersecurity reported that threat information is difficult to gather with the specificity needed to make strategic decisions. The official added that, with regard to vulnerability data, sufficient data exist and are gathered on a regular basis; however, it is difficult in a large global enterprise to prioritize actions without credible information on the likelihood of a threat or its impact on the agency’s mission. NIST emphasizes that risk monitoring tools, techniques, and procedures can increase risk awareness and help senior leaders develop a better understanding of the ongoing risk to organizational operations and assets. If the agencies are unable to consistently receive quality, timely data from their entire organizations, they will continue to be challenged in making effective decisions to address organization-wide cybersecurity risks. Sixteen of 23 civilian CFO Act agencies reported the lack of sufficiency, clarity, or usefulness of NIST and/or OMB guidance for cybersecurity risk management as a challenge. Six agencies stated that there was a lack of practical instruction to assist agencies in implementing guidance. Six agencies also stated that various guidance documents are not always consistent or easy to understand. Six agencies also expressed a need for guidance to address new technologies or emerging areas such as the use of cloud providers or establishing cybersecurity risk management programs at all levels of an organization. For example: HHS’s Acting Deputy CISO stated that, for all the positive aspects of the NIST guidance, there is a lack of a centralized document or road map that ties all the documents together from a cybersecurity standpoint. Also, the official stated that the guidance from NIST provides limited direction for producing specific metrics and checklists in support of laws, policies, directives, instructions, and standards. Transportation’s CISO stated that current guidance does not always provide agencies with practical ways to implement requirements. For example, the official noted that current OMB guidance on cyber and privacy risk management does not tell agencies how to practically integrate these disciplines, and that frequent updates to NIST guidance that agencies have to respond to might be better applied to identifying practical implementations. The official added that a lack of practical implementation guidance may lead to duplication of effort and inconsistency of outcomes. OMB and NIST play important roles in issuing policies, standards, and guidelines for agencies’ cybersecurity risk management programs. However, if agencies find guidance unclear or insufficient, they will be challenged in implementing key cybersecurity risk management requirements. Fifteen of the 23 CFO Act agencies reported challenges in developing an agency-wide cybersecurity risk management strategy that includes a statement of risk tolerance and how the agency will assess, respond to, and monitor risks. Ten agencies stated that they faced challenges in establishing an agency-wide risk tolerance statement, while five noted that they faced challenges in implementing a strategy across the agency. For example: Education’s Audit Liaison Officer from its Office of the CIO noted that it was a challenge to develop an enterprise-level statement of risk tolerance and that currently risk tolerance decisions were made at the system level by the authorizing official. EPA’s CISO reported that it was challenge to establish an agency- wide statement of risk tolerance. This is because it was difficult to determine such factors as how much the mission’s operation is worth, how much information resources are worth, and how much negative public perception of the agency costs in terms of money or resources. NIST notes that framing risk through the creation of a cybersecurity risk management strategy establishes a foundation for managing risk and delineates the boundaries for risk-based decisions within an agency. If agencies are challenged in developing cybersecurity risk management strategies, they may be hindered in making consistent decisions for identifying, assessing, and responding to cybersecurity risks. Fourteen of the 23 civilian CFO Act agencies reported that incorporating cyber risks into the enterprise risk management process was a challenge. Nine of these agencies noted challenges related to coordination between cybersecurity and ERM, such as establishing effective channels of communication or developing vocabularies for discussing risk that were understandable by all stakeholders. In addition, five agencies noted that their ERM process was still maturing. For example: GSA’s Associate Chief Information Officer for Enterprise Planning & Governance stated that a process was implemented to assess cyber risks as part of the formalized ERM process; however, this official noted that additional work is still needed to align and incorporate other regular cybersecurity risk management reporting processes and communication channels into the broader ERM framework. Treasury’s Enterprise Cybersecurity Risk Management Officer stated that incorporating cyber risks into ERM is a challenge because cybersecurity risk is not currently quantified in the same way as other risks. The official expressed the need for a standard vocabulary for discussing cyber alongside other risks, adding that this makes it very challenging to integrate cybersecurity risk management into ERM. OMB has stated that an effective enterprise risk management program promotes a common understanding for recognizing and describing potential risks that can impact an agency’s mission and the delivery of services to the public. Such risks include strategic, market, cyber, legal, reputational, political, and a broad range of operational risks. If agencies do not successfully integrate cyber risks into their ERM processes, they may be hindered in making effective decisions about addressing cybersecurity risks in the context of other risks and their potential impact on agency missions. In accordance with a recent executive order, OMB and DHS took steps to assess agencies’ cybersecurity management capabilities. They also identified core actions to be taken, in coordination with agencies, to address cybersecurity risks across the executive branch. Accordingly, OMB and DHS have several initiatives under way to address these risks, and several of these initiatives should help address some of the challenges in establishing cybersecurity risk management programs that the agencies in our review identified. However, these initiatives do not address other challenges identified by a majority of the agencies. EO 13800 on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure emphasizes the importance of reducing cybersecurity risks while also providing exceptional service to the public. The EO aligns with FISMA by holding agency heads accountable for managing cybersecurity risks. Toward this end, it directed agency heads to provide a risk management report to OMB and DHS that documented the agency’s risk mitigation and acceptance choices as of May 2017 and describe the agency’s action plan to implement the NIST cybersecurity framework. The EO required OMB and DHS to assess each agency’s risk management report and OMB, in coordination with DHS, to develop and deliver a risk determination report to the President on whether the risk mitigation and acceptance choices set forth in the agencies’ reports were appropriate and sufficient to manage the cybersecurity risk to the executive branch as a whole. OMB’s and DHS’s report was also to include an action plan to, among other things, adequately protect the executive branch, should the risk determination identify insufficiencies in agencies’ risk mitigation and acceptance choices; establish a regular process to reassess and, if appropriate, reissue the determination and address future recurring and unmet budgetary needs necessary to manage risk to the executive branch; and if appropriate, clarify, reconcile, and reissue policies, standards, and guidelines issued in furtherance of FISMA and the EO, and align them with the NIST cybersecurity framework. In May 2017, OMB issued guidance to agencies for implementing the provisions in EO 13800 on managing cybersecurity risks. This guidance required agencies to, among other things, report on their cybersecurity risk management capabilities using the metrics established for monitoring FISMA implementation. OMB and DHS used the results of the agencies’ risk management reports and responses to the FISMA reporting metrics to assess agencies’ capabilities and make risk determinations of agencies’ performance (“high risk,” “at risk,” or “managing risk”). OMB and DHS’s process included an assessment of 96 agencies across the executive branch, including the 23 civilian CFO Act agencies in the scope of our review. In May 2018, OMB published the Federal Cybersecurity Risk Determination Report and Action Plan, in which OMB and DHS determined that 74 percent of the federal agencies participating in the risk assessment process had cybersecurity programs that were either “at risk” or “high risk.” The report identified four key findings and actions necessary to address cybersecurity risks across the federal enterprise, as summarized in table 6. The report also described OMB’s plans to work with DHS and other federal entities to implement these actions and reduce cybersecurity risks across the government. OMB and DHS also established a process for reassessing and, if necessary, reissuing the agency risk determinations. Specifically, OMB and DHS use the metrics collected during the FISMA reporting process to update each agency’s risk management assessment on an ongoing basis. At a minimum, CFO Act agencies must update their metrics quarterly. The quarterly risk management assessment process allows for the monitoring of agency-level risks, and OMB issues guidance yearly codifying this process. In addition, OMB staff stated that they plan to incorporate the overall risk determination into the office’s annual FISMA report to Congress, although they noted that this is subject to change. Further, OMB and DHS took steps to align government-wide cybersecurity guidance with the NIST cybersecurity framework. For example, OMB and DHS, in coordination with the federal cybersecurity community, updated the reporting guidance on CIO and Inspector General FISMA metrics to align with the framework. The FISMA metrics leverage the framework as a standard for managing and reducing cybersecurity risks, and the metrics are aligned with the five main functions of the framework to provide agencies with a comprehensive structure for making more informed, risk-based decisions, managing cybersecurity risks across their enterprise, and providing a view of agencies’ capabilities and potential gaps. OMB and DHS have several initiatives under way—some of them also outlined in OMB’s federal cybersecurity report—that can assist agencies in meeting challenges related to hiring and retaining cybersecurity risk management personnel, establishing standardized IT capabilities, receiving quality data, and using NIST and OMB guidance. Workforce education initiatives: In November 2018, OMB announced the launch of the Federal Cyber Reskilling Academy pilot program, which is being sponsored by the CIO Council. This program offers current federal employees who do not work in the IT field the opportunity for hands-on training in cybersecurity for 3 months to help them build foundational skills in cyber defense analysis. In addition, the National Initiative for Cybersecurity Careers and Studies is an online resource for cybersecurity training managed by DHS that connects government employees, students, educators, and industry with cybersecurity training providers throughout the nation. The initiative’s Federal Virtual Training Environment, for example, is an on-demand cybersecurity training system that contains more than 800 hours of training on a variety of topics, including risk management. These initiatives, if effectively implemented, could help address challenges agencies identified in hiring and retaining cybersecurity risk management personnel. Specifically, the Cyber Reskilling Academy has the potential to increase the pool of federal employees with skills that agencies need for cyber risk management. In addition, the Federal Virtual Training Environment can enhance federal employees’ knowledge of and skills in cybersecurity risk management. Continuous Diagnostics and Monitoring (CDM): DHS’s CDM initiative is to provide federal agencies with tools and services that have the intended capability to automate network monitoring, correlate and analyze security-related information, and enhance risk- based decision making at agency and government-wide levels. These tools include sensors that perform automated scans or searches for known cyber vulnerabilities, the results of which can feed into a dashboard that, at an agency level, is intended to alert network managers and enable the agency to allocate resources based on the risk. Summary data from each participating agency’s dashboard is expected to be transmitted to the Federal Dashboard, where the data can be used to inform decisions about cybersecurity risks across the federal government. A DHS CDM program official stated that the department plans to continue to deploy capabilities in fiscal year 2019 for asset management, identity and access management, and monitoring network controls and activity. The CDM initiative, if effectively implemented, has the potential to assist in addressing challenges agencies identified in establishing standardized IT capabilities for cybersecurity risk management and improving the quality of data to provide visibility into cyber risks. In particular, the tools and services offered through the program can provide agencies with standardized capabilities for collecting and analyzing cyber risk information. In addition, automated network monitoring and analysis can help agencies that currently must manually collect data from components based on self-reporting. Such data may be less timely and accurate than those collected through the tools available through CDM. Security operations center (SOC) consolidation and maturation: A SOC defends an organization against unauthorized activity within computer networks, including, at a minimum, detecting, monitoring, and analyzing suspicious activity. According to OMB, CISOs report that these centers do not communicate with each other and that they hoard, rather than share, threat information and intelligence. SOC consolidation focuses on centralizing information sharing across the agency, which is intended to improve the data agencies receive to provide visibility into cybersecurity risks. OMB and DHS are working with agencies to assess and enhance the maturity of their SOCs and streamline security operations across their enterprise. Specifically, agencies are required to develop and submit a Cybersecurity operations maturation plan to OMB and DHS by April 2019. Following submission of the plan, agencies are then required to complete SOC maturation, consolidation, or migration to a SOC-as-a-Service provider by September 2020. Similar to CDM, SOC consolidation and maturation initiatives may help address challenges related to standardizing capabilities and collecting quality data, while enhancing enterprise-wide visibility. Consolidation can provide agencies with a standardized set of SOC services, while maturation can increase the quality of data on risks by establishing a baseline set of expected SOC capabilities for executive branch agencies. Cyber threat framework: OMB and DHS are developing and disseminating a framework, working with the Department of Defense, Office of the Director of National Intelligence, and the National Security Agency, to enable consistent characterization and categorization of cyber threat events. Specifically, the Cyber Threat Framework provides a hierarchical, structured, transparent, and repeatable methodology for characterizing adversarial activities in a standardized way across the federal government. The framework and the related methodology provide for a cybersecurity architecture review that allows an agency to assess its cyber capabilities against its actual threat environment. This includes a gap analysis to determine where agencies may need to enhance their capabilities to defend against key threats. To foster the adoption of the Cyber Threat Framework across the government, DHS—in coordination with OMB and the Department of Defense—intends to develop and implement a solution that will be available for agencies to use by the end of December 2019. The Cyber Threat Framework, if effectively implemented by civilian federal agencies, can also help address agency challenges related to the quality of data about cyber risks. By providing a standardized framework for understanding cyber threats, it is intended to assist agencies to better identify and prioritize risks, as well as the gaps in their capabilities for protecting against such threats. Inter-agency cyber-focused working groups: In coordination with DHS, OMB established CyberStat review sessions to assist agencies in protecting their systems, networks, and data. Specifically, agency cyber professionals, from the working level to the CIO, meet with DHS subject matter experts to participate in working sessions throughout a 4- to 6-week period to overcome barriers to success in specific cybersecurity programs. During a CyberStat review, DHS provides agencies with guidance on best practices and connects them with other subject matter experts who can provide advice on implementing the NIST framework and cybersecurity risk management practices. In addition, the federal CIO Council has recently issued the CISO Handbook, which was created to educate and inform new and existing CISOs about their role in federal cybersecurity. The council is the principal interagency forum for improving agency practices related to the use, sharing, and performance of federal information resources and part of its governing principles are to adopt and share IT management best practices and to manage risk and ensure privacy and security. Within the CIO Council, the CISO Council is specifically tasked with developing IT security policy and sharing best practices to improve the cybersecurity posture of the United States. Among other things, the CISO Handbook includes information on NIST’s cybersecurity framework and how it can be leveraged in conjunction with other NIST risk management publications. CyberStat reviews and the federal CIO Council can provide channels to help agencies in better understanding and implementing guidance from NIST and OMB on cybersecurity risk management. By connecting agencies with best practices and subject matter experts, CyberStat sessions are intended to help agencies, for example, apply the NIST framework and cyber risk management practices. In addition, the CIO Council, through sharing of best practices and issuing publications, can provide guidance on how to more effectively implement federal cybersecurity risk management guidance. Although the initiatives under way could address challenges related to hiring and retaining cybersecurity risk management personnel, developing standardized capabilities, acquiring quality data about cyber risks, and using NIST and OMB guidance, the existing initiatives do not address challenges related to managing competing priorities, establishing consistent policies and procedures, incorporating cyber risks into enterprise risk management, and developing an agency-wide strategy for managing cybersecurity risks. Managing competing priorities between cybersecurity and operations: OMB staff stated that its newly developed risk-based budgeting model could help agencies prioritize their cybersecurity investments. This model is intended to tie agencies’ cybersecurity spending to the FISMA metrics process in order to identify capability and process gaps that pose risks to an agency. OMB plans to disseminate the risk-based budgeting process to enable agency CIOs, CISOs, and Chief Financial Officers to communicate cyber risks effectively across their agencies and to budget strategically for cyber capabilities that address the agency’s most critical cybersecurity needs. OMB anticipates being able to provide agencies with additional details surrounding this model in the cybersecurity section of its upcoming fiscal year 2020 guidance to the President’s budget. However, while this risk-based approach to cybersecurity budgeting should help agencies prioritize their cybersecurity investments, it does not address issues related to prioritizing between cybersecurity and mission or operational needs. The agencies in our review highlighted that mission or operational priorities can conflict with cybersecurity requirements when, for example, components within an agency have differing views about the relative importance of mission and cybersecurity activities. These issues do not relate to prioritizing investments in cybersecurity but to managing conflicts, or potential conflicts, between cybersecurity and mission needs. Implementing consistent cybersecurity risk management policies and procedures: OMB staff stated that several of OMB’s and DHS’s initiatives emphasize driving performance through centralized visibility, authority, and reporting. For example, OMB staff stated CDM is intended to establish agencies’ visibility across the enterprise, as well as government-wide visibility. OMB staff stated the implementation of provisions commonly referred to as the Federal Information Technology Acquisition Reform Act is intended to enhance the role and authority of agency CIOs, particularly with respect to relationships with agency components and accountability for IT costs, performance, and security. Additionally, OMB staff stated the risk management assessment process established in response to EO 13800 emphasizes centralized visibility, authority, and reporting. While these efforts could provide increased visibility and CIO authority, they do not address factors identified by agencies that affected their ability to implement consistent cybersecurity risk management policies and procedures. These include differing views among staff regarding the importance of risks, and frequent changes in leadership, all of which, according to agencies, make consistency difficult to achieve. Incorporating cyber risks into ERM: While existing OMB guidance requires agencies to establish ERM programs and NIST guidance requires agencies to establish cybersecurity risk management programs, this guidance does not address how these efforts should be integrated or coordinated. For example, OMB A-123 outlines agencies’ responsibilities for establishing an ERM capability but does not specifically address how enterprise risk management should incorporate cyber risks. In addition, NIST guidance on cybersecurity risk management recognizes that cybersecurity can be an important component of an organization’s overall risk management and states that its information security risk management guidance should be used as part of a more comprehensive ERM program. However, it does not explicitly discuss how to integrate or coordinate cybersecurity risk management and enterprise risk management. Establishing a cybersecurity risk management strategy: OMB noted that the cyber threat framework will provide a more tangible way for agencies to identify and prioritize cyber risks. However, while this framework will allow agencies to better identify and categorize threats and the capabilities needed to counter them, it does not address key aspects of risk framing such as establishing an agency-wide statement of risk tolerance and acceptable risk mitigation strategies. Several agencies noted that they struggled to define risk tolerance and establish criteria for different risk responses that could provide a consistent, agency-wide approach to risk management. Without additional guidance or other processes to identify successful approaches for addressing these challenges, agencies will continue to be hindered in establishing programs for effectively managing their cybersecurity risks. Given the increasing number and sophistication of cyber threats facing federal agencies, it is critical that agencies are well positioned to make consistent, informed risk-based decisions in protecting their systems and information against these threats. While all the agencies in our review have taken steps to establish cybersecurity risk management programs, they have not fully addressed key practices that are foundational to effectively managing cybersecurity risks. In particular, without developing an agency-wide cybersecurity risk management strategy, agencies may lack a consistent approach to managing cybersecurity risks. In addition, while agencies have documented policies and procedures that include many key practices, gaps remain that may hinder their ability to ensure a consistent implementation of risk-based practices. Further, without a process for an agency-wide cybersecurity risk assessment, agencies may be missing opportunities to identify risks that affect their entire organization, and to implement solutions to address them. Finally, establishing processes for coordinating cybersecurity risk information with the entity responsible for enterprise risk management would help ensure that cyber risks are being considered by senior leadership in the context of other risks facing the agency. This inconsistent establishment of cybersecurity risk management practices can be partially attributed to challenges agencies identified in establishing and implementing their cybersecurity risk management programs. Specifically, agencies noted a variety of challenges such as hiring qualified staff, competing priorities between cybersecurity and mission needs, implementing consistent policies and procedures, incorporating cyber risks into enterprise risk management processes, and developing a cybersecurity risk management strategy. Addressing these challenges will be an important step toward establishing more effective cybersecurity risk management programs across the 23 agencies. OMB and DHS have taken steps to carry out their responsibilities to identify and address weaknesses across the executive branch, including actions that would address many of the challenges identified by agencies. However, without fully addressing challenges related to prioritization between cybersecurity needs and mission priorities, implementing consistent risk management policies and procedures, incorporating cyber risks into enterprise risk management, and establishing a cybersecurity risk management strategy, OMB and DHS are likely to be missing opportunities to assist agencies in these key areas. Clarified or updated guidance, along with sharing successful practices or lessons learned, could help agencies more fully establish their cybersecurity risk management capacity. We are making the following recommendation to OMB: The Director of OMB should, in coordination with the Secretary of Homeland Security, establish guidance or other means to facilitate the sharing of successful approaches for agencies to address challenges in the areas of (1) managing competing priorities between cybersecurity and operations, such as when operational needs appear to conflict with cybersecurity requirements; (2) implementing consistent cybersecurity risk management policies and procedures across an agency; (3) incorporating cyber risks into enterprise risk management, and (4) establishing agencies’ cybersecurity risk management strategies. (Recommendation 1) We are also making a total of 57 recommendations to the 23 civilian CFO Act agencies in our review to fully address key practices in their cybersecurity risk management policies and procedures. Appendix VII contains these recommendations. We requested comments on a draft of this report from OMB and the 23 civilian CFO Act agencies included in our review. All the agencies provided responses, as further discussed. In an email from the office’s GAO audit liaison on July 8, 2019, OMB did not state whether it agreed or disagreed with our recommendations. However, the office provided technical comments, which we incorporated as appropriate. Of the 23 civilian CFO Act agencies, 17 agencies (Education, Energy, DHS, HUD, Interior, Labor, State, Transportation, VA, USAID, GSA, NASA, NSF, NRC, OPM, SBA, and SSA) concurred with our recommendations; one agency (HHS) partially concurred with our recommendations; three agencies (Commerce, Justice, and Treasury) provided comments but did not state whether they agreed or disagreed with our recommendations; and two agencies (Agriculture and EPA) stated that they had no comments on the report. Multiple agencies also provided technical comments, which we incorporated as appropriate. The following 17 agencies concurred with our recommendations and, in most cases, described steps planned or under way to address them: The Department of Education provided written comments in which it concurred with our recommendation and stated that the department will continue its efforts to fully develop a cybersecurity risk management strategy that includes the definition of risk tolerance and acceptable risk response strategies. Education’s comments are reprinted in appendix VIII. The Department of Energy provided written comments in which it concurred with our two recommendations and described steps and time frames for addressing them. In one case, regarding our recommendation to update the department’s policies to address missing elements, Energy stated that, as of May 2019, it had already completed an update of its policies to implement this recommendation. We intend to follow up with the department and obtain and assess evidence to determine its implementation of this recommendation. Energy’s comments are reprinted in appendix IX. In written comments, the Department of Homeland Security stated that it was pleased that our report noted steps that DHS and OMB have taken to improve agencies’ capabilities for managing cyber risks. DHS also concurred with our two recommendations and described steps it intends to take to address them, along with estimated completion dates. DHS’s comments are reprinted in appendix XI. The department also provided technical comments, which we have incorporated as appropriate. The Department of Housing and Urban Development provided written comments in which it thanked GAO for the opportunity to review the report and stated that it concurred with the recommendations. HUD’s comments are reprinted in appendix XII. The Department of the Interior provided written comments in which it concurred with our three recommendations. Interior also described planned steps to address the recommendations, such as developing a cybersecurity risk management strategy that includes the key elements and updating its policies. The department’s comments are reprinted in appendix XIII. In written comments, the Department of Labor concurred with our recommendation. Labor stated that it intends to take necessary steps to update the department’s policies. The department’s comments are reprinted in appendix XIV. The Department of State provided written comments in which it concurred with our two recommendations. State also described steps planned or under way to address the recommendations. For example, State described ongoing policy updates to address control monitoring, system-level risk assessments, and the use of risk assessments to inform control tailoring. It also described ongoing steps to align its cybersecurity risk management activities with its ERM governance structure. State’s comments are reprinted in appendix XV. The Department of Transportation’s Director of Audit Relations & Program Improvement provided comments via email on June 25, 2019, which stated that the department concurs with the findings and recommendations in the draft report. The Department of Veterans Affairs provided written comments in which it concurred with our four recommendations. VA also described actions planned or under way to address the recommendations. Regarding our recommendation to establish and document a process for coordination between its cybersecurity and enterprise risk management functions, the department stated that it had already established such a process and requested closure of the recommendation. We intend to follow up with the department and obtain and assess evidence to determine if its actions fully address our recommendation. VA’s comments are reprinted in appendix XVI. The U.S. Agency for International Development provided written comments in which it agreed with our two recommendations. USAID also described steps it has planned or under way to address the recommendations, such as amending its guidance to address an organization-wide cybersecurity risk assessment. The agency’s comments are reprinted in appendix XVII. In written comments, the General Services Administration stated that it appreciated the opportunity to review the report and concurred with its findings. The agency added that it is implementing an action plan to address the four recommendations. GSA’s comments are reprinted in appendix XVIII. The National Aeronautics and Space Administration provided written comments in which it concurred with our two recommendations. NASA also described planned steps to address the recommendations, such as updating its policies and establishing a process for an organization-wide cybersecurity risk assessment, along with estimated completion dates. The agency’s comments are reprinted in appendix XIX. The National Science Foundation’s GAO liaison provided comments via email on July 3, 2019, which stated that the agency concurred with our recommendation and intends to update its cybersecurity risk management strategy to address the missing elements. The Nuclear Regulatory Commission provided written comments in which it stated that the agency was in general agreement with the findings and recommendations in our draft report. NRC’s comments are reprinted in appendix XX. The Office of Personnel Management provided written comments in which it stated that it concurred with our two recommendations. OPM also described planned steps to address the recommendations, such as updating its policies and establishing a process for an organization- wide cybersecurity risk assessment. The agency’s comments are reprinted in appendix XXI. In written comments, the Small Business Administration concurred with our three recommendations. SBA described steps planned or under way to address the recommendations, such as updating its cybersecurity risk management strategy and policies and establishing a process for an organization-wide cybersecurity risk assessment, along with estimated completion dates. The agency’s comments are reprinted in appendix XXII. In written comments, the Social Security Administration agreed with our recommendation and described planned efforts to further integrate its cybersecurity and enterprise risk management functions. SSA’s comments are reprinted in appendix XXIII. One agency—the Department of Health and Human Services—concurred with three of our recommendations and partially concurred with one recommendation. Specifically, HHS concurred with our recommendations to develop a risk management strategy that includes key elements, establish a process for conducting an agency-wide cybersecurity risk assessment, and establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. Further, HHS described steps planned or under way to address these recommendations. Regarding our recommendation to update department policies to require an organization-wide cybersecurity risk assessment and the use of risk assessments to inform control tailoring, HHS stated that it concurred with the first part of the recommendation, but did not concur with the second part of the recommendation. Specifically, the department described steps it has planned or under way to update its policies to require an organization-wide risk assessment, in accordance with the first part of the recommendation. With respect to the second part of the recommendation, the department pointed to portions of its information security and privacy policy that address the selection of security and privacy controls. However, while these policy statements require adherence to NIST and OMB standards for selecting security controls and require a rationale for tailoring decisions, they do not specifically require the use of risk assessments to inform the tailoring of security controls. As NIST states, organizations apply the tailoring process to align the controls more closely with the specific conditions within the organization and should use risk assessments to inform and guide the tailoring process for organizational information systems and environments of operation. Making this requirement explicit in policy would help HHS ensure that it is applying the appropriate set of controls to its systems; thus, we maintain that our recommendation is still warranted. HHS’s comments are reprinted in appendix X. The department also provided technical comments, which we incorporated as appropriate. We received technical comments via email from the GAO audit liaisons at three agencies—the Department of Commerce (on June 21, 2019), the Department of Justice (on July 8, 2019), and the Department of the Treasury (on July 3, 2019). The agencies did not state whether they agreed or disagreed with our recommendations. We incorporated their technical comments as appropriate. We received emails from Agriculture’s Director of Strategic Planning, Egovernment and Audits on June 19, 2019, and from a Division Director in the Environmental Protection Agency’s Office of Information Security and Privacy on July 8, 2019, which stated that their agencies had no comments on the draft report. We are sending copies of this report to the appropriate congressional committees, the heads of the agencies in our review, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9342 or marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XXIV. The objectives of our review were to examine (1) the extent to which agencies established key elements of a cybersecurity risk management program; (2) what challenges, if any, agencies identified in developing and implementing cybersecurity risk management programs; and (3) what steps the Office of Management and Budget (OMB) and Department of Homeland Security (DHS) have taken to meet their risk management responsibilities under Executive Order (EO) 13800 and to address any challenges agencies face in implementing cybersecurity risk management practices. In conducting this engagement, we focused on 23 of the 24 agencies covered by the Chief Financial Officers Act of 1990. To address our first objective, we collected agency policies, procedures, and other documentation and compared them to selected key practices from OMB and National Institute of Standards and Technology (NIST) guidance for cybersecurity risk management. To identify the key practices, we reviewed OMB guidance pertaining to cybersecurity risk management, including OMB Circular A-130: Managing Information as a Strategic Resource, as well as Circular A-123: Management’s Responsibility for Enterprise Risk Management and Internal Control, which outlines agency responsibilities for enterprise risk management. We also reviewed NIST guidance, including the Framework for Improving Critical Infrastructure Cybersecurity; Special Publication 800-30: Guide for Conducting Risk Assessments; Special Publication 800-37: Guide for Applying the Risk Management Framework to Federal Information Systems, and Special Publication 800-39: Managing Information Security Risk: Organization, Mission, and Information System View. In selecting the key practices for our assessment, we focused on those practices identified by OMB and NIST as foundational for providing an organization-wide approach to cybersecurity risk management. We collected and analyzed documentation and other information from each agency related to cybersecurity risk management and compared it to the identified key practices. We supplemented our analyses with interviews with relevant agency officials to discuss the development of their policies. We discussed the results of our initial analysis of agency documentation with agency officials to validate our findings, collect additional evidence, and identify causes for any gaps. We then determined whether the evidence provided by the agency addressed each identified criteria element. Specifically, for each criteria element, we determined if the evidence fully addressed the element (“met”), addressed some, but not all, aspects of the element (“partially met”), or did not address any aspects of the element (“not met”). To address the second objective, we administered structured interview questions to the agencies to determine what challenges, if any, they face in developing and implementing policies and procedures for managing cybersecurity risk. We developed a list of potential challenges based on our assessment of agencies’ policies and procedures, a review of OMB’s risk report on agencies’ cybersecurity risk management capabilities, and reviews of prior GAO reports in areas related to cybersecurity risk management. We worked with GAO methodologists to develop a set of structured interview questions that were sent to the agencies and asked them to indicate if they faced each of these, as well as any additional, challenges, and to provide specific examples. We received responses from all 23 agencies in our review and analyzed them to identify those challenges that were indicated by a majority of the agencies. We excluded from our counts agencies that stated they did not have challenges in a particular area. We also identified common themes within the challenge areas. To address the third objective, we reviewed EO 13800 and implementation guidance issued by OMB, as well as relevant reports and other documents, including OMB’s Federal Cybersecurity Risk Determination Report and Action Plan, OMB memos, and supporting documentation for DHS initiatives. We also interviewed OMB and DHS officials with government-wide cybersecurity responsibilities to gain an understanding of initiatives under way to address their responsibilities under the order, and that could help address challenges identified by the agencies. We then compared these initiatives to the responses we received from agencies to determine if there were any gaps between the challenges and the ongoing initiatives. Specifically, for each challenge identified by a majority of the agencies in our review, we determined if any of the initiatives under way would address them based on a review of documentation associated with the initiatives as well as discussions with OMB and DHS officials. We conducted this performance audit from February 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Twenty-two of the 23 civilian Chief Financial Officers Act agencies in our review established and documented the role of the cybersecurity risk executive. Agencies varied in assigning this responsibility to the chief information officer (CIO), chief information security officer (CISO), or another official or entity. Table 7 provides details on our assessment. Of the 23 civilian Chief Financial Officers Act agencies, seven fully established a cybersecurity risk management strategy that included key elements recommended by National Institute of Standards and Technology (NIST) guidance. Specifically, these seven agencies developed strategies to guide how cybersecurity risk is to be framed, assessed, responded to, and monitored. In addition, five of the 23 agencies partially developed a cybersecurity risk management strategy, but their strategies did not address certain required elements. The remaining 11 agencies did not develop an agency-wide cybersecurity risk management strategy. Table 8 provides details on our assessment. The following elements, identified in NIST guidance, should be addressed in policies and procedures to facilitate risk-based decision making in securing information systems and data. Most of the 23 civilian Chief Financial Officers Act agencies addressed the majority of the key practices for incorporating risk-based decision- making in their policies and procedures. However, most of the agencies also had gaps in one or more of these areas. Specifically, six agencies addressed all the elements in their policies and procedures, and the remaining 17 were missing at least one. Table 10 provides details on our assessment of the agencies’ policies. Of the 23 civilian Chief Financial Officers Act agencies, 12 developed a process for an agency-wide cybersecurity risk assessment. Specifically, these agencies developed processes for aggregating system-level data and analyzing them to assess overall cybersecurity risk to agency operations and assets. The remaining 11 agencies did not establish such a process. Table 11 provides details on our assessment. Of the 23 civilian Chief Financial Officers Act agencies, 10 fully established a process or mechanism for coordination between their cybersecurity risk executive and their enterprise risk management (ERM) governance structure, five agencies partially established such a process, and the remaining eight agencies did not provide evidence of coordination. Table 12 provides details on our assessment. We are making a total of 57 recommendations to the 23 civilian Chief Financial Officers Act agencies in our review to fully address key practices in their cybersecurity risk management policies and procedures. The Secretary of Agriculture should take the following three actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 2) Update the department’s policies to require (1) the use of risk assessments to inform security control tailoring and (2) the use of risk assessments to inform plan of actions and milestones (POA&M) prioritization. (Recommendation 3) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 4) The Secretary of Commerce should take the following two actions: Update the department’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform POA&M prioritization. (Recommendation 5) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 6) The Secretary of Education should take the following action: Fully develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 7) The Secretary of Energy should take the following two actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 8) Update the department’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the identification of common controls. (Recommendation 9) The Secretary of Health and Human Services should take the following four actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 10) Update the department’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform security control tailoring. (Recommendation 11) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 12) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 13) The Secretary of Homeland Security should take the following two actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 14) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 15) The Secretary of Housing and Urban Developing should take the following two actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 16) Update the department’s policies to require the use of risk assessments to inform POA&M prioritization. (Recommendation 17) The Secretary of the Interior should take the following three actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 18) Update the department’s policies to require an organization-wide cybersecurity risk assessment. (Recommendation 19) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 20) The Attorney General should take the following two actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 21) Fully establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 22) The Secretary of Labor should take the following action: Update the department’s policies to require (1) the use of risk assessments to inform control tailoring and (2) the use of risk assessments to inform POA&M prioritization. (Recommendation 23) The Secretary of State should take the following two actions: Update the department’s policies to require (1) an organization-wide risk assessment, (2) an organization-wide strategy for monitoring control effectiveness, (3) system-level risk assessments, (4) the use of risk assessments to inform security control tailoring, and (5) the use of risk assessments to inform POA&M prioritization. (Recommendation 24) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 25) The Secretary of Transportation should take the following three actions: Fully develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 26) Update the department’s policies to require an organization-wide risk assessment. (Recommendation 27) Fully establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 28) The Secretary of the Treasury should take the following three actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 29) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 30) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 31) The Secretary of Veterans Affairs should take the following four actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 32) Update the department’s policies to require an organization-wide cybersecurity risk assessment. (Recommendation 33) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 34) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 35) The Administrator of USAID should take the following two actions: Update the agency’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform control tailoring. (Recommendation 36) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 37) The Administrator of EPA should take the following four actions: Fully develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 38) Update the agency’s policies to require an organization-wide cybersecurity risk assessment. (Recommendation 39) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 40) Fully establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 41) The Administrator of General Services should take the following four actions: Designate and document a risk executive function with responsibilities for organization-wide cybersecurity risk management. (Recommendation 42) Update the agency’s policies to require an organization-wide cybersecurity risk assessment. (Recommendation 43) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 44) Fully establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 45) The Administrator of NASA should take the following two actions: Update the agency’s policies to require (1) an organization-wide risk assessment and (2) the use of risk assessments to inform POA&M prioritization. (Recommendation 46) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 47) We are not making a recommendation to NASA to establish a cybersecurity risk management strategy because we previously made such a recommendation, which remains open. The Director of NSF should take the following action: Fully develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 48) The Chairman of NRC should take the following four actions: Develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 49) Update the agency’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform POA&M prioritization. (Recommendation 50) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 51) Establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 52) The Director of OPM should take the following two actions: Update the agency’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform control tailoring. (Recommendation 53) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 54) The Administrator of SBA should take the following three actions: Fully develop a cybersecurity risk management strategy that includes the key elements identified in this report. (Recommendation 55) Update the agency’s policies to require (1) an organization-wide cybersecurity risk assessment and (2) the use of risk assessments to inform POA&M prioritization. (Recommendation 56) Establish a process for conducting an organization-wide cybersecurity risk assessment. (Recommendation 57) The Commissioner of SSA should take the following action: Fully establish and document a process for coordination between cybersecurity risk management and enterprise risk management functions. (Recommendation 58) In addition to the individual named above, Marisol Cruz Cain (assistant director), Lee McCracken (analyst in charge), Kiana Beshir, Roger Bracy, Chris Businsky, Alan Daigle, John de Ferrari, Nancy Glover, Franklin Jackson, Vernetta Marquis, Carlton Maynard, Scott Pettis, Tomas Ramirez, Andrew Stavisky, and Shaunyce Wallace made significant contributions to this report.", "summary": "Federal agencies face a growing number of cyber threats to their systems and data. To protect against these threats, federal law and policies emphasize that agencies take a risk-based approach to cybersecurity by effectively identifying, prioritizing, and managing their cyber risks. In addition, OMB and DHS play important roles in overseeing and supporting agencies' cybersecurity risk management efforts. GAO was asked to review federal agencies' cybersecurity risk management programs. GAO examined (1) the extent to which agencies established key elements of a cybersecurity risk management program; (2) what challenges, if any, agencies identified in developing and implementing cybersecurity risk management programs; and (3) steps OMB and DHS have taken to meet their risk management responsibilities and address any challenges agencies face. To do this, GAO reviewed policies and procedures from 23 civilian Chief Financial Officers Act of 1990 agencies and compared them to key federal cybersecurity risk management practices, obtained agencies' views on challenges they faced, identified and analyzed actions taken by OMB and DHS to determine whether they address agency challenges, and interviewed responsible agency officials. Key practices for establishing an agency-wide cybersecurity risk management program include designating a cybersecurity risk executive, developing a risk management strategy and policies to facilitate risk-based decisions, assessing cyber risks to the agency, and establishing coordination with the agency's enterprise risk management (ERM) program. Although the 23 agencies GAO reviewed almost always designated a risk executive, they often did not fully incorporate other key practices in their programs: Twenty-two agencies established the role of cybersecurity risk executive, to provide agency-wide management and oversight of risk management. Sixteen agencies have not fully established a cybersecurity risk management strategy to delineate the boundaries for risk-based decisions. Seventeen agencies have not fully established agency- and system-level policies for assessing, responding to, and monitoring risk. Eleven agencies have not fully established a process for assessing agency-wide cybersecurity risks based on an aggregation of system-level risks. Thirteen agencies have not fully established a process for coordinating between their cybersecurity and ERM programs for managing all major risks. Until they address these practices, agencies will face an increased risk of cyber-based incidents that threaten national security and personal privacy. Agencies identified multiple challenges in establishing and implementing cybersecurity risk management programs (see table). GAO is making 57 recommendations to the 23 agencies and one to OMB, in coordination with DHS, to assist agencies in addressing challenges. Seventeen agencies agreed with the recommendations, one partially agreed, and four, including OMB, did not state whether they agreed or disagreed. GAO continues to believe all its recommendations are warranted.", "document_type": "gao"}
{"report": "When patients are seeking access to investigational drugs, their first option is to consider whether they can obtain them through participation in a clinical trial. Clinical trials are a step in the drug development process through which a drug manufacturer assesses the safety and effectiveness of its investigational drug through human testing. A clinical trial can take place in a variety of settings (e.g., research hospitals, universities, and community clinics) and geographic locations, and is led by a principal investigator that is typically a physician. Manufacturers establish clinical trial eligibility criteria to define the patient population to be studied, and only patients who meet those criteria can participate. These criteria can vary depending on the drug being studied and its intended use. Patient eligibility criteria consist of both inclusion and exclusion criteria. Inclusion criteria specify the characteristics of the patient that are required for participation, such as the stage or characteristics of a disease, and typically identify a patient population in which it is expected that the manufacturer can demonstrate the effect of an investigational drug. In comparison, exclusion criteria specify the characteristics that disqualify patients from clinical trial participation and can include factors that could mask the effect of an investigational drug, such as the presence of comorbidities or simultaneous use of other drugs. Certain patient populations, such as children and pregnant women, may also be excluded from clinical trial participation because of ethical reasons. Drug manufacturers, FDA, and IRBs each have responsibilities as part of the clinical trial process. In order to test an investigational drug on human volunteers in clinical trials, a manufacturer must first submit an investigational new drug application (IND) to FDA. FDA is responsible for reviewing the IND, which includes various components such as the clinical trial protocol that describes the patient eligibility criteria, the medications and dosages to be studied, and other details. In turn, an IRB is responsible for reviewing and approving the clinical trial protocol as well as reviewing the informed consent form for the study. In general, clinical trials that involve human volunteers can begin after FDA has reviewed and allowed the IND to proceed and the IRB has given its approval. An investigational drug typically goes through three phases of clinical trials before an application is submitted to FDA for marketing approval. At any point during the clinical trials, FDA could issue a clinical hold on the existing IND that would delay the proposed clinical trials or suspend the ongoing clinical trials. When a proposed or ongoing study is placed on a complete clinical hold, the investigational drug cannot be administered to any human volunteers. Traditionally, the three clinical trial phases are the following: Phase I: This clinical trial phase generally tests the safety of the drug on about 20 to 80 healthy volunteers. The goal of this phase is to determine the drug’s most frequent side effects and how it is metabolized and excreted. If the drug does not show unacceptable toxicity in the phase I clinical trials, it may move on to phase II. Phase II: This clinical trial phase assesses the drug’s safety and effectiveness on people who have a certain disease or condition, and typically the assessment is conducted on a few dozen to hundreds of volunteers. Generally, during this phase some volunteers receive the drug and others receive a control, such as a placebo. If there is evidence that the drug is effective in the phase II clinical trials, it may move on to phase III. Phase III: This clinical trial phase generally involves several hundreds to thousands of volunteers who have a certain disease or condition and gathers more information about the drug’s safety and effectiveness, again while being compared to a control. If phase III clinical trials are successfully completed, the drug may move on to FDA’s review and approval process. When seeking FDA’s approval to market a drug in the United States, the manufacturer submits an application to FDA that includes the data from the safety and efficacy clinical trials for FDA to review. Safety data include clinical trial results about a drug’s toxicity (e.g., the highest tolerable dose) and adverse events that may result from exposure to the drug. Efficacy data include information on whether the drug demonstrated a health benefit over a placebo. FDA reviews the information in the application to either approve or not approve the drug. If a patient seeking access to an investigational drug is not able to participate in the drug’s clinical trial (e.g., because of the study’s eligibility criteria or geographic location), another pathway to potentially obtain access to the drug outside of a clinical trial is through FDA’s expanded access program. Under the program, a licensed physician can submit a request for access to an investigational drug for treatment use on behalf of a patient and may do so during or after phase I, II, or III of clinical trials. To allow access to an investigational drug under the program, FDA must determine that a patient has a serious or immediately life-threatening disease or condition and has no other comparable medical options, among other criteria. FDA’s goals for the program are to facilitate the availability of investigational drugs when appropriate, ensure patient safety, and preserve the clinical trial development process. FDA is responsible for determining whether to allow individual requests to proceed to treatment once the manufacturer has agreed to provide access. If FDA allows the request to proceed, an IRB must approve the clinical treatment plan that is submitted as part of the individual request and review the informed consent form. The licensed physician treating a patient under expanded access would be required to report to FDA any unexpected serious adverse reactions that occur during treatment for which there is a reasonable possibility that the drug caused the reaction. In 2018 the federal RTT Act established another pathway through which patients may potentially obtain access to investigational drugs outside of clinical trials. To be eligible under the law, a patient must have been diagnosed with a life-threatening disease or condition, have exhausted approved treatment options, and be unable to participate in a clinical trial involving the investigational drug. Obtaining access to investigational drugs through the federal RTT Act primarily requires the involvement of the manufacturer and treating physician. Similar to FDA’s expanded access program, treatment can only proceed if the drug manufacturer allows the patient access to its drug. Under the federal RTT Act, the manufacturer is responsible for providing to FDA an annual summary of any use of its drugs under this pathway that includes information on any known serious adverse events. The treating physician is responsible for requesting access to the investigational drug for the patient and for obtaining written informed consent from or on behalf of the patient if the manufacturer agrees to provide access. Eligibility of an investigational drug for patient use through this pathway is based on certain criteria, including that the drug has completed phase I clinical trials, the manufacturer has not discontinued clinical development of the drug, and the drug has not been placed on a clinical hold. Unlike FDA’s expanded access program, the federal RTT Act does not require the FDA or an IRB to review individual requests for access. Figure 1 shows a summary of the three pathways through which patients may obtain access to investigational drugs. Some patients, such as those with compromised liver and kidney function, have traditionally been excluded from clinical trials. FDA has ongoing efforts to help drug manufacturers identify the circumstances under which they could broaden their eligibility criteria to include such patients without compromising study results. These efforts include issuing recent guidance with recommendations for including certain patients in clinical trials for cancer drugs. Officials from one of the 10 drug manufacturers we interviewed told us they had broadened their eligibility criteria and another one was taking steps to do so, but these officials and others noted challenges to broadening eligibility criteria. FDA public workshop on broadening eligibility criteria. In April 2018, FDA held a public workshop with stakeholders—including drug manufacturers, patient advocacy groups, and government agencies—to discuss ways drug manufacturers and other investigators could safely broaden eligibility criteria for clinical trials and to inform FDA guidance on this topic. In July 2018 FDA publicly released a report summarizing the workshop, in accordance with FDARA. According to the report, stakeholders at the meeting emphasized the importance of broadening clinical trial eligibility, when appropriate, to include more patients who will likely use the drug if it is approved. Stakeholders recommended that investigators ensure that the eligibility criteria for each of their clinical trials are scientifically justifiable, rather than, for example, “copying and pasting” a narrow set of criteria from a prior study without considering if the exclusions are valid for scientific reasons. According to the report, this practice can unnecessarily limit eligibility for certain patients. While stakeholders commented that assessing whether eligibility criteria are scientifically justifiable may require additional time and resources, they emphasized it could lead to the removal of unnecessarily restrictive eligibility criteria and thereby increase participation among patient populations that have been typically excluded from clinical trials, such as pediatric patients and patients with compromised liver and kidney function. FDA guidance on eligibility criteria. In March 2019, FDA issued four new draft guidance documents and finalized one guidance document with recommendations for drug manufacturers to broaden clinical trial eligibility criteria for drugs that treat cancer. The guidance recommends that manufacturers include certain patient populations that have typically been excluded from participation. The patient populations are adolescents; pediatrics (children and adolescents); patients with human immunodeficiency virus (HIV), hepatitis B virus (HBV), or hepatitis C virus (HCV) infections; patients with brain metastases (i.e., cancer that has spread to the brain); and patients with compromised kidney, heart, or liver function, or who have a history of (or concurrent) cancer. According to FDA, the guidance documents are intended to help drug manufacturers and other investigators broaden cancer trial eligibility criteria. This will help improve patient access to investigational drugs and ensure that the results from the clinical trials are generalizable to patients likely to use the drugs once they are approved. In addition, FDA officials have noted that including broader patient populations in clinical trials can lead to new information in a drug’s labeling, which will help communicate the safe and effective use of these drugs. Table 1 provides a summary of each of the five guidance documents. In June 2019, FDA issued draft guidance for manufacturers on broadening clinical trial eligibility criteria, in accordance with FDARA. The guidance applies to a wider range of clinical trials beyond cancer trials and includes recommendations to broaden eligibility criteria and considerations for the use of clinical trial designs and other methodologies to help facilitate patient participation. For example, FDA recommends that manufacturers examine each exclusion criterion to determine if it is needed to help assure the safety of trial participants or to achieve the study’s objectives. If not, the manufacturer should consider eliminating or modifying the criterion to expand the study population as well as tailoring the exclusion criteria as narrowly as possible to avoid unnecessary restrictions to the study population. Two manufacturers’ efforts to broaden eligibility criteria. Officials from one of the 10 drug manufacturers we interviewed told us they broadened their clinical trial eligibility criteria and another manufacturer we interviewed reported that it was taking steps to do so. These two manufacturers told us they were taking these steps in part because both believe it will facilitate the drug approval process. Officials from one manufacturer stated that they broadened their eligibility criteria by removing exclusions after determining they were not critical to clinical trial designs, including exclusions related to liver function, infections (e.g., HIV), and the use of other medications (e.g., steroids). The officials explained that, since 2015, they have systematically evaluated their eligibility criteria to ensure that they do not unnecessarily exclude patient populations from their clinical trials. Officials from the second manufacturer told us they have begun evaluating whether to remove certain exclusion criteria that they typically use in clinical trials, and added that their efforts are partially in response to FDA’s 2018 public workshop report, as described above. For example, the manufacturer is reviewing its exclusion of adolescents in prior clinical trials and officials told us they will likely include adolescents in an upcoming study if they determine that patient safety would not be compromised. Officials from both manufacturers stated that broader eligibility criteria will allow more patients to access investigational drugs through clinical trial participation. It can also, officials said, help them obtain FDA approval for a drug that extends to a wider range of patients, if the drug is found to be safe and effective. Further, officials from one of the two manufacturers noted that broader eligibility criteria, such as criteria that include patients with infections, could help streamline the process for conducting clinical trials—for example, by eliminating the need to conduct clinical testing to screen for the presence of infections. Although most drug manufacturers in our review did not report efforts to broaden their eligibility criteria, many noted efforts to address other barriers to clinical trial participation. For example, to address geographic barriers, officials from six of the 10 manufacturers told us they help cover costs for patients to travel to clinical trial sites, such as by reimbursing transportation and hotel costs for patients who travel long distances. In addition, officials from one manufacturer said they completed a pilot clinical trial on diabetes in 2019 that used decentralized trial locations in three states, such as retail health clinics and patients’ homes, to help patients overcome challenges with obtaining transportation to trial sites. Similarly, within the next 2 years, another manufacturer is planning to conduct a pilot clinical trial that is fully remote and expects the design to improve patient participation in rural communities. To address the lack of information about upcoming and ongoing clinical trials that is available to and tailored to patients, two manufacturers launched clinical trial registries in 2015 and 2016, respectively. Officials from one of the manufacturers stated they designed their registry to bridge the gap between the information that patients want about clinical trials (e.g., information targeted to medical conditions that uses basic terminology), and what is available in ClinicalTrials.gov, a federal database that includes information on privately and publicly funded clinical trial studies. Officials explained that ClinicalTrials.gov is, in general, more targeted to physicians. In addition, to address barriers associated with the mistrust of research stemming from historical events among African-Americans and other communities, one manufacturer has several ongoing efforts to increase the participation of racially and ethnically diverse populations in its clinical trials. For example, the manufacturer conducts workshops to train minority investigators who conduct clinical trials and requires certain clinical trial sites to be located in areas with minority patient populations of more than 25 percent. Challenges with broadening eligibility criteria. Officials from four of the 10 drug manufacturers we interviewed—including the two taking steps to broaden their clinical trial eligibility criteria—told us broadening eligibility criteria is challenging. They stated that broader criteria must be carefully balanced with the need to collect evidence from a well-defined population. Officials from one manufacturer explained that removing standard exclusion criteria, such as excluding patients who use other medications, could interfere with the success of their clinical trial if those medications make it difficult to identify the effects of the studied drug. In addition, officials from another manufacturer emphasized that determining whether to remove exclusion criteria takes time and resources because it involves additional study, which could slow down the clinical development of a drug. To facilitate access to investigational drugs outside of clinical trials, FDA has simplified its expanded access program’s IRB review requirements for individual patient requests. FDA made this change in October 2017, in accordance with a provision in FDARA. This provision addressed concerns that FDA’s requirement to convene a full IRB to review an expanded access request could result in delays of approvals because full IRBs may not meet regularly. Under the revised process, FDA now allows for a waiver of the requirement for full IRB review when concurrence is obtained by the IRB chair or another designated member. According to FDA officials, the updated process will help reduce the potential burden for physicians, who are responsible for obtaining IRB approval, while still protecting patients. In addition, to further simplify its expanded access process for individual patient requests, in June 2019 FDA launched a pilot program called Project Facilitate for oncologists and other health care professionals that treat patients with cancer. According to FDA officials, the pilot program is focused on oncology because the agency receives a large number of individual expanded access requests from oncologists. Under the pilot program, FDA established a new call center that provides a single point of contact where FDA staff are available to answer questions, assist in filling out appropriate paperwork, and facilitate the overall process for requesting and obtaining access to investigational drugs. For example, FDA officials told us that FDA staff may assist oncologists in locating an IRB, if needed. As part of the pilot program, FDA will follow up on individual requests and gather data, such as how many patients received investigational drugs, and if not, why the requests were denied by manufacturers. According to FDA, the agency can use these data to determine how the process is benefiting patients. Twenty of the stakeholders we interviewed were familiar with FDA’s simplified IRB review requirements, and of those, 18 told us these updates were helpful for physicians and patients. For example, officials from one drug manufacturer commented that the new IRB review requirements reduce the amount of time it takes for patients to obtain access to investigational drugs, which is especially important for patients who are very sick. In addition, we spoke to 12 stakeholders about FDA’s plans for its pilot program, and of those, nine generally had positive views of the agency’s planned activities. Officials from one manufacturer explained that the pilot program could help reduce the burden on oncologists seeking access to investigational drugs for their patients through the expanded access program. On the other hand, the officials from this same manufacturer raised concerns about the potential for FDA to intentionally or unintentionally pressure companies to make their investigational drugs available to patients, should FDA have increased involvement with drug manufacturers as part of the pilot program. FDA has also taken recent actions to facilitate access to investigational drugs outside of clinical trials by increasing its communication about the expanded access program and the federal RTT Act. FDA’s increased communication about the expanded access program. In November 2018, FDA updated the web pages for its expanded access program in response to findings from an external assessment that the web pages were difficult to navigate and contained unclear information. FDA created separate web pages for patients, physicians, and drug manufacturers, and tailored information about the expanded access process to each of these stakeholders. In addition, FDA added a new web page with information that is commonly requested by physicians and patients, such as the instructions for completing the form for submitting individual requests and definitions of keywords associated with the expanded access process (e.g., IRB, informed consent). In addition, in October 2017, in response to a recommendation in our July 2017 report, FDA clarified its guidance for drug manufacturers on how the agency reviews adverse events that occur under FDA’s expanded access program. In the 2017 report, we found that some drug manufacturers were concerned that use of adverse event data may influence FDA in making final approval decisions, and that this possibility could contribute to a manufacturer deciding not to grant patients access to their drugs through the expanded access program. In response, we recommended that FDA clearly communicate how the agency will use adverse event data from expanded access use when reviewing drugs and biologics for approval. FDA’s updated guidance states that FDA is not aware of instances in which adverse event information prevented the agency from approving a drug, and that it is very rare for FDA to place a clinical hold on an investigational drug due to adverse events observed during expanded access treatment. The guidance also explains that several factors make it difficult for FDA to link an adverse event to the expanded use of a drug being considered for approval. For example, the guidance acknowledges that the use of investigational drugs though the expanded access program generally occurs outside of a controlled clinical trial setting and patients receiving such drugs may be sicker than patients participating in a clinical trial, making it more difficult to determine whether the use of the investigational drug has led to the adverse event. In responding to questions about increased FDA communication about the expanded access program, 19 of the stakeholders we interviewed were familiar with FDA’s updated expanded access web pages, and of those, 16 told us they were an improvement. Officials from one physician organization stated that the updated web pages were easier to navigate than the previous web pages and presented information about the process more clearly. Among the 10 manufacturers we interviewed, we found varying views of FDA’s updated guidance on the use of adverse event data. Officials from seven of the 10 manufacturers viewed the updated guidance as an improvement. Officials from one of the seven explained that it contributed to their company’s decision to allow access to investigational drugs, when appropriate. Officials from two of the 10 manufacturers did not view the guidance as an improvement. Officials from both manufacturers stated that they still had significant concerns about the potential use of adverse event data by FDA to adversely affect the development of their investigational drugs, such as being used to issue a clinical hold. An official from one of the two manufacturers commented that these concerns remained despite FDA’s statement in the guidance that it is difficult for FDA to link expanded access use to a particular adverse event. In addition, officials from two other manufacturers who viewed the guidance as an improvement similarly expressed remaining concerns that adverse events could negatively affect the development of their investigational drugs. One manufacturer was unfamiliar with the updated guidance. Further, officials from four of the 10 drug manufacturers we interviewed, including two who viewed the updated guidance as an improvement, said they believed that manufacturers’ concerns about this issue may never be fully resolved even with additional FDA guidance. In other comments related to FDA’s communication on its use of adverse events data from the expanded access program, some drug manufacturers we interviewed noted the merits of using efficacy and safety data from the expanded access program to inform FDA’s drug approval decisions. Officials from two of the 10 manufacturers told us they believe that FDA’s potential use of adverse event data from expanded access use, but not efficacy data, would be unfair. Officials from one of these two manufacturers cited FDA’s updated guidance on adverse events as contributing to their view, referring to FDA’s statement that it is unlikely that FDA’s program would yield data that is useful to FDA in considering an investigational drug’s effectiveness. However, FDA officials told us that efficacy and safety data from the expanded access program have been used to support drug approvals in several instances. For example, in January 2018 FDA approved the drug Lutathera to treat rare tumors in the pancreas and gastrointestinal tract using efficacy and safety data the manufacturer submitted to FDA from a subset of the roughly 1,200 patients who received the drug through the expanded access program. Officials from four of the 10 manufacturers expressed interest in discussing further with FDA how the agency would evaluate efficacy and safety data from the expanded access program and use these data to help support a drug’s approval and other regulatory decisions. FDA’s communication about the federal RTT Act. In November 2018, FDA launched a new federal RTT web page that outlines both the eligibility requirements for patients interested in seeking access to investigational drugs and the criteria that must be met for an investigational drug to be eligible for use through this pathway. For example, the web page states that patients must be diagnosed with a life- threatening disease or condition to be eligible to access investigational drugs under the federal RTT pathway. Further, the agency plans to issue proposed regulations in September 2019 to implement the federal RTT Act requirement for manufacturers to submit an annual summary to FDA on any use of their investigational drugs under this pathway. The regulations will include a due date for manufacturers to submit the annual summaries as well as information on what they are to contain, according to FDA. Fourteen of the stakeholders we interviewed were familiar with FDA’s new web page on the federal RTT Act, and among those, eight stated that it communicated useful and balanced information for physicians and patients. Officials from the remaining six stakeholders told us they did not find it helpful for physicians or patients. For example, officials from two stakeholders (including one drug manufacturer) commented at the time of our review that the web page could be misleading to some patients if they interpret the federal RTT Act to mean that manufacturers must provide access to their investigational drugs. Both added that FDA should more clearly communicate on the web page that there is no such requirement. In addition, officials from another stakeholder stated at the time of our review that FDA should explain on the web page the agency’s role in implementing the federal RTT Act. In May 2019 FDA clarified on its web page that the federal RTT Act does not require manufacturers to provide patients access to their investigational drugs and that FDA’s role includes posting a consolidated annual summary report on the use of investigational drugs through the federal RTT pathway. Most of the 29 drug manufacturers in our review used their websites to communicate to patients and physicians whether they would consider individual requests for access to their investigational drugs outside of clinical trials. Among those that would consider requests, most also communicated the conditions under which they would review requests and grant access. Manufacturers’ consideration of requests for access. Our review of drug manufacturers’ websites between January 31, 2019, and March 12, 2019, found that 23 of the 29 manufacturers in our review used their websites to communicate whether they considered individual requests for access to investigational drugs outside of clinical trials. In communicating this information, 19 of the 23 manufacturers stated they were willing to consider requests, while the other four stated they were not considering requests. The remaining six of the 29 manufacturers did not communicate information about whether they would consider requests for access to investigational drugs outside of clinical trials at the time of our review, but officials from all six told us they were in the process of developing content on this topic that they intended to post on their websites. Information communicated by manufacturers that consider requests. Among the 19 manufacturers willing to consider requests for access to investigational drugs outside of clinical trials, all communicated on their websites that they required physicians to submit requests on behalf of their patients and provided information on how physicians should submit these requests. In addition, 18 manufacturers communicated an estimated time frame within which they would respond to requests. The manufacturers provided additional information, including the following: Eighteen communicated information about the type of patient for whom they would consider granting access. Eighteen stated that patients must have a serious or life- threatening disease or condition; have no comparable or satisfactory alternative therapies available; and be unable to participate in a clinical trial to be eligible to obtain access. In addition, 17 stated that the treating physician must determine for the patient seeking access that the risk of taking the investigational drug is not greater than the anticipated benefit. Fifteen communicated other factors they would take into account during their review of requests. These factors included the following: Ten stated that the supply of their investigational drugs was a consideration. That is, a manufacturer must have a sufficient supply of the investigational drug to support the drug’s clinical development before granting access to patients outside of clinical trials. Five referred to specific drugs to which they would consider granting access when describing the conditions under which they would consider reviewing requests. For example, one manufacturer stated that it would consider requests to access three of its investigational drugs (intended to treat bladder cancer, influenza, and HIV). One manufacturer communicated that after its initial review of individual requests, it uses an external advisory committee to further evaluate certain requests and ensure they are evaluated in an ethical and fair manner. The committee, which includes bioethical experts, physicians and patient representatives, makes recommendations to the manufacturer about providing access to individual patients. Many of the 19 manufacturers that communicated they were willing to consider individual requests for access stated that after they have approved a request they also required external entities to review the request. These included the following: Thirteen stated they require the relevant regulatory authority to review requests. Of these, six specified that they require FDA to review requests for access in the United States. One of these six explained that it required a review by FDA to ensure all available safety data for the investigational drug were considered, and added that FDA is uniquely aware of such safety data. Five stated they require the review of a research ethics committee or an IRB. Information communicated by manufacturers that do not consider requests. Among the four manufacturers that communicated on their websites they were not considering requests for access to investigational drugs outside of clinical trials at the time of our review, two provided reasons for their decision. Both cited safety concerns; for example, one explained that it wanted to ensure its investigational drugs were administered to patients only through clinical trials where safety could be closely monitored. One also cited limited resources, stating that it chose to focus its resources solely on conducting clinical trials. Both of the manufacturers that provided reasons for not considering requests for access communicated that they will periodically re-evaluate their policies. We provided a draft of this report to HHS for comment and HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. John E. Dicken at (202) 512-7114 or dickenj@gao.gov In addition to the contact named above, Gerardine Brennan, Assistant Director; Pamela Dooley, Analyst-in-Charge; Craig Gertsch; Gay Hee Lee; and Moira Lenox made key contributions to this report. Also contributing were George Bogart, Laurie Pachter, and Ethiene Salgado- Rodriguez.", "summary": "When investigational drugs show promise for treating serious or life-threatening diseases, patients are often interested in obtaining access to them. Congress included a provision in the FDA Reauthorization Act of 2017 for GAO to review actions taken to facilitate access to these drugs. This report describes (1) actions FDA and drug manufacturers have taken to broaden eligibility criteria for clinical trials, (2) actions FDA has taken to facilitate access to investigational drugs outside of clinical trials, and (3) information drug manufacturers have communicated to patients and physicians about access to investigational drugs outside of clinical trials. GAO reviewed laws, regulations, FDA documents, and manufacturer policies and interviewed FDA officials and a non-generalizable selection of 10 manufacturers and 14 other stakeholders (including patient advocacy and physician organizations). The manufacturers were developing drugs to treat serious or life-threatening diseases, and were selected for variation in company size. GAO also reviewed information that a non-generalizable selection of 29 manufacturers communicated through their websites about access to investigational drugs outside of clinical trials. GAO selected manufacturers for variation in the type of serious diseases their investigational drugs were intended to treat, company size, and other factors. HHS provided technical comments on a draft of this report, which GAO incorporated as appropriate. Individuals may access investigational drugs—those not yet approved for marketing in the United States by the Food and Drug Administration (FDA)—by participating in clinical trials conducted by drug manufacturers to test drug effectiveness and safety. FDA has ongoing efforts to help manufacturers identify the circumstances under which they could broaden clinical trial eligibility criteria to include patients who are commonly excluded, such as pediatric patients and patients with impaired liver and kidney function, without compromising study results. FDA issued guidance in March 2019 with recommendations on ways manufacturers could broaden eligibility criteria for cancer clinical trials, when clinically appropriate. In June 2019, FDA issued related guidance that applies to a wider range of clinical trials beyond cancer trials. One of the 10 manufacturers GAO interviewed reported broadening its eligibility criteria to include more patients, such as those with HIV. Another manufacturer has begun reviewing its eligibility criteria and expects to include adolescents, as appropriate, in future studies—a population that has generally been excluded from trials. However, these and two other manufacturers cited challenges in these efforts. One stated that expanding participation to patients who use other medications, for example, could adversely affect a study's ability to identify the effects of the studied drug. Outside of clinical trials, patients with certain medical conditions, who are unable to enroll in a clinical trial, and have no other comparable medical options, may request to obtain access to investigational drugs. This can occur under FDA's expanded access program, or through a 2018 federal law known as “Right to Try.” Under either pathway, a patient can only access the investigational drug if its manufacturer agrees to the request. FDA has taken steps to facilitate access to investigational drugs outside of clinical trials, and most manufacturers in GAO's review communicated information to patients and physicians through their websites about how to access their investigational drugs outside of clinical trials. For example: Since 2017, FDA took steps to simplify its expanded access program to make it easier to participate. In addition, to address concerns raised by manufacturers, FDA clarified guidance on how it would review data resulting from the program. Seven of the 10 manufacturers GAO interviewed viewed the guidance as an improvement. GAO's review of information communicated by 29 manufacturers on their websites found that 23 had policies about accessing investigational drugs outside of clinical trials. At the time of GAO's review, 19 of the 23 stated they would consider individual requests for access, while the other four stated they would not. More than half of the manufacturers stated that if they approve a request, they require additional steps, such as FDA review of the request.", "document_type": "gao"}
{"report": "In fiscal year 2018, OJJDP administered 16 programs, which collectively included 53 grant solicitations and 295 associated awards. As shown in table 1, the 16 programs included the Title II Formula Grant Program, two discretionary grant programs for youth mentoring and missing and exploited children that awarded the most funding, and 13 other discretionary grant programs to support efforts such as helping opioid- affected youth, victims of child abuse, and girls in the juvenile justice system. For a complete list of OJJDP programs and grants in fiscal year 2018, see appendix I. On December 21, 2018, the Juvenile Justice Reform Act of 2018 (“Reform Act”) enacted various requirements to strengthen accountability and oversight in OJJDP grant programs, including grants to states under the Title II Formula Grant Program. The Reform Act expressed the sense of Congress that OJJDP must restore meaningful enforcement, and states must exercise vigilant oversight, to ensure compliance with core requirements of the Title II Formula Grant Program. Among the measures the Reform Act put into place to achieve this goal was a requirement that states maintain an “effective” system of monitoring compliance—a requirement that became effective for fiscal year 2020 awards. In contrast, the requirement prior to fiscal year 2020 was for states to maintain an “adequate” system of monitoring compliance, which was the requirement that applied to the grant performance period reviewed for this report (October 2015 through September 2018). This report is one of many called for by the Reform Act to improve oversight of OJJDP grant programs, including the Title II Formula Grant Program. Other oversight requirements in the Reform Act are addressed to OJJDP; OJP’s Office of Audit, Assessment, and Management; and the DOJ OIG. Appendix III provides information on selected Reform Act requirements that relate to accountability and oversight in the Title II Formula Grant Program, and the status of efforts to implement them. All OJP grantees and awards are subject to “grant monitoring.” Grant monitoring consists of (1) programmatic and (2) financial monitoring, and according to OJP officials, helps ensure the programmatic and financial integrity and accountability of grantees. OJP policy requires programmatic desk reviews on all open awards each fiscal year and “in- depth” monitoring—consisting of enhanced programmatic desk reviews or site visits—on at least 10 percent of the total number and dollar amount of open and active awards annually. In addition, OJP’s Office of the Chief Financial Officer plans to financially monitor at least 10 percent of the award population annually. States awarded Title II Formula Grants are subject to an additional form of monitoring—“compliance auditing”—which is conducted by OJJDP annually to fulfill statutory requirements unique to the program. Specifically, “compliance auditing” refers to OJJDP’s process for (1) auditing the compliance monitoring systems used by states, and (2) evaluating states’ compliance with four core requirements specified in law. See appendix IV for more information on compliance auditing in the Title II Formula Grant Program associated with the performance period we reviewed. Both the grant monitoring and compliance auditing broadly consist of three parts: (1) desk reviews that occur annually, (2) risk assessments that assist officials in determining what additional monitoring or auditing activities to perform or how to prioritize them, and (3) additional monitoring or auditing activities, such as enhanced desk reviews or site visits (see figure 1). Fraud and “fraud risk” are distinct concepts. Fraud—obtaining something of value through willful misrepresentation—is challenging to detect because of its deceptive nature. Fraud risk (which is a function of likelihood and impact) exists when individuals have an opportunity to engage in fraudulent activity, have an incentive or are under pressure to commit fraud, or are able to rationalize committing fraud. Fraud risk management is a process for ensuring program integrity by continuously and strategically mitigating the likelihood and impact of fraud. When fraud risks can be identified and mitigated, fraud may be less likely to occur. Although the occurrence of fraud indicates there is a fraud risk, a fraud risk can exist even if actual fraud has not yet been identified or occurred. According to federal standards and guidance, executive-branch agency managers—including those at DOJ, OJP, and OJJDP—are responsible for managing fraud risks and implementing practices for addressing those risks. Federal internal control standards call for agency management officials to assess the internal and external risks their entities face as they seek to achieve their objectives. The standards state that as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks. We issued our Fraud Risk Framework in July 2015. The Fraud Risk Framework provides a comprehensive set of leading practices, arranged in four components, which serve as a guide for agency managers developing efforts to combat fraud in a strategic, risk-based manner. The Fraud Risk Framework is also aligned with Principle 8 (“Assess Fraud Risk”) of Standards for Internal Control in the Federal Government. The Fraud Reduction and Data Analytics Act of 2015 requires agencies to establish financial and administrative controls that are aligned with the Fraud Risk Framework’s leading practices. In addition, guidance under Office of Management and Budget Circular A- 123 affirms managers should adhere to the leading practices identified in the Fraud Risk Framework. OJJDP has established goal statements and performance measures for individual programs. Goal statements broadly convey a program’s overall intent, and performance measures assess program outputs or outcomes. Figure 2 below shows current goal statements and performance measures for the Youth Mentoring Program, for example. OJJDP requires grantees to report on performance measures which are listed in grant solicitations. OJJDP has designated 15 of its measures as “core” measures that are generally applicable across most OJJDP programs. OJJDP aggregates data from some of these core measures across all applicable programs collectively to assess progress toward office-level targets. Targets represent outputs or outcomes expressed as a numeric goal. For example, OJJDP has office-level targets for the percent of youth who offend and reoffend, as well as the percent of grantees that have implemented an evidence-based program. OJJDP obtains, reports on, and uses OJJDP program performance data, as shown in figure 3 below. We reviewed a selection of performance data that grantees provided to OJJDP for three programs: Title II Formula Grant Program, Youth Mentoring Program, and Gang Prevention Program. As a result of our review—which covered data from October 2015 through December 2018—we determined that these data were not sufficiently reliable for the purpose of providing examples of performance results in this report. For example, we found that grantees reported inconsistent information, such as different numbers of youth served for different performance measures within the same data collection period. Further, some performance measures double-count youth when presenting data by year. OJJDP collects data from discretionary grantees during two 6-month reporting periods and some measures are not designed to be aggregated across time periods. Nevertheless, we found that OJJDP was aware of most of the issues we identified and is taking steps to improve the reliability of grantee- submitted data. For instance, beginning October 2017 (for formula grant programs) and July 2018 (for discretionary grant programs), OJJDP implemented a process to identify inconsistent or otherwise questionable data and reach out to grantees for verification. Appendix II includes information about the issues we found with the data we reviewed and steps OJJDP is taking to improve the reliability of these data. While OJJDP has established goal statements and performance measures, it has not set numeric targets by which it can assess progress for each individual program. For example, one stated goal of the Title II Formula Grant Program is to prevent youth already in the juvenile justice system from reoffending. OJJDP’s annual Title II Formula Grant Program performance reports state the percentage of youth who reoffended, the performance measure for this goal; however, the reports do not provide a target against which to evaluate whether the result reflects progress toward the stated goal. Further, while OJJDP has set several office-wide targets for all programs collectively, these targets may not be appropriate for assessing the progress of individual programs because programs vary in size. For example, according to grantee-submitted performance data, the Title II Formula Grant Program served approximately 100,000 youth in fiscal year 2018, while the Gang Prevention Program served about 1,000 youth in calendar year 2018. Thus, office-level targets, while useful, may be more representative of the performance of OJJDP’s largest programs and obscure the results of individual programs. Since June 2019, OJJDP has been reviewing individual program goal statements and performance measures as part of an OJP-wide review, but this review does not include setting program-level targets. OJJDP officials said that they have not set program-level targets for two reasons: (1) there was uncertainty about whether OJJDP had the authority to do so (versus OJP’s Office of the Chief Financial Officer), and (2) setting such targets has not been a priority for OJJDP in the past, in part, due to a lack of resources. In October 2019, OJP clarified that the OJJDP Administrator has authority for OJJDP performance measurement, including setting program-level and office-level targets. OJJDP officials also stated that program oversight has recently become a higher priority and they plan to bring on new staff; and they agreed with the need to set program-level targets. Tracking performance measures against established numeric targets is a leading practice in performance management. Numeric targets establish standards against which federal programs can measure progress towards goals because comparisons can be easily made between projected performance and actual results. Thus, updating program goal statements and performance measures would be more effective with related numeric targets. One goal of the OJP-wide review is to increase accountability for achieving results. Setting program-level targets could help OJJDP meet this goal by establishing a clear means by which progress toward goals can be measured. According to OJP officials, some of the tools it uses in grant monitoring and compliance auditing consider fraud risk affecting OJJDP grant programs. As previously discussed, OJP’s grant monitoring and compliance auditing broadly consist of three parts: (1) desk reviews that occur annually, (2) risk assessments that assist officials in determining what additional monitoring or auditing activities to perform or how to prioritize them, and (3) additional monitoring or auditing activities, such as enhanced desk reviews or site visits. To carry out these efforts, OJP relies on various tools to assess the overall risk of grantees and awards. Figure 4 provides additional information on the tools that provide insight on fraud risks, according to OJP officials. According to OJP officials, pre-award and ongoing risk assessment processes that apply to all OJJDP grantees are the primary way in which the office identifies fraud risks. The bullets below describe the nature of the primary tools used during these risk assessment processes for all OJJDP grantees and how they provide insights into potential fraud risks. Financial Capability Questionnaire: This questionnaire includes 28 questions designed to provide insight on the financial systems and internal controls a grantee has in place prior to receiving an award. OJP developed the current version of this questionnaire in part as a response to a 2013 DOJ OIG audit, according to OJP officials. All applicants for OJJDP awards are required to fill out this questionnaire, and new grantees’ pre-award risk scores and corresponding risk levels rely, in part, on the applicants’ responses to it. These include detailed questions related to the capabilities of the applicant’s financial management system, such as whether it has the capability to record expenditures by budget cost categories. According to OJP officials, if an applicant’s accounting system cannot do so, the opportunity for fraud increases because the commingling of funds between budget categories would make it difficult to determine whether federal funds were spent in accordance with the approved budget. The questionnaire also includes items related to procurement, travel policy, and subrecipient management and monitoring. These questions may similarly indicate increased fraud risk depending on how the applicant responds. For instance, according to OJP officials, questions related to procurement are designed to determine whether the applicant employs a fair, transparent, and competitive procurement process. If an applicant’s procurement standards do not meet these criteria, the likelihood of fraudulent activity may increase. Grant Assessment Tool: The Grant Assessment Tool helps assess open/active OJJDP awards and grantees against 38 risk criteria. OJP officials identified 14 of these criteria as being indicators of potential fraud risks, such as the results of recent audits, whether the award has subawards or subcontracts, and whether grantees have completed progress reports on time. Officials explained that progress report delinquencies, for example, may be an indicator that a recipient does not have adequate internal controls to handle federal awards, which may provide a greater opportunity for fraud. The Grant Assessment Tool generates a risk score and corresponding monitoring priority for each open/active grantee and award quarterly. According to OJP officials, Grant Assessment Tool criteria have evolved over time in response to common audit or monitoring findings, as well as ongoing coordination with the DOJ OIG, as discussed later. For the Title II Formula Grant Program, grantees are also assigned risk assessment scores and audited using the compliance auditing tools described in the bottom half of figure 4. OJP officials stated that certain responses to any of the questions in the tools used during compliance auditing may indicate inadequate program management or weak internal controls, which may increase the risk of fraudulent activity. OJP officials use a variety of other tools during grant monitoring to monitor each OJJDP grantee or award (see tools in the top half of figure 4). The tools used differ depending on the type and level of monitoring being performed. According to OJP officials, all of the monitoring and auditing tools include detailed questions that provide insight about the strength of a grantee’s internal controls. In cases where a grantee is unable to provide adequate documentation in response to these questions, OJP officials stated that they may have weak internal controls which may increase the risk of fraudulent activity. OJP regularly coordinates with the DOJ OIG on issues related to fraud risk affecting OJJDP grant programs through meetings, trainings, and reviews of OIG audits. Specifically, according to officials, staff from OJP’s Office of Audit, Assessment, and Management meet with the OIG two to three times per year to discuss fraud allegations and ongoing fraud investigations related to OJJDP grant programs. These discussions assist OJP officials in determining their monitoring or auditing plans, but also provide insights about the types of issues that are being referred to the OIG for investigation, which can then inform needed changes to monitoring and auditing tools, according to OJP officials. The OIG also provides training to OJP staff every other year on how to identify and report potential fraud. Additionally, Office of Audit, Assessment, and Management officials regularly review OIG audit findings pertaining to individual grantees and compare them to grant monitoring findings for the same grantees. According to OJP officials, the purpose of these reviews is to evaluate where OJP may be able to improve its monitoring processes. Officials stated that one example of an outcome from such a review is the previously discussed Financial Capability Questionnaire. According to JMD officials, the department is implementing fraud risk management requirements through an iterative process that will be completed over multiple years, which leverages the department’s overall ERM processes. Leading practices for planning and conducting fraud risk assessments acknowledge that assessing fraud risks is an iterative process. According to JMD officials, as a result of this iterative approach, the fraud risk assessments JMD conducted in fiscal years 2017 and 2018 did not fully align with selected leading practices in the Fraud Risk Framework, which include documenting a fraud risk profile. Although the Department continued to implement additional leading practices from the Fraud Risk Framework by developing a fraud risk profile as part of the fiscal year 2019 fraud risk assessment, the fraud risk profile did not include any consideration of DOJ’s fraud risk tolerance—another leading practice identified by the Fraud Risk Framework. In fiscal year 2017, JMD conducted an assessment of fraud risks that consisted of four facilitated discussion groups with relevant officials. One discussion group was tailored to the specific concerns of grant programs—which included grant programs managed by OJJDP—as recommended by leading practices of the Fraud Risk Framework. During the grant-focused facilitated discussion group, participants identified five fraud scenarios relevant to DOJ grant programs, such as misdirection of funds, which occurs when a recipient deliberately misdirects funds in a manner inconsistent with the purpose outlined in the award agreement. After participants reached consensus on the fraud scenarios, they then ranked the inherent risk of each scenario, in alignment with leading practices of the Fraud Risk Framework. DOJ officials also told us that participants ranked residual risk using a voting tool, which required the participants to understand the various management controls in place to address a particular fraud risk. However, the documented outcomes of these discussions did not identify specific fraud risk controls or the extent to which those controls mitigate specific fraud risks, and as a result, it is unclear how these residual risk values were determined. Further, according to officials responsible for managing the fiscal year 2017 effort, the facilitated discussion group did not determine a specific and measurable fraud risk tolerance for DOJ grant programs generally nor discuss specific fraud risk management activities or controls for any specific grant programs. As discussed in greater detail later in this report, leading practices for fraud risk management state that managers should determine a fraud risk tolerance and Standards for Internal Control in the Federal Government states that managers should define risk tolerances in specific and measurable terms so they are clearly stated and can be measured. The fiscal year 2018 effort to assess fraud risk at DOJ consisted of a brief survey about fraud-related issues that was distributed to all DOJ components and was more limited in nature than the fiscal year 2017 effort. Specifically, the fiscal year 2018 questionnaire did not ask the components to identify inherent or residual risks, as was done in the prior year. Further, for the grants category, JMD included four of the five fraud risk areas that were addressed in fiscal year 2017. However, the fiscal year 2018 questionnaire did specifically ask components to identify key fraud risk management activities designed to prevent, detect, or respond to fraud, which had not been part of the fiscal year 2017 effort. Including information about control activities indicates additional maturation of JMD’s fraud risk management activities, but the questionnaire did not ask components to consider the extent to which these control activities mitigate the likelihood and impact of risk—as recommended by leading practices of the Fraud Risk Framework. The questions asked in fiscal year 2018 are shown in table 2 below. According to JMD officials, the components’ responses to this questionnaire were summarized for internal purposes, but no additional analysis or work, such as defining a fraud risk tolerance and documenting a fraud risk profile, was completed for any of the categories listed in table 2. Further, JMD officials stated that the department does not believe a full-scale fraud risk assessment is warranted annually, and the fiscal year 2018 effort was designed to build on the prior year’s assessment. According to officials, this is part of the department’s iterative approach to implementing fraud risk management requirements, which, consistent with leading practices, may not necessarily incorporate all relevant leading practices in each iteration. In December 2019, JMD officials provided the final summary of the fiscal year 2019 fraud risk assessment, which included a fraud risk profile as recommended by leading practices. According to JMD officials, to conduct the fiscal year 2019 fraud risk assessment, JMD officials first created a fraud risk profile template using information from the 2017 and 2018 assessments. Figure 5 shows an excerpt of JMD’s draft fraud risk profile template, as of September 2019. After senior leadership reviewed the pre-populated template, JMD held a facilitated discussion with representatives from each component to evaluate the risk information presented in the template for each topic area. JMD identified several risks for each topic area, including the same five risks for the grants area that were identified in fiscal year 2017. Based on information provided, the fiscal year 2019 fraud risk assessment and resulting fraud risk profile incorporate many leading practices of the Fraud Risk Framework. These include consideration of inherent fraud risk, current fraud risk controls and their suitability (the extent to which control activities mitigate the likelihood and impact of risk), and residual fraud risk. However, the 2019 fraud risk profile did not determine a measurable fraud risk tolerance, or prioritize residual risk against that tolerance for any of the assessed categories, including grants. Managers’ defined risk tolerance may depend on the circumstances of individual programs and other objectives beyond mitigation of fraud risks. Leading practices for fraud risk management state that managers should define a fraud risk tolerance, examine the suitability of existing fraud controls, and then prioritize residual fraud risks. In doing so, managers should consider the extent to which existing control activities mitigate inherent risks and whether the remaining risks exceed managers’ tolerance. Based on this analysis and the defined risk tolerance, managers then rank residual risks in order of priority, and determine their responses, if any, to mitigate those risks that exceed their risk tolerance. JMD officials stated that they did not yet define the department’s fraud risk tolerance for any of the assessed categories because they view it as the next step in the maturation of DOJ’s fraud risk assessment processes. However, JMD did not provide details or documentation of its plans to develop a specific and measurable fraud risk tolerance for the next iteration of their fraud risk assessments. Although following an iterative approach to fraud risk management is consistent with leading practices, until DOJ defines a measurable fraud risk tolerance for the assessed categories, the department may not effectively allocate limited resources to address fraud risks—including those associated with OJJDP grant programs. Specifically, by determining a measurable fraud risk tolerance for the grants category and assessing identified residual fraud risks against that tolerance to prioritize these risks, the department will help ensure that OJJDP’s grant programs are not vulnerable to greater risks than DOJ is willing to tolerate. Doing so will also provide assurance that OJJDP does not unintentionally over-allocate limited funding to address fraud risks the department is willing to tolerate. According to JMD officials, they are in the process of awarding a contract that will result in an implementation plan for addressing fraud risk management requirements in the future. Specifically, in July 2019, JMD released a Request for Quotes for a Blanket Purchase Agreement in support of DOJ’s implementation of OMB Circular A-123. One of the deliverables JMD expects to order under this agreement is an implementation plan for addressing fraud risk management requirements, which will include developing a plan for conducting regular fraud risk assessments consistent with leading practices for fraud risk management. According to officials, they expect to award the agreement by the end of calendar year 2019, after which the contractor will perform task orders issued by JMD that will include details related to the methodology, timeframes, and staffing associated with each deliverable. Because neither the award nor the task orders were in place at the time of our review, we cannot determine whether DOJ’s planned efforts will fully align with the leading practices of the Fraud Risk Framework, but we will continue to monitor DOJ’s efforts during related ongoing work. In fiscal year 2018, OJJDP made 295 awards totaling over $290 million to support programs intended to ensure youth are held appropriately accountable and empower youth to live productive lives. Performance measurement helps ensure funding achieves such outcomes and fraud risk management helps ensure funding is not improperly diverted from this intended purpose. Both of these management principles facilitate stewardship and accountability for federal funds. Since June 2019, OJJDP has been reviewing and updating goal statements and performance measures for individual programs. While OJJDP has office-level targets, it does not have program-level targets. Program-level targets (specific numeric goals) would help OJJDP assess progress toward individual program goals and increase accountability for achieving positive outcomes. Over the past few years, DOJ has taken steps to consider fraud risk for all DOJ grants, including OJJDP’s. Determining a fraud risk tolerance—and assessing residual fraud risk against that tolerance to prioritize these risks—would help OJP calibrate resources to address grant fraud risk for OJJDP programs, helping ensure that resources are not under- or over- allocated. We are making two recommendations, including one to OJJDP and one to JMD. Specifically: The OJJDP Administrator should set performance targets for individual grant programs. (Recommendation 1) The Assistant Attorney General for Administration should ensure that future department-level fraud risk profiles (1) determine the department’s fraud risk tolerance for DOJ grants—which include OJJDP grant programs, and (2) prioritize residual fraud risks based on an assessment against that tolerance, consistent with leading practices in GAO’s Fraud Risk Framework. (Recommendation 2) We provided a draft of this report to DOJ for review and comment. In an email message, an official within JMD stated that the Department concurred with our recommendations. In written comments provided by OJP, which are reproduced in appendix V, the agency concurred with our recommendation that it set performance targets for individual OJJDP programs. Specifically, OJP stated that the OJJDP Administrator will set performance targets, to the extent practical, for OJJDP's current and new grant programs. Further, the OJJDP Administrator will ensure that the performance targets are reviewed annually. We believe this action, if implemented, would address our recommendation. DOJ also concurred with our second recommendation to include a fraud risk tolerance for DOJ grants in future department-level fraud risk profiles, but did not provide details as to how they will address it. DOJ also provided technical comments, which we have incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Attorney General, and other interested parties. In addition, the report is available at no charge on GAO’s website at https://www.gao.gov. If you or your staff have any questions about this report, please contact Gretta Goodwin at (202) 512-8777 GoodwinG@gao.gov or Rebecca Shea at (202) 512-6722 or SheaR@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. Under the Department of Justice Appropriations Act, 2018, the Office of Juvenile Justice and Delinquency Prevention (OJJDP) administered 16 grant programs in fiscal year 2018, corresponding with a total of 53 grant solicitations and 295 awards. OJJDP issued certain grant solicitations to carry out the purposes of more than one program. Table 3 shows OJJDP’s fiscal year 2018 programs and associated information, including the primary source of authority for each program, as identified by OJJDP. To provide examples of performance results from three of the Office of Juvenile Justice and Delinquency Prevention’s (OJJDP) 16 programs funded in fiscal year 2018, we assessed the reliability of key data elements and methods used to calculate selected performance measures. We determined that data grantees submitted to OJJDP for the programs we selected were not sufficiently reliable for this purpose. Nevertheless, we present rounded numbers of “youth served” for two of the programs we selected (2018 data only), as we found these data to be reliable for the specific purpose of illustrating differences in the relative sizes of the programs. This appendix discusses our approach for selecting programs to review, identifying the timeframe of review, and selecting performance measures to review. It also discusses issues we found with the data we reviewed and steps OJJDP is taking to improve the reliability of data submitted by grantees. We selected three of OJJDP’s 16 programs funded in fiscal year 2018 and listed in appendix I. Specifically, we selected the Title II Formula Grant Program because it is OJJDP’s only formula grant program and because it is a comprehensive nationwide program. We selected the Youth Mentoring and Gang Prevention programs from among the 15 discretionary grant programs as a result of the following process: we ranked programs by total amount awarded during fiscal years 2016 through 2018 and randomly selected one program from the top 50 percent and one from the bottom 50 percent, and we excluded programs that we had recently reviewed in other reports—such as the Tribal Youth and Victims of Child Abuse programs. We obtained performance data for the selected programs from OJJDP from October 2015 through December 2018. We chose this timeframe because 2018 was the latest full calendar year for which data were available, and looking back three years was sufficient to capture variations in the programs’ funding levels. We selected seven of OJJDP’s 15 core performance measures for review. Specifically, we selected measures that focus on youth and that objectively measure short-term outputs or outcomes, as follows: number of program youth served number and percent of youth with whom an evidence-based program number and percent of youth completing program requirements number and percent of program youth who offend (short-term) number and percent of program youth who re-offend (short-term) number and percent of program youth who are victimized (short-term); number and percent of program youth who are re-victimized (short- term) Not all of these performance measures are applicable to all programs. Performance measures that assess the number and percent of program youth who offend, re-offend, and are victimized measure both short-term and long-term outcomes, and we focused only on short-term because of the challenge that grantees face in tracking youth after they exit programs, as explained to us by OJJDP officials. We reviewed relevant performance measures, their definitions, and the methodology for calculating them. We reviewed data cleaning and validation procedures that OJJDP uses to verify data provided by grantees. We also tested grantee-submitted data provided to us by OJJDP for missing data, outliers, and inconsistencies. For example, we tested for illogical values, such as different numbers of youth served within the same time period, or numerators that were higher than the denominators (i.e. more youth successfully exiting the program than the total number exiting). Finally, we interviewed knowledgeable OJJDP officials and contractors on several occasions. We determined that the data were not sufficiently reliable for the purpose of providing examples of program performance results due to several limitations (bulleted below). Although not every limitation applies to every program we reviewed, the number and significance of the collective issues identified led us not to use the data as examples of performance results in this report. Performance measure results for discretionary programs are often double-counted when presenting data by year. OJJDP collects data from discretionary grantees every 6-months; however, some performance measures are not designed to be aggregated across time periods. OJJDP acknowledges that aggregating data from two, 6-month time periods often results in double-counting when presenting annualized data. Some grantees report inconsistent numbers of youth served. For instance, in the Gang Prevention program, the total number of youth served from January through June 2018 was reported as 387 and 267 for different performance measures in the same data set (within one reporting period). We also identified instances where grantees reported inconsistent numbers of youth across reporting periods. Some grantees do not respond to requests to verify questionable data. According to OJJDP officials grantees may lack resources or staff capacity to collect data and track youth’s outcomes. As a result, some grantees may submit incorrect data or submit data after the reporting deadline. Beginning October 2017 (for formula grant programs) and July 2018 (for discretionary grant programs), OJJDP implemented a process whereby contractors flag inconsistent or otherwise questionable data and reach out to grantees for clarification. However, according to officials, grantees do not face any consequences if they do not respond to requests from OJJDP for data verification. For instance, for Youth Mentoring program data submitted by grantees for July through December 2018, OJJDP contractors flagged 122 of 630 grantees as having potentially inaccurate data, but subsequently received responses from only 74 of the 122 grantees. Inconsistent performance measure definitions. We found inconsistencies in the definitions for the following performance measures: (1) number and percent of program youth who offend (short-term), and (2) number and percent of program youth who re- offend (short-term). For both measures, one documented definition states that they apply only to youth who offend or re-offend during the reporting period, and another documented definition states that it also applies to youth who exited the program 0-6 months ago. Reporting on a subset of youth not representative of all program youth. OJJDP uses the number of youth “tracked” as the denominator for several of its performance measures, including the number of youth who offend and reoffend. According to OJJDP, the number of youth tracked for the offend and reoffend measures should ideally be the same number as total youth served by a program. However, the number of youth tracked is usually lower than the number of youth served. As a result, the measure often reflects a subset of youth that, according to one official, may have characteristics that are not well understood—such as youth or families who are more willing to be tracked because they have not offended recently—and thus may skew the results. OJJDP acknowledges there are concerns with the quality of the grantee- reported performance measures data. According to OJJDP officials, the limitations are the result of several challenges which they are addressing: Replacing outdated data collection tool. Officials said their current data collection tool is outdated and can be unwieldy and confusing for grantees. Along these lines, the tool only includes automated error checks for a limited amount of data fields and does not include an auto-populate feature, which would prevent grantees from entering illogical or inconsistent data. However, according to Office of Justice Program (OJP) officials, as of October 2019, OJP is designing a new data collection tool for all OJP components—including OJJDP—that will include automated error checks and an auto-populate feature, and they plan to implement this tool beginning in October 2020. Updating performance measures. Officials said that some performance measures are also outdated, such as those that result in duplication when reported annually. Officials also said that some performance measures are confusing to grantees. Nevertheless, as part of an ongoing OJP-wide review of performance measures, OJJDP is in the process of reviewing and updating all OJJDP performance measures and plans to provide updated definitions and instructions to grantees. Increasing grantee response rate for data verification. To increase grantee response rates to data verification requests, OJJDP reported that it is exploring possible consequences for grantees if they do not respond, such as increased scrutiny by OJJDP staff who oversee awards or temporary withholding of funds until verifications are submitted. According to officials, whatever approach (or approaches) they decide on, they will implement them by March 2020. The Office of Juvenile Justice and Delinquency Prevention (OJJDP) within the Department of Justice is responsible for administering grant programs under the Juvenile Justice and Delinquency Prevent Act of 1974. One of these programs, the Title II Formula Grant Program, authorizes the award of formula grants to states to develop programs for juveniles and improve their juvenile justice systems. On December 21, 2018, the Juvenile Justice Reform Act of 2018 (“Reform Act”) enacted amendments to the Title II Formula Grant Program, including new accountability and oversight requirements for grantees and OJJDP. The amendments were not effective until the fiscal year 2020 grant award cycle and did not apply to the period of performance we evaluated for this report, which was through fiscal year 2018. Table 4 summarizes the accountability and oversight requirements now in effect for the Title II Formula Grant Program and the status of OJJDP’s efforts to implement them. The Reform Act also requires several evaluations and assessments to help strengthen OJJDP’s internal controls and identify fraud, waste or abuse in its programs. Table 5 summarizes selected oversight requirements related to the Title II Formula Grant Program. The Title II Formula Grant Program—so called because it was authorized by Title II of the Juvenile Justice and Delinquency Prevention Act of 1974 (JJDPA)—is a state formula grant program, administered by the Office of Juvenile Justice and Delinquency Prevention (OJJDP). The program has been amended several times since 1974—most recently, by the Juvenile Justice Reform Act of 2018 (“Reform Act”), which also called for this evaluation of OJJDP’s performance. The performance data we reviewed (which covers Title II Formula Grants from October 2015 through September 2018) corresponds with statutory requirements in effect at that time, not the current requirements, as amended by the Reform Act, which apply to grant awards made in fiscal year 2020 and subsequent fiscal years. To be consistent with the data we reviewed, this appendix presents information on program requirements that applied prior to fiscal year 2020. Because these requirements are no longer current, we will differentiate them from those that are by citing the superseded edition of the U.S. Code in which they appear—(2012 & Supp. V 2018)—in comparison to the 2018 Main Edition (2018), which contains the provisions now in force. The term “compliance auditing” refers to OJJDP’s process for (1) auditing the compliance monitoring systems used by states, and (2) evaluating states’ compliance with four core requirements specified in law. During the grant application process, the four core requirements are among several (previously 28, now 33) that a state’s 3-year plan must satisfy for the state to be eligible for award. However, unlike the other eligibility requirements, the four core requirements can trigger a reduction to a state’s grant allocation unless the state maintains compliance during performance. States must provide adequate systems of monitoring their compliance with three of the four core requirements—i.e. those related to when and where juveniles may be detained in detention or correctional facilities—and OJJDP must audit the adequacy of states’ compliance monitoring systems. OJJDP must also determine whether states maintained compliance with each of the four core requirements and, if not, OJJDP must reduce the state’s allocation the following fiscal year by at least 20 percent for each core requirement that the state failed to meet. During the period covered in our review (i.e., prior to fiscal year 2020), the four core requirements subject to compliance auditing were: 1. Deinstitutionalization of status offenders—which prohibits states from using secure detention or correctional facilities to hold juveniles charged with status offenses (except for a listed few). This requirement also applies to juveniles not charged with an offense but who enter the justice system as aliens or as dependent, neglected or abused youths. 2. Separation of juveniles from adult inmates—which prohibits a state from detaining or confining juveniles protected by the deinstitutionalization of status offenders requirement (see above), or juveniles who are alleged or found to be delinquent, in any institution where they have contact with adult inmates. 3. Removal of juveniles from adult jails and lockups—which prohibits a state from detaining or confining juveniles in adult jails or lockups, except in limited circumstances and for specified periods of time, and only if the juvenile has no contact with adult inmates. 4. Addressing disproportionate minority contact—which requires a state to address the disproportionate number of minority youth who come into contact with the juvenile justice system. OJJDP’s compliance auditing process during the majority of the period of our review is set forth in a 2017 OJJDP policy document. According to this policy, OJJDP conducts a comprehensive assessment and makes a determination whether the state is in compliance with each of the four core requirements. The comprehensive assessment includes verification of the data submitted, an analysis of the data submitted by the state to evaluate compliance with each of the four core requirements, and a review to assess the adequacy of internal controls over the state’s compliance monitoring process for collecting and reporting compliance monitoring data. According to this policy, the OJJDP Administrator issues correspondence annually regarding final compliance determinations. These determinations include, as necessary, specific details regarding why a state was determined to be out of compliance with any of the four core requirements or the required compliance monitoring system. Per the policy, a state’s formula grant funding will be reduced by 20 percent for each core requirement with which OJJDP has determined a state to be out of compliance. Additionally, if OJJDP determines that the state has an inadequate system of monitoring, the state may have receipt of its formula grant funding withheld or may be deemed ineligible for a formula grant award. Finally, according to this policy, OJJDP conducts field audits on a rotating schedule. The purpose of the field audits is to confirm state compliance monitoring activity and practices through direct onsite observation and file review, and to identify needed areas for technical assistance. OJJDP anticipates, with available funding and resources, that every state will receive a field audit every three years. In addition to the contacts named above, Tonnyé Conner-White (Assistant Director), Jonathan Oldmixon (Assistant Director), Jeff Jensen (Analyst-in-Charge), James Ashley, Dominick Dale, Christine Davis, Caroline DeCelles, Elizabeth Dretsch, Eric Hauswirth, Elizabeth Kowalewski, Ben Licht, Jan Montgomery, Heidi Nielson, and Abby Volk, made key contributions to this report.", "summary": "OJJDP administers grant programs to improve positive outcomes for juveniles in the justice system. In fiscal year 2018, OJJDP made 295 awards across 16 programs totaling over $290 million. The Juvenile Justice Reform Act of 2018 included a provision for GAO to review OJJDP performance and internal controls intended to prevent fraud, waste, and abuse of grant funds. This report examines the extent to which (1) OJJDP has goals and measures to assess the performance of its programs, and (2) DOJ has considered fraud risks for OJJDP grant programs. GAO reviewed DOJ documentation, such as OJJDP's Performance Measures Manual and OJP's risk management policy. GAO also reviewed performance data from selected OJJDP programs from October 2015 through December 2018, and interviewed DOJ officials. The Department of Justice's (DOJ) Office of Juvenile Justice and Delinquency Prevention (OJJDP) has goal statements and performance measures for each of its programs, but has not established corresponding program-level targets (specific numeric goals). Rather, OJJDP has established several office-level targets to help assess progress across OJJDP grant programs collectively. For example, OJJDP has a target for the percent of youth who offend and reoffend across all applicable grant programs. Such office-level targets, while useful, might obscure the results of individual programs. Setting program-level targets would help OJJDP assess the progress of each program and reach its goal of increasing accountability for achieving results in individual programs. DOJ's Office of Justice Programs (OJP) and DOJ's Justice Management Division (JMD) have taken steps to consider fraud risk affecting OJJDP programs. Specifically, OJP—the grant-making component in which OJJDP resides—has tools it uses to monitor grantee performance and compliance with award terms and conditions. According to OJP, these tools—such as checklists used during desk reviews and site visit audits—provide insight into grant fraud risks. Additionally, JMD—the component that manages fraud risk assessment across all components within DOJ—has taken steps to assess fraud risks affecting OJJDP grant programs. Specifically, JMD conducted department-wide fraud risk assessments in fiscal years 2017, 2018, and 2019. These assessments addressed all DOJ grants, including OJJDP's. DOJ's 2017 assessment identified fraud risk scenarios and assessed their likelihood and impact—leading practices in GAO's Fraud Risk Framework. Building on the 2017 assessment, the 2018 assessment identified key fraud risk management activities, and the 2019 assessment resulted in a fraud risk profile. However, these assessments did not determine a fraud risk tolerance—i.e. managers' willingness to accept a specific level of risk—as it relates to OJJDP grant programs. JMD officials said they view this as the next step in the maturation of DOJ's fraud risk assessment processes, but did not have details or documentation of plans to do so. Determining a fraud risk tolerance—and assessing fraud risks against that tolerance to prioritize them—would help OJP calibrate resources to address grant fraud risk for OJJDP programs, helping ensure that resources are not under- or over-allocated. GAO recommends that (1) OJJDP set performance targets for individual grant programs, and (2) DOJ determine the agency's fraud risk tolerance for all grants—which include OJJDP grant programs—and prioritize fraud risks based on an assessment against that tolerance. DOJ concurred with both recommendations.", "document_type": "gao"}
{"report": "To ensure sound management and long-term stability in their operations, organizations track their financial activities (transactions), such as expenses they incur and income they generate. Organizations record their daily transactions, which increase or decrease account balances, in their accounting systems. For example, an organization’s “cash balance” account increases when customers make payments due for goods or services previously provided, while other account balances, such as “accounts receivable” (the amount owed to an organization for goods or services provided), decrease because customers are paying part of what they owed to the organization. At DOD, as seen in figure 1, this daily process of recording transactions in accounting systems occurs at individual DOD components. These components use multiple accounting systems to record and summarize their financial transactions. Each month, quarter, and year, components send summarized financial information to DFAS, the DOD agency that provides accounting support for DOD. DOD’s core financial reporting system consolidates the summarized financial information from individual components into DOD’s department-wide financial information. Financial statements provide information about an organization’s financial position—such as assets (what it owns) and liabilities (what it owes)—as of a certain point in time, in addition to the financial results of its operations—such as revenue (what came in) and expenses (what went out)—over a period of time, such as a fiscal year. Financial statements are prepared based on the summarized, or consolidated, financial information from an organization’s accounting systems. Their reliability depends on there being accurate financial information in the accounting systems. Federal agencies such as DOD combine summarized financial information from their subsidiary organizations (e.g., DOD’s military components—Army, Air Force, Navy, and Marine Corps) to produce consolidated financial statements, as seen in figure 2. Agency management takes steps to ensure that the financial information contained in financial statements is reliable and accurate. Federal agencies submit their financial information to the Department of the Treasury (Treasury), which then combines the information for presentation in the consolidated financial statements of the U.S. government. Reliable and complete financial information is necessary to help agency management and Congress understand the agency’s finances, make informed policy and resource decisions, and hold agency officials accountable for their use of these resources. Accounting adjustments are used to record corrections or adjustments to transactions in an accounting system. They are usually prepared at the end of an accounting period to adjust ending account balances. For example, accounting adjustments can be recorded monthly, quarterly, or annually to record or accrue an activity that is not accounted for in the organization’s accounting systems, such as certain payroll expenses; correct errors identified in processing financial information; record transactions based on the result of reconciliations; record additional information at the request of a subsidiary organization; or record necessary accounting adjustments caused by accounting system limitations or timing differences. Organizations often record such accounting adjustments when preparing financial statements. For example, adjustments to eliminate intragovernmental transactions, such as accounts receivable and sales, may be recorded. These adjustments are particularly necessary to consolidate information from subsidiary organizations and properly present consolidated financial statements. At DOD, components record accounting adjustments within their own accounting systems, and DFAS records adjustments at the consolidated level in DOD’s core financial reporting system. DFAS often has to reformat the summary information it receives from the components’ accounting systems before DOD’s core financial reporting system can accept and process it. To address these or other issues in the financial information it receives as part of the consolidation process, DFAS records accounting adjustments. See figure 3 for an example of where accounting adjustments can be recorded during the consolidation process. DFAS records accounting adjustments both manually and automatically in an accounting system. DFAS personnel record manual adjustments to (1) adjust errors identified during the financial statement compilation process, (2) record necessary accounting adjustments caused by system limitations or timing differences, and (3) prepare required month-end and year-end closing adjustments. System-generated adjustments are automatically recorded in the accounting system without manual involvement. DFAS uses system-generated adjustments when the volume of adjustments needed for a particular purpose is too high and labor-intensive for the adjustments to be recorded manually. For the fourth quarter of fiscal year 2018, DFAS processed 18,521 manual and 181,947 system-generated adjustments at the consolidated level. During the fourth quarter of fiscal year 2018, as noted above, DFAS recorded, at a DOD consolidated level, over 200,000 accounting adjustments in DOD’s core financial reporting system. The large volume of these adjustments is one of the major impediments to DOD maintaining accurate and reliable financial information. While some of these adjustments are expected in the routine course of business, others—such as those DOD records to force account balances to match—are not. We found that DFAS’s lack of reliable business processes and limitations in the source-level accounting systems that DOD components use to process financial information leads them to record adjustments to remove and replace component-submitted financial information in order to force account balances to agree with Treasury balances. The recording of these types of adjustments was identified as a material weakness in DOD’s internal control over financial reporting in its fiscal year 2019 financial statement audit. While DOD has taken steps to address this issue, because of the multitude of contributing factors involved, DOD faces significant challenges in its effort to successfully reconcile its account balances with Treasury and eliminate the need for recording these adjustments. Some manual and system-generated accounting adjustments are expected in the routine course of business and are recurring in nature. For example, elimination adjustments for intragovernmental balances, as previously discussed, are necessary in order to avoid overstating the account balances of subsidiary organizations in the consolidated financial information. The need for these types of adjustments occurs on a regular basis when two or more DOD components enter into business transactions with each other. For example, when the Army purchases weapons from the Defense Logistics Agency, the Army records the transaction as an expense while the Defense Logistics Agency records this transaction as revenue in its accounting system. At the DOD consolidated level, both the revenue and expense reported at the subsidiary level need to be eliminated to avoid overstating revenue and expense for DOD as a whole. These elimination adjustments are routine, expected, and recurring because they must be prepared every time DFAS compiles DOD’s quarterly and annual consolidated financial statements. Other adjustments, such as those DFAS records in order to force account balances to match (forced-balance adjustments) are not expected within the routine course of business. DOD defines a forced-balance adjustment as any amount recorded, usually at a summary level, to eliminate differences between the component’s general ledger balance and Treasury’s control total. Such adjustments, recorded without adequate supporting documentation at the transaction level, are commonly referred to by the accounting community as plugs. Fund Balance with Treasury (FBWT) adjustments are one example of forced-balance adjustments DFAS records to eliminate differences between its cash balances and the amounts Treasury reported. In the federal government, Treasury acts as the government’s bank and keeps an official record of the remaining spending authority for each agency. Consequently, reconciling an agency’s FBWT account with Treasury- reported amounts is similar to an individual reconciling a checkbook to a bank statement. Treasury requires agencies to reconcile their cash balances each month with the balances reported in Treasury’s records. However, DOD generally records adjustments to make its FBWT agree with Treasury’s records rather than performing proper research to identify what caused the differences. (See fig. 4 for more information on forced- balance adjustments.) The use of forced-balance accounting adjustments affects the reliability of an organization’s financial information and may indicate weaknesses within its systems and processes. Over the years, DOD’s practice of recording forced-balance adjustments has been questioned by GAO and by DOD’s auditors. For example, in an audit of the Army General Fund’s reconciliation process for the FBWT account, DOD’s Office of Inspector General (OIG) stated that the Army and personnel in DFAS’s Indianapolis office “make forced-balance adjustments, which are unsupported manual and system-generated adjustments.” GAO and an independent accounting firm both reported similar practices at the Navy and Marine Corps. These audits have repeatedly identified limitations within the source-level accounting systems that DOD components use and the multitude of legacy systems (computer systems that are outdated or that can no longer receive support and maintenance but are still essential for an organization) as the main contributing factors for the use of forced- balance adjustments. DOD’s Financial Management Regulation (FMR) states that a forced- balance adjustment does not represent an adequate reconciliation. Instead, DOD components are required to maintain detailed reconciliation documentation to provide an adequate audit trail. Further, according to the FMR, a reconciliation is not complete until all differences are identified, accountability is assigned, differences are explained, and appropriate adjustments are made to records. These activities are needed to establish an adequate audit trail. Despite this policy, during the fourth quarter of fiscal year 2018, we found that DFAS recorded approximately 36,000, or over 17 percent of the total accounting adjustments, to force the FBWT accounts to agree with Treasury. Out of the 242 fiscal year 2018 fourth quarter accounting adjustments we selected for testing, nine were FBWT forced-balance accounting adjustments related to undistributed collections and disbursements. Based on our review of these adjustments, we found that DFAS continues to rely on forced-balance adjustments to correct the differences between amounts DOD recorded and those that Treasury reported without properly investigating and resolving the differences. Specifically, we found that DFAS systematically recorded forced-balance adjustments to replace information that DOD components submitted with the amounts that Treasury reported without reconciling and researching the causes of differences and making any appropriate adjustments. DFAS indicated that it performs reconciliations on the FBWT accounts when compiling financial statements and researches the causes of any differences arising from these reconciliations after it records the forced-balance adjustments. However, for our sample of nine FBWT forced-balance adjustments related to undistributed collections and disbursements, DFAS was unable to provide evidence that these reconciliations were performed or that the causes of differences were researched or resolved. Rather, DFAS provided a general description of the reconciliation process it expects each of the three DFAS sites to perform. According to DOD officials, DOD has identified some key causes of the long-standing challenges in reconciling its account balances with Treasury. As noted above, many of these challenges are caused by timing issues, limitations in the source-level accounting systems that DOD components use, or the multitude of legacy systems that different DOD components use. To address these challenges, DOD is currently implementing enterprise resource planning (ERP) systems in the military services, such as the Defense Enterprise Accounting and Management System that the Air Force uses. These systems will replace the current legacy systems across DOD with the expectation of a full transition to ERP systems at all military services by 2025, at which point DOD expects the need to record forced-balance adjustments to decrease. OUSD (Comptroller) has a plan for implementing ERP systems at smaller DOD components that also use legacy systems. However, the challenges that legacy systems cause are likely to continue until the ERP transitions are completed and ERP systems are fully implemented at the military services and smaller DOD components. A DFAS official stated that until DOD fully implements the ERP systems, DFAS does not have any plans to modify the current financial management environment to eliminate the recording of these types of adjustments. As noted earlier, as part of the routine course of business certain adjustments will still need to be made following the full implementation of the ERP systems. Along with DOD’s implementing of the ERP systems, DOD officials stated that some DFAS sites, in coordination with various DOD components, have implemented tools to help them reconcile FBWT balances and research the causes of any differences arising during these reconciliations. According to DOD officials, these tools have the ability to produce supporting documentation for management and auditors to use when reviewing FBWT accounts. However, DFAS did not provide supporting documentation for these reconciliations in order for us to verify that they had been performed. Until DOD consistently performs and documents the required reconciliations to identify the causes for these types of adjustments and takes a holistic approach to resolving them, DOD’s financial management issues—such as those associated with FBWT—are likely to continue, resulting in a continued inability to produce reliable and auditable consolidated financial statements. Establishing clear policies and procedures for recording accounting adjustments is crucial for (1) ensuring that accounting adjustments are properly recorded and adequately supported with documentation; (2) identifying the underlying causes for the recording of adjustments; and (3) developing, implementing, and monitoring action plans to reduce the need for accounting adjustments. We found that DOD and DFAS policies and procedures for recording accounting adjustments were insufficient, outdated, and not consistently implemented. Additionally, we found that DOD and DFAS lacked policies and procedures in certain key areas, such as performing cause analyses and developing action plans to reduce the need for accounting adjustments. By not ensuring that policies and procedures are up-to-date and consistently implemented, DOD faces an increased risk that inaccurate, invalid, or unapproved adjustments will be recorded in its core financial reporting system, resulting in misstatements in its consolidated financial statements. System-generated accounting adjustments are recorded automatically in an accounting system and have unique characteristics and processes that differ from those applicable to manual accounting adjustments. Unlike manual adjustments, which are initiated, recorded, and approved in the accounting system by a person, system-generated adjustments are guided by business rules embedded in an accounting system. These business rules drive the accounting adjustment process and are configured to record the adjustment when certain conditions are met. We found that DFAS lacked documentation to support the business rules, such as documentation of programming logic that creates the system- generated adjustments. Based on our review of accounting adjustments at DOD, we found that system-generated adjustments are recorded in large numbers and account for the majority of the accounting adjustments that DFAS recorded. For example, for the fourth quarter of fiscal year 2018, system- generated accounting adjustments accounted for over 90 percent of the total volume of adjustments recorded in DOD’s core financial reporting system at the consolidated level. Given the magnitude and unique characteristics of system-generated adjustments, developing and maintaining adequate supporting documentation are critical. According to the FMR, adjustments to the accounting records should be supported with sufficiently detailed written documentation to provide an audit trail to the source transaction that requires the adjustment. Further, the FMR requires supporting documentation to include information such as the reason for the adjustment, calculation of the adjustment amount, and evidence of managerial review and approval of the adjustment. To support certain types of recurring system-generated adjustments, DFAS developed eight standardized narratives that include the reasons for the adjustments and the documentation DFAS considers necessary to support the adjustments. Other recurring system-generated adjustments are recorded based on System Change Requests, which are proposals to modify information in an accounting system such as revising programming logic and coding changes. In the fourth quarter of fiscal year 2018, DOD determined that 74 percent of the recorded system- generated adjustments related to four of the eight standardized narratives. Most of the System Change Requests we tested related to financial information migration from a legacy system to a new responsible work area for the U.S. Army Corps of Engineers. DFAS annually selects and reviews a random sample of 40 system- generated adjustments related to each type of narrative for which supporting packages are prepared. According to DFAS officials, the supporting package preparation for the selected sample involves verifying that the adjustments impacted the intended accounts. If no issues are identified, DFAS concludes that the core financial reporting system recorded the adjustments as intended, the desired results were achieved, and the adjustments were supported. Within a given year, if DFAS sample testing demonstrates that a certain type of system-generated adjustment was supported, DFAS categorizes all the accounting adjustments that relate to this particular type as supported for the rest of the year. We found that other than the supporting packages created specifically for the periodic random samples, DFAS maintains no other documentation to support the system-generated adjustments related to each of the eight narratives. As part of our audit, we selected for testing 242 accounting adjustments that impacted the financial statements for the fourth quarter of fiscal year 2018, of which 93 were system-generated accounting adjustments. Of these 93 adjustments, DFAS categorized 42 as unsupported and 51 as supported. DFAS categorized adjustments as either supported or unsupported depending upon the circumstances. The circumstances considered include whether it relates to one of the eight narratives or to specific System Change Requests. When the eight narratives are tested, if no issues are identified as part of the testing, the transactions linked to that narrative are considered supported. However, we determined that the corresponding narratives and System Change Requests were insufficient support for the 51 adjustments categorized as supported because we were unable to verify the validity and accuracy of the adjustments with supporting documentation. In addition, we found that DFAS did not maintain evidence demonstrating the review and approval of the programming of predefined business rules in the systems that recorded the adjustments. When our results are projected to the fiscal year 2018 fourth quarter population of 181,947 system-generated adjustments, we estimate that at least 96 percent of the system-generated accounting adjustments were recorded without adequate supporting documentation, which is required by DOD’s policy and procedures and federal internal control standards. In 2018, DFAS’s auditor issued a finding identifying similar issues with DFAS’s system- generated adjustments related to the scope of the eight narratives. As of November 2019, this finding was still open. Standards for Internal Control in the Federal Government requires that management design control activities to achieve objectives and respond to risks, such as designing controls to help ensure accurate and timely recording and maintenance of appropriate transaction documentation. Although the FMR has guidance on supporting documentation requirements for accounting adjustments, we found that DOD’s FMR does not clearly define or include examples of what constitutes adequate supporting documentation of system-generated accounting adjustments. Specifically, the FMR does not differentiate between documentation requirements for manual and system-generated accounting adjustments. Rather, it states that reporting organizations must maintain adequate documentation, audit trails, and internal controls, and that the documentation must be made available upon request. Because system- generated accounting adjustments consist of summary-level financial information, DFAS officials stated that maintaining documentation at a detailed level would be impractical given the large volume of transactions at DOD. However, without adequate supporting documentation for the business rules driving the recording of these adjustments, such as documentation of the programming logic for these adjustments, management and others cannot determine whether an adjustment was recorded for a valid reason or for the correct amount. The March 2002 version of the DOD’s FMR, volume 6A, chapter 2, established 10 category codes that are used to identify the circumstances under which accounting adjustments may be recorded. For example, DFAS uses category A for reversing entries for a prior reporting period and category B for data call adjustments. Additionally, the FMR specifies the required documentation needed to support each category. For example, for category A adjustments, adequate documentation includes information on the original entry and a statement that the adjustment is a reversing entry, whereas for category B adjustments, documentation requirements include information on the summarized amount and identification of the source or location of the transaction-level detail for the adjustment. DOD’s core financial reporting system is designed to allow a DFAS accountant to select one of these 10 codes when recording an adjustment. Since these codes are used to identify the required documentation to support the adjustments, it is important that the codes are periodically reviewed to ensure that they are still relevant in DOD’s current financial reporting environment and that supporting documentation requirements are appropriate. We found that some of the category codes were rarely used and new codes may need to be added to reflect the current financial reporting environment. For example, we found that of the 18,521 manual adjustments recorded in DOD’s core financial reporting system during the fourth quarter of fiscal year 2018, category F (supply management inventory) was used only four times. According to DFAS officials, this code was primarily used to adjust the purchase cost of certain supplies, but those adjustments are now rarely needed. DFAS officials stated that the codes had not been reviewed for continued relevance since they were first established and expressed a need to revisit the current categorization scheme to determine whether the codes should be redefined. The most recent update of FMR, volume 6A, chapter 2, in June 2019 included the addition of category M, the first code added since 2002. According to DFAS officials, this code was not added based on a thorough review of the existing codes but because there was already a substantial volume of data call adjustments taking place in the Data Collection Module. Further, a DOD official suggested that an additional code may be needed for tie-point adjustments, which DFAS accountants frequently record as a result of tie-point reconciliation. We found that 34 of the 149 manual accounting adjustments we tested related to tie-point adjustments. Because there is not a designated category code for tie-point adjustments, we found that accountants used various other category codes when recording the 34 tie-point adjustments, including D (Recognition of Undistributed Disbursements and Collections), E (Reconciliation of Trial Balance and Budget Execution Reports), G (Reclassification of Accounts), H (Identified Errors and Reasonableness Checks), I (Adjustment to Balance Reports Internally), or at times no category code. As a result, there may be inconsistency in the documentation maintained to support tie-point adjustments. Having a single category code for tie-point adjustments could standardize recording by accountants, enabling DFAS to identify the frequency with which tie- point adjustments are recorded and ensure that it maintains adequate supporting documentation. Standards for Internal Control in the Federal Government requires that management implement control activities through policies. To do this, management periodically reviews policies, procedures, and related control activities for continued relevance and effectiveness in achieving the organization’s objectives or addressing related risks. The DOD FMR Revision Standard Operating Procedures indicates that the FMR is reviewed every 2 years. However, based on our discussion with DOD officials, a thorough review of the category codes has not been performed and is needed to ensure the ongoing applicability of current category codes or the need for additional codes to reflect the current financial reporting environment. Without category codes for accounting adjustments that reflect current business needs, there is an increased risk that the reasons for recording these adjustments will not be properly captured and adequate supporting documentation will not be specified or maintained, hindering DFAS’s ability to provide DOD management or auditors with reliable information about recorded accounting adjustments. The FMR identifies critical elements that need to be included as part of the supporting documentation package when recording manual accounting adjustments. These elements include (1) correct appropriation and accounting information, (2) balanced adjustments, (3) approvals, (4) supporting documentation, and (5) valid U.S. Standard General Ledger (USSGL) account numbers. The FMR further states that supporting documentation included in the package must include, among other things, elements to enable the assessment of the (1) accuracy and completeness of financial information recorded, (2) applicable criteria to support the reason for recording the adjustment, (3) specific expenditure or receipt accounts used, and (4) calculation of the dollar amount of the adjustment. For the fourth quarter of fiscal year 2018, we selected a sample of manual and system-generated adjustments to determine if the supporting documentation for these adjustments included the critical elements described in DOD’s FMR. We found that DFAS accountants did not consistently follow the DOD FMR and DFAS’s policies and procedures for some of these critical elements, resulting in (1) the failure to maintain adequate supporting documentation, (2) the recording of out-of-balance accounting adjustments, and (3) the use of account numbers that do not comply with the USSGL. Inadequate supporting documentation: We found that 51 of the 87 manual adjustments we reviewed that DFAS categorized as supported did not contain supporting documentation required by the DOD FMR. For example, we found instances where supporting documentation packages were missing information to support the reason for recording the adjustment or detailed worksheets to support the calculation of the adjustment amount. DFAS officials explained that 30 of the 51 adjustments resulted from a major change in how DFAS processes U.S. Army Corps of Engineers’ financial information. Because of time sensitivity and based on a risk analysis, management decided to process over 3,000 manual adjustments for the fourth quarter of fiscal year 2018, including the 30 that were selected for our sample, without preparing supporting documentation for these individual adjustments. We also found that not all supporting documentation packages included a DFAS Form 9339, DFAS Journal Voucher Catalog and Checklist, as required by DFAS’s Interim Policy Memorandum. This memorandum requires that all manual accounting adjustments, whether classified as supported or unsupported by DFAS, include a Form 9339 to help ensure the inclusion of the appropriate supporting documentation. We reviewed 149 manual adjustments and found that 94 included a Form 9339. Our review of these 94 accounting adjustments found that 28 lacked the required information. For example, nine packages did not include one or more of the necessary elements required by Form 9339. We found instances where source information, customer coordination, document labeling, before and after trial balances, narratives, or a combination of these were missing. For six of the nine packages, DFAS agreed that some of the necessary data elements were missing; for the remaining three packages, DFAS’s response did not fully address the reasons for the missing documentation. DFAS officials stated that one of the reasons why these errors may have occurred was because the implementation of the Interim Policy Memorandum was in its beginning stages when we selected our fourth quarter fiscal year 2018 sample. The policy memorandum was dated June 11, 2018, and was effective immediately. We also found that 19 adjustments lacked the required root cause indicator code on the Form 9339. According to DFAS officials, DFAS Cleveland prepared those 19 forms. DFAS Cleveland officials explained that in collaboration with the Navy Financial Management Office, DFAS Cleveland’s senior leadership decided to deviate from the Interim Policy Memorandum and not include the root cause indicator code in the Form 9339 when recording Navy’s related accounting adjustments. Rather, DFAS Cleveland developed its own system to identify root causes by using a unique identifier code. However, the Interim Policy Memorandum does not exclude any DFAS site from adhering to the requirement, and DFAS was unable to provide documentation to demonstrate that DFAS Cleveland had authorization to deviate from this policy. According to DFAS officials, DFAS Cleveland will begin including the root cause indicator code on the Form 9339, starting second quarter of fiscal year 2020. Out-of-balance adjustments: We found that about 2,800 manual adjustments, or approximately 15 percent of all manual adjustments recorded at the DOD consolidated level for the fourth quarter of fiscal year 2018, were out-of-balance. For example, we identified one adjustment in which DFAS decreased its FBWT account by $14,232,000 without recording a change to a corresponding account. DOD’s FMR requires that all recorded accounting adjustments be balanced. Additionally, we found that the FMR does not identify any situations where an out-of-balance adjustment is allowable, despite DFAS officials stating that out-of-balance adjustments are sometimes necessary. Auditors of the military services found that reasons for out-of-balance financial information include (1) service-level general ledger systems are not effectively designed to prevent incomplete transactions from being recorded and (2) controls are not in place at the service level to detect these errors in a timely manner. According to DFAS officials, out-of-balance adjustments are recorded to correct out-of-balance financial information received from DOD components’ accounting systems. Use of non-USSGL-compliant accounts: During our review of fourth quarter fiscal year 2018 manual and system-generated adjustments, we found that over 13,000 adjustments (over 6 percent) recorded at the DOD consolidated level used non-USSGL-compliant accounts, which are not allowed by the Treasury Financial Manual or DOD FMR. The Federal Financial Management Improvement Act of 1996 requires certain federal agencies, such as DOD, to use the specific and standardized set of accounts referred to as the USSGL in their financial reporting systems. Treasury maintains this set of accounts annually to help ensure the comparability of financial information across the federal government. DFAS officials stated that these noncompliant accounts are referred to as memo accounts and were primarily used for management planning purposes. They further explained that DOD had controls in place to prevent financial information recorded in memo accounts in DOD’s core financial reporting system from being transferred into the financial reporting systems, which Treasury uses to compile the U.S. government consolidated financial statements. DOD OIG also reported issues related to DOD’s use of noncompliant accounts, which it identified in fiscal year 2018. In addition, in DOD’s Fiscal Year 2018 Agency Financial Report, management acknowledged that DOD’s financial management systems did not comply with the USSGL at the transaction level. In response, the DOD Deputy Chief Financial Officer issued a memorandum on March 15, 2019, acknowledging that DOD components must use the established USSGL accounts identified in the Treasury Financial Manual for financial reporting purposes. Additionally, the memorandum stated that supporting documentation must be maintained for any accounting adjustments recorded using memo accounts. However, for the seven non-USSGL-compliant adjustments included within our sample of manual and system-generated adjustments, we found that documentation had not been maintained. Proper recording of adjustments is crucial for ensuring that the financial information accurately reflects the financial transactions that have occurred. This includes maintaining adequate supporting documentation and implementing review procedures to help ensure controls are in place to detect errors in a timely manner. Failure to fully adhere to established procedures increases the risk that inaccurate accounting adjustments will be recorded, thereby reducing the reliability of reported financial information and potentially causing misstatements in the DOD consolidated financial statements. Organizations use root cause analysis as a tool to identify and evaluate systems, processes, or both that prompted the recording of an accounting adjustment. For certain adjustments, it may be determined that a root cause analysis or action plan is not necessary—for instance, if the adjustment is onetime or nonroutine. However, information obtained through a root cause analysis may be used to make system or process changes within a specific program, thus reducing the need to record adjustments. Once a root cause has been identified and analyzed, an organization should create an action plan that describes the steps to be taken to address the root cause and monitors the effectiveness of the actions taken. Figure 5 illustrates the identification, implementation, and monitoring of accounting adjustment root causes and related action plans. We found that although DFAS headquarters and its individual sites perform root cause analysis and develop and take some actions to address the identified causes, neither DOD nor DFAS has established policies and procedures that require staff to perform root cause analysis; develop and implement action plans for issues that DFAS staff identified; or monitor the effectiveness of action plans in eliminating the need for accounting adjustments. DFAS officials acknowledged that there are no policies in place requiring DFAS to perform root cause analyses that would permit them to compare root causes for accounting adjustments at a consolidated level across the DFAS sites. DFAS and its sites identify root causes for individual accounting adjustments when accountants select a root cause indicator code when recording the adjustment. DFAS staff also identify root causes for accounting adjustments at an aggregate level when preparing summary metrics on adjustment types. For example, we found that in addition to the requirements previously discussed, Form 9339 requires accountants across all DFAS sites to prepare “white papers/narratives (white papers) each time a manual adjustment is recorded.” Our review of these white papers identified that some DFAS sites use the white papers to document the root cause analyses while others do not because DFAS has not provided a template that identifies the minimum required information to be included in the white papers. As a result, we found that individual DFAS sites do not use standardized white paper templates and that the information included in the white papers was not always consistent between and within the DFAS sites. Inconsistency between DFAS sites: Our review of 52 white papers found that DFAS Indianapolis was the only site to include information such as scope, source system, and financial statement impact of the accounting adjustment in its white papers, while DFAS Columbus was the only site that included corrective actions taken. (See fig. 6.) Inconsistency within a DFAS site: Our review of 52 white papers found that DFAS Indianapolis did not consistently include background, purpose of the adjustment, a description of the root cause, posting logic, financial statement impact, pending action, source system, and scope in all white papers it prepared. Some white papers had these elements and others did not. We found similar issues with the white papers prepared by DFAS Columbus and DFAS Cleveland. Figure 7 illustrates information included in white papers that was inconsistent within a DFAS site. We also found that DFAS does not have policies and procedures requiring the identification and implementation of action plans to address the cause of and need for accounting adjustments that staff identified internally. This resulted in inconsistencies in how the different DFAS sites developed and implemented action plans. For example, we found that 73 of the 98 manual and system-generated unsupported adjustment packages that included a root cause analysis that we reviewed did not include an action plan to address the root cause. Based on this testing, we estimate that at least 88 percent of fourth quarter fiscal year 2018 unsupported adjustments for which a root cause analysis was performed did not have a documented action plan. For the remaining 25 packages with documented action plans, we found that only two included steps documenting how the action plan was to be implemented. The remaining 23 packages with documented action plans lacked implementation details, and DFAS officials stated that they were waiting for resolution from the relevant DOD components. DFAS officials stated that they prepare and document action plans for issues that affect multiple accounting adjustments but not for issues that affect only one adjustment (unique root cause). Unique root causes do not necessitate action plans and are resolved the following month through DFAS working with the affected DOD components. According to DFAS officials, many of the action plans are discussed in biweekly and monthly meetings, but these action plans are not documented. Finally, we found that DOD and DFAS do not have policies and procedures requiring management to monitor the results of action plans that individual DFAS sites prepared or to measure whether implemented action plans are effective in addressing the causes for accounting adjustments. DFAS management activities were limited to periodically reviewing summary metrics on the numbers and types of accounting adjustments recorded. These metrics did not contain detailed information, such as the causes of accounting adjustments to be addressed, accountable officials responsible for implementing action plans, expected time frames for the implementation of action plans, or specific steps to be performed to address the causes. Additionally, the metrics did not include any information on action plans to address system-generated accounting adjustments, which account for the majority of the adjustments. This type of detailed information is critical to DOD management and DOD external stakeholders for evaluating the department’s progress in correcting the issues. GAO has previously reported that a lack of comprehensive information on corrective action plans limits DOD’s and Congress’s ability to evaluate DOD’s progress toward fully, timely, and efficiently correcting its long-standing financial management deficiencies. Office of Management and Budget Circular A-123 requires agencies to perform cause analysis of deficiencies identified to ensure that subsequent strategies and plans address the causes of the problem and not just the symptoms. Additionally, Standards for Internal Control in the Federal Government requires that management implement control activities through policies. To do this, management documents in its policies the internal control responsibilities of the organization. In addition, management periodically reviews policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. Without policies that require consistent processes across DOD for identifying and addressing the causes of accounting adjustments, from the identification of underlying root causes to the development, implementation, and monitoring of action plans, it is likely that DOD’s efforts to reduce accounting adjustments will be inefficient and ineffective. The large number of accounting adjustments that are recorded in the preparation of DOD’s financial statements presents audit challenges. To address this issue, DOD and DFAS have established multiple initiatives aimed at reducing accounting adjustments. While these initiatives have resulted in fewer adjustments of certain types being recorded at the component and consolidated levels, the current focus has been on reducing the number of adjustments recorded without adequate supporting documentation within their responsible work areas, not on reducing the need for recording accounting adjustments department-wide. Both DFAS and OUSD (Comptroller) have developed department-wide strategies to decrease accounting adjustments; however, neither DFAS nor OUSD (Comptroller) have developed procedures for implementing the department-wide strategies. Without a clear department-wide approach to reducing accounting adjustments across all DOD components, there is a risk that DOD’s effort to reduce accounting adjustments will be unsuccessful, which in turn hinders its ability to produce reliable and auditable consolidated financial statements. To reduce accounting adjustments, OUSD (Comptroller) and DFAS have undertaken many initiatives over the last few years. In fiscal year 2018, OUSD (Comptroller) determined that a large number of accounting adjustments at the consolidated level resulted from data calls. To decrease the need for recording these adjustments at the consolidated level, DOD established the Data Call Journal Voucher (JV) Migration Initiative with the goal of eliminating data call adjustments in its core financial reporting system to the maximum extent possible. The first phase of this initiative moved the recording of adjustments for the Federal Employees’ Compensation Act (FECA) liability to the DOD component level responsible for the underlying transaction. According to OUSD (Comptroller), this initiative resulted in the successful migration of the recording of the Missile Defense Agency’s FECA liability from DOD’s core financial reporting system to Missile Defense Agency accounting systems in the second quarter of fiscal year 2019, and has set the stage for 19 other components using the same accounting system as the agency to follow suit. Although this initiative may not reduce the overall number of accounting adjustments that DOD records, it will reduce the need for data call adjustments to be recorded at the consolidated level. OUSD (Comptroller) expects this initiative will also enhance the quality of the supporting documentation maintained for these types of adjustments because the underlying transaction-level detail for the adjustments will be available in the components’ accounting systems. Individual DFAS sites have also undertaken their own initiatives that eliminate the need for some accounting adjustments. For example, in fiscal year 2018, DFAS Indianapolis found that some financial information from the Army’s accounting systems was improperly recorded, requiring adjustments to correct the errors when the financial information transferred into the DOD’s core financial reporting system. DFAS Indianapolis staff worked with the Army to resolve the issue. As a result, adjustments are no longer needed at the consolidated level when the information transfers from Army’s system into DFAS’s system. According to DFAS Indianapolis officials, this initiative resulted in a significant decrease in accounting adjustments at the consolidated level for fiscal year 2019. Developing and implementing a DOD department-wide strategy to reduce the need for recording accounting adjustments at the consolidated level requires DOD to identify the underlying root causes and risks associated with accounting adjustments and to prioritize efforts to address them. This involves clearly defining what is to be done, who is to do it, how it will be done, and the time frames for achievement. To address DOD’s many financial management issues, including reducing accounting adjustments, OUSD (Comptroller) and DFAS have developed different strategies and business plans. However, these strategies and business plans do not include clearly defined expected outcomes or procedures for achieving stated goals. OUSD (Comptroller) issued the DOD Financial Management Strategy Fiscal Years 2016–2020 (Strategy) to help achieve a simplified, standard, affordable, auditable, and secure financial environment, which includes the reduction of accounting adjustments. The Strategy’s JV initiative states that “The purpose of this initiative is to determine why unsupported JVs occur and resolve them.” However, we found that the Strategy did not provide clear direction to staff on how to achieve the JV initiative and did not call for a department-wide effort to address accounting adjustments recorded at the consolidated level. The Strategy also acknowledged that excessive adjustments can indicate underlying problems, such as weak internal controls, and may indicate that transactions are not captured, reported, or summarized correctly. However, we found that the focus of the Strategy was on reducing the number of accounting adjustments recorded without adequate supporting documentation rather than on reducing the overall need for recording accounting adjustments department-wide. In addition to following the OUSD’s (Comptroller) Strategy, DFAS management has also developed the Fiscal Years 2017—2021Strategic Plan (Strategic Plan) and Fiscal Year 2018 Annual Business Plan (Business Plan), which include goals for reducing accounting adjustments, supplemented by bimonthly Strategy Updates. For example, DFAS’s November 2017 Strategy Update outlined the Business Plan goals for fiscal year 2018 with regard to internal controls and business processes. In that update, DFAS set broad goals, such as executing plans to support or reduce system-generated and manual adjustments. However, we found that similar to the OUSD (Comptroller) Strategy, neither DFAS’s Strategic Plan nor Business Plan included defined outcomes or clear procedures for accomplishing the stated goals. The primary focus of these goals was also to reduce the number of accounting adjustments recorded without adequate supporting documentation. We found that this lack of clear procedures led each DFAS site and DFAS headquarters to focus their initiatives on accounting adjustments that impacted their responsible work areas instead of reducing the need for recording accounting adjustments overall. According to DFAS site officials, in some instances, reducing the number of accounting adjustments recorded without adequate supporting documentation at their individual sites could have an impact on the need to record adjustments at the consolidated level; however, the effect at the consolidated level was not their primary focus. Standards for Internal Control in the Federal Government requires that management implement control activities through policies. To do this, management documents in its policies the internal control responsibilities of the organization. In addition, management periodically reviews policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. Without detailed documented policies and procedures for implementing its initiatives, and a complete understanding of the issues contributing to the recording of accounting adjustments (both supported and unsupported) across DOD, there is an increased risk that management efforts to reduce accounting adjustments at the consolidated level will be ineffective. In the routine course of business, organizations often record accounting adjustments on a monthly, quarterly, and annual basis. Some adjustments are necessary so that financial information is presented meaningfully and accurately. However, an extensive use of accounting adjustments may indicate significant underlying problems. In order to produce reliable financial information that DOD management and Congress can use for decision-making, DOD needs to develop policies and procedures for recording accounting adjustments that are consistently implemented across the department and reflect the current DOD financial reporting environment. DOD also needs to address the issues that contribute to its need to extensively record accounting adjustments by implementing policies and procedures for the consistent identification of the causes for recording adjustments and the development, implementation, and monitoring of action plans to address the identified causes. If DOD does not address these issues, there is an increased risk that its financial information will be misstated and DOD will continue to be unable to prepare reliable and auditable consolidated financial statements. We are making the following eight recommendations to DOD: The Director of DFAS should, in accordance with the FMR, implement procedures to help ensure that FBWT reconciliations are consistently performed and that all DFAS sites review and document research conducted on the causes of any differences arising from these reconciliations. (Recommendation 1) The Under Secretary of Defense (Comptroller) should update the FMR to clearly define the required supporting documentation for system-generated accounting adjustments, including the required documentation of business rules driving the recording of these adjustments, such as documentation of the programming logic. (Recommendation 2) The Under Secretary of Defense (Comptroller) should perform and document a comprehensive review of the FMR accounting adjustment category codes to determine their ongoing applicability or the need for additional codes to reflect the current financial reporting environment. (Recommendation 3) The Under Secretary of Defense (Comptroller) should establish procedures to help ensure the consistent implementation of the requirements of DFAS Form 9339. (Recommendation 4) The Under Secretary of Defense (Comptroller) should update policies and procedures to identify the causes of out-of-balance accounting adjustments and resolve the causes in a timely manner. (Recommendation 5) The Under Secretary of Defense (Comptroller), in conjunction with the Director of DFAS, should develop and implement policies and procedures to help ensure that root cause analyses for accounting adjustments are consistently performed and documented across DOD. (Recommendation 6) The Under Secretary of Defense (Comptroller), in conjunction with the Director of DFAS, should develop and implement policies and procedures to help ensure consistent development, implementation, monitoring, and documentation of action plans across DOD that address accounting adjustment causes that staff identified internally. (Recommendation 7) The Under Secretary of Defense (Comptroller), in conjunction with the Director of DFAS, should develop and implement procedures across DOD that include clearly defined outcomes focused on reducing accounting adjustments (supported and unsupported) with specific actionable steps and procedures for achieving stated goals. (Recommendation 8) We provided a draft of this report to DOD for review and comment. In written comments, DOD concurred with all eight of our recommendations and cited actions to address them. DOD’s comments are reproduced in appendix II. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 11 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense (Comptroller), the Director of the Defense Finance and Accounting Service and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2989 or kociolekk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) accounting adjustments and their effect on the reliability of the Department of Defense’s (DOD) financial information, (2) the extent to which DOD has established and implemented policies and procedures for recording accounting adjustments, and (3) the extent to which DOD has taken actions to reduce accounting adjustments recorded at the consolidated level. To determine the accounting adjustments recorded and their effect on the reliability of DOD’s financial information, we focused our review on the categories of accounting adjustments that DOD recorded at the consolidated level. We reviewed prior audit reports issued by GAO, DOD’s Office of Inspector General (OIG), and independent public accountants for fiscal years 2015 through 2019 to gain an understanding of the types and categories of accounting adjustments. We also reviewed related policies and procedures, such as DOD’s Financial Management Regulation (FMR); performed walk-throughs of the Defense Finance and Accounting Service’s (DFAS) processing of accounting adjustments; and interviewed DOD officials to gain an understanding of the types of accounting adjustments. Additionally, we obtained and analyzed summary information on the adjustments affecting fiscal years 2017 and 2018 by quantity, dollar value, whether they were manual versus system- generated, and unsupported versus supported. To evaluate the extent to which DOD has established and implemented policies and procedures for recording accounting adjustments, we reviewed relevant notices of finding and recommendation that the independent public accountants and DOD OIG issued related to accounting adjustments for fiscal year 2018. We also reviewed DOD and DFAS policies and procedures and interviewed officials from DFAS and the Office of the Under Secretary of Defense (OUSD) (Comptroller) to identify issues surrounding accounting adjustments and the procedures used to process, review, and approve these adjustments in DOD systems. We also inquired about the procedures used to determine the underlying causes of accounting adjustments, if action plans to address the causes had been developed, and the status of these plans. In addition, we assessed DFAS’s efforts to monitor the effectiveness of its action plans. To determine the specific internal controls DOD had in place over its accounting adjustment processes, we interviewed DFAS officials knowledgeable about the accounting adjustment processes and performed walk-throughs of these processes at DFAS. We evaluated the procedures observed during our walk-throughs and those that DOD officials described to determine whether DFAS recorded adjustments in accordance with established policies and procedures. For issues identified, we interviewed DOD officials to confirm our understanding and determined the reasons for the issues identified. To determine if DOD had designed and implemented internal controls over its accounting adjustment processes, we analyzed the information we obtained through the interviews and walk-throughs using relevant criteria, including the DOD FMR, the Treasury Financial Manual, and our Standards for Internal Control in the Federal Government. We also performed tests of controls on a random sample of 242 accounting adjustments from a population of 200,468 adjustments that DFAS recorded at the consolidated level that impacted the financial statements for the fourth quarter of fiscal year 2018. The selected adjustments were recorded in the Defense Departmental Reporting System (DDRS)— Budgetary (DDRS-B), DDRS—Audited Financial Statements (DDRS- AFS), and DDRS-AFS Beginning Balance Adjustment modules. From the DDRS-B and DDRS-AFS modules, we selected a random sample of 225 accounting adjustments, and from the DDRS-AFS Beginning Balance Adjustment module we selected all 17 accounting adjustments. From the three different sets of data, we stratified the selected accounting adjustments into six strata (see table 1). Of the total 242 adjustments, we selected all 17 adjustments in stratum 1, and 45 adjustments each from strata 2 through 6 for testing. We designed the sample to support estimation for all supported accounting adjustments with a margin of error no greater than plus or minus 11.7 percentage points at the 95 percent level of confidence, estimation for all unsupported accounting adjustments with a margin of error no greater than plus or minus 11.8 percentage points at the 95 percent level of confidence, and estimation overall for all accounting adjustments with a margin of error no greater than plus or minus 8.4 percentage points at the 95 percent level of confidence. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval (e.g., plus or minus 8 percentage points). This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. For the accounting adjustments in our sample that DOD considered supported, we reviewed underlying documentation to determine whether the adjustments were properly supported and contained all critical elements required by DOD policy. We then shared the results of testing with DOD and incorporated any applicable additional information DOD officials provided into our analysis, as appropriate. As part of our testing, we also reviewed documentation related to unsupported accounting adjustments selected in our sample and interviewed DFAS officials to determine if DOD had performed root cause analyses, developed action plans to address the identified causes, and taken any actions in response. We then shared the results of testing with DOD and incorporated any applicable additional information DOD officials provided into our analysis, as appropriate. To assess the reliability of the accounting adjustment information we received from DOD, we conducted interviews with relevant agency officials, compared summary-level dollar amounts and quantities to another DOD information source, performed electronic testing of the financial information, and reviewed related internal controls. On the basis of this work, we found the financial information to be sufficiently reliable to project results of our random sample testing to the population of accounting adjustments for the fourth quarter of fiscal year 2018. Margins of error varied depending on the specific stratum being projected and are disclosed with all estimates contained within the report. To determine the extent to which DOD has taken actions to reduce accounting adjustments recorded at the consolidated level that may affect the reliability of its financial information, we interviewed officials from DFAS and the OUSD (Comptroller) to identify initiatives aimed at reducing accounting adjustments. We further inquired about what tools DFAS used to measure its progress and analyzed summary metrics provided from fiscal years 2017 to 2018 to determine the effect of these efforts on the number of accounting adjustments recorded during these periods. We conducted this performance audit from November 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Kimberley McGatlin (Assistant Director), Carl Barden, Rathi Bose, Veronica Cadiz-Rodriguez, Virginia Chanley, Benjamin Durfee, Patrick Frey, Maxine Hattery, Jason Kelly, Jason Kirwan, Zhen Li, John Lopez, Samuel Sawhook, Dacia Stewart, and Anne Thomas made key contributions to this report.", "summary": "DOD remains the only major federal agency that has been unable to obtain a financial statement audit opinion. One of the contributing factors is DOD's large volume of nonroutine accounting adjustments, which are used for recording corrections or adjustments in an accounting system. This report examines accounting adjustments and their effect on the reliability of DOD's financial information, the extent to which DOD has established and implemented policies and procedures for recording accounting adjustments, and the extent to which DOD has taken actions to reduce adjustments recorded at the consolidated level. For this report, GAO reviewed DOD and DFAS's policies and procedures, interviewed DOD officials about the adjustment process, and reviewed initiatives to reduce the number of adjustments being recorded. GAO also selected a random sample of 242 adjustments recorded at the DOD consolidated level for the fourth quarter of fiscal year 2018 to determine whether the adjustments were recorded in accordance with established policies. While the use of accounting adjustments is a common practice, the Department of Defense's (DOD) reliance on a large volume of nonroutine adjustments to prepare its financial statements is primarily a result of deficient business processes and limitations in accounting systems that DOD components use to process financial information. For example, the Defense Finance and Accounting Service (DFAS) continues to rely on forced-balance adjustments to replace the financial information that DOD's components submit to force agreement with Department of the Treasury balances without reconciling and researching the cause of differences (see figure). The recording of these adjustments was identified as a material weakness in DOD's internal control over financial reporting in its fiscal year 2018 financial statement audit. GAO found that DOD and DFAS policies and procedures for accounting adjustments are insufficient, outdated, and inconsistently implemented. For example, DOD's current policies do not define what constitutes adequate supporting documentation for system-generated adjustments, nor have DOD and DFAS established policies for identifying the cause of the adjustments, developing and implementing action plans to reduce the need for adjustments, and monitoring the effectiveness of those action plans. Because DOD and DFAS are not ensuring that their policies and procedures are up-to-date and consistently implemented, there is an increased risk that inaccurate, invalid, or unapproved adjustments will be recorded in DOD's core financial reporting system, resulting in a misstatement in DOD's consolidated financial statements. DOD and DFAS have undertaken initiatives to address some of the issues that contribute to the need for adjustments. Both organizations have developed strategies to decrease adjustments; however, neither has developed specific outcomes or detailed procedures for achieving stated goals in the strategies. Without clear procedures on how to implement its initiatives and a complete understanding across DOD of the issues contributing to the need for accounting adjustments, there is an increased risk that management efforts to reduce adjustments at the DOD consolidated level will be inefficient and ineffective. GAO is making eight recommendations to DOD, which include updating and implementing policies and procedures on recording accounting adjustments and identifying steps to reduce the need for recording adjustments across the department. DOD agreed with all eight recommendations and cited actions to address them.", "document_type": "gao"}
{"report": "Within the executive branch, both OMB and GSA provide leadership in managing federal real property. OMB, among other things, issues policies and memorandums, including the RTF policy discussed below. GSA has dual roles with regard to the management of federal real property. First, GSA’s Office of Government-wide Policy supports the implementation of OMB’s real property policies, including RTF, by collecting and analyzing federal real property data and providing agencies with guidance on leading practices. According to GSA officials, GSA and OMB coordinated to develop data analysis methods to monitor agencies’ performance in meeting OMB’s real property policies, and OMB approved the methods that are used. Second, as the federal government’s principal landlord, GSA’s PBS acquires, manages, and disposes of federally-owned real property for which it has custody and control on behalf of agencies that occupy it, and leases commercial space on behalf of agencies. In these cases, GSA manages the lease agreements. We refer to both of these types of properties as GSA-managed space. All of the agencies obtain at least some of their office space through GSA’s PBS; in fact, two-thirds of the 23 agencies’ office space is GSA-managed space. When agencies obtain space through GSA, they enter into occupancy agreements with PBS and pay rent, operations, and maintenance costs to PBS. When GSA obtains space for its own employees, it also enters into occupancy agreements with PBS. PBS maintains a record of agencies’ GSA-managed space, including information on square footage and costs, in its Occupancy Agreement database. We discuss PBS’s role in agencies’ office space decisions later in this report. Some agencies also have independent statutory authority to lease, or acquire and manage their own property, which GSA refers to as directly- leased or directly federally-owned (“directly-owned”) space. Additionally, some agencies may be authorized to directly lease or acquire property when GSA delegates authority to them because doing so is in the government’s best interest. Fourteen of the 23 agencies directly lease or own some of their office space, and about one-third of these agencies’ total office space is made up of directly-leased or owned property. Agencies pay rent to private landlords when directly leasing space and are responsible for operating and maintaining directly-owned property. Agencies must report, among other things, the square footage and costs to rent, operate, or maintain such properties to the FRPP database, which GSA maintains. As previously mentioned, in March 2015, OMB issued the RTF policy to promote the more efficient use of real property assets through improved space utilization and reduction. According to OMB, the policy is intended to provide value to the taxpayer. The RTF policy requires agencies to submit annual Real Property Efficiency Plans (Efficiency Plans) to OMB that: (1) identify annual reduction targets for domestic office and warehouse space for a 5-year period; (2) include a policy that specifies the maximum usable square feet per person, also known as a utilization rate, and (3) refrain from increasing the square footage of domestic office and warehouse space over fiscal year 2015 levels. As part of the Efficiency Plans, agencies must also identify specific projects they will implement to reduce or improve efficient use of their space. Agencies may undertake different types of projects such as renovation, relocation, or consolidation projects to achieve their space reduction or efficiency goals. While OMB oversees the implementation of the RTF policy, GSA tracks and reports key cost performance measures on agencies’ square footage and cost changes, in accordance with analysis methods it developed in coordination with OMB. GSA reports these performance measures on performance.gov and to Congress in annual reports, and provides measures for agencies to use in their Efficiency Plans. According to these data, the 23 civilian agencies reduced more than 6 million square feet of office space from fiscal year 2015 through fiscal year 2018. As shown in figure 1, space changes varied across agencies; 16 of the 23 agencies reduced office space, while 7 increased space. According to publicly available RTF data, some agencies’ space reductions have slowed as the RTF policy approaches its end date in fiscal year 2020 and as according to OMB officials, many of the lower- cost, high financial return projects have been executed. GSA has reported varied results with regard to changes in agencies’ costs since the start of RTF. GSA reported that the federal government has avoided spending millions of dollars as a result of reduced office and warehouse space but also has reported that the average cost per square foot for office space has increased. We discuss the RTF cost performance measures in detail later in this report. The RTF policy is effective through the end of fiscal year 2020. OMB and GSA officials told us that discussions about a real property policy to succeed RTF were underway as of early 2019. However, no policy to succeed RTF has been issued as of September 2019, according to a senior GSA official. GSA tracks and reports two RTF cost performance measures—estimated cost avoidance and average cost per square foot. These measures provide useful information on agencies’ results, but the average cost per square foot performance measure does not use the most accurate information. Regarding estimated cost avoidance, GSA reported that the 24 CFO Act agencies—including DOD—avoided an estimated $166 million in office and warehouse costs as a result of their space reductions since fiscal year 2015. We used GSA’s data and the cost avoidance approach GSA developed with OMB to identify that $114 million of the estimated cost avoidance can be attributed to civilian agencies’ office space reductions since fiscal year 2015. The estimated cost avoidance measure reflects overall federal cost avoidance because it accounts for space that agencies have returned to GSA but that remains unoccupied. Under certain conditions, agencies may vacate GSA-managed space prior to the end of their occupancy agreement and report that as a reduction in their space. However, until this space is reoccupied or GSA disposes of it, the federal government continues to incur costs to operate and maintain the space. Because of these continued costs, GSA accounts for vacant space when it estimates cost avoidance. For example, from fiscal year 2016 to fiscal year 2017 the amount of vacant GSA-managed office space increased more than the amount of space agencies reduced. Since this increase meant that the federal government had not reduced office space overall when the calculation was made, GSA estimated that rather than avoiding costs, costs for civilian office space increased by roughly three-quarters of a million dollars during this period. GSA officials noted that this estimate represents estimated cost avoidance at a single point in time and does not capture fluctuations in agencies’ space or vacant federal space throughout the year. Average fiscal year 2015 cost per square foot for (1) space agencies lease directly, (2) space agencies acquire and manage directly, (3) space GSA leases on behalf of agencies, and (4) federally-owned space GSA manages. In 2018, GAO reported that GSA’s and OMB’s method for estimating the cost avoidance associated with agencies’ real property changes is a reasonable approach given current limitations. OMB officials explained that the estimated cost avoidance is not intended to depict actual cost savings or the net effect of space changes on costs (i.e., investment cost minus savings) because the estimate does not include agencies’ investment costs to renovate, relocate, or dispose of space. Rather, GSA’s and OMB’s method estimates the costs for rent, operations, and maintenance that the federal government did not incur because it no longer occupies space. Further, OMB officials pointed out that because agencies use a variety of methods and systems to track and categorize their renovation, relocation, and disposal costs, agencies’ data on actual investment costs are not consistent across agencies and using these data would limit the accuracy of any estimate purporting to be an actual cost savings measure. Another annual cost measure GSA uses to track agencies’ RTF performance is the average cost per square foot, which is intended to reflect actual changes in agencies’ real property costs. GSA calculates the annual average cost per square foot for different categories based on how the space is managed—directly-owned, directly-leased, and GSA- managed office space. GSA uses the same approach to calculate the measure for all agencies, and for each agency to use in their annual Efficiency Plans. GSA’s performance measure shows an increase in all types of office space costs since fiscal year 2015, and our analysis of FRPP and Occupancy Agreement data similarly found that overall office space costs have increased for the majority of agencies, some by as much as 10 to 15 percent. We found the approach GSA developed with OMB to calculate average cost per square foot for directly-owned and directly-leased office space to be reasonable because GSA used the best available data. However, we found that GSA’s and OMB’s approach for GSA-managed space understated the average cost per square foot. Specifically, we found that GSA understated the overall average cost per square foot for all agencies’ GSA-managed office space by $1.31 (4.7 percent) on average from fiscal years 2015 through 2018. Furthermore, we found that GSA’s and OMB’s method understated the average cost per square foot for 18 of the 23 agencies between 3 percent and 41 percent on average from fiscal years 2015 through 2018. Figure 2 illustrates the range of differences we found between GSA’s and OMB’s method and actual costs. GSA understated the average cost per square foot for GSA-managed space because it did not use readily available data on the actual costs agencies paid to GSA for office space each year. Instead, GSA used the “rental rate”, which reflects the cost per square foot that agencies paid in the month GSA accessed the data—usually September. This rate does not include all agency costs, such as costs for GSA’s fee. Using the monthly rental rate to calculate average cost per square foot can significantly affect the resulting measure because the rental rate can differ from month to month. According to GSA officials, this variation can occur for many reasons including rental incentives, credits, or one-time costs that are reflected in that particular month but do not apply in all months. To identify how GSA’s use of the rental rate affected the cost information GSA used to calculate the measure, we calculated costs using the rental rate (GSA’s method) and compared them to the actual annual costs in GSA’s data. We found that costs calculated using the rental rate were almost always lower than actual annual costs for agencies, sometimes by millions of dollars for a single space. This approach led GSA to exclude an average of $271 million in office space costs per year from its calculations during this time period. Moreover, by using this approach GSA did not include the costs for spaces that did not have a rental rate, even when agencies paid for those spaces during the fiscal year. In fiscal year 2018, GSA’s and OMB’s method excluded 405 GSA-managed office spaces that did not have a rental rate but that had a combined annual rental cost of $24.2 million. Example of the Effect of General Services Administration’s (GSA) and Office of Management and Budget’s (OMB) Method on Cost per Square Foot: National Aeronautics and Space Administration (NASA) GSA used the rental rate even though it tracks and can easily access actual annual costs in its Occupancy Agreement database because, in GSA’s view, the rental rate better reflects the real average cost of an office space. Officials said that the actual annual cost can represent partial year costs and that GSA did not want to skew the averages toward zero- or low-cost spaces. However, as demonstrated by our analysis, GSA’s use of the rental rate, rather than preventing GSA from skewing the average costs toward lower cost office spaces, actually resulted in an understatement of these costs. GSA and OMB’s method excluded about $31 million from the cost per square foot calculation. This difference was largely attributable to one office space, which had a rental rate of $44.67, much lower than the actual annual cost per square foot for that space, which was $97.98. Standards for Internal Control in the Federal Government state that agencies should use and externally communicate quality information— information that is accurate and complete—to achieve their goals. Understating the average cost per square foot for GSA-managed office space, which comprises two-thirds of agencies’ office space, has implications for federal efforts to efficiently manage space. First, using an inaccurate cost performance measure affects stakeholders’ and policymakers’ ability to accurately judge and oversee agencies’ progress toward reducing space costs. Second, because agencies use these data to judge their own performance and make decisions about how to efficiently manage their space, agencies are at risk of taking ineffective steps to manage their costs and achieve their goals. As the government’s principal landlord, GSA’s PBS emphasizes cost savings from a government-wide perspective when working with agencies. To facilitate this approach, PBS has established policies and tools that focus on early planning and cost analysis. For example, according to PBS officials, PBS generally begins planning and cost analysis 5 years ahead of expiring occupancy agreements and leases. As part of this planning, PBS analyzes project costs and cost savings, and considers opportunities to fill vacant federal space and improve a space’s efficiency by, for example, improving the utilization rate. PBS recommends projects—including consolidation, relocation, and renovation projects—to agencies based on its analysis. Though PBS officials said that PBS has the final decision-making authority regarding agencies’ space, they said PBS works closely with agencies to make collaborative decisions about office space changes. Officials also told us that early planning helps ensure that PBS and agencies have time to identify and select the most cost-effective project option. According to PBS officials, PBS developed a tool in 2018 to compare potential space projects based on, among other factors, market and move costs. Officials told us that this tool is a way to ensure that PBS analyzes all projects consistently to identify the most cost-effective option for the federal government. They also told us that they use this tool iteratively throughout the planning process and that the cost analysis becomes more refined as PBS coordinates with agencies and identifies specific spaces as options. For high-cost projects, PBS also performs cost analysis of alternative options, including comparing each alternative’s net present value. However, PBS officials said that there are instances when they do not perform GSA’s standard cost analysis because it is not necessary. Specifically, PBS does not conduct this analysis when there is a space option that clearly aligns with its priorities. For example, PBS did not conduct its standard cost analysis for two of our 13 selected projects because both agencies moved into vacant federally-owned or leased space, moves that presented clear benefits to the federal government, according to PBS officials. However, GSA’s government-wide emphasis may not always result in cost savings for individual agencies, and in some cases, what is most cost-effective for the federal government does not always align with what is most cost-effective for individual agencies. For example, when Education relocated its San Francisco office to vacant federal space in fiscal year 2016, GSA’s analysis of the relocation showed that it cost Education slightly more than one other option, but was the lowest cost option for the federal government because it allowed GSA to fill space the federal government was already paying for. PBS officials told us that they expect their analysis to heavily influence agencies’ office space decisions and do not expect agencies to perform their own cost analysis for these decisions, but said some agencies do conduct such analysis. We found that all five of our selected agencies— Education, GSA in the space that it occupies, IRS, Labor, and NIH— conducted some type of cost analysis to inform office space changes. We found that some agencies include such analysis as part of their routine policies and procedures, while others conducted analysis for specific projects as needed. Percentage Change in Selected Agencies’ Square Footage and Cost, Fiscal Year 2015 through 2018 Cost plays an important role in agencies’ office space decision-making processes, which can influence office space changes over time. From fiscal year 2015 through 2018, our selected agencies’ office space costs and square footage changes varied, and square footage and cost changes did not always have the same trend. Education: A senior Education official said that the Department carries out various cost analyses when making office space decisions. For example, the official told us that Education conducts various cost analyses to identify the most cost-effective options for the Department. To manage agency office space costs, the Education official told us that Education focuses its planning process on expiring leases, high-cost leases, and low-cost projects with a large and rapid return on investment. We found that Education conducted such analysis when carrying out its Washington, D.C., consolidation project in fiscal year 2016. The official told us that Education had to quickly reduce agency costs and decided to do so by reducing space as opposed to furloughing employees. After reviewing their space and conducting rent savings analysis, Education decided to consolidate its staff from three different office buildings in Washington, D.C., into excess space it had in two other buildings. According to Education’s analysis, this consolidation reduced the annual rent for its Washington, D.C., offices by about 19 percent. GSA: GSA considers cost when it identifies and evaluates potential projects for the space it occupies. Specifically, GSA requires its offices to use a project template to routinely collect rent savings and payback period information on almost all potential projects. In fiscal year 2015, GSA also conducted a portfolio-wide review of GSA-occupied space during which it identified potential projects based, in part, on rent savings and payback period analysis. Through this review, GSA identified and recommended 15 projects that would reduce 964,000 rentable square feet, use space more efficiently, and save up to more than $17 million in rent over 5 years. GSA officials told us GSA prioritized its implementation of the recommendations by starting with the projects that had the largest space reduction and rent savings. For example, in fiscal year 2015, GSA decided to consolidate two of its Atlanta offices into one smaller, more efficient space. GSA determined that this consolidation could reduce its rentable square feet by 150,000 square feet (52 percent) and save $4.1 million in annual rent. IRS: IRS has developed multiple tools to analyze the cost of project options based on market data and upfront costs, among other information. For example, IRS developed its Return on Investment Calculator to help determine whether it is most cost-effective to stay in place, downsize, or relocate when a lease or occupancy agreement expires. The tool compares the return on investment for moving versus staying by using cost information, such as market data, travel, furniture, and rent costs. The IRS also uses a project estimating and tracking tool called the Space, Time & Resources Tool to create general cost estimates for a variety of project types, evaluate alternatives, and according to IRS officials, contribute to the development of plans for expiring leases. This tool uses preliminary space and cost estimates for needs such as facilities, security, and information technology to determine each project’s return on investment and potential annual rent savings. IRS officials told us that they may use the analyses from some of the tools to make a case to GSA in support of IRS’s preferred alternative or lowest-cost option, if necessary. Labor: Labor considers cost in its space policies and procedures, and we found that Labor sometimes conducted its own cost analysis to identify opportunities to achieve savings. A senior Labor official told us that Labor conducts an informal, broad review of its space that allows the Department to identify opportunities for cost savings. The official told us Labor looks for opportunities to co-locate staff from multiple agencies, and according to its space management policy, co-location allows Labor agencies to share support spaces which can reduce overall square footage and administrative costs. The official said that through review and analysis, Labor identified an opportunity to consolidate staff from multiple offices in Washington, D.C., into a single space in fiscal year 2016. Labor’s analysis indicated that the consolidation could save the Department an estimated $789,000 in annual rent in fiscal year 2014, the year the project began. The Labor official told us that Labor is focused on early planning to identify opportunities for cost savings and space reductions, and is beginning a new initiative to review and plan for projects up to 6 years in advance of lease or occupancy agreement expirations. NIH: We found that NIH routinely considers costs when it evaluates potential projects. Specifically, when NIH considers potential projects, it collects information on costs, such as long-term budget effects. A senior NIH official also told us that NIH works closely with GSA to conduct cost analysis, including analysis for high-cost projects that NIH submits as part of its funding requests to Congress, such as analysis of rent costs over the full lease term. Through this analysis, NIH has been able to identify lower-cost space options to meet its needs. For example, NIH determined that it could save $3.6 million annually and $53 million over 15 years by locating to office space that was closer to its other offices because it would decrease the time employees spent traveling between spaces. Additionally, the NIH official said one of NIH’s goals includes co-locating agency offices and staff to improve efficiency and reduce costs, and NIH routinely identifies opportunities to co-locate as part of its project selection process. For example, when NIH consolidated staff in Maryland into two buildings on one campus, the official said that NIH chose consolidation because it offered NIH an opportunity to operate more efficiently. We found that while all selected agencies consider cost when making office space decisions, they generally do not make decisions based on cost alone. We have previously reported that cost, mission, and external considerations influence agencies’ efforts to manage, reduce, or change their space. We found that all five of our selected agencies balance these factors, as well as workforce considerations, with cost, and with each other, when making office space decisions. These factors may not always align with each other and the extent to which these factors influence space decisions and their cost implications can vary for each specific office project need. Mission and Goals: We found that all selected agencies considered and balanced their mission or goals with other factors, such as cost, when making office space decisions. Mission: Agencies’ missions are an important factor and can work in tandem, or be in tension, with agencies’ efforts to achieve cost savings. For example, we found that when GSA decided in fiscal year 2014 to renovate and reduce space in its Chicago, IL, office, it considered, among other factors, how this project supported GSA’s government-wide mission to make federal space available to agencies. By reducing space in the existing location by fiscal year 2017, GSA determined it could reduce its annual rent in Chicago by 40 percent and provide more than 50,000 square feet of federal space to other agencies. On the other hand, a senior IRS official told us that because enforcement needs—a central part of IRS’s mission—are constantly shifting to different parts of the country, IRS may not always be able to enter into long-term lease agreements, which are generally more cost-effective. Goals: We found that agencies’ goals could be complementary to or in conflict with their efforts to reduce cost. A senior NIH official told us that NIH’s offices are currently widely dispersed and that NIH has a goal of “making the crumbs into a loaf” by co-locating different offices as leases expire. The NIH official told us that co-locating can facilitate cost savings because it allows NIH to operate more efficiently by, for instance, reducing shuttle services and sharing common areas and services. For example, one NIH project in Bethesda, Maryland will consolidate 11 expiring leases in five locations into three leases in a two-building campus that, according to GSA analysis, will reduce rent by 42.5 percent per year for 15 years. Conversely, some of our selected agencies noted that agency goals do not always align with cost savings. For example, both Labor and IRS officials told us that they may not pursue their space utilization goals if it costs too much to renovate space to meet their desired space per person. Additionally, the senior NIH official told us that NIH has previously moved to office space that did not meet its utilization rate goals because it was able to achieve larger cost savings by moving to a space in an area with lower rent than the area it previously considered. Workforce Impact: We found that all five of the selected agencies considered how office space decisions could impact their workforce, and a couple of agencies told us that they balance this consideration with costs, along with agency mission and goals. Commuting time: Officials from three selected agencies noted that changes in employees’ commuting time can influence what office space to select. For example, Education is scheduled to relocate its Dallas regional office in fiscal year 2020. A senior Education official told us that Education chose a space that has close proximity to the current space, in part, because the relocation will have minimal impact on employees’ commute. The official also said that even if federally- owned office space further away became available, Education may not move there if it would be difficult for staff to get to. Similarly, IRS’s business case to consolidate several offices in the Cincinnati, OH, area into one office starting in fiscal year 2015, analyzed how the project would affect IRS employees, including the impact on employees’ commute, ability to park, and the effect on employees’ income taxes. Employee Morale and Productivity: Several selected agencies noted that reducing the amount of space per person can affect employee morale and productivity. According to GSA’s strategic goals, improving space utilization by, for example, reducing the amount of space per person can help the federal government achieve cost savings. A senior Education official told us that when redesigning Education’s Washington, D.C., offices, which reduced the amount of space per person, leadership engaged in a substantial employee outreach effort to understand how these changes affected employees and to build employee support for the changes. The official also said Education took into account upfront costs for tools to improve employees’ experience. For example, the official said that the Department invested in noise cancelling headphones to improve the employee experience, which was a small cost compared to the cost for office space. To ensure that reductions are not having a negative impact on its employees, GSA developed a survey that it sometimes distributes both before and after making space changes. External Factors: Officials from four of the five selected agencies said external factors, such as federal priorities, statutes, regulations, and policies can influence their office space decisions. In some cases, these factors did not complement efforts to reduce costs. Federal Priorities: Federal goals and priorities can influence agencies’ space decisions, and these requirements may not align with efforts to reduce costs. For example, in fiscal year 2016, GSA relocated its regional office in New York City from federally-owned to federally- leased space in the World Trade Center. Though GSA considered cost, the federal government’s commitment to move into the World Trade Center after the terrorist attacks on September 11, 2001, influenced this decision, which resulted in increased costs for GSA. Statutes, Executive Orders, and Regulations: Some agencies told us that statutory requirements, directives, and regulations can influence their space decisions, and may or may not align with efforts to reduce costs. For example, a senior IRS official told us that a 1978 Executive Order, which requires that agencies with a mission need to locate in an urban area first consider moving to a central business district, might result in IRS moving to higher-cost neighborhoods. A senior official from the Department of Health and Human Services also told us that locating office space in the central business district of urban areas can be more expensive, but that the Department often does so because of the Executive Order. GSA policies: GSA policies on space management can also affect agencies’ office space decisions. A senior Labor official told us that the Department is currently reducing space in its Chicago, IL, regional office but the ability to do so is dependent on whether Labor can return the space to GSA. GSA policy states that agencies occupying space acquired from PBS can return space within a certain time frame if, among other requirements, the space is categorized as cancelable and is in marketable blocks based on the location, usage, and size of the space. If the space does not meet these criteria, an agency can return the space to PBS but is still responsible for paying rent and other costs associated with the space until the occupancy agreement or lease expires. Even as agencies have intensified their focus on better space management in an effort to save taxpayer dollars, overall, the cost for office space continues to rise. Using the best data available to assess space options and trade-offs is critical. GSA’s and OMB’s cost per square foot performance measure could provide agencies a good way to assess their costs and track cost trends, particularly as agencies’ efforts continue to evolve beyond reducing their footprints toward optimizing their space. However, the measure is only as good as the approach and data used in the calculation. Because GSA’s and OMB’s cost per square foot performance measure is not using actual cost information for GSA- managed space, GSA and OMB are understating the average cost per square foot for a significant portion of square footage. This inaccurate information could adversely affect agencies’ and stakeholders’ understanding of RTF results. As the RTF policy ends in fiscal year 2020 and agencies look toward the next initiative, having the most transparent and accurate information on the results of agencies’ efforts to date can inform new strategies and tools to help agencies continue and expand upon their efforts to manage their property more efficiently and ultimately save money. Moreover, having accurate information on agencies’ real property costs will continue to be important in future initiatives to efficiently manage federal real property. The Administrator of the General Services Administration (GSA), in coordination with the Director of the Office of Management and Budget, should ensure that the average cost per square foot performance measure for GSA-managed space is calculated using actual cost information. (Recommendation 1) We provided a draft of this report to GSA, OMB, and the Secretaries of the Departments of Labor, Education, the Treasury, and Health and Human Services for review and comment. In GSA’s written comments, which are reproduced in appendix II, GSA agreed with our recommendation. OMB did not provide comments, but GSA stated in its comments that it is working with OMB to develop a plan to address our recommendation. The Departments of Labor, Education, the Treasury, and Health and Human Services told us that they had no comments on the draft report. We are sending copies of this report to the appropriate congressional committee; the Administrator of GSA; the Director of the OMB, and; the Secretaries of the Departments of Education, Health and Human Services, Labor, and the Treasury. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning the report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix III. This report discusses: (1) the extent to which Reduce the Footprint performance measures reflect changes in civilian Chief Financial Officers Act agencies’ (CFO Act agencies) office space costs, and (2) how selected agencies considered costs in office space decisions. To obtain background information on both of our objectives, we reviewed literature including the Office of Management and Budget’s (OMB) and General Services Administration’s (GSA) memos and guidance governing the Reduce the Footprint (RTF) policy, the Real Property Efficiency Plans (Efficiency Plans) agencies submit to OMB and GSA annually as part of RTF, and relevant regulations and statutes. We also examined information GSA uses to track RTF progress, including public data on agencies’ square footage changes. We assessed the reliability of these data by conducting electronic testing, reviewing prior GAO assessments of reliability, and interviewing agency officials. Based on this assessment, we determined these data to be reliable for the purposes of describing changes in agencies’ square footage. Additionally, we reviewed previous GAO and GSA Inspector General reports describing the federal government’s efforts to use its property more efficiently and reduce costs. To address our first objective, we analyzed federal data on office space square footage and costs, and reviewed the two RTF cost measures GSA developed with OMB to track and report agency performance: (1) estimated cost avoidance and (2) changes in average cost per square foot. To identify changes in agencies’ office space costs, we analyzed square footage, and rent, operations, and maintenance costs from Federal Real Property Profile (FRPP) data submitted by agencies and GSA’s Occupancy Agreement data. Office space costs in both datasets may contain costs for additional items beyond rent, operations and maintenance, such as tenant improvements, but we determined that the inclusion of these costs did not preclude us from using these data to describe agencies’ costs as the data reflect the total annual costs to agencies. Though agencies may report different types of square footage in FRPP, as specified by GSA’s FRPP reporting guidance, we analyzed rentable square footage where available because it represents the total space an agency pays for. We limited our analysis to the CFO Act agencies because these agencies are subject to RTF requirements, but we excluded the Department of Defense (DOD) from our analysis because of GSA concerns about the reliability of DOD’s data. We analyzed data from fiscal year 2015, the year RTF began, through fiscal year 2018, the most recent year for which data were available. To assess the reliability of these data, we conducted electronic testing, reviewed GSA documentation and prior GAO data reliability assessments, and interviewed GSA officials. Based on our assessment, we determined that both the FRPP and Occupancy Agreement data were reliable for the purposes of describing changes in agencies’ office space costs and square footage. To analyze the extent to which the cost performance measures reflected agencies’ cost changes, we reviewed the methodologies GSA developed with OMB for the cost performance measures and GSA’s calculations, interviewed OMB and GSA officials regarding the measures, and replicated one of the methods. We also reviewed previous GAO assessments of the estimated cost avoidance methodology. To determine how GSA’s and OMB’s approach to calculating the average cost per square foot affected the results for GSA-managed space, we used GSA Occupancy Agreement data to compare the average cost per square foot based on GSA’s and OMB’s method to the average cost per square foot using actual costs. We compared our analysis of the average cost per square foot method to Standards for Internal Control in the Federal Government, which state that agencies should use and communicate quality information—information that is complete and accurate—to inform decisions. To address our second objective, we selected five agencies—the Department of Education (Education), GSA, the Department of the Treasury, the Department of Labor (Labor), and the Department of Health and Human Services—to review in depth. Within the Departments of the Treasury and Health and Human Services, we further selected the Internal Revenue Service (IRS) and National Institutes of Health (NIH) respectively because we determined that real property within these Departments is managed at the agency level. Using FRPP and Occupancy Agreement data on agencies’ costs and square footage, we selected agencies based on factors such as office space portfolio size, whether the agencies obtain office space themselves or through GSA, and changes in portfolio cost and square footage. We selected agencies for variety but weighted our selection toward agencies with larger absolute changes in cost and square footage. Our selection is not representative, and these agencies’ experience is not generalizable to all agencies. To gain insights into how these agencies consider costs when making office space decisions, we reviewed selected agencies’ real property management policies, and interviewed agency officials. We then analyzed this information to identify common themes across selected agencies. To further understand how agencies implemented their policies and the factors agencies considered when making specific office space decisions, we also selected 13 office space projects these agencies undertook from fiscal year 2015 through fiscal year 2018. We identified potential projects based on selected agencies’ annual Efficiency Plans, agency project data, and interviews with agency officials. We selected specific projects based on factors such as cost, location, changes in square footage, and project type. We chose projects with a range of types and locations to better understand agencies’ decision-making process for different kinds of projects. However, we selected only projects with a cost of $1 million or more and with larger changes in square footage because these projects have more effect on overall federal and agency costs and portfolios. Because our intent was to understand the factors selected agencies considered when deciding on projects, our selection includes both completed projects and projects that were ongoing as of spring 2019, when we collected our data. The projects we selected are not representative of all projects or agencies, and are not generalizable. We analyzed project documentation and interviewed agency officials about each project. We also reviewed federal data for some projects to identify the changes in agencies’ square footage and costs before and after projects. To further address our second objective, we reviewed GSA Public Buildings Service (PBS) policies and guidance, and interviewed PBS headquarters officials to understand PBS’s role in agencies’ office space decisions, including how PBS considers costs when helping agencies obtain space. We also reviewed PBS cost analyses, such as net present value alternatives analysis and move-stay analysis, for most of our selected projects. We conducted this performance audit from November 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Maria Edelstein (Assistant Director), Katherine Raymond (Analyst-In-Charge), Eli Albagli, Ricki Gaber, and Minette Richardson made significant contributions to the report. Also contributing to this report were Melissa Bodeau, Josh Ormond, Kelly Rubin, Terence Lam, and Crystal Wesco.", "summary": "The government's RTF policy has intensified federal efforts to reduce office space and save money since 2015. GSA and OMB report key cost performance measures but questions exist about how well these measures reflect agencies' efforts. GAO was asked to review how federal real property costs have changed since 2015. This report examines (1) the extent to which performance measures reflect changes in civilian CFO Act agencies' office space costs and (2) how selected agencies considered cost in their office space decisions. To conduct this work, GAO analyzed federal data on office space square footage and cost changes for the 23 civilian CFO Act agencies from fiscal years 2015 through 2018, and reviewed GSA's and OMB's calculations for cost performance measures. GAO selected five agencies and 13 of their office space projects as non-generalizable case studies based on several factors, including those with larger space and cost changes. GAO reviewed the selected agencies' policies and project documentation, and interviewed agency officials. The Office of Management and Budget (OMB) issued the Reduce the Footprint (RTF) policy in 2015 to promote the more efficent use of federal space. The General Services Administration (GSA) and OMB track and report two RTF cost performance measures: estimated costs avoided and average cost per square foot. GAO found that the method for estimating costs avoided was reasonable. However, the average cost per square foot was not accurate for the federally-owned and leased office space GSA manages for agencies. Specifically, GAO found that from fiscal years 2015 through 2018 the actual average cost per square foot for this space was, on average, $1.31 per square foot higher than the costs GSA and OMB reported for the 23 civilian agencies subject to the Chief Financial Officers (CFO) Act. The actual cost per square foot was higher for 18 out of 23 of these agencies (see figure). Because GSA and OMB did not use readily available actual cost data, their method, which is based on 1 month's data, excluded an average of $271 million per year in costs over this period. Consequently, stakeholders and agencies do not have accurate information to assess agencies' performance or help manage their space decisions. Note: This information covers the 23 Civilian Chief Financial Officers Act agencies. While selected agencies considered costs when making office space decisions, they balanced other factors as well. As the federal government's principal landlord, GSA obtains space for many agencies. In so doing, it emphasizes federal cost savings, which may not lead to agency savings. For example, GSA prioritized filling unoccupied federally-managed space even if it was more costly to an agency than another option. The selected agencies also reported that factors such as mission, workforce needs, and external factors are important to consider and balance as well. For example, a senior official from the Department of Education said that effects on employees' commutes are an important factor in its space decisions, and that it weighs the impact of potential office locations on the Department's workforce against the cost of the space. GAO recommends that GSA coordinate with OMB to use actual cost information to calculate the average cost per square foot performance measure for GSA-managed space. GSA agreed with the recommendation.", "document_type": "gao"}
{"report": "Federal law requires executive agencies to: maintain adequate inventory controls and accountability systems for property under their control; continuously survey property under their control to identify excess; and promptly report excess property to GSA and generally dispose of it in accordance with GSA regulations so that it can be made available to other federal agencies and stakeholders for reuse. In addition, the FPPMA requires agencies to assess accountable property within their control in accordance with guidance from GSA. Property can be accountable or non-accountable. Accountable property is property with a useful life of at least 2 years that an agency determines should be tracked in its property records. Each agency determines what constitutes accountable property for that agency, and for our selected agencies, consideration is given to an item’s acquisition cost and other factors, such as ease of theft and sensitivity. For our three selected agencies, these acquisition cost thresholds ranged from $5,000 to $10,000 in fiscal year 2018. Non-accountable property is property that does not meet the agency’s definition of accountable property and may include items such as office furniture and printers. Agencies typically do not track non-accountable property unless they need to for specific purposes, such as managing inventory levels. Some agency property is located in warehouses. For the purpose of this report, we used the definition of “warehouse” in FRPP guidance: “buildings used for storage, such as ammunition storage, covered sheds, and buildings primarily used for storage of vehicles or materials.” This term encompasses a broad array of property that agencies may classify differently for internal purposes but classify as warehouses for FRPP reporting in the absence of more precise categories. For example, some buildings that DOE reports as warehouses in FRPP are specialized facilities for storing nuclear and nuclear-contaminated material. In the absence of an FRPP category for nuclear storage, these buildings are classified in FRPP as warehouses. In a similar manner, FAA classified as warehouses in FRPP buildings used to house air traffic support systems, such as approach lighting systems, because no other category in FRPP was a better fit. GSA’s role in agencies’ management of property they have acquired, whether in warehouses or elsewhere, is limited until an agency declares that property as excess. Once property is declared excess, it can be transferred to another agency or certain non-federal recipients, donated, sold, abandoned, or destroyed. GSA has issued regulations that govern agencies’ actions in the property disposal process, and it administers a web-based system that facilitates property disposal. However, prior to an agencies’ identifying property as excess, GSA’s authority to issue regulations or formal guidance regarding agencies’ management of property is limited to topics that have been specifically assigned to the GSA Administrator, according to GSA officials. GSA distinguishes between formal guidance and informal guidance, and GSA officials explained this distinction as follows. Formal guidance, such as a Federal Management Regulation bulletin, must be reviewed by GSA management and general counsel officials. For example, in 2017 GSA issued a Federal Management Regulation bulletin on warehousing that summarized industry perspectives from two voluntary consensus standards, which were published by ASTM International’s asset management committee and which GSA had participated in developing. One standard addressed storage of property and the other addressed strategic warehousing. GSA officials stated they were authorized to include content on property management in the bulletin under the authority of GSA’s real-property policy program because the content supported the real property goal of reducing the federal government’s real property footprint. In contrast, informal guidance does not require review by GSA management or general counsel officials but may be published on GSA’s website or disseminated at GSA trainings. Whether formal or informal, agencies are not required to adhere to such guidance. Typically, within agencies, responsibility for managing property is generally shared between property officials and property custodians. Property officials’ primary responsibilities relate to property management. For example, they may be responsible for updating property data systems, providing property lists and instructions for property inventories, resolving issues that arise with property management, and managing the disposal process after a property custodian has determined that an item is no longer needed. Property custodians are generally program managers who are assigned responsibility for specific property items associated with the program they manage as an ancillary duty. For example, property custodians may be required to conduct physical inventories of property assigned to their program and work with a property official to resolve any issues arising during the inventory. Depending on how an agency uses its warehouses and property, property custodians may be responsible for property in a single warehouse, in multiple warehouses, or in a variety of locations. Moreover, multiple property custodians may be responsible for property in a single warehouse, as depicted in figure 1. The three selected agencies had a total of 1,221 warehouses, with over 6.4-million square feet, that contained a broad array of property. Although comprehensive data on property in these agencies’ warehouses were unavailable, interviews, site visits, and agencies’ data on warehouses themselves provided some information on the types of property in them. We found that the agencies had some commonalities in the contents of their warehouses. For example, all three had warehouses that contained material-handling equipment, such as fork lifts, as well as excess property being processed for disposal. However, much of the property in agencies’ warehouses was specific to their missions, according to agency officials and our observations. Table 1 includes information about the agencies’ warehouses and examples of the types of agency-specific property in them. We also visited warehouses at each of the selected agencies to obtain additional information about and view the types of property stored within them, as described below. FAA. FAA had warehouses at four main sites that contained property specific to the sites’ missions, and most of the remaining warehouses were buildings that contained equipment, tools, or materials to maintain aviation support systems or housed support systems, such as approach lighting systems, according to our analysis of FAA warehouse data, FAA officials, and sites we visited. For example, we visited FAA’s warehouses at the Mike Monroney Aeronautical Center, including the Logistics Support Facility, FAA’s largest warehouse and central location for maintaining and repairing aviation support systems deployed throughout the national airspace system. Most items in the warehouse were spare parts, materials, and systems or system components that had been sent to the facility for repair. We also visited FAA’s Staging Area, which supports FAA’s manufacture and assembly of new systems to be deployed throughout the country. Accordingly, much of the property at the two warehouses that comprise this facility was equipment, parts, and material, along with the machines and tools to manufacture and assemble the material. For example, we viewed components of a wind shear alert system that were being prepared to be shipped. FAA’s Mobile Asset Deployment Center stored and maintained FAA’s mobile assets, such as air traffic control towers and housing units that FAA deploys to maintain service during disruptions such as natural disasters. Finally, we visited a 96-square-foot shack—identified in FRPP as a warehouse and pictured below—that housed an approach lighting system. (See fig. 2 for examples of FAA warehouses and property.) Office of Science. Most Office of Science warehouses were located at Office of Science national laboratories. Warehouses at the two national laboratories we visited—Argonne National Laboratory and Fermi National Accelerator Laboratory—contained a broad variety of equipment, including equipment being staged for near-term use and equipment in longer-term storage specifically designated for future projects. For example, one warehouse at Fermi National Accelerator Laboratory contained a cryogenic system acquired by CERN, the European Organization for Nuclear Research, as its contribution to a planned experiment. This cryogenic system will be used for cooling purposes. A warehouse at the same site also contained some decades-old items kept as replacements for items still in use. According to officials, many of these older items would be difficult to obtain in a reasonable time frame for a reasonable price if a replacement were needed. In addition, at Fermi National Accelerator Laboratory, we saw a large, out-of-use calorimeter— a device commonly used in physics experiments—that was being stored for eventual use in an educational display. Warehouses also contained parts, materials, and supplies for laboratory use. (See fig. 3 for examples of Office of Science warehouses and property.) BOP. Most of the BOP warehouses were located at correctional institutions throughout the country, served similar functions, and contained similar types of property for inmate use, according to BOP headquarters officials and our review of BOP real property data. The two correctional institutions we visited each had a warehouse that served as a distribution center, where items arriving at the institution were received, processed, and sent to the appropriate personnel within the institution, and a food service warehouse, where food items used to feed the inmate population were stored. At one institution, non-perishable items for inmate use, such as uniforms, mattresses, soap, and toilet paper were stored at the distribution center, while the other institution we visited stored less property at the distribution center and expedited delivery to the relevant division. Additionally, one institution used a warehouse to store dairy equipment in support of an inmate-run dairy. (See fig. 4 for examples of BOP warehouses and property.) All three selected agencies tracked certain direct costs for owned and leased warehouses, including operations and maintenance costs for owned warehouses and some leased warehouses, and the rental cost for leased warehouses (see table 2). Although the agencies had this cost information, they did not use it to systematically determine how much it costs to store their property in warehouses, whether at an aggregate or per-item level. Two features of how these agencies track property and warehouse costs would make it difficult to do so. First, as mentioned above, selected agencies did not have comprehensive information on items in warehouses, information that would be needed to determine per-item storage costs. Second, selected agencies generally incurred direct costs—rent, operations costs, and maintenance costs—at a warehouse level. However, because a warehouse may have had some of its square footage dedicated to other uses, such as office or laboratory space, it would be difficult to ascertain what percentage of costs would be allocated to storage versus these other uses. Moreover, in some cases, operations costs, such as utilities, were incurred at a multi-building level, making it difficult to determine what portion of the bill is attributable to a single warehouse. Finally, selected agencies generally did not track indirect costs, such as personnel costs for conducting regular inventories and other administrative costs associated with storing property in their warehouses, according to agency officials. While none of the selected agencies systematically tracked property storage costs, we did identify one Office of Science site, one Department of Transportation site, and one Department of Justice site that analyzed the use of specific portions of warehouses for cost allocation purposes. Officials at these agencies said that this approach may create incentives for property custodians to identify excess property in a timelier manner. Argonne National Laboratory, within the DOE’s Office of Science, annually analyzes direct costs for each building, including warehouses, and charges each division within the laboratory for the space it occupies. A report assessing contractor performance at DOE’s Fermi National Accelerator Laboratory noted that implementation of such a system could be an effective way to hold divisions accountable for the number of items they have in storage. The Department of Transportation and the Department of Justice each manage a warehouse near their respective headquarters that they use to store property for various divisions within each department. The departments charge users for the portions of the warehouses they occupy. While these approaches may create incentives to identify unneeded property in a timely manner, they may not be applicable for all circumstances. For example, staff at Fermi National Accelerator Laboratory stated that they explored the cost and benefits of analyzing space use to allocate costs by user but had not found it to be cost- effective or feasible. In addition, allocating costs based on warehouse usage would be challenging if users’ space usage changes regularly. Two of the three agencies we reviewed had policies in place explaining the frequency in which property custodians should assess property for ongoing need. Specifically, the Office of Science and BOP had policies that called for identifying unneeded property beyond the statutory requirement to continually survey property to identify excess. For example, DOE regulations, which cover the Office of Science, require managers to perform walkthroughs at least every 2 years to identify unneeded property. According to officials, these walkthroughs are conducted by contractors that manage national laboratories. Similarly, BOP policy requires that property custodians conduct an annual site inspection to identify unneeded property prior to the annual inventory, and, according to officials, this process is overseen by the institution’s associate warden. In contrast, FAA policy does not set any timeframe for property custodians to identify unneeded property. However, according to one FAA headquarters official, assessing property for ongoing need is inherent to the inventory process, which, according to FAA policy, should occur at least every 3 years for accountable property. In addition, only DOE had specific requirements to determine if property is needed. Specifically, DOE regulation requires written justification for retention of property classified as equipment held for future projects. If equipment is retained for longer than a year, the justification is to be reviewed by a higher level of authority, and retention of such equipment for longer than 3 years requires approval by the head of the DOE field organization. The Office of Science Organizational Property Management Officer—who is responsible for reviewing contractors that manage Office of Science sites—reviewed sites’ adherence to this requirement using metrics, such as acquisition date and time in storage, according to officials. Beyond this particular requirement for DOE, none of the agencies had a systematic way to identify property that may be unneeded. Instead, they primarily relied on professional judgment to determine the ongoing need for property in warehouses in the absence of guidance on how to determine whether property is still needed. For example, FAA officials confirmed that they do not have guidance or metrics on how to identify unneeded property and typically rely on property custodians’ professional judgment. According to officials at one FAA site we visited, property custodians do not use specific criteria for identifying unneeded property because it is obvious when items are no longer needed. Similarly, at the BOP institutions we visited, officials confirmed that they rely on property custodians’ professional judgment, along with the judgment of associate wardens, to identify unneeded property during the annual site inspections, but acknowledged that this has led to different outcomes. For example, at one site we visited, site officials stated that some associate wardens are more inclined than others to require property custodians to identify property as unneeded. While officials at all of the selected agencies said they believed property custodians were able to identify unneeded property in a timely manner using their professional judgement, we identified instances, through our interviews and agency assessments, where agencies had retained unneeded property in storage. While the agencies identified and in most cases addressed these instances, these situations demonstrate the challenges associated with agencies’ existing approaches. Specifically: A 2016 report from DOT’s inspector general found that FAA property custodians allowed obsolete computers to remain on the property records, including computer systems manufactured in 2006 or earlier that were likely no longer in use because of their 3- to 4-year lifecycles. In 2018, a review found that Fermi National Accelerator Laboratory’s contractor was storing IT equipment, which had not been classified as equipment held for future projects, dating back to 1998. The report recommended that the contractor review all IT equipment for continued need and that certain items be removed from the active inventory in their asset management system. BOP headquarters officials told us that, when assisting regional office personnel in training a new property official at an institution, they noticed the institution was storing inmate clothing that exceeded the institution’s needs. According to the officials, they worked with the new property official to transfer the clothing from the institution to another BOP institution that needed it. Selected agencies’ limited guidance on how to identify unneeded property and reliance on professional judgment were not unique to the agencies in our review. For example, in a previous review that examined five agencies—Environmental Protection Agency, Forest Service, GSA, Department of Housing and Urban Development, and Internal Revenue Service—we found that selected agencies did not have policies and processes for identifying unneeded property on a proactive basis and relied on “triggering events,” such as an office move to make excess property decisions. Moreover, the industry and standards-setting groups we interviewed for this review indicated that these approaches were common across the federal government. However, the industry stakeholders and federal agencies that participated in ICPM that we interviewed identified more systematic ways to identify unneeded property. For example: Periodic justification for continued storage. One agency implemented a policy in 2013 requiring written justification to retain certain accountable property for certain time periods, with the time period varying for different types of property. After the initial storage time period, written justification for continued storage must be reviewed and approved by an official who is above the property custodian. According to property officials, this policy has contributed to an estimated 35 to 40 percent reduction of property held in storage. Data analytics. Officials from another agency stated that they use a logistics management application to track and analyze information, such as property age, amount, rate of usage, and warehouse space availability. As a result, the agency has identified and disposed of excess property at various warehouses that otherwise would likely have been retained. For example, according to officials, analysis conducted using this application on idle property in one warehouse informed the decision to identify as unneeded a significant amount of furniture. A previous manager had acquired the furniture for use in staff housing, but the items were not well-suited to available housing in the area. Utilization reviews. Industry groups we interviewed advocated for increased use of data to assess utilization to inform decisions on whether to retain stored property, such as utilization reviews that systematically assess property utilization and continued need. For example, when conducting a utilization review, one stakeholder recommended a process that begins with pinpointing where the inactive population of property items reside. Upon locating anything that has been inactive for a certain period of time, within a certain storage area, those items are identified as candidates for disposal. After the results come in, the property custodians can recommend that a certain amount of items on the overall list are marked for disposal. While some stakeholders identified systematic ways to identify unneeded property in certain circumstances, limited government-wide guidance exists for agencies to use to determine whether property in warehouses is still needed and being used. Specifically, there are two sources for guidance related to assessing property in warehouses for ongoing need: ASTM’s standards for strategic warehousing and storage of property. The standard for strategic warehousing notes that entities often continue a warehouse activity largely because it is easier than going through the effort of dismantling it. It urges that entities consider whether warehousing is needed. Furthermore, the standard asserts that a sound business case should be in place to support storage of property, including a decision of whether the items need to be warehoused. The standard for storage of property notes that entities should deploy an inventory management system to track incoming and outgoing assets; such a system can help in developing performance metrics for stored items. GSA’s federal warehousing bulletin. This bulletin references the two ASTM standards identified above and discusses the importance of critically assessing the need for items in storage, but provides limited information on how to make such assessments. According to GSA officials, the use of voluntary consensus standards, such as ASTM standards, can assist agencies with property management. However, only one agency official we interviewed stated that voluntary consensus standards informed the agency’s policy; the others we interviewed were either unaware of the standards or said the standards were not relevant to agency policy or practice. The FPPMA requires agencies, in accordance with GSA guidance, to inventory and assess property. As part of such assessments, it calls for evaluations of the age and condition of the property and the extent to which the agency uses it. According to officials at the selected agencies, they are waiting for guidance from GSA before taking steps to implement FPPMA. According to GSA officials, they are in the process of developing informal guidance on minimizing and identifying excess property to meet this requirement because FPPMA did not provide GSA additional authority to issue regulations or formal guidance. In particular, GSA developed draft guidance, which incorporated principles from a new ASTM standard on identifying and reducing excess property that GSA officials expect will be issued in early 2020, and provided it to ICPM participants for review and comment in September 2019. According to GSA officials, this informal guidance will be issued in December 2019. GSA officials plan to include the guidance on the GSA website and disseminate it to ICPM participants and may provide it in hard copy at relevant GSA events. The draft guidance we reviewed encourages agencies to designate an individual to manage an agency’s asset management program and use that system to capture and provide information on property age, condition, utilization, and mission dependency on a real-time basis, among other things. The draft guidance also included some criteria agencies could use to identify excess property. However, the guidance did not provide specific approaches or practices agencies could use to assess property utilization, including property stored in warehouses. The draft guidance and an accompanying strategy document indicate that GSA will collect best practices and incorporate them into the guidance, but GSA officials did not specify what types of best practices it plans to include or provide a timeline for doing so. Including additional information on approaches or practices agencies can use to assess property use and ongoing need—such as periodic property justifications, data analytics, and utilization reviews—could assist agencies in fulfilling their FPPMA requirements. Moreover, GSA officials did not provide a documented plan or time frame for communicating the guidance beyond publishing it on GSA’s website and disseminating it to ICPM members, an approach that can limit the reach and awareness of this information to agencies government-wide. As we have previously reported, work by others has shown that inaction on unneeded government property can limit its efficient use. As agencies continue efforts to manage their warehouse space in accordance with government-wide initiatives, improvements to how agencies assess property utilization and identify unneeded property in warehouses could enhance these efforts. The agencies in our review did not systematically assess their property for ongoing need and in some cases, retained unneeded property. More broadly, agencies across the government are operating without the benefit of government-wide guidance that could help assess their property for ongoing need in a systematic manner. With the recent enactment of FPPMA, an opportunity exists for GSA to develop and communicate guidance to help agencies assess property utilization and identify unneeded property in warehouses more efficiently that includes practices GSA identifies as being useful. Such guidance could help agencies avoid retaining property that is no longer needed and, as a result, allow them to better manage the use of their warehouse space. The Administrator of GSA should direct the Office of Government-wide Policy (1) to incorporate into its guidance approaches or practices that agencies could use to assess utilization of and the ongoing need for property—approaches such as recommendations for periodic justifications, data analytics, and utilization reviews—and (2) to develop a plan and timelines for communicating the guidance to agencies government-wide. (Recommendation 1) We provided a draft of this report to GSA, DOT, DOE, and DOJ for review and comment. GSA concurred with our recommendation and provided written comments, which are reprinted in appendix II and summarized below. DOT, DOE, and DOJ each stated in an email that they had no comments on the draft report. In its written comments, GSA agreed with our recommendation and stated that it is further developing its guidance as well as a plan and timeline for dissemination of that guidance to executive agencies. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the GSA Administrator, the Secretary of Energy, the Attorney General, and the Secretary of Transportation, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact Lori Rectanus at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. This report addresses: (1) what is known about property in selected federal agencies’ warehouses and how much they spend to store this property and (2) the extent to which selected agencies assess the ongoing need for property stored in warehouses. To address both objectives, we selected three agencies for analysis—the Federal Aviation Administration (FAA) within the Department of Transportation; the Office of Science within the Department of Energy (DOE); and the Bureau of Prisons (BOP) within the Department of Justice. We limited our scope to civilian agencies because we have already done extensive work on property management within Department of Defense. At the department level, we used Reduce the Footprint data from fiscal year 2017 because they were the most current data available when we conducted the analysis to identify the top 10 departments in terms of warehouse square footage. To obtain variation among these agencies, we categorized these departments as large, medium, or small in terms of warehouse square footage and selected one from each category based on changes in square footage between fiscal years 2015 and 2017 using fiscal year 2017 Reduce the Footprint data and on the proportion of leased warehouse space to owned warehouse space using fiscal year 2017 Federal Real Property Profile (FRPP) data. Because none of the selected agencies manages property at the department level, we then selected a component within each department. For the Department of Transportation and the Department of Justice, we selected the components with the most warehouse square footage according to fiscal year 2017 FRPP data—FAA and BOP, respectively. For DOE, we used the agency’s fiscal year 2017 real property data to identify the components with the most warehouse square footage because DOE reports most information to FRPP at the department level rather than for specific offices, such as the Office of Science. We then selected the Office of Science, which had third highest amount of warehouse square footage, because of security concerns with one of the components with more warehouse square footage and because the other component with more warehouse square footage used a greater proportion of warehouse space to store nuclear and nuclear-related material. To determine what is known about property in selected agencies’ warehouses, we interviewed headquarters-level officials regarding the agencies’ property data, conducted site visits to view and photograph property stored in warehouses, and gathered information in interviews with agency officials. In selecting sites, we selected at least one site per agency that was among the largest in terms of warehouse square feet for that agency and at least one other site that was near one of the large sites, as described below: FAA: Mike Monroney Aeronautical Center in Oklahoma City, Oklahoma; Staging Area and Mobile Asset Deployment Center in Independence, Missouri; and Charles B. Wheeler Downtown airport in Kansas City, Missouri. Office of Science: Argonne National Laboratory and Fermi National Accelerator Laboratory in the Chicago area. BOP: U.S. Penitentiary Leavenworth in Leavenworth, Kansas, and Federal Correctional Institute El Reno in El Reno, Oklahoma. For each agency, we also interviewed officials at the headquarters and regional levels. Information obtained from these sites and regional officials is not generalizable to the selected agencies, and information from these agencies is not generalizable to other agencies. To determine how much selected agencies spend to store property in warehouses, as well as the numbers and square footage of these warehouses, we analyzed FRPP data from fiscal year 2018 for FAA and BOP, and DOE fiscal year 2018 real property data for the Office of Science because DOE reported most data to FRPP at the department level; both sources included information about direct costs such as rent, operations, and maintenance costs. We used FRPP data from fiscal year 2018 because that was the most recent data available when we conducted our analysis and DOE data covering the same period to be consistent. We reviewed documentation related to these data sources, interviewed knowledgeable officials, and determined that these data were sufficiently reliable for providing information about warehouse numbers, square footage, and the costs listed above. To determine the extent to which selected agencies assess the ongoing need for property stored in warehouses, we reviewed statutes, regulations, GSA guidance, our prior work, reports by federal agencies’ Offices of Inspector General, and relevant industry standards related to property storage and warehousing practices. In addition, for selected agencies we analyzed property policies and procedures for identifying and disposing of unneeded property and interviewed headquarters, regional, and site officials. We also interviewed three industry stakeholders—two property-management and one standards-setting organization—to discuss property storage and warehousing processes, practices, and standards that agencies could use to assess the ongoing need for property. We selected these organizations based on their knowledge about property management practices. Furthermore, we interviewed officials from four agencies—Census Bureau, Department of State, Internal Revenue Service, and National Aeronautics and Space Administration—that participate in the Interagency Committee on Property Management (ICPM), a committee chaired by GSA that consists of executive agency representatives interested in federal property. We invited all ICPM participants to speak with us regarding their practices for identifying unneeded property and interviewed all participants who volunteered to participate to understand how other agencies assess property for ongoing need. Finally, we reviewed FPPMA’s requirements and interviewed GSA’s Office of Government-wide Policy officials about GSA’s role in assisting agencies in identifying unneeded federal property, how FPPMA could affect GSA’s roles and responsibilities going forward, and GSA’s progress in implementing FPPMA. We conducted this performance audit from October 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individual named above, the following individuals made important contributions to this report: Nancy Lueke (Assistant Director), Rebecca Rygg (Analyst-in-Charge), Terence Lam, Malika Rice, Kelly Rubin, Patrick Tierney, Laurel Voloder, and Crystal Wesco.", "summary": "Federal civilian agencies hold and manage billions of dollars in property that is not considered to be real property, such as vehicles, furniture, computers, and scientific instruments. Some of these items are stored in nearly 18,000 warehouses covering more than 90-million square feet. Agencies are required by law to regularly identify and dispose of unneeded items. However, GAO reported in 2018 that agencies often did not do so. The Federal Personal Property Management Act of 2018 requires agencies to use GSA guidance to assess the utilization and ongoing need for property. GAO was asked to review property stored in warehouses. This report examines: (1) what is known about property in selected agencies' warehouses and how much agencies spend to store it, and (2) the extent to which selected agencies assess the ongoing need for property stored in warehouses. GAO reviewed federal statutes, regulations, and GSA's guidance; analyzed policies from three agencies—FAA, Office of Science, and BOP—which were selected based on total warehouse square footage, among other factors; conducted site visits to agencies' warehouses; and interviewed stakeholders such as agency officials and industry groups. GAO found that three selected agencies stored a wide variety of property in their warehouses. For example: Federal Aviation Administration (FAA) warehouses at four main sites contained items used to build and repair aviation support systems, such as wind shear alert systems. Other sites contained tools and equipment to maintain aviation support systems or housed the systems themselves. The Department of Energy's Office of Science warehouses, located primarily at national laboratories, contained items, such as large magnets, for use in scientific experiments. Bureau of Prisons (BOP) warehouses, located mainly at federal correctional institutions, contained items, such as food, uniforms, and soap, for inmates. The above agencies reported spending approximately $50.1 million in fiscal year 2018 on warehouse rent, operations, and maintenance costs. The three selected agencies generally did not systematically assess the ongoing need for property in their warehouses and had limited guidance for doing so. For example, although two of the agencies had policies about when such an assessment should occur, none of the agencies specified how it should occur for most types of property. Instead, agencies primarily relied on agency officials' professional judgment to assess ongoing need. GAO identified instances where agencies retained unneeded property absent relevant guidance. For example, one agency site had stored obsolete computers dating back to the 1990s. While the General Services Administration (GSA) drafted guidance in response to recent legislation, this guidance does not describe approaches or practices stakeholders identified as potentially useful for assessing ongoing need for property, such as periodic retention justifications, use of data analytics, and utilization reviews. Further, while GSA officials intend to put the final guidance on GSA's website and provide it to agencies that participate in a GSA-chaired committee on property management by December 2019, GSA has not provided a documented plan or a timeline for broader dissemination. Guidance that incorporates such approaches could help agencies avoid retaining property that is no longer needed and, as a result, allow them to better manage their property and use of their warehouse space. GAO recommends that GSA incorporate approaches agencies could use to assess the ongoing need for property in GSA's guidance—such as periodic justifications, use of data, and utilization reviews—and develop a plan for communicating the guidance government-wide. GSA concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "In our review of 57 providers selected for our February 2019 report, we found that the responsible VA medical centers took action against some providers with disqualifying information in the NPDB but overlooked others. We found that VA medical centers took administrative or disciplinary actions against some providers, such as removing them from patient care, after becoming aware of adverse information in the NPDB. However, many of these actions were taken following our review and a VHA-wide licensure review, both of which occurred in 2018, rather than at the time of the NPDB report. Specifically, the responsible VA medical centers removed five providers who they determined did not meet VA licensure requirements following our inquiries. For example, one of these five providers had surrendered a license in 2014, while employed at VA, but was not removed by the VA medical center until after our inquiries in 2018. Additionally, another provider was reported to the Drug Enforcement Administration (DEA) by a VA medical center after we inquired about the provider prescribing controlled substances without appropriate registration. We also found that VA medical centers hired or retained some of the 57 providers who they acknowledged had disqualifying adverse information in the NPDB, which is inconsistent with VHA policy. Specifically, these providers had licenses that were revoked or surrendered for cause, but VA medical center officials overlooked or were unaware of this information. However, none of these providers still worked at VHA at the time we completed our review. For example, one VA medical center hired a provider who had a state license revoked for patient neglect and substandard care. VA medical center officials stated that they received the NPDB report about the revoked license at the time the provider was hired in 2014 but it was inadvertently overlooked by multiple staff. This provider voluntarily resigned in 2017. In our February 2019 report, we found that three factors were largely responsible for inconsistent adherence to VHA policies that disqualify providers from employment. First, some medical center officials are not aware of key VHA policies, such as the requirement that a provider who has had a license revoked or surrendered for cause is ineligible for employment unless the license is reinstated. For example, in the case of the provider who surrendered a license in 2014, documentation shows that the medical center staff became aware of the surrendered license in 2015, but VHA staff stated that the removal was stalled due to confusion about policies. This lack of awareness of key policies may be linked to a lack of mandatory training for credentialing staff. Second, gaps in VHA policy allow for inconsistent interpretation. For example, VHA has not issued policies pertaining to employing providers who have had their DEA registration for prescribing controlled substances revoked or surrendered for cause. While the DEA requires registrants, like VHA, to obtain a waiver before employing such providers, VHA policy is silent on the requirement to obtain a waiver; we found that VA medical center officials were unclear on the DEA requirement and had hired providers without obtaining the required DEA employment waiver. Further, we found that two providers inappropriately prescribed controlled substances without a DEA waiver. Third, VHA’s oversight of VA medical centers’ reviews of adverse information is inadequate. Under VHA policy, VISN officials are responsible for reviewing providers with certain adverse licensure actions. However, we found that this review was not always conducted or documented. Further, although VHA-wide reviews of provider licenses have been completed and have identified providers with licensure issues, VHA officials indicated that these types of reviews are not routinely conducted because they are labor intensive. In our February 2019 report, we also found that some VA medical centers had taken steps to improve the credentialing process and identify providers who do not meet the licensure requirements. For example, one medical center completed a periodic review of all licensed providers to identify providers who may have had an expired licensure issue. Another VA medical center updated its policies to require providers with adverse actions to be reviewed by management. However, we found that VHA does not routinely assemble and disseminate information about initiatives that medical centers have undertaken to improve the oversight of providers. In our February 2019 report, we concluded that without consistent adherence to VHA employment policies and adequate oversight, VHA lacks assurance that all VA providers have the appropriate professional qualifications and clinical abilities to care for patients. To address these shortcomings, in our February 2019 report we made seven recommendations to VA. VA concurred with these recommendations. Table 1 summarizes these recommendations and the steps VA has taken to address them. As we reported in November 2017, we found that from October 2013 through March 2017, the five selected VA medical centers required reviews of a total of 148 providers’ clinical care after concerns were raised about their care. However, for almost half of these reviews, officials at these medical centers could not provide documentation to show that the reviews had been conducted. We found that all five VA medical centers lacked at least some documentation of the reviews they told us they conducted, and in some cases, we found that the required reviews were not conducted at all. For example, we found that the medical centers lacked documentation showing they conducted a prospective review of 26 providers. Additionally, VA medical center officials confirmed that they failed to conduct this required review for an additional 21 providers. We also found that the five selected VA medical centers did not always conduct reviews of providers’ clinical care in a timely manner. Specifically, of the 148 providers, the VA medical centers did not initiate reviews of 16 providers for 3 or more months, and in some cases, for multiple years, after concerns had been raised about the providers’ care. For three of these 16 providers, additional concerns about the providers’ clinical care were raised before the reviews began. In our November 2017 report, we found that two factors were largely responsible for the inadequate documentation and untimely provider reviews. First, VHA policy does not require VA medical centers to document all types of reviews of providers’ clinical care, including retrospective reviews, and VHA has not established a timeliness requirement for initiating reviews of providers’ clinical care. Second, VHA’s oversight of the reviews of providers’ clinical care is inadequate. Under VHA policy, VISN officials are responsible for overseeing the credentialing and privileging processes at their respective VA medical centers. While reviews of providers’ clinical care after concerns are raised are a component of credentialing and privileging, we found that none of the VISN officials we spoke with described any routine oversight of such reviews. This may be in part because the standardized tool that VHA requires the VISNs to use during their routine audits does not direct VISN officials to ensure that all reviews of providers’ clinical care have been conducted and documented. Further, some of the VISN officials we interviewed told us they were not using the standardized audit tool as required. In our November 2017 report, we concluded that without adequate documentation and timely completion of reviews of providers’ clinical care, VA medical center officials lack the information they need to make decisions about providers’ privileges, including whether or not to take adverse privileging actions against providers. Furthermore, because of its inadequate oversight, VHA lacks reasonable assurance that VA medical center officials are reviewing all providers about whom clinical care concerns have been raised and are taking adverse privileging actions against the providers when appropriate. To address these shortcomings and improve VA medical center reviews of provider quality and safety concerns, we made three recommendations to VA in our November 2017 report. VA concurred with these recommendations. Table 2 summarizes these recommendations and the steps VA has taken to address them. In our November 2017 report, we found that from October 2013 through March 2017, the five VA medical centers we reviewed had only reported one of nine providers that should have been reported to the NPDB as required by VHA policy. Furthermore, none of these nine providers were reported to state licensing boards as required by VHA policy. These nine providers either had adverse privileging actions taken against them or resigned or retired while under investigation before an adverse privileging action could be taken. The VA medical centers documented that these nine providers had significant clinical deficiencies that sometimes resulted in adverse outcomes for veterans. For example, the documentation shows that one provider’s surgical incompetence resulted in numerous repeat surgeries for veterans. Similarly, the documentation shows that another provider’s opportunity to improve had to be halted and the provider was removed from providing care after only a week due to concerns that continuing the review would potentially harm patients. In addition to these nine providers, one VA medical center terminated the services of four contract providers based on deficiencies in the providers’ clinical performance, but the facility did not follow any of the required steps for reporting providers to the NPDB or relevant state licensing boards. This is concerning, given that the VA medical center documented that one of these providers was terminated for cause related to patient abuse after only 2 weeks of work at the facility. At the time of our review, two of the five VA medical centers we reviewed each reported one provider to the state licensing boards for failing to meet generally accepted standards of clinical practice to the point that it raised concerns for the safety of veterans. However, we found that the medical centers’ reporting to the state licensing boards took over 500 days to complete in both cases, which was significantly longer than the 100 days suggested in VHA policy. Across the five VA medical centers, we found that providers were not reported to the NPDB and state licensing boards as required for two reasons. First, VA medical center officials were generally not familiar with or misinterpreted VHA policies related to NPDB and state licensing board reporting. For example, at one VA medical center, we found that officials failed to report six providers to the NPDB because they were unaware that they were responsible for NPDB reporting. Officials at two other VA medical centers incorrectly told us that VHA cannot report contract providers to the NPDB. Second, VHA policy does not require the VISNs to oversee whether VA medical centers are reporting providers to the NPDB or state licensing boards when warranted. We found, for example, that VISN officials were unaware of situations in which VA medical center officials failed to report providers to the NPDB. As a result of VHA staff misinterpretation of VHA policy and insufficient oversight, we concluded that VHA lacks reasonable assurance that all providers who should be reported to the NPDB and state licensing boards are reported. Consequently, the NPDB and state licensing boards in other states where the providers we identified held licenses were not alerted to concerns about the providers’ clinical practice. We reported that this could allow a provider who delivered substandard care at one VA medical center to obtain privileges at another VA medical center or at hospitals outside of VA’s health care system. In our November 2017 report, we noted several cases of this occurring among the providers who were not reported to the NPDB or state licensing boards by the five VA medical centers we reviewed. For example, We found that two of the four contract providers whose contracts were terminated for clinical deficiencies remained eligible to provide care to veterans outside of that VA medical center. At the time of our review, one of these providers held privileges at another VA medical center, and another participated in the network of providers that can provide care for veterans in the community. We also found that a provider who was not reported as required to the NPDB during the period we reviewed had their privileges revoked 2 years later by a non-VA hospital in the same city for the same reason the provider was under investigation at the VA medical center. Officials at this VA medical center did not report this provider following a settlement agreement under which the provider agreed to resign. A committee within the VA medical center had recommended that the provider’s privileges be revoked prior to the agreement. There was no documentation of the reasons why this provider was not reported to the NPDB. To improve VA medical centers’ reporting of providers to the NPDB and state licensing boards and VHA oversight of these processes, we made one recommendation in our November 2017 report. VA concurred with this recommendation. Table 3 summarizes the recommendation and the steps VA has taken to address it. Chairman Pappas, Ranking Member Bergman, and Members of the Subcommittee, this concludes my statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff members have any questions concerning this testimony, please contact me at (202) 512-7114 (silass@gao.gov). Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals who made key contributions to this testimony include Marcia A. Mann (Assistant Director), Kaitlin M. McConnell (Analyst-in-Charge), Summar C. Corley, Cathy Hamann, Jacquelyn Hamilton, and Vikki Porter. Other contributors include David Bruno, Julia DiPonio, Ranya Elias, Kathryn A. Larin, and Joy Myers. According to Department of Veterans Affairs’ (VA) Veterans Health Administration (VHA) policies, all licensed health care providers must be credentialed before they are permitted to work. Credentialing is the process of screening and evaluating qualifications and other credentials— including licensure, education, and relevant training—that is the first step in the process of determining whether the provider has appropriate clinical abilities and qualifications to provide medical services. Credentialing processes and requirements differ for independent licensed providers, such as doctors—who are permitted by law and the facility to deliver patient care services independently, without supervision—and dependent providers, such as nurses—who deliver patient care under the supervision or direction of an independent provider. Additionally, VHA policy states that only licensed independent providers may be granted clinical privileges. Privileging is a process through which a provider is permitted by a facility to independently provide medical or patient care that is in alignment with the provider’s clinical competence. Figure 1 provides a summary of the VHA credentialing and privileging processes for independent and dependent providers. VHA facilities are also required to monitor providers’ licenses after they are hired to ensure the licenses are current and review any licensure actions, in accordance with VHA policy. Figure 2 provides a summary of VHA’s processes for monitoring independent and dependent providers’ licenses. Veterans Health Administration: Greater Focus on Credentialing Needed to Prevent Disqualified Providers from Delivering Patient Care. GAO-19-6. Washington, D.C.: February 28, 2019. Department of Veterans Affairs: Actions Needed to Address Employee Misconduct Process and Ensure Accountability. GAO-18-137. Washington, D.C.: July 19, 2018. VA Health Care: Improved Oversight Needed for Reviewing and Reporting Providers for Quality and Safety Concerns. GAO-18-260T. Washington, D.C.: November 29, 2017. VA Health Care: Improved Policies and Oversight Needed for Reviewing and Reporting Providers for Quality and Safety Concerns. GAO-18-63. Washington, D.C.: November 15, 2017. Veterans Health Care: Improved Oversight of Community Care Physicians’ Credentials Needed. GAO-16-795. Washington, D.C.: September 19, 2016. VA Health Care: Improvements Needed in Processes Used to Address Providers’ Actions That Contribute to Adverse Events. GAO-14-55. Washington, D.C.: December 3, 2013. Veterans Health Care: Veterans Health Administration Processes for Responding to Reported Adverse Events, GAO-12-827R. Washington, D.C.: August 24, 2012. VA Health Care: Improved Oversight and Compliance Needed for Physician Credentialing and Privileging Processes. GAO-10-26. Washington, D.C.: January 6, 2010. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Nearly 165,000 licensed health care providers, such as physicians and nurses, provide care in VHA's VA medical centers and outpatient facilities. Medical center staff must determine whether to hire and retain health care providers by reviewing and verifying information about their qualifications and practice history. The NPDB is a key source of information about a provider's clinical practice history. Medical center staff must also investigate any concerns that arise about the clinical care their providers deliver. Depending on the findings from these reviews, medical centers may take an adverse privileging action against a provider. VA medical centers are required to report providers to the NPDB and state licensing boards under certain circumstances. Failing to adhere to these requirements can negatively affect patient safety. This testimony is primarily based on GAO's 2019 and 2017 reports on VHA processes for reviewing and reporting quality and safety concerns about VA providers. It addresses VA medical centers' implementation and VHA's oversight of (1) reviews of adverse information about providers in the NPDB; (2) reviews of providers' clinical care after concerns are raised; and (3) reporting of providers to the NPDB and state licensing boards. For the 2019 report, GAO reviewed a nongeneralizable sample of 57 VA providers who had an NPDB report. For the 2017 report, GAO reviewed providers whose clinical care was reviewed after a concern was raised about that care at a nongeneralizable selection of five VA medical centers. The Department of Veterans Affairs (VA) needs to take action to ensure its health care providers have the appropriate qualifications and clinical abilities to deliver high quality, safe care to veterans, as GAO recommended in its February 2019 and November 2017 reports. Specifically, GAO found the following: VA medical centers took action against some providers who did not meet VA licensure requirements, but overlooked others . In its 2019 report, GAO found that some VA medical centers took administrative or disciplinary actions against these providers, such as removing them from employment, after becoming aware of disqualifying information in the National Practitioner Data Bank (NPDB). The NPDB is an electronic repository that contains information on providers who have been disciplined by a state licensing board, among other information. However, in some cases VA medical centers overlooked or were unaware of disqualifying information in the NPDB. For example, officials told GAO they inadvertently overlooked a disqualifying adverse action and hired a provider whose license had been revoked for patient neglect. GAO found three reasons for this inconsistency: lack of mandatory training for key staff, gaps in Veterans Health Administration (VHA) policies, and inadequate oversight. Selected VA medical centers' reviews of providers' clinical care were not always documented . The five selected VA medical centers that GAO included in its 2017 report were required to review 148 providers' clinical care after concerns were raised about their care from October 2013 through March 2017. However, officials at these medical centers could not provide documentation to show that almost half of these reviews had been conducted. GAO found two reasons for inadequate documentation of these reviews: gaps in VHA policies and inadequate oversight of the reviews. Selected VA medical centers did not report providers to the NPDB or to state licensing boards as required . The five selected VA medical centers that GAO included in its 2017 report had reported one of nine providers to the NPDB that they were required to report from October 2013 through March 2017. None of these providers were reported to state licensing boards, as required by VHA policy. These nine providers either had adverse privileging actions taken against them—actions that limit the care providers can deliver at a facility or prevent the providers from delivering care altogether—or resigned or retired while under investigation before such an action could be taken. GAO found two reasons providers were not reported: lack of awareness or understanding of VHA policies and inadequate oversight of this reporting. GAO made 11 recommendations in its 2019 and 2017 reports to address the deficiencies identified. VA implemented two of these 11 recommendations, and provided action plans to address the other nine recommendations.", "document_type": "gao"}
{"report": "DOD’s policy is to ensure that eligible personnel and their families have access to affordable, quality housing facilities and services consistent with grade and dependent status, and that the housing generally reflects contemporary community living standards. From the inception of MHPI, the military departments were provided with various authorities to obtain private-sector financing and management to repair, renovate, construct, and operate military housing in the United States and its territories. Through these authorities, the military departments have entered into a series of agreements with private partners to provide housing to servicemembers and their families. The military departments have flexibility in how they structure their privatized housing projects, but typically the military departments lease land to private developers for 50- year terms and convey existing housing located on the leased land to the developer for the duration of the lease. The developer then becomes responsible for renovating and constructing new housing and for the daily management of these housing units. At the end of fiscal year 2017, 14 private partners were responsible for 79 privatized military family housing projects—34 for the Army, 32 for the Air Force, and 13 for the Navy and Marine Corps—in the United States, each of which includes housing at one or more military installation. The Deputy Assistant Secretary of Defense for Facilities Management, under the authority, direction, and control of the Assistant Secretary of Defense for Sustainment, is responsible for all matters related to MHPI and is the program manager for all DOD housing, whether DOD-owned, DOD-leased, or privatized. In this capacity, the Deputy Assistant Secretary is to provide both guidance and general procedures related to military housing privatization, as well as required annual reports to Congress on the status of privatized military housing projects. However, it is the responsibility of the military departments to execute and manage privatized housing projects, including conducting financial management and monitoring their portfolio of projects. Each military department has issued guidance that outlines its responsibilities for privatized housing, such as which offices are responsible for overseeing privatized housing projects. We have previously reported on DOD’s privatized housing program. Table 1 provides a summary of key findings and recommendations from our prior reports and the implementation status of the recommendations. Each military department conducts a range of oversight activities—some more extensive than others—for its privatized housing projects. For example, among other things, military departments review sample work order requests and inspect housing during the change of occupancy process. DOD guidance requires that the military departments ensure eligible personnel have access to quality housing facilities and services that generally reflect contemporary living standards. Further, DOD’s housing manual states that because privatization creates a long-term governmental interest in privatized housing, it is essential that projects be attentively monitored. Through its guidance, DOD delegates oversight responsibility of the individual privatized housing projects to each of the military departments. In addition, according to documents we reviewed, individual project business agreements set guidelines that convey the management, operation, and maintenance duties to the private partner, with the caveat that the military departments still have the right to access the premises or private partner records to ensure compliance with applicable laws. We determined that OSD and the military departments’ oversight has been limited in key areas. Specifically, our ongoing review showed (1) the scope of oversight of the physical condition of privatized housing has been limited; (2) performance metrics focused on quality of maintenance and resident satisfaction may not provide meaningful information on the condition of privatized housing; (3) there is a lack of reliable or consistent data on the condition of privatized housing; and (4) past DOD reports to Congress on resident satisfaction are unreliable due to inconsistent handling and calculation of the data, and therefore may be misleading. DOD delegates oversight responsibilities of the individual privatized housing projects to each of the military departments, and each military department has subsequently issued guidance outlining oversight roles and responsibilities. Military department oversight activities generally fall into two categories—(1) daily oversight of management and operations and (2) reviews of compliance with each project’s business agreements. Daily oversight of management and operations. Daily oversight of a project’s management and operations is to be conducted by each installation’s military housing office. Military housing officials told us activities to monitor the physical condition of housing units generally include reviewing sample work order requests, following up with a sample of residents to check on their experience with recently completed work, and inspecting housing units during the change of occupancy process. Based on our preliminary observations, the implementation and scope of these activities varies and can be limited. For example, during our site visits conducted from June through August 2019, we identified the following installation-specific practices: Military housing office officials at one Army installation told us that they inspect 100 percent of housing units that have completed change of occupancy maintenance. In contrast, officials from an Air Force installation told us that they inspect 10 to 20 percent of housing units that have completed change of occupancy maintenance. Military housing officials at one Marine Corps installation told us that for one of the two partners that own housing on the base, they had access to only 3 percent of completed work order tickets from the previous month, as reported to them by the private partner. Officials from a Navy installation told us that they had access to the private partner’s maintenance record system and would pull reports on new resident housing occupants who had made 6 or more maintenance calls in a 30-day period. Military housing officials at half of the sites we visited stated that staffing levels limited their ability to carry out oversight duties, such as work order data analysis and housing inspections. Reviews of compliance with each project’s business agreements. Reviews of compliance with a project’s business agreements are a joint effort between the local military housing office, the private partners, military department installation commands, and other echelons of command. These reviews can include neighborhood tours to view project amenities such as community centers, playgrounds, and pools, all of which are owned, maintained, and operated by the private partner companies, as well as exteriors of housing units. However, our preliminary work showed these reviews have been limited in the scope of their assessment of the physical condition of the housing units, as interior walk-throughs may have been limited to just a few housing units at each installation. According to military department officials, each department is currently taking steps to revise guidance and standardize daily oversight activities in an effort to provide consistent oversight across projects and installations, and to increase the focus of oversight on the physical condition of housing. The military departments are taking additional steps, such as increasing staffing levels, improving training for military housing office officials, and ensuring that housing officials have independent access to data. However, each military department is working to implement service-specific initiatives with only limited guidance from OSD on the level of oversight expected of the services as it relates to the condition of the housing. While existing OSD guidance provides objectives to the military departments for oversight of the condition of DOD-owned housing, guidance for privatized housing is focused on the implementation of projects, construction of new housing units, and financial management. The guidance does not include objectives for monitoring the condition of privatized housing projects, such as objectives focused on both ensuring the operation and maintenance of privatized housing to standards that provide safe living conditions for servicemembers and providing authorities to installation commanders to oversee those standards. We will continue to assess any implications of the lack of OSD guidance as part of our ongoing review. The military departments each use a range of project-specific performance metrics to monitor private partner performance, but our ongoing work showed that the metrics designed to focus on resident satisfaction and on the quality of maintenance conducted on housing units may not provide meaningful information or reflect the actual condition of the housing units. Most but not all of the private partners are eligible to receive performance incentive fees based on generally meeting the performance metrics established in each individual project’s business agreement. Private partner performance is measured through a variety of metrics, such as resident satisfaction, maintenance management, project safety, and financial management. To determine how well the private partners are performing under the metrics, military housing office officials told us that they rely on a range of specific indicators established in the project business agreements. However, the indicators themselves may not provide meaningful information on the private partner’s performance in maintaining quality housing units. For example, our preliminary work identified the following: Maintenance management. One indicator of performance of maintenance management that is regularly included in project business agreements measures how often the property manager’s response time to work orders meets required time frames established in the project’s business agreements. While this indicator measures the timeliness of the private partner’s response, it does not measure or take into account the quality of the work that was conducted or whether the resident’s issue was fully addressed. Some projects include indicators that aim to more directly measure quality, such as the number of work orders placed during the first 5 business days of residency, which may indicate the extent to which change of occupancy maintenance was completed. Resident satisfaction. One example of an indicator of resident satisfaction is whether a project has met the target occupancy rates established in the business agreements. An OSD official we spoke with and private partner officials told us they use occupancy as an indicator of satisfaction based on the assumption that residents would move if they were dissatisfied with their housing unit. However, based on our focus groups, this may not be a reliable assumption. Although most residents are not required to live in military housing, residents in each of our 15 focus groups indicated a variety of reasons for choosing to live in privatized housing, many of which did not have to do with their satisfaction with the quality or condition of their homes. For example, residents cited factors influencing their decision to live in privatized housing, such as living in close proximity to military medical or educational services for children or other family members who receive benefits through the military’s Exceptional Family Member Program, access to quality schools, and a lack of safe and affordable housing in the surrounding community. OSD and military department officials we spoke with recognized that the current metrics do not consistently focus on or prioritize the private partners’ performance with maintaining housing units and ensuring resident satisfaction. In October 2019 OSD issued new guidance standardizing the performance incentive fee framework across the military departments. According to OSD and the private partners with whom we spoke, this guidance was developed through a joint effort with the military departments and the private partners; it provides a framework where the metrics for resident satisfaction and maintenance management will account for a majority of the fee, with project safety and financial performance weighted less heavily. However, according to officials from OSD and officials we spoke with from each of the military departments, the specific indicators used to drive the metrics will need to be negotiated with each of the private partners for each project. Performance indicators designed to more directly measure the quality of maintenance conducted on housing units and resident satisfaction will provide military departments more transparency into private partner performance with regard to these two important metrics—metrics that are often directly tied to the performance incentive fees provided to the private partners. The housing projects’ business agreements typically include a requirement for the private partner to maintain a records management system to record, among other things, maintenance work requested and conducted on each housing unit. According to private partner officials, each company uses commercial property management software platforms that are used for activities such as initiating maintenance work orders and dispatching maintenance technicians. Some private partner officials also stated that data from the work order tracking systems were intended to prioritize and triage maintenance work, not to monitor the overall condition of privatized housing units. While data from these work order tracking systems may be useful for point-in-time assessments of work order volume at a given installation, military department officials told us that efforts are underway to monitor work order data to increase the military departments’ oversight and the accountability of the private partners for providing quality housing. However, in our ongoing work we observed that these data are not captured reliably or consistently for use in the ongoing monitoring of the condition of privatized housing units. We received and reviewed data from each of the 14 private partners’ work order tracking systems covering each of the 79 privatized family housing projects. Based on our preliminary analysis of the initial data provided by the private partners, we noted the following: Data anomalies. We identified anomalies in work order data from each of the 14 partners. For example, we identified instances of, among other things, duplicate work orders, work orders with completion dates prior to the dates that a resident had submitted the work order, and work orders still listed as in-progress for more than 18 months. Inconsistent use of terminology. Based on our preliminary review of the data provided by the private partners and discussions with private partner officials, we noted cases where work orders were inconsistently entered into the work order tracking systems with respect to two primary factors—(1) how the request is described by the resident or interpreted by the official entering the data, which can differ for each work order, and (2) the existing range of pre- established service category options in the private partner’s work order tracking system, which differ among the partners. Differing practices for opening and closing work orders. At some installations we visited, private partners noted changes in practices for opening and closing work orders, limiting the usefulness of the data in monitoring the status of work orders over time and thus the condition of privatized housing. According to military department officials, efforts to review data from the private partners’ work order tracking systems has increased, and military department officials told us that they have found similar limitations. However, there are no standard practices currently in place for assessing the accuracy and reliability of the work order data or for setting standard terminology and practices for opening and closing work orders. DOD is statutorily required to provide reports to Congress that include, among other things, information about military housing privatization projects’ financial health and performance and backlog, if any, of maintenance and repairs. These reports have included information on resident satisfaction with privatized housing based on results of the annual military department satisfaction surveys. Based on our preliminary work, we have determined that information on resident satisfaction in these reports to Congress on privatized housing has been unreliable and may be misleading due to variances in the data the military departments collect and provide to OSD and in OSD’s calculation and presentation of these data. In May 2019, OSD issued its report for fiscal year 2017, which stated that overall resident satisfaction for calendar year 2017 was 87 percent. For OSD’s fiscal year 2017 report, the military departments provided data on resident satisfaction based on information from the annual resident satisfaction surveys. Specifically, OSD’s instructions to the military departments required the military departments to report satisfaction based on resident responses to the question that asks: “Would you recommend privatized housing,” with results indicating how many tenants responded “yes,” “no,” or “don’t know.” However, the military departments’ approaches for collecting data in their annual resident satisfaction surveys varies, which limits their ability to assess whether residents would recommend privatized housing. Instead of asking whether residents would recommend privatized housing, the military departments’ annual resident satisfaction survey asks residents the following: “How much do you agree or disagree with the following statement, ‘I would recommend this community to others.’” A resident’s satisfaction with his or her community and inclination to recommend it to others may not be reflective of satisfaction with either the privatized housing unit or privatized housing in general. Residents are then provided the following response categories on a scale of 5 to 0: (5) strongly agree, (4) agree, (3) neither agree nor disagree, (2) disagree, (1) strongly disagree, and (0) not applicable, no opinion, don’t know, or no answer. Through our analysis, we have identified variances in the methods the military departments use to translate the residents’ responses into the “yes,” “no,” or “don’t know” categories. The variances in how the military departments calculate “yes,” “no,” or “don’t know” result in inconsistencies in how resident satisfaction is ultimately reported to Congress. Specifically: For the fiscal years 2015 through 2017 reports, Navy officials told us that they counted responses reported in categories 5 and 4 as “yes,” responses in categories 2 and 1 as “no,” and responses in categories 0 and 3 as “don’t know.” For the same time period, Air Force officials told us that they counted responses in categories 5, 4, and 3 as “yes,” responses in categories 2 and 1 as “no,” and responses in category 0 as “don’t know.” The Army calculated responses differently for the fiscal years 2015, 2016, and 2017 reports. Specifically: For the fiscal year 2015 report, the Army counted responses in categories 5, 4, and 3 as “yes,” responses in categories 2 and1 as “no,” and responses in category 0 as “don’t know.” For the fiscal year 2016 report, the Army counted responses in categories 5 and 4 as “yes,” responses in categories 2, 1, and 0 as “no,” and responses in category 3 as “don’t know.” For the fiscal year 2017 report, the Army counted responses in categories 5 and 4 as “yes,” responses in categories 2 and 1 as “no,” and responses in categories 0 and 3 as “don’t know.” In our ongoing work, we have also identified instances of errors and inaccuracies in how OSD calculates these data and reports on resident satisfaction to Congress. Specifically, we found missing data points and incorrect formulas, among other errors, in OSD’s calculation of the data submitted by the military departments for OSD’s fiscal year 2017 report to Congress. For example: The formula used by OSD to calculate overall resident satisfaction for the fiscal year 2017 report did not include data for several projects, including for four Army projects that, as of September 30, 2017, accounted for over 18 percent of the Army’s total housing inventory. Additionally, we identified that OSD did not include resident satisfaction data for a Navy project in its fiscal year 2017 report to Congress, even though when we reviewed the Navy’s submission to OSD, we found that the Navy had included data for that project. For one Air Force project, OSD reported identical resident satisfaction data for the fiscal year 2015, 2016, and 2017 reports, despite the fact that Air Force officials had noted in their submissions to OSD that the resident satisfaction data were from the annual resident satisfaction survey conducted in December 2013. We also found that presentation of data in OSD’s report to Congress may be misleading because OSD did not explain the methodology it used to calculate the overall resident satisfaction percentage or include caveats to explain limitations to the data presented. Specifically, OSD did not include information on overall response rates to the annual satisfaction survey for each military department, nor did it include response rates by project. Low response rates can create the potential for bias in survey results. For example, in the report for fiscal year 2017, OSD reported that 25 percent of residents living in renovated housing units for one privatized housing project were satisfied with their housing, but we found that only four residents had provided responses to this question. Thus, only one resident reported being satisfied. In addition, we found that OSD did not provide an explanation in the report for why five projects were listed as “not applicable.” According to OSD officials, this error was a quality control issue that they plan to address. According to OSD officials, OSD and the military departments are reviewing the resident satisfaction survey questions and will be identifying and implementing measures to ensure an accurate and reliable process to compile, calculate, report and compare MHPI resident satisfaction by military department and across DOD. Military housing office officials located at each installation are available to provide resources to servicemembers experiencing challenges with their privatized housing, among other services, but these offices have not always effectively communicated this role to residents of privatized housing. The military housing office is to provide new residents with information on their local housing options, to include referral services for housing options. According to some military housing office officials, the military housing office then works with the private partner to identify the eligibility and type of home the servicemember qualifies for, if the resident chooses to live in privatized housing. According to some residents we spoke with in one of our focus groups, beyond this initial interaction, military housing office officials generally do not interact with residents on a regular basis. Additionally, residents who participated in our focus groups noted they were sometimes confused about the military housing offices’ roles and responsibilities with regard to the maintenance of their home; there was a perception that the military housing office was not working independently of the partner in the residents’ best interest; or they did not know the military housing office existed. The military department oversight agencies have acknowledged resident confusion and a lack of awareness regarding the role of the military housing offices as an issue. In May 2019, the Army Inspector General reported to the Secretary of the Army that at 82 percent of Army installations with privatized housing, residents did not know how to escalate issues to either the private partner or the Army housing office. Additionally, the Army Inspector General reported that installation command teams and staff cited multiple circumstances where military housing offices and tenant advocacy roles and responsibilities were unclear. Further, some military housing office officials with whom we spoke during our site visits acknowledged the gap in resident awareness regarding the existence and purpose of the military housing office. Some military housing officials also noted that some residents are unaware of the difference between the military housing office and the private partner office, due in part to their physical co-location and unclear building signage. Each military department has issued information that establishes that its housing offices can assist in the resident dispute resolution process. Specifically, if servicemembers are experiencing a dispute with a private partner, military department guidance establishes varying roles for their respective military housing office officials. For example, Army policy states that each installation should have an official tasked with supporting servicemembers regarding resident issues that cannot be resolved by the private property manager. This individual is also responsible for resolving every resident complaint and the military housing office, if required, can request mediation by the garrison commander. Despite this guidance, according to DOD officials, the military departments had generally decreased their staffing and oversight of daily privatized housing operations since the enactment of MHPI. For example, Army officials we spoke with in January 2019 told us that they typically filled 80 percent of available military housing office positions across their installations. Additionally, officials stated that housing offices were generally staffed with two or three officials responsible for assisting servicemembers with housing needs both on the installation as well as in the local community. Further, the officials told us that the team at one Army installation was decreased from about 15 to 3 positions. According to OSD officials, while housing offices should generally not require the number of personnel that were necessary prior to privatization, reductions following sequestration reduced housing staff below the level necessary to fully perform required privatized housing oversight as it was originally envisioned at the outset of the program. OSD has recognized that the military departments’ communication with residents about their role as a resource for them has been limited. In February 2019, the Assistant Secretary of Defense for Sustainment testified before Congress that a way forward in addressing resident concerns would require focus in three key areas: communication, engagement, and responsiveness. Some military housing office officials told us they have taken steps to increase resident awareness, such as increasing the advertising of the military housing office’s role and contact information, conducting town hall meetings, and rebranding their military housing offices to differentiate them from the private partners. For example, a Marine Corps housing office official stated that the housing office established a document, which is distributed to residents by the private partner, informing residents of housing office contact information and the service’s 3-step dispute resolution process, but efforts have not been standardized across all projects. OSD, the military departments, and the private partners have identified and begun collaborating on a series of initiatives aimed at improving residents’ experiences with privatized housing, but our preliminary work showed that these efforts face challenges. According to an OSD official, a series of initiatives has been identified and are some are currently in various phases of development and implementation. Tri-service working groups, each chaired by a designated military department and comprising officials and legal counsel from each military department as well as private partner representatives, are leading efforts to develop and implement the initiatives. In particular, DOD and the private partners are collaborating on the following key initiatives: Development of a Resident Bill of Rights. The Resident Bill of Rights is to provide clarity to residents on their rights and responsibilities while living in privatized military housing. Development of a common tenant lease. The common lease framework will be binding in all 50 states, but also include addendums to capture state and local laws, as required. The common lease would provide residents of privatized housing with similar terms in their leases, regardless of where they are living and which private partner owns their housing unit. Establishment of a resident advocate position. The resident advocate position, according to an OSD official, will be available to provide independent advice, education, and support to residents. However, an OSD official noted that the military departments have not yet determined whether this individual would be active duty or civilian and where the position would fall organizationally—specifically, whether it would be part of the military housing office. Development of a standardized adjudication process. The military departments and private partners are developing a common dispute resolution process that would apply to all projects. According to OSD, this process would provide residents the right to have housing issues heard and resolved by a neutral third party. DOD and Congress are exploring additional initiatives and legislative proposals. However, both DOD and private partner officials have noted several challenges that could impact their ability to implement some of these initiatives and legislative proposals. Key challenges include the following: The need to collaborate with and obtain input and agreement from the large number of stakeholders involved in privatized housing. Many of the initiatives aimed at improving privatized housing require not only agreement between DOD and the private housing partners, but may also require discussion with and approval by the project bond holders. This requirement could limit the military departments’ legal authority to unilaterally make changes to existing business agreements. The private partners noted that the bond holders may be reluctant to agree to changes to the business agreements that could result in higher project costs. Limited military department resources. The military departments had reduced their involvement in daily privatized military housing operations as part of the overall privatization effort. This included reducing staffing levels at the installations. Each of the military departments has plans to increase the military housing office staffing at each installation to allow for enhanced oversight. The potential for negative financial impacts to the projects that may outweigh the intended benefits of the initiatives. Representatives from many of the private partners we met with expressed concern that some proposed initiatives may result in a financial burden for their projects, such as legal fees associated with the development of a common lease and the various addendums that would be required; unanticipated costs of hiring outside third party inspections; or the potential impact to project revenue that would result from residents withholding rent. Some of the private partners noted that the financial impact of unfunded requirements to projects that are already experiencing financial distress could result in even fewer funds available to reinvest in the physical condition of the housing units. In summary, while the privatization of military housing has resulted in private partners assuming primary responsibility for military housing, DOD maintains responsibility for overseeing privatized housing and ensuring that eligible personnel and their families have access to affordable, quality housing facilities and services. While DOD and the private partners have taken steps to address concerns raised about their ability to adequately maintain and oversee the condition of these housing units and provide quality housing for servicemembers, the extent to which the efforts will be sustained and result in improvements remains unclear. We are continuing our broader review of DOD’s oversight of privatized housing, including the issues addressed in this statement and will make recommendations as appropriate in our final report, which we anticipate issuing in early 2020. Chairman Inhofe, Ranking Member Reed, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact Elizabeth A. Field, Director, Defense Capabilities and Management, at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kristy Williams (Assistant Director), Tida Reveley (Analyst in Charge), Austin Barvin, Ronnie Bergman, Vincent Buquicchio, William Carpluk, Juliee Conde-Medina, Mae Jones, Jordan Mettica, Kelly Rubin, Monica Savoy, and John Van Schaik. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In 1996, Congress enacted the Military Housing Privatization Initiative in response to DOD concerns about inadequate and poor quality housing for servicemembers. Today, private partners are responsible for the ownership, construction, renovation, maintenance, and repair of about 99 percent of housing units on military bases in the continental United States. DOD's policy requires that the department ensure eligible personnel and their families have access to affordable, quality housing facilities. The Office of the Secretary of Defense is responsible for providing guidance and general procedures related to military housing privatization. The military departments are responsible for executing and managing privatized housing projects. Drawing from ongoing work, GAO discusses (1) DOD's oversight of privatized military housing for servicemembers and their families, (2) efforts of the military departments to communicate their roles and responsibilities to servicemembers and their families, and (3) DOD and private partner development and implementation of initiatives to improve privatized housing. GAO reviewed relevant policies, guidance, and legal documents; visited 10 installations; conducted 15 focus groups; analyzed maintenance work order data; and interviewed relevant DOD and private partner officials. GAO will continue its ongoing work and make recommendations as appropriate in the final report. Each military department conducts a range of oversight activities—some more extensive than others—for its privatized housing projects, but these efforts have been limited in key areas. Specifically, based on GAO's ongoing work: The Department of Defense (DOD) conducts oversight of the physical condition of housing, but some efforts have been limited in scope. Military departments have guidance for conducting oversight of the condition of privatized housing. This oversight generally consists of reviewing a sample of work order requests, visually inspecting housing during change of occupancy, and conducting other point in time assessments. However, GAO found that these efforts are limited in scope. For example, interior walk-throughs may have been limited to just a few homes at each installation. DOD uses performance metrics to assess private partners, but metrics may not provide meaningful information on the condition of housing. The Office of the Secretary of Defense (OSD) has recently issued guidance to ensure consistency in the framework used to measure project performance. However, the specific indicators used to determine if the metrics are being met may not fully reflect private partner performance. For example, a common measure is how quickly the private partner responded to a work order, not whether the issue was actually addressed. DOD and private partners collect maintenance data on homes, but these data are not captured reliably or consistently. DOD is expanding its use of work order data to monitor and track the condition of privatized housing. However, based on GAO's analysis of data provided by all 14 private partners, these data cannot reliably be used for ongoing monitoring of privatized housing because of data anomalies and inconsistent business practices in how these data are collected. DOD provides reports to Congress on the status of privatized housing, but some data in these reports are unreliable and may be misleading. DOD provides periodic reports to Congress on the status of privatized housing, but reported results on resident satisfaction are unreliable due to variances in the data military departments provide to OSD and in how OSD has calculated and reported these data. Military housing offices located at each installation are available to provide resources to servicemembers experiencing challenges with their privatized housing, but GAO's ongoing work showed these offices have not always effectively communicated this role to residents. For example, residents in GAO's focus groups noted confusion over the roles and responsibilities of these offices, and military housing officials have found that residents could not readily differentiate between military and private housing officials. DOD, working with the private partners, has made progress in developing and implementing a series of initiatives. However, both DOD and private partner officials have noted several challenges that could affect implementation, including limitations to DOD's legal authority to unilaterally make changes to the terms of the projects and limited resources to implement increased oversight.", "document_type": "gao"}
{"report": "The platform economy is relatively new. Its rise has been tied to the development of the iPhone and Apple’s app store, which launched in 2008. Smart phones and apps made it easier for people to develop online marketplaces where buyers and sellers could connect to exchange goods. Since then, more platform companies have emerged, expanding into marketplaces for a host of services. This expansion has increased the ways in which people could sell their services or goods and lowered the barriers to entering this type of work. Platform companies generally facilitate the match, transaction, and payment between those seeking goods or services online and those providing them. Platform companies can be divided into marketplaces for services or goods and can be further divided into two types of services— transportation or other types of services—and two types of goods—retail or short-term rental. See figure 1 for a description of the different platform company marketplaces. Transportation platforms comprise the largest sector of the platform economy—by revenue and number of workers—and include companies like Uber and Lyft. Examples of platform companies providing other types of services include Care.com (child or senior care) and Upwork (a range of freelance services). Retail platforms like Etsy and eBay provide an online marketplace for goods. Companies that facilitate short-term rental include Airbnb (property) or Kerb (parking spaces). Platform companies also vary by the number and degree of specialization of services offered. For example, platform companies could be differentiated by the range of services offered, from those that offer a single service, such as transporting people and goods, to those that are a one-stop source to access workers specializing in an array of fields such as legal, information technology, marketing, writing, design, and accounting. Further, companies have adopted different business models. Some set prices while others allow the worker and customer to negotiate a price for the good or service provided. While platform workers can choose whether to accept work, companies are not committed to pay workers for a set number of hours, which allows companies to more easily manage demand fluctuations. Many platform companies classify workers providing services as independent contractors rather than as employees. This classification has implications for companies and workers. For independent contractors, companies are not responsible for paying a minimum wage or overtime and do not typically provide benefits such as paid leave, health insurance, or retirement plans. Furthermore, numerous labor protections that apply to employees do not apply to independent contractors. Companies also do not have to withhold and remit federal income or employment taxes for independent contractors. Instead, the worker is responsible for estimating, saving, and remitting these taxes each quarter to IRS. Furthermore, a platform company that operates as an intermediary between buyers and sellers to transfer funds for transactions—for example, a ride-hailing company that matches drivers and riders and processes those riders’ payments to drivers—may act as a third party settlement organization (TPSO) under IRS regulations, depending on its circumstances. Acting as a TPSO can further reduce the tax reporting requirements for these companies. SB/SE oversees taxpayers filing tax returns as self-employed individuals with business income, such as independent contractors, and businesses with less than $10 million in total assets. SB/SE aims to promote compliance among this population by raising awareness through outreach and education about tax obligations and how to comply. SB/SE also takes enforcement actions such as audits to pursue noncompliance, although with budget cuts, the number of audits has dropped considerably over time. While the nature of the work may be similar, key differences exist among traditional independent contractors, platform workers, and employees. We use the term platform worker for those workers that platform companies classify as independent contractors, which is the focus of our report. A major similarity is that all three types of workers provide services to customers in a business transaction, regardless of whether the customer is another business or an individual such as a homeowner. However, the three types of workers differ in terms of payments, tax responsibilities, and the information reported to IRS and workers. Figure 2 summarizes these differences, which are discussed below. A major difference is how these workers provide their services and receive payments. Traditional independent contractors directly provide their services to and receive payments from a business or an individual customer. Employees provide services through an employer who pays them wages. Unlike the other two types of workers, the platform worker provides services through a third party intermediary—the platform company—that uses online tools to connect workers with customers and facilitates payment between them. Platform workers that are classified as independent contractors have different tax obligations than employees. Independent contractors are generally expected to pay the full amount of their personal federal income and self-employment taxes—which are comprised of Social Security and Medicare taxes—through quarterly estimated tax payments to IRS. For employer-employee relationships, both the employer and the employee each pay roughly half of the Federal Insurance Contribution Act (FICA) taxes—which are comprised of Social Security and Medicare taxes. An employer is required to withhold income taxes and the employee portion of FICA taxes from wage payments made to the employee and pay these taxes to IRS. Additionally the employer is required to pay its own portion of the FICA taxes to IRS. These workers have different requirements for filing annual tax returns. Generally, independent contractors, including those that are platform workers, are to use Schedule C, Profit or Loss from Business (Sole Proprietorship), to report their self-employment revenues and expenses, and to calculate net income; the Schedule C is to be attached to their Form 1040. Employees are to report wage amounts received on their Form 1040. Businesses also differ in information-reporting obligations for workers classified as independent contractors and employees. Generally speaking, when a business pays an independent contractor, the business is required to report annual payments of $600 or more on Form 1099- MISC; for tax year 2020, businesses are to start using Form 1099-NEC to report such payments. Instead of a Form 1099-MISC (or Form 1099- NEC), TPSOs are required to file Form 1099-K to report annual payments made through their payment networks that exceed $20,000 and 200 transactions. When paying employees, businesses are to file a Form W- 2 annually to report all wages paid. A difference between platform workers and traditional independent contractors is that platform companies often have information on workers’ earnings and some expenses that could help workers file tax returns. For example, a ride-hailing company has information on fares, tips, and miles driven for each customer as well as fees and other charges. Traditional independent contractors who provide rides to individuals typically have no equivalent third party to provide such information. The population of platform workers is difficult to count, due in part to the variation in terms and definitions used to describe these workers such as gig, on-demand, sharing economy, contingent, and freelance, among others. As a result of these and other barriers, efforts to measure the size of the platform workforce through household surveys or administrative data have produced estimates that lack certainty; these estimates of the workforce size generally have ranged from around 1.5 million to 2 million for recent years and suggest that the platform workforce may be growing. In 2017, the Department of Labor’s Bureau of Labor Statistics (BLS) collected data on alternative employment. BLS’s survey found there are an estimated 1.6 million “electronically-mediated workers,” defined as those obtaining work through mobile apps and websites that connect workers with customers and arrange payment. However, in January 2019 we reported that several factors may have contributed to an undercount of platform workers. For example, survey questions may not have captured individuals who engage in platform work on a part-time or sporadic basis. BLS has stated that it will not use the same questions again and it is working with stakeholders and the Committee on National Statistics of the National Academies of Science, Engineering, and Medicine to address survey limitations. Despite the difficulties estimating the size of the workforce, two studies and stakeholders we interviewed have concluded that the platform workforce is growing. For example, in a review of customer checking account transactions, the JP Morgan Chase Institute documented a five- fold increase between 2012 and 2018 to about 2.3 million families receiving at least one payment from known platform companies. Two studies have also found that the majority of platform workers work part time, for a short time, for secondary income, and for relatively low earnings. For its sample, the JP Morgan Chase & Co. Institute found that platform work was not the primary source of income for most families that participated in the platform economy between 2012 and 2018. Yet the study also found that platform work can account for roughly 20 percent of workers’ income during months when they are actively engaged in platform work. Also, while the number of platform workers who provide transportation has increased, their average monthly earnings fell steadily between 2014 and 2018. In another study, IRS used tax data to attempt to estimate the population of platform workers, which it termed “gig workers.” Similar to BLS, IRS attempted to count workers who use websites and mobile apps to connect with customers to obtain short-term work and to receive payment through the company that owns the website or mobile app. IRS identified the names and Employer Identification Numbers of companies providing labor services and matched Forms 1099-MISC and 1099-K issued by the companies to workers. IRS estimated the number of workers who received a Form 1099-K or 1099-MISC from known labor platform companies increased from roughly 20,000 in 2012 to 1.9 million in 2016, then dropped to 1.3 million in 2017. However, IRS’s methodology had limitations that make the study an uncertain source for determining the number of platform workers. First, IRS cannot easily identify the universe of platform companies because it is rapidly changing and not well documented. Second, according to IRS, an unknown number of platform workers receive neither a Form 1099- MISC nor a Form 1099-K, for reasons we discuss later in the report. In sum, the data IRS receives do not allow it to accurately count the number of platform workers or determine their tax reporting behaviors. Given the limited data IRS has on the platform workforce, IRS cannot be assured that it knows enough about the size, characteristics, and behaviors of this workforce to better understand how to help workers comply with tax obligations. According to federal standards for internal control, managers should collect and use quality information to achieve an entity’s objectives. IRS officials we interviewed acknowledged that identifying platform workers is challenging given limitations within IRS’s data. IRS does not have a straightforward way for taxpayers to indicate on their tax forms whether they performed platform work. For example, Schedule C—the form that independent contractors are to use to report profit or loss—includes a series of yes/no checkboxes near the top of the form; however, it does not have a checkbox to indicate whether any reported income or expenses are from platform work. Similarly, Schedule C has a six-digit code to indicate the type of business or activity conducted, but it does not include a code for all platform workers. Although this information would be self-reported and imperfect, it would provide more information than IRS has on platform workers. Obtaining more information on the number of platform workers and their tax filing and reporting behaviors could help IRS develop ways to assist platform workers in complying with their tax obligations. For example, if IRS had more data on the types of deductions that certain types of workers were reporting, IRS would be better able to craft guidance on such deductions or do outreach to help those types of workers comply. Further, without changes to Schedule C, IRS cannot cross-check whether workers who self-identify as platform workers are also identified as platform workers on Forms 1099 filed by platform companies; a cross- check would enhance IRS’s understanding of the platform workforce. For example, if the cross-check shows that the number of workers who self- identify as platform workers significantly exceeds the number of Forms 1099 filed, IRS may have to work with platform companies to understand the filing shortfall. Conversely, if the number of filed Forms 1099 is significantly higher, IRS may need to enhance outreach efforts to make platform workers more aware of their tax obligations. We identified three areas of challenges for platform workers’ compliance with their tax obligations. First, according to our stakeholder interviews, platform workers may be less aware of their tax responsibilities than some independent contractors. Independent contractors typically have to advertise or seek referrals to gain customers, develop a network of peers, and learn about rules related to licensing or certifications. These activities can educate them about the basic responsibilities of being self- employed, including their tax obligations. In contrast, entry into platform work can be quick and workers may begin the activity without time to learn how their tax obligations differ from those of employees. For example, someone with a car, a valid driver’s license, and a smart phone can start working as a ride-hailing driver after they register with an app. Likewise, some platform workers may approach platform work as a hobby, an artistic endeavor, or something they do for a short time or in addition to another job. They may not realize that the company is treating them as an independent contractor, that the platform income may affect their taxes owed, and that they may need to track their expenses and make quarterly tax payments. As a second challenge, platform workers may have limited information about the payments they receive for their work. TPSOs are not required to file information returns to report earnings information to workers or IRS if the workers receive $20,000 or less in annual payments or have 200 or fewer transactions. Available tax data from tax year 2016 suggest that only around 30 percent of platform workers who were known to IRS had gross platform-related earnings higher than $5,000. Hence, most platform workers are likely not receiving an information return from the company. As a result, workers may not be aware that their income is taxable and IRS is less able to the check the workers’ tax compliance. A third challenge, according to stakeholders, is the burden associated with the steps platform workers must take to estimate, save, and remit quarterly tax payments. Because earnings of some platform workers may be low and earnings and expenses may fluctuate, they can have difficulty estimating their taxes owed and setting aside money to pay the taxes. They may also find it time consuming or costly to track expenses and determine profit. To the extent these burdens and difficulties confuse workers, they are less likely to pay the estimated tax payments fully and on time and may incur a penalty as a result. One stakeholder from a large tax preparation firm raised the concern that if the penalty or amount owed is more than workers can afford, they are at risk of falling into a cycle of noncompliance. In response to a February 2019 recommendation by the Treasury Inspector General for Tax Administration, IRS formed a team of officials from across the agency to develop a strategy to promote compliance among platform workers. The strategy focuses on two challenges for platform workers: (1) raising awareness about federal tax obligations, and (2) easing burden by identifying improvements to instructions, guidance, or forms that platform workers are likely to use. As part of the strategy, IRS developed a communications plan that includes a redesign of IRS web pages for platform workers and companies, outreach activities to the workers and various stakeholders, and a review of IRS guidance and related forms or instructions. The IRS Communications & Liaison office is managing the communications plan to educate platform workers and companies about their tax and reporting responsibilities. A key component of the plan is to redesign IRS web pages that provide tax information for platform workers and companies. IRS changed the name to the Gig Economy Tax Center (previously it was called the Sharing Economy Tax Center) and launched it in January 2020 before the start of the filing season (see fig. 3). As part of this effort, IRS is working to make web pages more user friendly for platform workers as well as platform companies. IRS’s Online Services (OLS) conducted research on the expectations, behaviors, motivations, and needs of self-employed individuals. According to OLS officials, IRS used insights about platform workers from the research coupled with user testing of the new web pages to inform the redesign effort. IRS’s steps to redesign the web pages align with selected leading practices for improving the online user experience, such as taking steps to make the pages useful and findable (see table 1). It is too soon to know whether the intended users find the new pages useful, usable, findable, and credible, as envisioned by the practices. IRS’s communications plan included outreach activities to raise awareness. For example, to publicize the redesigned web pages, the plan envisions targeting audiences such as platform workers and companies, news media, national tax publications, tax professionals, government agencies, IRS employees, and other groups. IRS created and distributed products such as a national news release about the new web pages and articles for newsletters and other products for tax professionals, small businesses, and payroll providers. IRS created a one-page electronic brochure to inform platform workers about their tax obligations and available tools to help them (see fig. 4). IRS intends to encourage platform companies to provide the brochure to workers. IRS is also using social media such as Twitter and Instagram to target platform workers and direct them to the redesigned web pages through posts such as those seen in figure 5. To assess the effectiveness of its efforts to increase awareness, including whether outreach efforts are driving people to the new web pages, IRS plans to compare data analytics for the redesigned site with the previous site. OLS plans to analyze changes in website traffic volume and taxpayer behavior—such as click patterns and how long users stay on the page—3 months after the launch of the redesigned pages and again 6 months later, and make changes as warranted. IRS’s office of Tax Outreach, Partnership, and Education (TOPE) is supporting awareness efforts by building relationships with partners, such as platform companies and organizations that advise platform workers. The communications plan provides a high-level description of efforts to engage with partners. Goals are to increase partner use of IRS social media, develop more industry-specific content, and increase TOPE involvement in virtual and face-to-face partner events and conferences, among others. IRS also plans to leverage these new partnerships to solicit feedback on its communication efforts to ensure they meet the needs of platform workers and companies. However, the communications plan lacks details about how IRS will monitor feedback from stakeholders. Specifically, IRS does not have a process for documenting and evaluating feedback based on the various communications efforts and products tailored for platform workers. According to federal standards for internal control, management should establish two-way reporting of quality information to achieve its objectives. Management should monitor activities and periodically evaluate the quality of information received to achieve its objective. According to IRS officials, they do not have the time or staff to document all feedback received. Further, they said the value of responding quickly to stakeholder comments supersedes the value of documenting and evaluating feedback. Given limited resources, IRS could choose to do something simple like creating a spreadsheet that captures feedback received, such as stakeholder emails, and document whether it led to changes. IRS has dedicated time and resources to better understand platform workers’ tax- related challenges and has undertaken multifaceted communication efforts to address them. Without a process to monitor feedback, IRS may miss opportunities to find better ways to drive platform workers toward the redesigned web pages, to ensure the redesigned web pages are meeting platform workers’ needs, or to strengthen communication efforts to enhance tax compliance. These opportunities could become more important as the platform worker population grows and evolves. IRS identified changes to forms, guidance, and other publications that could make it easier for platform workers to understand which forms apply to them. According to IRS officials, the Gig Strategy Team reviewed tax forms, publications, instructions, and training materials relevant to independent contractors, including platform workers. The team concluded that it did not need to create new forms or publications, although it identified 10 forms, instructions, guidelines, and publications that could be updated to be more helpful to platform workers. For example, the team suggested that IRS make several changes to update the instructions for Form 1040, such as adding a reference to Form 1099-K and clarifying that platform economy work can be a trade or business. The team also suggested that IRS revise the Form 1099-K instructions for payees to indicate how this form could clarify information on business gross receipts. IRS did not approve the gig strategy team’s requested changes to clarify the instructions for Forms 1040 and 1099-K for 2020. However, IRS is considering making these changes in 2021. According to IRS officials, they want to ensure these changes complement each other and the guidance is clear for taxpayers. According to federal standards for internal controls, management should communicate both internally and externally information necessary to achieve the entity’s objectives. Moreover, research based on behavioral insights has shown that introducing small interventions or removing small obstacles can significantly improve effectiveness.For example, interventions should be attractive (to draw people in) and easy (use simple, plain language). Leading practices suggest that people respond to information that is relevant to them. One way to do this is to include examples that help people recognize when information is relevant. For example, adding a brief reference to the gig or platform economy to the Form-1099 K payee instructions, along with a simple description of what the taxpayer should do, such as “show total payments from a company that facilitated a match, transaction, and payment for goods or services,” could help platform workers understand that the forms apply to them. By not including plain language for the Form 1099-K and 1040 instructions, platform workers are less likely to recognize which information applies to them. Simplifying one aspect of the tax system for platform workers by making the forms easier to understand could lead to enhanced tax compliance. According to our prior work, a good tax system should be equitable, economically efficient, and simple, transparent, and administrable. However, the challenges we have discussed—such as the lack of awareness and information—are complicating the tax system for platform workers and limiting IRS’s ability to more effectively collect taxes. We identified nine options from our literature review and stakeholder interviews to address these challenges and enhance tax compliance for platform workers (see table 2). For each option, we analyzed available data on the potential design and tradeoffs, including the potential costs and benefits. We discuss two options related to reporting and two options related to withholding in the sections below. For five options related to simplifying the reporting and filing processes, we found that the available data and research did not support a full assessment of potential pros and cons. We discuss those five options in appendix II. Many platform workers are not receiving a Form 1099 on their self- employment income, and therefore may be unaware of their tax reporting obligations. It is difficult to estimate how many workers are not receiving these forms because of limitations in available data. However, IRS found that the number of workers receiving Forms 1099-K or 1099-MISC from known labor platform companies dropped more than 30 percent from 2016 to 2017. Such a decline in information reporting for platform workers can be attributed to three factors. First, reporting thresholds for TPSOs were set at a high level to prevent unnecessary information reporting to IRS. When Congress enacted the Housing and Economic Recovery Act of 2008, TPSOs applied mainly to online marketplaces for goods, like eBay, and companies that facilitated payments, like PayPal. The act required information reporting by TPSOs for payments made through their payment networks only if those payments exceed both $20,000 and 200 transactions annually. Individuals who were generally not engaged in business or not producing a profit, such as casual sellers of goods, would likely fall below these thresholds. Second, IRS created a “tie-breaker rule” to avoid duplicative reporting which also led to no Form 1099 being filed in some cases. Businesses, including TPSOs, are in general required to report certain transactions on Form 1099-MISC, while TPSOs are also required to report certain transactions on Form 1099-K. IRS instituted a rule to break the “tie” that exists when a TPSO is required to report the same transactions on both Forms 1099-MISC and 1099-K. Specifically, the rule states that payments made through a TPSO’s payment network are not required to be reported on Form 1099-MISC, subject to an annual $600 threshold. Instead, TPSOs’ payments are required to be reported on Form 1099-K, subject to the annual $20,000 and 200 transactions thresholds. Third, since 2008, new platform companies have emerged that fit the TPSO designation but that facilitate payments for workers providing services rather than goods. These payments often fall below the combined annual $20,000 and 200 transaction thresholds. Options to increase information reporting for platform workers would help raise awareness about their tax obligations while lowering their burden. As a result, platform workers would be more likely to comply with tax obligations. The following sections discuss our analysis of two options. The “tie-breaker rule” could be amended to reverse the rule for payments made through a TPSO’s payment network. This would result in more reporting on Forms 1099-MISC under Internal Revenue Code (IRC) Section 6041, rather than on Forms 1099-K under IRC Section 6050W. Given the much lower threshold for the Form 1099-MISC versus the thresholds for the Form 1099-K, more workers would receive reports on their payments and IRS would receive more reports, too. Information reporting under the regulations related to IRC Section 6041 would generally increase for TPSOs that facilitate the provision of services. If the TPSO makes a payment for a service on behalf of another and performs management or oversight for the payment, then that TPSO would generally be responsible for filing a Form 1099-MISC, subject to the annual $600 threshold. Also, TPSOs that facilitate payments of rentals and also provide management or oversight of those payments would likely be subject to the $600 threshold. Reporting would remain unchanged for some types of companies. Because payments for goods are generally not reportable under IRC Section 6041, reporting would not change for online marketplaces that facilitate the sale of goods only. Because of the management and oversight requirements of IRC Section 6041, TPSOs that only facilitate payments would also generally not be affected by a change to the tie- breaker rule (see fig. 6). IRS Counsel has discussed amending the tiebreaker rule, but has yet to take action. According to IRS, Counsel has had to address other priorities, such as reviewing rules and publishing guidance related to Public Law 115-97, commonly known as the Tax Cuts and Jobs Act of 2017. Without amending this rule, the lack of information-return reporting for many workers complicates their efforts to comply with their tax obligations and IRS’s ability to ensure that these workers are correctly reporting their income. When workers do not receive forms related to their self-employment income, they have more difficulty determining how much money they made for computing taxable income. IRS analysis indicates that taxpayers are more likely to report their income that is subject to some information reporting (an estimated 83 percent compliance) compared to little or no information reporting (an estimated 45 percent). Sending more information returns may add costs for some companies; however, stakeholders had differing views on how significant those costs would be. In addition to amending the tie-breaker rule, stakeholders, as well as our literature review, discussed changing the various reporting thresholds. IRS and the Department of the Treasury (Treasury) have unique access to tax data and could analyze whether the 1099-K and 1099-MISC reporting thresholds are set at levels appropriate for tax administration. The 1099-MISC threshold was enacted in 1954 and the 1099-K reporting threshold was enacted in 2008; neither reflect the development of the platform economy. These changes include the emergence of companies that facilitate workers’ earning income by renting their houses or by providing transportation services, among many other activities. Informed stakeholders suggested that the current 1099-K thresholds may be appropriate for some TPSOs, such as online marketplaces that facilitate the sale of goods or companies with a primary function of facilitating payments. Different thresholds may be more appropriate for other activities facilitated by platform companies, such as renting houses or other assets. For example, a lower dollar threshold and no transaction threshold may be appropriate for home rentals because substantial income could be generated from even one transaction and provider costs may be limited. However, some service providers incur significant costs, such as drivers who must pay to own and operate a vehicle. Some stakeholders suggested that a threshold of $600 was more appropriate than a threshold of $20,000 and 200 transactions. Even so, some stakeholders suggested that typical costs to service providers may justify a threshold higher than the $600 threshold set in 1954. We found no available analysis of tax or other data showing whether the reporting thresholds for Forms 1099-MISC and 1099-K are appropriate for today’s economy or what the thresholds should be. The NEW GIG Act of 2019, which was introduced in Congress in March 2019, would raise the Form 1099-MISC reporting thresholds from $600 to $1,000. It would also lower the Form 1099-K reporting threshold from $20,000 and 200 transactions to $5,000 or 50 transactions for TPSOs making payments to those primarily engaged in the sale of goods, among other actions. Aligning reporting thresholds with today’s economy would support tax administration for IRS, as IRS studies have shown that information reporting increases tax compliance. It would also help reduce compliance burden for workers, since they would have clear information on their earnings. Platform workers can be burdened in estimating, saving, and remitting quarterly payments for income, Social Security, and Medicare taxes. Companies are not allowed to withhold and remit these taxes for platform workers who are treated as independent contractors and who want to participate in voluntary withholding—except where backup withholding is required. Voluntary tax withholding that satisfies quarterly tax payment requirements could reduce the workers’ burden and promote their tax compliance. We identified two actions that IRS could take on voluntary tax withholding. IRS could work with Treasury to implement voluntary withholding on payments to independent contractors for services. Voluntary withholding would be an option where it would be voluntary for companies to participate; for those companies that choose to participate, it would be voluntary for the independent contractor to participate. According to IRS Counsel, IRS has the statutory authority to take this action if the Secretary of the Treasury finds that withholding would be appropriate and would improve tax administration, and if the company and independent contractor agree to such withholding. According to IRS officials, IRS and Treasury have not determined whether they intend to pursue such an action. Voluntary withholding could be implemented by adjusting existing procedures and using the existing requirements for paying estimated taxes each quarter as a foundation. For example, to enable companies to solicit workers’ choices on when and how much to withhold, IRS could create a form similar to the Employee’s Withholding Certificate, Form W- 4, which employees complete so that employers can withhold the correct estimated federal income tax from employees’ wages. Workers could choose to vary the amounts withheld and the frequency of withholding as long as they met the quarterly estimated tax requirements. Alternatively, IRS could create guidance similar to what exists for workers who opt-in to electronically receive tax forms from their companies. Companies could use the existing procedures for tax withholding on wages paid or for backup withholding to withhold and remit the taxes to IRS. Companies would need to develop other design features, such as how they inform workers about participation. If the withholding is voluntary for companies, any burden is limited to those companies that choose to participate. For workers who choose to participate, they would still have the burden of estimating the amount of taxes owed for each quarter, but their burden to save and remit those taxes could be reduced. If some workers find that withholding is not appropriate for them, they could continue to use the existing system for quarterly tax payments. As long as workers choose withholding amounts that satisfy these quarterly estimated tax requirements, IRS would not need to design default percentages or dollar amounts to be withheld. While withholding could potentially help all types of independent contractors, voluntary withholding would specifically address some challenges that platform workers face. For example, platform workers have had challenges meeting the quarterly estimated tax requirements when their work is part time or sporadic. Giving workers and the companies the flexibility to structure tax withholding would better ensure that these challenges are addressed and the taxes are paid. Furthermore, this voluntary withholding regime would help those workers who choose to participate set aside a sufficient amount of money for taxes throughout the year, reducing the likelihood of an unanticipated large tax bill and tax penalty at the end of the year. Tax withholding plays a critical role in supporting voluntary compliance. IRS’s analysis indicates that withholding helps induce higher compliance in reporting income; higher compliance can help to reduce the tax gap—the difference between tax amounts the taxpayers should have paid and what they paid voluntarily and on time. Another option we reviewed involved Congress requiring companies to offer the withholding of taxes for remittance to IRS. That is, the companies must offer withholding; it would still be voluntary for the independent contractor to participate. Given that IRS does not currently allow for voluntary withholding on payments to independent contractors, we could not determine the need for such a requirement. If IRS implements withholding that is voluntary for companies, it would have the opportunity to collect and assess information on the need for such a requirement. For example, IRS could determine whether workers who volunteer to participate in withholding are able to better meet their estimated quarterly tax payments. IRS also could determine whether companies are offering withholding. If IRS finds that voluntary withholding bolsters compliance while reducing burden for workers, but that platform companies are not offering it, IRS could recommend that Congress take action. In considering which platform companies could be required to offer voluntary withholding, a starting point would be TPSOs. Focusing the requirement on TPSOs would likely be less burdensome than on other platform companies. TPSOs already settle payments to multiple parties; withholding and remitting taxes to IRS would only be one more type of payment that the TPSOs would process. This requirement would benefit platform workers who wished to participate in voluntary tax withholding and who work for TPSOs. More workers would have the option to have their taxes withheld. Because worker participation would remain voluntary, the need to determine default percentages or dollar amounts for withholding could be avoided as long as the worker met the quarterly requirement for paying estimated taxes. Some stakeholders suggested the option of mandatory withholding for platform workers to help them avoid a tax penalty. However, mandatory withholding could be burdensome for workers who need to balance cash flow and other spending priorities. Additionally, if participation in withholding is mandated, IRS would need to determine minimum withholding amounts. Because different businesses involve different typical expenses, it may be difficult to create an appropriate withholding rate across all business types. Creating multiple withholding rates for different types of businesses instead could be complicated and burdensome. The platform economy is still relatively new but available evidence suggests that it is growing and presenting tax-related challenges for both workers and IRS. While IRS has addressed some of these challenges, it could do more to promote voluntary compliance among platform workers by further raising awareness and easing taxpayer burden. IRS developed a communications plan to raise awareness among platform workers of their tax responsibilities; however, the plan lacks details about how IRS will monitor stakeholder feedback. Having a process for documenting and evaluating feedback would help assure that IRS’s communications efforts are addressing platform workers’ tax-related challenges, even as the population grows and evolves. Additionally, IRS could better understand the platform workforce if it had a straightforward way to collect data to identify platform workers. IRS has identified changes to forms, guidance, and other publications that could make it easier for platform workers to understand which forms apply to them. However, IRS has not yet taken actions such as adding plain language to instructions and publications that clearly indicate when a form applies to a platform worker. Making instructions and publications easier to understand by adding a simple description could help platform workers comply with their tax obligations. IRS could help ease taxpayer burden by taking steps to increase information reporting for these workers. Platform companies that act as TPSOs do not have to report income information on many workers because reporting thresholds are much higher than what most workers earn. Amending IRS rules to require such reporting at lower thresholds would provide workers with more information to comply with their tax responsibilities and would give IRS additional information to support enforcement efforts. Taxpayer burden could also be eased through a voluntary withholding program for platform workers. IRS and Treasury have the statutory authority to take such an action if the Secretary of the Treasury finds that withholding would be appropriate; however, IRS and Treasury have not determined whether they intend to pursue it. Voluntary withholding could help platform workers save and remit their taxes to IRS. This would address specific challenges platform workers face, such as low or fluctuating income. Once a voluntary withholding program is created, IRS would be able to assess its impacts and, if warranted, work with Treasury on a proposal to Congress to require TPSOs to offer voluntary withholding on payments for platform workers and other independent contractors. We are making the following seven recommendations to IRS: The Commissioner of IRS should change Schedule C or Form 1099-NEC so that taxpayers can identify if they received payment for platform work. (Recommendation 1) The Commissioner of IRS should develop a process for monitoring feedback on its communications efforts and products tailored for platform workers, which should include documenting and evaluating feedback. (Recommendation 2) The Commissioner of IRS should clarify the instructions and publications for Forms 1040 and 1099-K by adding plain language to clearly indicate to platform workers that the forms apply to them. (Recommendation 3) The Commissioner of IRS should work with the Secretary of the Treasury to amend the 6050W “tie-breaker rule” that applies to duplicative reporting requirements so that payments made through a TPSO’s third party payment network are reportable under Section 6041, rather than under Section 6050W. (Recommendation 4) The Commissioner of IRS should work with Treasury to determine what thresholds would be the most appropriate for payment information reporting and, if warranted, recommend that Congress adjust the thresholds. (Recommendation 5) The Commissioner of IRS should work with the Secretary of the Treasury to implement withholding that is voluntary for companies making payments for services to platform workers and other independent contractors who choose to participate. (Recommendation 6) The Commissioner of IRS should assess the impact of withholding that is voluntary for companies, once implemented, and if warranted, work with the Secretary of the Treasury on a proposal to Congress that would require TPSOs to offer tax withholding to platform workers and other independent contractors who choose to participate. (Recommendation 7) We provided a draft of this report to Treasury and IRS for review and comment. IRS provided written comments, which are reproduced in appendix III and summarized below. Of our seven recommendations, IRS agreed to implement or consider two recommendations, said it could not agree with two recommendations due to other priorities, disagreed with two, and said it could not implement a recommendation that flowed from another recommendation. IRS also provided technical comments, which we incorporated as appropriate. IRS agreed to refine its process for monitoring feedback on its communication efforts and products but was silent on documenting and evaluating the feedback (Recommendation 2). The value of monitoring feedback will be minimized unless IRS has a process for documenting and evaluating it over time. In addition, IRS agreed to consider clarifying the language in the instructions and publications for Forms 1040 and 1099-K (Recommendation 3). We revised this recommendation by deleting the word “examples” from the clarifications to make. IRS stated that it could not agree to work with Treasury to (a) amend the 6050W “tie-breaker rule” and (b) determine appropriate thresholds for payment information reporting and, if warranted, recommend that Congress adjust the thresholds (Recommendations 4 and 5). For both recommendations, IRS said it cannot commit to implementation dates because of higher priority guidance projects, especially in light of the many new tax provisions enacted by Congress. We acknowledge IRS’s need to prioritize guidance projects, but we do not understand why it does not agree to address problems that will persist into the future absent corrective actions or why IRS believes it cannot agree unless it commits now to a future implementation date. In fact, IRS stated that it has a long- term guidance project under development for amending the rule to clarify definitions. IRS said it would consider our recommendation on amending the rule as it develops its 2020-2021 plan for guidance priorities. As for our recommendation on determining reporting thresholds, IRS said it is willing to meet with Treasury officials to discuss the need to analyze the current thresholds. IRS disagreed with our recommendation to change Schedule C or Form 1099-NEC so that taxpayers can identify if they received payments for platform work (Recommendation 1). IRS said it has no evidence that platform workers pose a greater compliance risk and that the platform worker designation, by itself, would not be a selection factor for compliance actions. We found that IRS has not measured this risk, in part, because it cannot easily identify the workers. Further, we did not intend that IRS use the data to initiate compliance against the workers; our report discussed using the data to identify workers and their reporting behaviors to improve services and voluntary compliance. IRS concluded that the additional taxpayer burden and its costs were not warranted at this time. IRS did not identify the level of burden or costs, and the burden from checking a box on Schedule C does not seem high. We asked about the costs to revise the forms to add a checkbox but IRS did not provide them. As for IRS’s costs to capture the data, we note that IRS’s costs to transcribe the data would be zero for returns filed electronically. Individual taxpayers (including platform workers) electronically filed 138 million of 156 million (89 percent) tax returns—which includes the Schedule C— during 2019. If IRS intends to help these workers become more aware and reduce their taxpayer burdens to comply, identifying them and their tax behaviors would enhance those efforts. IRS disagreed with our recommendation to work with Treasury to implement withholding that is voluntary for companies making payments for services to workers who choose to participate (Recommendation 6). IRS said that its role is to administer tax law rather than propose tax policy changes. As we discuss in the report, IRS has the authority to take this action if the Secretary of the Treasury agrees that the action would improve tax administration and our recommendation focuses on working with Treasury officials. IRS also stated that it cannot commit to an implementation date for publishing guidance on a voluntary withholding program due to higher priorities, including implementing various COVID- 19 relief programs. As stated above, we do not understand why current higher priorities would prevent IRS from taking future corrective actions or why IRS believes it must commit to an implementation date at this time. We continue to believe that voluntary withholding has potential to improve compliance and reduce taxpayer burden Finally, IRS said it would not assess the impact of such voluntary withholding and thus not work with Treasury on a proposal to Congress that would require third party settlement organizations to withhold taxes for workers who choose to participate (Recommendation 7). IRS’s rationale was that it disagreed with the voluntary withholding recommendation. As stated above, we believe this proposal has potential to improve compliance and an assessment would help inform Congressional deliberations about additional statutory changes that could enhance tax compliance among platform workers. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will copies of this report to the relevant congressional committees, the Secretary of the Treasury, the Commissioner of IRS, and other interested parties. In addition, this report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff has any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff members who made major contributions to this report are listed in appendix IV. You asked us to review issues related to platform workers and tax compliance. This report (1) examines what is known about the platform workforce and what can be done to improve the available Internal Revenue Service (IRS) data, (2) identifies challenges platform workers face complying with federal tax obligations, (3) assesses IRS actions to promote tax compliance among this population, and (4) assesses additional options to promote tax compliance. This sector and its workers are referred to by different names including sharing, on-demand, gig, and platform. We selected the term platform because it was the most comprehensive and relevant to online work arrangements. For example, neither sharing nor gig communicates that the work could be full time and for income. Platform worker also clearly communicates that workers are using an online app or other platform to find and secure work. While platform workforce does not have a standard definition, for the purposes of this report we defined it as workers who provide goods or services to customers through an online platform operated by a company that facilitates the match, transaction, and payment. To identify what is known about platform workers, we conducted a literature review of peer-reviewed material; trade and industry articles; government reports; conference papers; general news; association, nonprofit, and think tank publications; hearings and transcripts; and working papers that described the platform economy in the United States and related tax issues. We searched publication databases such as Proquest and Dialog for keywords like gig, contingent, sharing, or platform, and tax, IRS, or compliance to identify studies that were relevant to our research objectives. We also conducted semistructured interviews with selected stakeholders and reviewed documents provided by them to obtain information on and descriptions of platform workers. Through these interviews, we obtained stakeholder views on (1) the use of the term “platform workforce,” (2) its size and composition, (3) workers’ understanding of and compliance with tax obligations, and (4) federal, state, and private-sector-level efforts and policy proposals to help workers comply with their tax obligations. We conducted close to 30 interviews with knowledgeable individuals that we selected to represent varied areas of expertise and perspectives including Department of the Treasury and IRS officials; academics and other researchers; state government tax and revenue officials from the Massachusetts Department of Revenue, the California Franchise Tax Board, the Maryland Department of Labor & Regulations, and the Vermont Department of Taxation; private-sector and nonprofit tax preparers; tax software developers; and platform company representatives and workers. We interviewed representatives from four companies–Airbnb, Thumbtack, Etsy, and eBay; and two representatives from professional associations, Technet and Internet Association, that include platform companies among their members. Company representatives from Uber, Lyft, Taskrabbit, Upwork, Snag, and Postmates participated in the Technet group interview. We also interviewed representatives from organizations that work directly with platform workers such as the Freelancers Union, Center on Budget and Policy Priorities and Creating Assets, Savings and Hope Campaign of Maryland, National Association of Self-Employed, and the Independent Drivers Guild (IDG). IDG also set up 30-minute phone calls for us with five full-time drivers who use mobile apps to connect with customers. We were also invited to attend a panel from the National Academies of Science on the platform workforce. The panel included experts from the Aspen Institute, JP Morgan Chase, the Federal Reserve Board, the Census Bureau, and various think tanks and universities. We identified potential interviewees through a literature search, and recommendations from our initial interviews. We selected interviewees based on their relevance to the scope of our review. We also aimed for balance between those who could serve as a proxy specifically for low- income platform workers, and those who work with people across the income spectrum. Although the results of these interviews are not generalizable to the views of all stakeholders, they still provide important insight into and illustrative examples of the challenges platform workers face understanding and complying with federal tax obligations. To assess IRS actions to promote tax compliance, we reviewed IRS research on the platform workforce and other documents describing current and planned actions to identify taxpayers who are platform workers and to promote their tax compliance, including the Gig Economy Compliance Strategy. We also interviewed IRS officials from the Small Business/Self-Employed Division; Research, Applied Analytics, and Statistics Division; Communications & Liaison Office, including officials from the Offices of Online Services and Tax Outreach, Partnership, and Education; and the Office of Chief Counsel about their efforts to develop, implement, and assess the impact of the new strategy. We identified criteria for assessing elements of IRS’s strategy such as its research, communication materials, and evaluation plan. We based these criteria on Standards for Internal Control in the Federal Government and leading practices for designing web materials to improve the user experience. The relevant internal control principles focus on information and communication and monitoring. The leading practices posted at usability.gov describe principles for creating a meaningful and valuable online user experience. To assess options to promote tax compliance, we identified options from our literature review and our interviews of stakeholders and selected those that were commonly cited as potential solutions for the challenges. We then sent 39 stakeholders a list of the potential solutions to solicit their views on these options, including whether they supported or opposed the option. Twenty-eight stakeholders, including those from academia, the research sector, government, platform companies, tax preparation firms, and worker advocacy, provided their views. We analyzed their responses to help us identify strengths, weaknesses, and other considerations associated with each option. We also assessed each option using “criteria for a good tax system” described in our prior work. These criteria state that a good tax system should be equitable, economically efficient, and simple, transparent, and administrable. We focused on whether individual options would increase simplicity by reducing compliance burden; enhance transparency by helping taxpayers better understand their tax obligations; and improve tax administration by helping IRS more effectively collect taxes. We found that the available data and research for some options did not support a full assessment of the pros and cons that might be offered by the option. We describe these options in appendix II. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. One set of options we identified focused on simplifying aspects of the tax system to help platform workers comply with their tax obligations. For all of them, sufficient evidence did not exist on how the option would be designed or on the tradeoffs such as costs and benefits. Some of the options require legislative action, and other options could be costly for the Internal Revenue Service (IRS) to implement. Balancing the pros and cons is a policy decision for IRS and the Department of the Treasury (Treasury) or Congress to make and more research would be needed. The following discusses our analyses of these options including what information would be needed to design the option and compare the tradeoffs. According to some stakeholders, properly tracking and deducting expenses from gross income can be burdensome for self-employed workers, including platform workers. A common feature of platform work is using an asset, such as a car or house, for personal and business use; for example, a car owner may use his or her personal car for occasional ride-hailing work. Stakeholders and several articles from our review discussed how the rules for apportioning expenses for personal and business use and determining which ones are deductible can be complicated, especially for part-time or short-term drivers or renters. Some stakeholders as well as some articles mentioned that Congress could consider creating a standard business deduction that platform workers could use. Platform workers, especially those who may not have the necessary knowledge or experience, may not track all eligible business deductions and overpay income and self-employment taxes. They may improperly overstate their expense deductions to offset income, contributing to the tax gap. Creating a standard business deduction could reduce the complexity associated with the current system. However, different businesses involve different expenses, and it may be difficult to create an appropriate standard deduction across all business types. Creating multiple standard deductions for different types of businesses could be complicated and burdensome, and could ultimately reduce tax revenue if the standard deduction exceeds actual expenses for many platform workers. Additionally, a standard business deduction limited to only platform workers would be difficult to design because no regulatory or statutory definition of the term platform worker exists. Further, providing the standard deduction option only for platform workers would raise disparate treatment concerns. Given the limited data on the number and tax reporting characteristics of platform workers, we could not analyze the potential benefits and costs of creating a standard deduction. Because platform workers may be unaware of their federal tax obligations, Congress could consider requiring platform companies to inform workers who are classified as independent contractors about their tax obligations. While platform companies may incur some burden to inform platform workers, some could leverage existing processes to inform their workers. For example, when platform companies hire such workers, they could inform them about their tax obligations. Officials at platform companies we contacted raised concerns about the legal risks for them to develop the information provided to the workers. Platform companies would not necessarily need to develop the information provided. IRS developed a one-page publication that platform companies could provide to workers to inform them about tax obligations (see fig. 4). The publication is available in an electronic format for sharing with workers. However, no statutory or regulatory definition of a platform company exists. Without a definition, IRS could not equitably enforce the requirement. Alternatively, the requirement to provide the information could be limited to third party settlement organizations (TPSO) which have been defined. However, even a well-designed requirement could have limited impact on awareness. IRS is collaborating with partners such as platform companies to better inform workers about their tax obligations. To the extent that this collaboration as well as other IRS actions help make workers more aware, Congress may not need to consider requiring platform companies to inform their workers. Congress could require platform companies to provide available payment and expense information to platform workers who are independent contractors. Multiple stakeholders suggested that sharing this information is a best practice for raising awareness and helping workers comply with tax obligations. Some platform companies already provide a dashboard to workers showing total payments and other data, like miles driven. Platform companies have visibility over the full range of payments and some expenses for workers. While some companies would be providing data or providing online access to data that they already have, requiring information-sharing may increase their administrative burden to at least some extent. However, we did not find information on how much more burden would be created, which could vary based on the type of platform company. Further, given no statutory or regulatory definition of a platform company, a legal definition would need to be created or the requirement to provide the information could be limited to a subset of companies, such as TPSOs. Because several prominent platform companies already provide expense information, Congress may not need to add a legal obligation on the companies. We did not find sufficient evidence to show that this legal requirement would benefit most platform workers. Likewise, IRS considered adding information to its website encouraging platform companies to provide available payment and expense information their workers, but decided not to do so. IRS officials explained that many platform companies are already providing workers with this information. They also expressed concerns that platform workers might rely on this information, and not maintain their own records, which could cause challenges if platform companies do not track all available expenses or income. According to IRS officials, they will continue to update the website to include tips for platform companies to help workers comply with their tax obligations. The Internal Revenue Service Advisory Council (IRSAC) found that the definition of “gross amount” for reporting purposes on Form 1099-K includes items that are not part of the economic transaction between the purchaser and the seller or service provider. This includes refunds, fees, discounts, and other items. IRSAC recently recommended that the definition of “gross amount” for the purposes of reporting on Forms 1099- K should exclude these items, which are not taxable income for the platform worker, and include only payments to the workers for their service. IRS officials have identified some practical drawbacks to implementing this proposal. For example, determining what is includable and what is excludable from the “economic transaction” can vary from industry to industry and from taxpayer to taxpayer. Depending on the industry or activity, the gross transaction amount may not be itemized to specify what is included; for example, many payment settlement entities would not know whether sales tax is included in a transaction amount. IRS officials stated that it is not clear whether this proposal would provide any value to the worker or IRS given the variations. IRS could work with Treasury to allow for electronic delivery of Forms 1099 by default. The default delivery method is mail, and workers must opt-in to receive forms electronically. When a worker receives the form electronically, the worker may receive an email notification that the electronic form is available for download in a secure online account. Platform company officials with whom we spoke said sending forms by mail can be burdensome due to mailing costs and the costs of finding accurate mailing addresses. However, they generally have accurate email addresses because that is how they exchange information with platform workers. Allowing electronic delivery of Forms 1099 by default could reduce the burden for companies, while ensuring that more workers receive their forms. However, new rules would be needed to ensure that workers are easily able to opt-out of electronic delivery, and receive the forms on paper if they wish. We were not able to collect sufficient data on the cost or savings for companies and barriers for workers. James R. McTigue, Jr. (202) 512-9110, mctiguej@gao.gov Key contributors to this report include: Julie Anderson, Rob Gebhart, Sarah Gilliland, Gina Hoover, Jesse Mitchell, Ed Nannenhorn, Jessica Nierenberg, Robert Robinson, Eden Savino, Tom Short, AJ Stephens, and Peter Verchinski.", "summary": "Platform companies typically classify workers offering services as independent contractors and do not withhold taxes from their payments for remittance to IRS. GAO was asked to review issues related to platform workers and tax compliance. This report, among other things, examines (1) what is known about the platform workforce, and (2) options to promote compliance among its workers. GAO reviewed research on the U.S. platform economy and interviewed stakeholders on the tax-related challenges platform workers face; reviewed IRS documents; interviewed IRS officials; and assessed potential impacts of some options that could address platform worker tax-related challenges. The platform economy is an arrangement where workers offering goods or services connect with customers through an app or other online platform. Estimates of the population of platform workers lack certainty, but generally range from around 1.5 million to 2 million workers for recent years and suggest that the platform workforce may be growing. According to stakeholders, such as researchers and tax preparers, platform workers may not realize that a company is treating them as independent contractors rather than employees and that they must comply with different tax requirements. To help address this challenge, the Internal Revenue Service (IRS) developed a communications plan aimed at workers in the platform economy (which IRS calls the gig economy). The communications plan incorporates leading practices for redesigning web pages and improving the online user experience, but lacks a monitoring plan to help assure IRS's efforts address platform workers' tax challenges. GAO found that platform workers may not receive information on their earnings, creating compliance challenges for them and enforcement challenges for IRS. GAO identified actions that could promote compliance. For example, some platform companies only report total annual payments for workers if they exceed $20,000 and 200 transactions—an amount that exceeds the average gross pay from a single company for many platform workers. Amending this rule to lower the reporting thresholds would provide workers with more information to help them comply with their tax obligations. The change could also enhance IRS's ability to ensure that these workers are correctly reporting their income. Additionally, IRS could implement voluntary withholding on payments to independent contractors (including platform workers). IRS data indicate that tax withholding substantially increases the compliance rate. GAO is making seven recommendations to IRS, including actions to enhance its communications plan, increase information reporting for platform workers, and allow voluntary withholding. IRS agreed with the recommendation to enhance its communications plan. For four recommendations related to information reporting and voluntary withholding, IRS either disagreed or said it was unable to agree because it could not commit to an implementation date due to higher priorities. GAO continues to believe that all the recommendations are valid, as discussed in the report.", "document_type": "gao"}
{"report": "Airline customer service agents have a number of duties to assist passengers at the airport (see fig. 1). Customer service agents can check passengers into flights; handle and tag checked bags; and board and deplane passengers on the aircraft; in addition to assisting passengers when service failures occur, such as helping to locate a lost bag. At many airports and airlines, customer service agents are trained to work the ticket counter and the arrival and departure gates. In this role, airline customer service agents’ interactions with passengers can range from pleasant to routine to contentious. For example, if bad weather causes an airline to delay or cancel flights, harried passengers trying to make connecting flights or get to a destination may take their frustration out on a customer service agent. The following entities are responsible for helping to prevent or address passenger assaults: Airlines seek to provide a safe work environment for customer service agents. Among other things, airlines set policies and procedures instructing customer service agents how to handle and report incidents, in addition to how management should respond. Airport law enforcement responds to allegations of violence at airports and enforces state and local laws. According to airport law enforcement, when they respond to incidents, they generally capture information in police reports. Airport management, such as a security director, may be informed of alleged passenger assaults at the airport or support ensuing investigations and prosecutions. Prosecutors at the federal and state level decide whether to charge passengers for offenses that violate laws. No one federal agency is responsible for addressing passenger assaults against customer service agents at the airport. For example, FAA sets policies that airlines and their employees must adhere to for aviation safety, but TSA oversees the security of the nation’s civil aviation system. However, officials from both TSA and FAA told us their responsibilities for passenger assaults at airports are limited. In particular, FAA officials said their primary responsibility is for assaults onboard aircraft as opposed to at the airport. Similarly, TSA officials said they only get involved in assaults of airline customer service agents in the rare instances where incidents affect airport security. Within DOJ, FBI conducts investigations of incidents that are deemed to violate federal law, and federal prosecutors can decide whether to prosecute individuals for alleged incidents that are deemed to violate federal law. Limited data are available to determine the frequency or nature of passenger assaults at airports against airline customer service agents. We reviewed selected data from DOJ, DOT, FAA, FBI, and TSA and found that no dataset can isolate such passenger assaults. For example, while the FBI collects transportation crime data from law enforcement agencies about incidents that occur at air, bus, or train terminals— including information on the victim, offender, and location of the crime— the data cannot isolate passenger assaults against airline customer service agents. While representatives from selected airport law enforcement agencies and airlines we interviewed said they collect information related to passenger assaults for their respective airports or airlines, these data were generally unavailable. In particular, representatives from all six selected airport law enforcement agencies we interviewed said providing data on passenger assaults against airline customer service agents would require manually reviewing all police reports. Results from one selected airport law enforcement agency that had manually reviewed its data for 2018 found that of the 237 assistance calls it received for incidents between customer service agents and passengers, law enforcement completed an incident report for 12 of these calls, and referred two reports to state prosecutors. Representatives from five of the six selected airlines declined to share data with us, saying data were not readily available, or were business proprietary, or business sensitive. Representatives from the remaining airline provided us with data from the third and fourth quarters of 2018; this data indicated that incidents between passengers and customer service agents generally remained constant, with an average of approximately 1.2 disruptive passengers per 1,000 passenger boardings. In the absence of available data, we surveyed a non-generalizable sample of 104 randomly selected customer service agents to understand their experiences performing their jobs over the last year. According to these 104 customer service agents, almost all (96) reported experiencing verbal harassment, such as passengers yelling, cursing, or being argumentative (see fig. 2). Almost half (46) reported experiencing verbal threats, such as passengers threatening to harm the customer service agent. Twenty-two customer service agents reported that a passenger attempted to physically assault them by, for example, attempting to push them. Fewer (12) customer service agents said that passengers actually physically assaulted them. We also found that about one-third (34) of surveyed customer service agents said they experienced “other types of harmful actions,” which agents said included passengers destroying property, taking video of agents, grabbing agents’ identification badges, and stalking agents after work. Stakeholders we interviewed from selected airports, airport law enforcement, and airlines generally agreed that passengers can be verbally disruptive but that physical assaults are less frequent. More specifically, of these 17 stakeholders, most (13) agreed that disruptive passenger behavior is frequent. Most (11) also agreed that physical assaults occur less frequently than verbal threats. Nevertheless, while representatives from two selected unions did not have data on such actions, they emphasized to us that the customer service agents they represent face difficult working conditions. The union representatives also stated that passenger assaults, including verbal threats and physical assaults, are becoming more common. Further, three of the nine stakeholders who provided a perspective said that incidents against customer service agents are increasing. For example, representatives from one airline we interviewed said that over the past 5 years, they have observed an increase in both the frequency and severity of passenger assaults, in addition to other disruptive behavior. A number of factors may contribute to passenger assaults. Selected stakeholders, including those from airlines, airports, airport law enforcement, and other industry associations most commonly cited (24) alcohol consumption at the airport or drug use as a contributing factor. For example, according to representatives from one law enforcement agency, when customer service agents deny boarding to intoxicated passengers, passengers can become verbally or physically aggressive toward customer service agents. Other stakeholders told us that passengers increasingly have more opportunities to consume alcohol while waiting for their flights, thereby increasing alcohol-related incidents. For example, representatives from one airport noted that tablets at the boarding area allow passengers to place orders for alcohol while seated at the gate. Seventeen selected stakeholders we interviewed also told us that airlines’ business practices, such as charging fees for checked and carry-on baggage or policies around delays and cancellations might aggravate or surprise passengers and lead them to be aggressive toward customer service agents. Some stakeholders (10) also said that other factors, such as long lines and large crowds in the airport can increase passengers’ stress levels. Moreover, according to some stakeholders, service failures—such as flight delays, cancellations, or lost baggage—can exacerbate these stressors. Of the 61 surveyed customer service agents who reported experiencing verbal threats, attempted physical assaults, actual physical assaults, or other harmful actions, most (45) said these incidents negatively affected their overall well-being. Similarly, selected union representatives we interviewed also said that these incidents can increase stress and anxiety for customer service agents. Almost all customer service agents (56 of 61) who stated in our survey that they experienced passenger conduct amounting to more than harassment said they reported the conduct to someone. Specifically, 46 customer service agents stated that they contacted their immediate airline manager; 28 stated that they contacted airport law enforcement; and 6 stated that they contacted airport staff or other entities. These actions described by customer service agents we surveyed generally aligned with selected airlines’ procedures for handling passenger assaults. Specifically, representatives from five selected airlines told us that while their respective airline’s policy generally calls for agents to contact management first, agents can also contact airport law enforcement if they feel like their safety is threatened. However, representatives from two selected unions told us that airline managers are sometimes hesitant to inform law enforcement about incidents—or have their agents contact law enforcement—or to elevate incidents internally. According to one union representative, airlines prefer to keep such incidents internal and emphasize providing on-time service to their passengers. Contacting law enforcement could make this difficult to achieve, so when disruptive passenger behavior occurs, airlines may be inclined to allow the passenger onboard the aircraft instead of contacting law enforcement. Of the 56 customer service agents who stated they reported the passenger conduct, over half (33) said that, to their knowledge, representatives from airlines, law enforcement, or airports took action in response. According to our survey results, these representatives generally took a range of actions, including but not limited to, requesting that a passenger stop the disruptive behavior, completing an airline or police report, denying a passenger boarding, or arresting a passenger. Representatives most commonly removed passengers from an area or denied passengers from boarding (18); diffused the situation (7); or arrested the passenger (4). Twenty-six customer service agents said that no action was taken in response to the incident, which left some to not feel supported by airline management. Moreover, according to representatives from one union, in some instances, customer service agents feel that if airline management provides passengers with travel benefits, such as seat upgrades or airline miles, to diffuse these types of situations, it can appear to be condoning or rewarding any passenger misbehavior. The FAA Reauthorization Act of 2018 requires airlines to develop and submit employee assault-prevention and response plans to FAA by January 2019. In these plans, airlines are required to document: reporting protocols for airline customer service agents who have been the victim of a verbal or physical assault; protocols for notifying law enforcement after an incident of verbal or physical assault committed against an airline customer service agent; protocols for informing federal law enforcement about violations of federal law that prohibits interference with security screening personnel; protocols for ensuring that a passenger involved in a violent incident with an airline customer service agent is not allowed to move through airport security or board an aircraft until appropriate law enforcement has an opportunity to assess the incident and take appropriate action; and protocols for informing passengers of federal laws protecting federal, airport, and airline employees who have security duties within an airport. In March 2019, FAA officials said they had not received employee assault-prevention and response plans from all of the 49 U.S. airlines that were required to submit such plans. However, at that time, officials also said they were not concerned about any delays because they believed airlines already have internal policies and procedures for handling these types of incidents. Nevertheless, FAA officials told us they intended to issue a reminder to the airlines. Of the six selected airlines we interviewed, representatives from two airlines said they had submitted their plans to FAA, and representatives from the remaining four airlines said their plans were in development. Further, when we asked airlines to describe their policies for handling assaults, some of the policies that representatives described aligned to some requirements in the Act for the plans. For example, as discussed previously, all six selected airlines told us they had policies for how customer service agents or managers should notify airport law enforcement when assaults occur. Moreover, representatives from all six airlines also described reports that that customer service agents and employees complete when such incidents occur. In July 2019, FAA issued a notification to airlines, reminding them to develop and submit their plans. FAA officials attributed delays in following up with airlines to the government shutdown in early 2019 and multiple competing requirements in the Act. FAA officials also said they were initially hesitant to issue a notification around these plans, since the agency has a limited role and does not promulgate requirements for the training or oversight of customer service agents. Nevertheless, FAA officials said they plan to continue to follow up with the airlines as needed to collect the remaining plans. All selected stakeholders we interviewed representing airlines, airports, airport law enforcement, and prosecutors (23 of 23) who provided a perspective said that current state and local laws sufficiently deter and address passenger assaults. We spoke with seven selected state prosecutors who told us that, among other offenses, they can charge passengers for actions against customer service agents with assault; battery (e.g., intentional causing of bodily harm); disorderly conduct (i.e., acts that are of a nature to outrage the sense of public decency, or affect the peace and quiet of persons who may witness them, or engaging in brawling or fighting); and trespassing. According to these prosecutors, they typically charge passengers for assaults as misdemeanors, which one prosecutor told us generally does not result in passengers’ serving any jail time. While four selected state prosecutors who regularly handle misdemeanor prosecutions did not have data isolating these crimes, three recalled charging passengers for assaults against customer service agents. For example, a representative from one prosecutor’s office estimated that, over the last 5 years, law enforcement had referred 25 to 30 of these incidents to his office and that his office had prosecuted six or seven of these cases. In determining whether to pursue a case, five prosecutors we interviewed told us they weigh a number of factors, such as whether the customer service agent is willing to file charges; whether law enforcement observed the assault; and whether witnesses are available to testify. Nonetheless, according to prosecutors we interviewed, crimes committed at airports present unique challenges. More specifically, according to one prosecutor we spoke with, the transitory nature of airports makes it difficult to get witnesses to testify at a trial, because they are often passing through the airport en route to another destination. Four selected prosecutors also told us that passenger assaults might be charged as felonies if, for example, the crime involves the use of a deadly weapon or causes serious physical injury to the victim. However, these prosecutors told us such instances are infrequent and incidents between passengers and customer service agents rarely rise to the level of severity of a felony charge. To that end, none of the three prosecutors we interviewed who typically prosecute felony cases could remember charging a passenger for an assault of a customer service agent within the last year. Nevertheless, some selected stakeholders told us opportunities exist to strengthen penalties for passenger assaults. More broadly, a few stakeholders that we interviewed—including one airline, one prosecutor, and one union—suggested opportunities exist to pursue harsher penalties. According to selected stakeholders, this could be achieved by, for example, prosecuting passenger assaults as felonies, prosecuting these incidents at the federal level, or seeking a legislative change to classify airline customer service agents as a protected class. For example, under Florida statute, an alleged battery against certain specified protected classes, including elected officials and teachers, are automatically reclassified from a first degree misdemeanor to a third degree felony charge, resulting in potentially harsher penalties. Most selected stakeholders we interviewed who provided a perspective said that their current resources sufficiently deter and address passenger assaults. Specifically, of the 20 selected stakeholders who provided a perspective, 15 said that current resources are sufficient and did not identify other resources that could improve their ability to address or mitigate passenger assaults. The remaining five stakeholders would like to see additional resources directed toward airport’s law enforcement agencies. In particular, four selected stakeholders said they believe that increasing the number and presence of law enforcement in airports would help deter or address passenger assaults. Representatives from one airline told us they hired private security officers to monitor ticketing and baggage areas at the airport to increase their security posture. While the purpose is not to address passenger assaults, representatives told us that these officers can respond to such assaults. The remaining stakeholder suggested law enforcement could receive additional training to improve responses when passenger assaults occur. Some of the selected stakeholders we interviewed who did not identify gaps in resources nonetheless offered suggestions to further deter or mitigate passenger assaults, including: Provide additional training for customer service agents. Three stakeholders told us customer service agents should receive additional training on conflict de-escalation. Increase information sharing and reporting. Three selected stakeholders said that information sharing could be improved among relevant stakeholders—including airlines and airport law enforcement. For example, representatives from one airline said they have limited insight into the outcomes of passenger assaults unless they contact airport law enforcement or prosecutors. Two selected union representatives said that having better data on these incidents could be beneficial to understand the scope of the problem. Increase public education and support for customer service agents. Representatives from two unions would like to see (1) signage at airports saying that assaults by passengers are subject to prosecution, and (2) airlines provide additional support to customer service agents, in the form of legal assistance or time off, to press charges against passengers alleged to have committed such assaults. Moving forward, the FAA Reauthorization Act of 2018 requires airlines to provide initial and recurrent training for all employees on, among other things, de-escalating hostile situations, and, as previously noted, the reporting protocols for these incidents. Providing such training and having additional reporting protocols could provide customer service agents with additional tools for diffusing these incidents and standardize how airlines respond to these incidents, respectively. We provided a draft of this report to DHS, DOJ, and DOT for review and comment. DOJ provided technical comments, which we incorporated as appropriate. DHS and DOT did not have any comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, the Attorney General, the Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff any have questions about this report, please contact me at (202) 512-2834 or VonahA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In the past year, how many times have experienced the following incidents: Passenger verbally harassed you Passenger verbally threatened you (i.e., said they would do something to you specifically) Passenger attempted to physically assault you (tried to hurt you) Passenger committed other harmful action (please describe) 3. How, if at all, have these incidents affected your overall well-being? a. No effect b. Slightly negative effect c. Very negative effect 4. Now thinking about the most severe incident you have experienced in the past year, which of the following airport officials, if any, did you contact about this incident? a. Immediate airline manager b. Airport law enforcement c. Airport staff d. Other–Please identify ______________________________ e. None 5. Did any airport or airline officials take action because of your most severe incident in the past year? a. No b. Don’t know c. Yes. Please describe the action that was taken. 6. How, if at all, could airlines support customer-service representatives when these incidents happen? Andrew Von Ah, (202) 512-2834 or VonahA@gao.gov. In addition to the individual named above, other key contributors to this report were Jonathan Carver, Assistant Director; Melissa Swearingen, Analyst-in-Charge; Emily Flores; Clara Goldrich; Geoffrey Hamilton; Delwen Jones; Dawn Locke; Malika Rice; Kelly Rubin; and Amy Suntoke.", "summary": "Recent media reports have detailed incidents at airports where passengers have acted disruptively or violently toward airline customer service agents, who assist passengers checking into their flights and boarding aircraft, among other things. While state and local laws generally prohibit these types of actions, some stakeholders have raised questions about these agents' safety. The FAA Reauthorization Act of 2018 included a provision that GAO examine passenger violence against airline customer service agents at airports. This report examines (1) what is known about assaults by passengers against customer service agents and (2) stakeholders' perspectives on the sufficiency of state and local laws and resources to deter and address such incidents. GAO interviewed and reviewed available information from a non-generalizable sample of representatives from five large airports and six large airlines. GAO also interviewed six airport law enforcement agencies, and seven prosecutors' offices. Further, GAO reviewed documents and interviewed two unions representing customer service agents and five federal agencies with airport safety or security responsibilities. GAO developed and administered a brief, non-generalizable survey to 104 customer service agents working at four selected large airports that GAO visited in March and April 2019. Survey results on customer service agents' experiences with passengers cannot be used to make inferences about all customer service agents but nevertheless provide valuable insights. No comprehensive data are available to determine the nature and frequency of passenger assaults—e.g., verbal threats, attempted physical acts, or actual physical acts—against airline customer service agents at airports. This lack of data is due, in part, to the limited federal role in addressing such assaults. GAO's survey of 104 airline customer service agents showed that over half (61) reported experiencing such action in the past year, while almost all reported experiencing verbal harassment. About 10 percent reported experiencing physical assaults. Stakeholders GAO interviewed said that while passengers are often verbally disruptive, physical assaults are less frequent. These stakeholders also said that alcohol consumption, frustration over airlines' business practices (e.g., fees for checked or carry-on baggage), and long lines can contribute to these incidents. Of the stakeholders—i.e., airlines, airports, law enforcement, and prosecutors— GAO interviewed who provided perspectives and have responsibilities for passenger assaults, all 23 said state and local laws sufficiently deter and address such incidents, and 15 (of 20) said current resources are sufficient. One prosecutor told GAO the transitory nature of airports makes it difficult to get witnesses to testify at trial; when prosecuted, passengers generally face misdemeanor charges. While stakeholders GAO interviewed generally did not identify gaps in resources, some said incidents could be further mitigated if, for example, airports made law enforcement's presence more visible or airlines provided conflict de-escalation training to customer service agents. The FAA Reauthorization Act of 2018 required that airlines (1) provide such training to all employees, and (2) submit plans to the Federal Aviation Administration (FAA) by January 2019 detailing how airlines respond to passenger assaults. In July 2019, FAA issued a notification to airlines reminding them to submit their plans; officials said they will continue to follow up with airlines until they receive the plans.", "document_type": "gao"}
{"report": "NNSA is executing and plans to carry out multiple weapon programs and a range of related capital asset projects over the next 2 decades. First, NNSA is currently conducting four weapon modernization programs: the B61-12 LEP, the W88 Alteration 370, the W80-4 LEP, and the W87-1 Modification program. Table 1 provides more information on each of these programs based on our prior work, with selected updates on program schedules, cost estimates, and budgets from the Fiscal Year 2020 Stockpile Stewardship and Management Plan and NNSA testimony. In addition to these four ongoing programs, the 2018 Nuclear Posture Review calls for NNSA to consider additional weapon programs— specifically, a program to develop a modern nuclear-armed sea-launched cruise missile, and another to develop a new submarine-launched ballistic missile warhead (now being referred to as the W93). The Nuclear Posture Review also instructs NNSA to maintain the B83-1 bomb until a suitable replacement can be found. To support and enable ongoing and planned weapon programs, NNSA also plans to spend billions of dollars over the next 2 decades on capital asset projects and other infrastructure risk reduction and recapitalization efforts to modernize the production infrastructure NNSA uses to produce components and materials needed for its weapon programs. Table 2 provides more information on selected NNSA capital asset projects discussed in our recent reports, with selected updates on program schedules and cost estimates from the DOE Office of Project Management’s January 2020 Monthly DOE Project Portfolio Status Report. According to NNSA’s plans, the agency must carry out many of its weapon programs while simultaneously modernizing the very infrastructure on which these weapon programs rely for components and other materials. Therefore, any delays or technical challenges that affect NNSA’s plans for its production facilities may be expected to result in delays and challenges to the weapon programs. Figure 1 shows the estimated schedules for the weapon programs and related capital asset projects described in tables 1 and 2 and reported on in our prior work, with updated information as presented in the Fiscal Year 2020 Stockpile Stewardship and Management Plan. We have reported on the potential effects on NNSA’s weapon programs of delays or technical challenges in modernizing its production facilities. For example: The W87-1 Modification program’s schedule may be particularly vulnerable to production challenges, including pit production challenges, because, as we reported in November 2018, it will require all newly-made components, including pits. In our most recent report on the W87-1 program, a classified report issued in February 2020, we found that NNSA’s past challenges in managing plutonium activities at Los Alamos and in executing projects of this size cast doubt on NNSA’s ability to produce 80 pits per year in 2030. As we note in that report, an independent assessment of NNSA’s pit production strategy in March 2019 concluded that no options evaluated by NNSA could be expected to produce 80 pits per year by 2030. The independent assessment further stated that NNSA had no precedent for major projects costing more than $700 million dollars that had been completed in fewer than 16 years, and that many similar projects were eventually cancelled. Future weapon programs will require newly produced explosives, including some that NNSA has not produced at scale since 1993. As we reported in June 2019, NNSA officials stated that producing these materials will pose challenges that include replicating decades-old recipes for the materials and preparing for their full-scale production in aging facilities. As we noted in that report, similar problems restarting dormant production capabilities have delayed past weapon programs—notably, the W76-1 LEP, which NNSA completed in December 2018. As we reported in March 2009, NNSA had to delay first production of the W76-1 from September 2007 to September 2008 when it encountered problems restarting production of a key material, known as Fogbank. NNSA is working to reconstitute its high explosives capabilities, as we reported in June 2019. Nonnuclear parts and components comprise over 80 percent of the items in a nuclear weapon, and NNSA’s Kansas City National Security Campus procures or produces most of these. In April 2019, we found that work on the B61-12 LEP and W88 Alteration 370 was expected to double at the Kansas City site during fiscal years 2020 through 2022. Our April 2019 report also identified challenges that could complicate work at the site. For example, disruption to the established supply chain for externally supplied parts—which comprise about 65 percent of the nonnuclear parts used at the Kansas City site—could result in production delays, and the site needs hundreds of thousands of additional square feet of manufacturing space to meet workload demands. We have also recently completed work in which we reported on challenges integrating the schedules of NNSA’s weapon programs with the schedules for DOD’s modernized delivery systems. For example, the W87-1 warhead will need to be integrated on a delivery system that is under development, an intercontinental ballistic missile known as the Ground-Based Strategic Deterrent. We have ongoing work examining DOD and DOE plans to modernize and integrate warheads and delivery vehicles and expect to issue a classified report in spring 2020. As we have recently reported, NNSA has made improvements in its management of some weapon modernization programs and enabling capital asset projects. We have concluded that NNSA’s federal program and project management capacity is improving, as are the controls it has developed for program and project performance. For example: We found in January 2018 that NNSA has established and strengthened management requirements for LEPs. Specifically, in January 2016, NNSA’s Office of Defense Programs issued a program management directive that designates risk-based program execution requirements that all programs must follow. The directive places LEPs in one of the highest-risk categories, meaning these programs are required to apply more rigorous management controls specified in the directive, including using earned value management. Further, in January 2017, NNSA issued two directives implementing requirements for NNSA’s Office of Cost Estimating and Program Evaluation to conduct independent cost estimates. In May 2018, we found that the program cost estimate for the B61-12 LEP substantially met the criteria for all four characteristics of a high-quality, reliable cost estimate, in part because it was the first LEP to undergo an independent cost estimate. We reported in our February 2017 high-risk update that DOE demonstrated a strong commitment and top leadership support for improving project management. For example, DOE made changes to its revised project management order, issued in May 2016, in response to recommendations we made in prior years, such as requiring that projects develop cost estimates and analyses of alternatives according to best practices we identified. In September 2017, we found that NNSA had made progress in developing a revised scope of work, cost estimate, and schedule for the Uranium Processing Facility project, which is to modernize uranium production efforts at the Y-12 National Security Complex. We reported at that time that these improvements may help NNSA stabilize escalating project costs and technical risks experienced under the previous strategy. In November 2017, we found that NNSA had established programs to manage strategic materials—specifically, uranium, plutonium, tritium, and lithium—and had defined requirements and managerial roles for program managers. Since that time, NNSA has taken steps to implement a new enterprise-wide approach for managing explosives activities, as we found in our June 2019 report on those activities. However, we have identified additional actions NNSA could take to further improve its management of weapon modernization programs and related projects. As NNSA’s workload increases, additional management rigor will help ensure that programs and projects are executed consistent with cost and schedule estimates, and that risk is effectively managed and communicated. For example: We found in our January 2018 report that NNSA had not adopted the best practice of having an independent team validate its earned value management systems against the national standard for such systems, which could help the agency better manage risk in its LEPs. We also found that NNSA had not established specific benchmarks for technology readiness at LEP decision points, consistent with best practices. We recommended that NNSA require an independent team to validate contractor earned value management systems for LEPs and establish technology readiness requirements at LEP decision points. According to an update NNSA provided to us in September 2019, the agency has not taken action to address these recommendations. We continue to believe that it should do so. We found in our September 2017 report that NNSA had not developed a complete scope of work, a life-cycle cost estimate, or an integrated master schedule for its overall uranium program—of which the Uranium Processing Facility is only one part—and had no time frame for doing so. We recommended that NNSA should set a time frame for when the agency would develop a complete scope of work, a life-cycle cost estimate, and an integrated master schedule for the overall uranium program. NNSA generally agreed with our recommendation and has taken actions to respond to it. We expect to issue a report on the Uranium Processing Facility and NNSA’s plans for its uranium program in March 2020. As we reported in February 2020, the plutonium program has begun to develop a schedule for pit production. However, NNSA allows strategic materials programs such as the plutonium program to tailor their approach to developing schedules and does not require that they meet best practices for schedule estimating. We recommended that NNSA ensure that the plutonium program develop a schedule for pit production consistent with best practices for schedule development. NNSA agreed with our recommendation. Our ongoing work includes reviews of NNSA’s management of other efforts essential to ongoing weapon modernization programs, such as the production of radiation-hardened microelectronics at Sandia National Laboratories in New Mexico and of depleted uranium at the Y-12 National Security Complex in Tennessee. NNSA’s weapon modernization programs and enabling infrastructure efforts have significant interdependencies that require integrated management across the portfolio of programs to effectively manage cost, schedule, and risk. Portfolio management best practices developed by the Project Management Institute state that organizations can optimize their portfolios of programs and projects by assessing their capability and capacity to finance specific portfolio components; determining which portfolio components should receive the highest priority; and identifying components to be suspended, reprioritized, or terminated. In our April 2017 report on NNSA’s budget materials and modernization plans, we found that NNSA did not clearly identify the extent to which its long-range budget estimates for its overall modernization program fell short of specific annual budget requests anticipated in this plan. We concluded that NNSA had not addressed the projected bow wave of future funding needs and the mismatch between those needs and the potential funding available in the years in question. By not addressing the risks associated with the potential funding shortfall, we concluded, NNSA raised questions about its ability to achieve its modernization program goals at cost and on schedule. As a result, as discussed above, we recommended that NNSA include an assessment of the affordability of its portfolio of modernization programs in future versions of the Stockpile Stewardship and Management Plan—for example, by presenting options NNSA could consider to bring its estimates of modernization funding needs into alignment with potential future budgets, such as potentially deferring the start of or canceling specific modernization programs. NNSA did not explicitly agree or disagree with our recommendation. The President’s fiscal year 2021 budget request for NNSA indicates that the bow wave has arrived, requesting an increase of about $3.1 billion over the funding enacted for Weapons Activities in fiscal year 2020—a year-to-year increase of over 25 percent. The Fiscal Year 2020 Stockpile Stewardship and Management Plan, issued in July 2019, includes a new section on affordability analysis and states that the section was added in response to our April 2017 recommendation. However, our review of this section indicates that it does not fully respond to our recommendation because it does not provide information about how potential misalignment between NNSA’s modernization budget estimates and projections of the President’s modernization budgets may be addressed, or about the potential impacts of adjusting program schedules or cost or schedule overruns. Since the issuance of the 2018 Nuclear Posture Review, NNSA’s portfolio of planned programs has only grown more extensive and complex. We continue to believe that NNSA, by assessing its portfolio of modernization programs in future versions of the Stockpile Stewardship and Management Plan—for example, by presenting options NNSA could consider to bring its estimates of modernization funding needs into alignment with potential future budgets, such as potentially deferring the start of or canceling specific modernization programs—could help congressional and NNSA decision makers better understand NNSA’s priorities and trade-offs that it may need to undertake in the future, depending on funding and program performance. Chairman Cooper, Ranking Member Turner, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-3841 or bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Jason Holliday, Assistant Director; Antoinette C. Capaccio; Julia Coulter; Rob Grace; John Hocker; Dan Royer; and Kiki Theodoropoulos. The following is a selection of GAO’s recent work assessing the National Nuclear Security Administration’s management of nuclear weapon programs and related capital asset projects: Nuclear Weapons: NNSA Should Further Develop Cost, Schedule, and Risk Information for the W87-1 Warhead Program. GAO-20-207C. Washington, D.C.: February 28, 2020. Nuclear Weapons Sustainment: Improvements Made to Budget Estimates in Fiscal Year 2019 Joint Report, but Opportunities Remain to Enhance Completeness. GAO-20-37R. Washington, D.C.: November 7, 2019. Nuclear Weapons: Additional Actions Could Help Improve Management of Activities Involving Explosive Materials. GAO-19-449. Washington, D.C.: June 17, 2019. Modernizing the Nuclear Security Enterprise: NNSA Is Taking Action to Manage Increased Workload at Kansas City National Security Campus. GAO-19-126. Washington, D.C.: April 12, 2019. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP. Washington, D.C.: March 6, 2019. Nuclear Weapons: NNSA Has Taken Steps to Prepare to Restart a Program to Replace the W78 Warhead Capability. GAO-19-84. Washington, D.C.: November 30, 2018. B61-12 Nuclear Bomb: Cost Estimate for Life Extension Incorporated Best Practices, and Steps Being Taken to Manage Remaining Program Risks. GAO-18-456. Washington, D.C.: May 31, 2018. Nuclear Weapons: NNSA Should Clarify Long-Term Uranium Enrichment Mission Needs and Improve Technology Cost Estimates. GAO-18-126. Washington, D.C.: February 16, 2018. Nuclear Weapons: NNSA Should Adopt Additional Best Practices to Better Manage Risk for Life Extension Programs. GAO-18-129. Washington, D.C.: January 30, 2018. Nuclear Weapons: NNSA Needs to Determine Critical Skills and Competencies for Its Strategic Materials Programs. GAO-18-99. Washington, D.C.: November 14, 2017. Modernizing the Nuclear Security Enterprise: A Complete Scope of Work Is Needed to Develop Timely Cost and Schedule Information for the Uranium Program. GAO-17-577. Washington, D.C.: September 8, 2017. National Nuclear Security Administration: Action Needed to Address Affordability of Nuclear Modernization Programs. GAO-17-341. Washington, D.C.: April 26, 2017. High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others. GAO-17-317. Washington, D.C.: February 15, 2017. DOE Project Management: NNSA Needs to Clarify Requirements for Its Plutonium Analysis Project at Los Alamos. GAO-16-585. Washington, D.C.: August 9, 2016. DOE Project Management: NNSA Should Ensure Equal Consideration of Alternatives for Lithium Production. GAO-15-525. Washington, D.C.: July 13, 2015. Nuclear Weapons: NNSA and DOD Need to More Effectively Manage the Stockpile Life Extension Program. GAO-09-385. Washington, D.C.: March 2, 2009. GAO Cost Estimating and Assessment Guide: Best Practices for Developing and Managing Capital Program Costs. GAO-09-3SP. Washington, D.C.: March 2009. Nuclear Weapons: Opportunities Exist to Improve the Budgeting, Cost Accounting, and Management Associated with the Stockpile Life Extension Program. GAO-03-583. Washington, D.C.: July 28, 2003. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "NNSA is simultaneously modernizing the nation's nuclear weapon stockpile and the infrastructure on which weapon programs depend. In a 2019 report, NNSA stated that this is the busiest time for the nuclear security enterprise since the Cold War era. GAO's April 2017 review of NNSA nuclear modernization programs concluded that NNSA made optimistic assumptions about future costs. DOD and DOE estimate that nuclear modernization will cost hundreds of billions of dollars over the next decade. This statement is based on 18 GAO reports issued from July 2003 to February 2020 and selected updates. It discusses (1) NNSA's ongoing and planned programs and projects to modernize weapons and related infrastructure and challenges they present; (2) NNSA's improvements in managing these programs and projects, and additional steps NNSA could take to make further improvements; and (3) GAO's prior recommendation to NNSA on assessing the affordability of its portfolio of modernization programs. To conduct the updates, GAO reviewed DOE planning and budget documents. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is conducting four programs to modernize nuclear weapons, and the Department of Defense's (DOD) 2018 Nuclear Posture Review calls for NNSA to consider additional programs to refurbish or build new weapons over the next 2 decades. NNSA is also managing numerous, multi-billion-dollar construction projects to modernize the infrastructure it uses to produce components and materials needed for its weapon programs. GAO has reported on challenges NNSA faces in managing these efforts. For example, GAO's February 2020 report on the W87-1 warhead program found that NNSA's past challenges in managing plutonium activities cast doubt on NNSA's ability to produce the required number of plutonium weapon cores on schedule. GAO also found in June 2019 that future weapon programs will require newly produced explosives, including some that NNSA has not produced at scale since 1993. NNSA has improved its management of weapon programs and related projects in some respects. For example, NNSA has established requirements for independent cost estimates in weapon programs and has made progress in revising plans for the Uranium Processing Facility project. However, GAO has identified additional actions that could further improve NNSA's management of weapon programs and projects. For example, in September 2017, GAO reported that NNSA had not developed a complete scope of work, a life-cycle cost estimate, or an integrated master schedule for its overall uranium program. GAO recommended that NNSA set a time frame for developing these plans. GAO expects to issue a report on NNSA's uranium program plans in March 2020. GAO concluded in April 2017 that NNSA had not addressed a potential mismatch between funding needs and funding availability. GAO recommended that NNSA assess its portfolio of modernization programs—for example, by presenting options to align programs to potential future budgets, such as potentially deferring the start of or cancelling specific programs. NNSA did not explicitly agree or disagree with GAO's recommendation. NNSA included an affordability analysis in July 2019 planning documents, but the analysis does not fully respond to GAO's recommendation because it does not state how potential misalignment between program costs and budget projections may be addressed. GAO continues to believe that presenting options to align its portfolio of programs to potential future budgets could help Congress and NNSA better understand NNSA's priorities and trade-offs that may need to be undertaken in the future. GAO has made numerous recommendations to NNSA, including that it assess its portfolio of modernization programs to present options to align programs and budgets. NNSA has taken some action but has not fully responded to this recommendation.", "document_type": "gao"}
{"report": "IRA owners are not permitted to engage in certain prohibited transactions involving IRA assets. Prohibited transactions generally fall into two categories: Transaction involving disqualified persons. An IRA is prohibited from engaging in a transaction with disqualified persons, such as members of the IRA owner’s family or an IRA fiduciary. Transaction involving self-dealing. An IRA owner who is a fiduciary is prohibited from engaging in a transaction with the IRA where the IRA owner personally benefits (other than through the receipt of a distribution). We previously reported that prohibited transactions are more likely to arise when IRA owners make unconventional IRA investments. Unlike conventional IRA investments in publicly traded stocks, bonds, and mutual funds, unconventional investments in real estate, virtual currency, or private equity are more likely to involve the IRA owner, disqualified family members, or other disqualified persons. For example, an IRA invested in rental real estate can leave IRA owners susceptible to a number of prohibited transactions, such as renting to family or paying for repairs with personal funds. IRA owners may face adverse and potentially severe tax consequences if they are found to have engaged in a prohibited transaction. Specifically, the IRA could lose its tax-favored status. The account would then be treated as distributing all its assets to the IRA owner at the fair market value on the first day of the year in which the prohibited transaction occurred. The IRA owner may be subject to additional income taxes because of any early distribution from an IRA. The prohibited transaction may also be subject to excise taxes. The Employee Retirement Income Security Act of 1974 (ERISA), which established IRAs and rules prohibiting certain IRA transactions, assigned IRA oversight roles to both DOL and IRS. To avoid confusion over dual jurisdiction, a 1978 Executive Order further clarified the agencies’ roles and responsibilities regarding prohibited transactions. As a result, the authority to interpret the prohibited transaction rules and grant exemptions to those rules was transferred to DOL. The transfer did not affect IRS’ ability to enforce the excise tax provisions or the tax consequences for IRA owners who are found to have engaged in a prohibited transaction. However, in enforcing such tax consequences, IRS is bound by the regulations, rulings, opinions, and exemptions issued by DOL. DOL has the authority to grant administrative exemptions to the prohibited transaction rules on either an individual or a class basis. DOL can grant prospective exemptions for a transaction that an IRA is considering, as well as retroactive exemptions for transactions that have already occurred. To grant an exemption from prohibited IRA transaction rules, DOL evaluates applications using statutory criteria, and follows administrative procedures codified in regulations. Generally, DOL may not grant an exemption unless it finds the exemption to be: in the interest of the plan and its participants and beneficiaries, and protective of the rights of plan participants and beneficiaries. Before granting an exemption, DOL generally must publish a notice of proposed exemption in the Federal Register inviting interested parties to comment on the proposed exemption. DOL regulations lay out the process for filing and processing prohibited transaction exemptions applications. Among other things, the regulations explain: who may apply, what information must be included with an application, when a conference with DOL can be requested, when a request for reconsideration of a DOL decision can be made, how DOL and the applicant will notify interested persons if DOL decides a tentative approval is warranted. DOL also publishes a booklet that provides an explanation of the regulations and applicable laws, and includes additional information for applicants like examples of common types of exemption requests. IRA owners or their fiduciaries file applications for exemptions with DOL’s Office of Exemption Determinations which is part of EBSA. Applicants can research information about past exemptions granted by the agency on EBSA’s website. As explained in the DOL booklet describing the application requirements, applicants have the burden of demonstrating that they should be granted an exemption. If DOL tentatively denies an application, applicants have options for requesting that the denial be reconsidered. Within 20 days of the tentative denial, applicants can request a conference with DOL, or notify DOL of their intent to submit additional information. If, after a conference has been convened, DOL issues a final denial of the application, DOL will entertain one request for reconsideration if the applicant presents significant new facts or arguments, which, for good reason, could not have been submitted earlier. After DOL publishes a notice of proposed exemption in the Federal Register that describes the pending application, the applicant must notify interested persons of the pending exemption. Often, the contents of the information sent to all interested persons, the manner in which it is sent, and any associated deadlines will have previously been agreed to by DOL and the applicant. DOL may also hold public hearings during the comment period. For example, if the transaction involves potential fiduciary self-dealing or conflicts of interest, any individual potentially adversely affected by the exemption may submit a request for a public hearing to DOL. If granted, DOL publishes information about the exemption in the Federal Register and on its website. Figure 1 provides an overview of the exemption application process. The regulations describe circumstances in which DOL will ordinarily not consider an application. For example, DOL generally will not consider an individual application if DOL already has under consideration a class exemption relating to the same type of transaction. DOL will also not consider an application for transactions subject to DOL or IRS investigations. DOL requires applicants to disclose in their applications whether exemption transactions are, or have been, subject to an investigation or enforcement action by DOL or IRS. In addition, if the applicant or any other party in interest becomes the subject of an investigation or enforcement action, the applicant is required to promptly notify DOL. If applicants find that their prospective transaction is substantially similar to other transactions for which the agency has previously granted exemptions, they can follow an expedited process by submitting an “EXPRO” application. EXPRO applications are required to cite prior exemptions granted by DOL to demonstrate that the proposed IRA transaction is substantially similar to other IRA transactions for which DOL has previously provided an exemption. Specifically, EXPRO applicants must cite as substantially similar, either (1) two individual exemptions granted by DOL within the previous 5 years, or (2) one individual exemption granted within the past 10 years, and one transaction authorized pursuant to the EXPRO class exemption within the past 5 years. The applicant must give notice to all interested persons, and the applicant must resolve all substantive adverse comments provided by interested persons before DOL will grant final approval. The time to complete the exemption process can range from a few months to more than a year. DOL officials told us that the process generally takes about 1 year for an individual IRA application that is relatively simple or routine. EXPRO applications have been processed in as few as 78 days. According to DOL officials, the process can start before an applicant submits a formal application because applicants can, and do, request informal consultations and conferences with DOL. DOL officials explained that sometimes potential applicants decide not to file an application after an informal conference because applicants realize that their application would likely be denied. DOL officials explained that during the review process, they first confirm their understanding and characterization of the proposed exemption through correspondence with the applicants. Then, in response, DOL often sets conditions under which relief from the prohibited transaction rules is contingent, such as on the applicant taking additional actions and remaining in compliance with those conditions. For example, if an applicant wants to sell or purchase an asset in what would be an otherwise prohibited IRA transaction, DOL may stipulate that the applicant first obtain an independent appraisal or valuation assessment to determine a fair-market value of that asset. After applications are formally submitted, many IRA applicants withdraw during DOL’s review process. Over an 11-year period, we found that of the 124 IRA applications, applicants withdrew roughly half (56) before the review process was completed (see table 1). Of the remaining 68 applications that continued with the review process, DOL granted 48, denied 16, and closed four application cases for administrative or other reasons. DOL officials did not dispute the results of our analysis, but they said that it would be misleading to conclude that DOL is more likely to grant than deny applications. Rather, they said that their practice of encouraging applicants to consult with DOL in advance leads some potential applicants to decide not to pursue an exemption. In our review of processed applications, we found that most of the applications involved the sale of IRA assets. We found that 88 of the 124 applications were for transactions involving the sale of IRA assets. Most of these were sales of securities or real property (see appendix I for additional information). The next most common type of transaction was for the purchase of assets (21 applications), and most of those also involved securities or real property. The remaining applications involved other transactions, including leases, loans, and extensions of credit. DOL has not sufficiently documented internal policies and procedures to manage and help ensure effective internal controls of its prohibited transactions exemption process. While DOL regulations and guidance detail the requirements for applicants, DOL generally lacks internal documentation of the steps and actions DOL officials are to follow when processing applications, and the roles and responsibilities of agency officials. DOL officials told us that they use a case tracking system to record and track applications. When an application is received by DOL, the division chief of EBSA’s Office of Exemption Determinations (OED) reviews the application and assigns it to an OED supervisor. Either the division chief or the supervisor enters preliminary information from the application into the system, and classifies the transaction by applying one or multiple subject matter codes. The supervisor then reviews the information in the applicant’s case file and assigns the case to an OED analyst. DOL officials told us that any interim data, such as the publication date for a proposed exemption, is entered by the supervisor in the system. If an application is withdrawn by an applicant, denied, or granted, the supervisor records this information in the system, including the dates of these actions. When a case is closed, the analyst completes a close-out index form and submits it to the supervisor for review, and the supervisor enters a closing code in the system. DOL officials told us that they can use the system to generate management reports, such as on the number of applications filed and the amount of time to process cases. Neither the process described above, nor the different roles and responsibilities of the OED division chief, supervisors, and analysts in that process, were documented in the internal documents that DOL provided. A system reference guide included instructions to system users for how to input and modify case records, generate reports, and add or modify users. The reference guide also included screen prints indicating which fields are required by the system to process a case. However, the reference guide did not contain information about responsibilities and duties for these data entry activities, and how those duties are assigned. The documentation provided is unclear regarding who within OED is ultimately responsible for making final decisions on applications. According to Standards for Internal Control in the Federal Government, documentation of an agency’s policies and procedures is a necessary part of an effective internal control system. Such documentation can appear, for example, in management directives or operating manuals, and it should be readily available for examination. Policies and procedures can also help document internal control responsibilities within the agency. DOL officials told us that OED is a small and compact organization, and as such, its policies and procedures can easily be communicated “person to person” and through onsite training. DOL officials also said that the process for entering data is not difficult, and there are few opportunities for error because nearly all data on applications is prepopulated. The principles of internal control, however, apply to both large and small organizations. The level and nature of documentation may vary based on the size of the organization and the complexity of the processes the organization performs, but documentation is still necessary. By documenting policies and procedures, management will be better positioned to monitor whether the organization’s activities are aligned with those policies and procedures, and assess whether the organization is achieving its objectives. Documenting procedures also would provide greater transparency about how applications are handled, and can reduce the risk of employees carrying out their duties inconsistently. For a small organization like OED, documentation of policies and procedures provides a means to retain organizational knowledge, and can help ensure continuity of and consistency in operations if key personnel leave the organization unexpectedly. Some information sharing takes place between DOL and IRS on applications for IRA prohibited transaction exemptions, but no formal mechanism exists to help guide collaboration between the two agencies. As previously discussed, DOL and IRS share oversight responsibility for prohibited IRA transactions. Based on our review of applications and DOL data as well as interviews with agency officials, we found that interactions between DOL and IRS regarding applications for prohibited transaction exemptions are infrequent and limited in scope. Of the 124 applications we reviewed, only eight were coded in OED’s Case Tracking System as having “external contact with IRS,” and DOL officials confirmed that this accurately reflects the level of interagency coordination. DOL officials stated that they sometimes contact IRS about exemption applications, and IRS officials confirmed to us that they periodically receive communications from DOL. IRS officials also told us that they occasionally contact DOL. Both agencies described to us how their current interaction occurs. DOL officials told us that they coordinate with IRS in the following ways: If, during the application review process, OED staff identify applications that may warrant further review or investigation for tax violations, they refer the case to EBSA’s Office of Enforcement, which may then coordinate or refer the case to IRS. DOL officials said that OED staff review the IRS “Dirty Dozen” list of potentially abusive tax scams and schemes. IRS officials said that when possible prohibited transactions arise during an examination that might require DOL input, IRS examiners reach out to DOL to ensure that IRS understands DOL decisions on those transactions. DOL officials said that, in their view, most requested prohibited IRA transaction exemptions do not require extensive interaction with IRS. They questioned the potential usefulness of information about denied or withdrawn applications that might be shared with IRS, but said that IRS could certainly obtain this information if IRS requested it. IRS officials, however, told us that more information from DOL about prohibited IRA transactions and requested exemptions could be useful in carrying out IRS’s oversight responsibilities. For example, DOL does not share information on denied or withdrawn applications with IRS, information that IRS officials told us would be helpful to them. We found that denial information could be useful to IRS as illustrative examples of prohibited transactions for examiner training and educational outreach to IRA owners. Information about the types of transactions in withdrawn applications could also help IRS identify emerging issues or trends in potential prohibited transactions marketed to IRA owners. Although some limited collaboration between DOL and IRS exists, the agencies have not applied to their oversight of prohibited transactions some key practices we have identified in prior reviews of interagency collaboration. Specifically, developing a mechanism to formalize the sharing of information between DOL and IRS could help support current collaboration activities, and could be useful in helping the agencies identify opportunities for greater collaboration going forward. Furthermore, documentation is a necessary part of an effective internal control system. Documenting the procedures for interagency collaboration would improve internal control over the agencies’ activities. A formal agreement, such as a memorandum of understanding (MOU) or other mechanism, can further help agencies monitor, evaluate, and update interagency collaboration. For example, DOL and IRS have previously formalized their collaboration regarding oversight of a different type of retirement savings vehicle— employer-sponsored retirement plans. DOL and IRS have oversight responsibilities for employer-sponsored retirement plans, such as pensions, and in 2003, DOL and IRS completed an MOU to implement collaboration between the two agencies with regards to investigations of and litigation involving employer-sponsored retirement plans. The employer retirement plan MOU and the implementing guidance contain some features of interagency collaboration mechanisms that we have identified in prior work. For example: The responsibilities of each agency are documented, and responsible agency components and officials are identified. The agencies use collaboration tools (checklists) for determining whether issues presented in an examination or investigation by one agency should be referred to the other. A system and process exists to track referrals, and the agencies reconcile their data about referrals (including pending referrals) quarterly. The employer retirement plan MOU also established a process to periodically monitor its effectiveness, and the MOU was last updated in 2013. Developing a similar mechanism to formalize the sharing of information between DOL and IRS regarding IRA prohibited transaction exemptions could help the agencies better support their current coordination efforts and identify additional opportunities for greater collaboration. IRAs are a key vehicle for individuals to save for retirement. IRA owners’ decisions to invest in unconventional assets can expand their role and responsibilities substantially. The consequences for account owners who make a mistake can be severe. When IRA owners request an exemption from rules on prohibited transactions, DOL evaluates applications using statutory criteria, and follows administrative procedures codified in regulations. However, DOL has not sufficiently documented internal policies and procedures for how to manage its process for granting exemptions. Such documentation is a necessary part of an agency’s effective internal control system. DOL and IRS share oversight responsibility of prohibited IRA transactions. While the two agencies do share some information, they do not have a formal mechanism to guide and monitor their collaboration. By formalizing interagency collaboration, such as through an MOU or other mechanism, DOL and IRS could help reinforce their current information sharing and potentially identify new opportunities to improve their oversight efforts through greater collaboration. Documenting procedures for DOL and IRS collaboration on prohibited IRA transactions would also help introduce better internal control over these activities. We are making a total of three recommendations, including two to DOL and one to IRS. The Secretary of Labor should document internal policies and procedures for managing the IRA prohibited transaction exemption process. (Recommendation 1) The Secretary of Labor, in consultation with the Commissioner of Internal Revenue, should establish a formal means, such as a memorandum of understanding or other mechanism, to support and guide DOL’s and IRS’s collaborative efforts to oversee IRA prohibited transaction exemptions. (Recommendation 2) The Commissioner of Internal Revenue, in consultation with the Secretary of Labor, should establish a formal means, such as a memorandum of understanding or other mechanism, to support and guide DOL’s and IRS’s collaborative efforts to oversee IRA prohibited transaction exemptions. (Recommendation 3) We provided a draft of this report to the Secretary of Labor, the Commissioner of Internal Revenue, and the Secretary of the Treasury for review and comment. In its comments, reproduced in appendix II, DOL generally agreed with our two recommendations directed to it. For recommendation 1, DOL plans to create an internal procedure manual formalizing OED’s administrative case processing procedures to help in passing along institutional knowledge. For recommendation 2, DOL agreed to periodically discuss all IRA exemption cases with IRS and did not elaborate on the formal means for this information sharing. DOL also provided technical comments which we incorporated as appropriate. In its comments, reproduced in appendix III, IRS generally agreed with our recommendation directed to it. For recommendation 3, IRS said it is committed to discussing an appropriate mechanism, including periodic meetings, to formalize collaboration on IRA prohibited transaction exemptions. IRS plans to consider expanding its formal collaboration with DOL as part of the next periodic update of the existing employer plan MOU. IRS also provided technical comments which we incorporated as appropriate. The Department of the Treasury provided technical comments which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Labor, the Secretary of the Treasury, and the Commissioner of Internal Revenue. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact James R. McTigue, Jr. at (202) 512-9110 or Charles A. Jeszeck at (202) 512-7215. You may also reach us by email at mctiguej@gao.gov or jeszeckc@gao.gov. GAO staff making key contributions to this report are listed in appendix IV. In addition to the contacts named above, MaryLynn Sergent and David Lehrer (Assistant Directors), Ted Burik, Susan Chin, Steven Flint, Emily Gruenwald, Mark Kehoe, Jungjin Park, and David Reed made key contributions to this report. James Bennett, Amy Bowser, Jacqueline Chapin, Edward J. Nannenhorn, Andrew J. Stephens, Walter Vance, and Adam Wendel also provided support.", "summary": "IRA owners are able to invest in a wide variety of assets, but they are prohibited from engaging in certain transactions involving IRA assets. IRA owners who engage in prohibited transactions may incur increased income tax liability, additional taxes, and the loss of the tax-advantaged status of their accounts. DOL can grant exemptions from the prohibited transaction rules. IRS enforces tax laws relating to IRAs and can assess additional taxes. GAO was asked to examine (1) DOL's process for granting exemptions for prohibited IRA transactions and outcomes of that process, and (2) the extent to which DOL and IRS collaborate on oversight of prohibited transaction rules for IRAs. GAO reviewed relevant federal laws and regulations; examined agency guidance, exemption process documentation, and application case files; assessed interagency coordination using internal control standards and prior work on interagency collaboration; and interviewed DOL and IRS officials. The Department of Labor (DOL) has a process to grant administrative exemptions for individual retirement account (IRA) transactions that would otherwise be prohibited by law, such as an IRA buying investment property from the IRA owner. DOL evaluates applications using statutory criteria and follows administrative procedures codified in regulations. Applications for proposed transactions that are substantially similar to certain other transactions previously granted exemptions may follow an expedited process. As shown in the figure, GAO found that roughly half (56) of the IRA prohibited transaction exemption applications it reviewed were withdrawn by the applicant before the review process was completed. In reviewing processed applications, GAO found that most of the prohibited transactions for which an exemption was sought involved the sale of IRA assets. With regard to DOL's application review process, GAO found that DOL has not sufficiently documented internal policies and procedures to help ensure effective internal control of its process. Documenting procedures could increase transparency about how applications are handled, reduce the risk of DOL employees carrying out their duties inconsistently, and provide a means to retain organizational knowledge should key personnel leave unexpectedly. Although DOL and the Internal Revenue Service (IRS) share some information as part of their oversight responsibility for prohibited IRA transactions, no formal mechanism exists to help guide collaboration between the agencies. Of the 124 IRA applications GAO reviewed, only eight reflected DOL contact with IRS. GAO found that DOL has information about requested exemptions to prohibited IRA transaction rules that could be useful to IRS in carrying out its oversight responsibilities. For example, DOL does not share information on denials—information that could be useful as prohibited transaction examples for IRS examiner training and educational outreach to IRA owners. In prior work on interagency collaboration, GAO has found that formal agreements, such as a memorandum of understanding, can help agencies monitor, evaluate, and update interagency collaboration. Formalizing the sharing of information between DOL and IRS regarding IRA prohibited transaction exemptions could help the agencies better support their current coordination efforts and identify additional opportunities for greater collaboration. GAO is recommending that DOL and IRS establish a formal means—such as a memorandum of understanding or other mechanism—to collaborate on oversight of prohibited IRA transaction exemptions. GAO is also recommending that DOL document policies and procedures for managing the exemptions process. DOL and IRS generally agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Insurance allows individuals and businesses to manage risk by providing compensation for certain losses or expenses, such as those from car accidents, fires, medical services, or inability to work. According to NAIC, as of December 31, 2017, there were 2,509 property/casualty companies and 852 life insurance companies in the United States and its territories. In 2017, premiums written for the property/casualty sector totaled $602.2 billion in 2017 and premiums written for the life and health sector totaled $683.2 billion. As we have noted in recent reports, advances in technology and widespread use of the internet have brought about significant changes in the financial industry. For example, in recent years technology has changed consumer expectations and preferences, with younger consumers especially being well-versed in new technologies and looking to take a more hands-on approach to managing their finances. Similarly, over the last 5 years, established insurers and insurtech companies have used technology to offer simpler insurance products and streamlined customer experiences. Insurtech companies have been playing a variety of roles in the U.S. insurance market. Key players in insurtech include the following: Insurtech companies (typically startups) that are licensed insurance companies. Insurtech startups offer innovative products and services and are active in all major insurance products and all lines of business, with concentrations in the property/casualty business. For example, according to its website, Lemonade Insurance Company is a property/casualty insurer that sells products exclusively through mobile applications (apps) and its website. It offers renters, condominium, and homeowners insurance in several states. Another example is Root, which describes itself as an automobile insurance company that uses a smartphone app to understand individual driving behavior. Customers can download the Root app to their smartphones, obtain a personalized quote after a 2–3 week test drive, and purchase and manage their policy entirely within the mobile app. Insurtech companies that do not provide insurance themselves, but offer technology solutions for insurers. For example, according to the website for Groundspeed Analytics, they use AI and data science methods to provide information for the commercial property/casualty insurance industry to help identify potential areas of profit and enhance the customer experience. According to the website for Habit Analytics, they use real-time consumer data, sourced from smartphones and connected devices in homes, to create behavioral profiles that enable insurance companies to provide input for their risk models. Many established insurers have been acquiring such companies. Established insurers that use technologies or partner with insurtech companies. For example, the insurer Nationwide notes on its website that it created Nationwide Ventures to invest in startups, pilot new technologies, and test new solutions and business models by exploring topics that range from analytics and automation technology to new insurance and financial services platforms. According to analysis by the Deloitte Center for Financial Services and data collected by research firm Venture Scanner, as of mid-2018 there were more than 1,000 insurtech firms established in more than 60 countries, with more than half of those launched in the United States since 2008. Insurance companies are regulated principally by the states and are licensed under the laws of a single state, known as the state of domicile. Companies may conduct business in multiple states, but the state of domicile serves as an important regulator. State regulators license insurance agents, generally review and approve insurance products and premium rates, and examine insurers’ financial solvency and market conduct. As we have previously reported, state regulators typically conduct financial solvency examinations every 3–5 years, while market conduct examinations are generally done in response to specific consumer complaints or regulatory concerns. To help ensure that policyholders continue to receive coverage if their insurer becomes insolvent or unable to meet its liabilities, states also have guaranty funds (separate for life and property/casualty insurance), which are funded by assessments on insurers doing business in those states. Individuals who wish to sell, solicit, or negotiate insurance in the United States must generally be licensed as producers, a term including insurance agents and insurance brokers. Insurance agents typically represent only one insurance company. Insurance brokers represent multiple insurance companies and are free to offer a wider range of products to their clients. Brokers can search the market and obtain multiple price quotes to fit their clients’ needs. Producers must comply with state laws and regulations governing their activities. NAIC notes that as of September 2018, more than 2 million individuals and more than 200,000 business entities were licensed to provide insurance services across all lines of insurance in the United States. Traditional insurers, sometimes referred to as admitted insurers, can be licensed to sell several lines or types of coverage to individuals or families, including personal lines—such as homeowners, renters, and automobile insurance—and commercial lines—such as general liability, commercial property, and product liability insurance. Admitted insurers can sell insurance in one or more states but, according to NAIC, must be licensed to operate in every state in which they sell coverage. To help ensure adequacy and fairness in pricing and coverage, state regulators oversee the insurance rates and forms of admitted insurers. State regulators also may require admitted insurance companies to maintain specific levels of capital to continue to conduct business. The surplus lines insurance market, also known as the nonadmitted market, can provide insurance coverage for risks that traditional insurers are unwilling or unable to cover. The risks covered can include potentially catastrophic property damage and liability associated with high-hazard products, special events, environmental impairment, and employment practices. In the absence of the surplus lines market, NAIC notes that some insureds in those markets would be unable to secure coverage. In most states, surplus lines insurers cannot write insurance coverage that is available from admitted insurers and only may write coverage rejected by a number of admitted insurers, according to NAIC. Furthermore, in those states, the surplus lines insurance broker must conduct a “diligent search” of the admitted insurance market to determine if comparable coverage is available. The broker can write coverage only if a specified number of admitted insurers have declined to offer such coverage. According to NAIC, new and innovative insurance products for which there is no loss history may be difficult to appropriately price. According to stakeholders we interviewed, the nonadmitted market is therefore a common entry point into the insurance market for insurtech firms that want to sell insurance products. NAIC notes that, after a new coverage has generated sufficient data, the coverage often eventually moves to, and is sold by, insurers in the admitted market. For example, private flood insurance was developed and first offered in the nonadmitted market but now also is offered in the admitted market. The nonadmitted market is generally regulated somewhat differently than the admitted market. According to NAIC, surplus lines insurers are subject to regulatory requirements and are overseen for solvency by their domiciliary state or country, but surplus lines transactions are regulated through the licensing of surplus lines brokers. NAIC states these brokers are responsible for ensuring that the surplus lines insurer meets eligibility criteria to write policies in the state and is financially sound. Furthermore, NAIC notes surplus lines brokers and producers must be licensed to sell surplus lines insurance in each state in which they operate. State insurance departments may have authority to suspend, revoke, or not renew the license of a surplus lines broker or producer. Unlike admitted insurers, surplus lines insurers may not have access to state guaranty funds that are available to help pay claims in the event of an insurer insolvency. In addition, according to NAIC, surplus lines insurers generally have more freedom to change policy coverages and premium rates than admitted insurers. NAIC stated that state regulators require both nonadmitted and admitted insurance companies to maintain specific levels of capital to continue to conduct business. According to NAIC, most state insurance regulators also can use their authorities under state statues such as an unfair trade practices act to ensure consumers are protected (for example, to ensure that claims are paid and insurers or brokers do not misrepresent policy terms) and to remedy other bad conduct. NAIC assists state regulators with various oversight functions. While NAIC does not regulate insurers, it provides services designed to make certain interactions between insurers and regulators more efficient. These services include providing detailed insurance data to help regulators understand insurance sales and practices; maintaining a range of databases useful to regulators; and coordinating regulatory efforts by providing guidance, model laws and regulations, and information-sharing tools. The Federal Insurance Office was established in the Department of the Treasury (Treasury) by the Dodd-Frank Wall Street Reform and Consumer Protection Act. The office is headed by a director appointed by the Secretary of the Treasury. The Federal Insurance Office monitors all aspects of the insurance industry (including by identifying issues or gaps in insurance regulation that could contribute to systemic risk in the insurance industry), and helps develop federal policy on international insurance matters, but is not a regulatory agency itself. The office also serves as an information resource for the federal government and coordinates with federal regulators, state insurance regulators, and NAIC. The Federal Insurance Office also represents the United States in the International Association of Insurance Supervisors and coordinates federal efforts in international insurance matters. In recent years, the insurance industry has begun to adopt several types of technology that are designed to provide a range of benefits to insurers and consumers (policyholders), including improved risk monitoring, reduced costs, and improved underwriting. However, the use of these technologies also can create challenges for insurers and potential risks for consumers, including changed business models, pricing fairness, and privacy issues. Based on our literature review and interviews with stakeholders, we identified six key technologies that have seen increased use in the insurance industry in recent years and one technology (blockchain) that has seen limited adoption and which the industry has been exploring for wider use. Mobile apps. A mobile app is software designed to run on a mobile device, such as a smartphone or tablet computer. Insurance industry stakeholders told us that several insurers have adopted mobile apps to make their products and services available on mobile devices. For example, insurers have adopted mobile apps that allow consumers to purchase products online. An increased number of insurers in recent years also have adopted mobile apps that allow customers to complete tasks online such as submitting insurance claims and turning on-demand insurance coverage on or off. Insurers also have been using mobile apps to capture consumer data and usage patterns (behaviors). AI, algorithms, and machine learning. AI is the development of computer systems to perform tasks and make decisions that historically have required human intelligence to perform. Machine learning is a subset of AI and focuses on the ability of machines to receive a set of data and learn for themselves, changing algorithms as they learn more about the information they process. (Algorithms are sets of rules that a computer or computer program follows to compute an outcome.) In the insurance industry, AI includes applications that provide specific expertise or allow for task completion. For example, AI provides on-line “chatbots” (sometimes called robo-advisory services) that answer questions specific to an insurance product or service. When a consumer communicates with a chatbot, the chatbot takes the information the consumer provided and enters it into an algorithm. Based on protocols outlined in the algorithm, the chatbot provides a response to the consumer’s question. As the conversation moves forward, the chatbot will adapt to answer more questions using machine learning in real-time. According to insurance industry stakeholders, insurers have been using algorithms to analyze information obtained from other technology sources to determine what a consumer’s risk profile is and then determine the consumer’s premium rate based on their risk profile. Big data. Big data are large volumes of data (often aggregated from multiple sources to develop data sets). As we have noted in other work, big data are frequently analyzed using predictive analytics, machine learning, and data mining to identify trends, patterns and characteristics. The insurance industry uses big data in several ways, including analyzing consumer information, identifying risk patterns and pricing risk, and analyzing information related to risk pooling. Insurers also use big data to streamline and more accurately underwrite products. For instance, an insurer may use big data to determine whether consumers are high- or low-risk based on factors identified from extensive datasets such as what they purchase online or how they shop for insurance online. This is similar to lenders’ usage of big data. In a previous report, we noted that lenders were using big data to evaluate risk and make lending decisions using real- time nontraditional information gathered from social media sites. Internet of things. The internet of things refers to semi-autonomous and internet-capable devices (such as machinery, home appliances, thermostats, and smartphones) that have sensors that interact with the physical environment and typically contain elements for processing and communicating information. Some insurers stated that the internet of things could be used in the insurance industry to track and reduce risk, detect problems, and mitigate potential claims. For example, a homeowner could have a smart home thermostat that sends alerts when the power goes off and indoor temperature decreases. With the homeowner able to address the issue in real time, the homeowner could mitigate the risk of frozen pipes bursting and potentially prevent a loss and an insurance claim. According to CBInsights, insurers have partnered with insurtech firms that provide this technology to offer real-time monitoring. Drones. Drones are remotely piloted aircraft systems. Insurers have been using drones for a variety of purposes in the insurance industry. For example, insurers use drones to obtain aerial footage over a disaster area to determine the amount of damage to a house or crop field. Insurance companies also use drones to verify information submitted by a policyholder in a claim or help determine the risk presented by difficult-to-reach areas of a property, such as a roof. Telematics. Telematics combines telecommunications and information processing to send, receive, and store information related to specific items such as automobiles or water heaters. Telematics often uses sensors to relay information such as global positioning system location, speed, and water levels. For example, sensors in an automobile can provide data on a driver’s behavior (such as speed, hard braking, and turning radius). The insurer may use that information to determine the driver’s risk profile and help determine the premium rate for that driver. These technologies can be used together. For example, a telematics device can be used to provide data to a mobile app, which can then send the information to an AI algorithm to determine whether a claim should be paid. See figure 1 for examples of the types of technologies that insurers may use to automate the claims process. Blockchain/ distributed ledger technology and smart contracts. The insurance industry has been studying whether blockchain technology could be used to improve insurance processes. Blockchain refers to a type of distributed ledger technology—in which multiple entities and locations share and synchronize datasets—that facilitates and permanently records virtual transactions. Information is uploaded and recorded in a series of secured blocks; the information uploaded cannot be modified or erased once uploaded into the blockchain (thus providing an accurate history of specific transactions and information). According to insurers, blockchain could be used by the industry to track insurance coverage history, expedite the claims process, provide an audit trail of insurance transactions, and address cybersecurity issues. For instance, a blockchain could expedite the claims process by allowing agents, policyholders, and repair companies immediate, secure access to certain data that are part of the claim only as the data are needed. “Smart contracts” include provisions for contract performance that can be executed by a computer algorithm (for instance, on a blockchain). For example, an insurer stated that a smart contract for homeowners insurance might stipulate that if an earthquake of a specific size occurred in a policyholder’s residential area, a claim payment for damage in a specified dollar amount automatically would be made from the insurer to the policyholder. According to NAIC, adoption of blockchain technology in insurance is limited at this time. According to stakeholders with whom we spoke and literature we reviewed, the use of technology in the insurance industry creates potential benefits but also can create risks for both insurers and consumers. We present stakeholder views on the benefits and challenges technology presents in the primary areas they identified as being affected by technology, which include (1) pricing and risk evaluation, (2) consumer protection, (3) business operations and risk monitoring, and (4) product offerings. See figure 2 for a summary of the potential benefits and challenges we discuss. According to stakeholders we interviewed and literature we reviewed, the use of technology for determining insurance pricing and coverages creates several benefits and risks for insurers and consumers: Increased underwriting accuracy. Insurers and others told us that insurers have been using technologies that provide enhanced analytic capabilities or data from previously unavailable sources to increase the accuracy of underwriting. These technologies allow insurers to make new connections between policyholder characteristics and risk. That is, insurers are using big data, AI, and algorithms to obtain and analyze more information about consumers than they previously had been able to obtain. For instance, a property/casualty insurer could collect data on when consumers set their home alarms and use this and other risk information to refine risk determinations for those individuals. Another example is when insurers use data collected from telematics devices in automobiles to inform the insurer about the policyholder’s risk of being involved in an accident. A better understanding of the risk presented by policyholders can help insurers more accurately and effectively price and manage risks. More individualized pricing. Insurers also have been using technologies to underwrite policies in a way that results in more individualized pricing, which benefits insurers and could benefit some consumers. That is, big data can allow an insurer to use factors for which traditional underwriting typically has not accounted. According to stakeholders we interviewed, doing so allows an insurer to place an individual in a smaller risk pool than if traditional underwriting factors were used and to price coverage for that individual more in line with the risk that individual presents. This can help an insurer better manage its level of risk by offering lower prices to lower-risk customers, charging more for higher-risk customers, or even declining to offer coverage to consumers it considers high-risk. Some stakeholders told us that technologies allow consumers to receive more individualized premium rates, based on their risk characteristics, than had been possible. For example, some insurers have been using telematics devices to obtain information on policyholder driving habits and the risk level they present and adjust premium rates based on this information. As a result, consumers who engage in safer driving practices receive the benefit of lower premiums. Policyholders also could use such information to take actions that will lower their risk level and therefore their premiums. For instance, consumers could seek to reduce specific driving behaviors, such as fast stops or starts, which negatively affect their premium rate. However, consumers with higher-than-average risks could end up paying more or perhaps be declined coverage. Stakeholders including an industry representative and a law firm in the field indicated that insurers also might use data to exclude high-risk consumers from marketing. For example, an insurer might not choose to market to high-risk consumers to discourage them from buying their insurance. This approach, in theory, helps insurers decrease the number of high-risk policyholders they insure but could create difficulties for some seeking coverage. Two industry representatives and an academic in the field indicated that the potential for decreased risk pooling creates a difficult question about the minimum extent of pooling that is socially desirable. For example, these stakeholders stated that when insurance underwriting becomes too individualized, it might no longer serve an insurance function; that is, there is very little pooling of risk. They stated it may be a desirable social benefit to have a certain level of risk pooling to allow more people to effectively manage their risk. In a November 2018 issue paper, the International Association of Insurance Supervisors noted the potential effect of more individualized underwriting on the fairness of consumer outcomes. Among other findings, the paper noted the collection of more data on policyholders may enable a more specific risk categorization that could affect risk pooling principles and lead to issues around affordability of certain insurance products or even availability (the potential for exclusion). The association noted that insurance supervisors should monitor whether such negative consumer impacts become a trend and, if so, raise awareness at the appropriate policy and political level(s). Validating consumer data and models. Insurers and insurtech firms increasingly have been using AI and data collection algorithms to gather data through mobile, wearable, and other internet-connected devices and from online sites. According to two academics in the field, collecting consumer data in large quantities and from multiple disparate sources, including social media, poses challenges for insurers in relation to validating those data. Insurers and insurtech firms also face challenges associated with validating models that use the data. Although AI and machine learning can help insurers and agents underwrite risk more accurately, these stakeholders said that these tools and processes can increase risk because the collected information may be inaccurate or inappropriately used in determining premium rates. For example, while models may indicate that certain factors developed by AI from social media and other sources are associated with increased policyholder risk, it may be difficult or impossible for insurers to validate the accuracy of such data. In addition, it can be a challenge for insurers to ensure that the use of such data and models does not result in the use of prohibited factors in determining premium rates, such as race or sex. For example, several stakeholders told us that certain factors, while not specifically disallowed by insurance regulations, could end up serving as a proxy for a disallowed factor. One example cited by a stakeholder was the use of information on consumer magazine subscriptions, which are not prohibited on their own, but could serve as proxies for factors that are prohibited. Finally, it can be a challenge for insurers to document and explain to regulators how rating models that use AI and machine learning work and provide assurance that the rates produced by the models are not unfairly discriminatory toward policyholders. For example, some industry stakeholders we interviewed said that these models are often developed by data scientists and not actuaries, as had been the case in the past. Unlike actuaries, they said data scientists who develop rating models may not fully understand insurance-specific requirements, such as setting premium rates that are not unfairly discriminatory, and may struggle to measure the impact of new variables used in the models. Furthermore, data scientists may be unfamiliar with insurance rules and regulations and may not understand how to communicate their work to state insurance regulators. One regulator described to us how one insurance company was unable to explain how one of the factors that it entered into its advanced risk model—proximity of a home to a day care center—related to the risk that a consumer posed. An actuarial group suggested a greater collaboration between actuaries and data scientists could provide greater assurance that such rating models meet regulatory requirements. Quality of data used in pricing. According to some stakeholders, insurers’ use of nontraditional data and AI to develop insurance pricing models creates two potential risks for consumers that parallel some of the risks for insurers. First, as previously mentioned, insurer’s use of nontraditional data and AI can create a risk that factors unrelated to the risk presented by a consumer could be used to set his or her premium rate. Stakeholders including a regulator said that algorithms or big data may allow insurers to correlate certain factors with higher claim rates, although the factors do not actually relate to risk and may even act as a proxy for a prohibited factor such as race or sex. As a result, some stakeholders noted that using such information to determine a premium rate could be unfairly discriminatory. Some stakeholders also said that such factors unintentionally could become proxies for prohibited rating factors— such as race. For example, using information on a consumer’s purchase history could serve as a proxy for race. Second, some stakeholders indicated that when insurers use AI to generate information on consumers, it is difficult to ensure these data are accurate. Because the data were not explicitly provided by the consumer, the consumer does not have a chance to correct or dispute the data. For example, if an insurer uses AI to pull data from a consumer’s social media accounts, those data could be incorrect or outdated, but the consumer would not know the data were being used as a factor in determining his or her premium rate. This would prevent the consumer from correcting the information if it was wrong. Some stakeholders indicated that if an insurer has difficulty understanding the factors and algorithms being used to price the insurance product, the consumer most likely will not be able to understand them. According to stakeholders with whom we spoke and literature we reviewed, some uses of technology can pose risks in terms of the protection of consumer data. In addition, the use of the nonadmitted market by insurtech companies and insurers may result in more limited financial protections for consumers. Cost of protecting consumer data. As noted earlier, insurers collect and use consumer data in large quantities and from multiple disparate sources, including social media, posing challenges for protecting those data. For example, according to representatives of one property/casualty industry association we interviewed, it can be expensive to maintain the appropriate level of cybersecurity (including technical and organizational measures) to prevent any unauthorized access or use of the additional volumes and types of customer information used in recent years. Consumer privacy concerns. Stakeholders noted that insurers’ expanded use of consumer data raises concerns about the privacy of such data. For example, an automobile insurer may collect data on a consumer using a telematics device installed in the consumer’s vehicle. While an insurer may use data on the consumer’s driving habits for the purpose of adjusting premium rates, the device also may collect information on where and when a consumer drives. This is information consumers may not wish others to possess. One academic also said there is concern about the ownership of the data collected through telematics and other technologies, such as AI, for the purposes of insurance. For instance, if an insurer obtained data from a policyholder’s automobile with a telematics device, a question exists about whether policyholders would have the right to take those data to another insurer if they switched insurers or whether the data belong to the first insurer. As we have described in other work, this presents a larger privacy issue as it may not be possible for a consumer to know exactly what is collected, or when and how the data are used. This lack of knowledge reduces the consumer’s control over their personal information and limits their ability to track what data belong to them. Some stakeholders mentioned concerns about insurers collecting information from social media and other sources that consumers did not explicitly consent to provide to insurers. The European Union (EU) General Data Protection Regulation, which includes regulations governing consumer consent, had an entry into force and application date of May 25, 2018. According to an industry analyst, the General Data Protection Regulation applies to insurance companies around the world, including those in the United States, that process the personal data of EU residents, regardless of the nationality of the person in question or the location of the company. Furthermore, the analyst notes that the regulation strictly defines legal uses of individuals’ data and requires companies to ensure individuals can explicitly and individually consent to other uses of their data. In prior reports, we also noted data privacy concerns in relation to lender use of financial technology. Consumer protection concerns due to use of the nonadmitted market. The nonadmitted market is a common entry point for insurtech firms because of that market’s usefulness for innovative insurance products with little loss history. However, the sale of consumer insurance through nonadmitted insurers raised concerns among several stakeholders. As we noted in a prior report, nonadmitted insurers may face fewer regulatory constraints than traditional insurers in the prices they can charge and their ability to create and offer new products. While data do not exist on the number of insurtechs using the nonadmitted market, industry representatives told us that because of this greater regulatory freedom, a number of insurtechs choose to operate as nonadmitted insurers or as brokers selling policies through nonadmitted insurers. As described in the Background, when consumers purchase insurance from nonadmitted insurers, they do not have some of the same consumer protections they would have if they purchased coverage from an admitted insurer. For example, regulators conduct limited reviews of the prices charged and the products sold by nonadmitted insurers. And as noted earlier, if nonadmitted insurers became insolvent, state guaranty funds may not be available to help pay policyholder claims. As we previously reported, some regulations serve to push potential policyholders toward the admitted market because of the better financial protections it provides (such as rate approvals and access to state guaranty funds). For example, as noted earlier, a broker placing coverage with a nonadmitted insurer generally must conduct a diligent search for available coverage in the admitted market every time a potential policyholder requests coverage in the nonadmitted market. This helps ensure coverage is purchased from an admitted insurer as often as possible. Stakeholders offered differing assessments on the extent of any related risks to consumers resulting from insurtech use of the nonadmitted market. For example, an industry representative said the nonadmitted market is not appropriate for most consumer products because of the lower consumer protections as compared with the admitted market. Two insurtech firms also have raised questions about the ability of insurtech companies and other market participants to properly comply with diligent search requirements. For example, an industry representative told us it does not seem possible to satisfy the diligent search requirement when products are sold on-demand through a mobile app. Furthermore, the representative raised the question of how a broker could legitimately search the admitted market for coverage in cases in which an insurer offers immediate coverage as soon as consumers complete applications on their smartphones. Conversely, some insurers, regulators, and NAIC said that nonadmitted insurers are appropriately regulated and consumers are not necessarily at any greater risk than when purchasing coverage from admitted insurers. Also, several states have eliminated the diligent search requirements. However, a consumer advocate noted that such deregulation raises further consumer protection issues in a market where less regulation is already a concern for consumers. According to the literature we reviewed and stakeholders we interviewed, insurers have been using various technologies to reduce their operating costs but may face risks that affect their operations and business models. Reduced costs. Stakeholders described how adopting various technologies has led to reduced costs in four operational areas for insurers: Communicating with customers. Insurers have been using mobile apps and chatbots to reduce the cost of providing information to potential customers. For example, a consumer might be shopping online for an insurance policy late in the evening. The insurer can use a chatbot to interact with that consumer and answer questions about insurance products. In the past, this might not have been possible if an agent was not available to work nonstandard business hours or insurers might have needed to hire and retain more agents to work evenings and weekends. Underwriting. Insurers have been using technology to reduce the cost of underwriting insurance. For example, according to two insurtech firms and one industry representative we interviewed, some insurers review multiple sources of data with AI to automatically review the information in a consumer’s insurance application, rather than incurring the costs of hiring staff to do so. Through the industry article review and stakeholder interviews, we found that insurers also use the internet of things to obtain data from smart home alarms to monitor consumer usage of alarm systems and thereby assess consumer risk levels. This reduces the costs associated with determining and analyzing risk factors. Claims processing. According to some stakeholders we interviewed, insurers now have the capability to digitally collect and automatically analyze claim evidence, thereby reducing staffing needs and realizing cost savings. For example, consumers can use their smartphones to take photographs of their vehicles after an accident and send the photographs and other information to their insurers through mobile apps. On receipt of the photographs, insurers can use AI algorithms to verify the damage shown—decisions that historically required human intelligence to perform—and automatically start the claims process for the consumer. Fraud. Insurers are able to detect fraud, or decide which claims need to be investigated further by employees, with information verified using big data, the internet of things, and telematics. For instance, an insurer may verify information provided in a claim against information obtained from a smart device to determine if the information provided by the policyholder was accurate. An insurer also might identify a false burglary claim by verifying whether an alarm was set during the time frame identified in the claim and reviewing video from home security cameras. Connecting to legacy computer systems. Some industry stakeholders and association representatives we interviewed stated that established insurers face significant challenges using new technologies because they first have to replace legacy computer systems or customize their systems to interface with new technologies properly. According to industry stakeholders, legacy computer systems were, in some ways, built around satisfying regulatory requirements rather than enhancing the consumer experience or providing more desirable products. They noted it can be costly and difficult to replace such systems or to modify them to interface with more consumer-centered systems, such as those being developed by insurtech companies. Changing roles for insurers and agents. According to some insurance industry stakeholders, emerging uses of key technologies and innovative business models could lead to changes in insurers’ roles and products. For example, with the advent of self-driving vehicles, the liability for accidents could shift from the driver to the vehicle maker or the company that produced the self-driving system. In such cases, they said insurance coverage primarily would be sold to those entities rather than the consumer, and the demand for and amount of consumer automobile coverage sold could decrease substantially. This could cause a shift in demand for products from consumers to commercial lines, resulting in the potential loss of business for some agents and insurers. Some industry stakeholders we interviewed also told us that as more technologies (such as telematics or other smart devices) were adopted to help consumers mitigate risk, insurers likely would have to shift their business model. That is, they would have to move from a model focused on sales of policies, in which agents play a central role, to a model focused on providing consulting services to consumers to help them prevent and mitigate risk and loss. Risk monitoring. Insurers have been using big data with data aggregation and mining to improve monitoring of insured risks. More specifically, several stakeholders told us that these tools and analytical methods can help insurers quickly analyze volumes of data from many sources in or near real time. For example, several stakeholders gave the example of an insurance company using sensors or other devices to continuously collect verified data on movements of insured ships and their cargo. Such data can be useful to insurers for understanding the risks associated with providing insurance coverage and even can be used to provide the ship carrying the cargo the appropriate insurance documentation required for the port of entry. Several stakeholders also told us that some insurtech companies have been using telematics to collect real-time data on driver behavior, which they combine with other information such as credit scores, to develop a fuller and more accurate picture of the risk presented by a given policyholder. Insurers then can use these risk profiles to determine whether to change a policyholder’s rates or continue to insure them. Several stakeholders indicated that such real-time information is likely more accurate than previous risk- assessment methods. According to stakeholders we interviewed and literature we reviewed, the use of various technologies to create new product offerings has created several benefits for insurers and consumers. Ability to offer on-demand products. Technologies have been helping insurers tailor products to specific consumer needs and expand offerings to niche markets. Some insurtech companies have started offering on-demand insurance (insurance that policyholders can turn on and off as needed). For example, one regulator and an academic said that market research data demonstrated that consumers want to be able to turn on insurance for their drones when the drones are in use and turn it off when the drones are idle. Insurers also have been developing similar on-demand products for drivers working for rideshare companies such as Lyft and Uber and for Airbnb and VRBO rentals (to cover the gaps that traditional homeowners insurance, which generally provides coverage on a long-term basis, might have in relation to short-term rentals of homeowners’ properties). On-demand products allow insurers to diversify their product lines and attract more consumers, which is discussed later in this report. Increased convenience. With some insurers providing mobile apps and chatbots, consumers are able to access insurance products and information 24 hours a day. For example, consumers can use mobile apps to get immediate quotes and underwriting decisions from some insurers. In the past, consumers likely would have had to visit an insurance agent or fill out a lengthy application and wait much longer for an underwriting decision. And as previously discussed, some insurers allow their policyholders to submit claim information and photographs of damage through a mobile app without speaking with an agent. Increased consumer choice. According to NAIC and an insurtech firm, consumers can benefit from the increased choice that comes from insurers using technology to offer additional products and services. For example, consumers obtain the ability to purchase insurance for certain time periods for certain items such as drones and action cameras, home sharing, or mile-based automobile insurance. NAIC and the insurtech firm said that some insurers that offer insurance to rideshare operators allow the policyholders to turn the coverage on when they are working and off when they are not. This can reduce premium rates for policyholders who only occasionally work as rideshare drivers. According to the industry articles we reviewed and the stakeholders with whom we spoke, insurers’ use of technology also has benefitted consumers by leading to the development of aggregator websites that bring together quotes from multiple insurers and allow consumers to comparison shop for insurance products. Some insurers said technology may soon give consumers the added ability to further customize their insurance policies by allowing them to select among various available coverages and terms and essentially create a policy that best suits their needs. NAIC, state regulators, and others have initiated a number of actions intended to monitor and address industry and regulator concerns associated with insurtech, including any insurance rules and regulations that could affect insurers’ adoption of technologies. These actions address challenges in areas including (1) evaluation of underwriting methodologies, (2) approvals for new insurance products, (3) customer notification methods and time frames, (4) anti-rebating laws, (5) cybersecurity, and (6) regulator skillsets and resources. NAIC and state regulators have initiated a number of actions intended to monitor concerns that regulations could affect insurers’ adoption of innovative technologies while maintaining oversight of consumer protection issues. First, to monitor technology developments that may affect the state insurance regulatory framework and to develop regulatory guidance, as appropriate, NAIC created an Innovation and Technology Task Force. According to NAIC, this task force provides a forum for regulator education and discussion of innovation and technology in the insurance sector. For example, the task force has held discussions on the collection and use of data by insurers and state insurance regulators—as well as new products, services, and distribution platforms—to educate the regulators on how these developments affect consumer protection, privacy, insurer and producer oversight, marketplace dynamics, and the state-based insurance regulatory framework. In addition, the task force has held forums on emerging issues related to companies or licensees leveraging new technologies. Areas discussed included developing products for on-demand insurance purposes, reviewing new products and technologies affecting the insurance space, and potential implications for the state-based insurance regulatory structure. In addition, in 2012 the EU-U.S. Insurance Dialogue Project was formed, in which EU and U.S. insurance regulators discuss emerging technology issues in the international insurance industry. During the project’s sixth forum in November 2018, the regulators and representatives from industry and consumer organizations discussed challenges and opportunities relating to issues including cyber risks, the use of big data, and AI. According to a project publication, the dialogue project enhanced mutual understanding of respective regulatory frameworks and initiatives between the United States and European Union, which will help ensure effective coordinated supervision of cross-border insurance groups for the benefit of policyholders. In 2018, the project published an issues paper on big data. The paper discusses data collection, portability, quality, and availability and how insurers and third parties use data in marketing, rating, underwriting, and claims handling. Future work by the project may include discussion of insurers’ use of third-party vendors, disclosures to applicants, and insurers’ use of AI models. NAIC and state regulators have initiated a number of actions intended to address industry and regulator concerns about certain insurance rules and regulations that a number of them said could affect insurers’ adoption of technologies. Stakeholders, including regulators, told us that regulators can face challenges in assessing new underwriting methodologies, such as those that use predictive analytics or AI. Reviewing predictive analytics can be a challenge for regulators because of the amount of data used to develop a model, the complexity of techniques, and limited staff resources (discussed in more detail later in this section). In addition, insurers employ different technological approaches, and their documentation and explanation of the methods and approaches differ. Finally, the data and models insurers use dynamically change and may have to be re- submitted for review even before regulators have an opportunity to review the original submission. One state regulator and an industry stakeholder also told us that while an insurer may know the universe of factors from which an AI system pulls, the insurer may not know, or be able to describe for regulators, how the system uses those factors to determine a premium rate. In turn, this may prevent regulators from understanding the system or validating the insurer’s assertions about the system. For example, one state regulator told us that after presenting a rate scheme based on nontraditional factors, an insurer was unable to provide assurances or explanation to the regulator that the resulting premium rates were not unfairly discriminatory. In 2018, NAIC’s Casualty Actuarial and Statistical Task Force began developing a white paper on best practices state regulators can use when reviewing predictive models and analytics filed by insurers to justify rates and guidance they can use for their review of rate filings based on predictive models. NAIC officials told us the Casualty Actuarial and Statistical Task Force will receive comments on the white paper and then evaluate how to incorporate best practices into the Product Filing Review Handbook and recommend such changes to other NAIC working groups. Insurtech firms and other stakeholders told us that working through other regulatory processes, such as the insurance product filing and approval process, often can be inefficient and time consuming because insurers must file in every state in which they wish to sell a product and state requirements can vary. We have noted such difficulties in the insurance market in general. These challenges can be exacerbated by rapid technological evolution in insurer products and risk models. In addition, some stakeholders noted that a lengthy product approval process can be challenging for technology-oriented products. For instance, an insurtech firm may develop a new product quickly to meet consumer demand but might not be able to get the product to market quickly. Some also said that products might become obsolete before the filing approval process was completed. Some stakeholders told us that such challenges can motivate insurtechs to sell insurance through nonadmitted insurers because such insurers have more freedom in altering and selling new products. As we have noted, doing so can bring risks for consumers. In December 2017, the American Insurance Association proposed the Insurance Innovation Regulatory Variance or Waiver Act (Proposed Model Law) to NAIC. The proposed model law would urge allow regulators to create regulatory “sandboxes,” wherein certain regulatory requirements would be waived for insurers seeking to pilot innovative products. Specifically, the proposed model law would authorize insurance regulators to grant variances, waivers, or no-action letters with respect to statutory or regulatory requirements that make it more difficult to introduce new insurance technologies, products, or services. Under the proposed model law, regulators also would be authorized to attach terms and conditions meant to protect consumers to such variances or waivers. Some stakeholders with whom we spoke believed that regulatory sandboxes would not work in the U.S. state-based regulatory framework. For example, some stakeholders told us it would be inappropriate for a state to change legal or regulatory requirements for some but not all insurers or grant exceptions to laws passed by a state legislature to some insurers and not others, as it would no longer be a level playing field. State regulators generally told us they believe that the current regulatory framework provides state regulators with enough flexibility to allow for technology-based innovation. Accordingly, some states have been promoting the use of innovation in the insurance industry by hosting technology sandboxes, where technology companies meet regularly with state regulators to improve companies’ knowledge of insurance regulations and also educate regulators about how the technologies work. According to stakeholders, these technology sandboxes are not the same as regulatory sandboxes that have been established in other nations, as they do not allow waivers of laws and regulations for insurtech companies to test their products. Insurtech firms we interviewed told us that regulations that require paper notifications and U.S. mail delivery for certain processes can make it difficult or more costly for them to offer products with features such as immediate underwriting or on-demand policies. For example, according to insurers and other industry stakeholders, some state laws require that insurance policy cancellation notices be sent by U.S. mail rather than by email. One insurtech firm told us that it would be very costly to meet requirements for mail delivery of insurance policies and cancellation notices because they would have to set up another delivery mechanism (in addition to their electronic notification system). Industry stakeholders also told us that certain laws and regulations that require a minimum period of time before a consumer-initiated policy cancellation takes effect can present challenges for products designed to allow consumers to immediately turn certain coverage on or off. For instance, if consumers used a mobile app to indicate they wanted to turn their automobile insurance coverage off temporarily, it could be unclear if this constituted an actual policy cancellation. Some stakeholders are concerned that states may require an insurance company to give the policyholder a written notice of cancellation at least 30 days before the end of the policy term. Similarly, industry stakeholders told us that some current state regulations could impede on-demand coverage because policies usually must indicate that coverage begins at 12:01 a.m. on the day after a policy is signed and approved. For instance, for on-demand policies that allow on/off subscription at the consumer’s request, it can be unclear whether they are covered the minute that they initiate the coverage, or if they must wait until the following day for coverage to be effective. According to NAIC, many states have taken steps to work within or modify existing laws and regulations to adapt to the increased use of technology in the insurance industry. For example, to address concerns that insurers are required to provide customers with a written, 30-day notice of a policy cancellation, NAIC conducted an analysis in 2018 that found that many states instead require “adequate” notice and that approximately 44 states allow notices to be provided electronically. However, some stakeholders in the insurance industry told us that state cancellation notice requirements are still a barrier to innovation. According to industry stakeholders, many states have anti-rebating laws that generally prohibit insurers from providing consumers with anything of value as an inducement to purchase insurance. NAIC Model Law 880 states that unless expressly provided by law, no insurer may knowingly pay any rebate or incentive to an insured to induce them to purchase a specific product. Insurers, industry stakeholders, and regulators (including NAIC’s Innovation and Technology Task Force) told us that anti-rebating laws can be a barrier to innovation because they could preclude insurers from offering devices that could be used to help insurers and consumers monitor risk. For example, if an insurer offered a policyholder free use of a telematic device (to help insurers collect real- time data and potentially help the policyholder make driving habits safer), it could be considered an inducement and violate anti-rebating laws. The same possibility exists if an insurer were to provide a policyholder with a device to monitor the operating conditions of a boiler to prevent potential water damage should a problem arise. As a result, anti-rebating laws may make it difficult for insurers to make use of certain technologies that could benefit both insurers and policyholders. In contrast to the consensus on the legitimacy of electronic communications, there is little consensus among states on addressing insurers’ concern that anti-rebating laws are a barrier to innovation. According to NAIC, states vary widely on the types of items insurers are allowed to provide for free to customers, with some states having dollar limits on allowable items or allowing items that are specifically linked in a policy. In other cases, it is unclear what is allowable. At NAIC’s fall 2018 meeting, participants noted that some of the NAIC bulletins related to the anti-rebating model law have not addressed whether technologies such as telematics that provide benefits to consumers are considered rebates. According to NAIC, others noted that states typically have taken the position that if a rebate or incentive reduces risk that is the most important issue for all parties involved. NAIC officials noted during the fall 2018 meeting that they will continue to monitor the issues involved. NAIC adopted a model law and states have passed new laws governing cybersecurity and data protection to safeguard the increasing amount of personal data used by insurers. In 2017, NAIC approved the Insurance Data Security Model Law, which creates a legal framework for requiring insurance companies to operate cybersecurity programs. The law outlines planned cybersecurity testing, creation of an information security program, and incident response plans for breach notification procedures. The NAIC model law is only a guideline until adopted by individual states, but NAIC noted that in 2018 and 2019, Michigan, Ohio, Mississippi, and Alabama adopted laws based on the NAIC model and additional states have pending legislation. In an October 2017 report, Treasury endorsed the model law and recommended that Congress consider preempting the states if the law were not adopted over the next 5 years. At the state level, New York’s Department of Financial Services noted it was the first state agency to establish cybersecurity regulations, which became effective March 1, 2017. In May 2018, South Carolina enacted the South Carolina Department of Insurance Data Security Act, which NAIC has characterized as an adoption of the model law. In December 2018, Michigan adopted a similar law. Separately, in June 2018 California passed a law giving consumers more control over their personal information. California’s law generally requires companies to report to customers, upon their request, the categories of personal information they collected about the customer, the business or commercial purpose for collecting and selling such personal information, and what categories of third parties received it. According to industry and regulatory stakeholders, the complexity and evolving nature of the models and approaches used by insurers may outpace the rate at which regulators can educate themselves on those models and approaches. For example, regulators trained in the current rating models may need to acquire new skills to understand and validate advanced and evolving models. In addition, stakeholders told us that new technologies used by insurers can pose significant challenges to regulators partly because of the resource requirements. For instance, regulators and other stakeholders told us that regulators often do not have enough staff with technical expertise, such as data analytics skills, and find it challenging to hire and retain such staff due to limited resources. NAIC has initiated actions to address concerns that state insurance regulators may not have staff with the knowledge or skill sets to address more complex predictive models. For example, in 2018 NAIC management conducted a survey of states regarding the appropriate skills and potential resources NAIC membership may need to deal with big data. Subsequently, in April 2019, NAIC management made recommendations to its Big Data Working Group to hire a technical staff resource to provide technical support for state insurance regulators in the review of actuarial models; develop a tool for state insurance departments to share information on model reviews; and develop a training and education program. NAIC officials told us they also plan to develop a white paper to provide state regulators with guidance on the use of chatbots and AI in the distribution of insurance and the regulatory supervision of these technologies. As many of the regulatory initiatives that NAIC and states have undertaken to address challenges associated with the implementation of new technologies are under development (or recently developed), the impact of these actions on innovation and consumer protection is unknown. It will be important for NAIC and state insurance regulators, as well as the Federal Insurance Office, to continue monitoring developments in these areas. We provided a draft of this report to Treasury and NAIC for review and comment. Treasury and NAIC provided technical comments that we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Chief Executive Officer of the National Association of Insurance Commissioners, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8678 or ortiza@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. This report (1) identifies uses of technologies and the benefits and challenges they might present for insurers and their customers, and (2) discusses what stakeholders identified as key challenges that could affect the adoption of new technologies, and actions that have been taken to address those challenges. While insurance technology (insurtech) does not have a standard definition, for the purposes of this report we defined it as the use of emerging technologies by insurance companies. We focused on insurtech activities in the property/casualty and life sectors of the U.S. insurance market, including information on personal and commercial insurance where available. We did not include the health insurance sector in our scope because of significant differences between that sector and the property/casualty and life insurance sectors in terms of the types of products offered and the methods by which they are sold and regulated. To identify technologies being used in the insurance industry and gain insights about their (potential) benefits and challenges for insurers and customers, we conducted a literature review of scholarly and peer- reviewed material, trade and industry articles, government reports, conference papers, general news, association, nonprofit, and think tank publications, hearings and transcripts, and working papers that described these technologies and their uses. We conducted searches of the ProQuest and HeinOnline databases to identify studies published from January 2015 through June 2018 that were relevant to our research objectives. Because insurtech is a fairly new field, we found few academic publications related to our objectives. We also conducted background research for examples of technologies being used in the insurance industry and their associated benefits and challenges. We also conducted semi-structured interviews with cognizant stakeholders and reviewed documents provided by them to obtain information on and descriptions of current, in-development, and potential future uses of existing or new technology in the insurance industry. We also obtained their views on the benefits and challenges experienced or expected by insurance companies as well as the (potential) benefits and challenges for consumers. We conducted more than 35 interviews with representatives of regulatory organizations, including the Federal Insurance Office; National Association of Insurance Commissioners (NAIC); state insurance regulators in Arizona, California, Connecticut, and Michigan; and the National Council of Insurance Legislators. We also interviewed three academics, representatives of one consumer group, 13 traditional insurance and reinsurance providers and industry associations, two actuarial professional associations, four consulting groups, two law firms in the field, and seven insurtech firms. We identified potential interviewees by conducting internet research, reviewing literature search results, and reviewing recommended interviewees from our initial interviews. We selected interviewees based on their relevance to the scope of our review. Based on our literature review and interviews with stakeholders, we identified seven recently used and emerging technologies in the insurance industry: (1) mobile applications; (2) artificial intelligence (AI), algorithms, and machine learning; (3) big data; (4) internet of things; (5) blockchain/ distributed ledger technology and smart contracts; (6) drones; and (7) telematics. To obtain information about challenges that could affect the adoption of innovative technologies, we identified relevant laws and regulations pertaining to insurance technology innovation by reviewing prior GAO reports on financial regulation, interviewing regulators and industry participants, and analyzing relevant documents, including relevant NAIC model laws and state laws and regulations. We also conducted semi- structured interviews with and reviewed documents provided by the key stakeholders identified in the first objective to identify (1) any actions NAIC and selected state insurance regulators were taking on new insurance technologies, and what challenges, if any, insurers’ use of new technologies creates for regulators; (2) what is known about the impact of any actions taken by NAIC and state insurance regulators on innovation among insurance companies and on consumer protection; and (3) stakeholders’ views on the applicability of foreign regulatory actions for U.S. insurtech markets. We conducted this performance audit from April 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Patrick Ward (Assistant Director), Deena Richart (Analyst in Charge), Gina Hoover, Hadley Nobles, Akiko Ohnuma, and Tyler Spunaugle made key contributions to this report. Also contributing were Emei W. Li, Barbara Roesmann, Jena Y. Sinkfield, Frank Todisco, and Helen Tulloch.", "summary": "The innovative use of technology by insurance companies (insurtech) is growing and offers the potential to improve customer experiences while also lowering insurer costs. Some stakeholders have raised questions about how certain uses of insurtech could create both risks for consumers and challenges for regulators, and whether some challenges might slow technological innovation in the insurance sector. GAO was asked to provide information on insurtech activities in the property/casualty and life insurance sectors. This report (1) identifies new uses of technologies and potential benefits and challenges for insurers and their customers; and (2) discusses what stakeholders identified as key challenges that could affect the adoption of new technologies, and actions taken to address those challenges. GAO reviewed available literature; analyzed relevant laws and regulations; and conducted interviews with more than 35 stakeholders, including federal and state regulators, technology companies, insurers, and consumer groups (selected based on literature reviews and recommendations, and for relevance to the scope of GAO's review). GAO is not making any recommendations in this report. Insurtech companies (recently established companies bringing technology-enabled innovations to the insurance industry) as well as established insurers have begun to use technologies, including artificial intelligence (AI) and mobile applications, in an attempt to improve risk assessment and enhance customer experiences. For example: Consumers can purchase insurance products specifically tailored to their situation and needs, such as renters or auto insurance that can be turned on and off as needed using a mobile app. Some insurers have begun to use nontraditional data (such as from social media) to analyze policyholder risk, and use AI and complex algorithms to reduce costs by automating information gathering and risk assessment. However, implementing these technologies can create potential challenges for insurers and risks for consumers, including the following: The use of AI to create underwriting models for determining premium rates can make it challenging for insurers to ensure that factors prohibited by regulation (such as race) are not used in models. Such models are often developed by data scientists who, unlike actuaries, may not fully understand insurance-specific requirements. Insurer collection and use of consumer data not provided by the consumer raise questions about data accuracy, privacy, and ownership. Some insurtechs sell coverage through nonadmitted insurers. As we have previously reported, nonadmitted insurers—unlike traditional insurers—are not required to be licensed in each state in which they sell insurance, and receive less regulatory oversight of their policies and rates. Also, if nonadmitted insurers became insolvent, state guaranty funds would not be available to help pay policyholder claims. Stakeholders with whom GAO spoke identified challenges they said might affect adoption of innovative technologies. These include paper-based documentation requirements that do not accommodate online insurance transactions, and challenges for regulators in the evaluation of complex rating models. The National Association of Insurance Commissioners (NAIC) and state regulators have initiated a number of actions designed to address such concerns. For example: State insurance regulators, through an NAIC task force, have been examining regulatory areas that may pose obstacles for innovation, such as requirements for paper documentation or signatures. NAIC issued draft best practices for states to use when reviewing complex rating models. NAIC adopted a model law that creates a legal framework for states to use to require insurance companies to operate cybersecurity programs and protect consumer data. Because many of these regulatory initiatives are still in development (or recently developed), the effect on innovation and consumer protection is unknown.", "document_type": "gao"}
{"report": "Counting the nation’s approximately 140 million households is an enormous undertaking requiring such essential logistics as the opening of hundreds of area offices to conduct essential field activities, recruiting and hiring hundreds of thousands of temporary workers to carry out those activities, and developing an approach to training those employees. To help control costs while maintaining accuracy, the Bureau is making significant changes in each of these areas compared to prior decennials. According to Bureau planning documents, the Bureau intends to use technology to efficiently and effectively manage the 2020 Census fieldwork, and as a result, reduce the staffing, infrastructure, and brick- and-mortar footprint required for the 2020 Census. The three main components of the reengineered field operations are increased use of technology, increased management and staff productivity, and streamlined office and staffing structure. The Bureau’s 2020 Operational Plan states that 2020 Census field operations will rely heavily on automation. For example, the Bureau plans to provide most listers—temporary staff who verify and update addresses and maps—and enumerators— temporary staff who follow up with households that do not respond to the census questionnaire—with the capability to receive work assignments and perform all administrative and data collection tasks directly from a mobile device allowing them to work remotely. Supervisors will also be able to work remotely from the field and communicate with their staff via these devices—precluding them from needing access to a nearby local office. The Bureau’s 2020 Operational Plan states that these enhanced capabilities will significantly reduce the number of offices required to support 2020 Census fieldwork. In the 2010 Census, the Bureau established 12 RCCs and nearly 500 ACOs. The new design for the 2020 Census field operations includes six RCCs with 248 ACOs. Those 248 will be split into two waves, with 39 of the offices opening for Wave 1 by March 2019 to support early census operations such as in-field address canvassing, and the remaining 209 opening for Wave 2 by September 2019. Recruiting enough workers to fill the hundreds of thousands of temporary positions needed to conduct the 2020 Census is a tremendous challenge. According to Bureau plans before hiring begins, the Bureau needs to assemble an applicant pool in the millions. For the decennial census, Bureau plans indicate the Bureau will need a large and diverse workforce to ensure the accuracy of its maps and address list, and to follow up by phone or in person with households that do not respond to the questionnaire. Making these efforts even more difficult are external factors beyond the Bureau’s control, such as low unemployment rate, which can make it harder to recruit. According to Bureau plans, recruiting of potential employees will be conducted throughout the ACOs’ geographic area, based on projected operational workloads and staffing models developed for 2020 Census operations. Selected candidates will be invited to be fingerprinted and submit selected appointment paperwork prior to attending classroom training. The candidates will be sworn in and hired during the first day of training. The ACO staff model is as follows: one ACO Manager, one Lead Census Field Manager, one Administrative Manager, one Recruiting Manager, one Information Technology (IT) Manager, and Office Operations Supervisors, Clerks, and Recruiting Assistants. For data collection, it is: multiple Census Field Managers, Census Field Supervisors, and Enumerators; specific numbers based on workload; and supervisory ratios to be determined (see fig. 1). According to Bureau plans, the 2010 Census approach to training was predominantly instructor-led training with some hands-on training. This primarily consisted of instructors standing in front of a room of trainees and reading training materials to them from a prepared script. For 2020, the Bureau has developed training materials that use a blended training approach including instructor-led training, computer-based training, and hands-on training. This approach is intended to maximize trainee learning and on-the-job performance during the 2020 Census. According to the Bureau’s Detailed Operational Plan for the Field Infrastructure and Decennial Logistics Management Operations, it has developed training materials based on the lessons learned from previous censuses, such as the need to provide computer-based training. The Bureau’s Detailed Operational Plan for the Field Infrastructure and Decennial Logistics Management Operations also states that this innovation to training combines multiple modes of training delivery designed to maximize training outcomes for various types of learning styles: visual, auditory, and hands-on, blending online training methods, instructor-led classroom training, and on-the-job training or role-playing to prepare field staff to effectively fulfill their duties. Blended training is intended to: Provide a standardization of training, limiting the impact of instructor interpretation. Allow for easily updateable training materials in the case of errors or operational changes, minimizing the burden of errata materials. Provide automated assessment tools to enable a more consistent and reliable way to measure learner understanding of concepts. Provide post-training support through easily accessible online manuals and job aids. Training materials are designed to maximize self-paced learning. These accompanying training materials are developed to provide the most up-to- date methodologies for recruiting, onboarding, and training-the-trainer to carry out field data collection activities. For the 2020 Census, the Bureau plans to open 248 ACOs. Similar to the 2010 Census, the total number of ACOs for 2020 was derived from the projected workload for field operations based on the number of enumerators needed for nonresponse follow-up. The Bureau allotted a specific number of ACOs to each of its six regional offices. Regions then developed boundaries for the ACO based on seven mandatory criteria that are described in a program memorandum, including that every state have at least one ACO; federally-recognized American Indian areas and military bases (regardless of county, state, or regional boundaries) will be managed by only one ACO; and ACO areas of responsibility will not cross state boundaries (with the exception of Indian reservations and military bases). See figure 2 below for the location of the 248 offices. In addition to the criteria used to delineate boundaries for its ACOs, the Bureau also had requirements for the ACO leased space. These requirements, for example, included that the ACO have a certain amount of contiguous square footage depending on the ACO type, and that an ACO not be co-located in a building that also houses agencies with law enforcement responsibilities because of privacy and confidentiality concerns. The Bureau also designated an “area of consideration” for each of its ACOs. According to Bureau officials, the area of consideration, which is a smaller geographic range where they would like to house the office, was based on such factors as access to public transit, general centrality within the ACO work boundaries, and proximity to eating establishments. In some cases, the Bureau had to deviate from its requirements for leased space or initial area of consideration. The decision to deviate from requirements usually arose from a lack of viable options in the real-estate market coupled with the Bureau’s need to meet its time frames. According to RCC staff, any deviations from requirements were presented at weekly staff meetings and then subsequently approved by the Regional Director, and in some cases such as co-location with law enforcement Bureau Headquarters approval was needed. According to Bureau officials, co-location with law enforcement is sensitive because of concerns that census data may be shared with others. Census data are kept confidential for 72 years. However, Bureau officials told us either the law enforcement offices were deemed innocuous, for example, the office housed a public defender or the law enforcement offices operated undercover, whereby no one entering the building would have been aware of their presence. In another case, Bureau officials told us that the Philadelphia region was struggling to find space for its ACO in Frederick, Maryland. When the General Services Administration (GSA) proposed a space in Hagerstown, Maryland, 30 miles away, the Bureau accepted it, though it was outside the initial area of consideration. According to officials at the regional office, the Bureau saved time and money by using a readily available cost-effective option by choosing Hagerstown, Maryland. The Bureau also had to expand the area of consideration for more than 31 percent or 77 of its 248 ACOs. According to Bureau officials, designating an area of consideration was an iterative process based on market availability, and having to expand the area was often necessary to secure space (see table 1). In select cases, the Bureau co-located ACOs in the same building. For example, instead of having one office in North Philadelphia and one in South Philadelphia, Bureau officials in the Philadelphia Region Census Center agreed to accept space in the same building located within the boundaries of the South Philadelphia ACO. The Bureau hired staff for each ACO from the original designated areas and kept the two offices completely separated. Bureau officials provided documentation indicating that this compromise came with considerable cost savings. The Bureau also abandoned other planned requirements in a number of cases to secure space, such as access to loading docks, assigned parking, and freight elevators. When we reviewed selected ACO files at the regional offices to determine whether the files included support for when deviations from space requirements and initial areas of consideration were documented, we did not find documentation. Instead, documentation was in staff emails. Files included a checklist of documents required, such as the signed lease and design intent drawings; however, there was not a requirement that documentation of deviations from space requirements or initial areas of consideration be maintained. Bureau officials at the regional level said that all procedures for handling waivers and expansions of the area of consideration were driven by the RCCs as well as informal guidance that was not documented. Standards for Internal Control in the Federal Government calls for documentation and records to be properly managed and maintained. Based on our suggestion that the Bureau develop a procedure for documenting these deviations in ACO areas of consideration or requirements, Bureau officials sent an email requiring that staff keep documentation (electronic or paper) on deviations in ACO areas of consideration or requirements in the ACO’s lease file folders. In cases where decisions are made via telephone or email, Bureau officials asked staff to write notes and scan emails, and add them to the ACO files. Maintaining this documentation will help ensure the transparency and integrity of Bureau decision-making, and ensure the information is readily available. The Bureau experienced some early delays when regions were trying to find space and acquire leases. The Bureau attributed some of these delays to the use of the GSA’s Automated Advanced Acquisition Program (AAAP) process. This procurement process provides building owners and their authorized representatives with the opportunity to offer general purpose office space for lease to the federal government. The AAAP process accepts bids the first week of each monthly cycle. Then the remaining three weeks of the month are used to evaluate submitted offers and identify a potential lessor. According to GSA documents, in tight real estate markets, the first cycle did not always yield a suitable lessor due to lack of available inventory, and the short lease term the Bureau was seeking. Therefore, the Bureau had to wait three weeks until the start of the next cycle to re-open the bidding process. Bureau officials stated that during these 3 weeks, the Bureau regions would conduct additional market outreach and communicate outreach efforts with GSA to find a lessor. According to GSA, they agreed that too much time was elapsing in Wave I trying to receive offers without making any changes to the requirements or areas of consideration. To address this issue for Wave 2, the Bureau stated that GSA provided additional training to the Bureau’s regional staff, increased market outreach which included dedicated support from GSA’s national office, and the development of a strategy to use all of GSA’s tools, such as using GSA’s contract brokers in regions with the greatest number of Wave 2 ACOs. Bureau regional staff also told us they were able to meet leasing milestones in part because of flexibility in their requirements and in the areas of consideration. As of June 2019, there were signed leases for 247 of 248 offices. However, during our review, the Bureau reported that it had missed several construction (meaning renovations such as new electrical layouts, heating, ventilation, and air conditioning) and deployment deadlines. According to Bureau documents, for Wave 1 offices, nine of 39 offices had missed the February 28, 2019 deadline for having furniture and IT equipment; and for Wave 2 offices, 49 of 209 offices missed the February 20, 2019 deadline for having construction drawings complete. According to Bureau officials they are managing each of these delays on an office- by-office basis, and headquarters officials meet weekly with the RCCs to discuss the status of each office. They are also actively communicating with GSA on how to best work with the landlord to meet deadlines. Agency officials also indicated that the schedule deadlines for the later phases of construction allow for more time than may be necessary, allowing them to make up time lost from early delays. For example, at the Concord, New Hampshire ACO, the Bureau plans to make up lost time in construction with actions such as using a fence to divide two office areas instead of adding a wall, and using a “cage” for badging instead of constructing a separate room inside the space. As of June 3, 2019, 38 of 39 Wave 1 offices are ready for business. Seven of 209 Wave 2 offices are still working to finish the milestone of completing construction drawings, which had an original deadline of February 20, 2019. According to Bureau officials, the seven offices without completed construction drawings are being given priority attention by both GSA and the Bureau. We will continue to monitor the opening of ACOs in ongoing work. According to Bureau reporting documents, as of June 2019, the Bureau is exceeding its recruiting goals for early operations. This includes field staff for in-field address canvassing where census staff verify address and map information for housing units in selected areas of the country, office staff at the 39 Wave 1 ACOs, recruiting assistants, and partnership specialists. The Bureau had a goal of recruiting approximately 205,000 individuals for its 2020 early operations efforts by the end of June 2019, and plans to recruit between 2.4 million and 2.6 million applicants for all field operations. By comparison, in 2010, the Bureau recruited about 3.9 million applicants. As of June 17, 2019, the Bureau had processed job applications and assessments for approximately 428,000 applicants which represent about 208 percent of its roughly 205,000 recruiting goal. For the 2020 Census, the Bureau plans to hire nearly 400,000 temporary field staff from its applicant pool for two key operations: in-field address canvassing and nonresponse follow-up, where census staff visit households that do not return census forms to collect data in person. In 2010, the Bureau hired approximately 628,000 temporary workers to conduct the address canvassing and nonresponse follow-up field operations. Below is the recruiting and hiring timeline for the in-field address canvassing and nonresponse follow-up operations (see fig. 3). According to Bureau officials, they are recruiting and hiring fewer temporary staff in 2020 compared to 2010, in part, because automation has made field operations more efficient. For example, there is less paper to manage and process as daily payroll records and daily field work assignments are electronic. As a result, productivity has increased and mileage and labor costs have decreased because census field staff do not meet daily with their supervisors, as was the case in 2010. Moreover, the automation of assignment routing to housing units has optimized the time spent by enumerators driving to housing units. During the 2018 End- to-End Test, the Bureau found the productivity for in-field address canvassing had exceeded its goal at all three test sites (see table 2). The Bureau attributes these efficiencies to the automation of work assignments. For the 2020 Census, the Bureau plans to use some of the same strategies it used to recruit and hire all temporary workers as during the 2010 Census—because those strategies were successful—while also leveraging technology and social media. For example, according to the Bureau, the overarching strategy for hiring enumerators is to hire people who will work in the communities where they live. This strategy provides the Bureau with enumerators who are familiar with the areas where they will be working and who speak the languages of the local community. To recruit staff, recruiting assistants are to work with local partnership staff and use paid advertisements and earned media (e.g., publicity gained through promotional efforts, news reports, etc.). The Bureau plans to also continue to use its recruiting website, http://www.2020census.gov/jobs, which provides information about the various positions, local pay rates, application materials, and job qualifications. Moreover, Bureau officials stated that a diverse multilingual workforce is needed and that the Bureau has tailored its approach to that end. For example, the website includes Spanish language pages and recruitment materials (see fig. 4). Bureau documentation indicates that similar to 2010, the Bureau will continue to use waivers and hiring exemptions to enable well-qualified individuals to work on the 2020 Census who otherwise might not have applied for jobs, particularly in hard-to-recruit areas. These waivers allow the Bureau to temporarily hire federal retirees and individuals receiving public assistance without impacting their benefits, and to hire current federal employees without impacting their job status or salary. As of February 27, 2019, the Office of Personnel Management (OPM) had given the Bureau approval to hire 44 re-employed annuitants for the 2020 Census. The Bureau also had dual employment agreements with 28 federal agencies and commissions. For the 2010 Census, the Bureau had these agreements with a total of 81 federal agencies. To obtain waivers for individuals on public assistance, the Bureau is partnering with the Office of Management and Budget and working with Health and Human Services to obtain waivers for Temporary Assistance for Needy Families and Supplemental Nutrition Assistance Program recipients. The Bureau is also working with tribal governments to acquire similar waivers. In addition to these previously used strategies, the Bureau is planning to leverage technology in its recruiting strategy for 2020. This technology includes the Bureau-developed Response Outreach Area Mapper (ROAM) application, a publicly available online mapping tool that Bureau staff can use to better understand the sociodemographic makeup of their assigned areas. The Bureau plans to use ROAM to identify areas where recruiting could be hard and to develop recruitment strategies such as hiring staff with specific language skills. The new technology also includes the MOJO Recruiting Dashboard (also referred to as MOJO Recruit), which is software for Census recruiting personnel to plan and manage recruiting activities and track recruiting progress. For example, MOJO Recruit includes an interactive mapping feature which lets the Bureau plan recruiting activities and track recruiting status for each census tract. The map draws attention to areas that may be experiencing recruiting problems (see fig. 5). Red indicates areas where the Bureau is less than 50 percent of the way toward meeting its recruiting goal. Yellow indicates areas where the Bureau is 50 to 79 percent of the way toward meetings its goal. Green indicates areas where the Bureau is 80 percent or higher of the way toward meetings its goal. Bureau officials also stated that that they plan to increase the use of social media platforms such as Facebook, Twitter, and Instagram to promote and advertise 2020 Census job opportunities. For example, the Bureau’s 2020 Census Recruitment Toolkit includes social media guidelines, tips, sample posts, and sample email messages to assist recruiting staff in providing information about 2020 Census job opportunities. It also assists recruiting staff with responding to questions and concerns or directing people to the appropriate location for more information about jobs. For the 2020 Census, the Bureau revised its application and assessment process to ease the burden on job applicants and to better assist the Bureau in identifying qualified applicants. Job candidates are to apply and take a skill assessment online, as opposed to attending recruiting sessions in person and taking a written test. The Bureau has also streamlined both the application and assessment process by asking fewer questions and requiring only one assessment for all nonsupervisory positions. According to Bureau officials, the 2020 Census job application should take 10 minutes to complete, by comparison the 2010 Census job application took 30 minutes to complete. Moreover, for prior censuses, applicants had to complete one of two 45-minute assessments to determine the appropriate skill set for either working in the office or in the field. For 2020, OPM has approved the Bureau giving one assessment for all five short-term census positions: Recruiting Assistant, Clerk, Office Operations Supervisor, Enumerator, and Census Field Supervisor, thereby eliminating the need to give separate assessments for the office and field positions. Finally, for those considering a supervisor position, a separate supervisory assessment is required. For 2020, this consists of nine questions compared to 29 questions in 2010. According to Bureau officials, this supervisory assessment should take an additional 10 minutes to complete instead of 1 hour, as it did on 2010. For 2020, the Bureau has also changed the assessment questions it asks applicants from situational-judgment questions to biodata and personality questions. In making this decision, during the 2018 End-to-End Test, the Bureau asked situational-judgment questions in the assessment questionnaire, and then administered a set of biodata and personality questions after hiring. The Bureau conducted an analysis of both types of questions and concluded that the biodata and personality questions were a better predictor of job success. Bureau officials told us they will be evaluating their new job assessment processes for 2020, including the use of biodata. The Bureau has identified challenges that exist in some areas, such as: (1) delayed background checks; (2) low unemployment; and (3) language barriers. Employment with the Bureau is contingent upon successfully completing a background check. The Bureau found that the process for four positions (recruiting assistants, office operation supervisors, clerks, and partnership specialists) was taking longer than it expected. These positions require a full background check because employees will have access to the Bureau’s network, they will be issued expensive equipment (e.g., laptops and desktops), and their employment will likely last more than 6 months. For the full background checks, applicants must complete two security background forms—Standard Form 85: Questionnaire for Nonsensitive positions (SF85) through the Electronic Questionnaires for Investigations Processing system (e-QIP) and Optional Form 306: Declaration for Federal Employment (OF306)—and must have their fingerprints processed, in which the Federal Bureau of Investigations conducts a review for any prior arrest or convictions. Once completed, the forms are reviewed by the Census Investigative Services (CIS) where OPM-trained staff make either a favorable, unfavorable, or inconclusive precheck employment determination. According to Bureau officials, certain crimes, for example violent crimes, automatically exclude the applicant from further consideration. If the determination is inconclusive, then CIS is to send the form to the Office of Employee Relations to make a favorable or unfavorable determination. All favorable determinations are then sent to OPM for adjudication with a full background check (see fig. 6). According to Bureau officials, in December of 2018, they began to encounter a backlog of pre-employment background checks Bureau-wide as they began hiring some 800 recruiting assistants and about 1,970 office staff for the first wave of 39 ACO openings. As of March 21, 2019, Bureau officials told us that Bureau-wide there were 7,092 background clearances pending, of which, 4,900 were for field positions. In response to the backlog, Bureau leadership said it created a team to determine the cause of the backlog and started having weekly meetings to prioritize which job positions needed to be cleared first. Bureau officials stated that the delays arose, in part, because a significant number of applicants did not completely or correctly fill out the e-QIP form. This, they said, coupled with the increase in required pre- employment background checks, resulted in a growing backlog of clearances for which the Bureau did not have the resources to clear. In response, in February 2019, the Bureau began to bring on, through a combination of new hires and reassignments, about 130 temporary staff. New staff was assigned to either review the forms for accuracy and completeness prior to being submitted to the CIS office, or help the CIS offices conduct the pre-employment background checks. Additionally, Bureau officials told us that they meet weekly to reprioritize job positions for the clearance process. The CIS office is to process background checks for all Census employees requiring them, including decennial census field staff, decennial census contractors, and staff needed for nondecennial census surveys in headquarters and in the field. According to Bureau officials, the decennial census takes precedence and within the decennial census positions are also prioritized. For example, in January 2019, the 800 recruiting assistants were given priority and now the hiring of 1,501 partnership specialists has been given priority. Bureau officials told us that in December 2018 they were processing 110 background checks a week, and have set a goal that each CIS analyst process 25 pre-employment packages a week. There are 40 analysts on board, giving the Bureau the ability to process 1,000 pre-employment background check packages a week. Bureau officials also told us that they anticipate the clearance process for the positions of enumerator/lister and census field supervisor will not experience the same delays because these positions only require fingerprint processing, which is quicker. According to Bureau officials, these results can be made available within 3 hours. Moreover, although the Bureau has taken steps to address the backlog, the bulk of pre-employment background clearances has yet to be processed and Bureau officials told us that they remain concerned. In the coming months, the Bureau will need to conduct background checks for an additional 3,991 recruiting assistants and about 10,300 office staff for the remaining 209 offices. We will continue to monitor the backlog of background clearances through our ongoing work. Although the Bureau has exceeded its recruiting goals for early operations, recruiting a sufficient number of job applicants for the job of partnership specialist is a challenge. Bureau officials told us that a robust economy and low unemployment rate have resulted in a smaller pool of applicants for that position. For example, as part of its 2020 Census efforts, the Bureau had planned to hire 1,181 partnership specialists by May 1, 2019 and 1,501 partnership specialists by June 30, 2019, to help increase awareness and participation in the 2020 Census in minority communities and hard-to-reach populations. The Bureau did not meet its goal to hire 1,181 partnership specialists by May 1, 2019. To hire sufficient partnership staff, Bureau officials told us they have an “open and continuous” posting for partnership specialist positions instead of discrete individual job postings, and they are selecting two candidates from each certification list of qualified applicants. Moreover, Census leadership tracks the weekly progress of the partnership specialist positions. As of July 9, 2019, the Bureau’s latest biweekly reporting indicated that it had hired 813 partnership specialists as of June 22, 2019. Moreover, as of July 10, 2019 Bureau officials told us that another 830 applicants were waiting to have their background checks completed. According to Bureau officials hiring data are based on payroll dates generated biweekly, while background check data are tracked internally. Therefore, according to Bureau officials, more current hiring data were not available as of July 10, 2019 to indicate whether the Bureau had met its June 30 hiring goal. Hiring partnership specialists in a timely manner is key to the Bureau’s ability to carry out its planned outreach efforts, especially for hard-to- count communities. In addition, several RCC officials said the pay rate and the low unemployment rate in some ACO locations initially affected their ability to recruit well-qualified staff for office positions. Atlanta RCC officials stated it was challenging to recruit managers in the Gainesville, Florida, area. According to Bureau officials, the pay rate was too low and potential recruits were seeking employment elsewhere. The Bureau increased the managers’ pay rate to be more competitive for the area. Philadelphia RCC officials stated that in rural ACO locations the pay rate is lower and potential recruits would rather travel to the metro areas to get the higher pay rates offered there. The Denver RCC reported that low unemployment rates throughout the regions make recruiting difficult, and that Census enumerators jobs are not as competitive with many other wages offered in the region. The Los Angeles RCC reported having difficulty recruiting local applicants in high-cost areas like Beverly Hills, the San Francisco Bay Area, and Silicon Valley. Bureau headquarters officials acknowledge that some ACO locations have experienced some recruiting challenges, but said that the RCCs were ultimately able to fill the office positions. Headquarters officials stated that their pay rates either match or exceed the competitive pay rate in the majority of the ACO locations. According to Bureau headquarters officials, regional offices that may be experiencing challenges recruiting staff must demonstrate or prove that the pay rate for a specific ACO is causing difficulty recruiting. The Field Division is responsible for approving or denying the request to adjust pay. For the 2010 Census, the Bureau reported 124 requests for pay rate adjustments, of which 64 were approved. The Bureau stated that it will continue to monitor how low unemployment affects its ability to recruit and hire. The Bureau reports that the demographic and cultural makeup of the United States continues to increase in complexity, including a growing number of households and individuals whose proficiency in English is limited. Language barriers could make it difficult to enumerate these households, whose members may have varying levels of comfort with government involvement. Several RCC officials also mentioned that language barriers could impact their recruiting efforts: Both the Los Angeles and New York RCCs reported it is hard to recruit in immigrant communities where residents speak a foreign language or dialects, and often have no organizational infrastructure (such as associations of individuals of the same national origin, print news media, or radio). The New York RCC reported challenges in locating applicants who are bilingual in English and other languages such as Chinese, Russian, Arabic, Korean, Creole, Polish, Portuguese, Bengali, Urdu, Punjabi, Gujarati, Hindi, and Hebrew, as well as Yiddish and African languages. The Atlanta RCC reported challenges related to the diverse language needs (e.g., Spanish, Chinese, Vietnamese, Creole, Portuguese, etc.) in south and central Florida. The Chicago RCC reported recruiting outreach challenges in urban areas, including Chicago, Indianapolis, Detroit, Minneapolis/St. Paul, St. Louis, and Kansas City, that have higher minority and immigrant populations as well as in rural areas with increasing diversity. Bureau officials responded that later this fall, in preparation for their peak operations effort, they will begin to focus recruiting efforts on foreign language recruiting. Specifically, partnership and recruiting staff plan to work with partners and advertise jobs locally (at the grassroots level) in places where persons with these skills are likely to look to ensure they are meeting recruiting goals in those areas. For the 2020 Census, the Bureau is following its plans to use a blended training approach combining technology-assisted training with classroom instruction. According to Bureau planning documents, on the first day of in-person classroom training, the Bureau will provide orientation information and issue devices that trainees will use to conduct census operations. The Bureau plans to use local institutions such as schools, libraries, churches, and fire halls to host training. ACO staff are to coordinate the training location setup, device deliveries to training sites, and manage other logistics for large-scale field staff training. After the first day of training, field staff will spend the next 4 to 6 days (depending on the operation) completing at-home training online using their own personal device at their own pace. This training will include, for example, operation-specific skills, use of the data collection device (smart phone or tablet), and general field processes. Trainees who complete the online portion of the training program will return to the classroom to practice what they learned through role-playing, mock interviews, or live cases (for listing operations) facilitated by managers or supervisors. According to Bureau officials, employees will also have access to just-in- time training materials on their devices for use in the field. The Bureau encountered a number of challenges in implementing and testing its blended training approach, but is taking steps to mitigate those challenges. Specifically, during the 2018 End-to-End Test, the Bureau (1) experienced problems with the proper recording of online training scores for census staff, (2) was unable to test online training for one of its operations because the operation was added late, and (3) encountered challenges with census staff not always having access to the internet, which is required to complete the training. The 2018 End-to-End Test of address canvassing and nonresponse follow-up training revealed some technical challenges in using the Learning Management System. The Learning Management System is the online training system for the 2020 Census; it contains online training modules and tracks final assessment scores and training certifications. In February 2019, the Department of Commerce (Commerce) Office of the Inspector General (OIG) noted that during the address canvassing operation there was no final assessment scores recorded for 23 trained listers. The Bureau was also unable to provide documentation that another three lister trainees who failed the final assessment had been observed by their supervisor before being permitted to work. Bureau officials said they provided an action plan to the Commerce OIG in April 2019. According to Bureau officials, the action plan has not been finalized because they are incorporating changes to the action plan based on Commerce OIG comments. In December 2018, we reported that roughly 100 enumerator trainees in the nonresponse follow-up operation were unable to transmit their final test scores because the Learning Management System had an erroneous setting. According to Bureau officials, this problem delayed the start of unsupervised work for these otherwise-qualified enumerator trainees by an average of 2 days per trainee, and resulted in the attrition of some who were able to quickly find other work. Bureau officials reported that they have fixed the system setting. Moreover, according to Bureau officials, they have also developed an alternative means to certify training by incorporating the employee final assessment into the final day of classroom training. According to Bureau officials, Update Leave online training was not tested during the 2018 End-to-End Test due to the late addition of the operation to the 2020 Census design. Officials told us that the Update Leave operation was approved in May 2017, leaving just 10 months for the development team to create and implement software and the systems to support this field operation for the End-to-End Test. This left no time to develop online training that would be ready for the End-to-End Test in March 2018. Therefore, the Bureau classroom-trained headquarters staff instead of temporary field staff for the operation. According to the Bureau’s risk register, the utilization of Bureau headquarters staff did not properly simulate training conditions or staff characteristics in which new employees have no prior knowledge of census operations. Therefore, the 2018 End-to-End Test did not allow for proper training feedback or the capture of lessons learned with regard to temporary staff or the mode of training. According to Bureau officials, the Bureau plans to conduct scheduled dry runs of training in September 2019 to collect feedback and, if necessary, make changes to Update Leave-specific training. In June 2018, we reported that some listers had difficulty accessing the internet to take online training for address canvassing. According to the Bureau, in addition to the Bureau-provided laptop, listers also needed a personal home computer or laptop and internet access at their home to complete the training. However, while the Bureau reported that listers had access to a personal computer to complete the training, we found some listers did not have access to the internet at their home and had to find workarounds to access the training. We recommended that the Bureau finalize plans for alternate training locations in areas where internet access is a barrier to completing training. The Bureau took action and in March 2019 finalized its plans for identifying alternate training locations in areas where internet access is a barrier to completing training. Specifically, Bureau officials told us that in areas of known low connectivity rates, regional staff will identify sites that trainees can access to complete online components of the training. In addition, the Bureau provided us with a training module for identifying training field staff locations that emphasized training sites need to be located in areas with a good cellular connection and also have access to the internet. Effective training can enhance the Bureau’s ability to attract and retain employees with the skills and competencies needed to conduct the 2020 Census. Our Guide for Assessing Strategic Training and Development Efforts in the Federal Government describes components for developing effective training in the federal government. Our strategic training guide identifies four phases of the training—planning, design/development, implementation, and evaluation. We assessed the Bureau’s training approach and found that it generally aligned with selected leading practices. This report includes the design/development and evaluation phases of training. We did not assess the implementation phase because field staff training had not yet begun during our audit, and we did not assess the planning phase because practices in that phase are more applicable to agency-wide rather than program-specific training development. The design/development phase involves identifying specific training and development initiatives that the agency will use, along with other strategies, to improve individual and agency performance. According to the guide, well-designed training and development programs are linked to agency goals and to the organizational, occupational, and individual skills and competencies needed for the agency to perform effectively. Moreover, in response to emerging demands and the increasing availability of new technologies, agencies, including the Bureau for the 2020 Census, are faced with the challenge of choosing the optimal mix for the specific purpose and situation from a wide range of mechanisms, including classroom and online learning as well as structured on-the-job experiences (see fig. 7). In developing its training approach we found the Bureau met all five selected leading practices related to design/development. Specifically, Bureau training aligned with achieving results for the Bureau’s re- engineered field operations. Specifically, the Bureau has a formal online training program that uses the Learning Management System as a control mechanism to provide and record training results for all 2020 Census field staff who take online training. The Bureau’s training program is integrated with other strategies to improve performance such as building team relationships. For example, the training includes modules for supervisors that focus on guiding and motivating employees, communicating effectively, and resolving conduct issues. To ensure the training is properly integrated with device issuance, for larger scale operations, the Bureau plans to stagger training sessions to help ensure there is the necessary support during the first day of training when census field staff receive their devices. The Bureau also plans to use different training delivery mechanisms. For example, the Bureau will use a blended training approach which includes a mix of computer-based and instructor-led classroom training. The Bureau has measures of effectiveness in its course design. The Bureau relied on an in-house training development team that worked with the data collection operations staff to develop learning objectives. We found that that the Bureau has procedures to incorporate feedback. Specifically, the Bureau incorporated lessons learned from previous census tests, such as the refinement of procedures for reassigning work in the field and emphasizing the importance of knocking on doors to find a proxy respondent during the nonresponse follow-up operation. Finally, the Bureau’s training documents contained goals for achieving results for its new training approach. Specifically, the Operational Assessment Study Plan for Recruiting, Onboarding, and Training for the 2018 End-to-End Test contained the following measures of success for training—reduce cost and increase efficiency over what was reported in 2010. In developing its evaluation phase for training, the Bureau met five of six selected leading practices and partially met one leading practice. The evaluation phase involves assessing the extent to which training and development efforts contribute to improved performance and results. We have previously found that it is increasingly important for agencies to be able to evaluate their training and development programs, and demonstrate how these efforts help develop employees and improve the agencies’ performance (see fig. 8). Overall, we found that the Bureau has a robust evaluation plan for the 2020 Census that gathers data from multiple sources. For example, The Bureau has a plan to evaluate the effectiveness of training for the 2020 Census. Specifically, operational and assessment study plans set priorities for evaluations and cover the methods, timing, and responsibilities for data collection, including assessment questions, metrics, data sources and expected delivery dates, and division responsibilities. The Bureau has an analytical approach to assess training programs. For example, the Field Decennial Data Collection Training Branch has developed three separate training evaluation surveys which will be administered to field staff through the Learning Management System. The three evaluations provide training feedback after the completion of the online training; after the completion of the classroom training; and near the completion of the operation. According to the Bureau, these assessments will help determine the effectiveness of training. The Bureau incorporated evaluation feedback into planning and design of training. For example, the Bureau held debrief sessions with census workers during the 2018 End-to-End Test and told us they were also incorporating recommendations made by a training vendor. Feedback from the 2018 End-to-End Test is being used to inform training for the 2020 Census. The Bureau incorporates different perspectives in assessing the impact of training. Bureau officials stated that they incorporated feedback from a variety of stakeholders when evaluating the effectiveness of its training during testing, including participant debriefs and evaluations from vendors. As previously discussed, the Bureau used three different surveys at different points in time to evaluate training, and relied on debrief sessions with census managers and staff in the field. Bureau officials said they considered the training methods of another organization. For example, Bureau officials told us they used training vendors that followed requirements, including e-learning content developed by the Department of Defense. However, we found that the Bureau does not have performance goals or measures for training in its corresponding study plan for the 2020 Census. Specifically, we found that in the Detailed Operational Plan for the Field Infrastructure and Decennial Logistics Management Operations for the 2020 Census, the Bureau had planned to include the following success measures: Process Measures that indicate how well the process works, typically including measures related to completion dates, rates, and productivity rates. Cost Measures that drive the cost of the operation and comparisons of actual costs to planned budgets. Costs can include workload as well as different types of resource costs. Quality Measures, such as, the results of the operation, typically including rework rates, and error rates. However, according to Bureau officials they decided not to include the measures from the study plan for training because the study plan was intended to provide descriptive information about operations rather than evaluate them. We have previously reported that a fundamental element in an organization’s efforts to manage for results is its ability to set meaningful goals for performance and to measure progress toward those goals. Thus, without specific performance goals and measures for its new blended training approach that considers cost and benefits when compared to 2010, the Bureau will not be able to determine whether its blended training approach reduced costs or increased efficiency. Moreover, not having goals and measures in place could inhibit the Bureau’s ability to develop meaningful lessons learned from the 2020 Census. Bureau officials agreed and stated they will consider including goals and measures on cost and efficiency in its plans; however, the Bureau has not yet provided us with documentation to reflect the goals and measures it will use to evaluate training, and has no time frame for doing so. Training for in-field address canvassing operation will begin in July 2019. Having performance goals and measures will help the Bureau assess the impact of its new training approach on cost, quality, and resources expended. Successfully carrying out the thousands of activities needed to complete an accurate, cost-effective head count on schedule is an enormous and challenging task. However, for those activities we examined, the Bureau appears to be positioned to carry them out as planned, if implemented properly. While Bureau officials acknowledged there were some early delays when regions were trying to find office space and acquire leases, they said that the deadlines for the later phases of construction allow extra time—giving them a chance to make up lost time. Regarding recruiting and hiring, the Bureau was exceeding its recruiting goals for early operations, but identified challenges in areas such as promptly completing background checks, hiring in a time of low unemployment, and overcoming language barriers. Moreover, although the Bureau has exceeded its recruiting goal for early operations, recruiting a sufficient number of job applicants for partnership specialist is a challenge. The Bureau’s continued response to and management of these challenges will be important as it begins recruiting for its peak operation efforts later this fall. The Bureau has generally followed its training plans for 2020, but has opportunities to improve its ability to evaluate training efforts. The Bureau notes that the blended training approach is intended to maximize trainee learning and on the job performance during the 2020 Census. However, 2020 Census documents do not contain performance goals or measures for determining the cost and benefits of the training when compared to 2010. Revising plans to include goals and measures will better position the Bureau to determine how its blended training approach will impact the cost, quality, and resources expended on the 2020 Census. We recommend that the Secretary of Commerce direct the U.S. Census Bureau to revise plans to include goals and measures for assessing the cost and benefits of the Bureau’s new blended training approach. These measures might include, but are not limited to, measures of cost, quality, and resources associated with training when compared to 2010. (Recommendation 1) We provided a draft of this report to the Secretary of Commerce. In its written comments, reproduced in appendix II, the Department of Commerce agreed with our findings and recommendation and said it would develop an action plan to address our recommendation. The Census Bureau also provided technical comments, which we incorporated. We are sending copies of this report to the Secretary of Commerce, the Under Secretary of Economic Affairs, the Director of the U.S. Census Bureau, and interested congressional committees. The report also is available at no charge on GAO’s website at http://www.gao.gov. If you have any questions about this report please contact me at (202) 512-2757 or goldenkoffr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. This report assesses the extent to which the Census Bureau (Bureau) is following its plans for space acquisition, recruiting and hiring, and training. For all of our objectives, we reviewed current Bureau planning documents and schedules, and interviewed Bureau officials including officials at the Bureau’s six regional offices. To assess the Bureau’s progress in opening area census offices (ACO), we obtained and reviewed current Bureau leasing agreement information and construction (meaning renovations such as new electrical layouts, heating, ventilation, and air conditioning) and deployment information. We also gathered information on the General Services Administration’s role in obtaining office space. To determine whether the Bureau is on track, we compared the current status of opening, construction, and deployment of ACOs to the Bureau’s plans, schedules, and timelines, and identified differences for follow-up with Bureau officials. We also reviewed a randomly selected nongeneralizable sample of ACO files at the Philadelphia RCC to determine whether justification was included when changes to ACO locations occurred. To determine the extent to which the Bureau is following its field hiring and recruiting strategy for the 2020 Census, we reviewed Bureau documentation regarding its strategy for recruiting and hiring temporary field staff for the 2020 Census. We also reviewed output and analysis from relevant Bureau human resources systems/databases, such as MOJO Recruit. We interviewed Bureau officials in both headquarters and the field who are knowledgeable about and responsible for recruiting and hiring temporary field staff to determine the extent to which the Bureau is meeting its recruiting and hiring goals, to describe their perspectives on any challenges facing the 2020 Census, and to understand the Bureau’s actions to mitigate any challenges. To understand changes from 2010, we compared the 2010 Census recruiting and hiring plans to those of the 2020 Census to determine differences, and interviewed Bureau officials to discuss what drove these changes. Finally, to determine the extent to which the Bureau has followed its plans for training field staff, and whether this training approach is consistent with selected leading practices, we examined relevant documents and interviewed Bureau officials to determine the Bureau’s planned approach for training, lessons learned from prior Census tests, the extent to which the Bureau is incorporating lessons learned as a result of its own testing, and what changes to training need to be made before the start of 2020 field operations. Additionally, we interviewed Bureau officials responsible for developing training curriculum to understand how training was developed (e.g. what courses to develop, challenges to using technology, etc.). We also reviewed federal guidance and our prior reports, and selected 11 leading practices from GAO’s Guide for Assessing Strategic Training and Development Efforts in the Federal Government (GAO-04-546G) as leading practices for training. Our strategic training guide identifies four phases of the training development process (planning/analysis, design/development, implementation, and evaluation). We assessed the approach against leading practices in two of these phases: design/development and evaluation. We did not assess the implementation phase because field staff training for the 2020 Census had not yet begun during our audit, and we did not assess the planning/analysis phase because practices in that phase are more applicable to agency-wide rather than program-specific training development, and focus on full-time permanent employees rather than temporary employees. Moreover, within the design/development phase and evaluation phase, we did not assess all best practices because some of those best practices were also more applicable to agency-wide rather than program-specific training development, or we had already evaluated such practices as cost. Moreover, this report primarily focuses on training for the address canvassing and nonresponse follow-up operations. We then compared the Bureau’s training approach to those leading practices and identified practices being followed and any differences. We conducted this performance audit from August 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Other key contributors to this report include Lisa Pearson, Assistant Director; Timothy Wexler, Analyst-in-Charge; Mark Abraham; Michael Bechetti; Jessica Blackband; James Cook; Rob Gebhart; Kerstin Hudon; Kayla Robinson; and Cynthia Saunders.", "summary": "The decennial census is a crucial, constitutionally mandated activity with immutable deadlines. To meet these statutory deadlines, the Bureau carries out thousands of activities that need to be successfully completed on schedule for an accurate, cost-effective head count. These activities include opening area census offices, recruiting and hiring a large temporary workforce, and training that workforce. GAO was asked to review the Bureau's plans for critical logistical support activities. This report (1) assesses the Bureau's progress in opening area census offices; (2) determines the extent to which the Bureau is following its field hiring and recruiting strategy for the 2020 Census; and (3) determines the extent to which the Bureau has followed its plans for training field staff, and whether this training approach is consistent with selected leading practices. To assess the extent to which the Bureau is following its plans for opening area census offices, recruiting and hiring, and training, GAO reviewed current Bureau planning documents and schedules, and interviewed Bureau officials, including officials at the Bureau's six regional offices. GAO used its guide to training ( GAO-04-546G ) as criteria for selected leading practices. To help control the cost of the 2020 Census while maintaining accuracy, the Census Bureau (Bureau) is making significant changes in three areas—office space, recruiting and hiring, and training—compared to prior decennials. The Bureau is reducing its use of office space, hiring fewer census field staff, and adopting a blended training approach of instructor-led, computer-based, and hands-on training (see figure). GAO found that the the Bureau generally appears to be positioned to carry out these activities as planned, if implemented properly. Opening offices. While the Bureau experienced early delays when regions were trying to find office space and acquire leases, Bureau officials said that the deadlines for the later phases of renovations will allow them to make up time lost. As of June 2019, there were signed leases for 247 of 248 offices. Recruiting and hiring. As of June 2019, the Bureau was exceeding its recruiting goals for early operations, but identified challenges in areas such as completing background checks and hiring during low unemployment, especially for partnership specialist positions. GAO will continue to monitor these challenges, as recruiting and hiring for the census continues. Training. The Bureau generally followed its training plans for 2020 and generally followed selected leading practices for its training approach. However, GAO found that the Bureau does not have goals and performance measures for evaluating its new training approach. Without goals and performance measures the Bureau will not be able to accurately assess the cost and benefits of its new training approach. The Secretary of Commerce should direct the U.S. Census Bureau to revise plans to include goals and performance measures for evaluating its new training approach. The Department of Commerce agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "In 2017, three sequential hurricanes—Harvey, Irma, and Maria—created an unprecedented demand for federal disaster response and recovery resources. According to the Federal Emergency Management Agency (FEMA), these hurricanes ranked among the top five costliest on record, costing $125 billion (Harvey); $90 billion (Maria); and $50 billion (Irma). As a result of these storms, Florida, Texas, and Puerto Rico faced hardships, including devastation to infrastructure, such as highways and bridges. The island of Puerto Rico in particular was severely affected, which created multiple challenges for federal response efforts. Specifically, within a 2-week period Puerto Rico was hit by both hurricanes Irma and Maria, resulting in power outages that lasted up to 11 months and the need for commodities, such as food and water, and requiring one of the largest recovery efforts in history. The federal response was complicated by several factors, including the remoteness of the island, limited local preparedness, outdated infrastructure, and workforce capacity constraints. The Emergency Relief Program provides assistance to repair or reconstruct highways and bridges on federal-aid highways and roads and bridges on federally owned public lands that have sustained serious damage from natural disasters or catastrophic failures. FEMA is responsible for providing funds to repair and replace roadways damaged as a result of disasters that are not eligible for federal-aid highway funding. For natural disasters or other events to be eligible for emergency relief funding, the President must declare the event to be an “emergency” or a “major disaster” under the Robert T. Stafford Disaster Relief and Emergency Assistance Act, or the governor must declare an emergency with the concurrence of the Secretary of Transportation. Damage to highways must be severe, occur over a wide area, and result in unusually high expenses to the highway agency. Congress has provided funds for highway emergency relief since at least 1938 and, since 1972, has authorized $100 million annually in “contract authority” for the Emergency Relief Program to be paid from the Highway Trust Fund. Accordingly, FHWA may obligate up to $100 million of funds from the Highway Trust Fund in any one fiscal year for the program. Congress also regularly provides funds to the Emergency Relief Program from general revenues through supplemental appropriations. Most recently, Congress passed the Bipartisan Budget Act of 2018 in February 2018, and the Additional Supplemental Appropriations for Disaster Relief Act, 2019 in June 2019, which included more than $3 billion for the FHWA Emergency Relief Program to repair damages caused by a number of natural disasters. According to FHWA officials, these funds will be used to address damaged related to the 2017 hurricanes. FHWA’s Emergency Relief Program regulations further define policies for the program and the eligibility requirements for selecting projects. These regulations state that emergency relief funds are not intended to correct preexisting deficiencies or duplicate assistance available under another federal program or compensation from insurance or other sources. Emergency relief projects are to be promptly constructed, and construction funds must be obligated within two years (i.e., by the end of the second fiscal year following the disaster) unless suitable justification is provided to FHWA. Emergency relief regulations specify the activities that emergency relief funds may be used for as well as those activities they may not be used for, such as reconstruction of facilities affected by long-term, predictable developing situations or deficient bridges scheduled for replacement with other funds. Because the statute and its regulations are, by necessity, fairly broad, FHWA publishes guidance to further assist the agency in administering the Emergency Relief Program. The Emergency Relief Manual, updated in 2013, is a guide for FHWA and state and local agency personnel for requesting, obtaining, and administering emergency relief funds. The manual provides additional information and examples of the types of activities and projects that are both eligible and ineligible for funding, the process for states to apply for emergency relief funding, and the documents and reports that are required to be prepared. FHWA’s Emergency Relief Order, issued in 2016, further defines the application and review process and the roles and responsibilities of FHWA and state personnel. As with other federal-aid highway programs, the Emergency Relief Program is a partnership in which states plan and execute projects to complete necessary repairs, and FHWA provides assistance to states in applying for funds and conducts oversight to determine eligibility and ensure that federal requirements are met. States and territories are required to conduct damage inspections, submit documentation to their respective FHWA division office to determine if repairs are eligible for federal funds, enter into project agreements, and complete final project inspections. The FHWA division office is responsible for reviewing damage inspections to determine whether proposed projects are eligible for emergency relief funds. FHWA headquarters officials use the information collected from these inspections to allocate funds to each state or territory for particular events; division offices obligate those funds and ultimately reimburses the states for allowable expenses. The Emergency Relief Program’s authorizing statute and FHWA’s regulations and guidance distinguish between federal share payable for emergency and permanent repairs. Specifically, according to FHWA regulations, emergency repairs are undertaken during or immediately after a disaster to restore essential traffic, minimize the extent of damage, or protect the remaining facilities. Emergency repairs are eligible to receive 100 percent federal reimbursement if they are accomplished within 180 days of the disaster. By statute, this deadline may be extended taking into consideration any delay in the ability of the state to access damaged facilities to evaluate damage and the cost of repair. FHWA and federal regulations also state that emergency repairs can be completed by state and local maintenance workforces, and qualify for categorical exclusions from the National Environmental and Policy Act’s (NEPA) requirements. FHWA’s Emergency Relief Manual further characterizes emergency repairs as repairs that can be completed relatively quickly, may be temporary in nature, and typically require little preliminary engineering or design effort, e.g., erecting barricades and detour signs. States and local transportation agencies may begin emergency repairs without prior FHWA authorization. Permanent repairs are undertaken after the occurrence of a disaster to restore the highway to its pre-disaster conditions. Permanent repairs receive a federal share, between 80 and 90 percent, depending on the type of roadway being repaired. However, in response to the level of devastation in Puerto Rico, Congress provided a 100 percent federal share for all emergency relief projects, including permanent repairs, necessary to address damage caused by hurricanes Irma and Maria in Puerto Rico. FHWA’s regulations state that permanent repairs are to be done through a competitively bid contract, unless the state demonstrates that another method is more cost effective (e.g., the use of abbreviated plans or a shortened advertisement period). In addition, many, but not all, permanent repairs meet the criteria for categorical exclusions from NEPA’s requirements. FHWA’s Emergency Relief Manual indicates that typically permanent repairs (1) should have obligated funds for construction within 2 years, (2) require the development of plans, specifications, and estimates, and (3) must receive prior FHWA authorization. Our prior work has raised concerns about FHWA’s management and oversight of the Emergency Relief Program. In 2007 we reported on the expanding scope of eligible activities funded by the Emergency Relief Program over time, resulting in projects that went beyond the original intent of the program. We recommended to FHWA and suggested that Congress consider tightening the program’s eligibility standards, but this recommendation has not been implemented and FHWA does not plan to do so. In 2012, we raised concerns about FHWA’s partnership relationship with the states, particularly its oversight of the Emergency Relief Program, which we first reported in November 2011. For example, we were unable to determine the basis of FHWA’s eligibility decisions on 81 emergency relief projects representing $193 million in federal funds because of missing or incomplete documentation. In addition, we identified cases where FHWA showed a lack of independence in decisions, placing its partners’ interests above federal interests. For example, FHWA allowed two states to retain unused Emergency Relief Program allocations to fund new emergencies, despite FHWA’s policy that these funds are made available to other states with potentially higher- priority emergencies. We concluded that while FHWA’s partnership relationship with the states yields benefits such as proactively identifying issues before they become problems, it also poses risks. Thus we recommended that FHWA develop a strategy to mitigate these risks. In March 2014, FHWA announced it had established an enhanced risk- based oversight approach that, while not targeting the specific risks we identified related to state partnerships, addressed the intent of our recommendation to increase transparency and consistency. Following hurricanes Harvey, Irma, and Maria, state and local officials prepared damage assessments that identified more than 2,500 projects eligible for emergency relief funds costing approximately $1 billion. Projects range in size and cost from replacing signage and traffic signals to multi-million dollar bridge and highway repairs (see fig. 1). Following a number of natural disasters in 2017—including hurricanes Harvey, Irma, and Maria—Congress appropriated more than $1 billion to the Emergency Relief Program in February 2018 to help states repair and rebuild federal-aid highways. As of September 2019, FHWA has allocated $634 million to repair hurricane-related damage in Florida, Texas, and Puerto Rico. Specifically, immediately following the hurricanes in August, September, and November 2017 FHWA allocated $122.5 million in quick release funding to Florida, Texas, and Puerto Rico. In April 2018, FHWA allocated an additional $242 million to Florida, Puerto Rico, and Texas. Further, on February 6, 2019 FHWA allocated $130 million more to Puerto Rico for damages caused by hurricanes Irma and Maria (see fig. 2). FHWA subsequently de-allocated $69 million from Florida on February 27, 2019, because state officials determined the funds were no longer necessary for hurricane-related repairs. Most recently, in September 2019, FHWA allocated an additional $208 million to Puerto Rico. While the estimated repair costs exceed the amount of funds allocated by FHWA, officials stated that additional emergency relief funds are allocated and reimbursed approximately every 6 months and states and territories will be reimbursed for all eligible expenses related to hurricanes Harvey, Irma, and Maria as they are completed. These funding decisions are to be made as FHWA continues to review and approve projects and Congress appropriates additional funds. As we have noted in prior work, the $100 million in annual authorized funding has not been enough to meet the needs of the program. Therefore, states have relied on supplemental appropriations to fund repairs caused by natural disasters and catastrophic events. We identified a number of cases in which FHWA did not document decisions to classify emergency relief projects as emergency repairs (those necessary to restore essential traffic, undertaken during or immediately after a disaster and generally accomplished within 180 days) as opposed to permanent repairs (those undertaken to restore a facility to pre-disaster conditions). Specifically, 22 out of 25 emergency repair projects we reviewed—which account for approximately $50 million in emergency relief funds—did not include a documented justification for classifying repairs as an emergency repair instead of a permanent repair. In addition, out of approximately 1,200 eligible projects in Puerto Rico, FHWA officials reported undertaking 34 more than 180 days after the hurricanes and continuing to classify them as emergency repairs without documenting the basis for doing so. Without documentation it is not possible to definitively determine the justification for why projects were classified as emergency repairs and we identified at least three projects that may have been inappropriately classified because they (1) may not have been necessary to restore essential traffic, or (2) were not undertaken during or immediately after the disaster. For example: The Lynchburg Ferry ($10.7 million project in Texas). This project rebuilt the ferry docks and landings, which are used to transport up to 10 passenger vehicles at a time across the Houston Ship Channel (1,100 feet). FHWA classified the project as an emergency repair to restore essential traffic but did not document the basis for this decision. When asked, FHWA officials from the Texas Division stated that engineers used their professional judgment to determine that the ferry route provided essential traffic. It is not clear, however, that the ferry was necessary to restore traffic as several alternative routes were available immediately following the disaster on existing highways that service the same locations and typically result in faster travel times than the ferry (see fig. 3). According to officials, engineers did not assess these alternative routes and there is no requirement for them to do so. This project was a significant commitment of emergency relief funds, representing approximately 11 percent of the emergency relief funding Texas received in the aftermath of Hurricane Harvey. Because the project was classified as an emergency repair, Texas was permitted to use a non-competitive bidding process to solicit and hire contractors to complete the work, instead of a competitive bidding process designed to achieve the best possible price and quality of work. The project was completed within the required 180 day time frame required to receive 100 percent federal reimbursement. FHWA’s oversight of this project raises issues we cited in past work concerning its partnership with the states, namely putting the partner’s interest above federal interests. Had FHWA classified this project as a permanent repair instead of an emergency repair, state and local agencies would have been responsible for paying approximately $2.1 million in matching funds on the $10.7 million project. Moreover, prior to the hurricane, the ferry docks and landings were in poor condition and local officials were in the initial stages of planning a project to replace it, including hiring a consultant to identify potential sources of federal funds. Because substantive planning and design work had not yet been completed, this project was eligible for emergency relief funds, which, according to officials, resulted in a new, state-of-the-art facility. Ciales Bridge ($4.9 million project in Puerto Rico). This project will install a temporary 80 meter long bridge over the Rio Grande de Manati River. FHWA classified this project an emergency repair to restore essential traffic and extended the project beyond 180 days but did not document the basis for either decision, as described below. FHWA officials said that they were not aware of another route to carry essential traffic at the time they approved the emergency repair. However, we identified an alternative route on a nearby roadway that uses another bridge less than a mile away. When we asked officials about this nearby route, they said that it is not sufficient for essential traffic, because it is too narrow to safely accommodate two-way traffic, has load limitations, and lacks lighting and pavement markings. Officials stated that the temporary bridge was necessary to quickly restore essential traffic until a new permanent bridge could be built. However, construction on the temporary bridge is not planned for completion until October 2019—more than 2 years after Hurricane Maria hit, raising questions about whether an emergency situation exists and the project is needed to quickly restore essential traffic. FHWA also continued to classify this project as an emergency repair even though the contract for the project was not signed within 180 days after the emergency occurred and FHWA did not document the rationale for doing so. By statute, emergency repair projects must be accomplished within 180 days to receive a 100 percent federal share, but may be extended taking into consideration any delay in the ability of the state to access damaged facilities. According to FHWA officials in Puerto Rico, while division offices should document decisions regarding emergency repair projects, the statutory provision that projects can only be extended beyond 180 days if the damaged facilities are inaccessible does not apply to Puerto Rico because it is funded at a 100 percent federal share, and therefore, such a determination and documentation was not necessary. There are, however, statutory and regulatory provisions other than the percentage of costs covered by the federal government that apply to emergency projects, including contracting and environmental requirements. Because this project was classified as an emergency repair, officials used a bidding technique—called short-list bid—that limited the number of firms which were permitted to submit proposals. This project also received a categorical exclusion for emergencies and was not subject to further environmental review under NEPA. However, although these projects went forward, FHWA’s policy regarding time limits on the use of expedited contracting and environmental procedures is not clear. After we raised this and similar issues on other projects with FHWA, officials stated that the administration’s position was that emergency repair projects using expedited contracting and environmental procedures are only permitted within the first 180 days of a disaster. According to these officials, as a matter of policy, 180 days after the disaster is a “pencils down” moment when projects should be subject to permanent repair requirements, including environmental and contracting requirements. Officials acknowledged this policy is not well documented, and stated they planned to address this gap in future updates to program guidance. These updates—initially planned for 2019—have taken more time than anticipated and are currently planned for 2020, but officials were unable to provide a specific timeline. The classification of the project as an emergency repair raises questions about whether the project was an efficient use of federal funds. The $4.9 million temporary bridge involves considerable construction such as building footings with 5-million pounds of concrete and reinforced steel (see fig. 4) and, as stated previously, is not planned for completion until October 2019. FHWA officials stated this structure will be torn down within a couple of years and replaced by a $6.4 million permanent structure. PR-14 Bridge ($1.4 million project in Puerto Rico). This project will construct a temporary bridge across one of a few main routes on the south-central side of the island that is located in one of Puerto Rico’s mountainous municipalities that is rural and relatively sparsely populated. FHWA officials classified the temporary bridge as an emergency repair to restore essential traffic, including the transportation of people and commercial goods but did not document the basis for this decision. According to officials, this bridge was necessary to restore essential traffic because damage caused by the hurricane led to a reduction in the vehicle load limit from 5 tons to 3 tons. However, the basis for this determination is not clear since the bridge was never closed to traffic and a reduced load limit from 5 to 3 tons would not significantly affect the type of vehicle traffic able to safely cross the bridge. For example, the pre-existing 5-ton limit would have already prevented most types of ambulances and commercial trucks from using the bridge, and the 3-ton limit still permits most passenger vehicles and some types of light-duty trucks. In addition, according to officials, one of the reasons for installing a temporary bridge instead of waiting on the planned installation of a permanent bridge was to quickly restore traffic. However, the temporary bridge will not be completed until February 2020—almost 2 and a half years after the hurricanes, which raises questions about whether or not the project was necessary to quickly restore essential traffic. As with the Ciales Bridge, FHWA did not document the basis for classifying this project as an emergency repair even though it was undertaken more than 180 days after the emergency occurred. The project was contracted using a pre-existing contract and not competitively bid and received a categorical exclusion from NEPA requirements. Similar to the Ciales Bridge, this $1.4 million temporary bridge will be torn down within a couple of years and replaced by a $4.2 million permanent structure. While officials did not document decisions to classify emergency relief projects as emergency repairs, FHWA did improve the documentation of emergency relief projects in some areas since the last time we examined the program in 2011. Specifically, we found more consistent documentation of the onsite damage inspections, cost estimates, and FHWA oversight of eligibility determinations. For example, 39 out of 39 emergency relief projects we reviewed included photographs of the damage and a repair cost estimate; whereas, only 24 out of 83 projects we examined in 2011 included this information. According to Federal Internal Control Standards, to achieve objectives and identify and respond to risks, management should clearly document all transactions and significant events, and define objectives clearly, including specific terms so that they can easily be understood. FHWA did not clearly document transactions and significant events because: (1) in the case of classifying projects as emergency repairs, there is no requirement to do so, and (2) in the case of extending emergency repair projects in Puerto Rico, existing requirements did not apply. FHWA officials stated that these decisions were made as part of an ongoing dialogue between FHWA, the states, and Puerto Rico that is done through emails and in-person and telephone meetings. However, by not documenting emergency repair decisions, such as whether alternative strategies or repairs were considered and the rationale for classifying projects as emergency repairs after the emergency has passed, FHWA lacks definitive explanations for its decisions. This, in turn, raises questions as to whether those decisions were appropriate. When questioned about individual projects, including the examples in Texas and Puerto Rico previously discussed, officials often could not provide concrete rationales for these decisions. In addition, because guidance in the Emergency Relief Manual is intentionally flexible and written to apply to a wide range of circumstances, key terms are not clearly defined and easily understood and applied. This is particularly true for the term “essential traffic,” which is being broadly applied to provide support for repairs necessary to restore any type of traffic without fully considering potential alternatives. While FHWA’s manual generally describes projects to restore essential traffic (e.g., detours that relieve excess traffic directly attributable to the disaster), it does not discuss how to determine whether a project will relieve excess traffic or require officials to evaluate alternative routes. Moreover, FHWA’s guidance and policy are not clear on the time frames for when emergency repair projects must adhere to contracting and environmental requirements. This lack of clearly defined and easily understood terms in emergency relief guidance could result in FHWA inappropriately classifying projects as emergency repairs, which affects: the federal fiscal exposure in a disaster, the level of FHWA oversight because projects may begin without prior authorization, the extent to which projects must be competitively bid, and potentially the level of environmental review accorded a project. Moreover, unclear guidance increases the chances that program guidance could be inconsistently applied, potentially giving access to emergency relief funds to one state and not another. We identified several instances in which officials in one Division Office made emergency repair decisions that differed from another division office. For example, FHWA officials in Florida did not include highway finishes, such as pavement markings, as part of emergency repair projects, while officials in the Puerto Rico Division did. FHWA officials in Puerto Rico also reported that FHWA officials from different division offices who came to assist in the aftermath of the 2017 hurricanes had substantively different interpretations of emergency relief guidance, including how to define emergency repairs and what was and was not essential traffic. For many years, FHWA’s Emergency Relief Program has provided crucial funding to states and territories to rebuild transportation infrastructure, including in the aftermath of hurricanes Harvey, Irma, and Maria. The consecutive timing and scale of these disasters overwhelmed local, state, and territorial governments, and Puerto Rico was hit particularly hard. Given the level of devastation, it was imperative for the federal response to be quick and effective, and that essential services be quickly restored to help people rebuild and recover. However, it is not clear that emergency relief funds are always being used for the purposes intended or put to the highest use. In the absence of well-documented rationales for classifying projects, more clearly defined terms and circumstances for making these decisions, and time frames for accomplishing them, FHWA may have inappropriately classified projects as emergency repairs. While this represent a small percentage of projects undertaken in response to the 2017 hurricanes, FHWA’s actions may have resulted in the federal government forgoing millions of dollars in state contributions, thus increasing the federal fiscal exposure in disasters. Moreover, permitting projects to proceed under expedited contracting requirements many months after the disaster deprived the federal government of a valuable tool intended to ensure the best price for services it receives. Finally, in an environment where needs outweigh funding, multi-million dollar bridge projects are being constructed that will be torn down in a couple of years to make way for other multi-million dollar bridge projects. FHWA’s decision-making invites questions we have raised before about the partnership relationship between FHWA and the states. In high stress and politically sensitive situations like natural disasters in particular, the relationship could lead FHWA to put states’ interests before federal ones or give the appearance of having done so. If FHWA’s decisions are, in fact, appropriate, documentation and clearer guidance could reduce unnecessary skepticism, enhance transparency, and result in more effective use of limited resources. We are making the following two recommendations to FHWA: The Administrator of FHWA should require FHWA division offices to document the rationale for classifying projects as emergency repairs, such as a description of why an emergency repair is necessary and which alternative strategies or repairs were considered, and to more clearly define the circumstances under which projects are classified as emergency repairs, including what constitutes restoration of essential traffic. (Recommendation 1) The Administrator of FHWA should identify a specific timeline for clarifying the policy on the acceptable time frames for accomplishing emergency repair projects undertaken under expedited contracting and environmental requirements, and require FHWA division offices to document the rationale for decisions to extend projects beyond these time frames. (Recommendation 2) We provided a draft of this report to DOT for review and comment. In comments, reproduced in appendix II, DOT concurred with our recommendations. DOT also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of the Department of Transportation. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In 2011, we reported on how Federal Highway Administration (FHWA) officials applied Emergency Relief Program guidance to a selected group of projects that received funding. In that review, we selected a nongeneralizable sample of eligible Emergency Relief Program projects in three states—New York, Texas, and Washington—that matched criteria such as receiving more than $1 million in obligated federal funds and approval by FHWA between fiscal years 2007 through 2010. We reviewed those projects’ files to determine whether they included required or recommended documentation cited in federal statute, regulations, and FHWA program guidance. In our 2011 report, we found many instances of missing or incomplete documentation, such as required repair cost estimates, because FHWA lacked clear requirements for how states submitted and FHWA approved key project documentation, leading to FHWA division offices applying eligibility criteria differently. We recommended that FHWA standardize their procedures for reviewing emergency relief documentation and making eligibility decisions, including retaining damage inspection reports with detailed repair cost estimates. In response, FHWA issued an Order in February 2016 that included procedures to ensure that FHWA makes eligibility determinations consistently and transparently that we determined addressed our recommendation. To evaluate how FHWA officials applied Emergency Relief Program guidance to selected projects in recent emergency events and whether documentation had improved since our 2011 report, we conducted a file review of 39 nongeneralizable emergency relief projects—25 of which included emergency repairs—in Texas, Florida, and Puerto Rico. These projects, which FHWA determined were eligible for Emergency Relief Program funding, were necessary to repair damage caused by three 2017 hurricanes: Harvey, Irma, and Maria. The purpose of this review was to determine whether each project file included information showing the project met eligibility requirements or information required or recommended in federal statute, regulations, and FHWA program guidance. To select these 39 project files (13 projects each from Texas, Florida, and Puerto Rico), we used the following criteria: We reviewed those with the highest estimated cost to ensure the inclusion of projects likely to receive the most federal funds. The 39 project files we selected represented over 38 percent of Emergency Relief funds allocated to those three states for the 2017 hurricanes, as of February 2019. We selected a mix of road and bridge projects to ensure we reviewed a selection of projects that could include different types or amounts of documentation. States typically have more data and oversight processes in place for bridges than other roads, as most bridges are required to be inspected at least every 2 years. We selected a mix of a state and local agency projects to ensure we reviewed a selection of projects that may have been prepared with different levels of detail. Though state agencies ultimately submit all Emergency Relief Program requests to FHWA, local agencies prepare some of the paperwork for projects within their jurisdictions and could provide a different level of detail in their project files than state agencies. For each of the 39 projects in our review, the FHWA division offices in Texas, Florida, and Puerto Rico provided associated project files. Through discussions with state officials, we determined that FHWA’s Mobile Solution for Assessment and Reporting (MSAR) was sufficiently reliable for our purposes of obtaining documentation for file reviews for projects located in Texas. For Puerto Rico, because state officials acknowledged some files were not included in MSAR, we asked for state officials to directly send us additional documentation as needed. As Florida does not use MSAR to record project information or documentation, we asked for state officials to send us relevant project documentation directly. Project files from these locations included information on project type and estimated costs as well as other relevant documents, such as engineering reports, bridge inspection reports, or photographs of the damage. Two analysts reviewed those files for information that is required or recommended by statute or FHWA guidance. This information included much of the same information we had previously evaluated in our 2011 review. To conduct the review, one analyst reviewed the documentation provided by FHWA’s division offices and completed a data collection instrument, then a second analyst reviewed the same documentation to verify the results of that review. Afterwards, the two analysts discussed and resolved any discrepancies and questions. The analysts then analyzed and summarized the results for the 39 eligible projects of this review to determine whether each file included documentation for damage and cost information, emergency repair requirements, and eligibility determination, as detailed below: Damage and cost information: We reviewed whether the project file included a complete detailed damage inspection report (DDIR), which documents an on-site inspection of the damage. FHWA’s Emergency Relief Manual states that a complete DDIR should include a number of details including: the type of federal-aid highway, such as an interstate, freeway, or expressway; the average daily traffic or the typical traffic volume in a location over a 24-hour period; the nature or type of damage, such as a bridge collapse or landslide, and extent or amount of damage, such as fully or partially collapsed; a field site sketch or drawing that shows details of the damage site such as the width of the road or bridge; a total estimated cost for repair; and documentation related to an environmental review recommendation, which would include the potential effects of repairs on nearby species or waterways. For the 39 projects we included in our file review, we found that DDIR documentation generally improved compared to the 2011 review. For instance, each of the 39 projects included a DDIR, photographs of the damage, and the repair’s cost estimate; only 24 of the 83 eligible projects we reviewed in 2011 included each of those pieces of information. However, we found other recommended DDIR documentation to be lacking. For example, of the 39 projects in our review, 36 did not include Average Daily Traffic and 22 did not include the type of federal-aid highway. Figure 3 represents the results of our review of damage and cost information. Emergency repair requirements: We reviewed whether eligible emergency repair projects included a documented rationale or justification for classifying the project as an emergency repair instead of a permanent repair. As discussed in the body of this report, by statute, emergency repairs are repairs undertaken during or immediately after a disaster specifically to restore essential traffic, to minimize the extent of damage, or to protect the remaining facilities. As discussed in the body of this report, classifying a project as an emergency repair affects the percentage of costs covered by federal funds, level of FHWA oversight, and the extent to which environmental and contracting requirements apply. We found that of the 25 project files that included an emergency repair (out of the 39 in our review), 22 did not include a documented rationale or justification for classifying the project as an emergency repair instead of a permanent repair. Eligibility determination: We reviewed whether a representative of FHWA signed and recommended eligibility for Emergency Relief funding and whether the applicant or state representative signed and agreed with FHWA’s recommendation. The Emergency Relief Manual states that documentation should include an eligibility recommendation by an FHWA representative and acknowledgement of that recommendation by the applicant. For the 39 projects we included in our file review, we found that documentations of FHWA and applicant signatures generally improved compared to the 2011 review. In our current review, we found that the FHWA and applicant or state representatives signed each of the 39 eligible project files; in our 2011 review, only 36 of the 83 eligible projects included a signature from an FHWA representative and 47 of the 83 eligible projects included a signature from the applicant or state representative. In addition to the contact named above, Steve Cohen (Assistant Director), Matthew Cook (Analyst in Charge), Pedro Almoguera, Aditi Archer, Danielle Ellingston, Lauren Friedman, Kathryn Godfrey, Hannah Laufe, Leslie Locke, Cheryl Peterson, Malika Rice, Amy Rosewarne, and Elizabeth Wood made key contributions to this report.", "summary": "In 2017, hurricanes in Texas, Florida, and Puerto Rico caused $1 billion in estimated damage. FHWA's Emergency Relief Program provides funding for states to repair or reconstruct federal-aid highways damaged or destroyed by natural disasters, including funding for emergency and permanent repairs. As of September 2019, FHWA has allocated $634 million in federal funds to the two states and Puerto Rico. By statute, emergency repairs are undertaken during or immediately following a disaster to quickly restore essential traffic and minimize further damage. These repairs receive 100 percent federal reimbursement if accomplished within 180 days and may proceed under expedited contracting and environmental procedures. GAO was asked to evaluate the federal response to the 2017 disasters. This report assesses how FHWA applied program guidance to classify selected emergency relief projects, among other objectives. GAO visited 33 out of approximately 2,500 projects in Texas, Florida, and Puerto Rico; analyzed 25 emergency repair project files; and interviewed FHWA, state, and local government officials. GAO found that the Federal Highway Administration (FHWA) did not document the bases for decisions to classify projects as emergency repairs in 22 of the 25 project files reviewed. Without such documentation, it is not possible to definitively determine the justification for these decisions; GAO identified at least three projects that may have been inappropriately classified. For example, FHWA classified a $10.7 million ferry project in Lynchburg, Texas as an emergency repair to restore essential traffic. Several highways, however, were available immediately following the disaster that service the same locations and result in faster travel times than the ferry. FHWA guidance does not require officials to document decisions to classify projects as emergency repairs or clearly define what constitutes restoration of essential traffic. Designating projects as emergency repairs can increase the federal fiscal exposure in disasters. Had FHWA classified the ferry project as a permanent repair—instead of an emergency repair—the state would have been responsible for paying approximately $2.1 million in matching funds. GAO also identified two temporary bridge projects in Puerto Rico classified as emergency repairs even though (1) work did not start within180 days of a disaster, as generally required; (2) the bridges are not to be completed until late 2019 and early 2020; and (3) both are to be replaced by permanent bridges within a couple of years. Out of approximately 1,200 eligible projects in Puerto Rico, FHWA officials reported undertaking 34, including the two bridges GAO identified, after 180 days. Officials also stated they did not document the basis for continuing to classify these projects as emergency repairs. FHWA officials in Puerto Rico stated they were not required to complete repairs within the 180 day limit established in law because Congress exempted Puerto Rico from federal matching share requirements. Further, emergency repair projects are allowed to expedite contracting and environmental procedures. After GAO raised this issue with FHWA, the agency stated that emergency repair projects are only permitted to use these expedited procedures within the first 180 days. While officials stated they plan to update guidance to include this policy, there is no specific timeline for doing so. FHWA should (1) document decisions to classify projects as emergency repairs and more clearly define what constitutes restoration of essential traffic, and (2) identify a specific timeline for clarifying the policy on when expedited contracting and environmental procedures are permitted. DOT concurred with GAO's recommendations and provided technical comments that GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "The ASD(HA) serves as the principal advisor for all DOD health policies and programs. The ASD(HA) has the authority to issue DOD instructions, publications, and memorandums that implement policy approved by the Secretary of Defense or the Under Secretary of Defense for Personnel and Readiness and govern the management of DOD medical programs. The ASD(HA) also exercises authority, direction, and control over the President of the Uniformed Services University of the Health Sciences. Further, the ASD(HA) sets the maximum special and incentive pay amounts for all military physicians and dentists. The Army, the Navy, and the Air Force have the authority to recruit, train, and retain physicians and dentists. Currently, there is no joint DOD unit or process dedicated to recruiting medical students and accessing medical officers because recruiting and retention are the responsibility of the military departments. Each military department has its own organizational structure, responsibilities, and varying degrees of personnel resources for accessing physicians and dentists. The departments’ recruiting commands recruit medical and dental students into the scholarship program. In a separate process, the University recruits and admits a set number of medical students each year. Figure 1 shows the organizational structure of the Military Health System as it relates to the recruitment and retention of military physicians and dentists. DOD has two primary sources of recruitment for military physicians: the scholarship program and the University. DOD recruits most military dentists through the scholarship program. Participants in DOD’s scholarship program and the University accrue an active-duty service obligation in return for a tuition-free medical or dental education and certain financial benefits. Specifically, scholarship program participants enrolled in a civilian medical or dental school receive paid tuition, books and fees, and a monthly stipend. In some cases, participants are also offered an accession bonus. In exchange, scholarship program participants incur a 6- month active-duty service obligation for each 6 months of benefits received, with a 2-year minimum service obligation. Students at the University are enrolled in the DOD-sponsored medical school at no cost, enter active-duty service as medical students and receive the pay and benefits of an officer at the O-1 pay grade. In exchange, University medical students accrue a 7-year service obligation. Career paths for medical and dental school graduates can differ. For example, Army and Air Force medical school graduates typically become specialized before practicing medicine, while 55 percent of Navy physicians complete a General Medical Officer tour before becoming specialized, according to department officials. Moreover, dental school graduates typically practice as general dentists after completing licensure requirements before choosing to specialize. To become specialized, medical and dental school graduates apply to a medical or dental residency training program, which may require or include a 1-year internship, depending on the program or specialty. After residency, some physicians or dentists may decide to pursue further training, known as “fellowships,” in order to become subspecialists. For example, to become a cardiologist, a physician must complete an internal medicine residency followed by a cardiology fellowship. Residency training typically requires 3 to 7 years for physicians and 1 to 6 years for dentists. Fellowship training typically is 1 or more years in length for physicians and dentists. The required number of years depends on the specialty or subspecialty. After residency or fellowship training—hereafter referred to collectively as residency training—physicians and dentists become credentialed and privileged to practice the specialty or subspecialty that they trained in, and they are also eligible for board certification. Figure 2 portrays possible paths to becoming a military physician or dentist. As noted earlier, scholarship program medical and dental students incur 6 months of an active-duty service obligation for each 6 months of benefits received, with a 2-year minimum service obligation; University medical students accrue a 7-year service obligation. While training in a military residency program, residents receive the pay and benefits of an officer at the O-3 pay grade or higher, depending on prior years of service, and earn creditable years of service toward retirement. In exchange, participants incur an additional 6 months of an active-duty service obligation for each 6-months of residency training, with a minimum 2-year service obligation. However, according to DOD officials, the first year of postgraduate training (i.e., internship or 1 year of advanced education in general dentistry and general practice residency) does not accrue a service obligation and is considered obligation neutral. Currently, the two sets of obligations—the obligation for medical or dental school and the obligation for military residency training—are served concurrently, or at the same time, effectively resulting in the servicemember serving the longer of the two obligations. For example, a student who accepts a 4- year scholarship, trains in a 1-year internship, and then trains in a 4-year residency program will serve a total of 9 years. The first 5 years would be spent in internship and residency, and the final 4 years of this service would be spent discharging the active-duty service obligations concurrently (see figure 3, scenario 2). Depending on career path, years of active-duty service after completion of medical and dental school will vary (see figure 3). DOD’s measure of cash compensation, known as regular military compensation, includes the sum of basic pay, basic allowance for housing, basic allowance for subsistence, and the federal income tax advantage that accrues from the non-taxable nature of the allowances. For example, according to DOD, in 2017 the average married military officer at the pay grade of O-3 received annual regular military compensation of around $99,000. Specifically, this average officer received around $67,000 for basic pay, $24,000 for the basic allowance for housing, $3,000 for the basic allowance for subsistence, and a federal income tax advantage of $5,000. In addition to regular military compensation, physicians and dentists may be eligible for various special and incentive pays which vary depending upon their status as residents, their service obligations, and their specialty. During residency training, physicians and dentists are eligible for select medical or dental corps incentive pays. Upon completion of residency training, they become eligible for higher rates of incentive pay and, if they become board certified, for Board Certification Pay. After fulfilling their active-duty service obligations from medical or dental school and residency training, in addition to special and incentive pays already received, physicians and dentists become eligible for a multi-year retention bonus. Cash compensation for active-duty military physicians and dentists was generally less than the median compensation for private sector civilians in calendar year 2017 for most specialties we reviewed, including at key retention points. However, a substantial portion of the costs of DOD’s overall compensation package is comprised of deferred and noncash benefits provided to active-duty personnel, such as a pension in retirement and tuition-free medical and dental education, but the extent to which servicemembers value these benefits is difficult to determine. Cash compensation for active-duty military physicians and dentists varied depending on pay grade, specialty, and decisions to accept retention bonuses or other special and incentive pays, but was generally less than the median compensation for private sector civilians in calendar year 2017 for most specialties. Although we could not make direct comparisons of military and private sector civilian cash compensation by years of service or experience, we estimated the minimum and maximum military cash compensation for specialized active-duty physicians and dentists in pay grades O-3 to O-6, which represented more than 99 percent of military physicians and dentists in fiscal year 2018. Specifically, we found that the minimum military cash compensation for all 21 physician and 5 of 6 dental specialties we reviewed was less than the civilian median for all pay grades; and the maximum military cash compensation for 16 of 21 physician (see figure 4 below) and 5 of 6 dental specialties (see figure 5 below) we reviewed was also less than the civilian median for all pay grades. Therefore, for many of these specialties, even the most senior military physician and dentists (i.e., pay grade O-5 or higher) at the top of the pay range were estimated to receive cash compensation below the private sector civilian median. The minimum and maximum of total military cash compensation, by specialty and pay grade, and how these compare to reported private sector civilian cash compensation are presented in appendix II. Cash compensation for military physicians and dentists is generally less than private sector civilian compensation at key retention points. Specifically, we calculated 2017 cash compensation for military medical officers who completed their residency directly after medical school across 21 medical specialties and found that at their first unobligated year of service—after they fulfill their initial active-duty service obligations accrued from medical school and military residency training—all 21 specialties had cash compensation below the private sector civilian median. In addition, we found that all but one specialty (psychiatry) was less than the 20th percentile for private sector civilian compensation. Notably, nine specialties that DOD identified as critical trauma-related wartime specialties in 2019 were less than the 20th percentile. According to senior military department medical corps officials, the first unobligated year of service is a key point of retention for military physicians. A 2012 study of military physicians found that compensation had a large impact on the decision to remain in the military in the first unobligated year of service and just a small impact on retention in the years afterward. For DOD’s scholarship program participants, which constitute the majority of recruited military physicians, we estimate that initial service obligation fulfillment typically occurs about 4 years after successful completion of their residency, or at about 9 years of service. We also calculated cash compensation for military medical officers who (a) completed a 3-year General Medical Officer tour prior to specializing in a residency, or (b) attended the University and accrued a 7-year active- duty service obligation and found that all but three specialties (pediatrics, family medicine, and psychiatry) had cash compensation less than the 20th percentile for private sector civilian compensation, and all specialties were compensated below the median. We reviewed 2017 cash compensation for typical military dental officers across six dental specialties and found that at each of these retention points, military cash compensation was less than the median private sector civilian compensation, three of which were below the 25th percentile (orthodontics, endodontics, and periodontics). According to senior military department dental corps officials, two key points of retention for military dentists are (1) after they fulfill their scholarship service obligation by practicing as a general dentist for several years, and (2) after they have completed residency training for a dental specialty, such as orthodontics, and fulfill their residency service obligation. Unlike their physician counterparts, dental students typically do not begin residency immediately after graduation. According to military department dental corps Chiefs, dental student graduates generally complete a 1- year advanced education in general dentistry certificate, which does not incur a service obligation, then fulfill their dental school active-duty service obligation as general dentists before taking a general dentist’s retention bonus and beginning residency training. Cash compensation is just one factor that servicemembers may consider when making the decision to stay with or separate from the military. According to DOD medical and dental corps officials, other factors that may influence this decision include number and frequency of deployments, ability to function at full scope of practice for training, additional nonphysician duties and administrative requirements placed on active-duty physicians that their private sector counterparts do not experience, family considerations associated with permanent change of station orders, nonselection to residency of choice, nonselection for promotion, and retirement eligibility. Similarly, data from the 2017 DOD Status of Forces Survey show that among all officers, the most important factors that would be considered in a decision of whether to stay on active-duty were the military retirement system and personal choice/freedoms (e.g. control of where to work), as well as factors such as opportunities to be assigned to station of choice, family concerns, and pay and allowances. Moreover, a 2019 study of Army physician service obligations showed that military physicians who were most likely to continue serving after completion of their obligation and ultimately retire were those who had the most years of service accumulated when obligations were completed. That is, those who were close to retirement after completing their service obligations were more likely to stay to receive their retirement benefit. In addition to cash compensation, DOD offers substantial deferred benefits, such as retirement pensions and benefits, and noncash benefits, such as tuition-free medical school education and health care, to its military physicians and dentists. In its report on military compensation, DOD noted that nearly half of military compensation is made up of deferred and noncash benefits, and that this proportion is considerably higher than in civilian compensation. Additionally, in 2011 we identified military personnel costs as an area where DOD could recognize long- term cost avoidance by using a total compensation approach to manage military compensation in a holistic manner that considers deferred and noncash benefits alongside cash compensation. Studies of military compensation highlight that assigning a value to deferred and noncash benefits and comparing them to the civilian private sector proves more difficult than for cash compensation because servicemembers value or use these benefits differently, various assumptions have to be made to assign value, and access to such benefits is not universal among private sector civilian workers. Additionally, it is difficult to measure the extent to which servicemembers discount the value of future benefits. We previously reported that it is generally accepted that some deferred benefits, such as a pension in retirement, are not valued as highly by servicemembers as current cash compensation. However, a recent study found that servicemembers, particularly military officers, may value deferred benefits more highly than was previously reported. For these reasons we did not compare the value of military deferred and noncash benefits to similar benefits in the civilian private sector; however, we describe certain types of deferred and noncash benefits available to physicians and dentists and provide estimates of their value where possible. DOD provides access to two primary types of deferred benefits: its employer-sponsored retirement plans and retiree health and dental care. As mentioned previously, the likelihood of benefiting from DOD’s military retirement system is a factor that officers consider when deciding to stay on active duty. Retirement plans. In DOD’s traditional retirement system, known as the “High-Three System,” servicemembers are eligible to receive a defined benefit annuity based on their pay grade and years of service after a minimum 20 years of active-duty service, with no benefits provided to those who separate before then. This system was closed to new entrants at the end of 2017. Based on our estimates, under the High-Three System, the defined benefit for a physician or dentist who retires with 20 years of service in 2035 was estimated to be $2,457,253 (present value). New servicemembers from 2018 onwards were enrolled in the Blended Retirement System (BRS). BRS is a hybrid retirement system that includes a revised defined benefit plan requiring 20 years of active-duty service, a defined contribution plan with agency matching contributions, and a one-time direct cash payout—called continuation pay—distributed at the midcareer point (between 8-12 years of service). Based on our estimates, under the BRS, the defined benefit for a physician or dentist who retires with 20 years of service in 2035 was estimated to be $1,965,802 (present value). The defined contribution plan offers government automatic and matching contributions of up to 5 percent of basic pay to the servicemember’s Thrift Savings Plan, and vested servicemembers who separate before 20 years of active-duty service retain ownership of these contributions. The BRS was implemented in 2018 to modernize the military retirement system. As the Military Compensation and Retirement Modernization Commission reported in 2015, roughly 51 percent of military officers exited service before 20 years, meaning that most left without any retirement benefits under the High-Three System. The BRS is expected to provide retirement benefits for the majority of servicemembers, including those who serve fewer than 20 years, according to DOD. In our interviews, some DOD officials expressed concern about the effects of BRS on retention of military physicians and dentists, because, for example, they believed the opportunity to separate with defined contributions will reduce their incentive to remain for a longer period of active duty. Other DOD officials we interviewed stated that it is too soon to determine the effects of the BRS on retention, and noted that the inclusion of continuation pay as part of the BRS was designed to encourage servicemembers to continue serving at the mid-career point. Retiree health and dental care. Servicemembers retiring from active duty are eligible to enroll in TRICARE. Specifically, retired servicemembers and their eligible dependents are able to participate in TRICARE Prime which is comparable to a health maintenance organization (HMO) program, and TRICARE Select, which is comparable to a preferred provider organization (PPO) program. After they are eligible for Medicare, retired servicemembers and their eligible dependents with Medicare Part A and B can enroll in TRICARE for Life, which provides Medicare-wraparound coverage. Eligible retired servicemembers may also receive benefits from the Department of Veterans Affairs health care system. Specifically, active-duty servicemembers who served 24 continuous months or the full period for which they were called to active duty are eligible for Veteran Affairs’ health care. DOD provides access to a wide variety of noncash benefits, some of which are uncommon in the civilian sector, and may offset some of the discrepancies in military and private sector civilian cash compensation. However, limited information exists on the extent to which noncash benefits are used by military physician and dentists. Therefore, we have highlighted select benefits that may be used by military physicians and dentists. Tuition-free medical and dental school. Military physicians and dentists benefit from DOD’s scholarship program and the University, through which prospective medical and dental students receive tuition-free education in exchange for commitment to a number of years in active- duty service. This benefit allows physicians and dentists to avoid thousands of dollars of student debt. For example, according to the Association of American Medical Colleges, the average first-year medical student paid $36,755 for tuition, fees, and health insurance to attend a public medical school during the 2018-19 academic year, and the average first-year student attending a private medical school paid $59,076. Medical and dental care. DOD offers comprehensive health coverage to military personnel and their dependents through TRICARE, a managed care program. Care is provided in more than 650 military treatment facilities worldwide, supplemented by civilian providers. TRICARE offers two health care options to non-Medicare-eligible beneficiaries: TRICARE Prime and TRICARE Select. All active-duty servicemembers are automatically enrolled in TRICARE Prime, which is comparable to a private health maintenance organization plan. Under this program, active- duty servicemembers have no premium costs, deductibles, or out-of- pocket costs for servicemembers and no or low costs for dependents. Medical Expenditure Panel Survey data indicate that the average private sector civilian employee spent over $5,000 in health insurance employee contributions for family coverage in 2018. The TRICARE Active Duty Dental Program supplements the dental services available to active-duty servicemembers at military treatment facilities when necessary care is not available or the servicemember does not have ready access to a military treatment facility. Active-duty servicemembers do not pay premiums for this dental care, do not share in the costs of the care, and do not face any annual or lifetime maximums on the cost of care. Financial benefits during education and training. Medical and dental scholarship students receive O-1 pay and allowances for 45 days of active duty for annual training performed for each year the scholarship is awarded. Participants may also be eligible for a $20,000 signing bonus. During their education, medical and dental scholarship students receive a monthly stipend, and medical students at the University receive officer salary and benefits at grade O-1. After medical school, medical and dental residents receive officer pay and benefits at grade O-3 or higher, according to DOD officials. Based on our analysis of DOD’s incentives to recruit and retain military physicians and dentists, DOD generally (1) clearly defined the criteria used to determine when to offer incentives, (2) identified and incorporated opportunities for improvement, (3) identified and evaluated unique staffing situations, and (4) made investments to attract and retain top talent. However, we found that DOD did not consistently collect information on (1) replacement costs, (2) current and historical retention efforts, and (3) comparable civilian wages to help inform investment decisions in its package of incentives to recruit and retain military physicians and dentists. Fully applying these seven key principles of effective human capital management in its approach to recruit and retain military physicians and dentists is important to making fully informed investment decisions. We found that DOD generally applied effective human capital management principles related to clearly defined criteria on when to use incentives, making investments based on expected improvement in agency results, identifying and evaluating unique staffing situations, and identifying and incorporating opportunities for improvement. To support its operational needs, DOD uses educational, training, and monetary incentives to recruit and retain physicians and dentists. Specifically, DOD’s package of incentives includes, among other things, a tuition-free medical school education through the scholarship program and the University, pay as an O-3 officer or higher during medical or dental residency, the opportunity for further training via a fellowship, and a series of special and incentive pays for fully trained physicians and dentists. According to DOD’s report on military compensation, special and incentive pay authorities provide the services with greater flexibility to target additional compensation where needed to address emerging staffing shortfalls and maintain staffing in critical or hard-to-fill skills. We found that DOD generally applied four of the seven key principles, as described below: Relied on clearly defined, well-documented, consistently applied, and transparent criteria. DOD and the military departments have established rules-based pay plans with clear eligibility criteria for special and incentive pays and recruitment and retention bonuses. Key principles for human capital management state that agencies should consider making targeted investments in specific human capital approaches, and that these approaches should have clearly defined, well-documented, transparent, and consistently applied criteria for making these investments. Identified opportunities for improvement and incorporated these opportunities into the next planning cycle. The services and officials from the Office of the ASD(HA) participate in the Health Professions Incentives Working Group to review recruitment and retention special pay and incentives and recommend adjustment to amounts offered as necessary. For example, as a result of working group discussions, DOD officials stated that they established a new 6- year retention bonus in the fiscal year 2019 pay plan for select medical and dental specialties, in part to ensure greater stability in the numbers of physicians and dentists within these specialties. Military department officials stated they plan to identify potential impacts and determine adjustments, if any, that need to be made. DOD’s report on military compensation advises officials to identify opportunities for improvement using analytical tools to model how changes in compensation might alter the force or career profile. It further states that taking a structured approach to determining both incentive pay eligibility criteria and amounts helps force managers optimize their limited special and incentive pay budgets. Such an approach also provides a mechanism to periodically conduct a rigorous assessment of such pays to ensure that they keep pace with changing conditions. Identified and evaluated unique staffing issues. According to military department officials, medical corps and dental corps community managers, specialty leaders, consultants, and others actively discuss military physicians’ and dentists’ career plans to help inform future staffing needs. Moreover, to attract physicians and dentists in specialties which DOD has identified as a critically short wartime specialty, DOD offers a Critical Wartime Skills Accession Bonus. However, as we reported in 2018, military department officials cited a number of challenges that make it difficult to attract and retain military physicians and dentists, including national shortages and competition with the private sector. Incentive pay and retention bonus amounts are specific to each specialty. DOD’s report on military compensation states that evaluation of unique staffing issues identified by community managers should be a core part of a systematic approach to assessing the application of a special or incentive pay. Similarly, key principles for human capital management note that agencies should tailor human capital strategies to meet their specific mission needs. Targeted investments to attract and retain top talent. The services are authorized to offer targeted monetary incentives in the form of special and incentive pays and recruitment and retention bonuses to eligible physicians and dentists who are in good standing. Moreover, military department officials stated that DOD offers Board Certification Pay to physicians and dentists who achieve and maintain this accreditation because it reflects that the physician or dentist is maintaining skills and qualifications and allows the department to better reflect the high level of the quality of care that is provided by the military health system. Similarly, we reported in 2018 that DOD and the military departments had established a set of minimum qualifications for medical school applicants applying to the scholarship program and the University. Key principles for human capital management state that targeted investments in human capital approaches should help the agency attract, develop, retain, and deploy the best talent and then elicit the best performance for mission accomplishment. The principles further state that decisions regarding these investments should be based largely on the expected improvement in agency results. Similarly, DOD’s Diversity and Inclusion Strategic Plan 2012-2017 notes that retaining top talent is essential to sustaining mission readiness that is adaptable and responsive. In three key areas of effective human capital management related to data on replacement costs, recruitment and retention, and civilian wages, DOD does not consistently collect information to help inform investment decisions in its package of incentives to recruit and retain military physicians and dentists, as described below: Did not identify replacement costs. Military departments do not consistently collect information on replacement costs of military physicians and dentists. Specifically, no military department was able to provide us with a comprehensive assessment of the replacement cost for military physicians and dentists. Replacement cost assessments can be found in other occupations within DOD. For example, in 2017, we reported that the Navy considers the high replacement costs of its nuclear propulsion personnel—up to $986,000 per trainee—in justifying a strategy that prioritizes investment in retention initiatives over new accessions or recruits. Moreover, DOD requires that the training investment and replacement cost for those qualified in the skill be considered when justifying the need for the critical skills retention bonus. DOD’s report on military compensation identified replacement costs and training costs as a factor in assessing incentive pay appropriateness. In 2018, we recommended that the ASD(HA) require that the University develop a reliable method to accurately determine the cost to educate its medical students. DOD partially concurred with our recommendation. In response to our recommendation, the University contracted with the Institute for Defense Analyses to determine the costs to educate University medical students. In its October 2019 final draft report, the Institute for Defense Analyses estimated total accession costs for a fully trained physicians through both the scholarship program and the University; specifically, the report estimated the total cost for a fully trained physician who completes 4 years of medical school and a 3-year military residency to be $878,000 for scholarship medical students and approximately $1.5 million for University medical students. In another similar ongoing effort, Navy officials stated that they have commissioned a Life Cycle Cost study with the Center for Naval Analyses. We are encouraged by these initiatives, which will provide the Office of the ASD(HA) and the military departments a foundation for formalizing the process of collecting information on replacement costs. With the benefit of this information, DOD can make more informed decisions regarding its packages of recruitment and retention incentives. Did not collect current and historical retention information. Military departments do not consistently collect and use current and historical retention information to help inform decisions about investment in retention incentives. Specifically, Navy and Air Force officials told us that they do not have readily available information to determine the percentage of those who accepted a retention bonus among the eligible population, and Army officials noted they do not have a framework in place to use retention information to determine the effectiveness of retention bonuses. Using retention data to measure effectiveness of retention incentives is performed by other communities within DOD. For example, in 2018 we reported that officials from the Navy, Marine Corps, and Air Force measured the effectiveness of aviation retention bonuses by monitoring bonus acceptance rates. DOD’s report on military compensation stated that a review of current and historical data on retention should be a core part of a systematic approach to assessing the application of a special or incentive pay. Further, key principles for human capital management note that periodic measurement of an agency’s progress toward human capital goals and the extent that human capital activities contributed to achieving programmatic goals provides information for effective oversight by identifying performance shortfalls and appropriate corrective actions. Without information on the acceptance rate among those eligible, the military departments cannot assess the effectiveness of the performance of their investment in retention bonuses. Did not assess private sector civilian wages. DOD does not consistently collect and use private sector wage information to help inform investment decisions in its special and incentive pays for physicians and dentists. Based on our review of the minutes of meetings of the Health Professions Incentives Working Group, which recommends changes to the rate and term of special and incentive pays, private sector compensation was occasionally raised as a challenge. However, it was not collected and used to help inform investment decisions on a consistent basis. According to officials from the Office of the ASD(HA) and the military departments, an assessment of civilian wages is not a driving factor when considering adjustments to special and incentive pays, in part because DOD cannot always match civilian sector compensation for military physicians and dentists. Officials from the Office of the ASD(HA) and the military departments acknowledged the disparity between military and civilian cash compensation varies by specialty; however, incentive pay and retention bonus amounts have largely remained the same for over a decade. DOD’s Ninth Quadrennial Review of Military Compensation states that pay at around the 70th percentile of comparably educated civilians is necessary to enable the military to recruit and retain the quantity and quality of personnel it requires. Based on our comparison of military and civilian cash compensation pay previously discussed, we found that the gap between military and private sector civilian varies by specialty and many fall below the civilian private sector median. Moreover, based on our review of cash compensation for medical officers who completed their residency directly after medical school across 21 medical specialties, we found that at their first unobligated year of service, all 21 specialties had cash compensation below the private sector civilian median. Additionally, all but one specialty (psychiatry) were compensated at less than the 20th percentile of private sector civilian compensation. Use of assessments of private sector civilian compensation can be found in other communities within DOD. For example, in 2017, we reported that the Navy justified its use of selective reenlistment bonuses for cyber-related occupations by noting the specific level of starting salaries for comparable civilians. DOD’s report on military compensation states that reviewing civilian wages is a key element in assessing the application of a special or incentive pay. Further, it states that periodic reviews, which should include the use of an analytical tool or model, will ensure that resources are directed at the most pressing staffing needs. For example, professions that consistently command higher pay in the civilian sector—such as the medical professions—may merit predictable pays over the long term. Yet in other areas, evolving mission needs, changing conditions in the civilian market, and other factors may call for increasing an incentive or, in some cases, may show that additional pay can be reduced or eliminated. According to a former Under Secretary of Defense for Personnel and Readiness and a noted expert on defense personnel issues, DOD would benefit from analysis to determine the point at which cash compensation for military physicians, including special and incentive pays, reaches a minimum threshold of attractiveness compared to the private sector. Assessing civilian wages could help DOD understand the relationship of any military and civilian pay discrepancies to its ability to fill particular specialties. For example, we found that in fiscal year 2018, all but three of the specialties we reviewed were below 90 percent of authorization by at least one of the services’ active components. By consistently collecting civilian wage information and using it to inform its package of incentives, DOD will be better positioned to make the most effective use of its recruitment and retention incentives. DOD officials stated that their approach to managing the package of incentives to recruit and retain military physicians and dentists is driven by a number of considerations. Specifically, DOD officials stated that the rates of special and incentive pays represent amounts that are affordable and that the military departments generally believe have allowed them to meet their personnel needs. Further, military department officials stated that budget considerations and statutory limitations hinder their ability to change the rate of special and incentive pays. Current statutory limits to the amount of the retention bonus, incentive pay, and board certification pay are $75,000, $100,000, and $6,000, respectively; there is currently no statutory limit on the critical skills retention bonus for health professionals, which can be paid in addition to other pays. While we believe these are valid considerations, collecting information on replacement costs, retention, and civilian wages would allow the Office of the ASD(HA) and the military departments to provide greater stewardship of available funding by ensuring its efficient application. Specifically, Standards for Internal Control in the Federal Government state that management should use quality information to achieve the entity’s objectives. For example, further analysis of replacement costs could reveal that retention of fully trained physicians is highly economical for DOD, and provide strong support for changes to retention incentives to safeguard significant investment in physicians and dentists. By collecting and using this information to inform its decision-making, DOD and the military departments would be better positioned to assess the effectiveness of their incentives to recruit and retain military physicians and dentists and make sound investment decisions for the future. Our surveys of medical students, focus groups with medical residents, and interviews with DOD officials showed there was a general perception that lengthening active-duty service obligations, such as through a system of serving obligations from medical school and residency training consecutively, could negatively affect recruitment and retention of military physicians. Moreover, DOD is considering reductions to the overall number of active-duty physicians, including targeted reductions to certain specialties, and participants in all eight focus groups with residents had concerns about the proposed reductions to authorizations for certain medical specialties. In our surveys of medical students, we found that they generally would not have accepted the scholarship or attended the University if the service obligations from medical education and residency training were served consecutively. Specifically, an estimated 61 percent of scholarship recipients and an estimated 51 percent of University students in our representative survey responded that they would not have accepted DOD’s scholarship program or attended its University had they been required to fulfill these service obligations consecutively. However, our survey results indicated that students are willing to accept some additional active-duty service obligation for their current programs. Specifically, 68 percent of the University students and almost half (46 percent) of the scholarship students would be willing to accept an additional year of active-duty service obligation. Notably, a lower percentage of medical students would accept 2 additional years of active- duty service obligations—specifically 34 percent of University students and 16 percent of scholarship recipients. Our survey results found that medical students would be more willing to accept longer service obligations if accompanied by additional cash incentives. For example, 80 percent of University students and more than half of scholarship recipients (63 percent) would be willing to accept an additional year of service obligation if accompanied by additional cash incentives. (See figure 6 and appendix III for specific estimates and confidence intervals.) Similar to the survey responses, participants in all eight focus groups with medical residents also would not have accepted the scholarship or attended the University under a system of consecutive active-duty service obligations. However, participants in seven out of eight focus groups we conducted stated that they would be more willing to accept longer service obligations if accompanied by additional cash incentives, such as a larger accession bonus. Lengthening service obligations may also have unintended consequences without other changes to DOD policy. Specifically, participants in five out of eight of our focus groups with medical residents and DOD officials we interviewed expressed concern that lengthening service obligations would delay physicians’ eligibility for retention bonuses, resulting in a reduction of cash compensation over the course of a career. For example, under current policy, a physician who accepted a 4-year scholarship, completed a 1-year internship, and then trained in a 4-year residency training program would be eligible for a retention bonus after 9 years of service. Under a consecutive service obligation model, that same physician would be eligible for a retention bonus after 13 years of service (see figure 7). Further, as previously reported, cash compensation for military physicians is generally less than private sector civilian compensation, and participants in seven out of eight of our focus groups with residents expressed that lengthening service obligations would extend the amount of time they would not be paid comparably to their private sector civilian counterparts. Residents in our focus groups stated that lengthening active-duty service obligations would make residency training in a military hospital less attractive and would likely affect their decision to continue military service. Specifically, medical residents in most focus groups we held noted that lengthening service obligations would make them more likely to: fulfill their medical school active-duty service obligation by serving one or more tours as a General Medical Officer and then separate from the military in order to train in a civilian residency program; decline to participate in further medical training and specialization via a fellowship program within the military; and separate from the military sooner than planned, in part because a longer active-duty service obligation would delay their eligibility for certain special and incentive pays. Military department officials we interviewed expressed concern that lengthening active-duty service obligations, such as through a system of serving obligations consecutively, could encourage potential medical residents to choose shorter residency training programs over longer ones. However, participants in all eight focus groups we held with medical residents stated that the ability to train in a chosen medical specialty is more important than the length of the residency program, and a longer active-duty service obligation would not influence their chosen medical specialty. Further, residents who participated in our focus groups stated that the proposed reductions in authorizations—that is, funded positions—for certain medical specialties and associated reductions in residency program spots could negatively affect the attractiveness of residency training in a military setting. DOD has reduced authorizations for certain specialties based on our analysis of DOD’s Health Manpower Personnel Data System information and is considering additional reductions to the overall number of active-duty physicians as part of its budgeting process for fiscal years 2020-2024, including targeted reductions to certain specialties. For example, DOD reduced authorizations for the general pediatrics specialty by 40 percent from fiscal year 2015 through fiscal year 2018, and based on our surveys of medical students, 12 percent of scholarship recipients and 16 percent of University students in the clinical stage of medical school responded that they are interested in practicing the pediatrics specialty after they have completed all required training. Participants in all eight of our focus groups with residents commented that the ability to specialize in their medical specialty of choice was important when deciding to accept the scholarship or attend the University, and narrowing such opportunities would negatively affect the attractiveness of either program for future prospective participants. When reflecting on the proposal to reduce the range of available specialties, residents questioned their ongoing ability to practice their preferred specialty as an active-duty servicemember. In our focus groups, some residents expressed that this issue could play a role in their future decision to continue military service or separate and pursue civilian medical practice. DOD’s ability to recruit and retain the right numbers and types of physicians and dentists depends in part on the effectiveness of the package of incentives in which the department invests. To initially recruit these physicians and dentists, DOD relies on its scholarship program and University, which come with active-duty service obligations. Changes to the structure of its active-duty service obligations could affect recruitment and retention of physicians and dentists. Given that DOD spends millions of dollars annually to train medical and dental students to become fully trained physicians and dentists and that almost half of DOD’s special pay budget is dedicated to retaining them, consistently collecting information to help inform investment decisions is critical to ensuring the efficiency of these significant resources. For example, information on the replacement costs of physicians and dentists would help DOD make decisions about whether it is more cost effective to train or retain these personnel. Further, consistent collection of information on the extent to which eligible physicians and dentists accept retention bonuses will help DOD monitor the effectiveness of an incentive that represents a significant investment by DOD. Our comparison of military to private sector cash compensation highlighted that military physicians and dentists generally receive less cash compensation than their private sector civilian counterparts for most specialties we reviewed. This differential, according to DOD officials, is one factor that servicemembers consider in deciding whether to continue service in the military. However, while DOD and military department officials stated that they are aware of how prevailing private sector civilian wages for medical and dental specialties compare to military cash compensation, they do not consistently collect information on this matter and that its role in setting military cash compensation is limited. By collecting and using such information to inform investment decisions, DOD will have better information to efficiently and effectively meet its mission of providing health care during times of war and peace. We are making the following three recommendations to DOD: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the military departments, collect consistent information on the replacement costs of military physicians and dentists and use this information to inform investment decisions in the package of incentives to recruit and retain military physicians and dentists. (Recommendation 1) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the military departments, collect consistent information on current and historical retention data, to include data on the percentage of eligible physicians and dentists who accept retention bonuses, and use this information to inform investment decisions in the package of incentives to retain military physicians and dentists. (Recommendation 2) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the military departments, collect consistent information on private sector civilian wages and use this information to help inform investment decisions in the package of incentives to recruit and retain military physicians and dentists. (Recommendation 3) We provided a draft of this report to DOD for review and comment. DOD concurred with all three recommendations and noted that it will take actions to incorporate them into policy within the next two years. DOD’s comments are reprinted in appendix IV. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Office of the Assistant Secretary of Health Affairs, the Secretaries of the Army, the Navy, the Air Force, and the President of the Uniformed Services University of the Health Sciences. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or FarrellB@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report addresses the following objectives: 1. how compensation for military physicians and dentists compares to private sector civilians with comparable skills in 2017; 2. the extent to which the Department of Defense (DOD) has developed an approach to recruit and retain military physicians and dentists through a package of incentives that reflect key principles of effective human capital management; and 3. the perceptions of military medical students, residents, and DOD officials regarding active-duty service obligations, including their effect on recruitment and retention. For our first objective, we compared cash compensation for military physicians and dentists to comparable private sector civilian specialties, described the deferred and noncash benefits available to military physicians and dentists, and created estimates of the value of DOD’s retirement benefit for officers with varying current years of service. To compare cash compensation for military physicians and dentists to comparable private sector civilian specialties, we estimated military cash compensation and compared that to civilian compensation data reported in surveys by the American Medical Group Association and American Dental Association. Specialty selection. To select DOD physician and dental specialties that have private sector civilian equivalents, we began with the list of 44 physician and 11 dental specialties in DOD’s Fiscal Year 2018 Health Manpower Personnel Data System report. We selected 21 physician specialties in consideration of the following factors: a comparable private sector civilian specialty existed; the majority of the physician workforce was represented; deploying specialties were included; a balance of procedural, surgical, and other specialties was included, and; specialties identified as critically-short, trauma-related wartime specialties were included. We selected six dental specialties in consideration of the following factors: a comparable private sector civilian specialty existed, and private sector civilian compensation information was available. Estimates of military cash compensation. To estimate cash compensation for military physicians and dentists for our selected specialties, we reviewed DOD policy and guidance and relevant statutes to identify any current measures of cash compensation and other key elements of cash compensation for physicians and dentists. DOD’s measure of cash compensation, known as regular military compensation, includes the sum of basic pay, average basic allowance for housing, basic allowance for subsistence, and the federal income tax advantage that accrues from the nontaxable nature of the allowances. Another key element of cash compensation is the special and incentive pays that DOD offers to eligible military physicians and dentists, such as incentive pay, Board Certification Pay, and retention bonuses. We collected information on basic pay, basic allowance for housing, and basic allowance for subsistence for married personnel from DOD’s fiscal year 2017 Greenbook publication, and information on incentive pays, Board Certification Pay, and retention bonuses from DOD’s fiscal year 2017 Health Professions Officer Special and Incentive Pay Plan. We selected fiscal year 2017 because it was the most recent year of available data amongst all of our sources, and we selected married personnel because according to a DOD report, the majority of officers in the pay grades O-4 to O-6 are married, which largely aligns with DOD's population of physicians and dentists. We estimated a range—the minimum and maximum—of military cash compensation by specialty for pay grades O-3 to O-6. The minimum and maximum are based on two scenarios that represent a range of pay that specialized physicians and dentists can expect to receive, considering only the special and incentive pays listed in the Health Professions Officer Special and Incentive Pay Plan. The minimum includes regular military compensation, Board Certification Pay, and incentive pay. The maximum includes the regular military compensation, Board Certification Pay, and incentive pay at a higher amount in conjunction with a 4-year retention bonus. Our estimates represent the sum of basic pay, average basic allowance for housing, basic allowance for subsistence, special and incentive pays, and the federal tax advantage that accrues from the nontaxable nature of the allowances. To calculate the federal tax advantage, we used the 2018 federal tax tables and applied the 2018 federal tax standard deduction and then converted the calculated federal tax advantage to 2017 dollars. According to a senior DOD dental corps official, most general dentists are not board-certified and do not receive Board Certification Pay; we therefore omitted Board Certification Pay in our estimates for the minimum and maximum military cash compensation of general dentists. Private sector civilian cash compensation information. To identify private sector civilian cash compensation for physicians in comparable specialties, we chose the American Medical Group Association’s 2018 Medical Group Compensation and Productivity Survey—2018 Report Based on 2017 Data because (1) it included all the specialties we selected to review, and (2) it contained information on physicians who practiced in settings that were similar to those in which federal physicians practiced.The survey data provided compensation amounts for each specialty by 20th percentile, median, and 80th percentile. The data excluded the value of any employer-provided malpractice insurance, but some physicians may incur costs for this coverage. Military physicians generally do not need to purchase malpractice insurance. To identify private sector civilian cash compensation for dentists in comparable specialties, we chose the American Dental Association’s Health Policy Institute, Income, Gross Billings, and Expenses: Selected 2017 Results from the Survey of Dental Practice because (1) it included all the specialties we selected to review, and (2) included the net income of dentists and specialists in private practice, which is comparable to military dentists who generally do not need to purchase malpractice insurance. We obtained net income information for full-time practitioners—those who reported working 35 hours a week or more— from the American Dental Association. The survey data provided compensation amounts for each specialty by 25th percentile, median, and 75th percentile. Both surveys represent salaries for 2017. To help determine the reliability and accuracy of private sector civilian compensation information, we checked these data for reasonableness and the presence of any obvious or potential errors in accuracy and completeness. We believe the data are sufficiently reliable for the purpose of this report. Comparisons of military and private sector civilian cash compensation. We compared our estimates of the ranges of military cash compensation by specialty and pay grade to the ranges of private sector civilian cash compensation by specialty from our selected surveys. As we could not make direct comparisons of military and civilian cash compensation by years of service or experience due to data limitations, we compared and presented the ranges of compensation as appropriate. We also compared military cash compensation at the first unobligated year of service to the range of private sector civilian cash compensation, by specialty. We estimated military cash compensation at the first unobligated year of service based on the length of each residency and, if applicable, fellowship—among other assumptions. We identified physician residency and fellowship length information by using the Accreditation Council for Graduate Medical Education’s Data Resource Book for Academic Year 2017-2018, and we requested information on military residency lengths from military department officials to confirm that residency lengths generally aligned with this information. We identified dentist residency and fellowship length information by requesting it from military department officials. For each specialty, we estimated the officers’ pay grade using the following assumptions: (1) no creditable service before medical or dental school; (2) a 4-year medical or dental school duration; (3) participants were commissioned at the O-3 pay grade after medical or dental school completion with 4 years of constructive credit—in accordance with entry grade credit guidance outlined in DOD Instruction 6000.13; (4) the first year of post-graduate medical or dental education does not accrue an active-duty service obligation, and; (5) were promoted to O-4 at 6 years of service, and to O-5 at 12 years of service—in accordance with DOD’s promotion schedule outlined in DOD Instruction 1320.13. The entry grade credit and promotion schedule practices were confirmed by DOD officials. For physicians, we assumed that the active-duty service obligations for medical school and residency were served concurrently, in other words we assumed immediate entry into a residency program. We performed our calculations twice, first assuming no tour as a General Medical Officer and second assuming that physicians completed a 3-year tour as a General Medical Officer—adding 3 years to their years of service at service obligation fulfillment. According to Navy medical corps officials, 55 percent of Navy physicians perform such a tour. When assuming no General Medical Officer tour, the majority of physicians reached this decision point at the O-4 pay grade with the exception of neurosurgeons and cardiac/thoracic surgeons, who were at the O-5 pay grade due to longer residency and fellowship lengths. When assuming a 3-year General Medical Officer tour, physicians in 12 specialties reached this point at the O-5 pay grade, with the remaining nine specialties at the O-4 pay grade. We also conducted this analysis for Uniformed Services University of the Health Sciences (University) students who accrued a 7- year active-duty service obligation. We found that assuming a 7-year obligation for University students produced the same results as assuming a 3-year tour as a General Medical Officer for Health Professions Scholarship Program (scholarship) participants. For dentists, we assumed that the dental school and residency obligations were not served concurrently because, according to the military department Dental Corps Chiefs, dental student graduates typically complete a 1-year advanced education in general dentistry certificate, which does not incur a service obligation, then fulfill their dental school active-duty service obligation as general dentists before taking a general dentist’s retention bonus and beginning residency training. We completed an analysis to understand how the pay grade at the first year of unobligated service may vary for general dentists who worked as a general dentist immediately after completing dental school or completed a 1-year advanced education residency. We found that general dentists generally reached this decision point at the O-3 pay grade; endodontists, orthodontists, pedodontists, and periodontists reached it at the O-4 pay grade, and; oral and maxillofacial surgeons reached it at the O-5 pay grade. Estimates of retirement benefit. To develop estimates of the value of the defined benefit portion for DOD’s two retirement benefit programs— the Blended Retirement System (BRS) and the High-Three—we developed two scenarios for a hypothetical officer who either chose to remain in the High-Three System or to opt into the BRS. We used DOD’s publically-available, online retirement calculators to generate an estimate for each scenario, which Office of the Under Secretary for Personnel and Readiness officials described as the best available tools to determine the value of military retirement benefits. Specifically, the estimates were for a physician or dentist who was commissioned as an O-3 officer in 2015 and assumed separation from service at 20 years. For these scenarios, we developed reasonable estimates to enter into the calculators. For example, in the personal information section of the calculators we estimated the pay entry base date assuming that the officer began earning creditable years of service toward retirement after medical or dental school and that they began active-duty service as an officer at the O-3 pay grade in the month of June after the completion of medical or dental school. The calculators produced an estimate of the present value estimated retirement benefit at 20 years of service, which is when the defined benefit portion becomes effective. Estimates were as of August 2019 and included a specific value for the defined benefit. DOD’s publically available retirement calculators use a discount rate of 5 percent per year, as of July 2018. We also consulted with a senior DOD official from the Office of the Under Secretary for Personnel and Readiness to corroborate the reasonableness of our approach. To help determine the reliability and accuracy of DOD’s retirement calculators, we checked the data for reasonableness and the presence of any obvious or potential errors in accuracy and completeness and interviewed DOD officials knowledgeable about the data. We believe the data are sufficiently reliable for the purpose of this report. Description of deferred and noncash benefits. To describe deferred and noncash benefits available to military physicians and dentists, we reviewed our prior reports, other relevant research, and publically available reports and information from DOD. We interviewed cognizant DOD officials to understand which benefits military physicians and dentists were most likely to utilize. For our second objective, we reviewed pay plans, policies, and other documents developed by the Office of the Assistant Secretary of Defense for Health Affairs (OASD(HA)) and the respective military departments concerning DOD’s approach to recruitment and retention of military physicians and dentists. We also interviewed officials from OASD(HA) and the military departments concerning their decision-making processes in managing this package of incentives. We compared this information with seven key principles of effective human capital management, which was reported in our February 2017 report on military compensation. As we reported in that report, to identify key principles of effective human capital management, we reviewed a compilation of our body of work on human capital management, DOD’s Report of the Eleventh Quadrennial Review of Military Compensation, and the DOD Diversity and Inclusion Strategic Plan 2012 - 2017. The seven key principles of effective human capital management include (1) criteria for making human capital investments are clearly defined, well-documented, consistently applied, and transparent; (2) replacement costs of personnel are considered when deciding to invest in recruitment and retention programs; (3) decisions regarding human capital investments are based largely on expected improvement in agency results and implemented in a manner that fosters top talent; (4) unique staffing issues are identified and evaluated as part of establishing the incentive structure; (5) opportunities for improvement are identified and incorporated into the next planning cycle; (6) current and historical retention data are collected and reviewed as part of efforts to evaluate effects and performance of human capital investments; and (7) civilian wages are assessed and plans are updated as needed. In addition to using the key principles, we also compared aspects of DOD’s approach to recruitment and retention of military physicians and dentists with federal internal control standards, which state management should use quality information to achieve an entity’s objectives, and highlighted areas where DOD’s approach differed from these principles. For our third objective, to obtain perceptions of (1) military medical students, (2) residents, and (3) DOD officials regarding active-duty service obligations, including their effect on recruitment and retention, we utilized, respectively, (1) web-based surveys of military medical students, (2) focus groups with military medical residents, and (3) interviews with knowledgeable officials. Surveys. For our third objective, to obtain perceptions of military medical students regarding active-duty service obligations, including their effect on recruitment and retention, we conducted two web-based surveys with a generalizable sample of current scholarship and University medical students to obtain information on the students’ knowledge of the current program and willingness to accept different lengths of service obligations or a change to a consecutive service obligation model (see table 1). One survey was administered to current scholarship medical students, while the other was administered to current University medical students. The questions in both surveys were largely the same. The main differences reflected the different pay and benefits from accepting a scholarship or attending the University and the differences in length of active-duty service obligation. For example, scholarship students receive a monthly stipend and, sometimes, an accession bonus, while University students receive the pay and allowances for commissioned officers in the O-1 pay grade. Scholarship participants incur 6 months of an active-duty service obligation for each 6 months of scholarship benefits they receive, with a 2-year, minimum service obligation, while University medical students accrue a 7-year active-duty service obligation. A full listing of survey questions is provided in appendix III. We worked with our social science survey specialists to develop our survey questionnaires, applying generally accepted survey design standards. We conducted pretests of the survey with scholarship and University students who varied by number of years in medical school and military service. Pretesting is necessary to ensure common understanding of terms used and to minimize errors that might occur from respondents interpreting the questions differently than we intended. During each pretest, the subject was not provided the draft survey in advance, but instead was either provided the draft survey at the meeting, or the survey was emailed to the subject at the beginning of the teleconference. After the pretester completed the survey, we discussed all survey questions and response options with the pretester to ensure clarity. We revised the survey instruments based on the feedback we received during each of the pretests until clarity issues were reasonably addressed. We determined fourth-year medical students were less likely to participate in the survey for three reasons: (1) they were close to graduating from medical school at the time the survey instrument was launched; (2) they lose their school email addresses shortly after graduation; and (3) once they are out of medical school, they are further removed from the decision point about either accepting the scholarship or attending the University. Therefore, we excluded them from the sample population. Dental students were also excluded from the sample population because they generally practice as general dentists after graduating from dental school and before training in a residency program, which differs significantly from the career paths of scholarship and University medical students. We defined our target population to be all medical students in their first, second, or third school year under the scholarship program or enrolled at the University. By stratifying, as shown in table 1, the sample allowed us to estimate any population figure across the service with a predetermined statistical precision. We determined the target sample size needed to achieve precision levels of plus or minus 10 percentage points or fewer, at the 95 percent confidence level. We then increased the sample size within each stratum for an expected response rate of 25 percent. The resulting sample frame included 2,972 students, and we selected a stratified random sample of 1,355. We stratified the sampling frame into four mutually exclusive strata based on medical program and service. One survey was administered to current scholarship medical students from June 26, 2019 through August 26, 2019; the survey of current University medical students was administered from June 25, 2019 through August 6, 2019. We created two administrative email accounts, one for scholarship medical students and one for the University medical students, through which we sent an announcement email to the medical students in our sample population. We administered the survey through a web-based application and sent an email from the administrative email accounts stating that the survey was ready to complete. When we received bounce-back messages, we used secondary email addresses if available or called students to request updated contact information. To maximize our response rate, we sent two reminder emails and contacted nonrespondents by telephone to encourage them to complete the survey. Also, we took steps in the development of the survey, data collection, and data analysis to minimize nonsampling errors and help ensure the accuracy of the answers that were obtained. For example, a social- science survey specialist helped to design the questionnaire, in collaboration with analysts having subject-matter expertise. Then, as noted earlier, the draft questionnaire was pretested to ensure that questions were relevant, clearly stated, and easy to comprehend. Our unweighted survey response rate was 60.5 percent for scholarship students and 80 percent for University students, with 624 and 259 respondents, respectively. Per Office of Management and Budget (OMB) Standards and Guidelines for Statistical Surveys, a nonresponse bias analysis should be conducted for a survey with a response rate less than 80 percent (Guideline 3.2.9). The response rate for the survey of University students met this threshold, and we did not assess the potential for nonresponse bias. With respect to scholarship students, after conducting an analysis of propensity of responding to the survey to identify potential sources of nonresponse bias, we identified differential student response patterns by military department and marital status. We developed sampling weights based on the population size, divided by the number of sample students within each stratum. Weights were adjusted for overall nonresponse in University students and nonresponse by military department and marital status among scholarship students so that statistical estimates for survey response percentages are generalizable to the population of students. We expressed the precision of our particular sample’s survey responses as a 95 percent confidence interval. This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. As a result, we were 95 percent confident that each of the confidence intervals in this report included the true percentages of survey responses in the study population. All survey response percentage estimates presented in this report from this survey had a margin of error of plus or minus 6 percentage points or fewer, unless otherwise noted. Focus groups. We also conducted eight focus group meetings with a nongeneralizable sample of 79 military medical residents at three military treatment facilities to obtain the perspectives of military medical residents on issues related to: (1) the nature of active-duty service obligations, including their willingness to accept different lengths of active-duty service obligations; (2) the relative importance of the service obligations in relation to other factors at different decision points, including accepting the scholarship or attending the University; (3) participating in a military residency program, and; (4) choosing a medical specialty to pursue. These meetings involved structured small-group discussions designed to gain more in-depth information about specific issues that cannot easily be obtained from single or serial interviews. Consistent with typical focus group methodologies, our design included multiple groups with varying characteristics but some similarity in experience and responsibility. To identify focus group participants, we considered gender, number of residents who had accepted the scholarship or attended the University, medical specialties, military department affiliation, number of years in a military residency training program, and prior service as a General Medical Officer. The focus groups involved a range of seven to 15 participants during each meeting. We did not select participants using a statistically-representative sampling method, so the information collected from the focus groups is not generalizable and, therefore, cannot be projected across DOD, a military department, or any single military treatment facility we visited. The eight focus group sessions included two pilot focus groups at Walter Reed National Military Medical Center and two sessions for each of the three military departments (Army, Navy, and Air Force). To identify the focus group locations, we selected military treatment facilities that included a diverse mix of medical specialties and a large pool of residents from which to select participants in order to ensure sufficient participation in the focus groups. We traveled to military treatment facilities in Bethesda, Portsmouth, and San Antonio to conduct the focus groups. Table 2 illustrates the total number of focus group participants categorized by military treatment facility, military department, and whether they accepted the scholarship or attended the University. To conduct the focus groups, one of our trained facilitators moderated each of the sessions, following a protocol that included discussion guidelines and a set of eight questions (see table 3). The focus group protocol was validated by one of our methodologists with a social science background and knowledge of small group methods. The same focus group protocol was used at all military treatment facilities the engagement team visited, with some minor modifications made after the pilot sessions at Walter Reed National Military Medical Center. We assured participants that their names would not be directly linked to their responses, and that the results would generally be reported in the aggregate. Because of the limitations on the use of data derived from the focus group meetings, including the nongeneralizable sample and results reported in the aggregate, we did not rely entirely on focus groups, but rather used several different methodologies to corroborate and support our conclusions, including web-based surveys with medical students who either accepted the scholarship or attended the University, and interviews with DOD officials. We performed a content analysis on the responses to identify common themes from across the responses to determine their frequencies. For the qualitative analysis, we developed a standard coding scheme to identify common themes and determine their frequencies. We also identified other themes that we determined to be important based on our surveys with scholarship and University medical students and interviews with DOD officials. To obtain information concerning military dental residents’ views, perceptions, and feelings on issues related to the nature of active-duty service obligations, including their willingness to accept different lengths of service obligations and a change from a concurrent to a consecutive model of service obligation fulfillment, we conducted two focus group sessions with 20 Air Force dental residents who were in training at the Air Force Postgraduate Dental School, Joint Base San Antonio. The focus group participants had previously accepted the scholarship and varied by gender, rank, prior military service, dental specialty, and number of years in dental residency training. These discussions were conducted using a method and protocol that was similar to the approach for the medical students. After analyzing the results of these two focus groups with military dental residents and taking into consideration the interviews we conducted with DOD officials, we determined it was not necessary to conduct further focus groups with military dental residents or include dental students in our survey of current scholarship students. Dental students’ career paths differ in significant ways from medical students’ career paths. According to DOD officials and residents in the dental focus groups, military dentists are generally already serving consecutive service obligations by fulfilling their active-duty service obligation from dental school while serving as general dentists before training in a military residency program. As a result, a change from a concurrent to a consecutive service obligation model may not affect military dentists in a similar way that it would military physicians. Interviews. In addition, we conducted interviews with relevant DOD officials to understand their position on the effect of the length of active- duty service obligations on recruitment and retention of military physicians and dentists. Specifically, we interviewed officials from the Office of the Assistant Secretary of Defense for Health Affairs; the Office of the Under Secretary of Defense for Personnel and Readiness; the Defense Health Agency, and; various areas within the military departments with responsibilities related to medical or dental corps recruitment, retention, and education, such as the Offices of the Surgeons General, Manpower and Reserve affairs, and medical and dental corps or commands. We conducted this performance audit from September 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Cash Compensation of Specialized Military Physicians and Dentists Compared to Private Sector Civilians, 2017 percentile) percentile) Below 20th percentile Below 20th percentile median percentile) percentile) Below 20th percentile Below 20th percentile median percentile) percentile) Below 20th percentile Below 20th percentile median percentile) percentile) Radiology- Diagnostic (Interventional) Radiology- Diagnostic (Non-Interventional) The American Medical Group Compensation and Productivity Survey information represents the total annual compensation of the physician, including base and variable compensation plus all voluntary salary reductions. Examples of total compensation would include, but are not limited to, the following: compensation paid as salary or production-based compensation plans, any type of additional bonuses or incentives, clinically-related medical directorships, call coverage, and ancillary or advanced practice clinical supervision stipends. Compensation excludes any fringe benefits and employer payments to any type of retirement, pension, Supplemental Executive Retirement Plan, or tax-deferred profit-sharing plan. compensation (25th percentile, median, 75th percentile) percentile) Below 25th percentile Below 25th percentile below median compensation (25th percentile, median, 75th percentile) percentile) The American Dental Association, Health Policy Institute, Survey of Dental Practice information represents the reported annual net income of specialists in private practice, 2017. We obtained net income information for full-time practitioners—who reported working 35 hours a week or more—from the American Dental Association (ADA). Payments toward a retirement plan are included in net income. We conducted two web-based surveys with a generalizable sample of current Health Professions Scholarship Program (scholarship) and Uniformed Services University of the Health Sciences (University) medical students to obtain information about the students’ knowledge of the current program and willingness to accept different lengths of service obligations or a change to a consecutive service obligation model. One survey was administered to current scholarship medical students from June 26, 2019 through August 26, 2019; the survey of current University medical students was administered from June 25, 2019 through August 6, 2019. The questions in both surveys were largely the same. The main differences reflected the different pay and benefits from accepting a scholarship or attending the University and the differences in length of active-duty service obligation. The survey provided to scholarship students also included questions about whether students considered attending the University, while the survey provided to University students did not include a question about whether they considered accepting the scholarship. As a result, the scholarship survey had additional questions than the University survey. Responses to selected questions we asked in the surveys that were directly applicable to the research objectives in this report are shown below. The surveys consisted of closed- and open- ended questions, including demographic questions that were used in our analyses of the students’ responses. In this appendix, we did not provide information on responses provided to the open-ended or the demographic questions. See appendix I for a full description of the survey and estimation methodologies. The U.S. Government Accountability Office (GAO), an agency of the United States Congress, is studying the active-duty service obligation associated with the Armed Forces Health Professions Scholarship Program (HPSP) and the Uniformed Services University of the Health Sciences (USUHS). As a part of this study, GAO is conducting a nationwide survey of medical students who are participating in the HPSP or attending USUHS. We appreciate your insights, as it is important for GAO to provide student views of the current program to the Congress. Question 1 - How much did the following factors contribute to your decision to accept the HPSP scholarship? 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval - upper bound (percentage) NA e. Desire to provide care to military personnel, dependents, and retirees f. Desire to provide medical care while deployed g. Other (please specify below) Generally, participants in the HPSP incur a 1-year active-duty service obligation for each year of HPSP scholarship accepted. Similarly, a military residency may also result in an active- duty service obligation of 1 year for each year of residency. Currently, these two sets of obligationsare served at the same time, so a servicemember will effectively serve the longer of the two obligations. Residencies vary in length, and result in different service obligations. One example would be that a service member accepts 4 years of HPSP funding, requiring a 4-year active-duty service obligation, AND completes a 4-year military residency, which requires a 3-year active-duty service obligation. A 4-year military residency only requires a 3-year active-duty service obligation because the intern year or first year of residency does not result in a service obligation. Under the current system, this servicemember would serve both obligations (4 years and 3 years) at the same time. Completion of the first 3 years would satisfy the residency obligation and 3 of the 4 years of HPSP obligation; the final 1 year would satisfy the remaining HPSP obligation. Question 3 - When you decided to accept an HPSP scholarship, how familiar were you, if at all, with the active-duty service obligation requirements for HPSP and for completing a military residency? 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval - upper bound (percentage) a. An additional 1-year service obligation for 4 years of HPSP (1.25 years of commitment for each year of funding)? (No change in the service obligation for the medical residency.) (CHECK ONLY ONE ANSWER) No Don’t Know b. An additional 2-year service obligation for 4 years of HPSP (1.5 years of commitment for each year of funding)? (No change in the service obligation for the medical residency.) (CHECK ONLY ONE ANSWER) Additional service obligations and incentives c. An additional 1-year service obligation for 4 years of HPSP AND additional cash incentives? (No change in the service obligation for the medical residency.) (CHECK ONLY ONE ANSWER) 28.3 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval - upper bound (percentage) d. An additional 2-year service obligation for 4 years of HPSP AND additional cash incentives? (No change in the service obligation for the medical residency.) (CHECK ONLY ONE ANSWER) e. Service obligations served one after the other? For example, a service obligation for 4 years of medical school with the HPSP scholarship and a 4 year military residency have two service obligations – 4 years for HPSP and 3 years for the residency. Service obligations served one after the other in this example would result in a term of 7 years. (CHECK ONLY ONE ANSWER) f. A 4-year active-duty commitment AND a 2-year selected reserve commitment? Currently, HPSP participants may be subject to an individual ready reserve commitment after the completion of their active-duty service obligation. With a selected reserve commitment, reservists typically drill about 1 weekend a month and 2 weeks a year, and may be activated in support of military operations. (CHECK ONLY ONE ANSWER) If ‘No’ or ‘Don’t Know’ to Questions 5a, 5b, 5c, 5d, 5e, or 5f Which of the following funding options, if any, would you have pursued instead of accepting the HPSP scholarship? (CHECK ALL THAT APPLY) Personal or family resources Yes National Health Service Corps Scholarship Program None - would not have attended medical school Other (please specify) The U.S. Government Accountability Office (GAO), an agency of the United States Congress, is studying the active-duty service obligation associated with the Armed Forces Health Professions Scholarship Program (HPSP) and the Uniformed Services University of the Health Sciences (USUHS). As a part of this study, GAO is conducting a nationwide survey of medical students who are participating in the HPSP or attending USUHS. We appreciate your insights, as it is important for GAO to provide student views of the current program to the Congress. Question 1 - How much did the following factors contribute to your decision to attend USUHS? 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – upper bound (percentage) a. Desire to avoid or reduce medical school debt b. Officer pay while in school c. Desire to serve your country in the armed forces 34.1 95 Confidence Interval – lower bound (percentage) Very Great Contribution Substantial Contribution Some Contribution Little or No Contribution h. Other (please specify below) The active-duty service obligation for completing the 4-year program at USUHS is 7 years. A military residency also results in an active-duty service obligation of 1 year for each year of residency, with the exception of the first year or intern year, which does not result in an active duty service obligation. Currently, these obligations are served at the same time, so a servicemember will serve the longer of the two obligations. Residencies vary in length and result in different service obligations. An example would be that a servicemember completes medical school at USUHS, which requires a 7-year active-duty service obligation, AND completes a 4-year military residency, which requires a 3-year active- duty service obligation. A 4-year military residency only requires a 3-year active-duty service obligation because the intern year or first year of residency does not result in a service obligation. Under the current system, this servicemember would serve both obligations (7 years and 3 years) at the same time. Completion of the first 3 years would satisfy the residency obligation and 3 of the 7 years of USUHS obligation; the next 4 years would satisfy the remaining USUHS obligation. Question 2 - When you decided to attend USUHS, how familiar were you, if at all, with the active- duty service obligation requirements for attending USUHS and for completing a military residency? 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – upper bound (percentage) Question 3 - When you decided to attend USUHS, how familiar were you with the fact that the medical school and military residency service obligations are served at the same time? (CHECK ONLY ONE ANSWER) 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – upper bound (percentage) a. An additional 1-year service obligation for attending USUHS? (No change in the service obligation for the medical residency.) 71.8 23.3 b. An additional 2-year service obligation for attending USUHS? (No change in the service obligation for the medical residency.) No Don’t Know Additional service obligations and incentives c. An additional 1-year service obligation for attending USUHS AND additional cash incentives? (No change in the service obligation for the medical residency.) NA 19.4 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – upper bound (percentage) d. An additional 2-year service obligation for attending USUHS AND additional cash incentives? (No change in the service obligation for the medical residency.) No Don’t Know e. Service obligations served one after the other? For example, a service obligation of 7 years for attending USUHS and a 4- year military residency has two service obligations – 7 years for USUHS and 3 years for the residency. Service obligations served one after the other in this example would result in a term of 10 years. f. A 7-year active-duty commitment FOLLOWED BY a 2-year selected reserve commitment? Currently, USUHS graduates may be subject to an individual ready reserve commitment after the completion of their active-duty service obligation. With a selected reserve commitment, reservists typically drill about 1 weekend a month and 2 weeks a year, and may be activated in support of military operations. (No change in the service obligation for the medical residency) If ‘No’ or ‘Don’t Know’ to Questions 4a, 4b, 4c, 4d, 4e, or 4f Which of the following funding options, if any, would you have pursued instead of attending USUHS? (CHECK ALL THAT APPLY) National Health Service Corps Scholarship Program 19.0 95 Confidence Interval – lower bound (percentage) 95 Confidence Interval – upper bound (percentage) In addition to the contact named above, Lori Atkinson (Assistant Director), Adam Howell-Smith (Analyst in Charge), Taylor Bright, Timothy Carr, Breanne Cave, Alexandra Gonzalez, Caitlin Jackson, Ronald La Due Lake, Won (Danny) Lee, Kirsten Leikem, Amie Lesser, Amanda Miller, Dae B. Park, Stephanie Santoso, and Lillian Yob made key contributions to this report. Defense Health Care: DOD's Proposed Plan for Oversight of Graduate Medical Education Programs. GAO-19-338. Washington, D.C.: March 28, 2019. Defense Health Care: Actions Needed to Determine the Required Size and Readiness of Operational Medical and Dental Forces. GAO-19-206. Washington, D.C.: February 21, 2019. Military Personnel: DOD Needs to Improve Dental Clinic Staffing Models and Evaluate Recruitment and Retention Programs. GAO-19-50. Washington, D.C.: December 13, 2018. Military Personnel: Additional Actions Needed to Address Gaps in Military Physician Specialties. GAO-18-77. Washington, D.C.: February 28, 2018. Defense Health Reform: Steps Taken to Plan the Transfer of the Administration of the Military Treatment Facilities to the Defense Health Agency, but Work Remains to Finalize the Plan. GAO-17-791R. Washington, D.C.: September 29, 2017. Military Compensation: Additional Actions Are Needed to Better Manage Special and Incentive Pay Programs. GAO-17-39. Washington, D.C.: February 3, 2017. Defense Health Care Reform: DOD Needs Further Analysis of the Size, Readiness, and Efficiency of the Medical Force. GAO-16-820. Washington, D.C.: September 21, 2016. Defense Health Care: Actions Needed to Help Ensure Full Compliance and Complete Documentation for Physician Credentialing and Privileging. GAO-12-31. Washington, D.C.: December 15, 2011. Military Cash Incentives: DOD Should Coordinate and Monitor Its Efforts to Achieve Cost-Effective Bonuses and Special Pays. GAO-11-631. Washington, D.C.: June 21, 2011. Military Personnel: Status of Accession, Retention, and End Strength for Military Medical Officers and Preliminary Observations Regarding Accession and Retention Challenges. GAO-09-469R. Washington, D.C.: April 16, 2009.", "summary": "DOD invests in a number of incentives to recruit and retain its nearly 15,000 military physicians and dentists, such as providing a tuition-free education to medical and dental students who in return agree to serve as military physicians or dentists for a specific amount of time. Section 597 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review military physicians' and dentists' compensation, among other things. This report addresses, among other objectives, (1) how compensation for military physicians and dentists compared to private sector civilians with comparable skills in 2017, and (2) the extent to which DOD has developed an approach to recruit and retain military physicians and dentists through a package of incentives that reflect key principles of effective human capital management. GAO compared military and civilian cash compensation for 2017—the most recent year of data amongst data sources, assessed incentive packages against key principles of human capital management, and conducted surveys and held focus groups to obtain the perspectives of current military medical students and residents regarding military service obligations. In 2017, cash compensation for military physicians and dentists in most of the 27 medical and dental specialties GAO reviewed was generally less than the median compensation of private sector civilians, but the Department of Defense (DOD) provides substantial deferred and noncash benefits, such as retirement pensions and tuition-free education, whose value to servicemembers is difficult to determine. GAO found that for 21 of the 27 physician and dental specialties, the maximum cash compensation was less than the private sector civilian median within four officer pay grades (O-3 to O-6) (see figure for number of physician specialties by pay grade). Moreover, cash compensation for military physicians and dentists was less than the private sector civilian median at key retention points, such as after physicians and dentists fulfill their initial active-duty service obligations. DOD recruits and retains physicians and dentists through a package of incentives, including tuition-free medical or dental school and special and incentive pays, such as multi-year retention bonuses. However, DOD does not consistently collect information related to the following three key principles of effective human capital management to help inform investment decisions in its package of recruitment and retention incentives: Replacement costs . DOD does not consistently collect information on replacement costs of military physicians and dentists. However, DOD has previously identified replacement costs as a factor in assessing the appropriateness of incentive pays. Current and historical retention information . DOD does not consistently collect information on retention of physicians and dentists, specifically acceptance rates for retention bonuses, to help assess the effectiveness of these bonuses. Private sector civilian wages. DOD does not consistently collect information on private sector civilian wages. Officials stated that civilian wages are not a driving factor when considering adjustments to special and incentive pays, in part because DOD cannot always match civilian sector compensation for military physicians and dentists. By collecting and using this information to help inform its decision-making, DOD would be better positioned to assess the effectiveness of its incentives to recruit and retain military physicians and dentists and make sound investment decisions for the future. GAO recommends that DOD should collect and use information on (1) replacement costs of military physicians and dentists, (2) retention, and (3) private sector civilian wages to inform its investment decisions. In commenting on a draft of this report, DOD concurred with these recommendations.", "document_type": "gao"}
{"report": "There are a number of organizations within DOD with responsibility for preventing, responding to, and resolving incidents of child abuse, including child-on-child abuse, as described below. Under Secretary of Defense for Personnel and Readiness. The Under Secretary of Defense for Personnel and Readiness collaborates with DOD component heads to establish programs and guidance to implement the FAP, among other things; it also programs, budgets, and allocates funds and other resources for the FAP. The Assistant Secretary of Defense for Manpower and Reserve Affairs, under the authority of the Under Secretary of Defense for Personnel and Readiness, provides policy, direction, and oversight to the FAP. The Assistant Secretary of Defense for Manpower and Reserve Affairs, through the Deputy Assistant Secretary of Defense for Military Community and Family Policy, is also responsible for collaborating with service Secretaries to monitor compliance with FAP standards. The Defense State Liaison Office, located within the Office of the Deputy Assistant Secretary of Defense for Military Community and Family Policy, is responsible for assisting with the passage of state bills that affect key issues within the department, such as the reporting of child abuse. DOD Family Advocacy Program. DOD FAP serves as the policy proponent for, and a key element of, DOD’s coordinated community response system to prevent and respond to reports of child abuse, domestic abuse, and problematic sexual behavior in children and youth in military families. The FAP, among other things, provides trauma- informed assessment, rehabilitation, and treatment to persons who are involved in alleged incidents of child abuse, domestic abuse, and problematic sexual behavior in children and youth who are eligible to receive treatment in a military treatment facility. To execute these responsibilities, DOD funds over 2,000 positions in the department to deliver FAP services, including credentialed and licensed clinical providers. The department prescribes uniform standards for all service FAPs through DOD Manual 6400.01, Volume 1, FAP Standards. DOD uses these standards to promote public awareness; aid in prevention, early identification, reporting, and coordinated, comprehensive intervention and assessment; and to support victims of child abuse and domestic abuse. DOD revised these standards in July 2019 to include the same support and services for children exhibiting or affected by problematic sexual behavior. Military Service Family Advocacy Programs. Each military department Secretary is responsible for developing service-wide FAP policy that addresses any unique requirements for their respective installation FAPs. The department Secretaries are also responsible for requiring that all installation personnel receive the appropriate training to implement the FAP standards. In addition, each service has a FAP headquarters entity that develops and issues implementing guidance for the installation FAPs for which they provide oversight. At the installations, commanders are to establish an installation Family Advocacy Committee with a chairperson that serves as the policy implementing, coordinating, and advisory body to address child abuse and domestic abuse at the installation. Military Criminal Investigative Organizations and Military Police. The Department of Defense Inspector General establishes policy, provides guidance, and monitors and evaluates program performance for all DOD activities relating to criminal investigations and military law enforcement programs, including coordination with DOJ. Military law enforcement organizations include both military police and military criminal investigative organizations. Each military department has established a military criminal investigative organization that may initiate investigations on incidents with a DOD nexus, such as if a crime occurred on a military installation or involved military personnel or dependents. The military departments’ military criminal investigative organizations are the Army Criminal Investigation Command, Naval Criminal Investigative Service, and Air Force Office of Special Investigations. Each military criminal investigative organization provides an element of DOD’s special victim investigation and prosecution capability. DOD defines special victims as adults or children who are sexually assaulted or suffer aggravated assault with grievous bodily harm. A special victim investigation and prosecution designation allows the military criminal investigative organizations to assign specially trained investigators who work collaboratively with other relevant trained personnel, such as Judge Advocates and FAP managers, to provide services to the victim. While military criminal investigative organizations can investigate any crime with a DOD nexus—within their investigative purview—officials from each organization stated that they primarily investigate serious felony-level offenses and any type of sexual offense. Military police that provide services at military installations primarily serve as first responders to incidents and will notify a military criminal investigative organization for more serious incidents requiring an investigation, according to service officials. DOD Office of the General Counsel and Service Judge Advocates. The DOD Office of General Counsel provides advice to the Secretary of Defense regarding all legal matters and services performed within, or involving, DOD. The DOD Office of General Counsel also provides for the coordination of significant legal issues, including litigation involving DOD and other matters before DOJ. Each military department also has a Judge Advocate General’s Corps that establishes legal offices (Offices of the Staff Judge Advocate) which, among other things, serve as prosecutors and defense counsel at courts-martial; provide legal assistance to eligible personnel on personal, civil, and legal matters; advise commanders on military justice and disciplinary matters; and provide legal advice to military investigative agencies. In addition, any person identified as the victim of an offense under the Uniform Code of Military Justice (or in violation of the law of another jurisdiction if any portion of the investigation is conducted primarily by the DOD components) is to be notified of their rights under DOD’s Victim and Witness Assistance Program, informed about the military justice process, and provided other services to support the victim or witness and their family. DOD Education Activity. DODEA operates as a DOD field activity under the Office of the Under Secretary of Defense for Personnel and Readiness. It is a federally-operated school system that is responsible for planning, directing, and managing prekindergarten through 12th grade educational programs for DOD. All DODEA personnel are designated as mandatory reporters of child abuse and are required to participate in the early identification of child abuse and the protection of children, including the prompt reporting of alleged child abuse or any information that gives reason to suspect child abuse. FAP is responsible for several child abuse prevention programs across the services. For example, the New Parent Support Program offers intensive home visiting services on a voluntary basis to expectant parents and parents with young children. Officials target the program toward families who display some indicators of being at risk for child abuse or who have been assessed and determined as at risk for child abuse. All FAP personnel are mandated reporters to state child welfare service agencies for all allegations of child abuse. In addition, the service FAPs, at every military installation where families are located, work with the other entities within the coordinated community response, including civilian social services agencies and law enforcement, to provide comprehensive prevention and response to maltreatment. According to service FAP officials, while each service FAP has a domestic abuse victim advocate program that serves domestic abuse victims as well as non-offending parents in child abuse incidents, specific prevention efforts vary across installations and services. For example, the Air Force FAP is taking steps to track the effectiveness of FAP treatment programs to strengthen prevention efforts. Through the Navy FAP’s victim advocate program, non-offending parents are connected with resources from initial referral to case closure—or until the non-offending parent no longer desires services—that include potential prevention techniques, such as establishing a strong support system. The Marine Corps initiated evaluation of prevention programs and uses evidence-informed curricula to provide parenting education and support, according to Marine Corps officials. The Army has begun to operationalize combined parent-child cognitive behavior therapy to address the needs of children and families at risk for child physical abuse through child interventions, parent strategies to address child trauma, and family interventions. At one Army installation, a FAP official described a puppet show aimed at teaching children about appropriate and inappropriate behaviors as part of prevention efforts related to problematic sexual behavior in children and youth. Other DOD organizations also have roles related to prevention. For example, child development centers located on installations have a number of child abuse prevention measures, including visual access throughout activity rooms used for care, closed circuit television, identification checks and badges for all visitors, and a system to indicate which staff members are cleared to be alone with children, such as a system of colored smocks. In addition, all personnel on military installations who work with children, including those at DODEA schools, child development centers, and child and youth centers, must pass a background check as a condition of employment, among other things. Each military installation with a FAP has an Incident Determination Committee (IDC) that reviews reported incidents of child abuse and domestic abuse to determine whether they meet DOD’s criteria for abuse. Per DOD guidance, every reported incident of abuse or neglect must be presented to the IDC unless there is no possibility that the incident could meet any of the criteria for abuse or neglect. Physical abuse, emotional abuse, and neglect each have two primary associated criteria: (a) an act or failure to act, and (b) physical injury or harm, or the reasonable potential for physical injury or harm; psychological harm, or the reasonable potential for psychological harm; or stress-related somatic symptoms resulting from such act or failure to act. Any act of child sexual abuse that is found to have occurred under part (a) is automatically considered to have had a significant impact on the child, which is the criterion for part (b); therefore, the IDC only considers part (a) for incidents of child sexual abuse, and if the IDC determines the act occurred, then the incident is found to have met criteria. Voting members of the IDC include: the deputy to the installation commander (Chair); the senior noncommissioned officer advisor to the installation commander; representatives from the servicemember’s command, the Staff Judge Advocate’s office, and military police; and the FAP manager or FAP supervisor of clinical services. According to DOD policy, the IDC may request that additional personnel, such as medical personnel and military criminal investigative organizations, attend the IDC when necessary to provide input on incidents and to answer any questions about the results of a medical examination or an investigation. IDC members review what is known about the incident, and then the voting members vote to determine if an incident meets each of DOD’s criteria for abuse. The final incident determination is made by a simple majority vote, and the IDC Chair serves as the tiebreaker in the event of a tie. The IDC’s decision is communicated to the servicemember via the servicemember’s command. IDC determinations may be reconsidered. The appeal request and response processes vary by service. In August 2016, DOD issued guidance standardizing the IDC process across the services. According to DOD officials, prior to this, each service had a similar but distinct process for determining whether abuse occurred. According to a DOD report, the IDC is to be a clinical, not a disciplinary, process. The IDC is separate and distinct from any law enforcement or military criminal investigative organization process. Each incident that is presented to the IDC is also discussed at a clinical case staff meeting, which is made up of personnel from the FAP, among others. During the clinical case staff meeting—which can occur before or after the IDC makes its determination, according to DOD officials— attendees generate clinical recommendations for support services and treatment for victims and offenders of child abuse who are eligible for treatment at a military medical treatment facility, and ongoing coordinated case management. DOD FAP officials stated that treatment is not dependent on an IDC’s determination, meaning that the FAP may still provide support services to the family even if the IDC finds that a reported incident does not meet DOD’s criteria for abuse. The Executive Office for United States Attorneys provides general executive assistance and supervision to the Offices of the United States Attorneys, including evaluating their performance, making appropriate reports and inspections, and taking corrective action when needed. The Executive Office for United States Attorneys also serves as a liaison between DOJ and the 93 United States Attorneys located across the 50 states, the District of Columbia, and some U.S. territories. United States Attorneys serve as the nation’s principal litigators and work under the direction of the Attorney General to prosecute crimes, including some crimes that occur on some military installations. When cases from military installations are referred to a United States Attorney’s office for prosecution, they can be accepted, referred, or declined. The case can be declined for prosecution for several reasons: (1) it may not constitute a federal offense, (2) there is insufficient evidence to obtain a conviction, (3) prosecution would not serve a substantial federal interest, (4) the individual may be prosecuted in another jurisdiction, or (5) there is another adequate noncriminal alternative to prosecution. DOJ’s Criminal Division comprises multiple sections, including the Child Exploitation and Obscenity Section and the Human Rights and Special Prosecutions Section, both of which have responsibility for resolving crimes occurring on overseas military installations. The mission of the Child Exploitation and Obscenity Section is to protect child welfare and communities by enforcing federal criminal statutes relating to the exploitation of children and obscenity. The Human Rights and Special Prosecutions Section primarily investigates and prosecutes cases against human rights violators and other international criminals. The Office of Juvenile Justice and Delinquency Prevention within DOJ’s Office of Justice Programs provides national leadership, coordination, and resources to prevent and respond to juvenile delinquency and victimization. The Office supports the efforts of states, tribes, and communities to develop and implement effective and equitable juvenile justice systems that enhance public safety, ensure youth are held appropriately accountable to both crime victims and communities, and empower youth to live productive, law-abiding lives. In addition to DOD and DOJ, there are also community partners that assist in responding to and resolving incidents of child abuse, including child-on-child abuse. Depending on the military installation, there may be local memorandums of agreement or understanding between the installation and community partners, such as CACs, child welfare agencies, and civilian law enforcement that help guide the response to and reporting of these incidents. The National Children’s Alliance and Children’s Advocacy Centers. The National Children’s Alliance is the national association and accrediting body for a network of approximately 900 CACs with locations in all 50 states and the District of Columbia. CACs provide a child-focused environment to conduct child forensic interviews and medical exams, which are then reviewed by a multi-disciplinary team that includes medical personnel, law enforcement, mental health personnel, legal personnel, victim advocates, and state child welfare agencies. The purpose of the multi-disciplinary team is to determine how to best support the child, such as through therapy, courtroom preparation, and victim advocacy. State and local child welfare agencies and civilian law enforcement. Each state or locality has a public child welfare agency that is responsible for receiving and investigating reports of child abuse, as well as assessing the needs of children and their families. This could include removing a child from an abusive home or providing support services to families in need. These agencies are governed by state laws that define child protection roles and processes. The administrative framework for child welfare services and programs vary by state, but all are responsible for compliance with state and applicable federal requirements. For example, states that accept federal funding under the Child Abuse Prevention and Treatment Act must meet the statutory requirements of the Act. Civilian law enforcement organizations are also key to ensuring the welfare of children. In general, civilian law enforcement organizations act as first responders to incidents and may provide a variety of services from reporting the abuse to the appropriate child welfare agency to conducting an investigation of the incident. As of 2018, DOD occupied varying legislative jurisdictions throughout the 26.9 million acres of land at 4,775 sites worldwide for which it is responsible. Military installations may consist of one or more sites. In the United States, military installations have one of four types of legislative jurisdiction—or, depending on the installation, multiple types of jurisdiction—that, among other things, helps determine the proper adjudication venue for any criminal offenses committed on the property of the installation. The four types of jurisdiction are described below. Exclusive federal jurisdiction gives the federal government sole authority to adjudicate criminal misconduct. Exclusive federal jurisdiction exists when the federal government elected to reserve authority at the time the real property was granted to the state, or when the state transferred real property to the federal government and failed to reserve jurisdictional authority as part of the transfer. Concurrent jurisdiction applies when both the state and the federal governments retain all authority to adjudicate criminal misconduct. In the event of a conflict, the federal government prevails under the Supremacy Clause of the Constitution. Partial jurisdiction applies when both the state and the federal government have some legislative authority, but neither one has absolute power. The sharing of authority is not exclusive to adjudication of criminal misconduct and federal supremacy applies in the event of a conflict. Proprietary jurisdiction applies to instances where the federal government has virtually no legislative authority. The only federal laws that apply are those that do not rely upon federal jurisdiction, such as espionage, bank robbery, tax fraud, and counterfeiting; the federal government maintains immunity and supremacy for inherently governmental functions. An installation commander can exclude civilians from the area pursuant to his or her inherent authority. The installation’s jurisdiction as well as the status of the alleged offender (civilian or servicemember) determines which venue will adjudicate the incident. For example, if a servicemember commits a crime in exclusive federal jurisdiction, the adjudication would likely fall under the Uniform Code of Military Justice. If a civilian commits a crime in exclusive federal jurisdiction, he or she may be prosecuted under federal law through the appropriate United States Attorney’s Office. However, if a civilian commits a crime in concurrent or proprietary jurisdiction, he or she may be prosecuted by the state. The age of the accused is also an important consideration because the intent of federal laws concerning juveniles is to help ensure that state and local authorities will deal with juvenile offenders whenever possible. Exclusive federal jurisdiction may be relinquished in part or completely to a state, and this action is referred to as the retrocession of jurisdiction. The conference report accompanying the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for the Secretaries of the military departments to seek to relinquish jurisdiction, such that the state, commonwealth, territory, or possession would have concurrent jurisdiction over offenses committed on military installations by individuals not subject to the Uniform Code of Military Justice, such as civilian dependents and children. The conference report also directed the Secretaries of the military departments to report to the defense committees on these efforts 15 months after the enactment of the Act. In June 2019, the Acting Deputy Secretary of Defense issued a memorandum directing each military department to seek to establish concurrent jurisdiction with the respective states for offenses committed by juveniles in areas on military installations that are currently exclusive federal jurisdiction. This action seeks to provide ways for the department to address actions by children in areas of exclusive federal jurisdiction that may constitute a crime, such as some instances of problematic sexual behavior in children and youth, since, absent unusual circumstances, children and other civilians are not subject to the Uniform Code of Military Justice. According to Army and department officials, states—whose juvenile courts are rehabilitative in nature—are much better equipped to deal with suspected crimes committed by children than the federal government, which does not have a juvenile justice system. These officials also noted that federal prosecution is usually declined for such cases. There are various laws and agreements in place regarding crimes committed on U.S. military installations or involving servicemembers or military dependents overseas. These laws include U.S. criminal laws that may be applied extraterritorially, the Military Extraterritorial Jurisdiction Act, the Uniform Code of Military Justice, and host nation laws. Whether a particular law provides extraterritorial jurisdiction over such crimes depends on the specific facts of the incident, such as the nature and location of the alleged crime, the status of the alleged offender (servicemember or civilian), and the nationalities of the alleged offender and the victim. Status of forces agreements between the United States and the host nation may also clarify how these circumstances should be considered in determining venue. Three primary issues limit DOD’s visibility over reported incidents of child abuse and child-on-child abuse—standalone databases, information sharing challenges, and installation discretion. The military services use standalone databases to track the reporting, response to, and resolution of each reported incident of child abuse, which limits the department’s visibility over these incidents. While DOD is developing a new database to track problematic sexual behavior in children and youth, it has not yet made key decisions about its development and implementation, which could further affect visibility. In addition, challenges related to information sharing limit visibility over child abuse incidents within and across the military services. Further, Family Advocacy Program (FAP) installation personnel are given considerable discretion in deciding how reported incidents of child abuse are tracked and reported, as are DODEA school personnel with regard to incidents of child-on-child abuse, which also hinders the department’s visibility over these incidents. Each military service maintains multiple standalone databases that separately track the reporting, response to, and resolution of each reported incident of child abuse, which limits DOD’s visibility over the extent to which children have been affected by abuse on military installations or as military dependents and its visibility over incident outcomes. Depending on the reported incident, information regarding the alleged abuse may be retained in multiple databases or only one database. Specifically, each service’s FAP has a database—referred to as the “central registry”—where it tracks the total number of reported incidents of child abuse (by a parent or someone in a caregiving role) and detailed information, such as information about the offender, victim, and type of abuse, for incidents that met DOD’s criteria for abuse. Incidents of abuse where the alleged offender was not in a caregiving role are not tracked in the FAPs’ central registries and would only be tracked as incidents of abuse if they were investigated by military law enforcement. Information associated with investigations of these incidents by any military criminal investigative organization is tracked in a separate database maintained by each investigative organization. If the alleged offender was a servicemember, information related to the adjudication or case resolution is tracked in the relevant service’s military justice database maintained by the services’ legal offices. Figure 1 shows the department’s databases for tracking the abuse of children and how they differ depending on the circumstances of the incident. Because of DOD’s multiple standalone data systems, it is difficult to know the extent to which children have been affected by abuse on military installations or as military dependents. From fiscal years 2014 through 2018, the military service FAPs’ central registries recorded more than 69,000 reported incidents of child abuse, of which 48 percent met DOD’s criteria for abuse. Over this same time period, the military criminal investigative organizations conducted approximately 9,500 investigations involving a child victim, some but not all of which may have also been recorded in the service FAPs’ central registries. Figures 2 and 3 show the number of incidents of child abuse reported to the military service FAPs and the number of military investigations involving a child victim from fiscal years 2014 through 2018, respectively. However, the number of incidents tracked by both organizations cannot simply be added together because, as previously discussed, there is some overlap between them. For example, an incident of child sexual abuse inflicted by a servicemember parent or a teacher would likely be in both databases. Moreover, neither the service FAPs nor the military criminal investigative organizations individually track all reported incidents of abuse. Specifically, the FAP only tracks information related to abuse inflicted by a parent, guardian, or someone in a caregiving role. It does not capture incidents of abuse inflicted by, for example, a neighbor who was not babysitting at the time of the incident. While the services’ military criminal investigative organizations track any abuse of a child that rises to their level of investigation, such as a felony or sexual offense—regardless of the relationship between the alleged offender and the victim—they only investigate certain crimes. For example, an incident of child neglect would likely only be in the FAP’s central registry because incidents of neglect do not typically rise to the level of a military criminal investigative organization investigation. Similarly, an August 2019 report by the Defense Health Board found that it is difficult to establish the true incidence of child abuse across the department due to challenges associated with the underreporting of cases and unreliable capture of data. Standalone databases also limit DOD’s visibility over incident outcomes. Depending on the reported incident of abuse—for example, child sexual abuse inflicted by a servicemember parent—to get the most complete picture of how the incident was reported, responded to, and resolved, service officials would need to query three databases: the FAP, military criminal investigative organization, and military justice databases. Navy legal officials stated that a centralized database for all child abuse incidents—that tracks the FAP’s determination about whether the incident met DOD’s criteria for abuse, the investigation, and resolution—would be beneficial because it is currently very difficult to track an incident from the initial report to its final outcome in order to easily determine what happened in a particular case. These officials further stated that such a database would benefit commanders’ oversight of cases for which they are responsible. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision directing DOD to establish and maintain a centralized database on each incident of problematic sexual behavior in children and youth reviewed by an installation FAP. Specifically, per the statute, for each substantiated and unsubstantiated incident of problematic sexual behavior, the database is to track a description of the allegation, whether or not a FAP review of the case has been completed, the status and results of any related law enforcement investigation, and the nature of any action taken. Officials responsible for the development of the database—which is supposed to begin in fiscal year 2020—stated that it will maintain information related solely to cases of problematic sexual behavior and will not include other types of child-on-child abuse, such as physical assaults not of a sexual nature. Additionally, these officials stated that they do not have plans to expand the scope of the database to include any adult-on-child inflicted abuse. As a result, even once the centralized database on problematic sexual behavior in children and youth is implemented, DOD will still lack a centralized mechanism to track the reporting, response to, and resolution of other incidents of abuse involving children that were reported to the FAP or investigated by a military law enforcement organization— specifically, any abuse or neglect inflicted by an adult or physical abuse inflicted by another child. DOD officials responsible for the development of the database stated that they do not plan to expand the scope of the centralized database because they do not want to conflate the processes for responding to incidents of adult-inflicted child abuse and incidents of problematic sexual behavior. While the response process differs between incidents of adult-inflicted child abuse and incidents of problematic sexual behavior, DOD officials acknowledged that the organizations involved in the response process and the primary data sources are the same. Additionally, DOD FAP officials stated the scope of the centralized database was defined in statute and that they foresee additional privacy and data-safeguarding issues if they were to expand its scope. While the statute indicated what must be included in the database, it did not limit the scope of the database to those required elements. DOD not only lacks visibility over incidents of problematic sexual behavior, but over any reported abuse of a child and could therefore benefit from a centralized tracking mechanism for all such incidents. With regard to privacy and data-safeguarding concerns, according to DOD, data-safeguarding precautions were taken when developing the Defense Sexual Assault Incident Database, which the department successfully implemented. While the Defense Sexual Assault Incident Database does not contain information pertaining to children, it contains sensitive information that the department has taken steps to protect. Specifically, according to DOD, the Defense Sexual Assault Incident Database is reviewed annually to ensure all security controls are maintained and it is secured using physical, technical, and administrative controls, such as role-based permissions, to maintain the privacy of personal information. DOD FAP officials also expressed concerns about maintaining information about both adults and children in the centralized database. However, information about both adults and children is included in the service FAPs’ central registries and the military criminal investigative organizations’ databases. DOD officials responsible for developing the database noted that the department already plans to take precautions when developing the database due to the collection and retention of information about children. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. Specifically, quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. In addition, management should design control activities to achieve objectives, such as clearly documenting significant events in a manner that allows the documentation to be readily available for examination. Without a centralized database that tracks all incidents of abuse involving children that were reported to the FAP or investigated by a military law enforcement organization, DOD and Congress will not know the extent to which children have been affected by abuse on military installations or as military dependents, or how such incidents have been responded to and resolved—making it difficult to identify and address trends that could lead to further prevention efforts. While DOD is in the early stages of developing a centralized database to track incidents of problematic sexual behavior in children and youth, it has not yet made key decisions about its development and implementation, which could further affect visibility over such incidents. Specifically, DOD has not yet identified all information requirements, developed a plan for how it will use the data it collects, or established a schedule for development and implementation. DOD officials responsible for developing the database stated that they are still in the process of selecting a vendor to develop the system and that once a contract has been awarded and is underway, they can make such decisions. Our prior work has found that inadequate acquisition planning, including poorly defined requirements and unrealistic cost estimates, can increase the risk that the government may receive services that cost more than anticipated, are delivered late, and are of unacceptable quality. Given that DOD officials stated they plan to select a vendor in early fiscal year 2020 and move quickly with development—expecting to complete the bulk of it in fiscal year 2020—it is an appropriate time to make these decisions. First, DOD has not yet identified all of the information it will track in the database. DOD officials responsible for the development of the centralized database stated that they have not yet identified all of the information the database will track—other than the information required by statute and some information related to the response process— because they are still in the early stages of the development process. However, as previously discussed, DOD officials expect to complete the bulk of the development this fiscal year. In November 2006, we found that establishing a valid need and translating that into a service acquisition requirement is essential for obtaining the right outcome. Without this, an organization increases the risk that it will pay too much for the services provided, acquire services that do not meet its needs, or enter too quickly into a sensitive arrangement that exposes the organization to financial, performance, or other risks. Additionally, Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives, which includes identifying information requirements that consider the expectations of both internal and external users. As DOD progresses in its development of the centralized database, identifying and defining the elements that each responsible organization, such as the FAP and military law enforcement, must track would help to ensure that the data collected are useful, accurate, and complete, and that the data collected ultimately increase the department’s visibility over these incidents. Second, DOD has not yet determined how it will use the data it collects from the database to increase visibility. DOD officials stated that because they have not yet finalized the information requirements for the database, they have not yet developed a plan for how the collected data will be used. GAO-identified leading practices for results-oriented management have shown that data-driven decision making leads to better results. Further, agencies can use performance information to identify problems or weaknesses in programs, to try to identify factors causing the problems, and to modify a service or process to try to address problems. As DOD progresses in the development of its database, developing a plan for data-driven decision making—that details how the department will use the data to help inform program development and increase visibility— would help DOD to assess its processes and procedures for responding to and resolving incidents of problematic sexual behavior in children and youth, identify any needed changes, and modify them as appropriate. Finally, DOD has not yet established a completion date for the database or developed a schedule to guide its development and implementation. According to DOD officials responsible for the development of the database, while they do not have a planned completion date for the database or any associated milestones, they plan to select a vendor for the development in early fiscal year 2020 and they anticipate the majority of the development will take place the same year. These officials stated that they have not yet set a completion date, in part, because of the sensitivity of the information being collected and because the department does not have a comparable database that collects and maintains information on children. In addition, while these officials stated that they had identified resources for the development of the database through fiscal year 2020, they had not yet identified funding for future years. GAO-identified practices for developing and maintaining a reliable schedule include: (1) capturing all key activities, (2) sequencing all key activities, (3) assigning resources to all key activities, (4) integrating all key activities horizontally and vertically, (5) establishing the duration of all key activities, (6) establishing the critical path for all key activities, (7) identifying float—the amount of time a task can slip before affecting the critical path—between key activities, (8) conducting a schedule risk analysis, and (9) updating the schedule using logic and durations to determine the dates for all key activities. Given that DOD is in the early stages of development, establishing a reliable schedule for the development and implementation of the centralized database—including key activities and the timeframes and resources needed to execute them—would provide the means to gauge progress, identify and address potential problems, and promote accountability. Until the database is implemented, DOD will continue to have limited visibility over incidents of problematic sexual behavior in children and youth. Information sharing challenges limit visibility within each military service— specifically, as it relates to required notifications between a service’s installation FAP office and military law enforcement about reported incidents of child abuse inflicted by a parent or someone in a caregiving role. DOD policy states that the Secretaries of the military departments are to ensure that installation commanders or service-equivalent senior commanders ensure that the installation FAPs immediately report any allegations of child abuse and any criminal allegations to the appropriate law enforcement authority. Similarly, service guidance states that military law enforcement is responsible for notifying the installation FAP office of reported or suspected incidents of child abuse. However, officials at four installations in our review described notification challenges between these organizations. For example, officials at one installation described a child abuse incident that had been investigated by military law enforcement for 2 to 3 months, but the investigating organization had not notified the installation’s FAP office. Legal officials at another installation stated that over the past year, there had been five incidents of child abuse that were reported to the installation FAP office, but that the FAP had not reported to military law enforcement. These officials stated that the lack of notifications can be frustrating for commanders who need complete information about these incidents to determine whether they need to take any action. In addition, DODEA policy states that, among other things, DODEA personnel are to promptly report all suspected or alleged incidents of child abuse to the installation FAP office and the relevant child welfare agency, if available. The policy does not require them to also report the suspected abuse to law enforcement, but the FAP is to report the incident to law enforcement. However, a senior DODEA official stated that one of its regions has instituted a procedure for all child abuse incidents to be reported to the FAP and law enforcement because the region had experienced challenges with the FAP not consistently notifying law enforcement. The extent of these notification challenges is unknown because service FAP and military law enforcement officials stated that they do not document in their central registries or military criminal investigative organization databases whether each notified the other. Service FAP and military law enforcement officials stated that they can add fields to their databases to track new information if provided with the direction and resources to do so. Officials from these organizations also noted that any notification to the other entity may instead be documented in any case notes or in the case file. However, in April 2019, the DOD Office of Inspector General evaluated military law enforcement incident reports and found similar notification challenges related to FAP and military law enforcement notifications for domestic violence incidents. Specifically, the DOD Office of Inspector General evaluated 212 military law enforcement domestic violence reports in which a FAP notification was required and for 23 percent of the incidents (49 incidents) the military law enforcement organization had not notified the FAP as required. Standards for Internal Control in the Federal Government states that management should internally communicate information to achieve the entity’s objectives. For example, information is communicated down, across, and up reporting lines to all levels of the entity. In addition, the oversight body receives quality information that flows up the reporting lines from management and personnel. Without directing the service FAPs and military law enforcement organizations to document in their respective databases the date that they notified each other, these entities’ headquarters will remain limited in their oversight abilities to ensure that these notifications occur and to take appropriate actions in response. Even if notifications are documented in case files, there is no mechanism for the headquarters entities to efficiently determine whether a notification was made. Without ensuring that notifications are made to both organizations, which play critical roles in addressing incidents of child abuse, it is possible that an incident may not be fully assessed by the FAP or investigated by military law enforcement. Notification delays could result in at-risk children remaining in an unsafe environment or could delay time-critical portions of an investigation, such as forensic interviews or sexual assault exams. Information sharing challenges limit visibility across the military services, specifically as it relates to sharing child abuse incident determinations. Installation officials stated that the lead service for any installation is responsible for the installation’s FAP. They stated that even though the Incident Determination Committee (IDC) will hear cases about the other services’ members and dependents, all information is recorded in the lead service’s central registry. For example, if an Air Force servicemember is involved in a reported incident of child abuse while on an Army installation, the Army FAP will record information about the incident in its central registry. Of the Air Force FAP’s more than 3,000 reported incidents that met criteria for child abuse from fiscal years 2014 through 2018 and had a servicemember offender, 22 percent of those offenders were from one of the other three services. For the Army, the Navy, and the Marine Corps, 2 percent, 9 percent, and 5 percent, respectively, of their records were associated with servicemembers from another service. Table 1 shows the number of child abuse incidents that met DOD’s criteria for child abuse and involved a servicemember offender from fiscal years 2014 through 2018, by the service that recorded the incident and servicemember affiliation. Since FAP personnel at the installations do not share access to the other service’s central registries or the DOD Central Registry, according to DOD FAP officials, they have established a process to share information about child abuse allegations and determinations across the services. Per DOD guidance, the service FAPs are to submit data from their central registries on a quarterly basis for consolidation into DOD’s Central Registry. According to DOD FAP officials, after the service FAPs submit their data, the Defense Manpower and Data Center reviews the data and identifies any child abuse incidents that met DOD’s criteria for abuse and were recorded by a service FAP that is not the service to which the servicemember is assigned. According to these officials, the Center then forwards those relevant incidents to the services to which the servicemembers are assigned with the expectation that they will incorporate them into their central registries. According to Air Force, Navy, and Marine Corps FAP officials, they regularly incorporate the data received from the Center into their central registries so that they can be searched by FAP personnel at the installations. However, DOD does not have guidance that describes how the service FAPs should receive information from the Center about child abuse allegations and determinations that involve their personnel, but were recorded by another service’s installation FAP, or how they should incorporate such information into their central registries once received. Further, according to DOD FAP officials, DOD does not have a process to monitor that the service FAPs are consistently incorporating the information they receive from the Center into their central registries. Standards for Internal Control in the Federal Government states that management should internally communicate information to achieve the entity’s objectives. In addition, management should implement control activities through policies and establish and operate monitoring activities and evaluate the results. Specifically, ongoing monitoring is built into the entity’s operations, performed continually, and responsive to change. For example, one of the required fields in the service FAPs’ central registries is whether the offender was previously known to the service’s central registry—meaning that the offender was involved in a previous incident of child abuse or domestic abuse that was presented to the service FAP and was determined to meet DOD’s criteria for abuse. However, if the incident of abuse occurred on another service’s installation, and was therefore recorded in that other service’s central registry—and the service to which the servicemember is assigned was either not informed or did not input the information into its central registry—the servicemember’s FAP may not be aware of the prior case and therefore may not record the offender as previously known. Issuing guidance that describes the process through which the service FAPs are to receive and incorporate information into their central registries regarding child abuse allegations and determinations involving their servicemembers and dependents—that also includes a mechanism to monitor that the process is consistently occurring—would provide better assurance that the services have complete and up-to-date information about their personnel and their dependents, which ultimately affects their visibility over such incidents. FAP personnel at all seven installations in our review stated that they screen reported incidents of child abuse to determine whether to present them to the IDC. DOD guidance states that every reported incident of child abuse must be presented to the IDC for a determination unless there is no possibility that the incident could meet any of the criteria for child abuse or neglect. However, installation personnel described reported incidents of child abuse that had been screened out that, per DOD guidance, should have been presented to the IDC. For example, FAP officials at one installation stated that they screen out reports of spanking by a parent if there is no mark. Since DOD’s list of actions considered to be nonaccidental physical force includes spanking, it meets at least one of DOD’s criteria for child abuse and should be presented to the IDC for a determination. The IDC would then determine whether there was a significant impact on the child, such as a welt or a more than superficial bruise, or the reasonable potential for a more than inconsequential physical injury or fear reaction—to determine whether the reported incident meets all of DOD’s criteria for child physical abuse. Officials from three of the services’ FAPs stated that if spanking is used as a discipline technique—without information of injury or potential for injury or psychological harm—then it should not be opened as an incident and presented to the IDC. However, this is in conflict with DOD guidance as confirmed by DOD FAP officials. At another installation, child development center officials described an incident where a staff member was speaking harshly with a child. These officials stated that the supervisor at the center considered the action to be child abuse—berating the child, which per DOD guidance is an act of emotional abuse—and contacted the installation FAP. However, they stated that the FAP personnel that received the report stated, without any assessment of the incident, that it was not emotional abuse and that the center should handle it administratively. According to center officials, the incident was never presented to the IDC, but they considered the incident to be significant enough that the center terminated the staff member’s employment. FAP officials at a different installation stated that the medical clinics were not previously reporting suspected abuse to the FAP, but are now doing so. Because of this change, the FAP personnel said they believe the clinics are over-reporting, which has led to the FAP personnel screening out some of the clinic’s reported incidents of suspected child abuse. Two of the parents of children affected by abuse that we interviewed discussed incidents that were reported to the FAP, but that the FAP did not initially present to the IDC. According to one parent, one incident of child abuse was presented to an IDC at a different installation after the parent contacted the FAP at that installation for advice more than 2 years after the initial report of abuse. According to the other parent, the other incident of child sexual abuse was only presented to the IDC following congressional involvement. FAP personnel at one installation described the process of determining whether a reported incident should be presented to an IDC as a clinical judgement call and noted that they screen out about one-third of reported incidents of child abuse annually. FAP personnel at another installation stated that, as of summer 2019, they had received about 50 reported incidents of child abuse since the start of the calendar year and that they had screened out the majority of them. While installation FAP personnel also described reported incidents of abuse that should be screened out as child abuse per DOD guidance—such as abuse where the alleged offender was not a parent, guardian, or someone in a caregiving role, which is outside of the FAP’s purview—it is unclear how many of the reported incidents that they have screened out should have been presented to the IDC per the guidance. Incidents that are not presented to the IDC are not recorded in the relevant service FAP’s central registry and therefore are not captured in DOD’s consolidated Central Registry, which the department uses to prepare its statutorily required annual reports to Congress on child abuse and domestic abuse. As a result, the actual total number of reported incidents of child abuse across the department—which according to our previously discussed analysis totaled more than 69,000 from fiscal years 2014 through 2018—may be higher. As previously discussed, the Defense Health Board’s August 2019 report noted that it is difficult to establish the true incidence of child abuse across the department due to challenges associated with the underreporting of cases and unreliable capture of data and that as a result, it is difficult to measure and monitor the scope of the problem. When we discussed with DOD FAP officials what the installations we visited told us about how they screen reported incidents of child abuse, officials expressed concerns about these installations not adhering to DOD guidance. However, as previously discussed, the service FAPs are responsible for overseeing installation FAPs. According to service FAP officials, oversight of the screening process is primarily handled by personnel at each installation. Air Force FAP officials stated that the FAP personnel making these screening determinations have to meet certain education requirements. Standards for Internal Control in the Federal Government states that management should establish and operate monitoring activities and evaluate the results. Without each military service developing a process to monitor how reported incidents of child abuse are screened at installations, the services cannot be sure that incidents are being presented to the IDC in a consistent manner. Further, installation FAPs may continue to screen out reported incidents of child abuse, in contradiction of DOD guidance, therefore excluding them from being documented in DOD’s Central Registry. As a result, DOD does not know and cannot accurately report on the total number of reported incidents of child abuse across the department. In addition to other known underreporting, without such initiatives, DOD is further limiting its visibility over incidents and hindering its ability to ensure appropriate responses to incidents. According to our analysis of DODEA data, DOD schools may not be reporting all serious incidents of child-on-child abuse, which hinders DODEA leadership visibility. From school years 2013-2014 through 2017-2018, across its 163 schools, DODEA reported a total of 167 serious incidents involving either an alleged violation of law or an alleged sexual event—on average, one serious incident per school over the 5- year period. The types of reported serious incidents included a student reporting that they were raped by two students in the school parking lot, a student stabbing another student in the finger with a plastic fork and drawing blood, and a wide range of other conduct. There was a slight decrease in the number of serious incidents reported from school years 2013-2014 to 2014-2015, but since school year 2014-2015, the number of serious incidents reported each year increased from a low of 22, to 55 in school year 2017-2018. DODEA officials attribute the increased reporting, in part, to the issuance of additional reporting guidance in August 2016. Figure 4 shows the number of serious incidents involving either an alleged violation of law or an alleged sexual event reported by DODEA from school years 2013-2014 through 2017-2018. According to DODEA officials, all serious incident reports are reviewed by DODEA headquarters to ensure that the schools took the appropriate actions needed to protect students and to ensure that incidents are correctly categorized. These officials stated that the reports also help to increase visibility at the headquarters level about the types of incidents occurring in DODEA schools and where additional resources may be needed. In addition, DODEA officials stated that they retain serious incident reports for 5 years, which allows them to track serious conduct issues when students transfer schools. While the reporting of serious incidents has increased, our analysis of DODEA student misconduct records found that schools’ reporting of these incidents was incomplete. Specifically, our analysis identified 216 student misconduct records for school years 2016-2017 and 2017-2018 that school administrators, following DODEA guidance, could have reasonably classified as serious incidents. The types of incidents described in the student misconduct records included, among other things, the use of physical force by a student on another student that resulted in an injury; a student touching another student’s groin, breasts, or buttocks without consent; and verbal and behavioral sexual harassment. However, for this time period—for which DODEA reported the highest number of serious incidents from school years 2013-2014 through 2017-2018—DODEA only reported 89 serious incidents. In addition, DODEA officials stated that prior to August 2018, up to one-third of schools were not recording student misconduct in the student information system because they were not required to do so and, as a result, we were not able to review any misconduct records for those schools. Challenges related to the reporting of serious incidents were also highlighted in our interviews with parents and DODEA school administrators. Specifically, two of the parents of children affected by child-on-child sexual abuse that we interviewed discussed incidents that occurred within DODEA schools. They both stated that they received information about the incidents as part of Freedom of Information Act requests and that the schools had not reported the abuse as serious incidents. For one of these incidents, we identified a corresponding DODEA child abuse report, but not a serious incident report. Per DODEA guidance, the incident should have been categorized as a serious incident (but not as child abuse) because the offender was a student— child abuse reports are only to be filed if the alleged offender was an individual responsible for the child’s welfare, such as a parent or a teacher. In addition, at one installation in our review, FAP personnel discussed a recent sexual assault within a DODEA school. When we discussed this incident with a senior DODEA official who is to be notified of all serious incidents reported in the region in which the school is located, the official was unaware of the incident because it was not categorized as a sexual assault in the serious incident report and another senior official for the region had handled it directly. Further, administrators at one of the DODEA schools we visited stated that the reporting guidelines are not fully clear and that they often call the superintendent’s office for advice on what to report and how to report it. Standards for Internal Control in the Federal Government states that management should internally communicate the necessary quality information to achieve the entity’s objectives. Specifically, management communicates quality information down and across reporting lines to enable personnel to perform key roles in achieving objectives. However, DODEA’s guidance affords school administrators discretion in what to report because it does not explicitly define what types of serious incidents must be reported. While the guidance identifies and defines a number of incidents that could be reported as serious incidents, and provides detailed examples—like a student intentionally exposing their genitals or a student posting naked or suggestive photos of another student online— the guidance does not mandate that these incidents be reported. Specifically, the guidance states that the lists of events, activities, and paraphernalia described in the guidance as serious incidents are illustrative only and do not identify every incident that may be inappropriate, nor require that each incident result in a serious incident report. While DODEA officials noted that both reporting and their visibility over serious incidents has been improving, they acknowledged that administrators may not be reporting all serious incidents described in the guidance because, in part, it may be easier for them to resolve some incidents—such as students jokingly slapping each other on the buttocks—at the school level instead of filing a serious incident report. These officials stated that they are optimistic a new reporting database for serious incidents that they implemented in August of 2019 will streamline the process for administrators and increase reporting. In addition, in February 2019, DODEA issued guidance related to the reporting of and response to prohibited sexual, sex-based, and other related abusive misconduct, which DODEA officials told us they believe will reduce discretion in how alleged child-on-child sexual abuse is recognized and reported. While the new reporting system and guidance related to child-on-child sexual abuse are positive steps, without additional guidance that clarifies the types of incidents—including non-sexual incidents—that must be reported as “serious incidents,” DODEA may continue to lack full visibility into the extent to which serious incidents are occurring. As a result, systemic issues within a particular school or district may never be reported to DODEA leadership and any additional resources that a school or district needs to prevent future incidents may not be identified. Further, when a student transfers schools, the new school may be unaware of serious conduct issues that were not properly documented, raising safety concerns for the school and installation. DOD and the military services have taken steps to expand child abuse policies and procedures to address child-on-child abuse in response to Congress, but gaps exist in the processes for responding to and resolving incidents of abuse. Specifically, the services may lack pertinent stakeholder perspectives on the IDC after DOD policy changed the permanent voting membership of the committee. In addition, families of child abuse victims may receive inconsistent levels of information following a report of child abuse, which can cause confusion and prevent them from receiving available services. Further, service guidance regarding the extent of commander authority to remove children from unsafe homes overseas is unclear. Finally, the availability of certified pediatric sexual assault forensic examiners is limited, especially overseas. In accordance with provisions in the John S. McCain National Defense Authorization Act for Fiscal Year 2019, DOD and the military services have taken steps to augment existing child abuse policies and procedures to also include child-on-child abuse, specifically the incidence of problematic sexual behavior in children and youth. The statute required, among other things, that the Secretary of Defense establish a policy, applicable across all military installations, to respond to allegations of problematic sexual behavior in children and youth on military installations. The purpose of the policy is to ensure a consistent, standardized response to such allegations across the department. In May 2019, DOD issued a revised FAP instruction that establishes policy, assigns responsibilities, and prescribes procedures for the FAP specific to child abuse, domestic abuse, and problematic sexual behavior in children and youth. In addition, in July 2019, DOD revised the FAP standards to implement policy, assign responsibilities, and provide procedures for addressing problematic sexual behavior in children and youth in military communities. As of October 2019, the military services had not yet issued their updated FAP policies to incorporate the new department- wide policy and standards, but the policies were under development, according to DOD FAP officials. Prior to the issuance of DOD’s updated FAP policy, the Army issued a broader policy on major juvenile misconduct in March 2019. The policy addresses the command response to juvenile misconduct and the referral of juvenile cases to civilian authorities. For Army installations in the United States with areas of exclusive federal jurisdiction, the policy directs such commands to seek to establish concurrent jurisdiction of juvenile criminal offenses. In instances where establishing concurrent jurisdiction is not feasible or recommended, the policy directs commanders to pursue memoranda of agreement with local prosecution authorities that address the referral of juvenile cases to the local juvenile court system for state review and state determination of appropriate disposition. Army officials stated that the Army policy covers more than incidents of problematic sexual behavior in children and youth because the challenges involving children on Army installations are broader than problematic sexual behavior and encompass other types of misconduct, such as fights, vandalism, and shoplifting. Officials from the other services stated that their policies, which are under development, will focus on problematic sexual behavior because that was what was required per statute. In addition, DOD has taken steps to implement a training program for personnel at installations that focuses on problematic sexual behavior in children and youth. Specifically, DOD and DOJ’s Office of Juvenile Justice and Delinquency Prevention entered into an interagency agreement in July 2019 to expand the scope of DOJ’s cooperative agreement with the University of Oklahoma. According to DOD officials, this agreement includes providing training and technical assistance in support of DOD’s response to problematic sexual behavior in children and youth. The 3-year interagency agreement provides $1.5 million in funding, and according to DOD officials, the funding will be used to develop and implement targeted training on problematic sexual behavior in children and youth for FAP personnel at the installations. According to DOJ officials, other efforts include a DOJ and DOD working group on child-on-child sexual abuse—focused on resolving jurisdictional issues, as will be discussed in greater detail later in the report—and the development of a centralized database for tracking incidents of problematic sexual behavior in children and youth, as previously discussed. Further, DODEA has implemented a number of initiatives related to serious student misconduct. These include the issuance of a standalone sexual harassment policy and providing administrators with additional guidance on reporting and responding to sexual activity within DODEA schools, and the development and distribution of standardized language regarding discrimination and sexual harassment for each school’s student handbook. DODEA also created outreach materials for students on how to recognize and respond to sexual harassment. DODEA has conducted training for administrators on these topics. Other training initiatives include training for all counselors, school psychologists, and nurses on problematic sexual behavior in children and youth. As previously discussed, DODEA also introduced a new reporting database for serious incidents in August 2019 that is intended to simplify the serious incident reporting process for administrators. In August 2016, DOD issued guidance to standardize the incident determination process across the military services, which, among other things, reshaped the permanent voting membership of the IDC. However, the new structure may lack stakeholders with the requisite knowledge and expertise to allow the IDC to make fully informed determinations. The standardized process to determine whether an incident meets DOD’s criteria for child abuse was informed by a collaboration between the Air Force and New York University researchers, which yielded a decision- tree algorithm. The process was implemented by the Air Force and then subsequently adopted by the Navy and the Marine Corps. According to Army officials, the Army’s phased implementation of the IDC process was ongoing as of October 2019. As part of the standardization of the process in the 2016 guidance, medical personnel were removed as permanent voting members of the IDC, although they regularly participated in some of the services’ prior incident determination processes, according to Army FAP officials. The external researchers involved in the effort noted that they were primarily involved in the decision-tree algorithm and not the composition of voting members, which was an internal DOD decision. According to DOD, the definitions in the decision-tree algorithm used to determine if an incident meets criteria to be considered child abuse were robust enough that experienced healthcare providers were not needed to determine if an incident met DOD’s criteria for child abuse. In addition, DOD FAP officials stated that participation in the IDC process by medical personnel could take them away from their clinical duties and become burdensome since the IDC at larger installations may meet weekly and for several hours. DOD officials noted that medical personnel, and others, can still be invited to participate in the IDC process as needed to provide information related to specific incidents. While IDC members at four of the installations in our review also noted that medical personnel can still be invited to share relevant case information—in a nonvoting capacity—medical personnel we spoke to at three of these installations noted that they are rarely invited to participate. As a result, medical personnel at one installation we visited stated that they have attempted to write their medical reports in more lay terminology to bridge the gap and to help ensure that critical information is properly relayed during the IDC meeting. Medical personnel with expertise in child abuse stated that they would welcome the opportunity to again participate in IDC meetings about which they have specific knowledge, but that they are contacted to participate once every 2 years at the most. In addition, medical personnel at one of the installations we visited had never heard of the IDC and were unaware of its function. During a number of our interviews and installation visits, medical personnel frequently expressed concerns about the lack of medical expertise in the IDC process. For example, medical personnel at three installations we visited expressed concerns that the absence of medical personnel on the IDC may prevent reported incidents of child abuse from being fully understood. They noted that medical personnel—specifically, pediatricians—have particular utility on the IDC because of the complexity of some of the cases and the need to articulate how medical findings can indicate whether an injury resulted from a nonaccidental use of force. Medical personnel with expertise in child abuse stated that there is a strong medical component to many child abuse cases and that FAP clinicians may not have the requisite medical expertise needed to appropriately interpret that information. Medical personnel also stated that lacking this expertise could result in the IDC incorrectly voting that an incident meets criteria for abuse or does not meet criteria. For example, a pediatrician described one IDC meeting in which they were invited to participate, as a nonvoting member, related to an incident that had medical evidence that the pediatrician referred to as clearly presenting a hallmark finding in child abuse—ear bruising patterns in a very young child. However, the pediatrician stated that the IDC voted that the incident did not meet DOD’s criteria for abuse before allowing medical personnel to present information they had about the incident. According to this pediatrician, after the vote, the IDC allowed the pediatrician to provide information about the incident, but it did not alter the committee’s initial determination. At one of the IDC meetings we observed, IDC members discussed a case that involved bruising. The IDC members noted that they wished that a doctor had been present so that they could determine whether the allegation had any merit. However, no medical personnel were present and the IDC reached a determination without medical input. Members of this IDC also discussed concerns about a downward trend across the service in the number of cases meeting DOD’s criteria for abuse, which they attributed to changes to the voting membership of the committee. In addition, one of the parents that we spoke with described an incident that met DOD’s criteria for child sexual abuse under the military service’s prior incident determination process. However, the parent stated that after the service implemented the new IDC process, the servicemember’s command—which was added as a permanent voting member of the IDC—requested that the determination be reconsidered. The parent stated that the incident was again presented to the IDC and the committee reversed the initial determination, concluding that the incident did not meet DOD’s criteria for child sexual abuse. The parent expressed concerns that the removal of medical personnel from the IDC process played a significant role in the reversal of the determination. Further, at one installation in our review, after the installation implemented the new IDC process, officials set up a separate pre-IDC process to discuss the same cases with medical personnel and others to ensure that they include their perspectives in the determination process. Installation officials stated that they felt the need to establish this redundant process because participation and discussion are more limited under the IDC process and there was an identified gap. In August 2019, the Defense Health Board recommended that DOD reconsider requiring at least one comprehensive pediatric medical health care provider to be a member of all IDCs. However, DOD FAP officials stated that they have no plans to reassess or expand the voting membership based on this recommendation or the concerns expressed by medical personnel across the military services. They stated that there are other meaningful ways in which medical personnel can participate in the IDC process, but that they should not be voting members because their competing clinical responsibilities may lead to a lack of continuity on the IDC and they might not have any direct knowledge of the incidents being discussed. However, as previously discussed, medical personnel are not being regularly invited to participate and, when they are, the information they present may not be considered as part of the voting process. In addition, medical personnel at one installation we visited noted that even if they were regularly invited to participate, since they are not permanent voting members, other clinic responsibilities may take precedence. A 2018 Department of Health and Human Services guide for child protective caseworkers noted that involving teams with a diversity of skillsets, including pediatricians, early in the child abuse determination process can improve accurate and comprehensive assessments, information sharing, and analysis of gathered information to support an accurate substantiation decision. In addition, GAO-developed practices to enhance and sustain collaboration in interagency groups note that it is critical to involve nonfederal partners, key clients, and stakeholders in decision-making. Further, in February 2014, we found that if collaborative efforts do not consider the input of all relevant stakeholders, important opportunities for achieving outcomes may be missed. Without expanding the voting membership of the IDC to include medical personnel, installation officials may not have all of the relevant information to make a fully informed decision about whether an incident meets DOD’s criteria for child abuse. The IDC may make different determinations without the benefit of input from all relevant personnel, thus affecting confidence in the efficacy of the process. Further, without expanding the voting membership to include medical personnel, installations may continue to develop concurrent or redundant processes in order to ensure that all pertinent information about cases is shared. Victims’ families receive inconsistent levels of information related to the response process and available services after an incident of child abuse is reported. The process to respond to and address incidents of child abuse can be lengthy—the average investigation is more than 9 months—and the responding organization and the particular steps it takes depend on variables including the type of abuse, the status of the alleged offender, and the location of the incident. For example, as previously discussed, military criminal investigative organizations primarily only investigate serious felony-level offenses and any type of sexual offense. According to military criminal investigative organization officials, cases that do not meet this threshold may be investigated by other military law enforcement investigators, such as military police or local civilian law enforcement. Additionally, the FAP only reviews incidents of child abuse where the alleged offender was a parent or someone in a caregiving role. As a result, the FAP would not present incidents to the IDC where the alleged offender was another child or an adult who was not in a caregiving role, such as a neighbor who was not babysitting at the time of the incident. Further, as previously discussed, the jurisdiction of the installation where the incident took place determines which entity, such as the state or the federal government, will adjudicate the incident. The process can also differ based on the state and local laws where the incident occurred. For example, according to some state child welfare agencies, they are more likely than the FAP to accept cases of child-on- child abuse, and they review such cases to see if a lack of supervision or other aspect of parental neglect is involved. The legal services that victims are eligible to receive differ depending on the status of the alleged offender and the victim, and the type of abuse alleged. For example, for incidents of child sexual abuse with an alleged servicemember offender, victims and their families are eligible for military- provided legal advice and assistance, even if the abuse occurred off the installation. However, the status of the victim (that is, whether the victim is the dependent of a military member or not) will impact the nature and extent of the legal assistance that can be provided. Of the 20 parents of children affected by abuse that we interviewed, nine stated that they did not understand what to expect during the investigation and resolution process and nine were not aware of all available services and resources offered. Some parents noted that if they had better understood the process and available services, they could have received counseling and other services more quickly. Twelve parents highlighted that a guide summarizing the process and available services would have been helpful. For example, seven parents said that they did not receive and were not offered any services by the military. Multiple respondents also highlighted the lack of sufficient legal assistance. Specifically, five parents stated that they would have liked legal assistance but none was available, and seven parents stated that the legal services offered by the military did not meet their needs. For example, one parent stated that they requested a waiver to receive the services of a Special Victims’ Counsel, but the request was denied for reasons that are unclear. Standards for Internal Control in the Federal Government states that management should externally communicate the necessary quality information to achieve the entity’s objectives. Specifically, management communicates with and obtains quality information from external parties, including the general public, and in this case victims’ families. However, while each organization, such as the FAP, may provide information to families relevant to that organization’s responsibilities and services, the military services have not established efforts to comprehensively inform victims’ families about how child abuse incidents are to be addressed by each responsible organization, for example by consolidating information to help families understand the process and the services available to them. While DOD officials stated that they have plans to develop such a guide for responding to incidents of problematic sexual behavior in children and youth, they stated that they do not have plans to develop a similar guide for responding to incidents of child abuse because information is already available from a number of different sources. However, the parents we spoke with had challenges locating this information in a timely manner following an incident of child abuse and highlighted the need for additional information in a consolidated format to avoid confusion and to more easily receive necessary services. Without each military service establishing efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed, affected families may be confused about the process and where to go for information. In addition, they may not receive the services that they are entitled to and need, such as a Special Victim Counsel or a legal assistance attorney, because they do not know that these resources are available. As a result, DOD may not be providing comprehensive responses to reported incidents of child abuse. The military services’ guidance regarding the extent of commander authority to remove children from their homes on overseas installations is unclear. Within the United States, state and local child welfare agencies have the authority to remove children from unsafe homes. However, officials at an overseas installation stated that there is no law that clearly authorizes commanders to exercise this authority on overseas installations, and there may be no local authorities to provide guidance or services at overseas installations. Rather, service guidance grants installation commanders the authority to remove children from unsafe homes on a temporary basis. Guidance describing this authority is not standardized across the services and installation officials overseas stated that additional guidance would help clarify situations when a child can be removed from an unsafe home. For example, according to Army guidance, an installation commander may authorize emergency placement care when abuse is substantiated and when neither judicial authorization nor parental consent can be obtained, and the removal is necessary to avoid risk of imminent death, serious bodily harm, or serious mental or physical abuse. In addition, commanders may take action in situations when medical protective custody is not appropriate. Per Navy guidance, commanders can only use this authority in situations where there is substantial reason to believe the life or health of the child is in real and present danger. Air Force guidance states that base security and unit leadership are responsible for overseeing the appropriate removal or placement of children with consultation and guidance from the FAP. Per Marine Corps guidance, commanders may implement a child removal order—designed for short- term placement of a child into a place of safety. Individual installation commanders are responsible for issuing a written policy setting forth the procedures and criteria for the removal of child victims of abuse or other children in the household when they are in danger of continued abuse or life-threatening child abuse. Officials at installations overseas stated that the decision to remove a child from an abusive home can vary depending on the commander’s comfort level in doing so. For example, officials at two installations provided an example where a commander removed a child from the home in a situation of suspected abuse, and then a parent requested an Inspector General investigation questioning the commander’s authority to do so. Installation officials stated that the complaint to the Inspector General was not substantiated, but that the ambiguity of the guidance, coupled with the possibility of a commander having his or her actions reviewed by the Inspector General, could affect a commander’s willingness to take action in similar cases. Medical personnel we spoke with highlighted examples where military hospitals overseas have admitted child abuse victims for their safety in situations when installation commanders did not take action to otherwise remove the child from the home. In one example, an infant presenting with physical trauma consistent with abuse was admitted to the hospital for 1 month until the child could be returned to the United States and a state child welfare agency could respond to ensure the child’s safety. Installation officials overseas responsible for addressing incidents of child abuse stated that they believe additional clarity regarding commander authorities would help commanders in making a determination about when to exercise their authority to remove an at-risk child from a home. In comparison to the services’ guidance, some state child welfare agencies have comprehensive checklists and decision matrices to help officials make decisions regarding child removal. One child welfare agency we visited provided a list with 14 specific safety factors, including descriptions of each factor, and a list of 10 protecting interventions. Safety factors include anything that may put a child in danger, for example, questionable caretaker explanations for a child’s injuries, or the family not allowing the child welfare agency access to the child. Protecting interventions include actions such as the family making use of community agencies or services as a safety resource, or the non-offending caretaker moving to a safe environment with the child. There is no comparably detailed guidance for military commanders. Standards for Internal Control in the Federal Government states that management should internally communicate the necessary quality information to achieve objectives. Quality information is reported down and across reporting lines to enable personnel to perform key roles in achieving objectives. However, legal officials and medical personnel at overseas installations stated that existing guidance regarding commander authority to remove children from potentially unsafe homes in overseas environments is unclear. For example, these medical officials stated that terms like “real and present danger” are not well defined, and that there may be no child welfare agency available overseas to provide guidance or services. These officials also stated that this threshold may be too high, and could result in children suffering moderate neglect or abuse because it does not rise to the level of real and present danger. Without clarifying and standardizing across the services, in guidance, the circumstances under which commanders may exercise their authority to remove children from potentially unsafe homes overseas, timely response to incidents may be inhibited and children may be left in unsafe situations. Commanders may also face adverse actions if their authority to remove a child from the home is not well-defined and their decision comes under legal scrutiny. The availability of certified pediatric sexual assault forensic examiners across the military services is limited, especially overseas. Based on our analysis, from fiscal years 2014 through 2018, for all four military services, there were 1,448 incidents that met DOD’s criteria for child sexual abuse and may have therefore necessitated a sexual assault forensic exam. According to our analysis of FAP data over these 5 years, the average age of the victims involved was 10. However, according to Defense Health Agency officials, there are only four child abuse pediatricians who are certified to perform pediatric sexual assault forensic exams: two in the Navy, one in the Army, and one in the Air Force. In addition, according to these officials, the Army has seven sexual assault forensic examiners, initially certified to perform exams on adults, who have completed a 40-hour pediatric course, for a total of 11 certified pediatric examiners across the department. In comparison, according to these officials, there are a total of 466 sexual assault forensic examiners throughout the department who are certified to perform exams on adults—161 are located overseas and 305 are located within the United States. As a result of this disparity between examiners certified to perform exams on adults and those certified for children, children affected by sexual abuse on military installations or as military dependents may lack access to qualified pediatric sexual assault forensic examiners. This lack of access on overseas installations—identified by medical personnel as a significant concern—can prevent them from being examined in a timely manner or may subject them to further trauma if they are first examined by an untrained provider and have to be examined again. When victims of sexual assault receive a forensic exam, the exam may be provided by either a trained sexual assault forensic examiner—that is, a medical provider who has received specialized training in properly collecting and preserving forensic evidence—or a medical provider who has not received such specialized training. Studies have shown that exams performed by trained sexual assault forensic examiners may result in shortened exam time, better quality health care delivered to victims, higher quality forensic evidence collection, as well as better collaboration with the legal system and higher prosecution rates. Navy officials stated that pediatric sexual assault forensic examiners are not a billeted position at any installation and Air Force officials stated that there are no certified pediatric sexual assault forensic examiners billeted to any installation in Japan—which hosts the largest number of active duty U.S. servicemembers outside of the United States—due to inconsistent demand. Medical personnel we spoke with described two options to overcome the lack of certified pediatric examiners: call a certified pediatric examiner in the United States to guide—via telephone—a pediatrician on the overseas installation through the exam; or medically evacuate the victim to the United States. Although DOJ best practices for sexual assault exams note that telemedicine can result in significant positive changes in the methods of examination and evidence collection, medical personnel stated that it is inferior to an in-person exam because the person conducting the exam is not the actual certified examiner, which can open the exam findings up to legal challenges. Medical personnel also stated that a child may need to undergo multiple exams if the initial exam is not performed correctly, which, as noted previously, can add to a victim’s trauma. Additionally, medical personnel stated that there can be technical challenges with getting the right equipment in place and training people who may quickly transition to another installation. If telemedicine processes were to be established at overseas installations, there are still only four child abuse pediatricians across the department who can consult on the exams, and they may not be available to consult on all cases. Further, medical personnel noted that using telemedicine for pediatric exams overseas may result in these exams being physically conducted by someone with little to no experience conducting any type of genital exam. This is because pediatricians in the military typically do not conduct any genital exams on children, even basic or preventative exams. In the event that a girl becomes pregnant, officials stated that she will be sent to a military adult obstetrician, and the military pediatrician would not conduct any of the relevant exams. These personnel also stated that the military does not conduct routine cervical exams on women until they are 21 years of age, so pediatricians likely have no practical experience conducting even standard exams. A 2018 Department of Health and Human Services guide for child protective caseworkers noted that if health care providers do not routinely examine the genitalia of young children, they may mistake normal conditions for abuse or vice versa. One parent that we spoke with about an incident of sexual abuse overseas stated that the child’s pediatrician was not comfortable conducting such an exam, but offered to take a cursory “peek” for anything concerning. The parent declined the offer because they knew the pediatrician was neither trained nor certified to perform such an exam. Although medical personnel stated that a medical evacuation to the United States for an exam is a potential option, medical evacuations are challenging because they can take 5 to 6 days. However, the physical evidence from a sexual assault should be collected as soon as possible and ideally between 1 and 5 days after the assault, according to DOJ best practices. Additionally, installation medical personnel noted that medical evacuations can result in additional stress on the victim from travel, increased complexity of legal and investigation processes, and travel costs that may be greater than training local examiners. DOD medical personnel stated that it can be challenging because in some instances the children can only receive the exam at medical facilities that have a memorandum of understanding in place with the military because the exams are typically funded locally. For example, these officials described an incident of child sexual abuse in Okinawa—a remote location in Japan with no certified examiners. These personnel noted that while a medical evacuation to Hawaii would seem like a good solution—because there is a trained pediatrician there to conduct sexual assault exams—the pediatrician in Hawaii can only examine children who have been referred directly by Hawaii’s child welfare agency. These personnel noted that the next best option is San Diego, where there is a DOD child abuse pediatrician, but by the time the travel is arranged, which can take days, the evidence might no longer be available. These personnel suggested that instead of relying on medical evacuations or telemedicine, better options to ensure that child victims get timely access to care could include certifying pediatricians or adult sexual assault forensic examiners as pediatric examiners during mandatory training or establishing shared regional assets. In the United States, child victims of sexual abuse may have more options to receive pediatric sexual assault forensic exams. Specifically, pediatric exams may be done at a local Children’s Advocacy Center (CAC) or hospital. However, it is still challenging in the United States because CAC coverage is not uniform across the country, and rural patients may have to travel several hours to the closest center. For example, officials at one CAC we visited noted that while they have a certified pediatric examiner, this individual is only available once per week. One parent that we spoke with stated that they had to drive their child 2 hours to the closest CAC to receive an exam when stationed at an installation in the United States. Two parents described delays in receiving an exam in the United States after the incident was reported, which could have prevented quality evidence from being collected. DOJ protocols for sexual assault forensic exams state that these exams should be performed by a healthcare professional specially trained in collecting evidence relating to sexual assault cases, such as a sexual assault nurse examiner or other appropriately trained medical professional. In particular, female children who have not yet reached puberty should only be examined by health care providers specifically trained in pediatric sexual abuse. Further, related DOJ best practices state that evidence should be collected as soon as possible, ideally between 1 and 5 days post assault. However, DOD does not have processes in place to help ensure that children who are sexually abused overseas have timely access to certified pediatric sexual assault forensic examiners. Without processes that help ensure timely access to certified pediatric examiners overseas, child victims of sexual abuse may not receive exams in time for the evidence to be collected for use in prosecution. In addition, the difficulty and time associated with obtaining an exam could potentially increase the stress and trauma of affected victims and their families. Further, because of the variation in resources across military installations, child victims of sexual abuse may have access to different levels of care depending on the geographic location of the installation due to the lack of standardized availability of certified pediatric examiners. DOD collaborates at various levels both inside and outside the department to address reported incidents of child abuse and child-on- child abuse. However, improving communication and establishing comprehensive agreements could enhance the information DOD receives about these incidents as well as the resources available to both the department and victims of abuse. DOD has successfully collaborated with a number of states to help ensure it receives notification from state authorities when servicemembers or military dependents are involved in reported incidents of child abuse off a military installation. DOD is required to address child abuse in military families. However, with approximately 70 percent of active-duty military families living off military installations in the civilian community, service officials do not always have visibility over these incidents since they may first be reported to the relevant civilian authorities instead of to the military. The Defense State Liaison Office has highlighted the importance of state statutes that require the collection and reporting of military affiliation to the appropriate military authorities as part of state child abuse cases, and has identified this as a key issue. According to a senior Defense State Liaison Office official, the office has successfully collaborated with a number of states on child abuse reporting measures to require or allow local jurisdictions to report incidents of child abuse in military families to relevant military service officials. According to DOD, at least half of the states have no such requirements, but at least one is considering passing a law to provide for the requirement. According to this senior Defense State Liaison Office official, the effort will remain a key issue area for the office through at least fiscal year 2020 in order to continue to focus efforts on these remaining states. In August 2019, the Defense Health Board noted that child abuse can be difficult to quantify because of underreporting, and some studies suggest a lower rate of incidents being reported to the FAP if the incidents are first identified at a civilian facility. Therefore, it recommended, in the absence of state legislation, that DOD ensure that all U.S. military installations have memorandums of agreement in place with state child welfare agencies for bilateral information sharing on child abuse cases. A senior Defense State Liaison Office official stated that the office has sought legislation because prior efforts to establish memorandums of agreement were only focused on information sharing and did not specify procedures for state and local child welfare agencies to use in determining whether a family involved in an incident had a military connection. Additionally, the official noted that a statutory basis is important because otherwise state laws that limit who child welfare agencies can share information with about child abuse cases may take precedence. For example, some states have expressed concerns that sharing information about an alleged, but not yet confirmed, incident of child abuse could be detrimental to a servicemember’s career. We found that the extent of collaboration between the military and other state and local authorities (such as child welfare agencies) varied among the installations in our review. For example, child welfare agency officials in Virginia noted that state policies requiring that they notify the FAP about cases with a military affiliation have increased the amount of coordination between the state and the military. However, according to FAP officials at one installation we visited in North Carolina—where approximately 80 percent of dependent children live off the installation—it was rare to receive notification from some counties for child abuse cases with a military affiliation because, at the time of our visit, there was no state policy requiring it. DOD’s continued focus on improving collaboration with the states that have not yet established such a requirement should help to increase the department’s visibility over incidents occurring off the installation. It should also help to ensure that military families obtain the available FAP services for which they are eligible. DOD and DOJ have taken some actions to increase collaboration in addressing the abuse of children on military installations. As previously discussed, the conference report accompanying the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for the service Secretaries to seek to relinquish jurisdiction over offenses committed on military installations by individuals not subject to the Uniform Code of Military Justice, such as civilians and children. In response, according to DOJ officials, DOD and DOJ have, among other things, established a joint working group to coordinate on issues related to child-on-child sexual assault on military installations, including the relinquishment of exclusive federal jurisdiction to the states. Both DOD and DOJ officials agreed that the federal justice system is not well suited to prosecuting juvenile offenses because it lacks a dedicated juvenile justice system and that state courts, which aim to be rehabilitative in nature, are better suited to adjudicate these cases. Specifically, DOJ’s Justice Manual states that the intent of federal laws concerning juveniles is to help ensure that state and local authorities will deal with juvenile offenders whenever possible. Working group officials stated that they are compiling a list of United States Attorneys’ Offices and the military installations in their respective districts from which they have received referrals, as well as the types of jurisdictions at those installations. These efforts are designed to ultimately result in a comprehensive chart detailing the precise jurisdictional status of each military installation in the United States, which can then be used to inform discussions with each state about the relinquishment of exclusive federal jurisdiction. According to DOJ officials, the working group is also developing templates of coordination documents, such as letters and memoranda of understanding for outreach with the states. Working group officials stated that the group has identified and is attempting to address other issues, such as those regarding privacy concerns related to information to be contained in DOD’s centralized database for problematic sexual behavior in children and youth, which, as previously discussed, is under development. The difficulties of addressing child-on-child sexual assault are exacerbated when the incident occurs overseas, where no U.S. state authorities exist to assume jurisdiction. The Military Extraterritorial Jurisdiction Act can be used to either prosecute child offenders as adults—for certain violent or controlled substance violations—or to initiate federal delinquency proceedings. However, as discussed, while both DOD and DOJ officials stated that they prefer to refer children to state courts, this is currently not possible when the incident occurs overseas. Working group officials stated that this challenge is another issue being actively discussed by the group in an effort to identify potential solutions. For example, they stated that one idea under discussion relates to a specific Virginia state law that asserts concurrent jurisdiction over federal crimes committed by a child, to be assumed only if waived by the federal court or the United States Attorney. The discussion centered on the idea that the Virginia state law could potentially be applied extraterritorially. Therefore, if a sexual assault were to occur on an installation with exclusive federal jurisdiction in Virginia—or theoretically overseas where the United States has jurisdiction—the Virginia courts could assert jurisdiction as long as the relevant United States Attorney’s office has waived jurisdiction. However, whether or not Virginia could use its courts to address matters that occurred overseas and where the juvenile offender is not a resident is not yet clear. Legal officials at one installation who are involved in the working group efforts stated that they were considering whether it was possible to have a single municipal court have sole jurisdiction for any juvenile crimes occurring on overseas installations. However, officials stated that the working group continues to research and discuss these types of issues to improve collaboration between the two departments and identify solutions to these important issues. Service officials stated that while DOD is typically notified by DOJ when it declines to prosecute the abuse of a child on a military installation, the notification does not consistently include detailed reasons for why the case was declined. Officials from the Army Criminal Investigation Command—the military criminal investigative organization with the largest number of cases—stated that they are not informed of the reasons for case declinations because they have been told that the information is considered an attorney work product. Officials from the other military criminal investigative organizations stated that for some cases they do receive reasons why they are declined. However, DOJ officials stated that in cases where a United States Attorney does notify DOD of a declination and the reason, it may be very vague, such as “insufficient evidence,” and may not detail the insufficiencies. DOJ officials stated that while a case may be declined for various reasons, there are three primary reasons for declinations: (1) insufficiency of the evidence (not enough admissible evidence to obtain and sustain a conviction beyond a reasonable doubt); (2) the person is subject to prosecution under another jurisdiction, such as in a state court system; or (3) there is an adequate noncriminal alternative to criminal prosecution. Officials within the Executive Office for United States Attorneys stated that they were not aware of any standard letters used to notify DOD of prosecutorial decisions and that the format and content of the notification are office dependent. According to DOJ officials, the investigating organization is to inform victims of a declination of prosecution. However military law enforcement officials from two services stated that the responsibility for informing victims of a declination of prosecution would be dependent on the circumstances of the individual case, such as whether formal charges had been preferred and any discussion between the military criminal investigative organization and United States Attorney. According to some of the parents we spoke with, this process does not always result in a timely notification of a prosecution declination—including the reasons for the declination—to the victims or their families. For example, one parent we spoke with highlighted the lack of information when they tried repeatedly for nearly one year to contact the military investigators for a case status update—while in the process of filing an information request with DOJ—and were finally told that their child’s case had been declined for prosecution with no additional information on the reasons for the declination. Another parent stated that the Assistant United States Attorney informed them that a child-on-child abuse case would not be prosecuted due to a lack of strong evidence, specifically, a poor child forensic interview conducted by the military criminal investigative organization and the mishandling of electronic evidence. DOJ has committed to assisting DOD in responding to incidents of child- on-child abuse through the working group, as discussed previously. Additionally, DOJ has begun tracking referrals made to United States Attorneys by DOD for child-on-child sexual offenses. Specifically, in September 2018, the Director of the Executive Office for United States Attorneys issued a memorandum that instructed all United States Attorneys to begin tracking referrals of child-on-child sexual offenses from the military. According to these data, between October 1, 2018 and August 5, 2019, the military referred 63 of these cases to United States Attorneys for prosecution. Two of these cases were accepted for prosecution and 19 were declined—the remaining cases were either referred to state or local authorities or were still pending. Per the memorandum, this information is to be provided, on a monthly basis, to the Office of the Deputy Attorney General, the lead DOJ office for the working group. DOJ’s Principles of Federal Prosecution recommends that whenever an attorney declines to prosecute, the prosecutor should ensure the decision and reasons are communicated to the investigating agency involved and to any other interested agency. In addition, Standards for Internal Control in the Federal Government states that management should externally communicate the necessary quality information to achieve objectives. Specifically, management selects appropriate methods of communication, such as a written document—in hard copy or electronic format—or a face-to-face meeting. Management periodically evaluates the entity’s methods of communication so that the organization has the appropriate tools to communicate quality information within and outside of the entity on a timely basis. However, United States Attorneys are not consistently communicating the reasons for declining to prosecute DOD cases involving child victims to the military criminal investigative organizations. Without seeking avenues to improve communication between the military criminal investigative organizations and United States Attorneys for relevant cases involving child victims—to help ensure that investigators are notified when prosecution is declined—investigators may not be informed of the reasons why a case is declined, such as for investigative deficiencies or weaknesses. As a result, DOD may be limited in its ability to improve investigative processes or identify areas where additional investigative training may be needed to improve future incident resolution. Improving this communication through the ongoing DOD and DOJ working group or by other means could also increase the information DOD receives about incident outcomes. Additionally, victims and their families may be better informed of their case disposition and the reasoning behind that disposition. Per the National Children’s Alliance, most military installations in the United States with FAP services are located within 50 miles of a Children’s Advocacy Center (CAC). However, military families may not be able to access CAC services because, according to a 2019 study conducted by the Alliance, only 7 percent of CACs with military installations in their service area reported having a memorandum of understanding, which is needed to authorize services associated with a FAP referral. In addition, according to the Alliance’s 2019 study, while 66 percent of service FAP offices reported having a relationship with their local CAC, 47 percent of those offices reported that contact with the local CAC was infrequent. As shown in figure 5, there are CACs in each state. CACs have considerable experience working with abused children. Specifically, according to the National Children’s Alliance, in 2018 CACs collectively served over 367,000 children, conducted over 260,000 forensic interviews, and completed over 91,000 medical exams and treatments. Further, CACs provide a child-friendly environment to conduct these interviews and exams, which are then reviewed by a multidisciplinary team that includes medical, law enforcement, mental health, and legal personnel, victim advocates, and state child welfare agencies. The purpose of the multidisciplinary team is to determine how to best support the child, such as through therapy, courtroom preparation, and victim advocacy. With regard to child forensic interviews, CACs work to minimize retraumatization of a child by only conducting one comprehensive interview of the child that is typically recorded and involves a team viewing the interview from a separate room. The recorded interview can then be shared with other interested parties with a need to know to include doctors, police, lawyers, therapists, investigators, and judges. This prevents the child from having to talk about the traumatic experience repeatedly in environments where they may be uncomfortable, such as in a police station where they may think they are in trouble. Officials from the Naval Criminal Investigative Service stated that they prefer to use CACs for child forensic interviews when available and where agreements are in place. Both the Army and the Air Force’s military criminal investigative organizations stated that, depending on the circumstances of the case, they may make use of CACs when, for example, agents qualified in child forensic interviews are unavailable. At one U.S. installation we visited, military criminal investigators told us that due to personnel transfers they sometimes do not have investigators available who are qualified to conduct these interviews. Other military criminal investigators with whom we spoke noted that the lack of continuous training for military child forensic interviewers is challenging because regular practice is needed to develop and maintain the skillset. One investigator stated that even though they had not conducted a child forensic interview in 4 years, they were still technically qualified to conduct these interviews. Despite their ability to conduct the interviews, we spoke to military criminal investigators who preferred to rely on child forensic interviewers from the CACs who had more expertise because of the volume of interviews that they conduct. In September 2012, we found that agencies that articulate their agreements in formal documents can strengthen their commitment to working collaboratively. However, according to installation and CAC officials, four of the U.S. installations that we visited either did not have a formal agreement in place with the local CAC or noted that maintaining the agreement was challenging because of the limits that military turnover puts on their ability to build such partnerships. DOD has assigned the responsibility to establish formal agreements with counterparts in the community, such as CACs, within the Family Advocacy Committee at each individual installation. However, given that only 7 percent of CACs with a military installation in their area reported having such an agreement in place according to the National Children’s Alliance’s 2019 study, developing installation-level agreements with CACs has had limited success. In 2015, the Federal Bureau of Investigation established a nationwide memorandum of understanding with the National Children’s Alliance to use CACs to conduct forensic interviews. DOD FAP officials stated that a similar agreement between the military services and the National Children’s Alliance would benefit military families. In August 2019, the National Children’s Alliance recommended the development of a national memorandum of understanding between the National Children’s Alliance, service FAPs, and military criminal investigative organizations within each service. Similarly, in August 2019, a report by the Defense Health Board recommended the development of memorandums of agreement with external entities, such as the National Children’s Alliance and state child welfare agencies. DOD FAP and National Children’s Alliance officials noted that discussions about establishing these types of agreements are not new and believed that agreements would be most effective between the National Children’s Alliance and each respective military service and military criminal investigative organization versus at the installation level. As of February 2019, officials from three of the services indicated that while discussions have been underway, none of these military services have an established agreement, though the status of their efforts varies. For example, as of September 2019, Air Force officials described the effort as being in its infancy, with no established timeframes to achieve goals. Marine Corps FAP officials stated that they were exploring the feasibility of establishing an agreement with the National Children’s Alliance, and Navy FAP officials stated that they were developing a draft agreement for services and support to families impacted by problematic sexual behavior in children and youth. However, given the need for services associated with any type of abuse, such an agreement should not be restricted to problematic sexual behavior. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 stated that the Secretaries of the military departments shall permit, facilitate, and encourage multidisciplinary teams at the installations to collaborate with appropriate civilian agencies for services to support child abuse victims. A national memorandum of understanding could help to break down some of the currently cited barriers to collaboration between CACs and the military, and facilitate such a multidisciplinary approach to addressing incidents of child abuse. For example, DOJ has provided funding for CAC-military partnership pilot projects, which are aimed at improving coordination between CACs and the military to address reported incidents of child abuse. Information from current CAC-military partnership pilot projects indicates that a common barrier to coordination of services is continuity in staffing and leadership for their military counterparts. A base commander’s assignment at a post is time limited, as are some military investigative personnel. These frequent changes in staffing and leadership can result in changes in leadership styles, priorities, and methods of operation and can require a perpetual cycle of building relationships and revising protocols with new counterparts. Without a memorandum of understanding in place between each military service and the National Children’s Alliance, the coordination between the military services and the CACs will continue to be ad hoc and dependent on the relationships of individuals at each installation. Further, without such agreements, the military services may not be fully aware of CAC services and thus may not effectively leverage their facilities or personnel to help address incidents of child abuse involving military dependents. While DOD has taken steps to address recent incidents of child-on-child sexual abuse reported by the media—by establishing policies and beginning to develop a centralized database for problematic sexual behavior in children and youth—the department faces broader challenges, related to visibility, process, and collaboration in addressing the abuse of children. For example, DOD’s visibility over incident outcomes and the extent to which children have been abused—by an adult or another child—is limited by standalone databases, information- sharing challenges, and personnel discretion at the installation level. As DOD develops a centralized database on problematic sexual behavior, it could address some of these challenges by expanding the scope of the database to include any abuse of a child, regardless of offender and type of abuse, and making key decisions related to its development. Further, additional guidance and processes are needed to help reduce information-sharing challenges and installation-level discretion in the tracking and reporting of these incidents. Until DOD resolves these challenges, it will continue to have limited visibility over the extent to which children have been affected by abuse on military installations or as military dependents. Additionally, the department faces gaps in its existing processes for responding to and resolving incidents of child abuse that should be addressed as it continues to develop processes related to problematic sexual behavior in children and youth. For example, given concerns expressed by medical personnel across the military services, DOD should expand the voting membership of the IDC to include medical personnel to ensure that stakeholders with pertinent knowledge and expertise are included. It is critical that IDC determinations are made with all of the relevant information available. Moreover, qualified medical personnel play an essential role in responding to children who have been abused, such as by conducting sexual assault exams. However, according to DOD officials, there are only 11 certified pediatric sexual assault examiners across the department. Without processes to ensure that children who are sexually abused overseas have timely access to a qualified examiner, child victims of sexual abuse may not receive exams in time for the evidence to be collected for use in prosecution and may experience additional stress and trauma. Until DOD addresses these process-related challenges, among others, child victims and their families may not receive the assistance, care, and services that they need. Finally, while DOD has successfully collaborated with a number of states to increase information sharing and with DOJ to address child-on-child sexual offenses occurring on military installations, there are opportunities for DOD to improve its collaboration with external partners to the benefit of military families. For example, there are opportunities to improve communication between the military criminal investigative organizations and United States Attorneys to ensure that DOD is aware of declinations of cases involving the abuse of children and why they were declined. Such avenues could, among other things, help identify needed changes to investigative processes or training. Further, there are opportunities to facilitate awareness and increase the military services’ use of CAC resources, such as through the establishment of a national agreement between the National Children’s Alliance and each military service. Ultimately, improving interagency collaboration could enhance DOD’s visibility over these incidents and increase the resources available to both the department and victims of abuse. We are making a total of 23 recommendations, including 11 to the Secretary of Defense, three to the Secretary of the Army, six to the Secretary of the Navy, and three to the Secretary of the Air Force. The Secretary of Defense, in collaboration with the Secretaries of the military departments, should expand the scope of the department’s centralized database on problematic sexual behavior in children and youth, which is under development, to also track information on all incidents involving the abuse of a child (physical, sexual, emotional, and neglect) reported to the Family Advocacy Program or investigated by a military law enforcement organization, regardless of whether the offender was another child, an adult, or someone in a noncaregiving role at the time of the incident. (Recommendation 1) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should, as part of the ongoing development of the centralized database, identify and define the elements to be tracked by each responsible organization, such as the Family Advocacy Program and military law enforcement. (Recommendation 2) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should develop a plan for how it will use the data it will collect in the centralized database to help ensure data-driven decision-making is used to inform program efforts. (Recommendation 3) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should establish a reliable schedule for the development and implementation of the centralized database on problematic sexual behavior in children and youth that includes key activities, the timeframes and resources needed to execute them, and GAO-identified practices for developing and maintaining a reliable schedule. (Recommendation 4) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should direct the service Family Advocacy Programs and military law enforcement organizations to document in their respective databases the date that they notified the other entity of a reported incident of child abuse. (Recommendation 5) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should issue guidance that describes the process through which the service Family Advocacy Programs are to receive and incorporate information into their central registries regarding child abuse allegations and determinations involving their servicemembers and dependents that were recorded by another service’s installation Family Advocacy Program. Such guidance should include a mechanism to monitor that the process is occurring consistently. (Recommendation 6) The Secretary of the Army should develop a process to monitor how reported incidents of child abuse are screened at installations to help ensure that all reported child abuse incidents that should be presented to an Incident Determination Committee are consistently presented and therefore tracked. (Recommendation 7) The Secretary of the Navy should develop a process to monitor how reported incidents of child abuse are screened at installations to help ensure that all reported child abuse incidents that should be presented to an Incident Determination Committee are consistently presented and therefore tracked. (Recommendation 8) The Secretary of the Navy should ensure that the Commandant of the Marine Corps develops a process to monitor how reported incidents of child abuse are screened at installations to help ensure that all reported child abuse incidents that should be presented to an Incident Determination Committee are consistently presented and therefore tracked. (Recommendation 9) The Secretary of the Air Force should develop a process to monitor how reported incidents of child abuse are screened at installations to help ensure that all reported child abuse incidents that should be presented to an Incident Determination Committee are consistently presented and therefore tracked. (Recommendation 10) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Director of the Department of Defense Education Activity, clarifies Department of Defense Education Activity guidance to define what types of incidents must be reported as “serious incidents” to help ensure that all serious incidents of which Department of Defense Education Activity leadership needs to be informed are accurately and consistently reported by school administrators. (Recommendation 11) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should expand the voting membership of the Incident Determination Committee to include medical personnel with the requisite knowledge and experience. (Recommendation 12) The Secretary of the Army should establish efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed following the report, such as a comprehensive guide that explains the process the Family Advocacy Program and military law enforcement organizations will follow, and available victim services. (Recommendation 13) The Secretary of the Navy should establish efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed following the report, such as a comprehensive guide that explains the process the Family Advocacy Program and military law enforcement organizations will follow, and available victim services. (Recommendation 14) The Secretary of the Navy should ensure that the Commandant of the Marine Corps establishes efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed following the report, such as a comprehensive guide that explains the process the Family Advocacy Program and military law enforcement organizations will follow, and available victim services. (Recommendation 15) The Secretary of the Air Force should establish efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed following the report, such as a comprehensive guide that explains the process the Family Advocacy Program and military law enforcement organizations will follow, and available victim services. (Recommendation 16) The Secretary of Defense, in collaboration with the Secretaries of the military departments, should clarify, in guidance, the circumstances under which commanders may exercise their authority to remove a child from a potentially unsafe home on an overseas installation. (Recommendation 17) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Director of the Defense Health Agency, establishes processes that help ensure children who are sexually abused overseas have timely access to a certified pediatric sexual assault forensic examiner to conduct the examination. Initiatives could include certifying pediatricians or adult sexual assault forensic examiners as pediatric examiners during mandatory training or establishing shared regional assets. (Recommendation 18) The Secretary of Defense, in collaboration with the Deputy Attorney General, should seek avenues to improve communication between the military criminal investigative organizations and United States Attorneys for relevant cases involving child victims to help ensure that investigators are notified when prosecution is declined, including the reasons for the declination when appropriate, such as details about any investigative deficiencies. (Recommendation 19) The Secretary of the Army should seek to develop a memorandum of understanding with the National Children’s Alliance that makes children’s advocacy center services available to all Army installations and thereby increase awareness of those services across the department. (Recommendation 20) The Secretary of the Navy should continue to develop a memorandum of understanding with the National Children’s Alliance that makes children’s advocacy center services available to all Navy installations and thereby increase awareness of those services across the department. (Recommendation 21) The Secretary of the Navy should ensure that the Commandant of the Marine Corps continues to develop a memorandum of understanding with the National Children’s Alliance that makes children’s advocacy center services available to all Marine Corps installations and thereby increase awareness of those services across the service. (Recommendation 22) The Secretary of the Air Force should seek to develop a memorandum of understanding with the National Children’s Alliance that makes children’s advocacy center services available to all Air Force installations and thereby increase awareness of those services across the department. (Recommendation 23) We provided a draft of this report to DOD for review and comment. In its written comments, DOD concurred with 16 recommendations, partially concurred with six recommendations, and did not concur with one recommendation. DOD also provided technical comments (referred to as enclosure 1 in its written comments), which we incorporated as appropriate. DOD’s written comments are summarized below and reprinted in appendix VI. For the 16 recommendations with which DOD concurred, DOD’s written comments discuss ongoing and planned efforts to implement our recommendations, and in some cases provide target completion dates. DOD did not concur with our first recommendation to expand the scope of its centralized database on problematic sexual behavior in children and youth to track information on all incidents involving the abuse of a child reported to the FAP or investigated by a military law enforcement organization. In its written comments, DOD stated concerns related to privacy and protecting information collected and shared on the alleged conduct of juveniles. DOD also cited a statutory requirement to not disclose directly or indirectly certain juvenile records during the course of juvenile delinquency proceedings and stated that it is the department’s position that it is imperative to protect sensitive juvenile data with any database. We agree that protecting sensitive juvenile data is imperative and acknowledge in the report that privacy and data-safeguarding precautions—such as role-based permissions and other physical, technical, and administrative controls—will need to be taken, as they were in the development of the Defense Sexual Assault Incident Database. In addition, as discussed in the report, the department already maintains databases that include information about both adults and children, such as the service FAPs’ central registries and the databases of the various military criminal investigative organizations, which contain data on both adult and juvenile offenders and victims. DOD does not assert that it would be impossible to establish role-based permissions and the sorts of physical, technical, and administrative controls that would protect the privacy rights of individuals whose information appeared in a central database like the one we recommend. Moreover, the existence of other DOD databases that incorporate such measures supports the notion that it is possible to develop such a database in this situation. Doing so would provide the information needed to track the extent to which children have been affected by abuse and problematic sexual behavior, while safeguarding the personal information of minors. DOD’s written comments also stated that the report conflates three separate and distinct constructs of behavior: juvenile misconduct, problematic sexual behavior in children and youth, and child abuse and neglect committed by adults. As described in our scope and methodology, the scope of our review included child abuse inflicted by both adults and children, which, according to DOD definitions, includes the three categories of behavior noted above. As stated in our report, information is tracked in multiple standalone databases, due, in part, to who inflicted the abuse; as a result, it is difficult to know the extent to which children have been affected by abuse on military installations or as military dependents. In addition, while the response process differs between incidents of adult- inflicted child abuse and incidents of problematic sexual behavior, DOD officials acknowledged that the organizations involved in the response process and the primary data sources are the same. As we also noted, officials stated that a centralized database for all child abuse incidents, tracking the FAP’s determination about whether an incident met DOD’s criteria for abuse, the investigation, and resolution, would be beneficial in determining what happened in a particular case. These officials further stated that such a database would benefit commanders’ oversight of cases for which they are responsible. In addition, without a centralized database that tracks all incidents of abuse involving children, DOD and Congress do not know the extent to which children have been affected by abuse on military installations or as military dependents, or how such incidents have been responded to and resolved. This makes it difficult to identify and address trends that could lead to further prevention efforts. As such, we continue to believe that this recommendation is valid and should be implemented. DOD partially concurred with recommendation 5 to direct the service FAPs and military law enforcement organizations to document in their respective databases the date they notified the other entity of a reported incident of child abuse. In its written comments, DOD stated that it will analyze the efficiency, cost, and feasibility of recording the notification date to law enforcement in FAP databases and that it plans to incorporate a notification field as part of new data standards for DOD’s criminal justice agencies. Similarly, DOD also partially concurred with recommendation 6 to issue guidance that describes the process through which the service FAPs receive and incorporate information into their central registries regarding child abuse allegations and determinations involving their servicemembers and dependents that were recorded by another service’s installation FAP, and that the guidance include a mechanism to monitor that the process is occurring consistently. DOD stated that it will review FAP data reporting policy to explore the potential to reference this process in the scheduled reissuance of DOD policy in 2023. DOD further stated that such information sharing is limited to reported incidents of child abuse that were determined to have met DOD’s criteria for abuse rather than all abuse allegations. We continue to believe that issuing guidance that extends to both allegations and determinations would provide better assurance that the services have complete and up-to-date information about their personnel and their dependents, and increase their visibility over incidents of child abuse. DOD partially concurred with recommendation 12 to expand the voting membership of the IDC to include medical personnel with the requisite knowledge and experience. In its written comments, DOD agreed that the inclusion and consideration of medical information in the determination process is important, and stated that the current process includes medical personnel as nonvoting members. DOD also stated that it will engage the researchers who developed the IDC algorithm and process, as well as other stakeholders—including the Defense Health Agency and the military services—for collaborative input and guidance for a forthcoming revision of the relevant DOD Manual. However, as discussed in the report, medical personnel we spoke with at installations stated that they are not always included in the process, and if they are, their medical expertise is not always included as part of the final determination, contrary to best practices for substantiating child abuse allegations. Further, if medical personnel are not voting members, other clinical duties may take precedence. Therefore, we continue to believe that this recommendation is valid. For recommendations 13, 14, and 16, the Army, the Navy, and the Air Force concurred that they should establish efforts to comprehensively inform victims’ families about how reported incidents of child abuse will be addressed following the report, such as a comprehensive guide that explains the process and available victim services. However, the Marine Corps partially concurred with the related recommendation 15, stating that it is out of scope for the FAP to explain the processes that law enforcement organizations will follow. However, our recommendations state only that the FAP and military law enforcement processes should be effectively communicated to the families, not that the FAP would have to determine or communicate the law enforcement processes to affected families. Further, DOD’s written comments stated that Marine Corps Order 1754.11 addresses the recommendation because it directs victim advocates to be assigned to the non-offending parent of a victim of child abuse who requests services. However, parents we spoke with indicated that they were not aware of all available services and resources offered by the military, and that a comprehensive guide outlining the process would have helped them understand what was going to happen. For these reasons, we continue to believe that the recommendation is valid. For recommendations 20 through 23, DOD’s written comments stated that the services concurred with the overall recommendation to seek to establish memorandums of understanding with the National Children’s Alliance that make children’s advocacy center services available to all military installations and thereby increase awareness of those services across the department. While the Marine Corps and the Air Force concurred (recommendations 22 and 23), DOD noted that individual service differences in organizational structure and process are reflected in the nuances of their responses. For example, the Army partially concurred with recommendation 20. DOD stated that the Army is working with the National Children’s Alliance to develop a broad memorandum of understanding to support partnerships between military installations and local children’s advocacy centers. The agreement is intended to assist in providing support services, education, and prevention services to military families and investigations of child abuse and problematic sexual behavior with a goal to finalize the agreement in fiscal year 2021. The Army also plans to pursue local agreements with children’s advocacy centers who may not participate in the broader service-wide agreement. We believe that such local agreements, in addition to a broader memorandum of understanding with the National Children’s Alliance, would be beneficial and that these actions would meet the intent of our recommendation. Likewise, the Navy partially concurred with recommendation 21. DOD’s written comments stated that the Navy seeks to develop memorandums of understanding both broadly with the National Children’s Alliance, as well as with local children’s advocacy centers who may not be accredited through the National Children’s Alliance. Similar to the Army, we believe that such local agreements would be beneficial in addition to a broader agreement with the National Children’s Alliance and, that together, they would meet the intent of our recommendation. DOD’s comments also stated that the Navy’s planned agreement with the National Children’s Alliance will outline services and support to families affected by problematic sexual behavior. However, as previously discussed in this report, we believe that such an agreement should not be restricted to problematic sexual behavior given the need for services associated with any type of abuse. As such, we continue to believe that the recommendation is valid. We are sending copies of this report to the appropriate congressional committees, the Attorney General of the United States, the Secretary of Defense, the Secretary of the Army, the Secretary of the Navy, the Secretary of the Air Force, and the Commandant of the Marine Corps. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or members of your staff have any questions regarding this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix VII. Department of Defense (DOD) policy defines child abuse as the physical, sexual, or emotional abuse, or neglect of a child by a parent, guardian, foster parent, or caregiver. Our review included any abuse of a child (emotional, physical, or sexual abuse, or neglect) by an adult regardless of their caregiving status and child-on-child abuse—any physical or sexual abuse of a child (under the age of 18) by another child. To assess the extent to which DOD has visibility over reported incidents of child abuse, including child-on-child abuse, occurring on military installations or involving military dependents, we analyzed data from the three primary organizations that DOD officials identified as having responsibility for tracking these incidents: (1) the military services’ Family Advocacy Programs (FAP), (2) the military criminal investigative organizations, and (3) the DOD Education Activity (DODEA). First, we analyzed FAP data from the Army, the Navy, the Marine Corps, and the Air Force on all reported incidents of child abuse for fiscal years 2014 through 2018. We selected this timeframe to evaluate trends over 5 years, and fiscal year 2018 was the most recent year for which complete data were available at the time of our review. Specifically, we analyzed the data to determine the number of reported incidents of child abuse by service and the percent of those that met DOD’s criteria for child abuse. Because the services are required to track more detailed information about incidents of child abuse that they determined met DOD’s criteria for child abuse, we conducted a more detailed analysis of these incidents to describe their characteristics, such as the status of the offender, the relationship between the offender and the victim, the age of the victim, and the type of abuse (emotional, physical, sexual, or neglect). To assess the reliability of the service FAPs’ child abuse data, we reviewed related documentation; assessed the data for errors, omissions, and inconsistencies; and interviewed officials. We determined that the data were sufficiently reliable to describe trends in reported incidents of child abuse across the services and characteristics of such incidents from fiscal years 2014 through 2018. Second, we analyzed data from the military criminal investigative organizations—the Army Criminal Investigation Command, the Naval Criminal Investigative Service, and the Air Force Office of Special Investigations—for the same time period for all investigations with a child victim. We also analyzed child victim investigation data from the U.S. Marine Corps Criminal Investigation Division, a federal law enforcement agency that also investigates some offenses involving child victims. Specifically, we analyzed the data to identify trends in the number of investigations over the past 5 fiscal years. We also analyzed the investigation data to identify key characteristics of the investigations, such as the status of the offender, relationship between the victim and offender, and primary investigative agency. To assess the reliability of the military criminal investigative organizations’ child victim investigation data, as well as that of the U.S. Marine Corps Criminal Investigation Division, we assessed the data for errors, omissions, and inconsistencies, and interviewed officials. We determined that the data were sufficiently reliable to describe trends in child victim investigations across the services and the characteristics of such investigations from fiscal years 2014 through 2018. Third, we analyzed three sources of DODEA data: (1) child abuse reports from school years 2014-2015 through 2017-2018, (2) serious incident reports from school years 2013-2014 through 2017-2018, and (3) student misconduct records from school years 2016-2017 through 2017-2018. We selected these timeframes to evaluate serious incident report trends over 5 years and to align with the FAP and investigation data; school year 2017-2018 was the most recent year for which complete data were available at the time of our review. All DODEA records were redacted by DODEA personnel to ensure the privacy of students and DODEA personnel. DODEA child abuse reports track information about incidents of suspected or alleged child abuse or neglect. We analyzed DODEA’s child abuse reports over 4 school years to identify trends in the number and type of child abuse reports as well as to describe characteristics of the reports. Specifically, we analyzed characteristics such as the relationship between the victim and the offender, the location of the reported abuse, and notifications by DODEA to external organizations, such as the FAP. To assess the reliability of DODEA’s child abuse reports, we reviewed related documentation; assessed the data for errors, omissions, and inconsistencies; and interviewed officials. We determined that the data were sufficiently reliable to describe trends in and characteristics of child abuse reports from school years 2014-2015 through 2017-2018. DODEA serious incident reports track information about alleged or suspected serious incidents resulting in consequences greater than those normally addressed through routine administrative actions. We analyzed DODEA’s serious incident reports relating to child-on-child abuse— involving a violation of law or a sexual event—over the past 5 school years to identify trends in the number and type of serious incident reports as well as to describe characteristics of the reports. Specifically, we analyzed the type of serious incident (assault/battery, child pornography, nonconsensual sexual contact, etc.), whether police were notified, whether the police investigated, and the type of school filing the report. To assess the reliability of DODEA’s serious incident reports, we reviewed related documentation; assessed the data for errors, omissions, and inconsistencies; and interviewed officials. We determined that the data were sufficiently reliable to describe trends in and characteristics of serious incident reports from school years 2013-2014 through 2017-2018, and to compare serious incident reports to DODEA student misconduct records from school years 2016-2017 through 2017-2018. DODEA’s student misconduct records are separate from child abuse reports and serious incident reports—but may also be filed in relation to a serious incident—and track information regarding disciplinary actions and the triggering incident, such as an abusive or indecent act. We requested and received all redacted DODEA student misconduct records over the past 5 school years that involved at least one of 26 incident types that we determined, through conversations with DODEA officials familiar with the records, could relate to a child-on-child serious incident. We received over 26,000 records, some of which related to the same incident, for example, according to DODEA officials, when more than one student was involved. For school years 2016-2017 and 2017-2018, we conducted a content analysis of the student misconduct records, using DODEA’s Serious Incident Reporting Procedures, to determine the number of student misconduct records that school administrators, using that guidance, could have reasonably categorized as a violation of law or sexual event and filed a serious incident report. We selected these 2 school years for the analysis because DODEA’s updated serious incident reporting guidance was issued in August 2016 and was in place for both school years. Because of the large number of DODEA student misconduct records, we conducted our content analysis in two stages. We first conducted an electronic search to identify potentially-relevant records and then conducted a manual review of all potentially-relevant records. One of our data analysts electronically searched the student misconduct record descriptions for key terms that could potentially signify that the incident was of a nature serious enough to warrant the filing of a serious incident report, per DODEA guidance. We selected the search terms using the DODEA guidance (e.g., assault, battery, and rape); additional terms that may signify a medical or police response (e.g., nurse, ambulance, blood, and police) because incidents resulting in an injury may be considered to be serious incidents per the guidance; and terms for common social media outlets (e.g., Facebook and Snapchat) because taking or sharing nude photos of another student without their knowledge is an example of a noncontact sexual act that should result in the filing of a serious incident report. This search resulted in 2,619 student misconduct records—after removing duplicate records—that we then manually reviewed. It is possible that we did not identify some student misconduct records that could have been categorized as serious incidents because we did not include some search terms that would have identified more. Two analysts independently reviewed each of the 2,619 student misconduct records, using the DODEA guidance, and recorded their determination that a record (a) could have been classified as a serious incident report per DODEA’s guidance, (b) was unclear whether it could be classified as a serious incident report, or (c) should not have been classified as a serious incident report per DODEA’s guidance. For records where the two analysts did not initially agree on a determination, they met and discussed the records and reached a final determination. We then compared the number of student misconduct records which we determined school administrators, using the guidance, could have reasonably categorized as a violation of law or sexual event and filed a serious incident report with the number of serious incidents recorded by DODEA for the same time period to determine the extent of DODEA’s visibility into serious incidents. We discussed the student misconduct records, the content analysis, and the comparison to serious incident reports with DODEA officials. Further, we interviewed relevant DOD and service officials at the headquarters level and at a nongeneralizable sample of seven military installations to identify how DOD tracks reported incidents of child abuse from the time of a report to an ultimate adjudication, including how information is communicated within and across the services. We selected at least one installation per service as well as two joint installations, and selected locations based on the number of reported child abuse incidents and the number of investigated child-on-child abuse incidents over the past 5 fiscal years, as well as other factors. Specifically, we selected installations that over the past 5 fiscal years had a high number of reported incidents of child abuse or a high number of child-on-child abuse investigations—or both—in order to maximize the possibility we would interview officials, responders, and care providers who had responded to reported incidents of child abuse. Other selection factors included a mix of types of legislative jurisdiction (such as exclusive and concurrent jurisdiction), at least some installations with DODEA schools, a high number of DODEA serious incident reports, and a mix of geographic locations in the United States and overseas. Because we did not select locations using a statistically representative sampling method, the comments provided during our interviews with installation officials are nongeneralizable and therefore cannot be projected across DOD or a service, or any other installations. While the information obtained was not generalizable, it provided perspectives from installation officials that have assisted with the response to reported incidents of child abuse. We compared information from our data analyses and interviews to DOD guidance; GAO-identified practices for developing and maintaining a reliable schedule; GAO-identified leading practices for results-oriented management; and Standards for Internal Control in the Federal Government related to quality information, control activities, and monitoring activities. To assess the extent to which DOD has developed and implemented policies and procedures to respond to and resolve incidents of child abuse, including child-on-child abuse, occurring on military installations or involving military dependents, we reviewed relevant DOD and service policies, guidance, reports, and memoranda on child abuse, juvenile misconduct, and problematic sexual behavior in children and youth. We also conducted work at a nongeneralizable sample of seven military installations in the United States and overseas. At the installations, we interviewed FAP personnel, medical and mental health personnel, military law enforcement officials, legal personnel, Special Assistant United States Attorneys, military criminal investigators, chaplains, child development center personnel, school liaison officers, military family life counselors, DODEA personnel, and commanders about how they prevent, track, respond to, and resolve these incidents. To obtain the perspectives of parents and guardians of children who have been affected by abuse on military installations or while they were military dependents (either by an adult or another child), we interviewed 20 parents and guardians by phone that volunteered to speak with us about their perspectives on available resources and assistance, case communication, and the investigative and adjudicative processes. To develop the interview protocol for parents and guardians, we reviewed DOD and service policies, interviewed DOD officials, and reviewed our prior work related to sexual assault in the military. We also consulted with a GAO mental health professional on the appropriateness of the instrument as well as guidance on resources to offer participants if relevant. A survey specialist helped to design the interview protocol, another survey specialist reviewed it for methodological issues, and an attorney reviewed it for legal terminology and any other issues. Prior to interviewing parents and guardians, we pretested the interview protocol with three analysts who had children and had experience as a military servicemember or military dependent. We used the pretests to determine whether: (1) the questions were clear, (2) the terms used were precise, (3) respondents were able to provide information that we were seeking, and (4) the questions were unbiased. We made changes to the content and format of the interview protocol based on the results of our pretesting. Further, each team member was trained on the interview protocol to assure its consistent implementation across interviewers and participants. Due to the sensitivity of the information being discussed, we took several steps to help ensure a confidential and safe environment during the phone interviews. All information provided was handled confidentially— callers’ names and contact information were not recorded in our notes and we did not audio record the interviews. We conducted interviews from June to September 2019. We took interview notes on paper and later entered them into a Microsoft Word form. Data entry was verified by the same analyst. The data were electronically extracted from the Word forms into a comma-delimited file that was then imported into Excel for analysis. We summarized the answers to questions about the characteristics of the incidents discussed, such as whether the offender was a child or an adult, the location of the incident, the military dependent status of the victim, and the servicemember status of the offender. Quantitative data analyses were conducted by one analyst and verified by a second analyst. We also conducted a content analysis of the narrative information to identify common themes related to items such as parents’ awareness of available victim services, the clarity of the response process, and areas for improvement. Two analysts reviewed the data collected from the interviews and agreed on the themes into which callers’ comments would be categorized. Standardized coding instructions were developed and tested. One analyst reviewed all the callers’ narrative comments and indicated in the spreadsheet if a theme was present or absent. A different analyst reviewed the first analyst’s coding to see if they reached the same determination. For records where the two analysts did not initially agree on a determination, they met and discussed the records and reached a final determination. The codes were then counted to assess how many callers mentioned a given theme. Because we did not select participants using a statistically representative sampling method, the perspectives obtained are nongeneralizable and therefore cannot be projected across DOD, a military service, or installation. While the information obtained was not generalizable, it provided perspectives from parents and guardians who were willing to discuss their experiences with the reporting, response, and resolution processes. Additionally, we observed each service’s Incident Determination Committee (IDC) process—through which installations determine whether an incident meets DOD’s criteria for child abuse—at a total of four installations. We also attended a symposium hosted by the National Center on Sexual Exploitation on problematic sexual behavior in children and youth. We compared the information from the selected installations, observations, and interviews to GAO-developed practices to enhance and sustain collaboration in interagency groups, Department of Justice (DOJ) best practices for sexual assault forensic examination kits, and Standards for Internal Control in the Federal Government related to quality information. To assess the extent to which DOD collaborates with other governmental and nongovernmental organizations to address incidents of child abuse, including child-on-child abuse, occurring on military installations or involving military dependents, we reviewed written agreements in place with civilian organizations at the nongeneralizable sample of U.S. installations in our review, such as agreements with local civilian law enforcement and state and local child welfare agencies about how incidents of child abuse on the installation are to be addressed. We also interviewed relevant officials from civilian organizations near the five U.S. installations in our review, such as state child welfare agencies, law enforcement organizations, prosecuting attorneys offices, and children’s advocacy centers (CAC) to determine the extent of their collaboration with the military and any related challenges. In addition, we interviewed a senior official from the Defense State Liaison Office regarding their outreach to states to increase information sharing with state child welfare agencies. Further, we interviewed DOJ officials regarding the prosecution of juvenile crimes committed on overseas installations and on some U.S. installations and its coordination with DOD to address these incidents. Finally, we contacted officials from the National Children’s Alliance, which accredits CACs, about its efforts with DOD to improve collaboration between the military and CACs. We compared the agreements and information obtained through interviews with DOJ Principles of Federal Prosecution, GAO-developed key considerations for interagency collaborative mechanisms, and Standards for Internal Control in the Federal Government related to quality information. Tables 2 and 3 present the DOD and non-DOD organizations we visited or contacted during our review to address our three objectives. We conducted this performance audit from January 2019 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To obtain the perspectives of parents and guardians of children affected by abuse on military installations or while they were military dependents, we interviewed parents and guardians who volunteered to speak with us about their perspectives on available resources and assistance, case communication, and the investigative and adjudicative processes. We announced our interest in anonymously interviewing parents and guardians of children affected by abuse on military installations or while they were military dependents and provided a toll-free telephone number and email address for volunteers to contact us. Department of Defense Military Community and Family Policy officials, who are responsible for Military OneSource—a 24/7 connection for military families to information, answers and support—agreed to post our announcement on the Military OneSource website. We also posted our announcement on our agency social media platforms and disseminated it through officials at some of the installations we visited. It was also featured in an article by a military- focused news outlet. Further details about our methodology for these interviews can be found in appendix I. The interview questionnaire follows. 1. In what state are you currently located, or if you’re overseas, in what 2. Are you currently, or were you previously, associated with a particular military service, including as a military dependent?  Which service? ______________ 3. Are you calling about abuse that your child experienced, or a child for whom you are a guardian experienced, or are you calling about someone else’s child’s experience? My child/a child for whom I am a guardian Someone else’s experience  Go to Question 4  End discussion 4. In what year did the abuse occur? (If multiple years, write the range.) Year provided 5. Was the abuse reported to any military or civilian government office?  Continue to “a” a. In what year was the abuse first reported? 6. Did the abuse occur on the property of a military installation, including in military housing?  What installation was it? _______________ a. Was the child who was affected by abuse a military dependent at the time of the incident?  If “no” here and Q6 above is no, don’t know, or prefer not to answer, End discussion Don’t Know know, or prefer not to answer, End discussion  If “don’t know” here and Q6 above is no, don’t  If “prefer not to answer” here and Q6 above is no, don’t know, or prefer not to answer, 7. Did the abuse occur in a child care facility, a home, a DOD school, or somewhere else? Interviewer: Check all they mention a. (Skip if the abuse occurred on an installation and the installation was provided in Q6) In what state or country did the abuse occur? 8. Was the individual who perpetrated the abuse a servicemember at the time of the incident?  Continue to “a”  Continue to “a”  Continue to “a” a. Was the individual who perpetrated the abuse another child under the age of 18 at the time of the incident? Prefer not to answer 9. Was the individual who perpetrated the abuse a parent, guardian, foster parent, or someone in a caregiving role at the time of the incident, including an older sibling babysitting, or a teacher, etc.? 10. What organization was the abuse first reported to? For example, was it first reported to the Family Advocacy Program, military law enforcement, military criminal investigators, civilian law enforcement, the chain of command, Child Protective Services, or some other organization? Family Advocacy Program (FAP)  Continue to “a” Military law enforcement (Security Forces, Military Police, Provost’s Office, Master-at-Arms, etc.)  Continue to “a” Military criminal investigators (CID, OSI, NCIS, Marine Corps CID)  Continue to “a”  Continue to “a” Chain of Command (to include Commander, Unit, Wing, etc.)  Continue to “a” Child Protective Services (CPS)  Skip to “b” Chaplain military or civilian government organization?  Did you or the chaplain report the abuse to any other  What office?  What office? _______ then continue to “a” Was the abuse ever reported to a civilian Child Protective Services agency?  Continue to “b”  Continue to “b”  Continue to “b”  Continue to “b” Was the abuse ever reported to the Family Advocacy Program?  Continue to “c”  Continue to “c”  Continue to “c” c. Had you ever heard of the Family Advocacy Program before this interview? Prefer not to answer 11. Are you aware that the Family Advocacy Program is responsible for assessing and providing support services to military families affected by child abuse? 12. (If child was abused by a parent/guardian/foster parent/someone in a caregiving role—If Q9 = Yes) Were you notified by the Family Advocacy Program about whether the incident was considered to be child abuse, according to DOD criteria and policy?  Continue to “a”  Skip to “Response to Abuse” section  Skip to “Response to Abuse” section  Skip to “Response to Abuse” section a. Was the Family Advocacy Program’s process for assessing the report of abuse and determining whether it met criteria to be considered child abuse clear to you? b. Is there anything that the Family Advocacy Program could do to clarify the process or make the process clearer? III. Response to Abuse 13. Did the child or family receive any services from the military related to the abuse, for example, psychological or legal counseling or medical care?  Continue to “a” a. What services did the child or family receive from the military? b. What, if any, services provided by the military were particularly helpful? c. What, if any, services were provided by the military but did not meet your family’s needs? i. Why didn’t those services meet your family’s needs? _________________________________________ d. What, if anything, could be improved about the services you received from the military, such as the services themselves, or the ease of access or timeliness of the services provided? 14. Were there services that your child or family were offered by the military, but that you did not receive, either because you did not need them or because of some other factor?  Continue to “a” a. What type of services were offered but not received? b. Why did you not receive these services—for example, was it by choice or was there some factor that prevented you from receiving them? _________________________________________ 15. Did your child or family receive any services from civilian organizations or providers related to the abuse, for example, psychological or legal counseling or medical care?  Continue to “a” a. What services did your child or family receive from civilian organizations or providers? 16. Were there any services—either through the military or a civilian agency—that you think would have been helpful, but were not available?  Continue to “a” a. What services? _________________________________________ IV. Investigation/Resolution of Abuse 17. Was the incident of abuse investigated by any law enforcement organization, including military or civilian law enforcement? For example, was the incident of abuse investigated by the military police, a military investigative organization, civilian state or local law enforcement, the Federal Bureau of Investigation, or some other law enforcement organization?  Continue to “a” Skip to “Miscellaneous Questions” section Skip to “Miscellaneous Questions” section Skip to “Miscellaneous Questions” section a. What law enforcement organization or organizations conducted an investigation? If more than one law enforcement organization conducted an investigation, please tell me all the organizations. Military police (Security Forces, Military Police, Provost’s Office, Marshal-at-Arms, etc) Military investigative organization (CID, OSI, NCIS, Marine Corps CID) 18. (If military conducted an investigation, see response to Q17a) What type of information did you receive from the investigating military organization during the course of the investigation, if any, such as status updates by phone, e-mail, or letter? _________________________________________ a. Did you have a point of contact that you could reach out to at the investigating military organization with any questions or for status updates? 19. After the investigation ended, were you informed about the outcome or informed of any next steps regarding any potential criminal or administrative action against the individual that perpetrated the abuse?  Continue to “a”  Continue to “a” a. Did you have a point of contact that you could reach out to with any questions about the outcome of the investigation or next steps? Prefer not to answer 20. What, if anything, would you recommend that DOD or the military services do to be more responsive to families of children who have been affected by abuse on military installations or as military dependents? 21. What, if anything, would you recommend DOD or the military services do to help prevent child abuse or child-on-child abuse? 22. Is there anything related to child abuse on military installations or of military dependents that we did not discuss but you think we should be aware of? 23. One last question: Was there anyone else present with you during any part of our conversation? Continue to “a” Each military service’s Family Advocacy Program (FAP) has a database—referred to as the “central registry”—where it tracks (1) reports of abuse that did not meet the Department of Defense’s (DOD) criteria for child abuse, about which no identifiable individual information is tracked; and (2) information on reports of abuse that met DOD’s criteria for abuse, which is linked to identifiable servicemembers, their family members, and the alleged offenders. Per DOD guidance, the services are to track 46 data elements on all reported incidents of child abuse that met DOD’s criteria for abuse. The service FAPs only track information in their central registries related to child abuse where the offender was a parent, guardian, foster parent, or someone in a caregiving role. The following describes key characteristics of incidents of child abuse that met DOD’s criteria for abuse as reported to the Army, the Navy, the Marine Corps, and the Air Force FAPs from fiscal years 2014 through 2018. Army FAP. Over the past 5 fiscal years, the Army FAP recorded 32,386 reported incidents of child abuse, of which 50 percent met DOD’s criteria for child abuse. Of the incidents that met DOD’s criteria for abuse, 66 percent involved neglect, 20 percent involved physical abuse, 17 percent involved emotional abuse, and 5 percent involved sexual abuse. The majority of incidents (97 percent) were intrafamilial—meaning that the victim and the offender were from the same family, such as a parent or sibling—and 2 percent of the incidents were extrafamilial or external to the family, such as a babysitter or a childcare provider. Half of the victims and 52 percent of the offenders were male. In addition, a quarter of offenders had prior FAP cases related to child abuse or domestic abuse that met DOD’s criteria for abuse. Figure 6 depicts characteristics of incidents reported to the Army FAP that met DOD’s criteria for child abuse over the past 5 fiscal years. Navy FAP. From fiscal years 2014 through 2018, the Navy FAP recorded 10,744 reported incidents of child abuse, of which 51 percent met DOD’s criteria for child abuse. Of the incidents that met DOD’s criteria for abuse, 59 percent involved neglect, 33 percent involved physical abuse, 14 percent involved emotional abuse, and 6 percent involved sexual abuse. The majority of incidents (96 percent) were intrafamilial and 4 percent of the incidents were extrafamilial. Slightly over half of the victims and offenders were male (52 percent). Additionally, since fiscal year 2017, when the Navy began tracking whether offenders had prior FAP cases related to child abuse or domestic abuse that met DOD’s criteria for abuse, 1 percent of offenders had prior cases. Figure 7 depicts characteristics of incidents reported to the Navy FAP that met DOD’s criteria for child abuse over the past 5 fiscal years. Marine Corps FAP. Over the past 5 fiscal years, the Marine Corps FAP recorded 8,356 reported incidents of child abuse, of which 54 percent met DOD’s criteria for child abuse. Of the incidents that met DOD’s criteria for abuse, 62 percent involved neglect, 20 percent involved emotional abuse, 15 percent involved physical abuse, and 2 percent involved sexual abuse. The majority of incidents (96 percent) were intrafamilial and 4 percent of the incidents were extrafamilial. Slightly over half of the victims and offenders were male (52 percent) and 7 percent of offenders had prior FAP cases related to child abuse or domestic abuse that met DOD’s criteria for abuse. Figure 8 depicts characteristics of incidents reported to the Marine Corps FAP that met DOD’s criteria for child abuse over the past 5 fiscal years. Air Force FAP. From fiscal years 2014 through 2018, the Air Force FAP recorded 17,836 reported incidents of child abuse, of which 41 percent met DOD’s criteria for child abuse. Of the incidents that met DOD’s criteria for abuse, 55 percent involved neglect, 25 percent involved physical abuse, 22 percent involved emotional abuse, and 4 percent involved sexual abuse. The majority of incidents (95 percent) were intrafamilial and 4 percent of the incidents were extrafamilial. Slightly over half of the victims and offenders were male (51 percent and 53 percent, respectively). In addition, 0 percent of offenders had prior FAP cases related to child abuse or domestic abuse that met DOD’s criteria for abuse. Figure 9 depicts characteristics of incidents reported to the Air Force FAP that met DOD’s criteria for child abuse over the past 5 fiscal years. Each military criminal investigative organization—the Army Criminal Investigation Command, the Naval Criminal Investigative Service, and the Air Force Office of Special Investigations—maintains an investigative case management system where it tracks information about the investigation, such as the offense(s), victim(s), and alleged offender(s), among other things. According to military criminal investigative organization officials, they primarily investigate felony level crimes as well as any type of sexual offense. The following are key characteristics of investigations involving child victims investigated by each of the three military criminal investigative organizations from fiscal years 2014 through 2018. Army Criminal Investigation Command. Over the past 5 fiscal years, the Army Criminal Investigation Command conducted or monitored 5,565 investigations involving a child victim. Some of those investigations involved multiple victims, offenders, and offenses. Specifically, those 5,565 investigations included 6,535 victims, 5,965 alleged offenders, and 8,483 offenses. The Army Criminal Investigation Command was the primary investigative organization for almost three-quarters of the investigations (74 percent). For the rest of the investigations, the primary investigative organization was another federal, state, or local civilian law enforcement organization, such as the Federal Bureau of Investigation, which conducted 4 percent of the investigations. Additionally, 42 percent of the investigations involved an intrafamilial relationship—meaning that the victim and the alleged offender were from the same family, such as a parent or sibling—between at least one of the alleged offenders and victims. Figure 10 depicts characteristics of the Army Criminal Investigation Command’s investigations involving a child victim over the past 5 fiscal years. Naval Criminal Investigative Service. From fiscal years 2014 through 2018, the Naval Criminal Investigative Service conducted or monitored 1,513 investigations involving a child victim. Some of those investigations involved multiple victims, offenders, and offenses. Specifically, those 1,513 investigations included 1,731 victims, 1,618 alleged offenders, and 1,812 offenses. The Naval Criminal Investigative Service was the primary investigative organization for about half of the investigations (54 percent). The remainder of the investigations were either joint with another law enforcement organization or the Naval Criminal Investigative Service was only monitoring the investigation. Additionally, 40 percent of the investigations involved an intrafamilial relationship between at least one of the alleged offenders and victims. Figure 11 depicts characteristics of the Naval Criminal Investigative Service’s investigations involving a child victim over the past 5 fiscal years. Air Force Office of Special Investigations. Over the past 5 fiscal years, the Air Force Office of Special Investigations conducted or monitored 1,304 investigations involving a child victim. Some of those investigations involved multiple victims, offenders, and offenses. Specifically those 1,304 investigations included 1,549 victims, 1,384 alleged offenders, and 1,649 offenses—12 percent of investigations involved more than one victim. In addition, 42 percent of investigations involved an intrafamilial relationship between at least one of the alleged offenders and victims. Figure 12 depicts characteristics of the Air Force Office of Special Investigations’ investigations involving a child victim over the past 5 fiscal years. The Department of Defense Education Activity (DODEA) tracks suspected or alleged abuse of students through (1) child abuse reports, and (2) serious incident reports. Child abuse reports. DODEA guidance defines child abuse as the physical injury, sexual maltreatment, emotional maltreatment, deprivation of necessities, or combinations for a child by an individual responsible for the child’s welfare under circumstances indicating that the child’s welfare is harmed or threatened. The term encompasses both acts and omissions on the part of the responsible person. Child abuse reports are to be submitted on any incidents of suspected or alleged child abuse to DODEA headquarters within 24 hours of the occurrence or notification of the incident. From school years 2014-2015 through 2017-2018, DODEA reported 254 suspected or alleged incidents of child abuse. Of DODEA’s 163 schools, 115 reported an incident of child abuse over these 4 school years. Reported child abuse included a range of incidents, such as parents leaving their children unattended, parents physically abusing their children, teachers using physical force on students, and teachers inappropriately touching students. The most common types of abuse were physical abuse (51 percent of reported incidents), multiple types of abuse (11 percent), and sexual abuse (9 percent). The majority of the reported incidents involved the abuse of a child by a parent or guardian (55 percent) or abuse by DODEA personnel (31 percent). Figure 13 depicts characteristics of incidents of child abuse reported by DODEA over 4 school years. Serious incident reports. DODEA guidance defines a serious incident as an event or allegation that impacts school readiness, or the health, safety, and security of DODEA-affiliated personnel, facilities, and property resulting in consequences greater than those normally addressed through routine administrative or preventive maintenance actions. Serious incident reports are normally submitted by the school principal, assistant principal, or designated administrative officer within 2 business days after the event is brought to the attention of the first-line supervisor. DODEA has different categories of serious incidents, such as drug and alcohol events, violation of law events, sexual events, and security incidents. Serious child-on- child abuse incidents are reported as either violation of law events, such as assault and battery or sexual events. From school years 2013-2014 through 2017-2018, DODEA reported 167 serious incidents involving either an alleged violation of law or an alleged sexual event. Only 74 of DODEA’s 163 schools reported such an incident over the past 5 school years. Reported serious incidents included a range of incidents, such as students posting nude photos and videos of other students on social media, inappropriate touching on the school bus, physical assaults, and rape. Of the serious incident reports we received, the most common types were nonconsensual sexual contact (35 percent of reported incidents), assault and battery (25 percent), rape (16 percent), and child pornography (15 percent). The majority of the reported serious incidents involved a single victim (68 percent), but 13 percent of the incidents involved more than one victim and 20 percent did not specify a victim. Figure 14 depicts characteristics of serious incidents involving an alleged violation of law or an alleged sexual event reported by DODEA over the past 5 school years. According to DODEA officials, DODEA implemented a new database for reporting serious incidents in August 2019. These officials noted that one of the goals of the system is to make reporting more straightforward for school administrators and to standardize serious incident reports across schools. DODEA officials anticipate adding child abuse reports to the new database in late calendar year 2019 or early 2020. In addition to the contact named above, Kimberly Mayo (Assistant Director), Molly Callaghan (Analyst in Charge), Vincent M. Buquicchio, Christopher Gezon, Grant Mallie, Joseph Neumeier, Kya Palomaki, Paul Seely, Mike Silver, and Lillian M. Yob made significant contributions to this report. Military Justice: DOD and the Coast Guard Need to Improve Their Capabilities to Assess Racial and Gender Disparities. GAO-19-344. Washington, D.C.: May 30, 2019. Children Affected by Trauma: Selected States Report Various Approaches and Challenges to Supporting Children. GAO-19-388. Washington, D.C.: April 24, 2019. Sexual Violence: Actions Needed to Improve DOD’s Efforts to Address the Continuum of Unwanted Sexual Behaviors. GAO-18-33. Washington, D.C.: December 18, 2017. Child Well-Being: Key Considerations for Policymakers, Including the Need for a Federal Cross-Agency Priority Goal. GAO-18-41SP. Washington, D.C.: November 9, 2017. Military Personnel: DOD Has Processes for Operating and Managing Its Sexual Assault Incident Database. GAO-17-99. Washington, D.C.: January 10, 2017. Sexual Violence Data: Actions Needed to Improve Clarity and Address Differences Across Federal Data Collection Efforts. GAO-16-546. Washington, D.C.: July 19, 2016. Sexual Assault: Actions Needed to Improve DOD’s Prevention Strategy and to Help Ensure It Is Effectively Implemented. GAO-16-61. Washington, D.C.: November 4, 2015. Youth Athletes: Sports Programs’ Guidance, Practices, and Policies to Help Prevent and Respond to Sexual Abuse. GAO-15-418. Washington, D.C.: May 29, 2015. Military Personnel: Actions Needed to Address Sexual Assaults of Male Servicemembers. GAO-15-284. Washington, D.C.: March 19, 2015. Child Welfare: Federal Agencies Can Better Support State Efforts to Prevent and Respond to Sexual Abuse by School Personnel. GAO-14-42. Washington, D.C.: January 27, 2014. Child Maltreatment: Strengthening National Data on Child Fatalities Could Aid in Prevention. GAO-11-599. Washington, D.C.: July 7, 2011. Military Justice: Oversight and Better Collaboration Needed for Sexual Assault Investigations and Adjudications. GAO-11-579. Washington, D.C.: June 22, 2011.", "summary": "With more than 1.2 million school-age military dependents worldwide, per DOD, the department's organizations work to prevent, respond to, and resolve incidents of child abuse. Incidents of child abuse, including child-on-child abuse, can cause a range of emotional and physical trauma for military families, ultimately affecting servicemember performance. GAO was asked to review how DOD addresses incidents of child abuse and child-on-child abuse occurring on a military installation or involving military dependents. This report examines, among other things, the extent to which DOD has (1) visibility over such reported incidents, and (2) developed and implemented policies and procedures to respond to and resolve these incidents. GAO reviewed relevant policies and guidance; interviewed officials at a nongeneralizable sample of seven military installations; analyzed program data; interviewed parents of children affected by abuse; and interviewed DOD, service, and civilian officials, including at children's advocacy centers. The Department of Defense (DOD) has limited visibility over reported incidents of child abuse—physical, sexual, or emotional abuse, or neglect by a caregiver—and child-on-child abuse due to standalone databases, information sharing challenges, and installation discretion. From fiscal years 2014 through 2018, the military services recorded more than 69,000 reported incidents of child abuse (see figure). However, personnel at all seven installations in GAO's review stated that they use discretion to determine which incidents to present to the Incident Determination Committee (IDC)—the installation-based committee responsible for reviewing reports and determining whether they meet DOD's criteria for abuse (an act of abuse and an actual or potential impact, e.g., spanking that left a welt). Per DOD guidance, every reported incident must be presented to the IDC unless there is no possibility that it could meet any of the criteria for abuse. However, personnel described incidents they had screened out that, per DOD guidance, should have been presented to the IDC. Without the services developing a process to monitor how incidents are screened at installations, DOD does not know the total number of reported child abuse incidents across the department. While DOD has expanded its child abuse policies and procedures to include child-on-child sexual abuse, gaps exist. For example, DOD standardized the IDC process in 2016, but the new structure does not include medical personnel with expertise, contrary to best practices for substantiating child abuse allegations. Without expanding the IDC membership to include medical personnel, members may not have all of the relevant information needed to make fully informed decisions, potentially affecting confidence in the efficacy of the committee's decisions. GAO also found that the availability of certified pediatric sexual assault forensic examiners across DOD is limited—according to DOD officials, there are only 11 in comparison to 1,448 incidents of child sexual abuse that met DOD's criteria for abuse from fiscal years 2014 through 2018. Without processes that help ensure timely access to certified pediatric examiners, child victims of sexual abuse overseas may not receive exams in time for evidence to be collected for use in prosecution, increasing the stress and trauma of affected victims. GAO is making 23 recommendations, including that the military services develop a process to monitor how reported incidents are screened at installations, that DOD expand the membership of the IDC to include medical personnel, and that DOD establish processes that help ensure timely access to certified pediatric examiners overseas. DOD concurred with 16, partially concurred with six, and did not concur with one of GAO's recommendations, which GAO continues to believe are valid, as discussed in the report.", "document_type": "gao"}
{"report": "SBA oversees a number of programs designed to provide small businesses with resources and tools, including access to capital, help with federal contracting opportunities, and entrepreneurial counseling and training. Federal procurement regulations generally define a small business as one that is independently owned and operated and not dominant in its field and that meets the size and criteria or standards established by SBA. The Small Business Act of 1953 authorized SBA to establish size standards for determining eligibility for all procurement programs in which small business status is required or advantageous. SBA uses the North American Industry Classification System (NAICS) as the basis for its size standards. The standards vary by industry and are generally expressed as the average number of employees over a 12-month period or average annual receipts in the previous 3 years. As of August 2019, employee- based size standards for federal procurement purposes ranged from 100 to 1,500, and revenue-based size standards ranged from $1.0 million to $41.5 million. The number of employees or average annual receipts indicates the maximum size allowed for a business and its affiliates to be considered small. The Small Business Jobs Act of 2010 required SBA to review at least one-third of all size standards during every 18-month period from the date of its enactment and all size standards at least once every 5 years thereafter. SBA completed the first 5-year review in 2016. According to SBA’s size standard methodology, the agency assesses industry structure and the overall degree of competitiveness of an industry and of firms in the industry when establishing size standards. To assess industry structure, SBA analyzes four primary factors: average firm size, degree of competition in an industry, start-up costs and entry barriers, and distribution of firms by size. SBA also considers the ability of small businesses to compete for contracting opportunities under the current size standards. According to SBA officials, for industries with $20 million or more in federal contracting annually, SBA also examines the small business share of federal contract dollars relative to the small business share of total industry receipts. Each year, SBA negotiates small business prime contracting goals with federal agencies that have procurement authority so that, in the aggregate, the federal government meets its goal of awarding 23 percent of prime contract dollars to small businesses. In September 2018, we reported that SBA considers prior-year achievement and other factors in setting annual agency goals. SBA’s procurement center representatives and OSDBUs assist agencies in meeting small business goals. Agency contracting officers have the authority to enter into, administer, or terminate contracts and are responsible for helping agencies meet small businesses goals, including by setting aside contracts for small businesses. One of the first steps in the federal acquisition process is assignment of the NAICS code that best describes the principal purpose of the acquisition and corresponding size standard (see fig. 1). Generally, the FAR states that if the contract is valued under the simplified acquisition threshold, the contracting officer must set it aside for small businesses. If valued above the simplified acquisition threshold, the contracting officer conducts market research to determine whether a contract should be set aside for small businesses. For contracts not set aside for small businesses, contracting officers generally must include specific small business subcontracting goals for the prime contractor to meet. The FAR requires agencies to evaluate price or cost to the government in every source selection and evaluate the quality of the product or service in the acquisition by considering one or more noncost factors, such as past performance. Contracting officers generally have discretion under the FAR to choose evaluation factors and their relative weights, rating systems, and the past performance they will consider. For example, a contracting officer could consider technical excellence, past performance (including relevance), and price. To select a firm for contract award, agency officials evaluate offers against the criteria specified in the solicitation. According to the FAR, if an offeror has no record of relevant past performance, the offeror cannot be evaluated favorably or unfavorably on past performance. Contracting officers use the Contractor Performance Assessment Reporting System to enter and review evaluations of past performance. The FAR generally requires agencies to document contractor performance on contracts or orders that exceed certain dollar thresholds. Once a project is complete, the assessing official rates the contractor on elements such as quality of the product or service, schedule, cost control, management, and small business utilization. This information then becomes available to other agencies for making source selection decisions. Indefinite delivery/indefinite quantity (ID/IQ) contracts provide flexibility when an agency cannot specify the quantities or timing of a product or service. Contracting officers may issue ID/IQ contracts as single-award or multiple-award contracts. Single-award refers to a situation in which one contract is awarded under a solicitation. The FAR establishes a preference for awarding multiple-award ID/IQ contracts—instances in which more than one prime contractor is awarded a task-order contract (for services) or delivery-order contract (for supplies) under a single solicitation. Once agencies determine their specific needs, such contracts allow agencies to establish a pool of qualified contractors to compete for future orders under streamlined procedures. Contractors compete to be in the pool and generally compete again for task or delivery orders. Multiple-award ID/IQ contracts can be unrestricted (open competition for businesses of all sizes) or restricted to small businesses. They also can have one pool of contractors with separate “tracks” for small and nonsmall businesses to ensure contract opportunities for small businesses (that is, some orders are set aside for small businesses). After a multiple-award ID/IQ contract has been awarded, an agency places delivery or task orders, generally using the fair opportunities process. An order, which is placed when a specific need arises, obligates funds and authorizes work. Orders must be within the scope, issued within the period of performance, and be within maximum value or quantities agreed to in the contract. For multiple-award ID/IQ contracts, the FAR requires that each awardee be given a fair opportunity to compete for subsequent orders. In April 2017, we found that in fiscal years 2011–2015, federal agencies obligated more than $130 billion annually through ID/IQ contracts. We also found that contracting officers said it was easier and faster to place an order under an existing ID/IQ contract than to award a separate contract when a specific need arose. A mentor-protégé program is an arrangement in which mentors—typically experienced prime contractors—provide technical, managerial, and other business development assistance to eligible small businesses, or protégés. SBA established the 8(a) Mentor-Protégé Program in 1998 for mentors to partner with 8(a) socially and economically disadvantaged businesses to improve the ability of 8(a) businesses to compete for prime contracts and subcontracts. The Small Business Jobs Act of 2010 and National Defense Authorization Act for fiscal year 2013 authorized SBA to establish a government-wide mentor-protégé program for all small businesses, which SBA named the All Small Mentor-Protégé Program. Small businesses that have a mentor-protégé relationship through either program can form a joint venture with a mentor (which can be a mid-sized or large business) and compete for set-aside contracts as long as the protégé is a small business with at least a 51 percent interest in the joint venture. Contractor team arrangements take two forms: two or more companies form a partnership or joint venture to act as a prime contractor or a prime contractor agrees with one or more companies to have them act as its subcontractors under a specified federal contract or acquisition program. Companies generally form a contractor team arrangement before submitting an offer. Businesses of all sizes can form joint ventures to compete for contracts. Joint ventures generally have to consist only of small businesses to compete for small business set-aside contracts—the exception being small and nonsmall businesses entered in a mentor- protégé agreement under one of SBA’s programs. Most small businesses awarded set-aside contracts in fiscal year 2017 did not appear poised to outgrow their size standard. According to FPDS-NG data, about 86 percent of the 121,604 set-aside contracts awarded in that year were to small businesses with revenue or employees at or below 25 percent of the size standard for their industry (see fig. 2). These businesses received about 64 percent of the dollar obligations for set-aside contracts in fiscal year 2017. The small businesses closest to their SBA standards (above 75 percent of the size standard) were awarded about 2 percent of the set-aside contracts and about 7 percent of the contract dollar obligations in fiscal year 2017. We performed the same analysis for fiscal years 2013–2016, and the results across the four quartiles were generally the same throughout the time period. Based on our review, a very small percentage of the small businesses that were awarded set-aside contracts in fiscal year 2008 grew to mid- sized in subsequent years and continued to receive any type of contract. As shown in table 1, more than 93 percent of the businesses that were awarded only set-aside contracts in fiscal year 2008 and received any federal contract (including a set-aside or competed contract) in fiscal year 2017 remained small. About 2.5 percent of such businesses had become mid-sized by fiscal year 2017. In addition, we analyzed the extent to which small businesses that grew to be mid-sized in 2013 continued to receive any type of contract in fiscal years 2014–2017. Of the 5,339 small businesses awarded only set- aside contracts in fiscal year 2008 and awarded any sort of federal contract in fiscal year 2013, 104 grew to mid-sized by fiscal year 2013. Of those 104 mid-sized businesses, 23 remained mid-sized in subsequent years and were awarded 75 contracts, and three grew to large and were awarded six contracts (see table 2). Seventeen of the 104 mid-sized businesses became small again. Thirty-seven of the 104 mid- sized businesses were awarded 306 contracts and were categorized as small, mid-sized, or large depending on the NAICS code listed in the contract. That is, businesses can be awarded contracts under several NAICS codes, each with a different size standard. Of the 24 mid-sized businesses not awarded any contracts in 2014–2017, nine were no longer registered in the System for Award Management, a central registration system for federal contractors. Federal regulations generally allow a small business with a contract to continue performing under its contract if it outgrows the size standard that it met in its initial offer. If a business qualified as small and was awarded a single-award contract under a small business set-aside, it generally would be considered small for contracting purposes for the life of that contract. The business can continue providing the service or product. Additionally, the agency can continue counting the contract towards its small business goals unless the business is required to recertify, whether through a regulatory or contractual requirement, and in doing so is deemed other than small. Once the contract ends, the follow-on or renewal contract is a new contract; size is determined as of the date the business bids on the new contract. The regulations are applied similarly to multiple-award contracts. Some multiple-award contracts are set aside for small businesses only. If a business qualified as small at the time of its initial offer, it is generally small for each order issued against the contract for the life of the contract even if it outgrows the size standard. Multiple-award contract orders awarded to businesses that have grown to be other than small during the course of the set-aside contract generally still may be counted toward agency small business goals. They would not be counted if the contractor were required to recertify, whether by a regulatory or contractual requirement, and in doing so was deemed other than small. There are a few instances in which a business must recertify its size status after its initial offer. In the case of an awarded multiple-award, set- aside contract, this would make the concern ineligible for the placement of orders or exercise of options. For example: SBA has stated that mergers and acquisitions create an exception to the general rule that a firm’s size and status is determined at the time of the initial award. Generally, if a business becomes other than small pursuant to a merger or acquisition after its initial offer, the business must recertify its size. Certain requirements for recertification become effective just before the end of the fifth year on a multiple-award contract. A multiple-award contract that runs for more than 5 years, including options, requires each business to recertify size within 120 days before the end of the fifth year and 120 days before exercising options thereafter. The determination of small or other than small is based on the size standard at the time of the recertification. Size determinations are not permanent; a business can recertify later as small if it meets the size standard. A contracting officer may require a business to recertify its size status in response to a solicitation for an order. An SBA recertification determination is based on the size as of the date the business submits its response to the order. The rules are different for agreements, including blanket purchase agreements. A blanket purchase agreement is a simplified method of filling anticipated repetitive needs for supplies or services that functions as a “charge account” with qualified sources of supply. Where the agreement is a set-aside or a reserve award to any type of small business, a business must qualify as small both at the time of the offer and at the time of the order to be considered for the order. The agency may count the business toward its small business goal if the business is small at the time of the order. Both SBA’s 8(a) and All Small Mentor-Protégé programs allow the mentor (including those that are mid-sized businesses) and the protégé to form a joint venture and bid on set-aside contracts based on the protégé’s status as a small business. Once a protégé no longer qualifies as small, the mentor-protégé joint venture will no longer be eligible to bid for new small business set-asides. But, a change in protégé size generally does not affect contracts previously awarded to a joint venture between the protégé and the mentor. The mentor-protégé joint venture may seek any small business contract for which the protégé would qualify. Therefore, the size of the mentor generally does not affect whether a mentor-protégé joint venture can bid for a small business contract. According to SBA officials, the agency does not track the size of mentors. As of September 2018, there were 106 joint ventures formed under the All Small Mentor-Protégé program and 171 joint ventures under the 8(a) Mentor-Protégé program (see table 3). We analyzed FPDS-NG and SBA data to determine the size of the mentors participating in joint ventures under SBA’s All Small Program that were awarded set-aside contracts in fiscal years 2016–2018. Of the 29 joint ventures awarded set-aside contracts during these years, 13 of the 26 mentors were mid-sized businesses. We reviewed options proposed in literature to enhance contracting opportunities for mid-sized businesses and asked stakeholders for their perspectives on potential benefits and drawbacks. Some options for increasing federal contracting opportunities for mid- sized businesses identified in our literature review would help mid-sized businesses more than others, according to stakeholders. They noted that establishing a set-aside for mid-sized businesses—the option designed to help mid-sized businesses most directly—also would pose challenges for small businesses and agencies. In contrast, some options primarily would help small businesses that were growing (revenue or employees approaching the size standards). This, in turn, could offset any of the advantages that mid-sized businesses would derive. For instance, benefiting small businesses could increase competition and result in fewer awards to mid-sized businesses. As shown in table 4, we grouped the options into four categories: (1) establishing a set-aside for mid-sized businesses, (2) modifying the rules for multiple-award contracts, (3) changing how past performance is considered when evaluating bid proposals, and (4) modifying SBA’s size standards. Several stakeholders told us that establishing a separate set-aside category for mid-sized businesses would increase contracting opportunities for mid-sized businesses, but others expressed concerns that the potential threat to small businesses and administrative burden on agencies might outweigh this benefit. Some literature suggests that when businesses outgrow their size standards they struggle to compete against much larger, established businesses for contracts. Also, literature we reviewed suggested small business goals motivate agencies to set aside more and larger contracts for small businesses, resulting in a scarcity of smaller contract solicitations for mid-sized businesses. Members of Congress have proposed establishing pilot programs that would help mid- sized businesses, either defined by business or contract size. Several stakeholders commented directly on separate set-asides and contracting opportunities for mid-sized businesses. An OSDBU director noted former small businesses (those that outgrew their size standard) would benefit from an opportunity to compete with firms of similar size for prime contracts. However, some stakeholders believed the set-aside would not increase opportunities for mid-sized businesses. Specifically, one trade association executive noted that this option continues to shelter small businesses that become mid-sized businesses from competition with larger businesses. The stakeholder added that a set-aside would not address the ability of mid-sized businesses to compete against large businesses on an unrestricted basis. Another trade association executive said there still would be a need to help mid-sized firms develop expertise and encourage competition. Some stakeholders believed the option would have a limited impact or was not necessary. Specifically, one trade association executive said that its members want a good path to growth for small businesses, not a set- aside. Another trade association executive similarly believed mid-sized businesses want to open up contract opportunities, not restrict them by creating more set-asides. One stakeholder also argued that the option could create incentives for large businesses to split their companies to fit new set-aside size standards. Most stakeholders believed the set-aside for mid-sized businesses would take away opportunities from small businesses, with several noting that contracts that normally would be set aside for small businesses might be set aside for mid-sized businesses instead. SBA officials stated that a set- aside would have a negative effect on all small business programs and support the use of larger contracts, resulting in fewer contract awards to small businesses. However, one trade association representative said the set-aside could be structured so that small businesses still could compete for the mid-sized set-aside contracts. An OSDBU director told us contracting officers could limit the effect on small businesses by considering small businesses first, mid-sized businesses second, and large businesses last. In this scenario, it would be large businesses that would be most affected by a set-aside for mid-sized businesses. Stakeholders cited more limitations than benefits for agencies if this option were implemented. Most stakeholders told us a mid-sized business set-aside would increase agency burden, including additional time and cost to define and implement the new set-aside and additional tracking and reporting costs. SBA officials noted that it would create an additional burden for contracting officers and that further study would be needed before implementing a mid-sized set-aside. Some stakeholders also noted the potential burden on agencies of complying with additional contracting goals, with one OSDBU director saying that agencies do not have the resources to meet current small business contracting goals, let alone meet mid-sized contracting goals. Another OSDBU director believed that mid-sized business set-asides likely would violate the World Trade Organization’s Government Procurement Agreement because the United States negotiated exclusions for small businesses in the agreement, but not for mid-sized businesses. Some stakeholders believed it would be very difficult for agencies to define a mid-sized business. One OSDBU director told us that contracting officers would have to perform new market research for mid-sized set-asides and abide by a new layer of requirements. Several stakeholders questioned which agency actually would administer the new set-aside program. Stakeholders identified a few benefits for agencies. Two stakeholders told us agencies could benefit from having a larger supplier base and more choices for services. One OSDBU director said agencies might benefit from retaining former small business contractors for a longer time, and a researcher said agencies might gain access to talent and value they might not get from large businesses. Stakeholders told us that allowing small businesses that grow beyond their size standards to move to the unrestricted version of multiple-award contracts could help mid-sized businesses. As discussed previously, multiple-award contracts can be unrestricted or restricted to small businesses or have separate tracks for small and nonsmall businesses (such as by using set-aside orders). This option proposes that small businesses on the restricted track of a multiple-award contract that outgrow the contract’s small business size standard be moved to the unrestricted track. This practice can be referred to as “on-ramping.” According to the stakeholder proposing this option, if a small business contractor grew to mid-sized, but could not transition to the unrestricted track, all the effort the business put into winning the contract would be wasted simply because it grew. Some multiple-award contracts allow small businesses that outgrow the size standard to move to the unrestricted track of the multiple-award contract, but this is not always the case. Agencies have discretion when making this determination. If a business is allowed to move to the unrestricted track of such a contract, it would be able to place bids on additional orders resulting from the contract. In cases in which a business cannot move to the unrestricted track, it has to leave the contract after completing any ongoing orders. For example, the General Services Administration’s One Acquisition Solution for Integrated Services allows businesses that have outgrown their size standards to move to the unrestricted track, while EAGLE II does not. Most stakeholders we interviewed said this option could increase contracting opportunities for growing small or mid-sized businesses. An OSDBU director said the option would let businesses that grew to be mid- sized move to the unrestricted pool of the multiple-award contract so they could keep their existing contract. A researcher said the option gives more time for small and mid-sized businesses to prepare for full and open competition. But two stakeholders noted that mid-sized businesses already in the unrestricted pool may be negatively affected by increased competition from additional contractors placed in the pool for task orders. Stakeholders offered differing opinions on how this option would affect agencies. Several stakeholders said that agencies would benefit from being able to retain contractors even if the contractors outgrew their size standard. For example, a trade association executive said it would be less disruptive for the agency if the business could continue its contract. Two stakeholders thought that moving a business to the unrestricted pool would reduce agency time and paperwork (compared to re-competing the contract and performing additional evaluations). However, several stakeholders told us that allowing small businesses that grew beyond the size standards to “on-ramp” might increase administrative burden on agencies. For example, it might take longer for an agency to evaluate proposals for unrestricted task order competitions if the pool of competitors grew. SBA officials expressed concern that if task order competitions grew too large, businesses in the unrestricted pool that objected to the increased competition from new contractors might pursue litigation. Stakeholders told us that changing past performance requirements could increase prime contracting opportunities for mid-sized and small businesses, but might increase risk for agencies. Some of the literature we reviewed considered requirements based on the size or number of past contracts (“quantitative past performance requirements”) as a barrier to entry for mid-sized businesses. Options have been proposed that would regulate what types of past performance contracting officers consider and how they establish solicitation requirements. This option proposes lowering (for example, limiting their use or making their terms more flexible) or eliminating quantitative requirements for past performance. Nearly all the stakeholders we interviewed said that lowering quantitative requirements would increase contracting opportunities for mid-sized businesses, small businesses, or both. For example, one researcher said that mid-sized and small businesses would benefit because the barriers to entry on some large contracts would be lowered. Similarly, an OSDBU director said that smaller mid-sized businesses and small businesses get shut out of contract competitions because they cannot meet the past performance requirements, and lower past performance requirements would give them a chance to compete. One trade association executive also pointed out that this option could help mid-sized and small businesses develop a performance record for future solicitations. More than half of the stakeholders told us that eliminating quantitative past performance requirements entirely also would increase contracting opportunities for mid-sized businesses, small businesses, or both. Specifically, two stakeholders said eliminating these quantitative requirements would enable mid-sized and small businesses without records of past performance to substantiate their qualifications in other non-quantitative ways. Stakeholders noted trade-offs for agencies. Some stakeholders believed lowering past performance requirements would benefit agencies because more contractors would be eligible to bid. For example, one OSDBU director said agencies might receive proposals from businesses that could not have met quantitative requirements but have enough expertise to submit a high-quality proposal. However, some stakeholders said lowering quantitative requirements may increase agency burden, citing a longer evaluation period due to a larger pool of bidders. More than half of the stakeholders said eliminating requirements entirely would increase the burden on agencies, for various reasons. One researcher said agencies might not have staff with the technical expertise to assess bids based on a strictly qualitative evaluation. Additionally, several stakeholders noted challenges for agencies in obtaining qualitative performance information using the Contractor Performance Assessment Rating System, citing rating subjectivity and verification difficulties. Several stakeholders said lowering or eliminating quantitative requirements for past performance would increase the risk to the agency of awarding contracts to firms that cannot successfully complete the project. For example, one OSDBU director pointed out that “conventional wisdom” for contracting officers is that a project’s success rate is higher when a company can meet higher past performance requirements. Another OSDBU director said that qualitative forms of evaluation, such as testimony from another agency, are not sufficient and could put the agency’s project at risk for lack of an objective measure of a contractor’s capabilities. In contrast, the third OSDBU director said that quantitative requirements do not lower the risk to the agency because completing a certain number of contracts is not a guarantee of satisfactory future performance. This option proposes that contracting agencies be required to consider the past performance of individual companies in team arrangements as opposed to evaluating only the aggregate past performance of contractors in team arrangements. The literature suggested that requiring agencies to consider each team member’s past performance would provide incentives to mid-sized businesses to work together to compete for contracts with past performance requirements that each would not be able to meet individually. According to SBA officials, the Small Business Act already requires agencies to consider the past performance of each participant in a joint venture or team for bundled contracts and multiple-award contracts above a certain dollar threshold. Also, agencies generally consider the relevant past performance information of individual members of a team arrangement in certain situations if they will perform major or critical aspects of the requirement. However, there are other situations—such as when the contract is not specifically for a small business but instead is bid on by a joint venture that includes a small business—in which agencies are not required to consider each team member’s past performance. Stakeholders identified some benefits to a more flexible consideration of past performance for mid-sized businesses. More than half of the stakeholders believed this option would increase contracting opportunities for mid-sized businesses. For example, a trade association executive said mid-sized businesses currently struggle to fulfill past performance requirements, and this would allow them to combine their past performance with another business to qualify for new and larger contract opportunities. However, some stakeholders noted that mid-sized companies probably have won prime contracts. Therefore, they already might have the requisite past performance to bid on a contract. Nearly all the stakeholders we interviewed thought this option would increase contracting opportunities for growing small businesses because they would be able to team with a small or nonsmall business to bid on contracts for which they otherwise would not have the past performance to qualify. One researcher described a dilemma for small businesses: they cannot compete for contracts without past performance, but they cannot get past performance without winning contracts. SBA officials said that businesses prefer that the past performance of each member be considered instead of the past performance of the joint venture, which could be minimal, especially if it was a new joint venture. Stakeholders identified trade-offs for agencies. More than half of stakeholders said considering past performance of both members in a team arrangement would benefit agencies because more contractors could meet requirements to bid. One OSDBU director said that this option also might allow agencies to benefit from the enhanced capacity and innovative solutions offered by mid-sized businesses. However, several stakeholders cautioned that this option could increase risk for an agency. For example, one trade association representative believed that because team arrangements are the companies’ creation and the government has no involvement in administering them, there is more risk to the agency that the contracting team might not be able to complete the contract. This option proposes that agencies should consider subcontracting past performance when evaluating bid proposals. It has been suggested that this could be done in two ways. First, agencies could be required to consider a business’s past performance as a subcontractor—a route for many small businesses to gain access to federal contracts—when competing for prime contracts. Second, agencies could be required to count the past experience of both the prime contractor and its significant subcontractors towards a solicitation’s past performance requirements. Stakeholders had differing opinions on whether this option would help mid-sized businesses. Several stakeholders believed that allowing mid- sized businesses to leverage their subcontracting experience to meet requirements would increase contracting opportunities for these firms. Furthermore, one researcher thought mid-sized businesses could secure more subcontracting opportunities because large firms might be more willing to team with them. However, some stakeholders believed this option would not increase contracting opportunities for mid-sized businesses, with two stating that this option is less important for them because they likely outgrew their size standard by winning set-aside prime contracts. An OSDBU director thought it also might increase competition from smaller firms. Nearly all of the stakeholders we interviewed said this option could increase prime contracting opportunities for growing small businesses. For example, one OSDBU director said that considering subcontracting as past performance would help small businesses compete for prime contracts, grow, and move forward. A researcher noted this could help small businesses transition to mid-sized. SBA officials similarly stated that small businesses want agencies to consider their subcontracting past performance so they can access contracts for which they would not normally qualify. In May 2019, SBA officials said they were working on implementing legislation that requires SBA to create a pilot program to provide past performance ratings for small business subcontractors. Similar to previous options, stakeholders contrasted the benefits and drawbacks of increased competition for agencies. Several stakeholders thought this option would expand the pool of bidders, making contracts more competitive and bringing more value to agencies. However, four stakeholders noted that verifying prime and subcontracting experience could create more work for agencies. Specifically, two of the four noted that it could be difficult for agencies to determine subcontracting past performance because the ratings in the Contractor Performance Assessment Rating System are tied to the prime contractors. Some stakeholders also noted this option could increase the risk to agencies that projects would not be completed successfully. Specifically, because subcontracting agreements are between the subcontractor and prime contractor, and therefore are not enforceable by agencies, a prime contractor might not use a subcontractor whose past performance was considered during the evaluation process. For example, a researcher pointed out that a prime contractor could use the subcontractor’s experience to win a contract, but then not use the subcontractor for any of the work. Several stakeholders noted that modifying SBA’s size standards would not help mid-sized businesses as such; rather, the modifications could allow a few mid-sized businesses to become eligible for small business set-aside contracts again and help growing small businesses prepare for the transition to mid-sized. It has been noted that agencies increasingly use large, multiple-award contracts that can cause small businesses to outgrow their size standard before they build the capacity (financial resources, business infrastructure, or past performance records) they need to successfully compete for contracts. To address such issues, options have been proposed to modify SBA’s size standards. This option would change the number of years of revenue considered when applying revenue-based size standards. SBA would allow businesses to consider their past 5 years of revenue, pick the lowest 3 years in that period, and average them to determine if they met revenue- based size standards. In a December 2018 amendment to the Small Business Act, Congress extended the number of years of revenue that service businesses use to calculate their size from 3 to 5 years but included no provision related to selecting lowest-revenue years. Stakeholders expressed reservations regarding this option for mid-sized businesses. Some stakeholders said that this option may not increase opportunities for mid-sized businesses because they already had outgrown their size standard. Several stakeholders also said the option offered only a temporary solution. One noted that this option would delay “graduation” from the size standard, but would not address the issue that mid-sized businesses need to continue to grow to secure additional federal contracts. An OSDBU director told us it is critical that small businesses develop and execute a marketing and business plan to transition from small to successful mid-size. Nearly all the stakeholders we interviewed noted that allowing businesses to choose their lowest 3 years of revenue in a 5-year period could prevent an outlier revenue year from causing a small business to prematurely outgrow its size standard. For example, an OSDBU director said that a large, 1-year award is not indicative of a business’s revenue over the long term. Nearly all of stakeholders also said that enabling businesses to choose the lowest 3 years of revenue would help ease the transition to mid-sized. For instance, an OSDBU director said businesses could stay below the size standards for longer and establish a performance record to help secure future contracts. However, several stakeholders expressed concern that very small businesses might lose contracting opportunities due to increased competition (that is, more and larger-sized firms would remain under the size standards). Finally, SBA officials pointed out that this option could be perceived as unfair because it would not benefit businesses in industries with employee-based size standards. This option proposes that businesses be able to subtract research and development expenses from their total revenue when calculating their eligibility for small business status. The stakeholder proposing this option said that businesses close to the size standard have to focus their revenue on pursuing contracts that will support their company as they transition to full and open competition, and so cannot spare money to further invest in researching and developing new products or processes that might improve their business. In addition to encouraging more investment in research and development, subtracting these expenses would lower revenue and allow some mid-sized businesses to be classified as small again. One researcher told us this was a strong option for mid-sized businesses, particularly information technology businesses, because research and development investment is such a large part of their expenses. However, some stakeholders said this option would not increase contracting opportunities for mid-sized businesses. For example, one OSBDU director believed this option would not benefit mid-sized businesses because it did not help these businesses to compete with larger businesses. More than half of the stakeholders we interviewed said that this option might encourage small businesses to invest in research and development. However, several stakeholders noted that this option only would help the small percentage of small businesses that perform research and development. SBA officials pointed out that this option could be perceived as unfair because not all businesses have research and development expenses. They also pointed out that modifying revenue calculations would not benefit manufacturing businesses, which invest more in research and development than other sectors but primarily use employee-based size standards. Stakeholders also noted potential trade-offs for agencies. Several stakeholders told us this option would benefit the government by encouraging investment in research and development with one stakeholder stating that it might result in higher-quality bids. However, several stakeholders and SBA officials also told us that allowing small businesses to subtract research and development expenses would increase the administrative burden on agencies or add too much complexity. For example, two OSDBU directors said it would be difficult for an agency to verify that research and development expenses were correctly claimed and subtracted from revenue. SBA officials noted that there were no industry-by-industry data on research and development expenses. Some stakeholders observed this option could lead to an increase in fraud or manipulation, with one trade association executive saying the option would not increase innovation, just claimed expenses. This option proposes increasing SBA’s revenue-based size standards. The trade association representative who proposed the option believed that small business size standards should be raised so that high revenue- generating small businesses that still are not dominant in their field would not be shut out of set-asides. Increasing revenue-based size standards would benefit some mid-sized businesses by making them eligible again for small business set-asides. However, more than half of the stakeholders told us the option would have a limited impact—it would apply only to the mid-sized businesses small enough to fall under the newly raised standard—or no impact at all (for most other mid-sized businesses). To illustrate the limited impact, one OSDBU director used the example of management consulting services (NAICS 541611), which has a size standard of $15 million (revenue). If the standard were increased to $17 million, it might not affect many businesses. Rather, it would help only the $16 million company to compete for set-asides again, the director said. Furthermore, one researcher said that the increase would not address the systemic disadvantage that mid-sized businesses face in competing with large businesses. Stakeholders identified tradeoffs for small businesses related to this option. Nearly all stakeholders said that raising revenue-based size standards could help growing small businesses better prepare to transition to mid-sized while remaining eligible for set-asides. One OSDBU director said small businesses could add to their performance record and have more time to become competitive with larger businesses. One researcher said that small businesses could get additional time to diversify contract portfolios and fund professional certifications. However, some stakeholders cautioned the option could harm very small businesses because as one stakeholder explained, there would be more competitors for small business set-asides. As noted previously, we found that most small businesses awarded set-aside contracts in 2017 were well below the size standards. Stakeholders also identified trade-offs for federal agencies. Several stakeholders said agencies would benefit from the increased competition. For example, one OSDBU director said agencies might have more bidders, which could lower pricing. Some stakeholders said the option could help agencies reach small business goals more easily because more businesses would be considered small. However, a stakeholder advised that agencies also might need more time and resources to evaluate an increased number of bids. SBA officials explained to us that they comprehensively review all the size standards every 5 years, looking at factors, such as industry trends and small business market share. They contended that if contracts became larger to the detriment of small businesses, small businesses then would have a decreased market share. If small businesses were losing market share, that would be captured by the SBA size standard methodology and the size standards would be adjusted accordingly. They also noted that revenue-based size standards were getting higher and higher as a result of adjustments during SBA’s reviews and adjustments for inflation and that further increases might allow firms that were dominant in their industry to be small, which is contrary to statute. Finally, they stated that just raising size standards without taking into account industry structure and market conditions would enable more experienced businesses to qualify as small and hurt small businesses that need federal assistance the most, especially in competing for set-aside contracts. We provided a draft of this report to the Department of Homeland Security, Department of Defense, General Services Administration, and SBA for their review and comment. The Department of Homeland Security provided technical comments, which we incorporated where appropriate. In emails, the OSBDU director at the Department of Defense and an audit liaison at the General Services Administration stated that the agencies did not have any comments. SBA provided technical comments in an email from the GAO Liaison, which we incorporated as appropriate. We considered a number of these comments to be more than technical in nature and therefore, summarize them here: SBA offered new views on three specific options for increasing federal contracting opportunities for mid-sized businesses presented in the report, which we incorporated where appropriate. SBA also made the larger point that they believe any option to help mid-sized businesses would hurt small businesses. In discussing the various options in the report, we present the views of various stakeholders and SBA on how the options would affect small businesses. SBA stated that we created our own methodology for determining a mid-sized business by multiplying the current size standards and that a formal study should be performed to establish a baseline definition of a mid-sized business. Our goal was not to establish a baseline definition of a mid-sized business. As we note in the report, there is no statutory or regulatory definition of a mid-sized or large business. We applied multipliers to SBA’s size standards only for the purposes of our analysis—specifically, to identify businesses that had outgrown small business size standards and continued to receive federal contracts. SBA stated that we multiplied size standards by a factor of five to define mid-sized businesses in all industries and cited analysis that it had done that indicated that more than 95 percent of businesses are at or below SBA’s size standards. The agency concluded that this means that in some industries, almost all firms would be considered mid-sized under our definition of mid-sized. However, only those firms with revenue or employees up to five times above the SBA small size standard would be considered mid-sized in our analysis. We counted any businesses with revenue or employees at or below the small size standard as small. SBA stated that considering a factor of two or three times the SBA size standards to identify mid-sized businesses would improve our results. We considered a number of different factors when developing our methodology. As noted in the report, we used five times the small size standard to distinguish between mid-sized and large businesses based on the distribution of contracts and obligations among businesses in these two groups. SBA stated that (1) the report should explain the basis and method for selecting the sample of 5,339 businesses awarded set-aside contracts in 2008 and (2) a sample of 104 out of 5,339 firms over that period of time was too small to be generalizeable. The 5,339 businesses awarded set-aside contracts in 2008 and awarded any sort of federal contract in 2013 were not a sample; rather, they were all the businesses that met these criteria. Therefore, we did not generalize to the population based on a sample. Our analysis showed that only 104 of these 5,339 businesses grew to mid-sized by 2013. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Defense, the Acting Secretary of Homeland Security, the Administrator of the General Services Administration, and the Acting Administrator of SBA. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact William B. Shear at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix III. This report analyzes (1) the extent to which small businesses grew to be mid-sized and continued to receive federal contracts; (2) instances in which mid-sized businesses can perform work on contracts set aside for small businesses; and (3) options for increasing federal contracting opportunities for mid-sized businesses and views on the strengths and limitations of the options. We present information on contracts awarded to small, mid-sized, and large businesses in fiscal year 2017 in appendix II. For the first objective, we analyzed data from the Federal Procurement Data System-Next Generation (FPDS-NG) for fiscal years 2008 through 2017 (the most recent complete data available when we began our review). For a consistent set of data across the 10-year period, we selected all contracts awarded above the micro-purchase threshold. To determine the relevant contract size standard, we matched the size standards data from the Small Business Administration (SBA) to the contract awards data from FPDS-NG based on the year of award and the contract’s North American Industry Classification System (NAICS) code. We then compared the businesses’ annual revenue or number of employees to SBA size standards. We assessed the reliability of the FPDS-NG data we used by performing electronic testing of selected data elements and reviewing existing information about FPDS-NG and the data the system produces. We determined that these data were sufficiently reliable for the purposes of determining the extent to which small businesses that grew into mid-sized businesses continued to receive federal contracts and the size of businesses awarded contracts during a specific time period. To determine the extent to which contracts were set aside for small businesses, we calculated the percentage of new contracts awarded in fiscal year 2017 that were small business set-asides. To determine the size of the small businesses awarded these set-aside contracts, we divided SBA’s size standards into four segments for each NAICS code— below or at one-fourth of the size standard, above one-fourth to one-half of the size standard, above one-half to three-fourths of the size standard, and above three fourths of the size standard—and determined the number and obligations of set-aside contracts awarded to small businesses in each quartile for fiscal year 2017. We completed this same analysis for fiscal years 2013 through 2016 to see if the results were similar. To determine the extent to which small businesses grew to be mid-sized and continued to receive federal contracts, we used FPDS-NG data from fiscal years 2008 through 2017. Because there is no statutory or regulatory definition of a mid-sized or large business, we applied a number of multipliers to determine size. Businesses with revenues or employees at or below the SBA small size standards were small. We considered businesses with revenue or employees up to five times above the SBA size standard as mid-sized businesses. We considered businesses with revenue or employees more than five times the size standard as large businesses. We used five times the small size standard to distinguish between mid-sized and large businesses based on the distribution of contracts and obligations among businesses in these two groups. We discussed this approach and methodology with SBA officials and officials at three federal agencies that had large obligations for small business contracts in fiscal year 2017. These officials did not raise any questions about our approach, and some reiterated that there was no legal definition of mid-sized businesses. Using these definitions, we selected businesses awarded only small business set-aside contracts in fiscal year 2008 and determined whether these businesses also were awarded any type of federal contract in fiscal year 2017 and if they were in the same or different size category in fiscal year 2017. We then determined the number of businesses awarded set- aside contracts in fiscal year 2008 and awarded any sort of federal contract in 2013 that had become mid-sized in fiscal year 2013 and the extent to which those businesses were awarded any contracts in subsequent years. We also determined the percentage of competed contracts awarded to small, mid-sized, and large businesses in fiscal year 2017. For purposes of this report, competed contracts are those competed using (1) full and open competition, (2) full and open competition after exclusion of sources, and (3) simplified acquisition procedures. To determine the industry sectors with the largest number of set-aside and competed contracts in fiscal year 2017, we collected and analyzed FPDS data for each of the two-digit NAICS industry sectors. See appendix II for more information. For our second objective, we reviewed the Federal Acquisition Regulation and small business laws and regulations to identify provisions that allow small businesses that grow into mid-sized businesses to continue providing services and goods on contracts set aside for small businesses. We reviewed SBA documentation related to its 8(a) and All Small Mentor- Protégé programs because forming joint ventures with small businesses under these programs is one way that mid-sized businesses can provide services and goods under set-aside contracts. We analyzed lists from SBA of the businesses that entered into mentor-protégé agreements as of July 2018 and the mentor-protégé agreements that had formed joint ventures as of September 2018. Using FPDS-NG data, we determined the number of joint ventures formed under the All Small Mentor-Protégé program that had been awarded set-aside contracts from fiscal years 2016 through 2018. We began with 2016 to allow time after the program was created in 2013 for businesses to enter into agreements and form joint ventures. We ended with 2018 because it was the most recent complete year of data available when we conducted this analysis. Using the same multiplier methodology designed for our first objective, we determined the number of mentors awarded set-aside contracts as part of a joint venture that were mid-sized businesses. We assessed the reliability of the SBA and FPDS-NG data we used by interviewing SBA officials about their data and performing electronic testing. We determined that these data were sufficiently reliable for determining the number of mentors awarded set-aside contracts as part of a joint venture that also were mid-sized businesses. We were not able to perform a similar analysis for joint ventures formed under SBA’s 8(a) Mentor-Protégé program because SBA does not maintain a Data Universal Numbering System number for mentors participating in that program. This number is needed to determine the size of the mentor. To identify stakeholder views on options for increasing federal contracting opportunities for mid-sized businesses, we identified a number of proposed options by reviewing literature, including sources identified during our background research and initial interviews. We also conducted a literature search. We used ProQuest to search 13 databases—including Business Premium Collection, EconLit, Global Newsstream, Policy File Index, and ProQuest Dissertations and Theses Global Research Library. We also conducted searches using Lexis Advanced, EBSCO Business Source Corporate Plus, Dialog, DTIC, Scopus, and HeinOnline. The search was limited to 11 years (2008–2018) and to scholarly, trade, think- tank, and government publications. For the searches, we used keywords such as “advanced small businesses,” “federal contracting,” “mid-tier/mid-sized small businesses,” “middle market,” “IDIQ,” “challenges,” and “opportunities.” Our searches yielded 199 sources. To select relevant sources, an analyst reviewed the titles and abstracts and selected 21 as likely to propose options for increasing federal contracting opportunities for mid-sized businesses. A second analyst reviewed the first analyst’s selection for concurrence. The 21 sources we selected included trade association reports, congressional testimonies, and research reports. One analyst read the 21 sources and identified any specific options discussed. We eliminated suggestions or recommendations that were unclear, duplicative, or unconnected to mid-sized businesses. A second analyst read the same sources and verified that the first analyst had correctly identified all the options pertaining to increased contracting opportunities for mid-sized businesses. From this analysis, we compiled a final list of 14 options for which we would obtain stakeholder views. The options selected were grouped into four categories. The list of options included in the report is not exhaustive; the options are intended only to be illustrative of potential approaches to enhancing contracting opportunities for mid-sized businesses. To obtain stakeholders’ views regarding the strengths and limitations of these options, we selected three categories—trade associations, researchers, and federal agencies—from which to develop a nongeneralizable sample of individuals to interview. To identify trade associations, we compiled a list of 20 trade associations that represented small and mid-sized businesses from the literature search and previous GAO work on small business contracting. We searched each organization’s website for any publications the organization may have published on small and mid-sized businesses and federal contracting. We used search terms such as “federal contracting,” “mid-size,” and “size standards.” We identified six trade associations using this process. Because one did not respond to our request, our sample included representatives of the remaining five associations. We also selected three researchers who published on mid-sized businesses and federal contracting. In addition, we selected the directors of the Offices of Small and Disadvantaged Business Utilization (OSDBU) at three federal agencies—Department of Defense, Department of Homeland Security, and General Services Administration—that were among the top five agencies in terms of total dollar obligations for small business contracts in fiscal year 2017. We then interviewed the 11 stakeholders. For each interview, we asked them to provide their views on the strengths and limitations of each option in relation to small, mid-sized, and large businesses and for federal agencies. We performed a content analysis to analyze the responses. First, we created preliminary codes that represented key themes across the interviews of the strengths and limitations of the 14 options, such as “would increase administrative burden on agencies” or “would increase contracting opportunities for mid-sized businesses.” A methodologist reviewed the coding system to ensure it was logical. We pre-tested the coding of responses from three interviews to ensure the appropriateness of the codes. One analyst coded each response to a particular strength or limitation of an option and a second analyst reviewed the coding. If a response did not align with a strength and limitation, the response was coded as “unclassified.” The team discussed the results of the initial coding analysis and made some adjustments to the codes. Once the coding scheme was finalized and the responses from the remaining eight interviews were coded by an analyst, a second analyst reviewed the coding. If the second analyst disagreed with the coding of a particular response, the two analysts spoke and achieved concurrence. After response coding was completed, we tabulated the responses based on the codes. A second person verified the calculation of the stakeholders’ response totals. Because we selected a nongeneralizable sample of stakeholders to interview, their views are not generalizable to other stakeholders who have knowledge about options for increasing contracting opportunities for mid-sized businesses, but their views offered important perspectives. To characterize the number of stakeholders who offered the same opinion, we used “nearly all” for nine or 10 stakeholders, “most” for seven or eight stakeholders, “more than half” for six stakeholders, “several” for four or five stakeholders, and “some” for three stakeholders. We also interviewed SBA officials to obtain their views on how the options might affect small businesses, as well as to gather information related to our other two objectives. We conducted this performance audit from April 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In this appendix, we provide information on contracts awarded to small, mid-sized, and large businesses in fiscal year 2017. Because there is no statutory or regulatory definition of a mid-sized or large business, we applied multipliers to the Small Business Administration’s (SBA) size standards. Small businesses were those with revenue or employees at or below the size standard for their industry. We considered mid-sized businesses as those with employees or revenue up to five times above the size standard and large businesses as those with employees or revenue more than five times the size standard. Our analysis of Federal Procurement Data System-Next Generation (FPDS-NG) data showed that mid-sized businesses received the smallest share—9 percent—of competed contracts (compared with small and large businesses) in fiscal year 2017 (see fig. 3). For purposes of this report, competed contracts are those competed using (1) full and open competition, (2) full and open competition after exclusion of sources, and (3) simplified acquisition procedures. We analyzed FPDS-NG data to determine the number of set-aside and competed contracts awarded in fiscal year 2017 by industry sector. In fiscal year 2017, the largest number of set-aside contracts were awarded in the following sectors: manufacturing; professional, scientific, and technical services; and construction (see fig. 4). In that same year, the largest number of competed contracts were awarded in the following sectors: manufacturing; professional, scientific, and technical services; and wholesale trade. Similarly, in fiscal year 2017 the largest contract obligations (set-aside and competed) were awarded in the sectors of construction; manufacturing; and professional, scientific, and technical services (see fig. 5). For competed contracts, we analyzed FPDS-NG data to determine if the size of businesses awarded contracts varied by industry sector. In fiscal year 2017, small and large businesses were generally awarded more competed contracts than mid-sized businesses, regardless of sector (see table 5). The industry sectors in which small and large businesses were awarded the most competed contracts in fiscal year 2017 were manufacturing; professional, scientific, and technical services; and wholesale trade. Similarly, in fiscal year 2017, mid-sized businesses were awarded the most competed contracts in the manufacturing and professional, scientific, and technical services sectors. The third dominant sector for mid-sized businesses was information. In addition to the contact name above, Paige Smith (Assistant Director), Nancy Eibeck (Analyst in Charge), Edward Chiu, Sarah Garcia, Julia Kennon, Jill Lacey, Barbara Roesmann, Jessica Sandler, and Jena Sinkfield made significant contributions to this report.", "summary": "Small businesses that receive federal contracts set aside for them may outgrow the size standards the Small Business Administration (SBA) uses to define small businesses. (Size standards vary by industry and generally are based on employees or revenue.) Questions have been raised about the extent to which mid-sized businesses can compete with large businesses for federal contracts. GAO was asked to provide information on federal contracting opportunities for mid-sized businesses. This report analyzes, among other objectives, (1) the extent to which small businesses grew to mid-sized and continued to receive federal contracts and (2) options for increasing contracting opportunities for mid-sized businesses. GAO analyzed federal contracting data for fiscal years 2008–2017 (most recent and complete). In the absence of legal definitions of “mid-sized” and “large,” GAO multiplied relevant size standards for small businesses to arrive at parameters for mid-sized and large businesses for its analysis. GAO reviewed literature to identify options for increasing contracting opportunities and interviewed SBA officials and a nongeneralizable selection of 11 stakeholders—trade association representatives, researchers, and small business directors at three agencies with large obligations for small business contracts in fiscal year 2017—to obtain views on the options. SBA provided comments, which we addressed as appropriate. From fiscal year 2008 through 2017, very few small businesses that were awarded limited competition (set-aside) contracts grew to be mid-sized and continued to receive contracts. (GAO defined mid-sized businesses as having revenue or employees up to five times above the small business size standard.) Of the 5,339 small businesses awarded set-aside contracts in fiscal year 2008 and awarded any sort of federal contract (including set-aside or competed) in 2013, 104 became mid-sized by fiscal year 2013. Of those 104 businesses, 23 remained mid-sized through 2017 and won 75 contracts. Another three businesses became large and won six contracts. Options for increasing federal contracting opportunities for mid-sized businesses that GAO identified in its review include establishing a separate set-aside category, changing consideration of past contracting performance, and modifying size standards. Stakeholders told GAO some options would help mid-sized businesses more than others. While a set-aside category for mid-sized businesses would increase opportunities for mid-sized businesses, stakeholders generally believed it could decrease opportunities for small businesses and increase agency burden (time and costs to implement the set-aside). Requiring agencies to consider businesses' past performance as subcontractors or as part of a team would help both mid-sized and growing small businesses by making them more competitive for contracts. Stakeholders said raising size standards based on revenue would allow a limited number of mid-sized businesses to be eligible for set-asides again, but not help the vast majority of mid-sized businesses.", "document_type": "gao"}
{"report": "To receive FEMA assistance under FEMA’s Individuals and Households Program, through which disaster survivors can receive help with housing and other needs, individuals must register by answering a standard series of intake questions. In our May 2019 report, we found that some individuals with disabilities may have faced long wait times and unclear registration questions, and that FEMA’s internal communication across its programs about survivors’ disability-related needs was ineffective. Long wait times: Individuals who tried to apply for assistance using the helpline confronted long wait times, which may have posed greater challenges for those with disabilities. In the days after Hurricane Maria affected Puerto Rico and the U.S. Virgin Islands— when survivors from Harvey and Irma were concurrently contacting the helpline—up to 69 percent of calls went unanswered and the daily average wait time for answered calls peaked at almost an hour and a half, according to our analysis of FEMA data. While long wait times could be burdensome for all individuals, state officials and disability advocates we interviewed said long wait times were especially burdensome for people with certain disabilities, such as those with attention disorders or whose assistive technology prevents multi- tasking when waiting on hold. Unclear registration questions: FEMA’s registration process did not give individuals a clear opportunity to state they have a disability or request an accommodation because the registration did not directly ask registrants to provide this information. According to FEMA officials at the time, information about disability-related needs can help FEMA staff match individuals with disabilities with appropriate resources in a timely and efficient manner and target additional assistance, such as help with the application process. However, individuals with disabilities may not have requested accommodations or reported their disability and related needs during FEMA’s registration-intake due to the unclear questions. As a result, the registration process may have under-identified people with disabilities. For example, in Puerto Rico, an estimated 21.6 percent of people have disabilities, according to 2017 Census data. However, less than 3 percent of all registrants in the territory answered “yes” to the disability-related question in response to Hurricanes Irma and Maria. Ineffective communication across FEMA programs: Individuals may have faced challenges receiving necessary assistance because FEMA did not effectively track and communicate information about individuals’ disability-related needs across its assistance programs after such needs were identified. FEMA officials we interviewed for the May 2019 report explained that accommodation requests and disability-related information identified after registration-intake are recorded in a general “notes” section of a registrant’s case file, which can be easily overlooked as a case file is passed along to subsequent FEMA officials. In our May 2019 report we recommended that FEMA implement new registration-intake questions to improve FEMA’s ability to identify and address survivors’ disability-related needs. FEMA concurred with this recommendation, and officials reported that in May 2019 the agency updated the questions to directly ask individuals if they have a disability. According to FEMA’s analysis of applications for assistance following recent disasters, which used the updated questions, the percentage of registrants who reported having a disability increased. FEMA officials stated this increase gives them confidence the change has improved FEMA’s ability to identify and address disability-related needs of individuals affected by disasters. We also recommended that FEMA improve its communication of registrants’ disability-related information across FEMA programs, such as by developing an alert within survivor files that indicates an accommodation request. FEMA did not concur with this recommendation, explaining that the agency lacks specific funding to augment the legacy data systems that capture and communicate registration information. In its comments on our May 2019 report, FEMA stated that it began a long- term initiative in April 2017 to improve data management and exchange, and improve overall data quality and standardization. After FEMA completes this initiative, which officials said will be in 2024, FEMA expects that efforts to share and flag specific disability-related data will be much easier. We believe that in the interim, FEMA could explore other cost-effective ways to improve communication, such as through agency guidance that encourages program officials to review registrants’ case file notes. As FEMA moves ahead with its initiatives to improve data, we encourage it to consider and ultimately implement technology changes, such as developing an alert within files that indicates an accommodation request, to help improve communication across FEMA programs. State, territorial, and local governments are primarily responsible for response and recovery activities in their jurisdictions, including those involving health and safety. In our May 2019 report, we found that the substantial damage caused by the 2017 hurricanes prevented or slowed some individuals with disabilities from obtaining food and water. According to territorial and nonprofit officials in Puerto Rico and the U.S. Virgin Islands, as well as survivors we interviewed in the U.S. Virgin Islands, this was due to centralized distribution models, in which the majority of food and water was distributed to centralized locations around the islands. Officials from one governmental agency in Puerto Rico said this posed a major barrier to people with mobility challenges or without caregivers receiving food and water because they had to rely on home delivery, which took time and in some cases, did not happen. We also found that Hurricane Maria survivors faced challenges obtaining needed medication and oxygen in Puerto Rico and the U.S. Virgin Islands, according to territorial and nonprofit officials. State, territorial, and local agencies are also primarily responsible for administering shelters, when necessary, for those affected by a disaster. We found in our May 2019 report that individuals with disabilities affected by the 2017 hurricanes may have faced challenges accessing basic services from local shelters, including restrooms and food, according to state, territorial, local, and nonprofit officials in Florida, Puerto Rico, Texas, and the U.S. Virgin Islands. For example, nonprofit officials in Florida and Puerto Rico described instances of shelter residents with impairments that prevented them from accessing shelter restrooms. We also found that transportation was especially challenging for those who relied on public transportation or were unable to walk long distances, such as people with disabilities, according to state, territorial, local, and nonprofit officials we interviewed. For example, Florida state officials reported that few public transportation services, including paratransit, were functional following Hurricane Irma. This may have prevented some people with disabilities from maintaining their health and wellness—such as by shopping for groceries or going to medical appointments—after the storm, according to state officials. Officials we interviewed from Texas, Florida, and Puerto Rico for our May 2019 report said they had difficulty obtaining FEMA data that could help them deliver assistance to individuals, including those with disabilities. The officials explained that data—including names and addresses— showing who has registered for and received assistance from FEMA can help local governments and nonprofits identify who in their community needs assistance. To better facilitate authorized nonfederal partners obtaining these needed data, we recommended that FEMA develop and publicize guidance for partners who assist individuals with disabilities on how to request and work with FEMA staff to obtain the data, as appropriate. FEMA concurred with this recommendation and officials told us in July 2019 that the agency plans to publish data-sharing guidelines on its website, among other actions. Before initiating its new approach to disability integration, ODIC distributed an explanatory memorandum and other documentation to FEMA staff. For example, an April 2018 memorandum to FEMA Regional Administrators outlined a proposal to add new disability integration staff in each FEMA region to foster day-to-day relationships with state, territorial, and local emergency managers and disability partners. Also, ODIC distributed a document that described FEMA’s new approach to deployments. Under the new approach, fewer disability integration staff are to be deployed to disasters and all deployable staff and staff in programmatic offices are to receive training on disability issues during response and recovery deployments. However, in our May 2019 report, we found that these documents did not articulate objectives that could help the agency define success for the new approach. We concluded that without a set of common objectives for FEMA’s new disability integration approach, FEMA risks inconsistent application across its regions. In our report, we recommended that FEMA establish and disseminate a set of objectives for the new approach. FEMA concurred with this recommendation, and in July 2019 officials provided us with the draft of ODIC’s strategic plan for 2019-2022, which includes strategic goals and objectives that the new disability integration approach can help achieve. ODIC officials told us they will be working throughout 2019 with FEMA’s Office of External Affairs to disseminate the plan agency-wide and to nonfederal partners. We will continue to monitor FEMA’s progress toward sharing the objectives of its new approach to disability integration with critical stakeholders. To implement FEMA’s new deployment model, which will shift the responsibility of directly assisting individuals with disabilities from disability integration staff to all FEMA staff, FEMA planned to train all deployable staff and staff in programmatic offices on disability issues. We reported in May 2019 that FEMA officials emphasized the need to integrate disability competencies throughout FEMA’s programmatic offices and deployable staff. However, we found that the agency did not have written plans—including milestones, performance measures, or a plan for monitoring performance—for developing new comprehensive training for all staff. Starting in the 2018 hurricane season, FEMA had taken initial steps toward training some deployed staff on disability issues. For example, FEMA required all staff to complete a 30-minute training on basic disability integration principles and offered targeted “just-in-time” training to deployed staff. We concluded that developing a training plan would better position FEMA to provide training to all staff to help achieve FEMA’s intended goals. In our May 2019 report, we recommended that FEMA develop a plan for delivering training to FEMA staff that promotes competency in disability awareness. In its letter commenting on our May 2019 report, FEMA stated that ODIC is developing a plan to introduce the disability competency in FEMA’s position task books for all deployable staff. The letter explained further that ODIC’s plan will describe how FEMA will communicate the disability integration competency throughout the agency, establish milestones for measuring how effectively the competency is integrated across the agency, and outline how ODIC will monitor and measure integration of the competency across the deployable workforce. In July 2019, FEMA officials told us ODIC plans to hire new staff to focus on integrating the disability competency FEMA-wide. According to the officials, after the position task books are updated, ODIC will work with FEMA’s training components to ensure that disability-related training is consistent with the content of the position task books. FEMA officials also noted that the Field Operations Division, and not ODIC, is responsible for measuring how effectively the disability competency is integrated across FEMA. We will continue to monitor FEMA’s progress toward developing a plan for delivering training to promote competency in disability awareness among its staff. As noted in our May 2019 report, the plan for delivering such training should include milestones, performance measures, and how performance will be monitored. In our May 2019 report, we found that deploying a smaller number of disability integration staff and shifting them away from providing direct assistance to individuals with disabilities may result in nonfederal partners (such as state, territorial, and local emergency managers) providing more direct assistance to individuals with disabilities than they did previously. In February 2017, we reported that the comprehensive introductory training course on disability integration that FEMA offered to its nonfederal partners included substantial information on how to incorporate the needs of people with disabilities in emergency planning. However, according to officials, FEMA stopped offering this 2-day course in September 2017. ODIC officials told us during our 2019 review they had determined that the course, as designed, did not provide actionable training to emergency management partners to meet the needs of individuals with disabilities and planned to replace it. However, we found in May 2019 that although officials had plans to replace the course with new training, they had not provided a timeline, which would help ensure that partners are provided with timely information on inclusive emergency management practices. We recommended that FEMA develop a timeline for completing the replacement course and, in June 2019, FEMA officials said they had begun procuring external consulting services to redevelop it. According to the officials, ODIC had evaluated alternatives to the suspended course and determined that an in-person, exercise-based course with remote participation capabilities would be an appropriate replacement. FEMA officials said the course will take about 1 year to develop and will be ready to field by August 2020. In conclusion, FEMA has taken a number of steps toward addressing our recommendations related to how it supports individuals with disabilities in obtaining disaster assistance. ODIC’s draft strategic plan for 2019-2022, which articulates objectives for the new approach to disability integration, is likely to help facilitate consistent implementation agency-wide. In addition, we are hopeful that FEMA’s revised registration-intake questions, as well as data sharing guidance for nonfederal partners, will help FEMA and its partners better identify and assist registrants with disabilities. However, we continue to believe that implementing changes to disability integration before staff have been fully trained may leave FEMA staff ill-prepared to identify and address the challenges that individuals with disabilities face while recovering from disasters. We will continue to monitor FEMA’s actions as it makes additional progress toward addressing our recommendations. Chairman Payne, Ranking Member King, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Elizabeth Curda, Director, Education, Workforce, and Income Security Issues at (202) 512-7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Sara Schibanoff Kelly (Assistant Director), Sara Pelton (Analyst-in-Charge), and David Reed. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Three sequential hurricanes—Harvey, Irma, and Maria—affected more than 28 million people in 2017, according to FEMA. Hurricane survivors aged 65 and older and those with disabilities faced particular challenges evacuating to safe shelter, accessing medicine, and obtaining recovery assistance. In June 2018, FEMA began implementing a new approach to assist individuals with disabilities. This statement describes (1) reported challenges faced by these individuals in accessing disaster assistance from FEMA and its nonfederal partners following the 2017 hurricanes; and (2) the extent to which FEMA has implemented changes in how it supports these individuals. This statement is based on a May 2019 GAO report and selected updates. For the report, GAO analyzed FEMA documents and data from FEMA call centers and also visited 2017 hurricane locations to interview state, territorial, and local officials. GAO also interviewed FEMA officials from headquarters and deployed to each disaster location. To update FEMA's progress toward addressing its recommendations, GAO interviewed FEMA officials and analyzed agency documents. GAO's May 2019 report found that some individuals who are older or have disabilities may have faced challenges registering for and receiving assistance from the Federal Emergency Management Agency (FEMA) and its nonfederal partners (such as state, territorial, and local emergency managers). FEMA's registration did not include an initial question that directly asks individuals if they have a disability or if they would like to request an accommodation. GAO recommended that FEMA use new registration-intake questions to improve the agency's ability to identify and address individuals' disability-related needs. FEMA concurred and, in May 2019, updated the questions to directly ask individuals if they have a disability. GAO found that the substantial damage caused by the 2017 hurricanes prevented or slowed some individuals with disabilities from obtaining food, water, and other critical goods and services from states, territories, and localities. Officials from one state reported that few public transportation services, including paratransit, were functional following the 2017 hurricane affecting the state. The officials said this may have prevented people with disabilities from maintaining their health and wellness—such as by shopping for groceries or going to medical appointments—after the storm. GAO's May 2019 report also found that FEMA had taken limited steps to implement the agency's new approach to assist individuals with disabilities. GAO recommended the agency establish and disseminate objectives for implementing its new approach. FEMA concurred, and developed a draft strategic plan that includes strategic goals and objectives for the new approach, which the agency plans to finalize and disseminate in 2019. GAO recommended that FEMA, as part of its new approach, develop a plan for delivering training to all FEMA staff deployed during disasters that promotes competency in disability awareness. In concurring with this recommendation, FEMA described its plan to incorporate a disability awareness competency into the job requirements for all deployable staff, but has not yet developed a plan for training. GAO's May 2019 report also recommended that FEMA develop a timeline for completing the development of training on incorporating the needs of individuals with disabilities into emergency planning, which it planned to offer to its nonfederal partners. FEMA concurred with GAO's recommendation and, in June 2019, officials began procuring external consulting services to develop a replacement course. According to officials, the course will take about 1 year to develop and will be ready to field by August 2020. In the May 2019 report, GAO made seven recommendations to FEMA; FEMA concurred with six. FEMA has established new registration questions and a timeline to offer training to its partners. GAO continues to believe its recommendations to develop a plan to train its staff on disability awareness, among other actions, are valid.", "document_type": "gao"}
{"report": "In the United States, the roles and responsibilities related to preparing for, assessing, and responding to communicable disease threats in the civil aviation system require immense coordination among a number of federal agencies and aviation stakeholders. Each federal agency has a different mission, which affects its responsibilities for protecting against communicable disease threats. The DHS and HHS are the lead agencies for responding to a communicable disease threat. They focus on protecting our borders at ports of entry, including airports, from threats from abroad and protecting the nation from domestic and foreign health, safety, and security threats, respectively. FAA is responsible for civil aviation and commercial space transportation flight safety in the United States and the safe and efficient movement of air traffic in the national airspace system, as well as for the safety of U.S. airlines, other U.S. operators, and FAA-certificated aircrews worldwide. As part of this responsibility, FAA regulates and certificates airports, airlines, and airmen and provides guidance. In the case of a communicable disease threat, numerous federal, state, and local entities may be called upon to respond, depending on their legal authority and whether the threat is identified before, during, or after the flight. For example, before boarding, HHS and DHS may identify travelers who are not allowed travel, based on public health threats. The CDC can prohibit the introduction of nonresident foreign nationals into the United States from designated countries or places, but only for such time as the CDC deems necessary for public health. During a flight, CDC regulations require pilots to immediately report to CDC any deaths or the occurrence of any travelers with signs or symptoms that may indicate a communicable disease infection during international flights coming to the United States. And, once an aircraft with a suspected ill passenger approaches an airport, federal or local public health officials, first responders (e.g., fire or emergency medical technicians), airport authorities, air traffic control personnel, or a combination of these stakeholders may make decisions about and lead certain aspects of the response based on the situation and available response protocols or preparedness plans. In addition, some response-related roles and responsibilities are established in law or by interagency agreements, and others may be defined in FAA-required airport-emergency plans, although those plans are not required to address communicable disease threats. In addition, FAA supports and coordinates a range of R&D activities for the civil aviation system. The inventory of FAA’s R&D activities is expressed in the National Aviation Research Plan (NARP) and in FAA’s Fiscal Year R&D Annual Review. FAA is required to submit both of these documents annually to Congress. According to FAA’s most recent NARP, FAA’s research budget from all accounts in FY 2017 was $422.3 million. FAA’s research budget supports activities conducted by FAA as well as a range of partners, including other government agencies, universities, and private sector organizations. FAA’s process for developing its commercial aviation research portfolio spans the agency. To develop the NARP and its R&D portfolio, FAA’s program planning teams, which focus on specific research program areas, identify R&D projects to meet one of DOT’s three strategic goals and FAA’s five R&D goals. Further, an executive board in FAA provides guidance and oversight over the agency’s portfolio development process, and a statutorily created advisory committee—consisting of individuals that represent corporations, universities, associations, and others— conducts external reviews of FAA’s R&D programs for relevance, quality, and performance. This advisory committee also makes recommendations to FAA on the proposed R&D portfolios and budgets. In 2015, we found that the United States lacked a comprehensive national aviation-preparedness plan to limit the spread of communicable diseases through air travel, though some individual airport and airline preparedness plans did exist. Accordingly, we recommended that DOT work with relevant stakeholders, such as HHS, to develop a national aviation- preparedness plan for communicable disease outbreaks. We emphasized that a comprehensive national plan would provide a coordination mechanism for the public-health and aviation sectors to more effectively prevent and control a communicable disease threat while also minimizing unnecessary disruptions to the national aviation system. Additionally, U.S. airports and airlines are not required to have individual preparedness plans for communicable disease threats and no federal agency tracks which airports and airlines have them. As such, the extent to which U.S. airports and airlines have such plans is unknown. However, all 14 airports and 3 airlines we reviewed in 2015 had independently developed preparedness plans for responding to communicable disease threats from abroad. These plans generally addressed the high-level components that we identified as common among applicable federal and international guidance for emergency preparedness, such as establishment of an incident command center and activation triggers for a response. While the 14 airports and 3 airlines had plans that address communicable diseases, representatives from these airports and airlines reported facing multiple challenges in responding to threats. Identified challenges that included obtaining guidance; communication and coordination among responders; and assuring employees have appropriate training, equipment, and sanitary workplaces. As we stated in our 2015 report, a national aviation preparedness plan to respond to communicable disease outbreaks could help address these challenges. As of June 2020, DOT, DHS, and HHS stated that the federal government still has not developed a national aviation-preparedness plan to respond to communicable disease outbreaks. In making our recommendation in 2015, we pointed to Annex 9 to the Chicago Convention—an international aviation treaty to which the United States is a signatory—which contains a standard that obligates International Civil Aviation Organization (ICAO) member states to develop a national aviation-preparedness plan for communicable disease outbreaks. DOT and CDC officials in 2015 stated that some elements of a national aviation-preparedness plan already exist, including plans at individual airports. However, as we discussed in our 2015 report, individual airport plans are often contained in multiple documents, and FAA reported that the plans are intended to handle communicable disease threats posed by passengers on one or two flights, rather than an epidemic—which may require involvement from multiple airports on a national level. Most importantly, a national aviation- preparedness plan would provide airports and airlines with an adaptable and scalable framework with which to align their individual plans, to help ensure that individual airport and airline plans work in concert with one another. DOT and CDC officials agreed in 2015 and continue to agree today that a national aviation-preparedness plan could add value. DOT, however, maintains that those agencies that have both legal authority and expertise for emergency response and public health—namely DHS and HHS—are best positioned to take the lead role in developing such a plan within the existing interagency framework for national-level all-hazards emergency preparedness planning. We continue to believe that DOT would be in the best position to lead the effort because FAA and DOT have stronger and deeper ties to, as well as oversight responsibility for, the relevant stakeholders that would be most involved in such a broad effort, namely airlines, airports, and other aviation stakeholders. In addition, DOT’s Office of the Secretary is the liaison to ICAO for Annex 9 to the Chicago Convention, in which the relevant ICAO standard is contained. In response to the current COVID-19 pandemic and in the absence of a national aviation-preparedness plan, DOT officials pointed to ongoing efforts to engage with interagency partners at DHS and HHS, as well as industry stakeholders, to better collaborate on the aviation sector’s communicable disease response and preparedness. For example, DOT told us that it has facilitated conference calls between federal and private sector stakeholders and has collaborated with CDC to update interim guidance for airline crews related to communicable diseases, specifically COVID-19. While these actions are helpful, some aviation stakeholders have publicly highlighted piecemeal response efforts that may have led to some of the confusion among stakeholders and chaos at certain airports that occurred earlier this year following the COVID-19 travel bans and increased screening efforts. For example, stakeholders described actions taken by individual airlines in the absence of FAA guidance, such as to cease operations to certain countries, and a piecemeal approach to establishing standards for safely continuing or expanding service, such as various airline and airport policies regarding facemasks. This piecemeal approach points to the continued need for DOT to implement our 2015 recommendation to develop a coordinated effort to plan for and respond to communicable disease threats. We have included this open recommendation as one of 16 high priority recommendations to DOT. While a national aviation-preparedness plan can help better manage the response to the next aviation pandemic, other efforts such as research and development are also key. In 2017, we found that FAA’s actions related to the management of its R&D portfolio were not fully consistent with statutory requirements, agency guidance, and leading practices. As part of that work, we assessed FAA’s actions to manage its R&D portfolio in three key areas: (1) developing its portfolio of R&D projects, (2) tracking and evaluating those projects, and (3) reporting on its portfolio. We found that FAA could be more strategic in how it develops its R&D portfolio, chiefly in identifying long-term research needs and in improving disclosure of how projects are selected. As a result of these deficiencies, we found that FAA management could not be assured that the highest priority R&D was being conducted. We also found that while FAA tracks and evaluates its research projects consistent with leading practices, it did not fully address all statutory reporting requirements, such as identifying long-term research resources in the National Aviation Research Plan (NARP) or preparing the R&D Annual Review in accordance with government performance-reporting requirements. These reporting deficiencies can limit the usefulness of the reports to internal and outside stakeholders. Accordingly, in 2017, we recommended that DOT direct FAA to (1) take a more strategic approach to identifying long- term R&D research priorities across the agency, (2) disclose how research projects are prioritized and selected, and (3) ensure that the NARP and R&D Annual Reviews meet statutory requirements for content. DOT agreed with all three recommendations. As of June 2020, FAA has fully addressed one of our recommendations and taken partial action on two other recommendations. Specifically, FAA fully responded to our recommendation that FAA disclose the process it uses for prioritizing and selecting research projects by updating in 2018 its internal guidance documents to allow better transparency over project selection. In partially responding to our recommendation to take a more strategic approach to identifying research priorities across the agency, in June 2019, FAA issued a redesigned National Aviation Research Plan (NARP) for 2017-2018. The redesigned plan is a good first step. Also as part of an effort to be more strategic, FAA is beginning to take actions to understand emerging aviation issues requiring FAA’s research attention. This recommendation has not been fully addressed as, according to FAA officials, the agency is still developing guidance to ensure that future NARPs take a strategic approach and incorporate emerging issues into future plans. FAA officials told us they plan to finalize the guidance by the end of 2020. Similarly, with respect to our recommendation aimed at achieving compliance with statutory reporting requirements, the redesigned 2017-2018 NARP included a list of agreements with federal and nonfederal entities on research activities, resource allocation decisions, and a description of technology transfer to government, industry, and academia, among other items. Officials told us that they are finalizing the 2019 R&D Annual Review, which has been redesigned to address other statutory reporting requirements, and will develop guidance to ensure that future documents meet those requirements. FAA has sponsored limited federal research into disease transmission onboard aircraft and in airports. FAA’s research goals focus on areas like improving airport operations and air space management, and developing new technologies, which FAA has aligned to DOT’s strategic goals related to safety, infrastructure, and innovation. Based on our prior work and interviews with FAA officials, we found that FAA’s research in cabin safety for crew and passengers does not focus on disease transmission. For example, according to FAA officials, as of June 2020, ongoing research that most closely relates to disease contamination is research related to monitoring the quality of “bleed air,” which is outside air that is drawn through jet engines into an aircraft cabin. FAA officials said that its Civil Aerospace Medical Institute is participating in this research. Even so, FAA has funded some programs that are relevant to mitigating communicable disease transmission at airports and on aircraft. For example, in 2015 the Transportation Research Board’s Airports Cooperative Research Program (ACRP), which is funded by FAA’s Airport Improvement Program (AIP), decided to hold a series of workshops on topics that are of significance to airports and that are not being addressed by other federal research programs. The decision to hold the first ACRP workshop on communicable disease occurred toward the end of the Ebola virus outbreak. ACRP has also issued reports on reducing communicable disease transmission at airports and aircraft. These reports have provided information and guidance to airports and airlines on infectious disease mitigation onboard aircraft and ways to respond to a communicable disease in airports. For example, a 2013 ACRP report recommends reducing the amount of time aircraft ventilation systems are shutdown at the gate, so that an aircraft’s high efficiency particulate air (HEPA) systems, which can capture more than 99 percent of the airborne microbes, continue to operate. ACRP also has a research project currently under way for publication early next year on effective collaboration to prevent, respond to, and mitigate disease threats. Prior to 2014, FAA also funded some research on disease transmission on aircraft through its Centers of Excellence research consortium. Specifically, in 2004, FAA established the Airliner Cabin Environment Research (ACER) Center of Excellence, which conducts research on, among other things, the safety and health of passengers and crew inside the cabin. In 2010 and 2012, ACER published research on air quality in airline cabins and disease transmission in aircraft. A researcher we interviewed who is affiliated with ACER said that the Center established a laboratory in 2006, called ACERL, which is currently conducting research on the dispersion of airborne particles (including viruses) in the aircraft cabin for CDC’s National Institute of Occupational Safety and Health. As of 2014, ACER began operating independently as a consortium academia, government, and others and is no longer being funded solely by FAA. FAA and DOT principally look to HHS and the CDC for guidance on passenger health issues. HHS has statutory responsibility for preventing the introduction, transmission, and spread of communicable diseases into the United States and among the states. Within HHS, CDC has defined its mission as protecting America from health, safety and security threats, both foreign and domestic. CDC alerts travelers about disease outbreaks and steps they can take to protect themselves. CDC also has the authority to quarantine passengers traveling from foreign countries, if necessary, to prevent the introduction, transmission, or spread of communicable disease. CDC’s National Institute for Occupational Safety and Health has conducted research and issued guidance in the past on disease transmission in aircraft and cabin crew health and, as previously noted, is funding current research through the ACER Center. CDC has also issued COVID-19 guidance for cabin crew safety. There are a variety of technologies that could help address infectious disease transmission associated with air travel, but these technologies are at various stages of maturity. For example, the initial screening of passengers for fevers is typically done with handheld infrared thermometers and has been reportedly discussed for use by Transportation Security Agents. Reports also state that the mass screening of crowds using thermal cameras has been used in some airports in Asia, but such scanners are still being tested for standalone use in the United States, with some concerns reported about the accuracy of the results. Aircraft disinfection has traditionally been done by cleaning crews, but a number of methods are being developed using heat, chemicals, and UV light, and are under examination by researchers. Chairwoman Horn, Ranking Member Babin, and Members of the Subcommittee, this completes my prepared remarks. I would be pleased to respond to any questions that you or other Members of the Subcommittee may have at this time. If you or your staff have any questions about this statement, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Jonathan Carver, Assistant Director; Paul Aussendorf; Roshni Davé; Hayden Huang; Delwen Jones; Molly Laster; Cheryl Peterson; Gretchen Snoey; and Elizabeth Wood. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The transmission of COVID-19 has been greatly aided by air travel. In light of the pandemic and warnings about the risks of air travel, U.S. passenger airline traffic fell by 96 percent in April 2020 as compared to April 2019. COVID-19 is only the latest communicable disease threat to raise public health concerns regarding the spread of contagion through air travel. Ensuring that the United States is prepared to respond to disease threats from air travel, as well as conducting the necessary research to reduce the risks of contagion, are two vital responsibilities of the federal government. This statement provides information on (1) the U.S. aviation system's preparedness to respond to communicable disease threats and (2) FAA's management of its R&D portfolio, including the extent to which disease transmission on aircraft and at airports has been the focus of FAA research. This statement is based on GAO-16-127 issued in December 2015 and GAO-17-372 issued in April 2017. GAO conducted updates to obtain information on the actions agencies have taken to address these reports' recommendations. The United States still lacks a comprehensive plan for national aviation preparedness to limit the spread of communicable diseases through air travel. In December 2015 during the Ebola epidemic, GAO recommended that the Department of Transportation (DOT) work with relevant stakeholders, such as the Department of Health and Human Services (HHS), to develop a national aviation-preparedness plan for communicable disease outbreaks. GAO concluded that the absence of a national plan undermined the ability of the public-health and aviation sectors to coordinate on a response or to provide consistent guidance to airlines and airports. Moreover, Annex 9 to an international aviation treaty to which the United States is a signatory contains a standard that obligates member states to develop such a plan. DOT is now confronting an even more widespread public health crisis—the Coronavirus Disease (COVID-19) global pandemic—without having taken steps to implement this recommendation. Not only could such a plan provide a mechanism for the public-health and aviation sectors to coordinate to more effectively prevent and control a communicable disease threat, it could also help minimize unnecessary disruptions to the national aviation system, disruptions that to date have been significant. Some aviation stakeholders have publicly highlighted the resulting piecemeal approach to adopting standards during the response to COVID-19, such as various airline and airport policies regarding facemasks, as demonstrating the need for a more coordinated response. The existence of a national plan might have reduced some of the confusion among aviation stakeholders and passengers. While DOT agrees that a national aviation preparedness plan is needed, the agency continues to suggest that HHS and the Department of Homeland Security have responsibility for communicable disease response and preparedness planning. GAO continues to believe that DOT is in the best position to lead this effort given its oversight responsibilities and ties with relevant aviation stakeholders. The Federal Aviation Administration (FAA) has sponsored limited federal research into disease transmission onboard aircraft and in airports. FAA's research goals focus on areas like improving airport operations and air space management, and developing new technologies, which FAA has aligned to DOT's strategic goals related to safety, infrastructure, and innovation. Based on prior work and interviews with FAA officials, GAO found that FAA's research in cabin safety for crew and passengers does not focus on disease transmission. For example, according to FAA officials, ongoing research that most closely relates to disease contamination is research related to monitoring the quality of “bleed air,” which is outside air that is drawn through jet engines into an aircraft cabin. In 2017, GAO found that FAA could be more strategic in how it develops its research and development (R&D) portfolio, chiefly in identifying long-term research needs and explaining how FAA selects projects. Of the three recommendations GAO made in that report to improve FAA's management of its R&D portfolio, FAA fully addressed one, issuing guidance in 2018 on prioritizing and selecting R&D projects. While FAA has made some progress addressing GAO's recommendations on research portfolio development and reporting, further attention to these recommendations could help ensure that FAA strategically identifies research priorities across the agency. GAO made several recommendations in its prior work, including that DOT develop a comprehensive national aviation-preparedness plan, and that FAA identify long-term R&D priorities, among other things. Progress has been made in addressing some of the recommendations. Continued attention is needed to ensure that the remainder of these recommendations are addressed.", "document_type": "gao"}
{"report": "Our analysis of FHA data found that 272,155 HECMs terminated from fiscal years 2014 through 2018. The number of terminations rose from about 24,000 in fiscal year 2014 to a peak of roughly 82,000 in fiscal year 2016, before declining to about 60,000 in fiscal year 2018. In recent years, a growing percentage of HECMs have terminated because borrowers defaulted on their loans. While death of the borrower is the most commonly reported reason why HECMs terminated, the percentage of terminations due to defaults increased from 2 percent in fiscal year 2014 to 18 percent in fiscal year 2018 (see fig. 2). Most defaults were due to borrowers not meeting occupancy requirements or failing to pay property charges. For about 30 percent of terminations, we were unable to readily determine a termination reason from FHA’s data. We also found that servicers’ use of foreclosure prevention options for HECM borrowers was limited or FHA did not have readily available data to assess the extent of use. For example, since 2015, FHA has allowed HECM servicers to offer borrowers who are behind on property charges repayment plans to help prevent foreclosures, but as of the end of fiscal year 2018, only about 22 percent of these borrowers had received this option. Also, while FHA created a low-balance extension in 2016—which allows HECM servicers to delay calling a HECM due and payable if the borrower owes less than $2,000 in unpaid property taxes or hazard insurance—FHA officials told us they do not track how often servicers use this option. Our analysis of FHA data found that approximately 8,800 HECMs that terminated in fiscal years 2014 through 2018 had unpaid property charges of less than $2,000 at the time of termination. Some of these HECMs may have been eligible for a low-balance extension when they terminated. Additionally, we found that it is difficult to estimate the universe of HECMs potentially eligible for mortgagee optional election assignments—an option to help nonborrowing spouses stay in their homes after a borrowing spouse dies. Under this option, if required conditions and time frames are met, the servicer can assign the HECM to FHA. The assignment defers repayment of the HECM as long as the nonborrowing spouse fulfills certain conditions. According to information generated by FHA, HECM servicers submitted 1,445 requests for mortgagee optional election assignments from June 2015 (when FHA made this option available) through September 2018. In total, FHA approved roughly 70 percent of the requests and denied the remaining 30 percent. However, nonborrowing spouses were not listed on loan documentation for HECMs originated prior to August 4, 2014. As a result, FHA does not know how many eligible nonborrowing spouses could have, but did not, apply for the mortgagee optional election assignment, or how many are potentially eligible to apply for it in the future. FHA has begun reaching out to HECM borrowers to inform them of the mortgagee optional election process and ask them to self-identify whether there is a nonborrowing spouse associated with their loan. FHA’s monitoring, performance assessment, and reporting for the HECM program have weaknesses. Since fiscal year 2013, FHA has used the Home Equity Reverse Mortgage Information Technology (HERMIT) system to collect data on the servicing of HECMs, but the system does not contain comprehensive and accurate data about the reasons why HECMs terminate, a key servicing event. According to the HERMIT User Guide, servicers should provide a reason in HERMIT when they terminate a HECM. However, as noted previously, for about 30 percent of the HECMs that terminated in fiscal years 2014 through 2018, we were unable to determine the reason for termination. FHA officials told us termination reasons are available on an individual loan basis in HERMIT but not in an extractable form. FHA does not regularly track and report on HECM termination reasons, due partly to this system limitation. In the report being released today, we are recommending that FHA take steps to improve the quality and accuracy of HECM termination data. These steps may include updating the termination reasons in the HERMIT system for recording these data or updating the HERMIT User Guide to more clearly instruct servicers how to record termination reasons. FHA agreed with this recommendation. Comprehensive and accurate data on HECM terminations would provide FHA with a better understanding of loan outcomes—information FHA and Congress need in order to know how well the program is helping seniors age in place. FHA also has not established comprehensive performance indicators for the HECM portfolio and has not regularly tracked key performance metrics, such as the percentage of HECM terminations due to borrower defaults, the proportion of active HECMs with delinquent property charges, or the percentage of distressed borrowers who have received foreclosure prevention options. For example, HUD’s most recent strategic plan and corresponding performance report do not include HECM-specific performance indicators, and the last comprehensive evaluation of the HECM program was done in 2000. FHA officials told us they were in the planning phase for a new evaluation of the program but had not set a start date and did not expect the evaluation to include an analysis of the reasons for HECM terminations or the use of foreclosure prevention options for borrowers in default. We are recommending that FHA establish, periodically review, and report on performance indicators for the HECM program and examine the impact of foreclosure prevention options in the forthcoming HECM program evaluation. FHA agreed with this recommendation. Better performance assessment could provide FHA important information about how well the HECM program is working. Additionally, we found shortcomings in FHA’s internal reporting and analysis for the HECM program. For example, FHA has not developed internal reports to comprehensively monitor patterns and trends in loan outcomes, such as the percentage of HECM terminations due to borrower defaults. FHA has generated some reports from HERMIT to help oversee the HECM portfolio, but it has been slow to develop regular and comprehensive reporting mechanisms. FHA officials told us that while data on defaults and foreclosure prevention options have generally been available in HERMIT since 2015, FHA was unable to obtain reports on these topics until 2018 because of funding limitations with their HERMIT system contractor. Our review of the regular and ad hoc reports FHA has received from its HERMIT system contractor found that many are lists of loans that meet criteria and do not provide summary statistics that could be used to readily identify patterns or trends in metrics. Further, we found the reports required additional analysis to generate meaningful management information. In the report being released today, we recommend that FHA develop analytic tools, such as dashboards or watch lists, to better monitor outcomes for the HECM portfolio, such as reasons for terminations, defaults, use of foreclosure prevention options, or advances paid by servicers on behalf of HECM borrowers. FHA agreed with this recommendation. With more robust program analysis and internal reporting, FHA would be better positioned to detect and respond to emerging issues and trends in the HECM portfolio. Finally, we found that FHA has not fully analyzed the implications of how it prioritizes foreclosures for HECMs that servicers have assigned to FHA. FHA officials told us the agency generally does not foreclose on borrowers whose HECMs have been assigned to FHA and who are in default due to unpaid property charges. As a result, defaulted borrowers whose loans have not been assigned to FHA face a greater risk of foreclosure than defaulted borrowers with FHA-assigned loans. In addition, FHA’s process may create a financial incentive for HECM borrowers with assigned loans to not pay their property charges. Therefore, we are recommending that FHA analyze the implications of its prioritization process. FHA agreed with our recommendation. Such analysis would help FHA to better understand how its process for prioritizing foreclosures for assigned loans affects the HECM portfolio, HECM borrowers, neighborhoods, and FHA’s insurance fund. FHA’s oversight of HECM servicers has been limited in recent years. FHA has not performed comprehensive on-site reviews of HECM servicers’ compliance with program requirements since fiscal year 2013 and does not have current procedures for conducting these reviews. FHA officials said they planned to resume the HECM servicer reviews in fiscal year 2020, starting with three servicers that account for most of the market. However, as of August 2019, FHA had not developed updated review procedures (they were last updated in 2009) and did not have a risk- based method for prioritizing reviews. In the report being released today, we recommend that FHA develop and implement procedures for conducting on-site reviews of HECM servicers, including a risk-rating system for prioritizing and determining the frequency of reviews. FHA agreed with this recommendation. By resuming HECM servicer on-site reviews and adopting a risk-rating system, FHA would be better positioned to ensure that servicers are following program requirements, including those designed to help protect borrowers. Additionally, we found that while CFPB has examined reverse mortgage servicers and plans to continue doing so, according to CFPB officials the bureau does not share results with FHA because the agencies do not have an agreement in place to share supervisory information. CFPB officials said CFPB and FHA had taken initial steps in 2017 toward developing an information-sharing agreement. However, as of August 2019, an information-sharing agreement had not been completed. Accordingly, we are recommending that FHA and CFPB work together to complete an agreement for sharing the results of CFPB’s examinations of HECM servicers with FHA. CFPB generally agreed with this recommendation, and FHA neither agreed nor disagreed. Sharing these results could aid FHA’s oversight of HECM servicers by providing additional information about the servicers’ performance and operations. CFPB began collecting reverse mortgage consumer complaints in December 2011 and has collected about 3,600 complaints since then. CFPB officials told us they use consumer complaints as part of their criteria for selecting entities to examine, including reverse mortgage servicers, and to inform CFPB’s educational publications. We conducted a detailed analysis of a random, generalizable sample of 100 consumer complaint narratives drawn from all the reverse mortgage complaints CFPB received in calendar years 2015 through 2018. Based on our review of complaint narratives, we found that some of the issues consumers cited most commonly were foreclosures, poor communication from lenders or servicers, problems at loan origination, estate management, and unfair interest rates, fees, or costs. FHA collects and records inquiries and complaints about HECMs, and it has access to CFPB data on reverse mortgage complaints. However, FHA does not use its inquiry and complaint data to help inform HECM program policies and oversight, and the way data are collected does not produce quality information for these purposes. Additionally, we found that FHA has not leveraged CFPB complaint data for HECM program oversight. According to FHA officials, FHA’s two main methods for collecting customer inquiries and complaints are hotlines operated by the agency’s National Servicing Center and the FHA Resource Center. From calendar years 2015 through 2018, the National Servicing Center received about 105,000 HECM-related calls. During this same period, the FHA Resource Center received 147 HECM-related calls. In April 2019, the FHA Resource Center became the primary entity for collecting, recording, and responding to all HECM-related calls. FHA officials told us they transferred these responsibilities from the National Servicing Center to the FHA Resource Center to help improve call management. While this change could help improve customer service, it does not fully resolve limitations we found in FHA’s approach to collecting and recording HECM inquiries and complaints that diminish the usefulness of the information for program oversight. For example, both the National Servicing Center and the FHA Resource Center do not collect call information in a way that would allow FHA to readily analyze the data for themes. Specifically, both centers do not reliably differentiate between inquiries and complaints—a potentially important distinction for determining appropriate agency-level responses. Additionally, while both the centers collect data on the reason for calls, neither does so in a systematic way that would allow FHA to readily determine how frequently issues are being raised. For example, neither center’s data systems contain standardized categories or menus with options for recording reasons for calls. FHA officials said the agency uses complaint and inquiry data to improve customer service. However, FHA does not analyze data for other purposes that could enhance program oversight, such as determining which HECM servicers and lenders receive the most complaints, targeting entities for on-site reviews, or identifying topics that may need additional borrower education. In the report being released today, we recommend that FHA collect and record consumer inquiries and complaints in a manner that facilitates analysis of the type and frequency of the issues raised. FHA neither agreed nor disagreed with our recommendation. We also recommend that FHA periodically analyze available internal and external consumer complaint data about reverse mortgages to help inform management and oversight of the HECM program. FHA agreed with this recommendation. By improving the collection and use of consumer complaint data and better monitoring its own and CFPB’s complaint data, FHA could improve its ability to detect and respond to emerging consumer protection issues regarding HECMs. Chairman Clay, Ranking Member Duffy, and Members of the Subcommittee, this completes my statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Alicia Puente Cackley, Director, Financial Markets and Community Investment at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Beth Faraguna and Steve Westley (Assistant Directors), Holly Hobbs (Analyst in Charge), Steven Campbell, William Chatlos, John Karikari, Matthew Levie, Marc Molino, Jennifer Schwartz, and Tyler Spunaugle. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "This testimony summarizes the information contained in GAO's September 2019 report, entitled Reverse Mortgages: FHA Needs to Improve Monitoring and Oversight of Loan Outcomes and Servicing ( GAO-19-702 ). The vast majority of reverse mortgages are made under the Federal Housing Administration's (FHA) Home Equity Conversion Mortgage (HECM) program. In recent years, a growing percentage of HECMs insured by FHA have ended because borrowers defaulted on their loans. While death of the borrower is the most commonly reported reason why HECMs terminate, the percentage of terminations due to borrower defaults increased from 2 percent in fiscal year 2014 to 18 percent in fiscal year 2018 (see figure). Most HECM defaults are due to borrowers not meeting occupancy requirements or failing to pay property charges, such as property taxes or homeowners insurance. Since 2015, FHA has allowed HECM servicers to put borrowers who are behind on property charges onto repayment plans to help prevent foreclosures, but as of fiscal year-end 2018, only about 22 percent of these borrowers had received this option. FHA's monitoring, performance assessment, and reporting for the HECM program have weaknesses. FHA loan data do not currently capture the reason for about 30 percent of HECM terminations (see figure). FHA also has not established comprehensive performance indicators for the HECM portfolio and has not regularly tracked key performance metrics, such as reasons for HECM terminations and the number of distressed borrowers who have received foreclosure prevention options. Additionally, FHA has not developed internal reports to comprehensively monitor patterns and trends in loan outcomes. As a result, FHA does not know how well the HECM program is serving its purpose of helping meet the financial needs of elderly homeowners. FHA has not conducted on-site reviews of HECM servicers since fiscal year 2013 and has not benefited from oversight efforts by the Consumer Financial Protection Bureau (CFPB). FHA officials said they planned to resume the reviews in fiscal year 2020, starting with three servicers that account for most of the market. However, as of August 2019, FHA had not developed updated review procedures and did not have a risk-based method for prioritizing reviews. CFPB conducts examinations of reverse mortgage servicers but does not provide the results to FHA because the agencies do not have an agreement for sharing confidential supervisory information. Without better oversight and information sharing, FHA lacks assurance that servicers are following requirements, including those designed to help protect borrowers.", "document_type": "gao"}
{"report": "DHS’s efforts to strengthen and integrate its acquisition, IT, financial, and human capital management functions have resulted in the department meeting 3 out of 5 criteria for removal from the High-Risk List—leadership commitment, action planning, and monitoring progress. DHS has partially met the remaining two criteria—capacity and demonstrated, sustained progress, as shown in figure 1. With regard to leadership commitment, DHS’s top leadership, including the Secretary and Deputy Secretary of Homeland Security, has continued to demonstrate commitment and support for addressing the department’s management challenges. They have also taken actions to institutionalize this commitment to help ensure the long-term success of the department’s efforts. One such effort is the Under Secretary for Management’s Integrated Priorities initiative to strengthen the integration of DHS’s business operations across the department. During monthly leadership meetings with the Under Secretary for Management, the department’s Chief Executive Officers have been providing status updates on their respective actions to address this high-risk designation. Furthermore, top DHS leaders, such as the Under Secretary for Management and the department’s Chief Executive Officers, routinely meet with GAO management to discuss progress on high-risk areas. With regard to having an action plan and monitoring effectiveness, in January 2011, DHS produced its first Integrated Strategy for High-Risk Management and has issued 14 updated versions, most recently in September 2018. The September 2018 strategy describes DHS’s progress to-date, planned corrective actions to further strengthen its management functions, and includes performance measures to monitor key management initiatives. DHS’s Management Directorate leads this ongoing effort and DHS’s strategy and approach, if effectively implemented and sustained, provides a path for DHS to be removed from our High-Risk List. DHS has partially met the criteria for capacity but needs to make additional progress identifying and allocating resources in certain areas— namely acquisition, IT, and financial management—to fully demonstrate its capacity. DHS has analyzed components’ acquisition program staffing assessments but has yet to conduct an in-depth analysis across components or develop a plan to address any gaps. With regard to IT staffing, DHS has not fully identified or reported to Congress or the Office of Personnel Management (OPM) on its department-wide cybersecurity specialty areas of critical needs, such as cybersecurity management or incident response, as required by law. Additionally, DHS’s financial statement auditor has identified several capacity-related issues, including resource limitations and inadequate management and staff training, as causes for the material weaknesses reported. The final criterion is demonstrated progress, which remains partially met. In 2010, we identified, and DHS agreed, that achieving 30 specific outcomes in the areas of acquisition management, IT management, financial management, human capital management, and management integration would be critical to addressing the department’s management challenges. As such, these 30 outcomes became the key criteria by which we gauge DHS’s demonstrated progress. We reported in March 2019 that DHS has fully addressed 17 of the 30 needed outcomes, mostly addressed four, partially addressed six, and initiated actions to address the remaining three, as shown in table 1. In the last 2 years, DHS has made particular progress in the areas of human capital and IT management. Specifically, since 2017 DHS has taken steps to fully address 4 outcomes. The department fully addressed two key human capital outcomes by (1) demonstrating that components are basing hiring decisions and promotions on human capital competencies and (2) strengthening employee engagement efforts. In addition, in the last 2 years DHS has fully addressed two IT outcomes by (1) providing ongoing oversight and support to troubled IT investments to help improve their cost, schedule, and performance; and (2) demonstrating significant progress in implementing its IT strategic workforce planning initiative. Important progress and remaining work in all of the five key areas include: Acquisition management. DHS continues to face challenges in funding its acquisition portfolio. In May 2018, we found that recent enhancements to DHS’s acquisition management, resource allocation, and requirements policies largely reflect key portfolio management practices. However, we also found that of the 24 major acquisition programs we assessed with approved schedule and cost goals, 10 were on track to meet those goals during 2017—a decrease from 2016. In addition, we found that DHS’s portfolio of major acquisition programs was not affordable from fiscal years 2018 to 2022 because the planned costs exceeded the planned budget. DHS has taken steps to strengthen acquisition requirements development across the department, such as reestablishing the Joint Requirements Council in June 2014 to review and validate DHS acquisition requirements. However, opportunities remain to further strengthen DHS’s acquisition process by, for example, using the Joint Requirements Council to (1) identify overlapping or common requirements and (2) make recommendations to senior leadership to help ensure that DHS uses its finite investment resources wisely and maintains a balanced portfolio of investments that combine near-term operational improvements with long-term strategic planning. IT management. DHS has updated its approach for managing its portfolios of IT investments across all components. As part of the revised approach, the department is using its capital planning and investment control process and the Joint Requirements Council to assess IT investments across the department on an ongoing basis. For example, as part of its capital planning process for the fiscal year 2020 budget, the Office of the Chief Information Officer worked with the components to assess each major IT investment to ensure alignment with DHS’s functional portfolios, and to identify opportunities to share capabilities across components. This updated approach should enable DHS to identify potentially duplicative investments and opportunities for consolidating investments, as well as reduce component-specific investments. Additionally, DHS has continued to take steps to enhance its information security program. In November 2018, the department’s financial statement auditor reported that DHS had made progress in correcting its prior year IT security weaknesses. However, for the 15th consecutive year, the auditor designated deficiencies in IT systems controls as a material weakness for financial reporting purposes. Work also remains in implementing our six open recommendations concerning DHS’s cybersecurity workforce assessment requirements. DHS also faces challenges in fulfilling its pivotal role in government- wide cybersecurity efforts, as identified in our Ensuring the Cybersecurity of the Nation high-risk area. DHS has established the National Cybersecurity and Communications Integration Center, which functions as the 24/7 cyber monitoring, incident response, and management center for the federal civilian government. However, DHS has continued to be challenged in measuring how the center is performing its functions in accordance with mandated implementing principles. Financial management. DHS received a clean audit opinion on its financial statements for 6 consecutive years—fiscal years 2013 to 2018. However, in fiscal year 2018, its auditor reported two material weaknesses in the areas of financial reporting and information technology controls and financial systems, as well as instances of non-compliance with laws and regulations. These deficiencies hamper DHS’s ability to provide reasonable assurance that its financial reporting is reliable and the department is in compliance with applicable laws and regulations. Further, DHS components’ financial management systems and business processes need to be modernized; the current systems affect the department’s ability to have ready access to reliable information for informed decision-making. As we reported in 2017, DHS officials have faced various challenges in their efforts to address this—lack of sufficient resources, aggressive schedule, complex requirements, and increased costs. Effectively modernizing financial management systems for the Coast Guard, Federal Emergency Management Agency, and Immigration and Customs Enforcement would help address DHS’s risk in this area. Human capital management. DHS has continued to strengthen its employee engagement efforts by implementing our 2012 recommendation to establish metrics of success within components’ action plans for addressing its employee satisfaction problems. Further, DHS has conducted audits to better ensure components are basing hiring decisions and promotions on human capital competencies. OPM’s 2018 Federal Employee Viewpoint Survey data showed that in the past 2 years, DHS’s score on the Employee Engagement Index increased by 4 points—from 56 in 2016 to 60 in 2018—which was 1 point more than the government wide increase over the same period. While this improvement is notable, DHS’s 2018 score ranked 20th among 20 large and very large federal agencies. Increasing employee engagement and morale is critical to strengthening DHS’s mission and management functions. Management integration. Since 2015, DHS has focused its efforts to address crosscutting management challenges through the establishment and monitoring of its Integrated Priorities initiative. The department updated these priorities in September 2017. Each priority includes goals, objectives, and measurable action plans that are discussed at monthly leadership meetings led by senior DHS officials, including the Under Secretary for Management. DHS needs to continue to demonstrate sustainable progress integrating its management functions within and across the department. In closing, it is clear that significant effort is required to build and integrate a department as large and complex as DHS, which has grown to more than 240,000 employees and approximately $74 billion in budget authority. Continued progress for this high-risk area depends primarily on addressing the remaining outcomes. In the coming years, DHS needs to continue implementing its Integrated Strategy for High-Risk Management to show measurable, sustainable progress in implementing corrective actions and achieving outcomes. In doing so, it remains important for DHS to maintain its current level of top leadership support and sustained commitment to ensure continued progress in executing its corrective actions through completion; continue to identify the people and resources necessary to make progress towards achieving outcomes, work to mitigate shortfalls and prioritize initiatives as needed, and communicate to senior leadership critical resource gaps; continue to implement its plan for addressing this high-risk area and periodically provide assessments of its progress to us and Congress; closely track and independently validate the effectiveness and sustainability of its corrective actions, and make midcourse adjustments as needed; and make continued progress in achieving the 13 outcomes it has not fully addressed and demonstrate that systems, personnel, and policies are in place to ensure that progress can be sustained over time. We will continue to monitor DHS’s efforts in this high-risk area to determine if the outcomes are achieved and sustained over the long term. Madam Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this completes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals making key contributions to this work include Claudia Becker, Assistant Director; Imoni Hampton, Analyst-in-Charge; Michele Fejfar, Melissa Greenaway, James Lawson, and Tom Lombardi. Key contributors for the previous work that this is based on are listed in each product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "GAO has regularly reported on government operations identified as high-risk because of their increased vulnerability to fraud, waste, abuse, and mismanagement, or the need for transformation to address economic, efficiency, or effectiveness challenges. In 2003, shortly after the department was formed, we designated Implementing and Transforming DHS as a high risk area to the federal government because DHS had to transform 22 agencies into one department, and failure to address associated risks could have serious consequences for U.S. national security. In 2013, we reported that although challenges remained for DHS, the department had made considerable progress. As a result, we narrowed the scope of the high-risk area to focus on strengthening DHS management functions (human capital, acquisition, financial management, and information technology). discusses DHS's progress and remaining actions needed to strengthen and integrate its management functions. This statement discusses DHS’s progress and remaining actions needed to strengthen and integrate its management functions. This statement is based on our 2019 high-risk update and other reports issued from February 2017 through March 2019. Among other things, GAO analyzed DHS strategies and other documents related to the department's efforts to address its high-risk areas. As GAO reported in its 2019 high-risk update, the Department of Homeland Security (DHS) has continued its efforts to strengthen and integrate its acquisition, information technology, financial, and human capital management functions. As a result, the department has continued to meet three out of five criteria for removal from GAO's High-Risk List (leadership commitment, action plan, and monitoring) and partially meet the remaining two criteria (capacity and demonstrated progress). With regard to leadership commitment, DHS's top leadership has continued to demonstrate support for addressing the department's management challenges through, for example, its Integrated Priorities initiative to strengthen the integration of DHS's business operations across the department. Additionally, DHS has established an action plan for addressing the high-risk area and has issued 14 updated versions since 2011.This action plan also demonstrates DHS's ongoing monitoring of these efforts as it describes DHS's progress to-date and planned corrective actions. The two key areas where additional work is needed are DHS's capacity and demonstrated progress. With regard to capacity, DHS needs to make additional progress identifying and allocating resources in the areas of acquisition, information technology, and financial management. With regard to demonstrated progress, DHS should show the ability to achieve sustained improvement across 30 outcomes that GAO identified and DHS agreed were needed to address the high-risk area. GAO found in its 2019 high-risk update that DHS fully addressed 17 of these outcomes, while work remains to fully address the remaining 13. DHS has made some progress in recent years regarding human capital and information technology outcomes, but needs to continue implementing its action plan to show measurable, sustainable progress in achieving the 13 outcomes not yet fully addressed. Since 2003, GAO has made about 2,800 recommendations to DHS to strengthen its management efforts, among other things. DHS has implemented more than 75 percent of these recommendations which have strengthened program management and performance measurement.", "document_type": "gao"}
{"report": "We have previously reported on how federal agencies were planning to protect their federal workers during a pandemic, as well as lessons learned from the H1N1 pandemic, the most recent pandemic experienced by our nation prior to COVID-19. Based on these lessons, and further informed by more recent events, we have identified key issues for federal agencies to consider as their employees reenter the workplace. Agencies should maintain continuous communication with employees, and their representatives, during a pandemic. In particular, agencies should identify employee concerns and communicate human capital guidance such as pay, leave, staffing, and other human capital flexibilities to employees to help to ensure the continuity of agencies’ operations and mission essential functions. It is important that employees understand the policies and requirements of their agencies, and the alternatives, such as telework, that may be available to them. Continuous communication will also help agencies to provide real-time information to employees as conditions evolve. Employees who must work onsite during a pandemic will face varying levels of exposure risk. The level of risk depends, in part, on whether or not they will be in close proximity to people potentially infected with the virus. As a first step, it is important that agencies identify mission essential functions that cannot be performed remotely, as well as the related number of employees who will perform those functions and their risk of exposure. Agencies should consider how they will continue to update their determinations and monitor the associated risks, as these factors could affect decisions on reentry as conditions evolve. It is important for federal agencies to factor-in local conditions of the pandemic at the component and facility level in their determinations regarding workforce reentry rather than applying across-the-board decisions based on agencies’ headquarters locations. Agencies should consider making decisions about reentry, including precautions and safeguards agencies take, based on the local prevalence of the pandemic at each site. As agencies consider local conditions for reentry, they should share information and cooperate with other agencies located in the same area. These reentry decisions could change over time as the pandemic progresses, such as if there is a second or third wave of outbreaks. It is important that agencies’ plans to protect their workforce for a pandemic are operational at all levels of the organization; particularly for those workers who have to perform mission-essential functions onsite. To protect employees as they reenter their workplaces, agencies should have appropriate protection measures in place, by exposure risk level. For example, an agency could make changes to the work environment to reduce workplace hazards, such as by installing sneeze guards as a barrier between employees who must have frequent contact with other employees or the public. Additionally, an agency could provide personal protective equipment (PPE), such as surgical masks, gloves, and N-95 respirators, to employees which, if used correctly, can help prevent some exposures. Agencies will want to ensure that they have an adequate supply of hygiene supplies, such as hand sanitizers, and a plan for distributing those supplies within the agency. Some basic hygiene precautions, such as encouraging employees to wash their hands or use a hand sanitizer after they cough, sneeze, or blow their noses, can be implemented in every workplace. Agencies will also want to provide supplemental cleaning programs for common areas. Avoiding crowded settings through social distancing strategies is one of the best ways to prevent infection during an influenza pandemic. Agencies can implement various social distancing strategies to avoid situations that increase workers’ risk of exposure to a pandemic virus. For those functions that can be performed remotely, agencies may consider maximizing the use of telework, which is discussed in greater detail later in this statement. Other strategies agencies should consider include avoiding unnecessary travel, restricting in-person meetings and gatherings, and allowing flexible schedules to reduce the number of employees in the building at the same time. Agencies should also consider workplace reconfiguration (such as building walls or partitions between workstations), office-specific protocols (such as limiting personal contacts among staff), and making decisions about reopening office fitness and childcare centers as part of separate risk-based decision processes. When medical countermeasures—such as antivirals and vaccines—are developed, it will be important for agencies to decide the extent to which these countermeasures will be provided to employees. In cases where countermeasures are going to be provided to employees, agencies should consider actions necessary to procure them, and establish clearly- defined, well-documented, and consistently-applied protocols to prioritize and allocate their distribution. The Bureau presents an illustrative example on continuity of operations and decision making for resumption of operations. The Bureau has both permanent staff in headquarters and a large local field infrastructure of 248 Area Census Offices (ACO) with short-term staff to implement the decennial census. On March 11, 2020, the World Health Organization declared COVID-19 a pandemic, just a day before invitations to respond to the 2020 Census were scheduled to arrive in mailboxes across the country, and as peak census operations were set to begin. In March and April 2020, the Bureau suspended operations until June 1 and extended key operations. Since that time, the Bureau announced it would resume operations at additional ACOs each week, and as of June 11 all ACOs had resumed operations. Key aspects of reopening Bureau ACOs included (1) a phased approach to resuming operations, (2) operational changes in response to challenges related to COVID-19, (3) addressing worker safety concerns, (4) communicating pandemic plans to ensure continued operations, and (5) contingency planning for risks. The Bureau took a phased approach to resuming operations at its ACOs. To make these decisions, the Bureau considered multiple factors including whether the state in which each ACO was located had begun phased reopening, whether data on federally established health criteria supported the decision to restart, and whether the Bureau could meet the safety needs of ACO employees and the public. In our late May survey of ACO managers, responses on the Bureau’s efforts to reopen offices varied. For example, 66 percent of ACO managers responding to our late May survey reported satisfaction with the process of recalling office staff, 68 percent with readiness to conduct field operations, and 75 percent with readiness to conduct office operations. Operations resumed in a phased manner not only by office, but also by function. As the Bureau resumed operations, it was able to resume operations that required less physical interaction, such as Update Leave, in which field staff deliver questionnaires to homes that might not receive mail delivered to their doors. Operations that require interviewing residents, such as Non-Response Follow Up, were delayed until August. The Bureau has also made a number of changes to its 2020 Census operations to minimize face-to-face interactions. The Bureau modified its Update Leave operation, directing field staff to update the addresses by observation when delivering a questionnaire, instead of knocking on doors to speak with residents. To reduce in-person contact for the Group Quarters operation, which enumerates facilities such as prisons, nursing facilities, and college dormitories, Bureau officials told us they were contacting facilities to encourage them to shift from in-person enumeration to electronic responses. In late April, the Bureau also authorized its ACOs to call those facilities that had previously opted to respond by providing a paper listing of residents. Census staff asked the facilities to mail the listing back to the ACO rather than having the ACO send staff to pick up the paper listing. The Bureau stated that it will coordinate with federal, state, and local health officials to put appropriate protocols and procedures in place and ensure adequate PPE and cleaning supplies. In early May, the Bureau announced that it had ordered this equipment for all field staff and that these materials would be secured and provided before resumption of operations. Bureau officials told us they are distributing PPE and cleaning supplies to its 248 ACOs on a rolling basis, prioritizing delivery to those ACOs that were resuming major field operations, such as Update Leave. In our late May survey, ACO manager satisfaction was relatively high regarding PPE for staff conducting Update Leave (66 percent), the largest field operation being conducted at the time. In contrast, managers at that time reported some of their lowest satisfaction rates when asked about PPE adequacy for their office and field workers more generally (34 and 43 percent, respectively). ACO managers reported higher satisfaction in late May than in early April with their ACO’s ability to safely manage employees and operations during the pandemic (increasing from 55 to 65 percent on average across three questions on this topic). Despite this increase in confidence, managers expressed concerns regarding worker safety in open-ended comments. For example, in late May managers expressed concerns regarding how fingerprinting of large numbers of staff—necessary to fulfill the census mission—could be conducted safely under conditions of social distancing. In addition, more than 15 comments in early April and 11 in late May expressed concerns about the ability of the ACO management teams to telework. These included concerns about the inadequate number of laptops and who was expected to report to their local office. The Bureau created a COVID-19 Internal Task Force to create a communications plan and appropriate workforce flexibilities. The Bureau sent emails to regional staff with updated information on delaying field operations and prepared documents to answer questions about the delays, office operating status, payroll, hiring, and training. Responses to our surveys of ACO managers highlighted the need for the Bureau to ensure open lines of communications. Between early April and late May, respondent satisfaction increased regarding the timeliness and clarity of Bureau communication about its pandemic plan; however, satisfaction in these areas remained relatively low. Specifically, reported satisfaction increased for communication timeliness (from 35 to 45 percent) and clarity (from 42 to 51 percent). More than 50 ACO managers commented about communication challenges such as conflicting direction from different sources and guidance received shortly before the implementation date. In May 2019, we reported that the Bureau did not have contingency plans for many identified risks including for major disasters—such as an epidemic—and recommended that it develop contingency plans for all risks that did not have one. The Bureau updated its risk register for major disasters to include a contingency plan. According to the Bureau’s March 2020 risk register, the contingency plan for any major disaster—including an epidemic—is rapid response, meaning the Bureau would develop a plan to address the risk once it was realized. Bureau officials told us that, depending on the type of major disaster, response would vary widely and even if they had a more detailed contingency plan for a pandemic it would have never addressed the magnitude of the current national emergency that is taking place across the country. We have identified key practices in telework-related literature and guidelines that federal agencies should implement in developing telework programs. Also, in 2011, we reported that the Office of Personnel Management, the General Services Administration, and the Federal Emergency Management Agency had suggested several practices to federal agencies, in various telework or emergency-related guidance documents, for how to ensure telework is part of continuity of operations planning. These practices generally align with those we previously identified. Based on this prior work, we have identified several practices that may be especially useful for agencies to help ensure telework programs contribute to continuity of operations during COVID-19 and other major emergencies. These practices may be especially important if substantial numbers of employees remain out of their workplaces for an extended period or if agencies need to reverse their reentry decisions based on changing public health circumstances. In addition, agencies’ experiences with telework during the current pandemic may suggest opportunities to increase the availability of telework in the future. These practices can be grouped into four general categories: (1) policies and guidance related to telework; (2) technology; (3) performance management; and (4) program evaluation. Major emergencies, such as a pandemic, underscore the importance of establishing and updating clear policies and guidance related to telework as agencies’ continuity of operations may depend on employees working remotely for extended periods. Agencies should assess whether their policies and guidance were sufficient to ensure that their workforces were telework ready and understood the agency’s expectation of employees regarding teleworking during this emergency. The current crisis presents an opportunity for agencies to assess their established policies or requirements to ensure that they (1) balance employees’ personal circumstances and work responsibilities, and (2) effectively facilitated communication and engagement among teleworkers, managers, and coworkers. Agencies should institute processes for communicating human-capital guidance for emergencies (e.g., pay, leave, benefits) to ensure they worked effectively. For example, agencies should consider whether emergency employees (including COOP employees) knew in advance about their mission critical status. If not, agencies should ensure that, in case of future emergencies including a potential resurgence of COVID-19, employees are notified about requirements to report for work, remain at work, work at home, or report to an alternative work site when government operations are disrupted. Similarly, agencies should consider whether their guidance on workplace health and safety issues was adequate to ensure that teleworkers had safe and adequate places to work off-site, and whether information- security training was provided to all individuals, or managers of individuals, who teleworked during the current pandemic. It is important for agencies to correct any identified deficiencies in the guidance and training to improve the use of telework going forward, including for future emergency situations that may again require telework. We have reported that technology concerns are frequently cited barriers to telework. To effectively use telework as a tool to continue operations during major emergencies, agencies must have an appropriate information technology infrastructure in place that allows large numbers of employees to telework simultaneously. As such, it is important for agencies to assess the extent to which their telework infrastructure was adequate to support increased telework, especially during peak periods, including whether technical support was sufficient, and address any access and security issues they identify. Ensuring established organizational performance standards are met is important to maintaining agency operations whether employees are physically present in the office or working remotely. During extended periods of remote work, this could include setting expectations and preferences for how employees communicate with supervisors before telework arrangements begin. Agencies should consider whether their existing procedures and standards meet the needs of employees who teleworked and whether they ensured that telework did not diminish employee and organizational performance. Evaluation of telework may help agencies better understand the impact their increased use of telework had on their ability to achieve goals and accomplish missions, and could allow them to make adjustments to telework moving forward as employees are expected to return to their duty stations. As part of such an evaluation, agencies should assess whether their processes, procedures, and tracking systems to collect data provided the information needed to evaluate telework. In conclusion, federal agencies have a responsibility to provide safe workplaces for employees to perform their jobs. The evolving and growing challenges from the COVID-19 pandemic present critical workforce safety issues for federal agencies to assess and address as they seek to continue their operations. As I have discussed today, agencies should consider a number of factors when making decisions about employees reentering workplaces. Lessons learned from previous pandemic emergencies, as well as from telework use to ensure continuity of operations, can be helpful as agencies navigate ongoing workforce safety and productivity challenges. Consideration of these factors and lessons learned from agencies’ current experiences may better prepare agencies to address and respond to challenges from ongoing and future emergencies. Chairman Connolly, Ranking Member Hice, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to respond to any questions you may have. If you or your staff have any questions about this testimony, please contact J. Christopher Mihm at (202) 512-6806 or MihmJ@gao.gov, or Michelle B. Rosenberg at (202) 512-6806 or RosenbergM@gao.gov. Individuals making key contributions to this testimony include Clifton G. Douglas, Jr., Alexandra Edwards, Sarah E. Veale (Assistant Directors), Keith O’Brien (Analyst-in-Charge), Ulyana Panchishin, Maya Chakko, Karin Fangman, Steven Putansu, and Jacqueline Chapin. Key contributors for the earlier work that supports this testimony are listed in each product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal employees perform critical functions across multiple mission areas, from those vital to the long-term well-being of the country to those directly charged with aspects of public safety. Major emergencies, such as the COVID-19 pandemic, can pose threats to employees' safety and conditions may ebb and flow over an extended period. During these situations, federal agencies have a responsibility to provide an environment for employees to perform their jobs safely and effectively. This statement provides (1) key considerations based on GAO's prior work for federal agencies as federal workers reenter the workplace; (2) an illustrative example of how the Census Bureau was forced to suspend major Decennial Census field operations and the process it used to resume operations; and (3) key practices for ensuring telework contributes to continuity of operations. This statement is based on a large body of GAO work on pandemic preparedness, reviews of the Decennial Census, and federal human capital management issued from July 2003 through June 2020. The rapidly escalating challenges from the Coronavirus Disease 2019 (COVID-19) global outbreak present critical workforce issues for federal agencies to assess and address. GAO's prior work on pandemics and human capital issues has shown that agencies should consider a range of factors to carry out their missions while protecting their workforce and the members of the public with whom they interact. Key considerations for federal workers' reentry to workplaces . As federal agencies manage operations during the COVID-19 pandemic and plan for their employees to safely return to workplaces, GAO's prior work has shown that it is important for agencies to identify mission essential functions that cannot be performed remotely when deciding who needs to return to the office. Agencies should also consider the exposure risk level and local conditions when deciding whether to reopen offices across the country. To protect employees as they reenter the workforce, it will be important for agencies to have appropriate protection measures in place. For example, agencies should consider how they can ensure adequate distribution of hygiene supplies. They should also consider changes to the work environment to reduce workplace hazards, and implement social distancing strategies. How the Census Bureau decided to resume Decennial Census operations. The U.S. Census Bureau offers an example of how an agency suspended and resumed operations under the current pandemic. In March 2020, the U.S. Census Bureau suspended field operations of the Decennial Census and took a phased approach to resuming operations at its area census offices. As of June 11, all area census offices had resumed operations. Key aspects of resuming operations at area census offices included: (1) taking a phased approach to restarting operations, such as resuming operations that required less physical interaction first; (2) making operational changes to minimize face-to-face interactions; (3) addressing worker safety concerns; and (4) communicating pandemic plans to ensure continued operations. Key practices for ensuring telework contributes to continuity of operations. Several key practices GAO previously identified are useful for agencies to help ensure telework contributes to continuity of operations during the current pandemic and in the future. Specifically, agencies should consider based on their current experiences whether: (1) their policies and guidance related to telework are sufficient to ensure that their workforces are telework ready and balances are struck between employees' personal circumstances and work responsibilities; (2) the extent to which their telework infrastructure, including technical support and security, is adequate to support increased telework; (3) procedures and standards are in place that ensure telework does not diminish organizational and employee performance; and (4) the processes, procedures, and tracking systems to collect data provide the information needed to evaluate the use of telework. These assessments will assist agencies in considering broader changes to their policies and procedures related to telework as employees are called back to their duty stations.", "document_type": "gao"}
{"report": "The EDA program is one of several programs designed to build partner capacity through the provision of excess defense equipment and services to foreign governments or international organizations such as the North Atlantic Treaty Organization (NATO). These excess items are provided as part of U.S. security assistance efforts and help to support U.S. foreign policy and national security objectives. The Foreign Assistance Act permits the transfer of excess defense articles provided that such transfers will not adversely affect the industrial base. In particular, under the Act, transfers must not reduce the opportunity for U.S. contractors to sell new or used defense equipment to countries requesting the transfer. Excess defense items can include aircraft, ammunition, clothing, radios, trucks, and spare parts. According to DOD officials, the vast majority of EDA items are low- to medium-level technologies that, if not transferred, would either be stored at cost to DOD or destroyed. Excess defense items can be transferred as grants—as permitted by the Foreign Assistance Act—or sold to eligible foreign governments at a reduced cost in “as is, where is” condition pursuant to the Arms Export Control Act. This means that the requesting foreign government is generally required to pay all repair or refurbishment costs, as well as all costs associated with transporting the EDA item—which can be located in the United States or outside the continental United States. As previously mentioned, for purposes of this report, transfers refer to grants of EDA items unless otherwise indicated. DSCA has overall responsibility for administering the EDA program. The Director of DSCA has been delegated authority to make the determination on whether a proposed transfer could adversely affect the industrial base. The military departments determine when defense items are no longer needed and can designate them as excess and, upon approval, can offer them as EDAs. Multiple federal entities play a role in the EDA program, as illustrated in figure 1. Following the interagency coordination, if DSCA determines the proposed transfer will not adversely affect industry and thus can proceed, DSCA notifies Congress about proposed transfers that are valued at over $7 million or that contain significant military equipment. As part of the congressional notification, DSCA provides information on (1) the purpose for which the item is being provided to the country, (2) whether the item has been previously provided to the country, (3) the current value and original acquisition value of the item, and (4) its findings regarding how industry will be affected by the proposed transfer. After a 30-day congressional notification period, DSCA authorizes the proposed transfer in consultation with State, provided that Congress does not object and all agencies concur with the transfer. DSCA follows the same process to review and approve all proposed EDA transfers—including for excess Humvees. One unique difference for Humvee transfers is a 2018 legislative requirement that Humvees be modernized with an armored or armor-capable crew compartment and a new modernized powertrain prior to a transfer, unless a waiver is granted. Humvees, which are four-wheel drive military light trucks, have been part of DOD’s light tactical wheeled vehicle fleet since the 1980s. While the Army is the program office for Humvees, the vehicles have been used by other military departments in support of their own combat operations. Humvees were initially fielded to serve as a light, highly mobile and unarmored vehicle and are commonly used for combat operations; however, the Army National Guard also procures these vehicles for use in homeland defense and natural disaster relief operations. In efforts to adapt the Humvee to modern requirements for combat operations, the Army has increased the performance and protection of the vehicle over time. Over the past 30 years, AM General has produced three models—the M900, M1000, and M1100 series. The company no longer produces the M900 and M1000 series for combat operations and certain parts and components that are unique to these vehicles are obsolete or otherwise not readily available. The M1100 series, which is still in production and supports combat operations and many non-combat related operational and support missions, offers newer capabilities such as increased weight capacity. With the additional weight capacity, the 1100 series is the only model that can support the added armor requirements under the new legislative requirement without a substantial overhaul. Figure 2 highlights some of the capabilities of the different Humvee models. DOD’s light tactical wheeled vehicle strategy has changed since 2010, following lessons learned from military operations in Iraq and Afghanistan. DOD plans to shift from procuring new Humvees to sustaining existing vehicles in its fleet. In its 2014 Tactical Wheeled Vehicle Strategy, the Army stated plans to buy fewer new Humvees because the vehicle no longer fully meets its evolving mobility or protection requirements. While DOD decreased its procurement of Humvees for military operations, it has plans to upgrade and refurbish existing vehicles. There are nearly 300,000 Humvees or vehicles with the Humvee chassis operating globally by the U.S. military and other foreign governments. These vehicles are expected to require ongoing maintenance and upgrades for the next 20 to 30 years. DOD routinely conducts industrial base risk assessments to gain insight on the viability of current suppliers to meet its current and future requirements. The assessment takes into account a range of considerations including (1) factors that could cause a current supplier to go out of business or exit the market and (2) the extent to which an existing supplier relies on DOD, foreign military sales, or commercial sales. While these assessments are not routinely conducted as part of the excess defense article (EDA) transfer process, they may be undertaken to provide input on EDA transfers, as needed. The Army has efforts underway to acquire a new vehicle—the Joint Light Tactical Vehicle (JLTV)—to meet its future requirements. Although a different manufacturer was awarded the JLTV contract, in its industrial base risk assessment for this requirement, the Army stated it intends to maintain two manufacturers—including AM General—to meet its ongoing needs for light tactical wheeled vehicles. In a 2018 congressional briefing, the Army’s Acquisition, Logistics, and Technology Command estimated maintaining a relatively even mix of both vehicles—54,810 Humvees from existing inventory and 49,099 new JLTVs—to sustain operations for the foreseeable future. However, the Army is conducting a more comprehensive review of its light tactical vehicle requirements and plans to release its findings in an updated acquisition strategy expected in 2022. DOD approved nearly half of the total Humvees requested by foreign governments for fiscal years 2012 through 2018. The requests were in support of foreign governments’ security efforts, such as counterterrorism. However, the number that was actually delivered was less than those approved because DOD decreased the number or foreign governments canceled their requests for various reasons. DSCA halted approvals of EDA Humvee requests since the start of fiscal year 2017 and raised concerns about the new statutory requirement to modernize Humvees prior to transfer. DOD approved nearly half of the total Humvees requested by foreign governments for fiscal years 2012 through 2018—7,612 vehicles of the 16,005 excess Humvees requested—but has not approved Humvee requests made since the start of fiscal year 2017. Figure 3 shows the number of Humvees requested and approved for transfer each fiscal year. In our analysis of data provided by the Army and DSCA, we found from fiscal years 2012 through 2018, that 23 countries submitted requests for Humvees, including some requests in fiscal year 2018. The delivery of EDA items under the Foreign Assistance Act to certain countries is given priority to the maximum extent feasible. These countries include certain NATO countries, major non-NATO allies in the Middle East and Africa regions, and the Philippines. We found that the Middle East and Africa regions accounted for 75 percent of the vehicles requested over this period. Figure 4 shows the regional distribution of requests. The majority of requests for Humvees from countries in the Middle East and Africa regions were primarily to support various security-related missions. For example, one country requested excess Humvees for border security, counter smuggling, and counterterrorism operations. Such security-related efforts by foreign countries align with the U.S. 2018 National Defense Strategy, which states DOD’s objective to prevent terrorism globally and aid U.S. foreign partners in their counter-terrorism efforts. Additionally, the strategy aims to strengthen alliances and attract new partners by increasing interoperability to work together and effectively achieve military objectives. DSCA is required to state the comparative foreign policy benefits that the United States would gain from a grant transfer rather than a sale when it notifies Congress about a proposed transfer. In the documents we reviewed, DSCA cited foreign policy benefits such as increasing the capability of countries to take on a greater share of military operations, supporting joint operations with NATO, or counterterrorism and counter- narcotics operations. For example, for one request, DSCA determined that a requested transfer was in the U.S. national interest, as equipping the foreign country’s armed forces with Humvees would allow them to have an increased role in military operations in the Africa region. In turn, this would reduce the country’s reliance on U.S. forces for NATO operations. In addition to requesting vehicles for security-related operations, some countries planned to use vehicles for spare parts or had plans to refurbish the vehicles on their own. We found that about two-thirds of the Humvees delivered through the EDA program from fiscal years 2012 through 2018 were older models—either M900 or M1000 series—rather than the newer M1100 series. Most countries receiving deliveries of older models were seeking to replace existing vehicles in their fleet or to use EDA Humvees for spare parts. As previously mentioned in this report, DSCA has not approved any EDA Humvee requests since the start of fiscal year 2017. One reason, according to our analysis of DSCA data, is the manufacturer’s objections to proposed transfers. Another is because of the legislative provision in the Fiscal Year 2018 NDAA that requires Humvees to be modernized with an armored or armor-capable crew compartment and new, modernized powertrain prior to transferring. The corresponding conference report stated the conferees’ expectation that any modernization and refurbishment work must generally be done at no cost to DOD. According to DOD, the cost to modernize would be incurred by the requesting foreign government. Since the provision’s enactment, DOD has not exercised the authority to waive this legislative requirement for any Humvee request. Foreign governments have not been willing to pay for the modernization, so approvals have halted. Since the enactment of the modernization requirement in December 2017, DSCA has received requests for 4,103 Humvees. According to DSCA officials, when a foreign government submits a letter of request for EDA Humvees, DSCA notifies the country of the modernization requirement and its responsibility to pay for the cost to refurbish the vehicles in accordance with the law. In DOD documents we reviewed, foreign governments cited having limited budgets and being financially unable to purchase defense equipment such as Humvees. As such, they rely on the EDA program to acquire defense items. DSCA officials told us that the modernization work is to be done at no cost to the U.S. government; however, they added that paying the cost to modernize Humvees can be cost-prohibitive for foreign governments. Foreign governments can request, through DSCA, that the modernization requirement be waived. Since December 2017, according to DSCA officials, DSCA has received waiver requests from three foreign governments but has not exercised the waiver authority. According to DSCA officials, these requests likely will remain unapproved for the foreseeable future; however, the provision requiring the refurbishment of excess Humvees prior to transfer is set to expire in December 2020. According to DSCA officials, DSCA plans to resume its normal EDA approval process thereafter. Currently, according to DSCA officials, they are encouraging foreign governments to look at other options to meet their fleet requirements, including purchasing new Humvees. However, DSCA officials acknowledge that, if a foreign government cannot afford to buy new vehicles, DOD does not have any low-cost vehicles to offer as an alternative solution. However, DOD officials and Army documents we reviewed noted that even if foreign governments were able to independently fund the modernization costs, there are not sufficient quantities of the newer model Humvees—M1100 series—in inventory that can support the additional weight of the added armored capabilities for the modernized crew compartment. According to DSCA documentation, the EDA program has a little over a hundred vehicles that could be refurbished to the modernization requirements. Additionally, most of the Humvees in DOD’s inventory are older models that would first require a new expanded vehicle chassis to withstand the weight of adding armor. The officials likened the modernization process for the older model Humvees to essentially building a whole new vehicle. DSCA’s determinations of whether there is an adverse industrial base effect to approve Humvee transfers are largely based on objections from the manufacturer about the proposed transfers. Since 2015, the Humvee manufacturer has objected more frequently to the transfer of vehicles to foreign governments. In all but one instance when the manufacturer objected to a transfer, we found that DSCA and BIS took steps to address concerns of the Humvee manufacturer and reach a resolution, such as providing the manufacturer Humvee refurbishment work. DSCA’s decision on whether there is an adverse industrial base effect to approve a transfer of Humvees is largely based on the manufacturer’s perspective on a proposed transfer. DSCA has considerable latitude for such decisions as the Foreign Assistance Act, as delegated, does not specify how determinations should be made on whether proposed transfers could adversely affect U.S. industries. Historically, DSCA has sought input from BIS to aid its determination about potential industrial base effects of proposed transfers. According to DSCA officials, all proposed EDA Humvee transfers have undergone an assessment of adverse industrial base effect by BIS. We found that BIS actively engages the Humvee manufacturer on proposed transfer requests and supported all but one objection from fiscal years 2012 through 2018. BIS’s standard practice is to collect information from the prime contractor and other suppliers to inform its recommendation to DSCA about possible industrial base effects. As part of its efforts regarding proposed Humvee transfers, BIS notified AM General and provided information on all the transfer requests including the requesting country; number of vehicles requested; the vehicle model; and the country’s plans, if known, to repair or upgrade EDA vehicles, including who the country intends to select for such work. BIS officials told us that they request a response within 7 calendar days on whether the manufacturer supports or objects to the proposed transfer. In instances where the Humvee manufacturer objected to a transfer, BIS required that the manufacturer provide an explanation of its objection. In documents we reviewed, the manufacturer objected for various reasons, including that a transfer would: (1) directly interfere with ongoing marketing or planned sales to the requesting country, or (2) adversely affect its business and that of its suppliers. BIS’s standard procedure is to request proof of ongoing sales efforts if a company states that a proposed transfer will interfere with potential sales. In the cases where the Humvee manufacturer cited ongoing or planned business development with a requesting country, BIS required that the manufacturer provide information of its ongoing efforts to sell its vehicles to the requesting country, including: documentation of recent or planned meetings with foreign government officials and a timeline of the meetings; export licenses; and business plans. If a manufacturer submits an objection, BIS will also check if they have registered business activity with Commerce’s Advocacy Center, which provides assistance to defense companies pursuing contracts with overseas governments and government agencies. If BIS concludes the Humvee manufacturer has a basis for its objection due to ongoing business with the requesting country, it will recommend that DSCA not authorize the transfer. According to DSCA officials, this is largely because it considers the possibility that the transfer could dissuade requesting foreign governments from purchasing new or used vehicles. Thus, providing vehicles through the EDA program at no cost or a discounted price to a foreign government could siphon potential business from the manufacturer or could compete with the manufacturer’s sales efforts. Under the Foreign Assistance Act, a transfer request cannot be fulfilled if doing so will interfere with the manufacturer’s ability to sell equipment to the requesting country. During fiscal years 2012 through 2018, we found only one instance where DSCA, based on BIS’s recommendation, did not support AM General’s objection. In that case—a request for Humvees from Albania—DSCA moved forward and approved a Humvee transfer because the manufacturer could not demonstrate ongoing business with the requesting country. AM General has objected more frequently to the transfer of vehicles to foreign governments since March 2015. In 2015, the JLTV production contract was awarded to another contractor and the Humvee manufacturer sold its commercial automotive plant, both of which occurred in the wake of decreasing or nonrecurring DOD Humvee procurements in comparison to past years. In total, the Humvee manufacturer has challenged 11 transfer requests for over 4,000 vehicles between fiscal years 2015 and 2018. The manufacturer told us that the increasing number of proposed transfers is concerning because the transfers amount to nearly 3 years’ worth of new vehicles it could produce to sustain its production lines. AM General representatives told us they will continue to object to the transfer of older Humvee vehicles (M900 and M1000 models). For these models, the representatives citied concerns that parts for these vehicles are no longer in production, and thus the manufacturer cannot ensure qualified parts are available for maintenance and repairs. They are also concerned that older vehicles have the propensity to break down, which could damage the Humvee brand internationally—particularly, if counterfeit parts are used. In our review of documents describing requesting countries’ use of vehicles, we found that older model vehicles are, at times, accepted by foreign governments to use as spare parts to maintain an existing fleet and to develop their workforce’s capability to repair vehicles. However, we found that since 2015, the majority of vehicles to which the manufacturer objected were the newer M1100 models—stemming largely from a single 2016 request for Afghanistan. To support its objections to this transfer, AM General has stated that its own international sales are an important source of revenue, particularly because DOD has reduced its procurement of Humvees. AM General representatives explained that proposed transfers through the EDA program can threaten their company’s potential future sales to foreign governments that may be less likely to purchase new Humvees if DSCA approves transfers of used vehicles. According to the manufacturer, each transfer is a potential one-for-one reduction of a possible sale of a new vehicle to the requesting country, which can affect its bottom line as well as the suppliers that provide parts and materials to produce the Humvees. In our review of Army procurement data, we found that many countries that requested excess Humvees have not purchased them through the FMS program from fiscal years 2012 through 2018. DSCA officials told us that most of the countries requesting Humvees through the EDA program find it cost-prohibitive to purchase new Humvee vehicles directly from the manufacturer. A new Humvee can cost between $115,000 and $190,000 depending on the model and capabilities included. As a result, these countries rely on EDA Humvees provided through grants to sustain their military fleets. Figure 5 shows the number of Humvees procured by DOD relative to the number of vehicles foreign governments bought through the FMS program and those they were granted via the EDA program. We found that from fiscal years 2012 to 2018 AM General’s objections to proposed EDA Humvee transfers have increased the time that it takes for DSCA and BIS to review and make their determinations. If the manufacturer did not object to a transfer, which was largely the case prior to March 2015, BIS provided its recommendation to DSCA, on average, within 21 days. However, our analysis showed that an objection to a Humvee transfer on average added approximately 152 days to address industry objections. DSCA officials acknowledged that the approval process can be prolonged when the manufacturer objects to a proposed transfer, potentially contributing to longer waiting periods for requesting countries to receive the Humvees. In addition, the longer that vehicles remain in storage, the more likely it is that they will require more repairs to make them operational, resulting in increased costs to the requesting foreign governments to refurbish them, according to a DSCA official. Manufacturer representatives also told us they want to be involved earlier in the process to provide input on the potential effects of proposed transfers. We found that, on average, DSCA notifies BIS about 4 months after a country submits its Humvee request and BIS reaches out to the manufacturer a day or two later. A DSCA official explained that it can be a challenge to involve the manufacturer earlier because the request is not fully stable and could be revised for a number of reasons, including countries canceling the request or changing requirements to obtain different capabilities, and DOD internal policy considerations need to be vetted before reaching out to the manufacturer. In recent years, DSCA and BIS have taken steps to address AM General’s increasing objections to proposed transfers. In 2018, BIS modified its approach to assess adverse effects of Humvee transfers to consider an additional factor. Now, BIS considers the cumulative effect and totality of previous EDA Humvee requests, in addition to assessing each request on a case-by-case basis. According to BIS officials, this was in response to the pattern of consistent objections that they were receiving from the Humvee manufacturer. AM General acknowledged that communication with DSCA and BIS about Humvee EDA transfers has improved. For example, DSCA notified AM General about its decision to sustain the company’s objection and, thus, not move forward on a transfer request made in July 2019 for 2,000 vehicles. AM General told us that in the past, DSCA did not notify AM General about whether it had sustained or overruled the company’s objection to a proposed transfer. AM General’s objections to EDA Humvee transfers have at times led to additional business channels for the Humvee manufacturer. For example, we found that the manufacturer received business opportunities from EDA Humvee transfers to Afghanistan, Iraq, Jordan, and Thailand that included, providing long-term sustainment and refurbishment of Humvees, among other things. In response, the contractor withdrew over a third of its objections between fiscal years 2012 and 2018 based on receiving this type of work or reaching agreements with foreign governments to provide fully operational Humvees. The remaining transfers were cancelled; put on hold pending resolution with the Humvee manufacturer; or in one case, moved forward with an objection in place. The agreements to provide additional support can be financially beneficial to the manufacturer and help sustain its production capabilities. For example, we found that in 2012, the Humvee manufacturer objected to a country’s transfer request of 250 vehicles, but withdrew their objection after reaching an agreement with the foreign government to perform much of the refurbishment work for those vehicles. In another case, we found that for the 2016 proposed transfer of 2,461 vehicles to support the Afghanistan National Security Force, the Humvee manufacturer objected, citing concerns about the large number of vehicles requested, among other concerns (see sidebar). The proposed transfer of EDA Humvees to Afghanistan was requested by DOD after a 2016 Senate report expressed concerns about a lack of insight into the cost-benefit analysis of procuring new equipment instead of refurbishing excess equipment. In response to the proposed transfer, the manufacturer sent a letter to BIS outlining their anticipated role in the Afghanistan transfer, including obtaining Army contracts to add armor kits to EDA vehicles, providing new powered chassis, and if required, new Humvees. The letter also noted the Humvee manufacturer’s withdrawal of its objection to the transfer. DSCA subsequently notified the manufacturer that it did not agree with the terms AM General outlined in the letter to BIS and specified that the proposed transfer would create business opportunities for U.S. industry, including AM General, to refurbish EDA Humvees. DSCA also added that it would continue to ensure that industry is notified of all proposed Humvee EDA transfer requests so that industry can provide input or express concerns. According to DOD officials, the number of Humvees available for transfer to Afghanistan was reduced as DOD decided to split the number of available EDA Humvees in inventory at the time to meet requirements in Afghanistan and Iraq. In total, 1,644 vehicles were identified for transfer to Afghanistan. As part of this effort, according to information we received from the Army, AM General, and the Office of the Undersecretary of Defense for Policy, the Humvee manufacturer was awarded a contract to provide armor kits for the 1,644 EDA Humvees being refurbished by the Army’s Red River Depot. The manufacturer also provided other vehicle parts as part of the EDA transfer request for Afghanistan. According to DOD officials, it currently does not have plans to transfer additional vehicles to Afghanistan to fulfill the remaining EDA vehicles requested as part of the 2016 transfer request and will reevaluate future Afghanistan requirements, as needed. We provided a draft of this report to the Departments of Commerce and Defense for review and comment. Both agencies provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretaries of the Departments of Commerce and Defense. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. This report provides information about (1) DOD’s approval of grant transfers of excess High Mobility Multipurpose Wheeled Vehicles (HMMWV)—commonly pronounced Humvees— requested by foreign governments from fiscal years 2012 through 2018 and (2) how the Humvee manufacturer’s perspectives on the proposed transfers have been addressed by DOD as part of the determination of any adverse industrial base effects. To provide information about DOD’s approval of transfers of excess Humvees, we analyzed data for fiscal years 2012 through 2018 (the most recent available fiscal year at the time of our review) from the U.S. Army Security Assistance Command, Defense Security Cooperation Agency (DSCA), and the Defense Logistics Agency (DLA). These data provided insight about the countries and geographic regions that have requested excess defense article (EDA) Humvees as well as the condition and types of vehicles delivered to foreign governments. We also reviewed documentation provided by requesting countries to identify the intended purpose of the request. We interviewed agency officials responsible for the data to identify the quality controls in place to help ensure the data are accurate and reliable. To assess the reliability of each data source, we compared the data in each DOD component’s data sets to ensure that the information was complete and consistent. We did this by identifying common identifiers used for the Humvee EDA transfers that occurred within the designated 7-year period. According to DSCA officials, the DSCA EDA database is a consolidation of data provided annually by the military departments, and DLA, and is manually entered into the database by DSCA officials. Furthermore, we reviewed the data for issues such as missing data elements and duplicates, among other steps. Based on these steps taken, we determined the data were sufficiently reliable for the purposes of reporting information about EDA Humvee transfer requests. See table 1 of DOD data sources used to track information on excess defense articles. To provide information about how the Humvee manufacturer’s perspectives on the proposed transfers have been addressed by DOD as part of the determination of any adverse industrial base effects, we reviewed documents, data, and interviewed officials from DSCA and the Bureau of Industry and Security (BIS) within the Commerce Department, that advises DSCA on industry effects of proposed EDA transfers. For purposes of this report, unless otherwise indicated, transfers refers to grants of EDA under the Foreign Assistance Act. We reviewed BIS policies and procedures related to the EDA program to identify the factors BIS considers in making adverse effect determinations. We also reviewed data generated by BIS to identify the extent to which the Humvee manufacturer objected to proposed transfers for the 7-year period included in our review. We also reviewed data provided by the Army on the number of Humvees procured for the Army’s use and for vehicles sold to foreign governments through the Foreign Military Sales program from fiscal years 2012 through 2018. To gain insight about DSCA and BIS’s approach to assess industrial base effects of proposed transfers, we selected two transfer requests as illustrative case studies: a 2016 transfer for Afghanistan which was the single largest proposed transfer and a 2016 transfer for Albania as it was the only proposed transfer that BIS did not sustain the manufacturer’s objection. We also spoke with representatives from AM General to obtain their perspectives on the EDA program and gain insight about the effect of EDA transfers on their business. We conducted this performance audit from February 2019 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Marie A. Mak, (202)-512-4841 or makm@gao.gov In addition to the contact name above, Candice Wright (Assistant Director) and Sameena Ismailjee (Analyst-in-Charge) managed this review. James McCully, Lorraine Ettaro, Phillip Farah, Stephanie Gustafson, Miranda Riemer, and Roxanna Sun made significant contributions to this report.", "summary": "DOD can declare defense equipment as excess to U.S. military needs and make it available for transfer as a grant or sale to foreign governments. The Foreign Assistance Act of 1961 authorizes these transfers as grants provided that they do not adversely affect the U.S. national technology and industrial base, among other things. In this regard, transfers pursuant to the Act must not limit U.S. companies' ability to sell new or used defense equipment to countries requesting the transfer. The 2018 NDAA generally requires that Humvee transfers be modernized with a new powertrain and armor prior to being transferred. The Act also generally requires GAO to report on proposed and completed Humvee transfers and the process to determine if transfers will adversely affect the industrial base. This report provides information on (1) excess Humvees requested and approved during fiscal years 2012 through 2018 and (2) how the Humvee manufacturer's perspectives on the proposed transfers have been addressed by DOD as part of the determination of any adverse industrial base effects. GAO analyzed the latest DOD data on EDA Humvee transfers from fiscal years 2012 through 2018; reviewed DOD policies, guidance, and documents to gain insight into the process for determining industrial base effects of proposed transfers; and interviewed agency officials and Humvee manufacturer representatives. Excess High Mobility Multipurpose Wheeled Vehicles (HMMWV)—commonly pronounced Humvees—are among thousands of items that the Department of Defense (DOD) can transfer to foreign governments at their request through the Excess Defense Articles (EDA) program. Twenty-three countries, primarily from the Middle East and Africa, requested 16,005 Humvees for the 7-year period GAO reviewed. DOD approves such requests if it determines: excess U.S. inventory is available at the time of the request, the request aligns with U.S. foreign policy objectives, such as using the vehicles to help combat terrorism, and the U.S. industrial base will not be adversely affected by the transfer. For example, DOD approved a country's request for excess Humvees for border security, counter-smuggling, and counter-terrorism efforts. DOD approved nearly half of the total Humvees requested for fiscal years 2012 through 2018 (see figure). However, DOD has halted further approvals since the start of fiscal year 2017 due to concerns expressed by the Humvee manufacturer and language in the FY 2018 National Defense Authorization Act (2018 NDAA) and conference report that generally says Humvees must be modernized at no cost to DOD. GAO found that DOD considered the Humvee manufacturer's perspectives on proposed transfers and generally took steps to mitigate concerns about transfers that could siphon potential business from the manufacturer or compete with its sales efforts. Further, GAO found that generally, when the manufacturer objected to a transfer, the manufacturer withdrew its objection after receiving business opportunities to repair or upgrade vehicles for DOD or a requesting government's fleet. DOD officials also noted that most of the countries requesting Humvees through the EDA program find it cost-prohibitive to purchase new Humvees directly from the manufacturer. As a result, these countries rely on EDA Humvees to sustain their military fleets.", "document_type": "gao"}
{"report": "We previously reported that DOL is one of more than a dozen federal agencies—known as National Drug Control Program agencies—that have responsibilities for drug prevention, treatment, and law enforcement activities. The Office of National Drug Control Policy (ONDCP) was established in 1988 to, among other things, enhance national drug control planning and coordination. As federal agencies engage in drug control efforts, ONDCP is responsible for, among other things, overseeing and coordinating the implementation of national drug control policy across the federal government. These responsibilities include promulgating a National Drug Control Strategy. In 2017 and 2018, ONDCP lacked a statutorily-required National Drug Control Strategy, and we recently reported that the 2019 National Drug Control Strategy did not fully comply with the law. In December 2019, we recommended that ONDCP develop and document key planning elements to help ONDCP structure its ongoing efforts and to better position the agency to meet these requirements for future iterations of the National Drug Control Strategy. We also found that the 2019 strategy did not contain several pieces of required information, such as quantifiable and measurable objectives, and specific targets for long-term goals, or a description of a performance measurement system. ONDCP subsequently issued the 2020 National Drug Control Strategy on February 3, 2020. We reviewed this Strategy and found that it made progress in addressing several statutory requirements but fell short in meeting others. Furthermore, in our March 2019 High-Risk report, we named drug misuse as an emerging issue requiring close attention. Based on our findings from a body of work related to drug misuse—including 25 new GAO products issued since our 2019 High-Risk report—we have determined that this issue should be on our High-Risk List. DOL’s Phase 1 and Phase 2 grants, targeted to support efforts for addressing the opioid crisis, are authorized by WIOA, which was enacted in 2014 and emphasizes the alignment and integration of workforce programs. ETA is responsible for some WIOA programs, which provide education and other services to help job seekers obtain employment and advance in the labor market, including job search assistance, career counseling, and a variety of occupational skills such as classroom and on-the-job training. In addition, WIOA emphasizes that employers are also customers of the workforce system, and includes provisions that involve them in helping the system provide the skilled workers they need. WIOA requires states to submit plans to DOL every 4 years, and updates to these plans every 2 years, that outline the state’s workforce strategies for core WIOA programs. The next state plans are due in 2020. WIOA gives state and local officials the flexibility to develop and fund services that meet the specific needs of their local communities and meet WIOA goals of increasing employment, retention, and earnings to promote economic self-sufficiency. To that end, WIOA core program performance measures and targets include those related to job attainment and retention; median earnings; and skill and credential attainment. DOL officials told us that states generally use the same WIOA performance measures for the Phase 1 and 2 grants as well. The WIOA-funded workforce development system provides services through a national network of approximately 2,400 American Job Centers (AJCs). State and local entities deliver WIOA-funded employment and training activities and coordinate with partner programs via the AJCs. ETA’s Phase 1 and 2 grants are intended, in part, to serve dislocated workers—adults whose jobs have been terminated, who have been laid- off, or who were self-employed. These grant funds are awarded to states, tribal governments, or outlying areas that, in turn, may work with local workforce boards to administer the grants. Grant recipients generally have 2 years to expend their funds. See table 2 for more information about these grants. Both grants require that recipients partner with community organizations, such as those in health care and justice systems, and with at least one local workforce development board or AJC. While grants cannot be used to pay the costs of in-patient drug treatment and in-patient rehabilitation programs, grantees may use some funding to provide supportive services to participants, such as assistance with child care. States may be using other federal funds to address the workforce impacts of the opioid crisis, including other WIOA-related funding. For example: Ohio received $8 million in September 2018 from DOL’s Trade and Economic Transition National Dislocated Worker Grant, which provides training and career services to dislocated workers affected by layoffs at one or more companies and are seeking reentry into the workforce. The state targeted 16 counties in the state that officials said had been hardest hit by the opioid crisis. State officials said they plan to use this grant to provide services to anyone who meets the criteria of a dislocated worker, and they felt the opioid crisis had a strong enough economic effect for the state to use the grant for those whose employment has been affected by the crisis. DOL’s Women’s Bureau granted Maryland $650,000 in September 2018 to fund two projects providing job-seeking supports to women affected by opioid use disorder. Pennsylvania plans to use HHS funding to expand treatment capacity for underserved populations through targeted workforce development, according to its grant application. Additionally, ETA has recently provided more funding opportunities to support state and local workforce efforts to address the opioid epidemic. In September 2019, ETA, in partnership with the Appalachian Regional Commission and the Delta Regional Authority, announced the 23 grantees on the first round of funding under the Workforce Opportunity for Rural Communities Initiative, which included a focus on serving individuals impacted by the opioid epidemic. Five of the ten awards in the Appalachian region committed to addressing opioid and other SUD impacts as part of their projects. Also, in October 2019, ETA announced another funding opportunity for $20 million in grants under the Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities (SUPPORT) Act. The SUPPORT Act directs DOL to conduct a pilot grant program to address the economic and workforce effects associated with SUDs. Beyond those recently funded, workforce efforts to address the opioid crisis may need to continue for many years given the nature of SUD. Research suggests that incentives for avoiding drug misuse, such as obtaining and maintaining employment, can be highly effective in promoting recovery from SUD. However, an estimated 40 to 60 percent of people with SUD experience relapse, according to the National Institute on Drug Abuse. As a result, people with SUD often need ongoing support to reduce this risk. Officials in the four selected states that received Phase 1 and Phase 2 DOL grants told us that the required partnerships with community organizations were essential in their efforts to serve those affected by SUD. These relationships fostered both knowledge sharing and coordination, elements especially important to state officials with limited experience serving this population. For example, in Ohio, state officials said that input from community partners, such as substance use disorder and mental health boards, helped them identify who could best provide supportive services for job seekers in recovery. We found workforce agencies in all four states receiving targeted DOL grants worked to serve job seekers with the following partners: Health care organizations. Workforce officials said they partner with health care organizations to identify people in recovery from SUD who are ready to look for employment. For example, New Hampshire state officials described the state’s “hub-and-spoke” services system, where health care entities such as hospitals refer people affected by SUD to various services. The health care staff coordinate with local workforce agency staff and notify them when an individual in recovery is ready for employment and training services. Other states described similar coordination of services. For example, a local workforce agency in Washington is partnering with a nonprofit health care organization to coordinate workforce development efforts with health and social services. Justice organizations. Workforce agencies partnered with drug courts, detention centers, and other facilities to address the employment readiness and support needs of those in the juvenile and adult justice systems who may have SUD. For example, in Washington, local workforce agency officials told us that they provide training and education services—including reentry workshops and work readiness services—for their area’s juvenile justice facilities, where over 70 percent of the population has a substance use disorder. In New Hampshire, state workforce officials described a partner organization whose officials have relationships with all of the drug courts in the state, and also sit on the board of the drug court in one of the state’s largest counties. They said that drug courts provide people an option to seek recovery services instead of criminal charges, and the local workforce agency provides employment services for people participating in drug courts. Educational institutions. Partnerships with community colleges and universities helped workforce agencies to provide employment training for job seekers interested in participating in recovery services. In two of our selected states, officials reported using funds to support the development of peer recovery specialists. Such peer recovery specialists, according to HHS, can bring the lived experience of recovery to assist others in initiating and maintaining recovery. For example, in Ohio, the state workforce agency partnered with a community college to help people to become peer recovery specialists and licensed chemical dependency counselors. Maryland provided Phase 1 Grant funds to a research-based organization, housed on the campus of state university, which is preparing peer recovery specialists. Furthermore, local workforce agency officials in Ohio also told us that they worked with a university to put together a master’s degree in social work for those with Licensed Social Worker credentials or a bachelor’s degree. Other organizations. Partnerships with community organizations and housing commissions helped states address transportation and housing needs through referrals and coordinated services. For example, local workforce officials in Washington told us they work with partners through subcontracts or memoranda of understanding to help job seekers with childcare and housing so they can attain and retain employment. Also, officials in New Hampshire told us that one state partner works with sober living houses, which are group homes in which people in recovery can live during and after treatment. Several state workforce officials we interviewed noted that a key benefit to the WIOA targeted-assistance grants was forging partnerships which will have lasting impacts on how they conduct services in the workforce system. For example, officials in New Hampshire noted that the state plans to continue to leverage relationships with their partners after the grant expires. Also, officials in Ohio said these partnerships put new processes in place, including referral systems that will facilitate getting people in recovery into the workforce system over the long term. States not receiving targeted grants. Workforce officials in Alabama and Arizona, the states we selected that did not receive targeted DOL grants but are still experiencing high levels of opioid misuse in their communities, stated that they were engaged in some newly formed partnerships to address the workforce aspects of SUD. Alabama workforce officials said they recently began participating in a statewide opioid task force, including serving on the workforce subcommittee with other state departments, such as the state Department of Commerce. Arizona officials said that the state workforce agency partners with the state Department of Corrections and has implemented second chance centers, which offer services such as job training and onsite job fairs, within three prisons. They noted that in one of these prisons, the majority of women are incarcerated for drug-related offenses. Officials in the four selected states that received targeted DOL grants said they used this funding to assist those in recovery from SUD to obtain employment. While many of the services are also offered to other job seekers, officials said grant-funded efforts involved intensive work with SUD-recovering individuals, who may have inconsistent work histories or long periods of unemployment. New Hampshire state workforce officials reported providing individuals in recovery with services, including job training, direct placement in a job, or on-the-job training. As of January 2020, officials said the state had enrolled 177 individuals into its program, including some who are participating in on-the-job training (employment that is partially subsidized by grant funds). Similarly, officials at a local workforce agency in Washington told us that the agency aims to place 125 people affected by SUD into transitional jobs as part of its grant-funded activities. These subsidized jobs allow individuals to add experience to their resumes, as well as gain an employment reference. In Maryland, the state distributed part of its Phase 1 grant funds to local workforce agencies in eight counties directly or indirectly affected by the opioid crisis. These funds provide job seekers with employment, training, and support services that help them prepare for, secure, and retain employment, and advance along career pathways in high-demand industries and occupations—including those related to SUD recovery, such as counseling. Similarly, Ohio workforce officials told us they were reintegrating individuals who are affected by opioid use into the workforce by using some of their Trade and Economic Transition National Dislocated Worker Grant funds to provide career services, guidance, and counseling, along with support services. Several officials noted that, while their agencies may use the same process for those with SUD as those without to get individuals ready for jobs, it is often a longer process when someone is in recovery or otherwise affected by SUD. For example, officials from a local workforce agency in Ohio told us that those in recovery from SUD often need more services and support to work through barriers prior to job placement than other clients without the disorder. Agency workforce staff are to follow up with people in recovery to make sure they are still supported, even after they have found employment or have enrolled in training—sometimes on a weekly basis. Officials said that those in recovery may not have previously had a job or attended post-secondary school before, and must balance their recovery with these new responsibilities. Similarly, state workforce officials in New Hampshire said that many in recovery have not had the opportunity to build skills and confidence. The New Hampshire Work Ready program is a 60-hour program offered through the state’s community colleges that provides help in areas such as how to dress for an interview and the workplace. This program, which is available to all job seekers, also helps people decide what to disclose regarding their personal history and helps them emphasize their strengths. Officials characterized this program as especially helpful for people with criminal backgrounds. In response to the needs of those in recovery, they said the state has created a new “bridge” program to prepare individuals to participate in the Work Ready program, which will be implemented in recovery centers using targeted grant funds. States not receiving targeted grants. Workforce officials in Alabama and Arizona, states that did not receive targeted grants, said that state efforts to address SUD, and more specifically opioid use disorder, were largely focused on the health aspects of the issue. Alabama officials told us that the state workforce agency was not originally part of the Governor’s task force on opioid use disorder. The task force’s recommendations were mostly health care related and addressed issues such as provider practices. However, the task force has recently added a workforce subcommittee with the goal of identifying strategies and resources to provide in-demand career pathways for those affected by SUD, and officials reported that they plan to apply for Phase 2 funding in the future. Arizona state officials said that its workforce development system provided support in communities, but noted that there is not a coordinated strategy statewide. Arizona officials also emphasized that they consider SUD primarily a public health issue, not a workforce issue; they said that while employment is part of a spectrum of services, SUD is an issue that is best addressed on the health side. To assist those affected by SUD in finding employment, local workforce agencies used their targeted grant funding to secure specialists. For example, officials at two local workforce agencies in Ohio told us they had hired or planned to hire new staff to work with the population affected by SUD. One agency plans to hire case managers specializing in mental health, who will team with AJC staff to help ensure clients in recovery get the support they need to be successful. The other agency plans to hire peer recovery specialists and job coaches to help those in recovery develop soft skills. One local workforce agency in Washington also hired peer recovery specialists, and is using them as case managers at an AJC. Another agency in Washington is using Phase 1 grant funds to employ four “navigators” to coordinate services to address the needs of those in recovery. In addition, officials said they are in the process of hiring a job developer to liaise between job seekers, navigators, and employers, and help recruit employers who are willing to hire those in recovery from SUD. Additionally, communities are exploring different workplace programs to support those in recovery. Officials in New Hampshire and Ohio reported using their Phase 1 and Trade and Economic Transition National Dislocated Worker Grant funds, respectively, to pilot recovery-friendly workplace initiatives, which provide training and supports to employers to help them better understand and work with individuals with SUD. Ohio state officials told us that, in three pilot counties, the state will train supervisors and managers and provide second-chance policies and employee assistance programs. According to these officials, recovery- friendly workplaces encourage an environment where employers, employees, and communities can collaborate to create positive change and eliminate barriers for those affected by SUD. In New Hampshire, employers may request that the state designate them as a recovery- friendly workplace. The New Hampshire workplace program will provide an advisor who conducts an orientation with management and staff and helps the employer publicize their participation in this effort so that their employees will know of their commitment, and will know their workplace is a safe place to disclose SUD. Employers in the program also agree to complete certain activities, such as conducting training and making connections with local recovery organizations. New Hampshire officials said they had 220 employers participating in the program as of January 2020. State and local workforce officials said that their efforts to meet the needs of job seekers and employers in communities affected by SUD are relatively new. For example, officials in Ohio said that state efforts are still very much in the preliminary planning stages of their broader implementation goals. They said that, at this point, they are looking at how to educate workforce agencies and staff about how to best address the needs of this population. State and local officials in our four selected states receiving targeted Phase 1 and Phase 2 grants were not yet able to report outcomes. Officials told us that it took time to organize and implement plans, causing delays in beginning activities. Specifically, workforce officials stated that: In Washington, officials said they received the notification for Phase 2 grant funding in March 2019. The state workforce agency finalized the contract with the local workforce agency at the end of May 2019, and began enrolling eligible job seekers in the late summer and early fall of 2019. In New Hampshire, it took the state six months to begin implementing grant activities after receiving funding in July 2018, and officials confirmed in January 2020 that they were still too early in addressing the opioid crisis to have any outcomes. In Maryland, officials originally planned to use funding to train peer recovery specialists to work in the state’s AJCs. However, the state Department of Health secured funding to train peer recovery specialists, and they did not want to duplicate efforts. As a result, they revised their plan to instead create an Opioid Workforce Innovation Fund, which delayed grant activities by six months or more. As of August 2019, Ohio officials said they were just starting to get the local workforce areas on board and acclimated. They reported that they had just completed training for the local workforce agencies on the grant rules and activities, and launched a toolkit to help agencies serve individuals with SUD. Workforce agency officials in all six of our selected states told us they face challenges addressing the needs of job seekers affected by SUD, in part due to their limited experience in serving this population. For example, Health issues. Officials in all six states said they continue to struggle with ensuring job seekers receive necessary services due to lack of medical treatment, mental health services, and recovery services and personnel, especially in rural areas. For example, officials at a local workforce agency in a rural area of Maryland said their area has no addiction specialists, and many people in the area have to travel nearly 2 hours to receive recovery treatment and counseling. Involvement with the justice system. Individuals in recovery may be more likely to have criminal records that complicate obtaining and maintaining employment. Officials in New Hampshire told us that employers might not hire people with a criminal history, and that employers are allowed to ask about criminal history on a job application, even if the individual is in long-term recovery. Appalachian Regional Commission officials said that job seekers with a criminal record also have especially limited employment options in their region because the federal government and its contractors are large employers there, but may not be able to hire someone with a felony conviction, which is an issue for many individuals with SUD. Transportation difficulties. Lack of reliable, affordable transportation presents difficulties for many in recovery. For example, New Hampshire officials told us many people with SUD have lost their license or have no car, and few public transportation options are available in the state outside of urban areas. Local workforce officials in a rural area of Ohio said no reliable public transportation exists near them, and the limited taxi service that exists is very expensive. Housing difficulties. Individuals in recovery may not have access to stable housing, making it difficult to focus on job training or employment. Specifically, officials in Maryland, Ohio, and Washington cited homelessness as an issue among those in recovery. Further, New Hampshire officials said individuals who have a drug conviction may not be eligible for government-subsidized housing. While homelessness can be a result of a substance use-related history, local officials in New Hampshire, Ohio, and Washington told us that there is also a lack of affordable housing in their respective areas. Workforce officials in all six selected states told us that they have had difficulty finding employers who are willing to hire those in recovery. As a result, workforce agencies risk not meeting WIOA performance targets related to (1) job seekers’ obtaining and maintaining employment and (2) effectiveness in serving employers. Workforce officials in all six states cited employer concerns around relapses, safety and reliability, suitability, and stigma. Relapses. Officials from the Appalachian Regional Commission said this was the most challenging aspect of SUD with respect to the workplace. Officials from another organization that works with employees with SUD also told us that employers may be reluctant to hire SUD-affected individuals because state laws or claims related to lack of reasonable accommodations under the Americans with Disabilities Act of 1990 can make it difficult to terminate individuals with a known substance disorder when they relapse. To address this, some employers put in place a zero- tolerance policy, automatically terminating an employee who tests positive for drugs. Safety/reliability. Workforce officials in Maryland said employers are concerned that SUD-affected employees may bring drugs into their workplaces or quit unexpectedly. New Hampshire officials told us that employer liability is an issue as employers are worried about accidents. They also told us employers are concerned about productivity loss due to SUD and, in particular, an employee’s inability to work a regular schedule because they or a family member is dealing with SUD. Ohio officials in one local area told us that employers in white-collar jobs are less willing to hire individuals in recovery because they are concerned about possible theft, and that workforce officials have been working with businesses to secure liability insurance. Suitability. Some employers will not hire a person who is unable to pass a drug test. This may present issues for individuals who take medication as part of their recovery treatments. For example, Alabama officials told us that a major reason that employers in their state did not hire job applicants for vacant positions was because they could not pass initial drug screenings. In addition, under U.S. Department of Transportation regulations on workplace drug and alcohol testing, when an employee performing safety-sensitive functions tests positive for drug use, they must be removed from performing such functions and evaluated for treatment options before returning to work. This includes those in aviation, trucking and locomotive transit. Certain entities regulated by the Nuclear Regulatory Commission are also required to administer drug and alcohol testing. Workforce officials in Washington said that it is also difficult for people with SUD to obtain the available jobs in their state in the health care field and with federal agencies because these jobs required drug testing. Stigma. Employers may also be reluctant to hire those affected by SUD because of its associated stigma. New Hampshire officials said that employers are concerned about people’s perceptions and believe it would hurt business if they declare themselves a recovery-friendly workplace. For example, they told us about an employer who runs a high-end restaurant in the state who expressed concern that customers may not want an individual with SUD preparing their food. Washington officials expressed similar concerns, saying that while some employers embrace being a recovery-friendly employer, others do not publicize this because they are unsure how it will be received by the public. Officials in Alabama also noted the need for honesty and transparency about the stigma of SUD and for employers who are willing to invest in their workers. According to DOL officials, they have begun working with ONDCP and other federal agencies to address the drug crisis. DOL officials noted that, although the National Drug Control Strategy does not include explicit goals and performance targets for DOL or employment and training- related efforts, DOL is using the strategy to guide its efforts in addressing the opioid crisis. DOL officials said they have regular conversations with ONDCP about how ETA can support the ONDCP strategy within its current authority. For example, one DOL official told us she communicates with ONDCP nearly every week. DOL officials also said they attend meetings hosted by ONDCP which occur roughly every 6 weeks and include representatives from all of the agencies involved in the National Drug Control Strategy. According to DOL officials, through these meetings, they have learned about government-wide efforts to support those affected by SUD, and have shared information about DOL’s own efforts to address the opioid crisis. DOL officials told us they communicate with other federal agencies regarding the opioid crisis. For example, DOL officials said that HHS provided a list of available grant funding to address the opioid crisis, and DOL has sent this list to its regional offices to distribute to states. In addition, ETA officials told us that two out of the six regional offices have staff serving on regional opioid task forces, for example, with HHS. DOL has also conducted several webinars with HHS on addressing training and employment needs of individuals and communities affected by SUD. Specifically, DOL officials described: a webinar in October 2018 discussing topics such as the rise in opioid use and a screening and intervention technique; a webinar in May 2019 for program staff working directly with participants in the workforce development programs located in states in the mid-Atlantic region, which are among those with the highest opioid-related deaths; and, a webinar with HHS, ONDCP, and other organizations in August 2019 on peer support recovery, including discussing how DOL grant funds have been used to train SUD-affected individuals to become peer recovery specialists. Internally, DOL officials told us they began a DOL-wide opioid workgroup in April 2019 to improve communication among units and strengthen connections across the agency. According to DOL officials and meeting agendas we reviewed, the workgroup meets about once a month, and discusses what DOL is doing to address the opioid crisis and identify any potential gaps in their efforts. They also invite speakers from external organizations, such as ONDCP, the Centers for Disease Control and Prevention, and the National Institute for Occupational Safety and Health. ETA officials have provided technical assistance to states during the Phase 1 and 2 grant application processes, such as by clarifying allowable grant-funded activities and defining grant eligibility, and during grant implementation. According to officials, ETA assigned Federal Project Officers from one of its six DOL regional offices to work with each state. Officials have also encouraged information sharing among grantees. For example, officials said they hosted quarterly calls among grantee states, where they discussed performance reporting, evaluation, and use of the Federal Bonding Program, and have allowed time for peer- to-peer sharing of grant accomplishments and challenges. To encourage peer-to-peer sharing and engagement, ETA also provided grantees with a list of grantee contacts in all states that received Phase 1 or 2 grants. However, this technical assistance has been limited to those receiving the targeted grants, and is not offered to all states, tribes, and outlying areas that may be interested in conducting related work. DOL officials are working to improve available information on addressing the employment and training needs of those affected by SUD. According to DOL officials, interested entities can access a DOL website called WorkforceGPS with resources and materials on substance abuse, including its effect on the workforce system, and case management resources. DOL also contracted with a research organization to review literature that examines what is known about workforce programs for individuals with SUD. The research is meant to identify key themes and findings related to successfully implementing the Phase 1 grants, such as the role of mental health services in the lives of grant participants and different employment-related interventions. DOL officials said that, as a complementary piece to the literature review, the contractor was tasked with developing a resource guide that identifies promising practices across the public and private sectors, with a goal of providing up to date information on tools, programs, websites from across the country to serve as a resource for grantees who are planning and implementing their own initiatives. Officials said that the contractor shared preliminary results from its research activities with targeted grantees in October 2019. Based on these results, DOL officials reported that there was a lack of evidence about the relationship between opioid use disorder and employment. Therefore, they said, the literature review covers a broader range of information related to SUD in an effort to provide useful information. DOL released the full results of the literature review and resource guide on its website in March 2020. Regarding oversight of grant activities, DOL plans to review grantee performance through required state quarterly reports, which have only recently begun to be submitted. DOL requires that these reports include financial data and program performance information (such as characteristics of, and services received by, participants, as well as participant outcomes). These quarterly reports also contain a narrative section where grantees can share information on project success stories, upcoming grant activities, and promising approaches. The final quarterly report for the grant must summarize the successes and/or challenges in delivering services, as well as address the topics of sustainability, replicability, and lessons learned. DOL officials said they do not have plans to share information from the summaries in the quarterly reports with other states. In addition, DOL officials told us that states generally are to use the same performance measures for these grants as they do for WIOA core programs. However, officials said they realize the SUD population could have different challenges than the rest of the WIOA population and, as a result, they are looking into developing new performance measures to address these differences. Regarding evaluation of grant activities, DOL has contracted with a research organization to conduct a 3-year evaluation of Phase 1 activities. The evaluation is expected to end in September 2021, with a final report to follow. DOL officials confirmed that there will be no interim reports. Although some state and local workforce officials we interviewed were aware of available technical assistance from DOL, they identified a need for more information to help them address challenges in serving communities affected by SUD, as discussed below. Furthermore, our review of DOL documents and guidance such as the ETA announcements to states of the targeted grants and the WIOA state plan guidance, found that these documents did not fully address the questions and concerns of state and local workforce officials. Federal internal control standards regarding risk assessment state that management should identify, analyze, and respond to risks related to achieving its objectives such as WIOA’s goals of increasing employment and retention. These standards also state that management should communicate with its partners to help achieve its objectives. Better communicating information could enhance DOL’s ability to respond to these risks. Specifically, state and local workforce officials and our review identified three areas in which additional DOL actions could help officials address the needs of job seekers in recovery and potential employers: Clarity about expectations and use of funds. Officials in Arizona, Ohio, and Washington said they would like clarification from DOL about its expectations regarding the role of state and local workforce systems in preparing individuals in SUD recovery for employment, or in determining the appropriate use of WIOA grant funds. Clarity around DOL’s expectations for state workforce agencies could be helpful, as Arizona officials emphasized that they consider SUD a public health issue, not a workforce issue, and have viewed SUD as an issue that is best addressed on the health side. Also, information on expectations and the use of non-targeted WIOA grant funds is especially important as states draft their 2020 WIOA state plans, which will set priorities for state workforce agencies for the next 4 years. For example, officials from one local area in Washington told us that they hoped to continue the grant activities and partnerships past the end of the current targeted grant, but they were unsure whether they could do this with non-targeted, WIOA formula grant funding. Our review of the targeted grant announcements found they did not contain information on whether this was an allowable use of funds. ETA issued guidance regarding the 2020 WIOA state plans in February 2020. However, our review of this guidance found that it does not provide specific information about states’ roles in meeting the needs of job seekers in recovery from SUD or their potential employers, or how non- targeted WIOA funding can be used to address those needs. DOL officials acknowledged that the guidance does not include such information, stating that the purpose of the guidance was to focus on the procedures and instructions for states in submitting their state plans, and not to provide specific suggestions on uses of WIOA funds or what particular strategies states should pursue. Clarity on the role of states and the use of WIOA funding would better position state workforce systems to meet the training and employment needs of those affected by SUD and their potential employers. Better information sharing with all states. Officials from four of the six selected states identified areas in which it would be useful for DOL to enhance its information sharing. Specifically, officials in these states told us that it would be useful for DOL to share information about lessons learned and successful strategies in addressing the needs of job seekers in recovery and potential employers with all states—whether or not they received targeted grants. They said such information would be particularly helpful given that many states are in the early stages of developing their programs. Officials stated that information based on the experiences of their peers would assist states in ensuring those in recovery are job ready and in hiring and retaining these workers. For example, officials from Arizona—a state without a targeted DOL grant—told us their communities could benefit from learning about experiences of states or local areas that are addressing the crisis within the workforce system, especially those using an approach that offers wraparound services such as transportation assistance. Additionally, officials from Ohio—a state with a targeted DOL grant—said they would like to learn from more experienced state officials who have been working for 6 months or a year within the workforce system to address the opioid crisis. Workforce officials stated that even if job seekers in recovery are trained and job ready, workforce agencies face challenges in addressing employers’ concerns about hiring these individuals. Workforce officials in five of the six selected states said that information about incentives for employers to hire individuals affected by SUD, and/or education for employers about this population, would be helpful given that perceived risks have led to difficulties with finding employers who are willing to hire this population. In particular, given limitations of federally supported incentive programs and the stigma associated with SUD, a dual approach—education and incentives—may be needed. However, at this point, most information on strategies to address employer concerns, including leveraging pre-existing federal programs, is not widely disseminated. DOL officials stated that they recognize the challenges state and local workforce agencies face in engaging employers in this area and are exploring use of existing programs to incentivize the hiring of job seekers with SUD. However, they acknowledged that to date, limited information has been shared with the large network of state and local workforce agencies. Thus far, DOL has been piloting and promoting one available incentive, the Federal Bonding Program, which is designed to help reduce employers’ risk by offering reimbursement for loss from illegal acts, such as theft or embezzlement, for individuals with criminal records. DOL officials have recognized that other existing incentive programs—targeted to employers of other populations, such as low-income, and other disadvantaged job seekers—may be helpful. They said that because the populations eligible for these programs share similar characteristics as those in recovery, they are exploring how to connect them to employers who are willing to hire those in recovery. For example, the Work Opportunity Tax Credit encourages employers to hire individuals from certain targeted groups who have consistently high unemployment rates, such as individuals with a felony record, by providing employers with a tax credit as an incentive to hire and retain these workers. However, state officials said, and our review confirmed, that these current federal programs may not fully address employer concerns. Specifically, bonds might not protect against other liabilities which may be of concern to employers, such as accidents caused by an employee under the influence of opioids. Furthermore, despite promoting awareness of these programs, DOL officials recognized that these efforts alone may not increase employer participation, particularly given the need to move beyond the stigma associated with that condition. Officials in two states told us that education is an important response in addressing employers’ concerns about the potential stigma associated with hiring individuals with SUD. For example, New Hampshire has a pilot program on recovery- friendly workplaces to educate employers about reducing stigma associated with SUD, as well as related human resource policies and employee assistance programs. Also, Arizona officials stated that workforce agencies need to understand the employer perspective and engage, educate, and involve employers. To date, DOL has been primarily communicating information about emerging, workforce system-based strategies to serve job seekers and employers affected by SUD with Phase 1 and 2 grantee states. As previously noted, DOL has an existing mechanism—its WorkforceGPS website—that could be used to share information more widely. Access to information on promising practices and lessons learned can help workforce agencies in all states learn about possible ways to address the needs of job seekers affected by SUD and their potential employers. More time to use grant funds. Officials in New Hampshire, Ohio, and Washington said that a longer time window in which to use the DOL grant funding would be helpful. For example, New Hampshire officials said the length of time needed for intake and enrollment for clients with SUD is longer than usual for a typical WIOA job seeker; therefore, more time to use the Phase 1 grant funds could help them with the more intense interventions. In addition, state workforce officials in Ohio told us it is complicated and takes time to develop new partnerships and trust at the local level, and to determine what the state and other partners can provide. Similarly, Washington state officials said the limit on the time allowed to use the Phase 1 and 2 grant funds has limited their ability to enroll job seekers in recovery and implement their partnerships. Specifically, state officials said that the delay in receiving funds means they will not have the full 2 years for grant activities. To meet DOL’s reporting deadlines, they will need to complete their activities earlier than anticipated. ETA officials told us that they are considering extending the Phase 1 and 2 grant periods for some states. In commenting on a draft of this report, they also said that If these limitations prevent a state from continuing its grant beyond a certain period of years, states can apply for a new grant should it still meet the conditions for eligibility, such as if the public health emergency declaration for the opioid crisis remains active. In light of the persistent nature of the drug crisis and the complex set of issues facing individuals on the path to recovery, workforce agencies are likely to continue facing challenges in meeting the needs of this population and their potential employers. As the agency responsible for the nation’s workforce system, DOL can play an important role in serving communities and individuals affected by SUD who are seeking employment. However, state officials we interviewed expressed uncertainty about what is expected of them or the specific allowable uses of their non-targeted WIOA funds to address a crisis that has long been considered primarily a health and law enforcement issue. Our work raises concerns about how the workforce system continues to seek clearer direction on the role of states and the use of non-targeted WIOA grant funding in helping ensure the economic well-being of communities affected by this public health emergency. DOL’s current efforts are still in the early stages, and it will take time for the agency to fully identify and disseminate effective, evidence-based strategies. In the meantime, states are seeking the best information currently available to help their workforce systems support job seekers affected by SUD and their potential employers. DOL’s targeted grants provide an opportunity for grantees and non-grantees alike to learn states’ experiences in addressing the effects of the opioid crisis through the workforce system, but information on the current approaches states receiving targeted grants are using is not being shared beyond the targeted grantee community. Sharing this information with all states could better position workforce agencies to address the needs of job seekers affected by SUD and help employers understand and address the perceived risks of hiring job seekers in recovery. While the workforce system may take time to fully build its capacity to work with these job seekers and employers, opportunities exist to learn and make interim progress towards this end. We are making the following two recommendations to DOL: The Assistant Secretary for Employment and Training should clarify DOL’s expectations of the role of state workforce agencies in addressing the employment and training needs of those affected by SUD and how non-targeted WIOA funding can be used to assist job seekers and employers. (Recommendation 1) The Assistant Secretary for Employment and Training should share information from targeted grantees with all state workforce agencies, tribal governments, and outlying areas regarding lessons learned and promising practices in addressing the needs of job seekers affected by SUD and potential employers. (Recommendation 2) We provided a draft of this report to DOL and HHS for review and comment. In its formal comments, which are reproduced in appendix I, DOL agreed with our recommendations. DOL also provided technical comments, which we incorporated as appropriate. HHS did not have comments. In its response, DOL noted that throughout our report, we refer to SUD, but that its targeted grants are limited to addressing SUD caused by opioids. While our report focuses on SUD more broadly, many of the efforts states and federal agencies are involved in focus on opioid use disorder, as a result of HHS’s emergency declaration. DOL also stated that it was in the process of announcing another round of grants in partnership with the Delta Regional Authority and the Appalachian Regional Commission, part of which will be available to address opioid or other SUD. DOL also noted that grant-funding limitations, including the availability of appropriated funds, make it difficult to address states’ concerns about not having enough time to spend their grant funds, and suggested that states may consider applying for a new grant. We have reflected this point of view in the final report. In response to our first recommendation, DOL officials said they anticipate providing information and technical assistance to help workforce system grantees understand how they can address the impacts of SUD on the workforce. ETA plans to issue guidance by the end of 2020 to share promising practices and describe how WIOA funds can be used to support job seekers in recovery and employers. In response to our second recommendation, DOL officials said ETA has created resources that are available to all states based on its experience administering some of the targeted grants. ETA officials cited the recently published literature review and companion resource guide, and said they also plan to share the evaluation of the Phase 1 grants widely when it is available, including any resources or tools developed by states that were awarded Phase 1 grants. In addition, ETA plans to host at least one webinar to share additional promising practices from the targeted grants that could be useful to local workforce boards around the country. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Labor, the Secretary of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Danielle Giese (Assistant Director), Amy Sweet (Analyst-in-Charge), Linda Lootens Siegel, and Anna Kallschmidt made key contributions to this report. Also contributing to this report were Deborah Bland, Alex Galuten, Natalie Herzog, Tom James, Bill Keller, Sheila R. McCoy, Corinna Nicolaou, Monica Savoy, Almeta Spencer, Tonnye Connor-White, and Greg Whitney.", "summary": "The Department of Health and Human Services declared the opioid crisis a public health emergency in October 2017. DOL has awarded grants to help address this crisis. GAO was asked to examine how WIOA-funded programs are addressing the employment and training needs of those affected by SUD. This report examines (1) how workforce agencies in selected states are using WIOA funding to address employment and training needs, (2) challenges agencies face in addressing employment and training needs, and (3) how DOL is supporting communities affected by SUD. GAO interviewed officials in four of the 10 states that received DOL grants in the early award rounds (as of March 2019)—Maryland, New Hampshire, Ohio, and Washington—and two that did not—Alabama and Arizona; reviewed related documentation and relevant federal laws and regulations; and interviewed DOL officials and researchers, selected for their knowledge about these issues. Workforce officials GAO interviewed in four of the 10 states receiving targeted Department of Labor (DOL) grants as of March 2019 said they were using Workforce Innovation and Opportunity Act (WIOA) funding to help meet the unique needs of those affected by substance use disorder (SUD). These officials, who said they had limited experience serving those affected by SUD, worked with required organizational partners and hired specialists to assist job seekers and to provide intensive job readiness services. However, these efforts are relatively new and outcomes are not yet known. Workforce officials GAO interviewed in two selected states without targeted grants said they had viewed SUD primarily as a public health issue, but had recently taken some steps to address it. For example, one state added a workforce subcommittee to an existing opioid task force. State and local workforce officials in all six states identified a range of challenges they face in addressing the needs of SUD-affected job seekers. For example, criminal history or a lack of transportation may make it difficult for these job seekers to obtain and maintain employment. Officials said another challenge is finding employers who are willing to hire those in recovery. They stated that employers are concerned about the risks to their businesses, such as potential employee relapse and possible negative reaction from customers. Officials were seeking more information and assistance to help address such concerns. DOL officials said they support SUD-affected communities mainly by providing information to states that apply for and receive targeted grants. However, officials in two selected states expressed uncertainty about DOL's expectations of states in serving the needs of SUD-affected job seekers and potential employers. Officials in another state said they were unclear on whether they could use non-targeted funds to continue targeted grant activities. GAO's review of related DOL guidance found that it does not provide specific information on expectations of states or the use of WIOA funds outside of targeted grants to address this issue. Further, while DOL has disseminated some information on serving job seekers with SUD (such as in quarterly calls with grant recipients), it does not plan to share information that grantees submit to the agency, such as lessons learned and successes, with all states. Doing so could help states meet the training and employment needs of those in recovery, and the needs of potential employers. GAO recommends that DOL clarify (1) its expectations of state workforce agencies and (2) how WIOA funding can be used in addressing the needs of those affected by SUD and potential employers, and share information with all states on lessons learned and promising practices. DOL agreed with our recommendations.", "document_type": "gao"}
{"report": "Victims of sexual assault may receive a sexual assault forensic examination by a medical provider who may or may not be a trained sexual assault forensic examiner. Medical providers assess victims’ clinical conditions; provide appropriate treatment and medical referrals; and, given consent by the victim, collect forensic evidence through a sexual assault forensic examination that may follow steps and use supplies from a sexual assault evidence collection kit. Under its protocol for sexual assault forensic examinations, the Department of Justice (DOJ) recommends that medical providers collect a range of physical evidence. In addition, sexual assault forensic exams typically include documenting biological and physical findings such as cuts or bruises and a victim’s medical forensic history, such as the time and nature of the assault. Once the exam is complete, medical providers preserve the collected evidence, which may include packaging, labeling, and sealing evidence collection kits and storing kits in a secure location. Medical providers typically perform such exams only for acute cases of sexual assault, such as in cases where the assault occurred within the previous 72 to 96 hours, when the physical and biological evidence on a person’s body or clothes is considered most viable. DOJ, IAFN, and the American College of Emergency Physicians (ACEP) recommend that sexual assault forensic exams be performed by specially trained medical providers—known as sexual assault forensic examiners (examiners). These examiners include physicians, physician assistants, nurse practitioners, and other registered nurses who have been specially educated and have completed clinical requirements to perform sexual assault forensic exams. Sexual assault nurse examiners (SANE) —a particular type of sexual assault forensic examiner—are registered nurses, including nurse midwives and other advanced practice nurses, who have received specialized education and have fulfilled clinical requirements to perform sexual assault forensic exams. Examiner programs have been created in hospital or non-hospital settings whereby specially trained examiners are available to provide first-response care and exams to sexual assault victims. DOJ, IAFN, and some states have issued guidelines pertaining to the minimum level of training examiners should receive in order to properly collect and preserve evidence, identify victims’ medical and emotional health care needs, and provide counseling and referrals for victims. These guidelines include recommendations of objectives and topics that training programs should cover. DOJ administers several grant programs that aim to, among other things, improve response to and recovery from four broad categories of victimization—domestic violence, sexual assault, dating violence, and stalking. In our March 2016 report we describe three key grant programs administered by DOJ’s Office on Violence Against Women that could be used by grant recipients—including states or other eligible entities—to fund or train sexual assault forensic examiners. In our March 2016 report examining the availability of sexual assault forensic examiners, we found that only limited nationwide data exist on the availability of sexual assault forensic examiners—that is, both the number of practicing examiners and health care facilities that have examiner programs. While IAFN reported that, as of September 2015, there were 1,182 nurses with an active IAFN SANE certification in the United States, such data do not represent all practicing examiners nationwide. For example, the data do not account for examiners who completed training through an IAFN or a state training program but never became certified or were certified through another entity, such as a state board of nursing. IAFN also collects data on examiner programs nationwide—that is, data on hospitals, clinics, and other sites where examiners practice. Such data provide an indication of the availability of examiners, but the data are also limited. While 703 examiner programs nationwide voluntarily reported to IAFN’s examiner program database, as of September 2015, IAFN officials noted that the database is often not up to date; and some health care settings where sexual assault forensic exams are conducted, such as child advocacy centers, are not represented. In addition, data collected on staffing characteristics of examiner programs are often unavailable in the IAFN examiner program database. For example, only about one-third of the examiner programs reported on the number of examiners practicing in their program, and about one-third reported on whether examiners were available on-site versus on-call. In three of the six selected states we reviewed in our March 2016 report, grant administrators or officials from sexual assault coalitions were able to provide estimates of the number of practicing examiners, and, in all six states, they were able to provide information on the estimated number of examiner program locations in their state. Of states that reported, the number of practicing examiners and examiner programs varied by state. (See table 1.) However, such data may also present an incomplete picture of the availability of examiners. For example, only one of the six selected states has a system in place to formally track the number and location of examiners. Instead, officials generally reported on the estimated number of examiners or examiner locations that were part of a statewide examiner program or were identified through an ad hoc data collection effort. Although data are limited, grant administrators and sexual assault coalition officials in all six selected states nevertheless told us that the number of examiners available does not meet the need for exams within their states. For example, coalition officials in Wisconsin told us that nearly half of all counties in the state do not have any examiner programs available, and coalition officials in Nebraska told us that most counties in the state do not have examiner programs available. In addition, in four of the six selected states—Colorado, Florida, Nebraska, and Wisconsin— state grant administrators and coalition officials told us that few or some health care facilities in their state have examiners available. As a consequence, officials said victims may need to travel long distances to be examined by a trained examiner or be examined by a medical professional without specialized training. While in the other two selected states—Massachusetts and Oregon—state grant administrators and coalition officials stated that some or most facilities have examiners available, they noted that there is still a need for additional capacity to reduce the burden on those examiners who are available, or to make examiners available in a number of areas where examiners are currently unavailable. In health care facilities where examiners are available, they are typically available through hospitals on an on-call basis, according to literature we reviewed as well as all grant administrators and coalition officials we interviewed for our report. In addition, among facilities that have examiners available, the number of examiners available varies and may not provide enough capacity for facilities to offer examiner coverage 24 hours, 7 days a week, according to state grant administrators and coalition officials we interviewed. Nebraska coalition officials, for example, told us that while one hospital in Omaha has a team of 26 examiners available, other facilities in the state may have as few as three examiners available. Further, officials from Florida and Colorado told us that there are few facilities in their states able to offer full coverage with examiners available 24 hours, 7 days a week. In our March 2016 report, we found that maintaining a supply of trained examiners that meets communities’ needs for exams is challenging for multiple reasons, and that state officials have employed a variety of strategies to address these challenges, as described below. Limited availability of training. Officials in five of the six selected states told us that the limited availability of classroom, clinical, or continuing education training is a barrier to maintaining a supply of trained examiners. Regarding classroom training, some officials told us that training may only be offered once per year in their states. Additionally, officials from both Florida and IAFN told us that there is a need for qualified instructors to run training sessions. Experts and officials from Colorado, Nebraska, and Oregon also told us that medical professionals in rural areas may have difficulty completing the clinical training necessary to become an examiner. Obtaining clinical experience, such as performing exams under the supervision of a trained examiner, is a particular challenge in rural areas where hospitals may treat only a few sexual assault cases per year. One official in Nebraska told us that trained examiners in rural areas might not feel competent to perform exams due to the low number of cases they treat. A lack of continuing education opportunities may also pose a challenge for examiners in maintaining the skills necessary to perform exams. For example, the National Sexual Violence Resource Center (NSVRC) reported that— based on common challenges identified through a survey of, and group discussions among, examiner program coordinators—maintaining competency may be difficult for nurses in rural areas due to a low volume of patients presenting in need of exams and limited access to ongoing and advanced training. Officials told us they have been able to increase the availability of examiner training through alternative training methods such as web- based training courses and simulated clinical training. For example, officials in Colorado told us their state’s web-based examiner training program has made training less expensive and has increased examiner recruitment. Officials in Wisconsin told us they developed a clinical training lab that allows examiners to gain hands-on experience by performing elements of exams on experienced teaching assistants hired for the purpose of training new examiners. Further, in 2014, a DOJ- funded evaluation of examiner training programs found that a web-based training course may help increase the availability of trained examiners; the study also found that implementing web-based training had benefits such as decreasing the costs associated with attending in-person training, expanding training opportunities to remote areas, and allowing examiners to be trained by national experts. Lack of technical assistance and other supportive resources. Officials in four of the six selected states told us that the limited availability of technical assistance and other supportive resources for examiners poses a challenge to maintaining a supply of trained examiners. For example, officials in Florida, Nebraska, Oregon, and Wisconsin explained that, in general, there is a lack of mentorship opportunities and leadership within the examiner community. Officials also noted that the sustainability of examiner programs may be threatened by a lack of internal capacity, such as not having a full-time, paid examiner program coordinator available. Further, in its survey of and group discussions with examiner program coordinators, NSVRC found that examiners and examiner programs needed technical assistance and support in the following areas: aspects of performing exams, training, leadership development and policy issues, and examiner program sustainability. Officials we spoke to told us about strategies that can be used to increase support for examiners and examiner programs, such as offering web- based technical assistance. For example, officials in Massachusetts told us that, through their National Sexual Assault TeleNursing Center, trained SANEs provide remote clinical guidance to two hospitals in the state that do not have trained examiners available. In addition, officials from Colorado told us an examiner program coordinator in an urban hospital in the state provides volunteer on-call technical assistance and clinical guidance to examiners in rural parts of the state, where those resources are not otherwise available. Further, one study we reviewed found several states were engaged in promising practices to increase support for examiners, such as implementing state-wide mentorship programs, developing regional examiner list-serves and online discussion boards, creating formal leadership positions within the examiner community, and requiring examiner program evaluations. Weak stakeholder support for examiners. Officials in five of the six selected states told us that limited stakeholder support for examiners and examiner programs, such as from hospitals and law enforcement, is a challenge to maintaining a supply of trained examiners. Some officials told us that hospitals may be reluctant to support examiners and examiner programs due to a low number of sexual assault cases treated each year. One official told us that hospitals may be reluctant to send nurses to examiner training, as it takes away from their regular shift availability. Additionally, some hospitals do not pay examiners to be on call. Officials in three states told us that hospitals typically either do not pay examiners to be on call or pay on-call examiners significantly less than other on-call medical professionals. Apart from hospital support, officials in Colorado and Oregon explained there is a need for more multidisciplinary support for examiners, such as increased law enforcement, prosecutor, and first-responder understanding of examiners’ role. The literature we reviewed also shows that ambiguity around the role of the examiner in responding to sexual assault may be a source of conflict between examiners and other professionals. For example, examiners were found to have experienced instances where victim advocates or law enforcement questioned examiners’ medical decisions, speed of evidence collection, or asked examiners to comment on the credibility of a victim’s case. One nationally representative survey of examiner programs found that examiner program coordinators felt ongoing education of community stakeholders on sexual assault and examiner programs was needed due to the high turnover in staff at relevant community institutions and agencies, such as law enforcement officers, victim advocates, and prosecutors. Through our interviews with officials, we learned of strategies selected states have used to increase or mitigate limited stakeholder support for examiners and examiner programs. For example, officials in Colorado, Florida, Nebraska, Oregon, and Wisconsin told us that sexual assault response teams have been developed in their states to help community stakeholders to understand examiners’ role and better coordinate to meet the medical and legal needs of sexual assault victims. Low examiner retention rates. Officials in four of the six selected states told us that low examiner retention rates can be an impediment to maintaining a supply of trained examiners. In addition to the challenges of limited training opportunities, technical assistance and other supportive resources, and stakeholder support for examiners, the physically and emotionally demanding nature of examiner work contributes to low examiner retention rates. Further, studies have indicated that dissatisfaction with compensation, long work hours, and lack of support, among other things, may contribute to examiner burnout. Examiners typically work on call in addition to their full time jobs as, for example, emergency department nurses. Officials in Florida told us that examiners may be on call for 6-hour, 12-hour, or even 24-hour shifts. Further, one survey of examiner programs in Maryland found that examiners were required to be on call for an average of 159 hours per month. Wisconsin officials estimated that, although 540 SANEs were trained over a 2-year period, only 42 (less than 8 percent) were still practicing in the state at the end of those 2 years. Chairman Harper, Ranking Member DeGette, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information about this statement, please contact A. Nicole Clowers at (202) 512-7114 or clowersa@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. In addition to the contact named above, key contributors to this statement were Kristi Peterson (Assistant Director), Patricia Roy, Katherine Mack, Laurie Pachter, and Emily Wilson. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In 2016, about 323,000 individuals age 12 or older were reported victims of sexual assault, according to the Bureau of Justice Statistics. Studies have shown that exams performed by sexual assault forensic examiners—medical providers trained in collecting and preserving forensic evidence—may result in better physical and mental health care for victims, better evidence collection, and higher prosecution rates. Yet, concerns have been raised about the availability of such examiners. The Department of Justice administers grant programs that can be used by states and other eligible entities to train and fund examiners. This statement summarizes GAO's findings from its March 2016 report ( GAO-16-334 ) describing (1) what was known in 2016 about the availability of sexual assault forensic examiners nationally and in selected states and (2) the challenges selected states faced in maintaining a supply of sexual assault forensic examiners. For that report, GAO reviewed literature on the availability of examiners and challenges training and retaining them. GAO also interviewed knowledgeable officials, including recipients of federal sexual assault examiner related grants and officials from sexual assault coalitions in six states (Colorado, Florida, Massachusetts, Nebraska, Oregon, and Wisconsin) selected to achieve variation in factors such as population and geographic location. GAO's March 2016 report examining the availability of sexual assault forensic examiners found that only limited nationwide data existed on the availability of sexual assault forensic examiners—both the number of practicing examiners and health care facilities that had examiner programs. At the state level, GAO found that, in three of the six states it selected to review, grant administrators or officials from sexual assault coalitions were able to provide estimates of the number of practicing examiners and, in all six states, they were able to provide information on the estimated number of examiner program locations in their state. However, officials in all six selected states told GAO that the number of examiners available in their state did not meet the need for exams, especially in rural areas. For example, officials in Wisconsin explained that nearly half of all counties in the state did not have any sexual assault examiner programs available and officials in Nebraska told GAO that most counties in the state did not have examiner programs available. As a consequence, officials said victims may need to travel long distances to be examined by a trained examiner. In health care facilities where examiners were available, they were typically available in hospitals on an on-call basis, though the number available varied by facility and may not provide enough capacity to offer examiner coverage 24 hours, 7 days a week. GAO's March 2016 report also found there were multiple challenges to maintaining a supply of examiners, according to its review of the literature and interviews with officials in the six selected states. These challenges include: Limited availability of training . Officials in five of the six selected states reported that the limited availability of classroom, clinical, and continuing education training opportunities is a challenge to maintaining a supply of trained examiners. For example, officials told us that there is a need for qualified instructors to run training sessions. Weak stakeholder support for examiners. Officials in five of the six selected states reported that obtaining support from stakeholders, such as hospitals, was a challenge. For example, hospitals may be reluctant to cover the costs of training examiners or pay for examiners to be on call. Low examiner retention rates. The above-mentioned and other challenges, including the emotional and physical demands on examiners, contribute to low examiner retention rates. Officials in one of the selected states estimated that while the state trained 540 examiners over a two-year period, only 42 of those examiners were still practicing in the state at the end of those 2 years. Officials described a variety of strategies they have employed that can help address these challenges, such as implementing web-based training courses, clinical practice labs, mentorship programs, and multidisciplinary teams that respond to cases of sexual assault.", "document_type": "gao"}
{"report": "Airlines commonly overbook their flights to avoid revenue losses associated with passenger no-shows as part of their revenue management strategies. Successfully overbooking requires that airlines accurately predict the number of passengers who will not show up for a given flight. In deciding how much to overbook flights, airlines use historical data to identify factors that make passengers more or less likely to show up for their flights; these factors can be passenger or flight specific. For example, according to representatives from an airline industry association, leisure passengers are less likely than business passengers to change their flights at the last minute, because their tickets typically have more restrictions and higher change fees. As a result, according to these representatives, airlines generally oversell fewer seats on flights heavily traveled by leisure passengers, such as flights during the holiday season or flights to common vacation destinations (e.g., Disney World). Similarly, these same representatives said that airlines are less likely to overbook the last flight of the day on a given route because passengers are more likely to show up for these flights. A number of other factors, in addition to overbookings, can lead to airlines denying boarding to passengers. These factors can be driven by safety concerns, operational necessity, or personnel needs. For example, a passenger may be denied boarding for safety or security reasons if they are too intoxicated to fly or if they are unruly (e.g., they get into a fight). Passengers may also be denied boarding to accommodate flight crews that need to get to a different location or U.S. air marshals, who tend to book flights near planned departure times. DOT does not regulate airlines’ overbooking practices, aside from requiring airlines to inform passengers that a flight may be overbooked. Instead, DOT’s regulations primarily focus on oversales, which can be the result of an overbooking and occur when some passengers with confirmed space on a flight cannot be accommodated (i.e., “denied boardings”). Passengers are voluntarily denied boarding if they willingly accept the airline’s offer of compensation, in any amount, in exchange for relinquishing their confirmed seat. Any other passenger denied boarding is considered to have been denied boarding involuntarily. Because of these regulations, airlines generally have a standard process for denying boarding to passengers, both voluntarily and involuntarily, and communicating denied boarding information to passengers. When a flight is oversold, airlines are required to solicit passengers to voluntarily give up their seats, before denying boarding to passengers involuntarily. To encourage passengers to volunteer to relinquish their seat, airlines may offer incentives, such as money or vouchers for future flights. There is no minimum or maximum amount of money or vouchers that the airline is required to offer, and passengers can negotiate compensation amounts. Federal regulation requires that airlines inform each passenger solicited to volunteer for denied boarding whether they are in danger of being involuntarily denied boarding and, if so, the compensation the airline is obligated to pay. In cases where a flight is oversold and airlines do not get enough volunteers who are willing to relinquish their seat, they will select passengers to give up their seats involuntarily—sometimes referred to as being “bumped.” Airlines are required by regulation to establish boarding priority rules detailing the factors they consider when selecting passengers to be denied boarding involuntarily. These factors may include when the passenger checks in, the fare paid, and the passenger’s frequent flyer status. However, according to DOT’s website, the criteria cannot subject a passenger to any unjust or unreasonable prejudice or disadvantage. For example, an airline cannot use a passenger’s race when making decisions about denied boardings. Further, some airlines make exceptions to their boarding priority rules for passengers with disabilities, including generally not denying them boarding. Airlines are required to compensate certain passengers who are denied boarding involuntarily. Minimum compensation amounts are set in regulation and, as shown in table 1 below, vary based on the price of the ticket, the length of time the passenger is delayed reaching their destination, and whether the flight’s arrival airport is domestic or international. Airlines generally must provide compensation by cash or check when the passenger is denied boarding involuntarily, in addition to a written statement explaining the terms, conditions, and limitations of the compensation, and describing the airlines’ boarding priority rules and criteria. The total number of passengers denied boarding—voluntarily or involuntarily— generally decreased from 2012 to 2018. Moreover, denied boardings represented a small percentage of the total number of passengers who boarded flights. On an annual basis, denied boardings accounted for between about 44 (in 2018) and about 100 (in 2012) passengers per 100,000 actual boardings—a rate of less than 0.1 percent of actual boardings. As illustrated in figure 1, of these passengers denied boarding, most are voluntary. For example, in 2018, for every 100,000 actual boardings, about 43 passengers were voluntarily denied boarding and about one passenger was involuntarily denied boarding. Passenger complaints submitted directly to DOT about denied boardings also generally decreased from 2012 to 2018, relative to total complaints and passenger boardings. As shown in figure 2, the number of passenger complaints to DOT about denied boardings represented a small percentage of total passenger complaints from 2012 to 2018, annually accounting for less than 4 percent of all complaints. On an annual basis, from 2012 through 2018, the number of complaints about denied boardings reported to DOT ranged from about 410 (in 2018) to about 650 (in 2015). We have previously reported, however, that DOT’s complaint data provide an incomplete picture of all passenger complaints because passengers may not be aware that they can report complaints to DOT, and DOT’s complaint data do not include complaints from passengers submitted directly to airlines. Specifically, in 2018, we reported that across all complaint categories, DOT estimated it received one complaint for every 50 complaints the airline receives. In an effort to avoid denied boardings, airlines can, in some cases, accommodate passengers in a different section of the aircraft, either by upgrading or downgrading passengers. A revenue management specialist and representatives from an airline industry association we interviewed said that, with limited exceptions, airlines generally do not overbook their premium cabins. Our review of DOT data found that in recent years, until 2018, airlines have generally upgraded fewer passengers to avoid denied boardings. According to representatives from an airline industry association, the decrease in the number of passengers upgraded is likely because airlines have fewer empty premium seats in their first-class cabins than in past years because they are selling more of these seats. For example, a stakeholder said that airlines are now selling upgrades on the day of departure and allowing more customers to use miles to upgrade their seat, leaving fewer available empty premium seats when flights are oversold. DOT permits airlines to downgrade passengers, as long as the airline refunds the passenger the difference in fares. In practice, representatives from an airline industry association said that when a passenger in a premium cabin is to be denied boarding, airlines generally offer the passenger the option of a premium cabin seat on another flight or to downgrade to the economy cabin along with compensation for the fare differential. In our review of seven airline’s contracts of carriage, five explicitly stated that if passengers are downgraded, they will be entitled to an appropriate refund, and the other two airlines do not include information about downgrades in their documents because they do not have different cabins of service. According to representatives from an airline industry association, the refund amount is calculated based on the average difference of fare paid between the two cabins, and it is dependent on the flight’s origin and destination. While the average amount of compensation for passengers involuntarily denied boarding has increased in recent years, a smaller percentage of such passengers received compensation. As previously mentioned, in certain situations, passengers who are denied boarding involuntarily may not be eligible for compensation. For example, airlines are not required to compensate passengers if an airline uses a smaller aircraft than originally planned for operational or safety reasons and thus cannot accommodate all confirmed passengers. Our review found that the percentage of passengers that were involuntarily denied boarding who qualified for compensation decreased from 76 percent in 2012 to 64 percent in 2018. Aircraft substitution may be contributing to fewer passengers being eligible for compensation, according to DOT data. For example, one airline that does not overbook experienced a number of operational issues in 2016 and 2017 that forced it to operate many of its flights with smaller aircraft. As a result, the airline had to deny passengers boarding involuntarily, and these passengers were not eligible for compensation. As figure 3 shows, from 2015 to 2018, most of the passengers who were denied boarding involuntarily and were not eligible for compensation were ineligible due to airlines using smaller aircraft on some flights. Although the total number of involuntary denied boardings decreased from 2012 to 2018, any passenger involuntarily denied boarding could face varying levels of disruptions to their travel plans. Passengers who are rebooked on the next scheduled flight may encounter minimal inconveniences or expenses. However, other passengers may face more significant travel disruptions, according to representatives from consumer advocate organizations we interviewed. Our review of a non- generalizable sample of passenger complaints submitted to DOT in May and June 2019 also identified instances where passengers reported incurring significant costs in terms of time and money as a result of being denied boarding involuntarily. For example, one passenger reported missing a wedding and paid about $450 in additional hotel costs. In another instance, a passenger missed their cruise after being denied boarding involuntarily. Consumer advocates also told us that passengers may incur costs such as lodging, meals, and transportation, or might miss work as a result of being denied boarding involuntarily. Airlines’ ability to rebook passengers who are involuntarily denied boarding on the next available flight can be limited. Over the past several years, airlines have increasingly flown with fewer empty seats— particularly on certain routes—than was typical in the past, according to DOT data. With fewer open seats, airlines have limited options to rebook passengers who are denied boarding. For example, across all departing flights at Hartsfield-Jackson Atlanta International Airport in 2018, on average, 86 percent of seats were filled. These data represent averages across all flights and stakeholders said that factors such as time of day, day of the week, season, and flight origin or destination can affect the number of empty seats on a particular flight. For example, flights on Sunday evening tend to be fuller than flights on Tuesday. One airline revenue management specialist estimated that about 25 to 30 percent of all flights have no empty seats. Representatives from consumer advocate organizations that we interviewed said that planes are operating at record-high levels of capacity, and one advocate stated that no transportation system is designed to operate at or near capacity all of the time, which they believe some airlines are doing on certain routes. In addition, we have previously reported that service to smaller communities is generally less frequent, providing airlines with fewer opportunities to rebook passengers than for more traveled routes. Airlines may also not be able to rebook passengers who are denied boarding on a different airline that has seat availability if they lack commercial agreements to do so. Further, according to representatives from an industry association representing airlines, while most airlines have agreements in place that allow passengers to be rebooked on a different airline, these agreements are primarily used to accommodate passengers on delayed and canceled flights. According to these representatives, passengers who are denied boarding are almost always re-accommodated on the same airline, given that the customer typically volunteers to take a later flight on the same day. Our review of seven airlines’ contracts of carriage found that four of them have documented policies in place to rebook passengers who are denied boarding on a different airline. Our review of DOT data found that fewer passengers are being rebooked on flights that arrive within an hour of their original flight. Specifically, in 2012, 11.5 percent of rebooked passengers were accommodated on such a flight, compared to 0.11 percent in 2018. While DOT collects data on passengers who are delayed less than an hour, no other information is available to measure the amount of time a passenger is delayed when they are denied boarding. However, based on our review of passenger complaints, we found instances where passengers reported having to wait until the following day to board a flight with available seats. Decreases in involuntary denied boardings are due in part to recent airline actions. As mentioned previously, involuntary denied boardings can be costly for both passengers whose travel plans are disrupted, and airlines that have to compensate passengers for such disruptions and then face criticism for denying boarding to passengers with confirmed seats. As a result, airlines have taken a range of actions, primarily intended to reduce such incidents. Some of these actions also provide additional incentives for passengers to volunteer to be denied boarding. Moreover, stakeholders, including consumer advocates and an association representing airlines, agreed that voluntary denied boardings are preferred to involuntary denied boardings, given that airlines and passengers willingly accept the outcome. Reducing the rate or eliminating overbookings. Some airlines have reduced their rate of overbooking or eliminated them altogether in an effort to reduce voluntary and involuntary denied boardings, according to stakeholders and our prior work. In our 2018 report, representatives from three airlines told us their airline had reduced or stopped overbooking flights. Our review of seven airlines’ customer service documents found that two airlines explicitly stated that they do not overbook their flights. Improving the ability to predict no-shows or rebook passengers. According to representatives from an industry association representing airlines, airlines have made investments to improve their software for predicting the number of passenger no-shows in an effort to reduce voluntary and involuntary denied boardings. These representatives also told us that airlines have hired additional personnel dedicated to more precisely forecasting no-show rates and proactively identifying rebooking options for passengers who are denied boarding. Improving communication with passengers. Some airlines have taken steps to notify passengers about potential denied boardings earlier in the travel process—in some cases before travelers have left for the airport—in an effort to encourage volunteers, according to stakeholders we interviewed. These stakeholders said that providing advance notice likely further reduces any burden on passengers associated with changing their travel plans. In 2018, five of the nine airlines we interviewed told us they had begun soliciting volunteers to give up their seat earlier in the process. More specifically, according to representatives from an industry association that represents airlines, some airlines call passengers prior to their arrival at the airport to gauge their willingness to give up their seat. Other airlines solicit volunteers at the check-in kiosk, which limits the need for airlines to identify passengers during the boarding process at the gate. None of the stakeholders we interviewed described any communication methods that were specific to passengers with disabilities. Nevertheless, as previously mentioned, four airlines (out of seven) explicitly state in their contracts of carriage that they generally do not deny boarding to passengers with disabilities. Increasing and diversifying compensation for passengers. Some airlines have offered additional incentives or increased compensation amounts to encourage passengers to voluntarily give up their seat. While airlines have historically provided passengers with travel vouchers to solicit volunteers, some have started offering alternative forms of compensation, such as gift cards for Amazon and other retailers, iPads, or travel vouchers with fewer restrictions or that also cover ancillary fees. Our review of DOT data indicates that relative to the number of passengers denied boarding involuntarily, more passengers have volunteered to give up their seat, lessening the need to deny passengers boarding involuntarily. For example, in 2012, for every one passenger denied boarding involuntarily, about nine volunteered to be denied boarding. In contrast, in 2018, for every one passenger denied boarding involuntarily, about 33 volunteered to be denied boarding. Providing passengers with the opportunity to propose acceptable voluntary denied boarding compensation. Some airlines solicit passengers with flexible travel plans to identify compensation amounts they would willingly accept in exchange for voluntarily giving up their seats and taking another flight. Once passengers submit their required compensation amount to the airline, the airline can then use that information to select passengers with the lowest amount of required compensation to accept a denied boarding. This process allows airlines to, among other things, potentially avoid involuntary denied boardings, and identify which passengers require the least compensation in exchange for their travel flexibility. Airlines conduct this process on their website, via their mobile app, or at the check-in kiosk. In some cases, passengers who would consider changing their plans in exchange for compensation provide the airline with a specific dollar amount that they would be willing to accept to give up their seat. In other cases, airlines require each passenger to select a predetermined amount of compensation that they would accept to give up their seat, as illustrated in figure 4. For example, based on the figure below, an airline that oversold its flight would select a passenger who volunteered to give up their seat in exchange for $250, assuming at least one passenger selected that amount. If no passengers selected that amount, the airline would identify a passenger with the next lowest amount—in this case, $350. Our review identified at least three airlines that use this type of process to solicit volunteers to give up their seats. Providing additional tools to employees. According to stakeholders we interviewed, airlines have given their employees more discretion regarding the offers they can make to encourage passengers to volunteer to be denied boarding on an oversold flight, or provide training on handling such incidents. While representatives from both consumer advocate organizations we interviewed generally supported some of the airlines’ actions to manage oversold flights, they also identified additional actions that airlines or DOT could take. Both consumer advocates we spoke to would like to see airlines increase transparency and passenger education related to denied boarding compensation. For example, these advocates believe that prior to agreeing to be voluntarily denied boarding, airlines should be required to inform passengers: (1) of the current compensation amounts for involuntary denied boardings, and (2) that compensation can be provided by cash or check (as opposed to a voucher). Having such information would allow passengers to make more informed decisions about the compensation they would willingly accept to be voluntarily denied boarding. Additionally, one consumer advocate said explicitly that they would also like airlines to inform passengers who are involuntary denied boarding that compensation amounts set by DOT are minimum amounts. Regarding potential additional actions, the FAA Reauthorization Act of 2018 required that DOT issue a rulemaking clarifying, among other things, that the compensation amounts set by DOT for involuntary denied boardings are the minimum compensation amounts that passengers can receive. In October 2019, DOT officials indicated that DOT intends to issue its final rule in July 2020. Moreover, in November 2018, we made three recommendations to DOT to improve its passenger education efforts by, among other things, capturing feedback from passengers directly, and identifying available short- and long-term budgetary resources for these efforts. DOT agreed with our recommendations and is in the process of implementing them. More broadly, both consumer advocates we interviewed called for an end to overbookings. This could be achieved either voluntarily by airlines or in regulation by DOT. These advocates said that overbooking is an outdated practice that protected airlines from high no-show rates during a time when passengers could make multiple reservations and did not incur change fees. Given that this is no longer the case, it is not necessary for airlines to overbook their flights, according to these consumer advocates. They also pointed out that airlines have significant flexibility in their business operations, including, denying boarding when a flight is overbooked, or changing flight schedules. In contrast, passengers have little, if any, recourse if they need to change their travel plans. Most tickets have restrictions that prevent passengers from making changes to their flights without incurring high change fees. Consumer advocates believe that eliminating overbooking would have limited effects on airlines, given the restrictions on passengers’ tickets. According to three airline revenue management specialists, if airlines were prohibited from overbooking flights, they would likely end up operating aircraft with more empty seats, compared to current trends. Moreover, they also noted that if flights were less full, there could be certain negative implications for airlines and passengers. For example, when fewer seats on a flight are filled with paying passengers, airlines’ average costs per passenger are higher because many aspects of airlines’ operational costs—such as salaries for crew, mechanic services, and airport landing fees—are generally the same, regardless of the number of passengers onboard. These same revenue management specialists also noted that a greater number of empty seats will generally decrease airline’s revenue. One of them estimated that the reduced revenues could amount to tens of millions of dollars. Some airlines would also likely change their revenue management practices, according to airline revenue management specialists. Those changes would largely focus on how airlines price their tickets. While two airlines have made a business decision not to overbook and have accepted the financial trade-off, revenue management specialists said that eliminating overbooking would be difficult for other airlines. In particular, all three revenue management specialists agreed that if airlines were prohibited from overbooking, some airlines may offer fewer discounted fare tickets. Two revenue management specialists also said that it is likely that airlines would increase the average fare across all tickets slightly to account for the increased costs and potential lost revenue. Finally, one revenue management specialist also said that airlines might add additional restrictions on tickets, such as by increasing penalties associated with a passenger not showing up for their flight or cancelling their ticket at the last minute. Moreover, even if airlines stopped overbooking, some passengers would still be denied boarding because factors other than overbooking—including some that are beyond the airline’s control—can lead to denied boardings. We provided a draft of this report to DOT for review and comment. DOT provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions concerning this report, please contact me at (202) 512-2834 or VonahA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. Andrew Von Ah, (202) 512-2834 or VonahA@gao.gov. In addition to the individual named above, other key contributors to this report were: Ed Laughlin (Assistant Director); Amy Suntoke (Analyst-in- Charge); Amy Abramowitz; Sarah Arnett; Melissa Bodeau; Colson Campbell; Lori Fields; Dave Hooper; Mary-Catherine Overcash; Malika Rice; Pam Snedden; Melissa Swearingen; and Elizabeth Wood.", "summary": "Some airlines overbook their scheduled flights (intentionally sell more seats than are available) to compensate for passenger no-shows. It is not illegal for airlines to overbook their flights. However, it can result in an “oversale” where airlines cannot accommodate all passengers on a particular flight. In response, airlines may have to deny boarding to some passengers. DOT is responsible for ensuring airlines adhere to their denied boarding practices as part of its consumer protection enforcement responsibilities. The FAA Reauthorization Act of 2018 included a provision that GAO examine airlines' oversales practices. This report focuses on denied boardings—the result of an oversale—and describes (1) trends in denied boardings and (2) airlines' actions related to denied boardings and mitigating the effects on passengers. GAO analyzed data on denied boardings and related passenger complaints submitted to DOT from 2012 through 2018, and reviewed seven airlines' publicly available documents describing their overbooking and denied boarding policies. Airlines were selected to generally include the largest airlines that GAO previously reported had varying practices on overbookings and denied boardings. GAO also reviewed relevant statutes and DOT regulations, summarized GAO work published in 2018 describing airlines actions to reduce denied boardings, and interviewed DOT officials, one airline industry association, two consumer advocate organizations, and three airline revenue management specialists. The selection of stakeholders was non-generalizable and based on inclusion in prior GAO work and their relevance regarding denied boarding practices. The number of passengers denied boarding (not allowed to board flights they have tickets on) generally decreased in recent years, according to Department of Transportation (DOT) data. Combined, on an annual basis, voluntary and involuntary denied boardings account for less than 1 percent of actual passenger boardings. Voluntary denied boardings. As shown below, most denied boardings are passengers who “voluntarily” gave up their seat for compensation of the airline's choosing, such as airline vouchers. Passengers can negotiate compensation amounts. For every 100,000 actual boardings in 2018, about 43 passengers were voluntarily denied boarding. Involuntary denied boardings. All other denied boardings occur “involuntarily.” These passengers may be eligible for compensation in an amount set by DOT. For every 100,000 actual boardings in 2018, about one passenger was involuntarily denied boarding. While few denied boardings are involuntary, these passengers may encounter significant costs and travel disruptions. GAO's review of passenger complaints submitted to DOT showed instances where passengers involuntarily denied boarding reported missing significant events—e.g., a wedding or a cruise—and incurring additional costs. Airlines can face challenges rebooking passengers, such as those flying to smaller communities, exacerbating these disruptions. Passengers Denied Boarding Voluntarily and Involuntarily per 100,000 Actual Boardings, 2012-2018 Airlines have taken a range of actions, aimed at reducing involuntary denied boardings. Actions include reducing overbookings; requesting volunteers earlier (e.g., at check-in); and increasing compensation for volunteers. While consumer advocates GAO interviewed generally supported these actions, they advocated for an end to overbooking. Three airline revenue management specialists said if airlines were prohibited from overbooking, some airlines may offer fewer discounted fare tickets. Two of these specialists also said airlines might also slightly increase average fares across all tickets.", "document_type": "gao"}
{"report": "DOD requires each Military Service to establish its own EFMP for active duty servicemembers. According to DOD guidance, EFMPs are to have three components—identification and enrollment, assignment coordination, and family support. Identification and enrollment: DOD requires servicemembers to enroll in their Military Service’s EFMP once eligible family members are identified by medical and educational personnel at each installation. Assignment coordination: Before finalizing a servicemember’s assignment to a new location, DOD requires each Military Service to consider any family member’s special needs, including the availability of required medical and special educational services at a new location. Family support: DOD requires each Military Service’s EFMP to help families with special needs identify and gain access to programs and services at their current, as well as proposed locations. As required by the NDAA for Fiscal Year 2010, DOD established the Office of Community Support for Military Families with Special Needs (Office of Special Needs or OSN) to develop, implement, and oversee a policy to support these families. Among other things, this policy must (1) address assignment coordination and family support services for families with special needs; (2) incorporate requirements for resources and staffing to ensure appropriate numbers of case managers are available to develop and maintain services plans that support these families; and (3) include requirements regarding the development and continuous updating of a services plan for each military family with special needs. OSN is also responsible for monitoring the Military Services’ EFMPs and collaborating with the Military Services to standardize EFMP components as appropriate. For example, as part of its guidance for monitoring the Military Services’ EFMPs, DOD requires each Military Service to certify or accredit its family support services provided through the EFMP. In addition, DOD states that each Military Service must balance the need for overarching consistency across EFMPs with the need for each Military Service to provide family support that is consistent with their specific mission. Table 1 provides an overview of the procedures each Military Service must establish for the assignment coordination and family support components of the EFMP that we identified in our May 2018 report. In May 2018, DOD reported that each Military Service provides family support services in accordance with DOD guidance, as well as Military Service-specific guidance. However, we found that, the type, amount, and frequency of assistance families with special needs receive varied by Military Service, which could lead to gaps in assistance (see table 2). For example, in our May 2018 report, we found that the Marine Corps is the only Military Service that specifies a minimum frequency (quarterly) with which families with special needs should be contacted by their family support providers. The other Military Services either do not have requirements for regular contact with these families (Air Force and Army) or require contact only for selected families (Navy). In addition, we reported that unlike the Marine Corps, the Air Force, Army, and Navy choose not to employ special education attorneys. For example, Marine Corps attorneys may represent families with special needs who fail to receive special education services from local school districts, as specified in their children’s individualized education programs (IEP). Officials from the Air Force, Army, and Navy told us that they find other ways to help families with special needs resolve special education issues. For example, Army officials said EFMP managers could refer families with special needs to other organizations that provide legal support. As we reported in May 2018, services plans are an important part of providing family support during the relocation process because they describe the necessary services and support for a family with special needs and provide a record for the gaining installation. However, we found that every Military Service had created relatively few services plans compared to the number of servicemembers or the number of family members enrolled in the EFMP (see table 3). The Military Services and OSN provided a number of reasons as to why they do not develop and maintain a services plan for each family with special needs. For example, Air Force officials said they first consider whether a services plan will help each family receive the required services. In addition, Army and Marine Corps officials said they may not develop a services plan if a family does not request it. According to a Navy official, some families also lack the required services plans because installations may not have the staff needed to develop them. Finally, OSN officials said the Military Services may not have developed many services plans during fiscal year 2016 because DOD had not yet approved a standardized form that all of the Military Services could use, and because some families’ circumstances did not require a services plan. In our May 2018 report, we recommended that DOD assess the extent to which each Military Service is developing a services plan for each family with special needs. DOD concurred with our recommendation, but as of January 2020, we determined that DOD has not fully implemented the recommendation because it has not yet assessed the extent to which each Military Service is developing services plans for each family with special needs. In its annual report to the congressional defense committees in April 2019, DOD stated that it was exploring legislative changes to the law that would require a services plan to be developed and updated only for those families who request services. A senior official from DOD stated that although this proposal received Office of Management and Budget approval, it was not included in the NDAA for fiscal year 2020. Also, in April 2019, in response to our recommendation, DOD reported to us that the Military Services had begun using a standardized form to develop services plans. In January 2020, a senior DOD official said its standardized form provides an option for a family to decline a services plan, and that the Department began collecting data related to services plans in the last quarter of 2019. To meet requirements of the NDAA for Fiscal Year 2010, in April 2017, DOD stated that it issued to the Military Services guidance that directed them to “rogram, budget, and allocate sufficient funds and other resources, including staffing,” to meet DOD’s policy objectives for the EFMP. We reported in May 2018 that DOD relies on each Military Service to determine what level of funds and resources are sufficient and what constitutes an appropriate number of family support personnel. To determine the appropriate number of family support providers and staffing levels, the Military Service officials with whom we spoke said they consider a number of factors, including the number of families with special needs enrolled in the EFMP at any given installation. See Table 4 for a summary of EFMP family support providers and other key personnel at CONUS installations. In May 2018, based on our analysis of EFMP family support providers and other key personnel at CONUS installations, we found that DOD had not developed a standard for determining the sufficiency of funding and resources each Military Service allocates for family support. As a result, the Military Services may not know the extent to which their funding and resources for family support comply with DOD’s policy. Federal internal control standards require that agencies establish control activities, such as developing clear policies, in order to accomplish agency objectives, such as those of the Military Services’ EFMPs. Because DOD had not identified and addressed potential gaps in family support across the Military Services’ EFMPs, such as those we identified in types of assistance, services plans, and resources, we concluded that some families with special needs may not get the assistance they require, particularly when they relocate. We recommended in our May 2018 report that DOD assess the extent to which each Military Service is providing sufficient resources to staff an appropriate number of family support providers. DOD concurred with our recommendation. In April 2019, the most recent update DOD provided on this recommendation, DOD officials said they were planning to pilot a staffing tool to help the Military Services determine the number of family support providers needed at each installation; the pilot is expected to last 2 years before it can be implemented across the Military Services. We reported in May 2018 that OSN had several efforts underway to improve its oversight of the EFMP. For example, to help provide a more consistent EFMP screening process across the Military Services and improve the collection of comparable assignment coordination data, OSN had planned for each Military Service to use standard screening forms for family members with special medical or educational needs prior to making new assignments. In January 2020, DOD told us that the forms were approved, but related guidance had not yet been developed for implementation across all of the Military Services. In addition, OSN planned to centralize the management of EFMP data across the Military Services. In April 2019, DOD reported that 82 percent of the EFMP related data terms were collectable across the Military Services which can improve OSN’s monitoring and reporting capabilities of the EFMP. Despite OSN’s initial efforts, we found that DOD lacked common performance measures for assignment coordination and family support, and therefore is unable to fully assess EFMP performance across the Military Services. In our May 2018 report, we recommended that DOD direct OSN to develop common performance metrics for assignment coordination and family support, in accordance with leading practices for performance measurement. DOD concurred with our recommendation. In April 2019, the most recent update DOD provided on this recommendation, DOD officials told us that each Military Service submits data on assignment coordination and family support to the EFMP data repository on a quarterly basis, and that OSN was currently developing additional performance metrics for assignment coordination and family support. Until these metrics are fully developed and implemented, DOD will remain unable to fully assess the effectiveness of its efforts related to assignment coordination and family support at each of its installations. We also found in May 2018 that OSN did not have a process to systematically evaluate the results of the Military Services’ monitoring activities. Instead, DOD requires each Military Service to monitor its own assignment coordination and family support provided through the EFMP and requires each Military Service to assess performance at least once every 4 years using standards developed by a national accrediting body. In addition, DOD requires personnel from each of the Military Service’s headquarters to periodically visit installations as part of their monitoring activities. We also reported that the Military Services’ family support programs were not accredited by a national accrediting body because, according to Military Service officials, they were unable to obtain funding for engaging in that process. Instead, each Military Service has a self-certification process based on standards that meet those of a national accrediting body, Military Service-specific standards, and best practices. We also reported in May 2018 that OSN officials did not systematically review the results of monitoring activities, such as the certification process, because they rely on each Military Service to self- monitor. In addition, officials said efforts to standardize certification of EFMPs have been unsuccessful because the Military Services cannot agree on a set of standards that can be used across installations. We recommended in our May 2018 report that DOD implement a systematic process for evaluating the results of the Military Services’ monitoring activities. DOD concurred with our recommendation but has not yet fully implemented it. DOD last commented on this recommendation in April 2019 and said the family support component is monitored and evaluated through each Military Service’s certification process, which includes specific standards for the EFMP. In addition, OSN participated in a monitoring site visit to Marine Corps Base Quantico in December 2018 and plans to participate in additional site visits that are coordinated by each Military Service’s certification team. We will consider this recommendation implemented only when DOD provides evidence that it has implemented a systematic process to evaluate the results of each Military Service’s monitoring activities. In conclusion, DOD relies on each Military Service to implement its policy on support for families with special needs. In doing so, they also rely on each Military Service to determine the extent to which its assistance to families with special needs complies with this policy. As it plans for the future, DOD will need to balance the flexibility it provides each Military Service to implement its policy with the need to assess the adequacy of the Military Services’ EFMPs in serving families with special needs, including any gaps in services these families receive. Chairwoman Speier, Ranking Member Kelly, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information regarding this testimony, please contact Jacqueline M. Nowicki, Director of Education, Workforce, and Income Security Issues at (617) 788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this statement include Bill MacBlane (Assistant Director), Brian Egger (Analyst-in-Charge), Holly Dye, Robin Marion, James Rebbe, Shelia Thorpe, Walter Vance, Kelsey Kreider, and Mimi Nguyen. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Military families with special needs face unique challenges because of their frequent moves. To assist these families, each Military Service implements its own program, known as EFMP. The National Defense Authorization Act (NDAA) for Fiscal Year 2017 included a provision for GAO to review the Military Services' EFMPs, including DOD's role in providing guidance for these programs. This statement focuses on the extent to which (1) each Military Service provides family support in the continental United States and (2) the Military Services monitor and DOD evaluates assignment coordination and family support. This statement is based on a May 2018 GAO report and updates its three recommendations as of January 2020. For the report, GAO analyzed EFMP guidance and documents; reviewed federal laws; analyzed fiscal year 2016 EFMP data; visited military installations, selected for their large numbers of military-connected students; and interviewed officials responsible for implementing, monitoring, and evaluating the EFMPs. In May 2018, GAO found that variation in support provided to military family members with special medical and educational needs through the Department of Defense's (DOD) Exceptional Family Member Program (EFMP) could lead to potential gaps in assistance. GAO recommended that DOD assess the extent to which each Military Service is developing services plans for each family with special needs and is providing sufficient resources to staff an appropriate number of family support providers, as required. DOD concurred. Services plans are important because they describe the necessary services and support for a family with special needs enrolled in the EFMP as well as during the relocation process, such as when a servicemember is assigned to a new location. In April 2019, DOD reported that the Military Services had adopted a standardized form to use when developing services plans; however, DOD has not yet assessed the extent to which each Military Service is developing these plans. In January 2020, a senior DOD official said that the Department began collecting data related to services plans in the last quarter of 2019. In April 2019 (the most recent update), DOD officials said they were planning to pilot a staffing tool to help the Military Services determine the number of family support providers needed at each installation. However, the pilot is expected to last 2 years before it can be implemented across the Military Services. GAO also found that DOD lacked common performance measures for the EFMP and was unable to compare the program's performance across the Military Services. GAO recommended that DOD develop common performance metrics for the program. DOD concurred, and in April 2019 said that it was still in the process of developing performance metrics for assignment coordination and family support. In January 2020, DOD noted that it had not yet developed guidance regarding use of forms that would help improve its ability to collect common performance measures across the Military Services. Further, GAO found that DOD does not have a process to systemically evaluate the results of each Military Service's monitoring activities. GAO also reported that DOD did not systematically review the results of monitoring activities because it relies on each Military Service to self-monitor. DOD officials said efforts to standardize certification of EFMPs have been unsuccessful because the Military Services cannot agree on a set of standards that can be used across installations. GAO recommended that DOD implement a systematic process for evaluating the results of the Military Services' monitoring activities. DOD concurred with the recommendation, but has not yet fully implemented it. In the May 2018 report, GAO made three recommendations to DOD. DOD concurred, but has made limited progress toward addressing them.", "document_type": "gao"}
{"report": "The Veterans Access, Choice, and Accountability Act of 2014 provided up to $10 billion in funding for veterans to obtain health care services from community providers through the Choice Program when veterans faced long wait times, lengthy travel distances, or other challenges accessing care at VA medical facilities. The temporary authority and funding for the Choice Program was separate from other previously existing programs through which VA has the option to purchase care from community providers. Legislation enacted in April, August, and December of 2017 and June 2018 extended the Choice Program and provided an additional $9.4 billion for the Veterans Choice Fund. Authority for the Choice Program will sunset on June 6, 2019. In October 2014, VA modified its existing contracts with two contractors— referred to as third party administrators (TPA)—that were administering another VA community care program to add certain administrative responsibilities associated with the Choice Program. For the Choice Program, each of the two TPAs—Health Net and TriWest—was responsible for managing networks of community providers who deliver care in a specific multi-state region. Specifically, the TPAs were responsible for establishing networks of community providers, scheduling appointments with community providers for eligible veterans, and paying community providers for their services. Health Net’s contract for administering the Choice Program ended on September 30, 2018, with TriWest continuing to administer the Choice Program in its region and the region previously administered by HealthNet until the program ends. Through policies and standard operating procedures for VA medical facilities and contracts with the TPAs, VA established processes for referring and scheduling appointments through the Choice Program: one process for time-eligible veterans and another for distance-eligible veterans. Table 1 provides an overview of the appointment scheduling process that applies when a veteran is referred to the Choice Program because the veteran is time-eligible—that is, the next available medical appointment with a VA clinician is more than 30 days from the veteran’s preferred date or, in the absence of such a date, the date the veteran’s physician determines he or she should be seen. When veterans reside more than 40 miles from a VA medical facility or meet other travel-related criteria, VA uses the appointment scheduling process it developed for distance-eligible veterans. The process for distance-eligible veterans differs from that for time-eligible veterans in that VA medical facilities do not prepare a referral and send it to the TPA. Instead, distance-eligible veterans contact the TPA directly to request Choice Program care. VA’s Choice Program TPA processes claims it receives from community providers for the care they deliver to veterans and pays providers for approved claims. Figure 1 provides an overview of the steps the TPA follows for processing claims and paying community providers. To be reimbursed for its payments to providers, the TPA in turn submits electronic invoices—or requests for payment—to VA. The TPA generates an invoice for every claim it receives from community providers and pays. VA reviews the TPA’s invoices and either approves or rejects them. Invoices may be rejected, for example, if care provided was not authorized. Approved invoices are paid, whereas rejected invoices are returned to the TPA. Under the Prompt Payment Act, VA is required to pay its TPAs within 30 days of receipt of a clean Choice Program invoice. The VA MISSION Act of 2018, among other things, requires VA to establish a permanent community care program no later than 1 year after passage of the Act (June 6, 2019) and authorizes VA to utilize a TPA for claims processing. VA refers to the consolidated program as the VCCP. In December 2016, prior to enactment of the VA MISSION Act of 2018, VA issued a request for proposals for contractors to help administer the VCCP. The VCCP will be similar to the current Choice Program in certain respects. For example, under the VCCP, TPAs will be responsible for establishing regional networks of community providers and processing and paying those providers’ claims. However, unlike the Choice Program, under the VCCP, VA is planning to have medical facilities—not the TPAs—generally be responsible for scheduling veterans’ appointments with community providers. VA awarded contracts for administering the VCCP in three of six regions on December 28, 2018. As of April 3, 2019, VA had not yet awarded contracts for the remaining three regions. Generally, all veterans enrolled in the VA health care system would be able to qualify for care through the VCCP when (1) VA does not offer the care or service required by the veteran; (2) the veteran resides in a state without a full-service VA medical facility; (3) the veteran would have been eligible under the 40-mile criterion of the Choice Program before June 6, 2018; (4) VA cannot provide the veteran with care and services that comply with its designated access standards; or (5) the veteran and the veteran’s referring clinician agree that it is in the best interest of the veteran to receive care in the community. In January 2019, VA proposed new access standards for the VCCP based on average drive times and wait times: For primary care, mental health, and non-institutional extended care services, VA is proposing a 30-minute average drive time standard. For specialty care, VA is proposing a 60-minute average drive time standard. VA is proposing appointment wait-time standards of 20 days for primary care, mental health care, and non-institutional extended care services, and 28 days for specialty care from the date of request with certain exceptions. Eligible veterans who cannot access care within those standards would be able to choose between eligible community providers and care at a VA medical facility. VA expects to issue the final regulation establishing access standards for the VCCP by June 2019. In June 2018, we reported that numerous factors adversely affected veterans’ timely access to care through the Choice Program and could affect implementation of the VCCP. These factors included the following: (1) administrative burden caused by complexities of VA’s referral and appointment scheduling processes; (2) poor communication between VA and its medical facilities; and (3) inadequacies in the networks of community providers established by the TPAs, including an insufficient number, mix, or geographic distribution of community providers. VA has taken steps to help address these factors; however, not all access factors have been fully addressed. For example, to help address administrative burden and improve the process of coordinating veterans’ Choice Program care, VA established a secure e-mail system and a mechanism for TPAs and community providers to remotely access veterans’ VA electronic health records. However, these mechanisms only facilitate a one-way transfer of necessary information. They do not provide a means by which VA medical facilities or veterans can view the TPAs’ step-by-step progress in scheduling appointments or electronically receive medical documentation associated with Choice Program appointments. We made five recommendations to VA to address the factors that adversely affected veterans’ access to Choice Program care. VA agreed or agreed in principle with all five recommendations. Our recommendations and the steps, if any, VA has taken in response to these recommendations are described in table 2. In June 2018, we reported that VA cannot systematically monitor the timeliness of veterans’ access to Choice Program care because it lacks complete, reliable data to do so. VA will need to address these data limitations in order to effectively monitor the care delivered to veterans through the VCCP. The data limitations we identified included the following: A lack of data on the timeliness of accepting referrals and opting veterans in to the program. We found that the data VA uses to monitor the timeliness of Choice Program appointments do not capture the time it takes VA medical facilities to prepare veterans’ referrals and send them to the TPAs, nor do they capture the time spent by the TPAs in accepting VA medical facilities’ referrals and opting veterans in to the Choice Program. VA had implemented an interim solution to monitor overall wait times that relies on VA medical facility staff consistently and accurately entering unique identification numbers on VA clinicians’ requests for care and on Choice Program referrals, a process that is prone to error. Inaccuracy of clinically indicated dates. We found that clinically indicated dates (used to measure the timeliness of care) are sometimes changed by VA medical facility staff before they send Choice Program referrals to the TPAs, which could mask veterans’ true wait times. We found that VA medical facility staff entered later clinically indicated dates on referrals for about 23 percent of the 196 authorizations we reviewed. It is unclear if VA medical facility staff mistakenly entered incorrect dates manually, or if they inappropriately entered later dates when the VA medical facility was delayed in contacting the veteran, compiling relevant clinical information, and sending the referral to the TPA. Unreliable data on the timeliness of urgent care. We found that VA medical facilities and TPAs do not always categorize Choice Program referrals and authorizations in accordance with the contractual definition for urgent care. According to the contracts, a referral is to be marked as “urgent,” and an appointment is to take place within 2 business days of the TPA accepting it, when a VA clinician has determined that the needed care is (1) essential to evaluate and stabilize the veteran’s condition, and (2) if delayed would likely result in unacceptable morbidity or pain. We reviewed a sample of 53 urgent care authorizations and determined that about 28 percent of the authorizations were originally marked as routine care authorizations but were changed to urgent by VA medical facility or TPA staff, in an effort to administratively expedite appointment scheduling. We made five recommendations to VA on improving the completeness and accuracy of data on veterans’ wait times for care. VA agreed with four of the five recommendations. Our recommendations and the steps VA has taken in response to these recommendations are described in table 3. In September 2018, we reported that three key factors affected timeliness of payments to community providers under the Choice Program and that if unaddressed could affect provider payment timeliness for the VCCP. These factors included the following: (1) VA’s untimely payments to TPAs, which in turn extended the length of time TPAs took to pay community providers’ claims; (2) Choice Program reimbursement requirements, which led to claim denials; and (3) inadequate provider education on filing claims. We reported that VA has taken some actions to address these factors. For example, VA updated its payment system and related processes to pay TPAs more quickly. According to VA data, as of July 2018, VA was paying at least 90 percent of the TPAs’ invoices within 7 days, a significant increase from the 50 percent timely payments VA made to TPAs between November 2014 and September 2016. In addition, VA and the TPAs had taken steps to amend certain reimbursement requirements and improve provider education to help providers resolve claims processing issues. However, we found that VA has not fully addressed two of these factors. First, with respect to reimbursement requirements, VA does not have complete data allowing it to effectively monitor adherence with its policy for VA medical facilities to perform timely reviews and approvals of secondary authorization requests. Community providers request secondary authorization requests when veterans need health care services that exceed the period or scope of the original authorization. Incomplete data impacted VA’s ability to meet the requirement. When VA medical facilities delay these reviews and approvals, community providers may have to delay care or deliver care that is not authorized, which in turn increases the likelihood that the providers’ claims will be denied and the providers will not be paid. Second, with respect to provider education on filing claims, VA requires the TPAs to establish a customer call center to respond to calls from veterans and non-VA providers. However, VA does not enforce the contractual requirement for responding to calls from community providers and allows the TPAs to prioritize calls from veterans over calls from community providers. Consequently, VA is not collecting data, monitoring, or enforcing compliance with its contractual requirements for the TPAs to provide timely customer service to providers. As a result, VA does not have information on the extent to which community providers face challenges when contacting the TPAs about claims payment issues, which could contribute to the amount of time it takes to receive reimbursement for services. To address remaining factors that affect provider payment timeliness, we made two recommendations to VA. VA agreed with both recommendations. Our recommendations and the steps VA has taken in response to these recommendations are described in table 4. In summary, consolidating its existing community care programs into the VCCP and launching this new program in June 2019 is a large and complex undertaking, which comes with many risks and challenges for VA. Heeding the lessons learned from its implementation and management of the Choice Program will better position VA to ensure veterans receive timely access to care under the VCCP and avoid past challenges such as delays in scheduling appointments and untimely payments to community providers. Continued oversight of VA’s implementation of the VCCP will be critical given the scale of change and the associated risks. We stand ready to assist this Committee with this continued oversight. Chairman Isakson, Ranking Member Tester, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions you may have. If you or your staff members have any questions concerning this testimony, please contact me at (202) 512-7114 or silass@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals who made key contributions to this testimony include Marcia Mann (Assistant Director), Michael Zose (Analyst-in-Charge), Jacquelyn Hamilton, Christina Ritchie, Kate Tussey, and Emilie Weisser. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In June 2018, Congress passed the VA MISSION Act of 2018, which requires VA to establish a permanent community care program. VA plans to consolidate the Choice Program and its other VA community care programs into one community care program—the VCCP. This legislation helps address some of the challenges faced by the Choice Program and VA's other community care programs. VA's implementation of the VCCP can benefit from the lessons learned under the Choice Program. Ignoring these lessons learned increases VA's risk for not being able to ensure that all veterans receive timely access to care in the community and that community providers are reimbursed in a timely manner. This testimony focuses on lessons learned from the Choice Program, including recommendations GAO has made to VA to help ensure (1) veterans' timely access to care under the VCCP (2) effective monitoring of veterans' access to care under the VCCP, and (3) timely payments to community providers under the VCCP. This testimony is based on GAO reports on the Choice Program that were issued in June 2018 and September 2018. The Department of Veterans Affairs' (VA) Veterans Choice Program (Choice Program) allows eligible veterans to obtain health care services from providers not directly employed by VA (community providers). The program is largely managed by third party administrators (TPA), who are responsible for establishing provider networks, scheduling veterans' appointments, and paying providers. GAO has identified the following challenges to the Choice Program that VA needs to address as it implements its new Veterans Community Care Program (VCCP). Factors that adversely affected veterans' timely access to care. GAO found that numerous factors adversely affected veterans' timely access to care through the Choice Program. These factors included (1) administrative burden caused by complexities of referral and appointment scheduling processes; (2) poor communication between VA and its medical facilities; and (3) inadequacies in the networks of community providers established by the TPAs, including an insufficient number, mix, or geographic distribution of community providers. VA has taken steps intended to help address these factors, however, some have not been fully addressed. In June 2018, GAO made five recommendations to VA, including that VA establish a system that will facilitate care coordination and exchanges of information among VA medical facilities, VA clinicians, TPAs, community providers, and veterans. VA agreed or agreed in principle with all five recommendations, but has not yet implemented them. Unavailable and unreliable data. GAO found that VA cannot systematically monitor the timeliness of veterans' access to Choice Program care because it lacks complete, reliable data to do so. The data limitations GAO identified included a lack of data on the timeliness of accepting referrals and opting veterans in to the program, inaccurate data on clinically indicated dates (which are used to measure the timeliness of care), and unreliable data on the timeliness of urgent care. In June 2018, GAO made five recommendations to VA, including that VA implement mechanisms to allow VA to systematically monitor the amount of time taken to prepare referrals, schedule appointments, and complete appointments. VA agreed with four of the five recommendations, but has not yet implemented them. Untimely payments to community providers. GAO identified three key factors that affected timeliness of payments to community providers under the Choice Program. These factors included (1) VA's untimely payments to TPAs, which in turn extended the length of time TPAs took to pay providers' claims; (2) Choice Program reimbursement requirements, which led to claim denials; and (3) inadequate provider education on filing claims. GAO found that VA has taken actions to address the factors, such as amending certain reimbursement requirements. However, two of these factors have not been fully addressed. In September 2018, GAO made two recommendations to VA, including that VA collect data on and monitor compliance with its requirements pertaining to customer service for community providers. VA agreed with the recommendations, but has not yet implemented them. GAO has made 12 recommendations to VA to improve its management and oversight of the Choice Program and the VCCP. VA generally agreed with all but one of GAO's recommendations. GAO continues to believe that all of the recommendations are warranted. As of April 2019, these recommendations have not been implemented.", "document_type": "gao"}
{"report": "In general, date labels on packaged foods are not required by federal regulations, except in the case of infant formula. However, manufacturers may choose to provide date labels to help consumers and retailers decide when the food is of best quality. These date labels may carry different introductory phrases, such as ‘“best by,” “sell by,” “use by,” or “best if used by,” prior to the date, according to the preference of the manufacturer. In most cases, these labels indicate quality or freshness (i.e., the last date by which the manufacturer believes the food will be fresh or taste best), according to USDA. However, according to representatives from the Food Marketing Institute, because date labels are not federally regulated, manufacturers use a number of different date labels across industry, and this variation in date labels may result in consumer confusion about the meaning of the labels. Consumer confusion about date labels on packaged foods contributes to food waste, according to various studies. Due to this confusion about what date labels mean, consumers may throw out food that is safe to eat, even if the food does not have visible signs of spoilage, according to these studies. For example, in a 2017 study, participants were asked to state what they thought a particular date label on a certain packaged food meant. The study found that participants did not have a consistent understanding of date labels—some thought the labels indicated safety, and some thought they indicated quality, and others were unsure what the labels meant. Furthermore, three studies estimated that from 34 percent to 70 percent of consumers think that their risk of foodborne illness increases if they consume a packaged food product past the date label. In addition to confusion about the meaning of date labels, one study found that consumers are confused about who is responsible for date labels. According to the study, more than one-third of consumers surveyed believed the federal government regulates date labels, and 26 percent were unsure. USDA and FDA share oversight of nearly all the nation’s food supply but do not regulate most date labels and are not required to do so by federal law. USDA is responsible for the safety and proper labeling of meat, poultry, and egg products, and FDA is responsible for the safety and proper labeling of virtually all other foods. Within USDA, FSIS is the public-health agency responsible for ensuring that meat, poultry, and processed egg products are safe, wholesome, and accurately labeled. According to FSIS, its goals include lowering the incidence of pathogens that cause foodborne illnesses and limiting the occurrence of outbreaks, and ensuring that regulated products are properly packaged and labeled so consumers have access to important information about the product. Also within USDA, AMS provides voluntary quality-grading programs for producers of products such as milk, eggs, and meat. These quality- grading programs are paid for by the producers of these commodities and can require, among other things, that producers participating in these programs use date labels. In addition, USDA has research components that could address issues relating to date labels. For example, USDA’s National Institute of Food and Agriculture supports research through grants to individuals, institutions, and organizations, and the Economic Research Service conducts economic research to inform and enhance decision-making. FDA has statutory authority to regulate the safety of foods and nutrition labels on packaged foods not regulated by FSIS. However, the agency is not required by statute to regulate the use of date labels. FDA also exercises its general authority to assist state and local governments with food safety efforts through its State Cooperative Programs specifically for Grade A milk, molluscan shellfish, and retail and food-service establishments. As part of these programs, FDA provides technical support, guidance, and training to help its regulatory partners with reducing foodborne illnesses associated with these commodities. Also, in coordination with its regulatory partners and industry, FDA develops guidance, including guidance on date labels for certain products and in certain circumstances. Such guidance represents FDA’s best advice for a uniform system of provisions that address the safety and protection of food offered at retail and in food service. As we reported in May 2016, the federal food safety oversight system is supplemented by states, localities, tribes, and territories, which may have their own laws and agencies to address the safety and quality of food. Generally, state, local and tribal governments may choose whether to regulate date labels on packaged foods. For example, the majority of states and the District of Columbia have some date labeling requirements for, most commonly, shellfish, dairy, and eggs, as figure 1 shows. Additionally, some states and the District of Columbia prohibit retailers from selling some packaged foods to consumers if the date on the label has passed. Furthermore, some municipalities choose to regulate date labels in addition to, or in the absence of, state regulations. For example, while Maryland prohibits the sale of grade “A” milk or milk products past the “Sell by” date marked on its cap or container, the city of Baltimore generally prohibits the sale of any perishable food past its expiration date. Tribal governments may also have regulations that address labels on packaged food. For example, the Navajo Nation Code has requirements related to labeling of some packaged foods, such as shellfish. Where no state or local regulations are in place regarding date labeling, manufacturers may decide which of their packaged food products display a date label and what wording to use on the date label. Estimates on the number of different date labels currently in use across industry vary. Figure 2 below provides examples of introductory phrases for date labels currently used by packaged food manufacturers. In response to consumer confusion about date labels and resulting food waste, two industry associations, the Food Marketing Institute and the Grocery Manufacturers Association, in 2017 announced a voluntary industry initiative to encourage manufacturers and retailers to standardize date labels on packaged foods. This initiative calls for manufacturers to use either of two introductory phrases for date labels on packaged foods: (1) a “best if used by” label as an indication of product quality and (2) “use by” for certain perishable products that may be more susceptible to degradation of quality or potential food safety concerns. In December 2018, the Food Marketing Institute and the Grocery Manufacturers Association reported that in a consumer survey on these date labels, 88 percent of those surveyed said these two date label phrases were clear to them and 85 percent said they were helpful. Some advocacy groups work to reduce consumer confusion over date labels as part of their overall food waste reduction efforts. For example, Rethink Food Waste Through Economics and Data (ReFED), an advocacy group committed to reducing food waste in the United States, in 2016 issued a report that outlined key steps to reduce food waste. The report listed standardizing date labeling as one of the top three solutions to reducing food waste with the greatest economic value and net environmental benefit. According to representatives from ReFED, the organization works alongside industry to promote the Food Marketing Institute and the Grocery Manufacturers Association joint voluntary initiative by providing manufacturers with a tool they can use to determine which wording to use on date labels for different products. In addition, according to these representatives, ReFED is developing methods to disseminate information to consumers about the meaning of date labels. Representatives from the Natural Resources Defense Council (NRDC), an international nonprofit environmental advocacy organization, said that NRDC is coordinating with the National Ad Council, a nonprofit organization that provides public-service communications, to develop a multiyear outreach and education campaign aimed at reducing household food waste. According to NRDC representatives, this joint effort may include information about date labels. Furthermore, in 2017, NRDC and the Harvard Food Law and Policy Clinic issued a report that found that the lack of standard date labels leads to a mistaken belief that past-date food is unsafe to consume, which causes unnecessary waste. The report called for Congress to pass legislation or for FDA and USDA to work together to create uniform regulations that standardize date labels throughout the nation. International entities have also taken steps to address date labeling practices and make date labels clearer to consumers. For example, according to its website, the Consumer Goods Forum—an association of 400 manufacturers and retailers across 100 countries that sell globally— has teamed up to help meet the United Nations sustainable development goal that calls for cutting in half per capita global food waste at the retail and consumer levels and reducing food losses along production and supply chains by 2030. As part of this effort to reduce food waste, the Consumer Goods Forum has called for standardized date labels. Other countries have also taken steps to address date labels. For example, in the United Kingdom, in 2008 a nonprofit group conducted research that found that consumers threw out about 22 percent of food that they could have eaten, because they were confused about what the date labels meant. In 2015, the United Kingdom government issued guidance on date labels, specifically that packaged foods must display either a “best before” or “use by” date on the packaging or label of prepacked food products. According to this United Kingdom guidance, a “use by” date label communicates that there may be a safety issue with consuming the product after the date. Furthermore, selling food that is past its “use by” date is prohibited in the United Kingdom. Additionally, the Canadian government has standardized date labels, requiring that prepackaged products with a durable life of 90 days or less be labeled with date markings and storage instructions, where applicable. Such foods must display “best before” and its corresponding French, “meilleur avant.” According to a 2014 USDA report, food loss and waste represents significant amounts of money and other resources invested in food production, including land, fresh water, labor, energy, agricultural chemicals (e.g., fertilizer, pesticides), and other inputs to produce food that does not ultimately meet its intended purpose of feeding people. Furthermore, according to the 2014 report, reducing food waste will become an increasingly important strategy in the future to help feed a growing human population both here and abroad. In the United States, USDA and EPA are leading the federal government’s efforts to reduce food loss and waste, according to officials from the Office of Management and Budget and the Council on Environmental Quality. For example, in 2013, USDA and EPA launched the U.S. Food Waste Challenge for participants across the food supply chain to share best practices on reducing, recovering, and recycling waste. Furthermore, in September 2015, USDA and EPA announced a national goal to reduce food loss and waste in the United States by 50 percent by 2030, which aligns with the United Nations sustainable development goal that calls for cutting in half per capita global food waste. According to FDA officials, the agency was not involved with establishing the national goal because the agency has a limited mission related to food loss and waste; it is primarily responsible for protecting public health by ensuring the safety of the nation’s food supply, among other things. USDA and FDA have taken steps to address consumer confusion about date labels on packaged foods. For example, USDA has issued guidance to consumers and industry, promulgated regulations and implemented policies, and funded research on issues related to date labeling. In addition, FDA has issued information to consumers and supported industry efforts to standardize date labels. In December 2016, USDA’s FSIS announced the availability of a fact sheet that provides guidance related to date labels for industry and consumers. The fact sheet, among other things, explains the meaning of commonly used phrases on date labels and recommends that grocery manufacturers and retailers that use date labels on their products use the language “best if used by” to reduce consumer confusion and resulting food waste. According to an FSIS announcement at the time, the agency chose this phrase because research showed that consumers easily understand the phrase as an indicator of food quality rather than food safety. FSIS also solicited comments on the fact sheet and, in April 2019, after receiving and reviewing comments, updated the fact sheet by, among other things, adding “freeze by’“ to the list of phrases commonly used on labels to describe food quality dates. Figure 3 shows excerpts from the 2019 fact sheet. In addition, FSIS offers a smartphone application (app), called FoodKeeper, that provides information for consumers on the shelf life of products, how to use food when it is at peak quality, and how to store food properly. FSIS developed the FoodKeeper app in 2015 in partnership with Cornell University and the Food Marketing Institute. The app offers users advice on how to store more than 650 food and beverage items, with specific storage timelines for the refrigerator, freezer, and pantry, depending on the nature of the product. In addition, the app allows consumers to note in their devices’ calendars when they purchased the products and to receive notifications when these products are near the end of their recommended storage date, among other things. According to FSIS, the agency is working on an updated version of the app. USDA has promulgated regulations and implemented policies related to required or voluntary date labels on certain products, such as poultry and eggs, and on foods used for its nutrition assistance programs. For example, FSIS has promulgated regulations that require that either the immediate container or the shipping container of all poultry food products be marked with a code or with the date the product was packed. According to FSIS, while USDA does not require date labeling for quality or food safety for products under its purview, the agency requires this “pack date’’ for poultry products to help the agency identify product lots and facilitate trace-back activities in the event of an outbreak of foodborne illness. Additionally, FSIS has promulgated regulations regarding voluntary date labeling. While there are no regulations requiring meat products to have a calendar date, a meat manufacturer may voluntarily place a date on the package. For both poultry and meat products, FSIS’s regulations regarding language on these labels require that this date contain the day and month and be accompanied by a phrase explaining the meaning of the date, specifically “packing” date, “sell by,” or “use before.” The regulations also give manufacturers the option of adding a further qualifying phrase such as “for maximum freshness” or “for best quality.” In the case of meat and poultry products that are hermetically sealed, dried, or frozen, the year must be included as well, to prevent misleading consumers. According to FSIS, a retailer cannot remove or change the date while the product remains in its original packaging if a meat or poultry manufacturer voluntarily places a date on the package. In addition, AMS has promulgated regulations regarding a voluntary egg grademark program, in which egg producers may obtain a USDA grademark, or shield, on their eggs that indicates they meet applicable quality and size standards. The regulations contain requirements related to date labels. Among other requirements to obtain a grademark, the cartons or consumer packaging containing these eggs must show the day of the year on which the eggs were packed. Specific introductory phrasing for the date label—such as sell by, best by, or use before—is not required, but if these terms are used, AMS policies restrict the number of days from the pack date that can be used on a date label. An egg producer may choose to not use an expiration date and still receive AMS certification, but the lot number must be present on each carton. Cartons not identified with a USDA grademark are not subject to federal regulation; however, regardless of whether the eggs bear a USDA grademark, they are subject to state and local date labeling requirements. Furthermore, USDA’s Food and Nutrition Service, which administers 15 federal nutrition assistance programs, policy, last updated in 2017, clarifies that date labels indicate quality, not safety. This policy references the agency’s regulation that prohibits distributors of food assistance from providing food with expired date labels or food that is “out-of-condition,” regardless of the date on the label, to recipients of any Food and Nutrition Service programs. The policy states that, to give program recipients the opportunity to eat all donated foods before their expiration dates, distributors and recipient agencies should use an inventory-management system that distributes products marked with the earliest end date first, even if they were received after other similar products. From 2008 through 2018, USDA provided funding for two grants related to date labels, resulting in three studies: one grant resulted in a 2008 study, and the other grant resulted in studies in 2017 and 2018. The 2008 study assessed participant understanding of date labels on ready-to-eat meat and poultry products to minimize the risk of listeriosis in vulnerable populations. The study found that participants paid attention to the date labels but varied highly in their interpretation of the statements. However, they generally interpreted “sell by” date labels as primarily intended for the retailer’s use on when to pull stock and “best if used by” labels as pertaining more to quality than safety considerations. The researchers reported that participants considered “use by” statements clearer and more helpful than “sell by” or “best if used by” labels and that they believed there was a need for a standardized approach to labeling. The study recommended that if a “sell by” date is used on a product solely for the store to know when to pull a product off the shelf, then a “consume or use by” date should also be implemented on behalf of the consumer. The 2017 study examined, among other things, consumer understanding of phrases on date labels—specifically, “best by,” “fresh by,” “sell by,” and “use by”—on specific products and how these labels affected the participants’ willingness to waste the food. The study found that participants had different levels of willingness to waste food depending on the phrase on the label. In the study, willingness to waste was highest for “use by” and lowest for “sell by,” and this difference held regardless of the product. The researchers suggested that this could be because “use by” may be the least ambiguous and suggestive of food safety, while, conversely, “sell by” may the most ambiguous and least suggestive of food safety. The researchers suggested that if manufacturers move exclusively to the “sell by” date label, this could lead to less waste in the food system. However, while the study identified phrases least likely to result in food waste, it focused on only three products and did not address or make recommendations about steps federal agencies could take to address consumer confusion about date labeling. The 2018 study examined consumer perception of date labels— specifically, “use by” and “best by”—on deli meat and spaghetti sauce. The study found that participants had differing perceptions of date labels by product and what each introductory phrase on the labels meant—that is, whether they reflected safety, quality, taste, or nutrition. Generally, the study found that consumers tended to view “use by” as reflective of safety and nutrition, and “best by” as indicative of quality and taste. The three studies looked at consumer confusion on date labels on certain packaged foods but did not determine which introductory phrase for a date label would be most effective for reducing such confusion across a wide range of products that consumers may purchase, quantify the impact of such confusion on food waste, or determine steps USDA or other federal agencies could take to reduce waste resulting from such confusion. USDA’s 2014 report on food waste noted that food loss (particularly the food waste component) was becoming an increasingly important topic both domestically and internationally. Moreover, according to that report, better estimates of the amount and value of food loss, including food waste, could help serve as quantitative baselines for policymakers and the food industry to set targets and develop initiatives, legislation, or policies to minimize food waste, conserve resources, and improve human nutrition. Previously, we have reported that the nation’s increasingly tight budget environment underscores the need for federal research agencies to set priorities carefully and make effective use of limited research funding. USDA officials told us that their awareness of the role of consumer confusion about date labels and its effect on food waste had increased over time. Furthermore, these officials told us they planned to consider funding additional research if their process for determining research priorities indicates additional research is needed. FDA has taken some actions related to date labeling, such as promulgating regulations regarding date labels on infant formula. For example, since 1985, FDA has required that infant formula display a specific “use by” date on each container of infant formula, which specifies the date after which the formula should not be fed to infants. According to FDA, this label indicates that the manufacturer guarantees the nutrient content and the general acceptability of the quality of the formula up to that date. In addition, since 1993, FDA has published the Food Code, a model for safeguarding public health and ensuring food is unadulterated and honestly presented when offered to the consumer. According to FDA, it represents the agency’s best advice for a uniform system of regulation that address the safety and protection of food offered at retail and in food service, and, while it is not a federal requirement, it is designed to be consistent with federal food laws and regulations. The 2017 FDA Food Code, which is the most recent, contains limited provisions related to date labels applied by manufacturers of packaged foods sold in retail food stores and food-service establishments. For example, the Food Code contains a provision regarding shellfish. It specifies that retailers should only obtain shucked shellfish in packages that identify the “sell by” or “best if used by” date for packages of less than a half-gallon or the date shucked for those of a half-gallon or more. According to Food and Drug Administration (FDA) documents, in response to infant- formula products that were causing illnesses among children because the products lacked sufficient nutrients and industry had too much discretion to decide the appropriate nutritional content of these products, Congress passed the Infant Formula Act of 1980. The act mandates that FDA set uniform standards for the nutritional content of infant formula. Under this act, FDA established a range of regulations affecting infant formula, including a requirement that its labels include “use by” dates. The regulations mandate that manufacturers determine dates on infant formula based on tests that prove the concentration of nutrients is adequate for the health of children up to the marked date. In addition to displaying a “use by” label, manufacturers are required to regularly test for the harmful pathogens (disease-causing bacteria) Salmonella and Cronobacter and demonstrate that the infant formula they produce supports normal physical growth. Additionally, the Food Code’s provisions regarding the labeling of packaged foods state that “food establishment or manufacturers’ dating information on foods may not be concealed or altered.” However, the Food Code is voluntary and does not have provisions for the use of open- code date labels. The Food Code establishes limits for the time that a refrigerated, ready-to-eat food that has been opened or prepared in a food establishment may be held prior to sale or service. The date the food shall be consumed, sold, or discarded must be clearly marked; however, the date is not required to be visible to consumers and is handled separately from the disposition of packaged foods on which a manufacturer has voluntarily placed a date label. The Food Code also specifies how foods prepared in-house using specialized processing methods, such as reduced-oxygen packaging, are to be labeled to ensure they are stored, displayed for sale, or consumed within time limits considered adequate to reduce the risk of foodborne illness. In October 2017, FDA issued information on its website for consumers with food safety tips for foods purchased or received from a charity or bargain store. For example, according to the information, an expired “sell by” date does not necessarily mean that a food is spoiled or unsafe. However, in some cases, if food has not been handled safely, illness- causing bacteria may grow. In addition, the information states that consumers should avoid purchasing packaged foods that require refrigeration and that are past the “use by” or “sell by” dates because these foods may be perishable and may have begun to spoil. Moreover, in May 2019, FDA published an educational fact sheet for consumers on reducing food waste while maintaining food safety. This fact sheet includes information about the meaning of language on date labels, as consumers may waste food if they misunderstand what date labels actually mean. For example, it explains that a “best if used by” date indicates that a product will be at its best flavor and quality. On the fact sheet, FDA recommends consumers download USDA’s FoodKeeper app to know how long various food products will keep in the pantry, in the refrigerator, and in the freezer. Furthermore, FDA has promoted a voluntary industry initiative to standardize approaches to date labeling of packaged foods and improve consumer understanding of the meaning of date labels. In May 2019, FDA issued a letter to industry that described FDA’s position on the voluntary industry standard proposed by the Food Marketing Institute and the Grocery Manufacturers Association in January 2017. This voluntary industry standard called for using the “best if used by” introductory phrase in quality-based date labels on packaged foods. FDA said the agency strongly supports industry’s voluntary efforts to use the “best if used by” introductory phrase when grocery manufacturers choose to include a quality-based date label to indicate when a product will be at its best flavor and quality. While the Food Marketing Institute and the Grocery Manufacturers Association recommended the use of the introductory phrase “use by” to indicate the date by which products should be consumed or discarded for safety reasons, FDA did not address the “use by” product date label for safety reasons in the agency’s letter to industry. USDA and FDA have coordinated on some initiatives focused specifically on date labels on packaged foods. For example, USDA and FDA officials told us the agencies are working together to develop information for food banks, food donors, and recipients of donated food regarding how to interpret date labels on packaged foods donated to food banks to ensure that food that is past the date on the label—but otherwise edible—is not wasted. USDA officials told us the agencies plan to finalize this information in 2019. USDA and FDA are also collaborating with EPA on an initiative to reduce food loss and waste. In October 2018, USDA, FDA, and EPA signed a formal interagency agreement, referred to by the agencies as the Winning on Reducing Food Waste Initiative. The formal agreement states the agencies are committed to increasing collaboration and coordination in existing federal programs in areas of mutual interest relating to the reduction of food loss and waste, and to developing an interagency strategy to address this issue. According to USDA’s website, as part of this collaborative effort, the agencies agreed to coordinate food loss and waste actions, such as education and outreach, research, community investments, voluntary programs, public-private partnerships, tool development, technical assistance, event participation, and policy discussions on the impacts and importance of reducing food loss and waste. According to the agreement, the agencies will seek to work together at the federal level with actors throughout the entire food supply chain to leverage the private and nongovernmental sectors. Specifically, the agreement states the agencies will seek to educate these actors on best practices to reduce food loss and waste in the growing, manufacturing, transporting, selling and disposing of food, handling, preparation and storage of food, as well as creating new uses for excess food. After announcing the formal agreement in October 2018, the three agencies in April 2019 announced a federal interagency strategy to prioritize and coordinate their efforts as they implement the formal agreement. This strategy identifies date labeling as a priority action area and states that “establishing and communicating clearer, coordinated voluntary guidance on food date labels and liability protection around food donation could help increase food recovery and lead to reductions in food waste and food insecurity.” In the strategy, the agencies state that they built on information from several sources, including EPA and USDA’s Call to Action by Stakeholders: United States Food Loss & Waste 2030 Reduction Goal and two reports from nonprofit organizations, all of which cited clarifying or standardizing date labels as a key element for food loss and waste reduction efforts. Establishing a formal agreement is a positive step and aligns with leading practices for interagency collaboration. We have previously found that interagency collaborations benefit from collaborative mechanisms, such as written agreements, in that agencies can strengthen their commitment to working collaboratively, which USDA and FDA have done. In addition to steps they have taken toward interagency collaboration, USDA and FDA have taken steps to work with some nonfederal stakeholders—nonprofit organizations and an international organization— on date labeling. For example, in February 2019, USDA, EPA, and FDA met with NRDC and the Ad Council to discuss campaigns to inform the public about ways to reduce food loss and waste, which includes consumer education on date labeling. According to FDA officials, the agencies will meet with the two groups later in 2019 to continue this discussion. In addition, in April 2019, in keeping with the goal in the agencies’ Winning on Reducing Food Waste Initiative to expand collaboration with nonfederal stakeholders, EPA, FDA, and USDA signed a formal agreement with ReFED to collaborate on efforts to reduce food loss and waste. The agreement outlines actions the agencies and ReFED agree to take, including that the agencies will consult with ReFED to develop approaches for measuring the success of various strategies and techniques being deployed nationwide to reduce food waste. Furthermore, USDA and FDA provide senior staff and executive delegates to represent the United States at the Codex Alimentarius Committee on Food Labelling, among other committees under the purview of the Codex Alimentarius Commission. The commission, an international intergovernmental body, produces the Codex Alimentarius, or “Food Code,” a collection of standards, guidelines, and codes of practice related to food, food production, and food safety. In 2018, the commission revised its voluntary guidance on date labeling to clarify the distinction between dates based on food quality and those based on food safety. Because the Codex Alimentarius is a voluntary reference standard, its guidance, including on date labels, is not binding on member countries, including the United States. However, USDA and FDA have not consulted with all relevant stakeholders. For example, state and local officials we spoke with told us that USDA and FDA had not collaborated with them or consulted them on approaches to date labels. In our prior work, we identified a leading practice for interagency collaboration that calls for ensuring that the relevant participants are included in interagency collaborative efforts. Such efforts can include other federal agencies; state, local, and tribal governments; industry; and nonprofit advocacy organizations. Generally, state, local and tribal governments may choose whether to regulate date labels on packaged foods. For example, the majority of states and the District of Columbia have date labeling requirements. Advocacy organizations and state officials told us that efforts at reducing consumer confusion about date labels could be hindered without federal leadership, as states may continue to have varying approaches. USDA and FDA officials told us that they did not have a specific mechanism to coordinate or consult with state, local, or tribal officials on creating a common approach to date labels. By developing a mechanism to facilitate coordination with nonfederal stakeholders—including state, local, and tribal governments—on actions related to date labels as part of their efforts to reduce food loss and waste, USDA and FDA could better assure that approaches they take to address consumer understanding of date labels are effective in helping reduce consumer confusion and resulting effects such as wasted food. USDA and FDA have taken important steps toward reducing consumer confusion about date labels by, among other things, providing information to consumers and, in USDA’s case, by conducting research on food waste. In addition, in October 2018, USDA, FDA, and EPA signed a formal agreement aimed at improving coordination and communication across federal agencies to educate Americans about the benefits of reducing food loss and waste. However, although USDA and FDA have taken steps to work with some nonfederal stakeholders, such as ReFED, on date labels, they have not worked with state, local, and tribal governments. We have identified that ensuring relevant stakeholders have been included in the collaborative effort as a leading collaboration practice. By developing a mechanism to facilitate coordination with relevant nonfederal stakeholders on actions related to date labels as part of their efforts to reduce food loss and waste, USDA and FDA could better assure that approaches they take to address consumer understanding of date labels are effective in helping reduce consumer confusion and resulting effects such as wasted food. We are making two recommendations to the agencies in our review: The Secretary of Agriculture should work with the Commissioner of FDA to develop a mechanism to facilitate coordination with relevant nonfederal stakeholders, including state, local, and tribal governments, on actions related to date labels as part of their efforts to reduce food loss and waste. (Recommendation 1) The Commissioner of FDA should work with the Secretary of Agriculture to develop a mechanism to facilitate coordination with relevant nonfederal stakeholders, including state, local, and tribal governments, on actions related to date labels as part of their efforts to reduce food loss and waste. (Recommendation 2) We provided a draft of this report to the Departments of Agriculture and Health and Human Services for review and comment. In its comments, reproduced in appendix I, USDA agreed with our recommendation to the agency and described current and future actions to implement the recommendation. Similarly, in its comments, reproduced in appendix II, the Department of Health and Human Services agreed with our recommendation to it and described current and future actions to implement the recommendation. USDA and the Department of Health and Human Services provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Agriculture and Health and Human Services; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or morriss@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made contributions to this report are listed in appendix III. In addition to the contact named above, Anne K. Johnson (Assistant Director), David Bennett (Analyst-in-Charge), Tara Congdon, and Jordan Mettica made key contributions to this report. Carol Bray, Kevin Bray, Serena Lo, Oliver Richard, Danny Royer, Kiki Theodoropoulos, and Sarah Veale also contributed to this report.", "summary": "USDA has reported that almost one-third of the U.S. food supply is lost or wasted at the retail and consumer levels. Studies indicate that some of this waste may occur because of consumer confusion about the meaning of date labels displayed on packaged food. Such labels are not federally regulated, and food manufacturers use different phrases on date labels. USDA and FDA have roles in ensuring the U.S. food supply is safe and properly labeled, but neither agency been directed—or given express authority—to regulate date labels. GAO was asked to examine consumer confusion about date labels. This report (1) describes the steps USDA and FDA have taken to address consumer confusion about date labels and (2) examines the extent to which USDA and FDA have coordinated with each other and with nonfederal stakeholders on date labels. GAO reviewed studies on date labels and FDA and USDA documents; interviewed agency officials and representatives of nonfederal stakeholders, such as industry, advocacy organizations, and state governments; and compared the agencies' efforts to leading practices identified by GAO. The U.S. Department of Agriculture (USDA) and Food and Drug Administration (FDA) have taken steps to address consumer confusion about date labels on packaged foods. For example, to reduce confusion about introductory phrases on date labels, such as whether the dates indicate food is safe to eat (see figure), and resulting food waste, USDA in December 2016 issued a fact sheet on date labels for consumers. In addition, USDA has funded research on issues related to date labels (e.g., how labels affected participants' willingness to waste food) and developed a smartphone application that provides consumers with information on the shelf life of products. FDA has issued educational materials to consumers about the meaning of phrases on date labels and in May 2019 issued a statement that it supports industry efforts to standardize date labels. USDA and FDA have coordinated on some initiatives focused on date labels on packaged foods. For example, agency officials said they were working together to develop information for food banks, food donors, and recipients of donated food on how to interpret date labels so food past the date on the label—but otherwise wholesome—is not wasted. In October 2018, the agencies, with the Environmental Protection Agency, signed a formal agreement to educate consumers about food loss and waste. In addition, USDA and FDA have taken steps to work with some nonfederal stakeholders—such as nonprofit organizations and an international organization—on date labeling. However, USDA and FDA officials told GAO that they do not have a specific mechanism to coordinate with state, local, and tribal officials on creating a common approach to date labels. State, local, and tribal governments may choose to regulate date labels, and the majority of states have date label requirements for certain foods. According to prior GAO work, ensuring that relevant participants are included in interagency collaborative efforts is a leading practice for interagency collaboration. By developing a mechanism to facilitate coordination with nonfederal stakeholders, such as state, local, and tribal officials, on actions related to date labels, USDA and FDA could better assure that approaches they take to address consumer understanding of date labels are effective in helping reduce consumer confusion. GAO is recommending that USDA and FDA develop a mechanism to facilitate coordination with relevant nonfederal stakeholders on actions related to date labels. USDA and FDA agreed with our recommendation and are planning actions to implement the recommendation.", "document_type": "gao"}
{"report": "According to ATF and USMS policy, the Directors of ATF and USMS have the authority to develop various policies, procedures, and guidance that specify the steps the components must or should take while investigating and adjudicating employee misconduct. ATF and USMS can receive allegations of employee misconduct from a variety of sources, including agency staff, the general public, and the DOJ OIG. Allegations of employee misconduct can include, for example, not following procedures associated with managing government-issued property or not reporting time and attendance accurately. Employee misconduct can occur outside of the workplace as well, such as local arrests of employees for domestic violence or driving under the influence of alcohol. ATF and USMS each have an intake or hotline function that is to initially assess the reported information and seriousness of each allegation to determine the appropriate next step in terms of which group or office within their respective component will conduct an investigation, if warranted. The investigation process involves engaging in fact-finding to the extent necessary to make an informed decision on the merit of an allegation. In accordance with ATF and USMS policy, for each misconduct allegation received, the components’ investigative office (Internal Affairs) must provide the DOJ OIG with “right of first refusal.” This review allows the DOJ OIG to either open an investigation or send the allegation back to the component for action. If the DOJ OIG declines the opportunity to investigate, the components assign the case to Internal Affairs. Specifically: For ATF, cases that involve matters related to integrity are investigated by ATF Internal Affairs, while other cases are generally referred to ATF divisions to conduct inquiries (known as management referrals). USMS typically assigns higher-level (i.e., more egregious) misconduct cases to Internal Affairs. For cases typically considered to involve lower-level offenses, USMS managers in divisions or districts conduct inquiries or fact finding locally. Each component has policies, procedures, and guidance for its Internal Affairs and local management for investigating cases of employee misconduct. Based on the investigative findings, the responsible office for each component can make a preliminary determination of whether there is sufficient evidence to support an allegation. After investigations are completed, each component has an adjudication process whereby delegated officials propose discipline. For ATF, a headquarters entity—referred to as the Professional Review Board— proposes discipline for all cases investigated by ATF Internal Affairs. For cases involving misconduct by ATF employees outside of Internal Affairs jurisdiction, division management proposes and decides discipline. USMS utilizes various, delegated agency officials to propose and decide discipline depending on the type of investigation. Discipline for both ATF and USMS employees can range in severity, depending on the unique findings and circumstances of each investigation. For misconduct within USMS warranting a suspension of 14 days or less, local management proposes and decides discipline. For both ATF and USMS, during adjudication, proposing and deciding officials determine whether an allegation is substantiated or unsubstantiated when considering if an action is warranted. For substantiated cases that are determined to warrant action, components use their respective Table of Offenses and Penalties as a guide for disciplinary actions, which provides guidance for determining appropriate penalties. Each component is to provide employees with a letter of proposed discipline and an opportunity to respond before it makes a final decision on the discipline. After discipline is proposed and the employee’s response is considered, final discipline is determined by a delegated official (deciding official), distinct from the proposing official. In addition, delegated officials are to consider particular mitigating and aggravating factors on a case-by-case basis when determining the appropriate penalty for an act of employee misconduct. The relevant factors that are considered, as appropriate, in determining the severity of the discipline include, but are not limited to, the nature and seriousness of the offense and its relation to the employee’s duties, position, and responsibilities. This includes considering whether the offense was intentional or inadvertent, or was committed maliciously or for gain; the employee’s past disciplinary record; and whether the offense was frequently repeated. For both ATF and USMS, there are three categories of employee misconduct outcomes: Corrective/Non-disciplinary action. This is an administrative or non- disciplinary action, such as a letter of counseling or a letter of guidance and direction, that informs an employee about unacceptable performance or conduct that should be corrected or improved. Disciplinary action. This includes actions resulting in a letter of reprimand up to a suspension of 14 days or less. A letter of reprimand describes the unacceptable conduct that is the basis for a disciplinary action, and represents the least severe form of disciplinary action. Suspensions in this category involve the placement of an employee in a nonduty, non-pay status for up to and including 14 days. Adverse action. This involves a suspension of more than 14 days (including an indefinite suspension), demotion to a lower pay band or rate of pay, or removal (an involuntary separation from employment). According to the U.S. Merit Systems Protection Board, an indefinite suspension is appropriate when evidence exists to demonstrate misconduct of a serious nature, such as an employee has committed a crime for which a sentence of imprisonment can be imposed, when the agency has concerns that an employee’s medical condition makes the person’s presence in the workplace dangerous or inappropriate, or when an employee’s access to classified information has been suspended. Also, according to the board, a demotion is a reduction in grade or a reduction in pay, while a removal terminates the employment of an individual. Figure 1 provides an overview of ATF and USMS employee misconduct processes. ATF and USMS have case management systems that are designed to maintain employee misconduct data––such as the date of the alleged incident, source of the allegation, description of the alleged misconduct, and the status of the investigation. ATF’s Professional Review Board uses another system to manage outcome data associated with Internal Affairs investigations. After adjudication of ATF Internal Affairs investigations, the board is to provide this outcome data to ATF Internal Affairs for inclusion in its system. Similarly, after the adjudication of management referrals for action, ATF managers are to provide outcome data to ATF Internal Affairs to include in its system. In addition to the system USMS uses to manage Internal Affairs investigations, the agency has a separate system to record outcome data. Our analysis of ATF employee misconduct data found that ATF opened 1,581 employee misconduct investigations during fiscal years 2014 through 2018. As shown in table 1, the majority of ATF misconduct cases during this period were management referrals to divisions for informational purposes or for action. Table 2 shows that the most common allegation category of misconduct that ATF received from fiscal year 2014 through 2018 was job performance failure, representing 8 percent of all allegations, which includes not attending meetings, submitting reports of inspection late, or becoming agitated during performance feedback, among other things. After investigations are completed, results are forwarded to the Professional Review Board for adjudication, and adjudication results are to be entered into ATF’s Human Resources system. For investigations that were adjudicated during the period we reviewed, six types of offense categories made up about 60 percent of those substantiated and captured in the ATF Human Resources system, as shown in figure 2. The exercise of poor judgment (14 percent) and the failure to adequately secure government property (13 percent) were the most common offenses. The employee misconduct outcomes for offenses ranged from corrective actions (e.g., letters of counseling or caution) to adverse actions such as suspensions and removals. Specifically, of the 503 investigations that had final actions reported in ATF case management system, disciplinary action—suspensions of 15 days or less and letters of reprimand— accounted for 176 (about 35 percent) of the final outcomes. Also, 135 (about 27 percent) of investigations adjudicated resulted in corrective actions (cautions such as a verbal or written warning). Further, 87 (about 17 percent) of these 503 investigations and management referrals were closed for various reasons, such as insufficient evidence of an employee’s inappropriate behavior or clearance of the charges after investigation, while adverse actions represented 47 (about 9 percent) of these outcomes, as shown in figure 3. Our analysis of USMS employee misconduct data show that USMS opened 2,347 employee misconduct investigations during fiscal years 2014 through 2018 that were also closed at the time USMS responded to our request for information. As shown in table 3, USMS Internal Affairs investigated the majority of the component’s employee misconduct cases. As shown in table 4, the most common misconduct allegations for USMS were violations of the code of professional responsibility (21 percent), conduct unbecoming or discourteous behavior (13 percent), and failure to follow procedures (12 percent). As shown in figure 4, general misconduct while on duty and failure of staff to follow instructions were the most frequent offenses from fiscal years 2014 through 2018, representing 383 (about 25 percent) and 266 (about 18 percent) of offenses respectively. Additionally, according to USMS adjudication data, of the 2,347 investigations that were opened in fiscal years 2014 through 2018, USMS had adjudicated 1,729 misconduct cases at the time USMS responded to our request for information (March 2019 for investigations opened in fiscal years 2014 through 2017 and April 2019 for investigations opened in fiscal year 2018). As shown in figure 5, the most common disciplinary outcomes for USMS were non-adverse actions (corrective and disciplinary actions), which accounted for 988 (about 58 percent) of final outcomes. USMS did not take disciplinary action on 533 (about 31 percent) of completed investigations forwarded for adjudication. The deciding official will not determine an action against an employee if he or she does not believe the allegations warrant action. Adverse actions were less common, with removals, suspensions of 15 days or more, and demotions accounting for 83 (about 5 percent) of all employee actions. The remaining 120 (about 7 percent) of completed investigations forwarded for adjudication resulted in retirements, resignations, transfers and other outcomes such as settlement agreements. According to the U.S. Merit Systems Protection Board, to prove a claim of management retaliation, the investigation must show that the employee engaged in a protected activity (e.g., filing an EEO claim); the agency official with knowledge of the employee’s protected activity took, failed to take, or threatened to take a personnel action against the employee; and there is a causal connection between the protected activity and the personnel action. From fiscal years 2014 through 2018, ATF and USMS employees submitted 70 claims of management retaliation directly to their Internal Affairs division or the DOJ OIG, and about 240 to their EEO Office. OSC does not record data in its case management system related to DOJ employee disclosures (claims) by component. From fiscal years 2014 through 2018, ATF, USMS, and the DOJ OIG completed 70 investigations of employee misconduct that alleged management retaliation. ATF Internal Affairs retaliation investigations. According to ATF investigations data, from fiscal years 2014 through 2018, ATF Internal Affairs investigated 23 cases alleging management retaliation. Of these 23 cases, Internal Affairs referred 20 to division management for informational purposes. Of the three cases that were investigated by ATF, two cases were investigated by division management and resulted in the employees being counseled by their supervisors. The third case was investigated by Internal Affairs and resulted in one employee receiving a clearance letter and another receiving a letter of caution, with another two employees retiring. USMS Internal Affairs retaliation investigations. According to USMS investigations data, from fiscal years 2014 through 2018, USMS Internal Affairs investigated 26 cases alleging management retaliation. Of these 26 cases, 12 were closed after the investigation was completed due to insufficient evidence. Of the remaining 14 cases, four resulted in employees retiring during or after adjudication, four had no employee action, three closed due to ongoing related cases, and there was one oral admonishment, one letter of counseling, and one suspension of 14 days. DOJ OIG retaliation investigations. According to our analysis of DOJ OIG data, from fiscal years 2014 through 2018, the DOJ OIG investigated 21 ATF or USMS cases alleging management retaliation (four ATF cases and 17 USMS cases). The DOJ OIG filed all four ATF cases in its management system for informational purposes only (no action), and also sent one of the four cases to ATF for informational purposes. Of the 17 USMS cases, the DOJ OIG filed 12 cases in its management system for informational purposes (no action), found that three cases lacked sufficient evidence, closed one case due to one of the involved employees being reassigned and the other resigning, and in one case made a procedural recommendation to the Director of USMS. Figure 6 shows the number of ATF, USMS, and DOJ OIG management retaliation investigations from fiscal years 2014 through 2018. ATF and USMS employees may file claims of management retaliation through their agency’s EEO office. We analyzed ATF and USMS employee misconduct and EEO data to determine (1) the number of employees who had filed an EEO claim of management retaliation and (2) whether these employees were also subject to a misconduct investigation. ATF EEO management retaliation investigations. From fiscal years 2014 through 2018, the ATF EEO Office received 128 claims from 104 employees that included management retaliation as the basis, but none of these claims have been found to support a finding of retaliation. ATF EEO and employee misconduct data show that employees in 54 of the 128 EEO cases (36 total individuals) were also subject to misconduct investigations that were adjudicated during this time period. Of the 36 employees, 24 submitted their EEO claim subsequent to their misconduct investigation. The remaining 12 employees submitted their EEO claim prior to their first employee misconduct investigation. Figure 7 shows the number of ATF employees who filed EEO claims of management retaliation and were also the subject of an employee misconduct investigation. USMS EEO retaliation claims. From fiscal years 2014 through 2018, the USMS EEO Office received 110 claims from 69 individuals with management retaliation as the basis, of which one resulted in a final agency decision supporting the claim. USMS EEO and employee misconduct data show that individuals in 75 of the 110 EEO cases (49 total individuals) were also subject to a total of 134 employee misconduct investigations that were adjudicated from fiscal years 2014 through 2018. Of these 49 individuals, 32 submitted their EEO complaint subsequent to their misconduct investigation. The remaining 17 employees submitted their EEO claim prior to their first employee misconduct investigation, of which three claims resulted in a settlement agreement. Figure 8 shows the number of USMS employees who filed EEO claims of management retaliation and were also the subject of an employee misconduct investigation. From fiscal years 2014 through 2018, OSC did not report any instances of management retaliation for ATF or USMS. OSC reported one investigation related to one USMS employee who improperly secured personally identifiable information, for which USMS took corrective actions. According to data maintained in an ATF Office of Chief Counsel case management system, ATF recorded eight instances where ATF counsel rendered assistance to OSC on retaliation-related matters. USMS Office of General Counsel does not maintain OSC-related data in any USMS case management system. ATF and USMS have incorporated some key internal controls for processing employee misconduct allegations into their policies and procedures, but have not consistently documented the implementation of these controls. ATF and USMS have also established policy requirements related to timeliness in completing employee misconduct investigations, but have not established performance measures to monitor all of these requirements. Further, both ATF and USMS have established mechanisms to monitor various aspects of the components’ operations, but do not use these mechanisms to fully monitor key internal controls related to their employee misconduct investigation and adjudication processes. ATF and USMS documented the implementation of some key control activities that are important for ensuring the quality and independence in processing allegations of employee misconduct. However, they did not document other key control activities. Supervisory review of investigations. According to Federal Quality Standards for Investigations, supervisory or management review of misconduct investigations helps ensure that investigations are comprehensive and performed correctly. ATF and USMS both require this review in policy for misconduct investigations and have incorporated it in their respective procedures. Both ATF and USMS also have a policy or procedure for documenting this control activity in either their case management system or case file records. We found that ATF consistently documented supervisory review of its employee misconduct investigations. Overall, based on our case file reviews, we estimate that 98 percent of the population of ATF investigations or management referrals for action from fiscal year 2014 through fiscal year 2018 documented supervisory review. For our sample, we found documentation of supervisory review in all 36 Internal Affairs investigations and all 26 management referrals for action. We also found supervisory review for all 12 investigations or referrals in our sample with proposed adverse actions and all nine investigations or referrals in our sample that involved an individual who had filed an EEO claim of management retaliation. For USMS, we found that the agency consistently documented supervisory review of its Internal Affairs investigations, but did not consistently document this review for its district and division investigations. Overall, based on our case file reviews, we estimate that 60 percent of the population of USMS investigations (2,347) from fiscal year 2014 through fiscal year 2018 documented supervisory review. For our samples, we found documentation of supervisory review in 29 out of 30 of Internal Affairs investigations. However, for USMS district and division investigations, we found that 23 of 59 investigations had documentation of supervisory review through the required use of a field incident report. We also found that all 20 investigations in our sample with proposed adverse actions had documentation of supervisory review. Further, we found that six of the 12 USMS investigations in our sample that involved an individual who had filed an EEO claim of management retaliation had documentation of supervisory review. The remaining six cases without documentation of supervisory review were district or division investigations, which are typically considered to involve lower-level offenses. Although USMS policy on Field Operational Reports requires the use of a standard form to document supervisory review for district and division misconduct investigations, USMS officials stated that district and division management periodically document a completed investigation with an electronic email confirmation for various reasons, including that the investigation may involve non-adverse actions. However, according to USMS policy, a memorandum does not serve as a substitution for the required field report. Taking steps to ensure that supervisory review of division and district investigations is documented in accordance with USMS policy would provide greater management assurance that investigations are performed comprehensively and consistently, and that this control is operating as intended. Legal sufficiency review. ATF policy on Integrity and Other Investigations states that managers will review the investigative findings with the Office of Chief Counsel’s management division to propose and decide discipline or other actions. ATF also has procedures for documenting these activities in its case management systems. We found that ATF consistently documented legal sufficiency review during the adjudication phase for its Internal Affairs investigations. Specifically, we found that 32 of 36 cases investigated by Internal Affairs documented legal counsel review during the adjudication phase. One case of these 32 had review for the proposal, but was ultimately cleared. For the four cases without documentation of legal counsel review, this review was not applicable. Specifically, one case involved an employee who received a clearance letter; one case was still pending a final decision; one case involved an employee who was on military leave; and one case involved an employee who had retired. We also found that legal counsel review was documented in 11 of the 12 cases in our sample where adverse action was proposed—all of which were investigated by Internal Affairs—and the remaining case was still pending adjudication as of August 2019. Further, we found documentation of legal counsel review for six of the nine employee misconduct investigations that involved an EEO claim of management retaliation. Of the three investigations that did not have documentation, one was an Internal Affairs case where the final action was pending, and the other two cases were management referrals for action. Regarding ATF Internal Affairs investigations referred to division management for action, we found that legal counsel review was documented for nine of 26 cases during the adjudication phase for the proposed discipline, the final disciplinary action, or both. Documenting legal counsel review for cases referred to division management for action would provide ATF management greater assurance that all proposed discipline or other actions are legally sufficient. Although ATF policy requires managers to review investigative findings with the Office of Chief Counsel when handling management referrals, ATF officials stated that supervisors may handle the matters within the division without informing or consulting with legal counsel if there is no proposed discipline. According to ATF officials, the agency plans to revise its policy on Integrity and Other Investigations in August 2020, the next scheduled recertification of the order, to allow managers discretion in determining whether legal review is needed in instances where discipline is not imposed. USMS policy on Discipline Management Business Rules requires legal review for Internal Affairs investigations that involve a proposed adverse action, but does not require legal reviews for investigations that involve non-adverse actions. USMS also has procedures for documenting this activity in its case management system and physical case files. We found that USMS consistently documented the legal sufficiency internal control. Specifically, we found that all of the 20 proposed adverse actions in our sample documented legal counsel review. Of the 12 cases in our sample that involved an individual who had also filed an EEO claim, three had proposed adverse actions, all of which had documentation of USMS legal review. DOJ OIG right of first refusal. According to ATF and USMS policies on misconduct investigations and management referrals, for each misconduct allegation received, the components must provide the DOJ OIG the opportunity to review the case for right of first refusal. This review allows the DOJ OIG to either open an investigation or defer the case back to the component for investigation. This review is designed to maintain independence by determining which cases warrant investigation outside of ATF and USMS. We found that ATF and USMS consistently forwarded allegations of employee misconduct to the DOJ OIG for right of first refusal. Specifically, our analysis of ATF and DOJ OIG data found that the DOJ OIG did not have a record of receiving five out of 1,581 ATF investigations or management referrals for right of first refusal. There were also 41 instances for which ATF did not have a DOJ OIG case number, which prevented the DOJ OIG from checking its records for evidence that ATF had forwarded the case for right of first refusal. We found that 37 of the 41 cases occurred in fiscal years 2014 or 2015, with only four cases occurring in fiscal years 2016 through 2018. Our analysis of USMS and DOJ OIG data found that the DOJ OIG did not have a record of receiving 10 out of 2,347 investigations for right of first refusal. Verification of accuracy of case management system data. ATF and USMS do not have a policy requirement for the use of a method or tool to verify system data associated with both investigation and disciplinary processes. However, according to Standards for Internal Control in the Federal Government, management is to use quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. The standards also state that data maintains value to management in controlling operations and making decisions, and management is to design control activities so that all records are complete and accurate. Regular reviews of case management data can identify outliers or abnormalities, such as missing information. ATF officials stated that agency managers verify that the initial information related to the allegation is accurate in the case management system. However, additional reviewers in the misconduct process do not verify investigation and adjudication information subsequent to the allegation in the case management system. The officials added that after Internal Affairs investigations and management referrals for action are completed, the record of investigation and supporting materials are reviewed by management to assess the quality of the investigation before uploading to the case management system. However, we found that information related to the investigation and adjudication of these allegations was sometimes not captured in automated data fields. Since uploaded documents cannot be analyzed easily, the Office of Professional Responsibility manually reviews these documents to compile an annual report on employee misconduct activities, such as the number of investigations and outcomes. According to ATF and USMS officials, employee misconduct procedures include supervisor review in several areas. For example, ATF and USMS officials stated that managers review reports of investigation and other documents to ensure certain information is recorded in case files or case management systems. ATF officials provided evidence that they verify certain data when a case is initiated, such as the identity of the subject and allegation. ATF officials also provided evidence that managers review the report of investigation for quality. USMS officials stated that they confirm that the employee under investigation is the correct employee in the system record and that the case was referred to the DOJ OIG for right of first refusal. ATF officials also stated that reviewers involved in employee misconduct processes compare case file documentation against case management system records. However, we found that hundreds of case management system records were missing key information, such as the final outcomes of employee misconduct investigations and DOJ OIG case numbers for ATF, and dates related to district or division investigations for USMS. We also found that ATF and USMS lack policy for verifying the accuracy and completeness of data recorded in their respective employee misconduct case management systems. This policy could be implemented, for example, through the use of a method or tool, such as a data entry checklist, that would guide agency officials when entering information into systems. Establishing policy could help ensure that case management system data are accurate and complete and would allow ATF and USMS to effectively monitor and report on their employee misconduct processes. ATF and USMS have established requirements in their policies regarding timeliness in completing employee misconduct investigations. However, ATF has not developed performance measures to monitor its timeliness requirements. USMS has developed a measure to monitor its Internal Affairs investigations, but not for its district and division investigations. Standards for Internal Control in the Federal Government state that management should define objectives in measurable terms so that responsible personnel and management are held accountable, and their performance toward achieving those objectives can be assessed. ATF policy on Integrity and Other Investigations requires completing Internal Affairs investigations generally within 120 days, and management referrals for action within 60 days. ATF officials acknowledged the importance of addressing employee misconduct allegations in a timely manner. For example, ATF may withhold a positive human resource action or personnel assignment pending completion of a misconduct investigation, such as a promotion or becoming a member of a task force. ATF employees under investigation for misconduct may also be placed on restricted duty, which depending on the case may prevent the employee from accessing information systems and require the employee to surrender his or her government-issued firearms, vehicle, other property, and credentials. ATF officials stated that ATF management tracks ongoing investigations—for both Internal Affairs investigations and management referrals for action—and the amount of time they are open. ATF Internal Affairs officials stated that managers track the duration of all investigations on a weekly basis, and will inquire about the status of investigations and reasons why any exceed the duration standards. However, ATF has not developed a performance measure to monitor performance against timeliness requirements—for example, whether a certain percent of Internal Affairs investigations during a definite time period were completed within the required 120 days. Based on our analysis of ATF data, Internal Affairs met its policy requirement of completing its investigations within 120 days about 36 percent of the time (86 of 240 investigations). ATF data also show that the agency met its policy requirement of 60 days for about 49 percent (205 of 419) of its management referrals for action (see fig. 9). According to ATF officials, ATF does not use measures to monitor performance related to the duration of Internal Affairs investigations and management referrals for action due to numerous factors, such as investigators handling multiple cases at the same time and the involvement of the DOJ OIG. We have previously reported that other federal agencies have established such performance measures, which have taken these challenges into account when developing their methodology for measuring timeliness. Establishing a performance measure to monitor the timeliness of Internal Affairs and management referrals for action could provide ATF management more complete information in overseeing investigations and help improve the efficiency of employee misconduct processes. USMS policy requires completing Internal Affairs investigations within 90 days, and within 30 days for investigations referred to its districts and divisions. USMS officials noted the importance of addressing employee misconduct allegations in a timely manner, with regards to effecting positive human resource actions such as promotions. USMS Internal Affairs has developed a performance measure to monitor whether it is completing its investigations within the required 90-day time frame. According to USMS officials, the agency plans to change the required time frame for completing Internal Affairs investigations from 90 days to 180 days, which according to the officials is a time standard used by most other law enforcement agencies. USMS does not have a performance measure to monitor the duration of investigations conducted by its districts and divisions. According to USMS officials, these investigations do not involve high-level offenses that would pose a significant risk to the agency. Based on our analysis of USMS data, Internal Affairs met its policy requirement of completing its investigations within 90 days 35 percent of the time (468 of 1,320 investigations for which data were recorded in USMS systems), as shown in figure 10. Our analysis also shows that USMS met its policy requirement of completing its district and division investigations within 30 days over 99 percent of the time (489 of 490 investigations for which data were recorded in USMS systems). Although we found that USMS met its timeliness requirement related to district and division investigations over 99 percent of the time, management responsible for oversight have not developed a performance measure to monitor whether the agency meets its policy requirement. Therefore, the agency will not be able to identify any potential future performance issues. Monitoring these investigations is also important since data on the duration for about 25 percent (165 of 655) of district and division investigations that were opened from fiscal years 2014 through 2018 were not recorded in USMS systems at the time the agency provided the data. Developing a measure for the duration of district and division investigations would provide USMS leadership with greater assurance that the agency is complying with policy requirements. ATF and USMS do not use their existing oversight mechanisms to fully monitor key internal controls related to employee misconduct processes. Standards for Internal Control in the Federal Government call for management to establish and implement activities to monitor the internal control system and evaluate the results, as well as remediate identified internal control deficiencies. ATF has two oversight mechanisms that it uses to monitor internal controls related to financial reporting, compliance activities, and operations—annual self-assessments and internal management reviews. However, according to ATF officials, the component does not use these mechanisms to monitor any internal controls related to its employee misconduct processes. Specifically, according to an ATF official, as part of ATF’s annual self- assessment program, all component divisions, including Internal Affairs, are to test financial processes, such as government credit card payments. The ATF Inspection Division also conducts internal management reviews to test compliance with the same activities that are covered by the self- assessment program. ATF officials stated that the scope of the self- assessment program does not include key internal control activities related to employee misconduct processes due to competing priorities. According to an Inspection Division official, the division also has not conducted an internal management review of the offices responsible for employee misconduct processes (e.g., the Internal Affairs division, the Professional Review Board, Bureau Deciding Official activities) in about 10 years due to competing priorities. ATF officials stated that the agency plans to review these divisions and offices in the future, but did not have any specific plans for how internal management reviews would be used for divisions and offices in the misconduct process or when these reviews would begin. While the scope of these reviews has not been determined, the officials stated that internal management reviews could include testing internal control activities related to allegations of employee misconduct, such as investigative review and approval, legal sufficiency review; and case management information system data reliability and completeness. Monitoring key internal controls related to employee misconduct processes through existing oversight mechanisms would help ATF management ensure that controls are being implemented as required by policy. USMS has two oversight mechanisms that it uses to monitor internal controls related to financial reporting, compliance activities, and operations. Specifically, USMS’s Compliance Review Office, within the Office of Professional Responsibility, conducts on-site management reviews at USMS districts and divisions. USMS also has an annual self- assessment program that requires divisions and districts to self-assess their compliance with certain requirements by testing for and remediating any internal control deficiencies. However, because of competing priorities, USMS does not use these mechanisms to fully monitor key internal controls over employee misconduct processes. According to Office of Professional Responsibility Compliance Review officials, the scope of on-site management reviews conducted at selected USMS districts and divisions during fiscal years 2014 through 2018 did not include employee misconduct processes. The officials also stated that on-site reviews during this period did not include the Internal Affairs and Discipline Management divisions. According to USMS officials, the agency plans to conduct an on-site management review at the Internal Affairs division in fiscal year 2021. The officials added that the compliance review cycle for each district and division currently occurs once every 9 years, but that this review cycle will increase to once every 4 years. Our analysis of USMS annual self-assessment guides showed that from fiscal years 2014 through 2018, the guides included testing for most key controls related to employee misconduct processes. For example, Internal Affairs and Discipline Management self-assessment guides included questions on whether Internal Affairs forwards cases to the DOJ OIG for right of first refusal, the Chief of Internal Affairs reviews investigative reports, investigations are completed within 90 days, and data on allegations is entered into the case management system. The self-assessment guide for USMS districts and divisions included questions to assess compliance with the timeliness of investigations (within 30 days); use of the Table of Offenses and Penalties, consideration of Douglas Factors (certain factors that USMS is to consider about an employee when deciding discipline, such as the employee’s need for training); Delegations of Authority for proposing and deciding officials, and other Human Resource policy areas, such as administrative leave and eligibility for promotion. However, although legal sufficiency review of proposed adverse actions is required by policy and a key internal control, USMS did not design its self- assessment guides for the Internal Affairs and Discipline Management divisions to include testing for such reviews. Revising the scope of on-site management reviews to include employee misconduct processes and revising self-assessment guides to include testing for legal sufficiency of proposed adverse actions would help USMS gain greater assurance that these controls are implemented as required by policy. ATF and USMS have established internal controls related to some employee misconduct investigation and disciplinary processes, but additional actions could strengthen their controls. Specifically, USMS does not ensure that supervisory review of division and district investigations is documented in accordance with agency policy. ATF and USMS also have not developed policy for verifying the accuracy and completeness of information in employee misconduct systems. Ensuring supervisory review is documented as required and establishing policy for verifying information in misconduct systems would provide greater consistency in processes, assurance that controls are operating as intended, and corrective actions are implemented as needed. ATF and USMS policy also have required timelines for completing investigations. However, ATF does not have a performance measure to monitor whether it is meeting its timeliness requirement, such as the percentage of Internal Affairs investigations completed within 120 days. USMS does not have a performance measure to monitor and assess its performance in meeting the required time to complete its district and division investigations within 30 days. Developing performance measures to monitor the timeliness of all investigations could provide more complete information for ATF and USMS management responsible for oversight and allow them to address any related performance issues in a timely manner. Further, ATF and USMS have established oversight mechanisms, such as internal management reviews, to monitor select aspects of the components’ operations, such as financial operations. However, ATF and USMS generally have not used these mechanisms to monitor internal controls related to employee misconduct processes, which would help ATF and USMS management ensure that controls are implemented as required by policy. We are making a total of seven recommendations, including three to ATF and four to USMS. Specifically: The Director of the U.S. Marshals Service should take steps to ensure that supervisory review of division and district investigations is documented in accordance with USMS policy. (Recommendation 1) The Director of ATF should develop policy for verifying the accuracy and completeness of information in ATF employee misconduct systems. (Recommendation 2) The Director of the U.S. Marshals Service should develop policy for verifying the accuracy and completeness of information in USMS employee misconduct systems. (Recommendation 3) The Director of ATF should develop a performance measure to monitor the timeliness of misconduct investigations, according to policy requirements. (Recommendation 4) The Director of the U.S. Marshals Service should develop a performance measure to monitor the timeliness of district and division misconduct investigations, according to policy requirements. (Recommendation 5) The Director of ATF should modify existing oversight mechanisms to include the monitoring of key internal controls related to employee misconduct investigations. (Recommendation 6) The Director of the U.S. Marshals Service should modify existing oversight mechanisms to fully monitor key internal controls related to employee misconduct investigations. (Recommendation 7) We provided a draft of this product to DOJ for review and comment. DOJ concurred with all of our recommendations and did not provide written comments. ATF and USMS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Attorney General, the ATF Acting Director, the USMS Director, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or McNeilT@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. To assess the extent to which the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and United States Marshals Service (USMS) components implemented key internal controls, we selected a stratified random sample of case files within the population of employee misconduct investigations that were opened by each component from fiscal years 2014 through 2018, and that were considered closed as by USMS as of March 13, 2019, for fiscal years 2014 through 2017 and April 26, 2019, for fiscal year 2018, with corresponding data on the outcomes of the investigations (resulting employee actions) as of March 27, 2019 for fiscal years 2014 through 2017 and May 3, 2019, for fiscal year 2018. ATF data are as of April 9, 2019, for internal investigations and as of August 2, 2019, for management referrals. We also stratified our samples based on whether the case files included adverse actions (a suspension of at least 15 days, demotion or removal) and whether an employee under a misconduct investigation had also filed an Equal Employment Opportunity (EEO) claim of management retaliation to assure that representation from both subgroups were included in our sample. We used fiscal year 2014 through 2018 data from the components’ information systems from which to randomly select a generalizable sample of 65 employee misconduct cases for ATF out of a population of 150 and 100 cases for USMS out of a population of 1,281. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval. This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. The sample was designed to produce 95 percent confidence intervals for percentage estimates that are within no more than plus or minus 10 percentage points within component. The precision is not high enough to generalize to the strata level and results should only be generalized to the component level (i.e. ATF and USMS). As part of these samples, we included investigation that resulted in proposed adverse actions and that involved employees who also submitted an EEO claim of management retaliation. Specifically: For ATF, our sample included 12 cases with proposed adverse actions and nine cases that involved individuals who had also submitted an EEO claim of management retaliation. For USMS, our sample included 12 cases with proposed adverse actions and 12 cases that involved individuals who had also submitted an EEO claim of management retaliation. Because some items we assessed applied only to a subset of cases, resulting in a smaller sample size, we report some findings as the range from the lower to upper bound of the 95 percent confidence interval. In cases with particularly small sample sizes, we describe results for the sample only, rather than attempting to generalize to the population of cases within the component. Triana McNeil at (202) 512-8777 or McNeilT@gao.gov In addition to the contact named above Eric Erdman (Assistant Director), Willie (Billy) Commons III, Dominick Dale, Anthony DeFrank, Justin Fisher, Eric Hauswirth, Ying Long, Amanda Miller, and Mike Tropauer made key contributions to this report.", "summary": "Within the Department of Justice, ATF and USMS employ more than 10,000 staff responsible for protecting communities from violent criminals, investigating the illegal use of firearms, and apprehending wanted persons, among other things. Our recent studies of employee misconduct processes have highlighted the importance of internal controls to help ensure the quality and independence of these processes. We have also reported on employee misconduct investigations being used to retaliate against individuals who report wrongdoing. GAO was asked to review ATF and USMS employee misconduct investigation and disciplinary processes. This report (1) summarizes data on the number, characteristics, and outcomes of ATF and USMS misconduct investigations that were opened from fiscal years 2014 through 2018 and were closed by the time of GAO's review, and (2) examines the extent to which ATF and USMS have developed, implemented, and monitored internal controls for their employee misconduct processes. For each component, GAO reviewed policies, guidance, and performance reports; analyzed case management system data; analyzed random samples of misconduct cases; and interviewed officials involved in investigation and discipline processes. From fiscal years 2014 through 2018, the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and U.S. Marshals Service (USMS) collectively investigated about 3,900 allegations of employee misconduct, as shown in the table below. About one-half of these investigations were closed with no disciplinary action because the components found that the allegations were unsubstantiated. For allegations that were substantiated by an investigation, the most common ATF offenses were poor judgment and failure to adequately secure property, while the most common USMS offenses were general violations of policy or procedure and failure to follow instruction. The most common outcomes for both ATF and USMS substantiated investigations were discipline including suspensions of up to 14 days and lesser penalties such as verbal or written warnings. During this period, ATF and USMS investigated over 300 allegations of management retaliation, with few resulting in discipline. ATF and USMS have developed some internal controls for managing their employee misconduct investigation and disciplinary processes, but have not consistently documented or monitored key control activities. For example: USMS policy requires supervisory review of district and division investigations, but the agency has not consistently documented this control in accordance with policy. ATF and USMS also lack policy for verifing the accuracy and completeness of information in employee misconduct systems. Ensuring supervisory review is documented as required and developing policy for verifying information in misconduct systems would provide greater assurance that controls are operating as intended. ATF and USMS have established policies and goals related to timeliness in completing various types of employee misconduct investigations (e.g., within 120 days). However, ATF has not established performance measures to monitor progress toward meeting the goals. USMS has measures to monitor timeliness for some types of investigations, but not for others. Establishing measures to monitor timeliness of investigations would provide more complete information to ATF and USMS managers responsible for oversight. ATF and USMS have established oversight mechanisms, such as internal management reviews, to monitor certain aspects of the components' operations, such as financial operations. However, ATF and USMS have not fully used these mechanisms to monitor internal controls related to employee misconduct processes, which would help ATF and USMS management ensure that controls are implemented as required by policy. GAO is making seven recommendations, including that USMS ensure supervisory review is documented; and that ATF and USMS develop policy for verifying system information, establish measures to monitor the timeliness of investigations, and improve monitoring of employee misconduct processes. DOJ concurred with our recommendations.", "document_type": "gao"}
{"report": "TSA is responsible for implementing and overseeing security operations at roughly 440 commercial airports as part of its mission to protect the nation’s civil aviation system. TSA is responsible for ensuring that all passengers, their carry-on bags, and their checked baggage are screened to detect and deter the smuggling of prohibited items, such as explosives, into the sterile areas of airports and onto aircraft. Agency procedures generally provide that passengers pass through security checkpoints where their person, identification documents, and carry-on bags are screened by transportation security officers (TSO). TSA uses a variety of screening technologies—screening systems, as well as software and hardware for those systems—to carry out its mission. Figure 1 depicts the various screening technologies a passenger may encounter in primary and secondary security screening. TSA develops detection standards that identify and describe the prohibited items—such as guns, knives, military explosives, and homemade explosives—that each technology is to detect during the screening process. The standards, which are classified, also identify how often the technology should detect prohibited items (referred to as the required probability of detection) and the maximum rate at which the technology incorrectly identifies prohibited items (the probability of false alarm). For explosive materials, the standards also identify what the screening technology is to be able to detect in terms of (1) the minimum amount or weight of the material (the minimum detection mass) and (2) the chemical and physical makeup of the material (density range of the explosive material). S&T supports TSA in the development of standards by, among other things, analyzing the characteristics (threat mass, or the amount of material that constitutes a threat, and density) of explosive materials. The agency uses the resulting data to develop detection standards that are specific to each screening technology. After a detection standard is approved, TSA decides whether to operationalize—put into effect—detection standards by acquiring and deploying technologies to update detection capabilities to meet the standard. That is, it decides whether to take steps to develop new technology capable of meeting the standard and put the new technology in place at commercial airports. Technology can mean new software to upgrade existing screening systems as well as entirely new screening systems. TSA does not always or immediately operationalize detection standards, for reasons which are explained later in this report. To operationalize a detection standard, TSA must acquire technology capable of meeting the standard. TSA officials told us they follow DHS acquisition policies and procedures when acquiring new screening technologies. Officials said they adapt detection standards as detection requirements to guide the acquisition process, meaning the specifications described in the standards are incorporated into the requirements manufacturers must meet when developing new technology. Once manufacturers have developed new technologies that meet detection requirements, the technologies undergo a test and evaluation process, known as the qualification process. The following are key steps in that process: 1. Certification – Certification is a preliminary step in TSA’s qualification process. For TSA to certify that a screening technology meets its detection requirements, S&T’s Transportation Security Laboratory conducts certification testing on a manufacturer’s initial submission of its proposed screening technology to determine whether it meets TSA’s detection requirements (i.e., the rate at which it must accurately detect each category of explosive it is designed to detect, among other things). 2. Integration/Implementation Testing – TSA Systems Integration Facility administers qualification testing to test system performance against additional requirements, such as reliability, availability, and maintainability. TSA also conducts field testing to ensure readiness for operational test and evaluation. 3. Operational Test and Evaluation - TSA deploys units to selected airports to conduct operational testing. Operational testing allows TSA to evaluate the operational effectiveness, suitability, and cyber resiliency of the technology in a realistic environment. After new technologies have been tested and approved, TSA can purchase and deploy them to commercial airports. When a deployed screening system can no longer be updated to meet new detection standards, TSA considers it obsolete and generally designates it for replacement with a newer version of the technology. Figure 2 shows TSA’s process for acquiring and deploying new screening technologies to meet detection standards. DHS guidance provides that its components, including TSA, use risk information about security threats and analysis to inform decision-making. Risk management helps decision makers identify and evaluate potential risks so that actions can be taken to mitigate them. DHS defines a risk assessment as a function of threat, vulnerability, and consequence. DHS guidance also says that risk assessments and transparency are key elements of effective homeland security risk management. TSA has a process to develop new explosives detection standard in response to emerging, credible threats involving a homemade explosive (see sidebar for more information on homemade explosives). According to TSA officials, the first step in the process is to determine whether a new detection standard is needed, which they do by working with S&T and other federal partners to ”characterize” the threat material—that is, identify the chemical and physical properties of the material, such as the threat mass and density. Below is the process (steps) TSA and S&T officials told us they use to characterize a threat material and determine whether a new detection standard is needed. Homemade Explosives Homemade explosives are designed to cause destruction when used in improvised explosive devices. The picture below shows damage to an aircraft panel from a homemade explosive. Beginning in the early 2000s, homemade explosives replaced military and conventional explosives as the preferred tool of terrorists, and challenged the capabilities of existing screening technologies. Unlike conventional threats, homemade explosives are often made of common commercial items and it can be challenging to distinguish them from innocuous gels and liquids stored in personal baggage or cargo. They also have different detonation patterns from conventional explosives in that they often release energy much more slowly, which may lead to incomplete or delayed detonation. This pattern is not well understood, which makes it much more difficult to predict the resulting damage. of the explosive—the minimum amount of the material that constitutes a threat to civil aviation. Material down selection (selection of possible mixtures for testing). Because the exact formulation of the explosive can vary, S&T must test and model various formulations in different proportions to gain an understanding of the homemade explosive. In this step, TSA determines the representative formulations and preparations that are to be prepared and tested, based on data provided by S&T. Synthesis, formulation, and preparation of materials. S&T establishes how the threat material could be made, including its chemical synthesis (as applicable), possible formulations or mixtures of the material with other components, and the preparation of those mixtures. S&T uses this information to develop samples of the threat material for testing. Data acquisition and analysis. S&T examines the samples using micro- computed tomography and explosives detection system, and the resulting data are sent to S&T’s Transportation Security Laboratory for verification. The verified data are then sent to the U.S. Department of Energy’s Lawrence Livermore National Laboratory for analysis. The Transportation Security Administration and the Science and Technology Directorate have ranked 300 conventional and homemade explosives that pose the most likely threat to aviation security based on factors such as availability, stability, performance, and method of initiation. Region of responsibility. Lawrence Livermore National Laboratory generates preliminary results in the form of the “region of responsibility,” which is a map or explosive detection “window” outlining the characteristics of the threat material in terms of density and effective atomic number. These preliminary results are discussed among TSA and S&T stakeholders, with TSA determining the final region of responsibility. The region of responsibility data are used to develop software algorithms that will allow screening technologies to recognize explosive materials whose characteristics fall within the region of responsibility. Detection standard. TSA and S&T also use the region of responsibility data to determine whether the explosive material can already be detected by deployed screening technologies. If screening technologies can already detect the material, TSA will not contract with technology manufacturers to develop a new software algorithm or screening technology. But regardless of whether a new software algorithm or new technology is needed, TSA will draft a new detection standard for the material that, generally, will specify the minimum threat mass and density range to be detected, the acceptable probability of detection, and probability of false alarm. The draft standard is reviewed by TSA senior management before being approved. We found that the work S&T and other stakeholders performed to characterize explosive threat materials was consistent across the threat materials. Specifically, we found that S&T consistently followed the process described to us (as outlined above) for characterizing a threat material in the seven material threat assessments we reviewed. We also reviewed documentation regarding additional testing and analysis S&T performed on select threat materials, and found the additional testing and analyses were performed consistently. TSA has not updated its 2015 guidance for developing new detection standards to reflect key changes in their procedures. In December 2015, TSA issued the Detection Requirements Update Standard Operating Procedure, which a senior official told us served as the agency’s approved guidance for developing detection standards. Our review of the document found that, as of August 2019, it did not accurately reflect (1) designated procedures for developing detection standards, (2) the roles and responsibilities of key stakeholders such as S&T, and (3) TSA’s organizational structure. For example, one way in which the 2015 guidance has not been updated is in the designated procedures it describes for reviewing available intelligence information. Specifically, the guidance calls for an annual assessment of emerging threats, which a senior TSA official told us TSA no longer conducts because relevant emerging threats are now occurring more frequently and intelligence information is processed on an ongoing basis. In another example, the guidance specifies that TSA will form working groups composed of agency officials and stakeholders to assess potential threat materials and develop an analysis plan, and that each working group will define the roles and responsibilities of its members. According to a senior TSA official, the agency does not convene working groups to assess intelligence or develop an analysis plan, although officials regularly meet with stakeholders to discuss the steps needed to characterize new threat materials and document the minutes from these meetings. Finally, while the guidance discusses in detail which TSA offices and management positions are responsible for implementing and overseeing the process, the agency has since reorganized and these offices and positions no longer exist. Therefore, the 2015 guidance is no longer relevant in terms of which offices and positions are responsible for implementing and overseeing the approval of detection standards. Officials told us that, as of August 2019, they had begun revising the guidance to reflect existing standard operating procedures for developing detection standards, but had yet to finalize a draft of the new guidance or document plans or timeframes for completing and approving it. Further, it is not clear to what extent the revised guidance will address designated procedures for developing detection standards, the key roles and responsibilities of stakeholders, and TSA’s new organizational structure. Officials said they had not updated the guidance earlier because both TSA and S&T had been undergoing agency reorganizations. Standards for Internal Control in the Federal Government provides that agencies should identify, on a timely basis, significant changes to internal conditions that have already occurred, such as changes in programs or activities, oversight structure, and organizational structure. Additionally, agencies are to develop and maintain documentation of internal controls, such as policies and procedures necessary to achieve objectives and address related risks. By documenting the processes and procedures TSA uses to develop detection standards, clarifying the roles and responsibilities of stakeholders, and documenting organizational changes, TSA could have better assurance that detection standards are developed in accordance with established policies and practices. Our review of TSA’s steps to develop detection standards from fiscal years 2014 through 2018 found that TSA and S&T did not document all key decisions—those that could potentially affect outcomes—regarding the testing and analyses (characterization) of explosive threat materials and the development of explosives detection standards. We found that TSA and S&T produced a series of detailed material threat assessments to document the characterization of threat materials and consistently developed action memos to justify proposed detection standards. However, we also found that in five of the seven material threat assessments we reviewed TSA and S&T did not consistently document key steps in the testing and analyses of materials, such as how selected samples were prepared for testing. For example, one S&T material threat assessment we reviewed did not document the method used to synthesize (chemically produce) material samples used for testing. Not documenting the method could prevent officials from fully understanding the results of the analysis. Specifically, the assessment noted that there are multiple methods of synthesis, and that the chosen method could affect the makeup of the resulting material and therefore the ability of the screening technologies to detect it. Additionally, while two of the seven material threat assessments cited standard operating procedures for sample preparation for all participating laboratories, three did not cite standard operating procedures for at least one laboratory and two stated that sample preparation information had not been provided by one or more of the participating laboratories. Without documentation, TSA might not have all the necessary information to address future issues involving detection of these materials. We also found four instances in which TSA did not clearly document why select materials were sent for additional testing or did not document key decisions regarding the development and consideration of detection standards. For example, S&T performed additional testing and analysis on select threat materials after the material threat assessment was finalized. However, the documentation of this additional testing left out key elements regarding how and why the additional testing was needed and conducted. The action memo documenting new standards based on the results of the additional testing did not include a justification for why specific threat materials were selected for additional data collection. While a test plan for equivalency testing of one material stated that the additional testing was conducted because data reported in the literature were not considered representative of current threat configurations, similar justification was not included in the action memo justifying changes to the new standard based on the additional testing. Finally, a senior TSA official told us he requested the additional equivalency testing because the values in the previous detection standards appeared to be more conservative than expected and there was no documentation explaining how TSA had arrived at those numbers. According to the official, the previous detection standard was approved before his tenure and the determining officials were no longer with TSA. He also stated that he did not know whether TSA required documentation of testing and analysis when the previous detection standard was being developed. We found that TSA did not document key decisions regarding the development and consideration of detection standards. For example, officials could not provide documentation of conclusions reached on specific key decisions, such as the consideration and decision not to approve a proposed explosives trace detection standard. A senior TSA official said he did not know why the decision had not been documented because the officials involved were no longer with the agency. According to Standards for Internal Control in the Federal Government, documentation is required for the effective design, implementation, and operating effectiveness of an agency. Documentation also provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as a means to communicate that knowledge as needed to external parties. By documenting key decisions regarding the development of detection standards, including instances in which draft standards are not approved, TSA could better ensure that effective decisions are made and that organizational knowledge is retained regardless of changes in personnel. TSA officials said one way to operationalize detection standards—acquire and deploy technologies to update detection capabilities and meet the detection standard—is to update existing screening systems with new technology, such as software or firmware. When possible, the agency installs software as part of routine maintenance. TSA can also deploy new hardware or replace screening systems to update detection capabilities. According to officials, the agency applies an incremental approach to updating existing screening technologies—it updates technologies when manufacturers are able to develop the requisite capabilities and as resources allow—which can take years to complete. According to officials, all fully deployed TSA screening technologies had detection capabilities that met detection standards approved from 2006 through 2012. That is, as of August 2019, TSA’s fleet of screening technologies met detection standards that were approved in 2012 or earlier. For example: Bottled liquid scanner units met a detection standard that was Advanced technology x-ray units met two detection standards, depending on their manufacturer, that were both approved in 2010; and Explosives trace detection units met a detection standard that was approved in 2012. Further, for each screening technology, the agency has approved two to three new detection standards that have not been operationalized, as of August 2019. For example, in addition to the 2006 detection standard for bottled liquid scanner, TSA approved standards for bottled liquid scanner in 2012 and in 2017 that have not been operationalized. TSA officials said they were working to operationalize some of the detection standards approved since 2012. Officials said they were working with manufacturers to develop new technologies to operationalize some of these standards. In other cases they were in the process of deploying new technologies that meet these standards. For example, as of August 2019, TSA was in the process of updating and replacing explosives detection systems to meet a detection standard that was approved in 2014. Officials said they expected to have the entire fleet updated by September 2023. TSA officials said they were also in the process of updating deployed advanced technology x-ray units for one of its two manufacturers to meet a standard that was approved in 2014. For more information about the detection standards TSA had approved for each technology as of August 2019, and the status of TSA’s progress in operationalizing them, see appendix I. TSA shares information about the capabilities it needs with manufacturers through requests for proposal, requests for information, and broad agency announcements. The agency places approved technologies on a qualified products list—a list of technologies that have been tested and certified as meeting requirements by TSA and DHS—and the agency can then award a contract to one of the manufacturers to purchase and deploy the technology. Before deploying technologies to airports, TSA conducts testing to ensure consistency in the manufacturing process, system configuration, and functionality following production, and then again after the technology is installed at airports. Our analysis of the acquisition information TSA provided found it took from 2 to 7 years to fully develop, certify, test, and deploy screening technologies to airports. For example, when operationalizing explosives trace detection standard 5.0, it took one manufacturer 4 years and a second manufacturer 7 years to develop, and for TSA to deploy, the software needed to update the capability of existing explosives trace detection units to meet the new standard. Figure 3 provides our analysis of TSA’s timeline for operationalizing advanced imaging technology detection standards approved from 2010 through 2016. TSA officials said they approved detection standard 3.3 for advanced imaging technology in October 2010 and began deploying technology that met that standard to airports in August 2011. Officials said they approved a subsequent standard, 4.1, in January 2012, began deploying technology to meet it in October 2014, and completed the deployment in September 2017. Officials said it took 3 years to complete deployment because the demand for advanced imaging technology increased over time as airports experienced an increase in passenger volumes, among other reasons. Since 2012, TSA approved two additional detection standards for advanced imaging technology—4.3 in February 2016 and 4.3.1 in August 2016. TSA officials said they have not operationalized these two standards because the manufacturer has not been able to develop the requisite technology. As such, deployed advanced imaging technology units meet standards approved in 2010 and 2012. TSA officials stated that they do not always, or immediately, operationalize detection standards after they are approved. They said they make these decisions on a case-by-case basis, depending on many factors. These include whether: (1) manufacturers have the technological ability, (2) a new technology is in development, and (3) screening technologies already have the capability. Manufacturers do not have the technological ability. TSA officials said manufacturers do not always have the technical ability to meet detection standards. According to officials, it can be challenging for manufacturers to develop the technology necessary to detect new threats as presented in a detection standard, and in some cases impossible without further research and development. For example, TSA officials said that manufacturers have been unable to develop the requisite technology to meet the most recent detection standards (4.3 and 4.3.1) for advanced imaging technology. However, TSA officials said they have expanded their research and development efforts to try to develop the technology. TSA officials told us they plan to continue developing detection standards irrespective of the capabilities of currently deployed technologies so that they can focus on identifying emerging threats. The new detection standards then serve to set expectations for manufacturers about the capability to which they should aspire and justify research and development necessary to realize that capability. To better manage the difference between the capabilities of deployed technologies and the capabilities described in detection standards, TSA officials said they are in the process of developing a new position of Capability Manager, who would be responsible for managing the development of mission-essential capabilities—such as carry-on baggage screening—from start to finish. Officials said they expect this position will help bridge the gap between approved detection standards and the detection capabilities of deployed screening technologies over time, because the managers will have cross- cutting oversight of the process. A new technology is in development. Officials said that they may not operationalize a detection standard if they expect a new type of screening technology will replace an existing one. For example, officials said that TSA is exploring new alarm resolution technologies—that is, screening technologies that are used to determine whether alarms are false positives. Officials said new alarm resolution technologies may replace the bottled liquid scanner in the future, and therefore they have not pursued operationalizing detection standard 2.3. Screening technologies already have the capability. According to TSA officials, new detection standards do not always add significant detection capabilities. For example, officials decided not to operationalize bottled liquid scanner detection standard 3.0 when it was approved in 2017 because the deployed units already had most of the capabilities called for in the detection standard; TSA developed the new standard to better align with standards for other technologies. Our review of TSA acquisition documents found that TSA considers risk at the beginning of the screening technologies acquisition process.. Specifically, the agency considers risk in two phases—(1) a risk assessment developed from intelligence information and modeling tools, and (2) an annual capability analysis that analyzes and prioritizes capability gaps and determines mitigation options. Figure 4 provides an overview of TSA’s acquisition process for new screening technologies. Risk assessment. TSA uses intelligence information and modeling tools, such as the Risk and Trade Space Portfolio Analysis, to assess risk to the aviation system. The Risk and Trade Space Portfolio Analysis was developed in 2014 to analyze the security effectiveness of alternate combinations of some aviation security countermeasures. Officials said a recent example of a risk-informed deployment decision influenced by the Risk and Trade Space Portfolio Analysis was TSA’s 2017 deployment of 141 advanced imaging technology units to category III and IV airports. Officials said that around 2014, TSA received intelligence about a potential terrorist threat to airports, as well as the results of covert testing at airports that identified screening vulnerabilities. Officials said a 2014 Risk and Trade Space Portfolio Analysis also identified disparities in screening capabilities at smaller airports. In part because of the vulnerability identified by these three factors, as well as ongoing conversations between TSA senior leadership, the DHS Inspector General, and members of Congress, officials said TSA procured and deployed additional advanced imaging technology units to some category III and IV airports that did not have them. Capability analysis. TSA uses the Transportation Security Capability Analysis Process, a structured decision-making tool, to identify and prioritize capability gaps and help direct agency resources towards closing critical gaps to an acceptable level. When existing screening capabilities do not fully meet TSA’s mission needs, the associated capability gap presents a security risk. As part of the Transportation Security Capability Analysis Process, TSA produces Capability Analysis Reports that identify and recommend solutions to closing capability gaps. Recommendations have included procedural changes, such as new training for TSOs, and investments in new technology. TSA’s investment in computed tomography technology for checkpoint screening of carry-on baggage is an example of TSA’s implementation of the Transportation Security Capability Analysis Process to validate capability gaps and identify recommended courses of action. Officials said that in some cases the agency may identify a capability gap that cannot be resolved to an acceptable level with commercially available screening technology, in which case it will pursue additional research and development. TSA officials told us that they operate under the assumption that every airport is a possible entry point into the aviation system for a terrorist, and they do not consider there to be a significant difference in vulnerability among airports when deploying screening technologies. However, officials did not provide analysis or documentation that supported this conclusion. Officials noted the exception to this assumption is a handful of airports that are consistently considered to be the highest risk because of known threats and a high volume of international travelers. Further, officials said that if they had information about a threat to a specific airport that would be mitigated by deploying a screening technology, they would modify their plans for deployment accordingly. However, TSA’s process for how it would change its deployment plans to specific airports based on risk lacks transparency. For example, officials said that as part of the acquisition process they have ongoing discussions with stakeholders about their deployment strategies, including security and intelligence officials who would inform them of any relevant risk information. Officials said these discussions are generally informal and not documented—it was unclear how these discussions have incorporated information about risk in the past, and officials could not provide an example of when risk information at specific airports had directly influenced deployment of technologies to airports in the recent past. In 2018, the agency released its Transportation Security Administration Systems Acquisition Manual, which called for deployment plans to be written documents, and officials said they began documenting their plans for deploying screening technologies in the last two years. TSA officials provided us with one deployment plan—for their 2018 deployment of explosives trace detection units—but we found that it was not transparent about how risk was a factor in officials’ methodology for determining the order of airports to receive the technology. The explosives trace detection plan documented TSA’s schedule of deployment and the roles and responsibilities of relevant stakeholders, among other things. However, while the plan indicated that officials would coordinate with relevant offices within the agency for information about risks that might impact their deployment strategy, we found that the plan did not document how risk had informed their decisions about where and how to deploy the technology, including the assumptions, methodology, and uncertainties considered. Additionally, TSA officials did not document, and could not fully explain, how risk analyses contributed to and factored into the following specific deployment decisions. Deployment of advanced imaging technology to smaller airports. Officials said many factors influenced their decision to deploy advanced imaging technology units to category III and IV airports, including information about threats and a related 2014 risk analysis. However, officials did not document their decisions and could not fully explain their risk analysis, including their process for analyzing and weighing relevant factors. According to officials, the decision was made during discussions with senior leadership, which were risk-informed and supported by whiteboard analyses and classified documents. Additionally, officials told us that, for practical reasons, they deployed units to those category III and IV airports that had the space to accommodate them, but did not further assess the priority of deployment among the smaller airports because they had determined that the risk was uniform and because they planned to deploy the units within a short timeframe. Officials did not document the risk assessment that led to this determination, and could not explain how the three elements of risk—threat, vulnerability, and consequence—were used or assessed. Deployment of targeted threat algorithm. In 2016, TSA deployed a targeted threat algorithm—software to improve detection capabilities—to a limited number of advanced imaging technology units in response to a specific threat. After testing the operational impacts of the software algorithm, the agency decided to stop further deployment. The documentation TSA provided did not explain how officials had analyzed the risk-mitigation benefits of the algorithm, including the underlying assumptions and uncertainty, or how they had weighed those benefits against the operational impacts and costs when they made their decision not to fully deploy the algorithm. TSA officials said they follow the DHS acquisition process to acquire and deploy technologies and their deployment decisions are based on, and informed by, their initial assessments of capability gaps, as well as their understanding that every airport offers equal entry into the aviation system. However, officials had not documented the rationale for these decisions and could not fully explain how risk had informed their decisions about where and in what order to deploy screening technologies. DHS’s Risk Management Fundamentals states that components should consistently and comprehensively incorporate risk management into all aspects of the planning and execution of their organizational missions. Additionally, it says transparency is vitally important in homeland security risk management, and documentation should include transparent disclosure of the rationale behind decisions, including the assumptions, methodology, and the uncertainty considered. By fully disclosing what risk factors are weighed and how decisions are made, TSA officials can better ensure that their deployment of screening technologies matches potential risks (threats, vulnerabilities, and consequences). This is of particular importance given the agency’s limited resources and the fact that screening technologies are not easily relocated. TSA officials said that absent a specific risk to an airport or category of airports that would be mitigated by deploying a screening technology, they consider a number of logistical factors that are aimed at maximizing the operational efficiency of the screening process. These factors influence the number of units of a technology the agency deploys to airports, the order in which they deploy them, and where they are deployed. Officials said they use modeling software to determine the most efficient number of units to allocate to an airport for each type of screening system. This analysis takes into account variables such as the number of flights at an airport, airport passenger volumes, items per passenger, and secondary search rates. Additionally, agency officials said the layout of an airport is a significant determining factor for the number of units it receives. For example, an airport that has centralized checked baggage screening areas will need fewer explosives detection systems than an airport that has checked baggage screening areas dispersed in different locations. Additionally, TSA officials said that logistical and funding factors can influence the order of deployment, including the manufacturer’s ability and resources to develop and deliver technologies. For example, as of June 2019, officials said the agency was in the process of updating the detection capabilities of 62 percent of its advanced technology x-ray fleet because one of its two manufacturers had completed testing and certification of the new technology, but the second manufacturer’s technology had yet to be certified. Officials said they also try to plan their deployment schedule around minimizing disruptions to airport operations, so if an airport could not absorb a full deployment of a technology because it would affect too many passengers, TSA would schedule the deployment in phases to minimize disruptions. Further, TSA officials said that, as a result of these many logistical considerations, they generally fully deploy new screening technologies to category X airports first—generally, airports with the highest passenger volumes—and then proceed in order down to the airport with the lowest passenger volume. Officials said larger airports generally have the infrastructure in place to incorporate new technology without extensive disruption to operations, and they will screen the most passengers by deploying screening technologies to the largest airports first. TSA practices do not ensure that screening technologies continue to meet detection requirements after they have been deployed to airports. According to agency officials, the agency uses certification to confirm that technologies meet detection requirements before they are deployed to airports, and calibration to confirm that technologies are at least minimally operational while in use at airports. Officials stated these processes are sufficient to assure TSA that screening technologies are operating as intended. However, while certification and calibration serve important purposes in the acquisition and operation of screening technologies, they have not ensured that TSA screening technologies continue to meet detection requirements after they have been deployed. Certification occurs prior to deployment. TSA’s certification process is designed to ensure screening technologies meet detection requirements during the acquisition process, prior to the procurement and deployment of the technologies, but it does not ensure screening technologies continue to meet detection requirements after deployment. As previously described, manufacturers provide an initial submission of the screening technology to TSA for certification testing as part of the acquisition process. During the certification process, S&T’s Transportation Security Laboratory tests the technology under controlled conditions to determine whether it meets TSA’s detection requirements. After TSA certifies that a screening technology meets detection requirements and it undergoes additional testing to determine whether it meets other TSA requirements in controlled testing facilities, TSA may deploy it to select airports for operational testing and evaluation to determine how it performs in an airport setting. Certification testing demonstrates that a manufacturer’s screening technology meets detection requirements during the acquisition process, which allows TSA to determine whether it should continue to consider the technology for acquisition. Certification does not ensure that deployed technologies continue to meet detection requirements because it does not account for the possibility that performance of technologies can degrade over time throughout the technologies’ lifecycles after deployment. For example, in 2015 and 2016, DHS removed a sample of deployed explosives trace detection and bottled liquid scanner units from airports for testing in the Transportation Security Laboratory. The laboratory concluded that some deployed units for each technology it tested no longer met detection requirements— either the required probability of detection for certain explosives or the required rate for false alarm, or both. One explosives trace detection unit that was tested was found to have a probability of detection much lower than required. According to TSA officials, the units did not meet detection requirements because they were not adequately maintained, which affected their performance. In light of this, officials stated that they introduced better controls to ensure that routine preventative maintenance is performed as required. However, because TSA does not test the units after they are deployed to airports, it cannot determine the extent to which these controls ensure technologies continue to meet detection requirements. Officials noted that TSA uses a layered security approach at airports, so if one layer should fail—such as a deployed technology—the agency can still rely on other security measures among the various layers of security to detect threats. We have previously reported on the importance that TSA ensure each measure is effective to make the best use of its limited resources, in order to serve its aviation security mission. Calibration does not test whether technologies meet detection requirements. TSA officials stated that daily calibration also helps ensure that screening technologies continue to meet detection requirements after deployment. However, while calibration demonstrates that the screening technology is at least minimally operational, it is not designed to test whether the screening technology meets detection requirements. For example, each explosives detection system is calibrated with an operational test kit that contains items of various densities. To calibrate explosives detection systems, a TSO must run the operational test kit through the unit and verify that the item is correctly displayed on the monitor (see figure 5 below). This process demonstrates whether the system can identify the known items’ densities, but it does not ensure that the system meets detection requirements. As a result, calibration could indicate that the unit is functioning even when its detection capabilities have degraded—that is, calibration determines that the technology is functional, but it does not ensure that the technology is meeting detection requirements. TSA officials stated that they plan to develop a process to review screening technologies on an annual basis to analyze their performance, including detection over time. TSA officials stated that, as of August 2019, they were actively working on developing a review process for the explosives detection system but did not have a date for when they planned to complete it. TSA officials for the passenger and carry-on screening technologies stated that they had not yet started developing a review process for those technologies and the timeline for developing a review process will depend on funding. TSA officials also noted that there are challenges in designing a process to ensure that screening technologies continue to meet detection requirements after deployment. For example, TSA and S&T officials stated that it is not feasible to conduct live explosives testing in airports. Further, according to TSA officials, while it is relatively easy to temporarily transfer smaller screening technologies, such as explosives trace detection and bottled liquid scanner units, to a controlled setting for live explosives testing, it would not be feasible to transfer larger installed units, such as advanced imaging technology. Although testing with live explosives in an airport poses undue risks and transferring larger machines for testing may be costly, TSA could develop other measures. TSA officials stated that there is no requirement to ensure that its screening technologies continue to meet detection requirements after deployment to airports. However, Standards for Internal Control in the Federal Government calls for agencies to establish and operate a system to continuously monitor the quality of performance over time. Without taking additional steps to ensure screening technologies are meeting detection requirements, TSA may run the risk that its deployed screening technologies are not detecting explosives and other prohibited items. Developing and implementing a process to monitor screening technologies’ detection performance over time would help provide TSA assurance that screening technologies continue to meet detection requirements, as appropriate, after deployment. In doing so, TSA would also be better positioned to take any necessary corrective actions if or when screening technologies no longer operate as required. We estimate that TSA spent $3.1 billion to purchase, deploy, install, and maintain its inventory of screening technologies as of the end of fiscal year 2018, based on agency estimates of costs. Of this $3.1 billion, we estimate that TSA spent 71 percent to purchase screening technologies, 9 percent to deploy, about 12 percent to install, and, for fiscal year 2018, about 9 percent to maintain them for 1 year. The highest estimated total expenditures on a per-technology basis were for explosives detection systems ($2.1 billion, or 68 percent), advanced technology x-ray ($443 million, or 14 percent), explosives trace detection ($227 million, or 7 percent), and advanced imaging technology ($197 million, or 6 percent). Table 1 provides information on estimated expenditures for TSA’s September 2018 inventory of screening technologies, by screening technology and life-cycle phase (i.e., purchase, deploy, install, and maintain). Appendix III provides additional information on estimated TSA expenditures, such as prices per unit of technology and estimated expenditures by airport category. TSA has also incurred costs, or has plans to incur costs, for additional actions related to screening technologies. Specifically, it has also incurred costs for modifications to commercial airport facilities to accommodate screening technologies. Further, TSA estimates additional life-cycle costs of $804 million to acquire, deploy, and maintain computed tomography systems through fiscal year 2026. The following provides more information on these estimated expenditures. Airport modifications. TSA incurs costs related to modifying commercial airports to accommodate certain screening technologies, such as checked baggage screening systems (e.g., explosives detection systems). In December 2017, we reported that TSA had obligated at least $783 million from fiscal years 2012 through 2016 to reimburse airports for the allowable design and construction costs associated with installing, updating, or replacing screening technology. For example, TSA may enter into agreements to reimburse airport operators for a percentage of the allowable design and construction costs associated with facility modifications needed for installing, updating, or replacing in-line explosives detection systems. In-line screening systems use conveyor belts to route checked luggage through explosives detection systems, which capture images of the checked baggage to determine if a bag contains threat items not permitted for transport, including explosives. From fiscal years 2012 through 2016, agreements for TSA reimbursements to airports for checked baggage screening systems generally ranged in value from $50,000 to $150 million. As we reported in December 2017, in general, depending on the airport’s size, TSA will reimburse 90 or 95 percent of the allowable, allocable, and reasonable cost of certain projects. For other projects, TSA may provide 100 percent reimbursement—for example, where existing systems require the correction of security or safety deficiencies. Computed tomography. In addition to its fiscal year 2018 inventory, TSA is currently in the process of deploying computed tomography to commercial airports to replace advanced technology x-ray systems. Computed tomography technology applies sophisticated algorithms to detect explosives and other prohibited items and creates a 3D image of carry-on baggage that a TSO can view and rotate 360 degrees. In fiscal year 2018, TSA determined that computed tomography is the best technology available to address rapidly evolving threats in the transportation sector, and plans to eventually deploy it to all checkpoints and replace advanced technology x-ray technology. As recorded in TSA’s Deployed Locations Report, TSA had deployed 11 computed tomography systems to category X and I airports as of September 24, 2018. According to TSA’s September 2018 life-cycle cost estimates, the agency plans to field 883 units by fiscal year 2026. As shown in table 2, TSA also planned to spend $805 million to purchase, deploy, and maintain this new technology through fiscal year 2026. However, in August 2019, TSA officials told us that they expect this estimated total procurement cost of $805 million to likely decrease as the per unit cost had decreased from $400,000 to $233,000 in the initial fiscal year 2019 contract for computed tomography. TSA has invested billions of dollars in screening technologies as it responds to terrorists’ attempts to use homemade explosives to disrupt and damage civil aviation. Forecasted increases in passenger volumes and ongoing terrorist threats make it imperative that TSA employ recommended management and internal control practices. TSA could help ensure that critical detection standards are developed in accordance with approved practices, and that agency goals are effectively met by updating its guidance for developing standards. Additionally, by documenting key decisions in the development of detection standards, TSA could better assure the effectiveness of decision-making and the retention of organizational knowledge in the face of inevitable changes in personnel. Similarly, when making technology deployment decisions, incorporating DHS-recommended practices for risk management would improve TSA’s ability to effectively fulfill its mission to secure the nation’s civil aviation system. While TSA assesses risk when deciding whether to invest in a new technology to address an identified capability gap, it is unclear the extent to which it considers risk when determining where and in what order to deploy approved screening technologies to airports. DHS guidance for homeland security risk management calls for risk to be considered consistently and comprehensively in all aspects of an agency’s work. Additionally, risk management includes transparent disclosure of the rationale behind decision-making so that stakeholders can understand how key factors were weighed. Incorporating these risk management principles into its decision-making for deploying screening technologies to airports would allow TSA to align its deployment strategies with potential threats, vulnerabilities, and consequences. Lastly, TSA cannot ensure that its screening technologies continue to meet detection requirements after they have been deployed to airports. Developing and implementing a policy to ensure that TSA’s screening technologies continue to meet their respective detection requirements after deployment may assure the agency that its deployed screening technologies are effectively detecting explosives and other prohibited items that they are designed to identify, which is a critical part of TSA’s mission. We are making the following five recommendations to TSA: The TSA Administrator should update TSA guidance for developing and approving screening technology explosives detection standards to reflect designated procedures, the roles and responsibilities of stakeholders, and changes in the agency’s organizational structure. (Recommendation 1) The TSA Administrator should require and ensure that TSA officials document key decisions, including testing and analysis decisions, used to support the development and consideration of new screening technology explosives detection standards. (Recommendation 2) The TSA Administrator should require and ensure that TSA officials document their assessments of risk and the rationale—including the assumptions, methodology, and uncertainty considered—behind decisions to deploy screening technologies. (Recommendation 3) The TSA Administrator should develop a process to ensure that screening technologies continue to meet detection requirements after deployment to commercial airports. (Recommendation 4) The TSA Administrator should implement the process it develops to ensure that screening technologies continue to meet detection requirements after deployment to commercial airports. (Recommendation 5) We provided a draft of this product to DHS for comment. We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reproduced in full in appendix IV. DHS concurred with our five recommendations and described actions undertaken or planned to address them. TSA also provided technical comments, which we incorporated as appropriate. With regard to our first recommendation that TSA update guidance for developing and approving screening technology explosives detection standards, DHS concurred and stated that TSA has included updated guidance in its Requirements Engineering Integrated Process Manual, which was completed in September 2019. According to DHS, the update provides TSA’s process for developing and approving explosives detection standards, including designated procedures and roles and responsibilities of stakeholders, and reflects organizational changes to TSA. TSA provided us with the Requirements Engineering Integrated Process Manual in November 2019, concurrent with DHS comments. We will review the update and the extent to which it addresses the recommendation. This action, if fully implemented, should address the intent of the recommendation. DHS concurred with our second recommendation that TSA ensure that officials document key decisions supporting the development of screening technology explosives detection standards. DHS stated that the updated Requirements Engineering Integrated Process Manual describes the process for documenting key decisions, including testing and analysis decisions, in the development of new detection standards. We will review the update and the extent to which it addresses the recommendation. This action, if fully implemented, should address the intent of the recommendation. DHS also concurred with our third recommendation that TSA document its assessments of risk and the rationale behind its decisions to deploy screening technologies. According to DHS, TSA has instituted an improved process for documenting elements that contribute to deployment decisions—TSA’s August 2019 deployment plan for computed tomography is an example of the process. DHS stated that TSA will continue to include a comparable level of documentation in future deployment plans for screening technologies. We agree the computed tomography deployment site selection strategy is an example of how TSA can document the rationale governing the deployment of a screening technology. Future plans can further benefit by explaining the risk analysis itself along with the role that risk considerations played in the selection of airports for deployment. Formalizing guidance that directs TSA officials to document risk assessments and the rationale behind deployment decisions would help TSA ensure that its deployment of screening technologies matches potential risks. DHS concurred with our fourth and fifth recommendations that TSA, respectively, develop and implement a process to ensure that screening technologies continue to meet all detection requirements after deployment to commercial airports. DHS stated that TSA will develop recurring individual post implementation reviews (PIR) for all screening technologies in accordance with DHS Directive 102-01, to assess multiple aspects of system performance, including detection over time. DHS also stated that TSA intends to examine the component performance of the detection chain rather than a direct measure of detection requirements, due to the limitations of using live explosives and simulants. DHS stated that because the detection chain for each technology is unique and will require individual reviews, TSA is developing a policy on the PIR development process, which it estimates will be completed by March 31, 2020. We appreciate the limitations live explosives and simulants present in testing and the need for reviews that are tailored to meet the unique characteristics of each screening technology. TSA plans to implement the review process on the first screening technology by December 31, 2020. These actions, if implemented across all applicable screening technologies, should address the intent of the recommendations. We are sending copies of this report to the appropriate congressional committees and to the Acting Secretary of Homeland Security. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix V. This appendix presents additional details on the TSA screening technologies we reviewed, including their function and the number of units deployed. This report addresses Transportation Security Administration’s (TSA) processes for developing and deploying screening technologies to airports regulated by TSA (i.e., “commercial” airports). Specifically, we examined 1. the extent to which TSA has a process for developing explosives detection standards for screening technologies in response to identified emerging threats; 2. how TSA operationalizes detection standards to update detection capabilities; 3. the extent to which TSA has considered risk when deploying screening technologies to commercial airports; 4. the extent to which TSA ensures screening technologies meet the requirements for detection standards after deployment; and 5. TSA estimated expenditures to purchase, deploy, install, and maintain its inventory of screening technologies as of the end of fiscal year 2018. To address all of our objectives, we identified 11 screening technologies TSA used to screen passengers’ identification documents, person, carry- on bags, and checked baggage at commercial airports as of September 24, 2018, as recorded in TSA’s Government Property Management database. The seven screening technologies in use at commercial airport passenger checkpoints were advanced imaging technology, advanced technology x-ray machine, bottled liquid scanner, boarding pass scanner, chemical analysis device, threat image projection x-ray, and walk-through metal detector. The credential authentication technology and computed tomography, also used at checkpoint screening, were deployed and in use at select airports as TSA pilot projects. The two TSA screening technologies in use at commercial airports for checked baggage were explosives detection systems and explosives trace detection (TSA also uses explosives trace detection for checkpoint screening). We assessed the reliability of TSA’s inventory data by interviewing agency officials and reviewing related documentation, such as the database user manual, among other things. We determined the data were sufficiently reliable to determine the type and number of TSA screening technologies deployed as of September 2018. To better understand how TSA screening technologies have been used, we reviewed reports from the U.S. Department of Homeland Security (DHS) Office of the Inspector General, the Congressional Research Service, past GAO reports, and relevant DHS and TSA documentation, such as DHS and TSA strategic documents and acquisition plans. To observe TSA screening procedures and the operation of screening technologies in the airport setting, we conducted site visits to seven commercial airports. During these visits we discussed screening technology issues with TSA federal security directors or their representatives. We selected these airports to reflect a range of airport categories, technologies, and geographic diversity. The results of these site visits and interviews cannot be generalized to all commercial airports, but they provided us with important context about the installation, use, and maintenance of TSA screening technologies across the different types of airports that TSA secures. We also conducted a site visit to the TSA Systems Integration Facility to better understand how screening technologies are tested and evaluated prior to deployment. Further, we interviewed officials from two industry associations and one screening technology manufacturers association based on input from TSA and DHS Science and Technology Directorate (S&T) officials. To determine the extent to which TSA has a process for developing explosives detection standards, we examined TSA documents such as approved detection standards, action memos summarizing support for proposed detection standards, the Detection Requirements Update Standard Operating Procedure, and briefing slides describing TSA’s process, as of August 2019, for assessing threat materials and developing detection standards. We also evaluated Material Threat Assessment reports that summarized the testing and analyses performed by S&T’s Homemade Explosives Characterization Program, in coordination with S&T laboratories, to characterize (identify the physical density and mass of) explosive materials for detection standards developed from fiscal years 2014 through 2018. We evaluated S&T’s testing and analyses in accordance with TSA and S&T guidance to determine the extent to which these steps were consistent across materials; we did not analyze the sufficiency of the testing and analyses. We also assessed TSA and S&T processes and the extent to which they were documented in accordance with Standards for Internal Control in the Federal Government, and discussed the details of steps taken to develop standards with relevant TSA and S&T officials. In addition, we conducted a site visit to S&T’s Commercial Aircraft Vulnerability and Mitigation Program testing site at the U.S. Army Aberdeen Test Center, Maryland, to better understand how S&T tests the vulnerability of commercial aircraft to explosive materials. To understand TSA’s process and timelines for operationalizing—putting into effect—detection standards, we requested information from TSA about screening technologies subject to explosives detection standards, deployed as of September 24, 2018: advanced imaging technology, advanced technology x-ray, bottled liquid scanner, explosives detection systems, and explosives trace detection. We requested information about the detection standards that deployed screening technologies met, as of August 2019, as well as subsequently approved detection standards, including the date the standards were approved, the dates when TSA achieved certain acquisition milestones when developing and deploying the associated technologies, and the status of ongoing and upcoming efforts to update detection capabilities to meet new standards. We identified the acquisition milestones by reviewing a past GAO report on TSA’s acquisition process and in consultation with GAO acquisition experts. We also reviewed a classified TSA report that evaluated the performance of a particular algorithm in order to understand TSA’s process for developing new screening technologies to meet detection standards. In addition, we reviewed relevant acquisition documents, such as DHS’s Acquisition Management Instruction 102, the 2018 Transportation Security Administration Systems Acquisition Manual, acquisition decision memos, acquisition plans, and Operations Requirements Documents. To understand TSA’s process for deciding whether to operationalize detection standards, we requested and reviewed available documentation for the standards that TSA had not operationalized, such as an operational status transition memo for bottled liquid scanner, and interviewed TSA officials about those decisions. To understand how TSA had considered risk in its approach to deploying screening technologies at airports, we reviewed available documentation related to TSA’s deployment decisions. These included decision memos from acquisition review board meetings and action memos to TSA leadership; risk registers for checked baggage and checkpoint acquisition programs; available deployment plans, such as the agency’s Action Plan for deploying explosives trace detection units to airports in 2018; and acquisition guidance. To understand how TSA assesses capability needs and gaps, we interviewed agency officials about TSA’s Transportation Security Capability Analysis Process and reviewed capability analysis reports from 2018 and 2019, as well as TSA’s prioritized list of capability gaps and needs. We also interviewed acquisition officials, including TSA’s Component Acquisition Executive, about the role of risk in deployment decisions and requested written responses to specific questions. We assessed TSA’s decision-making process for deploying and updating screening technologies, generally, against DHS risk management criteria, such as DHS’s Risk Management Fundamentals. We also reviewed related areas of risk management and decision-making to understand the context in which TSA makes deployment decisions. Specifically, we reviewed the 2017 Transportation Sector Security Risk Assessment and the Cities and Airports Threat Assessment reports to understand the risks facing the nation’s aviation system. We also reviewed TSA’s enterprise risk management framework, such as the Enterprise Risk Management Policy Manual, to understand the role it played in TSA’s deployment decisions. We also interviewed an official from TSA’s Enterprise Performance and Risk office and the Executive Risk Steering Committee. To understand how TSA categorizes airports, we reviewed a 2017 Nationwide Airport Categorization Review memo from TSA’s Security Operations office and interviewed Security Operations officials. To understand how TSA deploys screening technologies across airports and categories of airports, we analyzed TSA’s Deployed Locations Report, which reported on technologies that were in use or available for use at commercial airports from September 24 through September 30, 2018. We also reviewed TSA’s standardized methodology for determining the most efficient number of screening technologies at an airport. Additionally, we reviewed TSA’s Strategic Five-Year Technology Investment Plan from 2015 and the 2017 Biennial Refresh to understand TSA’s plans for ongoing investment in screening technologies. We reviewed various throughput data, such as annual passenger throughput for all commercial airports for fiscal year 2018 and enplanements data for calendar year 2017, to understand and compare TSA’s allocation of screening technologies with throughput data across airports and airport categories. We used this analysis to identify airports that had an unusually large or small number of screening technologies within a category, and interviewed TSA officials to understand the decisions that led to the allocation of screening technologies across airports and airport categories. In addition, we reviewed the status of TSA’s limited deployment of computed tomography units to checkpoints. Specifically, we reviewed TSA’s 2018 Deployment Site Selection Strategy, which described the airports to which TSA would deploy computed tomography units and the methodology it used to select them, slides from recent conferences TSA held with industry representatives where it shared its plans for transitioning to computed tomography, and relevant Operational Requirements Documents. We also interviewed agency officials about their plans for the limited deployment and TSA’s transition from advanced technology x-ray to computed tomography for checkpoint screening. To determine the extent to which TSA ensures its screening technologies continue meeting detection requirements after deploying them to airports, we reviewed TSA acquisition detection requirements for each screening technology as well as TSA guidance related to the testing and evaluation of screening technologies identified by TSA officials in interviews. We also interviewed TSA and S&T Transportation Security Laboratory officials about TSA requirements to test screening technologies, both prior to and after deployment, to determine the extent to which they meet detection requirements. We also observed transportation security officers and a transportation security specialist for explosives conduct verification and calibration procedures on screening technologies at the airports we visited. We reviewed TSA guidance to determine the extent to which its procedures ensure that screening technologies continued to meet detection requirements in airports. We then evaluated the procedures against Standards for Internal Control in the Federal Government for monitoring. To identify TSA’s estimated expenditures to purchase, deploy, install, and maintain its inventory of screening technologies as of the end of fiscal year 2018, we reviewed TSA programs’ life-cycle cost estimates, which, for the purposes of acquisition planning, provide per unit estimates of the cost to purchase, deploy, install, and maintain passenger and checked baggage screening technologies. We chose this methodology in consultation with TSA officials and after determining that historical records of obligations and expenditures do not provided consistent and sufficient detail for the purposes of our analysis. The life-cycle cost estimates include relevant phases for each screening technology (i.e., purchase, deploy, install, and maintain), although not all technologies have cost estimates for each phase of the life cycle. For example, some screening technologies may not specify deployment costs because such costs are included in the initial purchase price of the unit. In other cases, the technology does not have a deployment cost because the unit is small and portable, and placement of the unit is therefore handled by TSA airport staff at no charge. Estimated expenditures for installation also include costs associated with site acceptance testing, which is performed when a system is installed at its operational location. Unlike the purchase, deploy, and install unit prices, the maintenance unit price is the yearly cost of maintenance for one unit, and therefore recurs every year. We assessed the reliability of the life-cycle cost estimates by reviewing documentation on the development of the estimates and interviewing TSA officials, among other things, and determined the estimates were sufficiently reliable for the purpose of estimating the amount of funds spent on acquiring, deploying, installing, and maintaining TSA’s inventory of screening technologies as of the end of fiscal year 2018. Because the life-cycle cost estimates were developed in different years, we used TSA guidelines to adjust costs for inflation and convert our estimates to 2018 dollars. We multiplied these estimates against the number of screening technologies deployed to commercial airports as of September 24, 2018, using data from TSA’s Government Property Management database. For computed tomography, we also obtained information on price and quantity from the technology’s life-cycle cost estimate and TSA officials. We also reviewed prior GAO work on TSA cost sharing programs for airport facility modification related to installation of some of the technologies in our review. We conducted this performance audit from April 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We estimate that TSA spent $3.1 billion to purchase, deploy, install, and maintain its inventory of screening technologies, as of the end of fiscal year 2018, based on agency estimates of costs. Tables 3 through 5 provide information on estimated TSA expenditures by screening technology, life-cycle phase, and airport category. To analyze TSA’s estimated spending to purchase, deploy, install, and maintain its inventory of screening technologies as of the end of fiscal year 2018, we reviewed TSA life-cycle cost estimates, which, for the purposes of acquisition planning, provide per-unit estimates of the cost to purchase, deploy, install, and maintain passenger and checked baggage screening technologies at TSA-regulated airports (i.e., “commercial” airports). Because the life-cycle cost estimates were developed in different years, we used the same guidelines used by TSA to adjust costs for inflation to convert our estimates to 2018 dollars. We multiplied these estimates against the number of screening technologies deployed to commercial airports as of September 24, 2018. In addition to the contact named above, Kevin Heinz (Assistant Director), Barbara Guffy (Analyst in Charge), Kelsey Burdick, Jonathan Felbinger, Tyler Kent, Thomas Lombardi, Erin O’Brien, Kya Palomaki, Rebecca Parkhurst, and Dina Shorafa made key contributions to this report. In addition, key support was provided by Chuck Bausell, Richard Cederholm, Dominick Dale, Aryn Ehlow, Michele Fejfar, Eric Hauswirth, Richard Hung, and Alexis Olson.", "summary": "TSA is responsible for overseeing security operations at roughly 440 TSA-regulated airports as part of its mission to protect the nation's civil aviation system. TSA uses technologies to screen passengers and their bags for prohibited items. The TSA Modernization Act includes a provision for GAO to review TSA's deployment of screening technologies, and GAO was asked to review the detection standards of these screening technologies. This report addresses, among other things, (1) how TSA operationalizes detection standards, (2) the extent to which TSA considered risk when making deployment decisions, and (3) the extent to which TSA ensures technologies continue to meet detection requirements after deployment. GAO reviewed DHS and TSA procedures and documents, including detection standards; visited DHS and TSA testing facilities; observed the use of screening technologies at seven airports, selected for varying geographic locations and other factors; and interviewed DHS and TSA headquarters and field officials. The Department of Homeland Security's (DHS) Transportation Security Administration (TSA) operationalizes, or puts into effect, detection standards for its screening technologies by acquiring and deploying new technologies, which can take years. Detection standards specify the prohibited items (e.g., guns, explosives) that technologies are to detect, the minimum rate of detection, and the maximum rate at which technologies incorrectly flag an item. TSA operationalizes standards by adapting them as detection requirements, working with manufacturers to develop and test new technologies (software or hardware), and acquiring and deploying technologies to airports. For the standards GAO reviewed, this process took 2 to 7 years, based on manufacturers' technical abilities and other factors. TSA's deployment decisions are generally based on logistical factors and it is unclear how risk is considered when determining where and in what order technologies are deployed because TSA did not document its decisions. TSA considers risks across the civil aviation system when making acquisition decisions. However, TSA did not document the extent risk played a role in deployment, and could not fully explain how risk analyses contributed to those decisions. Moving forward, increased transparency about TSA's decisions would better ensure that deployment of technologies matches potential risks. Technology performance can degrade over time; however, TSA does not ensure that technologies continue to meet detection requirements after deployment to airports. TSA certifies technologies to ensure they meet requirements before deployment, and screeners are to regularly calibrate deployed technologies to demonstrate they are minimally operational. However, neither process ensures that technologies continue to meet requirements after deployment. In 2015 and 2016, DHS tested a sample of deployed explosives trace detection and bottled liquid scanner units and found that some no longer met detection requirements. Developing and implementing a process to ensure technologies continue to meet detection requirements after deployment would help ensure that TSA screening procedures are effective and enable TSA to take corrective action if needed. GAO is making five recommendations, including that TSA document analysis of risk in deploying technologies, and implement a process to ensure technologies continue to meet detection requirements after deployment. DHS agreed with all five recommendations and said TSA either has taken or will take actions to address them.", "document_type": "gao"}
{"report": "The Coast Guard owns or leases more than 20,000 shore facilities consisting of various types of buildings and structures. According to Coast Guard guidance, a building is generally defined as a fully enclosed structure that is affixed to the ground, in which personnel work or live, or where equipment is stored. A structure is generally defined as any other construction affixed to the ground that does not meet the definition of a building. The Coast Guard’s shore infrastructure is organized into 13 asset types, known as asset lines. Table 1 provides information on 11 of these asset lines, including examples, numbers of assets, and their replacement value as of 2018. We reported in February 2019 that the Coast Guard faced recapitalization, new construction, and deferred maintenance backlogs for its shore infrastructure totaling at least $2.6 billion as of 2018 and that its backlogs increased by $300 million since fiscal year 2012. Moreover, according to the Coast Guard Civil Engineering program’s 2018 annual report, about 46 percent of the Coast Guard’s shore infrastructure was beyond its overall service life. In 2018, the Coast Guard rated its overall shore infrastructure condition as a C- based on criteria it derived from standards developed by the American Society of Civil Engineers. In addition, some asset lines such as the industrial asset line, whose assets are generally mission-critical, were rated lower. Table 2 shows information about Coast Guard asset lines, including the rate at which the Coast Guard reported that these assets were functioning past their service life, and the condition grades assigned by the Coast Guard for fiscal year 2018. According to Coast Guard guidance, the Office of Civil Engineering and the Shore Infrastructure Logistics Center each play a role in managing the Coast Guard’s infrastructure by assessing risks and helping to mitigate damage from natural disasters or other events. The Office of Civil Engineering is responsible for setting Coast Guard-wide civil engineering policy, which includes facility planning, design, construction, maintenance, and disposal. The Shore Infrastructure Logistics Center is to establish project priorities for the acquisition, programmed depot maintenance, major repair, and modification of shore facilities. This center is also responsible for implementing the Coast Guard’s shore infrastructure policies. According to its guidance, the Coast Guard makes procurement, construction, and improvements funding decisions for its shore infrastructure through enterprise-level planning boards that meet twice a year. These planning boards are to prioritize Coast Guard shore infrastructure needs based on expected appropriations and other prioritization factors or considerations, such as damage caused by natural disasters or the Coast Guard’s need to construct new shore infrastructure or recapitalize existing facilities. The boards are responsible for evaluating potential shore infrastructure projects that have been assessed, ranked, and recommended by Coast Guard managers of various asset lines. For example, aviation asset line managers may recommend to the planning boards aviation-related shore infrastructure projects, such as the recapitalization of runways, landing areas, and hangars. According to the National Academies, climate change poses serious risks to many of the physical and ecological systems on which society depends, although the exact details cannot be predicted with certainty. Moreover, the effects and costs of extreme weather events, such as floods and droughts, are expected to increase in significance as they become more common and intense because of climate change. For example, the National Oceanic and Atmospheric Administration (NOAA) has reported that eight of the 10 costliest tropical cyclones in U.S. history occurred in recent years—from 2005 to 2017. DOD documented seven effects commonly associated with climate change and their potential effects on its infrastructure and operations (see table 3). Although the Coast Guard operates on a smaller scale, it maintains many of the same types of infrastructure as DOD, and these infrastructure are also situated in coastal and riverine locations, and thus subject to the same potential effects from extreme weather events. For example, Coast Guard facilities along the East and Gulf coasts of the United States are vulnerable to hurricanes—which NOAA projects will increase in frequency and severity because of climate change—and may cause flooding or wind damage to Coast Guard infrastructure. Coast Guard infrastructure is also vulnerable to natural disasters that are not associated with climate change. For example, Coast Guard facilities situated on the West Coast, Hawaii and Alaska, are located on or near historic earthquake fault lines. As a result, this infrastructure is more likely to be damaged by earthquakes than infrastructure located elsewhere in the country, according to the Coast Guard. According to Coast Guard officials, it can take months and sometimes years to repair or replace Coast Guard facilities damaged by severe natural disasters. For example, as shown in Figure 1, Coast Guard facilities at Station Port Aransas in Texas suffered significant damage during Hurricane Harvey in 2017. As of April 2019, the Coast Guard was working to demolish these damaged facilities so they could be replaced by one facility that is resilient to hurricanes. DHS established its Critical Infrastructure Risk Management Framework to guide critical infrastructure owners and operators, from both the public and private sector, in investing limited resources to protect critical infrastructure. As shown in Figure 2, the framework consists of five steps that involve (1) setting goals and objectives, (2) identifying infrastructure, (3) assessing and analyzing risk, (4) implementing risk management activities, and (5) measuring the effectiveness of actions taken to address identified risks. According to DHS, agency decision makers can use this framework to prioritize investments, develop plans, and allocate resources for critical infrastructure in a risk-informed way. The framework is based on risk management activities, which call for cost-effective use of resources by taking protective actions that offer the greatest mitigation of risk for any given expenditure. According to the NIPP, a risk management approach that aligns with the five key steps can help guide organizational decision making and prioritize actions to more effectively achieve desired outcomes. Since 2005, the Coast Guard has taken actions to improve the resilience of at least 15 storm-damaged shore facilities and has rebuilt them to new standards largely by using supplemental appropriations provided for this purpose. The Coast Guard has also developed new guidance to increase the likelihood that new or recapitalized buildings will withstand natural disasters and follows updated state and local building codes, which a senior Coast Guard official told us led to more resilient buildings, thus limiting risks to Coast Guard personnel and operations. In 2015, the Coast Guard’s Civil Engineering program initiated a formal assessment of owned and occupied Coast Guard buildings to determine which were vulnerable to 10 natural disasters, which, according to agency officials, it aims to complete in 2025. Since 2005, the Coast Guard has taken actions to improve the resilience of its shore infrastructure, largely by using supplemental appropriations for rebuilding facilities damaged by major storms. Specifically, from December 2005 through June 2019, the Coast Guard was appropriated about $2 billion in supplemental funds to, among other things, rebuild or relocate 15 facilities damaged by hurricanes. During this time, the Coast Guard has relocated facilities further inland or to higher ground, upgraded facilities to be more resilient, and designed new facilities with features to protect them from natural disasters. The 2016 and 2017 hurricane seasons were particularly destructive, and the Coast Guard received $719 million in supplemental funding to restore facilities damaged by Hurricanes Matthew, Harvey, Irma, and Maria. Figure 3 below shows Coast Guard shore infrastructure, and associated replacement values, located along the East and Southeast coasts of the United States and the general paths of selected hurricanes in those regions since 2005. The Coast Guard has used supplemental funding to rebuild or relocate at least 15 damaged facilities to enhance their resilience. To improve the resilience of its facilities when rebuilding after hurricanes, Coast Guard officials reported that they generally either relocated the facility inland for better protection from extreme weather or modified the facility to be more resilient by elevating it to protect it from storm surge and flooding. For example: Station Houston, Texas. After this station was damaged by Hurricane Ike in 2008, the Coast Guard determined that this station’s boathouse could not be built above the local floodplain and still meet mission requirements. As a result, the Coast Guard took steps to protect the boathouse from future water damage by using water resistant materials in its construction, elevating its electrical and telecommunications systems above the flood plain, and placing the heating, ventilation, and air conditioning systems on the roof of the building. Sector Houston-Galveston, Texas. After being damaged by Hurricane Ike in 2008, this regional command facility was relocated further inland to provide the new facility with greater protection from extreme weather. It was also designed to withstand wind speeds of up to 115 miles per hour. Station Sandy Hook, New Jersey. After this station was damaged by Hurricane Sandy in 2012, the old building was demolished and replaced on the same site with a facility that was designed to be more resilient. The station’s first floor was constructed with openings to allow flood waters to pass beneath the station. Station Sabine Pass, Texas. Following damage by Hurricane Ike in 2008, the Coast Guard rebuilt this station in 2013 to better withstand floods and high winds (see fig. 4). The new station’s first floor was elevated to a height that exceeds the projected depth of a 100-year flood to protect station equipment. The station was also designed to resist wind speeds up to 130 miles per hour—sufficient to withstand a Category III hurricane. The Coast Guard has also developed new guidance reflecting higher building standards, and follows updated state and local building codes which a senior Coast Guard official told us led to more resilient buildings. In February 2017, the Coast Guard’s Civil Engineering program issued engineering planning guidance intended to increase the likelihood that new or recapitalized buildings would withstand natural disasters and that the design of these buildings would minimize risks to Coast Guard operations and personnel, among other things. This new guidance contains the following requirements: All new permanent, regularly occupied buildings will either be located at least 2 feet above the Federal Emergency Management Agency’s (FEMA) 100-year base flood elevation or meet the level of the 500- year base flood elevation for the proposed site location. To account for storm surge, sea level rise, or periodic flooding, buildings may also be constructed above this elevation as necessary. To ensure operational continuity and safety after a flood event, critical building systems—such as utility and communications systems—are to be located at least 3 feet above the 100-year base flood elevation. Each site will be evaluated for vulnerability to natural hazards, such as earthquakes, tornadoes, and wildfires. This evaluation will identify risk to Coast Guard operations and personnel. A senior Coast Guard official testified to Congress in November 2017 that Coast Guard buildings rebuilt after being damaged by Hurricane Ike in 2008 suffered minimal damage from Hurricanes Harvey and Irma. The official also said that the resilience of these buildings resulted from the recapitalization efforts that made them more storm-resilient and allowed them to align the buildings with modern building codes and standards. Further, according to Coast Guard civil engineering officials, units impacted by Hurricanes Harvey, Irma and Maria—which had been recapitalized to resilient standards—returned to full mission capability within 2 to 3 days and, in some instances, avoided damage or a loss of mission capability as a result of more resilient construction. For example, operations at Sector Houston-Galveston, which supports a wide range of Coast Guard missions, were not interrupted during Hurricane Harvey, allowing it to serve as the primary federal response hub during this disaster. A senior official from the Coast Guard Facilities Design and Construction Center told us that state and local building codes, which have been updated as a result of lessons learned from natural disasters, have also led to more resilient Coast Guard buildings because the Coast Guard is required to align its facilities standards with these codes. For example, according to this official, Florida updated its building codes after Hurricane Andrew in 1992, which resulted in more resilient buildings in this state. In December 2018, the Coast Guard Civil Engineering program issued updated planning guidance for reconstructing facilities damaged by Hurricanes Matthew, Harvey, Irma, and Maria in 2016 and 2017. According to this guidance, new and renovated facilities are to incorporate resilient construction techniques including, but not limited to, hurricane resistant construction and design, and infrastructure resiliency. These facilities are to have the ability to return to full operations after an event, minimizing any major reconstruction and long-term mission impact. In addition, when the Coast Guard builds a new facility or renovates an existing one that directly supports Coast Guard natural disaster response efforts, that facility is to be built to a higher resiliency level to increase the likelihood that it will remain operational during a natural disaster. In 2015, the Coast Guard’s Civil Engineering program initiated a formal vulnerability assessment of owned and occupied Coast Guard buildings, and according to Coast Guard officials they aim to complete this assessment in 2025. The Coast Guard calls this assessment the Shore Infrastructure Vulnerability Assessment. According to Coast Guard documentation, its focus was to determine the vulnerability of these buildings and Coast Guard personnel to natural disasters. Further, the assessment results are intended to assist with contingency planning by identifying which Coast Guard facilities are likely to remain operational after a natural disaster. According to its documentation, this vulnerability assessment is to be completed in two phases. During Phase I, completed in 2018, the Coast Guard analyzed 3,214 buildings, or approximately 16 percent of its infrastructure, for vulnerabilities to disasters such as floods, earthquakes, and hurricanes. To conduct its analysis, Coast Guard officials analyzed the vulnerability of these buildings to 10 natural disasters using information from other government agencies and professional organizations. For example, the Coast Guard assessed its vulnerability to flooding using FEMA, National Weather Service information, state sources and websites. This analysis identified Coast Guard-wide infrastructure vulnerabilities to coastal risks such as shoreline loss, coastal erosion and earthquakes, as well as tsunami risks on the West Coast of the United States, Alaska, Guam, and Hawaii, and immediate and serious flood risks in Puerto Rico and the Gulf and East Coasts. The Phase I report recommended that Coast Guard units and contingency planners consider these vulnerabilities when preparing contingency plans or making capital investments in Coast Guard facilities. Although the Shore Infrastructure Vulnerability Assessment Phase I report identified multiple vulnerabilities to sixty-eight percent of the assessed infrastructure, Coast Guard Civil Engineering program officials told us they were unable to conclusively determine whether approximately 1,500 assessed buildings were vulnerable to hurricane winds, earthquakes, or tornadoes—leading officials to conclude that they needed to conduct further structural analysis. Accordingly, Coast Guard Civil Engineering program officials initiated plans for Phase II of the assessment, which involves more detailed structural analyses of 1,500 buildings to determine whether they can withstand either earthquakes or tornado and hurricane winds, depending on the building. Since earthquakes strike with essentially no warning, unlike hurricanes and tornadoes, Coast Guard Civil Engineering program officials told us that the Coast Guard considered them to be a greater threat to its personnel and infrastructure. Accordingly, the Coast Guard decided that Phase II of the assessment would prioritize structural analyses for buildings it believes to be more susceptible to damage from earthquakes. Further, it would prioritize the order in which it assesses these buildings based on how critical the building is to Coast Guard operations, building occupant density, and the overall age and condition of the building. The Shore Infrastructure Vulnerability Assessment Phase II analysis began in September 2018 with a contract for about $700,000 to determine if 15 buildings at multiple Coast Guard sites are vulnerable to earthquakes. According to the contract, these assessments are to be completed in October 2021. While the Coast Guard has taken steps to improve the resilience of its shore infrastructure by rebuilding storm damaged facilities and initiating a vulnerability assessment, its overarching processes to improve shore infrastructure resilience are not fully aligned with the five steps of the DHS Critical Infrastructure Risk Management Framework. As previously mentioned, DHS established this framework to guide both public and private resource investment decisions for protecting critical infrastructure. Its five steps include (1) setting goals and objectives, (2) identifying infrastructure, (3) assessing and analyzing risk, (4) implementing risk management activities, and (5) measuring the effectiveness of actions taken to address identified risks. According to the first step of the DHS Critical Infrastructure Risk Management Framework, organizations should define specific goals for what they intend to accomplish and establish objectives to help them achieve the goals (see text box). Organizations that establish broad strategic goals for risk management can also benefit from translating these goals into specific, measurable objectives to assess the extent to which its actions actually reduce risk (see text box). DHS Critical Infrastructure Risk Management Framework—Step 1 Organizations should define specific outcomes, conditions, end points, or performance targets that collectively describe an effective and desired risk management posture. By defining risk management goals and expressing them in terms of the objectives and outcomes the organization intends to accomplish, stakeholders, including those at all levels of government and the private sector, would be better able to tailor their risk management programs and activities to address infrastructure resilience needs. Our review of four key Coast Guard documents related to managing its shore infrastructure showed that some of these documents refer to resilience and identify it as an important factor to its operational success. However, none of the documents we reviewed identified a measurable goal or objective for improving shore infrastructure resilience. Instead, the documents either include goals related to management of the shore infrastructure program, or include no goals at all. Specifically: The Coast Guard Shore Infrastructure Strategic Plan for 2017-2021 includes what it describes as performance and foundational goals, including a foundational goal for improving resilience, contingency preparedness, and response to natural hazards. However, the plan does not link this foundational goal to a specific objective and performance target that could guide Coast Guard actions to improve shore infrastructure resilience. For example, an objective could be to increase the percentage of mission critical buildings that are within or above base flood elevations by a certain date, and annual targets could be established to assess progress toward this goal. The Coast Guard issued its agency-wide strategic plan in November 2018 which states that resilient shore infrastructure is directly connected to Coast Guard operational readiness and successful mission execution. The plan further stated that to meet its operational needs, the Coast Guard will prioritize the repair or replacement of degraded shore infrastructure that negatively affects operations or hinders workforce readiness. However, this plan does not identify the shore infrastructure resilience goals the Coast Guard hopes to achieve or any objectives to measure progress toward these goals. Moreover, this plan does not include goals or measures to guide such prioritization. In February 2019, we reported that Coast Guard Engineering program officials were not able to provide documents showing how they had directed field units to prioritize the repair or replacement of degraded shore infrastructure. In July 2019, the Coast Guard was able to provide one planning document that was specifically created to help manage its response to Hurricanes Harvey, Irma, Maria, and Matthew that included guidance on improving infrastructure resilience. Based on our interviews with Coast Guard engineering program and Shore Infrastructure Logistics Center officials, the Coast Guard is still in the initial stages of incorporating resilience plans and objectives into the shore infrastructure program. In July 2019, Civil Engineering program officials told us that the Coast Guard had updated its Civil Engineering Strategic Plan to direct its personnel to develop a communication plan and resource strategy for infrastructure resiliency projects based on the Shore Infrastructure Vulnerability Assessment’s Phase II results. The Coast Guard provided us with a copy of this plan in August 2019, and while this document includes two measures that can be useful to account for actions taken, it did not include goals or performance targets to guide the prioritization of resiliency projects, and Civil Engineering program officials were not able to provide documents showing how they had made decisions to incorporate resilience into the repair and replacement of degraded shore infrastructure. Coast Guard officials also reported that they had initiated a separate resilience effort in 2018 at the direction of DHS, which required all operational components to participate in the development of the 2018 DHS Resilience Framework, and to develop individual component resilience plans to guide its approach to resilience planning. According to the Coast Guard, their plan was submitted to DHS in August 2019. When we discussed this effort with Coast Guard officials, they were able to provide few details about their efforts and no documentation about their progress to date. We also discussed this effort with DHS officials managing the process, but they were not able to tell us whether this new endeavor will align with or compete for resources with ongoing Coast Guard assessment processes. According to the second step of the DHS Critical Infrastructure Risk Management Framework, organizations should identify infrastructure assets that are critical for security and national preparedness (see text box). DHS Critical Infrastructure Risk Management Framework—Step 2 Organizations should identify assets, systems, and networks that contribute to critical functionality, and collect information pertinent to risk management, including analysis of dependencies and interdependencies. Through this step, it is important to identify assets that are both nationally significant and those that may not be significant on a national level but are, nonetheless, important to state, local, or regional critical infrastructure security and resilience and national preparedness efforts. We found that the Coast Guard identified many occupied buildings that may be important to operations and assessed their vulnerability through its Shore Infrastructure Vulnerability Assessment process, but this process did not identify all shore infrastructure assets that are critical to its missions or screen them for all vulnerabilities. Specifically, through the Shore Infrastructure Vulnerability Assessment Phase I, the Coast Guard identified and screened all occupied Coast Guard buildings over 1,000 gross square feet—about 16 percent of all Coast Guard infrastructure— for vulnerabilities to 10 natural disasters. The analysis found that approximately 68 percent (2,200) of the 3,214 buildings it assessed are vulnerable to certain natural disasters. However, the initial screening did not include other mission critical infrastructure, as the framework recommends, even though the loss of such structures could also impact its ability to carry out its missions. For example, the Coast Guard did not include structures in Phase I of the Shore Infrastructure Vulnerability Assessment, such as aircraft runways, and therefore has not determined whether such structures are vulnerable to flooding following a severe storm, or which ones are at greatest risk for such flooding. Phase II is also not expected to include these assets, as Civil Engineering program officials stated it is not intended to identify any additional infrastructure. Rather, in Phase II for example, Civil Engineering program officials will determine whether roughly 45 percent of the buildings on the West Coast that were screened in Phase I, are vulnerable to earthquakes, as the results of Phase I were inconclusive for these buildings. This DHS framework step recommends that stakeholders identify assets and networks that contribute to critical functionality and analyze their dependencies and interdependencies. The Coast Guard has two such measures to help identify the criticality of its shore infrastructure for conducting its missions. The Mission Essentiality Index measure classifies shore infrastructure assets into one of four tiers based on the degree to which they are mission critical. Similarly, the Mission Dependency Index scores building criticality based on how quickly the loss of utilities would impact operations, and how difficult it would be to relocate operations in advance of a natural disaster. Coast Guard officials told us they used Mission Dependency Index scores to help identify which buildings to include first during Phase II of the Shore Infrastructure Vulnerability Assessment. However, they did not consider either of these measures when they conducted the initial screening for Phase I, which prevented operational risks from being fully considered. Using this information at the beginning of its Shore Infrastructure Vulnerability Assessment process could have provided the Coast Guard with useful information to help it assess its critical infrastructure, as the DHS framework recommends. Coast Guard officials stated in July 2019 that they believe that the mission critical assets collocated with the assessed buildings would have the same vulnerabilities given their geographic proximity. While this may be the case for structures that are collocated with assessed buildings, unoccupied structures (such as piers and runways) may be built with different requirements and building codes; consequently, they may differ in the extent of their vulnerabilities to the same natural hazard threats. Furthermore, the Shore Infrastructure Vulnerability Assessment Phase I report did not demonstrate the extent to which Coast Guard structure are collocated with the occupied buildings the Coast Guard analyzed. They also told us that the Coast Guard has not tracked the performance of its infrastructure, particularly piers and runways, because it has always been able to find alternative means to continue operations. However, by identifying all of its mission critical infrastructure that may be vulnerable to natural disasters, the Coast Guard would be more fully informed of the possible scenarios that could affect their capabilities in the event of a natural disaster, and which infrastructure facilities are most likely to be affected. Such information could also better position the Coast Guard to plan for and execute mission operations from alternative locations if needed. According to the third step of the DHS Critical Infrastructure Risk Management Framework, organizations should assess and analyze risks to understand infrastructure vulnerabilities and threats, as well as the potential consequences of an incident or known vulnerabilities (see text box). DHS Critical Infrastructure Risk Management Framework—Step 3 Organizations should assess and analyze risks, taking into consideration the potential direct and indirect consequences of an incident, known vulnerabilities to various potential threats or hazards, and general or specific threat information. Risks can be assessed in terms of their likelihood and potential consequences. This step supports an assessment strategy that results in sound, scenario-based consequence and vulnerability estimates, as well as an assessment of the likelihood that the given threat or hazard will occur. Organizations should consider potential harm to operations and impacts on mission in executing a critical infrastructure risk management approach. The Shore Infrastructure Vulnerability Assessment process is the Coast Guard’s main action to formally assess and analyze its shore infrastructure, according to Civil Engineering program officials. This process was intended to help contingency planners anticipate which infrastructure is likely to remain operational following a natural disaster, and assist with operational and future capital investment decisions, according to a senior Coast Guard official. We found that through this process, the Coast Guard assessed and analyzed certain elements of risk for its shore infrastructure, such as potential vulnerabilities of certain infrastructure to multiple natural disasters—information which could help inform its processes to improve resilience. However, the Coast Guard has not identified the potential direct and indirect consequences posed by natural disasters on its infrastructure, or the consequences associated with its operational risks—that is, risks affecting its ability to carry out its missions if shore infrastructure is damaged. Specifically: Through Phase I of the Shore Infrastructure Vulnerability Assessment process, the Coast Guard determined that its personnel and operations are generally more vulnerable to certain threats. For example, Phase I determined that about 880 assessed buildings may be vulnerable to earthquakes, which according to the Coast Guard, represent approximately 45 percent of its assessed buildings on the West Coast. Similarly, it also identified about 800 buildings that may be vulnerable to tornadoes and approximately 1,000 buildings vulnerable to hurricanes. However, the Coast Guard has not analyzed the potential consequences of damage to the infrastructure that it identified as vulnerable. For example, it has not assessed the economic losses associated with potential catastrophic disasters, such as costs for rebuilding assets or taking other actions to respond to and recover from natural disasters. Additionally, the Coast Guard has not assessed long-term costs that could result from environmental damage to its property caused by these events. Without also determining consequence information, the Coast Guard is not positioned to provide decision makers with the type of information the DHS Critical Infrastructure Risk Management Framework recommends for making cost effective risk management decisions. As the Coast Guard begins to conduct Phase II, it is unclear whether it will include information on potential consequences in its assessment. The Coast Guard initiated Phase II in September 2018 and intends to assess about 1,500 buildings for vulnerabilities to natural disasters by 2025. Coast Guard officials stated that Phase II would entail following civil engineering standards for conducting the assessments. These assessments are expected to entail on-site contractor assessments of about 1,500 buildings. In 2018, the first year of Phase II, the Coast Guard contracted for an assessment of 15 buildings, and Shore Infrastructure Logistics Center officials said they expect this assessment to be completed in 2021. According to Civil Engineering program officials, the purpose of Phase II is to understand whether 1,500 buildings identified in Phase I as inconclusive are indeed vulnerable to certain natural hazards. This information can help Coast Guard officials better understand the likelihood that vulnerabilities exist, but the plan for Phase II does not support an assessment strategy that results in sound, scenario-based consequence and vulnerability estimates, as well as an assessment of the likelihood that the given threat or hazard will occur or the operational risks that may be affected, as this step recommends. According to the fourth step of the DHS Critical Infrastructure Risk Management Framework, organizations should implement risk management activities by evaluating risk reduction methods that consider countermeasures that result in controlling, accepting, transferring, or avoiding risks (see text box). DHS Critical Infrastructure Risk Management Framework—Step 4 Organizations should evaluate risk reduction methods by considering countermeasures that result in controlling, accepting, transferring, or avoiding risks. Approaches can include prevention, protection, mitigation, response, and recovery activities. Ideally, the selection and implementation of appropriate risk management activities helps to focus planning, increase coordination, and support effective resource allocation and incident management decisions. We found that the Coast Guard identified thousands of infrastructure vulnerabilities to natural disasters through its Shore Infrastructure Vulnerability Assessment process, and has contracted for more detailed structural analyses of the buildings with vulnerabilities that were deemed inconclusive with respect to seismic and windstorm threats. However, the Coast Guard has not taken action to mitigate risks for those buildings with confirmed vulnerabilities. Our analysis of Phase I results showed that of the 3,214 buildings the Coast Guard analyzed, 32 percent had two or more identified vulnerabilities and an average Mission Dependency Index of 34, and 10 percent had three or more identified vulnerabilities with an average Mission Dependency Index of 38. The average Mission Dependency Index score for all 3,214 buildings was 30. These results indicate that the Coast Guard has data on buildings that may be more vulnerable than others and have relatively greater mission value. Despite the availability of this information, the Coast Guard has not taken steps to develop a mitigation strategy for these buildings, as the DHS Critical Infrastructure Risk Management Framework recommends. Coast Guard officials stated that they had sufficient information from Phase I about how their facilities would perform against eight of the ten disasters, so they elected to further study those buildings with inconclusive results on earthquakes and wind. According to the DHS Critical Infrastructure Risk Management Framework, risk assessments are to inform the selection and implementation of mitigation activities and the establishment of risk management priorities for organizations. Effective risk management activities are comprehensive, coordinated, and cost-effective. The framework further states that risk management decisions should be made based on an analysis of the costs and other impacts, as well as the projected benefits of identified courses of action—including the no-action alternative if a risk is considered to be effectively managed already. However, it is unclear whether and to what extent the civil engineering staff and other decision makers consider the Shore Infrastructure Vulnerability Assessment results as part of the planning board processes where decisions are made about which infrastructure projects will be prioritized for funding. Civil Engineering program officials told us that hazard mitigation strategies will be employed for buildings determined to be vulnerable, as the Coast Guard plans and executes major construction and recapitalization projects through its existing planning board processes. They also provided us with updated planning board guidance, issued in March 2019, which directs Coast Guard officials to consider improving shore infrastructure resilience as a significant factor in the decision-making process. They also noted that the Coast Guard’s updated policy described earlier requires compliance with higher building standards, which helps ensure that newly constructed facilities will be more resilient than the ones they replace. Shore Infrastructure Logistics Center officials, however, were unable to provide us with documentation showing whether and to what extent risk reduction methods were considered during past planning board processes. Furthermore, since they are not required to incorporate Shore Infrastructure Vulnerability Assessment results into future planning board decisions, it is unclear whether future Coast Guard planning boards will be focused on addressing the most critical risks, or will consider resilience as a factor when choosing projects to fund. This is of particular concern since in at least 5 cases, the Coast Guard’s backlog list for Procurement, Construction and Improvement projects includes boat stations that the Coast Guard had previously identified as suitable for closure. According to step five of the DHS Critical Infrastructure Risk Management Framework, organizations should use metrics and other evaluation procedures to measure progress and assess the effectiveness of efforts to secure and strengthen the resilience of critical infrastructure (see text box). DHS Critical Infrastructure Risk Management Framework—Step 5 Organizations should use metrics and other evaluation procedures to measure progress and assess the effectiveness of efforts to secure and strengthen the resilience of critical infrastructure. They are an important step in the critical infrastructure risk management process to enable assessment of improvements in critical infrastructure security and resilience. They provide a basis for accountability, document actual performance, promote effective management and provide a feedback mechanism for informed decision making. We found that the Coast Guard has identified some specific measures, but they are too narrow to measure the agency’s progress or assess the effectiveness of its efforts to improve its shore infrastructure resilience. For example, the Coast Guard established metrics to count the number and dollar value of certain projects to improve resilience, such as seismic improvement or floodplain adaptation projects, that the Civil Engineering program plans and accomplishes each year. While these measures can be useful to account for actions taken and funds invested in these particular actions, they do not indicate whether the resilience of Coast Guard shore infrastructure has improved or is improving as a result of the actions being measured. Coast Guard officials told us that they have not used the DHS Critical Infrastructure Risk Management Framework to guide actions to improve the resilience of its critical infrastructure because they have instead focused on implementing the Shore Infrastructure Vulnerability Assessment to provide them information they intend to use to influence resource investment decisions in the future. However, without a complete understanding of the vulnerabilities of its infrastructure and the consequences to Coast Guard operations if it is damaged, the Coast Guard risks questionable recapitalization investments for its resilience when selecting projects to fund from its $2.6 billion maintenance backlogs. Given that the five steps of the DHS Critical Infrastructure Risk Management Framework are intended to guide decision making and prioritize actions to more effectively achieve desired outcomes, having processes that fully align with the five key steps of the framework would provide greater assurance that the Coast Guard is investing its shore infrastructure resources to manage potential damage and expenses from extreme weather events in the future. The Coast Guard’s shore infrastructure program includes a range of facilities and structures that are vital to the agency’s ability to fulfill its missions, and it constitutes a significant fiscal commitment that requires ongoing investment to maintain. By nature of their mission and location, many facilities and structures are vulnerable to potentially catastrophic natural disasters that are projected to occur more frequently and have required over $2 billion in supplemental funding over recent years to replace or repair. The Coast Guard faces the difficult decision of determining how best to invest its limited resources in improving the resilience of its shore infrastructure to better manage the costs of repairing or replacing such infrastructure after natural hazards occur. DHS’s Critical Infrastructure Risk Management Framework provides a decision making approach that can help ensure risk-informed resource investments, but the Coast Guard has not fully aligned its processes for improving shore infrastructure resilience with any of the five steps outlined in this framework. The Coast Guard’s Shore Infrastructure Vulnerability Assessment process is the agency’s main approach to understanding shore infrastructure vulnerabilities, but this process is limited in scope and not expected to be completed until at least 2025. For the Coast Guard’s planning board processes, officials were unable to verify that they have consistently considered resilience as a significant factor when selecting projects or that they plan to do so in the future. This is of particular concern given the current condition of Coast Guard shore infrastructure and the existing $2.6 billion backlogs of infrastructure maintenance and recapitalization projects that compete for finite funding. By fully aligning its processes with DHS’s recommended risk management framework for critical infrastructure, the Coast Guard would be better positioned to reduce its future fiscal exposure to the effects of catastrophic natural disasters. The Commandant of the Coast Guard should ensure that the Deputy Commandant for Mission Support implements risk management processes that more fully align with the five key steps outlined in DHS’s Critical Infrastructure Risk Management Framework to better guide agency shore infrastructure investment decisions. This should include (1) setting goals and objectives, (2) identifying critical infrastructure, (3) assessing and analyzing risks and costs, (4) implementing risk management activities, and (5) measuring the effectiveness of actions taken. (Recommendation 1) We provided a draft of this report to DHS for review and comment. In its comments, reproduced in appendix I, DHS concurred with our recommendation. DHS, through the Coast Guard, also provided technical comments, which we incorporated as appropriate. DHS concurred with the intent of our recommendation to formalize its shore infrastructure risk management processes, and stated that it plans to make progress towards implementing GAO’s recommendation concurrently with the development and implementation of its Component Resilience Plan, in accordance with the recently mandated DHS Resilience Framework. It intends to complete these efforts by the end of 2021. The Coast Guard also intends to develop, by July 2020, goals and objectives for measuring the effectiveness of actions taken to identify resilience readiness gaps and resource needs. We will continue to monitor these efforts. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or AndersonN@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Nathan J. Anderson, (202) 512-3841 or andersonn@gao.gov. In addition to the contact above, Dawn Hoff (Assistant Director), Landis Lindsey (Analyst-in-Charge), Michael Armes, John Bauckman, Jason Berman, Chuck Bausell, Rick Cederholm, Kendall Childers, John Crawford, Billy Commons, Andrew Curry, Dominick Dale, Elizabeth Dretsch, Shannon Finnegan, Michele Fejfar, Peter Haderlein, Eric Hauswirth, Susan Hsu, Michael Pinkham, John Mingus, and Jan Montgomery, made key contributions to this report.", "summary": "The Coast Guard, within DHS, owns or leases more than 20,000 shore facilities such as piers, boat and air stations, and housing units at over 2,700 locations. This infrastructure is often positioned on coastlines where it is vulnerable to damage from extreme weather. Noting the importance of protecting critical infrastructure from such risks, in 2013 DHS updated its risk management guidance for enhancing infrastructure resilience—which is the ability to prepare and plan for, absorb and recover from, or successfully adapt to adverse events. GAO was asked to review Coast Guard efforts to improve the resilience of its shore infrastructure. This report (1) describes Coast Guard actions to improve shore infrastructure resilience since 2005, and (2) examines the extent to which its processes to improve shore infrastructure resilience follow DHS's key steps for critical infrastructure risk management. GAO reviewed and analyzed Coast Guard guidance and data on assessed infrastructure and interviewed Coast Guard officials. GAO also compared Coast Guard policies, procedures, and actions to manage shore infrastructure against DHS's framework for managing risks to critical infrastructure. Since 2005, the U.S. Coast Guard's main actions to improve resilience have been to repair or rebuild shore infrastructure to higher building standards after it has been damaged by extreme weather events. The Coast Guard has received more than $2 billion in supplemental appropriations since 2005 to improve resilience after severe storms (see figure). The Coast Guard has also developed new guidance requiring that repairs and new construction meet higher building standards to make it more resilient. Further, in 2015, the Coast Guard began an assessment of certain occupied buildings to identify their vulnerabilities to ten natural hazards, such as hurricanes and earthquakes. As of 2018, this assessment covered approximately 16 percent of the Coast Guard's shore infrastructure. The Coast Guard aims to complete the assessment in 2025. Coast Guard processes to improve shore infrastructure resilience do not fully align with the Department of Homeland Security's (DHS) key steps for critical infrastructure risk management. These steps are described in DHS's Critical Infrastructure Risk Management Framework, which recommends that DHS components, among other things, identify critical infrastructure, assess risks, and implement risk management activities. While the Coast Guard has identified some vulnerable shore infrastructure through its ongoing assessment, it has not identified all shore assets that may be vulnerable, such as piers and runways; or assessed operational risks affecting its ability to complete missions with these assets. In addition, the Coast Guard has not taken steps to develop mitigation strategies for buildings already identified as vulnerable. Moreover, Coast Guard data show a growing backlog of at least $2.6 billion in recapitalization, new construction, and deferred maintenance projects that compete for finite funding. However, Coast Guard officials were unable to verify that they have consistently selected projects to also enhance resilience. Coast Guard officials stated that they have not used the DHS framework and have instead focused on implementing their ongoing vulnerability assessment. Fully aligning its processes with the DHS framework would better position the Coast Guard to reduce its future fiscal exposure to the effects of extreme weather events. GAO recommends that the Coast Guard revise its processes for improving shore infrastructure resilience to more fully align with key steps of the DHS critical infrastructure risk management framework. This should include, for example, identifying critical infrastructure, assessing risks, and implementing risk management activities. DHS concurred with our recommendation.", "document_type": "gao"}
{"report": "According to OMB, federal agencies reported that they operated 432 data centers in 1998, 2,094 in July 2010, 5,607 in August 2016, and 5,916 in August 2018. As previously mentioned, operating such a large number of centers has been, and continues to be, a significant cost to federal agencies. For example, in 2007, the Environmental Protection Agency (EPA) estimated that the annual cost for electricity to operate federal servers and data centers across the government was about $450 million. Further, according to the Department of Energy (Energy), a typical government data center has 100 to 200 times the energy use intensity of a commercial building. However, in 2009, OMB reported server utilization rates as low as 5 percent across the federal government’s estimated 150,000 servers. These factors contributed to OMB recognizing the need to establish a coordinated, government-wide effort to improve the efficiency, performance, and environmental footprint of federal data center activities. Subsequently, OMB launched the Federal Data Center Consolidation Initiative in 2010 to reduce the growing number of federal data centers and we have reported extensively on federal agencies’ efforts to implement the initiative’s requirements. Among other things, OMB required agencies to consolidate inefficient infrastructure, optimize existing facilities, improve their security posture, and achieve cost savings. For example, each agency was required to maintain a complete inventory of all data center facilities owned, operated, or maintained by or on its behalf, and measure progress toward defined optimization performance metrics on a quarterly basis as part of its data center inventory submission. Recognizing the importance of reforming the government-wide management of IT, Congress enacted FITARA in December 2014. Among other things, the law required agencies to: Submit to OMB a comprehensive inventory of the data centers owned, operated, or maintained by or on behalf of the agency. Submit, by the end of fiscal year 2016, a multi-year strategy to achieve the consolidation and optimization of the agency’s data centers. The strategy was to include performance metrics that were consistent with the government-wide data center consolidation and optimization metrics. Report progress toward meeting government-wide data center consolidation and optimization metrics on a quarterly basis to OMB’s Administrator of the Office of Electronic Government. In addition, according to FITARA, the Office of Electronic Government at OMB was to: Establish metrics applicable to the consolidation and optimization of data centers (including server efficiency), ensure that information related to agencies’ progress toward meeting government-wide data center consolidation and optimization metrics was made available to the public in a timely manner, review agencies’ inventories and strategies to determine whether they were comprehensive and complete, and monitor the implementation of each agency’s strategy. Develop and make publicly available not later than December 19, 2015, a goal broken down by year for the amount of planned cost savings and optimization improvements that were to be achieved through the FDCCI; and, for each year thereafter until October 1, 2020, compare reported cost savings and optimization improvements against those goals. In August 2016, OMB issued Memorandum M-16-19, which established DCOI and included guidance on how to implement the data center consolidation and optimization provisions of FITARA. The memorandum directed each agency to develop a DCOI strategic plan that defined its data center strategy. Among other things, this strategy was to include a timeline for agency consolidation and optimization activities, with an emphasis on cost savings and optimization performance benchmarks that the agency could achieve between fiscal years 2016 and 2018. For example, each agency was required to develop cost savings targets due to consolidation and optimization actions and report any realized cost savings. OMB required each agency to publicly post its DCOI strategic plan to its agency-owned digital strategy website. In addition, OMB’s memorandum included a series of performance metrics in the areas of data center closures, cost savings, and optimization progress. The guidance further noted that agency progress was to be measured by OMB on a quarterly basis, using agencies’ data center inventory submissions and OMB-defined closures, cost savings, and optimization targets. Further, the memorandum stated that OMB was to maintain a public dashboard (the IT Dashboard) to display government-wide and agency- specific data center consolidation and optimization progress. In this regard, OMB began including such progress information on the IT Dashboard in August 2016. Since the enactment of FITARA in December 2014, we have reviewed and verified the quality and completeness of each covered agency’s inventory and DCOI strategy annually. We have also published reports documenting the findings from each of these reviews. In addition, we have examined and reported on agencies’ efforts to optimize their data centers, as well as the challenges encountered and successes achieved. As of December 2019, 75 of the 117 recommendations from these reports had not been fully addressed. The results and recommendations of our previous reviews are detailed in appendix II. In June 2019, OMB issued a memorandum, M-19-19, that updated DCOI and redefined a data center as a purpose-built, physically separate, dedicated space that meets certain criteria. The memorandum also revised the priorities for consolidating and optimizing the federal data centers. Specifically, OMB directed agencies to focus their efforts on their tiered data centers and to stop reporting on spaces not designed to be data centers (i.e., non-tiered data centers) as part of their inventory. The guidance outlined a process by which agencies could request, and OMB would approve, that these facilities be dropped from reporting. The guidance also noted that OMB would set agency-specific data center closure and cost savings targets in collaboration with each agency and in alignment with that agency’s mission and budget. In addition, OMB described criteria for designating certain data centers as mission critical facilities, which would be exempt from new agency-specific closure targets. Those mission critical designations are to be assumed to be granted unless OMB specifically overturns them. OMB’s revised June 2019 DCOI guidance also directed agencies to stop reporting on spaces not designed to be a data center as part of their inventory, and to focus their efforts on their remaining purpose-built data centers. This is a change from the previous DCOI guidance, which required agencies to report on a much wider range of facilities. OMB’s new memorandum also replaced the previous optimization metrics with revised measures that focused on (1) reporting the number of agencies’ virtualized hosts, underutilized servers, and data centers with advanced energy metering; and (2) the percentage of time that data centers were expected to be available to provide services. In contrast to the previous DCOI guidance, the new memorandum did not specify government-wide performance targets for the optimization metrics, such as setting a target for server utilization of 65 percent for all agencies. Instead, OMB worked with agencies to establish agency-specific targets that were also identified in agency DCOI strategic plans and on the IT Dashboard. In addition, the guidance described how agencies could apply for an optimization performance exemption for data centers where typical optimization activities (consolidation of data collection, storage, and processing to a central location) were technically possible but increased the response time for systems beyond a reasonable limit. As in previous years, the 24 agencies participating in DCOI continued to report progress in closing unneeded data centers and achieving related additional cost savings. The agencies reported closing a total of 102 data centers in fiscal year 2019, as of August 2019, and reported plans to close an additional 184 data centers by the end of fiscal year 2019. According to agencies’ data center inventories, almost all of the 24 agencies met or planned to meet their fiscal year 2019 closure targets. In addition, agencies reported that their DCOI-related activities had either achieved, or planned to achieve, the $241.5 million in total planned savings for fiscal year 2019. However, recent OMB DCOI policy changes will reduce the number of data centers covered by the policy and both OMB and agencies may lose important visibility over the security risks posed by these facilities. For fiscal year 2019, 23 of the 24 agencies reported that they met or planned to meet their fiscal year data center closure targets, as established under OMB’s June 2019 guidance. Of those 23 agencies: three agencies reported that they did not have any agency-owned data centers and had a target of zero closures; these agencies were listed on the IT Dashboard as having completed their closure efforts; five agencies were not expected to close any of their operating data centers during the fiscal year, and their target was zero; 13 agencies reported meeting or exceeding their target closures by two agencies—the Departments of Defense (Defense) and Veterans Affairs (VA)—reported closing a number of data centers and had additional closures planned that were expected to meet their respective fiscal year targets. In addition, one agency—the Office of Personnel Management (OPM)— did not submit a DCOI strategic plan and, consequently, did not report a data center closure target. Table 1 details, for each of the 24 agencies, the number of data centers open at the start of fiscal year 2019, the agency’s fiscal year 2019 closure target, the number of data centers closed, and the number planned for closure during the remainder of the fiscal year, as of August 31, 2019. Agencies reported a total of 102 fiscal year 2019 data center closures through August 31, 2019, with an additional 184 planned closures by the end of that fiscal year. Figure 1 aggregates this information to show agencies’ overall fiscal year 2019 progress against the reported total number of federal data centers. In regard to the remaining data centers, as of August 2019, 12 of the 24 agencies reported plans to close 37 data centers in fiscal year 2020 and beyond. Specifically, 10 agencies reported plans to close 31 additional data centers in fiscal year 2020. Further, two agencies—Energy and the Social Security Administration (SSA)—reported plans to close a total of five data centers in 2021, and one agency—the Department of Homeland Security (DHS)—reported plans to close one data center in 2022. Based on our past work reviewing agencies’ DCOI strategic plans, this total number of planned closures is likely to increase when agencies submit their annual DCOI strategic plans in the spring of 2020. However, the ability to track agencies’ progress against their goals is hampered because the agencies are not reporting their planned and achieved closures on a fiscal year basis, and in one case, the agency had not submitted a plan. As of September 2019, neither the agencies’ strategic plans nor the IT Dashboard provided a specific breakdown of the planned and achieved closures for each fiscal year. OMB’s guidance on DCOI strategic plans only requires reporting cumulative numbers, and staff in OMB’s Office of the Federal CIO confirmed that the IT Dashboard is now intended to report agencies’ cumulative numbers of actual and planned data center closures, rather than numbers broken out by fiscal year. This lack of visibility into exactly how many closures the agencies expect to achieve every fiscal year jeopardizes OMB’s and Congress’ ability to effectively oversee agencies’ data center consolidation efforts. In August 2016, OMB expanded its definition of a data center to include many smaller facilities that OMB cited as consuming significant amounts of resources. Specifically, OMB included rooms with at least one server, providing IT-related services, and categorized data centers into two groups: tiered (which had to meet specific characteristics defined by OMB) and non-tiered. We previously reported that, based on this definition, as of August 2018, the 24 agencies planned to have a total of 4,907 operating data centers at the beginning of fiscal year 2019. However, OMB’s June 2019 revised DCOI reporting requirements further changed the definition of a data center, including no longer requiring agencies to report most of the facilities previously categorized as non- tiered data centers. As noted previously, OMB directed agencies to stop reporting on spaces not designed to be data centers as part of their inventory. As a result, agencies are no longer required to report on about 2,000 facilities, some of which are considerable in size and will continue to operate. Based on OMB’s revised definition of a data center, agencies revised their data center inventory counts and now reported 2,727 operating data centers at the beginning of fiscal year 2019. Specifically, our analysis identified 20 data centers of more than 1,000 square feet that agencies had previously reported as planned for closure, but will not be reported under the current definition. In addition, our analysis found 260 data centers over 1,000 square feet, previously categorized as non-tiered, that agencies plan to continue operating, but which will no longer be reported as part of DCOI. This includes SSA, which plans to no longer report on, but to continue operating, five data centers that are each over 8,000 square feet. Similarly, the Department of State (State) plans to no longer report on, but to keep operating, two facilities that are each at least 10,000 square feet in size. Further, many of the smaller facilities that are now exempt from DCOI reporting represent what OMB has said in the past are the types of data centers that should be included in DCOI because of the risks they posed. Specifically, in its 2016 guidance memorandum, OMB stated that these smaller facilities posed a cybersecurity risk, and consequently, identified them as data centers that needed to be included in consolidation efforts under DCOI. In particular, OMB called out server rooms and closets as security risks that should be targeted for closure. However, while OMB’s 2019 guidance noted the need to address security at these locations and encouraged agencies to continue working to consolidate and optimize them, there is no requirement for agencies to continue to track and report on their progress in closing these smaller facilities. In July 2019, we found that IT systems supporting federal agencies, such as those found in the government’s data centers, are inherently at risk. Specifically, we reported that because these systems can be highly complex and dynamic, technologically diverse, and often geographically dispersed, these factors increase the difficulty of protecting their security. Since each physical location represents a potential access point to an agency’s interconnection with other internal and external systems and networks, each location also poses a risk as a point of potential attack. We also noted that IT systems are often riddled with security vulnerabilities—both known and unknown. Cybersecurity vulnerabilities, such as unsecured access points, can facilitate security incidents and cyberattacks that disrupt critical operations; lead to inappropriate access to and disclosure, modification, or destruction of sensitive information; and threaten national security, economic well-being, and public health and safety. Because of OMB’s decision to remove these types of data centers from DCOI reporting, agencies may lose track of the security vulnerabilities that these facilities present due to the consequent reduction in overall visibility and oversight into all data centers. In its June 2019 guidance, OMB also outlined a process by which agencies could request, and OMB approve, that specific facilities be removed from reporting. As part of this process, agencies were allowed to identify data centers to be removed in one reporting period and then actually remove them in the next, unless OMB provided a written denial within 30 days of the original request. Similarly, agencies could request an exemption for mission critical facilities from their closure target; that request also allows 30 days for OMB to object to the request before an agency should consider the request approved. However, there is currently no documentation of OMB’s decisions on requests to remove specific data centers from reporting, or to exempt the data centers from closure targets because the facility is mission critical. Although an agency’s data center inventory included fields for documenting OMB’s decisions with regard to potential exemptions to optimization, there is no requirement or mechanism to document OMB’s approval that a data center could be dropped from reporting or exempt from closure. There is also no mechanism that would allow a third party to determine whether OMB is providing any denials within the 30 days specified in the DCOI guidance. Staff in OMB’s Office of the Federal CIO acknowledged that someone without access to OMB’s repository of agencies’ data center inventories could not determine whether OMB completed its review within the required time period. We recognize that OMB’s data center definition and reporting revisions are an effort to focus agency closure and optimization efforts on certain types of facilities. However, OMB’s own past guidance has acknowledged the security risks posed by the types of facilities that agencies can now exclude from DCOI. While agencies are best positioned to determine whether these locations should be closed or optimized, it is important that these facilities, previously covered by DCOI, continue to be reported on quarterly, regardless of whether they are subject to closure or optimization. Further, the lack of transparency into OMB’s approval process for removing certain facilities from reporting due to a lack of documentation hinders its ability to understand how and why those decisions are made. This, in turn, jeopardizes OMB’s and Congress’ ability to effectively oversee agencies’ data center consolidation and optimization efforts. Since 2013, federal agencies have been required to report on data center cost savings. In this regard, OMB provided guidance regarding how agencies were to report cost savings and avoidances. Specifically, it required agencies to report both data center consolidation cost savings and avoidances, among other areas, as part of a quarterly data collection process known as the integrated data collection. FITARA also called for each agency to submit a multi-year strategy for achieving the consolidation and optimization of data centers that includes year-by-year calculations of investment and cost savings through fiscal year 2018, which has now been extended to 2020. In addition, OMB’s June 2019 memorandum, M-19-19, noted that agency-specific targets would be set in collaboration with each agency and aligned to that agency’s mission and budget. In their fiscal year 2019 DCOI strategic plans, agencies identified a collective goal of achieving $241.5 million in savings. As of August 2019, the 24 DCOI participating agencies had collectively identified in their quarterly reports to OMB a total of $202.36 million in data center-related cost savings for fiscal year 2019, with an additional $39.14 million expected to be realized in the remaining month of the fiscal year. Specifically, 18 agencies reported that they had met or exceeded their cost savings targets, including seven agencies that did not have a cost savings target and did not report achieving any cost savings. Further, 12 agencies reported plans to achieve about $264 million in data center- related cost savings for fiscal year 2020. Five agencies that had cost savings targets—the Departments of Agriculture (Agriculture), Commerce (Commerce), DHS, and State; and the National Aeronautics and Space Administration (NASA)—reported that they had not yet met their targets, but planned to do so. Additionally, as noted previously, OPM had not submitted its DCOI strategic plan as of August 2019 and, therefore, did not identify cost savings targets for fiscal year 2019 and beyond. Table 2 provides a breakdown of each agency’s planned and achieved cost savings for fiscal year 2019, as of August 2019, and planned savings for fiscal year 2020, according to their DCOI strategic plans and quarterly reporting. Agencies that did not report achieving any cost savings provided a variety of reasons for why they had not done so. For example, officials in the Department of Veterans Affairs’ (VA) Office of the CIO reported 12 data center closures, but said they did not report any achieved cost savings because the majority of those data centers were within multi-use facilities that were still owned and maintained by the agency. However, according to VA’s DCOI strategic plan, the agency plans to achieve cost savings in fiscal year 2020 because it expects to stop leasing two data centers, which is expected to reduce data center spending. In addition, officials from three agencies—the Department of Housing and Urban Development (HUD), the General Services Administration (GSA), and the United States Agency for International Development (USAID)— reported that they did not have any agency-owned data centers and had limited opportunity to achieve cost savings related to closing and optimizing their data centers. According to OPM officials, the agency did not have a savings target due to the lack of a fiscal year 2019 DCOI strategic plan, which was attributed by the officials to an oversight that resulted from changes in OPM CIO leadership at the time the plan was due. The officials reported that the agency continued to execute on a plan that was already in place and they did not anticipate any meaningful changes in the agency’s DCOI strategy for 2020. The officials said they expect OPM to submit its fiscal year 2020 strategic plan on time in April 2020. Overall, the 24 participating DCOI agencies have reported a total of $4.7 billion in cost savings and avoidances from fiscal years 2012 through 2019. We have previously stressed that identifying and reporting the savings resulting from agencies’ data center consolidations was an important indicator for monitoring the progress of DCOI. Until OPM submits a plan that identifies its cost savings targets to OMB, the agency’s ability to plan how to achieve DCOI’s expected benefits will be limited. In addition, until the five agencies that still expect to achieve savings establish and meet their cost savings targets, DCOI may not deliver the expected financial benefits. FITARA required OMB to establish metrics to measure the optimization of data centers, including server efficiency, and to ensure that agencies’ progress toward meeting those metrics is made available to the public. Pursuant to this requirement, OMB has used several different sets of performance measures that have changed over time. Most recently, and as previously noted, OMB issued revised DCOI guidance in June 2019 that defined a set of three revised and one new data center optimization metrics to replace the five previous metrics. According to the OMB memorandum that published these changes, the current metrics were intended to focus optimization efforts in key areas where agencies can make meaningful improvements and achieve further cost savings through optimization. Table 3 provides a description of the four data center optimization metrics and how each metric is to be calculated. According to the June 2019 revised DCOI guidance, agencies are to focus their optimization efforts on their remaining open, agency-owned, tiered data centers. OMB also included in the guidance its plans to work with the agencies to set agency-specific optimization performance targets for each fiscal year. According to staff in OMB’s Office of the Federal CIO, these targets are to be established by fiscal year and progress toward meeting them is expected to be provided via the IT Dashboard. For three of OMB’s June 2019 optimization metrics, 19 of the 24 DCOI agencies reported progress in meeting OMB’s fiscal year 2019 data center optimization targets identified on the IT Dashboard. Specifically, as of September 2019: 11 reported that they had met their target for virtualization, 11 reported that they had met their advanced metering target, and 18 reported that they had met their server utilization target. Of the remaining five agencies, OPM had not submitted a DCOI strategic plan as of September 2019 and consequently, did not have established optimization targets or a basis to measure and report optimization progress. The remaining four agencies—the Department of Education (Education), HUD, GSA, and USAID—reported that they did not have any agency-owned data centers in their inventory and, therefore, the optimization metrics were not applicable. In addition, Justice had not established a target for the server utilization metric and, therefore, did not have a basis to measure and report progress. Figure 2 summarizes the DCOI agencies’ progress in meeting each optimization target, as of September 2019. Of the 19 agencies with a basis to report against OMB’s optimization targets, eight agencies—Energy, DHS, the Department of the Interior, State, NASA, NSF, NRC, and SSA—reported meeting three targets as of September 2019. Also, five agencies reported that they had met two targets, and six agencies reported meeting one target. Table 4 lists the DCOI agencies and their status on meeting their OMB optimization performance targets. Of the current DCOI metrics, as shown in table 4, agencies reported greater success in meeting their agency-specific optimization targets than we had reported in our previous reviews, as detailed in appendix II. As of September 2019, the IT Dashboard reported that four agencies had fully completed their overall DCOI optimization efforts for all of their data centers and had no further work to do. The IT Dashboard further reported that another four agencies had met their optimization targets for fiscal year 2019. However, eight agencies had not met their fiscal year 2019 virtualization target. The reasons agencies provided for not meeting the target varied. For example, officials in the Department of Agriculture’s Office of the CIO reported that the department did not meet the virtualization target because the closure date for one of its data centers was moved to fiscal year 2020, which resulted in fewer virtualized hosts for 2019 under OMB’s new definition. Additionally, although EPA did not meet its virtualization target, its DCOI strategic plan described the agency’s intention to meet its goals by expanding its virtualization strategy agency-wide, which would increase the agency’s virtualization performance. In addition, OMB required agencies to report the number of agency- owned data centers with advanced energy metering. As of September 2019, of the 19 agencies with the basis to report, eight reported that they did not reach their target for having such metering in their data centers. For example, officials at the Department of Veteran Affairs reported that they did not meet their advanced energy metering target due to difficulties in getting a contract in place to install the metering. Further, for the new availability metric, there were unexpected variances in how agencies reported information—thus rendering the data for this metric unreliable. Specifically, according to OMB’s quarterly reporting instructions, agencies were to report the number of hours, in the 3-month reporting period, that each data center was expected to be available to provide services. However, several agencies reported information based on annual, instead of quarterly, calculations. In addition, Department of Agriculture officials stated that, for one data center, they reported the total number of availability hours for multiple instances where they provided data center services to other agencies. Based on the various instances of erroneous agency reporting that we identified, we determined that the data for this metric was not sufficiently reliable for us to use. When the problems with these data were brought to agencies’ attention, many agreed that their reporting needed to be updated; in some cases, the agencies updated their information, but not in time for it to be analyzed and addressed in this report. Based on our discussions with agencies, we will continue to monitor their progress in improving the accuracy of their reporting for this metric through our follow-up efforts for this report, as well as our future mandated reviews of DCOI progress. Additionally, and as mentioned previously, Justice had not established a target for server utilization. Officials in the department’s Justice Management Division stated that this was due to OMB’s issuing the revised DCOI guidance and metrics in June 2019. Once they can track server utilization for a few reporting periods, the officials stated that the agency will finalize its definition for underutilized severs and establish an appropriate target for the metric. Overall, while agencies reported more success in meeting the current optimization metrics, most agencies did not meet all of their metric targets for fiscal year 2019. Until these agencies take the steps necessary to meet their optimization targets, it is unlikely that these agencies will achieve the expected benefits of optimization and the resulting cost savings. Given that our April 2019 report included recommendations for all of the agencies except Commerce that missed an optimization target to take action to meet the data center optimization metric targets established under DCOI by OMB, we are not making new optimization- related recommendations to those agencies. GAO’s Green Book provides the standards for internal control in the federal government and an overall framework for establishing and maintaining an effective internal control system. Such a control system addresses, in part, the attainment of a federal entity’s objectives, which is accomplished through monitoring specific performance measures. Such monitoring is also expected to assess the quality of performance over time. In addition, the Green Book discusses the importance of clearly defining an entity’s objectives in order to determine what is trying to be achieved and to establish related performance measures. According to the Green Book, the controls represented by an agency’s performance metrics should include these key characteristics. The controls should be: Clearly defined in measurable terms that are easily understood. Objective and free of bias, rather than subjective. Defined by appropriate parameters that allow for evaluating performance. Understood by all levels of the organization, including what is being achieved with the metric, who is primarily responsible for achieving the metric, how the metric will be achieved, and when the metric will be achieved. Aligned with internal and external requirements, including applicable legislation, regulations, and standards. We found that all four of OMB’s current optimization performance metrics met three of these five characteristics—that is, each was clearly defined, objectively measurable, and aligned with internal and external requirements. However, the performance metrics did not fully meet the two other characteristics—namely they did not include appropriate performance parameters and did not fully include all the information that would allow them to be understood at all levels of the organization. Table 5 provides our assessment of the extent to which the OMB metrics aligned with the characteristics of an effective metric. In addition, appendix III provides additional detail of our assessment of the characteristics of each metric. While all four of OMB’s metrics met three of the five characteristics of an effective metric, none of the metrics addressed the fourth characteristic of providing appropriate performance parameters. Specifically, none of the metrics included statistical universe parameters that would enable a determination of progress against goals. For example, the virtualization metric requires an agency to report the number of its virtual hosts, but does not relate that to the overall number of servers and mainframes at the agency. As a result, the metric does not indicate whether an agency’s reported number of virtual hosts is almost all of that agency’s servers and mainframes, or very few. Similarly, the server utilization metric identifies how many underutilized servers an agency has, but does not give the context of how that relates to the agency’s total population of servers. In both these cases, percentages cannot be calculated to determine progress. For instance, while the number of an agency’s virtualized servers may increase, if the universe of servers were to increase at a higher rate, then progress would actually be negative. In the June 2019 DCOI revised guidance, OMB acknowledged removing targeted averages for its metric targets. However, by doing so, OMB also removed important information that provided a relative sense of the progress indicated by the data. Further, the lack of performance parameters in defining the metrics had an impact on OMB’s public reporting of agencies’ progress. The IT Dashboard displays agencies’ consolidation and progress information through a DCOI Optimization Summary that displays data about the number of agency data center facilities, achieved and planned closures, achieved and planned IT cost savings, and progress of the current performance metrics against the related targets. However, the IT Dashboard does not provide important information, such as in which fiscal year the targets are to be achieved and how the metric information being reported relates to an agency’s operations. For example, the IT Dashboard reports the number of servers and mainframes serving as virtual hosts in agency-managed data centers, but does not provide the total number of servers and mainframes to give the context of how well agencies are managing the number of their virtual hosts. Staff in OMB’s Office of the Federal CIO stated that the lack of performance parameters for the metrics is due to OMB and the agencies needing time to collect baseline data before making changes to the metrics. However, until OMB addresses missing information from the optimization metric definitions, the metrics will lack important and meaningful information about agencies’ DCOI performance that would assist OMB and Congress in their oversight roles. In addition, unless OMB takes action to update the metrics’ definitions to include missing key metric characteristics, agencies’ reporting may not provide an accurate view of their data center optimization progress. Further, without this information on the IT Dashboard, Congress lacks the information needed to inform its decision making and oversight responsibilities. Federal data center consolidation efforts have been underway since 2010, and agencies continue to report progress towards meeting their goals for data center closures and achieving related savings. Specifically, almost all of the 24 DCOI agencies met, or planned to meet, their goals for data center closures in fiscal year 2019. Additionally, in fiscal year 2019, almost all of the agencies met or planned to meet their $249 million total savings target. Agencies’ efforts in both respects have made an important contribution to achieving the overall goals of DCOI. However, agencies’ annual closure goals are not currently reported in their DCOI strategic plans or tracked on the IT Dashboard, requiring us to manually calculate those targets. Unless agencies’ annual closure goals are fully reported and tracked, oversight of DCOI will be hampered. Further, the six agencies without plans to meet their fiscal year data center closure or cost savings targets will continue to be challenged to realize the full benefits of DCOI. As part of the 2019 changes to DCOI, OMB significantly reduced the scope of what is considered a data center, and, in doing so, excluded about 2,000 smaller facilities that were previously reported by agencies in 2018. While OMB previously acknowledged that these types of facilities inefficiently consume resources and pose security risks, agencies are no longer required to report these locations in their inventories. Further, there is currently no documentation of OMB’s decisions on agency requests to remove data centers from reporting, or to exempt mission critical data centers from closure targets. By no longer reporting key facilities as part of DCOI and by not documenting decisions on which facilities are exempt from DCOI, oversight of agencies’ consolidation and optimization efforts may be impaired, and agencies may remain exposed to the related vulnerabilities. Agencies’ progress against OMB’s three revised metrics was mixed, and, for one new metric, agencies reported data that varied so widely, we concluded the data for this metric were not sufficiently reliable for us to report on. However, in comparing OMB’s four metrics against the characteristics of an effective metric, we most notably found that none of the metrics included appropriate performance parameters for evaluating agencies’ progress against goals. Metrics that include more robust and informative agency performance data can play an important role in both achieving the optimization goals and mission of DCOI and allowing for stronger oversight of those efforts. In addition to reiterating our prior open recommendations to the agencies in our review regarding their need to meet DCOI’s closure and savings goals and optimization metrics, we are making a total of eight new recommendations—four to OMB and four to three of the 24 agencies. Specifically: The Director of the Office of Management and Budget should (1) require that agencies explicitly document annual data center closure goals in their DCOI strategic plans and (2) track those goals on the IT Dashboard. (Recommendation 1) The Director of the Office of Management and Budget should require agencies to report in their quarterly inventory submissions those facilities previously reported as data centers, even if those facilities are not subject to the closure and optimization requirements of DCOI. (Recommendation 2) The Director of the Office of Management and Budget should document OMB’s decisions on whether to approve individual data centers when designated by agencies as either a mission critical facility or as a facility not subject to DCOI. (Recommendation 3) The Director of the Office of Management and Budget should take action to address the key performance measurement characteristics missing from the DCOI optimization metrics, as identified in this report. (Recommendation 4) The Secretary of Agriculture should take action to achieve its data center- related cost savings target established under DCOI by OMB. (Recommendation 5) The Secretary of Commerce should take action to achieve its data center- related cost savings target established under DCOI by OMB. (Recommendation 6) The Secretary of Commerce should take action to meet its data center optimization metric targets established under DCOI by OMB. (Recommendation 7) The Administrator of the National Aeronautics and Space Administration should take action to achieve its data center-related cost savings target established under DCOI by OMB. (Recommendation 8) We provided a draft of this report to OMB and the 24 agencies for their review and comment. In response, of the seven agencies to which we made recommendations, five agencies stated that they agreed with the recommendations and two agencies did not state whether they agreed or disagreed with the recommendations. In addition, of the 18 agencies to which we did not make recommendations, three agencies stated that they concurred with the information presented in the report, three other agencies did not state whether they agreed or disagreed with the report, and 12 agencies stated that they had no comments on the report. Further, four agencies provided technical comments on the report, which we incorporated as appropriate. Of the agencies to which we made recommendations, five agreed with the recommendations. In an email, a Director for Strategic Planning, Egovernment, and Audits in the Office of the CIO at Agriculture stated that the department agreed with our recommendation to achieve its data center-related cost savings target established under DCOI and that it planned to meet the cost savings target in 2020. Agriculture also included technical comments, which we have incorporated as appropriate. In written comments, Commerce agreed with our recommendations to achieve its data center-related cost savings target established under DCOI and to meet its data center optimization metric targets established under DCOI by OMB. The department also described actions that they planned to take in order to address the recommendations. Commerce’s comments are reprinted in appendix IV. In written comments, DHS agreed with our recommendation to achieve its data center-related cost savings target established under DCOI. Further, the department stated that, in its November 2019 DCOI data submission, it reported $354.97 million in cumulative DCOI cost savings through fiscal year 2019. Subsequent to reviewing our draft report, the department provided documentation of the savings claimed in their response. In reviewing this data, we confirmed that these cumulative savings included the $33.8 million savings the department had planned for fiscal year 2019. As a result, we consider our recommendation to have been addressed and therefore removed it from the final report. DHS also provided technical comments, which we have incorporated as appropriate. DHS's comments are reprinted in appendix V. In written comments, NASA agreed with our recommendation to achieve its data center-related cost savings target established under DCOI and described actions that the agency planned to take to address the recommendation. NASA stated that it expects to complete these actions by March 31, 2020. NASA's comments are reprinted in appendix VI. In written comments, OPM agreed with our recommendation to develop and submit to OMB a complete DCOI strategic plan. Subsequent to reviewing our draft report, OPM informed us that the agency had published its fiscal year 2019 plan, and that the agency was on track to meet the OMB reporting deadline for fiscal year 2020. We confirmed that OPM's fiscal year 2019 strategic plan was published and publicly available through the agency's website. As a result, we consider our recommendation to have been addressed and therefore removed it from the final report. OPM's comments are reprinted in appendix VII. In addition, two agencies did not state whether they agreed or disagreed with their recommendations. In an email, a GAO liaison on OMB’s Ethics Team provided an annotated copy of our draft report. In OMB’s comments in that copy of the draft, OMB did not agree or disagree with our recommendations. However, OMB took issue with the report’s findings that the removal of facilities from DCOI oversight posed cybersecurity-related risks represented by those facilities. OMB’s comments further recommended that we remove references to cybersecurity from our report’s title and from the body of the report. In raising these objections, OMB’s comments stated that DCOI is focused on consolidating and optimizing the federal data center portfolio and that cybersecurity is not a primary driver of the initiative. OMB added that DCOI was never designed to track or directly address cybersecurity risks. Specifically, OMB’s comments took issue with our finding that data centers not tracked within DCOI are at a greater risk for a cybersecurity incident. These comments noted that many other laws, policies, and procedures directly deal with the cybersecurity posture of all federal IT systems, and that OMB’s DCOI guidance does not affect the applicability of those requirements. The comments also acknowledged that, while past DCOI guidance has stated that the reduction of data centers may improve the cybersecurity posture of federal agencies, this was because agency CIOs could better allocate constrained resources across a smaller portfolio of devices. We agree that agencies are subject to numerous cybersecurity requirements external to DCOI. We also agree that a reduced portfolio of data centers may improve the cybersecurity of an agency. However, our report focuses on OMB’s recent DCOI policy changes that allow agencies to stop tracking and reporting on over 2,000 data centers. In this discussion, we cite our July 2019 report which found that, facilities such as these, represent a potential access point to an agency’s systems and networks and pose a risk as points of potential attack. OMB’s policy changes do not require agencies to continue to close these points of access, nor do they yield the smaller portfolio of devices that OMB referenced in its comments on our draft report. Our report notes that OMB’s policy change to remove those data centers from DCOI reporting may contribute to agencies losing track of the security vulnerabilities that those facilities present because DCOI has provided a mechanism for ongoing visibility and oversight of these facilities separate from the federal government’s cybersecurity framework. As such, we maintain our report accurately characterizes the increased potential for cybersecurity risk that could be posed by these now-unreported physical locations. We also affirm that our related recommendation to OMB to require agencies to report in their quarterly inventory submissions, those facilities previously reported as data centers, even if those facilities are not subject to the closure and optimization requirements of DCOI, is still appropriate. In written comments, State did not say whether it agreed or disagreed with our recommendation to achieve its data center-related cost savings target established under DCOI by OMB. Subsequent to reviewing our draft report, the department informed us of $61.1 million in fiscal year 2019 optimization and consolidation cost savings and avoidances, an amount in excess of its $58.9 million fiscal year 2019 target, and provided documentation to support this claim. The department also stated that this information would be reported in the department's annual DCOI strategic plan update in the second quarter of fiscal year 2020. In reviewing the documentation provided by the department, we confirmed State’s reported $61.1 million in fiscal year 2019 savings. As a result, we consider our recommendation to have been addressed and therefore removed it from the final report. State's comments are reprinted in appendix VIII. Further, of the 18 agencies to which we did not make recommendations, three agencies agreed with the information presented in the report. Via emails, audit liaisons in the Office of the CIO at Justice, the Office of the Assistant Secretary for Policy at Labor, and the Office of Congressional and Legislative Affairs at VA agreed with the findings in the draft report. In addition, three agencies did not state whether they agreed or disagreed with the report. In written responses, Defense and USAID did not state whether they agreed or disagreed with the draft report. The agencies' responses are reprinted in appendices IX and X respectively. In an email, an audit liaison in the OIG-GAO Audit Liaison Office at Interior did not state whether the department agreed or disagreed with the draft report. The department also provided technical comments, which we have incorporated as appropriate. Finally, 12 agencies stated that they had no comment on the report. In written responses, HUD and SSA stated that they had no comments on the draft report. The agencies' responses are reprinted in appendices XI and XII respectively. We also received emails from officials of Education, Energy, HHS, Transportation, Treasury, EPA, GSA, NSF, NRC, and SBA, which stated that the agencies had no comment on the report. EPA also provided technical comments, which we have incorporated as appropriate. We are sending copies of this report to interested congressional committees, the Director of OMB, the secretaries and heads of the departments and agencies addressed in this report, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix XIII. This report addresses (1) agencies’ progress on data center closures and the related savings that have been achieved, and agencies’ plans for future closures and savings and (2) agencies’ progress against the Office of Management and Budget’s (OMB) data center optimization targets. To address the first objective, for data center closures, we obtained and analyzed August 2019 data center inventory documentation from the 24 departments and agencies (agencies) that participate in OMB’s Data Center Optimization Initiative (DCOI). To determine data center closures to date, we totaled their reported closures for fiscal year 2019 through August 31, 2019, and, to identify future closures, we totaled their reported planned closures for fiscal years 2019 through 2022. We also compared agencies’ completed and planned closures to the planned fiscal year 2019 consolidation goals, as documented in their DCOI strategic plans. OMB’s guidance for developing agencies’ DCOI strategic plans required agencies to report cumulative numbers for their planned and achieved data center closures; as a result, we calculated agencies’ fiscal year 2019 targets from the data reported in DCOI plans. To verify the quality, completeness, and reliability of each agency’s data center inventory, we compared information on completed and planned data center closures to similar information reported on OMB’s IT Dashboard—a public website that provides information on federal agencies’ major IT investments. We also checked for missing data and other errors, such as missing closure status information. In some cases identified, we followed up with agency officials to obtain further information. We determined that the data were sufficiently complete and reliable to report on their consolidation progress and planned closures. For cost savings and avoidances, we obtained and analyzed documentation from the 24 DCOI agencies. This documentation is required by OMB’s March 2013, August 2016, and June 2019 memorandums and included the agencies’ quarterly reports of cost savings and avoidances posted to their digital services websites and their DCOI strategic plans. To determine cost savings achieved, we totaled agencies’ reported savings and avoidances from the start of fiscal year 2012 through August 2019, as found in the August 2019 quarterly reports posted to the agencies’ digital services websites. To identify future planned savings, we totaled the agencies’ projected savings and avoidances from fiscal years 2019 through 2020, as reported in their DCOI strategic plans. To assess the quality, completeness, and reliability of each agency’s data center consolidation cost savings information, we used the latest version of each agency’s quarterly cost savings report and DCOI strategic plan as of August 31, 2019. We also reviewed the quarterly reports and DCOI strategic plans for errors and missing data, such as missing cost-savings information. In addition, we compared agencies’ cost savings and avoidances with data from our most recent data center consolidation report. Further, we obtained written responses from agency officials regarding the steps they took to ensure the accuracy and reliability of their cost savings data. As a result, we determined that the data were sufficiently complete and reliable to report on agencies’ data center consolidation cost-savings information. For our second objective, we analyzed the September 2019 data center optimization progress information of the 20 DCOI agencies. This progress information was obtained from the IT Dashboard. We then compared the agencies’ current optimization progress information to agencies’ fiscal year 2019 optimization targets, as documented on the IT Dashboard. In addition, to assess the reliability of agencies’ optimization progress information on OMB’s IT Dashboard, we reviewed the information for errors or missing data, such as progress information that was not available for certain metrics. We also compared agencies’ optimization progress information across two reporting quarters to identify any inconsistencies in agencies’ reported progress. We also followed up with the agencies to understand the steps they took to insure that what they reported to OMB was accurate and reliable. We determined that the data were sufficiently complete and reliable to report on agencies’ progress information for virtualization, advanced energy metering, and server utilization. However, for the fourth metric—data center availability—our analysis identified variances in how agencies reported their data. According to OMB’s quarterly reporting instructions, agencies were to report the number of hours, in the 3-month reporting period, that each data center was expected to be available to provide services. Instead, several agencies reported information based on annual, instead of quarterly, calculations. In addition, Department of Agriculture officials stated that, for one data center, they reported the total number of availability hours for multiple instances where they provided data center services to other agencies. Because of these variances and the impact they had on the reported information, we determined that the availability metric data were insufficiently reliable to report on agencies’ progress. To assess whether OMB’s new performance metrics met key characteristics of an effective performance measure, we adapted principles from the Green Book that described characteristics of effective performance measures. The Green Book provides an overall framework for establishing and maintaining an effective internal control system that includes monitoring through performance measures. We then compared each OMB optimization performance metric, as defined in the revised DCOI guidance and reported on OMB’s IT Dashboard, to the criteria we identified from the Green Book to determine the extent to which each metric met each characteristic. We conducted this performance audit from April 2019 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Since the enactment of FITARA in December 2014, we have reviewed and verified the quality and completeness of each covered agency’s inventory and Data Center Optimization Initiative (DCOI) strategy annually. Accordingly, we have published reports documenting the findings and recommendations from each of these reviews. In addition, we have examined and reported on agencies’ efforts to optimize their data centers, as well as the challenges encountered and successes achieved. As of December 2019, 75 of the 117 recommendations from these reports had not been fully implemented. In a report that we issued in March 2016, we noted that agencies had reported significant data center closures—totaling more than 3,100 through fiscal year 2015—but fell short of the Office of Management and Budget’s (OMB) fiscal year 2015 consolidation goal. Agencies also reported significant consolidation cost savings and avoidances—totaling about $2.8 billion through fiscal year 2015. However, we pointed out that many agencies lacked complete cost savings goals for the next several years despite having closures planned. In addition, we reported that 22 agencies had made limited progress against OMB’s fiscal year 2015 data center optimization performance metrics, such as the utilization of data center facilities. Accordingly, we recommended that the agencies take actions to complete their cost savings targets and improve optimization progress. As of December 2019, 17 of the 32 recommendations from this report had yet to be fully addressed. In May 2017, we reported that the agencies continued to report significant data center closures—totaling more than 4,300 through August 2016— with more than 1,200 additional centers planned for closure through fiscal year 2019. The agencies also reported achieving about $2.3 billion in cost savings through August 2016. However, agencies’ total planned cost savings for fiscal years 2016 through 2018 were more than $2 billion less than OMB’s fiscal year 2018 cost savings goal of $2.7 billion. In addition, our May 2017 report identified weaknesses in agencies’ DCOI strategic plans. Of the 23 agencies that had submitted their strategic plans at the time of our review, seven had addressed all of the five required elements of a strategic plan, as identified by OMB (such as providing information related to data center closures and cost savings metrics). The remaining 16 agencies that submitted their plans either partially met or did not meet the requirements. Given these findings, we recommended that OMB improve its oversight of agencies’ DCOI strategic plans and their reporting of cost savings and avoidances. We also recommended that 17 agencies complete the missing elements in their strategic plans, and that 11 agencies ensure the reporting of consistent cost savings and avoidance information to OMB. As of December 2019, five of the 30 recommendations had not been fully addressed. In a subsequent report that we issued in August 2017, we noted that 22 of the 24 agencies required to participate in the OMB DCOI had collectively reported limited progress against OMB’s fiscal year 2018 performance targets for the five optimization metrics. Specifically, for each of the five targets, no more than five agencies reported that they had met or exceeded that specific target. In addition, we noted in the report that most agencies had not implemented automated monitoring tools to measure server utilization, as required by the end of fiscal year 2018. Specifically, four agencies reported that they had fully implemented such tools and 18 reported that they had not done so. Two agencies did not have a basis to report on progress because they did not have any agency-owned data centers. Accordingly, we recommended that OMB formally document a requirement for agencies to include plans, as part of existing OMB reporting mechanisms, to implement automated monitoring tools at their agency-owned data centers. We also recommended that the 18 agencies without fully documented plans take action within existing OMB reporting mechanisms to complete plans describing how they intended to achieve OMB’s requirement to implement automated monitoring tools at all agency-owned data centers by the end of fiscal year 2018. As of December 2019, two of the 19 recommendations had been fully addressed. In May 2018, we noted that the 24 agencies participating in DCOI reported mixed progress toward achieving OMB’s goals for closing data centers by September 2018. Over half of the agencies reported that they had either already met, or planned to meet, all of their OMB-assigned closure goals by the deadline. However, four agencies reported that they did not have plans to meet all of their assigned goals and two agencies were working with OMB to establish revised targets. With regard to agencies’ progress in achieving cost savings, 20 agencies reported planned and achieved savings that totaled $1.62 billion for fiscal years 2016 through 2018. However, this total was approximately $1.12 billion less than OMB’s DCOI savings goal of $2.7 billion. In addition, the 24 agencies continued to report limited progress against OMB’s five data center optimization targets, with one agency meeting four targets, one meeting three targets, six meeting either one or two targets, and 14 meeting none of their targets. Further, as of August 2017, most agencies were not planning to meet OMB’s fiscal year 2018 optimization targets. Because we had previously made a number of recommendations to OMB and the 24 DCOI agencies to help improve the reporting of data center- related cost savings and to achieve optimization targets, we did not make new recommendations in our May 2018 report, but indicated that we would continue to monitor the agencies’ progress toward meeting OMB’s DCOI goals. Most recently, in April 2019, we reported that the 24 DCOI agencies continued to report mixed progress toward achieving OMB’s goals for closing data centers and realizing the associated savings by September 2018. Thirteen agencies reported that they had met, or had plans to meet, all of their OMB-assigned closure goals by the deadline. However, 11 agencies reported that they did not have plans to meet their goals. In addition, 16 agencies reported that they had met, or planned to meet, their cost savings targets, for a total of $2.36 billion in cost savings for fiscal years 2016 through 2018. This is about $0.38 billion less than OMB’s DCOI savings goal of $2.7 billion. This shortfall is the result of five agencies reporting less in planned cost savings and avoidances in their DCOI strategic plans as compared to the savings targets established for them by OMB. Three agencies did not have a cost savings target and did not report any achieved savings. Regarding data center optimization, the 24 agencies reported limited progress in fiscal year 2018 against OMB’s five optimization targets. In this regard, 12 agencies reported that they had met at least one target, while 10 reported that they had not met any of the targets. Two agencies stated that they did not have a basis to report on progress as they did not own any data centers. Further, 20 agencies did not plan to meet all of OMB’s fiscal year 2018 optimization goals. Specifically, only two agencies reported plans to meet all applicable targets, while six reported that they did not plan to meet any of the targets. As a result of these findings, we recommended that 22 agencies take actions to meet the data center closure, cost savings, and optimization performance metrics targets, as appropriate. As of December 2019, none of the 36 recommendations had been fully addressed. As noted previously in this report, the Office of Management and Budget (OMB) issued revised Data Center Optimization Initiative (DCOI) performance metrics in June 2019 as part of its revised DCOI guidance. According to OMB, the four current data center optimization metrics were intended to focus targeted improvements in key areas where agencies can make meaningful improvements and achieve further cost savings through optimization. OMB’s intent was to avoid using averages for metrics and instead identify metrics where agencies could demonstrate continuous improvement beyond the performance period of the June 2019 memorandum. OMB stated this would provide a more accurate measure of the agencies’ data center performance. GAO published the Green Book, which provides the standards for internal control in the federal government and an overall framework for establishing and maintaining an effective internal control system. Such a control system addresses, in part, the attainment of a federal entity’s objectives, which is accomplished through monitoring specific performance measures. Such monitoring is also expected to assess the quality of performance over time. In addition, the Green Book discusses the importance of clearly defining an entity’s objectives in order to determine what is to be achieved and to establish related performance measures. According to the Green Book, the controls represented by an agency’s performance metrics should include several key characteristics. Clearly defined in measurable terms that are easily understood. Objective and free of bias, rather than subjective. Defined by appropriate parameters that allow for evaluating performance. Understood by all levels of the organization, including what is being achieved with the metric, who is primarily responsible for achieving the metric, how the metric will be achieved, and when the metric will be achieved. Aligned with internal and external requirements, including applicable legislation, regulations, and standards. We compared each OMB optimization performance metric, as defined in the revised DCOI guidance and reported on OMB’s IT Dashboard, to the key effective metric characteristics identified in the Green Book. In assessing each of the OMB metrics against the key characteristics, we assigned one of three categories: Met. The metric definition aligned with the characteristics of an effective metric. Partially met. The metric definition aligned with some, but not all, the characteristics of an effective metric. Not met. The metric definition did not align with the effective metric characteristics. OMB’s virtualization metric counted the number of servers and mainframes serving as a virtual host in an agency-managed data center. We found that the virtualization metric met three characteristics, met two of four parts of one characteristic, and didn’t meet one. Table 6 provides our evaluation of the extent to which this OMB metric aligns with key characteristics of an effective metric. OMB’s advanced energy metering metric counted the data centers with advanced energy metering covering the majority of their floor space. We found that the advanced energy metering metric met two characteristics, met three of four parts of one characteristic, and did not meet two. Table 7 provides our evaluation of the extent to which this OMB metric aligned with key characteristics of an effective metric. OMB’s server utilization metric counts the number of underutilized production servers in federal data centers. We found that the underutilized servers metric met three characteristics, met two of four parts of one characteristic, and did not meet one. Table 8 provides our evaluation of the extent to which this OMB metric aligned with key characteristics of an effective metric. OMB’s data center availability metric calculated the ratio of uptime (when the data center services were available) to unexpected downtime (unplanned service outages) in data centers. We found that the data center availability metric met two characteristics, met two of four parts of one characteristic, and did not meet two. Table 9 provides our evaluation of the extent to which the OMB metric aligned with key characteristics of an effective metric. In addition to the contact named above, individuals making contributions to this report included Dave Hinchman (Assistant Director), Justin Booth (Analyst-in-Charge), Lamis Alabed, Chris Businsky, Nancy Glover, Gina Hoover, and Jonathan Wall.", "summary": "In December 2014, Congress enacted federal IT acquisition reform legislation that included provisions related to ongoing federal data center consolidation efforts. OMB's Federal Chief Information Officer launched DCOI to build on prior data center consolidation efforts; improve federal data centers' performance; and establish goals for inventory closures, cost savings and avoidances, and optimization performance. The 2014 legislation included a provision for GAO to annually review agencies' data center inventories and strategies. This report addresses (1) agencies' progress and plans for data center closures and savings; and (2) agencies' progress against OMB's June 2019 revised data center optimization metrics. To do so, GAO assessed the 24 DCOI agencies' data center inventories as of August 2019, reviewed their reported cost savings documentation, evaluated their data center optimization strategic plans, and assessed their progress against OMB's established optimization targets. GAO also compared OMB's revised metrics to key characteristics of an effective performance measure. The 24 agencies participating in the Office of Management and Budget's (OMB) Data Center Optimization Initiative (DCOI) reported progress toward achieving OMB's fiscal year 2019 goals for closing unneeded data centers. As of August 2019, 23 of the 24 reported that they had met, or planned to meet, their fiscal year closure goals, and would close 286 facilities in doing so (see figure). Agencies also reported plans to close at least 37 of the remaining data centers. OMB issued revised guidance in June 2019 that narrowed the scope of the type of facilities that would be defined as a data center. This revision eliminated the reporting of over 2,000 facilities government-wide. OMB had previously cited cybersecurity risks for these types of facilities. Without a requirement to report on these, important visibility is diminished, including oversight of security risks. The 24 DCOI agencies have reported a total of $4.7 billion in cost savings from fiscal years 2012 through 2019. Of the 24 agencies, 23 reported in August 2019 they had met, or planned to meet, OMB's fiscal year 2019 savings goal of $241.5 million. One agency did not complete a plan, but planned to do so in the future. Agencies also reported plans to save about $264 million in fiscal year 2020. The 24 agencies reported progress against OMB's three revised data center optimization metrics for virtualization, advanced energy monitoring, and server utilization. For a new fourth metric (availability), the data were not sufficiently reliable to report on because of unexpected variances in the information reported by the agencies. As of August 2019, eight agencies reported that they met all three targets for the metrics GAO reviewed, five met two targets, and six met one target. In addition, one agency had not established any targets, and four agencies reported that they no longer owned any data centers. While the three revised metrics' definitions included the key characteristics of being clearly defined and objective, none included statistical universe parameters that enable determinations of progress. Specifically, these metrics call for counts of the actual numbers of (1) virtualized servers, (2) data centers with advanced energy metering, and (3) underutilized servers; but the metrics did not include a count of the universe of all servers and all data centers. Accordingly, percentages cannot be calculated to determine progress–for example, the number of virtualized servers may increase, but if the universe of servers increases at a higher rate, then progress would actually be negative. To improve DCOI reporting and performance, GAO is making four recommendations to OMB, and four to three selected agencies. The three agencies agreed with the recommendations while OMB did not state whether it agreed or disagreed. GAO continues to maintain that the four recommendations to OMB are warranted.", "document_type": "gao"}
{"report": "Private health insurance is the leading source of health coverage in the United States. Small and large employers may offer fully insured group plans (by purchasing coverage from an issuer) or self-funded group plans (by setting aside funds to pay for employee health care). Most small employers purchase fully insured plans, while most large employers self- fund at least some of their employee health benefits. While the majority of health insurance coverage is provided through the small or large group market, Americans without access to group health coverage, such as those with employers that do not offer health coverage, may choose to purchase it directly from an issuer through the individual market. (See fig. 1 for total covered life-years reported by issuers to CMS in the individual and fully insured small and large group markets.) We previously identified several factors that can affect concentration in health insurance markets. High concentration levels have often been the result of consolidation—mergers and acquisitions—among existing issuers. In addition, concentration can persist because of the difficulty for new issuers to enter the market. For example, new issuers that do not yet have large numbers of enrollees may have greater challenges negotiating discounts with health care providers. PPACA contains provisions that may affect market concentration and competition among health issuers, such as the establishment of health insurance exchanges within each state’s overall individual and small group markets. One goal of the exchanges is for issuers to have an incentive to compete with one another on price and value because consumers can visit a website to compare and select among health plans participating in the exchanges. Issuer participation in the exchanges is a key factor in assuring that consumers have a choice of health plans. While PPACA does not require issuers offering coverage in an overall market to participate in the exchanges, issuers have an incentive to do so in order to access additional consumers. For example, certain consumers earning from 100 to 400 percent of the federal poverty level are eligible to receive premium tax credits that can reduce premium costs, but only for plans purchased through an exchange. The federal government and some states have also instituted other provisions to encourage issuers to participate in the exchanges. For example, PPACA required the establishment of the Consumer Oriented and Operated Plan (CO-OP) program, which provided loans to new consumer-governed, nonprofit issuers that are required to offer health plans in the individual and small group exchanges. In addition, in Maryland, certain issuers that offered plans outside of the exchange are also required to offer plans through the exchange. PPACA also established other key market reforms that apply both within and outside of the exchanges, such as requiring that issuers offer coverage to all individuals regardless of health status and limiting the ability of issuers to deny coverage or charge higher premiums to individuals and small groups based on health risks or certain other factors. Since the enactment of PPACA in 2010, there have been additional federal policy changes that may influence an issuer’s decision about whether to participate in health insurance markets. For example, in 2014, HHS announced that a program that made payments to issuers whose losses exceeded a certain threshold—known as risk corridor payments—would be budget neutral, which resulted in reduced payments for some issuers. One issuer told us that this lower than expected funding was one of multiple factors that contributed to its decision to reduce the number of insurance markets in which it participated. States’ overall individual health insurance markets were generally concentrated in 2015 and 2016, similar to what we reported for previous years. Individual market exchanges—representing 57 percent of the overall individual market nationally in 2016—were also concentrated in most states and in many cases became more concentrated in recent years. States’ overall individual health insurance markets were generally concentrated among a small number of issuers in 2015 and 2016. On average, there were 16 issuers participating in each state in 2016. However, that same year, the 3 largest issuers cumulatively held 80 percent or more of the market—an indicator of high concentration—in 37 of 51 states, generally consistent with what we previously reported for years 2011 through 2014 (see fig. 2). The remaining issuers in each state often had significantly smaller market shares—on average, 12 of the 16 issuers in each state held less than 5 percent market share. We also found that in over half of states in 2016, a single issuer held at least 50 percent of the market, consistent with prior years. Specifically, a single issuer held at least 50 percent market share in 28 states in 2016. Of these states, a single issuer held between 80 and 90 percent market share in 5 states, and more than 90 percent market share in 2 states. For example, although West Virginia had 15 issuers in 2016, a single issuer, Highmark, held 91 percent market share. This largest issuer position was held by the same company in both 2015 and 2016 in 45 states; in 35 of these states, the largest issuer had been the same since 2011. While states’ overall individual markets generally remained concentrated, they experienced fluctuations in the extent of concentration in recent years. Specifically, from 2014—the last year of data on which we previously reported—to 2016, the market share of the three largest issuers increased in 30 states (with a median increase of 4 percentage points) and decreased in 21 states (with a median decrease of 6 percentage points). (See fig. 3.) However, despite these changes, states that were highly concentrated in 2014—that is, where the market share of the three largest issuers was at least 80 percent—generally remained highly concentrated in 2016. Our analyses found that states’ individual market exchanges—collectively representing 57 percent of enrollment in the overall individual market nationally in 2016—were generally concentrated among a small number of issuers from 2015 to 2017. Each year during this time period, for the 49 states for which we had complete data, on average, between 3 and 5 issuers participated in the individual market exchanges across the states’ rating areas. Further, each year, the three largest issuers held 80 percent or more of the exchange market, on average, across the states’ rating areas, in at least 46 states. For example, in Wisconsin in 2017, the market share of the three largest issuers ranged from 75 percent in 2 of the state’s 16 rating areas to 100 percent in 6 rating areas; on average, the three largest issuers held 92 percent market share across the 16 rating areas. While the number of states meeting this 80 percent average threshold for high concentration remained relatively constant from 2015 through 2017, market share was increasingly concentrated among a smaller number of issuers in many states, as fewer issuers participated in the exchanges by 2017. The number of states with three or fewer issuers, on average, in their rating areas—and where the issuers therefore held, on average, 100 percent or nearly 100 percent market share—increased from 16 states in 2015 to 32 states in 2017. (See fig. 4.) Further, we found that in at least 35 states each year from 2015 through 2017, the average market share of the largest individual market exchange issuer across the states’ rating areas was at least 50 percent. For example, although Kansas had up to three participating exchange issuers in each of its rating areas in 2017, the largest issuer in each rating area— generally Blue Cross and Blue Shield of Kansas—had at least 88 percent market share. We also found that many states’ individual market exchanges became more concentrated from 2015 to 2017. In 32 of the 49 states, the average market share of the largest exchange issuer across the states’ rating areas increased between 2015 and 2017, with a median increase of 13 percentage points. (See fig. 5.) For example: In Arizona, the average market share of the largest exchange issuer across the state’s rating areas increased by about 60 percentage points, from 39 percent in 2015 to 98 percent in 2017. This increase corresponded with a decrease in issuer participation in the exchange; the state’s seven rating areas had between 7 and 12 issuers in 2015, but by 2017 had only 1 or 2 issuers. In 2015, a CO-OP, Compass Cooperative Health Plan, Inc., had 29 percent of the total exchange market share statewide in Arizona and was among the largest issuers in three rating areas, but it exited the exchange after that year. Other, smaller issuers also exited the exchange after 2015 and 2016, and, in 2017, Blue Cross Blue Shield of Arizona was left as the only issuer in five of the state’s rating areas. In South Carolina, the average market share of the largest exchange issuer increased by 41 percentage points, from 59 percent in 2015 to 100 percent in 2017. As in Arizona, the increase corresponded with a decrease in issuer participation in the exchange, from 2 to 4 issuers in the state’s 46 rating areas in 2015 to only 1 issuer—BlueCross BlueShield of South Carolina—in each rating area in 2017. In addition, a CO-OP, Consumers’ Choice Health Insurance Company, had 43 percent of the total exchange market share statewide and was the largest issuer in nearly half of the state’s rating areas in 2015, but it exited the exchange after that year. In contrast, BlueCross BlueShield of South Carolina had 42 percent of the total exchange market share statewide and was the largest issuer in about half of the rating areas in 2015, and by 2017 was the only remaining issuer in the state. In the remaining 17 states, the average market share of the largest exchange issuer across the states’ rating areas decreased between 2015 and 2017, with a median decrease of 12 percentage points. For example: In Maine, the average market share of the largest exchange issuer decreased by 39 percentage points, from 81 percent in 2015 to 42 percent in 2017. Maine Community Health Options, a CO-OP, remained the largest issuer in each of the state’s four rating areas during this period. However, the other two issuers in these rating areas captured more market share. For instance, Harvard Pilgrim Health Care Group had 1 percent or less market share in each rating area in 2015, but as much as 32 percent market share in one of the state’s rating areas in 2017. In Delaware—which only had one rating area—the market share of the largest exchange issuer decreased by 37 percentage points, from 92 percent in 2015 to 55 percent in 2017. Although the state had the same two issuers, Aetna Group and Highmark Group, throughout this time period—and Highmark Group was the largest issuer each year— Aetna Group’s market share increased from 8 percent in 2015 to 45 percent in 2017. Our analyses found that the overall small group health insurance market remained concentrated in recent years, similar to our prior report. Small group exchanges often had low enrollment—typically less than 1 percent of the overall small group market—and also remained concentrated in recent years. State small group health insurance markets were concentrated among a small number of issuers in 2015 and 2016. On average, there were 8 issuers participating in each state in 2016. However, in that same year the 3 largest issuers cumulatively held 80 percent or more of the market—an indicator of high concentration—in about three-quarters of states, generally consistent with what we previously reported for years 2011 through 2014 (see fig. 6). The remaining issuers in each state often had significantly smaller market shares—on average, 5 of the 8 issuers in each state held less than 5 percent market share. Further, we found that the largest issuers held 50 percent or more of the market in 30 states in 2016. For example, though Louisiana had 6 issuers in 2016, the largest issuer held 76 percent market share. Overall, a single issuer held between 80 and 90 percent market share in 10 states, and more than 90 percent market share in 1 state. This largest issuer position was held by the same company in both 2015 and 2016 in 46 states; in 40 of these states, the largest issuer had been the same since 2011. While states’ overall small group markets remained concentrated, they experienced fluctuations in concentration in recent years. From 2014 through 2016, the market share of the 3 largest issuers increased in 35 states (with a median increase of 3 percentage points), remained the same in 1 state, and decreased in 15 states (with a median decrease of 1 percentage point). (See fig. 7.) However, despite these changes, states that were highly concentrated in 2014—that is, where the market share of the three largest issuers was at least 80 percent—generally remained highly concentrated in 2016. Our analyses found that states’ SHOP exchanges remained concentrated from 2015 to 2017, with only slight overall changes in issuer participation or market share. Further, as a proportion of the overall small group market, SHOP exchanges in most states had little enrollment. (See sidebar.) Small Group Health Options Program (SHOP) Enrollment as a Proportion of the Overall Small Group Market As a proportion of the overall small group market, SHOP exchanges in most states had little enrollment—that is, typically less than 1 percent of the overall small group market. For example, in 2016, Alaska’s small group market had 17,257 covered life-years, while its SHOP exchange had 96 covered life-years (0.6 percent). The District of Columbia, Rhode Island, and Vermont were the only states where the SHOP exchange was more than 3 percent of the overall small group market. The District of Columbia and Vermont require all small group plans to be purchased through the state’s SHOP exchange. (See app. III.) In each year, more than 31 of the 46 states for which we had data had three or fewer issuers in the SHOP exchange; therefore between one and three issuers held 100 percent of the market share for the state. Among states with four or more issuers, the market share of the three largest issuers was typically at least 80 percent. For example, California had 6 participating issuers from 2015 through 2017 in the SHOP exchange, and the market share for the three largest issuers in that state ranged from 92 to 93 percent across the 3 years. (See fig. 8.) On average, the number of participating issuers in the SHOP exchange decreased slightly from 2015 through 2017. However, in a few states, there were larger changes in issuer participation and concentration. For example, Ohio’s SHOP exchange had 7 participating issuers in 2015, decreasing to 4 issuers in 2017. Across this time period, the market share of the three largest issuers in Ohio’s SHOP exchange increased from 59 percent to 98 percent. Conversely, New York’s SHOP exchange had 10 issuers in 2015, decreasing to 8 issuers in 2017; but the market share of the three largest issuers decreased by almost 7 percentage points within that time. Further, we found that in at least 38 of 46 states each year from 2015 through 2017, the largest issuer held at least 50 percent of the SHOP exchange market share. In 23 states, the market share of the largest issuer increased during this period, with a median increase of 11 percentage points, and in 6 additional states the largest issuer was the only issuer in the SHOP exchange and thus held 100 percent market share for all 3 years. (See fig. 9.) For example: In Kentucky, the market share of the largest issuer in the SHOP exchange increased by 56 percentage points, from 42 percent in 2015 to 98 percent in 2017. In 2015, the largest issuer was Kentucky Health Cooperative, a CO-OP that exited the SHOP exchange after 2016. The second largest issuer in 2015, Wellpoint Inc. Group, increased market share over this time period, from 33 percent in 2015 to 98 percent in 2017, becoming the largest issuer. The market share of the other remaining issuer in Kentucky’s SHOP exchange, Baptist Health Plan, Inc., decreased from 19 percent in 2015 to 1 percent in 2017. In Ohio, the market share of the largest issuer in the SHOP exchange increased by 54 percentage points, from 29 percent in 2015 to 83 percent in 2017. Across this time period, the largest issuer changed from Medical Mutual of Ohio (which had 29 percent market share in 2015 and 8 percent in 2017) to Wellpoint Inc. Group (which had 12 percent market share in 2015 and 83 percent in 2017). This increase in the largest issuer’s market share corresponded with a decrease in issuer participation. The state had 7 participating issuers in 2015, decreasing to 4 in 2017. The market share of the 3 issuers that left ranged from 9 to 16 percent. In the remaining 17 states, the market share of the largest issuer decreased between 2015 and 2017, with a median decrease of 7 percentage points. In some states, these decreases were significant. For example, in Maine, the market share of the largest issuer, Maine Community Health Options—a CO-OP—decreased by 40 percentage points, from 89 percent in 2015 to 49 percent in 2017. During this time period, while Maine Community Health Options remained the largest issuer, the other two participating issuers gained additional market share. For example, Harvard Pilgrim Health Care Group increased market share from 6 percent in 2015 to 38 percent in 2017. In 2015 and 2016, states’ overall large group health insurance markets remained concentrated, as in prior years. On average, there were 10 participating issuers in each state in 2016. However, in that same year the 3 largest issuers held at least 80 percent market share in 43 of 51 states, which is generally consistent with prior years. (See fig. 10.) In 2016, 3 issuers held 99 or 100 percent of the large group market in 7 states—Alabama, Alaska, Mississippi, Nebraska, North Dakota, South Carolina, and Vermont. The remaining issuers in each state often had significantly smaller market shares—on average, 6 of the 10 participating issuers in each state held less than 5 percent market share. In more than 30 states in 2015 and 2016, market share was not only concentrated among a small number of issuers, but a single issuer held at least 50 percent of the overall large group market, as in prior years. A single issuer held at least 50 percent market share in 33 states in 2016, with significantly higher levels of concentration by the largest issuer in some states. For example, in 2016, a single issuer held at least 90 percent of the market in Alabama and at least 80 percent of the market in 5 other states (Alaska, Mississippi, Montana, South Carolina, and Vermont). Further, this largest issuer position was held by the same company in 2015 and 2016 in 49 states; and, in 47 of those states, the largest issuer position has been held by the same company since 2011. The extent of concentration in the overall large group market remained relatively constant when comparing 2014—the last year of data on which we previously reported—to 2016. The market share of the 3 largest issuers increased in 24 states and decreased in 24. (See fig. 11.) The largest increase was in Wisconsin, where the market share of the 3 largest issuers increased from 38 percent in 2014 to 44 percent in 2016, and the largest decrease was in New York, where the market share of the 3 largest issuers decreased from 55 percent in 2014 to 47 percent in 2016. We provided a draft of this report to HHS for review and comment. The department provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate Congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IX. This table presents covered life-years in each state’s individual market health insurance exchange as a proportion of total covered life-years in each state’s overall individual market in 2016. The four tables below present information on the number of participating issuers and market share of the largest issuers in each state’s individual market exchange from 2015 through 2017. Specifically, Table 2 presents the total number of exchange issuers in each state. Table 3 presents the average number of exchange issuers across each state’s rating areas. Table 4 presents the names and market shares of the single largest exchange issuer, and market share of the largest three issuers, for each state. Table 5 presents the average market share of the largest issuer across each state’s rating areas. This table presents covered life-years in each state’s Small Business Health Options Program (SHOP) exchange as a proportion of total covered life-years in each state’s overall small group market in 2016. The two tables below present information on the participation of issuers in each state’s small group health insurance exchange from 2015 to 2017 and the market share of the largest and three largest issuers from 2015 to 2017. The two tables below present information on the participation of issuers in each state’s overall individual health insurance market from 2011 to 2016, and the market share of the largest and three largest issuers from 2014 to 2016. Table 11 provides market share for the 23 consumer operated and oriented plans (CO-OPs) participating in state individual market and Small Business Health Options Program exchanges for 2015 through 2017. CO- OPs are new consumer-governed, nonprofit issuers created under the Patient Protection and Affordable Care Act. Out of the 23 CO-OPs originally operating in 2014, all but four, operating in five states, had ceased operations by the end of 2017. The two tables below present information on the participation of issuers in each state’s overall small group health insurance market from 2011 to 2016 and the market share of the largest and three largest issuers from 2014 to 2016. The two tables below present information on the participation of issuers in each state’s overall large group health insurance market from 2011 to 2016 and the market share of the single largest and three largest issuers from 2014 to 2016. In addition to the contact named above, William D. Hadley, Assistant Director; Katherine L. Amoroso, Analyst-in-Charge; Priyanka Sethi Bansal; Giselle Hicks; John Lalomio; and Sarah-Lynn McGrath made key contributions to this report. Also contributing were Yesook Merrill; Laurie Pachter; Vikki Porter; Oliver Richard; and Emily Wilson.", "summary": "A highly concentrated health insurance market may indicate less competition and could affect consumers' choice of issuers and the premiums they pay. In 2014, PPACA required the establishment of health insurance exchanges—a new type of marketplace where individuals and small groups can compare and select among insurance plans sold by participating issuers—and the introduction of other reforms that could affect market concentration and competition among issuers. GAO previously reported that enrollment through these newly established exchanges was also generally concentrated. PPACA included a provision for GAO to study market concentration. This report describes changes in the concentration of enrollment among issuers in (1) overall individual, small group, and large group markets, and (2) individual and small group exchanges. GAO determined market share in the overall markets using enrollment data from 2015 and 2016 that issuers are required to report annually to the Centers for Medicare & Medicaid Services (CMS) and compared that data to 2011 through 2014 enrollment data GAO analyzed in previous reports. GAO determined market share in the exchanges from 2015 through 2017 using other sources of enrollment data from CMS and states. For all data sets, GAO used the most recent data available. Enrollment in private health insurance plans continued to be concentrated among a small number of issuers in 2015 and 2016. In the overall large group market (coverage offered by large employers), small group market (coverage offered by small employers), and individual market (coverage sold directly to individuals), the three largest issuers held 80 percent of the market or more in at least 37 of 51 states. This is similar to what GAO previously reported for 2011 through 2014. GAO also found that within the overall individual and small group markets in each state, the health insurance exchanges established by the Patient Protection and Affordable Care Act (PPACA) were also concentrated from 2015 to 2017. For the individual market exchanges, in each year, three or fewer issuers held 80 percent or more of the market, on average, in at least 46 of the 49 state exchanges for which GAO had data. Further, the largest issuers increased their market share in about two-thirds of exchanges. The number of issuers participating in a market and their market shares can affect concentration, and many individual exchanges generally had a decreasing number of participating issuers over time. For the small group market exchanges, in each year, three or fewer issuers held 80 percent or more of the market in at least 42 of the 46 state exchanges for which GAO had data. The small group exchanges also had slight changes in issuer participation and market share over this time period. GAO received technical comments on a draft of this report from the Department of Health and Human Services and incorporated them as appropriate.", "document_type": "gao"}
{"report": "The Mexico City Policy, which the U.S. government announced at the United Nations Conference on Population in Mexico City in 1984, required foreign NGOs to agree they would not, as a condition for receiving U.S. assistance for family planning, perform or actively promote abortion as a method of family planning. As shown in figure 1, subsequent administrations have rescinded or reinstated the policy through executive branch action, typically through presidential memoranda. In a January 2017 Presidential Memorandum, the Trump Administration reinstated and expanded the Mexico City Policy, directing the Secretary of State in coordination with the Secretary of Health and Human Services to implement a plan to extend the requirements of the reinstated policy to all global health assistance furnished by all departments or agencies to the extent allowable by law. Consequently, the policy, later renamed PLGHA, applies to billions of dollars in annual U.S. global health assistance—such as HIV/AIDS, maternal and child health, and malaria— rather than only family planning and reproductive health assistance, which received about $560 million in GHP account funding in fiscal year 2018. State reported that USAID, State, and DOD began applying the PLGHA policy as of May 15, 2017, and HHS applied the policy as of May 31, 2017. The affected departments and agencies applied the policy to: (1) All existing grants and cooperative agreements that provide global health assistance that received new funding after May 2017. Agencies established a PLGHA standard provision for inclusion in relevant grants and cooperative agreements for global health assistance requiring foreign NGOs to agree that, during the term of the award, they would not perform or actively promote abortion as a method of family planning in foreign countries, or provide financial support to any foreign NGO that does. Agency officials stated that after the policy was implemented, when additional funds were to be obligated to relevant awards with foreign NGOs, these organizations would be required to accept the PLGHA terms and conditions to receive these additional funds, or decline the award. (2) All new grants and cooperative agreements that provide global health assistance awarded after May 2017, according to a State report. The PLGHA terms and conditions apply to foreign NGOs that receive global health assistance prime awards or sub-awards. Prime awardees, including U.S. NGOs, may not provide assistance under the awards to any foreign NGOs that perform or actively promote abortion as a method of family planning, are required to include the PLGHA standard provision in sub-awards to foreign NGOs, and may be held liable for the sub- awardee’s failure to comply with the conditions of the policy. According to UN reporting, the legality of abortion varies among countries receiving U.S. global health assistance. This may result in some countries legally permitting abortion services that are not permitted under the PLGHA policy, according to NGO representatives we met with. The representatives noted that under these circumstances, foreign NGOs would be prohibited under the policy from providing such services, even with non-U.S. funds, as a condition of receiving U.S. global health assistance. Additionally, in March 2019, the Secretary of State clarified that foreign NGOs that accept U.S. global health assistance may not provide financial support, “with any source of funds and for any purpose, to another foreign NGO that performs, or actively promotes, abortion as a method of family planning.” According to agency officials, the PLGHA terms and conditions do not apply under the following circumstances: Global health contracts. State reported that the executive branch is taking steps to develop a PLGHA contract clause through a formal rule-making process required to revise the Federal Acquisition Regulation. Awards funded out of the Food for Peace program. Water Supply and Sanitation assistance funded from the Development Assistance account. Assistance provided directly by U.S.-based organizations. The PLGHA policy does apply, however, to sub-awards made by U.S.- based organizations to foreign NGOs. Assistance provided directly to national governments, such as ministries of health. Assistance to multilateral organizations. This includes but is not limited to U.S. global health funds provided to the Global Fund to Fight AIDS, Tuberculosis, and Malaria (the Global Fund) and the Joint United Nations Program on HIV/AIDS (UNAIDS). In a May 2017 briefing on the PLGHA policy, State noted that humanitarian assistance, including State Department migration and refugee assistance activities, USAID disaster and humanitarian relief activities, and U.S. Department of Defense disaster and humanitarian relief were also all excluded from the policy. State also noted that the Secretary of State, in consultation with the Secretary of HHS, may authorize additional case-by-case exemptions to the policy. Congress provided about $8.7 billion for the Global Health Programs account (GHP) in fiscal year 2018, most of which supported HIV/AIDS assistance managed by State and implemented through transfers of funds to several agencies and contributions to multilateral organizations (see table 1). Because of the various exclusions described above, not all global health funds are subject to the PLGHA policy. In particular, State’s fiscal year 2018 contribution of $1.35 billion to the Global Fund is not subject to the policy because it is a multilateral institution. USAID and CDC had the most global health assistance awards subject to the PLGHA policy, representing more planned funding than other agencies (see table 2). In total, U.S. agencies reported that they applied the PLGHA policy to 1,309 prime awards active in May 2017 or made through September 2018. There were 761 active awards when agencies implemented the policy in May 2017, and 548 new awards that began after they implemented the policy. Most awards started in fiscal year 2016 or later, although some started earlier. Average award duration varied among agencies. The estimated total value of these 1,309 awards was almost $29 billion across multiple fiscal years, of which about $12 billion was planned funding that had not yet been obligated as of September 30, 2018, and is subject to the PLGHA policy upon acceptance of the PLGHA terms and conditions. USAID awards represented 50 percent of planned funds that were not yet obligated for awards subject to the PLGHA policy, while CDC awards represented 46 percent of such funds. Other HHS component agencies’ awards subject to the policy combined represented almost 4 percent of planned funds that were not yet obligated. DOD and State awards represented less than 1 percent of these funds. State’s awards were relatively numerous but shorter-term and of smaller dollar value than other agencies’ awards. Agencies reported that, as of September 30, 2018, over $8 billion of the more than $12 billion in estimated planned funding (over 66 percent) for awards subject to PLGHA that were active between May 2017 and September 2018 was for HIV/AIDS assistance (see table 3). All DOD and State planned funding, and almost all HHS planned funding, supported HIV/AIDS assistance. USAID reported that its planned funding was distributed across several global health areas including HIV/AIDS, family planning and reproductive health, maternal and child health, and tuberculosis. Agencies reported that over $8 billion of the more than $12 billion (over 66 percent) of the estimated planned funding for awards subject to PLGHA that were active between May 2017 and September 2018 was for awards in Africa (see table 4). Awards in Asia accounted for the second highest level of planned funding for an individual region at almost $600 million (5 percent). Global awards implemented in more than one region represented about $3 billion in planned funding (26 percent). By global health assistance area and region, HIV/AIDS assistance in Africa accounted for the most planned funding that had not yet been obligated for awards subject to PLGHA: over $6 billion of about $12 billion (52 percent) (see table 5). The next largest category was global HIV/AIDS assistance awards, which accounted for over $1 billion (13 percent). The top 10 countries receiving the most estimated planned funding that had not yet been obligated under awards subject to PLGHA accounted for over $6 billion of more than $12 billion (54 percent) (see table 6). All 10 countries are in sub-Saharan Africa. Of these countries, South Africa had the most planned funding remaining (over $2.4 billion) that was subject to the policy. See appendix II for more details on the locations of awards subject to PLGHA. USAID identified 53 awards—six prime awards and 47 sub-awards in which NGOs declined to accept PLGHA terms and conditions. CDC identified one prime award in which an NGO declined to accept the policy’s terms and conditions. These prime and sub-awards had about $153 million in estimated planned funding remaining that was not obligated at the end of fiscal year 2018 (see table 7). DOD and State did not identify any declinations. The remaining planned funding that was not obligated as of September 30, 2018, represents an estimate of the amount that had been planned for the awards but which was not obligated under these awards because awardees declined to accept the terms and conditions of the PLGHA policy, according to the agencies. USAID identified six prime awards in which NGOs declined to accept PLGHA terms and conditions resulting in an estimated $94 million in planned funding that was not obligated as of September 30, 2018. These six prime awards, presented in table 8, supported different global health assistance areas. Three of the awards were global in scope, two provided assistance to India, and one provided assistance to Zimbabwe. The two largest of the six prime awards declined were global awards to Marie Stopes International (MSI) and International Planned Parenthood Federation (IPPF), both of which publicly stated that they could not meet the conditions of PLGHA because abortion services or referrals are part of reproductive health care services they provide and a right to which their patients are entitled. Together, these two awards had about $79 million remaining in planned funding that was not obligated as of September 30, 2018. The primary objective of these two awards was to increase access to and use of family planning products and services, although the award to MSI also supported maternal and child health and HIV/AIDS and the IPPF award supported HIV/AIDS in addition to family planning and reproductive health, according to information provided by USAID. According to MSI and IPPF representatives, these two awards both included, among other activities, mobile family planning and reproductive health outreach activities that reached underserved rural populations in multiple countries. While MSI and IPPF were able to obtain some funding from other donors when the USAID awards were suspended, the additional funds fell far short of the funds provided by USAID, according to the organizations’ representatives, resulting in reductions in family planning services they provided to recipient countries. CDC identified one prime award in which an NGO declined to accept the PLGHA terms and conditions. According to CDC, this award had about $8.4 million remaining of a 5-year, $10.5 million award ceiling for delivery of HIV services in sexual and reproductive health clinics and in confidential clinics for commercial sex workers in Ethiopia. USAID identified 47 global health sub-awards in which foreign NGOs declined to accept the PLGHA policy’s terms and conditions and thus ceased receiving U.S. funding under those awards following implementation of the PLGHA policy (see table 9). The planned funding that was not obligated for these sub-awards amounted to about $51 million, as of September 30, 2018. As shown in table 9, sub-awards with NGOs that declined to accept the PLGHA terms and conditions involved multiple global health assistance areas. Family planning and reproductive health represented the largest share of planned sub-award value involving declinations, followed by awards supporting multiple global health areas and HIV/AIDS. Sub-awards involving declinations also addressed maternal and child health, tuberculosis, and nutrition assistance. According to data provided by USAID, sub-awards in which NGOs declined the PLGHA terms and conditions occurred in multiple regions, but primarily in countries in Africa. USAID identified 32 sub-awards implemented in African countries involving NGOs that declined the PLGHA terms and conditions following implementation of the policy. The estimated total value of these sub-awards was about $56 million, of which more than half (about $32 million) remained as planned funding that was not obligated as of September 30, 2018 (see table 10). Of the 47 sub-awards for which the PLGHA terms and conditions were declined, 26 were declined by affiliates of either IPPF or MSI. The estimated total award value of these 26 sub-awards amounted to over half of the value of the 47 sub-awards (see figure 2). Four countries had the largest estimated amount of sub-award funds declined by NGOs, with at least $8 million in planned funding that was not obligated as of September 30, 2018 (see table 11). For example, two declined sub-awards implemented in Senegal had a combined $9.7 million in planned funding that was not obligated as of September 30, 2018. These two sub-awards were implemented by an MSI affiliate that, among other services, used the USAID funds to operate mobile family planning clinics for beneficiaries in rural, underserved areas. According to MSI representatives, these sub-awards did not involve abortion services, which MSI indicated are illegal in Senegal. However, the NGO declined the sub-award because of its affiliation with MSI, according to the representatives. Bangladesh had the most sub-awards in which NGOs declined the PLGHA terms and conditions with five. Total planned funding that was not obligated for these five sub-awards amounted to about $9 million as of September 30, 2018. These awards supported multiple areas of global health assistance including family planning and reproductive health, tuberculosis, nutrition, and maternal and child health. We provided a draft of this report to DOD, HHS, State, and USAID, and for review and comment. In their written comments, reproduced in appendix III, USAID stated that it found our estimates of the number and value of awards subject to PLGHA and those in which NGOs declined to accept PLGHA the terms and conditions to be reasonable given the data available. USAID also elaborated on limitations with available data, which we believe are consistent with the data limitations we describe in this report. DOD, HHS, and State did not provide written comments. In addition, HHS, State, and USAID provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretaries of Defense, Health and Human Services, and State, and the Administrator of the U.S. Agency for International Development. In addition, the report is available at no charge on the GAO website at http://www.gao.gov . If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives were to identify (1) global health assistance awards that U.S. agencies determined to be subject to the terms and conditions of the U.S. government’s Protecting Life in Global Health Assistance (PLGHA) policy requiring foreign non-governmental organizations (NGOs) to agree that they would not perform or actively promote abortions as a method of family planning, and (2) planned funding for awards involving NGOs that declined to accept the terms and conditions of this policy. To identify the global health assistance awards subject to the terms and conditions of the PLGHA policy, we obtained data from the Departments of State (State), Health and Human Services (HHS), and Defense (DOD), and the U.S. Agency for International Development (USAID) on all relevant awards active when the policy was first implemented in May 2017 or awarded through September 30, 2018. We identified the relevant agencies based on a February 2018 State report on the initial implementation of PLGHA and discussions with each agency to identify affected component agencies. Component agencies within HHS that identified awards subject to the PLGHA included the Centers for Disease Control and Prevention (CDC), the National Institutes of Health, the Health Resources and Services Administration, and Substance Abuse and Mental Health Services. Within DOD, the Department of the Army and the DOD HIV/AIDS Prevention Program identified awards subject to the policy. To obtain information that was as complete and consistent as possible from each relevant agency on all awards subject to the PLGHA terms and conditions, we created a data collection instrument. This instrument asked the agencies to identify all awards that were subject to the PLGHA, that were either active in May 2017 when the PLGHA policy was first implemented or that were new awards through the end of fiscal year 2018 (September 30, 2018). We analyzed the responses to our data collection instrument to describe the number and estimated total value of the awards, the amount obligated as of September 30, 2018 and the estimated amount of planned funding that was not yet obligated for these awards, the implementing agency, the type of global health assistance, and the recipient countries. Agencies defined estimated total award value as either award ceilings or total award amounts for the life of the award including both funding that recipient organizations may have obligated prior to the PLGHA policy as well as funding that organizations have not yet received but may receive in future years. We asked the agencies to categorize the type of global health assistance based on the Foreign Assistance Standardized Program Structure and Definitions, which State updated in 2016. During the development of this data collection instrument, we discussed drafts with each of the agencies and made modifications as appropriate. We provided definitions for each data element requested that allowed for variations in the ways these agencies collect and record data on awards. To estimate the value of planned funds not yet obligated and therefore subject to the PLGHA policy, we subtracted the obligated amount from the estimated total award value of each award. While this calculation provides an estimate of the funds subject to the PLGHA, it is limited by two factors. First, while planned award funding that was not already obligated before May 2017 when PLGHA was first implemented was made subject to the PLGHA policy, agencies did not have obligations data as of May 2017 readily available but were able to readily identify obligations as of September 30, 2018. Therefore, information provided on planned funding that was not yet obligated as of September 30, 2018, may not capture all of the funding made subject to the PLGHA policy because it does not include obligations between May 2017 and September 30, 2018, for NGOs that accepted PLGHA terms and conditions. Second, estimates of total award value can change over time, according to agency officials. For example, awards could have extensions with additional funding not yet reflected in the estimated total award values agencies provided us. In addition, the estimated total award values the agencies provided could be based on a maximum or ceiling for some awards, which may overstate actual amounts. To identify the prime and sub-awards active in May 2017 that involved NGOs that declined the PLGHA terms and conditions, we developed additional data collection instruments—one for prime awards between agencies and NGOs and one for sub-awards between prime awardees and NGOs—to request information on these awards from the relevant agencies. We followed the same process described above to develop these two additional instruments to identify estimated total value of the awards, obligated amounts as of September 30, 2018, the implementing agency, the type of global health assistance, and the recipient countries. USAID identified 53 declined prime or sub-awards and CDC identified one. For these agencies, identifying these awards involved contacting staff based in overseas posts. The other agencies reported to us that they had no awards in which NGOs declined the PLGHA terms and conditions. A USAID official also noted that the sub-award amounts they provided to us could vary from year to year, which would affect the amounts of remaining planned funding that was not obligated as of September 30, 2018. Nevertheless, we relied on these amounts to estimate the amount of planned funding that was not obligated under these awards as of the end of fiscal year 2018 because the NGOs declined to accept the PLGHA terms and conditions. Efforts taken by prime awardees to replace declined sub-awards were not part of our review. In addition to meeting and corresponding with USAID and CDC officials to discuss awards involving declinations, we interviewed representatives of Marie Stopes International (MSI) and International Planned Parenthood Federation (IPPF)—two prime awardees that publicly declined to accept the terms and conditions of the PLGHA policy. These two NGOs declined the two largest of the six prime awards declined and their local affiliates were implementers of many of the sub-awards that were declined. We discussed with MSI and IPPF the characteristics of these two awards and the accuracy of USAID’s data provided to us on them. We examined the reliability of the data on awards identified by the agencies through testing for logical assumptions such as whether award start dates preceded their end dates, and whether an award’s estimated total value met or exceeded the total amount of funding that had been obligated to it. In addition, we met with agency officials to discuss and correct any discrepancies in the award data they provided. However, we did not independently verify the awards identified or the funds associated with each award. Overall, we found the data on awards subject to the PLGHA policy and in which NGOs declined the terms and conditions of the policy to be sufficiently reliable for the purposes of delineating the agencies, assistance areas, countries, estimated total value of awards, and obligations. As noted earlier, we also calculated the amounts of planned funding that were not obligated as of September 30, 2018, to estimate the amount of funding subject to the policy. We conducted this performance audit from April 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Global health awards that agencies identified as subject to the PLGHA terms and conditions amounted to almost $29 billion in estimated total award value. This amount includes funding that agencies had obligated before implementing the PLGHA policy in May 2017 as well as funding across multiple fiscal years and for potential award extensions. Agencies reported that about $12 billion in funding was not yet obligated as of September 30, 2018. Award funding included assistance to specific countries, as well as awards that were regional or global in scope (see table 12). David Gootnick (202) 512-3149 or gootnickd@gao.gov In addition to the individual named above, Leslie Holen (Assistant Director), Howard Cott, Martin de Alteriis, Kelsey Griffiths, Christopher Keblitis, Andrew Kurtzman, Michael McAtee, Aldo Salerno, Fatima Sharif, and Alexander Welsh made significant contributions to this report.", "summary": "The United States is the world's largest donor of global health assistance. Congress provided about $8.7 billion for the Global Health Programs (GHP) account in fiscal year 2018. In 2017, the President reinstated and expanded a policy, which now requires foreign NGOs to agree that, as a condition of receiving global health assistance, they will not perform or actively promote abortion as a method of family planning or provide financial support during the award term to other foreign NGOs that conduct such activities. The Reagan administration first implemented this policy, known as the Mexico City Policy, in 1984, and subsequent administrations have rescinded and reinstated it. The Mexico City Policy initially applied only to family planning and reproductive health assistance, which received about $560 million of GHP funds in fiscal year 2018. Upon reinstating the policy, the Trump Administration renamed it PLGHA and applied it to all global health assistance to the extent allowable by law. GAO was asked to review the implementation of the PLGHA policy. This report identifies (1) global health assistance awards that U.S. agencies determined to be subject to the U.S. government's PLGHA policy requiring foreign NGOs to agree that they would not perform or actively promote abortion as a method of family planning, and (2) planned funding for awards involving NGOs that declined to accept the terms and conditions of this policy. GAO analyzed data provided by U.S. agencies of awards subject to the PLGHA policy and awards in which NGOs declined to accept the terms and conditions of this policy. U.S. agencies reported to GAO that from May 2017 through fiscal year 2018, they applied the Protecting Life in Global Health Assistance (PLGHA) policy to over 1,300 global health awards. The policy's restrictions on performing or actively promoting abortion as a method of family planning applied to active awards that received new funding after the policy was implemented, and all funding for new awards made after May 2017. As of September 30, 2018, about $12 billion in estimated planned award funding was subject to the policy. The U.S. Agency for International Development (USAID), with over $6 billion, and the Centers for Disease Control and Prevention (CDC), with over $5 billion, awarded about 96 percent of this amount. Agencies implemented these awards across multiple geographic regions and global health assistance areas. About two-thirds of estimated planned funding subject to the policy supported HIV/AIDS assistance, while the remaining third supported other global health areas, such as maternal and child health, and family planning and reproductive health. Over two-thirds of planned funding subject to the policy was for awards in Africa. U.S. agencies identified seven prime awards and 47 sub-awards in which non-governmental organizations (NGOs) declined to accept the terms and conditions of the PLGHA policy, and these awards had about $153 million remaining in estimated planned funding not obligated as of September 30, 2018. The seven prime awards that were declined included six USAID awards and one CDC award and amounted to about $102 million of the $153 million in estimated planned funding that was not obligated. Marie Stopes International and the International Planned Parenthood Foundation declined the two largest of these awards, resulting in about $79 million in planned funding that was not obligated. These two awards included, among other activities, mobile family planning and reproductive health outreach activities to underserved, rural populations in multiple countries. USAID identified all of the 47 sub-awards that were declined, which had a total of about $51 million in planned funds that was not obligated. Thirty-two of the 47 subawards were intended for Africa. by Global Health Assistance Area Source: GAO analysis of agency reported data | GAO-20-347", "document_type": "gao"}
{"report": "Three DOE offices manage 57.2 MT of plutonium declared surplus to defense needs. These offices—NNSA, EM, and DOE’s Office of Nuclear Energy (NE)—and their sites manage a variety of surplus plutonium in the form of pits, metal, oxide, spent nuclear fuel, and other reactor fuels, and they follow specific procedures to manage the plutonium safely and securely. NNSA manages over half of this surplus plutonium. According to NNSA, all three offices share the responsibility for final disposition of surplus plutonium. Figure 1 shows the amounts of surplus plutonium managed by the offices. Figure 2 shows the various forms of this surplus plutonium, including pits, non-pit metal, non-pit oxide, and spent nuclear fuel or other reactor fuels in the inventory, by DOE office. Since 1997, DOE’s surplus plutonium disposition strategies have changed in terms of the method of disposal and the location for disposal, according to DOE documents and officials. These disposition strategies have included immobilization, irradiation as MOX fuel, and dilution. In 1997, NNSA planned to immobilize surplus plutonium by encapsulating it in glass or ceramic materials but terminated its plans in 2002 due to budget constraints. In the mid-2000s, EM briefly considered vitrification, which is a form of immobilization using glass, but never developed a plan to implement it. NNSA planned to irradiate surplus plutonium as part of the MOX fuel strategy but terminated its plans in 2018 because of high costs. NNSA’s plans for irradiation of MOX fuel would also have required disposal of the spent nuclear fuel in a high-level waste repository. EM began implementing a dilute and dispose strategy for a separate portion of surplus plutonium in 2012, but suspended its efforts until it resumed them in 2016. NNSA’s 2018 conceptual plan for the dilute and dispose strategy would replace the MOX fuel strategy with final disposal of the diluted plutonium at WIPP. Figure 3 shows a timeline of the changes in DOE’s strategies since 1997, as well as some key events that have affected the strategies. See appendix II for a timeline of DOE’s disposition strategies and appendix III for a timeline of key events concerning DOE’s Surplus Plutonium Disposition Program. Even if NNSA and EM had successfully implemented strategies for immobilization, vitrification, or irradiation of MOX fuel, DOE would have had no place to dispose of the surplus plutonium that was prepared for disposal because it planned to dispose of this material in a high-level waste repository, and no high-level waste repository has yet been constructed. WIPP would not have been able to take surplus plutonium from these disposition strategies because federal law authorizing disposal of radioactive waste at WIPP specifically bans the disposal of high-level waste and spent nuclear fuel, and the final forms of the surplus plutonium from these disposition strategies would have included both. DOE’s plans for a high-level waste repository have also changed over time. No progress toward licensing and building a high-level waste repository has been made since DOE terminated its licensing efforts in 2010. A high- level waste repository is likely still decades away from becoming operational. Appendix IV contains more information on the progress DOE has made toward licensing and building a high-level waste repository. NNSA’s current dilute and dispose strategy requires that surplus pits, as well as other surplus plutonium in metal form, be converted to plutonium oxide. NNSA’s now-terminated strategy to use surplus plutonium to make MOX fuel also required that surplus plutonium be converted to plutonium oxide. In the early 2000s, NNSA had planned to build a facility—the Pit Disassembly and Conversion Facility at SRS—that was to be dedicated to disassembling pits and converting them to plutonium oxide to meet the high plutonium oxide production requirements for manufacturing MOX fuel. Because of its high costs, however, NNSA canceled the Pit Disassembly and Conversion Facility in January 2012 after having spent $730.1 million on its design, as we reported. In August 2012, DOE provided a report to Congress that described a mix of plutonium oxide production capabilities to replace the canceled Pit Disassembly and Conversion Facility. According to the 2012 report, DOE planned to convert at least 2 MT of surplus plutonium pits to plutonium oxide by 2018 in PF-4 at LANL and an additional 3.7 MT of plutonium oxide at SRS by 2017. According to its 2012 report, NNSA planned for this plutonium oxide to be a reserve of advance feedstock for the MFFF. NNSA anticipated it would begin operations in 2019. According to NNSA, SRS turned out not to be cost-effective at producing plutonium oxide. Specifically, SRS produced 35 kilograms (0.035 MT) of plutonium oxide at SRS’s H Canyon facility over a 2.5-year period ending in 2018. NNSA discontinued plutonium oxide production at H Canyon and focused its plans on expanding ARIES operations at PF-4. According to NNSA, ARIES operations at PF-4 currently host the nation’s only cost-effective plutonium oxide production capability. In 1998, DOE established ARIES at PF-4 at LANL in New Mexico as a technology demonstration project to dismantle pits and convert plutonium metal into an oxide, incorporating automation to reduce liquid waste and workers’ exposure to radiation. ARIES’s technology for converting plutonium to plutonium oxide was designed to generate very little chemical waste and to permit the application of automation, which significantly reduces the risk of workers’ exposure to radiation. Pits have historically been disassembled by a cutting machine. Before ARIES’s technology, recovery of plutonium from cut pits was by an aqueous process—that is, by using liquid chemical processing—which generated significant volumes of both liquid and solid waste. In 2008, NNSA shifted the ARIES mission from a technology demonstration project to a small plutonium oxide production capability. According to NNSA officials, ARIES has produced approximately 1 MT of plutonium oxide from pits since it was established in 1998, with peak production of 242 kilograms (0.242 MT) in 2011 during a partial year of operations. NNSA officials explained that ARIES did not produce larger amounts of plutonium oxide because the agency was still evaluating alternatives for expanding plutonium oxide, but they estimated that ARIES could produce 300 kilograms to 400 kilograms in a full year of operations. In addition, LANL shut down the PF-4 facility, including ARIES, from June 2013 through September 2016 to correct safety and operational issues. During this time, plutonium oxide production using ARIES in PF-4 was suspended. Plutonium oxide is the preferred form for long-term storage of plutonium because it is relatively stable compared to other forms. Plutonium oxide is also the form of plutonium that is most suited for dilution. ARIES consists of glove boxes, furnaces, and other equipment to dismantle a pit and extract the plutonium; convert the plutonium into an oxide form; mill and blend the plutonium oxide; conduct physical and chemical analyses of the plutonium oxide; and package and store the plutonium oxide for eventual disposition. NNSA’s 2018 conceptual plan to dilute and dispose of surplus plutonium calls for plutonium metal to be converted to plutonium oxide using ARIES at PF-4 and then for the plutonium oxide to be diluted at SRS for eventual disposal at WIPP. Figure 4 shows the dilute and dispose strategy as described in NNSA’s 2018 conceptual plan. DOE could convert 43.8 MT, or about 77 percent, of surplus plutonium in its inventory of 57.2 MT to plutonium oxide for dilution and disposal because this plutonium is in a metal form suitable to oxidation, based on our review of DOE’s inventory of surplus plutonium. Most of this surplus plutonium metal—33.3 MT—is in the form of pits and is managed by NNSA. EM manages 6.5 MT of surplus plutonium metal and NE manages the remaining 4 MT of surplus plutonium metal reactor fuel at Idaho National Laboratory. Separately, EM also manages 6.4 MT of surplus plutonium that is already in oxide form. Figure 5 shows the forms of surplus plutonium in DOE’s inventory of 57.2 MT of surplus plutonium requiring disposition. As noted above, EM manages 6.4 MT, or 11 percent, of surplus plutonium that already exists as plutonium oxide. According to NNSA officials, SRS is currently diluting this oxide at a modest rate of about 20 kilograms (0.02 MT) annually. According to NNSA documents, the agency plans to add additional throughput capacity within a decade. The remaining 7 MT of surplus plutonium, or about 12 percent of DOE’s surplus plutonium inventory, is contained in spent nuclear fuel and is not suitable for conversion to plutonium oxide. This material would require additional chemical processing steps to make it suitable for conversion to plutonium oxide. DOE officials said that they planned to dispose of the 7 MT of spent nuclear fuel in a deep geologic repository, which would avoid necessitating development of facilities and processes for conversion to plutonium oxide. DOE officials said that this fuel could also be disposed of through other to-be-determined disposition paths. Currently, EM manages the spent nuclear fuel that contains 7 MT of this surplus plutonium at various locations throughout the country. NNSA’s 2018 conceptual plan calls for converting 26.2 MT of surplus plutonium into oxide by 2045. In September 2019, NNSA approved the production of about 1.2 MT of plutonium oxide through 2025 at LANL. However, plans for converting additional surplus plutonium into plutonium oxide are uncertain primarily because of two issues. These issues are (1) NNSA’s plans for new pit production, which are still in development and which will also take place at LANL; and (2) issues surrounding the agency’s ability to ship newly produced plutonium oxide for dilution to DOE’s Savannah River Site (SRS) in South Carolina. According to agency officials, NNSA and DOE are taking several actions that, if successfully implemented, are designed to allow NNSA to meet its long- term plutonium oxide production goals. These actions include continuing to review plutonium oxide and pit production plans, increasing plutonium storage at LANL, reducing the amount of SRS’s surplus plutonium, and shipping the diluted plutonium from SRS to WIPP. NNSA’s 2018 conceptual plan called for expanding plutonium oxide production capacity in PF-4 for the dilute and dispose strategy to achieve production of 1.5 MT per year by 2033. NNSA planned to sustain this rate of production at LANL for 12 years to convert a total of 26.2 MT of pits to plutonium oxide before ramping down operations in 2045. The agency’s 2018 conceptual plan estimated that this increased production would cost approximately $5 billion over the life of the program. To achieve the 1.5 MT annual production rate, NNSA planned to expand the physical space of ARIES’s operations in PF-4 by about 50 percent, install new equipment such as glove boxes, purchase additional equipment, such as spare parts and new shipping containers, and hire over 200 new staff. To accommodate the larger workforce, NNSA also planned to construct a new employee entrance in PF-4. In September 2019, NNSA approved a short-term plan to produce a total of nearly 1.2 MT of plutonium oxide at PF-4 from 2019 through 2025. This short-term plan closely matches the total plutonium oxide production outlined in NNSA’s 2018 conceptual plan for the same time frame. In February 2019, NNSA officials said that they were reevaluating the agency’s long-term plutonium oxide production goals in the 2018 conceptual plan because of two key issues. These issues are space constraints relating to (1) the agency’s mission to produce new pits in PF- 4 and (2) requirements to remove plutonium from SRS. According to agency officials, NNSA and DOE are taking several actions designed to allow NNSA to meet the long-term plutonium oxide production goals described in its 2018 conceptual plan. As we reported in November 2018, NNSA officials said that a planned nuclear weapons refurbishment and future warhead programs will require the production of new pits. Almost all of the pits in the current U.S. nuclear weapons stockpile were produced before 1990, according to a May 2015 Congressional report. In May 2018, NNSA announced that it intended to build 30 pits annually in PF-4 at LANL by 2026 and 50 pits annually at the MFFF at SRS by 2030, under a plan to repurpose the MFFF for pit production. According to an August 2019 LANL presentation to potential subcontractors, this effort will include the installation of more than 140 new gloveboxes or other enclosures in PF-4 and the construction of more than 700,000 square feet of supporting infrastructure (such as offices, a parking garage, and a cafeteria). The President’s budget for fiscal year 2020 includes over $3 billion for this effort through 2024. In April 2019, the NNSA Administrator said meeting pit production requirements was the agency’s highest infrastructure priority. NNSA also may have to increase pit production at LANL beyond 30 pits per year. For example, in May 2018 the Nuclear Weapons Council stated that it was essential that NNSA provide resources for surge pit production capacity in PF-4 at LANL until pit production is fully established at SRS. In addition, the National Defense Authorization Act for fiscal year 2019 requires the Department of Defense and NNSA to contract with a federally funded research and development center to conduct an assessment of, among other things, a strategy for producing 80 pits per year at LANL. NNSA officials told us in February 2019 that as a result of pit production requirements, the agency might need to use a portion of the processing areas in PF-4 for pit production that the agency had planned to use for plutonium oxide production. Pit production requirements also may use more space in the high-security vault in PF-4 where plutonium must be temporarily stored. Also in February 2019, NNSA officials said that PF-4’s high-security storage space is already near full capacity and that pit production may demand storage space that NNSA had planned to use for plutonium oxide production. NNSA officials said that the agency is taking some actions that are designed to address increasing both pit and plutonium oxide production in PF-4. If successfully implemented, these actions are designed to allow the program to meet the milestones described in the 2018 conceptual plan, according to NNSA officials. These actions include: Reviewing use of operational space in PF-4. LANL reported in March 2019 that the requirement to produce 30 pits per year would have no significant negative impact on plutonium oxide production. However, LANL reported that a number of programs, including pit production, were planning to increase operations in PF-4, placing demands on the aging facility that could lead to more frequent maintenance outages. In August 2019, NNSA officials responsible for plutonium oxide production and pit production said they continue to believe that increased oxide production and pit production can be simultaneously accomplished in PF-4 but that they are continuing to review the issue as the agency’s pit production plans evolve. In NNSA’s comments on our report, the NNSA Administrator said the agency was working to balance the needs of both missions. The Administrator also noted that NNSA’s Office for Cost Estimating and Program Evaluation will assess the effect of plutonium oxide production on pit production as required by section 3120 of the National Defense Authorization Act for fiscal year 2019. The conference report accompanying the act also requires that we review this assessment, which we will initiate in late 2019. Increasing plutonium storage capacity. LANL also reported in March 2019 that it planned to implement several mitigation measures that would allow the storage of more plutonium oxide and other materials in the PF-4 vault. In addition, DOE and NNSA have “swapped” 1 MT of the declared surplus plutonium at SRS with 1 MT of plutonium residues and other primarily non-pit plutonium already stored in LANL’s PF-4 vault. NNSA officials said that the plutonium residues and other primarily non-pit plutonium at LANL would be considered surplus plutonium and would be converted to plutonium oxide, requiring less storage space. Without these mitigation measures, the PF-4 vault would fill up years earlier, according to NNSA officials. NNSA officials said they believe the swap will increase storage space through 2028, at which point LANL would need to ship plutonium oxide to SRS or face a suspension of plutonium oxide production. Storing quantities of plutonium oxide in PF-4’s high-security storage vault is critical because, according to NNSA officials, it is not likely that NNSA will ship plutonium oxide or other forms of plutonium to SRS until a dispute with the state of South Carolina is resolved. Specifically, the National Defense Authorization Act for fiscal year 2003 required DOE to prepare a plan for the construction and operation of the MFFF at SRS so that it could produce MOX fuel at an average rate of at least 1 MT per year. As subsequently amended, the law provides that if DOE did not meet this 1 MT production objective by January 1, 2014, then it was required to remove 1 MT of defense plutonium from South Carolina by January 1, 2016. If DOE missed that deadline, it was required to make substantial payments to South Carolina until the removal was completed. As NNSA faced delays and cost increases in constructing the MFFF and began to reevaluate its surplus disposition strategy, South Carolina sued DOE in February 2016 to begin removing plutonium from the state and to begin to make payments to the state of up to $100 million per year until the surplus plutonium is removed. In December 2017, the court ordered DOE to remove 1 MT of plutonium from South Carolina by 2020. In response, according to court filings, NNSA moved 0.5 MT of plutonium from SRS to its Nevada National Security Site prior to November 2018 and moved another 0.5 MT of plutonium off-site in August 2019. DOE is still required by statue to remove an amount of defense plutonium or defense plutonium material equal to that which was transferred to SRS after April 15, 2002, but not processed by the MOX facility by January 2022. The officials told us that because of this continuing requirement and the threat of further lawsuits by South Carolina, it was unlikely that NNSA could ship plutonium oxide to SRS until the surplus plutonium at SRS is removed. NNSA officials said that the agency is taking some actions designed to address these issues. These actions include: Increasing plutonium oxide production rates with a priority on oxidizing plutonium material from SRS. NNSA officials said in August 2019 that they are in discussions with LANL to increase the short-term production of plutonium oxide to speed the removal of surplus plutonium from South Carolina. According to NNSA officials, NNSA and LANL are considering increasing plutonium oxide production through 2025 beyond what is called for in their short-term plan that the agency approved in September 2019. This would involve shipping additional surplus plutonium metal from SRS to LANL and prioritize converting this material to plutonium oxide. According to agency officials, LANL would produce additional plutonium oxide production by using new ARIES equipment installed in PF-4 in 2019. To achieve this increased production, NNSA officials said that LANL would need to hire 70 personnel through 2025 to operate ARIES. Agency officials said that these steps would increase total plutonium oxide production to approximately 2.1 MT through 2025, an increase of nearly 1 MT over the short-term plan NNSA approved in September 2019. Increasing dilution and disposal rates of the inventory of plutonium oxide already at SRS. DOE and NNSA officials said that they would also increase dilution of existing plutonium oxide at SRS beyond what is called for in the 2018 conceptual plan to help reduce the inventory of plutonium metal already there. In April 2019, NNSA officials said their current dilution rate at SRS was about 20 kilograms (0.02 MT) annually, but that they plan to increase that rate to 1.5 MT by the late 2020s. Under its 2018 conceptual plan, NNSA had planned to achieve that dilution rate by 2031, but the budget request for NNSA for fiscal year 2020 shows that NNSA plans to complete installation of the capability necessary to achieve that dilution rate by as early as fiscal year 2028. The effort—known as the Surplus Plutonium Disposition project—has an estimated cost range from $200 million to $589 million. It includes removing unnecessary equipment from SRS, accelerating the project’s construction schedule, installing long-lead procurement items early in construction, and hiring and certifying additional personnel. According to NNSA officials, this increase in dilution capacity by 2028 would enable NNSA to begin shipping plutonium oxide to SRS for dilution and disposal without suspending plutonium oxide production at PF-4. While NNSA is taking actions to address pit production and shipment issues, the agency continues to work on refining the long-term plutonium oxide production goals in its 2018 conceptual plan. However, NNSA officials said that establishing firm long-term plutonium oxide production plans now would be premature and that the agency would use the next several years to balance plutonium oxide production, pit production, and shipment issues as they refine long-term production plans. We provided a draft of this report to NNSA and DOE for review and comment. In its response to our draft report, reproduced in appendix V, NNSA said that it and DOE are working to balance the needs of its dilute and dispose program, which includes oxide production, and pit production, as well as the need to remove plutonium from the state of South Carolina. NNSA said, as noted in our report, that its Office for Cost Estimating and Program Evaluation would assess the effects of increased plutonium oxide production on pit production. NNSA also said that even with delays in production of plutonium oxide, the dilution and disposition of surplus plutonium will still be substantially less expensive than if the agency had maintained its MOX fuel approach. As stated in our report, we have a large body of work that has examined the MOX fuel approach, NNSA’s management of the MOX project, and DOE’s $17 billion cost estimate to complete the project, which we assessed as being reliable. In addition, NNSA provided us with technical comments and additional documentation, which we incorporated into our report as appropriate. Some of the information that NNSA provided helped clarify near-term plutonium oxide production plans as well as the agency’s progress in balancing the plutonium oxide production plans, pit production, and the need to move plutonium out of the state of South Carolina. This information is incorporated in our report and is reflected in the report’s revised title. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Our report (1) determines the amount of surplus plutonium in the Department of Energy’s (DOE) inventory that could be converted to plutonium oxide for dilution and disposal and (2) examines DOE’s capacity to produce plutonium oxide. To determine the amount of surplus plutonium in DOE’s inventory that could be converted to plutonium oxide for dilution and disposal, we reviewed relevant DOE documents and interviewed officials from DOE, including from DOE’s National Nuclear Security Administration (NNSA) and DOE’s Office of Environmental Management (EM), on the amounts and forms of surplus plutonium in DOE’s inventory that would require conversion to an oxide prior to final disposition. Our review included DOE’s plans for converting surplus plutonium to plutonium oxide beginning in 1997, when DOE first decided to convert surplus plutonium to plutonium oxide for disposition. We also visited the Los Alamos National Laboratory (LANL) in New Mexico to review documentation and interview officials in the Surplus Plutonium Disposition Program for information on past and current inventories of surplus plutonium. NNSA’s Advanced Recovery and Integrated Extraction System (ARIES), the program that currently converts surplus plutonium to plutonium oxide, resides in Plutonium Facility-4 (PF-4) at LANL. To examine DOE’s capacity to produce plutonium oxide, we reviewed relevant DOE documents and interviewed officials from DOE, including from NNSA and EM, on the status of plutonium oxide production in PF-4 and at DOE’s Savannah River Site, where surplus plutonium was converted to plutonium oxide over a 2 1/2-year period. We reviewed relevant DOE documents and interviewed officials from DOE, including from NNSA and EM, on their plans. For example, we reviewed records of decision and environmental impact statements that DOE issued during its management of the Surplus Plutonium Disposition Program. We reviewed planning documents related to the dilute and dispose strategy, including DOE’s life-cycle cost estimate and supporting documents covering issues such as time frames and conversion rates. We visited the ARIES program in PF-4 in January 2018 to review documentation and conduct interviews with officials responsible for plutonium oxide production and the planned expansion of plutonium oxide production. The site visit included a tour of PF-4, ARIES and its operations, and potential spaces in PF-4 for expansion of ARIES operations for converting surplus plutonium metal to oxide. We conducted this performance audit from October 2017 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. DOE first established the Surplus Plutonium Disposition Program in 1997 to dispose of surplus, weapons-usable plutonium at the end of the Cold War. As of April 2019, the United States has declared a total of 61.5 metric tons (MT) of plutonium as surplus to defense needs. DOE has disposed of 3.2 MT of surplus plutonium at the Waste Isolation Pilot Plant (WIPP), an underground repository for transuranic waste located near Carlsbad, New Mexico, and is in the process of disposing of an additional 1.1 MT of surplus plutonium. This leaves 57.2 MT of surplus plutonium in its inventory, as of May 2019. The table below shows the timeline of changes to DOE strategies for managing surplus plutonium for final disposition. 1997 - DOE announces the Surplus Plutonium Disposition Plan, including the Mixed Oxide Fuel Fabrication Facility (MFFF). 2000 - The United States and Russia enter into the Plutonium Management and Disposition Agreement (PMDA), each agreeing to dispose of at least 34 metric tons (MT) of plutonium at a rate of at least 2 MT per year. 2000 - DOE announced it will construct the MFFF. 2002 - The National Defense Authorization Act for fiscal year 2003 requires DOE to prepare a plan for the construction and operation of the MFFF at the Savannah River Site in South Carolina and requires, among other things, that DOE remove 1 MT of plutonium from South Carolina by January 1, 2011, if mixed oxide (MOX) production objectives of an average rate of at least 1 MT per year were not achieved by January 1, 2009. Failure to meet these deadlines would require DOE to make substantial annual payments to South Carolina. 2005 – The Energy and Water Development Appropriations Act for Fiscal Year 2006 extends the original plutonium production and removal deadlines by 3 years (thus making the 1 MT plutonium production deadline January 1, 2012, and removal deadline January 1, 2014). 2014 – The National Defense Authorization Act for fiscal year 2015 requires DOE to issue a report that would study the plan for the MFFF as well as possible alternatives to the MFFF. 2015 - The National Defense Authorization Act for Fiscal Year 2016 requires DOE to carry out an analysis of alternatives for the Surplus Plutonium Disposition Program. 2015 and 2017 - Explanatory statements accompanying fiscal years 2016 and 2017 appropriations legislation contained specific direction to explore design issues associated with the dilute and dispose alternative. 2016 - South Carolina sues DOE in federal district court, contending that DOE failed to meet the MOX-related statutory deadlines. South Carolina sought monetary relief and an injunction compelling the federal government to remove 1 MT of plutonium from the state. 2016 - DOE issues a Record of Decision stating that it would remove plutonium from South Carolina using the dilute and dispose strategy. 2017 - Federal district court issues an injunction ordering DOE to remove 1 MT of plutonium from South Carolina and ordering the parties to negotiate a new deadline. 2017 - The National Defense Authorization Act for Fiscal Year 2018 allowed DOE to terminate construction of MFFF if, among other things, DOE identified an alternative that would cost less than half of the MOX fuel strategy. 2017 - South Carolina and DOE fail to agree on a deadline for removing 1 MT of plutonium from the state, so in December the court imposes a deadline of January 1, 2020. 2018 - Federal appellate court rejects DOE’s appeal of the district court’s order to remove 1 MT of plutonium from South Carolina by January 1, 2020. 2018 - DOE terminates the MOX contract for the government’s convenience. 2019 – DOE acknowledges that it had shipped 0.5 MT of plutonium from South Carolina to Nevada sometime before November 2018 and shipped an additional 0.5 MT out of South Carolina to another state sometime before August 2019. The Nuclear Waste Policy Act of 1982 directed, among other things, that DOE study sites for a repository and that the President evaluate the capacity for the disposal of high-level waste resulting from atomic energy defense activities at one or more repositories developed for the disposal of commercial used (spent) nuclear fuel. In 1985, President Reagan found that there was no basis to conclude that a separate defense high- level waste repository was required. Table 2 shows the changes in plans for developing a high-level waste repository from 2002 through 2018. In addition to the individual named above, the following individuals made contributions to this report: Jonathan Gill (Assistant Director); Robert Sánchez (Analyst in Charge); Antoinette Capaccio; Robert (Scott) Fletcher; Cindy Gilbert; Richard Johnson; Sheryl Stein; Sara Sullivan; and Curtis (Wade) Tanner.", "summary": "The United States has 57.2 MT of weapons-usable plutonium that it has declared surplus and that still requires disposition. This plutonium exists in various metal and non-metal forms, including pits—the central core of a nuclear weapon. To prevent insidious use of this plutonium, DOE plans to disassemble pits into metal; convert the plutonium metal to plutonium oxide, a powder-like substance; dilute it with inert material; and dispose of it at WIPP. In May 2018, NNSA issued a plan conceptualizing the dilution and disposal of 34 MT of surplus plutonium at an estimated cost of $19 billion over the next 3 decades. Under this conceptual plan, pit disassembly and production of plutonium oxide would take place at one facility and dilution would be performed in another, with both operations expanding over the next decade. GAO was asked to review DOE's plans for plutonium oxide production to dispose of surplus plutonium. This report (1) examines the amount of surplus plutonium in DOE's inventory that could be converted to plutonium oxide for dilution and disposal and (2) examines DOE's capacity to produce plutonium oxide. GAO reviewed the inventory of surplus plutonium, plutonium oxide production requirements and production capacity, and DOE planning documents, and interviewed DOE officials. Of the Department of Energy‘s (DOE) inventory of surplus plutonium, about 43.8 metric tons (MT), or 77 percent, is plutonium metal that could be converted to plutonium oxide for dilution and disposal. Of this amount, the National Nuclear Security Administration (NNSA) manages 33.3 MT in the form of pits, DOE's Office of Environmental Management (EM) manages 6.5 MT, and DOE's Office of Nuclear Energy manages 4 MT in the form of reactor fuel. EM manages another 11 percent, or 6.4 MT, of DOE's surplus plutonium that is already in oxide form. Most of this is suitable for dilution and disposal at the Waste Isolation Pilot Plant (WIPP), a repository in New Mexico. An additional 12 percent, or 7 MT, of DOE's surplus plutonium is contained in spent nuclear fuel that is planned for disposal in a geologic repository. See figure. NNSA's 2018 conceptual plan calls for converting 26.2 MT of this surplus plutonium into oxide by 2045. In September 2019, NNSA approved the production of about 1.2 MT of plutonium oxide through 2025 at its Los Alamos National Laboratory (LANL) located in New Mexico. However, plans for converting additional surplus plutonium into plutonium oxide are uncertain because of two issues. These issues include NNSA's still-developing plans for new pit production, which will also take place at LANL, and issues surrounding the agency's ability to ship newly produced plutonium oxide for dilution to DOE's Savannah River Site (SRS) in South Carolina. According to agency officials, NNSA and DOE are taking several actions that, if successfully implemented, are designed to allow NNSA to meet its long-term plutonium oxide production goals. These actions include continuing to review plutonium oxide and pit production plans, increasing plutonium storage at LANL, reducing the amount of SRS's surplus plutonium, and accelerating the shipment of diluted plutonium from SRS to WIPP.", "document_type": "gao"}
{"report": "The federal disaster workforce is designed to scale up or down depending on the timing and magnitude of disasters. Specifically, FEMA has the authority to augment its permanent full-time staff with temporary personnel and deploy non-FEMA staff members when needed. FEMA has historically relied on both permanent and temporary staff members to respond to presidentially declared disasters. FEMA’s disaster workforce is organized according to position categories, employee types, functions, and job titles. Every FEMA employee is assigned to one or more of four position categories. Staff assigned to incident management positions deploy to disaster sites to administer federal emergency response and recovery programs. Staff assigned to the other three position categories—incident support, ancillary support, and mission essential—provide support services to deployed incident management staff, as well as to FEMA more generally. For example, incident support staff assist with disaster operations at the regional or national level, while mission essential staff maintain basic agency operations, such as payroll and information technology. FEMA has several different employee types that operate out of the agency’s national headquarters, regional offices, and joint field offices at specific disaster locations. Each of the different employee types hold one or more of the four position categories described above. Permanent full-time employees are steady-state federal employees that support FEMA’s mission areas and operations on a daily basis. Cadre of On-Call Response/Recovery Employees (CORE) are a type of temporary full-time employee hired to directly support response and recovery efforts related to disasters for a 2- to 4-year term. These positions may be renewed if there is ongoing disaster work and funding is available. Incident Management COREs are a type of CORE employee that maintain a regular state of readiness to provide emergency-state support and can be deployed up to 300 days a year in mission areas. Incident Management Assistance Teams are rapid-response teams of CORE employees that deploy to disaster sites with little to no notice and remain at disaster sites for unspecified amounts of time, depending on mission needs. Members generally receive 4-year appointments. Reservists are on-call employees who work intermittently as required during incident management operations. Reservists must be available to deploy as needed on 24 hours’ notice at all times during their 24 month appointment. FEMA also has the authority to augment its disaster workforce with temporary employees. This includes local hires, Surge Capacity Force volunteers, and FEMA Corps members. FEMA further augments its workforce with technical assistance contractors, who are specialized contractors hired to perform specific responsibilities. See figure 2 for more information on FEMA’s employee types. As shown in figure 3, reservists made up the largest portion of FEMA’s deployed workforce during peak deployments for the 2017 and 2018 disaster seasons. In 2017, reservists made up about 32 percent of FEMA’s deployed workforce, followed by COREs, permanent full-time staff, and local hires. In 2018, reservists made up about 44 percent of FEMA’s deployed workforce, followed by local hires, COREs, and permanent full-time staff. FEMA’s incident management workforce is organized into 23 cadres. Cadres are groups organized by operational or programmatic functions. They are composed of full-time equivalent and intermittent staff members who perform incident-related duties during disaster response. For example, the Public Assistance cadre administers financial assistance to state, local, tribal, and territorial communities for debris removal, implementation of emergency protective measures, and permanent restoration of infrastructure. FEMA’s incident management workforce performs functions to support its response, recovery, and mitigation missions. Each cadre supports at least one of these missions, and some cadres perform functions across more than one. Cadres also generally deploy to an incident at varying points in the response and recovery phases, depending on their functions. For example, FEMA officials said that the Logistics cadre, which coordinates and monitors all aspects of resource planning, movement, and order tracking, typically deploys staff to an incident before the Hazard Mitigation cadre, which supports risk reduction activities later during the recovery phase. See figure 4 for an example of peak deployment by cadre during Hurricane Florence and appendix II for a description of each cadre and their primary duties. FEMA manages the staffing, training, and deployment of its cadres at the national level. FEMA employees whose primary responsibilities are incident management and disaster response, such as Incident Management CORE and reservists, are generally considered national assets and may be deployed to a disaster anywhere in the country, regardless of permanent duty station. FEMA organizes incident management positions into four tiers denoted by increasing levels of leadership managerial responsibilities and further categorizes senior leaders and officers by level of disaster complexity experience. See figure 5 for more information on FEMA’s position tiers and titles. All FEMA incident management employees have a primary title, which specifies their principal roles and responsibilities, and may also hold subordinate titles for additional roles and responsibilities that the employee can perform. Incident management staff members have one primary incident management title and may have multiple subordinate titles. FEMA may also assign specialties—categories used to identify a specific measured (documented or credentialed) skill, task, experience, or certification that may enhance performance of an associated position—to certain staff. For example, a full-time equivalent staff member who works day-to-day in FEMA’s Office of Policy and Program Analysis could hold a primary incident management title as a Facilities Manager in FEMA’s Logistics cadre and a subordinate title of Logistics Specialist in the same cadre, and may be certified to operate certain types of forklifts. FEMA designed and implemented the FEMA Qualification System in 2012 to standardize and manage the agency’s incident workforce capabilities through prerequisite experience, training, and demonstrated performance. FEMA uses the system to track requirements for incident management positions and the proficiency level of staff members in those positions. According to the 2019 FEMA Qualification System Guide, training and demonstrated performance are foundational elements of the system. Required qualification system training consists of courses designed to build competency in specific position responsibilities and is offered in a variety of settings, such as the Department of Homeland Security (DHS) Center for Domestic Preparedness or at a joint field office, and through a variety of mediums, such as in a classroom, online, or on the job. Demonstrated performance involves validation of the ability to successfully and independently perform specific tasks. According to FEMA, employees conduct required training concurrently with demonstrated performance so that training builds on previous experience and coursework. After FEMA assigns an incident management position to staff, they are issued an electronic position task book, which lists and tracks the training and demonstrated performance requirements for that position. Tasks in the position task book need to be signed off by a coach-and- evaluator—an individual that is trained and designated as a subject matter expert by their cadre to evaluate one or more FEMA Qualification System positions. After staff members have worked with a coach-and- evaluator to complete the tasks and trainings included in their task book, they may submit it to cadre management as part of their qualification application package. Submitted qualification packages go through a number of rounds of review before a final decision is made. First, FEMA’s Qualification System Branch conducts an initial review to validate qualification package completion and requirement waivers, among other things. The branch then forwards the qualification package to cadre management for review. Cadre management reviews employees’ applications for all positions, including specialists and first-line supervisors, and a Qualification Review Board also reviews employees’ applications for leadership, upper management, and middle management positions. See figure 6 for an overview of FEMA’s qualification system process. A regional or national Incident Management Assistance Team is generally among the first FEMA units to arrive on the ground at a disaster site to, among other things, set up federal facilities, establish a joint field office, and coordinate with officials from the impacted region and other relevant federal, state, tribal, territorial, or local partners. If there are staffing shortages among regional full-time equivalent staff members, FEMA leadership in the region where the disaster occurs may submit a deployment request for additional incident management staff members through the Deployment Tracking System. After the Incident Management Assistance Team stands up a joint field office, the Federal Coordinating Officer assumes authority over all emergency response and recovery efforts for the disaster, which includes filling staffing needs. To determine the number and type of incident management personnel needed in each position to meet FEMA requirements for any given disaster, the Federal Coordinating Officer coordinates with regional leadership, the joint field office’s Chief of Staff, and cadre management. The basis of this determination is a variety of factors related to the nature and scope of the disaster. For example, Individual Assistance and Public Assistance needs are based in part on preliminary damage assessments to determine the level of program assistance that may be required. To fill identified staffing needs, field leadership uses a standard process to request specific FEMA Qualification System titles and proficiency levels. Once a standard deployment request is approved, the Deployment Tracking System identifies staff members that match the requested positions, skill sets, and qualification status using a preprogrammed, automated process. The Deployment Tracking System then notifies staff members selected in a rotational order based on length of time since their last deployment, among other things. If an employee declines a deployment request, the Deployment Tracking System automatically sends a request to the next staff member with that incident management position title on the deployment order list. Standard deployment requests are filled by deploying employee types in the following order: 1. Incident Management COREs 2. Reservists 3. Full-time equivalent employees other than Incident Management At the incident, the Federal Coordinating Officer and other field leadership staff are responsible for overseeing coordinating the responders working for FEMA. Generally, after response operations and programs are initiated, staffing needs may change. At this point, field leadership may decide to demobilize some personnel deployed in certain cadres. The decision to do so is based on workload, complexity of operations, and disaster needs. According to FEMA’s 2017 Hurricane Season After-Action Report, FEMA did not meet its annual staffing target for disaster personnel during the 2017 hurricane season. FEMA uses force structure and force strength targets to estimate staffing requirements for incidents and analyze the number of staff the agency has available against these targets. FEMA establishes a longer-term target for the number of incident management staff needed to meet mission needs, called force structure, and tracks the actual number of incident management staff who can deploy at a point in time, which it calls force strength. FEMA uses its force strength measure to track progress towards meeting staffing goals set out in the force structure target and also sets interim targets each fiscal year for reaching the longer-term force structure target. In 2015, FEMA’s Workforce Management Division conducted a review of FEMA’s workforce in coordination with the 23 cadres and adopted a force structure target of 16,305. According to FEMA, this target was established based on a number of considerations, including potential incident levels and historical staffing data for incident management staff deployed to different level events. The agency’s force strength at the end of fiscal year 2017 was 11,656. On average, reservists had the largest gap between force strength and established annual targets. For example, at the end of fiscal year 2017, FEMA’s force strength for reservists was 6,793, which was 15 percent short of its target of 7,982 for that year. In 2019, FEMA’s Workforce Management Division completed a similar review of its incident management workforce and updated its force structure target to 17,670 incident management personnel, which it aims to achieve by 2025. This new target was established using an updated methodology based on information on historical disasters and deployed incident management staff, along with input from each cadre’s management and other officials with expertise on staffing patterns throughout disasters. According to FEMA’s 2017 Hurricane Season After-Action Report, FEMA faced shortages across over half of its cadres when disasters made landfall or began during the 2017 season, and we found that FEMA faced similar shortages during the 2018 disaster season. For instance, according to FEMA’s deployment data, 18 of 23 cadres operated with 25 percent or fewer staff available to deploy when Hurricane Maria made landfall shortly after Hurricane Irma hit Florida, including the Individual Assistance, Logistics, and Hazard Mitigation cadres. See figure 7 for more information on cadre staffing levels at the start of major disasters during the 2017 and 2018 disaster seasons. In addition, many staff members who showed availability to deploy declined when requested to do so. For example, according to FEMA officials, the austere conditions in Puerto Rico and fatigue from previous deployments to hurricanes Harvey and Irma contributed to the high declination rate for Hurricane Maria deployment requests. In addition, FEMA officials stated that permanent full-time employees may not consistently update their availability or may be unavailable to deploy because of their steady-state responsibilities. Further, reservists may decline deployment requests because of the lack of employment protections, which can create difficulties with leaving their jobs to work intermittently in disasters. See table 1 for the declination rates for eight major disasters during the 2017 and 2018 disaster seasons. According to FEMA officials, the agency’s staffing shortages may have originated in part from policy changes in 2012. Specifically, officials said that a large number of incident management staff left the agency after changes were made to the agency’s reservist program and qualification system for disaster personnel in 2012. For instance, officials told us many reservists with years of experience and technical skills left FEMA when the reservist program increased the number of days they were required to deploy or when many were assigned to positions in the qualification system with lower levels of responsibility than what they previously held in order to meet force structure targets. FEMA took various actions to address the staffing shortages during the 2017 and 2018 disaster seasons and used new approaches to augment its workforce. For example, in 2017, FEMA reported that it coordinated the deployment of 2,740 Surge Capacity Force volunteers from eight DHS components. DHS also expanded the Surge Capacity Force to other federal agencies outside DHS for the first time in 2017, including 34 federal departments and agencies in the program, increasing the Surge Capacity Force by 1,323 employees. Additionally, FEMA used local hires to augment its workforce and expedited the local hiring process in response to hurricanes Harvey, Irma, and Maria, resulting in the onboarding of 4,095 local hires from August to November 2017. The Federal Coordinating Officer who initially managed the Puerto Rico joint field office instituted a goal of having a staff composed of 90 percent local hires for recovery efforts. According to the official, investing heavily in local hires and converting them to COREs will help build FEMA’s disaster workforce for long-term Puerto Rico recovery efforts and any future disasters that may occur in the region. As mentioned previously, FEMA also conducted a review of its incident management workforce in 2018 to determine the force structure needed to effectively respond to disasters moving forward. FEMA officials we spoke with said the agency has taken several steps to meet its new force structure, such as establishing a program management office that is dedicated to achieving the agency’s staffing targets. Cadre management officials we spoke with said that FEMA has hiring initiatives in place or planned to help meet the staffing needs established from the review and noted that it will take time for new staff to develop the skills and experience to meet mission needs in the field. FEMA’s qualification and deployment processes did not provide reliable and complete information on staff skills and abilities to ensure its workforce was effectively deployed and used to meet field needs during the 2017 and 2018 disaster seasons. In addition, FEMA lacks mechanisms to assess deployment outcomes or the extent to which it deployed the right mix of staff at the right time to meet mission needs. FEMA field officials in our focus groups and interviews said they experienced a number of challenges with the reliability of information from FEMA’s qualification and deployment processes and systems during the 2017 and 2018 disaster seasons. Specifically, these officials reported that qualification status was not an accurate indicator of ability to perform, which affected disaster assistance delivery and created difficulties with ensuring the right mix of staff were deployed and effectively assigning responsibilities at disaster sites. Officials also reported other challenges with identifying and leveraging staff skills, including lack of information about specialized abilities and expertise. In response to its experience with recent disaster seasons, FEMA has taken or planned some actions to improve its qualification and deployment processes. However, these actions have not been fully implemented and do not fully address the information shortcomings that field officials experienced, as discussed below. FEMA’s qualification and deployment processes and systems do not provide accurate and complete information about staff members’ abilities to ensure field leadership and managers get staff with the right skills at the right time or to most effectively employ and leverage the staff that are deployed to support FEMA’s missions. As discussed earlier in this report, field leadership use the Deployment Tracking System to request staff based on mission needs. The system uses an automated process to select who to deploy from a list of available staff by position and qualification status, and relies on the FEMA Qualification System to identify staff members who are qualified in their positions and those who are trainees. Qualified staff members are expected to be able to successfully and independently perform the duties of their position. However, as shown in table 2, our focus groups with incident management staff and interviews with field and regional officials indicate that disaster personnel experienced significant limitations with qualification status in the FEMA Qualification System matching performance in the field. Very few found that it was a good indicator of staff abilities. For example, participants in two of 14 focus groups described positive experiences with qualification status as an indicator of staff abilities; while, in all 14 groups, participants stated that staff members who were designated as qualified in the system did not have the skills or experience to perform effectively in their positions. Officials in 15 of our 29 field and regional office interviews had similar experiences. For example, Individual Assistance managers in one of the joint field offices we visited said that they had 20 staff members who were designated as qualified but not capable of performing basic tasks, such as knowing how to access the program’s information system. Hazard Mitigation managers from the same joint field office said that about half of their staff who were designated as qualified could not proficiently perform their job duties. Participants in our focus groups and field leadership and managers we interviewed cited numerous operational challenges that resulted from qualification status not being an accurate indicator of staff abilities. Specifically, they stated that (1) staff designated as qualified who lacked the skills and knowledge to perform their positions negatively affected disaster assistance delivery, staff workload, and morale and (2) the unreliability of qualification designations hindered their cadre’s ability to staff disasters with the right mix of staff at the right time and effectively assign responsibilities. Table 3 provides examples of the challenges they experienced. Participants in our focus groups also cited a range of challenges with position task books and the qualification process that in their view contributed to qualification status not being an accurate indicator of staff proficiency. For example: Position task book tasks. In 12 of our 14 focus groups with FEMA incident management staff, participants said the tasks in the position task books did not fully reflect the skills or competencies needed to perform positions. For example, a participant in one focus group said that the tasks in her book did not incorporate sufficient soft skills, such as the ability to communicate with sensitivity and empathy and other interpersonal skills, which are important because staff in her cadre often interact with disaster survivors who have suffered great losses. Coach-and-evaluator process. Participants in 12 of our 14 focus groups also raised concerns with how coach-and-evaluators endorsed tasks, such as lack of consistency and objectivity with signing off on tasks. These issues included coach-and-evaluators signing off on large numbers of tasks too quickly or easily, which participants in 12 focus groups said occurred. Some participants who functioned as coach-and-evaluators said they felt pressure from staff to endorse tasks because reservists receive salary increases when they get qualified. Participants also told us that cadre management may push for staff to be qualified to meet qualification rate targets. A participant in one of our supervisory-level focus groups said he felt pressure from both these sources and admitted to signing off on tasks even though he did not feel the staff member could proficiently perform them. He said that the staff member was qualified in the FEMA Qualification System and later deployed to a smaller disaster, where she was the sole person responsible for her functional area and unable to do the job. Difficulties completing position task books. Participants in all 14 of our focus groups also raised various challenges with completing their task books. These challenges include a lack of available coach-and-evaluators to sign-off on tasks; lack of opportunities to deploy or perform certain tasks; and being unable to complete all the training courses in their task books because classes were unavailable, full, or conflicted with mission needs; among others. As a result, staff members who are able to perform their positions may not be designated as qualified in FEMA’s qualification system. Participants in our focus groups and leadership and managers in our field and regional office interviews reported other challenges with being able to fully identify and use staff skills and experience during disasters. For example: Position titles not fully reflecting staff abilities. FEMA allows staff to have one primary position title in which they are qualified or have an open task book (trainee or candidate status). Officials in 14 of our 29 field and regional interviews and participants in eight of our 14 focus groups with incident management staff raised concerns with this policy. Specifically, officials noted that many employees have experience and expertise in multiple cadres or programs within a cadre, but their full abilities are not reflected in FEMA’s qualification and deployment systems. As a result, field leadership and managers may not be able to fully identify and use the available skills and experience of FEMA’s workforce during disasters, which can limit FEMA’s capacity and flexibility to meet disaster needs, especially when demand is high. For example, one regional official said the Deployment Tracking System has Operations Section Chief as her position title but does not capture her ability to deploy as an Individual Assistance Branch Director, another position in which she has considerable experience. Overly broad position titles and lack of information on specialized skills. In addition, participants in our focus groups told us that some cadre position titles are overly broad (five of 14 groups) and that FEMA’s qualification and deployment systems do not include information on specialized skillsets and experience that would be useful for making deployment and staffing decisions (10 of 14 groups). Officials in 14 of our 29 field and regional interviews raised one or more of these same issues. For example, Logistics managers in one of the joint field offices we visited said that the Logistics Specialist title is too general and captures the majority of warehouse personnel without specifying the actual responsibilities they are able to perform. They noted that, as a result, management needs to query staff members when they arrive to help determine their skills and, in many cases, assign responsibilities by trial and error. According to officials, this can create a safety hazard because some responsibilities require specific skills, such as the ability to operate a certain type of forklift. They also noted that while the Deployment Tracking System allows cadres to input specific skillsets, such as forklift certification, this field has not been consistently filled in. Limitations with fully capturing permanent full-time employee and CORE qualifications. In seven of our eight focus groups with permanent full-time employees and COREs, participants stated that it is not a priority for them to complete their task books because they have little or no incentives to be designated as qualified in the FEMA Qualification System. For example, some participants noted that unlike reservists, their pay and professional development is not directly tied to their qualification status or position. Another participant said that he has been deployed to many disasters and does not have any tasks in his task book endorsed because he is focused on meeting mission needs and does not care enough about being qualified in the system to take the time to complete his task book. Some regional and field officials also raised the same issues. For example, Response Division managers in one of the regions we selected for interviews said that some of the best talent at FEMA, such as staff members with years of experience who work full-time in positions similar to their incident management titles, have never opened or completed a task book because there is no incentive for them to do so. As a result, FEMA may not be fully capturing the qualifications and skills of permanent full-time employees and COREs. FEMA has taken a number of actions intended to help address some of the challenges with its qualification and deployment processes that hindered its ability to provide accurate and complete staffing information to field officials. FEMA headquarters officials acknowledged the challenges we identified with the FEMA Qualification System and noted that the system is still evolving. Key efforts to improve the reliability of qualification designations include: Qualifying staff members who could proficiently perform their positions. During the 2017 hurricane season, FEMA took steps to qualify staff members who were not designated as qualified in the FEMA Qualification System but could proficiently perform the duties of their position. For example, according to the agency’s after-action report for the hurricane season, FEMA temporarily changed qualification procedures during the season to more rapidly qualify employees who had demonstrated their skills outside the traditional process. FEMA headquarters officials stated that this helped qualification designations better reflect the skills and abilities of these staff members. Other actions that FEMA has taken to help qualify staff include allowing cadre management to waive certain tasks or training, allowing specified tasks to be signed-off on during training exercises, and, as discussed later in this report, conducting a pilot on deploying staff to specifically serve as coach- and-evaluators during disasters. Revising position task books. FEMA headquarters officials said they began reviewing task books in spring 2017 to help ensure that tasks are measurable and better align with the knowledge, skills, and abilities needed to perform positions. Officials said this project was completed in November 2018 and the revised task books have been implemented. They noted that this will help streamline the qualification process, allow for more objective evaluation, and help ensure tasks better reflect the skills needed on the job. According to FEMA officials, they plan to continue to work with the cadres to ensure task books align with the skills and competencies required to complete disaster missions. Enhanced coach-and-evaluator training. FEMA revised its training for coach-and-evaluators to provide more guidance and tools for how to accurately evaluate staff and improve the integrity of the evaluation process. Specifically, in October 2017, FEMA updated the coach-and- evaluator training class and added material on, for example, techniques for evaluating with integrity, types of observation, and documenting task performance by including comments in the task books. All staff members must pass the class by performing a capstone exercise and taking a written exam before being able to serve as a coach-and-evaluator. Additional controls in the qualification process. Since 2017, FEMA has established additional controls to provide more oversight on the qualification process. For example, headquarters officials said that as part of the qualification review process, officials may review the qualification packages to check how many tasks were endorsed during a given period of time. If the number is unusually large, they may note it for cadre management to consider when making qualification decisions. This step was incorporated in the new FEMA Qualification System Guide that was issued in August 2019. The guide also includes changes to the Qualification Review Board process, such as requiring candidates for leadership and upper-level management positions to attend the review in person and answer questions about their deployments, training history, and task book completion. FEMA has also taken some initial actions and considered options to better identify and use staff skills and experience in the field. For example, FEMA headquarters officials said they are aware that limiting staff to one primary position or one open task book may not fully capture their experience and abilities and are exploring ways to address it. However, they stated that this is a complex issue and allowing staff to hold multiple primary positions could affect the time it takes for staff to complete task books and, on a broader level, pay scales, career progression paths, and training budgets. They also noted that this could create complications with how to deploy staff if multiple cadres need positions filled during times of scarce resources. FEMA headquarters officials told us that staff can be deployed in positions other than their FEMA Qualification System positions but acknowledged that because these other positions are not systematically recorded in the Deployment Tracking System, leadership would need to be aware of staff skills and abilities through informal means. Further, FEMA headquarters officials said that as part of its review of the incident management workforce, they have revised the position titles for certain cadres, which they noted could potentially result in the titles better reflecting staff roles and responsibilities. Officials added that they need to balance the enhanced staffing information that more specific titles provide with the flexibility of broader titles, particularly for entry-level positions. FEMA has also included information on assigning specialized skills to staff in the Deployment Tracking System in its new FEMA Qualification System and deployment guides. While FEMA has taken some steps to improve its qualification and deployment systems, its efforts primarily affect the qualification process moving forward and do not fully address field officials’ experiences with not having reliable information on staff qualifications and skills to effectively use the available workforce to meet mission needs. For example, the changes to the position task books, coach-and-evaluator program, and FEMA Qualification System guide do not affect staff members who have already been qualified in the system but cannot perform their duties, and as discussed later in this report, FEMA currently does not have an effective performance evaluation system in place to identify and address skill deficiencies. In addition, the agency has not taken actions to address the challenges with identifying staff who can serve multiple incident management positions and fully capturing the qualifications of permanent full-time employees and COREs. Also, headquarters officials stated that FEMA has revised some of its position titles, but not all the cadres that reported challenges with overly broad titles had adjustments made to their positions. Further, this initiative is in the early stages of implementation and it is too soon to assess whether the revised positions will provide better information to field officials on staff members’ specific responsibilities. Further, the lack of reliability of qualification status as an accurate indicator of staff skills and abilities has been a persistent issue with the FEMA Qualification System. For example, we stated in our 2015 report on FEMA workforce management that in five of 11 focus groups with permanent full-time employees and COREs, participants cited concerns about the implementation of the FEMA Qualification System, and some observed employees whose training and experience did not reflect the position and qualification level to which they were assigned. Also, in a 2016 report on the reservist workforce, the DHS Office of the Inspector General stated that in five of the seven disaster deployments included in their review, joint field office staff encountered problems obtaining capable reservists with position titles under the FEMA Qualification System. These officials said that reservists sometimes lacked the experience and training to perform their duties, and as a result, were reassigned to positions outside their system titles. One of the purposes of the FEMA Qualification System is to ensure consistency in skill identification and deployable assets for positions across the agency. In addition, FEMA’s 2018-2022 Strategic Plan states that the agency should guarantee that the FEMA Qualification System maximizes the ability of FEMA staff to use their skills and talents to deliver the best outcomes possible. However, as discussed above, FEMA experienced challenges with achieving these objectives. In addition, Standards for Internal Control in the Federal Government directs management to use quality information to achieve the agency’s objectives. It states that, as part of designing control activities for human capital management, management should continually assess the knowledge, skills, and ability needs of the agency to help achieve organizational goals. According to the standards, only when the right personnel for the job are on board and are provided the right responsibilities, among other things, is operational success possible. In addition, according to The Standard for Program Management, program monitoring, reporting, and controls include the development of plans to respond to identified issues. It also states that program management should include timeframes and milestones for achieving program benefits and obtaining feedback from stakeholders to better understand the concerns related to the program and impact of the program. Given the complexity of FEMA’s workforce and the persistent issues with the reliability of qualification designations and other challenges with identifying the knowledge, skills, and abilities of its staff, FEMA would benefit from developing a comprehensive plan—with timeframes and milestones—to address issues with the quality of information its qualification and deployment processes and systems provide to field officials. Such a plan would also benefit from the inclusion of perspectives from field leadership who depend on the information. FEMA officials acknowledged the staffing information challenges we identified and noted that they have not developed a plan to address them because the issues are multifaceted—changes in policy can potentially affect numerous areas of the workforce—and they had been focused on other initiatives, such as revising force structure targets and streamlining the qualification process. However, they said that such a plan would be useful. Developing a plan to address the challenges that hindered FEMA’s ability to provide reliable and complete information about staff skills to field leaders and managers would better enable the agency to use its disaster workforce as flexibly and effectively as possible to meet mission needs in the field. FEMA does not have mechanisms to assess the extent to which its deployment strategies met mission needs in the field during disasters. FEMA’s Deployment Guide states that for the agency to fulfill its preparedness, response, recovery, and mitigation missions, it must be able to effectively and efficiently deploy its responders through a process that sends the right people to the right place at the right time with the right qualifications. FEMA has measures and collects data related to staffing levels and availability, such as comparing cadre force strength to annual targets, comparing staff qualification rates to targets, determining the percent of staff in each cadre that show availability in the Deployment Tracking System, and tracking the number of staff deployed to disasters. However, none of these measures or data directly demonstrate deployment outcomes or how effectively FEMA deployed available staff to meet mission needs. Headquarters officials said that, among other things, they generally have looked at the number of staff members that were deployed to disasters, as well as declinations, to assess the extent to which they were able to meet staffing needs. They noted that this assumed the number, type, and timing of staff deployments matched field needs. However, our focus groups and interviews with field officials indicate that this was not generally the case. For example, in all 17 of our focus groups, participants experienced challenges with the staffing, skill, or experience levels of the deployed workforce, such as having too few staff members with the right technical skills to perform their missions efficiently and effectively. Further, in 12 of the 17 focus groups we conducted, participants said that there were challenges with the timing of deployments, such as staff from certain cadres being deployed too early or redeploying staff from key positions when the mission need was still high. In most of our interviews with field leadership and managers, officials described similar challenges with the number, skill level, or timing of staff deployments. Participants in our focus groups and field officials we interviewed said they make every effort to meet mission needs despite challenges with staff deployment, but noted that these challenges with deployment outcomes not meeting field needs can increase staff workload and delay disaster assistance, among other impacts and inefficiencies. Our work on strategic human capital management states that effective geographic and organizational deployment strategies can enable an organization to have the right people, with the right skills, doing the right jobs, in the right place, at the right time by making flexible use of its internal workforce. Additionally, Standards for Internal Controls in the Federal Government states that management should establish and operate monitoring activities to continually monitor the internal control system, evaluate results, and remediate any deficiencies identified on a timely basis. As part of remediating deficiencies, the standards advise management to report and evaluate issues that were identified as a result of the monitoring and take corrective actions to address them. As discussed earlier in this report, field leadership request staff based on cadres’ anticipated needs using estimates of the severity of damage and the nature and scope of the disaster, among other factors. However, FEMA headquarters officials told us their data systems cannot determine the extent to which field deployment requests were met during disasters. In addition, these officials noted that they have not established other mechanisms to assess deployment outcomes because this is extremely complex and they are considering how best to do so. They noted that they have been working with in-house data science experts to consider what kinds of measures and metrics they could design to assess deployment outcomes, but they did not have any concrete proposals or time frames for when this might be completed. Without mechanisms to assess deployment outcomes, FEMA officials in headquarters lack critical information to monitor and evaluate the extent to which its deployment policies and strategies effectively placed staff with the right skills in the right place at the right time to meet mission needs in the field. As a result, FEMA may miss opportunities to identify when corrective actions are required to better deploy its workforce to meet field needs, such as adjusting the timing and staging of deployments, and the amount of staff deployed. We found significant shortcomings in FEMA’s ability to ensure staff development—which consists of courses, on-the-job-learning, and coaching and mentoring—for the skills and abilities needed in the field. Specifically, although the current approach to developing staff includes efforts to provide training courses, opportunities for on-the-job training and mentoring, and a performance evaluation system, each of these elements has limitations as implemented, and they are not effectively coordinated to help ensure systematic and comprehensive staff development. Staff and managers cited certain recurrent challenges with staff development in focus groups and interviews, such as (1) limitations on the ability to take useful classroom training, (2) challenges providing or receiving on-the-job training and mentoring, (3) inconsistent use of performance evaluations, and (4) difficulty with ongoing development when not deployed to a disaster. One way staff members develop skills and competencies is through completing required courses in their position task books. However, in 10 of our 17 focus groups, participants discussed barriers to taking courses through FEMA’s qualification system that in their view would help them better perform their jobs, such as being unable to take courses that are not in their position task books or if they are already qualified in their positions. Officials in 11 of the 29 field and regional interviews we conducted raised the same issue. FEMA headquarters officials stated that staff are generally required to obtain cadre management approval before they can register for incident management-related courses that are not specifically listed in their position task books, but staff told us it can be difficult to receive approval because of funding limitations. For example, a Hazard Mitigation official at one joint field office we visited described a situation where a staff member wanted to take a course on mitigation and engineering techniques for coastal construction that would have benefitted the work the person was doing, but was not able to get approval. Participants in our focus groups also told us that staff deployed to a position other than their FEMA Qualification System title had been unable to take courses related to the work they were doing. Moreover, staff members said the FEMA Qualification System limits training opportunities for those already qualified in their positions. For example, some staff members said that once they had completed their position task book, they were sometimes unable to get training that included new information on updated policies or procedures specific to their work. An official in one of the FEMA regions we selected for interviews said that some staff members in the region who were qualified would have preferred to be designated as trainees in the FEMA Qualification System because it would allow them to take relevant courses. In March 2020, FEMA officials told us the agency has recently taken actions to make it easier for cadres to send staff to courses that are not required in their position task book or for positions where the person is qualified. Finally, participants in our focus groups with permanent full-time staff members reported challenges with being able to take courses to develop their incident management competencies. These participants told us it is challenging for them to take disaster-related courses while performing their steady-state work. They said this is because there is no budget for localized disaster-related courses in their offices and it can be difficult to get approval and take time from their duties to travel for this type of training. Focus group participants frequently said developing skills on the job was the most useful type of training they receive. Specifically, participants in 12 of our 17 focus groups said on-the-job training was the most useful kind of training and participants in 13 of the 17 focus groups said this is how they received most of their training. In addition, headquarters officials in the Individual Assistance cadre said one of the benefits of on-the-job training during deployments is that it provides an opportunity for staff to learn and practice their craft in a setting that is difficult to simulate during training. The FEMA Qualification System Guide states that FEMA uses coach- and-evaluators as the primary mechanism for staff to learn the specific skills needed for each position. However, staff members we spoke with said they have difficulties developing their skills through the qualification process. Specifically, in seven of the 17 focus groups, participants told us they did not get feedback or coaching on the job. According to staff in our focus groups, the coach-and-evaluator aspect of the qualification system is not the ideal mechanism to support on-the-job training and development because it often emphasizes the evaluation role over the coaching role. In nine of 14 focus groups, participants told us the position task book process focuses more on completing tasks than on performance, development, or building competencies. Officials in eight of our 29 field and regional interviews reported similar experiences. Some staff who did receive coaching said it was often based on the interest level and time that an individual who was willing to invest and was not done in a systematic or consistent way. Moreover, a commonly cited challenge—in 11 of our 14 focus groups— was the lack of coach-and-evaluators to sign off on position task books. Officials in 16 of our 29 field and regional interviews raised the same issue. Participants in our focus groups said they had difficulties finding available coach-and-evaluators at disaster sites. For example, our analysis of FEMA data found that 36 percent of FEMA’s incident management workforce did not have a coach-and-evaluator at the start of their deployment during the 2017 and 2018 disaster seasons. In addition, according to staff in our focus groups and interviews, coach-and- evaluators at the disaster often do not have time to coach staff. For example, officials at one of the joint field offices we visited said mission needs always come first and coaching and evaluating responsibilities are often not anyone’s priority. In addition to on-the-job training challenges related to the FEMA Qualification System, focus group participants also reported more general challenges with on-the-job training. For instance, multiple supervisors in the Logistics cadre at one joint field office said that in addition to doing their own work, experienced staff members need to spend significant time training others, which competes with performing their mission. Furthermore, participants in seven of the 17 focus groups said providing on-the-job training was particularly challenging at the beginning of a disaster, when the disaster is often hectic and at its busiest. Recovery Division officials in a FEMA regional office said a challenge at the start of the disaster is finding staff members who know what to do and have the time to train those who do not. Staff members also described difficulties with providing and receiving on-the-job training in later phases of a disaster. In one focus group with supervisors, a participant said that once the disaster has reached a pace where they have time to train, staff members are often redeployed. Finally, in 16 of our 29 field and regional interviews, officials said there was a lack of mentoring and sustained staff development across disasters. For example, officials at one joint field office told us that once staff members complete their position task book, they generally do not receive any additional coaching or mentoring in that position. This official stated that reservists have a more difficult time identifying mentors than other employee types because they deploy intermittently and likely have different supervisors and coach-and-evaluators each time they deploy. In addition, FEMA officials said coach-and-evaluators are not meant to serve as mentors. FEMA human capital officials said that different offices can develop their own mentoring programs but these may not be available to all employee types. As a result, not all staff members know to ask for, or expect to receive, mentoring. FEMA headquarters officials acknowledged some of these staff development challenges and described actions they have planned, or are underway, to help address some of them. Specifically, FEMA revised the coach-and-evaluator course in 2017 to place a greater emphasis on the coaching responsibilities of the coach-and-evaluator role. For example, the revised course teaches effective coaching strategies, including how to give effective, actionable feedback. Also, in summer 2019, FEMA conducted a pilot with the National Disaster Recovery Support cadre to deploy a single coach-and-evaluator solely in that position and communicated to cadre management that this individual was not to be used for other disaster-related responsibilities. FEMA officials said this pilot was a success. In evaluating the pilot, FEMA said the coach-and- evaluator was able to devote time to proper training and answering any questions presented. Finally, the agency revised the FEMA Qualification System Guide in August 2019, which included clarifying differences between coaching and evaluating. The revised guide states that, as part of the position task book process, a coach explains, demonstrates, trains, assesses, and documents an individual’s task performance while an evaluator observes, assesses, documents, and endorses an employee’s independent performance of specific tasks. Headquarters officials told us that during the 2017 and 2018 disaster seasons, disaster workforce employees inconsistently received performance evaluations when deployed. Performance evaluations at disasters are to be completed on a paper form by a temporary duty supervisor. If the staff member has a coach-and-evaluator, the temporary supervisor may request input regarding progress toward mastering the skills covered by the position task book. The temporary supervisor is supposed to provide that evaluation to cadre management if an evaluation was completed. However, FEMA officials told us there are no mechanisms in place to ensure these steps occur or that the evaluations will be used to help develop staff competencies, and it is not something FEMA officials monitor. Further, FEMA headquarters officials stated there are no controls in place to ensure supervisors rate staff consistently from supervisor to supervisor. These officials told us they are aware of some problems with how the agency conducts performance evaluations for the disaster workforce and are developing changes to address them. For example, in the months prior to the 2017 disasters, the agency began revising its performance evaluation system, but suspended its efforts when that year’s disasters occurred. In 2019, FEMA resumed this initiative and agency officials told us they expect it will be implemented by June 2020. They said the new system will include replacing the paper form with an electronic program that will be integrated into FEMA’s other personnel systems, such as the Deployment Tracking System. Further, in March 2020, FEMA officials told us they are finalizing a directive intended to provide guidance to supervisors at disasters on how they are to provide deployment performance evaluations. In addition, in April 2020, FEMA issued guidance for the administration, implementation, and oversight of a performance management process that will provide reservists with annual performance appraisals. FEMA officials told us this will help ensure that reservist performance appraisals accurately reflect their job performance and assist them in maintaining and improving performance in the future. The agency’s reservist performance management initiative is expected to be completed by January 2021, but officials have not provided specific interim milestones or target dates. Many disaster workforce staff members are not likely to get ongoing development directly from their cadre management when they are not deployed. According to data from FEMA, there was one cadre supervisor of record for every 128 reservists and Incident Management CORE staff as of June 1, 2019. During the 2017 and 2018 disaster seasons, this ratio was higher in certain cadres. For example, there was one supervisor of record for every 807 reservists and Incident Management CORE staff as of June 1, 2017 in the Individual Assistance cadre. FEMA headquarters officials told us they are assessing what the right mix of supervisors to reservists should be across the cadres. Further, staff members told us they have difficulties getting ongoing development through hands-on training outside of a disaster. While FEMA headquarters officials told us that cadres periodically conduct mission rehearsal trainings each year to prepare their staff for disasters, they also said not all staff can attend them because cadre management determines which staff to invite. These trainings are designed for staff members to simulate a potential disaster scenario while in a training environment. Finally, FEMA headquarters officials stated that receiving ongoing development for staff who do not deploy frequently, such as reservists, can be a challenge. The only instances when reservists are paid while not deployed occur when they complete 40 hours a year of mandatory training or 32 hours a year coordinating with their cadre. In addition, an individual in one of our focus groups with permanent full-time employees said reservists had difficulties accessing online mandatory training because they did not have a FEMA laptop. A recovery manager in a FEMA regional office told us that it can be challenging to provide staff development for reservists because they are generally sent to the field to do a discrete job and have limited opportunities to develop their skills and competencies when not deployed. As discussed above, FEMA’s disaster workforce reported challenges receiving staff development through the agency’s existing methods, which consists primarily of classroom training, on-the-job training and mentoring, and performance evaluations. While FEMA has taken actions to address some of the challenges staff experienced, opportunities remain to ensure more effective and consistent staff development. Specifically, FEMA does not have a staff development program in place to provide assurance of effective and comprehensive staff development of the skills and abilities needed during deployments. Further, FEMA headquarters officials said it is primarily the responsibility of staff members to find available coach-and-evaluators at disaster sites and the agency has not developed a mechanism to help ensure deployed staff are consistently paired with coach-and-evaluators. In addition, FEMA headquarters has not taken actions to address the challenges we identified with the lack of mentoring for staff deployed to disasters. Further, given that FEMA’s performance evaluation initiatives are not yet implemented, it is too early to assess how effective they will be in enhancing staff development, including whether they will have mechanisms in place to ensure employees receive useful evaluations or the extent to which they will be coordinated with other development activities, such as coaching through on-the-job training. Standards for Internal Control in the Federal Government states that management recruits, develops, and retains competent personnel to achieve the entity’s objectives. This includes enabling individuals to develop competencies appropriate for key roles, reinforcing standards of conduct, and tailoring training based on the needs of the role. It also includes mentoring to develop individual performance based on standards of conduct and expectations of competence that align the individual’s skills and expertise with the entity’s objectives and help personnel adapt to an evolving environment. In addition, we have previously reported that identifying where an agency’s development process is lacking can help address barriers that hinder its ability to achieve meaningful results. We also reported that it is important for agencies to treat continuous learning as an investment in success as it can address employees’ career development issues, skill-specific training needs, and provide managers with opportunities to identify where training and development is appropriate. Effective and consistent staff development is particularly important because FEMA has hired a large number of reservists over the past few years. Our analysis of FEMA data shows that from June 1, 2017 to May 31, 2019, the agency hired over 3,200 reservists, which was 40 percent of the agency’s entire reservist workforce as of June 1, 2019. Creating a staff development program that systematically and comprehensively addresses staff development through courses, on-the-job training and mentoring, performance evaluation, and ongoing developmental opportunities would provide better assurance that staff develop the skills and competencies needed to meet mission needs during field operations and help ensure the best results for disaster survivors. The large-scale and concurrent disasters during the 2017 and 2018 disaster seasons highlighted the complex challenges facing FEMA’s workforce. The agency deployed 14,684 and 10,328 personnel, respectively, at the peak of each of these disaster seasons, and the increased demand for its workforce is expected to continue. Without accurate and complete information on the knowledge, skills, and abilities of these staff members, field officials face challenges with efficiently providing disaster assistance, managing staff workload, and assigning responsibilities. FEMA has taken some initial actions to improve the information provided by its qualification and deployment systems, such as establishing additional controls in its qualification process. However, developing a plan to address the information challenges experienced during the 2017 and 2018 disaster seasons would be beneficial to enhance field leadership’s ability to identify and leverage staff skills and, given the persistence of some of these challenges, help ensure they do not continue to affect FEMA’s ability to support mission needs in future disasters. Further, in light of the staffing constraints that FEMA faces, it is important that the agency be able to assess how effectively it deploys available staff to disasters to meet field needs. Developing a mechanism to assess FEMA’s deployment outcomes would provide officials in headquarters with critical information to monitor and evaluate the extent to which its deployment policies and strategies effectively place staff with the right skills in the right place at the right time to meet mission needs and take corrective actions if needed. Finally, creating a staff development program for its disaster workforce that addresses access to training, delivery of on-the-job training and mentoring, use of performance evaluations, and developmental opportunities when not deployed would help FEMA ensure more consistent and comprehensive development of the skills and abilities needed during deployments. Consistent and effective staff development is particularly important to help build the skills of staff who are qualified in the FEMA Qualification System but unable to proficiently perform their duties and develop the large number of staff that FEMA has recently hired to meet its new disaster workforce targets. We are making the following three recommendations to FEMA: The FEMA Administrator should develop a plan—with time frames and milestones and input from field leadership—to address identified challenges that have hindered FEMA’s ability to provide reliable and complete information to field leaders and managers about staff knowledge, skills, and abilities. (Recommendation 1) The FEMA Administrator should develop mechanisms, including collecting relevant data, to assess how effectively FEMA’s disaster workforce was deployed to meet mission needs in the field. (Recommendation 2) The FEMA Administrator should create a staff development program for FEMA’s disaster workforce that, at a minimum, addresses access to training, delivery of on-the-job training and mentoring, use of performance evaluations, and consistent developmental opportunities regardless of deployment status. (Recommendation 3) We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reprinted in appendix III and summarized below. In its comments, DHS concurred with our three recommendations and provided a number of ongoing and planned actions that it intends to leverage in addressing them. DHS also provided technical comments, which we incorporated as appropriate. With regard to our first recommendation for FEMA to develop a plan to address identified challenges with providing reliable and complete staffing information to the field, DHS reiterated some of the steps described in this report that FEMA has taken to improve the coach-and-evaluator program. DHS noted that FEMA plans to engage field leaders on these initiatives to develop a plan to address identified challenges. DHS also reported that FEMA plans to increase training offerings and align its curriculum so that FEMA Qualification System status matches workforce capability. DHS anticipates these efforts will be completed by March 31, 2021. While these are positive initial steps, they focus solely on the coach-and- evaluator program and staff training. Our report identified a number of complex and interrelated challenges with the agency’s qualification and deployment processes that hindered FEMA’s ability to provide reliable information to field officials about staff members’ skills and abilities, including their qualifications, specialized skillsets, and experience within and across program areas. As such, in developing the plan we recommended, it will be important for FEMA to take a comprehensive approach and consider solutions that may cut across multiple systems and processes. We will monitor DHS’s and FEMA’s efforts in this area to assess the extent to which they fully implement our recommendation. With regard to our second recommendation for FEMA to develop mechanisms to assess how effectively FEMA’s disaster workforce was deployed to meet mission needs in the field, DHS reiterated the actions described in this report that FEMA took to establish new force structure targets for its incident management workforce. DHS also reported that FEMA plans to convene subject matter experts to develop mechanisms that demonstrate how effectively FEMA’s disaster workforce deploys to meet mission needs in the field, which are expected to be completed by March 31, 2021. When they are complete, we will assess the mechanisms to determine the extent to which they address our recommendation. Regarding our third recommendation for FEMA to create a staff development program, DHS reiterated some of the actions FEMA has taken to develop its disaster workforce that were described in this report. Our report identified recurrent challenges with FEMA’s efforts to develop staff through training courses, on-the-job training and mentoring, and performance evaluations and noted that the agency’s current and planned efforts do not fully address these challenges. In creating the staff development program we recommended, it is important for FEMA to consider how its overall control environment and the initiatives it puts in place are coordinated to ensure staff receive comprehensive and consistent development to build the skills needed during disaster field operations. DHS anticipates that FEMA’s efforts to implement our recommendation will be completed by March 31, 2021. At that time, we will assess the agency’s actions to determine the extent to which they address the intent of our recommendation. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the FEMA Administrator, and other interested parties. If you or your staff have any questions about this report, please contact me at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report addresses (1) how the Federal Emergency Management Agency’s (FEMA) disaster workforce is qualified and deployed, and workforce staffing levels during the 2017 and 2018 disaster seasons; (2) how effective FEMA’s qualification and deployment processes were during the 2017 and 2018 disaster seasons in helping ensure workforce needs were met in the field; and (3) the extent to which FEMA’s disaster workforce receives staff development to enhance skills and competencies to support the agency’s disaster missions. Our review focused on FEMA’s incident management workforce, which is composed of FEMA staff who deploy to disaster sites. We defined the 2017 and 2018 disaster seasons as the time periods from August 23, 2017 through January 31, 2018, and September 7, 2018 through November 25, 2018. The 2017 dates represent the start of the FEMA incident period for Hurricane Harvey through the end of the incident period for the California wildfire season. The 2018 dates represent the start of the FEMA incident period for Hurricane Florence through the end of the incident period for the California wildfires. To address all three objectives, we (1) analyzed documentation and data on incident management workforce qualification, deployment, staffing levels, and development; (2) conducted focus groups with members of FEMA’s incident workforce across a range of employee types— permanent full-time employees, Cadre of On-Call Response/Recovery Employees (CORE), Incident Management CORE, reservists and local hires; and (3) interviewed FEMA officials in headquarters and field and regional offices. We compared the results of our analysis and the information we gathered with Standards for Internal Control in the Federal Government, The Standard for Program Management, FEMA strategic documents and guidance, and our prior reports on strategic human capital management and strategic training and development. We analyzed documentation on how FEMA’s incident management workforce is qualified, deployed, and developed. Documentation included the agency’s 2017 Incident Management Handbook, 2015 CORE Program Manual, 2017 Reservist Program Directive, 2015 and 2019 FEMA Qualification System guides, 2019 Coach-and-Evaluator Program Directive, coach-and-evaluator training materials, 2014 Incident Workforce Deployment Directive, and 2019 Deployment Guide. In addition, we analyzed FEMA’s 2018-2022 Strategic Plan, 2017 Hurricane Season After-Action Report, and documentation on FEMA’s staffing targets for its incident management workforce. We analyzed data from FEMA’s Deployment Tracking System to determine incident management staffing levels, the number of staff deployed to a disaster, the number of incident management staff that had a coach-and-evaluator assigned, and the ratio of managers to incident management staff. We also analyzed data FEMA provides to the National Finance Center to determine the number of new staff the agency hired. To assess the reliability of the data, we interviewed officials at FEMA headquarters about their data quality control procedures and reviewed documentation about these data systems. For the Deployment Tracking System, we also conducted electronic testing and reviewed the data for obvious errors and omissions. We found the data to be sufficiently reliable for the purposes of this report. As shown in table 4, to obtain perspectives on how effectively FEMA qualifies, deploys, and develops its disaster workforce, we conducted 17 focus groups with a total of 129 participants who were deployed in incident management positions during the 2017 disaster season, and in some cases, the 2018 disaster season. The focus group locations were selected based on where staff members who were deployed during the 2017 disaster season were located at the time of our review. We also selected these locations to reflect where the 2017 disasters occurred and to obtain variation in geographic location to the extent possible. Participants were selected using a stratified random sample from a universe of incident management staff members who were deployed to a federally declared disaster during the 2017 hurricane and wildfire season. For each employee type, we conducted separate focus groups with participants in supervisory and nonsupervisory positions so they could speak more freely. We also selected participants to obtain a mix of staff from different cadres and a mix of staff that were qualified and not qualified in the FEMA Qualification System. If selected staff members indicated they could not attend, we replaced them with the next individual on our randomized list who had similar attributes. There were between three to 11 participants in each focus group, with an average of eight in each. These focus group discussions were guided by a moderator who used a structured list of discussion topics. The topics focused on staff members’ perspectives on, and experiences with, the level of staffing and skill sets their team had, how they were trained and developed, and the FEMA Qualification System and its qualification determinations. Supervisors were also asked about their staff’s skill sets, training, and qualification status. Focus group sessions were audio recorded and transcribed. We evaluated the transcripts using systematic content analysis to identify key themes on how effective FEMA’s qualification and deployment processes were in helping to meet field needs and the extent to which staff members received staff development to enhance their skills and competencies. An analyst coded the transcripts and a second analyst validated the coding. Any discrepancies were resolved by both analysts agreeing on the coding of the associated statement by a participant. If needed, a third analyst adjudicated any continued disagreement between coders. The results of our focus group analysis are not generalizable to all incident management staff members. However, they provided valuable first-hand experiences with staffing levels and skill sets during disasters, FEMA’s deployment processes, the FEMA Qualification System and the reliability of its qualification designations, and how well staff were trained and developed. We conducted site visits to FEMA’s joint field offices in Columbia, South Carolina; Durham, North Carolina; Guaynabo, Puerto Rico; and Tallahassee, Florida, to obtain officials’ perspectives on staffing levels and skill sets, the effectiveness of FEMA’s qualification and deployment processes and systems in meeting field needs, and the extent to which FEMA’s deployed staff receive coaching and development to enhance their skills and competencies. Officials we interviewed at the joint field offices included federal coordinating officers; chiefs of staff; training managers; and managers in the Individual Assistance, Public Assistance, Hazard Mitigation, and Logistics cadres, among others. We also interviewed an official who was previously a federal coordinating officer at a federally-declared wildfire in California. In addition, we interviewed leadership and managers for FEMA regions VI, VIII, and X to obtain the perspectives of regional officials on the topics above. In each of the regions, we interviewed the regional administrator and managers in both the response and recovery divisions, among others. We selected the joint field offices and regions to conduct interviews based on our focus group locations and to obtain variation in geographic location and disaster activity. We conducted systematic content analysis of this work using the same approach we used to analyze the focus groups. The results from this analysis are not generalizable to all field and regional officials, but provide important perspectives from leadership and managers on FEMA’s mechanisms to qualify, deploy, and develop incident management staff. In addition, we conducted interviews with multiple senior officials in FEMA headquarters. For example, we interviewed officials in the Field Operations Directorate and management in the Individual Assistance, Public Assistance, and Hazard Mitigation cadres to obtain information about how FEMA’s incident management workforce and staff in their cadres are qualified, deployed, and developed, and how the Deployment Tracking System and the FEMA Qualification System are used for these purposes. We also interviewed officials in the Office of the Chief Component Human Capital Officer to learn how FEMA trains and develops this workforce. We obtained information from these officials on the actions FEMA has taken to address the challenges we identified through our focus groups, interviews with field and regional officials, and data analysis. We conducted this performance audit from June 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Chris Currie, (404) 679-1875 or curriec@gao.gov In addition to the contact named above, Kathryn Godfrey (Assistant Director), Johanna Wong (Analyst-in-Charge), James Cook, Lawrence Crockett, Elizabeth Dretsch, Ricki Gaber, Eric Hauswirth, Tracey King, Ronald La Due Lake, Rebecca Mendelsohn, Amanda Miller, and Adam Vogt made key contributions to this report.", "summary": "During the 2017 and 2018 disaster seasons, several large-scale disasters created an unprecedented demand for FEMA's workforce. FEMA deployed 14,684 and 10,328 personnel at the peak of each of these seasons and reported staffing shortages during the disasters. GAO was asked to review issues related to the federal response to the 2017 disaster season. This report addresses (1) how FEMA's disaster workforce is qualified and deployed, (2) how effective FEMA's qualification and deployment processes were during the 2017 and 2018 disaster seasons in ensuring workforce needs were met in the field, and (3) the extent to which FEMA's disaster workforce receives staff development to enhance skills and competencies. GAO analyzed documentation and data on incident workforce qualification and deployment; conducted 17 focus groups with 129 staff members; and interviewed FEMA officials in headquarters, field, and regional offices. The Federal Emergency Management Agency (FEMA) has established mechanisms to qualify and deploy staff to disasters. For example, the FEMA Qualification System tracks training and task performance requirements for disaster workforce positions and has a process to designate staff as qualified in their positions once they have completed these requirements. FEMA's deployment process uses an automated system to deploy staff members to disasters that match field requests for positions and proficiency levels. The process depends on the agency's qualification and deployment systems to identify staff qualification status and skillsets to meet field needs. However, FEMA's qualification and deployment processes did not provide reliable and complete staffing information to field officials to ensure its workforce was effectively deployed and used during the 2017 and 2018 disaster seasons. Specifically, GAO's focus groups with over 100 incident staff members and interviews with field and regional officials indicate that disaster personnel experienced significant limitations with qualification status matching performance in the field, due in part to challenges with how staff are evaluated through the qualification process. In all focus groups with applicable incident personnel, participants cited issues with staff members who were qualified in the FEMA Qualification System not having the skills or experience to effectively perform their positions. For example, one participant described supervising staff members who were qualified in the system but did not know the eligibility requirements for applicants to receive housing assistance, or what information needed to be included in the applicant's file. In addition, participants in the majority of the focus groups reported challenges with using FEMA's deployment processes to fully identify staff responsibilities, specialized skillsets, and experience. FEMA headquarters officials acknowledged the identified information challenges but said they have not developed a plan to address them in part because of competing priorities. Developing a plan to address identified challenges with providing reliable staffing information to field officials would enhance FEMA's ability to use staff as flexibly and effectively as possible to meet disaster needs. Further, FEMA's disaster workforce experienced challenges with receiving staff development through the agency's existing methods to enhance the skills and competencies needed during disaster deployments—challenges FEMA headquarters officials acknowledged. Specifically, GAO's focus groups and interviews indicate that disaster personnel encountered challenges related to the availability of courses, providing and receiving on-the-job training and mentoring, and consistently receiving performance evaluations. For example, in 10 of 17 focus groups, participants cited barriers to taking courses that in their view would help them better perform their jobs. In addition, participants in seven focus groups stated that they did not receive coaching or feedback on the job. Relatedly, FEMA data show that at the start of deployments during the 2017 and 2018 disaster seasons, 36 percent of staff did not have an official assigned to coach and evaluate task performance—the primary mechanism the agency depends on for coaching. Creating a staff development program would help better ensure FEMA's disaster workforce develops the skills and competencies needed to meet mission needs in the field. GAO is making three recommendations, including that FEMA develop (1) a plan to address identified challenges that have hindered its ability to provide reliable information to field officials about staff skills and abilities and (2) a staff development program for its disaster workforce that addresses training access, delivery of on-the-job training, and other development methods. The Department of Homeland Security concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Resellers maintain large, sophisticated databases with consumer information that can include credit histories, insurance claims, criminal records, employment histories, incomes, ethnicities, purchase histories, and interests. As shown in figure 1, resellers largely obtain their information from public records, publicly available information (such as directories and newspapers), and nonpublic information (such as from retail loyalty cards, warranty registrations, contests, and web browsing). Consumer information can be derived from mobile networks, devices (including smartphones and tablets), operating systems, and applications. Resellers also may obtain personal information from the profile or public information areas of websites, including social media sites, or from information on blogs or discussion forums. Depending on the context, information from these sources may be publicly available or nonpublic. In 1973, a U.S. government advisory committee first proposed the Fair Information Practice Principles for protecting the privacy and security of personal information. While these principles are not legal requirements, they provide a framework for balancing privacy with other interests. In 2013, the Organisation for Economic Co-operation and Development (OECD) developed a revised version of the principles (see table 1). The Fair Information Practice Principles served as the basis for the Privacy Act of 1974—which governs the collection, maintenance, use, and dissemination of personal information by federal agencies. The principles also were the basis for many Federal Trade Commission (FTC) and Department of Commerce privacy recommendations and for a framework for consumer data privacy the White House issued in 2012. As we reported in 2013 and as continues to be the case, no overarching federal privacy law governs the collection, use, and sale of personal information among private-sector companies, including information resellers. There are also no federal laws designed specifically to address all the products sold and information maintained by information resellers. Federal laws addressing privacy issues in the private sector are generally narrowly tailored to specific purposes, situations, types of information, or sectors or entities—such as data related to financial transactions, personal health, and eligibility for credit. These laws include provisions that limit the disclosure of certain types of information to a third party without an individual’s consent, or prohibit certain types of data collection. The primary laws include the following: Fair Credit Reporting Act (FCRA). FCRA protects the security and confidentiality of personal information collected or used to help make decisions about individuals’ eligibility for credit, insurance, or employment. It applies to consumer reporting agencies that provide consumer reports. Accordingly, FCRA applies to the three nationwide consumer reporting agencies (commonly called credit bureaus) and to any other information resellers that resell consumer reports for use by others. FCRA limits resellers’ use and distribution of personal data—for example, by allowing consumers to opt out of allowing consumer reporting agencies to share their personal information with third parties for prescreened marketing offers. Gramm-Leach-Bliley Act (GLBA). GLBA protects nonpublic personal information that individuals provide to financial institutions or that such institutions maintain. GLBA sharing and disclosure restrictions apply to financial institutions or entities that receive nonpublic personal information from such institutions. For example, a third party that receives nonpublic personal information from a financial institution to process consumers’ account transactions may not use the information or resell it for marketing purposes. Health Insurance Portability and Accountability Act of 1996 (HIPAA). HIPAA establishes a set of national standards to protect certain health information. The HIPAA privacy rule governs the use and disclosure of an individual’s health information for purposes including marketing. With some exceptions, the rule requires an individual’s written authorization before a covered entity—a health care provider that transmits health information electronically in connection with covered transactions, health care clearinghouse, or health plan—may use or disclose the information for marketing. The rule does not directly restrict the use, disclosure, or resale of protected health information by resellers or others not considered covered entities under the rule. Children’s Online Privacy Protection Act of 1998 (COPPA). COPPA and its implementing regulations apply to the collection of information— such as name, email, or location—that would allow someone to identify or contact a child under 13. Covered website and online service operators must obtain verifiable parental consent before collecting such information. COPPA may not directly affect information resellers, but the covered entities are potential sources of information for resellers. Electronic Communications Privacy Act of 1986 (ECPA). ECPA prohibits the interception and disclosure of electronic communications by third parties unless an exception applies (such as one party to the communication consenting to disclosure). For example, the act would prevent an internet service provider from selling the content of its customers’ emails to a reseller for marketing purposes, unless the customers had consented to disclosure. However, ECPA provides more limited protection for information considered to be “non-content,” such as a customer’s name and address. Federal Trade Commission Act (FTC Act), Section 5. The FTC Act prohibits unfair or deceptive acts or practices in or affecting commerce. Although the act does not explicitly grant FTC the specific authority to protect privacy, FTC has interpreted it to apply to deceptions or violations of written privacy policies. For example, if a retailer’s written privacy policy stated customers’ personal information would not be shared with resellers and the retailer later sold information to such parties, FTC could bring an enforcement action against the retailer for unfair and deceptive practices. Some states also have enacted laws designed to regulate resellers’ sharing of personal information about consumers. For example, in 2018, Vermont passed a law that contains, among other requirements, consumer protection provisions related to data brokers. Among other things, the law requires data brokers to register annually and prohibits the acquisition and use of brokered personal information through certain means and for certain uses. The scope of consumer privacy protections provided under federal law has remained narrow in relation to (1) individuals’ ability to access, control, and correct their personal data; (2) collection methods and sources and types of consumer information collected; (3) new technologies; and (4) some regulatory authorities. The examples in the following sections are drawn from our earlier reports and remain pertinent today. In our 2013 report, we found that no federal statute that we examined generally requires resellers to allow individuals to review personal information (intended for marketing purposes), control its use, or correct it. The Fair Information Practice Principles state that individuals should be able to know about and consent to the collection of their information and have the right to access the information, request correction, and challenge the denial of those rights. We also reported in 2013 that no federal statute provides consumers the right to learn what information is held about them and who holds it for marketing or look-up purposes. FCRA provides individuals with certain access rights, but only when information is used for credit eligibility purposes. And GLBA’s provisions allowing consumers to opt out of having their personal information shared with third parties apply only in specific circumstances. Otherwise, under federal law, individuals generally cannot require that their personal information not be collected, used, and shared. Also, no federal law we examined provides correction rights (the ability to have resellers and others correct or delete inaccurate, incomplete, or unverifiable information) for marketing or look-up purposes. Our 2013 report also found that federal privacy laws are limited in addressing the methods by which, or the sources from which, resellers collect and aggregate personal information, or the types of information collected for marketing or look-up purposes. The Fair Information Practice Principles state that personal information should be relevant, limited to the purpose for which it was collected, and collected with the individual’s knowledge or consent. Federal laws generally do not govern the methods resellers may use to collect personal information. For instance, resellers, advertisers, and others use software to search the web for information about individuals and extract and download bulk information from websites with consumer information. Resellers or retailers also may collect information indirectly (by combining information from transactions). Current federal law generally allows resellers to collect personal information from sources such as warranty registration cards and surveys and from online sources such as discussion boards, social media sites, blogs, and web browsing histories and searches. Current federal law generally does not require disclosure to consumers when their information is collected from these sources. The federal laws that address the types of consumer information that can be collected and shared are not comprehensive. Under most circumstances, information that many people may consider very personal or sensitive can be collected, shared, and used for marketing. This can include information about physical and mental health, income and assets, political affiliations, and sexual habits and orientation. For health information, HIPAA rule provisions generally apply only to covered entities, such as health care providers. The current privacy framework does not fully address new technologies such as facial recognition technology, privacy issues raised by online tracking and mobile devices, and activities by financial technology firms. The original enactment of several federal privacy laws predates these trends and technologies. But in some instances existing laws have been interpreted to apply to new technologies. For example, FTC has taken enforcement actions under COPPA and revised the statute’s implementing regulations to account for smartphones and mobile applications. One example of how privacy law has not kept pace with changes in technology is the use of facial recognition technology, which involves the collection of facial images and may be employed in a wide range of commercial applications. In our 2015 report we concluded that the future trajectory of this technology raised questions about consumer privacy. We found that federal law does not expressly address the circumstances under which commercial entities can use facial recognition technology to identify or track individuals, or when consumer knowledge or consent should be required for the technology’s use. Furthermore, in most contexts federal law does not address how personal data derived from the technology may be used or shared. The privacy issues stakeholders raised about facial recognition technology and other biometric technologies in use at the time of our 2015 report served as yet another example of the need to adapt federal privacy law to reflect new technologies. As such, we reiterated our 2013 recommendation that Congress strengthen the current consumer privacy framework to reflect the effects of changes in technology and the marketplace. The rise of financial services provided by nonfinancial firms—often referred to as fintech—is another example of how new technology may create privacy concerns. For example, fintech lenders offer a variety of loans such as consumer and small business loans and operate almost exclusively online. In our 2018 report, we noted that while these lenders may still assess borrowers’ creditworthiness with credit scores, they also may analyze large amounts of additional or alternative sources of data to determine creditworthiness. We also found that some fintech firms may collect more consumer data than traditional lenders. For example, fintech lenders may have sensitive information such as consumers’ educational background or utility payment information, and according to certain stakeholders, these data may contain errors that cannot be disputed by consumers under FCRA. Furthermore, some data aggregators may hold consumer data without disclosing what rights consumers have to delete the data or prevent the data from being shared with other parties. A leak of these or other data held by fintech firms may expose characteristics that people view as sensitive. GLBA generally requires fintech firms and traditional financial institutions to safeguard nonpublic personal information about customers. Our 2018 report discussed that some fintech firms use new technologies or mobile device features to mitigate data privacy risks and that some regulators have issued guidance to consumers publicizing practices that help maintain privacy when using online products and services, including those provided by fintech firms. Regulators also have issued GLBA guidance to businesses, including fintech firms, recommending that they adopt policies and procedures to prevent, detect, and address privacy threats. Online tracking. In our 2013 report, we found that no federal privacy law explicitly addresses the full range of practices to track or collect data from consumers’ online activity. Cookies allow website operators to recall information such as user name and address, credit card number, and purchases in a shopping cart. Resellers can match information in cookies and their databases to augment consumer profiles. Third parties also can synchronize their cookie files with resellers’ files. Advertisers can use third-party cookies—placed on a computer by a domain other than the site being visited—to track visits to the websites on which they advertise. While current federal law does not, with some exceptions, explicitly address web tracking, FTC has taken enforcement actions related to web tracking under its authority to enforce the prohibition on unfair or deceptive acts. For example, in 2011, FTC settled charges with Google for $22.5 million after alleging that Google violated an earlier privacy settlement with FTC when it misrepresented to users of Apple’s Safari web browser that it would not track and serve targeted advertisements to Safari users. Google agreed to disable its advertising tracking cookies. Mobile devices. In 2013, we also explained that no federal law comprehensively governs applications software for mobile devices. Application developers, mobile carriers, advertisers, and others may collect an individual’s information through services provided on a mobile device. However, FTC has taken enforcement action against companies for use of mobile applications that violate COPPA and FCRA. The agency also has taken action under the FTC Act. We and others have reported that the capability of mobile devices to provide consumer’s location engenders privacy risks, particularly if companies use or share location data without consumers’ knowledge. ECPA might not apply if location data were not deemed content and would not govern entities that are not covered by ECPA. But FTC could pursue enforcement action if a company’s collection or use of the information violated COPPA. More recently, in January of this year, we issued a report on internet privacy that reinforces what we reported in 2013. To varying extents, internet content providers and internet service providers collect, use, and share information from their customers to enable their services, support advertising, and for other purposes. Consumers access such services through mobile phones and tablets, computers, and other internet- connected devices. However, there is no comprehensive federal privacy statute with specific standards. FTC has been addressing internet privacy through its unfair and deceptive practices authority, among other statutes, and other agencies have been addressing this issue using industry- specific statutes. We concluded that recent developments regarding internet privacy suggest that this is an appropriate time for Congress to consider comprehensive internet privacy legislation. To address such privacy concerns, states and other countries have adopted privacy rules. For example, the European Union’s General Data Protection Regulation, which came into force in May 2018, is a set of privacy rules that give consumers control over the collection, use, and sharing of their personal information, and California passed its own privacy law in June 2018 that becomes effective in 2020. In February of this year, we reported that FTC does not have civil penalty authority for initial violations of GLBA’s privacy and safeguarding requirements, which, unlike FCRA, includes a provision directing federal regulators and FTC to establish standards for financial institutions to protect against any anticipated threats or hazards to the security of customer records. To obtain monetary redress for these violations, FTC must identify affected consumers and any monetary harm they may have experienced. However, harm resulting from privacy and security violations (such as a data breach) can be difficult to measure and can occur years in the future, making it difficult to trace a particular harm to a specific breach. As a result, FTC lacks a practical enforcement tool for imposing civil money penalties that could help to deter companies from violating data security provisions of GLBA and its implementing regulations. We recommended that Congress consider giving FTC civil penalty authority to enforce GLBA’s safeguarding provisions. Additionally, in our January 2019 report, we found that FTC had not yet issued regulations for internet privacy other than those protecting financial privacy and the internet privacy of children, which were required by law. FTC uses its statutory authority under the FTC Act to protect consumers from unfair and deceptive trade practices. For FTC Act violations, FTC may promulgate regulations but is required to use procedures that differ from traditional notice-and-comment processes and that FTC staff said add time and complexity. In addition, under this authority, FTC can generally only levy civil money penalties after a company has violated an FTC final consent order. In our recommendation that Congress consider developing comprehensive internet privacy legislation, we also suggested that such legislation consider providing rulemaking and civil money penalty authorities to the proper agency or agencies. In summary, new technologies have vastly changed the amount of personal information private companies collect and how they use it. But our current privacy framework does not fully address these changes. Laws protecting privacy interests are tailored to specific sectors and uses. And, consumers have little control over how their information is collected, used, and shared with third parties for marketing purposes. As a result, current privacy law is not always aligned with the Fair Information Practice Principles, which the Department of Commerce and others have said should serve as the foundation for commercial data privacy. Thus, the privacy framework warrants reconsideration by Congress in relation to consumer interests, new technologies, and other issues. Chairman Crapo, Ranking Member Brown, and Members of the Committee, this concludes my statement. I would be pleased to respond to any questions you may have. For further information on this statement, please contact Alicia Puente Cackley at 202-512-8678 or cackleya@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact above, Jason Bromberg (Assistant Director), William R. Chatlos, Rachel DeMarcus, Kay Kuhlman (Assistant Director), Christine McGinty (Analyst in Charge), Barbara Roesmann, and Tyler Spunaugle contributed to this statement. Other staff who made key contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Information resellers—companies that collect and resell information on individuals—have dramatically increased the collection and sharing of personal data in recent years, raising privacy concerns. Increasing use of social media, mobile applications, and other technologies have intensified these concerns. This statement is primarily based on findings from GAO's 2013 report on information resellers ( GAO-13-663 ). It also discusses a 2015 report on facial recognition technology ( GAO-15-621 ), a 2018 report on financial technology ( GAO-18-254 ), and two 2019 reports on internet privacy and consumer data protection ( GAO-19-52 and GAO-19-196, respectively). GAO discusses (1) existing federal laws related to the privacy of consumer information held by information resellers and (2) any gaps in this legal framework. For the prior work, GAO analyzed relevant laws, regulations, and enforcement actions and interviewed representatives of federal agencies, trade associations, consumer and privacy groups, and resellers. In recent years, GAO issued reports that relate to information resellers and consumer privacy issues. Two central findings from a 2013 GAO report remain current: No overarching federal privacy law governs the collection and sale of personal information among private-sector companies , including information resellers (data brokers). Instead, a variety of laws are tailored to specific purposes, situations, or entities. For example, the Fair Credit Reporting Act limits use and distribution of personal information collected or used to help determine eligibility for such things as credit or employment. Other laws apply to health care providers, financial institutions, or to online collection of information about children. Gaps exist in the federal privacy framework . With regard to data that private-sector entities use for marketing, no federal statute provides consumers the right to learn what information is held about them and who holds it. In many cases, consumers also do not have the legal right to control the collection or sharing with third parties of sensitive personal information (such as their shopping habits and health interests) for marketing purposes. In 2013 and in 2015, GAO also reported that the statutory framework for consumer privacy did not fully address new technologies—such as online tracking and facial recognition—and the vastly increased marketplace for personal information, including the proliferation of information sharing among third parties. In two 2019 reports, GAO found additional gaps in the federal privacy framework and potential limitations in regulatory authority under current privacy law. Internet content providers and internet service providers collect, use, and share information from customers to enable their services, support advertising, and for other purposes. Although the Federal Trade Commission (FTC) generally has addressed internet privacy through its unfair and deceptive practices authority, and other agencies have used industry-specific statutes, there is no comprehensive federal privacy statute with specific internet privacy standards for the private sector. GAO also reported that the Gramm-Leach-Bliley Act, a key law governing the security of consumer information, does not provide FTC with civil penalty authority for violations of the privacy and data security provisions of the act. New and more advanced technologies and changes in the marketplace for consumer information have vastly increased the amount and nature of personal information collected and the number of parties using or sharing it. Such changes warrant reconsideration of how well the current privacy framework protects personal information. In 2013, GAO recommended that Congress consider strengthening the consumer privacy framework to reflect the effects of changing technologies and markets. In 2019, GAO recommended that Congress consider comprehensive internet privacy legislation. Legislation on these issues has not been enacted to date.", "document_type": "gao"}
{"report": "VA, HUD, and DOL are the federal agencies that provide programs specifically aimed at assisting homeless veterans. They are among the 19 federal member agencies of USICH—an independent establishment within the Executive Branch charged with coordinating the federal response to homelessness and creating a national partnership at every level of government and with the private sector to reduce and end homelessness nationally. USICH, VA, and HUD have jointly established criteria and benchmarks to guide communities that are taking action toward being certified as having ended veteran homelessness. USICH stated that an end to homelessness does not mean that no one will ever experience a housing crisis again, but that every community will have a systematic response in place to prevent homelessness whenever possible and ensure that homelessness is a rare, brief, and non-recurring experience. VA, HUD, and USICH coordinate their efforts towards this goal through a working group, Solving Veterans Homelessness as One, which was established in 2012. We identified 16 federal programs that target services specifically to veterans who are homeless or are at risk of becoming homeless. As shown in table 1, the programs provide permanent and transitional housing, health care, employment assistance, and supportive services, such as assistance with rent, utilities, and moving costs. Twelve of the programs are administered solely by VA, two are jointly administered by HUD and VA, and two are administered by DOL. VA’s and HUD’s homelessness programs follow the principles of “Housing First,” which is intended to provide housing without any preconditions and barriers to entry such as sobriety, treatment, or service participation requirements. The largest of these programs were HUD-VASH, GPD, and SSVF. In fiscal year 2019, HUD-VASH reported over $1 billion in obligations; GPD reported obligations of over $234 million; and SSVF reported $380 million in obligations. Homeless veterans can access program services in several ways, including through: VA Medical Centers (VAMCs). Program services can be provided to homeless and at-risk veterans at their local VAMCs. Service providers. Veterans may also obtain services through local, state, or nonprofit organizations in the community, some of which receive grants from federal agencies to fund program services. Public housing agencies (PHAs). Housing vouchers are administered to homeless veterans by PHAs, which are HUD-funded city, county, and state agencies. VAMCs, service providers, and PHAs may coordinate through Continuums of Care (CoC), which are composed of stakeholders in a geographical area that, among other things, coordinate to provide homeless services, apply for grants, set local priorities, and collect homelessness data for all homeless populations. Each year, HUD awards CoC program funding competitively to nonprofit organizations, states, and other local recipients. The CoC is responsible for its operation and developing and implementing its plan and strategies to prevent and end homelessness. Additionally, the CoC must choose an entity to operate the local information system used to collect client-level data and data on the provision of housing and services to homeless individuals and families and those at risk of homelessness (referred to as the Homeless Management Information System). The CoC also designates an entity that prepares and submits the CoC program application for HUD funding (referred to as the collaborative applicant). HUD requires each CoC to establish and operate a centralized or coordinated assessment system (referred to as Coordinated Entry). This system may include implementing a “no wrong door” approach in which a homeless family or individual can show up at any homeless housing and service provider in a geographic area and get screened for services using the same assessment tool (see figure 1). The goal of Coordinated Entry is to ensure that people experiencing a housing crisis within a CoC are quickly and consistently assessed and referred for services. HUD officials stated that Coordinated Entry is a process that was first developed by some CoCs based on best practices. In 2017, HUD adopted and codified requirements for all CoCs to participate in Coordinated Entry. That same year, VA published requirements for VAMCs to participate in Coordinated Entry. According to VAMC staff and service providers we interviewed, they faced challenges serving homeless veterans and those at risk of becoming homeless due, in part, to the additional level of service and support that some veterans need. For example: Substance use and mental illness. Substance use disorders and mental health issues such as post-traumatic stress disorder (PTSD) and depression, are among the most complex issues many homeless veterans face, according to USICH. In 2018, USICH reported that 28 percent of homeless veterans that receive VA-provided health care have been diagnosed with depression. Thirteen percent have been diagnosed with PTSD. Further, 19 percent struggle with alcohol abuse and 20 percent with drug abuse. VAMC staff and service providers told us that addressing the complex nature of these conditions is often a challenge for them. For example, one SSVF provider told us that it is challenging to find housing for veterans with mental health or substance use disorders; further, HVCES staff at one VAMC told us that employment programs for the general population may not be suitable for clients with these disorders. HUD-VASH staff at one VAMC told us that there are not enough mental health providers in the VA system. Overall, staff from three VAMCs from the GPD and HVCES programs, five GPD service providers, and three SSVF service providers cited challenges related to substance use and mental illness. Aging homeless veterans. In 2018, USICH reported that the number of homeless veterans who were 62 and older increased by 54.3 percent between 2009 and 2016. VA officials told us that this trend is expected to continue and that this population has increased, in part, because the services that VA offers are not targeted to aging veterans. According to VA officials, there is a similar aging trend in the general veteran population. HUD-VASH staff at three VAMCs, HVCES staff at one VAMC, and GPD staff at two VAMCs told us that aging veterans require a higher level of care than what existing programs may be able to fully address. Some of these veterans may suffer from ambulatory and cognitive issues and have difficulties living alone but cannot afford an assisted living arrangement. HUD-VASH staff at one VAMC we visited told us the VAMC was able to hire five occupational therapists to assist aging clients with their specialized needs. Further, VA officials told us that HUD-VASH is collaborating with VA’s Geriatrics and Extended Care programs office to explore how aging homeless veterans can be served through other programs, such as the Medical Foster Home and Community Residential Care programs. This collaboration would allow VA to provide funding for services while the HUD-VASH voucher would pay for housing costs. VA officials also told us that they are working to market HUD-VASH to developers and funders to increase the development of project-based HUD-VASH housing. This would give the program a dedicated housing stock and better serve subpopulations of veterans, such as veterans who are elderly or suffer from mental illness. Resistance to program participation. According to HCHV staff at two VAMCs, HVCES staff at three VAMCs, two PHAs that administer the HUD-VASH voucher program, and five service providers (two GPD, two HVRP, and one SSVF), a key challenge in addressing the needs of homeless veterans is their resistance to participating in a program, particularly if it places restrictions or requirements on them. This issue makes it challenging for outreach and treatment teams to deliver services. In addition to the challenges cited above, veterans must meet certain eligibility requirements to participate in homeless assistance programs which if not met can present challenges to VAMC staff and service providers when providing veterans with services. For example, veterans must meet certain criminal history requirements to be eligible for HUD- VASH. HVCES staff from one VAMC, DCHV staff from two VAMCs, HUD-VASH staff from another VAMC, and three service providers (one GPD and two SSVF) also told us that it is challenging to find housing and employment for homeless veterans with legal or criminal problems and landlords may be resistant to working with them. One PHA that works with HUD-VASH and one SSVF service provider told us that a veteran’s ineligibility for VA health care services also presents a challenge to them. This is because a number of VA homeless programs require a veteran to be eligible for VA health care benefits as a condition to enrollment. Generally, veterans are eligible to receive VA health care benefits if they served in the active military, naval, or air service and were discharged under conditions other than dishonorable. Therefore, according to VA officials, veterans with dishonorable discharges cannot access VA homeless assistance programs and veterans with other-than- honorable discharges may have limited access to them. In addition to meeting the discharge status requirement, a person must also meet the definition of “veteran” to be eligible for VA health services. However, the definition of “veteran” depends on factors including length of service and if the individual served on active duty or was part of the National Guard or the Reserves. Therefore, even if an individual has the appropriate discharge status to be eligible, they may not meet other eligibility requirements for VA health benefits. One service provider told us that they have to work on alternative solutions to help veterans that do not meet eligibility requirements. In 2017, VA in partnership with HUD implemented a flexibility within the HUD-VASH program—the HUD-VASH Continuum—which according to VA officials, will permit PHAs to make up to 15 percent of their total HUD- VASH allocation available to veterans who are ineligible for VA health care services, with some exceptions. According to VA officials, this expands the availability of permanent supportive housing to service members who are not eligible for VA health care. In addition, the House and Senate are considering bills to expand HUD-VASH eligibility. DOL has also implemented statutory changes to HVRP eligibility requirements to provide veterans with better access to job training programs. The program’s eligibility requirements have been broadened to include veterans participating in the HUD-VASH, Tribal HUD-VASH, and SSVF programs, and other veterans that were not previously eligible. VAMC staff and services providers cited broader challenges—not specific to veterans or the assistance programs themselves—as impacting their ability to provide assistance to homeless veterans. Those challenges include VA staffing issues and external factors, such as the lack of affordable housing and limited transportation options. VA staffing shortages. VA officials, HVCES staff at three VAMCs, and HUD-VASH and DCHV staff at two VAMCs told us they faced difficulties with recruitment and retention, which have led to persistent understaffing. For example, staff at four VAMCs for the HUD-VASH, DCHV, and HVCES programs told us that the hiring and onboarding process can often take a long time, and by the time an offer is finalized, qualified applicants have moved on to other jobs. DCHV staff at two VAMCs and HUD-VASH staff at three VAMCs cited understaffed human resources offices and a taxing approval process as contributing factors. HUD-VASH staff from one VAMC told us that it is difficult to fill some positions because the outreach work requires extensive travel within large geographic areas. Further, they told us that in high-cost areas, the VA’s local pay scale is not high enough to attract new recruits for case manager positions. HUD-VASH staff at one VAMC indicated that they have not been fully staffed for several years. Limited staffing may limit the number of veterans who can be served, according to VA officials. For example, DCHV program staff at one VAMC told us that they had to close 83 beds because there is not enough staff to keep them operational. One PHA working with the HUD-VASH program told us that VA’s staffing challenges create a bottleneck of services to clients while staff at one VAMC working with SSVF told us that high turnover of program staff is disruptive for clients. Overall, staffing shortages were cited as a challenge by VAMC staff for several programs: HUD-VASH, DCHV, HCHV, GPD, and HVCES. VAMC staff we interviewed have taken some steps to limit the impact of staffing issues. For example, at one VAMC, staff from the HCHV and GPD programs have conducted cross-training so they can back each other up when staffing shortages occur. Two other VAMCs have brought in staff from other locations to help with the workload or have developed an action plan to address employee burnout. Our past work has highlighted VA’s staffing challenges, including recruiting and retaining clinical staff. For example, we previously reported that difficulties in recruiting and retaining skilled health care providers and human resource staff at VAMCs make it difficult to meet the health care needs of more than 9 million veterans. We have also previously reported that, in addition to high attrition and increased workload, human capital shortfalls can lead to burnout among the staff whose job it is to implement these programs. Housing cost and availability. Limited and high cost housing exacerbate the other challenges VAMC staff and service providers identified. For example, HUD-VASH staff at one VAMC told us that even with subsidies, it is difficult for veterans to obtain housing because HUD-VASH vouchers may not be sufficient to cover rent. HUD-VASH staff from one VAMC and one PHA we interviewed told us that because housing costs are rising, and housing in metro areas remains limited, expensive, and competitive, veterans have fewer housing options available to them. Limited housing was cited as a challenge by VAMC staff and service providers for HUD-VASH and SSVF programs in all types of locations—urban, suburban, and rural areas. Finding and recruiting landlords is a significant challenge in getting veterans housed, according to HUD officials, HCHV staff at one VAMC, HUD-VASH staff from two VAMCs, two PHAs, and five SSVF service providers. According to HUD-VASH staff from one VAMC and SSVF staff from another VAMC, the demand for housing exceeds supply and landlords have few incentives to accept homeless veterans. HUD-VASH staff from one VAMC, one PHA, and one SSVF service provider also told us that some landlords perceive veterans to be risky because some have criminal records or substance use disorders, and may be reticent to work with them out of fear of incurring damages to their property. Some service providers have taken steps to create incentives for landlords to participate in VA’s programs. For example, HUD-VASH staff at one VAMC told us that local providers may partner to cover moving fees for veterans and encourage landlords to accept veterans’ housing vouchers. One PHA has put together landlord forums and is working to build relationships with landlords in their communities. Another PHA has held housing tours and fairs to bring landlords and clients together. VA has also implemented program changes to help address the lack of affordable housing. For example, the new Shallow Subsidies initiative that became effective in September 2019, allows SSVF service providers to provide very low-income veteran families a rental subsidy for a two-year period without requiring recertification. The two-year period ensures no reduction in subsidy even if a recipient’s income situation improves within that time frame and the family is no longer considered very low income. This provides a strong incentive for employment gains because the assistance is not dependent on income during this two-year period. Launched in 2018, VA’s Rapid Resolution initiative is another solution that is designed to prevent or resolve homelessness by providing immediate assistance when a veteran enters an emergency shelter system—such as by offering landlord mediation and conflict resolution, or connecting the veterans to support networks in other places. According to VA officials, Rapid Resolution is being implemented through VA’s SSVF program, in coordination with HUD and USICH. Limited resources (other than staffing). HUD-VASH staff at one VAMC told us they are short on equipment like laptops, office supplies, and office space. Additionally, HUD-VASH staff at another VAMC told us they do not have access to government cars for work- related travel. One HVRP service provider told us that case managers do not have enough vehicles to travel long distances or to remote locations to meet clients. To make up for shortages in resources, one SSVF service provider told us that it develops partnerships with local programs to meet the needs of the client. HUD-VASH staff at one VAMC indicated that they have communicated issues of insufficient resources to their leadership, but the issues have not been addressed to date. Resource limitations were cited as a challenge by HUD-VASH staff from two VAMCs, GPD staff from three VAMCs, DCHV staff at two VAMCs, HCHV staff at two VAMCs, and four service providers (two GPD and two HVRP). Transportation limitations. According to VAMC staff and service providers, the lack of transportation for veterans is a significant challenge for some programs. For example, according to DCHV and HVCES staff at one VAMC, HUD-VASH staff at another VAMC, and one GPD and two HVRP service providers, some veterans may not have vehicles or may live in areas with limited public transportation systems. This makes it difficult for the veterans to access resources, go to job interviews, or secure transportation for jobs. Some service providers told us they make alternative arrangements for their clients to help address these issues. For example, one HVRP service provider told us they might drive veterans to interviews or arrange for public transportation. DCHV staff at one VAMC and HVCES staff at another VAMC told us that they work with community partners to provide alternatives like shuttle services and bus passes. Additional challenges related to specific programs we reviewed are discussed in appendix II. We reviewed the services provided, eligibility requirements, and population served by the 16 programs that exclusively target homeless veterans to identify duplication and overlap. We determined that there is no duplication among the programs, but identified overlap across some program services. Specifically, we identified 18 main services that are commonly offered across the 16 programs and found that at least six of those services overlap across two or more programs (see figure 2). However, we also found these programs differed in meaningful ways, for example in terms of the different types of homeless veterans served or specialized services or focus. As we have previously reported, fragmentation, overlap, and duplication exists across the government, which can present benefits and challenges. Duplication occurs when two or more programs provide the same services to the same beneficiaries. Overlap occurs when two or more programs offer similar services to similar beneficiaries. As shown in figure 2, 15 of the 16 programs overlap in two or more of the following services that they offer. Case management is a process for managing a client’s care that includes assessing the needs of the veteran and evaluating health care options and services to ensure those needs are met while maintaining a primary focus on resolving the veteran’s homelessness through permanent housing. Eleven programs provide case management services: HUD-VASH, Tribal HUD-VASH, HCHV, HCRV, H-PACT, SSVF, GPD, DCHV, CWT-TR, HVRP and VJO. Supportive services might include providing meals, counseling, child care, housing assistance, transportation, and other services essential for achieving and maintaining independent living. Six programs provide supportive services: HUD-VASH, Tribal HUD-VASH, GPD, SSVF, HVRP, and Stand Down. Outreach involves directly contacting veterans in need of homeless services and connecting them with housing, health care, and supportive services. Six programs conduct outreach: HCHV, HVRP, SSVF, CRRCs, VJO, and HCRV. Referrals are the most common way for homeless veterans to find out about program services available to them. Referral services include conducting an assessment of the clients’ needs, connecting them to the appropriate programs, and following up with the clients as well as documenting all referral activities. Six programs provide referral services: HVRP, SSVF, CRRCs, NCCHV, HCRV, and Stand Down. Employment services include help with creating job opportunities for veterans, job searches, interviewing, and other employment assistance. Three programs provide employment-related services: HVCES, CWT-TR, and HVRP. Rental subsidies are offered to veterans through vouchers and grants, which help subsidize rental costs. Three programs offer rental subsidies: HUD-VASH, Tribal HUD-VASH, and SSVF. Although we identified overlap in these services across 15 of the 16 programs, the programs differ in meaningful ways. Specifically, some of these programs serve specific subpopulations of veterans and some provide a specialized service that other programs do not offer. For example, of the 11 programs that offer case management services, one program provides medical care (H-PACT), while others provide services in different areas such as transitional housing (GPD), housing subsidies (HUD-VASH), supportive services (SSVF), preparing veterans for employment (HVRP) and outreach (HCHV). Other programs that offer case management services serve unique subpopulations of homeless veterans such as those with mental health or substance use issues (CWT-TR and DCHV), American Indians and Alaskan Natives living in or near reservations or other Indian areas (Tribal HUD-VASH), or justice- involved veterans in local jails (VJO) and state and federal prisons (HCRV). According to a VA directive, more than one case manager may be involved in care planning and service delivery for veterans with complex needs. In addition, staff at the six VAMC locations we visited told us that clients may be co-enrolled in more than one program and can receive case management services from each of those programs. Figure 3 illustrates how case management may overlap across programs, but each program provides distinct services to the veteran. Similarly, of the three programs that provide employment services, HVCES focuses on establishing partnerships with employers to develop job opportunities for veterans and connect them with community services, while HVRP helps the veteran prepare to pursue and gain meaningful employment. The CWT-TR program, on the other hand, focuses on veterans with more complex issues such as substance use, mental health issues, and challenges in obtaining or sustaining employment that may accompany these conditions. Similar meaningful distinctions in subpopulations of beneficiaries and services exist across the programs that provide other types of services to homeless veterans that overlap— supportive services, outreach, referrals, and rental subsidies. Additional information on program differences, including information on program beneficiaries and services, can be found in appendix II. As we previously reported, in some cases it may be appropriate or beneficial for multiple agencies or entities to be involved in the same programmatic or policy area due to the complex nature or magnitude of the effort. Overlapping programs may also facilitate access to services because persons experiencing homelessness are not steered toward one specific point of entry and, in contrast, can access services through several entry points. However, when multiple programs overlap, there is also a risk of program administrators making inefficient use of available resources if they do not coordinate their efforts. For example, according to VA officials, overlap may result in operational costs if the overlapping services are not coordinated well. Table 2 describes some of the potential benefits and challenges of overlap in services for homeless veterans, as identified by agency officials, VAMC staff, and others we interviewed. Effective collaboration among agencies and service providers can help address some of these potential challenges and may help avoid the potential inefficiency that overlapping services may create. VAMC staff and service providers told us that they have taken steps to limit duplication where appropriate. Additionally, they told us that they collaborate and communicate with each other to avoid or mitigate overlap. VA has also issued guidance directed at enhancing coordination between its homeless programs and eliminating or reducing duplication of services, including the following: Veterans Health Administration (VHA) Directive 1110.04, Integrated Case Management Standards of Practice. This guidance states that case management services should be coordinated, collaborative, and veteran-centered throughout the VHA. It also directs case management teams to develop procedures and processes to support cost effective, high quality case management across the VAMC to eliminate duplication of services where appropriate. VHA Handbook 1162.09, Health Care for Homeless Veterans Program. Under the HCHV program, program coordinators are responsible for ensuring coordination of HCHV services with other homeless programs at the VAMC such as GPD, HUD-VASH, DCHV, VJO, HCRV, SSVF, and CRRCs. GPD’s Case Management Services Grant Program, Final Rule. This final rule stipulates that the case management grant may not be used for veterans receiving case management from certain other programs to ensure that there is no duplication of case management services. VHA Handbook 1162.01 (1), GPD. This guidance states that GPD liaisons are to ensure the coordination of care for homeless veterans in GPD-funded programs by following a plan that clearly delineates the roles of those responsible for the service provision to reduce duplication of services. VHA Handbook 1101.10 (1), Patient Aligned Care Team Handbook. This guidance directs staff to coordinate care in a manner that avoids unnecessary duplication. The following section of this report discusses how federal agencies collaborate more broadly on implementing federal homelessness assistance programs for veterans. We identified two key collaborative mechanisms that federal agencies use to help address veteran homelessness: (1) the Solving Veterans Homelessness as One (SVHO) working group, which coordinates VA, HUD, and USICH’s efforts at the national level, and (2) VA’s integration into Coordinated Entry, which seeks to ensure that homelessness services are coordinated at the local level. As shown in table 3 and as discussed in more detail below, both mechanisms follow leading practices for effective interagency collaboration we have identified in prior work, with some exceptions. According to USICH officials, in 2012, USICH convened the SVHO workgroup to coordinate with HUD and VA on key priorities and maximize efforts to end veteran homelessness. SVHO serves as an interagency decision-making body that plans and executes strategic actions through goal setting, policy gap identification, communication, and action. The SVHO working group fully followed all seven leading practices for effective interagency collaboration that we identified in prior work. A discussion of our assessment follows: Defining Outcomes and Monitoring Accountability. Ending veteran homelessness is one of the national goals listed in USICH’s Federal Strategic Plan to Prevent and End Homelessness. SVHO’s work is organized to support this goal. USICH reports SVHO’s efforts in its annual Performance and Accountability Reports. For example, USICH reported that in fiscal year 2019, SVHO’s efforts led to supplemental guidance and coaching to help sustain the efforts of communities that had been certified as having ended veteran homelessness. Bridging Organizational Cultures. To operate across agency boundaries, SVHO members hold regular meetings. During these meetings, SVHO members have updated one another on each agency’s efforts, discussed strategic objectives, shared program data, and coordinated on technical assistance for service providers. SVHO also held a strategic planning retreat to discuss SVHO’s priorities. Clarifying Leadership. SVHO has a Strategic Decision and Coordination Team that serves as the decision-making body and includes leadership from VA, HUD, and USICH. The team’s decisions are made by consensus, and the role for facilitating the team rotates every four months among the three agencies. The Strategic Decision and Coordination Team’s responsibilities, which include providing strategic guidance on cross-agency issues, providing joint oversight and decision-making, and facilitating the approval of decisions from the individual agencies are outlined in SVHO’s charter. Clarifying Roles and Responsibilities. The SVHO charter outlines the roles and responsibilities of the Strategic Decision and Coordination Team and the Support Team, whose responsibilities include responding to priority projects and elevating issues requiring decision and coordination to the Strategic Decision and Coordination Team. Including Relevant Participants. SVHO members (USICH, VA, and HUD) are the relevant participants because they are the agencies centrally involved in implementing veteran homelessness programs. Identifying Resources. USICH, VA, and HUD contribute staff resources to the working group. Representatives from each of the agencies attend regular SVHO meetings to ensure continuity, provide the necessary subject matter expertise, and make decisions. SVHO has also developed resources to facilitate the group’s meetings, such as agendas to guide discussions. Updating and Monitoring Written Guidance and Agreements. In March 2020, SVHO revised its charter to remove outdated information and to reflect the group’s current structure and operations. The revised charter describes the purpose of establishing SVHO as a formal structure for coordination and decision-making (to enable member agencies to execute joint activities necessary for the goal of preventing and ending veteran homelessness), SVHO’s structure (the group is comprised of a leadership team and support team with various responsibilities), and operating procedures (which involve holding regular meetings). USICH officials told us it was important to have an updated charter that solidified the commitments of the member agencies to the group. VA officials added that updating the charter would help serve as a reminder of the group’s purpose. Coordinated Entry is a process designed to help communities prioritize people who are most in need of assistance by standardizing the assessment process, defining community-wide prioritization policies, and coordinating referrals, among other things. HUD established minimal requirements for Coordinated Entry in a 2012 Continuum of Care Program Interim Rule. HUD officials said they established additional requirements in 2017 in coordination with other federal agencies, including VA. VA also issued a memo in 2017 stating that VAMCs must be actively engaged in their local Coordinated Entry. Efforts to integrate VAMCs into Coordinated Entry fully followed five of the seven leading practices on effective interagency collaboration and partially followed the other two (Bridging Organizational Cultures and Updating and Monitoring Written Guidance and Agreements). A discussion of our assessment follows: Defining Outcomes and Monitoring Accountability. VA established requirements for the VAMCs as they integrate into Coordinated Entry, which include active engagement with the CoC, involvement with case conferencing, and aligning standardized assessments. VA has a checklist that VAMCs use to assess their compliance with Coordinated Entry requirements. According to VA officials, they monitor VA integration into Coordinated Entry through self- assessment checklists that VAMCs are required to submit monthly through an internal VA system. VAMCs are also required to submit monthly operation plans to track their progress. Bridging Organizational Cultures. As we previously reported, collaborating agencies should establish ways to operate across agency boundaries and address their different cultures. VA requires VAMCs to actively engage with all coordinated entry systems within their catchment area. VA has provided some guidance to help VAMCs operate across organizational boundaries as they integrate into Coordinated Entry, but this guidance is broad in some areas. For example, it instructs VAMCs to collaborate with local CoC leadership to establish a clear process for making and receiving referrals and to share aggregate program data with each of their communities as needed. But the guidance does not describe steps that VAMCs can take to do so. In addition, two service providers and staff from two VAMCs told us that it can be challenging to work with multiple CoCs because each has their own processes. Additionally, staff from three VAMCs and one CoC entity told us that staff turnover creates challenges in their coordinated entry systems, including impeding relationship-building among partners. VA’s guidance acknowledges that VAMCs may be working with multiple CoCs, but the guidance does not provide any best practices to help address this issue, nor does it expressly address relationship-building in light of staff turnover. Clarifying Leadership. As previously discussed, VA oversees the integration of the VAMCs into Coordinated Entry. Additionally, USICH and HUD officials told us there was an interagency working group on Coordinated Entry, where several agencies, including USICH, VA, and HUD, convened to discuss, among other things, what was happening in the field and barriers to Coordinated Entry implementation across all homeless programs, including those for veterans. HUD officials told us they also worked closely with VA to fully integrate VAMCs into Coordinated Entry. Clarifying Roles and Responsibilities. VA issued guidance that defined VAMCs roles in Coordinated Entry. For example, one or more representatives must be involved in the community planning process and in case conferencing, with sufficient knowledge and decision-making power to actively engage in each activity. Including Relevant Participants. All homeless assistance organizations should be involved in Coordinated Entry, according to HUD guidance. Coordinated Entry includes CoCs, VAMCs, service providers, and public housing agencies, among others. Staff from one VAMC, one service provider, and one CoC entity that we spoke with described their coordinated entry systems as being inclusive of all relevant stakeholders, including veteran homeless service providers. Identifying Resources. VA funded 86 Coordinated Entry Specialist positions through the HCHV program, of which 81 had been filled, as of January 2020, according to VA officials. Staff from two VAMCs and two CoCs told us that these new positions play an important role in VAMCs’ integration into Coordinated Entry because they serve as a liaison between the CoCs and the VAMCs. Additionally, VA requires that VAMCs dedicate a portion of VA resources (such as HUD-VASH vouchers or VA Homeless Program Residential Treatment beds) for their inclusion into the greater pool of homeless service resources that are accessed by veterans through Coordinated Entry. Updating and Monitoring Written Guidance and Agreements. We previously reported that agencies can strengthen their commitment to working collaboratively by formally documenting their agreements, and that those written agreements are most effective when regularly monitored and updated. As discussed earlier, VA has issued some guidance to help VAMCs integrate into Coordinated Entry. VA has also held webinar trainings and issued some program-specific documents, such as an SSVF Coordinated Entry fact sheet and a “frequently asked questions” document for HUD-VASH. VA has also provided technical assistance by request, according to agency officials. However, as noted earlier, VA’s guidance is broad in some areas and neither provides best practices to help VAMCs working with multiple CoCs, nor expressly addresses relationship-building in light of staff turnover. VA officials told us they do not have plans to issue additional guidance on Coordinated Entry because they believe their current guidance provides sufficient direction. However, several interviewees (staff from three VAMCs, one service provider, and one PHA) told us they need additional guidance on Coordinated Entry, specifically about how to better collaborate among partners. For example, staff from one of the VAMC’s said that while they understood that implementing Coordinated Entry required some flexibility, it would be beneficial if VA provided common parameters that communities could follow. Further, some VA guidance (such as the “frequently asked questions” document for HUD-VASH) may not be accessible by all service providers for VA’s homeless programs because it is stored on the agency’s internal system (the Homeless Programs Hub) or provided via technical assistance only upon request. Staff from two VAMCs stated that VA could better disseminate guidance. Additionally, one service provider and one PHA told us it would be helpful for VA to share best practices on collaboration used in other parts of the country. By providing additional information on how VAMC staff and service providers can collaborate with local partners, such as best practices, and making available guidance readily accessible, VA can help ensure that VAMCs and service providers are able to more effectively collaborate with other local providers to serve homeless veterans. According to VA officials, since 2011, VA has focused on three primary outcome measures for the homelessness assistance programs we selected for review: 1) placement into permanent housing, 2) employment, and 3) negative exits from programs. DOL developed four critical measures for HVRP, including the placement rate for total enrollment, which tracks the total number of program participants employed in one or more jobs. VA and DOL officials told us they review their performance measures annually and adjust them as needed. National level performance data for fiscal years 2015 to 2019 show that five of the seven selected programs we reviewed have generally met their performance targets (see table 4). However, two programs, HUD-VASH and DCHV, have not met some of their targets. Specifically, in four of the last five years, HUD-VASH did not meet its targets for “percent housed in HUD-VASH housing” and “percent housed within 90 days.” In the last two years (2018 and 2019), HUD-VASH did not meet its targets for “negative exits”; however, VA had decreased the target for those years (making it more difficult to meet). DCHV did not meet its targets for “exits to permanent housing” for the last three fiscal years, and “negative exits” for two of the last five fiscal years. According to VA officials, factors that have affected VAMCs abilities to meet HUD-VASH performance targets—some of which are challenges identified by local VAMC staff and providers that we have discussed previously—include an insufficient number of case management staff, which has led to fewer veteran admissions into HUD-VASH and a lack of safe and affordable housing for veterans. VA officials told us that DCHV program outcomes have been affected by factors including discharges to other transitional housing programs (which would not be included under an exit to permanent housing) and limited affordable housing resources. To help improve program outcomes for HUD-VASH, VA officials told us they are focusing on increasing HUD-VASH voucher utilization, such as by using vouchers for non-Veteran Housing Administration eligible homeless veterans through the HUD-VASH Continuum program and expanding project-based HUD-VASH efforts (discussed previously). To improve DCHV program outcomes, VA officials said they are holding in- depth discussions with DCHV staff to highlight lessons learned from those VAMCs that are meeting performance targets. The performance measures used for the selected programs we reviewed reflected most of the attributes of successful performance measures that we identified in prior work (see table 5). VA’s measures fully reflected all six of these attributes. DOL’s measures fully reflected five attributes and partially reflected one, the reliability attribute. Performance measures that include these attributes are effective in monitoring progress and determining how well programs are achieving their goals. A discussion of our assessment of VA’s and DOL’s performance measures follows: Clarity. VA’s and DOL’s policies clearly state the names and descriptions of the performance measures we reviewed. The names and descriptions are also consistent with the methodologies that were used to calculate them. Measureable Target. VA and DOL have established quantifiable, numerical targets for their performance measures, which allows them to compare expected and actual results. VA officials told us they developed the targets for their measures by first obtaining baseline data and then looking at historical and projected performance. HVRP service providers identify their own targets during the annual grant competition process, according to DOL officials. DOL officials told us they provide some parameters, such as the national targets, to help providers develop their individual targets. Objectivity. VA’s and DOL’s performance measurement policies describe what is expected to be measured (for example, the percent housed and percent employed). They also indicate which specific population (veterans) and under what timeframes (the relevant reporting period). Baseline and Trend Data. Nearly all the measures have baseline and trend data for the last five fiscal years. The exceptions are measures that have been recently discontinued. Having baseline and trend data allows VA and DOL to monitor changes in program performance. Linkage. DOL’s performance measures for HVRP align with one of DOL’s agency-wide strategic objectives to provide veterans with resources and tools to gain and maintain employment. DOL officials told us that information about the measures is communicated to grantees through local officials, who review a data dashboard created by DOL officials at headquarters. VA’s performance measures are aligned with VA’s agency-wide goal to end veteran homelessness, as outlined in VA’s most recent strategic plan. VA officials told us they communicate information about the performance measures to the VAMCs and service providers through scorecards. Reliability. Measures reflect this attribute when they produce the same result under similar conditions. Reliability is increased when verification and validation procedures exist, such as checking performance data for significant errors by formal evaluation or audit. VA’s performance measures fully reflected the reliability attribute; DOL’s measures partially reflected it. VA officials told us they ensure data quality through the use of validation processes, error messages, and notifications that appear in real-time as data are entered. Additionally, there are dedicated program offices that work with the VAMC’s and service providers to monitor and reconcile data. Finally, VA’s policies describe steps that should be taken to review and verify the quality of the data. DOL officials told us they review HVRP performance data quality at different levels in the agency (regional and national) and use a data validation tool to identify potential errors. However, DOL officials acknowledge limitations with data quality, namely the lack of an electronic system to compile the data and the potential for human error when entering data into spreadsheets. Further, HVRP service providers may be unclear about the data quality steps to take because DOL’s performance measurement policies provide limited information on data reliability procedures. DOL officials stated that they have conducted webinar training on the data validation tool, but acknowledge that no written policy exits for the data validation process. Without guidance from DOL on the quality control processes that should be applied to performance data, service providers may not understand how to improve data quality and DOL may not have reasonable assurance that these performance data are the most accurate and reliable available. While VA’s measures reflected all the selected attributes of successful performance measures, including communicating linkage, we identified other areas where communication about these measures is not clear. For example, staff from three of the VAMCs we interviewed and two service providers described communication issues related to performance measures for four programs (HUD-VASH, GPD, HVCES, and DCHV). These issues included concerns that VA does not understand the realities on the ground that prevent VAMC staff and service providers from meeting the measures (such as limited housing availability) and VAMC staff being unaware they could use performance scorecards to drill down and learn more about why their performance targets were not met. Additionally, some VAMC staff and service providers we interviewed do not fully understand the measures. For example, DCHV and HCHV staff we interviewed from four VAMCs and three GPD service providers told us they have felt penalized for transitioning veterans from a VA homeless assistance program to another program or to substance abuse or mental health treatment because VA’s performance measures count these transitions as “negative exits.” According to VA officials, however, there are only three instances where participant program exits are counted as negative: 1) when participants are asked to leave for failure to follow rules; 2) when participants leave for failure to comply with program requirements; and 3) when participants leave without telling program staff. VA officials told us they have implemented processes to obtain quarterly feedback from VAMCs and service providers—through operation or actions plans—about the measures, including feedback about not meeting performance targets. However, HUD-VASH staff from one VAMC said that they have reported their concerns about not having information on how to improve performance to VA leadership and GPD staff from another VAMC and two GPD service providers said they have reported their concerns about how negative exits are measured, but the concerns have not been addressed. Additionally, staff from another VAMC were unaware that VA had a way for them to provide formal feedback about the performance measures, suggesting that VA’s feedback process and avenues of communication may lack clarity. We previously reported that improving the communication of performance information among staff and stakeholders can enhance or facilitate the use of performance information by agency managers. Performance information can be used to identify gaps in performance, improve organizational processes, and improve performance. Clearer communication by VA’s Homeless Programs Office about performance measurement—what performance measures capture and how to obtain and provide feedback—would help VAMCs and service providers better understand how their program data are used to measure performance and therefore how to improve performance, which could also help VA better assess program outcomes. VA, HUD, and DOL published some annual reports during the last five fiscal years that monitored the performance of some of the selected homelessness assistance programs for veterans we reviewed. In addition, they conducted a limited number of evaluations to assess their overall effectiveness or impact and conducted other studies that examined other aspects of the programs, such as characteristics of program participants. Program evaluations are systematic studies that use research methods to address specific questions about program performance. We identified two program evaluations conducted by or on behalf of HUD and VA that assessed the impact of HUD-VASH. Published in 2016, the Family Options study examined how the effects of three types of programs—permanent housing subsidies (such as HUD-VASH vouchers), community-based rapid rehousing, and project-based transitional housing—compared with one another and with the usual care available to homeless families. Findings from the Family Options study indicated that giving people experiencing homelessness priority access to deep permanent housing subsidies, such as housing choice vouchers, benefitted program participants by improving housing stability. However, as discussed in the study, heads of households that received permanent housing subsidies experienced a reduction in employment in comparison to participants in other programs. The permanent housing subsidy also cost more than the other programs. The second study was the HUD-VASH Exit study. Published in 2017, the study was part of an effort to improve program effectiveness. It assessed how and why veterans exit the HUD-VASH program, identified obstacles to their obtaining and maintaining housing with a HUD-VASH voucher, described the value of services, and identified barriers to successful collaboration between VA and HUD in administration of the program. Among other things, the study found that the program was successful, as demonstrated by high rates of retention in housing, and that relationships with community partners and the ability to connect veterans to community resources contributed to successful outcomes. While the several other studies and reports we identified did not assess the impact of programs, some did analyze program performance or outcomes (for example, the agencies’ annual performance plans and reports), and others assessed specific aspects of the programs (for example, factors associated with exiting homelessness programs and characteristics of program participants). VA officials noted that resource limitations constrain their ability to conduct impact evaluations. However, they stated that in the future, they plan to evaluate new programs and models, such as the SSVF’s rapid resolution program (discussed previously). DOL officials told us they have commissioned an impact evaluation for HVRP, which is scheduled to be completed in 2022. The study is assessing the effectiveness of the HVRP program on improving homeless veterans’ employment outcomes and will build knowledge about program models including variations. We found that HUD and DOL have developed plans outlining the evaluations they plan to conduct and the steps they used to create their plans, but VA did not. VA’s National Center on Homelessness Among Veterans, which conducts research and assesses the effectiveness of VA’s homelessness programs, has an evaluation agenda listed on its website that describes the Center’s planned studies, but not the steps taken to develop the agenda and prioritize what studies to conduct. HUD and DOL have also developed policies describing the steps the agencies take to ensure evaluation quality and rigor. VA’s National Center on Homelessness Among Veterans, on the other hand, does not have written policies on evaluation quality. VA officials told us they ensure the quality and rigor of the Center’s work by submitting study results for publication through a peer-reviewed standard scientific protocol, consistent with other VA research, but had not yet developed formal written policies as their processes are well known in the Center. However, the Foundations for Evidence-Based Policymaking Act of 2018—enacted in January 2019—will now require VA and other agencies to, among other things, designate an evaluation officer who is to establish and implement an agency evaluation policy and assess the coverage, quality, methods, consistency, effectiveness, independence, and balance of the portfolio of evaluations, policy research, and ongoing evaluation activities of the agency. The Act requires agencies to develop written annual evaluation plans—that discuss steps taken to develop the plan such as how studies were prioritized—to be submitted with their annual performance plan. In June and July 2019, the Office of Management and Budget released its initial guidance on implementing the Act, and additional guidance is forthcoming. The Act also includes provisions for GAO to conduct studies to review agency implementation efforts. VA, HUD, and USICH have taken significant steps to ensure effective collaboration between the agencies and among local service providers when addressing veteran homelessness. However, VA can help local agency staff and service providers better collaborate by fully incorporating leading practices for interagency collaboration. More specific and accessible information on how to collaborate with partners through Coordinated Entry, including on key activities such as making referrals and sharing data, could position local VA staff and service providers to better aid homeless veterans with services at the local level. Opportunities also exist for the agencies to improve some performance measurement procedures. Documenting its data quality processes can help give DOL reasonable assurance that these performance data are the most accurate and reliable available. Additionally, providing clearer communication about performance measurement—what the performance measures capture and how to obtain and provide feedback—can help VA ensure that VAMCs and service providers have a better understanding of how their program data are used in measuring performance (and how to improve performance), which may also help VA better assess program outcomes. We are making a total of three recommendations, two to VA and one to DOL. Specifically: VA’s Under Secretary for Health should provide additional information, such as best practices, about how VA medical centers and service providers participating in Coordinated Entry can collaborate with local partners on key activities (for example, making referrals and sharing data) and ensure that this information and other resources are accessible to VA medical center staff and service providers. (Recommendation 1) The Assistant Secretary for DOL’s Veterans’ Employment and Training Service should document its data quality validation processes for performance data for the Homeless Veterans’ Reintegration Program and disseminate these processes to service providers. (Recommendation 2) VA’s Under Secretary for Health should clearly communicate with local VA staff and service providers about how it measures performance and how to obtain and provide feedback about performance measures. (Recommendation 3) We provided a draft of this report to DOL, HUD, USICH and VA for review and comment. DOL and VA provided written comments, which are reproduced in appendixes III and IV, respectively. HUD and VA provided technical comments, which we incorporated as appropriate. A USICH official stated that USICH did not have concerns with the proposed recommendations and had no additional comments on the draft. In its comments, DOL neither agreed nor disagreed with our recommendation that it document and disseminate its data quality validation processes for performance data for HVRP (Recommendation 2). DOL stated that it agreed with the importance of data quality validation processes and noted that it uses a data validation tool (discussed earlier in our report). In addition, DOL provided new information in its comments on the draft report, stating that the agency released a user manual and training video for field staff and grantees on the validation tool and provided a hyperlink to additional information, including the user manual. While the user manual outlines the steps for downloading the validation tool and how to run validation tests, it does not describe what validation tests are run or the data quality reviews that DOL officials told us occurred at the regional and national level, as discussed earlier in our report. Therefore, we maintain our recommendation that DOL document all of its data quality validation processes for HVRP performance data and disseminate them to service providers to give the agency reasonable assurance that its performance data are the most accurate and reliable available. VA agreed with our recommendations in its written comments (Recommendations 1 and 3) and outlined actions it plans to take to address them, including: Providing additional information, such as successful strategies, about how VAMCs and service providers participating in Coordinated Entry can collaborate with local partners on key activities and enhancing communication through monthly calls on Coordinated Entry collaboration, including case conferencing, streamlined referral processes, and data sharing that will be recorded and accessible any time by staff. Clearly communicating with local VA staff and service providers about how it measures performance and how to obtain and provide feedback about performance measures. VA’s target completion date for these actions is May 2021. In addition, the draft report we originally sent the agencies included recommendations to VA, HUD, and USICH to revise their SVHO working group charter. However, the agencies informed GAO that they had issued a revised charter in late March and VA and HUD provided a copy of the final charter. Based on our review of the charter, we revised our discussion of the charter in the report and removed the recommendations. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Veterans Affairs, the Secretary of the Department of Housing and Urban Development, the Secretary of the Department of Labor, the Executive Director of the U.S. Interagency Council on Homelessness, and other interested parties. In addition, this report will be available at no charge on GAO’s website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report focuses on federal programs that provide services to veterans that are experiencing homelessness or are at risk of being homeless and their dependents. Our report (1) describes the challenges agencies and service providers reported experiencing in implementing selected programs that assist homeless veterans; (2) assesses the extent, if any, of overlap and duplication among programs; (3) evaluates how well federal agencies collaborate to address veteran homelessness; and (4) reviews what is known about the performance of selected programs. We identified a total of 16 programs that specifically target homeless veterans by reviewing agency reports, guidance, and other documentation and past GAO and Congressional Research Service reports. From these 16 programs, we selected 7 that we focused on for our first objective on program challenges and our fourth objective on program performance: Housing and Urban Development-Veterans Affairs Supportive Housing (HUD-VASH); Grant and Per Diem (GPD); Supportive Services for Veteran Families (SSVF); Health Care for Homeless Veterans (HCHV); Domiciliary Care for Homeless Veterans (DCHV); Homeless Veteran Community Employment Services (HVCES); and the Homeless Veterans’ Reintegration Program (HVRP). We selected these programs based on size (largest programs based on funding and the number of veterans served) and services offered (a mix of programs addressing a variety of needs). The results of our review of these programs are not generalizable. For all objectives, we selected and interviewed representatives from the following national advocacy organizations for homeless veterans and other knowledgeable groups to obtain subject matter context: the National Alliance to End Homelessness; the National Coalition for the Homeless; the National Coalition for Homeless Veterans; and American Legion. We judgmentally selected these groups based on their knowledge about homeless veteran policy issues, their ability to share perspectives on a variety of homeless veterans’ subpopulations, and their knowledge about federal homelessness grants. We also interviewed officials from the Department of Veterans Affairs (VA), Department of Housing and Urban Development (HUD), Department of Labor (DOL), and the U.S. Interagency Council on Homelessness (USICH). Additionally, we conducted semi-structured interviews with staff from local VA medical centers (VAMCs) and service providers implementing the selected programs we reviewed; public housing agencies (PHAs) that administer HUD-VASH vouchers; and Continuum of Care (CoC) entities across different locations. Specifically, we interviewed staff from six VAMCs (staff for the HUD-VASH, GPD, SSVF, HCHV, HVCES, and DCHV programs); six CoC entities; six PHAs; and 23 service providers (eight GPD providers, seven SSVF providers, two HVRP providers, two providers that were HVRP, SSVF, and GPD grantees, two providers that were HVRP and GPD grantees, and two providers that were HVRP and SSVF grantees). The results of these interviews are not generalizable. The locations where we conducted these interviews were: Atlanta, Georgia; Kansas City, Missouri; Long Island, New York; Los Angeles, California; Helena, Bozeman, Fort Harrison, and Box Elder, Montana; and Seattle, Washington. We judgmentally selected this sample of sites based on several factors. To select those locations, we started with the 67 communities that were designated as Priority 1 communities by VA in 2015. We then judgmentally selected six of those communities based on the following factors: (1) to reflect a mix of communities with high concentrations of homeless veterans and communities certified as having ended veteran homelessness; (2) to reflect geographic diversity (a mix of urban, suburban, and rural locations); (3) proximity of CoCs and VAMCs (to ensure we could interview both local VAMC staff and service providers); and (4) the presence of our selected programs (to cover as many programs as possible). To identify challenges agencies and service providers reported experiencing in implementing selected programs, we interviewed agency officials, VAMCs, service providers, and PHAs. Specifically, we first asked them a general question about what challenges they face. We then analyzed their responses to develop a list of challenges. A second analyst then verified the steps taken to develop the list of challenges. We also reviewed agency reports, program documentation, and available information on trends on homeless veterans and the general homeless population. To determine the extent of duplication or overlap across programs, we reviewed agency guidance, program descriptions, and other documentation to obtain information on program services and beneficiaries for the 16 veteran homelessness programs we identified, using the process we described above. We then applied GAO guidance on duplication and overlap by comparing the programs using the following definitions: duplication occurs when two or more programs provide the same services to the same beneficiaries; overlap occurs when two or more programs offer similar services to similar beneficiaries. To identify potential benefits and challenges of overlap, we reviewed past GAO reports, and conducted interviews, as outlined above. To assess how federal agencies collaborate to address veteran homelessness, we first identified two collaborative mechanisms—the Solving Veterans Homeless as One (SVHO) working group and VA’s integration into Coordinated Entry—by reviewing agency reports, guidance, and other documentation and interviewing agency officials. We then assessed the collaborative efforts against leading interagency collaboration practices identified in prior GAO work. Specifically, we assessed the extent to which the SVHO working group and VA integration into Coordinated Entry used each leading practice using three categories. “Fully follows” indicates that actions related to a practice reflected most or all of the issues to consider related to the practice; “partially follows” indicates that actions related to a practice reflect some, but not all, the issues to consider related to the practice; and “does not follow” indicates that there have been no actions taken related to the issues to consider for the practice. One analyst reviewed the reports, guidance, and other agency documentation related to the collaborative efforts and made the initial assessment. A second analyst then reviewed this information to make their own determination about the assessment and reach consensus with the first analyst. To determine what is known about the performance of the selected programs we reviewed, we analyzed national performance data for fiscal years 2015 to 2019 from VA and DOL. To assess the reliability of those data, we reviewed the data for obvious errors or inaccuracies by comparing the data to publicly available data from VA’s and DOL’s annual performance reports (to the extent the data were published). We also interviewed VA and DOL officials with knowledge of the systems and methods used to produce these data. We determined that the data we included in the report were sufficiently reliable for purposes of describing program performance for the selected programs we reviewed. To assess if the performance measures the agencies used are effective in monitoring progress, we reviewed VA’s and DOL’s performance measurement guidance. We then compared the measures against selected leading practices we identified in past GAO work. Specifically, our prior work identified ten key attributes for successful performance measures. Measures that include these attributes are effective in monitoring progress and determining how well programs are achieving their goals. We selected six attributes relevant to our analysis. We excluded the remaining four attributes because they are used to assess agency-wide performance and therefore were not applicable to our program-specific analysis. We assessed the performance measures as “fully reflects” if all the performance measures for the selected programs reflected most or all of the definition of the relevant key attribute; “partially reflects” if the measures reflected some, but not all, of the definition of the relevant key attribute; and “does not reflect” if the measures did not reflect the definition of the relevant key attribute. One analyst reviewed the performance measures and guidance and made the initial assessment. A second analyst then reviewed this information to make their own determination about the assessment and reach consensus with the first analyst. To determine the extent to which VA, HUD, and DOL had evaluated selected programs, we conducted a literature search for studies conducted during the last five fiscal years. We also obtained program evaluations from VA, HUD, and DOL. Additionally, we reviewed the agencies’ evaluation policies and interviewed agency officials to obtain additional information about the agencies’ program evaluation efforts. We conducted this performance audit from January 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We identified 16 federal programs that target their services specifically to veterans who are homeless or are at risk of becoming homeless. These programs are funded through the Departments of Veterans Affairs (VA), Housing and Urban Development (HUD) and Labor (DOL). As shown in table 6, the programs provide permanent and transitional housing, health care, rehabilitation, employment assistance, and supportive services, such as assistance with rent, utility, or moving costs. Eligibility requirements vary by program. VA’s Grant and Per Diem (GPD) program awards grants to community- based agencies for transitional housing and case management for homeless veterans. In 2017, VA implemented changes to the program and, as seen in table 7, the program now has six housing models. Each model targets a different population of homeless veterans or focuses on different areas of service. Some VA medical centers (VAMCs), service providers, and public housing agencies (PHAs) we interviewed told us the homelessness programs for veterans we reviewed are working well. Others identified additional challenges that were specific to individual selected programs we reviewed, in particular the GPD program that underwent recent changes. For example, with respect to GPD’s new models, four service providers and staff from three VAMCs told us that the housing models and program guidelines are too restrictive and complex, which hinder the delivery of services. Staff from another VAMC told us that the new housing models are based on best practices but the implementation is challenging. For example, one of these models, Bridge Housing, generally limits the length of stay to 90 days which GPD staff from one VAMC and one provider told us is not enough time to meet the needs of some clients. However, VA officials said that veterans are not asked to leave Bridge Housing after 90 days if the housing plan has not been executed by this time. According to VA officials, GPD grantees can provide transitional housing and services to family members of a veteran, however, the program can only pay per diem for veterans, not their families. In addition, two GPD service providers told us that the bed reimbursement rate is inadequate to cover the cost of providing services to veterans, and GPD staff at one VAMC told us that the existing funding does not cover the full cost of the program. Despite these cited challenges, our review of national performance data shows that VA is generally meeting the performance targets for these six models. Finally, GPD staff at one VAMC told us that there is a shortage of shelters and beds in some areas, and as a result, they cannot accommodate all the homeless veterans that are referred to them. In addition to the contact named above, Allison Abrams (Assistant Director), Erika Navarro (Analyst in Charge), Kimberly Bohnet, Emily Bond, Evelyn Calderon, Lilia Chaidez, Jill Lacey, and Jessica Sandler made key contributions to this report. Also contributing to this report were Ryan Cirillo, Ben Licht, Marc Molino, Sarah Veale, James Whitcomb, and Michael Zose.", "summary": "Despite a large decline over the past decade, an estimated 37,000 veterans in the United States experienced homelessness in 2019. GAO was asked to review federal assistance programs for homeless veterans. Among other objectives, this report (1) discusses challenges agencies and service providers cited in implementing selected programs; (2) evaluates how USICH, VA, and HUD collaborate; and (3) reviews selected programs' performance. GAO analyzed federal guidance and performance data; interviewed VA, DOL, HUD and USICH officials; and met with local VA staff and service providers from selected programs at six sites. Programs were selected based on size (the largest based on funding and veterans served) and the kinds of services they offer; sites were selected for geographic diversity, among other factors. The results of these interviews are not generalizable. The Departments of Veterans Affairs (VA), Housing and Urban Development (HUD), and Labor (DOL) provide programs aimed at assisting homeless veterans. Local VA staff and service providers—who receive grants from federal agencies—provide services to homeless veterans within their communities. In interviews with GAO, they cited challenges in implementing selected programs: Staffing shortages. Shortages in VA case managers may limit the number of veterans they are able to serve. Housing cost and availability. High housing costs and limited stock make it difficult to find affordable housing for homeless veterans. Transportation limitations . Service providers may cover large geographic areas and limited public transportation strains their ability to provide services. Steps that VA and other agencies are taking to address these challenges include contracting out for services to address limited staffing, offering rental subsidies for very low-income veterans, and working with community partners to assist with transportation. Two key federal collaboration mechanisms to address veteran homelessness are a U.S. Interagency Council on Homelessness (USICH) working group to coordinate agencies at the national level and a HUD initiative that coordinates stakeholders at the local level. Both efforts incorporate many leading practices for effective interagency collaboration identified by GAO in prior work. However, local VA staff and service providers stated that they would like additional information—such as on best practices—from VA on how to collaborate more effectively at the local level. While VA has issued some broad guidance, more specific information on effective collaboration on issues such as making referrals and data sharing could better position local VA staff and service providers to aid homeless veterans. VA and DOL have multiple measures in place to assess the performance of the programs GAO selected for review, and most of the measures met their national targets from 2015 to 2019. The measures incorporated most leading practices for performance measurement—such as having measureable targets. However, DOL does not have a written policy on its process for validating its performance data, and as a result may not have reasonable assurance that these are the most accurate and reliable performance data available. Further, some local VA staff and service providers misunderstood how program data were used in assessing performance while others were unaware of VA's feedback processes on performance measures. Additional clarity and communication about VA's performance measures would help local VA staff and service providers better understand how program data are used to measure—and can be used to improve—performance. GAO is making three recommendations: VA should provide additional information on how local providers can collaborate; DOL should document data quality validation processes for its homeless veterans program; and VA should clearly communicate with local VA staff and providers about how it measures performance and how to obtain and provide feedback. VA agreed with the recommendations. DOL neither agreed nor disagreed. GAO maintains that DOL should document its data quality processes, as discussed in the report.", "document_type": "gao"}
{"report": "In the early 2000s, the Navy conceived of a new small surface combatant concept known as LCS. This ship was intended to offer the Navy an affordable, flexible platform that would be able to swap out surface warfare, anti-submarine warfare, or mine countermeasure mission packages to provide for one of those mission needs. As we found in multiple reports, the Navy’s vision for LCS evolved significantly over time in response to diminished capability expectations and significant cost and schedule growth. In 2014, the Secretary of Defense directed the Navy to evaluate alternatives to LCS, citing survivability and lethality concerns. This represented the beginning of the Navy’s pursuit of a solution to address LCS shortcomings and the evolving threat environment acknowledged by the department. The Navy initially envisioned quickly fielding a frigate—referred to as the FF program—based on a minor modified LCS design. The ship was expected to provide a more lethal and survivable multi-mission ship capable of simultaneous surface and anti-submarine warfare, with a planned contract award for the lead ship in 2018. In 2016, we found that the Navy’s planned upgrades for FF did not significantly improve certain survivability areas and lacked capabilities that were prioritized by fleet operators, such as the ship’s range of travel without refueling. Then, in April 2017 we found the Navy’s aggressive FF acquisition schedule increased risk to the government because it included a commitment to buy ships in advance of adequate knowledge. In May 2017, the Navy announced it was revising its frigate plans and began pursuing FFG(X). In 2009, we identified commercial shipbuilding best practices that could be adapted for use by the Navy. We found that successful shipbuilding programs have sound business cases built on attaining critical levels of knowledge at key points in the shipbuilding process before significant investments are made, as shown in figure 1. Regardless of the differences between Navy and commercial shipbuilding, knowledge attainment is crucial to success. Executable business cases use realistic cost and schedule targets to meet performance and quality expectations by balancing inherent uncertainties in acquisition programs. A solid business case provides for the resources necessary to mitigate challenges, such as immature technologies and design requirements. The greater the potential for challenges to occur, the more time and money should be factored into the business case to address them. The Navy has previously agreed, in principle, that knowledge should be attained prior to key milestones to better ensure ships are built to established cost, schedule, quality, and performance standards. In general, the Department of Defense (DOD) acquires new weapon systems, such as Navy surface combatants, through a management process known as the Defense Acquisition System. Under this system, programs typically complete a series of milestone reviews and other key decision points that authorize entry into a new acquisition phase. To execute shipbuilding acquisition programs, the Navy uses the acquisition processes included in the DOD Instruction 5000 series, as well as acquisition instructions established by the Secretary of the Navy. The Navy’s guidance supports a seven-gate review process intended to ensure that requirements align with acquisition plans, and to improve collaboration among stakeholders. Figure 2 provides an overview of the notional framework for Navy shipbuilding acquisition programs described by the DOD and Navy guidance. This acquisition framework includes decision reviews and milestones at key junctures in the acquisition cycle. The Milestone Decision Authority is the individual responsible for determining what events and documentation requirements will apply to an acquisition program, as well as providing approval for a program to proceed to the next acquisition phase. The acquisition framework and Milestone Decision Authority’s purpose is to support careful assessment of a program’s readiness to proceed to the next stage of acquisition activities. The gates and milestones that will be included in an acquisition program’s schedule can be customized based on its circumstances and needs. We have previously found that shipbuilding programs typically have different decision points than other DOD weapon systems. For example, Milestone B for ship programs usually occurs after development of ship specifications and system diagrams is well under way and is typically aligned with the decision to authorize the start of detail design. While Milestone C generally represents the decision to start production for weapon systems, several of the Navy’s more recent shipbuilding programs either do not include a Milestone C review or changed the sequencing of the review to occur after delivery of the lead ship. Programs can receive approval to tailor the requirements for information that must be developed to support this process and to have the decision- making authority delegated to other individuals for acquisition decisions and approvals. The Navy expects that its current plans for FFG(X) will result in a small surface combatant with considerable capability improvements compared to LCS. To achieve this increased capability, the Navy is committing to construct a larger, more expensive ship than LCS. To help refine FFG(X) requirements and identify opportunities for cost savings, the Navy used a conceptual design phase, in which it awarded $75 million in contracts to industry. The Navy’s FFG(X) requirements represent the department’s recognition of its need for a more capable small surface combatant and the limitations of LCS. For LCS and its mission packages, the Navy has devoted nearly $28 billion (constant fiscal year 2018 dollars) to develop and buy a ship that has fallen far short of demonstrating it can meet the minimum level of capability defined at the beginning of the program. Specifically, LCS was designed with reduced survivability requirements as compared to other surface combatants. Over time the Navy lowered several survivability and lethality requirements further and removed some design features— making the ships less survivable in their expected threat environments and less lethal than initially planned. As shown in figure 3, the Navy arrived at its FFG(X) plans after spending several years developing and evaluating a variety of inputs to address problems with LCS and emerging capability needs. The Small Surface Combatant Task Force study report maintained the Navy’s need for 52 small surface combatants, which was revalidated in the Navy’s 2016 Force Structure Assessment. In recognition of LCS’s shortcomings, the Navy significantly reduced the total number of LCS, and began planning for the new frigate based on minor modifications to an LCS design—referred to as FF—to fulfill the 52-ship need. While the FF program was developing its acquisition plans and moving toward a contract award for the lead ship scheduled for 2018, the maritime operating environments continued to rapidly evolve, becoming increasingly complex and contested. In recognition of this, the Chief of Naval Operations directed the Navy to conduct another study, increasing air defense and survivability beyond the FF baseline. In response, the Navy convened a Frigate Requirements Evaluation Team from January to June 2017. The purpose of this team was to build upon FF requirements by analyzing options for air defense and vulnerability upgrades to help determine top-level mission requirements that would yield a more capable frigate. The results of this review led the Navy to cancel its FF acquisition plans and focus on meeting increased requirements through a new FFG(X) Guided Missile Frigate program. Both the FF and FFG(X) requirements reflect the 2015 Small Surface Combatant Task Force report findings that identified a need for increased capabilities for small surface combatants to address evolving threats. As we reported in June 2016, an FF based on a minor modified LCS only partially fulfilled the small surface combatant capabilities that the task force identified as most valued by the fleet. In particular, FF requirements supported a multi-mission ship with some of the fleet’s highest priority mission capabilities, such as surface and anti-submarine warfare, but did not provide air warfare capability. For FFG(X), the Navy maintained the FF requirements and added local air defense as a capability. Table 1 outlines the requirements evolution that the Navy undertook to support a more lethal and capable small surface combatant. To achieve the increased capability expectations for FFG(X), the Navy committed to acquiring a larger, more expensive ship than LCS or the previously planned FF. Figure 4 provides average shipbuilding cost estimates for the three different ships, with costs shown in same-year dollars for comparison. Although the FFG(X) requirements have been finalized, the Navy plans to make final cost and capability tradeoffs through the process of evaluating proposed designs before selecting which one will be built. In an effort to focus on the relationship between requirements and cost, the Navy undertook a conceptual design phase for FFG(X), which enabled industry to inform requirements and identify opportunities for cost savings. In February 2018, the Navy competitively-awarded FFG(X) conceptual design contracts valued at nearly $15 million each to five industry teams. These 16-month contracts were intended to enable industry to mature parent ship designs—designs for FFG(X) that are based on ships have been built and demonstrated at sea—and help refine technical and operational program requirements. The purpose of the conceptual design phase has parallels with the purpose of pre-contractual negotiations in commercial shipbuilding. As we previously have reported, these pre-contractual practices minimize ship buyer risk prior to awarding construction contracts by developing the ship concept and specifications based on negotiations between the ship buyer and the shipyard. The practices include specifying the expected performance and the major equipment on the ship. As part of these activities, commercial shipbuilders and ship buyers analyze one or more ship concepts to identify areas of potential risk and either mitigate these risks or remove the risky elements from the ship before signing a contract. Figure 5 provides an overview of the industry teams and shipyards participating in the FFG(X) conceptual design. Each industry team performed ship development, ship design, workforce planning, and shipyard improvement planning, among other activities, in support of FFG(X) requirements refinement and cost reduction efforts. Industry teams updated the Navy regularly on their design progress and technical approach to fulfill requirements through monthly technical exchange meetings and two design review meetings. Navy officials stated that these meetings were intended to provide information to support the program’s Preliminary Design Review in May 2019 and mitigate risk prior to the Navy’s release of its request for proposal in June 2019 for the FFG(X) detail design and construction competition. Our prior work on shipbuilding best practices emphasizes the importance of having a full understanding of the effort needed to design and construct a ship before awarding a contract for ship construction in order to reduce cost and schedule risk. Navy and industry officials stated that the conceptual design phase facilitated dialogue and information sharing that helped ensure FFG(X) requirements were more fully understood by industry and the government. Specifically, industry officials noted that communication and activities during conceptual design improved their understanding of the impetus for specific Navy requirements, allowing industry the opportunity to get clarification on the intent of some requirements, propose less costly alternatives, and get government feedback on the proposed alternatives. It also improved their understanding of the linkages between FFG(X)’s approved capability requirements and system specifications. In particular, industry officials told us that one-on-one opportunities with the Navy aided knowledge sharing and provided them with a means to ask questions without concern that disclosing such information could jeopardize their competitive position. They emphasized that in other cases where the request for proposals process is their primary means for communicating with the Navy (as opposed to having a conceptual design phase), submitting questions about requirements or system specifications can be challenging because those inquiries are available to the public. As a consequence, contractors may opt to infer more about the intent of requirements to avoid compromising their competitive interests. The conceptual design phase included a formal cost savings effort, with the Navy seeking proposals internally and from industry participants to reduce cost through requirement and system specification refinement. To support this effort, Navy officials stated they established a Frigate Affordability Board to review potential cost reduction measures submitted by both contractors and government that responded directly to Navy requirements and specifications. Navy officials said the Board—co- chaired by the Program Executive Office for Unmanned and Small Combatants and the Naval Sea System Command’s Naval Systems Engineering Directorate, as well as the Chief of Naval Operations’ Surface Warfare Directorate—assessed the potential cost and capability trade-offs of these proposed changes to requirements, and accepted or declined them. Before going to the Board, relevant Navy subject matter experts reviewed the technical and requirements implications of cost reduction measures. The program office subsequently worked with Navy engineering and requirements officials to balance cost with capabilities. If the program office, Navy engineers, and requirements officials could not reach agreement on the appropriate cost and capability mix, then their different positions were presented to the Board. For cost reduction initiatives submitted by industry, the Navy provided feedback on the Board’s decision, and incorporated fully or partially accepted cost reduction initiatives into the FFG(X) system specifications. Navy officials said they informed all industry teams of any changes to the specifications on a monthly basis. Navy officials also stated that industry submitted about 350 cost reduction ideas, with roughly 60 percent partially or fully accepted by the Navy. They estimated $86 million in savings per ship (constant year 2018 dollars) based on changes made in response to the cost reduction measures submitted by industry or government-initiated cost savings measures influenced by engagement with industry. In an effort to accelerate the time between FFG(X) acquisition planning and the fielding of ships, the Navy streamlined the program’s acquisition approach and leveraged knowledge obtained from industry during the conceptual design phase. While the program may benefit from the streamlining efforts, the acquisition approach for FFG(X) required the Navy to submit its budget request for lead ship construction before the program had a comprehensive understanding of the potential ship designs and cost. Recent Navy policy changes have created some uncertainty for Navy cost estimation activities by altering roles and responsibilities within the Navy for completing component cost positions and independent cost assessments. As permitted by DOD and Navy policy, the Navy has streamlined the FFG(X) acquisition approach to move from planning to ship delivery and fielding quicker than in a more traditional acquisition program. The accelerated schedule reflects the Navy’s desire to field a minimum of 52 small surface combatants, which the Navy’s long-range shipbuilding plan states will be achieved by fiscal year 2034. Navy officials stated that the significant amount of knowledge that already existed to inform the program’s early activities and the use of parent designs helped enable the streamlined approach for FFG(X). For example, Navy officials cited previous efforts by the Small Surface Combatant Task Force and the Frigate Requirements Evaluation Team to determine appropriate ship requirements, as well as activities performed in support of the FF frigate acquisition plan that immediately preceded the shift to FFG(X). The Navy also leveraged industry input received from a request for information in 2017 to understand cost drivers and the potential shipbuilders’ abilities to meet top level FFG(X) requirements and incorporate Navy-defined equipment into ship designs. Figure 6 provides a high-level schedule of key activities for the program. To support its decision to pursue an accelerated acquisition schedule, the Navy used the previously discussed conceptual design phase as well as its decisions to limit FFG(X) to parent ship designs and minimize technology development. Navy officials noted the use of parent designs is allowing the program to proceed at a much faster pace from early assessment of capability options to detail design and construction contract award. They added that the parent designs provided a higher- fidelity design baseline from which the conceptual design industry teams incorporated Navy systems and other requirements. Use of parent designs is consistent with our best practices work in shipbuilding, which has found that commercial shipbuilders use previous ship designs to the extent possible. Doing so can reduce technical, schedule, and cost risk in building a ship as compared to a “clean sheet” new ship design. FFG(X) program officials noted the latter approach can take up to 9 years to complete an analysis of alternatives and move through the acquisition process to construction contract award. Navy officials said the program also used opportunities available as an Acquisition Category (ACAT) 1B program to shorten the approval timeline for specific acquisition requirements. For an ACAT 1B program, the head of the DOD component is generally the Milestone Decision Authority but, as appropriate, may delegate approval authorities to lower level offices under its jurisdiction. In the case of FFG(X), the Assistant Secretary for the Navy for Research, Development, and Acquisition serving as the Milestone Decision Authority delegated specific approval authorities to the Program Executive Office for Unmanned and Small Combatants. These approval authorities applied to the program’s life cycle sustainment plan, independent logistics assessment, program protection plan, and a compliance schedule addressing environmental considerations. The Navy also took advantage of opportunities to alter or waive some significant early acquisition activities. For example, the Milestone Decision Authority waived the formal Analysis of Alternatives and Affordability Analysis, decided not to conduct a Milestone A review, and deferred the full “Should-Cost” Analysis to later in the acquisition process. Table 2 defines the purpose of these DOD acquisition program elements and provides an overview of the Navy’s actions related to them. As the first major milestone for many major acquisition programs, Milestone A is a review by the Milestone Decision Authority of key program documents that support the materiel solution and risk reduction. We have previously found that DOD officials place a high value on the information developed for some of these documents, including the Analysis of Alternatives, Affordability Analysis, and Should-Cost Analysis. The Navy’s decision to not conduct a Milestone A review also eliminated a formal opportunity to bring the broad set of FFG(X) stakeholders within the Navy and the Office of the Secretary of Defense together at a relatively early stage to assess the program’s acquisition strategy and affordability and feasibility, as well as technical, cost, and schedule risks. Further, it reduced the FFG(X) acquisition approach to a single milestone decision point—Milestone B—for the broader group of DOD stakeholders to evaluate program progress and readiness to proceed to the detail design and construction contract award planned in July 2020. In the absence of Milestone A, the Navy’s Gate 3 review for FFG(X) provided an opportunity to communicate the program’s progress toward developing requirements and acquisition expectations, albeit to a more limited audience than typically would participate in a Milestone A. In particular, the Navy used Gate 3 to discuss top-level requirements changes and receive capability development document approval from the Chief of Naval Operations. It also included cost discussion related to FFG(X) affordability within the overall Navy shipbuilding portfolio. The gate’s participants included officials from the Navy and the Office of Cost Assessment and Program Evaluation (CAPE) within the Office of the Secretary of Defense. The Navy’s Gate 4 conducted in February 2019 focused on a review of the FFG(X) system specification before the draft detail design and construction request for proposal release. Gate 4 documentation for FFG(X) indicates that participants were limited to stakeholders from the office of the Deputy Assistant Secretary of the Navy for Ships; Naval Sea Systems Command Cost and Design Directorates; Program Executive Office for Unmanned and Small Combatants; the FFG(X) program office; and the Chief of Naval Operations Surface Warfare Directorate. This excludes a number of key stakeholders that Navy guidance calls on to attend and certify gate reviews, such as the Assistant Secretary of the Navy (Financial Management and Comptroller) and the testing community. As a result, the Navy would not have received insight from several key stakeholders during the Gate 4 review for acquisition activities, such as the program life cycle cost estimate development and release of the draft request for proposal. These activities are generally relevant to this gate review, as Navy guidance notes program affordability as a focus and the Navy’s streamlining documentation indicates that the gate was focused on reviewing the FFG(X) system specification before releasing the draft request for proposal. Navy officials noted that stakeholders have regularly received insight into FFG(X) activities through other prior program reviews and will have additional opportunities to review program costs and sustainment plans leading up to Milestone B. We also found that some key stakeholders did not provide formal approval for the initial FFG(X) life cycle sustainment plan that was approved in March 2019. Specifically, only FFG(X) program officials and the Program Executive Officer for Unmanned and Small Combatants— the delegated approval authority—signed the plan. However, as stated in DOD guidance, representatives from the relevant sustainment command and the Program Executive Office for Integrated Warfare Systems are key stakeholders that should provide their signed concurrence when approving the life cycle sustainment plan. The FFG(X) life cycle sustainment plan is a key document outlining the Navy’s plans to address the program’s sustainment needs and costs, as typically around 70 percent of a weapon system program’s total cost is in the sustainment phase after procurement. Navy officials stated that the plan has been reviewed by the independent logistics assessment team members that are evaluating the FFG(X) program’s integrated product support activities, and noted that the Program Executive Office for Integrated Warfare Systems has separate life cycle sustainment plans for government furnished equipment systems included in the FFG(X) design. Navy officials also said that FFG(X) sustainment plans would be reviewed by stakeholders as part of Gate 5 and the Milestone B independent logistics assessment. The FFG(X) acquisition approach required the Navy to submit its nearly $1.3 billion budget request for lead ship construction before the program had established a comprehensive understanding of the potential ship designs and estimated cost for the program. Our shipbuilding and acquisition best practices call for resource decisions to be timed to align with the availability of requisite cost, schedule, and technical knowledge in order to inform key program decisions. Navy officials stated that they had sufficient knowledge to inform key program decisions based on cost estimation and conceptual design efforts that had previously been completed. Navy officials said this included development of an FFG(X) cost estimate by November 2018 to support a realistic budget request for the lead ship. However, at the time of the Navy’s fiscal year 2020 budget request to fund detail design and the lead ship, the Navy had not completed its component cost position, which will formalize the life cycle cost expectations for FFG(X). Further, CAPE had not completed the independent cost estimate for the program. The GAO Cost Estimating and Assessment Guide says that comparing the component cost position with an independent cost estimate to validate methodologies produce similar results reinforces the credibility of a cost estimate. In addition to key cost estimating best practices that had not been completed, the Navy had not received final design review information from the industry teams participating in the conceptual design phase before requesting lead ship funds from Congress. Figure 7 reflects the budget request timeline for the FFG(X) detail design and lead ship contract award, as well as notable cost and design-related program activities that were planned to be completed after the request. The considerable cost growth that we have previously reported is common to many shipbuilding programs, as well as challenges in deviating from shipbuilding plans once a program has begun procuring ships, emphasize the importance of having a strong understanding of program expectations to back the initial procurement decision for FFG(X). Given the timing of the Navy’s budget request for lead ship funding, Congress faces a decision on whether to authorize funding for FFG(X) detail design and lead ship based on a budget request that was not informed by key cost and design information. If Congress authorizes and appropriates FFG(X) funding as the Navy requested in March 2019, it will be critical that the Navy demonstrate the program’s acquisition program baseline reflects the results of the component cost position and independent cost estimate before awarding the detail design and construction contract. Doing so before the contract award will help ensure a more reliable acquisition program baseline upon which future costs and variances are measured and funding decisions are made. Further, it will help mitigate remaining risk that stems from the Navy not being able to account for the actual FFG(X) design and associated estimated cost for ship construction until after the planned July 2020 contract award. Specifically, as currently planned, the Navy’s budget requests for fiscal years 2020 and 2021—which are intended to fund the first 3 ships—will be made before the Navy has agreed to contract pricing for FFG(X). Navy officials stated that they have completed a robust program life cycle cost estimate. They noted that the estimate was informed by Navy modeling of a notional ship design that leveraged data received from industry during conceptual design and reflected ship design elements needed to meet program requirements Navy officials also said that, as of May 2019, some additional work remains for the cost estimate to account for training and military construction considerations, as well as address any needed changes related to the final industry design reviews for the conceptual design phase. They also said that the program life cycle cost estimate informed the Gate 4 review in February 2019, and an updated version of the estimate will provide a basis for the Navy’s efforts to establish the component cost position in October 2019. As of the issuance of this report, we have requested the program life cycle cost estimate from the Navy, including the estimate’s criteria and underlying assumptions, but have not yet received this information. Recent policy changes by the Navy related to cost analysis and estimation have created some uncertainty for Navy cost estimation activities going forward. Specifically, a March 2019 Secretary of the Navy instruction for acquisition program cost analysis shifts the Naval Center for Cost Analysis’s role and responsibilities for Navy cost estimation to the Navy’s systems commands. Previously, the Naval Center for Cost Analysis—organizationally residing completely outside of the systems command structure—would provide an independent cost assessment of the program life cycle cost estimate. The Naval Center for Cost Analysis and the acquisition program, in coordination with the relevant systems command, would discuss and adjudicate any differences between the program life cycle cost estimate and the independent cost assessment to produce the Navy’s component cost position. This independent cost assessment by the Naval Center for Cost Analysis was an important verification of the program office estimates, which were often found to be too optimistic, prior to the Navy finalizing its component cost position. The Navy’s recent changes for cost estimation and analysis may pose a risk of overly optimistic estimates carrying forward in programs. Navy officials stated that they believe Naval Sea Systems Command cost estimators can provide an independent cost estimate, as they are intended to provide technical support to acquisition programs independent of programmatic authority and report to a separate chain of command. However, as stated by the Naval Sea Systems Command, the collective mission of its organizations is to build, buy, and maintain the Navy’s ships. Based on this, we believe, as do CAPE officials with whom we spoke, that shifting independent cost assessment activities to the systems commands diminishes the Navy’s ability to independently verify a program life cycle cost estimate. As a result, the program life cycle cost estimate essentially will become the component cost position based on the lack of additional cost estimation input, such as what the Naval Center for Cost Analysis previously provided. Furthermore, CAPE officials stated that having a systems command execute cost analysis responsibilities for an acquisition program within the same system command effectively eliminates the Navy’s capacity to perform independent cost estimates for its programs based on their shared overarching mission. This position is consistent with the GAO Cost Estimating and Assessment Guide, which states that an independent cost estimate should be conducted by an organization independent of the acquisition chain of command. The Director of CAPE is required to conduct or approve independent cost estimates and cost analyses for all major defense acquisition programs. As noted by CAPE officials, CAPE has previously delegated certain cost estimation responsibilities to the Naval Center for Cost Analysis. With the recent Navy policy changes, CAPE may no longer choose to delegate independent cost estimation activities to Navy cost estimators. For FFG(X), CAPE intends to complete an independent cost estimate to verify the Navy’s component cost position. These plans include site visits and data collection from the shipyards participating in the conceptual design contracts. CAPE confirmed that the final independent cost estimate will reflect the content of the winning proposal, indicating that any FFG(X) proposals that the Navy receives from contractors not involved in the conceptual design phase will be evaluated to ensure the independent cost estimate accounts for those cost and design plans. CAPE officials also stated that their timeline for finalizing the independent cost estimate for FFG(X) is tied to when the Navy decides on the winning proposal for detail design and construction and communicates this information to CAPE. Specifically, CAPE’s final independent cost estimate will reflect only the winning FFG(X) design, so completion of the estimate will occur after the Navy informs CAPE about the FFG(X) design for which it intends to pursue a contract award. CAPE officials said that because the Navy’s decision may not be made in advance of the planned February 2020 Milestone B review for FFG(X), CAPE would likely just provide input to support the milestone and complete the independent cost estimate after that review. The Navy’s decision to pursue a parent ship design for FFG(X) was intended to reduce design uncertainty for the program. The Navy’s planned use of existing technologies for the ship’s mission and combat systems also supports reduced technical risk, though further maturation of some key systems and successful integration and testing will be critical to demonstrate the ship provides required capability within cost and schedule expectations. Adopting a parent design requirement for FFG(X) provided the conceptual design industry teams with a proven baseline ship design. This enabled them to focus on incorporating modifications to meet the Navy’s specific FFG(X) requirements rather than designing a new ship. The Navy did not set any limitations on the extent contractors could modify or deviate from the parent design. However, Navy officials stated they actively reviewed parent design modifications through contract deliverables, technical exchange meetings, and design reviews with industry teams. The design reviews included an interim report in October 2018 and a final report in May 2019 from each industry team on their design progress. FFG(X) program officials noted that the design maturity reviews provided sufficient information to support the Navy’s decision that the designs were mature enough to release the request for proposals for the detail design and construction contract award. In addition, some industry officials told us that the conceptual design work on parent designs enabled them to develop more mature and refined designs than typical for this stage of the shipbuilding acquisition process. They also noted that continuing work in response to the pending competition should move at least some design elements closer to a detail design-level of maturity, and may provide the Navy with greater confidence in the contract proposals it receives from industry. The FFG(X) program’s design concept requires the use of many existing, more mature combat and mission systems to reduce technical risk. As stated in the approved acquisition strategy for FFG(X), the program has a requirement for all integrated systems to have achieved maturity of a technology readiness level (TRL) 6 or higher. TRL 6 is defined by GAO as the capability to produce a prototype system in a production-relevant environment. Program officials confirmed that, as of May 2019, many but not all FFG(X) integrated systems were at TRL 6 or higher. For selected key systems planned for FFG(X), Navy officials stated they will have achieved TRL 7 or higher by the planned July 2020 detail design and construction contract award. Doing so would be consistent with our acquisition best practices, which include maturing new key ship technologies into actual system prototypes and demonstrating them in a realistic environment—achieving a TRL 7—before the award of the contract for lead ship design and construction. This practice helps reduce the likelihood of costly design changes later. Many of the systems planned for FFG(X) have been demonstrated and are in use on other Navy ship classes, which helps the program fulfill capability needs while avoiding developmental risks. Table 3 provides an overview of some of the key existing systems planned for the ship. In addition to the systems that have been utilized by other Navy ships, the FFG(X) program plans to incorporate some systems that are still in development, such as the Enterprise Air Surveillance Radar (EASR) and a new version of the Aegis Weapon System. Navy officials stated that EASR—a complex radar system expected to provide long-range detection and engagement of advanced threats— is critical to FFG(X)’s air and surface warfare missions. It is a scaled down version of the Navy’s Air and Missile Defense Radar that is in production and scheduled for initial integration with the Aegis combat system on a DDG 51 Flight III destroyer in fiscal year 2020. In early 2019, the Navy began testing a full-scale, single-face EASR array engineering developmental model—the full system planned for FFG(X) will have three array faces—at a land-based test site to further demonstrate its functionality. The Navy expects to complete land-based testing of the EASR engineering development model by February 2020. The Navy also plans to integrate a rotating version of EASR and a fixed-face version on other ship classes prior to integrating the radar on the lead FFG(X). The Navy’s results from planned EASR developmental testing at the land-based site will be integral to achieving a TRL 7 and reducing risk prior to the start of FFG(X) detail design. The Navy is developing a new version of the Aegis Weapon System— FFG(X)’s combat management system—to coordinate radar and weapons system interactions from threat detection to target strike. For example, the system will support the ship’s ability to employ the Naval Strike Missile for over-the-horizon offensive capability as well as a 32- cell vertical launch system to employ missiles for air defense. The Aegis Weapon System for FFG(X) will leverage the Aegis common source software that supports the combat systems found on the Navy’s DDG 51-class destroyers and CG 47-class cruisers. Navy officials noted that they anticipate at least 70 percent of the Aegis Weapon System software for FFG(X) will be common to the Aegis software used for DDG 51 Flight III ships. Rigorous testing of the Aegis Weapon System with EASR will be critical for FFG(X), as the radar and combat management system must work in concert for the ship to detect, track, and assess possible targets. Given the radar and software commonalities, the risk level for both of these FFG(X) systems should be reduced once the DDG 51 Flight III radar and Aegis system baseline, upon which the FFG(X) integrated system is based, have been demonstrated through testing on a ship beginning in 2022. Specific to the Aegis Weapon System for FFG(X), software development is expected to run from fiscal year 2022 to late fiscal year 2024. The system’s integration and testing with EASR is scheduled to occur through fiscal year 2024. While the Navy is planning to use many already mature systems on FFG(X), integration and testing of those systems will be critical to demonstrate systems fit and work together as intended on the ship. The Navy completed a technology readiness assessment in spring 2019 to identify potential technical risks, and concluded that FFG(X) does not have any critical technology elements. DOD generally defines a critical technology element as one that may pose major technological risk during development. Navy officials who completed the assessment stated that they reviewed about 150 systems as part of their activities and found none composed of new or novel technologies for which the Navy has insufficient knowledge to demonstrate maturity. The assessment noted one technology—the New Advanced Integrated Line-of-Sight Equipment System (nAILES) multi-coupler for antennas—as a watch item. The Navy would like to utilize nAILES for FFG(X), but according to Navy officials, it is not considered a critical technology because the Navy has identified alternative, proven technologies that will be used to meet the ship’s needs if nAILES is not available for use. The findings of the technology readiness assessment are consistent with the FFG(X) program’s decision to use existing systems that do not require technological innovation to deliver desired capability. However, the findings do not necessarily equate to the program having no technology risk for planned systems. For example, the Aegis Weapon System for FFG(X) did not qualify under the parameters of the technology readiness assessment as a critical technology element. Still, as already discussed, the Aegis Weapon System will carry technical risk for several years until the Navy completes development and demonstrates the system works as intended for FFG(X). The Next Generation Surface Search Radar is another system that is relatively mature—FFG(X) program officials confirmed in May 2019 it is nearing a TRL 6—but requires further development to reduce risk. The FFG(X) test and evaluation master plan and independent technical risk assessment are significant documents yet to be completed that will help to further define risks and plans to address them. The test and evaluation master plan serves to outline the program’s integrated test program and master schedule of major test events or phases. Navy officials expect the test plan to be approved in December 2019 to support the Milestone B decision. They noted that the plan may need to be updated once the FFG(X) design is selected based on the additional information that will be available to inform test planning. The independent technical risk assessment is intended to categorize risks that cover a broad range of factors, including technology maturity, integration needs, and testing. If these factors are not sufficiently accounted for, a program is likely to have difficulty meeting cost, schedule, and performance objectives. An official from the Office of the Under Secretary of Defense for Research and Engineering who is participating in the technical assessment for FFG(X) stated they plan to complete their work to identify any risks in March or April 2020. The official added that at this early stage of their activities, the potential for integration risks associated with the FFG(X) combat system is an area of interest because of the extensive number of existing systems that will need to be integrated into the new ship design. Navy test officials as well as DOD systems engineering and test officials noted potential advantages and risks related to FFG(X) program’s plans for using existing technologies. Similar to what we previously discussed about the use of a parent design, the officials stated that the use of existing systems can increase understanding of the ship and its systems, which may help the FFG(X) program achieve its planned accelerated timeline between development and delivery. However, systems engineering and test officials also indicated that, regardless of maturity, challenges typically arise when DOD takes systems from other platforms and attempts to integrate and use them in new ways on a new platform. They cautioned that programs like FFG(X) that plan to use a lot of government-furnished equipment or non-developmental systems often underestimate the amount of integration challenges they will face. The officials told us this may occur because of overconfidence that the maturity of systems demonstrated through use on other platforms eliminates most technical risk, whereas experience confirms that it is always challenging to get systems to fit and work together as intended on a new platform. Officials from the office of the Director, Operational Test and Evaluation said that the parent design approach for FFG(X) may enable the Navy to reduce some developmental testing activities; however, operational testing expectations would largely be unaffected because there will still be substantial integration to be completed and tested in order to demonstrate mission capabilities. The draft FFG(X) request for proposal indicates that the Navy plans to use a fixed-price incentive contract to help control ship costs and special performance incentive fees. In addition, the Navy plans to use guarantees with limited liability for the shipbuilder to correct defects after ship deliveries. Our prior work has found that using comprehensive ship warrantees instead of guarantees could reduce the Navy’s financial responsibility for correcting defects. After completion of a full and open competition for FFG(X) detail design and construction, the Navy plans to use a fixed-price incentive contract in combination with additional special performance incentive fees to procure the lead and follow-on ships. As we have previously reported, full and open competition allows all responsible sources—or prospective contractors that meet certain criteria—to submit proposals for a contract. The use of competition in contracting is a critical tool for achieving the best possible return on investment for taxpayers. Competitively awarded contracts can save the taxpayer money, improve contractor performance, and promote accountability for results. The fixed-price incentive contracting approach for FFG(X) is intended to incentivize the contractor to control costs and meet performance requirements. This contracting strategy represents a significant departure from previous surface combatant programs in which the Navy negotiated cost-reimbursement contracts for construction of the lead ship. Under cost-reimbursement contracts, the Navy assumes the cost risk because the shipbuilder is reimbursed for its allowable incurred costs to the extent prescribed in the contract, regardless of whether the work is performed to the exact level desired by the Navy. For example, our prior work found that the Navy’s decisions to accept the first two LCS in incomplete, deficient conditions complied with federal acceptance provisions, largely due to the cost- reimbursement type contracts in place to construct these ships. Fixed-price incentive contracts provide an incentive for the shipbuilder to control costs in order to maximize profit. Fixed-price incentive contracts generally include a profit adjustment formula referred to as a shareline, as well as a price ceiling, target cost, and target profit. The structure of the shareline establishes how cost overruns or underruns in relation to a target cost are shared between the government and shipbuilder. For example, the 70/30 shareline that the Navy is planning for FFG(X) lead ship overruns means that the government pays 70 percent of cost and the shipbuilder pays 30 percent when the cost exceeds the target cost up to the price ceiling. Generally, the shareline functions to decrease the shipbuilder’s profit as actual costs exceed the target cost. The price ceiling is generally the maximum the government will pay under the contract and is typically negotiated as a percentage of the target cost. The target cost generally informs the shareline and price ceiling. Given the unknowns associated with design and construction, the Navy plans to account for these unresolved risks by assuming responsibility for cost growth above DOD recommended guidance. As we reported in March 2017, when the Navy assumes a greater share of cost overruns above the target cost, accepts a higher price ceiling, or both, the fixed- price incentive elements may not provide sufficient motivation for the shipbuilders to control costs. Figure 8 depicts the how risk changes as the Navy departs from a 50/50 shareline for cost overruns and a ceiling price of 120 percent. As we previously noted, for the FFG(X) lead ship the Navy is planning to have a shareline of 70/30 for target cost overruns. The Navy also plans to have a 60/40 target cost overrun shareline for the second ship, and a 50/50 overrun shareline for the remaining seven ships included in the detail design and construction contract award. Based on this plan, the first two FFG(X) ships will depart from DOD’s guidance recommending a 50/50 point of departure for negotiations between the government and shipbuilder for cost overruns up to the price ceiling. This results in more cost risk to the government for two ships in the detail design and construction contract. The Navy’s planned price ceiling for the 10 ships included in the contract award may deviate from DOD’s guidance recommending a ceiling price set at 120 percent of target cost as a point of departure for fixed price incentive contracts. Specifically, Navy officials stated that the maximum ceiling price could be as high as 125 percent for all of the ships. However, Navy officials stated that the request for proposal will provide incentive for industry to propose the minimum price ceiling that sufficiently accounts for the proposal’s level of risk, meaning that industry may propose price ceilings below 125 percent. The Navy also plans to include options for a special performance incentive fee for each of the FFG(X) ships, which will be established for the final request for proposal. These incentives have the potential to increase shipbuilder profitability. As outlined in the FFG(X) draft detail design and construction request for proposal and confirmed by program officials, each frigate will have a guaranty period that commences at ship delivery and is expected to end 18 months after delivery. Navy officials stated the guaranty is intended to formalize a period of responsibility during which the shipbuilder must correct defects, with the cost to the government and the contractor based on the contract terms (cost shareline and price ceiling) associated with the ship. During the guaranty period, the shipbuilder would be required to correct all defects for which it is responsible, with proposals required to include a minimum limitation of liability of $5 million per ship. Once the total cost to correct identified defects reaches $5 million, the government would pay the full cost to correct any additional guaranty period defects. The $5 million minimum limitation of liability planned for FFG(X) has a higher dollar value and covers a longer period of time than other recent shipbuilding programs. For example, we previously found that for the Navy’s LPD 25 amphibious transport dock construction, the contract initially included a $1 million limitation of liability. Navy officials stated that the final request for proposal also will include a provision allowing industry to propose a higher liability limit, up to and including no limitation of liability. Navy officials said that any additional liability amount proposed beyond the $5 million guaranty will be assessed as part of the technical evaluation criteria used to select the winning FFG(X) design. We found in March 2016 that the use of a guaranty did not help improve cost or quality outcomes for the Navy and Coast Guard ships we reviewed. We also found that commercial ship buyers and Coast Guard officials stated that warranties foster quality performance because the shipbuilder’s profit erodes as it spends money to correct deficiencies after delivery, during the warranty period. We further reported that the Coast Guard has improved cost and quality by requiring the shipbuilder to pay to repair defects by following Federal Acquisition Regulation warranty provisions. For example, the Coast Guard paid up front for the Fast Response Cutter warranty. The cost of the warranty amounted to 41 percent of the total defect correction costs. Although this ship does not have the size and advanced systems planned for FFG(X), it serves to demonstrate the potential value to the government presented by the use of warranties. The Coast Guard also used a fixed-price incentive contract with a warranty on its Offshore Patrol Cutter—a ship of comparable size to FFG(X). The first Offshore Patrol Cutter has a 2-year warranty, and follow-on ships will have 1-year warranties. The Coast Guard pays a set amount for these warranties, and in return, the shipbuilder must fix all applicable defects identified within the agreed-upon time period regardless of cost. Rather than using guarantees for the FFG(X) contract to provide for the correction of defects, the Navy could help control costs to the government through the use of warranties. Under warranties, the government generally receives a contractual right for the correction of all defects for which the shipbuilder is responsible at the shipbuilder’s expense. The use of warranties is typically not mandatory, but federal and defense acquisition regulations instruct contracting officers to consider various factors when deciding whether a warranty is appropriate for an acquisition. The regulations also instruct contracting officers to use a warranty when it is practicable and cost-effective to do so. We previously found that, unlike a warranty, the Navy almost exclusively paid for defects that were the shipbuilder’s responsibility under a guaranty because of the contract type and terms in contracts that we reviewed. Such conditions limit the incentive to discover every deficiency during the guaranty period, and may negatively affect quality improvements over time. The Navy’s FFG(X) plans suggest that the Navy may be prematurely discounting warrantees as a mechanism to improve ship quality and decrease cost to the government. Navy officials told us that mandating that industry propose a warranty could result in additional costs to the government because the initial cost of the ship could be raised substantially to include the cost of the warranty. Additionally, Navy officials said a requirement for warranty pricing could serve to limit industry participation in the FFG(X) competition if offerors are unwilling to accept the risk associated with a warranty and unable to provide reasonable pricing. The Navy provided no analysis to support these claims and confirm a clear understanding of whether a warranty could provide greater value than the $5 million guaranty the Navy is proposing for FFG(X). As part of the competitive proposal process for FFG(X) detail design and construction, the Navy could maintain its plans to require a guaranty but also seek ship warranty pricing. The full and open competition for the FFG(X) contract award may increase the potential for receiving warranty pricing that provides a cost-effective alternative to the Navy’s guaranty plans. By limiting the request for proposal to guarantees, the Navy misses an opportunity to obtain information on what comprehensive warranty coverage against defects would cost, and use it to evaluate whether warranties could further reduce risk for the FFG(X) program. As the Navy approaches the Milestone B review for FFG(X), it is critical that funding and other major programmatic decisions are fully informed by the knowledge necessary to support them. This is especially important to help ensure that the FFG(X) program does not face some of the same cost, schedule, and performance shortfalls that have been faced by the LCS program. The Navy’s fiscal year 2020 budget request to authorize and appropriate funding for the lead frigate was developed and submitted without the benefit of key cost and design information, such as the independent cost estimate and the final results from conceptual design. As a result, it is necessary that the Navy provide Congress with a clear understanding of FFG(X) cost expectations, including CAPE’s independent cost estimate, prior to awarding the detail design and construction contract. This will help ensure that the FFG(X) program is grounded in cost and design expectations that reflect the specific aspects of the ship that the Navy selects for construction. With the start of the planned $20 billion FFG(X) procurement approaching, the Navy has limited time left to position the government to obtain the best deal possible to fix any deficiencies discovered upon delivery of the first 10 ships. The Navy’s guaranty plan for FFG(X) offers some improvements compared to recent shipbuilding programs, but does not offer the degree of coverage that could potentially be provided by a warranty. The competitive qualities of the FFG(X) acquisition approach present an opportunity for the Navy to, at a minimum, obtain warranty pricing from industry so that the program may use that input to evaluate whether a warranty would be a cost-effective means of reducing the government’s cost risk. We are making two recommendations to the Secretary of the Navy: Ensure that the Assistant Secretary of the Navy for Research, Development, and Acquisition provides to Congress the finalized independent cost estimate prior to award of the detail design and construction contract and demonstrates that the estimate is consistent with the fiscal year 2020 budget request for the lead ship. (Recommendation 1) Ensure that the Assistant Secretary of the Navy for Research, Development, and Acquisition directs the FFG(X) program office to request pricing for warranties for the lead ship and the nine follow-on ship options planned for FFG(X) as part of the detail design and construction request for proposals. (Recommendation 2) We provided a draft of this report to DOD for comment. DOD provided written comments, which have been reproduced in appendix I. In responding to the draft report, DOD concurred and described the actions it planned to take to address our two recommendations. In response to the second recommendation to request pricing for warranties for the lead ship and the nine follow-on ship options planned for FFG(X) as part of the detail design and construction request for proposals, DOD acknowledged that the Navy will receive guaranty rather than warranty pricing, but stated that the solicitation allows industry to propose a higher limitation of liability amount, up to an unlimited limitation of liability, in its guaranty pricing for FFG(X). While this could allow for a better value to the government than has been typical for recent shipbuilding programs, permitting higher limitation of liability guaranty pricing but not requesting warranty pricing from offerors means the Navy will not have complete information on whether a warranty could be more cost-effective than a guaranty. Our prior work found that the use of Federal Acquisition Regulation warranty provisions improved shipbuilding program cost and quality outcomes. As a result, we maintain our belief that the FFG(X) program office should implement this recommendation by seeking warranty pricing as part of the detail design and construction request for proposals. The full and open competition for the FFG(X) contract award may increase the potential for receiving warranty pricing that provides a cost-effective alternative to the Navy’s guaranty plans. DOD stated that modifying the solicitation to incorporate a warranty pricing component would cause an unacceptable delay to the FFG(X) program, but did not provide an analysis to support this assertion or specify the extent of delay associated with adding a warranty pricing request. The current FFG(X) schedule has roughly 10 months between the request for proposals deadline and the contract award, and the program originally had been planning for the solicitation period to end in December 2019 before moving the deadline to September 2019 shortly before its release. We recognize the substantial effort the proposal development and review process requires, but we continue to believe that the government would benefit from adding a request for warranty pricing to the detail design and construction solicitation. While DOD stated that the Navy will support the recommendation after award by requesting pricing for an unlimited warranty before exercising the first ship option, doing so would eliminate any potential warranty pricing advantages that would occur as a result of the competitive conditions that currently exist for the current detail design and construction contract. In addition to DOD’s written response to the report, DOD officials and industry representatives associated with the FFG(X) conceptual design activities provided separate technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Secretary of the Navy. This report will also be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact me at (202) 512-4841 or oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to the report are listed in appendix II. Shelby S. Oakley, (202) 512-4841 or oakleys@gao.gov. In addition to the contact named above, the following staff members made key contributions to this report: Diana Moldafsky (Assistant Director), Lori Fields, Kurt Gurka, Stephanie Gustafson, Chad Johnson, Jennifer Leotta, Sean Merrill, Miranda Riemer, Jillena Roberts, Hai Tran, and Alyssa Weir.", "summary": "In response to the shortcomings of the Navy's Littoral Combat Ship program and evolving threats, the Navy began the FFG(X) program. With FFG(X), the Navy intends to deliver a multi-mission ship that will provide anti-surface, anti-submarine, and air warfare capabilities. DOD approved FFG(X) requirements in February 2019.The Navy plans for a competitive contract award to support final FFG(X) design and construction. The program is expected to cost over $20 billion for 20 ships. The House report accompanying the National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review the FFG(X) program. This report addresses, among other things, the FFG(X) acquisition approach and contracting plans. GAO reviewed requirements, acquisition, design, and cost-related documentation. GAO interviewed Navy and other defense officials, and conducted industry site visits to each shipyard participating in FFG(X) conceptual design activities. GAO also leveraged prior GAO reports and best practices guides. The Navy undertook a conceptual design phase for the FFG(X) Guided Missile Frigate program that enabled industry to inform FFG(X) requirements, identify opportunities for cost savings, and mature different ship designs. The Navy also streamlined the FFG(X) acquisition approach in an effort to accelerate the timeline for delivering the ships to the fleet. As shown in the figure, however, the Navy has requested funding for the FFG(X) lead ship even though it has yet to complete key cost estimation activites, such as an independent cost estimate, to validate the credibility of cost expectations. Department of Defense (DOD) cost estimators told GAO the timeline for completing the independent cost estimate is uncertain. Specifically, they stated that this estimate will not be finalized until the Navy communicates to them which FFG(X) design is expected to receive the contract award. GAO-identified best practices call for requisite cost knowledge to be available to inform resource decisions and contract awards. The Navy plans to use a fixed-price incentive contract for FFG(X) detail design and construction. This is a notable departure from prior Navy surface combatant programs that used higher-risk cost-reimbursement contracts for lead ship construction. The Navy also plans to require that each ship has a minimum guaranty of $5 million to correct shipbuilder-responsible defects identified in the 18 months following ship delivery. However, Navy officials discounted the potential use of a warranty—another mechanism to address the correction of shipbuilder defects—stating that their use could negatively affect shipbuilding cost and reduce competition for the contract award. The Navy provided no analysis to support these claims and has not demonstrated why the use of warranties is not a viable option. The Navy's planned use of guarantees helps ensure the FFG(X) shipbuilder is responsible for correcting defects up to a point, but guarantees generally do not provide the same level of coverage as warranties. GAO found in March 2016 that the use of a guaranty did not help improve cost or quality outcomes for the ships reviewed. GAO also found the use of a warranty in commercial shipbuilding and certain Coast Guard ships improves cost and quality outcomes by requiring the shipbuilders to pay to repair defects. The FFG(X) request for proposal offers the Navy an opportunity to solicit pricing for a warranty to assess the cost-effectiveness of the different mechanisms to address ship defects. GAO recommends that the Navy provide Congress with the independent cost estimate for FFG(X) prior to the detail design and construction contract award and seek ship warranty cost information from industry as part of the request for proposal process. While DOD generally concurred with GAO's recommendations, it did not agree to update its request for proposal to solicit ship warranty pricing. GAO continues to believe this is an essential element of the recommendation, as discussed in the report.", "document_type": "gao"}
{"report": "The military departments have been privatizing utility systems at military installations since 1988. In 1997, Congress provided the military departments permanent statutory authority, codified at 10 U.S.C. § 2688, as amended, to convey, or privatize, utility systems under military jurisdiction, such as those on military installations. The authority defines a utility system as a system for the generation and supply of electric power; the treatment or supply of water; the collection or treatment of wastewater; and the supply of natural gas, among others. When privatizing a utility, the Secretary of a military department makes a decision to convey a system to a private or public entity, and then a utility services contract is awarded. Figure 1 shows examples of common utility systems found on military installations. A utility system includes the associated equipment, fixtures, and structures, as well as easements and rights-of-way. 10 U.S.C. § 2688 states that the Secretary of a military department may convey a utility system, or part of a system, to a municipal, private, regional, district, or cooperative utility company or other entity. DOD’s policy states that the military departments may maintain ownership of utility systems and decide not to privatize them for security reasons, or when privatization is determined to be uneconomical. According to officials, once DOD conveys a utility system and awards a contract for utility services, the contractor is responsible for replacing, repairing, and maintaining the associated equipment and structures as needed. Figure 2 provides photos of the before and after condition of a privatized utility system component at Fort Riley, Kansas where the electrical system was modernized to replace analog monitoring equipment with digital equipment. The Office of the ASD(Sustainment), within the Office of the Secretary of Defense, develops policies for and oversees DOD’s utilities privatization program. There are two main sources of DOD policy for utilities privatization—a DOD instruction on energy management at the installation level and a supplemental guidance specific to utilities privatization. During the period covered by our review, the instruction directed the military departments to attempt to privatize all utility systems, unless the Secretary of the military department determines that the system is exempt from privatization for security or economic reasons. In February 2019, DOD released supplemental guidance, which, among other things, superseded the relevant portions of the instruction (and cancelled prior supplemental guidance), and did not include a preference for privatization or the direction to complete privatization decisions on all covered utility systems. Instead, utilities privatization may now be performed at the discretion of the military departments. The military departments have the responsibility for program implementation, as the statutory authority to privatize utility systems is granted to the Secretaries of the military departments. As such, the military departments determine which systems will be privatized and which systems may be exempted from privatization. Once a military department begins to consider an installation for privatization, the installation command assists and facilitates in carrying out the privatization effort. According to officials, DLA Energy is the contracting agent for the majority of privatized utility services contracts awarded on behalf of the Army since 2004 and for the Air Force since 2008. Navy officials noted that NAVFAC is the contracting agent and administrator for the Navy and Marine Corps privatized utility services contracts. As of December 2019, the military departments have privatized roughly a quarter of the utility systems on military installations (614 of the 2,590 systems); roughly a third of the systems were already owned by entities other than the federal government (733 of 2,590) (see table 2). As reflected in the table, the military departments have identified 580 utility systems that are available for future utilities privatization. As of September 2018, DLA Energy reported that it had 18 ongoing utilities privatization efforts—12 for Army and six for Air Force. Also, the Navy noted that it has three ongoing utilities privatization efforts. According to Air Force and Navy officials, their departments took a “strategic pause” on new utilities privatization efforts in 2015 to determine if privatization is the best option for recapitalizing their deteriorating utility systems. The Navy and Air Force resumed new utilities privatization efforts in fiscal year 2017 and fiscal year 2019, respectively. DLA Energy will act as contracting agent for the Navy on a pilot basis, as well as continuing to do so for the Army and Air Force for future contract awards. The process for privatizing a utility system culminates in two actions: the award of a utility services contract and conveyance of the physical assets of the utility from the military department to the awardee. Once the military department has decided to consider privatizing a utility system at an installation, the department initiates efforts to award one or more utility services contracts. This contracting process is governed by federal statutes, the Federal Acquisition Regulation (FAR), the DOD and military department supplements to the FAR, and military department and agency guidance. For example, DOD is generally required to award utility services contracts using competitive procedures, but can award contracts through other than competitive procedures when authorized by an exception, which we refer to as non-competitive. Figure 3 depicts the five phases of the pre-award contracting process identified by GAO. Acquisition Planning: Acquisition planning includes developing requirements, preparing cost estimates, and conducting market research to determine market interest, among other activities. For utilities privatization efforts, requirements also include the inventory of equipment—such as pipes, valves, and wires—and structures associated with the utility system. For privatized utility services contracts this phase begins with the decision to consider the privatization of utilities at a given installation and generally ends with the approval of an acquisition strategy. Solicitation: Military departments may solicit offers from prospective contractors by issuing a request for proposals. The request for proposals informs the prospective contractors of the government’s requirements, the anticipated terms and conditions that will apply to the contract, the information required in a proposal, and the factors used to evaluate proposals and their relative importance. Those who wish to respond must submit their proposal to the contracting office in the time and manner stated in the request for proposals. We consider the solicitation phase to begin with solicitation issuance and end at the deadline to submit the initial proposals, although the solicitation can be amended later and proposals revised. Initial Evaluation: Proposal evaluation is an assessment of the proposals based on stated evaluation factors and the offerors’ ability to perform the prospective work successfully. For example, proposals undergo technical evaluation to determine offerors’ ability to meet the technical requirements and cost or price evaluation to determine whether the price is fair and reasonable. We consider the initial evaluation phase to begin when potential offerors submit initial proposals and end once government contracting personnel receive approval to enter into negotiations or discussions. Discussion/Negotiation: Negotiations are exchanges, in either a competitive or non-competitive environment, between the government and offerors that are undertaken with the intent of allowing the offerors to revise proposals and obtaining the best value for the government. Negotiations allow, among other things, the offerors to address any government concerns with the proposals. We consider this phase to begin when the contracting officer receives approval to enter into negotiation and end when contracting personnel receive approval to award the contract. Contract Award: We consider the contract award phase to begin when the approval to award the contract is given and to end when the contracting officer signs the contract. In utilities privatization, as a part of the contract award phase, the Secretary of the military department makes a decision to convey the utility systems after the awardee has been selected. While the utilities privatization process must comply with relevant statutes and regulations, it has certain unique attributes. According to DLA Energy and military department officials, installations must conduct a thorough inventory of the physical assets associated with the utility system (e.g., linear feet of water pipes and location, number and location of gas valves, and the number and location of lift station pumps) as well as the system’s workload data to inform the requirements document. This is due to the fact that ownership of these physical assets will convey— i.e., be legally transferred—to the contractor after contract award. Conveyance from the military installation to a regulated public sector utility, such as a municipal water and wastewater authority, requires additional approval from the state’s utility regulatory commission. Finally, privatized utility services contracts are generally long-term, up to 50 years in some cases. According to DLA Energy and military department officials, these factors affect the consideration of requirements and structure of the utilities privatization process in a way not normally found in standard contracts and can affect the time required for discussions and negotiations. The use of lessons learned is a principal component of an organizational culture committed to continuous improvement. Through lessons learned, DOD can continuously look for ways to make improvements to the utilities privatization program to shorten the time to award and enhance effectiveness and efficiency. Collecting and sharing lessons learned serve to communicate knowledge more effectively and to ensure that beneficial information is factored into planning, work processes, and activities. This process also provide a powerful method of sharing ideas for improving work processes, facility or equipment design and operation, quality, and cost-effectiveness. Leading practices of a lessons learned process identified by GAO and others include collecting, analyzing, validating, saving or archiving, and disseminating and sharing information and knowledge gained on positive and negative experiences. Figure 4 shows this process. Since 2005, we have issued four reports that assessed various aspects of DOD’s utilities privatization efforts: In May 2005, we identified several management weaknesses in DOD’s implementation of the utilities privatization program. For example, we identified a number of concerns, such as the reliability of the economic analyses associated with privatization decisions and the adequacy of contract oversight. We made eight recommendations to help ensure the reliability of economic analyses and improve the utilities privatization guidance and procedures, among other things. DOD non-concurred with seven recommendations and partially concurred with one recommendation in its response to the report; however, DOD has since implemented all but one recommendation. In September 2006, we reported that DOD’s progress in implementing the utilities privatization program had been slower than expected and management concerns remained. For example, the targeted time frame for program implementation was delayed by 6 years and concerns remained about the reliability of economic analyses used to support privatization decisions. We made seven recommendations to improve DOD’s management of utilities privatization. DOD generally concurred with and implemented six of these recommendations. In July 2015, we identified that DOD faces challenges in implementing utility resilience efforts, such as collecting and reporting comprehensive utility disruption data, and developing cybersecurity policies for its industrial control systems. We made four recommendations to clarify utility disruption reporting guidance, improve data validation steps, and address challenges to cybersecurity industrial control systems. DOD concurred or partially concurred with all but one recommendation and implemented three recommendations. In September 2018, we reported that DOD lacked guidance to develop performance metrics and implement cybersecurity requirements for privatized utility services contracts. We made two recommendations to provide guidance for development of metrics to track utilities privatization contract performance, and what constitutes covered defense information as it related to utility services contracts. DOD concurred with and implemented both recommendations. Concerns about the length of time to award contracts are not limited to utilities privatization. For example, in July 2018, we reported that although DOD proposed reducing the time it takes to award weapon systems contracts, the department has limited understanding of how long it currently took and therefore lacked a baseline to measure success. We also found that, according to contracting officials, factors such as the quality of proposals, prospective offeror responsiveness to agency request for additional information, and complexity of the technical requirements can add or reduce the time required for evaluation of proposals. We recommended that, to assess time frames for awarding contracts, DOD should develop a strategy to determine what information it should collect and how to use that information. DOD concurred and implemented the recommendation. The time to complete the utilities privatization pre-award process generally took an average of 4 years from issuing the solicitation to awarding a contract for utility services for the contracts we assessed. Utilities privatization officials acknowledged that the process is lengthy, but DOD does not maintain complete data on key steps in the process, including when the process to consider privatization of a utility system began and the time needed to conduct acquisition planning. Consequently, it is not possible to determine the entire time to complete privatization of a utility system. In addition, the time to complete a specific utilities privatization effort may be affected by a number of factors. These factors can include changes to internal or external requirements, the technical complexity of the individual effort, the continuity of personnel involved in the effort, and command support for privatization. The 21 new contracts for privatized utility services awarded from fiscal years 2016 through 2018 generally took an average of 4 years from the time the DOD component issued a solicitation to when the contract was awarded. Utilities privatization officials acknowledged that the process is lengthy. They stated that it is due, in part, to the long-term nature of the contracts—that can be up to 50 years—and the complexity of the contracts. The entire pre-award contracting process could be longer, as we found that, with the exception of the one Navy-awarded contract we reviewed, DOD does not maintain complete data for every phase of the process. The data DOD does not maintain includes key events in the acquisition planning phase, specifically, when the military departments began considering privatizing a specific utility and when the requirements packages—a complete inventory of the associated infrastructure, such as pipes, wires, and valves—were available to use in the solicitation. Table 3 presents the available information on the average time to complete the five phases of the pre-award contracting process identified by GAO for the contracts we assessed. As indicated in table 3, even after excluding the time needed to conduct acquisition planning, there is wide variation in the average time taken from when contracting officials issued the solicitation to when they awarded the privatized utility services contracts. For example, NAVFAC took more than 92 months—or more than 7 years—to award its contract to privatize the Naval Air Station Key West wastewater system. The total time required to award the contract included a 30-month period during which the privatization effort was paused to evaluate alternative paths to meet new Florida wastewater regulations. Navy officials stated that our timeline should not include the 30-month period because the pause did allow any additional work to be accomplished to prepare for contract award. After determining that privatizing the utility system remained the most effective approach, however, the Navy resumed evaluating revised proposals that had been received in response to the amended original solicitation. DLA Energy took, on average, about 45 months—or nearly 4 years—to privatize utility systems and make awards for the 19 contracts it was responsible for. In contrast, the Air National Guard awarded a non- competitive contract to privatize the wastewater system at Truax Field in Wisconsin to a local utility provider in about 6 months. However, according to Air National Guard officials, the local utility provider already maintained the infrastructure for the installation and had previously conducted an assessment of the installation wastewater system used to finalize the privatization requirements. While Air National Guard officials could not provide a date as to when they began to consider utilities privatization, they stated that they spent more than 70 months in acquisition planning before issuing the solicitation due, in part, to unfamiliarity with the utilities privatization process. While no provision of the regulations or policies governing utilities privatization that we reviewed require DOD contracting activities to collect data on the time to complete each phase of the pre-award process, since 2014, DLA Energy officials have attempted to maintain such data for all the contracts for which they were the contracting agent. However, DLA Energy did not maintain data for the completion of milestones within the acquisition planning phase carried out by the military departments. In 2014, DLA Energy officials, with input from Army and Air Force utilities privatization officials, established milestones to plan and monitor key pre- award contracting activities, including a target time to complete each milestone. DLA Energy and military department officials noted that these data help provide insight into, and accountability for, the progress made or challenges encountered during the pre-award process. However, the usefulness of these data are limited because the military departments must provide time frames for the front end of the process and have not done so. We found that a number of factors can affect the time to complete pre-award contracting activities, but for the purpose of establishing milestones to monitor these activities, DLA Energy varied the number of milestones and time frames to complete specific activities depending on whether the contract was competitively awarded and the number of proposals received. While table 3 shows the average time it took to complete pre-award phases by contracting agent for the contracts in our audit scope, figure 5 shows the milestones used by DLA Energy for competitive and non-competitive awards and the target time frames DLA Energy established for each milestone. DLA Energy officials noted that the time frames for the first three steps in the process—determining that one or more utility systems on an installation should be considered for privatization through when the military department provides DLA Energy a complete requirements package—are determined by the military departments. The military departments have not established target time frames for these activities, but have taken steps to understand factors that affect the time frames, which we discuss later in this report. DLA Energy and military department officials noted that despite the limitations in the data, this information has helped them provide better management oversight of the process. A DLA Energy official stressed that the target time frames are meant to improve contract award time frames, incentivize performance, and provide accountability, and that they do not expect every contract to meet targets due to the complex nature of utilities privatization. Nevertheless, DLA Energy and military department officials stated that implementation of the milestones helped reduce the amount of time needed to award privatized utility services contracts. Our analysis of the 18 competitive utility services contracts awarded by DLA Energy from fiscal years 2016 through 2018 indicates that the average time from receipt of requirements to contract award has decreased. For example, our analysis indicated that DLA Energy took an average of nearly 61 months from receipt of requirements to competitively award eight contracts related to solicitations issued prior to 2014. Once the milestone tracking process was initiated in 2014, our analysis indicates that DLA Energy took an average of about 35 months from receipt of requirements to competitively award 10 privatized utility services contracts (see fig. 6). Of the 10 privatized utility services contracts DLA Energy awarded since the process was initiated in 2014, two met or exceeded DLA Energy’s target time frame; six were awarded within 6 months of the target time frame; and two were awarded over a year longer than the target time frame. DLA Energy and military department officials identified several factors that, individually or collectively, could affect the time to award a privatized utility services contract. These factors include the extent to which internal or external requirements remain stable, the technical complexity of the privatization efforts, the continuity of personnel involved in the effort, and command support for privatization. Changes to Internal or External Requirements. According to a utilities privatization official we interviewed, unexpected changes to requirements may affect the time to award a utility services contract. For example, Navy officials stated that Naval Air Station Key West initiated efforts to privatize its wastewater treatment facilities in August 2007 to meet new Florida wastewater regulations by the compliance deadline of July 2010. A Navy installation official stated that they determined that they would be challenged to meet the new regulations with existing facilities and could not upgrade those facilities to meet the new standards due to inadequate personnel and funding. After the Navy issued the original wastewater solicitation in March 2008, the state extended the required compliance date to December 2015. As a result, installation and Navy officials reconsidered utilities privatization and assessed whether the extended deadline would allow them to reach compliance without privatization. After evaluating alternative paths of action to ensure compliance with the new Florida wastewater regulations, installation and Navy officials determined it remained in the best interest of the installation to proceed with the solicitation and contract award. Wright-Patterson Air Force Base officials stated that after they issued their solicitation for privatization of water systems, installation officials discovered that two of the wells were contaminated by firefighting foam. This foam, used to extinguish aircraft fires, contained chemicals which washed off runways and seeped into the groundwater. According to installation officials, concentrations of these chemicals exceeded non-regulatory lifetime health advisory levels, prompting the installation to remove the chemicals before distributing the water for use on base. To address the problem immediately, installation officials reported that they engaged with the Air Force Civil Engineer Center to fund a project to modify the existing water treatment plant to remove the chemicals before distributing the water for use; they could not wait for the award of the utility services contract. Installation officials stated the modification to the water treatment plant included the construction of a building to house a large filtration system to remove the contaminant. These officials also stated the modified water treatment plant was then included in the requirements package for the utilities privatization effort. DLA Energy officials stated that a change to the requirements included in utilities privatization efforts was a frequent occurrence. As this information is central to determining the technical requirements and the cost estimate, changes to an inventory can affect the length of time spent in acquisition planning and in discussions and negotiations. Army officials stated that completion of the list of inventory to be privatized is a time-consuming process as records of the amount of pipes, valves, wires, facilities, or other items is often incomplete. Army and Air Force officials indicated that often multiple surveys of inventory are conducted by both the military departments and the contractor selected to maintain the utility system to finalize requirements. Officials reported that this is because, in part, a final and complete inventory is required so that after award the government can finalize the bill of sale and convey those systems to the utility services contract(s) provider(s). Technical Complexity. According to utilities privatization officials, the technical complexity of the utilities privatization effort can also affect how long it takes to award a utility services contract. At Fort Riley, DLA Energy officials, installation officials, and contractor representatives shared with us that the complexity of the regulated environment of some utilities had an effect on the time to award. For example, a contractor representative stated his regulated utility company was one of the potential contractors vying for a utility services contract at Fort Riley, and this required additional approval from the state’s utility regulatory commission. DLA Energy officials stated and the contractor representative stated that this additional complexity led to a prolonged negotiation and discussion effort as his company sought additional information about the asset inventory to create what it perceived to be a quality proposal for both the utility services contract and its utility regulatory commission. Our analysis of DLA Energy data found that for the majority of the contracts, the discussion/negotiation phase required the longest amount of time during the pre-award contracting process. The time to award for this utility system took one year longer than other utility systems privatized on the same installation. Continuity of Personnel. Utilities privatization officials we interviewed stated that the continuity of personnel involved in the process is critical to awarding a contract in a timely manner. For example, at Naval Air Station Key West, officials told us that staff turnover was prevalent at all levels multiple times during the utilities privatization process. These officials noted this turnover was due, in part, to the isolated location of the installation, which made it difficult to recruit and retain both civilian and military staff. They also noted that in turn, this turnover of staff led to loss of knowledge and dispersion of data. During our visit, we observed that installation staff had difficulty locating documentation and had limited knowledge of what occurred during the pre-award contracting process at the installation. Officials explained that this was due, in part, to the loss of some documentation due to flooding and the management of the process by other commands. In contrast, installation and contracting officials at Fort Riley stated that there was no turnover in the installation staff during the pre-award contracting process and no turnover in the DLA Energy contracting staff once they took responsibility for administering the utility services contracts. Officials at Fort Riley stated that with continuity of staff, knowledge and working relationships were built and maintained. DLA Energy awarded utility services contracts for three utility systems in a comparatively quick time frame compared to the other contracts in our analysis. Command Support for Privatization. Utilities privatization officials stated that the support of the installation’s command leadership can facilitate award of a utility services contract. For example, officials at Fort Riley said the installation commander and director of public works department fully supported utilities privatization as the solution to the installation’s failing utility systems. These officials noted that due to this desire to privatize utility systems, the senior installation leadership openly communicated its goals and support of privatization throughout the pre-award contracting process. For example, Fort Riley officials stated that public works department staff assigned to work on the utilities privatization effort were sequestered or removed from all other assigned responsibilities. Installation officials stated this allowed the employees to focus on the utilities privatization tasks. According to Fort Riley officials, this leadership support was a factor in reducing the time to contract award. According to our analysis, the utility services contracts for Fort Riley were awarded more quickly than the majority of the utility services contracts we assessed at other installations. In contrast, officials at Wright-Patterson Air Force Base said their leadership was reluctant to fully support utilities privatization. While senior military department leadership directed the installation to privatize its utility systems, installation leadership was reluctant to do so due to concerns of job loss for public works department employees and perceived loss of flexibility in installation operations and maintenance funding. Installation officials stated that this reluctance was one factor in the amount of time it took to make the contract awards. According to our analysis, the contracting award process for the three utility systems at that location took longer than the majority of the utility services contracts we assessed at other installations. DOD is generally applying leading practices in its efforts to improve the timeliness of the utilities privatization pre-award contracting process, but is missing opportunities to analyze the effects of its changes and to better share the information with stakeholders. ASD(Sustainment), the military departments, and DLA Energy have taken, or plan to take, actions that demonstrate or partially demonstrate four of the five leading practices identified by GAO and others. However, despite the breadth of activities performed and planned by DOD, the department lacks key data it needs for further analysis and validation of the pre-award contracting process as well as a repository for archiving lessons learned for future stakeholders to access. ASD(Sustainment), the military departments, and DLA Energy have taken actions to implement lessons learned, in part, to reduce the time it takes to award contracts. We assessed whether these actions demonstrated, partially demonstrated, or do not demonstrate each of the five leading practices for implementation of lessons learned identified by GAO and others. Demonstration of these leading practices is critical to ensuring that lessons learned endure and that processes are improved. In reviewing ASD(Sustainment), military department, and DLA Energy pre- award documentation and interviewing knowledgeable officials, we found that all the DOD entities fully demonstrated the third leading practice— which is to validate the applicability of lessons—and demonstrated three other leading practices to varying degrees. None of these entities, however, demonstrated the store and archive leading practice (see table 4). Collect information. The collect information leading practice involves capturing information about events in the area of interest, which can be achieved through various methods. ASD(Sustainment), the military departments, and DLA Energy officials told us that they collect information for utilities privatization lessons learned through activities such as data calls, working groups, workshops, studies, conferences, and meetings. Specific examples of DOD demonstrating this leading practice are as follows: According to an ASD(Sustainment) official, since about 1997, their office has sponsored a monthly Utilities Privatization Working Group attended by representatives of the military departments and DLA Energy officials. The purpose of the working group is to provide a collaborative forum to adjudicate issues and share lessons learned from utilities privatization activities. For example, topics of discussion on the April 2019 agenda included issues or challenges associated with developing an execution framework, methodologies to implement utilities privatization guidance, and updates on current utilities privatization activities from the military departments and DLA Energy. In 2019, ASD(Sustainment) added a requirement to its guidance for an annual utilities privatization program review with each military department to address portfolio lessons learned. According to ASD(Sustainment) officials, their office, the military departments, and DLA Energy officials plan to work together to develop a strategy for complying with the guidance. According to an Army official, the Army established a tri-military department annual Utilities Privatization Post-award Workshop in 2014 that discusses post-award issues among the military departments, DLA Energy, and contractors. Each military department has hosted a workshop. For example, the Navy hosted the November 2018 post-award workshop, which included updates by the military departments and DLA Energy on their utilities privatization activities, including some lessons learned. The Navy commissioned a study in 2016 to help reestablish its utilities privatization program and reduce life-cycle expenditures on infrastructure, including utility systems. The study examined the costs, benefits, and existing policies for private versus government facilities ownership and recommended changes to the Navy’s processes for utilities privatization. The study led to, among other things, the creation of Navy-specific utilities privatization guidance. According to a Navy official, they will establish a community of practice in partnership with DLA Energy to provide a quarterly forum for NAVFAC officials to share lessons learned and discuss utilities privatization problems and solutions. DLA Energy hosts the biannual DLA Energy Worldwide Energy Conference to provide personnel of the military departments, DLA Energy, and contractors the opportunity to learn from each other and top industry experts on the latest trends and initiatives in energy, including utilities privatization. DLA Energy also participates in the annual Department of Energy Annual Energy Exchange Conference. For example, in 2019 it participated in a discussion panel on utilities privatization. These efforts to collect information and lessons learned are positive; however, as discussed earlier in this report, DOD lacks complete and consistent information on the time to award utility services contracts. Reducing the amount of time to award these contracts is a stated goal of DOD. ASD(Sustainment) issues annual data calls to the military departments to collect information such as the number of utility systems privatized by military department, the authority under which a privatization took place, and award dates for the utility services contracts. DLA Energy and military department officials indicated that collecting this information has contributed to efforts to reduce the amount of time needed to award utility services contracts. They acknowledge, however, that the military departments do not collect information on the formal decision to consider privatization of utility systems and the length of time to conduct key acquisition planning activities, such as developing a complete inventory of physical assets to document its requirements. The requirements package is a key component in the pre-award contracting process and includes an inventory of the utility system. This inventory includes items such as the pipes, valves, and wires that make up the utility system. Consequently, neither DLA Energy nor the military departments, with the exception of the Navy, had reliable information on the entire time it took to complete the pre-award contracting process. Without data on the key tasks that need to be completed during the pre-award contracting phase, DOD is missing an opportunity to assess the extent to which updated guidance, training, and other ongoing efforts are having an effect on the time to award utility services contracts. In recognition of this, an Air Force official stated that the Air Force Civil Engineer Center recently implemented a schedule-tracking mechanism to capture these dates, which will be used with all new utilities privatization efforts. Collecting this information consistently across all military departments would allow for a more thorough analysis of contracting process information and could support future process improvement efforts. Analyze information. The next leading practice is to analyze the information collected to determine root causes and identify appropriate actions. Examples of DOD demonstrating the information analysis leading practice include: According to DLA Energy officials, in 2014, they reviewed and analyzed historical data from utility services contracts to revise the utilities privatization procurement time frame. As mentioned previously, this analysis led to the development of milestones and associated time-based targets to achieve each milestone, based on the number of proposals received, to reduce the pre-award contracting process. According to a DLA Energy official, the agency coordinated with its contractor support, and Army and Air Force program management offices to establish the time-based targets. In May 2014, the Air Force conducted a utilities privatization process improvement review with DLA Energy, among others, to streamline the utilities privatization process. The review allowed the Air Force to reduce the planned timelines for the utilities privatization pre-award contracting process, which DLA Energy administers on behalf of the Air Force, between the issuance of competitive solicitations to award by 14 months to 33 months. Similarly, in October 2014, the Army conducted a utilities privatization process improvement review with DLA Energy with a goal to reduce the time needed from issuance of a competitive solicitation to award of utility services contracts to less than 36 months. Army and DLA Energy officials identified opportunities for process or program improvement during the review. Overall, adopted changes reduced the planned timelines for the utilities privatization pre-award contracting process by approximately 5 months to 31 months. An Air Force official stated that lessons learned are collaboratively shared annually and have revealed lessons learned to improve the contracting process. This has led to updates of Air Force request for proposals template. The 2016 Navy study not only collected data on utilities privatization but also provided analysis to understand the opportunities, costs, and benefits associated with privatization. The Navy used the study to enable decisions about whether privatization is the appropriate strategy to reduce life-cycle expenditures on utility infrastructure. The analysis performed for the study resulted in multiple products and findings. For example, the Navy created an Excel-based tool to consolidate utility data, organize data, and prioritize installations for evaluation of the potential to privatize. ASD(Sustainment) revises its utilities privatization guidance and procedures based on lessons learned and changes in laws and regulations. For example, we found that DOD responded to industry feedback by standardizing and clarifying request for proposal templates used in utilities privatization. Based on our analysis, the military departments and DLA Energy fully demonstrated the leading practice for analyzing information, and ASD(Sustainment) partially demonstrated the leading practice. According to DOD, ASD(Sustainment) is responsible for overseeing progress tracking and goal setting for utilities privatization across the department. Therefore, analysis for performance across the department on the time it takes to award utility services contracts is its responsibility. As mentioned previously, while ASD(Sustainment) collects data on the number of utility systems privatized by military departments and award dates for the utility services contracts, it is missing information about key pre-award contracting activities. In the absence of this information, ASD(Sustainment) cannot fully analyze the department’s utilities privatization activities for further lessons learned to help reduce time frames for awarding contracts. Validate applicability of lessons. Once collection and analysis have identified the lessons learned, the next leading practice is to validate that the right lessons have been identified and determine the scope of their applicability. Subject matter experts or other stakeholders may be involved in this step of the process. Examples of DOD’s demonstration of the validation leading practice include: ASD(Sustainment) officials noted that they assess the applicability of lessons by periodically revisiting and revising utilities privatization guidance. These officials said they revised such guidance, for example, in 2002, 2005, 2010, and 2019 to incorporate lessons learned from stakeholders across the process. According to an Army official, the Army periodically assesses the applicability of lessons learned by revising its utilities privatization acquisition process based on the Army’s strategic direction, military department meetings, and utilities privatization policy changes. This included the utilities privatization acquisition process improvement review with DLA Energy to reduce the time needed to award utility services contracts. According to the 2016 Navy study, contractors conducted interviews to validate data, obtain supplementary data, and ascertain qualitative information. In addition, contractors interviewed Air Force and Army utilities privatization representatives to garner lessons learned and understand other DOD components’ approaches to utilities privatization. One result of the study was development of a repeatable methodology and framework, based on specific lessons learned, that can be used to evaluate candidate sites for utilities privatization. In addition, according to an official, the Navy is using the lessons learned from its study to develop its new utilities privatization handbook, a draft of which emphasizes the need throughout the process for the collection, documentation, and sharing of lessons learned to help future installations and refine the utilities privatization program. According to the Navy, it plans to update the handbook on an ongoing basis to reflect lessons learned from its pilot program with DLA Energy, and with the Army and Air Force utilities privatization programs. An Air Force official stated that over an 18-month period they assessed their utilities privatization process and developed a new, comprehensive utilities privatization process for pre-award contracting activities. The Air Force determined the scope of the applicability of lessons learned when it revised its draft utilities privatization playbook to incorporate this new process. DLA Energy revised how it monitors the utilities privatization process based on its analysis of historical utilities privatization data. DLA Energy officials said they validated these changes by testing the milestones and associated targets on a 2014 Army utility services contract and found them to be reasonable. Army and Air Force officials agreed with the assessment. DLA Energy officials stated that they also determined the scope of the applicability of lessons learned by determining to whom and what the lessons learned applied, and by taking actions to continually revisit and revise its templates and procedures. For example, we found that the fiscal years 2012 and 2016 versions of the request for proposals template reflected changes for both the Army and Air Force but we could not determine if they were the result of lessons learned. We also identified revisions DLA Energy made to incorporate lessons learned into operating manuals it uses for the utilities privatization process. For example, a DLA Energy official noted that the agency revised its risk evaluation manual to improve the quality of the risk evaluations the source selection evaluation board performs. Store and archive lessons. The archiving of lessons learned involves the use of a repository, used to disseminate and share information. As appropriate, these repositories should have the capability to store and share data and to secure classified, sensitive, or proprietary data. Archiving lessons learned should remain an ongoing process; otherwise, it risks becoming cumbersome and irrelevant. Our observations on DOD’s efforts to store and archive information on utilities privatization include: According to Air Force officials, the Air Force does not currently store or archive lessons learned for pre-award contracting activities. The Air Force Portfolio and Asset Control and Evaluation System stores and archives lessons learned for post-award contracting activities. The system is available to Air Force, DLA Energy, and other stakeholder agencies like the General Services Administration, but not to other military departments. To populate the database, the Air Force Civil Engineer Center portfolio management division uploads utilities privatization documents into the system, including weekly status reports, briefings, and meeting notes for post-award contracting activities. The system also records lessons learned and provides a social media discussion platform, known as the Contracting Officer’s Representative Toolbox. Our review of the system determined that it is not widely populated. Specifically, as of December 2019, the system contained seven lessons learned, three discussion postings, and five documents in the Toolbox. According to Air Force officials, however, this system was not intended to be a repository for storing and archiving lessons learned for pre-award contracting activities and acknowledged that the Air Force does not currently have another means to do so. According to DLA Energy officials, they do not maintain a specific repository for storing and archiving lessons learned for utilities privatization pre-award contracting activities but make their revised templates and procedures—that they believe generally reflect key lessons learned—available to stakeholders for utilities privatization on a website. According to a DLA Energy official, the website is open to anyone that can access DLA.mil, but most of the content is intended to assist contracting officer’s representatives in conducting their post- award contracting responsibilities. The Army has one key official who has managed its utilities privatization program activities for many years and has a substantial amount of experience and institutional knowledge. This official maintains utilities privatization files in hard copy—such as guidance, memorandums, and relevant studies—therefore this information is not readily available to all relevant stakeholders, such as the other military departments. According to the Army official, the Army does not maintain a repository for storing and archiving lessons learned for utilities privatization pre-award contracting activities. According to Navy officials, NAVFAC has a business management system that provides for the management of business processes, common practices, and process and quality improvement for NAVFAC products and services. The system’s documentation is available for use by all NAVFAC commands and links to applicable policies, guidance, forms, and information so that work will be conducted in a consistent manner. According to officials, this system is updated annually or at significant process changes. However, the Navy is currently developing a module for the business management system for utilities privatization with an estimated completion date of March 2020. Navy officials stated that the module is expected to include pre- award contracting lessons learned when it becomes operational. According to ASD(Sustainment) officials, they do not maintain a repository for storing and archiving lessons learned for utilities privatization pre-award contracting activities. While ASD(Sustainment), the military departments, and DLA Energy officials stated they incorporate lessons learned in various ways, including when they revise policies and/or operating manuals, these officials acknowledge that they do not maintain a repository for storing and archiving lessons learned on specific utilities privatization pre-award contracting efforts. DLA Energy officials, who support both the Army and Air Force utilities privatization efforts, stated that revisions to templates and guidance were sufficient to implement lessons learned. The leading practices for lessons learned indicate that the use of a repository to store lessons learned allows agencies to disseminate and share the lessons learned. Without such a capability, ASD(Sustainment), the military departments, and DLA Energy may be missing opportunities to capture and share lessons learned that could benefit future utilities privatization efforts, including helping DOD achieve its goal of reducing the length of time to contract award. Disseminate and share lessons. A critical step in any lessons learned process is the sharing and disseminating of the knowledge gained. Agencies can disseminate lessons in many ways, such as briefings, bulletins, reports, emails, websites, database entries, the revision of work processes or procedures, and training. Lessons can be “pushed,” or automatically delivered to a user, or “pulled,” where a user searches for them in an archive of lessons learned information. Examples of DOD demonstrating the disseminating and sharing leading practice include: As previously noted when discussing the collection criteria, the DOD officials we spoke with told us that they distribute lessons learned during annual reviews, industry conferences, regular meetings, workshops, training sessions, and working groups. The lack of documentation and archiving of the lessons learned, however, limits the ability of future users to search for and retrieve them. DLA Energy officials stated that they share templates created for the utilities privatization program with the military departments and industry. According to an ASD(Sustainment) official, these users find the information helpful and efficient as the templates can be customized where necessary depending on the type of potential contractor and solicitation and updated for lessons learned. Additionally, DLA Energy revises its standard operating procedures for the pre-award contracting process to incorporate lessons learned and disseminate changes. DLA Energy also provides training for the utilities privatization process, for example on the procedures contracting officials should use to conduct negotiations and past performance evaluations for utility services contracts. As previously discussed, the Air Force Portfolio and Asset Control and Evaluation System is a system used to store and disseminate lessons learned for the post-award utilities privatization process. While used in a limited fashion, the Contracting Officer’s Representative Toolbox consists of a newsfeed and a documents file. The documents section allows users to save and share helpful utilities privatization documents with others. The system also contains a resource center to maintain updated training tools and resources for project oversight including frequently asked questions, best practices, and resolutions to project issues. While the system has the ability to both “push” information to users and allows for users to “pull” data by acting as an archive for documentation, it is not available to Army and Navy utilities privatization staff and does not currently contain lessons learned on the pre-award contracting process. We assessed DLA Energy as fully demonstrating, and ASD(Sustainment) and the military departments as partially demonstrating, this lessons learned criteria. While ASD(Sustainment) and military department officials do disseminate and share lessons learned, the inability of future users to search for and retrieve lessons learned limits their utility. For example, Air National Guard officials stated that they were unfamiliar with the utilities privatization process and encountered delays prior to releasing the solicitation, in part, due to the need to obtain information about how to execute the process. Having the capability for others to retrieve archived lessons learned could potentially assist future stakeholders in the process and help further shorten contracting award time frames. DOD is taking steps to improve the effectiveness and efficiency of the utilities privatization pre-award contracting process and these efforts have contributed to decreasing the time needed to award utility services contracts. In particular, Army and Air Force officials consistently noted that DLA Energy’s establishment of a milestone-based system to track the time to complete key steps in the pre-award contracting process in 2014 has helped provide better management oversight and improve accountability. DOD, however, does not collect consistent information on the time to complete key phases needed to award utility services contracts. Specifically, DOD does not have information on when the military departments identify that one or more utility systems on an installation should be considered for privatization and when the installation delivers a completed requirements package as part of the acquisition planning phase. The lack of consistent data on these two key events may hinder DOD’s efforts to identify additional opportunities to reduce the length of time needed to award utility services contracts. Similarly, DOD recognizes the importance of collecting and disseminating lessons learned for the utilities privatization program, but currently lacks a mechanism to archive lessons learned during the pre-award contracting phase. As DOD has identified 580 utility systems that still may be privatized, having such a capability for others to retrieve archived lessons learned could potentially assist future stakeholders in the process and help further shorten contracting time frames. We are making two recommendations to the Secretary of Defense: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment collaborates with the military departments and the Defense Logistics Agency to collect consistent information on the time to complete key steps in the pre-award contracting process for privatizing utility services. (Recommendation 1) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment collaborates with the military departments and the Defense Logistics Agency to develop a mechanism to store and archive lessons learned regarding the pre-award contracting process for privatizing utility services. (Recommendation 2) We provided a draft of this report to DOD for review and comment. DOD’s written comments are reproduced in appendix II. DOD partially concurred with both recommendations and provided technical comments, which we incorporated as appropriate. DOD partially concurred with our first recommendation to collect consistent information on the time to complete key steps in the pre-award contracting process for privatizing utility services. DOD suggested that we modify our recommendation to include other DOD contracting activities that may support privatization efforts. Our recommendation, based on the scope of our audit work, was intended to cover recent privatized utility services contracting activities within the military departments, such as Naval Facilities Engineering Command. But we agree that DOD should include any activity that provides support for utilities privatization in its efforts to collect better data. Similarly, DOD partially concurred with our second recommendation to develop a mechanism to store and archive lessons learned regarding the pre-award contracting process for privatization of utility services. DOD suggested that we modify our recommendation to include other DOD contracting activities besides DLA and to recommend that DOD add the lessons learned from the post-award contract process, as post-award contract actions play a critical role in informing pre-award contracting processes. As noted above, we agree that DOD should include any contracting activities that support pre-award utilities privatization efforts. Similarly, while our work did not specifically assess how post-award activities could be incorporated into the lessons learned efforts, we agree that doing so may provide additional insights that would benefit future utilities privatization efforts. In its technical comments, DOD disagreed with our presentation of the time required by the Navy to privatize utilities at Naval Air Station Key West. Specifically, DOD officials believed that we should exclude from our calculations a 30-month period that occurred during the solicitation phase in which it evaluated alternative paths to comply with new Florida wastewater regulations. DOD noted that this pause did not allow any additional work to be accomplished towards contract award. We had identified this pause and the rationale underlying the Navy’s decision to do so in the draft report. We continue to believe it is appropriate to reflect this period in our calculations as the Navy did not cancel the original solicitation and, after deciding to continue to pursue the privatization efforts, evaluated the offerors’ proposals that had been previously received prior to the pause and subsequently awarded the utility services contract based on that solicitation. In that regard, we consider the change in the date by which the Navy had to comply with Florida’s wastewater regulations to be a relevant example of one of the many external factors that can affect the time needed to privatize utilities at a military installation. We did, however, reflect DOD’s disagreement with our characterization where appropriate in the report. We are sending copies of this report to the Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; the Assistant Secretary of Defense for Sustainment; the Secretaries of the Army, Navy, and Air Force; the Director, Defense Logistics Agency; appropriate congressional committees; and other interested parties. This report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by e-mail at dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. A House Armed Services Committee report accompanying the National Defense Authorization Act for Fiscal Year 2019 included a provision that we review the Department of Defense’s (DOD) utilities privatization pre- award contracting process (which includes awarding a contract), including lessons learned to improve the process. This report examines (1) the length of time to award contracts for utility services and factors that affect it, and (2) the extent to which DOD is demonstrating leading practices to collect and disseminate lessons learned for utilities privatization. To determine the length of time to complete the pre-award contracting process to award a privatized utility services contract, we focused on utility services contracts awarded from fiscal years 2016 through 2018, the latest full year of available data when we began our audit. The time frame captured at least one privatized utility services contract for each military department—Army, Air Force, and Navy. To identify these contracts, we used information maintained by the Office of the Deputy Assistant Secretary of Defense for Energy, which is part of the Office of the Assistant Secretary of Defense for Sustainment (ASD(Sustainment)) on its utilities privatization master list, which includes such information as installation name and location, and when the contract was awarded. For fiscal years 2016 through 2018, a comparison of the ASD(Sustainment) information and solicitation details provided by the awarding contracting agents identified 28 utility systems at 15 military installations that were privatized during our time frame through 21 contracts. Nineteen of the 21 contracts were awarded using competitive procedures and the remaining two were awarded without providing for full and open competition, which we refer to as non-competitive. Of the 19 competitive awards, 18 were awarded by the Defense Logistics Agency Energy (DLA Energy), which served as the contracting agent for the majority of the Army and Air Force utility services contracts during our review period; and one was awarded by the Naval Facilities Engineering Command, the contracting agent for the Navy and Marine Corps. The two non-competitive contracts were awarded by DLA Energy and the Air National Guard, respectively. For the purposes of our review, we define the pre-award contracting process as the date from when a military department begins to consider privatizing an installation’s utility system(s) to the contract award date. For all 21 privatized utility services contracts awarded between fiscal years 2016 through 2018, we obtained copies of the award documents. In addition, for the 19 competitively awarded utility services contracts, we conducted contract file reviews to record completion dates of pre-award contracting phases and number of proposals received by utility. For the 18 DLA Energy competitive awards, we conducted two on-site reviews of the contract files at a DLA Energy facility to verify the dates and proposals. At the final DLA Energy contract file review, one analyst located and recorded each relevant document and date confirming completion of the pre-award contracting phase, as well as the offer information. A second analyst verified the accuracy of the information. After correcting certain errors, such as incorrectly recorded dates, we determined that this information was sufficiently reliable for purposes of reporting on the length of time to conduct pre-award contracting activities. The Navy provided electronic documents for us to review for its one competitive award. A similar verification process was conducted for the Navy information. For the Air National Guard contract, we obtained the contract and additional information from contracting officials on the time to complete the pre-award contracting process. To supplement this data, we interviewed Air National Guard contracting officials involved in the contract. To compare information on the factors that affected the length of time to award utility services contracts, we: Analyzed dates of comparable events throughout the pre-award contracting process found in the utilities privatization award contract files; and Conducted site visits to speak with DLA Energy, installation, and military department officials, and contractor representatives about their experiences with the utilities privatization pre-award contracting process. We combined a record of all utilities privatization pre-award contracting information into one file. We used this file to compare time to award for all pre-award contracting activities. This data was further compared by competitive and non-competitive status, contracting agent, military department, type of utilities in the proposals, number of utilities in the proposals, and the size of the installation by acreage. The size of each installation was found in the DOD Base Structure Report – Fiscal Year 2017 Baseline, A Summary of the Real Property Inventory. However, due to the small number of contracts we assessed, we were unable to determine if there were any patterns to corroborate whether the factors such as the type of utilities in the proposals, number of utilities in the proposals, and the size of the installation did or did not affect time to contract award. To determine if there was a change in time to award after the implementation of DLA Energy’s 2014 time frames for pre-award contracting activities, we compared the time elapsed between receipt of requirements and award for competitively awarded privatized utility services contracts. The analysis does not reflect seven solicitations issued between fiscal years 2013 and 2018 as they were awarded, or were expected to be awarded after September 30, 2018, and are outside our audit scope. Using data obtained from DLA Energy, however, we determined that the awards or projected awards of these seven contracts generally follow the trend shown in our analysis. To gather information on the factors that affected the time from the decision to enter the utilities privatization process to contract award, we selected a non-generalizable sample of three installations to visit. The installations were selected from a list supplied by the Office of the Deputy Assistant Secretary of Defense for Energy of installations privatized from fiscal years 2016 through 2018. To obtain a variety of utilities privatization characteristics, we selected the installation visits based on the following criteria: (1) representation of each military department; (2) types of utility system privatized (electric, natural gas, water, and wastewater); (3) geographic location of installation; and (4) fiscal year of award. The contract awards for all installations visited were awarded using competitive procedures. Prior to our visit to the three installations, we analyzed contract file documentation and spoke with utilities privatization individuals at military department and DLA Energy headquarters. At the three installations, we conducted interviews with officials at the installation command, public works department, and contracting officials, and contractor representatives to obtain perspectives on their utilities privatization in general and specifically on the factors that affected the time to contract award. We conducted our non-generalizable site visits from May 2019 to July 2019 at (1) Naval Air Station Key West, Florida, (2) Wright-Patterson Air Force Base, Ohio, and (3) Fort Riley, Kansas. No Marine Corps installations were privatized from fiscal years 2016 through 2018. In addition, we spoke with contracting officials from the Air National Guard at Truax Field in Wisconsin. The results of this selection are not generalizable to all utility services contracts or military installations, but provide insights and illustrative examples regarding factors that affect timing in the contract award process used to privatize utility systems. To determine the extent to which DOD demonstrated leading practices identified by GAO and others for collecting and disseminating lessons learned, we compared DOD’s activities related to lessons learned against the five leading practices identified in our prior work to determine whether DOD demonstrated actions consistent with these practices. We then had a second analyst check the same documents and activities to verify our initial results. These leading practices for lessons learned are discussed in a September 2012 GAO report, Federal Real Property Security: Interagency Security Committee Should Implement a Lessons-Learned Process; and a December 2018 GAO report, Project Management: DOE and NNSA Should Improve Their Lessons-Learned Process for Capital Asset Projects. We compared DOD’s lessons learned documentation, including the Air Force’s lessons learned database, DLA Energy’s utilities privatization website and operating manuals, the military departments and DLA Energy contracting process policies and procedures, and Air Force and Navy utilities privatization handbooks against these practices. Based on our analysis, we assessed whether DOD fully (met all of the criteria), partially (met part of the criteria), or did not (met none of the criteria) demonstrate the leading practices. To determine the actions that DOD has taken to learn lessons from the utilities privatization pre-award contracting process and demonstrate leading practices, we interviewed officials from ASD(Sustainment), the military departments, and DLA Energy; obtained and analyzed documents; and attended the 2019 DLA Energy Worldwide Energy Conference to gain a greater understanding of utilities privatization. We conducted this performance audit from March 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Timothy J. DiNapoli, (202) 512-4841 or dinapolit@gao.gov In addition to the contact named above, J. Kristopher Keener (Assistant Director), Joe E. Hunter (Analyst-in-Charge), Stephanie Gustafson, Gina Hoover, Tamera Lockley, Roxanna T. Sun, Anne Louise Taylor, Kari Terrio, and Kristy Williams made key contributions to this report.", "summary": "Since 1988, military departments have privatized utility systems—such as electricity, water, natural gas, and wastewater—on military installations. DOD awards privatized utility services contracts to companies who upgrade, maintain, and operate the systems. Members of Congress and stakeholders have expressed concerns over the length of time it takes to award these contracts. DOD has a goal of reducing the time frames. A House committee asked GAO to review DOD's utilities privatization. This report examines (1) the length of time to award contracts for privatized utility services, and (2) the extent to which DOD is demonstrating leading practices to collect and disseminate lessons learned. GAO reviewed data on all 21 new utility services contracts awarded from fiscal years 2016 through 2018; compared DOD's lessons learned activities with GAO's leading practices; and interviewed DOD and utility company officials. From fiscal years 2016 through 2018, Department of Defense (DOD) components awarded 21 new contracts for privatized utility services on military installations. The contracting process generally took an average of 4 years from solicitation to contract award. However, the entire pre-award contracting process could be longer, as GAO found that DOD does not maintain complete data on the time to conduct key steps in the acquisition planning phase (see table). GAO found that DOD does not maintain data on when military departments begin to consider privatization and when a complete inventory of the associated infrastructure, such as pipes and valves, is available to use in the solicitation. While no DOD regulation or policy that GAO reviewed requires the collection of data on the time to complete all pre-award activities, in 2014, Defense Logistics Agency Energy officials established milestones to plan and monitor key pre-award activities. GAO found that the length of time from receipt of requirements to contract award was reduced from an average of 61 months pre-2014 to an average of 35 months post-2014. The lessons learned efforts of DOD to shorten the time to award contracts have fully or partially demonstrated four of five leading practices. DOD's efforts include: collecting information through working groups and conferences; analyzing past privatization efforts to focus management oversight; validating changes by demonstrating new processes; storing lessons learned through revised guidance; and sharing lessons learned through working groups and training. However, as DOD does not collect consistent information on the total time to award utility services contracts, DOD is missing opportunities to use lessons learned to reduce the time. Further, DOD does not have a repository for archiving specific lessons learned from utilities privatization efforts. Rather, DOD officials note they consider lessons learned as they develop updated guidance, templates, and handbooks. Without a repository of specific lessons learned, such as conducting the privatization process, DOD is missing opportunities to collect and share lessons learned to assist stakeholders on the remaining 580 utility systems it considers available for privatization. GAO recommends that (1) DOD and the military departments collect information on the time to complete key steps when awarding these contracts, and (2) DOD develop a mechanism to store and archive lessons learned from across the department. DOD partially concurred with both recommendations, noting that it would be beneficial to expand the actions GAO had recommended. GAO agrees that such an expansion would be helpful in efforts to collect more data.", "document_type": "gao"}
{"report": "Commercial airports in the United States (i.e., those regulated by TSA) can be generally described as having security-restricted areas and unsecured areas. Security-restricted areas include the area from which screened passengers may board aircraft, as well as areas where access is generally limited to appropriately vetted and credentialed personnel, such as airport and air carrier employees who require access to aircraft or to load and sort baggage. Unsecured areas, or airport public areas, are the areas of the airport that may be accessed by the general public without restrictions (i.e., without passing through security or some other controlled access point), such as ticketing areas, restaurants and shops, baggage claim areas, and areas extending outward from the airport facility to include pathways leading to an airport’s terminal and public parking areas. Airport public areas described by TSA officials, airport operators, airport law enforcement and aviation related associations we met with included airport access roads, curbside drop-off/pick-up areas, parking structures, rental car facilities, bus/transit lines leading to the airport, main entrances to and lobbies of terminal areas, and the security queue leading to security screening checkpoints. See figure 1 for a general illustration of the public areas of a commercial airport in the United States. According to aviation security stakeholders, such as airport operators, law enforcement officers, and industry representatives from trade associations, securing airport public areas presents inherent challenges for numerous reasons. They also stated that, in general, airports are designed to support the movement of large numbers of people through the airport’s public spaces to the security checkpoint and into the airport sterile area or to aircraft for boarding. TSA officials stated that given the large number of people that pass through airport public areas during peak hours, it can be difficult to monitor these areas for security threats. Additionally, the use of some enhanced security measures and reconfiguring terminals (e.g., metal detectors at entrance doors or the movement of security checkpoints closer to airport entrances or ticket counters) may create additional challenges because such measures could result in long lines and smaller congested spaces that would disrupt service. As a result, airport officials stated that any airport modernization projects, law enforcement actions or technologies introduced to potentially enhance security in the public areas of airports should not disrupt the efficiency of the airport’s business operations. In addition, airport officials and industry representatives stated that each airport is unique in its combination of layout and operations, which may determine the type of security approach and method the airport operator utilizes to enhance the security of the airport’s public areas. For example, an airport may have a number of separate terminals, each comprising separate entrances and public areas, creating a security challenge due to the vast area of detached public space. While another airport may have a single main terminal building that includes a hotel, restaurants and shops with two sections (A and B), each maintaining ticket counters and security checkpoints that may require a different security approach due to its unique set of challenges to securing their public areas, such as having large numbers of people congregating in one central location. TSA, the federal agency with primary responsibility for civil aviation security, implements security measures and imposes security requirements to ensure that access to those areas of the airport that could otherwise permit an individual with ill-intent access to cleared passengers and aircraft is controlled. Although TSA’s statutory authorities and responsibilities for the civil aviation system are not limited to this purpose, resource and other practical constraints, as well as TSA’s mission to secure civil aviation without unduly impeding the flow of commerce, have resulted in a regulatory structure largely focused on implementing measures that ensure the security of the aircraft and the traveling public. As a result, airport operators determine the boundaries for the security-restricted areas of their own airport based on the physical layout of the airport and in accordance with TSA requirements—generally documented through TSA-approved security programs. Securing airport public areas requires a collaborative approach involving airport operators, law enforcement, and TSA officials, among others. A number of aviation stakeholders play an important role in recommending enhancements that impact the security of airport public areas. The roles and responsibilities for each of these aviation stakeholders vary, but together provide a collective approach to securing airport public spaces. Airport operators. Airport operators are the owners, administrators and managers of an airport with responsibilities to plan, organize, supervise and direct airport operations, and have direct responsibility for implementing security requirements in accordance with their TSA- approved airport security programs. In accordance with its security program, airport operators must, in general, provide for the availability of law enforcement personnel in the number and manner adequate to support its security program for public areas and TSA screening operations at the airport. Although TSA’s primary responsibility is to implement and oversee aviation security, incident response at commercial airports is essentially the responsibility of the airport operator in conjunction with state or local law enforcement agencies and TSA collaboratively working to respond to any security incidents. Law enforcement. Responding to security incidents such as an active shooter situation or any other criminal matter—whether in an airport public area or within a security-restricted area—is generally the responsibility of law enforcement personnel present at or available for response to the airport, in accordance with an airport’s security program. For example, officials providing the requisite law enforcement support may be federal, state or local officers, or special airport-authority officers. While some airport law enforcement officers are stationed at dedicated posts at or near passenger screening checkpoints, officers also routinely patrol areas around the checkpoints, such as ticketing areas, restaurants and shops, and baggage claim, among others. TSA. TSA assumed primary responsibility for implementing and overseeing the security of the nation’s civil aviation system following the terrorist attacks of September 11, 2001. As previously stated, TSA primarily fulfills its mission through a regulatory structure largely focused on implementing and enforcing measures that ensure the security of the aircraft and traveling public—such as by controlling access to the security-restricted areas of the airport through the screening of passengers, accessible property, checked baggage, air cargo and mail, or ensuring that controlled access points for use by credentialed aviation workers are in place. However, TSA is also responsible for ensuring that airport operators and other aviation stakeholders remain compliant with their TSA-approved airport security programs and other applicable requirements, which it accomplishes by conducting inspections of, for example, an airport operator’s perimeter, access control, and other security measures. As circumstances warrant, TSA also issues information circulars to notify regulated entities of security concerns and security directives to augment or supplement requirements implemented through security programs. Security directives and guidance issued by TSA related to airport public areas have covered such topics as law enforcement requirements to patrol public areas, law enforcement response times and improved communications systems, among others. Key TSA roles at airports include: Federal Security Directors (FSD). The ranking TSA authority at airports, the FSD, provides leadership and coordination of TSAs day- to-day security activities, including ensuring airport operator’s compliance with their airport security program. Assistant Federal Security Directors for Inspections (AFSD-I). Each AFSD-I manages a Compliance Hub staffed by Transportation Security Inspectors who ensure regulatory compliance, respond to incidents, and reduce vulnerabilities in collaboration with regulated and non-regulated entities. The area of responsibility of the Compliance Hub may cover one or more FSD areas. Visible Intermodal Prevention and Response (VIPR) Teams. TSA Law Enforcement Federal Air Marshal Service (LE/FAMS) conducts protection, response, detection and assessment activities in airports and other transportation systems. VIPR teams comprised of TSA and law enforcement, security inspectors, and screening personnel perform various functions that include randomly screening workers, property, and vehicles, as well as patrolling the public areas of airports. According to TSA officials, there are approximately 31 VIPR teams nation-wide providing enhancement to security in airports. Decisions on deployments of VIPR teams are determined by risk associated with the venue, which is either surface transportation venues like passenger rail or bus stations among others, or airports. TSOs. Although TSOs are uniformed security personnel that resemble law enforcement, they are not law enforcement officers. Therefore, TSA relies on the presence of law enforcement at the passenger screening checkpoints to mitigate actual or perceived threats they face and stated that they appreciate the prompt response provided during the LAX shooting incident. Other aviation stakeholders. Additional aviation stakeholders share responsibility in coordinating input and providing recommendations to strengthen security in airport public areas. Such stakeholders include federal, state and local government officials, airline industry partners, aviation associations, and government agencies such as CISA, Federal Bureau of Investigation (FBI), state and local law enforcement partners, emergency management and fire and rescue officials, airline officials, and association members from Airports Council International-North America, Airport Law Enforcement Agencies Network, and American Association of Airport Executives, among others. On November 1, 2013, Gerardo I. Hernandez, a TSO, was shot and killed at a podium located at the base of an escalator which led to the upstairs security checkpoint at LAX, which TSA deemed a part of the checkpoint area, as he checked passengers’ identification and travel documents. According to TSA officials, as passengers and TSOs located upstairs heard the sound of gunshots, they realized there was an active shooter situation and began to run and hide in shops and restaurants. The shooter proceeded upstairs into the security- restricted area and fired additional shots injuring two TSOs and a passenger. Airport police officers responded within 90 seconds and apprehended the shooter within 4 minutes, who, according to law enforcement officials, was specifically targeting TSA employees. As a result, TSA issued an after action report on March 26, 2014, and identified numerous recommendations to enhance the safety and security of TSOs and the screening checkpoint area, such as improving the visibility of law enforcement officers, active-shooter training, and communications systems. On September 24, 2015, the Gerardo Hernandez Act was enacted into law and directed TSA to, as appropriate, conduct outreach to all commercial airports in the United States to ensure they have plans in place to respond to, among other things, active shooter attacks and incidents targeting passenger screening checkpoints, and to report to Congress on the findings from its outreach. On March 22, 2016, suicide bombers using explosives in suitcases killed 16 people and injured more than 200 inside the main terminal area of the Brussels Zaventem International Airport in Belgium. The attack was followed by the June 28, 2016 Istanbul Ataturk International Airport attack in Turkey, where suicide attackers used guns and bombs to kill 46 and injured more than 230 people inside public areas of the airport, including the security checkpoint and parking areas. On January 6, 2017, a passenger obtained a handgun from his checked baggage upon landing at the airport and shot and killed five people and injured six others in the baggage claim area at FLL. Travelers rushed out of the terminal and also ran into security- restricted areas while law enforcement officers responded to the scene. The shooting event ended in less than 80 seconds when the shooter surrendered to law enforcement officers. Approximately 90 minutes after the shooting, speculation of additional gunshots in the airport caused panic and led to an uncontrolled self-evacuation of passengers, and others throughout the airport. Law enforcement and emergency personnel from surrounding areas quickly responded, causing traffic congestion and blocking all airport roadways. As a result, the Broward County Aviation Department (BCAD) issued an after action report on August 15, 2017, to identify coordination challenges airport officials and law enforcement personnel experienced in response to the active shooter incident, and recommended preparedness and response training and exercises among other things. Enacted on October 5, 2018, as part of the Federal Aviation Administration (FAA) Reauthorization Act of 2018, the TSA Modernization Act required, among other things, that TSA and CISA establish a public area security working group and identify and share best practices to secure aviation and other public areas of transportation facilities. On September 27, 2019 a man fired a gun outside of the baggage claim area of the Portland International Airport in Oregon and was injured in a struggle with police officers. See figure 2 for a timeline of these events and response efforts to enhance the security of public areas. In response to the November 2013 shooting at LAX, TSA took various actions to improve security in airport public areas. In March 2014, TSA issued an after-action report on the shooting. TSA officials at LAX stated that confusion about where to run, hide and respond; delayed and inaccurate communications; and the lack of law enforcement visibility were safety concerns that needed to be addressed. As a result, TSA identified short term actions and proposals for increasing airport public area security and enhancing the safety of TSA employees at airports. These include (1) strengthening and mandating active shooter training for TSA employees, (2) installing duress alarms at screening checkpoints, and (3) adopting recommended standards for law enforcement presence at checkpoints, as described below. Active shooter training. In its after-action report, TSA stated that although it provided optional active shooter training courses available online to employees prior to the 2013 shooting, employees were not required to complete the training and could have been unaware of steps to take during a shooting event. According to TSA officials, adequate training and preparation for how to best respond to security incidents, such as an active shooter situation, are important in order to minimize casualties. After its review of the 2013 LAX shooting, on December 19, 2013, TSA mandated that TSA employees complete the training. In addition, TSA later revised the active shooter training to include various training exercises and threat scenarios, according to LAX officials. TSA noted in its after-action report that the active shooter training scenarios and exercises are intended to allow law enforcement officers to practice reacting to a specific incident and immediately assess the appropriateness of their reactions. All of the six airport operators we interviewed stated that active shooter training and frequent drills are important because they instill instinctive reactions and standard communications and procedures in employees during a crisis situation. In addition, airport officials at all six of the airports we visited agreed with the importance of active shooter training to familiarize employees with the steps to take or escape routes to use during an attack. In its after-action report, TSA also noted actions taken to ensure active shooter tactical response plans to reinforce emergency procedures, and conducting emergency evacuation drills twice a year. Airport officials at all of the six airports we visited noted the importance of these drills and stated that they have incorporated the drills into their emergency plans and procedures. Duress alarms. TSA reported that installing duress alarms at screening checkpoint areas would improve communications from TSOs to law enforcement through use of a silent alarm. To enhance emergency response equipment and technology, TSA mandated regular testing of duress alarms, recommended linking closed circuit television (CCTV) cameras to duress alarms, and recommended enhanced use of local airport emergency alert notification systems. TSA also identified the need for FAMS notifications in the event of a security emergency, because previously FAMS did not receive automatic notification of an active shooter incident occurring. Duress alarms are installed at each checkpoint, and when pushed, provide TSOs with a method to notify law enforcement of dangerous situations at or around the checkpoint area. TSOs we met with at five of the six airports we visited discussed a number of situations where travelers have been unruly, threatening, and sometimes physical prior to undergoing or during security screening at the checkpoint. In instances of hostility or threats of attack, TSOs highlighted the importance of having operational duress alarms to help improve the safety and security of the public area and the checkpoint (see figure 3). After the LAX incident, TSA conducted an assessment of all existing alarms and found that some airport checkpoints lacked alarms and some alarms were not fully functional. As a corrective action, TSA issued an operational directive to mandate weekly testing of duress alarms at commercial airports nationwide. In addition, not all airports had duress alarms as a notification capability prior to the LAX incident. As such, TSA subsequently planned to take action to install duress alarms at all airports nationwide. Officials at all of the six airports we visited confirmed the use and weekly testing of duress alarms. Representatives of all four industry associations we contacted stated that the installation of duress alarms in all airports was a useful practice. TSA’s review also recommended linking duress alarms to CCTV cameras to focus camera footage on the area where the duress alarm is activated. All of the six airports we visited have completed or plan to complete linking the alarms to the cameras. Law enforcement presence. Following the LAX shooting, TSA officials, and TSO screeners, wanted to ensure adequate law enforcement presence at the checkpoints. In response to the review of the shooting incident, TSA recommended enhancing law enforcement presence by providing a visible deterrence and establishing quicker incident response times at security checkpoints. In an effort to address the concerns of visibility and responsiveness, TSA recommended standards for law enforcement presence at checkpoints and ticket counters during peak travel times and incorporation of a maximum allowable response time for law enforcement to arrive at an airport checkpoint when notified of a security incident. Prior to the LAX shooting, airport operators were required to comply with existing airport security program requirements to provide adequate law enforcement presence to ensure passenger safety, including responding to threats at security checkpoints. However, when TSA conducted a review of all airport security programs, they found that although most airports specified maximum response times to checkpoints, 71 airports that maintained flexible law enforcement coverage did not list a required response time in their security programs. As a result, TSA required all airports to clearly include a maximum allowable law enforcement response time in all security programs. Officials for the five airports we visited with the highest passenger volumes stated they comply with the response time requirement listed in their security program while officials from a smaller airport we met with told us they include a longer maximum response time as a requirement in their security program. While recommended standards for law enforcement presence and maximum response times are required in airport security programs, nearly all 50 TSOs and TSO supervisors at the six airports we visited expressed concerns for safety and security while conducting screening operations in the passenger checkpoint areas. Many of these TSOs and supervisors said they feel vulnerable to both physical and verbal attacks, and public misperceptions of their overall roles and responsibilities. The majority of TSOs also noted concerns about adequate law enforcement presence and attentiveness in the checkpoint areas and because they are sometimes harassed for conducting their screening duties. While many of the TSOs stated they sometimes feel their concerns are not always met with action, such as supervisors intervening or calling upon law enforcement for assistance, they said they appreciate law enforcement’s response to the LAX shootings and value building relationships with law enforcement present at the checkpoint. All TSOs we interviewed expressed interest in continuing to provide feedback to TSA headquarters and offering suggestions for improving their safety. In addition to actions taken in response to the after-action report for the LAX shooting, TSA took other actions consistent with the Gerardo Hernandez Act. As previously mentioned, the act directed TSA to, as appropriate, conduct outreach to all commercial airports in the United States to ensure they have plans in place to respond to, among other things, active shooter attacks and incidents targeting passenger screening checkpoints, and to report to Congress on the findings from its outreach. In response to the Gerardo Hernandez Act, TSA conducted outreach to all commercial airports and analysis of each airport’s preparedness to respond to security events. TSA determined that all of the airports had plans in place to respond to security incidents in the public areas of airports including active shooters, acts of terrorism, and incidents that target passenger screening checkpoints. TSA also determined that all commercial airports had met TSA regulatory requirements related to security incident response planning. After the LAX shooting and subsequent review, TSA issued an Operations Directive in August 2014, about one year before enactment of the Gerardo Hernandez Act, detailing specific guidance and TSA employee procedures for responding to an active shooter incident. Upon reviewing the act, TSA concluded that the procedures outlined in its directive were consistent with requirements and that no further action was required. For example, TSA had provided guidance for its personnel to mentally prepare themselves in advance for an active shooter incident by predetermining an escape route that offers concealment or cover. TSA guidance had also encouraged employees to use the mantra of “Run, Hide, Fight” during active shooter incidents. Furthermore, over the next few years, TSA released a new training video, issued revised operational guidance, and nation-wide update concerning security measures. In January 2015, TSA released a new active shooter training video, “Active Shooter Incident Response Training” for active shooter incidents specifically depicting an airport environment. The interactive training video was filmed at Indianapolis airport with support and participation from local airport officials, law enforcement officers, and TSA personnel. TSA released the training video with a required completion date of March 31, 2015, and mandated that this be completed as an annual training requirement for all TSA personnel. In July 2016, TSA also issued revised operational guidance for reporting aviation security incidents to the Transportation Security Operations Center, including security breaches and suspicious activities, among others. In November 2017, TSA issued a national update to airport security programs for law enforcement coverage of certain airport public areas under the National Terrorism Advisory System. These documents include guidance and procedures that align with requirements of the Gerardo Hernandez Act for verifying that plans exist, and for identifying and sharing best practices, across airports to respond to security incidents inside the airport perimeter, including active shooters, acts of terrorism, and incidents that target passenger screening checkpoints. More recent actions have also been taken that correspond with requirements of the Gerardo Hernandez Act to have plans to respond to active shooter attacks and incidents targeting passenger screening checkpoints. Specifically, in March 2018, TSA issued a revised security directive to enhance security of airport public areas by identifying responsibilities for local law enforcement coverage of airport public areas, including the passenger screening checkpoints and nearby public areas. Also, in August 2018, TSA issued an information circular describing best practices identified by airport operators to mitigate against insider threats, including practices related to conducting vulnerability assessments, and escort procedures, among others. In response to other security incidents in airport public areas, TSA has taken additional actions to enhance security. Specifically, in 2017, TSA issued the Public Area Security National Framework (Public Area Framework). TSA developed the framework following a series of security summits that gathered stakeholders together to identify ways to mitigate threats against aviation and surface transportation public areas. Between September 2016 and April 2017, TSA and the DHS Office of Infrastructure Protection (now within CISA) co-hosted four public area security summits (see fig. 4). According to TSA officials, the summits leveraged an entire network of transportation and security officials— including industry, government, academic, international, and public stakeholders—to develop a set of best practices and recommendations that could help deter nefarious actors in the transportation environment. As a result of these summits, in May 2017, TSA published the Public Area Framework, which established best practices and recommendations for protecting public areas from harmful attacks. TSA officials described the summits as opportunities for stakeholders to generate meaningful dialogue and exchange ideas as opposed to developing a formal strategy or prescriptive action plan with an implementation time frame. Moreover, this official added that the framework was “intended to be a toolkit for stakeholders, designed by stakeholders.” Industry stakeholders and airport officials we interviewed reported that the security summits were beneficial for gathering key stakeholders together to determine a variety of measures to enhance security of airport public areas, some of which had already been implemented at certain airports. The Public Area Framework categorized 11 best practices across three key areas: sharing information, preventing attacks, and securing public infrastructure (see fig. 5). According to TSA officials, the report was intended to be a framework, which consisted of non-binding best practices developed by and used for aviation and surface transportation security stakeholders to implement public area security improvements in their respective operating environments. During our interviews with 10 sets of airport stakeholders—consisting of airport operators and law enforcement officials from six airports and industry representatives from four aviation trade associations—we found that all 10 stakeholder groups reported that the resulting best practices were useful in increasing their awareness of the various ways in which airports can enhance the security of their public areas. For example, airport operators at Los Angeles International Airport (LAX) and Hartsfield-Jackson International Airport (ATL) and law enforcement officials at Fort Lauderdale-Hollywood International Airport (FLL) stated that establishing an airport operations center, one of the best practices recommended in the framework, provides real-time monitoring capabilities of security-related events throughout the airport and the ability to communicate more effectively in the event of an emergency. Similarly, representatives of industry trade associations, such as Airports Council International-North America and American Association of Airport Executives, stated that enhanced law enforcement patrols throughout public areas provide a visible deterrent against potential attacks during peak travel times while also ensuring adequate resources are available to respond quickly to potential threats. As recommended in the framework, strategies to deploy law enforcement patrols are one of the most basic forms of deterring, detecting and defeating potential attacks and a part of coordinating response planning. Several stakeholders groups also added that while the framework was useful in formally documenting industry agreed upon best practices and recommendations, many of the practices, including the use of airport emergency operations centers and enhanced law enforcement patrols were already being implemented locally by various airport operators nationwide. In addition to issuing the Public Area Framework, TSA took additional actions in recent years in response to other security incidents in airport public areas led by TSA’s Policy, Plans, and Engagement (PPE) office, which was also responsible for engaging airport and surface transportation stakeholders in developing the 2017 Public Area Framework recommendations. Specifically, the TSA Modernization Act, enacted in October 2018, required TSA, in coordination with CISA, to establish a public area security working group to promote collaboration between TSA and public and private stakeholders to develop non-binding recommendations for enhancing security in public areas of transportation facilities. The act also requires TSA to periodically share best practices developed by TSA and transportation stakeholders related to protecting public spaces of transportation infrastructure from emerging threats with transportation security stakeholders. According to TSA officials we interviewed, PPE established the public area security working group in March 2019 to engage with stakeholders and update the original best practices that were developed in the 2017 Public Area Framework. TSA conducted two conference calls—March 2019 and June 2019—with the working group members to update, discuss, and validate the existing best practices. The working group consists of security stakeholders from both aviation and surface transportation modes and includes several of the same stakeholders who participated in the 2017 public area security summits to develop the 2017 Public Area Framework and associated recommended best practices. For the working group, TSA PPE officials reported that TSA selected a subset of stakeholders who were highly engaged and participatory during their prior security summits and who provided the most input during focus group discussions. According to TSA officials, many of the stakeholders previously involved in the development of the Public Area Framework—including several industry associations representing aviation and surface transportation stakeholders—are aware of ongoing issues and emerging threats. For example, while engaging with TSA during the March 2019 and June 2019 conference calls, industry stakeholders identified ways for enhancing the security of airport public areas by 1) utilizing various technologies, such as public address notification systems throughout airports, to better communicate instructions during and after security incidents occur in the public area, and 2) establishing clearer guidance and protocols for resuming business operations after a security incident, such as rescreening passengers and positively identifying lost baggage in the terminal area. Moreover, stakeholders cited the growing concerns about the emergence of unmanned aircraft systems, such as drones, which pose risks to securing airport public areas. In late October 2019, in accordance with the TSA Modernization Act, TSA issued a report listing best practices and recommendations to secure transportation public areas. This report summarizes the working group’s effort to review and update prior best practices cited in the 2017 Public Area Framework as well as identify current challenges. For example, the updated report provides specific tools and resources for enhancing situational awareness, such as resource guides providing informational materials, fact sheets, research reports, and online training videos. Specifically, one of the resource guides highlights security of soft targets and crowded places—sports venues, shopping areas, schools, and transportation systems—as locations that are easily accessible to large numbers of people that have limited security measures in place making them vulnerable to attack. For example, the guide describes how TSA focuses its effort on securing aviation and high-risk locations by deploying law enforcement and canine teams to serve as a visible deterrent. Other resources include a fact sheet regarding challenges posed by unmanned aircraft systems and a research report regarding mass attacks in public spaces, among others. Moreover, the updated report highlights the benefits of an airport operations center, including enhanced communication capabilities and situational awareness. Although TSA and stakeholders have taken actions in response to other security incidents in airport public areas, TSA has not fully developed a plan for future engagement with stakeholders to update security best practices and ensure they are current, relevant, and reflective of any new transportation security advancements or new and emerging threats. According to the October 2019 updated report, TSA intends to engage with stakeholders on a periodic basis to affirm partnerships. However, TSA has not yet clearly defined roles and responsibilities for stakeholders or how frequently to engage with them, such as on a quarterly, semi- annual, or annual basis. The TSA Modernization Act requires TSA to periodically share best practices for protecting transportation public areas. Additionally, both the 2017 Public Area Framework and updated report from the working group emphasize the importance of continuing partnerships efforts and identifying solutions to improve public area security. For example, the working group’s updated report issued in October 2019, in accordance with the TSA Modernization Act, highlighted TSA’s role to build upon the work already accomplished in developing the Public Area Framework’s best practices and recommendations. Additionally, our prior work has identified leading practices that can help sustain collaboration, such as developing a plan identifying roles and responsibilities for parties included in the collaborative effort. Further, standards for project management call for developing a plan with specific actions and time frames. TSA officials stated that they expect to better determine future plans for stakeholder engagement sometime after TSA issues its mandated report on the public area security working group to Congress in March 2020. However, TSA officials told us they currently have no specific plans outlined regarding the process or frequency with which they will engage stakeholders in the future on public area security best practices. By developing a plan that outlines the roles and responsibilities of the working group members, the mechanisms through which the working group will collaborate, and the frequency of when the working group will meet, TSA would be better positioned to ensure the best practices cited by aviation and surface transportation stakeholders remain relevant and emerging threats are proactively identified. Aviation stakeholders—consisting of airport operators, law enforcement officials, airline representatives, among others—have taken a series of actions in response to security incidents that followed the 2013 LAX shooting, consistent with the best practices outlined in TSA’s Public Area Framework. On the basis of our observations and interviews at six airports, we found that aviation stakeholders have taken actions consistent with the best practices identified in the 2017 Public Area Framework—including those related to attack prevention and information sharing—and engaged with industry association representatives to better understand key efforts involved in securing airport public areas. Collectively, these efforts represent a series of actions taken by stakeholders in response to the 2013 LAX shooting, the 2017 FLL active shooter incident, or a combination of TSA requirements to enhance their security posture in securing airport public areas. Attack Prevention: Establish Airport Operations Center. One of the practices cited in the framework under preventing attacks in airport public areas is establishing an airport operations center, which calls for a unified command center to respond to airport security incidents. As cited in the Fort Lauderdale after action report, airport operators and law enforcement personnel experienced coordination challenges in responding to the active shooter incident because of inadequate communication capabilities, including interoperable communications and lack of a dedicated space to coordinate and deploy resources, among others things. Three of the airports we visited—Los Angeles, Atlanta, and Fort Lauderdale—had a dedicated airport operations center in place. During our site visit to Los Angeles, we toured the Airport Response Coordination Center which provides 24/7 response coordination capabilities between LAX airport operators and federal, state, and local law enforcement personnel (see fig. 6). LAX security officials told us that the coordination center provides real-time situational awareness of security-related incidents across the entire airport through monitoring closed-circuit television, as well as direct communications with federal and local law enforcement partners. Moreover, LAX security officials reported that the coordination center also houses the Incident Management Center which is activated as an emergency command center designed to integrate resources for all airport divisions and law enforcement agencies in response to a major security incident. Similarly, Atlanta and Fort Lauderdale had dedicated airport operations centers, including a comparable Incident Management Center, equipped with dedicated work stations, designated color-coded vests, secure video teleconference capabilities, and a mobile command center. Attack Prevention: Develop, Conduct, and Practice Exercises and Response Drills. The Public Area Framework also contained a recommendation that transportation stakeholders develop and conduct exercises and response drills to prepare for real-world incidents and identify potential obstacles to responding effectively. These collaborative engagements are intended to help develop strategies for incident management, such as resuming airport business operations—including evacuating civilians during a law enforcement response, securing and returning abandoned luggage, and rescreening passengers, among other tasks—and identify areas requiring additional coordination. For example, in August 2017, as a follow-up to the framework, the summit commissioned a new working group to specifically address incident response, recovery, and reconstitution. Specifically, the Intermodal Security Training and Exercise Program (I-STEP) developed and conducted a tabletop exercise focused on “Resumption of Trade” following an incident. The exercise was designed for aviation stakeholders—airport operators, law enforcement officials, and airline representatives, among others—to discuss, identify, and improve collective capabilities in responding to physical security incidents at airports and facilitating the orderly re-establishment of airport operations. The exercise assessed stakeholders’ ability to quickly and accurately 1) communicate critical information during and after a security incident in an airport public area, 2) evacuate passengers, employees, and vendors after a security incident, and 3) restore airport operations following a security incident. These training goals stemmed from the lessons learned from the 2017 FLL shooting as well as stakeholders’ discussions during the summits around developing best practices. According to airport operators at Ronald Reagan Washington National Airport (DCA), I-STEP was well received by airport security stakeholders because it was an event that incorporated several key stakeholders’ perspectives at one time and presented an opportunity for constructive viewpoints to be shared. As a result of the I-STEP training exercise, TSA issued an after action report identifying strengths and lessons learned in resuming airport operations, and highlighted areas for improvement including 1) better coordination to ensure all airport vendors and stakeholders receive standardized active shooter training and 2) consideration of the impacts and risks associated with plainclothes law enforcement and lawfully-armed individuals responding to an active shooter incident, among others. Airport stakeholders we met with at DCA also shared examples of locally sponsored training exercises. For example, airport officials stated that table top exercises—discussions amongst emergency response personnel regarding the various roles and responsibilities during an airport emergency response situation—are frequently held at DCA and most focus on the need for better communication. DCA officials added that quarterly training drills are hosted for nearby county law enforcement and fire department officials to better familiarize themselves with DCA airport operations, layout, and prestaging areas. Information Sharing: Enhance Situational Awareness. Airport operators we met with also shared their experiences with implementing best practices and recommendations cited in the Public Area Framework to enhance situational awareness and expand threat awareness education. For example, during our site visit to FLL, one senior airport security official shared examples of actions undertaken in response to the FLL after-action report to enhance workforce employee training and threat awareness education. This included the development of an active shooter training program required for all airport workers, such as airport concessionaires and rental car operators; and enhancing the airport’s credentialing program to better distinguish certain workers requiring access to the secure area, and validate that active shooter training has been completed. Similar to FLL, according to the Public Area Framework, Boston’s Logan International Airport and ATL have implemented vetting programs that include the issuance of identification cards for airport workers on the public side of airports. According to aviation stakeholders, issuing public side credentials allow the airport to have better awareness of who is working within their environment, thereby enhancing overall situational awareness within airport public areas, a practice recommended in the Public Area Framework. Airports we met with have also taken actions that are generally consistent with its three main categories, including infrastructure and public protection. For example, in an effort to enhance the security of airport public areas, several airport operators and law enforcement officers we met told us that they regularly deployed enhanced law enforcement teams to patrol public spaces, including ticketing counters and baggage claim areas, among others. These specialized law enforcement teams— equipped with assault rifles, body armor, and canine teams—patrol airport public areas to provide a visible deterrent against criminal or terrorist activities and provide immediate law enforcement response capabilities. While these enhanced law enforcement teams were initially deployed in response to the LAX shooting, LAX security officials we met with stated that their continued presence in the public areas provides a strong deterrent. During a site visit to LAX, we observed two sets of tactical law enforcement teams patrol the Bradley International Terminal and American Airlines ticketing counter areas. One of the patrol teams included an explosives-detection canine and his handler (see fig. 7). These enhanced law enforcement teams also conduct training exercises to detect explosives that may be hidden throughout airport public areas, such as large atriums and baggage claim areas. These efforts are consistent with TSA airport security requirements and guidance provided in TSA’s Law Enforcement Reimbursement Program. For example, during the site visit to ATL, we observed Atlanta Police Department tactical law enforcement response teams patrol the large atrium meeting area—consisting of restaurants and shops—from an elevated position (see fig. 8). Similarly, during a site visit to FLL, we observed the Broward County Sherriff’s Office deploy an enhanced law enforcement team with an explosives-detection canine succeed in identifying hidden explosive materials inside a handbag during a training exercise in the baggage claim area, the exact location of the January 2017 active shooter attack (see fig. 9). In addition, Charleston International (CHS) airport deployed an active shooter detection system to enhance the security of airport public areas. The Shooter Detection System is a network of sensors placed throughout airport public areas that identify acoustic gunshot signatures and track the movements of a potential active shooter in real time through security camera footage (see fig. 10). According to senior CHS airport officials, the 2015 Emanuel African Methodist Episcopal Church shooting in Charleston that claimed the lives of nine area residents, significantly influenced the airport’s decision to search for active shooter technologies. Charleston County Aviation Authority and senior CHS airport officials reported that the detection system became operational in December 2018. Aviation industry stakeholders, such as those from Airports Council International-North America and American Association of Airport Executives, plan to further research technologies to enhance the security of airport public areas. While CHS is the first U.S. commercial airport to install an active shooter detection system in ticketing counter and baggage claim areas, aviation industry officials stated that several airports nationwide are considering installing similar systems. Attacks in the public areas of both domestic and foreign airports— including Los Angeles, Fort Lauderdale, Brussels, and Istanbul—have prompted TSA and aviation security stakeholders’ efforts to enhance the security of airport public areas. In accordance with the October 2018 TSA Modernization Act, TSA established a public area security working group to build upon the best practices and recommendations previously cited by stakeholders in the 2017 Public Area Framework. The actions taken by TSA and aviation security stakeholders represent a collective effort to enhance the security of airport public areas. Similarly, airport security stakeholders we interviewed took actions consistent with the best practices identified in the 2017 Public Area Framework, such as establishing a unified airport operations center, deploying enhanced law enforcement teams, and using technologies to identify the whereabouts of an active shooter, among others. However, TSA has not fully developed a plan that outlines the roles and responsibilities of the working group members, collaboration mechanisms amongst the working group, and frequency in which the working group will meet. By developing such a plan, TSA would be better positioned to ensure that the working group is proactively meeting to identify and share emerging threats and best practices, instead of reconvening in the aftermath of another security incident involving an airport public area. The Administrator of TSA should develop a plan outlining roles and responsibilities for members of the Public Area Security Working Group, the mechanisms for collaborating, and the frequency of the working group meetings. We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reproduced in appendix I. DHS concurred with our recommendation and described actions to address it, such as developing Public Area Security Working Group guidelines to include roles and responsibilities, mechanisms of collaboration, and frequency of working group meetings by June 30, 2020. These efforts, if fully implemented, should address the intent of the recommendation. DHS also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. William Russell (202) 512-8777 or RussellW@gao.gov. In addition to the contact named above, Christopher Ferencik (Assistant Director), Katrina Taylor (Analyst-in-Charge), Pamela Davidson, Josh Diosomito, Eric Hauswirth, Thomas Lombardi, Herbert Tinsley, and Adam Vogt made significant contributions to this report.", "summary": "Threats to public areas of airports have increased in recent years. TSA is responsible for civil aviation security, which includes ensuring the security and safety of aircraft and the traveling public. In November 2013, an armed individual entered the Los Angeles International Airport (LAX) and killed a Transportation Security Officer. Subsequent domestic and international attacks in airport public areas further emphasized the need to better secure these areas. In response, Congress has taken action—including passage of the 2015 Gerardo Hernandez Act and the 2018 TSA Modernization Act—to address incident planning and response at airports and the security of public areas of transportation facilities, including airports. GAO was asked to assess actions taken to secure the public areas of TSA- regulated airports. This report (1) describes actions TSA has taken in response to the LAX shooting and the Gerardo Hernandez Act, and (2) examines additional actions taken in response to subsequent security incidents and the TSA Modernization Act. GAO reviewed TSA reports issued after airport attacks; the Gerardo Hernandez Act and TSA Modernization Act; and other TSA documents related to securing public areas. GAO also conducted interviews with and obtained information from TSA and officials from a nongeneralizable sample of 6 TSA-regulated airports, selected based on factors such as size and location. The Transportation Security Administration (TSA) took several actions in response to the 2013 Los Angeles International Airport (LAX) shooting and the Gerardo Hernandez Airport Security Act of 2015. Specifically, TSA took several actions to better address airport security in public areas, including strengthening and mandating active shooter training drills and installing duress alarms at screening checkpoints, among other things. In response to the Act, TSA updated guidance for reporting suspicious behavior and revised directives identifying responsibilities for local law enforcement coverage of passenger screening checkpoints and nearby public areas, among other actions. In response to subsequent airport public area security incidents, such as those in Fort Lauderdale in 2017 and Brussels and Istanbul in 2016, TSA has taken additional actions. Specifically, TSA issued the Public Area Security National Framework in 2017, in coordination with various aviation security stakeholders. The framework categorized 11 best practices and non-binding recommendations for improving security of public areas, including sharing information and preventing attacks. Aviation security stakeholders have also implemented various actions consistent with these best practices, including establishing airport operations centers and deploying enhanced law enforcement teams to serve as a visible deterrent in airport public areas (see figure). In response to the TSA Modernization Act, TSA established a public area security working group in March 2019 to engage with stakeholders such as airport operators and industry associations and update and validate the best practices cited in the 2017 framework. This group met twice in 2019, but TSA has not outlined specific plans for engaging this group in the future. Developing a plan outlining the roles and responsibilities of the working group members, the mechanisms through which the working group will collaborate, and the frequency of when the working group will meet, would better position TSA to ensure the best practices cited by stakeholders remain relevant and emerging threats are proactively identified. GAO recommends that TSA develop a plan for future stakeholder engagement on the security of airport public areas. DHS concurred with the recommendation.", "document_type": "gao"}
{"report": "The activities and resources required to suppress wildfires generally belong to the states and federal agencies with land management missions, such as the U.S. Forest Service and four bureaus (Bureau of Land Management, Bureau of Indian Affairs, National Park Service, and U.S. Fish and Wildlife Service) within the U.S. Department of the Interior. FEMA can provide reimbursement to help support wildfire suppression (e.g., labor costs for overtime or seasonal personnel involved in fire suppression activities). When a wildfire burns on nonfederal lands and threatens to become a major disaster, a state governor or governor’s representative may request federal assistance via a Fire Management Assistance Grant (FMAG) administered by FEMA. While the fire is burning, a governor’s office can submit a verbal request for an FMAG to the designated FEMA regional office, followed within 14 days by a formal written request. The regional administrator then either approves or denies the request after consulting with relevant officials from the U.S. Forest Service or bureaus within the U.S. Department of the Interior about technical aspects of the fire. Eligible FMAG costs include, among other things, equipment and supplies, labor costs, travel and per diem, temporary repairs of damage caused by firefighting activities, mobilization and demobilization of resources, and limited costs of pre-positioning fire prevention or suppression resources. From fiscal years 2009 through 2018, FEMA awarded 374 FMAGs totaling $952,318,049. The average FMAG during this timeframe was about $2.5 million. The state of California received the majority of those grant funds—over $543 million. Figure 1 below illustrates the states that received FMAGs during this 10 year period, figure 2 provides annual FMAG totals, and figure 3 provides a breakout of the dollars distributed by state for this same 10 year period. If a wildfire increases in size and intensity in a manner that overwhelms the ability of state, tribal, territorial or local governments to respond and recover effectively, a state or tribal government can request and the President can approve a major disaster declaration, as with other types of disasters (e.g., a hurricane or flood). A disaster declaration is the primary mechanism by which the federal government gets involved in funding and coordinating response and recovery activities. Under the National Response Framework, the Department of Homeland Security (DHS) is the federal department with primary responsibility for coordinating disaster response, and within DHS, FEMA has lead responsibility. From fiscal years 2009 through 2018, a total of 19 major disasters were declared as a result of wildfires. Figure 4 shows the number and locations of these major disaster declarations. Once a major disaster is declared, FEMA can provide funds for response and recovery efforts through the Disaster Relief Fund and coordinate other federal support through the National Response Framework’s 14 Emergency Support Functions. Federal assistance following a major disaster declaration includes the following: Individual Assistance: FEMA’s Individual Assistance programs provide assistance directly to individuals and households, as well as state, local, tribal, and territorial governments to support individual survivors. This assistance covers necessary expenditures and serious needs that cannot be met through insurance or low-interest loans, such as temporary housing assistance, counseling, unemployment compensation, or medical expenses. See appendix I for a further description of FEMA’s Individual Assistance program. Public Assistance: FEMA’s Public Assistance program provides supplemental federal disaster grant assistance to state, local, tribal, and territorial governments and certain types of private nonprofit organizations for debris removal, emergency protective measures, and the restoration of disaster-damaged, publicly-owned facilities and the facilities of certain private nonprofit organizations. The eligibility rules outline the types of damage that can be reimbursed by the federal government and steps that federal, state, and local governments must take in order to document eligibility. If the debris on private property is determined to be so widespread that it threatens the health, safety, or economic recovery of the community, FEMA may determine that debris removal from private property, including contaminated soil, is eligible for reimbursement under the Public Assistance program. An applicant (a state, territorial, or tribal government) may contract for debris removal. Alternatively, if an applicant lacks the capability to perform or contract for debris removal, the applicant may request that the federal government perform the work. In such cases, FEMA may task another federal agency, typically the U.S. Army Corps of Engineers (USACE), to perform or contract the work by issuing a mission assignment (see description below). See appendix I for a further description of FEMA’s Public Assistance program. Mission Assignment to Other Agencies: FEMA can fulfill disaster response needs through mission assignments—work orders it issues to another federal agency to provide a service or other response need. For example, FEMA may request medical teams from the Department of Health and Human Services and logistical support from the Department of Defense. Hazard Mitigation Grant Program: This program is designed to improve disaster resilience—the ability to prepare and plan for, absorb, recover from, and more successfully adapt to disasters—during recovery. The program funds a wide range of projects, such as use of non-combustible materials on new and existing homes to mitigate risk from future wildfires, adding shutters to windows to prevent future damage from hurricane winds and rains, and rebuilding culverts in drainage ditches to prevent future flooding damage. Table 2 below shows money obligated for Individual Assistance, Public Assistance, mitigation efforts, operations (including mission assignments), and administrative costs for the 19 major disaster declarations resulting from wildfires from fiscal years 2009 through 2018. The U.S. Forest Service within the Department of Agriculture and the Bureau of Indian Affairs, Bureau of Land Management, U.S. Fish and Wildlife Service, and National Park Service within the Department of the Interior, are responsible for managing wildfires on federal lands. Wildfire management consists of three primary components: 1. Preparedness involves acquiring and positioning firefighting assets. 2. Suppression involves selecting among strategies to extinguish or contain a fire, with the aim of protecting firefighters and public safety and using the minimum resources necessary. 3. Fuels Reduction involves acting in advance of wildfires to manage vegetation with the aim of reducing the intensity, severity, or negative effects of a wildfire. We are currently reviewing federal fuel reduction efforts, and how those efforts consider community protection, and plan to issue a report on the subject later this year. State forestry agencies and other nonfederal entities—including tribal, county, city, and rural fire departments—have primary responsibility for managing wildfires on nonfederal lands, and share responsibility for protecting homes and other private structures. When a wildfire occurs on nonfederal lands and begins to exceed the state or local entity’s ability to effectively respond to the wildfire, the state or local entity may seek assistance from neighboring jurisdictions, typically through prescribed mutual aid agreements. For example, during wildfires in California in October and December of 2017, the California Governor’s Office of Emergency Services used the California fire and rescue and law enforcement mutual aid systems, along with the national Emergency Management Assistance Compact to mobilize and organize a large number of emergency services. In total, according to California Governor’s Office of Emergency Services, over 400 state and local government and 200 out-of-state fire departments sent engines, crews, and other assets to assist the local firefighting efforts. When a state or local jurisdiction needs further firefighting assistance, it may request additional support through Geographic Area Coordination Centers overseen by the National Interagency Fire Center. Once a Geographic Area Coordination Center has exhausted the resources it can provide, it can turn to the National Interagency Coordination Center within the National Interagency Fire Center for further assistance. For wildfire disaster declarations from 2015 to 2018, FEMA provided a variety of assistance to state and local emergency management officials consistent with roles and responsibilities in the National Response Framework and National Disaster Recovery Framework. Specifically, FEMA helped these jurisdictions by reimbursing some fire suppression costs, supporting state-led efforts to coordinate the response and provide for the immediate needs of displaced survivors, and helping localities plan and execute recovery. FEMA has obligated over $2.4 billion to assist in response to and recovery from these disasters to date. As previously discussed, although states and other federal agencies have primary responsibility for fire suppression, some state and local fire suppression costs are eligible for reimbursement through FMAGs. Most wildfire-affected states and localities in our scope received this kind of fire suppression support from FEMA initially in the form of the FMAGs. As the fires ultimately led to major disaster declarations, any funding that FEMA would have provided through the FMAGs were ultimately provided under Public Assistance as part of the declaration. To support state-led response and provide for the immediate needs of displaced survivors, FEMA deployed staff to assist in state Emergency Operations Centers and secured needed resources for mass care—such as cots to help with temporary sheltering, according to state officials. In addition, FEMA assigned federal agencies to perform various missions to help with disaster response. For example, the Environmental Protection Agency provided hazardous material cleanup of damaged properties, and USACE provided public works services, such as contracting for debris removal. As response activities continued and recovery began, FEMA and the state emergency management agencies established Joint Field Offices, which are temporary field offices established to coordinate federal and state efforts in disaster response and recovery, and provided resources to help individual disaster survivors with community services and housing needs. For example, following wildfires in November 2018—including the Camp Fire in Butte County—FEMA provided over $55 million to survivors to reimburse them for the cost of temporary lodging and rentals after their homes were destroyed. In addition, FEMA provided funding and support to local jurisdictions to help address community infrastructure needs. For example, FEMA obligated money to pay for wildfire debris removal from public property as well as from private property, given the widespread effect on the community of toxic fire debris. Also to support recovery, in coordination with state and local entities, FEMA established and staffed Disaster Recovery Centers, which are facilities or mobile offices where survivors can go for information about FEMA programs or other disaster assistance programs. Representatives from the relevant state agencies, FEMA, U.S. Small Business Administration, volunteer agencies, and other agencies were at the centers to answer questions about and help survivors apply for disaster assistance and low-interest disaster loans for homeowners, renters, and businesses. Finally, to assist local jurisdictions with longer-term recovery, FEMA provided assistance to some locally-led long-term recovery activities designed to address housing and other survivor needs in the community. Table 3 shows the amount of assistance FEMA provided for each of the six major disasters that we reviewed, and Appendix II provides a more detailed breakdown of each major disaster, including a map of each disaster, the number of structures that were destroyed, and mission assignment data. State and local officials we spoke with reported practices that aided in wildfire response and recovery and also experienced challenges that arose in multiple jurisdictions across different disasters. When asked what worked well, officials from three out of the six California counties told us that FEMA and the California Governor’s Office of Emergency Services collaborated effectively during response and recovery efforts. For example, one of the three counties reported that when posing questions or concerns to the California Governor’s Office of Emergency Services, they were able to quickly obtain answers or further information and get help navigating complex issues. As we reported in 2018, according to officials in the California Governor’s Office of Emergency Services and FEMA, they have developed a strong relationship with each other over time, which helps both agencies deliver consistent, unified information to stakeholders and disaster survivors. Local officials also praised FEMA’s role in helping to set up and operate Disaster Recovery Centers. Officials in four of the six California counties that we interviewed noted that FEMA was quick to send staff to assist local jurisdiction staff and disaster survivors at the facilities established to provide assistance, such as Local Assistance Centers (generally activated by the county in the immediate wake of a disaster to provide government services to survivors) and Disaster Recovery Centers established by FEMA. For example, one of these counties noted that FEMA had staff available at their Local Assistance Center to support requests for Individual Assistance and other items shortly after the disaster was declared, and the county received positive feedback from the public about the varied types of support provided by experienced staff at their Local Assistance Center. Officials in one of the counties mentioned above, as well as FEMA officials, cited as good practices efforts to bring together local and state providers of governmental services to provide a variety of assistance in one place. For example, FEMA credited one county for their efforts in partnering with a local mental health service provider to offer mental health counseling on site at a Disaster Recovery Center, as opposed to referring individuals to such services off site. Similarly, one Disaster Recovery Center we visited in California included representation from a number of different state agencies, such as the state’s contractors’ licensing board, insurance regulators, department of employment opportunities, and franchise tax board. Officials explained that being able to access a variety of state services in a Disaster Recovery Center can be particularly helpful for fire survivors, as they may have evacuated their homes with very little notice and lost all their identifying documentation to the fire. State and county officials described challenges that were present in several of the wildfire disaster declarations that we reviewed. Some of these challenges—such as a complex Public Assistance application process or FEMA staff turnover—are not specific to wildfires and could also affect recovery efforts after a hurricane, flood, or other natural disaster. Some challenges were more specific to and further complicated by the nature of wildfire disasters. These challenges include the complexity and scale of fire debris removal, shortage of temporary housing for wildfire survivors, and lack of local experience dealing with the magnitude of the wildfires encountered in 2017 and 2018. Officials in three of the seven counties we met with said that the onerous and confusing documentation required when applying for Public Assistance grants was a challenge. For example, an official from one county told us that the Public Assistance guidance in effect at the time his county was recovering from disaster contained conflicting information, though he believed this issue has since been resolved. Officials in two counties also described difficulty meeting the deadlines for application submission, especially while managing the other demands of disaster response and recovery. We have previously reported on challenges with FEMA’s administration of the Public Assistance program, including effectively overseeing and staffing the program, among other things. Officials from FEMA’s Public Assistance Division acknowledged that the complexity of the program has been a challenge for local officials in recent years. The officials pointed to the development of a new Public Assistance delivery model as the key initiative to address these challenges. This new delivery model, which includes a new information portal designed to improve local officials’ ability to upload and submit information, was intended to clarify program requirements, improve operations, and respond to previously-identified challenges, according to FEMA officials. FEMA introduced the new model in California during the recovery phase of the 2017 wildfires. Officials from two of the selected counties stated that the new information portal eased the process of submitting documentation for FEMA review. In 2017, we reported on the historical challenges with FEMA’s Public Assistance program and identified additional challenges with the roll-out of the new delivery model, including the need to determine its staffing needs for supporting rollout of the system and strengthen controls over the information system being used. California officials we spoke with also noted that in order for the new delivery model to be used efficiently, it would be helpful for FEMA to provide additional training to stakeholders who use the system. According to FEMA officials, FEMA provided a number of training sessions on the new model to California stakeholders between August 2017 and April 2019. Officials in three of the seven selected counties told us that frequent rotations of FEMA staff during disaster response and recovery was disruptive. For example, after working with state and local officials following a disaster, the rotations of FEMA staff resulted in having to re- share information that was already provided to FEMA, as well as inconsistent advice or interpretation of FEMA guidelines. FEMA officials acknowledged that ensuring continuity following staff turnover has long been an issue in multiple complex disaster environments. They noted a number of reasons why a staff member in a position might turn over. For example, according to FEMA officials, the disasters in 2017, including Hurricanes Harvey, Irma, and Maria, as well as the California wildfires, required FEMA management to redeploy response personnel from one disaster to the next. We have reported on multiple FEMA workforce challenges in prior work and continue to observe workforce challenges in our ongoing work. We are currently reviewing how FEMA deploys and trains staff to meet disaster mission needs and plan to report early in 2020. Debris removal is an important first step in the disaster recovery process, allowing communities to expedite the recovery process by restoring accessibility to public services and space, while ensuring public health and safety in the aftermath of a disaster. Debris removal posed several challenges for state and local jurisdictions affected by the wildfires. Wildfires typically leave no remaining structure, and the resulting ash contains contaminants that must be carefully removed, wrapped, and disposed of before survivors can move back to their properties. This can make the wildfire debris removal process costlier and more complicated than for other types of disaster debris. California’s Department of Resources, Recycling, and Recovery typically handles debris removal after local disasters in the state, but it did not have the capacity to handle the high volume of debris caused by the 2017 Northern California wildfires. As a result, the state asked FEMA to assign USACE with the debris removal mission. According to local officials, there was some confusion over how much contaminated soil should be removed from some properties. Specifically, in some cases, USACE removed more soil than necessary at home sites in an attempt to “scrape” the soil deeply enough to remove all possible contaminants at the site; however, this did not take into account that some contaminants, such as arsenic, occur naturally in the soil. As a result, some property owners were left with large over-excavated pits on their property that needed to be filled in before rebuilding could occur. Figure 5 shows a property site that, according to local officials, had been excavated below the foundation of the home and thus needed to be refilled with soil, complicating the rebuilding effort. In addition, officials from one county stated that USACE staff rotations made it difficult for state and local officials to communicate debris removal options clearly both internally and to the public, leading to confusion among some survivors about their best options for debris removal. In 2018 and 2019, we reported on issues with contracting for wildfire debris removal. We found that USACE’s debris removal contracts, while broad enough to cover any type of debris, had been used primarily to manage hurricane debris removal and did not address issues posed by wildfire debris removal. We also found that miscommunication at the federal level resulted in differing expectations between USACE and state and local officials about debris removal work to be performed, such as the types of structures to be removed from private property and acceptable soil contamination levels. According to USACE officials, they relied on FEMA to manage communication with states and localities and to identify and manage expectations about the scope of work to be performed. We recommended, among other things, that FEMA take the lead to work together with USACE to revise the mission assignment policy and related guidance to better incorporate consideration of contracting needs and to ensure clarity of contracting-related coordination responsibilities. DHS concurred with this recommendation and reported that it will take steps— such as development of mission assignment project management tools and training for mission assignment work—to implement it. According to DHS’s 2017 National Preparedness Report, providing effective and affordable temporary housing for disaster survivors has been a longstanding and continuing challenge. Wildfires pose an additional challenge because in contrast to disasters such as hurricanes or floods where there may be a substantial portion of a home left standing, and property may be habitable after the most dangerous debris is removed, wildfires generally destroy entire structures and leave a pile of contaminated debris and soil. This kind of damage requires a lengthier clean-up and necessarily precludes survivors from occupying the property until state and local officials declare the lot safe for habitation. In the meantime, one of FEMA’s responsibilities under the Mass Care, Emergency Assistance, Temporary Housing and Human Services Emergency Support Function is to help displaced disaster survivors with access to temporary housing. This has posed challenges for some of the counties we spoke with, most notably in select Northern California communities. In particular, officials in two California counties noted that vacancy rates are very low in these areas, and there were few places to house survivors who were either waiting to rebuild on their property or had been living in rental properties that were destroyed. In addition, in one California county there have been a limited number of potential sites available (such as commercial parks or group sites) to place transportable temporary housing units. According to FEMA, several factors limited the number of commercial or group sites available for such housing units, including limited space for the housing units, contaminated utilities, and challenges with local jurisdictions responsible for deciding whether and where to place group sites. According to FEMA officials, the nature of fire debris affects the array of post-disaster housing options that FEMA can offer through its Individual Assistance program. For example, although FEMA can provide replacement assistance for destroyed homes and repair assistance for homes with damage that can be repaired, the complete destruction of homes due to fires significantly lengthens the recovery processes. Rental assistance and lodging reimbursement are limited by lack of access to rental properties, and the use of manufactured housing units is limited by lack of group sites that meet requirements, including adequate space for such units and access to utilities (e.g., potable water not contaminated by fire damage). See Appendix I for more information on this program. FEMA officials acknowledged that providing housing for survivors has long been a challenge for the agency. They also acknowledged that several of FEMA’s housing tools are less relevant to wildfires versus other disasters (as discussed above). According to FEMA, the agency is currently reviewing various aspects of its housing mission to better identify ways to address some of these challenges. Officials from two of the counties we spoke with said that their lack of experience in response to and recovery from wildfires of the magnitudes encountered was very challenging. Officials from one of those counties stated that they did not have the knowledge or skill-set needed at the local level to best identify response and recovery needs and relied heavily on FEMA and California’s Governor’s Office of Emergency Services for resources and training in these areas. Officials from another county stated that neither they nor FEMA were accustomed to the level of destruction in a rural area, which created challenges identifying resources and processes to remove damaged trees from private property, storing the volume of downed trees, and maintaining the few roads available for hauling debris. Officials from another county in California described being unprepared when they were tasked with collecting duplicate payments for private property debris removal after survivors received their insurance benefits. Residents who participated in the private property debris removal program who were paid out of FEMA’s Public Assistance program, and subsequently also received an insurance benefit for debris removal, were required to repay the federal government for the duplicate benefit. According to these county officials, they were not aware that collection would be their responsibility until about 2 years after the initial debris removal took place. The officials noted that the administrative burden for identifying the affected homeowners and the amount owed and then collecting the payments was significant, and taxed their administrative capacity. They said they wished they had been aware sooner that they would have to absorb this duty, so they could put systems in place. According to FEMA and state officials, however, these requirements were included in FEMA’s Public Assistance Program and Policy Guide, which states that local governments are responsible for implementing private property debris removal, including the requirement to collect and reimburse FEMA for any duplicate benefits. Nevertheless, the confusion described by the county government illustrates the difficulty jurisdictional officials with little previous wildfire experience can have navigating complex program rules while simultaneously confronting the disaster aftermath. In June 2019, FEMA Region IX—which provides disaster assistance in California—finalized the after-action report for the October and December 2017 wildfire disasters in Northern and Southern California. FEMA’s 2017 wildfire after-action report offered response and recovery lessons learned from both the challenges identified and successful practices. Some, but not all, of these were mirrored in our interviews with California jurisdictions that were affected by recent wildfires. Among its findings, the 2017 wildfire after-action report identified several areas for improvement. For example, FEMA’s immediate activation of the Transitional Sheltering Assistance program and lack of a unified information system to track applicants’ eligibility for all Individual Assistance programs at the time of the wildfires resulted, in some instances, in applicants receiving sheltering benefits inappropriately (i.e., receiving Transitional Sheltering Assistance benefits despite their residence being undamaged). One potential action to address this challenge identified in the report was to add information on Transitional Sheltering Assistance program applicants into the database that FEMA uses to track disaster information to ensure those applicants have access to all benefits and reduce the potential for duplication. FEMA officials have stated that since the 2017 wildfires, policy changes have been made to address this issue, including adding Transitional Sheltering Assistance program applicant data to the information system used to track eligibility for all Individual Assistance programs. In addition, FEMA reported that the typical contracts USACE had in place for debris removal were not designed to address the nature (i.e., fire- related debris) and scope of work required, particularly with respect to private property debris removal. The agencies worked together to rapidly scope the statements of work for the debris removal contracts to provide services to survivors, but FEMA ultimately found that the contract requirements lacked detail and clarity, resulting in additional costs. USACE prepared its own after-action report after the 2017 wildfires, which also identified challenges with the scope of its debris removal contracts and the mission assignment task orders, and planned to incorporate lessons learned in future debris removal contracts. According to FEMA Region IX officials, many of the issues regarding debris removal stemmed from not having documented processes in place to govern wildfire debris removal specifically. In its after-action report, FEMA identified potential actions to address these challenges—such as developing standard operating procedures in coordination with USACE for fire debris removal—to correct these and other identified areas for improvement. According to USACE officials, FEMA subsequently provided funds through a 2018 wildfire disaster declaration to USACE to develop such standard operating procedures. USACE officials told us they had shared these procedures with FEMA and stated that the procedures will help guide future wildfire private property debris removal operations. The 2017 after-action report also identified a number of strengths and best practices during 2017 wildfire response and recovery efforts in California. For example, the report noted that collaboration and pre- existing relationships between federal and state personnel helped to overcome knowledge gaps about certain programs and improved survivor outcomes (such as the placement of temporary housing units based on work done by an interagency task force). In addition, Facebook provided FEMA with pre- and post-disaster survivor locations (provided voluntarily by the survivor) that helped identify where survivors were located after the wildfires. Using this information, FEMA then worked with the state and private sector in order to help plan for short- and long-term housing solutions. Standards for Internal Control in the Federal Government state that management should identify, analyze, and respond to significant changes that could impact its internal control system, which would include actions established through policies and procedures. Agency management, therefore, should analyze the effect of identified change on policies and procedures and revise such policies and procedures—and other elements of its internal control system—on a timely basis to maintain effectiveness. The combination of back-to-back devastating wildfire seasons in California, overall upward trends in wildfire disaster declarations, and several factors that point to increased likelihood of severe wildfire activity in the future suggest a change that may have significant impacts on FEMA’s operating environment. As shown in figure 6, from 1953 to the present, the number of major disaster declarations from wildfires has increased in nearly every decade since 1950 and most dramatically in the last two decades. During Congressional testimony from March 2018, FEMA’s Region IX Administrator stated that fire season has changed from covering spring through early fall to a now year-round event, and that the unprecedented impacts from the 2017 wildfire season would linger for years to come. Land use practices and climate trends increase the likelihood that severe and intense wildfires will affect people and communities. As we have described in previous reports, land use practices over the past century have reduced forest and rangeland ecosystems’ resilience to fire. Land use practices like fire suppression and timber harvesting have contributed to abnormally dense accumulations of vegetation. These accumulations can fuel uncharacteristically large or severe wildfires. At the same time, development occurring in and around wildlands—an area often called the wildland-urban interface—has increased, placing more people, businesses, and infrastructure at risk. The wildland-urban interface contains 46 million single-family homes, representing about 40 percent of single-family homes in the United States. According to the 2014 Quadrennial Fire Review, 60 percent of new homes built in the United States since 1990 were built in the wildland-urban interface. As the footprint of human activity and settlement into the wildland-urban interface expands, the risk of fire exposure to people and property is expected to increase further. In addition, changing climate conditions, including drier conditions in certain parts of the country, have increased the length and severity of wildfire seasons, according to many scientists and researchers. For example, in the western United States, the average number of days in the fire season increased from approximately 200 in 1980 to approximately 300 in 2013, according to the 2014 Quadrennial Fire Review. According to the U.S. Global Change Research Program’s 2018 National Climate Assessment, warmer and drier conditions have led to a greater incidence of large forest fires (fires with an area greater than 386 square miles) in the western United States and Alaska, a trend expected to continue as climate warms and the fire season gets longer. Despite these trends and projections, FEMA does not plan to comprehensively assess operations to determine whether and how policies and procedures might need to change to better respond to changing operational conditions. According to FEMA officials, they had not considered conducting this kind of review, because they believe their existing mechanisms—specifically after-action reporting, the continuous improvement process, and program specific mechanisms such as the Public Assistance Change Control Tool—will allow them to incorporate relevant lessons into policies and procedures. According to FEMA officials, after a major disaster, FEMA’s standard practice is to identify areas for improvement and develop lessons learned that can improve FEMA planning and policy and support national preparedness by preparing an after-action report which is required by FEMA policy. FEMA has a continuous improvement program which serves as the overarching process by which it identifies and responds to operational lessons learned identified in after-action reporting. According to FEMA officials, FEMA headquarters reviews all completed after-action reports to identify any areas for improvement that may need to be addressed through changes in policies and procedures. Although the continuous improvement process and its reliance on after- action reporting offers the opportunity to incorporate discrete lessons learned into select policies and procedures, there are some limitations in its ability to offer a comprehensive assessment of its internal controls in light of the strong potential that wildfire disasters will continue to increase. By its nature, after-action reporting captures select issues at a specific time and in a specific place, but it is not a dedicated effort to assess how various policies and procedures may need to be changed to better respond to changing operational conditions. For example, in our discussions with fire-affected jurisdictions, we noted that some programmatic or policy challenges were specific to or made more difficult by the nature of wildfires, such as the complexities of debris removal and difficult housing missions. A comprehensive review of internal controls, such as policies, procedures, and training, may shed light on aspects of FEMA’s operations—well tested over the years in hurricane and flood situations—that could be adapted for greater responsiveness to the wildfire environment, helping to ensure attention to a broad range of issues in addition to those that might be noticed in a specific time and place through after-action reporting. In light of the potential for high-impact wildfires to become more frequent, a dedicated effort to comprehensively assess operations could help FEMA better ensure that its management controls—such as policies, procedures, and training—are as well designed as possible to respond to the unique challenges. Devastating wildfires have exacted a large human and financial toll in recent years, with 159 lives lost and $2 billion obligated by FEMA in response during the major disasters of 2017 and 2018. FEMA has provided support personnel and resources to affected state and local jurisdictions to aid in wildfire response and recovery efforts. Given some reports of projected increase in risk from wildfires—as well as the challenges we have noted in providing housing, conducting debris removal operations, and other areas—comprehensively assessing agency operations in response to and recovery from wildfires to determine if any actions or changes to agency policies and procedures are needed could provide guidance or insight for communities that may be affected in the future. Comprehensively identifying, analyzing, and responding to the significant operating changes posed by wildfires, as recommended in internal control standards, could provide FEMA with an opportunity to better ensure the nation is ready to address the unique challenges posed by increased large-scale wildfires. We recommend that the FEMA Administrator comprehensively assess operations to identify any additional updates to its management controls—such as policies, procedures, or training—that could enhance future response and recovery from large-scale and severe wildfires. (Recommendation 1) In August 2019, we requested comments on a draft of this report from the Departments of Agriculture, Defense, Interior, and Homeland Security. The Departments of Agriculture and Defense had no formal or technical comments. In September 2019, FEMA and the Department of the Interior provided technical comments, which we have incorporated as appropriate. In addition, DHS provided an official letter for inclusion in the report, which can be seen in appendix III, stating that it concurred with our recommendation. DHS’s letter describes a number of ongoing and planned actions that it plans to leverage in addressing our recommendation. These actions include, among other things, the use of sheltering and housing field teams to support states’ efforts to house disaster survivors; continued updates to direct housing guidance; developing guidance for the use of FEMA-issued, state-administered direct housing grants authorized by the Disaster Recovery Reform Act of 2018; and development of a project to analyze and improve capabilities and identify areas of innovation in response to wildfire disasters. DHS anticipates that these efforts will be put into effect by December 2020. We will continue to monitor DHS and FEMA’s efforts in addressing our recommendation. We will send copies of the final report to the Secretaries of the departments mentioned above, the FEMA Administrator, and appropriate congressional committees. If you or your staff have any questions about this report, please contact me at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other key contributors to this report are listed in appendix IV. FEMA’s Individual Assistance programs provide assistance directly to individuals and households, as well as state, local, tribal, and territorial governments to support individual survivors. This assistance covers necessary expenditures and serious needs that cannot be met through insurance or low-interest loans, such as temporary housing assistance, counseling, unemployment compensation, or medical expenses. FEMA provides this assistance through seven different programmatic areas, with a substantial amount of the assistance coming from the Individuals and Households Program. The Individuals and Households Program provides financial assistance and direct services to eligible individuals and households who have uninsured or underinsured necessary expenses and serious needs. Individuals and Households Program assistance is intended to meet basic needs and supplement recovery efforts and is not a substitute for insurance. The Individuals and Households Program consists of two forms of assistance: Housing Assistance and Other Needs Assistance. Housing Assistance: Housing assistance may be provided in the form of financial assistance, direct assistance, or a combination of the two. Financial assistance may include lodging expense reimbursement for time spent at hotels or other temporary lodging, rental assistance, and home repair or replacement assistance. Direct housing assistance may be provided when applicants are unable to use rental assistance due to a lack of available housing resources. This type of assistance may include the repair and lease of multi- family housing units—such as apartments—for temporary use by applicants, direct lease assistance, or the provision of transportable temporary housing units, such as recreation vehicles or manufactured housing units. Transportable temporary housing units can be placed on private sites, commercial sites or on group sites. Commercial sites are existing manufactured home sites with available pads that FEMA may lease. Group sites require additional approval when housing needs cannot be met by other direct temporary housing options. They may include publicly-owned land with adequate available utilities. Other Needs Assistance: This consists of financial assistance for other expenses and serious needs caused by the disaster. Some Other Needs Assistance is only provided if an applicant does not qualify for a Small Business Administration disaster loan; this assistance would include personal property, moving and storage, and transportation assistance. Other types of Other Needs Assistance can be provided regardless of SBA loan qualification, including funeral, medical, dental, and child care assistance, and other miscellaneous items. Mass Care and Emergency Assistance This program provides life-sustaining services to disaster survivors immediately before a potential incident, during the response phase, and during the beginning of post-disaster recovery. Services provided include sheltering, feeding, distribution of emergency supplies, support for individuals with disabilities and others with access and functional needs, reunification services for adults and children, support for household pets and service/assistance animals, and mass evacuee support. This program provides supplemental federal financial assistance to states, territories, tribal governments, or private nonprofit entities in order to provide the services of a case manager to a disaster survivor. Through this service, a case manager assists a survivor with developing a disaster recovery plan for meeting his or her unmet needs. Crisis Counseling Assistance and Training Program This program provides supplemental funding to eligible state, territorial, tribal, or local governments, and non-governmental organizations to assist disaster-impacted individuals and communities in recovering from the major disasters through the provision of community-based outreach and psycho-educational services. This program provides legal aid to survivors who qualify as low-income through an agreement with the American Bar Association. The service is limited to cases that would not normally incur legal fees, such as assistance with insurance claims or recovery or reproduction of legal documents lost in the disaster. This program provides unemployment benefits and re-employment assistance services to survivors under the responsibility of the U.S. Department of Labor. This assistance is only available to survivors who are not eligible for regular state unemployment insurance. FEMA employs Voluntary Agency Liaisons who establish and maintain relationships with voluntary agencies active in response and recovery, coordinate with the National Voluntary Organizations Active in Disaster, provide guidance on donations, and act as subject matter experts in development of long term recovery groups with local community organizations, faith-based groups, and other voluntary organizations. FEMA’s Public Assistance program provides supplemental federal disaster grant assistance to state, local, tribal, and territorial governments, and certain types of private nonprofit organizations for debris removal, emergency protective measures, and the restoration of disaster- damaged, publicly-owned facilities and the facilities of certain private nonprofit organizations. The Public Assistance program also encourages protection of these damaged facilities from future events by providing assistance for hazard mitigation measures. The program—which represents the largest share of federal aid from the Disaster Relief Fund—is administered through a partnership between FEMA and the state, tribal or territorial grantee, which provides funding to local or tribal entities who are the subrecipients of a Public Assistance grant award. The Public Assistance program funds both emergency work and permanent work. Public Assistance for Emergency Work FEMA provides funding for emergency work such as emergency protective measures and debris removal that must be conducted immediately to save lives, protect public health and safety, protect improved property, or eliminate or lessen a threat of immediate additional damage. This assistance is divided into two categories, described below. Debris Removal (Category A): Debris removal activities, such as clearance, removal, and disposal, are eligible if the removal is in the public interest based on whether the work eliminates immediate threats to lives, public health, and safety or of significant damage to improved public or private property; ensures economic recovery of the affected community to the benefit of the community at large; or mitigates risk to life and property by removing substantially damaged structures and associated structures. In limited circumstances, based on the severity of the impact of an incident, FEMA may determine that debris removal from private property is eligible under the Public Assistance Program. If debris on private property is so widespread that it threatens public health and safety or the economic recovery of the community, FEMA may provide Public Assistance funding for debris removal from private property. Emergency Protective Measures (Category B): Emergency protective measures conducted before, during, and after an incident are eligible if the measures: eliminate or lessen immediate threats to lives, public health, or safety; or eliminate or lessen immediate threats of significant additional damage to improved public or private property in a cost-effective manner. Examples of such measures include transporting and pre-positioning equipment, flood fighting, supplies and commodities, evacuation and sheltering, child care, security, or searches to locate and recover human remains. Public Assistance for Permanent Work Permanent Work is work required to restore a facility to its pre-disaster design (size and capacity) and function in accordance with applicable codes and standards. This assistance is divided into the five categories listed below: Roads and Bridges (Category C) Water Control Facilities (Category D) Buildings and Equipment (Category E) Utilities (Category F) Parks, Recreational, Other (Category G) Below are details on the six wildfire disasters selected for our review and the support the Federal Emergency Management Agency (FEMA) provided under the major disaster declarations. On September 9, 2015, the Butte Fire began burning across Calaveras County, and on September 12, 2015, the Valley Fire began burning across Lake County. FEMA subsequently approved a Fire Management Assistance Grant (FMAG) for the Butte Fire on September 10, 2015, and an FMAG for the Valley Fire on September 12, 2015. On September 22, 2015, the President issued a major disaster declaration at the request of the state for Lake County, which was ultimately expanded to include Calaveras County. On September 28, 2015, FEMA—in collaboration with the state and counties—opened two Disaster Recovery Centers in Calaveras and Lake Counties, and on October 2, 2015, FEMA opened a third Disaster Recovery Center in Lake County. In total, the Valley and Butte Fires burned 146,935 acres, destroyed 2,876 structures, and resulted in 6 deaths. See figure 7 for a map of the fire locations, and tables 4 and 5 for data on FEMA’s mission assignments, Individual Assistance, and Public Assistance support. On November 28 2016, strong winds pushed a wildfire—named the Chimney Tops 2 fire—beyond the boundaries of the Great Smoky Mountains National Park and into the surrounding wildland urban interface. The fire primarily spread into Sevier County, Tennessee, which includes the cities of Gatlinburg and Pigeon Forge. That same day, FEMA approved an FMAG for Tennessee to support fire suppression activities. On December 15, following a request by the governor of Tennessee on December 9, the President issued a major disaster declaration for Sevier County. On December 23 and December 28, FEMA—in collaboration with the state and counties—opened Disaster Recovery Centers in Gatlinburg and Pigeon Forge, respectively. The Tennessee wildfires ultimately burned approximately 17,000 acres, destroyed 2,545 structures, and led to 14 fatalities. See figure 8 for a map of the fires’ location, tables 6 and 7 for data on FEMA’s mission assignments, Individual Assistance, and Public Assistance support. On October 8, 2017, multiple fires began burning in northern California, spreading rapidly due to high winds and dry conditions. Among these fires was the Tubbs Fire in Sonoma and Napa Counties, which was, at the time, the most destructive fire in California’s history. On October 9, 2017, FEMA approved FMAGs for ten separate fires. On October 10, 2017, the President issued a major disaster declaration at the request of the state for seven counties—Butte, Lake, Mendocino, Napa, Nevada, Sonoma, and Yuba. On October 13, 2017, Solano County and Orange County (in southern California) were added to the declaration. In total, the fires included in this disaster declaration burned 240,138 acres, destroyed 8,924 structures, and resulted in 44 deaths. From October 17 through November 28, FEMA—in in collaboration with the state and counties—established five Disaster Recovery Centers to assist disaster survivors. See figure 9 for a map of the fires’ locations, and tables 8 and 9 for data on FEMA’s mission assignments (including FEMA’s assignment of debris removal responsibilities to the U.S. Army Corps of Engineers), Individual Assistance, and Public Assistance support. Figure 10 provides an aerial snapshot of the destruction in one area of the city of Santa Rosa in Sonoma County. On December 4, 2017, the Thomas Fire started burning in Ventura County. Over the next three days, the Thomas Fire and other wildfires spread rapidly through Ventura and neighboring counties—due in part to the Santa Ana Winds—and FEMA approved a number of FMAGs for these wildfires. On December 20, the governor of California requested a major disaster declaration for Los Angeles, San Diego, Santa Barbara, and Ventura Counties. The request was approved on January 2, 2018 for Santa Barbara and Ventura Counties for Public Assistance. In the week that followed, heavy rains exacerbated the damages caused by the fires, leading to mudflows and debris flows. On January 10, FEMA expanded the disaster declaration to include the flooding, mudflows, and debris flows related to the wildfires. Five days later, FEMA added Los Angeles and San Diego Counties to the disaster declaration, and granted all four counties eligibility for Individual Assistance, in addition to the Public Assistance eligibility previously approved. From January 19 through February 5, 2018, FEMA—in collaboration with the state and counties—established five Disaster Recovery Centers to assist disaster survivors. The Southern California wildfires, debris flows, and mudflows ultimately burned 308,083 acres, destroyed 1,378 structures, and caused 23 fatalities. See figure 11 for a map of the fires’ locations, and tables 10 and 11 for data on FEMA’s mission assignments, Individual Assistance, and Public Assistance support. On July 23, 2018, the Carr Fire began burning in Shasta County. On July 27, 2018, the Mendocino Complex Fire, a combination of the River and Ranch Fires, began burning in Lake County. FEMA soon approved FMAGs for these fires. On August 4, 2018, the President issued a major disaster declaration for Shasta County, which was ultimately expanded to include Lake County. On August 9, 2018, FEMA—in collaboration with the state and counties—established a Disaster Recovery Center in Shasta County, with a second Disaster Recovery Center established in Lake County on August 21, 2018. One of the wildfires—the Mendocino Complex Fire—was the largest fire in California’s history, burning 459,123 acres. In total, the Carr and Mendocino Complex Fires burned 688,774 acres, destroyed 1,894 structures, and resulted in 4 deaths. See figure 12 for a map of the fires’ locations, and tables 12 and 13 for data on FEMA’s mission assignments, Individual Assistance, and Public Assistance support. Figure 13 shows the aftermath of the Carr Fire in one residential neighborhood. On November 8, 2018, the Camp Fire struck the city of Paradise in Butte County. According to California’s Department of Forestry and Fire Protection, the Camp Fire grew into the deadliest and most destructive fire in California history, resulting in 18,793 structures destroyed, 153,336 acres burned, and 85 deaths. On the same day two other major fires—the Woolsey Fire in Los Angeles County and the Hill Fire in Ventura County— began. On November 8-9, FEMA approved FMAGs for these fires, and the President issued a major disaster declaration for these counties on November 12, 2018. FEMA—in collaboration with the state and counties—opened a Disaster Recovery Center in Butte County on November 16 and four other Disaster Recovery Centers in Butte, Ventura, and Los Angeles counties over the next month. In total, the three fires resulted in 20,295 structures destroyed, 254,816 acres burned, and 88 deaths. See figure 14 for a map of the fires’ locations, and tables 14 and 15 for data on FEMA’s mission assignments, Individual Assistance, and Public Assistance support. In addition to the contact above, the following staff members made significant contributions to this report: Kathryn Godfrey (Assistant Director), Adam Couvillion (Analyst-in- Charge), Elizabeth Dretsch, Ricki Gaber, Eric Hauswirth, Hannah Hubbard, Tracey King, John Mingus, Ben Nelson, and Kevin Reeves.", "summary": "In 2017 and 2018, deadly wildfires struck the state of California, tragically resulting in 159 deaths and over 32,000 structures destroyed. FEMA, as the lead federal agency for responding to and recovering from disasters, has obligated about $2 billion in housing, debris removal, and other assistance following these disasters. According to recent environmental assessments, fire seasons are increasing in length, putting more people and infrastructure at risk. GAO was asked to assess a range of response and recovery issues related to the 2017 disasters. Specifically, this report addresses (1) the assistance FEMA provided to jurisdictions in response to major disaster declarations stemming from wildfires from 2015 through 2018, (2) selected jurisdictions' perspectives on FEMA wildfire response and recovery efforts, and (3) the extent to which FEMA has identified and addressed key lessons learned. GAO obtained data on FEMA wildfire disaster assistance and statistics on fire damages and fatalities; reviewed key documentation, such as incident action plans and after action reports; and interviewed officials from FEMA headquarters and regional offices, states, and a nonprobability sample of affected local jurisdictions (e.g., counties). For wildfire-related major disaster declarations from 2015 through 2018, the Federal Emergency Management Agency (FEMA)—consistent with its authorities and responsibilities—helped state and local officials obtain and coordinate federal resources to provide for the needs of wildfire survivors and execute recovery efforts. This support totalled over $2.4 billion and included providing staff to assist at Emergency Operations Centers and establishing Disaster Recovery Centers to coordinate disaster assistance services for survivors. In addition, FEMA provided Public Assistance grant funds to local jurisdictions to help address community infrastructure needs, such as debris removal. FEMA also assigned federal agencies to perform various missions to help with response and recovery—for example, the U.S. Army Corps of Engineers was assigned with contracting for debris removal services in some instances. Officials from jurisdictions that GAO spoke with described practices that aided in wildfire response and recovery, but also reported experiencing challenges. Specifically, officials in affected areas noted that collaboration between FEMA and California's Office of Emergency Services allowed for timely information sharing, and FEMA's assistance at Disaster Recovery Centers greatly assisted survivors in obtaining necessary services. Among the challenges cited were onerous documentation requirements for FEMA's Public Assistance grant program and locating temporary housing for survivors whose homes were completely destroyed. In addition, the unique challenge of removing wildfire debris led to confusion over soil excavation standards and led to overexcavation on some homeowners' lots, lengthening the rebuilding process. FEMA has developed an after-action report identifying lessons learned from the October and December 2017 wildfires, but could benefit from a more comprehensive assessment of its operations to determine if additional actions are needed to ensure that policies and procedures are best suited to prepare for future wildfires. The combination of recent devastating wildfires and projections for increased wildfire activity suggest a potential change in FEMA's operating environment. According to Standards for Internal Control in the Federal Government , such changes should be analyzed and addressed to help ensure that agencies maintain their effectiveness. GAO recommends that FEMA comprehensively assess operations to identify additional updates to policies and procedures that could enhance future wildfire response and recovery efforts. The Department of Homeland Security agreed with our recommendation.", "document_type": "gao"}
{"report": "BIE’s Indian education programs derive from the federal government’s trust responsibility to Indian tribes, a responsibility established in federal statutes, treaties, court decisions, and executive actions. In 2016, the Indian Trust Asset Reform Act included congressional findings stating “through treaties, statutes, and historical relations with Indian tribes, the United States has undertaken a unique trust responsibility to protect and support Indian tribes and Indians...” In addition, “the fiduciary responsibilities of the United States to Indians also are founded in part on specific commitments made in treaties and agreements securing peace, in exchange for which Indians surrendered claims to vast tracts of land…” It is the federal government’s policy to fulfill its trust relationship with and responsibility to the Indian people for the education of Indian children by working with tribes toward the goal of ensuring that Interior- funded schools are of the highest quality and provide for the basic elementary and secondary educational needs of Indian children, including meeting the unique educational and cultural needs of these children. Similar to students in elementary and secondary schools nationwide, some students in BIE schools have documented disabilities that require special educational or supplemental support. More than 6,000 students with disabilities, representing about 15 percent of total enrollment, attend BIE schools. Specific learning disabilities, such as perceptual disabilities, dyslexia, or impairments from brain injury, formed the most prevalent disability category among BIE students with disabilities in school year 2017-2018 (see table 1), affecting more than half of the students with disabilities at BIE schools. An IEP is a written statement for each child with a disability designed to meet the child’s individual needs under IDEA. IDEA requires that every child who receives special education services have an IEP. Before an IEP is developed, a child with a disability must be identified, located, and evaluated through a process known as Child Find. Generally, an adult familiar with the student’s abilities makes an official referral for a special education services evaluation. With parental consent, the student is then evaluated using a variety of assessment tools and strategies designed to help determine the student’s unique needs. Once a child is evaluated and determined to be eligible for special education and related services under IDEA, an IEP is developed describing the school’s delivery of required services to the child. IDEA regulations require that the services specified in a child’s IEP be provided to the child as soon as possible following the development of the IEP. Moreover, IDEA requires that a student’s IEP include, among other things, a projected date for the beginning of services and the anticipated frequency, location, and duration of those services. However, IDEA does not specifically address the steps that schools must take in cases where services are not provided in accordance with the anticipated service duration and frequency in the student’s IEP, such as cases where services were not provided at all or the duration was less than the amount of time specified in a student’s IEP. Educators are required to track the child’s academic progress over the school year and then annually review and update the IEP as needed at least once a year. IDEA requires schools to reevaluate children with IEPs at least once every 3 years to determine whether their needs have changed and if they still qualify for special education and related services under IDEA (see fig. 1). Under IDEA, Interior receives funding to assist in the education of children with disabilities in BIE schools. BIE is responsible for meeting all IDEA requirements for these children, including that an IEP is developed and implemented for each eligible student and that the requirements of any identified education and related services are defined in the IEP. BIE policy requires that IEPs identify services for eligible students under two main categories: education services and related services. Education services include math, reading, and written expression, among others, while related services include occupational therapy, physical therapy, and speech-language pathology, among others, according to BIE’s policy. BIE also requires that IEPs include the type of provider for these services, such as a special education teacher for an education service, or a physical therapist for a related service, as well as information about the duration and frequency of the services to be provided (see fig. 2). BIE schools are required to develop and update students’ IEPs in the Native American Student Information System (NASIS), an online data management system the agency created in 2006 for all BIE schools to record and store a variety of student-related information, including special education data. BIE requires that schools document the special education and related services that their teachers or contracted providers deliver to students with IEPs, and Interior regulations require that schools maintain these and all other special education records for at least 4 years. Multiple offices under the BIE Director are responsible for overseeing and supporting schools’ special education programs to help ensure that they comply with IDEA and other federal requirements for special education (see fig. 3). The School Operations Division was established under the bureau’s recent reorganization to provide direction and assistance to BIE schools in education technology; human resources; communications; educational facilities; safety and facilities; and acquisition and grants. The division is also responsible for providing oversight over BIE school spending, including spending on special education. Sixteen agency field offices called Education Resource Centers are located across the BIE school system and are administered by three separate BIE divisions under the Chief Academic Officer: the Associate Deputy Director-Tribally Controlled Schools, the Associate Deputy Director-Bureau Operated Schools, and the Associate Deputy Director-Navajo Schools. The Centers are primarily responsible for providing oversight and technical assistance to schools in a variety of areas, including their academic programs, fiscal management, and compliance with IDEA. In particular, Interior regulations and BIE procedures require that BIE annually verify that all students with an IEP in the BIE system are provided with special education services in accordance with their IEPs. BIE’s Division of Performance and Accountability (DPA) is primarily responsible for overseeing Education-funded programs at BIE schools, including IDEA and Title I, Part A of the Elementary and Secondary Education Act of 1965, as amended. DPA’s primary oversight responsibilities involve monitoring schools’ implementation of these federal education programs. DPA also provides schools and other BIE offices with technical assistance and training on IDEA requirements, among other program areas. Since 2018, DPA and other BIE divisions have been responsible for working together in monitoring schools the agency considers high risk in administering federal education programs. Specifically, in May 2018, BIE established a new policy and guidance for conducting annual targeted, risk-based monitoring of BIE school programs, which is separate from the requirements for the agency to verify the provision of special education and related services annually. According to this policy, BIE is required to select a sample of 15 schools for this monitoring based on a variety of special education and other risk factors, including special education enrollment and unobligated IDEA funds. BIE’s policy requires that staff from five of its divisions—DPA, School Operations, and the three school divisions responsible for directly supporting BIE schools—coordinate and conduct joint monitoring activities as teams, including a review of schools’ special education programs. These teams are required to issue in depth monitoring reports and technical assistance plans to schools within 30 days of an on-site monitoring visit. Education’s Office of Special Education Programs (OSEP) awards funds to states and BIE, and provides assistance and oversight in their implementation of IDEA. BIE, as with states, is required to report certain compliance information to OSEP. OSEP, in turn, determines BIE’s performance and level of compliance with IDEA and provides assistance to BIE to improve in specific areas. Over the past 8 years, OSEP has found significant problems with BIE’s implementation of IDEA, which in 2019 prompted OSEP to withhold a portion of BIE’s IDEA funds. OSEP issued a determination letter in July 2019 that stated BIE needed intervention in implementing the requirements of IDEA because of its long-standing noncompliance and repeated failure to follow through on OSEP’s required corrective actions, among other issues. BIE had been in “needs intervention” status for each of the last 8 years. As a result of BIE’s continued noncompliance, OSEP in July 2019 withheld 20 percent, or about $780,000, of BIE’s fiscal year 2019 IDEA Part B funds reserved for administrative costs, an action OSEP has taken very infrequently. OSEP provided BIE notice and an opportunity for a hearing, but BIE did not appeal the withheld funds. OSEP’s activities in overseeing BIE’s implementation of IDEA included investigating special education services at one BIE school in 2018. As a result of the investigation, in early August 2018, OSEP sent a letter to the BIE Director about its findings, including that some students at one BIE- operated school had not received services required in their IEPs, including speech language therapy and physical therapy, for almost a year because service contracts with providers had expired. The letter notified BIE that failure to provide services in a student’s IEP violated the IDEA requirement that a free appropriate public education be made available to all eligible students with disabilities. OSEP’s investigation also determined that six other BIE-operated schools were under the same contracts and may not have delivered IEP-required services to students. OSEP’s August 2018 letter required BIE to take several corrective actions within 30 days, including determining whether other schools had IEP service disruptions. In addition, the letter required that BIE develop a plan by the end of October 2018 to prevent contractual problems that could result in a similar disruption of services in the future. As of February 2020, BIE had not notified OSEP that it had completed those corrective actions. OSEP’s oversight of BIE also included visiting BIE schools and agency offices in spring 2019 to examine BIE’s accountability system for IDEA. OSEP presented its findings and corrective actions to BIE in a letter and monitoring report in October 2019. OSEP found that BIE did not have policies and procedures for implementation of IDEA Part B at its schools, and that school officials wanted guidance on IDEA requirements from BIE. OSEP also found evidence of a systemic problem with service providers. For example, officials that OSEP interviewed at one school OSEP visited said they had not had a physical therapist during the entire 2018-2019 school year and did not have a school counselor the previous year. Such staff were required in order to provide services in accordance with students’ IEPs. The corrective actions detailed by OSEP in its October 2019 letter to BIE were to be completed within 90 days, including that BIE develop a plan and timeline for adopting policies and procedures for implementing IDEA. The bureau, however, requested a 60-day extension, which OSEP granted, moving the required date of completion for BIE’s actions to early spring 2020. Our prior work on Indian education found numerous weaknesses in BIE’s management and oversight of BIE schools, including problems with monitoring school spending and conducting annual safety and health inspections of school facilities. As a result of these and other systemic problems with BIE’s administration of Indian education programs, we added Indian education to our High Risk List in February 2017. In our 2019 High Risk update, we found that BIE had made progress in addressing some of these key weaknesses in Indian education, such as demonstrating leadership commitment to change. We reported, however, that the agency needed to show progress in other key areas, such as increasing its capacity to support functions related to administering and overseeing BIE schools. BIE schools did not provide an estimated 20 percent of special education service time to their students during a 4-month period between October 2017 and February 2018, and they did not provide documentation for another 18 percent of service time. Schools frequently did not include reasons for missing services in their service logs, and their practices for whether to make up these services varied. Further, some schools provided no documentation for one or more services, while many schools provided documentation that lacked key information. Difficulties in identifying special education and related service providers, especially in remote areas, limited some schools’ ability to provide services to students. We estimate that BIE schools either did not provide or did not account for 38 percent of the time for the special education and related services required by students’ IEPs, according to our analysis of school documentation. Specifically, we found that schools provided an estimated 62 percent of the service time specified in their students’ IEPs (see fig. 4). Of the service time remaining, we found that schools did not provide an estimated 20 percent of service time to students, and they did not provide any documentation for an additional 18 percent of such service time. When schools did not provide documentation, we were unable to determine whether services were delivered to students. Our analysis was based on a review of service logs at 30 BIE schools during a 4-month period between October 2017 and February 2018 for a nationally representative sample of students with IEPs. Of the students who clearly did not receive service time, according to school service logs, three students at one school received no service time at all during the period of our 4-month review. Officials at the school told us that the special education teacher responsible for providing these services did not fulfill her responsibility to provide services to these students and eventually left the school. They added that the school did not have other qualified staff to provide the services during the period of our review. Our analysis of school service logs found that an estimated one-quarter of the services that were missed did not have a reason listed in the logs, and as a result, we could not determine why the service was not delivered. Of the remaining estimated three-quarters of services that were missed, the top three reasons for missed services were student absences, school-sponsored activities (such as field trips), and provider absences (see fig. 5). BIE requirements do not specify that school service logs must include reasons for missed services. We also found that the schools in our sample did not follow consistent practices for whether to make up regularly scheduled services that are missed. Based on our outreach to officials at the schools in our sample, 23 of the 30 schools that responded varied in their practices for whether to make up services that were missed for reasons including school- sponsored activities or unplanned school closures, such as snow days (see fig. 6). In addition to information about their practices for whether missed special education services are expected to be made up, school officials also provided us with written responses about other factors that may influence this decision. For example, an official at one school responded that while providers of related services are expected to make up missed services when providers are absent, education service providers are not. Alternatively, an official at another school responded that all of the school’s service providers are responsible for finding a way to provide the IEP-required services regardless of the reason for missed service. Additionally, we found that for schools that expect providers to make up missed services, timeframes for doing so varied considerably, based on written responses we received from schools. Specifically, while some school providers typically make up services within a week of the missed service, others aimed to provide them within a month or longer. One school official responded that related services—such as occupational therapy, physical therapy, and speech and language—may not be made up until the following summer, which could potentially result in a delay of up to 9 months if services are missed at the beginning of the school year. BIE does not have official requirements on whether and when schools should make up missed services, and BIE officials provided schools with inconsistent information on this issue. For example, information provided to us by BIE’s Division of Performance and Accountability (DPA) shows that officials advised schools on one occasion that making up missed services is required only when they occur because the provider is not available, but on another occasion advised schools that all missed services should be made up. Further, one official in another BIE office that oversees and supports tribally controlled schools advised schools that making up services is not expected when they are missed due to school-sponsored activities or testing. In contrast, another official with the same division advised schools that services should always be made up regardless of the reason they were missed. While IDEA does not specifically address the steps that schools must take in cases where services are not provided in accordance with the service duration and frequency in the student’s IEP, Education officials said that IDEA does not preclude state educational agencies—including BIE—from establishing their own requirements in this area, as long as they are consistent with IDEA requirements. We found that at least four state educational agencies, including Maryland, New York, North Dakota, and the District of Columbia, have done so. IDEA requires that schools provide special education and related services to eligible students as outlined in their IEPs. However, because BIE schools follow inconsistent practices for whether to make up services when missed, and BIE has not established consistent requirements in this area, there is a risk that some schools may not be providing services in accordance with students’ IEPs. As noted previously, we found that schools did not provide or did not document almost an estimated 40 percent of students’ service time, based on our review of service logs. Missed services may delay students’ progress and increase the risk that they are not receiving a free appropriate public education as required under IDEA. In our generalizable analysis of service logs, we found that for an estimated 18 percent of service time, schools were not able to show whether education and related services were provided to students with IEPs because school service logs were either missing or incomplete. No service logs were provided by schools for 12 of the 138 students in our sample, and incomplete logs were provided for another 51 of the students. By school, 6 of the 30 schools in our sample did not provide any logs for at least one student, and 18 of the remaining 24 schools were missing a portion of the logs. The lack of service logs prevented us from determining whether some students were provided their required IEP services. In addition, we found that many schools’ service logs lacked key information. In particular, service logs frequently omitted or did not clearly indicate service duration and frequency. This information is important for determining whether a school has provided services in accordance with a student’s IEP. Key areas in which service logs varied included: Service duration and frequency: IEPs are required by BIE to specify the weekly frequency and duration of the services throughout the year. However, the service logs we reviewed often did not include both types of information. About one-quarter of the service log entries did not indicate the number of minutes provided, according to our statistical analysis. We estimate that about one-fifth included total minutes, but did not clarify how many times the service was provided. Just over half of the service log entries included both the duration and frequency of each service. Individual vs. combined service entries: Eleven of the 30 schools in our sample provided us with service logs that grouped multiple services together without indicating the specific amount of time or the number of sessions for each service per week. As a result, when these schools recorded that less time was provided, we were unable to identify which of the services were missed. For example, one student was to receive five 60-minute sessions each of reading, written expression, and math per week, according to the student’s IEP. The student’s service log recorded the total number of minutes provided in a day but did not specify which services were provided (e.g., 540 minutes were provided, of a total 900 minutes per week). Based on this information, we could infer from the shortage of total minutes provided that some services were missed, but we were unable to determine whether the student missed reading, written expression, math, or a combination of all three services. School officials responsible for completing service log: Service logs were completed by different types of staff across schools, including paraprofessionals, service providers, or special education coordinators. School practices in documenting special education services varied widely because BIE has not established a standardized process for doing so. BIE officials told us the agency is currently developing a system to standardize how schools document services using a new online module within the Native American Student Information System. Officials provided documentation showing that they were developing this system to allow schools to consistently document both education and related services. BIE’s system, once fully implemented, may allow the agency to monitor and verify service provision more effectively and improve the consistency of schools’ documentation of services. BIE plans to fully implement the system and provide schools with the requisite training to use it by late 2020, according to agency documentation. Officials at 22 of the 30 schools in our sample provided us with information in addition to their service logs, and all 22 schools reported difficulties in recruiting, hiring, or retaining staff or contractors with the required qualifications to provide special education and related services, which some said limited their ability to provide students with high quality required services. In written responses and interviews we conducted, school officials cited school size and remote location as constraints to recruiting, hiring, or retaining qualified service providers. In particular, while schools often rely on contractors to provide related services—such as occupational and physical therapy—officials at 10 of the 30 schools in our sample reported that the availability of qualified contractors was limited. Education services, which are typically provided by school special education staff, were required for nearly all students with IEPs in our sample. Some school officials said in interviews and written responses that in some cases students did not receive education services because their schools either did not have any or enough qualified staff to provide them. For example, according to a BIE official, one BIE school reassigned its only special education teacher to fill a vacant science teacher position and did not provide required services to 18 students during the 2018-19 school year. In another example, one school reported that it did not have qualified staff to provide services to two students with IEPs for 12 consecutive weeks during the 2017-2018 school year. Officials said the school was unable to find a substitute special education teacher, and as a result, each student missed about 5 hours of service time per week during this period. An official at another school said that after advertising for a special education teacher for three years, the position is still vacant. These examples illustrate challenges with hiring and retaining special education staff that may exist more broadly across the country. For example, according to recent Education data, 43 states reported shortages in special education providers in the 2018-2019 school year. However, promising practices may be found within the BIE system as well as across the states that could provide BIE schools direction in addressing shortages of special education providers. For example, two BIE schools recruited and hired special education staff through international work exchange programs meant to facilitate the employment of qualified teachers from other countries. Some schools also reported using outreach to other local BIE or public schools to find and share contractors. Further, OSEP has developed resources for addressing special education teacher shortages that it has made available to states and school districts. In particular, in 2019 OSEP hosted a series of online symposia on general strategies and best practices for schools to attract and retain effective special education personnel. These sessions featured experts and practitioners who discussed strategies for attracting and retaining personnel. Such strategies and other relevant state and tribal resources for addressing special education teacher shortages could provide BIE with additional support to address its own challenges in this area. BIE has not taken steps, however, to establish a mechanism, such as a community of practice, to identify and communicate promising practices for schools, especially those in remote locations, to address their special education staffing and contracting challenges. BIE’s advisory committee on special education stated in its 2018 annual report that BIE needed to better support the recruitment of special education and related service providers at BIE schools. Further, BIE’s 2018-2023 strategic plan has a goal of supporting schools by identifying and sharing best practices and collaborating with schools to recruit, hire, and retain highly effective staff. In addition, federal standards for internal control state that agencies should select an appropriate mechanism for communicating externally. Without greater support from BIE, some schools will continue to struggle to find the special education staff and contractors they need, and students at these schools may not receive the special education services they need to thrive academically. Limited monitoring and technical assistance have hampered BIE’s oversight and support for special education at BIE schools. BIE did not verify the provision of special education and related services at about 30 percent of its schools in school year 2018-2019 due to limited oversight by its largest division. Additionally, BIE has not provided high-risk schools with timely reports after monitoring visits so schools can address their noncompliance with IDEA requirements. Further, staff in BIE’s Education Resource Centers often lack expertise in special education, and school personnel did not always know which agency staff to contact for special education support. BIE did not verify the provision of special education and related services at about 30 percent of its schools in school year 2018-2019, according to available agency documentation. Interior regulations, however, require that BIE annually review all schools’ documentation to verify the provision of special education and related services for every eligible student, among other things. BIE’s guidance for conducting these reviews specifically directs reviewing personnel to verify that students with active IEPs are receiving timely services as indicated on their IEPs. However, the BIE division that oversees about half of all BIE schools, which is led by the Associate Deputy Director-Tribally Controlled Schools, established a policy for its staff to verify provision of services at only a third of its assigned schools each year. The two other divisions, which oversee BIE-operated and Navajo schools, respectively, reported that they conducted reviews at 100 percent of their schools in school year 2018-2019. The Associate Deputy Director-Tribally Controlled Schools who authorized this policy, told us that she believed the policy complied with Interior regulations. However, Interior’s Office of the Solicitor told us that this policy does not comply with Interior’s regulations. BIE officials said the Office of the Associate Deputy Director-Tribally Controlled Schools established this policy to reduce the number of schools the division annually verifies because of the division’s limited staff capacity. Six of 13 staff positions in this division with roles in overseeing or supporting special education were vacant as of February 2020, according to BIE documentation and a senior official. Although BIE developed a strategic workforce plan in 2019 with a goal of addressing staffing shortages across the bureau, the plan does not include information on a strategy or timeframe to address vacancies in positions with responsibilities to oversee and support special education at its schools. BIE’s verification of special education and related services at schools has identified noncompliance with federal requirements. For example, according to BIE, a recent verification visit at one school identified numerous irregularities in its special education documentation, which prompted the school’s superintendent to request that BIE conduct a formal investigation. BIE investigators reported that school staff had falsified service records showing that services were provided when a teacher was not present, and that services were provided in multiple and inappropriate settings (e.g., math services recorded at the same time and date during reading, physical education, and science periods), among other things. As a result, BIE required several corrective actions from the school. As this example illustrates, the verification process provides BIE with an important oversight mechanism. This mechanism, however, is not being fully utilized by BIE’s largest school division. Without BIE annually reviewing documentation to verify the provision of special education for every student at all schools, the agency cannot ensure that students are receiving the services required by their IEPs. BIE monitored 14 schools for high-risk monitoring in school year 2018- 2019, but did not provide the schools with timely monitoring reports and technical assistance plans for their compliance with IDEA and other federal education program requirements. In addition to its annual process of verifying that students with IEPs are receiving required special education and related services, BIE also conducts targeted oversight of schools it deems high risk. BIE’s high-risk monitoring policy, established in May 2018, requires that it select a sample of schools based on risk indicators related to IDEA and other federal education programs, and provide schools with in-depth monitoring of their special education and other education programs. Nine of the 15 schools selected for BIE’s 2018-2019 high-risk monitoring were selected because BIE considered them to be at a higher risk in administering special education. The factors that BIE considered included a large enrollment of students with IEPs and a significant amount of unobligated IDEA funds, among other factors. One school, for example, had not obligated about 50 percent of its IDEA funds within the timeframe required by IDEA. BIE’s monitoring policy requires that it provide both monitoring reports and technical assistance plans to schools within 30 days of a visit. However, BIE sent schools visited in the 2018-2019 school year their monitoring reports in late August 2019—well after its required 30-day timeframe and several weeks after we requested the reports as part of this review. For example, BIE sent two school reports more than 8 months after its monitoring visits, and another two school reports more than 6 months after visits (see fig. 7). Further, the reports sent to schools were not accompanied by technical assistance plans, as required by BIE policy, which are required to outline how BIE will assist schools in addressing findings of noncompliance. BIE officials said that a timeframe for when the plans would be developed and issued to schools had not been established. BIE officials told us the late monitoring reports and the lack of technical assistance plans for schools resulted from BIE not fully implementing its 2018 high-risk monitoring policy. Officials said the monitoring policy requires monitoring teams to be comprised of staff from five BIE divisions: DPA, School Operations, and the three divisions responsible for directly supporting BIE schools. These staff work together to monitor special education and other school programs and develop reports and technical assistance plans for schools. However, BIE officials said that four of these divisions did not contribute staff to lead the monitoring teams, leaving the task of developing monitoring reports to a single division—DPA. DPA officials told us that developing such plans requires the knowledge, expertise, and coordination of staff across all five BIE divisions. They said that without participation from the other divisions, it is unlikely the plans will be developed and sent to schools because DPA itself does not have the staff capacity to do so. BIE officials told us they were aware of problems with coordination on high-risk monitoring across the five divisions and were considering how to make improvements, but did not provide a timeframe for doing so. BIE’s monitoring reports and technical assistance plans are intended to provide high-risk schools with important information about their compliance with IDEA and other federal education funding programs, according to agency documentation. Each of BIE’s monitoring reports for the 14 schools in 2018-2019 included multiple findings of school noncompliance with special education requirements under IDEA or Interior regulations. Specifically, monitoring reports for several schools included findings related to their provision of special education services. For example, one report found that a school maintained no service logs and was not able to demonstrate it had provided any services to students. Without timely monitoring reports, schools lack vital information to address areas of noncompliance, including ensuring that staff and contractors provide and document special education services as required. Further, without the technical assistance plans that BIE policy states are to accompany monitoring reports, schools may not know what BIE resources are available to them for addressing specific special education compliance issues. Staff in BIE’s Education Resource Centers often do not have sufficient expertise on special education to provide appropriate oversight and technical assistance to schools, according to BIE officials. Staff in Education Resource Centers have special education-related responsibilities that include annually verifying that schools are providing special education services and assisting schools when compliance issues with federal special education requirements are identified or when schools request help. Several BIE officials, however, told us these staff often do not have the requisite knowledge about special education to effectively carry out these responsibilities. For example, two senior BIE officials said these staff do not consistently have the expertise required to review documentation on service provision. A staff member at one Education Resource Center said she and her colleagues often do not know what questions to ask school officials during site visits to verify their provision of special education services. Additionally, several officials told us that these staff often do not have the expertise to provide technical assistance to schools on special education. One official said these staff often provide incorrect information to schools because of their lack of expertise. Officials from two schools also told us that some Education Resource Center staff with special education responsibilities do not have sufficient expertise to oversee and assist them with their special education programs. Several BIE officials said Education Resource Center staff need additional training in special education to more effectively carry out their responsibilities. Federal standards for internal control state that agencies should develop staff competencies—including knowledge, skills, and abilities—to achieve agency objectives. However, BIE has not ensured that Education Resource Center staff have the requisite competencies to oversee and support schools’ special education programs because it has not established special education training requirements. Without establishing such requirements and ensuring they are met, staff may not be effective in overseeing and assisting schools with their special education programs, including ensuring that students with IEPs receive required services. School officials said they did not always know which BIE staff to contact for support with their special education programs. Staff in BIE’s Education Resource Centers are responsible for regular outreach to schools about these programs, according to two senior BIE officials. However, officials we interviewed from some schools expressed confusion about the roles and responsibilities of various BIE offices and staff responsible for special education or said there has been a lack of outreach from Education Resource Center staff. For example, the special education coordinator at one tribally controlled school said she had received no information about which Education Resource Center was responsible for supporting her school. Several BIE officials acknowledged that schools do not always know which Education Resource Centers are responsible for supporting them. One senior BIE official also said that some schools are not aware that they can reach out to BIE for assistance with their special education programs. BIE’s 2015 Communications Plan prioritizes regular communication with schools to provide key information and important developments affecting their schools. However, BIE officials said Education Resource Center staff do not consistently reach out to inform schools about how they can support schools’ special education programs. Additionally, as part of its recent reorganization, BIE shifted the roles and responsibilities of many offices and staff, including those responsible for supporting special education at schools. Without BIE taking steps to ensure its Education Resource Center staff communicate with all schools regarding their roles and responsibilities on special education, these staff may not consistently do so. As a result, schools may not know whom to contact for answers to questions, which could hinder their ability to provide effective special education services to students. The purpose of IDEA is to fulfill the promise that all children with disabilities have available to them special education and related services designed to meet their unique educational needs. In exchange for the funds it receives from Education to implement IDEA, BIE must ensure that such an education is available to all of its students with disabilities. The potential for students with disabilities at BIE schools to advance academically depends, in part, on the ability of BIE to oversee and support schools in providing these students with the special education and related services required by their IEPs under IDEA. It is unclear, however, whether all BIE schools are meeting these students’ needs and ensuring that required services are consistently delivered because schools follow different practices for determining whether to make up services for students when they are missed. Further, the challenges that schools face in obtaining qualified special education staff and specialists to provide services—which may also exist for public schools nationwide— also present BIE with an important opportunity to partner with knowledgeable stakeholders and provide direction in this area. BIE also needs to address persistent administrative capacity issues in special education—such as vacancies and a need for training in key agency offices. In addition, BIE should ensure that relevant offices are reaching out to schools to inform them of their roles in overseeing and supporting schools’ special education programs. Finally, BIE must take steps to make sure its offices annually review school documentation to verify that students are receiving special education and related services and provide high-risk schools selected for targeted monitoring with timely reports and technical assistance plans. In addition to IDEA’s requirement that special education services be provided to all eligible students with disabilities, BIE also has a responsibility to work towards the goal of ensuring that BIE schools are of the highest quality and provide for their students’ unique educational needs. Without taking steps to address weaknesses in key areas of special education, BIE cannot ensure that the schools it funds are meeting their responsibilities under IDEA or addressing the unique needs of more than 6,000 BIE students with disabilities. We are making the following seven recommendations to BIE: The Director of BIE should establish consistent requirements for schools on making up missed special education and related services and monitor schools to ensure that they follow these requirements. (Recommendation 1) The Director of BIE should work with knowledgeable stakeholders in Indian education to establish a community of practice or other formal mechanism to identify and disseminate promising practices for schools— especially those in remote locations—on recruiting, hiring, and retaining special education teachers and contracting with providers. The Director of BIE could consider conferring with BIE’s special education advisory committee, OSEP, and relevant tribal and state education officials in addressing this recommendation. (Recommendation 2) The Director of BIE should rescind the policy of its division overseeing tribally controlled schools that does not meet Interior’s requirement to annually review all schools’ documentation to verify the provision of services for every special education student, and ensure that all divisions comply with this requirement. (Recommendation 3) The Director of BIE should update the agency’s workforce plan to include a strategy and timeframe for filling vacant staff positions responsible for overseeing and supporting schools’ special education programs. (Recommendation 4) The Director of BIE should fully implement the agency’s high-risk monitoring policy for IDEA and other federal education programs, including requirements for agency-wide coordination, and ensure that schools selected for such monitoring receive reports and technical assistance plans within 30 days of agency on-site visits, as required by BIE policy. (Recommendation 5) The Director of BIE should establish special education training requirements for staff in the agency’s Education Resource Centers who are responsible for supporting and overseeing schools’ special education programs, and ensure that staff complete those training requirements. (Recommendation 6) The Director of BIE should take steps to ensure that all of the agency’s Education Resource Centers conduct outreach with schools to inform them of their new roles in overseeing and supporting schools’ special education programs under BIE’s reorganization. (Recommendation 7) We provided a draft of this report to the Departments of the Interior (Interior) and Education (Education) for review and comment. Interior provided formal comments, which are reproduced in appendix II, agreeing with all seven recommendations and describing actions BIE plans to take to address them. Education provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretaries of the Interior and Education and interested congressional committees. The report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our report examines (1) the extent to which eligible Bureau of Indian Education (BIE) students with disabilities are provided the special education and related services required by their individualized education programs (IEP); and (2) the extent to which BIE oversees and supports the provision of these services at its schools. To obtain a generalizable sample of students, we defined our target population as all students at BIE schools with an active IEP covering a full 5-month period between September 2017 and February 2018 and obtained an electronic listing of IEPs for the 2017-2018 school year—the most recent complete school year at the time of our analysis—extracted from the Native American Student Information System (NASIS). We used these data as a basis to define a sample frame and identified 2,904 unique students with an active IEP for the full period from 169 BIE schools. We assessed the reliability of these data by interviewing knowledgeable agency officials and reviewing technical documentation describing the methodology, assumptions, and inputs used to produce the IEP-related data we received from BIE, upon which we created our generalizable sample. We determined these data to be sufficiently reliable for the purposes of our report. We selected a random two-stage cluster sample of 30 BIE schools and 150 students (about 5 per school) who had at least one active IEP covering the full period from the sample frame of 169 schools and 2,904 students. We chose to use a two-stage sampling approach to control (limit) the number of schools that we would need to coordinate with to collect the school-level data required. Because the number of unique in- scope students ranged between 2 and 88 per school, we chose to select schools with probability proportional to size. We computed the target sample sizes of 30 schools and 150 students (about 5 per school) using estimated standard errors of student age that accounted for the additional variance resulting from the complex sampling approach (two-stage cluster sample) for various sample sizes. We then compared the change in standard errors for various sample sizes of schools and students to those from a simple random sample of size 150. Based on these results, we observed that the decrease in standard errors began to level out at a sample size of 30 schools (n=30) and that selecting more than 5 students (m=5) per school would not significantly decrease the standard errors. To estimate the likely margin of error we expected to achieve from this sample, we conducted a simulation of 10,000 samples of 30 schools and 150 students and examined the distribution of outcomes from these results for 3 proportion estimates. The proportion estimates were designed to provide a range of variance outcomes. Based on this simulation of possible results, we expected this sample design to generate percentage estimates to the sample frame (full population) of students with an overall precision of about plus or minus 12 percentage points or fewer. During our review we learned that one school selected in our sample was under a BIE internal investigation into irregularities in the school’s special education documentation. As a result, we removed the five students at this school from the sample. We added an additional randomly selected school as a replacement. As a result, we completed our analysis for 30 of the 31 schools that we sampled. Additionally, we found that a number of students selected within schools were out of the scope of our defined target population, such as when a student transferred to another school during our review period. When possible, we selected additional cases to account for the out-of-scope students. The final sample included 138 students at 30 schools. Based on the final sample of students, we completed our analysis for 96.5 percent of the students that we sampled that were within the scope of our defined target population. We defined the primary unit of analysis as the student and generated estimates at the student level summarized across 17 of the 18 weeks in the time period of our analysis (between October 2, 2017, and February 2, 2018). We chose not to include data collected for the school week from December 25, 2017, through December 29, 2017 because most schools either did not provide services during this week or were closed. We collected and analyzed the data for students’ scheduled services on a weekly basis. The data collection at this level resulted in multiple, repeated observations for each student. For the purposes of generating weighted, generalizable estimates, these data were summarized at the student level for each service type. The sampling weights were computed at the student level so that estimates from this sample will be made to the population of students. The student weight, which is the inverse of the probability of selection, was computed by combining a stage 1 (school) weight and stage 2 (student within selected schools) weight that each accounted for the probability of selection at each stage. The final student weights varied slightly from school to school based on the number of students selected within each school. The final student weights ranged from 16.13 to 24.20, and most were 19.36. We conducted a test run of our document collection and analysis methodology at one BIE-funded school to determine the feasibility of collecting and analyzing school service logs in electronic form. Based on the successful results of the test run, we concluded that this methodology would allow for the collection and analysis of service logs from our sample of schools. We then requested electronic copies of IEPs and any applicable IEP amendments from BIE for the students in our sample. We followed up with BIE on any issues of unclear or missing IEP documentation. After compiling IEPs for the students in our sample, we requested service logs from our sample schools and requested confirmation of key information in students’ IEPs (e.g., the type, duration, and frequency of services for our review period). To generate a data set based on schools’ service logs, we coded, by week, information contained in all service logs using a coding scheme that specified type of service (i.e., education vs. related), frequency of services received, duration of services received, and reasons for missed services. To determine the baseline of minutes and frequency for each service, we calculated the duration and frequency of services required in student IEPs and removed service duration and frequency on days that schools were not in session according to school calendars. In cases in which schools did not provide us with service logs for part or all of our review period, we were not able to determine whether the services were received. In such cases, we recorded these minutes in a separate category, labeled “service time not accounted for.” In a small number of instances, schools recorded service log entries, but unclear notation prevented us from being able to determine whether the service was provided. This accounted for less than half of a percent of service time. Because the information contained in school service logs is self-reported by school personnel or service contractors, we were not able to assess the overall accuracy of this information, such as whether services were actually provided—a limitation that generally applies to research relying on self-reported information. We conducted extensive follow-up with schools, however, to ensure the most complete data collection possible and contacted them when further information or clarification was needed to understand service log entries. Additionally, we obtained student attendance data from BIE to compare with entries in service logs from four schools. As the result of this comparison, we removed one student from our sample whose attendance data showed significantly higher absences than were reflected in school service logs. In many cases, we received service logs that did not convey complete information about some aspects of service provision. For example, some logs used non-numerical notation to show that services were provided, such as checkmarks. In these cases, we assumed that a checkmark indicated that one full service was provided and recorded the number of minutes in a typical service. Additionally, some service logs combined multiple services (e.g., 60 minutes of math, 30 minutes of reading, and 30 minutes of writing) into one log and recorded the total number of minutes that services were provided within a week. As we could not determine which services were expected on which days within a week, we adjusted minutes and frequency for combined services when schools were not in session by prorating the weekly totals accordingly. To collect information on reasons for missed services, we categorized recorded reasons into the following groups: (1) student absence; (2) student disciplinary action; (3) provider absence; (4) provider administrative duties; (5) unplanned school closure; (6) school-sponsored activities; (7) testing; and (8) reason not provided. We recorded missing service logs as a separate category (“service time not accounted for”) and did not include them in our analysis of reasons for missed services. Estimates from this sample are generalizable to the estimated in-scope population of about 2,600 (+/- 130) students with at least one active IEP covering the period from September 1, 2017, through February 1, 2018. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval. This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. All estimates in this report have a confidence interval with a margin of error of plus or minus 12 percentage points or fewer, unless otherwise noted. In addition to the generalizable data we collected on schools’ special education service provision, we asked school officials to respond to an optional set of questions on the challenges schools face, if any, in providing services. Eighteen of the 30 schools in our sample provided responses. Of the schools who did not respond, we obtained information on challenges with service provision from four additional schools during our site visits, which are described below. Together, we obtained perspectives about the challenges schools face in special education service provision from a total of 22 of the schools in our sample. We also requested information from schools about the circumstances under which providers are expected to make up missed special education services, and the timeframe in which these make-up services are expected. Twenty-three of the 30 schools in our sample provided a response. To help inform both of our research objectives, gather additional information about schools’ special education programs, and explore issues related to their provision of special education and related services, we conducted site visits to seven schools in our sample located in New Mexico (4 sites) and Arizona (3 sites), selected for their large numbers of BIE-funded schools. Our criteria for selecting schools included special education student enrollment size, whether a school was operated by BIE or a tribe, and tribal affiliation. At each site, we gathered information from participants—including school administrators and teachers—using semi-structured interview questions. We collected information on school staff’s roles and responsibilities in administering and overseeing special education; policies, practices, and any challenges to providing and documenting special education and related services; and perspectives on guidance and support, if any, from relevant BIE offices. Our site visits also included meetings with BIE officials in Albuquerque, New Mexico, and Window Rock, Arizona. Our interviews with officials focused on their roles and responsibilities in overseeing and supporting schools’ special education programs; staff capacity; intra-agency coordination on special education; policies and procedures related to special education monitoring; and their views on factors, if any, that may affect schools’ ability to provide special education and related services to students with IEPs. To inform both research objectives, we also interviewed officials in several BIE offices with responsibilities for overseeing and supporting schools’ special education programs, including: the Office of the Director; the Division of Performance and Accountability; the Office of the Associate Deputy Director-Tribally Controlled Schools; the Office of the Associate Deputy Director-Bureau Operated Schools; and the Office of the Associate Deputy Director-Navajo Schools. Our interviews with agency officials focused on their roles and responsibilities in overseeing and supporting schools’ special education programs; staff capacity; intra- agency coordination on special education; policies and procedures related to special education monitoring; and their views on factors, if any, that may affect schools’ ability to provide special education and related services to students with IEPs. We compared BIE’s oversight and technical assistance activities against requirements under IDEA and Department of the Interior (Interior) regulations, BIE policies and procedures, and federal standards for internal control to evaluate the sufficiency of their efforts in monitoring and supporting BIE schools’ special education programs. We also conferred with Interior’s Office of the Solicitor regarding their position on whether one BIE division’s policy for reviewing special education documentation at schools conformed to Interior’s regulations. Additionally, we interviewed current and former members of BIE’s advisory committee on special education to obtain their views on the extent to which BIE schools provide required services to students with IEPs and challenges, if any, that schools may face in delivering services. We also interviewed national groups with expertise on Indian education and BIE schools—including the National Congress of American Indians, the National Indian Education Association, and the Tribal Education Departments National Assembly—to obtain their views on special education and related services at BIE schools. Our review of relevant documentation included BIE’s monitoring and technical assistance policies and procedures as well as relevant federal laws and regulations, including requirements under IDEA Part B. This included BIE’s May 2018 policy and procedures on conducting high-risk monitoring of the implementation of federal education programs at BIE schools. In addition, we reviewed the Department of Education’s determination letters and October 2019 monitoring report to BIE assessing the agency’s compliance with IDEA requirements. We conducted this performance audit from July 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Melissa Emrey-Arras, (617) 788-0534 or emreyarrasm@gao.gov In addition to the contact named above, Elizabeth Sirois (Assistant Director), Edward Bodine (Analyst-in-Charge), Liam O’Laughlin, and Angeline Bickner made key contributions to this report. James Ashley, Susan Aschoff, Serena Lo, John Yee, James Rebbe, Sam Portnow, Aaron Karty, James Bennett, Avani Locke, and Olivia Lopez also contributed to this report. Tribal Programs: Resource Constraints and Management Weaknesses Can Limit Federal Program Delivery to Tribes. GAO-20-270T. Washington, D.C.: Nov 19, 2019. High Risk: Progress Made but Continued Attention Needed to Address Management Weaknesses at Federal Agencies Serving Indian Tribes. GAO-19-445T. Washington, D.C.: March 12, 2019. High Risk: Agencies Need to Continue Efforts to Address Management Weaknesses of Federal Programs Serving Indian Tribes. GAO-18-616T. Washington, D.C.: June 13, 2018. Indian Affairs: Further Actions Needed to Improve Oversight and Accountability for School Safety Inspections. GAO-17-421. Washington, D.C.: May 24, 2017. Indian Affairs: Actions Needed to Better Manage Indian School Construction Projects. GAO-17-447. Washington, D.C.: May 24, 2017. Tribal Transportation: Better Data Could Improve Road Management and Inform Indian Student Attendance Strategies. GAO-17-423. Washington, D.C.: May 22, 2017. Indian Affairs: Key Actions Needed to Ensure Safety and Health at Indian School Facilities. GAO-16-313. Washington, D.C.: March 10, 2016. Indian Affairs: Preliminary Results Show Continued Challenges to the Oversight and Support of Education Facilities. GAO-15-389T. Washington, D.C.: February 27, 2015. Indian Affairs: Bureau of Indian Education Needs to Improve Oversight of School Spending. GAO-15-121. Washington, D.C.: November 13, 2014. Indian Affairs: Better Management and Accountability Needed to Improve Indian Education. GAO-13-774. Washington, D.C.: September 24, 2013.", "summary": "BIE funds 185 elementary and secondary schools that serve more than 6,000 Native American students with special needs. The Department of Education has raised concerns about BIE's implementation of IDEA in recent years, including its long-standing noncompliance with IDEA requirements. GAO was asked to examine the provision of special education and related services to eligible BIE students. This report examines the extent to which (1) BIE students with disabilities are provided the special education and related services required by their IEPs, and (2) BIE oversees and supports the provision of special education at its schools. GAO analyzed data on special education and related services for a generalizable sample of 138 BIE students with IEPs at 30 schools over a 4-month period in school year 2017-2018 (the most recent complete school year at the time of our analysis); compared BIE special education practices with its policies and Interior and IDEA requirements; visited schools in two states selected for their large numbers of BIE schools; and interviewed school and agency officials. Schools funded by the Bureau of Indian Education (BIE) are required under the Individuals with Disabilities Education Act (IDEA) to provide services for eligible students with disabilities, such as learning disabilities or health impairments. Services for these students are listed in individualized education programs (IEP). GAO found that BIE schools did not provide or did not account for 38 percent of special education and related service time for students with disabilities, according to analysis of school documentation for a 4-month review period (see fig.). This included one school that did not provide any services to three students. While BIE has plans to improve documentation of such services, it has not established whether and when missed services should be made up, which has led to inconsistent practices among schools. Establishing consistent requirements for making up missed services could help students receive the special education and related services they need to make academic progress. BIE's limited monitoring and technical assistance have hindered its oversight and support for special education at schools. For example: A division of BIE responsible for overseeing about half of all BIE schools decided to verify the provision of special education services at only one-third of its schools per year, although the Department of the Interior (Interior) requires BIE to annually verify the provision of services at all schools. BIE provided required monitoring reports late and did not provide required technical assistance plans to 14 schools that BIE determined were at high risk of not complying with IDEA and other federal education programs in school year 2018-2019. BIE officials said that the field office staff responsible for working with schools on special education often do not have the requisite expertise, which has hampered their oversight and support to schools. Without verifying special education services at every school annually, following high-risk monitoring and technical assistance requirements, and providing training to its staff, BIE cannot ensure that the schools it funds are meeting their responsibilities under IDEA. Strengthening such oversight and support activities can help BIE as it works to address the unique needs of students with disabilities to help prepare them for future education, employment, and independent living. GAO is making seven recommendations, including that BIE establish consistent requirements for schools on making up missed services, annually verify special education services at all schools, comply with high-risk monitoring and technical assistance requirements, and ensure that BIE staff receive needed training. Interior agreed with the recommendations.", "document_type": "gao"}
{"report": "According to FDA documents and officials, import alerts serve several purposes, including the following: Prevent products that appear to violate FFDCA from being distributed in the United States. Free up agency resources to examine other shipments by automatically detaining shipments on import alerts on a case-by-case basis without examining them. Place the responsibility on the importer to ensure that the products being imported into the United States comply with federal laws and FDA regulations. Import alerts may apply to (1) one or more products produced by all firms in a specific geographic area, (2) one or more products produced or shipped by a specific firm, or (3) a specific product because of concerns about the product regardless of what firm produces it or where. Import alerts covering a specific geographical area may apply to an area within a country, to one or more entire countries, or worldwide. For example, FDA established an import alert covering all firms processing shrimp in India because of the presence of filth, decomposition, and Salmonella. For import alerts that apply to geographical areas, all firms in the area that produce the products specified in an import alert are initially placed on that alert, and the specified products are subject to detention without physical examination. If a firm presents evidence establishing that the conditions that gave rise to the appearance of the violation associated with the alert have been resolved and the agency has confidence that future entries will comply with FFDCA, FDA indicates that the firm may be removed from the alert by placing it on a “green list” that FDA creates for the alert. For import alerts that apply to products that a specific firm produces, FDA individually determines—for example, through testing or examination—whether a firm and its products are potentially violative and may be identified for potential detention without physical examination. If so, FDA places them on a “red list” that it creates for the alert. Import alerts that apply to a specific product of concern generally have neither a red list nor a green list because such products cannot be removed from the alerts. Products detained via import alerts may be (1) refused entry, in which case they must be exported to another country or destroyed, or (2) allowed to enter U.S. commerce if they can be shown to not violate FFDCA or can be reconditioned to be brought into compliance with the act. DHS, through CBP, is charged with facilitating international trade at the ports-of-entry for seafood and other imports, while FDA examines or inspects certain seafood imports. CBP is responsible for, among other things, collecting the duties, taxes, and fees assessed on products, including seafood, and managing the import process. CBP collects import entry data through its Automated Commercial Environment/International Trade Data System. These entry data are submitted by a filer (typically, the product importer or a broker) and include a description of the product, manufacturer information, and the country of origin. Generally, FDA electronically receives notification from CBP of all entries of products under FDA jurisdiction at ports of entry through the CBP system described above, which links to FDA’s OASIS. Once entry information is received in OASIS, FDA uses its Predictive Risk-based Evaluation for Dynamic Import Compliance Targeting (PREDICT) screening tool to evaluate each entry line. PREDICT is a computerized tool designed to estimate the risk of imports using information such as the history of the importer or processing facility, inspection history, and country of origin. FDA staff use these risk estimates to target for examination shipments with high levels of risk. FDA cannot physically examine every shipment of such products, owing in part to the volume of imported products; we previously reported that the agency examines about 1 percent of entry lines annually. FDA uses PREDICT to electronically screen all imported food shipment information filed electronically to determine which imports to physically examine at the border. PREDICT uses a variety of data and analyzes data by applying rules—conditional statements that tell PREDICT how to react when encountering particular information—to generate risk scores for imported food. The electronic screening process consists of two phases: Prior notice screening is intended to protect against potential terrorist acts and other public health emergencies. Prior notice screening requires that an importer, broker, or other entity submit information to FDA on food being imported or offered for import into the United States before that food arrives at the port of entry. FDA targets, screens, and reviews the information to ensure that the information meets the prior notice requirements and to determine whether the food potentially poses a terrorism threat or other significant health risk. Admissibility screening is intended to ensure that the food is admissible under FFDCA. As part of admissibility screening, FDA electronically screens entry lines using PREDICT to determine, among other things, whether the product on the entry line is on an import alert. If the product on an entry line is on an import alert, then the entry line may be detained without physical examination. If the product is not on an import alert, then the entry line goes through the typical admissibility screening process through which FDA uses PREDICT to calculate a risk score and determine whether the entry line is identified for potential examination or sampling. Our review of FDA’s Regulatory Procedures Manual found that FDA’s import alert process for seafood products includes three key components: (1) establishing new import alerts to respond to human health risks, (2) placing firms and products on new or existing import alerts (placement decisions), and (3) removing firms and products from existing import alerts when violations are resolved (removal decisions). According to FDA’s Regulatory Procedures Manual, FDA establishes new seafood import alerts to respond to human health hazards. FDA officials may recommend new import alerts for a variety of reasons, including the following: FDA officials detain one or more products for a violation of FFDCA that poses a significant health hazard (e.g., the presence of Salmonella); FDA officials notice a large number of violations affecting firms or products from a specific country or area (e.g., the presence of filth in canned crabmeat from Thailand); FDA enforces regulatory requirements affecting importers that the agency decides could be implemented, in part, through the use of an import alert (e.g., HACCP requirements); or FDA addresses concerns about the safety of specific products, including puffer fish, which contain a deadly neurotoxin, or products produced in geographic areas with known contamination, such as those from areas surrounding Fukushima, Japan, which are at risk of radionuclide contamination. FDA officials in the field or at headquarters may recommend new import alerts. FDA’s Division of Import Operations reviews the recommendations and decides whether to approve them (called the clearance process). After approval, according to FDA officials, FDA revises its screening process at the ports of entry via PREDICT to screen for products, firms, or countries on the new alert. According to FDA’s import alert data, as of July 3, 2018, FDA had 52 active import alerts affecting imported seafood that addressed a wide range of seafood products and violations of FFDCA. The range of violations that these alerts address included the presence of foodborne pathogens, such as Salmonella and E. coli; the presence of unapproved animal drug residues, such as chloramphenicol and nitrofurans; the presence of pesticide chemical residues that are not allowed or do not meet tolerance levels, such as diuron; the presence of decomposition or insect, rodent, or other filth; the presence of illegal or undeclared colors, undeclared food additives, such as high fructose corn syrup, or undeclared food allergens, such as milk; the failure of the firm to meet HACCP requirements; and the failure of the firm to operate in conformity with current good manufacturing practices. According to FDA’s import alert data, overall, from October 1, 2011, through July 3, 2018, the 52 import alerts for imported seafood affected a total of 3,765 unique firms in 111 countries. (See app. I for information describing these 52 alerts.) According to FDA’s Regulatory Procedures Manual, after an import alert has been established, FDA places certain seafood firms or products on the alert and may detain affected products at the port of entry to prevent them from entering U.S. commerce pending the importer of record’s response. The manual specifies that FDA may place firms or products on a new or existing import alert for the following violations of FFDCA: (1) products are manufactured, processed, or packed under insanitary conditions; (2) products are forbidden or restricted for sale in the country in which they were produced or from which they were exported; or (3) products appear to be adulterated or misbranded based on information such as the product’s history of violations, among other things. Examples of adulteration may include pathogens, such as Salmonella, and residues of drugs or pesticides above accepted levels. FDA’s Regulatory Procedures Manual also specifies the following types of evidence that FDA generally may rely on to show that violative conditions exist: one violative sample from FDA’s examination of the product, if the product may have adverse health consequences; information and historical data, such as a firm showing a pattern of exporting violative products, if evidence indicates the product could pose a health hazard; multiple violative samples, for violations (such as decomposition, filth, or labeling) that do not pose a significant public health hazard; and violations identified during inspections of importers or foreign processing facilities. According to FDA officials, about 90 percent of the recommendations to place firms or products on an import alert result from FDA analysis of imported seafood samples that identified product violations, such as drug residues above acceptable levels. Officials stated that the remaining 10 percent of the recommendations arise from FDA inspections of importers or processing facilities that identify firm violations, such as violations of FFDCA related to HACCP requirements. According to FDA’s Regulatory Procedures Manual, once a firm or product has been placed on an import alert, future shipments may be detained without physical examination, and the importer of record must decide how to respond. The importer of record receives a notice stating that the associated entry line is being detained and subject to refusal. The importer of record may request that FDA immediately refuse entry of the product, in which case the product must either be exported or destroyed. Alternatively, the importer of record may (1) submit evidence showing that the product does not appear to be violative or (2) request to “recondition” the product—for example, relabel the product or convert the product into a type of product FDA does not regulate. According to FDA’s Regulatory Procedures Manual, FDA will hold a hearing to determine whether the detained product should be released. If FDA determines that the importer of record has provided sufficient information to overcome the appearance of a violation, the importer of record receives a notice stating that the product is released. If FDA determines that the importer of record’s actions did not bring the product into compliance, the product would be refused and must be exported elsewhere or destroyed. FDA may decide to remove a firm or product from an import alert if there is evidence that the conditions that led to placement on the alert have been resolved, according to FDA’s Regulatory Procedures Manual. Our review of the manual and interviews with FDA officials indicate that FDA sampling and inspections are key activities that support the agency’s removal decisions. Generally, firms petition FDA to remove one or more products or the firms themselves from seafood import alerts, and FDA’s Division of Import Operations reviews the petitions. FDA’s procedures specify the evidence that firms are to submit, which varies depending on the nature of the import alert and the violation of FFDCA. FDA may require one or a combination of the following: a minimum of five consecutive nonviolative commercial shipments as determined by a private laboratory hired by the firm, an on-site inspection of the importer or foreign processing facility, or documentation showing that the cause of the violation has been fully corrected. For example, according to FDA’s procedures, firms or products placed on an import alert based on a violative facility inspection may generally be removed from the alert following a reinspection that shows that corrective actions to resolve the violation have been taken. Private laboratories usually collect and analyze the samples used as evidence to indicate that a commercial shipment does not violate FFDCA and provide support for FDA’s decisions to remove firms and products from import alerts. The procedures also call for the agency to have confidence that future shipments will comply with FFDCA, but they do not specify how FDA should ensure continued compliance. According to FDA officials, when the agency relies on documentation to support a removal decision, FDA generally relies on subsequent inspections of the importers or foreign processing facilities and sampling of their products to have confidence that the firms and their products continue to comply. FDA’s Regulatory Procedures Manual, as supplemented by the ORA Laboratory Manual, specifies that the agency should conduct checks to review whether the work performed by such laboratories can be used as an appropriate basis for FDA’s removal decisions. These checks include the following: Audit samples. FDA’s manuals specify the following two audit goals to ensure that the private laboratories’ analyses that FDA uses to support its removal decisions are valid: (1) to audit samples from at least one of the five nonviolative entries, as determined by a private laboratory that the firm hired, to support a removal decision to ensure the validity of the laboratory’s analysis and (2) to audit at least 10 percent of the work that a private laboratory performed to ensure that the laboratory submits scientifically sound data. In the course of its audits, FDA is to collect samples, called audit samples, to verify analytical results from a private laboratory that demonstrates a product complies with FFDCA. According to FDA, private laboratory analyses are a critical element in public health protection because they support FDA decisions to release detained goods. FDA’s collection of audit samples is intended to provide confidence in the laboratories’ analytical results. On-site assessments. FDA’s ORA Laboratory Manual states that, at times, FDA visits a private laboratory to ascertain that it has the capability or capacity to perform analyses that FDA often relies on to support removal decisions. The manual also states that on-site assessments provide the opportunity to observe that equipment and standards, among other things, needed to conduct the proposed analyses are present and in good order; to review the adequacy of the laboratory’s quality assurance and record-keeping programs; and to observe the techniques and practices of the analysts. Furthermore, the manual states that the on-site assessments are voluntary and that a private laboratory may decline to participate. FDA has established audit goals, requirements, and expectations related to sampling and inspections—key activities to support import alert removal decisions—but does not monitor the extent to which it is meeting them. In our review of FDA’s CMS data for 274 removal decisions from a nongeneralizeable selection of seven import alerts from October 1, 2011, through July 3, 2018, we found that FDA conducted audit sampling and inspections to support removal decisions and subsequent sampling and inspections to ensure continued compliance for a small percentage of the decisions. Specifically: Audit samples prior to removal decisions. For almost all of the 274 removal decisions we reviewed, FDA did not meet its first audit goal— to audit samples from at least one of the nonviolative shipments used to support a removal decision to ensure the validity of the analysis of the private laboratory hired by the firm. All seven of the import alerts we reviewed were established for violations of FFDCA for which FDA’s Regulatory Procedures Manual specifies that firms should enter into U.S. commerce at least five consecutive nonviolative commercial shipments, as determined by a private laboratory hired by the firm, before FDA may consider a removal. Therefore, FDA should have audited samples from at least one nonviolative shipment for all 274 removal decisions related to these seven import alerts. As described earlier, FDA collects audit samples from shipments of imported seafood to conduct such audits. However, we found that FDA did not conduct any sampling, including audit sampling, within 1 year prior to removal for 260 (or 95 percent) of the 274 removal decisions we reviewed. FDA officials told us that they do not monitor the extent to which the agency is meeting its audit goal, such as through analyzing CMS sampling data across all firms and products affected by the alerts and therefore were not aware that the agency had not met the audit goal. Conversely, FDA officials told us that they were aware that the agency historically had not met its second audit goal specified in its procedures—to audit at least 10 percent of each private laboratory’s work to support removal decisions to ensure that each laboratory submits scientifically sound data. While FDA does not regularly monitor whether it is meeting its 10 percent audit goal, in 2014, the agency analyzed data on the audit samples it collected during its audits of shipments covering fiscal years 2003 through 2013. FDA conducted this analysis in response to concerns that district staff raised about the quality of the analyses performed by private laboratories for one of its districts. These concerns included the following: Failure to obtain representative samples from throughout a shipment. Failure to obtain samples randomly from throughout the shipment. Failure to ensure an unbroken chain of custody from the site of collection of a sample to the private laboratory as necessary to ensure the integrity of the sample. Use of untrained temporary employees to collect samples and representing these individuals as employees of the private laboratory. FDA’s 2014 analysis showed that the agency did not achieve its 10 percent audit goal during the 11-year period. According to the analysis, FDA audited about 1 to 2 percent of work performed by private laboratories to support removal decisions. In response to our request, FDA updated its analysis through fiscal year 2018. The updated analysis shows that this percentage has improved in recent years, with FDA auditing about 3 percent of the work that private laboratories performed for fiscal year 2018. However, this level of auditing remains far below the goal of at least 10 percent, as shown in figure 1. According to FDA officials, the agency has not met this audit goal largely because it has limited resources. Inspections prior to removal decisions. For the 274 removal decisions we reviewed, FDA conducted inspections of importers or foreign processing facilities for 28 (about 10 percent) of the removal decisions in the 6 months prior. According to FDA’s procedures, firms or products placed on an import alert based on a violative facility inspection may generally be removed from the alert following a reinspection of the importer or foreign processing facility. In some instances, a firm may present information or documentation sufficient to demonstrate that appropriate corrections are in place to overcome the appearance of a violation and, with appropriate concurrence, may be removed from the import alert. FDA officials added that, regardless of the basis for placement on an import alert, FDA could require an on-site inspection prior to removal, depending on the hazard the violation posed. For example, certain violations may result in a finding of “official action indicated” (OAI), which indicates that an establishment failed to meet regulatory or administrative requirements and may pose a hazard to public health. FDA’s Field Management Directive 86 establishes a goal for FDA staff to conduct a follow-up inspection within 6 months after an OAI finding to verify that the facility has corrected violations. In our review of the 274 removal decisions, we found that for 32 firms that received an OAI inspection finding after FDA issued the directive in December 2011, FDA did not conduct a follow-up inspection for 31 of these firms before removing them from an import alert. According to FDA officials, the agency did not monitor whether its staff decided that inspections would be expected for the 274 removal decisions or whether the facilities that received an OAI inspection finding were reinspected. FDA officials told us that the agency relied on reviewing data on removal decisions individually to ensure that expected inspections had been conducted. Consequently, FDA was not aware of the extent to which the facilities associated with the removal decisions were actually inspected. Sampling or inspections following removal decisions. As shown in figure 2, for the 274 removal decisions we reviewed, FDA subsequently conducted sampling for 6 percent of the products at ports of entry and inspections for 13 percent of the importers or foreign processing facilities within 1 year after removal. FDA does not have a goal for the amount of sampling or inspections that should be conducted following removal decisions; however, as described above, FDA’s procedures call for the agency to base removal decisions on evidence establishing that the conditions that gave rise to the appearance of a violation have been resolved and that the agency has confidence that future shipments will comply with FFDCA. FDA officials said that when the agency does not inspect a facility and relies on documentation describing the actions the firm has taken to address the appearance of a violation to support a removal decision, the agency relies on subsequent sampling and inspections to have confidence in continued compliance. According to FDA, the past violative history of a firm is reflected in the PREDICT screening rules for the examination of future shipments and in the process of prioritizing inspections of foreign facilities. It was unclear from the CMS data that FDA provided the extent to which the agency relied on documentation to support the remainder of its removal decisions. However, based on FDA officials’ statements about subsequent sampling or inspections, we would expect to see a larger percentage of products sampled and firms inspected after their removal from import alerts for FDA to have confidence in continued compliance given the low percentage of inspections we found before removal decisions. FDA officials said they were not monitoring whether staff decided that subsequent sampling and inspections would be expected for these removals, and staff do not continuously monitor post- removal activities. Consequently, FDA officials were not aware of the extent to which the products and foreign processing facilities associated with removal decisions were subsequently sampled and inspected. FDA officials told us that they were generally aware that FDA had conducted limited sampling and inspections to support removal decisions and have confidence in continued compliance. They attributed this limited sampling and inspections to their belief that many import alert removal decisions can be supported by reviewing documentary evidence that FDA requested and the firms provided that describes the actions the firms have taken to address the appearance of a violation. According to FDA officials, such reliance on firm-provided documentation to support removal decisions is, in part, how FDA prioritizes its use of limited laboratory and inspection resources. FDA officials stated that the agency can check the basis of its removal decisions by looking up individual import alert cases in CMS and the agency’s sampling and inspection data in FACTS and OASIS to determine whether the agency would conclude that sampling and inspections to support these decisions would be appropriate, and if so, whether they were done. These officials said that they believed that checking the data on the basis of removal decisions individually and when questions arise from sources internal or external to FDA, instead of regularly analyzing sampling and inspections data, was sufficient to ensure the appropriate level of oversight. However, as discussed above, this approach has not informed them of the extent to which the agency is meeting its audit goals and expectations. Standards for internal control in the federal government state that management should design control activities to achieve objectives and respond to risks. An example of such control activities includes management comparing actual performance with planned or expected results. Such a comparison could include FDA comparing audits conducted with its audit goal (e.g., auditing at least 10 percent of a private laboratory’s work) to ensure that its goal was met. Monitoring the extent to which the agency is meeting its audit goals and expectations for conducting sampling and inspections to support its import alert decisions would enhance its oversight of these activities to better protect U.S. consumers from imported seafood that is not safe and wholesome. FDA and DHS have established a mechanism for coordinating the use of certain resources, but they generally have not coordinated to help ensure that firms comply with seafood import alerts by identifying potential instances of evasion of alerts, according to agency officials. FDA officials stated that the agency can coordinate with CBP in situations that could involve evasion of import alerts, but the agency does not have a formal mechanism for regularly and proactively coordinating to identify evasion. FDA officials said that such coordination could include CBP sharing information that could help FDA identify instances of evasion. As previously noted, CBP is responsible for collecting customs duties on imports, including seafood, and seeks to prevent the evasion of customs duties. As we reported in 2012, CBP personnel are to analyze trends in import data, among other things, to look for anomalies that may indicate evasion and also follow up on allegations from external sources. Once CBP identifies a potential instance of evasion, it can use a variety of techniques at different points in the import process to determine whether evasion is actually occurring. These techniques include collecting samples from shipments of products at U.S. ports of entry and conducting laboratory analyses of these samples to identify their true country of origin. Through its efforts, CBP has identified illegal transshipments—a scheme to conceal the country of origin and thereby evade applicable duties or FDA’s import alerts. For example, CBP reported that in 2016, customs officers seized about 42 tons of Chinese honey that had been transshipped through Taiwan to evade U.S. duties applicable to Chinese honey. According to FDA documents, at the same time, FDA had an import alert for honey because of unsafe drug residues. This alert included Chinese firms, but did not include any firms from Taiwan. In February 2009, we reported on CBP’s expertise in detecting illegal transshipment that could enhance FDA’s ability to detect import alert evasion. We stated that FDA and CBP could work together to help ensure that importers were not attempting to evade duties or import alerts. However, we found that the agencies had not identified ways to maximize and leverage their resources or established processes and policies for working together systematically across agency lines. We recommended, among other things, that FDA and CBP develop mechanisms to share information related to the evasion of import alerts. FDA and CBP agreed with our recommendation, but as of July 2019, the agencies had not fully implemented it. Specifically, FDA and CBP signed a memorandum of understanding (MOU), effective May 2013, to set forth terms for CBP to coordinate with FDA on staffing, space, and equipment requirements for the National Targeting Center. However, the MOU does not address CBP sharing information on potential evasion of import alerts with FDA regularly or the agencies working proactively to identify such evasion. According to CBP officials, FDA and CBP do not coordinate specifically on targeting to detect evasion, but CBP would be willing to coordinate with FDA and provide any applicable expertise in this area. While a collaborative mechanism such as an MOU is not needed to share information, we continue to believe that FDA and CBP should develop a mechanism to help the agencies formally coordinate to identify potential evasion of seafood import alerts. Until these agencies develop such a mechanism, they may be missing opportunities to share information regularly that could benefit each agency’s efforts to detect illegal transshipment and help FDA proactively identify and prevent evasion of seafood import alerts. FDA has not assessed the effectiveness of its seafood import alerts in helping to achieve its food safety mission. Specifically, FDA has not established performance goals and measures for seafood import alerts— key elements of assessing the effectiveness of programs. Performance goals explain the purpose of agency programs and the results—including outcomes—that they intend to achieve. Performance measures provide organizations with the ability to track the progress they are making toward their mission and goals and provide managers with information on which to base their organizational and management decisions. Under GPRAMA, agencies are required to develop long-term strategic plans and establish results-oriented goals in alignment with their missions and identify objectives and strategies needed to achieve those goals. GPRAMA also requires agencies to use performance information to assess their progress toward achieving their goals. According to FDA officials, the agency is implementing a program, which it refers to as an import alert effectiveness program, to review its import alerts. FDA documents note that the focus of this program includes (1) determining if FDA identified the firms on import alerts during its admissibility screening and took the appropriate action, (2) ensuring the accuracy of data FDA maintains in CMS on firms on import alerts, and (3) determining whether the reasons for the alerts are still relevant, and ensuring that the import alerts are accurately posted for clear communication to industry and FDA field staff. We commend FDA for these efforts. However, according to our review of FDA documents describing the activities planned for this program, the program does not include performance goals and measures for import alerts. FDA officials stated that this is because the program is new. Additionally, in February 2019, FDA published a broad plan for the safety of imported food that includes a goal, objective, and strategy related to import alerts. Under its goal to detect and refuse entry of unsafe foods at the border, FDA has an objective to strategically use import alerts and import certifications by using data and information from oversight activities, regulatory cooperation, and other reliable sources to enhance the effectiveness and efficiency of import alerts. However, FDA’s strategy for achieving this objective does not include performance goals or measures that would allow the agency to assess the effectiveness of its seafood import alerts in helping to achieve FDA’s food safety mission. In its 2019 plan for the safety of imported food, FDA states that it intends to develop performance goals and measures for imported food safety. However, FDA has not established a time frame for doing so. Once FDA has developed goals and measures for imported food safety, FDA would be able to establish corresponding performance goals and measures specific to seafood import alerts. By developing such goals and measures, FDA would be better positioned to assess how well its seafood import alert activities are supporting the agency in achieving its food safety mission. Import alerts play an important role in keeping the U.S. food supply—as well as other FDA-regulated products—safe, and FDA has numerous active import alerts affecting imported seafood that address a wide range of seafood products and violations of FFDCA. However, FDA does not have a process to monitor the extent to which it is conducting key activities to support its removal decisions—sampling and inspections. Establishing such a process would provide greater assurance that FDA is conducting its expected level of sampling and inspections to support its removal decisions and have confidence in continued compliance. Additionally, FDA and CBP have yet to develop mechanisms to share information regularly and proactively that can help detect noncompliance with import alerts through evasion. We continue to believe that doing so, as we previously recommended, would enhance the agencies’ efforts to identify potential evasion of seafood import alerts. Further, by establishing a time frame for developing goals and measures for assessing the effectiveness of its imported food safety efforts and also developing such goals and measures specific to seafood import alerts, FDA would be better positioned to assess how well its import alert activities are supporting the agency in achieving its food safety mission. We are making the following three recommendations to FDA: The Commissioner of FDA should establish a process to monitor whether the agency is meeting its audit goals and expectations for sampling and inspections to support its removal decisions for seafood import alerts. This could be done through regularly analyzing data that FDA collects, such as those in CMS, FACTS, and OASIS. (Recommendation 1) The Commissioner of FDA should establish a time frame for developing performance goals and measures for its imported food safety program. (Recommendation 2) The Commissioner of FDA should, as the agency develops goals and measures for its imported food safety program, develop performance goals and corresponding performance measures specific to seafood import alerts. (Recommendation 3) We provided a draft of this report to HHS and DHS for comment. In its comments, reproduced in appendix II, HHS’s FDA agreed with all three of our recommendations. FDA also provided technical comments, which we incorporated as appropriate. DHS provided technical comments, which we incorporated as appropriate. More specifically, FDA agreed with our recommendation that it establish a process to monitor whether the agency is meeting its audit goals and expectations for sampling and inspections to support its removal decisions for seafood import alerts. FDA stated that it agrees that developing metrics and monitoring the import alert removal process is necessary and that these efforts should be guided by the analysis of available data. FDA also stated that it plans to develop goals for its auditing process to ensure audit sampling targets products of higher public health concern and provides the agency support to guide decisions to release individual shipments that have been detained as a result of an import alert. FDA further stated that it intends to enhance its case management system to include checklists for FDA reviewers who process petitions for removal from import alerts to better document that all necessary information is present and has been evaluated to support the removal decision. FDA agreed with our recommendation that it should establish a time frame for developing performance goals and measures for its imported food safety program. FDA stated that the agency is developing performance measures and outcome indicators for imported food safety to help support the agency’s overall goal of reducing the incidence of illness and death attributable to preventable contamination of FDA- regulated foods. Finally, FDA agreed with our recommendation that it should, as it develops goals and measures for its imported food safety program, develop performance goals and corresponding performance measures specific to seafood import alerts. FDA stated that the agency will use the results of its import alert effectiveness program to develop metrics to demonstrate the effectiveness of the program and its use of import alerts. The extent to which FDA’s planned actions will satisfy our recommendations will depend on how FDA implements those actions. As agreed with your offices, unless you publicly announce the contents earlier, we plan no further distribution of this report until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Health and Human Services, the Secretary of Homeland Security, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact me at (202) 512-3841 or morriss@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Table 1 includes information posted on the Food and Drug Administration’s website describing the 52 import alerts affecting seafood that were active as of July 3, 2018. In addition to the contact named above, Anne K. Johnson (Assistant Director), David Moreno (Analyst in Charge), Kevin Bray, Steven Campbell, Stephen Cleary, Michele Fejfar, Ellen Fried, Juan Garay, Caitlyn Leiter-Mason, Ying Long, Cynthia Norris, Dan Royer, and Kiki Theodoropoulos made key contributions to this report. Food Safety and Nutrition: FDA Can Build on Existing Efforts to Measure Progress and Implement Key Activities. GAO-18-174. Washington, D.C.: January 31, 2018. Imported Seafood Safety: FDA and USDA Could Strengthen Efforts to Prevent Unsafe Drug Residues. GAO-17-443. Washington, D.C.: September 15, 2017. Seafood Safety: Status of Issues Related to Catfish Inspection. GAO-17- 289T. Washington, D.C.: December 7, 2016. Imported Food Safety: FDA’s Targeting Tool Has Enhanced Screening, but Further Improvements Are Possible. GAO-16-399. Washington, D.C.: May 26, 2016. 2015 Annual Report: Additional Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve Other Financial Benefits. GAO-15- 404SP. Washington, D.C.: April 14, 2015. Food Safety: FDA Can Better Oversee Food Imports by Assessing and Leveraging Other Countries’ Oversight Resources. GAO-12-933. Washington, D.C.: September 28, 2012. Managing for Results: Key Considerations for Implementing Interagency Collaborative Mechanisms. GAO-12-1022. Washington, D.C.: September 27, 2012. Seafood Safety: Responsibility for Inspecting Catfish Should Not Be Assigned to USDA. GAO-12-411. Washington, D.C.: May 10, 2012. Seafood Safety: FDA Needs to Improve Oversight of Imported Seafood and Better Leverage Limited Resources. GAO-11-286. Washington, D.C.: April 14, 2011. Seafood Fraud: FDA Program Changes and Better Collaboration among Key Federal Agencies Could Improve Detection and Prevention. GAO-09- 258. Washington, D.C.: February 19, 2009. Results-Oriented Government: Practices That Can Help Enhance and Sustain Collaboration among Federal Agencies. GAO-06-15. Washington, D.C.: October 21, 2005.", "summary": "Imports account for over 90 percent of U.S. seafood consumption. FDA and the Department of Homeland Security (DHS) both play a role in overseeing imported seafood. FDA is responsible for ensuring the safety of most imported seafood. DHS provides FDA with import data on FDA-regulated products, including seafood. If FDA finds that imported seafood products appear to violate U.S. laws, FDA may place the products, firms, or countries on an import alert. GAO was asked to review FDA's efforts to use import alerts to ensure the safety of imported seafood. This report, among other things, (1) describes FDA's import alert process for seafood products, (2) examines FDA oversight of key activities to support import alert removal decisions, and (3) examines the extent to which FDA has assessed the effectiveness of its seafood import alerts. GAO reviewed FDA procedures and data, including data on 274 removal decisions, for a non-generalizable sample of seven import alerts selected for a range of violations of federal law. GAO also interviewed FDA officials. The Food and Drug Administration's (FDA) import alert process for seafood products includes three key components: (1) establishing new import alerts, which inform FDA field staff and the public that the agency has enough evidence that products appear to violate a federal food safety law to detain those products at U.S. ports of entry without physically examining them; (2) placing firms and products on existing import alerts; and (3) removing firms and products from those import alerts when violations are resolved. As of July 3, 2018—the most recent data at the time of GAO's analysis—FDA had 52 active import alerts affecting imported seafood that addressed a wide range of violations of federal law, including the presence of foodborne pathogens, such as Salmonella , or unapproved animal drug residues. FDA has established audit goals, requirements, and expectations related to sampling and inspections—key activities to support import alert removal decisions—but does not monitor the extent to which it is meeting them. GAO's review of 274 removal decisions from October 1, 2011, through July 3, 2018, found that FDA had supported only a small percentage of its removal decisions by conducting sampling and inspections. For example, FDA has a goal to audit samples from at least one of the shipments used to support each removal decision to ensure the validity of the analysis that a private laboratory performed. However, GAO found that within a year prior to the 274 removal decisions, FDA did not conduct any audits for 260 (95 percent) of the 274 removal decisions. FDA officials said they conducted limited sampling because many import alert removal decisions can be supported by documentary evidence provided by firms. Additionally, for certain violations that indicate a firm failed to meet regulatory or administrative requirements and may pose a public health hazard, an FDA directive establishes a goal for FDA staff to conduct a follow-up inspection within 6 months. However, GAO's review of removal decisions found that for 31of the 32 firms that received such a finding, FDA did not conduct a follow-up inspection before removing them from an import alert. FDA officials said they did not know whether they were meeting their audit goals because the agency does not have a process to monitor the extent to which it is conducting its sampling and inspections. Establishing such a process would provide greater assurance that FDA is conducting its expected level of sampling and inspections to support its removal decisions and has confidence in continued compliance. FDA has not established performance goals and measures for seafood import alerts—key elements for assessing the effectiveness of programs. Goals explain the outcomes a program seeks to achieve, and measures track progress towards those goals. In February 2019, FDA published a broad plan for the safety of imported food. The plan states that FDA intends to develop performance goals and measures related to imported food safety, but FDA has not established a time frame for doing so. By establishing a time frame and developing such goals and measures, FDA would be better positioned to assess how well its seafood import alert activities are supporting the agency in achieving its food safety mission. GAO recommends that FDA (1) establish a process to monitor whether the agency is meeting its audit goals and expectations for sampling and inspections, (2) establish a time frame for developing goals and measures for its imported food safety program, and (3) develop goals and measures for seafood import alerts. FDA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The Defense Acquisition Regulations Council is responsible for developing fully coordinated recommendations for revisions to the DFARS, which supplements the Federal Acquisition Regulation. The Federal Acquisition Regulation provides executive agencies with uniform acquisition policies and procedures for acquiring products and services, and is prepared and issued through the coordination of the Defense Acquisition Regulations Council and Civilian Agency Acquisition Council. The DFARS contains additional requirements of law, DOD-wide policies, delegations of Federal Acquisition Regulation authorities, deviations from Federal Acquisition Regulation requirements, and policies or procedures that have a significant effect beyond the internal operating procedures of DOD, or a significant cost or administrative impact on contractors or offerors. The DFARS is designed to be read in conjunction with the primary set of rules in the Federal Acquisition Regulation. Stakeholders in the acquisition process include executive agencies’ program and contracting officials, members of Congress and congressional staff, industry and contractors, and members of the public. Specifically, the Defense Acquisition Regulations Council generally makes implementation recommendations to DOD, such as when publication of rules to amend the DFARS is appropriate. DARS staff then implements the Council’s recommendations. The Defense Acquisition Regulations Council is composed of the Chair who is also the DARS Director, Deputy Chair who is also the DARS Deputy Director, and one policy and one legal representative from each of the following DOD components: Defense Contract Management Agency, and Defense Logistics Agency. DFARS changes can originate from different sources, including legislation, recommendations from DOD’s Office of the Inspector General, our recommendations, court decisions, executive orders, or policy changes within DOD. DFARS changes that originate from legislation, including NDAAs, are given the highest priority, according to DARS officials. DARS staff has other related responsibilities, including working with civilian agencies in activities connected with promulgating the Federal Acquisition Regulation. DOD has a rulemaking process to change the DFARS that includes implementing acquisition-related NDAA provisions through regulatory changes or other methods. The DARS staff is responsible for facilitating the process of making these changes in the DFARS. The staff first reviews draft legislation that may affect acquisition regulations before Congress enacts the NDAA. After the NDAA is enacted, DARS staff then identifies which provisions require action. The DARS staff coordinates across the department and provides for public notice of implementation actions when required. However, there is no publicly-available summary reporting of the status of the regulatory changes or other implementation methods linked to specific NDAA provisions. Congress and industry representatives therefore cannot clearly see the status of pending regulatory changes pertaining to acquisition issues addressed in the NDAA. DOD’s acquisition rulemaking procedures are governed by statute, which generally requires agencies to issue a proposed rule for each rulemaking and provide not less than a 30-day public comment period following publication of the proposed rule in the Federal Register. These requirements only apply to those DFARS rules that are related to the expenditure of appropriated funds and have either a significant effect beyond the agency’s internal operating procedures or a significant cost or administrative impact on contractors or offerors. However, the requirements may be waived if “urgent and compelling” circumstances make compliance with the requirements impracticable. In those instances, DOD issues an interim rule rather than a proposed rule. The interim rule is effective on a temporary basis if DOD provides at least a 30-day public comment period after publishing the interim rule in the Federal Register. DOD then may issue a final rule after considering any comments received. As a part of the rulemaking process, the Office of Information and Regulatory Affairs reviews proposed and final regulations. The time period for its review is generally limited to 90 days. See figure 1 for an overview of the DARS’s process to change DFARS rules. DARS staff can implement the provisions by one or more methods, including the rulemaking process described above and other actions, such as: issuing DFARS class deviations, and changing DFARS Procedures, Guidance, and Information (PGI), a non-regulatory document that supplements the DFARS. Before annual NDAAs are enacted, DARS staff told us that they review proposed legislation and committee report language to stay abreast of provisions they may have to implement after NDAAs are enacted. DARS staff solicits input on which provisions may require implementation from DOD components and offices, such as the Defense Contract Management Agency, that have a stakeholder interest in many acquisition-related provisions. DARS staff tracks each of these potential changes in case files, which are referred to in this report as cases. DARS staff also can work with other federal agency offices to implement an acquisition-related NDAA provision through a Federal Acquisition Regulation rule change, interim rule change, or class deviation. In some instances, a provision may specify that DOD take other actions, such as holding a public meeting to obtain interested parties’ opinions on an acquisition topic. Upon review of the enacted NDAA, the Defense Acquisition Regulations Council or DARS staff sometimes decides that a provision should be implemented by another DOD office or in other defense acquisition guidance. For example, the DARS staff could determine that a provision only applies to one DOD component and does not require a DFARS change. In another example, DARS staff could determine that the initially identified provision should be implemented in acquisition guidance, such as DOD Instruction 5000.02. Further, sometimes DARS staff will change implementation methods after having selected one. For example, DARS staff may initially decide to implement a provision with a DFARS change, but upon conducting research to draft the rule change, it may find that the provision would be better implemented with a Federal Acquisition Regulation change. Based on our review of NDAAs from fiscal years 2010-2018, we identified 37 explicitly directive provisions—36 that directed DOD to either make or consider making an acquisition-related regulatory change, and one that directed DOD to issue acquisition-related guidance. DARS officials told us that when a provision directs a change or consideration of an acquisition-related regulatory change, the Defense Acquisition Regulations Council and DARS staff give it the highest priority. We confirmed that, in the Defense Acquisition Regulations Management Information System, this priority is reflected by identifying the NDAA as the source of the change in the synopsis field. We confirmed that the 36 provisions we identified had NDAA as the source of the change. DARS staff has different ways of communicating changes to the regulations and other implementation methods to the public. “Significant revisions” to the DFARS must be published in the Federal Register. DARS staff also publishes the progress of DFARS changes in case reports that are available on its website. Case reports provide a synopsis of each case, which can include the NDAA provision or other source of the case; describe cases combined to address more than one provision; or show multiple cases for a single provision. DARS staff also posts notices of DFARS class deviations and revisions to DFARS PGI on its website. DARS staff provides input for regulatory priorities through DOD’s publicly-available Unified Agenda. This includes all expected rule changes DOD-wide and a Regulatory Plan that identifies the most significant regulatory actions DOD expects to issue within the next 12 months. It is difficult, however, for interested parties, such as Congress and industry groups, to determine if a provision has been implemented using only this publicly-available information. This is due, in part, to the fact that provisions can be implemented through one or multiple methods, and DARS actions can be reflected in more than one case. For example, if an interested party, such as a federal contractor, expects to see a change to the DFARS based on how an NDAA provision is worded, but the DARS staff implements the provision with a class deviation, the interested party may not realize that the provision has been implemented by another method. In addition, DARS staff may consider a provision as implemented with an action such as a class deviation even if a subsequent case to change the DFARS is opened later. We, too, found it difficult to determine the implementation status of acquisition-related NDAA provisions using only publicly-available reports and information. DARS staff was able to create a report for us that showed implementation status by provision. But we were able to determine and verify the implementation status of these provisions only after using a combination of the DARS internal reports, publicly-available reports and information, and data we had requested from the Defense Acquisition Regulations Management Information System database. DFARS and Federal Acquisition Regulation open and closed case reports provide general information on a case, such as the topic and case number. The reports also provide the status of the case. For example, a report may say: “Defense Acquisition Regulations Council director tasked team to draft proposed DFARS rule.” However, the case reports do not provide information on when a regulatory change may be expected. This information can help companies plan for future business opportunities and devise the means to ensure compliance with regulations. See figure 2 for an overview of NDAA provision implementation methods and the mechanisms DOD uses to report status information. Standards for Internal Control in the Federal Government states that management should externally communicate quality information to achieve the entity’s objectives. Specifically, available information should address the expectations of both internal and external users. DARS staff regularly publishes public status updates on cases, rule changes, and PGI changes. However, there is no readily available mechanism for external stakeholders, such as Congress and industry representatives, to determine the implementation status of any particular legislative provision. This is because the status updates published by the DARS staff do not provide the complete implementation status listed by specific legislative provisions. Without communicating the implementation status of legislative provisions, Congress lacks information for oversight of acquisition reforms, and federal contractors lack visibility into how and when changes will occur. For example, the House Armed Services Committee expressed its oversight interest in a provision passed in 2013 that was not implemented in the DFARS until 2018. Additional information on the status of the DFARS change may have been helpful to the committee’s oversight activities. In another example, industry expressed concern about the status of a regulation implementing a fiscal year 2017 NDAA provision related to the lowest price technically acceptable (LPTA) source selection process in order to plan for responding to solicitations following implementation of the rule. DARS staff identified 180 NDAA provisions from fiscal years 2010-2018 that potentially required an acquisition-related regulatory change or another action. DARS staff and other DOD entities have taken some type of action to address all these provisions. Our analysis showed that 112 of the provisions had been implemented. The timeframe for implementation was, on average, just under 1 year. Some implementation efforts took longer than a year for a variety of reasons, such as reconciling multiple years of NDAA requirements or dealing with highly complex topics. The remaining legislative provisions are either in the process of being implemented or DARS staff determined that a regulatory change was not needed. DARS staff prioritized those provisions that expressly directed DOD to change or consider an acquisition-related regulatory change. DARS documentation showed that some of the implementation deadlines in statute were shorter than the time periods that DARS generally allows for the rulemaking process, including public comment and outside agency review. Following its process, DARS staff identified 180 NDAA provisions from fiscal years 2010-2018 that potentially required an acquisition-related regulatory change or another implementation action. We found that DARS staff and, in a few instances, other DOD entities have taken action to address all of those provisions. See figure 3 for the implementation status of all 180 provisions distributed by NDAA fiscal year. We found that DARS officials opened cases within 30 days of NDAA enactment, on average, for the acquisition-related NDAA provisions from fiscal years 2010-2018. For the 112 of 180 provisions that have been implemented, DOD completed the first implementation actions on average within 1 year. DARS staff frequently used a combination of methods to implement provisions, such as using an interim DFARS rule followed by a final rule. When two or more implementation actions are taken, DARS officials generally consider the first action as the action that implements the provision. If a class deviation, interim DFARS rule, or PGI is issued to address an NDAA provision, the DARS staff considers it implemented even if additional actions—such as issuing a final DFARS rule—are still being pursued. We used the same approach for our analyses for determining the implementation status of provisions and time taken to complete implementation. See table 1 below for the average time to complete the first action to implement the 112 NDAA provisions. Figure 4 shows the distribution of time taken to implement all 112 NDAA provisions. Some implementation efforts took longer than a year for a variety of reasons. Publishing an interim DFARS rule generally took less than a year, while publishing a final DFARS rule change took closer to 2 years on average. In the selected DFARS cases studied, we found examples where DOD had to reconcile multiple years of NDAA requirements or manage complex topics, which we have similarly reported on as reasons that influence the time needed to issue regulations in past work. Reconciling Multiple Years of NDAA Requirements: Congress directed DOD to revise the DFARS to reflect updated requirements related to procuring commercial items in section 851 of the fiscal year 2016 NDAA. Congress included a deadline of 180 days from the NDAA enactment, but the DFARS update was not completed until nearly 800 days after enactment. Our review of DARS case files showed that the DARS staff prioritized implementing the provision, but decided to address a related NDAA provision from 2013 through a single DFARS rule change. In this instance, multiple NDAAs included provisions the DARS staff viewed as closely related. As a result, developing language that reconciled the requirements for all of these provisions took additional time and effort. DARS officials told us that they came close to publishing a commercial items rule earlier, but started over because subsequent NDAA provisions included requirements related to commercial items. Managing Complex Topics: Congress directed DOD to revise the DFARS regarding the use of the LPTA source selection process in section 813 of the NDAA for fiscal year 2017. Congress included a deadline of 120 days from enactment in the provision, which DARS staff was unable to meet due to the complexity of the issue and additional requirements added by a subsequent NDAA. Following enactment of the 2017 NDAA, DARS staff developed a proposed rule that would have implemented relevant NDAA sections in under a year. However, prior to publishing that rule, the NDAA for fiscal year 2018 was enacted and contained added LPTA requirements. After the 2018 NDAA was enacted, DARS staff combined all of its related LPTA cases into a new DFARS case and made adjustments to the proposed rule it had been developing. The DARS staff responsible for updating the previous proposed rule requested five extensions from DARS leadership between January and March 2018 to update documentation to address the fiscal year 2018 provisions and prepare additional analyses. After months of coordination and reviews, DARS staff published a proposed rule in December 2018 with a 60-day comment period. Sixteen formal submissions were received by the February 2019 deadline. The DARS staff is currently reviewing those comments and drafting a final rule, which must still go through multiple reviews before it can be published in the Federal Register. Congress directed DOD to consider revising the DFARS regarding an extension of contractor conflict of interest limitations in section 829 of the NDAA for fiscal year 2013. This provision has been in the process of implementation due to a determination that this rule should be informed by a pending Federal Acquisition Regulation change. In this instance, Federal Acquisition Regulation principals opened a case to implement the provision in the Federal Acquisition Regulation 7 months after NDAA enactment, and DARS officials agreed to draft the rule change that would implement the provision. DARS staff published a proposed rule in the Federal Register for public comment approximately 8 months later. However, DARS staff informed us that a few weeks after the public comment period, Federal Acquisition Regulation officials directed them to suspend its activities until a separate, related Federal Acquisition Regulation rule on “closely associated with inherently governmental functions” was finalized. However in August of 2018, section 829 of the NDAA for fiscal year 2013 was repealed by section 812(b)(4) of the NDAA for fiscal year 2019. We identified 36 provisions, a subset of the 180, that expressly directed DOD to make or consider making an acquisition-related regulatory change, as well as one provision that directed DOD to issue guidance. DARS staff implemented 22 of the 37 provisions in about 13 months on average. Of the 37 provisions, 32 had statutory deadlines, ranging from 30 to 365 days after enactment. The DARS documentation showed that the DARS staff prioritized these NDAA provisions by noting the deadlines, but generally did not implement them by the deadline. We found that: DARS staff met the deadlines in eight of 32 instances. In those eight instances, the actions completed were relatively simple, and DARS staff determined that a public comment period was not required. For example, DARS staff changed the DFARS to implement section 801 of the fiscal year 2018 NDAA—which required DOD to revise the DFARS to include three specific statements about DOD acquisitions— in 143 days, ahead of Congress’s 180-day deadline. Four provisions had deadlines for implementation of 60 days or less. For example, sections 841 and 842 in the fiscal year 2012 NDAA called for changes to be made to the DFARS within 30 days. The short deadlines allowed for fewer days than DARS staff allocate for public comment (minimum of 30 days, by law) and outside agency review (no more than 90 days, by executive order). Deadlines that did not allow for these activities as well as time to draft language were typically not met. DARS is responsible for developing and maintaining DOD acquisition regulations, which may include implementing acquisition-related NDAA provisions. The DARS staff has internal tools to track, manage, and communicate the status of DFARS changes, including implementation of NDAA provisions. However, DOD’s DFARS change process does not have a reporting mechanism to clearly communicate to Congress, industry, and other interested parties the status of regulatory or other changes linked to specific NDAA provisions. Without a mechanism to better communicate DOD’s actions to implement NDAA provisions, stakeholders potentially affected by reforms may be unaware of what and when changes may be implemented. Given the actions and length of time that it may take to implement provisions and see a change reflected in the DFARS or elsewhere, stakeholders would benefit from knowing the status of DOD’s actions before implementation has been completed in order to, for example, prepare for compliance. We are making the following recommendation to the Secretary of Defense to ensure that the Director of the Defense Acquisition Regulations System: Develop a mechanism to better communicate to all stakeholders the implementation status of acquisition-related NDAA provisions, particularly those provisions that direct a change or consideration of a change to the DFARS. (Recommendation 1) We provided a draft of this report to DOD for comment. DOD concurred with our recommendation to develop a mechanism to better communicate to all stakeholders the implementation status of acquisition-related NDAA provisions. The department said it will develop a matrix reflecting the implementation status of acquisition-related NDAA provisions and post the matrix on the Defense Pricing and Contracting public website. DOD’s written comments on the report are reprinted in appendix II. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Acting Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; the Secretaries of the Air Force, Army, and Navy; the Director, Defense Acquisition Regulations System; appropriate congressional committees; and other interested parties. This report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by e-mail at woodsw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report are listed in appendix III. A House Armed Services Committee report related to the National Defense Authorization Act (NDAA) for Fiscal Year 2019 included a provision for us to review the Department of Defense’s (DOD) process for revising the Defense Federal Acquisition Regulation Supplement (DFARS), among other things. This report (1) determines how DOD implements acquisition-related NDAA provisions and communicates implementation status, and (2) identifies the status of DOD’s efforts to implement acquisition-related NDAA provisions from fiscal years 2010- 2018. To determine how DOD implements acquisition-related NDAA provisions, we reviewed DOD documents and supplemented our work with interviews with relevant DOD officials. Specifically, we reviewed the DFARS Operating Guide, January 2015; presentation on the Defense Acquisition Regulations System Rulemaking Process, DFARS open and closed cases reports, Federal Acquisition Regulation open and closed cases reports; decision matrices from the Defense Acquisition Regulations System (DARS), which document decisions on implementing NDAA provisions from fiscal years 2010-2018; and other applicable reports and information on provisions and cases from the DARS staff and the Defense Acquisition Regulations Council. We also referenced our past reports on DFARS rulemaking; U.S. Code on Publication of proposed regulations; the Federal Acquisition Regulation Operating Guide, July 2015; Federal Register notices related to DOD rulemaking; and the news listing on the DARS website. We adopted the DARS use of the term “implementation,” which includes both regulatory action as well as other actions, such as public meetings or a report. We interviewed DOD officials that are involved in the DFARS rulemaking process. Specifically, we interviewed members of the Defense Acquisition Regulations Council and DARS staff, including the Chair and Deputy Chair, the Regulatory Control Officer that prepares rules for submission to the Office of Information and Regulatory Affairs within the Office of Management and Budget, and DFARS case managers. We also interviewed officials from the DOD components—Air Force, Army, Navy, Defense Contract Management Agency, and Defense Logistics Agency. We interviewed industry representatives from the Aerospace Industries Association, National Defense Industrial Association, and the Professional Services Council. We compared the DARS process with the Standards for Internal Control in the Federal Government. Specifically, we reviewed DOD’s public reports of its implementation actions with internal control principle 15: “management should externally communicate the necessary quality information to achieve the entity’s objectives.” Stakeholders in the acquisition process include executive agencies’ program and contracting officials, members of Congress, congressional staff, industry, contractors, and members of the public. The DARS staff provided a complete data extract of Defense Acquisition Regulations Management Information System as of October 31, 2018, to document the acquisition-related NDAA provisions that DARS staff identified as potentially requiring implementation. The Defense Acquisition Regulations Management Information System is the DARS database to track the status of individual cases that are associated with DARS rulemaking actions. We analyzed the data extract to identify which Title VIII provisions that the DARS identified for implementation from NDAAs from fiscal years 2010-2018, and to identify the cases related to those provisions. We focused on Title VIII—Acquisition Policy, Acquisition Management, and Related Matters—of the NDAAs, which contain acquisition-related provisions. We queried the data extract to identify cases with notes indicating NDAA provisions from fiscal years 2010-2018 as the source of change in the database synopsis field. We found 180 acquisition-related provisions from Title VIII of the NDAAs from fiscal years 2010-2018 that the DARS staff had identified for implementation. For these 180 provisions, we determined the number and types of cases by year, duration of cases, and duration of select steps for cases. We verified the validity of provisions and cases that were not in both the DARS reports that DARS staff manually produced and the Defense Acquisition Regulations Management Information System data with DARS officials as of April 19, 2019. To identify the implementation status of acquisition-related NDAA provisions from fiscal years 2010-2018, we further analyzed data from the Defense Acquisition Regulations Management Information System and DARS reports. For the actions associated with the 180 provisions, we analyzed the status history of each case, associated status dates for cases, and closed status indicators. We also reviewed DARS reports, such as the internal stats charts with case duration and closure metrics that DARS officials told us they manually verify. We reviewed a report that the DARS staff manually produced for us that showed actions and cases by provision for the NDAAs from fiscal years 2010-2018. We independently analyzed the NDAAs from fiscal years 2010-2018 and determined 36 provisions in Title VIII that expressly directed DOD to make or consider making an acquisition-related regulatory change, as well as one provision that directed DOD to issue guidance. We identified these provisions using a keyword search of individual and combined terms and criteria, such as “regulation, defense, and acquisition regulation.” To better understand the Defense Acquisition Regulations Council’s recommendations and DARS implementation process, we selected 12 provisions that directed DOD to make or consider an acquisition-related regulatory change for case studies. The case study selection criteria included the year of the NDAA from which the provision originated for a mix of older and newer provisions and time duration for a mix of shorter and longer cases related to implement the provisions. We used DARS reports and our analysis of the Defense Acquisition Regulations Management Information System data to determine the year and time duration. Since the DFARS Case Standard Timeline is 52 weeks, we selected provisions with cases that were both more and less than 52 weeks. We also selected provisions with cases that were open and closed. We created a data collection instrument for the case studies that captured information, such as which provisions were associated with the case, to standardize our data collection process. For the 12 provisions, we reviewed the associated case files that are generally a record of the implementation process and the Defense Acquisition Regulations Council’s recommendations, and the decisions made by the DARS staff. We also reviewed available publication folders associated with the cases that generally document input and decisions from other agencies, such as the Office of Management Budget’s Office of Information and Regulatory Affairs. Finally, we used the information in the files to verify the information in Defense Acquisition Regulations Management Information System for those specific cases. We found the Defense Acquisition Regulations Management Information System data and information in the files that we reviewed to be sufficiently reliable for purposes of reporting on how the DARS staff implemented NDAA provisions and the time duration to do so. We conducted this performance audit from August 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Penny Berrier, Assistant Director; James Kim; Holly Williams; Beth Reed Fritts; Gail-Lynn Michel; Emily Bond; Lori Fields; Matthew T. Crosby; Lorraine Ettaro; and Tim Bober made key contributions to this report.", "summary": "Congress has pursued acquisition reforms to make DOD's acquisition process more efficient and timely. Some statutes have directed DOD to revise or consider revising its acquisition regulations. The House Armed Services Committee's report accompanying the NDAA for Fiscal Year 2019 included a provision for GAO to review DOD's regulatory implementation of acquisition-related provisions in the NDAAs from fiscal years 2010 through 2018. This report (1) determines how DOD implements acquisition-related NDAA provisions in the DFARS and communicates with stakeholders throughout that process, and (2) identifies the status of implementation of provisions enacted in the specified NDAAs. To conduct this work, GAO reviewed DOD documents and interviewed DOD officials regarding the process for implementing acquisition-related NDAA provisions. GAO also analyzed DOD's data and reports on the implementation status of provisions enacted in NDAAs for fiscal years 2010 through 2018. GAO selected 12 of these provisions as case studies based on factors such as year enacted and time taken for implementation to obtain a mix of older and newer provisions, and shorter and longer implementation timeframes. The staff of the Defense Acquisition Regulations System are responsible for making changes in the Defense Federal Acquisition Regulation Supplement (DFARS)—the Department of Defense's (DOD) regulation augmenting the Federal Acquisition Regulation, which guides government purchases of products and services. They begin their process by first tracking legislation that may affect acquisition regulations before Congress enacts the National Defense Authorization Act (NDAA). After enactment, they identify which provisions to implement through regulatory changes and which to implement through other means. In certain circumstances, rather than change the DFARS, DOD can issue a class deviation, which allows its buying organizations to temporarily diverge from the acquisition regulations. The figure below shows the primary means DOD uses to implement NDAA provisions, and the mechanisms DOD uses to make information on the status of any changes available to the public and others. Department of Defense's (DOD) Methods to Implement and Report on Actions Taken on National Defense Authorization Act (NDAA) Provisions DOD does not have a mechanism to clearly communicate to Congress, industry, and other interested parties the status of regulatory or other changes based on NDAA provisions. Using only publicly-available reports and information, it is difficult for an interested party to find the implementation status of any given acquisition-related NDAA provision. This is because no single DOD source communicates the status of regulatory or other changes in a manner that links the changes to specific NDAA provisions. As a result, interested parties are not always aware of what provisions have been implemented and when. This information is important for congressional oversight and to industry for planning and compliance purposes. Federal internal control standards state that management should address the communication expectations of external users. GAO found that DOD has taken action to address 180 acquisition-related provisions since 2010. On average, implementation was completed within 1 year from enactment. Some complicated provisions took more than 2 years to implement. For example, a fiscal year 2016 NDAA provision, directing a regulatory change for commercial item procurements, took more than 2 years to implement because DOD was reconciling a prior year's related but different NDAA commercial item provision into one DFARS change. DOD should develop a mechanism to better communicate the implementation status of acquisition-related NDAA provisions, particularly those that direct a change or consideration of a change to the DFARS. DOD concurred with the recommendation.", "document_type": "gao"}
{"report": "The Immigration and Nationality Act (INA) of 1952, as amended by the Immigration Reform and Control Act of 1986, authorizes the establishment of the H-2B visa category which allows U.S. employers to bring non-immigrant workers into the United States to perform temporary non-agricultural work. Generally, U.S. employers may apply for H-2B visas when they can establish that (1) their need for an H-2B worker’s labor is temporary, meaning a one-time occurrence, a seasonal need, a peak load need, or an intermittent need; (2) qualified U.S. workers are unavailable to perform the work; and (3) the employment of an H-2B worker will not adversely affect the wages or working conditions of similarly-employed U.S. workers. Generally, an H-2B worker’s authorized stay per the TLC will be no more than 10 months. However, DHS may authorize an extension of up to one year to H-2B workers already in the United States, based on a subsequent TLC, with a maximum stay of up to three years. Pursuant to the INA, as amended by the Immigration Act of 1990, the H- 2B visa program is subject to an annual cap of 66,000 visas. These visas are divided into two semiannual allocations: up to 33,000 workers may be issued H-2B visas or provided H-2B nonimmigrant status in the first half of the fiscal year(October 1 – March 31), and the remaining annual allocation will be available in the second half of the fiscal year (April 1 – September 30). In fiscal years 2005, 2006, 2007, and 2016, Congress amended the INA to include a provision that established a returning worker exemption. This exemption enabled H-2B workers who were counted against the visa cap during one of the three preceding fiscal years to not be counted against the visa cap for the relevant fiscal year. Federal agencies use a multi-step process to screen employers to ensure eligibility to hire H-2B workers and later screen nonimmigrant workers on eligibility to work under the H-2B visa category (see fig. 1). DOL’s Office of Foreign Labor Certification (OFLC) screens and processes TLC applications from employers. OFLC is to review these applications to ensure that no qualified U.S. workers are available for the job in question and that the wages and working conditions offered to H-2B workers will not adversely affect similarly employed U.S. workers. In 2015, DOL and DHS jointly issued regulations that set forth a number of specific requirements that employers must meet in order to obtain a TLC, including taking specific steps to recruit U.S. workers before hiring H-2B workers; paying a wage equal to or exceeding the highest of the prevailing wage or the federal, state, or local minimum wage; paying for H-2B workers’ transportation costs; and guaranteeing a minimum number of work hours to H-2B workers. Although employers may submit a TLC application requesting a specific number of H-2B workers, DOL may approve all the workers requested, approve a smaller number of workers, or deny the application. Employers can petition DHS’s U.S. Citizenship and Immigration Services (USCIS) for a number of workers up to the number approved by DOL, then USCIS screens and processes employer’s petitions. DHS is to send the approved petitions to the Department of State, which screens workers that apply for H-2B visas at U.S. embassies and consulates overseas. The Department of State is responsible for interviewing H-2B applicants and reviewing their visa applications and supporting documentation as part of their adjudication process. DOL is the primary agency that enforces H-2B employer requirements and relevant labor laws. This enforcement authority is delegated within the DOL to the Administrator of the Wage and Hour Division (WHD). WHD conducts investigations, inspections, and law enforcement functions that carry out the provisions of 8 U.S.C. § 1184(c), INA section 214(c), and the regulations pertaining to the employment of H–2B workers, any worker in corresponding employment, or any U.S. worker improperly rejected for employment or improperly laid off or displaced, according to DOL. WHD investigates complaints filed by both foreign and U.S. workers affected by the H–2B program, as well as concerns raised by other federal agencies, such as DHS or the Department of State, regarding particular employers and agents. WHD also conducts targeted or directed (i.e., not complaint-based) investigations of H–2B employers to evaluate program compliance. Through OFLC, DOL may audit adjudicated applications to ensure employers’ compliance with the terms and conditions of their H-2B Registration, Application for Prevailing Wage Determination, Application for Temporary Employment Certification, or H-2B Petition and to fulfill the Secretary’s statutory mandate to certify applications only where unemployed U.S. workers capable of performing such services cannot be found. For non-compliant applications, OFLC may request more information from employers prior to possible debarment. Audits can also be used to establish a record of employer compliance or non-compliance with program requirements and because the information they contain assists DOL in determining whether it needs to further investigate an employer or its agent or attorney. In such instances, OFLC refers its audit findings and underlying documentation to DHS, WHD, or other appropriate enforcement agencies, who in their turn might conduct a targeted investigation. Moreover, DOL’s Office of Inspector General may conduct investigations of applications suspected of potential fraud. DHS can also conduct certain enforcement activities exercised through USCIS. USCIS has the authority to adjudicate the H-2B petition and conduct inquiries on the employer’s H- 2B petition, which includes the approved TLC and any supporting documentation, to prevent fraud and ensure compliance with H-2B requirements. Generally, according to DHS, it processes and approves employers’ petitions in order of receipt until the cap is reached. However, for the second half of fiscal year 2018, USCIS announced that employers had petitioned for more visas during the first five business days of the filing period than were available under the semiannual allocation. As a result, per its regulations, DHS used a computer-generated process to randomly select petitions to consider for approval. Additionally, during fiscal years 2017, 2018 and 2019, Congress enacted provisions that authorized DHS, after consultation with DOL, to make more visas available beyond the statutory cap of 66,000 if the agencies determined that the needs of U.S. businesses could not be satisfied with willing, qualified and able U.S. workers. Under these provisions, the total number of additional visas that DHS could make available could be up to the highest number of returning workers approved in any fiscal year that the returning worker exemption was in place, which was about 65,000 visas in fiscal year 2007, according to DHS and DOL (therefore up to about 131,000 visas could be made available in each of these fiscal years). The Secretary of Homeland Security, after consultation with DOL, decided to make 15,000 additional visas available for each year in fiscal years 2017 and 2018 (81,000 visas total in each year) and 30,000 additional visas for returning workers in fiscal year 2019 (96,000 visas total). The federal agencies announced the availability of these additional visas during different months, based on the date they received statutory authorization, which were all in the second half of the respective fiscal years (July 2017, May 2018, and May 2019). Employer demand for H-2B visas increased from 2010 through 2018 as the U.S. economy strengthened. The number of employer-submitted TLC applications that were certified by DOL increased in each year since 2012, and more than doubled from fiscal year 2010 (about 3,700) to 2018 (about 9,500). Additionally, the number of H-2B workers on DOL- certified applications has increased each year since 2012. In fiscal year 2018, DOL certified applications representing about 147,600 H-2B workers, about a 70 percent increase from fiscal year 2010. As the number of certified TLC applications and workers has generally increased since 2010, national unemployment has declined each year since 2010 (see fig. 2). After DOL certifies the TLC, employers petition DHS to obtain H-2B visas for the workers they plan to employ. Employers that filed petitions for H- 2B workers varied in the number of workers requested and most were concentrated in several industries. According to our analysis of DHS data, in fiscal year 2018, DHS approved petitions from about 3,700 H-2B employers. The number of H-2B visa workers that employers were approved for ranged from one to 1,169, with a median of 12 approved H- 2B workers (see fig. 3 for full distribution). Of the about 3,700 employers, 127 were approved for more than 100 visas. The employers were generally concentrated in administrative and support services (including landscaping); hospitality, amusement and recreation; forestry, fishing, and hunting; construction; and manufacturing industries (see table 1). In our analysis, we found that in 2018, H-2B employers were concentrated in 737 counties in the United States that have, on average, larger labor forces and stronger labor markets than counties without H-2B employers. For each fiscal year from 2015 through 2018, there were about 700 counties with H-2B employers and about 2,400 counties without any H-2B employers, according to our analysis of DHS CLAIMS3 data. Our analysis showed counties with H-2B employers have, on average, larger labor forces than those without H-2B employers and are located mostly along the coasts, but can be found throughout the United States (see fig. 4). Our analysis of DHS and DOL data found that counties with H-2B employers generally had lower unemployment rates and higher average weekly wages than counties that do not have any H-2B employers. Specifically, the approximate 700 counties with H-2B employers had, on average, unemployment rates that were about 0.4 of a percentage point lower than those in counties without H-2B employers. Moreover, lower unemployment was consistent in every month from fiscal years 2015 through 2018, regardless of seasonality (see fig. 5). Further, average weekly wages in counties with H-2B employers were higher by about $113 per week r than in counties without H-2B employers (average weekly wage for counties with H-2B employers is $866 and for counties without H-2B employers is $754). This relationship held for every quarter from fiscal years 2015 through 2018 (see fig. 6). The connection between strong labor markets and employers’ use of H- 2B workers may stem from multiple factors. Counties with strong labor markets may have a smaller pool of unemployed workers to fill seasonal positions leading employers in these counties to use H-2B visas as a way to fill these positions. Alternatively, counties with larger, more urban populations may have stronger labor markets. These larger population counties have more employers than smaller counties; therefore, they are more likely to have at least one employer with H-2B workers. Most selected H-2B employers we interviewed said uncertainty in getting H-2B visas is a challenge to their business planning. We interviewed and gave questionnaires to 35 H-2B employers—19 of which operated small businesses. In our interviews, 21 H-2B employers said the uncertainty of receiving H-2B visas affected their ability to plan for possible business growth and investment. Some employers explained that their operations depended on getting H- 2B workers annually and that any decrease in the number of expected H- 2B workers would substantially impact their business decisions. For example, one Texas-based landscaping employer we interviewed cited uncertainty as a reason to stop accepting new contracts and to reduce investments in new equipment, such as trucks and lawn mowers, and other landscaping supplies. In Maryland, one seafood processing employer said that because of the uncertainty related to receiving H-2B visas they could not implement planned investments, such as expanding their facilities or purchasing trucks for transporting goods, and shut down their business for a time. Similarly, one hospitality employer in Michigan told us that due to the uncertainty of getting visas, they opted not to invest in expanding their hotel amenities or make renovations. In addition, of the 35 H-2B employers we interviewed, seven said the lottery system used by DHS exacerbated the uncertainty of getting H-2B visas. Some of these seven employers described the lottery as seemingly unfair to employers who might have been long-time participants of the program and would not be able to predict if they will be getting visas. Some employers stated that they would prefer that DHS use a more equitable method to award and distribute visas, such as giving every employer a proportion of the visas they petition for. Beyond the uncertainty associated with the H-2B program, employers we spoke with reported varying business experiences during fiscal years 2017 and 2018. Specifically, the 29 H-2B employers who completed our questionnaire—15 of whom did not receive all requested H-2B visas under the standard cap in 2018—reported varied experiences in terms of revenue, purchases of goods and services for their businesses, and the employment of U.S. workers. Revenues. Employers who did not receive all requested H-2B visas under the standard cap more frequently reported revenue declines than employers who received visas, according to our analysis of the questionnaire responses (see fig. 7). Some employers reported that the loss of customers or contracts may have also contributed to these revenue declines. According to the questionnaire responses, 12 of the 14 employers who did not receive all requested H-2B visas under the standard cap reported losing customers and contracts in fiscal year 2018. However, employers’ experiences varied across industries, and other factors besides obtaining H-2B visas may have also affected revenues. For example, seafood processing employers that did not receive all requested H-2B visas under the standard cap more frequently experienced revenue declines than construction employers that did not receive all requested H-2B visas under the standard cap, as the latter may have been better positioned to mitigate the loss of H-2B workers. (Industry and location-specific factors from our case studies are discussed later in this report.) Purchases of goods and services. Based on responses to our questionnaire, employers that did not receive all requested H-2B visas under the standard cap more frequently reported declines in purchases of goods and services than employers who received visas in 2018 (see fig. 8). Employers’ decisions to delay investments on their businesses may have contributed to declines in the purchases of goods and services. Based on questionnaire responses, 11 of the 15 employers who did not receive all requested H-2B visas under the standard cap reported delayed investments in equipment or maintenance repairs. Additionally, some also reported delayed investments in business expansion. Corroborating what H-2B employers reported, nine of the 12 supply companies we interviewed in our case studies said they experienced decreased demand for their services when H-2B employers did not get visas or got them late. Similar to their experiences with revenues, employers’ reported experiences with purchases of goods and services varied across industries as other factors apart from obtaining H-2B visas may have affected employers’ purchases of goods and services. For example, more construction employers who did not receive all requested H-2B visas under the standard cap reported on their questionnaires that they could maintain their levels of purchasing goods and services than hospitality employers who did not receive all requested H-2B visas under the standard cap, possibly due to construction employers’ ability to mitigate the impacts of not receiving H-2B workers. Employment of U.S. workers. Based on our questionnaire responses, no clear pattern emerged among employers with regard to changes in the employment of U.S. workers (see fig. 9). Mainly there is no evidence of a notable number of layoffs of U.S. workers among employers that did not receive all requested H-2B visas under the standard cap. According to our questionnaire responses, three of the 15 employers who did not receive all requested H-2B visas under the standard cap in fiscal year 2018 reported having to lay off or reduce hours of U.S. workers. However, responses regarding increases in U.S. employment are difficult to interpret because our questionnaire did not ask how long newly hired employees actually stayed with employers. Local and industry-specific characteristics affected how selected employers mitigated impacts from the H-2B visa cap and may help explain the varied outcomes reported in revenue, supply purchases, and employment of U.S. workers. For example, 18 of the 35 employers we interviewed said that the characteristics of their own businesses, such as seasonality, affected how they tried to mitigate impacts from the H-2B visa cap. Employers told us that they used several methods to mitigate the effects of not having H-2B workers; however, their success in mitigating impacts varied (see table 2). Seafood processing employers on Maryland’s eastern shore—which includes Dorchester County—hire H-2B workers for picking meat out of crabs, according to a local trade association (see fig. 10). Typically, crabbing season begins on April 1st and ends in late November. These employers are heavily reliant on H-2B workers, and, on average, 54 percent of their workforce is comprised of H-2B workers for fiscal year 2018, according to questionnaire responses. Seafood processing employers we interviewed were also long-time users of the H-2B program. Of the six seafood processing employers we interviewed, five said they had participated in the H-2B visa program for more than 20 years, while the remaining employer had participated for about two years. Seafood processing employers that did not receive all requested H-2B visas under the standard cap in 2018 reported notable impacts to their businesses. Of the five seafood employers that responded to our questionnaire, three did not receive the H-2B visas they requested under the standard cap, and these employers reported that their revenue declined by more than 10 percent. All three employers attributed their revenue declines to not getting the requested H-2B workers in time for the season. Two of the employers who did not receive H-2B workers in time for the season, told us that they shut down their operations for part of the season. Moreover, seafood processing employers told us that not getting H-2B workers, or getting them late in the season, led to a reduction in U.S. employment. For example, one employer we interviewed said the use of truck drivers and administrative staff declined without H-2B workers to perform the crab picking work. In addition, all of the seafood processing employers who did not get their H-2B workers reported declines in supplies purchased (e.g., crabs, boxes, pots, and packaging). Of the five seafood supply companies we interviewed, all of them confirmed that when H-2B employers did not receive all requested H-2B visas under the standard cap, demand for their services and products declined. Employers told us that impacts of the H-2B visa cap were aggravated by several industry-specific factors. For example, one employer said the strict seasonality of crab picking made delays in receiving H-2B workers problematic. In addition, seafood employers said their efforts to recruit U.S. workers faced challenges. Different employers mentioned challenges including this strict seasonality; the nature of the work, which generally does not appeal to U.S. workers including high school and college students; and the employer’s remote location. Finally, some employers emphasized that there was not a good substitute for manual labor when they did not get H-2B workers. One seafood processing employer said the industry had tried to automate crab picking, but was unsuccessful. Selected landscaping employers we interviewed in Dallas-Ft. Worth, Texas said they typically hire H-2B workers to perform residential and commercial landscaping, such as mowing lawns, planting trees, building outdoor living spaces, and performing other lawn care maintenance (see fig. 11). Landscaping employers told us that their season can begin as early as February and can last until mid-December. On average, among the landscaping employers that responded to our questionnaire, 35 percent of their workforce was comprised of H-2B workers. Of the 11 landscaping employers we interviewed, eight said they have participated for about 10 years or more, while three said they have participated in the H-2B visa program for about three years or less. Of the 11 landscaping employers who responded to our questionnaire, three did not get all visas requested under the standard cap. All three employers who did not receive all requested H-2B visas reported revenue declines and said during our interviews that revenue declines were due to not getting H-2B workers or getting them late in the season. Moreover, of the 11 landscaping employers that responded to our questionnaire, six— including employers that did and did not receive all requested visas under the standard cap—reported declines in supply purchases. Landscaping employers told us that low local unemployment and the intensive manual labor in the heat were challenges to recruiting more U.S. workers. Of the 11 landscaping employers we interviewed, three said that when they did not get their H-2B workers, they tried to partially mitigate the situation by having existing staff work additional overtime hours. Other efforts to mitigate the impacts of having fewer H-2B workers included spreading their work across the year and helping returning H-2B workers apply for permanent residency using EB-3 visas—immigrant visas available to certain categories of skilled and unskilled workers. Some landscaping employers said that using EB-3 visas would enable them to have more workers who are permanent residents, which would help promote a more stable workforce, according to our interviews. Selected construction employers we interviewed in Maricopa County, Arizona, said they generally hire H-2B workers to perform manual labor, such as building housing panels or drywalling (see fig. 12). Construction employers said their season generally begins as early as March and lasts until November. On average, among the construction employers that responded to our questionnaire, 8.5 percent of their workforce was comprised of H-2B workers. Of the six construction companies we interviewed, all of them said they have participated in the H-2B visa program for about five years or less. The three construction employers who did not receive all requested H-2B visas under the standard cap in 2018 and responded to our questionnaire reported that they did not experience significant revenue declines. Of these three employers, two reported increased revenues between 2017 and 2018, while one did not report revenue. One employer said during interviews that had they received H-2B workers in 2018 they might have experienced a significant revenue increase compared to 2017 because of the expansion of the construction industry overall in Maricopa County. In addition, among the three construction employers who responded to our questionnaire and did not receive all requested H-2B visas under the standard cap, two reported increased supply purchases during fiscal year 2018. Although construction employers told us that recruiting more U.S. workers was challenging due to low unemployment and the manual nature of the work, several factors may have helped construction employers mitigate the impacts of the visa cap. Of the six construction employers we interviewed, two told us they attempted to mitigate impacts from the visa cap by spreading their work across the year and prebuilding housing frames during the offseason—a practice referred to as even-flowing. Moreover, some construction employers said they either subcontracted work during times they could not hire new U.S. workers, or had their existing U.S. workers work additional overtime hours. Selected hospitality employers in Mackinac Island, Michigan, and Barnstable County, Massachusetts, said they commonly hire H-2B workers to perform work such as housekeeping and working in kitchens (see fig. 13). Generally, some employers said their season begins in April and lasts through the end of October or early November. Of the 12 hospitality employers we interviewed, five said they have participated in the H-2B visa program for between five to 20 years, four said they have participated in the visa program for more than 20 years, and three did not say when they started participating in the visa program. Moreover, H-2B workers comprised an average of 35 percent of the hospitality employers’ workforce, based on questionnaire responses. Of the nine hospitality employers who responded to our questionnaire, six did not receive all requested H-2B visas they petitioned for under the standard cap in 2018. Of those six employers, three reported revenue declines in 2018, while the other three reported increased revenues. However, some hospitality employers said that the lack of H-2B workers did affect the quality of their services or led them to reduce their operations. For example, one resort we interviewed said they had to close down a signature restaurant because they did not receive the H-2B workers necessary for the season. Of the nine hospitality employers that responded to our questionnaire, five reported a decline in supply purchases for 2018. A variety of factors may help explain the outcomes for hospitality employers. On one hand, hospitality employers told us they were challenged to recruit more U.S. workers due to the seasonality of the work and sparse local population, and the fact that students are not available for the whole season. On the other hand, one hospitality employer that did not receive H-2B visas in 2018 said during interviews that they did not experience a revenue decline because guests had booked their reservations in advance. Also, hospitality employers reported using various strategies to mitigate the impact of the cap. For example, of the six hospitality employers who did not receive all requested H-2B visas in 2018, three employers hired more foreign students under the J-1 exchange program for certain students and other visitors. Moreover, four hospitality employers said they applied for H-2B visa extensions, which according to one employer are for H-2B workers already in the United States. In addition, one employer also mentioned that they contracted their housekeeping services to outside cleaning crews, which negatively affected the establishment’s quality of service. In response to the increase in demand for H-2B visas and the uncertainty employers expressed regarding whether they would be approved for workers under the H-2B visa cap, stakeholders and others have suggested changes to the H-2B program. Based on interviews with knowledgeable stakeholders and a review of their publications, we identified six proposals for changing the H-2B visa cap. In our discussion groups and interviews, 12 knowledgeable stakeholders— henceforth referred to as stakeholders—identified potential effects for each of the six proposals. As the stakeholders discussed the various policy proposals, they identified two recurring policy goals: policy proposals should (1) minimize uncertainty and (2) maintain or increase protections for U.S. and H-2B workers. We did not independently assess the individual merits or accuracy of the views expressed by these stakeholders, nor did we assess the feasibility or administrative costs of the proposals discussed. Additionally, we did not assess which options would require Congressional action or which options could be implemented through agency action. Below, we present summaries of the six proposals and some of their potential effects as identified by these stakeholders. The first two proposals listed would eliminate or adjust the cap and the remaining four would keep the current cap in place and address alternative ways to allocate visas. Shortage list. This proposal would eliminate the statutory cap and allow employers to recruit foreign workers for occupations with worker shortages. An expert commission would compile the shortage list annually, based on relevant factors, such as wage growth or job vacancies. Potential effects identified by stakeholders: It would provide more evidence-based and data-driven justifications for the number of visas and the industries/occupations that receive them. It would foster public credibility for the H-2B visa program because it demonstrates a bona fide need for H-2B workers. It would accelerate the H-2B visa approval process for certain industries. Because wage growth would be an indicator of occupational shortages, it may incentivize employers in major H-2B industries to offer higher wages, if economically beneficial. Some employers approved under the current system would not be approved for H-2B visa workers because their occupations are not on the shortage list. It may lack accuracy because national level occupational shortages may not reflect shortages in certain industries and occupations within specific locations or identify local labor market trends. BLS data may not accurately capture such trends. Annual adjustment. This proposal would adjust the cap annually (either up or down) based on economic indicators such as unemployment rate or number of TLC applications approved by DOL. Potential effects identified by stakeholders: It would allow employers to use H-2B workers when U.S. workers are not available due to low unemployment and revert to U.S. workers in times of higher unemployment. Having a flexible cap could be more predictable than the current system. It would be a more accurate reflection of need than using an arbitrary cap. While not discussed in the proposal language, if wage growth is also considered as an economic indicator in the annual adjustment, it might incentivize employers to improve wages, if economically beneficial. Using a national indicator would not fully reflect localized needs for H-2B workers. It would put DOL in a position where it would be determining employers’ needs. Using approved TLC applications is not a good measure of demand because they may not reflect demand for labor. Any delays in processing TLC applications could lead to difficulties in determining the annual adjustment in a timely manner. Returning workers exemption. This proposal would retain the current H-2B visa cap of 66,000 and make the returning worker exemption permanent. Potential effects identified by stakeholders: It could lead to increased predictability. Employers would have more certainty on whether they will be approved for H-2B visas, and H-2B workers would know whether they would have the option to return to their jobs in the United States. There is familiarity—among employers, H-2B workers, and administrators—with returning worker exemption as it has been implemented before. It may be more efficient for employers as returning workers already have training. There could be potential cost savings for program as returning workers have already been vetted. It rewards both workers and employers who are compliant with the H-2B program. A permanent returning worker exemption, like any proposed reform that involves eliminating or increasing the cap, requires better enforcement of worker protections. It could increase the possibility that H-2B workers return to poor working conditions because they have no other economic options. One stakeholder said this could be mitigated by allowing returning workers the flexibility to work for different employers than they worked for in prior years if so desired. Priority list. This proposal would retain the current H-2B visa cap of 66,000 and give priority to applications from employers that offer the highest wages or better working conditions. Potential effects identified by stakeholders: It creates incentives for employers to improve working conditions. It may be easy to implement under current law, and may not require new legislation. It alleviates problems associated with calculating the prevailing wage. It does not account for the wage variation among small and large employers, geographical locations, or industries. Using the highest wages to allocate the visas skews the program to certain occupations and higher-paying geographical locations (even within the same industries and among similarly sized employers). If based solely on wages, a priority list could penalize employers that also have to provide workers with additional benefits such as housing at no cost. It would need to be combined with stronger enforcement, such as employer audits, to ensure that workers are getting paid the promised higher wage or better conditions. Quarterly allocation. This proposal would retain the current H-2B visa cap of 66,000 and allocate visas quarterly rather than twice a year. Potential effects identified by stakeholders: It might improve fairness for employers whose season starts late in the semiannual allocations. It helps ease the burden on DOL’s computer system. It reduces the number of employers applying for visas before their period of need and spreads demand more evenly across the year. It does not seem to mitigate the issue of having demand exceed the cap. In practical terms, quarterly allocation would result in shifting visas away from certain employers and toward others. Demand for H- 2Bs is especially high in April to June, the third quarter of the fiscal year. This option would reduce the number of visas for the third quarter and shift more visas to the fourth quarter. Auction. This proposal would retain the current H-2B visa cap of 66,000 and the visas would be auctioned to the highest employer bidders. Potential effects identified by stakeholders: It uses market forces; employers evaluate how much an H-2B worker is worth. It demonstrates the economic cost of keeping the cap low and determines whether employers are strictly looking for cheap labor. Auction revenues could be used to ensure the H-2B program has less adverse effects on U.S. and H-2B workers, raises wages, or leads to more audits by DOL. Depending on the design of the auction, it may create a system where larger, better funded employers unfairly benefit. It does not address issues of uncertainty faced by employers of H- 2B workers. It increases labor costs which could reduce the profitability using H-2B workers. DHS, in consultation with DOL, has identified some alternatives to the current approach for allocating H-2B visas. In the Joint Explanatory Statement accompanying the fiscal year 2018 DHS Appropriations Act, Congress directed DHS—in consultation with DOL—to review and report on options for addressing the problem of unavailability of H-2B visas for employers that need foreign workers late in each semiannual period of visa availability. In response, DHS issued a report to Congress in June 2019 that laid out six approaches for revising how H-2B visas are allocated among employers—some of which were similar to the proposals identified above. The DHS options include (1) a merit-based system for eligibility that prioritizes employers that have made a significant contribution to the U.S. economy, (2) designation of eligible occupations or industries based on factors such as industry unemployment rates, and (3) distributing visas on a quarterly basis. DHS has not assessed which of the options outlined in the June 2019 report could be implemented by agency action alone and which would require Congressional action, nor has it identified which options have the greatest potential benefit for employers. DHS officials have told us that they currently lack the resources to assess or implement the proposals from their June 2019 report or any other alternatives and, while an assessment may be possible in the future, it would have to be balanced against other administration priorities. Standards for internal control in the federal government call on agencies to identify, analyze, and respond to significant change, including change in the economic environment. Moving forward with assessing available reform options would position DHS and DOL to better inform their own and Congress’s decision- making. In determining the number of additional H-2B visas to make available beyond the standard cap in fiscal years 2017 to 2019, DHS—in consultation with DOL—relied on data from prior years. In each of the three years, federal law authorized DHS after consultation with DOL to provide additional H-2B visas beyond the standard cap if the needs of U.S. businesses could not be met with U.S. workers, up to the maximum number of H-2B returning workers in any prior year when the returning worker exemption was in effect (about 65,000 in 2007, according to the agencies). DHS made up to 15,000 additional visas available in fiscal years 2017 and 2018 and up to 30,000 in 2019. In each year, DHS in consultation with DOL determined the appropriate number of additional visas by looking at demand for visas in prior years. Specifically, in 2017 it determined that 15,000 visas would be sufficient to at least meet the same level of demand as in fiscal year 2016. In 2018, DHS used the same rationale to determine that up to 15,000 additional visas would again be sufficient, based on experience with the additional visas in 2017. Most recently, in 2019, DHS in consultation with DOL raised the number of additional visas to 30,000 in recognition partly of the higher demand in 2018—when employers filed petitions for about 29,000 visas during the first five days of the filing period for additional visas. The demand for returning H-2B workers in prior years and the amount of time remaining in the fiscal year were also factors in the agencies’ decision about how many additional visas to provide. However, using demand in prior years as the primary basis for setting the number of additional visas in the current year is not consistent with standards for internal control in the federal government, which call for agencies to identify, analyze, and respond to significant change, including change in the economic environment. Indeed, the outcome in 2018, when DHS made 15,000 additional visas available but employers applied for almost 30,000 visas, demonstrates the potential limitations of relying solely on past demand as a predictor of future demand. Examples of other types of data that may be relevant to gauging trends in employer demand include unemployment rate, employment, and earnings, which we have previously identified as potential indicators of labor market shortages. Some stakeholders have also suggested that the number of H-2B workers on approved TLC applications is a good measure of visa demand. The agencies said in the 2018 and 2019 temporary rules making additional visas available that they did not have enough time remaining in those fiscal years to conduct a more formal analysis of the adverse effects on U.S. workers that may result from a broader cap increase.Assessing the advantages and disadvantages of considering current economic trends in addition to past demand would help the agencies decide if such an approach would be a better way to estimate employer need in any future years when Congress authorizes visas beyond the H-2B standard cap. According to DHS and DOL, the agencies have also sought to balance employers’ hiring needs and the interests of U.S. workers by setting a higher standard that employers must meet to qualify for additional H-2B visas. To qualify for visas under the standard cap, employers must have an approved TLC, demonstrating, among other things, that they have a temporary need for labor and have taken steps to recruit workers in the United States. From 2017 to 2019, employers applying for the additional visas were also required to attest that without the visas, they were likely to suffer irreparable harm, i.e., suffer a severe and permanent financial loss. According to the 2017 temporary rule announcing the availability of additional H-2B visas above the statutory cap, DHS decided to focus on businesses likely to suffer a severe and permanent financial loss, in part, to be responsive to some stakeholders that U.S. workers could potentially be adversely affected by a general cap increase applicable to all potential employers. To support their attestation of severe and permanent financial loss, employers were required to retain documentation, such as contracts, reservations, or orders that would have to be cancelled absent the requested H-2B workers. DOL officials told us the agency’s Wage and Hour Division evaluates the sufficiency of this documentation in the course of its investigations of H-2B employers, when applicable. Officials said they examine documentation related to loss of contracts and dependence on H-2B workers, among other things, in order to detect significant and voluntary violations of program requirements. DOL has sought to address rising demand for TLCs and H-2B visas through changes to how it assigns TLC applications to analysts for review and processing. Prior to 2018, DOL processed applications sequentially according to the day they were received, and released certifications on a rolling basis as all requirements for certification were met. DOL reported that on January 1, 2018, the first day of the filing period for employers seeking workers to start on April 1, 2018, it received approximately 4,498 applications covering 81,008 worker positions, exceeding the annual visa allotment by nearly 250 percent. According to the agency, this was the first time in recent years that this had happened. On January 17, 208, agency officials announced that beginning February 20, 2018, they would begin to release certified applications sequentially according to the day and time of receipt. This in turn led to a large number of employers with approved TLCs submitting their H-2B visa petitions within a small window. DHS officials explained that receiving a large volume of petitions in a short time frame required USCIS to approve petitions following random selection. In June 2018, anticipating further increases in applications, DOL announced that it would sequentially assign applications to analysts in order of day and—in an adjustment from the earlier procedures—time of receipt to the millisecond. Once applications were assigned, analysts would initiate review of applications in the order of receipt date and time, issue first actions on a rolling basis, and issue certifications as all regulatory requirements were met. DOL reported that in January 2019, it received approximately 5,276 applications covering more than 96,400 worker positions for start dates of work on April 1, exceeding the semiannual visa allocation by nearly 300 percent. Furthermore, DOL reported that on January 1, 2019, within the first five minutes of the filing period for April 1 start dates of employment, the agency’s network infrastructure supporting OFLC’s electronic filing system experienced almost 23,000 log-in attempts, in contrast with 721 attempts in the same time period in 2018. This volume of simultaneous system users caused the electronic filing system to become unresponsive, preventing nearly all employers from submitting applications until the system reopened on January 7, 2019.. DOL’s Office of Foreign Labor Certification conducts recordkeeping audits of adjudicated TLCs to assess employers’ compliance with the terms and conditions attested to in their applications and to fulfill the Secretary’s statutory mandate to certify applications only where unemployed U.S. workers capable of performing the needed work cannot be found. DOL officials told us the agency reviews the original TLC application and requests additional documentation of the employer’s activities when conducting audits to determine whether the employer is in compliance with program requirements. Specifically, employers with minor violations receive a warning; violations described in 20 C.F.R. § 655.71 could lead to increased DOL monitoring and assistance with the employer’s recruitment efforts; and employers with violations described in 20 C.F.R. § 655.73 could be debarred from the H-2B program. DOL is defending a challenge to its implementation of the randomization process for assigning applications filed by employers seeking H-2B visas, in Padilla Construction Co. v. Scalia, No. 2:18-cv-01214-GW-AGR (C.D. Cal.). While DOL has changed its TLC procedures so they call for a randomization process on an on-going basis, DHS generally processes employers’ petitions on a first-come, first- served basis except when a large number of petitions are received in the first five days of the filing period. officials reported that during fiscal year 2018 they initiated 493 audits of H-2B employers, representing seven percent of all employers with approved TLCs issued during the year. They also reported that of the 503 audits completed during fiscal year 2018, which includes audits initiated during 2017, more than half resulted in a warning letter being sent to the employer, with only a small number finding more serious violations (see fig. 14). In our review of a non-generalizable sample of letters sent to H-2B employers with audit results, we found several examples of the types of issues identified by DOL. Several warning letters noted violations related to the period of employment of H-2B workers, such as failing to notify OFLC when H-2B workers left their jobs earlier than planned. In letters of assisted recruitment that we reviewed, employer violations included failure to accurately advertise rates of pay and failure to meet requirements for posting job advertisements in newspapers. Finally, the debarment letters we reviewed cited the employer’s failure to provide the documentation that DOL requested as part of the audit. DOL has not taken a risk-based approach to selecting employers to audit. OFLC’s Certifying Officer has the sole discretion to choose the applications selected for audit, including selecting applications using a random assignment method. DOL officials said the agency has for the most part randomly selected H-2B employers for audits, although they also select some employers because of a prior violation. Officials said that the system currently used to track audits captures data on audit workloads and final audit outcomes, but the agency has a plan to develop a new system that would also track the individual violations found in audits and the industry and job classification associated with the employer. With this capacity, officials said they could take a more risk- based approach to selecting employers for audits, based on trends in violations by industry or job classification. However, officials said that the further development and implementation of this tracking system is currently on hold due to resource constraints with no firm date for moving forward. Standards for internal control in the federal government call on agencies to identify, analyze, and respond to risks to meeting their objectives. Until it implements a risk-based approach to selecting H-2B employers for audits, DOL may miss opportunities to allocate its limited audit resources more efficiently and to detect violations that could adversely affect U.S. and H-2B workers. Taking a more targeted approach is especially important in light of a 2019 Office of Inspector General (OIG) report that stated over the past decade, the OIG and other federal agencies have conducted over 70 criminal investigations in the H- 2B program related to potential fraud involving employers, attorneys, and others. DOL also works to protect U.S. workers through setting the prevailing wage that employers must pay and has taken steps to enhance the accuracy of its prevailing wage determination by limiting the use of employer-provided wage surveys. DOL is responsible for determining the prevailing wage applicable to an H-2B application. An employer must pay a wage at least equal to the prevailing wage obtained from the National Prevailing Wage center within OFLC, or the federal, state, or local minimum wage, whichever is the highest. The prevailing wage that H-2B employers must pay their H-2B and U.S. workers is set by BLS’s Occupational Employment Statistics (OES) survey in all cases except when a wage is set by a valid and controlling collective bargaining agreement or the employer submits an employer-provided survey that meets DOL’s requirements. When they promulgated a final rule in 2015 on the methodology for determining the prevailing wages to be paid H-2B workers, DHS and DOL decided that it would limit the circumstances under which employers may use employer-provided wage surveys to set the prevailing wage. The preamble to the rule described a court decision that found that DOL had arbitrarily allowed wealthy employers to pay for expensive private surveys when other employers in the same occupation who could not afford to conduct such surveys paid the higher OES mean wage. In light of this decision, as well as DOL’s own experience that employer-provided surveys are not any more consistent or reliable, and concerns raised by worker advocates, the agencies determined that the options for accepting employer-provided surveys are more limited. The 2015 regulations require, among other things, that employer-provided surveys be conducted independently by a state agency or university, and meet certain methodological standards. Since 2014, the proportion of H- 2B employers using employer-provided wage surveys to set the prevailing wage has declined from almost 20 percent to less than one percent according to our analysis of DOL data (see fig. 15). DOL officials told us the most significant contributor to the decline in employer-provided wage surveys was the requirement to have a state agency or university independently conduct employer-provided wage surveys—prohibiting employers from directly paying for these surveys. Officials also said that the seafood industry in locations such as Maryland and Louisiana continues to use employer-provided wage surveys, as state agencies have long histories of conducting wage surveys for seafood employers in these areas. Employers we interviewed who depend on temporary foreign labor said the statutory cap on H-2B visas presents challenges for them, and these challenges can be driven at least partly by demand that fluctuates with the economy. Some employers—for example, those with fewer local workers available for hire—may face greater financial risks than others when they are denied H-2B workers due to the cap. More broadly, H-2B employers are challenged by uncertainty regarding whether they will receive H-2B workers in any given year, complicating their efforts to plan future operations, such as expansion or investment. DHS and DOL have taken an important first step towards addressing these challenges by identifying options for allocating visas. However, until the agencies assess such options, they cannot determine which, if any, to implement under their current authority or what legislative changes may be needed to improve the program. In the meantime, as long as DHS and DOL continue to rely primarily on prior year demand to determine the appropriate number of additional visas to make available beyond the standard cap—when granted this authority by Congress—the agencies may miss an opportunity to leverage data on current economic trends and other factors. Assessing the advantages and disadvantages of using current economic data would help the agencies determine the feasibility of more accurate projections, which would help mitigate uncertainty and related challenges for H-2B employers. The steps DOL has taken in recent years to enforce worker protection requirements and promote accurate wage levels so as not to undermine U.S. workers show promise. However, until DOL moves ahead with taking a more targeted approach to selecting employers for audits, it may miss opportunities to efficiently leverage the scarce resources available to identify and prevent worker protection violations. The Director of United States Citizenship and Immigration Services should work with the Assistant Secretary for the Employment and Training Administration to assess options for changing the H-2B visa program and, as warranted, implement changes or submit proposed legislative changes to Congress. DHS and DOL could consider options included in their June 2019 report to Congress and identify those that may be implemented cost effectively and without adversely affecting U.S. workers. (Recommendation 1) The Assistant Secretary for the Employment and Training Administration should work with the Director of United States Citizenship and Immigration Services to assess options for changing the H-2B visa program and, as warranted, implement changes or submit proposed legislative changes to Congress. DOL and DHS could consider options included in their June 2019 report to Congress and identify those that may be implemented cost effectively and without adversely affecting U.S. workers. (Recommendation 2) The Director of United States Citizenship and Immigration Services should work with the Assistant Secretary for the Employment and Training Administration to assess the advantages and disadvantages of considering current economic trends in determining the appropriate number of additional H-2B visas to provide when given this authority by Congress and, as warranted, implement an approach that considers such trends. (Recommendation 3) The Assistant Secretary for the Employment and Training Administration should work with the Director of United States Citizenship and Immigration Services to assess the advantages and disadvantages of considering current economic trends in determining the appropriate number of additional H-2B visas to provide when given this authority by Congress and, as warranted, implement an approach that considers such trends. (Recommendation 4) The Assistant Secretary for the Employment and Training Administration should take steps to target its audits of H-2B employers to employers with the highest likelihood of violating program requirements; such steps could include moving ahead with developing a system for identifying trends in H-2B employer audit outcomes. (Recommendation 5) We provided a draft of this report to DHS and DOL for their review and comment. Both agencies provided written comments, which are reproduced in appendices III and IV, respectively. Both agencies also provided technical comments, which we incorporated as appropriate. In its comments, DHS agreed with our first recommendation to assess options for changing the H-2B visa program, and noted that it plans to work further with DOL to explore options for improving the H-2B visa program and possibly develop proposals for legislative changes. DHS did not agree with our third recommendation to assess the advantages and disadvantages of considering current economic trends—which was the other recommendation we directed to the agency. Specifically, DHS said it would continue to work with DOL—as it has done in prior years--if and when Congress delegates the authority to make additional H-2B visas available beyond the statutory cap to DHS. The agency also expressed its view that Congress is better positioned to determine whether and how many additional visas should be made available to meet the needs of U.S. businesses. In fiscal years 2017 through 2020, DHS was authorized to increase the number of H-2B visas beyond the statutory cap, after consulting with DOL to determine that “the needs of American businesses be satisfied…with United States workers...” In exercising this authority in prior years, DHS stated that “he scope of the assessment called for by the statute is quite broad, and accordingly delegates the Secretary of Homeland Security broad discretion to identify the business needs he finds most relevant.” In light of DHS’s broad view of its authority, we continue to believe that it would be appropriate for DHS, in consultation with DOL, to assess the advantages and disadvantages of considering current economic trends in determining the appropriate number of additional H-2B visas to provide. If they determine that using such data would be warranted, the agencies would then be well positioned to implement such an approach if DHS is granted such authority in the future. Moreover, if—as DHS stated in its response to our recommendation—the agency believes that Congress is best suited to determine what increases in visa numbers may be needed to meet the needs of U.S. businesses, consistent with protecting American workers, it may wish to work with Congress to draft a legislative proposal reflecting this view. DOL agreed with the three recommendations addressed to it. Regarding our second recommendation to work with DHS to assess options for changing the H-2B visa program, DOL said it is prepared to work with DHS to consider options for changing the H-2B program and to provide any technical assistance that Congress may need on this issue. Regarding our fourth recommendation, DOL said it is prepared to draw on its data on labor market and economic trends to provide technical assistance to DHS on the determination of how many additional H-2B visas to make available. Regarding our fifth recommendation, DOL noted that while further development of a system for tracking industry and occupational trends in H-2B employer violations is currently on hold due to budgetary constraints, when this system is available it will provide the capacity to take a risk-based approach to selecting employers for audits. We are sending copies of this report to applicable Congressional committees, the Secretary of Homeland Security, the Secretary of Labor, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or brownbarnesc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made key contributions to this report are listed in appendix V. Our review: (1) describes trends in the demand for H-2B workers, (2) describes selected employers’ reports of how the visa cap has influenced their economic performance and employment of U.S. workers, (3) summarizes proposals for adjusting the H-2B statutory cap or how visas are allocated, and (4) assesses how the federal agencies that administer H-2B visas sought to meet employers’ H-2B hiring needs and protect U.S. workers. To address our first objective, we analyzed administrative data sets from the Department of Homeland Security (DHS), the Department or Labor (DOL) Employment and Training Administration, and the Bureau of Labor Statistics (BLS). To address our second objective, we conducted case studies of four industries in specific locations. To address our third objective, we held discussion groups and conducted interviews with knowledgeable stakeholders regarding proposals to change the H-2B visa cap we had identified through background research. To address our fourth objective, we reviewed relevant federal laws, regulations, and other documents; reviewed agency data; and interviewed federal officials. We used DOL temporary labor certification (TLC) data and national unemployment rate statistics for fiscal years 2010 through 2018 to provide trends in number of applications DOL has received and national unemployment rate. The TLC data are administrative data on applications from employers for H-2B visas, which we found sufficiently reliable for our purposes after reviewing technical documentation and interviewing knowledgeable agency officials. DOL releases public disclosure files that contain administrative data from employers’ H-2B applications for TLC. Our analysis took the public disclosure files and reported the number of certified applications and workers for each fiscal year from 2010 through 2018. In order to report the national unemployment rate for the United States, we used BLS’ report on historical national unemployment rates. To address how counties with H-2B employers compare to counties without H-2B employers, we utilized several administrative data sets. We used DHS Computer Linked Application Information Management System (CLAIMS3) data, which we found sufficiently reliable for our purposes by reviewing technical documentation, interviewing knowledgeable agency officials, and electronic testing of data, to identify the counties with H-2B employers for each fiscal year from 2015 through 2018. The CLAIMS3 data track all petitions for H-2B visas (as well as other visas). These data include employer address and number of H-2B visas approved. Using the employer address information, we identified the county in which H-2B visa employer is located. After the county is identified, we then aggregated all of the approved H-2B visa petitions within each county. After identifying the counties with H-2B employers, we then combined this with BLS data sets—Local Area Unemployment Statistics (LAUS) and Quarterly Census of Employment and Wages (QCEW)—which we found sufficiently reliable after reviewing technical documentation to get county- level data on unemployment rate, labor force, and average weekly wages to make county-level comparisons. The LAUS is a federal-state cooperative effort in which monthly estimates of total employment and unemployment are prepared for counties and county-equivalents. From this data set, we used the unemployment rate and the labor force statistics by county. The QCEW program publishes a quarterly count of employment and wages reported by employers. From this data set, we used the average weekly wages data across counties for fiscal years 2015 through 2018. After we had combined the CLAIMS3 data with the LAUS and QCEW data sets, we compared summary statistics on unemployment rates and average weekly wages for counties with H-2B employers to counties without H-2B employers. The average weekly wages were inflation adjusted at the state level to constant 2018 dollars. To check whether our results of the comparison were being driven by a few outlying counties, we performed several additional analyses. To see if the results were being driven by counties that relied more heavily on H-2B visas, we created quartiles using the number of H-2B petitions approved within a county and also created quartiles using the percentage of H-2B visas as a percent of the total labor force. Next, in order to determine if the results were because of the population sizes of the counties, we spilt the counties in quartiles based on the size of labor force to compare counties with and without H-2B employers by similar sized counties by population. Finally, we incorporated TLC data on industries to provide comparisons between our selected industries noted above (see appendix II). To examine the experiences of H-2B employers and their suppliers with the H-2B program in recent years we conducted case studies of four industries in specific locations: seafood processing in Dorchester County, Maryland; landscaping in Dallas County, Texas; construction in Maricopa County, Arizona; and hospitality in Mackinac County, Michigan (hotels), and Barnstable County, Massachusetts (restaurants). (See fig. 16). We selected these industries because they were among the heaviest users of the H-2B program in fiscal year 2018. Using DOL data on fiscal year 2018 TLCs, we determined the total number of H-2B workers approved across all TLCs associated with each NAICS code, and then identified the NAICS codes with the greatest number of approved workers. The four selected industries were all among the ten leading industries in terms of number of approved workers (see table 3). Amusement, gambling, and recreation industries and support activities for forestry were also among the top ten. However, representatives of these industries told us that employers typically move from location to location during their seasons, making it difficult to conduct a case study of employers in a particular location. For each industry, we selected one or two counties in which to conduct our case study. We selected these counties to achieve diversity in several factors: the total number of H-2B workers approved for employers in the county in fiscal year 2018; the number of H-2B workers approved under TLCs associated with that particular industry in the county in fiscal year 2018 (e.g., the number of H-2B landscaping or hospitality workers); the proportion of all workers in the county who are H-2B workers in 2018; the proportion of workers in that particular industry that are H-2B workers in the county in 2018 (e.g., the proportion of all landscaping workers in the county that are H-2B workers); county unemployment rate in January 2018; and geographic location (see table 4). As part of each case study, we interviewed H-2B employers who received visas during fiscal year 2018, H-2B employers who did not receive visas during fiscal year 2018, and businesses who supply goods or services to H-2B employers. Across the case studies, we interviewed 15 H-2B employers who received visas, 20 H-2B employers who did not receive visas, and 12 supplier businesses. We conducted a mix of individual and group interviews with employers, and generally used the same questions for each category of employers across industries. For all of our case studies, we worked with industry groups to recruit employers to participate in our interviews. These industry groups reached out to local employers to identify H-2B employers and in some cases also supplier businesses who would be willing to speak with us. In a few cases, we also identified supplier businesses for interviews through our case study interviews with employers. In our interviews with employers, we asked about topics including their efforts to recruit U.S. workers, their experiences with the H-2B program in recent years, any impacts on their businesses of being denied H-2B visas, actions taken to adapt to not receiving visas, and any impacts on supplier businesses of being denied H-2B visas. Besides interviewing employers, we also interviewed a state workforce agency as part of each case study, asking questions about topics including the agency’s role in helping H-2B employers recruit U.S. workers, the outcomes of H-2B employers’ recruitment efforts, and any challenges with such recruiting efforts. In addition, as part of our case studies, we asked the H-2B employers we interviewed to complete a questionnaire. This questionnaire covered topics including the employer’s gross sales in fiscal years 2017 and 2018; the employer’s number of employees in fiscal years 2017 and 2018, both U.S. and H-2B employees; the employer’s purchases of goods and services in fiscal years 2017 and 2018; and any challenges created by not receiving H-2B visas in fiscal year 2018. We received responses from 30 employers, including from five seafood processing employers, 11 landscaping employers, four construction employers, and 10 hospitality employers. Some respondents did not answer every question in the questionnaire. We dropped one of the 30 questionnaire responses from our analyses because the employer reported not receiving H-2B visas in 2017 which, if included, could distort our findings. In our analysis of changes to revenues, supply purchases, and employment based on questionnaire responses, we did not control for factors beyond the H-2B visa cap that may have affected the results. So, any results reported from the questionnaire may be due in part to these unobserved factors. Additionally, we did not independently verify the information provided in the questionnaire responses, which could lead to our analysis not completely representing the full effect of the H-2B visa cap. Finally, the questionnaire responses we received are representative of only the firms that responded and may not be more widely generalizable to the industry level or larger geographic regions. As we performed background research on H-2B visas and the cap, we interviewed several knowledgeable stakeholders. We then identified the proposals for changing the H-2B visa cap in the background interviews and publications of these stakeholders (see table 5). To address what options have been proposed for adjusting the H-2B statutory cap or how visas are allocated, we interviewed 12 knowledgeable stakeholders across two discussion groups and two interviews. The discussion groups were held on July 25, 2019 and July 29, 2019, and the interviews were held on August 1, 2019 and August 12, 2019. As part of our discussion with the experts and knowledgeable stakeholders, we asked for additional proposals that were not included in the six identified in the above table. This discussion led to additional proposals. These additional proposals are presented in table 6. We used several approaches to begin identifying potential stakeholders on the H-2B visa program. First, we reviewed our background interviews with stakeholders for this engagement to craft a preliminary list of potential individuals to contact. Then, we identified additional researchers that have published works on the H-2B visa program. Afterward, we conducted several searches on the Congressional Quarterly website to collect a list of witnesses who testified before Congress on H-2B visa issues. Finally, obtained an additional list of authors who published work on the H-2B visa program and names of individuals that have testified before Congress on issues related to the H-2B visa program. Through this process, we identified 22 stakeholders to be included in our discussion groups and interviews. We selected 12 knowledgeable stakeholders based on several criteria: published work on the H-2B visa program and number of times publications have been cited by other scholars, testified before Congress on H-2B visa issues, advocated for relevant stakeholder groups interested in the H-2B visa program, and identified by peers as being a knowledgeable stakeholder on the H-2B visa program. We also sought to achieve a balance of perspectives by the selected knowledgeable stakeholders (see table 7). To assess DHS’s and DOL’s efforts to meet employers’ hiring needs and protect U.S. workers, we reviewed relevant federal laws, regulations, and documents such as agency procedures and visa application forms. We interviewed DHS and DOL officials. We reviewed DOL data on the number and outcomes of audits conducted of H-2B employers during fiscal year 2018. We assessed the reliability of these data by interviewing DOL officials, and found them to be sufficiently reliable for our reporting purpose, which was to present a summary of the agency’s H-2B audit program in fiscal year 2018. We reviewed 25 letters that DOL sent to H- 2B employers as part of audits completed from September 14, 2017, through April 5, 2019, including eight requests for supplemental information, six warning letters, six assisted recruitment letters, and five debarment letters. The samples of requests for supplemental information, warning letters, and assisted recruitment letters were non-generalizable samples of all letters in these categories. They were judgmentally selected from a randomly generated sample of all letters in the universe to achieve diversity in terms of employer industry and location, among other things. The debarment letters we reviewed represented the full universe of such letters. In our review of the letters, one analyst identified issues discussed in each letter and placed them in broader categories, another analyst verified the issues and categories, and any differences in interpretation were resolved. We analyzed DOL data on how prevailing wage levels were determined for H-2B employers for fiscal years 2014 to 2018. We assessed the reliability of these data through review of related documentation and interviews with DOL officials, and found the data to be sufficiently reliable for our reporting purpose, which was to present the trends in how prevailing wage was set among H-2B employers over a 5- year period. After identifying DHS’s and DOL’s actions through methods such as reviewing documents and interviewing agency officials, we assessed them according to standards for internal control in the federal government related to identifying and responding to change and risk. In our analysis of Department of Homeland Security and Department of Labor data, we found that counties with H-2B employers have lower unemployment rates and higher average weekly wages than counties without H-2B employers. We extended this analysis to determine whether the results are robust to changes in labor force, employers’ usage of H-2B workers, and industries. To see if our results were being driven by larger population counties, we separated counties into quartiles by labor force and compared similar- sized counties. Looking at the top quartile, we found that, similar to our main results, counties with H-2B employers had about 0.3 percentage point lower unemployment rate and about $120 higher average weekly wage than counties without H-2B employers. For the bottom quartile, counties with H-2B employers had about a 0.1 percentage point lower unemployment rate than counties without H-2B employers, but about $34 lower average weekly wages, which we discuss further in the following paragraph. We next split the counties with H-2B employers by their usage of H-2B employees to analyze the connection between intensity of employer usage and strong labor markets. The first way we measure usage of H-2B employees is by the number of approved H-2B petitions within the county. When we compare the top quartile of counties by number of approved H- 2B petitions to all counties without H-2B employers, we found that they have about 0.5 percentage point lower unemployment rates and about $187 higher average weekly wages. We also used the ratio of approved H-2B visas to the county’s labor force population to capture the counties’ reliance on H-2B visas. When we compare the top quartile of counties by proportion of approved H-2B visas to labor force, we find that their unemployment rate is about 0.1 percentage point lower and average weekly wages about $4 higher than counties without H-2B employers. The small difference in wages for counties with a high ratio of H-2B workers to labor force, and the previous finding that counties with H-2B employers in the bottom quartile by labor force have lower average weekly wages, suggests that the difference in wages in our main finding may be partially driven by the counties with larger labor forces. In our final extension of our analysis, we isolated four selected industries to compare whether the counties with H-2B employers within the specified industry have higher average weekly wages in that industry than counties without. In this analysis of fiscal year 2018, we found that for each industry (construction, seafood processing, hospitality, and landscaping) the counties with H-2B employers within the industry have higher average weekly wages than counties without H-2B employers in the industry. These higher average weekly wages for counties with H-2B employers in the industry ranged from about $96 higher for seafood processing to about $238 higher for landscaping. Cindy Brown Barnes (202) 512-7215 or brownbarnesc@gao.gov In addition to the individual named above, Nagla’a El-Hodiri, Assistant Director; Lorin Obler, Analyst in Charge; Genesis Galo, Michael Naretta, Alejandro Oliva, and Sonya Zhu made key contributions to this report. Also contributing to this report were Amy Anderson, Susan Aschoff, James Bennett, Kathryn Bernet, Colleen Candrl, Sherwin Chapman, Pin- En Annie Chou, Pamela Davidson, Rebecca Gambler, Joel Green, Kristy Kennedy, Grant Mallie, Sheila R. McCoy, John Mingus, James Rebbe, Oliver Richard, Margie Shields, Ardith Spence, Almeta Spencer, Kathleen van Gelder, and Jessica Yutzy. Nonimmigrant Visas: Outcomes of Applications and Changes in Response to 2017 Executive Actions. GAO-18-608. Washington, D.C.: August 7, 2018. H-2A and H-2B Visa Programs: Increased Protections Needed for Foreign Workers. GAO-15-154. Washington, D.C.: March 6, 2015. H-2A Visa Program: Modernization and Improved Guidance Could Reduce Employer Application Burden. GAO-12-706. Washington, D.C.: September 12, 2012. H-1B Visa Program: Reforms Are Needed to Minimize the Risks and Costs of Current Program. GAO-11-26. Washington, D.C.: January 14, 2011. H-2B Visa Program: Closed Civil and Criminal Cases Illustrate Instances of H-2B Workers Being Targets of Fraud and Abuse. GAO-10-1053. Washington, D.C.: September 30, 2010. H-1B Visa Program: Labor Could Improve Its Oversight and Increase Information Sharing with Homeland Security. GAO-06-720. Washington, D.C.: June 22, 2006.", "summary": "Since 1990, there has been an annual statutory cap of 66,000 on the number of H-2B visa holders who can work for U.S. employers. DHS administers the program with support from other federal agencies including DOL. In recent years, demand for H-2B visas has exceeded the cap. To meet the needs of U.S. businesses, Congress authorized additional visas in fiscal years 2017-2019. GAO was asked to examine the effects of the annual cap on employers and U.S. workers. This report examines, among other objectives: (1) trends in the demand for H-2B visa workers, (2) selected employers' reports of the visa cap's influence on their performance and employment of U.S. workers, and (3) how federal agencies have sought to meet employers' H-2B hiring needs and protect U.S. workers. GAO analyzed nationwide data on H-2B visas and county labor market indicators. GAO interviewed 35 H-2B employers in four industries that are among the largest users of H-2B visas. The employers were in five counties selected for variation in factors including the share of H-2B workers in the workforce and the unemployment rate. GAO also reviewed relevant federal laws, regulations, and documents and interviewed federal officials and stakeholders. Employer demand for H-2B visa workers has increased as the national unemployment rate has declined. H-2B visas are intended to help employers fill temporary, non-agricultural positions when no U.S. workers are available and are subject to an annual statutory cap of 66,000. From 2010 to 2018, the number of H-2B workers requested on employer applications increased from about 86,600 to 147,600. Regarding local economic conditions, GAO found that counties with H-2B employers generally had lower unemployment rates and higher weekly wages than those without H-2B employers. Most of the 35 H-2B employers GAO interviewed said that business planning was affected by uncertainty about whether they would be able to hire the number of H-2B visa workers they requested given the statutory cap. Employers who did not receive all H-2B visas requested under the statutory cap in 2018 were somewhat more likely than those who did to report declines in revenue (see figure) and purchases of goods and services. However, GAO found no clear pattern in changes to the number of U.S. workers hired by these employers. Employers interviewed by GAO varied in how they adjusted to having fewer H-2B workers. For example, two seafood employers reported shutting down operations in the absence of H-2B workers, and employers said that barriers to finding U.S. workers included remote location and seasonality of the work. Federal agencies have identified program changes that consider employers' hiring needs and protect U.S. workers, but gaps remain in implementation. The Department of Homeland Security (DHS), in consultation with the Department of Labor (DOL), has identified options for changing the H-2B visa allocation process to address employers' uncertainty aboutreceiving visas. However, DHS and DOL have not assessed any of these options or determined which would not require Congressional action, and employers continue to struggle with uncertainty. To help ensure H-2B employers comply with U.S. worker recruitment and other requirements, DOL has audited employers' compliance with these requirements. However, in general, DOL randomly selected employers for these audits, rather than taking a risk-based approach using factors such as violation trends by industry. As a result, the agency may not be using its limited audit resources efficiently or effectively. GAO is making five recommendations. These include that DHS and DOL assess options to adjust the H-2B visa program and DOL take a risk-based approach to selecting H-2B employers for audits. The agencies agreed with these recommendations as well as one other. DHS disagreed with one, which GAO continues to believe is warranted.", "document_type": "gao"}
{"report": "NNSA’s nuclear stockpile missions are largely executed at eight sites that are managed by seven M&O contractors and that comprise the nuclear security enterprise. These eight sites include: three national security laboratories—Lawrence Livermore National Laboratory in California, Los Alamos National Laboratory in New Mexico, and Sandia National Laboratories in New Mexico and other locations; four nuclear weapons production plants—the Pantex Plant in Texas, the Y-12 National Security Complex in Tennessee, the Kansas City National Security Campus in Missouri, and tritium operations at DOE’s Savannah River Site in South Carolina; and the Nevada National Security Site, formerly known as the Nevada Test Site. As shown in figure 1, each of NNSA’s eight sites has specific responsibilities within the nuclear security enterprise. NNSA’s sites are owned by the federal government but managed and operated by M&O contractors. According to DOE, the use of M&O contracts is supported by an underlying principle: the federal government employs highly capable companies and educational institutions to manage and operate government-owned or government-controlled scientific, engineering, and production facilities because these companies and educational institutions have greater flexibility in bringing scientific and technical skills to bear than the government. As we previously found, an M&O contract is characterized by, among other things, a close relationship between the government and the contractor for conducting work of a long-term and continuing nature. To support its missions, NNSA is organized into program offices that oversee the agency’s numerous programs, such as the B61-12 Life Extension Program—overseen by the Office of Defense Programs—and the Nuclear Smuggling Detection and Deterrence Program—overseen by the Office of Defense Nuclear Nonproliferation. Mission-related activities are primarily overseen by these program offices, which are responsible for integrating the activities across the multiple sites performing work. NNSA’s program offices are: Counterterrorism and Counterproliferation; Defense Nuclear Nonproliferation; Defense Nuclear Security; Naval Reactors; and Safety, Infrastructure, and Operations. NNSA receives four different appropriations, which it is responsible for allocating to programs that are managed by the program offices. The program offices obligate these funds to the M&O contracts to execute specific program functions. Obligated funds that are not “costed,” or expended, by the contractor at the end of the fiscal year can carry over for expenditure in a subsequent fiscal year, or the program offices can deobligate the funds and obligate them to a different contract for work in that same program area. In order for funds to be reallocated to a different program, NNSA may need to reprogram funds; such reprogramming may be subject to congressional notice and approval requirements. NNSA headquarters offices generally are to provide leadership, develop policy and budgets, or provide other functional support across NNSA. NNSA headquarters offices include the offices of: Acquisition and Project Management, Cost Estimating and Program Evaluation, Information Management and Chief Information Officer, Management and Budget, and Policy. NNSA has seven field offices across the country. Field office managers report directly to the NNSA Administrator. NNSA field offices, such as NPO, are collocated at the laboratory, plant, and testing sites and are responsible for overseeing NNSA’s M&O contractors, including ensuring compliance with federal contracts. To provide oversight of the M&O contractors, each field office employs subject matter experts in areas such as emergency management, physical security, cybersecurity, safety, nuclear facility operations, environmental protection and stewardship, radioactive waste management, quality assurance, business and contract administration, public affairs, and project management. NNSA’s field offices are: Kansas City Field Office in Missouri, Livermore Field Office in California, Los Alamos Field Office in New Mexico, Nevada Field Office, NPO in Tennessee and Texas, Sandia Field Office in New Mexico, and Savannah River Field Office in South Carolina. Before awarding the consolidated contract at Y-12 and Pantex, NNSA took steps to consolidate its field offices that oversee the contractor at these two sites. Specifically, NNSA combined the former Y-12 Site Office and former Pantex Site Office into the NPO Field Office in 2012. One NPO manager oversees both the Y-12 and Pantex sites, and each site has a deputy manager. The deputy managers oversee their respective sites as well as certain programs at both sites. The NPO Cost Savings Program Manager provides overall administration of the Cost Savings Program. As of fiscal year 2018, NPO had about 130 federal full-time equivalent employees at both sites, according to an NPO official. According to CNS officials, the contractor employs over 9,000 employees at Y-12 and Pantex. According to an NPO official, NPO acts as a single office because the two sites are closely integrated. In December 2011, NNSA issued a request for proposals for a consolidated M&O contract for the Y-12 and Pantex sites. NNSA awarded the M&O contract to CNS in January 2013. However, the award was the subject of three protests to GAO under our bid protest authority. NNSA ultimately reaffirmed its award of the contract to CNS, and CNS began contract performance in July 2014. The consolidated contract includes a total of 10 years, including the base period and all option terms. The contract requires CNS to meet certain performance requirements, and NNSA is to evaluate CNS’s accomplishment of these performance requirements before exercising each option term. During the first 2 full fiscal years of the contract, CNS focused on merger and consolidation activities—that is, merging the two sites under one contractor—and on achieving savings from those activities, according to CNS’s Merger Transformation Plan. Merger savings are associated with efficiencies and reductions in the workforce resulting from the consolidation of the contract. During the third and fourth fiscal years of the contract, CNS focused on transformation savings—or savings based on changing underlying processes to increase standardization, and improve quality and efficiency within and across the organization. From the third full fiscal year of the contract onward, CNS focused on continuous improvement, which constitutes incremental efficiency within established processes. The original contract required CNS to achieve at least 80 percent of its proposed savings and score 80 percent or higher on its performance evaluations in order to have additional option terms exercised. In September 2017, however, NNSA and CNS modified the contract so that delivery of cost savings is only taken into consideration in conjunction with CNS’s performance, as documented in NNSA’s annual Performance Evaluation Reports, when deciding whether to extend CNS additional option terms, also known as gateway decision points. NNSA officials told us they made this modification prior to the first gateway decision in September 2017 because CNS was very close to achieving 80 percent of its proposed cost savings, but it was unclear if CNS would achieve 80 percent. In addition, the initial contract requirements placed equal emphasis on cost savings and the contractor’s performance in meeting the mission, but NNSA officials said they do not view those two goals as equal. Cost savings in and of themselves are only helpful—and only creditable under the contract—if they do not negatively affect the mission, and therefore NNSA officials do not view achieving cost savings as equal to the contractor’s performance in meeting the mission. Following the contract modification in September 2017, NNSA exercised the first 2-year option term, ensuring the contractor will manage and operate Y-12 and Pantex through fiscal year 2021. The gateway decision for the second 2- year option term will occur by the end of June 2020, according to NNSA officials (see fig. 2). Implementation and oversight of the Cost Savings Program involves contractor representatives and NNSA officials at several levels. CNS manages the Cost Savings Program using a matrixed organization that includes several executives such as vice presidents of the Business Management and Transformation and Program Integration departments, according to CNS officials. Throughout each fiscal year, these officials lead various efforts associated with developing and implementing cost reduction initiatives as well as other key aspects of the Cost Savings Program. One CNS Cost Savings Director is responsible for overseeing much of the company’s cost savings efforts, including coordinating between different program offices. Within NNSA, NPO conducts much of the oversight of the Cost Savings Program while NNSA’s Offices of Management and Budget, and Acquisition and Project Management also have some oversight functions. Within NPO, the Cost Savings Program Manager coordinates among different NPO program offices that help review and conduct oversight of the cost reduction initiatives throughout the year as well as with NNSA headquarters offices. NNSA’s Office of Management and Budget provides NNSA with administrative, human resources, and financial support. NNSA’s Office of Acquisition and Project Management is responsible for acquisition support and contracting oversight for the agency throughout the acquisition lifecycle. NNSA established an Executive Steering Committee, comprised of high- ranking officials from different NNSA program areas, as well as the NNSA Associate Principal Deputy Administrator, the NPO Manager, and the NPO Cost Savings Program Manager (as a non-voting member), to provide leadership and guidance for the governance of the cost savings element of the CNS contract. The steering committee members are to set cost savings policy; resolve disputes; and recommend and approve the cost savings amounts to be shared between the government, the contractor (through a cost-savings incentive fee), and site reinvestment projects. The Cost Savings Program is divided into six processes or phases that CNS and NNSA implement and oversee (see fig. 3): the Annual Controlled Baseline phase, the Cost Reduction Proposal phase, the Change Control phase, the Verification phase, and the Disposition phase. Annual Controlled Baseline phase. CNS develops and maintains the Annual Controlled Baseline, which is a document that describes the current scope of work and its cost and schedule. Among other things, NNSA uses the Annual Controlled Baseline to evaluate whether CNS achieved savings from implementation of prior years’ cost reduction initiatives. CNS is expected to submit the Annual Controlled Baseline no later than August 15 prior to the upcoming fiscal year, and NNSA reviews and approves the document. Cost Reduction Proposal phase. CNS develops cost reduction initiatives and updates the Cost Reduction Proposal, which describes CNS’s proposed cost reduction initiatives for the upcoming fiscal year and the expected cost savings to be validated from activities within the current fiscal year. The Cost Reduction Proposal is to be updated annually, no later than September 1 prior to the upcoming fiscal year. Each cost reduction initiative has a defined lifecycle, from identification and development to validation and sustainment. NNSA reviews and approves the document; approval authorizes CNS to begin implementing the initiatives. Change control phase. The change control phase is continuous throughout the fiscal year and allows CNS and NNSA to document and trace changes to the scope, schedule, and cost that affect the Annual Controlled Baseline and the Cost Reduction Proposal. Changes made during this phase to the Annual Controlled Baseline and the Cost Reduction Proposal are generally limited to changes outside of the control of the contractor, including congressional direction or reprogramming, changes to the programmatic mission, additional contractual requirements, and any NNSA-directed or approved changes. Performance phase. During the performance phase, which is also continuous throughout the year, the contractor is to report interim performance against the approved cost reduction initiatives for NNSA to evaluate accordingly, according to NNSA Cost Savings Program procedures. This interim reporting allows NNSA to monitor potential effects on the mission and offer feedback and course correction as needed. NNSA and CNS officials responsible for the Cost Savings Program collaborate regularly via biweekly meetings and tri-annual reviews to monitor CNS’s progress on cost reduction initiatives throughout the fiscal year. CNS generates a year-end Validation Report, which is the final of three tri-annual reports provided throughout the fiscal year. These reports detail the performance of the M&O contractor and progress made against proposed cost savings targets, and list the amount of savings CNS is claiming to have achieved in that fiscal year, to include both annual new savings and savings sustained from prior years. CNS is to submit the Validation Report for each previous fiscal year no later than November 15. Verification phase. After the end of the fiscal year, between November and January, NNSA uses verification checklists to review and verify CNS’s claimed savings for each cost reduction initiative. NNSA can use these verification checklists to record, among other evidence, any observations, interviews, document reviews, analyses, and measurements that NNSA has undertaken to confirm the savings claimed by CNS in the Validation Report. For each cost reduction initiative, NNSA is to verify, among other things, that CNS implemented the initiative, that the initiative resulted in efficiencies that produced cost savings, and that the initiative did not negatively affect the mission. NNSA is also to verify that CNS set aside the claimed savings. Additionally, NNSA is to verify that CNS sustained savings claimed in prior years. NNSA documents its determination of verified annual new and sustained savings in a Verification Report. Disposition phase. Upon completion of the verification phase, in January and February, the distribution, or disposition, of net savings occurs in accordance with the contract. Net savings are verified savings after accounting for execution costs. The contract allows those verified net savings to be shared among the government, the contractor, and site reinvestment projects to improve Y-12 and Pantex. Under the contract provisions, NNSA is to verify and distribute only those savings that remain after deducting the execution costs required to administer, develop, or implement the cost reduction initiatives. For example, the cost of purchasing a machine to automate a process that will, in turn, save labor hours from the previous non-automated process would be an execution cost. Therefore, NNSA-verified savings for each cost reduction initiative should reflect net savings from having implemented the initiative—that is, the gross savings minus the execution costs associated with the initiative. Verified net savings are to be distributed to the contractor, the government, and for site reinvestment projects. Contractor. The contractor is generally to receive a cost-savings incentive fee of about 35 percent of the verified net savings. For new savings related to employee benefits, however, the contractor is not to receive a share, and the savings are to be split between the government (50 percent) and site reinvestment projects (50 percent). The contractor’s cost-savings incentive fee is to be paid out of cost savings that NNSA has verified. The contract requires CNS to reimburse the government for the cost-savings incentive fee in the event that CNS does not sustain the savings for the remainder of the contract performance period. According to CNS’s proposed savings estimates, CNS planned to earn approximately $222 million in cost- savings incentive fees over the potential 10-year contract. Per the contract, the contractor may also receive award fees annually based on NNSA’s evaluation of its performance. The available award fee for each potential year of the contract ranges from approximately $20 million to approximately $40 million. Government. The government generally is to receive 35 percent of the verified net savings. For new savings related to employee benefits, however, the government is to receive 50 percent of the verified net savings. The portion of verified savings that is available for the government allows NNSA to return those savings to the programs for which funds were originally obligated, and the funds can be spent within the same program at Y-12, Pantex, or another site within the nuclear security enterprise. Site reinvestment. The remaining approximately 30 percent of the verified net savings is for site reinvestment projects. As noted above, however, the site reinvestment share for savings related to employee benefits is 50 percent. Site reinvestment projects may include: projects (such as a parking structure, an office building or a cafeteria) that serve the M&O site as a whole rather than a discrete program or implementation costs for future cost savings initiatives, among other things. Types of potential savings associated with the Cost Savings Program include, for example: Annual new savings. In each fiscal year, CNS validates and NNSA verifies annual new savings for the cost reduction initiatives implemented in that year. Examples of annual new savings include positions that were reduced in a certain program area, in a given fiscal year. As discussed previously, cost savings are only creditable under the contract if they do not negatively affect the mission. Sustained savings. In each fiscal year, CNS validates and NNSA verifies sustained savings resulting from cost reduction initiatives implemented in prior years. For example, CNS can claim sustained savings for each year it does not hire back employees into positions that were reduced in a prior year and for which CNS claimed savings. Cumulative contract savings. Cumulative contract savings is the sum of all contract savings that have accumulated from annual new savings and the sustainment of savings produced in prior years. For example, annual new savings verified in fiscal year 2015 would be multiplied by 10 if they are sustained through the life of the potential 10-year contract. Likewise, annual new savings verified in fiscal year 2016 would be multiplied by 9 if they are sustained through the life of the potential 10-year contract, and so forth. These cumulative contract savings are also known as “gateway savings” because NNSA considers the verified cumulative contract savings when making gateway decisions on whether or not to extend the contract for possible option terms. Table 1 shows how CNS proposed it could achieve approximately $2.9 billion over the life of the 10-year contract using this method of calculating cumulative contract savings. Hard savings—savings that directly reduce the overall cost of operations—are the only creditable type of savings under the contract. NNSA is only to verify savings if they do not negatively affect the mission. Examples of hard savings include a reduced number of personnel working to conduct the same scope of work or fewer labor hours required to complete a process due to operational efficiencies achieved, as well as savings in benefits packages (e.g., by requiring employees contribute more to their benefits). NNSA and CNS classify hard savings into four categories: (1) labor, (2) benefits, (3) supply chain, and (4) non-labor (see sidebar). generated by leveraging collective buying power agreements, utilizing competitive sourcing tools, and taking other actions to reduce the price of goods purchased. For example, in fiscal year 2016, CNS noted in its Validation Report that it used strategic sourcing to realize procurement savings. known as demand management savings—are savings generated through reductions in purchased materials quantities, subcontract costs, or licenses. For example, in fiscal year 2016, CNS assumed responsibility for some information technology work—including, among others, help desk support and network administration—that had been previously handled by subcontractors. Doing so reduced contract costs because CNS was able to perform the work at a lower cost than the subcontractor. products or services such as, for example, slowing the rate of a cost increase. NNSA officials said another example of a cost avoidance would be if the contractor has the option to buy more expensive airplane tickets for travel between the two sites but chooses to buy less expensive airplane tickets; the difference between the most expensive option and the actual tickets purchased is a cost avoidance and not considered hard savings that would be creditable under the contract. NNSA verified approximately $170 million in annual new savings and approximately $515 million in cumulative contract savings from fiscal year 2014 through fiscal year 2018. The $515 million in cumulative contract savings that NNSA verified from fiscal year 2014 through fiscal year 2018 is about 80 percent of the approximately $640 million CNS proposed it would save through that fiscal year. NNSA’s oversight of the Cost Savings Program has improved and methods for calculating and verifying cost savings have evolved to address some problems encountered in the early years of the contract that may affect actual contract savings. NNSA verified between approximately $8 million and $63 million in annual new savings each year from fiscal year 2014 through fiscal year 2018, totaling approximately $170 million in annual new savings over this period. Of the $170 million in NNSA-verified annual new savings for fiscal years 2014 through 2018, roughly 10 percent (approximately $17 million) is attributed to the merging of the Y-12 and Pantex sites into a consolidated management structure, according to CNS and NNSA documentation. The remaining roughly 90 percent (approximately $153 million) is attributed to transforming site operations to create a more efficient and sustainable enterprise. Under the contract, savings from the previous year that have been sustained, and for which sustainment has been verified by NNSA, are added to the current year’s verified annual new savings amount, resulting in cumulative contract savings. As of the end of fiscal year 2018, NNSA verified approximately $515 million in cumulative contract savings (see table 2). We found that this $515 million in cumulative contract savings represents a reasonable estimate of the cumulative savings achieved. As part of our review, we traced information from 22 of about 90 cost reduction initiatives for which CNS claimed savings to source documents and reconciled discrepancies with NNSA and CNS officials to understand how NNSA verified the cost savings. Further, we reviewed NNSA’s documented procedures for verifying CNS’s reported data and interviewed officials about that process. Additionally, other reviews provide support that NNSA’s reported $515 million in cumulative contract savings is a reasonable estimate of savings achieved. Specifically, as part of the savings verification process, NNSA’s federal cost accountants ensured that CNS had set aside the money associated with the cost savings and confirmed that the funds were available for distribution under the cost-savings sharing arrangement. DCAA also reviewed CNS’s claimed cost savings for fiscal years 2016 through 2018 and NNSA and DCAA officials said the two entities used similar methods and came to similar conclusions. Labor savings, which include reductions in positions, comprised the largest portion of savings, at nearly two-thirds of the cumulative contract savings achieved from fiscal year 2014 through fiscal year 2018. Savings through changes to employee benefits comprised nearly a quarter of total cumulative contract savings over the period (see fig. 4). NNSA documents we examined showed that CNS, the government, and site reinvestment projects received a certain share of the $515 million in cumulative contract savings that NNSA verified from fiscal year 2014 through fiscal year 2018 in accordance with the terms of the contract. According to NNSA, approximately $262 million of the $515 million was available for the three parties to share during this period. The amount available to the three parties is determined by sharing periods of no more than 2 years negotiated for different categories of savings under the contract. According to NNSA documents, CNS earned about $78 million in cost-savings incentive fees, the government received about $97 million in savings, and site reinvestment projects received about $88 million of the available savings from fiscal year 2014 through fiscal year 2018 (see fig. 5). According to NNSA, the remaining approximately $253 million in cumulative savings was not available for sharing between the three parties because it accumulated outside of the savings sharing period. The $515 million in cumulative contract savings that NNSA verified from fiscal year 2014 through fiscal year 2018 is about 80 percent of the approximately $640 million in cumulative contract savings CNS proposed it would save through that fiscal year. CNS achieved more in cumulative contract savings than it proposed through fiscal year 2015. Specifically, CNS proposed approximately $67 million in cumulative contract savings through fiscal year 2015 and NNSA verified approximately $78 million. From fiscal years 2016 through 2018, however, CNS achieved less in cumulative contract savings than it proposed (see fig. 6). As described above, achieving approximately $2.9 billion in savings over the life of the contract assumed meeting all proposed annual new savings targets and fully sustaining those savings in each year of the contract. According to the terms of the contract, NNSA considers achievement of cost savings when evaluating overall contract performance, and therefore, achievement of proposed cost savings may factor into NNSA’s decision of whether to exercise further contract option terms. Two key issues—benefits savings and fiscal year 2016 labor savings— contributed to CNS not meeting its proposed cost savings targets through the end of fiscal year 2018 and may affect CNS’s ability to achieve its proposed cumulative contract savings of approximately $2.9 billion over the life of the contract. Benefits savings. CNS proposed it could save $594 million over the life of the contract through adjustments to employee benefits, but as of March 2020, CNS officials told us that CNS’s projected benefits savings would total $399 million over the entire 10-year contract, a decrease of almost $200 million from its proposal. According to these officials, several factors have contributed to CNS’s decreased benefits savings estimate, including delays in bargaining unit transition to benefit plans and rates and a decrease in employee contributions to pensions, among other reasons. Fiscal year 2016 labor savings. In fiscal year 2016, CNS claimed approximately $30 million in new labor savings based on a claimed reduction of 283 full-time equivalent employees, but NNSA rejected all of those savings. According to the fiscal year 2016 NNSA Verification Report, CNS failed to realize efficiencies that resulted in full-time equivalent growth in other areas, which offset CNS’s claim of new labor savings. Rejection of these fiscal year 2016 labor savings could result in a loss of approximately $270 million in cumulative savings through the end of the potential 10-year contract period when factoring in potential sustained savings. NNSA officials emphasized that any amount of cost savings is beneficial to the government and that NNSA’s priority for CNS is safe and secure performance of its mission. NNSA officials noted that if CNS does not implement any additional cost reduction initiatives and sustains the savings from all previously-implemented cost reduction initiatives, CNS will still save about $1.7 billion through fiscal year 2024. CNS officials told us that CNS will continue to work toward its cumulative proposed savings of approximately $2.9 billion and hopes to meet or exceed that estimate. According to these officials, doing so will allow CNS to realize its proposed savings and provide the maximum benefit to the government and taxpayers. To achieve its proposed savings, CNS would need to sustain all previously implemented savings, achieve verified annual new savings of approximately $57 million per year every year, and sustain those additional savings through 2024. However, CNS’s proposed annual new savings are substantially lower for fiscal year 2019 through the end of the contract (averaging about $30 million per year) than they were from fiscal year 2014 through fiscal year 2018. This decrease is, in part, because many cost reduction initiatives with high savings potential—such as labor streamlining and changes to employee benefits—have been implemented. For example, CNS eliminated 270 positions and provided voluntary separation severance packages to another 182 employees in fiscal year 2014. This accounted for more than 40 percent ($221 million) of the cumulative contract savings because CNS sustained those savings in fiscal years 2015 through 2018. CNS has already implemented many cost reduction initiatives with high savings potential, so it may be difficult for CNS to meet its proposed cumulative contract savings. CNS and NNSA initially encountered problems with calculating and verifying cost savings—problems that may affect actual contract savings—but methods for calculating and verifying savings have evolved, and NNSA’s oversight of the Cost Savings Program has improved. Specifically, CNS and NNSA initially encountered problems—which have largely been addressed—with: (1) calculating and verifying execution costs; (2) calculating and verifying labor savings; and (3) communicating and collaborating about the Cost Savings Program throughout the year. Calculating and verifying execution costs. NNSA encountered early problems with verifying execution costs for CNS’s cost savings initiatives, but CNS changed its methodology for calculating execution costs each year that ultimately addressed those problems. Since the contract’s inception, CNS has relied on a subcontractor to operate much of the Cost Savings Program. In fiscal year 2014, costs for this subcontractor totaled approximately $7 million. CNS believed that approximately $546,000 of the $7 million should be considered execution costs and counted against the cost savings for that year, but NNSA believed the entire $7 million should be considered execution costs. NNSA and CNS reached agreement that a proportional factor—19.3 percent—of the subcontractor’s time was spent on activities that would qualify as execution activities under the contract for fiscal years 2014 and 2015. NNSA instructed CNS to capture and report the subcontractor’s actual execution costs beginning in fiscal year 2016. CNS began using the subcontract’s actual execution costs in fiscal year 2016, according to NNSA officials. However, NNSA officials said CNS used a proportional factor of the subcontract’s execution costs from previous years to estimate the execution costs of CNS employees for fiscal year 2016. NNSA noted in its fiscal year 2016 Verification Report that using the proportional factor approach for estimating execution costs may not reflect the actual execution costs. CNS officials said they believe this estimation was conservative because it resulted in higher CNS administrative and development costs than subsequent years. Additionally, in fiscal years 2015 and 2016, CNS reported estimates for its total execution costs rather than tracking the actual execution costs for each individual cost reduction initiative, which NNSA officials said made it difficult to verify net savings. In fiscal year 2017, CNS developed a methodology for allocating execution costs—administrative costs, implementation costs, and development costs—to individual cost reduction initiatives and began reporting execution costs at this level in the fiscal year 2017 Validation Report. According to NNSA officials, CNS also began reporting execution costs by individual cost reduction initiative for its subcontractor beginning in fiscal year 2017. In fiscal year 2018, CNS developed execution cost charge codes that allowed CNS to report actual hours spent on cost reduction initiative execution activities— including amounts for its subcontractor—for the first time since the contract began. NNSA officials told us that they are generally satisfied with the way CNS is now capturing execution costs and that the use of charge codes has improved their confidence in CNS’s reporting of certain execution costs. However, CNS’s use of the proportional factor of 19.3 percent of the subcontractor’s execution costs, lack of detail on execution costs for individual cost reduction initiatives, and use of estimated—rather than actual—execution costs could mean that the actual execution costs for fiscal years 2014 through 2017 are not fully captured in reported cumulative savings and actual contract savings could be higher or lower than the reported amount. Even if the actual contract savings are higher or lower than the reported amount, we believe $515 million is a reasonable estimate of the savings achieved to date. Calculating and verifying labor savings. In fiscal years 2014 and 2015, CNS used a headcount methodology to calculate labor savings and demonstrate sustainment of those savings. Using a headcount methodology, CNS could claim labor savings if it could demonstrate and maintain a reduced number of employees to conduct the same scope of work. According to NNSA and CNS officials, one potential problem with using a headcount approach is that CNS could maintain a reduced number of staff but have those staff work overtime. If this occurred, it would result in overall increased contract costs, thereby reducing the net savings from the cost reduction initiative. In fiscal year 2016, CNS modified its methodology for calculating labor savings to use labor hours rather than employee headcounts. Under this modified approach, CNS could claim labor savings if it could demonstrate and maintain reduced labor hours regardless of the number of employees, a method that NNSA and CNS officials said is a better measure of labor savings. However, under this methodology, CNS calculated labor savings based on planned, rather than actual, reductions in labor hours. In fiscal year 2017, CNS modified its methodology again to begin using actual reduced labor hours rather than planned reduced labor hours. However, CNS’s use of headcounts and planned, rather than actual, reduction in labor hours could mean that the labor savings for fiscal years 2014 through 2016 are not accurately reflected in the verified cumulative contract savings, and actual contract savings could be higher or lower than the reported amount. As noted above, even if the actual contract savings are higher or lower than the reported amount, we believe $515 million is a reasonable estimate of the savings achieved to date. Communicating and collaborating about the Cost Savings Program. According to NNSA officials, early years of the contract were marked by limited oversight and poor communication between NNSA and CNS. CNS delegated responsibility for the Cost Savings Program to a subcontractor, and according to NNSA and CNS officials, CNS had limited involvement in the Cost Savings Program and did not communicate with NNSA about cost savings matters. Similarly, NNSA officials told us that one or two individuals at NNSA managed the cost savings component of the contract for the federal government and that communication was poor between those individuals and the technical personnel responsible for evaluating the implementation of CNS’s cost reduction initiatives. As a result of this limited oversight and communication, NNSA officials said CNS did not understand NNSA’s expectations for cost savings data and had to submit five iterations of its first Validation Report. In fiscal year 2017, NNSA established a collaborative working team— known as the Integrated Project Team and consisting of personnel from NNSA and CNS—which meets biweekly to discuss issues related to the Cost Savings Program. Also in fiscal year 2017, NNSA began conducting tri-annual reviews of active cost reduction initiatives. For these reviews, CNS submits performance reports and briefs knowledgeable NNSA officials on the status of individual cost reduction initiatives. NNSA uses this information to identify potential gaps in cost-savings reporting data and, among other things, informs CNS of any concerns with its methodology or NNSA’s ability to verify the cost savings. NNSA officials stated that the increased collaboration and more frequent communication has resulted in improved Validation Reports and fewer revisions. For example, NNSA stated in its fiscal year 2017 Verification Report that the quality and completeness of CNS’s fiscal year 2017 Validation Report “demonstrated substantial improvement” over the fiscal year 2016 report. While CNS’s and NNSA’s methods for calculating and verifying savings and conducting oversight evolved in the early years of the contract to improve the accuracy of cost savings calculations, we believe the $515 million in reported cumulative savings represents a reasonable estimate of the contract savings achieved to date for reasons we described earlier. NNSA officials said three key benefits of the Cost Savings Program are (1) achieving savings; (2) increasing financial transparency; and (3) funding site reinvestment projects. Achieving savings. As discussed previously, the Cost Savings Program resulted in total new annual savings of approximately $170 million and $515 million in cumulative contract savings, from fiscal year 2014 through fiscal year 2018. According to NNSA officials, these cost savings would not have materialized without the Cost Savings Program. We have previously found that DOE could better assess M&O contractors’ cost performance—i.e., their performance on spending, budgeting, strategic sourcing, and cost-effectiveness—to help strengthen contractor oversight and better inform acquisitions decisions. Demonstrating contractors’ efforts to achieve cost savings and NNSA’s associated efforts to evaluate contractors’ cost effectiveness provides evidence that for the CNS contract, NNSA is placing importance on cost performance while overall resource needs are increasing. For example, NNSA has identified an increasing weapons program workload and a need to recapitalize or replace aging facilities and equipment to meet nuclear weapons modernization programs over the next decades. To help achieve these goals, NNSA’s fiscal year 2021 budget request included a 25 percent increase for NNSA’s weapons activities appropriation, which funds programs at NNSA sites including Pantex and Y-12. Identifying cost savings could help NNSA minimize budget increases in an era of increasing workload and assure congressional decision-makers that NNSA is working to effectively steward federal resources. Increasing financial transparency. Because of the Cost Savings Program, which required the establishment of the Annual Controlled Baseline in order to measure potential savings, NNSA has better and more thorough information on the costs of running the two sites, NPO officials said. The Annual Controlled Baseline provides more information because in order to demonstrate savings CNS had to first establish a cost baseline, which required complete information on funding streams as well as how certain rate structures are established, according to NPO officials. Officials from NNSA’s Office of Acquisition and Project Management also said this was the first time that NNSA has been able to gain insight into the actual costs of certain activities at Y-12 and Pantex, as a result of the Annual Controlled Baseline being established. None of the other M&O sites have an established site-wide baseline against which to measure costs or cost savings, according to NNSA and M&O officials we interviewed. Officials from the Office of Acquisition and Project Management said having an Annual Controlled Baseline at other sites would give them additional insight into the cost of certain activities, as opposed to the traditional budget-based view they have into M&O activities. At other M&O sites, NNSA uses a budget-based model, which consists of the government obligating a certain amount of money and getting as much product or service for that amount of money as the sites will provide, NNSA officials said. Instead, NNSA is employing a cost- based model at Y-12 and Pantex, which involves determining the cost to produce a certain amount of product, NNSA officials explained. Funding site reinvestment projects. As part of the Cost Savings Program, a certain percentage of the achieved savings is reinvested back into the sites. According to NNSA officials, this process has allowed NNSA to allocate funds to site reinvestment projects to improve the Y-12 and Pantex sites’ aging infrastructure. As of fiscal year 2019, NNSA reported about a $4.8 billion deferred maintenance backlog throughout the nuclear security enterprise. We previously found that facilities considered not mission dependent—such as cafeterias, parking structures and excess facilities—comprised about 40 percent of the deferred maintenance backlog. NNSA officials said addressing deferred maintenance at these types of facilities is low priority, beyond keeping facilities in a safe condition, because the agency targets scarce budgetary resources to mission critical facilities. According to NNSA officials, NNSA would not likely have allocated funds for these site reinvestment projects at Y-12 and Pantex without the Cost Savings Program because they are often considered lower priority projects. As a result, the nuclear security enterprise as a whole potentially benefits from these site reinvestment projects at Y-12 and Pantex since those reinvestment projects serve to reduce overall deferred maintenance and potentially make funds available for projects to address aging infrastructure at other sites. Site reinvestment projects may lead to additional cost savings as well, NNSA officials said, if, for example, NNSA uses site reinvestment funds to purchase a machine that automates a process and saves labor hours as a result. For example, NNSA invested in a machine to replace three different machines that were previously required to produce a screw. This improved throughput and turnaround time and saved labor hours, according to NNSA documentation. NNSA approved a total of 80 site reinvestment projects at Y-12 and Pantex as of April 2020, for a total of approximately $75 million that was available for reinvestment into the sites. For example, CNS used about $1.2 million in site reinvestment funds to replace analog cameras along Y-12’s perimeter fencing with digital cameras (see fig. 7). This site reinvestment project improved physical security and reduced camera maintenance costs, as well as the security team’s ability to assess alarms and manage alarm response, according to NPO documentation. Because the analog cameras were still functioning, they may have otherwise been a lower priority to replace without the site reinvestment funding, NPO officials said. In addition, the John C. Drummond Center, a new administrative support complex at Pantex, was partially built with savings from the Cost Savings Program (see fig. 8). According to NNSA documentation, the new facility helps eliminate approximately $20 million in deferred maintenance costs of the older administrative buildings it replaced. Although NNSA identified site reinvestment projects as one of the key benefits of the Cost Savings Program, NNSA and CNS had not committed approximately $13 million of site reinvestment funds available at Y-12 and Pantex as of April 2020. NNSA and CNS had not yet committed the site reinvestment funds to specific project efforts, in part because they have not evaluated how best to use the remaining available site reinvestment funds or developed a plan for doing so. The $13 million is currently distributed across several different layers of accounts, in some cases in amounts too small to execute a site reinvestment project. To aggregate the funds in amounts large enough for certain projects, NNSA may need to move funding from one account to another. The funds for site reinvestment projects are distributed in accordance with the terms of the contract and are spread across different programs, projects, or activities (PPA). Beneath the PPA is the DOE budget and reporting code level, which DOE also tracks in its official accounting system (see fig. 9). According to NNSA officials, there were 68 PPAs with 97 budget and reporting codes underneath them that, as of April 2020, had funds available for site reinvestment. According to NNSA officials and CNS representatives, this distribution makes it difficult to use all of the site reinvestment funds. This difficulty is because a given site reinvestment project may require funds to be aggregated across budget and reporting codes in order to have enough funds for executing the project, and while NNSA can move funds between budget and reporting codes that are within the same PPA, movement of funds among PPAs (reprogramming) could require congressional approval. As of April 2020, of the 68 PPAs with available funds for site reinvestment, 17 (or about 25 percent) had multiple budget and reporting codes underneath them, according to NNSA officials. Those 17 PPAs had between 2 to 6 budget and reporting codes underneath them, according to those officials (see fig. 10). We have previously found that comprehensive plans can help organizations identify potential problems before they occur and target limited resources. A comprehensive plan can also detail milestones and key goals, which provide meaningful guidance for planning and measuring progress. Such plans can establish deadlines for achieving objectives and assign responsibility for any implementation. Most of NNSA’s appropriations are “no-year funds” and are, therefore, available for obligation until expended. Without evaluating and developing a plan for how best to use funds for site reinvestment projects—to include determining whether to reprogram funds—NNSA and CNS are not fully utilizing available site reinvestment funds, and the funds could be rescinded from NNSA’s appropriations in later years if the unspent balances persist. NNSA has not sought congressional approval to combine site reinvestment money across different PPAs in order to aggregate these funds to execute larger site reinvestment projects, officials said. Also, while NNSA moves funds weekly between budget and reporting codes that are within the same PPA to execute its work, officials said NNSA has not moved any site reinvestment funds from different budget and reporting codes within the same PPA to fund site reinvestment projects. Once NNSA develops a plan on how best to aggregate or use the remaining and potential future site reinvestment funds, it would be better positioned to: move some funds between budget and reporting codes within the reprogram funds between PPAs, including seeking congressional approval where it may be required. NNSA officials identified the achievement of cost savings as a benefit of the Cost Savings Program that could be useful at other sites and to the nuclear security enterprise generally; however, the officials said they are not planning to implement the Cost Savings Program as part of other future or existing M&O contracts. Most existing NNSA M&O contracts include a “Cost Reduction” clause, under which sites could implement a Cost Savings Program with some attributes of the program at Y-12 and Pantex. According to GAO’s Framework for Assessing the Acquisition Function at Federal Agencies, leading organizations gather and analyze data to identify opportunities to reduce costs, among other reasons. Further, the framework states that incomplete data can prevent an agency from maximizing information tools for strategic acquisition planning and analysis. According to officials from the Office of Acquisition and Project Management, they do not plan to implement the Cost Savings Program or anything similar to it as part of future M&O contracts because of uncertainties regarding (1) the opportunities for similar savings at other sites and (2) the federal costs involved in implementing and overseeing the Cost Savings Program—including the time and effort needed to verify cost savings—and how these costs affect the overall net savings. NNSA site officials and contractor representatives we interviewed also raised questions about these issues. For example, according to NNSA officials and representatives at two sites, the Cost Savings Program may not be exportable to other sites, in part because other sites may not be able to identify cost savings initiatives that would yield the same level of savings as at Y-12 and Pantex. The officials believed that much of the savings identified at those sites resulted from merger savings—savings stemming from consolidating the two sites—that would not be possible without combining two sites under one contract. However, as mentioned previously, our analysis found that the majority—about 90 percent—of annual savings at Y-12 and Pantex resulted from transformation initiatives, or savings based on improving standardization, quality, and efficiency. Merger savings contributed only about 10 percent of the total new annual savings identified from fiscal year 2014 through fiscal year 2018. NNSA officials and contractor representatives at other NNSA sites also raised questions about whether the cost of implementing and maintaining a formal cost savings program might outweigh the benefits at a site. According to NNSA officials, a large number of government employees are involved in implementing and overseeing the Cost Savings Program. According to an official from the Office of Acquisition and Project Management, NNSA has not analyzed the total costs of implementing the Cost Savings Program, including the costs associated with the government effort to oversee the program. For the Cost Savings Program, NNSA verifies net savings after accounting for CNS’s execution costs. However, the verified savings do not take into consideration federal costs for implementing, maintaining, and overseeing the Cost Savings Program. To provide a sense of the scope of the oversight effort, NPO officials said about 100 of the approximately 130 employees at NPO at the end of fiscal year 2018 had some role in the Cost Savings Program, although only one full-time position is dedicated to the Cost Savings Program. Further, NNSA is likely to start its acquisition planning for some M&O contracts in 2022 and 2023. However, NNSA officials, as well as site officials, were uncertain about whether the Cost Savings Program could be exported to other existing or future contracts, including the cost effectiveness of the program, because NNSA has not gathered information on and documented analysis of the costs and potential benefits of the Cost Savings Program. By gathering information on and documenting the analysis of data on the costs and benefits of the Cost Savings Program, NNSA officials and contractor representatives could make better-informed decisions about whether to implement aspects of the Cost Savings Program at other sites. CNS achieved cost savings at Y-12 and Pantex by implementing a variety of cost savings initiatives. Even without a formal Cost Savings Program in place, some efficiencies may be applicable at other sites as a way to save money across the enterprise, according to officials we interviewed from NPO. For example, at Pantex, the contractor discovered it could conduct fewer recurring injections of treatment wells but still achieve the same technical results and comply with standards, according to NNSA officials. This initiative saved over $500,000, according to NNSA’s Verification Report. If other sites experience similar recurring costs, then sharing this initiative might lead to cost savings at those sites. According to DOE’s Order 210.2A on the DOE Corporate Operating Experience Program, each DOE organization is required to submit lessons learned to the DOE Corporate Lessons Learned Database when the operating experience has relevance to other DOE sites and the information has the potential for cost savings. Although NPO did not enter information about lessons learned from the Cost Savings Program into the database, NPO officials said they shared lessons learned with the Executive Steering Committee and that they presumed the Committee had passed information along to other sites. Contractor representatives and NNSA officials from all five of the other NNSA sites we interviewed noted that NNSA has not shared any information about specific successful cost savings initiatives from Y-12 and Pantex that could be applicable to them. Almost half of the NNSA officials and contractor representatives from other sites we interviewed said they were not very familiar with the Cost Savings Program. However, officials at Y-12 and Pantex told us they believe there are certain initiatives that could be useful at other sites and that other sites have asked for information about certain initiatives. Officials from the Office of Acquisition and Project Management said they believe there will be a request for a lessons learned evaluation from NNSA headquarters once the current Y-12 and Pantex contract expires; however, such an effort would begin in several years—as late as 2024 if all option terms are exercised and NNSA began this evaluation immediately. According to NNSA officials, the Cost Savings Program was a new concept and required maturity and proven concepts before sharing any lessons learned. However, by sharing information on potentially beneficial efficiencies and lessons learned from the Cost Savings Program at Y-12 and Pantex throughout the enterprise, NNSA could help achieve cost savings enterprise-wide even without implementing formal cost savings programs at other sites. The Annual Controlled Baseline is another specific aspect of the Cost Savings Program that could be beneficial to implement at other sites, or programs at a site, NNSA officials said. Currently, none of the other NNSA sites have an established site-wide baseline that would allow NNSA to understand the costs involved in running those sites or implementing their programs, according to officials from NNSA’s Office of Acquisition and Project Management. According to NPO officials, the Annual Controlled Baseline provides NNSA with better and more thorough information on the costs of running the two sites. As discussed previously, employing a cost-based model at Y-12 and Pantex—as opposed to the budget-based model at other sites—allows NNSA to understand the contractor’s cost to produce a certain amount of product. Although officials from NNSA’s Office of Acquisition and Project Management said it would be beneficial to have the Annual Controlled Baseline at other sites in order to gain additional insight into the cost of certain activities, they believed a drawback to requiring other sites to institute such a baseline would be deploying the considerable effort and resources to establish the baseline similar to those that were required at Y-12 and Pantex. NNSA has not evaluated whether to require the other sites to have an Annual Controlled Baseline, either for the entire site or for certain programs at different sites. The 2019 DOE Acquisition Guide states that in the context of acquisition planning, good technical, schedule, and cost baselines are essential for developing realistic and measureable targets. By evaluating whether to require all sites to implement an Annual Controlled Baseline, either for the entire site or for certain programs at the different sites, NNSA may be in a better position to achieve greater financial transparency at sites across the nuclear security enterprise. This action, in turn, could potentially identify opportunities for cost savings, help NNSA better understand their contractors’ cost performance, and help the agency administer its sites more efficiently. In recent years, the Cost Savings Program at Y-12 and Pantex has realized hundreds of millions in savings to the nuclear security enterprise, dozens of site reinvestment projects, and increased financial transparency. Although NNSA has identified site reinvestment projects as one of the key benefits of the Cost Savings Program, NNSA and CNS have not committed approximately $13 million of site reinvestment funds available at Y-12 and Pantex, in part because they have not evaluated and developed a plan on how best to aggregate and use the funds. If NNSA develops a plan on how best to use the remaining and potential future available site reinvestment funds, it would be better positioned to aggregate funds for site reinvestment projects. Further, if funds for site reinvestment projects persist in PPAs for too long, NNSA risks their rescission in future years’ appropriations. NNSA officials were uncertain about whether the Cost Savings Program could be exported to other existing or future contracts, including the cost effectiveness of the program, because NNSA has not gathered information on and documented its analysis of the costs and potential benefits of the Cost Savings Program. By gathering information on and documenting its analysis of the results of the Cost Savings Program, NNSA officials and contractor representatives could make a better- informed decision about whether to implement aspects of the Cost Savings Program under existing contracts or as part of future M&O contracts. NNSA has not shared information on specific efficiencies that could be applicable to other sites because NNSA officials have not submitted such lessons learned to DOE’s Corporate Lessons Learned Database. By sharing information on potentially beneficial efficiencies and lessons learned from the Cost Savings Program at Y-12 and Pantex throughout the enterprise, NNSA could help achieve cost savings enterprise-wide even without implementing formal cost savings programs at other sites. Additionally, none of the other NNSA sites have an established site-wide baseline. NNSA has not evaluated whether it should require the other sites to have such a baseline. By evaluating whether to require other sites to institute a baseline—either in whole or in part for certain programs at the different sites—NNSA could increase financial transparency agency- wide. We are making the following four recommendations to NNSA: The NPO Cost Savings Program Manager should work with CNS to evaluate the remaining site reinvestment funds and develop and implement a plan for how best to aggregate and use them. (Recommendation 1) The Associate Administrator for Acquisition and Project Management should gather data on and document an analysis of the Cost Savings Program, including its cost effectiveness, to determine whether it is exportable to existing or future contracts. (Recommendation 2) The NPO Cost Savings Program Manager should share relevant lessons learned with other NNSA sites so that those sites can determine if efficiencies CNS has achieved can be implemented at other sites. (Recommendation 3) The Associate Administrator for Acquisition and Project Management should evaluate whether to require all other sites to institute an Annual Controlled Baseline. (Recommendation 4) We provided a draft of this report to NNSA for review and comment. The agency provided written comments, which are reproduced in appendix I; the agency also provided technical comments that we incorporated in the report as appropriate. NNSA agreed with three of the recommendations and agreed in principle with the fourth. Regarding our second recommendation that NNSA gather data on and document an analysis of the Cost Savings Program, including its cost effectiveness, to determine its exportability to existing or future contracts, NNSA agreed that the potential benefits of a Cost Savings Program should be considered for future contracts, as applicable. However, in its written comments, NNSA stated that the Cost Savings Program was uniquely intertwined with the consolidation of the two sites, Y-12 and Pantex, under one contract. As we discussed in the report, roughly 90 percent of the savings from the Cost Savings Program were attributed to transforming site operations to create a more efficient and sustainable enterprise, and not associated with merging the two sites. We continue to believe that by gathering data and documenting an analysis of the Cost Savings Program for its exportability, NNSA will be able to make better- informed decisions about whether to implement the program at other existing or future contracts. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of NNSA, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix II. Allison B. Bawden, (202) 512-3841, or bawdena@gao.gov. In addition to the individual named above, key contributors to this report included Hilary Benedict (Assistant Director), Jessica Lewis (Analyst in Charge), Antoinette Capaccio, Cindy Gilbert, Dan Royer, Holly Sasso, Sheryl Stein, Breanna Trexler, and Monique Williams.", "summary": "NNSA relies on M&O contracts to manage and operate its eight laboratory and production sites. In 2013, NNSA awarded a consolidated M&O contract to CNS for the Y-12 and Pantex sites to reduce costs. In the contract, NNSA required that CNS create a Cost Savings Program. CNS proposed it would save about $2.9 billion over the contract's potential 10-year term. The Senate committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019 includes a provision for GAO to review the cost savings achieved from the competition and award of the CNS contract. GAO's report examines the extent to which (1) CNS achieved proposed cost savings from fiscal year 2014 through fiscal year 2018 and (2) NNSA identified benefits associated with the Cost Savings Program and used that information to improve its M&O contracts. GAO reviewed documentation and data on the Cost Savings Program from NNSA and CNS, interviewed NNSA headquarters and field office officials as well as representatives from M&O contractors, and toured the Y-12 site to understand examples of cost savings initiatives. The National Nuclear Security Administration (NNSA) verified about $515 million in cumulative cost savings claimed by Consolidated Nuclear Security, LLC, (CNS) from fiscal year 2014 through fiscal year 2018 (see figure). CNS was awarded the management and operating (M&O) contract for both the Y-12 National Security Complex (Y-12) in Tennessee and the Pantex Plant (Pantex) in Texas. Those savings represented about 80 percent of the approximately $640 million CNS proposed it would save through the end of fiscal year 2018. CNS achieved most of the savings through labor savings—for example, by reducing positions. While CNS's and NNSA's methods for calculating and verifying savings evolved in the early years of the contract, GAO concluded the $515 million in reported cumulative savings represents a reasonable estimate. However, due to differences between proposed and achieved savings through fiscal year 2018, and annual savings projections that are lower for the remaining years of the contract, it may be difficult for the contractor to achieve its total proposed $2.9 billion in savings over the potential 10-year contract that would end in 2024. NNSA officials identified three key benefits of the Cost Savings Program—achieving savings, reinvesting in site infrastructure, and increasing financial transparency—but has not determined whether the program could be implemented at other sites to improve its M&O contracts. For example, NNSA officials said achieving cost savings at other sites could be useful, and most M&O contracts include a clause under which sites could implement a Cost Savings Program with some attributes of the program at Y-12 and Pantex. However, NNSA is not planning to implement the Cost Savings Program—or a variation of it—at other sites. NNSA officials and contractor representatives were uncertain about whether the Cost Savings Program could be exported to other existing or future contracts because NNSA has not gathered information on nor documented its analysis of the Cost Savings Program. GAO has previously found that leading organizations gather and analyze data to identify opportunities to reduce costs, among other reasons. By performing such an analysis, NNSA officials and contractors' representatives could make better-informed decisions about whether to implement aspects of the Cost Savings Program under existing contracts or as part of future M&O contracts to achieve additional savings in the future. GAO is making four recommendations, including that NNSA document its analysis of the Cost Savings Program to determine whether it is exportable to other contracts. NNSA generally agreed with the four recommendations.", "document_type": "gao"}
{"report": "DOD’s guidance states that its FFRDCs are created to (1) provide strategic value through independent, intellectually rigorous, relevant, and timely products and services; and (2) support the department’s goals of long-term improvement in operations and enhanced national security. They are managed by various military departments or divisions within the department, called primary sponsors. FFRDCs are operated by universities, other not-for-profit or nonprofit organizations, or private firms—called parent organizations—under long-term contracts. They provide special research and development services that generally cannot be readily satisfied by government personnel or private contractors. For example, the Lincoln Laboratory develops key radar and electronic warfare technologies for integrated air and missile defense systems. The Software Engineering Institute provides cybersecurity solutions for defense entities. DOD’s FFRDCs are grouped into three categories: research and development laboratories, study and analysis centers, and systems engineering and integration centers. DOD oversees 10 FFRDCs (see table 1). According to the Director of Laboratories and Personnel within the OUSD for Research and Engineering, he took over responsibility for managing FFRDCs in July 2018, following a reorganization of OUSD for Acquisition, Technology and Logistics. DOD and each FFRDC have a sponsoring agreement, which is a stand- alone, bilateral, written agreement between the primary sponsor and the parent organization. It must be approved by the Under Secretary of Defense for Research and Engineering prior to award of an FFRDC contract and is incorporated into the contract. According to DOD’s guidance, the sponsoring agreement defines the FFRDC’s purpose and mission, establishes the conditions under which DOD may award an FFRDC contract, and describes the overarching requirements for operation of the FFRDC. For example, the primary sponsor must include provisions in the sponsoring agreement to prevent real or perceived organizational and personal conflicts of interest. As part of that, sponsors are to require FFRDC parent organizations to establish and maintain policies and procedures to protect information, such as sensitive data, from disclosure and provide training that covers ethics and conflicts of interest. We reported in December 2019 that representatives from the five study and analysis center FFRDCs said they provide annual training covering ethics and conflicts of interest for all personnel. DOD may use FFRDCs to perform work that is closely associated with the performance of inherently governmental functions or that is critical to maintaining control of the department’s missions and operations. Work could include activities such as support for financial analyses, policy development, acquisition planning, source selection, and contract management. In the course of performing work, FFRDCs may need access to acquisition data collected from DOD’s prime contractors and program offices. FFRDCs may obtain these data through DOD personnel, government databases, or directly from prime contractors. Government- held data may be stored and managed in department-wide databases or by individual program offices. For example, the Cost Assessment Data Enterprise is a web application that allows users access to various reports that include information such as major defense acquisition programs’ cost, software, and technical data. On December 21, 2017, DOD issued implementing guidance that marked the launch of its 3-year pilot program. According to DOD officials, prior to the start of the pilot program, FFRDC researchers needed to obtain permission from each data owner (e.g., DOD prime contractor or supplier), typically by signing a nondisclosure agreement. According to DOD officials that requested the authority to allow FFRDCs to have increased access, one of the purposes of the pilot was to allow for a streamlined nondisclosure agreement process. Under the pilot program, FFRDC researchers no longer have to obtain nondisclosure agreements with each data owner. To participate in the pilot, the FFRDC and DOD sponsor must first take steps to ensure certain protections are in place to protect against unauthorized disclosure or use of the data being accessed. For example, according to the statute, in order to be eligible, participating FFRDCs and its personnel (FFRDC researchers) had to agree to be subject to and comply with appropriate ethics standards and requirements applicable to government personnel, including the Ethics in Government Act of 1978, the Trade Secrets Act, and the Procurement Integrity Act. After the protections are in place, the FFRDC and DOD sponsor can enroll individual projects in the pilot program. Per the implementing guidance, the FFRDCs and DOD sponsors agree to collect and provide information about the enrolled projects. For example, DOD sponsors must provide the Laboratories and Personnel Office quarterly updates on a project’s progress obtaining data and, once the project is complete, information on the results of its access to sensitive data under the pilot program. Six of 10 DOD FFRDCs elected to participate in the pilot program during its first 21 months (figure 1). According to FFRDC representatives, the decision regarding whether an FFRDC would participate in the pilot program primarily depended on two factors: (1) the data needs of the FFRDC’s projects and (2) the ability of FFRDCs to access necessary data without the pilot program. Representatives from the six participating FFRDCs told us they elected to participate because they required access to sensitive data and, in some cases, lacked viable options for obtaining that data. For five of these FFRDCs, representatives said their researchers had identified specific projects for which they were interested in using the pilot to gain access to data sources with sensitive data from numerous contractors. Representatives from the four nonparticipating FFRDCs said that the existing processes the FFRDCs have in place provide the access they need for their projects. For example, Lincoln Laboratory representatives said their researchers are often working with an individual program or working to advance a specific technology; therefore, their work is generally with a limited number of contractors. In cases where they have needed access to sensitive data to do this work, they have executed a blanket nondisclosure agreement with their primary sponsor and, in some cases, have executed more tailored nondisclosure agreements with companies when obtaining information directly from a defense contractor. Aerospace has a blanket nondisclosure agreement with the Air Force Space and Missile Systems Center and the center included a provision in its contracts that requires its prime contractors to directly share information with the FFRDC. A Center for Communications and Computing representative said existing processes already provide the access they need for their projects. According to the FFRDC’s sponsor, its work focuses more on technological development rather than acquisitions analysis. Participating FFRDCs reported 33 projects enrolled in the pilot program from January 2018 through September 2019. Pilot projects represented about 1.5 percent of these FFRDCs’ total number of projects as of June 2019. Of the projects enrolled in the pilot program, 11 were complete and 10 were ongoing as of the end of September 2019. In addition, 11 projects enrolled in the pilot initially, only to realize they did not require access to the requested data and thus were removed. One project was put on hiatus pending a decision about whether it will continue. Table 2 summarizes the status of the projects in the pilot program as of September 2019. According to DOD officials, the fiscal year 2018 reorganization of OUSD for Acquisitions, Technology and Logistics into two offices, coupled with changes in leadership, shifted attention away from the pilot program design and implementation. For example, an official from the Acquisition and Sustainment office also told us it missed an opportunity to conduct outreach with its FFRDC because the office did not hold its biannual meetings in 2017 or 2018 due to the reorganization. In these biannual meetings, he explained, they would have discussed the department’s future research priorities and how the pilot program may have helped. This official—who was involved in the pilot’s implementation—also noted that the shift in attention meant they did not engage with the offices that maintain the data repositories as fully as they would have liked. We found it took sponsors and FFRDCs from a few weeks to 7 months to resolve questions about pilot program requirements and update the FFRDCs’ sponsoring agreements to incorporate the pilot protections. During that time, FFRDCs were unable to move forward with certain analyses for their proposed projects. Of the six projects we selected for further review (shown in table 3), four have been completed and FFRDCs reported benefits from their pilot program participation. The two remaining projects are on hiatus or removed. DOD officials and representatives from the four completed projects shared with us the following benefits: Systems and Analyses Center assessment of the U.S. munitions defense industrial base capacity. Portions of the research required access to sensitive data about the availability and production levels of manufacturing parts for a large number of contractors and suppliers. The FFRDC researchers used these data in their microlevel assessments of the manufacturing capacity and supply chain resiliency of the U.S. defense munitions industrial base. They said they were able to provide DOD’s Industrial Policy office with a more complete picture by combining these microlevel analyses with broader analyses of employment trends and economic outputs. A DOD industrial policy official who requested the work also said that the analysis enabled her office to meet an executive branch reporting requirement, which DOD did not have the manpower to conduct. National Defense Research Institute support for analysis of munitions industrial base. FFRDC researchers worked in collaboration with government officials to perform analyses on the adequacy of the munitions and missiles industrial base using government-held data from prime contractors and subcontractors. For example, the researchers supported working groups examining propulsion and chemicals in munitions and provided analysis for a report to Congress on solid rocket motors. The DOD official that requested the work and National Defense Research Institute representatives said that, without the pilot, the FFRDC would not have been able to access the data used to support DOD in these efforts. The official also noted that in this case the FFRDC helped fill a gap in DOD’s workforce to meet a congressional reporting requirement. National Security Engineering Center and Software Engineering Institute analysis of software acquisitions practices. FFRDCs supported a Defense Innovation Board study that aimed to identify correlations between software complexity, cost, and schedule evolution. FFRDC researchers’ access to and use of the data provided important insights about the quality and reliability of the department’s data. Specifically, DOD gained further insight into the kinds of software data the department holds and the significant gaps that would need to be addressed to improve overall DOD-held data quality. The Defense Innovation Board’s report included findings related to the quality of the software data accessed and analyzed by these two FFRDCs. Project AIR FORCE assessment of contractor risk. According to FFRDC representatives and an Air Force official involved in the work, the pilot program facilitated the FFRDC’s access to sensitive data held by the Defense Contract Management Agency that researchers used to identify early indicators of contractor performance risks. In response to the results of this work, the Air Force has funded a follow- on project to further research the potential of data analytics to provide early indicators of challenges in contract execution, according to an Air Force official involved with project. In addition to the benefits at the project level, several DOD sponsor officials and FFRDC representatives also noted the benefits of using the streamlined nondisclosure agreement process to accomplish their work. According to several DOD sponsor officials and FFRDC researchers we spoke to, completing the requested analysis without the pilot program would have required individual nondisclosure agreements with hundreds of individual contractors and suppliers. Systems and Analyses Center representatives said this would have been essentially impossible, and would have prevented researchers from completing important parts of the analyses. In another case, a Software Engineering Institute representative told us that, before the pilot, their team could not access software data when attempting to complete a 2017 project involving DOD software costs and production time frames. For that project, the DOD organization responsible for the data repository had recommended researchers send out a data request letter to each of the contractors with data in the system. Researchers sent out roughly one hundred requests to contractors for permission, but received no responses. They pointed out this was in part because contractors have no incentive to respond to an FFRDC’s request for access to their data. As a result, Software Engineering Institute was unable to use updated data for the 2017 report. While several sponsoring agency officials noted benefits of using the data for analyses to inform key program decisions, they also noted that a causal relationship between the pilot program activities and acquisition process improvements would be hard to establish, in part due to the length of time needed for projects to effect change. DOD officials responsible for two completed projects examining the munitions industrial base said they expect the analyses performed will lead to improved acquisition processes but that it would take many years to see the benefits. Specifically, they said the FFRDCs’ work helped identify areas for improvement in the department’s budget and acquisition strategy to better signal future demand to its lower tier munitions industrial base suppliers. In addition to noting these expected improvements, several DOD officials also acknowledged that expanding access of sensitive data to more people increases the potential for unauthorized use or disclosure but said that the pilot program put in place important protections to help mitigate these risks. DOD’s guidance to implement the pilot program outlined protections the FFRDCs must agree to, in order to guard against unauthorized disclosure or use of sensitive data, and required that these protections be incorporated into the sponsoring agreements between the FFRDCs and the DOD sponsor. However, we found some instances where details of the required protections were not incorporated into the agreements. We also found that the Laboratories and Personnel Office, which is responsible for managing the pilot program, does not have a procedure to verify whether protections were implemented, in part because it has not developed a process for doing so. Table 4 explains the protections. Some of these protections were already part of the FFRDCs’ business operations, while others are new. For example, the prohibition on their use of sensitive data to compete against a third party was already a fundamental aspect of FFRDCs’ role in supporting DOD. Similarly, participating FFRDC representatives told us that certain protections, such as implementing nondisclosure agreements and training, required only small adjustments to their existing procedures. However, the pilot’s financial disclosure program, annual certifications by parent organizations, and instructions for researchers to notify contracting officers of employment offers when supporting source selection decisions were new and specific to the pilot, according to a DOD official involved in the pilot’s implementation. We found that not all the details of protections were incorporated into the sponsoring agreements we reviewed. According to DOD’s implementing guidance, to participate in the pilot program, FFRDCs must agree to and follow these protections, which are to be incorporated into FFRDCs’ sponsoring agreements. We found that all six participating FFRDCs’ sponsoring agreements were updated and that most of the protections were incorporated. However, none included the instructions for FFRDC personnel involved in source selections to notify contracting officers if they are contacted about employment by an entity whose proposal is being evaluated and recuse themselves. We also found that the sponsoring agreements omitted one of the three officials that should be notified in the event of a Trade Secrets Act violation. These details were also not included in the templates DOD provided sponsors to use when updating FFRDC sponsoring agreements. When we raised these gaps to the attention of the DOD office responsible for managing the pilot program, the officials we spoke with were unaware of these omissions. In addition, the Laboratories and Personnel Office has not taken steps to ensure that another protection—the certification of the annual review of financial disclosure forms—has occurred, even though it was incorporated into the sponsoring agreements. The implementing guidance states that FFRDCs’ parent organizations must certify the annual review of financial disclosure forms and archive these forms for 6 years. However, only two FFRDC parent organizations provided us with this certification. According to representatives from parent organizations of the other four FFRDCs, the review of financial disclosures is generally performed as part of their conflict of interest programs. They review the disclosures on an annual or rolling basis when researchers are assigned to new projects but had not certified, as the sponsoring agreements require, that they have taken this step for the pilot program. We found that the Laboratories and Personnel Office had not taken steps to verify FFRDC parent organization compliance with this protection, such as collecting or reviewing the certification. When we raised this gap to the attention of the DOD office responsible for managing the pilot program, the officials were unaware of the missing annual certifications. By not ensuring the annual review is occurring, DOD has limited information about FFRDCs’ adherence to this pilot program protection. The pilot’s implementing guidance also states that, before government personnel provide access to sensitive data, the FFRDCs and researchers must have addressed these protections. However, the Laboratories and Personnel Office has not taken steps to ensure it is done. In our review of the six specific projects, we found that different people were checking that some of the protections were in place. For example, For two of the six projects, a primary sponsor official had a copy of the FFRDC addendum, and collected and reviewed the nondisclosure agreements and certifications of financial disclosure for individual researchers on each project. For a third project, a DOD official in the office that requested the project told us she confirmed that FFRDC researchers working on the project were part of the pilot program and told the official from the data repository that he could share information with the researchers. For the remaining three projects, representatives for a data repository that provided researchers with data access told us they confirmed that the addendum was incorporated into the sponsoring agreement and that researchers had the individual protections, such as a nondisclosure agreement, in place before providing access to the data. Standards for internal controls in the federal government state that responsibilities for control activities, such as sponsors ensuring the protections are incorporated into the agreements and that FFRDCs are following these protections, should be documented through policy and procedures. Without a process that includes clearly defined roles and responsibilities to ensure the protections are followed, DOD cannot ensure that its goal to safeguard sensitive data is achieved. DOD established what information sponsors must collect about the projects enrolled in the pilot in its implementing guidance to sponsors and notified FFRDCs about these responsibilities. The requirements include: pre-action information to be collected when the project is enrolled in the pilot, which includes basic details about the project, the data required, and planned analysis; quarterly status updates, which include progress obtaining access to sensitive data and any challenges or barriers to access; and post-action information regarding the results of pilot access when the project’s analyses are completed, which includes a summary of how the pilot supported FFRDC research, and any benefits accrued to DOD from pilot participation. The implementing guidance also instructs sponsors to collect information about the project’s results again 6 months after the project is completed. The Laboratories and Personnel Office, which is responsible for managing the pilot program, sends an email quarterly requesting that sponsors submit information. However, we found that the Laboratories and Personnel Office did not receive pre-action information from 11 of the 33 projects in the pilot program. For example: Systems and Analyses Center has not submitted pre-action information for six of its eight projects. An official from the Systems and Analyses Center’s primary sponsor office told us that in his view, pre-action information can be obtained by other means, and he had not requested it. Project AIR FORCE and Arroyo Center have submitted project pre- action information for five projects to the FFRDCs’ primary sponsors: Air Force and Army, respectively. However, the primary sponsors have not provided this information to the Laboratories and Personnel Office. An Air Force official explained that he gets a request from the Laboratories and Personnel Office for the quarterly reports, but not the pre-action information, and thus had not provided it. In addition, the office did not collect a quarterly report for three projects in the pilot, and, as of September 2019, two completed projects had passed the 6-month post-completion time frame and only one had submitted post-action information. These gaps in reporting have occurred because the Laboratories and Personnel Office is not monitoring the project information it receives to ensure sponsors are submitting all required reporting. DOD’s implementing guidance states that primary sponsors will collect and submit this information for each project enrolled in the pilot program. Further, GAO’s leading practices for pilot design state, among other things, that a well-designed pilot program should have a clear approach to gathering information for the purpose of supporting the future evaluation of the pilot and tracking the pilot program’s implementation and performance. Consistency in collecting pre-action, quarterly, and post- action reports is important because each contains different information, which could be useful for the department to track the pilot program’s progress and in an evaluation of the pilot program. For example, without the pre-action information from Systems and Analyses Center, Arroyo Center, and Project AIR FORCE, the Laboratories and Personnel Office will not have general descriptions of their pilot projects or information about the kinds of data these FFRDCs initially planned to access. Without complete information, DOD will not be able to effectively evaluate the pilot program and inform future decisions about the program’s status. We found that DOD followed some but not all of the leading practices for evaluating its pilot program. According to GAO’s leading practices for pilot design, a well-developed and documented pilot program can help ensure that agency assessments produce information needed to make effective program and policy decisions. Such a process enhances the quality, credibility, and usefulness of evaluations, in addition to helping to ensure that time and resources are used effectively. Five leading practices form a framework for effective pilot design and evaluation. (See figure 2.) We found DOD generally addressed the first of the leading practices of pilot design—establish objectives—by establishing goals for the pilot program, summarized below. Make sensitive data previously restricted or unavailable available for analysis. Use sensitive data in accordance with the FFRDC contract. Safeguard sensitive data. Document results of pilot program. Document risks or costs of FFRDC access to sensitive data. Gain analytic value from FFRDC access to sensitive data. Demonstrate benefits to government from sharing sensitive data. Inform future actions for making FFRDC access to sensitive data permanently available. However, DOD has not fully addressed the other leading practices. Specifically, we found that the Laboratories and Personnel Office does not have: a plan that (1) includes an assessment methodology to ensure DOD is collecting the correct information to evaluate whether the pilot has met the department’s goals and (2) defines how DOD will use the information collected to evaluate the implementation and performance of the pilot program, when the evaluation will take place, and by whom; a plan for identifying or documenting lessons learned; and a plan for gathering input from stakeholders, such as DOD sponsors, FFRDCs, and officials from DOD’s data repositories, for the pilot program’s evaluation. According to officials involved in its implementation, DOD did not consider creating such plans when developing the pilot program. The pilot program guidance, however, stated that information collected would be used for the department to assess the ongoing efficacy of the pilot program and GAO’s evaluation. These officials explained that, when the pilot’s guidance was formulated, the department was in the process of reorganizing the former Acquisition, Technology, and Logistics Office and they pointed out that GAO was to do the assessment of the pilot program. They said the reason the program collected information—such as quarterly reports—was to inform our review. Thus, they had no plan to assess the information collected and no plans to talk to stakeholders or to collect and share lessons learned. While our review occurred during pilot implementation, an evaluation of the pilot conducted by DOD after more projects are completed would provide an opportunity to identify lessons learned and gather valuable input from stakeholders—such as the offices that manage the data repositories and the sponsors requesting the projects. We found cases where FFRDC researchers had problems accessing data and where gathering this input from stakeholders involved with pilot projects would have been useful for DOD. For example, some FFRDC researchers described barriers when trying to gain access to certain government- and department-wide databases. In one case, Project AIR FORCE researchers reported not being able to access information in the Electronic Document Access database and various databases containing contractor performance information because researchers lacked military or government email addresses. Further, some of the databases that FFRDC researchers and a DOD official said would be useful are not owned by DOD. We found that guidance for one such database explicitly prohibits disclosure of contractor evaluation data to any contractor or non- government entity. In addition, the researchers were able to gain only partial access to DOD’s Acquisition Information Repository (a database containing acquisition documents for DOD’s major weapons programs) and, as a result, were unable to access individual documents, such as program assessment reports. They told us the repository is set up such that the researchers must request access to individual documents directly from document owners, who set permissions when uploading documents, rather than from a central source that can grant access across the repository. Without further evaluation of the pilot, DOD is missing an opportunity to benefit from gathering input from its stakeholders and identifying lessons learned, such as learning and understanding more about these barriers to accessing certain databases. There is still time for DOD to develop an evaluation plan with elements described in our leading practices. The pilot program ends December 21, 2020. Our review comes at a time when 11 of the overall 33 projects have been completed; therefore, information exists to report on outcomes. Officials and representatives from the Laboratories and Personnel Office and participating sponsors and FFRDCs expressed a continued need for access to the sensitive data. Without an evaluation plan, DOD will have difficulty determining the effectiveness of the pilot to meet its goal of accruing more analytic value for the department while also safeguarding sensitive data. The FFRDC pilot program has already provided DOD with some benefits, as a few FFRDCs have reported success in completing analysis that would not have been possible without it. However, in implementing the pilot, DOD has room for improvement. A key control of this pilot that provides access to sensitive data is ensuring protections are in place to prevent improper disclosure. Another control is to establish a process to ensure these protections are followed, yet the responsible office within DOD has not done so. Further, despite the fact that the pilot is past the midpoint of implementation, this office still has an opportunity to develop a plan on how to evaluate it. But to do this, it must develop a mechanism to ensure it is collecting complete information on the pilot activities. Ensuring comprehensive reporting and implementing a well-developed evaluation plan will help DOD understand and articulate the benefits the department has accrued because of FFRDC’s access to sensitive data. Further, through identifying lessons learned and obtaining stakeholder input, the Laboratories and Personnel Office has an opportunity to better understand the challenges FFRDCs and the department face when attempting to access and use sensitive data included in government- and department-wide databases. Such an evaluation could help inform Congress’ decision whether to extend, make FFRDC access permanent, or end the pilot. We are making the following six recommendations to the Department of Defense: The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to take steps to ensure that the details of the pilot program’s data protections are incorporated into the existing agreements. (Recommendation 1) The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to take steps to ensure that the FFRDCs and sponsors are implementing the pilot program’s protections for sensitive data. (Recommendation 2) The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to establish a monitoring and oversight mechanism to ensure that primary sponsors submit complete information on pilot projects, as required by DOD’s guidance for the pilot program. (Recommendation 3) The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to develop a plan that outlines the methodology by which DOD will assess the pilot and how and when information collected will be analyzed to evaluate the pilot program. (Recommendation 4) The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to develop a plan to identify and evaluate lessons learned from the pilot program. (Recommendation 5) The Under Secretary of Defense for Research and Engineering should direct the Laboratories and Personnel Office to develop a plan for obtaining input from stakeholders on the pilot program. (Recommendation 6) We provided a draft of this product to DOD for comment. DOD provided a letter response, reproduced in Appendix I. DOD agreed with our recommendations and described actions that it intends to take in response. We also provided excerpts of this product to FFRDCs for comment, of which three provided technical comments that we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in Appendix II. In addition to the contact named above, Tatiana Winger (Assistant Director), Leslie Ashton (Analyst-in-Charge), Evan Nemoff, Tanya Waller, Jenny Chanley, Laura Greifner, Christine Pecora, and Roxanna Sun made key contributions to this report.", "summary": "FFRDCs provide federal agencies with research and development functions, technical systems engineering capabilities, and policy development and decision-making studies, among other services. The Federal Acquisition Regulation states that FFRDCs have a special relationship with DOD, which can give FFRDCs access to sensitive data beyond what would commonly be shared with contractors. The National Defense Authorization Act for Fiscal Year 2017 directed DOD to establish a 3-year pilot program that allows FFRDCs streamlined access to sensitive data maintained by DOD. It also included a provision for GAO to report on the pilot program within 2 years of implementation. This report addresses the extent to which (1) FFRDCs are using the pilot program, (2) DOD put procedures in place to protect data accessed, and (3) DOD is evaluating the pilot program. GAO reviewed DOD guidance and FFRDC processes, pilot reports for January 2018 through September 2019, and DOD's plans and efforts for evaluating the pilot program. GAO also selected a nongeneralizable sample of six projects—at least one from each FFRDC with an enrolled project as of December 2018—for further review. In addition, GAO assessed the pilot program against leading practices for pilot design. The Department of Defense (DOD) launched a 3-year pilot program in December 2017 to enable a streamlined process to share certain sensitive data, such as data collected from its contractors, with its Federally Funded Research and Development Centers (FFRDC). At times, FFRDCs need to access such data to support DOD. The pilot was intended to reduce the burden on FFRDCs to seek permission from hundreds of contractors to access information needed for their research. Six of DOD's 10 FFRDCs have taken part in the pilot, enrolling a combined total of 33 projects, as shown in the table. DOD officials and FFRDC representatives reported that the streamlined process made the use of sensitive data feasible. As a result, FFRDCs with completed projects in GAO's sample indicated they were able to provide more robust analyses or insights to DOD. DOD guidance for the pilot program established procedures to protect sensitive data. But GAO found that DOD did not incorporate all of the details of the required protections into its agreements with FFRDCs. Further, GAO found that not all FFRDCs were performing annual certification of financial disclosure forms, as required by its agreements with DOD. DOD does not have a process to ensure that all the protections pertaining to FFRDCs' streamlined access to sensitive data are being followed. Without a process that defines roles and responsibilities, DOD cannot ensure that FFRDCs adhere to the protections. DOD developed goals for the pilot program and outlined what information was to be obtained for each participating project, actions that are consistent with GAO's leading practices for pilot design. However, DOD has not developed a plan for evaluating the program nor has it consistently collected information on about a third of the pilot projects. Leading practices for pilot design call for an evaluation plan, which should include an assessment methodology and identify responsibilities as to how the evaluation will be conducted. Without an evaluation plan and a mechanism to collect information on pilot projects, DOD will not be positioned to identify the effectiveness of the pilot program and benefit from lessons learned. Such information will be useful as Congress considers the path forward after the pilot ends in December 2020. GAO is making six recommendations, including that DOD take steps to ensure data protections are in the agreements and followed, collect information on projects, and evaluate the pilot. DOD agreed with the recommendations.", "document_type": "gao"}
{"report": "The Constitution gives Congress the power to coin money, and under that authority, Congress has specified the coins that can be produced and the metal composition of circulating coins, including the penny, nickel, dime, quarter, and half-dollar. Congress has also passed legislation prohibiting the use of appropriated funds to redesign the $1 note. Within the Department of the Treasury (Treasury), BEP produces notes and the Mint produces coins. To ensure that notes and coins are available in sufficient quantities to meet public demand, the Federal Reserve orders new notes from BEP and new coins from the Mint. The Federal Reserve pays BEP for the cost of producing the notes; the Mint pays for the cost of producing coins and the Federal Reserve pays the Mint for the face value of the coins. The Federal Reserve distributes the notes and coins to approximately 8,400 depository institutions—banks, savings and loans, and credit unions—in the United States through cash offices operated by its 12 regional Reserve Banks. The Reserve Banks also are responsible for ensuring the quality and integrity of notes in circulation by assessing the condition of each note and destroying any that are unfit. When a depository institution deposits currency with a Reserve Bank, each currency note is verified on high-speed processing equipment using electronic authentication and fitness sensors. During the “piece- verification” process, the deposited currency is counted, suspect counterfeit notes are identified and segregated, and unfit notes are destroyed. The fit currency is packaged and used to fill future orders for currency from depository institutions. The destroyed notes are replaced with new notes from BEP as there is public demand for cash. The federal government spent about $1.3 billion to produce, process, and circulate notes and coins in 2017. These costs are offset by the financial benefit the government realizes when it issues notes or coins because currency usually costs less to produce than its face value. This benefit, which is known as seigniorage, is the difference between the face value of currency and its cost of production; this difference provides a financial benefit to the government when the government issues currency. In calendar year 2017, the Federal Reserve reported transferring about $81 billion to the Treasury, and the Mint reported transferring about $269 million in fiscal year 2017. The seigniorage the Federal Reserve and the Mint pay into the Treasury reduces the need for the government to borrow money, and as a result, the government pays less interest over time. Other countries have taken steps to reduce currency costs by replacing notes with coins of the same value and eliminating the smallest value coin. For example, Canada introduced a $1 coin in 1987 and a $2 coin in 1996 that replaced corresponding-valued notes, and the United Kingdom replaced its £1 note with a £1 coin in 1983. These countries expected a cost reduction because, while coins are generally more expensive to produce than notes, the coins can last substantially longer in circulation. For example, in both countries, the $1 and £1 notes, respectively, lasted 18 months or less while coins, according to experts, can be expected to last more than 30 years. As a result, these countries’ governments expected to save money because over 30 years, the number of coins they would produce was far less than the number of notes they otherwise would have made. These countries may have realized further financial benefits by replacing notes with coins because the public may hold more cash if a note is replaced with a coin and, as a result, the government would achieve a greater benefit from seigniorage. As we reported in 2011, because of differences in how people use coins and notes, the public may hold more than one coin for each note being replaced. Since people often store coins at home and store notes in their wallets, coins, as a result, circulate less frequently than notes and therefore more coins are needed to meet public demand. Thus, for a given denomination of currency, a larger number of coins would need to be maintained in circulation to meet the public’s demand for cash than would be needed if that denomination were provided in notes. For example, we previously reported that when Canada replaced its $1 note and the United Kingdom replaced its £1 note with a coin, both countries anticipated they would need to produce 8 coins to replace 5 notes, or a 1.6-to-1 replacement ratio. In previous work, we reported a positive annual net benefit to the government of replacing the $1 note with a $1 coin. In 2011, we reported a 30-year net benefit of $5.5 billion. Based on these results and the experiences of other countries, we have previously recommended that Congress consider and pass proposals to replace the $1 note with a $1 coin and, to ensure success of the coin, also provide for the elimination of the $1 note. While the production of the $1 coin has been authorized in law, elimination of the $1 note has not, and the U.S. has continued producing it. The U.S. has not eliminated any coins or altered any coin’s metal composition since 1982. Some countries have also eliminated their low- denomination coins to reduce currency costs. In 2013 Canada eliminated its one-cent coin because the cost to make it was more than it was worth and the coin’s usefulness had declined due to inflation. Over time, the costs of making these coins has increased due, in large part, to increases in the costs of metals used in coins—copper, zinc, and nickel. Since fiscal year 2006, both the penny and nickel have cost more to produce than their face value, according to our analysis of Mint data. (See fig. 1.) For example, in 2017, the Mint spent approximately 1.8 cents to produce each penny and approximately 6.6 cents to produce each nickel. Because the Mint sells coins to the Federal Reserve at face value, both coins cost more to produce than the Mint receives for them. As a result, in 2017, the Mint incurred net losses of about $69 million to produce the penny and about $21 million to produce the nickel. The dime and the quarter, however, cost less to produce than their face value. The combined cost to produce all widely circulating coins (the penny, the nickel, the dime, and the quarter) is less than their combined face value, so the government continues to realize positive seigniorage overall from producing circulating coins. The Coin Modernization, Oversight, and Continuity Act of 2010 authorized the Secretary of the Treasury to conduct research on alternative materials that could be used in coins. In response, the Mint conducted research on alternative metals, identified metal alloys that offered the potential for cost savings, and reported its results to Congress in 2012, 2014, and 2017. According to our analysis, the government would likely incur a net loss over 30 years if it replaced the $1 note with a $1 coin. We conducted a number of simulations that used different sets of assumptions to estimate the net benefit to the government of replacing the $1 note with a $1 coin. In almost every simulation, the net benefit to the government from switching to a $1 coin was negative, or an overall net loss (see app. I). For each set of assumptions, we simulated the status quo scenario in which notes are not replaced by coins, as well as two replacement scenarios. Under “gradual replacement,” the Federal Reserve would replace $1 notes with $1 coins as the notes became unfit for circulation. Under “active replacement,” notes would be replaced by coins more quickly because the Federal Reserve would destroy unfit notes as well as some fit notes each year and replace them with $1 coins. In both replacement scenarios, we assumed that the public would increase its holdings of cash when coins are used instead of notes and that the replacement ratio would be 1.5 coins for each note. We found that the present value of the net loss incurred by the government over 30 years would be about $2.6 billion with gradual replacement and about $611 million with active replacement (see fig. 2). Each simulation we conducted accounts for both costs and benefits to the government. The costs include production and processing costs for $1 coins and $1 notes, as appropriate. The coin replacement scenarios each include one-time startup costs that would be incurred upfront, in addition to recurring increased costs of producing higher-denomination notes when the $1 note would no longer made. In each simulation, we calculated benefits to the government as interest savings on debt that would be avoided because of seigniorage, or the difference between the face value of the currency that would be produced and the cost of producing it. These simulations represent the first time we have found that replacing the $1 note with the $1 coin would result in a net loss to the government rather than a net benefit. The simulations are based on current data and projections from CBO and the Federal Reserve, among others, that have changed over time. For example, the increased lifespan of the $1 note relative to that of the $1 coin and the decreased cost to the Federal Reserve for processing currency are key factors in these estimates and substantially reduced the relative costs of the status quo scenario. For our 2011 report, we assumed a median lifespan of 3.3 years for the $1 note based on Federal Reserve data. Since then, the $1 note lifespan has increased, and our current simulations assume a median lifespan of 7.9 years based on the most recent data from the Federal Reserve. Due to this substantially longer note lifespan, fewer $1 notes need to be produced over a 30-year period, which reduces the cost of producing them and diminishes the relative advantage of the long coin life. In our 2011 simulations, a $1 coin was assumed to last about 10 times as long as a $1 note (34 years to 3.3 years); in our current simulations, the lifespan of the coin remains the same but is now only about 4.3 times as long as that of the note (34 years to 7.9 years). Meanwhile, the relative cost of producing coins and notes has remained about the same. According to the Federal Reserve, the increased lifespan of the $1 note is largely attributable to a series of improvements in Federal Reserve currency processing procedures and equipment that has reduced the number of notes destroyed each year. For example, prior to April 2011, depository institutions were required to deposit currency in stacks of like- notes with the portrait side of the note facing up. After discovering it was destroying many notes that were otherwise fit for circulation because they were “misfaced,” the Federal Reserve undertook an effort to increase the percentage of notes that were properly faced by manually checking and correcting notes’ orientation. Subsequently, during 2010 and 2011, the Reserve Banks installed new sensors on their high-speed processing equipment, which enabled the Reserve Banks to authenticate notes regardless of facing. In addition to increased note life, the costs that we anticipate the Federal Reserve would incur for processing notes has decreased since our 2011 analysis because it is processing fewer $1 notes. Although the cost per note for processing has remained the same—$0.003 per note, based on Federal Reserve data—the number of notes processed in 2017 was about 1.6 billion less per year than at the time of our 2011 analysis. According to Federal Reserve officials, the public may be handling and using $1 notes less and holding on to them longer. This could cause notes to circulate less frequently, reducing the number of notes processed. Our simulations show that the losses to the government from replacing the $1 note with a $1 coin would not be incurred evenly over the 30-year period. Much of the cost of producing coins to replace notes would be borne by the government in the earlier years of our simulations, while the benefits to the government would accrue gradually and become relatively more important in later years. For example, in the gradual replacement scenario, more than half of the net loss to the government occurs in the first 10 years of the 30-year period. The large net losses in the early years largely reflect the upfront costs of replacing $1 notes in circulation with $1 coins and meeting increased demand for currency. In our simulations, the interest savings then accrue over a relatively long period of time due to the 34-year median lifespan of the coin. Our simulations reflect uncertainty in the underlying projections and assumptions. In general, however, projections that are closer in time are more certain. For example, an estimate over a 10-year period would be more certain than an estimate over a 30-year period. Consequently, within our results, the estimated net loss in the first 10 years is more certain than the estimated net loss over the 30-year period. Representatives from 7 of the 10 stakeholder industries we met with would be negatively affected by a switch to a $1 coin because they stated they would incur additional costs as a result of such a change. For example, representatives from the armored carrier industry told us that they anticipate increased costs because of the additional weight of transporting $1 coins compared to $1 notes as well as the need to modify or procure additional coin-processing equipment. Representatives of the gaming industry, which includes casinos and companies who make electronic games found in casinos, said a switch to the $1 coin would be costly because the industry has generally moved away from the use of coins in favor of notes and casinos would incur additional costs for transporting and storing coins. Of the 7 stakeholder industries that said they would incur additional costs, 3 provided us with estimates of these costs. All 3, which represent industries with machines that would require modification to accept $1 coins, approximated these costs by multiplying an estimated number of units affected by an estimated per-unit cost of changing the machines. For example, a representative of the gaming industry estimated that about 98 percent of the approximately 1,000,000 electronic gaming machines in the U.S. and Canada were manufactured with no provision for accepting coins. According to this representative, the costs to convert machines to accept $1 coins could range from $130 to $175 per unit because the level of modification needed would vary. Some machines would require, for example, a newly designed faceplate, a coin acceptance mechanism, and a box for collecting coins. Most representatives from stakeholder industries said there would be no benefit to them from a switch to a $1 coin, but 3 of the 10 representatives acknowledged some benefits of doing so. Two representatives said that coins are generally less likely to jam or be rejected by the payment mechanisms than notes. The other representative—from the bulk vending industry, which sells products such as gum balls and small toys through coin-operated equipment—said a $1 coin would help the industry increase sales and offer higher-quality products than it offers now for 25 or 50 cents. According to this representative, virtually all these machines accept quarters but some require two or three quarters for a purchase. A $1 coin would increase the likelihood that consumers would have the necessary change to use these machines thus increasing their sales, according to this representative. Representatives from the remaining 3 stakeholder industries reported that switching to a $1 coin would have little or no impact on their operations. For example, a representative of operators of toll roads and bridges said that all major toll operators have adopted some form of cashless, electronic collection system. The use of cash, including coins, for toll payment has declined to 18 percent of all toll revenue in 2015, down from 29 percent in 2010, and most existing coin collection machinery currently accepts $1 coins. Similarly, a representative from the parking industry noted a trend toward increased use of cashless transactions along with a decrease in the number of coin-operated parking meters. A switch to a $1 coin would have minimal effect on the industry because virtually all parking meters take quarters. The remaining representative said additional information, such as whether a new $1 coin would be issued and whether it would have the same properties as currently circulating $1 coins, would be needed to determine whether it would incur costs from a switch to a $1 coin. A representative of an organization that advocates replacing the $1 note with a $1 coin said that switching to the $1 coin could make it easier for people with visual impairments to identify the denomination. We have previously reported that different denominations of US currency are identical in size, making it difficult for the blind or visually impaired to distinguish among them. Moreover, according to the representative, eliminating the $1 note would reduce the number of note denominations, and the $1 coin may be easier to recognize by its physical difference from other coins. Although anyone who uses currency could be affected by a switch to a $1 coin, the extent of public support for making such a change is unclear, particularly when doing so would not provide a benefit to the government. Our most recent work on public perceptions of $1 coins in 2002 found few survey respondents were using $1 coins and 64 percent opposed replacing the $1 bill with a $1 coin. A majority of survey respondents favored replacing the $1 note with a $1 coin when told that doing so could save about half a billion dollars per year—our then-current estimated net benefit to the government; we did not seek to gauge public perceptions about the same action if it were to cause a loss. Similarly, the organization advocating in support of $1 coins has reported increased public interest in a change from the $1 note when substantial cost savings are factored in. However, according to Federal Reserve officials, the public continues to express its preference for the $1 note because both the $1 coin and $1 note are available and the public overwhelmingly uses $1 notes. Moreover, Reserve Banks currently hold more than 1-billion $1 coins because there is little demand for them from the public, further demonstrating public preference for the $1 note, according to these officials. The Mint estimates that it would save about $27 million annually, or about $252 million in present value over 10 years if Congress directed it to suspend the production of the penny (see table 1). However, the Mint’s estimated savings are based on its penny production data from a single fiscal year—2017. Specifically, since the Mint lost $27.3 million from making 8.4-billion pennies that year, this amount would also represent the savings to the Mint through cost avoidance if it had not produced any pennies. Because the number of pennies produced and the base metal costs vary from year to year, future changes to production volumes and costs could alter the estimated savings. The present value of the estimated savings could also be affected by the choice of discount rate. The Mint has suspended production of some coins in the past due to a lack of demand for those coins. Specifically, the Mint suspended production of the half-dollar coins for circulation in fiscal year 2006 and the Presidential $1 coins for circulation in 2011. The Mint suspended production of these coins because demand for them was low. In contrast, demand for the penny remains strong, as the Mint produced about 8.4 billion pennies in fiscal year 2017 in response to orders from the Federal Reserve. Penny inventories at Federal Reserve Banks can meet demand for about 1 month, according to Federal Reserve officials. According to Mint officials, the Mint has not taken a position on proposed legislation introduced in the 115th Congress that would suspend production of the penny for 10 years, among other things. However, the Mint has developed a preliminary plan to implement a penny suspension if required to do so by law. According to this plan, suspending penny production would take place over a 2.5-year timeframe: the first year would be devoted to planning and preparing for penny suspension, and the next 1.5 years would be devoted to ending the Mint’s contracts with its suppliers, addressing the disposition of affected Mint personnel, and deciding what to do with excess production equipment and physical space. The Mint would also conduct outreach and communication to the public, Congress, and Mint employees during this time. The Mint is also taking steps to reduce the financial loss from producing the penny. According to Mint officials, they and the Federal Reserve are working with industry stakeholders specifically to identify alternative practices that would reduce dependency on the manufacture of additional pennies. For example, the Federal Reserve and Mint met with stakeholders to discuss these practices in January 2019. According to Mint officials, the Mint would not need to produce as many pennies if the pennies currently in circulation were more actively circulated. Mint officials stated that billions of pennies are held by banks, armored carriers, or the public. According to Mint officials, if pennies were to circulate more quickly, the demand for new pennies would be reduced, and production of new pennies could decrease and would reduce the financial losses from penny production. The Mint also estimates it would save between $2.2 million and $9.1 million annually, or between $21 million and $85 million in net present value over 10 years, by changing the metal composition of the nickel (see table 2). The Mint’s estimated savings are based on fiscal year 2017 production of 1.3-billion nickels at a cost of $86 million. The nickel currently consists of about 75 percent copper and 25 percent nickel. Based on research, the Mint reported it would achieve cost savings by changing the metal composition to about 80 percent copper and 20 percent nickel (80/20) or by changing the metal composition to a copper, nickel, manganese, and zinc combination (C99750T-M). Because the number of nickels produced and their cost varies from year to year, future changes to production volumes and costs could alter the estimated savings. Both changes in the composition of the nickel are seamless changes because nickels made of these alloys would have the same weight and electromagnetic signature as the current nickel, according to the Mint. As a result, these nickels would function the same for the public and in vending machines. However, according to Mint data, even if the Mint changes to one of these alternative metal compositions, the unit cost of producing the nickel would likely remain greater than the face value of the coin. In fiscal year 2017, the Mint spent approximately 6.6 cents to produce each nickel, which would have been reduced to about 6.4 cents if the Mint had produced the 80/20 nickel and 5.9 cents for the C99750T-M nickel. Based on authorities granted in the Coin Modernization, Oversight, and Continuity Act of 2010, the Mint has conducted research and identified potential alternative metal compositions for the dime and quarter. This research shows that the same alloys that could reduce the cost of producing the nickel could be used to reduce the costs of producing the dime and quarter. Specifically, this research indicated potential savings of $74 million over 10 years by using the C99750T-M alloy in the dime and quarter, although additional testing of the alloy is required. Changing the metal composition of circulating coins could help the Mint achieve more effective and efficient operations by reducing production costs, resulting in savings to the government and the taxpayer. The Secretary of the Treasury and Mint officials do not have the authority to alter the metal content of coins—except the penny—as metal content is determined in statute. The Mint has sought authority from Congress to change the metal composition of the nickel, dime, and quarter, if those changes meet certain requirements. Specifically, in its fiscal year 2019 budget proposal, the Mint proposed a legislative change to its authorities that would enable the Secretary of the Treasury to alter the metal composition of coins, if those changes did not affect the weight or electromagnetic signature of the coins. This proposed change is consistent with the Treasury’s 2018–2022 strategic plan, which includes a goal to introduce efficiencies to lower the unit costs of coins produced by the Mint. Legislation supporting this proposal has not been introduced. Without the authority to change the metal composition of coins, the Mint cannot fully realize operational efficiencies, even though it has identified methods to reduce the cost of coins without altering their characteristics. Government officials we spoke with raised concerns about the potential effects of a penny suspension, such as regional penny shortages or other unintended consequences. Specifically, Federal Reserve officials noted that suspending production could create a shortage of pennies if demand is greater than the supply of pennies. These officials explained that even if there are enough pennies to meet overall demand, the distribution of pennies across the country may be uneven and not matched to the location of greater demand. In this case, the Federal Reserve could incur additional costs to transport pennies to balance supply and demand across the country. Federal Reserve officials also said a suspension could potentially be successful if there was a reduction in penny demand and steps taken to mitigate potential disruptions to the penny supply. Mint officials expressed concern about potential unintended consequences of a penny suspension and effects on Mint operations. Specifically, according to Mint officials, suspending penny production may cause an increase in the number of coins returned to circulation because the public may react to a suspension by using its pennies in addition to the other coins in its coin jars. The resulting influx of coins into circulation may be sufficient to satisfy some or all of the demand for new coins for a period of time and cause the Mint to decrease or suspend production of coins. Mint officials said that costs the Mint would incur due to a disruption of coin production operations and loss of income from seigniorage could be as high as $3 billion over 7 to 10 years. These officials also raised concerns about the ability to securely store larger-than-usual quantities of all coins because the existing infrastructure, particularly vault storage, may be insufficient. Mint officials noted that, while other countries have stopped producing coins, suspending penny production may have a similar impact as not producing the penny. When Canada stopped producing its penny, it began to actively take the coins out of circulation, and the public knew the penny would eventually no longer be used. While the proposal to suspend penny production does not remove the penny from circulation or use in commerce, Federal Reserve and Mint officials told us that the results of suspending penny production are uncertain, partly because a suspension has not been tried before. Representatives from 9 of the 10 stakeholder industries said they do not anticipate incurring costs if the penny were suspended; most said they were not concerned about this action because the coins are either not used or minimally used in their industry. Three selected stakeholders said they would be affected by a penny suspension—associations representing armored carriers, banks, and retailers—as well as the company that manufactures the penny blanks for the Mint. They expressed uncertainty about how the suspension would be carried out and effects it might cause, such as penny shortages, and provided the following views and information: Armored Carriers – A penny suspension may not have a significant effect on operations since a suspension would not necessarily reduce the number of coins processed or transported, according to armored carrier representatives we spoke to. However, if penny shortages occurred, the carriers may have to move pennies from one geographic region to another to satisfy variations in demand from their customers, incurring additional transportation costs. Alternatively, suspension of the penny may cause the public to turn in pennies, along with coins of other denominations, which could exceed the secure storage capacity of carriers and coin terminals. Bankers – According to an association representing banks, bankers are unclear if the government would issue any guidance about rounding cash transactions to avoid inconsistent approaches. Because banks have received questions from customers about changes to currency in the past, the association emphasized the need for public education before suspending the penny. Retailers – Retailers have not determined the impact of suspending the penny on their industry, according to a retailer association. However, many retailers sell items priced below $1 as an important part of their business and merchandising strategy, according to these representatives, so it is important for retail businesses to be able to continue to make change down to the penny at the end of cash transactions. Vendor – a representative of the company that supplies the Mint with penny coin blanks told us that a penny suspension would force a decision whether to sell or deactivate the penny blank production equipment during the 10-year suspension. If sold, the vendor may then not have the equipment if the government decided to produce the penny again. None of the representatives from stakeholder industries raised concerns about changes to the nickel as long as the changes to the nickel are seamless. Producing money for use in commerce is an important function of the U.S. government. The Federal Reserve, along with the Treasury’s BEP and the Mint, work together to ensure that there is an adequate supply of U.S. coins and notes for use around the world. In addition to ensuring an adequate supply of these coins and notes, it is also important to ensure that the government is producing these items efficiently. Because our current estimate shows the federal government would likely incur a net loss from replacing the $1 note with a $1 coin, we are no longer recommending that Congress consider replacing the $1 note with the $1 coin. The Treasury cannot alter the metal content of coins unless Congress provides that authority to the Treasury. If Congress were to grant the Treasury the authority to change the metal composition of coins, as the Mint has proposed, then it could use the results of its research to lower the costs of coin production while producing coins that look, feel, and function the same as current coins. Further, the Mint could decrease its production costs without affecting the characteristics of the coins. Without this authority, the Mint cannot provide the best value to the taxpayer and produce coins in the most efficient and cost-effective manner possible. Congress should consider amending the law to provide the Secretary of the Treasury with the authority to alter the metal composition of circulating coins if the new metal compositions reduce the cost of coin production and do not affect the size, weight, appearance, or electromagnetic signature of the coins. (Matter for Consideration 1) We provided a draft of this report to Treasury, including the Mint and BEP, and the Federal Reserve for their review and comment. In comments, reprinted in appendix III, the Mint agreed with our matter for congressional consideration and clarified its position on the potential cost impact of a penny suspension. The Mint’s comments stated that if the penny were suspended, consumers may return large amounts of all coins, not just pennies, which would decrease the need for future coin production. Without demand for coin production, the Mint estimated costs from idle production capacity and loss of seigniorage from coins to be up to $3 billion over 7 to 10 years. The Mint also commented that the effect of suspending penny production could be the same as the effect of stopping penny production. We revised our report to reflect the Mint’s perspective. The Department of the Treasury concurred with comments provided by the Mint. BEP did not have any comments. The Federal Reserve provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Director of the U.S. Mint, the Director of the Bureau of Engraving and Printing, the Chair of the Board of Governors of the Federal Reserve System, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix describes the economic simulations discussed in this report, including the assumptions we used and their sources, as well as the alternative simulations we conducted. To estimate the net effect on the government of replacing the $1 note with a $1 coin, we simulated the benefits and costs to the government of issuing currency—including both notes and coins—under different scenarios and assumptions over a 30-year period. For each set of assumptions we considered, we simulated three scenarios—the status quo scenario, in which the $1 note would continue to be produced, and two replacement scenarios, in which the $1 coin would replace the $1 note. In the gradual replacement scenario, $1 notes are replaced as they become unfit for circulation, while under the active replacement scenario, $1 notes are replaced more quickly. We then compared the net benefit to the government in each replacement scenario to the net benefit under the status quo. As part of our analysis, we also ran alternative simulations with different sets of assumptions, to examine how the assumptions underlying our analysis would affect the estimated net benefit to the government. The various assumptions include the extent to which the public would increase its holdings of cash when coins are used instead of notes, the expected rate of growth in the demand for currency over 30 years, the costs of producing and processing both coins and notes, and the life span of both forms of currency (see table 3). In our replacement scenarios, we assumed that the replacement would be implemented starting in 2018, and during that year the U.S. Mint (Mint) would invest in new equipment to establish its production capability for $1 coins. We also assumed that production of the paper note would stop as soon as $1 coins were introduced. A key assumption in our analysis is the extent to which the public may hold more cash when notes are replaced by coins. Because of differences in how people use notes and coins, the public may need more than one coin for each note than would otherwise have been demanded. For example, people may take coins out of their pockets and store them at the end of each day, rather than retain them in their wallets as they do notes. These factors cause coins to circulate more slowly than notes, and more $1 coins would need to be maintained in circulation to meet the public’s demand for $1 notes. Consistent with simulations in our previous reports, we assumed in our economic simulations that the public would hold more $1 coins, requiring that more than one coin would be needed to replace each note. Therefore our replacement scenarios use a replacement ratio of 1.5 – that is 1.5 $1 coins for each $1 note to be replaced. For our alternate simulations we allow the replacement ratio to vary, to include a case in which no additional currency is demanded when coins are used (i.e., the replacement ratio is 1.0). As part of this sensitivity analysis, we found that a key driver of the estimated net benefit is the extent to which the public would hold more cash when $1 coins are used instead of notes. We altered some assumptions to simulate how the change would affect our estimate of the net benefit or loss to the government. See table 4. We present our analysis to show the effect of changes under both gradual and active replacement, and we show the results both with and without gains from seigniorage. To assess the effect of the public’s holding more or less cash as a result of needing fewer or greater numbers of coins to replace each note in circulation, we conducted separate simulations in which we: decreased the replacement ratio from our current estimate of 1.5 coins per note to 1 coin per note, and increased the replacement ratio from our current estimate of 1.5 coins per note to 2 coins per note. To assess the effect of the Board of Governors of the Federal Reserve System (Federal Reserve) not releasing into circulation the $1 coins it currently holds, we: assumed that the approximately 1.2-billion $1 coins held by the Federal Reserve would not enter circulation and would continue to be held by the Federal Reserve. To assess the effect of changing production costs for notes and coins, we conducted separate simulations in which we: increased the costs of producing notes from our current estimate of 3 cents to 4.9 cents without changing the costs of producing coins; increased the costs of producing coins from our current estimate of 14.6 cents to 17.5 cents without changing the costs of producing notes; and increased the costs of producing both notes and coins from our current estimates of 3 cents to 4.9 cents for notes and 14.6 cents to 17.5 cents for coins. To assess the effect of decreased demand for currency if people switched to electronic means of payment, we conducted separate simulations in which we assumed: demand for currency grows at a slower rate—75 percent of the growth in demand in the replacement scenarios—after fiscal year 2028, and demand for currency grows at a slower rate—50 percent of the growth in demand in the replacement scenarios—after fiscal year 2028. This report: (1) determines the estimated net benefit to the government, if any, of replacing the $1 note with a $1 coin and selected stakeholders’ views on this change, and (2) examines what is known about potential cost savings to the government from suspending production of the penny and changing the metal composition of the nickel coin as well as selected stakeholders’ views on these changes. To estimate the net benefit or loss to the government of replacing the $1 note with a $1 coin, we conducted economic simulations under different scenarios and assumptions over a 30-year period. We simulated a “status quo” scenario and two “replacement” scenarios. In the status quo scenario, notes remain the dominant form of $1 currency. In each replacement scenario, notes are replaced by $1 coins under various assumptions. We then compared each replacement scenario to the status quo scenario with respect to net benefits to the government. As part of our analysis, we also ran alternative simulations with different sets of assumptions, to examine how the assumptions underlying our analysis affect the estimated net benefit to the government. The various assumptions underlying our simulations include the extent to which the public holds more cash when coins are used instead of notes, the cost to produce $1 notes and $1 coins, and the lifespan of notes and coins, among others. Our analyses are projected over 30 years because that period roughly coincides with the life expectancy of the $1 coin. We interviewed relevant officials from the Board of Governors of the Federal Reserve System (Federal Reserve), the Bureau of Engraving and Printing (BEP), and the U.S. Mint (Mint). We also obtained data for our assumptions from these agencies and economic projection data from the Congressional Budget Office. More detailed information on the structure, assumptions, and inputs of our economic simulations are found in appendix I. To determine how the Federal Reserve estimates the life-span of the $1 note (a key input to our economic simulations), we reviewed work papers and analyses from prior work. We interviewed knowledgeable Federal Reserve officials about the methodology for calculating a note’s life-span and reviewed data on a note’s estimated life from calendar years 2005 through 2017. We also observed note-processing operations and equipment at the Federal Reserve’s Cash Technology Office (located in the Federal Reserve Bank of Richmond), reviewed Federal Reserve’s and Treasury Department’s cash-processing policy and procedure manuals, and interviewed knowledgeable officials about technological innovations in Federal Reserve note processing since 1998. We took steps to assess the reliability of data used, such as interviewing knowledgeable agency officials, and determined that the data were sufficiently reliable for the purposes of this report. To determine selected stakeholder views on changes to currency, we identified 91 entities that could potentially be affected by reviewing prior GAO, Mint, and Federal Reserve reports and the results of a literature search. We eliminated some of these entities from further consideration because we could not identify a way to contact them or they did not respond to our efforts to contact them. We sought entities with the broadest representation so we generally eliminated individual companies, with the exception of those that are primary suppliers of raw material for the production of notes or coins. Of the remaining 36 entities, we selected and interviewed 10 organizations representing potentially affected industries, primarily based on the entities’ role with respect to currency and the currency change likely to affect it most. We also selected and interviewed a private company involved in the production of materials used in coins and two organizations that advocate for a switch to a $1 coin and for continued use of the penny, respectively. We categorized each entity’s role with respect to currency as a maker (involved in, or represents those involved in, supply of materials for production of coins or notes); a mover (involved in, or represents those involved in, transporting, processing, or facilitating use of coins or notes); or a user (involved in, or represents those involved in, transactions where coins or notes are exchanged). We also categorized each entity as being most affected by, or most interested in, changes to the $1, nickel, or penny. We used information we collected or had used in prior work about these stakeholders and also used professional judgement and logic to determine in which role category they belonged. In some cases, we assigned an entity to more than one category. In addition to categorizing stakeholders, when making our selection, we also considered the extent an entity’s area of representation overlapped with another to avoid duplication. If a selected entity did not respond to our request for an interview, we sought to replace that entity with a similar one, if available. Since our selection is comprised of a non-representative sample, the results are not generalizable to all stakeholders. The stakeholders we selected are: American Bankers Association, aba.com Americans for Common Cents, pennies.org Association of Gaming Equipment Manufacturers, agem.org Coin Laundry Association, coinlaundry.org Dollar Coin Alliance, dollarcoinalliance.org International Bridge, Tunnel and Turnpike Association, ibtta.org International Parking & Mobility Institute, formerly the International Parking Institute, parking-mobility.org Jarden Zinc Products, jardenzinc.com National Armored Car Association, nationalarmoredcar.org National Automatic Merchandising Association, namanow.org National Bulk Vendors Association, nbva.org Retail Industry Leaders Association, rila.org We also reviewed information on public perceptions and opinions about the use of a $1 coin from prior GAO work and publicly available information from an organization that advocates for a transition to a $1 coin. To examine what is known about potential cost savings to the government from suspending production of the penny coin and from changing the metal composition of the nickel coin, we analyzed penny and nickel production cost data from the Mint for fiscal years 2003 through 2017 to include a range of the number of coins produced and cost changes from metal price fluctuations and reviewed Mint studies on potential alternative metals and on coin production cost savings that could result from changing coin metal composition for these coins. We reviewed and analyzed the Mint’s preliminary plan if Congress were to authorize suspending production of the penny. We took steps to assess the reliability of the Mint data we used, such as reviewing relevant documentation, and determined that the data were sufficiently reliable for the purposes of this report. We also interviewed Mint and Federal Reserve officials, and the same set of selected stakeholders noted above. To understand the rationale and steps Canada implemented for eliminating the Canadian penny, we reviewed documents from the Canadian Senate, Department of Finance, and the Royal Canadian Mint. To understand the results of the elimination of the Canadian penny, we interviewed an official from the Royal Canadian Mint. We also conducted a literature search of relevant English language articles published from 2011 to May 2018 to provide information on the rationale and potential benefit to governments of making changes to coins and notes, along with information about the experiences of other English-speaking countries that have made such changes. We conducted this performance audit from December 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, John W. Shumann (Assistant Director); Travis Thomson (Analyst-in-Charge); Amy Abramowitz; Lindsay Bach; Dave Hooper; Delwyn Jones; Malika Rice; Oliver Richard; Ardith Spence; and Elizabeth Wood made key contributions to this report.", "summary": "The U.S. spent about $1.3 billion in 2017 to produce, process, and circulate coins and paper notes for use in the economy. Since 2006, both the penny and nickel have cost more to make than their face value. Other countries have replaced notes with coins of the same value to reduce costs. Since 1990, GAO had estimated replacing the $1 note with a $1 coin would provide a benefit to the federal government. GAO was asked to examine the potential cost savings to the government from making changes to currency. This report (1) estimates the net benefit to the government, if any, of replacing the $1 note with a $1 coin and selected stakeholders' views on this change; and (2) examines what is known about potential cost savings from suspending penny production and changing the metal composition of the nickel, and selected stakeholders' views on these changes. GAO conducted economic simulations of continued use of $1 notes and replacing notes with $1 coins, examined cost data from the U.S. Mint, and interviewed officials from the Federal Reserve, U.S. Mint and Bureau of Engraving and Printing as well as 10 selected stakeholders representing industries that could potentially be affected by currency changes. GAO's analysis found that replacing the $1 note with a $1 coin would likely result in a net loss to the government over 30 years. GAO found the government would incur a loss of about $611 million if notes were actively replaced and about $2.6 billion if $1 notes were replaced gradually (see figure). These simulations represent the first time GAO has found that replacing the $1 note with a $1 coin would result in a net loss to the government rather than a net benefit. GAO's estimates are based on current data and economic projections, which have changed over time. For example, the lifespan of the $1 note has more than doubled since a 2011 GAO analysis, from 3.3 years to 7.9 years, largely due to changes in note processing technology. Stakeholders generally identified few benefits from replacing $1 notes with $1 coins. Seven of 10 stakeholders GAO met with said that replacing the $1 note with a $1 coin would result in additional costs. For example, armored carriers told GAO that their transportation costs would increase because coins weigh more than notes. The U.S. Mint estimates that it could save approximately $250 million over 10 years by suspending penny production and between $2 million and $9 million per year by changing the metal composition of the nickel. It also estimates that it could save about $74 million over 10 years by changing the metal composition of the dime and quarter. However, Federal Reserve officials and some stakeholders expressed concern about temporarily suspending the penny due to the potential for external effects, such as penny shortages. Stakeholders were unconcerned about changes to the nickel as long as the changes would not affect how the coin functioned, for example, in vending machines. Since Congress specifies in law which coins are made and their metal composition, the Mint has proposed legislation to enable the Secretary of the Treasury to change the metal content of coins as long as the weight or machine acceptance of the coins is unaffected. Without such authority, the Mint might not be producing coins as cost-effectively as possible. Congress should consider taking steps to authorize the Secretary of the Treasury to adjust the metal content of circulating coins.", "document_type": "gao"}
{"report": "The Director of National Intelligence serves as head of the IC and acts as the principal adviser to the President and National Security Council on intelligence matters related to national security. The IC is comprised of 17 executive branch agencies and organizations, generally referred to as IC elements. These IC elements include two independent agencies, eight elements within the Department of Defense, and seven elements across five other executive departments. Table 1 provides a list of the 17 IC elements. In its first National Intelligence Strategy, issued in 2005, ODNI highlighted the importance of a diverse talent pool to address the complex challenges the IC faced. In its most recent strategy released in 2019, ODNI reaffirmed and emphasized the IC’s commitment to developing and retaining a diverse workforce to address enduring and emerging mission requirements. The 2019 National Intelligence Strategy defines diversity as a collection of individual attributes that include, but are not limited to national origin, language, race, color, mental or physical disability, ethnicity, sex, age, religion, sexual orientation, gender identity or expression, socioeconomic status, veteran status, and family structure. The Intelligence Authorization Act for Fiscal Year 2004 directed the Director of Central Intelligence to develop a pilot project to test and evaluate alternative innovative methods to promote equality of employment opportunities in the IC for women, minorities, and individuals with diverse ethnic and cultural backgrounds, skills, language proficiency, and expertise. The first pilot was initiated at Trinity Washington University in Washington, D.C., with a 1 year contract totaling $250,000. The college developed and designed curricular components to align with IC mission skills sets and competencies and competitively selected students to participate in the college’s IC CAE Scholars Program. In the first year, the program sponsored nine students who were selected as IC CAE scholars. After the initial pilot year at Trinity Washington University, the pilot program was expanded to three additional colleges—Tennessee State University in Nashville, Tennessee; Florida International University in Miami, Florida; and Clark Atlanta University in Atlanta, Georgia. In 2005 ODNI, on behalf of the IC, established the IC CAE program. ODNI reported that by 2007, 65 scholars participated in the program from these four CAE colleges. By 2008, ODNI had expanded the pilot to six additional colleges. Overall, the 10 participating colleges increased the student population to 338 IC CAE scholars. During the 2008 to 2009 academic year, ODNI established a continuity strategy with the initial 10 IC CAE pilot colleges and the program continued to expand its academic outreach to additional colleges. In 2009, a total of 17 colleges were participating in the program and these colleges had arrangements with academic consortia that increased the total outreach to 31 colleges. During ODNI’s management of the program from 2005 through 2011, ODNI established general goals and oversaw the program’s implementation by defining and collecting performance measures on a range of IC CAE activities and working with a contractor to summarize this information in annual reports. We describe ODNI’s management of the program in more detail in appendix I. The Intelligence Authorization Act for Fiscal Year 2010 codified the IC CAE program to authorize the Director of National Intelligence to carry out grant programs to enhance the recruitment and retention of an ethnically and culturally diverse IC workforce with capabilities critical to the national security interests of the United States. In 2010, ODNI launched an Intelligence Community Efficiency Studies Initiative that included an examination of the size, structure, and functions of the ODNI. One recommendation was to consolidate and streamline the education and training programs in the IC by transferring the functions and responsibilities of the IC CAE program from ODNI to DIA. DIA began managing the program on October 1, 2011. The memorandum of understanding between ODNI and DIA implementing the decision of the transfer established that while DIA would manage the IC CAE program, ODNI would continue to provide periodic strategic guidance and regular budgetary oversight for program. Figure 1 shows various IC CAE program milestones, such as grant announcements and program transition dates, among other details. According to ODNI and DIA officials, program management and oversight of the IC CAE program is currently transitioning from DIA back to ODNI, following a DIA roles and mission review in 2018. According to ODNI and DIA officials, officials are working to complete the transition in fiscal year 2020 to enable ODNI to assume responsibility for the program. According to ODNI officials, as of April 2019, the transition plans were still in progress and ODNI was still in the planning stage of the transition. For example, officials noted they were drafting an implementation plan for the transition as well as a transfer memorandum to document the transfer. According to DIA officials, during this process, ODNI and DIA officials were also holding weekly coordination meetings and sharing program documents, such as college reports collected by DIA, and program guidance. ODNI officials also stated that in February 2019, they hired a contractor to conduct a study of the program prior to the final transition date. According to ODNI officials, the study, along with their interactions with DIA, will help ODNI determine how to manage the program, identify any challenges or successes of the program, and consolidate the data collected on the program to date. Officials expect the study to be completed by October 2019. The IC CAE Senior Advisory Board consists of representatives of the IC elements and key organizations that may include representatives from the National Intelligence University, a U.S. Combatant Command (rotating basis), and the Office of the Undersecretary of Defense for Intelligence. The board, which meets quarterly, was created to provide policy and guidance for the IC CAE program and ensure that participating IC elements are included in discussions of policy matters. As outlined in the board’s official charter and business rules, board members are responsible for attending board meetings, voting on issues before the board, evaluating colleges for grant funding, acting as points of contact for the program, and promoting the program as leverage to affect future IC missions. According to DIA officials, the board advises the IC CAE program manager on standards for the IC CAE program relating to college selection, strategies to foster collaboration, and other issues as needed. The IC CAE program awards grants to colleges on a competitive basis. IC CAE grants help colleges establish new intelligence-related programs and support existing programs at selected colleges. The grants can be issued for up to 5 years. From fiscal years 2004 through 2018, a total of 29 colleges have received 46 IC CAE grants. Of these 29 colleges, 13 have formed a consortium with one or more colleges to enhance collaboration with resources from other colleges in the same geographic area. The IC considers colleges with active grants as active IC CAE colleges, and those colleges that sustain the program after grant funding ends are called legacy colleges. Figure 2 shows the location of IC CAE colleges and which colleges led an academic consortium. See appendix II for additional details on the years that grants were awarded, grant funding amount, and a list of consortium colleges. Since 2011, DIA has issued grants for the IC CAE program through a process initiated by an announcement published online by the DIA grants officer. Grant announcements vary by year, but generally include guidelines for colleges to follow in completing their grant proposal. For example, the 2014 grant announcement listed eight program components a college’s proposal would be evaluated on, to include study abroad opportunities and annual colloquium or speaker series on intelligence and national security issues, along with other requirements such as cost program management and sustainment plans. Following submission, a grants officer reviews colleges’ grant proposals for technical and financial sufficiency. The IC CAE program office then reviews grant proposals for program sufficiency. From there, the IC CAE Senior Advisory Board’s Source Selection Board reviews applications deemed sufficient and makes a recommendation on which should be funded and at what funding level. The DIA CAE program office then forwards the selected proposals to a grant officer who notifies the college of the award. The grant announcements we reviewed may add specific program components as an area of focus for a specific year. For example, the 2019 grant announcement added a program component that required colleges submitting a proposal for a grant to offer courses or programs in three or more listed science, technology, engineering, and mathematics topics of interest to the IC. Examples of some other program components included in grant announcements since 2014 include the following: IC Curriculum. A key objective of the program is to strengthen academic programs in intelligence or national security in minority- serving, historically rural and under-resourced population colleges. Specifically, colleges shall explain how they plan to creatively expand, upgrade, enrich, or integrate undergraduate and graduate course offerings to better prepare students to perform work in intelligence or national security. Foreign Language. Colleges should demonstrate a capability to offer language study programs or courses in one or more specified languages of interest to the IC. Facilitate Student Participation in Academic Programs. IC CAE students shall be involved in the program and aware of the numerous benefits. Colleges are required to facilitate student participation in on- campus programs and activities such as workshops, seminars, and other off-campus activities such as national security or intelligence conferences, seminars, or workshops. Annual Colloquium. IC CAE colleges are required to hold annual colloquium or speaker series on intelligence or national security issues. These events should invite rural and under-resourced regional colleges and universities, government speakers, and industry partners with a primary goal of maximizing relationships and outreach. The colloquium should be at least 1 day in length, or a speaker series may include shorter presentations scheduled over weeks or months, which equates in the number of hours to a daylong colloquium. Program Management and Sustainment Plans. IC CAE colleges are required to have both program management and sustainment plans. The program management plan must detail the responsibilities of personnel to attain explicitly stated, measureable, and achievable program objectives. The sustainment plan must detail what the college will do during the grant period to build sustainability of the IC CAE program at that institution after the funding expires. The IC CAE program is especially interested in colleges with diverse populations of talent and in geographic diversity—specifically, Historically Black Colleges and Universities, Hispanic-Serving Institutions, Tribal Colleges and Universities, Asian American and Pacific Islander-Serving Institutions, and majority serving institutions with significant populations of minorities or women. The IC CAE program is also interested in majority serving institutions with significant populations of minorities and women that possess credentials in disciplines and specializations that meet IC core mission requirements. Figure 3 shows the minority designation of the 29 colleges receiving grants and figure 4 shows the minority designation of the 43 consortium colleges. See appendix II for a list of schools and their minority designations. As part of the IC CAE program, DIA also administers other programs that provide intelligence-related learning experiences to IC CAE students and to increase advanced capabilities in national defense. For example: IC CAE Professional Development Summit. These annual summits allow the IC to interact with the principal investigators—the individuals responsible for the IC CAE program at their respective colleges—to provide them with relevant and up-to-date information to support the creation and teaching of IC-centric curricula. According to DIA, the summit is intended to foster collaboration with the IC and college representatives by providing DIA with a platform to meet the needs of the IC. According to DIA, IC CAE Senior Advisory Board members are an integral part of the summit and provide context and perspective from the agencies they represent. National Security and Analysis Intelligence Summer Seminar. This 2-week seminar is designed to provide IC CAE students with knowledge about the intelligence career field in general, and analytic tradecraft in particular. The seminar is intended to provide students from across the IC CAE colleges an opportunity to engage directly with intelligence professionals in both seminar learning and scenario- based simulation training, focusing on threats to the U.S. homeland by extremist terrorists. According to DIA officials, the seminar is only open to a limited number of IC CAE students from active and legacy colleges. For example, two sessions were held during 2017 and a total of 80 students were competitively selected by their respective colleges to attend. According to ODNI officials, the summer seminar also holds a career fair and provides mentoring opportunities for the participating students so that those interested in an IC career have an opportunity to interact with recruiters. IC CAE Summer Internship. In the summer of 2017, the IC CAE program held its first IC CAE summer internship program. According to DIA officials, rather than establish a new IC CAE internship program, DIA leveraged the IC elements’ existing internship programs and tracked IC CAE student participation in these programs. The IC CAE internship offers IC CAE students additional opportunities, such as an opening and closing ceremony for the internship, an IC career fair at the National Security and Analysis Intelligence Summer Seminar event, and IC mentors upon request. DIA identified a total of 141 IC interns from colleges that had an IC CAE program in 2017 and 2018. However, according to ODNI officials, not all IC interns identified participated in their school’s IC CAE program. The internship opportunities among the IC elements vary. For example, according to FBI officials, their internship program is a primary pipeline for entry-level positions and, in 2017, they had 1,200 interns with 300 hired into entry-level positions. According to DIA data, the FBI identified 31 IC CAE scholars in its 2017 internship program and 21 scholars in 2018. According to Department of State’s Bureau of Intelligence and Research officials, their office has approximately 15 to 20 summer interns each year. According to Department of State officials, two of their interns were IC CAE scholars since the program began in 2017. While DIA has continued to implement the IC CAE program by issuing grants to colleges, DIA has not sufficiently planned or overseen the program since the transition from ODNI in 2011. Specifically, we found that DIA did not fully implement five of the six key practices of sound planning that we have identified in our prior work. While DIA continued the program’s mission to increase the pool of diverse applicants for the IC, it lacked results-oriented goals, an overall strategy for the program, an evaluation of external factors, performance measures, and a plan to assess the program’s performance in order to determine the appropriateness of the goals and effectiveness of implemented strategies. Our assessment of the extent to which DIA incorporated these key practices of sound strategic management planning into the IC CAE program is reflected in table 2. DIA annual reports for the IC CAE program and IC CAE grant announcements emphasize that the overall mission of the program is to increase the pool of diverse applicants for the IC. DIA’s annual reports describe the program’s mission as developing national security and intelligence education programs in order to increase the pool of culturally, geographically, and ethnically diverse, multidisciplinary job applicants who possess highly desired skills and competencies in areas of critical need to the IC. This mission statement is also contained in IC CAE grant funding opportunity announcements for 2014, 2017, 2018, and 2019, which also refer to broader IC human capital and diversity guidance. For example, one goal from the IC’s Equal Employment Opportunity and Diversity Enterprise Strategy (2015-2020) is to recruit from groups with lower than expected participation rates and diverse candidates who will meet the IC’s current and future mission requirements. Since 2011, DIA has not established results-oriented goals for the IC CAE program or an overall strategy that details the agency resources and processes that are required to achieve the program’s mission. First, DIA failed to document specific policy, programmatic, or management goals for the IC CAE program. DIA developed a business plan for the program in 2011; however, this plan describes short-term goals for program management, outreach, and education and most of these goals were intended to be complete by mid-2012. DIA’s documentation does not indicate whether these goals were achieved or whether DIA continued to use the goals to guide the program after 2012. Current DIA internal guidance states that the IC CAE program office carries out the program’s mission by providing grants to colleges to support the establishment of intelligence-centric curricula. However, this guidance fails to provide results-oriented goals that are defined in measurable terms to guide the program. For example: DIA has not described the number of potential IC employees it expects to be able to educate or make aware of IC careers by supporting intelligence programs at IC CAE colleges. This could include specific goals for targeting underrepresented populations within the IC, such as women and minorities. According to several IC element officials, IC elements use the percentage of women and minorities in the U.S. civilian labor force as a target for their own diversity recruitment efforts. However, DIA has not developed any results-oriented goals that include specific targets or milestones for recruiting potential IC employees who have participated in the IC CAE program. In addition, DIA has not developed specific goals for the program that identify how to prioritize among program requirements contained in IC CAE grant announcements . Specifically, it is not clear from IC CAE program documentation how gender and ethnic diversity is prioritized relative to other IC needs, such as the IC’s long-standing need for technical and language skills. For example, IC CAE grant announcements state a general goal of increasing the pool of qualified women and racial and ethnic minorities to the IC. At the same time, IC CAE grants have supported training in science, technology, engineering, and math, and critical languages, but DIA has not established specific targets or milestones that would allow it to track the program’s development of a diverse pool of applicants with the skills that the IC requires. Second, while DIA has developed some plans and continues to award grants for the IC CAE program, we found that DIA has not documented an overall strategy that details the agency resources and processes required to achieve the program’s mission. In 2016, DIA officials stated they began developing a document outlining the general structure of the IC CAE program, but as of May 2019, the document has not been issued. DIA has also documented its standard operating procedures for monitoring colleges’ implementation of grants in part to ensure that all programmatic goals are met, but it is not a strategic document that describes processes for achieving the program’s mission or goals. Further, DIA continues to award IC CAE grants to colleges based on program components or criteria that have changed over time, but these changes are not clearly linked to an overall program strategy. For example, in 2014, DIA added the diversity of a college’s student population as one of the criteria it used to select grant proposals. Colleges with a minority-serving designation or with a student population that is more than 75 percent ethnically and culturally diverse are given an excellent rating, while colleges with a student population that is less than 25 percent diverse are given a poor rating. In 2017, DIA then added criteria requiring colleges to be part of a consortium in a manner that promotes diversity. These two diversity criteria have been given more weight than all other criteria since 2017, while previous announcements gave greater weight to the development of national security curricula. This change in approach may align with the program’s overall mission to increase diversity in the IC, but DIA has not outlined an overall strategy that explains how such changes to the grant selection criteria would achieve a results-oriented goal like increasing the number of minority applicants to the IC. Two interconnected sound planning practices are to establish results- oriented goals and strategies to achieve those goals. These goals should be documented in measurable terms that are focused on results so that the agency can determine how it will achieve its mission. Once goals are established, strategies explain how these goals would be achieved. Since assuming responsibility for the program in 2011, DIA officials stated that their focus for managing the IC CAE program has been tactical, focusing on tasks like awarding, executing, and monitoring grants to IC CAE colleges, rather than strategic planning. In addition, DIA officials highlighted staff turnover as a challenge to managing the program and stated DIA has had five IC CAE program directors in its 8 years of program management. DIA officials stated that DIA has received little guidance about the goals of the IC CAE program from ODNI, and they instead rely on the IC CAE Senior Advisory Board to define goals and strategies that reflect the needs of IC elements. DIA officials stated that their only source of guidance from ODNI for the IC CAE program was the 2011 memorandum of understanding between DIA and ODNI, which DIA officials characterized as being high level and lacking specificity. DIA officials also said that they do not have the authority to create a strategic recruitment plan or set recruiting targets for the IC. The board only meets quarterly to advise the IC CAE program office on standards and strategies and board members occasionally review grant proposals. The IC CAE program managers are responsible for the program, and therefore, defining and documenting its goals and strategies. As the IC CAE program transitions back to ODNI, ODNI will not be able to determine whether the program is meeting the diversity goals of the 2019 National Intelligence Strategy without results-oriented goals for the program and a documented strategy showing how those goals are to be achieved. DIA has identified external factors that could affect the IC CAE program’s success, such as program branding and the ability of colleges to sustain the program after the grant period ends, but has not developed a process to fully evaluate them. One example of an external factor that could affect the IC CAE program’s success is the fact that not all students are aware of their participation in an IC CAE program. Colleges participating in the IC CAE program have not always featured participation in the program prominently, based on our analysis of selected websites, which are often managed by an academic department or institute. This can limit the visibility of the program and the IC’s support of it for both current and potential students. Since at least 2014, DIA has required colleges to demonstrate how they plan to promote their program as an IC CAE program to ensure that students, faculty, and administrators are aware of it. Colleges are also required to feature up-to-date program information on the college’s website. However, in November 2018, a DIA official noted that some colleges continue to use the IC CAE brand without oversight and accountability to provide intelligence-related courses. According to officials from selected IC CAE colleges and IC elements, students graduating from these programs are not always aware that they have participated in an IC CAE program. One college official stated that the certificates or degrees do not necessarily indicate that the student graduated from an IC CAE program. Another college official stated the college needs to directly inform students who apply to the program that they are participating in an IC CAE program. NGA and NSA officials stated that some employees at their agencies first became aware there was an IC CAE program at their college after being informed directly by their respective agency. While DIA requires that colleges develop marketing plans, it does not have a process to evaluate external factors such as the long-term effect of colleges’ efforts to advertise their programs’ connection with the IC CAE program. Without adequately advertising IC CAE programs, IC CAE colleges may not be able to recruit a strong pool of qualified students with the skills that the IC requires. Another example of external factors that could affect program success is the ability of colleges to sustain their IC CAE program. The intent of the IC CAE program has been to enable colleges to continue the program beyond the end of the grant period and maintain a continuous talent pool for the IC. However, DIA has not fully evaluated the challenges colleges may encounter if they are not able to secure continuous funding for the IC CAE program. When DIA awards grants, colleges are awarded a base year of funding and renewable up to 4 additional option years. It may take time for a college to develop intelligence-related courses and have students graduate from the IC CAE program. Colleges then need to apply for another grant in order to continue to receive federal funding following expiration of any additional option years. Since 2011, colleges have been required to demonstrate a plan to sustain their programs after the initial grant period ends. However, according to some IC CAE college officials, it is nonetheless difficult to continue the program and secure external funding once the grant is over. Some college officials have also said that the loss of grant funding can result in colleges discontinuing key aspects of the IC CAE program and can limit consortium college participation in activities. We have also observed that some colleges may have suspended their programs entirely. Specifically: Colleges may be able to sustain some, but not all components of their program once grant funding ends. For example, one college has sustained an IC CAE program since 2005 even though the college did not receive grant funding from 2008 through 2012. According to college officials, loss of grant funding resulted in the college suspending professional development activities. The program received additional IC CAE grants in 2012 and in 2017 and college officials stated they hold professional development workshops and one-on-one mentoring sessions between students and representatives from IC elements. Without grant funding, consortium colleges may not have funding for student travel to IC CAE events. Consortium colleges face a specific challenge since many of the IC CAE events are hosted by the lead IC CAE college. We spoke with faculty at two consortium colleges who said that grant funding from the program helps reduce the cost of their students’ travel to off-campus IC CAE events, such as annual colloquiums at the lead college that are attended by subject matter experts from IC elements. The distance students may need to travel can be especially challenging for colleges that are not located near the lead college, including one community college that is 400 miles away from the lead consortium college according to an IC CAE college official. DIA identifies some programs as legacy colleges, but some colleges have not updated their IC CAE program websites. For example, we reviewed the IC CAE program websites for two colleges that had received a grant from DIA after 2012, but the colleges had stopped updating their websites in 2014 and 2016. DIA has identified sustainment of the IC CAE program following termination of grant funding at colleges as a significant challenge. At a recent meeting with the IC CAE Program’s Senior Advisory Board, the head of DIA’s program office stated that the sustainment of IC CAE programs after federal funding ends tended to be a systematic failure, especially for many smaller colleges that may lack the resources of larger colleges, and that there have been no consequences for failure. While DIA acknowledges this problem, it does not have a process to systematically evaluate this issue or consider alternative approaches for colleges that may need additional support to maintain relevant curricula or professional development activities. For example, DIA has not evaluated whether some colleges’ difficulty with sustaining their IC CAE program may invalidate underlying assumptions about how the program is structured, including whether awarding grants to colleges to develop and maintain an intelligence-focused curriculum is the most effective means of establishing long-term relationships with those colleges and fostering a diverse talent pool for the IC. A key practice of sound planning is to fully evaluate key factors external to the organization that are beyond its control. IC CAE colleges decide how to brand the program as well as how to allocate resources in order to sustain their IC CAE program. These decisions could significantly affect the achievement of the IC CAE program’s mission and goals. Both ODNI and DIA officials are aware of some external factors that could affect the success of the IC CAE program, such as branding and program sustainment. As of March 2019, ODNI officials have stated that they are developing plans to address branding and sustainment as the program transitions to ODNI. DIA drafted a plan for post-grant requirements for colleges in order to maintain their IC CAE designation, though this draft plan does not address the sustainment challenges that may make it difficult for those colleges to follow these additional requirements. However, DIA internal guidance and the most recent Senior Advisory Board charter do not outline a process to identify and continuously evaluate external factors that could affect program performance. As the new program manager, ODNI may be unable to assess whether factors like program branding or sustainment might affect the IC CAE program’s implementation and potential for success without a process in place to evaluate the effect of these and other potential external factors. DIA lacks comprehensive performance measures for the IC CAE program that would allow DIA to measure program success. Specifically, DIA has not (1) clearly and consistently defined performance measures to be reported and collected, (2) collected on or reported complete information on the program, and (3) determined whether data collected may be incomplete or unreliable due to reporting challenges. DIA has not clearly and consistently defined the performance measures that need to be reported by the colleges in order to determine the IC CAE program’s success. DIA required colleges to provide reports on significant accomplishments related to the objectives in their grant proposals. However, we reviewed final grant reports that colleges submitted to DIA from 2014 to 2018 that revealed differences in how colleges reported measures. For example: Two colleges reported that a total of 664 students received an IC CAE certificate, 99 completed an internship, and 128 received a conditional offer of employment between 2012 and 2017. However, the report did not indicate whether these offers of employment were from IC elements or the number actually hired. A legacy college reported that 49 students received a conditional offer of employment or were hired by an IC element, but it did not indicate the total number of program participants. The final report from a legacy college that had an IC CAE program from 2013 to 2015 reported the total number of internships, but it did not report conditional offers of employment or total program participation. In 2017, DIA revised the reporting template for colleges to require progress on the goals and objectives in the approved grant proposal. However, the information colleges provided varies because DIA’s performance measures are not clearly stated so that colleges can report them consistently, and they are not scoped to evaluate specific program outcomes. For example, IC CAE programs are required to report their progress in developing critical language studies, but there is no minimum requirement on the type of information that a college should report in the updated template. Comparing the reporting template for two colleges from 2018, one college’s narrative provided a high level overview of its foreign language options at the college and reported that IC CAE scholars will be encouraged to participate in the language courses, whereas another college’s narrative provided details on the number of students participating in the foreign language program and details on stipends provided to students who studied abroad. DIA’s updated reporting template also required IC CAE colleges to report the aggregated totals of IC CAE participants, conditional offers of employment, internships, and hires into the IC. However, some colleges track different types of information for these metrics. For example, the way colleges count student participants in the IC CAE program varies. Some colleges only track students enrolled in the IC CAE certificate or degree program, while other colleges report much larger totals of participants, including those who are not enrolled in an IC CAE certificate or degree program but may participate in some IC CAE events. In addition, DIA’s updated reporting template did not clearly describe the hiring data that colleges are required to report. For example, colleges are required to report the total number of conditional offers that IC CAE scholars receive, but it does not specify whether this number is for all employers or just IC elements. Furthermore, it is not clear whether students that received a conditional job offer in one semester are being reported again as a hire in the following semester. Without clearly defined performance measures, decision makers may not be able to clearly identify the accomplishments of the program among the various participating colleges. DIA is responsible for reporting on the IC CAE program’s performance to ODNI, but DIA has not collected complete performance measures that cover the entire program and has not reported a complete summary of the performance measures it has collected. Since 2011, the DIA program office has collected some information from IC CAE colleges in order to monitor compliance with the colleges’ grant proposals. This information was reported by IC CAE colleges in their interim and final reports that include narrative descriptions of IC CAE program activities and descriptive data about program participants. However, DIA has not collected complete information that captured relevant performance measures for the IC CAE program. For example, between 2011 and 2016, DIA officials stated colleges provided DIA a spreadsheet of information on IC CAE program activities, including descriptions of IC CAE courses and events, study abroad program participation, IC element interaction, and information about individual IC CAE scholars. However, the data provided by the colleges varied. For example, based on a review of spreadsheets that DIA provided from the fall of 2014, some colleges provided details on IC CAE sponsored events, IC element interaction, and student employment, while other colleges did not provide any information in these areas. We also found that colleges summarized this information in their final grant. DIA’s annual reports to ODNI from 2012 to 2017 reported little of the information that DIA collected over this time period. The annual reports described financial data and provided some description of select college activities, but they did not summarize information related to any of the program’s core requirements such as curriculum development, critical language study, or professional development. For example, DIA has not collected or reported data on the number of IC CAE scholars who have studied a critical language from 2012 to 2017. The reports also did not include the total number of IC internships, conditional job offers, or hires after 2012. Moreover, college officials stated they do not report on performance measures after the grant period ends, which may limit DIA’s ability to provide comprehensive data for both active grant colleges and legacy colleges each year. DIA officials stated that legacy IC CAE colleges that have sustained the program but no longer receive a federal grant are not obligated to provide reports to DIA. According to DIA officials, DIA is currently developing a plan that would require colleges to report information in order to maintain their IC CAE designation after the grant period ends. For example, a college official from a legacy program that first received a grant in 2006 stated that the college no longer shares information with DIA because DIA had not requested it do so after the grant ended. The official noted that the college is no longer receiving support to facilitate IC recruitment of its students. DIA officials stated they have relied on colleges rather than the IC elements themselves to report data on IC CAE scholars. DIA informs colleges through its reporting template that data on internships, conditional job offers, and hires into the IC are definitive evidence of the success and sustainability of a college’s IC CAE program. However, due to challenges with collecting these data, the information being provided to DIA by the colleges may be incomplete and unreliable. While DIA has not reported on the total number of IC CAE scholars that have been hired from 2012 to 2017, it has collected some information from IC CAE colleges. For example, three colleges from our sample reported that a total of 23 IC CAE scholars were hired by the IC between the beginning of the fall semester of 2017 and the end of the fall semester in 2018. However, according to officials at these colleges, it is difficult to provide complete data on students’ employment as they no longer have direct contact with students after they graduate and some IC elements discourage applicants from discussing their employment offers with others. As a result, the information the colleges report to DIA may be incomplete because they are not able to track all the students who have graduated from the IC CAE program. ODNI also reported similar challenges when it managed the program from 2005 through 2011. ODNI reported a total of 61 IC CAE scholars were hired into the IC between 2005 and 2011 based on IC CAE college data, but noted that the hiring data from IC elements was higher than the total reported by colleges. Further, IC elements have noted that there are security risks associated with tracking the number of IC CAE scholars that receive a conditional offer of employment or have been hired into the IC. At the February 2019 IC CAE professional development summit, for example, Senior Advisory Board members from the CIA and the FBI advised IC CAE colleges that storing or sharing information about potential IC applicants on unsecured college systems is a security risk. Some IC element officials have suggested that the best way to track applicants would be to obtain a list of IC CAE scholars from the colleges and match the names against IC element applicants. However, according to officials, the IC elements would need an individual’s full legal name and college, and some IC CAE college officials raised privacy concerns with sharing student information. An IC CAE college official stated that even during the grant period, the college only provided DIA aggregated totals on student data because of privacy concerns. DIA and ODNI have collected some data on the number of applicants from IC CAE colleges and new hires from the IC elements, but they have only recently done so in a systematic manner. Officials from DIA’s IC CAE program office said they cannot force IC elements to report employment information and that the burden is on the IC elements to track and report that data. According to ODNI officials, in response to a provision in the Intelligence Authorization Act for Fiscal Year 2017, ODNI sent out a request to IC elements for data on hiring and demographic information that included questions about the number of IC CAE graduates hired by the IC. As of April 2019, officials stated that they have collected hiring and demographic information from six of the largest IC elements that includes data about the number of IC CAE graduates hired by the IC. The officials said they expect this to be a large enough sample to report in June 2019. However, according to ODNI officials, ODNI has not yet determined how it will define performance measures for the IC CAE program or how it will continue to collect and report these performance measures. A key practice of sound planning requires the development of a set of performance measures that will be applied to gauge progress toward attainment of the plan’s goals. We have also established that key attributes of successful performance measures, which include measures that cover core program activities, are that they are clearly defined and consistent and can be reliably produced. Furthermore, Standards for Internal Control in the Federal Government state that management should use relevant data from reliable sources; process this data into high-quality information that is complete, accurate, and valid; and communicate high-quality information to all levels of the department. Comprehensive performance measures would allow DIA to gauge the success of the IC CAE program in developing a pool of diverse talent with skills needed in the IC, but DIA has not defined performance measures in program guidance and documentation. In its 2012 annual report, DIA stated that it intended to redesign ODNI’s data collection tool in order to simplify reporting. However, DIA did not report data collected with this tool and stopped collecting these data altogether in 2016 after informing IC CAE colleges that the collection effort required a lengthy approval process from the Office of Management and Budget. DIA officials continued to require colleges to report performance measures after 2016 through a reporting template. In April 2019 DIA officials stated that they intended to make improvements to this template given that the way colleges have tracked student participation has varied. However, DIA did not clearly and consistently define performance measures for all aspects of the program, process them via a data system or spreadsheet, or report them to ODNI. As the new IC CAE program manager, ODNI will not be able to gauge the success of the IC CAE program in achieving its mission without defining, collecting, and reporting on comprehensive performance measures. Since 2012, DIA has not conducted a comprehensive assessment of the IC CAE program. According to a 2013 amendment to the memorandum of understanding with ODNI, DIA was responsible for providing ODNI with an annual review of the program’s performance and including possible outcomes, such as specific benefits to the IC. ODNI was responsible for evaluating this information to ensure the appropriate and efficient expenditure of IC resources and performance improvement. However, DIA’s annual reports to ODNI from 2012 to 2017 did not comprehensively assess the program’s performance or the extent to which the program had achieved its mission. These reports only provide a few details about IC CAE program activities and summarize grant expenditures. For example, the 2016 annual report for the IC CAE program provided information on the number of grants awarded, a list of IC CAE colleges participating in the program, funding and execution data, and a sample of IC CAE program events from three colleges. However, the report did not provide complete details on the status of the program at each IC CAE college, such as a summary of the performance metrics it had collected from all of the colleges with an active grant. DIA officials said that they only included the information in annual reports that ODNI requested in the memorandum of understanding and lacked resources to provide a comprehensive assessment. However, the memorandum of understanding requires DIA to provide an annual review of the IC CAE program’s performance to possibly include outcomes such as the number of students who completed IC CAE coursework and specific benefits to the IC. As ODNI officials work with DIA to transition the IC CAE program back to ODNI, ODNI officials began working with the MITRE Corporation in February 2019 to evaluate the IC CAE program. ODNI officials said they will rely on MITRE’s findings and their own interactions with IC CAE colleges to determine how to manage the program. Officials stated they expect the evaluation to be complete by October 2019. However, ODNI has not yet developed a plan to conduct continuous and comprehensive assessments of the IC CAE program. A key practice of sound strategic planning is the use of assessments, through objective measurement and systematic analysis. For example, an evaluation plan can assist an agency in determining the appropriateness of a program’s goals, the effectiveness of implemented strategies, and the potential need for corrective action. The memorandum of understanding between DIA and ODNI in 2011 and amended in 2013, designated performance reporting as a DIA responsibility, but DIA did not identify performance assessment as a responsibility in program guidance. The IC CAE program office’s standard operating procedures provide that the grant officer’s representative monitors an IC CAE college’s compliance with its grant assistance agreement and collects performance and financial data reports. However, there is no mention of a systematic, outcomes-based assessment of these reports or the program as a whole. Without such assessments, the IC will not be able to determine whether the IC CAE program is effectively increasing the pool of diverse applicants. Congress will also be unable to determine the return on investment in this long-standing program. IC elements participate in the IC CAE program in a variety of ways, including by attending IC CAE college workshops and recruitment events and participating in the annual IC CAE program meeting, among other events. Table 3 shows the varying levels of participation in the IC CAE program among the eight selected IC elements, as reported by IC element officials. IC elements’ participation in the IC CAE program varies according to the specific organizational needs of each IC element. Some IC elements do not participate actively in the program because they do not directly hire employees into their intelligence office or because they conduct only limited hiring. For example, according to officials from the Department of Energy’s Office of Intelligence and Counterintelligence, the office is small and hiring is therefore limited. Further, officials stated the office often hires specialized personnel with advanced degrees and would not hire IC CAE scholars from undergraduate programs. Similarly, State Department officials from the Bureau of Intelligence and Research stated that they do not participate in events since they do not have direct hiring authority. Further, these officials stated that the State Department’s participation in IC CAE events is also constrained by limited personnel and financial resources. Other IC elements, such as the CIA and the NSA, have developed separate relationships with colleges and programs to address their specific hiring needs. CIA. The CIA has reduced its involvement with the IC CAE program to better align its needs according to CIA officials. In 2009, CIA selected senior officers to serve as advisors to 16 IC CAE colleges. The CIA advisors were directed to make a minimum of two visits per year and conducted a wide range of activities to include presenting at colleges events, counseling IC CAE scholars, and discussing CIA and IC career opportunities. However, about a third of the advisors were pulled back because, according to CIA officials, the IC CAE colleges were not meeting hiring expectations. Since 2014, CIA has focused its efforts on only six of the IC CAE colleges based on the return on investment from these colleges and alignment with CIA hiring needs. In addition, according to CIA officials, CIA has designated five universities as signature colleges to recruit skilled applicants from a range of cultures and backgrounds. According to CIA officials, the signature college program targets large, diverse colleges where the CIA has received a significant number of applications. Its criteria for selection of signature colleges include high diversity, the size of the college, and potential for developing a deep relationship. Two of the five CIA signature colleges are also in the IC CAE program and are currently receiving or have received grant funding. NSA. According to NSA officials, NSA has been involved in the IC CAE program since its inception, and its involvement includes participating in a variety of events such as colloquium, summer seminars, and recruitment events. In addition, NSA has also sponsored two types of Centers of Academic Excellence, one for cyber defense and one for cyber operations. The goal of these programs is to develop technical skills by promoting higher education and research in cyber defense and producing professionals with cyber defense expertise. In addition, the programs also aim to broaden the pool of skilled workers capable of supporting a cyber-secure nation. The programs involve awarding a designation as a Center of Academic Excellence in Cyber Defense or Cyber Operations to U.S. universities based on criteria. No funding is provided to the U.S. universities. According to NSA officials, these programs are independent of the IC CAE program and have different goals from the IC CAE program. Officials stated NSA’s CAE programs are focused specifically on increasing the pipeline of cyber talent. Further, some IC elements’ recruitment strategies incorporate the IC CAE program as part of their strategy, but it is not the only aspect of the elements’ approach to recruiting. For example, according to NGA’s Campus Recruitment Strategy, the agency targets high-quality colleges that provide access to diverse applicants in high-quality, mission-aligned degree programs across a broader geographic reach. The strategy has 31 designated colleges that were selected based on a variety of criteria, including demographic diversity and academic programs that align with the agency’s mission areas. According to NGA officials, they continue to recruit from at least seven IC CAE colleges; however, being an IC CAE college was not part of the primary selection criteria for colleges in NGA’s campus recruitment strategy. As program manager, DIA has relied on the IC CAE Senior Advisory Board and its charter as a means to engage IC elements in the program. However, not all IC elements participate on the Senior Advisory Board or in the IC CAE program. For example, in the November 2017 board meeting, only 9 of the 17 elements attended the meeting and a quorum was not established. Without a quorum, votes held during a meeting are not valid and actions cannot be approved. Moreover, during board meetings, members have raised concerns about limited attendance, citing concerns that only about half of the members regularly attend. According to some IC element officials, they do not attend IC CAE program events, including the Senior Advisory Board meetings, because the program does not meet their IC element’s organizational needs. For example, as discussed above, some IC elements have developed separate relationships with colleges not in the IC CAE program. Further, as discussed above, some IC elements have developed separate relationships with colleges and programs to address their specific hiring needs. As a result, some IC element officials have stated they have intentionally reduced their recruitment at some IC CAE colleges. Since not all IC elements participate in the IC CAE program or attend the board meetings, DIA has had to conduct other outreach to engage IC elements. According to DIA officials, since 2017 the IC CAE program office has conducted additional ad hoc outreach to engage with IC elements. For example, DIA officials have stated the IC CAE program office has utilized ODNI forums, such as the IC Recruitment Council and IC Chief Human Capital Office Council to engage with IC elements on the IC CAE program. However, DIA officials also stated that not all IC elements attend these ODNI council meetings because different offices within the IC elements are responsible for attending the meetings. Some IC elements are set up differently with regard to which office within the IC element participates in the IC Recruitment Council, so the IC element representatives to the IC CAE Board can differ from those who attend the IC Recruitment Council. While these ad hoc outreach efforts are likely a positive step to improving coordination, there remains a lack of engagement by all IC elements. Standards for Internal Control in the Federal Government state that management should establish and operate monitoring activities, to include a determination of when to revise the program baseline to address program needs. Further, the standards state that management should evaluate and document the results of ongoing monitoring and separate evaluations to identify issues. As program manager, DIA has not established a process for monitoring and assessing IC elements’ participation in the IC CAE program, and the board’s charter does not describe such a process. As result, DIA does not fully understand the reasons for the lack of engagement on the part of IC elements. IC elements that do not attend board meetings are not engaged in the discussions and decisions being made about the program. Similarly, IC elements that do not participate actively in the program have limited contact and interaction with IC CAE colleges, which has hampered the effectiveness of the IC CAE program. Without a process for monitoring and assessing IC elements’ participation in the IC CAE program, ODNI will not be able to tailor the program to meet the needs of the IC and address the overall program goal of creating a diverse pool of applicants for the IC. Assessing and addressing IC elements’ reasons for not participating in the program would increase ODNI’s understanding of the factors that inhibit participation and inform an approach to mitigating these factors and achieving program goals. The IC CAE program is a collaborative effort that allows IC elements to participate at college events, such as colloquia, speaker series, and campus recruitment events. The IC CAE Senior Advisory Board was created to provide policy and guidance for the IC CAE program and ensure that participating IC elements are included in decisions related to policy matters. The board’s charter states the Senior Advisory Board members are responsible for attending board meetings, voting on issues before the board, acting as points of contact for the program, and promoting the program. However, the charter does not define the expected or required level of participation of IC elements at IC CAE colleges. The IC CAE program manager, DIA, has communicated the schedule of IC CAE college events during Senior Advisory Board meetings and also asked for IC elements to participate in various events. Through the IC CAE grant process, IC CAE colleges are required to host a variety of events to educate IC CAE colleges about the IC. Based on the IC CAE grant announcements, these events are predicated on IC element participation. Specifically, recruitment fairs at colleges are facilitated by IC elements and IC element officials are speakers at colloquia events, with a primary goal of maximizing relationships and outreach. However, some colleges have experienced challenges with engaging with IC elements to attend these events. For example: An official from a legacy IC CAE college noted that it has been difficult to get IC elements to attend college events or recruit from the college. The official stated that IC element participation has been ad hoc and based on personal relationships with the IC elements rather than assistance from the IC CAE program office. For example, the official noted that at recent events the college was only able to attract 8 IC elements to a recruiting event compared to the 20 representatives across 12 IC elements who attended the events in the past. An official from an active IC CAE college also noted that some IC elements are not well informed about the IC CAE program. For example, the official noted that the college would like more IC elements to attend IC CAE college events. However, the official stated that the responsibility of developing relationships with IC elements has been placed on the college. According to the official, the IC elements should be more aware of which colleges have IC CAE programs and should be the first stop for IC element recruitment. The official also stated IC CAE colleges would like the IC element to drive the relationships with colleges. Our leading collaboration practices include (1) having participating agencies clarify roles and responsibilities and (2) ensuring that participating agencies document how they are collaborating in a written agreement and develop ways to continuously update and monitor these agreements. Roles and responsibilities can be defined through laws, policies, memorandums of understanding, or other requirements. The IC has defined the mission for the IC CAE program, but the current program manager, DIA, has not clarified IC element roles and responsibilities for program participation and the Senior Advisory Board charter does not clarify what is expected of the IC elements regarding participation at IC CAE events. According to DIA officials currently managing the program, the Senior Advisory Board charter is the key to getting IC element participation in the program and overall program success. An update to the Senior Advisory Board charter could include all relevant participants and define roles and responsibilities. Without clearly defined roles and responsibilities, the IC elements are not taking full advantage of what the IC CAE program has to offer, including participation in events and college engagement. Thus, the IC CAE colleges will not be able to fully execute their IC CAE programs and the program may not be able to meet its goal of creating a pool of diverse applicants for the IC. In 2005, ODNI established the IC CAE program with a goal of creating an increased pool of culturally and ethnically diverse, multi-disciplinary job applicants for the IC. However, the current program manager, DIA, has not sufficiently planned and overseen the program and the IC is unable to determine whether the program has been successful in meeting its goal to create an increased pool of culturally and ethnically diverse job applicants for the IC. Specifically, DIA has not developed results-oriented goals or documented an overall strategy for the program, evaluated external factors that could significantly affect the program’s success, defined and collected comprehensive metrics, or conducted an assessment of the program’s performance. As ODNI takes over the program, it needs to address these sound planning practices in order to determine whether the program is being implemented successfully and to help ensure the IC has a trusted, diverse workforce with the right expertise. Further, without sufficient planning and oversight, decision makers will also be unable to determine the return on investment in this long-standing program. In addition, ODNI also needs to improve IC element participation in the program. The IC CAE program is a collaborative effort that encourages participation among all IC elements. However, DIA has not established a process to monitor and assess IC element participation in the program or clearly defined IC elements roles and responsibilities for the IC CAE program. A process for monitoring and assessing IC element participation and addressing IC elements’ reasons for not participating in the program will increase understanding of the factors that inhibit participation and inform ODNI’s approach to mitigating these factors and achieving its goal for the program. Further, without clearly defined roles for IC element participation in the program, IC CAE colleges may not be most effectively executing their IC CAE programs and the program overall may not be able to meet its goals. We are making the following seven recommendations to the Director of National Intelligence as the IC CAE program transitions to ODNI: The Director of National Intelligence should establish and document results-oriented goals that include specific targets or milestones for the IC CAE program. (Recommendation 1) The Director of National Intelligence should establish and document strategies to achieve the results-oriented goals that are established for the IC CAE program. (Recommendation 2) The Director of National Intelligence should develop and document a process to identify and continuously evaluate external factors that could affect the program’s ability to achieve identified goals. This should include, but not be limited to, a consideration of program branding and post-grant sustainment. (Recommendation 3) The Director of National Intelligence should define and document comprehensive performance measures for the IC CAE program, collect and evaluate the completeness and reliability of information it receives from grant recipients and IC elements, and report this information on a regular basis. (Recommendation 4) The Director of National Intelligence should establish a requirement for and develop a plan to periodically evaluate the IC CAE program’s performance through objective measurement and systematic analysis. (Recommendation 5) The Director of National Intelligence should develop a process for assessing why some IC elements are not participating in the IC CAE program and address these reasons in order to ensure the program is structured to meet the needs of IC elements. (Recommendation 6) The Director of National Intelligence should clearly define IC elements’ roles and responsibilities for participation in the IC CAE program to better facilitate interagency collaboration in support of the program. (Recommendation 7) We provided a draft of this report to ODNI for review and comment. In written comments, ODNI concurred with all seven of our recommendations but did not identify the steps it plans to take to address the recommendations as the IC CAE program transitions to ODNI. ODNI’s comments are reprinted in their entirety in appendix III. ODNI also provided technical comments, which we incorporated as appropriate. We also provided a draft of this report to the CIA, Department of Defense, DIA, FBI, NGA, NRO, NSA, the Department of State’s Bureau of Intelligence and Research, and the Department of Energy’s Office of Intelligence and Counterintelligence for review and comment. These agencies concurred without providing comments on the draft report. NGA provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees. We are also sending copies to the Secretaries of Defense, Energy, and State; the Directors of National Intelligence, DIA, CIA, NGA, NRO, and NSA; and the Attorney General. In addition, this report will be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact Brian M. Mazanec at (202) 512-5130 or mazanecb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The Office of the Director of National Intelligence (ODNI) was the Intelligence Community (IC) Centers for Academic Excellence (CAE) program manager from 2005 through 2011. Internal documents and grant announcements from that period state that the program’s mission was to increase the pool of eligible applicants in core skills areas, specifically targeting women, racial and ethnic minorities and individuals with varied cultural backgrounds, regional expertise, and language proficiency. ODNI outlined four goals in its 2008 guidance for the program, including a focus on developing relationships with colleges, providing resources and grants to competitively selected colleges, providing technical assistance in the design and implementation of colleges’ IC CAE programs, and documenting results to improve the efficacy of the IC CAE program. Each of these goals included supporting objectives. For example, the goal of providing support, resources, and grants to competitively selected colleges included four supporting objectives, such as instituting long-term practices to increase relationships with minority-serving institutions and providing access to IC internships, co-ops, and graduate fellowships. These goals and objectives were aligned with the program’s overall mission, but they were not defined in measurable terms that would allow future assessments of whether they were being achieved. For example, ODNI did not establish targets for the goals or supporting objectives listed above that would have allowed it to determine how successful it had been at supporting long- term programs at minority-serving institutions or providing access to IC employment opportunities. In addition, ODNI defined a strategy to support its program goals, and the strategy included the following four elements: outreach to high schools; operations at colleges, including curriculum development; infrastructure at the colleges to support these operations such as faculty and administrators; and relationships between IC CAE programs and IC elements. These elements of ODNI’s strategy described specific operational requirements for the program. For example, IC CAE grant announcements in 2006, 2009, and 2011 supported a wide range of academic activities that prioritized the development of curricula in national security studies, science and technology programs, study abroad programs, courses in critical languages, and pre-collegiate outreach through activities like summer camps to raise awareness and interest in IC careers. ODNI also defined assessment and evaluation as an overarching part of the program’s strategy, as shown in figure 5. ODNI worked with a contractor to conduct annual performance evaluations through 2012. The contractor developed an evaluation methodology and reviewed colleges’ interim reports, collected and verified performance data, and developed findings and recommendations. For example, the contractor recommended that IC CAE colleges broaden their critical language offerings and increase the number of IC CAE Scholars enrolled in foreign languages courses in each of the annual reports from 2007 to 2010. ODNI defined performance measures and reported data on activities, including the number of IC CAE courses and events, demographic information, and employment outcomes. Specifically, IC CAE colleges were required to report these data quarterly, and the contractor compiled the data annually into its program reviews. Table 4 shows selected performance measures outlined in ODNI’s final report that summarized information collected from 2004 through 2011. Table 5 and table 6 show the 46 grants managed by Office of the Director of National Intelligence (ODNI) and the Defense Intelligence Agency (DIA). The total amount of grant funding projected to be obligated from fiscal year 2005 and fiscal year 2021 is $69,053,618, not including a $250,000 contract in September 2004 to initiate a pilot Intelligence Community (IC) Centers for Academic Excellence (CAE) program at Trinity Washington University. Tables 7 and 8 list the IC CAE colleges by designation of eligibility for Department of Education funding as a minority serving institution under various statutory grant programs including programs authorized by the Higher Education Act of 1965, as amended. Eligibility for grant funding under these statutory programs as determined by the Department of Education in 2018 does not designate or certify any college as a particular type of institution, for example, as a Hispanic Serving Institution. The colleges listed in tables 5 and 6 are listed in the order that they received a grant by fiscal year and some IC CAE colleges received multiple grants. Grants fund a base year and up to 4 additional option years. The consortium colleges below are listed alongside the IC CAE college that received a grant. ODNI and DIA awarded IC CAE grants to colleges following an announcement for proposals in fiscal years 2006, 2009, 2011, 2014, 2017, 2018, and 2019. In addition to the individual named above, Kristy Williams, Assistant Director; Jason Bair; Tracy Barnes; John Bumgarner; Meeta Engle; Gina Hoover; Amie Lesser; Benjamin Licht; Ned Malone; Parke Nicholson; Alice Paszel; Sarah Veale; and Lillian Yob made key contributions to this report.", "summary": "A trusted, diverse workforce with the right expertise is critical to ensuring the IC achieves its mission of delivering distinctive, timely insights with clarity, objectivity, and independence. ODNI established the IC CAE program in 2005 to educate highly qualified students of diverse backgrounds and encourage them to pursue careers in the IC. ODNI and DIA have provided 29 colleges a total of 46 IC CAE grants through fiscal year 2018, totaling approximately $69 million through fiscal year 2021. This report evaluates the extent to which (1) DIA has planned and overseen the IC CAE program since 2011 and (2) selected IC elements are participating in the IC CAE program and have clearly defined roles. GAO reviewed IC CAE documentation related to DIA program planning and oversight from 2011 through 2019 and applied key practices of sound planning to evaluate DIA's management of the program. GAO interviewed selected IC elements and IC CAE college officials and reviewed related documentation to assess program planning and implementation. The Defense Intelligence Agency (DIA) has not sufficiently planned and overseen the Intelligence Community (IC) Centers for Academic Excellence (CAE) program—intended to create an increased pool of culturally and ethnically diverse job applicants for the IC—after the program transitioned from the Office of the Director of National Intelligence (ODNI) to DIA in 2011. Specifically, DIA has not applied most of GAO's key practices of sound planning in overseeing the program (see table), thus challenging decision makers' ability to determine the program's return on investment. Specifically, while DIA has developed some short-term goals and plans for the program, DIA has not established results-oriented program goals or an overall strategy that details the agency resources and processes required to achieve the program's mission. Similarly, DIA collected some data for the program and required colleges to provide reports on significant program accomplishments, but these data are not complete or reliable and have not been used to comprehensively evaluate the program's success. As oversight responsibility for the IC CAE program transitions back to ODNI in fiscal year 2020, ODNI will not be able to determine the extent to which the program has been successful in achieving its mission without establishing and documenting goals with targets and milestones; developing strategies to achieve those goals; and defining, collecting, and reporting comprehensive performance measures. Selected IC elements are participating in the IC CAE program to varying degrees, but DIA has not established a process for monitoring and assessing IC elements' participation or clearly defining IC elements' role in the program. The IC CAE program is a collaborative effort that allows IC elements to participate in college events, such as IC CAE recruitment events. However, not all IC elements participate in the program. As IC CAE program manager, DIA has engaged with IC elements in a variety of ways, but this engagement has not resulted in consistent participation among the IC elements. Moreover, program documentation has not clearly defined IC elements' roles and responsibilities for participation. Without a process for monitoring and assessing IC elements' participation and clearly defining roles and responsibilities, ODNI will neither be able to identify reasons for the lack of IC element engagement nor ensure that IC elements are taking advantage of the IC CAE program and its goal of creating a diverse pool of applicants for the IC. GAO is making seven recommendations to the Director of National Intelligence, including that ODNI establish and document results-oriented goals and strategies for the IC CAE program; define, collect, and report comprehensive performance measures; and clearly define the roles and responsibilities of the IC elements for participation in the program. ODNI concurred with the recommendations but did not identify steps it plans to take to implement them.", "document_type": "gao"}
{"report": "Two GSA offices have roles in managing data related to federal real property. The Public Buildings Service (PBS) acts as a landlord for the federal government by acquiring new space for government agencies and tracking data on the property it acquires. PBS manages and publishes three databases that provide information to public stakeholders and researchers on federally owned and leased properties, and on properties eligible for disposal. Another office, the Office of Government-wide Policy (OGP), collects, manages, and reports on all federal real-property data through the FRPP database. OGP has managed the FRPP since its inception in fiscal year 2005 by collecting data from federal agencies on their real property assets. OGP is also responsible for compiling and managing the public database required by FASTA. FRPP is the most comprehensive database of federal real property holdings, containing details for about 398,000 assets (buildings, structures, and land). It is not public, but it also does not contain any classified national security information. FRPP data show the range of agency assets, including single buildings in a given location or multiple buildings located on installations, like a national park or research center. The FRPP identifies whether buildings are on installations, but does not identify whether buildings are public-facing or secure (and thus inaccessible by the public). We have repeatedly identified reliability issues with the FRPP, and GSA has taken actions to improve the reliability of FRPP data. Specifically, in 2016, GSA established its validation and verification (V&V) process. After agencies submit their data annually to FRPP, GSA identifies questionable entries (called anomalies) from 20 separate categories. Through these categories, GSA flags assets that are very small in size, changed from the previous year, or have unusual financial statistics, among other things. GSA then provides an annual list of anomalies to the agencies that entered the data. Agencies have 10 months to research each anomaly and correct errors or validate that the data are correct. GSA has provided instructions to agencies on how to respond to the V&V process. GSA also requires agencies to certify accuracy of the data and established database rules that require agencies to submit complete information on assets. GSA officials said that it must ultimately rely on agencies to submit correct data. FASTA required GSA to publish a single, comprehensive, descriptive database of all federal real property by December 16, 2017, while allowing it to exclude assets for reasons of national security, such as those that are secure installations. FASTA also required the database to be made public to the extent its release is consistent with national security and procurement laws. GSA officials said that GSA used the FRPP as the basis for developing the database it released to the public at the end of 2017. GSA presents the data in two ways: as a downloadable spreadsheet or in a searchable mapping application. FASTA requires that the public database be machine-readable and permit searching or sorting of data to the extent practicable. Further, GSA guidance also calls for agencies to provide accurate and complete data. Specifically, GSA requires agencies to include either a complete street address or geo-coordinates for all 398,000 assets in the FRPP; for example, GSA’s FRPP data dictionary establishes the format agencies are to use when inputting asset addresses—number, street, city, zip code. This requirement carries over to the 305,000 assets included in the public database. We found that almost 214,000 of the assets in the public database included some street address information, but most of the addresses were incomplete or incorrectly formatted. Specifically, only approximately 70,000 (33 percent) fully met the standards. Since another 91,000 assets did not include a street address, a computer would only be able to locate about 23 percent of the 305,000 civilian federal assets using street addresses in the public database (See fig. 1.) GSA officials who manage the FRPP said that they were aware that many street addresses were not readable and have asked agency officials to review the accuracy of address information and correct it in future submissions. They acknowledged, however, that their efforts were not fully successful. As discussed later, GSA is currently taking steps to ensure that agencies provide more complete geo-coordinates when they submit data to the FRPP. For the remaining 67 percent of the assets (144,000) with some street address information that did not fully meet the standards, we found two types of problems—incomplete addresses and addresses that were not formatted correctly. First, more than 28,000 assets had street addresses that were incomplete. For example, instead of having individual address listings, we found that all 215 buildings at the Goddard Space Flight Center had a single listing of “Greenbelt Road.” This road actually stretches over 6 miles and many other buildings are located along the road. The front gate’s complete address is “8800 Greenbelt Road.” In these instances, GSA officials said that its public-mapping program selects the mid-point of the street, which in this case is over a mile from the public entrance to the installation. (See fig. 2.) As a result, someone using the database would not be able to determine exactly where Goddard is. Second, we found about 115,000 assets had street address information that was incorrectly formatted based on FRPP instructions. While we did not conduct a complete analysis of all these assets, we found examples of some of the address issues, such as: Extra descriptive information about the property in the address field. For example, “N220 AG Science Bldg North U of Kentucky” and “Beltsville AG Research Center, 10300 Baltimore Avenue.” The data in the address field for these two assets—which belong to the Department of Agriculture—could not be directly read by a computer or displayed on a map. Unrecognizable text. For example, “2881 F;B Road” and “1-15, Exit 172, 1 Mile East.” The data for these assets, which belong to the Department of Agriculture, could not be directly read by a computer or displayed on a map. GSA officials said that users may be able to interpret the individual asset addresses in the database but that GSA’s automated computer system could not map unreadable addresses. Similarly, a private-sector user who tried to use the public data to map federal facilities for clients said that he was unable to map many of the assets because addresses were not readable by his computer. As a result, he said that he excluded incomplete or unreadable addresses from the database he created. He noted that incomplete data would reduce clients’ interest. We also found problems with assets for which agencies provided geo- coordinates (latitude and longitude). Specifically, GSA guidance states that geo-coordinates must include a minimum of four decimal places. Of the 305,000 assets included in the public database, almost 220,000 included geo-coordinates but more than half—about 141,000—did not meet FRPP standards because they were not precise enough to map the location of the assets. GSA officials noted agencies are required to enter some type of information in the field for address or geo-coordinates, but an “open data” format did not prevent agencies from reporting information that was not strictly a street and address number. Consequently, some agencies may have entered incorrect values for the geo-coordinates just to complete the field. Our analysis supports this view; few (550 of about 131,000) of the assets with both sufficiently detailed geo-coordinates and street addresses pointed to the same location. In addition to the open data issue described above, officials also explained that GSA did not have a “business validation rule” in place that prevented agencies from inputting coordinates with less than four decimal places. GSA has taken a number of actions to correct the issues with geo- coordinates that they say should help address this problem for the next release of the public data in 2020. For example, GSA added V&V anomaly categories for fiscal year 2018 data that identified GPS coordinates pointing to unlikely locations, such as a location in the water, which identified about 80,000 potential anomalies. Agencies are currently checking these. Additionally, GSA added a feature to the fiscal year 2019 FRPP submission form that will force agencies to provide geo- coordinates that are detailed enough for their data to be accepted. GSA officials said that they would consider taking additional steps once they have analyzed the results of the GPS coordinate anomaly categories. GSA has asked agencies to review addresses for accuracy, and officials indicated that they have discussed plans to improve this data. However, GSA has not taken specific steps to work with agencies to ensure they input correct street addresses in the public database in light of the “open data” format. The lack of correct street addresses can affect users who may be interested in acquiring or leasing assets or who may be interested in installing telecommunications devices on an asset, from knowing exactly where those assets are located. As a result, until the street address information is complete and correctly formatted, the public may unknowingly pursue assets that are not available or suited to their needs. We found that while GSA has identified close to 30,000 potential errors in the FRPP database over the first 2 years of the V&V process, agencies confirmed only 5 percent as errors (1,291 of 28,572). Agencies validated the remaining 27,281 anomalies as correct or left them unresolved. The low number of errors being identified indicates that GSA’s V&V process is not efficiently identifying errors in the data, either in terms of the anomaly categories themselves or the thresholds at which GSA flags data as an anomaly. This situation could ultimately mean that agencies are spending time researching correct information that was flagged as potentially erroneous or not fully actually researching anomalies and allowing mistakes to remain uncorrected. Agencies identified no anomalies as errors for five of GSA’s 16 anomaly categories in 2017, raising questions about the anomaly categories GSA has identified. OMB guidance suggests that agencies only do extra tasks that are justified by their cost. GSA officials who manage the V&V process said that the high number of anomaly categories for which agencies found no errors could reflect that the anomaly categories are flagging correct data as anomalies or that agencies are validating data as correct without actively checking it. We found examples of both. For example, we examined a selected sample of 14 V&V data anomalies at DOE sites in New Mexico. GSA flagged the buildings for being very small—office buildings less than 400 square feet and warehouses less than 64 square feet—and found that the information in the public database was correct. Figure 3 illustrates how such information flagged as being questionable, is actually correct according to GSA’s reporting rules for agencies, which specify data categories, such as the types of buildings GSA considers to be warehouses. Specifically, GSA flagged assets at DOE’s Los Alamos and Sandia National Laboratories because their square footage fell below certain amounts. But, in reality, these assets met GSA’s criteria for offices and warehouses despite being small. We also found instances where an agency verified information as correct that was incorrect. Figure 4 illustrates examples data validated as correct that was actually erroneous. Specifically, an agency erroneously reported water towers and antenna arrays as office buildings. Staff responsible for managing the V&V process for their agency’s assets said that they did not always consult the personnel with the best knowledge of the assets in resolving anomalies. Instead, they relied on their own judgment when determining whether to forward the anomalies to asset managers to ultimately check the data and correct any errors. This resulted in some errors going uncorrected. Thresholds—the points at which GSA flags data as anomalies—lead to a large number of data elements flagged, which can challenge the resources of affected agencies. Officials at two of our selected agencies said that the number of anomalies that the V&V process produces annually overwhelms their ability to validate the data. The large number of unresolved V&V anomalies appears to support this conclusion. GSA’s guidance allows agencies 10 months to validate the anomalous data, but the number of anomalies that remain unresolved after 10 months has risen sharply. Figure 5 shows that while agencies addressed all anomalies in the first year, they have since struggled to keep up. As of October 2019, 106,231 anomalies, or approximately 71 percent, remained unresolved after 10 months. Officials who are responsible for resolving anomalies at two selected agencies said that more realistic anomaly categories or thresholds could reduce the number of anomalies and better target actual errors, an approach that could help agencies better prioritize their resources when researching anomalies. GSA staff who manage the FRPP said that they brainstormed internally and used industry standards and policy initiatives to develop anomaly categories. They also explained that they adjust thresholds within each category. However, GSA officials said they had not reviewed the anomaly categories or their thresholds to see if they consistently capture incorrect data. This approach puts the stated goals of the V&V process—which are to improve data accuracy, promote data consistency among the agencies, and enable OMB to measure data quality improvement—at risk. In the absence of better information about the validity of categories and thresholds, the current process for V&V is taking up limited agency resources without efficiently correcting errors in the data. GSA and reporting agencies decided not to provide certain useful information from the public database in two ways, thereby reducing the data’s completeness and ultimately its utility. First, GSA withheld data from the public database without consulting agencies about their sensitivity. Second, selected agencies withheld information that was already publicly available or withheld similar types of information inconsistently within their agencies. GSA chose to withhold 15 categories of data from the public database for all agencies. FASTA authorized the withholding of information from the public database for national security or procurement-related issues. GSA officials who manage the FRPP said that GSA does not have the security or intelligence expertise to issue guidance on national security issues. As a result, they sought input from the ISC on what information to withhold. ISC reviewed the security risks of FRPP data and provided written recommendations in a memo to GSA in November 2017. Specifically, ISC recommended that certain categories of data on assets be withheld from the public database because of the security risk that they could pose individually or in combination. ISC also recommended that agencies use internal guidance on restricting the public release of real property information and ISC’s mission criticality criteria to determine any individual real property assets to withhold entirely from the public database. GSA implemented ISC’s first recommendation by withholding 15 FRPP data categories for all assets from the public database without consulting the relevant agencies on this decision, considering the specific sensitivity of these categories for all assets, or assessing the effect withholding them would have on the database. ISC officials acknowledged that the memo that they prepared for GSA could have been clearer as to ISC’s intent that departments and agencies should consider the recommendations in making a final determination. According to ISC officials, they believed that implementation would involve GSA communicating these recommendations and leaving decisions on what to withhold to officials within individual departments and agencies who control real property assets. Specifically, the following five categories of data were among the 15 withheld by GSA: property’s/installation’s name, replacement value of an asset, annual operating and maintenance costs for owned assets, annual-operating and maintenance costs for leased assets, and breakdown of annual operating and maintenance costs (e.g., utilities costs, janitorial costs, sewage costs, etc.). Because GSA did not consult with agencies on this decision, the agencies did not have an opportunity to consider whether or not the 15 data categories GSA withheld included information that is sensitive or already publicly available. As a result, the public database is incomplete in ways that adversely affect users and limits agencies’ public accountability for reporting accurate information. For example, identifying assets in the public database is difficult without the property’s name—one of the data categories GSA withheld—especially given the insufficient location data in the database discussed earlier. Returning to the incomplete address example discussed earlier (NASA Goddard Space Flight Center), the public data also do not include the property’s name, “Goddard Space Flight Center,” leaving users with limited information to identify the buildings. As a result, someone using the public database cannot identify assets on NASA’s Goddard Space Flight Center campus without using outside sources for additional information. (See table 1.) As discussed in the next section, we found that some of the information from these 15 excluded data categories, such as property names, is often already in the public sphere. For example, “Goddard Space Flight Center” and its address are clearly disclosed on NASA’s public website, but GSA withheld the name for 215 NASA buildings at this address, including Goddard’s public visitors’ center. Using the public database alone, a member of the public would need to go through numerous steps to determine if assets are part of Goddard Space Flight Center and still have no way of being sure. (See fig. 6.) Moreover, third-party, private sector stakeholders we spoke with such as brokers, lessors, consultants, and a non-profit organization that work in federal real-property markets, noted that some of the data categories GSA withheld would be among the most useful to their work. For example, 10 of 14 stakeholders we spoke to said that financial data, such as operating costs and annual rent, were among the most useful FRPP data categories to their analyses of real property markets and business opportunities. Additionally, four stakeholders cited the property’s name as among the most important data categories for their work in analyzing federal real property. While GSA withheld the 15 categories of data across all agencies, it allowed each agency to determine if any specific assets should be withheld entirely from the public database, in accordance with ISC’s second recommendation. ISC officials told us that this was appropriate because individual departments and agencies that control real property assets should determine what information to withhold. GSA provided agencies with guidance that explained its decision to withhold the 15 data categories and instructed agencies to consult ISC’s mission criticality criteria and any additional internal agency criteria in determining what information to withhold from public release. ISC’s mission criticality criteria provide a page-long list of uses of real property assets that warrant consideration for national security exclusion, but do not provide other instructions for agencies to consult while making decisions on what information to withhold. Further, OMB Circular— Management of Reporting and Data Integrity Risk also instructs agencies to integrate a risk-based approach towards meeting reporting objectives, an approach that requires “management practices that identify, assess, respond, and report on risks.” However, we found that our selected agencies did not consistently identify internal guidance to supplement GSA’s instructions within their agencies. In September 2018, ISC recommended that GSA not withhold from the public database newly added data categories that provide information already in the public sphere. Additionally, the OPEN Government Data Act requires OMB to foster greater sharing, dissemination, and access to public information and issue guidance that, among other things, takes into account the requirement that data must be disclosed if it would otherwise be made available under a Freedom of Information Act request. For purposes of this report, we refer to this requirement as “assuming openness.” However, GSA’s instructions to agencies lacked specifics to help agencies apply a consistent, risk-based approach in determining which, if any, assets or asset-specific information should be withheld from public release. As a result, we found that some of the selected agencies withheld asset-related information from the public database that is available on their own public websites or from other official sources. Withholding information that is already publicly available unnecessarily reduces the completeness and utility of the public database that FASTA indicated should be comprehensive. For example: DHS’s Immigration and Customs Enforcement (ICE) withheld buildings at five of its publicly-accessible service-processing centers that are shown on a detention facility locator mapping system on its own website. ICE officials told us that they did not consider what information is already publicly available when deciding what information to withhold from the public database. FCC withheld all of its real property assets. FCC’s own website and regulations, however, list the locations and functions of FCC offices. The U.S. Coast Guard withheld information on its public-recruiting offices and lighthouses that it advertises on its public website. All buildings and structures that were not specifically used for the purpose of aids to navigation were withheld from the public data set. As a result public users can look up information on the Coast Guard’s aids to navigation, but cannot look up some of its publicly accessible locations, such as recruiting offices and lighthouses. In contrast, DOE decided to withhold none of its 20,378 assets from the public database. According to a DOE official responsible for submitting data to FRPP, DOE does not have a specific process for assessing what properties to make public. However, it is aware that much of the information in the public database is also publicly available through other sources. Table 2 shows how selected agencies took different approaches to withholding information from the public database. Under risk-based criteria assuming openness (as mentioned earlier), agencies may consider whether information made public in one instance should be withheld in another instance. However, neither ISC’s mission criticality criteria nor GSA’s instructions addressed the issue of consistency within specific agencies. Specifically, we found that selected agencies withheld the same assets differently over time, and similar assets inconsistently. Table 3 shows how reporting agencies made different decisions on whether to withhold the same types of assets. At times, some agencies withheld certain asset types that ISC’s mission criticality criteria did not identify as warranting withholding, resulting in almost 7,000 assets such as parking structures and disposed assets being withheld. This led to inconsistencies as to whether these agency assets were included or not in the public database, limited transparency about these assets, and prevented users from fully analyzing federal real property assets in these categories. In other cases, selected agencies withheld similar assets inconsistently, did not always follow written procedures and withheld similar assets. For example: DOI headquarters provided its bureaus with GSA’s instructions on withholding assets, but individual bureaus applied the instructions differently. For example: The Fish and Wildlife Service reports that it has 369 publicly accessible national wildlife refuges, but it withheld selected real property assets at 11 of them. However, the withheld assets are the same types as the assets the Service disclosed at other refuges. For example, it reported all but two of 447 restrooms and 10 of 2,066 recreational structures on its national wildlife refuges. The Fish and Wildlife Service told us it will re-evaluate its withholding for the fiscal year 2019 FRPP database. The National Park Service (NPS) reported that it has 374 publicly accessible national parks, monuments, memorials, historic sites, and recreation areas. NPS withheld some real property assets from 15 of those sites. For example, it reported all but 2 of 1,045 service buildings at its sites. These withheld assets are the same types as those disclosed at other sites. NASA withheld assets at a centralized level, but headquarters officials told us that they have not established instructions or policies for these decisions. NASA officials told us that they withhold real property assets shared with agencies working in defense and/or national- security, which led NASA to withhold 1,517 assets in fiscal year 2017. In fiscal year 2018, however, we found that NASA withheld all assets at certain field centers, causing the number to more than double from 1,517 in fiscal year 2017 to 3,696 in fiscal year 2018. Finally, our comparison of the fiscal year 2018 FRPP and public databases found that seven agencies did not identify whether data on 3,845 assets should be withheld despite GSA guidance to do so for every asset. GSA included these assets in the public database without consulting agencies on the assets’ sensitivity or risks in releasing information on them. GSA officials said that these data should not have been accepted and that they had implemented controls to ensure that agencies identify whether data should be withheld. It is difficult for a user of the public database to determine when assets are located on a secure installation that the public cannot access. For example, returning to the NASA Goddard Space Flight Center illustration from earlier in the report, assets located at the Space Flight Center are listed individually, with no indication that the assets are all located on a secure installation. The public database lists all 215 assets at the same location—Greenbelt Road in Greenbelt, MD, but provides no further indication that the assets are part of a larger, secure facility. (See fig. 7.) Currently, GSA requires civilian agencies to report individual assets, including those on secure installations. Detailed, asset-specific information could be useful for government decision makers, and GSA applied this approach to the public database. However, asset-level information can cause challenges for users when they are located on secure installations because GSA withheld the installation names from the public database. Listing assets individually could prompt fruitless public interest in inaccessible secure facilities. One expected use of the public database is for the private sector to identify possible locations for installing commercial telecommunications infrastructure, such as cell towers and antennas. However, as this infrastructure cannot be installed on secure installations, the public database would be more useful to such companies if they could readily determine whether a potential location was on a secure installation or not. For example, officials on a secure installation we visited told us that reporting individual buildings does not make sense because there are few, if any, legitimate reasons for public interest in the individual assets on a secure installation. FASTA required GSA to develop a comprehensive database and provide the public with database access, but recognized the importance of protecting national security. In that respect, a key organizational issue faced by GSA and agencies is how to present data for reporting assets on campuses that are not accessible to the public. While non-disclosure is permitted, such actions to withhold this information may reduce the usefulness of the public database as a whole. The Department of Defense (DOD) takes a different approach for its secure military bases in the public database. According to GSA officials, DOD submits a separate summary-level report for public release. This summary-level information shields sensitive information and alerts users that those assets are not accessible or of use to private-sector interests. Civilian agencies’ assets located on closed federal installations are similar to those on DOD bases in that the public may have less interest in or reason for knowing about assets that are not available to the public. Officials from NASA and two DHS bureaus said that the installation-level approach to reporting would be more appropriate for their circumstances than the asset-level reporting currently applied to civilian agencies and would likely allow them to release more information to the public. Officials from DHS added that they already release some information to the public on the web site. We found that other selected agencies also release information about secure installations on their public websites, including NASA and its Goddard Space Flight Center. In our interviews with 14 private sector stakeholders, we found varying levels of awareness and understanding of GSA’s publicly available real- property datasets. Of the 14 private sector stakeholders we interviewed, eight told us that they were aware of the public database. Of these, five told us they tried to use it. Several selected stakeholders—regardless of whether or not they had used the database—cited concerns about the usefulness of the data, specifically with its reliability, completeness, formatting, and organization. For example, officials from one brokerage firm told us that, while the information could theoretically be useful for agency consolidation efforts, the database was too cumbersome to analyze for that purpose. Similarly, officials with a federal real-estate- consulting firm told us that they do not refer customers to the public database because they believe that the data are not complete, correct, or intuitive. Moreover, one member of a federal real-property trade association noted serious limitations in the database’s completeness and organization. In addition, one user said that he hoped the public release would allow better access to real property data but that the poor quality, completeness, and organization of the data means access to data is no better than it was before the release. Further, six of the private sector stakeholders we interviewed were not aware of the public database, including a stakeholder who confused it with GSA’s Lease Inventory database. The lack of a single location on GSA’s website that contains information about all of GSA’s real property databases may contribute to the awareness, confusion, and usefulness issues expressed by these stakeholders. Specifically, public access to the FRPP public database, the GSA’s Lease Inventory database and two other publicly available real-property databases is found in different places on GSA’s website: Public FRPP http://publicfrppdata.realpropertyprofile.gov (managed by GSA’s Office of Government-wide Policy) GSA lease inventory https://www.gsa.gov/real-estate/real-estate- services/leasing-policy-procedures/lease-inventory (managed by GSA’s Office of Leasing) GSA inventory of owned & leased properties https://www.gsa.gov/tools/buildings-real-estate-etools/inventory-of- owned-and-leased-properties (managed by GSA’s Public Building Services) GSA disposal inventory https://disposal.gsa.gov/s/ (managed by GSA’s Office of Property Disposal) The Open Government Data Act requires the Administrator of GSA to maintain a single public interface online as a point of entry dedicated to sharing an agency’s data assets with the public. While the databases serve different purposes, some asset-level data are similar, such as location or size. According to a GSA official, these databases are operated by different offices within GSA. This situation poses challenges to listing the database on a consolidated webpage. Nevertheless, GSA officials agreed that there could be clearer links and said that they plan to add them based on our findings. Without a consolidated webpage or clear links showing how the databases relate to each other and how to access each database, users of the various databases may not be aware of what databases do exist to search for assets that could be available to the public. The public database’s presentation issues, combined with stakeholder confusion and lack of awareness, could contribute to low numbers of people who accessed the database compared to another GSA-managed real property database. GSA data indicate that users accessed civilian agency data from the public database 147 times per month on average from December 2017 through July 2019 and some months fewer than 10 times. However, according to a GSA official, the number of times users access the public database through the GSA website doesn’t necessarily reflect the extent to which people use the data. The official explained that, since GSA only issues the data once a year, users only need to access and save it once for use in a given year and that GSA usually sees a peak in users accessing the data when GSA publishes its annual update to the database. As indicated in figure 8, there was a peak in users accessing the database when GSA first issued the 2016 data in December 2017, and again in March and April 2018 when GSA published 2017 data (28 and 162 times, respectively), and in June 2019 when GSA published the 2018 data (170 times). In comparison, users access another real property database, GSA’s Inventory of Owned and Leased Property database—which is updated weekly—more often than they access the public database. Users access the Inventory of Owned and Leased Property database to search for properties controlled by GSA. Specifically, since the public database was released in December 2017, the public has continued to access GSA’s Inventory of Owned and Leased Property almost 10 times more per month than the public database on average (see fig. 8). Federal agencies spend billions of dollars annually to operate and maintain hundreds of thousands of real property assets. GSA’s public database, extracted from FRPP data, is a comprehensive, descriptive, database of federal real property. Through the database, the public should be able to learn about federal assets, whether people are conducting research or interested in potential uses such as leasing or purchasing. Issues with the data, however, undermine these uses. GSA has taken a number of actions to improve the accuracy of the data, such as implementing the V&V process for identifying and correcting possible errors. But until GSA has better processes to ensure accuracy of street address information and identify anomalies, the public data will continue to lack the type of database most useful to the public. Moreover, the absence of a risk-based, consistent approach for withholding assets from the public database or reporting assets to it further erodes its utility. Finally, utilization of the data base is low; GSA’s choices on how the database information is presented and how users find out about and access the public database and other real-property databases may contribute to this lack of use. Unless GSA improves the accuracy, completeness, and usefulness of the public database, its intended benefits—to the public and the federal government—will remain unrealized. We are making the following six recommendations to GSA: The Administrator of GSA should coordinate with agencies to ensure that street address information in the public database is complete and correctly formatted. (Recommendation 1) The Administrator of GSA should coordinate with agencies to review V&V anomaly categories to better target incorrect data. (Recommendation 2) The Administrator of GSA should work in consultation with agencies to determine which, if any, data should be withheld from public release. (Recommendation 3) The Administrator of GSA should instruct each agency to apply a consistent, risk-based approach in determining which, if any, assets or asset-specific information should be withheld from public release. (Recommendation 4) The Administrator of GSA should allow agencies to provide summary data for secure installations. (Recommendation 5) The Administrator of GSA should link all of GSA’s publicly available real- property data sources. (Recommendation 6) We provided a draft of this report to GSA, DHS, DOE, DOI, FCC and NASA for comment. GSA provided written comments, which are reprinted in appendix II and summarized below. We received, via email from DOI, technical comments, which we incorporated as appropriate. DOI, in its email comments, also suggested revisions to two recommendations, which we clarified as appropriate. DHS and NASA provided, in email, technical comments, which we incorporated as appropriate. DOE and FCC told us they had no comments. GSA agreed with five of our six recommendations but disagreed with our third recommendation. GSA wrote that allowing agencies to unilaterally determine which categories of data to withhold from the public would not be useful and would complicate comparisons among agencies. We did not intend that our recommendation allow agencies to decide without consulting with GSA, and we have clarified our recommendation accordingly. We continue to believe this recommendation, as clarified, is valid. As we reported, GSA currently withholds 15 variables—categories of data—for all federal assets, including the name of every federal building and structure. While this approach is consistent for all assets, it reduces the overall usefulness of the data by withholding information that federal agencies already make public. In addition, the ISC told us that the landholding agencies, not GSA, are in the best position to know what data about their assets are sensitive. We amended the recommendation by removing the reference to categories of data and adding that GSA work in consultation with agencies to determine what data to withhold. This change would create a consistent way for agencies to release useful data while withholding sensitive data for individual assets, a step they already take by withholding assets from the public database. GSA plans to work with the ISC and federal agencies to review related guidance and modify it as needed. We support these plans. In addition, DOI suggested in email comments that we revise our second recommendation to include coordinating with agencies to review V&V anomaly categories to better target incorrect data. Our original recommendation did not preclude coordination, and since we agree that such coordination would help improve the V&V process, we clarified the recommendation accordingly. We are sending copies of this report to the appropriate congressional committees, the Administrator of the General Services Administration, the Acting Secretary of Homeland Security, the Secretary of Energy, the Secretary of the Interior, Chair of the Federal Communication Commission, the Administrator of the National Aeronautics and Space Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Costs related to the everyday functions of an asset Code to identify an installation (i.e. buildings, structures, land or any combination of these) Code to identify a part of an installation (i.e. buildings, structures, land or any combination of these) Building name or the name of an entire installation (such as an agency campus) Total number of full and part time federal employees Total number of full and part time contract employees Identifies whether an asset is part of a field office (any location that is not the headquarters location for the agency) In addition to the contact named above, Keith Cunningham (Assistant Director), Lynn Filla-Clark (Analyst-in-Charge), Melissa Bodeau, George Depaoli, James Duke, Rami Khalfani, Terence Lam, John Mingus, Joshua Ormond, Crystal Wesco, and Elizabeth Wood made key contributions to this report.", "summary": "The lack of reliable data on federal assets is one of the main reasons Federal Real Property Management remains on GAO's high risk list. In 2016, legislation required GSA to publish a single, comprehensive, and descriptive database of federal real property that would be available to the public. The database could be used for research and other potential applications. GAO was asked to study the public database. This report assesses (1) GSA's efforts to improve the reliability of FRPP's data and the public database, (2) the public database's completeness, and (3) the presentation of the data in the public database. GAO reviewed federal laws, documents, and data, including GSA's fiscal years 2017 and 2018 FRPP and public databases. GAO interviewed officials at GSA and from six federal agencies selected in locations with enough questionable data in the public database to analyze, among other things, and studied assets in Washington, D.C., Illinois, and New Mexico. GAO also interviewed selected stakeholders involved in federal real property management, such as real estate brokers. The General Services Administration (GSA) has worked in recent years to improve reliability of the Federal Real Property Profile (FRPP), which tracks federal real property assets. However, numerous errors in the database were carried into the public version. GSA extracted data from the FRPP's 398,000 civilian federal assets to create a public database to be used, for example, by researchers and real estate developers. However, GSA's data verification process did not address key errors. GAO found that 67 percent of the street addresses in the public database were incomplete or incorrectly formatted. For example, the database lists “Greenbelt Road” as the address for over 200 buildings at NASA's Goddard Space Flight Center, but the road stretches over 6.3 miles, thereby reducing a user's ability to locate specific buildings. The public database is not complete because GSA and selected agencies decided not to provide certain useful information. Specifically, GSA withheld assets' information without consulting those agencies managing the assets and allowed agencies to withhold information that is already publicly available. For example, GSA withheld the name “Goddard Space Flight Center” from the public database, but NASA's website lists this name and the Center's location. Unnecessarily withholding information limits the database's utility and undermines analysis. The public database's usefulness is further limited by how GSA presents the information. Because the database does not identify if an asset is part of a secure installation, the public does not know if assets, such as the unnamed buildings at Goddard, are accessible to the public. Unless GSA improves the public database's accuracy, completeness, and usefulness, its benefits may not be realized. GAO is making six recommendations to GSA, including improving the accuracy of the database, consulting with agencies on assets' information withheld from the database, and improving the public database's presentation. GSA agreed with five of the recommendations. GAO clarified the recommendation on withholding information on agencies' assets, to address GSA's comments.", "document_type": "gao"}
{"report": "Nursing homes and assisted living facilities provide important long-term care to vulnerable individuals in institutional or residential settings. Specifically, nursing homes provide care to elderly and disabled individuals, many of whom have physical and cognitive limitations requiring skilled nursing care. Assisted living facilities provide a residential alternative to nursing home care for individuals who prefer to live independently but need assistance to maintain their independence. Like nursing homes, they may provide residents with a variety of services to assist with activities of daily living, such as bathing and dressing, but the facilities are generally not licensed to provide 24-hour skilled nursing care and typically offer a more limited range of medical care. As we reported in our January 2018 report on CMS’s oversight of assisted living facilities under the Medicaid program, the demand for assisted living services, which offer the benefit of community living, is expected to increase as a result of the aging of the nation’s population, increased life expectancy, and older adults’ desire to remain in the community. Additionally, the cost of nursing home care for an individual generally exceeds the cost of assisted living facility services, further incentivizing a shift among consumers and payers to assisted living for elderly individuals, including those with increasingly complex health needs who would otherwise need nursing home care. Oversight of nursing homes is a shared federal-state responsibility. Federal law imposes both a comprehensive set of quality standards that nursing homes must meet to participate in the Medicare and Medicaid programs, and federal and state oversight responsibilities to enforce these standards. CMS, which is charged with implementing these standards and conducting federal oversight, contracts with state survey agencies to perform both routine inspections—known as standard surveys—and conduct investigations of elder abuse incidents, including complaints and facility-reported incidents. CMS provides guidance implementing statutory and regulatory requirements to protect residents from elder abuse in its State Operations Manual, which specifies requirements for reporting, investigating, and notifying law enforcement about elder abuse in nursing homes. CMS regional offices monitor state compliance with federal requirements for nursing home oversight. Generally, states establish their own oversight requirements for assisted living facilities. These facilities are largely overseen by state agencies within, for example, the state health or aging departments; however, when assisted living facilities provide services to Medicaid beneficiaries, they are also indirectly subject to CMS oversight through the agency’s oversight of state Medicaid agencies. As we have previously reported, states can provide Medicaid coverage for assisted living services under multiple authorities, but most commonly states use an HCBS waiver under section 1915(c) of the SSA. Under these waivers, CMS requires states to develop a quality assurance system that monitors beneficiary health and welfare—including tracking and responding to incidents that may cause harm to a beneficiary’s health and welfare, such as elder abuse. States must demonstrate to CMS that they are meeting these quality assurance obligations in their waiver renewal reports, typically submitted about 2 years before an HCBS waiver is scheduled to end. States must also report summary information annually to CMS on any health and welfare deficiencies occurring under their HCBS waivers. CMS regional offices oversee state compliance with waiver requirements. In addition to state survey agencies, state Medicaid agencies, and the agencies that license and regulate assisted living facilities, there are other entities charged with protecting nursing home and assisted living facility residents from elder abuse. These agencies’ roles and missions can vary by state. For example, Adult Protective Services (APS) programs in each state are generally responsible for identifying, investigating, resolving, and preventing abuse of older adults, and such programs may investigate complaints of elder abuse in nursing homes and assisted living facilities. Additionally, Medicaid Fraud Control Units and local law enforcement can also play a role in investigating elder abuse. Consequently, incident management may be coordinated among multiple separate agencies. Federal requirements include those for nursing homes and state survey agencies specific to reporting, investigating, and notifying law enforcement of elder abuse in nursing homes. For example, federal requirements specify the time frames within which nursing homes must report alleged elder abuse to state survey agencies and, similarly, specify time frames for state survey agencies to report elder abuse to CMS. In contrast, there are no similar requirements for assisted living facilities and, instead, states must establish their own policies to ensure the reporting and investigation of elder abuse in assisted living facilities covered by Medicaid. (See fig. 1 for federal requirements for reporting, investigating, and notifying law enforcement about elder abuse in nursing homes and assisted living facilities.) As illustrated in figure 1, there are key differences between federal requirements for reporting, investigating, and notifying law enforcement about elder abuse occurring in nursing homes compared to assisted living facilities. CMS officials told us that the difference in requirements between nursing homes and assisted living facilities reflects the different regulatory relationship between the agency and the two facility types. According to CMS officials, CMS has direct regulatory authority over nursing homes, but does not have direct authority over assisted living facilities. As noted, states are largely responsible for establishing their own policies for overseeing the reporting and investigation of abuse in assisted living facilities. (See app. I for profiles of selected states with HCBS waivers regarding elder abuse reporting, investigating, and notification.) Differences in federal requirements include the following: Reporting. Federal law and CMS policy define specific time frames for nursing home staff and state survey agencies to report incidents of abuse that occur in nursing homes, respectively, and CMS requires states to establish their own reporting time frames for assisted living facilities serving HCBS waiver participants. Nursing homes must ensure that allegations of elder abuse are reported to the state survey agency immediately, but no later than 2 hours after the allegation is made if the incident involves serious bodily injuries and within 24 hours if it does not. In addition, state survey agencies must report to CMS all complaints and certain facility-reported incidents of abuse through a computer-based complaint and incident tracking system and immediately alert CMS regional offices when an especially significant or sensitive incident occurs that attracts public or broad media attention. In contrast, CMS requires state Medicaid agencies that pay for care in assisted living facilities through HCBS waivers to establish their own required time frames for reporting incidents. Consequently, reporting time frames and processes for assisted living facilities can vary by state. For example, Connecticut requires incidents to be reported to the state Medicaid agency and Adult Protective Services within 2 business days, while Oklahoma requires that initial incident reports are submitted within 1 business day. Investigation. CMS prescribes investigation time frames and priority categories for incidents occurring in nursing homes and requires states to establish their own time frames and priority categories for incidents in assisted living facilities. CMS requires state survey agencies to assess reports of elder abuse in nursing homes and assign a priority investigation status based on the seriousness of the allegations. The required investigation time frames are tied to the priority status. For example, if the allegation indicates that there continues to be an immediate risk of serious injury, harm, impairment, or death of a resident unless immediate corrective action is taken, the survey agency must initiate an onsite investigation within 2 business days of receiving the report. CMS also requires nursing homes to have written policies and procedures for conducting internal investigations of suspected elder abuse and to submit findings from these investigations to the state survey agency within 5 business days of the incident. In contrast, CMS does not prescribe investigation time frames or define priorities for incidents occurring in assisted living facilities; instead, CMS requires that state Medicaid agencies with HCBS waivers establish their own policies for prioritizing reports of abuse and initiating investigations in assisted living facilities. Consequently, investigation time frames and prioritization can vary by state. For example, Connecticut does not specify a process for prioritizing incident investigations in its HCBS waiver, but officials told us the state requires the Medicaid program to initiate an investigation immediately; whereas South Dakota requires face-to- face contact with a victim within 24 hours if the incident is life or health-threatening. Family or Legal Guardian Notification Although the Centers for Medicare & Medicaid Services (CMS) requires facilities to notify a resident’s representative of a deterioration in the resident’s condition, CMS does not require nursing homes, assisted living facilities, state survey agencies, or state Medicaid agencies to notify a victim’s family or legal guardian of alleged elder abuse. However, CMS’s guidance for nursing homes notes the importance of family or legal guardian notification. Specifically, CMS guidance requires facilities to take actions to prevent further harm from occurring to a victim of alleged elder abuse and cites law enforcement notification, as well as family or legal guardian notification as examples of protective measures facilities may take to comply with that requirement. In addition, CMS requires states to develop a policy for notifying participants, family, or legal guardians of the findings of any critical incident investigations under its home and community-based services waiver program. CMS officials told us family or legal guardian notification is generally a state responsibility, and state officials told us that it is largely a facility responsibility governed by the facility’s policies. Some states include family or guardian notification requirements in state guidance on mandatory reporting of elder abuse. In interviews with stakeholders representing consumers and elder abuse investigators we learned that family notification can both help but also pose some privacy challenges. Law enforcement notification. Although federal law requires nursing homes to establish policies for ensuring that law enforcement is notified of elder abuse that occurs in their facilities, and CMS policy requires state survey agencies to notify law enforcement of substantiated findings of elder abuse that occur in nursing homes, these actions are not required when a similar incident occurs in an assisted living facility. Furthermore, CMS also does not require state Medicaid agencies to establish their own law enforcement notification requirements for assisted living facilities as part of the state’s HCBS waiver agreements. CMS and state officials told us that, generally, state agencies coordinate with law enforcement regardless of where the abuse occurs. Some states also require law enforcement notification as part of their state mandatory reporter laws. (See app. I for descriptions of selected state mandatory reporter laws.) For example, Connecticut requires Medicaid waiver program staff members to inform law enforcement of all suspected crimes, including abuse. Both GAO and HHS-OIG have identified, among other things, gaps in notifying law enforcement about abuse in nursing homes and recommended that CMS make changes to help ensure that nursing homes and state survey agencies notify law enforcement. In the course of our review, we found states may align certain requirements for investigating, reporting, and notifying law enforcement about elder abuse in assisted living facilities with federal requirements for nursing homes. Officials from all three selected states in our review told us they apply certain federal nursing home requirements and time frames to assisted living facilities when overseeing reports and investigations of alleged elder abuse. For example, officials from Oklahoma and South Dakota told us they align or are in the process of aligning time frames within which assisted living facilities are required to report incidents of elder abuse to state authorities with the time frames federally required for nursing homes, and said that alignment reduces confusion, especially among facilities that offer both types of residential care. Given its attenuated role in overseeing the reporting, investigation, and law enforcement notification of elder abuse in assisted living facilities, CMS officials told us the agency is taking steps to gather and disseminate best practices to help states better manage their response to elder abuse incidents in assisted living facilities. Specifically, officials told us that CMS has initiated an effort to more closely examine how states operate their incident management systems, which are used to track reports and investigations of elder abuse in assisted living facilities covered by their HCBS waivers. In May 2018, CMS surveyed states requesting information on how those states operate an incident management system for their HCBS waiver programs to track reports and investigations of elder abuse. CMS officials said they will take information learned through the survey as well as through on-site reviews that the agency has been conducting in five states since June 2019, to develop best practices and technical guidance on collecting and reporting critical incidents. We provided a draft of this report to HHS for review and comment. HHS noted that federal oversight of nursing homes and assisted living facilities is not directly comparable given the differences between HHS’s statutory authority to oversee both facility types. HHS noted that although CMS’s oversight of assisted living facilities is more limited, CMS works in partnership with states—through providing guidance, technical support, training, and oversight of states’ quality reporting—to ensure the safety of Medicaid beneficiaries in assisted living facilities. We recognize that CMS is operating in different statutory frameworks with respect to both nursing homes and assisted living facilities, and we have noted the distinction in our report. HHS further noted that CMS is undertaking efforts to strengthen federal oversight of nursing homes and states with HCBS programs, including through addressing our past recommendations. HHS comments are reproduced in appendix III. HHS also provided technical comments, which were incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services, appropriate congressional committees, and other interested parties. The correspondence is also available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. We reviewed state-level requirements for reporting, investigating, and notifying law enforcement about elder abuse in three selected states that cover services in assisted living facilities under their Home and Community-based Services (HCBS) waivers—Connecticut, Oklahoma, and South Dakota. These states are collectively responsible for safeguarding as many as 16,800 assisted living residents—2,751 of whom are covered by Medicaid—from elder abuse. All three states have mandatory reporting requirements that typically require various identified health care providers and facility staff to report suspected elder abuse to adult protective services or law enforcement, regardless of the setting in which the victim was abused or whether the victim is an HCBS waiver participant who would be protected under the Centers for Medicare & Medicaid Services (CMS) program requirements. Further, the states developed guidance for their HCBS programs that establishes additional reporting, investigation, and notification requirements—beyond their mandatory reporting law requirements—that caregivers, facilities, program staff, and state agencies must follow in response to incidents that occur to residents receiving services under Medicaid waiver programs. Selected information about assisted living facilities and state- level requirements for each of the three states is summarized in figures 2 through 4. GAO has issued reports reviewing the Centers for Medicare & Medicaid Services’ (CMS) oversight of the health and welfare of residents in nursing homes and assisted living facilities. For example, selected GAO reports from approximately the past 5 years included a review of the incidence of abuse in nursing homes and a review of what is known about the incidence of abuse in assisted living facilities. Reports often included key recommendations. (See table 1.) In addition to GAO’s audits of federal oversight of nursing homes and assisted living facilities, the Office of Inspector General within the Department of Health and Human Services (HHS-OIG) routinely audits a broad range of both the Centers for Medicare & Medicaid Services’ (CMS) and states’ oversight activities related to long-term care facilities. We identified three HHS-OIG reports issued between 2014 and 2018 that provide examples of HHS-OIG’s examinations of the reporting, investigation, and notification of law enforcement of elder abuse in nursing homes. (See table 2.) Although the specific scope of these reports varied, common findings included gaps in notifying law enforcement. For example, HHS-OIG examined Medicare claims data to identify cases where hospital staff had identified potential abuse and found that nursing homes failed to report many of these incidents to state survey agencies or notify law enforcement despite federal and state requirements and recommended that CMS provide training, clarify guidance, and track referrals to law enforcement. State auditors may also audit their states’ oversight of nursing homes and assisted living facilities. We identified nine reports issued by state auditors between 2014 and 2018 that examined their states’ oversight of elder abuse reporting and investigation across both settings. (See table 3.) Although the scope of individual reports across the states varied, state auditors identified instances of state entities not complying with state or federal requirements for a variety of reasons—including weaknesses in policies and procedures, resource constraints, and information management challenges—and recommended improvements. For example, in 2014 California state auditors found that thousands of complaint investigations—including over 300 classified as immediate jeopardy—were left open for almost a year, in part because the state did not specify time frames for completing investigations. John E. Dicken, (202) 512-7114 or dickenj@gao.gov. In addition to the contact named above, Karin Wallestad (Assistant Director); Jasleen Modi (Analyst-in-Charge); and Elise Pressma made key contributions to this report. Also contributing were Thomas Garloch, Cathy Hamann, Laurie Pachter, and Jennifer Whitworth.", "summary": "The federal government and states share responsibility for the health and welfare of about 1.5 million individuals—most of them vulnerable older adults—receiving long-term care in nursing homes and assisted living facilities covered by Medicare and Medicaid. For nursing homes, which provide skilled nursing care, federal law defines applicable quality standards and CMS provides guidance for nursing homes and the state survey agencies to help protect residents from elder abuse. For assisted living facilities, which provide assistance with activities of daily living in a residential setting, CMS defines the framework states must establish to oversee these facilities if covered under Medicaid. This includes requiring states to demonstrate to CMS that they are assuring quality including the obligation to protect against elder abuse. GAO was asked to review federal oversight of elder abuse reporting, investigation, and law enforcement notification in both nursing homes and assisted living facilities. In this report, GAO describes federal requirements for reporting, investigating, and notifying law enforcement about elder abuse in both types of facilities. GAO reviewed relevant laws and regulations and agency guidance, and interviewed CMS and state officials from three states selected for variation in HCBS waiver program size and geography. GAO also interviewed representatives from national stakeholder groups representing consumers, facilities, Medicaid directors, and abuse investigators. In comments on this report, HHS highlighted the distinct oversight frameworks for the two settings and noted that CMS is undertaking efforts to strengthen oversight. The Centers for Medicare & Medicaid Services (CMS) oversees the Medicare and Medicaid programs and is responsible for safeguarding the health and welfare of beneficiaries living in nursing homes and assisted living facilities. This includes safeguarding older residents from abuse—referred to as elder abuse. CMS delegates responsibility for overseeing this issue to state survey agencies, which are responsible for overseeing nursing homes. When assisted living facilities provide services to Medicaid beneficiaries, they are indirectly subject to CMS oversight through the agency's oversight of state Medicaid agencies. GAO found that there are specific federal requirements for nursing homes and state survey agencies for reporting, investigating, and notifying law enforcement about elder abuse in nursing homes. (See table below). For example, state survey agencies must prioritize reports of elder abuse in nursing homes based on CMS's specified criteria and investigate within specific time frames. In contrast, there are no similar federal requirements for assisted living facilities—which are licensed and regulated by states. Instead, CMS requires state Medicaid agencies to develop policies to ensure the reporting and investigation of elder abuse in assisted living facilities. For example, CMS requires that state Medicaid agencies establish their own policies and standards for prioritizing reports when investigating incidents in assisted living facilities. Officials from the three selected states in GAO's review said they apply certain federal nursing home requirements and investigation time frames for assisted living facilities when overseeing elder abuse.", "document_type": "gao"}
{"report": "The vast majority of the 42 railroads subject to the statutory mandate to implement PTC—including 30 commuter railroads, Amtrak, seven Class I and four Class II and III freight railroads—are implementing one of three types of PTC systems. These systems include the Interoperable Electronic Train Management System (I-ETMS), the Advanced Civil Speed Enforcement System II (ACSES), and Enhanced Automated Train Control (E-ATC). While these PTC systems are functionally similar, the technologies they use differ. For example, to determine a train’s location, ACSES and E-ATC rely on equipment embedded on the track while I- ETMS uses Global Positioning System information. ACSES and E-ATC both supplement existing train control systems to provide all required PTC functionality, while I-ETMS was designed as a new system to provide this functionality. As noted above, testing is one of the many steps to achieving full implementation. Through multiple stages of testing, which are summarized below, railroads must demonstrate that the PTC system meets functional requirements. Laboratory testing: locomotive and wayside equipment testing in a lab environment to verify that individual components function as designed. Field testing: includes several different tests of individual components and the overall system, such as testing each locomotive type to verify that it meets functional requirements and field integration testing—a key implementation milestone to verify that each PTC component is integrated and functioning safely as designed. Revenue service demonstration (RSD): an advanced form of field testing in which the railroad operates PTC-equipped trains in regular service under specific conditions. RSD is intended to validate the performance of the PTC system as a whole and to test the system under normal, real-world operations. Using results from field and RSD testing, combined with other information, host railroads must then submit a safety plan to FRA for system certification and approval. We previously reported that these safety plans have been up to 5,000 pages in length. Once FRA approves a safety plan, the railroad receives system certification, which is required for full implementation, and is then authorized to operate the PTC system in revenue service. According to FRA officials, the FRA may impose conditions to the PTC safety plan approval as necessary to ensure safety, resulting in a conditional certification. Interoperability is achieved when the locomotives of any host railroad and tenant railroad operating over the same track segment can successfully communicate with and respond to the other railroad’s PTC system, allowing uninterrupted movements over property boundaries. For example, when a locomotive enters another railroad’s territory as a tenant, it immediately needs information about the upcoming track—such as any temporary speed restrictions in place due to track work (see fig. 1). To achieve interoperability, railroads have to complete a series of steps including (1) additional installation work (such as installing equipment on a tenant railroad’s locomotives) and scheduling (such as coordinating with the relevant railroad to reach any needed agreements and identify dates for testing), (2) laboratory testing, (3) field testing, and (4) RSD or revenue service operations. Many railroads will complete much of the implementation for their own PTC systems, such as starting RSD on some or most of their track, before they begin to take steps to achieve interoperability with other railroads. However, a railroad can take steps to achieve interoperability with other railroads while simultaneously completing field testing or other stages of testing on its own PTC system. FRA is responsible for overseeing railroads’ implementation of PTC, and the agency monitors progress and provides direct assistance to railroads implementing PTC. For example, each railroad had to develop an FRA- approved PTC implementation plan that includes project schedules and milestones for certain activities, and a railroad is required to report quarterly and annually to FRA on its PTC implementation status relative to its implementation plan. FRA also provides technical assistance to railroads, addresses questions, and reviews and approves railroads’ documentation, including test and safety plans. FRA has a national PTC project manager, designated PTC specialists in the eight FRA regions, and approximately a dozen engineers, test monitors, and other staff responsible for overseeing technical aspects of implementation. FRA also has oversight tools, which includes authority to impose civil penalties when a railroad fails to meet certain statutory PTC requirements. Since 2017, FRA reports that it has assessed nearly $400,000 in civil penalties against railroads that failed to comply with their implementation plan milestones or reporting requirements. Since the end of 2018, some railroads have reported making progress on testing and implementation of their own PTC systems. Figure 2 shows the 42 railroads’ reported progress by PTC implementation stage. Six railroads—two Class Is and four commuters—reported to FRA that they had implemented PTC on all of their own territories but had not completed interoperability as of March 31, 2019, and almost all these railroads reported being in this stage at the end of 2018. In addition, as of March 31, 2019, no additional railroads beyond the four that were complete at the end of 2018 reported reaching full implementation. Nearly all railroads still implementing PTC plan to reach full implementation in the last quarter of 2020, based on our analysis of railroads’ extension requests. Few railroads reported moving into RSD during the first quarter of 2019, and the extent of RSD testing being conducted by railroads in this stage varied considerably. Of the 19 railroads that reported RSD testing on some portion of their own track as of March 31, about half (9 of 19) reported RSD testing on more than 75 percent of their total route miles, while about a quarter (5 of 19) reported RSD testing on less than 25 percent of their total route miles. RSD testing also varied between Class I railroads and commuter railroads. On average, the 5 Class I railroads in this stage reported RSD on 86 percent of route miles, while commuter railroads reported an average of 39 percent of route miles in RSD. Moreover, based on our analysis, 11 railroads—7 commuters and 4 Class II and III railroads—reported that they remained in field testing as of March 31, 2019. Similar to railroads in RSD testing, the extent of field testing reported by railroads varied. Of the 11 railroads in field testing, most (7) reported field testing on the majority or all of their route miles, whereas 4 railroads—all commuters—reported conducting field testing on less than half of their route miles. Based on railroads’ responses to our questionnaire, railroads’ PTC implementation status did not change significantly as of May 31, 2019; two additional railroads—both commuters—began RSD testing on some portion of their track, and one commuter railroad began field testing. As of March 31, 2019, 11 of the 31 host railroads that must have interoperable PTC systems reported to FRA that they had achieved interoperability with at least 1 of their tenant railroads. Collectively, of the 227 unique host-tenant relationships that require interoperability, FRA reported that railroads had achieved interoperability for 38 (17 percent) of these relationships. The number of tenants each railroad must work to achieve interoperability with ranges from 1 to 31 railroads, based on railroad reports to FRA. For example, Class I railroads, as host railroads, average about 18 tenants, while commuter railroads average about 3 tenants. A railroad does not generally start work to achieve interoperability with all the railroads it interoperates with at once, according to FRA; instead a railroad will prioritize its interoperability work. For example, representatives from one Class I railroad we interviewed said it prioritized achieving interoperability in the following sequence: first with commuter-railroad tenants given the need to ensure passenger safety; second with other Class I railroads given the high total miles of track they share; and finally with smaller Class III railroads. In addition, a railroad may be in multiple interoperability steps (e.g., installing, testing) with different tenants at the same time. FRA counts a relationship as having achieved interoperability if the tenant is operating PTC on all of the host’s track miles. This binary measure for interoperability—that is, achieved or not—does not describe the extent to which railroads have started work on interoperability or, according to representatives from two railroads we interviewed, reflect when interoperability has been achieved along most but not all of its host’s track. Railroads reported to FRA that they had begun work on interoperability for more than 90 percent of the remaining host-tenant relationships that need to achieve interoperability. In particular, based on their quarterly reports, railroads were installing for 82 host-tenant relationships and testing for 89 host-tenant relationships as of March 31, 2019. Overall, the status of interoperability work did not vary much among Class I, commuter, and Class II and III railroads. FRA officials and others we spoke with could not provide an estimate of how long it takes on average for two railroads to complete the individual steps to achieve interoperability. Representatives from industry associations we interviewed said that it can vary. An FRA specialist we interviewed agreed, explaining that interoperability field testing, for example, varies based on track availability. One railroad might complete testing in 4 days while another railroad might need weeks because it can only test at specific times. In its quarterly reports, FRA asks host railroads to provide the scheduled date for completing interoperability testing with each tenant railroad. As of March 31, 2019, seven railroads reported that they did not anticipate completing interoperability testing with at least one tenant until the last quarter of 2020. In responding to our May 2019 questionnaire, most railroads reported that vendor and software issues remain major or moderate challenges for PTC implementation. As part of our ongoing work related to PTC, we have reported that railroads have faced challenges associated with the limited number of vendors that design PTC systems, provide the software and hardware, and conduct testing. However, as representatives of half of the railroads we interviewed emphasized, vendor and software issues are more acute now because as the 2020 deadline nears, less time remains to address these issues and associated delays. Software and vendor issues can be interrelated as a small pool of vendors develop and update the software that supports railroads’ PTC systems. Representatives from several railroads and FRA specialists we interviewed said that software issues routinely arise in lab testing, field testing, and RSD that require vendor revisions before a railroad’s PTC implementation can continue. For example, representatives from one railroad said that existing software defects affecting its PTC system must be addressed and a new version of the software is needed before they can start RSD. They added that they had no control over this process, as they must rely on the vendor to provide reliable software. Representatives from this railroad also noted that resolving software issues is often not entirely within a railroad’s control due to the need for vendor support, in contrast to some earlier challenges leading up to the 2018 deadline, where, for example, the railroad itself had more control as it was installing equipment and could more clearly track progress. Moreover, the limited supply of vendors and high demand for services as railroads work simultaneously to implement PTC by the 2020 deadline continue to pose problems. For example, representatives from one railroad said their vendor has consistently had issues meeting milestones and delivering on its commitments. Representatives from a small railroad said they had limited internal resources to implement PTC, making the railroad’s progress heavily reliant on its vendor. Representatives from two other railroads and FRA officials also highlighted implementation delays caused by recalls for some locomotive equipment, which has caused additional work for railroads as well as the vendor. Specifically, the equipment had to be removed, sent in for repair, and then re-installed. More than half of the railroads implementing PTC also responded to our questionnaire that interoperability was a major or moderate challenge. Railroads said that interoperability can be complicated by software issues and coordinating host and tenant railroad schedules, when asked to describe the biggest challenges to achieving interoperability. Fifteen railroads specifically mentioned software issues, and representatives from several railroads noted that interoperability will require reliable software. For example, one railroad reported that certain software functionality remains to be developed, tested, and implemented to facilitate interoperability and to address software reliability issues that have caused system disruptions. Also, 14 railroads noted that scheduling time with other railroads to begin interoperability testing can be cumbersome and time consuming. For example, several railroads that we interviewed and that responded to our questionnaire said that scheduling can be complicated by whether other railroads have made enough progress on their own PTC implementation to begin work on interoperability. According to FRA officials, interoperability challenges also differ across PTC systems and geographic areas. Below, we use the Northeast Corridor and the Chicago metropolitan area—where most railroads are implementing ACSES and I-ETMS, respectively—to illustrate the challenges faced in working to achieve interoperability. However, railroads in other areas or implementing other PTC systems may face some of these same challenges or face additional different challenges. Over a dozen railroads operating on the Northeast Corridor and in the surrounding area are required to implement PTC. The Northeast Corridor runs from Washington, D.C., to Boston, Massachusetts, and Amtrak predominantly owns track on the corridor. Eight commuter railroads, Amtrak, and most freight railroads are implementing a form of the ACSES system on at least a portion of their equipment and track. In some cases, railroads in the Northeast will be operating two different PTC systems concurrently on the same track, which will add to the complexity of interoperability, according to FRA. Examples of interoperability challenges faced in the Northeast include: Software issues. PTC software presents particular challenges in the Northeast because software is being supplied by multiple vendors and has been developed to accommodate railroads’ existing systems that have different configurations. Therefore, according to FRA officials, ACSES does not have a common set of requirements or specifications. Also, even if two railroads use the same vendor for their locomotive equipment or software, each railroad may use a different version of software. In addition, representatives from two railroads that operate in the Northeast told us they built different software functionality into their PTC systems to accommodate their own operations, so additional work is needed to resolve such differences to achieve interoperability. In light of these software issues, representatives from one industry association and one railroad we interviewed said that Northeast Corridor railroads are discussing creating a software management process to aid interoperability. Boundary issues. A train needs to seamlessly operate PTC when it crosses the boundary between two railroads’ territories, as previously described. According to a rail industry association, as of June 2019, there are about 20 boundaries on the Northeast Corridor where more work is needed to ensure seamless operation. FRA officials and one industry association said boundary issues are complex and time- consuming to resolve but not insurmountable. For example, FRA officials said a railroad could install its own equipment such as transponders and wayside devices across the boundary to create an overlap between their system and that of the other railroad. Securing PTC wireless communication. FRA requires that PTC wireless railroad communications be encrypted. However, a solution that aims to encrypt all PTC wireless communication and data transmittal among railroads operating ACSES in the Northeast is currently in lab development. In August 2016, Amtrak received a grant from FRA to create this solution for ACSES. Amtrak originally planned to implement this solution in December 2018, but Amtrak has experienced delays and currently estimates that it will implement the solution by January 2020. However, Amtrak has reported several risks that it will need to overcome to meet this implementation deadline. Further delays could affect railroads’ ability to fully implement PTC in the Northeast by the December 2020 deadline. FRA noted it will continue to monitor and support the railroads as they implement security measures in the Northeast. Ten I-ETMS railroads that operate in the greater Chicago metropolitan area received extensions to implement PTC. Throughout PTC implementation, FRA, industry associations, and railroads have identified Chicago as a place where interoperability would be challenging due to the dense freight, passenger, and commuter operations in the area. Examples of such challenges include: Software issues. According to FRA and railroads we interviewed, software issues have slowed interoperability work by railroads implementing I-ETMS. The underlying problem is the memory available on the locomotive equipment, which is needed to store its railroad’s track data, according to FRA and railroads we interviewed. To be interoperable, the locomotive equipment also needs to store and exchange multiple railroads’ track data, causing the memory to fill up very quickly. According to railroad representatives, memory limitations for I-ETMS locomotive equipment prohibited railroads with large track data files—mainly the Class I freight railroads—from being able to interoperate. The vendor for this equipment has been working on a software solution for this problem, and according to a few railroads we interviewed, the vendor delivered an interim software solution in March 2019 that allowed the four largest Class I railroads to achieve interoperability. However, this software was delivered 7 months later than initially planned, and an additional software solution is still needed to allow the locomotive equipment’s memory to store the data of all railroads operating I-ETMS, according to representatives from two railroads and an industry association we interviewed. Other technical issues. Railroads in the Chicago area conducted modeling to help ensure that sufficient communications capacity (e.g., spectrum and radio capacity) would be available to support PTC interoperability in the region. According to one industry association, while actual PTC operations in the area are minimal right now relative to full expected operations, railroads must continue to monitor the communications capacity as more railroads progress with their own PTC implementation and start to interoperate. For example, railroads may have to re-engineer their radio networks, such as re-routing certain communications through different radio towers and other network connections, if issues are subsequently identified. Scheduling interoperability work with other railroads. Within the Chicago area, the total number of railroads and the number of railroads that have to be interoperable on a single line complicates interoperability. Chicago is the busiest rail hub in North America and handles one-fourth of the nation’s freight rail traffic. Nearly 500 freight trains and over 700 passenger trains travel through the area on tracks owned by several different railroads every day. For example, one commuter railroad, for one of its lines, operates over track owned by four host railroads that alternates with its own track. Achieving interoperability for this line will involve sequencing and scheduling with multiple railroads to activate PTC along the entire line, including across the numerous boundaries between different railroads’ territories, according to representatives from that railroad. According to one FRA specialist, work to achieve interoperability in the Chicago area will ramp up in late 2019 or early 2020. As a result, many railroads will have to coordinate schedules to sequence interoperability work across the dozens of host-tenant relationships in the area. FRA officials told us that the agency continues to provide assistance to railroads on interoperability and to support railroads through the testing process. In summer 2019, FRA began an effort to meet with all freight, non-Class I tenant railroads that have to be interoperable with host railroads required to implement PTC. FRA officials said they will use meetings with these 72 individual tenant railroads to discuss PTC requirements and review the railroads’ plans for implementing PTC with their host railroads. FRA officials said they have also continued to meet regularly with railroads still in field testing or starting RSD on their own PTC systems. For example, FRA officials said the agency meets weekly or monthly with each railroad that has not yet initiated RSD to provide targeted technical assistance to resolve any issues. FRA and representatives from one railroad also told us that FRA has met with vendors to discuss specific equipment or software issues and to stress the importance of resolving these issues. FRA also participates in meetings held by the railroad industry’s PTC working groups, including those focused on the Northeast Corridor and Chicago area, as needed. In addition, FRA officials told us that they are working with industry to improve the safety plan review process. Specifically, according to a June FRA presentation, FRA is working with two railroads and an industry association to create templates for streamlined, more consistent safety plans for two types of PTC systems—I-ETMS and E-ATC. The goal of the template is to reduce the burden on both railroads and FRA by using a shorter format and, where possible, relying on standardized system documents. FRA officials anticipate that the templates will be ready for other railroads to use in fall 2019. In addition, FRA has contracted for help in reviewing safety plans. However, representatives from four railroads and two industry associations we interviewed noted that they remained concerned about the amount of time it has taken FRA to review safety plans. FRA reported in February 2019 that it took on average 331 days to review a safety plan. While it is too early to determine the effect of FRA’s efforts to improve the safety plan review process, much work remains for FRA in the next 18 months. According to FRA, 23 railroads will be submitting safety plans in the next 12 months. While FRA has conditionally certified 13 PTC systems as of March 31, 2019, these railroads, too, are required to continue to work with FRA to provide additional documents to respond to FRA’s conditions. Some of these railroads also plan to resubmit safety plans for FRA to review, hoping to receive an unconditional certification before the December 2020 deadline. In March 2018, we reported that railroads had expressed a need for additional clarification about applying for an extension and that FRA could provide more consistent information to railroads. We recommended that FRA identify and adopt a method for systematically communicating extension-related information to railroads. In 2018, FRA held three symposiums for railroads to consistently communicate information to help railroads prepare to qualify for an extension and to understand what was required to have a fully implemented PTC system. FRA held two similar sessions in February and June 2019. Representatives from most of the railroads we interviewed (six of eight) said they have been happy with the communication with FRA, via these sessions as well as regular meetings with FRA’s PTC field specialists and other staff. For example, representatives of two railroads said it was helpful to have the FRA Administrator attend the sessions with railroads and talk directly to railroad representatives. In addition, clarity of information from FRA was the lowest rated challenge in response to our questionnaire, with 29 railroads reporting this as a minor challenge or not at all a challenge. While FRA has made improvements, the extended 2020 deadline for full PTC implementation is less than 18 months away, and FRA and railroads have substantial work to complete and challenges to address before that deadline. Moreover, unlike the 2018 deadline, no additional extensions are available beyond December 2020. In March 2018, we recommended that FRA develop an approach to use the information it gathers on railroads’ PTC implementation progress to prioritize the allocation of resources to address the greatest risk. FRA agreed with this recommendation, and while FRA officials have described testing and interoperability as areas of focus in 2018 and 2019, they have not articulated or demonstrated how, within these broad areas, they are monitoring risk and prioritizing resources. For instance, FRA plans to meet with all 72 tenant railroads in over 30 meetings rather than use the data it collects from host railroads to target this outreach. In addition, while FRA will have to review dozens of new and resubmitted safety plans in the coming months, FRA officials have not identified how they will prioritize these reviews relative to other reviews (e.g., other documentation that railroads submit as they continue testing on their own systems and for interoperability). According to FRA, it has communicated to railroads in industry-wide meetings that conditional certification for a PTC system is generally sufficient to meet the statutory requirement for full implementation; FRA noted this would only not be sufficient if a railroad’s PTC system did not otherwise meet the technical requirements in regulations and one or more of the conditions related to such non-compliance. However, representatives from two railroads we interviewed also said it was unclear whether conditional certification would be enough for a railroad to comply with the 2020 deadline, and uncertainty remains about which conditions must be addressed to meet the statutory requirement for full implementation. Related to system certification, representatives from three railroads and one industry association we interviewed also said FRA still needed to clarify how it would handle situations where a host or tenant railroad is not fully implemented by the 2020 deadline. Although the FRA Administrator has publicly said he will enforce the implementation deadline (which is December 31, 2020, for most railroads) and recommend assessing the maximum civil penalty against a railroad that did not meet its deadline, FRA has not clarified if this would apply in situations where a host or tenant relationship affects another railroad’s implementation. We continue to see value in FRA developing a risk-based approach to allocating its limited resources and will continue to monitor FRA’s actions on this recommendation. Going forward, FRA will also need to transition to overseeing PTC as a routine part of railroad operations after the 2020 deadline. Similarly, railroads will need to transition from implementation—largely done by contractors—to operating and maintaining their own PTC systems. Several railroads, in response to our questionnaire, said that they anticipate difficulties funding ongoing operations and maintenance as well as managing software and other updates. Therefore, December 31, 2020, represents not only the deadline for full PTC implementation but also a point after which railroads and FRA will face a new operational and oversight environment. Chairman Wicker, Ranking Member Cantwell, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Susan Fleming, Director, Physical Infrastructure at (202) 512- 2834 or FlemingS@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Susan Zimmerman (Assistant Director); Katherine Blair Raymond; Delwen Jones; Emily Larson; Joanie Lofgren; Shannin G. O’Neill; Josh Ormond; Madhav Panwar; Marcus Robinson; Maria Wallace; Crystal Wesco; and Elizabeth Wood. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Forty-two railroads are currently subject to the statutory mandate to implement PTC, a communications-based system designed to automatically slow or stop a train that is not being operated safely. Railroads were required to implement PTC by December 31, 2018, but would receive extensions up to December 31, 2020, if specific statutory requirements were met. GAO was asked to review railroads' PTC implementation progress. This statement discusses (1) railroads' implementation progress and any related implementation challenges and (2) FRA's plans for overseeing railroads' implementation. GAO analyzed railroads' most recent quarterly reports covering activities through March 31, 2019; received responses from all 42 railroads on a brief questionnaire; and interviewed officials from FRA and 8 railroads, selected to include variation in implementation status and type of railroad, among other criteria. Amtrak, commuter railroads, and freight railroads continue to make progress implementing positive train control (PTC), but significant work remains to achieve interoperability among the railroads' individual PTC systems. Since the end of 2018, many railroads reported making progress on testing and implementation of their own PTC systems. Four railroads reported reaching full implementation as of March 31, 2019, the same number in this stage at the end of 2018. However, many railroads remained in earlier stages of implementation, such as the 11 railroads that reported being in field testing. Nearly all railroads plan to complete full PTC implementation in the last quarter of 2020. Full implementation with interoperability is achieved when the PTC system on the locomotive of a “tenant” railroad and the PTC system of a “host” railroad whose track is being used can successfully communicate, allowing uninterrupted movements over property boundaries. As of March 31, 2019, 11 of the 31 host railroads that must have interoperable PTC systems reported that they had achieved interoperability with at least 1 of their tenant railroads. Collectively, 38 of the 227 unique host-tenant relationships that require interoperability have been completed (17 percent), according to the Federal Railroad Administration (FRA). Most railroads reported to GAO that vendor and software issues were currently major or moderate challenges for PTC implementation. Over half of railroads also reported that interoperability was a major or moderate challenge, and can be complicated by software issues and coordinating host and tenant schedules, among other issues. For example, one railroad said that certain software functionality still had to be developed, tested, and implemented to address reliability issues and facilitate interoperability. FRA continues to provide assistance and support to railroads on PTC interoperabilty and the testing process, but workload challenges for the agency persist. FRA will continue to face a substantial workload through 2020 as it oversees railroads' PTC implementation and reviews documents, including lengthy safety plans required for railroads to obtain PTC system certification. While FRA officials have described supporting interoperability and testing as areas of focus, they have not demonstrated how, within these broad areas, they are monitoring risk and prioritizing resources, as GAO recommended in March 2018. GAO continues to see value in FRA developing a risk-based approach to allocate its resources to oversee PTC. In March 2018, GAO recommended FRA take steps to systematically communicate information to railroads and to use a risk-based approach to prioritize agency resources and workload. FRA concurred with these recommendations. FRA has taken actions to systematically communicate information to railroads. GAO will continue to monitor FRA actions with regard to allocating agency resources to oversee PTC.", "document_type": "gao"}
{"report": "In February 2011, Boeing won the competition to develop the Air Force’s next generation aerial refueling tanker aircraft, the KC-46. The KC-46 is to be equipped with subsystems that allow for two types of refueling—(1) a refueling boom that is integrated with a computer-assisted control system, and (2) a permanent hose and drogue refueling system. This dual refueling capability is an enhancement over prior tanker aircraft because it enables the KC-46 to use boom refueling for Air Force aircraft and drogue refueling for Navy or allied aircraft on a single flight. The majority of legacy tankers, such as the KC-135s, were configured for only one of these types of refueling and had to land and be reconfigured to use the other refueling system. During boom refueling, an operator on the KC-46 tanker aircraft extends the boom—a rigid, telescoping tube—and inserts it into a receptacle on the aircraft being refueled. The KC-46 also has a remote vision system, which consists of a display, cameras, and computer processors, in lieu of a window that legacy tankers use. The system allows operators to observe the position of the boom and the receiving aircraft, and to reposition the fuel delivery system to facilitate refueling. In contrast, during drogue refueling, an operator uses the hose and drogue system— comprised of a long, flexible refueling hose and a parachute-like metal basket that provides stability—to provide fuel to receiver aircraft. Drogue refueling is available via the centerline drogue system in the middle of the tanker aircraft or via wing aerial refueling pods located on each wing. While refueling with the drogue or wing aerial refueling pods, the operator uses the remote vision system to identify when to extend or reel in the hoses. The wing aerial refueling pods can be used for simultaneous refueling of two Navy or allied aircraft—an enhanced capability that only 20 of the 414 KC-135 tankers currently have the capability to do. Figure 1 shows the boom and drogue refueling subsystems on the KC-46. The KC-46 tanker is a commercial derivative aircraft that is based on Boeing’s commercial 767 aircraft. To convert a 767 to a KC-46 tanker, Boeing modified the aircraft design in two phases. In the first phase, Boeing changed the design of the 767 to include a cargo door, new fuel tanks, and an advanced flight deck display borrowed from the 787 aircraft. This baseline non-military aircraft is called the 767-2C and is being built on Boeing’s existing 767 production line. In the second phase, Boeing added military systems to the 767-2C and brought it to a KC-46 configuration in a separate Boeing modification facility. The completed KC-46 aircraft are then taken to a test and delivery center for Air Force acceptance. By using a commercial derivative aircraft, the Air Force intended to avoid the long process and costs associated with designing, testing, and evaluating a new aircraft. It also wanted to reap the benefits of decades of reliability upgrades Boeing made to the aircraft for commercial customers, an established commercial infrastructure for spare parts, and maintenance and training data needed for sustainment that have been validated and verified by the commercial industry, among other things. According to an Air Force Policy Directive in place at the time of contract award, programs that are based on commercial derivative aircraft are required to achieve Federal Aviation Administration certification to the maximum extent practical. The Air Force went further and required the contractor to exhaust all possible solutions to obtain Federal Aviation Administration certification on both commercial and military-unique parts—including the boom, centerline drogue system, and wing aerial refueling pods—before seeking military certification. The Federal Aviation Administration previously certified the airworthiness of Boeing’s 767 commercial passenger airplane (referred to as a type certification), and in December 2017, awarded the amended type certificate for the 767-2C aircraft to Boeing. The amended type certificate allowed Boeing to use the 767-2C aircraft as the baseline non-military aircraft for the KC-46. Then, in September 2018, the Federal Aviation Administration certified the design of the KC-46 with a supplemental type certificate. The supplemental type certificate signifies the Federal Aviation Administration’s approval of the KC-46’s airworthiness, including mission systems such as its aerial refueling components. According to program officials, the Air Force granted a limited duration airworthiness certification for the KC-46 in November 2018 to support the initial fielding, which they said is common for new aircraft. The Air Force is continuing testing to obtain a military type certification from the Air Force Engineering Directorate, expected in several years. See figure 2 for a depiction of the conversion of the 767 aircraft into the KC-46 tanker with the boom deployed and the Federal Aviation Administration’s airworthiness certificate needed at each stage. During development, Boeing is expected to prove the aircraft’s design and demonstrate that the aircraft performs as expected. This type of testing is referred to as developmental testing. This testing was originally planned to occur within a 15-month window starting in early 2015 and ending in 2016. Initial operational test and evaluation—expected to occur after developmental testing and referred to in our report as operational testing—is conducted on production aircraft, or production representative articles. During this testing, the Air Force determines whether systems are operationally effective and suitable to support a full-rate production decision. The Air Force obtained a military flight release in November 2018, which allows it to start operational testing. To support operational testing, the Air Force is undertaking testing to certify the KC-46 to refuel various receiver aircraft, such as the F-15 fighter and B-52 bomber. After the first four KC-46 aircraft are delivered and two receiver aircraft are certified for refueling, the Air Force will begin operational testing. The Air Force awarded Boeing a fixed-price incentive (firm target) contract to develop the KC-46, which includes the design, manufacture, and delivery of four test aircraft. Barring any changes, the contract specifies a ceiling price of $4.9 billion for Boeing to develop the first four aircraft. Once that price was reached, Boeing would assume responsibility for all additional costs for developing those aircraft. The Air Force used a fixed-price incentive development contract because KC-46 development was considered to be a relatively low-risk effort to integrate mostly mature military technologies onto an aircraft designed for commercial use. The contract limits the government’s financial liability and provides the contractor incentives to reduce costs to earn more profit. The contract specifies a 60/40 incentive ratio for sharing savings in the event of underruns, or sharing costs in the event of overruns in relation to the target cost. The government’s share is 60 percent, while Boeing’s is 40 percent. Cost sharing ends when the contract price reaches the $4.9 billion ceiling. Thereafter, Boeing is responsible for all additional costs associated with the overruns. The contract also specifies that Boeing must correct any deficiencies and bring development and production aircraft to the final configuration at no additional cost to the government. In addition, the contract includes options for Boeing to manufacture 175 aircraft with firm-fixed-price contract options for the first two production lots, and options with not-to-exceed fixed prices for production lots 3 through 13. For purposes of this report, a production lot refers to a set number of aircraft that must be built and delivered in a given time frame and procured with a specific year of budget funding. The original contract required Boeing to deliver 18 operational aircraft, nine sets of wing aerial refueling pods, and two spare engines by August 2017. The Under Secretary of Defense for Acquisition, Technology and Logistics approved the KC-46 program to enter low-rate initial production in August 2016. Originally, the Air Force planned for the first two production lots to be low-rate production lots. The 19 aircraft associated with these two lots, or 11 percent of the 175 production aircraft, were to be built concurrent with developmental flight testing. The Office of the Under Secretary of Defense for Acquisition, Technology and Logistics approved additional low-rate production lots—lots three through five—in 2016 and 2017 to avoid interrupting the planned production of additional aircraft. As we have reported over the past several years, Boeing had problems developing the aircraft, which resulted in schedule delays and a decision by Boeing and the program office to separate the delivery of the first 18 aircraft from the delivery of the first nine sets of wing aerial refueling pods. As of March 2019, the Air Force has exercised options for the first four low-rate production lots, for 52 aircraft totaling about $7.8 billion. As a result, the number of aircraft being produced concurrent with developmental flight testing has increased to 52 aircraft, or 30 percent of the total number Air Force expects to purchase. Traditionally, the Department of Defense tracks concurrency to determine financial risk to the federal government; however, in this case, due to the terms of the development contract, the government’s liability was limited to sharing in cost overruns only up to the contract’s ceiling price. Figure 3 shows the number of aircraft the Air Force plans to procure in each lot. The KC-46 program’s cost estimates have remained lower than initially estimated, consistent with our past reports. The KC-46 program’s total acquisition cost estimate is currently about $43 billion, or about $9 billion lower than the original 2011 estimate. The Air Force was able to decrease its cost estimate in large part because funds set aside for potential design changes were not needed. After a 3-year delay from the original plan, the Air Force began conditionally accepting the first seven KC-46 aircraft in early 2019. The KC-46 program’s total acquisition cost estimate remains lower than the initial estimate, consistent with our April 2018 report. As of January 2019, the Air Force estimates that the total program acquisition cost for the KC-46, which includes development, procurement, and military construction costs, will be about $43 billion. This is about $9 billion, or 17 percent, less than the original estimate of $51.7 billion made in 2011. Correspondingly, the average acquisition cost of each aircraft has also decreased by 17 percent because aircraft quantities have remained the same. Table 1 provides a comparison of the initial and current quantity and cost estimates. The estimates include, among other things, the expected costs of the development and procurement contracts awarded to Boeing, government test and evaluation costs, program office expenses for advisory and assistance services from support contractors, as well as contingency funding that might be needed to address the potential risk of requirements changes or other unexpected issues. Overall, the Air Force decreased its development and procurement cost estimates by about $1.3 billion and $6 billion, respectively. As we have previously reported, the main reason for the decrease is it has not needed the large amount of contingency money the Air Force included in the initial estimates for possible requirements changes. Military construction cost estimates also decreased by about $1.4 billion as the Air Force decided, for example, to reuse existing facilities at its operating bases rather than build new ones. In contrast, as of February 2019, Boeing representatives estimate that costs to complete development have increased to about $6.2 billion, or about $1.3 billion over the contract ceiling price of $4.9 billion, due to development problems. Specifically, Boeing experienced problems related to wiring the aircraft, design issues with the fuel system components, a fuel contamination event that corroded the fuel tanks of one of the development aircraft, and test delays. According to the fixed- price incentive contract, the government is generally not responsible for these additional costs to the extent they exceeded the ceiling price of the development contract. The Air Force conditionally accepted the first seven KC-46 production aircraft between January and March 2019, about 3 years later than originally planned, with three critical deficiencies related to the refueling subsystems. Although the federal government generally has no obligation to accept work that does not meet contract requirements, program officials told us that the Air Force negotiated minimum specifications under which it would begin conditionally accepting aircraft. Officials told us that among other benefits, conditionally accepting these aircraft provides the Air Force additional military capability and the aircraft can be used to start operational testing. These aircraft are among the 18 aircraft required by the original contract. As of April 2019, Boeing was producing the remaining 45 additional aircraft associated with the first four low-rate initial production lots. Some of the aircraft just started production on Boeing’s 767 production line. Others are further along and being modified to become KC-46 aircraft in a separate facility, or are being tested and taken to the delivery center for Air Force acceptance. Still others are in storage, either waiting to be transferred to the KC-46 modification center to be retrofitted with the latest wiring configuration or transferred to the delivery center to prepare for Air Force acceptance. Figure 4 shows where these 45 aircraft are in Boeing’s production and delivery process, along with the seven aircraft already delivered. Boeing is not expected to meet its most significant delivery requirement so far until mid-2020, 34 months after originally planned and almost 20 months later than we found in April 2018. Specifically, program officials anticipate that the Air Force will accept the first 18 aircraft by August 2019, and nine sets of wing aerial refueling pods by June 2020—which together with two spare engines constitute the contractual delivery requirement contained in the development contract. According to program officials, Boeing continued to have difficulty providing design documentation needed to start Federal Aviation Administration testing for the wing aerial refueling pods over the past year, which caused the additional delays beyond what we reported last year. Figure 5 shows the original and current delivery schedules for completing the development contract requirement. In February 2019, the Air Force stopped accepting KC-46 aircraft from Boeing because it had identified foreign object debris, including tools, in aircraft it had already accepted, as well as in the aircraft that were in the final stages of acceptance. Boeing issued a corrective action plan outlining steps the company needed to take to improve its foreign object debris identification and prevention activities before the Air Force would accept additional aircraft. Some of the steps included conducting daily inspections of each aircraft for foreign object debris, having Boeing production personnel submit lost tool reports to their superiors, and developing strategies for containing the debris issue, such as only taking the exact amount of small parts needed for an individual job in the aircraft build. The Air Force began accepting aircraft again after Boeing took steps to address the problem. However, in March 2019, Boeing found additional foreign object debris as it was conducting its newly implemented daily inspections and the Air Force suspended deliveries again. Boeing implemented additional corrective actions to the Air Force’s satisfaction and, as of April 2019, the Air Force has authorized the resumption of KC-46 deliveries. Program officials stated that Boeing is responsible for the costs to inspect and remove foreign object debris from aircraft that have already been accepted and that are in various stages of the Boeing manufacturing process. Because of the delivery delays to date and other factors in the existing tanker fleet, an Air Mobility Command official said leadership is currently planning to fly and maintain some legacy KC-135 tankers longer than planned until the KC-46 is available to conduct missions. According to the official, the Air Force plans to reallocate $57 million in fiscal year 2020 funds from the KC-46 program to the KC-135 program to support this decision. The funding would cover the cost to fly and sustain some KC- 135 aircraft above what the Command had planned, including the associated personnel costs. Air Mobility Command officials said that decisions about retaining some legacy KC-135 aircraft will be reviewed annually thereafter. If these aircraft are retained, funding would be reallocated from the KC-46 program to support the decision. The program continues to expect that the KC-46 aircraft will ultimately meet its high-level system performance goals, such as those related to aerial refueling and operational availability. However, the Air Force and Boeing expect that the critical deficiencies that could affect the aircraft’s aerial refueling operations will take several years to address at a cost to both the government and Boeing. Program officials reported that, similar to what we reported last year, they expect the KC-46 will ultimately meet all of its 21 performance goals. These goals include nine key performance parameters and five key system attributes set by the Air Force, as well as seven technical performance measures Boeing established to track its own progress toward meeting contract specifications. Appendix I provides a description of each of the performance goals. According to Air Force test officials, the program plans to ascertain if the aircraft meets its 14 key performance parameters and key system attributes during the operational test period, which began in May 2019. For example, the Air Force will test the tanker’s ability to effectively refuel receiver aircraft with boom and drogue refueling on the same mission. The Air Force will also collect data to assess the operational availability of the aircraft. Operational availability is defined as the percentage of time the aircraft is available to complete its mission, which includes refueling aircraft or transporting cargo or people, when needed. The KC-46 needs to be available at least 80 percent of the time. Air Mobility Command officials will continue to monitor operational availability of the aircraft after it has been fielded to inform maintenance and future upgrade decisions. An important key system attribute is reliability and maintainability, which has implications on aircraft availability and life cycle costs. In general, aircraft that are reliable and easy to maintain are typically available more often to perform missions and can experience lower life cycle costs. To help assess this key system attribute, the Air Force set a reliability growth goal that is based on the mean time between unscheduled maintenance events due to equipment failure. This is defined as the total flight hours divided by the total number of incidents requiring unscheduled maintenance. The goal is 2.83 flight hours between unscheduled maintenance events due to equipment failure by the time the aircraft reaches 50,000 flight hours. As of February 2019, the program had completed 3,928 flight hours, achieving 2.51 hours at that time. Program officials believe that the reliability will improve as additional flight hours are completed and as unreliable parts are identified and replaced. According to Boeing representatives, the company met or is projected to meet the seven technical performance measures it tracked during KC-46 development. For example, the aircraft is now below the target weight of 204,000 pounds. In addition, program officials said that the aircraft is within the range of gallons of fuel used per flight hour that is specified in the contract. Boeing also projects that the aircraft will meet other measures, such as Air Force maintainers being able to fix mechanical problems on the aircraft within 12 hours 71 percent of the time once the aircraft has accumulated 50,000 fleet hours of service. Boeing and the Air Force are working to resolve three critical deficiencies related to the performance of the aerial refueling systems that the Air Force discovered during developmental testing. These deficiencies are related to contract specifications, which are at a greater level of specificity than the performance goals. The Air Force determined that the deficiencies in these systems could result in damage to some of the aircraft that are being refueled by the KC-46 and identified them as Category 1 urgent deficiencies that need to be addressed. The Air Force expects that it will take 3 to 4 years for Boeing to develop design solutions for these issues and a few more years to retrofit existing aircraft. A description of the deficiencies and how they are being addressed are discussed below. Remote Vision System Did Not Provide Visual Clarity in All Lighting Conditions: During developmental flight testing, there were instances when the aerial refueling operator was not able to make contact with the receiver aircraft for refueling as intended. This was because the remote vision system camera and processor had difficulty making timely adjustments to some environmental conditions. According to Boeing and program officials, these conditions include certain sun angles, where the glare from the sun can cause the receiver aircraft to washout or blackout on the display screen, making it difficult for the aerial refueling operator to sufficiently see the receptacle of the receiver aircraft to start refueling. The remote vision system also does not provide sufficient depth perception to safely refuel in all lighting conditions. Boeing has already made changes to the remote vision system software to improve visibility for refueling operators. According to program officials, the changes included adjusting the contrast on the display screen and increasing the speed at which operators can switch between different screen viewing options. However, these changes did not address the Air Force’s concerns regarding whether the system could support refueling in all conditions as called for under the contract, which requires sufficient visual clarity in all lighting conditions. Boeing has agreed to redesign the remote vision system to meet the requirement. According to program officials, Boeing has not yet developed a solution, but has reported the redesign will include additional software and hardware changes. Program officials estimate that it may take Boeing 3 to 4 years to develop a solution for the remote vision system and have it certified by the Federal Aviation Administration so that aircraft parts will continue to be certified to the greatest extent possible. It will then take a few more years after that to retrofit all aircraft that are operating without the new system at that time. Boeing did not provide a cost estimate for this solution, but will fix and retrofit all aircraft at no cost to the government. In the meantime, program officials said the Air Force has placed limitations on some boom refueling operations. Lack of Remote Vision System Clarity Also Caused Undetected Contacts with Receiver Aircraft: As we reported in April 2018, during developmental flight testing, there were instances where the boom nozzle contacted a receiver aircraft outside the refueling receptacle. According to program officials, in many of these instances, the aerial refueling operators were unaware that those contacts had occurred. Boom nozzle contact outside the receptacle can damage antennae or other nearby structures. It is especially problematic for low-observable receiver aircraft, such as the F-22 fighter, because boom contact can also damage their special coatings and render them visible to radar. Boeing and program officials now anticipate that any hardware or software changes Boeing makes to the remote vision system, as discussed above, will also address the issue of undetected contacts with receiver aircraft. Efforts to address this issue are expected to be made at no cost to the government. Boom Stiffness Hampered KC-46 Refueling of Lighter Receiver Aircraft: During developmental flight testing, pilots of lighter receiver aircraft, such as the A-10 and F-16, reported the need to use more power to move the boom forward while in contact with the boom to maintain refueling position. According to program officials, the KC-46 boom currently requires more force to compress it sufficiently to maintain refueling position than the boom on the KC-135 or the KC- 10. In addition, program officials said that the additional force exerted by the lighter aircraft can also create an issue when the boom is disconnected. This is because the additional required power can cause the receiver aircraft to lunge forward into the boom and strike it, possibly damaging the receiver aircraft and the boom. The severity of the damage depends on the location of the refueling receptacle, which differs based on the aircraft type. In the case of the A-10, the receptacle is located on the nose of the aircraft and the boom stiffness creates a greater risk to the pilot because a boom strike could damage the windshield. For the F-16, the receptacle is located behind the cockpit and a boom strike could damage the vertical surfaces of its tail. The Air Force is currently allowing F-16s to be refueled by the KC-46 in operational test and training environments, but not the A-10 until the boom stiffness has been fixed. Modifications to address the boom stiffness will add cost for the government. Program officials said the development contract did not specify the amount of force needed to compress the boom. As part of the KC-46 low-rate initial production decision, the Air Force concurred with Boeing’s proposed specifications, which are built into the current boom. Therefore, program officials said the Air Force will be responsible for costs associated with designing a solution for the boom stiffness and retrofitting aircraft. They said the deficiency will require a hardware change. Program officials believe that it will likely take 3 to 4 years to develop a solution and get it certified by the Federal Aviation Administration. It will then take additional time to retrofit about 106 aircraft in lots 1 to 8. The total estimated cost for designing and retrofitting aircraft is more than $300 million. The Air Force has taken steps to keep Boeing incentivized to address the deficiencies in a timely manner. In particular, at the time the Air Force accepted each aircraft, the government had already made progress payments to Boeing comprising 80 percent of the estimated price for each aircraft. Air Force officials stated that the program is currently withholding the remaining 20 percent payment on each aircraft until Boeing meets all contract specifications and corrects critical deficiencies. Over the next year, Boeing is to conduct developmental testing on the wing aerial refueling pods and correct deficiencies, and the Air Force is to finish analyzing test data to validate that performance and contract specifications have been met. In addition, the Air Force is to complete operational testing (planned for completion in December 2019) to determine if the KC-46 and its subsystems are fully capable of performing its mission in a realistic operational environment. Since our last report in April 2018, Boeing completed developmental testing and obtained airworthiness certification from the Federal Aviation Administration for the KC-46 aircraft and two of its three aerial refueling systems—the boom and the centerline drogue system. This has allowed the Air Force to start accepting aircraft. Figure 6 shows the status of the KC-46 test activities. Developmental Testing: As of March 2019, Boeing had completed about 92 percent of the overall KC-46 developmental test program. The roughly 8 percent remaining, which consists of 2,303 of the 29,181 total developmental test points, relates to the wing aerial refueling pods. According to program officials, Boeing, in coordination with its supplier for this subsystem, submitted test plans to the Federal Aviation Administration in December 2018 for approval to begin flight testing the wing aerial refueling pods. These officials also told us that developmental testing on the pods began in early June 2019. Boeing projects that the Air Force will verify that the pods meet contract specifications and they will be airworthy by May 2020. The Air Force is also currently reviewing developmental test data to validate that performance and contract specifications have been met and identify aircraft deficiencies. As of March 2019, the Air Force has identified the three critical deficiencies that we discussed earlier in this report. It also identified 160 Category 2 urgent deficiencies that Air Force policy notes can be addressed through workarounds, which can include manual updates or procedural restrictions. For example, the flight control system does not have an indicator that would alert the KC-46 operators that they are overriding the automatic system that keeps the boom aligned with the receiver aircraft. If the boom is not aligned with the receiver aircraft, it can cause damage to the boom and the receiver aircraft. Program officials said that, as a result, the Air Force has currently placed limitations on some boom refueling operations. The number of Category 2 urgent deficiencies went up by about 26 percent between mid- February and the end of March 2019. Program officials attributed this growth to the progress the Air Force is making in analyzing test data and validating whether the aircraft meet contract specifications. The Air Force may identify additional deficiencies as it completes these developmental testing activities and during operational testing. Operational Testing: According to program officials, the Air Force Operational Test and Evaluation Center plans to conduct KC-46 operational testing from mid-May to December 2019. Operational testing is centered on five overarching test objectives. Three test objectives are focused on the ability of the KC-46 to perform operations for refueling, airlift, and aeromedical evacuation, including how quickly the KC-46 can offload fuel to a receiver aircraft. The fourth objective is focused on the ability of the KC-46 to meet its mission tasking, which includes measures such as the KC-46’s availability and ability to complete a mission. The fifth objective addresses whether the KC-46 is logistically supportable through measures including aircrew and maintainer training, and how well the demand can be met with available parts. According to Air Force test officials, operational testing consists of about 500 test conditions, each of which may include multiple test points. The Air Force plans to use four KC-46 aircraft for operational testing. During operational testing for aerial refueling, the Air Force will test whether the KC-46 can deliver fuel through the boom or centerline drogue system to 18 different types of receiver aircraft in operational conditions, including refueling another KC-46. The Air Force needs to certify receiver aircraft for refueling before these aircraft can be used for operational testing with the KC-46. Boeing and the Air Force are in various stages of testing and certifying 18 receiver aircraft. In its 2018 annual report, the Department of Defense’s Office of the Director, Operational Test and Evaluation reported that the duration of the KC-46 operational test period will depend on how long it takes the Air Force to certify all 18 receiver aircraft. As of March 2019, two aircraft have been tested and certified by the Air Force as a receiver to the KC-46. Five have completed testing, but have not yet been certified, and testing for two others has begun. Figure 7 shows the status of testing and certifications for the KC-46 receiver aircraft currently planned for operational testing. The Air Force plans to obtain additional certifications for aircraft that are not being used for operational testing. The Air Force schedule for completing receiver testing continues to shift. According to Department of Defense developmental and operational test officials and program officials, it is taking longer than expected to complete receiver aircraft certification testing in advance of operational testing due in part to receiver aircraft availability. According to these officials, Air Force major commands have been reluctant to allow their receiver aircraft to be tested with the KC-46 over concerns that the lack of visual clarity in the remote vision system and the boom’s stiffness could cause the boom to strike and damage the receiver aircraft. Program officials told us that, as a result, negotiations between the KC-46 program and Air Force major command officials concerning the use of receiver aircraft are taking longer than expected. These difficulties have resulted in delays to certification tests, in some cases for several weeks. The lack of availability of specific aircraft when they are scheduled to be tested may require the Air Force to reschedule other receiver aircraft. These schedule changes can require some resequencing of test planning and approval activities. In addition, because the wing aerial refueling pods have not been certified and delivered, the Air Force will need to conduct operational testing on refueling operations for them later. To conduct this test, major commands with receiver aircraft that require drogue refueling would need to provide receiver aircraft again. According to program test officials, the start of operational testing for the wing aerial refueling pods will depend on whether the Air Force Operational Test and Evaluation Center uses pods that have not been certified for airworthiness by the Federal Aviation Administration or waits until Boeing delivers a certified subsystem. Problems requiring changes could be identified during KC-46 operational testing, developmental and operational testing for the wing aerial refueling pods, or receiver aircraft certification testing. The development contract makes Boeing responsible to correct any deficiencies discovered during these test periods that do not meet contract specifications. Based on our own observations, as well as our discussions with Department of Defense officials who have been involved with the KC-46 program for many years, we identified aspects of its acquisition approach that could provide insights to future programs. Specifically, the insights could apply to programs considering a fixed-price development contract and determining what sustainment approach to use for commercial derivative aircraft. For example, the KC-46 development contract provided some financial protection to the government from increases in development and some life cycle costs. However, other aspects of the contract did not require Boeing to demonstrate high levels of aircraft performance prior to being awarded production contracts or receiving payment for its work. Current and former program officials also provided insights about key aspects of program management that they believe are essential for executing fixed-price development contracts based on their experiences. In addition, the Air Force’s new approach for sustaining the KC-46, relying heavily on the Federal Aviation Administration to certify even military-unique aircraft systems, could be useful in considering future acquisition approaches. We previously recommended in March 2012 that the Under Secretary of Defense for Acquisition, Technology and Logistics closely monitor the cost, schedule, and performance outcomes of the KC-46 program to identify positive or negative lessons learned for future acquisition programs. We noted that, as one of only a few major acquisition programs to award a fixed-price incentive (firm target) development contract in recent years, evaluating performance and identifying lessons learned would be illustrative, important for informing decision makers, and help guide and improve future defense acquisition programs. The Department of Defense agreed with the recommendation and compiled lessons learned during the source selection phase of the program. However, the department has not yet identified and reported on lessons learned during program implementation to evaluate cost, schedule, and performance outcomes as we recommended. Program officials said they are collecting lessons learned, but will not report them until after the development contract is complete in 2021. However, by waiting until 2021, other acquisition programs considering using a similar approach will not be able to take advantage of KC-46 lessons learned, including the ones we identify below that could reduce government risk and save taxpayer money. The Air Force used a fixed-price incentive (firm target) contract type to limit the government’s financial risk for KC-46 development. The KC-46 development contract was designed to provide a profit incentive for Boeing to control or even reduce overall costs. The use of a fixed-price contract did not result in a reduction in development costs below target costs, but did help control the government’s costs. Specifically, the Air Force was able to avoid $1.3 billion in costs exceeding the contract ceiling that Boeing has incurred while developing the aircraft, according to program officials, as of February 2019. Boeing initially declared cost overruns related to wiring while manufacturing the first development aircraft in the spring of 2014. At that time, it discovered wire separation issues, which were caused by an inaccurate wiring design. It took Boeing about 6 months to correct the wiring design and resume wiring work on the developmental aircraft. Boeing declared other cost overruns later in development as it faced challenges in obtaining Federal Aviation Administration certification for the aircraft, which caused significant testing delays. Together, the wiring problems, certification and testing delays, and other setbacks have resulted in a projected 3-year schedule delay. To the extent these costs exceeded the contract ceiling price, Boeing has borne the costs to address these issues, which included retaining more personnel such as design engineers and testers than it originally planned. The KC-46 contract also contains three specific clauses that further benefited the government by limiting its financial risk: Correction of deficiencies clause: This clause requires Boeing to pay for aircraft retrofits when the government determines that the company is not meeting contract specifications. According to the development contract, Boeing is responsible for correcting deficiencies discovered during engineering and manufacturing development, and in production and deployment. Based on the initial schedule, operational testing would have ended in 2017. Up to 19 low-rate initial production aircraft would have been covered by this clause and deficiencies would have been almost exclusively identified through testing activities. Because of delays in the development phase, more aircraft will now be covered by the correction of deficiencies clause. According to the integrated master schedule, Boeing will still be completing development activities in 2020. As a result, the correction of deficiencies clause is expected to now cover the 52 low-rate production aircraft already ordered as well as any other aircraft ordered while development activities are ongoing. Boeing will now be responsible for correcting deficiencies identified during testing as well as in day-to-day operations on all of these aircraft. Fuel usage rate clause: This clause requires Boeing to meet a specified fuel usage rate for each individual aircraft, which will help the Air Force control some of the KC-46’s life cycle costs. According to the contract clause, if an individual aircraft does not meet the fuel usage rate, Boeing would have to propose a corrective action at no cost to the Air Force. The Air Force could also make an equitable price adjustment based on a formula that projects the additional costs the Air Force would incur over the expected 40-year life of the aircraft. Long-term pricing: The KC-46 contract includes long-term pricing terms for 175 production aircraft. In agreeing to these terms, Boeing had to estimate its costs through 2027. The pricing in the contract protects the government from cost increases including inflation and higher supplier costs that were not already embedded in the prices. The contract includes a variety of purchasing options so that the Air Force is not locked into acquiring a set amount of aircraft each year. It identifies the most cost effective approach for procuring the 175 production aircraft, which is typically between 12 and 15 aircraft for each production lot. It also identifies the additional costs the Air Force would incur if it procured fewer or more aircraft in each production lot that would deviate from the most cost effective approach. Program officials stated that including the long-term pricing in the contract has helped it secure adequate funding from Congress to procure the most cost effective number of aircraft in each of the four low-rate production lots it has awarded so far. Several aspects of the fixed-price incentive development contract, however, did not reduce risk to the government and further complicated existing program challenges. First, production lot awards were not linked to Boeing’s performance. Second, progress payments to Boeing were based on costs the contractor incurred rather than on its demonstrated performance. Third, the contract did not identify the timing of when production aircraft would be delivered to the Air Force for acceptance. Production lot awards are not tied to demonstrated performance: The development contract linked the award of production lots to schedule milestones rather than to contractor performance. The contract specified that the first and second low-rate production lots had to be awarded within 30 days and 14 months of the low-rate initial production decision, respectively. According to the initial plan, Boeing would have completed 13 months of developmental testing and 66 percent of the flight test program with the KC-46 by the low-rate initial production decision. As we have previously reported, however, the program experienced delays. At the time of the low-rate initial production decision, the program had only completed about one-third of the planned flight test program. The Air Force decided to award both low-rate production lots within a week of the decision despite the lower amount of testing knowledge. Program officials stated that they awarded the contract because Boeing met the low-rate decision criteria, including demonstrating successful refueling operations. Further, based on the correction of deficiencies clause, they believed at that time that Boeing would be responsible for paying to correct all deficiencies it discovered during subsequent testing on aircraft it produced. Our prior work on best practices, however, emphasizes that awarding production lots before performance is demonstrated introduces risk of cost increases, schedule delays, and performance problems. Progress payments are not based on demonstrated performance: The KC-46 contract included a financing approach that requires the Air Force to make progress payments to Boeing up to 80 percent of its incurred costs. These progress payments incentivized Boeing to make progress on building the aircraft, and the program’s withholding of some payment incentivizes the company to resolve deficiencies more quickly. In general, Department of Defense guidance recognizes that performance-based payments incentivize a contractor to optimize its activities to meet the goals that are important to the government, such as completing a certain amount of engineering or developmental testing by specific milestones. It also notes that they are not practical on all contracts, and contracting officers should consider whether the benefits outweigh the time and effort to establish and administer them. The guidance also notes that progress payments based on costs incurred by a contractor may not reflect the contractor’s progress towards meeting program goals or incentivize a contractor to meet those goals. On the KC-46 for example, the program office had made 80 percent of the allowed progress payments for the four development aircraft by November 2015─9 months before the low-rate initial production decision, despite only completing 15 percent of the flight test points at that time. KC-46 program officials said that once the low-rate production contracts were awarded in August 2016, Boeing prioritized completing the manufacturing of those aircraft because it had previously started manufacturing them with its own funds. It also focused on completing aspects of developmental testing related to the boom and centerline drogue so that it could begin delivering aircraft to the Air Force. In general, once the Air Force accepts an aircraft, Boeing is eligible to receive additional payment for its work on that aircraft. Program officials, however, would have preferred that Boeing placed more emphasis on completing receiver aircraft certifications so that when aircraft were accepted, the Air Force could begin operational testing, which is led and paid for by the government. Contract originally did not identify aircraft delivery time frames: The original development contract did not identify a specific delivery period for production aircraft. Instead, it specified that Boeing was supposed to deliver the first 18 aircraft by August 2017. According to program officials, not identifying a delivery period was an oversight. Program officials stated that the Air Force needed more specific aircraft delivery information to develop detailed plans for establishing operating bases and performing depot maintenance, including training pilots and maintainers. For example, if training is done too early, the Air Force may have to provide refresher training to pilots and maintainers. If it is done too late, then the Air Force may not be able to use the aircraft as soon as it could or to the extent it had planned. The Air Force was eventually able to get specific delivery dates for the aircraft as part of negotiations it had with Boeing to modify the development contract after Boeing did not meet the original August 2017 contract delivery date. According to current and former KC-46 program officials, stable requirements and a skilled acquisition workforce are essential for executing a fixed-price incentive contract. Stable Requirements: The current KC-46 program manager said that there were no major requirements changes on the program between 2011 and 2018. The only requirements change occurred in 2019 to address the critical deficiency identified on the boom which, as we discussed earlier, the Air Force is paying to fix. As we previously found in 2012, controls were put in place to limit requirements changes. These controls were in response to a 2011 memorandum issued by the Office of Cost Assessment and Program Evaluation in the Office of the Secretary of Defense. The memorandum maintained that, on the whole, the Department of Defense had demonstrated limited ability to maintain stable requirements and limit changes to program baselines on previous complex weapon system programs, and that minimizing such change would be essential to the success of the KC-46. For the KC-46 program, any engineering or contract changes affecting system requirements or that have the potential to impact program cost, schedule, and performance baselines must be approved by the Air Force Service Acquisition Executive in consultation with the Secretary and the Chief of Staff of the Air Force. Skilled Acquisition Workforce: Some current and former program managers also noted that having personnel with strong negotiating and cost estimating skills, as well as data rights expertise, is essential for programs with fixed-price incentive development contracts. One former program official explained that in general, contractors such as Boeing on the KC-46 do not know exactly how they are going to build a weapon system until they have completed detailed systems engineering and design drawings, which occurs in the development phase. We previously found in November 2016 that as top-level capability requirements are defined and decomposed into lower-level design requirements, they become more specific and the number of requirements grows. This growth can be exponential, with tens of thousands of detailed design requirements derived from a relatively small number of capability requirements. While the government generally does not specify how a contractor designs a weapon system for fixed-price incentive contracts, officials we spoke with said KC-46 program managers and engineers have been involved in almost daily discussions with Boeing to make design tradeoffs. As such, one former program executive officer said program offices that are using fixed-price incentive development contracts should ensure that program management staff, including contracting officers and engineers, has strong negotiating skills to protect the government’s interest during these daily negotiations where design tradeoffs are made. Further, these program offices need financial management staff with strong cost estimating skills to support the negotiations when necessary. This official indicated that the KC-46 program office had people with these skills. However, several former program officials stated that the KC-46 program office needed personnel with data rights expertise. They said that they had to rely on a data rights expert from outside the KC-46 program to assist in drafting a section of the request for proposal that would allow the Air Force to obtain data it would need to maintain KC- 46 aircraft. The officials indicated that the Air Force has few data rights experts and that it would be beneficial to have contracting officers and attorneys in the program offices with data rights expertise. For example, program officials anticipate that there will be ongoing discussions and negotiations with Boeing about the type of data it will need for the Air Force to perform depot maintenance activities over the life of the program. The Air Force plans to use a sustainment approach on the KC-46 that it has not yet used on other aircraft, that presents added complexity, and which Boeing is having difficulty supporting. Under the new approach, the Federal Aviation Administration will certify nearly all parts of the aircraft, including most of the military-unique parts such as the centerline drogue, boom, and wing aerial refueling pods. By certifying through the Federal Aviation Administration, the Air Force expects to take advantage of commercial aircraft updates that occur regularly and to obtain new or refurbished parts for the aircraft through a global parts pool that commercial users of the 767 aircraft rely on to maintain their aircraft. Further, the Air Force, instead of a contractor, will provide product support for the aircraft. Previous commercial derivative aircraft programs, including the KC-10, did not have the Federal Aviation Administration certify military-unique functions such as aerial refueling, and the Air Force has relied on the KC-10 contractor for product support over the lifetime of that program. According to the KC-46 acquisition strategy, Boeing will initially provide product support for the KC-46 for a period of up to 5 years. During that time, the Air Force will gradually take over the responsibility and then maintain the aircraft for the lifetime of the program, which is expected to be 40 years. The KC-46 program’s experience in obtaining and maintaining Federal Aviation Administration certification, including participation in the parts pool, can offer insights for future acquisition programs to consider. The Air Force also required Federal Aviation Administration certification to a greater extent than the Air Force policy in place at the time the development contract was awarded. Specifically, the contract states that the contractor shall obtain Federal Aviation Administration certification for all the aircraft’s mission equipment. In cases where this is not workable, the contract says that the contractor must exhaust all possible solutions prior to not obtaining full certification. As we mentioned earlier in the report, Boeing is having difficulty getting certification for the military-unique portions of the aircraft related to the aerial refueling systems, which has contributed to significant program delays. Boeing’s commercial business unit already obtained Federal Aviation Administration certification for the commercial parts of the aircraft. However, according to program officials, Boeing’s defense business unit, which is responsible for obtaining certifications for the military-unique parts, was not as well versed on the certification process. We previously reported that, according to Boeing officials, the company and the supplier had underestimated the extent of design drawing details required by the Federal Aviation Administration to certify that the parts conformed to the approved design. The supplier of the wing aerial refueling pods spent several years negotiating agreements with several of its key sub-tier suppliers to obtain the necessary documentation. To reduce the risk of further delays, in 2015, Boeing co-located some of its employees with the supplier to provide technical support to complete the documentation for certification over the past several years. Based on a study completed by Morgan Borszcz Consulting in 2014, the Air Force expected to benefit from saving up to $420 million by maintaining the Federal Aviation Administration certification for the KC-46 over the life of the program. Savings were primarily estimated in three areas: 1. $200 million could be saved by having Boeing maintain responsibility for all design changes on the aircraft, including working with the Federal Aviation Administration to certify design changes and updating instruction manuals based on the changes. 2. $70 million could be saved by having Boeing address any safety issues identified by the Federal Aviation Administration in Airworthiness Directives. 3. Between $57 million and $150 million in costs could be avoided if the Air Force maintains Federal Aviation Administration certifications and does not recertify parts to military standards. The study also stated that the Air Force could save money by participating in the 767 aircraft parts pool, mentioned above, though it did not specify the amount of savings. The parts pool limits the risk of diminishing manufacturing sources over time and the costs the Air Force typically incurs when qualifying new suppliers. Program officials told us that they decided to use a worldwide 767 parts pool because more than 75 percent of KC-46 parts are expected to be available through that parts pool, which reduces the need for the Air Force to procure these parts in advance and place them in its distribution system. Programs that do not have Federal Aviation Administration certified parts have to find and qualify suppliers for needed parts on their own and they must find and qualify new suppliers if one goes out of business over the operational lifetime of the aircraft. In using the 767 parts pool, the Air Force anticipated readily obtaining parts as needed for maintaining the KC-46 aircraft as well as repairing parts and putting them back into the pool. Since the time the study was completed, however, program officials have learned that the Air Force cannot put parts back into the parts pool because commercial members of the pool do not want to use repaired or reconditioned parts that were used on Air Force aircraft. As a result, the Air Force will not achieve all of the savings it anticipated. Program officials explained that commercial companies do not fly their aircraft under the same conditions as the Air Force, and these companies believe it is too risky for them to use parts that were once used on a KC-46. Program officials said the Air Force can still purchase parts from the parts pool though. The Air Force can also refurbish and use its own parts as long as the parts and the processes it uses to refurbish the parts meet Federal Aviation Administration certification standards and mechanics are properly certified. However, it remains to be seen if the Air Force can maintain the certifications because it has not yet had to do this on other aircraft and requires adherence to Federal Aviation Administration procedures. The Air Force’s approach to building the KC-46 has been somewhat unique—deriving a military aircraft from a commercial model using a fixed-price incentive contract, among other things. After experiencing delays of nearly 3 years, the Air Force started accepting aircraft that can now be used for operational testing and support of worldwide missions. While work remains to ensure that critical deficiencies are corrected, the KC-46 program offers lessons that could be shared with other Department of Defense acquisition programs that are considering using a fixed-price-type development contract or a commercial derivative aircraft regarding contracting for and sustaining weapon systems. In particular, the contract provided substantial protections to the government against cost increases that Boeing experienced while developing the aircraft, but it also used a financing approach that did not tie Boeing’s performance to completing important program goals. In addition, the Air Force’s effort to leverage commercially available parts to reduce sustainment costs created challenges. We previously recommended that the Department of Defense develop and share KC-46 lessons learned for future acquisition programs; however, it does not plan to do so until 2021. By sharing identified lessons now with other program leaders considering fixed-price- type contracts or developing commercial derivative aircraft, programs may be able to increase the effectiveness of any new similar development programs. We are making the following recommendation to the Department of Defense: The Secretary of Defense should ensure that the KC-46 program office disseminates insights we identified in this report about the KC-46’s contracting and sustainment planning experiences for consideration by acquisition programs, in particular those considering a fixed-price-type development contract or a commercial derivative aircraft. We provided a draft of this product to the Department of Defense for comment. In its comments, reproduced in appendix II, the department concurred with our recommendation, but did not identify the specific actions it would take to implement the recommendation. It also provided, in technical comments, language clarifying that the Air Mobility Command cost estimates for flying and maintaining KC-135s longer, as a result of KC-46 delivery delays, did not also account for any savings that would be achieved from not flying KC-46 aircraft. We provided additional detail in the report to address this comment. We also incorporated other technical comments as appropriate. We are sending copies of this report to the Acting Secretary of Defense, the Acting Secretary of the Air Force, and appropriate congressional committees. The report is also available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or ludwigsonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. The program office has 21 performance goals that are critical to the KC- 46 aircraft’s military capability and track progress to meeting contract specifications. These performance goals include nine key performance parameters, five key system attributes, and seven technical performance measures. Table 2 provides a description of each key performance parameter and key system attribute. Table 3 provides a description and status of each technical performance measure. In addition to the contact named above, Cheryl Andrew, Assistant Director; Lorraine Ettaro; Kurt Gurka; Stephanie Gustafson; Katheryn Hubbell; Jean Lee; Malika Rice; Jenny Shinn; and Steve Woods made key contributions to this report. GAO, KC-46 Tanker Modernization: Program Cost is Stable, but Schedule May Be Further Delayed, GAO-18-353 (Washington, D.C.: Apr. 18, 2018). GAO, KC-46 Tanker Modernization: Delivery of First Fully Capable Aircraft Has Been Delayed Over One Year and Additional Delays are Possible, GAO-17-370 (Washington, D.C.: Mar. 24, 2017). GAO, KC-46 Tanker Aircraft: Challenging Testing and Delivery Schedules Lie Ahead, GAO-16-346 (Washington, D.C.: Apr. 8, 2016). GAO, KC-46 Tanker Aircraft: Key Aerial Refueling Capabilities Should Be Demonstrated Prior to the Production Decision, GAO-15-308 (Washington, D.C.: Apr. 9, 2015). GAO, KC-46 Tanker Aircraft: Program Generally on Track, but Upcoming Schedule Remains Challenging, GAO-14-190 (Washington, D.C.: Apr. 10, 2014). GAO, KC-46 Tanker Aircraft: Program Generally Stable but Improvements in Managing Schedule Are Needed, GAO-13-258 (Washington, D.C.: Feb. 27, 2013). GAO, KC-46 Tanker Aircraft: Acquisition Plans Have Good Features but Contain Schedule Risk, GAO-12-366 (Washington, D.C.: Mar. 26, 2012).", "summary": "Aerial refueling—the transfer of fuel from airborne tankers to combat and airlift forces—is critical to the U.S. military's ability to effectively operate globally. The Air Force initiated the KC-46 program in 2011 to replace about a third of its aging KC-135 aerial refueling fleet. Boeing was awarded a fixed-price incentive contract to develop the first four aircraft, which are being used for testing. Boeing was also required to deliver the first 18 fully capable aircraft by August 2017. The program plans to eventually field 179 aircraft. This report assesses the program's progress toward meeting cost, schedule, and performance goals. The report also assesses how the program's contracting and sustainment planning approach could inform other acquisition programs. GAO analyzed cost, schedule, performance, test, manufacturing, contracting, and sustainment planning documents; and interviewed officials from the KC-46 program office, other defense offices, such as the Defense Contract Management Agency, the Federal Aviation Administration, and Boeing. Costs for the KC-46 program remain lower than expected, as shown below. The Air Force accepted the first KC-46 in January 2019, but Boeing remains nearly 3 years behind schedule. As shown below, Boeing now plans to deliver the first 18 aircraft with all three aerial refueling subsystems by June 2020. Program officials expect the KC-46 to meet key performance goals over the next few years as it accumulates 50,000 fleet hours. However, the Air Force is accepting aircraft that do not fully meet contract specifications and have critical deficiencies, including ones that affect (1) the operators' ability to guide the fuel delivery boom into position, and (2) the boom itself. The deficiencies could affect operations and cause damage to stealth aircraft being refueled, making them visible to radar. Program officials estimate it will take 3 to 4 years to develop fixes for the deficiencies and a few more years to retrofit up to 106 aircraft. The Air Force and Boeing will incur costs to fix the deficiencies, with the Air Force's portion estimated to be more than $300 million. The Air Force is withholding 20 percent payment on each aircraft until Boeing fixes the deficiencies and non-compliances. Meanwhile, the Air Force has limited some refueling operations. GAO identified a number of insights that could benefit other programs, including the use of a fixed-price-type development contract and a correction of deficiencies clause in the contract that protected the government from some cost increases. The Department of Defense agreed to provide lessons learned about the KC-46 program for future acquisition programs based on a recommendation GAO made in March 2012, but does not plan to do so until development is complete in 2021. GAO believes other programs could benefit from insights identified in this report if they were disseminated sooner. GAO recommends that the Department of Defense disseminate insights in this report about the KC-46's contracting and sustainment planning experiences for consideration by acquisition programs, particularly those that plan to use a fixed-price-type development contract or a commercial derivative aircraft. The Department of Defense concurred with the recommendation.", "document_type": "gao"}
{"report": "Consumers receive broadband service from telephone, cable, mobile, satellite, and utility companies that own and operate the telecommunications infrastructure. Fixed technologies, like cable or fiber, can provide broadband to single locations like customers’ homes or businesses. Mobile technologies provide internet access wherever a customer has access to a signal. Customers connect to a mobile wireless network through a mobile device, such as a smartphone. Internet service that is high speed and provides an “always-on” connection, so users do not have to reestablish a connection each time they access the internet, is commonly referred to as “broadband.” FCC’s benchmark speed for what constitutes “advanced telecommunications capability,” a subset of broadband, has increased over time as consumers use the internet for an expanding range of purposes that requires faster speeds. In 2015, FCC set a benchmark speed for fixed advanced telecommunications capability to 25 megabits per second when downloading and 3 megabits per second when uploading (25 Mbps/3 Mbps). Internet service at various speeds allows for a variety of online activities, such as those shown in figure 1. In addition to fixed providers, satellite providers have begun meeting this benchmark, and FCC has recognized them as a viable source of advanced telecommunications capability. FCC has not set a similar benchmark for mobile services. The federal government has emphasized the importance of ensuring Americans have access to broadband, and a number of agencies provide funding to subsidize broadband deployment in areas, such as rural areas, in which the return on investment has not attracted private investment. As we have previously reported, rural areas may have features that increase costs of deploying and maintaining broadband networks. For instance, low population density, low broadband adoption rates, or mountainous or rugged terrain can make it especially costly for fixed and mobile providers to deploy infrastructure to rural areas with an expectation of getting a return on their investment. The Communications Act of 1934, as amended by the Telecommunications Act of 1996, specifies that consumers in “rural, insular, and high-cost areas” should have access to telecommunications and information services at rates that are “reasonably comparable” to rates charged for similar services in urban areas. Consequently, federal programs exist to support investment in broadband deployment for high-cost areas through federal grants, loans, and other subsidies. The largest share of federal support comes from FCC’s Universal Service Fund, which includes four component programs designed to ensure access to affordable communications for schools, libraries, rural health care providers, low-income consumers, and those in rural and high-cost areas. The largest component of the Universal Service Fund is the high- cost program—which includes the Connect America Fund and the Rural Digital Opportunity Fund—that targets financial support to rural high-cost areas for the deployment and maintenance of voice and broadband- capable networks. Table 1 shows selected federal programs funding the deployment of broadband infrastructure. FCC has other roles and responsibilities in regulating nationwide communications activities in addition to those identified above. FCC collects deployment data twice a year from broadband providers in order to better identify areas where broadband service is available. FCC, RUS, and NTIA have used and continue to use these data to inform their broadband programs. Furthermore, FCC and NTIA jointly determine the amount of spectrum—a finite natural resource that makes a variety of wireless communications possible—allocated for federal, nonfederal, and shared use. FCC also regulates the use of licensed and unlicensed spectrum through its regulatory process. This report’s broad view of a decade of federal efforts to advance broadband access builds on our prior work. FCC Universal Service Fund. In 2014, we examined FCC efforts to increase broadband deployment in unserved areas and identified legal, policy, and economic concerns—for example, low returns on investment—in deploying broadband in unserved and underserved areas. We also examined varying approaches for financing broadband deployment in high-cost areas, including local funding sources and a variety of ownership structures over the infrastructure. FCC deployment data. In 2014, we examined FCC’s efforts to reform its high-cost program and the extent to which FCC was collecting data to determine the effectiveness of these reforms, among other objectives. We identified gaps in FCC’s data analysis and reporting, including a lack of transparency and accountability of spending. We recommended that FCC analyze how it uses its high-cost program funding and make that analysis publicly available at least annually. FCC has taken action to implement our recommendation to address the lack of transparency and accountability of spending. In 2018, we reviewed data that FCC collected from providers to describe the locations of existing broadband infrastructure and help federal programs identify unserved and underserved areas to target for federal funding. We found that these data overstated broadband access, especially in tribal lands, and recommended that FCC take actions to improve these data. FCC concurred with the recommendations and has begun taking action, but the agency has not yet fully implemented any of the report’s three recommendations. Broadband adoption. In 2015, we stated that adopting broadband at home can provide a number of benefits, including access to employment opportunities (searching for and applying to jobs); education (research, web-based learning, and homework); and services for economic and social gain (such as telemedicine and entertainment). We reviewed federal efforts to address broadband adoption barriers that consumers face and recommended that FCC revise its strategic plan to more clearly state if broadband adoption is a priority, and if so, what outcomes FCC intends to achieve, action that the agency took the following year. We also recommended that NTIA include performance metrics for the agency’s broadband adoption efforts in its annual performance plan. Both FCC and NTIA implemented these recommendations. RUS grant and loan programs. In 2017, we assessed whether RUS’s procedures and activities related to its broadband grant and loan programs are consistent with leading management practices. We found that its activities and procedures were consistent with four leading practices and partially consistent with six leading practices. We made five recommendations to RUS to improve management practices for specific programs, like the Community Connect Program. In response, RUS implemented two of the recommendations to develop and document clear goals and performance measures for its broadband loan and grant programs and to establish and implement procedures to conduct a risk assessment of each program. RUS agreed with, but has not yet implemented, the report’s other three recommendations to: (1) conduct periodic evaluations of completed grant projects to determine the outcomes associated with these projects; (2) establish a timeline for implementing a centralized internal data system for staff to use in managing and monitoring loans and grant awards; and (3) develop, update, and maintain complete written policies and procedures for RUS’s programs as a way to retain and communicate organizational knowledge internally among agency staff. Broadband competition. In 2017, we found that infrastructure costs and other factors can affect competition among broadband providers. Such costs can limit competition in urban areas but more significantly limit competition in non-urban and less populated areas. We made two recommendations to FCC to solicit and report on the views of stakeholders regarding: (1) how well FCC’s programs promote broadband competition and (2) how varying levels of broadband deployment affect broadband prices and service quality. In response, FCC implemented these recommendations by soliciting public comments in July 2018 to seek feedback on the effectiveness of its actions addressing competition among broadband providers and on how varying levels of broadband deployment affect prices and service quality. In December 2018, FCC reported comments that it had received from this solicitation in the first version of a biennial report on the broadband market. In May 2019, FCC also reported stakeholder comments related to the agency’s broadband deployment data, including service quality data. Tribal broadband access. In 2018, we examined challenges that tribes face in accessing broadband services, focusing on two particular areas: (1) tribes’ ability to obtain and access spectrum for providing broadband and (2) tribes’ partnerships with private sector companies and others, and the ability to obtain funding to deploy broadband infrastructure on tribal lands. We found that tribes cited a number of barriers to obtaining licenses for spectrum. We also found that although tribes said partnerships with the private sector improved access to broadband, there are few such partnerships, and that tribes face regulatory barriers in applying for funding from RUS grant programs. We made three recommendations to FCC to collect data on tribal access to spectrum, analyze unused spectrum over tribal areas, and make information about available spectrum more accessible. We also made one recommendation to RUS to identify and address any regulatory barriers that may impede efforts by tribes to obtain RUS funding. FCC agreed with the recommendations, and RUS neither agreed nor disagreed with its recommendation. The agencies have not yet implemented these recommendations. According to the U.S. Census Bureau’s Annual Capital Expenditures Survey data, the telecommunications industry that provides various types of broadband services—fixed, mobile, or satellite (and other)—spent an estimated $795 billion (2018 dollars) in total capital expenditures from 2009 through 2017. Selected broadband providers that we contacted stated that they used the majority of their capital expenditures to improve the capability and reliability of their existing broadband infrastructure or expand infrastructure into new areas. For instance, one provider said it expanded wireless broadband service in Iowa and another provider constructed new towers to transmit fixed-wireless broadband signals across parts of Oklahoma. Some providers we contacted said that their capital expenditures may include funds from federal broadband programs or other items not related to broadband, such as the purchase of real or personal property or the acquisition of other broadband companies. Providers that we contacted offered few, if any, details about their investments. Instead, they said that their detailed expenditures were proprietary or they referred us to their annual reports, which contain limited information on capital expenditures. Census data showed that annual total capital expenditures increased from about $78 billion in 2009 to about $97 billion in 2017 (an increase of about 24 percent), with an average annual growth rate of about 2.8 percent. See figure 2. Industry capital expenditures for specific telecommunications sectors varied. For example, estimated expenditures for fixed services consistently exceeded estimated expenditures for mobile services, although mobile services experienced a greater increase—55 percent compared to an 8 percent increase in estimated expenditures for fixed services from 2009 through 2017. In comparison to industry spending, federal investment is much smaller, representing about 6 percent of total industry capital expenditures. However, this investment is critical to supporting deployment of broadband in rural areas where industry might not otherwise invest, due to potentially higher costs and lower investment returns. According to FCC, RUS, and NTIA data, federal program investments totaled about $47.3 billion (2018 dollars) to target broadband infrastructure in unserved or underserved areas from 2009 through 2017. Of these three federal agencies, FCC provided the largest share of support through the Universal Service Fund’s high-cost program—which is an ongoing program. A second agency, RUS, offered loans and grants. And NTIA primarily funded broadband deployment through the Recovery Act, which provided one-time funding for projects that are largely complete and are no longer active. To illustrate: FCC’s high-cost program. The high-cost program disbursed about $41.7 billion (2018 dollars) in support of both deployment and maintenance of voice and broadband-capable networks from 2009 through 2017. RUS’s programs. RUS provided grants or loans, or a combination of both, through a variety of funding programs. The Broadband Initiatives Program—a Recovery Act program—awarded about $2.2 billion (2018 dollars) in grants to industry for infrastructure projects in fiscal year 2010. RUS’s Community Connect Grant Program—a grant program designed to fund broadband deployment in rural areas where such service did not exist—awarded $95 million (2018 dollars) in grants from fiscal year 2009 through fiscal year 2017. In addition to these grants, RUS provided infrastructure loans that recipients must repay to the government with interest. Specifically, RUS provided about $4.0 billion (2018 dollars) in loans to private providers through the Broadband Initiatives Program, the Telecommunications Infrastructure Loan Program, and the Broadband Loan Program. NTIA’s Broadband Technology Opportunities Program, Comprehensive Community Infrastructure projects. This Recovery Act program awarded a one-time $3.3 billion in competitive grants to states, municipalities, and non-profit and commercial organizations in fiscal year 2010. Nearly all of the 116 broadband infrastructure projects have been completed. All three programs have used metrics to show progress in closing deployment gaps. Specifically, FCC has a metric for locations served, whereas RUS and NTIA measure miles of fiber-optic cable deployed, in addition to having metrics that count particular types of locations served or reported number of new subscribers. FCC collects data from providers about new locations to which they deployed broadband using high-cost program support. Deployment data submitted by providers that receive support from FCC’s high-cost program showed that they used those funds to make broadband available to about 2.3-million new residential and small business locations, mostly from 2015 through 2017. In commenting on a draft of this report, FCC stated that this figure has increased to about 4.2- million new locations. This updated figure is based on data through 2019 that are not yet publicly available; they are expected to be released later in 2020. Providers report these data to FCC, which are subject to verification by the Universal Service Administrative Company—the not-for-profit corporation designated by the FCC as the administrator of the Universal Service Fund, including the high- cost program. As of May 2020, FCC officials said that FCC has authorized Connect America Fund Phase II support to deploy broadband at 25 Mbps/3 Mbps or higher to more than 631,000 locations by 2025 or sooner. In December 2016, RUS released the final Broadband Initiatives Program progress report, which noted that the program deployed 66,521 miles of fiber-optic cable, added 5,468 wireless access points, and resulted in 334,830 subscribers receiving new or improved broadband. In December 2016, NTIA reported that the Broadband Technology Opportunities Program resulted in the deployment of 117,072 miles of new or upgraded broadband infrastructure. NTIA also reported that awardees connected nearly 26,000 community anchor institutions— such as schools, libraries, and hospitals—to broadband and provided access to nearly 14,149 homes and businesses. Although the agencies used metrics to show progress, the metrics used were not always the same, making it difficult to draw comparisons among programs. The impact of these federal programs goes beyond the number of miles of fiber or the number of subscribers. Although these programs promoted the availability and use of broadband throughout the country, our prior work found that they also stimulated economic development and created new jobs. For example, we reported in 2012 that NTIA’s and RUS’s Recovery Act programs had created about 9,000 full-time jobs. Recovery Act grantees we interviewed for our prior work gave examples of the types of economic development broadband enabled, such as tourism-oriented businesses being better able to provide web sites and online reservation systems. They also reported that broadband infrastructure improved broadband speed for schools, community colleges, and health care providers. Several studies have attempted to measure the economic benefits of broadband. A 2006 study prepared for the Department of Commerce claimed to be the first attempt to quantify the impact of broadband on economic growth. The study found that, between 1998 and 2002, communities in which broadband was available experienced more rapid growth in employment, the number of businesses, and businesses in information technology sectors, relative to comparable communities without broadband. Subsequently, other studies have attempted to assess the economic impact of broadband. For example, a 2016 study from the Hudson Institute found that rural broadband providers directly and indirectly added $24.1 billion to the U.S. economy and the rural broadband industry supported about 70,000 jobs in 2015, both through its own employment and the employment that its purchases of goods and services generated. About the same time, a 2016 broadband forum sponsored by the National Science Foundation and NTIA concluded that during the past decade, research has deepened the understanding of the potential impacts of broadband on the economy and society. The study made clear the need for more research on the impact of broadband. On December 11, 2018, FCC opened the new Office of Economics and Analytics, consisting of economists, attorneys, and data professionals to, among other things, provide economic analysis, including cost-benefit analysis, for FCC proceedings. FCC’s annual Broadband Deployment Report, which reports on broadband deployment generally and not just deployments made with FCC funding, states that broadband availability has increased both nationally and for specific segments of the population, as shown in figure 3. National: About 94.4 percent of the U.S. population had fixed broadband service available at customer premises, such as residences, with minimum speed of 25 Mbps/3 Mbps in 2018, up from 81.2 percent of the population in 2012. Rural: About 77.7 percent of the rural population had fixed broadband service available with minimum speed of 25 Mbps/3 Mbps in 2018, up from 45.7 percent of the rural population in 2012. Tribal: About 72.3 percent of tribal lands had fixed broadband service available at the same speeds in 2018, up from 32.2 percent of the tribal population in 2012. Although these data show broadband availability increasing in a variety of ways, the data also demonstrate that fixed broadband is still much more readily available to urban consumers than it is available to consumers in rural areas. FCC’s Broadband Deployment Report shows that as of 2018, about 22.3 percent of the rural population and 27.7 percent of tribal population did not have fixed broadband service available with minimum speed of 25 Mbps/3 Mbps; whereas, only about 1.5 percent of the urban population did not have fixed broadband service available at the same speed. As we will discuss later in this report, limitations with how FCC collects and uses deployment data from providers to measure broadband access overstate the extent to which broadband is available, a weakness we have pointed out and that FCC has taken steps to address. As the availability of broadband service has increased over time, some segments of the population continue to lag behind others in adopting broadband, even if it is available, and therefore are unable to benefit from it. Our prior work has shown that several factors have been, and continue to be, barriers to broadband adoption—specifically, affordability, lack of perceived relevance, and lack of computer skills. FCC identified these barriers in its National Broadband Plan of 2010, and our more recent work in 2015 showed that these three barriers persist. We found that: the cost of a subscription for internet service and the purchase of computer equipment was the most frequently identified barrier; the perception that broadband does not provide enough utility relative to its cost acted as another barrier; and the lack of exposure to or knowledge about computers, such as by those aged 65 or older and those with low levels of income and education, was another barrier. Compounding the effect of these adoption barriers is the lack of competition. FCC has reported that competition could result in lower prices and higher quality services from broadband providers. However, our prior work from 2017 found that 51 percent of the U.S. population had only one fixed broadband provider offering minimum speed of 25 Mbps/3 Mbps. According to the FCC’s 2018 Communications Marketplace Report, that percentage has decreased to about 27 percent of the U.S. population who had only one fixed terrestrial broadband provider offering minimum speed of 25 Mbps/3 Mbps. In addition, FCC’s report stated that 68 percent of the population had at least two providers and approximately 95 percent had at least one provider. Competition in rural areas can be particularly challenging as rural areas generally do not have enough demand to support multiple carriers. Over time, the types of technologies that provide access to broadband have evolved. Federal agencies have responded by making changes to their programs that support broadband. Specifically, FCC and RUS have expanded which types of broadband providers are eligible to receive support from their programs, allowing increased participation by satellite and wireless broadband providers. Satellite and mobile broadband may be able to overcome some impediments to access faced by other services, such as high deployment costs and geographical barriers that pose challenges for deploying broadband over fixed networks using fiber or cable. In turn, this expansion of eligibility corresponds with the shrinking gap in broadband deployment discussed previously. In the case of FCC, the agency has taken action since the 1990s to address technological changes related to broadband deployment. For example, changes in communications technology and competition in the communications marketplace led FCC to reform the high-cost program for purposes beyond maintaining telephone service, including supporting broadband deployment. In 2011, FCC adopted new rules that fundamentally changed the high-cost program and expanded the program to support broadband capable networks. Under these rules, FCC established new funding streams within the high-cost program, such as the Connect America Fund, which addresses fixed broadband availability gaps in underserved and unserved areas, and the Mobility Fund, which supports deployment of wireless networks to provide mobile broadband. FCC also updated its regulatory framework to recognize changes in existing technology and potential technologies in delivery of broadband. For example, in 2016, FCC deemed geostationary satellites eligible to participate in the second phase of the Connect America Fund. Additionally, since 2017, FCC also recognized low and medium earth orbiting satellites as broadband-capable technologies that may be eligible to participate in programs after deployment. According to FCC officials, prior to these changes, they did not consider satellite as broadband- capable due to its high signal latency and internet speeds that were below the FCC benchmark speed, issues that recent technological advances have improved. Similar to FCC, RUS funding programs used to focus funding on telephone service but over time, RUS has reformed them to provide funding for broadband infrastructure and deployment. For example, according to RUS officials, since 1995 the RUS Telecommunications program has only funded systems that were capable of providing high-speed internet and now supports broadband services. In addition to past program transformation efforts, both FCC and RUS have proposed actions to further reform or expand their programs that provide funding for broadband deployment. For example, in August 2019, FCC started the rulemaking process for the new Rural Digital Opportunity Fund. In January 2020, FCC adopted a Report and Order establishing a framework for the fund, providing up to $20.4 billion through two funding rounds, each providing support over overlapping 10-year periods. This fund is the next iteration of the high-cost program, and it continues the overarching goals of prior high-cost programs to expand service into rural areas. The Rural Digital Opportunity Fund will focus its first round of funding on census blocks that FCC deployment data have marked as completely unserved, and per the FCC order will incentivize parties participating in the program to serve tribal census blocks. Similarly, in April 2020, FCC initiated a rulemaking to establish the 5G Fund—which would replace the Universal Service Mobility Fund Phase II—and make up to $9 billion available to carriers to aid in deployment of advanced 5G mobile wireless services in rural America. In addition to FCC’s actions, RUS officials said they are planning for future funding rounds for the ReConnect Program after they have awarded the initial phase of funding. As of April 15, 2020, RUS had closed the application phase for a second round of funding under the program. Despite federal efforts to address broadband gaps, there are still limits on participation in some programs. For example, RUS’s ReConnect Program offers a mix of grants and loans to incentivize broadband infrastructure in areas not currently served by existing service providers. However, the ReConnect Program limits eligibility to fixed and satellite broadband providers, with mobile wireless networks ineligible for funding. In order to participate in FCC’s high-cost program, a provider must meet FCC’s definition of an eligible telecommunication carrier (ETC). However, our prior work and stakeholders we interviewed for this review identified barriers to attaining ETC status. As we previously reported, tribal entities cited the statutory requirements applicable to ETC designation as a primary barrier to accessing federal funds. Additionally, cable providers we spoke with for this review also said they viewed the ETC designation as a potential barrier to entry into the high-cost program. At present, FCC and states have complementary authority to make ETC designation decisions. During our 2018 review of barriers that tribes face in supporting broadband investment, FCC officials said that most of the carriers that were eligible for ETC designation at that time were the telephone companies that were in existence when the 1996 Act was enacted into law. Further, FCC officials said they determined that the statute is clear that only ETCs may receive program support, and therefore the agency does not have the authority to allow non-ETCs to receive high-cost support payments. More recently, greater numbers of companies that are not traditional telephone companies have received ETC designation, particularly in connection with the Connect America Fund Phase II. In addition to the ETC designation matter described above, industry stakeholders highlighted several other issues that can affect access to federal support, noting that these issues may require further action by relevant federal agencies or possible legislative action. The issues cited included: Technology Neutral Federal Programs: Most federal broadband programs focused on fixed technology over other technologies, but as described above, there have been reforms to broaden eligibility to other providers. Even with those reforms, industry stakeholders representing satellite and mobile service providers noted that there are program requirements that affect one technology more than another technology. For example, satellite providers that sought funding through FCC’s Connect America Fund said that, after they sought funding in 2018, FCC changed how it planned to measure latency, a change affecting only satellite providers. Spectrum Availability: Availability of adequate spectrum was cited by a range of stakeholder groups we spoke with as an issue that could affect providers’ ability to deploy services. Spectrum availability affects many broadband services. For example, in addition to satellite and mobile providers, fixed-wireless—a point-to-point or point-to- multipoint broadband service delivery option—is a type of fixed broadband service often utilized in rural areas that needs spectrum to deliver service. In its comments, FCC noted that the changes it made to the exact testing conditions were in response to requests by satellite providers and that the agency balanced changing expectations with the benefits of minimizing unnecessary burdens on carriers and their customers imposed by the testing regime. Federal Funding Mechanisms: Some industry stakeholders we spoke with noted that the programs’ funding requirements and the type of federal funding mechanism utilized—such as grants, loans, or hybrids of grants and loans—could affect a provider’s ability to access federal funds. For example, RUS awards its Reconnect Program funding through grants, loans, or both. Providers we spoke with noted that for all of the funding options, the Reconnect Program requires a lien on the funded assets. For some providers, allowing a lien against an asset would violate stockholder agreements or other aspects of their business. Additionally, representatives from an association representing state public service commissions we spoke with also stated that the FCC high-cost fund and its various funding programs should be reviewed periodically to ensure that both the contributions and funding outcomes are in the best interests of consumers and providers. Although agencies have modified their broadband funding programs to keep up with changes in broadband services, other changes that could be beneficial to the public would require statutory changes. The last major overhaul to telecommunications law occurred under the 1996 Act, which established many of the telecommunications programs that now fund broadband deployment and established statutory constructs like ETCs, which, as discussed above, can affect provider eligibility. Given the significant and ongoing changes in how Americans use the internet and the technologies that provide access to it, members of Congress have proposed legislative actions in recent years to sustain progress in closing the broadband deployment gap. Among the proposals were a range of federal funding and incentives aimed at improving funding to rural areas and addressing issues related to deployment. As we previously reported, FCC’s definition of broadband availability can lead to overstatements of fixed broadband availability. For instance, in 2013 FCC began collecting broadband availability data by census blocks. The agency counts an entire census block as served if a provider reports that it does offer—or could offer without an extraordinary commitment of resources—service some, but not necessarily all, of the locations in the census block. FCC has recognized that by measuring availability at the census block level, not every person may have access to broadband in a block that the data show as served. FCC has noted that census blocks in rural areas tend to cover larger geographic areas than in urban areas and providers may only deploy service to a portion of the census block. Deployment reporting in this manner does not allow FCC to answer with certainty questions like how many Americans have broadband available to their homes or where it needs to target its resources. Several selected providers and industry associations we contacted also expressed concerns about how deployment is measured, and said the measurement approach could make it difficult for them to make informed investment and deployment decisions. In 2013, FCC declined to gather fixed broadband data at a level more granular than the census block—such as address-level data—because the agency concluded that the complexity and filing burden on the industry would outweigh the benefit. In 2018, we recommended, among other things, that FCC develop and implement methods—such as a targeted data collection—for collecting and reporting accurate and complete data on broadband access specific to tribal lands. Subsequently in 2019, FCC began to address this recommendation by establishing the Digital Opportunity Data Collection— a more granular, nationwide data broadband deployment collection effort. FCC issued a Report and Order, and Second Further Notice of Proposed Rulemaking, on this new initiative to improve the accuracy of broadband deployment mapping data in August 2019. This new initiative requires fixed broadband providers to identify their service areas using free-form geographic shapes called polygons. The polygons would identify the presence of service with more geographic precision than the current census-block method affords. Officials from FCC and USTelecom stated this new mapping effort was informed in part by a 2019 USTelecom mapping and data-collection pilot project. According to USTelecom officials, this pilot project combined several data sources to determine “serviceable locations,” which refers to specific locations or structures that could need broadband. With these serviceable locations, USTelecom’s pilot project sought to distinguish between buildings not typically needing broadband service—such as a barn or storage shed—from a primary residence or small business. According to USTelecom representatives, a combination of polygons and serviceable locations data would yield a better picture of where to target new investments in deployment to achieve the greatest increase in access to broadband. FCC officials noted that the impact of the polygon approach may vary depending on the service features of each census block. Figure 4 below shows an example of how the new polygon approach may result in improved data compared to the census block approach currently used by FCC. As part of the rulemaking, FCC has requested comments on several issues, including how providers should define their polygons, and the procedures that fixed providers should follow if their polygons are disputed. At the time it issued the report and order, FCC had ongoing investigations into the coverage maps of some wireless providers, and therefore limited the new data collection obligations to fixed broadband providers while seeking comment on how best to incorporate mobile wireless coverage data into the effort in the future. FCC also proposed the use of public input to help verify the accuracy of the polygons and sought comment on whether it should discontinue the collection of census block data if the polygon-based deployment data prove to be gathering better deployment data once it is established. Additionally, on March 23, 2020, the Broadband Deployment Accuracy and Technological Availability Act was enacted. The act directs FCC to issue final rules on data collection for both fixed and wireless deployment within 180 days. In commenting on a draft of this report, FCC noted that it is in the process of implementing the statute, and that the statute largely affirms rules that FCC adopted in August 2019 but differs in some respects. FCC also noted that, while it is working to implement the requirements of the act, it is unable to comply with all of the requirements without a further appropriation. This change has the potential to improve how both FCC and RUS target deployment gaps by providing more accurate and granular information that could better identify truly unserved areas and results in better targeting of federal funds to those areas. As we discussed above, our prior work has found that FCC’s current deployment data lack accuracy in a manner that overstates where consumers have access to broadband, which, in turn, limits federal agencies’ efforts to effectively target their broadband funds. Specifically, our 2018 report noted that overstating access increases the risk that unserved areas remain unserved, since areas that deployment data show as served are not eligible for funding. Although that report specifically looked at this risk for tribal areas, it is potentially a concern for other unserved areas. FCC officials noted that improved data would help inform future funding under the high-cost program by more accurately targeting unserved areas. RUS officials told us that they use FCC deployment data as a source for RUS mapping and program eligibility requirements for the ReConnect Program. RUS officials also believe that their program would benefit from more accurate deployment data. While efforts are under way to improve deployment data and mapping efforts, both FCC and RUS are continuing to move forward with their programs for funding broadband infrastructure in underserved and unserved areas. The lack of accurate data regarding locations that are not served by broadband may affect the ability of these agencies’ programs to target federal funds. In particular, providers and industry associations noted there was a risk of federal programs subsidizing deployment into areas that already have service, at the expense of an unserved area that does not have any service. Given this risk, FCC and RUS each have “eligible area” validation processes that they use to determine if areas are already being served and therefore ineligible for federal support. Additionally, FCC and RUS have engaged in interagency coordination efforts to keep each agency’s program staff apprised of key dates and issues in an effort to avoid overlap between the programs. Officials from both FCC and RUS have stated that their programs are complementary and noted that their eligibility validation processes reduced the likelihood of service overlaps. The agencies use different processes to determine which geographic areas are eligible for funding, and they share information about the results of these processes as they are able. According to FCC officials, the agency has used a process for validating unserved areas in connection with its support of the Universal Service high-cost program. This validation process primarily relies on providers verifying the Form 477 data they self-report, and then using that data to create and publish a list of unserved census blocks prior to awarding funding. Results from this process have informed how FCC establishes eligible areas, such as those eligible to receive funds in the Connect America Fund’s second phase of awards. A similar process is under way in connection with the Rural Digital Opportunity Fund. In an additional step to address concerns regarding program overlap, FCC officials noted that the Rural Digital Opportunity Fund would exclude census blocks that have been awarded funding through the RUS ReConnect Program. RUS’s process to verify eligible areas includes provider participation in the verification, as well as onsite testing and research by field staff, to independently verify eligibility of the geographic areas in each ReConnect grant or loan application. RUS officials said they use the publicly available FCC data on unserved areas as a key factor in eligibility decisions. Specifically, RUS officials said that they focus ReConnect eligibility on areas FCC reported as unserved as of 2015 when the first round of FCC’s Connect America Fund program was started. They also noted that throughout the application and funding process, they seek input from providers through public notices and emails to solicit feedback on whether areas selected for proposed funding are already served. After receiving provider feedback on eligible areas, RUS then deploys field staff to conduct on-location tests and other reviews as necessary to determine if the area was unserved prior to funding. In addition to their eligibility validation steps, FCC and RUS officials told us they share information about where their broadband deployment programs are funding new deployments, as well as other relevant information related to program activity, such as the timing of program applications and awards. FCC and RUS officials told us that they share program information through participation in interagency meetings and working groups that focus on broadband deployment issues and through posting relevant program information—such as funding decisions—online. For example, the Chief of the FCC’s Wireline Competition Bureau and the RUS Administrator, along with other FCC and RUS staff, met in July 2019, January 2020, and February 2020 to discuss issues related to their respective broadband funding programs, including the roll out of the Rural Digital Opportunity Fund and second round of the ReConnect Program. FCC officials told us that at these meetings agency representatives discussed the anticipated timing of elements of their respective programs and ways in which to maximize coordination and avoid overlap. Officials from both agencies also noted there has been ongoing communication between FCC and RUS at the staff level concerning program status and developments through phone calls and meetings. In addition to this ongoing coordination between RUS and FCC, representatives of FCC and RUS also said they participate in relevant working groups through the American Broadband Initiative, such as the Initiative’s Federal Funding Workstream, which meets bi-weekly to discuss broadband funding and deployment. The range of collaboration activities undertaken by RUS and FCC staff is especially important because both agencies have similar goals but different timelines for moving forward with their programs. For example, as of March 2020, FCC had the eligible area validation process under way for the Rural Digital Opportunity Fund. Although some timelines are still to be determined, FCC plans to start bidding on the program’s auction phase in October 2020. At the same time, RUS was in the midst of announcing approved projects for the first funding round of the ReConnect Program, and it had applications open for the second round with applications due by April 15, 2020. FCC officials noted that they plan to maintain close coordination with RUS to reduce the likelihood of overlap with any areas that may be deemed eligible to receive ReConnect funding in the program’s second round. Through prior reforms of their respective broadband programs, FCC and RUS have taken steps to try and effectively target federal dollars to support broadband deployment while avoiding the potential to duplicate funding in an area. Continuing to improve collaboration and information sharing regarding eligibility and program timelines will be critical for both agencies to achieve greater efficiency in their program’s ability to target funds to unserved areas and thus make progress toward closing the deployment gap. We provided a draft of this report to the Federal Communications Commission, the Department of Agriculture’s Rural Utilities Service, and the Department of Commerce’s National Telecommunications and Information Administration for comment. FCC and RUS provided technical comments, which we incorporated as appropriate. NTIA had no comments. We are sending copies of this report to the appropriate congressional committees, the Chairman of the Federal Communications Commission, the Secretary of the Department of Agriculture, the Secretary of the Department of Commerce, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Another estimate of capital expenditures by USTelecom—a broadband industry association—uses a different scope and methodology than the U.S. Census Bureau’s Annual Capital Expenditures Survey. The association reports total capital expenditures for U.S. broadband providers, as shown in table 2. USTelecom’s data include expenditures from fixed (wireline), mobile (wireless), and cable companies. Its primary source of data are publicly traded companies’ financial statements filed with the Securities and Exchange Commission. USTelecom also makes estimates for companies that do not report financial information publicly. Its data exclude some companies, such as satellite providers, telecommunication resellers, and electric utilities. USTelecom publishes estimates annually for advocacy or research purposes. Its capital expenditures data differ from the Census Bureau’s Annual Capital Expenditures Survey estimates for telecommunications industry in scope, methodology, and timing, among other things. For instance, the Census Bureau’s survey is broader in scope. Specifically, in addition to the types of companies USTelecom includes in its data, the Census Bureau’s survey data include satellite providers, resellers, and other telecommunications providers. In addition, the Census Bureau collects data through a survey instrument from both publicly traded and privately held companies across the United States. It makes statistical inferences about the capital expenditures for the entire telecommunications industry, whereas USTelecom collects data mainly from financial reports for a defined set of providers and makes estimates for companies that do not report financial information publicly. Moreover, USTelecom typically releases its capital expenditure data within a year after companies release their financial data while preliminary survey results from the Census Bureau are made public about 2 years after companies report and data reliability assessments occur and the final revised results are made public about 3 years after companies report. In addition to the USTelecom and Census Bureau estimates, investment firms, such as Goldman Sachs and UBS, also estimate or may report industry capital expenditures for selected publicly traded companies providing broadband service. In addition to the contact named above, Andrew Huddleston (Assistant Director); Steve Martinez (Analyst in Charge); Oluwaseun Ajayi; Michelle Bacon; Carl Barden; Melissa Bodeau; Hannah Laufe; Dan Luo; Malika Rice; Sandra Sokol; and Betsey Ward-Jenks made key contributions to this report.", "summary": "Broadband is critical for economic, educational, and personal uses. Industry and federal investments have made broadband available to the vast majority of Americans. For example, FCC's high-cost program provides funding to broadband providers to deploy broadband in rural, insular, and high-cost areas. However, some rural areas continue to lack access due, in part, to challenges with providing service to areas where deployment costs are high and returns on investment are low. GAO was asked to examine the current state of broadband investment and deployment. This report examines (1) industry and federal investments to deploy broadband in the United States since 2009, and (2) efforts federal agencies are making to address deployment challenges. GAO analyzed industry and federal government data from 2009 through 2017 or 2018 (the most recent year of available data) on broadband investments and deployment; reviewed statutes and regulations, rulemaking proceedings, and FCC, RUS, and NTIA program information; interviewed federal officials; and obtained information about deployment challenges from interviews with 32 industry, academic, and consumer stakeholders, including 16 broadband providers selected to represent a range of provider sizes and types of technologies. Telecommunications industry and federal government investments have expanded access to broadband in the United States. From 2009 through 2017, the industry made capital investments of about $795 billion, including investments in broadband infrastructure, according to U.S. Census Bureau survey data. Federal investments totaled about $47.3 billion to target broadband infrastructure for rural areas over the same time, according to data from the Federal Communications Commission (FCC), the Rural Utilities Service (RUS), and the National Telecommunications and Information Administration (NTIA). FCC's Universal Service Fund high-cost program expanded service to about 2.3 million residential and small business locations, mostly from 2015 through 2017, according to data FCC collects from providers. FCC reported that fixed broadband service was available to 94.4 percent of the U.S. population in 2018, up from 81.2 percent in 2012, although affordability and digital literacy remain barriers to adoption and use. While service availability for people in rural areas increased from 45.7 percent in 2012 to 77.7 percent in 2018, service in rural areas continues to lag behind urban areas, according to FCC's broadband availability report (see figure). FCC and RUS have taken actions to address deployment challenges, such as taking steps to improve their ability to pinpoint where gaps in broadband deployment still exist. In August 2019, FCC proposed an initiative to change how it collects broadband deployment data, with the goal of using a new methodology to improve data accuracy and FCC's ability to target funds to locations that lack access. FCC and RUS have also coordinated on broadband deployment issues. For example, to avoid funding areas where broadband service is already deployed, agency officials regularly communicate on information about where their broadband deployment programs are funding new deployments. Continued communication and coordination on topics such as collecting and using improved data will be especially important in assuring that federal dollars are effectively targeted as agencies' efforts to improve mapping and target resources progress. In prior work, GAO recommended that FCC improve its mapping data and RUS better manage its broadband programs. The agencies have addressed some, but not all, of the recommendations. FCC and RUS reviewed a draft of this report and provided technical comments.", "document_type": "gao"}
{"report": "To adjudicate a self-petition filed by a foreign national claiming to have suffered domestic abuse, USCIS adjudicators determine whether the self- petitioner has established the statutory eligibility requirements. A foreign national satisfies the applicable eligibility requirements by demonstrating that he or she (1) has a qualifying relationship with a U.S. citizen or LPR, such as a marriage; (2) was battered or subjected to extreme cruelty by his or her U.S. relative during the qualifying relationship; (3) is residing or has resided with the abusive U.S. citizen or LPR during the qualifying relationship; and (4) is of good moral character. A foreign national filing a VAWA self-petition as an abused spouse is also required to demonstrate that he or she entered into or intended to enter into the marriage in good faith and not in order to evade U.S. immigration law. For a good moral character determination, the petitioner typically should submit a local or state police clearance letter or a state-issued criminal background check from each place where he or she has lived for 6 months or more in the past 3 years immediately prior to filing the VAWA petition. The burden of proof is on the self-petitioner to demonstrate, by a preponderance of the evidence, that he or she has satisfied the statutory eligibility requirements. Considered evidence may include, for example, a criminal background check to establish the good moral character of a self- petitioner or testimony in the form of an affidavit to establish abuse on the part of the U.S. citizen or LPR relative. If the self-petition is approved, the point at which the petitioner will be able to apply for and obtain LPR status will depend on whether he or she is an immediate relative of a U.S. citizen (i.e., U.S. citizen’s unmarried child under age 21, spouse, or, where the citizen is at least 21, their parent), or other relative of a U.S. citizen or LPR, who, unlike immediate relatives, are subject to annual immigration limits. Under U.S. immigration law, there are confidentiality protections for VAWA self-petitioners. Any information about the self-petitioner is considered confidential and, with certain exceptions, officials from DHS are prohibited from releasing any information about the petitioner, including that the petitioner has sought immigration relief. In addition, adjudicators are prohibited from using information provided solely by the alleged abuser to make an adverse determination of admissibility or deportability against self-petitioners, unless such adverse information has been corroborated through independent sourcing consistent with departmental policy. Finally, according to DHS policy, DHS officials typically do not take enforcement actions, such as executing an order of removal, against abuse victims when they are present at certain locations, such as domestic violence shelters, victims’ services programs, and community-based organizations. The self-petition adjudication process begins when a foreign national submits a Form I-360, “Petition for Amerasian, Widow(er), or Special Immigrant,” with supporting evidence, to USCIS. USCIS’s Vermont Service Center then begins the pre-adjudication phase and takes several actions. First, the service center makes a prima facie determination, which is an initial review of self-petition filings, to determine whether the self-petitioner has submitted evidence that, on its face, is responsive to each of the eligibility requirements noted above, in order to allow qualified aliens access to certain public benefits, if needed. If the self-petitioner has not submitted evidence to address each of the eligibility requirements, USCIS policy directs the service center to issue a request for evidence to the self-petitioner to provide additional evidence for the full adjudication of the petition. In addition, the service center conducts a safe address assessment on the self-petition to identify the address to be used for future communications with the self-petitioner to protect the self- petitioner’s confidentiality and safety. Finally, the service center’s Background Check Unit uses the TECS database to determine whether the self-petitioner is connected to any administrative or criminal investigations, is the subject of a national security concern, or is a public safety threat. The Vermont Service Center also checks the TECS database to determine whether any derogatory information exists on the foreign national that may impact the submitted self-petition. Figure 1 provides an overview of the USCIS self-petition process. To begin the adjudication phase, an adjudicator incorporates a self- petition filing into the self-petitioner’s Alien file. Adjudicators stated they review the evidence available in the self-petition filing and the Alien file and generally take one of three actions—approve, deny, or refer the petition for an administrative investigation. Adjudication may also be withheld. Approve. If a USCIS adjudicator determines that the evidence submitted by the self-petitioner satisfies the eligibility requirements noted above, the self-petition is approved. Once USCIS approves a self-petition, DHS will generally defer any removal action against the individual, as he or she goes through the process of applying for LPR status. According to USCIS data, of the 82,357 self-petitions adjudicated from fiscal year 2009 through fiscal year 2018, 72 percent were approved. Self-petitioners who obtain LPR status are not eligible for U.S. citizenship until they have been an LPR in the United States for at least 3 years. Deny. An adjudicator may deny a self-petition if the petitioner has not demonstrated that he or she is more likely than not eligible for petition approval, considering all credible evidence provided by the self- petitioner. In some circumstances, an adjudicator will issue a request for evidence to the petitioner to provide an opportunity for the petitioner to send additional information or documents. In response to this request, the petitioner has an opportunity to provide additional evidence; if that evidence does not sufficiently demonstrate that the petitioner meets the eligibility requirements, or additional evidence is not provided, USCIS may deny the self-petition. In other circumstances, an adjudicator will issue a notice of intent to deny to the self-petitioner in cases where it does not appear likely that the self-petitioner could overcome the deficiencies. This provides the self- petitioner an opportunity to respond. If the self-petitioner’s response does not sufficiently demonstrate that the petitioner meets the eligibility requirements or a response is not provided, the self-petition is subsequently denied. An adjudicator may also deny a self-petition if the petitioner abandons his or her self-petition or withdraws the self- petition by providing notice to USCIS in writing. According to USCIS data, among self-petitions adjudicated from fiscal year 2009 through fiscal year 2018, about 28 percent were denied. Of that, about 3 percent were withdrawn, revoked, or closed administratively. If a self- petition is denied and the self-petitioner has other valid immigration status, he or she may remain in the United States. Otherwise, the self- petitioner may be placed in removal proceedings. Adjudication withheld. An adjudicator may also withhold adjudication of a visa petition or other application if there is an ongoing investigation involving eligibility, in connection with a benefit request, and disclosure of information to the applicant or petitioner concerning the adjudication would prejudice the investigation. If adjudication is withheld from a self-petition, USCIS takes no further adjudicative action at that time, pending completion of the related investigation. Refer a petition for an administrative investigation. In addition to approving or denying a self-petition, an adjudicator may refer a self- petition to CFDO for an administrative investigation in cases when an adjudicator suspects fraudulent activity within the self-petition. In such cases, CFDO completes an administrative investigation and returns a Statement of Findings to the adjudicator. The Statement of Findings indicates whether fraud was found, not found, or whether the administrative investigation was inconclusive in finding fraud. After reviewing the Statement of Findings, immigration officers stated the adjudicator continues the adjudication process for the self-petition and may ultimately approve or deny the self-petition. According to USCIS data, the total number of VAWA self-petitions filed by foreign nationals increased from 7,360 in fiscal year 2014 to 12,801 in fiscal year 2018, an increase of about 74 percent. The number of filings by spouses—a subset of the above petitioners—increased from 7,131 in fiscal year 2014 to 11,213 in fiscal year 2018, an increase of 57 percent. Filings by spouses represented about 93 percent of self-petition filings from fiscal year 2014 to fiscal year 2018. See table 1. Immigration benefit fraud involves the willful or knowing misrepresentation of material facts for the purpose of obtaining an immigration benefit without lawful entitlement. According to USCIS officials, self-petition fraud is a form of immigration benefit fraud which can occur in a number of ways, such as through document fraud, including submission of falsified affidavits, or making false statements material to the adjudication. For example, a self-petitioner may submit a fraudulent marriage certificate with his or her self-petition in an attempt to establish a qualifying relationship with a U.S. citizen or LPR. Or a self-petitioner may submit a fraudulent affidavit falsely attesting that he or she was battered or subjected to extreme cruelty during the qualifying relationship with the U.S. citizen or LPR. For the purposes of this report, self-petition fraud is construed broadly to include any misrepresentation of material fact(s), such as making false statements, submitting forged or falsified documents, or conspiring to do so, in support of a VAWA self-petition. USCIS may deny, or revoke approval of, a self-petition upon determining that the self-petitioner is, or was, not eligible for petition approval by a preponderance of evidence, due to fraud material to the adjudication process. While it is unlawful to fraudulently obtain approval of an immigration benefit, U.S. immigration law does allow VAWA self- petitioners who may have committed such fraud to retain eligibility for LPR status when they or their family would otherwise suffer extreme hardship. GAO’s A Framework for Managing Fraud Risks in Federal Programs (Fraud Risk Framework) is a comprehensive set of leading practices that serves as a guide for program managers to use when developing efforts to combat fraud in a strategic, risk-based manner. The framework describes leading practices for establishing an organizational structure and culture that are conducive to fraud risk management; assessing fraud risks; designing and implementing controls to prevent and detect potential fraud; and monitoring and evaluating to provide assurances to managers that they are effectively preventing, detecting, and responding to potential fraud. Under the Fraud Reduction and Data Analytics Act of 2015, agencies are required to establish financial and administrative controls that are aligned with the Fraud Risk Framework’s leading practices. In addition, guidance from the Office of Management and Budget affirms that managers should adhere to the leading practices identified in the framework. The Fraud Risk Framework includes control activities that help agencies prevent, detect, and respond to fraud risks, as well as structures and environmental factors that influence or help managers achieve their objectives to mitigate fraud risks. The framework consists of four components for effectively managing fraud risks: commit, assess, design and implement, and evaluate and adapt. Leading practices for each of these components include the following: Commit: create an organizational culture to combat fraud at all levels of the agency, and designate an entity within the program office to lead fraud risk management activities. Assess: assess the likelihood and impact of fraud risks and determine risk tolerance and examine the suitability of existing controls and prioritize residual risks. Design and implement: develop, document, and communicate an antifraud strategy, focusing on preventive control activities. Evaluate and adapt: collect and analyze data from reporting mechanisms and instances of detected fraud for real-time monitoring of fraud trends, and use the results of monitoring, evaluations, and investigations to improve fraud prevention, detection, and response. Figure 2 provides an overview of the Fraud Risk Framework and its control activities. USCIS has an antifraud culture and a dedicated entity for managing fraud risks in the self-petition program. The first component of GAO’s Fraud Risk Framework—commit—provides that agencies should commit to combating fraud by creating an organizational culture and structure conducive to fraud risk management. In particular, agencies should create an organizational culture to combat fraud at all levels, by demonstrating a senior-level commitment to integrity and combatting fraud, and by involving all levels of the agency in setting an antifraud tone that permeates the organizational culture. The first component of the Fraud Risk Framework also calls for an agency to create a structure with a dedicated entity to lead fraud risk management activities. Consistent with the Fraud Risk Framework, we found USCIS has promoted an antifraud culture in several ways. It has demonstrated a senior-level commitment to combating fraud and involvement at all levels. Within the Vermont Service Center, senior officials who oversee the VAWA self-petition unit, as well as adjudicators who review petitions, are evaluated on activities related to managing fraud risks in the self-petition process. For example, according to performance appraisal documentation, senior officials are evaluated on their ability to consistently identify immigration fraud. Specifically, experienced adjudicators and supervisors stated that they are evaluated on their ability to review fraud referral sheets submitted by adjudicators to determine whether the adjudicator has appropriately identified and described suspected fraudulent activity in a self-petition. In addition, senior officials told us they independently review a sample of self-petitions adjudicated during each fiscal year for quality assurance purposes, to include identification of suspected fraud. Adjudicators are evaluated by their supervisors on their ability to identify fraud within the self-petition adjudication process, which includes identifying suspected fraudulent activities in self-petitions, submitting fraud referral sheets to their supervisors, and collaborating with CFDO on resolving self-petition adjudications where suspected fraudulent activity has been identified. In addition to being evaluated on their ability to identify fraud, officials have implemented several activities that contribute to an antifraud tone. For example, officials at the Vermont Service Center stated that VAWA self-petition unit adjudicators and CFDO immigration officers collaborate and share information to combat potential fraud through activities that include monthly meetings, regular contact through their co-location, and an electronic bulletin board. Officials stated that during monthly meetings, immigration officers answer questions from adjudicators on fraudulent schemes and activities uncovered in their administrative investigations of self-petitions. In addition, adjudicators we spoke to stated that because they are co-located with CFDO, they have direct access to immigration officers to obtain feedback on identifying suspected fraudulent self- petitions prior to submitting a formal fraud referral sheet. Finally, CFDO maintains an electronic bulletin board for sharing information with adjudicators on new potentially fraudulent activities they have identified through their administrative investigations. Adjudicators we spoke to stated that the bulletin board assists with identifying fraud indicators during adjudication. We also found that USCIS has created a dedicated entity to lead fraud risk management activities for the self-petition program. According to USCIS officials, the CFDO unit at the Vermont Service Center, in conjunction with FDNS headquarters, is that dedicated entity. Within the Vermont Service Center, CFDO officials stated the CFDO unit consists of three immigration officers and a supervisory immigration officer who have defined antifraud responsibilities, such as conducting administrative investigations of self-petition filings that are referred by adjudicators who suspect fraudulent activity. In addition, the immigration officers are responsible for liaising with law enforcement entities, such as ICE HSI, to provide logistical support in law enforcement matters. According to the officials, CFDO and FDNS fulfill other fraud risk management responsibilities described in GAO’s Fraud Risk Framework, including leading or assisting with fraud training for adjudicators. While USCIS has taken some steps to assess fraud risks in the self- petition program, the agency has not conducted a formal assessment of such program risks. The second component of the Fraud Risk Framework—assess—calls for federal managers to plan regular fraud risk assessments, and to assess risks to determine a fraud risk profile. A fraud risk profile is the summation of key findings and conclusions from a fraud risk assessment, including the analysis of the types of internal and external fraud risks, their perceived likelihood and impact, managers’ risk tolerance, and the prioritization of risks. The fraud risk assessment should be tailored to the program, and in identifying and assessing risks to determine the fraud risk profile, the focus should be on likelihood and impact of inherent fraud risks. This means not only fraud risks already known through program experience, but also other fraud risks that may not yet have been experienced but can be identified, based on the nature of the program. Such risks can be either internal or external to the program. USCIS has not assessed fraud risks and determined a fraud risk profile for the self-petition program, as USCIS officials told us that they were unfamiliar with the concept of a comprehensive fraud risk management process, as provided in the Fraud Risk Framework. Instead, USCIS officials said they viewed fraud risk management more practically, from the standpoint of adjudicating self-petitions and referring suspected fraudulent activity to CFDO. As part of those efforts, CFDO staff review fraud referrals to determine potential fraud schemes and trends that may exist in the self-petition program. While these are positive steps, they do not constitute an assessment of program fraud risks that would position USCIS to develop a fraud risk profile for the self-petition program. More specifically, the Fraud Risk Framework calls for agencies to identify inherent fraud risks of a program, examine the suitability of existing fraud controls, and then to prioritize “residual” fraud risks—that is, risks remaining after antifraud controls are adopted. According to USCIS officials we spoke with, the self-petition program is vulnerable to fraud. For example, USCIS officials stated that they have seen cases in which self-petitioners submitted false or forged leases in an attempt to show they resided with the alleged abuser during a period of abuse, as well as foreign marriage or divorce certificates later found to be falsified in an attempt to establish that the self-petitioner entered into a marriage with a U.S. citizen in good faith. While these are examples of individual fraudulent activities, USCIS officials cannot be assured they have identified inherent fraud risks to the program without undertaking a fraud risk assessment as provided in the Fraud Risk Framework. USCIS officials we spoke with acknowledged the benefits of conducting a fraud risk assessment and noted that a formal analysis of self-petition fraud referrals and administrative investigations could help to better understand the extent of fraud risks that exist in the self-petition program. Further, the Fraud Risk Framework highlights the need for fully assessing fraud risks when there are changes to the program or operating environment—conditions that apply in the case of the self-petition program. USCIS data indicate that the number of self-petitions filed has been growing in the past 5 fiscal years, and at the end of fiscal year 2018, USCIS had received 12,801 self-petitions and had over 19,000 self- petitions pending adjudication. In this environment, identification of inherent fraud risks, coupled with assessments of the likelihood and expected impact of those risks, could help USCIS better target its fraud prevention and detection efforts. Planning and conducting regular fraud risk assessments, as provided in the Fraud Risk Framework, would better position USCIS to identify fraud risks in the self-petition program. Regularly assessing fraud risks in the self-petition program to determine a fraud risk profile would also help USCIS better determine the extent to which the agency has designed and implemented adequate fraud prevention controls. USCIS has controls designed to help prevent and detect fraud in the self- petition program, but has not developed a risk-based antifraud strategy for the program consistent with the Fraud Risk Framework. The third component of the Fraud Risk Framework—design and implement—calls for agencies to design and implement a strategy with specific control activities to address risks identified in the fraud risk assessment. In particular, managers should develop and document an antifraud strategy based on the fraud risk profile (developed as part of the fraud risk assessment of the second component of the Framework), and design and implement specific control activities to prevent and detect fraud. The basis for these activities should be the prioritized residual risks identified earlier, meaning that the agency adopts a risk-based antifraud control strategy. This approach is in line with Standards for Internal Control in the Federal Government, which requires managers to design a response to analyzed risks. USCIS has instituted some fraud controls for the self-petition program, particularly controls related to preventing and detecting fraud. USCIS’s specific fraud control activities include, for example, the Vermont Service Center Background Check Unit conducting TECS checks on foreign nationals who submit self-petitions during the pre-adjudication stage to determine whether the self-petitioner is connected to any administrative or criminal investigations, is the subject of a national security concern, or is a public safety threat. In addition, USCIS has a process for adjudicators to refer petitions when they suspect fraudulent activities to CFDO for administrative investigation. Specifically, USCIS official stated that in cases where an adjudicator suspects potential fraud in a self-petition, the adjudicator is to complete and submit a supervisor-approved fraud referral sheet to CFDO. After receiving a referral, the center is to determine whether the referral has sufficient information to warrant an administrative investigation. CFDO also provides fraud training to adjudicators. While these controls help USCIS prevent and detect potential fraud in the self-petition program, USCIS has not developed and implemented a risk- based antifraud strategy based on a fraud risk assessment as provided under the Fraud Risk Framework. This is because, as noted earlier, the agency has not undertaken an assessment of inherent program fraud risks. USCIS officials told us that even with adjudicator and CFDO staff experience with identifying and investigating potential fraud in self- petitions, unknown fraud risks may nevertheless remain. USCIS officials acknowledged the benefits of conducting a fraud risk assessment, such as designing and implementing new control activities, as well as revising existing controls, if they determine that controls are not effectively designed to reduce the likelihood or impact of an inherent fraud risk to a tolerable level. USCIS officials told us that adjudicators and CFDO staff conducting administrative investigations have identified trends in fraudulent activities; however, officials also stated that it is difficult for staff to identify fraud risks that are present but that are not identified through adjudication or investigation. Examining antifraud controls, and adjusting them as necessary based on an antifraud strategy, would help the Vermont Service Center to better ensure that its controls are addressing fraud risks in the self-petition program, including inherent risks. USCIS is developing training on fraud-related issues for the self-petition program. The third component of the Fraud Risk Framework, discussed earlier, identifies training as a leading antifraud practice and as an antifraud control to increase fraud awareness of possible fraud schemes. Training and education intended to increase fraud awareness among managers and employees, among others, can serve as a preventive measure to help create a culture of integrity and compliance within the program. Increasing fraud awareness can also enable managers and employees to better detect potential fraud. To achieve these benefits, the Fraud Risk Framework notes that a leading practice is to require all employees to attend training upon hiring and on an ongoing basis thereafter. Training should convey fraud-specific information that is tailored to the program and its fraud risk profile. Specifically, it should include information on fraud risks, such as examples of specific types of fraud that employees are likely to encounter, and information on how to identify fraud schemes. USCIS has a training program in place for new adjudicators that provides general information on identifying potential fraudulent activities as part of any adjudication and has plans to develop new fraud awareness training tailored specifically to the self-petition program. According to CFDO officials, USCIS provides general training to new adjudicators during a 6- day classroom training program. During this training, new adjudicators are instructed on eligibility and evidence requirements across several application types, including the VAWA self-petition. The training includes information on eligibility requirements, supporting documentation needed, and evidentiary requirements for these applications. Application forms are used to teach adjudicators fraud identification, and adjudicators are given a list of common fraud indicators to assist when reviewing applications, according to adjudicators. This training also includes a 2-hour presentation on the VAWA self-petition program where general fraud concepts, such as document fraud, are discussed. While adjudicators receive general training when hired, USCIS had not provided tailored antifraud training on the self-petition prior to fiscal year 2019. Adjudicators we spoke to noted that fraud schemes continue to evolve, and that fraud schemes and tactics are becoming more sophisticated and thus more difficult to identify during adjudication of VAWA self-petitions. Adjudicators we spoke to also noted that ongoing training that included information on evolving fraud schemes and tactics specific to the self-petition program would help increase their ability to identify potentially fraudulent activities. Further, adjudicators noted that additional training on how to identify potential fraud when a petitioner submits an attested affidavit would help to identify potentially fraudulent self-petitions. In response to our discussions and adjudicator feedback, a senior CFDO official stated that they recognized the need for fraud training, including training tailored to the self-petition program, and planned to hire an additional four immigration officers in fiscal year 2019 to increase fraud training for adjudicators, among other duties. In response to discussions we had during our review, officials at the center also stated they planned to develop and implement tailored fraud training for the self-petition program by the end of fiscal year 2019. CFDO officials stated they also plan to continually update the training based on any new potentially fraudulent activity identified in the self-petition program. USCIS has data analytics capabilities, but has not applied these capabilities as an antifraud tool for the self-petition program. The third component of the Fraud Risk Framework, discussed earlier, cites data analytics as a leading practice in developing specific control activities to prevent and detect fraud—in particular, to mitigate the likelihood and impact of fraud. In addition, Standards for Internal Control in the Federal Government provide for ongoing monitoring of operations and internal controls, and data analytics can aid in this task. According to the Fraud Risk Framework, data analytics can include a variety of techniques, such as data mining (identifying suspicious activity or transactions, including anomalies, outliers, and other red flags, within data) and data matching (comparing information in one source to another to identify inconsistencies), which can enable programs to identify potential fraud. Further, predictive analytics can identify particular types of behavior, including fraud, before transactions are completed. According to USCIS officials, the agency has developed and uses data analytics capabilities as part of its efforts to identify and prevent fraud within immigration benefit programs. These officials said the agency has not had sufficient resources to pursue data analytics separately for each type of immigration benefit program. Thus, they stated that USCIS deploys its data analytics resources strategically across immigration benefit programs, based on factors including, among other things, the volume of filings or applications for specific benefit programs, the amount of data available for electronic analysis, and whether the type of application is one that can lead to a change in immigration status, such as asylum or permanent residency. Under this approach, for example, USCIS officials stated that marriage and employment-based benefit programs are areas where there is a greater amount of electronic data available for analysis. USCIS’s development and use of data analytics in other programs are positive actions in helping the agency in its efforts to prevent and detect fraud risks to immigration benefit programs. However, USCIS has not conducted a comprehensive assessment of fraud risks in the self-petition program to provide an understanding of the likelihood and impact of program risks and to help inform the level of resources USCIS should allocate to addressing those risks. Consistent with the Fraud Risk Framework, using data analytics capabilities in the self-petition program could help position USCIS to better identify and assess fraud risks in the program. Such data analysis does not by itself necessarily confirm the existence of fraud, but the use of data analytics could help USCIS to determine indicators of potential fraud. Further, consistent with the Fraud Risk Framework, this type of analysis can aid in decisions on prioritization of investigative resources. According to the Fraud Risk Framework, specific data analytic tests that are most effective in helping managers prevent or detect potential fraud vary by program because of the different fraud risks programs face. By using information on previously encountered fraud schemes or known fraud risks, managers can identify signs of fraud that may exist within their data. In the absence of an assessment of fraud risks in the self- petition program, we asked USCIS officials about fraud risks or schemes they have identified in the program and analyzed program data to identify examples of ways USCIS could use program data to better prevent or detect potential self-petition program fraud. As examples, we analyzed variables that generally serve to identify individuals, such as address and Social Security number, because multiple instances of the same identifier in program data can indicate misuse of personally identifying information. In addition, we examined other variables associated with self-petition filings and outcomes of self-petition adjudications, as trends in variables associated with denial outcomes, for example, can provide indicators of potential fraud. We offer the following examples not as illustrations of confirmed or even potential fraud, but rather to help illustrate the use of data analytics as a tool for helping to prevent and detect fraud in the self- petition program. For example, one area in which we identified multiple instances of the same variable was with addresses. While not necessarily indicative of fraud, our review of USCIS data showed that from fiscal year 2009 to January 2019, thousands of self-petition filings had addresses that were used in multiple self-petition filings. According to USCIS officials, this is not unexpected and further research would be required to authoritatively explain the multiple address use we identified. The self-petitioner program also allows self-petitioners to use a “safe address” for communications, in an effort to ensure confidentiality in filing of the petition. According to USCIS officials, self-petitioners often use an assisting attorney or representative’s business address as their safe address. In prior work on other immigration benefits, we have highlighted where DHS officials have used multiple instances of the same address in program data to target investigative follow-up. Our analysis of data on the number of times unique addresses were used in filing self-petitions showed, for instance, 37,201 filings had addresses used at least 10 times each from fiscal year 2009 to January 2019. In some cases, an address was used hundreds of times—–in a group of 6,302 self-petitions, there were 31 instances in which addresses were used 100 or more times. Table 2 provides examples of multiple uses of addresses, which we selected for illustrative purposes from among all the multiple uses of addresses we identified. It shows, for example, in the last row, that there was one unique address that was used 845 times in self-petition filings, all of which were separate filings. Thus, the total number of self-petitions involved with this address was 845. Another example of multiple instances of the same variable was identification numbers. In particular, our review of USCIS data showed that from fiscal year 2009 to January 2019, there were thousands of self- petition filings that used duplicative identifying numbers – Social Security numbers and Alien numbers. According to USCIS officials, as with multiple uses of the same address, further research would be required to authoritatively explain the multiple identification number use we identified. For example, according to USCIS officials, a foreign national parent and child may file separate self-petitions, resulting in multiple petitions using the same Social Security number. Also, it is common for people to file more than one self-petition if, for instance, they are able to obtain additional evidence after a decision is made. Our analysis of the number of times unique Social Security numbers were provided in self-petition filings, as well as unique Alien numbers, showed that for each, there were several thousand filings in which the numbers were used in multiple self- petition filings. In prior work, we have highlighted examples where multiple instances of the same Social Security number in program or payment data has indicated Social Security number misuse, such as where multiple individuals may have been using the same Social Security number for employment, and use of Social Security numbers to create synthetic identities, to obtain benefits for ineligible individuals using the Social Security numbers of eligible applicants. Table 3 provides examples of multiple uses of Social Security and Alien Registration numbers, selected for illustrative purposes from among all the multiple uses of identification numbers we identified. It shows, for example, in the last row, that there were 28 instances in which a unique Alien number was used in five different self-petition filings, all of which were separate filings. Thus, the total number of self-petitions involved with these 28 Alien numbers was 140. Another example of multiple instances of the same variables was assistance provided to self-petitioners by attorneys or other organizations. According to USCIS officials, self-petitions filed with assistance are expected, as organizations specialize in providing assistance to petitioners and applicants for immigration benefits, including self-petitions. Thus, USCIS officials noted that the appearance of the same attorneys or other organizations in program data is not necessarily indicative of fraud without further investigation. However, USCIS officials also noted that application “mills,” in which a relatively large number of incomplete or deficient self-petitions are submitted through a single preparer, also exist and could indicate avenues for further investigation. For example, if investigation revealed submission of self-petitioner affidavits or other supporting evidence across multiple self-petitions and using common information, such as duplicate wording, that could be an indicator of potential fraud. In July 2019, the U.S. Attorney for the District of Vermont announced an indictment against a self-petition preparer, charging the man with filing false statements with USCIS, including more than 1,800 fraudulent submissions for more than 1,000 self-petitioners over four years. The preparer is alleged to have falsely claimed that his clients were victims of abuse, without their authorization, according to the U.S. Attorney’s office. Our analysis of USCIS data from fiscal year 2009 to January 2019 showed that a large portion of self-petitions were filed with assistance by either attorneys or by other organizations. In the case of attorneys, according to our analysis, about 80 percent of self-petitions were filed by foreign nationals with assistance from attorneys or accredited representatives from fiscal year fiscal year 2009 through January 2019. However, while USCIS collects attorney identifying information on the paper form that self-petitioners submit, officials told us the agency does not capture this information electronically. Therefore, it is not available for analysis. Such analysis could indicate particular attorneys’ or representatives’ relative shares of self-petitions, and allow USCIS to conduct further analysis, as appropriate. In the case of organizations providing assistance, we found that about 70 percent of self-petitioners from fiscal year 2009 through January 2019 listed various organizations in their filings, and we identified a number of organizations assisting hundreds of self-petitioners each. For example, in one case an organization was listed as providing assistance in over 500 filings and in another case two entities were listed as providing assistance in over 400 filings each. However, according to USCIS officials, one legal organization providing assistance for 500 filings over a 10-year period is not uncommon or necessarily an indicator of fraud, given that, unlike other petitions, most VAWA self-petitions are filed with the assistance of an attorney or legal representative. Consistent with leading practices as described in the Framework, analyses of multiple uses of unique identifiers or instances of certain variables in self-petition program data could help USCIS identify areas for more targeted review, to determine what accounts for the duplicates in the program data and the extent to which they or other variables could be indicators of potential fraud. Moreover, according to the Fraud Risk Framework, data analytics, such as data mining, can identify suspicious activity or transactions, including anomalies, outliers and other red flags in a program’s data. Activity or transactions that deviate from expected patterns can potentially indicate fraudulent activity and program managers who effectively use data analytics to detect potential fraud look for unusual transactions or data entries that do not fit an expected pattern. However, as noted earlier, USCIS has not applied data analytics as an antifraud tool for the self-petition program. For example, as previously discussed, while adjudicating self-petitions, USCIS officers may request additional evidence from petitioners for reasons including incomplete or inconsistent information provided in filings, or suspected fraud, USCIS officials told us. The officials told us the agency does not compile data on the nature of these requests for additional evidence, which number in the thousands annually. Maintaining and analyzing such data—especially when adjudicators are requesting further information because they suspect possible fraud— could provide program-level insights into where self-petitions are incomplete or suspected to be fraudulent. Further, as noted earlier, USCIS does not assess data on the outcomes of self-petition adjudications to determine whether there are any trends or patterns in such data that could be indicative of fraud. In particular, denials or referrals can be based on multiple factors, including potential fraud. Analyzing such outcomes for any patterns or trends that could suggest potential fraud could help USCIS strengthen its efforts to identify and prevent fraud risks in the self-petition program. For example, USCIS officials told us they sometimes observe patterns or trends among self- petitions that may seem suspicious and warrant further review and noted as an example an increase in cases involving potentially false claims of abuse from self-petitioners from one country. While not necessarily indicative of fraud, and to provide some example of trend analysis on data on the outcomes of self-petition adjudications, we analyzed data on the outcomes of adjudications from the 10 countries with the largest number of self-petition filings and found the denial rate by country of birth of the self-petitioner varied by as much as a factor of three. Additional analysis across data on adjudication outcomes could help better identify areas for further investigation or review. In addition, the Fraud Risk Framework notes that one leading practice for using data analytics as an antifraud tool is to verify key information, including self-reported data and information necessary to determine eligibility. To effectively prevent and detect instances of potential fraud, managers are to take steps to verify reported information, particularly self- reported data and other key data necessary to determine eligibility for programs or receiving benefits. For example, according to officials, USCIS does not check the validity of key identification information submitted by self-petitioners, and it does not analyze outcomes across characteristics of self-petitions—practices our prior work indicates could strengthen USCIS’s use of data analytics. More specifically, although USCIS may conduct background checks on self-reported self-petitioner information, officials told us the agency does not have the capability to check the validity of Social Security numbers or passport information that self-petitioners report in their Form I-360 filings. Nevertheless, USCIS officials told us the agency routinely performs overseas verification of self- petitioner documents, such as birth certificates, marriage/divorce certificates, and passports. Based on our analysis of USCIS data, the agency maintains data that could be used for data analytics. For example, the majority of self-petition filings have full name information, addresses, Alien numbers, and, to a lesser extent, Social Security numbers. This relative completeness of data items provides opportunities for data-matching, which, as noted, is a key data analytics technique. USCIS officials told us that generally, they see the value of developing a data analytics capability for the self-petition program, noting that such a capability would be beneficial both in aiding fraud detection and prevention efforts, as well as by allowing timely, accurate reporting on self-petitioner data as part of routine program management and oversight. However, officials also noted that while expanding the range of electronic self-petitioner data maintained would increase analytical capabilities, there would be a cost to implementation, which would need to be balanced against the benefit of the additional antifraud tool, and any data analytics would need to be conducted so as to not target individuals or groups solely based on certain self-petitioner characteristics indicated by data. In other work, we have noted that leading practices in data analytic techniques alone may not be sufficient to prevent fraud in obtaining benefits but can help an agency prioritize and enhance fraud investigations. Developing and implementing a data analytics capability for the self-petition program would provide USCIS with tools to aid in identifying potential fraud in self-petition filings and aid in focusing resources. Further, analysis and insights developed through use of data analytics could inform the self-petition program’s periodic fraud risk assessments, which, as described earlier, are a key aspect of the fraud risk management process. The DHS VOICE Office provides assistance to potential victims of immigration-related crimes. In April 2017, in response to Executive Order 13768, ICE established the VOICE Office to provide professional services and assistance to potential victims and family members of victims of crimes committed by removable aliens. The office’s assistance to potential U.S. citizen and LPR victims includes, among other things, providing ICE community relations officers who serve as local representatives to help potential victims understand the immigration enforcement and removal process; victim assistance specialists who provide potential victims with direct service referrals for matters such as counseling; and information, such as the potential offenders’ immigration and custody status. In addition, the office provides referral information to the ICE HSI tip line and answers questions and concerns regarding immigration enforcement through the VOICE Office’s toll-free hotline. Data collected by the VOICE Office from hotline calls shows that in fiscal year 2018, a total of 1,543 calls were made to the VOICE Office. Of those 1,543 calls, 130 calls, or 8 percent, were from self-identified victims of marriage-related fraud requesting assistance. VOICE officials indicated that they would consider VAWA self-petition fraud as a subset of marriage fraud; however, self-petition fraud is not separately identifiable in their data. Of those 130 calls, the Office referred 78 alleged victims to ICE’s HSI Tip Line. For example, in one case from fiscal year 2018, a caller claimed that his or her spouse married the caller for immigration purposes and attempted to falsely press criminal domestic violence charges against the caller as a means of obtaining immigration status. The Office offered the caller local victim services and referred the caller to both USCIS and the ICE HSI Tip Line. Of the remaining 52 calls from self-identified victims of marriage-related fraud, the office provided the caller with an ICE community relations officer, and the officer recommended actions to victims, such as calling the ICE HSI Tip Line, or providing the victim with a victim assistance specialist to discuss available resources. For example, in another case from fiscal year 2018, a caller claimed his or her spouse married the caller to obtain immigration relief, and falsely accused the caller of domestic violence to obtain legal residency. The VOICE office referred the caller to ICE HSI and explained the victim assistance services available to the caller. See figure 3 for a description of calls made to the VOICE Office and subsequent office action. According to CRCL officials, assessing tips from self-identified victims of immigration fraud poses a challenge, since domestic abusers may use the immigration system against their victims by providing false tips in order to have them removed. Per statutory protections for self-petitioners, DHS treats tips as inherently suspect, and is barred from making adverse determinations of inadmissibility or deportability in adjudications based solely on information provided by certain individuals, such as the alleged abuser or a member of the abuser’s household. However, DHS may consider such information if it can be independently corroborated consistent with DHS policy. As for the alleged abuser’s information, which may have been included in a VAWA self-petition, USCIS officials noted that USCIS never provides such information to anyone including law enforcement even where allegations of criminal conduct are reported with a self-petition. As a result, U.S. citizens and LPRs face no consequences solely from being named in a self-petition regardless of its outcome. DHS has a referral process for suspected fraud in self-petitions, which may result in a referral to ICE for criminal investigation. Within USCIS, FDNS immigration officers review self-petition fraud referrals, conduct administrative investigations when warranted, and in limited circumstances, refer cases to ICE for criminal investigation. Fraud referrals related to self-petitions typically originate from five sources: (1) the TECS checks that the Vermont Service Center Background Check Unit conducts prior to adjudication, which include notifications that indicate potential national security concerns, public safety threats, and fraud leads in the preadjudication screening process; (2) USCIS adjudicators reviewing self-petitions at any time during the adjudication process; (3) other USCIS offices that may encounter potential self-petition fraud in the course of their work on other USCIS applications; (4) other law enforcement sources, including other federal law enforcement entities; and (5) benefit fraud tips received from the general public. After receiving a referral, FDNS immigration officers determine whether the referral has sufficient information to warrant further investigation. According to FDNS’s fraud detection standard operating procedures, FDNS immigration officers either determine that the referral becomes a lead and the lead is accepted, or the referral is declined. After accepting the referral, immigration officers are responsible for conducting an administrative investigation to, among other things, obtain relevant information needed by Vermont Service Center adjudicators to render the appropriate adjudicative decision. If, after conducting research and analyzing the information associated with a lead, the FDNS immigration officer determines that a reasonable suspicion of fraud is articulated and actionable, the lead is elevated to a case. Upon conclusion of the administrative investigation, FDNS immigration officers close the accepted lead and case and record their findings in a Statement of Findings. The Statement of Findings concludes the administrative investigation with one of three types of findings: (1) Fraud Found: the investigation determined fraudulent activities exist in the self- petition; (2) Fraud Not Found: the investigation did not uncover fraudulent activities in the self-petition; or (3) Inconclusive: the investigation could not make a determination of whether fraudulent activity occurred. Once completed, the Statement of Findings is returned to the appropriate referral source. In cases where FDNS immigration officers find self-petition fraud, the case can be referred to ICE’s HSI for criminal investigation. According to a 2008 immigration benefit fraud memorandum of agreement between USCIS and ICE, FDNS is to refer individual petitions involving suspected fraud to HSI where (1) the alien is the subject of a TECS record; (2) USCIS suspects misconduct on the part of the self-petitioner’s attorney, notary, interpreter, or preparer of the application; or (3) evidence of a criminal conviction of an offense that is not grounds for inadmissibility or removability is present, among other things. Typically, referrals are sent to the National Lead Development Center, where they are distributed to ICE Special Agent In-Charge local offices for further investigation, according to FDNS officials. If a referral is the result of a task team, petitions may be referred directly to ICE Special Agent In-Charge local offices. ICE either accepts the referral and conducts a criminal investigation or declines the referral and sends it back to FDNS. If a referral is declined by ICE, FDNS continues its administrative investigation. Figure 4 provides an overview of the self-petition fraud referral process. According to FDNS data, from fiscal year 2014 to March 2019, FDNS created 2,208 fraud referral leads and cases that involved a VAWA self- petition. Total leads and cases increased from 198 in fiscal year 2014 to 801 in fiscal year 2019 (data as of March 2019), an increase of about 305 percent. USCIS officials attributed this increase to an overall increase in the number of self-petitions filed and an increase in fraud leads and cases obtained through USCIS’s fraud tip hotline. FDNS data showed that 2,151 leads and cases were accepted by FDNS between fiscal year 2014 and March 2019, or about 97 percent. Table 5 shows the number of fraud leads and cases that contain a self-petition and the disposition of accepted leads and cases between fiscal years 2014 and March 2019. From fiscal year 2014 to March 2019, FDNS found a disposition for 631 of the closed cases that involved a VAWA self-petition. According to USCIS officials, a fraud lead or case is not typically closed within the same year that it is filed. This accounts for differences between the total number of fraud cases and leads filed and the total number of completed cases and closed leads within the same fiscal year. Of the 631 closed cases with a disposition, FDNS found fraud in 332, or 53 percent. Table 6 shows the disposition of closed self-petition fraud leads and cases between fiscal year 2014 and March 2019. According to FDNS data, from fiscal year 2014 to March 2019, FDNS made 68 fraud referrals to ICE for criminal investigation that involved a VAWA self-petition. We inquired with ICE about the status and disposition of these cases. As previously mentioned, for purposes of accepting a referral for criminal investigation, ICE does not make distinction between self-petition fraud and marriage fraud investigations. As a result, information on the 68 fraud referrals to ICE is encompassed in ICE’s immigration benefit fraud investigation data and could not be separated for analysis. Therefore, we could not provide status and disposition information on these referrals. The VAWA self-petition program is designed to protect foreign nationals who are victims of domestic abuse. The decision to approve or deny a VAWA self-petition is consequential, as the program allows an eligible foreign national victim to remain in the country, obtain work authorization, and apply for LPR status independent of their abuser. According to CRCL, VAWA self-petition relief brings safety, security and stability to legitimate victims who might not otherwise be able to escape domestic abuse. However, approving a fraudulent petition could affect the integrity of the program. USCIS has implemented some aspects of GAO’s Fraud Risk Framework in managing the self-petition program, such as having a dedicated antifraud entity, but could improve efforts to detect and prevent potential fraud in the program. More specifically, conducting regular fraud risk assessments and determining a fraud risk profile for the program could help USCIS identify fraud risks in the self-petition program and better determine the extent to which the agency has designed and implemented adequate fraud prevention controls. Further, basing antifraud controls on inherent risks identified through regular fraud risk assessments could help ensure USCIS’s antifraud controls are addressing fraud risks in the self-petition program. Lastly, developing and implementing a data analytics capability could provide USCIS with tools to aid in identifying potential fraud in self-petition filings. Analysis and insights developed through the use of data analytics could inform the self- petition program’s regular fraud risk assessments. We are making the following three recommendations to USCIS: The Director of USCIS should plan and conduct regular fraud risk assessments of the self-petition program to determine a fraud risk profile, as provided in GAO’s Fraud Risk Framework. (Recommendation 1) The Director of USCIS should develop and implement an antifraud strategy with specific control activities, based upon the results of fraud risk assessments and a corresponding fraud risk profile, as provided in GAO’s Fraud Risk Framework. (Recommendation 2) The Director of USCIS should develop and implement data analytics capabilities for the self-petition program, as a means to prevent and detect fraud, as provided in GAO’s Fraud Risk Framework. (Recommendation 3) We provided a draft of this report to DHS for review and comment. DHS provided comments, which are reproduced in full in appendix I and discussed below. DHS also provided technical comments, which we incorporated as appropriate. In its comments, DHS concurred with our three recommendations and described actions planned to address them. With respect to our first recommendation that USCIS plan and conduct regular fraud risk assessments of the self-petition program to determine a fraud risk profile, DHS stated that the USCIS FDNS plans to capture data digitally for both I-360 and I-751 self-petitions filed on the basis of domestic abuse, and discuss any patterns observed with stakeholders in order to develop a fraud risk profile. Further, DHS stated USCIS will use the results of data analytics to conduct and update regular fraud risk assessments. With regard to our second recommendation that USCIS develop and implement an antifraud strategy with specific control activities based upon the results of fraud risk assessments and a corresponding fraud risk profile, DHS stated USCIS plans to create an antifraud strategy that includes both adjudicators and FDNS officers in order to emphasize fraud detection prior to adjudication of self-petitions. With respect to our third recommendation that USCIS develop and implement data analytics capabilities for the self-petition program as a means to prevent and detect fraud, DHS stated that USCIS will apply their data analytics capabilities, driven by the results of the self-petition fraud risk assessments, to develop analytic tools that verify information provided by self-petitioners and identify indicators of potential fraud. Further, DHS stated that USCIS will use the results of data analytics to inform antifraud training and will distribute the results to USCIS senior leadership when warranted. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Homeland Security. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Rebecca Gambler at (202) 512-8777 or GamblerR@gao.gov or Rebecca Shea at (202) 512-6722 or SheaR@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of our report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contacts named above, Jeanette Henriquez (Assistant Director), Kelsey M. Carpenter, Pamela Davidson, April Gamble, Eric Hauswirth, Brandon Jones, Brendan Kretzschmar, Sasan J. “Jon” Najmi, Christopher H. Schmitt, and Eli Stiefel made key contributions to this report.", "summary": "In fiscal year 2018, foreign nationals filed nearly 13,000 VAWA self-petitions alleging domestic abuse by a U.S. citizen or LPR family member. The Immigration and Nationality Act, as amended by VAWA, provides for immigration relief for self-petitioning foreign nationals who are victims of battery or extreme cruelty committed by their U.S. citizen or LPR family member. The self-petition process allows such victims to obtain classification as an immigrant and ultimately apply for LPR status. GAO was asked to review fraud risks in the self-petition process and how, if at all, DHS assists U.S. citizens or LPRs who may have been falsely identified as domestic abusers. This report examines the extent to which (1) USCIS has adopted relevant leading practices in GAO's Fraud Risk Framework for the self-petition program; and (2) DHS provides assistance to U.S. citizens or LPRs who may have been falsely identified as domestic abusers in the self-petition process, and steps DHS takes when suspected fraud is identified. GAO reviewed documents, interviewed officials, analyzed program data, and assessed the agency's approach to managing fraud risks against GAO's Fraud Risk Framework. Within the Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) has responsibility for the Violence Against Women Act (VAWA) self-petition program for foreign national victims of battery or extreme cruelty committed by their U.S. citizen or lawful permanent resident (LPR) spouse or parent, or their adult U.S. citizen son or daughter. According to USCIS officials, the self-petition program is vulnerable to fraud, such as self-petitioners' use of false or forged documents. USCIS has adopted some, but not all, of the leading practices in GAO's Fraud Risk Framework. While USCIS has established a culture and a dedicated entity to manage fraud risks for the program, it has not fully assessed fraud risks and determined a fraud risk profile to document its analysis of the types of fraud risks the program could be vulnerable to. Further, the number of self-petitions filed has grown by more than 70 percent over the past 5 fiscal years. At the end of fiscal year 2018, USCIS had received 12,801 self-petitions and had over 19,000 self-petitions pending adjudication. Planning and conducting regular fraud risk assessments would better position USCIS to identify fraud risks when reviewing self-petitions. USCIS has instituted some fraud controls, such as developing antifraud training for self-petition adjudicators, but has not developed and implemented a risk-based antifraud strategy based on a fraud risk assessment. Developing and implementing an antifraud strategy would help USCIS better ensure its controls are addressing potential fraud risks in the program. DHS provides assistance to victims of immigration-related crimes and refers suspected self-petition fraud for review and investigation. Within DHS, U.S. Immigration and Customs Enforcement provides professional services and assistance to potential victims of immigration-related crimes, including self-petition fraud. As shown in the figure below, USCIS also has a referral process for suspected fraud in self-petitions, which may result in a referral for criminal investigation. According to agency data, from fiscal year 2014 to March 2019, USCIS created 2,208 fraud referral leads and cases that involved a VAWA self-petition. Total leads and cases increased from 198 in fiscal year 2014 to 801 in fiscal year 2019 as of March 2019, an increase of about 305 percent. GAO is making three recommendations, including that USCIS conduct regular fraud risk assessments to determine a fraud risk profile for the program and develop an antifraud strategy with specific control activities. DHS concurred.", "document_type": "gao"}
{"report": "USDA administers its nutrition education programs through multiple agencies in two mission areas—Food, Nutrition, and Consumer Services and Research, Education, and Economics (see fig. 1). Within the Food, Nutrition, and Consumer Services mission area, FNS oversees nutrition assistance programs with nutrition education components, such as SNAP, WIC, and child nutrition programs. For SNAP-Ed and WIC, the FNS national office develops program policies and guidance and works with the FNS regional offices to provide technical assistance to state agencies. The FNS regional offices also review SNAP-Ed and WIC state plans. The Team Nutrition initiative is administered by FNS national officials who also work on child nutrition programs. FNS staff develop Team Nutrition materials, training resources, and guidance and provide assistance to state agencies and local entities overseeing the child nutrition programs. Within the Research, Education and Economics mission area, NIFA national officials oversee EFNEP, in part by providing program guidance, reviewing grant recipient plans, and conducting some monitoring and oversight of local implementing entities. The NIFA national office, together with the FNS national office, administers the FINI program. Although NIFA has primary responsibility over the grant award process, FNS has been overseeing an independent evaluation of program efforts. Interventions for USDA’s nutrition education programs are provided through varied local entities and settings. For example, land-grant universities may provide SNAP-Ed and EFNEP interventions, while local health clinics may provide WIC interventions. USDA’s programs also provide nutrition education in varied settings, ranging from grocery stores to hospitals (see fig. 2). Sometimes multiple nutrition education programs operate in the same setting. For example, SNAP-Ed may provide classes for students while Team Nutrition may distribute teacher training materials and nutrition education curricula to the same school. Most of USDA’s nutrition education programs target interventions to low- income populations with varied characteristics, as shown in table 1, and the programs also differ in how nutrition education fits into their structures. For example, SNAP-Ed and EFNEP are primarily focused on providing nutrition education to participants, while Team Nutrition provides nutrition education to both child nutrition program implementers and participants. WIC provides benefits for food and referrals to health and other social services, as well as nutrition education, including breastfeeding promotion and support, to participants. FINI provides benefits for purchasing healthy foods and may include additional nutrition education programming. Programs also provide nutrition education through various intervention methods, ranging from direct education, such as cooking demonstrations, classes on healthy eating, and one-on-one counseling, to social media campaigns and efforts to change policies, systems, or environments. SNAP-Ed provides direct education through a variety of nutrition educators, although its interventions also may involve social marketing and policy, systems, and environmental changes (PSE). PSE is intended to shape policies, practices, and physical environments to support and improve nutrition education, physical activity habits, and obesity prevention efforts. In fiscal year 2018, approximately 76 percent of SNAP-Ed interventions included direct education, whereas 54 percent included PSE, according to USDA data. EFNEP primarily provides direct education through paraprofessionals, also known as peer educators. Paraprofessionals typically live locally in the community, which allows them to recruit and receive referrals for new participants. University and locally-based professional staff train and supervise the paraprofessionals. In addition, EFNEP has incorporated PSE interventions in recent years. For example, USDA provides PSE training for EFNEP program implementers, as one step toward adopting the PSE approach. WIC programs also provide direct education, such as counseling and group discussions, and, according to federal regulations, are allowed to use other intervention methods as long as they are easily understood by participants and bear a practical relationship to participant nutritional needs, household situations, and cultural preferences. For example, WIC programs may conduct demonstrations or grocery store tours to help consumers understand how to read nutrition labels or shop on a budget. Team Nutrition creates and disseminates web-based and hard-copy educational materials to child nutrition program implementers in part to educate child nutrition program participants. For example, Team Nutrition provides curricula, posters, tools, guides, recipes, and cookbooks for schools and child care sites. Team Nutrition also provides annual grants to enhance nutrition education intervention efforts in schools and child care settings, as well as training for program implementers through its partnership with the Institute of Child Nutrition. FINI supports healthy eating choices by incentivizing the purchase and consumption of fruits and vegetables. For example, some FINI programs provide vouchers redeemable for qualifying fruits and vegetables. Further, according to USDA officials, a FINI program may partner with another USDA nutrition education program, such as SNAP-Ed or EFNEP, to provide nutrition education. USDA agencies also provide nutrition education through other research and guidance directed at the general public: USDA’s Center for Nutrition Policy and Promotion (CNPP), within FNS, works with the U.S. Department of Health and Human Services to develop the Dietary Guidelines for Americans, dietary guidance linking scientific research to the nutrition needs of consumers. CNPP also takes the lead on consumer nutrition education, including MyPlate, which translates the Dietary Guidelines for Americans for consumers. USDA’s Economic Research Service (ERS) conducts research and issues publicly available reports related to promoting the purchase and consumption of healthy, economical foods. ERS also provides data relevant to the nutrition of U.S. households and communities. USDA’s Agricultural Research Service (ARS) serves as a repository for publicly available nutrition education information and data. ARS manages the website Nutrition.gov, the Historical Dietary Guidance Digital Collection, and the FoodData Central data system, which provides food nutrient data for consumers. According to USDA data, 3.8 million and 436,000 people participated in direct education interventions for SNAP-Ed and EFNEP, respectively, in fiscal year 2018. Direct education participation in these two programs, which are focused primarily on nutrition education, has decreased in recent years. Between fiscal years 2010 and 2018, SNAP-Ed direct education participation declined by 33 percent and EFNEP declined by 28 percent. Program officials we spoke with noted some factors that may in part explain these trends. For example, USDA officials said direct education has been less of a focus in SNAP-Ed in recent years, as the department has encouraged programs to use policy, systems, and environmental change interventions and social marketing, in addition to the traditional direct education, following implementation of the Healthy Hunger-Free Kids Act of 2010. USDA officials said that all WIC recipients are offered nutrition education, and therefore they report that 6.9 million people were offered nutrition education through the program in fiscal year 2018. Although officials consider this to be the best proxy for WIC nutrition education participation, more than 5.2 million of these WIC recipients were infants or children ages 5 and under. In addition, WIC recipients do not need to participate in nutrition education to receive the program’s food benefits. As a result, USDA’s proxy overcounts the number of people who participated in WIC nutrition education. For Team Nutrition, USDA tracks the reach of its nutrition education using the volume of materials distributed. Between fiscal years 2012 and 2018, Team Nutrition distributed around 5.1 million of its hard-copy materials, such as curricula, technical assistance and training tools, and other materials, to child nutrition program implementers, including schools and day care providers. Further, from March 2014 through fiscal year 2018, there were about 11 million unique views of Team Nutrition materials hosted on USDA’s Team Nutrition website. Additionally, USDA is collecting participation data for FINI through the FINI National Evaluation. The evaluation is ongoing and FINI participation data will be available after it concludes, according to USDA officials. USDA’s data show that nearly $907 million was expended on nutrition education programs in fiscal year 2017, the most recent year for which complete data are available, with $826 million expended on two programs—WIC and SNAP-Ed (see fig. 3). Specifically, states expended $422 million on WIC nutrition education and nearly $404 million on SNAP-Ed in that year. Further, grantees expended $51 million on EFNEP, $16 million on Team Nutrition, and $13 million on FINI in fiscal year 2017. USDA has total annual expenditure data at a national level for its nutrition education programs, but it does not have detailed information on how the funding is expended that can be routinely analyzed in its two programs with the largest expenditures—WIC and SNAP-Ed. Since both programs allow states to use various types of nutrition education interventions, information on spending by type of intervention may help USDA compare costs, and with additional information, potentially assess the cost effectiveness of various nutrition education interventions. For WIC, USDA collected detailed information on nutrition education spending at the local agency level in 2016 through a survey and analyzed the costs associated with different types of nutrition education interventions. In contrast, USDA collects information on SNAP-Ed local implementing agency expenditures in narrative annual reports that make it difficult to assess spending by type of nutrition education intervention. Through studies and data collection, USDA has gathered some information on the effectiveness of its nutrition education interventions. For example, in 2018, USDA completed the WIC Nutrition Education Study, which assessed WIC nutrition education in both descriptive and evaluative ways (see text box). Additionally, USDA officials said a new study is underway looking at how the WIC nutritional risk assessment tailors the benefit package participants receive, including the nutrition education offered. USDA has also funded various grants and cooperative agreements that have evaluated WIC nutrition education to some extent, according to USDA officials. Findings from WIC Nutrition Education Study: Phase II Report This 2018 study was designed to address research questions about the impact of the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC)’s nutrition education on participant nutrition and physical activity behaviors, among other things, in six pilot sites. Although pilot sites’ nutrition education practices varied, the study did not find significant differences in reported exposure to nutrition education, such as the number of contacts with an educator or receipt of materials to reinforce nutrition messages during visits, or significant differences in participant outcome behaviors, among participants by site. For EFNEP, USDA regularly collects participant data to assess the effectiveness of EFNEP interventions nationwide, and several studies have also assessed the cost effectiveness of EFNEP. Specifically, EFNEP participants take standardized food and physical activity questionnaires and provide information on their dietary consumption in the past 24 hours before and after participating in an intervention, such as a class. EFNEP administrators use this information to measure participant behavior change and also report it to USDA through EFNEP’s data reporting system (see text box). USDA is then able to aggregate these data at the national level and use them to assess the effectiveness of EFNEP interventions nationwide. Further, several studies have evaluated EFNEP cost effectiveness, including one which used national data to estimate EFNEP cost effectiveness by state. Outcomes Reported on Expanded Food and Nutrition Education Program (EFNEP) Participant Questionnaires Questionnaires are administered when adult EFNEP participants enter the program and again when they exit the program to measure behavior change in core areas, including diet quality and physical activity, food safety, food resource management, and food security. For fiscal year 2018, the majority of participants reported improvements in diet quality (92 percent), food resource management (80 percent), food safety (79 percent), and physical activity (78 percent). Further, almost half of participants reported improvement in food security (47 percent). In addition to WIC and EFNEP, USDA is currently collecting information from its grantees on FINI effectiveness as part of its forthcoming FINI National Evaluation. An interim evaluation report found a positive, but modest, impact of FINI on monthly household fruit and vegetable expenditures, but no measurable impact on adults’ daily fruit and vegetable consumption. Previously, USDA assessed the effectiveness of the Healthy Incentives Pilot, which was a predecessor to FINI. The pilot tested the impact of making fruits and vegetables more affordable for SNAP participants and found that participants consumed almost one- quarter of a cup more fruits and vegetables per day than non- participants. USDA has also taken steps to support evaluation of the effectiveness of SNAP-Ed interventions both through its own research and the development of an evaluation framework. In 2012 and 2013, USDA reviewed selected SNAP-Ed interventions to identify potential models of effective SNAP-Ed interventions and impact evaluations. Specifically, USDA evaluated five interventions aimed at increasing fruit and vegetable consumption in preschool or elementary-age children, one intervention aimed at increasing fruit and vegetable consumption in low-income seniors, and one intervention aimed at increasing low-income women’s knowledge of healthy eating choices. Also in 2013, the FNS Western Regional Office began an effort to develop the SNAP-Ed Evaluation Framework (Framework), which was finalized in 2016 and fully adopted for national use. The Framework was developed as a way to evaluate program interventions, and with the intention of encouraging use of policy, systems, and environmental change interventions, according to USDA officials. All states are currently using the Framework to evaluate SNAP-Ed program interventions, according to USDA officials; however, because the Framework allows for myriad ways to measure outcomes, information reported by states on the effectiveness of SNAP-Ed interventions varies widely. Within states, SNAP-Ed implementing entities can select from 51 indicators and various outcome measures in the Framework to evaluate their interventions. Although USDA has identified 7 of the Framework’s 51 indicators as priority indicators, and encouraged states to use these, each indicator has multiple outcome measures and data collection methods associated with it (see text box). Therefore, even if the same indicators are selected to evaluate the effectiveness of different SNAP-Ed interventions, each state may select different outcome measures and data collection methods, and report different information on effectiveness. In our prior work, we found that agencies that seek to manage an excessive number of performance measures may risk creating a confusing excess of data that will obscure rather than clarify performance issues. Elements of a Selected Medium Term Change Indicator: Healthy Eating The medium term change indicator for healthy eating acts as a priority indicator among the 51 indicators included in the Supplemental Nutrition Assistance Program Education (SNAP-Ed) Evaluation Framework. SNAP-Ed programs may use this indicator to measure healthy eating behavioral changes reported by SNAP-Ed participants before and after participation in a series of direct nutrition education classes. Within this indicator, programs may select from various outcome measures and data collection tools: Programs may select from 13 outcome measures to assess the participants on this indicator. Some options include eating more than one kind of vegetable, drinking water, and using MyPlate to make food choices. To assess these outcome measures, programs may select from 11 surveys and other data collection tools compiled by the U.S. Department of Agriculture, such as a food behavior checklist for adults and a beverage and snack questionnaire for older youth. In addition, USDA receives information on states’ evaluations of effectiveness that is not easily analyzed nationwide. Although states report information on SNAP-Ed interventions to USDA in a data system, including information on participation, demographic characteristics of direct education participants, and types of education interventions, the data system is not structured to allow states to report information on intervention effectiveness, including cost effectiveness. Instead, USDA uses SNAP-Ed state plans and annual reports to collect information on state efforts to evaluate program effectiveness, among other things. However, in their plans and reports, states identify the Framework indicators they use and describe their evaluation efforts and outcomes in narrative form, limiting USDA’s ability to aggregate evaluation information across states or interventions, according to USDA officials. One local SNAP-Ed official said her state’s most recent annual report was approximately 60 pages long, highlighting the magnitude of the narrative information some states provide. While USDA officials acknowledged these challenges, they said a narrative report is used to accommodate the differences among SNAP-Ed programs. USDA officials said that because the Framework is still relatively new, they are working to determine both how to assist states’ efforts to use it to evaluate SNAP-Ed effectiveness and to ensure these evaluations provide USDA with useful information for assessing these programs. Further, USDA officials said they are currently in the process of determining future SNAP-Ed reporting protocols to improve program implementation and impact. Federal internal control standards state that agencies should use relevant, quality information from reliable sources to inform decision- making and evaluate performance in achieving key objectives. Without information that can be compared across states or easily aggregated or reviewed nationwide, USDA is unable to assess the effectiveness of interventions used across the country to determine whether SNAP-Ed is achieving program goals. USDA’s national office does not have a formal coordination mechanism for department-wide nutrition education efforts; however, the department has taken some steps to coordinate efforts related to nutrition. For example, USDA convened staff from various program offices in November 2017 for a two-day Intra-Departmental Nutrition Workgroup Meeting. The focus of the meeting was not specifically nutrition education, but included a discussion of current and potential USDA efforts to encourage healthy food choices for certain age groups. The department also has a few committees that address nutrition issues, including the Human Nutrition Coordinating Committee and the Interagency Committee on Human Nutrition Research. Although these committees do not focus on nutrition education, they convene USDA officials and other federal partners on a regular basis. Despite the lack of a focus on nutrition education in these meetings, USDA officials who participated said these opportunities were useful for sharing related information with staff from across the department. USDA has also taken some steps to coordinate efforts across nutrition education programs that have an intersection of target populations, though this has not consistently occurred at the federal level, according to USDA officials. For example, in recent years, WIC officials collaborated with Team Nutrition officials on the development of infant feeding and breastfeeding resources for use in child care settings to ensure consistent messaging. However, USDA officials reported that other programs with similar target populations have not coordinated. For example: USDA officials told us WIC and SNAP-Ed officials have limited interaction, although both programs serve low-income families with young children and coordination could help reinforce key messaging from each program. Several regional SNAP-Ed officials said that they had limited involvement with Team Nutrition, although both programs may serve students in schools and sharing resources could help maximize program impact. Both SNAP-Ed and EFNEP focus on providing nutrition education to similar populations and are delivered by land-grant universities, yet there is limited coordination between the two programs. Regional officials who work on SNAP-Ed reported limited familiarity with EFNEP and said they have learned about EFNEP efforts intermittently through state and local officials, rather than from the national office. Similarly, representatives of the two land-grant universities we spoke with who solely administer EFNEP had limited information regarding SNAP-Ed efforts, though they expressed interest in coordinating efforts to maximize both programs’ reach and avoid duplication of effort. In the absence of formal coordination mechanisms from USDA headquarters, other efforts have developed to help coordinate nutrition education programs nationwide, though USDA national office involvement is limited. Association of SNAP Nutrition Education Administrators: Representatives of SNAP-Ed state implementing agencies formed the Association because they lacked a mechanism to communicate with FNS national office staff or one another on topics related to nutrition education, according to a representative of this group. Officials from FNS’s national and regional offices formally participate in the group’s annual conferences and other activities, but this representative told us that members of the group would appreciate more opportunities to interact directly with these officials. SNAP-Ed Program Development Group: Land-grant universities established this separate SNAP-Ed-focused workgroup to strengthen SNAP-Ed programs and nutrition networks at the state, regional, and national levels, and identify linkages between SNAP-Ed and the land- grant university system’s broader outreach, education, and research mission. SNAP-Ed officials from FNS’s national office do not regularly participate in this group, yet the NIFA administrator of EFNEP sits on the group’s leadership committee. Food, Nutrition, and Consumer Services Nutrition Council: This group convenes national and regional staff in the Food, Nutrition, and Consumer Services mission area on nutrition-related topics and is currently led by regional officials, although the group was previously led by both national and regional officials. FNS officials told us the Nutrition Council has not regained momentum at the national office level since leadership transitioned to the regional office level, and one regional official with leadership responsibilities on the Council told us the group would benefit from more leadership support from FNS national office staff. State Nutrition Action Councils (SNACs): At the state level, SNACs are primarily comprised of state representatives from FNS programs and develop statewide cross-program nutrition education plans. FNS’s national office has supported SNACs as a model for coalescing state programs around nutrition education and obesity prevention efforts but has delegated leadership of the SNACs to the regions, who work directly with state agencies. USDA does not have a dedicated individual or entity with leadership responsibility for nutrition education, and program staff who work on nutrition education are currently focused on their individual programs, according to USDA officials. Although FNS has a senior nutrition advisor who supports national and regional officials who work on FNS programs, the advisor’s role does not encompass department-wide coordination on nutrition education. Further, program staff whose responsibilities include nutrition education serve the needs of their individual programs and lack formal communication channels with one another, according to USDA officials. Previously, from 1998 through 2008, USDA had a centralized Nutrition Services Staff that served as a formal coordinating entity for FNS and held cross-program nutrition education meetings, which were useful for information sharing, according to USDA officials. In 2008, this division, which had been comprised largely of nutritionists, was dissolved, with its staff with nutrition expertise largely dispersed to individual program offices. According to national and regional officials, in recent years, coordinating nutrition education has not been a priority for USDA, and there has been a loss of staff resources dedicated to nutrition education in the department overall. National and regional officials said it is hard to find time to coordinate across nutrition education efforts because they face competing priorities and increased workloads, at times because staff with nutrition education expertise have left employment with USDA and not been replaced. According to regional officials, a voluntary group of FNS national and regional officials who meet to discuss nutrition issues has experienced diminishing participation in recent years, in part due to these reasons. Regional officials and land-grant university officials said that more formal coordination mechanisms to provide leadership and promote cross- department coordination and information sharing on nutrition education could help increase efficiency, maximize the use of federal resources, and avoid potential duplication of effort. One regional official said she regularly reaches out to a colleague to obtain information on other FNS nutrition education programs, but a centralized tool could provide this information quicker and more efficiently. Another regional official said she compiled information on USDA nutrition education grant opportunities for states in her region, but it would be helpful if this information were centrally compiled by the national office. Regional officials and land- grant university officials we spoke with also said formal collaboration mechanisms, such as a document or tool with information on all of USDA’s nutrition education efforts, examples of best practices for coordination, or an annual meeting to encourage information sharing, would be useful. Federal internal control standards state that agencies should communicate quality information across reporting lines to enable personnel to perform key roles in achieving objectives, and management should set the tone at the top and throughout the agency to ensure priorities are understood by all stakeholders. In our prior work, we reported that effective coordination can help reduce overlap and duplication, and we found that sustained leadership is an essential element to developing collaborative working relationships. We also identified leading practices that federal agencies can use to enhance the effectiveness of their collaborative efforts, such as agreeing on roles and responsibilities and establishing policies and procedures to work across organizational boundaries. USDA has acknowledged the importance of nutrition education coordination for maximizing the reach and potential impact of federal nutrition education and nutrition assistance programs in some of its program regulations and guidance, and this emphasis is consistent with new federal requirements. For example, FNS’s SNAP-Ed plan guidance directs states to coordinate SNAP-Ed activities with other national, state, and local nutrition education, obesity prevention, and health promotion initiatives and interventions, such as WIC and EFNEP. In our 2004 review of USDA’s nutrition education efforts, we found that increased coordination, such as sharing curricula, lessons learned, and data collection tools across efforts, could help USDA’s nutrition education programs make more efficient and effective use of resources. Consistent with this focus, the Agriculture Improvement Act of 2018 (Farm Bill) requires USDA to submit an annual report to Congress that includes an evaluation of the level of coordination between SNAP-Ed, EFNEP, and other USDA nutrition education programs. Some USDA nutrition experts are in agencies disconnected from the nutrition education programs (see fig. 4), yet these agencies play a significant role in developing and compiling dietary guidance, research, and other information related to nutrition education (see table 2). Despite their role in developing and compiling research and information related to nutrition education, consultation with these experts by the program offices is limited, according to USDA officials, possibly because they are located in separate agencies. For example, Although CNPP leads a cross-cutting committee that reviews nutrition education materials developed by USDA program staff to ensure materials are consistent with the Dietary Guidelines for Americans,CNPP officials noted they have been infrequently consulted by program officials while materials are under development or activities are being implemented. This may have been in part related to organizational structure, as until recently CNPP and FNS were separate agencies that individually reported to the Office of the Under Secretary for Food, Nutrition, and Consumer Services, according to USDA officials. Some nutrition education program staff also told us they currently use the core nutrition messages on USDA’s website when developing nutrition education materials—messages that CNPP officials noted were developed in 2010 and have not been updated to reflect the latest edition of the Dietary Guidelines for Americans. This approach may lead to inefficiencies in the development of nutrition education materials. Although ERS conducts nutrition research, nutrition education program officials were not always aware of or using ERS resources, possibly because most of the programs reside in a different USDA mission area. A prior working group attempted to bridge the organizational divide between ERS and some of USDA’s other agencies and offices that work on nutrition education by assisting efforts to share information, but the group has since dissolved. Currently, some national and regional officials we spoke with who work on nutrition education programs had limited awareness of ERS’s nutrition education research. For example, some program officials in the national office were unsure whether ERS did work related to nutrition education and learned of ERS research through automated email updates. Further, one regional official learned of ERS data on food insecurity, which can help states meet federal requirements for targeting nutrition education services to local areas based on their level of need, through a meeting with an outside agency. Nutrition education program officials were also generally unaware of ARS’s efforts related to nutrition education. Specifically, USDA nutrition education program officials we spoke to said they had little direct contact with ARS officials and were generally unaware of ARS efforts related to nutrition education. Further, regional officials who work on SNAP-Ed had not used or distributed ARS resources to state officials and also seemed generally unaware of ARS’s nutrition education efforts. USDA lacks a mechanism for systematically integrating its internal nutrition expertise into its nutrition education programs, which may inhibit the effectiveness of the department’s efforts. Federal internal control standards state that agencies should use quality information from reliable internal sources, among others, to inform decision-making. Further, in our prior work, we found that identifying and addressing needs by leveraging resources is a leading practice for collaboration. Nutrition education program officials are missing opportunities to benefit from relevant expertise within USDA but outside their program offices. Failing to leverage its own internal expertise hinders USDA’s development of nutrition education materials that are informed by the latest nutrition guidance and research. Poor nutrition contributes to costly chronic diseases that are among the leading causes of death for Americans, and USDA’s nutrition education programs and related efforts strive to educate Americans on nutrition and improve their dietary choices. Because USDA’s nutrition education programs are primarily targeted to low-income adults and children, who may receive federally-funded nutrition assistance benefits, these programs also have the potential to improve the likelihood that recipients will spend those benefits to obtain foods that have a positive impact on their health. However, in order to reach these goals, USDA needs to ensure that its programs are effectively educating participants to maximize the impact of the federal investment in nutrition education. Although USDA has some information on the effectiveness of its nutrition programs, without improvements to how USDA gathers information on the effectiveness of SNAP-Ed interventions nationwide, USDA will be unable to ensure one of its largest investments in nutrition education is meeting its goals. The 2018 Farm Bill included a requirement for USDA to begin reporting annually on the level of coordination between its nutrition education programs, and USDA has acknowledged the importance of coordination and information sharing to maximize nutrition education programs’ impacts. However, the department currently lacks a formal mechanism to ensure this occurs. As a result, USDA risks missing opportunities to increase efficiency, maximize the use of federal resources, and avoid potential duplication of effort. In addition, without coordination between nutrition education program officials and others with nutrition expertise in the department, programs will develop nutrition education materials that fail to fully leverage the latest nutrition guidance and research, possibly missing opportunities to effectively influence the dietary choices of their target populations in the process. We are making the following three recommendations to USDA: 1. The Administrator of FNS should improve how FNS gathers information on the effectiveness of SNAP-Ed interventions, in order to ensure that these interventions are meeting program goals. (Recommendation 1) 2. The Secretary of Agriculture should direct the Under Secretaries for Food, Nutrition, and Consumer Services and for Research, Education, and Economics to develop a formal mechanism, such as a designated individual or group of individuals, for providing cross-department leadership for USDA’s nutrition education efforts and facilitating cross- program information sharing. (Recommendation 2) 3. The Secretary of Agriculture should direct the Under Secretaries for Food, Nutrition, and Consumer Services and for Research, Education, and Economics to identify and implement mechanisms to fully leverage the department’s nutrition expertise for its nutrition education efforts. (Recommendation 3) We provided a draft of this report to USDA for review and comment. In its comments, reproduced in appendix II, USDA generally agreed with our recommendations. USDA also noted that FNS has efforts underway to comply with the 2018 Farm Bill requirement that the department report annually on the level of coordination between its nutrition education programs. USDA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Agriculture, congressional committees, and other interested parties. In addition, this report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our report examines the extent to which the U.S. Department of Agriculture (USDA) (1) has information on participation, expenditures, and effectiveness for its nutrition education programs; and (2) coordinates its nutrition education efforts and leverages internal nutrition expertise for these efforts. The scope of our review includes five federal programs that provide nutrition education: Supplemental Nutrition Assistance Program Education (SNAP-Ed), the Expanded Food and Nutrition Education Program (EFNEP), the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC), Team Nutrition, and the Food Insecurity Nutrition Incentive (FINI) Grant Program. Among USDA programs that provide nutrition education, four of these received the greatest amount of federal funding for nutrition education in fiscal year 2018—WIC, SNAP-Ed, EFNEP, and Team Nutrition. In addition, we included FINI because it is a grant program in which nutrition education can be a component, and the program’s goal is to incentivize healthy eating. We also reviewed USDA efforts that provide nutrition education through nutrition-related research and guidance directed at the general public. In addition to the methods discussed below, to address both of our research objectives, we reviewed relevant federal laws, regulations, and guidance, as well as our prior work on USDA nutrition education efforts and leading practices for collaboration. We interviewed officials from relevant USDA agencies, including the Food and Nutrition Service (FNS) and the National Institute of Food and Agriculture (NIFA), which oversee the nutrition education programs described in this report. We also interviewed officials from other USDA agencies overseeing nutrition- related research and guidance, including the Agricultural Research Service, the Center for Nutrition Policy and Promotion, and the Economic Research Service. Additionally, we interviewed officials from the seven FNS regional offices, including officials who work on SNAP-Ed and the Child and Adult Care Food Program. We also interviewed representatives of selected organizations knowledgeable about USDA’s nutrition education efforts. We assessed USDA’s efforts to collect information on its nutrition education programs, coordinate its nutrition education efforts, and leverage internal nutrition expertise against GAO’s standards for internal controls in the federal government. To address the first objective, we analyzed USDA data on nutrition education participation. Two of the nutrition education programs, SNAP- Ed and EFNEP, collect data on direct education participation. We analyzed SNAP-Ed total direct education participation data for fiscal years 2010 through 2018 collected through SNAP-Ed’s data reporting system, the Education and Administrative Reporting System (EARS). We analyzed EFNEP total direct education participation data for fiscal years 2010 through 2018. These data are reported through the Web-based Nutrition Education, Evaluation and Reporting System (WebNEERS), an integrated data collection system, sponsored by NIFA, and used at the county, state, and federal levels. To assess the reliability of the SNAP-Ed and EFNEP participation data, we interviewed FNS and NIFA officials and reviewed relevant documentation. We determined that these data were sufficiently reliable for the purpose of reporting the number of direct education participants in SNAP-Ed and EFNEP. We also reviewed available USDA data on the number of people reached by nutrition education efforts in SNAP-Ed and EFNEP other than through direct participation. SNAP-Ed collects information on the number of people reached by nutrition education efforts that are not direct education, such as policy, systems, and environmental change interventions and social marketing. However, states face challenges with tracking individuals reached by these education interventions, and these data are likely to include duplicate records of individuals, according to USDA officials. Therefore, we concluded that these data were not sufficiently reliable for the purpose of reporting the number of people indirectly reached by SNAP-Ed. EFNEP also collects information on indirect education reach. This information tracks other family members of adults who participated in direct education who therefore may also benefit from the information shared, according to USDA officials. To assess the reliability of these data, we interviewed NIFA officials and reviewed relevant documentation. We determined that these data were sufficiently reliable for the purpose of describing the number of people indirectly reached by EFNEP. Because USDA officials consider the total number of WIC participants to be the best proxy for WIC nutrition education participation, as all WIC participants are offered nutrition education, we analyzed WIC total participation, and participation by women, infants, and children, for fiscal years 2010 through 2018. These data are reported on the FNS- 798/798A Financial Management and Participation Report form, which contains programmatic and financial data reported by state agencies, Indian Tribal Organizations, and U.S. territories through the Food Programs Reporting System (FPRS). To assess the reliability of these data, we interviewed FNS officials and reviewed relevant documentation. We determined that these data were sufficiently reliable for reporting the number of WIC participants offered WIC nutrition education. Data were unavailable on participation for Team Nutrition—a program which provides training and technical assistance to child nutrition program operators, and creates and disseminates materials for child nutrition program participants. As a proxy measure for program reach, we analyzed data on nutrition education materials disseminated to participants and the online views and downloads of nutrition education materials. To assess the reliability of these data, we interviewed FNS officials and reviewed relevant documentation. We determined that these data were sufficiently reliable for the purpose of reporting the number of Team Nutrition materials disseminated. To address the first objective, we also analyzed WIC, SNAP-Ed, EFNEP, Team Nutrition, and FINI total nutrition education expenditure data for fiscal year 2017, the most complete data available as of April 2019. Like WIC participation data, WIC expenditure data are reported on the FNS- 798/798A Financial Management and Participation Report form through FPRS. Federal SNAP-Ed and Team Nutrition expenditure data are reported on the SF-425 form, which state agencies submit quarterly, also through FPRS. USDA tracks nationwide expenditures for EFNEP and FINI through NIFA’s payment system, Automated Standard Application for Payments; grants management system, Cooperative Research, Education, and Extension Management; and financial management system, Financial Management Modernization Initiative. To assess the reliability of these data, we interviewed officials from FNS and NIFA and reviewed relevant documentation. We determined that these data were sufficiently reliable for the purpose of reporting nationwide expenditures for these five programs. To determine what information USDA has on the effectiveness of its nutrition education programs, we reviewed relevant program evaluations from USDA issued within the last 10 years. We selected these evaluations based on information we obtained from USDA and other knowledgeable officials through interviews and relevant documents. To provide additional context on program operations for SNAP-Ed and EFNEP, we reviewed various program data. We analyzed the EARS data on the total number of SNAP-Ed implementing agencies, including the number of land-grant universities that were implementing agencies, and the types of education provided by SNAP-Ed programs in fiscal year 2018. For EFNEP, we reviewed data on participant outcomes, reported through WebNEERS, for fiscal year 2018. To assess the reliability of these data, we interviewed officials from FNS and NIFA and reviewed relevant documentation. We determined that these data were sufficiently reliable for the purpose of our reporting objectives. To gain the perspective of officials involved in the implementation of nutrition education efforts, we interviewed representatives of four land- grant universities. Land-grant universities are the sole provider of EFNEP and one of the main providers of SNAP-Ed. We judgmentally selected a non-generalizable sample of four land-grant universities based on various criteria, including the recommendations of knowledgeable officials, geographic dispersion, and other factors, such as the percentage of the university’s state population in poverty. Two of the universities we selected solely administer EFNEP and two administer both EFNEP and SNAP-Ed. We gathered information from these land-grant university representatives on how they provide nutrition education through their programs and the extent to which they coordinate with other SNAP-Ed programs in their county and state, as well as with other USDA nutrition education programs. We also gathered information on support they receive from the USDA national office for coordination, if any; their perspectives on challenges USDA faces to coordinating nutrition education across its programs, if any; and their views on opportunities for USDA to improve coordination across nutrition education programs. Information collected from the land-grant university representatives cannot be generalized to all land-grant universities nationwide. We conducted this performance audit from December 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Rachel Frisk (Assistant Director), Kristen Jones (Analyst-in-Charge), and Sara Rizik made key contributions to this report. Also contributing to this report were Monika Gomez, Stacy Ouellette, Almeta Spencer, Rachel Stoiko, Curtia Taylor, Walter Vance, Sarah Veale, and Adam Wendel.", "summary": "The Centers for Disease Control and Prevention reports that many Americans' diets lack adequate sources of good nutrition and that this contributes to costly chronic health conditions. USDA funds and administers a variety of nutrition education efforts, which aim to help educate Americans on nutrition and improve their dietary choices. GAO was asked to review these efforts. This report examines the extent to which USDA (1) has information on participation, expenditures, and effectiveness for its nutrition education programs; and (2) coordinates its nutrition education efforts and leverages internal nutrition expertise for these efforts. GAO reviewed relevant federal laws, regulations, guidance, and GAO's prior work on nutrition education and leading practices for collaboration; analyzed USDA data on nutrition education participation in fiscal year 2018 and expenditures in fiscal year 2017, the most recent year with complete data available; and reviewed program evaluations and available outcome data for fiscal year 2018. GAO also interviewed USDA officials and representatives of relevant organizations. The U.S. Department of Agriculture (USDA) administers five key programs that provide nutrition education and has information on participation, expenditures, and effectiveness for most of these programs. USDA tracks the number of participants in direct education, such as classes and counseling, as well as other measures of program reach. For example, Supplemental Nutrition Assistance Program Education (SNAP-Ed), one of USDA's largest nutrition education programs, served 3.8 million participants through direct education in fiscal year 2018. USDA also collects nationwide expenditure data for all of its nutrition education programs, which totaled nearly $907 million in fiscal year 2017—the most recent year with complete data available. In addition, USDA collects some information on the effectiveness of most of its nutrition education programs; yet information USDA collects from states on SNAP-Ed effectiveness cannot be easily aggregated or reviewed. States provide this information in narrative reports, which hinders USDA's ability to assess the effectiveness of interventions used across the country and determine whether SNAP-Ed is achieving its goals. USDA does not have a formal coordination mechanism for its nutrition education efforts and does not fully leverage the department's nutrition expertise. According to USDA officials, coordinating nutrition education efforts has not been a priority in recent years, and the department does not have a dedicated individual or entity with leadership responsibility for nutrition education. This has resulted in limited coordination across USDA's nutrition education programs, including programs with similar target populations. GAO previously reported that effective coordination can help reduce overlap and duplication. In its absence, USDA's nutrition education programs are missing opportunities to share information and avoid duplicating efforts. Further, some USDA nutrition experts are not located in agencies or offices overseeing the nutrition education programs, and possibly because of this, program staff consult these experts on a limited basis, if at all. Failing to leverage its internal expertise hinders USDA's development of nutrition education materials that are informed by the latest nutrition guidance and research and may reduce the effectiveness of these efforts. GAO is making three recommendations to USDA, including that USDA improve how it gathers information on SNAP-Ed effectiveness, develop a formal mechanism for coordinating nutrition education across the department, and take steps to fully leverage the department's nutrition expertise for its nutrition education efforts. USDA generally agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "USPS is required to provide postal services “to bind the nation together through the personal, educational, literary, and business correspondence of the people prompt, reliable, and efficient services to patrons in all areas and postal services to all communities.” To help fulfill this mission, USPS has developed a network of facilities that provides access to retail services and supports postal collection, processing, transportation, and “last mile” delivery of mail—functions that are generally co-located. The retail portion of these facilities includes public areas where USPS provides customers with retail services. The public areas can include full service counters where employees assist customers, self-service areas, and post office boxes. The non-public portions include features such as workrooms, where mail processing occurs, and employee support areas, such as lunch tables and lockers. Although USPS data show that customer visits and transactions have declined over the past 5 years, the size of USPS’s retail network has remained largely unchanged during that period (see fig. 1). We have previously reported that USPS has made some efforts to reduce the number of its retail facilities to align with the significant decline in mail volume and address rising costs. Several factors, however, have limited USPS’s ability to make further reductions. For example, in 2011 USPS moved to evaluate the potential closure of almost 3,700 retail facilities but abandoned their effort due to stakeholder concerns. Instead, USPS explored options to adjust its retail service without closing offices. Legal restrictions also limit USPS’s ability to close retail facilities. For example, USPS cannot close a small post office solely for operating at a deficit. If USPS wishes to close a retail facility, among other steps, it must take into consideration not only the economic savings but also the effects on the communities served, its employees, and the services provided, and it must provide customers with at least 60 days’ notice before the proposed closure date. Federal statute defines the types of services that USPS may and may not provide. As previously noted, PAEA placed limitations on the nonpostal products and services USPS could provide. In particular, it allowed USPS to continue to provide nonpostal products and services that were both offered as of January 1, 2006, and were permitted by PRC to continue. While PAEA generally prohibits USPS from initiating new nonpostal services, USPS uses a separate statutory authority to provide such services to federal executive agencies. If a nonpostal service is to be provided to a federal executive agency, generally, USPS and the parties must specify the terms and conditions of their collaboration, including the activities to be performed by USPS and the terms of reimbursement, if applicable. USPS is currently not authorized to provide nonpostal services to state or local entities. USPS may also lease excess space at retail facilities—including parking, office space, and roof areas—to other entities at both the facilities that USPS owns and those it leases from other entities. USPS officials said some leases give them the right to sublease space at leased facilities, but the officials did not know how many facilities where USPS had such rights. USPS collaborates with the GSA, which is the nation’s largest public real-estate organization, to lease space to other federal government entities. USPS works with a real estate firm to lease space to private or other entities, such as to state and local government entities. According to USPS’s analysis, retail facilities accounted for a relatively small portion—about $5.17 billion, or 7.1 percent—of USPS’s modified operating costs in fiscal year 2018. (See fig. 2.) Personnel costs accounted for the majority of retail facility operating costs ($4.87 billion), including nearly $4.4 billion in employee compensation. Non-personnel costs amounted to about $0.30 billion, which included rent ($0.09 billion), utilities ($0.06 billion), and depreciation and amortization ($0.15 billion). In terms of revenue, according to USPS’s analysis, retail facilities accounted for a relatively small portion—about 15 percent ($10.5 billion)—of USPS’s total revenue ($70.6 billion) in fiscal year 2018. As shown in figure 3, postage meters and validation and walk-in stamp sales generated most of that revenue. In fiscal year 2018, the majority of retail facilities were profitable (see fig. 4), with some considerations. USPS’s analysis showed that the total retail revenue generated at retail facilities was more than double retail facility costs in fiscal year 2018. However, over a third of retail facilities did not generate enough revenue to cover USPS’s retail costs. In particular, over half of the rural facilities were unprofitable, while the overwhelming majority of suburban and urban facilities were profitable. Overall, we found that of the unprofitable facilities, 89 percent were located in rural areas. Among the 10 most unprofitable facilities, though, 5 were in urban areas and 3 were in suburban areas. USPS officials told us some of these unprofitable urban and suburban retail facilities were in areas where rent, utilities, and maintenance were very costly, and the revenue generated was not enough at those facilities to make them profitable. Finally, while the number of customer visits to retail facilities has declined by 25 percent since fiscal year 2009, customers are still using them. In fiscal year 2018, among the retail facilities for which USPS had data, the average number of customer visits was 46,624 annually, or an average of 154 visits per day. The most unprofitable facilities averaged 31,731 customer visits in fiscal year 2018, or about 105 customer visits per day. According to studies we reviewed and USPS officials and two consumer groups we interviewed, USPS’s retail facility network produces economic, social, environmental, and civic benefits (see table 1). Some postmasters who responded to our survey told us that their retail facilities generated economic and social benefits. For example, 90 percent (134 of 149) of postmasters managed a retail facility within walking distance of other businesses or community buildings. Of those, about 31 percent (41 of 134) of postmasters indicated that the retail facility increased patronage of nearby businesses and community buildings to a great or very great extent. Almost half (71 of 149) of the postmasters stated that their retail facility served as a place for residents to interact in person to a great or very great extent. The economic and social benefits may benefit rural communities more than urban and suburban areas, according to our survey of postmasters, as well as the reports we reviewed and stakeholder interviews. One survey respondent stated: “Offices in rural communities are extremely important to the area in which they serve. Postmasters are often town leaders and hold various positions on councils, boards, and non-profit organizations. The USPS is usually the only government office in the community, and it is recognized by many as their only connection to the outside world.” According to USPS OIG and representatives from the two consumer groups we interviewed, retail facilities serve as a gathering place and help build social identity and connectivity, especially in rural areas. According to USPS, small business owners depend on access to USPS retail facilities across the country and in rural areas since USPS facilities are often the only retail shipping provider. In addition, according to USPS, retail facilities play important roles in connecting rural communities. USPS has offered a variety of nonpostal products and services since 2008 (see table 2). As previously described, PAEA permitted USPS to continue offering certain nonpostal products and services that were approved by PRC, and did not alter USPS’s statutory authority to provide nonpostal services to federal executive entities. The nonpostal products and services we identified were either permitted to continue by PRC pursuant to PAEA or are services USPS provided through partnerships with other federal government entities, such as those made through interagency agreements. USPS chooses where to offer its nonpostal products and services based on several factors, and as noted in table 2 above, USPS does not offer each nonpostal product and service at all retail facilities. USPS officials told us they determine where to offer nonpostal products and services based on several factors, such as customer demand and analysis of the potential to generate revenue. In some cases, USPS consults with other entities to make these determinations. For example, USPS officials told us that the company that supplies the greeting cards conducts market research to determine locations where there is demand. For passport services, USPS and U.S. Department of State officials determine locations based on demand and whether retail facilities have adequate staff to perform related functions, among other factors. USPS collects a fee for some, but not all, of the identified nonpostal products and services offered at retail facilities. According to data from USPS’s revenue and cost analysis, nonpostal products and services generated a small amount of the total revenue collected at retail facilities—about $431 million in fiscal year 2018, which accounted for 4.1 percent of total retail facility revenue, and 0.6 percent of USPS’s total revenue. As figure 5 shows, passport applications and photo services, as well as money orders, accounted for the greatest percentage of revenue. Nonpostal products and services may also generate revenue from additional transactions that are made by customers during their visits to obtain these offerings. For example, in 2016, USPS OIG estimated that USPS generated almost $6.6 million in fiscal year 2015 from individuals purchasing money orders to pay for passport-related services. In addition, USPS OIG reported that passport services increased foot traffic at retail facilities. A representative from a postal employee union also told us that nonpostal products and services offered at retail facilities can drive increased foot traffic in post office lobbies. USPS officials said that USPS incurs various costs for nonpostal products and services related to (1) the time it takes mail clerks to perform transactions; (2) equipment and materials, such as passport photo equipment for passport photo services; and (3) any needed physical changes to the facility. USPS is required to analyze whether revenues cover costs for some of the identified nonpostal products and services, but not all. USPS officials said they are not required to report on whether revenues cover costs for services provided through federal interagency agreements, such as passport application processing. In addition, they told us they do not track the costs for offerings that are considered to be “non-commercial, non-revenue generating services,” such as community bulletin boards. USPS officials also said some of the nonpostal products and services we identified do not incur any costs; for example, greeting and gift card displays are provided at the vendor’s expense. While USPS does not track costs for all offerings and make all costs publicly available, USPS reported that most of the nonpostal products and services we identified (as shown in table 2), and for those that USPS tracks costs, generated more revenue than costs in fiscal year 2018. Specifically, USPS reported that money orders earned almost $12 million and philatelic sales earned about $1.1 million in revenue above their costs in fiscal year 2018. USPS reported the only nonpostal product or service that did not cover its costs in 2018 was in-bound international money transfers. Based on our discussions with USPS officials, we identified three pilots USPS has conducted since 2008 to provide nonpostal services on behalf of other federal government entities at retail facilities; two of these pilots involved USPS mail clerks performing in-person identity proofing and biometric capture and one of the pilots involved sharing retail facilities’ lobby space. USPS and the U.S. Census Bureau (Census Bureau) conducted a pilot to evaluate the feasibility of having USPS assist the Census Bureau with nationwide hiring for the 2020 Census. For this pilot, which lasted from March 2015 to July 2015, USPS mail clerks at 12 retail facilities used Census Bureau equipment to conduct in-person identify proofing and other administrative processes to help hire temporary Census Bureau employees. USPS and the Federal Bureau of Investigation (FBI) began a pilot in September 2018 in which USPS mail clerks began scanning and sending the fingerprints of individuals participating in the FBI’s Identity History Summary Checks—a program that enables individuals to request their arrest and conviction records (see fig. 6). USPS and the Census Bureau conducted a pilot from April 2018 to July 2018 as part of the Census Bureau’s 2018 testing activities to determine whether interactive kiosks could be used at retail facilities to allow customers to fill out their Census questionnaire. USPS installed kiosks at 30 retail facilities in Providence County, Rhode Island, that offered Internet access limited to the Census Bureau’s online questionnaire. According to officials from the Census Bureau and FBI, the agencies benefited from the three pilots, to varying degrees, and USPS generated revenue from the two in-person proofing and biometric capture pilots. USPS officials told us that they received $125,000 from the 2015 in- person proofing pilot with the Census Bureau, and Census Bureau officials said this pilot provided their staff with convenient locations to meet with prospective applicants. Regarding the 2018 kiosk pilot, Census Bureau officials said this resulted in 111 completed questionnaires. However, after the pilots ended, the agencies did not enter into subsequent partnerships. Census Bureau officials told us they did not wish to extend the in-person proofing pilot due to limited funding, and they did not wish to extend the Census kiosk pilot because the number of completed tests did not justify the cost and effort. For the FBI pilot, USPS had generated almost $425,000 in revenue, as of December 2019, from the fees paid by participating customers since September 2018, according to USPS documentation. FBI officials told us this pilot has improved their customer experience and enabled them to reduce their response time for providing information to customers. In March 2019, USPS and the FBI expanded the pilot from two to 28 retail facilities, and this pilot was still ongoing at the time we published our report. USPS officials told us they also created the Digital Business Services Team in June 2019 in part to pursue additional revenue-generating partnerships with federal executive agencies. The officials said a major focus of the team was to expand USPS’s in-person identity proofing and fingerprinting services, and they estimated—with certain assumptions regarding acquiring partnerships—fingerprinting services could generate about $87 million in annual revenue after a 5-year rollout. USPS is currently discussing potential new partnerships for in-person proofing pilots with federal government entities. USPS officials, federal government entities, and stakeholders we interviewed and postmasters we surveyed told us that the identified nonpostal products and services (as shown in table 2) currently offered at retail facilities provided the following non-revenue benefits. Enhanced consumer benefits. Access to certain nonpostal products and services at retail facilities enhanced consumers’ convenience, according to USPS officials, and representatives from consumer groups and a postal employee union. For example, in September 2019, USPS analysis found that 32 percent of the FBI pilot customers selected USPS’s fingerprinting services over others who offer similar services due to USPS’s location and rated their satisfaction with USPS’s service highly. A representative from the postal employee union said that many customers are happy that they can purchase a greeting card and gift card when visiting a retail facility. In addition, a representative from one of the consumer groups we interviewed said that some nonpostal products and services, such as international money transfers and money orders, may be otherwise unavailable to certain populations, such as those who do not have access to a bank. This representative also told us that some low-income consumers only have internet access through their phone, which makes it difficult to fill out forms online; these consumers therefore could benefit from having certain forms, such as voter registration and selective service, available at a retail facility. Enhanced government benefits. Officials from five of the six federal government entities that had partnerships with USPS said their partnerships supported their ability to fulfill their missions, such as by efficiently using resources and increasing customer convenience. For example, officials from all six of these federal government entities said USPS’s extensive network of retail facilities helped them reach customers or users. Also, officials from three of these federal entities told us that USPS’s services cut the processing time for certain applications or services. Enhanced community benefits. Representatives from the two consumer groups told us that community services offered at retail facilities—such as food drives, school tours, and community bulletin boards—may help sustain communities and increase social connectedness. Postmasters we surveyed also reported ways their communities benefited from nonpostal services provided at their retail facilities. For example, one postmaster we surveyed reported that his or her retail facility collected eyeglasses for a local community organization. Another postmaster we surveyed reported that during the holiday season, his or her retail facility offers decorative rubber stamps, which have become a community tradition. According to the postmasters we surveyed, some of the nonpostal products provided significant nonrevenue value, although the degree to which these provided value depended on whether the retail facility was located in a rural, suburban, or urban area. We asked postmasters to identify whether certain nonpostal products and services were offered at the selected facility, and if so, how much value the product or service provided to the community. Overall, passport services were the most highly valued nonpostal product or service. About 95 percent (36 of 38) of postmasters at retail facilities that offered passport services said passports provided great or very great value to their communities. Money orders were the next most highly valued nonpostal product or service. These were offered at more of the retail facilities selected for our survey than passport services. For the retail facilities that offered money orders, about 78 percent (115 of 147) of postmasters said this product provided great or very great value to their communities. Burial flags were the third highly valued nonpostal product or service, for some types of locations. About 66 percent (21 of 32) of postmasters managing rural retail facilities and about 70 percent (35 of 50) of postmasters managing suburban retail facilities said burial flags provided great or very great value compared to about 43 percent (9 of 21) of postmasters overseeing urban retail facilities. Among retail facilities that offered international money transfers (SureMoney), selective service forms, philatelic products, and gift cards, around one-third or more of postmasters reported these as providing some value or little to no value in their communities. Representatives of one postal employee union, postmasters we surveyed, and officials from the six federal government entities that had partnered with USPS reported minimal challenges related to providing the identified nonpostal products and services at retail facilities. For example, the representative from the postal employee union told us that the only challenge for postal workers was when locations did not have adequate staff to handle passport services. Very few of the postmasters selected for our survey identified challenges related to offering the thirteen nonpostal products and services we asked about. Officials from only two of the six federal government entities mentioned challenges, and none of them were significant in nature. For example, officials from the Department of Veterans Affairs mentioned that the only challenge was ensuring adequate supplies of burial flags at retail facilities. Although the stakeholders we interviewed and postmasters we surveyed cited few challenges associated with nonpostal products and services, USPS OIG has reported that USPS could take actions to further increase the use of some of these offerings. In 2015, USPS OIG suggested that USPS conduct better-targeted marketing for its money orders or consider pricing changes to the fees charged for money transfers. In 2016, USPS OIG identified several areas in which USPS could improve customer experience for passport services, such as improving the clarity of information provided to customers and improving the accuracy of offerings on USPS’s website. USPS generally agreed with the findings but reported it had already implemented or had begun to implement changes to improve customer service issues raised in report. USPS currently leases some of its owned excess space—including space at its retail facilities, such as parking, office space, and roof areas—to other entities, generating additional revenue and other benefits. According to USPS as of January 2020, USPS was leasing space in 232 facilities (about 3 percent) of its 8,362 owned facilities to federal and local government and private entities. USPS generated about $29 million from its leases in fiscal year 2018. USPS officials told us they are currently researching the feasibility and benefits of leasing space to entities to place automated teller machines in retail facility lobbies and parking lots as a way to generate revenue. Stakeholders we interviewed and USPS OIG have said leasing space may also result in non-revenue benefits for USPS and consumers. For example, a postmaster who managed a retail facility said that leasing office space to two local government entities likely increased foot traffic in the facility and increased community access to government services provided by the tenants. USPS, however, has little additional vacant rentable space. As of September 2018, USPS reported that it had vacant rentable space available in 307 (about 4 percent) of its 8,362 owned facilities. In 2018, USPS OIG reported that USPS faced unique challenges in leasing such excess space, including poor condition and limited size, lack of handicap accessibility, limited parking, lack of accessibility without interfering with USPS operations, and lack of a separate restroom. According to GSA officials, some available space is small—USPS reported that about 9 percent of available space is less than 500 square feet—and may require significant investment from GSA or the potential tenant agency to be suitable for occupancy (see fig. 7). GSA officials said it has been difficult to find federal government entities willing to lease retail facility space from USPS. For example, officials from the Census Bureau told us that they leased some space at two USPS facilities to support 2010 Census activities, such as to support hiring personnel and a location for training. However, they were not able to lease as much as they would have liked because there was very little available space that met Census requirements, and the space that was available would have required costly modifications prior to use. In addition, USPS officials told us there can be costs related to leasing space, such as USPS’s making needed renovations. USPS does not track the extent to which space at retail facilities, such as lobbies and parking lots, is shared with other entities without any payment. However, USPS officials told us that while community groups have asked to use retail facility space and parking lots, these requests do not happen frequently. Only two of the 149 postmasters we surveyed (about 1 percent) indicated that the selected retail facility they oversaw shared space with other entities at no charge. Studies we reviewed and postal experts and stakeholders we interviewed have suggested that USPS may be well positioned to offer additional nonpostal products and services due to its trusted brand, vast retail facility network, and experience with other nonpostal efforts. Examples of such additional offerings are set out in the following table (see table 3). USPS officials, stakeholders, and studies we reviewed indicated these identified additional nonpostal activities—if USPS were authorized to offer them—could offer a variety of non-revenue benefits to consumers, government entities, and communities. Examples of some of the suggested types of non-revenue benefits are shown in table 4. However, most of these additional nonpostal products and services would not increase revenues or greatly benefit their communities, according to the postmasters we surveyed. Specifically, a majority of postmasters did not think any of the nine additional nonpostal products and services we asked about would increase revenues or benefit the community to a great or very great extent. However, postmasters indicated that some potential services were more promising than others. In particular, about 40 percent (59 of 149) of postmasters indicated that notary services would increase revenues or benefit the community to a great or very great extent, while 36 percent (53 of 149) of postmasters indicated that driver’s license and other state license services would increase revenues or benefit the community to a great or very great extent. Few postmasters in our survey indicated that a benefit of offering any of the nine additional nonpostal products and services would be that they would be providing a product or service that is not offered elsewhere in the community. USPS officials, officials from other federal government entities, and stakeholders told us that most of the nonpostal products and services identified above would likely have limited revenue potential. They, as well as studies we reviewed, indicated a variety of reasons why USPS might not generate significant net revenue from the additional nonpostal products and services we identified. Low potential for a significant market share. USPS officials and stakeholders told us USPS could face challenges gaining enough of a market share for some of the additional nonpostal products and services to make a profit. For example, USPS officials said if they offered notary services, they would likely gain only a small share of the market because other retailers, such as banks, already offer these services for free. Also, representatives from four financial associations said they believed consumer demand for financial products and services was already being met or would best be met by existing financial entities, and that many consumers may not likely obtain these services from USPS. In addition, representatives from two financial associations said serving underbanked populations would likely result in limited profits because these tend to be riskier customers who may default more often, and the services they use result in slim profits for current providers. High operational costs. USPS OIG has reported that USPS incurs low customer foot traffic and high labor costs compared to other retail facilities. According to USPS officials, these factors make it difficult to compete on a cost-per-transaction basis for nonpostal products and services and make leasing space in owned facilities and subleasing space at USPS’s leased retail facilities attractive, because leasing and subleasing would not incur personnel costs. Additionally, USPS officials told us that offering some of the additional nonpostal products and services could require significant investment costs—such as major technology investments and additional training for mail clerks—further reducing USPS’s ability to make a profit. For example, USPS OIG estimated in 2015 that USPS could generate $1.1 billion annually after a 5-year ramp up from expanding the financial products it already offered. USPS officials, however, said that expanding such offerings at retail facilities would likely require extensive investments in physical and information technology security and incur ongoing costs. Accounting for these sorts of costs would mean USPS would likely generate about $100 million to $200 million in net revenue as opposed to $1.1 billion. In addition, representatives from the American Association of Motor Vehicle Administrators and the Maryland Motor Vehicle Association told us that if USPS were to offer state driver’s license services, it would need to invest in equipment and training. Specifically, USPS would need to purchase secure computer systems that require multiple electronic interfaces and train mail clerks to handle complex document verification for issuing state driver’s licenses in order to meet requirements set by the REAL ID Act of 2005, among other concerns. Limitations on amounts charged. USPS officials and other stakeholders indicated that the fees charged for some of the additional nonpostal products and services would be too low to result in high revenues. For example, USPS officials found there would be little potential revenue from providing photocopying services or placing vending machines in retail facilities. Also, NPS officials and representatives from AFWA told us that current providers of National Parks and Federal Recreational Lands Passes and state hunting and fishing licenses generally do not generate much revenue due to the fee structure. In addition, USPS may or may not charge other entities a fee for sharing information at retail facilities. For example, USPS’s partnerships to share information on other government entities’ behalf, such as providing selective service registration forms and displaying information for DOJ’s National Crime Victims’ Rights week, do not generate revenue. Last, any effort to expand community services would not be intended to generate revenue. We have previously reported that foreign posts began offering nonpostal products and services to increase revenues, such as offering banking or financial services and making additional government services available in their retail facilities, but these efforts have had mixed results. Some foreign postal operators have expanded their financial offerings at retail facilities and have generated significant revenue from these efforts. For example: The United Kingdom’s postal retail operator—The Post Office—has an agreement with virtually all the retail banks in the United Kingdom that enables customers to use retail facilities to access their banking services. According to The Post Office, the financial services it offers generated €205 million in 2017 and €215 million in 2018. (Cost data were not available.) Officials from The Post Office told us this agreement has not only generated income, but also increased foot traffic to their retail locations. France’s postal operator, La Poste, established a bank in 2005 to provide a full range of banking products and services through its retail facilities. According to La Poste, its banking services generated net revenues of €5.5 billion in 2018, which was down from €5.6 billion in net revenue in 2017. However, USPS officials and representatives from banking associations cautioned that the financial and regulatory infrastructures of other countries are too different from those of the United States to suggest that USPS could achieve similar results. In addition, foreign postal operators are starting to sell their banks or have a franchise model with relatively lower-paid staff. There were mixed views on whether there would be demand for any or all of these nonpostal products and services. On the one hand, USPS officials, officials from other federal government entities, postmasters we surveyed, and stakeholders generally said that there was little demand for many of the additional nonpostal products and services USPS could offer at its facilities. In particular, postmasters did not indicate very high demand for any of the nine additional nonpostal products or services we asked about in our survey. The highest response for products and services in demand was only about 36 percent (53 of 149) of postmasters who said there was demand for notary services, and the next highest was about 33 percent (49 of 149) of postmasters who said there was demand for printing and photocopying services. Also, officials from the 12 federal government entities noted that while they were open to new partnerships in which mail clerks perform transactions on their behalf or in which the entities would have access to retail facility space, officials did not identify many specific examples of a need for such services. None of the postmasters we surveyed reported that they had been approached by community members in the last 10 years to share or lease space at their retail facility. On the other hand, based on studies we reviewed and interviews with representatives from consumer groups, there may be demand for certain offerings at retail facilities, such as check cashing and payday loan services, particularly if offered at a lower price than competitors. For example, in 2014, the Pew Charitable Trusts conducted a nationally representative survey of 1,626 adults and estimated that only around a quarter of American adults would be very likely or likely to use certain financial products, including check cashing, prepaid cards, bill pay, and small-dollar loans, if offered at USPS retail facilities. However, for those surveyed who were already using such services, respondents indicated they would likely obtain these at USPS retail facilities if offered at a lower price. Regarding feasibility, stakeholders and postmasters identified various issues related to what types of nonpostal products and services made sense to them. Postmasters indicated that displaying information about government programs and printing and photocopying services were the most feasible potential service, about 64 percent (95 of 149) and about 63 percent (96 of 149), respectively. In contrast, postmasters thought grocery pick-up and public wifi services were the least feasible, with about 78 percent (116 of 149) and 64 percent (96 of 149) of postmasters, respectively, indicating that they were not feasible. A representative from one of the employee unions told us that the success of additional nonpostal efforts would depend on the retail locations’ having adequate staffing levels. The representative also said that any nonpostal efforts should be designed to align with community needs and the work that retail facility employees already conduct. Officials from the Federal Communications Commission and representatives from a telecommunications association told us telecommunications companies may consider leasing space at USPS’s retail facilities that are suitable for wireless antennas to help build out 5G networks, subject to network design and business needs. In addition, representatives from one state motor vehicle administrator told us state motor vehicle administrations may consider partnering with USPS to provide state vehicle tag and title services on their behalf, such services, would not require substantial investment for USPS to undertake. Finally, USPS officials, federal government entities, and postmasters we surveyed, and stakeholders identified a variety of other limitations that would affect the viability of nonpostal products and services. We found that these limitations included limited interest for partnerships from other federal government entities, the size and unfavorable characteristics of retail facility space, complexities related to existing regulatory structures and entering into new markets, and personnel concerns. Examples of these limitations are described in table 5. Moreover, we also asked postmasters what challenges would prevent their selected retail facility from offering these additional nonpostal products and services. The most commonly cited challenges were insufficient staff or the need for additional staff training, particularly for notary services, driver’s license or other state license services, financial services, and banking services. As discussed above, given that these potential nonpostal products and services may have benefits but face concerns about their viability, USPS and policy makers need to consider the benefits, costs, and limitations of potential nonpostal efforts before introducing new efforts. In particular, though some efforts could create benefits like enhanced access for consumers, a variety of challenges may limit revenue generation in such a way that the potential offerings are unlikely to significantly improve USPS’s financial condition. Moreover, there are a number of limitations to be considered, including a potential lack of demand and factors affecting USPS’s ability to implement such offerings. We provided a draft of this report to the Census Bureau; Federal Communications Commission; GSA; U.S. Department of Veterans Affairs; U.S. Department of Homeland Security’s Federal Emergency Management Agency and Transportation Security Administration; U.S. Department of the Interior’s Fish and Wildlife Service and National Park Service; U.S. Internal Revenue Service; U.S. Department of Justice’s FBI and Office for Victims of Crime; U.S. Department of State; and USPS. The Census Bureau and GSA sent us technical comments, which we incorporated as appropriate. In its response, USPS reiterated its legal constraints but noted that there were other limitations affecting its ability to expand its offering of nonpostal products and services. These limitations include low net revenue potential, low potential for significant market share, high operational costs, and limits on amounts that could be charged. USPS noted, however, that it continues to explore partnerships with other federal agencies. We are sending copies of this report to the appropriate congressional committees, the Postmaster General, the Chairman of PRC, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. the costs, revenues, and non-revenue benefits associated with U.S. Postal Service’s (USPS) retail facilities; the nonpostal efforts USPS has conducted since 2008 to increase revenues and non-revenue benefits from its retail facilities, and the costs, revenues, non-revenue benefits, and challenges of such efforts; and the key considerations of additional nonpostal efforts that USPS could take to increase revenues and non-revenue benefits from its retail facilities. For this report, we focused on USPS-managed retail facilities, including USPS-operated post offices, postal stations, branches, and carrier annexes, as defined in USPS’s Annual Reports to Congress. We also used the term “nonpostal” to refer to activities that are not directly related to mail delivery. We selected 2008 to begin our analysis because that was when new restrictions on nonpostal services took effect. To describe the costs, revenues, and non-revenue benefits of USPS’s retail facilities, we reviewed USPS’s financial analyses of its retail network from fiscal years 2017 and 2018, the only years USPS conducted such analyses at the time we published this report. For these analyses, USPS identified the sources and amounts of retail facility costs (e.g., personnel, rent, and utilities) and revenues (e.g., stamp sales and post office box rental fees) for most of USPS’s retail facilities. Because some retail facility costs USPS identified (e.g., rent and personnel) also support non- retail functions, USPS used models to distribute such costs across each retail facility. USPS’s analyses also calculated the net revenues (revenues minus costs) for those retail facilities included in its analysis. Further, USPS examined characteristics of retail facilities, such as the facilities’ surrounding population densities, to describe factors that may be related to retail facilities that did or did not achieve positive net revenues. Based on interviews with USPS officials and USPS documents we reviewed, we determined the reliability of these analyses were sufficient to describe costs and revenues of retail facilities. We compared retail facility costs and revenues with USPS’s total costs and revenues to determine how much retail facilities contribute to total costs and revenues. In addition, we identified the number of retail facilities located in urban, suburban, or rural areas where the revenues did and did not cover costs. We defined these geographic categories using USPS’s definitions in its retail facility cost and revenue analysis. We also interviewed USPS officials to describe why revenue at retail facilities may not cover costs. To describe non-revenue benefits of USPS’s retail facility network, we reviewed relevant publications and studies, such as those conducted by USPS, USPS’s Office of Inspector General (OIG), and USPS’s oversight body, the Postal Regulatory Commission (PRC). We also examined 2018 data from USPS on the number of customer visits at the retail facilities for which data were available. Additionally, we interviewed representatives from two consumer groups, which we selected based on their ability to provide us with consumer viewpoints on retail facilities and their offerings, and two organizations representing USPS workers at retail facilities: American Postal Workers Union (APWU) and United Postmasters and Managers of America (UPMA). To examine the nonpostal efforts USPS has conducted to increase revenues and non-revenue benefits from its facilities since 2008 and their results, we first identified nonpostal products and services offered at USPS’s retail facilities through interviews with USPS officials and reviews of relevant publications, such as PRC’s report on USPS’s product offerings and USPS OIG reports. See table 6 for a complete list of USPS OIG reports we reviewed. We also identified the number of retail facilities that offered each identified nonpostal product and service, where data was available, using USPS’s facility data from November 2019, as well as information from USPS’s Inspection Service on facilities that participated in the Department of Justice’s Office of Victim’s National Crime Victims’ Rights week. Because USPS’s facility data included facilities without retail functions, we merged these with data from USPS’s fiscal year 2018 financial analysis of its retail network to ensure we included only facilities with retail functions. To describe the revenues of the nonpostal products and services we identified, we reviewed data from USPS’s fiscal year 2018 financial analysis of its retail network. We also reviewed USPS OIG reports to identify indirect ways that nonpostal products and services can contribute to revenue at retail facilities. To identify the costs of these activities, for which information was available, we reviewed USPS’s fiscal year 2018 Annual Compliance Report, PRC’s fiscal year 2018 Annual Compliance Determination Report, and non-public data provided to us by USPS. From these reports, we also determined whether the revenue USPS generated from these nonpostal efforts did or did not exceed costs. We reviewed only fiscal year 2018’s revenue and costs because we did not have revenue data prior to fiscal year 2017 and USPS was unable to provide information on trends. As one of the nonpostal efforts USPS can currently take at its retail facilities includes leasing space for revenue, we reviewed USPS’s data on the amount of vacant rentable space for fiscal years 2017 and 2018 (the only available years), on tenants at its facilities as of January 2020, and on the amount of revenue USPS collected from its leased space from 2018. Based on interviews with USPS officials and USPS documents we reviewed, we determined the reliability of these data were sufficient to describe USPS’s efforts and results of leasing excess space at retail facilities. To obtain stakeholder views on USPS’s nonpostal efforts, including the costs, revenues, non-revenue benefits, and challenges of these efforts, we interviewed officials from six federal government entities that partnered with USPS on initiatives as well as representatives from APWU, UPMA, and two consumer groups. See table 7 for a complete listing of the entities we interviewed. We also interviewed officials from the U.S. General Services Administration (GSA), which leases space on behalf of USPS to other federal government entities, and the Association of United States Postal Lessors, which represents entities that lease space to USPS. We also interviewed postal stakeholders at three retail facilities that had vacant leasable space, leased space to other entities, or offered nonpostal products and services. We selected these locations to obtain information on a variety of USPS’s current nonpostal efforts. To examine the benefits and key considerations of offering additional nonpostal efforts at USPS retail facilities, we interviewed USPS officials, postal stakeholders, and postal experts, selected based on prior work; reviewed prior GAO reports and relevant USPS OIG studies; and attended a forum exploring community use of USPS’s delivery infrastructure, including retail facilities. From the studies we reviewed and stakeholder suggestions, we selected and categorized examples of nonpostal efforts that were mentioned at least twice. To obtain stakeholder views on the potential benefits and limitations of such offerings, we interviewed representatives from consumer, industry, and state licensing groups. We selected these entities because of their potential to be affected by USPS offering additional nonpostal products and services. We also interviewed officials from the six federal entities that have partnered with USPS on initiatives and an additional six federal government entities that could potentially establish expanded or new partnerships with USPS. See table 7 above for a complete listing of the entities we interviewed. We also interviewed two foreign postal operators—France’s La Poste and the United Kingdom’s Post Office— that have experience with nonpostal products and services similar to those we reviewed and reviewed relevant documentation, such as their annual fiscal year 2018 financial reports. We selected these postal operators based on prior work and other studies and to provide us with insight into their experiences. Finally, we reviewed statutes, including the Postal Accountability and Enhancement Act (PAEA); regulations; and legal rulings, to evaluate USPS’s current legal authority to provide these services. The views presented in our report are not generalizable to those of all stakeholders. Further, we surveyed USPS postmasters to obtain additional perspectives on the benefits of USPS’s retail facilities, the nonpostal efforts offered at those facilities, and the key considerations of offering additional nonpostal products and services. Specifically, we conducted a non-generalizable, web-based survey of postmasters who managed retail facilities located in urban, suburban, and rural areas from August to September 2019. We defined these geographic categories using USPS’s definitions, as described above. Using the dataset of facilities from the USPS revenue study, we removed all facilities that were located in an overseas American territory, any facility missing a geographic category code, and certain kinds of facilities that were not relevant to the survey. Using these filters we identified a sample frame of 26,600 retail facilities. We randomly sorted the facilities within each of the three geographic categories and took the first 150 from each random sort. We then matched the selected USPS facilities with the postmaster responsible for them, using USPS’s postmaster data provided to us in May of 2019. Because postmasters may manage more than one retail facility, we capped the number of surveys an individual postmaster could receive at one. If a postmaster already selected in the random sort occurred again the selected facility was omitted from the sample. We restricted the total sample size to no more than 100 unique postmasters within each stratum. The sample is comprised of 83 postmasters who oversee an urban retail facility, 100 postmasters who oversee a suburban retail facility, and 100 postmasters who oversee a rural retail facility. Approximately 52 percent of our sample—or 146 postmasters—completed the survey. The survey questionnaire can be viewed in appendix II. In developing, administering, and analyzing the survey, we took steps to minimize non-sampling error that may result from differences in how a question is interpreted and the sources of information available to respondents. To help reduce measurement error, we consulted an experienced former postmaster for input on the development of the survey instrument, and also conducted pretests of the draft questionnaire with four postmasters drawn from the intended survey population. The questionnaire was modified throughout development and pretesting to improve clarity of the questions, and we removed questions when our modifications were unable to remedy observed difficulties in interpretation. To maximize survey response, we sent pre-notification letters by postal mail to the selected respondents prior to launching the web survey. After launching the survey, we sent multiple email reminders and extended the submission deadline, and also conducted follow-up phone calls. Lori Rectanus, (202) 512-2834 or rectanusl@gao.gov. In addition to the contact name above, Kyle Browning (Assistant Director); Anne Doré (Analyst in Charge); Isabelle Aboaf; Carl Barden; Karen Chen; Barbara El Osta; Geoff Hamilton; Serena Lo; Tina Paek; Samuel Portnow; Malika Rice; Matthew Valenta; and Lauren Voloder made key contributions to this report.", "summary": "USPS manages over 31,000 retail facilities, which help it provide postal services throughout the country. However, USPS faces financial challenges. In general, USPS is prohibited by statute from providing nonpostal products and services (i.e., services not directly related to mail delivery) unless approved by the Postal Regulatory Commission. But given the ubiquity of the retail network, some stakeholders have suggested that offering additional nonpostal products and services could help USPS generate revenue and provide benefits for consumers and communities. GAO was asked to review opportunities to enhance the value of USPS's retail facilities. This report examines: (1) the costs, revenues, and other benefits associated with USPS's retail facilities; (2) USPS's nonpostal efforts since 2008 at retail facilities and the outcomes; and (3) considerations of new nonpostal efforts at retail facilities. GAO analyzed USPS retail facility costs and revenue data from fiscal years 2017 and 2018 (the only years available); reviewed relevant documents and reports from USPS and others; conducted a non-generalizable survey of USPS postmasters who managed rural, suburban, and urban retail facilities; and interviewed USPS officials, and stakeholders, including postal employee unions, industry and consumer groups, and federal agencies that partner with USPS to obtain views on current and potential nonpostal efforts. GAO is making no recommendations. USPS, in its comments, reiterated that it faces various constraints to new offerings at retail facilities. In 2018, U.S. Postal Service's (USPS) retail facilities, such as post offices, generated about $10.5 billion in revenue and cost approximately $5 billion to operate, making them profitable overall. While such facilities accounted for about 15 percent of USPS's total fiscal year 2018 revenues, and about 7 percent of its total costs, stakeholders identified other benefits that retail facilities provide for communities—particularly in rural areas—such as local access to government information and services. Since 2008, USPS has offered a variety of nonpostal products and services at its retail facilities that have generated some revenue and other benefits. USPS data show that the nonpostal products and services for which USPS captures revenue data, such as money orders, generated about $431 million in total revenue in fiscal year 2018 and were profitable overall. Stakeholders said many of these nonpostal products and services also provided other benefits, such as enhanced convenience for customers, and postmasters GAO surveyed said some offerings, such as passport services, were highly valued in their communities. Offering additional nonpostal products and services at USPS retail facilities could provide consumer, government, or community benefits, but viability may be limited. Stakeholders said new offerings, such as expanded financial products or government services could, for example, enhance consumers' access and government efficiencies. In particular, some noted that USPS could provide a viable banking alternative for those lacking banking services. However, USPS officials, postmasters GAO surveyed, and stakeholders GAO interviewed said that additional offerings may generate minimal revenue and that USPS may face factors limiting the viability of these offerings. For example, groups representing states' licensing agencies said offering state hunting and fishing licenses could be problematic given different state requirements. Also, stakeholders said USPS may not have the expertise nor the required capital to enter the market of some of these new offerings. Given such concerns, USPS and policy makers need to carefully weigh costs, benefits, and limitations of any new offerings.", "document_type": "gao"}
{"report": "OSS is software distributed under a license that provides broad rights to use, modify, and redistribute the original source code. Open source licenses impose certain obligations on users who exercise these rights. Specific obligations vary among the many different open source licenses. Common obligations include making the source code available, publishing a copyright notice, or giving any recipient of the program a copy of the license. Certain restrictive open source licenses allow users to copy, modify and distribute software provided that modified versions (i.e., derivatives) are subject to the same license terms and conditions as the original code. This is intended to prevent software that is derived from or contains code issued under such a license from becoming a closed- source product that can be marketed and sold exclusively. The reuse of OSS is viewed as a promising means to reduce development costs while improving software quality. According to software experts, software reuse has the potential to: increase reliability because systems will be developed with thoroughly tested and proven components, increase productivity by reducing the time and effort needed to develop software, reduce costs by enabling the sharing of knowledge and practices needed to develop and maintain software, and establish a more standard and consistent approach to software development and maintenance by using common components and procedures. In August 2016, OMB issued a memorandum to the heads of departments and agencies to ensure that new custom-developed source code be made available for reuse across the federal government. The memorandum was intended to improve the way federal agencies buy, build, and deliver information technology and software, and required that all agencies establish a pilot program under which at least 20 percent of new custom-developed code would be released as OSS for 3 years. OMB also required that agencies develop a metric to calculate the percentage of code released as OSS to gauge its progress on implementing the pilot program. OMB’s memorandum also identified four supporting requirements, among others, needed to implement an OSS pilot program: Issue an OSS policy that ensures code is available for government- wide reuse. Conduct an OSS three-step software solutions analysis that includes: (1) a strategic analysis and analysis of alternatives, (2) consideration of existing commercial solutions, and (3) consideration of custom development. In addition, agencies must consider several factors throughout each of the three-steps of the analysis such as cloud computing and open standards. Secure data rights to government-wide reuse and inventory new custom code, in accordance with the guidance provided by the code.gov website. Facilitate the OSS community by developing and releasing the code in a manner that (1) fosters communities around shared challenges; (2) improves the ability of the OSS community to provide feedback on, and make contributions to, the source code; and (3) encourages federal employees and contractors to contribute back to the broader OSS community by adding value to existing projects. In doing so, agencies should comply with the following principles: (1) leverage existing communities, (2) engage in open development, (3) adopt a regular release schedule, (4) consider code contributions, and (5) document source code to facilitate use and adoption. DOD’s CIO is responsible for implementing OMB’s requirements for the department’s OSS pilot program. The CIO reports directly to the Secretary of Defense, and is responsible for the department’s information technology (including national security systems and defense business systems), information resources management, and efficiencies. The CIO is also responsible for developing strategies and policy on the operation and protection of all of the department’s information technology and information systems. Other responsibilities include maintaining a consolidated inventory of mission critical and mission essential information systems, evaluating and monitoring performance measurements, and other duties to manage the information environment throughout the department. In addition, the Defense Digital Service is responsible for assisting the CIO in implementing the OSS pilot program, among other initiatives. The Defense Digital Service is composed of commercially experienced software developers, software designers, product managers, and problem solvers within DOD. The organization works on specific projects or programs in support of the DOD in a hands-on way to materially improve digital services across the department. The Defense Digital Service also works with the CIO to monitor the identified programs, facilitate the process to open source the code, and populate the source code inventory located on Code.mil. In June 2018, DOD’s CIO issued a report to Congress as directed by section 875(b) of National Defense Authorization Act for Fiscal Year 2018 (Public Law 115-91). The report provided Congress with the department’s plan to implement the OSS pilot program established by OMB’s memorandum. In the report, the CIO committed to sharing its unclassified, custom-developed source code as widely as possible in four ways: (1) review and select software programs that have self-identified to the Defense Digital Service as ready to open source its code; (2) query its contracts database to identify contracts that contain appropriate data rights language; (3) determine if source contained within existing source code repositories can be made available; and (4) issue a department- wide data call to identify and select programs where new, custom code is being developed. The CIO also reported that the department would prioritize and assess identified software programs and work with components to develop mechanisms to report progress. The report included selection criteria for identifying candidate software programs: (1) programs with contractually secured government data rights; (2) programs with contractual rights to enable, support, and enforce DOD and government-wide sharing and reuse of custom-developed code; (3) programs that have appropriate administration to ensure that government’s rights are maintained; and (4) programs that utilize best practices to ensure custom-developed code, documentation, and other associated materials are delivered in a reusable manner. The CIO also reported that the Defense Digital Service would assist programs. Specifically, the Defense Digital Service is to develop guidelines, processes, and answers to frequently asked questions regarding the use of OSS. In October 2018, the CIO issued a memorandum to the Chief Management Officer, secretaries of the military departments, Chairman of the Joint Chiefs of Staff, under secretaries of Defense, chiefs of the military services, general counsel, Director of Cost Assessment and Program Evaluation, Director of Operational Test and Evaluation, and the Assistant Secretary of Defense for Legislative Affairs notifying them of the need to implement an OSS pilot program in accordance with OMB’s 2016 memorandum. The CIO required these organizations to take four actions within 30 days of issuing the memorandum: Identify all unclassified custom-developed source code created or paid for by the department—regardless of data rights and open source status—created on or after August 2016 and provide the CIO information required by the guidelines on the code.gov website; Identify and provide a point of contact that can participate in open source efforts; Direct authorizing officials to rapidly review and approve unclassified code for public, open source release after appropriate security, code, and policy review; and Direct contracting officers to secure the least restrictive data rights to custom-developed source code in all future contracts in accordance with DOD federal acquisition regulations. DOD was mandated by law to initiate the OSS pilot program established by OMB memorandum M-16-21 which required (1) releasing at least 20 percent of newly custom-developed code each year for the term of the pilot program, and (2) collecting additional data concerning new custom software to inform measures to gauge the performance of the pilot program. Further, the OMB memorandum also required DOD to (1) issue an OSS policy, (2) conduct an OSS analysis, (3) secure data rights and inventory custom code, and (4) facilitate the OSS community. As of late April 2019, DOD had not fully implemented the OSS pilot program mandated by law. DOD had partially implemented the requirement of releasing at least 20 percent of newly custom-developed code as OSS. Specifically, as of July 2019, the Code.gov website reported that the department had released less than 10 percent of its custom developed code. The department was in the early stages of its pilot program and had not determined when the pilot would be fully implemented. The CIO reported that the size of the department makes it nearly impossible to inventory all of its source code custom developed since August 2016. As such, the CIO stated that it would be difficult to meet the OMB memorandum’s goal of releasing at least 20 percent of its new custom code as OSS. In addition, DOD had not implemented the requirement to develop a consistent measure to gauge the performance of the department’s pilot program. DOD had not developed such a measure due to a lack of consensus in the department about what data should be collected. According to the CIO, if the measure is “lines of code,” then it unfairly discounts projects that invest a significant amount on research, but are small otherwise. If the measure is “project hours,” then it discounts those projects that came about from sparks of innovation that took little time to develop. If the measure is “project count,” then it ignores the other two possible measures. The CIO noted that since the components will be expected to collect and report the required data, the CIO office plans to reach out to them to facilitate consensus around data needs and what measure should be used to calculate and monitor performance. Regarding the four OMB memorandum requirements supporting the implementation of the pilot program, the department partially implemented three and did not implement the remaining one. Table 1 describes the extent to which DOD implemented the OMB supporting requirements, and is followed by a description of DOD’s efforts on each requirement. Issue OSS policy. DOD had not implemented the requirement to issue an OSS policy. According to DOD’s CIO, the department has existing acquisition policies applicable to OSS, such as the 5000 series and a memorandum issued in October 2009 that clarifies OSS. However, according to DOD officials, these policies are outdated and do not comply with OMB’s memorandum. For example, while the department’s policies indicated that programs must conduct an analysis of alternatives, trade studies, or a business case analysis prior to initiating any technology acquisition or custom code development, they did not require programs to consider the value of publishing custom code as OSS and negotiate data rights reflective of its value. The department acknowledged that it does not have a policy that addresses the OMB memorandum’s requirement. According to the CIO, the department had been slow to develop a policy because these types of changes require significant resources, coordination, and buy-in across the department that will take additional time to address. The CIO also stated that the department plans to update its existing OSS memorandum by the end of the 2019 calendar year and issue it as policy. In particular, DOD intends to work with acquisition and program management officials to define approaches, processes, and best practices to expand software reuse. If the department effectively implements this intended step consistent with the OMB memorandum, DOD should be able to fully address this requirement. Conduct OSS analyses. DOD had partially implemented the requirement to conduct analyses to consider alternative software solutions. According to the DOD CIO, of the three elements required by OMB for a three-step analysis, the department’s current 5000 series policy addresses some of these elements. For example, as previously mentioned, the policy required programs to conduct an analysis of alternatives, trade studies, or a business case analysis prior to initiating any technology acquisition or custom code development. However, according to the CIO, DOD’s policy did not require programs to consider the value of publishing custom code as OSS and negotiate data rights reflective of its value-consideration. According to the CIO, the department has plans to address gaps in its existing policy by the end of the 2019 calendar year. If the department effectively implements this intended step consistent with the OMB memorandum, DOD should be able to fully address this requirement. Secure data rights and inventory new custom code. DOD had partially implemented this requirement by initiating the process to secure data rights for government-wide reuse and inventory its new custom code. Specifically, the October 2018 memorandum called for defense organizations to direct contracting officers to secure the least restrictive data rights for custom-developed source code in all future contracts, and identify all unclassified custom-developed source code created after August 2016. However, when we discussed this matter with DOD information technology and software officials responsible for the management of software in December 2018—2 months after the October 2018 memorandum had been issued— seven of 11 officials were unaware of the statutory mandate to initiate the pilot program in compliance with the OMB memorandum. Further, DOD has not provided a milestone for when it expects its inventory to be completed. Facilitate OSS community. DOD had partially implemented the requirement to establish an OSS community. According to the DOD CIO’s Custom Developed Source Code Data Call memorandum, dated October 2018, the DOD CIO is working with Defense Digital Service to develop guidelines and processes on when and how to open source code. In February 2017, DOD announced the launch of Code.mil, an open source initiative led by Defense Digital Service, that allows software developers around the world to collaborate on unclassified code written by federal employees in support of DOD projects. Finally, the Defense Information Systems Agency established a website (Forge.mil) where community members can collaborate on open source and DOD community source software. The Forge.mil website also enables collaborative development through services such as software version control, requirements management, discussion forums and document repositories. However, DOD had not yet fully engaged in open source code development, established a regular release schedule for its software code, or fully documented its source code to facilitate use and adoption department-wide. According to the CIO, the department is in the early stages of implementing the OSS pilot program and had not yet published a revision to the existing OSS policy memorandum. The CIO stated that the office plans to request collaboration and input from organizations throughout DOD for improvement initiatives and identifying specific processes and expectations for improving custom-developed software within the Department. However, DOD has not provided a milestone for when the requirements will be fully implemented and stated that achieving 100 percent compliance is not a realistic expectation. Until DOD fully implements the OSS pilot program mandated in the National Defense Authorization Act for Fiscal Year 2018 including the requirements of OMB memorandum M-16-21, the department will likely miss opportunities to achieve related cost savings and efficiencies. Further, the department will not be effectively positioned to ensure management oversight and implementation of the pilot program. DOD officials representing 11 components reported that OSS can potentially yield financial benefits and increase efficiency. Officials provided the following examples of financial benefits: Officials in the office of the Navy Chief Information Officer, the Army Communications-Electronics Command, the Office of the Under Secretary of Defense for Acquisition and Sustainment, and the Office of the Assistant Secretary of the Air Force for Acquisition, Technology, and Logistics stated that OSS is generally less expensive than commercial off-the-shelf (COTS) leading to cost savings. An Air Force official we spoke with stated that the increased use of OSS may potentially result in cost savings. Further, the official noted general criteria used by the Air Force to identify software projects that may potentially be appropriate for the use of OSS. Specifically, OSS should be considered if, among other things, the required maintenance would not result in a reduction of cost savings or efficiency if the maintenance is performed in-house. An official we spoke with at the Defense Advanced Research Projects Agency stated that OSS has positive benefits in terms of reducing costs by reducing duplicative efforts. In addition, this official also stated that OSS allows institutions of any size and budget to partake in shared investments providing access to software capabilities at a much lower cost. A program manager from the Defense Information Systems Agency reported that the agency had identified an OSS solution that provided more functionality at less cost than the commercial solution provided through a vendor. The program manager explained that when the agency implemented the new OSS solution, it realized $20 million in annual savings over the commercial solution that had been maintained by a vendor. Officials also shared examples of how OSS can increase efficiency in software development. For example, Officials from the offices of the Navy CIO and the US Marine Corps CIO stated that OSS solutions may increase efficiency by providing a rapid resolution to the needs and requirements of users. In contrast, rapid development efforts are not conducive for COTS solutions because of the long process required to obtain solutions that are needed quickly. Similarly, an Air Force official noted that the increased use of OSS may result in increased efficiency by providing rapid responses to user requirements. A program manager from the Defense Information Systems Agency reported that the selection of an OSS solution rather than a COTS solution contracted through a vendor had resulted in increased efficiency. The official explained that the use of the OSS solution allowed the agency to develop and maintain in-house skills that would not have been available had they opted to contract with a vendor providing a skilled workforce. Officials from the 11 components expressed mixed views on managing cybersecurity risks that could be posed by using OSS. Specifically, officials from three components expressed their views that security concerns and the lack of a cybersecurity governance process could result in the sporadic use of OSS. For example: A Navy CIO official viewed insider threats, such as a disgruntled employee embedding malicious code, as a factor that could significantly limit the use and sharing of OSS. According to Navy officials, without a process to verify that the software is free of malicious code, the Navy would risk the assurance it requires to increase the use of OSS. The official said that, in contrast, such concerns are not an issue when it comes to COTS software because of the test and verification process to ensure it is free from malicious code. An official in the office of the Marine Corps CIO stated that OSS is used sporadically in their software development efforts because some cybersecurity officials within the Marine Corps discourage its use due to security concerns. An official from the Army’s Communications-Electronics Command noted that DOD lacks a governance process once the originating entity releases the source code as open source. The originating entity no longer retains control over redistributed versions of the source code. According to Communications-Electronics Command officials, Army project managers may be hesitant to utilize OSS because of this perceived security risk. On the other hand, DOD officials from eight components stated that the potential cybersecurity risks posed by the use of OSS were manageable and that the use of OSS should not be limited. For example: The policy advisor from the Office of the Under Secretary of Defense for Acquisition and Sustainment noted that scanning tools to analyze and identify safe and reliable open source code are not being used. Employing available scanning tool options could result in discovering available OSS. The policy advisor also noted that building security into software operations, rather than through the development of software, would enable users to know if code has been subverted and to react appropriately. A program management official from the Office of the Under Secretary of Defense for Acquisition and Sustainment suggested that security concerns may be mitigated by establishing a secure repository for trusted code. An official in the Office of the Assistant Secretary of the Air Force for Acquisition, Technology, and Logistics reported that, as long as OSS is properly vetted to ensure it is secure and free from malware, it offers an opportunity for the department to achieve cost savings and efficiencies. Pilot testing the use of OSS is an important way to ascertain and improve the way DOD buys, builds, and delivers information technology and software solutions. However, the department is in the early stages of implementing its pilot program and had not determined when the pilot would be fully implemented. Specifically, DOD has not made 20 percent of its new code available for reuse nor has it identified a measure to gauge the performance of its pilot program. Moreover, DOD has not yet established milestones for securing data rights and conducting an inventory or facilitating community. Until DOD fully implements its pilot program and establishes milestones for completing the OMB requirements, the department will not be positioned to take advantage of significant cost savings and efficiencies. We are making the following four recommendations to DOD: The Secretary of Defense should ensure the department implements the pilot program by releasing at least 20 percent of newly custom- developed code as OSS. (Recommendation 1) The Secretary of Defense should ensure the department identifies a measure to calculate the percentage of code released to gauge its progress on implementing the pilot program. (Recommendation 2) The Secretary of Defense should ensure the department establishes milestones for completing the requirements of OMB memorandum M- 16-21 of securing data rights and conducting an inventory. (Recommendation 3) The Secretary of Defense should ensure the department establishes a milestone for completing the OMB memorandum’s requirement of facilitating an OSS community. (Recommendation 4) DOD provided written comments on a draft of this report, which are reproduced in appendix II. In its comments, the department did not concur with our first recommendation, partially concurred with our second recommendation, and concurred with the third and fourth. DOD did not concur with the first recommendation on ensuring that the department implements the pilot program by releasing at least 20 percent of newly custom-developed code as OSS. The department stated that it does not believe that the pilot program as described in the OMB memorandum is implementable as proposed. For example, DOD asserts that most of DOD’s custom developed software is created for weapons systems and releasing the associated code is sensitive for national security reasons. In addition, the size and complexity of DOD presents unique challenges for the department compared to other federal agencies such as inventorying all software development projects to establish a baseline. DOD added, however, that the OMB memorandum explicitly states that national security exceptions do not apply to the pilot program. DOD also stated that it recognizes the value of collaborative software development and has plans to release additional guidance on releasing OSS and procedures for maintaining its inventory. Once DOD establishes a baseline inventory of custom-developed software and the procedures for maintaining it, the department states it will be able to determine if the 20 percent is an appropriate goal. We understand the potential constraints DOD faces and that national security considerations are to be factored into decisions DOD will need to make about which custom developed software to include in the pilot. However, DOD is mandated by law to implement the OSS pilot program established by OMB memorandum M-16-21. Further, the OMB memorandum instructs agencies to refrain from selecting code for release that would fall under exceptions such as national security risk. As such, DOD has flexibility on making decisions about which custom-developed code to include in the pilot. While we agree that a baseline inventory is needed, DOD must include at least 20 percent of new custom-developed code each year for the term of the program to satisfy the mandate. DOD partially concurred with the second recommendation on ensuring that the department identifies a measure to calculate the percentage of code released to gauge its progress on implementing the pilot program. Specifically, the department stated that the additional guidance it plans to release before the end of 2019 on OSS will include measures to gauge how much code has been developed and how much has been released. In addition, DOD noted that these measures will support good management of the overall portfolio of information technology, even in the absence of the mandated pilot program established by the OMB memorandum. We believe that the measure to calculate the percentage of code should be used to assist the department in meeting the OMB memorandum’s requirements. We also agree with the benefits of developing a measure to manage the portfolio of information technology. DOD concurred with the third and fourth recommendations related to establishing milestones for completing the OMB memorandum’s requirements of securing data rights, conducting an inventory, and facilitating an OSS community. According to the department, it has issued a memorandum that directed contracting officers to secure the least restrictive data rights to custom-developed source code, in furtherance of the OMB requirements, and also included a data call that forms an initial basis of an inventory of custom-developed software. Regarding facilitating an OSS community, DOD stated that it has formed a community of practice called DevSecOps that is open to all software development organizations in the department and plans to use this forum to facilitate collaboration on the use of OSS. We are sending copies of this report to the appropriate congressional requesters and the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-4456 or at harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our objectives were to: (1) assess the extent to which the Department of Defense (DOD) has implemented the open source software (OSS) pilot program and other related requirements established by the Office of Management and Budget (OMB), and (2) describe the views of responsible DOD officials on the use of OSS to achieve efficiency at the department. To address the first objective, we selected six requirements from the OMB memorandum titled the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (M-16-21, Aug. 8, 2016) as criteria to assess the extent to which DOD has implemented the OSS pilot program. Two requirements establish the OSS pilot program: (1) releasing at least 20 percent of newly custom-developed code each year for the term of the pilot program, and (2) developing a metric to gauge the performance of the pilot program. The other four requirements support the implementation of the pilot program: (1) issuing an OSS policy, (2) conducting an OSS analysis, (3) securing data rights and inventorying custom code, and (4) facilitating the OSS community. We met with officials from OMB to collect background information on the selection of requirements for the pilot program established in memorandum M-16-21. We also met with officials from the Office of the DOD Chief Information Officer (CIO) and the Defense Digital Service to discuss the status of the department’s implementation of the OSS pilot program. We reviewed DOD’s June 8, 2018 report to Congress and its October 2018 memorandum that details the department’s plans to implement the pilot program and compared them to the six requirements. To determine the extent to which the pilot program had been implemented, we evaluated DOD’s efforts to address each of the requirements using a 3- stage gradient scale (implemented, partially implemented, and not implemented). The requirement was assessed to be fully implemented if DOD provided us with sufficient evidence that the requirement had been fully met. We assessed a requirement to be partially implemented if DOD provided us with documentation of initial plans or had initiated action towards implementing the requirement. We determined that a requirement was not implemented when DOD did not provide us with documentation of planned or initiated actions to implement the requirement. To address the second objective on views of various responsible DOD officials, using professional judgement, we selected components across the department responsible for the management and development of OSS. The scope of stakeholders selected represent department-wide nongeneralizable views including military components, defense agencies, and other offices. At least one representative was selected from the following components: (1) Office of the Under Secretary of Defense for Acquisition and Sustainment, (2) Office of the DOD CIO, (3) office of a military service CIO, (4) Military Service Software Center or Command Center, (5) the Defense Information Systems Agency, and (6) the Defense Advanced Research Projects Agency. We conducted interviews with DOD officials from the following entities: Office of the Under Secretary of Defense for Acquisition and Sustainment; Office of the DOD CIO; Offices of the Navy and Marine Corps CIOs; Office of the Air Force Chief Technology Officer; Army Communications Electronics Command; the Defense Information Systems Agency; the Defense Advanced Research Projects Agency; and the Office of the Assistant Secretary of the Air Force for Acquisition, Technology, and Logistics. In order to summarize and report the views of the responsible DOD officials, we conducted structured interviews with representatives from the selected components. Each interview consisted of the same discussion topics based on the pilot program requirements established in OMB’s memorandum. The scope of this objective represents individual thoughts, views, and opinions and is not intended to convey an official or department response. Prior to each interview, participants were provided with OSS discussion topics, and the OMB memorandum, titled the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (M-16-21, Aug. 8, 2016). The contents of each interview were reviewed and summarized to identify the general views of OSS and on the anticipated implementation of the pilot program requirements established in OMB’s memorandum. We noted similarities and differences in the responses provided by the officials in the use of OSS including, but not limited to, potential benefits of using OSS, managing associated risk, and opinions on implementing the pilot program in compliance with the OMB memorandum. Discussions were split into two topic areas: practices on the use of OSS, and OMB’s memorandum to establish an OSS pilot program. Specifically, the discussion topics were presented during each meeting as follows: Part I: Practices on the use of OSS Your experience or your organization’s history with the practice of using OSS as a means to achieve cost reduction or efficiencies when buying, building, or delivering information technology and software solutions. The processes or practices that you or your organization perform to leverage open source code for projects that require the acquisition or development of custom source code. The extent to which you or your organization shares or uses open source software. For example, do you share or use open source software: (1) within your organization only, (2) across the DOD with other military services or defense agencies, (3) with other federal agencies, or (4) outside the federal government with the public. Also, how is the source code shared, leveraged, catalogued, stored, and accessed. Policies or guidance currently in use for OSS. General views and opinions on the use of open source code. Part II: OMB’s Memorandum to Establish an OSS Pilot Program When and how you or your organization became aware of OMB’s memorandum on Federal Source Code Policy. Your opinions and views about the OMB memorandum. Any specific concerns or reservations about the requirements contained in the OMB memorandum. The extent to which you or your organization may already be performing the steps in OMB’s proposed Three-Step Software Solutions Analysis. Discuss the feasibility of the pilot program requirement to release at least 20 percent of new custom-developed code as OSS. We conducted this performance audit from August 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Eric Winter (Assistant Director), John Ortiz (Analyst-in-Charge), Rebecca Eyler, Franklin Jackson, and Kate Nielsen made key contributions to this report.", "summary": "Open source software is code that is released under a license which grants users the right to modify, share, and reuse the software. Making code available for reuse as open source can have major benefits such as decreasing costs and improving efficiencies. The National Defense Authorization Act for Fiscal Year 2018 required DOD to submit a plan to Congress for initiating the open source software pilot program established by OMB memorandum M-16-21. DOD submitted its plan to Congress in June 2018. The act includes a provision for GAO to report on DOD's implementation of the open source software pilot program. GAO's objectives were to (1) assess the extent to which DOD has implemented the open source software pilot program and other related requirements established by OMB; and (2) describe the views of responsible DOD officials on the use of open source software to achieve efficiency, transparency, and innovation at the department. To address these objectives, GAO compared DOD's plan for implementing the program to OMB's memo. GAO also interviewed defense officials at 11 DOD components including military departments, and defense agencies on their views about the benefits and risks of making code available as open source software. The Department of Defense (DOD) has not fully implemented an open source software pilot program and related Office of Management and Budget (OMB) requirements as mandated by the National Defense Authorization Act for Fiscal Year 2018. OMB memorandum M-16-21 calls for agencies to implement a pilot program, which it defines as (1) releasing at least 20 percent of new custom developed code as open source, and (2) establishing a metric for calculating program performance. However, DOD has not fully implemented the program and has not established the metric. The OMB memorandum also requires agencies to implement other supporting activities. These include issuing policy on government-wide use of code, conducting analyses of software solutions, securing data rights and inventory code, and facilitating the open source community. DOD has not implemented the policy requirement and has partially implemented the remaining three requirements. Regarding the policy and analysis requirements, DOD plans to issue a policy and conduct analyses by the end of the 2019 calendar year. If the department effectively implements these intended steps consistent with OMB direction, DOD should be able to fully address these requirements. For the requirement of securing data rights and inventorying code, DOD issued a memorandum that directs contracting officers to secure data rights and to identify all source code created after August 2016. However, DOD's components have not executed these activities nor has DOD identified a milestone for when they will be completed. For the facilitating community requirement, DOD issued a memorandum that encourages conversations to foster communities and allow others to contribute knowledge, among other initiatives. However, DOD has not fully engaged in open development, established a release schedule, or fully documented its source code to facilitate use and adoption. To address these areas, DOD's Chief Information Officer plans to issue guidance but has not established a milestone for doing so. Until DOD fully implements the pilot program and develops milestones for two of the four OMB requirements (secure data rights and inventory code, and facilitate community), it will not be positioned to satisfy the mandate established in the law. DOD officials from 11 components expressed their opinions that an open source pilot program would potentially result in financial benefits and increased efficiency. However, there were disparate views on how to manage the cybersecurity risk of using open source software. Specifically, officials from three components noted that security concerns could result in the sporadic use of OSS, whereas eight officials stated that the potential cybersecurity risks were managable. GAO is making four recommendations to ensure DOD implements the program and develops milestones for completing requirements in the OMB memo. DOD agreed with two but did not agree with one and partially agreed with another. As discussed in this report, GAO maintains that all recommendations are needed to satisfy the act.", "document_type": "gao"}
{"report": "TSA is the primary federal agency responsible for implementing and overseeing the security of the nation’s civil aviation system and, in general, is responsible for ensuring that all passengers and belongings transported by passenger aircraft to, from, within, or overflying the United States are adequately screened. Over 43,000 TSOs stationed across the nation’s approximately 440 commercial airports are responsible for inspecting individuals and belongings to deter and prevent passengers from bringing prohibited items on board an aircraft or into the airport sterile area. Within TSA, two offices—T&D and Security Operations—are to work together to manage TSOs and ensure their training is current and relevant. T&D is responsible for developing initial and ongoing training curricula for TSOs based in part on TSA’s standard operating procedures that govern how TSOs screen passengers and baggage. Security Operations is responsible for allocating TSO staff to airports, and scheduling TSO work hours and training availability. Within Security Operations, FSDs are responsible for overseeing security operations at the nation’s commercial airports, many overseeing multiple airports within a specific geographic area. FSDs report to one of three executive directors, who in turn are responsible for annually assessing FSD performance, including oversight of TSO training. TSA’s screener training is comprised of a compendium of courses that includes basic training for initial hires, recurrent training, remedial training, and return-to-duty training. The National Training Plan specifies annual training requirements and contains the core curriculum for TSOs, including the classes and hours required for TSOs to complete. In accordance with the Aviation and Transportation Security Act, screeners must complete a minimum of 40 hours of classroom instruction and 60 hours of on-the-job training, and must successfully complete an on-the- job training examination. Until 2016, new TSOs completed these training requirements at or near their home airports through the New Hire Training Program. In January 2016, TSA centralized this training under the TSO Basic Training Program at the TSA Academy in Glynco, Georgia. Further, in August 2018, TSA launched the first phases of TSO Career Progression, in which new hire screeners receive local training and gain experience in a limited number of screening functions before advancing to the next stage of training at the TSA Academy, roughly around the four-month mark. In 2015, in response to the DHS Office of Inspector General covert test findings that highlighted areas of concern in the passenger screening process, TSA implemented a TSO re-training effort, beginning with a nationwide training called “Mission Essentials—Threat Mitigation.” According to TSA, this training provided the opportunity for the TSO workforce to become familiar with the threat information that underlies TSA’s use of checkpoint technologies and operational procedures to mitigate risks. In 2009, OPM developed and published regulations that require agencies to evaluate training programs annually. According to the regulations, these training evaluations are to help agencies determine how well such plans and programs contribute to mission accomplishment and meet organizational performance goals. One commonly accepted training evaluation model, endorsed by OPM and commonly used in the federal government to evaluate training, is known as the Kirkpatrick model. The Kirkpatrick model consists of a four-level approach for soliciting feedback from training course participants and evaluating the impact the training had on individual development, among other things. The following describes what each level within the Kirkpatrick model is to accomplish: Level 1: The first level measures the training participants’ reaction to, and satisfaction with, the training program. A level 1 evaluation could take the form of a course survey that a participant fills out immediately after completing the training. Level 2: The second level measures the extent to which learning has occurred because of the training effort. A level 2 evaluation could take the form of a written exam that a participant takes during the course. Level 3: The third level measures how training affects changes in behavior on the job. Such an evaluation could take the form of a survey sent to participants several months after they have completed the training to follow up on the impact of the training on the job. Level 4: The fourth level measures the impact of the training program on the agency’s mission or organizational results. Such an evaluation could take the form of comparing operational data before, and after, a training modification. Since 2015, TSA’s T&D has developed and updated TSO training programs in response to findings from covert tests and reporting on emerging threats that identified risks to aviation security. T&D uses an online database to track results from covert tests and reporting on emerging threats, and any changes to training that T&D makes as a result. According to T&D data from May 2015 through June 2019, T&D officials reviewed 62 risks that warranted a review for a potential change to training, and 56 of the risks led officials to make training changes across its TSO curriculum. Overall, T&D made changes affecting 40 different training courses. Based on our review of TSO training curriculum from May 2015 through June 2019, we found that changes T&D made to its TSO training took many forms. In some cases, T&D changed training to place additional emphasis on a certain aspect of a current standard operating procedure or provide context on the importance of following it. For example, in 2019, T&D updated its instructor-led course—”Mission Essentials: Resolution Tools and Procedures”—to address covert tests where TSOs failed to detect simulated explosive devices hidden in bags or concealed on individuals at checkpoints. The training included a review of methods terrorists may use to plan and carry out attacks in order to emphasize the importance of following the standard operating procedure. The updated training also included leading practices for searching belongings and a discussion of issues that may affect a TSO’s ability to detect threat items hidden in belongings or on individuals. In fiscal year 2019, T&D also updated instructor-led courses on its explosives detection system for checked baggage to respond to covert test findings that TSOs failed to detect certain simulated explosive devices. The updated training included images of simulated explosives hidden in checked bags that replicated scenarios similar to the failed covert tests. In other cases, T&D developed TSO training in response to new or updated standard operating procedures for using technologies. T&D officials said that for this type of TSO training, they wait until TSA’s Requirements, Capabilities, and Analysis office updates or establishes new standard operating procedures for using new technologies and then develops training based on the revisions. For example, T&D developed TSO training to cover the differences between a prior and updated version of the standard operating procedure for screening passengers and belongings at security checkpoints. T&D included curriculum to cover the major changes in the standard operating procedure and incorporated additional training to address a covert test in which TSOs failed to detect a simulated explosive device at a screening checkpoint. T&D also developed training for TSOs who check passenger IDs and travel documents. The training focused on updates to the standard operating procedure and included procedures specific to the 2005 REAL ID Act, which TSA will fully implement in 2020. Additionally, T&D incorporated this new training to address covert tests that had found issues with identifying false or fraudulent travel documents. In addition to updating or developing new training involving instructor-led courses, TSA responded to identified risks by developing or updating job aids or briefings for TSOs. For example, TSA developed the “It’s Not the Container” briefing in 2017 to address risks highlighted by an attempted attack in Australia and included tactics used to conceal explosives in benign items. The briefing provided best practices for using screening technologies to identify concealed explosives, which aligns with current standard operating procedures. T&D also developed the “Electronics vs. Electrical Devices Job Aid”—covering how TSOs should handle the devices at checkpoints—which instructors circulated during classroom training and provided to TSOs at the screening checkpoints. TSA uses established models and processes for updating and evaluating TSO training, and these processes follow leading practices for training and evaluation development. TSA updates its trainings using a training development process that can be segmented into five broad, interrelated elements, and is typically referred to as the ADDIE model. The elements include (1) analysis, (2) design, (3) development, (4) implementation, and (5) evaluation. In our prior work, we have found that these five elements of the ADDIE model help to produce a strategic approach to federal agencies’ training and development efforts. See figure 1 for how T&D aligns its training development process with the ADDIE model. T&D’s guidance and our prior work on federal agency training development identify various leading practice attributes for developing training. Such attributes include that the training development process: (1) is formal and based on industry recognized standards; (2) provides the ability to update training based on changing conditions and, if necessary, quickly; (3) includes mechanisms to ensure programs provide training that addresses identified needs; (4) ensures measures of effectiveness are included in training program; (5) prevents duplication of effort and allows for consistent message; (6) allows for stakeholder feedback; (7) provides for continuous evaluation of effort; and (8) includes mechanisms to ensure training programs are evaluated. We found that T&D’s training development process incorporates all of the identified leading practice attributes, as shown in table 1. Two examples of TSA’s implementation of selected leading practice attributes are that T&D (1) has methods for updating training quickly, if needed, and (2) has mechanisms to ensure TSO training is evaluated. Specifically: Methods to quickly update training. In alignment with the leading practice that agencies should have a process to enable quick updates to training to respond to changing conditions, T&D has alternative processes to develop and deliver training to TSOs faster than the approximately 6 months its standard process takes to develop or revise training. For example, in 2018, T&D formalized a set of alternative processes to rapidly develop and deliver training to TSOs. One such alternative is for T&D to use its Rapid Response process, which allows for a response time to the field of 72 hours. Additional options include the Rapid Update/Revision or Rapid Development (Priority Training) processes to allow for a new training to be issued in approximately 30 days. T&D officials said that the rapid development processes are used when an issue, such as an emerging threat, requires a response in days or weeks. T&D’s guidance outlines situations when these processes are appropriate for use and provides checklists to help T&D personnel follow key steps. Mechanisms to help ensure evaluations of training effectiveness. T&D has mechanisms for ensuring it evaluates the effectiveness of its TSO training programs. In particular, T&D uses the Kirkpatrick model to evaluate its training and, according to its policy, all of its courses are to be evaluated at Level 1 of the model, which measures training participants’ reaction to, and satisfaction with, the training. T&D is also to plan course evaluations for each training during the curriculum development process, determine the formal review cycle, and include it in the curriculum development paperwork. According to its policy, T&D must complete a curriculum review at least once every 5 years, but may do so at shorter intervals. During the curriculum review, T&D examines the training to confirm the content is valid with respect to the applicable listing of tasks and competencies, current law, policy, procedures, and equipment. As a part of this process, T&D assesses participant evaluations to determine whether changes to TSO training are needed. As of October 2019, T&D’s efforts to evaluate new or updated TSO training made from May 2015 through June 2019 are in line with its policy. For example, T&D officials said they updated participant evaluations for TSO training they changed during this time period to address risks identified by covert testing and reports on emerging threats. These officials told us that they had not yet formally analyzed the results of the evaluations. This progress is in line with T&D policy, which requires a review of each training every 5 years. We verified this by obtaining evaluations T&D collected for the six selected sample courses we reviewed. T&D provided us level 1 survey responses it had collected that measure training participants’ reaction to, and satisfaction with, the training programs for four of the courses. T&D implemented the four courses from calendar years 2015 to 2019. Based on those dates and T&D policy, T&D should complete curriculum reviews for the courses between 2020 and 2024. TSA relies on a database that both field and headquarters staff use to monitor TSO training compliance. According to TSA policy, TSA documents and maintains the training status of all TSOs across approximately 440 commercial airports through its Online Learning Center database. Within the database, TSA records training completion in three ways: 1. TSOs self-certify they completed the training activity, such as reading 2. A training staff member at a commercial airport will record training completion on behalf of a TSO for instructor-led courses and on-the- job training; 3. The database automatically records completion for training actions, such as online training. After recording training completion, the database calculates the percentage of TSOs at a given airport who are on pace for completing their required annual training. According to TSA guidance, the agency has set its annual TSO target compliance rate at 90 percent per commercial airport. While TSA has guidance outlining roles and responsibilities for training oversight at a high level, TSA headquarters and field officials told us their processes for monitoring training compliance—including analyzing training compliance data, reporting their results, and taking action to address the results—were not documented. Below are descriptions of these roles and responsibilities at the field and headquarters levels, based on what officials from each level told us. TSA personnel in the field have various responsibilities for overseeing training compliance: FSDs. FSDs, who oversee operations at one or more airports, have the primary responsibility for ensuring that TSOs within the airports they oversee have fulfilled their training requirements. FSDs are assessed on training compliance among TSOs at their respective airports during their annual performance reviews. All seven FSDs we interviewed said they use the Online Learning Center database to verify that TSOs are on track for meeting their training requirements. Further, these FSDs said they meet regularly with their on-site training staff to discuss how training is going and whether TSOs are at risk of not meeting their training requirements. Executive Directors. Executive Directors oversee the FSDs who work within their respective portfolios and discuss training compliance with the FSDs during their annual performance review. To monitor FSDs’ efforts, Executive Directors also review data from TSA’s Online Learning Center database on TSO training compliance for airports within their area of responsibility. According to an Executive Director we spoke with, if an Executive Director notices that TSO training compliance rates for an airport whose FSD they oversee are lower than the 90 percent compliance target, he or she may reach out to the FSD to obtain information on the causes and discuss an action plan to improve training compliance. TSA personnel at headquarters also have various responsibilities for overseeing training compliance: T&D. T&D officials said that on a monthly basis they analyze TSO training compliance data from TSA’s Online Learning Center database to identify how TSOs nationwide are meeting requirements and whether there may be trends that indicate a need for changes to training during the fiscal year. For example, officials told us that in fiscal year 2019 they noticed that airports were generally behind in meeting annual training requirements and determined this was due to the effects of the federal government shutdown. In response, they stated they adjusted the duration of some training courses to shorten the amount of time it would take TSOs to complete the training within the remainder of the fiscal year. Security Operations. Security Operations tracks individual airport progress toward meeting TSA’s annual 90 percent compliance target. Security Operations officials said they receive and review monthly training compliance reports from T&D. They are responsible for analyzing the data to monitor whether airports are on pace toward meeting the annual TSO training compliance target. For example, TSA has set the required training completion pace goal at 8.3 percent per month for each commercial airport—-so that by maintaining the pace, by the end of the fiscal year, TSOs at each airport will have completed their required annual training. Officials told us that if they identify instances where an airport’s overall TSO training compliance rate for a given month is below this goal during the course of a fiscal year, they will reach out to the FSD responsible. They will provide the FSD a point of contact at a comparable airport with higher compliance rates to share best practices for addressing the issue. While TSA headquarters officials from Security Operations and T&D are responsible for analyzing and addressing TSO training compliance, they focus on monthly airport progress toward the 90 percent TSO training target, rather than annual changes in compliance rates. In particular, they do not look back at prior year airport compliance data to assess whether airports did not meet the compliance target across fiscal years, and whether they require corrective action at the headquarters level. However, we reviewed annual TSO training compliance data across fiscal years for each of the 435 commercial airports that reported data from fiscal years 2016 through 2018. We found that while all airports met TSA’s 90 percent training compliance target in fiscal years 2016 and 2017, the compliance rates for five airports dropped well below 90 percent in 2018. These five airports’ TSO compliance rates dropped 15 to 26 percentage points from their reported compliance rate in 2017. T&D and Security Operations headquarters officials said they were not aware that five airports had not met TSA’s TSO training compliance target in fiscal year 2018, nor the causes for it. Headquarters officials said that they did not identify this development because their focus is on monthly nationwide trends, rather than instances of noncompliance at individual airports across fiscal years, which field officials would be responsible for addressing. However, unlike headquarters officials, field officials do not have the visibility to identify if or when such noncompliance may be occurring across other commercial airports; and whether it may indicate a broader issue. For example, the five airports whose TSO compliance rates dropped significantly between fiscal years 2017 and 2018 varied by size and location. As a result, FSDs and Executive Directors would generally not have been aware that other airports experienced noncompliance or been in a position to determine whether the noncompliance was due to related reasons. Based on TSA’s process, TSA headquarters officials from T&D and Security Operations are best positioned to identify training compliance trends and their causes when they occur, as they have visibility into training compliance data across the agency in a way that field officials do not. Headquarters officials from T&D and Security Operations told us the field- level processes for overseeing training compliance are not documented because TSA has intentionally given field officials the flexibility to manage TSO workload and training to meet the individual needs of their airports. They said they did not document their processes at the headquarters level because they already understood what to do and were not required to document the analysis results. However, the headquarters officials said there may be a benefit to documenting the headquarters process to ensure consistency in how they carry out the process in the event of attrition. Standards for Internal Control in the Federal Government calls for agencies to develop and maintain documentation of their internal control system. This documentation allows management to retain organizational knowledge and communicate that knowledge to external parties. This documentation of controls is also evidence that controls are identified, can be communicated to those responsible for their performance, and can be monitored and evaluated by the entity. Moreover, internal control standards state that internal control monitoring should generally be designed to ensure that ongoing monitoring occurs in the course of normal operations to ensure that known weaknesses are resolved. By documenting its headquarters process for monitoring TSO training compliance—including its process for analyzing monthly training compliance data, the results of its analyses, and actions taken in response—TSA could better ensure its headquarters staff are aware of their responsibilities for overseeing TSO training compliance and consistently carry these responsibilities out as staff change over time. Additionally, by monitoring for instances of TSO noncompliance at individual airports across fiscal years in its analysis of training compliance data, TSA headquarters would be better positioned to determine whether they constitute a trend warranting corrective action at the headquarters level. TSOs’ ability to perform their duties effectively in screening passengers and their belongings is crucial to the security of the nation’s aviation system. While TSA has made updates to its TSO training programs to address risks identified in covert testing, additional actions could improve its processes for monitoring TSO training compliance so that the agency can identify and address any potential training issues. In particular, by documenting its process for monitoring TSO training compliance— including those for analyzing monthly training compliance data, reporting the results of its monitoring efforts, and taking action to address potential issues—TSA could help ensure that all of the various officials responsible for monitoring training compliance, including new staff over time, understand the process and can consistently implement it. Further, by monitoring for instances of airport TSO non-compliance across fiscal years in its analysis of training compliance data, TSA would be better positioned to ensure that it is aware of potential trends so it may determine whether corrective action at the headquarters level is warranted. We are making the following two recommendations to TSA: The TSA Administrator should direct T&D and Security Operations to document their processes for monitoring TSO training compliance— including those for analyzing training compliance data, reporting the results from their analysis, and actions taken to address the results. (Recommendation 1) The TSA Administrator should direct T&D and Security Operations to monitor for instances of TSO non-compliance by individual commercial airports across fiscal years that could potentially warrant corrective action at the headquarters level. (Recommendation 2) We provided a draft of our report to DHS for review and comment. In its comments, reproduced in appendix I, DHS concurred with both of our recommendations. DHS also provided technical comments, which we incorporated as appropriate. With respect to our first recommendation that TSA document its process for monitoring TSO training compliance, DHS stated that, among other things, Security Operations will collaborate with T&D to develop and maintain an internal control mechanism that will document responsibilities at the field and headquarters level for monitoring TSO training completion compliance, and actions taken to address the results. With respect to our second recommendation that TSA monitor for instances of TSO noncompliance by individual commercial airports across fiscal years, DHS stated that T&D and Security Operations will begin monitoring trends in non-compliance at individual airports and for specific courses. Further, T&D has developed an internal website to share its findings with Security Operations through monthly compliance reports. We are sending this report to the appropriate congressional committees and to the acting Secretary of Homeland Security. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Jason Berman (Assistant Director), Julia Vieweg (Analyst-in-Charge), Benjamin Crossley, Elizabeth Dretsch, Michael Dworman, Eric Hauswirth, Susan Hsu, Tom Lombardi, and Heidi Nielson made key contributions to this report.", "summary": "TSA is responsible for screening millions of airline passengers and their baggage each day at the nation's commercial airports for items that could threaten aircraft and passengers. In carrying out its mission, TSA requires its screener workforce to complete various trainings on screening procedures and technologies. TSA updated its security screening procedures and technologies in recent years to address risks identified through covert tests in 2015 and reports of emerging threats. The TSA Modernization Act of 2018 included a provision for GAO to examine the effectiveness of TSA's updated screener training. This report addresses: (1) changes TSA made to screener training since 2015; (2) how TSA updates and evaluates screener training; and (3) how TSA ensures screener compliance with training requirements. GAO analyzed TSA documentation on training development, compliance monitoring, and a non-generalizable sample of six recently updated training courses—selected to reflect a range of training types and topics. GAO also reviewed TSA data on airport screener training compliance rates from fiscal years 2016 through 2018, and interviewed TSA officials. Since 2015, the Department of Homeland Security's (DHS) Transportation Security Administration (TSA) developed and updated screener training to address potential risks to commercial airports identified through covert testing and reports on emerging threats. From May 2015 through June 2019, TSA identified 62 potential risks that warranted review for a potential change in training. TSA made training changes in response to 56 of the identified risks—affecting 40 different training courses. TSA also responded to risks by developing or updating job aids or briefings for screeners. TSA uses established models for developing, updating, and evaluating its screener training. The figure below shows TSA's process for updating and evaluating its screener training, in accordance with a training development model that is widely accepted and used across the federal government. TSA relies on an online database to monitor screener compliance in completing required training at the nation's commercial airports. However, TSA has not documented its process for monitoring screener training compliance, including for analyzing compliance data and reporting and addressing instances of noncompliance at airports. Moreover, while TSA monitors airport compliance rates in a given year, it does not analyze the data across fiscal years for potential trends in noncompliance by individual airports that may warrant corrective action at the headquarters level. GAO found that in fiscal years 2016 and 2017, screeners at 435 commercial airports met TSA's 90 percent target compliance rate, while in 2018, five airports had compliance rates well below this target, dropping 15 to 26 percentage points from the prior year. TSA officials stated they were unaware of this development. By documenting its screener training compliance monitoring process and monitoring screener training compliance data across fiscal years, TSA would be better positioned to ensure it is aware of potential noncompliance trends warranting corrective action at the headquarters level. GAO is making two recommendations, including that TSA (1) document its process for monitoring screener training compliance and (2) monitor screener compliance data across fiscal years. DHS concurred with the recommendations.", "document_type": "gao"}
{"report": "Federal agencies have varying roles in planning, approving, and implementing infrastructure projects, depending on their missions and authorities. Some federal agencies help fund or construct infrastructure projects, and others grant permits or licenses for activities on private or federal lands. Agencies that manage federal lands, such as the Bureau of Land Management, may construct infrastructure on lands they manage and must also approve projects on those lands. The circumstances under which federal agencies may need to consult with tribes will vary based on the agencies’ responsibilities for infrastructure projects as well as an infrastructure project’s potential effects on tribes’ land, treaty rights, or other resources or interests. Federal agencies are generally responsible for identifying relevant tribes that may be affected by proposed projects, notifying the tribes about the opportunity to consult, and then initiating consultation, as needed. One or more tribes located near or far from the proposed project site may have treaty rights within lands ceded in treaties or interests in lands with cultural or religious significance outside of lands ceded in treaties. Additionally, the Federal Permitting Improvement Steering Council— which was created to make the process for federal approval for certain (large) infrastructure projects more efficient—has issued two annual reports that identified best practices for, among other things, consulting with tribes. These best practices include: training staff on trust and treaty rights; providing clear information on proposals in a consistent and timely manner; holding consultations on lands convenient to tribes when possible; compensating tribes for consultant-like advice; and working to build strong, ongoing dialogue between tribal authorities and agency decision makers, among others. In 2017, Executive Order 13807 directed agencies to implement the techniques and strategies identified by the steering council as best practices, as appropriate. For purposes of this testimony, Native American cultural resources means Native American cultural items as defined by NAGPRA, archaeological resources that are remains of past activities by Native Americans, and historic properties to which Indian tribes attach cultural or religious significance. ARPA, NAGPRA, and section 106 of the NHPA are examples of federal laws that apply to Native American cultural resources. These laws and their implementing regulations contain many different provisions applicable to Native American cultural resources, including requirements for federal agencies to consult with Indian tribes in certain circumstances. ARPA and NAGPRA, among other things, prohibit trafficking of certain archaeological resources and Native American cultural items, respectively. In August 2018, we reported on federal laws that address the export, theft, and trafficking of Native American cultural items and any challenges in proving violations of these laws. That report included a discussion of ARPA and NAGPRA. In addition, we reported in August 2018 that ARPA and NAGPRA contain provisions prohibiting the removal of archaeological resources and Native American cultural items from certain lands unless certain conditions are met, including consultation with Indian tribes. Specifically, ARPA prohibits, among other things, the excavation or removal of archaeological resources from public or Indian lands without a permit from the federal agency with management authority over the land. If the federal agency determines that issuance of such a permit may result in harm to, or destruction of, any religious or cultural site, the agency must notify any Indian tribe which may consider the site as having religious or cultural importance and meet, upon request, with tribal officials to discuss their interests. NAGPRA prohibits the intentional removal from, or excavation of, Native American cultural items from federal or tribal lands unless an ARPA permit has been issued and other requirements are met. Specifically, regulations implementing NAGPRA require federal agency officials to take reasonable steps to determine whether a planned activity on federal lands may result in the excavation of human remains or other cultural items. Officials are also required to consult with certain tribes, including any tribe on whose aboriginal lands the planned activity will occur, about the planned activity. After consultation, the federal agency official must complete and follow a written plan of action that includes, among other things, the planned treatment, care, and disposition of human remains and other cultural items recovered. NAGPRA and its implementing regulations also include provisions regarding inadvertent discovery of Native American cultural items on federal and tribal lands. Specifically, the person making the discovery must notify the responsible federal agency or tribal official, stop any activity occurring in the area of the discovery, and make a reasonable effort to protect the human remains or other cultural item discovered. The NAGPRA regulations specify procedures for the agency and tribal officials to take after receiving a notification and when the activity that resulted in the inadvertent discovery can resume. In March 2019, we reported that under section 106 of the NHPA and its implementing regulations, federal agencies are required to consult with Indian tribes when agency “undertakings” may affect historic properties— including those to which tribes attach religious or cultural significance— prior to the approval of the expenditure of federal funds or issuance of any licenses. The implementing regulations require agencies to consult with Indian tribes for undertakings that occur on or affect historic properties on tribal lands or may affect historic properties to which Indian tribes attach religious or cultural significance, regardless of where the historic properties are located. In addition, these regulations establish the following four-step review process for federal agencies, with tribal consultation required for each step: (1) initiating the section 106 process, (2) identifying historic properties, (3) assessing adverse effects, and (4) resolving adverse effects. As we found in March 2019, tribes and selected federal agencies identified a number of factors that hinder effective consultation on infrastructure projects, based on our review of the comments submitted by 100 tribes to federal agencies in 2016 on tribal consultation and our interviews with officials from 57 tribes and 21 federal agencies. Tribes identified a variety of factors that hinder effective consultation. For the purposes of this testimony, we are highlighting those factors that more than 60 percent of the 100 tribes identified as concerns. For example: Agencies’ timing of consultation. Sixty-seven percent of tribes that provided comments to federal agencies in 2016 identified concerns with agencies initiating consultation late in project development stages; according to one tribal official we interviewed, late initiation of consultation limits opportunities for tribes to identify tribal resources near proposed project sites and influence project design. Agency consideration of tribal input. Agencies often do not adequately consider the tribal input they collect during tribal consultation when making decisions about proposed infrastructure projects, according to 62 percent of tribes that provided comments to federal agencies in 2016. Tribes’ comments included perceptions that agencies consult to “check a box” for procedural requirements rather than to inform agency decisions. Agency respect for tribal sovereignty or the government-to- government relationship. Other concerns were related to agencies’ level of respect for (1) tribal sovereignty or (2) the government-to- government relationship between the United States and federally recognized tribes, according to 73 percent of tribes that provided comments to federal agencies in 2016. Comments included concerns that some agency practices are inconsistent with this relationship. For example, tribes cited agencies limiting consultation to tribal participation in general public meetings and sending staff without decision-making authority to represent the U.S. government in consultation meetings. Agency accountability. Sixty-one percent of tribes that provided comments to federal agencies in 2016 raised concerns related to the extent of agencies’ accountability for tribal consultation, stating that some agencies or officials are not held accountable for consulting ineffectively or for not consulting with relevant tribes. For example, comments included concerns that tribes may not have appeal options short of litigation when they believe that federal officials did not adhere to consultation requirements. In addition, officials from 21 federal agencies included in our March 2019 report identified factors that they had experienced that limit effective consultation for infrastructure projects. For the purposes of this testimony, we are highlighting those factors that more than 60 percent of the 21 agencies identified as concerns. For example: Maintaining tribal contact information. Officials from 14 of 21 agencies (67 percent) cited difficulties obtaining and maintaining accurate contact information for tribes, which is needed to notify tribes of consultation opportunities. For example, ongoing changes or turnover in tribal leadership make it difficult to maintain updated tribal information, according to some agency officials we interviewed. Agency resources to support consultation. Officials from 13 of 21 agencies (62 percent) cited constraints on agency staff, financial resources, or both to support consultation. Officials from these agencies said that they have limited funding to support consultation activities, such as funding for their staff to travel to in-person consultation meetings for infrastructure projects. Agency workload. Officials from 13 of 21 agencies (62 percent) identified a demanding workload for consultation as a constraint, because of large numbers of tribes involved in consultation for a single project, high volumes of consultations, or lengthy consultations, among other reasons. Officials from some of these agencies said that it may be difficult to stay on project schedules when there are multiple tribes to consult with or multiple agencies involved. In March 2019, we also found that the 21 agencies in our review had taken some steps to facilitate tribal consultation, but the extent to which these steps had been taken varied by agency. For example: Developing information systems to help contact affected tribes. Eighteen agencies developed systems to help notify tribes of consultation opportunities, which generally include contact information for tribal leaders or other tribal officials. Three of these agencies also included information on tribes’ geographic areas of interest. For example, the Department of Housing and Urban Development developed a system that aims to identify over 500 tribes’ geographic areas of interest and includes their contact information. The Federal Permitting Improvement Steering Council identified developing a central federal database for tribal points of contact as a best practice. We recommended that the council should develop a plan to implement such a database and consider how it will involve tribes to help maintain the information, among other actions. Developing policies to communicate how they considered tribal input. Five agencies’ tribal consultation policies specify that agencies are to communicate with tribes on how tribal input was considered. For example, the Environmental Protection Agency’s policy directs the most senior agency official involved in a consultation to send a formal, written communication to the tribe to explain how the agency considered tribal input in its final decision. However, 16 agencies did not call for such communications in their policies. We recommended that these agencies update their tribal consultation policies to better communicate how tribal input was considered in agency decision- making. Addressing capacity gaps through training. Most of the 21 selected federal agencies have taken steps to facilitate tribal consultation for infrastructure projects by providing a range of training opportunities for staff involved in tribal consultation to help build agency officials’ knowledge of tribal consultation topics. For example, the U.S. Army Corps of Engineers coordinates an immersive, 4-day training, hosted by a tribe on the tribe’s land or reservation for agency staff and other participating agency officials, which focuses on cultural competency important for tribal consultation. Utilizing various approaches to address resource constraints. Some of the selected federal agencies used various approaches to help address resource constraints agencies and tribes may face when consulting on infrastructure projects, according to agency officials. For example, the Bureau of Land Management’s policies state that the agency may use its appropriated funds and designated accounts to reimburse tribal members’ travel expenses to attend meetings in connection with some consultations. The Nuclear Regulatory Commission collects fees from project applicants to cover agency costs related to consultation. In conclusion, effective consultation is a key tenet of the government-to- government relationship the United States has with Indian tribes, which is based on tribal sovereignty. Failure to consult, or to consult effectively, sows mistrust; risks exposing the United States to costly litigation; and may result in irrevocable damage to Native American cultural resources. In our March 2019 report, we made recommendations to 17 agencies to take steps to improve their tribal consultation practices, which agencies generally agreed with and in one case, have implemented. However, sustained congressional attention to these issues and the relevant factors impacting the effectiveness of agencies’ consultation efforts may help to minimize the negative impacts on tribes’ cultural resources, when relevant federal laws and regulations apply. Chairman Gallego, Ranking Member Cook, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information regarding this testimony, please contact Anna Maria Ortiz at (202) 512-3841 or ortiza@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement include Lisa Van Arsdale (Assistant Director), Brad Dobbins, Leslie Kaas Pollock, and Jeanette Soares. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal agencies are required in certain circumstances to consult with tribes on infrastructure projects and other activities—such as permitting natural gas pipelines—that may affect tribal natural and cultural resources. According to the National Congress of American Indians, federal consultation with tribes can help to minimize potential negative impacts of federal activities on tribes' cultural resources. The Secretary of Homeland Security has waived federal cultural resource laws that generally require federal agencies to consult with federally recognized tribes to ensure expeditious construction of barriers along the southern U.S. border. This testimony discusses examples of (1) federal laws and regulations that apply to Native American cultural resources and (2) factors that impact the effectiveness of federal agencies' tribal consultation efforts. It is based on reports GAO issued from July 2018 through November 2019 related to federal laws that apply to Native American cultural resources, tribal consultation for infrastructure projects, and border security. It also includes additional information about the consultation requirements in these cultural resource laws and regulations. Examples of federal laws and regulations that apply to Native American cultural resources include: The Native American Graves Protection and Repatriation Act (NAGPRA). In August 2018, GAO reported that NAGPRA prohibits the intentional removal from, or excavation of, Native American cultural items from federal or tribal lands unless a permit has been issued and other requirements are met. NAGPRA and its implementing regulations contain provisions to address both the intentional excavation and removal of Native American cultural items as well as their inadvertent discovery on federal and tribal lands. Section 106 of the National Historic Preservation Act (NHPA). In March 2019, GAO reported that section 106 of the NHPA and its implementing regulations require federal agencies to consult with Indian tribes when agency “undertakings” may affect historic properties—including those to which tribes attach religious or cultural significance—prior to the approval of the expenditure of federal funds or issuance of any licenses. In March 2019, GAO reported that tribes and selected federal agencies identified a number of factors that impact the effectiveness of consultation on infrastructure projects, based on GAO's review of the comments on consultation submitted by 100 tribes to federal agencies in 2016 and GAO's interviews with officials from 57 tribes and 21 federal agencies. Examples of these factors include: Agency consideration of tribal input . Sixty-two percent of the 100 tribes that provided comments to federal agencies in 2016 identified concerns that agencies often do not adequately consider the tribal input they collect during consultation when making decisions about proposed infrastructure projects. Maintaining tribal contact information . Officials from 67 percent of the 21 federal agencies in GAO's review cited difficulties obtaining and maintaining accurate contact information for tribes, which is needed to notify tribes of consultation opportunities. GAO also found that the 21 agencies in GAO's review had taken some steps to facilitate tribal consultation. For example: Eighteen agencies had developed systems to help notify tribes of consultation opportunities, including contact information for tribal leaders or other tribal officials. Five agencies' tribal consultation policies specify that agencies are to communicate with tribes on how tribal input was considered. GAO recommended in March 2019 that 17 federal agencies take steps to improve their tribal consultation practices. The agencies generally agreed and one agency has implemented the recommendation.", "document_type": "gao"}
{"report": "The military services preposition stocks ashore and afloat so that DOD is able to respond to multiple scenarios during the initial phases of an operation until the supply chain has been established. The military services maintain their own configurations and types of equipment and stocks to support their respective prepositioned stock programs: The Army stores sets of combat brigade equipment, supporting supplies, and other stocks at land sites in several countries and aboard ships. The Marine Corps stores equipment and supplies for its forces aboard ships stationed around the world and at land sites in Norway (see fig. 1). The Navy’s prepositioned stock program provides construction support, equipment for off-loading and transferring cargo from ships to shore, and expeditionary medical facilities to support the Marine Corps. The Air Force’s prepositioned stock programs include assets such as direct mission support equipment for fighter and strategic aircraft as well as base operating support equipment to provide force, infrastructure, and aircraft support during wartime and contingency operations. Prepositioned stocks are employed by the geographic combatant commanders, who have the authority to, among other things, organize and employ forces assigned to them as they deem necessary to accomplish assigned missions. DOD apportions the services’ prepositioned stocks among the geographic combatant commands according to joint guidance, and the afloat prepositioned stocks may be apportioned to more than one geographic combatant command. Requirements for prepositioned stocks are developed based on an approved operation plan. The services determine how best to meet the needs of the geographic combatant commanders, which may include the use of prepositioned stocks. Geographic combatant commanders periodically review their plans, assess the risk to those plans, and report the results to the Chairman of the Joint Chiefs of Staff. The approval of the Secretary of Defense is generally required to use the prepositioned stocks. DOD’s implementation plan for managing prepositioned stocks includes information that addresses three of the seven required elements enumerated in section 321 of the NDAA for Fiscal Year 2014. However, the plan, which is 5 pages in length, lacks the detail needed to fully address the remaining four required elements (see table 1). The Assistant Secretary of Defense for Logistics and Materiel Readiness approved the implementation plan on August 29, 2017, but an official from the Office of the Secretary of Defense told us that DOD did not formally issue the plan. As such, it does not bear a DOD seal, signature, or issuance number and most prepositioning service officials we spoke with were not aware of the plan’s existence. As shown in the table, DOD fully addressed three elements in section 321 of the NDAA for Fiscal Year 2014 by describing how the department will achieve its vision, desired end state, and goals, assigning roles and responsibilities, and including a schedule for the implementation of the plan. However, we assessed the remaining elements as partially addressed or not addressed because DOD did not provide the required information in its implementation plan. Specifically: Element two (comprehensive list of DOD’s prepositioned materiel and equipment programs, partially addressed). DOD’s implementation plan contains a list of the department’s prepositioned stock programs but that list omits one Army and eight Air Force prepositioned stock programs. In table 2, we compare the list of prepositioned stock programs that service officials provided to us with the list in DOD’s implementation plan. An official from the Office of the Secretary of Defense told us in April 2017 as part of a previous review that the department would not address this required element in the implementation plan because the department lists its prepositioned stock programs in its annual report to Congress. The implementation plan notes that DOD submits a comprehensive list of materiel to Congress each year per 10 U.S.C. §2229a. However, the annual report to Congress does not include a comprehensive list of the department’s prepositioned materiel and equipment programs. Rather, the annual report describes most of the department’s prepositioning programs but it omits one Army and six Air Force programs not listed in the implementation plan. Apart from the statutory requirement, Standards for Internal Control in the Federal Government state that management should communicate quality information externally so that external parties can help the entity achieve its goals and address risks. Without a comprehensive list of prepositioned materiel and equipment programs, DOD decision makers do not have all of the information they need to conduct effective oversight to assist the department in achieving its vision and goals. Element three (detailed description of how the plan will be implemented, partially addressed). The plan identifies policy, governance, and assessment initiatives through which the department aims to achieve its goals. However, the plan does not provide a detailed description of how the department will implement these three initiatives. Specifically, the plan states that DOD will identify policy gaps and revise or develop policy at all levels to better oversee prepositioned stocks; assigns the Under Secretary of Defense for Acquisition, Technology, and Logistics, the Chairman of the Joint Chiefs of Staff, and the services to review and revise the current prepositioning policies as appropriate; and tasks the geographic combatant commanders to ensure that theater campaign plans provide clear guidance for service prepositioned stock planning. However, the plan does not provide details on when geographic combatant commanders should finalize clear guidance for service prepositioned stock planning or describe what the guidance should include. The plan also states that DOD will use a governance body composed of the Under Secretary of Defense for Acquisition, Technology, and Logistics; the Chairman of the Joint Chiefs of Staff; the geographic combatant commanders; and the services to provide joint oversight of the prepositioned stock programs. However, the plan is unclear as to whether the Global Prepositioned Materiel Capabilities Working Group is the governance body. For example, the plan states that DOD’s joint oversight framework will include the Global Prepositioned Materiel Capabilities Working Group but also assigns the group to present capability shortfalls and gaps to a governance body and implement governance body decisions. Further, the plan states that DOD will use current systems of record and established metrics to evaluate performance and measure prepositioned stock status and capability. However, these are existing mechanisms to monitor the services’ programs and do not provide details on how the department will assess implementation of the plan itself. In 2017, a Joint Staff official told us that the implementation plan would be broad and high-level but would be more detailed than the DOD’s strategic policy. However, the plan’s descriptions of the implementation initiatives lack sufficient detail on what the department will do to implement the plan. Apart from the statutory requirement, Standards for Internal Control in the Federal Government establish that objectives should be defined in specific and measureable terms that clearly define what is to be achieved. Without sufficient detail, DOD risks being unable to fully support the emphasis and high priority that the 2018 National Defense Strategy gives to prepositioned stocks. Element six (description of the resources required to implement the plan, not addressed). DOD’s implementation plan does not describe the resources required to implement the plan. Rather, the plan states that prepositioning programs are resourced and managed by the services in support of combatant command operational and training requirements. In describing the joint oversight framework, the plan states that DOD will leverage the processes that already exist to resource prepositioning stock requirements including a focused effort on prepositioning as part of the annual planning, programming, budget and execution process, and the Joint Capabilities Integration Development System. Officials from the Office of the Under Secretary of Defense for Policy told us when they were developing the implementation plan that they understood this element as requiring information about the resources such as funding, personnel, and technology that would be needed to implement the plan. However, the plan does not include a description of the funding, personnel, or technology resources required to implement the plan. DOD officials reported that the services received $1.2 billion for prepositioned stocks in fiscal year 2018 and that the annual report to Congress also contains further information on the funding. However, this information does not describe the resources needed to implement DOD’s plan for prepositioned stocks as required by the NDAA for Fiscal Year 2014. Apart from the statutory requirement, Standards for Internal Control in the Federal Government establish that organizations should gather relevant operational and financial information for effective monitoring. Without a description of the resources required for implementation, decision makers do not have enough information to understand whether the department has sufficient resources to implement the plan. Element seven (description of how the plan will be reviewed and assessed to monitor progress, partially addressed). DOD’s implementation plan describes how the department will monitor the services’ prepositioned stock capabilities and readiness but does not describe how the department will review and assess the plan itself. The plan states that the department will use standard metrics contained in the readiness reporting systems of record to monitor prepositioning capability and readiness of the services’ programs. The plan assigns the services and combatant commands to assess prepositioned stock programs and posture annually and notes that all of the services are to begin reporting through the Defense Readiness Reporting System in the first quarter of fiscal year 2018. However, similar to element three, the plan does not fully address the mandated element in that it does not describe how the department will review or assess the plan as a tool toward achieving the stated vision and desired end state. The plan directs the Global Prepositioned Materiel Capabilities Working Group—which is responsible for providing oversight of prepositioned stock programs and resolving joint issues concerning prepositioned stocks—to assess actions to ensure desired results are achieved but does not describe how it is to do this. Apart from the statutory requirement, Standards for Internal Control in the Federal Government state that management should monitor its internal controls to determine their effectiveness and make modifications as necessary. Without reviewing and assessing the implementation plan, DOD will be unable to determine whether the current plan is helping the department progress toward its identified vision and desired end state for its prepositioned stock programs. DOD did not fully address the required elements in the implementation plan because, according to officials from the Office of the Secretary of Defense for Policy and the Joint Staff, implementation of the plan for managing prepositioned stock programs is the role of the services. According to these officials, DOD developed the implementation plan without details to allow the services to determine how to implement their respective prepositioning stock programs. Further, an official from the Under Secretary of Defense for Policy noted that DOD’s annual report to Congress on prepositioned stock programs contains some of the required information. However, as discussed earlier, we found that the annual report to Congress does not include all of the information to satisfy the required elements, such as a comprehensive list of the department’s prepositioned stock programs; and most service officials we spoke with were unaware of the plan. Moreover, section 321 of the NDAA for Fiscal Year 2014 required DOD to develop an implementation plan that contained all seven elements. Absent an implementation plan that fully addresses all of the elements required in the NDAA for Fiscal Year 2014 and aligns with internal control standards, DOD continues to provide incomplete information to Congress and stakeholders within the department on its prepositioned stock programs. In 2011, Congress began mandating DOD take steps to develop a joint strategy. Beginning in 2005 and subsequently in 2011, we reported that DOD lacked a joint oversight framework of the services’ programs. However, as shown in figure 2, DOD has made limited progress in addressing congressional requirements and our reporting recommendations related to joint oversight of prepositioned stock programs. DOD’s recent approach to joint oversight has been to update guidance and implement other related efforts. For example, over the past 2 years, the Office of the Secretary of Defense and the Joint Staff have updated existing documents and issued new policy documents, which each contain broad statements about the need for joint oversight of the services’ prepositioned stock programs: In December 2016, the Chairman of the Joint Chiefs of Staff updated its Logistics Planning Guidance for Prepositioned War Reserve Materiel. The document states that all service prepositioned stock programs require joint alignment with national priorities and global combatant command requirements across the full range of military operations. The instruction specifically directs the Joint Staff to develop a framework for joint oversight processes for synchronizing the services’ prepositioning strategies to minimize duplicative efforts and to maximize efficiencies and return on investment for prepositioned stocks. However, this document does not detail how the Joint Staff is to develop this framework and does not describe the elements that are to be included as a part of an effective approach for joint oversight. In March 2017, the Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics issued its Pre-Positioned War Reserve Materiel Strategic Policy. One of the purposes of the document is to establish joint oversight of the military services’ pre- positioning efforts to maximize efficiencies across DOD. The directive assigns the Chairman of the Joint Chiefs of Staff with the responsibility to develop a framework for synchronizing the services’ prepositioning strategies to minimize duplicative efforts and to maximize efficiency and return on investment across DOD. However, similar to the instruction above, this document does not detail how the Joint Staff is to develop this framework or describe the elements that are to be included as a part of an effective approach for joint oversight. In August 2017, the Assistant Secretary of Defense for Logistics and Materiel Readiness finalized DOD’s implementation plan for managing prepositioned stock programs, which we discuss earlier in this report. The plan calls for improved DOD guidance that builds a framework and establishes joint oversight to synchronize service prepositioned stock programs with DOD’s strategic guidance and priorities. The plan also calls for balancing service prepositioned stock programs to maximize effectiveness and efficiency while minimizing potential duplication across the department. However, in addition to the shortcomings of the plan that we discuss earlier in this report, the plan also does not provide a detailed discussion of what is needed to implement a department-wide framework for joint oversight. Further, although the plan states that clear policy is the foundation for joint oversight, the plan itself was not issued as formal guidance, and, as noted earlier, most prepositioning service officials we spoke with were not aware of the plan’s existence. DOD officials stated that they are continuing to update existing guidance as needed and that the services are responsible for implementing and managing their own prepositioned stock programs. DOD also provides Congress annual reports on the status of the services’ prepositioned stock programs. However, in June 2015, we reported that the annual report provided inconsistent information among the services’ programs using a nonstandardized definition of “prepositioned stocks” and that the annual report is not an effective tool for joint oversight. We recommended that DOD develop a standardized definition of “prepositioning” for its annual report that is consistent with the definition used in the department’s joint service guidance and apply this definition consistently to identify prepositioning materiel and equipment across DOD. DOD concurred with our recommendations. However, as of October 2018, DOD continued to use varying definitions of prepositioned stocks. A broad definition exists at the strategic level, but service-level definitions vary depending on what each service’s prepositioned stock needs are. For example, the Army’s definition of prepositioned stocks is based on the equipment and stocks required to meet the unique mission requirements of brigade combat team configurations. Within this definition, the Army includes equipment sets used for training units, but the other services do not. DOD officials stated that although there is a broad definition of prepositioned stocks, the services are responsible for managing their individual programs to include what equipment and stocks are a part of their respective programs based on their mission and needs. Further, in 2008, DOD directed the establishment of the Global Prepositioned Materiel Capabilities Working Group and assigned it responsibility for addressing joint issues concerning war reserve materiel requirements and positioning. According to DOD’s prepositioned stock implementation plan, the working group is DOD’s focused joint oversight framework effort to execute the following for prepositioned stock programs: analyze service and combatant commander input in the annual report identify potential opportunities to enhance efficiency and reduce operational risk, present capability shortfalls/gaps to a governance body for implement governance body decisions in coordination with the services and combatant commands, and assess actions to ensure desired results are achieved. According to DOD guidance, the Assistant Secretary of Defense for Sustainment and the Chairman of the Joint Chiefs of Staff appoint co- chairs for the working group, which will include members from the military services, the Defense Logistics Agency and the combatant commands and meet annually or more often, as needed. However, since 2011, our work has shown that DOD has been unable to ensure that the working group’s activities include the full range of the tasks the group was established to perform because the working group lacks clear oversight and reporting relationships to authoritative bodies within DOD. We recommended that DOD assess the continued relevance of the Global Prepositioned Materiel Capabilities Working Group’s assigned tasks, and DOD concurred. In September 2012, we reported that, according to DOD officials, the main responsibility of the working group had been to consolidate the services’ individual submissions on their prepositioned stock programs into DOD’s annual report for Congress, and that the working group had met only sporadically and had not yet addressed many of the duties specified in its charter. This continues to be the case. We found that, according to DOD officials, quarterly working group meetings were frequently postponed, attendance was not fully representative of all stakeholders, and the discussions during a September 2018 meeting we observed were primarily focused on gathering information from the services for preparations for the upcoming annual report to Congress and receiving service updates on the current status of their respective prepositioned stock programs. DOD has not fully implemented joint oversight of the services’ prepositioned stock programs because the department’s guidance lacks detail and the department has not fully implemented requirements within other intended joint oversight efforts, such as the working group. Instead, DOD’s approach has been for the services to manage their own respective programs with limited oversight at the department level. Standards for Internal Control in the Federal Government state that objectives should be defined in specific and measureable terms that clearly define what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. These standards also state that management should evaluate performance and hold individuals accountable for their internal control responsibilities. In addition, the NDAA for Fiscal Year 2014 mandates a framework for joint departmental oversight that reviews and synchronizes the military services’ prepositioned stock strategies to minimize potentially duplicative efforts and maximize efficiencies in prepositioned stocks across the DOD. Further, our prior work in the area of fragmentation, overlap, and duplication in the federal government has found that Congress and executive branch agencies have opportunities to contribute toward fiscal sustainability and act as stewards of federal resources. These include taking actions to reduce, eliminate, or better manage duplication, overlap, or fragmentation among federal agencies and programs; achieve cost savings; or enhance revenues. “Fragmentation” refers to those circumstances in which more than one organization within an agency is involved in the same broad area of national need and opportunities exist to improve service delivery. Without strengthening joint oversight across the department, DOD continues to have a fragmented approach to its management of prepositioning programs, which has led to inefficiencies. For example, according to Joint Staff officials, there is no uniform process by which the services are reporting the readiness of prepositioned stock assets. Joint Staff officials also said that having a joint oversight approach would help them have a more complete picture on the readiness of prepositioned stocks across the services and help the services in developing more consistent reporting methods. Service officials we interviewed have also noted that there may be duplication among DOD’s prepositioned stock programs resulting from limited joint oversight. For example, Navy officials stated that because each service utilizes medical assets as a part of its prepositioned stock programs, there is potential duplicative medical equipment across the services, which may result in inefficiencies. Finally, our ongoing classified work is finding a lack of joint oversight related to DOD’s management of prepositioned stocks in Europe. Although DOD’s current approach relies on the services managing their own prepositioned stock programs and Title 10 requires the services to train, man, and equip their forces, without fully implementing joint oversight—including providing more detailed information on how to implement such an approach in its guidance and reviewing its other efforts, such as the working group—DOD will continue to experience fragmented management of its prepositioned stock programs. Further, given the lack of progress DOD has made in the past several years, providing information to Congress on its efforts in this area could help hold the department to greater accountability. Prepositioned stocks play a pivotal role during the initial phases of an operation. We have reported for over a decade on the importance of DOD having a department-wide strategic policy and joint oversight of the services’ prepositioned stock programs, and Congress has required that DOD take action in this area. DOD issued guidance to include an implementation plan for managing prepositioned stock programs. However, the plan does not address all of the required elements enumerated in section 321 of the National Defense Authorization Act for Fiscal Year 2014, and DOD’s various guidance documents include broad direction for joint oversight. Without revising the implementation plan to have more complete information—including a full list of programs, a detailed description of how DOD will implement key initiatives, a description of the resources required, and an approach for monitoring and assessing the plan itself—the services will continue to operate their prepositioned stock programs with limited direction from DOD. Further, without fully implementing joint oversight, including providing more details in guidance and reviewing related efforts, and providing accountability to Congress on how the department will implement such oversight, DOD’s current fragmented management approach will continue to exist, which creates the potential for duplication and inefficiencies among the services’ prepositioned stock programs. We are making the following six recommendations to DOD: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, issue a more detailed implementation plan or include implementation plan details in identified formal department-wide guidance to include an updated list to provide quality information, including all of DOD’s prepositioned materiel and equipment programs. (Recommendation 1) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, issue a more detailed implementation plan or include implementation plan details in identified formal department-wide guidance to include a detailed description of how DOD will implement the three key initiatives in the plan—policy, governance, and assessment—including clearly identifying what is to be achieved in these areas. (Recommendation 2) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, issue a more detailed implementation plan or include implementation plan details in identified formal department-wide guidance to include a description of the resources (i.e., relevant operational and financial information) required to implement the plan including dollar and personnel amounts. (Recommendation 3) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, issue a more detailed implementation plan or include implementation plan details in identified formal department-wide guidance to include a description of how the department will review and assess the implementation plan for effectiveness. (Recommendation 4) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, take steps to fully implement joint oversight of DOD’s prepositioned stock programs, including providing detailed information on how to implement such an oversight approach in department guidance and reviewing other joint oversight efforts, in order to synchronize the military services’ preposition stock strategies to avoid fragmentation. (Recommendation 5) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in coordination with the Chairman of the Joint Chiefs of Staff, update Congress on the department’s progress in joint oversight management in the prepositioned stock annual report or in a separate report. (Recommendation 6) We provided a draft of this report to DOD for review and comment. In its comments, reproduced in appendix II, DOD concurred with each of the six recommendations and described planned actions it will take to implement them. We are providing copies of this report to the appropriate congressional committees; the Secretary of Defense; the Assistant Secretary of Defense for Sustainment; and the Chairman of the Joint Chiefs of Staff. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-5431 or russellc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the contact named above, individuals who made key contributions to this report include Alissa H. Czyz, Assistant Director; Vincent M. Buquicchio; Pamela Davidson; Mae Jones; Cody Knudsen; and Yong Song.", "summary": "The military services preposition stocks worth billions of dollars at strategic locations around the world to provide U.S. forces with critical assets before supply chains have been established. In the 2018 National Defense Strategy, DOD emphasized that prepositioned stocks provide key logistical support for the department's missions. For many years, GAO has identified the potential for duplication among the military services' prepositioned stock programs due to a fragmented management approach and limited joint oversight within DOD. In the NDAA for Fiscal Year 2014, Congress required DOD to develop an implementation plan to manage prepositioned stock programs. DOD finalized its plan in August 2017. The act included a provision for GAO to review the plan and report on related issues. GAO assessed the extent to which (1) DOD's implementation plan addresses mandated reporting elements and (2) DOD has made progress in implementing a joint oversight approach for managing the services' prepositioned stock programs. GAO compared the implementation plan and DOD's joint oversight approach with congressional requirements and federal standards for internal control and interviewed DOD officials. The Department of Defense's (DOD) implementation plan for managing the military services' prepositioned stock programs does not fully address four of the seven elements required by the National Defense Authorization Act (NDAA) for Fiscal Year 2014. For example, DOD's plan did not include all information required by the NDAA, such as a complete list of the services' programs, information on how DOD would pursue key initiatives, or the resources required to implement the plan. DOD officials told GAO that they developed a plan without detail to allow the services to determine for themselves how to implement their programs. However, absent an implementation plan that fully addresses NDAA requirements, DOD continues to provide incomplete information to Congress on the department's prepositioned stock programs. Since 2011 when Congress required DOD to take action and since 2005 when GAO first reported on the issue, DOD has not fully implemented a joint oversight approach for managing prepositioned stock programs (see figure). DOD's recent approach for implementing joint oversight has been to update guidance documents and develop other efforts, such as a working group, but the services continue to manage their programs with little joint oversight. Without taking steps to fully implement joint oversight, including providing detailed information on how to achieve this in guidance and reviewing other efforts, DOD's management will continue to be fragmented and it risks duplication and inefficiencies among the services' programs. Moreover, updating Congress on DOD's progress would help assure decision makers that DOD intends to follow their direction in establishing joint oversight of prepositioned stock programs. GAO is making six recommendations, including that DOD provide information required by the NDAA, fully implement joint oversight of prepositioned stock programs, and update Congress on progress made. DOD concurred with all of the recommendations.", "document_type": "gao"}
{"report": "In 2004, FEMA initiated the IPAWS program to integrate EAS and other public-alerting systems into a larger, more comprehensive public-alerting system. As shown in figure 1, IPAWS serves as a centralized gateway to deliver alerts to the public. After an alerting authority creates and sends an alert to IPAWS, the system then routes the alert to the public using one or more of the following pathways: Emergency Alert System. Allows authorized federal, state, territorial, tribal, and local government agencies to use EAS media platforms— including radio and television—to send alerts. IPAWS also allows the U.S. President to activate EAS to communicate to the public through all EAS media platforms during a national emergency. Wireless Emergency Alerts. Allows authorized federal, state, territorial, tribal, and local government agencies to send text-like messages to mobile devices in geographically selected areas as one-way cellular broadcasts. Various factors affect whether a WEA message will be received on a mobile device, such as whether the device is WEA-capable and within range of a cell tower where a participating wireless carrier provides WEA services to its customers. According to CTIA, a wireless industry association, more than 100 nationwide and regional wireless carriers participate and have the capability to provide WEA messages to 99 percent of American wireless subscribers. IPAWS alert feed for internet services. Allows internet companies authorized by FEMA—such as Google, Facebook, and The Weather Channel—to retrieve IPAWS alerts and distribute them to social media, websites, applications, and subscription services. Government agencies and industry organizations play different roles in providing, protecting, and leveraging the nation’s emergency alerting capability. FEMA. FEMA is responsible for operating, maintaining, and administering access to IPAWS, including managing the application process. As discussed earlier, public safety agencies that wish to use IPAWS must apply to FEMA to become approved alerting authorities. FEMA, in consultation and coordination with FCC, must carry out various actions to modernize and implement IPAWS. For example, FEMA must ensure IPAWS can send alerts to a specific geographic location and to multiple communications systems and technologies, educate government users of IPAWS and provide training opportunities to them, and conduct nationwide tests of IPAWS, among other things. Legislation was enacted that expands FEMA’s responsibilities for IPAWS. FCC. FCC creates the rules for EAS and WEA, the two primary alerting pathways authorities use to send public alerts through IPAWS. FCC establishes the technical standards, procedures, and testing protocols for EAS participants. FCC also manages an online system used to collect and analyze results of nationwide EAS tests. FCC establishes technical requirements participating wireless carriers must follow for delivering WEA messages to WEA-capable mobile devices. Federal alerting authorities. Authorized federal alerting authorities may create alerts and use IPAWS to send alerts to the public. For example, the National Weather Service (NWS), within NOAA, uses software NWS developed to issue WEAs for severe weather risks such as flash floods and tornadoes. USGS intends to send earthquake-related alerts through IPAWS but as of September 2019, had yet to send such an alert through IPAWS. USGS has partnered with Washington, Oregon, and California to test and implement a West Coast earthquake early warning system called “ShakeAlert” that is intended to send WEA messages to mobile devices several seconds after the initiation of an earthquake. State, territorial, tribal, and local alerting authorities. According to FEMA policy, state, territorial, tribal, and local government agencies first complete FEMA’s application process to gain access to IPAWS and obtain the proper authorization to issue alerts for specific geographic jurisdictions. As discussed earlier, government agencies that issue alerts through IPAWS can include emergency management or law enforcement agencies at the state, county, or city government level. Non-governmental organizations such as a local emergency management association may be granted an authority to issue alerts through IPAWS with approval from FEMA or an alerting authority. For information on FEMA’s IPAWS application process, see figure 2 below. Industry. Industry develops and owns the infrastructure that enables alerts to be created, authenticated, and delivered to the public. Alerting software companies provide software tools that allow alerting authorities to create and send alert messages via the internet to IPAWS. Alerting software companies also provide “opt-in” or subscription-based alerting services to public safety agencies that allow the public to sign up to receive alerts. EAS participants that transmit EAS messages include radio and television broadcasters, cable operators, wireline video service providers, satellite radio providers, and direct broadcast satellite providers. Wireless carriers operate wireless networks that allow alerting authorities to send one- way geographically targeted WEA messages to WEA-capable mobile devices. Manufacturers develop, test, and provide WEA-capable mobile devices, in coordination with participating wireless carriers, to consumers. Internet and web services companies may also distribute alert information from an IPAWS alert feed to internet applications, websites, or social media. We have previously reviewed FEMA’s progress in implementing IPAWS. In 2013, we found that FEMA had taken actions to improve the capabilities for IPAWS and to increase federal, state, and local capabilities to alert the public, but barriers remained to fully implement an integrated system. We made six recommendations, including that FEMA work with FCC to establish guidance for states to fully implement and test IPAWS components and implement a strategy for regular nationwide testing. The agencies implemented all of the report’s recommendations. Our analysis of FEMA data found 1,401 alerting authorities at the federal, state, local, territorial, and tribal levels had access to IPAWS to send alerts as of September 2019, a substantial increase from 2013 (soon after it became operational) when fewer than 100 authorities had access. According to FEMA officials, nearly 70 percent of the nation’s population is covered by a local alerting authority that can use IPAWS to send alerts. Further, according to FEMA documentation, from a state authority perspective, all 50 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands have at least one state-level authority that can use IPAWS to send alerts to any locality within that state or territory. Local authority access to IPAWS to send alerts varies, however, as FEMA officials stated that about two-thirds of the nation’s 3,000 counties do not have access to IPAWS to send alerts. Although access to IPAWS at the state level enables alerts to be sent, for example, to jurisdictions that may have lost their capability during an emergency, gaps in access to IPAWS for local officials could limit the timeliness of alerts as emergencies occur. For example, officials from an alerting authority told us that with the exception of alerts issued by NWS, all emergencies start locally. If a locality does not have access to issue an alert through IPAWS, information must be communicated from the locality to an authorized state official to issue the alert, which could result in delays in getting critical information to the public. Reasons for this gap at the local level could be related to a variety of factors. For example, some counties may still be in the process of applying for access. Other counties may not be able to gain access to IPAWS due to state or local laws, or a state’s EAS communications plan may specify that only certain types of agencies can issue alerts. For example, state EAS communications plans may authorize the governor of the state, an emergency management office, state law enforcement agency, or a non-governmental organization as the authorized agencies for sending alerts. In addition, an academic who specializes in rural emergency management told us that unfunded staff positions in emergency management are commonplace in rural areas and the areas may lack funding to apply for IPAWS access. Figure 3 highlights areas of the country that were covered by a local or tribal alerting authority as of September 2019. Alerting authorities at the state, territorial, and local levels have increasingly used WEA messages since 2012 (see fig. 4). In addition, these authorities used more WEA messages than EAS alerts each year, with a large difference occurring between 2017 to 2018, when WEA messages increased by 89 percent while EAS alerts increased by 35 percent. While usage of WEA and EAS by state, territorial, and local authorities has generally increased since 2012, our analysis of FEMA data found that this increase was driven by a small group of alerting authorities in certain parts of the country. Some locations may be more prone to experience certain types of emergencies, particularly weather related emergencies such as hurricanes. However, the potential exists in any location for an alert to be sent to the public if an alerting authority determines an imminent threat to public safety exists. Specifically, our analysis of WEA alert data from April 1, 2012 to October 1, 2019 found: A total of 236 of the 1,372 state, territorial, and local alerting authorities sent a WEA message. A total of 69 of the 1,372 state, territorial, and local alerting authorities accounted for nearly 80 percent of WEA messages sent at those levels. Most of the country has received a low number (fewer than 10) or no alerts sent by state, territorial, and local authorities, while limited parts of the country have received higher numbers of alerts (see fig. 5). At the federal level, our analysis of FEMA data found that NWS sends the vast majority of WEA messages sent through IPAWS, a number that from April 1, 2012 to October 1, 2019 totaled more than 46,000. The most common WEA messages sent by NWS were related to flash flooding (28,640), tornadoes (15,985), hurricanes (571), and dust storms (386). An academic we interviewed said it is important to note that local alerting authorities use the NWS warnings to issue alerts instructing the public to take specific protective actions, for example, to evacuate using certain roads. For more information on when a person may receive a WEA message on a WEA-capable mobile device through IPAWS, see appendix II. NWS uses multiple alerting mechanisms to send alert messages to people around the country. As one of its mechanisms, NWS uses the Integrated Public Alert and Warning System to send Wireless Emergency Alert messages to mobile devices in areas facing w eather risks, such as this geographically targeted message to a cell phone in Washington D.C. in July 2019. To test the capability and effectiveness of IPAWS, FEMA, FCC, NWS, and state and local public safety agencies have carried out nationwide and localized alert tests since 2016. Nationwide EAS Tests: FEMA, in coordination with FCC, conducted four annual nationwide EAS tests from 2016 to 2019. The tests assessed how well EAS alerts were received and retransmitted using the two ways an EAS alert can be delivered: (1) over the internet via IPAWS and (2) through the legacy “over the air” radio and television broadcast stations. According to FCC’s analysis, about 76 percent of an estimated 26,000 EAS participants took part in the 2018 test, with about 96 percent of participants reporting they received the test alert. While the vast majority of EAS participants reported no complications, FCC’s analysis identified some problems with the 2018 test, including EAS participants reporting audio quality issues (less than 2 percent), EAS equipment issues, out-of- date software, user error, and complications accessing IPAWS (less than 1 percent each). To help address such issues, FCC provided advisories in advance of the next nationwide EAS test. In addition, FEMA has publicly identified how FCC could improve future nationwide tests, including improving the accuracy of reporting and other audio and visual technical issues. FEMA officials said they are working with FCC to resolve technical issues found in recent tests. Nationwide WEA Tests: FEMA, in coordination with FCC, carried out the first nationwide WEA test in October 2018. FEMA sent a test alert through IPAWS to participating wireless carriers, which then transmitted the alert to their subscribers’ WEA-capable devices across the country. FEMA officials viewed the first nationwide WEA test as a success with regard to the technical execution of delivering a nationwide WEA message via IPAWS. However, officials acknowledged a main lesson from the test was a need to collect data on how effectively WEA messages are being received. While FCC collects EAS test data to assess how well the EAS test was received and retransmitted, a similar mechanism does not exist for the WEA pathway. According to wireless industry representatives we interviewed, the WEA system was designed to use a one-way broadcast cellular technology that prevents the wireless network from collecting data from mobile devices. Instead, FCC has used voluntary public responses, media reports, and informal surveys conducted by state and local public safety agencies to assess results. For example, FCC’s report on the 2018 WEA test found that media sources reported inconsistent WEA delivery in different parts of the country and that informal surveys conducted by state and local agencies showed variability in WEA delivery. FCC also reported that issues were found during the WEA test related to duplicate messages and audio and vibration cadence that could have affected individuals with disabilities. At the time of our review, FEMA officials said they were preparing to conduct the next nationwide WEA test in late 2020 and developing a survey to accompany the test to collect data on WEA message delivery. The District of Columbia Homeland Security and Emergency Management Agency used the Integrated Public Alert and Warning System to send a geographically targeted WEA test to mobile devices in Washington, D.C. in June 2019. owned cell phones received the test alert within a range of 6 seconds and several minutes. In May 2019, FCC rules initially went into effect that will allow alerting authorities to send WEA tests to the public without FCC approval—called State/Local WEA Test. Participating wireless carriers are required to provide the capability, but subscribers must manually opt-in to receive these alerts on their mobile devices. In November 2019, a major wireless carrier obtained a waiver from FCC to conduct two WEA tests under these rules to assess the carriers’ ability to perform enhanced geo- targeting for WEA messages. Officials from alerting authorities we contacted for seven case studies on the use of IPAWS cited benefits and limitations of using the system during recent disasters such as wildfires, a hurricane, a flood, an earthquake, a chemical fire, a power shortage, and a law enforcement event. Benefits. Officials from authorities we interviewed said that IPAWS has a wide reach because most people have mobile devices to receive WEA messages, and WEA can also reach visitors to their area. Compared with opt-in alerting systems that can have a low percentage of subscribers, officials from alerting authorities we interviewed said that IPAWS provides an opportunity to reach more people during emergencies. In addition, they said that states can act as back-ups for local authorities that have lost their alerting capabilities to help ensure that alerts can be sent. Our analysis found that state and local alerting authorities used IPAWS to send alerts regarding a variety of emergencies, examples of which are shown in table 1. Alerting authority officials also said they plan to use IPAWS in a variety of ways in the future, including for mudslides, rip currents, hazardous materials incidents, and law enforcement emergencies such as terrorism or active shootings. Limitations. Officials from alerting authorities we contacted cited three main limitations. First, they said it was difficult to write effective WEAs within the 90 character limit. For example, officials from an authority said that within the character limit it is difficult to explain the risk, who the alert is from, and what the public should do. As we discuss later, FCC has expanded the character limit. Second, officials expressed concerns about the ability to target WEAs to specific geographic areas, which caused some to lack confidence in the system or not use it at all. Third, officials from alerting authorities said that because WEA is a one-way communication system, they do not know if the alerts reached the intended public. For example, officials from one authority described sending an evacuation order but not knowing whether people in the intended area received it. In another example, while an alert was helpful in alerting the public about a suspicious package, officials from one authority said the alert was received 4 miles beyond its intended target, which led them to speculate about the number of people who received the alert. More information about the use of IPAWS during events we selected as case studies is provided in appendix III. FEMA has taken recent steps to modernize IPAWS by implementing various improvements and exploring new technologies. For example, FEMA is moving IPAWS to a cloud-based data center to enhance the system’s availability and is modernizing the stations that serve as the main broadcast source for national emergency alerts, according to FEMA’s 2018 performance report for IPAWS. In addition, officials described how FEMA has assisted with developing technical standards for new IPAWS capabilities and engaged the private sector to explore possibilities for integrating alerts into technologies such as digital billboards, Braille reader devices, and internet-connected devices in homes and vehicles. FCC has published rules that require participating carriers to implement new or improved capabilities for wireless alerts sent through IPAWS. Improved alert message content and capabilities. FCC required wireless carriers to support several capabilities to help alerting authorities communicate clearly and effectively, including the ability to send longer messages (expanding the limit from 90 to 360 characters) and the ability to send alerts in Spanish. Initially, FCC set a May 1, 2019, deadline for carriers to support all of these capabilities but later extended it to December 19, 2019, to allow time for carriers to complete testing with IPAWS. FEMA completed the necessary updates to support formal testing with the IPAWS gateway in mid- November 2019. Two academics we interviewed who have researched emergency alerting told us that alerts with expanded character length are more effective in prompting people to take protective actions, compared with shorter ones. Other new capabilities required include “alert prioritization,” meaning that alerts must be displayed as soon as they are received and a new “public safety message” category for advisories that prescribe one or more actions likely to save lives or safeguard property during an emergency (e.g., boil water notices, emergency shelter locations). As discussed earlier, a state/local WEA test option was also required to allow alerting authorities to send test messages to a subset of the public without prior approval from FCC. More precise geographic targeting. FCC required carriers to deliver alerts to areas that match the targeted geographic area, to within one- tenth of a mile, a capability that FCC calls enhanced geo-targeting. FCC initially required carriers to implement enhanced geo-targeting by November 30, 2019, but later extended it to December 19, 2019, to allow time for carriers to complete testing with IPAWS, as with the capabilities discussed above. FEMA completed the necessary updates to support formal testing with the IPAWS gateway in mid- November 2019. Previously carriers have been required to transmit alerts to the geographic area that best approximates the emergency area identified by the alerting authority. As FCC’s chairman has explained, these less precise geographic targeting capabilities can result in overbroad alerting, where people may receive the alert even though they are located well outside of the target area. Several local WEA tests in 2018 found overbroad alerting when targeting specific geographic locations. Officials from many alerting authorities we interviewed told us they are concerned about the inability to geographically target alerts with accuracy, which can make some reluctant to send WEA messages. According to several wireless and device industry representatives we interviewed and letters that wireless carriers have sent FCC, enhanced geo-targeting is a particularly challenging capability to implement because changes must also be made by different sectors of industry—such as manufacturers of cell phone handsets and chipsets. Some industry representatives also told us that only some, mostly newer model cell phones will be able to receive the more precise geo-targeted alerts and that many older devices currently in the population will not support this new capability because it requires a new chipset. Other recent improvements. FCC has also required implementation of new alert content and categories, such as: “Clickable” links—Embedded links in alerts so people receiving them can click on the link to see a photo of a suspect, for example. This capability has been implemented. Blue Alert—A new type of alert to notify the public of threats to law enforcement and to request help apprehending dangerous suspects. This capability has been implemented. 24-hour alert retrieval—Alerts must remain available on devices for 24 hours after receipt, or until the consumer chooses to delete them. FCC required carriers to implement this capability by November 30, 2019, and FEMA officials told us this capability did not require technical changes to the IPAWS gateway. Although FEMA and FCC are taking actions to improve alerting capabilities, developments in technology are changing the alerting landscape. Our analysis of agency documents and interviews with public- safety stakeholders indicated two emerging and unresolved areas. Multimedia. In 2018, an FCC advisory committee recommended that alerting systems should carry graphics and other multimedia. For example, four public-safety stakeholders told us it would be helpful to include multimedia (e.g., photos and maps) directly within WEA messages. Doing so would allow the public to see the information without clicking an embedded link. In 2015 and 2016, FCC sought comment on the technical feasibility of including multimedia and in 2018 issued another public notice on the topic to refresh the record. The proceeding remains open and FCC has not taken additional action. Internet streaming. The public may not receive broadcast EAS alerts when watching television that is streamed through an internet connection. A 2017 Pew Research Center survey found that 28 percent of American adults and 61 percent of adults age 18 to 29 said that streaming is their primary way of watching television. Representatives from two internet service providers told us they have developed solutions that enable customers to receive EAS alerts when the customers are using their applications to stream content. However, EAS alerts may not override other streaming services such as video and gaming because of technical limitations and the limited information that content service providers maintain about a user’s location, according to industry representatives. For example, representatives from an association representing internet companies told us that providing emergency alerts through internet streaming services presents technological challenges and that its members would have concerns about collecting locational information about their customers. The effect of potentially not receiving an EAS alert while streaming is unclear. While more Americans are streaming their television and multimedia, many use a second screen such as a cell phone while watching television and could receive any relevant alert as a WEA message. A 2018 Nielsen survey found that 45 percent of respondents very often or always use a second screen such as a smartphone while watching television. FCC has sought comment about this issue in general. FCC officials told us that extending EAS to new technologies for viewing video content raises legal and technical considerations and that they continue to evaluate the efficacy, costs, and benefits of doing so. Pursuant to statute, FCC is responsible for establishing technical standards and requirements for WEA, as discussed earlier. Further, FCC’s 2018–2022 strategic plan identified a performance goal to facilitate the effectiveness and reliability of EAS and WEA, and following a nationwide test in 2018 FCC’s Public Safety and Homeland Security Bureau recommended that additional measures be taken to improve the reliability and effectiveness of WEA. Developing goals and performance measures is consistent with leading practices for performance management. GPRA, as amended and expanded by GPRAMA, creates a framework for articulating goals and measures that can provide federal agencies with a clear direction for successful implementation of activities and improve the efficiency and accountability of agencies’ efforts. Goals explain the purpose and intended results that a program seeks to achieve in its work. Performance measures that are linked to goals allow a program to track the progress it is making toward achieving its goals. While GPRA and GPRAMA apply to the department or agency level, we have previously reported that their provisions can serve as leading practices at other organizational levels, such as component agencies, offices, programs, and projects. Additionally, federal internal control standards discuss the importance of goals, stating that management should define objectives clearly. This involves defining objectives in specific and measurable terms so that they can be easily understood and performance toward achieving those objectives can be assessed. Federal internal control standards also state that measurable objectives should be specific and stated in quantitative or qualitative form. FCC has required carriers to implement new WEA capabilities and taken steps to understand more about WEA performance, but FCC has not developed goals and performance measures to help monitor how well the new capabilities perform during emergencies. Instead, we found FCC has taken an ad-hoc approach to monitoring WEA performance. In particular, when we asked whether FCC planned to develop standards or benchmarks to measure WEA performance, FCC officials said they intend to use certain test results, as discussed below, to understand more about WEA performance. Partnered geo-targeting tests. FCC intends to partner with localities to test the accuracy of participating wireless providers’ enhanced geo- targeting capabilities starting in early 2020. Four localities have applied to participate as of November 2019, according to FCC officials. To perform each test, FCC and its partner at each given location intend to use online surveys to collect information on which individuals receive the test alert and under what circumstances. However, at the time of our review we found that while FCC has broadly identified the purpose of the tests as testing the accuracy of enhanced geo-targeting, it has not defined specific, measurable goals that are specific to this testing effort. For example, FCC has not stated what would be an appropriate success rate for enhanced geo- targeting accuracy. We also found that FCC has not connected its survey questions to specific performance measures that could be compared across test locations. According to FCC officials, FCC has not announced whether it will compare results across localities or use specific performance measures to assess geo-targeting performance. FCC officials said they have no plans to test other new WEA capabilities, including the expanded message length, and that at the time of our review it was too early to say how results from the partnered tests would be analyzed and shared more broadly with public-safety stakeholders. State and local tests. As discussed earlier, FCC officials told us that 39 alerting authorities at the state and local level received approval from FCC to conduct their own WEA tests as of November 2019. FCC officials also told us that that they encourage alerting authorities that seek approval for WEA tests to share performance data with FCC. According to FCC officials, FCC has received data from nine localities as of November 2019 and will use the test results internally to develop a broader understanding of WEA performance. When we asked what FCC has learned from the data, FCC officials said they have received some results but are still in the process of analyzing them. By developing goals and performance measures for its efforts to monitor the new WEA capabilities, FCC would have clearer direction for what it plans to achieve and more specific means to assess the performance of the capabilities. For example, performance measures related to FCC’s planned survey questions for geo-targeting could include the percentage of participants who received the alert and the percentage who received the alert within the target geographic area. Another performance measure for the new capabilities could include the extent to which messages of up to 360 characters are fully or partially displayed on a mobile device, or not at all, for example. Without specific goals and performance measures, FCC will have difficulty knowing if it is making progress toward its stated strategic goal of ensuring the effectiveness of WEA. The results of data collected on performance measures could provide assurance that new WEA capabilities are working as intended during emergencies, or could point to areas where performance is lacking and where FCC might need to take other actions such as working with industry to resolve issues, updating WEA requirements, or conducting additional analysis. Monitoring performance is all the more important because of uncertainty about the extent to which all cell phones will be able to receive WEA messages with the new capabilities. In addition, new capabilities have the potential to make WEA a more powerful tool and possibly further increase its use. Our analysis shows that WEA has outpaced the use of EAS as an alerting method, and according to the Pew Research Center, Americans are increasingly connected to digital devices, with 96 percent of American adults owning cell phones in 2019 and 81 percent owning smartphones. However, as discussed earlier, officials from many alerting authorities we interviewed had concerns with WEA performance. Many officials from alerting authorities told us that they were looking forward to the new capabilities— including enhanced geo-targeting and expanded message length—which will improve their ability to alert the public. Having specific performance information about the effectiveness of these capabilities could increase alerting authorities’ confidence in the system and help make these authorities more informed users of IPAWS. The IPAWS Modernization Act requires FEMA to instruct and educate federal, state, tribal, and local government officials in the use of IPAWS. FEMA has multiple efforts underway to educate and train alerting authorities about IPAWS. Training. Through FEMA’s Emergency Management Institute, FEMA offers training courses on IPAWS, including a mandatory course that IPAWS applicants must take before they can become authorized users of the system. FEMA is revising its training, according to FEMA officials, and they estimated that the new courses will be available midway through 2020. Online resources. On a regular basis, FEMA emails tips and conducts webinars, which are recorded and made available online. FEMA has developed a library of IPAWS resources, including a toolkit and fact sheets. FEMA also created an online collaboration group for IPAWS users to share information and best practices and plans to expand the capabilities of this group, according to FEMA. Testing environment. FEMA created a controlled testing environment called the IPAWS lab that alerting authorities can use to send test alerts and receive hands-on or remote assistance from FEMA staff. According to FEMA, demand for IPAWS lab support has increased, and FEMA hosted more than 200 sessions with IPAWS users in calendar year 2018. FEMA implemented a new requirement in October 2019 for all alerting authorities to send a monthly test alert using the IPAWS lab and upgraded the IPAWS lab environment to support the increased testing. In-person presentations. FEMA officials regularly present at public safety conferences and other events and use these opportunities to share information about IPAWS and encourage potential new users. FEMA has also assessed alerting authorities’ educational needs, but it has not fully addressed the recommendations it identified to support these needs or developed plans for ongoing assessments. In 2017 FEMA conducted an analysis—interviewing a sample of alerting authorities and assessing their responses to identify common challenges in using IPAWS. FEMA found that alerting authorities need more training and practice in using IPAWS and experience challenges with using their alerting software, among other things. Our interviews with selected alerting authorities and software providers revealed similar concerns, including that for some a lack of confidence is a potential barrier in using IPAWS. For example, representatives from two of the three alerting software providers we interviewed told us they have issued alerts through IPAWS at the request of their customers. According to these representatives, alerting authorities turn to their software providers as experienced users of the system because authorities have limited local staff, or if they cannot send an alert because of a technical reason. Four academics we interviewed said that FEMA should provide additional training for alerting authorities that is focused on drafting effective messages. Less than 20 percent of state, territorial, and local alerting authorities have sent WEA messages as of October 1, 2019. The limited use of IPAWS could lead to decreased proficiency or confidence. For example, an official from one alerting authority told us the jurisdiction did not use IPAWS at first because officials were not confident about using it. Our analysis of available information found that FEMA has addressed 4 of the 31 recommendations in its 2017 analysis. For example, FEMA revised its IPAWS training and added software requirements to its memorandum of agreement with alerting authorities. However, the extent to which FEMA has addressed other potentially useful recommendations is not clear because FEMA has not developed a plan to address the recommended actions. For example, one priority recommendation was to create skills checklists that provide a complete inventory of the types of skills alerting authorities need to use IPAWS. FEMA officials told us they had addressed many of the challenges identified in the 2017 analysis, including developing some timelines. However, FEMA did not provide documentation about how all the recommendations would be addressed. FEMA officials also told us they intend to periodically obtain information from alerting authorities about their needs and have begun another round of interviews with alerting authorities. However, these plans have not been documented. FEMA officials said they also use other methods to keep abreast of educational needs and challenges, such as attending conferences and reaching out to their contacts at emergency management associations that represent alerting authorities. In addition, alerting authorities send comments and feedback via email, according to FEMA officials. However, FEMA did not provide documentation about how it uses information obtained from these methods. As discussed earlier, FEMA is required by statute to educate federal, state, tribal, and local government officials. FEMA’s IPAWS strategic plan also includes a goal to make emergency alerting more effective, which as the plan explains, requires FEMA to engage non-federal alerting authorities to build competence and promote hands-on familiarity with IPAWS. The FEMA National Advisory Council has emphasized these points, recommending that FEMA improve alerting authorities’ ability to transmit effective alerts by developing and providing education, guidance, and best practices on how to use IPAWS as effective emergency messaging. Federal standards for internal control state that management should externally communicate necessary quality information. Open two-way external reporting lines allow for this communication. For example, management obtains quality information from external stakeholders—which in FEMA’s case would be information from alerting authorities—using established reporting lines. Additionally, federal internal control standards state that documentation provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. Documenting how FEMA plans to address key recommendations from its 2017 analysis could help guide its efforts to educate alerting authorities and hold it accountable for addressing identified needs. Without a documented plan, FEMA may not systematically implement each recommendation, which could result in alerting authorities continuing to struggle with known challenges. In addition, by continuing its analytical efforts and implementing a mechanism to regularly obtain and analyze alerting authorities’ needs, FEMA could learn if these needs are changing and develop educational efforts to address them. Taking such actions will help FEMA enhance alerting authorities’ proficiency with, and confidence in, using IPAWS. FEMA has identified increasing adoption of the system and assisting authorities in gaining access to IPAWS as strategic goals. In addition, in June 2019 the FEMA Administrator issued a “call to action” policy memorandum to FEMA’s regional offices to help improve IPAWS adoption at the local level. As described earlier, FEMA has taken various steps in recent years to increase the adoption of IPAWS, for example, by informing local public safety agencies about IPAWS at conferences and encouraging them to apply for access to the system. In addition, FEMA has developed resources that are available on the IPAWS website that describe the expectations and steps for how a public safety agency may apply to become an IPAWS alerting authority. The number of authorities completing an initial step in the application process to obtain access to IPAWS has increased in recent years from 52 applicants in 2017 to 104 applicants in 2018 and to 122 applicants from January 2019 to September 2019. However, while more agencies are starting the application process, our analysis of FEMA data found that 430 IPAWS applications were pending as of September 2019, some of which dated back to 2012. Our analysis found that 152 applicants, or about one-third of the 430 applications, began the process (initiated the memorandum of agreement process) from 2012 to 2016. In addition, some applicants had yet to complete the key initial steps in the process. For example, after completing the required IPAWS web-based training and procuring IPAWS compatible software, public safety agencies must return a signed memorandum of agreement to FEMA before the application can move forward. We found that FEMA sent a draft memorandum of agreement to 108 applicants between 2014 and 2017 that had not yet returned the agreement to the agency as of September 2019. This could indicate that several applicants may be stalled in the early stages of the process and may benefit from FEMA’s assistance in completing the application or answering questions. FEMA officials said that once a completed application is received, approving it should take about 30 days but that factors outside FEMA’s control can contribute to processing delays and thereby increase the number of pending applications. For example, FEMA officials said it is out of their control when applicants do not return signed memorandums of agreement because that step of the process is handled at the state and local level. Representatives from an IPAWS applicant we interviewed said the amount of time it took to receive approval from the state authority was one of the reasons that their application was delayed. Although delays involving certain applications may be out of FEMA’s control, FEMA may be able to help other applicants. However, FEMA provided no evidence that it had followed up with applicants, when it had last contacted them, or how follow up should be prioritized. FEMA officials said one employee serves as a primary lead for managing the entire application process, which would require a labor-intensive process of following up with hundreds of applicants. FEMA officials said that managing pending applications is a challenge for the IPAWS office due to resource constraints. To help address these constraints, in 2019, FEMA awarded a contract to begin developing a new tool with the goal of streamlining FEMA’s management of applications. Officials said they anticipate the tool, estimated to be available in early 2020, will help them better manage the pending applications and conduct outreach as well as move new applications through the process. In 2016 FEMA conducted a study of the IPAWS application process and highlighted certain factors that contributed to an increasing backlog and response time, including FEMA officials not knowing that a follow up task for an applicant was waiting to be addressed. The study further indicated that determining the next step was manual and often reactive. Officials also said that staff will be able to run an aging report on applications to help them prioritize follow-up efforts. However, the agency has not established procedures to prioritize and follow up with applicants. FEMA officials acknowledged that establishing procedures to prioritize and follow up on the in-process applications would be beneficial. While these applications are pending, people in areas that are not covered by IPAWS authorities may not receive critical alerts and warnings from local authorities through IPAWS. Effective emergency alerting is vital to helping save lives and property during natural disasters and other threats to public safety, highlighting the importance of IPAWS as a way to disseminate critical information. However, FCC lacks specific goals and performance measures and FEMA lacks plans and processes, which may contribute to decreased confidence in and use of IPAWS by alerting authorities. In particular, because FCC does not have specific goals and performance measures to monitor WEA improvements, FCC will have difficulty assuring that these improvements are working as intended during emergencies and identifying areas where performance is lacking, which could undermine authorities’ confidence in using IPAWS. In addition, because FEMA has not documented next steps or plans for educating alerting authorities and establishing a process to regularly assess their educational needs, some authorities may continue to lack proficiency and confidence in using IPAWS. Furthermore, absent a strategy to address the substantial number of pending IPAWS applications, FEMA’s efforts to increase IPAWS adoption and expand alerting coverage are hindered. We are making a total of three recommendations, including one to FCC and two to FEMA. Specifically: The Chairman of FCC should develop specific, measurable goals and performance measures for its efforts to monitor the performance of new WEA capabilities, such as enhanced geo-targeting and expanded alert message length. (Recommendation 1) The Director of the IPAWS program should document how it plans to address key actions needed to educate alerting authorities in their use of IPAWS and implement a mechanism that will allow FEMA to regularly and systematically obtain and analyze feedback on alerting authorities’ educational needs. (Recommendation 2) The Director of the IPAWS program should establish procedures to prioritize pending IPAWS applications and to follow up with applicants to address these applications. (Recommendation 3) We provided a draft of this report to FCC, the Departments of Homeland Security (FEMA), Commerce (NOAA), and the Interior (USGS) for review and comment. FCC and the Department of Homeland Security provided written comments, reprinted in appendixes IV and V respectively. FCC, FEMA, and NOAA provided technical comments, which we incorporated as appropriate. In its written comments, FCC stated that it agreed with us on the importance of gathering and assessing specific performance information about the effectiveness of WEA capabilities. Separately, FCC officials noted that FCC was taking steps to gather this data, which will help inform the development of metrics, as we recommended. In its written comments, DHS concurred with our two recommendations to FEMA and provided information about activities that FEMA would undertake to implement them. We are sending copies of this report to the appropriate congressional committees, Chairman of FCC, Secretaries of Homeland Security, Commerce, and the Interior, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or Vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report examines (1) the trends in how alerting authorities use and test IPAWS and their experiences using IPAWS, and (2) actions that FEMA and FCC have taken to modernize IPAWS and increase its adoption, and the challenges they face. For background information on emergency alerting, we identified key issues and federal roles and responsibilities by reviewing applicable laws and regulations, our prior work, and reports prepared by FEMA, FCC, the Department of Homeland Security’s (DHS) Office of Inspector General, the Congressional Research Service, and academics. We also identified recent trends regarding natural disasters and the use of digital devices and the internet that could affect the use and frequency of emergency alerting. To identify natural disaster trends, we reviewed our prior work, a 2018 report prepared by the U.S. Global Change Research Program, and information on wildfires prepared by the California Department of Forestry and Fire Protection. We identified trends about the use of digital devices and the internet by reviewing surveys conducted from 2017 to 2019 by the Pew Research Center and The Nielsen Company, which regularly conduct national surveys on those topics. We also reviewed proposed federal legislation on emergency alerting. To examine the use of IPAWS and selected alerting authorities’ experiences using IPAWS, we analyzed IPAWS access and usage throughout the country from 2012 to 2019. We focused on identifying the authorities that used IPAWS from 2017 to 2019 following the passage of the IPAWS Modernization Act of 2015 (enacted in 2016). We analyzed IPAWS testing by judgmentally selecting samples of authorities conducting tests. In our calculations of the number of alerts issued by state, territorial, tribal, and local authorities, we focused on alerts for disasters and threats to public safety and excluded test alerts and alerts for missing persons and child abductions. We reviewed FEMA’s processes for ensuring the completeness and reliability of these alerting data and determined that they were sufficiently reliable for the purposes of examining trends in the use of emergency alerts. We also reviewed reports by FCC and local authorities on EAS and WEA test results. To obtain information on alerting authorities’ experiences using IPAWS, we conducted seven case studies of emergency events. To select them, we analyzed alerts that local authorities issued through IPAWS, FEMA’s list of federally declared disasters from 2017 to 2019, NOAA’s list of billion dollar disasters from 2017 to 2019, and our prior work on natural disaster preparedness and recovery from 2017 to 2019; considered recommendations from stakeholders; conducted internet searches; and reviewed news reports. We selected these case studies to include various areas of the country that experienced different types of disasters and threats to public safety during this time. These included natural disasters (wildfires and an earthquake), weather events (a hurricane and a flood), manmade disasters (a chemical fire and a power shortage), and a law enforcement event (a suspicious package). We then interviewed local alerting authorities in those areas. As a test case study, we interviewed District of Columbia emergency management officials. We conducted site visits with state and local emergency management officials in Los Angeles and Ventura, California; Bristol, Panama City, and Tallahassee, Florida; and Washington, D.C. To examine the actions that FEMA and FCC have taken to modernize IPAWS and increase its adoption, and the challenges they face, we reviewed FEMA documents such as IPAWS strategic plans and a performance report; FCC regulations, notices, and comments on FCC proposed rulemakings regarding EAS and WEA; and assessed the information against statutory requirements contained in the IPAWS Modernization Act and federal internal control standards. We focused on four areas of the Act that were key in the implementation of the program. These areas required FEMA, in consultation and coordination with FCC, to: ensure that IPAWS is capable of distributing alerts on the basis of geographic location, risks, and technologies; educate state, tribal, and local governments to understand how IPAWS works, and how and when to use IPAWS; establish training opportunities for alerting authorities; and conduct nationwide tests of IPAWS alerts. We compared FCC’s actions to leading practices based on the Government Performance and Results Act of 1993 (GPRA) as enhanced by the GPRA Modernization Act of 2010 (GPRAMA), which create a framework of goal setting and performance management for federal agencies. While GPRA and GPRAMA apply to the department or agency level, we have previously reported that their provisions can serve as leading practices at other organizational levels, such as component agencies, offices, programs, and projects. We also reviewed recommendations in reports prepared by the FEMA National Advisory Council IPAWS Subcommittee and FCC’s Communications Security, Reliability, and Interoperability Council, and disaster after-action reports prepared by FEMA and state and local governments. As an additional step in assessing the challenges that FEMA faces in increasing IPAWS adoption, we analyzed FEMA’s pending IPAWS applications as of September 2019 to determine which steps in the application and approval process had been completed and how long the applications were in process. We also interviewed four selected IPAWS applicants to obtain their views on the application process. To obtain a variety of perspectives, we selected applicants that were different types of organizations (an airport, a university, a local government, and a federal agency) in different areas of the country. In addition, for both objectives, we interviewed officials from FEMA, FCC, NOAA, USGS, and 18 state, local and territorial alerting authorities; representatives from 4 industry associations, 2 advocacy groups, and 15 companies, including wireless carriers, internet service providers, internet content providers, IPAWS software providers, and mobile device manufacturers; and 7 academics. To obtain a variety of perspectives, we selected industry associations and companies that represented different telecommunications industry sectors and have different roles in emergency alerting (broadcasting, cable, wireless, internet service, and application developers) and academics with different areas of expertise (public health, engineering, natural hazards, disaster preparedness, rural emergency management, and communication). We also interviewed staff from a county board that oversees emergency management activities in that jurisdiction and officials from a city that is planning to apply for IPAWS access. The results of these interviews are not generalizable to all stakeholders, but provide insight on the use of IPAWS and related emergency alerting issues. Our interviewees are listed in table 2 below. Selected Alert Sent by the Florida Division of Emergency Management for Bay County during Hurricane Michael: October 10, 2018: GOVERNOR EVAC ALERT 6 to 13 FT STORM SURGE EXPECTED IN BAY COUNTY Zones A,B,C EVACUATE NOW Selected alerts sent by Bay County Emergency Services during Hurricane Michael: October 10, 2018: Dangerous w inds are beginning to occur in Bay County Shelter in place now October 15, 2018: Bay County remains under a boil w ater notice. Please boil or use bottled w ater for consumption. October 15, 2018: FOOD AND OR WATER ARE AVAILABLE NORTH OF 15th AND CR 386 AT 1011 CR 386 SOUTH Bay County officials said the county lost its ability to issue alerts at this point. Hurricane Michael, October 2018: Hurricane Michael was a category 5 storm that NWS reported made a catastrophic landfall near Mexico Beach and Tyndall Air Force Base, Florida, producing devastating winds and storm surge near the coast, and rain and wind inland (see fig. 6). According to a State of Florida report, Hurricane Michael was the most powerful storm to hit the Panhandle region and the third most intense storm to make landfall in the mainland United States in recorded history. During the storm, several counties could not send alerts because of power outages and inoperable cellular towers. Officials from an alerting authority we interviewed in Florida commended the state’s ability to send IPAWS alerts on behalf of the county, which had lost its communications capabilities during the storm. Authorities also said IPAWS provides an ability to warn the public about approaching hurricanes and share critical lifesaving information such as the location of food, water, and shelter. However, authorities expressed frustration about the inability to accurately geo-target WEA messages to evacuation zones and about how the WEA text character limit forced them to issue multiple WEA messages regarding the same alert. Some officials said they were frustrated when certain local EAS alerts were not delivered by broadcasters, which could prevent some people from receiving them. Alert issued by the California Governor’s Office of Emergency Services: Dec. 6, 2017: Strong w inds over night creating extreme fire danger. Stay alert. Listen to authorities. Alert issued by the Ventura County Sheriff’s Office – Office of Emergency Services: Dec. 7, 2017: VENTURA COUNTY-FAST MOVING BRUSH FIRE NORTH OF OJAI.GO TO READYVENTURACOUNTY.ORG FOR INFO Selected alerts issued by the City of Los Angeles: Dec. 6, 2017: For information regarding the Skirball Fire in Los Angeles please go to Tw itter.com/LAFD Nov. 9, 2018: MANDATORY EVACUATION in West Hills: W of Valley Circle, N to Roscoe Blvd, S to Vanowen. Selected alert issued by Santa Barbara County: Dec. 16, 2017: EVAC ORDER: SB City: east of Hw y 154 to Mission Canyon Rd and north of 192. Leave now . Southern California Wildfires, December 2017 and November 2018: The southern California area experienced large wildfires in recent years, including the Thomas fire in December 2017 and the Woolsey fire in November 2018 (see fig. 7). The California Department of Forestry and Fire Protection reported in August 2019 that the Thomas fire, which affected Santa Barbara and Ventura Counties, was the second-largest wildfire in the state’s history and destroyed more than 1,000 structures. The Woolsey fire, which affected Los Angeles and Ventura Counties, had a footprint over 150 square miles and resulted in the evacuation of about a quarter-million people. According to Los Angeles County, the Woolsey fire was the most destructive fire in the county’s history. California officials we interviewed said IPAWS is an effective tool for wildfire evacuations and that because most people have cell phones, they do not have to subscribe to receive WEA messages. Officials also praised the capability of IPAWS to allow a state alerting authority to send alerts to at-risk counties ahead of potential wildfires. However, officials said it is a challenge to know when and where other alerting authorities in the area are sending alerts and that there may be little time. For example, an official told us that the Thomas fire moved at 60 miles per hour. Officials also said that even though WEA messages were targeted to an area during the fires, they did not know whether people received them because geo-targeting was not precise and because cell towers may have been damaged. Alerts issued by the New York City Emergency Management Department on Oct. 24, 2018: Police Activity: Residents on W 58th St btw Columbus & 8th Av shelter in place immediately The suspicious device on W 58 St & 8th Ave w as safely removed by NYPD Bomb Squad. Suspicious Package in New York City, October 24, 2018: On October 24, 2018, the New York City Emergency Management Department issued a WEA shelter-in-place order regarding a suspicious package at the Time Warner Center in Manhattan that was found to contain an improvised explosive device (see fig. 8). According to officials, police removed the device and determined it was no longer a threat. About an hour after the initial alert was issued, the city issued another WEA canceling the shelter- in-place alert. New York City officials said IPAWS is the city’s most effective alert and warning tool, compared with its own alerting system to which about 9 percent of the population has subscribed. Regarding the suspicious package, authorities were able to draw an alerting area covering a 3 to 4 block radius. The officials also said that WEA messages were instrumental in helping to capture a suspect in a bombing incident in the city’s Chelsea neighborhood in 2016. However, officials said the October 2018 alert was received as far as 4 miles from the targeted area, which led them to speculate about the number of people who received the alert. Officials also said they would like IPAWS to incorporate more languages for use in alerts and provide them with the ability to use photographs or maps in future alerts. Alerts issued by the Douglas County Emergency Management Agency: March 14, 2019: From Douglas County Sheriffs Office. Record flooding on Elkhorn River. Evacuate Now . March 15, 2019: From Douglas County Sheriff: Evacuate City of Valley NOW. Use Q Street. Hw y 275 closed. Alert Issued by Platte County Emergency Management: March 14, 2019: Travel is not advised in and around Columbus and Platte County due to extensive flooding. Flood in Nebraska, March 2019: In March 2019, Nebraska experienced one of the most devastating floods in recent history, according to the state government (see fig. 9). We interviewed officials in Douglas County and Platte County, areas that experienced torrential rain and flooding. One county sent a geo-targeted WEA evacuation alert to people living near a river while the other county sent a WEA advising the public to not travel within the county. A county official in Nebraska said that if the planned future enhancements to WEA take place and are found to be successful, WEA will ultimately be of greater value than other means of notification such as the county’s previous subscription system, which had a low participation rate. The official stressed the difficulty in explaining the threat, the source of the alert, and a protective action within the 90 character WEA limit. The official also noted that some local broadcasters were not equipped to recognize an EAS law enforcement alert for further transmission. An official in another county said that some people did not receive the WEA messages. Power shortage in Michigan, January 2019: On January 30, 2019, Consumers Energy, a primary energy supplier in Michigan, experienced a fire at a natural gas storage facility at a time when there was high energy demand because of extreme cold temperatures (see fig. 10). According to NWS, Michigan’s Lower Peninsula experienced the lowest temperatures in decades—down to minus 20 degrees with wind chills of down to minus 40 degrees. As a result, the state’s Emergency Operations Center asked the Michigan State Police, an IPAWS alerting authority, to issue WEA and EAS alerts asking people to lower their thermostats to conserve natural gas. Michigan State Police officials said that IPAWS allowed the alerting authority to send a WEA message to 68 counties, which was an effective and quick way to reach many people. However, officials said they attempted to send an EAS alert to all 68 counties in Michigan’s Lower Peninsula but were limited to a total of 31 counties per alert, per FCC regulations. They said that after the EAS alert was sent, the actual EAS broadcast message was not displayed on television because the entire list of the 31 county names, which must be read first according to FCC regulations, took up the allowable 2-minute time span for an EAS broadcast. Alerts issued by the City of Houston on Sept. 20, 2017: Shelter in Place in northw est Spring Branch due to hazardous fire. Check local media. Shelter in place is CANCELLED for Northw est Spring Branch after hazardous fire. Chemical Fire in Houston, Texas, September 20, 2017: The Houston Fire Department requested that the Houston Office of Emergency Management issue a WEA shelter-in-place order following a chemical fire at a bearing supply company that resulted in the release of potentially hazardous smoke (see fig. 11). Houston officials said they believe that IPAWS allowed the alerting authority to reach a broad area at risk using the WEA message. However, officials said it is possible that a lack of training on behalf of the alerting authority, among other things, limited their ability to issue the alert in a timely fashion. They said it took the alerting authority 43 minutes and multiple attempts to properly prepare and send the message using its IPAWS-compatible software before the message was successfully sent to the public. Earthquake in Alaska, November 30, 2018: A magnitude 7.0 earthquake struck north of Anchorage, Alaska, on November 30, 2018 (see fig. 12). We interviewed officials from three local governments that were affected by the earthquake. Officials at one borough said they did not issue an IPAWS alert because the earthquake had a short intensity and they did not receive reports of fatalities or widespread damage. However, the officials said that if the earthquake’s intensity had been greater, they would have issued used IPAWS to alert people about shelter locations. NWS used IPAWS to issue a tsunami warning but local officials did not issue any alerts through IPAWS. Officials in Alaska said that it is helpful that another government agency can be a backup alerting authority and provide alerts through IPAWS on behalf of the local government. However, an official said the inability to precisely geo-target alerts about tsunami risks to coastal areas prevented the official from sending out an alert due to concerns that people who were not affected by the earthquake would receive the alert. Another official said the cost of procuring alerting software that is compatible with IPAWS may be a challenge for some local governments. In addition to the individual named above, Sally Moino (Assistant Director); Michael Sweet (Analyst in Charge); David Aja; Melissa Bodeau; Mark Goldstein; Bob Homan; Kate Perl; Cheryl Peterson; Sam Portnow; Malika Rice; and Andrew Stavisky made key contributions to this report.", "summary": "Public alerts and warnings are critical to protect lives and provide information during emergencies, such as wildfires and floods. The IPAWS Modernization Act, enacted in 2016, required FEMA, in consultation and coordination with FCC, to enhance and test the capabilities of IPAWS and increase its adoption among state and local public safety agencies. GAO was asked to review the federal response to recent natural disasters. This report examines, among other things: (1) trends in the use of IPAWS and (2) actions that FEMA and FCC have taken to modernize IPAWS and increase its adoption. GAO analyzed relevant data and documentation and assessed FCC's efforts against leading government performance management practices and FEMA and FCC's efforts against internal control standards. GAO interviewed federal officials involved in emergency alerting. GAO also interviewed a non-generalizable selection of IPAWS alerting authorities and applicants, local governments, public safety and industry associations, and communications companies. GAO selected alerting authorities that experienced different types of disasters and threats to public safety from 2017 to 2019. Use of the Integrated Public Alert and Warning System (IPAWS) has increased since its launch in 2012. IPAWS enables authorized federal, state, territorial, tribal, and local alerting authorities to send a Wireless Emergency Alert (WEA) to mobile devices, such as cell phones and an Emergency Alert System (EAS) alert to media platforms, such as radios and television. The Federal Emergency Management Agency (FEMA) operates IPAWS and the Federal Communications Commission (FCC) establishes rules for telecommunications providers to deliver WEA and EAS alerts. A public safety agency must submit an application and receive approval from FEMA to become an IPAWS alerting authority. In September 2019, more than 1,400 alerting authorities had access to IPAWS, up from fewer than 100 authorities in 2013. All states have at least one state alerting authority, but gaps in local authority access remain (see figure) that could limit the timeliness of alerts as emergencies occur at the local level. GAO found 430 pending IPAWS applications as of September 2019, some of which dated back to 2012. FEMA has not established procedures to prioritize and follow up with applicants and FEMA officials acknowledged that doing so would be beneficial. FEMA and FCC have taken steps to modernize IPAWS and improve alerting. For example, FEMA has made system upgrades and FCC has made various WEA improvements, such as requiring wireless phone carriers to provide more precise geographic targeting of alerts. Prior to these improvements, officials from many alerting authorities said the inability to geographically target alerts with accuracy made the officials reluctant to send WEA messages. FCC intends to partner with certain localities to test geographic targeting and, according to FCC officials, plans to use other tests to learn about how the improvements perform during emergencies. However, FCC has not developed goals and performance measures for these efforts. Doing so would help FCC more clearly assess whether the WEA improvements are working as intended. Furthermore, having specific performance information could increase alerting authorities' confidence in and use of IPAWS. GAO is making three recommendations, including that FEMA establish procedures to prioritize and address pending IPAWS applications and that FCC develop goals and performance measures to monitor the WEA improvements. FEMA concurred with GAO's recommendations. FCC stated it was taking steps to gather data to inform the development of metrics as GAO recommended.", "document_type": "gao"}
{"report": "The chemical industry relies on the use of natural resources as inputs to make chemical products, and the industry’s outputs, in turn, can have an impact on the environment. The International Trade Administration of the Department of Commerce identifies the chemical industry as one of the largest manufacturing industries in the United States, with more than 10,000 companies producing more than 70,000 products. The term ‘sustainability’ can have many interpretations depending on the context in which it is used. Sustainability may refer to economic, environmental, or social sustainability. Achieving all three—a concept known as the “triple bottom line”—has become a goal of some businesses, including many in the chemical industry. Mitigating the potential negative health and environmental consequences of chemical production requires thoughtful design and evaluation throughout the life cycle of chemical processes and products —that is, a thorough assessment of effects resulting from stages of the life cycle such as sourcing the raw materials, processing raw materials into products, handling and disposal of by-products and industrial waste, product use, and end-of-life disposal or recycling (see fig. 1). Attempting to improve one stage of the life cycle without considering the others runs the risk of moving sustainability problems around rather than solving them. Analyzing the full life cycle of a process or product can reveal benefits as well as trade-offs or unintended consequences of different choices along the way. Consistent with the goals of sustainable chemistry, which include making chemicals in a purposefully more environmentally benign way, several federal requirements and directives address chemical and other risks to public health and the environment. For example, EPA’s ability to effectively implement its mission of protecting public health and the environment is critically dependent on credible and timely assessments of the risks posed by chemicals. Such assessments are the cornerstone of scientifically sound environmental decisions, policies, and regulations under a variety of statutes, such as the Toxic Substances Control Act (TSCA) (as amended), which provides EPA with authority to obtain information on chemicals and to regulate those that it determines pose unreasonable risks; the Safe Drinking Water Act (SDWA) (as amended), which authorizes EPA to regulate contaminants in public drinking water systems; and the Federal Food, Drug, and Cosmetic Act (as amended), which authorizes the Food and Drug Administration to oversee the safety of food, drugs, medical devices, and cosmetics. The Federal Acquisition Regulation generally requires that federal agencies advance sustainable acquisition by ensuring that 95 percent of new contract actions for the supply of products and for the acquisition of services meet certain sustainability goals. Various economic factors influence the development of sustainable products. Consumers are increasingly seeking products that help them reduce their own environmental footprints, and companies are responding by developing products made with safer chemicals and by increasing the use of recycled, biobased, and renewable materials. The supply of such products can be influenced by the costs of production, competitive advantage, and reputational effects. For example, if a more sustainable product or process helps a firm differentiate from another firm and creates a competitive advantage that consumers recognize and value, it will enable firms to create more sustainable products. There are a number of inherent challenges in the market for sustainable products in the industry. For example, substantial upfront costs coupled with uncertainty about consumer demand may be a barrier to entering the market. If the benefits of taking a more sustainable approach are valued by consumers, companies may be able to recoup the higher costs by charging higher prices without reducing demand. However, if the benefits are not easily understood and measureable (e.g., long-term health benefits), or are external to consumers (e.g., broad environmental impacts), then consumers may not be willing to pay higher prices for more sustainable products. In addition to market incentives that encourage firms to produce more sustainable products, government entities can, when appropriate, take actions such as subsidies, award programs, or tax credits, or limits, bans, and taxes. Governments may also provide environmental and health- related information to help guide the choices of consumers, workers, downstream users, and investors. For new markets and investments to be realized, sufficient information is needed on the environmental damage and health hazards that can be associated with some chemicals and the possibilities that exist to develop alternatives that overcome these challenges. In February 2018, we reported that stakeholders vary in (1) how they define sustainable chemistry, (2) how they assess sustainability, and (3) which environmental and health factors they considered most important. Most companies that responded to our survey agreed that a standardized set of factors for assessing sustainability would be useful. Stakeholders do not agree on a single definition of sustainable chemistry. In total, we asked 71 representatives of stakeholder organizations how they or their organization defines sustainable chemistry. The most common response we received was that sustainable chemistry includes minimizing the use of non-renewable resources. Other concepts that stakeholders commonly associated with sustainable chemistry included minimizing the use of toxic or hazardous chemicals, considering trade- offs between various factors during each phase of the life cycle, minimizing energy and water use, and increasing biodegradability or recyclability. Based on a review of the literature and stakeholder interviews, we identified several common themes underlying what sustainable chemistry strives to achieve, including: improve the efficiency with which natural resources—including energy, water, and materials—are used to meet human needs for chemical products while avoiding environmental harm; reduce or eliminate the use or generation of hazardous substances in the design, manufacture, and use of chemical products; protect and benefit the economy, people, and the environment using consider all life cycle stages including manufacture, use, and disposal (see fig. 1) when evaluating the environmental impact of a product; and minimize the use of non-renewable resources. Stakeholders such as chemical companies, federal agencies, and others use many different approaches for assessing the sustainability of chemical processes and products. While the varying approaches provide flexibility to meet the priorities of the user, the lack of a standardized approach makes it very difficult for customers, decision makers, and others to compare the sustainability of various products to make informed decisions. Some companies and organizations design their own approaches for assessing chemical sustainability and use those approaches to make internal decisions on product design and processing, while others use metrics, chemical selection guides, or third-party certifications and assessment tools that are common to their industry. For example, chemical companies use several established metrics to measure their efficiency in using materials to generate products. The variety of metrics used—and variation in the underlying factors included in their calculation—hinders the ability of companies and others to compare the sustainability of chemical processes or products. In addition to common metrics, some sectors have developed guides that companies and others can use to compare the sustainability of materials used in chemical processes, including solvent selection guides and reagent guides. Solvent selection guides assess solvents based on a variety of sustainability criteria, such as environmental, health, and safety impacts; recyclability; and regulatory concerns. One pharmaceutical company reported a 50 percent decrease in the use of certain hazardous solvents after the introduction of a solvent selection guide. NGOs, federal agencies, and professional associations are also developing product certification programs and assessment tools. Certification programs set minimum criteria that products must meet to be certified, such as biodegradability, toxicity, performance, or water usage. Certifying bodies make databases of certified products publicly available and allow manufacturers to affix certification labels or logos to their products. Companies prioritize various environmental and health factors differently when assessing sustainability, according to our survey of 27 companies. We asked respondents to indicate the relative importance their company gives to each of 13 environmental and health factors by comparing a pair of factors and selecting the factor they considered more important to optimize, even if that benefit came at the expense of the other factor. For example, a company might compare “energy use” with “water use” and determine that it was more important to their company to maximize the sustainability benefit relative to the “energy use” of a process even if it resulted in less sustainable use of water. We found that, overall, “toxicity of the product” was the most important factor for the companies surveyed and “percentage of renewable or biobased content” was the least important factor when making trade-offs (see fig. 2). However, there were sizable differences between companies and sectors regarding which factors they considered most important to optimize. For a more detailed description of our analysis, see our report Chemical Innovation: Technologies to Make Processes and Products More Sustainable. The literature and the results of our interviews and survey indicate that the lack of a standard definition for sustainable chemistry, combined with the lack of standard ways of measuring or assessing sustainability, hinder the development and adoption of more sustainable chemistry technologies. It is difficult for consumers, purchasers, policymakers, and even manufacturers to compare the sustainability of one process or product with another when such processes and products are assessed using different metrics that incorporate different factors. In addition, while there were sizable differences between the companies that responded to our survey with regard to which environmental and health factors they considered most important to prioritize, most agreed that it would be useful to have a standardized set of factors for assessing sustainability across their industry sector and (to a lesser degree) across the entire industry. There are many technologies available and in development that can improve chemical sustainability at each stage of the chemical life cycle. Our February 2018 report focused on three categories: catalysts, solvents, and continuous processing. Because each chemical process or product has unique requirements, there is no one-size-fits-all solution to sustainability concerns. Catalysts are used to make chemical processes run faster or use less material. One common application is the catalytic converter in an automobile, where the catalyst converts pollutant gases in the exhaust into harmless chemicals. Without catalysts, many everyday items such as medicines, fibers, fuels, and paints could not be produced in sufficient quantities to meet demand. Unfortunately, the most common catalysts— including those used in automobile catalytic converters—are rare, nonrenewable metals such as platinum and palladium. Researchers are working to replace such metals with alternatives, including abundant metals (e.g., iron and nickel) and metal-free catalysts (such as biocatalysts) where possible. For example, in 2016, Newlight Technologies won a Presidential Green Chemistry Challenge Award for developing and commercializing a biocatalyst technology that captures methane (a potent greenhouse gas) and combines it with air to create a material that matches the performance of petroleum-based plastics at a lower cost. Several companies are now using this material to make a range of products, including packaging, cell phone cases, and furniture. Solvents are key components in chemical reactions. They are used to dissolve other substances so reactions can occur, to separate and purify chemicals, and to clean the equipment used in chemical processes, among other uses. Solvents constitute a large portion of the total volume of chemicals used in industrial chemical processes. However, many conventional solvents are considered hazardous, both to the environment and to human health. There are a variety of alternatives that can be used in some situations, including biobased solvents, less hazardous solvents such as water or ethanol, and solvent-free or reduced-solvent technologies. For example, biobased solvents called citrus terpenes, which are extracted from citrus peel waste, can be used as flavoring agents or fragrances in cleaning products. According to a representative from Florida Chemical, citrus terpenes may be a low-toxicity alternative compared to traditionally used petroleum-based products for the hydraulic fracturing industry’s concerns about contamination of source and groundwater. However, the regionality and seasonality of the citrus supply can present a challenge to production. Historically, industrial chemicals have been produced mainly using an approach known as batch processing, where the starting materials are combined in a closed vessel or vat and allowed to react, then transferred to the next vat for the next stage of processing while the first vat is cleaned, and the process is repeated with the next batch. This approach can use significant amounts of solvents for cleaning the vats between batches, consume considerable energy, result in potentially long wait times, and create safety risks. An alternative to batch processing is continuous processing, which allows chemical reactions to occur as the reaction mixture is pumped through a series of pipes or tubes where reactions take place continuously. This approach can improve product yield, product quality, reaction time, and process safety while reducing waste and costs. For example, researchers developed a process for manufacturing the active ingredient in medications including Benadryl® and Tylenol® PM using microreactors that minimized waste, reduced the number of purification steps, and reduced production times compared to traditional batch processing. The federal government and other stakeholders play a number of roles, sometimes in collaboration, to advance the development and use of more sustainable chemical processes and products. Federal programs support research on the impacts of chemicals on human and environmental health, support the development of more sustainable chemical processes and their commercialization, and aid the expansion of markets for products manufactured with more sustainable chemicals and processes. Other stakeholders play similar roles and some additional roles that contribute to the development and use of more sustainable chemical processes and products. Federal programs conduct and fund basic research on the characteristics and biological effects of chemicals, which underpins the development and use of more sustainable chemistry products and processes. Decision makers must have a scientific understanding of the potential harmful impacts of exposure to chemicals in order to effectively minimize the harmful effects of chemicals through regulations and other means, and to assess the regulated community’s compliance with them. Industry needs this information to make informed decisions about the selection, design, and use of more sustainable chemicals in their products and processes, including their impact on workers. Federal programs fund and study the impacts of chemicals on human health and the environment, develop new methodologies for testing and predicting these effects, award grants for research on chemicals and new methodologies, identify more sustainable chemical alternatives, and evaluate the risks of chemicals. (See table 1.) Federal programs also seek to support the development and facilitate the commercialization of new, more sustainable chemistry processes by conducting and funding basic and applied research to develop more sustainable processes and products; providing loan guarantees, grants, and technical assistance to researchers and companies; and recognizing innovative technologies through an award program, among other programs. (See table 2.) Federal programs also aid market growth for products made with sustainable chemicals and processes by informing consumers about these products and by facilitating their purchase by federal offices. It can be challenging for consumers seeking out more sustainably manufactured products to identify them or verify company claims. Federal programs can help companies seeking to manufacture more sustainable products strive to ensure that their products are differentiated from less sustainable products in order to reach these consumers. For example, federal programs conduct evaluations of the chemical content of products, manage product certification and labeling programs, provide information to consumers and federal purchasers on the chemical content of products, and develop purchasing and sustainability plans to support agency purchase and use of more sustainable products. EPA’s Safer Choice voluntary certification and labeling program helps consumers make informed purchasing decisions and incentivizes manufacturers to select more sustainable chemical alternatives so they can differentiate their products in the market. Other stakeholders—such as the chemical manufacturing industry, companies and retailers, state governments, academic institutions, and NGOs—also seek to influence the development and use of more sustainable chemistry processes and products through activities such as supporting workforce development and developing tools and resources for industry. These stakeholders may work on collaborative efforts, such as sustainability initiatives and developing industry-specific standards. The chemical industry conducts and supports research into more sustainable chemistry technologies and other activities. Companies and retailers, such as Kaiser Permanente and Target, create demand for more sustainable products from their suppliers by setting sustainability criteria for purchases. Academic institutions conduct research on the impacts of chemicals and sustainable chemistry technologies and train the next generation of chemists and engineers. States seek to protect public health by regulating chemicals in products. NGOs also play a diverse range of roles such as supporting workforce development, facilitating collaboration between other stakeholders, and developing tools and resources for industry. Sustainable chemistry is an emerging field within the chemical sciences that has the potential to inspire new products and processes, create jobs, and enhance benefits to human health and the environment. Stakeholders offered a range of potential options to realize the full potential of these technologies. However, there are a number of challenges to implementing more sustainable chemistry technologies, including technological, business, and industry-wide and sector-specific challenges. The field of sustainable chemistry has the potential to inspire new products and processes, create jobs, and enhance benefits to human health and the environment. Stakeholders noted that much more work is needed to realize its full promise and offered a range of potential options to realize the full potential of these technologies, including the following: Breakthrough technologies in sustainable chemistry and a new conceptual framework could transform how the industry thinks about performance, function, and synthesis. An industry consortium, working in partnership with a key supporter at the federal level, could help make sustainable chemistry a priority and lead to an effective national initiative or strategy. Integrating sustainable chemistry principles into educational programs could bolster a new generation of chemists, encourage innovation, and advance achievement in the field. A national initiative that considers sustainable chemistry in a systematic manner could encourage collaborations among industry, academia, and the government, similar to the National Nanotechnology Initiative. There are opportunities for the federal government to address industry-wide challenges such as developing standard tools for assessment and a robust definition of sustainable chemistry. Federal agencies can also play a role in demonstrating, piloting, and de- risking some technology development efforts. Stakeholders noted that there are a number of challenges to implementing more sustainable chemistry technologies, including (1) technological and business challenges, (2) industry-wide and sector- specific challenges, and (3) challenges with coordination between stakeholders. One example of a technological challenge is the fact that alternatives to current solvent use can sometimes pose the same inherent toxicity and volatility risks as their conventional counterparts. Alternatives can also vary in supply and quality and can be expensive. Less toxic solvents, such as water, may require specialized equipment, greater energy input, or elevated pressure, and they can be difficult to scale up for industrial use. Companies told us they face many business challenges in implementing sustainable chemistry technologies, including the need to prioritize product performance; weigh sustainability trade-offs between various technologies; risk disruptions to the supply chain when switching to a more sustainable option; and consider regulatory challenges, among others. Stakeholders also noted the challenge of overturning proven conventional practices and acknowledged that existing capital investments in current technologies can create barriers for new companies to enter a field full of well-established players. Our survey and interviews also found that there are several industry-wide and sector-specific challenges to implementing more sustainable chemistry technologies, such as the lack of a standard definition for sustainable chemistry and lack of agreement on standard ways of measuring or assessing it. Without a standard definition that captures the full range of activities within sustainable chemistry, it is difficult to define the universe of relevant players. Without agreement on how to measure the sustainability of chemical processes and products, companies may be hesitant to invest in innovation they cannot effectively quantify, and end users are unable to make meaningful comparisons that allow them to select appropriate chemical products and processes. There is no mechanism for coordinating a standardized set of sustainability factors across the diverse range of stakeholders at present, despite the motivation of some specific sectors to do so. Moreover, although the federal government has worked with stakeholders through its research support, technical assistance, certification programs, and other efforts, there are still gaps in understanding. Many stakeholders told us that without such basic information as a standardized approach for assessing the sustainability of chemical processes and products, better information on product content throughout the supply chain, and more complete data on the health and environmental impacts of chemicals throughout their life cycle, they cannot make informed decisions that compare the sustainability of various products. Sector-specific challenges exist as well. For example, pharmaceutical sector representatives told us that changing the manufacturing process for an already marketed drug triggers a new FDA review, which can result in delays and additional costs—thus discouraging innovation that could make their chemical processes more sustainable. In conclusion, according to stakeholders, transitioning toward the use of more sustainable chemistry technologies requires that industry, government, and other stakeholders work together. As they and others noted, there is a need for new processes that make more efficient use of the resources that are available, reuse products or their components during manufacturing, and account for impacts across the entire life cycle of chemical processes and products. Furthermore, they highlight the importance of disseminating environmental and health-related information to help guide the choices of consumers, chemists, workers, downstream users, and investors to facilitate further progress. They also indicated that momentum in this field will require national leadership in order to realize the full potential of sustainable chemistry technologies. Chairwoman Stevens, Ranking Member Baird, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact me at 202-512-6412 or personst@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Karen Howard (Assistant Director), Diane Raynes (Assistant Director), Katrina Pekar-Carpenter (Analyst-in-Charge), Patrick Harner, Summer Lingard-Smith, Krista Mantsch, Anika McMillon, Rebecca Parkhurst, and Ben Shouse. Other staff who made key contributions to the report cited in the testimony are identified in that report. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Chemistry contributes to virtually every aspect of modern life, and the chemical industry supports nearly 26 percent of the gross domestic product of the United States. While these are positive contributions, chemical processes and production can have negative health and environmental consequences. Mitigating these potential consequences requires thoughtful design and evaluation of the life cycle effects of chemical processes and products. This testimony—based on a 2018 technology assessment, GAO-18-307 —discusses (1) how stakeholders define and assess the sustainability of chemical processes and products, (2) available or developing technologies to make chemical processes and products more sustainable, (3) the roles of the federal government and others in supporting the development and use of more sustainable chemical processes and products, and (4) opportunities and challenges in the field of sustainable chemistry. For the 2018 report, GAO selected for assessment three technology categories—catalysts, solvents, and continuous processing; interviewed stakeholders from various fields, such as government, industry, and academia; convened a meeting of experts on sustainable chemistry technologies and approaches; and surveyed a non-generalizable sample of chemical companies. Stakeholders vary in how they define and assess the sustainability of chemical processes and products; these differences hinder the development and adoption of more sustainable chemistry technologies. However, based on a review of the literature and stakeholder interviews, GAO identified several common themes underlying what sustainable chemistry strives to achieve, including: improve the efficiency with which natural resources are used to meet human needs for chemical products while avoiding environmental harm; reduce or eliminate the use or generation of hazardous substances, minimize the use of non-renewable resources; and consider all life cycle stages when evaluating a product (see figure). There are many technologies available and in development that can improve chemical sustainability at each stage of the chemical life cycle. GAO identified three categories of more sustainable chemistry technologies—catalysts, solvents, and continuous processing. Catalysts are used to make chemical processes run faster or use less material. Without catalysts, many everyday items such as medicines, fibers, fuels, and paints could not be produced in sufficient quantities to meet demand. However, the most common catalysts—including those used in automobile catalytic converters—are rare, nonrenewable metals such as platinum and palladium. Researchers are working to replace such metals with alternatives, including abundant metals (e.g., iron and nickel) where possible. Solvents are used to dissolve other substances so reactions can occur, to separate and purify chemicals, and to clean the equipment used in chemical processes, among other uses. Solvents constitute a large portion of the total volume of chemicals used in industrial chemical processes. However, many conventional solvents are considered hazardous. There are a variety of alternatives that can be used in some situations, including biobased solvents. An alternative to traditional batch processing is continuous processing, which allows chemical reactions to occur as the reaction mixture is pumped through a series of pipes or tubes where reactions take place continuously. Compared to batch processing, this approach can improve product yield, product quality, and process safety while reducing waste and costs. The federal government and other stakeholders play several roles, sometimes in collaboration, to advance the development and use of more sustainable chemistry technologies. The federal government supports research, provides technical assistance, and offers certification programs, while other stakeholders conduct research, develop industry-specific standards, support workforce development development, and address chemicals of concern in consumer products, among other roles. Strategic Implications While using more sustainable options entails challenges--including technological, business, and industry-wide and sector-specific challenges, the field of sustainable chemistry has the potential to inspire new products and processes, create jobs, and enhance benefits to human health and the environment. Stakeholders identified strategic implications of sustainable chemistry and offered a range of potential options and realize the full potential of these technologies, including the following: Breakthrough technologies in sustainable chemistry and a new conceptual framework could transform how the industry thinks about performance, function, and synthesis. An industry consortium, working in partnership with a key supporter at the federal level, could help make sustainable chemistry a priority and lead to an effective national initiative or strategy. Integrating sustainable chemistry principles into educational programs could bolster a new generation of chemists, encourage innovation, and advance achievement in the field. A national initiative that considers sustainable chemistry in a systematic manner could encourage collaborations among industry, academia and the government, similar to the National Nanotechnology Initiative. There are opportunities for the federal government to address industry-wide challenges such as developing standard tools for assessment and a robust definition of sustainable chemistry. Federal agencies can also play a role in demonstrating, piloting, and de-risking some technology development efforts. According to stakeholders, transitioning toward the use of more sustainable chemistry technologies will require national leadership and industry, government, and other stakeholders to work together.", "document_type": "gao"}
{"report": "CMS and private payers use a variety of quality measures to assess different aspects of health care quality. Process measures assess the extent to which providers effectively implement clinical practices (or treatments) that have been shown to result in high-quality or efficient care, such as the percentage of patients with a myocardial infarction who receive an aspirin prescription on discharge. Others are outcome measures, which track the results of health care, such as mortality, infections, and patients’ experiences of that care. To calculate providers’ performance on quality measures, CMS and private payers ask providers to report a variety of clinical data. Historically, providers have collected data for quality measures through a detailed, manual review of paper medical records. Other quality measures use data from billing records and patient surveys. More recently, a limited number of electronic quality measures have been developed to allow providers to report data electronically using electronic health records. Since the early 2000s, CMS has created a number of distinct quality reporting programs within Medicare. These programs generally focus on different sites of care, such as hospitals, physician offices, and nursing homes. Beginning in the early 2000s, CMS launched a number of related programs that offer financial incentives to providers receiving Medicare payments to report their performance on specified quality measures. Some of these programs, such as the Hospital Inpatient Quality Reporting program, are pay-for-reporting programs, in which providers may receive higher payments if they report their performance on the quality measures used in the programs. Others, such as the Hospital Value-based Purchasing program, are pay-for-performance programs, in which the level of providers’ performance on the quality measures affects the amount of the payment they receive. CMS also incorporates pay-for- performance in various alternative payment models, such as accountable care organizations—where CMS pays groups of providers based in part on the collective performance of those providers, rather than the fee-for- service traditionally paid in Medicare. At any given point in time, CMS has a set of quality measures it is currently using in its various Medicare quality programs as well as efforts underway to identify different quality measures to better meet program needs. These quality measures may either already have been developed or potentially could be developed. A variety of different entities may develop new health care quality measures, such as the Joint Commission, the National Committee for Quality Assurance, and various medical specialty societies. In some cases CMS itself contracts with entities for the development of measures for use in its Medicare quality programs. CMS has developed a set of guidelines for developing new quality measures that are described in its Blueprint for the CMS Measures Management System. The Blueprint lays out the steps measure developers should follow to first identify health care topics or conditions where new measures are needed, and then develop and test specific new measures to fill those identified gaps. According to CMS estimates, it can take 2 years or more to complete all of these steps. As part of this process, CMS encourages entities that develop measures to submit them to the National Quality Forum (NQF), a nonprofit organization that evaluates and endorses measures—that is, determines which measures should be recognized as the best available for a given aspect of care. NQF has endorsed over 700 quality measures. In addition, NQF plays a major role in CMS’s process for determining which measures to use in its Medicare quality programs. Since 2009, NQF has been the sole organization to function under contract to CMS as the consensus-based entity as described by the provisions of sections1890 and 1890A of the Social Security Act (SSA). The consensus-based entity manages the Measure Applications Partnership, which is a formal process for obtaining stakeholder input on proposed new measures for Medicare quality programs, along with other measure endorsement and maintenance activities. CMS also relies on other contractors to conduct analyses or disseminate information related to the development and use of quality measures in its Medicare quality programs. CMS has established strategic objectives for the measures CMS develops or uses in its Medicare quality programs. CMS’s quality measurement strategic objectives have evolved over the last decade as CMS has expanded Medicare quality programs and has collaborated with other organizations that use or develop quality measures, such as private insurance companies. In 2017 CMS announced a revised version of these objectives in its Meaningful Measures Initiative. These eight quality measurement strategic objectives are for CMS to adopt measures that are patient-centered and meaningful to patients, clinicians, and address high-impact measure areas that safeguard public health, are outcome-based where possible, fulfill each program’s statutory requirements, minimize burden for providers, create significant opportunity for improvement, address measure needs for population-based payment through alternative payment models, and align across programs and/or with other payers. In addition, to provide greater specificity for its objective to address high- impact measure areas that safeguard public health, CMS has designated 19 specific meaningful measure areas. See appendix I for the list of these meaningful measure areas and the six broad quality priority areas that they address. CMS’s quality measurement activities are funded through the federal budget and appropriations process. Each appropriation includes language that describes an authorized purpose or purposes for which the funds may be used. Such language may specifically reference certain activities such as quality measurement or could refer to a broad purpose under which activities such as quality measurement may have been authorized. Available funds are first obligated—that is, committed to a specific purpose—and then expended when an actual payment is made. Expenditures can occur one or more fiscal years after the obligation was incurred. Funds that are available in a given fiscal year but not obligated during that year are known as unobligated balances. Unobligated balances can be carried over to the next fiscal year, unless their availability expires under the terms of their appropriation. Most CMS funding that is explicitly appropriated for quality measurement activities is available indefinitely, until obligated and expended. CMS maintains information in its core budget database on the amount of funding for its quality measurement activities, such as when funding for that purpose is specifically authorized by appropriations. However, CMS’s database does not capture all of the funding the agency has obligated that pays for quality measurement activities or the extent to which this funding has supported CMS’s quality measurement strategic objectives. Our review of CMS’s quality measurement funding information also shows that CMS maintains a substantial amount of unobligated balances—funding that CMS has not yet used and remains available—for quality measurement activities. CMS officials report that the agency records funding information for its quality measurement activities in its core budget database, HIGLAS. CMS has information on quality measurement funding primarily when the appropriation is specifically authorized for that purpose. CMS officials identified eight appropriations that specifically designate funding for Medicare quality measurement activities over the 10-year period we reviewed (fiscal years 2009-2018). These include five appropriations that have funded the consensus-based entity established under sections 1890 and 1890A of the SSA, to carry out various activities under contract with CMS in accordance with those provisions. CMS officials identified another three appropriations that focused on more discrete aspects of quality measurement, such as developing new quality measures for clinicians. From fiscal years 2009 through 2018, a total of $429.9 million was authorized for these eight appropriations (see table 1). In addition, CMS officials identified some funding used—that is, obligated—for quality measurement activities, from appropriations authorized for more general purposes. They obtained information on such usage from HIGLAS based on the presence of labels, such as “quality measure development,” in the project code and project description data fields in HIGLAS. According to CMS officials, these data fields provide the most detailed categorization of activities in HIGLAS. Table 2 shows the specific project codes and project descriptions used in HIGLAS to characterize use of quality measurement funding in fiscal year 2018. These obligations are from both appropriations that specifically authorize quality measurement activities and also from general appropriations whose authorized purposes do not specifically mention quality measurement activities. As shown in table 2, the project codes and their descriptions used in HIGLAS provide high-level information that largely matches the information known from the appropriation authorizing such use. Our review of the funding information in HIGLAS found that the data do not capture the total amount of funding CMS has obligated that pays for quality measurement activities. As we have noted, CMS officials identified funding obligated for quality measurement activities in HIGLAS either because 1) the funding came from appropriations specifically designated for quality measurement purposes, or 2) the funding came from appropriations for more general purposes but had specific HIGLAS project codes to identify its use for quality measurement activities. However, CMS officials told us that they thought there were additional quality measurement activities funded from appropriations for general purposes that could not be identified by project codes in HIGLAS. As a result, they could not determine from HIGLAS what amount of these funds paid for quality measurement activities as opposed to other activities. CMS officials stated that while they do not have information on the amount of this unidentified quality measurement funding, they estimated that it was less than the amount of quality measurement funding identified in HIGLAS. Furthermore, CMS’s funding information in HIGLAS also is not sufficiently detailed to show the extent to which the funding was used for activities that support CMS’s eight quality measurement strategic objectives. While some HIGLAS project descriptions—like “Hospital Outcome Measures”— correspond with one of these objectives, as shown in table 2 most do not. In addition, the documents that CMS uses to plan and monitor spending for quality measurement activities generally do not include information showing how much funding CMS has obligated for activities related to CMS’s quality measurement strategic objectives. CMS officials stated that they considered it unduly burdensome to attempt to use HIGLAS to track quality measurement funding according to their strategic objectives. First, they said that quality measurement activities overall constitute a small portion of the funding recorded in HIGLAS. In addition, officials noted that CMS’s strategic objectives change over time. Finally, CMS officials stated their belief that all of CMS’s quality measure activities help to address the agency’s objectives. As a result, CMS cannot determine how its specific funding for quality measurement activities addresses each of its quality measurement strategic objectives and how possible changes in its funding allocations among those activities could help to promote its objectives more effectively. Federal standards for internal control call for agencies to use complete and accurate information and to identify types or categories of information that enable the agency to achieve its objectives. Without more complete information on the total amount of funding obligated to quality measurement activities, CMS officials cannot accurately assess the magnitude of resources they have provided for quality measurement. In addition, even if CMS quality measure activities generally address one or another of its strategic objectives, having information on the extent of funding for each quality measurement strategic objective could help CMS officials assess the amount of funding each of the agency’s priorities is receiving. Doing so would enable CMS officials to make adjustments in accordance with their objectives. While collecting more complete and detailed information on funding for quality measurement activities in HIGLAS—or using some other method that CMS determines is feasible—would require additional effort, CMS could realize corresponding benefits. CMS officials told us that at present, when they need to obtain a higher level of detail about funding for quality measurement activities, they do not use HIGLAS and instead typically conduct a manual review of any available underlying documentation, such as documents related to individual contracts. For example, in order to respond to a statutory requirement to report on its spending to develop certain quality measures for physicians, CMS officials told us they needed to review a set of individual contracts associated with those measures. CMS officials noted that this process is often laborious and that the content of available documents may not enable them to obtain all the desired funding information for the specific quality measurement activities in question. Collecting more information routinely about funding for quality measurement activities has the potential to make such manual reviews of documents less necessary and burdensome. The limitations in CMS’s information on funding for quality measurement activities have implications for CMS’s ability to communicate information outside the agency. As required by the Congress, CMS issued its first annual report on quality measurement funding in March 2019. In this report, CMS itemized information on such funding into four broad categories: “Duties of the consensus-based entity,” “Dissemination of quality measures,” “Program assessment and review,” and “Program oversight and design.” CMS’s report listed a number of more specific activities within these categories without providing the amount of funding it allocated for each of the described activities. More detailed funding information could help the Congress to better understand how CMS is using appropriations for quality measurement, and could assist with effective oversight of these activities. Internal control standards call for agencies to consider the needs and expectations of external users, such as Congress, when collecting and communicating information. Our review of the funding information CMS provided determined that the agency has maintained substantial unobligated balances related to its quality measurement activities from fiscal years 2010 through 2018. Unobligated balances represent funding that CMS did not use in the year it was appropriated, and that remains available for use in future years. All but one of the eight appropriations that specifically authorize spending for quality measurement activities are available indefinitely. Five of these appropriations funded quality measurement activities under sections 1890 and 1890A of the SSA. In the case of these five appropriations, with the exception of fiscal year 2009, CMS had unobligated balances each year that were larger than or similar to the total amount the agency had obligated from those appropriations that year (see figure 1). Figure 1 also shows three other appropriations more narrowly focused on developing new measures for clinicians and post-acute care providers under Medicare (appropriated by MACRA section 102 and the IMPACT Act sections 2a and 2d). Since 2015, unobligated balances for these appropriations also generally exceeded annual obligations. See appendix II for more detailed information. CMS officials stated that unobligated balances reflect broader spending decisions—for quality measurement as well as other activities—the agency makes to meet its strategic objectives and any related legislative requirements. CMS officials said that in general, they chose to use the available quality measurement funds conservatively to ensure there were no gaps in funding to carry out their statutory responsibilities, in view of uncertainty about the availability and timing of funding in future years. They also said that they took into account the total amount of appropriated funds—including unobligated balances—in developing the scope and duration of quality measurement activities. The officials noted that it often takes more than one year to implement these activities, in order to gather information, select contractors, or solicit and award grant applications. Regarding the level of unobligated balances to be carried over from one fiscal year to the next, CMS officials told us that they work to obligate all appropriations in accordance with statutory requirements, and do not have thresholds for maximum unobligated balances. Maintaining large unobligated balances means that CMS is retaining funds for future quality measurement activities rather than using them for current quality measurement activities. One example of how such choices can affect the scope and timing of CMS’s quality measurement activities was the outcome of a CMS competition for cooperative agreements, announced in March 2018, to develop new clinician quality measures to address identified measurement gaps. Drawing on funds from the appropriation dedicated to developing, improving, updating, or expanding new clinician quality measures (MACRA 102) that were available for use until 2022, CMS set a maximum amount for the awards of $30 million over three years. CMS officials determined that the $30 million ceiling meant that there was adequate funding for seven awardees, while CMS indicated that additional applicants scored well on CMS’s selection criteria and addressed areas of need. For fiscal year 2018, MACRA 102 had an unobligated balance of $42 million, with an additional $15 million appropriation in place for fiscal year 2019. As of May 23, 2019, CMS officials told us that they had not announced new competitions to develop clinician quality measures. CMS takes different approaches in deciding which Medicare quality measures to use in its programs, which to remove, and which new measures to develop. However, CMS lacks procedures to ensure that these decisions are consistent with its quality measurement strategic objectives, and CMS has not yet developed or implemented performance indicators to evaluate its overall progress toward achieving these objectives. For selecting measures to be used in its Medicare quality programs, CMS has an annual process, as defined by the Patient Protection and Affordable Care Act. CMS makes a number of decisions that influence measure selection throughout the process. Each year CMS asks measure developers to submit candidate quality measures to CMS for potential selection. CMS makes preliminary decisions on which of these measures to use in its quality programs, and it publishes this selection of measures in its annual Measures under Consideration list (MUC). The MUC list then undergoes public review by multiple stakeholders. After this review, CMS chooses which measures to include in the formal rulemaking processes that ultimately determine which measures are added to its quality programs. See table 3. To make decisions on which measures to include in the MUC list, CMS officials review the submissions. According to CMS, officials from each Medicare quality program, referred to as quality program leads, separately review each measure submitted for use in that program. CMS officials told us that as necessary, they consult with technical experts and with other CMS or Department of Health and Human Services (HHS) officials. According to CMS officials, the program leads make recommendations to higher level officials, such as division directors, on whether CMS should accept or reject each measure. CMS internal guidance outlines factors that, among other things, officials should consider. Some of these factors reflect the strategic objectives laid out in the Meaningful Measures Initiative, and the guidance also indicates that officials may consider additional factors in their decision-making. CMS officials told us that, when making measure selection decisions, program teams are given the flexibility to develop criteria that best suits their programs’ needs, noting that some programs are intended to address a broad range of areas, such as the Inpatient Quality Reporting Program, while others have a more limited focus, such as the Hospital Readmissions Reduction Program. CMS officials told us that the director of CMS’s Center for Clinical Standards and Quality, which is responsible for quality measurement, makes the final measure selection decisions and, in doing so, generally accepts the recommendations of the program teams. Our analysis of CMS’s quality measures indicates that the number of candidate quality measures submitted to CMS for the MUC list has decreased from 335 measures in 2014 to 67 in 2018. CMS officials told us the decline in the number of candidate measures submitted reflected CMS efforts to more clearly define a targeted set of quality measurement priorities for measure developers and to reduce provider reporting burden. Minimizing provider burden is one of CMS’s strategic objectives, and, according to CMS officials, it represents a priority communicated by the CMS administrator. For more information about CMS’s measure selection decisions for its annual MUC list in 2014 through 2018, see appendix III. CMS officials also make decisions annually about which existing measures CMS will remove from its Medicare quality programs. According to CMS officials, the process for deciding which measures to remove is an ongoing, iterative process, and discussions on which measures to remove generally occur in parallel with discussions for selecting measures, with discussions on both measure selection and removal coming to a conclusion in the drafting of the annual proposed and final rules for each program. For measures that are being used in its quality programs, CMS relies on measure developers to monitor the performance of their measures based on principles defined in CMS’s Blueprint. According to the Blueprint, information from developers’ monitoring efforts, including recommendations from technical experts, should be conveyed to and evaluated by CMS officials. CMS officials told us that their decisions to remove measures often take into account the recommendations made by technical experts. In addition, CMS has promulgated through federal rulemaking eight factors for determining whether to remove existing measures from its Medicare quality programs, some of which reflect its quality measurement strategic objectives. CMS officials also said that in deciding to remove measures from CMS quality programs in 2018 they, in part, considered an assessment of the costs of reporting measures relative to the benefit of continued use of the measures. CMS decisions to remove measures have been included in notices of proposed rulemaking in the Federal Register, which allows for public comment and further consideration before issuance of final rules to that effect. In addition to making decisions on the selection and removal of measures, CMS officials also make decisions regarding which new measures to develop. Our review of CMS contract documents, including task orders, indicates that CMS typically awards multiple year contracts to conduct ongoing assessments of quality measures and to develop measures for specific Medicare quality programs, such as inpatient psychiatric facilities or post-acute care providers. Those task orders often call on contractors to convene technical expert panels and conduct additional analyses to assess what measures are currently available for use and what gaps exist in available measures. CMS officials told us they review these reports and provide informal feedback to the contractors. CMS also establishes parameters that guide these efforts. For example, in its 2016 Measure Development Plan for Medicare’s new physician payment system, after soliciting public input, CMS designated six medical specialty areas in which to focus its measure development efforts, and subsequently added five more specialties on which to focus the work of its contractors. For more information about outside entities that perform quality measurement activities under contract with CMS and the efforts CMS has taken to coordinate these activities across its contractors, see appendix IV. CMS has taken some steps that provide opportunities for CMS officials to consider how quality measures may help address the agency’s quality measurement strategic objectives. CMS officials said that in 2018 they began using the Measure Review Template, a spreadsheet used to consolidate information on quality measures submitted to CMS by measure developers. CMS officials told us that they use the spreadsheet to inform their discussions, such as by considering how measures are distributed across the 19 meaningful measure high-impact areas. CMS is also developing another tool, the Quality Measure Index, that is intended to provide a standard methodology to score measures on dimensions that include several of CMS’s eight quality measurement strategic objectives. In addition, CMS officials told us that on occasion they have made limited assessments across measures concerning specific strategic objectives. CMS officials told us that these limited assessments across measures are generally performed when a measure submitted for use in its Medicare quality programs is closely related to another measure, which affects the CMS objective to increase measure alignment. In addition, they said they have identified a few indicators that they use to continuously assess their decision-making process, such as the percentage of outcome measures. CMS also documents some information about its quality measurement decisions. For example, the agency announces its final selection of quality measures to be added to and removed from its Medicare quality programs in the annual federal proposed and final rules for each of those programs. The rationale for selecting each measure is provided as a summary of the peer-reviewed evidence of the impact that use of the measure will have on clinical care. In addition, CMS maintains an internal tracking system, which assembles the information that measure developers provide about the measures they submit to CMS. This system includes some information related to CMS’s quality measurement strategic objectives, such as the meaningful measures high-impact area the measure is intended to address. While these steps provide some information about the linkages between certain quality measures and some of CMS’s quality measurement strategic objectives, CMS lacks procedures to ensure systematic assessment of each quality measure against each of its eight quality measurement strategic objectives. For example, while CMS has implemented the Measure Review Template to consolidate some information on measures, the template does not provide procedures for systematically assessing how each measure will help CMS achieve all eight of its quality measurement strategic objectives. The Quality Measure Index—currently under development—has the potential to be used in a systematic assessment of each measure, but according to CMS officials, as of March 2019 the agency had not yet determined how it planned to use this tool once its testing was complete. Furthermore, CMS lacks procedures to ensure a systematic assessment of whether the collective set of measures it decides to develop or use will help CMS achieve each of the objectives, which could help determine the extent to which each of the objectives is being effectively addressed. The limited assessments across measures that CMS officials said they perform do not consider whether each of CMS’s objectives is being addressed. For example, one of CMS’s eight quality measurement strategic objectives directs CMS to address 19 high-impact measure areas. CMS officials told us that, for each quality program, they look at whether measures generally address the high-impact measure areas, but gaps in these areas remain to be filled. In 2018, there were no measures used in CMS quality programs that addressed the high-impact area “equity of care” and 13 of 17 Medicare quality programs had no measures that addressed the “community engagement” area. Measure developers did not submit measures to CMS that addressed these areas, and CMS did not identify specific initiatives to address them. CMS officials told us, however, that CMS supports discussions of key methodological considerations for collecting and analyzing measure data that could help enable future development of these measures. Last, CMS lacks procedures for documenting the consistent application of those systematic assessments. Federal internal control standards indicate the importance of documenting decisions to support achieving agency objectives. Specifically, CMS does not document, either in its public reporting or internal tracking system, how each measure it decides to use is expected to promote each of its eight quality measurement strategic objectives. For decisions on developing new measures, the agency records less information. For example, CMS does not maintain a consolidated list of decisions to initiate the development of new quality measures across the various Medicare quality programs. CMS officials also told us that they generally do not maintain documentation of discussions on how or why they selected one measure for development over another. If CMS develops procedures to consider the effect of each of its quality measurement decisions on each of its quality measurement strategic objectives, then documentation of these procedures would help to show that they are implemented consistently. Federal standards for internal control state that management should design and implement internal control activities, such as tools and documentation of decisions, to support the agency in achieving its objectives. Without procedures that ensure that its quality measures fully address its strategic objectives, CMS increases the risk that the measures it decides to develop and use will not help the agency achieve its quality measurement strategic objectives as effectively as possible. CMS has not developed and implemented performance indicators that would be needed to determine if it is making progress in meeting its quality measurement strategic objectives. Establishing these indicators and using them to evaluate its progress towards meeting each of its quality measurement strategic objectives would enable CMS to determine whether its quality measurement efforts are sufficient or whether changes in these efforts are needed. According to federal internal control standards, after agencies establish objectives, they should establish a set of performance indicators and use them to assess their effectiveness in achieving their objectives and identify improvements in their work, as needed. However, CMS has not established performance indicators for its strategic objectives that would provide a basis for determining its progress towards achieving these objectives. Such performance indicators would relate to each of CMS’s quality measurement strategic objectives and provide information on interim progress toward achieving these objectives. For example, CMS could establish one or more indicators of its progress toward addressing the 19 high-impact measure areas that safeguard public health, and an indicator of providers’ reporting burden for quality measurement to see if it showed an overall reduction. CMS officials told us that they assess the impact of the agency’s quality measurement activities by reviewing changes over time in health care providers’ reported performance on selected quality measures. However, these measures are for providers’ quality of care, and are not indicators designed to determine the agency’s progress in achieving its eight strategic objectives for quality measurement. Specifically, CMS has completed the National Impact Assessment of Quality Measures report every 3 years since 2012. These reports focus on trends in the performance of health care providers on a number of specific quality measures. Such analyses do not evaluate CMS’s performance in developing and choosing to use measures that promote its quality measurement strategic objectives. CMS has convened the Meaningful Measurement and Improvement Affinity Group, a workgroup of CMS officials involved in quality measurement. This workgroup’s stated mission is to champion the Meaningful Measures Initiative and facilitate its implementation across the agency. CMS officials told us that the workgroup has begun to discuss potential ways to evaluate the agency’s progress in achieving the eight strategic objectives laid out in the Meaningful Measures Initiative. However, the information CMS officials provided on the workgroup’s activities, as of March 2019, indicated that the group had not yet determined how to gauge such progress, such as by establishing performance indicators. CMS plays a leading role in the process of developing new quality measures and selecting measures for use in its various quality programs in Medicare. These programs in turn affect the quality of care the program’s beneficiaries receive. However, CMS lacks complete information on the amount of resources it has obligated for its quality measurement activities and how its allocation of those resources relates to its quality measurement strategic objectives. The agency also lacks procedures to ensure that the decisions it makes to develop and use measures for its quality programs are consistent with those objectives. Finally, CMS has not developed and implemented performance indicators to evaluate its progress towards achieving these objectives. Taken together, these issues limit CMS’s ability to determine whether its allocation of resources and quality measurement decisions are optimal or whether changes are needed in its approach. We are making the following three recommendations to CMS: The Administrator of CMS should, to the extent feasible, maintain more complete information on both the total amount of funding allocated for quality measurement activities and the extent to which this funding supports each of its quality measurement strategic objectives. (Recommendation 1) The Administrator of CMS should develop and implement procedures to systematically assess the measures it is considering developing, using, or removing in terms of their impact on achieving CMS’s strategic objectives and document its compliance with those procedures. (Recommendation 2) The Administrator of CMS should develop and use a set of performance indicators to evaluate the agency’s progress towards achieving its quality measurement strategic objectives. (Recommendation 3) We provided a draft of this report to HHS for review and comment. In its written comments, which are reproduced in appendix V, HHS concurred with our recommendations. Regarding our first recommendation, HHS stated that it has undertaken a review of its fiscal accountability processes for its quality improvement activities and is implementing more granular tracking of funding specific to quality measurement to the extent it is feasible. Regarding our second recommendation, HHS stated that it will determine what steps may be needed to further document how its measure decisions impact the achievement of CMS’s quality measurement strategic objectives. HHS’s comments did not address the need to develop and implement procedures for systematically assessing measures against the strategic objectives, as we recommended. Regarding our third recommendation, HHS stated it would consider how best to evaluate its progress in meeting its quality measurement strategic objectives. In addition, HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, the Administrator of the Centers for Medicare & Medicaid Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. As part of its Meaningful Measures Initiative, the Centers for Medicare & Medicaid Services (CMS) identified 19 meaningful measure areas to specify its priorities under its quality measurement strategic objective to address high-impact measure areas that safeguard public health. The 19 areas are linked to six broader health care quality priorities previously identified in the 2011 National Strategy for Quality Improvement in Health Care. See table 4. The Centers for Medicare & Medicaid Services (CMS) has identified five separate appropriations that for various fiscal years have funded the activities assigned to the consensus-based entity (currently the National Quality Forum), along with certain other quality measurement activities, as described in sections 1890 and 1890A of the Social Security Act. See table 5. Three additional appropriations focus on specific Medicare quality measurement activities, such as post-acute care measures. See table 6. Tables 7 to 12 below present descriptive information that the Centers for Medicare & Medicaid Services (CMS) collects through its issue tracking system on the measures submitted to CMS by measures developers for potential use in CMS’s Medicare quality programs. The Centers for Medicare & Medicaid Services (CMS) has used the majority of its Medicare quality measurement funding for activities conducted by outside organizations under contract with CMS. Between fiscal years 2009 through 2018, the amount of obligations to contracted organizations increased from $10 million to nearly $55 million. See table 13. The total amount of funds obligated to each contractor in fiscal years 2009 through 2018 to perform Medicare quality measurement activities varied, ranging from $1,000 to $139,397,410. For fiscal years 2009 through 2018, 91 percent of funds obligated to contracted organizations for Medicare quality measurement activities went to 12 of 59 contracted organizations. See table 14. CMS has undertaken efforts to coordinate the Medicare quality measurement activities performed by its contractors. For example, CMS works with a CMS contractor, Battelle, to facilitate monthly webinars with its Measure & Instrument Development and Support (MIDS) contractors. The purpose of the webinars is to provide contractors with a forum to discuss each other’s quality measurement activities and to exchange ideas. For more information about CMS’s formal efforts to coordinate the quality measurement activities of its contractors, see table 15. In addition to the contact named above, Will Simerl, Assistant Director; Eric Peterson, Analyst-in-Charge, Jonathan Adams, George Bogart, Krister Friday, Cathy Hamann, Katie Mack, and Dan Ries made key contributions to this report. Also contributing were Vikki Porter and Ethiene Salgado-Rodriguez. Health Care Quality: HHS Should Set Priorities and Comprehensively Plan Its Efforts to Better Align Health Quality Measures. GAO-17-5 (Washington, D.C.: October 13, 2016). Patient Protection and Affordable Care Act: Procedures for Reporting Certain Financial Management Information Should Be Improved. GAO-14-697 (Washington, D.C.: September 22, 2014). Budget Issues: Key Questions to Consider When Evaluating Balances in Federal Accounts. GAO-13-798 (Washington, D.C.: September 30, 2013). Health Care Quality Measurement: HHS Should Address Contractor Performance and Plan for Needed Measures. GAO-12-136 (Washington, D.C.: January 13, 2012). Program Evaluation: Improving the Flow of Information to the Congress. GAO/PEMD-95-1 (Washington, D.C.: January 30, 1995).", "summary": "To encourage greater value in health care, CMS adjusts its Medicare payments to many health care providers based on measures of the quality of care. Therefore, the decisions CMS makes to choose certain quality measures have significant consequences. These decisions may involve selecting specific existing measures for CMS to use, stopping the use of some measures, or identifying new measures to be developed. The Bipartisan Budget Act of 2018 contains a provision for GAO to review CMS's quality measurement activities. For this report, GAO (1) assessed the information CMS maintains on funding of health care quality measurement activities, and (2) described and assessed how CMS makes decisions to develop and to use quality measures. GAO analyzed CMS funding data for 2009 through 2018 and data on CMS quality measurement selections for 2014 through 2018. GAO reviewed CMS documentation related to its decisions on quality measurement and interviewed program and contractor officials. The Centers for Medicare & Medicaid Services (CMS), within the Department of Health and Human Services (HHS), maintains information on the amount of funding for activities to measure the quality of health care provided under Medicare. CMS's information shows it has carried over from each year to the next large amounts of available funding—known as unobligated balances—for quality measurement activities from fiscal years 2010 through 2018 (see figure). CMS officials said they maintained such available funding to ensure there were no gaps in funding for future years. However, CMS officials also told GAO that the information it maintains does not identify all of the funding the agency has obligated for quality measurement activities. Further, it does not identify the extent to which this funding has supported CMS's quality measurement strategic objectives, such as reducing the reporting burden placed on providers by CMS's quality measures. With more complete and detailed information, CMS could better assess how well its funding supports its quality measurement objectives. CMS takes different approaches for deciding which quality measures to develop and to use. However, CMS lacks assurance that the quality measures it chooses address its quality measurement strategic objectives. This is because CMS does not have procedures to ensure systematic assessments of quality measures under consideration against each of its quality measurement strategic objectives, which increases the risk that the quality measures it selects will not help the agency achieve those objectives as effectively as possible. These procedures, such as using a tool or standard methodology to systematically assess each measure under consideration, could help CMS better achieve its objectives. In addition, CMS has not developed or implemented performance indicators for each of its quality measurement strategic objectives. Establishing these indicators and using them to evaluate its progress towards achieving its objectives would enable CMS to determine whether its quality measurement efforts are sufficient or changes are warranted. GAO recommends that CMS (1) maintain more complete and detailed information on its funding for quality measurement activities, (2) establish procedures to systematically assess measures under consideration based on CMS's quality measurement strategic objectives, and (3) develop and use performance indicators to evaluate progress in achieving its objectives. HHS concurred with all three recommendations.", "document_type": "gao"}
{"report": "The JOM program provides supplementary financial assistance, through contracts, to meet the unique and specialized educational needs of eligible American Indian and Alaska Native students. Eligible students, under Interior’s regulations, are generally Indian students age 3 through grade 12 who are either a member of an Indian tribe or at least one- quarter degree Indian blood descendant of a member of an Indian tribe. BIE contracts with tribal organizations, Indian corporations, school districts, and states—which we collectively refer to as JOM contractors as that is the term used by Interior—that administer local JOM programs and disburse funds to schools or other programs providing JOM services. Most JOM funds are distributed through tribal contractors, according to BIE. BIE generally relies on BIA officials to disburse JOM funds, as noted previously (see fig. 1). BIE’s director is generally responsible for directing and managing JOM functions, including establishing policies and procedures, coordinating technical assistance, and approving the disbursement of JOM funds. In 2014, BIE established one centralized position dedicated solely to administering JOM as part of a broader re-structuring initiative and the position has been consistently staffed since 2018. The current JOM program specialist is responsible for planning, developing, administering, and coordinating the JOM program. It is the federal government’s policy to fulfill its trust responsibility for educating Indian children by working with tribes to ensure that education programs are of the highest quality. In 2016, Congress found in the Indian Trust Asset Reform Act that “through treaties, statutes, and historical relationship with Indian tribes, the United States has undertaken a unique trust responsibility to protect and support Indian tribes and Indians.” As further stated in the Act, the fiduciary responsibilities of the United States to Indians are also founded in part on specific commitments made in treaties and agreements, in exchange for which Indians surrendered claims to vast tracts of land. The JOM program is the only federally-funded Indian educational program that allows for student, parent, and community involvement in identifying and meeting the educational needs of American Indian and Alaska Native students, according to the National Johnson-O’Malley Association—a tribally led organization which advocates for JOM programs. The JOM regulations require prospective contractors to formulate an education plan in consultation with an Indian Education Committee, generally made up of parents of American Indian and Alaska Native students, and to submit the plan to BIE. Indian Education Committees have the authority to, among other things, participate fully in planning, developing, implementing, and evaluating their local JOM programs. According to BIE officials, JOM funds can be used to support a wide variety of supplemental education programs. For example, these funds support programs providing Native cultural and language enrichment; academic support; dropout prevention; and the purchase of school supplies, according to BIE (see fig. 2). JOM programs, particularly for students who are not living near tribal land, may be the only way students can access tribal language and cultural programs. According to BIE officials, JOM funding is primarily disbursed to contractors through three different funding mechanisms: self- determination contracts, self-governance compacts, and 477 plans. Most JOM contractors—over 200—are funded through self-determination contracts, according to data provided by BIE. These three funding mechanisms result in different oversight authority for Interior. However, the Johnson-O’Malley Supplemental Indian Education Program Modernization Act (Modernization Act)—enacted on December 31, 2018—requires all JOM contractors to submit annual reports to the Secretary of the Interior with the number of eligible Indian students during the previous fiscal year, an accounting of the amounts expended, and the purposes for which those amounts were expended. BIE officials said some contractors can also be subject to site visits to oversee the program. Under regulations, JOM funds are to be distributed to contractors by a formula that factors in the number of eligible students to be served and average per-student operating costs. Interior conducted its most recent official JOM student count in 1995. As a result, subsequent JOM distributions have been based on the number of students served by contractors in 1995—271,884 students. BIE officials said that the total number of eligible students has increased since 1995, although no official count has been completed. As a result, the funding contractors receive may not reflect changes in the number of students served by contractors. The size of JOM contracts currently ranges from less than $1,000 to nearly $4 million, according to data provided by BIE. The Modernization Act requires BIE to determine the number of eligible students served or potentially served and to complete a rulemaking process to, among other things, modernize program rules. BIE published a preliminary report on its initial determination of eligible students in October 2019 and is continuing to work on finalizing its count of eligible students. Additionally, in response to the Modernization Act, Interior promulgated new final JOM program regulations that became effective March 26, 2020. BIE does not maintain a complete and accurate list of all JOM contractors. BIE officials said JOM funds are disbursed by awarding officials in various BIA offices in different locations, and there is no systematic process to identify and collect information on all the awarded contracts. BIE began efforts to identify all the contractors and the amount of their awards in May 2019 after we asked for this information. As of December 2019, BIE said they identified more than 340 contractors. BIE officials said they have not verified the accuracy and completeness of their current list of contractors. According to federal internal control standards, an agency should have relevant, reliable information to run and control its operations. BIE officials said their current list of JOM contractors is incomplete because some Interior officials responsible for administering and disbursing JOM funds did not respond to their requests for information. In addition, BIE officials said they may not have contacted all the relevant officials within Interior when they developed the list. BIE officials also said they do not know how many contractors may be missing from their list. Further, they said they did not validate the accuracy of the information they received on JOM contractors. Our analysis of BIE’s list of JOM contractors identified data reliability concerns. For example, we found 19 contractors that were listed twice, meaning the total number of contractors provided by BIE contained duplicates and was not an accurate count. BIE officials said that maintaining a complete list of contractors would be very helpful in their efforts to oversee and administer the JOM program, including allowing them to share program information more effectively with all contractors. For example, BIE did not inform all contractors about four consultation sessions it was holding in July 2019 on a proposed rule to change JOM regulations because BIE did not have contact information for all contractors, according to a BIE official. As a result, some contractors may have missed the opportunity to participate in the consultation sessions. Two JOM school contractors we interviewed told us they were not informed by BIE about the consultation sessions that took place in their state. These contractors said they had to create their own networks of contractors to inform each other about JOM-related developments and events because they cannot rely on communication from BIE. In addition, BIE officials said that a complete and accurate list of contractors would help them determine the number of eligible JOM students, as mandated by the Modernization Act. In the two previous efforts to update the count, BIE relied on contractors to submit the number of eligible students they serve. However, BIE officials acknowledged that the last effort to complete a count in 2014 failed, in part, because some contractors never received any communication that BIE was conducting a count. As a result, these contractors never submitted a count of students. Without a systematic process for maintaining a complete and accurate list of contractors, BIE may continue to face barriers administering the program. BIE does not have a process for tracking and monitoring the timeliness of JOM disbursements to contractors. According to BIE officials, the bureau does not establish a target date for disbursing funds to JOM contractors. JOM contractors and BIA and BIE officials we interviewed said the disbursements of JOM funds to some contractors are routinely provided later than expected based on contractors’ past experience. For example, 27 school contractors did not receive a portion of their calendar year 2018 funding until September 2019, according to the BIA official primarily responsible for disbursing the contractors their funds. Further, some of these contractors did not receive any disbursement in the 2019 calendar year until August, months after funds are typically disbursed. Delays in disbursing funds can hinder contractors’ ability to effectively manage their JOM programs and serve students. For example, the three JOM school contractors we interviewed told us that delays in disbursements have negatively affected their ability to plan their JOM activities because they do not know when they will receive their funding. The contractors also said their JOM programs are not as robust as they could be because they regularly delay spending and retain prior disbursements to use in the following year in anticipation of future delays in disbursements. Even with these carry-over funds, contractors said they have had to delay JOM programs for students due to late disbursements of funds, which negatively affect students who depend on JOM for educational support. We were unable to determine the full extent to which Interior disburses JOM funds in a timely manner because BIE and other Interior offices do not track and monitor the timeliness of JOM disbursements to contractors. Federal internal control standards state that agency management should design control activities to achieve objectives and respond to risks, such as by comparing actual performance to planned or expected results and analyzing significant differences. BIE, however, has not established target disbursement dates for contracts and therefore has no standard against which to measure the timeliness of disbursements. Furthermore, BIE does not systematically track the time between receiving its appropriation and the disbursement of contractor funds. BIE officials acknowledged that establishing a target date for disbursing funds to contractors and tracking progress in meeting that date could help ensure funds are provided in a timely manner. In an effort to monitor the disbursement of contractor funds, BIE officials said they have recently started to track the balance of JOM funds at each Education Resource Center. However, they acknowledged that tracking the balance of funds has limited usefulness in tracking the timeliness of disbursements because the information about fund balances does not include whether or not individual contractors have received their funds. BIE officials said having more detailed information on the disbursement of JOM funds would be helpful to ensure funds are provided in a timely manner. In addition, we recently reported that funds associated with self- determination contracts and self-governance compacts for tribes, which include JOM funds, are not always disbursed in a timely manner. We recommended that the Assistant Secretary of Indian Affairs should establish a process to track and monitor the disbursement of funds to tribes that are associated with self-determination contracts and self- governance compacts. However, this recommendation does not address all JOM contractors because non-tribal contractors are not eligible for self-determination contracts or self-governance compacts, and not all tribal contractors receive JOM funds through these mechanisms. Without also establishing a process for tracking and monitoring the disbursement of JOM funds through multiple funding mechanisms, BIE does not have reasonable assurance that funds will be disbursed in a timely manner. BIE has not formally assessed the usefulness of the information it has collected from JOM contractors for over 25 years. One contractor questioned whether the information was useful for the agency’s administration of the program because they never received any feedback or comments from BIE about the information they submitted. The contractor said they spent a considerable amount of time completing their annual report, which totaled over 60 pages and included information and signatures from over 40 different Indian Education Committees that oversee local JOM programs funded by the contract. In addition, all four contractors we interviewed that submitted annual reports said the information requested in the forms could be streamlined. For example, BIE’s annual report form asks each school or project site to report both the “number of eligible students actually served” and “the number of students actually served.” No instructions are provided to distinguish between the two populations, and the contractors said the reported number is identical since students must be eligible to be served by JOM. All four contractors we met with that said they submitted an annual report and renewal application also told us the information collection forms were burdensome to complete. For example, they said the forms were difficult to fill out, in part because they are not compatible with computer word processing programs, and as a result, responses have to be handwritten or completed with a typewriter. All of the forms BIE uses to collect information from contractors subject to JOM reporting requirements are also out of date. For example, the JOM renewal application form expired in 1993, meaning the Office of Management and Budget’s (OMB) approval to collect the information has lapsed. Agencies are required to submit all proposed information collections to OMB for approval. OMB reviews the proposal to assess the need for collecting the information and whether its collection minimizes burden on the public, among other things. Federal internal control standards also state that management should have a process to continually identify information requirements. In a 2015 presentation, BIE officials recognized the need to update the outdated forms to reflect technological developments and reduce the paperwork burden for contractors, but no revisions to the forms have been made. BIE officials said they plan to update the JOM application and reporting documents through the formal OMB review and approval process, but they do not have a timeline for doing so. We have previously reported that outdated forms may not be necessary or useful and may be an unnecessary burden on the public. Until BIE updates the forms, some contractors will continue to struggle to complete them. Further, by assessing the usefulness of the information they are collecting from JOM contractors, BIE may identify opportunities to both collect information that could improve program management and streamline information requests. BIE has not provided or developed training for JOM contractors, according to BIE officials. National Johnson-O’Malley Association officials told us that BIE and BIA used to provide training that was helpful to JOM contractors on topics such as filling out annual reports and applications for JOM contracts, particularly to new staff managing these programs, but they no longer do so. A nonprofit organization for Indian education we interviewed also said JOM contractors need training on a range of issues, including how to complete JOM annual reports and other documentation, and on how to operate following implementation of the Modernization Act. According to the nonprofit organization, regular training on JOM is particularly important because certain aspects of the program, such as conducting annual assessments to determine the learning needs of Indian children served by the program, can be technically challenging. Officials from one tribal contractor we interviewed said the tribe provides its own training to school staff that implement local JOM programs on such topics as how to conduct Indian Education Committee meetings, how to fill out reimbursement claims, and how to organize and maintain financial records for program administrators and parents on Indian Education Committees. The contractor said that BIE training on topics, including how to conduct and how often to hold Indian Education Committee meetings, would be particularly helpful. Another tribal contractor we interviewed, which BIE data identified as receiving among the largest amount of JOM funds of all contractors, said that other contractors they interact with do not have sufficient program knowledge or resources to provide training and could benefit from BIE training. According to a BIE official, a former JOM Program Specialist, the need for training for JOM contractors is particularly important as there is frequent turnover among contractor staff responsible for administering programs. Officials from the nonprofit organization for Indian education also told us that high turnover rates among administrators of local JOM programs necessitates regular training for new staff. They added that more senior staff working on local JOM programs would also benefit from regular training because they may be implementing their programs inefficiently or ineffectively. BIE officials told us they have provided program updates and answered questions at conferences hosted by organizations representing JOM contractors. Not all contractors, however, are able to attend these conferences given their limited resources, according to three contractors we interviewed. Internal controls standards state that management should develop training based on the needs of individuals’ roles. BIE officials acknowledged that developing and providing training is needed, but they told us they are currently focused on other aspects of managing the JOM program and have not prioritized training. For example, the agency has set a goal in its strategic plan to develop a JOM program handbook by July 1, 2020. By providing training, BIE can ensure that contractors have the information they need to better serve their students. BIE has not clearly defined roles and responsibilities or identified the staff necessary for conducting critical JOM functions. According to federal internal control standards, management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. BIE’s lack of defining or identifying roles and responsibilities related to administering contracts, reviewing the appropriateness of contract types, and conducting program oversight is described in the following bullets. Administering contracts. BIE did not identify staff to administer some contracts, which has contributed to some JOM programs affected by these contracts going unfunded. According to BIE and BIA officials, BIE did not assign any staff to administer at least 20 contracts in California, including helping contractors renew their contracts when they expired, typically after 3 years. As a result, these contracts—totaling over $300,000—expired and were not renewed, disrupting JOM services. A BIE official informed us there were lapses in administering these contracts because BIE closed the office responsible for administering them as a result of its reorganization which began in 2014, and never assigned anyone to assume responsibility for the contracts associated with that office. BIE has not assessed whether similar lapses in coverage may have occurred in other states or regions. BIE officials identified the unallocated funds from California in September 2019. In October 2019, BIE officials began efforts to identify and contact officials responsible for all the JOM programs whose contracts lapsed in California due to gaps in BIE’s administration of the program and began the process to start new JOM programs in the future. However, without identifying staff to administer all JOM contracts, problems with renewing and awarding contracts may persist. Reviewing the appropriateness of contract types. Interior’s Office of the Solicitor does not have a role in reviewing the issuance of new JOM contracts, according to a senior attorney in that office. The Office of the Solicitor’s lack of a role in reviewing JOM contracts increases the risk that contracts are not used appropriately. For example, we found that BIE has been using self-determination contracts to disburse JOM funds to non-tribal contractors, which is not authorized by the Indian Self Determination and Education Assistance Act. Under the Act, only Indian tribes and tribal organizations are eligible to enter into self-determination contracts; these contracts may not be used for non-tribal entities, such as school districts and states. The use of self- determination contracts for contractors that are not eligible to receive them can result in costs to the government. Self-determination contracts include provisions that would not otherwise be included in non-tribal JOM contracts, according to a senior attorney in the Office of the Solicitor. For example, self-determination contracts may include contract support costs and extend the Federal Tort Claims Act to tribal government employees administering the federal program(s) under these contracts. Therefore, school contractors that were disbursed JOM funds through self-determination contracts may have received contract support costs and legal protections they would not have been eligible to receive, according to the senior attorney. BIE officials told us that they have not determined how long self- determination contracts have been used to disburse JOM funds to non-tribal entities, how many non-tribal contractors were awarded these contracts, or whether the government has incurred costs as a result of using the wrong types of contracts. They said this information will be difficult to obtain because it is not systematically collected. After we found that BIE was using self-determination contracts to disburse JOM funds to school contractors, a senior attorney in the Office of the Solicitor said that her office would provide assistance as requested to BIE in transitioning these contracts to appropriate contracts. By systematically including the Office of the Solicitor in the process for reviewing JOM contracts, BIE can ensure that its contracts are the appropriate type and can minimize the risk of future inappropriate costs to the federal government. Conducting JOM oversight activities. BIE has not defined the roles and responsibilities related to overseeing JOM programs or identified staff dedicated to this function. For example, BIE has not identified staff at Education Resource Centers or other BIE offices with the capacity to conduct site visits and review JOM annual reports submitted by contractors. As a result, the bureau’s oversight of JOM contractors is done on an ad-hoc basis and sometimes not done at all, according to BIE officials. For example, in an internal memo addressed to BIE’s Director, a senior BIE official said that because the bureau has not identified staff with the capacity to conduct site visits, most Education Resource Centers have not conducted any site visits in at least 5 years. Officials from one tribal JOM contractor that said it is subject to BIE oversight told us that BIE has not conducted a site visit of their program in 10 years. They noted that BIE’s past site visits resulted in recommendations that improved their program activities and procedures and changed how they defined student eligibility. In addition, the head of an Education Resource Center said that JOM oversight activities are collateral duties that his staff do not have time to fulfill. Further, the responsibilities of officials who are charged with overseeing JOM programs have not been clearly defined. For example, BIE has not defined the responsibilities related to conducting site visits, such as what aspects of the program should be reviewed and which contractors should be selected for site visits. This lack of clearly defined responsibilities has resulted in inconsistencies in how officials are conducting oversight activities and potential gaps in coverage of contractors that are subject to oversight. BIE’s lack of oversight may also increase the risk of misuse and abuse of JOM funds. According to Interior’s Office of Inspector General, there have been three identified cases of theft related to the JOM program that occurred between 2004 and 2010. For example, a program coordinator of a JOM contract stole program funds as part of an embezzlement fraud scheme and was ordered to pay nearly $36,000 in restitution. By identifying staff who have the capacity to carry out oversight activities and clearly defining related responsibilities such as conducting site visits and reviewing JOM annual reports, BIE could provide support to contractors in improving their program activities and procedures and reduce the risk of potential fraud and abuse of JOM funds. Senior BIE officials acknowledged that they have not identified the staff necessary for conducting these critical JOM functions and, in November 2019, the Director of BIE approved hiring three additional JOM specialists. The core responsibilities of the new specialist positions, according to a knowledgeable BIE official, will be to support the administration of contracts, oversee contractors, and provide technical assistance. However, the exact roles and responsibilities for the new employees and the extent to which BIE staff in the Education Resource Centers will continue their role in providing programmatic support have not yet been determined. An official knowledgeable about the new JOM specialist positions added that defining the specific roles and responsibilities for these positions will be an iterative process in which BIE will assess the new staffs’ capacity to assume all the JOM responsibilities that are currently assigned to other staff. Until all the roles and responsibilities related to JOM program management have been identified and clearly defined, challenges in administering contracts, reviewing the appropriateness of contract types, and overseeing the program may persist. American Indian and Alaska Native students have unique educational and cultural needs, which can include learning Native languages, cultures, and histories, and obtaining additional academic support. The JOM program is intended to address these needs that may not otherwise be provided through the public school system. BIE plays a critical role in administering the JOM program, which is central to the bureau’s mission of providing Indian students quality education opportunities starting in early childhood in accordance with a tribe’s needs for cultural and economic well-being. However, BIE lacks key JOM program information necessary for effective oversight, including complete information on which contractors are participating in JOM. BIE also has not assessed the usefulness of the information it collects from contractors, and relies on outdated forms to collect data. Without improved program data, BIE cannot effectively oversee the program. In addition, BIE does not provide training for JOM contractors. This lack of training may result in contractors misinterpreting JOM regulations and managing their programs inconsistently. Further, BIE has not clearly defined the roles and responsibilities of staff involved in administering the JOM program, which has resulted in gaps in program management and oversight. Until staff roles and responsibilities are clearly defined and identified, gaps in managing and overseeing the program may persist, resulting in an increased risk of potential misuse or abuse of JOM funds. Without taking steps to improve the management and oversight of the JOM program in these key areas, BIE cannot ensure that the program is truly serving the educational needs of eligible American Indian and Alaska Native students. We are making the following five recommendations to Interior: The Director of the Bureau of Indian Education should develop a systematic process for identifying JOM contractors and maintaining an accurate and complete list of contractors and other relevant information about contractors, such as the amount of JOM funds they receive and their current points of contact. (Recommendation 1) The Director of the Bureau of Indian Education, in coordination with the Bureau of Indian Affairs as needed, should establish a process to track and monitor the timeliness of JOM disbursements to non-tribal contractors, including identifying a target date for disbursing funds to these contractors. (Recommendation 2) The Director of the Bureau of Indian Education should develop a timeline to assess the usefulness of the information they are collecting from JOM contractors and update JOM information collection forms, including converting them to an electronic format to reduce the burden on contractors to complete them. (Recommendation 3) The Director of the Bureau of Indian Education should develop and provide training to contractors on administering the JOM program. (Recommendation 4) The Director of the Bureau of Indian Education should clearly define the roles and responsibilities and identify the staff necessary for conducting critical JOM functions, including administering contracts, reviewing the appropriateness of contract types, and overseeing those contractors that are subject to BIE oversight. (Recommendation 5) We provided a draft of this report to Interior for review and comment. We also provided relevant report sections to and requested technical comments from the National Indian Education Association and the National Johnson-O’Malley Association. In its comments reproduced in appendix I, Interior concurred with our five recommendations and described actions BIE and BIA plan to take to address them. In our draft report, we recommended that BIE needs to clearly define the roles and responsibilities and identify the staff necessary for conducting technical assistance, among other critical JOM functions. We removed reference to technical assistance from our report because, after we provided our draft report, Interior promulgated new, final JOM program regulations that include a new process for requesting and providing technical assistance. We did not receive any comments from the nonprofit organizations. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Interior, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Beth Sirois (Assistant Director), Brian Schwartz (Analyst-in-Charge), Ben DeYoung, and Alex Galuten made key contributions to this report. Additional assistance was provided by Edward Bodine, Gina M. Hoover, Thomas M. James, Grant M. Mallie, Sheila R. McCoy, Anna Maria Ortiz, Jeanette M. Soares, Joy K. Solmonson, Curtia O. Taylor, and William T. Woods.", "summary": "American Indian and Alaska Native students enrolled in public schools have performed consistently below other students on national assessments from 2005-2019. The JOM program provides academic and cultural supports, through contracts, to meet the specialized and unique educational needs of American Indian and Alaska Native students enrolled in public schools and select private schools. In fiscal year 2019, Interior allocated about $23 million for the JOM program, according to Interior's budget documentation. GAO was asked to review issues related to Interior's JOM program, administered by BIE. This report examines the extent to which BIE (1) has key program information, (2) provides training to JOM contractors, and (3) clearly defines and identifies JOM roles and responsibilities. GAO reviewed relevant federal laws, regulations, and both BIE and JOM contractor documents; analyzed existing data and information on JOM; and interviewed agency officials, five JOM contractors of different types, and two nonprofit organizations selected for their knowledge of the JOM program. The Department of the Interior's (Interior) Bureau of Indian Education (BIE) does not have key information to manage the Johnson-O'Malley (JOM) program which provides supplemental education services to meet the specialized and unique needs of American Indian and Alaska Native students. For example, BIE does not maintain a complete and accurate list of all its JOM contractors, who provide services including targeted academic supports, Native language classes, and cultural activities. In May 2019, BIE began to identify all the contractors, but officials acknowledged that their list is still incomplete, and GAO found problems with the list, such as duplicate entries. Federal internal control standards state that an agency should have relevant, reliable information to run its operations. Maintaining a complete list of contractors would improve BIE's administration of the JOM program. BIE does not provide any training for JOM contractors. For example, BIE does not provide training to contractors on how to effectively manage their JOM programs or meet program requirements. By providing training for contractors, BIE could ensure that contractors understand the program and are equipped to provide services to meet the educational needs of their students. In addition, BIE has not clearly defined the roles and responsibilities or identified the staff needed to effectively administer the JOM program (see figure). For example, when BIE closed a field office in California, staff were not identified to administer the office's contracts, including helping contractors renew their contracts when they expired. Also, BIE has not identified a role for Interior's attorneys in reviewing the contracts and some contractors have types of contracts for which they are not eligible. Further, BIE has not identified staff to conduct consistent program oversight, which is important to mitigating the risk of misuse and abuse of JOM funds. Until all JOM roles and responsibilities have been defined and identified, challenges may persist. GAO is making five recommendations, including that the Director of BIE should maintain an accurate and complete list of JOM contractors, develop JOM training, and clearly define roles and responsibilities and identify staff for carrying out JOM functions. Interior agreed with the recommendations.", "document_type": "gao"}
{"report": "DOD officials identified three key department-wide initiatives that include a number of cybersecurity practices aimed at improving cyber hygiene: the DC3I, the CDIP, and the Cyber Awareness Challenge training. These efforts recognize the importance of command leadership, best practices for DOD network users, and technical countermeasures against cybersecurity threats. DC3I. In September 2015, the Secretary of Defense and the Chairman of the Joint Chiefs of Staff signed the DC3I in an effort to transform DOD cybersecurity culture by enabling and reshaping leaders, cyber providers, personnel who perform cyberspace operations, and general users to improve individual human performance and accountability on DOD’s network. The DC3I memorandum identifies 11 tasks assigned to various DOD components to respond to and implement across the department— such as the development of cybersecurity training briefs for DOD leadership, integration of cybersecurity into operational training and exercises, and the development of a resourcing plan to support scheduled inspections of units conducting cyberspace operations. From September 2015 to December 2016, U.S. Cyber Command was initially responsible for ensuring that relevant components implemented the DC3I. In December 2016, the Deputy Secretary of Defense assigned the DOD CIO as the official responsible for ensuring that components implemented the initiative because, in part, the DOD CIO has DOD-wide oversight authority. CDIP. The CDIP is one of seven actions identified in DOD’s Cybersecurity Campaign to prompt commanders and senior leaders to enforce full cybersecurity compliance and accountability across the department. In October 2015, the Deputy Secretary of Defense signed the CDIP to reinforce basic cybersecurity technical requirements identified in policies, directives, and orders as a means to defend DOD information networks, secure DOD data, and mitigate risks to DOD missions. The CDIP memorandum identifies 17 tasks for all commanders and supervisors to implement across the department. These tasks include removing operating system software that no longer receives security updates from vendors, configuring servers consistent with DOD guidance on secure configurations, and addressing vulnerabilities for servers and network infrastructure in a timely manner. Cyber Awareness Challenge Training. This training is intended to help the DOD workforce (including service members, civilians, and contractors) to maintain awareness of known and emerging cybersecurity threats, reinforce best practices to keep information and information systems secure, and ensure that network users stay abreast of changes in DOD cybersecurity policies. DISA develops the training content and periodically updates the training. In addition, the Cyber Workforce Advisory Group that includes officials from the DOD CIO, DISA, and DOD components, solicit input about ways to improve the training and meets annually to approve updates to the Cyber Awareness Challenge. Federal law and a DOD initiative and strategy highlight the important role of leadership in improving cybersecurity culture and performance across the department. For example, the Federal Information Security Modernization Act of 2014 (FISMA) requires agency heads—including the Secretary of Defense—to ensure that senior agency officials provide security for the information and information systems that support the operations and assets under their control. Additionally, the DC3I states that leaders will be held accountable by the chain of command for the cybersecurity performance of their organization and the individuals who comprise it, and for the role cybersecurity performance plays in accomplishing assigned missions. It also states that leaders will set an example and help individuals master appropriate cyber behavior, will take action against those who commit gross negligence or errors of commission, and may use all available means, both legal and administrative, as they deem appropriate. Further, the 2018 DOD Cyber Strategy states that reducing the department’s network attack surface (i.e., the different points in a network where attackers can try to enter or extract information) requires an increase in cybersecurity awareness and accountability across the department. The strategy also states that the department would hold DOD personnel accountable for their cybersecurity practices and choices. The 2019 Cybersecurity Readiness Review, directed by the Secretary of the Navy, describes best practices for effective cybersecurity leadership. These best practices, according to the readiness review, require Navy leaders to be informed on cybersecurity issues facing their organization, engaged in ensuring cybersecurity issues are addressed, and hold their organization accountable for cybersecurity performance. A number of DOD officials and components have key roles and responsibilities for cybersecurity, including the three key cyber hygiene initiatives. For example: Secretary and Deputy Secretary of Defense. FISMA makes the Secretary of Defense responsible for providing information security protections commensurate with the risk and magnitude of harm facing the department. In addition, Executive Order 13800, issued in May 2017, aligns with FISMA by holding agency heads accountable for implementing risk management measures commensurate with the risk and magnitude of the harm that would result from unauthorized access, use, disclosure, disruption, modification, or destruction of IT and data. DOD Chief Information Officer. FISMA requires DOD to develop, document, and implement a program to provide security for information and information systems (commonly referred to as a cybersecurity program) and directs the Secretary of Defense to delegate to the DOD CIO (and military department CIOs) authority to ensure compliance with the law. In addition, the DOD CIO is responsible for overseeing implementation of the three key cyber hygiene initiatives. DOD Component heads. DOD component heads are responsible for ensuring that IT under their purview complies with DOD Instruction 8500.01. In addition, component heads are responsible for ensuring that their network users complete annual security awareness training. DOD Component CIOs. DOD component CIOs are responsible for developing, implementing, maintaining, and enforcing a component cybersecurity program on behalf of their respective component heads. In doing so, component CIOs are responsible for ensuring that their components implement the CDIP tasks. Chairman of the Joint Chiefs of Staff. The Chairman of the Joint Chiefs of Staff is responsible for advising the President and Secretary of Defense on operational policies, responsibilities, and programs. The Chairman also assists the Secretary of Defense in implementing operational responses to cyber threats and ensures cyberspace plans and operations are compatible with other military plans and operations. The staff members who support the Chairman of the Joint Chiefs of Staff are referred to as the Joint Staff, which is comprised of members from all of the military services. U.S. Cyber Command. The Commander of U.S. Cyber Command has the mission to direct, synchronize, and coordinate cyberspace planning and operations to defend and advance national interests in collaboration with domestic and international partners. In addition, the Commander is responsible for, among other things, issuing orders and directives to all DOD components for the execution of global operations aimed at securing and defending the department’s networks. Defense Information Systems Agency. The Director of DISA is responsible for developing, implementing, and managing cybersecurity for the department’s network and works with other components to secure DOD systems. For example, the Director is responsible for developing cybersecurity awareness training for all users on DOD’s network. JFHQ-DODIN. The Commander of JFHQ-DODIN is responsible for, among other things, commanding, controlling, planning, directing, coordinating, integrating, and synchronizing DOD defensive cybersecurity operations. JFHQ-DODIN also performs two types of cyber readiness inspections to ensure DOD units comply with requirements related to network security and to evaluate the ability of units to accurately detect and mitigate vulnerabilities and anomalous activity on DOD’s network. The security of federal cyber assets has been on our High-Risk List since 1997. In September 2018, we issued an update to this high-risk area that identified actions needed to address cybersecurity challenges facing the nation—including improving implementation of government-wide cybersecurity initiatives aimed at securing federal systems and information. We also have identified ensuring the cybersecurity of the nation as one of nine high-risk areas that need especially focused executive and congressional attention. In August 2017, we reported on DOD’s progress in implementing the department’s cyber strategies. We found that DOD had implemented the cybersecurity elements of the DOD Cloud Computing Strategy and had made progress in implementing the 2015 DOD Cyber Strategy and DOD Cybersecurity Campaign, which was comprised of multiple initiatives including the CDIP. However, DOD’s process for monitoring implementation of the DOD Cyber Strategy resulted in the closure of tasks before they were fully implemented. We also found that DOD lacked a timeframe and process for monitoring implementation of the DOD Cybersecurity Campaign objective to transition to commander-driven operational risk assessments for cybersecurity readiness. We recommended that DOD (1) modify criteria for closing tasks as implemented and reevaluate tasks previously determined to be completed to ensure they meet modified criteria and (2) establish a timeframe and monitor implementation of the DOD Cybersecurity Campaign objective to develop cybersecurity readiness assessments to help ensure accountability. DOD partially concurred with both recommendations. As of January 2020, neither recommendation had been implemented. DOD has not fully implemented its three cyber hygiene initiatives. Specifically, (1) the DOD CIO and DOD components have not implemented seven of the 11 DC3I tasks due in fiscal year 2016; (2) DOD has implemented six of 10 CDIP tasks that the DOD CIO oversees and does not know the extent that seven other CDIP tasks are implemented; and (3) DOD did not know the extent to which users for selected components completed the Cyber Awareness Challenge training in 2018 and one component did not use the required training. In addition, the department does not know the extent that cyber hygiene practices to protect its networks from key cyberattack techniques have been implemented. DOD has not implemented seven of the 11 DC3I tasks despite fiscal year 2016 deadlines for each of the tasks being established by the department. In particular, DOD components have implemented four DC3I tasks and have not implemented the seven remaining tasks, as shown in figure 1. As shown above, DOD has implemented four DC3I tasks. For example, DOD CIO implemented a task that requires that office to assess the effect of cyber workforce shortfalls on DOD’s mission and provide recommendations to address these shortfalls (task 10 in figure 1 above). Specifically, in April 2019, DOD CIO provided a plan to the Office of Personnel Management to address cyber workforce shortages by filling vacant positions, enhancing outreach and recruitment, and expanding on hiring authorities. However, DOD has not implemented the remaining seven DC3I tasks. For example: DOD has not fully implemented leadership cybersecurity training briefs (task 1). In April 2016, U.S. Cyber Command developed two training briefs to be used in leadership training. However, as of October 2019, DOD components have not received either training brief, according to DOD officials. In September 2016, U.S. Cyber Command provided the Deputy Secretary of Defense a DC3I status report and informed him that two products were developed to address this task and that they would be disseminated to DOD components. However, as of October 2019, neither U.S. Cyber Command nor the Office of the DOD CIO had disseminated these leadership training briefs across the department, according to DOD officials. In reviewing the training briefs, we found that, if they had been incorporated into DOD leadership training, leaders would have been better positioned to address cybersecurity risks. For example, they may have learned, among other things, how to understand, assess, and interpret cyber-reportable events and incidents and how they affect military operations. DOD has not developed cyber-provider training (task 2). In February 2019, the office of the DOD CIO completed a review of all military and civilian IT positions to identify the work roles of all cyber providers in the department. However, the office has not developed educational and training requirements for cyber providers. DOD CIO officials told us that, consistent with task 2, they are drafting a DOD Manual, Cyber Workforce Qualification and Management Program, which would document educational and training requirements for the work roles for each cyber provider. DOD CIO officials expect to complete the manual around April 2020. DOD has not fully implemented criteria for assessing cybersecurity in operational training and exercises (task 5). In March 2016, the Joint Staff developed criteria for assessing military service and combatant command efforts to integrate cybersecurity into operational training and exercises. For example, the Joint Staff developed a checklist of cybersecurity elements that should be included in cyberspace-related training objectives and assessed during training events. In May 2016, the Vice Chairman of the Joint Chiefs of Staff required that the criteria be used to assess military service and combatant command efforts to integrate cybersecurity into operational training and exercises. In May 2019, Joint Chiefs of Staff officials told us the criteria was not incorporated into the Chairman’s annual training guidance, citing personnel turnover, and that they do not have plans to incorporate the criteria. According to the DC3I, operational and tactical commanders and leaders need to interpret the effect that cyber insecurity may have on the mission and integrate cyber effects into mission planning. If Joint Staff had updated the Chairman of the Joint Chiefs of Staff guidance for operational training, DOD commanders would have had criteria they could use to assess the effect that cyber insecurity may have on military missions. The lack of progress in implementing the tasks occurred, in part, because the DOD CIO did not take steps to ensure that the DC3I tasks were implemented. DOD CIO officials told us they were not aware of their responsibility to oversee implementation of the DC3I. Initially, U.S. Cyber Command was assigned as the entity responsible for overseeing implementation of the DC3I; however, in December 2016, the Deputy Secretary of Defense approved the transition of the DC3I mission lead to the department’s CIO. According to this transition memorandum, the CIO was to leverage existing authorities and departmental efforts to lead and provide oversight of cybersecurity culture and compliance transformation. Additionally, DOD CIO officials told us that the office is focusing its resources on other CIO initiatives, such as implementing the cyber landscape initiative. However, the DC3I included a task (task 11 in figure 1 above) that required an assessment of the resources needed to ensure that DOD implemented the DC3I and this task had not been completed at the time of our review. If DOD CIO does not take appropriate steps to ensure that the DC3I tasks are implemented, the department risks compromising the confidentiality, integrity, and availability of mission-critical information as a result of human error by users on the department’s networks. Since 2015, DOD has implemented six of 10 CDIP tasks that the DOD CIO is to oversee, but has not achieved desired performance targets for the remaining four tasks even though there is a requirement to implement all 10 by the end of fiscal year 2018. In the 2015 CDIP memorandum, the Deputy Secretary of Defense directed DOD components to implement all 17 CDIP tasks for all system users, IT hardware, and IT software to remove preventable vulnerabilities from DOD’s network that could allow adversaries to compromise information and information systems. According to a March 2019 memorandum, the Deputy Secretary of Defense challenged the department to achieve 90 percent implementation of the 10 CDIP tasks overseen by DOD CIO by the end of fiscal year 2018. In table 1, we list the 17 tasks and indicate the 10 tasks that the department’s CIO oversees. The department has achieved its performance targets for six of the 10 CDIP tasks that the DOD CIO oversees. For example, in October 2018 DOD achieved its performance target for one task that requires the department to move all of DOD’s web servers into a DOD “demilitarized zone,” or DMZ, according to DOD’s fiscal year 2018 Federal Information Security Modernization Act report to the director of the Office of Management and Budget. Placing these web servers in a DMZ directs web traffic intended for those servers—including malicious traffic—to systems within perimeter firewalls that screen the traffic before allowing access to organizations networks. By implementing the task and moving 11,000 web servers into the DMZ, DOD has reduced the risk that malicious traffic can reach its web servers. However, the department has not achieved the department-wide goal for the four remaining CDIP tasks overseen by DOD CIO. For example, DOD did not achieve its performance target for a task that required components to ensure they were compliant with endpoint security guidance. DOD CIO officials told us that the remaining four CDIP tasks are challenging for the department to achieve the 90 percent performance target because some DOD components use aging information technology systems and these older systems may not be equipped to implement all CDIP tasks. We have previously reported that legacy systems have operated with known cybersecurity vulnerabilities that are either technically difficult or prohibitively expensive to address. In light of the security risks posed by DOD component legacy systems, we stated that it is imperative that agencies carefully plan for their successful modernization. DOD did not achieve the 90 percent goal for four of the 10 CDIP tasks by the end of fiscal year 2018 due in part to DOD components not developing plans with scheduled completion dates to implement these four tasks, according to DOD officials. DOD CIO officials told us that they had not required DOD components to develop plans with scheduled completion dates for the remaining four CDIP tasks. CIO officials believed that the DOD components would implement the CDIP memorandum since it was signed by the Deputy Secretary of Defense and it required them to report on their progress in implementing the CDIP tasks. While the Deputy Secretary of Defense did require DOD components to implement these four tasks and report on their progress, components have not achieved performance targets. If DOD components do not develop plans with scheduled completion dates to implement the remaining four CDIP tasks, the department may fail to remove preventable, well-known vulnerabilities from its network and may allow adversaries to compromise the confidentiality, integrity, or availability of sensitive information and information systems. DOD does not know the extent to which components have implemented the seven CDIP tasks that the CIO does not oversee because the responsible components have not reported on their progress, according to DOD officials. For example, DOD has not reported on the extent to which components have disabled hyperlinks to websites that users receive in email messages. Disabling hyperlinks in email messages can help to prevent phishing attacks. DISA officials told us that the agency implemented a security protocol that disables these hyperlinks in DISA’s email server. Consequently, DOD components that use DISA’s email service are compliant with this task’s requirement; however, not all DOD components use DISA’s email service and the extent to which other email services comply with this task is unknown. The CDIP memorandum signed by the Deputy Secretary of Defense stated that the department’s progress in implementing all CDIP tasks would be reported. However, the department has not reported on the progress it has made implementing the seven CDIP tasks that the CIO does not oversee in part because the Deputy Secretary of Defense did not identify, in the CDIP memorandum, a component to oversee the implementation of these tasks and report on their progress. According to DOD CIO officials, some of these seven tasks are more tactical and may be more appropriately tracked at echelons below the office of the DOD CIO. For example, one of these seven tasks requires that commanders ensure the physical security of their network infrastructure devices. We agree that lower echelons may more effectively track the progress of some tasks; however, information about the progress that components make implementing these tasks is not reported to the CIO or any other DOD component, according to DOD officials. In addition, DOD CIO officials told us that JFHQ-DODIN collects some information from inspections it performs to verify the extent that inspected units implement technical guidance documents, some of which relate to these seven CDIP tasks. However, according to DOD officials, JFHQ-DODIN does not report this information to the CIO or any other DOD component. In addition, JFHQ-DODIN inspects a sample of DOD units and therefore does not have information about the status of these tasks across the department. For those units that are inspected, no DOD component is aggregating data from these inspections to identify the extent to which these seven tasks are implemented. If the Deputy Secretary of Defense does not identify a DOD component to oversee the implementation of the seven CDIP tasks that DOD CIO does not oversee and report on progress implementing them, the department will have less assurance that cybersecurity vulnerabilities are being addressed in a timely manner and systems are being securely configured. The 16 selected components we included in our sample did not always collect information on the number of users (1) that completed the fiscal year 2018 Cyber Awareness Challenge training, (2) that did not complete the training, and (3) whose network access was revoked for not completing the cyber awareness training. Specifically: Unknown number of users that completed the cyber awareness training. Two of the 16 did not collect information on the number of users that completed the fiscal year 2018 Cyber Awareness Challenge training. In particular, the Army and the Defense Finance and Accounting Service could not provide data on the extent that users had taken the required training in fiscal year 2018. Unknown number of users that did not complete the cyber awareness training. Six of the 16 components did not collect information on the number of users that did not complete the cyber awareness training. In particular, the Navy, Air Force, Marine Corps, U.S. European Command, and the Defense Media Activity did not collect information on the users who did not complete the training in fiscal year 2018. In addition, the Army’s training compliance system did not have records for all Army users in 2018, which limited the Army’s ability to determine if all of its users completed the fiscal year 2018 Cyber Awareness Challenge training. Unknown number of users whose network access had been revoked for not completing the required training. Eight of the 16 components that we contacted did not collect data on the number of users whose network access had been revoked for not completing the required training, as implied by DOD policy. Selected DOD components did not know the extent to which their network users implemented the 2018 Cyber Awareness Challenge training by completing it because the DOD component heads did not ensure that their respective components were accurately monitoring and reporting the necessary information. Navy officials told us that they believed it was not DOD or the military service’s policy for the service headquarters to track whether their network users had completed the training. According to Navy officials, there is also no value for large organizations like the Navy, with over 600,000 users, to track and report these data at the headquarters level. However, DOD policy requires all network users to take the Cyber Awareness Challenge training annually. In addition, DOD policy states that all individuals with network access must complete this training to retain access. NIST also advises that agencies capture training compliance data at an agency level, so data can be used to conduct agency-wide analysis and reporting. Multiple DOD policy and guidance documents—including DOD Manual 8570.01-M, and Chairman of the Joint Chiefs of Staff Instruction 6510.01F—state that the DOD component heads are responsible for ensuring that users complete the Cyber Awareness Challenge training and two of these documents require recording training compliance. For example, according to DOD Manual 8570.01-M, Information Assurance (IA) Workforce Improvement Program, components must document and maintain the status of awareness compliance for each user. Further, service policy and guidance places the responsibility on the DOD component heads or senior-level leaders at the headquarters’ level for ensuring that cybersecurity training is completed and documented. For example, Secretary of Navy Instruction 5239.3C, Department of Navy Cybersecurity Policy (May 2, 2016), states that the Chief of Naval Operations and the Commandant of the U.S. Marine Corps shall ensure all authorized users of Department of Navy information systems and networks receive initial cybersecurity awareness orientation as a condition of access and, thereafter, complete annual refresher training, monitor and report workforce cybersecurity training and maintain supporting records. Similarly, Army Regulation 25-2, Army Cybersecurity (Apr. 4, 2019), states that the Deputy Chief of Staff, G3/5/7 is responsible for ensuring that cybersecurity training is integrated and conducted throughout the Army. If the DOD component heads do not ensure that their respective components accurately monitor and report information on the extent that users have completed the Cyber Awareness Challenge training—as well as have access revoked for not completing the training—the components may be unable to ensure that DOD users are trained in the steps needed to address cybersecurity threats to the department. One of the 16 selected components in our review—DARPA—did not require its users to take DOD’s Cyber Awareness Challenge training, according to DARPA officials, even though it is required by policy. Instead, DARPA has required its users to take cybersecurity training that it developed. While DARPA developed its own training program, we found that this training program did not address all of the requirements identified in a DOD staff manual or the cybersecurity training topics identified by the Cyber Workforce Advisory Group. DARPA officials recognized that its cybersecurity training was not equivalent to the DOD’s Cyber Awareness Challenge training program, which according to DOD CIO officials, addressed the training topics identified by the DOD Cyber Workforce Advisory Group. They explained that DARPA designs its courses to be concise to allow their personnel to focus on accomplishing the agency’s mission and that users can obtain additional information from references cited in the course materials. In addition, these officials told us that they were unaware their users were required to take the Cyber Awareness Challenge training that DISA developed. The DOD CIO is responsible for overseeing the implementation of the Cyber Awareness Challenge training, according to DOD CIO officials. However, DOD CIO officials told us they were not aware that DARPA has not required its users to take the Cyber Awareness Challenge training that DISA developed and they did not assess the extent that components complied with the requirement for components to use the DISA- developed training. If the DOD CIO does not ensure that DARPA and any other DOD components take the Cyber Awareness Challenge training developed by DISA, users in these components may take actions that lead to or enable exploitations of DOD information systems. DOD identified key techniques that adversaries use most frequently and that pose significant risk to the department’s networks and identified cyber hygiene practices to protect the department’s networks from these techniques. Specifically, JFHQ-DODIN has identified the cyberattack techniques that the agency observes adversaries using most frequently to attack the department’s networks. In addition, the National Security Agency, the Defense Information Systems Agency, and the DOD CIO identified 177 cyberattack techniques and prioritized the techniques according to the level of risk each posed to the department’s networks. The agencies prioritized the techniques using various criteria including the prevalence of the technique and whether the department could detect the use of the technique. Further, the department has established cyber hygiene practices to mitigate most of the frequently occurring techniques and those that the department identified as the highest priority, according to DISA and JFHQ-DODIN officials. However, the department does not know the extent that these cyber hygiene practices have been implemented across the department to protect its networks from these key cyberattack techniques. Components have visibility of the extent that they have implemented practices within their component, according to DOD officials. For example, DISA officials told us that they require their component to implement cyber hygiene practices to protect DOD networks from key cyberattack techniques and are able to determine the extent that those practices are implemented within DISA. However, no component or office within the department has complete visibility of the department’s efforts to implement these protective practices across the department, according to DOD officials. FISMA states that agency heads shall be responsible for, among other things, providing information security protections commensurate with the risk and magnitude of harm that could result from unauthorized access, use, disclosure, disruption, modification or destruction of such information systems. Executive Order 13800 states that agency heads will be held accountable for managing cybersecurity risk to their enterprises. The order requires agency heads to use the NIST’s Framework for Improving Critical Infrastructure Cybersecurity (commonly referred to as the NIST Cybersecurity Framework) to manage their agency’s cybersecurity risk. The Cybersecurity Framework calls for senior executives to monitor cybersecurity risk in the same context as financial risk and other organizational risks. In doing so, the Cybersecurity Framework calls for agencies to, among other things, assess cybersecurity risks (including threats), prioritize cybersecurity outcomes and requirements based on that risk, and establish processes to assess and monitor the implementation of the cybersecurity outcomes and requirements. The department does not know the extent that practices to protect DOD networks from key cyberattack techniques have been implemented across the department in part because no DOD component monitors the extent to which such practices are implemented, according to DOD officials. Officials from JFHQ-DODIN told us that they are able to detect when adversaries are using techniques to attack the department’s networks. However, detecting an attack after it has commenced may still enable an adversary to inflict harm on the department’s networks and the information therein. If the Secretary of Defense does not direct a component to monitor the extent to which practices to protect its network are implemented, gaps in protection could go undetected. These gaps can jeopardize military operations, performance of critical functions, and protection of information within DOD systems and networks. DOD requirements and best practices recognize that senior DOD leaders need key information to make risk-based decisions. Specifically, the DC3I memorandum requires the commander of U.S. Cyber Command, in coordination with the DOD CIO, to provide quarterly updates to the Deputy Secretary of Defense and the Vice Chairman of the Joint Chiefs of Staff on the progress in implementing the DC3I. Further, the CDIP memorandum requires the department to report progress implementing the CDIP tasks. In addition, NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program, states that the CIO should ensure that agency heads and senior managers are informed of the progress of the security awareness and training program’s implementation. Senior DOD leaders receive two recurring reports on the department’s cybersecurity posture that include information on one cyber hygiene initiative. Specifically, the Cyber Hygiene Scorecard (Scorecard) is a report measuring compliance with DOD cybersecurity policies, procedures, standards and guidelines. The Scorecard provides information to the Secretary of Defense, the Deputy Secretary of Defense, and DOD component heads about the extent that the 10 CDIP tasks overseen by the DOD CIO are implemented. In addition, the Cyber Landscape Report is a quarterly report that includes information highlighting cybersecurity risks to DOD networks, U.S. critical infrastructure, DOD weapon systems, the cloud, and DOD’s cyber workforce. Based on our analysis, the Cyber Landscape Report also includes some information from the CDIP initiative. However, senior DOD leaders have not received information on the other two cyber hygiene initiatives or cyber hygiene practices to protect DOD networks from key cyberattack techniques in these recurring reports. Specifically, neither the Scorecard nor the Cyber Landscape Report includes information on the extent that the DC3I and the Cyber Awareness Challenge training have been implemented. In addition, neither of these recurring reports identifies key cyberattack techniques the department faces nor do they include information on the extent that the department has implemented cyber hygiene practices to protect DOD networks from these techniques, according to DOD officials. Senior DOD leaders are not receiving complete information in part because the DOD CIO has not assessed the extent that the missing information could improve senior leaders’ ability to make risk-based decisions. According to DOD officials, DOD CIO has not revised the recurring reports or developed a new report in response to such an assessment. DOD CIO officials told us that they do not believe that senior DOD leaders need to be made aware of all cyber hygiene topics we describe here—and in some cases that information could be managed at lower echelons within the organization. While some cyber hygiene information could be managed by lower-echelon DOD leaders, the DC3I memorandum requires information about its progress to be reported to senior leaders. The NIST guidance calls for similar reporting. Additionally, a DOD official told us that the department uses the Cyber Hygiene Scorecard to respond to the department’s requirement to annually report progress on implementing its information security program to the Office of Management and Budget under FISMA. Further, these officials told us that the Scorecard was not originally designed to include the information from our analysis such as information about the DC3I. They told us that this Scorecard was designed to provide an oversight tool to monitor the progress components made implementing the CDIP tasks overseen by DOD CIO. However, while DOD uses the Scorecard with the intention to meet the FISMA annual reporting requirement, the Scorecard does not provide information about 53 of the 69 risk-management FISMA indicators that are called for by the Office of Management and Budget. In addition, DOD CIO is not precluded from revising the Scorecard to include additional information. As one of two recurring reports sent to senior DOD leaders, the Cyber Hygiene Scorecard may be well positioned to provide additional information reflecting progress made implementing cyber hygiene initiatives and associated cybersecurity practices, including the DC3I and efforts to protect DOD networks from the key cyberattack techniques used by adversaries. Further, a DOD CIO official told us that its officials did not include information about the DC3I in the Cyber Hygiene Scorecard because they believed it would be challenging to measure the culture-related objectives in the DC3I. While the DC3I’s culture-related objectives may be difficult to measure, the extent to which assigned DOD components have taken actions to implement the DC3I tasks is measurable. If the DOD CIO does not assess the extent that the missing information could improve senior leaders’ ability to make risk-based decisions—and does not follow up to revise the recurring reports or develop a new report—senior DOD leaders will not be positioned well to make effective and risk-based decisions and manage cybersecurity risks. As DOD has become increasingly reliant on IT systems and networks to conduct military operations and perform critical functions, risks to these systems and networks have also increased because IT systems are often riddled with cybersecurity vulnerabilities—both known and unknown. These vulnerabilities and human error can facilitate security incidents and cyberattacks that disrupt critical operations; lead to inappropriate access to and disclosure, modification, or destruction of sensitive information; and threaten national security. DOD has taken actions to address cyber vulnerabilities in the department through establishing the DC3I, the CDIP, the Cyber Awareness Challenge training, and cyber hygiene practices to protect its networks from cyberattack techniques that adversaries may use. However, the department faces challenges implementing the DC3I and CDIP because the DOD CIO has not taken appropriate steps to ensure that the DC3I tasks are implemented, DOD components have not developed plans with scheduled completion dates to implement the remaining four CDIP tasks overseen by DOD CIO, and the Deputy Secretary of Defense has not identified a DOD component to oversee the implementation of the seven other CDIP tasks and report on progress implementing them. By improving oversight through implementing the DC3I tasks, DOD components developing plans with scheduled completion dates to implement the remaining four CDIP tasks that the DOD CIO oversees, and identifying a DOD component to oversee implementation of the seven other CDIP tasks and report on progress implementing them, the department can be better positioned to safeguard DOD’s network by removing preventable, well-known vulnerabilities. If the components address gaps we identified in the extent that they account for whether their users completed the 2018 Cyber Awareness Challenge training will help the department gain assurance that its workforce is prepared to identify and appropriately respond to cybersecurity risks. Additionally, by ensuring that DARPA, and any other similar DOD components, requires its users to take the required DISA- developed training, DOD users may be more aware of threats and vulnerabilities to the department’s networks and may be better equipped to prevent exploitations of DOD information systems. The department does not know the extent that cyber hygiene practices have been implemented to protect DOD networks from key cyberattack techniques. By directing a component to monitor the extent to which practices to protect DOD’s networks are implemented, DOD would be better positioned to ensure that its networks are secure and decrease potential risks to military operations, critical functions, and information assurance. Finally, the lack of information on two cyber hygiene initiatives and cyber hygiene practices in recurring reports provided to senior DOD leaders is concerning because of the need for those leaders to have a complete picture of the state of the department’s cybersecurity posture. By directing DOD CIO to assess the extent that the missing information could improve senior leaders’ ability to make risk-based decisions and revise the recurring reports or develop a new report, DOD leaders would then be better positioned to make effective decisions and manage cybersecurity risks. We are making seven recommendations to the Department of Defense. The Secretary of Defense should ensure that the DOD CIO takes appropriate steps to ensure implementation of the DC3I tasks. (Recommendation 1) The Secretary of Defense should ensure that DOD components develop plans with scheduled completion dates to implement the four remaining CDIP tasks overseen by DOD CIO. (Recommendation 2) The Secretary of Defense should ensure that the Deputy Secretary of Defense identifies a DOD component to oversee the implementation of the seven CDIP tasks not overseen by DOD CIO and report on progress implementing them. (Recommendation 3) The Secretary of Defense should ensure that DOD components accurately monitor and report information on the extent that users have completed the Cyber Awareness Challenge training as well as the number of users whose access to the network was revoked because they have not completed the training. (Recommendation 4) The Secretary of Defense should ensure that the DOD CIO ensures all DOD components, including DARPA, require their users to take the Cyber Awareness Challenge training developed by DISA. (Recommendation 5) The Secretary of Defense should direct a component to monitor the extent to which practices are implemented to protect the department’s network from key cyberattack techniques. (Recommendation 6) The Secretary of Defense should ensure that the DOD CIO assesses the extent to which senior leaders’ have more complete information to make risk-based decisions—and revise the recurring reports (or develop a new report) accordingly. Such information could include DOD’s progress on implementing (a) cybersecurity practices identified in cyber hygiene initiatives and (b) cyber hygiene practices to protect DOD networks from key cyberattack techniques. (Recommendation 7) We provided a draft of this report to the department for review and comment. In written comments, reprinted in appendix III, DOD concurred with one of our seven recommendations, partially concurred with four, and did not concur with the remaining two. DOD separately provided technical comments, which we incorporated as appropriate. The department concurred with our recommendation (Recommendation 5) that the DOD CIO ensure all components, including DARPA, require their users to take the Cyber Awareness Challenge training developed by DISA. The department partially concurred with four of our recommendations. The department partially concurred with our recommendation that the DOD CIO take steps to ensure that DC3I tasks are implemented. The department concurred that tasks two and six in the DC3I should be implemented and stated that these two tasks are the only two still actively being pursued. The department stated that the remaining five tasks were either implemented or have been overcome by events. However, the department did not provide evidence that the other five tasks were implemented or demonstrate how these tasks were overcome by events during the audit or in its comments on a draft or our report. In addition, JFHQ-DODIN officials stated that the principles outlined in the DC3I are important for the department to achieve its cybersecurity goals. For example, several of these five tasks were focused on improving cybersecurity awareness and training at all levels within the department. Therefore, it is unclear why DOD believes that these cyber hygiene tasks have been overcome by events; DOD did not elaborate. Implementing all seven DC3I tasks that have not been implemented can better position the department to achieve the goals of the DC3I to (1) mitigate the risks of compromising the confidentiality, integrity, and availability of mission- critical information as a result of human error by users on the department’s networks; and (2) transform DOD cybersecurity culture by enabling and reshaping leaders, cyber providers, personnel who perform cyberspace operations, and general users to improve individual human performance and accountability on DOD’s network. The department partially concurred with our recommendation that DOD components develop plans with scheduled completion dates to implement the four remaining CDIP tasks overseen by DOD CIO. DOD provided classified comments on this recommendation. Thus, we cannot respond in detail to their comments. We plan to respond to DOD’s comments in a classified version of this report, which we plan to issue later in 2020. Developing plans that would facilitate implementation of these four CDIP tasks would better position DOD to meet the Deputy Secretary of Defense’s goal of removing preventable vulnerabilities from DOD’s network that could allow adversaries to compromise information and information systems. The department partially concurred with our recommendation that components accurately monitor and report information on the extent that users have completed the Cyber Awareness Challenge training and information on the number who have been denied access to the network for not completing the training. The department concurred that it should ensure components accurately report the number of users who have completed the training. However, it did not concur that components should report the number of users who have been denied access to the network because they have not completed the training. The department stated that a statistic showing this information would not be meaningful and would be burdensome to collect. We disagree that such a measure would not be meaningful because it would help leaders hold network users accountable and better position DOD components to comply with DOD policy. Recognizing that trained and aware users are the first and most vital line of defense, DOD components should document and maintain the status of awareness compliance for each user. In its current approach, DOD is unable to confirm whether all of its network users have completed the cybersecurity training, as required. For example, as stated above, 8 of the 16 (50 percent) of the DOD components we requested training information from told us they did not monitor whether users who did not complete the annual training were blocked from DOD networks and systems. If the Secretary of Defense does not ensure that DOD components accurately monitor and report information on the number of users whose access to the network was revoked because they have not completed the training, the components will jeopardize the department’s ability to ensure that DOD users are trained in steps needed to address cybersecurity threats to the department. In responding to this recommendation, DOD also stated that the Navy indicated that it provided us data on the number of its users who completed the training and the total number of its users. The department stated that we could compute the number of Navy users who had not completed the training by computing the difference between the total number of users and the number of users who completed the training. We updated our assessment of the Navy in our report. We now indicate that the Navy was able to identify the number of users who had completed the training in fiscal year 2018. However, we disagree that the difference between the total number of users and the number of users who completed the training equates to the number of users who did not take the training. DOD CIO officials told us during our audit that computing the number of users using this method is not reliable because there are multiple explanations for the difference between the total number of users and the number of users who took the training. For example, officials told us that some military users leave the service before they complete the annually required training and are included in the service’s total number of users but are not included in the number of users who took the training. The department partially concurred with our recommendation that the CIO assess the extent to which senior leaders have information to make risk-based decisions and then revise accordingly the recurring reports. The department stated that it will revise the recurring reports by merging the Cyber Hygiene Scorecard and a scorecard related to the Cyber Landscape to assist senior leaders’ decision-making. However, the department stated that it did not fully agree with the recommendation because, as written in the draft report, the department believed the recommendation was stating that DOD should have “complete” information. Based on DOD’s comment, we clarified the recommendation to state that senior DOD leaders should have more complete information to make risk-based decisions. We believe this is critical because the cyber hygiene tasks and practices highlighted in the report were identified by the most senior leaders in the department—including the Secretary of Defense, Deputy Secretary of Defense, and Chairman of the Joint Chiefs of Staff—as being the tasks and practices that were essential to protecting DOD information, systems, and networks from the most common and pervasive cybersecurity risks faced by the department. The department also stated that risk is a function of multiple variables, that are continually evolving. We agree that risk is a function of multiple variables—including threats and vulnerabilities—that are continually evolving. As such, we think that information, such as the extent to which cyber hygiene practices have been implemented across the department to protect its networks from evolving key cyberattack techniques, will position senior leaders to make more effective and risk-based decisions and manage cybersecurity risks. The department did not concur with two recommendations. In particular: DOD did not concur with our recommendation that the Deputy Secretary of Defense identify a component to oversee the implementation of the seven CDIP tasks that the CIO does not oversee and report on progress implementing those tasks. The department stated that, since the CDIP’s approval in 2015, the department has issued new or updated versions of a number of cyber- related strategies, including the DOD Cyber Strategy. The department also stated that the Deputy Secretary of Defense directed DOD to develop a classified top 10 list of cybersecurity critical-risk areas and an associated scorecard that provides the Deputy Secretary a quarterly assessment of the department’s progress in reducing the risk for each of these areas. The department also stated that the cyber landscape is constantly evolving with changes in technology, threats, and vulnerabilities, and that this requires DOD to reassess its cybersecurity priorities. The department stated that implementing our recommendation would override these recent efforts and focus the department’s efforts on monitoring areas with lower levels of risk. We disagree that implementing our recommendation would override the department’s recent efforts. In fact, implementing the seven tasks would align with one of the 2018 DOD Cyber Strategy’s objectives to “secure DOD information and systems against malicious cyber activity.” We agree with DOD that the department should reassess cybersecurity priorities in light of changes in technologies, threats, and vulnerabilities. However, DOD did not provide evidence during the audit or in responding to the draft report that the department had assessed the CDIP tasks required by the Deputy Secretary of Defense in 2015. Specifically, the department has not determined whether they remain valid or aligned with the current cybersecurity threat environment, that the vulnerabilities associated with these seven tasks were mitigated or addressed, and that a senior-level DOD official provided written direction canceling the Deputy Secretary of Defense’ CDIP taskings. More importantly, our analysis of the seven tasks that DOD is not currently tracking progress on are consistent with basic cybersecurity standards established by DOD guidance and NIST— and which DOD is planning to apply to certain defense contractors in future contract awards to protect DOD information that is stored or transits through their networks as a part of the Cybersecurity Maturity Model Certification framework. For example, Task 14 requires commanders and supervisors to ensure physical security of their network infrastructure devices. This task aligns with general NIST guidance regarding physical access protections. NIST guidance states that organizations should manage and protect physical access to assets and facilities where information systems reside. Task 15 requires commanders and supervisors to report all commercially provided internet connections to DOD’s unclassified network. This task aligns with general NIST guidance regarding the use of external networks. NIST guidance states that organizations should catalogue all external information systems. Task 16 requires commanders and supervisors to ensure alignment to a Computer Network Defense Service Provider. This task is consistent with DOD requirements on cybersecurity activities to protect the DOD Information Network. The requirements state that DOD IT must be aligned to DOD network operations and security centers, which provide any required cybersecurity services. Task 17 requires commanders and supervisors with Computer Network Defense Service Provider responsibility to ensure the cyber incident response plan(s) are properly exercised and documented. This task aligns with general NIST guidance regarding incident response. NIST guidance states that organizations should provide incident response handling training and implement incident handling capabilities, as well as a process to ensure that response processes and procedures are executed, and maintained ensuring response to detected cybersecurity incidents. If the Deputy Secretary of Defense does not implement this recommendation, the department will have less assurance that cybersecurity vulnerabilities are being addressed in a timely manner and systems are being securely configured. The department did not concur with our recommendation that a component monitor the extent of implementation of practices to protect the department's network from key cyberattack techniques. The department determined that the information in its response to this recommendation included sensitive information. Therefore, we are redacting the department’s response to this recommendation from DOD’s written comments that we are reprinting in Appendix III. However, we still believe the recommendation is valid. As stated in our report, no component or office within the department has complete visibility of the department’s efforts to implement these protective practices across the department, according to DOD officials. Taking action to implement the intent of this recommendation would help address that gap. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; DOD’s Chief Information Officer; the Secretaries of the Army, Navy, and Air Force; the Commandant of the Marine Corps; the Chairman of the Joint Chiefs of Staff; the Commanding Generals of U.S. Strategic Command, U.S. European Command, U.S. Southern Command, and U.S. Cyber Command; and the Directors of DISA, the National Security Agency, DARPA, the Defense Commissary Agency, the Defense Contract Management Agency, the Defense Finance and Accounting Service, the Defense Media Activity, and the Defense Technology Security Administration. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact us: Joseph Kirschbaum at (202) 512-9971 or kirschbaumj@gao.gov, or Nick Marinos at (202) 512-9342 or marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. For the purposes of this review, we adapted a definition of cyber hygiene developed by Carnegie Mellon University’s Software Engineering Institute. The institute defines cyber hygiene as a set of practices for managing the most common and pervasive cybersecurity risks faced by organizations today. We discussed the definition of cyber hygiene with Department of Defense (DOD) officials to identify DOD initiatives aimed at improving cyber hygiene. DOD officials identified the Cyber Discipline Implementation Plan (CDIP) as DOD’s main cyber hygiene initiative aimed at implementing technical improvements to DOD networks. In addition, DOD officials identified the DOD Cybersecurity Culture and Compliance Initiative (DC3I) and DOD’s Cyber Awareness Challenge training as two initiatives designed to establish best practices for DOD network users including military personnel, civilians, and contractors. To determine the extent to which DOD has implemented its three cyber hygiene initiatives and practices to protect its networks from cyberattack techniques that adversaries may use, we conducted analyses for each initiative. To determine the extent to which DOD implemented the DC3I, we reviewed the 11 tasks that require components to take actions that are specified in the DC3I memorandum that the Secretary of Defense and the Chairman of the Joint Chiefs of Staff issued in September 2015. We analyzed documentation we collected from U.S. Cyber Command, the office of the DOD Chief Information Officer (CIO), and the Joint Staff that demonstrate actions these components took in response to each of the 11 DC3I tasks and determined the extent to which each task was implemented. To determine the extent to which DOD implemented the CDIP, we reviewed the 17 tasks that require components to take actions specified in a memorandum that the Deputy Secretary of Defense issued in October 2015. We interviewed officials from the office of the DOD CIO about the extent to which DOD components implemented the CDIP tasks, the reasons the components had not fully implemented all of the tasks, and to determine the extent that the DOD CIO knew if DOD components had implemented the remaining seven CDIP tasks. We also reviewed documentation on the extent that DOD components implemented the tasks overseen by DOD CIO by analyzing data included in the Cyber Hygiene Scorecard. We also assessed the reliability of the data in the Scorecard by reviewing the methods the DOD CIO uses to ensure the data reported to the Scorecard are accurate and interviewing cognizant officials. We determined the data are sufficiently reliable for our purposes. To determine the extent that DOD implemented the Cyber Awareness Challenge training, we analyzed the extent that the DOD CIO and the DOD component CIOs ensured that personnel they oversee completed the fiscal year 2018 Cyber Awareness Challenge training. To carry out this analysis, we collected and analyzed information from the DOD CIO and a sample of 16 DOD components. We selected this sample of components by identifying important groupings of components and selecting from these groups to ensure that our sample represented a significant number of DOD personnel as well as a variety of types of components. These groups were: the military services and the Joint Staff, combatant commands, agencies and field activities, and the Office of the Secretary of Defense. Military services and Joint Staff. We selected the four military services because they are the components within DOD with the most personnel. We also included the Joint Staff because this component reflects the strategic perspective for the department as a whole. Combatant commands. We randomly selected three combatant commands from the group of 11 combatant commands—including geographic (e.g., U.S. Central Command) and functional (e.g., U.S. Transportation Command). We selected three of the 11 combatant commands to include the perspectives of multiple combatant commands in our sample. We selected these combatant commands: U.S. European Command, U.S. Southern Command, and U.S. Strategic Command. Agencies and Field Activities. We assembled a list of non-service and non-combatant command components organized by the types of functions that each component performs. We then organized these components by functional groupings. Specifically, we created functional groupings for the components that fall under each of the six Under Secretaries of Defense because these officials oversee components with similar functions. We also included a seventh functional group of miscellaneous components that are not overseen by any of the Under Secretaries of Defense. We then accounted for the size of the components on this list by identifying the larger agencies and the smaller field activities. From this list, we randomly selected one component from each of the seven groups. In doing so, we selected five of the 20 agencies and two of the eight field activities. We chose this ratio of agencies to field activities to reflect the ratio of agencies to field activities in DOD. That is, DOD agencies are about 71 percent of DOD’s non-service and non-combatant command components and about 71 percent of our sample. We selected these five agencies: Defense Advanced Research Projects Agency, Defense Commissary Agency, Defense Contract Management Agency, Defense Finance and Accounting Service and the National Security Agency. We selected these two field activities: Defense Media Activity and Defense Technology Security Administration. The Office of the Secretary of Defense. We also randomly selected one of 16 components from the Office of the Secretary of Defense. This group included the offices that support the six Under Secretaries we discussed above such as the Under Secretary of Defense for Policy as well as other offices including the Office of Cost Assessment and Program Evaluation and the Office of the DOD Chief Management Officer. We selected one component from this group to ensure we reflected the perspective of components at the DOD headquarters level. We selected the Office of the DOD Chief Information Officer. To collect information from this sample of 16 components, we developed a standard set of questions we provided to each component on topics related to both objectives. In particular, we asked DOD components to provide the number of network users that completed the fiscal year 2018 Cyber Awareness Challenge training, the number of network users that did not complete the training, and the number of network users who had their access to the network removed as a result of not taking the training. We also asked other questions including a question about the information that senior leaders are provided regarding cyber hygiene practices. Each component provided written responses to our questions and in some cases provided documentation corroborating their responses. We conducted a content analysis of the components’ responses and the documentation they provided. To complete this content analysis, two analysts assessed the components’ responses, compared and discussed their separate analyses, and reached agreement on their conclusions about their analysis. We compared the information we collected from these components to a provision in NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program, which advises agencies to capture training compliance data at an agency level. Further, we interviewed officials from Defense Information Systems Agency and JFHQ-DODIN to determine the extent to which DOD had implemented cyber hygiene practices that the department has implemented to protect its networks from key cyberattack techniques that adversaries may use. To determine the extent to which senior DOD leaders receive information on the department’s efforts to address cyber hygiene initiatives and practices, we first defined senior DOD leaders as the Secretary of Defense, the Deputy Secretary of Defense, and DOD component heads. To identify the information that could be included in reports that senior DOD leaders receive about DOD efforts to mitigate cyberattack techniques, we identified techniques that are most likely to be used by adversaries against DOD’s networks or that could cause severe adverse effects on DOD’s operations. In particular, we identified 22 key cyberattack techniques from two sources: Joint Force Headquarters DOD Information Network (JFHQ-DODIN) provided a list of eight cyberattack techniques that the agency observed adversaries using most frequently in January 2019. JFHQ- DODIN officials also determined that these data are representative of the cyberattack techniques that they have recently observed. We identified 14 cyberattack techniques by analyzing a review conducted in 2016 by the National Security Agency, the Defense Information Systems Agency, and the DOD CIO. In the review, the agencies identified 177 cyberattack techniques and ranked the techniques according to the level of risk the techniques posed to DOD’s unclassified and Secret-level networks. The agencies used a number of different criteria to rank these techniques, including the prevalence of the technique, visibility of the technique, and whether other, closely associated alternative techniques exist. We selected the 14 cyberattack techniques that the agencies identified as the highest priority. Next, we analyzed the contents of two recurring reports that senior leaders receive on the department’s cybersecurity posture: the Cyber Hygiene Scorecard and the Cyber Landscape Report. In particular, we analyzed these reports to determine if they included information about DOD’s implementation of key cyber hygiene initiatives that we describe in the first objective. We also analyzed the reports to determine if they included the lists of key cyberattack techniques and information about the extent that the department had implemented cyber hygiene practices to protect DOD networks from these cyberattack techniques. We conducted this performance audit from January 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Department of Defense (DOD) Chief Information Officer (CIO) and other relevant DOD components implemented four of the 11 tasks required in the Cybersecurity Culture and Compliance Initiative (DC3I) and the remaining seven tasks were not fully implemented as of October 2019. Table 2 provides additional information of actions taken to address and implement all 11 DC3I tasks. In addition to the individuals named above, Tommy Baril (Assistant Director), Kaelin Kuhn (Assistant Director), James P. Klein (Analyst-in- Charge), Tracy Barnes, Amy Bush, Peter Casey, Amie Lesser, Carlo Mozo, Richard Powelson, Michael Silver, Andrew Stavisky, and Walter Vance made significant contributions to this report. Kiana Beshir, Chris Businsky, Shaun Byrnes, and Richard Sayoc also contributed to the report.", "summary": "DOD has become increasingly reliant on information technology (IT) and risks have increased as cybersecurity threats evolve. Cybersecurity experts estimate that 90 percent of cyberattacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to DOD's Principal Cyber Advisor. Senate Report 115-262 includes a provision that GAO review DOD cyber hygiene. This report evaluates the extent to which 1) DOD has implemented key cyber hygiene initiatives and practices to protect DOD networks from key cyberattack techniques and 2) senior DOD leaders received information on the department's efforts to address these initiatives and cyber hygiene practices. GAO reviewed documentation of DOD actions taken to implement three cyber hygiene initiatives and reviewed recurring reports provided to senior DOD leaders. The Department of Defense (DOD) has not fully implemented three of its key initiatives and practices aimed at improving cyber hygiene. Carnegie-Mellon University defines cyber hygiene as a set of practices for managing the most common and pervasive cybersecurity risks. In discussions with GAO, DOD officials identified three department-wide cyber hygiene initiatives: the 2015 DOD Cybersecurity Culture and Compliance Initiative, the 2015 DOD Cyber Discipline Implementation Plan, and DOD's Cyber Awareness Challenge training. The Culture and Compliance Initiative set forth 11 overall tasks expected to be completed in fiscal year 2016. It includes cyber education and training, integration of cyber into operational exercises, and needed recommendations on changes to cyber capabilities and authorities. However, seven of these tasks have not been fully implemented. The Cyber Discipline plan has 17 tasks focused on removing preventable vulnerabilities from DOD's networks that could otherwise enable adversaries to compromise information and systems. Of these 17, the DOD Chief Information Officer is responsible for overseeing implementation of 10 tasks. While the Deputy Secretary set a goal of achieving 90 percent implementation of the 10 CIO tasks by the end of fiscal year 2018, four of the tasks have not been implemented. Further, the completion of the other seven tasks was unknown because no DOD entity has been designated to report on the progress. The Cyber Awareness training is intended to help the DOD workforce maintain awareness of known and emerging cyber threats, and reinforce best practices to keep information and systems secure. However, selected components in the department do not know the extent to which users of its systems have completed this required training. GAO's review of 16 selected components identified six without information on system users that had not completed the required training, and eight without information on users whose network access had been revoked for not completing training. Beyond the initiatives above, DOD has (1) developed lists of the techniques that adversaries use most frequently and pose significant risk to the department, and (2) identified practices to protect DOD networks and systems against these techniques. However, the department does not know the extent to which these practices have been implemented. The absence of this knowledge is due in part to no DOD component monitoring implementation, according to DOD officials. Overall, until DOD completes its cyber hygiene initiatives and ensures that cyber practices are implemented, the department will face an enhanced risk of successful attack. While two recurring reports have provided updates to senior DOD leaders on cyber information on the Cyber Discipline plan implementation, department leadership has not regularly received information on the other two initiatives and on the extent to which cyber hygiene practices are being implemented. Such information would better position leaders to be aware of the cyber risks facing DOD and make more effective decisions to manage such risks. GAO is making seven recommendations to DOD, including that cyber hygiene initiatives be fully implemented, entities are designated to monitor component completion of tasks and cyber hygiene practices, and senior DOD leaders receive information on cyber hygiene initiatives and practices. Of the seven recommendations, DOD concurred with one, partially concurred with four, and did not concur with two. GAO continues to believe that all recommendations are warranted.", "document_type": "gao"}
{"report": "BMI is used as a screening tool for obesity. An individual with a BMI of 30 or higher is considered to have obesity. Over the past two decades, both the prevalence of obesity and estimates of the medical spending associated with individuals with obesity have increased. For example, a 2018 study estimated that the percentage of national medical expenditures used to treat obesity-related illnesses in adults increased from 6.13 percent in 2001 to 7.91 percent in 2015, a 29 percent increase. This study also found that the high medical costs of obesity are due to extremely high medical costs among a small percentage of the population who have severe obesity (those with a BMI of 40 or higher). In addition, a 2017 study found that medical expenditures rise most rapidly for individuals with a BMI of 40 or higher. One option for the treatment of obesity is the use of prescription obesity drugs. As of June 2019, there were nine prescription drugs approved by FDA to treat obesity. Four obesity drugs—benzphetamine, diethylpropion, phendimetrazine, and phentermine—were approved by FDA in 1961 or earlier for short-term use, which is generally about 12 weeks, and are available as generic drugs. The remaining five obesity drugs were approved by FDA in 1999 or later for long-term use and are available as brand-name drugs— bupropion/naltrexone (Contrave), liraglutide (Saxenda), lorcaserin (Belviq), orlistat (Xenical), and phentermine/topiramate (Qsymia). Each of these five brand-name obesity drugs underwent one or more randomized, controlled clinical trials for safety and efficacy prior to FDA approval of the drug—a total of 15 clinical trials across the five drugs. Obesity drugs work in different ways; some may help an individual feel full sooner or less hungry, while others may reduce fat absorption in the body. Results vary by medication and by person, but, according to the National Institutes of Health, on average, people who take obesity drugs as part of a lifestyle program lose between 3 and 9 percent more of their starting body weight than people in a lifestyle program who do not take obesity drugs. As with other prescription drugs, obesity drugs may have side effects such as headache, dizziness, dry mouth, nausea, and diarrhea. And, as with other prescription drugs, health care providers may prescribe an obesity drug for off-label use— that is, for a different medical condition, in a different dosage, or for a different duration than for which the drug is FDA approved. Obesity drugs should be used as an adjunct to lifestyle therapy (e.g., diet, physical activity, and behavioral counseling), according to guidelines from several medical associations. According to these guidelines, the use of obesity drugs is indicated for individuals with a BMI of 27 or higher with one or more obesity comorbidities (such as type 2 diabetes), or individuals with a BMI of 30 or higher who have a history of failure to achieve clinically meaningful weight loss (that is, weight loss of 5 percent or more) or who are unable to sustain weight loss. In addition, the guidelines recommend evaluating the patient’s weight loss after about 12 to 16 weeks of treatment with an obesity drug and discontinuing the drug if the patient has not lost a certain amount (e.g., at least 5 percent) of their initial body weight. Although obesity is classified as a disease, some health care providers, including those who specialize in the care of patients with obesity, continue to stigmatize patients with obesity. For example, a 2018 study reported that health care providers may perceive patients with obesity as being less compliant and having less self-discipline than other patients. Additionally, health care providers may not initiate discussions about weight loss with patients because of lack of time, other important issues or concerns, a belief that a patient is not motivated or interested in losing weight, or concern over a patient’s emotional state, according to another 2018 study. The prevalence of obesity was about 38 percent among all U.S. adults (about four of every 10 adults) from 2013 through 2016, according to nationally representative estimates from CDC. The estimate of prevalence among adults covered by Medicare was about 40 percent, and among those with Medicaid or other public health insurance (excluding Medicare) it was about 42 percent. In addition, the prevalence of obesity among adults with private health insurance coverage and among the uninsured was similar, at about 37 percent and 38 percent, respectively. These national estimates also showed that about 24 percent of Medicare beneficiaries had Class 1 obesity, about 10 percent had Class 2 obesity, and about 6 percent had Class 3, or severe, obesity. (See fig. 1.) According to CDC estimates, adults age 18 to 64 and adults age 65 and older had a similar prevalence of obesity, about 39 percent and 38 percent, respectively. However, a higher percentage of adults age 18 to 64 than adults age 65 and older had Class 3 obesity. (See table 1.) Appendix III provides additional information on the prevalence of obesity among adults, as well as on the prevalence of adults who were overweight, which is defined as a BMI of 25 to <30, including 95 percent confidence intervals. Relatively few U.S. adults, including adults with obesity and adults who reported trying to lose weight, used obesity drugs from 2012 through 2016, according to nationally representative estimates. Guidelines suggest prescribing obesity drugs as an adjunct to other diet and lifestyle changes, or when other approaches have not resulted in clinically significant weight loss. Those health care providers who prescribe obesity drugs consider several factors, such as whether there are any contraindications of the obesity drug for their patients and the cost of the drug. Some limited data are available on individuals who have used obesity drugs, including data on whether these individuals adhered to taking the prescribed obesity drug or maintained their weight loss over time. Available data indicate that relatively few U.S. adults, including those with obesity, used obesity drugs. Specifically, of the estimated 233 million U.S. adults, fewer than a million used any of the nine obesity drugs, according to AHRQ’s nationally representative estimates from MEPS data for 2012 through 2016. Of the estimated 71.6 million U.S. adults with obesity, an estimated 660,000 per year, on average, used an obesity drug, according to these data. Similarly, among those who reported trying to lose weight, relatively few of them (about 3 percent) reported that they took prescription medication for weight loss, according to CDC’s nationally representative estimates from NHANES for 2013 through 2016. Additionally, six of the studies we reviewed examined this topic and found that few U.S. adults have used obesity drugs. For example, one study reported that in 2011, 2,554 obesity drug prescriptions were filled per 100,000 people, with about 87 percent of those prescriptions for phentermine, a generic obesity drug. Three other studies assessed the use of obesity drugs among veterans receiving care from the Veterans Health Administration and similarly found that few patients were prescribed obesity drugs. One of these studies found that about 1 percent of the 153,939 veterans who enrolled in the MOVE! Weight Management Program from 2013 through 2016 were prescribed an obesity drug (orlistat, phentermine, phentermine/topiramate, liraglutide, or bupropion/naltrexone) within 1 year of MOVE! initiation. According to officials from groups representing physicians and advocacy groups we interviewed, and seven studies we reviewed, some physicians and other health care providers may not be open to or comfortable with prescribing obesity drugs. For example, providers may not perceive obesity drugs to be safe or effective. According to officials from one advocacy and research group, concerns about the safety of obesity drugs may be related to the adverse consequences associated with past obesity drugs. In addition, one medical association we contacted indicated physicians consider clinical preventive service recommendations from the U.S. Preventive Services Task Force on the use of obesity drugs. The task force recommends that clinicians offer or refer adults with a BMI of 30 or higher to intensive, multicomponent behavioral interventions. Further, a systematic review of evidence of the benefits and harms of behavioral therapy and use of obesity drugs conducted for the task force found that obesity drugs, but not behavior-based interventions, were associated with higher rates of harm. The potential for harm (i.e., adverse events) may discourage physicians and other health care providers from prescribing these drugs. In addition, officials we interviewed and the studies we reviewed noted that a lack of insurance coverage, high out-of-pocket costs, and the patient’s means to afford obesity drugs may also discourage physicians from prescribing obesity drugs. The officials and studies also noted that physicians might have gaps in knowledge about obesity drugs. For example, officials from one medical association noted that lack of education is a barrier to physicians in prescribing obesity drugs for patients who would be candidates for them, and officials from another medical association said that many clinicians are not aware that there are FDA-approved drugs for obesity, and therefore they do not think about prescribing them. One study we reviewed found that, of the 111 primary care providers responding to a survey, most reported limited experience with obesity drugs as a barrier to prescribing them. While guidelines on the use of obesity drugs suggest prescribing obesity drugs as an adjunct to other diet and lifestyle changes, or when other approaches have not resulted in clinically significant weight loss, physicians and other health care providers may not understand the recommendations outlined in the guidelines. For example, one study found that many of the health care providers responding to a survey reported responses inconsistent with the guideline-recommended thresholds to initiate and continue use of obesity drugs. Physicians and health care providers who do prescribe obesity drugs take several factors into consideration. Specifically, before prescribing an obesity drug, these providers consider the likely benefits of weight loss, the drug’s possible side effects, the patient’s current health issues and other medications, family medical history, and the cost of the drug, according to the National Institutes of Health. According to officials from an advocacy group, specific considerations include (1) the patient’s other health conditions that may increase the risk from using a particular obesity drug (contraindications); (2) the ability of an obesity drug to treat both the patient’s obesity and other health conditions; (3) the patient’s ability to afford a particular obesity drug, given their insurance coverage and other financial resources; (4) patient preference regarding the dosage and form of the drug; and (5) the average efficacy (weight loss) of an obesity drug. Further, when treating obesity, providers use the least invasive treatments, such as lifestyle-based therapies first, then escalate to obesity drugs if noninvasive treatments prove ineffective, according to officials from the same advocacy group. Some limited data are available on individuals who have used obesity drugs, including data on the distribution of BMI, the use of obesity drugs in conjunction with other items or services, whether these individuals adhered to using the prescribed obesity drug or maintained their weight loss over time, and the impact that using obesity drugs has on other medical services directly related to obesity. The following is a summary of available information on specific aspects of individuals who have used obesity drugs. Distribution of BMI across individuals who have used obesity drugs. CDC’s nationally representative estimates for 2013 through 2016 found that the BMI of adults who reported that they used obesity drugs ranged from 21 to 64, with a median BMI of 34. However, these data are limited because they do not indicate how long the individual used the drugs before their BMI was measured. Use of obesity drugs in conjunction with other items or services. Two studies we reviewed examined the use of obesity drugs in conjunction with other items or services. These studies found that participants who used an obesity drug in conjunction with other services, such as behavioral counseling, lost more weight than those who did not take the drug with the other services. For example, in one 2019 study, participants who received intensive behavioral therapy combined with an obesity drug, liraglutide, had nearly double the weight loss (an average of about 12 percent of their body weight) compared to the participants who received only intensive behavioral therapy (an average of about 6 percent of their body weight). In addition, the 15 clinical trials for the brand-name obesity drugs that we reviewed generally found that a significantly higher percentage of participants who used the obesity drug combined with other items or services (such as a low-calorie diet or increased physical activity) achieved 5 percent or more weight loss compared to participants who used a placebo with the other items or services. One clinical trial that used an intensive behavior modification program (28 group sessions) found higher average weight loss (9 percent loss of initial body weight) for participants who used the obesity drug (bupropion/naltrexone) than for the placebo group. This clinical trial also found that the placebo group with the intensive behavior modification had higher weight loss than placebo groups in the other clinical trials, none of which used intensive behavioral therapy. Adherence to using the prescribed obesity drug. FDA’s analysis of Sentinel System data of obesity drugs dispensed in 2008 through 2017 found that in the majority of patients using obesity drugs, cumulative treatment duration was 90 days or less. FDA analyzed data for 267,836 new users of obesity drugs and found that about 58 percent of patients who used any of the obesity drugs did so for 90 days or less; about 31 percent used any of the obesity drugs for 30 or fewer days. The average duration for the first use of any of the nine obesity drugs was 69 days. (See appendix V for more data from FDA’s analysis.) FDA’s findings are consistent with the findings of two of the three studies that we reviewed that measured adherence to using the prescribed obesity drug. These studies reported that use of obesity drugs dropped significantly after 30 days. For example, one 2018 study that reviewed 1 year of data on 26,522 patients who had new prescription drug claims for one of four obesity drugs (liraglutide, lorcaserin, bupropion/naltrexone, and phentermine/topiramate) found that adherence to using any of the four obesity drugs dropped markedly during the first month following the initial claim for the drug. In addition, while the 15 clinical trials we reviewed were not designed to measure adherence to taking obesity drugs, they provide some information on whether or not study participants adhered to using these drugs during the trials. Participant dropout rates for these clinical trials ranged from 14 percent to 66 percent for the obesity drug treatment and the placebo groups, which could indicate difficulty in adherence to the study regimen; however, participants using the placebo generally had higher dropout rates than those using the obesity drug. The reasons for discontinuation among study participants in the clinical trials included side effects, such as headaches and nausea; being unavailable for follow up; and withdrawal of consent. Maintaining weight loss over time by individuals who have used obesity drugs. The recent systematic review conducted for the U.S. Preventive Services Task Force noted that data on long-term weight loss with obesity drugs are limited. The review found that individuals using obesity drugs were more likely to maintain their weight loss over 12 to 36 months compared with placebo, but noted that the evidence was limited by the small number of trials for each medication, poor follow up with participants, and limited applicability (given that participants had to meet narrowly defined inclusion criteria), among other limitations. We also identified six studies—each of which reviewed one of the FDA-approved obesity drugs—that examined weight loss maintenance, generally after about 1 year. For example, a 2018 study for one obesity drug (lorcaserin) found that while the obesity drug initially improved upon weight loss achieved with weight loss maintenance counseling, this advantage was not maintained at 1 year. That is, after 1 year, there was no significant difference in weight loss maintenance between the participants treated with the obesity drug along with counseling, compared to those treated with placebo along with counseling. Another study that examined clinical trial data for one obesity drug (bupropion/naltrexone) concluded that participants who lost at least 5 percent of their body weight after 16 weeks were likely to maintain clinically significant weight loss (of at least 5 percent) after 1 year of treatment with the drug. The impact of using obesity drugs on medical services directly related to obesity. We did not identify any studies on the impact that the use of obesity drugs had on the utilization of medical services directly related to obesity. In terms of studies on the impact on health outcomes, the systematic review conducted for the U.S. Preventive Services Task Force concluded that health outcomes data for individuals receiving treatment with obesity drugs were limited. The review reported that clinical trials of obesity drugs for weight loss examined few outcomes beyond quality of life measures, and that none of the drug-based maintenance trials reported the effects of the obesity drug interventions on health outcomes. The review noted that the trials included in the review were of highly selected populations with multiple exclusions relevant to health outcomes (e.g., history of serious medical conditions). The review further noted that while it appears that weight loss interventions, including obesity drugs, can reduce diabetes incidence, larger studies with longer-term follow up are required to understand the full benefits of these interventions on health outcomes and whether those effects are long lasting. Health insurance coverage for obesity drugs is limited—that is, not all public and private health insurance provided coverage for obesity drugs or may have additional requirements to determine these drugs are medically necessary. Medicare Part D plans may opt to cover obesity drugs, and state Medicaid programs or Medicaid managed care plans within states may choose either to cover or exclude obesity drugs from coverage. We found that both Medicare Part D and Medicaid reimbursed for a relatively small number of prescriptions for obesity drugs in 2016 and 2017. For private health insurance—which includes employer- sponsored health insurance, individually purchased health plans, and FEHBP plans—we found that coverage varied and, when obesity drugs were covered, the coverage could have additional requirements such as prior authorization or determination that a drug is medically necessary for the patient. Medicare. Under Medicare’s prescription drug benefit, Medicare Part D plans may choose to cover obesity drugs—in these cases, obesity drugs are considered supplemental drugs under an enhanced alternative coverage plan. Medicare beneficiaries who select a Part D plan that offers supplemental benefits, which may include coverage of excluded drugs such as obesity drugs, must pay the full premium cost for those additional benefits (i.e., Medicare does not subsidize them). Medicare Part D plans can choose whether or not to offer enhanced alternative coverage, and not all Medicare Part D plans that provide enhanced alternative coverage cover obesity drugs as supplemental drugs. For example: Roughly half of the Medicare beneficiaries covered by one large insurer’s Medicare Part D plans in one state have coverage for obesity drugs as a supplemental drug under enhanced alternative coverage, according to officials from that insurer. Officials at another large insurer told us that their Medicare Part D plans have historically covered supplemental drugs based on consumer demand, and obesity drugs do not typically meet their threshold for offering supplemental coverage. The officials noted that their plans have limited funds to cover supplemental drugs and that consumer demand is typically highest for other types of drugs, such as drugs to treat erectile dysfunction. Enhanced Alternative Coverage and Supplemental Drugs under Medicare Enhanced alternative coverage is alternative prescription drug coverage under Medicare Part D with value exceeding that of Medicare Part D’s defined standard coverage. Enhanced alternative coverage may include basic prescription coverage and supplemental benefits such as supplemental drugs. Supplemental drugs are drugs—including drugs for weight loss—that would be covered Part D drugs but for the fact that they are specifically excluded as Part D drugs under Medicare Part D’s basic prescription drug coverage. Medicare Part D plans may offer these excluded drugs, such as obesity drugs, as a supplemental drug under enhanced alternative coverage. A Medicare Part D plan can choose which drugs it covers as a supplemental drug under enhanced alternative coverage—that is, not all plans cover the same supplemental drugs as part of enhanced alternative coverage. Data from CMS on Medicare Part D reimbursement for obesity drugs provide some insight on coverage. For example, our analysis found that in 2017, 27 Medicare Part D plans reimbursed for obesity drugs under enhanced alternative coverage for 209 Medicare beneficiaries. (See table 2 for 2016 and 2017 data.) See appendix VI for more information. Medicaid. State Medicaid programs or Medicaid managed care plans within states may choose either to cover or exclude obesity drugs from coverage. Our analysis found that in 2017, Medicaid programs or Medicaid managed care plans in 41 states reimbursed pharmacies and other providers for at least one claim for an obesity drug, for a total of 30,800 prescriptions. (See table 3 for 2016 and 2017 data.) Medicaid managed care organizations may provide coverage of obesity drugs not covered by the state plan, according to CMS. See appendix VII for more information. Employer-sponsored and individually purchased health plans. Coverage of the nine obesity drugs varied in employer-sponsored and individually purchased health plans, according to the insurers and pharmacy benefit managers we interviewed. For example: Officials from one large insurer told us that coverage of obesity drugs is included in plans for about 90 percent of their members; only a small percentage of members do not have plans with this coverage. Officials from another large insurer surveyed its health plans in different geographic locations and found that, of those that responded, four of the six employer-sponsored and three of the six individually purchased health plans covered the nine obesity drugs. They said that many of the plans that covered obesity drugs in their employer- sponsored markets also covered these drugs in their individual market. Officials at a large pharmacy benefit manager said employers that provide employer-sponsored health insurance can choose to customize their formulary and decide whether to include obesity drugs. They said their select and premium prescription drug formularies include obesity drugs, so companies that decide to offer those formularies would cover obesity drugs, but many companies choose to customize their formularies and may not include obesity drugs. Even if employer-sponsored and individually purchased health plans offer coverage of obesity drugs, these plans often put requirements in place to determine a beneficiary’s eligibility for coverage of obesity drugs, according to officials from insurers and pharmacy benefit managers we interviewed. For example, plans may require beneficiaries to obtain prior authorization, require a determination of medical necessity of the drug for the patient, and review the drug’s effectiveness prior to making a coverage decision. For example, an official from one large insurer told us their drug formulary does not include obesity drugs because the clinical evidence indicates that other therapies are more effective for weight loss. However, this official also said that some of its plans would cover obesity drugs as a nonformulary option if a physician or other health care provider indicates that the obesity drug is medically necessary (e.g., after a patient has tried other treatment options, such as behavioral therapy). Further, if a patient is offered coverage of an obesity drug but fails to receive a clinical benefit within a specified time frame, insurers and pharmacy benefit managers told us the following: A patient and his or her physician may decide together whether the patient should continue or discontinue the obesity drug, and plans often defer to physicians to determine whether an obesity drug is medically necessary for a patient. Some plans may require additional information from a patient’s physician every 6 to 12 months for reapproval of coverage of an obesity drug, such as reporting outcomes (e.g., weight loss) while using the drug. Plans could require prior authorization to continue using an obesity drug. An individual may be able to try a different obesity drug covered by the formulary. For the largest employer-sponsored health care program in the United States—FEHBP, managed by the Office of Personnel Management—we found that some FEHBP plans offered by large insurers excluded obesity drugs from coverage. We examined the formularies for 12 plans offered by three large FEHBP insurers and found that the formularies for two plans from one insurer indicated some type of coverage of obesity drugs in 2018. One plan offered coverage for 50 percent of the plan’s allowed amount for weight management drugs, and the other plan offered coverage of two obesity drugs as tier 2 drugs, which have higher copayments than tier 1 drugs. For individually purchased health plans offered on health care exchanges, nine of the 34 states with federally facilitated exchanges had at least one plan in the silver tier of coverage that included some type of coverage for obesity drugs in 2018, according to a 2018 study. The study found that covered obesity drugs were generally the older drugs and that the newer drugs tended to be covered with higher copayments or more likely to require prior authorizations than other medications. Out-of-pocket payments from the patient or patient’s family made up two- thirds of the amounts paid for obesity drugs, according to nationally representative estimates for 2012 through 2016. These amounts could include insurance copayments and deductible amounts, and payments for obesity drugs not covered by insurance. Private health insurance paid about one quarter of the amount paid for obesity drugs, and Medicare and other public health insurance paid the remainder. Average annual medical spending and prescription drug spending were higher for adults who used any of the nine obesity drugs than for those who did not, according to these estimates. However, the differences in these estimates do not establish any causal relationship between using obesity drugs and having higher average annual medical or prescription drug spending. Out-of-pocket payments made up about two-thirds of total amounts paid for obesity drugs for U.S. adults and private health insurance paid a quarter, according to AHRQ’s nationally representative estimates from MEPS data for 2012 through 2016. Medicare, Medicaid, and other public health insurance paid the remainder; however, estimates for each of these sources of payment are imprecise. (See fig. 2.) Similar to studies on the use of obesity drugs, AHRQ’s estimates also found that 80 percent of amounts paid for any of the nine obesity drugs was for one obesity drug, phentermine, which is available as a generic drug. We also examined available spending data from CMS on payments for obesity drugs and found the following: Medicare Part D prescription drug plans spent $19,714 for obesity drugs in 2016 and $140,296 in 2017, according to our analysis of CMS’s Prescription Drug Event data. These amounts include Medicare Part D plan reimbursements for any of the nine obesity drugs under enhanced alternative coverage. CMS’s data also showed that total beneficiary spending—that is, the total amount Medicare beneficiaries paid out of pocket as copayments or deductibles—for any of these prescriptions totaled $4,048 in 2016 and $5,376 in 2017. See appendix VI for more information. Total Medicaid state and federal spending—that is, reimbursement amounts for the nine obesity drugs—was at least $5,017,424 in 2016 and $7,453,442 in 2017, according to our analysis of available data from CMS’s Medicaid State Drug Utilization data. These amounts do not include all Medicaid spending for obesity drugs under Medicaid managed care. For example, if a Medicaid program pays a managed care organization for drugs as part of their capitated payment for all Medicaid services, they are not reimbursed on a per-drug basis, and obesity drugs covered by Medicaid in that state would show up as a $0 reimbursement amount in CMS’s Medicaid State Drug Utilization data. According to CMS data, Medicaid spending for obesity drugs was the greatest in California in 2016 and 2017. See appendix VII for more information. In addition, when the number of prescriptions dispensed are counted, FDA’s estimates from 2017 IQVIATM data—which are projected nationally from prescriptions dispensed in about 59,900 outpatient retail pharmacies—found that most prescriptions dispensed for obesity drugs were paid for by private insurance. FDA’s analysis found that almost 64 percent of prescriptions dispensed for any of the nine obesity drugs was paid for by private health insurance, and 35 percent of prescriptions dispensed was paid for by cash (i.e., out-of-pocket) payments paid for by the patient or their family in 2017. The remaining 1 percent of prescriptions dispensed for obesity drugs was paid for by Medicare Part D and Medicaid at an estimated 0.9 percent and 0.1 percent, respectively. For all U.S. adults age 18 to 64, the estimated average annual medical and prescription drug spending per adult was higher for those who used an obesity drug than for those who did not use an obesity drug. Specifically, the estimated average annual medical expenditures were $7,575 per adult who used an obesity drug and $4,302 for those who did not, according to AHRQ’s nationally representative estimates from MEPS data for 2012 through 2016. Further, the estimated average annual prescription drug expenditures per adult were $2,198 for those who used an obesity drug and $1,111 for those who did not. However, these data do not necessarily indicate that use of obesity drugs leads to higher average annual medical and prescription drug spending. For U.S. adults with obesity, there was not a significant difference between the estimated average annual medical and prescription drug expenditures per adult for those who used an obesity drug and those who did not use an obesity drug. This may be due to the small sample size of 279 adults with obesity who used an obesity drug in the MEPS data. Appendix VIII provides more information on AHRQ’s estimated expenditures for obesity drugs and other medical and prescription drug spending. We did not identify any studies other than AHRQ’s estimates from MEPS data that specifically addressed the medical spending for adults who used obesity drugs compared to those who did not. We provided a draft of this report to HHS for review and comment. HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Health and Human Services, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IX. The Bipartisan Budget Act of 2018 included a provision for GAO to review the prevalence of obesity and the use of obesity drugs in the Medicare and non-Medicare populations, including spending for and coverage of these drugs. We examined (1) the prevalence of obesity among adults in the United States; (2) what is known about the use of obesity drugs and the individuals who use them; (3) what is known about health insurance coverage of obesity drugs; and (4) what is known about spending on obesity drugs and about medical spending for adults who used obesity drugs compared to those who did not. To address our reporting objectives, we examined estimates from federal agencies within the Department of Health and Human Services (HHS), including the Centers for Disease Control and Prevention’s (CDC) estimates from the National Health and Nutrition Examination Survey (NHANES), the Agency for Health Care Research and Quality’s (AHRQ) estimates from the Medical Expenditure Panel Survey (MEPS), and the Food and Drug Administration’s (FDA) estimates from IQVIA and the Sentinel System. We also analyzed Medicare Part D Prescription Drug Event data and Medicaid State Drug Utilization data from the Centers for Medicare & Medicaid Services (CMS). For each data source, we examined the latest available data at the time of our review. In addition, we conducted a literature review; interviewed officials and reviewed documents from stakeholder organizations, federal agencies, insurers, and others; and examined relevant laws and regulations. We examined CDC’s nationally representative estimates from NHANES of the prevalence of obesity among U.S. adults and use of obesity drugs. NHANES is a cross-sectional survey designed to monitor the health and nutritional status of the civilian, noninstitutionalized U.S. population. The survey consists of interviews conducted in participants’ homes and standardized physical examinations, including measured height and weight, conducted in mobile examination centers. CDC analyzed data from two 2-year cycles of NHANES (2013 through 2014 and 2015 through 2016) for the prevalence of obesity [defined as a body mass index (BMI) of 30 or higher] for all adults by age (18 and older, 18 through 64, and 65 and older), health insurance coverage, and class of obesity. The insurance categories were mutually exclusive: (1) Medicare, which includes all adults who reported having Medicare, regardless of whether they reporting having another type of health insurance (e.g., private health insurance) in addition to Medicare; (2) private health insurance (excluding individuals with Medicare); (3) Medicaid/public health insurance (excluding Medicare); and (4) uninsured. We also examined CDC’s estimates from NHANES on the prevalence of overweight (defined as a BMI of 25 to <30) among U.S. adults. In addition, we examined CDC’s estimates from NHANES for 2013 through 2016 on adults who took prescription medications for weight loss. NHANES asks participants if they tried to lose weight, and, for those who did, if they took diet pills prescribed by a doctor. CDC’s estimates included the lower and upper bounds of the 95 percent confidence intervals (the interval that would contain the actual population value for 95 percent of the samples NHANES could have drawn). We examined AHRQ’s nationally representative estimates from MEPS data on the use of and payment sources for obesity drugs. MEPS collects nationally representative data on health care use, expenditures, sources of payment, and insurance coverage for the U.S. civilian, noninstitutionalized population. For this analysis, AHRQ estimated the distribution of payments for obesity drugs using MEPS pooled data for years 2012 through 2016. We also examined AHRQ’s estimates from MEPS of annual expenditures for medical care and all prescription drugs—for those individuals who used obesity drugs and those who did not—and annual expenditures for obesity drugs. AHRQ’s estimates included the lower and upper bounds of the 95 percent confidence intervals. We examined FDA’s nationally projected data on the prescriptions dispensed for obesity drugs from outpatient retail pharmacies using 2017 IQVIA™ National Prescription Audit Extended Insights and IQVIA™ Total Patient Tracker. IQVIA™ is proprietary data that includes data for prescriptions dispensed at approximately 59,900 U.S. outpatient retail pharmacies. FDA analyzed IQVIA data and provided aggregated results for the nationally estimated number of prescriptions dispensed for the nine obesity drugs from U.S. outpatient retail pharmacies, by payment method. These patterns may not apply to other settings of care (e.g., mail-order or specialty pharmacies or clinics). In addition, the analysis captures data when a prescription was dispensed; it does not indicate that the patient took the obesity drug, and it does not indicate if the drug was prescribed off label for something other than weight loss. We examined FDA’s national estimates of prescriptions for obesity drugs dispensed by outpatient pharmacies for new users of obesity drugs (by number of days supplied and by age and gender of patient) from the agency’s Sentinel System. FDA’s Sentinel System uses prescription drug dispensing data from populations with federal or commercial insurance to characterize drug utilization of a large U.S. population with private and public health insurance. FDA examined drug dispensing data from January 1, 2008, through December 31, 2017, from 17 of 18 Sentinel data partners, including Medicare, which contributed fee-for- service enrollee data. FDA analyzed dispensings for 267,836 new users of the nine prescription obesity drugs. FDA estimated the duration of the first treatment episode (in days) for patients’ prescription dispensings for any of the nine obesity drugs using a 14-day episode gap—that is, if there were more than 14 days between exhausting the previous dispensing’s days supplied for that prescription and refilling the prescription, then FDA counted it as a new treatment episode. FDA estimated cumulative treatment duration by summing days’ supply of all dispensings of an obesity drug during a patient’s presence in the database, without regard to time between dispensings. For information on the number of claims for obesity drugs that were reimbursed, the number of plans that provided reimbursement, and the amount reimbursed for obesity drugs under the Medicare prescription drug program known as Medicare Part D, we analyzed Medicare Prescription Drug Event data from CMS for 2016 and 2017. We analyzed Medicare Part D plan reimbursements (payments to pharmacies) and beneficiary spending (the total amount Medicare beneficiaries paid out of pocket as copayments or deductibles) for the nine obesity drugs for claims that CMS’s data coded as reimbursed as a supplemental drug under enhanced alternative coverage. We excluded 1,787 claims in 2016 and 1,775 claims in 2017 for one obesity drug, orlistat (Xenical), that were listed in CMS’s data as covered under Medicare Part D (and were not coded as a supplemental drug under enhanced alternative coverage). According to CMS officials, orlistat has off-label indications including diabetes and hyperlipidemia, and when orlistat is used for these indications the drug would be covered under Medicare Part D, and the Medicare Part D plan is responsible for ensuring it is dispensed appropriately per Medicare Part D policy. We also excluded 25 claims in 2016 and 26 claims in 2017 for prescription obesity drugs listed as over-the-counter in the prescription drug event data because, according to CMS, these appear to be outliers. Because our analysis was limited to those instances in which a Medicare Part D plan reimbursed for an obesity drug as a supplemental drug under enhanced alternative coverage, the number of Medicare Part D plans that provided coverage for obesity drugs could be higher. For example, some plans may have covered obesity drugs, but none of the beneficiaries enrolled in these plans filled a prescription for such a drug. For information on obesity drugs reimbursed by state Medicaid programs or Medicaid managed care programs within those states, we analyzed CMS’s Medicaid State Drug Utilization data for 2016 and 2017. We analyzed the data to estimate the number of prescriptions reimbursed and total Medicaid state and federal spending—that is, the Medicaid amount reimbursed (state and federal reimbursement, including dispensing fees)—for the nine obesity drugs. These amounts do not include all Medicaid spending for obesity drugs because managed care organizations can be paid for the drugs as part of their capitated payment for all Medicaid services, they are not reimbursed on a per-drug basis, and their payments are not recorded in CMS’s Medicaid State Drug Utilization data. Because our analysis was limited to those instances in which Medicaid reimbursed for an obesity drug, the number of states in which state Medicaid programs or Medicaid managed care plans provided coverage for obesity drugs could be higher. For example, a state could have provided coverage for obesity drugs, but no beneficiaries in that state filled a prescription for an obesity drug. We obtained information and reviewed studies from officials from eight stakeholder organizations (representing medical associations and advocacy groups for obesity research and treatment) on the use of obesity drugs and guidelines for using obesity drugs and to obtain their perspectives on what physicians and other health care providers take into consideration when prescribing these drugs, among other things. These stakeholders were selected because of their medical or scientific expertise, relevant publications, or familiarity with the treatment of obesity and obesity drugs. We also reviewed data and documents and interviewed officials from HHS agencies: CDC, FDA, AHRQ, CMS, and the National Institutes of Health. In addition, we reviewed guidance documents and obtained information from the Office of Personnel Management, which administers the Federal Employees Health Benefits program (FEHBP). FEHBP is the largest employer-sponsored health insurance program in the United States, providing health insurance coverage to about 8 million federal employees, retirees, and their dependents in 2016 through contracts with private health insurance plans. We obtained information about the health insurance coverage of obesity drugs from officials from the three largest pharmacy benefit managers, four large insurers, and two organizations knowledgeable about prescription drug benefits for employer-sponsored health plans. We also reviewed drug formularies for selected private health insurance plans, including FEHBP plans, to determine if any of the nine obesity drugs were included. We conducted a literature review of relevant peer-reviewed studies published from January 2012 through January 2019. We identified studies through a search of bibliographic databases, including ProQuest, Scopus, MEDLINE, and International Pharmaceutical Abstracts , using terms such as “obesity,” “weight loss,” and “prescriptions.” Of the 765 citations we identified, we reviewed 220 full studies, which we examined for information related to the use of obesity drugs and individuals who use them, coverage of obesity drugs, and spending for obesity drugs for individuals who used them compared to those who did not. We determined 19 studies were relevant to the use of obesity drugs and 1 study was relevant to coverage of obesity drugs. Our literature review focused on studies with a U.S.-based, adult population (age 18 and older); we excluded studies related to childhood obesity and studies on animals. We also examined available information on the clinical trials conducted prior to FDA approval of the prescription obesity drugs for the U.S. market, including 64 studies from our literature review that summarized one or more of the clinical trials. We also identified 17 additional studies in our literature review that provided relevant background information. Additionally, we reviewed five studies provided by stakeholder organizations (in addition to the studies we had identified in our literature review) that we determined were relevant to our research objectives, as well as guidelines for the use of obesity drugs in obesity treatment. To determine the reliability of the data we used for all four objectives— CDC’s estimates from NHANES, AHRQ’s estimates from MEPS, FDA’s data from IQVIA and the Sentinel System, and CMS’s Medicare Part D Prescription Drug Event data and Medicaid State Drug Utilization data— we reviewed documentation on data collection processes and discussed limitations of the data with the relevant federal agency officials. In addition, we conducted data reliability checks on the data, when appropriate. We determined the data used in this report were sufficiently reliable for our purposes. We conducted this performance audit from April 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 4 provides additional information on the nine prescription drugs approved by the Food and Drug Administration (FDA) to treat obesity that we included in our review. This appendix presents national estimates of the prevalence of obesity among U.S. adults age 18 and older, based on the Centers for Disease Control and Prevention’s (CDC) estimates from the National Health and Nutrition Examination Survey (NHANES) for 2013 through 2016. It presents the estimates and the ranges for the 95 percent confidence intervals for prevalence of obesity by age and class of obesity (see table 5), and by insurance coverage and class of obesity (see table 6). It also presents national estimates of the prevalence of overweight (defined as a body mass index of 25 to <30) among U.S. adults, by age and insurance coverage (see table 7). Table 8 is a list of selected studies, categorized by specific topic area, that we reviewed that pertain to our research objectives, including information related to the use of obesity drugs and individuals who use them, physician considerations in prescribing obesity drugs, and health insurance coverage of obesity drugs. We identified these studies either through our literature review of peer-reviewed studies published from January 2012 through January 2019 or from one of the stakeholder organizations we contacted. This appendix presents estimates of prescriptions dispensed for new adult users of obesity drugs by duration of use and by age and gender, using data from the Food and Drug Administration’s (FDA) Sentinel System from 2008 through 2017. Of the 267,836 new users of obesity drugs included in this analysis, the first treatment episode did not exceed 30 days in about 54 percent of patients and exceeded 90 days in about 22 percent of patients. Cumulatively, about 42 percent of patients who used any of the obesity drugs did so for more than 90 days across treatment episodes. (See table 9.) Overall, most new users of obesity drugs were female (82.2 percent) and under age 65 (91.7 percent). (See table 10.) Phentermine and bupropion/naltrexone (Contrave) were the most commonly used obesity drugs in FDA’s Sentinel System analysis. This appendix presents information on Medicare Part D plan reimbursement for obesity drugs under enhanced alternative coverage from our analysis of Centers for Medicare & Medicaid Services’ (CMS) Prescription Drug Event data. Medicare Part D plans can choose whether or not to offer enhanced alternative coverage, and not all Medicare Part D plans that provide enhanced alternative coverage cover obesity drugs as supplemental drugs. As of February 2017, 1,949 Medicare Part D plans provided enhanced alternative coverage to 18.9 million Medicare beneficiaries, according to the Medicare Payment Advisory Commission. Additionally, in 2015, total Medicare Part D spending for prescription drugs was about $137 billion—this represents payments from all payers including beneficiaries (cost sharing), and excluding rebates and discounts from pharmacies and manufacturers that are not reflected in prices at the pharmacies. Tables 11 and 12 show the number of claims reimbursed, the number of plans that provided reimbursement, and the amount reimbursed for obesity drugs under Medicare Part D enhanced alternative coverage for 2016 and 2017, respectively. This appendix presents information on Medicaid reimbursements for obesity drugs under state Medicaid programs or Medicaid managed care programs within those states from our analysis of Centers for Medicare & Medicaid Services’ (CMS) Medicaid State Drug Utilization data. State Medicaid programs or Medicaid managed care programs reimbursed for at least one obesity drug prescription in 42 states in 2016 and 41 states in 2017. The amount that Medicaid reimbursed and the total number of prescriptions for obesity drugs reimbursed by Medicaid in 2016 and 2017 are shown by state (tables 13 and 14), and by obesity drug (tables 15 and 16). Over half of the prescriptions for obesity drugs reimbursed under Medicaid in 2016 and 2017 were for the generic obesity drug, phentermine. This appendix presents nationally representative estimates of U.S. adults’ average annual expenditures (spending) for medical care, all prescription drugs, and for obesity drugs from the Agency for Healthcare Research and Quality (AHRQ) based on data from the Medical Expenditure Panel Survey (MEPS) for 2012 through 2016. Table 17 shows the estimated average annual expenditures for all prescription drugs and table 18 shows the estimated average annual medical expenditures, including prescription drugs, per adult who used and per adult who did not use any obesity drugs. For adults age 18 to 64, the differences in the estimated average annual expenditures for all medical care and for all prescriptions drugs per adult who used and who did not use any of the nine obesity drugs in our review were statistically significant. However, the differences in these estimates do not indicate that there was a causal relationship between using obesity drugs and having higher average annual medical or prescription drug expenditures. Table 19 shows the estimated average annual expenditures per adult for obesity drugs. In addition to the contact above, Kim Yamane (Assistant Director), Lisa A. Lusk (Analyst-in-Charge), George Bogart, Zhi Boon, Kaitlin Dunn, Laurie Pachter, and Merrile Sing made key contributions to this report. Also contributing to this report were Alexander Cattran, Leia Dickerson, Diona Martyn, Christina Ritchie, and Ethiene Salgado-Rodriguez.", "summary": "Obesity has been associated with an increased risk of developing conditions such as heart disease, stroke, diabetes, and certain types of cancer. Treatment options for individuals with obesity include lifestyle therapy, such as diet, exercise, and behavioral counseling; obesity drugs; surgery; or a combination of these efforts. The Bipartisan Budget Act of 2018 (P.L. 115-123) included a provision for GAO to review the prevalence of obesity and the use and insurance coverage of obesity drugs. This report examines the prevalence of obesity in the United States, and what is known about the use and health insurance coverage of obesity drugs, among other objectives. GAO examined data from agencies within the Department of Health and Human Services (HHS) on the prevalence of obesity (using estimates for 2013 through 2016) and the use, spending, and coverage of obesity drugs; conducted a literature review of relevant studies published from January 2012 through January 2019 in peer-reviewed and other publications; reviewed drug formularies for selected health plans; and reviewed documents and interviewed officials from federal agencies and stakeholder organizations (including medical associations, advocacy groups, pharmacy benefit managers, and insurers). HHS provided technical comments on a draft of this report, which were incorporated as appropriate. The prevalence of obesity—that is, body weight higher than what is considered a healthy weight for a given height—was about 38 percent among all U.S. adults, according to the latest available national estimates at the time of GAO's analysis. This prevalence was similar for adults with different types of health insurance. Treatment for adults with obesity may include one or more of nine prescription drugs that the Food and Drug Administration has approved for weight management (i.e., obesity drugs), though relatively few adults have used these drugs. Of an estimated 71.6 million U.S. adults with obesity, an estimated 660,000 per year, on average, used an obesity drug from 2012 through 2016, according to national estimates. Among adults who reported trying to lose weight, about 3 percent reported that they took prescription medication for weight loss from 2013 through 2016, according to national estimates. Coverage of obesity drugs varied across different types of health insurance, including Medicare and Medicaid. Plans cited factors such as low consumer demand and strong evidence supporting other treatments in their coverage decisions. GAO's analysis of Centers for Medicare & Medicaid Services' data indicates that some Medicare prescription drug plans and state Medicaid programs reimbursed for some obesity drugs in 2016 and 2017. Coverage for private health insurance plans also varied, and plans may require the patient to obtain prior authorization for the drugs to be covered, according to officials from insurers and pharmacy benefit managers GAO interviewed. For example, officials from one insurer said that some of their plans only cover obesity drugs after a patient has tried other treatment options such as behavioral counseling.", "document_type": "gao"}
{"report": "In September 2017, two Category 5 hurricanes struck the USVI, causing catastrophic damage across the entire territory and neighboring Caribbean islands. On September 6, 2017, Hurricane Irma struck St. Thomas and St. John and on September 19, 2017, Hurricane Maria struck St. Croix (see fig. 1). The storms severely damaged the territory’s critical infrastructure, devastating more than 90 percent of aboveground power lines and shutting down electricity and telecommunications for months. Further, 52 percent of the territory’s housing units were damaged, ports and airports were closed for weeks, and hundreds of thousands of tons of debris were generated, often blocking roads and making transportation hazardous. In addition, according to a September 2018 report from the USVI Hurricane Recovery and Resilience Task Force, the territory’s economic activity— especially tourism—was severely reduced in the months following the storms, leading to job losses and a total estimated economic impact of $1.54 billion. In response to the request of the Governor of the USVI, the President declared a major disaster the day after each hurricane struck the territory. Major disaster declarations can trigger a variety of federal response and recovery programs for government and nongovernmental entities and households and individuals, including assistance through the Public Assistance program. Under the National Response Framework and National Disaster Recovery Framework, DHS is the federal department with primary responsibility for coordinating disaster response and recovery, and within DHS, FEMA has lead responsibility. The Administrator of FEMA serves as the principal adviser to the President and the Secretary of Homeland Security regarding emergency management. FEMA’s Public Assistance program provides funding to state, territorial, local, and tribal governments as well as certain types of private nonprofit organizations to assist with responding to and recovering from major disasters or emergencies. As shown in figure 2, Public Assistance program funds are categorized broadly as “emergency work” or “permanent work.” Within these broad categories are separate subcategories. In addition to the emergency work and permanent work categories, the program includes category Z, which represents indirect costs, administrative expenses, and other expenses a recipient or subrecipient incurs in administering and managing the Public Assistance program that are not directly chargeable to a specific project. FEMA’s Public Assistance program also provides funding for cost- effective hazard mitigation measures to reduce or eliminate the long-term risk to people and property from future natural and man-made disasters and their effects. Specifically, FEMA provides funding for hazard mitigation measures in conjunction with the repair of disaster-damaged facilities to enhance their resilience during future disasters. For example, a community that had a fire station damaged by a disaster could use Public Assistance funding to repair the facility and incorporate additional measures such as installing hurricane shutters over the windows to mitigate the potential for future damage. Once the President has declared a disaster, FEMA, the state or territorial government (the recipient), and local or territorial entities (the subrecipient) work together to develop damage assessments and formulate project worksheets for eligible projects. Project worksheets detail the scope of work and estimated cost for repairing or replacing disaster-damaged infrastructure as well as any hazard mitigation measures that may help to increase the resilience of this infrastructure during future disasters. After a project has completed FEMA’s review process and is approved, FEMA obligates funding for the project by placing money into an account where the recipient has the authority to draw down—or withdraw—funding to pay the subrecipient for eligible work upon completion (see fig. 3). In addition, a state or territorial governor may designate a governor’s authorized representative (GAR) to oversee all aspects of disaster assistance, including Public Assistance funding. Specifically, the GAR is responsible for ensuring compliance with program requirements by providing oversight into how goods and services are procured for projects, such as construction materials or modular school units. The GAR also confirms that subrecipients submit complete documentation demonstrating that all work completed is in accordance with a project’s approved scope of work and Public Assistance program requirements. The GAR then approves the paperwork and the recipient can draw down funding from the account holding the obligations to reimburse subrecipients for completed work. When a project has been completed, FEMA conducts a close-out process to certify that all work has been completed and reconciles the actual cost incurred. If the actual cost of the completed work is greater than the amount of money FEMA obligated for the project, FEMA will reimburse the subrecipient for these additional costs. The Sandy Recovery Improvement Act of 2013 authorized the use of alternative procedures in administering the Public Assistance program, thereby providing new flexibilities to FEMA, states, territories, and local governments for debris removal, infrastructure repair, and rebuilding projects using funds from this program. Unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures allow awards for permanent work projects to be made on the basis of fixed-cost estimates to provide financial incentives for the timely and cost-effective completion of work. Under these procedures, if the actual cost of the project exceeds the fixed-cost estimate agreed upon by FEMA and the recipient, the recipient or subrecipient is responsible for the additional costs at the time of the close-out process. However, if the actual cost of completing eligible work for a project is below the estimate, the recipient may use the remaining funds for additional cost-effective hazard mitigation measures to increase the resilience of public infrastructure. In addition, these funds may also be used for activities that improve the recipient’s or subrecipient’s future Public Assistance operations or planning. As of October 1, 2018, FEMA had obligated more than $1.4 billion through the standard Public Assistance program for 475 projects across the USVI. As shown in figure 4, FEMA obligated funding for both emergency work and permanent work projects. As of October 1, 2018, of the more than $1.4 billion FEMA obligated, the USVI had expended approximately $586.9 million—about 41 percent of total Public Assistance program obligations to the USVI—to reimburse subrecipients for completed work. Of this $586.9 million, the USVI had expended about $532.8 million (91 percent) for emergency work projects in categories A and B and $49.1 million (8 percent) for permanent work projects in categories C through G. The majority of FEMA’s obligations and the funding the USVI expended as of October 1, 2018, are for emergency work because these projects began soon after the disasters struck and focused on debris removal and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer-term repair and restoration of public infrastructure. Emergency work. Of the more than $1.4 billion FEMA had obligated as of October 1, 2018, about $873.8 million (60 percent) was obligated for 322 emergency work projects in Public Assistance categories A and B. Category A: Debris Removal. FEMA obligated about $94.0 million for 71 projects focused on debris removal activities across the territory. For example, FEMA obligated $45.0 million to the USVI Department of Public Works for territorywide debris removal efforts and $39.1 million to the USVI Water and Power Authority for these activities in St. Croix (see fig. 5). Of the $94.0 million FEMA obligated for debris removal, the USVI had expended about $54.6 million (58 percent) as of October 1, 2018. Category B: Emergency Protective Measures. FEMA obligated about $780 million for 251 projects focused on emergency measures. For example, FEMA obligated about $187 million for the Sheltering and Temporary Essential Power program, which is intended to provide essential repairs or restore power to private residences to allow affected individuals to return or remain in their homes, thereby reducing the demand for other shelter options. In addition, FEMA obligated approximately $101 million for the purchase and installation of modular units to be used as temporary classrooms and other facilities while permanent school buildings are repaired or replaced (see fig. 6). Of the $780 million FEMA obligated for emergency protective measures, the USVI had expended about $478 million (61 percent) as of October 1, 2018. Permanent work. Of the more than $1.4 billion in Public Assistance funding FEMA had obligated as of October 1, 2018, about $516.3 million (36 percent) was obligated for 153 permanent work projects across categories C through G. These permanent work projects include about $349.4 million for cost-effective hazard mitigation measures aimed at reducing the future risk of disaster-damaged facilities in conjunction with their repair. Further, of the $516.3 million FEMA obligated for permanent work in the USVI, approximately $500.4 million—or 97 percent of all permanent work obligations—was obligated to the USVI Water and Power Authority for the permanent repair of electrical distribution systems and other utilities across the territory. Category C: Roads and Bridges. FEMA obligated about $5.2 million for 35 projects focused on repairing roads and bridges in the territory, 18 of which included hazard mitigation measures totaling about $1.5 million. For example, FEMA obligated about $410,000 for one project to repair a road on St. Thomas damaged by floodwaters. This project included approximately $227,000 for hazard mitigation measures, such as replacing the damaged road surface with reinforced concrete and building a retaining wall. As of October 1, 2018, the USVI had not expended funding in this category. Category D: Water Control Facilities. As of October 1, 2018, FEMA did not have any projects in this category. According to FEMA officials, the USVI does not have water control infrastructure that would fall under category D, such as dams, levees, or berms. Category E: Buildings and Equipment. FEMA obligated $6.0 million for 77 projects focused on repairing and rebuilding damaged buildings and equipment, 16 of which included hazard mitigation measures totaling about $1.8 million. For example, FEMA obligated about $1.5 million to repair damage to the airport terminal building in St. Thomas—a project where hazard mitigation measures comprised 87 percent of the project’s total cost (see fig. 7). These measures include replacing the terminal’s roof with materials designed to withstand higher wind speeds to increase the building’s resilience during future storms. Of the $6.0 million FEMA obligated for category E, the USVI had expended about $148,000 (2.5 percent) as of October 1, 2018. Category F: Utilities. Of the $516.3 million FEMA obligated for permanent work projects, $502.2 million (97 percent) was obligated for 15 projects focused on repairing utilities, 7 of which included hazard mitigation measures totaling about $346.0 million. For example, FEMA obligated $286.1 million and $50.2 million for permanent electrical distribution system repairs in St. Croix and St. John, respectively. This includes replacing damaged wooden utility poles with more resilient composite fiberglass poles that can withstand 200 mile per hour winds as well as power transmission lines and transformers (see fig. 8). Of the $502.2 million FEMA obligated for category F, the USVI had expended about $49.0 million (10 percent) as of October 1, 2018. Category G: Parks, Recreational, and Other Facilities. FEMA obligated about $2.9 million for 26 projects focused on repairing parks, playgrounds, and other recreational facilities, 1 of which included hazard mitigation measures. Specifically, FEMA obligated about $453,000 to repair the Lindbergh Park and Water Playground in St. Thomas—a project that included about $18,000 for hazard mitigation measures. As of October 1, 2018, the USVI had not expended funding in this category. Future projects. In addition to the more than $1.4 billion in Public Assistance funding FEMA had obligated as of October 1, 2018, FEMA expected to review an additional 900 future projects for eligibility representing an estimated $779.4 million in potential funding. Of this estimated total amount, FEMA anticipates $128.5 million (16 percent) in costs for future emergency work projects and $650.9 million (84 percent) in costs for future permanent work projects. In July 2018, FEMA approved a June 2018 request from the Governor of the USVI to transition to using the Public Assistance alternative procedures program for permanent work in the territory. The alternative procedures provide new flexibilities to FEMA and the USVI that are not available through the standard Public Assistance program. In September 2018, FEMA issued the Public Assistance Alternative Procedures Permanent Work Guide for the USVI to provide guidance on the implementation of the program in the territory. FEMA and USVI officials stated that a section of the Bipartisan Budget Act of 2018 and the flexibilities provided by the program itself influenced the USVI’s decision to transition to using the alternative procedures. First, Section 20601 of the Bipartisan Budget Act of 2018 authorized FEMA, when using the Public Assistance alternative procedures, to provide assistance to fund the replacement or restoration of disaster- damaged infrastructure that provide critical services to industry standards without regard to pre-disaster condition. FEMA and USVI officials told us that the territory therefore has a valuable opportunity to use the alternative procedures to repair and rebuild its critical services infrastructure—including the USVI’s education system, electrical grid, and emergency medical care system, among others—so it is in a better condition than it was prior to the 2017 hurricanes. Second, USVI officials stated that under the standard Public Assistance program currently being used in the USVI, the territorial government is responsible for providing the initial funding to reimburse subrecipients for completed work prior to drawing down funds from the account holding the FEMA- obligated amounts of money for each project. They explained that because of the financial liquidity challenges facing the territory, this process was problematic and required USVI officials to prioritize projects based on the availability of the territory’s funding. USVI officials stated that the Public Assistance alternative procedures will help to address this challenge by providing the territory with more flexibility regarding when and how to fund projects. For example, in certain cases, the USVI is able to consolidate permanent work projects approved under the alternative procedures and share obligated funding across these projects. In addition, the USVI is able to use any excess funds for cost-effective hazard mitigation measures or for activities that improve the recipient’s or subrecipient’s future Public Assistance operations or planning. As of November 2018, FEMA and USVI officials stated they were working to identify and develop permanent work projects using the Public Assistance alternative procedures and discussing the process for developing the fixed-cost estimate for each project. Specifically, unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures use a fixed-cost estimate which is agreed to prior to obligation and the USVI will be financially responsible for any actual costs that exceed this amount. Given the USVI’s difficult fiscal situation, FEMA and USVI officials stated that ensuring these fixed-cost estimates are as accurate as possible will be critical. However, FEMA officials also noted that if FEMA and the territory cannot come to an agreement on a fixed-cost estimate for any given project, the USVI does have the option to move forward through the standard Public Assistance program. According to FEMA’s Public Assistance Alternative Procedures Permanent Work Guide for the USVI, all cost estimates for projects using these procedures must be finalized by March 2020. We will continue to monitor the USVI’s plans for using the alternative procedures as part of our broader work assessing disaster recovery efforts in the USVI and will issue a follow-on report later this year. We provided a draft of this report to DHS and the USVI government. We requested comments from DHS and the USVI government, but none were provided. DHS did provide technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the Administrator of FEMA, the USVI government, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you and your staff have any questions, please contact me at (202) 512- 8777 or curriec@gao.gov. GAO staff who made key contributions to this report are listed in appendix II. Chris Currie, 202-512-8777 or curriec@gao.gov. In addition to the contact named above, Joel Aldape (Assistant Director), Bryan Bourgault, Leanna Diggs, Aaron Gluck, Eric Hauswirth, Brian Lipman, Amanda Miller, Heidi Nielson, and Kevin Reeves made key contributions to this report.", "summary": "In September 2017, two major hurricanes—Irma and Maria—struck the USVI, causing billions of dollars in damage to its infrastructure, housing, and economy. FEMA—a component of the Department of Homeland Security—is the lead federal agency responsible for assisting the USVI as it recovers from these natural disasters. Among other responsibilities, FEMA administers the Public Assistance program in partnership with the USVI territorial government, providing the USVI grant funding for response and recovery activities, including debris removal efforts, life-saving emergency protective measures, and the repair, replacement, or restoration of public infrastructure. GAO was asked to review the federal government's response and recovery efforts related to the 2017 hurricanes. This report describes (1) the status of FEMA's Public Assistance program funding provided to the USVI in response to the 2017 hurricanes as of October 1, 2018, and (2) the USVI's transition to implementing the Public Assistance alternative procedures in the territory. GAO reviewed program documents and data on obligations and expenditures as of October 1, 2018, and interviewed officials from FEMA and the USVI regarding the Public Assistance program specifically and disaster recovery efforts more generally. GAO also conducted site visits to the USVI islands of St. Croix, St. Thomas, and St. John. GAO is not making any recommendations in this report, but will continue to monitor the progress of the USVI's recovery as part of its ongoing work. The Federal Emergency Management Agency (FEMA) obligated more than $1.4 billion in grant funding for Public Assistance projects in the U.S. Virgin Islands (USVI) as of October 1, 2018, in response to the 2017 hurricanes. FEMA obligated about $873.8 million for emergency work—debris removal activities and emergency measures to lessen the immediate threat to life, public health, and safety—and about $516.3 million for permanent work—including the repair or replacement of public infrastructure such as roads, electrical utilities, and schools. For example, FEMA obligated about $101 million for the purchase and installation of modular units to be used as temporary classrooms and other facilities while permanent school buildings are repaired or replaced. FEMA's obligations for permanent work also included funding for hazard mitigation measures to reduce the risk of damage during future storms—for example, by replacing wooden utility poles with composite fiberglass poles (see figure). FEMA and the USVI are transitioning from using the standard Public Assistance program in the territory to using the Public Assistance alternative procedures program. Unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the alternative procedures allow awards to be made on the basis of fixed-cost estimates to provide financial incentives for the timely and cost-effective completion of permanent work projects. FEMA and USVI officials stated that the alternative procedures will give the USVI more flexibility in determining when and how to fund projects and provide an opportunity to repair and rebuild the USVI's critical services infrastructure—such as its education system and electrical grid—so it meets industry standards without regard to pre-disaster condition. As of November 2018, FEMA and USVI officials were discussing the process for developing projects under the Public Assistance alternative procedures. GAO will continue to monitor the USVI's plans for using the alternative procedures as part of its broader review assessing the USVI's disaster recovery efforts and will issue a follow-on report later this year.", "document_type": "gao"}
{"report": "Individuals engage in countless online transactions every day—from checking their bank accounts and making retail purchases to signing up for federal benefits and services. However, securing such transactions is a complex endeavor. A key part of this process is verifying that the person who is attempting to interact for the first time with an organization, such as a federal agency or a business, is the individual he or she claims to be. This process, known as identity proofing, is essential to prevent fraud, which could cause harm to both individuals and organizations. Identity proofing may occur in person or through a remote, online process. In the case of in-person identity proofing, a trained professional verifies an individual’s identity by making a direct physical comparison of the individual’s physical features and other evidence (such as a driver’s license or other credential) with official records to verify the individual’s identity. Verification of these credentials can be performed by checking electronic records in tandem with physical inspection. In-person identity proofing is considered a strong method of identity proofing. However, it may not always be feasible to require that all applicants appear in person. In such cases, remote identity proofing is performed. Remote identity proofing is the process of conducting identity proofing entirely through an online exchange of information. When remote identity proofing is used, there is no way to confirm an individual’s identity through their physical presence. Instead, the individual provides the information electronically, or performs other electronically verifiable actions that demonstrate his or her identity. Because many federal benefits and services are offered broadly to large numbers of geographically dispersed applicants, agencies often rely on remote identity proofing to verify the identities of applicants. Remote identity proofing involves two major steps: (1) resolution and (2) validation and verification. During the resolution step, an organization determines which specific identity an applicant is claiming when they first attempt to initiate a transaction, such as enrolling for federal benefits or services, remotely. The most common form of remote interaction is through an organization’s website. The organization starts the identity resolution process by having the applicant provide identifying information, typically through a web-based application form. Examples of information that an organization may collect for identity resolution include name, address, date of birth, and Social Security number. The organization then electronically compares the applicant’s identifying information with electronic records that it already has in its databases or with records maintained by another entity, such as a CRA, to determine (or “resolve”) which identity is being claimed. For example, if an individual named John Smith were applying, the organization would obtain enough identifying information about him to determine which “John Smith” he is from among the thousands of John Smiths that it may have in its records or that may be documented in the records of the CRA that it is using for this process. Once the resolution process is complete, the process of validation and verification occurs. In this process, steps are taken to verify whether the applicant is really who they claim to be. For example, in the case of John Smith, it is not enough simply to determine which John Smith is being claimed, because the claimant may not really be John Smith at all. Organizations need to obtain electronic evidence from the remote applicant to verify their identity. Organizations can use a variety of techniques to accomplish this goal. Knowledge-based verification is a technique that commonly has been used for this purpose. With knowledge-based verification, organizations ask applicants detailed and personal questions, under the presumption that only the real person will know the answers to these questions. To do this, the organization poses a series of multiple choice questions through an online web form, and the applicant selects the appropriate responses and submits the answers through the web form. If the applicant has chosen the correct responses, through the remotely accessed web form, their identity is considered to be verified, and the validation and verification step is complete. Figure 1 depicts the typical process that organizations use for remote identity proofing (including the use of knowledge-based verification). As previously mentioned, to perform knowledge-based verification for remote identity-proofing, federal agencies and other organizations often use services provided by CRAs. The CRAs assemble and evaluate consumer credit and other information from a wide variety of sources. Equifax, Experian, and TransUnion—the three nationwide CRAs—use the personal information they obtain about individuals from organizations, such as financial institutions, utilities, cell phone service providers, public records, and government sources, to compile credit files containing detailed records about individuals. They then use the information in these files to offer a variety of services to federal agencies and other entities. These services can include identity verification, as well as verification of income and employment of a candidate for a job or an applicant for benefits or services. To support organizations that rely on knowledge-based verification, CRAs generate multiple choice questions that organizations can use to test applicants’ knowledge of information in their credit files. The organizations using the CRA services do not generate the questions themselves, because they do not have access to the credit history information maintained by the CRAs. Rather, the CRAs’ remote identity proofing systems transmit the questions and multiple choice answers to the organization through an automated electronic connection with the organization’s website. The organization’s website then displays the questions and multiple choice answers to the applicant through the web application that the applicant is using to apply for access to benefits or services. Typically, the questions generated by CRA identity proofing systems ask about lenders, mortgage details, current and past home addresses, or credit card accounts. Once the applicant has selected answers to the questions and enters them in the online application, the organization’s automated system electronically relays the applicant’s responses to the CRA’s remote identity proofing system; this system then compares the responses with information in the applicant’s credit file. If this comparison determines that the applicant correctly responded to the questions, then the applicant’s identity is considered to be verified. The CRA’s identity proofing system electronically transmits the results of its comparison to the organization’s website to allow the applicant, whose identity is now considered verified, to proceed with applying for benefits or services. The Federal Information Security Modernization Act of 2014 (FISMA) is intended to provide a comprehensive framework for ensuring the effectiveness of security controls over information resources that support federal operations and assets, as well as the effective oversight of information security risks. FISMA assigns responsibility to the head of each agency to provide information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of information systems used or operated by an agency or on behalf of an agency. FISMA assigns responsibility to NIST for developing comprehensive information security standards and guidelines for federal agencies. These include standards for categorizing information and information systems according to ranges of risk levels and guidelines for establishing minimum security requirements for federal information systems. To fulfill its FISMA responsibilities, NIST has issued technical guidance on many different aspects of information security, including identity proofing. NIST issued its first guidance related to identity proofing in 2011. In 2017, NIST released an updated version of its guidance, which included guidance on identity proofing that outlines technical requirements for resolving, validating, and verifying an identity based on evidence obtained from a remote applicant. OMB requires agencies to implement NIST’s technical guidance on information security subjects within one year of issuance. In the case of NIST’s updated guidelines for remote identity proofing, agencies would have needed to implement the guidance by June 2018 to meet OMB’s time frames. FISMA assigns responsibility to OMB for overseeing agencies’ information security policies and practices. OMB, in turn, has established requirements for federal information security programs and has assigned agency responsibilities to fulfill the requirements of statutes such as FISMA. OMB policies and guidance require agencies to employ a risk- based approach and decision making to ensure that security and privacy capabilities are sufficient to protect agency assets, operations, and individuals. OMB has not issued guidance to agencies specifically on identity proofing. However, OMB developed a draft policy document in April 2018 that is intended to provide guidance to agencies on strengthening the security of information and information systems to ensure safe and secure access to federal benefits and services. While it has not yet been issued, the draft policy indicates that OMB intends to provide policy- level guidance for agencies to identify, credential, monitor, and manage user access to information and information systems and adopt sound processes for authentication and access control. The six agencies that we reviewed rely on a variety of remote identity proofing techniques, including knowledge-based verification, to ensure that the individuals who enroll for federal benefits and services are who they claim to be. These agencies typically use knowledge-based verification services offered by CRAs, which generate questions for the individuals applying for benefits or services and check the applicants’ answers to verify their identity. However, to the extent that they use knowledge-based verification, these agencies face risks because an attacker could obtain and use an individual’s personal information to answer knowledge-based verification questions and successfully impersonate that individual. Although commonly used by federal agencies for remote identity proofing, knowledge-based verification techniques pose security risks because an attacker could obtain and use an individual’s personal information to answer knowledge-based verification questions and successfully impersonate that individual. As such, NIST’s 2017 guidance on remote identity proofing effectively prohibits the use of knowledge-based verification for sensitive applications. The guidance states that the ease with which an attacker can discover the answers to many knowledge- based questions and the relatively small number of possible responses cause the method to have an unacceptably high risk of being successfully compromised by an attacker. In its guidance, NIST states that the agency no longer recommends using knowledge-based verification because it tends to be error-prone and can be frustrating for users, given the limitations of human memory. According to NIST officials, private-sector providers of remote identity proofing solutions and officials at the agencies we reviewed, alternative methods for verifying an individual’s identity are available that are not knowledge-based and can provide stronger security assurance than knowledge-based verification. Specific examples of such techniques include: Remote assessment of physical credentials. Recently developed technology allows an agency to remotely examine a physical credential, such as a driver’s license or a passport, to verify an individual’s identity. For example, an agency may have the individual use their mobile device, such as a cell phone, to capture and submit an image of their driver’s license to an agency or commercial provider of identity proofing services. The agency or commercial provider can then compare the image to documentation on file to confirm the authenticity of the credential. Technological advances in how images are captured and processed by mobile devices, such as cell phones, can provide improved assurance that the photos transmitted by these devices are genuine and that the credentials are authentic. Verification of mobile device possession. Many individuals use their cell phones on a near-continuous basis and keep their phones with them. These actions create a record of the owner’s connection with these mobile devices that is difficult for an imposter to falsify. Accordingly, an organization can query records maintained by cell phone carriers to verify the identity of an individual who is in possession of a specific mobile device and phone number. By doing this, the organization can determine how long the individual has had that particular device, compare unique identifiers, and determine if the location matches the individual’s billing information. The organization can be confident that the individual legitimately possesses the device if the device has been in use for some time and its current location corresponds to one where the device has been known to be used by its owner. Since an individual’s location information is obtained directly from the device and compared with cell phone carrier records, data entry errors by the individual, such as mistyping a phone number, are minimized and the risk of impersonation is reduced. Verification through mobile device confirmation codes. An additional method that organizations use to help verify an individual’s identity is to verify that an individual possesses a telephone number that they have supplied as part of the remote identity proofing process. Organizations perform verification of an individual’s possession of a phone number by sending a code to that phone number through the short message service (SMS) or another protocol, and ask the individual to enter the code into the online identity proofing application. This process can provide additional assurance about the individual’s identity because the verification code is transmitted through a separate electronic channel (specifically, the telephone system) from the online application where the remote identity proofing process was initiated. However, unlike the process for verifying the possession of a mobile device, the use of these codes may not prevent an imposter from using a stolen phone or stolen phone number. An imposter may be able to successfully complete the identity verification process if the applicant’s possession of the physical device has not been independently verified. In its remote identity proofing guidance, NIST requires federal agencies to use confirmation codes as a supplement to other identity proofing measures. Verification through postal mail confirmation codes. Another method that organizations use to help verify an individual’s identity is to send a confirmation code, such as a personal identification number (PIN), through the mail system to the individual’s address of record. The individual then enters the PIN in the organization’s online application to confirm that they received the code in the mail. Like the use of mobile device confirmation codes, the use of postal mail codes can provide additional assurance about the individual’s identity because the code is sent through a separate medium from the online application where the remote identity proofing process was initiated. Even with these alternatives to knowledge-based verification, however, there are limitations to the security assurances that can be provided. One way to overcome these security limitations is for a trained professional to conduct identity proofing in person. This is generally considered to be a strong approach because it allows for direct physical comparison of an individual’s documentation, including photographic evidence, to the individual attempting to enroll. Verification of the credentials being submitted can be performed by checking electronic records in tandem with physical inspection. Figure 2 provides examples of alternative identity verification and validation methods that federal agencies have reported using. Each of the alternatives to knowledge-based verification has other limitations, including implementation challenges. For example, in-person identity proofing is expensive to implement because it requires organizations to staff and maintain offices or other physical access points in multiple locations, and it can be inconvenient for applicants because it requires travel to one of these locations. Mobile device verification may not always be viable because not all applicants possess a mobile device that can be used to verify their identity. In addition, fraudsters can manipulate or “spoof” phone numbers that redirect phone calls and SMS confirmation codes to an attacker. Sending confirmation codes by postal mail can result in a delay in an individual being able to gain access to the services or benefits he or she is seeking. As previously discussed, in 2017, NIST released an updated version of its technical guidance on remote identity proofing. NIST’s 2017 guidance effectively prohibits the use of knowledge-based verification for sensitive applications because of the security risks associated with this technique. For applications where identity verification is important, the guidance prohibits agencies from providing access to online applications based solely on correct responses to knowledge-based questions. Rather, the guidance provides detailed specifications regarding the required features of the identity evidence (such as driver’s licenses and birth certificates) that an individual is to provide and how agencies are to verify that evidence. Agencies are restricted to using knowledge-based verification only for the very limited role of linking a single piece of identity evidence to an individual and only for applications where the identity verification process is not of critical importance. As a result, agencies are effectively prohibited from using traditional knowledge-based questions—the type of questions typically used in identity verification services provided by CRAs—as part of their processes. Thus, in order for agencies to ensure the effectiveness of their remote identity proofing processes, they are required to find ways to eliminate the use of knowledge-based verification. Three of the six agencies we reviewed—GSA, IRS, and VA—have taken steps to enhance the effectiveness of their remote identity proofing processes. GSA and IRS recently eliminated knowledge-based verification from their Login.gov and Get Transcript services, respectively. VA has implemented alternative methods, but only as a supplement to the continued use of knowledge-based verification. Among the other three agencies, two of them–SSA and USPS–are investigating alternative methods and have stated that they intend to reduce or eliminate their use of knowledge-based verification sometime in the future; however, these agencies do not yet have specific plans for doing so. One other agency, CMS, has no plans to reduce or eliminate knowledge-based verification for remote identity proofing. GSA has implemented alternative methods to knowledge-based verification for Login.gov. While GSA used knowledge-based verification on its Login.gov service in the past, the agency has recently implemented alternative verification techniques that do not rely on knowledge-based verification. Specifically, GSA conducts independent verification of an applicant’s possession of a mobile device, an alternative technique we previously discussed. GSA contracts with a third-party vendor to compare status information about the phone number provided by an individual with telephone company records to confirm the individual’s identity. Further, GSA officials responsible for Login.gov stated that they plan to include additional alternative verification methods to Login.gov in the near future. Specifically, by the end of May 2019, the agency plans to implement software capable of analyzing and validating photos of documentation, such as driver’s licenses, provided by applicants to further enhance the verification of their identities. In 2018, the agency tested this technology through a pilot program. GSA officials responsible for Login.gov stated that they are pursuing several other initiatives to further enhance the verification techniques they use for Login.gov. For example, they are researching new software methods for confirming the authenticity of face images and other biometric information that could be transmitted by applicants to confirm their identity. According to the officials, additional work is needed to ensure that a fraudulent image, such as a photo of a mask, is not being provided in lieu of a live image—a threat known as a “presentation attack.” The GSA officials also said they would like to work with other federal agencies to leverage data that have already been verified, such as USPS-validated mailing addresses, passport and visa information maintained by the Department of State, and IRS tax data. However, the officials cited legal and regulatory restrictions to sharing agency data as a challenge to being able to make use of resources such as these. GSA’s recent elimination of knowledge-based verification from its Login.gov identity proofing process is consistent with NIST’s 2017 guidance on remote identity proofing and reduces the risk of fraud associated with using Login.gov. The additional enhancements and coordination that the agency is working on, if successful, will likely further improve the effectiveness of its remote identity proofing processes. IRS has implemented alternative methods to knowledge-based verification for Get Transcript. While IRS used knowledge-based verification on its Get Transcript service in the past, the agency has recently implemented alternative verification techniques that do not rely on knowledge-based verification. Specifically, IRS conducts independent verification of an applicant’s possession of a mobile device and uses mobile device confirmation codes, alternative techniques we previously discussed. IRS contracts with a CRA to compare status information about the phone number provided by an individual with telephone company records to confirm the individual’s identity. Further, IRS officials responsible for Get Transcript’s identity proofing and authentication services stated that they plan to continue to add alternative verification methods to Get Transcript in the future. They stated that, in June 2017, in response to the release of NIST’s updated digital identity proofing requirements, the agency started a task force to examine the updated requirements and make recommendations on possible changes to IRS’s processes to meet the updated guidance. According to the officials, the task force developed a digital identity risk assessment process that the agency started using to assess external facing online transactions in October 2018. IRS’s recent elimination of knowledge-based verification from its Get Transcript identity proofing process and the additional enhancements that the agency is working on, if successful, will likely further improve the effectiveness of its remote identity proofing processes. VA has taken steps to better ensure the effectiveness of its remote identity proofing processes, but it continues to rely on knowledge-based verification for certain categories of individuals. As previously mentioned, VA relies on two different providers, a commercial identity verification service (called ID.me) and DOD’s DS Logon, to conduct identity proofing for its benefits systems. These providers use a mix of knowledge-based verification and alternative techniques. DOD’s DS Logon verifies applicants using knowledge-based verification, while the commercial provider uses both knowledge-based verification processes as well as stronger alternative techniques. For example, the commercial provider uses cellular phone data to verify an applicant’s identity based on the device subscriber’s relationship to a claimed identity and the subscriber’s tenure with the carrier. VA’s commercial provider can also remotely authenticate identity documents. In this regard, applicants can scan the front and back of driver’s licenses, state identification, and passports, and upload the images to the commercial provider, which then analyzes the images to ensure that the documents meet standards and contain valid information. Further, the provider verifies applicants by having them take photos of themselves and then using facial recognition technology to match the applicants’ images with their identity documents. VA officials in the agency’s information technology and benefits program offices believe that the alternative forms of identity proofing used by its commercial provider as a supplement to knowledge-based verification provide an acceptable level of assurance. Nevertheless, the officials acknowledged that it is important to eventually eliminate knowledge- based verification from the agency’s identity-proofing processes. However, the agency does not have specific plans with time frames and milestones to eliminate the use of knowledge-based verification. VA officials stated that it has not yet established plans for doing so because of its reliance on DOD’s DS Logon service, which still uses knowledge- based verification. Until it develops a specific plan with time frames and milestones to eliminate its reliance on knowledge-based verification, VA and the individuals it serves will continue to face a degree of identity fraud risk that could be reduced. SSA continues to rely on knowledge-based verification for its My Social Security service, but SSA officials stated that the agency intends to eliminate knowledge-based verification in the future. According to the SSA Chief Information Security Officer, in fiscal year 2019, the agency intends to pilot alternative verification methods, such as using the commercial ID.me service. In addition, the official said SSA plans to research other alternatives that could be used to replace knowledge- based verification, including modernizing its legacy systems so that they can use Login.gov or another shared identity management platform. The agency has set a goal of eliminating the use of knowledge-based verification in fiscal year 2020. As an interim measure to reduce the risks associated with knowledge- based verification, SSA officials stated that they limit the period of time and the number of attempts that an individual has to answer the knowledge-based verification questions. These limitations are designed to prevent a potential fraudster from researching the answers to the questions. In addition, SSA also sends a confirmation code via email or SMS, which individuals must enter online before being given access to their account. SSA does not yet have specific plans and milestones to achieve its goal of implementing enhanced remote identity proofing processes by fiscal year 2020. SSA officials stated that they cannot develop specific plans until they are able to identify an alternative method or methods that can be used successfully by all members of the public with which the agency interacts. Until SSA develops specific solutions for eliminating knowledge- based verification, the agency and the individuals that rely on its services will remain at an increased risk of identity fraud. USPS has not yet fully implemented alternative methods to better ensure the effectiveness of its remote identity proofing processes. According to officials responsible for the agency’s identity proofing program, USPS mitigates the risk of using knowledge-based verification by sending a written confirmation to the physical address associated with each identity- proofing transaction and provides instructions for what to do if the transaction is unauthorized or fraudulent. In addition to this mitigation measure, the officials reported that they regularly evaluate new capabilities to further increase confidence in their identity-proofing processes and are planning several additional measures to supplement the use of knowledge-based verification. Specifically, in September 2018, USPS began allowing customers to request a confirmation code via the mail to allow them to enroll in Informed Delivery. In addition, the agency is planning on implementing verification of mobile device possession and SMS enrollment code verification in 2019 and other techniques at a subsequent time. According to USPS officials, these alternative techniques are expected to reduce the agency’s use of knowledge-based verification. The officials said that USPS has not completely eliminated the use of knowledge-based verification because available alternatives to the agency’s current processes do not satisfactorily address critical factors that they consider when deciding whether to implement alternative processes. These factors include cost, projected ability to reduce fraud and protect consumers, projected extent of the population that could be covered, and the burden on customers to complete the process. The officials stated that the agency intends to implement alternative methods in the future for its Informed Delivery service but does not yet have specific plans with time frames and milestones. The officials noted that part of the reason for the slow implementation of alternative methods is that NIST technical guidance does not provide direction on how alternative methods are to be implemented and that additional guidance from NIST would be helpful to the agency for developing and implementing a plan to eliminate knowledge-based verification for the Informed Delivery service. While the supplemental processes implemented by USPS to date may help to reduce the risks associated with using knowledge-based verification, they do not eliminate such risks. Until it completes a plan with time frames and milestones to eliminate its reliance on knowledge-based verification for Informed Delivery, USPS and its customers will remain at increased risk of identity fraud. CMS has not implemented alternative methods to better ensure the effectiveness of the remote identity proofing processes used for its Healthcare.gov service. CMS officials in the Office of Information Technology and the Office of Consumer Information and Insurance Oversight stated that the agency uses a two-step email verification process to reduce the risks associated with knowledge-based verification. Specifically, individuals applying for an account on Healthcare.gov provide basic information (e.g., name, email address, password) and then are asked to acknowledge an email confirmation they receive from CMS. The email confirmation is intended to prove that the individual applying for a Healthcare.gov account is in possession of the email address that same individual provided to CMS. However, this process confirms only the email address that was used to create the account; it does not confirm the identity of the individual who is applying for the account. CMS stated that it uses this process because other mitigating measures are not cost effective. However, NIST’s guidance does not permit agencies to use knowledge-based verification on the basis of cost effectiveness. Further, the agency does not have specific plans with time frames or milestones to eliminate its use of knowledge-based verification for Healthcare.gov. CMS officials acknowledge that they do not have a plan to reduce or eliminate the use of knowledge-based verification because they have not yet identified any effective alternatives to knowledge-based verification for Healthcare.gov. According to these officials, based on a user study they conducted, individuals who use the agency’s services prefer knowledge- based verification over any available alternatives. In addition, the officials stated that certain alternatives, such as mobile device verification, may not always be suitable for the population they serve. As one example, not all applicants have a mobile device that could be used to remotely verify the individual’s identity. The CMS officials noted that NIST technical guidance does not provide direction on how alternative methods are to be implemented, given that they may not always be suitable for the population served by Healthcare.gov. However, until CMS takes steps to develop a plan with time frames and milestones to eliminate the use of knowledge-based verification, CMS and Healthcare.gov applicants will remain at an increased risk of identity fraud. While NIST has issued guidance to agencies related to identity proofing and OMB is drafting identity management guidance, these efforts are not sufficient to ensure that agencies adopt secure methods for remote identity proofing. As previously discussed, NIST’s guidance effectively prohibits the use of knowledge-based verification during the validation and verification phases of the remote identity proofing process, but does not provide direction to agencies on how to successfully implement alternative methods for remote identity proofing for large and diverse segments of the population. Further, OMB has not issued guidance requiring agencies to report on their implementation of remote identity proofing processes, which is essential for monitoring agencies’ progress. Best practices in IT management state that organizations should provide clear direction in order to achieve objectives. Specifically, the Control Objectives for Information and Related Technologies (COBIT), a framework of best practices for IT governance, states that organizations should provide clear direction for IT projects, including relevant and usable guidance, and ensure that those implementing the technology have a clear understanding of what needs to be delivered and how. However, NIST has not issued any supplemental implementation guidance to its 2017 technical guidance to ensure that agencies have a clear understanding of what needs to be done to implement alternative methods of remote identity proofing, as called for in the technical guidance. For example, NIST’s technical guidance provides abstract descriptions of identity evidence that individuals must provide, such as a credential containing a photograph or other biometric identifier as well as anti-counterfeiting security features. The guidance states that such credentials can be provided in person or remotely but does not detail the processes needed for providing credentials remotely. For example, the guidance does not discuss the advantages and limitations of currently available technologies that agencies could successfully use to remotely verify credentials provided by individuals or to make recommendations to agencies on which technologies should be adopted. As previously discussed, several potential limitations could make choosing an alternative method difficult. Technologies such as secure, remote verification of a physical credential may not be commercially available. Also, some alternative technologies require that individuals use cell phones and maintain a verifiable record of having them in their possession. The NIST guidance does not discuss how agencies should accommodate segments of the public who do not possess advanced technological devices, such as cell phones, that may be needed for successful remote verification. Because the guidance does not include specific advice or direction on implementing alternative technologies, agencies may be unable to determine what alternative methods are viable for the populations they serve. As previously discussed, several of the agencies we reviewed send confirmation codes to applicants via cell phone, email, or postal mail, as ways that they believe compensate for risks associated with using knowledge-based verification. However, NIST officials do not consider such methods for remote verification to be effective in compensating for the risks associated with knowledge-based verification. Instead, the NIST technical guidance requires agencies to send confirmation codes by mail when they use any remote identity proofing method, including more advanced, alternative verification methods, such as verification of mobile device possession. Officials from CMS, SSA, and USPS stated that they have not eliminated their use of knowledge-based verification in part because the existing NIST technical guidance does not provide direction on how alternative methods are to be implemented, given the various limitations of those alternative methods that agencies have identified. The officials stated that federal agencies could benefit from additional guidance on implementing the alternative verification techniques called for in the NIST technical guidance. In response to these agencies’ comments about being unable to fully implement the remote identity proofing guidance, NIST officials stated that agencies were expected to use their own judgment to determine how to meet the remote identity proofing requirements. The officials added that it was NIST’s position that the updated guidance was comprehensive enough for agencies to follow. Thus, at the time of our review, NIST did not have plans to assist agencies by issuing implementation guidance to supplement its existing technical guidance. NIST officials stated that they are available to provide assistance on an individual basis to agencies that seek their advice. Without additional guidance from NIST on how agencies are to implement the alternative identity proofing methods specified in an agency’s existing technical guidance, agencies may not be using the most effective and secure identity-proofing methods, thus exposing their systems to risk of fraud. FISMA requires the Director of OMB to oversee agency information security policies and practices. However, OMB has not provided agencies with guidance establishing reporting requirements for OMB to use in monitoring agencies’ progress in implementing secure remote identity proofing processes. For example, OMB has not proposed including reporting requirements for remote identity proofing in its draft policy on identity, credential, and access management, nor has it included reporting requirements in its FISMA reporting guidance to agencies for fiscal year 2019. According to OMB staff, OMB plans to issue guidance to agencies on the implementation of identity, credential, and access management. OMB issued a draft of this guidance for public comment in April 2018. However, the draft guidance does not include a requirement for agencies to report on progress in implementing secure remote identity proofing processes. Because it does not require agency reporting on progress in implementing secure remote identity proofing processes, OMB does not have visibility into the extent that agencies rely on insecure methods, particularly knowledge-based verification. Without establishing effective oversight measures, OMB cannot adequately monitor agency progress in implementing the secure identity proofing methods called for in NIST’s 2017 technical guidance. As a result, agencies may be at risk of implementing weak methods of remote identity-proofing for individuals who seek access to services and benefits from the federal government, which may put both the federal government and individuals at risk for fraud. The six agencies that we reviewed rely on a variety of remote identity proofing techniques to help ensure that the individuals who enroll for federal benefits and services are who they claim to be. Several of the selected agencies use knowledge-based verification processes that rely on CRAs to pose questions to individuals and check their answers as a way of verifying their identities before granting them enrollment in a federal benefit or service. However, given recent breaches of sensitive personal information, these agencies face risks because fraudsters may be able to obtain and use an individual’s personal information to answer knowledge-based verification questions and successfully impersonate that individual to fraudulently obtain federal benefits and services. Two agencies we reviewed, GSA and IRS, recently implemented remote identity proofing processes for Login.gov and Get Transcript that allow individuals to enroll online without relying on knowledge-based verification. However, four agencies (CMS, SSA, USPS, and VA) were still using knowledge-based verification to conduct remote identity proofing. Moreover, none of the four agencies have developed specific plans to eliminate knowledge-based methods from their processes. Without such plans, these federal agencies and the individuals that rely on such processes will remain at risk for identity fraud. NIST has issued technical guidance regarding remote identity proofing, but it may not be sufficient to help ensure that federal agencies adopt more secure methods. NIST’s guidance does not provide direction on how agencies can adopt more secure alternatives to knowledge-based verification while also addressing issues of technical feasibility and usability for all members of the public. In addition, OMB has not issued guidance setting agency reporting requirements that OMB could use to track implementation of more secure processes across the federal government. Without additional guidance, federal agencies are likely to continue to rely on risky knowledge-based verification that could be used to fraudulently gain access to federal benefit programs and services. We are making a total of 6 recommendations to CMS, NIST, OMB, SSA, USPS, and VA. Specifically: The Administrator of the Centers for Medicare and Medicaid Services should develop a plan with time frames and milestones to discontinue knowledge-based verification, such as by using Login.gov or other alternative verification techniques. (Recommendation 1) The Director of the National Institute of Standards and Technology should supplement the agency’s 2017 technical guidance with additional guidance to assist federal agencies in determining and implementing alternatives to knowledge-based verification that are most suitable for their applications. (Recommendation 2) The Director of the Office of Management and Budget should issue guidance requiring federal agencies to report on their progress in adopting secure identity proofing processes. (Recommendation 3) The Commissioner of Social Security should develop a plan with specific milestones to discontinue knowledge-based verification, such as by using Login.gov or other alternative verification techniques. (Recommendation 4) The Postmaster General of the United States should complete a plan with time frames and milestones to discontinue knowledge-based verification, such as by using Login.gov or other alternative verification techniques. (Recommendation 5) The Secretary of the Department of Veterans Affairs should develop a plan with time frames and milestones to discontinue knowledge-based verification, such as by using Login.gov or other alternative verification techniques. (Recommendation 6) We requested comments on a draft of this report from the eight agencies included in our review. In response, we received written comments from six agencies—Commerce (on behalf of NIST), HHS (on behalf of CMS), IRS, SSA, USPS, and VA. Their comments are reprinted in appendices II through VII, respectively. Of the six agencies to which we made recommendations, four of them (Commerce, SSA, USPS, and VA) agreed with our recommendations, and one agency (HHS) did not concur with our recommendation. One agency (OMB) did not state whether it agreed or disagreed with our recommendation. In addition, multiple agencies (GSA, IRS, OMB, USPS, and VA) provided technical comments on the draft report, which we have incorporated, as appropriate. The following four agencies agreed with the recommendations that we directed to them: Commerce agreed with our recommendation. The department stated that it will develop additional guidance to assist federal agencies with alternatives to knowledge-based verification and expects to do so within one year from issuance of this report. Comments from Commerce are reprinted in appendix II. SSA agreed with our recommendation. The agency stated that it will continue to seek improvements in its existing remote identity proofing process. SSA also stated that, in addition to a roadmap it developed in fiscal year 2019 to update its knowledge-based verification process to a more secure multi-factor authentication technology, it will take steps to ensure compliance with NIST standards for remote identity proofing. SSA’s comments are reprinted in appendix V. USPS agreed with our recommendation. The agency stated that it will be developing a roadmap to implement additional identity-proofing tools and techniques through 2020. Comments from USPS are reprinted in appendix VI. VA agreed with our recommendation. The department stated that it will develop a specific plan with time frames and milestones to eliminate knowledge-based verification from the aspects of the remote identity proofing process that it controls. Further, in its response, VA requested that GAO direct a recommendation to the Department of Defense (DOD) to discontinue DS Logon and consider using Login.gov instead. However, we are not issuing any recommendations to DOD because our scope of work did not include auditing DOD’s remote identity proofing processes. Nevertheless, we have adjusted our recommendations to CMS, SSA, USPS, and VA to clarify that Login.gov is one option for identity proofing that they should consider when developing their plans to discontinue the use of knowledge-based verification. VA’s comments are reprinted in appendix VII. One agency did not concur with our recommendation. Specifically, HHS raised several issues related to our findings. The agency stated that it uses a risk-based approach to designing systems controls and that a unilateral prohibition on the use of knowledge-based verification without alternatives is not a feasible solution. We agree with this comment and strongly support a risk-based approach to designing security controls, as required by FISMA. However, we believe that alternatives to knowledge- based verification exist that should be assessed and incorporated as appropriate. Similarly, HHS noted that for other applications across the department, it has considered factors such as consumer user experience, cost, and operational feasibility in addition to NIST guidelines. We agree that many factors need to be considered in assessing what method or methods of identity proofing are most appropriate for any given application but believe it is important for agencies to develop plans for addressing those factors that also eliminate the use of risky techniques, such as knowledge-based verification, that could have a negative impact on consumers and agencies. In response to our specific recommendation to CMS, HHS stated that it does not believe that suitable alternative methods exist that would work for CMS’ population of users, such as those in the rural community, due to distance or individuals without cell phones. However, we continue to believe that CMS should develop a plan to discontinue the use of knowledge-based verification. We recognize that there are members of the population that may not be reached with certain identity proofing techniques; however, a variety of alternative methods to knowledge- based verification are available that CMS can consider to address the population it serves. Comments from HHS are reprinted in appendix III. In addition, OMB did not state whether it agreed or disagreed with our recommendation. Further, in an email response, OMB staff from the office of the Federal Chief Information Officer provided a technical comment, which we incorporated. However, OMB did not otherwise comment on the report findings or our recommendation made to the agency. The IRS also provided written comments on the draft report. In its comments, the agency described the status of its efforts to strengthen identity verification processes, including the fact that it has eliminated the use of knowledge-based verification. Comments from IRS are reprinted in appendix IV. Finally, GSA provided only technical comments on the draft report, as previously mentioned. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, to the Administrators of the Centers for Medicare and Medicaid Services and General Services Administration; the Commissioners of Internal Revenue and Social Security; Director of the Office of Management and Budget; the Postmaster General of the United States; and the Secretaries of the Departments of Commerce and Veterans Affairs. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Nick Marinos at (202) 512-9342 or marinosn@gao.gov, or Michael Clements at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VIII. Our objectives were to (1) describe selected federal agency practices for remote identity proofing of individuals seeking access to major web-based applications using services provided by consumer reporting agencies and the risks associated with those practices, (2) assess selected federal agencies’ actions to ensure the effectiveness of agencies’ remote identity proofing processes, and (3) assess the sufficiency of federal identity proofing guidance developed by OMB and NIST in assuring the security of federal systems. To address the first objective, we made an initial, non-probability selection of federal agencies that (1) maintained major public-facing web applications to provide access to federal benefits or services and (2) relied on identity proofing solutions provided by the three nationwide consumer reporting agencies (CRAs)—Equifax, Experian, and TransUnion—to verify the identities of individuals applying for such benefits or services. We considered a “major” application to be one that could involve interaction with millions of individuals across the entire country. To select six agencies from this group, we reviewed prior GAO reports to identify potential agencies for review. We then interviewed officials at these agencies and at CRAs to confirm that these agencies use CRAs as part of their identity proofing processes and to obtain information about additional federal agencies that also employ CRAs for identity proofing for major applications. We included GSA in these interviews because its mission is to support federal agencies and it was likely to be aware of additional federal agencies that fit our criteria. From the information we gained from our interviews and research, we selected these six agencies: the Centers for Medicare and Medicaid Services (CMS), General Services Administration (GSA), Internal Revenue Service (IRS), Social Security Administration (SSA), United States Postal Service (USPS), and the Department of Veterans Affairs (VA). At each of these agencies, we reviewed documentation that described the current remote identity proofing processes the agencies are using for their major public-facing web applications. In addition, we interviewed agency officials responsible for identity proofing to obtain details of the techniques used to verify remote users of these applications. To the extent that these entities used CRAs to conduct knowledge-based verification as part of their remote identity-proofing processes, we discussed the risks associated with using knowledge-based methods as well as the potential advantages and limitations of using alternative methods that are not knowledge-based. We also obtained information from officials at NIST about the risks of knowledge-based methods and the availability of alternative methods. To address the second objective, we assessed remote identity proofing processes used by the selected agencies to determine the extent that they rely on knowledge-based verification to enroll online applicants for federal benefits and services. We also identified alternative methods used by these agencies, either in place of or in addition to knowledge-based verification, and assessed the extent to which agencies had implemented these methods to mitigate the risk of using knowledge-based methods. We compared the remote identity proofing processes at these agencies with the requirements as specified in NIST Special Publication 800-63, Digital Identity Guidelines, to determine whether the processes met the requirements of the NIST guidance. We also interviewed officials responsible for these identity proofing programs to obtain information about agencies’ plans, if any, to eliminate the use of knowledge-based verification from their remote identity proofing processes in the future and obtained relevant documentation of such plans. To address the third objective, we reviewed NIST Special Publication 800-63, Digital Identity Guidelines, to identify federal requirements for remote identity proofing. We compared the guidance to the Control Objectives for Information and Related Technologies (COBIT), a framework of best practices for IT governance, to determine whether the NIST guidance contained clear direction, including relevant and usable guidance, to ensure that those implementing the technology have a clear understanding of what needs to be delivered and how. To assess the sufficiency of this guidance, we consulted with subject matter experts at NIST, ID.me, a private-sector provider of remote verification technologies, and relevant officials at the selected federal entities. Based on information we had obtained about available alternative methods, we determined the extent to which gaps existed in the NIST guidance with regard to implementation of alternative technologies. We also obtained the views of federal agency officials on the extent to which NIST guidance provided sufficient direction to assist them in implementing appropriate remote identity proofing methods. Further, we reviewed OMB’s draft Identity, Credential, and Access Management policy and compared it to the requirements in FISMA and identified shortfalls. We also interviewed OMB staff to discuss the sufficiency of the office’s current guidance and to determine whether the office planned to issue additional guidance establishing reporting requirements for federal entities or conduct other forms of oversight of federal entities’ implementation of the NIST identity proofing guidance. We conducted this performance audit from November 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individuals named above, John de Ferrari and John Forrester (assistant directors); Tina Torabi (analyst-in-charge); Bethany Benitez, Christina Bixby, Chris Businsky, Kavita Daitnarayan, Nancy Glover, Andrea Harvey, Thomas Johnson, David Plocher, Rachel Siegel, and Winnie Tsen made key contributions to this report.", "summary": "Many federal agencies rely on CRAs, such as Equifax, to help conduct remote identity proofing. The 2017 breach of data at Equifax raised concerns about federal agencies' remote identity proofing processes. GAO was asked to review federal agencies' remote identity proofing practices in light of the recent Equifax breach and the potential for fraud. The objectives of this review were to (1) describe federal practices for remote identity proofing and the risks associated with those practices, (2) assess federal agencies' actions to ensure the effectiveness of agencies' remote identity proofing processes, and (3) assess the sufficiency of federal identity proofing guidance. To do so, GAO identified remote identity proofing practices used by six agencies (CMS, GSA, IRS, SSA, USPS, and VA) with major, public-facing web applications providing public access to benefits or services. GAO compared the agencies' practices to NIST's remote identity proofing guidance to assess their effectiveness, and compared NIST's and OMB's guidance to requirements in federal law and best practices in IT management to assess the sufficiency of the guidance. Remote identity proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. To perform remote identity proofing, agencies that GAO reviewed rely on consumer reporting agencies (CRAs) to conduct a procedure known as knowledge-based verification. This type of verification involves asking applicants seeking federal benefits or services personal questions derived from information found in their credit files, with the assumption that only the true owner of the identity would know the answers. If the applicant responds correctly, their identity is considered to be verified. For example, the Social Security Administration (SSA) uses this technique to verify the identities of individuals seeking access to the “My Social Security” service, which allows them to check the status of benefit applications, request a replacement Social Security or Medicare card, and request other services. However, data stolen in recent breaches, such as the 2017 Equifax breach, could be used fraudulently to respond to knowledge-based verification questions. The risk that an attacker could obtain and use an individual's personal information to answer knowledge-based verification questions and impersonate that individual led the National Institute of Standards and Technology (NIST) to issue guidance in 2017 that effectively prohibits agencies from using knowledge-based verification for sensitive applications. Alternative methods are available that provide stronger security, as shown in Figure 1. However, these methods may have limitations in cost, convenience, and technological maturity, and they may not be viable for all segments of the public. Two of the six agencies that GAO reviewed have eliminated knowledge-based verification. Specifically, the General Services Administration (GSA) and the Internal Revenue Service (IRS) recently developed and began using alternative methods for remote identity proofing for their Login.gov and Get Transcript services that do not rely on knowledge-based verification. One agency—the Department of Veterans Affairs (VA)—has implemented alternative methods for part of its identity proofing process but still relies on knowledge-based verification for some individuals. SSA and the United States Postal Service (USPS) intend to reduce or eliminate their use of knowledge-based verification sometime in the future but do not yet have specific plans for doing so. The Centers for Medicare and Medicaid Services (CMS) has no plans to reduce or eliminate knowledge-based verification for remote identity proofing. Several officials cited reasons for not adopting alternative methods, including high costs and implementation challenges for certain segments of the public. For example, mobile device verification may not always be viable because not all applicants possess mobile devices that can be used to verify their identities. Nevertheless, until these agencies take steps to eliminate their use of knowledge-based verification, the individuals they serve will remain at increased risk of identity fraud. NIST has issued guidance to agencies related to identity proofing and OMB has drafted identity management guidance, but their guidance is not sufficient to ensure agencies are adopting such methods. Sound practices in information technology (IT) management state that organizations should provide clear direction on how to implement IT objectives. However, NIST's guidance does not provide direction to agencies on how to successfully implement alternative identity-proofing methods with currently available technologies for all segments of the public. For example, the guidance does not discuss the advantages and limitations of currently available technologies or make recommendations to agencies on which technologies should be adopted. Further, most of the agencies that GAO reviewed reported that they were not able to implement the guidance because of limitations in available technologies for implementing alternative identify proofing methods. NIST officials stated that they believe their guidance is comprehensive, and at the time of our review they did not plan to issue supplemental implementation guidance to assist agencies. The Federal Information Security Modernization Act of 2014 ( FISMA) requires that OMB oversee federal agencies' information security practices. Although OMB has the authority under this statute to issue guidance, OMB has not issued guidance requiring agencies to report on their progress in implementing NIST's identity proofing guidance. OMB staff plan to issue guidance on identity management at federal agencies, but their proposed guidance does not require agencies to report on their progress in implementing NIST guidance. Until NIST provides additional guidance to help agencies move away from knowledge-based verification methods and OMB requires agencies to report on their progress, federal agencies will likely continue to struggle to strengthen their identify proofing processes. GAO is making recommendations to six agencies to strengthen online identify verification processes: GAO recommends that CMS, SSA, USPS, and VA develop plans to strengthen their remote identity proofing processes by discontinuing knowledge-based verification. GAO recommends that NIST supplement its technical guidance with implementation guidance to assist agencies in adopting more secure remote identity proofing processes. GAO recommends that OMB issue guidance requiring federal agencies to report on their progress in adopting secure identity proofing practices. Four agencies—Commerce (on behalf of NIST), SSA, USPS, and VA—agreed with GAO's recommendations. These agencies outlined the additional steps they plan to take to improve the security of their remote identity proofing processes. One agency, HHS (on behalf of CMS), disagreed with GAO's recommendation because it did not believe that the available alternatives to knowledge-based verification were feasible for the individuals it serves. However, a variety of alternative methods exist, and GAO continues to believe CMS should develop a plan for discontinuing the use of knowledge-based verification. OMB provided a technical comment, which GAO incorporated, but OMB did not provide any comments on GAO's recommendation.", "document_type": "gao"}
{"report": "Social Security has been the foundation of retirement security in the United States. Enacted in 1935, Social Security provides for the general welfare of older Americans by, among other things, establishing a system of federal old-age benefits, including a retirement program. Officially titled Old-Age and Survivors Insurance (OASI), the Social Security retirement program provides benefits to retired workers, their families, and survivors of deceased workers. About 51 million retirees and their families received $798.7 billion in Social Security retirement benefits in 2017, according to Social Security Administration (SSA), which is responsible for administering the program. About 40 years after the creation of Social Security, landmark legislation was enacted in 1974 that has played a major role in establishing the structure for private sector employers’ involvement in sponsoring retirement plans for their workers: the Employee Retirement Income Security Act of 1974 (ERISA). ERISA is a complex law administered by multiple federal agencies including the Department of Labor (DOL), the Internal Revenue Service (IRS) within the Department of the Treasury (Treasury), along with the Pension Benefit Guaranty Corporation (PBGC), and has evolved with many significant amendments over the years (see app. II). ERISA was enacted, in part, to address public concerns about the security of pension benefits, including the prominent failure of a couple of large, private sector pension plans. The act, as amended, does not require any employer to establish a retirement plan, but those who do must meet certain requirements and minimum standards. For example, ERISA establishes certain requirements for all employer-sponsored plans, including responsibilities for plan fiduciaries (those who manage and control plan assets, among others), as well as minimum funding standards for defined benefit (DB) plans, which traditionally promise to provide a monthly payment to retirees for life. ERISA also established the PBGC, the government corporation responsible for insuring the pension benefits of nearly 37 million American workers and retirees who participate in nearly 24,800 private sector defined benefit plans. Under ERISA, tax-qualified DB plans (or the employers who sponsor them) may have to pay insurance premiums to the PBGC, based on the funding level of their plans. The IRS also administers the Internal Revenue Code (IRC), which has provisions that affect pensions and retirement savings. While SSA administers the Social Security program, and the DOL, PBGC, and IRS each are generally responsible for administering aspects of ERISA, several other agencies also have important roles in various parts of the retirement system. For example, the Department of Health and Human Services oversees the Centers for Medicare and Medicaid Services (CMS), which administers the major health care programs that provide coverage for retirees, as well as the Administration on Aging, which encourages and assists state grantees that provide services for older adults. In addition, agencies such as the U.S. Department of Agriculture and the Department of Housing and Urban Development oversee food and housing programs for older adults. Other agencies also play a role in providing various services and supports for older adults. For example, the Department of Transportation administers a program that improves access and alternatives to public transportation for seniors and individuals with disabilities. The Consumer Financial Protection Bureau, as part of its mandate to provide financial literacy education, helps consumers navigate financial choices related to retirement. The Federal Trade Commission can have consumer protection and investor oversight roles and responsibilities related to individuals borrowing against their pensions. In addition, these federal agencies and others work together to help combat elder financial exploitation, which experts have described as an epidemic with society-wide repercussions. Citing our prior work on this topic, in October 2017, Congress enacted the Elder Abuse Prevention and Prosecution Act, calling on the Department of Justice to work with other federal, state, and local law enforcement agencies to improve data collection and provide technical assistance focused on combatting elder abuse. The need for government services and support for older adults in retirement will continue to grow as the proportion of older adults in the United States continues to rise significantly in the future. In 1970, those age 65 and over accounted for about 10 percent of the population, but by 2060, they are expected to account for about 23 percent (see fig. 1). This reflects long-term decreases in birth rates and increases in life expectancy. The U.S. retirement system is supported by three main pillars—Social Security, employer-sponsored plans, and individuals’ savings—that serve as important sources of retirement income for Americans. Currently, each of these pillars faces various risks and other challenges. If left unchanged, these risks present the federal government with significant potential fiscal exposures, which may legally commit or create expectations for future federal spending. The first pillar, Social Security (specifically, Social Security’s retirement program), is facing financial difficulties, as are other federal programs that provide essential supports to many older Americans, such as Medicare and the PBGC’s insurance programs (see fig. 2). In addition, multiple federal agencies help fund a broad array of home and community-based services for older adults. As the number of older adults needing assistance continues to grow, the pressure to increase federal funding for these services is likely to increase. As the foundation of retirement security in the United States, Social Security’s retirement program, financed primarily by payroll taxes, helps reduce poverty among beneficiaries, many of whom rely on Social Security for the majority of their income once they retire. Our analysis of data from the Federal Reserve Board’s most recent Survey of Consumer Finances (SCF) showed that in 2016, among households age 65 and over, the bottom 20 percent, ranked by income, relied on Social Security retirement benefits for 81 percent of their income, on average. But Social Security is facing financial difficulties that, if not addressed, will affect its long-term stability. During the many years that the revenue for Social Security’s retirement program exceeded costs, the program built up reserves in the trust fund. However, since 2010, Social Security has been paying out more in benefits than it received and has relied on interest income to help cover expenses. For 2018, the cost of the program was expected to exceed total income by $2 billion and, as a result, asset reserves were expected to decline. If no changes are made, current projections indicate that by 2034, the retirement program trust fund will only be sufficient to pay 77 percent of scheduled benefits. The underlying cause of Social Security’s financial difficulties is the aging population, driven by lower fertility rates and increased life expectancy, and accelerated by the ongoing retirement of the baby boom generation. The first baby boomers began receiving Social Security retirement benefits in 2008, and growing numbers will become eligible for Social Security benefits in coming years. Our analysis indicates that the number of baby boomers turning 65 is projected to increase from an average of about 10,200 per day in 2018 to more than 11,000 per day in 2029 (see fig. 3). As with the Social Security retirement program, reserves had also built up over time in the trust fund for Social Security’s disability program, but in 2005, the program began paying out more than it was taking in. To avoid benefit reductions, which were expected to begin in 2016, Congress passed a law in late 2015 that temporarily reallocated some payroll tax revenue from the retirement trust fund to the disability trust fund. Even with this added boost, if no further changes are made, reductions in disability benefits are projected to be needed beginning in 2032, according to SSA’s most recent report. For both the Social Security retirement and disability programs combined, the number of workers contributing to Social Security for each aged, disabled, dependent, or surviving beneficiary is declining, due to the aging population and other factors. While there are currently 2.8 workers contributing to Social Security per beneficiary, this ratio is expected to decline to 2.2 by 2035, and to 2.0 by 2095 (see fig. 4). It is difficult to predict exactly what would occur if either Social Security’s retirement or disability programs were to become insolvent because the Social Security Act does not provide for any procedure for paying less than full benefits. According to SSA, benefits could be reduced across the board by a set percentage, certain benefits could be prioritized, or benefits could be delayed. The major health care programs that include coverage for retirees, Medicare and Medicaid, also face increasing financial challenges due to program and demographic changes. For example, over the years, Congress has made changes to Medicare so that more people have become eligible, even if under age 65. Also, Congress has added two more parts to Medicare: one part allowing insurance under private plans approved by Medicare (Medicare Advantage), and another part providing prescription drug coverage. As of 2017, over 58 million people were enrolled in one or more parts under Medicare. Projections indicate that in the coming decade, as more members of the baby-boom generation become eligible for benefits, the number of Medicare beneficiaries will rise to 75 million in 2027. Similar to the challenges facing Social Security, spending for Medicare Part A (Hospital Insurance) is projected to outpace revenue over time, and the trust fund for Medicare Part A is projected to be unable to pay full benefits beginning in 2026. At that time, the Hospital Insurance trust fund will only be sufficient to pay 91 percent of hospital-related Medicare spending. Medicaid, which provides health care coverage and financing for millions of low-income individuals, including those age 65 or older, also faces financial challenges. Medicaid is the nation’s primary payer for long-term services and supports, and the elderly—along with those with disabilities—are among the highest cost Medicaid beneficiaries. The federal government and states share in the financing of the Medicaid program, with the federal government matching most state expenditures for Medicaid services using a statutory formula. Estimated Medicaid outlays for fiscal year 2017 were $592.2 billion, of which $370.6 billion was financed by the federal government and $221.6 billion by the states. Over the next 7 years, Medicaid expenditures are expected to increase significantly, reaching just over $1 trillion in 2026. The PBGC insures the pension benefits of most private sector DB plans through one of its two programs: the Single-Employer Insurance Program and the Multiemployer Insurance Program. The single-employer program is the larger of the two programs. As of the end of fiscal year 2018, the single-employer program insured about 26 million workers and retirees participating in about 23,400 private sector single-employer DB plans. As of the end of fiscal year 2018, the multiemployer program insured about 11 million workers and retirees in about 1,400 private sector DB plans created through a collective bargaining agreement between two or more employers and a union. Although PBGC is one of the largest of any federal government corporations, with over $110 billion in assets, its pension benefit guarantees are increasingly at risk due to its substantial liabilities. At the end of fiscal year 2018, PBGC’s net accumulated financial deficit was over $51 billion, and its exposure to potential future losses for underfunded retirement plans was estimated to be nearly $185 billion. We designated the single-employer program as high risk in July 2003 and added the multi-employer program to our high-risk list in January 2009. Concerns about PBGC’s financial future have kept both programs on GAO’s high-risk list. As long as PBGC’s long-term financial stability remains uncertain, the retirement benefits of millions of U.S. workers and retirees are at risk of greater reductions should their benefit plans be terminated below PBGC’s current guaranteed benefit levels. In contrast to Social Security, PBGC is not funded by tax revenues, but by the premiums paid by plans or their sponsors, the assets acquired from terminated plans, and investment returns on these funds. The primary drivers of the government’s fiscal exposure related to PBGC’s deficit are the collective financial risk of the many underfunded pension plans insured by PBGC and the long-term decline in the number of participants covered by traditional DB plans. Since 1985, there has been a 78 percent decline in the number of plans insured by PBGC and more than 13 million fewer workers actively participating in PBGC-insured plans. There has also been a recent trend of single-employer plan sponsors transferring the liability for some of their participants to insurance companies via group annuity “buy-outs,” further reducing the number of participants in PBGC-covered plans. As a result of these trends, even though PBGC premium rates have increased significantly in recent years, PBGC’s premium base has been eroding over time as fewer sponsors are paying premiums for fewer participants. In addition, more recently, PBGC’s net accumulated financial deficit has escalated dramatically due to the critical and declining status of a number of large multiemployer pension plans. As we previously reported, PBGC’s multiemployer plan is projected to become insolvent in approximately 6 years, and if that happens, participants in the insolvent multiemployer plans who rely on PBGC guarantees will receive only a small fraction of current statutory guarantees. According to PBGC, most participants would receive less than $2,000 a year, and in many cases less. Our prior work has found that federally-funded services for older Americans were not reaching many older adults who may need them, and that the funding for these programs had decreased while the number of older adults had increased. The federal government helps provide state and local governments with funding for a broad array of home and community-based services for older adults through multiple federal agencies and programs. In addition to long-term care services funded by Medicaid, these programs also include services funded under the Older Americans Act of 1965, as amended, which provides grants to states for such services as home-delivered and congregate meals, home- based care, transportation, and housing. In our 2015 report, we recommended that the Department of Health and Human Services (HHS) should facilitate development of a cross-agency federal strategy to help ensure that federal resources are used effectively and efficiently to support a comprehensive system of home and community-based services and related supports for older adults. While HHS agreed with our recommendation, the agency has yet to develop a cross-agency strategy involving all five agencies that fund these services. As the number of older adults needing assistance continues to grow, the gap in services can only be expected to widen. Absent any changes, state and local governments are facing—and will continue to face—a gap between receipts and expenditures in the coming years, putting greater pressure on the federal government to increase funding. The second pillar of the U.S. retirement system, employer-sponsored retirement plans, is also an important source of income relied upon by many Americans in their retirement. However, not everyone has access to employer-sponsored plans, and among those who do, certain provisions and requirements of the plans can make it difficult for individuals to accumulate savings over time. Bureau of Labor Statistics data indicate that about one-third of private sector workers in the United States did not have access to an employer- sponsored retirement plan in 2016, and about two-thirds did. Of those with access, the vast majority (about 76 percent) participated in the plan, either because they were automatically enrolled by the plan sponsor or they chose to participate. Although individuals without access to an employer-sponsored plan can save for retirement on their own, having access to an employer- sponsored retirement plan makes it easier to save, and more likely that an individual will have another source of income in retirement beyond Social Security. Our prior work found that employees working for smaller firms and in certain industries, such as leisure and hospitality, are significantly less likely to have access to an employer-sponsored plan compared with those working in larger firms and in certain other industries, such as information services. Also, we found that low-income workers are much less likely than high-income workers to have access to an employer-sponsored plan. Among those individuals who have access to employer-sponsored plans in the private sector, the structure of plans has changed over time, with a shift from traditional DB pension plans to defined contribution (DC) plans, such as 401(k)s, as the primary type of retirement plan (see fig. 5). DB plans are traditional retirement plans that generally promise to provide a benefit for the life of the participant, based on a formula specified in the plan that typically takes into account factors such as an employee’s salary, years of service, and age at retirement. DC plans are employer- sponsored account-based retirement plans, such as a 401(k) plan, that allow individuals to accumulate tax-advantaged retirement savings in an individual account based on employee and/or employer contributions, and the investment returns (gains and losses) earned on the account. The amount of assets held in individual retirement accounts (IRA) also has increased significantly. Most of the assets in IRAs are funded by assets rolled over from DC plans, and sometimes DB plans, when individuals change jobs or retire. With DB plans, participants can accumulate retirement savings simply by continuing to work for the employer offering the plan, and the employer is responsible for ensuring that the amount in the plan is sufficient to pay promised benefits at retirement. However, even when DB plans were more prevalent, many workers did not have access, and those with access to DB plans could still face challenges under certain circumstances. For example, when DB plan participants change employers, their accrued benefits are less portable than accrued savings in a DC plan. If the change in employers takes place before they have met vesting requirements, DB plan participants can lose all the benefits accumulated from employer contributions to that point, which in the private sector, generally means everything. Also, for DB plans that base benefits on final average salary, benefit accruals are significantly “backloaded.” As a result, if a DB plan participant changes employers mid-career, it could result in missing out on the time when the biggest benefit accruals would have occurred. In addition, when entering retirement, although those with DB plans can generally rely on receiving a set monthly benefit for life, they may still face challenges. For example, participants in certain financially troubled plans—such as those in the multiemployer plans discussed earlier—could see their benefits being suspended or cut. In addition, if a DB plan participant is offered and accepts a lump-sum payment in place of a lifetime annuity, the participant may face challenges similar to those with DC accounts in terms of managing the spend down of their retirement savings. With DC plans, responsibility for planning and managing retirement savings is shifted from employers to employees. Participants in DC plans are often required to make complex financial decisions—decisions that generally require financial literacy and that could have significant consequences for their financial security throughout retirement. For example, workers with DC plans have to decide whether to participate in the plan, how much to contribute to their accounts and how to manage their investments to strike the right balance between risk and returns. One way DC plan enrollment and contribution levels can be encouraged is by putting automatic mechanisms in place. For example, DC plan sponsors can encourage participation in the plan by adopting auto- enrollment, whereby eligible workers are enrolled into a plan automatically, unless they choose to opt out. DC plan sponsors can also encourage increases in contribution rates by adopting auto-escalation, whereby the employee’s contributions are automatically increased to a predetermined level on a set schedule, unless they choose to opt out. Participants in DC plans also have to decide whether to borrow from their accounts if other needs arise, or cash out their accounts when they change jobs. When leaving an employer, those with DC accounts may be allowed to transfer their accumulated balances into a new employer plan or an individual retirement account (IRA), but they may also be tempted to cash out their accounts, even though they may face associated tax consequences. Similarly, when entering retirement, those with DC accounts may decide to transfer the account balance into an IRA, or they may decide to receive the funds in a lump-sum payment. While some DC plans also offer monthly payments through an annuity, most do not provide lifetime income options or other options that can help participants draw down their retirement funds in a systematic way. Findings from the most recent SCF indicate that an individual’s ability to accumulate retirement savings depends on the individual’s income level. In addition, the disparities in average account balances by income level have increased markedly over time (see fig. 6). For example, according to SCF data, households in the top 10 percent of income level appeared to be substantially better prepared for retirement than most others, with an average account balance of more than $720,000 in 2016. In contrast, households with below average income, in the second quintile, had an average account balance of about $47,000. Among lower-income households, our prior work suggests that cashing out accounts when changing jobs may be a significant drain on retirement savings, along with unexpected events that may also cause them to withdraw funds from their accounts prior to retirement. Retirement experts have posited a variety of reasons for employers’ shift to DC plans. One oft-cited reason is that the structure of DC plans gives employers better control over how much they spend on wages and benefits packages. With DC plans, employers may choose whether to make contributions to participants’ individual accounts; in contrast, DB plans promise a certain future monthly benefit to employees in retirement, and the employer must bear the risk of making adequate contributions to the plan to make good on that promise. Another reason retirement experts cite for the shift to DC plans was the introduction of 401(k) accounts in the Internal Revenue Code in 1978, which they credit with fostering the adoption of account-based plans by sanctioning the use of salary deferrals as a source of contributions. Some retirement experts have also suggested that employees’ preferences and demands have changed over time, making DC plans more feasible and, in some respects, more appealing. For example, some analysts have noted that the portability of an account-based plan can be better suited to meet the needs of a more mobile workforce. The third pillar of the retirement savings system—individuals’ personal savings—is the remaining important source of retirement income, and it also faces certain risks and challenges. Personal savings can include a variety of assets, such as amounts saved from income or wages; contributions to accounts outside of a retirement plan; non-retirement financial wealth that is inherited or accumulated over time; and equity from tangible assets such as a home. These savings are expected to augment any income from the first two pillars: Social Security and employer-sponsored retirement plans. Over the past several decades, however, the personal saving rate—which is calculated as the proportion of disposable income that households save—has trended steeply downward, from a high of 14.2 percent in 1975, to a low of 3.1 percent in 2005, before recovering somewhat to 6.8 percent in 2018 (see fig. 7). While the specific implications of a historically low national saving rate on any current or future retiree are less clear, the decline in the U.S. personal savings rate over time is concerning and could have implications for retirement security, particularly when coupled with the recent trend of low wage growth. After accounting for inflation, average wages remain near the levels they were in the 1970s for most individuals (see fig. 8), adding to the difficulty of increasing their level of saving. In addition, many households have accumulated little wealth. SCF data show that among households in which the head of the household was working, the average value of all financial assets, excluding savings in retirement accounts, was $70,700 in 2016. For households in which the head was retired, this average was $89,700. For those who become home owners and build up equity in a home, this equity can serve as an important asset, providing a potential income source in retirement either by selling the home or obtaining a reverse mortgage. However, increased household debt levels may affect the amount of income available from this source, as well as from other assets. Data on the make-up of debt indicate that home ownership has been declining, while education debt has been rising, especially since 2013. Another challenge with implications for individuals’ ability to accumulate personal savings is that economy-wide, aggregate health care expenditures are projected to continue to grow as a percentage of the overall economy, and individuals have to contend with rising health care costs as they strive to save for retirement. CMS projections estimate that the annual growth rate of out-of-pocket health care spending for the U.S. population, per capita, will increase from 3.0 percent in 2018 to about 3.8 percent by 2026. While these costs are projected to rise for the population as a whole, individuals age 65 and over face the highest out-of-pocket health-related expenses. Further, health care expenses can be larger relative to other expenses for many retirees and hard to predict, making the amount of income retirees need to plan to spend on health care difficult to determine. Simultaneously, trends in longer life expectancy have the potential to increase economic vulnerability for retirees. Specifically, life expectancy for those age 65 or older has increased significantly over the past century and is projected to continue to increase. For example, a man turning 65 in 2030 is expected to live to age 85.0, on average, an additional 5.3 years compared to a man who turned 65 in 1980, who was only expected to live to age 79.7, on average. A woman turning 65 in 2030 is expected to live to age 87.2, on average, an additional 3.5 years compared to a woman who turned 65 in 1980, who was only expected to live to age 83.8, on average. Moreover, these life expectancies are averages, with some individuals living well beyond their life expectancy. As a result, people must now prepare for this greater longevity risk—that is, the risk that they will spend more years in retirement and potentially outlive their savings. For those who lack sufficient personal savings or other assets to augment their Social Security benefit or income from any employer-sponsored plan, the only option to maintain a desired standard of living may be to continue working past age 65. Our prior work has found that labor force participation among older workers has increased during the last decade and that, compared to current retirees, workers age 55 or older were more likely to expect to retire later and to work during retirement. Our prior work has also identified challenges maintaining retirement savings should older workers become unemployed. Over the past 40 years, the nation has taken an incremental approach to addressing the U.S. retirement system; however, such an approach may not be able to effectively address the interrelated foundational nature of the challenges facing the system today. Without a more comprehensive re-evaluation of the myriad challenges across all three pillars of the retirement system, identifying effective, enduring solutions may be difficult, and the consequences could be significant. Unless timely action is taken, many older Americans risk not having sufficient means for a secure and dignified retirement in the future. Congress has generally sought to address retirement-related issues and concerns one issue at a time. As highlighted in appendix II, at least 25 laws pertaining to retirement have been enacted since ERISA. Some laws—such as the Social Security Amendments of 1983 and the Pension Protection Act of 2006—made large changes to the retirement system. Other laws were more targeted. For example in 1984, Congress amended ERISA to address concerns that women were not receiving their share of private pension benefits by, among other things, permitting certain breaks in service without loss of pension credits, and changing treatment of pension benefits for widowed and divorced spouses. Similarly, in 1996, Congress created a simplified retirement savings vehicle for employers with 100 or fewer employees to help address concerns that smaller employers were not sponsoring plans. The number of agencies that play roles in the current retirement system has also contributed to the incremental approach to addressing concerns, with no single federal agency being responsible for taking a broad view of the system as a whole. As described earlier, there are at least 10 agencies that have a role in overseeing some part of the system, or that are involved in providing supports and services to older Americans. In addition to DOL, IRS, and PBGC, which are the agencies generally responsible for administering ERISA, SSA administers the Social Security program; and the Department of Health and Human Services oversees CMS, which administers the health care programs for retirees. In addition, various other agencies play a role in providing a range of services and supports to assist older adults through retirement. Having multiple agencies involved in the system has also contributed to a complex web of programs and requirements. For example, our prior work identified more than 130 reports and disclosures stemming from provisions of ERISA and the Internal Revenue Code. Although each plan sponsor is required to submit only certain of these reports and disclosures, determining which ones can be challenging, and we found that the agencies’ online resources to aid plan sponsors with this task were neither comprehensive nor up to date. We made several recommendations to address these issues that have not been fully implemented. While three federal commissions have focused on various retirement issues (see app. III), it has been nearly 40 years since the last comprehensive evaluation of the nation’s approach to financing retirement by a federal commission. The 1979 President’s Commission on Pension Policy conducted a broad study of retirement-related issues and made a series of over-arching recommendations, such as creation of a minimum universal pension system that would provide a portable benefit for all workers that would be a supplement to Social Security. Other recommendations included federal protections for participants in state and local government plans, more consistent tax treatment of pension plans and retirement savings vehicles, provisions to strengthen Social Security, as well as proposals regarding employment of older workers and disability programs. However, many of the commission’s recommendations were not implemented. The issues identified nearly 40 years ago by the 1979 commission’s comprehensive re-evaluation of the U.S. retirement system continue to be issues facing the nation today. In fact, these issues have only become more complex and more urgent due to fundamental changes that have occurred since 1979—especially the growing fiscal exposure to the federal government and the shift from DB to DC plans, with its associated increase in risks and responsibilities for individual workers. Taken together, these changes may make it harder for retirees to achieve financial security in retirement, especially for those without access to employer-sponsored plans and at the lower end of the income scale. A panel of 15 retirement experts convened by GAO in November 2016 agreed that there is a need for a new comprehensive evaluation of the U.S. retirement system. They noted weaknesses in the current system’s ability to help ensure that all individuals can provide for a secure retirement. They also discussed the burden that the current system’s complexity places on individuals, employers, and federal government. Although there was agreement among many panelists that a more comprehensive approach would be needed to provide a secure retirement for future retirees, opinions varied on the types of solutions needed. For example, some panelists suggested that a new government-sponsored savings vehicle should be created, while others supported modifying the existing employer-sponsored system to make any needed changes. In addition, several panelists commented on how the current system can be overly complex and confusing for employers, especially small employers. They discussed how the current private sector system poses financial and litigation risk for employers, especially with respect to investment decisions, fiduciary duty, and fees. For example, one panelist suggested that DC plan sponsors may welcome the federal government providing more guidance on the types of investments that would be regarded as prudent and safe as a way to reduce their litigation risk. Panelists also noted that the experiences of other countries can provide useful insights for ways to improve U.S. retirement programs and policies. For example, some panelists described the approach being taken by the United Kingdom (UK) as a potential model for expanding access to retirement savings plans. In the UK model, universal access for workers was implemented by mandating that all employers automatically enroll employees in either their own or the government-sponsored retirement savings plan, the National Employment Savings Trust. In our 2017 report, we suggested five policy goals for a reformed U.S. retirement system as a starting point for discussion: (1) promoting universal access to a retirement savings vehicle, (2) ensuring greater retirement income adequacy, (3) improving options for the spend down phase of retirement, (4) reducing complexity and risk for both participants and plan sponsors, and (5) stabilizing fiscal exposure to the federal government (see table 1 for more detail on these goals). Reforming the nation’s retirement system to create a system that meets all of these goals, or others identified by the Congress, will require a careful and deliberative approach. For example, some type of consensus about the goals would need to be established as a first step. Broad questions are likely to be raised about how each of the goals should be achieved. The examination of relevant issues by past federal commissions, the discussions at our November 2016 panel, as well as what we can learn from the experiences of other countries, further illustrate how complex any reform effort is likely to be. Also, we recognize that some of these goals may compete with each other—in particular, ensuring greater retirement security and minimizing fiscal exposure to the federal government. Therefore, a balanced approach will be required, which can only result from a more holistic examination of the issues by those representing a broad range of perspectives. As a result, we recommended that Congress consider establishing an independent commission to comprehensively examine the U.S. retirement system and make recommendations to clarify key policy goals for the system and improve the nation’s approach to promoting more stable retirement security. We suggested that such a commission include representatives from government agencies, employers, the financial services industry, unions, participant advocates, and researchers, among others, to help inform policymakers on changes needed to improve the current U.S. retirement system. Chairman Collins, Ranking Member Casey, and Members of the Committee, this concludes my prepared remarks. I would be happy to answer any questions that you may have. For further information regarding this testimony, please contact Charles A. Jeszeck at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact above, Margie K. Shields, Assistant Director; Jennifer Gregory, Analyst-in-Charge; Justine Augeri; and Gustavo O. Fernandez made key contributions to this publication. Also contributing to this report were Barbara D. Bovbjerg, Managing Director, Education, Workforce, and Income Security Issues; Oliver Richard, Chief Economist; Frank Todisco, Chief Actuary; James Bennett, Deborah Bland, Corinna Nicolaou, and Adam Wendel, with assistance from others who worked on our 2017 report. We convened a panel of retirement experts in November 2016 to obtain their insights on the condition of retirement in the United States and various options for a new approach to help ensure that all individuals can provide for a secure retirement. This appendix provides a description of our methodology for selecting the panel. (See text box for final list of 15 experts participating in our panel.) To identify the experts to invite to this meeting, we compiled an initial list based on interviews with experts conducted during recent GAO retirement income security work and the organizations invited to participate in a 2005 GAO forum on the future of the defined benefit system and the Pension Benefit Guaranty Corporation. Potential experts were identified based on the following criteria: Organizational type: To ensure that we considered the unique roles or situations of various entities involved in retirement income policy, we selected panelists from the federal government, state or local government, research institutes or universities, advocacy or membership organizations, and financial services firms. Organizational reputation: To ensure that our panelists span political perspectives, we selected panelists from organizations known to be conservative, moderate, and liberal (to the extent the reputation for the organization could be easily identified). Subject matter expertise: To ensure that the discussion considered as many aspects of retirement income security as possible, we selected panelists with expertise across a range of areas, including defined benefit (DB) plans, defined contribution (DC) plans, individual retirement accounts (IRA), demographic trends, vulnerable populations, actuarial science, income in retirement, financial literacy, and behavioral finance. Range of views: To ensure that our discussion was inclusive of different philosophies regarding the role of government with regard to the population and the economy, we selected panelists to represent the viewpoints of individuals and business. Representation of diverse groups: To ensure that the discussion benefited from different viewpoints, we selected panelists to reflect gender, racial, and ethnic diversity. An initial list of 41 potential experts was shared with GAO management officials with expertise in retirement issues, actuarial science, and strategic planning, as well as GAO methodologists, for their comments and suggestions. From this, we developed a shorter list eventually arriving at our final group of 15, listed above. These final 15 panelists were also evaluated for conflicts of interest. A conflict of interest was considered to be any current financial or other interest that might conflict with the service of an individual because it (1) could impair objectivity and (2) could create an unfair competitive advantage for any person or organization. All potential conflicts were discussed by GAO staff. The 15 experts were determined to be free of conflicts of interest, and the group as a whole was judged to have no inappropriate biases. Panelists engaged in a day-long discussion about our nation’s approach to retirement policy (see text box). The discussion was guided by a list of questions developed in advance, and the meeting was conducted by a GAO moderator to ensure that all panelists had an opportunity to participate and provide responses. State of Retirement Expert Panel Agenda Session 1: How Well Is Our Current National Approach to Retirement Security Working? Preamble: Retirement income sources in the United States have often been referred to as a three-legged stool – Social Security, employer-sponsored retirement plans, and personal savings. 1. Can the U.S, retirement system today still be accurately described by these three retirement income sources? Why/why not? 2. Are there aspects of our nation’s approach to retirement income security that are working well? If so, are these aspects functioning well for all, or only for particular populations? 3. Are there aspects of our nation’s approach to retirement income security that are concerning? If so, what are your biggest concerns? 4. Are there any specific populations you are particularly concerned about? If so, which ones and why? Session 2: Reevaluating the Roles of the Federal Government, Employers, and Individuals Preamble: Key actors in assuring a secure retirement have traditionally included the federal government, employers, and individuals, but their roles have evolved over time. Are there ways roles could or should be adapted or modified to address the strengths and weaknesses that have been identified for: o Federal government? o Employers? o Individuals? Session 3: Reevaluating Our Nation’s Approach to Retirement Policy Preamble: Various proposals for a broader, more cohesive approach to retirement policy have been made over time. 1. Do you believe there is a need for some type of national retirement policy? 2. If such a policy were to be proposed-- 2a. What could or should be the primary goals of such a policy? 2b. What could or should be the roles of key actors in achieving those goals? 3. What do you believe could be the greatest benefits of a national retirement policy? 4. What do you believe could be the greatest risks or potential downsides of a national retirement policy? What barriers exist to creating a national retirement policy and how could the federal government best address these barriers? The chronology highlights below selected federal legislation related to retirement security in the United States since 1960. It is based on a larger chronology included in our prior special product on the nation’s retirement system (GAO-18-111SP). The chronology is intended to illustrate the incremental approach that the nation has taken to improving the U.S. retirement system and to convey the changes that the legislation enacted at the time. It is not intended to provide an exhaustive list of legislation that has impacted retirement in the United States, to make statements about current provisions of the law, or to provide comprehensive descriptions of each law. Chronology of Selected Federal Legislation Shaping Retirement in the United States (1960–Present) 1961 Social Security Amendments of 1961 Selected provision: Enacted a provision for men, comparable to the provision enacted for women in 1956, concerning early retirement at age 62. Self-Employed Individuals Tax Retirement Act of 1962 Selected provision: Imposed minimum distribution requirements for self-employed participants in a qualified plan generally beginning at age 70 ½. Social Security Amendments of 1965 Selected provisions: Enacted new titles to the Social Security Act for Medicare and Medicaid. Medicare provided hospital, post-hospital extended care, and home health coverage to almost all Americans age 65 or older; Medicaid provided states with the option of receiving federal funding for providing health care services to certain low-income and medically needy individuals. Age Discrimination in Employment Act of 1967 Selected provisions: Made it unlawful for an employer to discriminate against any individual with respect to compensation, terms, conditions, or privileges of employment because of age; and required the Secretary of Labor to carry on a continuing program of education and information, which could include research with a view to reducing barriers to the employment of older persons. Employee Retirement Income Security Act of 1974 (ERISA) Selected provisions: Regulated private sector employers who offer pension or welfare benefit plans for their employees. Title I: Imposed reporting and disclosure requirements on plans; imposed certain responsibilities on plan fiduciaries. Title II: Strengthened participation requirements for employees age 25 and over; established vesting rules; required that a joint and survivor annuity be provided; and established minimum funding standards. In addition, provided individual retirement accounts (IRAs) for persons not covered by pensions. Title IV: Required certain employers and plan administrators to fund an insurance system to protect certain kinds of retirement benefits (i.e., to pay premiums to the federal government’s Pension Benefit Guaranty Corporation (PBGC)). Revenue Act of 1978 Selected provisions: Established qualified deferred compensation plans called 401(k) plans after 26 U.S.C. § 401(k), which allowed for pre-tax employee contributions to such plans (known as elective deferrals). Multiemployer Pension Plan Amendments Act of 1980 Selected provisions: Strengthened the funding requirements for multiemployer pension plans; authorized plan preservation measures for financially troubled multiemployer plans; and revised the manner in which insurance provisions applied to multiemployer plans. Tax Equity and Fiscal Responsibility Act of 1982 Selected provisions: Reduced the maximum annual addition (employer contributions, employee contributions, and forfeitures) for each participant in a defined contribution (DC) plan; reduced the maximum annual retirement benefit for each participant in a defined benefit (DB) plan; introduced special rules for “top heavy” plans (i.e., plans in which more than 60 percent of the present value of the cumulative accrued benefits under the plan for all employees accrue to key employees, including certain owners and officers); and expanded minimum distribution requirements to all qualified plans. Social Security Amendments of 1983 Selected provisions: Gradually raised the normal retirement age from 65 to 67, depending on an individuals’ year of birth; expanded coverage; increased the self-employment tax for self-employed persons; subjected a portion of Social Security benefits to federal income tax for the first time; and changed how cost-of-living adjustments are calculated when trust funds are low. Deficit Reduction Act of 1984 Selected provisions: Amended nondiscrimination testing requirements for 401(k) plans and required minimum distribution rules, and restricted prefunding of certain employee post-retirement welfare benefits (such as disability and medical benefits). Retirement Equity Act of 1984 Selected provisions: Changed participation rules by lowering the minimum age that a plan may require for enrollment (from age 25 to 21), and permitted certain breaks in service without loss of pension credits. Also, strengthened treatment of pension benefits for widowed and divorced spouses. Single-Employer Pension Plan Amendments Act of 1986 Selected provisions: Raised the per-participant PBGC premium from $2.60 to $8.50; established certain distress criteria that a contributing sponsor or substantial member of a contributing sponsor’s controlled group must meet in order to terminate a single-employer plan under a distress termination; established certain criteria for PBGC to terminate a plan that does not have sufficient assets to pay benefits that are currently due (referred to as “involuntary terminations”); and created a new liability to plan participants for certain non-guaranteed benefits. Federal Employees’ Retirement System Act of 1986 Selected provisions: Established the Federal Employees’ Retirement System (FERS). Unlike the existing Civil Service Retirement System (CSRS), retirement and disability benefits under FERS were structured to be fully funded by employee and employer contributions and interest earned by the bonds in which the contributions were invested. The DB under FERS was lower than under CSRS, but FERS also included a DC plan component: the Thrift Savings Plan. Omnibus Budget Reconciliation Act of 1986 Selected provisions: Required employers that sponsor pension (DB plans) and retirement savings plans (DC plans such as a 401(k)) to provide benefit accruals or allocations for employees who work beyond their normal retirement age. Tax Reform Act of 1986 Selected provisions: Established faster minimum vesting schedules; adjusted limitations on contributions and benefits for qualified plans; limited the exclusion for employee elective deferrals to $7,000; and amended nondiscrimination coverage rules. Also, restricted the allowable tax-deductible contributions to IRAs for individuals with incomes above a certain level and who participate in employer-sponsored pension plans, and imposed an additional 10 percent tax on early distributions (before age 59 ½) from a qualified retirement plan. Omnibus Budget Reconciliation Act of 1987 Selected provisions: Strengthened funding rules for pension plans and the level and structure of PBGC premiums. Omnibus Budget Reconciliation Act of 1993 Selected provisions: Reduced compensation taken into account in determining contributions and benefits under qualified retirement plans, and expanded taxation of Social Security benefits. Retirement Protection Act of 1994 Selected provisions: Strengthened funding rules for pension plans. Small Business Job Protection Act of 1996 Selected provisions: Created a type of simplified retirement savings vehicle for small employers; added a nondiscrimination safe harbor for 401(k) plans; amended the definition highly compensated employee; and modified certain participation rules for DC plans. Taxpayer Relief Act of 1997 Selected provision: Established Roth IRAs, under which contributions are after-tax, but distributions after age 59½ are tax-free. Senior Citizens’ Freedom to Work Act of 2000 Selected provision: Amended the Social Security Act to eliminate the earnings limit for individuals who have reached their normal retirement age. Economic Growth and Tax Relief Reconciliation Act of 2001 (EGTRRA) Selected provisions: Increased the individual elective deferrals that may be made to a 401(k) plan; added “catch-up contributions” that allow individuals age 50 or older to make additional contributions; increased the maximum annual contributions to DC plans and individual retirement accounts; increased the maximum annual benefits under a DB plan; increased the compensation limit for qualified trusts; reduced the minimum vesting requirements for matching contributions; and changed the rules that permit plans to cash-out, without consent. Sarbanes-Oxley Act of 2002 Selected provision: Added a new requirement that individual account pension plans provide notice to participants and beneficiaries in advance of periods during which the ability of participants or beneficiaries to take certain actions with respect to their accounts will be temporarily suspended, limited, or restricted (referred to as “blackout periods”). Deficit Reduction Act of 2005 Selected provisions: For plan years that begin after December 31, 2005, set the PBGC flat-rate premium for multiemployer plans at $8.00; and, for each plan year that begins after 2006, indexed future premium levels to the national average wage index. Pension Protection Act of 2006 (PPA) Selected provisions: Strengthened the minimum funding requirements for DB plans; set certain benefit limitations for underfunded DB plans; enhanced the protections for spouses; amended plan asset diversification requirements; changed provisions concerning the portability of pension plans; allowed the adoption of automatic enrollment and target date funds for DC plans; and increased reporting and disclosure requirements for plan sponsors. Worker, Retiree, and Employer Recovery Act of 2008 Selected provision: Modified PPA’s funding requirements to grant relief for single-employer DB plans. Moving Ahead for Progress in the 21st Century Act (MAP-21) Selected provisions: Provided funding relief for single-employer DB plans by changing the interest rates used to reflect a 25-year historical average; increased premium rates for sponsors of single-employer and multiemployer DB plans; and included other provisions intended to improve the governance of PBGC. American Taxpayer Relief Act of 2012 Selected provisions: Extended the tax-free treatment of distributions from IRAs made for charitable purposes; allowed for certain in-plan transfers to a Roth account. Multiemployer Pension Reform Act of 2014 (MPRA) Selected provisions: Allowed severely underfunded multiemployer plans, under certain conditions and with the approval of federal regulators, the option to reduce the retirement benefits of current retirees to avoid plan insolvency; and expanded PBGC’s ability to intervene when plans are in financial distress. Bipartisan Budget Act of 2018 Selected provisions: Established a temporary Joint Select Committee on Solvency of Multiemployer Pension Plans. The goal of the Joint Select Committee was to improve the solvency of multiemployer pension plans and PBGC. Since the enactment of ERISA, there have been three federal commissions on retirement issues: The President’s Commission on Pension Policy, the National Commission on Social Security Reform, and the President’s Commission to Strengthen Social Security (see table 2). We examined these commissions to gain insights on possible structures for federal commissions, the scope of work these commissions can take on, and the types of recommendations they can make. In 1978, President Carter signed an executive order authorizing the Carter Commission, which was established when committee members were appointed in 1979. The commission was to conduct a 2-year sturdy of the nation’s pension systems and the future course of national retirement income policies. President Carter appointed all 11 commission members. The commission also had an executive director and 37 staffers. Its final report, Coming of Age: Toward a National Retirement Income Policy, was released in February 1981. The commission was ordered to: Conduct a comprehensive review of retirement, survivor, and disability programs existing in the United States, including private, federal, state, and local programs. Develop national policies for retirement, survivor, and disability programs that can be used as a guide by public and private programs. The policies were to be designed to ensure that the nation had effective and equitable retirement, survivor, and disability programs that took into account available resources and demographic changes expected into the middle of the next century. Submit to the President a series of reports including the commission’s findings and recommendations on short-term and long-term issues with respect to retirement, survivor, and disability programs. The commission was charged with covering the following issues in its findings and recommendations: overlaps and gaps among the private, state, and local sectors in providing income to retired, surviving, and disabled persons; the financial ability of private, federal, state, and local retirement, survivor, and disability systems to meet their future obligations; appropriate retirement ages, the relationship of annuity levels to past earnings and contributions, and the role of retirement, survivor, and disability programs in private capital formation and economic growth; the implications of the recommended national policies for the financing and benefit structures of the retirement, survivor, and disability programs in the public and private sectors; and specific reforms and organizational changes in the present systems that may be required to meet the goals of the national policies. In its final report, the Carter Commission prescribed a goal for retirement income policy and made numerous recommendations. According to the report, a desirable retirement income goal is the replacement of pre- retirement income from all sources. Recommendations focused on strengthening four areas: employer pensions, Social Security, “individual efforts” (personal savings, employment of older workers, and disability), and public assistance. Recommendations were also made regarding the administration of the U.S. retirement system. Examples of ways to strengthen each area follow: Strengthening Employer Pensions. The commission recommended establishing a Minimum Universal Pension System (MUPS) for all workers. MUPS was intended to provide a portable benefit that was supplemental to Social Security. It would have built upon existing employer plans and existing plans that did not meet the requirements would have needed to be amended. Another recommendation was to establish a Public Employee Retirement Income Security Act (i.e. a public sector version of ERISA) so that public and private sector employees would receive similar protections. Strengthening Social Security. The commission recommended mandatory universal coverage, raising the retirement age for workers who were not approaching retirement, re-examining or making adjustments to the special minimum benefit as well as the spousal benefit and other miscellaneous benefits. Strengthening Individual Efforts. The commission recommended that contribution and benefit limitations for all individuals should be treated more consistently for all types of retirement savings. The commission also recommended a refundable tax credit for low- and moderate-income individuals to encourage saving for retirement. For older workers, recommendations included improving unemployment benefits to provide short-term income maintenance and keep them in the labor force. The commission also recommended further in-depth study of the Disability Insurance program. Strengthening Public Assistance. The commission made recommendations to address inflation protection for retirement income and setting Social Security’s Supplemental Security Income at the poverty line level and eliminating its assets test. Administration. The commission recommended consolidating the administration of all federal retirement systems as well as consolidating ERISA administrative functions under one entity. It also recommended an interdepartmental task force to coordinate executive branch agencies dealing with retirement income. In 1981, President Reagan signed an executive order establishing the Greenspan Commission. The President asked the commission to conduct a 1-year study and propose realistic, long-term reforms to put Social Security on sound financial footing and to reach bipartisan consensus so these reforms could be passed into law. The President, the Senate Majority Leader, and the Speaker of the House of Representatives each made five appointments, with no more than three of the five appointments coming from one political party to ensure a bipartisan commission. The President was responsible for appointing the commission’s chair. The commission had a staff of 23. The final report, Report of the National Commission on Social Security Reform, was issued on January 20, 1983. The commission was ordered to Review relevant analyses of the current and long-term financial condition of the Social Security Trust Funds Identify problems that could threaten the long-term solvency of such funds Analyze potential solutions to such problems that would both assure the financial integrity of the Social Security system and appropriate benefits Provide appropriate recommendations to the Secretary of Health and Human Services, the President, and Congress. In its final report, the Greenspan Commission found both short and long- term financing problems and recommended that action should be taken to strengthen the financial status of the Social Security program. Twelve commission members voted in favor of a consensus package with 13 recommendations to address Social Security’s short-term deficit, including, for example: Expand Social Security to include coverage for nonprofit and civilian federal employees hired after January 1, 1984, as well as prohibiting the withdrawal of state and local employees. Shift cost-of-living adjustments to an annual basis. Make the Social Security Administration its own separate, independent agency. Make adjustments to spousal and survivor benefits. Revise the schedule for Social Security payroll taxes. Establish the taxation of benefits for higher-income persons. In addition, these 12 commission members agreed that the long-range deficit should be reduced to approximately zero, and their recommendations were projected to meet about two-thirds of the long- range financial deficit. Seven of the 12 members agreed that the remaining one-third of the long-range financial deficit should be met by a deferred, gradual increase in the normal retirement age, while the other 5 members agreed that it should be met by an increase in future contribution rates starting in 2010. After the Greenspan Commission’s final report was issued, Congress enacted the Social Security Amendments of 1983. The amendments incorporated many of the Greenspan Commission’s recommendations and made comprehensive changes to Social Security coverage, financing, and benefit structure. These changes included addressing Social Security’s long-term financing problems by gradually increasing the retirement age from 65 to 67, among other things. In 2001, President Bush signed an executive order establishing the President’s Commission to Strengthen Social Security. The President asked the Commission to produce an interim report describing the challenges facing the Social Security system and the criteria by which the Commission would evaluate reform proposals, as well as a final report to set forth the Commission’s recommendations regarding how to strengthen Social Security with personal accounts. The commission had a staff of sixteen members appointed by the President, of which no more than eight members were of the same political party. The final report, Strengthening Social Security and Creating Personal Wealth for All Americans, was issued in December 2001. The commission was asked to submit to the President bipartisan recommendations to modernize and restore fiscal soundness to the Social Security system according to the following principles: Modernization must not change Social Security benefits for retirees or The entire Social Security surplus must be dedicated to Social Social Security payroll taxes must not be increased; Government must not invest Social Security funds in the stock market; Modernization must preserve Social Security’s disability and survivors Modernization must include individually controlled, voluntary personal retirement accounts, which will augment the Social Security safety net. In its final report, the Commission offered three models for Social Security reform. All three models shared a common framework whereby voluntary individual accounts were established in exchange for a reduction in the Social Security defined portion of benefit. According to the report: Reform Model 1 would have established a voluntary personal account option, but did not specify other changes in Social Security’s benefit and revenue structure and was intended to achieve full long-term sustainability. Reform Model 2 would have enabled future retirees to receive Social Security benefits that would be at least as great as then current retirees and increased Social Security benefits paid to low-income workers. Model 2 would have established a voluntary personal account without raising taxes or requiring additional worker contributions. It was intended to achieve solvency and balanced Social Security revenues and costs. Reform Model 3 would have established a voluntary personal account option that generally enabled workers to reach or exceed then-current scheduled benefits and wage replacement ratios. It was intended to achieve solvency by adding revenues and by slowing benefit growth less than price indexing. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Strengthening the U.S. retirement system to be more accessible and financially sound is important to ensuring that all Americans can retire with dignity and security, and to managing the fiscal exposures to the federal government from various retirement-related programs. Currently, the U.S. retirement system, and many of the workers and retirees it was designed to help, face major challenges. This testimony discusses (1) the fiscal risks and other challenges facing the U.S. retirement system, and (2) the need to re-evaluate our nation's approach to financing retirement. It is based on a 2017 report, GAO-18-111SP , on the nation's retirement system, with updated statistics when more recent estimates from publicly available sources were available. Fundamental changes over the past 40 years have led to various risks and challenges for the three main pillars supporting the U.S. retirement system. For example, current projections indicate that by 2034, the Old-Age and Survivors trust fund for Social Security's retirement program—the first pillar—will only be sufficient to pay 77 percent of scheduled benefits, due in part to the aging of the population (see figure). Other federal government retirement-related programs also face financial uncertainty. For example, the Pension Benefit Guaranty Corporation, which insures the pension benefits of most private sector defined benefit plans, estimates a greater than 90 percent chance the multiemployer program will be insolvent by 2025. Meanwhile, employer-sponsored plans—the second pillar—have experienced a shift from traditional defined benefit (DB) plans that generally provide set monthly payments for life, to defined contribution (DC) account-based plans, like 401(k)s. DC plans provide greater portability of savings that can be better suited to the needs of a more mobile workforce, but also require individuals to assume more responsibility for planning and managing their savings. While DC plans can provide meaningful retirement security for many, especially higher earners, lower earners appear more prone to having little or no savings in their DC accounts. Further, individuals' savings—the third pillar—may be constrained by economic trends such as low real wage growth and growing out-of-pocket health care costs. Combined with increased longevity, these challenges can put individuals at greater risk of outliving their savings and fiscal pressures on government programs will likely grow. Congress generally has sought to address retirement-related issues in an incremental fashion. Also, no one agency is responsible for overseeing the U.S. retirement system in its entirety, so there is no obvious federal agency to lead a comprehensive reform effort. It has been nearly 40 years since a federal commission has conducted a comprehensive evaluation of the nation's approach to financing retirement. Without a more comprehensive re-evaluation of the challenges across all three pillars of the system, it may be difficult to identify effective, enduring solutions. Unless timely action is taken, many older Americans risk not having sufficient means for a secure and dignified retirement. In the 2017 report, GAO recommended that Congress should consider establishing an independent commission to comprehensively examine the US retirement system and make recommendations to clarify key policy goals for the system and improve how the nation promotes retirement security.", "document_type": "gao"}
{"report": "Established by the National Housing Act, FHA’s single-family mortgage insurance program helps home buyers obtain financing by providing insurance on single-family mortgage loans. The mortgage insurance allows FHA-approved private lenders to provide qualified borrowers with mortgages on properties with one to four housing units and generally compensates lenders for nearly all the losses incurred on such loans. To support the program, FHA imposes up-front and annual mortgage insurance premiums on FHA borrowers. The agency has played a particularly large role among first-time, minority, and low-income home buyers. For example, in fiscal year 2017, about 82 percent of FHA- insured home purchase loans went to first-time home buyers and more than 33 percent went to minority home buyers. FHA requires servicers to undertake certain home retention and foreclosure mitigation actions to help delinquent homeowners catch up on late mortgage payments. Before initiating foreclosure actions, FHA requires servicers to contact the borrower, collect information on the borrower’s finances, and attempt informal methods of resolving the delinquency. If informal steps are not appropriate for a borrower’s circumstances, the servicer evaluates the borrower for a series of home retention actions, which include a formal forbearance and repayment plan and a loan modification. Under certain circumstances, the servicer may consider a foreclosure mitigation option, such as a preforeclosure (short) sale or a deed-in-lieu of foreclosure. If the home retention and foreclosure mitigation actions are unsuccessful, the servicer or mortgage note holder is generally entitled to pursue foreclosure to obtain title to the property. The foreclosure process is governed by state laws, but foreclosed properties are typically auctioned at a foreclosure sale. Most foreclosed properties are disposed of in one of two ways. Claims without Conveyance of Title (CWCOT). Through FHA’s CWCOT program, the servicer attempts to secure a third-party purchase of an eligible property for an adjusted fair market value that is less than the amount of the servicer’s projected claim. Conveyance. If the foreclosure process is completed and no third party purchases the home at the foreclosure sale, the home usually becomes the property of the servicer. Servicers convey these properties to FHA, which sells them out of its REO inventory. During the default and foreclosure process, servicers must meet two FHA time requirements. The first requires servicers to initiate a foreclosure (first legal action) or utilize a loss mitigation option within 6 months of borrower default. The second requirement, for the “reasonable diligence” period, requires servicers to obtain good and marketable title and possession of a property within a specified time frame that varies by state. The servicer secures the property and obtains possession once the property is vacant. Servicers are subject to financial penalties for missing these deadlines. In both cases, servicers must curtail the debenture interest that they otherwise would be entitled to collect from the date of the missed time frame. Servicers are responsible for maintaining vacant foreclosed properties in accordance with FHA requirements, which specify allowable reimbursable amounts to preserve and protect the property. A servicer needing additional funds to complete the required maintenance must submit an “overallowable” request to FHA. When a servicer forecloses on a property with an FHA-insured mortgage and the property is not sold to a third party through CWCOT, the property is held in the servicer’s name until the servicer conveys the title to FHA. As seen in figure 1, these properties span a range of home types and ages. FHA requires servicers to preserve and protect the property and ensure it meets FHA’s conveyance condition standards before conveying title. FHA’s preservation and protection requirements include a number of specific steps for securing, maintaining, and repairing properties and documenting property conditions. FHA reimburses the servicer for up to $5,000 per property for required work, and the servicer may request overallowable funds if needed. FHA’s conveyance condition standards are broader requirements, including that a property be undamaged by natural disaster and in “broom swept” condition, have all damage covered by hazard insurance repaired, and be undamaged by the servicer’s failure to properly secure or maintain the property. HUD regulations state that the servicer must obtain good and marketable title and convey the property to HUD within 30 days of the date on which the servicer filed the foreclosure deed for record or certain other key dates, whichever is later. If a servicer does not believe it will be able to convey the property by this time, it may request an extension from FHA. The servicer files an insurance claim with FHA when it conveys the title. If a servicer does not convey the property within the required time frame and has not received an approved extension, the servicer must curtail the debenture interest and property preservation and protection expenses it claims as of the date of the missed deadline. Shortly after conveyance, FHA pays the Part A claim to the servicer, which includes the unpaid principal balance and debenture interest on the insured mortgage. At this time, FHA becomes responsible for maintaining the property until it is sold. FHA pays the part of the claim that covers eligible property preservation and protection expenses incurred by the servicer once the servicer submits title evidence and documentation of expenses (in Part B of the claim form). FHA inspects the property and reviews title evidence before selling the property out of its REO inventory. In some cases, FHA reconveys the title to the servicer if it finds the servicer did not comply with requirements related to property condition or title. When a property is reconveyed, FHA reassigns the title to the servicer and requests repayment of the claim amount. The servicer then must correct any title or property condition issues before it may convey the property and submit a claim to FHA again. Throughout this process, FHA and servicers use the P260 Asset Disposition and Management System (asset disposition system) to communicate and upload documentation about the properties. FHA articulates its property preservation and protection requirements and conveyance condition standards in a mortgagee letter and policy handbook that we refer to collectively as FHA’s conveyance condition policies and procedures. From 2010 through 2017, servicers conveyed about 610,000 properties to FHA. The number of properties conveyed annually peaked in 2012 at about 111,000 (see fig. 2). In 2017, servicers conveyed fewer than 32,000 properties to FHA. The decline in recent years is consistent with improvements in the housing market since the 2007–2011 housing crisis. In this report, we define FHA’s property conveyance process as beginning when the servicer both obtains good and marketable title and takes possession of a property and ending when FHA assigns a marketing contractor to sell the property out of its REO inventory (see fig. 3). Several FHA contractors and offices play key roles in the conveyance process. Compliance contractor. A nationwide compliance contractor called the mortgagee compliance manager is responsible for protecting FHA’s interests in properties conveyed to FHA and communicates directly with servicers about the properties. The compliance contractor reviews property inspections to ensure properties meet conveyance condition standards, reviews requests from servicers for extensions of conveyance times or for overallowable expenses, reviews servicer claims for compliance with requirements, and responds to servicer inquiries about pre- and postconveyance responsibilities. The compliance contractor is located in Oklahoma City, Oklahoma, and is overseen by FHA’s National Servicing Center. Maintenance contractor. Maintenance contractors, called field service managers, are responsible for inspecting properties recently conveyed to FHA and preserving properties in FHA’s REO inventory. FHA has multiple maintenance contractors; they are responsible for properties in different regions. Upon conveyance, the maintenance contractor conducts a comprehensive property inspection to determine if the property meets conveyance condition standards and completes the HUD Property Inspection Report. The maintenance contractor also conducts other inspections at a property before conveyance, as warranted, including a preconveyance inspection at the request of the servicer and an overallowable inspection if requested by the compliance contractor. While these contractors conduct general maintenance on the property, they typically do not make major repairs, because FHA generally sells conveyed properties in as-is condition. Marketing contractor. Marketing contractors, called asset managers, are responsible for marketing and selling the homes in FHA’s REO inventory. FHA homeownership centers. FHA carries out its mortgage insurance and REO disposition programs through four regional offices called homeownership centers (HOC). The centers are located in Atlanta, Georgia; Denver, Colorado; Philadelphia, Pennsylvania; and Santa Ana, California. Officials in each HOC are responsible for overseeing the maintenance and marketing contractors for their region and reviewing HUD Property Inspection Reports to determine if conveyed properties should be reconveyed to the servicer due to condition issues. This determination is then forwarded to the compliance contractor for an additional review. HUD’s Office of Finance and Budget. Staff from this office are responsible for reviewing servicer mortgage insurance claims for compliance with FHA requirements. The office selects a sample of claims from the past 3 years to review whether the property preservation and protection expenses were within allowable limits and whether the servicer curtailed debenture interest and property preservation and protection expenses accurately, among other things. A number of other federal and federally sponsored entities participate in the mortgage market. Along with FHA, the Department of Veterans Affairs and the Department of Agriculture operate programs that guarantee single-family mortgages made by private lenders. Additionally, two government-sponsored enterprises—Fannie Mae and Freddie Mac (enterprises)—purchase and securitize single-family mortgages. However, the property disposition programs for these entities are not directly analogous to FHA’s. In contrast to FHA, the Department of Veterans Affairs and the enterprises take custody of and are responsible for properties closer to the time of the foreclosure sale. The enterprises require servicers to convey properties to them within 24 hours of foreclosure sale or deed-in-lieu of foreclosure, while the Department of Veterans Affairs requires servicers to provide notice of their intent to convey properties within 15 days of foreclosure sale. Also in contrast to FHA, the Department of Agriculture does not take possession of foreclosed properties with guaranteed loans, but rather oversees their disposition by lenders. In FHA’s case, properties are often held in the lender’s or servicer’s name for an extended period after the foreclosure sale. Following the foreclosure sale, FHA requires servicers to oversee properties during redemption periods, to evict residents if properties not in redemption periods are occupied, and to continue property preservation and protection activities. In addition, before conveyance, servicers must identify and pay any homeowners association (HOA) fees and utility bills that are due. As described in figure 3, servicers also must make any required repairs, meet other conveyance requirements, and pass an FHA property inspection, or face the prospect of having the property reconveyed. FHA officials said this approach reduces FHA’s holding time and costs and that the agency does not have the infrastructure to manage and fund property repairs itself. From July 2010 through December 2017, the property conveyance process took a median of 70 days, but this figure varied widely by year. Our analysis of FHA data found that, from 2011 through 2015, the median number of days to complete the conveyance process increased four-fold (from 41 to 161 days) and varied more widely around the median each successive year (see fig. 4). Conveyance time frames declined substantially in 2016 and 2017 (to a median of 137 days and 112 days, respectively) while continuing to vary considerably around the median. In comparison, FHA officials said the conveyance process generally should take about 37 days to complete—30 days for servicers to make necessary repairs and convey title to FHA and 7 days for FHA to inspect the property, communicate any condition issues identified during the inspection, and assign a marketing contractor to promote and sell it. We also found that the time it took properties to complete the conveyance process varied by HOC region. For the entire July 2010–December 2017 period, the Philadelphia HOC had the highest median time frame (91 days) and the Atlanta HOC the lowest (56 days). The Santa Ana and Denver HOCs had medians of 78 and 67 days, respectively. A number of factors may have contributed to differences among the HOCs, such as the number of properties conveyed in each region (which can affect servicer and HOC capacity) and the age of the housing stock (which can affect the time needed to make repairs). The time to complete the conveyance process includes, when applicable, the time needed for FHA to reconvey a property—that is, transfer ownership to the servicer due to condition or title issues—and for the servicer to convey it to FHA a second time. FHA officials said they try to avoid reconveyances because they prolong the conveyance process and result in FHA incurring additional preservation and protection costs. Figure 5 shows examples of condition issues at properties we visited in the Baltimore, Maryland, and Atlanta, Georgia, metropolitan areas that were in the reconveyance process. Our analysis of FHA data found that reconveyances were not common enough to significantly affect median conveyance time frames, but substantially lengthened the conveyance process when they did occur. As shown in table 1, servicers conveyed 406,863 properties to FHA from 2012 through 2017—the period within our scope for which FHA had reliable reconveyance data. In comparison, FHA reconveyed 8,874 properties to servicers during that time frame. The annual number of reconveyances rose from 1,019 in 2012 to 1,935 in 2015, before declining to 1,099 in 2017. We also found that the median time to complete FHA’s conveyance process in 2012–2017 was more than 614 days longer for reconveyed properties than the median for properties not reconveyed. However, the difference between the medians declined over time, dropping from 777 days in 2012 to 267 days in 2017 (see fig. 6). Servicers and FHA must take several steps to complete the conveyance process for reconveyed properties, which may account for some of the length of the time frames. Once the compliance contractor has notified the servicer that a property has condition issues that must be resolved to avoid reconveyance, the servicer may appeal. FHA officials said appeals can add up to 120 days to the conveyance process. If the servicer is unable to resolve the issues and the appeals are denied, FHA reconveys the property and the servicer must reimburse FHA for the original claim amount. The servicer then must complete any required repairs, resolve any title issues, prepare a new evidence package for FHA showing that condition and title issues were addressed, and submit a request to FHA’s compliance contractor to convey the property again. FHA’s compliance contractor then has 10 business days to review the evidence package and notify the servicer of its decision. Once conveyance is approved, the servicer may resubmit a new mortgage insurance claim form and evidence that the property deed has been filed in FHA’s name. Two factors that likely contributed to the increase in the time to complete FHA’s conveyance process are increased use of other disposition methods and property damage stemming from extended default and foreclosure periods. Increased use of third-party sales. FHA data indicate that from 2010 through 2017 servicers increasingly disposed of properties through third- party sales using the CWCOT program. As previously noted, in 2014 FHA began requiring servicers to offer all eligible properties for sale through CWCOT before using the conveyance process. According to our analysis of FHA property disposition data, in fiscal years 2010–2017, the share of properties disposed of through CWCOT rose from about 1.4 percent to almost 44 percent, while the share of conveyance and REO sales dropped from about 84 percent to 42 percent (see fig. 7). The remaining properties were disposed of through notes sales or preforeclosure sales. Increased use of CWCOT may have extended property conveyance time frames for two reasons. First, servicers must attempt to sell all eligible properties through CWCOT while simultaneously preparing them for conveyance, which may add additional time to the conveyance process according to FHA officials. Second, properties conveyed to FHA because they are not eligible for or sold through the CWCOT program are generally in poorer condition and require more repairs, according to servicer representatives. This may contribute to extended conveyance time frames. For example, a representative from one mortgage industry group told us that properties ineligible for CWCOT and conveyed to FHA generally require more than the $5,000 in preservation and protection costs that FHA allows. In these cases, servicers may request additional funds from the compliance contractor, but processing the requests may prolong the conveyance process, as discussed later in this report. Representatives from one servicer and two mortgage industry groups stated they prefer the CWCOT program because it reduces the need to convey properties. They said the conveyance process is costly and comes with the risk of reconveyance. FHA data show that REO sales generally had higher loss severity rates (the financial loss on a defaulted loan as a percentage of the unpaid principal balance) than properties disposed of through alternative methods, including the CWCOT program. For example, for the last quarter of fiscal year 2017, FHA reported that the loss severity rate for properties sold through REO was 54.8 percent, while the combined loss severity rate for properties disposed of through alternative methods was 43.8 percent. However, some of this difference may be attributable to the poorer condition of conveyed properties, as discussed previously. National Mortgage Settlement In February 2012, the Department of Justice and 49 states settled with the five largest mortgage servicers— Ally Financial, Inc. (formerly GMAC), Bank of America Corporation, Citigroup Inc., J.P. Morgan Chase & Co., and Wells Fargo & Company — to address mortgage servicing, foreclosure, and bankruptcy abuses. The agreement settled state and federal investigations finding that these servicers routinely signed foreclosure-related documents without verifying their validity and without the presence of a notary public—a practice known as “robosigning.” Extended default and foreclosure periods. According to FHA officials, properties with long default and foreclosure periods may be in poor condition because they deteriorate if servicers delay property maintenance and repairs. FHA officials said this was common for properties conveyed to FHA after the 2012 National Mortgage Settlement because some servicers delayed foreclosure proceedings to limit their exposure to litigation in 2010 and 2011 (see sidebar). FHA officials said that after the Department of Justice issued the National Mortgage Settlement in February 2012, servicers who had been delaying default and foreclosure started conveying large numbers of properties. According to FHA and servicer representatives, damaged properties can take longer to convey because they require extensive repairs to meet FHA’s conveyance condition standards. The results of our analysis of FHA data are broadly consistent with these observations. The number of properties conveyed to FHA increased by 31 percent (from 84,363 to 110,567) between 2011 and 2012, the year of the settlement. Additionally, the default and foreclosure period for conveyed properties (the time between the borrower defaulting on the mortgage and the servicer obtaining title to and possession of the property) increased over most of the July 2010–December 2017 time frame. As shown in figure 8, the median default and foreclosure period was 416 days for properties conveyed in July–December 2010, peaked at 664 days (about 60 percent higher) for properties conveyed in 2015, and fell to 612 days for 2017 conveyances. The overall upward trend was even more pronounced for properties with default and foreclosure periods at the 75th percentile. The 75th percentile was 555 days for properties conveyed from July through December 2010, peaked at 1,152 days (about 108 percent higher) for properties conveyed in 2016, and declined to 1,068 days for 2017 conveyances. Certain regulatory and policy changes also may have increased the default and foreclosure periods since 2013. HUD issued a mortgagee letter in 2013 that increased the reasonable diligence time frames and allowed servicers additional time to complete foreclosures in certain states. For example, the reasonable diligence time frame for properties in New York increased from 13 to19 months. Also, in 2014 mortgage servicing rules issued by the Consumer Financial Protection Bureau went into effect that restricted servicers’ ability to initiate a foreclosure and gave borrowers additional time to pursue loss mitigation options. Specifically, servicers may not initiate foreclosure proceedings if a borrowers’ application is pending for a loan modification or other alternatives to foreclosure. In addition, we found that properties with longer default and foreclosure periods generally took longer to complete the conveyance process than properties with shorter default and foreclosure periods (see fig. 9). Specifically, from July 2010 through December 2017 properties with the longest default and foreclosure periods—those in the highest quartile— took 93 days at the median to complete the conveyance process and 238 days at the 75th percentile. In comparison, properties with the shortest default and foreclosure periods—those in the lowest quartile—took 57 days at the median to complete the conveyance process and 136 days at the 75th percentile for that same period. As previously stated, FHA officials told us that properties with long default and foreclosure periods may have deteriorated if servicers were not maintaining them. These properties may have required additional repairs to bring them into conveyance condition. As previously noted, overall conveyance time frames declined in 2016 and 2017 from their peak in 2015. FHA officials attributed this improvement largely to the decreasing number of conveyances affected by the National Mortgage Settlement. As discussed earlier, the settlement contributed to a wave of properties that took a long time to convey, potentially due to damage sustained during extended default and foreclosure periods. FHA officials also indicated that the improved housing market in recent years has resulted in fewer foreclosures and, therefore, fewer property conveyances to FHA. Consequently, servicers and contractors may be better able to manage the workload associated with property conveyances and complete the process more quickly. From July 2010 through December 2017, servicers generally did not convey properties to FHA within the regulatory 30-day time frame (preconveyance period). During the preconveyance period, servicers must ensure the property has good and marketable title, conduct routine inspections and maintenance on the property, and ensure the property meets conveyance condition standards. If servicers do not believe they will be able to convey a property within 30 days, they may request an extension. The median number of days servicers took to complete the preconveyance period increased from 31 in July–December 2010 to 140 in 2015 (see fig. 10). This figure declined after 2015, dropping to 101 days in 2017. Variation around the median was considerable, especially in more recent years. For example, in 2017 the time to complete the preconveyance period was 43 days at the 25th percentile, compared with 268 days at the 75th percentile. The percentage of properties for which servicers did not convey in 30 days plus any approved extension grew from about 31 percent in July– December 2010 to about 72 percent in 2017. For the entire period from July 2010 through December 2017, the corresponding percentage was 55 percent. Representatives of 13 of the 20 servicers we interviewed said that meeting the 30-day timeline was one of their top challenges with the conveyance process. Representatives of servicers and mortgage industry groups cited several reasons for servicers needing additional time to convey. For example, representatives of 11 servicers cited the heavily damaged condition of the properties they acquired as one of the primary reasons for not conveying properties within 30 days. Servicer representatives also noted other reasons, including four who cited waiting for responses on hazard insurance claims and five who cited difficulty in obtaining HOA bills to pay. In addition, representatives of two mortgage industry groups and three servicers told us that meeting all the conveyance and title requirements simultaneously is a major challenge. For example, representatives of one mortgage industry group said a servicer may have completed required property repairs and paid HOA fees and utility bills, but if the property were subsequently vandalized, the servicer would have to delay conveyance to complete repairs. By that point, the servicer might no longer be current on HOA and utility payments. Servicers have the option to request an extension to the preconveyance time frame if they think they will be unable to convey a property in 30 days. Servicers requested a conveyance extension for about 40 percent of the properties conveyed from July 2010 through December 2017. FHA approved the extensions in about 40 percent of these cases. In addition, representatives from six of the 20 servicers we interviewed said FHA’s process for reviewing servicers’ overallowable requests (additional funds needed to complete work) negatively affected their ability to convey properties in 30 days. Once a servicer makes an overallowable request, FHA’s compliance contractor has 5 business days to review it and either reject the request or approve all or some of the requested amount. (We discuss the compliance contractor’s ability to meet this and other time requirements in the following section.) Servicers may appeal any rejections, in which case the compliance contractor has 3 business days to make a final determination. Six servicer representatives said that the time it takes the compliance contractor to make overallowable decisions may cause them to exceed the 30-day time frame, especially when they submit multiple requests for the same property. For context, our analysis of FHA data found that in 2017, the median number of servicer overallowable requests per property was 13, and the median number of appeals per property was six. In contrast to the preconveyance requirement, servicers usually met the time requirement for giving title evidence to FHA. Title evidence includes documentation that FHA is the legal owner of the property, including a copy of the mortgage documentation, a legal description of the property, and a copy of the recorded deed in FHA’s name. Servicers may provide title evidence to FHA at any point during the conveyance process up to 45 days after filing the deed. If servicers believe they will be unable to provide title evidence within 45 days, they may submit an extension request to the compliance contractor. According to FHA data, servicers were able to provide title evidence within 45 days plus any approved extension for 84 percent of properties conveyed from July 2010 through December 2017. FHA’s compliance and maintenance contractors generally met the required time frames for key conveyance tasks for properties conveyed from 2011 through 2017. However, when the contractors did not meet their required time frames, the delays may have lengthened the time to complete the conveyance process for some properties. Compliance contractor. FHA established a time frame of 5 business days for the compliance contractor to conduct various reviews in the pre- and postconveyance periods. In the preconveyance period, the compliance contractor reviews requests for overallowables, conveyance extensions, and conveyance of a property with surchargeable damage. The contractor also reviews title evidence and extension requests for title evidence, which are generally submitted after conveyance. Table 2 shows the percentage of properties conveyed from 2011 through 2017 for which the compliance contractor met the 5 business day requirement, according to our analysis of FHA data. Although the contractor mostly met the required time frames, when it did not, the delay may have lengthened the time to complete the conveyance process. Our analysis of FHA data indicates that when the compliance contractor missed the deadlines, it missed them by a median of 4–10 days, depending on the requirement. The compliance contractor’s review of overallowable requests, conveyance extension requests, and surchargeable damage requests generally occurs during the preconveyance period when servicers have 30 days to convey the property to FHA. As noted earlier, some servicer representatives we interviewed said that waiting for the compliance contractor to approve or deny overallowable requests hindered their ability to convey the property in 30 days. The compliance contractor must complete at least 95 percent of the reviews within the 5-day time frame to meet FHA’s standard for minimum acceptable performance. FHA uses monthly scorecards when reviewing the contractor’s performance against this standard. FHA officials told us they had not issued any deficiency notices to the current compliance contractor, but that discussions with the contractor can occur when it does not meet the 95 percent standard in particular months. FHA officials also noted that some of the contractor’s reviews may take longer than 5 days if resolving them requires obtaining additional documentation or substantial back-and-forth communications with the servicer. Maintenance contractors. After conveyance, FHA’s maintenance contractors have 2 calendar days from the date they are assigned a property to conduct the comprehensive property inspection and upload the results into a HUD Property Inspection Report in FHA’s asset disposition system. They then have 5 calendar days to complete a Property Condition Report, which details the functionality of the property’s systems, the existence of any transferable warranties, and any legal actions, such as code violations or pending demolition orders. FHA starts measuring compliance with these time requirements 24 hours after the properties are assigned to the compliance contractor (to account for holidays and late afternoon assignments). According to our analysis of FHA data, the maintenance contractors completed property inspections and uploaded the results within 3 days (the 2-day requirement plus 24 hours) for about 90 percent of properties conveyed from 2011 through 2017. The contractors met the 5-day requirement to complete the Property Condition Report about 77 percent of the time. When the maintenance contractors missed these time frames, they missed them by a median of 1 and 2 days, respectively. The longer a property remains uninspected after the servicer has conveyed it, the greater the chance that it will be damaged or vandalized before inspection. If a property is damaged during this period, disputes may arise between FHA and the servicer about which entity is responsible for the damage. FHA is responsible for maintaining the property once the servicer complies with all HUD regulatory requirements leading to conveyance, including filing the deed (in FHA’s name) for record and filing the conveyance claim. However, FHA may hold the servicer responsible for the damage if the claim was suspended due to the need for review or correction resulting from certain types of noncompliance with HUD requirements or if the servicer could not prove the damage occurred after FHA became responsible for maintaining the property. Disagreement over this issue can add time to the conveyance process. FHA measures each maintenance contractor’s performance monthly using a formula that considers both the contractor’s timeliness in completing property inspections and uploading the results (2-day requirement plus 24 hours) and in completing the Property Condition Report (7-day requirement plus 24 hours) for each property. If the contractor misses either deadline, it is not considered timely for that property. FHA considers timeliness for 95 percent of properties each month as satisfactory. According to FHA officials, FHA has taken actions when the performance of maintenance contractors was not satisfactory. A HOC official said that the actions may include issuing a defective performance letter, which requires the contractor to provide a remedy plan, and issuing a cure notice in coordination with HUD’s contracting office. FHA updated aspects of the conveyance process in recent years to help address some of the challenges experienced by servicers and the agency. For example, FHA increased property preservation and protection allowances in 2016 to help address servicer feedback and to better align allowances with other mortgage industry participants, according to FHA officials. In February 2016, FHA issued Mortgagee Letter 2016-02, which increased allowance amounts that servicers may claim for specific types of property preservation and protection work. It also increased the total maximum amount servicers may claim for a property without submitting an overallowable request from $2,500 to $5,000. However, the mortgagee letter eliminated all exclusions from the maximum amount, which previously included one-time major repairs, such as a roof replacement. FHA officials said the agency increased the allowance amounts to account for the standard increases in property preservation costs over time, and to align allowances with those of the enterprises and the Department of Veterans Affairs. Seventeen of the 20 servicers we interviewed said that FHA’s current property preservation and protection allowances are not sufficient to complete the work needed to convey properties. While representatives of eight of the 20 servicers told us the changes FHA made to allowances in 2016 helped them complete work within allowance amounts, representatives of the remaining 12 servicers said the changes did not help or helped in some ways but presented more challenges in other ways. Representatives of an association of mortgage lenders and servicers said that they preferred the previous system, because some work was excluded from the maximum allowance. For example, representatives of one servicer said that due to the 2016 changes, they now must submit an overallowable request for standard maintenance items, such as grass cuts, once they have exceeded the maximum allowance amount. Our analysis of FHA data found that the percentage of properties with at least one overallowable request increased steadily from 2011 through 2017—from about 53 percent to about 90 percent—despite the 2016 changes (see fig. 11). For properties with at least one overallowable request, the median number of requests before the 2016 changes (from July 1, 2010, through February 4, 2016) was seven, compared with eight after the changes (from February 5, 2016, through the end of 2017). In 2017 alone, the median number of overallowable requests per conveyed property was 13. However, it may be too early to tell what effect the 2016 mortgagee letter will have on servicer’s ability to conduct work within the allowances. FHA officials said that although the change in the allowance amounts was partly intended to reduce overallowable requests, the poor condition of many properties with extended default and foreclosure periods may have increased such requests. The officials stated that some of these properties were still being conveyed to FHA in 2017. FHA enhanced the information system servicers and contractors use to manage conveyed properties, but officials noted the need to update another system FHA uses to process and pay claims. In March 2018, FHA incorporated its preconveyance inspection pilot, discussed in more detail later in this report, into the asset disposition system, the information system servicers use to convey properties to FHA. FHA officials and contractors also use the system to track properties from conveyance through REO sale. With the update, servicers may request a preconveyance inspection and see the results of the inspection in the system, according to FHA officials. Before FHA added the pilot to the asset disposition system, servicers and FHA used email to communicate about properties in the pilot. In October 2016, FHA added a feature to the asset disposition system that enables FHA officials, contractors, and servicers to electronically monitor the status of reconveyed properties. According to FHA officials, all communication between FHA and servicers on reconveyed properties previously was by email, including the servicer’s notification to FHA that it was ready to convey a property again, and the photographs required to document property condition. However, according to FHA officials, FHA’s claims system is not equipped to process more than one claim per property, so claims for properties FHA reconveys and which the servicer then conveys to FHA a second time must be processed manually. Officials from FHA’s Office of Financial Services said that manual processing delays claim payments to servicers—sometimes by more than a year. Seven of the 20 servicers we interviewed identified delayed claim payments for reacquired properties as a challenge. FHA officials said that they have made an internal business case for funding to modernize the system, but have not succeeded in securing the funding in prior years. FHA updated its written direction to servicers on conveyance condition in 2016, but limitations in the contents and methods of communicating these policies and procedures have contributed to compliance challenges for some servicers. In its February 2016 mortgagee letter, FHA re- emphasized its existing directions to servicers about property conveyance, provided additional details on how to calculate claim amounts and document property preservation and protection work, and clarified descriptions of some preservation and protection requirements. Additionally, in December 2016, FHA issued an updated single-family housing policy handbook that consolidated all policies and procedures for servicers into one document, including those on maintaining and conveying foreclosed properties. However, servicers and other industry stakeholders with whom we spoke and our review of FHA’s policies and procedures on conveyance condition identified several limitations, as follows. Lack of clarity or specificity. Representatives from 15 of the 20 servicers we interviewed said they found FHA’s policies and procedures on conveyance condition to be unclear or subjective, and 13 cited specific parts of the conveyance condition standards they found to be unclear or missing. For example, one servicer was unsure about the extent of repairs required when a property had water seepage in the basement. We found that FHA’s policies and procedures include information on how to treat a basement that is flooded or a property with moisture damage, but does not address basement leaks, cracks, or seepage. Representatives of four servicers said that FHA’s policies and procedures do not sufficiently address how servicers should handle properties with potential structural or foundation damage. Consistent with this viewpoint, we found that FHA’s handbook and mortgagee letter do not explain what a servicer should do if it believes a property has damage affecting its structural integrity. In addition, representatives of three servicers said FHA’s expectations of them are unclear when a roof is damaged but does not currently have a leak. According to FHA’s policies and procedures, servicers must ensure all roofs “are free of active leaks or other sources of water intrusion.” However, FHA does not specify what servicers should do if there is roof damage but no active leak. Two of the servicers said they were uncertain whether they should replace the damaged roof that is not leaking, or convey the property and risk reconveyance if it rains before FHA inspects the property and the roof leaks. Perceived inconsistency in interpretation. Representatives from 10 of the 20 servicers we interviewed said FHA is somewhat or not at all consistent in determining whether properties meet FHA’s conveyance requirements. Among the remaining 10, one stated that FHA is completely consistent and nine said that FHA is mostly consistent. In addition, two of the 20 servicers said the answers they receive from FHA to the same question differ depending on whom they ask. HOC officials also noted cases in which their interpretation of policies and procedures differed from the compliance contractor’s. For example, officials from three HOCs told us that the compliance contractor sometimes disagrees with their determination that a property is not in conveyance condition when the contractor reviews the HOC’s reconveyance decision. Limited communication methods. In addition to formal written policies and procedures on conveyance condition, FHA fields servicer questions, primarily through its compliance contractor, by phone. The compliance contractor also issues an annual newsletter on topics such as common reconveyance triggers and best practices for submitting successful overallowable and extension requests. However, some servicers we interviewed suggested other possible ways to communicate policies and procedures that they said they would find helpful, including the following: Representatives of five servicers said they would like FHA to publish an authoritative set of frequently asked questions (FAQ) on conveyance condition. FHA has an FAQ web page that includes information on conveyance condition, but, as of April 2019, did not include FAQs about the specific property preservation and protection issues discussed above (water seepage, structural integrity, and roof damage with no active leaks). In addition, a link in the web page labeled “foreclosure/conveyance” led to a few FAQs on conveyance condition and property preservation requirements, but the answers consisted solely of language from FHA’s existing policies and procedures. One servicer’s representatives suggested that FHA could issue policies and procedures in a format similar to Fannie Mae’s Property Preservation Matrix and Reference Guide. This guide has features that FHA’s policies and procedures do not have, as discussed below, including photographic examples, detailed requirements for photographic documentation, and “if-then” statements detailing what servicers should do if they encounter certain challenges at a property. Representatives of two servicers suggested that FHA host regular industry calls. While the compliance contractor told us that it takes ad hoc calls and holds regular teleconference calls with a number of individual servicers, an FHA official told us the contractor is only authorized to respond to servicer questions by providing relevant parts of FHA’s written policies and procedures and is not supposed to respond with interpretations (clarifications, or explanations) of existing policies and procedures. Representatives from one servicer said industrywide calls with FHA staff would give servicers a way to obtain fuller explanations of FHA’s expectations. One servicer suggested that FHA provide training to servicers about the conveyance process. The servicer noted that while FHA provides training on other aspects of its program, including loss mitigation, it does not do so for the conveyance process or submitting claims. Limited direction on photographic evidence. FHA’s policies and procedures provide instructions for servicers and contractors on how to document property conditions, but contain limited direction on photographic evidence. Servicers must thoroughly document the condition of the property when they first obtain possession so that FHA does not hold them responsible for damage caused by the borrower. Servicers also must take before and after pictures of any work they do on the property. FHA’s policies and procedures on photographic documentation say only that the servicer must use digital photography, ensure a date-stamp is printed within each photograph, and ensure that each photograph is labeled to describe the contents of the photograph. FHA has not communicated in writing any requirements for photograph dimensions, color, distance, framing, or content or suggestions for documenting conditions that may be difficult to see. Servicers and FHA officials stated that they face challenges in documenting property conditions in a way that most accurately informs the compliance contractor about the property. The compliance contractor reviews documentation, including photographs, uploaded into the asset disposition system by servicers to make decisions on overallowable and extension requests. The compliance contractor also reviews documentation from maintenance contractors on inspection results and reconveyance recommendations by HOC officials. An FHA maintenance contractor told us that the compliance contractor sometimes responds that the condition described is not apparent from the photographs in the asset disposition system. According to members of an industry group representing servicers, in some cases this may result in FHA requiring servicers to repair damage caused by the borrower, because the servicers’ photographs did not prove the damage was present when they first gained possession of the property. To illustrate how photographs can effectively or ineffectively capture property condition problems, figure 12 provides two examples of flooring issues at properties conveyed to FHA. In one photograph, the buckling of the floor is apparent, but in the other, the waterlogged and warped condition of floor is harder to discern. An experienced FHA maintenance contractor told us there are creative ways to document some conditions that are difficult to photograph. For example, to document a damp floor, one can photograph a piece of paper (which darkens when wet) before and after placing it on the floor. This method is not included in FHA’s handbook or mortgagee letter. Limitations in the content and delivery of FHA’s policies and procedures on conveyance condition suggest room for improvement and are inconsistent with the federal internal control standard for communicating externally. This standard calls for management to externally communicate the necessary quality information to achieve an entity’s objectives. Federal agencies can help ensure compliance by communicating with and obtaining information from external parties and by periodically evaluating and selecting appropriate methods of communication, taking into account factors such as the audience, the purpose and type of information being given, and legal or regulatory requirements. However, FHA has not identified where the conveyance condition policies and procedures could be improved because it has not assessed information from servicers—for example, the frequency or content of their questions to the compliance contractor. FHA also has not thoroughly evaluated its methods for communicating its policies and procedures. As a result, FHA has limited assurance that servicers understand FHA’s expectations for conveyed properties and that contractor decisions are made consistently. Weaknesses in these areas can contribute to inefficiencies such as delays in executing conveyances and reconveyance of properties to servicers. FHA has not provided written direction to HOC officials on choosing among alternatives to address conveyed properties that do not meet FHA’s condition standards. According to officials from FHA headquarters and the National Servicing Center, HOC officials can (1) reconvey the property’s title to the servicer, (2) issue a demand letter establishing a debt to FHA for the cost of the work needed, or (3) enter into a reconveyance bypass agreement with the servicer that requires the servicer to complete repairs within a certain number of days. The latter two options avoid reconveyance and therefore may expedite resale of the property. These three options are mentioned in different parts of FHA’s policies and procedures, but the agency has not outlined the circumstances that would warrant use of each method. FHA has not provided direction to the HOCs, partly because HOC officials have the authority to choose a method based on the expected financial return on the property. However, HOC officials with whom we spoke differed in the factors that they considered when deciding how to address properties that do not meet FHA’s conveyance condition standards. Officials from three HOCs cited criteria that any property with more than $5,000 in damage due to servicer neglect should be considered for reconveyance, while a bypass agreement or demand letter may be issued if the amount of servicer neglect is less than $5,000. However, FHA officials were not able to tell us where this criterion is written. An official from the fourth HOC said the decision to reconvey partly depends on the strength of the housing market. If the HOC believes it can sell the property in its current condition—even if the condition does not meet FHA’s conveyance standards—the HOC will be more likely to issue the servicer a demand letter than reconvey the property. In contrast, an official from one of the other HOCs told us the state of the housing market did not factor into decisions on reconveyance. Furthermore, according to FHA officials, HOCs may also reconvey a property with only small amounts of damage if the servicer frequently conveys properties not in conveyance condition, in order to impress on the servicer the importance of complying with FHA requirements. The HOC officials generally agreed that bypass agreements offer a way for small repairs to be fixed quickly. However, an official from one HOC said the HOC did not issue bypass agreements often because servicers’ property preservation and protection vendors may take longer than the time specified in the agreement to complete repairs and, since the title is in FHA’s name, FHA has no recourse with the servicer. An official from another HOC also said that he did not like issuing bypass agreements because servicers do not always complete repairs quickly. FHA does not produce reports on the HOCs’ use of reconveyance, demand letters, and bypass agreements, so the frequency with which the HOCs employ these methods is unknown. Some servicer representatives with whom we spoke noted apparent inconsistency among the HOCs. For example, representatives of three servicers said that some HOCs do not issue bypass agreements at all. Similarly, representatives of one servicer told us they have infrequently, if ever, received a demand letter for small condition issues at properties; rather, FHA reconveys the properties for minor condition issues. FHA’s lack of written direction on alternatives to reconveyance is inconsistent with federal internal control standards, which call for designing control activities, including policies, to achieve objectives. Granting HOC officials discretion in dealing with properties that do not meet condition standards gives them flexibility to respond to specific circumstances. However, without written direction on factors to consider when determining whether they should reconvey a property, issue a demand letter, or enter into a bypass agreement with the servicer, FHA lacks reasonable assurance that HOCs make determinations consistently and in line with the agency’s regulatory goals for the REO program—to dispose of properties in a manner that expands home ownership, strengthens neighborhoods and communities, and ensures a maximum return to the mortgage insurance fund. Balancing these goals may require using different methods to address properties that do not meet conveyance standards. For example, in some cases issuing a demand letter or a bypass agreement for certain properties may result in FHA marketing and selling the property more quickly than it would by reconveying the property. A quicker sale, in turn, may help avoid the negative effects of a vacant property on the surrounding neighborhood. However, if FHA accepts a property in poor condition, it may receive less in proceeds when selling the property, which negatively affects FHA’s mortgage insurance fund. FHA began a pilot program in 2017 to inspect properties that meet certain criteria before conveyance, but has not developed a plan to assess the results of the pilot program. FHA selected three large servicers to participate in this preconveyance inspection pilot. These servicers may request preconveyance inspections for properties with characteristics that increase their chances of being reconveyed, according to FHA officials. For example, eligible properties include those that experienced recurring vandalism, received overallowable repairs of greater than $5,000, or have potential structural defects, foundation issues, or damp or wet basements. Based on the inspection results, the properties are approved to convey, approved to convey subject to repair with no additional inspection, or denied conveyance through the pilot (see table 3). After conveyance, FHA inspectors conduct a thorough inspection to confirm that the property meets conveyance condition standards. Properties that do not meet the standards may be reconveyed. As of November 2018, FHA had not developed plans for evaluating the effectiveness of the pilot in achieving the goals of reducing the number of properties reconveyed due to property condition and minimizing the time it takes to convey properties. FHA officials told us that they will develop a plan to assess pilot outcomes when sufficient data are available. However, without an evaluation plan, FHA may not collect the right information during the pilot to rigorously assess results. GAO’s guide for designing evaluations states that key components of an evaluation design include the evaluation questions or objectives; information sources and measures; data collection methods; an analysis plan, including evaluative criteria or comparisons; and an assessment of study limitations. Certain characteristics of FHA’s pilot underscore the importance of incorporating these components into evaluation design. For example, because the pilot is intended to expedite the conveyance process through preconveyance inspections, it will be important to isolate the impact of the inspections, potentially by making comparisons to a control group. A properly selected control group can rule out competing explanations for observed outcomes. Additionally, because the pilot may affect participating servicers in ways that extend beyond the speed of the conveyance process or the probability of reconveyance, it will be important for FHA to thoroughly consider the information sources and measures it uses, including participant feedback. For example, representatives of the three participating servicers told us they had concerns about FHA holding properties in the pilot to higher conveyance condition standards than nonpilot properties and the time it takes to complete the preconveyance inspection process. According to the representatives, this process, which includes 7 calendar days for the inspection and 5 business days for the HOCs to review the inspection report, has resulted in longer holding times and increased vandalism risks. Without a well-designed evaluation, FHA risks making decisions about preconveyance inspections based on incorrect or incomplete information on the pilot’s benefits and drawbacks. While FHA increased the use of other property disposition methods in recent years, servicers still convey thousands of foreclosed properties to FHA annually. If the process of transferring ownership from the servicer to FHA is not efficient, these properties may sit vacant for prolonged periods, deteriorate, and contribute to neighborhood decline. As a result, it is critical for FHA to have effective and efficient policies and procedures for the conveyance process. While FHA has made recent updates to its handbook, mortgagee letters, and information systems, additional improvements would better align its processes and procedures with federal internal control standards and GAO guidance on designing evaluations: By addressing limitations in the content (including its detail) and communication of its policies and procedures on conveyance condition, FHA could help reduce uncertainty and inconsistency in the conveyance process that may contribute to inefficiencies, such as reconveyance of properties to servicers. Second, by providing direction to HOC officials on factors to consider when deciding whether to use alternatives to reconveyance for properties that do not meet conveyance condition standards, FHA could increase the likelihood that alternatives will be used consistently and in line with FHA’s goals for the REO program. Third, by developing a plan for how it will evaluate the outcomes of the pilot to inspect certain properties prior to conveyance, FHA could help ensure the pilot generates the performance information needed to make effective management decisions about future policies. By addressing these issues, FHA could make the conveyance process more efficient and therefore help reduce negative impacts on neighborhoods. We are making the following three recommendations to FHA: The Commissioner of FHA should enhance the content and communication of FHA’s policies and procedures on conveyance condition, including by considering the program stakeholder views discussed in this report and other stakeholder input. (Recommendation 1) The Commissioner of FHA should provide written direction to HOC REO directors on factors to consider when determining whether to reconvey a property with condition issues, issue a demand letter, or enter into a bypass agreement with the servicer. (Recommendation 2) The Commissioner of FHA should develop a formal plan for evaluating the outcomes of the preconveyance inspection pilot that includes key elements of evaluation design—such as evaluation objectives and measures—and utilizes participant feedback and control groups, as appropriate. (Recommendation 3) We provided a draft of this report to FHA, the Department of Veterans Affairs, and the Federal Housing Finance Agency (the conservator and regulator of Fannie Mae and Freddie Mac) for their review and comment. The Department of Veterans Affairs and the Federal Housing Finance Agency did not provide comments. FHA provided written comments reproduced in appendix II. FHA neither agreed nor disagreed with our first recommendation to enhance the content and communication of its policies and procedures on conveyance condition. FHA cited the 2016 updates to its policy handbook and mortgagee letter and said it recognized the importance of external communication, training, and in- person meetings to ensure servicers have the information they need to operate in compliance with FHA programs. Our report discusses these updates, but also identifies areas for additional improvements to address limitations in the clarity and comprehensiveness of FHA’s policies and procedures and methods for communicating them. FHA agreed with our second and third recommendations to provide written direction on considering alternatives to reconveyance and to develop a plan for evaluating the preconveyance inspection pilot. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Housing and Urban Development, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. Our objectives were to examine (1) timelines for Federal Housing Administration (FHA) foreclosed property conveyances in June 2010– December 2017 and the extent to which servicers and FHA met time requirements and (2) changes FHA has made to the conveyance process in recent years and any ongoing process challenges. To address the first objective, we obtained data from FHA’s Single Family Insurance System–Claims Subsystem and from the P260 Asset Disposition and Management System (asset disposition system) on the 610,802 foreclosed properties mortgage servicers conveyed to FHA from January 1, 2010, through December 31, 2017. For purposes of our analysis, we generally excluded properties conveyed to FHA from January 2010, through June 2010 because they were managed using different data systems and contractors than FHA currently uses. After excluding these properties, we analyzed data for 544,421 properties conveyed to FHA from July 2010 through December 2017. (We use calendar years in this report unless otherwise noted.) We calculated the number of days it took each property to complete the conveyance process. We defined the start of the conveyance process as the date the servicer obtained possession and acquired marketable title for a property and the end of the process as the date on which FHA assigned a marketing contractor to sell the property. For each annual cohort of conveyed properties, we calculated the 25th, 50th (median), and 75th percentile time frames and compared these statistics across years. To analyze the effect that reconveyances had on the length of the conveyance process, we compared length of time for conveyance in 2012–2017 for properties that were reconveyed to those that were not. According to FHA staff, data on reconveyances were unreliable prior to 2012, so we excluded those properties from this comparative analysis. We interviewed FHA officials about factors that may have affected conveyance time frames from 2010 through 2017, including increased use of other disposition methods and servicers delaying foreclosure actions and the resulting impact on property conditions, since the asset disposition system does not disclose the reasons for any delays. To analyze changes in the use of different property disposition methods and to examine the loss severity rates for these methods, we reviewed FHA data for fiscal years 2010–2017. To understand the relationship between properties with long default and foreclosure periods and conveyance time frames, we measured the time between the borrower defaulting on the mortgage and the servicer obtaining title to and possession of the property (effectively, the end of the foreclosure process) for properties conveyed to FHA from July 2010 through December 2017. We divided the range of default and foreclosure periods into four quartiles. For each quartile, we calculated the length of the conveyance process at the median and at the 25th and 75th percentiles. We then compared these statistics across quartiles. To determine the extent to which mortgage servicers and FHA contractors met their respective time requirements for the conveyance process, we identified relevant time requirements in Department of Housing and Urban Development (HUD) regulations and policies. We also reviewed the performance work statements for FHA’s mortgagee compliance manager (compliance contractor) and field service managers (maintenance contractors) to identify the contractors’ time requirements for the conveyance process. For servicers and contractors, we selected key time requirements for which electronic data were available, including the following: Thirty calendar days from acquiring title and possession of a property, plus the length of any approved time extension, to convey property to FHA. Forty-five days from conveying a property to FHA, plus the length of any approved time extension, to provide FHA with title evidence. Five business days to review each overallowable request submitted by a servicer. Five business days to review the sufficiency of title documentation submitted by the servicer. Five business days to determine whether a servicer can convey a property with surchargeable damage. Five business days to approve or deny a servicer’s conveyance or title extension request. Two calendar days, plus an additional 24 hours, to complete and upload the HUD Property Inspection Report from the date the property was assigned. Five calendar days to complete a Property Condition Report from the date the Property Inspection Report was completed. For each property, we calculated the number of days it took servicers and contractors to complete these required steps in the conveyance process and compared that number to the maximum number of days FHA allows for each step. For each annual cohort of properties conveyed in 2010– 2017, we calculated the 25th, 50th (median), and 75th percentile time frames for completing the steps. We also calculated the percentage of properties for which servicers or FHA contractors met their time requirements for each step. We reviewed FHA’s procedures for monitoring the performance of compliance and maintenance contractors for conveyed properties. We also reviewed examples of contractor quality control plans and FHA quality control reports and scorecards used to assess the contractors’ compliance with minimum time frames and other requirements. Additionally, we interviewed FHA officials about the contractors’ compliance with their respective time requirements and what steps FHA took, if any, to address any noncompliance. We assessed the reliability of data from the Single Family Insurance System–Claims Subsystem and the asset disposition system by reviewing FHA documentation about the data systems and data elements. We interviewed FHA staff and contractors knowledgeable about the data to discuss interpretations of data fields and trends we observed in our analysis. We also conducted electronic testing, including checks for outliers, missing data fields, and erroneous values. We excluded from each analysis properties with missing or erroneous information in the applicable data fields. We also excluded from each analysis properties for which the applicable data fields were five absolute deviations from the median (which we consider to be outliers). In addition, we excluded certain properties conveyed in calendar years 2010–2017 that had conveyance dates that were out of sequence. For example, we excluded properties for which the date a servicer obtained possession and good and marketable title occurred after the date the servicer conveyed the property to FHA. The number of properties we excluded in any analysis using these methods represents no more than 3.2 percent of properties conveyed from July 2010 through December 2017, which we consider to be insignificant when compared to the remaining properties included in the analysis. After taking these steps, we believe that the data were sufficiently reliable for purposes of characterizing the overall length of FHA property conveyances and compliance with key time requirements. To determine what changes FHA made to the conveyance process in recent years, we reviewed relevant FHA regulations, policies, and procedures issued in 2010 or later, including FHA’s February 2016 mortgagee letter (a written instruction to FHA-approved lenders) on conveyances. We compared the requirements and property preservation and protection allowance amounts in the mortgagee letter to those in the prior mortgagee letter. We also reviewed FHA documentation on changes to the asset disposition system, FHA’s data system for conveyed properties, and on FHA’s preconveyance inspection pilot program that began in 2017. We interviewed FHA officials on the reasons for the recent changes and on the extent to which they reviewed any analogous requirements and property preservation and protection allowances of other mortgage entities (including Fannie Mae, Freddie Mac, and the Department of Veterans Affairs) when making the updates. To supplement our review of FHA’s recent changes to property preservation and protection allowances, we used the asset disposition system data to analyze changes in the frequency and number of servicer overallowable requests since the 2016 mortgagee letter went into effect. To examine what, if any, challenges exist with the conveyance process, we randomly selected a nongeneralizable sample of 20 large- and medium-sized, bank and nonbank servicers of FHA-insured mortgages. We defined large-sized servicers as those with 100,000 or more active FHA-insured mortgages as of December 31, 2017, and medium-sized servicers as those with 10,000–99,999 active FHA-insured mortgages as of that date. These servicers accounted for more than one-third of active FHA-insured mortgages as of December 31, 2017. We conducted semistructured interviews with the servicers about their experience with FHA property conveyances, including the sufficiency of FHA’s policies and procedures, time lines, and allowance amounts and any challenges they experienced with the process. We also discussed the extent to which the 2016 mortgagee letter assisted or hindered their conveyance efforts. In addition, we spoke with two national industry groups representing mortgage servicers about recent changes and any challenges their members experienced with the conveyance process. We reviewed FHA’s requirements for servicers and contractors on conveyed properties. In cases in which servicers stated that FHA’s policies and procedures on particular conveyance requirements was insufficient or unclear, we examined the 2016 mortgagee letter, HUD’s single-family housing policy handbook, and frequently asked questions on HUD’s website—to determine whether it addressed the topics and was sufficiently thorough to be applied to properties with different circumstances. We assessed whether the policies and procedures were consistent with federal internal control standards for external communication. In particular, we examined whether the policies and procedures communicated necessary quality information to achieve program objectives and whether FHA had evaluated appropriate methods to communicate them. Where applicable, we also compared FHA’s policies and procedures to features of Fannie Mae’s guide for servicers on how to preserve and protect vacant properties. We also assessed FHA’s policies and procedures on reconveyances and alternatives to reconveyance against federal internal control standards for designing control activities. To review the preconveyance inspection pilot that FHA began in 2017 and any challenges with the pilot, we interviewed the three participating servicers about FHA’s implementation of the pilot and the extent to which preconveyance inspections reduced the likelihood of reconveyance or addressed other challenges. We spoke with FHA National Servicing Center officials about their monitoring of pilot outcomes and their plans for assessing results. We assessed FHA’s planning and evaluation efforts against key components of evaluation design from GAO’s guide for designing evaluations. Furthermore, we interviewed a number of individuals and entities about challenges they experienced in implementing their property conveyance responsibilities, the sufficiency of FHA’s policies and procedures, and methods for assessing contractor performance. These included FHA headquarters and National Servicing Center officials with responsibilities for aspects of the conveyance process; FHA’s compliance contractor; and Real Estate-Owned Division officials, the largest maintenance contractor, and staff responsible for overseeing the maintenance contractors at each of FHA’s four homeownership centers. Finally, we visited eight recently conveyed or reconveyed properties in the Baltimore, Maryland, and Atlanta, Georgia, areas to observe property conditions, learn about the maintenance contractors’ property inspection processes, and understand challenges in documenting and addressing condition issues. We chose these locations to provide some geographic dispersion and coverage of different FHA homeownership centers. The properties were selected by Philadelphia and Atlanta homeownership center staff based on our request to visit a mix of recently conveyed and reconveyed properties in metropolitan areas and time periods that we chose. As a result, the conditions we observed are illustrative rather than representative of all conveyed properties. We conducted this performance audit from September 2017 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Steve Westley (Assistant Director); Melissa Kornblau (Analyst in Charge); Rachel Batkins; William Chatlos; Emily Flores; John McGrail; Samuel Portnow; Barbara Roesmann; Tovah Rom; and Jena Sinkfield made key contributions to this report.", "summary": "FHA insures hundreds of thousands of single-family home mortgages annually. When an FHA borrower defaults, the mortgage servicer in many cases forecloses, obtains title to the property, and conveys ownership to FHA. FHA inspects the property, acquires it if it complies with condition standards and title requirements, and lists the property for sale. FHA may reconvey noncompliant properties to servicers. During conveyance, homes may sit vacant for months and can deteriorate, contributing to neighborhood blight. Senate Report 114-243 included a provision for GAO to review FHA's effectiveness and efficiency in reaching determinations of conveyable condition. This report discusses (1) timelines for FHA property conveyances in 2010–2017 and whether servicers and FHA met time requirements, and (2) changes FHA has made to the conveyance process in recent years and any ongoing process challenges. GAO analyzed FHA data on properties conveyed in 2010–2017, reviewed FHA's policies and procedures, and interviewed 20 randomly selected mortgage servicers accounting for more than one-third of active FHA mortgages. From July 2010 through December 2017, the process for conveying foreclosed properties to the Federal Housing Administration (FHA) took a median of 70 days. The conveyance process—which GAO measured from a mortgage servicer's obtaining title to and possession of the property to FHA's marketing of the property—involves servicers making repairs, transferring ownership, and filing a mortgage insurance claim, and FHA inspecting the property. FHA attributes the length of time to complete the process partly to foreclosure processing delays that left properties vulnerable to damage and vandalism, which can increase the time servicers need to bring properties into conveyance condition. Property damage also may increase the likelihood that FHA will reconvey a property (transfer it to the servicer) for not complying with condition standards, further extending the conveyance process. For about 55 percent of properties conveyed in July 2010–December 2017, servicers exceeded the required time to obtain title and possession of a foreclosed property and convey it to FHA. For 2017 alone, the corresponding figure was 72 percent. As a result, servicers were not eligible to be reimbursed for all repairs and interest expenses for those properties when filing insurance claims with FHA. In recent years, FHA changed aspects of its conveyance process to help address some of the execution challenges the agency and servicers have faced. For example, in 2016, FHA enhanced its data system for conveyed properties to reduce manual administrative processing. FHA also began a pilot program in 2017 to decrease the number of properties FHA reconveys by inspecting properties before conveyance. However, GAO found shortcomings in FHA policies, procedures, and assessment efforts that are inconsistent with federal evaluation criteria and internal control standards, as follows: FHA's policies and procedures lack detail that could help servicers and contractors determine if a property is in compliance, and the agency has not examined alternative methods of communicating this information. Fifteen of the 20 servicers GAO interviewed said existing policies, procedures, and communications often were not clear or specific enough to address property conditions or repair decisions they encountered. FHA also relies on brief written policies to explain standards and makes limited or no use of other methods, such as photographs or industry-wide calls. FHA has not provided written direction on when to use alternatives to reconveyance—such as agreements under which servicers make repairs or repay FHA for any repair costs after conveyance—for properties not meeting condition standards. In the absence of such direction, FHA may not be addressing these properties in the most consistent or effective manner. FHA has not developed a plan to assess the outcome of its inspection pilot. Without rigorous assessment, FHA risks making decisions about the future of the pilot based on inaccurate or incomplete information. Addressing these shortcomings could help improve the efficiency and effectiveness of FHA's property conveyance process. GAO recommends that FHA (1) enhance the content and communication of policies and procedures on conveyance condition, (2) provide written direction on alternatives to reconveyance, and (3) develop a plan to assess a pilot program. FHA agreed with the second and third recommendations and did not agree or disagree with the first.", "document_type": "gao"}
{"report": "Congress provided DOD the authority to use other transactions in the late 1980s and has expanded the authority over time. In 1989, Congress provided the Defense Advanced Research Projects Agency the authority to temporarily use other transactions for research projects. These transactions were intended to spur research and development that would benefit both commercial companies and the government. In 1991, Congress allowed the military departments to use the authority as well and made the authority permanent. In 1993, Congress provided the Defense Advanced Research Projects Agency the authority to award other transactions for prototype projects. Congress expanded the authority to the military departments and other defense agencies in 1996. In 2001, Congress allowed DOD to provide for follow-on production in prototype other transactions. Further, DOD could award follow-on production other transactions, without using competitive procedures, to the participants of a successfully completed, competitively awarded prototype project, provided several conditions were met. Congress codified DOD’s other transaction authority for prototype and follow-on production other transactions at section 2371b of title 10, U.S. Code, in 2015. Congress did not define a prototype project in statute. DOD’s November 2018 Other Transactions Guide, however, defined a prototype project as addressing a proof of concept, model, novel application of commercial technologies for defense purposes, or a process including a business process, among other types. Under section 2371b, DOD can use other transactions for prototype projects that are directly relevant to enhancing the mission effectiveness of military personnel and the supporting platforms, systems, components, or materials proposed to be acquired or developed by DOD, or to improve those in use by the armed forces. In addition, Congress has required DOD to meet at least one of the following four conditions to use a prototype other transaction: 1. There is at least one non-traditional defense contractor or non-profit research institution participating to a significant extent in the prototype project. 2. All significant non-government participants in the transaction are small businesses or non-traditional defense contractors. 3. At least one-third of the total cost of the prototype project is to be paid out of funds provided by sources other than the federal government. 4. The senior procurement executive determines in writing that exceptional circumstances justify the use of a transaction that provides for innovative business arrangements or structures that would not be feasible or appropriate under a contract, or would provide an opportunity to expand the defense supply base in a manner that would not be practical or feasible under a contract. Section 2371b of title 10, U.S. Code, does not limit DOD to awarding prototype other transactions to non-traditional companies. DOD could award traditional defense contractors a prototype other transaction under the first, third, and fourth conditions listed above. It could also award prototype other transactions to consortiums, which may be comprised of non-traditional companies, traditional defense contractors, and others such as non-profit research institutions. These consortiums may be administratively managed by a single firm. Consortium management firms in general provide administrative support to consortium members, such as distributing requests for proposals, holding proposal writing workshops, negotiating the general terms and conditions of prototype projects with consortium members, and making payments to consortium members. For example, Advanced Technology International, a consortium management firm, reported that it represented 298 members in the Countering Weapons of Mass Destruction consortium as of September 2019, according to its website. The website also states that 87 percent of the consortium’s members were non-traditional companies. Contracting offices generally designate a subset of their contracting officers to award other transactions, including prototype other transactions. In this capacity, these individuals are referred to as agreements officers. According to senior contracting officials at offices we included in this review, agreements officers are typically more experienced contracting officers that have demonstrated the ability to exercise business acumen and judgement in a less structured contracting environment and have a strong working knowledge of intellectual property. All of the contracting offices we included in this review required agreements officers to complete training courses offered by their office or the Defense Acquisition University related to the award of other transactions. The Director, Defense Procurement and Acquisition Policy, issued an Other Transaction Guide for Prototype Projects in January 2017 that included general information about planning, evaluating, and awarding prototype other transactions. The Office of the Under Secretary of Defense for Acquisition and Sustainment issued updated guidance in November 2018 that covered all types of other transactions, including case studies and lessons learned to help agreements officers when awarding other transactions. For example, the November 2018 guide states the following: An agreements officer should consider whether a company is supplying a new key technology, providing a material increase in the performance of a product, or making some other contribution when determining if a non-traditional company or non-profit research institution will be participating to a significant extent. DOD components should not establish predetermined percentages of total costs or labor hours to determine significant participation. As such, agreements officers can use their own discretion when using cost and labor hour information to determine if a non-traditional company is playing a significant role on a prototype other transaction. The Competition in Contracting Act does not apply to other transactions, but competition and fairness are still important considerations and agencies may determine how competition will be structured. Other transactions may take longer to award than FAR-based contracts due to factors such as drafting and negotiating all the terms and conditions in an other transaction. Fiscal law requirements are applicable to other transactions and the decision to use an other transaction does not expand or restrict available appropriations. Therefore, multiple funding types, including research, development, test, and evaluation; procurement; and operations and maintenance appropriations may be appropriate depending on the intent and stage of the prototype. Modifications of ongoing transaction projects are fairly common and other transactions should address how changes will be handled. DOD significantly increased its use of prototype other transactions from fiscal years 2016 through 2018, both in terms of the number of prototype other transactions awarded and the amount obligated on prototype other transactions. Most prototype other transactions involved at least one non- traditional company that was participating to a significant extent. About 71 percent of the obligations were awarded to three consortiums and two traditional defense contractors. DOD is currently preparing a report to Congress on its use of the other transaction authority and working to address certain limitations in its data collection efforts, including improving data related to consortiums. FPDS-NG data showed that DOD obligated a total of $7.2 billion on prototype other transactions from fiscal years 2016 through 2018. The total number of new prototype other transactions increased five-fold from 34 to 173 during this time frame. According to a Defense Pricing and Contracting official, DOD is encouraging the use of these transactions as a way to acquire innovative technology from non-traditional companies that it could not typically access. There were also modifications and orders related to these prototype other transactions and those awarded in prior years that resulted in a change in obligations, such as providing funding to members of consortiums to carry out new projects. As discussed in more detail later in the report, FPDS-NG did not identify the number of projects carried out by consortiums. Overall, obligations made on prototype other transactions nearly tripled from $1.4 billion to $3.7 billion (see fig. 1). The Army, Defense Advanced Research Projects Agency, and the Air Force accounted for 97 percent of all new awards and actions that resulted in a change in obligations from fiscal years 2016 through 2018. They also accounted for 97 percent of the total amount obligated on these new awards and actions (see table 1). Appendix I shows more detailed information. The Army was responsible for over two-thirds of the new awards and actions made from fiscal years 2016 through 2018—valued at nearly $5.3 billion—but some of these were awarded on behalf of other DOD components, such as the Air Force, Navy, and Defense Innovation Unit. Officials from the Air Force Research Laboratory and Navy’s Office of Naval Research told us that they relied on the Army to award prototype other transactions on their behalf because, in some cases, the Army had previously awarded a transaction, such as to a consortium, which they could leverage to meet their own components’ needs. The Army awarded prototype other transactions on behalf of the Defense Innovation Unit, as it did not have the authority to award prototype other transactions, until November 2018. DOD reported that at least one non-traditional company or non-profit research institution participated to a significant extent—one of four statutory conditions that Congress established for the appropriate use of a prototype other transaction—in 88 percent of the 1,250 new awards and actions made from fiscal years 2016 through 2018 (see fig. 2). We found that from fiscal years 2016 through 2018, the top five recipients by obligations were either consortiums or traditional defense contractors. Awards to these five recipients accounted for $5.1 billion or 71 percent of the obligations on new awards and actions during this time frame (see table 2). Three of the top five recipients were consortium management firms— Advanced Technology International, Consortium Management Group, and National Center for Manufacturing Sciences. In general, a consortium management firm does not complete the prototype, but rather helps manage consortium members. The other two companies among the top five were traditional defense contractors—Lockheed Martin and Aerojet Rocketdyne. As stated earlier, according to statute, traditional defense contractors can be awarded prototype other transactions under three possible conditions: by partnering with at least one non-traditional defense contractor or non- profit research institution participating to a significant extent, paying at least one-third of the total project cost, or having the government agency’s senior procurement executive determine in writing that exceptional circumstances justify the use of a prototype other transaction. Paying one-third of the project’s costs is an example of cost-sharing. For the eight new prototype other transactions these two companies were awarded from fiscal years 2016 through 2018, four involved non- traditional companies or non-profit research institutions that participated to a significant extent and the remaining four involved cost-sharing arrangements. In the one prototype other transaction awarded to Lockheed Martin that we reviewed, the Army entered into the transaction, currently valued at $17.5 million, to prototype two removable sensors for unmanned aircraft. According to the Army agreements officer, Lockheed Martin was awarded an other transaction instead of a FAR-based contract because Lockheed Martin needed to collaborate with four other companies that were awarded prototype other transactions. The Army agreements officer told us he concluded that it would have been difficult for all the contractors to collaborate if some were operating under prototype other transactions and Lockheed Martin was subject to the requirements of a FAR-based contract. Since Lockheed Martin did not have a non-traditional company participating to a significant extent on the prototype other transaction it was awarded, the company was required to pay at least one-third of the cost of the project to comply with statutory requirements. Lockheed Martin used a combination of in-kind contributions, such as test articles, and independent research and development funds for its share of total project costs. In response to congressional direction, DOD expects to submit a report in November 2019 on its use of the prototype other transaction authority in fiscal year 2018. This report will include, among other elements, data on new prototype other transactions awarded in fiscal year 2018; actions made in fiscal year 2018 on these prototype other transactions and ones awarded in prior fiscal years; detailed information on the DOD organizations using the authority; the purpose and status of projects; and those prototype other transactions that led to a follow-on production other transaction. This report, which was originally due to be delivered in December 2018 was delayed, according to DOD, as FPDS-NG was not configured to capture all the data needed to prepare the report. DOD’s Defense Pricing and Contracting is collecting the required data directly from DOD components. DOD and military component officials whom we interviewed acknowledged limitations in the FPDS-NG data on prototype other transactions. DOD officials stated they have addressed some of these limitations and officials are discussing how to improve the information collected in the future. For example, as noted above, we found four other transaction awards for the production of products and four procurements for experimental purposes identified as prototype other transactions in FPDS-NG. According to Defense Pricing and Contracting officials, until June 2019, DOD did not have the ability to differentiate between prototype and production other transactions in FPDS-NG; therefore, both prototype and production other transactions were reported as prototype other transactions. The General Services Administration—the organization that is responsible for managing and updating FPDS-NG— added an option in FPDS-NG that would allow users to identify other transactions as either for a prototype or production, as appropriate, beginning in June 2019. DOD officials stated that they are discussing the best approach for consistently identifying procurements for experimental purposes in FPDS-NG. This could include adding an option to FPDS-NG for users to identify these procurements or including unique letters in the award number. DOD officials are also working to address FPDS-NG data limitations related to consortiums that reduce DOD’s management insight on the use and award of prototype other transactions. Army contracting officials noted that FPDS-NG tracks information about the base prototype other transaction that is awarded to a consortium, but does not track data about each project conducted through the consortium, such as whether a non- traditional company is participating on each project. The Army Deputy Assistant Secretary for Procurement issued a policy, effective October 1, 2019, that changes how the Army reports other transactions into FPDS- NG to improve data on projects conducted by consortium members. The policy, however, does not discuss how it will track non-traditional company participation. Further, FPDS-NG does not track the extent of competition among consortium members. DOD officials stated that, while FPDS-NG data shows DOD competitively awarded 48 percent of all prototype other transaction obligations for fiscal years 2016 through 2018, they believed this figure understates the degree of competition actually achieved. These issues are illustrated in the following examples. FPDS-NG shows that Advanced Technology International was awarded a prototype other transaction in fiscal year 2018 with a ceiling of $10 billion for the Countering Weapons of Mass Destruction Consortium. FPDS-NG also shows that, as of March 2019, the Army had obligated $116 million as modifications under the base transaction, and, according to the Army Contracting Command-New Jersey agreements officer, were for consortium members to carry out various prototype projects. FPDS-NG did not identify the number of projects that are being carried out by the consortium or which consortium members were participating on the projects. The Army Contracting Command-New Jersey agreements officer that awarded this prototype other transaction, however, maintained her own records to help her manage and oversee the consortium’s efforts. According to this agreements officer, as of March 2019, all 44 projects carried out by consortium members involved non-traditional companies—37 prototype projects were carried out by non-traditional companies that served as prime contractors and seven prototype projects were carried out by traditional defense contractors with subcontractors that were non-traditional companies that participated to a significant extent. FPDS-NG shows that the base contract, as well as all the modifications, for a different prototype other transaction the Army Contracting Command-New Jersey awarded to Advanced Technology International was non-competitively awarded. These modifications accounted for 69 percent or $2.6 billion of the non-competitive obligations DOD made through new awards and actions from fiscal years 2016 through 2018. However, according to command contracting officials, during this time frame, all the obligations on modifications were associated with projects that were competitively awarded among consortium members. DOD senior contracting officials stated that FPDS-NG tracks only whether the base transaction was competitively awarded and that modifications made to transactions awarded to consortiums automatically retain the same competitive or non-competitive designation as the base contract. Agreements officers used multiple methods to determine whether and to what extent non-traditional companies were participating on the prototype other transactions we reviewed. We found that agreements officers first determined whether a company was traditional or non-traditional by reviewing government databases and consulting with subject matter experts, among other approaches; and then determined the extent to which a non-traditional company was expected to participate on a prototype other transaction. In accordance with DOD’s November 2018 Other Transactions Guide, agreements officers determined whether non-traditional companies participated on nine of the 11 transactions in our non-generalizable sample that met this statutory condition. For the other two transactions, one involved a cost sharing arrangement between the Army and a traditional defense company; therefore, the agreements officer did not have to make this determination. The other instance involved the award of an other transaction to a consortium. In this instance, the consortium and agreements officer set out to negotiate general terms and conditions that would flow down to subsequent prototype projects carried out by consortium members. The agreements officer plans to make the determination about whether a non-traditional company is participating or meeting another statutory condition on a case-by-case basis for each subsequent prototype project that is funded. Agreements officers typically used more than one method to determine if a company was a non-traditional company for the nine transactions in our sample. For example, agreements officers considered, in varying combinations, a contractor’s assertion, data from government information systems, subject matter expert input, or market research when making the determination (see table 3). As reflected in table 3, in none of the cases we reviewed did an agreements officer rely solely on the contractor’s assertion that a company was a non-traditional company. The following two examples illustrate the type of actions agreements officers took to determine that a contractor was a non-traditional company: In a $19.3 million prototype other transaction awarded by Washington Headquarters Services for a large autonomous ship, the prime contractor stated that it and a subcontractor were non-traditional companies. This was because neither had performed work on a DOD contract or subcontract that was subject to full cost accounting standards in the preceding year, which is one of the statutory criteria to be considered a non-traditional company. To confirm that the prime contractor and the subcontractor were non-traditional companies, the agreements officer checked the System for Award Management, leveraged market research, and relied on input from technical officials from the Navy’s Surface Warfare Directorate and Unmanned Maritime Systems Program Office with industry knowledge about contractors. In a $10 million Army prototype other transaction for an artificial intelligence war-gaming capability, the contractor that was to perform all the work stated that it met the statutory definition of a non- traditional company. To verify its status, the agreements officer determined that the contractor did not have a record in the System for Award Management, which would ordinarily be required if the company had previously done business with the federal government. The agreements officer also conducted market research to verify that the company was not a DOD subcontractor that was subject to cost accounting standards in the preceding year. After determining whether a company was a non-traditional company, agreements officers then used various methods to determine whether one or more non-traditional companies would play a significant role on the nine prototype other transactions before they were awarded. These methods included assessing whether the contractor was performing all the work on the prototype, evaluating whether the services or technologies provided by the non-traditional companies were critical, using input from subject matter experts, or considering the percentage of total costs or labor hours performed by the contractor (see table 4). As shown in table 4, the proportion of award values received by non- traditional companies on the prototype other transactions, which ranged from 16 to 100 percent, did not always indicate the significance of the non-traditional companies’ contributions. Consistent with DOD guidance, agreements officers took various factors into account when determining whether a non-traditional company is participating to a significant extent. In the transaction in which the non-traditional company was expected to receive about 16 percent of the total award value, the agreements officer considered the engineering work performed by a non-traditional company—which was a subcontractor on the effort—to be critical to developing the data port for a robotic satellite servicing vehicle. In another example, the agreements officer and Navy subject matter experts determined a non-traditional company that would receive less than 25 percent of a transaction’s overall award value was participating to a significant extent since it was providing the vessel and crew necessary to execute testing of the large autonomous ship that was being prototyped. Agreements officers followed their commands’ established review processes, which involved higher level reviews by senior officials and legal reviews, in nine of the 11 transactions in our sample. Agreements officers did not obtain higher level reviews in the two remaining transactions, but senior contracting officials plan to take action to address the issues we identified. Award times for these transactions ranged from 45 to 370 days. Each of the DOD contracting offices we assessed established policies for reviewing prototype other transactions before award, though the processes differed. For example, the contracting offices we evaluated generally required other transactions to be reviewed by an official at least one level above the agreements officer and to be subject to a legal review. Some contracting offices required additional reviews at higher dollar thresholds. In addition, the officials responsible for reviewing transactions within a contracting office sometimes differed based on the expected dollar value of the transaction. For example, at the Army Contracting Command-New Jersey, the Branch Chief can review only transactions valued at less than $10 million. Transactions exceeding that amount would be reviewed by a higher ranking official, such as the Center Director. According to senior contracting officials, the review process is intended to ensure that prototype other transactions meet the statutory requirements for use of the authority before award. The review process also facilitates component efforts to obtain the “best deal” for the government based on decisions by the agreements officers, senior contracting and program officials, and legal advisors about factors such as whether to compete the transaction and whether to obtain technical data rights for the prototype. Table 5 provides more specific information on the review process required by the Air Force Research Laboratory, Army Contracting Command-New Jersey, Defense Advanced Research Projects Agency, and Washington Headquarters Services. Agreements officers in our review documented aspects of their decision making prior to awarding a transaction. For example, agreements officers generally documented the condition under section 2371b of title 10, U.S. Code, that was met to use a prototype other transaction, and some documented the negotiation process with the commercial companies regarding terms and conditions of the transactions. We also found that the Air Force Research Laboratory, Defense Advanced Research Projects Agency, and Washington Headquarters Services required agreements officers to document acquisition planning for prototype projects to some extent. Senior contracting officials from these organizations stated that acquisition planning helps programs manage risks and provides direction to agreements officers who are new to awarding other transactions. For an Air Force other transaction we reviewed, documentation included the purpose and objectives for the prototyping project, the anticipated cost and type of funding needed for the project, and the transaction award schedule. We found the Army agreements officer who awarded the prototype other transaction to the Countering Weapons of Mass Destruction Consortium developed an acquisition planning document, even though policy did not require her to do so. The agreements officer said she did this because the transaction had a $10 billion ceiling and she considered this a best practice. Legal counsel, several senior level contracting officials, and program officials reviewed the acquisition planning document before the agreements officer awarded the transaction. Defense Advanced Research Projects Agency also required agreements officers to document the reason for non-competitive awards in a memorandum. We previously reported that competition promotes the efficient use of taxpayer resources and establishes accountability for results by helping to drive down prices and motivate better contractor performance. We found that an Air Force Research Laboratory agreements officer also documented the reasons why a $1.2 million prototype other transaction to develop a manufacturing process to reduce a missile engine’s production costs was awarded non-competitively, even though policy did not require such documentation. The agreements officer said the reason for the non-competitive award was that a non-traditional company is the manufacturer of the engine and has the experience to create cost-saving innovations to its manufacturing process. The agreements officer stated legal counsel reviewed this documentation prior to awarding the other transaction and that management was aware of the non-competitive status of this transaction during acquisition planning. Contracting officials from the Army Contracting Command-New Jersey stated that, consistent with statute, they did not require acquisition planning or non-competitive award documentation because they wanted to maintain few requirements to award prototype other transactions. While senior contracting officials told us that they were able to streamline the review process for other transactions compared to the actions typically required before awarding other procurement contracts, they cautioned that the time needed to award a prototype other transaction can vary significantly. We found that, for the 11 prototype other transactions we reviewed, award times—which we defined as the time a contracting office released a solicitation until the time the government awarded the other transaction—ranged from 45 to 370 days. By way of reference, we recently reported that the time from solicitation issuance until the time the government awarded 129 weapon systems-related procurement contracts ranged from less than a month to over 4 years, with a median of about 9 months. For the 11 prototype other transactions we reviewed, contracting officials noted that the times varied due to factors such as prior knowledge about the contractor and the complexity of the prototype project. An Air Force prototype other transaction for improving missile engine manufacturing processes was awarded in 45 days because the agreements officer said she had extensive knowledge about the capabilities of the contractor prior to awarding this transaction and was, therefore, able to plan for and develop other transaction documentation early. The agreements officer told us that she had knowledge of this company because it had previously been a subcontractor on a technology demonstration. Conversely, the Army took 370 days to award a prototype other transaction because the government needed time to assess what contracting instrument to use to ensure multiple contractors collaborated to build an autonomous airborne network of sensors. According to the agreements officer, the government needed time to research the effects of several possible teaming arrangements, including creating a new consortium, using an existing consortium, awarding a FAR-based contract, placing all of the contractors on a single other transaction, or awarding individual other transactions to each contractor. In nine of the 11 prototype other transactions we reviewed, agreements officers followed their contracting offices’ policies to have prototype other transactions reviewed before awarding the other transactions. In a $4.6 million Army prototype other transaction to develop a capability to modernize legacy hardware systems, the appropriate senior-level contracting official reviewed the transaction, such as by checking terms and conditions and ensuring that the contract file was complete. Legal counsel also reviewed the transaction prior to award, as required. In a $6.1 million Defense Advanced Research Projects Agency prototype other transaction, the agreements officer consulted the Deputy Director about this transaction before negotiations and a contracting official one level above the agreements officer reviewed the transaction, as the agency’s policy required. The agreements officer also consulted legal counsel, an optional policy action, to draft and negotiate a clause that would waive specific topics of the commercial rights license that did not apply to the government. The agreements officer stated that by working with legal counsel to develop a clause, he was able to meet the program’s objective to prototype a capability to emulate and validate microchip designs and accommodate the contractor’s desire to use its commercial license. For the remaining two prototype other transactions, we found, and contracting officials agreed, that agreements officers did not meet policy requirements for obtaining higher level review before award. In the first case, a Defense Advanced Research Projects Agency agreements officer did not have a higher level official review a $7.8 million prototype other transaction before it was awarded. Agency policy required the agreements officer to consult with the Deputy Director of the Contract Management Office about the negotiation strategy and discuss any issues that arose during negotiations. In addition, policy required the agreements officer to have a contracting official one level above the agreements officer review the prototype other transaction before award, regardless of dollar value. The agreements officer told us that he did not consult with the Deputy Director or obtain the required review because he thought the terms and conditions were straightforward and the dollar value was too low to require a review by an official above him. Senior-level Defense Advanced Research Projects Agency contracting officials told us they were not aware that this prototype other transaction was awarded without the required consultation and review until we brought this to their attention. According to these officials, internal controls were in place that should have prevented the award of prototype other transactions without the required consultation and review—such as making current policy documents readily accessible to agreements officers, communicating policy changes to agreements officers, and using a data system to track the development of other transactions prior to award. These officials stated that they plan to check compliance with the required pre-award consultation and review during their next internal file review of awarded other transactions that will be completed in fiscal year 2020. If they find instances of noncompliance, officials stated that the agency will take corrective actions, such as providing additional training for agreements officers. They also stated that they subsequently reviewed the $7.8 million prototype other transaction and determined that no changes needed to be made to the other transaction in this instance. In the second case, the Army Contracting Command-New Jersey agreements officer—who was also the Center Director—had his Branch Chief review a $10 million prototype other transaction prior to award. Command policy, however, generally requires the Center Director to review prototype other transactions valued at or greater than $10 million. The Center Director stated that he did not serve as the reviewer on this transaction because he would have been reviewing his own work. Army Contracting Command-New Jersey officials stated that the management review should have been conducted by another Center Director or a higher contracting official, but noted that this was an atypical situation not addressed in the command’s policies. As such, Army Contracting Command-New Jersey officials plan to revise their management review policy by fall 2019 to address who should be responsible for conducting a higher level management review when someone who is designated to conduct the management review serves as the agreements officer for the transaction. The officials stated that they reexamined the prototype other transaction and found that there were no issues with the terms and conditions and, therefore, no changes needed to be made to the transaction. Based on the stated intent of Defense Advanced Research Projects Agency and Army Contracting Command-New Jersey contracting officials to address issues we identified in our review, we are not making recommendations at this time but will monitor their actions to address the issues. We provided a draft of this product to DOD for comment. DOD provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Secretary of Defense; the Acting Principal Director of Defense Pricing and Contracting; the Secretaries of the Air Force and Army; and the Directors of the Defense Advanced Research Projects Agency and the Washington Headquarters Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Cheryl Andrew, Assistant Director; Carmen Yeung, Analyst-in-Charge; Pete Anderson; Lorraine Ettaro; Kurt Gurka; Daniel Glickstein; Julia Kennon; Roxanna Sun; and Leanne Violette made key contributions to this report.", "summary": "In 2015, Congress granted DOD permanent authority to use agreements known as other transactions to acquire prototype projects that, among other things, demonstrate whether technologies and products can be adapted for DOD's use. This contracting approach can help DOD attract companies that do not typically do business with DOD—such as commercial science and technology firms. This is because other transactions are not subject to certain federal contract laws and requirements. GAO was asked to review DOD's use of other transactions for prototype projects. For the purposes of this report, GAO refers to these instruments as prototype other transactions. This report examines, among other issues, (1) DOD's use of prototype other transactions for fiscal years 2016 through 2018 and (2) the extent to which agreements officers followed established review processes before awarding selected transactions. GAO analyzed Federal Procurement Data System-Next Generation data and examined relevant documents from a non-generalizable sample of 11 prototype other transactions. These transactions represented various dollar values from the four DOD components that had the highest obligations through prototype other transactions in fiscal year 2018. GAO also examined DOD and component policies and interviewed DOD officials. The Department of Defense (DOD) significantly increased its use of agreements known as other transactions for prototype projects from fiscal years 2016 through 2018 (see figure). DOD data shows that companies that typically did not do business with DOD participated to a significant extent on 88 percent of the transactions awarded during this time. The Army awarded the most transactions; some of which were on the behalf of other DOD components that wanted to leverage transactions the Army previously awarded to meet their own components' needs. In nine of the 11 prototype other transactions GAO reviewed, DOD contracting officials, known as agreements officers, followed their components' established review policies before awarding the transactions. Agreements officers did not obtain higher level reviews on the two remaining transactions. In both cases, agency officials reviewed the transactions after GAO brought these situations to their attention and found no issues with the awarded transactions. A Defense Advanced Research Projects Agency agreements officer did not have a higher level review of a $7.8 million transaction before it was awarded, as required. An Army Contracting Command-New Jersey Center Director served as the agreements officer on a $10 million transaction. The Director, who would typically review transactions of this value, had his Branch Chief review this transaction prior to award. The Defense Advanced Research Projects Agency also plans to complete an internal file review of awarded transactions to check compliance with its review policy in fiscal year 2020 and take corrective actions, if necessary. The Army Contracting Command-New Jersey plans to clarify who should review transactions in such situations. GAO is not making recommendations based on the stated intent of senior contracting officials to address these issues.", "document_type": "gao"}
{"report": "In response to the national public health and economic threats caused by COVID-19, four relief laws were enacted as of June 2020, including the CARES Act in March 2020. These laws have appropriated $2.6 trillion across the government. Six areas—the Paycheck Protection Program (PPP), Economic Stabilization and Assistance to Distressed Sectors, unemployment insurance, economic impact payments, the Public Health and Social Services Emergency Fund, and the Coronavirus Relief Fund— account for 86 percent of the appropriations (see fig. 1). Total federal spending data are not planned to be readily available until July 2020. It is unfortunate that the public will have waited more than 4 months since the enactment of the CARES Act for access to comprehensive obligation and expenditure information published by federal agencies about the programs funded through these relief laws. In the absence of comprehensive data, we collected obligation (government financial commitments) and expenditure data from agencies, to the extent practicable, as of May 31, 2020. For the six largest spending areas, we found that obligations totaled $1.3 trillion and expenditures totaled $643 billion. The majority of the difference was due to PPP, for which the Small Business Administration (SBA) obligated $521 billion. The amounts for loan guarantees will not be considered expenditures until the loans are forgiven, and, for those that are not forgiven, whether they are timely repaid. We also collected spending data on other programs affected by the federal response. For example, we found that the Department of Health and Human Services (HHS) has provided $7 billion in COVID-19 Medicaid funding related to a temporary increase in the Federal Medical Assistance Percentage (FMAP), the statutory formula the federal government uses to match states’ Medicaid spending. Based on the information we collected, government-wide spending totaled at least $677 billion, as of May 31, 2020. Given the sweeping and evolving public health and economic crisis, agencies from across the federal government were called on for immediate assistance, requiring an unprecedented level of dedication and agility among the federal workforce, including those serving on the front lines, to quickly establish services for those infected with the virus. Consistent with the urgency of responding to serious and widespread health issues and economic disruptions, agencies have given priority to moving swiftly where possible to distribute funds and implement new programs. In moving quickly, however, agencies made trade-offs, and they have made only limited progress so far in achieving transparency and accountability goals. In particular, we identified several challenges related to the federal response to the crisis, as well as recommendations to help address these challenges, including the following: Viral testing. The Centers for Disease Control and Prevention (CDC) reported incomplete and inconsistent data from state and jurisdictional health departments on the amount of viral testing occurring nationwide, making it more difficult to track and know the number of infections, mitigate their effects, and inform decisions on reopening communities. However, HHS issued guidance on June 4, 2020, to laboratories that identifies required data elements to collect and how to report them to CDC. Distribution of supplies. The nationwide need for critical supplies to respond to COVID-19 quickly exceeded the quantity of supplies contained in the Strategic National Stockpile, which is designed to supplement state and local supplies during public health emergencies. HHS has worked with the Federal Emergency Management Agency and the Department of Defense to increase the availability of supplies. However, concerns remain about the distribution, acquisition, and adequacy of supplies. Paycheck Protection Program. As of June 12, 2020, the Small Business Administration (SBA) had rapidly processed over $512 billion in 4.6 million guaranteed loans through private lenders to small businesses and other organizations adversely affected by COVID-19. As of May 31, 2020, SBA had expended about $2 billion in lender fees. SBA moved quickly to establish a new nationwide program, but the pace contributed to confusion and questions about the program and raised program integrity concerns. First, borrowers and lenders raised a number of questions about the program and eligibility criteria. To address these concerns, SBA and the Department of the Treasury (Treasury) issued a number of interim final rules and several versions of responses to frequently asked questions. However, questions and confusion remained. In June 2020, Congress passed, and the President signed into law, the Paycheck Protection Program Flexibility Act of 2020, which modified key program components. Second, to help quickly disburse funds, SBA allowed lenders to rely on borrower certifications to determine borrowers’ eligibility, raising the potential for fraud. We recommend that SBA develop and implement plans to identify and respond to risks in PPP to ensure program integrity, achieve program effectiveness, and address potential fraud. SBA neither agreed nor disagreed, but we believe implementing this recommendation is essential. Economic impact payments. The Internal Revenue Service (IRS) and Treasury moved quickly to disburse 160.4 million payments worth $269 billion. The agencies faced difficulties delivering payments to some individuals, and they face additional risks related to making improper payments to ineligible individuals, such as decedents, and fraud. For example, according to the Treasury Inspector General for Tax Administration, as of April 30, almost 1.1 million payments totaling nearly $1.4 billion had gone to decedents. We recommend that IRS consider cost-effective options for notifying ineligible recipients how to return payments. IRS agreed. Unemployment insurance (UI). States are implementing three new, federally funded UI programs created by the CARES Act and, as of May 2020, states had received 42 million UI claims. The Department of Labor (DOL) has taken steps to help states manage demand, but DOL is developing its approach to overseeing the new UI programs. We will be evaluating DOL’s monitoring efforts in future reports. Further, the UI program is generally intended to provide benefits to individuals who have lost their jobs; under PPP, employers are generally required to retain or rehire employees. According to DOL, no mechanism currently exists that could capture information in real time about UI claimants who may receive wages paid from PPP loan proceeds. We recommend that DOL, in consultation with SBA and Treasury, immediately provide help to state unemployment agencies that specifically addresses PPP loans and the risk of improper payments associated with these loans. DOL neither agreed nor disagreed with the recommendation, but noted it was planning forthcoming guidance. Contract obligations. Government-wide contract obligations in response to the COVID-19 pandemic totaled about $17 billion as of May 31, 2020. Goods procured include ventilators, and services contracted for include vaccine development. In addition, the CARES Act provided $1 billion for Defense Production Act purchases—$76 million of which was awarded to increase production of N95 respirators. The nation has made some progress in fighting COVID-19. However, the virus continues to pose risks to all Americans, and there is a concern of another wave of infection this fall. This could coincide with the seasonal influenza and hurricane season—further straining federal agencies responsible for responding to these events, as well as the health care system. Additionally, the nation’s initial response to COVID-19 highlights the challenges presented by an inherent fragmentation across responsibilities and capabilities in the federal biodefense response and health care system, which includes private, public (local, state, and federal governments), and nonprofit entities. Lessons from the initial response, as well as experience from past economic crises, disasters, and emergencies, highlight areas where continued attention and oversight are needed—with the focus on improving ongoing response efforts and preparing for potential additional waves of infection. These lessons include the following: Establishing clear goals and defining roles and responsibilities for the wide range of federal departments and other key players are critically important actions when preparing for pandemics and addressing an unforeseen emergency with a whole-of-government response. Providing clear, consistent communication in the midst of a national emergency—among all levels of government, with health care providers, and to the public—is key. Collecting and analyzing adequate and reliable data can inform decision-making and future preparedness—and allow for midcourse changes in response to early findings. Establishing transparency and accountability mechanisms early on provides greater safeguards and reasonable assurance that federal funds reach the intended people and are used for the intended purposes. Such mechanisms also help ensure program integrity and address fraud risks. While Congress has taken a number of actions to help address the pandemic, it continues to consider additional actions—both to improve ongoing efforts and implement new ones—and develop plans for congressional oversight of the nation’s response to and recovery from COVID-19. Congressional oversight plays a vital role in spurring agency progress on matters of national importance. On the basis of our work on past large-scale government responses to economic downturns and other crises, we recommend Congress consider taking legislative action in the following areas: Aviation-preparedness plan. In 2015, we recommended that the Department of Transportation (DOT) work with federal partners to develop a national aviation-preparedness plan for communicable disease outbreaks. DOT agreed, but as of May 2020, maintained that HHS and DHS should lead the effort. Thus far, no plan exists. We recommend that Congress take legislative action to require DOT to work with relevant agencies and stakeholders to develop a national aviation-preparedness plan to ensure safeguards are in place to limit the spread of communicable disease threats from abroad while at the same time minimizing any unnecessary interference with travel and trade. Full access to death data. The number of economic impact payments made to decedents highlights the importance of consistently using key safeguards in providing government assistance to individuals. IRS has access to the Social Security Administration’s full set of death records, but Treasury and its Bureau of the Fiscal Service, which distribute payments, do not. We recommend that Congress provide Treasury with access to the Social Security Administration’s full set of death records and require that Treasury consistently use it to help reduce similar types of improper payments. Medicaid. We previously found that during economic downturns—when Medicaid enrollment can rise and state economies weaken—the FMAP formula does not reflect current state economic conditions. We previously developed a formula that offers an option for providing temporary automatic, timely, and targeted assistance. We recommend that Congress use this formula for any future changes to the FMAP during the current or any future economic downturn to help ensure that the federal funding is targeted and timely. In the report we issued yesterday, we also describe potential indicators that could be used to monitor public health and economic recovery. The report also contains 41 enclosures that contain information about a wide range of federal programs or initiatives that were created, expanded, or funded in the COVID-19 relief laws. In conclusion, both Congress and the administration have acted to respond to public health and economic threats posed by COVID-19. Federal agencies and personnel acted quickly to stand up new programs or expand existing programs to, among other things, aid individuals, states, and businesses. But much work remains in protecting the health and well-being of Americans, both today and in the coming months, as the nation may be forced to simultaneously confront new waves of COVID-19 infections and seasonal influenza. In our initial report we make recommendations to help improve the effectiveness of the federal government’s ongoing response. Our ongoing oversight will continue to focus on improving the government’s response and recovery efforts as well as the nation’s preparedness for future outbreaks. Chairman Clyburn, Ranking Member Scalise, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information about this testimony, please contact A. Nicole Clowers, Managing Director, Health Care, at (202) 512-7114 or clowersa@gao.gov; Katherine Siggerud, Chief Operating Officer, at (202) 512-5600 or siggerudk@gao.gov; or Orice Williams Brown, Managing Director, Congressional Relations, at (202) 512-4400 or williamso@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The outbreak of COVID-19 quickly spread around the globe. As of June 17, 2020, the United States had over 2 million reported cases of COVID-19, and over 100,000 reported deaths, according to federal agencies. Parts of the nation have seen severely strained health care systems. The country has also experienced a significant and rapid downturn in the economy. Four relief laws, including the CARES Act, were enacted as of June 2020 to provide appropriations to address the public health and economic threats posed by COVID-19. In addition, the administration created the White House Coronavirus Task Force. The CARES Act includes a provision for GAO to report regularly on its ongoing monitoring and oversight efforts related to the COVID-19 pandemic. Yesterday, GAO issued its first report ( GAO-20-625 ). Like the report, this testimony focuses on key actions the federal government has taken to address the COVID-19 pandemic, GAO recommendations for improvement, and evolving lessons learned relevant to the nation’s response to pandemics, among other things. GAO reviewed data and documents from federal agencies about their activities and interviewed federal and state officials as well as industry representatives. GAO also reviewed available economic, health, and budgetary data. In response to the national public health and economic threats caused by COVID-19, four relief laws were enacted as of June 2020 that appropriated $2.6 trillion. This funding provided support to individuals, health care providers, businesses, and state and local government. While complete government-wide data will not be available until July, GAO determined that as of May 31, 2020, a total of about $1.2 trillion of assistance has been provided—close to $700 billion in expenditures and over $500 billion in loan guarantees. Consistent with the urgency of responding to widespread health issues and economic disruptions, agencies have worked hard to give priority to moving swiftly. In moving quickly, however, agencies made trade-offs; thus, only limited progress has been made so far in achieving transparency and accountability goals. GAO also identified challenges with the federal response to the crisis, including: Paycheck Protection Program (PPP). The Small Business Administration (SBA) moved quickly to establish a new nationwide program, but the pace contributed to confusion and questions and raised program integrity concerns. GAO recommends that SBA develop and implement plans to identify and respond to risks in PPP to better ensure program integrity. SBA neither agreed nor disagreed. Implementing GAO’s recommendation is essential. Economic impact payments. The Internal Revenue Service (IRS) and the Department of the Treasury (Treasury) faced difficulties delivering payments to some individuals, and made some payments to ineligible individuals, such as decedents. GAO recommends that IRS should consider cost-effective options for notifying ineligible recipients how to return payments. IRS agreed. Unemployment Insurance (UI). The program could have an unintentional overlap with benefits provided under PPP. GAO recommends that the Department of Labor (DOL) immediately provide help to state unemployment agencies that specifically addresses PPP loans, and the risk of improper payments associated with these loans. DOL is planning additional guidance. Aviation-preparedness plan. In 2015, GAO recommended that the Department of Transportation (DOT) work with federal partners to develop a national aviation-preparedness plan for communicable disease outbreaks. Thus far, no plan exists. GAO recommends Congress require DOT to produce a plan. Full access to death data. It is important to consistently use safeguards when providing assistance to individuals. The Treasury and Bureau of Fiscal Service do not have access to the Social Security Administration’s full set of death records. GAO recommends that the Congress give Treasury that access and require that Treasury consistently use it. Medicaid. GAO previously found that during economic downturns, the Federal Medical Assistance Percentage (FMAP) formula does not reflect current state economic conditions. GAO recommends that, during an economic downturn, Congress use a formula to provide timely and targeted assistance during economic downturns. In the report, GAO makes three new recommendations for agencies and three matters for consideration for Congress that address these issues.", "document_type": "gao"}
{"report": "A complete and accurate address list is the cornerstone of a successful census because it identifies all living quarters that are to receive a census questionnaire and serves as the control mechanism for following up with households that do not respond. If the address list is inaccurate, the Bureau may miss people, count them more than once, or include them in the wrong locations. As figure 1 shows, the Bureau’s approach to building complete and accurate address lists consists of a series of operations and are conducted throughout the decade. These operations include partnerships with the United States Postal Service (USPS) as well as tribal, state, and local governments. Other federal agencies, local planning organizations, the private sector, and nongovernmental entities may also contribute to these operations by providing the Bureau with updated address information as part of the Bureau’s continuous maintenance of the MAF. Like other information collected for the census, data collected through the LUCA program are subject to protections under title 13 of the U.S. Code. This means that data collected from the census cannot be used for non- statistical purposes or shared with unauthorized parties. The fundamental structure of LUCA has not changed since the Bureau first implemented it during the 2000 decennial cycle. The Bureau implements LUCA once every 10 years, near the end of the decennial census cycle. The Bureau invites governments to review the MAF for their respective areas. These governments must abide by Title 13 by protecting the address data from disclosure. Participating governments can then submit address updates for inclusion in the address list before enumeration. The Bureau can accept or reject these address updates, which participants then have the opportunity to appeal through an appeals office that OMB administers and that the Bureau funds (see figure 2). While the structure of the program is largely the same as in previous enumerations, the Bureau has made some changes to promote participation and reduce perceived participation barriers. For example, in 2010, the Bureau extended review timelines from 90 to 120 calendar days in response to LUCA participants’ feedback that they did not have enough resources to complete a sufficient review within the Bureau’s original time frame. Additionally, in the 2010 and 2020 cycles, the Bureau permitted state governments to participate in LUCA. State participation can provide coverage for local governments that may not have the resources to participate in the operation. Moreover, following the 2010 Census and in response to our prior recommendations, the Bureau assessed LUCA’s contribution to the final census population counts. Doing so improved the Bureau’s ability to determine how helpful LUCA was in gathering address information from participants across the nation. In September 2014, the Bureau decided that it would only need to verify addresses door to door in those areas it could not resolve with the aid of computer imagery and third-party data sources—what the Bureau calls in- office address canvassing. The Bureau used this method of address canvassing to reduce the costs of the labor-intensive “in-field address canvassing”, which cost about $450 million during the 2010 Census. As part of this effort, the Bureau planned to rely on in-office address canvassing as the primary method for validating address updates submitted during LUCA 2020. After the Bureau builds its address list, it must enumerate residents and follow up with them as necessary. Historically one of the most cost- intensive operations of the decennial census, the Bureau implements Non-response Follow-up after the self-response period so that it can (1) determine the occupancy status of individual nonresponsive housing units and (2) enumerate them. The Bureau allows up to six enumeration attempts for each nonresponsive housing unit or case. Any addresses added from LUCA submissions become eligible to be enumerated. Other sources of address data complement the Bureau’s data-collection efforts. For instance, according to experts, systematic collection of address data is now common at the state and local level, which allows many governments to readily provide address information to the Bureau. Since 2013, the Bureau has also received address updates throughout the decade from the USPS as well as from tribal, state, and local governments through its Geographic Support System (GSS) Program, increasing the frequency of address updates. Outside of the auspices of Title 13-protected census data, states and federal agencies have worked toward making a national address database publicly available. For example, the National Address Database, managed by the U.S. Department of Transportation as part of its work with the Bureau on federal address data issues, is an open source database which enables governments to view and submit their address information, including geospatial coordinates, for use across governmental agencies. In 2015, we reported on the National Address Database and Title 13, suggesting that Congress consider assessing statutory limitations within Title 13 on address data to foster progress toward such a national address database. However, there has been no legislative action at the time of this report. We found the Bureau’s implementation of LUCA 2020 largely followed its operational plan, including key milestones, as well as outreach and training objectives. Milestones. Through July 2019, the Bureau had met its milestones laid out in the LUCA 2020 Operational Plan as summarized in table 1, with two minor changes that provided participating governments additional time. First, in starting up the program, the Bureau was able to mail out advance notice packages a month earlier than specified in the 2020 Operational Plan to give potential participants additional time to assess the resources they would need to participate before receiving the formal invitation. Secondly, the Bureau extended the deadline for participating governments to submit address updates because natural disasters affected large regions of the country. Outreach and training. The Bureau performed outreach and training according to its LUCA 2020 Operational Plan. For example, the Bureau provided technical training workshops for government representatives, including training on address privacy laws. The Bureau implemented a streamlined participation process and received address updates from participating governments covering 96 percent of the estimated population of the country. Based on the Bureau’s post-2010 recommendations to improve LUCA for the 2020 Census, the Bureau did not ask participants to provide their full address lists (an option in 2010), but invited governments to review only the Bureau’s address list and offer updates. As shown in table 2, the Bureau saw little change in the number of governments invited to participate, registering to participate, and responding from the 2010 Census. The changes in participation options prevent precise analysis of participation beyond counting the number of governments that responded in some fashion. Moreover, in 2000, the Bureau implemented LUCA with two phases of data collection—one for rural addresses and one for urban, with some governments eligible to provide address updates during both phases. This differs from later decennials which condensed LUCA into a single phase. However, the Bureau’s measure for government participation excludes important information about the degree of that participation. For instance, only 8,389—or 21 percent of the nearly 40,000 tribal, state, and local governments—participated in LUCA 2020. According to Bureau officials and subject matter specialists we interviewed, address data are generally improved when both a state and another level of government participate in LUCA, even if the respective address updates cover some of the same addresses. According to the Bureau, such redundancies can help address the possibility of coverage gaps in any one government’s address updates. Governments at the more local level can apply their targeted, on-the-ground intelligence in cases where a state government may lack the resources and data to cover the entire population as part of its review of the MAF. As figure 3 shows, the degree of local participation in LUCA varied greatly across the country. For example, while state governments in New Mexico and Oklahoma participated, many counties and local governments (e.g., towns and cities) within those states did not. Moreover, states like Texas and South Dakota lacked any form of coverage in LUCA for many of their counties. In contrast, large parts of the west coast and the southeast benefitted from participation in LUCA by governments at multiple levels. The Bureau maintains participation data on government type and shows information similar to figure 3 on its external website. However, the percentage of the population covered by at least one form of government submission—identified by the Bureau as a primary performance measure—does not identify participation in this way, nor does it distinguish between governments representing a mix of urban and rural geographic areas that have participated. Bureau officials told us that state-centric participation was a focus for LUCA 2020 and that they encouraged local governments to coordinate with state governments on their address lists. The purpose of the legislation that prompted LUCA was to help ensure accuracy of the census by permitting various levels of government to review the Bureau’s address data. We have previously reported that a program’s measures should be consistent with the program’s initial (or updated) statutory mission. The Census Address List Improvement Act of 1994 called for the Bureau to solicit input on the address list from tribal and local governments as well as state governments. The Bureau may be able to find opportunities to obtain more complete coverage by tracking metrics related to the types of governments participating in LUCA and the degree to which tribal, state, and local governments are complementing each other’s address updates. In doing so, the Bureau could ensure that the LUCA program is contributing to accurate enumeration. Tracking these metrics would also give the Bureau valuable feedback on the success of its nationwide outreach and could increase the accuracy of the MAF. Fieldwork in other 2020 Census operations increased as a result of (1) LUCA’s original operational design, and (2) subsequent implementation decisions the Bureau made in response to receiving a larger number of address updates than it expected from participants. By design, the Bureau had planned not to review suggested changes occurring in geographic areas previously determined to be high growth, since the Bureau had already planned to canvass such areas for addresses door- to-door later. When the Bureau received more than two million more address updates than it had expected, it decided to review a sample of updates in areas not slated automatically for in-field review, passing even more work directly on to Non-Response Follow-Up (NRFU) at a potential cost of more than $25 million (in constant 2020 dollars). The Bureau received 11 million address updates proposed by participating governments, but about 5.1 million of these did not match addresses in the MAF— approximately two million more than expected. Bureau officials had not formalized any specific estimates but initially expected that participants would propose about 5 million address updates to the MAF, of which about 2.8 million would not match to the MAF and would need to be reviewed. As figure 4 shows, 2.5 million of the 5.1 million new address updates that LUCA participants submitted were in high-growth areas and passed directly on to in-field address canvassing. While the Bureau’s reengineered approach to address canvassing for 2020 substantially reduced fieldwork, this pass-through of additional workload represents a missed opportunity for the Bureau to further reduce costs for in-field address canvassing. With a planned cost of $185 million (in fiscal year 2019 costs) for 2020, in-field address canvassing is one of the most expensive census operations, according to the Bureau’s July 2019 lifecycle cost estimate. Another decision also led to increased workload. The Bureau streamlined its address validation process in response to the higher-than-anticipated number of address updates received. To manage this workload, the Bureau reviewed only a sample of address updates suggested by governments with 200 or more addresses otherwise eligible for review (861,000 total updates out of 2.5 million) that were in areas not already flagged for in-field address canvassing. As a result, the Bureau added more than 1.6 million address updates to the MAF without review as shown above, even though they were eligible for in-office address canvassing. The Bureau will attempt to enumerate households during the census through self-response methods, such as online or paper questionnaires. If the Bureau does not initially receive responses, these addresses will become part of the NRFU workload. Had these addresses been canvassed in office, it is likely that many of them would have been rejected, based on the rejection rate for other addresses. Specifically, the Bureau rejected 39 percent (334,000 out of 861,000) of the address updates it reviewed in its sample. If a similar rate of rejection were to have occurred in both groups, roughly 624,000 additional address updates would have been rejected instead of being included in the enumeration universe with possible unnecessary NRFU follow up. Assuming the same average cost of NRFU per case as in 2010, these additional cases receiving census questionnaires could result in an unnecessary $25 million in costs (in constant 2020 dollars). Standards for Internal Control in the Federal Government indicates that agencies should use quality information to achieve their objectives. The Bureau’s decisions to limit the reviews conducted on submitted LUCA updates mean that the Bureau will have some addresses in the MAF for address canvassing and NRFU of unknown quality that will result in potentially unnecessary fieldwork. Creating the conditions whereby the Bureau can expand the scope of in-office review of tribal, state, and local additions to the MAF will better position the Bureau to reduce its fieldwork and related costs. The Census Address List Improvement Act of 1994 required that OMB establish a process to adjudicate differences between the Bureau and LUCA participants over proposed address updates to the MAF. The Bureau and the LUCA appeals office that OMB established will conduct the feedback and appeals phases of LUCA, respectively, from July 2019 through January 2020. Feedback to participants began in July 2019, and the subsequent appeals process is expected to run through January 2020. The Bureau and OMB expect fewer LUCA appeals for 2020 than in 2010 due in part to the Bureau’s decision to review only a portion of submitted address updates and provisionally accept the rest. In 2010, participants could appeal 13.3 million addresses, while according to the Bureau only about 1.7 million addresses will be eligible in 2020. According to OMB, as of mid-October 2019, the LUCA appeals office had begun processing files containing appealed addresses from 1,122 participants. Officials indicated the appeals office will not determine the total number and dispositions of addresses processed until after the end of the operation. As in 2010, OMB is giving participants 45 calendar days to appeal the Bureau’s individual address reviews. Since 2000, the LUCA appeals process has resulted in approval of more than 90 percent of LUCA appeals that participating governments have submitted, including more than 1.6 million appealed addresses (91 percent) in 2010. OMB officials noted that the practice for the appeals process is to side with the participants if the weight of evidence on either side of an appealed address is equal, which may account for the high percentage of approved appeals. OMB is replicating this practice for 2020, according to the final regulation establishing the LUCA appeals process in July 2019. Yet the Bureau’s post-2010 evaluation showed that, among all forms of late additions to the MAF, addresses that were reinstated to the MAF because of a LUCA appeal were the least likely to be found valid as either residential or commercial addresses. Ultimately, the Bureau enumerated individuals at 55 percent of such addresses for the 2010 Census (compared to 83 percent of addresses added late to the MAF through other operations). The 2010 LUCA appeals process resulted in the Bureau contacting and enumerating over 700,000 households that otherwise would be less likely to be enumerated, yet the high rate of erroneous addresses added to the MAF through appeals reinstatement will be an additional source of NRFU workload, making that operation more costly than necessary. Given that LUCA is one of several operations used to build the MAF, it is important for the Bureau to assess and determine how the high rate of LUCA address updates that are reinstated through the appeals process affect other operations and, thus, LUCA’s cost-effectiveness. Standards for Internal Control in the Federal Government states that management should use quality information to achieve the entity’s objectives. In its post-2010 evaluation, the Bureau acknowledged that it needed to research the reason for this seemingly low enumeration rate and to form a plan to resolve the cause. However, it has yet to do so. Evaluating the enumeration outcomes of appealed addresses and identifying factors that led to these results could help to reduce the cost of unnecessary enumeration attempts, as well as costs associated with the administration of the appeals process. The Bureau provided us with estimates for what LUCA would cost for the 2020 Census, but it was unable to provide sums for other address- building operations. The Bureau estimates that LUCA 2020 operations will cost $29.6 million. Among other expenses, this includes certain information technology costs, printed materials for outreach, and salaries for Bureau staff and contractors throughout the decade. Beyond the LUCA operation, the Bureau has several other initiatives that provide information for the MAF, such as the USPS’s Delivery Sequence File and the GSS Program. According to Bureau cost documentation, these operations are funded through the Bureau’s Geographic Support Program at a level of $59 million annually since 2016. However, the Bureau does not isolate the costs of operations within the Geographic Support Program that may provide information on the relative cost- effectiveness of LUCA and related operations in updating the MAF. Bureau officials and stakeholders that we spoke with have cited the GSS initiative—which processes tribal, state, and local modifications to the MAF throughout the decade—as an alternative design for LUCA. Officials told us that costs for GSS are not tracked separately from other initiatives that update the MAF and the Bureau’s geocoding database. Standards for Internal Control in the Federal Government states that agencies should establish and operate monitoring activities, such as tracking program costs. Additionally, GAO’s 21st Century Challenges: Reexamining the Base of the Federal Government indicates that, to meet current and future challenges, it is important to evaluate whether programs are using the most cost-effective or net-beneficial approaches when compared to other tools and operation designs. Since the Bureau does not isolate costs specific to various design components it uses to build and update its address list, it is not possible to evaluate the relative cost-effectiveness of LUCA’s current design in the context of other address-list building the Bureau has undertaken for the 2020 Census. Identifying and tracking these costs would help the Bureau to determine the cost-effectiveness of its address-building activities and identify improvements. While the Bureau largely implemented its approach for LUCA 2020 as planned, the Bureau missed several opportunities to maximize the benefits of LUCA toward improving the quality and reducing the cost of the census. Specifically, increased fieldwork, time for participants to review their address lists, and use of data on hard-to-count populations all emerged as challenges for the Bureau to address in any future implementation of LUCA or a similar program. Data from LUCA reviews could have helped administrative records modeling. In 2020, the Bureau is planning to use administrative records to reduce the amount of follow-up it does seeking responses from vacant or nonexistent addresses. Bureau officials noted that the Bureau learns information from its review of the quality of LUCA updates that could benefit its modeling with administrative records, perhaps resulting in more cases where administrative records are deemed good enough to reduce NRFU further. Standards for Internal Control in the Federal Government states that agencies should use quality information to achieve their objectives, in part by obtaining relevant data from reliable sources. The Bureau did not, however, plan to use information about addresses gathered during LUCA—such as during its reviews of address updates during LUCA validation—to help with its use of administrative records for the 2020 Census, nor determine how best, and when, to transfer data between the respective Bureau teams to make this happen. However, having information on the likelihood of addresses existing can help the Bureau tailor its strategy for following up with addresses that do not produce census responses. In addition, incorporating information learned about addresses added through the appeals process may also improve the results of the Bureau’s modeling with administrative records, which could in turn reduce workload during NRFU. Time constraints continue to limit participation. Officials of multiple participating governments and other subject matter specialists told us that the constrained timing of LUCA continues to be a barrier for governments to fully participate. For 2020 and in prior iterations of LUCA, insufficient time was one of the leading factors behind governments’ decisions not to participate. Our prior work on re-examining the base of the federal government highlights the importance of ensuring that a program is meeting its original purpose. Since its inception, LUCA has been intended to ensure that tribal, state, and local governments have the opportunity to review the Bureau’s decennial address list. In the 2010 Census, the Bureau increased the length of time governments had for reviewing the MAF from 90 days to 120 days, and kept this length for 2020. Yet, if governments lack the resources needed to review address lists, and if governments run out of time, they either may not participate, or their address updates may not reflect a comprehensive review of the MAF for their jurisdictions. Bureau officials agreed that more time for governments to participate would be better. Facilitating increased participation, along with expanding the scope of in-office reviews of LUCA submissions, however, may require the Bureau to realign its schedule for other phases of tribal, state, and local outreach. Figure 5 shows one potential opportunity for the Bureau to do this. The Bureau scheduled a 5-month gap between the end of its in-office address canvassing (and thus LUCA address validation) and the beginning of in-field address canvassing. Bureau officials said this period is needed to determine the right number of listers to hire and train, as well as to prepare official address materials needed for later operations. However, the 2020 schedule gave participants less time to submit updates than they could have had if the Bureau’s address validation phase had taken place later. Moreover, as previously noted, participants had from July 2017 to February 2018 to register for LUCA; officials noted that it could be possible to provide the review materials on a rolling basis so that participants who registered early could have more time to review their address lists. Finding opportunities like this to give participants more time for their review could improve the Bureau’s coverage. The Bureau did not use its data on hard-to-count areas to help guide LUCA. During LUCA 2020, the Bureau missed an opportunity to target efforts in order to improve address listing in areas considered by the Bureau to be hard-to-count. We have previously reported on the importance of targeting a program’s benefits to those with the greatest needs and the least capacity to meet those needs. The Bureau maintains publicly available data at the census tract level on the extent to which a geographic tract (roughly the population size of an urban neighborhood) is considered hard-to-count. Bureau officials told us, however, that they had not previously considered reviewing these data regularly when monitoring LUCA participation or prioritizing in-office review workloads. When an address is missing, the people at that address are more likely to be missed by the census. Bureau officials managing LUCA told us that using the Bureau’s data on hard-to-count areas could have given them insights into whether they were receiving LUCA participation for areas most in need of improvements in census coverage and whether they needed to better target their LUCA outreach. Moreover, Bureau officials told us that they would prefer to have more opportunity to provide feedback to participants regarding their submitted updates and their address lists. Given the time constraints discussed elsewhere in this report, data showing which participants are in hard-to-count areas could help the Bureau prioritize governments with which to invest time giving feedback. According to Bureau officials, this information could also help the Bureau prioritize its resources in other address list-building efforts, such as which areas the Bureau should conduct additional rounds of in-office address canvassing to ensure that recent address updates are not missed. Conditions surrounding LUCA have changed since LUCA was first implemented in the 2000 Census. For example, the dissemination of publicly available address data has increased, and the Bureau has developed other mechanisms for governments to provide input to its address list. However, LUCA’s designed role in the census has not fundamentally changed or been reexamined since its authorizing legislation. Moreover, the Bureau will soon begin its process for planning geographic programs for 2030. This presents an opportunity to reexamine LUCA’s contributions to building a complete and accurate address list. In 2005, we identified criteria for reexamining federal programs in order to address fiscal instability while updating federal programs and priorities to meet current and future challenges. These criteria are based on a need to inform Congress of our insights in order to help its budget and programmatic deliberations and oversight activities. These criteria include whether the program is using the most cost-effective approach when compared to other tools and program designs; whether a program is targeted to those with the greatest need; and what would be the likely consequences of eliminating an operation. Our review of Bureau documents and evaluations—along with interviews of Bureau officials, subject matter specialists, and state-level LUCA participant stakeholders—identified several issues for the Bureau to resolve with stakeholders, Congress, and other federal agencies as part of the planning process for the 2030 Census: Assessing whether LUCA should continue to have a role in building the address list. The first issue for the Bureau, Congress, and other stakeholders to resolve is whether LUCA should continue to be a vehicle for tribal, state, and local additions to the MAF. The Bureau receives intergovernmental inputs into the MAF through multiple sources, such as GSS and surveys of local governments to determine jurisdictional boundaries. The Bureau’s decisions on the scope of LUCA address validation for 2020 also mean that the effects of LUCA on address list quality are unclear. Yet, a committee of state- level stakeholders and subject matter specialists emphasized the value of having a forum for governments to review the Bureau’s address list—a feature that is currently unique to LUCA. By registering for LUCA under the authority of Title 13 nondisclosure requirements, governments can also receive feedback from the Bureau on their individual address updates, which the chair of a nationwide group of state-level population data officials told us was valuable. Moreover, stakeholders told us that having a program like LUCA late in the decennial cycle may help promote awareness of the census at the state and local level. Determining how frequently to have governments review the MAF. The method and frequency with which governments can review the MAF is another issue for the Bureau to resolve. A committee of state-level stakeholders and subject matter specialists told us that having more opportunities for tribal, state, and local review of the MAF during the decade would increase participation and thus quality of the MAF by relaxing the time constraints that have historically deterred participation in LUCA. Bureau officials also told us that a continuous program would provide more opportunities for governments to refine their address lists based on feedback from the Bureau. However, increasing the frequency of address updates, reviews, and appeals during the decade would increase program administration costs, and such a program’s design would need to account for the fact that smaller governments and LUCA nonparticipants already cite the lack of human and financial resources as a barrier to participation. Considering whether to make it easier for governments to access and share address data. Given the prevalence of modern address sources and services, the question of how closely to protect data on census addresses is another issue for the Bureau to resolve in conjunction with Congress and stakeholders. We have previously recommended that Congress consider revising Title 13 nondisclosure protections for address data. Bureau officials and subject matter specialists we interviewed said if federal agencies and tribal, state, and local governments could more easily share address lists, there could be benefits to address list quality. Bureau officials have also described scenarios in which it may be possible to enact targeted modifications to Title 13 so that only address data are affected. However, subject matter specialists we interviewed also noted that Title 13 protections can give reassurances to local residents and facilitate participation in building local address lists. Allowing widespread disclosure and use of the Bureau’s address list could also raise questions about which address lists are considered authoritative. Determining the role that a National Address Database should play in contributing to the Bureau’s address list. Deciding whether or how to leverage an existing publicly accessible address list as part of the Bureau’s decennial efforts is another issue to resolve. We have previously recommended that agencies responsible for interagency address and geospatial policy take actions to facilitate collection of national geospatial address data. First piloted in 2015 and now managed by the U.S. Department of Transportation (DOT), the National Address Database (NAD) provides publicly available address and geographic coordinates to government and non-government users. State-level stakeholders and DOT officials said a centralized, open-source form of address data would benefit public services, such as emergency response. Going forward, however, it will be important to address resource constraints that limit the NAD’s reach. DOT’s lead official for the NAD said that there are two permanent staff who oversee nationwide outreach and data collection, and at the time of this report, the NAD only has data from partners in 23 states. These issues have been prompted by developments that have taken place this decennial cycle, such as the development of the NAD and the advent of additional inputs into the MAF such as GSS; therefore, the Bureau has not yet had an opportunity to evaluate them in its decennial planning. Standards for Internal Control in the Federal Government underscores the need to identify, analyze, and respond to significant changes, as well as use quality information and communicate externally with stakeholders. With strategic planning for 2030 geographic programs in mind, the Bureau has an opportunity to engage with stakeholders, other federal agencies as appropriate, and Congress to resolve these issues and evaluate how various alternatives could impact the cost, quality, and public perception of the census. The above issues do not exist in isolation, however, and need to be resolved jointly. For instance, decisions to make address data more accessible would increase inter-agency data sharing and thus incentives for governments to participate in open-source address initiatives like the NAD. Decisions on whether to continue LUCA in its current form will affect the tools, such as GSS, available to tribal, state, and local governments to provide updates to the MAF. As the Bureau engages with affected partners on these issues, it will be important to consider various scenarios that could flow from resolving these issues in concert with each other. The Bureau’s implementation of LUCA for 2020 is on track in terms of milestones thus far, and the process for governments to appeal rejected LUCA address updates is ongoing and will continue through January 2020. The Bureau also implemented planned changes to participation options for governments and tracked participation by government. However, the Bureau’s primary metric for representing the coverage of the nation by the LUCA operation does not leverage other information the Bureau already has on the degree of useful overlap in coverage across different levels of participating governments. Identifying and reporting metrics on the extent to which governments participating in LUCA overlap in their coverage of residents, as well as the characteristics of participants such as type of government and the nature of their geographic area, could provide more complete and useful feedback on the success of LUCA and assurance of getting desired coverage while avoiding gaps. We also found that opportunities exist for the Bureau to further reduce fieldwork and make its address list-building efforts more cost effective. In the future, the Bureau could more fully use its in-office address validation process for LUCA to reduce costs and improve decennial accuracy. Further, identifying the factors that lead to enumeration outcomes of the LUCA appeals process may also produce lessons learned that could help lower the amount of fieldwork and thus costs. Moreover, maintaining more detailed cost data for the Bureau’s other related address list development efforts will help position the Bureau to evaluate the relative cost-effectiveness of LUCA in building the address list. Likewise, the Bureau could also leverage the results of its in-office review of LUCA updates, as well as its evaluation of the appeals process, to inform its administrative records modeling and potentially reduce the number of required in-field NRFU visits. The Bureau can similarly take additional steps through programs like LUCA to promote greater coverage in the census. By realigning the schedule of LUCA where appropriate, the Bureau could give tribal, state, and local governments more time to review the address list in their areas and thus more time to provide quality updates to the Bureau. Moreover, using data on participation in LUCA and related programs, in concert with existing data on hard-to-count areas, would help the Bureau target its resources for building the address list and conducting decennial outreach to those areas most in need. We have also identified fundamental issues related to the Bureau’s address list activity that will require a forward-looking, stakeholder- inclusive approach for the Bureau to resolve. Re-examining LUCA and the related issues will not be easy, and could take time. The Bureau is uniquely positioned to lead the identification and assessment of what the alternatives are, and particularly how they might affect the cost and quality of the decennial census. Reporting out on the alternatives and their justifications, and developing legislative proposals, as may be appropriate, will help the Bureau, Congress, and the users of census data benefit from cost and quality improvements in decennials to come. We are making the following eight recommendations to the Department of Commerce and the Census Bureau: The Secretary of Commerce should ensure that the Director of the Census Bureau identifies metrics on the extent to which governments participating in LUCA overlap in their coverage of residents, as well as the characteristics of participants such as type of government and geographic area, and reports on such metrics. (Recommendation 1) The Secretary of Commerce should ensure that the Director of the Census Bureau takes steps to conduct in-office reviews of a greater share of addresses submitted by governments before the addresses are added to the Bureau’s address list for potential field work. (Recommendation 2) The Secretary of Commerce should ensure that the Director of the Census Bureau, as part of the Bureau’s assessment of LUCA for 2020, consults with OMB to report on the factors that led to enumeration outcomes of addresses reinstated to the Bureau’s master address list by the LUCA appeals process. (Recommendation 3) The Secretary of Commerce should ensure that the Director of the Census Bureau identifies and tracks specific costs for related address list development efforts. (Recommendation 4) The Secretary of Commerce should ensure that the Director of the Census Bureau improves the use of LUCA results to inform procedures of other decennial operations, such as sharing information on address update quality to inform NRFU planning or administrative records modeling. (Recommendation 5) The Secretary of Commerce should ensure that the Director of the Census Bureau realigns the schedule of LUCA-related programs to provide participants with more time to review addresses. (Recommendation 6) The Secretary of Commerce should ensure that the Director of the Census Bureau uses the Bureau’s data on hard-to-count areas to inform geographic activities such as: targeting LUCA outreach to tribal, state, and local governments; planning additional rounds of in-office address canvassing; and providing feedback to tribal, state, and local governments on gaps in their respective address data. (Recommendation 7) The Secretary of Commerce should ensure that the Director of the Census Bureau, as part of the Bureau’s strategic planning process for geographic programs, reexamines LUCA in conjunction with stakeholders, other federal agencies as appropriate, and Congress to address the issues we have identified, including but not limited to: Identifying and assessing alternatives and describing corresponding effects on the decennial census. Reporting out on the assessment of alternatives, including justifications. Developing legislative proposals, as appropriate, for any changes needed to LUCA and address data in order to implement preferred alternatives. (Recommendation 8) We provided a draft of this report to the Secretary of Commerce, the Acting Director of the Office of Management and Budget, and the Secretary of Transportation. In its written comments, reproduced in appendix I, the Department of Commerce agreed with our findings and recommendations and said it would develop an action plan to address them. The Department’s response also describes several claims of cost savings and efficiency gains attributable to various address list-building activities. While we have previously reported on the Census Bureau’s 2020 address list-building efforts, we have not audited claims made in the Department’s response or elsewhere regarding potential cost savings from innovations for the 2020 Census. The Census Bureau, Office of Management and Budget, and U.S. Department of Transportation each also provided us with technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Commerce, the Undersecretary of Economic Affairs, the Director of the U.S. Census Bureau, the Acting Director of the Office of Management and Budget, the Secretary of Transportation, and the appropriate congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report please contact me at (202) 512-2757 or goldenkoffr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Ty Mitchell (Assistant Director), Devin Braun, Charles Culverwell, Rob Gebhart, Allison Gunn, Lisa Pearson, Kayla Robinson, Robert Robinson, Cynthia Saunders, and Peter Verchinski made significant contributions to this report.", "summary": "A complete address list is a cornerstone of the Bureau's effort to conduct an accurate census. LUCA is one of several operations the Bureau uses to produce its address list. It gives tribal, state, and local governments the opportunity to review the address list for their areas and provide the Bureau with any updates before the census. GAO was asked to review the status of LUCA, including its effect on other operations, as well as LUCA's overall effectiveness and necessity. This report examines (1) LUCA's status and its likely effects on 2020 field operations, and (2) what considerations the Bureau and other stakeholders could use to reexamine LUCA for 2030. GAO reviewed Bureau plans, analyzed data from LUCA participation and the Bureau's review of submissions, and held 9 discussions on a possible reexamination of LUCA with relevant Bureau officials, a council representing participating governments, and census data subject matter specialists. The Census Bureau generally followed the operational design for its Local Update of Census Addresses (LUCA) program, which is intended to give tribal, state, and local governments the ability to review and offer modifications to the Bureau's Master Address File (MAF). The Bureau met milestones, apart from extending the participation window for natural disaster-stricken areas, and generally followed plans for outreach, training, and participation options. However, some decisions created additional fieldwork. The Bureau received more updates from participants than it expected, so it only reviewed roughly 860,000 of the 5.1 million updates that did not match to the MAF (see figure below). The rest will be added to potential fieldwork. Had more addresses been reviewed in-office, many may have been rejected, based on the rejection rate for reviewed addresses. Avoiding this unnecessary fieldwork could have saved the Bureau millions of dollars when following up with non-responding households. The Bureau has not reexamined LUCA with respect to the cost, quality, and public perception of the census since the program was authorized in 1994. Yet much has changed since then, from the tools the Bureau uses in building its address list to the provision of publicly accessible address data. As the Bureau turns to its strategic planning process for 2030, it will have several issues to address regarding the future of LUCA, including: whether LUCA should continue to have a role in building the address list given the advent of other address-building initiatives; how often to have governments review the MAF for the census, in light of the costs and benefits of administering such a program more frequently; whether statutory nondisclosure protection of census address data is still needed given that address data sources and services are more prevalent. GAO is making eight recommendations to the Department of Commerce, including that the Bureau ensure more LUCA submissions are reviewed and reexamine LUCA to address the related issues GAO identified as part of the Bureau's strategic planning process for the 2030 Census. The Department of Commerce agreed with our findings and recommendations and described several cost savings and efficiency gains—which we have not audited—from their related address list-building efforts. The Census Bureau, Office of Management and Budget, and U.S. Department of Transportation each also provided us with technical comments, which we incorporated as appropriate.", "document_type": "gao"}
{"report": "Within VHA, the Caregiver Support Program Office, VISNs, and VAMCs all have a role in administering and overseeing the Family Caregiver Program. Caregiver Support Program Office. The Caregiver Support Program Office administers the Caregiver Support Program, which has two main components— 1. the Family Caregiver Program, which is available to eligible post-9/11 veterans, and their qualified caregivers, and 2. the Program of General Caregiver Support Services, which is available to covered veterans from any service era and their qualified caregivers. The Caregiver Support Program Office develops policy and procedures and provides guidance, oversight, and support for both components of the Caregiver Support Program. As of April 2019, this office had 11 full-time staff, with authorization to hire eight additional staff. VISNs. Each of VHA’s 18 VISNs has a lead official for the Family Caregiver Program—either a VAMC CSC who serves in the VISN lead role for at least 25 percent of the CSC’s time or a VISN employee who is responsible for the Family Caregiver Program as one of their VISN duties. The VISN lead official’s role is to provide guidance to CSCs within the VISN and to help address their questions or concerns. VISN lead officials are also responsible for disseminating information, collecting data when needed, conducting quality assurance audits, assisting and coordinating responses to inquiries from the Caregiver Support Program Office, and monitoring the Family Caregiver Program workload across the VISN. VAMCs. The program is administered at the local level at 140 VAMCs. Each VAMC has staff that are assigned to the program on either a full- time or part-time basis, as well as other VAMC staff that may assist with specific Family Caregiver Program-related activities as a collateral duty. VAMC staff assigned to the Family Caregiver Program may include the following: CSCs. CSCs are the primary program staff administering the program at VAMCs. They are generally licensed clinical social workers or registered nurses. CSCs have clinical responsibilities that may include identifying and coordinating appropriate interventions for caregivers or referrals to other VA or non-VA programs, such as mental health treatment, respite care, or additional training and education. CSCs also have administrative responsibilities that may include responding to inquiries about the program, overseeing the application process, and entering information about applications and approved caregivers into IT systems. During the first quarter of fiscal year 2019, there were approximately 436 CSCs assigned to 140 VAMCs. Administrative staff. Administrative staff are typically responsible for activities such as mailing communications to program applicants and participants, scheduling appointments, entering data into CAT, and otherwise supporting the administrative needs of the program. During the first quarter of fiscal year 2019, 24 of the 140 VAMCs or health care systems had administrative staff members assigned to the program. Clinical staff. Some VAMCs have clinical staff assigned to the program, which can include registered nurses, doctors, nurse practitioners, occupational therapists, or psychologists. These staff typically conduct in-home monitoring and may help with clinical eligibility determinations of veterans during the application process. During the first quarter of fiscal year 2019, 17 VAMCs had approximately 12 full-time-equivalent doctors, nurse practitioners, occupational therapists, and psychologists assigned to the program. Other VAMC clinical staff who are not assigned to the Family Caregiver Program may assist the program as a collateral duty. For example, they may serve as members of the clinical eligibility team or assist with program monitoring—including quarterly contacts and annual home visits—or program appeals (see fig. 1). The Caregiver Support Program Office directly funds the salaries for staff assigned to the Family Caregiver Program at VAMCs. Specifically, it funds the salaries of the CSCs, as well as some other staff who are assigned to the program, such as administrative staff or clinical staff. However, some VAMCs may also choose to fund additional staff for the program, if they identify a need. Additionally, the portion of time spent by VAMC staff assisting the program as a collateral duty may be reimbursed by the Caregiver Support Program Office. To participate in the program, caregivers and veterans must submit applications to their local VAMC or to VHA’s Health Eligibility Center. CSCs manage the multi-step application process, which includes administrative and clinical eligibility determinations, among other requirements (see fig. 2). According to VHA policy, VAMCs should review applications for the program within 45 days. However, this review can be extended up to 90 days if the veteran’s caregiver has not completed required training, or the veteran is hospitalized during the application process. Once caregivers and veterans are enrolled in the Family Caregiver Program, VHA policy requires CSCs or other VAMC clinical staff to periodically monitor the veteran’s overall health and well-being and the adequacy of the care and supervision being provided by the caregiver. This monitoring is to be documented in CAT as well as in the Computerized Patient Record System because it is a clinical encounter. The monitoring includes quarterly contacts. These contacts are supposed to occur every 90 calendar days, unless otherwise clinically indicated. They may be conducted as home visits, or if approved by the veteran’s primary care team, the contacts can be completed via telephone, a face-to-face visit at a VHA medical facility, or using clinical video telehealth. annual home visits. Caregivers and veterans must receive at least one home visit each year. According to Caregiver Support Program Office officials, the annual home visit counts as one of the quarterly contacts. If a veteran demonstrates an improvement or decline in their functioning while in the program, VAMC staff are supposed to reassess the veteran to determine whether they remain clinically eligible for the program or whether a change in the stipend tier level (increase or decrease) may be appropriate. A reassessment may result in a discharge from the program, a tier level change, or no change. However, the VA Secretary announced a moratorium on discharges and tier level decreases on December 21, 2018 due to continued concerns from veterans, caregivers, and others about VAMCs’ inconsistent application of eligibility requirements. According to Caregiver Support Program Office officials, there is no current timeline for when the moratorium will be lifted. In August 2018, the VA Office of Inspector General (VA OIG) issued a report on its review of the Family Caregiver Program, which focused on whether the program effectively provided services and support to qualified veterans and their caregivers. The VA OIG found that program applications were not reviewed in a timely manner, eligibility criteria were not consistently applied, caregivers and veterans were not routinely monitored, and that VHA had failed to effectively establish a governance structure that promoted program management accountability. The VA OIG made six recommendations to improve the program, including recommendations to establish a governance structure and to assess the adequacy of the program’s staffing levels at VAMCs. In May 2019, the VA OIG reported that the program had implemented the two recommendations related to establishing a governance environment and designating VISN lead officials for the program. Specifically, the Family Caregiver Program issued an updated directive for the program and additional standard operating procedures in October 2018 to address the governance environment recommendation and issued a memorandum regarding VISN lead officials in January 2019 to address the VISN lead official recommendation. According to the VA OIG, the remaining recommendations have not yet been implemented. The VA MISSION Act, which was enacted in June 2018, included provisions directing VA to implement an IT system to support the Family Caregiver Program and the incremental expansion of program eligibility. Specifically, the Act required VA to implement an IT system by October 1, 2018. According to the Act, the IT system is to allow for data assessment and comprehensive monitoring of the program. The VA MISSION Act also required VA to submit an initial report to Congress regarding the status of the planning, development, and deployment of this system within 90 days of enactment of the Act and a final report by October 1, 2019. The final report is to include a certification by the VA Secretary that the system has been implemented, along with a description of how the Secretary is using the system to monitor the workload of the program. In addition, the VA MISSION Act requires an incremental expansion of eligibility for the Family Caregiver Program. Specifically, within 2 years of the VA Secretary certifying the IT system for the Family Caregiver Program, VHA is to expand program eligibility to caregivers of veterans with a serious injury incurred or aggravated in the line of duty on or before May 7, 1975 or on or after September 11, 2001. Two years after this initial expansion of eligibility, VHA is to further expand program eligibility to include any veteran with a serious injury incurred or aggravated in the line of duty and in need of personal care services as specified in the statute. The Caregiver Support Program Office policy requires every VAMC to have at least one full-time CSC to administer the program. The policy also requires VAMCs to have an eligibility determination process, but does not specify staffing requirements for that process beyond stating that “appropriate” providers should be involved. This broad guidance provides VAMCs with flexibility in determining which providers to include in the eligibility determination process. We found that each of the four VAMCs we visited staff their Family Caregiver Program differently, including both the staff assigned to the program as well as other VAMC staff assisting the program as a collateral duty. While all four VAMCs had at least one CSC on staff, as required, other staff assigned to the program varied and included administrative staff, a non-CSC social worker, and non-CSC registered nurses. Furthermore, the differences we identified with VAMC staff assisting the program as a collateral duty included staff that assist with clinical eligibility determinations as well as staff that assist with other program requirements. Specifically, each of the four VAMCs had assembled their own clinical eligibility teams, which varied in composition and could include physicians, therapists, or mental health professionals. Other variations with staff assisting the program included three VAMCs that utilized members of the Home Based Primary Care team to assist with initial home visits, quarterly contacts, and annual home visits, and a VAMC that used physicians to assist the program with assigning stipend tier levels (see table 1). We found that VHA’s Caregiver Support Program Office does not have complete and accurate staffing information for the Family Caregiver Program. First, the Caregiver Support Program Office does not have complete information on all staff supporting the program. The office only tracks staff funded by the Caregiver Support Program Office, but does not track program staff that are VAMC-funded or other VAMC staff that assist the program as a collateral duty. For example, one site we visited had a VAMC-funded nurse that conducted quarterly contacts and home visits, but this nurse was not being tracked by the program office. Similarly, the program office was not tracking the time and resources related to VAMCs’ clinical eligibility team members. At each of the four VAMCs we visited, members of the clinical eligibility teams dedicated between 3 and 12 hours a month preparing for and attending the eligibility meetings. Furthermore, although the program’s VISN lead officials collect data on the Caregiver Support Program Office funded positions at each VAMC annually at a minimum and submit these data to the Caregiver Support Program Office, there is no documented process to validate the data’s accuracy. VHA employs a process that relies on VISN lead officials collecting data from facilities, and as a result, the overall accuracy of the data depends on the accuracy of the data VAMCs report. Based on our review of the staffing data, we identified discrepancies between the Caregiver Support Program Office’s staffing data for the first quarter of fiscal year 2019 and the number of staff we observed at all four VAMCs we visited. At two VAMCs, the number of CSCs that the Caregiver Support Program Office reported was higher than what we found. Caregiver Support Program Office officials said that these staffing discrepancies could be due to vacant positions. However, officials at the two VAMCs did not indicate that they had vacant positions at the time of our site visits. The third VAMC had a part-time registered nurse staffed to the program that was not included in the Caregiver Support Program Office’s staffing data even though this position was funded by VHA. Caregiver Support Program Office officials could not provide a reason for this discrepancy. The fourth VAMC had an administrative staff member funded by the Caregiver Support Program Office that was not included in the staffing data. Additionally, the Caregiver Support Program Office does not know the exact number of CSCs assigned to the program. The program office funds CSC positions, which can be filled by registered nurses or social workers. The program office also funds registered nurses who are not CSCs. However, the program office’s staffing data does not distinguish between the two types of registered nurse positions because they do not currently have the capability to collect such staffing details. As a result, Caregiver Support Program Office officials told us they could not identify registered nurses who are CSCs from other registered nurses assigned to the program. Officials reported that they are working on finding a way to collect details on the types of registered nurse positions. Although Caregiver Support Program Office officials said that they are taking steps to collect more information about the staff involved in supporting the Family Caregiver Program to prepare for the MISSION Act expansion, these efforts do not fully address the problems with data completeness and accuracy that we identified. Officials said that they are starting to collect data on the Family Caregiver Program staff more frequently. Specifically, the program plans to collect information on Caregiver Support Program Office funded staff at each VAMC from the VISN lead officials quarterly instead of annually, to align with how other national programs collect such data. During the course of this review officials said they had begun working on updating the method they use to collect staffing data. Caregiver Support Program Office officials said that this revised data collection instrument will include mandatory fields and data entry rules to ensure that the data reported are more consistent. However, officials did not provide any timelines for when they will begin using the updated method. Program officials have begun to develop a staffing model in anticipation of future program growth when eligibility expands to include pre-9/11 veterans. To create the staffing model, officials are identifying current program staff at the VHA, VISN, and VAMC levels and the tasks these staff perform. However, officials indicated that the model will use Caregiver Support Program Office staffing data because those are the only staffing data available for the program. As a result, VAMC-funded staff and collateral staff will not be included. Consequently, the completeness of the staffing model will be compromised and the current and future staffing resources identified by the model may not accurately estimate the program’s needs. The lack of complete and accurate staffing data for the Family Caregiver Program is inconsistent with federal internal control standards that require management to use quality information to achieve its objectives. Without complete and accurate information about the total number and types of staff that support the program, VHA does not know whether the program’s staffing approach and available resources are sufficient to meet the program’s requirements as well as the needs of participating caregivers and veterans. Furthermore, without complete and accurate staffing data, it is unclear how the Caregiver Support Program Office will develop projections of the staff that will be needed to enroll and support additional caregivers and veterans when the Family Caregiver Program’s eligibility is expanded as required by the MISSION Act. Within VHA, the Caregiver Support Program Office monitors the timeliness of VAMCs’ processing of applications for the Family Caregiver Program. Specifically, Caregiver Support Program Office officials told us that they review a monthly report from CAT. These reports show the number of applications in process at each VAMC and how long they have been in process. Officials also said that they share this information with VISN lead officials each month. However, since the inception of the program, VAMCs have had difficulty meeting VHA’s requirement to review applications within 90 days. Our analysis of CAT data found that about 68 percent of the 17,576 applications submitted from October 2017 through September 2018 were reviewed within 90 days. In January 2019, a memorandum was issued that required all VAMCs to develop action plans to address application processing delays beyond 90 days. Further, any VAMCs with more than 10 applications beyond 120 days or any exceeding 365 days were required to submit their action plans to the Caregiver Support Program Office. As a result of this memo, 11 VAMCs have submitted action plans. Caregiver Support Program Office officials said that they have assigned staff to monitor the action plans and have discussed the plans with the leadership of the VISNs that oversee these VAMCs. Additionally, in February 2019, VHA established a national level performance metric to measure application processing timeliness for the program that will be updated on a monthly basis, according to Caregiver Support Program Office officials. VHA’s goal is for 90 percent of Family Caregiver Program applications submitted in fiscal year 2019 to be processed within 90 days. The May 2019 report from CAT shows that 94 percent of the 1,246 current applications have been in process 90 days or less. VHA’s Caregiver Support Program Office lacks system-wide data from CAT or other sources on the completion of VAMCs’ required quarterly contacts and annual home visits conducted with caregivers and veterans in the Family Caregiver Program. Although these contacts and visits are supposed to be documented in CAT, the system has limited reporting capabilities. As a result, Caregiver Support Program Office officials are unable to obtain system-wide data that would allow them to monitor VAMCs’ completion of these requirements. Furthermore, officials could not readily provide these data for the four VAMCs we visited because doing so would have required them to manually review each veteran’s record (921 records across the four VAMCs). Given CAT’s reporting limitations, some VAMC and VISN lead officials we spoke with indicated that they have developed their own methods for tracking contacts and visits at the facility or regional levels. For example, officials at one VAMC told us they had developed a spreadsheet for the purpose of tracking quarterly contacts and annual home visits. Further, the VISN lead officials from one VISN told us that their VAMCs report information on their ability to schedule and complete contacts and visits on a monthly basis. The program office does not collect these data from the VAMCs or VISNs. The Caregiver Support Program Office has been able to collect limited information on the extent to which quarterly contacts and annual home visits are completed through 1) bi-annual audits of a sample of Family Caregiver Program participant records that are rolled into in an annual report and 2) site visits to select VAMCs. Caregiver Support Program Office officials told us that the audits of program participants’ records serve as their main source of information on the completion of required contacts and visits. However, the focus of the audits vary each year, which means that officials cannot monitor trends in performance over time because the information is not comparable year-to-year. For example, in fiscal years 2017 and 2018, the focus was on the records of caregivers and veterans who had been discharged from the program, and in fiscal year 2016, the focus was on newly approved caregivers and veterans. In addition, because the audits are focused on a random sample of individual participants’ records, they do not provide the Caregiver Support Program Office with information to determine whether individual VAMCs are meeting these requirements. Program office officials also told us that their site visits to VAMCs include a review of the processes for required quarterly contacts and annual home visits. As of January 2019, program office officials had conducted 16 site visits since fiscal year 2016— representing about 11 percent of VAMCs. Caregiver Support Program Office officials also report that they intend to develop a site visit plan as part of MISSION Act implementation planning. Without system-wide data on VAMCs’ monitoring efforts, the program office does not know whether contacts and visits are being completed as required or whether VAMCs may need more staff to conduct them. The VAMC officials we spoke with acknowledged that their ability to complete quarterly contacts and annual home visits was dependent upon having enough staff. For example, one VAMC official reported that its facility did not complete an entire quarter of contacts and visits to caregivers and veterans because they did not have sufficient staffing resources. Similarly, a VISN lead official said that the VAMCs in its network also have had trouble meeting monitoring requirements due to insufficient staff. The lack of system-wide data on VAMCs’ completion of required contacts and visits is inconsistent with federal internal control standards that require management to use quality information to achieve their objectives. Furthermore, without these data, the Caregiver Support Program Office is also limited in its ability to estimate the additional staff that will be needed to conduct these contacts and visits once the program’s eligibility expands. VHA and OIT have worked jointly over the last four years to both fix and replace the existing Family Caregiver Program IT system, CAT, but these efforts have not led to the implementation of an IT system that fully supports the needs of the program. The VA MISSION Act included provisions that directed the department to implement an IT system for the Family Caregiver Program by October 1, 2018 and required certification of the system from the VA Secretary by October 1, 2019. However, the department reported to congressional committees in October 2018 that meeting the system implementation deadline of the VA MISSION Act was not feasible. Consequently, that deadline has not yet been met. Specifically, VHA and OIT undertook two related efforts beginning in 2015: CAT Rescue was initiated in July 2015 as a short-term project intended to improve both the quality of CAT’s data and the system’s reliability and security. However, schedule delays and significant defects identified during system testing contributed to CAT Rescue’s termination in April 2018. According to OIT officials, the department spent about $2.86 million on CAT Rescue. However, the project did not deliver viable software improvements. Caregivers Tool (CareT), a companion project to CAT Rescue, was initiated in September 2015 and was intended to produce a replacement for CAT. The project was to develop and deliver a replacement system with expanded capabilities, such as easier caregiver application submission and enhanced caregiver program analysis capabilities. However, the CareT acquisition depended on CAT Rescue, which did not deliver the needed data improvements. When CAT Rescue was terminated, data improvement and migration activities that were previously part of CAT Rescue were moved to the CareT project and contract extensions were necessary to allow more time for system development and testing in relation to these expanded requirements. Subsequently, OIT and VHA Caregiver Support Program Office officials acknowledged that development delays and the number and critical nature of system defects identified during user acceptance testing had led to the VHA Caregiver Support Program Office’s loss of confidence in CareT as a viable replacement for CAT. As a result, VA suspended the CareT acquisition in January 2019 to assess the way forward. Ultimately, work on CareT ended in late February 2019. According to OIT officials, the department spent about $8.11 million on CareT between 2015 and 2019. However, no fully functioning system replacement was delivered as intended. VA commissioned two independent assessments that examined issues impacting the CAT Rescue and CareT projects. These assessments, completed by Digital Service at VA and the MITRE Corporation in early 2019, cited a number of deficiencies that likely contributed to the termination of CAT Rescue and impacted the ability of CareT to successfully deliver new system capabilities. For example, the assessments identified deficiencies in the following areas: Requirements management: The department did not effectively implement a process for requirements development and prioritization. As a result, OIT, program office staff, and the development contractors did not have a shared understanding of how the system was to perform. In addition, the requirements identified may have been overly complex and insufficient to facilitate IT development. Efforts to elaborate on the requirements over the course of the projects were not consistent and led to delays. Further, significant defects identified during testing were not effectively prioritized and requirements remained unmet. Leadership: CAT Rescue and CareT did not have stable leadership and experienced staff throughout the department’s efforts to address issues with the program. Specifically, there was a lack of sustained leadership or a product owner needed to create and enforce a technical vision across contractors and the department. Without such leadership, there was a lack of effective governance and shared accountability across VHA, OIT, and the development contractor. According to the assessments, these deficiencies, among others, have resulted in VA’s inability to successfully deliver IT improvements as planned. We have previously reported that successfully overcoming challenges in areas such as those identified in the independent assessments of CAT Rescue and CareT is critical to increasing an agency’s odds for delivering an IT system acquisition. With the loss of confidence in CareT as a viable solution and the subsequent results of the independent assessments, VA has redirected its efforts for a third time and initiated a new project, referred to as the Caregiver Record Management Application (CARMA), in March 2019. Specifically, CARMA is focused on acquiring a solution to CAT using a commercial product that is to be configured to fit the needs of the Family Caregiver Program and support the program’s expansion. The first CARMA release, planned for late October 2019, is intended to replace CAT and improve program reporting. According to program officials, this release is expected to include expanded capabilities needed to develop system-wide reports on the completion of the required quarterly contacts and annual home visits. The second release, planned for January 2020, is intended to refine initial functionality and improve stipend processing capabilities. Additional product releases are expected at least through the summer of 2020 to incorporate new capabilities, such as online application submissions for veterans and the ability to connect to existing VA systems that manage veteran and caregiver identity and relationship management. However, it is unclear what additional work may be necessary to accommodate the expansion of the Family Caregiver Program given that the department is only in the early stages of planning. Further, the department has not yet established a target date for certifying CARMA. According to OIT officials, the cost for CARMA is estimated to be between $5.7 million and $6.3 million, but additional costs for licensing and modifications to legacy systems are also expected. As of June 2019, OIT and VHA with assistance from the Digital Service at VA had taken steps to identify key project stakeholders, estimate costs, establish a timeline, and compile the initial set of requirements for implementing the first release. The department had also identified a Product Manager, who is to be responsible for coordinating efforts between OIT and VHA. According to officials from the Digital Service at VA, the CARMA project plans to use a better, more agile approach for managing requirements. In addition, the staff asserted that the department has established and filled the new Product Manager position, which is intended to improve project leadership. Despite these actions, VA has not yet demonstrated results to show whether these changes will be sufficiently effective to overcome the issues that contributed to the failure of both CAT Rescue and CareT. It is also not yet certain when VA will successfully implement and certify its IT system as required by the VA MISSION Act. Further, because the expansion of the program is contingent on the certification by the VA Secretary that the IT system fully supports the program, continued delays with the IT system will postpone needed assistance for caregivers and veterans who may qualify for these benefits when eligibility requirements are expanded. Thus, it will be important that VA ensure that the actions taken to improve requirements management and leadership of the CARMA project are effectively implemented in order to improve the likelihood that the project will deliver an IT system that fully supports the Family Caregiver Program. As VA prepares for the expansion of the Family Caregiver Program to include caregivers of veterans who served prior to September 11, 2001, it will be important that VA have an informed understanding of the staffing resources needed to support the program. However, we found that VA continues to struggle to have the information and tools needed to effectively monitor the Family Caregiver Program. Since the Family Caregiver Program was implemented in 2011, it has experienced difficulties in meeting program requirements, such as for monitoring program enrollees, potentially impacting the caregivers and veterans it is intended to support. As both we and the VA OIG have reported, determining and ensuring there are sufficient program staff to support the program is one of VHA’s greatest obstacles in meeting program requirements. In particular, VHA’s Caregiver Support Program Office does not have complete and accurate staffing data with which to assess current and future staffing levels because it is not collecting data on all VAMC staff who support the program, and the data that are collected are not validated. The Caregiver Support Program Office is further impeded in its ability to assess whether VAMCs’ staffing levels for the program are adequate because it lacks system-wide data on the completion of periodic contacts and visits with caregivers and veterans. While the new IT system should address this issue, the program office would benefit from having an interim method to collect this information as VA’s previous efforts to fix and replace CAT have not been successful. Until the program office has reliable data for oversight and planning, the difficulties VA has experienced since the Family Caregiver Program was implemented could be further exacerbated when the program’s eligibility expands to include the caregivers of veterans of all eras. We recommend that the Secretary of the VA direct the Under Secretary for Health to take the following actions: Collect complete staffing data for the Family Caregiver Program that includes Caregiver Support Program Office funded staff, VAMC funded staff, and staff that assist the program as a collateral duty at each VAMC. (Recommendation 1) Establish a process to ensure that the Family Caregiver Program staffing data that are collected and reported to the Caregiver Support Program Office are accurate. (Recommendation 2) Identify and use an interim method to collect data from VAMCs on their completion of required quarterly contacts and annual home visits with caregivers and veterans that can be used until a new IT system is implemented. (Recommendation 3) VA provided written comments on a draft of this report, which are reprinted in appendix I. In its written comments, VA concurred with all three recommendations. VA also provided technical comments, which we incorporated as appropriate. With respect to our recommendation on collecting complete staffing data, VA concurred and stated it is in the process of developing a data collection mechanism that will allow for the capture of more specific data about staffing roles and disciplines of Family Caregiver Program staff. VA also concurred with our recommendation to establish a process that ensures that the staffing data collected and reported to the Caregiver Support Program Office are accurate. VA stated that the VISN lead officials will be responsible for reviewing and validating the staffing data submitted and that the data collection mechanism under development for this purpose will have data validation processes in place for its data fields to ensure that the data entered by VISN leads are accurate. VA also concurred with our recommendation that it needs to identify and use an interim method to collect data on the completion of required quarterly contacts and annual home visits that can be used until a new IT system is implemented. In its technical comments, VA noted that data on quarterly contacts and annual home visits with caregivers and veterans are also captured in the Computerized Patient Record System because these visits are considered clinical encounters, which we note in our report. VA further stated that staff should be able to track the workload entered into the Computerized Patient Record System if VAMCs have appropriately set up their IT systems with the designated code for this program. VA asserted that in response to our recommendation it is exploring the feasibility of using data from the Computerized Patient Record System as an interim solution for monitoring the completion of quarterly contacts and annual home visits system-wide. Additionally, VA reiterated that the first release of CARMA, which it plans to release in October 2019, should include the capabilities necessary to develop system-wide reports on the completion of required quarterly contacts and annual home visits. We are sending copies of this report to the Secretary of Veterans Affairs, the appropriate congressional committees, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Sharon M. Silas at (202) 512-7114 or silass@gao.gov or Carol C. Harris at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. In addition to the contacts named above, Bonnie Anderson (Assistant Director), Mark Bird (Assistant Director), Alison Goetsch (Analyst-in- Charge), Emily Loriso, and Jennifer Stavros-Turner made key contributions to this report. Also contributing were Jennie F. Apter, Chris Businsky, Krister Friday, Monica Perez-Nelson, and Ethiene Salgado- Rodriguez. VA Health IT: Use of Acquisition Best Practices Can Improve Efforts to Implement a System to Support the Family Caregiver Program. GAO-19- 581T. Washington, D.C.: May 22, 2019. Veterans Affairs: Addressing IT Management Challenges Is Essential to Effectively Supporting the Department’s Mission. GAO-19-476T. Washington, D.C.: April 2, 2019. VA Health Care: Improvements Needed to Manage Higher-Than- Expected Demand for the Family Caregiver Program. GAO-15-245T. Washington, D.C.: December 3, 2014. VA Health Care: Actions Needed to Address Higher-Than-Expected Demand for the Family Caregiver Program. GAO-14-675. Washington, D.C.: September 18, 2014. Information Technology: Critical Factors Underlying Successful Major Acquisitions. GAO-12-7. Washington, D.C.: October 21, 2011.", "summary": "Since 2011, the VA Family Caregiver Program has provided assistance to caregivers of seriously injured post-9/11 veterans at VAMCs nationwide. However, GAO previously reported that some VAMCs have struggled to manage the program's workload. The VA MISSION Act of 2018 requires the expansion of program eligibility to veterans of all eras contingent upon implementation and certification of a new IT system. The VA MISSION Act included a provision for GAO to review VA's efforts to implement a new IT system. GAO was also asked to examine staffing for the program. This report examines the extent to which VA 1) has established staffing requirements and has data to track program staffing; 2) monitors whether VAMCs are meeting departmental requirements for application review timeliness and required contacts; and 3) has implemented an IT system that fully supports the program. GAO reviewed program documentation and data. GAO also interviewed VHA officials and officials from four VAMCs and their VISNs that varied in their numbers of applications and approved caregivers. GAO also interviewed OIT officials and reviewed documentation related to their efforts to acquire and develop an IT system for the program. Within the Department of Veterans Affairs (VA), the Veterans Health Administration (VHA) has established staffing requirements for its Program of Comprehensive Assistance for Family Caregivers (Family Caregiver Program) that allow for variation, but its staffing data are not complete or accurate. VHA requires its local VA medical centers (VAMC) to have at least one Caregiver Support Coordinator to manage the program. Otherwise, VAMCs have flexibility in determining the additional staff needed. VHA's Caregiver Support Program Office funds most Family Caregiver Program staff at VAMCs. VAMCs also may fund additional program staff or have other VAMC staff assist the program as a collateral duty, but GAO found that the program office only tracks the staff it has funded. GAO also identified discrepancies between the number of staff it observed at selected VAMCs and the program office's staffing data. Without complete and accurate staffing data, the program office does not have reliable information about the program's current staffing levels, which could hamper its efforts to project needed staff when the program's eligibility is expanded. The program office routinely monitors VAMCs' performance in meeting departmental timeliness requirements for reviewing enrollment applications for the Family Caregiver Program. However, it is not able to monitor whether VAMCs are completing required quarterly contacts and annual home visits to enrolled caregivers and veterans. The Family Caregiver Program's current information technology (IT) system—the Caregiver Application Tracker (CAT)—has limited reporting capabilities and cannot provide system-wide data on the completion of these contacts and visits even though this information is documented in CAT. GAO found that some VAMCs and the regional Veterans Integrated Service Networks (VISNs) that oversee them use spreadsheets to track the completion of these requirements, but the program office does not collect these data. Without system-wide data on contacts and visits, the program office is limited in its ability to monitor and identify when VAMCs may need additional staff to meet these requirements, including once the program's eligibility is expanded. VA has yet to implement a new IT system that fully supports the Family Caregiver Program as required by the VA MISSION Act. VHA and the Office of Information and Technology (OIT) have been working jointly on projects since 2015 to improve and replace CAT. However, two of these projects were terminated without delivering viable software improvements or a replacement system. According to two independent assessments, these prior efforts lacked both effective leadership and implementation of the processes needed for requirements management. VA has asserted that its third project, in which OIT and VHA have begun to acquire and implement a commercial product to replace CAT, will take steps to avoid the issues that have impacted its past efforts. However, the initial replacement for CAT is not expected until late October 2019. Further, despite this initial deployment and additional releases expected through the summer of 2020, the department has not yet fully committed to a date by which it will certify that the new IT system fully supports the program. Until the system is implemented and certified, the expansion of eligibility for the Family Caregiver Program will be delayed. GAO is making three recommendations to VA to collect complete staffing data, establish a process to ensure the data are accurate, and establish an interim method for collecting system-wide data on required contacts and visits. VA concurred with all three recommendations.", "document_type": "gao"}
{"report": "IAEA’s policy-making bodies include the Board of Governors, which consists of 35 member states, including the United States as a de-facto permanent member; and the General Conference, which consists of all 171 member states of IAEA. The agency’s staff, led by the Director General, is referred to as the Secretariat and is organized into six departments that implement programs approved by the Board of Governors and the General Conference. The Division of Nuclear Security, within the Department of Nuclear Safety and Security, implements the nuclear security program. Figure 1 shows the position of DNS within the agency. The agency’s other departments include the Department of Safeguards, which carries out technical measures and activities by which IAEA seeks to verify that nuclear material subject to safeguards is not diverted to nuclear weapons or other proscribed purposes; and the Department of Technical Cooperation, which provides nuclear technologies and expertise to member states. In addition to the departments, the agency has offices that report to the Director General, such as the Office of Legal Affairs. IAEA’s statute is the foundation of the agency’s dual mission of promoting the peaceful uses of nuclear energy and verifying through safeguards that nuclear technologies and materials are used for peaceful purposes and not diverted to nuclear weapons. Nuclear security is not an explicit part of this broader mission, but the agency has identified several of its statutory authorities as underpinning its nuclear security role. For example, the statute authorizes the agency to exchange scientific and technical information on peaceful uses of atomic energy, which IAEA does under its nuclear security program. In addition, a number of international treaties establish a nuclear security role for the agency, including: The Convention on the Physical Protection of Nuclear Material (CPPNM) and its 2005 amendment. This convention originally addressed the security of nuclear materials in international transport. A 2005 amendment, which entered into force in 2016, requires parties to establish, implement, and maintain a physical protection regime for nuclear materials and facilities in domestic use, storage, and transport. The amendment encourages states to consult with IAEA to obtain guidance on the design, maintenance, and improvement of their national systems of physical protection of nuclear material. International Convention for the Suppression of Acts of Nuclear Terrorism. This convention refers to IAEA as a source of guidance to States parties on measures for security of nuclear materials and charges IAEA with transmitting information to States parties, following an offense under the convention, on the disposition or retention of radioactive material, devices, or facilities taken control of during the response. In addition, United Nations Security Council Resolution 1540 calls upon states to refrain from supporting by any means non-state actors that attempt to, among other activities, acquire, use, or transfer nuclear, chemical, or biological weapons and their delivery systems. The resolution also calls upon states to engage in activities similar to those described in IAEA’s Nuclear Security Plan. For example, the resolution calls on states to take and enforce effective measures to establish domestic controls to prevent the proliferation of nuclear weapons, including physical protection measures; IAEA provides guidance and other support for applying such measures to civilian nuclear materials. The resolution also calls for measures to prevent illicit trafficking, to establish effective export controls, and to renew and fulfill commitments to multilateral cooperation in particular within the framework of the IAEA. IAEA funds its programs primarily through (1) its regular budget, for which all member countries are assessed an annual contribution, and (2) extra-budgetary cash contributions, which are voluntary. In addition, IAEA has a Technical Cooperation Fund—generally supported through voluntary annual contributions of member states—to be used for technical cooperation projects. The State Department coordinates the United States’ policy with and financial contributions to IAEA and is the lead U.S. agency for interacting with IAEA. In 2018, IAEA’s total regular budget was $437.9 million, and approximately $103.5 million was unfunded (to be funded through extra- budgetary contributions). In 2018, the Division of Nuclear Security’s regular budget was approximately $6.9 million, and $25.2 million was unfunded (to be funded through extra-budgetary contributions). The Nuclear Security Fund, established after the September 2001 terrorist attacks, holds the extra-budgetary funding for most of IAEA’s nuclear security activities. Figure 2 shows the levels of regular and extra- budgetary funding for DNS over the last three biennial budget cycles, from 2014 to 2019. According to IAEA officials, the agency operates under substantial budget constraints as a number of member states advocate for zero-nominal- growth budgets. This has generally caused IAEA’s programs to operate under minimal growth in their regular budgets from year to year and to seek efficiencies on an ongoing basis. Extra-budgetary contributions are not subject to these constraints. As part of an initiative to secure all vulnerable nuclear material around the world, the United States hosted 47 world leaders in Washington, D.C., for a Nuclear Security Summit in 2010. The summit organizers invited a range of participants, taking into account the scale of their nuclear energy programs and countries’ access to weapons-usable materials. Additional summits were held in Seoul, South Korea, in 2012; the Hague, the Netherlands, in 2014; and again in Washington, D.C. in 2016. The Nuclear Security Summits brought heads of state together to discuss and bring high-level international attention to nuclear security issues. These summits led to, among other things, the removal or elimination of nuclear material from civilian facilities across the globe, ratification and implementation of treaties, conversion of reactors to operate on low- enriched uranium, and the strengthening of regulations. Summit participants issued an Action Plan in Support of the IAEA during the final summit in 2016 to document their commitments to IAEA’s nuclear security mission. Commitments in the Action Plan in Support of the IAEA included recognizing the leading role of the agency for coordinating multilateral nuclear security activities as well as committing high-level support for the IAEA’s nuclear security activities and advocacy for IAEA’s coordination role and provision of guidance. IAEA’s nuclear security activities are conducted primarily under its nuclear security program, which consists of four subprograms. Under these subprograms, IAEA carries out a wide range of nuclear security activities, including developing and promoting the use of nuclear security guidance documents, providing assistance to member states, and developing training programs. IAEA also coordinates international nuclear security efforts. IAEA’s nuclear security activities are conducted primarily under the agency’s nuclear security program, which consists of four subprograms: Nuclear Security of Materials and Facilities. This subprogram covers the security of nuclear and other radioactive material and associated facilities and activities including transport. Nuclear Security of Materials Outside of Regulatory Control. This subprogram covers detection of criminal or intentional unauthorized acts involving nuclear or radioactive material and responding to nuclear events. Information Management. This subprogram is responsible for establishing and maintaining systems to collect and analyze nuclear security information. Program Development and International Cooperation. This subprogram covers international nuclear security coordination and provides education and training programs. It also manages donor relations and the Nuclear Security Fund. The Nuclear Security Program is implemented by IAEA’s Division of Nuclear Security (DNS), which is structured into four sections that correspond to the four subprograms. Figure 3 shows the projects carried out by each section. Other IAEA offices coordinate with DNS to carry out the agency’s nuclear security activities. For example, IAEA’s Department of Nuclear Energy collaborates with DNS to convert reactors to run on low-enriched uranium, return nuclear materials resulting from the conversion to the country of origin, and assist with the disposition of disused radioactive sources. The agency’s Office of Legal Affairs supports DNS by promoting universal adoption of the Convention on the Physical Protection of Nuclear Material and its 2005 amendment and helping member states with legal and regulatory understanding of the convention and drafting review. Under the four subprograms, IAEA conducts a broad range of nuclear security activities including (1) developing nuclear security guidance; (2) providing assistance to member states in areas such as establishing legal, regulatory, and technical nuclear security infrastructure, and converting reactors to operate on non-weapons usable materials; (3) providing training and education; and (4) coordinating international nuclear security efforts. IAEA develops nuclear security guidance documents and encourages member states to adopt and implement the guidance to improve their nuclear security regimes. IAEA’s Nuclear Security Guidance Committee, established by the Director General in 2012, makes recommendations to IAEA on what nuclear security guidance to develop and approves guidance publications. The Nuclear Security Guidance Committee is open to all member states. DNS’s four sections contribute to the development of guidance. For example, the Information Management section develops guidance relating to computer security at nuclear facilities, and the Nuclear Security of Materials and Associated Facilities section develops guidance in the area of physical protection of nuclear materials and facilities. DNS develops two main sets of guidance documents: the Nuclear Security Series and Codes of Conduct. The Nuclear Security Series, launched in 2006, is continuously updated by IAEA in cooperation with experts from member states. The series comprises four broad categories of publications: Nuclear Security Fundamentals, which establish the fundamental objectives and essential elements of states’ national nuclear security regimes. Recommendations, which set out measures that states should take to achieve and maintain effective regimes. Implementing Guides, which provide guidance on implementing security measures. Technical Guidance, which provides detailed guidance on specific methodologies and techniques for implementing security measures. Within each category, there are specific guidance documents, such as “Establishing the Nuclear Security Infrastructure for a Nuclear Power Programme” and “Nuclear Security Systems and Measures for Major Public Events.” The publications’ principal users are regulatory bodies for nuclear and radiation security and other relevant member-state authorities, such as those involved in law enforcement and forensics, border control and customs, and intelligence gathering. Other users include international organizations with responsibilities relevant to nuclear security; organizations that design, manufacture, and operate nuclear facilities; and organizations involved in the use of radiation related technologies. Another set of publications, the Codes of Conduct, are meant to serve as guidance to states for the development and harmonization of policies, laws and regulations. They include a Code of Conduct on the Safety and Security of Radioactive Sources. IAEA provides a variety of nuclear security assistance, which member states may request through the Integrated Nuclear Security Support Plan (INSSP) process, in which DNS works with member states to jointly conduct a comprehensive and systematic review of their nuclear security regimes and identify potential areas for improvement. DNS works with member states that request an INSSP to develop implementation strategies, based on the nuclear security needs identified, for IAEA or potential donors to provide assistance to the state. The INSSPs serve as input for the work plans of each DNS section. Member states may also request ad hoc assistance outside this process. IAEA’s nuclear security assistance includes helping member states establish legal, regulatory, and technical infrastructure to secure nuclear materials and facilities, and helping states detect and respond to “materials out of regulatory control”—material present in sufficient quantity that it should be under regulatory control but is not. IAEA may help to identify the need for assistance through advisory missions and peer reviews, such as International Physical Protection Advisory Service missions. These missions assist countries in strengthening their national civilian nuclear security regimes by providing (1) guidance on the protection of nuclear material and facilities, as well as of sealed radioactive sources and other radioactive material; (2) best practices in nuclear security; and (3) peer advice on implementing international agreements related to physical protection of nuclear material and facilities. Since 1996, IAEA has conducted 84 International Physical Protection Advisory Service missions in 50 countries. In addition, IAEA conducts International Nuclear Security Advisory Service missions to help member states establish effective nuclear security regimes that address nuclear and other radioactive “material out of regulatory control.” According to IAEA officials, in 2016 the agency suspended International Nuclear Security Advisory Service missions while DNS updated the supporting guidance, but it intends to restart such missions in 2019. IAEA also assists member states hosting major public events in strengthening nuclear security measures before and during the events. Assistance provided for major public events includes coordination meetings, workshops, and training on the use of detection equipment. The agency reported that, from July 2017 through June 2018, it assisted states with preparing for at least seven major public events, such as the 29th Southeast Asian Games in Malaysia in August 2017 and the G20 Buenos Aires Summit in Argentina in November 2018. In addition, IAEA assists with converting reactors to operate on low- enriched uranium rather than highly enriched uranium and contributes to the design of reactor cores that operate on low-enriched uranium. IAEA also assists with the repatriation of fissile and radioactive material from countries that no longer require or cannot adequately secure those materials to more secure storage in other countries. As previously noted, IAEA’s Department of Nuclear Energy assists DNS with converting reactors to run on low-enriched uranium. The Department of Nuclear Energy also works with DNS on management strategies for disused radioactive sources. With regard to radioactive material, IAEA reported that, from July 2017 through June 2018, it helped repatriate three highly radioactive materials from Lebanon to Canada and 27 such materials from South America to Germany and the United States. IAEA conducts several types of nuclear security training and education activities to support member state capacity building, including workshops and exercises. The agency reported that, from July 2017 through June 2018, it provided in-person training for more than 2,400 participants from 149 member states on subjects including physical protection of nuclear material and computer security. IAEA has also developed e-learning courses to make training more accessible. In addition, IAEA supports member states in developing Nuclear Security Support Centers. The purpose of these centers is to effectively develop nuclear security knowledge and associated technical skills in states to promote the long term sustainability and effectiveness of nuclear security in those states. The agency also supports the International Nuclear Security Education Network, a partnership through which IAEA, educational and research institutions, and other stakeholders cooperate to promote nuclear security education. This network connects 170 institutions from 62 member states to assist them in establishing and enhancing nuclear security education. Network members collaborate in areas such as the development of peer- reviewed textbooks, instructional material, computer-based teaching tools, and exercises and materials for laboratory work; faculty development in different areas of nuclear security; joint research and development activities to share scientific knowledge and infrastructure; and quality assurance. IAEA coordinates international nuclear security efforts through activities such as hosting information exchange meetings, organizing events and conferences, and promoting universal adoption of international legal instruments. Twice a year, IAEA hosts information exchange meetings to coordinate nuclear security activities with other organizations, such as the Global Initiative to Combat Nuclear Terrorism. IAEA reported hosting information exchange meetings in November 2017 and April 2018. The agency organizes a range of events and conferences, including the International Conference on Nuclear Security, which brings together ministerial-level representation to discuss important issues related to nuclear security. IAEA’s activities to promote the universal adoption of international agreements relevant to nuclear security—such as the Convention on the Physical Protection of Nuclear Material and its 2005 amendment—include working with states directly, speaking at conferences, and offering model legislation for states to follow. In addition, IAEA manages the Incident and Trafficking Database, which catalogues reports by participating states about details of thefts, losses, and other unauthorized activities and events involving nuclear and other radioactive material out of regulatory control. The details of such incidents are accessible to participating states, with limited information accessible to other UN-affiliated organizations. IAEA plans its nuclear security work through a range of documents, including a biennial Programme and Budget (P&B). However, IAEA does not prioritize its nuclear security activities. In addition, IAEA’s performance measures have limitations, and agency reports on nuclear security do not consistently include performance information. IAEA has two primary planning documents for nuclear security: Nuclear Security Plan. This 4-year planning document describes the nuclear security program’s tasks and outputs by project. The Nuclear Security Plan, which is approved by the Board of Governors, identifies broad priority areas, such as physical protection and nuclear security detection architecture and response. Programme and Budget (P&B). This biennial document, which is approved by the General Conference, identifies current IAEA program funding levels and future funding needs. The P&B also lays out objectives and associated outcomes and performance measures for the entire agency, including the nuclear security program and its subprograms. Figure 4 shows the objectives for the nuclear security program. In addition, the P&B identifies planned outputs for each project under the nuclear security subprograms. However, these documents contain only broad statements on prioritizing activities, providing limited guidance to DNS. Specifically, the Nuclear Security Plan calls for the agency to carry out its nuclear security activities in a prioritized manner with available resources, without further guidance about how to prioritize activities. Similarly, the P&B establishes two broad criteria for prioritization: 1) completion and maintenance of the universally applicable Nuclear Security Series recommendations and guidance, and provision of assessment and evaluation services at the request of member states, and; 2) the provision, upon request, of assistance based on an analysis of needs, including those identified through INSSPs. These criteria for prioritization are broad, effectively including almost all of the DNS’s activities. When we compared these criteria to DNS’s projects described in the 2018-2019 P&B, 12 of 13 projects aligned with at least one criterion. For example, one project under the Information Management section is to develop and implement INSSPs and a voluntary self-assessment tool for member states to use. This project aligns with the second criterion—the provision of assistance, including assistance identified through the INSSPs—because developing INSSPs helps the agency provide assistance to member states. DNS officials said that they use the criteria in the P&B as broad expectations set by member states for the nuclear security program, noting that they do not prioritize among activities because member states do not agree on priorities. Instead of actively prioritizing activities, DNS officials said they respond to requests from member states as those requests come in and to the extent that resources are available, taking into account conditions on funding. According to leading practices identified in the Project Management Institute’s The Standard for Program Management, organizations’ resource management plans should describe the guidelines for making decisions about priorities for using program resources and resolving resource conflicts. However, DNS does not have guidelines for prioritizing activities; there is no guidance in the Nuclear Security Plan, and the criteria for prioritization in the P&B are too broad for division officials to distinguish among competing needs. Such detailed guidelines would help DNS ensure it is appropriately targeting its limited program resources. IAEA has established several performance measures for its nuclear security program and subprograms, but these measures do not fully align with leading practices. IAEA issues several reports on the results of the nuclear security program, but these reports contain only some of the agency’s performance measures. IAEA has established four high-level performance measures in the P&B that it uses to determine progress toward the nuclear security program’s goals: (1) the number of member states requesting and receiving assistance through INSSPs, (2) the number of member states establishing or improving nuclear security measures based on advice from the agency, (3) the number of activities duplicated by other initiatives, and (4) the number of activities carried out in conjunction with the agency. In addition, the P&B identifies from four to six performance measures for each nuclear security subprogram. For example, the number of states requesting assistance or participating in IAEA activities to improve computer and information security capabilities is a performance measure for the Information Management subprogram. According to IAEA’s P&B, the agency follows a “results-based management” approach, which is driven by articulating desired results and measuring actual performance against those results. The P&B states that key elements of this approach include establishing program baselines and targets and measuring actual performance against these baselines and targets to determine whether the program is achieving its planned outcomes. We reviewed IAEA’s nuclear security program performance measures against four leading practices for performance management we have previously reported on: (1) linking performance measures to the offices responsible for implementing the programs, (2) limiting measures to the vital few, (3) determining whether performance measures for the defined objectives are appropriate for evaluating the agency’s performance in achieving those objectives, meaning that measures and processes for measuring performance align with the objective, and (4) measuring performance against baselines. The practice of measuring performance against baselines is also consistent with IAEA’s results-based management approach. Table 1 shows the extent to which DNS’s performance measures meet leading practices. We found that DNS’s performance measures fully met two of the four leading practices. First, IAEA’s nuclear security program performance measures linked to the offices responsible for implementing them, as DNS’s four sections are responsible for implementing the four subprograms of the corresponding name. For instance, a performance measure linked to the Information Management subprogram within DNS is the number of states requesting assistance or participating in IAEA activities to improve computer and information security capabilities, and the Information Management section implements the associated subprogram, whose projects include information and computer security. Second, IAEA’s nuclear security program performance measures are limited to the vital few; as discussed above, there are four high-level measures for the program and between four and six measures for each subprogram. We found that IAEA’s performance measures partially met the third of the four leading practices. Specifically, they were generally appropriate for evaluating their corresponding outcomes and objectives. The program objective of playing a central role and enhancing international cooperation in nuclear security fully aligned with its associated outcome of improved global coordination and cooperation in supporting national efforts to improve nuclear security. Also, the associated measures by which IAEA assesses progress toward this outcome—the number of activities duplicated by others and the number of activities carried out in conjunction with IAEA—fully aligned with the outcome and objective. However, for the other two program objectives, outcomes and measures partially aligned with the objectives. For example, one of the nuclear security program’s objectives is contributing to global nuclear security efforts by establishing guidance and providing for its use through advisory services and capacity building; there is a performance measure related to advisory services, but no measure related to guidance. We found that IAEA’s nuclear security program performance measures did not meet the fourth leading practice, in that they did not include baselines or targets. For example, the performance measure regarding the number of states that have established or improved national nuclear security measures and systems on the basis of advice from the agency does not include a baseline of the number of states that already have established effective nuclear security measures. The measure also does not include a target for the number of states that should establish or improve nuclear security measures. Without established baselines or targets for each performance measure, IAEA’s ability to demonstrate results for its nuclear security program is limited. DNS officials acknowledged that the performance measures for the nuclear security program and subprograms do not have targets or baselines. They said that this is deliberate, based on nuclear security being a national responsibility and the limitations of IAEA’s nuclear security mandate. However, many of the performance measures for the nuclear security program and subprograms are focused on activities the agency carries out, for which DNS can develop targets and baselines; they are not focused on activities of member states. DNS officials also said that the division struggles to develop measures because the nuclear security environment—for example, threats to computer security—is continually evolving. However, many of these measures—such as adherence to the Convention on the Physical Protection of Nuclear Material—are independent of the security environment, and uncertainty should not prevent programs from developing measures to track their performance. By developing baselines and measurable targets to demonstrate results, DNS can more effectively monitor and assess the performance of its Nuclear Security Program. IAEA issues four sets of reports that provide information on its nuclear security program to member states, key stakeholders, and the public, including: Nuclear Security Report. This annual report, developed by DNS, describes the nuclear security program’s major achievements and expenditures of the prior year, as well as goals for the following year. Program Performance Report. This internal, agency-wide report describes progress in implementing all of the agency’s programs and identifies the resources used for each program in a given year. IAEA Annual Report. This report provides a high-level overview of the agency’s accomplishments and includes a section on the nuclear security program. Individual reports for each donor. These reports detail how DNS uses extra-budgetary contributions from each donor country (or government agency) in a given year; these reports are not shared with other countries or agencies. We have previously reported that program managers should communicate necessary quality information so that both internal and external parties can help the program achieve its objectives. Communicating necessary quality information through reporting is consistent with IAEA’s results-based management approach, according to which results-based reports help the organization, stakeholders, and funders to better understand the impact of a given program or project. We have also found that completeness is an element of quality reporting; completeness entails reporting on every performance goal and measure. In May 2013, we recommended that State work with IAEA and its member states to systematically report on the results of the agency’s performance measures. IAEA has subsequently taken steps to improve reporting, such as aligning the Nuclear Security Report with the P&B. In 2018, DNS restructured the format of the Nuclear Security Report so that each section of the report more clearly aligns with the nuclear security program and its subprograms. According to IAEA officials, DNS devotes substantial resources—including two full-time staff—to meeting all of its reporting requirements. Our analysis of three IAEA reports for 2016—the Nuclear Security Report, the Annual Report, and the Program Performance Report—found that DNS reports on some performance measures for its nuclear security program, but not all. Specifically, in the Nuclear Security Report, DNS reports on one measure fully and one partially and does not report on two measures. Specifically, DNS reports fully on the number of activities carried out in conjunction IAEA reports partially on the number of states that request and receive assistance, as identified in INSSPs. The agency reports on the number of states that completed INSSPs and provides examples of assistance but does not report whether that assistance was requested through INSSPs. For example, in the 2016 Nuclear Security Report, IAEA reported that five member states formally approved INSSPs. The agency also reported several examples of assistance to member states, such as training workshops on radiological crime scene management for Colombia in February 2015, Lithuania in February 2015, and the Philippines in June 2015. However, the report did not specify whether the need for that assistance was identified through INSSPs. IAEA does not report on the number of member states that have established or improved national nuclear security measures based on advice from IAEA or the number of activities duplicated by other initiatives. None of the three IAEA reports we reviewed consistently includes performance measures for the nuclear security subprograms. Table 2 shows the extent to which at least one of the three 2016 reports we reviewed includes measures for program and subprogram performance. Member states have expressed concerns with the effectiveness of IAEA’s reporting on the nuclear security program. In 2018, IAEA member states included language in the Nuclear Security Resolution to encourage the agency to improve communication with the public and member states about its nuclear security activities and their global impact. U.S. officials we interviewed said that they are dissatisfied with the reports, including with the quality of information on nuclear security activities, and would like to see, among other things, better reporting on how those activities support the agency’s mission, rather than reports that merely describe activities completed. IAEA officials provided two reasons why IAEA is limited in communicating more comprehensive information on nuclear security program performance in its reports. First, IAEA officials said that there are sensitivities around the data IAEA collects about member states, and member states are hesitant to share information on their security weaknesses. However, IAEA can report on its program performance without reporting sensitive information about individual states. Many of its measures pertain to numbers of states, and in cases where there are sensitivities, IAEA could aggregate data to a regional level to conceal state-specific information. Second, IAEA officials said that member states may not consistently make available to the agency the information it would need to measure the impact of its work. For example, to measure the number of states that established or improved national nuclear security measures based on advice from the agency, IAEA would need to know whether states implemented the agency’s recommendations. However, as previously mentioned, most of IAEA’s performance measures are focused on activities the agency carries out and not activities of member states. For example, one of the nuclear security subprogram’s measures is the number of states that participate in the Nuclear Security Guidance Committee. IAEA should have the data it requires to report on measures focused on activities carried out or facilitated by the agency. The lack of completeness in DNS’s reporting limits the effectiveness of the agency’s communication on the nuclear security program’s performance. By consistently including the results of its performance measures in at least one of its reports, IAEA could better communicate internally and with external stakeholders on the nuclear security program’s performance. IAEA member states disagree over the agency’s role in nuclear security. These disagreements have frequently contributed to DNS’s challenges over resources and the agency’s central coordinating role in nuclear security. According to U.S. and member-state officials and experts, IAEA member states disagree over the agency’s role in nuclear security. According to U.S. officials, member states supportive of the agency’s nuclear security role—such as the United States—see nuclear security as an issue with trans-border implications and believe the agency is well suited to supporting and facilitating cooperation on international, regional, and national nuclear security efforts. U.S. officials said that some member states do not see nuclear security as an international responsibility, but rather only as a national one, and disagree with IAEA’s nuclear security role to various extents. The disagreements over the agency’s role are rooted in a number of issues: Questions regarding the statutory basis for IAEA’s nuclear security work. Some U.S. officials and experts told us that some member states question IAEA’s nuclear security work because it is not established in the agency’s statute. IAEA officials told us that disputes over the statutory basis for IAEA’s nuclear security work are no longer an issue, and officials representing member states that had raised questions about the statutory basis for the work conceded that the matter was settled. However, these member-state officials said they felt strongly that because of the weak statutory basis, IAEA’s nuclear security work should be limited to core areas such as physical protection of nuclear facilities, rather than emerging areas such as cybersecurity. According to U.S. officials, other member states acknowledge the limited statutory basis for IAEA’s nuclear security work but still recognize the IAEA’s nuclear security role, which includes cybersecurity and newer areas of work. Perception of nuclear security as a barrier to or competition with IAEA support of civilian nuclear programs. According to IAEA, U.S. and several member-state officials, some states are concerned that IAEA’s nuclear security work could create barriers to their civilian nuclear programs—for example, by requiring recipients of IAEA technical cooperation to adhere to nuclear security guidance. In addition, according to U.S. and some member-state officials, some member states view IAEA’s nuclear security work as competing for resources with the agency’s other programs, such as the Technical Cooperation program, which assists member states with developing civilian nuclear programs. U.S. officials said that the Group of 77 generally advocates for more of the agency’s funds to be allocated to such programs. Resistance to nuclear security as a proxy for disagreement on other issues. U.S. officials, many mission officials, and many experts said that political disagreements among member states on unrelated or tangentially related international nuclear issues undermine IAEA’s nuclear security work. For example, U.S. officials and many member- state officials and experts told us that disagreement between nuclear weapons states and nonnuclear weapons states about nuclear disarmament manifests itself as political resistance in various IAEA forums to the agency’s nuclear security activities. Resistance to the Nuclear Security Summits. Some U.S. and member-state officials and experts said that some IAEA member states resented the perceived exclusive nature of the Nuclear Security Summits. As previously mentioned, the final summit in 2016 resulted in an Action Plan in Support of the IAEA in which signatories made commitments to support IAEA’s nuclear security mission. According to several mission officials and experts we interviewed, some excluded member states do not believe that the agency should carry forward the summits’ work, which in their view represents the priorities of the approximately 50 summit participants rather than all 171 IAEA member states. One expert said that within IAEA, there is resistance to anything associated with the summits among the member states that did not participate and that those states do not want IAEA involved in regulating or implementing anything resulting from the summits. IAEA officials and others we interviewed said that the disagreements over the agency’s nuclear security role create tangible challenges for the agency concerning funding, as member states that do not support the agency’s nuclear security role resist efforts to substantially raise DNS’s regular budget. As a result, according to IAEA, U.S., and several member-state officials, DNS continues to rely heavily on extra-budgetary contributions and has a smaller proportion of regular budget funding than other IAEA divisions, including other parts of the Department of Nuclear Safety and Security. DNS’s regular budget funding represents less than a quarter of total nuclear security program funding, with 78 percent of the funding coming from extra-budgetary contributions (see fig. 5). As we have previously reported, the extra-budgetary contributions on which DNS relies are voluntary, unpredictable from year to year, and inflexible, as they are often directed to specific purposes and often carry additional conditions. As a consequence, the nuclear security program’s large reliance on extra-budgetary support affects program management and human resources in ways that may undermine effective management of the program. IAEA officials identified several ways in which the nuclear security program’s heavy reliance on extra-budgetary funding affects program management. Planning and prioritization. According to IAEA officials, because extra-budgetary contributions are predominantly directed to specific purposes and can only be used for direct assistance to states, rather than support costs, they may not align with DNS’s most critical needs. IAEA officials also said that reliance on extra-budgetary contributions leads DNS to plan its activities around conditions stipulated for the contributions rather than planning around overall program needs. Donor states may also use the contributions to create cost-free expert positions for their own personnel that may not meet DNS needs. U.S. officials said, however, that even within the constraints of extra- budgetary contributions, DNS could take steps to work with donors to conduct work on a broader range of projects and initiatives, such as providing donors with plans to address longer-term, strategic needs. Program sustainability. IAEA officials, several member-state officials, and some experts we interviewed raised concerns about the effect of extra-budgetary contributions on the sustainability of IAEA’s nuclear security efforts. For example, several experts suggested that the DNS’s planning of work around individually-funded projects means that IAEA’s focus tends to be on short-term activities rather than long- term sustainability, including through follow-up on prior work. IAEA officials did not agree with the concern about follow-up work, but did acknowledge that long-term reliance on extra-budgetary contributions was unsustainable. Human resource management. IAEA officials also identified ways in which the reliance on extra-budgetary funding affects DNS’s human resource management. First, extra-budgetary funding generally supports positions that are initially designed to last for only 2 or 3 years, leading to few long-term positions in the division and making it difficult to sustain continuity of knowledge and experience over time. Second, staff hired for positions supported by extra-budgetary funding tend to look for regular-budget-funded positions elsewhere in the agency, which hurts recruitment as well as retention within DNS. Furthermore, the division must dedicate several staff to reporting on the use of extra-budgetary funding provided by each donor. U.S. officials acknowledged the detrimental impact of DNS’s high reliance on extra-budgetary contributions on staffing, but said that they are open to working with DNS to mitigate this impact. Member states have emphasized through the 2017 and 2018 Nuclear Security Resolutions, which are approved by the General Conference, the need to continue providing appropriate resources for the agency to implement its nuclear security activities. Furthermore, signatories of the Action Plan in Support of the IAEA, including the United States, committed to “contribute effectively to the implementation of the IAEA Nuclear Security Plan, including through reliable and sufficient resources.” The United States and other member states supportive of IAEA’s nuclear security role have advocated for increasing the agency’s regular budget for nuclear security. IAEA officials stated that, because of the politics around the agency’s nuclear security work, as well as the zero-growth policy, it is unlikely that the regular budget for nuclear security will increase substantially in the short term. As a result, IAEA officials have undertaken short-term solutions to minimize the impact of its reliance on extra-budgetary funding, such as reaching out to major donors and cultivating new sources of funding. However, such new sources of voluntary funding also would not be guaranteed or predictable and therefore would not improve the stability of the division’s funding stream. According to IAEA officials, the agency has not identified options to stabilize DNS’s budget within the existing constraints. IAEA officials and experts suggested other options for making the nuclear security budget more stable and flexible. One option could involve making structural changes to the Nuclear Security Fund, such as assessing a percentage of each extra-budgetary contribution and allocating those assessed funds for general expenditures without conditions. This could give the program more flexibility in using the funds and to support longer- term needs or projects. Another option could involve shifting funding within the Department of Nuclear Safety and Security to balance the proportion of regular and extra-budgetary funding between the Nuclear Safety and Nuclear Security divisions. U.S. and IAEA officials identified drawbacks to some of these options but IAEA has not comprehensively identified and analyzed options to stabilize DNS’s budget within the existing constraints. By working with the United States and other member states to analyze options to stabilize funding for the agency’s nuclear security program, IAEA could ensure that it has sufficient, reliable resources to implement the Nuclear Security Plan. The member-state disagreements discussed above—together with IAEA’s not following key practices for collaboration—limit IAEA’s ability to fulfill its central coordinating role in nuclear security. As noted in the Nuclear Security Plan, an objective of IAEA’s nuclear security program is “to play the central role and enhance international cooperation in nuclear security.” Numerous U.S., IAEA, and member-state officials and experts we interviewed said that there is a need for coordination of international nuclear security efforts and that IAEA is the appropriate entity to take on that role. These officials and experts cited IAEA’s perceived international legitimacy, technical expertise, and broad range of nuclear security efforts as key attributes that would allow the agency to play that coordinating role. DNS officials told us that they fulfill the agency’s central coordinating role in nuclear security in two key ways: (1) by providing nuclear security guidance that establishes the terms of reference for any nation working to improve its nuclear security and that is used by all member states and (2) by hosting and participating in key meetings. They said they further fulfill the role by using the agency’s international legitimacy and neutrality to work with countries that may be wary of international assistance from western countries. In addition, according to the agency’s Nuclear Security Plan, managing international nuclear security education through the Nuclear Security Support Centre and International Nuclear Security Education Networks is part of the central coordinating role. However, we found that IAEA is not fully implementing its central coordinating role in nuclear security, based on feedback from member states and experts and our evaluation of the extent to which IAEA has followed key practices that can sustain effective collaboration. Some experts told us that IAEA’s limited approach to its central coordinating role is a response to the resistance among some member states to the agency’s nuclear security role. According to many officials and experts we interviewed, IAEA’s approach to its central coordinating role is limited: Minimal outreach to key nuclear security stakeholders. Many experts expressed concern about the level of coordination with nongovernmental organizations and industry and said that IAEA would benefit from conducting more outreach to key nuclear stakeholders, including states. According to one expert, although IAEA may only conduct nuclear security activities at member-state request, IAEA could conduct more outreach to states about the assistance the agency could provide. Furthermore, some member- state officials and experts said the staff the agency sends to nuclear security meetings are not of the appropriate level of seniority. One expert said that IAEA does not engage actively with the Nuclear Security Contact Group, which, as previously mentioned, was established at the last Nuclear Security Summit to continue the work of the summit process after it ended. Specifically, according to this expert, the agency downgraded the level of representation it sent to Nuclear Security Contact Group proceedings to an official unauthorized to speak for DNS. However, U.S. officials said that senior DNS officials represented IAEA in more recent NSCG meetings. Logistical rather than substantive management of events. Several member-state officials and experts told us that IAEA limits its role at the events it organizes to logistical coordination rather than substantive management. According to one expert, to coordinate some of its support centers, IAEA convenes periodic meetings where participants share what they are doing, but it does not actively manage the support centers to reduce duplication. Some experts told us that multiple support centers in the same region teach the same content to the same students, raising concerns about duplicative activities. Another expert said that IAEA could more actively manage the support centers by starting discussions about best practices and, for example, the value of certification. To further examine IAEA’s fulfillment of its central coordinating role, we reviewed certain key practices that we have previously found can enhance and sustain collaborative efforts, such as: defining and articulating a common outcome, establishing joint strategies and compatible policies and procedures to operate across boundaries, identifying and addressing needs by leveraging resources, and agreeing on roles and responsibilities. IAEA’s planning documents—the Nuclear Security Plan and the P&B— define and articulate a common outcome. However, DNS has not established joint strategies or compatible policies and procedures with other nuclear security stakeholders, identified and addressed needs by leveraging resources, or agreed on roles and responsibilities. DNS officials said that they discuss these issues—such as resources and roles—at information exchange meetings with other organizations with a role in international security and said that these meetings have not resulted in agreed-upon or documented roles and responsibilities. In addition, the meetings have not resulted in the documentation of needs or resources, joint strategies, or compatible policies or procedures. As a result of IAEA’s approach to its central coordinating role in nuclear security, the agency may be missing opportunities to fully leverage its international legitimacy, technical expertise, and broad range of nuclear security efforts. By following key practices for collaboration, DNS could more formally define IAEA’s central coordinating role in nuclear security and strengthen the role even within the context of member-state disagreements. IAEA’s DNS plays a crucial role in preventing dangerous releases of radiation by assisting nations in securing their nuclear materials and protecting their nuclear facilities against sabotage. IAEA plans its nuclear security activities through a range of documents, but does not prioritize those activities. The agency’s P&B contains criteria for prioritization, but the criteria are too broad to help DNS make resource decisions. Guidelines for prioritizing activities would help DNS ensure that it is applying its resources toward the areas of greatest program needs. In addition, IAEA’s performance measures do not have baselines and targets. By developing baselines and targets to demonstrate results, DNS can more effectively monitor progress toward achieving the program’s objectives. Furthermore, none of the three IAEA reports on the nuclear security program fully addresses performance measure results. Improved reporting could help IAEA more effectively communicate internally and with external stakeholders on program performance. The nuclear security program relies heavily on extra-budgetary contributions, which adversely affects program management. Options exist to address this issue but IAEA has not analyzed these options. IAEA and its member states acknowledge the agency’s central coordinating role in nuclear security, but the agency has not followed key practices for collaboration. This has left IAEA’s approach to the central coordinating role vulnerable to member-state disagreements, and IAEA’s implementation of the role has not met the expectations of various member states. We are making the following five recommendations to the Department of State: The Secretary of State should work with IAEA and its member states through the Board of Governors to develop detailed guidelines for prioritizing nuclear security activities. (Recommendation 1) The Secretary of State should work with IAEA and its member states through the Board of Governors to improve the nuclear security program’s performance measures by developing baselines and measurable targets. (Recommendation 2) The Secretary of State should work with IAEA and its member states through the Board of Governors to improve how DNS reports to member states by consistently including the results of performance measures in at least one of the reports. (Recommendation 3) The Secretary of State should work with IAEA and its member states through the Board of Governors to analyze options to stabilize DNS’s funding within current fiscal and political constraints to enhance the sustainability of IAEA’s nuclear security program. (Recommendation 4) The Secretary of State should work with IAEA and its member states through the Board of Governors to strengthen the agency’s central coordinating role by following key practices for collaboration. (Recommendation 5) We provided a draft of this report to the Departments of State and Energy and to the International Atomic Energy Agency for review and comment. In its written comments, reproduced in appendix III, State concurred with all five of our recommendations. We are sending copies of this report to the appropriate congressional committees, the Secretary of State, the Secretary of Energy, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao,gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the structure and range of nuclear security work that the International Atomic Energy Agency (IAEA) conducts; (2) ) how IAEA plans and prioritizes its nuclear security work, and how it measures and reports on its performance; and (3) the challenges that IAEA’s nuclear security program faces. We focused our review on IAEA’s nuclear security program, specifically on activities carried out by the Division of Nuclear Security (DNS), within the Department of Nuclear Safety and Security. To address all three objectives, we interviewed U.S. officials, IAEA officials, officials representing IAEA member states, and other nuclear security experts. We selected the U.S. agencies most involved in nuclear security policy, including interacting with IAEA. The Department of State is the lead agency for interacting with IAEA and has represented the United States in the Nuclear Security Contact Group (NSCG) since September 2018; the Department of Energy’s National Nuclear Security Administration provides technical expertise and loans staff to IAEA; Nuclear Regulatory Commission, as the regulator for the U.S. civilian nuclear industry, provides perspectives on how IAEA’s guidance may impact states’ regulations, among other things; the Department of Defense collaborates with IAEA to develop IAEA training (for example, for border monitoring); and the National Security Council leads interagency coordination to develop U.S. priorities for nuclear security and initially represented the United States in the NSCG through August 2018. To gain the perspectives of IAEA member states, we selected member states based on their involvement in IAEA’s nuclear security work and suggestions from State and nuclear security experts; the selected member states represent a range of informed opinions, but cannot be generalized to the universe of IAEA member states. While we reached out to various member states, we predominantly received responses from member states who have voiced support regarding IAEA’s nuclear security work. Our statements about member states we spoke to should be interpreted with the understanding that few member states that have voiced opposition to IAEAs nuclear security work responded to our requests. Throughout this report, we use the phrase “member states we spoke to” or “member states who responded” to refer to all those who provided us information. In light of political sensitivities surrounding IAEA’s nuclear security work, we agreed not to identify the member states whose officials we interviewed. We selected nuclear security experts based on a literature search and a snowball sampling technique. Specifically, from our initial literature search, we selected seven authors who had published at least two articles since 2010 that were relevant to our review. However, two authors declined or did not respond to our interview request. During our interviews with the authors identified in the literature search, as well as with U.S. government officials, we asked for suggestions of individuals who were knowledgeable on IAEA’s nuclear security work or nuclear security more broadly. We added to our sample individuals named at least twice by other interviewees. Not all experts in the sample were available to participate in interviews. We summarized the information gathered from experts and other interviewees in the report by using “some” to refer to three members of a group, “several” to refer to four or five members of a group, and “many” to refer to more than five members of a group. We interviewed officials representing 12 member states, and 20 experts. To determine the structure and range of IAEA’s nuclear security work, we reviewed pertinent legal instruments, such as the Statute of the IAEA, the Convention on the Physical Protection of Nuclear Material and its 2005 amendment, and the International Convention for the Suppression of Acts of Nuclear Terrorism. We also reviewed IAEA’s planning documents, including the 2018-2019 Programme & Budget (P&B); 2017 and 2018 Nuclear Security Resolutions; and the 2018-2021 Nuclear Security Plan. To review how IAEA plans and prioritizes its nuclear security work, we reviewed these planning documents against the Project Management Institute’s The Standard for Program Management and interviewed IAEA officials responsible for planning and prioritizing the agency’s nuclear security work. To examine how IAEA measures and reports on performance, we reviewed the previously mentioned IAEA documents, as well as IAEA’s Nuclear Security Reports from 2016-2018. We also reviewed the 2015-2016 P&B, the 2016 Nuclear Security Report, 2018 Annual Report, and the 2016 mid-term program performance report to understand IAEA’s use of objectives, outcomes, and performance indicators. We chose the 2016 reports because at the time of our review, the 2016 program performance report was the most recent completed. We compared the agency’s planning documents and reports with leading practices for performance management and reporting, including leading practices derived from our prior work, and IAEA’s results-based management approach. We derived some of these leading practices from standards and practices developed for federal agencies, such as those established in Standards for Internal Control in the Federal Government. Although federal standards are not required to be used by international organizations such as IAEA, the leading practices based on these standards can be instructive for assessing IAEA performance measurement and reporting practices. To examine the challenges the agency’s nuclear security role faces, we reviewed the IAEA documents listed above as well as proceedings from meetings and conferences and budgetary contributions data from the United States and other member states. We analyzed statements from IAEA, U.S., and member-state officials and from experts about IAEA’s nuclear security challenges. We also assessed actions IAEA and member states have taken to potentially mitigate challenges by comparing those actions with written commitments made in support of the agency’s nuclear security work. We also reviewed IAEA’s central coordinating role in nuclear security against certain key practices that we have previously found to enhance and sustain collaborative efforts. We selected five practices as relevant to our analysis, and combined two practices—those on establishing joint strategies and establishing compatible policies and procedures. In our analysis we considered IAEA’s role as a coequal entity among many rather than one that has authority over other entities. We conducted this performance audit from March 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Nuclear Security Contact Group (NSCG) was established at the 2016 Nuclear Security Summit to continue the work of the summit process, including maintaining high-level political attention and momentum on nuclear security, assessing and following up on commitments made at the summits, and developing and maintaining connections to nongovernmental experts and the nuclear industry. NSCG has 48 members as of March 2019, and its membership is open to all International Atomic Energy Agency (IAEA) member states. According to State officials, the group actively focuses on recruiting new members. NSCG advertises itself through IAEA Board of Governors statements and has issued joint statements to encourage other member states to join. Canada was the first country to chair NSCG, followed by Jordan and Hungary, which is the current chair. NSCG formally meets on the margins of the IAEA General Conference. According to U.S. officials, NSCG has convened two to three times per year since its inception after the 2016 summit. IAEA is an observer, and an IAEA representative may comment on how NSCG proposals would impact IAEA. Representatives to the NSCG are government agencies. The National Security Council was the lead agency to represent the United States in the NSCG through August 2018, and State has been the lead agency since September 2018. According to officials and experts we interviewed, NSCG serves as a forum for proposing and developing ideas rather than as a formal decision-making body. Member states described the benefits NSCG has provided. For example, some member-state officials said NSCG helps maintain contact among summit participants and between nuclear security officials in their respective capitals—where nuclear security policy would be implemented—and those at IAEA. In addition, a member-state official said that the group is a very important instrument for developing key messages as part of a communication strategy. As a result of this strategy, some ideas developed in NSCG have been introduced into IAEA proceedings by NSCG member states, or into national policymaking discussions. NSCG has also prepared unofficial position papers. Furthermore, according to a member-state official we interviewed, NSCG has discussed or developed internal papers on a number of topics related to IAEA, including: ways to improve IAEA’s coordinating role in nuclear security whether more regulation is needed in nuclear security IAEA’s role in dealing with emerging nuclear security challenges promoting a more resource stable and empowered Division of Nuclear communication and outreach within IAEA the agency’s networks of nuclear security training centers. According to State officials, U.S. priorities for NSCG include ensuring that it is productive and action-oriented, with representatives ready to share views, brainstorm on ways forward, and lead change both at home and internationally. State is also focused on preparing the NSCG’s input for its representatives to significant conferences, such as IAEA’s ministerial- level and technical conferences and the 2021 Review Conference on the Amendment to the Convention on the Physical Protection of Nuclear Material. According to a member-state official, the NSCG has discussed how to engage in preparation for the review conference, the framework of the review, what to ask of member states, and whether to revise the Convention. According to U.S. officials and some member-state officials, NSCG has also promoted implementation of summit commitments, in which individual members are responsible for tracking and following up on commitments made by countries in certain areas. For example, the United States is the lead for following up on commitments related to insider–threat mitigation, and the Department of Energy led a meeting in Belgium in February 2019 on that topic. State officials said that NSCG also follows up on commitments made during the 2016 International Conference on Nuclear Security. Many experts we interviewed said that the NSCG process lacks transparency. Specifically, it does not publish its proceedings, which these experts said made it difficult to discern its accomplishments. U.S. and several member-state officials and experts said that a quiet approach was necessary to protect the group from IAEA member-state politics. Several representatives said that NSCG is mindful of the political sensitivities around its association with the Nuclear Security Summits, and is committed to supporting IAEA’s nuclear security role without becoming a distraction. In addition, one expert said that more openness would weaken the group as a discussion forum. For example, publishing proceedings would require getting consensus among members, which would shift the focus of the group from discussion to decision-making. U.S. officials said that NSCG planned to revamp and update its website, and to use it to highlight nuclear security successes and events, such as nuclear security support for major public events or regional training events, but did not plan to promote its own work. In addition to the contact named above, the following staff members made key contributions to this report: William Hoehn (Assistant Director); Alisa Beyninson; Antoinette Capaccio; R. Scott Fletcher; Ellen Fried; Drew Lindsey; Steven Putansu; Liz Spurgeon; and Sara Sullivan.", "summary": "Nuclear terrorism remains a significant threat to the security of the United States and its allies and partners. U.S. efforts to prevent nuclear terrorism include working with IAEA, an autonomous international agency affiliated with the United Nations. The Department of State coordinates the United States' policy with and financial contributions to IAEA. IAEA's nuclear security program aims to assist countries in enhancing the physical protection, control, and accounting of their nuclear and radiological material and nuclear facilities. GAO was asked to review IAEA's nuclear security program. This report examines (1) the structure and range of nuclear security work that IAEA conducts, (2) how IAEA plans and prioritizes its nuclear security work and measures performance, and (3) the challenges that IAEA's nuclear security program faces. GAO analyzed key IAEA documents and interviewed IAEA officials, U.S. and foreign government officials, and nuclear security experts. The International Atomic Energy Agency (IAEA) carries out its nuclear security program under its Division of Nuclear Security through four subprograms. IAEA activities under these subprograms include developing guidance, providing training, and assisting countries in enhancing nuclear and radiological material security. IAEA plans its nuclear security work through several key documents, including a Nuclear Security Plan, which calls for activities to be prioritized. However, IAEA's planning documents do not include guidelines for prioritization. Instead, IAEA officials said they respond to member states' requests as they arrive and to the extent resources are available. By developing guidelines for prioritizing its nuclear security activities, IAEA could help ensure that it is allocating its resources to the areas of greatest need. IAEA has developed performance measures for its nuclear security program, but these measures do not have baselines or targets. This limits IAEA's ability to demonstrate the results of its nuclear security program. IAEA member states disagree over the agency's role in nuclear security, and according to U.S. and other member-state officials and experts GAO interviewed, these disagreements create challenges for the agency, such as funding its nuclear security efforts. Officials added that states that do not support the agency's nuclear security role resist efforts to substantially raise the agency's regular budget for nuclear security, contributing to the program's heavy reliance on voluntary, or extra-budgetary, contributions from member states. GAO previously reported that extra-budgetary funding is unreliable. Reliance on such funding affects nuclear security program planning, human resources, and sustainability. Experts and U.S. agency officials have suggested options to stabilize nuclear security program funding, but IAEA has not analyzed such options. By working with the United States and other member states to analyze options to stabilize nuclear security program funding, IAEA could ensure that it has sufficient, reliable resources to implement the Nuclear Security Plan. GAO is making five recommendations to the Department of State, including that it work with IAEA to develop guidelines for prioritizing IAEA's nuclear security activities, develop program baselines and targets, and work with the United States and other member states to analyze options to stabilize nuclear security funding. State concurred with all five recommendations.", "document_type": "gao"}
{"report": "MDA is responsible for developing a number of systems, known as elements, with the purpose of defending against ballistic missile attacks. MDA’s mission is to combine these elements into an integrated system- of-systems, known as the Ballistic Missile Defense System. The goal of the BMDS is to combine the abilities of two or more elements to achieve objectives that would not have been possible for any individual element. These emergent abilities are known as integrated capabilities or BMDS- level capabilities. Table 1 provides a list and description of elements included in our review. When MDA was established in 2002, it was granted exceptional flexibilities to set requirements and manage the acquisition of the BMDS—developed as a single program—that allow MDA to expedite the fielding of assets and integrated ballistic missile defense capabilities. These flexibilities allow MDA to diverge from DOD’s traditional acquisition life cycle and defer the application of certain acquisition policies and laws designed to facilitate oversight and accountability until a mature capability is ready to be handed over to a military service for production and operation. Some of the laws and policies include such things as: obtaining the approval of a higher-level acquisition executive before making changes to an approved baseline, reporting certain increases in unit cost measured from the original or current baseline, obtaining an independent life-cycle cost estimate prior to beginning system development and/or production and deployment, and regularly providing detailed program status information to Congress, including specific costs, in Selected Acquisition Reports. In response to concerns related to oversight, Congress and DOD have taken a number of actions. For example, Congress enacted legislation in 2008 requiring MDA to establish cost, schedule, and performance baselines—starting points against which to measure progress—for each element that has entered the equivalent of system development or is being produced or acquired for operational fielding. MDA reported its newly established baselines to Congress for the first time in its June 2010 BMDS Accountability Report. Since that time, Congress has required more details for the content of these baselines. Additionally, to enhance oversight of the information provided in the BMDS Accountability Report, MDA continues to incorporate suggestions and recommendations from GAO. However, not all of our recommendations have been fully implemented. For example, in April 2013, we recommended that MDA stabilize its acquisition baselines so that meaningful comparisons can be made over time to support oversight. MDA stated that the information presented in the BAR is sufficient; however, we continue to find that the lack of stable baselines makes comparison difficult and in some instances, impossible. MDA develops capabilities and then delivers them to the military services. Using this process, MDA declares an asset or capability ready for delivery for potential operational use while communicating the capabilities and limitations of the asset. Representatives from the receiving military service or combatant command then have the ability to assess this evidence and decide whether to accept the new capability. Because the military services conduct minimal missile defense testing of their own, this process is one of the only ways to convey vital performance information. The accuracy of this information is especially important as it informs training materials, doctrine, and deployment decisions and provides evidence supporting these assertions. MDA supports its assertions of capabilities with evidence from three sources: models and simulations, ground testing, and flight testing. Ground tests and models and simulations permit more flexibility in scheduling and design, but both are dependent on logistically more difficult flight tests to provide real-world performance data. As a result, MDA’s ability to organize, conduct, and evaluate flight tests is one of the most important factors in whether MDA is able to adhere to its schedule and declare an asset or capability ready for delivery. Though MDA has flexibilities in managing the acquisition process, it must follow the same contracting regulations that apply to DOD, including the Federal Acquisition Regulation and the Defense Federal Acquisition Regulation Supplement (DFARS). For this report, we reviewed MDA’s use of a particular type of contract action that authorizes a contractor to begin work before contract terms, specifications, or price have been agreed upon. These “undefinitized contract actions” are permitted by the DFARS, with certain limitations. Undefinitized contract actions are generally used when negotiation of a definitive contract action is not possible in sufficient time to meet the government’s requirements and the government’s interest demands that the contractor be given a binding commitment so that contract performance can begin immediately. Under the DFARS, undefinitized contract actions must include a specific “not-to- exceed” price. Once the action’s terms, specifications, and price have been agreed upon or determined, a process known as definitization, the contract action converts to a “definitive” contract. Under the DFARS, undefinitized contract actions must contain definitization schedules that provide for definitization by the earlier of (1) 180 days after issuance or (2) the date on which the amount of funds obligated under the action is more than 50 percent of the not-to-exceed price. Once the government has received a qualifying proposal from the contractor, however, the government can extend the undefinitized period another 180 days. Similarly, the government may obligate up to 75 percent of the not-to-exceed price, if the contractor submits the qualifying proposal before 50 percent of the not-to-exceed price has been obligated. DOD’s regional Ballistic Missile Defense (BMD) effort consists of a number of specific weapon systems or elements that compose the BMD system as a whole. According to DOD, various versions of these weapon systems are being deployed in Europe, Korea and other regions. The European effort known as the European Phased Adaptive Approach (EPAA) integrates the upgrades to Aegis BMD Weapon System, Aegis BMD interceptors, C2BMC and sensors, and was originally planned for delivery in four phases. Additionally, each phase is designed to rely on increasingly capable missiles, sensors, command and control, and integration to defend Europe against increasingly longer range ballistic missiles. DOD delivered the first phase, for short- and medium-range defense of Europe, in December 2011, and delivered the second phase for medium- range missiles in December 2015. Its efforts for both of these phases were also characterized by schedule delays, technical challenges that led to reductions in the scope of capability delivered, as well as testing reductions, which reduced confidence in capabilities that had been delivered. According to its capability plans, the purpose of EPAA Phase 3 is to provide a “robust Intermediate-Range Ballistic Missile (IRBM) defense.” Figure 1 depicts the weapon systems that DOD deployed in support of the European Phased Adaptive Approach capability. As we have previously reported, MDA encountered numerous challenges in an effort to meet its original EPAA goals and we have made several recommendations to improve MDA’s management of its integrated capability efforts, including EPAA, to reduce risk for individual elements and to improve testing practices overall. For instance: In January 2011, we recommended that DOD develop life-cycle cost estimates and establish an integrated schedule for EPAA. DOD partially concurred and concurred, respectively, to the recommendations. An independent life cycle cost estimate was prepared, however an integrated schedule that produced sufficient detail was never completed. In April 2012, we recommended that DOD assess the extent to which the dates announced by the President in 2009 are contributing to concurrency and recommend schedule adjustments where significant benefits can be obtained. DOD did concur with this recommendation, however never included a specific assessment of the extent to which capability delivery dates for the European Phased Adaptive Approach announced by the president in 2009 were contributing to concurrency; instead, it asserts that BMDS technology development is fundamentally driven by completion of technical milestones, not schedule declarations. In May 2017, we recommended that MDA address deficiencies in its testing scheduling policy to better align it with best practices for scheduling. DOD did not concur with this recommendation. Consequently, the department continues to allow MDA to schedule and plan its test program without risk analyses, or assigning resources to each test. Unless the department takes action to address these challenges, the department should continue to expect MDA to fall further behind in its test program. In fiscal year 2018, MDA focused additional regional capability efforts on the Korean Peninsula. This new effort was requested by the United States Forces Korea in December 2017 to counter North Korean ballistic missiles. Capabilities for the Korean effort are currently planned for delivery between February 2018 and April 2021, and are based on element-level upgrades as well as integration enhancements between THAAD and Patriot. In December 2017, MDA achieved a significant asset delivery milestone, completing the deployment of 44 operational ground-based interceptors (GBI). In deploying these interceptors, MDA also fulfilled a goal set by the Secretary of Defense in March 2013 to increase the inventory of GMD interceptors from 30 to 44 by the end of December 2017. Although MDA achieved this goal, it did not deliver two of the four GBIs planned for fiscal year 2018. One of the GBIs is intended for use in an upcoming flight test that was delayed to fiscal year 2019. The other delayed GBI delivery was the result of the boost vehicle contractor mishandling the booster avionics module—a critical component that houses the flight computer and navigation systems. The contractor is working on replacing the component but the rework has delayed delivery of the final GBI to fiscal year 2020. Other on-time capability deliveries included the release of new software versions for several major BMDS elements, including C2BMC (Spiral 8.2- 3), BOA 6.1, THAAD (THAAD 3.0), AN/TPY-2 (CX 3.0), and GMD (GS 7A). Another expected software release was Aegis Weapon System (BL 9.2), but that was delayed to at least March 2019 to accommodate verification and validation of models and simulations and to accompany the delivery of the Aegis BMD SM-3 Block IIA. In terms of asset deliveries, specifically interceptors used to counter enemy missiles, MDA successfully delivered all 53 THAAD interceptors specified in the baseline for fiscal year 2018, as well as an additional five interceptors the delivery of which had been delayed from the previous year. For a summary of MDA’s asset delivery status for fiscal year 2018, see table 2. Although MDA made a number of deliveries, including all planned THAAD interceptors, it did not meet its fiscal year 2018 asset delivery goals due to a variety of factors. The Aegis BMD SM-3 Block IB program, which received full production authority early in fiscal year 2018 after years of delays, delivered 12 of 36 planned interceptors in fiscal year 2018. This shortfall was due to the discovery of a parts quality issue that necessitated suspending deliveries until MDA could complete an investigation of the issue’s impact on the interceptor’s performance. In addition, the Aegis BMD SM-3 Block IIA program delivered one of four planned test interceptors due to a flight test failure early in the year suspending further deliveries pending completion of a failure review board. Moreover, according to MDA officials, construction contractor performance issues will result in the Aegis Ashore Missile Defense System Complex—Poland not being delivered until at least 18 months after the planned December 2018 date. As discussed later in this report, this facility is central to MDA’s plans for the EPAA Phase 3, such that a delay in the completion of this facility resulted in a delay in the planned EPAA Phase 3 delivery to the warfighter. MDA conducted seven fiscal year 2018 flight tests as planned, and during one of those seven the interceptor failed. According to MDA’s Integrated Master Test Plan, MDA scheduled eleven flight tests of the systems included in our review. MDA’s ability to adhere to its flight test schedule for fiscal year 2018 was hampered by several issues, including technical challenges, test failures requiring new tests to be inserted into the schedule, and range and target availability. Of the four tests not conducted, MDA delayed two to future fiscal years, and deleted two, with their objectives planned to be mostly fulfilled by separate events. Table 3 highlights MDA’s fiscal year 2018 flight tests. MDA also added several test events to its schedule over the course of fiscal year 2018. They are listed below in table 4. The two most significant flight tests scheduled for fiscal year 2018 were delayed into fiscal year 2019. Specifically, FTG-11, GMD’s first salvo test (launching multiple interceptors at a single target), was delayed until the second quarter of fiscal year 2019 to accommodate other BMDS testing priorities while GMD fixed software issues uncovered during pre-test planning. In addition, FTO-03 Event 1, a test designed to assess the Aegis BMD SM-3 Block IIA capability against an IRBM was to be the first (and only) operational test of the EPAA Phase 3 architecture before MDA delivered the capability. This test was delayed to accommodate the demand for range and test assets following the insertion of a new test into the schedule. Fiscal year 2018 legislation expanded and accelerated several MDA programs. In December 2017, Congress passed and the President signed into law the Department of Defense Missile Defeat and Defense Enhancements Appropriations Act, 2018 (MDDE), which increased missile defense appropriations. The MDDE provided approximately $2 billion in appropriations for missile defense. MDDE provided funds in support of plans that would expand and accelerate several missile defense programs beyond the agency’s previous baselines. According to MDA, the administration directed the Secretary of Defense to develop options for accelerating missile defense capabilities in response to North Korea flight testing a new intercontinental ballistic missile in July 2017. According to MDA, it collaborated with Office of the Secretary of Defense and the Joint Chiefs of Staff to identify programs and capabilities that could be accelerated and delivered within the current Future Years Defense Plan and directly address the North Korean missile threat. DOD then took those options back to the administration to finalize the MDDE plan, which was subsequently presented to Congress. These plans most significantly affected the GMD program and the Aegis BMD SM-3 Block IIA. Under the plans and with the funds provided by MDDE, the GMD program will increase its inventory from 44 GBIs to 64 GBIs by 2023. Each of these new interceptors will be equipped with the Redesigned Kill Vehicle (RKV), accelerating the latter program’s schedule by approximately one year. MDA also intends to use $451 million from MDDE to procure 16 additional Aegis BMD SM-3 Block IIA interceptors. The Aegis BMD SM-3 Block IIA program was still in development at the time, and these funds represented the first time Congress appropriated procurement funds, and not research and development, for the program. The RKV program, in part to support the accelerated schedule, adopted a new program schedule that required concurrency in some areas. As we previously reported, the original RKV strategy avoided concurrency by aligning production decisions with flight testing. However, to accommodate the newly accelerated schedule, the program began procuring some components before completing qualification testing. Under this new plan, qualification testing would only be completed around the same time as the planned first flight test. MDA’s contracting plans for the RKV have been closely aligned to the test schedule, to the point that MDA will have more than half of its planned RKV buy under contract before conducting a successful intercept test. The program planned to award a production contract for Lot 1 and the long-lead materials contract for Lot 2 following a major design review, but before the first flight test. Following the first flight test (CTV-03+) in first quarter fiscal year 2020, the program planned to award a production contract for Lot 2 and long-lead materials for Lot 3. Upon completion of the first intercept test (FTG-17) in the first quarter of fiscal year 2021, the program planned to award the production contract for the final planned lot, Lot 3. Through the course of fiscal year 2018, the RKV program has been unable to meet its cost and schedule milestones. Specifically, the prime contractor has reported accumulating negative cost and schedule variances with no signs of arresting these trends. The contractor also reported inefficiencies stemming from bringing large numbers of new staff onto the project, as well as requiring more personnel for the project than they originally anticipated. According to MDA, as fiscal year 2018 progressed, the program discovered that some components would not meet performance requirements. MDA therefore postponed the critical design review from fiscal year 2018 to fiscal year 2021. Moreover, MDA no longer plans to achieve its goal of fielding 64 interceptors by 2023. In addition, MDA anticipates RKV’s total cost has increased by nearly $600 million as a result of the design issues. See appendix VI for information on RKV and the GMD program. The Aegis BMD SM-3 Block IIA schedule planned for an initial production decision in fiscal year 2018, but one month after the MDDE’s enactment, the program experienced its second consecutive failure in a significant flight test—FTM-29—that introduced significant uncertainty into the Aegis BMD SM-3 Block IIA’s schedule. In an effort to maintain the program’s schedule, the Undersecretary of Defense for Acquisition and Sustainment in an Acquisition Decision Memorandum provided selective authorization to use procurement funds. The memorandum placed a cap on how much the program could spend, and had a list of approved “pacing items” (which excluded parts still under investigation for the test failure) on which the funds could be spent. Under the terms of the memorandum, MDA would have to meet a series of requirements to lift these limitations, such as completion of the failure review board and implementation and demonstration of corrective actions. MDA operated under these limitations for the remainder of the fiscal year. MDA used undefinitized contract actions (UCA) in fiscal year 2018, particularly in programs receiving MDDE appropriations. In May 2018, we found that MDA’s use of UCAs in recent years had increased in both total not-to-exceed value and in the length of the undefinitized period. While MDA improved its performance in timely definitization of these contract actions in fiscal year 2018, the total not-to-exceed value of the undefinitized contract actions MDA initiated in 2018 far exceeded previous years we reviewed. UCAs allow work to begin on a program before the government and contractor have agreed to all contract terms, such as price or scope. MDA states that undefinitized contract actions are necessary, particularly in the case of programs accelerated by the MDDE appropriation, because they allow work to begin immediately. Coming to agreement on all terms before beginning work would have added months to program schedules that, MDA stated, could not accommodate such a delay. Undefinitized contract actions are permitted under the Defense Federal Acquisition Regulation Supplement, but we have found in the past that the use of these contracts can pose particular risks for the government. Examples of recent UCAs follow: In October 2017, MDA issued a sole source undefinitized contract action for $60 million (according to DOD and MDA, the value was later increased to $88 million) for the purposes of transitioning the Aegis BMD SM-3 Block IIA program from development to production. This work will improve the manufacturing readiness of the contractor’s production facilities, with the goal of eventually supporting a production rate of two interceptors per month. According to MDA officials, definitizing this contract action proved difficult. The contractor’s initial cost and fee position were substantially higher than MDA’s and independent government estimates, even after those estimates were revised upwards when they were found not to include costs specific to the Aegis BMD SM-3 Block IIA. MDA initially planned for a definitization in April 2018. By that time, all terms had been agreed to except for the contractor’s fee. According to MDA officials, the parties deadlocked until August 2018, when, with the authorization of the Director, MDA, contracting officials “unilaterally definitized” the contract. MDA officials told us that when a unilateral definitization occurs, the government essentially imposes its terms on a “take-it-or-leave-it” basis, effectively halting negotiations. According to MDA officials, in this case, the contractor acceded to the government’s terms and continued work on the project. When asked about possible consequences to this action, MDA officials stated that it is possible for contractors in this situation to seek administrative relief, but in this case, they stated such an appeal would be unlikely to succeed, and believed the contractor would be unlikely to pursue it. It is also possible, officials said, that the contractor would either be reluctant or refuse to accept an undefinitized contract action from MDA in the future. In fiscal year 2017, MDA issued a sole source undefinitized contract action for the design and initial production of the RKV. This contract had a not-to-exceed value of $1.1 billion. MDA issued the contract with an estimated definitization date of May 14, 2018. Despite the issues encountered by the RKV program described above, MDA reported that it definitized this contract action on schedule in May 2018, for the same price as the original not-to-exceed value, $1.1 billion. MDA issued several undefinitized contract actions in 2018. For example, in April 2018, MDA issued a sole source undefinitized contract action for the production of Aegis BMD SM-3 Block IIA “pacing items”, with a not-to-exceed value of $387 million. The Undersecretary of Defense for Acquisition and Sustainment issued a memorandum stating the circumstances under which MDA could obligate additional procurement, defense wide funds. MDA officials stated that “pacing items” were those items whose lead times were not long enough to qualify for long-lead procurement, but which were still substantial enough (more than 2 years) to cause delays if their production waited until the successful completion of operational testing. These officials also explained that the pacing items excluded any components which were still under investigation for the failure of FTM-29. Before that test’s failure and the ensuing involvement of the Undersecretary, MDA planned for a not-to-exceed value of $672 million. MDA initially planned for a definitization date of December 2018, but it has since been delayed. MDA issued its largest undefinitized contract action for the fiscal year (as measured by its not-to-exceed value of $6.56 billion) in January 2018. For the past several years, the GMD program planned to transition away from its all-inclusive contract to a structure involving three new contracts: one for systems engineering, integration, and testing; one for ground systems readiness, operations, and support; and one for all-up round interceptors. This Development, Operations and Sustainment, and Production approach would have been a significant undertaking. It would have required that MDA take control of the technical baseline for the entire program. MDA also believed that this strategy would provide for enhanced competition and reduced organizational conflicts of interest. With the MDDE appropriation and associated program acceleration, the Director, MDA decided that managing the transition to this new contracting strategy, in addition to fielding 20 new ground-based interceptors was too risky. Thus, MDA issued an undefinitized contract action that provided a six-year extension to the main development and sustainment contract for GMD. The contract action has a not-to-exceed value of $6.56 billion, a value higher than that for all undefinitized contract actions issued by MDA in the previous 5 years combined. MDA was able to definitize most elements of this contract in March 2019. Figure 2 illustrates MDA’s increasing use of undefinitized contracts as measured by the sum of their not-to-exceed values. In fiscal year 2018, MDA delivered regional capabilities to counter threats from North Korea, but did not meet all of its 2018 goals for its effort in Europe to counter intermediate-range ballistic missile (IRBM) threats from Iran, known as the European Phased Adaptive Approach (EPAA) Phase 3. Specifically, the agency delivered planned upgrades and additional assets for the Korean Peninsula—an effort it began in 2017. However, the delivery of the third and final phase of the EPAA has been delayed by 18 months. Despite this delay, testing intended to demonstrate EPAA Phase 3 capability has been significantly reduced and de-scoped or deferred past the new delivery date, which reduces the warfighter’s insight on the system’s capabilities and limitations. MDA delivered upgrades on time to the Korean Peninsula in February and September 2018. Notably, the upgrades provided initial integration between THAAD and Patriot—key elements of the effort in Korea— improving THAAD and Patriot’s ability to coordinate during engagements. MDA also delivered element-level upgrades for THAAD, including additional interceptors, as well as a new software release that expanded THAAD’s ability to counter new threats and improved its performance in the presence of debris. These upgrades were assessed in an April 2018 flight test that demonstrated interoperability between THAAD and Patriot by exchanging Link-16 messages over tactical data links while tracking a missile target, and an April 2018 BMDS-level ground tests that provided further performance data for these upgrades in a simulated environment. MDA plans to deliver additional capabilities for the Korean Peninsula in the future. We currently have ongoing work related to these areas. Details will be included in a future report. MDA’s effort to deliver the third and last phase of the EPAA has been delayed from December 2018 to May 2020. MDA planned to deliver the EPAA Phase 3, for defense against IRBM threats, at the end of calendar year 2018, but construction delays for Aegis Ashore, the linchpin of Phase 3, delayed its completion by 18 months. In fiscal year 2018, the delay for EPAA Phase 3 was caused by challenges at the construction site for Aegis Ashore in Poland. According to MDA officials, delays to the Aegis Ashore were primarily driven by military construction contractor performance issues. As these delays continued to accumulate, MDA initially planned to make up for them by increasing concurrency between the construction phase and the installation and checkout phases of the project, and concurrently working at the sites in Romania and in Poland. As we previously reported, these increasing levels of concurrency posed a growing risk for the program and its ability to achieve its target delivery date. In March 2018, MDA officials recognized that plans for Aegis Ashore had become untenable, and the project’s schedule would have to be extended. This plan required the development of a new delivery schedule for EPAA Phase 3 resulting in delivery in May 2020. MDA experienced testing disruptions throughout the EPAA Phase 3 development, including delays and failures, but overcame some of them in fiscal year 2018. The consequence of the testing disruptions is that EPAA Phase 3 will be delivered to the warfighter with less data than planned about performance against planned threats. According to DOD’s acquisition guidance and the BMDS Warfighter Capability Acceptance document, testing is fundamental to ensuring that DOD acquire a system that works, and to provide data necessary to characterize the system’s effectiveness in operational settings. Thus, the warfighter relies on testing to understand the system’s capabilities and limitations and therefore how to fight with what MDA has built. As we previously found, EPAA Phase 3 testing disruptions started in 2016, when MDA delayed the first and second intercept flight tests of the Aegis BMD SM-3 Block IIA, the interceptor planned for fielding in EPAA Phase 3. Although this test was successfully conducted in February 2017, testing difficulties continued when it failed the second intercept flight test. MDA continued to experience challenges with testing necessary to demonstrate the EPAA Phase 3 capability in fiscal year 2018, which resulted in less robust testing. Specifically, as we discussed earlier in this report, the interceptor failed its first intercept test, FTM-29, against an intermediate range target, EPAA Phase 3’s intended threat. Following a failure investigation, and developmental work, MDA rectified the Aegis BMD SM-3 Block IIA design flaws and successfully demonstrated them against a medium-range ballistic missile target in October 2018, during FTM-45. MDA decided to use a medium range target in this test and concluded that it was sufficient to assess Aegis BMD SM-3 Block IIA fixes. However, according to MDA documentation, the test against a medium range target does not provide the same challenges as an intermediate range target. In December 2018, it successfully demonstrated for the first time an intercept of an IRBM during a test called FTI-03, previously called FTO-03 Event 1. While this test was successful, its scope was reduced from an attempt against a raid of two targets to instead a single intercept, in part, due to a test range safety asset malfunction. With these flight tests, according to MDA officials, it completed its flight testing requirements for EPAA Phase 3 delivery and that adding additional tests would be disruptive to their overall test plan. Our analysis indicates that flight testing to demonstrate EPAA Phase 3 performance against IRBMs—the goal of Phase 3—has been reduced by 80 percent and even with the added 18-month delay, MDA no longer plans to conduct a flight test against a raid prior to delivery in fiscal year 2020. Figure 3 shows both the original and current plans for demonstrating EPAA Phase 3 performance through flight testing. Figure 3 above shows that the original plan included five IRBM intercepts across three tests, including tests to assess capability against small raids requiring simultaneous intercepts of multiple missiles—a likely tactic in a real-world attack— prior to delivery of EPAA Phase 3. However, as figure 3 also depicts, the current plan reduces the number of intercept tests against an IRBM and does not include a flight test against a raid until after EPAA Phase 3 capability is declared. Although the delivery has been delayed 18 months, in part due to the delay in construction at the Aegis Ashore site in Poland, the current plan significantly reduces the amount of data needed to support the EPAA Phase 3 capability and limitation assertions. As we previously reported, test and evaluation activities are an integral part of developing and producing weapon systems, as they provide knowledge of a system’s capabilities and limitations as it matures and is eventually delivered for use by the warfighter. Consequently, the 18-month delay provides an opportunity to add in additional tests and an ability to provide further data to the warfighter or to make any design changes discovered during testing. As we previously reported, delivering capability before testing is complete has led to performance unknowns and increases the likelihood of cost increases if future testing discovers any design flaws. MDA made further progress in fiscal year 2018 in its mission to defend the United States and its allies from enemy ballistic missiles, including achieving a significant integrated capability milestone for defending the United States. However, MDA did not meet all of its goals for the fiscal year. Specifically, not all programs delivered all planned assets in fiscal year 2018 and shortfalls were attributed to developmental delays and testing challenges. The acceleration of several programs following a budget increase in December 2017 introduced concurrency, which indicates a familiar risk: accounting for insufficient margin in an effort to meet schedule-driven milestones, rather than pursuing a knowledge- based approach. Construction delays related to another integrated capability, EPAA Phase 3, may, in fact, present an opportunity to build more knowledge in that area. EPAA Phase 3 intends to provide a robust defense against IRBM and raids of multiple targets, but tests to demonstrate that capability have been reduced from five to one with the test against the raid scenario not occurring before the capability is delivered. Our prior work has shown that proceeding with limited test data can result in late, and costly, discovery of performance problems. More thorough assessment of the capabilities and limitations of the system could mitigate that risk by building a more solid base of knowledge. We are making one recommendation to MDA: The Director, MDA, should utilize additional schedule margin afforded by the EPAA Phase 3 delay to conduct additional testing necessary to thoroughly assess the capabilities and limitations of Phase 3 against IRBMs and a raid scenario prior to delivery. (Recommendation 1) We provided a draft of this report to DOD for comment. DOD’s comments are reproduced in appendix IX. DOD and MDA also provided technical comments, which were incorporated as appropriate. In its comments, DOD partially concurred with our recommendation to utilize additional schedule margin afforded by the 18-month delay to the EPAA Phase 3 delivery to conduct additional testing necessary to thoroughly assess the capabilities and limitations against IRBMs and a raid scenario prior to delivery. DOD stated that all EPAA Phase 3 BMDS functions requiring a flight test environment were already successfully demonstrated and MDA has addressed the intent of our recommendation by adding ground tests to further assess EPAA Phase 3 capabilities. However, in order for the agency to meet the full intent of our recommendation, additional flight testing to demonstrate capability against EPAA Phase 3 threats is necessary. Flight testing against IRBM threats and raid scenarios could provide additional confidence in modeled performance, even for aspects of the model that have the achieved accreditation threshold. Our finding is supported by MDA’s own assessment of testing needed for EPAA Phase 3, which originally included five IRBM intercepts and two raid flight tests. These testing requirements were reduced even after EPAA Phase 3 flight test failures and delays. Specifically, our analysis indicates that flight testing to demonstrate EPAA Phase 3 performance against an IRBM has been reduced 80 percent. Moreover, MDA will not conduct a flight test against a raid—a likely tactic in a real-world attack—prior to delivery. As we identified in this report, MDA experienced testing disruptions throughout the EPAA Phase 3 development, which resulted in significant data collection reductions, especially regarding performance against planned threats. According to the Director, Operational Test and Evaluation (DOT&E), these testing challenges, in large part, precluded MDA from testing Aegis BMD against some expected threat types, ranges, and raid sizes. Consequently, the use of models and simulations- based ground tests to supplement such significant reduction in real-world data collections could be problematic. Specifically, we have previously reported that some of MDA’s models and simulations used in its ground tests do not provide realistic representation of the BMDS, the environments it encounters, or the modeled threats. This year, we found that as a result of testing perturbations, certain aspects of Aegis BMD 5.1 will not be validated until after EPAA Phase 3 delivery. Relying on unaccredited models increases chances for modeling errors, and a single undetected modeling error can distort the results for the entire assessment. Lastly, DOD stated that the demands on the test program due to the evolutionary nature of the BMDS acquisition leave no margin (cost or schedule) for adding additional flight tests. While we agree that adding a flight test requires additional costs and coordination, the reductions to EPAA Phase 3 testing constitute a significant reduction in performance data and decreases warfighter’s knowledge base about how best to deploy a system under operationally realistic conditions, such as raids. We continue to believe the 18-month delay affords the schedule to conduct additional flight testing. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, the Undersecretary of Defense for Research and Engineering, and to the Director, MDA. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix X. Key findings for Fiscal Year 2018 Aegis Ballistic Missile Defense (BMD) demonstrated integration with allies. Aegis BMD 5.1 demonstrated increased capability, but testing disruptions delayed its delivery to March 2019 and deferred raid assessment to 2020. MDA re-planned schedules for some future Aegis capabilities due to funding challenges. Aegis Ballistic Missile Defense is the naval component of the Missile Defense Agency’s (MDA) Ballistic Missile Defense System. It consists of the Aegis combat system, including a radar, and Standard Missile-3 (SM- 3) interceptors. MDA is developing the Aegis BMD in versions called spirals that expand on preceding capabilities. Since 2015, MDA has been delivering Aegis BMD spirals that are integrated with capabilities developed by the Navy. These jointly developed Aegis Weapons System Baselines (AWS BL) allow for Integrated Air and Missile Defense (IAMD) where ballistic missiles and air threats (i.e., cruise missiles) can be engaged at the same time. Table 5 identifies Aegis BMD spirals, associated integrated Aegis Weapons System Baselines and key capabilities, and their delivery date. The first suite of integrated ballistic missile defense and anti-air warfare (AAW) capabilities was delivered with AWS Baseline 9.C1/B1, which included an overhaul of Aegis computing architecture. However, in order to expand the number ships with IAMD, MDA also began a program to integrate Aegis BMD 5.0 CU capabilities with the legacy AWS architecture. While initially scheduled for delivery in 2015, Aegis BMD 4.1 was delayed multiple times, and finally in 2017 the delivery was split into two phases. The first interim phase was completed in 2017, but did not provide integration between BMD and AAW capabilities. The second phase will integrate BMD and AAW, and is currently planned for delivery in 2020. Additional upgrades capitalizing on Navy’s improvements to the AWS Baseline 5.4 computing architecture are planned for delivery in 2023. The program is also developing Aegis BMD 5.1 with capabilities to support the final phase of European Phased Adaptive Approach. This spiral is designed to control the new Standard Missile-3 Block IIA and to intercept intermediate-range ballistic missiles. It also includes the Engage on Remote (EOR) capability, where Aegis BMD intercepts a threat before it is visible to its own radar, based entirely on tracks from a forward-based sensor. Aegis BMD 5.1 is integrated with AWS Baseline 9.C2/B2. Additionally, MDA and the Navy are developing AWS Baseline 10.0, which will capitalize on the Navy’s effort to replace the Aegis SPY-1 radar with a more capable SPY-6, and to overhaul the entire Aegis combat system. AWS Baseline 10.0 includes Aegis BMD 6.0 capabilities, which is planned to counter more threat types, larger raids, better discrimination, and improved communication with its interceptors. AWS Baseline 10.0 is planned for delivery in 2023. For specifics on Aegis Ashore and the Aegis SM-3 interceptors, see appendixes II, III and IV, respectively. Table 6 provides key fiscal year 2018 AWS program facts. In fiscal year 2018, MDA demonstrated the ability of Aegis BMD to engage some simple and complex threats as well as integration with European and Asia-Pacific allies for new and legacy spirals. As table 5 above shows, Aegis BMD participated in a number of flight tests and exercises, which provided additional information about its capabilities and interoperability with allies in two regions, where MDA is currently focusing its regional integrated capability efforts. For example: Formidable Shield-17 demonstrated the ability of Aegis BMD 4.0.3, which was delivered in fiscal year 2015, to interoperate with North Atlantic Treaty Organization partners using communication architectures during cruise missile and ballistic missile engagements, and to use remote data provided by NATO partners to conduct remote engagements. Pacific Dragon demonstrated interoperability between U.S. Aegis BMD assets, Japanese destroyers, and Republic of Korea naval assets. JFTM-05 Event 2 demonstrated coordination between U.S. and Japanese destroyers using communications architecture to conduct ballistic missile engagements. MDA demonstrated some aspects of Aegis BMD EOR, as well as the ability of Aegis BMD 5.1 to engage a medium range and an intermediate range ballistic threat, but testing disruptions delayed data available to inform capabilities and limitations of the Aegis BMD 5.1, contributing to a 3-month delivery delay. MDA encountered challenges during tests for Aegis BMD 5.1, which resulted in a reduction of flight tests and delays in collecting data needed to accredit models for a system-level assessment. Specifically, during the conduct of FTM-29, Aegis BMD partially demonstrated EOR capability, lacking full demonstration because the weapon system did not exercise all aspects of communication in the later stages of the engagement due to an Aegis BMD SM-3 Block IIA malfunction. MDA decided not to retest FTM-29 and adjusted its test plan to only demonstrate the fixes to the SM-3 Block IIA in a new test called FTM-45, deferring a full EOR assessment by about a year to the subsequent test named FTI-03. This reduction in flight tests affected MDA’s ability to collect data for model verification which in turn, delayed the delivery of Aegis BMD 5.1. A model is a representation of an actual system that involves computer simulations and is used to predict how the system might perform or survive under various conditions. MDA, as well as independent DOD testing organizations, and the warfighter rely heavily on models to test operational performance that cannot be completely assessed using intercept flight tests because of the system’s scope and complexity and safety constraints. Flight tests, however, provide important information about real-world performance that is used to verify models. In order to ensure that key aspects of Aegis BMD 5.1 performance are well understood at delivery, MDA delayed the spiral from December 2018 to March 2019. This was done in part to allow for analysis from FTM-45 (conducted in October 2018) and FTI-03 (conducted in December 2018). According to the BMDS Operational Test Agency, data from these tests provided key information about Aegis BMD EOR performance— a key capability for Aegis BMD 5.1—that was used to verify its models, which were used to more thoroughly assess the extent of that capability. While EOR data will support Aegis BMD 5.1 delivery, another key aspect of its performance will not be verified until late in fiscal year 2020. Specifically, MDA planned to assess Aegis BMD 5.1 raid performance for the first time in December 2018, but the test was de-scoped to a single intercept due, in part, to a test range safety asset malfunction. The next planned raid assessment is scheduled for the fourth quarter of fiscal year 2020, well after Aegis BMD 5.1 delivery. According to the Director, Operational Test and Evaluation (DOT&E) these testing challenges, in large part, precluded MDA from testing Aegis BMD against some expected threat types, ranges and raid sizes. While some of them were outside of MDA’s control, others stem from decisions about its test plan. For instance, MDA’s inability to assess Aegis BMD 5.1 against an IRBM raid resulted from the malfunction of test range safety assets; however, according to DOT&E, FTM-29 failure is an example of insufficient development testing that should have discovered the SM-3 Block IIA issue prior to the flight test. DOT&E officials told us that they are currently working with MDA to ensure sufficient developmental testing is scheduled and conducted prior to undertaking operational tests. In fiscal year 2018, funding challenges contributed to the delay of MDA and the Navy’s effort to develop integrated AWS Baseline 5.4 and AWS Baseline 10.0. According to MDA program documentation, the delays resulted from funding reductions in fiscal year 2018. However, while AWS Baseline 5.4—which includes BMD 4.1—was delayed entirely from 2019 to 2020, AWS Baseline 10.0 – which includes BMD 6.0—delayed completion of some technical content, but its delivery timeframe did not change. Specifically: Integrated AWS Baseline 5.4 was originally planned to be completed in September 2019, but MDA and the Navy delayed its certification to March 2020. While MDA delivered Aegis BMD 4.1 capabilities in fiscal year 2017, subsequent efforts focused on integrating the ballistic missile defense with the remaining suite of AWS Baseline 5.4 capabilities. According to MDA, the delay to this effort was driven by a $14 million funding reduction to the Navy’s Program Executive Office Integrated Warfare System, which is jointly funding this baseline. As a result of the reduction, MDA received $16 million from the Navy, rather than $32 million it was expecting, to continue work on Baseline 5.4. According to Aegis BMD program officials, to mitigate the nine month delay, MDA renegotiated the associated contract, but it is anticipating approximately $1.5 million increase in fiscal year 2019 and approximately $4 million to fiscal year 2020 costs. MDA and the Navy re-planned AWS Baseline 10.0, after a funding reduction of $31.45 million against BMD 6.0. According to Aegis BMD program documentation, the BMD 6.0 development efforts stopped between January 2018 and May 2018. Program officials indicated that MDA renegotiated the associated contract to reflect the reduced funding, but the stop work and consequent restart incurred additional costs. Specifically, the program estimated that the disruption resulted in cost growth of approximately $51 million across the development timeline between fiscal year 2019 and 2024. Key findings for Fiscal Year 2018 According to Missile Defense Agency officials, deficiencies in the performance of the military construction contractor resulted in a significant delay and increased cost for the Aegis Ashore facility in Poland. The program continues to make progress despite challenges at both the Poland and Romania sites. Aegis Ashore is a land-based, or ashore, version of the ship-based Aegis Ballistic Missile Defense (BMD). Aegis Ashore is designed to track and intercept ballistic missiles in the middle of their flight using Aegis BMD Standard Missile-3 (SM-3) interceptors. Key components include a vertical launching system, interceptors, and an enclosure, called a deckhouse, that contains the SPY-1 radar and command and control system. Aegis Ashore will share many components with the sea-based Aegis BMD and will use future versions of the Aegis weapon system currently in development, including the SM-3 Block IIA interceptor. The Missile Defense Agency (MDA) plans to equip Aegis Ashore with a modified version of the Aegis weapon system software that will share many components with the sea-based Aegis BMD. DOD constructed an Aegis Ashore test facility in Hawaii in April 2014. The test facility has been used to flight test Aegis Ashore, and in some cases, Aegis BMD SM-3 interceptors. MDA deployed its first operational site in Romania in fiscal year 2016 as part of the European Phased Adaptive Approach (EPAA) Phase II. A second site in Poland was scheduled for delivery in 2018 as part of EPAA Phase III. Both operational sites are intended to provide additional coverage for the defense of Europe. The Poland site experienced construction delays over several years until March 2018, when MDA determined with stakeholders that the site would not be complete in time for the EPAA Phase III deadline. MDA has since established a new schedule baseline which delays the delivery of the site by 18 months, to May 2020. For further details on the Aegis Weapon System and Aegis BMD interceptors, see appendixes I, III and IV. Table 7 provides key fiscal year 2018 Aegis Ashore program facts. According to MDA officials, construction of the Aegis Ashore site in Poland has failed to meet schedule milestones from the start of the contract. According to officials, prior to this year, MDA and the Army Corps of Engineers, which manages military construction at the site, have undertaken a number of measures to mitigate or reverse these delays, including modifying contracts to permit joint occupancy of the site, modifying the main contract to provide more granular project data to the Army Corps of Engineers, moving key personnel on site, and adding a second shift. Program officials stated that they also withheld some award fees from the contractor as a result of these delays. Despite these efforts, MDA has found the contractor’s performance is still particularly poor in the areas of construction management, identification, procurement, timely delivery of important materials, and timely hiring of staff with appropriate skills. To make up for these delays, MDA introduced increasing levels of concurrency into its schedule, and shortened key phases of the delivery process. Activities such as Installation and Checkout were shortened from 16.5 months to 6.5 months, and would occur concurrently with the final phases of construction at the site. As recently as last year, GAO reported that additional delays or concurrency at the site would threaten the scheduled delivery date. Through the first quarter of fiscal year 2018, the contractor’s performance did not improve. According to program officials, in December 2017, MDA participated in a meeting with the Army Corps of Engineers, the Navy, and other government stakeholders, and concluded that the schedule for delivery had become untenable and schedule recovery was not possible. MDA later concluded that the site would not be ready for delivery until May 2020, a delay of 18 months. The costs of this delay will be significant. Following the determination of the new delivery date, MDA developed a new project schedule that, officials stated, incorporated historical data from the Romania site, independent outside analysis, trends in the contractor’s performance over time, and the resources that would be required at each stage of the schedule. MDA estimated that the additional efforts by MDA, the Army Corps of Engineers, and the Navy to mitigate the delay and provide assistance through the completion of the project totaled at least $90 million. According to program officials, the construction contract provides for significant liquidated damages, with the current daily assessment in excess of $125,000. MDA continues to oversee work at the Aegis Ashore site in Romania, despite the Navy’s acceptance of the site for operational use. MDA continues work on a variety of remaining items such as seismic hardening, shielding electrical infrastructure against high-energy electro- magnetic pulses, and cooling systems. In the case of cooling systems, the work is the result of the system failing to perform to specifications. MDA has yet to assess the full cost, schedule, and performance impacts of the necessary repairs and modifications, but MDA reported that none of the above issues had any impact on the Romania sites operational availability or performance. In the case of the Poland site, MDA sought to secure the permission of the Polish government to operate the facility’s SPY-1 radar in the 3.1 to 3.5 GHz radio frequency spectrum. This section of the spectrum is important to the full functioning of the Aegis Ashore system, but portions of it have been allocated for commercial use in Poland. MDA was able to de-conflict the operations of its radar with other systems on these frequencies, and in March 2018 secured the approval of the Polish government to operate the SPY-1 radar across the full range of frequencies. Key findings for Fiscal Year 2018 The Aegis Ballistic Missile Defense (BMD) Standard Missile-3 Block IB program received authorization for full production this year and performed successful intercepts in flight tests. Discovery of a parts quality issue partway through the year forced the program to suspend deliveries and thus miss most of its delivery target for fiscal year 2018. The Aegis Standard Missile-3 (SM-3) Block IB is a ship- and shore-based missile defense interceptor designed to intercept short- to intermediate- range ballistic missiles during the middle stage of their flight. The SM-3 interceptor has multiple versions in development or production: the SM-3 Blocks IA, IB, and IIA. Compared to the SM-3 Block IA, the Block IB features an enhanced seeker for improved target discrimination, better engagement coordination capabilities, an improved throttleable divert and attitude control system for adjusting its course, and increased range. The SM-3 Block IB interceptor is linked with Aegis Ballistic Missile Defense (BMD) Weapons System, and Aegis Ashore. For additional information about the Aegis Weapon Systems, see Appendix I and for Aegis Ashore, see Appendix II. Since fiscal year 2015, Aegis BMD SM-3 Block IB production has been delayed by several technical issues. Program officials, in 2015, delayed the decision to enter full-rate production until they could implement further testing and design changes, a decision consistent with a GAO recommendation at the time. In fiscal year 2016, two failures during testing forced a suspension of interceptor deliveries, though the program made up for this backlog in fiscal year 2017. Table 8 provides key fiscal year 2018 Aegis BMD SM-3 Block IB program facts. In February 2017, the Undersecretary of Defense for Acquisition, Technology, and Logistics issued an Acquisition Decision Memorandum requesting an additional flight test for the Aegis BMD SM-3 Block IB before authorizing a full production decision, as well as several independent supporting analyses. The memorandum issued these requirements in support of a planned full production decision in the first quarter of fiscal year 2018. As we previously reported, MDA has delayed full production multiple times over the life of the Aegis BMD SM-3 Block IB which was initially scheduled for fourth quarter, fiscal year 2012. MDA completed the requested intercept test, known as FS-17-4 in October 2017. The test was undertaken as part of NATO’s Formidable Shield naval exercises. In this test, an Arleigh Burke-class destroyer in the northern Atlantic fired an Aegis BMD SM-3 Block IB Threat Upgrade at an MRBM target and successfully intercepted it. With this result, the interceptor was approved for full production. In September 2018, MDA participated in JFTM-05 Event 2, a joint flight test with the Japanese navy, in which a Japanese ship successfully fired an Aegis BMD SM-3 Block IB Threat Upgrade interceptor at a simple separating short-range ballistic missile. MDA participated in and supported the engagement. Upon full production authorization, MDA sought to pursue a multi-year procurement with the prime contractor for 204 interceptors through 2023. While MDA requested and the 2019 National Defense Authorization Act and the Defense Appropriations Act, 2019 authorized this procurement, the program did not receive the funding to support the request. Program officials state that they are still evaluating the impacts on their plan. MDA estimates the procurement will have a projected price of $2.021 billion. During routine component testing, MDA discovered an issue with the Aegis BMD SM-3 Block IB’s throttleable divert and attitude control system (TDACS) resulting in delays of interceptors in fiscal year 2018. According to program officials, MDA employs a “manufacturing surveillance unit” whose purpose is to pro-actively assess component performance and quality at various stages of unit production. Program officials stated that the unit discovered, in January 2018, that one of several thrusters on the TDACS did not perform to specification. In response to this finding, MDA suspended deliveries of the interceptor until it could determine the impact of the deficiency on the interceptor’s performance. According to program officials, MDA contracted with the Applied Physics Laboratory to act as an independent technical authority for the investigation, which took approximately six months. Once concluded, the investigation found that the performance of the component, while below the defined specification, did not endanger the overall operation of the system. The component’s performance was accommodated within the margin the government and contractor built into the overall design, and was acceptable as built as a result. The investigation reached this conclusion in August 2018. MDA closely monitored the function of the component in JFTM-05, during which the system performed nominally. Program officials reported that the prime contractor has experienced similar issues defining and communicating important specifications to subcontractors at various levels of its supply chain. Similarly, the contractor has also had difficulty ensuring that all subcontracted components meet defined specifications. Program officials stated that they continue to take measures to mitigate these issues, including using the manufacturing surveillance team. Key findings for Fiscal Year 2018 A mid-year funding increase accelerated the program's schedule and increased the number of interceptors. The Aegis Ballistic Missile Defense (BMD) Standard Missile - 3 (SM-3) Block IIA experienced a test failure, leading to significant changes to the test plan. The latest development in the Aegis BMD Standard Missile – 3 (SM-3) family, the Aegis BMD SM-3 Block IIA interceptor provides increased speed, more sensitive seeker technology, and a more advanced kinetic warhead as compared to previous versions of the Aegis BMD interceptors. It is expected to defend against short-, medium-, and intermediate-range ballistic missiles, and will have significantly increased range compared to earlier Aegis BMD SM-3 models. Additionally, most of the Aegis BMD SM-3 Block IIA components will differ from other standard missile versions and therefore require new technology being developed specifically for them. For additional information on the Aegis BMD SM-3 Block IB interceptor, see appendix III. Initiated in 2006 as a cooperative development program with Japan, the Aegis BMD SM-3 Block IIA program is an essential component of the European Phased Adaptive Approach (EPAA) Phase 3 architecture, particularly its ability to defend against longer-range threats. According to program officials, the Aegis BMD SM-3 Block IIA interceptor’s range exceeds that of its native radar, thus, the only way to make full use of its extended range is by relying on remote sensor data. For additional information on Aegis Weapon Systems, see Appendix I. Table 9 provides key fiscal year 2018 Aegis BMD SM-3 Block IIA program facts. In December 2017, Congress passed and the President signed the “Department of Defense Missile Defeat and Defense Enhancements Appropriations Act, 2018”, as part of a larger continuing resolution which significantly increased missile defense appropriations. According to program officials, the impetus for seeking these additional appropriations was increased levels of missile development and testing activity from North Korea. MDA intends to use $451 million in procurement funds for the purchase of 16 additional Aegis BMD SM-3 Block IIA interceptors. These were the first procurement funds the program had received. The program had yet to receive an initial production authorization, so all previous manufacturing activity occurred using research and development funds. To this point, however, the Aegis BMD SM-3 Block IIA interceptor had succeeded in only one of its two intercept flight tests, and its ability to engage a longer-range target using remote sensor data, known as “engage on remote”, had yet to be tested. The following month, in January 2018, the interceptor failed an important intercept test, causing significant disruption to the program’s schedule which is discussed below. The Undersecretary of Defense for Acquisition and Sustainment subsequently released an acquisition decision memorandum which laid out near-term limitations on the use of procurement funds for the Aegis BMD SM-3 Block IIA, as well as providing for a series of steps MDA needed to take in order to obligate the remaining funds. These measures included the completion of an independent cost estimate, independent technical risk assessment, the successful completion of a replacement flight test, and the successful completion of the planned operational flight test scheduled for the first quarter of fiscal year 2019. Until MDA could meet these requirements, the Undersecretary authorized MDA to obligate only $162 million for the purchase of a limited subset of “pacing items.” According to program officials, “pacing items” are those with longer lead times for production, but which fall short of the threshold for long-lead procurement. Program officials also stated that the list of pacing items was restricted to components not implicated in the recent test failure. Program officials stated that they expected the Undersecretary to certify that these requirements had been met in the third quarter of fiscal year 2019. In January 2018, MDA conducted flight test FTM-29. In this test, the Aegis Ashore facility in Hawaii fired an Aegis BMD SM-3 Block IIA interceptor at an intermediate-range ballistic missile (IRBM), using remote sensor data, for the first time. After the interceptor launched, its third- stage rocket motor (TSRM) failed to ignite. As a result, the interceptor had inadequate thrust to complete the engagement and failed its objective to intercept the target. As a result of this test failure, MDA faced two challenges: first, identifying and remedying the source of the failure through a failure review board, and second, adjusting the program’s schedule to provide opportunities to confirm these mitigations. MDA and the government of Japan convened a failure review board (FRB) to investigate the causes of the test failure. The board’s conclusions found that the TSRM failed to ignite due to a combination of a faulty arm-fire device (AFD), which initiates the TSRM’s firing, and incorrect programming of the TSRM ignition sequence. In the case of the Aegis BMD SM-3 Block IIA, the AFD contains two linear “chains” of explosive pellets, which then ignite the rocket motor. MDA documents state that the AFD’s manufacturer expects a missile to ignite both chains simultaneously to ensure the highest degree of reliability. The FRB found that the Aegis BMD SM-3 Block IIA’s programming did not fire the AFD’s two chains simultaneously, but one after the other, or “sequentially”. When fired in this manner, quality issues with the AFD that would not have any material impact in a simultaneous firing can cause the AFD to malfunction when firing one after the other. The FRB concluded that the most likely cause of the AFD’s failure was a missing explosive charge in the first explosive chain. When this chain ignited, it fizzled and failed to ignite the TSRM. The fizzle was powerful enough to disrupt the functioning of the second explosive chain, however, which subsequently failed to ignite the TSRM as well. To correct for this error, MDA has changed the programming of the Aegis BMD SM-3 Block IIA to fire the AFD simultaneously. MDA has also instituted new quality measures at the assembly line for the AFD. These measures include additional quality assurance checks to ensure that all explosive pellets are present in both chains, as well as the use of X-ray- like scanners which can look inside a completed AFD to confirm the presence of all of the explosive pellets. Having identified the source of the failure, MDA had to choose what form any new test would take, and how it would impact the remaining schedule, in particular the first operational test of the Aegis BMD SM-3 Block IIA, which also happened to be the first operational test of the European Phased Adaptive Approach (EPAA) Phase III, and the only such test scheduled before MDA declared it ready for delivery. This test, then known as FTO-03 Event 1 (and subsequently re-named FTI-03) was scheduled for the first quarter of fiscal year 2019. One option was for MDA to schedule a scaled-back test, known as FTM- 45, of an Aegis BMD SM-3 Block IIA against a medium-range target. MDA stated that though FTM-29 failed, analysis of sensor data and missile telemetry indicated that the Engage on Remote capability would have succeeded had the interceptor reached the target. Therefore, FTM- 45 could be an “organic” engagement, using only the radar co-located with the interceptor. FTM-45 would need only to test that the mitigations identified by the FRB worked, as well as testing the final phases of the interceptor’s operations which had been interrupted in FTM-29. MDA had a medium-range ballistic missile (MRBM) target it could repurpose for this test, which would limit testing disruptions by not further delaying FTO-03 E1/FTI-03. FTM-45 was MDA’s preferred course of action FTM-45 lacked the support of several external, Department of Defense stakeholders, such as the Deputy Assistant Secretary of Defense for Developmental Test and Evaluation, Joint Functional Component Command Integrated Missile Defense, and Office of the Director, Operational Test and Evaluation. These offices asserted that a complete re-test of FTM-29, known as FTM-29a, provided the most risk reduction in advance of FTO-03 / FTI-03. . MDA opted not to pursue FTM-29a, and cited several reasons. MDA acknowledged the differences between intermediate-range and medium- range engagements, but determined that the actual differences between FTM-45 and FTM-29a were within acceptable margins. FTM-29a would also prove more expensive and more logistically difficult. MDA concluded that FTM-45 met the requirements for risk reduction at the least disruption to the program’s schedule. MDA conducted FTM-45 in October 2018 and FTI-03 in December 2018. Initial reports indicate both were successful. Appendix V: Command, Control, Battle Management, and Communications (C2BMC) Key findings for Fiscal Year 2018 MDA re-planned schedules for some future Aegis capabilities due to funding challenges. MDA delivered Spiral 8.2-1 providing significant performance and cyber improvements, but some fixes were required after fielding. MDA mitigated prior challenges with Spiral 8.2-3 and demonstrated capability upgrades. Uncertainty in Ballistic Missile Defense System-level requirements could disrupt Spiral 8.2-5 schedule. C2BMC is a global system of hardware—workstations, servers, and network equipment—and software that integrates all missile defense elements of the Ballistic Missile Defense System (BMDS). Specifically, it allows users to plan operations, see the battle develop, and manage BMDS sensors. As the integrator, C2BMC enables the defense of a larger area than the individual BMDS elements operating independently and against more missiles simultaneously, thereby conserving interceptor inventory. C2BMC is fielded at U.S. Strategic Command, U.S. Northern Command, U.S. European Command, U.S. Indo-Pacific Command and U.S. Central Command. MDA is developing C2BMC in spirals, or software and hardware upgrades that build upon prior capabilities to improve various aspects of the integrated BMDS performance. The spiral delivered in fiscal year 2018 includes BMDS Overhead Persistent Infrared Architecture (BOA) — a system within the C2BMC enterprise. BOA receives spaced-based sensor information on boosting and midcourse ballistic objects and feeds that data to C2BMC for use in cueing BMDS sensors and weapon systems, and for situational awareness. The agency completed fielding and transition to operations of Spiral 8.2-1 with BOA 5.1 to U.S. Northern Command and U.S. Indo-Pacific Command in January 2018, and Spiral 8.2-3 with BOA 6.1 to U.S. European Command and U.S. Central Command in December 2018. Spiral 8.2-3 will replace Spiral 8.2-1 at the U.S. Northern Command and U.S. Indo-Pacific Command in the third quarter of Fiscal Year 2019. Table 10 provides an overview of C2BMC Spiral upgrades, planned fielding timeframes and associated capabilities, and Table 11 provides key fiscal year 2018 C2BMC program facts. In January 2018, C2BMC completed fielding and transition to operations of Spiral 8.2-1 providing a significant overhaul of the BMDS command and control hardware infrastructure. Spiral 8.2-1, replaced the legacy Spiral 6.4, at the U.S. Northern Command and U.S Indo-Pacific Command. Spiral 8.2-1 improves sensor coverage, ballistic missile track management, and cyber security, optimizing raid size tracking capability and capability for processing new threats to support the defense of United States. Further details on these capabilities follow: Spiral 8.2-1 delivery includes the BOA 5.1, which provides improvements in early missile launch detection, allowing more time for all subsequent BMDS actions. It cues land-based sensors allowing them to acquire threats sooner, allowing them longer time to track and thus improving engagement probability. Spiral 8.2-1 expands the capability for processing of threat tracks, called System Track, from a single sensor—the Army/Navy Transportable Radar Surveillance-2 (A/N TPY-2) —to include additional sensors for homeland defense and BOA. This allows for additional data sources about threat characteristics that C2BMC subsequently provides to other BMDS elements. The delivery of Spiral 8.2-1 also improves cybersecurity. Spiral 8.2-1 replaced Spiral 6.4, which, as we found in May 2018, had cyber vulnerabilities that, if exploited, could have degraded mission capabilities like BMD planning, radar control, track reporting, and situational awareness. Lastly, the program also delivered additional upgrades, to specifically augment BMDS capabilities for the Korean Peninsula. These upgrades were delivered in December 2017 and June 2018, to provide improvements in communication between THAAD and Patriot, and improved cybersecurity in that region. MDA demonstrated Spiral 8.2-1 upgrades in Ground Test-07a and Ground Test-18 Sprint 1. Table 11 above provides an unclassified overview of C2BMC testing completed in support of fiscal year 2018 deliveries. While MDA delivered these upgrades and overcame development challenges, some fixes had to be implemented after deployment. Specifically, as we found in May 2018, MDA identified performance risks for Spiral 8.2-1 that could have affected interoperability with other elements and threat tracking and delayed the delivery to address these challenges. According to MDA’s fiscal year 2018 program management documentation, the program implemented the necessary mitigations to address these challenges; however fixes were also needed to be implemented after the Spiral was delivered. Moreover, the post- deployment fixes required diversion of resources from the subsequent Spiral 8.2-3, delaying demonstration of a certain aspect of that effort. In fiscal year 2018, MDA completed most of its development effort for its next spiral named Spiral 8.2-3. In addition, MDA completed a test, demonstrating new capabilities and mitigations to earlier development challenges. As we found in May 2018, in fiscal year 2017, the program was tracking two element level risks to C2BMC capability needed for EPAA Phase 3 called Engage on Remote. Specifically, program documentation indicated that processing of data about threat missile flight paths, known as threat tracks, had issues that could reduce the likelihood of the successful engagements utilizing Aegis BMD in Engage on Remote scenarios. C2BMC has faced similar challenges with threat tracking capabilities for prior spirals, which required delaying certain aspects of integration with Aegis BMD until fixes were implemented. While the program was addressing the aforementioned performance risks in fiscal year 2018, it encountered additional challenges. First, it needed to divert some resources from Spiral 8.2-3 to implement fixes to Spiral 8.2-1 that were needed after it was deployed. Second, the program needed to divert additional resources to meet a new Warfighter request for geographic redundancy. Specifically, while the original concept was to have 8.2-3 for Central and European Command at the same location, MDA met the Warfighter request by installing the spiral at different locations so that losing one location would not result in the loss of all capability for the Warfighter. Finally, once a key mitigation was completed, the program encountered delays in availability of laboratories needed to assess it. As result, MDA decided to test the mitigation during the GT-07b campaign, along with other Spiral 8.2-3 capabilities. While assessing mitigations for the first time in a large scale campaign is risky – should the mitigation be insufficient or have underseen downstream effects – initial results from GT-07b campaign indicate they were successful. The test demonstrated successful collaboration between Spiral 8.2-3 and Aegis BMD in support the Engage on Remote, as well as other capabilities. Table 11 provides additional information on capabilities demonstrated during GT-07b. While C2BMC program has identified element level requirements for Spiral 8.2-5, requirements for BMDS-level capabilities associated with this spiral are still under development. This Spiral is intended to integrate the Long Range Discriminating Radar (LRDR) and provide additional BMDS- level planning, track processing, and battle management capabilities, in the fiscal year 2021 timeframe, and its acquisition baselines are expected to be included for the first time in the upcoming BMDS Accountability Report. However, according to the November 2018 program execution review, emerging BMDS-level requirements may delay efforts to complete the development of the spiral in time to support LRDR functionality in 2021. Program documentation also indicates that some BMDS capabilities as well as future C2BMC spirals could be at risk of deferral, including the subsequent Spiral 8.2-7. Appendix VI: Ground-based Midcourse Defense (GMD) Key findings for Fiscal Year 2018 MDA continues to increase GMD capacity and reliability. GMD issues uncovered during salvo test planning demonstrate the value of rigorous and frequent testing. MDA recently uncovered major design concerns with the Redesigned Kill Vehicle. GMD is a missile defense interceptor system designed to defend the United States against a limited intermediate and intercontinental ballistic missile attack from rogue states, such as North Korea and Iran. To counter such threats to the homeland, GMD, in conjunction with a network of ground-, sea-, and space-based sensors, launches interceptors from missile fields based in Fort Greely, Alaska and Vandenberg Air Force Base, California. After launching from in-ground silos, the interceptor boosts towards the incoming enemy missile and releases an Exoatmospheric Kill Vehicle to find and destroy the threat. GMD also has ground support and fire control capabilities that the warfighter uses to operate the system. Table 12 provides key fiscal year 2018 GMD program facts. MDA fielded three new upgraded interceptors in early fiscal year 2018, meeting its directive from the Secretary of Defense to increase the total number of fielded interceptors to 44 by the end of 2017. The new interceptors are equipped with an upgraded version of the kill vehicle, called the Capability Enhancement (CE)-II Block I, and boost vehicle, called the Configuration 2. MDA completed production and fielded eight of these new interceptors after successfully conducting its first intercept flight test of the upgraded interceptor in May 2017. Although the program encountered some production challenges with the C2 boost vehicle, such as multiple components initially failing qualification testing, the issues were not significant enough to prevent the program from meeting its December 2017 fielding goal. The upgraded interceptors were designed to be more reliable than their predecessors and their addition to the fleet is intended to improve overall system reliability, as the older interceptors have a greater risk of experiencing in-flight reliability failures. Table 13 below describes the current fleet of 44 fielded interceptors and plans to field an additional 20 interceptors equipped with the Redesigned Kill Vehicle (RKV) and modified Configuration 2 boost vehicle. MDA also successfully completed two ground tests in fiscal year 2018 to provide performance assessment data; develop interceptor shot doctrine and tactics, techniques, and procedures; and assess recent performance upgrades to GMD’s fire control software. In addition to adding more CE-II Block I interceptors, in fiscal year 2018, MDA accelerated RKV development and initiated plans to increase the total number of fielded interceptors to 64 by the end of 2023 in response to a North Korean missile threat escalation in 2017. In November 2017, DOD requested $2 billion for what it called the Missile Defeat and Defense Enhancements, $774 million of which was designated for GMD to: (a) build a new 20-silo missile field at Fort Greely, Alaska; (b) procure long-lead components for four additional interceptors; (c) continue booster development; (d) accelerate RKV development; and (e) add a target to an initial non-intercept RKV flight test. MDA subsequently issued an undefinitized contract action in the form of a sole-source contract modification to Boeing in January 2018 to extend the current GMD development and sustainment contract. The contract modification was awarded with a total maximum value not to exceed $6.565 billion for efforts pertaining to the Missile Defeat and Defense Enhancements and extended the current contract’s period of performance 2023. In March 2019, MDA definitized $4.141 billion of the contract to build the new missile field, among other items, but deferred the production of 20 additional interceptors. According to MDA, this contract modification brings the total cumulative value of the GMD development and sustainment contract, including options, to $10.8 billion. MDA conducted its first salvo flight test of the GMD system, called Flight Test Ground-based Interceptor (FTG)-11 on March 25, 2019 after nearly three decades of GMD development. GMD demonstrated a salvo intercept by firing a CE-II Block I-equipped interceptor followed by a CE- II-equipped interceptor. The leading interceptor destroyed the target representing an intercontinental ballistic missile equipped with countermeasures designed to complicate missile defense operations. With the target reentry vehicle destroyed, the trailing interceptor struck one of the remaining objects, as it was designed to do. Demonstrating a salvo capability is particularly important because, during a ballistic missile attack, the warfighter intends to launch a number of interceptors to increase the probability of successfully intercepting the incoming missile(s). FTG-11 was further delayed from the end of fiscal year 2018 to mid-fiscal year 2019 to accommodate other BMDS testing priorities while GMD fixed software issues uncovered during pre-test planning. MDA initially planned to conduct the salvo test in fiscal year 2006 but subsequent test failures, developmental challenges, and fielding priorities delayed the salvo test to fiscal year 2018. Figure 4 below provides an overview of the multiple times MDA has delayed the salvo test over the years. By mid-2017, GMD began experiencing delays developing a software upgrade that is intended to provide the kill vehicle with the functionality needed for FTG- 11. Around that same time, MDA also realized that its BMDS-level integrated test schedule could not be executed as planned due to a lack of test range and asset availability. According to a May 2018 report MDA submitted to Congress, the agency delayed FTG-11 from the fourth quarter of fiscal year 2018 to the second quarter of fiscal year 2019 to de- conflict the integrated test schedule. Around the time MDA submitted the report to Congress, the GMD program also uncovered performance concerns with the kill vehicle software upgrade that further delayed the software’s completion. As such, the delay to FTG-11 to accommodate other BMDS testing priorities also afforded MDA the time necessary to complete the software improvements and pre-test planning. The performance issues MDA uncovered in pre-test planning for FTG-11 demonstrate the value of rigorous and frequent GMD testing. Congress and DOD have recognized the need for rigorous, operationally realistic GMD testing, including conducting a salvo test. Congress also passed legislation and the president signed into law a requirement for an annual GMD flight test, subject to several exceptions. However, GMD has historically averaged less than 1 test per year whereas Aegis Ballistic Missile Defense (BMD) Standard Missile (SM)-3 averaged over 2.5 tests per year (see figure 5 below). Moreover, GMD’s prior tests achieved less than 50 percent operational realism whereas Aegis BMD SM-3 averaged over 70 percent, according to Director for Operational Test and Evaluation assessments. The warfighter relies on testing to understand GMD’s capabilities and limitations. Without this knowledge, the warfighter lacks the information to operate GMD effectively and efficiently. Although MDA attempted to accelerate RKV development as part of the Missile Defeat and Defense Enhancements, the program accepted too much risk and has since experienced development challenges that set the program back likely by over two years and increased the program’s cost by nearly $600 million, according to the agency. In response to advancements in the North Korean missile threat, MDA accelerated RKV development by concurrently performing development and production and reducing the number of necessary flight tests to produce and field new RKV-equipped interceptors. Moreover, the RKV had already experienced development delays prior to the acceleration and was operating with no schedule margin for any further delays as it approached a critical design review in October 2018. The program subsequently encountered design, systems engineering, quality assurance, and manufacturing issues, which resulted in the program postponing the critical design review. The most significant development issue that emerged in 2018 pertained to RKV’s performance and its planned use of commercial off-the-shelf hardware and re-use of Aegis SM-3 Block IIA components. In multiple previous reports, we raised concerns regarding MDA’s use of these components as well as RKV’s aggressive development schedule. In our May 2017 report, we also recommended that DOD perform a comprehensive review of the RKV. Although such a review could have potentially provided DOD with a better understanding of RKV’s technical and schedule risks, DOD indicated in its response that the comprehensive review we recommended was unnecessary and therefore did not perform the review. Even though some of these risks have since manifested, we continue to believe an independent, thorough vetting of RKV’s acquisition risks is necessary, as we previously recommended. Although RKV continued to carry significant acquisition risks, MDA implemented a recovery plan that attempted to minimize the addition of further risks by opting to prioritize controlling technical risks over preserving the 2023 fielding goal via an aggressive schedule. At the time of our review, the program projected that it would conduct a critical design review for RKV in early fiscal year 2021 followed by a non-intercept flight test in fiscal year 2022, an intercept test in fiscal year 2023, and deployment starting a few months later. The extended design period provided the program additional time to source or design new components before moving forward with testing and production. Production decision gates also remained aligned to the critical design review and subsequent flight tests. The recovery plan also placed greater emphasis on addressing technical risks rather than fielding deadlines to determine RKV’s path forward. Our prior work has shown that stabilizing system design before making major production commitments and relying on knowledge rather than deadlines to make acquisition decisions at key milestones are best practices of successful product developers. MDA’S Deputy Director stated during a March 2019 press briefing that “the best thing to do was to go back and assess that design and take the time to do it right.” The Deputy Director also acknowledged that it would have been the wrong step to do “what the Missile Defense Agency did years ago, which is to go ahead and produce what we’ve got and then deal with reliability issues in the fleet and erode the confidence of the warfighter.” On May 24, 2019, MDA directed the GMD prime contractor, Boeing, to stop all work for the RKV. This action occurred a few days before the issuance of our report and, as such, we were not able to assess the effects and incorporate this information into our report. Key findings for Fiscal Year 2018 Targets program met some of its fiscal year 2018 goals. Target availability will be a risk for the Missile Defense Agency's aggressive test schedule through 2021. Medium Range Ballistic Missile T1/T2 target's continued cost growth and schedule delays have led to limited testing. The Missile Defense Agency’s (MDA) Targets and Countermeasures program (hereafter referred to as Targets program) procures missiles to serve as targets during the developmental and operational testing of independent or integrated ballistic missile defense system (BMDS) elements. Specifically, this program supplies MDA with short-, medium-, intermediate-, and intercontinental-range targets to test, verify, and validate the BMDS elements’ performance in threat relevant environments. As targets are solely test assets, they are not operationally fielded. The number of targets that the program supplies vary based on each element’s requirements and testing schedule. While some targets have been used for years, others have been recently added or are now being developed to more closely represent current and future threats. The quality and availability of these targets is instrumental to the execution of MDA’s flight test schedule. Table 14 provides information on the Targets program’s performance in fiscal year 2018. The Targets program delivered four of eight targets as planned for fiscal year 2018, and delayed the remaining targets based on test schedule requirements and developmental complexities. One target, the intercontinental-range ballistic missile, was delayed 9 months, from the third quarter of fiscal year 2018 to the first quarter of fiscal year 2019, to align with changes to the test schedule for the Ground-based Midcourse Defense (GMD) program. The GMD program discovered some software issues with its system during pre-test planning that had to be resolved prior to moving forward with flight test FTG-11, which will use the intercontinental-range ballistic missile. According to Targets program officials, the Targets program requested that the contractor delay the delivery of the intercontinental-range ballistic missile to avoid dealing with sensitive aspects of the target, such as fueling, that would necessitate special storage of the target. The two intermediate-range ballistic missiles for the BMDS-level operational test FTO-03 E1 were delayed from the second quarter of fiscal year 2018 to the first quarter of fiscal year 2019 to accommodate a new test for the Aegis Ballistic Missile Defense (BMD) Standard Missile-3 Block IIA program following the failure of one of its interceptors during flight test FTM-29. MDA’s decision to conduct a new test—FTM 45—to ensure the cause of failure had been resolved created test range and asset availability issues that necessitated delaying the BMDS-level operational test FTO-03 E1, and the targets for the test, to a later point in time. The one medium-range ballistic missile for flight test FTM-31 was delayed due to developmental complexities and test range availability. The Targets program flew a total of six targets in fiscal year 2018 to support MDA’s flight test schedule, including four short-range, one medium-range, and one intermediate-range, all of which performed nominally. The risk of a target malfunction or failure was lower in fiscal year 2018 than it has been in previous years, because all of the targets had flown in flight tests previously (i.e., none of the targets were new). However, the Targets program is currently planning to fly two new medium-range targets in fiscal year 2019, and the flight tests with these targets either precede or are adjacent to other important tests in MDA’ test plan. We have previously reported that, new, untested targets introduce higher risk for malfunction or failure that can mean costly and time-consuming retests. Accordingly, we recommended that MDA add a non-intercept flight test for each new target type to verify its performance and reduce risks for future flight tests. MDA has not implemented this recommendation and has continued to use new targets during flight tests. The Targets program conducted one of two critical design reviews in fiscal year 2018. A critical design review assesses the final design of a target to ensure that it can proceed into production and testing and can meet its stated performance requirements within cost, schedule, and risk. The Targets program conducted a critical design review for the medium- range ballistic missile type 3 configuration two (MRBM T3c2) target in the third quarter of fiscal year 2018. The MRBM T3c2 is a new target that Targets program officials said involves minimal design because it leverages flight-proven hardware and a significant amount of heritage software from the intermediate- and intercontinental-range targets currently in production. However, the Targets program plans to conduct another critical design review for the MRBM T3c2 target in the first quarter of fiscal year 2019 due to the addition of hit detection software which will enable real-time feedback on the target’s impact points. The Targets program did not complete the critical design review for the short- range ballistic missile type four G (SRBM T4-G) in the third quarter of fiscal year 2018, after it had been delayed a year, from the third quarter of fiscal year 2017. The Targets program subsequently delayed the critical design review for the SRBM T4-G target another year, to the third quarter of fiscal year 2019. According to the Targets program, the delay in the critical design review for the SRBM T4-G is due to some technical challenges associated with developing the target and the contractor’s limited staffing and workload. The Targets program may face challenges providing some targets to support MDA’s test schedule due the aggressiveness and volatility of the test schedule. We have previously found that MDA’s test schedule is aggressive, in that it includes too many tests and little to no margin between tests to ensure executability. Thus, when setbacks occur, such as target or system malfunctions, the margin between tests erodes. MDA relieves pressure in its test schedule by delaying and canceling tests instead of including sufficient schedule margin to ensure executability, as we previously recommended. When the schedule slips for one test, there are often reverberating impacts to other tests. Consequently, MDA’s test plan has continued to be volatile, with frequent delays, cancellations and other changes, which make it challenging for the Targets program to manage all of the resources and schedules for its various targets to ensure successful, on-time availability and execution. When targets are not available for testing as planned, the tests either receive substitute targets which can mean trade-offs in the performance aspects demonstrated during the test or the test is delayed, which prolongs the demonstration of systems for the warfighter. One way that the Targets program has tried to ensure the availability of targets for MDA’s aggressive test schedule is through the use of concurrency—overlap between development, testing, and production—for some targets. We have previously reported that some concurrency is understandable, but committing to production before development and testing is complete is a high-risk strategy that often results in performance shortfalls, unexpected cost increases, schedule delays, and test problems. The Targets program is using concurrency for the MRBM T3c2 target. According to the Targets program, it is using concurrency for the MRBM T3c2 target due to the urgent need to support essential testing within MDA’s test schedule. The first flight test with the MRBM T3c2 target is FTM-31, which is scheduled for the fourth quarter of fiscal year 2019. Qualification testing and production are ongoing and scheduled to be completed in April 2019 (third quarter of fiscal year 2019). The target must be delivered in advance of the planned test date to complete final preparations for transport to the test site. Thus, the Targets program has very little to no time to resolve any issues prior to delivering it for FTM-31, as shown in figure 6. According to the Targets program, late completion of qualification testing or failures that result in major redesigns may delay FTM-31, as well as significantly impact the cost and schedule for this target. Another way that the Targets program tries to ensure availability of targets for MDA’s aggressive test schedule is to maintain aggressive delivery schedules for some targets. For example, the Targets program has an aggressive delivery schedule for its intermediate- and intercontinental-range targets through fiscal year 2021. According to the contractor for the intermediate- and intercontinental-range targets, there are specific time-spacing requirements that the contractor needs in order to produce and configure targets for a test in relation to the production and configuration of targets for other tests. The contractor said that these specific time-spacing requirements are needed due to limitations with the testing, storage, movement, and transport of these targets. Specifically, we observed that the facility where these targets go through final assembly prior to use in a flight test can currently hold two fully assembled intermediate-range targets and the component for one intercontinental-range target which is assembled at the launch site due to its size. As shown in figure 7, almost all of the tests through fiscal year 2021 are at risk of the target not being available as planned. One of the most severe risks to target availability is in fiscal year 2020 when an intermediate-range target is scheduled for a test in the third quarter, followed by a test using dual (i.e., two) intermediate-range targets in the following quarter. According the contractor’s specific time-spacing requirements, it needs five months, but the approximate amount of time between these tests is three months. According to the Defense Contract Management Agency (DCMA), if MDA includes multiple intermediate- and intercontinental-range missions in the test plan within close proximity without accounting for the contractor’s specific time-spacing requirements, it will be, at best, very challenging for the contractor, and at worst, unachievable. The Targets program has a target—the medium-range ballistic missile type one/type two (MRBM T1/T2)—that continues to have cost growth and schedule delays, which we have previously reported. However, this target’s costs have continued to be unstable, and despite changes and rebaselines, the contractor has been unable to meet projections. Figure 8 below shows the cost growth from 2014 through 2018. In 2017, the Targets program conducted a review of the MRBM T1/T2 target to address significant cost growth and set new projections. Again, in 2018, the Targets program and the contractor planned to conduct another review to address additional cost growth since the prior year’s rebaseline. Despite relatively steady periods of performance following a rebaseline, DCMA officials believe that this contractor will continue to have cost growth. The DCMA established that some of the root causes for the cost growth are incomplete contract requirements and program requirements changes. Additionally, MDA and DCMA officials have acknowledged that the contractor did not adequately account for the costs associated with this target at the outset. How much cost growth there will be moving forward is unknown. In addition to cost growth, the MRBM T1/T2 target has continued to have schedule delays due to technical failures, which has led to the decision to forego some testing as a cost-cutting and time-saving measure. For example, the contractor’s first flight of this target has been delayed approximately 5 years beyond the original plan, from third quarter fiscal year 2014 to fourth quarter fiscal year 2019. The primary reason for this delay has been an unusually high number of failures during pre-test qualification testing, according to the DCMA. The DCMA believes that the test failures are due to the elimination of sub-section testing, which it understands the program and contractor initiated as a cost-cutting and time-saving measure. According to DCMA, sub-section testing involves piecing together different components of the target and then testing that sub-section before the target is fully assembled. This type of testing can help the contractor isolate any integration issues between components in a specific area of the target. However, DCMA said that the contractor is testing the components and then fully assembling the target. Once fully assembled, they are conducting testing and experiencing the unusually high number of failures. When these types of failures occur, according to DCMA, the contractor conducts root cause analysis to make corrections and resolve the issue; however, DCMA officials noted that there is no commonality in the root causes. Thus, the contractor may not understand what steps to take to resolve the issue and ensure that the target performs as expected during a flight test. It is currently unclear how the MRBM T1/T2 target will perform during upcoming tests, because of the Targets program’s decision to forego some qualification testing and not confirming the target’s performance through a non-intercept test, as we have previously recommended. However, the Targets program stated it considers the MRBM T1/T2 performance a minimal risk because the MRBM T1/T2 is largely based on a prior target’s design which, according to the program, was successfully flown twice. The MRBM T1/T2 is currently scheduled to fly in two critical tests in fiscal year 2019 and 2020. The first is an intercept flight test for the Terminal High Altitude Area Defense (THAAD) program in the fourth quarter of fiscal year 2019, which supports the delivery of an urgent capability to the warfighter. After this first flight test with this target, the next test with this target is MDA’s third and largest operational flight test of the BMDS to-date—FTO-03 E2—with five targets flying simultaneously and, three interacting weapon systems—THAAD, Patriot, and Aegis BMD. This test is currently scheduled for the fourth quarter of fiscal year 2020. Both of these tests are important and the use of this new target in these tests increases the risk that the tests will not go as planned and that retests may be necessary; however, a retest for FTO-03 E2 would be extremely costly and very difficult to replan. Appendix VIII: Terminal High Altitude Area Defense (THAAD) Key findings for Fiscal Year 2018 THAAD met most of its fiscal year 2018 delivery and testing goals. THAAD is rebaselining to address Joint Emergent Operational Needs for Korea. THAAD may face challenges meeting its aggressive flight test schedule through 2021. MDA and Army closer to resolving the impasse regarding the transfer of THAAD. THAAD is a rapidly-deployable, globally-transportable, ground-based system able to defend against short-, medium-, and limited intermediate- range ballistic missile attacks through a threat missile’s middle to end stages of flight. A THAAD battery is comprised of five major components: (1) launchers, (2) a fire control unit, (3) communications system, (4) a radar, and (5) interceptors. The current program of record includes a total of seven batteries and 660 interceptors. THAAD has delivered all seven batteries to the Army for operational use and plans to continue production through fiscal year 2029 for remaining items, such as interceptors and software upgrades. The Army has THAAD batteries deployed in Guam and South Korea. Table 15 provides key fiscal year 2018 THAAD program facts. THAAD met its fiscal year 2018 goals for deliveries and flight testing. THAAD exceeded the number of interceptors it had originally planned to deliver in fiscal year 2018 because it is recovering from a parts quality issue. The parts quality issue was with a connector in the interceptor, and although THAAD stopped interceptor deliveries in order to resolve the issue, it did not stop interceptor production. Consequently, there was a stockpile of interceptors just awaiting a redesigned connector in order to be delivered. We previously reported on this parts quality issue and noted that interceptor deliveries, with the redesigned connector, resumed in April 2017 and interceptor production and deliveries have been steady since. In addition to delivering the interceptors, THAAD delivered the seventh, and final, battery of equipment. The delivery was later than previously planned to accommodate the Army’s operational timelines and a new software upgrade to improve THAAD’s performance against certain threats and in the presence of debris during the intercept of a threat missile. Although THAAD was successful in delivering its planned assets for fiscal year 2018, it only conducted one of two planned non-intercept tests. Specifically, FTX-36 was canceled due to target availability from an external vendor and its objectives were reassigned to FTX-35, which was successfully conducted in April 2018. FTX-35 supported the material release of the THAAD 3.0 software (i.e., it is available for use by the warfighter) and the requirement for interoperability testing. THAAD is in the process of rebaselining from two separate acquisition efforts, known as THAAD I and II, to a single acquisition effort, known as THAAD III, to incorporate changes to address the United States Forces Korea (USFK) Joint Emergent Operational Needs (JEON). The purpose of a rebaseline is to update a program’s established plans (i.e., baseline) due to a change in requirements, costs, or schedule. USFK JEON is a rapid acquisition effort to field ballistic missile solutions within the next 3 years to improve the defensive posture of Korea. Specifically, the USFK JEON’s ballistic missile solutions are focused on improving integration between THAAD and Patriot as shown in figure 9, which could enable the defense of larger areas and more assets and provide the warfighter greater flexibility in planning and executing defensive actions. In fiscal year 2018, THAAD delivered software upgrades that provided the initial integration between THAAD and Patriot to improve their ability to coordinate when engaging a threat missile, in support of USFK JEON. These upgrades were assessed in an April 2018 flight test—FTX-35—that demonstrated interoperability between THAAD and Patriot by exchanging messages over tactical data links while tracking a missile target, and an April 2018 BMDS-level ground test which provided further performance data in a simulation environment. THAAD currently plans to deliver USFK JEON upgrades through fiscal year 2021. We currently have ongoing work related to this and details will be included in future reports. MDA has nearly tripled THAAD’s flight tests—from three to eight— between fiscal years 2019 and 2021 to support both USFK JEON, an urgent operational need for the Army, and interoperability testing. Consequently, the schedule margin between each test has decreased from more than a year to three to six months. According to our best practices for scheduling, a practical amount of schedule margin is needed to account for risks and uncertainties. In addition, schedule margin can provide time to analyze the results from the preceding test and correct any identified issues before moving forward with further testing which may be reliant on the results of the preceding test. We have previously reported that MDA leaves little to no schedule margin in its flight test schedule to ensure executability and the test schedule is success- oriented, in that it does not plan for failures which makes it difficult to absorb test failures when they occur. In addition to the reduced schedule margin between THAAD’s tests, some of its tests in this timeframe are higher risk. For example, one test will be flying a new, untested target which increases the risks for that test, and another test will be the largest and most complex operational test to- date, flying five targets simultaneously. Therefore, the test schedule is aggressive, complex, and is at risk of not being completed as planned. However, THAAD has not identified its flight test schedule as a risk. Also, THAAD officials and an official from DOD’s Director of Operational Test and Evaluation have asserted that the flight test schedule is doable, if everything goes according to plan, and that the biggest risk is fatigue among the personnel supporting the tests. While THAAD has a generally successful record for conducting flight tests, its current flight test schedule includes almost as many flight tests in 3 fiscal years as it did for the prior 9 fiscal years. Figure 10 below details the changes in THAAD’s flight testing from its previous plan to its current plan. In addition to the increase in testing and lack of margin between tests, another risk to THAAD’s flight test schedule is that some tests have not yet been funded, as shown in figure 10 above. Funding is essential to enable the planning and execution of each flight test. While THAAD is tracking the lack of funding for these tests as a risk, there is no mitigation strategy if all testing to support USFK JEON remains unfunded. If a single test is not funded or executed, the Army will perform a risk-based assessment using the available data to decide whether or not to deploy the capability for use by the warfighter. If THAAD does not conduct the testing as planned, it will forego the demonstration and confirmation of capability performance which leaves the warfighter with the decision to either not use the capability or use it with an increased risk that it may not perform as intended. THAAD officials noted, however, that the Army’s decision to deploy a capability is based on multiple sources of data such as laboratory and ground testing, not just flight testing. MDA and the Army are nearing a resolution regarding the transfer of the THAAD and AN/TPY-2 programs to the Army; however, the resolution will likely resemble the current arrangement wherein MDA maintains primary responsibility through production and the Army operates and sustains them. We previously reported that MDA and the Army were at an impasse over the transfer of the THAAD and AN/TPY-2 programs because MDA was willing to transfer them as-is, but the program cannot meet the Army’s mission requirements and it would take an estimated $10.1 billion to do so. Table 16 lists the differences between the programs of record and the Army’s requirements. When MDA was established in 2002, it was tasked with using existing and new technologies to rapidly develop weapon systems for the warfighter, and once mature, the weapon systems were to be handed over to a military service for production, operation, and sustainment. At this point, MDA has some weapon systems where production is either nearing completion or is complete. Consequently, Congress set forth a requirement in the National Defense Authorization Act for 2018 that MDA transfer all programs in production to the military services by 2021, which includes THAAD and AN/TPY-2. As part of this requirement, Congress requested a status report on MDA’s transfer of programs in production to military services not later than December 12, 2018. MDA prepared a report for the Under Secretary of Defense Acquisition and Sustainment who then requested the deadline be extended to June 2019 to enable further analysis and development of a viable option. However, according to program officials, at a March 2018 meeting between MDA and the Army, the Army stated that it prefers that THAAD and AN/TPY-2 remain with MDA. According to officials, they discussed transferring the sustainment only because MDA is best suited to maintain primary responsibility through production in order to integrate the BMDS and keep pace with the threat, as well as protect resources through the budgetary process. In addition to the contact named above, LaTonya Miller, Assistant Director; Matthew Ambrose; Pete Anderson; James Bennett; Jon Felbinger; Kurt Gurka; Helena Johnson; Joe Kirschbaum; Wiktor Niewiadomski; Steven Stern; Brian Tittle; Hai V. Tran; and Alyssa Weir made key contributions to this report. Missile Defense: Some Progress Delivering Capabilities, but Challenges with Testing Transparency and Requirements Development Need to Be Addressed. GAO-17-381. Washington, D.C.: May 2017. Missile Defense: Opportunities Exist to Reduce Acquisition Risk and Improve Reporting on System Capabilities. GAO-15-345. Washington, D.C.: May 2015. Missile Defense: Mixed Progress in Achieving Acquisition Goals and Improving Accountability. GAO-14-351. Washington, D.C.: Apr. 2014. Missile Defense: Opportunity to Refocus on Strengthening Acquisition Management. GAO-13-432. Washington, D.C.: Apr. 2013. Missile Defense: Opportunity Exists to Strengthen Acquisitions by Reducing Concurrency. GAO-12-486. Washington, D.C.: Apr. 2012. Missile Defense: Actions Needed to Improve Transparency and Accountability. GAO-11-372. Washington, D.C.: Mar. 2011. Defense Acquisitions: Missile Defense Transition Provides Opportunity to Strengthen Acquisition Approach. GAO-10-311. Washington, D.C.: Feb. 2010. Defense Acquisitions: Production and Fielding of Missile Defense Components Continue with Less Testing and Validation Than Planned. GAO-09-338. Washington, D.C.: Mar. 2009. Defense Acquisitions: Progress Made in Fielding Missile Defense, but Program is Short of Meeting Goals. GAO-08-448. Washington, D.C.: Mar. 2008. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost. GAO-07-387. Washington, D.C.: Mar. 2007. Defense Acquisitions: Missile Defense Agency Fields Initial Capability but Falls Short of Original Goals. GAO-06-327. Washington, D.C.: Mar. 2006. Defense Acquisitions: Status of Ballistic Missile Defense Program in 2004. GAO-05-243. Washington, D.C.: Mar. 2005. Missile Defense: Actions Are Needed to Enhance Testing and Accountability. GAO-04-409. Washington, D.C.: Apr. 2004.", "summary": "For over half a century, the Department of Defense (DOD) has funded efforts to defend the United States from ballistic missile attacks. From 2002 to 2017, MDA has received about $142 billion and has requested 46.7 billion through fiscal year 2023 to develop the BMDS. The BMDS consists of diverse and highly complex land-, sea-, and space-based systems and assets located across the globe, including planned sites in Romania and Poland to protect United States forces and allies in Europe. The National Defense Authorization Act for Fiscal Year 2012, as amended, included a provision that GAO annually assess and report on MDA's progress. Among other objectives, this report addresses for fiscal year 2018 (1) the progress MDA made in achieving delivery and testing goals and (2) the extent to which MDA made progress in developing and delivering integrated regional BMDS capabilities. GAO reviewed the planned fiscal year 2018 baselines and other program documentation and assessed them against program and baseline reviews and GAO's acquisition best practices guides, and interviewed officials from relevant agencies. In fiscal year 2018, the Missile Defense Agency (MDA) made progress toward achieving its delivery and testing goals for some of the individual systems—known as elements—that combine and integrate to create the Ballistic Missile Defense System (BMDS). MDA is also making progress testing for integrated capabilities, which are achieved by combining BMDS elements. However, MDA did not meet its planned goals. The figure below shows MDA's progress delivering assets and conducting tests against its fiscal year 2018 plans. MDA delivered a significant integrated capability for defending the United States, meeting a goal set by the Secretary of Defense in March 2013 to increase the inventory of ground-based interceptors by December 2017. Other on-time deliveries included software upgrades and additional assets. However, developmental challenges and testing failures contributed to MDA being unable to deliver all assets as planned. MDA completed four of eight flight tests. MDA successfully conducted testing to support a production decision; however, it was unable to complete its annual test plan due to failures, cancellations, and delays. MDA has delayed the delivery of the BMDS's European Phased Adaptive Approach (EPAA) Phase 3—which is intended to protect allies from Iranian threats—until 2020. Construction contractor issues at the planned Aegis Ashore site in Poland drove the delay. At the same time, testing for EPAA Phase 3 against planned threats has been substantially reduced and other vital testing has been deferred until after delivery. MDA officials consider EPAA testing for Phase 3 delivery complete. However, DOD guidance and acquisition best practices stress the importance of testing to understand the extent of capabilities and how to deploy them. The 18-month delay to EPAA Phase 3 provides MDA an opportunity to conduct additional testing and collect more performance data. This testing could provide the warfighter with more information and confidence in the system's ability to protect our allies against expected ballistic missile threats. GAO is recommending that MDA use the schedule margin afforded by the European Phased Adaptive Approach Phase 3 delay to conduct testing necessary to more thoroughly assess, prior to delivery, the capabilities and limitations of Phase 3 against the expected missile threat. DOD partially concurred with our recommendation. GAO continues to believe the recommendation is valid.", "document_type": "gao"}
{"report": "Federal agencies depend on computerized information systems and electronic data to process, maintain, and report essential information, and to operate and control physical processes. Virtually all federal operations are supported by computer systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these cyber assets. Hence, the security of these systems and data is vital to public confidence and the nation’s safety, prosperity, and well-being. However, computer networks and systems used by federal agencies can be riddled with security vulnerabilities—both known and unknown. These systems are often interconnected with other internal and external systems and networks, including the internet, thereby increasing the number of avenues of attack. Cybersecurity incidents continue to impact federal entities and the information they maintain. According to DHS’s U.S. Computer Emergency Readiness Team (US-CERT), agencies reported 31,107 information security incidents in fiscal year 2018. These incidents involved several threat vectors, such as web-based attacks, phishing attacks, and the loss or theft of computer equipment, among others. These incidents and others like them can pose a serious challenge to economic, national, and personal privacy and security. Safeguarding federal computer systems has been a long-standing concern, with 2020 marking the 23rd anniversary since GAO first designated information security as a government-wide high-risk area. We expanded this high-risk area to include safeguarding the systems supporting our nation’s critical infrastructure in 2003, protecting the privacy of personally identifiable information in 2015, and establishing a comprehensive cybersecurity strategy and performing effective oversight in 2018. Most recently, we continued to identify federal information security as a government-wide high-risk area in our March 2019 high-risk update. Beginning in fiscal year 2015 and continuing through fiscal year 2019, we made approximately 1,700 information security related recommendations. These recommendations identified actions for agencies to take to strengthen their information security programs and technical controls over their computer networks and systems. Nevertheless, many agencies continue to be challenged in safeguarding their information systems and information, in part, because they have not implemented many of these recommendations. As of the end of September 2019, approximately 650 of our prior information security related recommendations had not been implemented. DHS plays a key role in the cybersecurity posture of the federal government and in the cybersecurity of systems that support the nation’s critical infrastructures. Specifically, FISMA gave DHS responsibilities for administering the implementation of agency information security policies and practices for non-national security information systems, in consultation with OMB. One of DHS’s responsibilities is to issue binding operational directives to federal civilian agencies that align with OMB’s policies, principles, standards, and guidelines. These directives apply to the federal civilian agencies that fall under DHS’s FISMA authorities, but do not apply to national security systems or certain systems operated by the Department of Defense or the intelligence community. See appendix II for a list of agencies to which the directives apply. In introducing the authority to issue binding operational directives, the Senate report accompanying FISMA 2014 noted that OMB would continue to have federal information security enforcement responsibilities through its budget powers and its discretion in setting overarching information security policies. Accordingly, OMB has issued several memorandums regarding cybersecurity, including: OMB M-15-01, Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices, required DHS to perform regular scans of public facing segments of federal civilian agency networks for vulnerabilities on an ongoing basis, as well as in response to newly discovered vulnerabilities. OMB has since rescinded this memorandum and replaced it with guidance for fiscal year 2018-2019 (M-19-02). OMB M-15-13, Policy to Require Secure Connections Across Federal Websites and Web Services, requires that all publicly accessible federal websites and web services only provide services through a secure connection using hypertext transfer protocol secure (HTTPS). OMB M-19-02, Fiscal Year 2018-2019 Guidance on Federal Information Security and Privacy Management Requirements, provides agencies with guidance and deadlines to comply with FISMA and reaffirms the value of agencies identifying and prioritizing their high value assets (HVA) as directed by DHS and OMB. OMB M-19-03, Strengthening the Cybersecurity of Federal Agencies by Enhancing the High Value Asset Program, expands the HVA program to support and provide guidance to both Chief Financial Officers Act (CFO Act) and non-CFO Act agencies in HVA identification, assessment, remediation, and incident response. Under M-19-03, an agency may designate federal information or a federal information system as a HVA when it falls under one or more of the following categories: Informational Value. The information, or the system that processes, stores, or transmits the information, is of high value to the federal government or its adversaries. Mission Essential. The agency that owns the information or information system cannot accomplish its primary mission essential functions, as approved in accordance with the National Continuity Policy, found in Presidential Policy Directive 40 (PPD-40), within expected timelines without the information or information system. Federal Civilian Enterprise Essential. The information or information system serves a critical function in maintaining the security and resilience of the federal civilian enterprise. Several entities within DHS have responsibilities for the binding operational directives. The department’s Cybersecurity and Infrastructure Security Agency’s (CISA) Cybersecurity Division is the lead entity for initiating, developing, issuing and overseeing the implementation of the directives. CISA oversees the Federal Network Resilience (FNR) division and the National Cybersecurity and Communications Integration Center (NCCIC) in carrying out specific roles related to the directives. Federal Network Resilience. FNR manages the coordination process for the directives, and oversees implementation of required actions at federal civilian agencies. To do so, FNR collects initial recommendations for new directives, drafts the directives, conducts agency outreach, and tracks agencies’ implementation of the directives. FNR is to collaborate with OMB, NIST, the National Security Council, federal chief information officers (CIOs), and chief information security officers (CISOs) on cybersecurity risk management and operational governance and training; conduct operational assessments for agencies; and assist agencies in identifying areas to improve cybersecurity. National Cybersecurity and Communications Integration Center. NCCIC is the federal civilian coordinator for information sharing concerning cybersecurity risks, incidents, analysis, and warnings with federal and nonfederal entities. The National Cybersecurity Assessments and Technical Services (NCATS), a group within NCCIC, conducts automated network and vulnerability scans of federal civilian agencies’ internet-accessible systems to identify vulnerabilities and configuration errors. Based on these scans, NCATS produces weekly cyber hygiene reports for each agency. The weekly reports describe vulnerabilities detected, affected systems, and mitigation guidance. In addition to the weekly reports, since early June 2019, NCATS has provided agencies with daily notification of any newly detected critical and high severity vulnerabilities. NCATS also conducts reviews of agencies’ high value assets, including security architecture and risk and vulnerability assessments on an ongoing basis. In addition to the DHS components described previously, several other entities assist in coordinating the binding operational directive process. Specifically, DHS’s FNR division coordinates with: Chief information officers and the Federal CIO Council: Federal agencies’ CIOs and the council serve as a source of input for new directives. The council is the principal forum for improving agency practices related to the design, acquisition, development, modernization, use, sharing, and performance of federal information resources. Chief information security officers and the Chief Information Security Officer Council: Federal agencies’ CISOs and the council discuss pending directives. The CISO Council, which is a subcommittee of the Federal CIO Council, collaborates to share information, transfer knowledge, and develop a unified approach to address federal IT security challenges. Small Agency Council: Members discuss pending directives and the potential impacts on small agencies. The council is a voluntary management association representing about 80 small agencies. National Institute of Standards and Technology (NIST): NIST experts are to ensure that binding operational directives do not conflict with NIST standards and guidelines. NIST is responsible for developing standards and guidelines that include minimum information security requirements for federal agencies. To this end, NIST has issued guidance to agencies in implementing an information security program. For example, Security and Privacy Controls for Federal Information Systems and Organizations, NIST Special Publication 800-53, provides guidance to agencies on the selection and implementation of information security and privacy controls for systems. General Services Administration (GSA): GSA coordinates with DHS and OMB, on an as-needed basis, to align cybersecurity services offered in its commercial IT contracts with DHS requirements for assessments, penetration testing, and additional cybersecurity services available to agencies, particularly related to HVAs. DHS developed and issued eight binding operational directives from May 2015 through April 2019 to address known cyber threats, risks, and vulnerabilities. These directives instruct agencies to, among other things: mitigate critical vulnerabilities discovered by DHS’s NCCIC through its scanning of agencies’ internet-accessible systems; better secure their HVAs by participating in risk and vulnerability assessments (RVA) and security architecture reviews (SAR) conducted on their assets; and address several urgent vulnerabilities in network infrastructure devices identified in a NCCIC analysis report. Table 1 provides a list of the directives and their issuance dates. DHS designed a process to develop and oversee the binding operational directives, but it has not followed key components of the process. Specifically, DHS has not involved stakeholders early in directive development and has not consistently overseen agencies’ implementation of some directives through validation of reported results. FISMA requires that DHS develop and oversee the implementation of binding operational directives to safeguard federal information and information systems from a known or reasonably suspected information security threat, vulnerability, or risk and to implement the policies, principles, standards, and guidelines developed by the director of OMB, such as OMB memoranda M-19-03 and M-19-02. Pursuant to FISMA, DHS designed and is using a draft process for developing and overseeing the implementation of cybersecurity binding operational directives. According to CISA officials, the department was to follow this process since issuance of the second directive on securing high value assets (BOD 16-01) in June 2016. In October 2017, DHS documented the process, which it has since updated. According to CISA officials, as of January 2020, this document was still in draft and was undergoing internal agency review. According to the draft process, DHS is to engage in five steps to develop and implement binding operational directives (as discussed below and in more detail in appendix III): 1. Identify a potential directive topic and determine the extent to which it needs to be addressed. DHS’s FNR is to identify topics for new directives from a wide variety of sources, including technical assessments, operational findings of cybersecurity issues, and discussions with external partners such as the Federal CIO Council, NIST, or OMB. FNR is to consider, among other things, whether or not a potential directive topic could be best addressed using the directive process, as well as considering its potential value and impact. Once a topic is identified, FNR officials are to conduct research on the topic and solicit feedback from stakeholders, such as DHS CISA representatives, federal agency chief information officers and chief information security officers, and relevant OMB, NIST, and GSA officials. Once the research is completed, FNR is to make a determination on whether to proceed in developing a directive. 2. Develop a draft directive, send it to relevant stakeholders for review, and obtain approval to issue it. After FNR officials develop the draft directive, they are to send it to relevant stakeholders (e.g. CISA, OMB, NIST, and the DHS Office of General Counsel) for a review of the scope and contents of the directives. FNR staff are to incorporate any feedback from stakeholders into the draft directive and then send it to the CISA director for approval and issuance. 3. Distribute the approved directive to all relevant agencies. FNR officials are to notify agencies of the directive’s issuance via an email and a telephone call within 24 hours of the signing of the directive. In addition, FNR may choose to publicly post the directive to the DHS website. After FNR distributes the directive, agencies are to begin to address the directive’s requirements. 4. Implement and report on agencies’ efforts and progress in addressing the directive requirements. A CISA team is to review agency compliance with the directive through directive-related scans and compliance checks. The team is to distribute scorecards that indicate agency compliance with the directive requirements. 5. Close out the directive. DHS is to close a directive after it has validated that all of the requirements listed in the directive have been completed by all federal executive branch departments and agencies; the directive is no longer necessary because it has been revoked, suspended, or codified into law; or the directive needs to be amended. FISMA requires DHS to consult with NIST, consider NIST’s standards and guidelines, and ensure that the directives it plans to implement do not conflict with NIST’s established standards and guidelines. Consistent with this requirement, DHS’s draft process calls for CISA to coordinate with stakeholders, such as NIST and GSA, early in the directive identification process to incorporate their input as a necessary part of executing the directive process. CISA has not coordinated with key stakeholders early in the development process. According to NIST officials in the Information Technology Laboratory/Computer Security Division, which is responsible for working on directive issues, CISA coordinates with them to ensure that a new directive does not conflict with NIST guidance, but does not do so early in the process. Specifically, the NIST officials stated that often DHS did not reach out to NIST on the most recent directives until 1 to 2 weeks before they were to be issued, and then did not incorporate the NIST technical comments that were provided. As a result of the lack of timeliness in DHS’s outreach to NIST, the directives may not include all key technical considerations. In addition, CISA also has not coordinated with GSA on the directives early in the development process. For example, officials in GSA’s Office of the Chief Information Officer told us that CISA did not coordinate with them on vendor issues before the directive on email and web security was issued. CISA officials acknowledged that, in the past, the agency mainly relied on an ad hoc approach to coordination and did not always coordinate early in the planning process with stakeholders, including NIST and GSA, even though early coordination is called for in the current DHS process. CISA officials also explained that, in certain circumstances, they may need to accelerate the development process when a directive needs to be issued quickly due to elevated risk, such as the directive on addressing threats to network devices in response to a specific hacking threat. CISA officials told us that they have begun to have a more formalized coordination process with key stakeholders, including NIST and GSA. NIST officials also noted that DHS and NIST have started regular coordination meetings to discuss directive-related issues earlier in the process. Nevertheless, CISA has yet to determine when in the directives’ development—for example, during early development and at directive approval—coordination with specific entities should occur. Until CISA addresses this, a lack of effective coordination with stakeholders in the early stages of directives’ development process and later in implementation is likely. This could result in directives that do not fully address key technical considerations, leaving agency systems at risk of being exposed to threats or vulnerabilities. FISMA requires DHS to oversee agencies’ implementation of its binding operational directives. To do this, DHS has outlined a process for validating agencies’ reported results as part of the Close Out step of its directives process. As part of this process, CISA is supposed to validate that agencies have addressed all requirements before a directive is considered to be fully implemented. Guidance from OMB and executive orders also emphasize using a risk-based approach to information security. Specifically, to protect against cyber threats, agencies must make decisions about how to most effectively secure their systems and data, based on an assessment of the risks they face. CISA has not validated agencies’ actions on all five selected directives. Specifically, the agency validated the implementation of two directives by using cyber hygiene scanning and provided weekly reports to the 99 executive branch civilian agencies. However, for the three other directives, CISA relied on agencies to self-report implementation and did not independently validate that the requirements had been met. According to CISA officials, the agency had to rely on agency submissions for these three directives because many of the potentially impacted devices were inside the agencies’ networks and were not visible to CISA’s scans, or were weaknesses identified in specific information security processes that CISA could not assess via scanning. For example, one directive required agencies to address vulnerabilities in specified network infrastructure devices internal to the network and then report to CISA either (1) completion of the actions, or (2) a plan of actions and milestones to complete the actions. The officials added that it is the agency’s responsibility to manage its own plan of actions and milestones, including verifications, and that they are not able to independently validate all of the actions because of a lack of an automated mechanism to detect findings inside agency networks and the lack of resources to do manual assessments. While we recognize that CISA does not have the automated tools or capacity to independently validate every self-reported action taken by agencies to meet binding operational directive requirements, CISA can take a risk-based approach to validation. Guidance from OMB and executive orders emphasize risk-based approaches to information security. However, CISA did not take a risk-based approach, and it also did not have a strategy in place to check selected agency-reported actions to validate their completion. Without taking such an approach or having a strategy in place, the likelihood for requirements to not be completely or correctly addressed is increased. This could leave computer networks and systems used by federal agencies riddled with security vulnerabilities—both known and unknown. Agencies’ implementation of the directives has resulted in improvements that better safeguard federal information systems from a known or reasonably suspected information security threat, vulnerability, or risk. For example, according to DHS and agency data, in response to the directive on Critical Vulnerability Mitigation (BOD 15-01), agencies were able to mitigate about 2,500 out of about 3,600 critical vulnerabilities within 30 days of detection. However, not all agencies had been able to address all the directives’ requirements within the required timelines established in four out of the five directives we reviewed. Moreover, DHS faced constraints in implementing the HVA program. Agencies and DHS cited a number of reasons for not fulfilling the requirements, including a lack of resources and technical expertise, as well as vendor constraints and operational issues. The five directives are discussed below and in more detail in appendix IV. The civilian executive branch agencies to which the five selected binding operational directives apply are implementing and reporting on the requirements as called for in the directives. These five directives identify specific requirements to address known cyber threats, risks, and vulnerabilities and time frames for agency compliance, as well as requirements regarding how agencies are to report their progress on implementation of each directive to DHS. However, not all agencies are doing so within the directives’ established timelines (see directive details that follow). Issued on May 21, 2015, BOD 15-01, Critical Vulnerability Mitigation directed agencies to mitigate critical vulnerabilities discovered by DHS’s NCCIC through cyber hygiene scans of agencies’ internet-accessible systems. Agencies were to mitigate critical vulnerabilities within 30 days of NCCIC’s notification. If agencies were unable to mitigate critical vulnerabilities within 30 days, they were to provide plans and status updates to DHS on a monthly basis until each vulnerability was fully addressed. According to DHS and agency data, since the directive issuance in 2015, the federal civilian agencies were able to mitigate about 2,500 out of about 3,600 critical vulnerabilities within 30 days of detection. Specifically, according to NCATS data, as of May 2018, the median number of days agencies were taking to mitigate critical vulnerabilities from the point of initial detection had been reduced from approximately 16 days (May 2015 to May 2016) to 6 days (from May 2017 to May 2018). In addition, the agencies increased the percentage of critical vulnerabilities closed within 30 days of initial detection, from about 58 percent (May 2015 to May 2016) to 85 percent (from May 2017 to May 2018). See table 2 for more information on the critical vulnerability mitigation timeframes. In its fiscal year 2017 report to Congress on federal cybersecurity directives, DHS reported that the agencies were able to address vulnerabilities more quickly due, in part, to DHS setting clear expectations and timelines regarding mitigating critical vulnerabilities through its directive. Prior to the directive, there was no requirement for patching critical vulnerabilities within a certain time frame. As a result of the faster vulnerability mitigation, agencies are reducing the time their systems and networks are exposed to the cybersecurity risks associated with critical vulnerabilities. In addition to the federal civilian agencies’ improvements in critical vulnerability mitigation, the 12 selected agencies showed improvement in the average time needed to mitigate critical vulnerabilities. Specifically, in the third year after the directive issuance, according to NCATS data, four of the 12 selected agencies reported no critical vulnerabilities and five agencies reported a reduction in the average time needed to mitigate them. For example, one agency reduced the time it took to mitigate critical vulnerabilities from about 60 days to about 17 days on average. Further, all of the 12 selected agencies increased the percentage of critical vulnerabilities closed within 30 days of initial detection, from about 61 percent (from May 2015 to May 2016) to about 90 percent (from May 2016 to May 2017). While all covered agencies did not always meet the 30-day requirement, their mitigations were validated by DHS and reached 87 percent compliance by 2017. Officials attributed the recent decline in percentage mitigated to a 35-day partial government shutdown. Figure 1 provides information on the percent of critical vulnerabilities agencies (federal civilian agencies and the 12 we reviewed) were able to mitigate within 30 days, as required under the directive. In April 2019, DHS rescinded BOD 15-01 and replaced it with BOD 19-02, Vulnerability Remediation Requirements for Internet-Accessible Systems. This directive expands the requirements for agencies from addressing only critical vulnerabilities to addressing both critical and high vulnerabilities. Agencies are now required to mitigate critical vulnerabilities within 15 days of the vulnerabilities being identified through NCATS scanning (rather than within 30 days, as previously required), and to mitigate high vulnerabilities within 30 days of identification. According to the directive, if agencies are not able to mitigate the identified vulnerabilities in the required timeframes, they are to submit a remediation plan to DHS outlining constraints, interim mitigation actions, and estimated completion dates. Issued on September 27, 2016, BOD 16-02, Threat to Network Infrastructure Devices, addressed several urgent vulnerabilities in network infrastructure devices identified in an August 2016 NCCIC report. The report identified a known threat across federal networks and provided technical mitigation solutions. Specifically, it addressed hacking tools targeting firewalls, Cisco Adaptive Security Appliance devices, and devices running Cisco Internetwork Operating System (specifically the integrity of its ROM Monitor program). This directive required agencies to perform all mitigation actions identified in the NCCIC analysis report within 45 days, and to report either full mitigation or provide a detailed plan explaining constraints preventing mitigation. Agencies that were unable to achieve full mitigation within 45 days were instructed to provide monthly status updates until full mitigation was completed across their networks. According to DHS’s March 2019 report to OMB, within 6 months of issuance, the federal civilian agencies were able to remediate approximately 50 percent of impacted devices through patching and through upgrading outdated software. CISA reported that agencies completed all requested actions by October 2018, which was 2 years past the deadline. According to CISA officials, agencies were not able to meet the timeline due to remediation challenges, such as replacing large amounts of end-of-life devices, replacing mission critical devices, and adjusting default configurations on impacted devices. While CISA did not independently validate agencies’ actions in addressing the vulnerabilities as the devices were internal to the network, CISA reported that agencies secured over 11,000 network infrastructure devices across the federal civilian government (see figure 2). In addition to the federal civilian agencies’ status, five of the 12 selected agencies reported full mitigation of the risks outlined in the directive requirements within the 45-day deadline (November 14, 2016). An additional five agencies did not report full mitigation within 45 days, but provided detailed plans of action and milestones to DHS every 30 days thereafter until full mitigation, as required. These five agencies had completion dates ranging from April 2017 to October 2018. The remaining two agencies were unable to demonstrate that they had completed the directive requirements. However, DHS reported that the covered federal civilian agencies were able to complete all actions associated with this directive by October 2018. Issued on September 13, 2017, BOD 17-01, Removal of Kaspersky- branded Products, required federal civilian agencies to (1) determine whether the agency had Kaspersky-branded products on its information systems within 30 days (October 13, 2017); (2) develop a plan to remove such products from its information systems within 60 days (November 13, 2017); and (3) begin implementing its plan for removal within 90 days (December 13, 2017) and provide DHS with updates every 30 days until the products were fully removed from agency information systems. According to DHS’s fiscal year 2017 report to Congress, by April 2018, officials from federal civilian agencies had either attested that Kaspersky- branded products were not present on their information systems or removed such products, as required by the directive. Similarly, officials at the 12 selected agencies stated and reported that they performed the required analysis to identify the use or presence of Kaspersky-branded products and reported to DHS by the 30-day deadline (October 13, 2017). Of these, 10 agencies reported that they did not find the use or presence of Kaspersky-branded products in its information systems. One agency found Kaspersky-branded products in its systems but removed the product before the 60-day planning deadline. The remaining agency identified the use or presence of Kaspersky-branded products in its information systems and developed a detailed plan of action and provided status reports to DHS every 30 days until completion on December 6, 2017. Subsequently, these requirements were enacted into law in the National Defense Authorization Act for Fiscal Year 2018, which further prohibited federal agencies from using products and services developed or provided by Kaspersky Labs. Issued on October 16, 2017, BOD 18-01, Enhance Email and Web Security, required agencies to implement specific security standards that have been widely adopted in industry to ensure the integrity and confidentiality of internet-delivered data, minimize spam, and better protect users who might otherwise fall victim to a phishing email that appears to come from a government-owned system. As such, this directive required several actions related to email and web security with three different due dates: within 90 days (by January 2018), within 120 days (by February 2018), and within 1 year (by October 2018). Tables 3 and 4 outline the email and web security requirements and appendix V provides more detailed information on these requirements. The federal civilian agencies had made significant progress in addressing individual email and web security requirements of the directive. However, few agencies had fully addressed all of the directive’s email and web security requirements for all domains. A domain is a unique identifying address assigned to an internet-accessible system such as .gov or dhs.gov, and an individual agency may have multiple domains. NCATS scans each agency domain and measures it against the individual email and web requirements. According to our analysis of NCATS’ May 2019 scanning data, the agencies were between about 83 to 99 percent complete in addressing each individual email and web requirement across all domains (see figure 3). Similarly, three of the 12 selected agencies, were 100 percent complete in addressing each individual email and web requirement for all domains. In addition, the remaining nine agencies’ domains were from about 82 to almost 100 percent complete in addressing the individual email and web requirements. However, according to NCATS’ March 2018 agency scanning data, only three of 83 agencies (4 percent) had fully addressed all of the directive’s email and web security requirements due within the 120 day deadline across all of their domains. Within 1 year of issuance, according to NCATS’ October 2018 scanning data, six of 83 agencies (7 percent) had fully addressed all directive requirements. According to NCATS’ May 2019 scanning data, three additional agencies fully addressed the requirements. However, three agencies had fallen out of compliance (leaving the total compliance rate at 7 percent). Compliance with the email and web security requirements was slightly better for the 12 selected agencies. According to NCATS’ March 2018 scanning data, one of the 12 selected agencies fully addressed the directive’s requirements due at the 120 day deadline (8 percent). Within 1 year of issuance, according to NCATS’ October 2018 scanning data, one additional agency fully addressed the requirements (17 percent). According to NCATS’ May 2019 scanning data, three of the 12 agencies fully addressed the requirements (25 percent). See figure 4 for details. One of the key challenges that agencies have experienced in implementing the directive’s email requirements is related to strengthening email security by disabling the 3DES weak email cipher. Specifically, according to CISA’s March 2019 report to OMB, more than 50 agencies are dependent on email vendors that do not allow agencies to disable the 3DES cipher. FNR officials stated that after several agencies informed them of having vendor constraints, DHS started to work with vendors on behalf of the agencies. As a result, DHS issued a temporary exception in September 2018, 7 months after the initial deadline, for those agencies encountering this vendor constraint. According to CISA’s March 2019 report to OMB, in February 2019, one of the vendors began retiring the weak email cipher 3DES, but has not set a firm timeline on when it will be fully retired. In a June report to OMB, DHS stated that another email vendor had released a tool that agencies could implement to address the requirement to remove the weak email cipher 3DES. As of the end of April 2019, seven of the 12 selected agencies were affected by this vendor issue. CISA officials noted that they are working with industry officials, including at a leadership level, to ensure they understand when 3DES will be fully disabled. Once that happens, CISA reported that they will provide agencies with any additional support needed to address vendor management issues and the associated email and web requirements. Additionally, FNR officials stated that many agencies struggled to implement a DMARC-related requirement on their systems due to its complexity. FNR officials noted that they have provided agencies with training through a non-profit organization and hosted a variety of outreach events, including presentations, to help agencies work through the complexity of implementing DMARC. Issued on May 7, 2018, the purpose of BOD 18-02, Securing High Value Assets, is to enhance DHS’s approach to secure the federal government’s high value assets (HVAs) from cybersecurity threats. It replaces an earlier directive and requires agencies to: 1. Identify and submit coordination points of contact for HVA assessments within 7 days of issuance of the directive. 2. Submit a current and prioritized HVA list inclusive of all agency components within 30 days of issuance of the directive and review the agency HVA list and provide quarterly updates to DHS. 3. Participate in DHS-led assessments of HVAs, if selected. 4. Ensure identified major or critical weaknesses are mitigated within 30 days of receipt of the risk and vulnerability assessment (RVA) reports and/or security architecture review (SAR); notify DHS that each identified weakness was addressed; and report the status of any remaining major or critical weaknesses to DHS every 30 days until full remediation. As stated earlier, in an RVA, the assessor uses a number of techniques to identify weaknesses in the security posture of a given HVA; for a SAR, the assessor analyzes the architecture of the HVA and develops recommendations for improving HVA security related to system design and interconnections. Techniques for RVA assessments can include network mapping, vulnerability scanning, phishing tests, wireless assessments, web application assessments, and database assessments. A SAR provides a holistic analysis of how an HVA’s individual security components integrate and operate, including how data is protected during operations. According to a DHS report to OMB, assessments can identify HVA weaknesses that require significant network design changes and extended timelines to resolve. In December 2018, OMB issued a memorandum that expanded the definitions of HVAs, instructed agencies to prioritize their HVAs, and instructed agencies to conduct assessments of HVAs as directed by DHS. Subsequently, CISA issued supplemental guidance for BOD 18- 02 that divided HVAs into three tiers based on criticality and impact. The guidance defined Tier 1 systems as systems of critical impact to both the agency and the nation; Tier 2 systems as ones that have a significant impact on both the agency and the nation; and Tier 3 systems as those with a high impact on the agency. In addition, the supplemental guidance outlined the following required reviews: Tier 1 HVAs require one RVA and one SAR to be led by DHS every 3 Tier 2 HVAs require one RVA and one SAR to be conducted by an independent assessor or third party every 3 years, and Tier 3 HVAs require one RVA and one SAR agency self-assessment every 3 years. In response to the directive and supplemental guidance, most of the federal civilian agencies have taken several steps to address the requirements, including identifying points of contact; submitting current and prioritized HVA lists, if appropriate; participating in DHS-led assessments if selected; and beginning to address identified weaknesses. Specifically, CISA’s October 2019 data showed that federal civilian agencies have reported a total of 851 HVAs (212 Tier 1 and 639 Tier 2 and Tier 3 systems). In addition, CISA’s October 2019 data showed that at the beginning of October 2019, DHS had conducted 61 assessments in fiscal year 2018 and 73 in fiscal year 2019. This includes a mix of both RVAs and SARs. DHS has also taken steps to identify major or critical weaknesses from the HVA assessments. Specifically, CISA’s October 2019 data showed that, as of the end of September 2019, the 134 assessments identified 196 major or critical weaknesses. DHS and the agencies have not completed the required assessments and mitigations consistent with OMB guidance and DHS policy. To address the review requirement for Tier 1 HVAs in accordance with the OMB and DHS-defined frequency of assessments, DHS should complete at least a total of 142 assessments a year. However, DHS completed only about half of the required annual assessments this year (with 73 assessments completed in fiscal year 2019). In addition, DHS has yet to issue the guidance, standards, and methodologies for Tier 2 or Tier 3 HVA assessments, which are to be conducted by third parties and agencies, respectively. As a result, agencies cannot begin conducting assessments for the remaining 639 HVA systems. Further, agencies have not been able to mitigate the identified weaknesses within the required timeframes. Specifically, CISA’s October 2019 data showed that of the 196 major or critical weaknesses identified government-wide, agencies were not able to mitigate 160 within the required initial 30-day time frame; 75 major or critical weaknesses were still not mitigated as of early October 2019. Similarly, for the 12 selected agencies we reviewed, CISA’s October 2019 data showed that as of early October, the department performed a total of 58 assessments, which resulted in the discovery of 86 major or critical weaknesses. However, 64 of these major or critical weaknesses were not mitigated within the required initial 30-day time frame, and 32 major or critical weaknesses were still not mitigated as of early October 2019. In addition to the above requirements, DHS established a government- wide performance metric for agencies to address 45 percent of critical/high severity weaknesses discovered through HVA assessments within 30 days of them being reported, as required by the directive. However, DHS reported that agencies were only addressing these weaknesses within 30 days about 30 percent of the time. According to DHS, this shortcoming is largely due to the variety and difficulty of weaknesses identified by affected agencies in each calendar quarter, as well as the different maturity levels of agencies in addressing these weaknesses. Further, the performance metric for addressing the HVA weaknesses is not fully aligned with the directive’s requirements. Specifically, while the directive states that agencies should address weaknesses within 30 days, the directive also states that if the senior accountable officer for risk management at the agency determines that a risk cannot be adequately addressed within 30 days, the agency must develop and submit a remediation plan to DHS for its review. However, DHS’s metric does not provide for such an option. In implementing this directive, DHS recognized the need to measure the extent to which agencies are addressing the requirements and, therefore, improving government-wide cybersecurity. However, without a performance metric that is aligned with the binding operational directive process DHS has established, it will be challenged in demonstrating the overall efficacy of a binding operational directive in achieving cybersecurity goals. Agency and DHS officials reported that agencies faced technical and resource challenges in addressing the various directive requirements within established timelines. This is consistent with challenges reported by officials at the 12 selected agencies. DHS has recognized these challenges and taken actions on them. However, DHS faces a variety of challenges in implementing the HVA program that remain outstanding. Agencies reported various challenges in addressing the directive requirements within the established timelines. The challenges included (1) outdated systems that require costly updates or replacements before they can be brought into full compliance; (2) the lack of specialized expertise to address technical requirements; (3) the complexity of achieving full DMARC compliance; and (4) general issues associated with addressing weaknesses in agency HVAs. To address the first and second challenges (outdated systems and specialized expertise), in its March 2019 report to OMB, DHS provided the following considerations for OMB: (1) examine agency budgets to ensure agencies are deploying all available resources and capabilities against threats to government networks and data; (2) provide supplemental funds to agencies to support implementation of current and future binding operational directives; and (3) examine agency budgets to ensure agencies are deploying all available resources to obtain specialized training for staff or to hire specialized skill sets. According to CISA officials, OMB has contacted agencies that listed budget as a constraint in their plan of action and milestones and is currently discussing how OMB can provide assistance. DHS has also provided support to agencies in addressing the third challenge on DMARC. For example, CISA officials stated that they offer webinars focused on DMARC implementation to those agencies that do not have necessary technical expertise. With regard to the fourth challenge on HVAs, DHS reported that agencies government-wide faced a variety of challenges in addressing the weaknesses in their HVA programs, including issues with network segmentation and vulnerability to phishing attacks. In general, according to DHS, these types of weaknesses may not be easy to address within the required 30 days because they require long term planning and training, system or device procurement, and system integration and testing. The 12 selected agencies concurred with DHS’s view of the challenges they faced in addressing outstanding weaknesses associated with their HVAs. For example, one agency reported an enterprise-level deficiency related to an HVA that requires significant changes to its network design, with a projected remediation timeline of over a year in its plan of action and milestones. Another agency stated that it was unable to fully address a critical weakness within the DHS 30-day timeline, but did develop a remediation plan for the weakness and reported its progress to DHS as appropriate. In addition, another agency reported that it did not fully address a weakness within 30 days and also did not submit the required monthly reports. DHS reported that it has established an HVA Community of Interest with federal civilian agencies to identify and promote best practices within agencies and improve the security and privacy posture of HVA systems. Continued support from OMB and DHS in addressing the technical and resource constraints facing the agencies in addressing the requirements set in the directives will allow agencies to react quickly, efficiently, and effectively to the requirements of the directives. While OMB guidance and DHS policy are clear on DHS’s responsibilities and time frames for the directive on the HVA program (BOD 18-02), DHS has yet to complete its HVA activities in a timely manner. Specifically, the HVA program manager within CISA stated that the department did not have sufficient resources to do all of the required assessments. As noted earlier, thus far, DHS has only conducted about half of the annual assessments required in DHS’s own supplemental guidance. The official stated that the department was now reassessing the prioritization and planning process of the HVA program. Further, CISA officials reported that they do not expect to issue the guidance, standards, and methodologies on Tier 2 and 3 HVAs until at least the end of fiscal year 2020. However, agencies cannot begin conducting Tier 2 third-party or Tier 3 agency self-assessments on HVA systems until DHS develops and issues the guidance, standards, and methodologies for these reviews, potentially leaving these critical systems at risk. Moreover, a CISA official stated that DHS will need to work with GSA to add qualified contractors for Tier 2 assessments to the appropriate GSA contract vehicle. The official stated that there is an ongoing effort with GSA to get contractors for third-party assessments certified by DHS added to the GSA schedule. According to DHS officials from the HVA office, the department is now reassessing key aspects of the program. However, it does not have a schedule or plan for completing this reassessment, or to address outstanding issues on completing required assessments, identifying needed resources, and finalizing guidance to agencies and third parties. Without such a schedule and plan, agencies may continue to face prolonged cybersecurity threats. Although DHS has designed a process to develop and oversee the implementation of binding operational directives, it is not following all the steps in the draft process. Specifically, the department has not involved key stakeholders, such as NIST and GSA, early in the process. Additionally, although guidance from OMB and executive orders emphasize risk-based approaches to information security, CISA did not take such an approach in validating selected agency-reported actions. Until DHS addresses the coordination and validation issues, the likelihood is increased that directives will not fully address key technical considerations and requirements are not fully addressed. Federal civilian agencies have made many significant improvements in cybersecurity by implementing the directives’ requirements. However, an important performance metric for addressing vulnerabilities identified by HVA assessments does not align with the process DHS has established. Further, DHS has only completed about half of the required assessments for fiscal year 2019. In addition, DHS does not plan to issue the guidance, standards, and methodologies on Tier 2 and 3 systems until at least the end of fiscal year 2020. Given these shortcomings, DHS has been reassessing key aspects of the HVA program. However, there was no schedule or plan for completing the HVA reassessment and for addressing the outstanding issues on completing the required assessments, identifying needed resources, and finalizing guidance for Tier 2 and 3 systems. Without such a schedule and plan, agencies may continue to face increased and prolonged cybersecurity threats. We are making four recommendations to the Department of Homeland Security: The Secretary of Homeland Security should determine when in the directive development process—for example, during early development and at directive approval—coordination with relevant stakeholders, including NIST and GSA, should occur. (Recommendation 1) The Secretary of Homeland Security should develop a strategy to independently validate selected agencies’ self-reported actions on meeting binding operational directive requirements, where feasible, using a risk-based approach. (Recommendation 2) The Secretary of Homeland Security should ensure that the binding operational directive performance metric for addressing vulnerabilities identified by high value asset assessments aligns with the process DHS has established. (Recommendation 3) The Secretary of Homeland Security should develop a schedule and plan for completing the high value asset program reassessment and addressing the outstanding issues on completing the required high value asset assessments, identifying needed resources, and finalizing guidance for Tier 2 and 3 HVA systems. (Recommendation 4) We provided a draft of this report to DHS for review and comment. We also provided informational copies of the report to the other agencies involved in the review: OMB; NIST; the Departments of Education, the Interior, Justice, and the Treasury; the Federal Deposit Insurance Corporation; the Federal Retirement Thrift Investment Board; the General Services Administration; the National Aeronautics and Space Administration; the Securities and Exchange Commission; the Social Security Administration; and the Tennessee Valley Authority. In written comments (reproduced as appendix VI), DHS agreed with our recommendations and described steps planned or under way to address them. For example, in its written response, DHS noted that the department is working to formalize a risk-based strategy to validate agency results with an estimated completion date of September 30, 2020. It also added that the department is working with OMB to address the need for independent validation. DHS and NIST also provided technical comments on the draft report, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Homeland Security. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6240 or at dsouzav@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Our objectives were to evaluate (1) the Department of Homeland Security’s (DHS) process for developing and overseeing the implementation of binding operational directives (directives) and (2) the effectiveness of the directives, including agencies’ implementation of directive requirements. To address our first objective, we reviewed DHS documentation, including its policies and process information related to departmental development, approval, and coordination of the directives. We also reviewed DHS written requirements and process for overseeing how agencies are implementing the directives. In addition, we reviewed requirements from law and guidance including the Federal Information Security Management Act of 2014 (FISMA), and memoranda from the Office of Management and Budget (OMB). We evaluated DHS’s process against these requirements. Further, we interviewed officials from DHS, OMB, and National Institute of Standards and Technology (NIST) to obtain their views and verify the information provided. To address our second objective we selected five binding operational directives that had active requirements at the time we were designing our review and analysis in December 2018. These were: BOD 15-01, Critical Vulnerability Mitigation Requirement for Federal Civilian Executive Branch Departments and Agencies’ Internet- Accessible System, issued May 21, 2015. (This directive was revoked and replaced by BOD 19-02, Vulnerability Remediation Requirements for Internet-Accessible Systems in April 2019.) BOD 16-02, Threat to Network Infrastructure Devices (designated as closed by DHS, March 2019), issued September 27, 2016 BOD 17-01, Removal of Kaspersky-branded Products, issued BOD 18-01, Enhance Email and Web Security, issued October 16, BOD 18-02, Securing High Value Assets, issued May 7, 2018 We then randomly selected a sample of 12 agencies from the civilian executive branch agencies, to which DHS directives apply, to determine the extent to which these agencies have taken steps to address the directives’ requirements. Specifically, we randomly selected agencies from among those that had reported actual cybersecurity expenditures of over $30 million in fiscal year 2017 (the most recent data available at the time we began our review). The 12 selected agencies were (1) Department of Education; (2) Department of Homeland Security; (3) Department of the Interior; (4) Department of Justice; (5) Department of the Treasury; (6) Federal Deposit Insurance Corporation; (7) Federal Retirement Thrift Investment Board; (8) General Services Administration; (9) National Aeronautics and Space Administration; (10) Securities and Exchange Commission; (11) Social Security Administration; and (12) Tennessee Valley Authority. We developed a data collection instrument based on the directives’ requirements. We administered the data collection instrument to the selected agencies and collected supporting documentation, such as compliance reports, corrective plans of action/plans of actions and milestones, and remediation plans and responses to the requirements outlined in five directives (15-01, 16-02, 17-01, 18-01, and 18-02). In addition, we reviewed the directives and other relevant requirements as well as DHS’s process for evaluating agency actions to address the requirements and to develop binding operational directive-related performance metrics. We also reviewed DHS’s fiscal years 2018 and 2019 annual performance reports and quarterly performance report updates, fiscal year 2019 reports to OMB, and fiscal years 2016 and 2017 reports to Congress on agencies’ (government-wide) implementation status of binding operational directives. We assessed steps DHS was taking to measure agencies’ performance against DHS’s established metrics. Specifically, we reviewed the 99 civilian executive branch agencies’ and 12 selected agencies’ performance against the specific directives requirements. We analyzed agency documentation, including status reports and plans of action and milestones, as well as scanning data from the National Cybersecurity and Communications Integration Center for both selected agencies and government-wide. We also reviewed DHS performance reports regarding the extent to which DHS’s government-wide performance metrics for mitigation of vulnerabilities on internet-facing systems and for closure of certain vulnerabilities on high value assets align with agencies’ existing requirements from OMB and DHS, such as closure timelines of selected types of vulnerabilities and weaknesses. We compared these performance reports and metrics with existing requirements found in DHS’s directives to assess whether they were aligned. In addition, we reviewed detailed scanning data and output from a data analysis tool from DHS’s database to determine the extent to which the 99 civilian executive branch agencies and our selected 12 agencies are mitigating vulnerabilities on internet-accessible systems and whether or not they are being mitigated within given timeframes. In addition, to analyze the implementation of email and web security requirements, we reviewed detailed scanning data on the status of the 99 civilian executive branch agencies and our selected 12 agencies. To assess the reliability of the scanning data and related DHS analysis that we used to support the findings in this report, we interviewed agency officials to determine the steps taken to ensure the integrity and reliability of the data and reviewed relevant documentation to substantiate the evidence obtained through interviews with agency officials. We determined that the data used in this report were sufficiently reliable for the purposes of our reporting objectives. We supplemented our analyses with interviews of DHS and selected agency officials to obtain their views on the steps they have taken to address the directives’ requirements. We conducted this performance audit from October 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Within the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency’s Cybersecurity Division, the Federal Network Resilience (FNR) is responsible for managing the process for developing and overseeing the binding operational directives, including coordination and implementation. The process is documented in the department’s draft Cybersecurity Division Binding Operational Directives Process and outlines five steps and their substeps: Step 1: Identify and Determine. This step includes three substeps—1.1 triggers, 1.2 business case development, and 1.3 socialization. The identification of a directive begins with a trigger that identifies a particular topic. The trigger may be from an administrative priority, technical assessment, operational finding, or discussions with external entities such as the Federal Chief Information Officer Council, National Institute of Standards and Technology (NIST), Office of Management and Budget (OMB) or a private sector organization. Once a topic is identified, FNR officials conduct research on the topic and solicit feedback from stakeholders. FNR then directs topics to the Binding Operational Directives Discussion Group. According to the draft process, recommended members of this group include representatives from Cybersecurity and Infrastructure Security Agency (CISA) and ad hoc and external partners, such as OMB officials, federal CIOs and chief information security officers (CISO), NIST officials, and General Services Administration officials. During substep 1.1, the group should decide whether to proceed to substep 1.2, business case development for a directives’ topic. The group maintains an online repository for proposed topics, active directives, and topics that have been previously considered, but archived for future use or historical documentation purposes. During business case development, a lead within the discussion group researches risks, threat actors, and mitigation strategies. The group incorporates information from subject matter experts and programs that provide information on current threats facing agencies and mitigation actions (e.g., Continuous Diagnostics and Mitigation and EINSTEIN). Once drafted, the business case is sent to FNR leadership, such as the Director and Deputy Director, for review. In the socialization substep 1.3, the discussion group may obtain additional feedback through various outreach efforts or through CIO, or CISO Council meetings. Step 2: Develop and Approve. This step includes two substeps—2.1 table top and 2.2 BOD material finalization. In step 2, FNR staff draft the directive. A table top exercise is an optional step that FNR staff may take to test required actions at selected agencies. As part of drafting the directive, the FNR staff coordinates with stakeholders, such as National Cybersecurity Assessments and Technical Services (NCATS), OMB and selected other agencies to develop an action plan template. This template instructs agencies on how to track and submit their progress on a particular directive. In addition, the team drafts a communications plan to disseminate directive-related information to agencies and the public. During substep 2.2, BOD material finalization, the action plan template and communications plan are sent along with the draft directive to all associated stakeholders (e.g. FNR, OMB, NIST, and Department of Homeland Security (DHS) Office of General Counsel) for review. After FNR staff incorporate any additional feedback, the draft directive package is then sent to the CISA Director for signature and then release. Step 3: Distribute. This step includes three substeps—3.1 notification, 3.2 baseline evaluation delivery, and 3.3 begin mandatory actions. According to FNR officials, the approval of a directive is the start of several processes in this step. During substep 3.1, all affected federal civilian agencies receive notification through an email and a directive issuance call within 24 hours of the signing of the directive. In addition, the DHS website (cyber.dhs.gov) and the OMB MAX portal may post the directive depending on the content of the directive. The notification of the directive is followed with agency baseline evaluation delivery, substep 3.2. As part of this substep, the validation team, including representatives from NCATS, may deliver baseline evaluations to provide agencies a better understanding of where they stand in addressing the directive prior to issuance, depending on the nature of the directive. In the last substep 3.3, agencies begin mandatory actions as noted in the directive. Step 4: Implement and Report. This step includes three substeps—4.1 action plan submission, 4.2 continuous coordination, and 4.3 implementation and reporting. The step begins with FNR’s establishment of a Binding Operational Directives Implementation Team to manage the requirements of a specific directive. This team includes a technical lead who reviews and tracks agency plan submissions as part of substep 4.1; a validation team whose members validate agency compliance with the directive; and a data analyst, who is to compile all agency-submitted action plans and draft a monthly status report. According to the draft process document, the validation team conducts directive-related scans and compliance checks, and develops and distributes scorecards that indicate agency compliance with directive requirements. For some directives, such as BODs 16-02, 17-01, and 18- 02, DHS relied on agency self-reporting to confirm that an agency had addressed the requirements, and the validation team did not verify compliance. During substep 4.2 FNR staff and the affected agency maintain continuous coordination through email and phone conversations to address any challenges involved with implementing the directive. Substep 4.3 implementation and reporting consists of processes agencies may need to establish internally to address and report on directive requirements until completion, such as points of contact and methods of communication with FNR. The implementation team produces monthly status reports for FNR leadership, such as the Director and Deputy Director, showing which agencies have complied or not complied with directive requirements. Based upon this information, FNR officials decide whether to escalate instances of agency noncompliance. In addition, FNR officials stated that they have a monthly check-in with OMB, during which they provide status reports as well as conduct less formal weekly discussions. For Congress, CISA produces an annual binding operational directives’ implementation report, in addition to responding to more frequent congressional information requests. To date, DHS has submitted two congressional reports for fiscal year 2016 and 2017. According to FNR officials, as of September 2019, the fiscal year 2018 report is undergoing OMB review. Step 5: Close Out. This step includes two substeps—5.1 results validation and 5.2 setting a higher bar. The draft process document describes the following scenarios that may lead to results validation; if a directive: (1) has been completed by all agencies; (2) is no longer necessary because it has been revoked, suspended, or codified into law; or (3) needs to be amended. In the first scenario, once the validation team affirms that the requirements have been met, FNR officials are to notify affected federal agency officials that their agencies have fulfilled all requirements. FNR officials then draft a binding operational directive completion letter that the Secretary of DHS or the Secretary’s designee signs. According to FNR officials, a directive does not fully close out after the Secretary signs a completion letter, because the directive is still in effect even after agencies have fulfilled all of the particular directive’s requirements. If a directive is revoked or amended, FNR officials draft a letter noting the reasons for such actions which the Secretary of DHS then signs. Agencies are expected to adhere to the newly implemented requirement, which is how DHS describes substep 5.2, setting a higher bar. Figure 1 provides the life cycle of a binding operational directive. The Department of Homeland (DHS) had issued eight binding operational directives (BOD) as of October 2019. A full list of DHS’s directives’ numbers and titles with a summary of their corresponding DHS and agency requirements follows. Agencies or departments are to: Review and mitigate the critical vulnerabilities on their internet facing systems identified by DHS’s National Cybersecurity and Communications Integration Center within 30 days of issuance of agencies’ weekly cyber hygiene reports. Within 30 days will provide a detailed justification to DHS outlining any barriers, planned steps for resolution, and a time frame for mitigation, if unable to mitigate vulnerability. DHS’s Federal Network Resilience Division will work directly with the department or agency to attempt to assist or address any constraints limiting expedited resolution of the vulnerability. DHS’s NCCIC will leverage weekly agency scans to track each department or agency’s progress in mitigating its critical vulnerabilities. DHS will provide quarterly cyber hygiene report updates to the OMB to ensure department and agency results are synchronized with OMB cybersecurity oversight initiatives. Agencies or departments are to: Identify and submit the name of a lead point of contact to DHS’s FNR branch within 7 days of this directive’s issuance. The point of contact will be responsible for coordinating the agency’s high value asset assessments with DHS. (Submission of the same information for at least one backup point of contact is encouraged.) Participate in assessments, mitigation, and remediation activities by: Signing a DHS-provided rules of engagement document authorizing DHS to conduct risk and vulnerability assessments on agency high value assets. Beginning to implement DHS-issued mitigation measures listed in this directive’s appendix for agency high value assets Participating in the high value asset assessments authorized by the rules of engagement. Participating in a security architecture assessment for select high value assets, if requested to do so by DHS. Mitigating the high-priority vulnerabilities identified by DHS in the high value asset final assessment report within 30 days of DHS’s receipt of the report or determine that mitigation is not feasible within that time frame. Providing additional status updates every 30 days until all high- priority vulnerabilities have been addressed. DHS will identify agency high value assets for assessment and report their findings to agencies. DHS will validate whether any relevant protections have been appropriately implemented during each high value asset assessment and will provide the agency with a report on the extent of sufficient implementation. If an agency does not comply with the requirements of this binding operational directive, DHS will follow up with each deputy secretary or equivalent, as appropriate. Agencies or departments are to: Perform all actions in the Solution sections of the technical annexes to the NCCIC Analysis Report AR-16-20173 no later than 45 days after issuance of this directive. Report to DHS, through the OMB MAX Connect Portal, either full mitigation or provide a detailed plan of action and milestones explaining the constraints preventing mitigation and the associated compensating controls established no later than 45 days after issuance of this directive. Provide additional reports or plans of action and milestones every 30 days thereafter until full mitigation is achieved. DHS’s NCCIC will continue to analyze information for additional mitigation steps to protect federal networks and will develop technical annexes in the future under this directive as necessary. If an agency does not comply with the requirements of this directive, DHS will follow up with each deputy secretary or equivalent, as appropriate. Perform all actions in the Solution sections of the technical annexes to the NCCIC Analysis Report AR-16-20173 no later than 45 days after issuance of this directive. Report to DHS, through the OMB MAX Connect Portal, either full mitigation or provide a detailed plan of action and milestones explaining the constraints preventing mitigation and the associated compensating controls established no later than 45 days after issuance of this directive. Provide additional reports or plans of action and milestones every 30 days thereafter until full mitigation is achieved. Agencies or departments are to: Report security incidents to the DHS United States Computer Emergency Readiness Team in accordance with the guidelines found at https://www.us-cert.gov/incident-notification-guidelines, which are updated as necessary. Include metric information from the chief information officer, inspector general, and senior agency official for privacy, detailed in the annual FISMA metrics, in the Fiscal Year 2016 Annual Federal Information Security Management Act Reports, found at https://www.dhs.gov/publication/fy16-fisma-documents. Submit CIO, IG, and privacy metrics by November 10, 2016, to OMB and DHS via CyberScope. View the Fiscal Year 2017 Annual FISMA CIO metrics available at https://www.dhs.gov/publication/fy17-fisma-documents and plan accordingly so they can include these metrics in their Fiscal Year 2017 FISMA Reports. DHS will track submission of Fiscal Year 2016 Annual Federal Information Security Management Act Reports and privacy metrics, and follow up with OMB or the relevant agency to address non-compliance as appropriate. Agencies or departments are to: Within 30 calendar days after issuance of this directive, identify the use or presence of Kaspersky-branded products on all federal information systems and provide a report to DHS that includes: A list of Kaspersky-branded products found on agency information systems. If agencies do not find the use or presence of Kaspersky-branded products on their federal information systems, they should inform DHS that no Kaspersky- branded products were found. The number of endpoints impacted by each product. The methodologies employed to identify the use or presence of the products. Within 60 calendar days after issuance of this directive, develop and provide to DHS a detailed plan of action to remove and discontinue present and future use of all Kaspersky-branded products beginning 90 calendar days after issuance of this directive. Agency plans must address the following elements: Agency name. Point of contact information, including name, telephone number, and email address. List of identified products. Number of endpoints impacted. Methodologies employed to identify the use or presence of the products. List of agencies (components) impacted within department. Mission function of impacted endpoints and/or systems. All contracts, service-level agreements, or other agreements the agency has entered into with Kaspersky. Timeline to remove identified products. If applicable, FISMA performance requirements or security controls that product removal would impact, including, but not limited to data loss/ leakage prevention, network access control, mobile device management, sandboxing/detonation chamber, web site reputation filtering/web content filtering, hardware and software whitelisting, vulnerability and patch management, anti- malware, anti-exploit, spam filtering, data encryption, or other capabilities. If applicable, chosen or proposed replacement products/capabilities. If applicable, timeline for implementing replacement products/ capabilities. Foreseeable challenges not otherwise addressed in this plan. Associated costs related to licenses, maintenance, and replacement (coordinate with agency chief financial officers). At 90 calendar days after issuance of this directive, and unless directed otherwise by DHS based on new information, departments or agencies will begin to implement the agency plan of action and provide a status report to DHS on the progress of that implementation every 30 calendar days thereafter until full removal and discontinuance of use is achieved. DHS will rely on agency self-reporting and independent validation measures for tracking and verifying progress. DHS will provide additional guidance through the federal cybersecurity coordination, assessment, and response protocol following the issuance of this directive. Agencies or departments are to: Within 30 calendar days after issuance of this directive, develop and provide to DHS an agency plan of action for BOD 18-01 to: Enhance email security by configuring within 90 days after issuance of this directive: All internet-facing mail servers to offer STARTTLS, and All second-level agency domains to have valid sender policy framework (SPF)/domain-based message authentication, reporting and conformance (DMARC) records, with at minimum a DMARC policy of “p=none” and at least one address defined as a recipient of aggregate and/or failure reports. Within 120 days after issuance of this directive, ensuring: Secure sockets layer (SSL)v2 and SSLv3 are disabled on mail Triple data encryption standard (3DES) and Rivest cipher 4 (RC4) ciphers are disabled on mail servers (see temporary policy exception for 3DES). Within 15 days of the establishment of centralized NCCIC reporting location, adding the NCCIC as a recipient of DMARC aggregate reports. Within 1 year after issuance of this directive, setting a DMARC policy of “reject” for all second-level domains and mail-sending hosts. Enhance web security by: Within 120 days after issuance of this directive, ensuring: All publicly accessible federal websites and web services provide service through a secure connection (hypertext transfer protocol secure (HTTPS)-only, with HTTP strict transport security (HSTS)), SSLv2 and SSLv3 are disabled on web servers, and 3DES and RC4 ciphers are disabled on web servers. Identifying and providing a list to DHS of agency second-level domains that can be HSTS preloaded, for which HTTPS will be enforced for all subdomains. Upon delivery of its plans of action for BOD 18-01, within 30 days of this directive, departments or agencies will begin implementing their plans. At 60 calendar days after issuance of this directive, departments or agencies will provide a report to DHS on the status of that implementation. They will continue to report every 30 calendar days thereafter until implementation of the agency’s BOD 18-01 plan is complete. DHS will review each agency plan of action for BOD 18-01 after receipt and may contact agencies with concerns. DHS will coordinate the agency-provided lists of domains for HSTS preloading with DotGov. DHS will rely on scanning by its National Cybersecurity Assessments and Technical Services team for tracking and verifying progress with agency compliance with this directive. DHS will notify agencies when the NCCIC establishes a central location for the collection of agency DMARC aggregate reports DHS will provide additional guidance through a DHS coordination call and other engagements and products following the issuance of this directive. Agencies or departments are to: Identify and submit coordination points of contact (POC) for high value asset assessments. If selected to participate in DHS-led HVA assessment, departments or agencies will complete and submit to DHS a single rules of engagement (ROE), and for each HVA and related system(s) to be assessed, one ROE Appendix A titled “Risk and Vulnerability Assessment (RVA) Services for High Value Assets and Related Systems,” authorizing DHS to conduct HVA RVAs on that agency HVA and related systems. Participate in the HVA assessments authorized by the ROE and one or more Appendix A submissions for “RVA Services for High Value Assets and Related Systems.” Participate in a security architecture review (SAR) of each HVA to be assessed. Impose no restrictions on the timing and/or frequency of the assessments, the services to be provided by DHS, or the scope of systems that are part of or related to the HVA being assessed. Ensure timely remediation of identified vulnerabilities and report Within 30 days of receipt of the RVA and/or SAR reports identifying major or critical weakness to an assessed HVA, remediate all major or critical weaknesses and provide notification to DHS that each identified weakness was addressed. If it is determined by the designated senior accountable official for risk management that full remediation cannot be completed within the initial 30-day time frame, develop and submit to a designated DHS email address, a remediation plan for each HVA with remaining major or critical weaknesses within 30 days of the receipt of the RVA and/or SAR reports. This remediation plan shall include justification for the extended timeline, the proposed timeline and associated milestones to remediation (not to exceed 1 year), interim mitigation actions planned to address immediate vulnerabilities, and, if relevant, the identification of constraints related to policy, budget, workforce, and operations. This remediation plan must be signed by the designated senior accountable official for risk management prior to submission to DHS. Report the status of each remaining major or critical weakness to a designated DHS email address every 30 days until full remediation is achieved for all assessed HVAs. Status reports must address RVA and SAR results through combined reporting and must be submitted every 30 days starting 30 days after the submission of the remediation plan described above. Notify DHS at a designated email address and through the monthly status reports of any modifications to remediation plan timelines and when full remediation has been achieved. The notifications for modifications and full remediation must be certified under signature of the designated senior accountable official for risk management. DHS will centrally manage agency progress and report submissions, and will engage each agency head in all cases where the agency has not met the deadlines outlined in the agency/department required actions list. DHS collects, maintains, and prioritizes agency-submitted HVAs, and will notify enterprise chief information officers, chief information security officers, and HVA points of contact of specific HVAs selected for DHS-led assessments based on OMB-led determinations. DHS maintains all agency HVA submissions on HSIN. DHS provisions HSIN accounts for designated agency HVA POCs and provides instruction on HSIN use, as needed. DHS provides standard templates for identifying and submitting agency HVAs and for remediation plans and progress reports. DHS plans and conducts RVAs and SARs for OMB-selected agency HVAs, and provides formal reports containing assessment findings and recommendations to the designated agency HVA POCs. Agencies or departments are to: Ensure access and verify scope. Ensure cyber hygiene scanning access by removing cyber hygiene source internet protocol (IP) addresses from block lists. Within 5 working days of the change, notify the Cybersecurity and Infrastructure Security Agency (CISA) at a designated email address of any modifications to the agency’s internet-accessible IP addresses. This includes newly acquired internet-accessible IP addresses or re-assigned internet-accessible IP addresses that are no longer part of the agency’s asset inventory. Upon request from CISA, departments or agencies will submit updated cyber hygiene agreements to a designated DHS email address. Review and remediate critical and high vulnerabilities. Review cyber hygiene reports issued by CISA and remediate the critical and high vulnerabilities detected on the agency’s internet- accessible systems as follows: Critical vulnerabilities must be remediated within 15 calendar days of initial detection. High vulnerabilities must be remediated within 30 calendar days of initial detection. CISA will monitor federal agency progress and will engage agency senior leadership, such as the chief information security officer, the chief information officer, and the senior accountable officer for risk management, as necessary and appropriate, when the agency has not met the required agency action deadlines specified. CISA also will track the remediation of critical and high vulnerabilities through persistent cyber hygiene scanning and will validate compliance with the directive requirements through these reports. CISA will provide regular reports to federal civilian agencies on cyber hygiene scanning results and current status, and a federal enterprise scorecard report to agency leadership. CISA will provide standard remediation plan templates for federal civilian agencies to populate if remediation efforts exceed required time frames. CISA will engage agency POCs to discuss agency status and provide technical expertise and guidance for the remediation of specific vulnerabilities, as requested and appropriate. CISA will engage agency chief information security officer, the chief information officer, and the senior accountable officer for risk management, throughout the escalation process, if necessary. CISA will provide monthly cyber hygiene reports to OMB to identify cross-agency trends, persistent challenges, and facilitate potential policy and/or budget-related actions and remedies. The report will also ensure alignment with other OMB-led cybersecurity oversight initiative. The scope of Binding Operational Directive (BOD) 18-01, Enhance Email and Web Security, includes complex technical concepts that require background knowledge on various topics for both email and web security. The following information provides more detail on the directive’s technical requirements. When enabled by a receiving mail server, STARTTLS signals to a sending mail server that the capability to encrypt an email in transit is present. While it does not force the use of encryption, enabling STARTTLS makes passive man-in-the-middle attacks more difficult. SPF (Sender Policy Framework) and DKIM (Domain Keys Identified Mail) allow a sending domain to effectively “watermark” its emails, making unauthorized emails (e.g., spam, phishing email) easy to detect. When an email is received that does not pass an agency’s posted SPF/DKIM rules, DMARC (Domain-based Message Authentication, Reporting & Conformance) tells a recipient what the domain owner would like done with the message. Setting a DMARC policy of “reject” provides the strongest protection against spoofed email, ensuring that unauthenticated messages are rejected at the mail server, even before delivery. Additionally, DMARC reports provide a mechanism for an agency to be made aware of the source of an apparent forgery, information that they would not normally receive otherwise. Multiple recipients can be defined for the receipt of DMARC reports. Hypertext Transfer Protocol (HTTP) connections can be easily monitored, modified, and impersonated; Hypertext Transfer Protocol Secure (HTTPS) remedies these vulnerabilities. HTTP Strict Transport Security (HSTS) ensures that browsers always use an https:// connection, and removes the ability for users to click through certificate- related warnings. In 2015, OMB M-15-13, Policy to Require Secure Connections Across Federal Websites and Web Services, required all existing federal websites and web services to be accessible through a secure connection (HTTPS-only, with HSTS). In 2017, the .gov registry began automatically preloading new federal .gov domains as HSTS-only in modern browsers. SSL (secure sockets layer) is a computing protocol that ensures the security of data sent via the internet by using encryption. SSLv2 was released in 1995. Most modern clients do not support SSLv2, but a cross- protocol security bug (DROWN) demonstrated that merely serving SSLv2 enables the inspection of traffic encrypted with the more modern and secure protocol, transport layer security. SSLv3 was released in 1996 and considered to be insecure after a man- in-the-middle exploit (POODLE) was published in 2014. RC4 (Rivest Cipher 4) is a stream cipher algorithm that is used in popular protocols such as SSL (to protect internet traffic) and wired equivalent privacy (WEP) to secure wireless networks. In 2014, NIST marked RC4 as “not approved” for use in federal information systems. 3DES (3 key triple data encryption standard) is an implementation of the data encryption standard (DES) algorithm that uses three passes of the DES algorithm instead of one as used in ordinary DES applications. Triple DES provides much stronger encryption than ordinary DES, but it is less secure than advanced encryption standard. In 2017, NIST urged all users of 3DES to migrate as soon as possible. In addition to the contact named above, Neelaxi Lakhmani (assistant director), Kathleen S. Epperson (analyst-in-charge), Season Burris, Christopher Businsky, Noah Levesque, David Matcham, T. Bruce Rackliff, Karl Seifert, and Priscilla Smith made key contributions to the report.", "summary": "DHS plays a key role in federal cybersecurity. FISMA authorized DHS, in consultation with the Office of Management and Budget, to develop and oversee the implementation of compulsory directives—referred to as binding operational directives—covering executive branch civilian agencies. These directives require agencies to safeguard federal information and information systems from a known or reasonably suspected information security threat, vulnerability, or risk. Since 2015, DHS has issued eight directives that instructed agencies to, among other things, (1) mitigate critical vulnerabilities discovered by DHS through its scanning of agencies' internet-accessible systems; (2) address urgent vulnerabilities in network infrastructure devices identified by DHS; and (3) better secure the government's highest value and most critical information and system assets. GAO was requested to evaluate DHS's binding operational directives. This report addresses (1) DHS's process for developing and overseeing the implementation of binding operational directives and (2) the effectiveness of the directives, including agencies' implementation of the directive requirements. GAO selected for review the five directives that were in effect as of December 2018, and randomly selected for further in-depth review a sample of 12 agencies from the executive branch civilian agencies to which the directives apply. The Department of Homeland Security (DHS) has established a five-step process for developing and overseeing the implementation of binding operational directives, as authorized by the Federal Information Security Modernization Act of 2014 (FISMA). The process includes DHS coordinating with stakeholders early in the directives' development process and validating agencies' actions on the directives. However, in implementing the process, DHS did not coordinate with stakeholders early in the process and did not consistently validate agencies' self-reported actions. In addition to being a required step in the directives process, FISMA requires DHS to coordinate with the National Institute of Standards and Technology (NIST) to ensure that the directives do not conflict with existing NIST guidance for federal agencies. However, NIST officials told GAO that DHS often did not reach out to NIST on directives until 1 to 2 weeks before the directives were to be issued, and then did not always incorporate the NIST technical comments. More recently, DHS and NIST have started regular coordination meetings to discuss directive-related issues earlier in the process. Regarding validation of agency actions, DHS has done so for selected directives, but not for others. DHS is not well-positioned to validate all directives because it lacks a risk-based approach as well as a strategy to check selected agency-reported actions to validate their completion. Directives' implementation often has been effective in strengthening federal cybersecurity. For example, a 2015 directive on critical vulnerability mitigation required agencies to address critical vulnerabilities discovered by DHS cyber scans of agencies' internet-accessible systems within 30 days. This was a new requirement for federal agencies. While agencies did not always meet the 30-day requirement, their mitigations were validated by DHS and reached 87 percent compliance by 2017 (see fig. 1). DHS officials attributed the recent decline in percentage completion to a 35-day partial government shutdown in late 2018/early 2019. Nevertheless, for the 4-year period shown in the figure below, agencies mitigated within 30 days about 2,500 of the 3,600 vulnerabilities identified. Agencies also made reported improvements in securing or replacing vulnerable network infrastructure devices. Specifically, a 2016 directive on the Threat to Network Infrastructure Devices addressed, among other things, several urgent vulnerabilities in the targeting of firewalls across federal networks and provided technical mitigation solutions. As shown in figure 2, in response to the directive, agencies reported progress in mitigating risks to more than 11,000 devices as of October 2018. In addition, GAO reviewed DHS policies and processes related to the directives and assessed them against FISMA and Office of Management and Budget requirements; administered a data collection instrument to selected federal agencies; compared the agencies' responses and supporting documentation to the requirements outlined in the five directives; and collected and analyzed DHS's government-wide scanning data on government-wide implementation of the directives. GAO also interviewed DHS and selected agency officials. GAO is making four recommendations to DHS: (1) determine when in the directive development process—for example, during early development and at directive approval—coordination with relevant stakeholders, including NIST, should occur; (2) develop a strategy for when and how to independently validate selected agencies' self-reported actions on meeting directive requirements, where feasible, using a risk-based approach; (3) ensure that the directive performance metric for addressing vulnerabilities identified in high value asset assessments aligns with the process DHS has established; and (4) develop a schedule and plan for completing the high value asset program reassessment and addressing the outstanding issues on completing the required assessments, identifying needed resources, and finalizing guidance to agencies and third parties. DHS concurred with GAO's recommendations and outlined steps and associated timelines that it planned to take to address the recommendations. Another key DHS directive is Securing High Value Assets, an initiative to protect the government's most critical information and system assets. According to this directive, DHS is to lead in-depth assessments of federal agencies' most essential identified high value assets. However, an important performance metric for addressing vulnerabilities identified by these assessments does not account for agencies submitting remediation plans in cases where weaknesses cannot be fully addressed within 30 days. Further, DHS only completed about half of the required assessments for the most recent 2 years (61 of 142 for fiscal year 2018, and 73 of 142 required assessments for fiscal year 2019 (see fig. 3)). In addition, DHS does not plan to finalize guidance to agencies and third parties, such as contractors or agency independent assessors, for conducting reviews of additional high value assets that are considered significant, but are not included in DHS's current review, until the end of fiscal year 2020. Given these shortcomings, DHS is now reassessing key aspects of the program. However, it does not have a schedule or plan for completing this reassessment, or to address outstanding issues on completing required assessments, identifying needed resources, and finalizing guidance to agencies and third parties.", "document_type": "gao"}
{"report": "An underride crash can occur during a collision between a passenger vehicle and a large truck—a tractor-trailer or a single-unit truck, such as a delivery or dump truck—if the height difference between the vehicles is sufficient to allow the smaller vehicle to slide under the body of the truck. The front and rear of passenger vehicles are designed to crumple in a crash and absorb the main force of an impact, while sensors detect the impact and activate safety features within the passenger compartment, such as air bags and seatbelt pretensioners. However, the point of impact in an underride crash could be the hood of the passenger vehicle or—more severely—the windshield. Such impacts can result in “passenger compartment intrusion” by the large truck into the passenger area of the smaller vehicle. This intrusion can kill passengers or leave them with severe head and neck injuries. Underride guards on large trucks essentially lower the profile of the truck’s body to be more compatible with that of a passenger vehicle. An underride guard designed to withstand the force of a crash can prevent the car from sliding under the truck and provide an effective point of impact that will activate the car’s safety features to protect the car’s occupants. Figure 1 shows images from a video depicting the difference in underride crashes with and without passenger compartment intrusion on the rear of a tractor- trailer. Rear and side underride guards limit a passenger vehicle’s ability to go under those areas of a trailer in a crash (see fig. 2). Front guards— currently used on tractors in some other countries, such as European Union countries—can reduce the likelihood that a truck would ride over a passenger vehicle in a crash, a situation sometimes referred to as “override”. In addition to saving lives and reducing serious injuries, improving traffic safety—including reducing underride crashes—may provide other benefits to society. Specifically, NHTSA has reported that preventing such crashes may result in savings in police and crash investigation resources and reduced property damage, among other things. Federal requirements, in regulations issued by NHTSA and FMCSA, exist for the installation of rear guards on most large trucks, but there are no federal requirements for side or front guards. NHTSA’s mission is to “save lives, prevent injuries and reduce economic costs due to road traffic crashes through education, research, safety standards and enforcement activity.” As part of this mission, NHTSA requires that rear guards be installed on most trailers. Federal regulations requiring rear guards of specific dimensions date back to 1952, but the most current regulations—which set force and energy absorption standards, in addition to dimensional requirements—became effective in 1998. These crashworthy rear guards must be designed and tested to protect occupants in a crash of up to 30 miles per hour. In December 2015, NHTSA published a notice of proposed rulemaking (NPRM) that proposed to align U.S. regulations with stronger Canadian rear guard standards. The Canadian standard includes a stronger energy absorption requirement: 20,000 joules—a measurement of energy—as compared to 5,650 joules in the U.S. NHTSA has not taken action on this NPRM since it was proposed in December 2015. Single- unit trucks that are more than 30 inches above the ground are required to meet the dimensional specifications for rear guards set in 1952 but are not required to meet any force or energy absorption standards. NHTSA introduced an advance notice of proposed rulemaking (ANPRM) in July 2015 that considered requiring rear guards with strength and energy absorption criteria for all newly built single-unit trucks. However, NHTSA has since withdrawn the ANPRM, stating that—based on the comments received as well as analysis of the petitions—the changes being considered were not justified. Although there are no federal requirements for crashworthy side underride guards, some crashworthy side guards are being developed. For example, one aftermarket manufacturer has developed a side underride guard that was crash-tested by IIHS and successfully prevented underride crashes in tests at 35 and 40 miles per hour. Similar looking technologies—including aerodynamic side skirts and pedestrian/cyclist side guards—are installed on some trailers and single- unit trucks, but they are not meant to mitigate underride crashes (see fig. 3). FMCSA’s primary mission is “to reduce crashes, injuries, and fatalities involving large trucks and buses,” and it does this, in part, through developing safety regulations. These regulations include requirements for rear guards for trailers consistent with Federal Motor Vehicle Safety Standards and for single-unit trucks that are more than 30 inches above the ground, as well as for multiple types of commercial vehicle inspections that are performed by, for example, motor carriers and drivers to ensure that commercial vehicles are safely operating. Table 1 describes the types of commercial vehicle inspections. For fatal crashes, including fatal underride crashes, data are collected by law enforcement officials at the location of the crash, aggregated at the state level, and then transferred to NHTSA’s Fatality Analysis Reporting System (FARS). FARS is a census of all fatal traffic crashes in the U.S. When a fatal crash occurs, a state or local police officer typically completes a crash report form unique to each state. These forms can include a variety of data fields, such as the time of the crash, weather conditions, and the number of killed or injured persons. In the case of an underride crash, officers may indicate an underride crash occurred in a specific field for recording this crash type or in a narrative field. FARS analysts—state employees who are trained by NHTSA’s data validation and training contractor to code state crash data for input into FARS—in each state receive and analyze the data in the crash report forms in order to compile a record of the fatal crash. FARS analysts rely on the information within the crash report form in order to enter accurate data. To encourage greater uniformity of crash data, NHTSA, FMCSA, and other agencies and associations cooperatively developed the Model Minimum Uniform Crash Criteria (MMUCC) in 1998. The MMUCC guideline, currently in the fifth edition, identifies a minimum set of motor vehicle crash data elements and their definitions that states should consider collecting, but are not required to collect. The MMUCC is updated about every 4 to 5 years. Prior to publication of each edition, an expert panel from the relevant agencies and associations convenes to review all proposed changes suggested by traffic safety stakeholders to determine what will be included in the MMUCC. According to NHTSA officials, the next updated version of the MMUCC is expected to be issued in 2022. From 2008 through 2017, the annual number of fatalities resulting from underride crashes involving one or more trucks reported in FARS ranged between 189 and 253, resulting in an annual average of approximately 219 fatalities (see table 2). Comparatively, the FARS data show an annual average of about 34,700 total traffic fatalities and approximately 4,000 fatalities involving large trucks over the same period. Therefore, reported underride crash fatalities on average accounted for less than 1 percent of total traffic fatalities and 5.5 percent of all fatalities related to large truck crashes during this time frame. Although reported underride crash fatalities make up a small proportion of total traffic fatalities, NHTSA officials told us that severe underride crashes—involving passenger compartment intrusion—are more likely to result in a fatality or serious injury than crashes in which the passenger vehicle’s safety features engage and are able to protect the occupants. Officials from four state DOTs we spoke to also stated that while underride crashes are not common, the consequences—fatalities or serious injuries, including head or neck injuries—are more likely to be severe. An official from one state DOT noted that their agency did not consider underride crashes to be a high priority issue. However, upon further review of the state’s underride crash data, this official stated that while underride crashes may occur infrequently, they present a higher risk of fatality than the official had previously realized. An official in another state told us they do not regularly review underride crash data but, upon analysis of the data, found that underride crashes constituted a larger percentage than they anticipated—16 percent—of all fatal large truck crashes in the state in 2017. NHTSA’s FARS data show that most of the reported underride crash fatalities occurred when the crash impact was located at the rear or sides of a trailer. From 2008 through 2017, approximately 45 percent (825 of 1836) of reported fatalities in underride crashes with a recorded point of impact on the large truck occurred when the initial impact of the crash was the rear of the trailer. About 32 percent (590 of 1836) of reported underride crash fatalities were in crashes where the side of the trailer was the point of initial impact. Approximately 21 percent (392 of 1836) of reported underride crash fatalities were in crashes with the initial impact at the front of the tractor. These 392 fatalities from crashes involving the front of a tractor could be crashes in which the tractor impacted the rear of a passenger vehicle but might also have occurred in a head-on collision between the car and the tractor. The point of impact for underride crash fatalities with passenger compartment intrusion—the most severe form of underride—had similar distributions, with most reported fatalities occurring when the initial point of impact was the rear or side of the trailer. State and local police officials we interviewed said that the underride crash fatality cases they are familiar with occurred in high speed scenarios, often exceeding 55 miles per hour. For example, officials representing a state police department described scenarios in which passenger vehicles traveling at high speeds rear-ended tractor-trailers stopped on the highway’s shoulder or slowed for highway construction; similar scenarios occurred when tractor trailers failed to slow for stopped traffic and crashed into the rear of passenger vehicles. However, on average, 62 percent of fatalities from underride crashes with passenger compartment intrusion reported in 2008 through 2017 did not include a reported speed. For example, for these fatalities in 2017, 72 percent had speed coded in FARS as missing or not reported. A state and a local police official told us that determining the speed of an underride crash can be challenging due to the often severely damaged condition of the passenger vehicle following an underride crash. Officials representing state police said that they are better able to document whether or not speeding was a factor in an underride crash, rather than an exact speed. IIHS representatives also acknowledged the difficulty in documenting the speed involved in an underride crash, and further stated that this difficulty brings into question the accuracy of the speed data that are recorded in FARS for underride crashes. Stakeholders we interviewed told us that underride crash fatalities are likely underreported in FARS due to several factors, such as variability across states in defining underride crashes, inconsistencies in state crash reporting forms and documentation methods, and limited information provided to state and local police on how to consistently identify and record underride crash data. These factors could contribute to police officers incorrectly and inconsistently documenting underride crash data on the crash report form. As a result, FARS analysts may not have sufficient information to properly categorize the crash as an underride, ultimately affecting the number of underride crash fatalities identified in FARS. Standards for Internal Control in the Federal Government notes that management should use quality information to achieve the entity’s objectives. Underreporting of underride crashes would affect the quality of NHTSA’s data, thereby affecting the agency’s ability to accurately identify the magnitude of underride-related crashes and limiting its ability to make informed decisions on rulemaking or other efforts that would help the agency meet its mission to improve traffic safety. Other researchers and organizations have also commented on the quality of NHTSA’s underride crash data. For example, IIHS representatives told us that they compared underride crash cases in FARS and in NHTSA’s and FMCSA’s Large Truck Crash Causation Study—a study of large truck crashes from 2001 through 2003—and identified some cases that involved underride crashes but that were not categorized as such in FARS. Consequently, IIHS representatives stated that they have used more general rear impact crash data as a proxy for underride crashes due to their finding that underreporting of underride crashes occurs in FARS. Additionally, the University of Michigan’s Transportation Research Institute reported that it can be difficult or impossible to identify underride in available computerized crash data files, such as FARS. State and local police officers do not use a standard definition of an underride crash when collecting data at the scene of a crash. NHTSA officials told us that the agency’s definition for an underride crash—”a vehicle sliding under another vehicle during a crash”—is found in the FARS coding and validation manual, a document primarily used by FARS analysts and researchers. The FARS coding and validation manual further distinguishes underride crashes as those with and without passenger compartment intrusion. The MMUCC, which includes definitions of various crash-related elements, does not include a definition of an underride crash. Among officials from the five state police departments we interviewed, underride crash definitions varied, even within states. For example, in one state, an official from one local police department said that a passenger vehicle would need to have over 50 percent of its hood underneath the trailer to constitute an underride crash, while other officials within the state police used a broader definition consistent with NHTSA’s definition, i.e., a vehicle going underneath another vehicle by any amount. A state police official and a local police official we interviewed indicated that they would like a clearer definition of the conditions that constitute an underride crash to help them better identify these crashes. Further, representatives from NHTSA’s data validation and training contractor told us that when they have identified anomalous patterns in underride crash data in FARS, the main reason for these anomalies has been varying definitions of this crash type, as reporting officers have many interpretations of what constitutes an underride crash. A standard definition of an underride crash, for example in the MMUCC, would provide greater assurance that underride crashes are accurately recorded. While all states have a crash report form to gather data following a crash, these state forms vary in whether and how underride crash-related information is collected. Specifically, for the most recent crash report forms we examined from the 50 states and the District of Columbia, as of October 2018: 17 state forms have a specific field for “Underride.” Eleven of these forms also have data fields for passenger compartment intrusion. 32 state forms have a point of impact or area damaged field for “undercarriage.” The point of impact field is generally intended to be used to indicate the locations of initial impact or area that was damaged for all vehicles involved in the crash. Some state police and transportation officials we spoke with noted that this field could be used to indicate that an underride crash occurred, as the initial point of impact on a large truck could be the undercarriage in such a crash. Two states, California and Hawaii, do not have a data element related to underride crashes or undercarriage on their state crash report forms. The presence of an underride field in state crash report forms may affect the extent to which underride crash fatalities are captured in FARS. For example, we observed that after a state revised its form to remove the underride field, the number of reported underride crash fatalities significantly decreased, potentially indicating that underride crashes were being underreported after the change. Conversely, in another state, we observed that the number of reported underride crash fatalities significantly increased following the addition of an underride field to the crash report form, potentially indicating that underride crashes were being reported more accurately following the change. States have their own discretion to develop crash report forms based on several factors that may be particular to each state. For example, states include or exclude certain data elements on their crash report forms based on the traffic safety priorities within that state. Officials we interviewed from two state police departments told us that they do not have an underride field on their crash report forms because underride crashes are not a traffic safety priority for them. In another state, state DOT officials told us that they chose to include an underride field on the crash report form to better align with the FARS data fields, including those fields related to underride. States may include certain data elements on their crash report form based on the recommended data elements in the MMUCC. However, while the MMUCC was developed to encourage greater uniformity of crash data, its guidelines are voluntary, and it does not currently include references to underride or override crash data elements. In its June 15, 2017, report, the Post-Accident Report Advisory Committee—a group appointed by the FMCSA Administrator to provide input on additional data elements to be included in police accident reports involving commercial motor vehicles—suggested that MMUCC data elements be updated to include a collection of information about whether underride and override are involved in a crash. However, according to the MMUCC’s standard development process and NHTSA officials, to adopt new data elements, the entire MMUCC expert panel—which is comprised of stakeholders representing NHTSA, FMCSA, the Governors Highway Safety Association, states, data collectors, data managers, data users, and safety stakeholders—must reach at least 70 percent agreement for approval of new changes to the MMUCC. Under the MMUCC’s standard development process, the MMUCC expert panel will consider recommendations and proposed changes to the MMUCC guidelines, including those proposed by NHTSA in the months preceding the next MMUCC update in 2022. In states that do not include a specific underride crash field in the state crash report form, state and local police officers we interviewed told us that officers responding to a crash may describe underride crashes in the diagram or narrative fields of the form. However, these officers said that a police officer may inappropriately document an underride crash as a rear impact crash. Similarly, officers may categorize the crash as both an underride and an override crash, which NHTSA’s FARS coding and validation manual indicates would be incorrect. Selected state officials told us that unless the officer documenting the crash specifically describes an underride crash in the narrative field, FARS analysts at the state level who review the crash report forms will not have the information to know if a crash involved underride. Police officers we interviewed in states that include “undercarriage” rather than a specific underride crash field in the crash report form told us that they may use the option as a proxy for an underride crash; however, this field may be used inconsistently. For example, in one state, state police officers said they would select “undercarriage” on the crash report form to reflect an underride crash, whereas a local police officer in the same state said that local officers would not use that field to identify an underride crash occurred and, instead, would document the underride crash in the narrative. NHTSA’s data validation and training contractor told us that it is not a recommended practice for officers to select “undercarriage” as a proxy for underride crashes, noting that this inconsistency could lead to inaccuracies in the resulting FARS data. Including underride as a recommended data field in the MMUCC would provide greater assurance that underride crashes are accurately recorded. State and local police officials we interviewed said that they receive limited or no training on how to identify and record information for underride crashes. Officials from all five state police departments we spoke with said that they develop their own crash reporting training for police. This training emphasizes overall crash reporting with a limited focus, if any, on underride crashes. An official representing one state police office said that the state police provide training on how to complete crash reports and general traffic safety, whereas FARS analysts—often within the state DOT—are concerned with the quality of data collection for data analysis purposes, which is not a primary focus of law enforcement training. State and local police officials we interviewed said they generally have limited to no follow-up or continuous training on crash reporting beyond initial police academy training. Local police we interviewed also told us that while they develop and implement their own crash report training, they may also receive training from the state police. Some state police officers that we spoke with said that they conduct training for local police departments when requested. One local police official we spoke with said that officers have limited exposure to underride crashes in these training sessions and that the average officer would likely not know how to appropriately identify an underride crash. Officials we spoke with from three state and two local police departments stated that additional information to police departments on underride crashes could help improve data collection and overall traffic safety. NHTSA provides training to FARS analysts on reviewing crash report forms and appropriately inputting data in FARS, but does not provide information on crash data collection to state and local police who initially collect the data. According to NHTSA’s data validation and training contractor, the contractor trains FARS analysts on identifying underride crashes. Specifically, the contractor trains FARS analysts to review the crash report forms for sufficient detail to meet the definition of an underride crash and determine if a crash involved underride for entry in FARS. NHTSA officials told us that it is the responsibility of state police academies to train law enforcement officers to conduct on-site investigations and complete crash report forms. NHTSA officials said that they do not currently provide underride identification information directly to state and local police who initially collect the crash data. However, NHTSA does provide information to state and local police on other topics, such as improving traffic safety and driver behavior, for example through DOT’s Enforcement and Justice Services Division. NHTSA officials acknowledged that it would be feasible to also provide information on identifying and recording underride crashes. Standards for Internal Control in the Federal Government notes that management communicates quality information externally through reporting lines so that external parties can help the entity achieve its objectives and address related risks. By providing information to state and local police departments—such as materials or instruction on the definition of an underride crash and how to appropriately document these crashes— NHTSA could improve the quality and completeness of underride crash data that police collect. Underride guards for the rear, side, and front of tractor-trailers and single- unit trucks are in varying stages of development. NHTSA has issued an NPRM proposing to strengthen rear guard requirements for trailers, and estimates that about 95 percent of all newly manufactured trailers already meet the stronger requirements. While FMCSA requires commercial vehicles to be inspected to ensure they are safe, rear guards may not be regularly inspected. Side underride guards are being developed, but stakeholders identified challenges to their use, such as the stress on trailer frames due to the additional weight. NHTSA has not performed research on the overall effectiveness and cost of these guards, and manufacturers we interviewed told us that they are hesitant to invest in developing side underride guards without such research. In response to a 2009 crash investigation, the National Transportation Safety Board (NTSB) recommended that NHTSA require front guards on tractors. NHTSA officials stated that the agency plans to complete research to respond to this recommendation in 2019. However, stakeholders generally stated that the bumper and lower frame of tractors typically used in the U.S. may mitigate the need for front guards for underride purposes. NTSB has further recommended that NHTSA develop standards for crashworthy underride guards for single-unit trucks—such as dump trucks—but NHTSA recently concluded that these standards would not be cost effective. All seven of the eight largest trailer manufacturers—which are responsible for about 80 percent of the trailers on the road in the U.S.—we spoke with told us that they have been building to the stronger Canadian rear guard standard since those requirements became effective in 2007. Some manufacturers said that since trucking company operations may span the border between Canada and the U.S., it was easier to build to a single standard rather than manufacture trailers that comply with either the Canadian requirements or the U.S. requirements. NHTSA is considering strengthening the U.S. requirements for rear guards to align with the Canadian rear guard standards. As part of the 2015 NPRM on strengthening the U.S. requirements to the level of the Canadian standards, NHTSA estimated that 93 percent of all newly manufactured trailers in the U.S. are already equipped with a rear guard that meets the Canadian standard. In July 2018, NHTSA officials told us that figure had increased to 95 percent of all newly manufactured trailers, with the remaining 5 percent from smaller manufacturers who may not wish to incur the additional cost or weight of a Canadian-style rear guard. Trucking industry stakeholders told us that the average lifecycle of a trailer varies: one said the lifespan is 10 to 15 years and another stated a 12-year lifespan. NHTSA performed a cost-benefit analysis as part of the 2015 NPRM in which it preliminarily estimated that requiring newly manufactured trailers to include rear guards built to the new standard would be cost-beneficial. Specifically, NHTSA’s analysis found that the cost of a rear guard that meets the Canadian standard was approximately $500 per trailer, which was $229 more than a guard that complies with the existing U.S. requirement. NHTSA’s analysis also found that a Canadian-style rear guard was heavier than its U.S. counterpart. The rear guard NHTSA studied that complies with current U.S. regulations weighed 172 pounds, whereas those meeting the Canadian standard weighed between 191 and 307 pounds. Regarding benefits, NHTSA estimated in 2015 that— accounting for the trailers that already meet the stronger standard— adopting the Canadian standard would prevent about one fatality and three serious injuries per year. According to DOT, these estimates may have since changed, as a higher percentage of trailers are now manufactured to meet the Canadian standards. Comments on this NPRM varied. Some comments were in support of the measure, citing the safety benefits. Other comments noted that automated driver assistance technology may offer better outcomes. Further, some comments called for NHTSA to take additional steps to improve the safety capabilities of rear guards, such as allowing fewer exemptions from compliance. NHTSA has not taken action on this NPRM since it was proposed in December 2015. NHTSA officials we interviewed could not provide information on when the NPRM would move forward. The largest trailer manufacturers have also taken steps to further improve the design of rear guards to prevent underride crashes in a range of scenarios. Because IIHS found that the weakest points for rear guards are generally the outer edges furthest from the center of the guard, it created a procedure to test the ability of rear guards to withstand crashes at different overlap points, starting at the center of the guard and moving closer to the endpoints. Specifically, this procedure involves three crash tests using full width, 50-percent, and 30-percent overlap of the front of the car with the rear guard, as depicted in figure 4. According to IIHS, as of September 2018, all of the top eight trailer manufacturers operating in the U.S. have successfully passed these tests. Some of these manufacturers provide the improved rear guards as a standard feature on all new trailers, while others offer them as an option for purchase. In addition to strengthening rear guards on trailers, advancements in automatic braking systems in passenger vehicles may help reduce the frequency of underride crashes. These systems, though not federally- required, have been available and installed in some passenger vehicles and tractors and are designed to detect objects or other vehicles in front of the vehicle and automatically apply the brakes to avoid or lessen the severity of an impact. According to NHTSA, twenty automakers representing more than 99 percent of the U.S. automobile market have agreed to make automatic braking systems a standard feature on newly- built passenger vehicles starting in 2022. These braking systems may help reduce the number of passenger vehicles striking the rear of tractor- trailers, potentially reducing the frequency of underride-related crashes, fatalities, and injuries. FMCSA regulations require commercial vehicles operating in interstate commerce to be inspected to ensure they are safe. However, the rules do not specifically include an inspection of the rear guard. After a rear guard has been installed on a new trailer, stakeholders told us that the guard may be damaged during normal use (see fig. 5), for example by backing into loading docks. However, only certain roadside inspections—which are performed at random or if an officer suspects a problem—specifically require the rear guard to be inspected. Specifically, of the eight types of roadside inspections, representatives of the Commercial Vehicle Safety Alliance (CVSA)—which helps develop roadside inspection standards— told us that four require the rear guard to be inspected. Stakeholders we interviewed told us that a trailer could go its entire lifecycle—estimated as typically 10 to 15 years—without ever being selected for a roadside inspection. FMCSA data show that although rear guard violations may be identified during roadside inspections, they constitute a small percentage of all violations. For example, out of about 5.8 million violations identified during roadside inspections in 2017, approximately 2,400, or 0.042 percent, were rear guard violations. In an effort to learn more about rear guard violations, CVSA encouraged commercial vehicle inspectors to specifically focus on rear guards during their roadside inspections performed from August 27 through 31, 2018. According to these data, for the more than 10,000 trailers inspected during that 5-day time frame, about 900 violations (about 28 percent of all violations identified) for rear guard dimensional or structural requirements were identified, including almost 500 instances where the rear guard was cracked or broken, or missing altogether. A CVSA representative stated there was a greater percentage of violations identified because inspectors were asked to specifically focus on the rear guard during this effort. Inspectors performing annual inspections—which can include employees of the motor carrier—rely on a checklist established in FMCSA regulations, known as “Appendix G.” This appendix specifies what equipment must be inspected, such as the brake system, lighting, and wheels. Appendix G does not list the rear guard as an item to be inspected. In August 2018, CVSA petitioned FMCSA to amend Appendix G to include rear guards as an item to be inspected. According to CVSA, in September 2018, FMCSA provided acknowledgment of its intent to review CVSA’s petition. FMCSA’s regulations, including those regarding commercial vehicle inspections, help the agency achieve its safety mission of reducing crashes, injuries, and fatalities. Further, Standards for Internal Control in the Federal Government notes that management should use quality information to achieve the entity’s objectives. Prior to receiving CVSA’s petition to amend Appendix G, FMCSA officials told us that not including rear guards in Appendix G does not affect commercial vehicle safety, as FMCSA regulations require all parts and accessories specified within the regulations—which includes the rear guard—to be in safe and proper operating condition at all times. According to DOT, the agency does not believe that motor carriers are ignoring the application of these regulations to rear guards. However, without explicitly including the inspection of the rear guard in Appendix G, there is no assurance that rear guards in operation will be inspected at least annually to ensure they perform as designed to prevent or mitigate an underride crash. This omission potentially affects FMCSA’s safety mission to help ensure the safe operation of tractor-trailers on the nation’s highways. While not currently required in the U.S., crashworthy side underride guards are being developed which could entail both costs and benefits to society. For example, there is currently one IIHS-crash-tested aftermarket manufacturer of side underride guards in North America, which has sold about 100 sets of side underride guards. According to the manufacturer, the cost of the guards starts at about $2,500 per trailer, though the price could decrease in the future as the manufacturing process becomes more efficient and greater quantities are built and sold. These side underride guards have been crash-tested by IIHS and successfully prevented underride crashes in tests at 35 and 40 miles per hour. As a result, the benefits of such guards might include a reduction in the number of fatalities in underride crashes. The manufacturer estimated that more widespread use of side underride guards would occur over the next 3 to 5 years. However, the manufacturer also said that more information on how side underride guards might affect everyday operations is needed before more widespread adoption by the industry. Additionally, some trailer manufacturers told us that they are in the process of developing side underride guards, but none are currently available for purchase. For example, a representative from one trailer manufacturer developing its own side underride guards estimated that it would be feasible to have these guards designed, tested, and available for sale within the next 2 years. However, the representative said that the manufacturer is hesitant to invest additional resources because of uncertainty about potential future regulatory requirements. Specifically, the manufacturer does not want to invest additional resources to develop a side underride guard that might later have to be redesigned to meet federal requirements, if such requirements were to be established and to differ from the manufacturer’s design specifications. Representatives from several trailer manufacturers, trucking industry organizations, and police departments we spoke with cited challenges with the use of side underride guards that would need to be addressed prior to widespread adoption by the industry. Officials from Canada and the European Union—which also do not require the use of side underride guards that can withstand the force of a vehicle crash—noted similar challenges. Weight: According to the aftermarket side underride guard manufacturer, the side underride guards currently available for sale weigh between 575 to 800 pounds in total. Representatives from two trucking industry organizations we spoke with stated that the additional weight from side underride guards may require carriers to put more trailers on the roads to ship goods in order to stay under federal maximum weight restrictions (generally 80,000 pounds). Federal regulations allow for certain exemptions in the federal weight limits, such as for auxiliary batteries. Some stakeholders also stated that the additional weight from side underride guards would increase fuel costs (assuming all else remains the same) and could put stress on the trailer’s frame, reducing its lifespan and potentially increasing maintenance costs. Road clearance: Some stakeholders we interviewed—including two trucking industry organizations, a tractor-trailer fleet operator, and a trailer manufacturer—stated that side underride guards limit a trailer’s clearance from the ground, which could limit the geographic locations that could be serviced by a trailer or—if the guards drag along the ground—result in damage to the guards or even the trailer. Conditions involving limited clearance could include traveling over raised railroad crossings or navigating sloped loading docks. While aerodynamic side skirts may also drag along the ground in similar conditions, they are more flexible than side underride guards and less likely to damage the trailer. Effects on under-trailer equipment and access: Installation of a side underride guard may limit access to or displace equipment currently underneath a trailer, including spare tires, fuel tanks, and aerodynamic side skirts. Additionally, the rear axles of some trailers can be adjusted to evenly distribute the weight of the trailer’s cargo. For example, trailer manufacturers told us that when the axle is moved to the furthest rear position of the trailer, a fixed-length side underride guard could leave a gap large enough for a car to still have an underride crash. Further, some police officers we interviewed told us that it could be challenging to perform roadside inspections of trailers equipped with side underride guards because the guards could limit access to the underside of the trailer. Representatives from three trucking industry organizations we spoke with indicated that crash avoidance technologies may be more effective than underride guards at minimizing underride crashes, including side underride crashes. However, while these technologies have the potential to mitigate crashes, it is unlikely that they will be available on a more widespread scale in a time frame soon enough to render underride guards unnecessary. While automatic braking systems for passenger vehicles are to become a standard feature on newly built vehicles starting in 2022, IIHS representatives told us that these systems are less effective at detecting and mitigating side crashes than rear or frontal crashes. Specifically, the representatives stated that automatic braking systems would not be effective in situations where the passenger vehicle impacts the side of a trailer at an oblique angle rather than at a perpendicular angle. According to stakeholders we interviewed, it will take a considerable amount of time for the passenger fleet to adopt automated vehicle technologies, with some stating that there will be a mix of automated and non-automated technologies on the nation’s highways for decades—longer than the 3 to 5 years estimated by the side underride guard manufacturer for more widespread use of these guards. NHTSA recently issued a study on the safety performance of certain materials used for side underride guards. However, NHTSA has not performed research on the overall effectiveness and costs associated with or the design of side underride guards. NHTSA’s mission is to “save lives, prevent injuries and reduce economic costs due to road traffic crashes, through education, research, safety standards and enforcement activity.” Additionally, a statement of federal principles on regulatory planning and review indicates that in deciding whether and how to regulate, agencies should assess all costs and benefits of available alternatives, including the alternative of not regulating, and that the agency should base its decisions on the best reasonably obtainable scientific, technical, economic, and other information. Additional research on the effectiveness and cost associated with side underride guards could better position NHTSA to determine whether these guards should be required and, if so, appropriate standards for their implementation. Such research may also help provide information to address the challenges stakeholders cited with side underride guards. In general, there are two types of tractors used in tractor-trailer combinations: conventional tractors, wherein the tractor is lower to the ground and the engine is in front of the cab where the driver sits, and “cab-over” tractors, which are designed so the driver sits atop the engine (see fig. 6). Conventional tractors are generally used in North America, whereas cab-over tractors are used more frequently in the European Union. Since 2000, the European Union has required tractors to include front guards to improve the protection of passengers in cars involved in head- on collisions with tractors. These guards are designed to lower the front profile of a cab-over tractor to be more compatible with that of a passenger vehicle to reduce the potential for underride or override, and to help absorb the force of a collision. Some conceptual designs for front guards on conventional tractors have been proposed by researchers in the U.S., but there are no designs available for purchase or installation as there are for side underride guards. Some research organizations have developed computer models of front guards, but these guards have not been produced for U.S. tractor configurations. Representatives from three trucking associations we spoke with stated that their members were not researching, producing, or installing front guards. A government official from Canada—where the conventional tractor design is also commonly used—said that they did not know of any tractor manufacturers or truck fleets that use front guards. Representatives from a tractor manufacturer that operates in both the U.S. and the European Union told us that front guard designs currently used in the European Union would not be compatible with conventional tractors used in the U.S., stating that these guards would need to be installed in the same space that the bumper, frame, and some equipment—including crash avoidance technologies—already occupy. The design of conventional tractors may mitigate the need for front guards for underride or override purposes, as the lower bumpers and frame make the height of conventional tractors more compatible with passenger cars. A 2013 NHTSA study found that tractors with lower bumper heights were less likely to be involved in an override crash than those with higher bumper heights. Government officials from the European Union told us that they did not see the need for conventional tractors to have front guards, since the lower bumpers essentially function as guards in frontal crashes. Officials from a state DOT, a state police department, and a local police department all stated that they do not see the need for front guards because the tractor is already so low to the ground. Further, state and local officials we spoke with noted that the front underride crashes they have seen often occurred at higher speeds, such as when a truck fails to stop for congested traffic or in a head-on collision at higher speeds. In these cases, the speed combined with the much greater weight of the truck could cause the truck to override the car (in the first scenario) or the car to underride the tractor (in a head-on collision). According to these officials, the force of the crash at those speeds— regardless of whether there was underride or override—would very likely be unsurvivable. Additionally, automatic braking systems in tractors and passenger vehicles may further mitigate the need for front guards for underride or override purposes. These technologies—which, according to a tractor manufacturer we interviewed, have been available and installed in some tractors—can potentially stop a tractor from, for example, overriding a passenger vehicle by automatically applying brakes in situations where a potential rear-end collision is detected. Representatives from a tractor manufacturer told us that about 70 to 80 percent of all newly manufactured tractors it produced are equipped with these braking systems and estimated that more than 50 percent of newly built tractors sold by all manufacturers in the U.S. include these systems. Additionally, front guard researchers we spoke with told us that some front underride guard systems would be optimally effective when paired with automated technologies, such as automatic braking systems. While stakeholders generally agreed that North American tractor designs may mitigate the need for front guards for underride or override purposes, NTSB has called for greater use of front guards. Specifically, in 2010, NTSB recommended that NHTSA, among other things, develop performance standards for front guards and, after doing so, require all newly manufactured trucks weighing more than 10,000 pounds to install these front guards. NTSB issued these recommendations based on its investigation of a June 2009 multi-car crash on an Oklahoma interstate, in which the driver of a tractor trailer failed to slow down for traffic stopped on the roadway. NTSB reported that the tractor-trailer’s high impact speed and structural incompatibility with the passenger vehicles contributed to the severity of the crash. As of December 2018, NHTSA had not implemented NTSB’s recommendations. NHTSA reported to NTSB in 2014 that it was in the process of conducting further examination of crash data, but that efforts in developing standards for front guards are a secondary priority to upgrading rear guard standards. NTSB stated that NHTSA’s response was disappointing and that it continues to believe that NHTSA actions are needed to implement this recommendation. Additionally, NTSB recommended in 2015 that NHTSA develop performance standards and protocols for assessing forward collision avoidance systems in commercial vehicles, which could also help to stop a tractor from overriding a passenger vehicle. According to NTSB, although NHTSA has performed some research on this technology, NTSB has deemed NHTSA’s responses as unacceptable. NHTSA officials told us that the agency anticipates completing relevant research and testing in 2019 that would give the agency the information it needs to make appropriate decisions on next steps related to these NTSB recommendations. FMCSA regulations require rear guards for certain single-unit trucks, such as delivery or dump trucks, that are more than 30 inches above the ground. However, according to representatives of the trucking industry we interviewed as well as NTSB, the wide variety of single-unit trucks makes it challenging to develop a one-size-fits-all requirement for underride guards. Single-unit trucks can vary widely with respect to weight, dimensions, and purpose and can include large pick-up trucks, fire trucks, and dump trucks. The FMCSA regulations exempt certain single-unit trucks—such as those already low to the ground—from the requirement to have a rear guard if the vehicle is constructed and maintained such that the body or other parts of the vehicle provide rear end protection comparable to rear guards required for other single-unit trucks. A trucking industry representative we spoke with said that his association was not aware of any manufacturers currently designing or planning to design crashworthy rear, side, or front underride guards for single-unit trucks due to the variability of single-unit truck design. Some U.S. cities, such as Boston, require pedestrian/cyclist side guards be installed on municipally owned single-unit trucks, but these guards are not designed to mitigate a passenger vehicle underride crash. Research shows that crashes involving single-unit trucks occur less often and are less likely to cause serious injuries and fatalities than those involving tractor-trailers. For example, a 2013 NTSB study of crash data from 2005 through 2009 found that single-unit truck crashes occurred less often, resulted in fewer fatalities, and were less likely to cause serious injuries than tractor-trailer crashes. NHTSA has also acknowledged that single-unit trucks represent the majority of the registered heavy vehicle fleet, but account for a lower percentage—27 percent—of rear end fatalities. To help address fatalities associated with underride crash fatalities involving single-unit trucks, as part of its 2013 study, NTSB recommended that NHTSA develop standards for crashworthy rear, side, and front guards for single-unit trucks, as well as devote efforts to crash avoidance technologies and include more variables in FARS to improve data collection. NTSB also noted that, because of the variability in vehicle design and cargo body styles, safety countermeasures for single-unit trucks would need to be adapted for different truck types to address technical challenges to their implementation. NHTSA published an ANPRM in 2015 that considered requiring rear guards with strength and energy absorption criteria for all newly built single-unit trucks. However, NHTSA subsequently found that the costs of this requirement outweighed the benefits. Comments on this ANPRM varied. For example, the American Trucking Associations stated that it believed NHTSA underestimated the costs associated with installing crashworthy rear guards for single-unit trucks. In contrast, IIHS, in its comments on the ANPRM, questioned NHTSA’s assumptions and stated that the agency was undervaluing the benefits and overestimating the costs. Specifically, IIHS noted that NHTSA overestimated the additional weight of the rear guards, thereby overestimating the cost by about 35 to 40 percent. IIHS also stated that due to concerns with the underlying data, NHTSA underestimated the number of crashes into the rear of single-unit trucks with passenger compartment intrusion. NHTSA officials told us that they disagreed with IIHS’s assessment and stated that the data NHTSA used in the ANPRM were valid and appropriate. The ANPRM also considered requiring single-unit trucks to install red and white retroreflective tape meant to increase the visibility of these trucks, especially in the dark. NHTSA found that this requirement would be cost- effective at preventing or mitigating crashes involving single-unit trucks. However, NHTSA has since withdrawn the ANPRM, stating that—based on the comments received as well as analysis of the petitions—the changes being considered were not justified. The likely underreporting of underride crashes and fatalities due to variability in the data collection process limits NHTSA’s ability to accurately determine the frequency of such crashes. An underride field in MMUCC and additional information from NHTSA on how to identify and record these crashes would provide greater assurance that state and local police officers are accurately reporting data on underride crashes. Such reporting would, in turn, enable NHTSA to better identify and support measures—such as rulemakings and research efforts—to help address this issue. While the stronger rear guards being voluntarily implemented by the largest trailer manufacturers show promise in mitigating the potentially devastating effects of rear underride crashes, rear guards will only be effective if they are properly maintained and replaced when damaged. The lack of specific requirements that rear guards be inspected annually for defects or damage potentially affects the safety of the traveling public and FMCSA’s ability to achieve its safety mission. Finally, designs of crashworthy side underride guards show promise at mitigating underride crashes, but manufacturers may be reluctant to move forward with further development of these types of guards without information from NHTSA on the effectiveness, cost, and implementation standards for these devices. With additional research on resolving the challenges associated with side underride guards, these guards may be closer to being a feasible solution than automated driver assistance technologies designed to prevent or mitigate side impacts that could lead to an underride crash. We are making the following four recommendations to DOT: The Administrator of the National Highway Traffic Safety Administration should recommend to the expert panel of the Model Minimum Uniform Crash Criteria to update the Criteria to provide a standardized definition of underride crashes and to include underride as a recommended data field. (Recommendation 1) The Administrator of the National Highway Traffic Safety Administration should provide information to state and local police departments on how to identify and record underride crashes. (Recommendation 2) The Administrator of the Federal Motor Carrier Safety Administration should revise Appendix G of the agency’s regulations to require that rear guards are inspected during commercial vehicle annual inspections. (Recommendation 3) The Administrator of the National Highway Traffic Safety Administration should conduct additional research on side underride guards to better understand the overall effectiveness and cost associated with these guards and, if warranted, develop standards for their implementation. (Recommendation 4) We provided a draft of this report to DOT for comment. In its written comments, reproduced in appendix II, DOT stated that it concurred with our recommendations. DOT also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Transportation, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our work for this report focused on truck underride crashes, and the U.S. Department of Transportation’s (DOT) efforts related to this issue. In particular, this report examines (1) the data DOT reports on underride crashes, and (2) the development and use of underride guard technologies in the U.S. For both objectives, we conducted a literature review to identify studies regarding truck safety, in general, and underride guards, in particular, published from 1970 through 2018. We conducted a search for relevant peer-reviewed articles, government reports, trade and industry articles, and think tank publications. Key terms included various combinations of “underride,” “crash,” “collision,” and “guard.” We included those studies that were methodologically sound and covered underride crash data, guard technologies, and benefits and costs relevant to our scope. Additionally, we interviewed and analyzed the perspectives of government officials from DOT, the National Highway Traffic Safety Administration (NHTSA), the Federal Motor Carrier Safety Administration (FMCSA), and the National Transportation Safety Board. We interviewed officials from foreign transportation agencies—Canada and the European Union—that were selected based on our review of literature identified above and recommendations from preliminary interviewees. We also interviewed a variety of relevant non-governmental organizations to gain their perspectives on topics related to underride crashes and guards. These organizations represent a variety of key players in their respective fields on underride crash-related topics. We grouped these entities into the following categories: (1) trailer manufacturers, (2) trucking industry organizations, (3) tractor-trailer fleets and related organizations, (4) traffic safety organizations, and (5) research organizations. We interviewed seven of the top eight trailer manufacturers in the United States, as identified by the Insurance Institute for Highway Safety. We requested an interview with Stoughton Trailers, but they declined to participate. The organizations we contacted as part of this work are listed at the end of this section. We also interviewed NHTSA officials and conducted semi- structured interviews with officials in five selected states, including officials in five state departments of transportation and five state and two local police departments to understand and identify limitations, if any, in how underride crash-related data are collected and analyzed. The results of these interviews are not generalizable to all states and localities; however, they offer examples of the types of experiences state DOTs and police have with underride crashes and inspections. We selected states based on several factors to identify states that were similar in highway traffic trends and large truck-related fatality rates, but collected underride crash data differently. Selection factors included highway vehicle miles traveled per state, total underride crash fatalities by state in 2016 as reported by NHTSA, and the presence of an underride crash data field on each state’s crash report form. Based on these factors, we selected and conducted interviews with state DOT and state police officials in California, Illinois, Indiana, Pennsylvania, and Tennessee. We also corresponded with officials from the Ohio DOT for clarification questions. We interviewed local police departments in Chicago, Illinois and Terre Haute, Indiana. To identify the data DOT reports on truck underride crashes, we analyzed existing DOT data on underride crashes and fatalities from 2008 through 2017, the 10 most recent years for which these data are available. We reviewed DOT documentation for policies and procedures on data collection and data reliability assessments for underride crash-related data. NHTSA fatality data came from the Fatality Analysis Reporting System (FARS). FARS is a census of all fatal traffic crashes in the United States that provides uniformly coded, national data on police-reported fatalities. We analyzed these data to determine the reported number of fatalities involving underride crashes. To assess the reliability of the FARS data, we reviewed relevant documentation and spoke with agency officials about the data’s quality control procedures. We determined that the data were sufficiently reliable for the purposes of this report, specifically to provide a high-level overview of underride crash fatalities within recent years. However, we did identify potential underreporting of underride crashes and fatalities, as discussed in this report. We also reviewed NHTSA’s annual Traffic Safety Facts reports—which use FARS data—to determine the annual number of traffic and large truck crash fatalities from 2008 to 2017, the 10 most recent years for which these data are available. We reviewed state crash report forms from all 50 states and the District of Columbia to understand the variability of underride crash-related data elements and how such variability could affect DOT’s data collection and analysis efforts. We compared NHTSA’s data collection efforts to federal internal control standards related to use of quality information. To describe the development and use of truck underride guard technologies in the United States, we reviewed research and documentation on underride guards. Primarily, we reviewed documents relating to underride guards from NHTSA and FMCSA, as well as information from traffic safety groups, trucking industry organizations, research organizations, and selected foreign transportation agencies. We reviewed NHTSA’s regulations requiring rear guards, FMCSA’s regulations requiring commercial vehicle inspections, DOT’s documentation on underride guard technologies, and DOT data on commercial vehicle inspections. To assess the reliability of DOT’s commercial vehicle inspection data, we reviewed relevant documentation and spoke with agency officials about the data’s quality control procedures. We determined that the data were sufficiently reliable for the purposes of this report, specifically to provide a high-level overview of commercial vehicle inspections within recent years. We compared DOT’s efforts to pertinent agency regulations on commercial vehicle inspections, federal internal control standards related to use of quality information, and a statement of federal principles on regulatory planning and review. We spoke with relevant non-governmental organizations to obtain their perspectives on the perceived benefits and costs of rear, side, and front underride guards, and the potential factors that may influence the benefits and costs. We conducted this performance audit from January 2018 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Susan Fleming, (202) 512-2834 or flemings@gao.gov. In addition to the contact named above, Sara Vermillion (Assistant Director); Daniel Paepke (Analyst in Charge); Carl Barden; Jessica Du; Mary Edgerton; Timothy Guinane; David Hooper; Gina Hoover; Madhav Panwar; Joshua Parr; Malika Rice; Oliver Richard; Matthew Rosenberg; Pamela Snedden; and Michelle Weathers made key contributions to this report.", "summary": "Truck underride crashes are collisions in which a car slides under the body of a truck—such as a tractor-trailer or single-unit truck—due to the height difference between the vehicles. During these crashes, the trailer or truck may intrude into the passenger compartment, leading to severe injuries or fatalities. Current federal regulations require trailers to have rear guards that can withstand the force of a crash, whereas the rear guards required for single-unit trucks do not have to be designed to withstand a crash. There are no federal side or front underride guard requirements. GAO was asked to review data on truck underride crashes and information on underride guards. This report examines (1) the data DOT reports on underride crashes and (2) the development and use of underride guard technologies in the U.S. GAO analyzed DOT's underride crash data for 2008 through 2017; reviewed NHTSA's proposed regulations and research on new guard technologies; and interviewed stakeholders, including DOT officials, industry and safety groups, and state officials selected based on reported underride crash fatalities and other factors. According to crash data collected by police and reported by the Department of Transportation's (DOT) National Highway Traffic Safety Administration (NHTSA), fatalities from “underride” crashes, such as those pictured below, represent a small percentage of all traffic fatalities. From 2008 through 2017, an average of about 219 fatalities from underride crashes involving large trucks were reported annually, representing less than 1 percent of total traffic fatalities over that time frame. However, these fatalities are likely underreported due to variability in state and local data collection. For example, police officers responding to a crash do not use a standard definition of an underride crash and states' crash report forms vary, with some not including a field for collecting underride data. Further, police officers receive limited information on how to identify and record underride crashes. As a result, NHTSA may not have accurate data to support efforts to reduce traffic fatalities. Underride guards are in varying stages of development, and gaps exist in inspection of rear guards in current use and in research efforts for side guards. NHTSA has proposed strengthening rear guard requirements for trailers (the rear unit of a tractor-trailer) and estimates about 95 percent of all newly manufactured trailers already meet the stronger requirements. Although tractor-trailers are inspected, Federal Motor Carrier Safety Administration annual inspection regulations do not require the rear guard to be inspected, so damaged guards that could fail in a crash may be on the roadways. Side underride guards are being developed, but stakeholders GAO interviewed identified challenges to their use, such as the stress on trailer frames due to the additional weight. NHTSA has not determined the effectiveness and cost of these guards, but manufacturers told GAO they are unlikely to move forward with development without such research. Based on a 2009 crash investigation, the National Transportation Safety Board (NTSB) recommended that NHTSA require front guards on tractors. NHTSA officials stated that the agency plans to complete research to respond to this recommendation in 2019. However, stakeholders generally stated that the bumper and lower frame of tractors typically used in the U.S. may mitigate the need for front guards for underride purposes. Regarding single-unit trucks , such as dump trucks, NTSB has recommended that NHTSA develop standards for underride guards for these trucks, but the agency has concluded these standards would not be cost-effective. GAO recommends that DOT take steps to provide a standardized definition of underride crashes and data fields, share information with police departments on identifying underride crashes, establish annual inspection requirements for rear guards, and conduct additional research on side underride guards. DOT concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Space transportation is the movement of objects, such as satellites and vehicles carrying cargo, scientific payloads, or passengers, to or from space. In the United States, commercial space transportation is carried out using orbital and suborbital launch vehicles owned and operated by private companies. Key parties involved in commercial space transportation activities include: The commercial launch provider—the entity that conducts the launch of a vehicle and the payload it carries. The launch customer—the entity that pays the launch provider to carry a payload into space. Customers include the U.S. government— which has not operated its own launch vehicles since the retirement of the Space Shuttle in 2011 and primarily relies on commercial launch providers to, among other things, resupply the International Space Station, launch satellites, and carry out national security and defense missions. Customers also include private companies, such as satellite owners, and researchers. The launch site operator—the entity that hosts the launch (or reentry, or both) of the launch vehicle from its launch site. Almost all launch site operators are either commercial launch providers or state or municipal government entities. The U.S. share of the global commercial space transportation market has grown in recent years. For example, according to FAA, 64 percent of the 33 worldwide commercial orbital launches in 2017 occurred at U.S. launch sites, up from about 48 percent in 2014. Commercial launch providers currently use, and are developing for future use, a variety of vehicles to launch payloads. Historically, launch providers have carried payloads into orbit using vertically launched expendable launch vehicles—those vehicles that launch only once. In more recent years, a launch provider, SpaceX, has introduced launch vehicles that can be reused for multiple launches, such as Falcon 9 and Falcon Heavy, where one part or all of the launch vehicle returns to a landing pad, either on land or on a converted barge offshore, after the payload is launched into orbit. Commercial launch providers are also moving toward reusable suborbital launch vehicles, some intended for human space tourism. These vehicles include horizontal hybrid suborbital launch vehicles, such as Virgin Galactic’s SpaceShipTwo, and vertical reusable suborbital launch vehicles, such as Blue Origin’s New Shepard. Figure 1 depicts examples of expendable and reusable vertical launch vehicles. Launch site infrastructure, and those who own and operate it, also varies across individual launch sites. The type of infrastructure and its design depends on the type of operations that the launch site supports. For example, some launch sites may have a launch pad for vertical launches but not a runway for horizontal launches; others may have infrastructure specifically to support launch vehicle reentry operations. While many different types and designs exist, figure 2 below shows a few examples of major pieces of launch site infrastructure. Within FAA, AST is responsible for regulatory oversight of the commercial space transportation industry. AST’s primary means of oversight is licensing or permitting commercial launch and reentry vehicle operations and non-federal launch sites, as well as conducting safety inspections of licensed launch providers and site operators. AST is organized into three management and support offices, including the Office of the Associate Administrator, and five operational divisions—responsible for the majority of AST’s primary mission areas, such as licensing and overseeing launches. In addition, the FAA Reauthorization Act of 2018, signed into law in October 2018, requires that AST develop an Office of Spaceports. According to FAA officials, as of May 2019, the size and design of this office have not yet been finalized. AST’s workforce size is expected to increase to help accommodate anticipated growth in the industry and AST’s workload (see table 1). As of February 2019, AST had 104 full-time equivalent positions and an operations budget of about $25 million—an increase of 25 full-time equivalent positions and about $8 million since fiscal year 2015. FAA requires launch providers conducting a launch or reentry within U.S. borders to obtain a license or permit, as well as those conducting a launch or reentry abroad, if the launch provider is a U.S. entity. FAA considers a commercial launch to be one in which the contract for the main payload’s launch was open to international competition or the launch was privately financed without government support. FAA also requires, with some exceptions, a site operator’s license, which authorizes an entity, such as a state or local government, to host commercial space launch operations from a specific launch site. FAA is to conduct safety inspections of licensed commercial space transportation launch operations, which involves monitoring of pre-operational, operational, and post operational activities. In February 2018, the National Space Council recommended that DOT update the regulations on launch and re-entry licensing to better accommodate changes that have occurred in the industry. The White House subsequently directed DOT to publish a proposed rule by February 1, 2019, with a revised framework that allows more flexibility in how companies can meet the regulatory requirements. DOT published a notice of proposed rulemaking for the revisions to its licensing regulations in April 2019. Around the mid-20th century, the federal government began constructing the infrastructure that supports the majority of commercial orbital space launches today. The Department of Defense (DOD) constructed launch sites to support ballistic missile testing and satellite launches, including sites that are now home to Cape Canaveral Air Force Station in Florida and Vandenberg Air Force Base in California. Those sites conducted their first test launches in 1950 and 1958, respectively. The National Aeronautics and Space Administration (NASA) was created in 1958, and began acquiring land adjacent to Cape Canaveral Air Force Station in 1962 to support its human spaceflight lunar program; this land is now home to the Kennedy Space Center. In recent years, nearly all FAA-licensed launches in the United States occurred at three federal ranges, which were originally built by the federal government (see fig. 3). All 61 of the FAA-licensed commercial orbital launches from 2015 through 2018 occurred at launch sites that are on or co-located with federal ranges, with 44 of the 61 launches taking place at Cape Canaveral Air Force Station and Kennedy Space Center (collectively referred to as “Cape Canaveral”). In addition, one of the 11 licensed commercial suborbital launches occurred at a launch site co- located with a federal range. While the federal government made the initial infrastructure investment at federal ranges, the launch complexes used for commercial launch operations at these sites are now operated under use agreements by non-federal entities, such as state governments or commercial launch providers. For example, four of the launch complexes at Cape Canaveral are operated by commercial launch providers, while two others are operated by the State of Florida. Two other federal ranges have launch pads that are also operated by non-federal entities—Vandenberg Air Force Base in California and the Mid-Atlantic Regional Spaceport, which is co-located with NASA’s Wallops Flight Facility in Virginia. The Air Force and NASA generally still have responsibility for maintaining common-use infrastructure—that is, infrastructure that may be shared by multiple users, such as access roads and fuel pipelines. As part of the operators’ use agreements (the details of which vary depending on the launch site and launch site operator), however, funding for improvements to infrastructure used solely by that site operator is generally left to the site operator. This arrangement is in part because the infrastructure improvements are necessary to support the unique needs of specific commercial launch vehicles using those sites. At another launch site, the federal government followed a different infrastructure investment model. In the 1990s, the Air Force partnered with the state of Alaska to help fund the construction of a state-owned site to support federal government launches and missile testing rather than constructing a new federal range. This site, known as the Pacific Spaceport Complex – Alaska, conducted its first government launch in 1998. Major infrastructure includes two launch pads with shared vehicle integration and transfer facilities. According to spaceport officials at this site, in addition to government launches, Alaska Aerospace, a state entity that operates the site, has contracts with three commercial launch providers, which anticipate conducting commercial orbital launches there in the future. Appendix II provides additional information on launch sites co-located with federal ranges, as well as funding sources and characteristics for other U.S. commercial launch sites. While the federal government has not directly funded the construction of infrastructure at launch sites in recent years, state and local governments have done so. According to interviews we conducted and our review of publicly available documents of state-government entities that were formed to promote space-related development, state and local governments are investing in infrastructure to obtain the economic benefits of attracting space-related businesses to their areas. In two cases, state governments became operators of launch sites co-located with federal ranges and invested in infrastructure improvements at those sites to support commercial orbital launch vehicles. The Commonwealth of Virginia—through Virginia Commercial Space Flight Authority, an independent state entity created in part to develop and promote Virginia’s commercial space transportation industry— invested $90 million in improvements to a launch pad at the Mid- Atlantic Regional Spaceport. This represented a share of the total costs, which were shared by Northrop Grumman Innovation Systems, a commercial launch provider that has an agreement to use the pad for commercial launches, including cargo resupply missions to the International Space Station. The State of Florida—through Space Florida, an independent special district that serves the state’s space-related needs—has provided over $140 million in infrastructure investments. Those investments upgraded launch pads and the supporting infrastructure at Cape Canaveral, as well as provided grants matched by commercial launch providers for improvements to infrastructure used by those providers. In other cases, state and local governments have invested in wholly new commercial launch sites or are adapting existing airport infrastructure to use as launch sites. According to these launch site operators, these sites are currently used for suborbital launches but could support orbital launches in the future. The state of New Mexico funded the construction of the commercial launch site known as Spaceport America through $225 million in state appropriations and local taxes in two counties. The state also has a 20-year lease agreement with Virgin Galactic, which plans to conduct commercial suborbital space tourism launches from the site. This launch site, with its 12,000-foot-by-200-foot runway, hosted one FAA- licensed suborbital test launch in 2018. In California, the Mojave Air and Space Port (Mojave) is a general aviation airport that obtained an FAA license to conduct commercial suborbital launches in 2004. In addition to continuing its general aviation operations, Mojave currently provides a runway and mission preparation area to commercial launch providers testing vehicles designed for orbital and suborbital launches. This site hosted three FAA-licensed suborbital test flights in 2018. According to a representative from Mojave, the site generally funds infrastructure maintenance with rents and user fees, while launch providers build their own facilities. In July 2018, Mojave also received a $1.4 million grant through FAA’s Airport Improvement Program for the purpose of extending an airport taxiway. According to a Mojave representative, the location of the taxiway extension will be available for hangar development by both aviation and commercial space users on a first- come, first-serve basis. The project was completed in April 2019. Commercial launch providers fund infrastructure improvements at existing launch sites—both co-located with federal ranges and elsewhere—to ensure the sites are tailored to their unique launch vehicles. For example, under its agreements to use launch pads at the federal ranges at Cape Canaveral and Vandenberg Air Force Base, SpaceX representatives told us they invested “hundreds of millions” of dollars in new infrastructure and infrastructure improvements, such as constructing new liquid fuel lines and improving launch pad cooling systems. According to SpaceX representatives, the company made these investments to support the specific needs of its launch vehicles and the rapid pace at which it is currently launching. Virgin Galactic and Stratolaunch—two other commercial launch providers developing suborbital and orbital launch vehicles, respectively—funded the construction of hangars and testing facilities for their launch vehicles at Mojave Air and Space Port. Three of the seven commercial launch providers that we spoke with constructed or are currently constructing new launch sites for their exclusive use. Representatives from two of them said doing so allows them to schedule launches without having to compete with other launch providers at existing launch sites. Two of these commercial launch providers also told us they had not received any government funding for these sites, while the third told us it had received some support from the state government where the site is located. As the commercial space transportation industry continues to evolve, it may lead to more investments in launch sites that are not currently supporting commercial orbital launches. For example, some commercial launch providers are developing launch vehicles consisting of a rocket launched from an airplane in flight, enabling launches from runways rather than launch pads. This could change how and which entities fund launch site infrastructure. Commercial space transportation is a global industry. We identified seven countries, including the United States, that have launch providers with the capability to support an orbital launch of a commercial payload (see fig. 4). In 2017, 7 of the 22 FAA-licensed launches conducted in the United States contained a payload from a non-U.S. launch customer, including several communications satellite operators and one civilian space agency, according to FAA. Similarly, some U.S. launch customers we interviewed said they have used non-U.S. launch providers. According to representatives of the seven domestic and non-U.S. companies we interviewed that use launch services for placing their products into Earth orbit or other trajectories, several factors influence their selection of a launch provider. Many of these representatives acknowledged that as part of their business decision, a prerequisite is that the launch provider’s vehicle and launch site must have the capabilities to meet the customer’s mission requirements, such as having the capability to bring the payload to the desired orbit at the desired time. That capability, in turn, depends on factors such as the lift capacity of a provider’s launch vehicle—which dictates the maximum weight the vehicle can carry—and the geographic locations of its launch sites. For example, launch vehicles operating from sites closer to the equator can place payloads into certain orbits using less fuel due to Earth’s rotational velocity. The direction a launch vehicle can travel from a launch site also affects the orbits into which the vehicle can most efficiently place a payload. For example, Vandenberg Air Force Base in California—which allows launch vehicles to travel west over the Pacific Ocean—is more efficient for certain orbits, while Cape Canaveral—which allows vehicles to travel east over the Atlantic Ocean—is more efficient for others. Beyond selecting a launch provider that has capabilities to meet a launch customer’s mission requirements, six of the seven launch customers we spoke with said the price of a launch is a key deciding factor. For example, a representative from an international satellite operations company told us that the company achieved significant savings by procuring a series of launches from its selected provider. According to the representative, using a different launch provider would have cost almost twice as much—a price that would have forced the company to delay its launch plans. According to data published in FAA’s Annual Compendium of Commercial Space Transportation: 2018, there is wide variation in the commercial price of launches worldwide, ranging from an estimated $62 million to $178 million per launch. The exact price paid for many launches is considered proprietary by both launch customers and commercial launch companies, and is therefore not reported publicly. Moreover, price can be affected by the size and weight of the payload, the intended orbit being reached, and other mission-related factors. As a result, direct comparison of launch prices is difficult. In addition to price, a launch provider’s availability and reliability are also key factors, according to launch customers we spoke with. Six of the launch customers we spoke with mentioned availability as a key factor, which is the launch customer’s ability to reserve a place on the launch provider’s launch schedule. For example, a representative from a domestic small satellite operations company said it can be difficult to find available launches in the United States because the company relies on sharing launches with larger payloads, and few U.S. launches travel to the company’s desired orbit. As a result, the company has procured launch services from Indian and Russian launch providers. Five launch customers mentioned reliability—generally a launch vehicle’s history of successful launches—as a key factor, in part due to the financial impact of a failed launch. For example, a representative from a non-U.S.-based satellite operations company said that in the event of a failed launch, insurance would generally cover the cost of the lost payload, but not lost revenue that would have been generated by the payload in orbit. Some launch customers noted that choosing a launch provider is a complex decision, and that the key factors they consider can be interdependent. For example, the representative from the non-U.S.-based satellite operations company said that while a launch provider may offer a lower price on a less reliable vehicle, the lack of reliability could increase the customer’s payload insurance costs, effectively increasing the launch price. A representative from a company seeking to launch into deep space told us they would only consider a provider that is not only reliable but also has years of successful operations and a proven business plan. According to FAA officials, FAA has been considering changes in its licensing regulations since 2015 and recently has accelerated these efforts. Dating back to 2015, according to FAA officials, FAA had been taking an iterative approach by first making “quick wins”—that is, making administrative changes or straightforward regulatory revisions—with a long-term goal of fully consolidating and streamlining the regulations over a period of several years. FAA’s approach changed, however, when in May 2018, a Presidential Directive was issued that addressed both the timing and content of FAA’s regulatory updates. The directive contained a deadline to publish a proposed regulation for public comment by February 1, 2019. It also directed the Secretary of Transportation to replace the current prescriptive regulations for commercial space launch licensing—in which a certain technology or action is required—with a regulatory framework that is performance-based—in which applicants have flexibility in how they achieve required outcomes, such as a specific level of safety. In response to this directive, DOT published a notice of proposed rulemaking (NPRM) in April 2019 to solicit comments on a proposed rule that will incorporate performance-based requirements. According to FAA officials, they had planned for the NPRM to be published by February 1st, 2019, consistent with the deadline in the directive, but the publication was delayed due to the lapse in DOT’s appropriations that took place in early 2019. A timeline of key actions related to launch licensing regulation is shown in figure 5 below. The preamble of the NPRM states that the proposed rule intends to satisfy the requirements of the Presidential Directive, including consolidating and revising multiple regulatory parts to apply a single set of licensing and safety regulations across several types of operations and vehicles, and replacing prescriptive regulations with performance-based rules. The preamble further states that these changes will give industry greater flexibility to develop means of compliance that maximize their business objectives while maintaining public safety. The proposed rule also seeks to address recommendations made by an Aviation Rulemaking Committee (ARC) that was created in March 2018 as a forum for industry to discuss procedures and requirements for launch and reentry licensing. For example: The ARC recommended that FAA propose rules to eliminate potentially duplicative requirements for launches at federal ranges. Currently, launch providers at federal ranges are subject to FAA’s requirements in addition to those of the range operator (NASA or the Air Force), which may be duplicative of each other. The preamble to the NPRM states that, while FAA has not included language to eliminate duplicative approvals, FAA would continue to work with the appropriate agencies to streamline launch and reentry requirements at ranges and federal facilities. The ARC also recommended more flexibility in licensing such that a single license structure could accommodate a variety of vehicle types and launch or re-entry sites. The preamble states that the proposed rule would, among other actions, eliminate the current limitation specifying a launch license covers only one launch site. As part of the rulemaking process, FAA must comply with a number of requirements before the final rule can be issued. FAA is statutorily required to provide a period of time to solicit public comments on the proposed regulation. FAA must then reasonably respond to public comments submitted on the NPRM and determine whether any changes to the proposed rule may be required as a result of the comments. Some changes made in response to comments would allow AST to proceed with publication of the final regulation. However, major changes not contemplated in the NPRM could necessitate a supplemental NPRM, which could affect the timing of the final regulation’s publication. FAA provided 60 days after publication in the Federal Register for the public comment period. And, while officials told us that they plan to work toward publishing the final rule by the end of 2019, the schedule was affected by DOT’s lapse in appropriations. They also noted that the quantity and content of the public comments and the time and resources required to respond to them will influence that date. Officials estimate that the public comments could number in the thousands. Further, there is a lack of industry consensus in some areas. For example, according to the cover letter accompanying the final ARC report, the report did not include specific recommendations that were agreed upon by all participants. Almost half of the industry stakeholders that participated in the ARC and provided comments on the ARC final report (8 of 19) did not fully concur with the report. Industry stakeholders disagreed on issues such as the requirements for testing flight safety systems, which would be considered as part of the licensing process. The lack of consensus among ARC participants suggests that the NPRM may also generate significantly different perspectives. Furthermore, FAA officials emphasized that the NPRM addresses a highly complex and technical issue, using a wholly revised performance- based regulatory framework, an approach that could affect implementation timelines. We found in the past that the complexity of the issues addressed by rulemakings is a major factor influencing the time needed to issue a regulation. FAA officials told us they intend to complete other related activities that support the rule, such as finalizing guidance documents to provide transparency and help ensure that licensing applicants understand the new requirements. Such guidance may, for example, provide examples of how to comply with the new performance-based requirements. FAA also intends to implement new administrative tools to help AST review licensing applications more quickly. Specifically: Guidance: FAA released a number of draft guidance documents in the form of Advisory Circulars with the NPRM. These Advisory Circulars cover a range of topics, such as providing ways for applicants to comply with requirements for flight safety analysis and lightning hazard mitigation, and provide at least one way an applicant could demonstrate compliance with each performance-based requirement in the proposed rule. FAA officials told us that they plan to publish these Advisory Circulars in final form simultaneous with publishing the final regulation. Through the ARC process, FAA sought input from industry on the standards that should be used to demonstrate compliance with the performance-based regulations. In the long term, however, FAA told us that they are encouraging the industry to develop voluntary consensus standards that the FAA could then accept as an acceptable way of demonstrating compliance. Administrative Tools: FAA officials said they are in the early stages of looking at ways to reduce the administrative burden on FAA and licensing applicants during the licensing process. For example, FAA officials told us that in 2019 they will be examining ways to automate and streamline the licensing process. FAA officials told us that they would like to implement a system whereby applicants, for the first time, would submit applications electronically to an FAA-sponsored system rather than by hard copy or attachments to an email. According to the preamble of the NPRM, FAA’s proposal would allow an applicant to submit its application by email as a link to a secure server, and would remove the requirement that an application be in a format that cannot be altered. In addition to easing the burden of developing paper applications, FAA officials told us they envision that an electronic system would enable both FAA and industry to view the application during the application process and more easily communicate about its progress. In recent years, AST has improved some aspects of how it determines its workforce needs. Our work on strategic workforce planning underscores the importance of determining both current and future workforce needs and identifying potential gaps in employee skills. The improvements made to date provide AST with greater insight into the optimal number of people currently needed in certain positions. However, these improvements do not improve AST’s ability to systematically assess the workforce needs of its management and support offices, nor does AST project its future workforce needs. Moreover, AST has yet to collect information on staff skills and competencies that would enable it to identify potential gaps in those skills, gaps that further limit AST’s ability to effectively and efficiently align its available staff resources with current and future workloads. To assist FAA decision makers in understanding and meeting AST’s staffing needs, AST developed and annually updates a 5-year workforce plan for its office. The current plan—covering the period from 2018 through 2022—indicates that AST’s approach for workforce planning has a 5-year time frame. However, the plan discusses immediate workforce and resource needs in general terms. One of the key principles we identified in our prior work on effective strategic workforce planning is the importance of determining the workforce needs that are critical to achieving an organization’s current and future programmatic goals. Such a determination of workforce needs should include both the optimal number of staff needed in specific positions and the required skillsets and levels of expertise for staff. Since 2016, AST has taken several steps to better understand how it uses its staff resources in carrying out its mission to license and oversee space launch operations. The majority of AST’s operations budget— about 75 percent in fiscal year 2018—was used to fund salaries and related expenses. AST now comprehensively monitors and measures staff time spent on specific activities and measures and tracks the volume of its work—information it can use to better understand workforce needs. AST officials told us that these steps facilitate more informed decision-making about the number of staff needed in specific positions for the next budget cycle. However, these steps do not provide the information AST needs to determine the optimal size and composition of its entire workforce or enable it to project workforce needs sufficiently into the future. AST launched a revised timecard system in June 2016 to more comprehensively account for staff time spent on specific activities. According to AST officials and our review of relevant documentation, including a list of revised time codes, the revised system allows staff to record hours worked on individual tasks, such as launch observations or consultations with launch companies prior to application submission (i.e., pre-application consultation), training, and leave. Time codes were revised for all AST staff—that is, staff in its five operational divisions, management office, and two support offices (see fig. 6)—to account for all major tasks they perform. AST officials told us that the new timecard data, in combination with workload metrics, can help inform its current workforce needs. For its five operational divisions, AST officials have developed and continue to refine a set of workload metrics, which, along with other data, enable AST to identify the resources that are used to carry out key AST activities, such as licensing and overseeing launches. These metrics track the number of work activities (e.g., regulatory waivers issued or safety inspections conducted) that are ongoing or were completed over a certain time period. For example, in fiscal year 2018, AST was engaged in pre- application consultations with about 23 commercial launch providers and was evaluating more than 16 license applications on average per month. Officials analyze these metrics in combination with timecard data to determine the number of staff hours and average number of days spent completing specific activities. For example, between March and August 2017, FAA officials reported that for each ongoing project, staff spent an average of about 60 hours per month on pre-application consultations. Officials plan to use the results of this analysis in the fiscal years 2021– 2022 budget cycle to help estimate the number of staff currently needed in specific positions within its five operational divisions. However, with regard to its management and two support offices— which represent about one-third of AST’s total staff—AST has not yet developed workload metrics. Staff in AST’s management and support offices are responsible for overseeing research and development; advising and assisting other offices on technical matters; coordinating and liaising with international entities and other federal agencies; as well as performing other support operations, such as budget and financial planning. Officials told us that although they would like to develop these metrics, they put the effort on hold because of competing priorities within AST, such as updating its licensing regulations. Officials said that they had first focused on better understanding the workforce needs of the operational divisions, which have responsibility for the majority of AST’s primary mission areas, such as licensing and overseeing launches. In discussing this approach AST officials stated that recent budget constraints have limited their ability to address all of their current identified workforce needs, which, according to their most recent workforce plan, are in nearly all areas of their office. As a result, officials said that they use their limited number of authorized positions to fill their most immediate workforce needs, typically in the operational divisions. However, without workload metrics that would allow AST to determine the number of staff needed for its workload regardless of what office or division, it is difficult for AST to determine the appropriate number and composition of staff to most effectively carry out its statutory priorities and help ensure that it uses its limited resources in the most efficient way. In addition, AST officials told us that they recognize that past hiring decisions and balance of workload among staff may not have been fully aligned with AST’s statutory priorities and that the composition and ratio of staff may no longer be appropriate given the evolution of the industry and the revised regulatory structure under way. As a result, officials stated that in the coming months they intend to take a fresh look at the organization of the Office of Commercial Space Transportation as a whole to better balance the needs of the industry with the organizational requirements. In addition to developing an Office of Spaceports, as required by the FAA Reauthorization Act of 2018, officials told us that they will consider re-organizing the offices and divisions, as well as the workload and staff currently within them. AST also has taken steps to improve its ability to estimate its workload for a 2-year budget cycle, which, according to AST officials, will help them determine and justify near-term workforce needs. Specifically, from the new workload metrics discussed above, AST officials told us they had identified five key activities that best reflect historical workload trends and that officials then plan to combine with their assumptions about how the industry will evolve over the next 2 years. Officials told us that they plan to use this approach for the first time in the fiscal years 2021–2022 budget cycle. In past budget cycles, AST relied primarily on the projected number of launches to estimate its workload; this number, officials noted, is the most important factor but resulted in an incomplete reflection of the five operational divisions’ workload. For example, officials told us that the workload of its operational divisions encompasses a range of activities leading up to a launch that would not be captured in its workload estimates if AST only looked at the number of launches. Now, under their planned approach, AST officials said that they will better account for the full range of regulatory activities and the timeline of its licensing process. While planned improvements to AST’s workload estimates better account for the full range of AST’s regulatory activities, limiting these estimates to the 2-year budget cycle reduces AST’s ability to anticipate and respond to emerging workforce needs. AST recognizes the importance of longer- term workforce planning by developing and annually updating a 5-year workforce plan. Also, as noted above, key principles for effective strategic workforce planning emphasize the importance of forward-thinking planning to help organizations align their workforce to meet future programmatic goals. According to AST officials, they estimate the workload for 2 years in part because it is intended to help them identify and justify workforce needs during the 2-year budget process, as well as prioritize addressing immediate workforce needs. Officials also said that substantial uncertainty surrounds longer-term industry forecasts, and consequently, any assessment of longer-term workforce needs. For example, they pointed to a number of factors that lead to the unpredictability of how the industry will evolve, including the variable pace at which new launch companies progress and the future of the commercial suborbital launch sector, particularly the nascent space launch tourism industry. They also noted that a launch vehicle accident or other risks could affect the industry’s rate of growth. In our prior work, we have discussed some approaches used by other agencies to help assess future workforce needs when faced with uncertainties. One approach involves scenario planning, in which a federal agency operating in a changing environment used a range of scenarios, each of which represented different future environments that the agency may face, to help predict how the scope and volume of its activities might change in each scenario. For AST, such an approach could entail developing a range of workload projections based on different industry and regulatory environments that it thinks it may face, along with associated workforce management strategies to address those environments. AST officials said that they were considering projecting their workload estimates further into the future and intend to work with FAA’s Office of Aviation Policy and Plans—the office that helps develop FAA’s 20-year aerospace industry forecasts—to leverage that office’s forecasting expertise. However, AST has not established a timeline with milestones or formally committed to conducting longer-term workload projections. Longer-term workload projections may be particularly beneficial to AST to help make well-timed decisions about hiring and training staff and to help ensure AST has qualified staff available when they are needed. For example, according to officials, it can take a few years for systems safety engineers to be trained and have the sufficient experience to lead projects. Further, AST officials told us that hiring technically qualified personnel, including positions that require considerable training and experience to be a fully functioning employee, is challenging. Without an understanding of its projected workload beyond a budget cycle, AST will be limited in its ability to effectively and strategically plan for its longer- term workforce needs and take action when the opportunity arises. As such, AST remains at risk of not having the right number of staff in the right positions to keep pace with and respond to changes in the commercial space transportation industry. Our prior work on strategic workforce planning underscores the importance for organizations to determine the skills and competencies that are critical to successfully achieving their current and future missions and goals. Once the necessary skills and competencies have been identified, key principles for effective strategic workforce planning call for an organization to identify—and subsequently develop strategies to address—gaps between the skills and competencies needed and those that its workforce has. Those gaps should include both current skills gaps (i.e., skills that its workforce currently needs but does not possess) and emerging skills gaps (i.e., skills that its workforce may need in the future but does not possess). Further, according to federal Standards for Internal Control, an organization’s management should ensure that the workforce skills necessary to achieve programmatic goals are continually assessed. This step is especially important as changes in national security, technology, budget constraints, long-term fiscal challenges, and other factors may occur in the environment within which federal agencies operate. AST, however, does not currently collect the information needed for it to conduct a skills gap analysis. Rather, AST has a basic understanding of the skills and competencies of its workforce. For example, its current workforce plan includes the following information on AST’s workforce: Level of education—the percentage and number of employees having attained bachelor’s, master’s, and doctorate degrees. Occupation—the percentage and number of employees in mission- critical occupations (e.g., aerospace engineers). Age—the percentage and number of employees by age range. Tenure—the average number of years employees have been in their current position and employed by FAA. Retirement eligibility—the number of employees who will be eligible to retire each year during the 5-year period of the staffing plan. AST officials acknowledged that the workforce information it currently collects is insufficient to allow them to systematically identify gaps in specific staff skills or competencies—such as expertise in flight safety analysis or launch vehicle propulsion—needed for evaluating certain launch license applications. Officials told us that they do prioritize filling positions, through hiring or contracting, that address the organization’s most immediate needs. However, this strategy focuses on positions, as opposed to identifying specific skills or competencies within those positions. AST officials told us that they are planning to develop and annually administer to staff and managers a skills assessment survey that would collect information about the specific skills and competencies that individual staff currently possess. Officials told us that the results of the survey would allow them to assess the current skills of AST’s workforce and in combination with other information, such as expected attrition and retirement rates, help identify current and emerging skills gaps. In July 2018, officials told us that they plan to complete the survey and administer it in time for inclusion in their workforce plan for fiscal years 2019–2023, estimated to be issued in April or May 2019. However, officials subsequently stated that their survey plans have been delayed for multiple reasons, including DOT’s lapse in appropriations. Accordingly, as of May 2019, AST had neither developed a draft of the skills assessment survey, nor established a formal timeline for finalizing it or a plan for periodically administering the survey. Furthermore, officials told us that they are currently negotiating with the union’s bargaining unit to gain approval to administer a survey that does not maintain anonymity to non-management staff. They said that if they cannot obtain the bargaining unit’s approval, they will need to develop an alternative plan because they do not believe that collecting anonymous data on staff skills would allow them to identify skills gaps for these staff. Officials told us that they also intend to include in the survey skills and competencies that may be needed in the future. They stated that they did not know for certain if or how they would identify what those new skills might be, but that they are considering soliciting feedback from industry stakeholders, such as through FAA’s Commercial Space Transportation Advisory Committee, to help identify any future competencies that may be needed as a result of the evolution in the industry. Without systematic information on specific skills and competencies of its entire workforce, AST lacks reasonable assurance that its current workforce possesses the requisite skills and competencies and may not be able to efficiently identify opportunities to move staff within AST to help address identified skills gaps. And, ultimately, AST may not be prepared to make strategic decisions on how to address emerging skills gaps and align its staff to achieve future programmatic goals, such as identifying and acquiring potential new skills and competencies needed under a revised regulatory structure. FAA officials and representatives from the commercial space and aviation industries we met with agree that FAA’s current approach to accommodating commercial space launch and reentry operations into the National Airspace System (NAS) is inefficient. FAA has the responsibility for ensuring the safe and efficient use of the NAS, a limited national resource, for and by all users, including commercial and business airlines and commercial launch providers, among others. To this end, according to FAA officials and documents describing operational procedures and risk evaluation, FAA takes measures during a commercial space operation aimed at preventing fatalities, injuries, and property damage, and ensuring that nothing interferes with the launch vehicle’s operations. FAA’s current approach, as described in documents that explain how FAA mitigates risk to people and property during a space launch, is to close the airspace around a commercial launch operation—in some cases hundreds of square miles for several hours—to other airspace users, such as commercial airlines. Prior to launch, FAA establishes the size and duration of the airspace closure, also known as an aircraft hazard area, and, days ahead, notifies potentially affected airspace users about the upcoming closure. FAA calculates the size and boundaries of the aircraft hazard area generally based on the risk to life and property posed by a launch vehicle’s expected trajectory, as well as potential trajectories in the case of a vehicle’s failure and the subsequent paths of falling debris. The duration of the closure is generally dependent on the period of time in which the launch or reentry is expected to occur—known as a launch window—which varies by the type of launch or reentry vehicle, among other things. The aircraft hazard area extends from sea level up to unlimited height, and generally does not change in size or shape during the entirety of the launch window (see fig. 7). According to FAA officials, the designated aircraft hazard areas are larger and remain in effect longer than may actually be needed to ensure public safety. For example, according to FAA officials and launch documentation, to protect public safety, the duration of an airspace closure is always longer than the launch window. In fact, in some cases, the airspace closure may be scheduled for more than 3 hours, which is substantially longer than the time typically required for space launch and reentry operations from Cape Canaveral (about 30 minutes). FAA officials explained that they are not able to monitor or respond to dynamic circumstances associated with space launch vehicles in the NAS in real- time. As a result, FAA closes the airspace for when and where it is potentially—rather than actually—hazardous. FAA officials told us that the agency’s approach to date for accommodating space launch operations into the NAS has helped ensure public safety during launches. For instance, during fiscal years 1989 through 2018, FAA reported that it licensed 357 launches or reentries, and in this time there were no fatalities, serious injuries, or significant property damage to the uninvolved public. However, according to FAA officials and research, FAA’s approach creates inefficiencies in how the airspace around launch operations is used—such as causing flight delays for commercial airlines. FAA officials and commercial space industry representatives said it also makes scheduling these operations more challenging for launch providers, and affects FAA’s operational efficiency. The effects on each of these groups are described below. Commercial airlines. FAA has estimated that, in fiscal year 2017, about 1,200 commercial airline flights were directly affected—that is, rerouted or delayed—around 22 space launch operations, resulting in an estimated 39,000 additional miles flown. The majority of these miles were flown in proximity to Cape Canaveral in Florida, which hosted the majority of domestic launches that year. FAA further estimated that, of the 15 space launches from January to October 2018 around Florida where airspace tends to be busy due to the high volume of commercial airline traffic along the East Coast, an average of 60 aircraft per launch were directly affected. For all commercial launch sites, FAA estimates that the number of directly affected aircraft ranged up to 153 for an individual launch with an average of fewer than 10 aircraft per launch outside of the Florida area. According to FAA officials, these estimates are based on historical data on the number of aircraft that typically fly through that area at the time of the airspace closure. Because launches can be delayed by hours or days for reasons such as unforeseen weather conditions or technological issues, airlines and other affected airspace users may face challenges when attempting to plan around a launch to avoid flight reroutings and delays. Representatives of a major airline trade association told us that the spread of launch activity beyond Cape Canaveral, as well as the development of new launch vehicles, has heightened their concerns about inefficiencies in how airspace around launch operations is used. Launch providers. The size and duration of aircraft hazard areas can make it difficult for FAA to find time slots to accommodate commercial space launches because of its responsibility to ensure the efficient use of the national airspace, a limited resource. All the launch providers we spoke with that had conducted launches at U.S. commercial launch sites said they have been able to find suitable launch windows that met with FAA approval. However, one launch provider told us of an occasion when FAA had denied the originally requested launch date and time because it fell within a time of unusually congested airspace. In addition, more than half of the launch providers told us that they anticipate challenges obtaining approval for a requested launch date or time in the future. FAA. In addition to effects on NAS users, FAA officials told us that FAA itself also experiences operational inefficiencies in managing air traffic during launches. This inefficiency is, in part, because FAA’s current policies and procedures were developed for aircraft operations and either have not yet been fully adapted for commercial space operations, or a relevant policy or process is missing altogether. For example, FAA’s current procedures for launch providers and FAA to follow when they request, schedule, and conduct launches require different FAA facilities to negotiate unique agreements for each separately licensed operation or activity. This process can be time- consuming. For example, one launch provider told us that it took 1½ years to finalize minor changes to a letter of agreement. As we discuss later, FAA is taking steps to standardize these letters. According to FAA documentation and officials we spoke to, FAA aims in the long term to increase utilization of the NAS by integrating launch vehicle operations into the NAS with other users, rather than its current approach of segregating launch and reentry operations through airspace closures. Specifically in 2011, FAA began identifying actions it could take and developing plans to address challenges associated with closing portions of the airspace during launch operations. It did so in light of the increasing frequency of commercial space launch and reentry operations and the spread of operations to new locations. According to FAA officials, the actions and plans continue to evolve as FAA learns more and reacts to anticipated changes in the commercial space transportation industry. Further, officials told us that FAA’s vision for full integration of commercial space launch operations cannot be defined by a single solution or an end goal because the demands of these operations on the NAS are constantly changing. Consequently, FAA officials said that full integration of commercial space operations into the NAS will reflect a collection of visions or approaches that improve predictability and efficiency while maintaining safety. For example, according to FAA documents and officials we spoke to, FAA’s approach for experimental launches will always be to close the airspace around the launch to other users. In contrast, FAA may develop standards for some launch vehicles, such as hybrid launch vehicles with repeated successful operations, which specify a safe distance and duration of separation in the airspace. FAA has two key internal documents to help guide the development and implementation of its actions as it seeks to better integrate commercial space launches and reentry operations into the NAS and reduce FAA’s operational inefficiencies. A concept of operations: FAA officials expect to finalize a concept of operations in 2019, which will provide a long-term, high-level vision for FAA’s efforts to efficiently integrate commercial space operations. According to FAA officials, it will describe, among other things, FAA’s existing approach to and associated shortfalls in accommodating commercial space operations, as well as proposed tools, policies, and procedures to address those shortfalls. According to FAA officials, it also will inform FAA’s current and future efforts to identify needs for new or modified technologies, tools, procedures, and policies. Roadmap for the Integration of Space Operations in the National Airspace System (Roadmap): This document serves as a planning and tracking tool for FAA’s operational arm—the Air Traffic Organization—to use as it seeks to more efficiently manage the airspace during commercial space launch and reentry operations while maintaining safety. It identifies, prioritizes, and tracks the specific changes needed to begin addressing the related shortfalls that FAA officials told us will be discussed in the concept of operations. According to the Roadmap, some of the activities are exploratory, and FAA expects that new activities will be identified and added to the development schedule as FAA continues to work with stakeholders to determine how best to manage the airspace, and conceptualizes and develops key technologies. The first Roadmap was released in November 2016, and, according to FAA officials, FAA plans to update it annually. FAA officials told us they expect to release the third and most recent version in 2019. The activities it identifies are divided into: short-range (to have been completed in calendar year 2018); mid-range (through 2022); and long-range (through 2023 and beyond) time frames, during which FAA plans to develop and incorporate new technologies, policies, processes, and regulations. In completing the actions needed to implement the approaches outlined in the Roadmap, FAA officials told us that they are actively working with FAA’s Performance Analysis Directorate to develop a set of metrics to measure the progress and effectiveness of its actions. Officials also highlighted that because the demands of commercial space operations on the NAS are constantly changing, as noted above, there is no defined end goal. To this end, the purpose of any metrics officials develop will be to help determine if their actions are helping increase efficiency while maintaining safety, not measure their progress toward a goal of full airspace integration. FAA officials told us they plan to have a set of metrics completed by early 2019. Some of these metrics will likely use currently available data, such as the number of aircraft rerouted and how many additional miles rerouted aircraft fly, while others are still being identified. Further, FAA officials told us that FAA coordinates actions related to commercial space integration through an interagency working group established in 2015. The group meets monthly and members include officials from across FAA lines of business, as well as other federal agencies, including the Department of Defense. The Roadmap shows that FAA’s actions to better integrate commercial space launch and reentry operations into the NAS include, but are not limited to: developing new technologies; updating and assessing needed changes to policies, procedures, and coordinating with aviation- and space-industry stakeholders. FAA’s technology efforts are related primarily to collecting real-time data on a launch vehicle’s position and path, automatically generating the required aircraft hazard area, and integrating those data into the existing structure of the air traffic control systems. As a result, FAA officials said that FAA may ultimately be able to dynamically change the size and duration of the aircraft hazard area in some types of launches, thereby reducing the amount and duration of airspace closed to other users. In the short term, FAA is assessing how existing air-traffic control technologies and procedures could be used to help reduce the effects of launches on other NAS users. According to an FAA official, for example, four initiatives currently used to manage air traffic during other airspace constraints could potentially be used during space launch operations. One initiative would enable air traffic controllers to strategically control the number of flights approaching the aircraft hazard area so that if these flights were in the hazard area at the time of a launch vehicle failure, controllers could still clear the area quickly enough to protect public safety. This FAA official told us that if they decide to pursue these initiatives, they hope to complete some of the necessary steps to do so by summer 2019. For potential use in the longer-term, FAA is piloting prototypes of two key technologies by running them alongside existing air-traffic control systems during selected launches, thereby testing their capabilities without their being fully operational. The Space Data Integrator (SDI) is designed to receive real-time data on launch vehicle position and movement and display real-time aircraft hazard areas to enable improved situational awareness. FAA officials told us that, as FAA is assessing approaches to shift from static to more dynamic hazard area calculation capability, initial SDI capabilities will likely be deployed in advance of more integrated and improved real-time hazard area generation capabilities. In addition, FAA officials told us that they are exploring alternative acquisition strategies that could enable partial system implementation for the technology by 2022. Because FAA has not made a final investment decision, the date of system-wide implementation of SDI is unknown. According to FAA officials, the Hazard Risk Assessment and Management (HRAM) tool, if pursued, is intended to help automatically communicate SDI data to air traffic control systems and, in the future, to present air traffic controllers with information that would allow them to decide how to best manage the airspace. Officials also said that HRAM involves modifying an existing air traffic management tool, currently has very limited capabilities, and is still only under consideration as a possible approach. Over the next year these officials plan to work on some of the tool’s components, assess what types of data are valuable to air traffic controllers, and determine whether to continue developing this technology or consider alternative technologies. According to the Roadmap, FAA has identified policies and standard operating procedures that need to be created or updated to enable it to better manage the operating environment during space launches. Actions taken to date include, for example: developing training materials to inform air traffic personnel about commercial space operations in the NAS; developing a high-level strategy for integrated space vehicle operations going forward; and standardizing the terms of reference for commercial space operations for use by FAA, NASA, and DOD. In addition, according to the Roadmap, FAA plans to standardize some letters of agreement—the document specifying procedures that a launch provider and FAA use to request, schedule, and conduct launches. Officials said they hope to issue documentation of these changes by September 2019. FAA officials told us that these changes will result in letter of agreement templates for use by FAA. FAA officials said FAA also plans to continue reviewing its regulations, policies, and procedures to identify other areas that need updating or entirely new language. FAA is taking steps to foster coordination between commercial space and aviation industries to help develop and increase buy-in for new and revised approaches to improve the efficiency of the national airspace for all users. Most notably, in November 2017, FAA chartered an aviation rulemaking committee to examine the issue of equitable airspace access among various users. Committee members include a mix of commercial space transportation and aviation industry representatives. Topics being addressed include identifying potential criteria that FAA may use when considering competing user priorities for airspace, as well as potential tools that could help mitigate the effects on other airspace users during launch operations. FAA officials told us that the committee anticipates issuing a report and recommendations to FAA in April 2019, and some members of the committee highlighted that the meetings benefited their understanding of other users’ unique needs; economic benefits; and experiences with regard to integrating space operations. Also, an FAA official said the agency has sponsored four “Industry Days” events since 2014 for the commercial space industry. At each event, multiple FAA offices discussed their roles and responsibilities associated with space launches and answered questions from industry. For the first time, at its 2018 event, FAA invited aviation industry representatives to encourage continued dialogue between the commercial space and aviation industries. FAA officials also noted that they solicited ideas on priority actions from participants and are currently reviewing those ideas to help inform their next steps. Separately, FAA expanded the membership of its Commercial Space Transportation Advisory Committee to include representatives of the aviation industry in addition to the commercial space transportation industry to foster further dialogue between these groups. The commercial space transportation industry provides a service that has become essential to many aspects of government, business, and society. The capability to launch payloads into space enables national security missions, mobile communications, and scientific research, among many other applications. AST’s role as a regulator of commercial space launch providers is fundamental to the continued safe growth of the industry. With the anticipated growth and potential organizational restructuring of AST, as well as the evolution of the commercial space transportation industry, it is vital that AST ensure that the size, composition, and skills of its workforce are aligned with its projected workload, based on anticipated future mission and programmatic goals. AST’s workforce plan states that AST needs additional staff in nearly all areas. However, current budget and long-term fiscal pressures heighten the need for agencies to strategically manage their workforce, a process that includes making strategic decisions about how and where to prioritize limited resources. AST does not have a complete understanding of its current and projected workload, nor does it know the number of staff and types of staff skills and competencies necessary to meet those workload needs. Without this information, AST risks managing its workforce reactively to a rapidly changing environment instead of strategically planning for the future. We are making the following four recommendations to FAA: 1. The Associate Administrator of AST should develop workload metrics that encompass the whole office and that would allow AST to determine an appropriate workforce size and composition. (Recommendation 1) 2. The Associate Administrator of AST should establish a timeline for finalizing workload projections that extend beyond the 2-year budget cycle and that include an approach for addressing uncertainty. (Recommendation 2) 3. The Associate Administrator of AST should ensure that its skills assessment survey collects information from staff on skills and competencies in those areas that are both currently needed and may be needed in the future. (Recommendation 3) 4. The Associate Administrator of AST should develop and document a plan for periodically assessing whether staff possess the necessary skills and competencies to achieve programmatic goals, such as annually administering a skills assessment survey. (Recommendation 4) We provided a draft of this product to DOT and NASA for review and comment. In its written comments reproduced in appendix III, DOT concurred with our recommendations. DOT and NASA also provided technical comments that we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees, DOT, NASA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at 202-512-2834 or KrauseH@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. Our objectives for this report were to: (1) describe how the construction of infrastructure at selected U.S. commercial launch sites has been funded; (2) describe key factors that influence where orbital launches occur; (3) summarize actions the Federal Aviation Administration (FAA) has taken to streamline its commercial space launch regulations; (4) examine how well-positioned FAA’s Office of Commercial Space Transportation (AST) is to determine its current and future workforce needs; and (5) identify actions FAA is taking to better integrate commercial space launch operations into the National Airspace System (NAS). The scope of this report focuses on topics related to FAA’s oversight of the U.S. commercial space transportation industry. Therefore, the report does not discuss launch indemnification and the safety of human spaceflight, or examine international outer space treaty obligations. For all objectives, we reviewed relevant statutes, regulations, and directives governing FAA’s oversight of the U.S. commercial space transportation industry. In addition, we interviewed AST officials and conducted semi-structured interviews with all seven commercial space launch providers that had conducted an FAA-licensed launch operation as of January 2018. To describe how infrastructure at selected commercial launch sites has been funded, we first identified, through review of FAA information on launch site operator licenses and launch licenses, all U.S. commercial launch sites—those that have an FAA site operator license to conduct commercial launch operations and those that may not have a site operator license but have hosted FAA-licensed launch operations. From these 15 identified U.S. commercial launch sites, we selected 9 for review because the launch site has hosted FAA-licensed launch operations between January 1, 2015, and December 31, 2018. We reviewed relevant publicly-available documents, such as launch sites’ business plans, user guides, and other planning documents related to U.S. commercial launch sites. We interviewed the eight launch site operators of the nine selected launch sites. The perspectives of the selected launch site operators are not generalizable to those of all launch site operators; however, the information obtained provides a balanced and informed perspective on the topics discussed. In addition, we interviewed members of the Commercial Spaceflight Federation’s working group on commercial launch sites. See table 2 for a full list of entities interviewed. To describe key factors influencing where orbital launches occur, we reviewed data from FAA’s 2018 Annual Compendium of Commercial Space Transportation as well as FAA data on recent launches within the United States. We interviewed representatives from seven launch customers, selected based on the following criteria: The company is not a government entity. The company’s payload was commercial, as documented in FAA’s commercial space launch compendiums. The customer had multiple launches in 2016 and 2017, with at least one of those launches occurring in 2017. The customer has had at least one launch in the United States that was licensed by FAA. Among the companies that met these criteria, we chose our final selections to have a mix of the following characteristics: domestic and non-U.S. companies, those that had launched exclusively at one launch site versus multiple launch sites, and those that are involved in traditional space activities, such as satellite communications companies and remote-sensing companies and those that are pursuing non-traditional space activities, such as asteroid mining and satellite servicing. The perspectives of the selected launch customers are not generalizable to those of all launch customers; however, the information obtained provides a balanced and informed perspective on the topics discussed. To summarize actions FAA is taking to streamline its commercial space launch regulations, we reviewed relevant statutes, regulations, and FAA guidance. We also reviewed FAA’s documents related to the rulemaking, including its schedule of rulemaking activities and the Streamlined Launch and Reentry Licensing Requirements notice of proposed rulemaking issued in April 2019, and reviewed and analyzed the Streamlined Launch and Reentry Licensing Requirements Aviation Rulemaking Committee final report. We interviewed FAA officials and representatives of the Commercial Spaceflight Federation about FAA’s ongoing and planned actions related to the rulemaking. Finally, we reviewed the minutes from the June 2018 meeting and attended the October 2018 meeting of the Commercial Space Transportation Advisory Committee, in which FAA officials and industry representatives discussed FAA’s actions on the rulemaking. To examine how well-positioned AST is to make strategic decisions about its current and future workforce needs, we reviewed FAA documents, including its budget justification and workforce plans from the past 3 years. We also reviewed FAA’s year-end reports on its workload metrics from fiscal years 2017 and 2018, and portions of FAA’s preliminary labor analyses using its revised timecard data and workload metrics. We identified key principles on effective strategic workforce planning from our previous work to use as criteria to assess FAA’s actions. We interviewed AST officials about their plans and actions to improve its workforce planning and assessed those actions against the identified key principles for effective strategic workforce planning. We focused our analysis on those principles that are related to determining current and future workforce needs. To identify actions FAA is taking to better integrate commercial space launch operations into the National Airspace System, we reviewed and analyzed relevant FAA documents, including a document that discusses FAA’s vision for integrating commercial space transportation operations into the NAS and the Roadmap for the Integration of Space Operations in the National Airspace System. In addition, we interviewed FAA officials within AST, Air Traffic Organization, and the Office of NextGen regarding their ongoing and planned actions for improving the integration of commercial space transportation operations into the NAS. We also interviewed industry stakeholders to obtain perspectives on this topic. These stakeholders included representatives from Airlines for America, a trade association for the U.S. airline industry, and from launch providers. Finally, we attended an FAA-sponsored industry conference in October 2018 on FAA’s airspace integration efforts. We conducted this performance audit from July 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 3 shows selected characteristics and capabilities of U.S. commercial launch sites included in our review of infrastructure funding. Table 4 includes other U.S. commercial launch sites that did not have FAA-licensed activity from 2015 to 2018 and were not included in our review of infrastructure funding. In addition to the individual named above, Heather Halliwell (Assistant Director); Gretchen Snoey (Analyst-in-Charge); Namita Bhatia Sabharwal; Giny Cheong; Gerald L. Dillingham; Camilo Flores; Joshua Garties; Richard Hung; Delwen Jones; Elke Kolodinski; Maureen Luna Long; Malika Rice; Travis Schwartz; and Andrew Stavisky made key contributions to this report.", "summary": "The commercial space transportation industry provides launch services that enable national-security and commercial satellites, among other things, to be sent into orbit for government and private customers. Continued growth and evolution in the industry is expected as reliance on space-based applications increases. AST is charged with overseeing the industry, including licensing and monitoring launch vehicle operations. GAO was asked to review developments in this industry. This report (1) describes FAA's actions to integrate commercial space launches into the national airspace and (2) examines how well-positioned AST is to determine its current and future workforce needs, among other objectives. GAO reviewed relevant statutes, regulations, and FAA guidance; compared FAA's workforce management efforts to key principles for effective workforce planning; and interviewed FAA officials and U.S. commercial launch providers that had conducted an FAA-licensed launch as of January 2018, among other industry stakeholders. The Office of Commercial Space Transportation (AST) within the Federal Aviation Administration (FAA), in collaboration with other FAA offices, is taking a range of actions, such as testing new technologies, to improve how efficiently FAA integrates space vehicle launch operations into the national airspace. According to FAA officials, the amount of airspace that FAA closes to other airspace users is larger and remains closed longer than may be needed to ensure public safety. To help remedy this situation, FAA is piloting prototype technologies that would collect launch vehicles' location data in real-time and transmit them to air traffic controllers. Officials said the earliest these technologies could be implemented would be 2022. In March 2019, FAA published an announcement seeking interest from industry on partnering with FAA to further develop the technologies. Meanwhile, FAA is assessing how existing air traffic control technologies could be used to help reduce the effects of launches on other airspace users. Since 2016, AST has taken steps to improve how it determines its current workforce needs to carry out its mission including licensing commercial launch vehicle operations. These steps include more comprehensively monitoring staff time spent on specific activities and measuring the volume of the staff's work. While AST officials told us that AST is planning to continue to improve its workforce-planning efforts, GAO found that some aspects of AST's efforts fall short of key principles of strategic workforce planning. Such principles underscore the importance of determining both current and future workforce needs and identifying potential gaps in employee skills. For example: AST does not project its workload beyond a 2-year budget cycle, limiting its ability to effectively and strategically plan for its longer-term workforce needs. According to officials, it can take a few years for engineers with certain skills to be trained and have sufficient experience to lead projects. Further, AST officials told GAO that hiring technically qualified personnel, including positions that require considerable training and experience to be a fully functioning employee, is challenging. AST officials said that they are considering projecting their workload estimates further into the future, but they have neither formally committed to doing so nor established a timeline with milestones. AST officials acknowledged that the information AST currently collects on the skills of its staff is not sufficient to allow them to identify gaps between the skills and competencies needed and those that its workforce currently possesses or may need in the future, such as expertise in flight safety analysis. AST officials told GAO that they plan to develop a tool that could collect information annually from staff and managers about the specific skills and competencies that individual staff currently possess. As of May 2019, however, AST had neither developed a draft of the tool nor established a timeline for finalizing it. Without this information, AST lacks reasonable assurance that its current workforce possesses the requisite skills and competencies, and AST may not be best positioned to proactively determine how to align its staff to carry out its mission. GAO is making four recommendations on workforce planning to AST, including that AST establish a timeline for finalizing longer-term workload projections and that AST ensure that it collects information from staff on skills and competencies in those areas that are currently needed and may be needed in the future. AST concurred with the recommendations.", "document_type": "gao"}
{"report": "The BSA established reporting, recordkeeping, and other AML requirements for financial institutions. As the delegated administrator of the BSA, FinCEN has issued implementing regulations. In complying with BSA/AML requirements, U.S. financial institutions assist government agencies in detecting and preventing money laundering and terrorist financing by, among other things, establishing and maintaining compliance programs, conducting ongoing monitoring of customers and transactions, and reporting suspicious activity. Oversight and enforcement of compliance with the BSA involve several federal agencies, including FinCEN and the Internal Revenue Service (IRS). FinCEN has overall authority for administering and enforcing compliance under the BSA and may seek civil penalties and injunctions to compel compliance. In addition, each of the federal banking regulators has independent authority to initiate enforcement actions against supervised institutions for violations of law and to seek civil money penalties for BSA violations, among other things. FinCEN has delegated authority to IRS to investigate most criminal violations of the BSA. The Department of Justice prosecutes violations of federal criminal money-laundering statutes, including violations of the BSA, and several law enforcement agencies conduct BSA-related criminal investigations. The federal banking regulators have also issued BSA/AML regulations that require banks to establish and maintain a BSA/AML compliance program that includes, among other things, policies, procedures, and processes to identify and report suspicious activity. The banking regulators are required to review banks’ compliance with BSA/AML requirements and regulations, which they generally do every 1 to 2 years as a part of their routine safety and soundness examinations. FinCEN has also delegated examination authority for BSA/AML compliance for certain entities, including money transmitters, to IRS. In general, money transmitters must register with FinCEN and provide certain information on their structure and ownership. According to Treasury, in all but one state, money transmitters are required to obtain licenses from states in which they are incorporated or conduct business. State supervisory agencies also may conduct BSA/AML examinations of licensed money transmitters. To ensure consistency in the application of BSA/AML requirements, in 2005 the federal banking regulators collaborated with FinCEN on developing an examination manual that was issued by FFIEC for federal bank examiners conducting BSA/AML examinations of banks. The examination manual has been revised several times since its release, and the most recent comprehensive revision was released in 2014. According to the examination manual, a key function of the federal banking regulators’ BSA/AML examinations is to assess whether banks have established the appropriate policies, procedures, and processes based on their BSA/AML risk to identify and report suspicious activity. The supervisory process also assesses whether banks provide sufficient detail in reports to law enforcement agencies to make the reports useful for investigating suspicious transactions that are reported. Moreover, federal banking regulators conduct risk-focused BSA/AML examinations of banks—that is, they review key BSA/AML risks or specific risk areas identified by the bank and tailor examination procedures based on each bank’s risk profile. Among other things, examiners review whether banks have an adequate system of internal controls to ensure ongoing compliance with BSA/AML regulations. Similarly, in 2008 FinCEN issued a BSA examination manual to guide reviews of money transmitters and other types of MSBs, including reviews by IRS and state regulators. Both the FFIEC and FinCEN examination manuals are publicly available. Money transmitters and banks are subject to requirements under the BSA. They are generally required to design and implement a written AML compliance program, report certain transactions to Treasury, and meet recordkeeping (including identity documentation) requirements for transfers of $3,000 or more. At a minimum, each AML compliance program must establish a system of AML compliance policies, procedures, and internal controls to ensure ongoing compliance; designate an individual to coordinate and monitor day-to-day provide training for appropriate personnel; and provide for an independent audit function to test for compliance. Additionally, banks must include appropriate risk-based procedures for conducting ongoing customer due diligence as part of their AML compliance program. BSA/AML regulations require that each bank or money transmitter tailor a compliance program that is specific to its own risks based on factors such as the products and services offered and the customers and locations served. BSA/AML compliance programs for banks—including those that service money transmitters—are expected to include the following: Customer identification program. Banks must have written procedures for opening accounts and must specify what identifying information they will obtain from each customer. At a minimum, the bank must obtain the following identifying information from each customer before opening the account: name, date of birth, address, and identification number, such as a Social Security number or a passport number. Banks’ customer identification programs must also include risk-based procedures for verifying the identity of each customer to the extent reasonable and practicable. Additionally, a bank’s customer identification program should contain procedures for circumstances when a bank cannot verify the customer’s identity, including procedures for when the bank should not open an account and when the bank should close an account. Customer due diligence procedures. These procedures assist banks in determining when transactions are potentially suspicious. Procedures must be designed to achieve two minimum regulatory requirements: (1) understanding the nature and purpose of customer relationships so customer risk profiles can be developed and (2) conducting ongoing monitoring, based on the level of risk associated with the customer, to identify and report suspicious activity and to maintain and update customer information on a risk-basis. Additional due diligence procedures. Due diligence procedures also should define when and what additional customer information will be collected for customers who banks determine may pose a higher risk for money laundering or terrorist financing. Procedures should be based on each customer’s risk profile and specific risks posed. Banks review higher-risk customers and their transactions more closely at account opening and more frequently throughout the term of their relationship with the bank. In addition, banks and money transmitters must also have policies and procedures to monitor transactions and identify suspicious activity. Monitoring generally includes (1) manual review of transaction summary reports to identify suspicious transactions or (2) automated monitoring systems that use computer algorithms to identify patterns of unusual activity. As we previously reported, banks with large transaction volumes typically use automated monitoring systems. Banks and money transmitters also must comply with certain reporting requirements: Currency Transaction Reports. Banks and money transmitters must electronically file this type of report for each transaction or a combination of transactions in a single day—such as a deposit, withdrawal, exchange, or other payment or transfer—in currency of more than $10,000. Suspicious Activity Reports (SAR). Under FinCEN regulation, banks and money transmitters are required to file this type of report when (1) a transaction involves or aggregates at least $5,000 in funds or other assets for banks or at least $2,000 in funds or other assets for money transmitters and (2) the institution knows, suspects, or has reason to suspect that the transaction is suspicious. In addition, banks’ compliance programs generally include policies and procedures that describe criteria for deciding to close or not to open an account. For example, although there is no requirement for a bank to close an account that is the subject of a SAR filing, a bank should develop criteria in policies and procedures that indicate when it will escalate issues identified through repeat SAR filings on accounts, including criteria on when to close an account. The federal banking regulators generally do not direct banks to open, close, or maintain individual accounts. The money transfer industry is diverse, ranging from Fortune 500 companies with numerous outlets worldwide to small, independent money transmitters. Some money transmitters are in communities with population concentrations that do not necessarily have access to traditional banking services. Money transmitters may send and receive funds domestically—intrastate or interstate—or internationally. Money transmitters typically work through agents—separate business entities generally authorized to send and receive money transfers. Most money transfers are initiated in person at retail outlets. Money transmitters generally operate through their own retail storefronts or through grocery stores, financial service outlets, convenience stores, and other retailers that serve as agents. In one common type of money transmitter transaction—known as a cash- to-cash transfer—a sender enters a money transmitter agent location and provides cash to cover the transfer amount and fees (see fig. 1). For transfers at or above $3,000, senders must generally provide basic information about themselves (including name and address) at the time of the transfer request. The agent processes the transaction, and the money transmitter’s headquarters screens it to validate BSA/AML compliance. The money is then transferred to a recipient via a distributing agent or bank. In an international money transfer, the money may be distributed through an agent in the destination country, wired through the money transmitter’s bank to the distributor agent’s bank, or transferred by other means to a specified agent in the recipient’s country. The distributor agent pays out cash to the recipient in either U.S. dollars or local currency. Money transfers can pose money-laundering and terrorist-financing risks, as funds related to illicit activity may go undetected due to the large volume of transactions or to money transmitters’ inadequate oversight of the various entities involved. We and others have identified money- laundering and terrorist-financing risks associated with money transmitters, including risks related to agents, customers, geographic location, and products. Agents. Money transmitters often work with multiple agents, and maintaining adequate oversight can be challenging, given the decentralized nature of the agent system. According to data collected by the Conference of State Bank Supervisors, as of December 31, 2018, 204 money transmitters reported that they had more than 440,000 agents—with nine of these money transmitters reporting that they had at least 10,000 agents. These agents present money- laundering risks if they knowingly or unknowingly fail to follow BSA/AML requirements or the policies and programs established by the money transmitter. For example, an agent may not follow the recordkeeping requirements for transfers above the regulatory funds transfer threshold or above lower thresholds that a money transmitter has self-imposed. MSB principals are required to conduct risk-based monitoring of their agents. Customers. Certain customers may pose heightened risk because of the nature of their business, occupation, or anticipated transaction activity. Additionally, in certain instances, they may be able to launder money while remaining anonymous. For example, customers may use false identities or straw men (individuals hired to conduct transfers on behalf of others) to keep from being identified as the original source of the funds. Examples of suspicious customer activity that may indicate money laundering include identification documents that cannot be easily verified; the use of different taxpayer identification numbers with variations of the same name; frequent or large transactions with no record of past or present employment; and reluctance to provide identification for transactions subject to identification requirements. Geographic location. Certain geographic locations may be more vulnerable to money laundering or terrorist financing via money transfers. High-risk geographic locations can be either international or domestic. According to FinCEN’s MSB examination manual, examples of international high-risk geographic locations include countries subject to sanctions by the Office of Foreign Assets Control or countries and territories identified as being noncooperative. Domestic high-risk geographic locations include High Intensity Drug Trafficking Areas (HIDTA) and High Intensity Financial Crime Areas (HIFCA). Products. According to the FFIEC and FinCEN MSB examination manuals, certain products and services, such as money transfers, may pose a higher risk of money laundering because of the degree of anonymity they can offer. For example, the Financial Action Task Force identified money-laundering and terrorist-financing risks associated with mobile payments because these services can sometimes allow for anonymous transactions, depending on the level of AML measures the mobile payments provider has in place. The task force also reported that virtual currency—digital representations of value such as Bitcoin that are not government-issued legal tender—could facilitate international remittances as virtual-currency- based products and services are developed. Federal agencies and international organizations have identified instances where money transfers have been used to launder proceeds from illicit activities such as human smuggling and trafficking, drug trafficking, and consumer fraud, including the following examples: In 2017, a large money transmitter entered into a $586 million settlement with the Department of Justice, the Federal Trade Commission, and the U.S. Attorney’s offices for several states after it was accused of, among other things, processing money transfers that were suspected of being used to pay human smugglers in China. In 2012, the Department of Justice found that a large money transmitter’s agents knowingly participated in a scheme in which victims wired funds to the transmitter’s agents and outlets in response to fraudulent claims such as promising victims they would receive large cash prizes or lottery winnings, falsely offering various high- ticket items for deeply discounted prices, falsely promising employment opportunities, or posing as a relative of the victim and claiming to be in trouble and in urgent need of money. In a 2011 case, seven people were sentenced for money laundering and drug trafficking involving the transfer of funds from the U.S. Virgin Islands to Alaska. Hundreds of thousands of dollars in payment for the drugs were sent using a large money transmitter in amounts averaging less than $2,000 per wire transfer, a money-laundering method known as structuring. See figure 2 for an illustrated example of structuring. In April 2005, FinCEN and the federal banking regulators issued interpretative guidance to further clarify BSA/AML requirements to banks that provide banking services to MSBs (including money transmitters) operating in the United States. According to the interagency guidance, a bank’s level and extent of due diligence beyond the minimum expectations should be based on an assessment of the individual customer’s BSA/AML risks. If a particular MSB relationship indicates a low risk of money laundering or other illicit activity, the bank may not be routinely expected to perform further due diligence beyond minimum expectations. Minimum expectations include applying the bank’s customer identification program and confirming FinCEN registration (if required), agent status (if applicable), and state and local licensing requirements (if applicable). Banks are also to conduct a basic BSA/AML risk assessment to determine the level of risk associated with the account and whether further due diligence is necessary. In order to properly assess risks, the interpretive guidance clarifies that banks should consider the purpose of the account, the types of products and services offered by the MSB, the locations and markets it serves, and the anticipated account activity (see text box). Examples of Basic Information Banks Should Consider When Assessing a Money Transmitter’s Money-Laundering Risk, According to the Interagency Guidance Purpose of account: Whether the money transmitter needs the bank account to transfer funds to its principal U.S. account or to foreign-based agents in other countries. Products and services offered: Whether the money transmitter is a principal with a fleet of agents, or is it an agent itself, and whether money transmission the customer’s primary or ancillary business (such as a grocery store that derives a small fraction of its overall revenue from providing money transmission services). Locations served: Whether the money transmitter’s market domestic or international and whether it targets local residents or broad markets. Anticipated account activity: Relevant considerations include the expected transaction amounts and whether the money transmitter is operating out of one location and using one bank branch, or whether it has several agents making deposits at multiple branches throughout the bank’s network. If a bank concludes from its risk assessment that the MSB customer presents a higher level of money-laundering or terrorist-financing risk, it will be expected to conduct additional due diligence in a manner commensurate with the heightened risk. According to the interagency guidance, the appropriate amount of due diligence depends in part on the level of perceived risk and the size and sophistication of the particular MSB. Appropriate due diligence can include reviewing the MSB’s BSA/AML compliance program, the results of the MSB’s independent testing of its program, and written agent management and termination practices for the MSB, as well as conducting on-site visits to the MSB. The interagency guidance also provides examples of “risk indicators” to assist banks with their risk assessments. Examples of potentially lower- risk indicators include a money transmitter that primarily markets to customers that conduct routine transactions with moderate frequency in low dollar amounts; is an established business with an operating history; or only remits funds to domestic entities. Examples of potentially higher- risk indicators include a money transmitter that allows customers to conduct transactions in higher dollar amounts with moderate to high frequency; is a new business without an established operating history; offers only, or specializes in, cross-border transactions, particularly to countries posing heightened risk for money laundering or terrorism financing; or is located in an area designated as a HIFCA or HIDTA. The guidance notes that in determining the level of risk, a bank should not focus on any single indicator. Rather, an effective risk assessment should be a composite of multiple factors, and depending on the circumstances, certain factors may be weighed more heavily than others. Banks’ customer risk assessments also determine the level of ongoing monitoring for suspicious activity they must perform on each customer. The interagency guidance states that, based on the bank’s assessment of the risks of its MSB customers (including money transmitters), monitoring should include periodic confirmation that initial projections of account activity have remained reasonably consistent over time. Examples of potentially suspicious activity include a money transmitter transferring funds to a different jurisdiction than expected or depositing currency significantly in excess of expected amounts without any justifiable explanation, such as an expansion of business activity or new locations. Officials from several banks we spoke with described their additional due diligence procedures for implementing BSA/AML requirements when accepting new money transmitter customers or monitoring existing ones. These include obtaining and reviewing the money transmitter’s BSA/AML policies, using questionnaires and interviews to collect detailed information from the money transmitter on its business operations—such as services offered, transaction volume, and cash activity—and site visits to verify the information collected. Officials from one bank told us that additional due diligence includes a review of the money transmitter’s business location, longevity, principal owners, transaction volume, and cash activity. Bank staff collect this information via a questionnaire administered through an in-person interview at a branch. After reviewing the information, the bank’s BSA/AML compliance department may choose to speak one-on-one with the potential money transmitter customer or conduct a site visit. When monitoring a new money transmitter customer for suspicious activity, compliance staff compare answers from the due diligence questionnaire against the customer’s cash log and wire activity to determine if the activity is outside normal parameters. The compliance department investigates any suspicious leads and reports them to the bank’s SAR committee to decide whether to file a SAR. Federal banking examiners determine whether a BSA/AML examination should include a review of a bank’s money transmitter accounts based on the overall risk profile of the bank. The FFIEC examination manual directs examiners to tailor the BSA/AML examination scope and procedures to the specific risk profile of the bank. Examiners begin a BSA/AML examination by reviewing and assessing the adequacy of the bank’s BSA/AML risk assessment. This review includes determining whether bank management has developed an accurate risk assessment that identifies significant risks to the bank (see text box). This determination is based on factors such as whether management has adequately considered all products, services, customers, transaction number and volume, and geographic locations, and whether management’s assessment methodology within these specific risk categories was adequate. Bank Secrecy Act/Anti-Money Laundering (BSA/AML) Examination Procedures for Banks In order to effectively apply resources and ensure compliance with BSA requirements, the Federal Financial Institutions Examination Council (FFIEC) examination manual is structured to allow examiners to tailor the BSA/AML examination scope and procedures to the specific risk profile of the bank. At a minimum, examiners are expected to follow core examination procedures to ensure that the bank has an adequate BSA/AML compliance program commensurate with its risk profile. The core procedures encompass four areas: Scoping and planning: Identifying the bank’s BSA/AML risks, developing the examination scope, and documenting the plan. BSA/AML risk assessment: Assessing the BSA/AML risk profile of the bank and evaluating the adequacy of the bank’s BSA/AML risk assessment process. BSA/AML compliance program: Determining whether the bank has developed, administered, and maintained an effective program for compliance with the BSA and all of its implementing regulations. Developing conclusions and finalizing the examination: Formulating conclusions, communicating findings to management, preparing report comments, developing an appropriate supervisory response, and closing the examination. In addition to the core examination procedures, the examination manual also contains sections of expanded examination procedures that address specific lines of business, products, customers, or entities that may present unique BSA/AML compliance challenges and exposures for which banks should institute appropriate policies, procedures, and processes. As examples, the examination manual contains expanded examination procedures with respect to nonbank financial institutions, electronic banking, and funds transfers. The examination manual indicates that not all of the core and expanded examination procedures are likely to be applicable to every bank. The specific examination procedures that need to be performed depend on the BSA/AML risk profile of the bank, the bank’s history of BSA/AML compliance, and other relevant factors. Examiners also review the bank’s written BSA/AML compliance program and determine whether the bank has adequately incorporated the risk it identified through its risk assessment into its BSA/AML compliance program. This review and determination include completing relevant core examination procedures for assessing key elements of the bank’s compliance program, such as the customer identification program and policies, procedures, and processes related to customer due diligence, suspicious activity reporting, and currency transaction reporting. As part of these core examination procedures, examiners conduct risk-based transaction testing, which OCC staff noted allows examiners to evaluate the adequacy of the bank’s compliance with regulatory requirements; determine the effectiveness of its policies, procedures, and processes; and evaluate suspicious activity monitoring systems. For example, examiners might determine to select and review a sample of customer accounts in testing the bank’s compliance with its policies, procedures, and processes or for possible suspicious activity. The FFIEC examination manual contains an expanded examination section for banks with significant relationships with nonbank financial institutions, which include MSBs. This expanded section references and incorporates the April 2005 interagency guidance for providing banking services to MSBs and includes related examination procedures. Consistent with this guidance, these procedures direct examiners to assess whether the bank has minimum due diligence policies, procedures, and processes in place for new or existing MSB accounts. Examiners are then to determine whether the bank’s policies, procedures, and processes to assess MSB risks effectively identify higher-risk accounts and the amount of further due diligence necessary. To assist in this effort, the manual directs examiners to perform risk- focused transaction testing on a sample of higher-risk MSB accounts. In discussion groups held with federal bank examiners, examiners from all discussion groups noted that their review of the transaction activity of money transmitter accounts is essential to determining whether the bank understands the money transmitter’s business and has appropriately assessed the risk. For example, one examiner said that customer due diligence procedures at account opening should include the appropriate qualitative and quantitative questions so that the bank can make a reasonable determination of the types and volumes of transactions that will be flowing in and out of the account. Examiners from all discussion groups said that when assessing the bank’s risk assessment of a money transmitter, they focus on whether the bank has considered the risk factors discussed in the examination manual, including geography, customer type, products, services, and transactional volume. In some discussion groups, examiners noted that they may review money transmitter accounts if these accounts are included in the sampling of bank customer accounts as part of the core examination procedures. One examiner said that because banks in her region do not tend to specialize in money transmitters or have a significant degree of risk from them, the only time she reviews money transmitter accounts is if they are included in her sample for transaction testing. Examiners from one discussion group said that they may review money transmitters as part of expanded examination review procedures for nonbank financial institutions if the bank has a large portfolio of money transmitter accounts. For example, one examiner said he generally does not set out to look for and review money transmitter accounts when conducting a BSA/AML examination, but in one case his examination team learned that during the course of a merger, a bank acquired a number of nonbank financial institutions, including MSBs. As this bank did not have prior experience with these kinds of customers, the examination team decided to include them in the scope of their review. Examiners in all discussion groups said that they neither instruct nor recommend that banks close accounts with money transmitters or other types of MSBs. Although IRS and state agencies also examine money transmitters and other MSBs, examiners from all discussion groups said that BSA/AML requirements and guidance do not allow banks to rely on IRS or state oversight. These examiners said these reports could provide banks with a useful additional source of information when conducting their due diligence on MSB customers. However, these examiners added that the reports would not substitute for or reduce the due diligence expected of banks in complying with BSA/AML compliance program requirements.. Examiners from most discussion groups observed that they know very little about the quality of state or IRS examinations of MSBs and their frequency. Examiners in our discussion groups said the challenges that some banks face in ensuring BSA/AML compliance for their MSB customers include those related to customer due diligence, risk assessments, customer identification, and BSA/AML compliance staff and resources. Customer due diligence. Examiners from most discussion groups said that some banks do not fully understand the customer due diligence requirements for banking MSBs. Examiners in some discussion groups said that banks do not always fully review or understand the documents and information obtained from their MSB customers in conducting due diligence. One examiner described an instance where bank staff could not understand documentation collected from MSB customers in a foreign language. Examiners in some discussion groups said banks do not understand the need to conduct ongoing monitoring of MSB accounts, including of the flow and volume of customers’ transactions. For example, one examiner in a different discussion group described an instance of a community bank that was unaware that an MSB account had $2 billion flowing through annually even though the bank had only $1 billion in assets. Examiners in some discussion groups said that banks also may not fully understand their automated software for monitoring suspicious activity or how to set the proper software parameters for capturing potentially suspicious transactions. One examiner in a different discussion group said that without proper monitoring, a bank would not know when sudden changes in MSB customers’ transaction types or volumes would be considered suspicious and should be reported. Risk assessment. Examiners in many discussion groups said some banks do not appropriately assess their MSB customers’ risk, either because they do not consider relevant risk factors or they rate all MSB customers at the same risk level. One examiner in a discussion group said he examined a bank with many money transmitter customers that transmitted funds to several countries and found that the bank did not assess the risk levels of the countries to which the money transmitters sent funds. An examiner in a different discussion group said that banks often assess all MSBs at the same level of risk because they do not understand the difference between the various risk levels. Another examiner in the same discussion group added that banks often do not understand the guidance clarifying that banks should assess each customer’s risk individually. This statement was corroborated by our review of several banks’ BSA policies that stipulated that all money transmitters and other MSBs should be considered high risk, contrary to the 2005 guidance. Customer identification. Examiners from many discussion groups said banks do not always identify their MSB customers—for example, when a bank acquires another bank without being aware that the acquired bank has MSB customers. Examiners in some discussion groups said that failure to properly identify MSB customers stems partly from inadequate due diligence or risk assessment. BSA/AML compliance staff and resources. Examiners in many discussion groups said that some banks do not have sufficient BSA/AML compliance staff or resources to manage their BSA/AML compliance programs. For example, an examiner in one discussion group described a bank with nearly 70 money transmitters and more than 200 check cashers but only four staff in its BSA/AML compliance department, which the examiner considered inadequate. Examiners in many discussion groups said that BSA/AML deficiencies generally stem from overall weakness in a bank’s BSA/AML compliance program or internal controls, and not from providing services to money transmitters or any particular customer type. An examiner from one discussion group noted that a bank with weak internal controls around money transmitters likely has weak internal controls across its BSA/AML compliance program. Examples of deficiencies provided by examiners across discussion groups include banks failing to follow written policies and procedures, rating entire categories of customers as high-risk rather than assessing individual customer risk, not conducting on-site customer reviews, failing to conduct other due diligence, and not properly monitoring and reporting suspicious activities. Moreover, our review of bank examination documents found that BSA/AML-related deficiencies mostly stemmed from weakness in banks’ BSA/AML compliance programs and internal controls overall—for example, in customer identification programs, customer due diligence procedures and practices, and risk assessments—and not from a bank providing services to MSBs or any other customer type. According to examiner discussion groups and examination documents we reviewed, not all banks with MSB customers experience BSA/AML compliance challenges. Examiners in some discussion groups noted that banks that successfully provide accounts to MSBs, including money transmitters, tend to have a strong BSA/AML compliance program. For example, examiners in some discussion groups said that such banks have internal controls commensurate with the BSA/AML risks of the MSB customers, including conducting appropriate monitoring and due diligence of customers, and understand the full scope of MSB customers’ activities. The examiners stated that these banks also have sufficient BSA/AML compliance staff who received training. Similarly, our review of bank examination documents included examples of banks with MSB customers that complied with BSA/AML compliance program requirements, such as a community bank with 80 money transmitters. In the examination documents we reviewed, examiners noted that although the bank engaged in higher-risk business, it was managing the risk appropriately. While views among examiners in our discussion groups varied, examiners in some discussion groups identified challenges in assessing banks’ customer due diligence for money transmitters and other MSB customers. As discussed earlier, the FFIEC examination manual includes an expanded examination section for nonbank financial institutions that provides procedures and guidance for examiners when assessing banks’ compliance controls for MSB customers, including money transmitters. The procedures direct examiners to determine whether the banks’ policies, procedures, and processes to assess risks posed by MSB customers allow the banks to effectively identify higher-risk accounts and the amount of further due diligence that is necessary. The expanded examination guidance provides examples of actions banks can take to meet the additional due diligence requirement for customers they deem to be higher risk. Examiners from many discussion groups said they believe these procedures and guidance are sufficient. One examiner noted that assessing controls is the same for a bank’s MSB customers as for any other type of customer. However, examiners from some discussion groups said it was unclear how much due diligence is reasonable to expect banks to conduct for their money transmitters and other MSB customers. An examiner in one discussion group said it was not clear from the examination procedures and guidance how much banks were expected to question and request information from their MSB customers or monitor their MSB customers’ due diligence efforts without expecting banks to act as the de facto regulator for MSBs. Other examiners noted that although banks are responsible for understanding the kinds of transactions that flow through an MSB, to some extent banks do not have visibility into these individual transactions, as they are aggregated before flowing into the account at the bank. Similarly, another examiner said there was uncertainty about how critical an examiner should be of a bank’s due diligence efforts in cases where a bank’s documentation on an MSB customer’s BSA/AML compliance program is lacking. One examiner noted that while the examination guidance provides examples of due diligence actions banks can consider performing, those actions are not requirements. The examiner said it was therefore not clear to what extent examiners should apply these examples as criteria and expect banks to have implemented them. Further, examiners in some discussion groups said that it can be difficult to evaluate banks’ risk assessments, including processes for identifying higher-risk customers that require additional due diligence. One examiner said that it is unclear from the examination procedures how to determine whether banks’ risk assessment processes for identifying higher-risk customers are adequate. An examiner in a different discussion group said that in evaluating banks’ risk assessment of new money transmitter customers, he looks for whether banks ask why new customers switched banks. However, other examiners in the same discussion group noted that this is not a standard question. Our review of the expanded examination section found a lack of examples of specific steps or processes that examiners can take in assessing banks’ compliance for additional due diligence. For example, this section’s procedures contain only a general reference that examiners should determine whether the banks’ policies, procedures, and processes effectively allow the banks to identify and conduct risk-based due diligence for higher-risk customers and lack specific examples to assist examiners in evaluating additional due diligence activities. The section’s guidance states that examiners could take actions, including reviewing an MSB’s BSA/AML compliance program or conducting on-site visits to help evaluate a bank’s compliance. But neither the guidance nor the procedures clarify what these reviews or visits might entail. In comparison, the expanded section’s guidance and procedures include examples of specific steps that examiners can take when assessing banks’ compliance with minimum due diligence requirements for MSB accounts, such as applying the bank’s customer identification program and confirming FinCEN registration status and state licensing, if applicable. Officials from the Federal Reserve and OCC said that the examination manual is not intended to provide explicit criteria for examiners when they are assessing the adequacy of a bank’s program. They said that establishing explicit criteria would result in a “check the box” approach to BSA/AML compliance, such that banks are given a uniform set of requirements to follow, irrespective of the money-laundering or terrorism- financing risks associated with their banking activities. They said that if banks only needed to meet specific requirements, such an approach would encourage banks to do the minimum to establish a BSA/AML compliance program and would not effectively detect and deter money laundering and terrorism financing. As discussed earlier, the examination manual is instead structured to allow examiners to tailor the BSA/AML examination scope and procedures to the specific risk profile of the bank. Staff from the federal banking regulators said that as a result, examiners are expected to apply their judgment in evaluating banks’ BSA/AML compliance programs. However, while regulators want compliance programs to be tailored to the unique risks a bank’s operations present, examiners need sufficient guidance to determine whether a given bank’s BSA/AML-related policies, processes, and procedures are adequate. Regulators and FinCEN issued the 2005 interagency guidance to clarify BSA/AML requirements and supervisory expectations for banks when providing banking services to money transmitters and other MSBs. Since then, examiners have relied on this guidance when reviewing banks’ MSB customer accounts. However, the examination procedures and related guidance may not provide all of the information examiners need to conduct their assessments, as indicated by the examiners in some of our discussion groups who reported that it is not clear to them how to determine whether banks’ due diligence efforts are adequate. Providing clarifying information would not compromise examiners’ ability to exercise judgement during an examination. Rather, it would provide them with greater certainty that they are evaluating banks’ compliance with BSA/AML requirements appropriately. Federal internal control standards state that agencies should identify, analyze, and respond to risks related to achieving the defined objectives. Unless federal banking regulators take steps to improve examiners’ ability to evaluate banks’ compliance controls with respect to money transmitter accounts, examiners may not be fully achieving the BSA/AML examination objectives of identifying and assessing risks and banks’ ability to manage risks, as set out in the examination manual in assessing banks’ compliance with BSA/AML requirements. Internal control standards also state that agencies should internally communicate the necessary quality information to achieve their objectives. With respect to examiners, such communication could include providing updates to examination procedures, examiner training, or a combination of methods. We estimate that 32 percent of banks nationwide provided accounts to money transmitters from 2014 through 2016, based on the results of a survey we conducted jointly with other GAO work on derisking. For calendar year 2016, of the 91 banks that reported having money transmitters as customers, 71 banks of varying asset sizes reported having 41,089 money transmitter accounts (see table 1). Overall, of the 91 banks that reported having money transmitters as customers, close to half of them (40 banks) terminated at least one of their money transmitter accounts and almost one-third of them (29 banks) limited the number of accounts with money transmitters, both for reasons related to BSA/AML risk, from 2014 through 2016 (see table 2). Because extra-large banks reported having a much greater number of accounts with money transmitters, these banks also reported a greater proportion of account terminations, compared with small and medium banks. Specifically, 18 banks of all sizes that responded to the survey reported that they terminated 1,098 accounts in 2016—with 89 percent of these account closures (976 out of 1,098) reported by six extra-large banks. In particular, one extra-large bank accounted for more than half (601 out of 1,098) of the account terminations in that year. See table 3 for more information on account terminations in 2016. See appendix II for more information on account terminations and limitations. Some terminations and limitations of money transmitters’ bank accounts appear to be associated with managing BSA/AML risk. However, some terminations and limitations raise derisking concerns. Some reasons that banks reported for terminating accounts were associated with managing BSA/AML-related risk, including the filing of SARs associated with the account and customers failing to provide information necessary for the bank to conduct adequate BSA/AML due diligence. Some banks also reported terminating accounts to reduce the risk that a customer’s activity could harm a bank’s reputation, known as reputational risk (see table 4). These survey results are consistent with the results of our prior work on banks in the Southwest border region. The most commonly cited reason in our survey for terminating accounts was the filing of SARs. Officials we interviewed from one bank told us that they investigate customers that have triggered multiple SAR filings and considered setting up controls to limit account activities. Officials of another bank told us that a federal bank examiner suggested that the bank consider closing an account with a money transmitter customer because of SAR filings associated with it. The second most commonly cited reason for terminating accounts was that a customer failed to provide information requested by a bank for conducting BSA/AML due diligence. Officials we interviewed from two banks told us that customers may not be able to provide information and documentation or may not disclose that they are an MSB when opening new accounts. Officials of a bank that maintained accounts with money transmitters told us they terminated accounts in instances where a money transmitter did not submit required documentation. Another commonly cited reason for terminating accounts was reputational risk—the potential that negative publicity regarding an institution’s business practices, whether true or not, will cause a decline in the customer base, costly litigation, or revenue reductions. One bank’s officials said in an interview that when examiners inquired as to whether bank officials factor reputational risk into their decision-making about money transmitters, they viewed such inquiries as implicit suggestions that the bank had an issue with reputational risk that needed to be addressed. Examiners in our discussion groups also shared similar comments on suspicious activity monitoring and banks’ requests for information. Specific to suspicious activities, one examiner noted that banks generally have an internal policy stating that if a specific number of SARs are filed on the customer, the bank will automatically terminate the account. Regarding banks’ information requests, examiners in some discussion groups said they observed that banks may terminate an MSB’s account if the MSB does not comply with the bank’s request for due-diligence- related documentation. Three of the most common reasons banks reported for limiting accounts with money transmitters were that (1) the cost of BSA/AML compliance made the customer type unprofitable, (2) the banks were unable to manage the BSA/AML risk associated with the customer type, and (3) the customer type fell outside of a bank’s risk tolerance (see table 5). One of the most commonly cited reasons for limiting the number of accounts with money transmitters was compliance costs associated with managing BSA/AML risk. Officials of about two-thirds of the banks we interviewed said their BSA/AML compliance costs had increased over time, with eight institutions specifically citing past or planned upgrades to their monitoring software systems as one source of increasing costs. Moreover, officials of one bank said their compliance costs had increased in recent years as a result of regulatory scrutiny, which they said had increased as MSBs came to comprise a larger portion of their customer base. In response to this heightened scrutiny, officials said the bank had installed a new transaction-monitoring platform, which incurred a one-time migration cost and would incur higher monthly fees, and was considering expanding its compliance department. Officials of three banks told us in interviews that 50 percent of their compliance costs stem from BSA/AML compliance. As we have reported previously, money transmitters are generally low-profit customers for banks, in that the revenue from their accounts may not be sufficient for some banks to offset the associated costs of BSA/AML compliance. For example, officials of one bank said the bank spent about $250,000 annually to maintain its BSA-related monitoring software and training, which they believed was a significant portion of the bank’s $25 million annual income. These officials told us that unlike the bank’s other customers, which use the bank’s other products and refer business, money transmitters are not the bank’s core customers and do not use other products or services, so the bank would rather focus its time and resources on its core customers. Similarly, officials of another bank said they decided not to bank MSBs because any revenue generated would not cover the additional resource and compliance costs. Banks’ inability to manage BSA/AML risks associated with money transmitter customers was another commonly cited reason for limiting the number of accounts. For example, officials of one bank we interviewed said they did not accept any MSB customers, including money transmitters, because they were not willing or able to take on the required risk and level of BSA/AML monitoring. Another commonly cited reason for limiting accounts was that a customer type fell outside of a bank’s risk tolerance. In interviews, banks expressed concerns about their MSB customers’ ability to maintain an adequate BSA/AML compliance program. One bank’s officials told us that owners of gas stations may offer check cashing or money transmission services to generate additional revenue, but they may not be aware that offering such services would subject their business to BSA/AML compliance requirements. Another bank’s officials also said that many business owners do not know that they have to register with FinCEN to operate as an MSB. Officials from a third bank said that some MSBs may not understand the BSA/AML regulations and, at their customers’ request, may inadvertently commit a violation such as structuring that may generate a SAR (for example, by breaking up a money transfer in excess of $10,000 into multiple transfers to avoid generating a Currency Transaction Report). Similarly, examiners in many discussion groups said that the staffing and resource costs required for adequate monitoring and due diligence on MSB customers, including money transmitters, are reasons why some banks may choose not to bank MSBs. Moreover, examiners in many discussion groups also said some banks offer MSBs accounts and then find out that they do not have the necessary BSA/AML expertise or that the business is not profitable for them. For example, one examiner said that when a larger bank in his area terminated all of its money transmitter accounts, a number of smaller banks looking for profit offered accounts to these money transmitters. However, the examiner added that the smaller banks did not understand the level of customer due diligence and monitoring that was required for these accounts and the associated costs, and they terminated the accounts. In contrast, examiners in some discussion groups said that some community banks have accepted money transmitter customers as a way to generate potentially substantial fee income. According to survey responses from banks, the most commonly cited reason for limiting the number of money transmitter accounts was that the customer type drew heightened BSA/AML regulatory oversight—behavior that would indicate derisking. Banks also commonly cited this reason for terminating money transmitter accounts. For example, officials from one bank told us that the bank no longer offered services to MSBs because it wanted to be viewed favorably by regulators. Officials of another bank said that money transmitter account closures were generally the result of onerous regulatory requirements and increased regulatory scrutiny. Officials from two banks we spoke with said that they received greater regulatory scrutiny after increasing their number of MSB customers, which affected their willingness to open additional accounts with MSBs. According to officials of one of the two banks, when the bank increased its MSB customers from one to two, the institution was assessed as high risk by examiners. Related to heightened regulatory oversight, some banks’ officials we interviewed also expressed concerns that some examiners’ expectations go beyond what is described in the examination manual. For example, they said examiners expected banks to know their customers’ customers—although BSA/AML regulations do not require banks to obtain information on their customers’ customers. Bank officials said ascertaining such information was difficult because money transmitters’ customers are one step removed from the bank. Some banks’ officials also told us that they felt obligated to follow examiners’ verbal suggestions, even when the suggestions did not appear in the final examination report as recommendations. Other banks’ officials we interviewed stated that although examiners did not explicitly recommend that banks exit certain lines of business, officials felt pressure from the examiners to do so. For example, officials from one bank said examiners suggested that if the bank exited certain lines of business, the bank would not have deficiencies in its BSA/AML compliance program. We reported similar concerns in our March 2018 report. About half of the banks we interviewed for that report said that the fear of regulatory scrutiny served as a disincentive for banks to maintain accounts with money transmitters. Some banks’ officials expressed uncertainty about the amount of due diligence required for regulatory purposes because regulations included ambiguous language or because examiner practices exceeded regulations. These bank officials suggested that regulators could provide more specific guidance for banks on risk management, such as by including example scenarios and answers to frequently asked questions. Conversely, some banks we interviewed had a different experience. For example, officials of one bank told us that examiners’ interpretation of BSA/AML principles did not differ from the bank’s understanding of those principles. Officials added that when they initially began preparing risk assessments, they sought feedback and advice from their examiners and that examiners now use the bank’s risk assessment as an example for other banks. Moreover, these officials said that if they need clarification on BSA/AML compliance requirements, they contact FinCEN, which has been responsive to their questions. Officials of another bank told us they have a good relationship with their federal regulator and said that examiners follow BSA guidance and have been consistent in conducting their examinations. Officials of two other banks told us that their BSA/AML examinations have been consistent with guidance and requirements and that examiners have not told officials what types of customers to avoid. We also reported in February 2018 that recent BSA/AML law enforcement and regulatory enforcement actions have caused some banks to become more conservative in the types of businesses to which they offer accounts. In our interviews for the February 2018 report, officials of three banks and an industry group expressed concerns about potential enforcement actions, including civil penalties, if banks’ employees make mistakes in BSA/AML monitoring. In 2012, federal regulators assessed civil money penalties—including a $500 million penalty assessed by OCC and a $165 million penalty by the Federal Reserve—against HSBC Bank for, among other things, failing to maintain an effective BSA/AML compliance program and failing to conduct appropriate due diligence on foreign correspondent bank account holders. As another example, in March 2018, OCC issued consent orders for civil penalties against three senior executives of the Merchants Bank of California for violations of consent orders related to monitoring BSA/AML compliance. In our interviews, officials of an industry association told us that fines associated with BSA violations are especially difficult for community banks to absorb and could result in the bank going out of business. Similarly, examiners from a discussion group said some banks may decide not to offer accounts to MSBs to avoid heightened regulatory scrutiny. For example, examiners said some banks likely want to avoid BSA/AML risk entirely when they decide not to offer MSBs accounts. One examiner thought that some banks lack understanding regarding the business models of MSBs and that it is easier for them not to provide them accounts. In some cases, banks offer MSBs bank accounts but on a limited basis. For example, examiners from one discussion group said that in some cases, banks manage their BSA/AML risks by maintaining existing MSB accounts but not offering accounts to new MSB customers. In a 2015 speech, a senior Treasury official noted banks’ concerns about the cost of complying with BSA/AML requirements, uncertainty about supervisors’ expectations regarding appropriate due diligence, and the nature of the enforcement and supervisory response if they make a mistake. Moreover, the official stated that the banks held the perception that supervisory and enforcement expectations lack transparency, predictability, and consistency. The official also said that this perception feeds into higher anticipated compliance costs and may eclipse any potential economic gains of taking on new MSB customers. To address these concerns, the senior official stated that policymakers needed to continue to improve their understanding of the scope, nature, and drivers of the problem through better data collection and continue to explore ways to improve the effectiveness of their communication. According to money transmitters we spoke with, effects of account terminations due to derisking include ceasing of operations, loss of revenue, higher costs for services provided, and failure of the business. For example, officials from one large money transmitter that operates in the United States and internationally said that in recent years, about 100 of the money transmitter’s agents have lost accounts with their local and regional banks each month. The officials added that when banks terminate accounts with the money transmitter or its agents, the money transmitter cannot conduct the necessary transactions with its agents to facilitate the cash transfer. As a result, officials told us, account terminations can cause the money transmitter to cease operations in a particular country or cause the agents to go out of business. These officials also told us that some banks have terminated accounts with their institution while maintaining accounts with other money transmitters. These officials said they obtained legal injunctions for unfair competitor treatment in some of these cases. Officials of a smaller, regional money transmitter said that they have experienced 10 account terminations since 2006. Moreover, the officials said that they have to switch banks every 2 to 3 years because of account terminations and that it is getting more difficult to find a bank willing to take on money transmitters as customers. For example, the officials said that they called about 300 banks in a state and only two banks were willing to open accounts with them. The money transmitter’s officials said it has had to cease operations in three states due to account terminations. The officials said that the money transmitter now focuses on opening accounts with community banks and credit unions, but these institutions may be too small to handle the money transmitter’s volume of deposits. Another money transmitter told us that it takes about 3 months to open an account with a bank. Moreover, as a result of account terminations and limitations by banks, the money transmitter has had to reduce its number of employees from 220 to 180 and has not been able to open new locations. Another money transmitter said that account terminations have affected its ability to obtain accounts with other banks. In our March 2018 report, we found that some money transmitters—those that may be considered higher risk based on the 2005 interagency guidance—may utilize nonbank channels for transferring money as a response to account terminations. Specifically, we reported that as a result of banks’ account terminations and limitations, some money transmitters serving fragile nations have relied on nonbank channels, such as cash couriers and armored trucks, to transfer money domestically and abroad. We further reported that using cash couriers or armored trucks to move money increases costs and risks of theft and safety. Account terminations and limitations by banks also affect money transmitters that do not serve customers abroad—money transmitters that could be considered lower risk based on the 2005 interagency BSA guidance. For example, a company that acquired another business offering money transmission services to customers within the United States also experienced account terminations. When the company acquired the new business and thus the business’s money transmission license, its bank refused to service the company because of its newly acquired status as a money transmitter. In another example, officials of a money transmitter that serves only U.S. customers told us they have difficulty opening accounts and have experienced account terminations often. Officials said that their business has stopped at times because they did not have any bank accounts to facilitate money transmission. Additionally, account closures also may affect money transmitters’ customers. For example, some money transmitters we interviewed said they passed on increased costs resulting from account closures to their customers. Specifically, officials of one large money transmitter said that because of derisking, banks that still do business with them are charging higher fees. The officials added that they try to absorb the higher fees but have passed on the increased costs to their customers in some markets. In contrast, some money transmitters told us in interviews that although their costs have increased, they have not increased customer fees. Several money transmitters told us that banks did not always provide reasons for terminating their accounts. Some said they believe that banks terminate accounts due to regulatory pressure, compliance costs, or changes in a bank’s policy or risk appetite. One money transmitter stated that the problem of account terminations due to derisking stems from banks being too afraid to bank MSBs, including money transmitters. In response to banks’ account terminations and limitations, some money transmitters—including those with characteristics considered to be higher and lower risk according to the 2005 interagency guidance—now maintain accounts with multiple banks to help ensure they can continue operating should a bank close their account. For example, officials of the company that acquired another business offering domestic money transmission services told us they maintain accounts with more than one bank, but they said it is difficult and costly to do so. Officials of another money transmitter said that to help prevent disruptions to their ability to transfer funds when they experience an account closure, they try to have back-up accounts at other banks. Some money transmitters also engage with their banks’ management to better understand what banks expect from them in meeting compliance requirements. For example, an official from one money transmitter said the money transmitter tries to meet with its banks’ financial crimes teams to better understand how it can help minimize the risk of facilitating money transfers for terrorist-financing and money-laundering purposes. Officials of another money transmitter told us that as a result of meeting with bank management, the money transmitter added additional employees to its compliance department and bought new monitoring software to fulfill its bank’s requirement for monthly monitoring of transactions. FinCEN and the federal banking regulators have responded to concerns about the derisking of money transmitters and other MSBs on a national level by issuing guidance to banks to clarify expectations for providing banking services to these customer types. In March 2005, the federal banking regulators and FinCEN issued a joint statement noting that MSBs were losing access to banking services as a result of concerns about regulatory scrutiny, the risks presented by MSB accounts, and the costs and burdens associated with maintaining such accounts. According to the joint statement, these concerns might have stemmed, in part, from banks’ misperception of the requirements of the BSA and the erroneous view that MSBs present a uniform and unacceptably high risk of money laundering or other illicit activity. The joint statement recognized that the MSB industry provides valuable financial services, especially to individuals who may not have ready access to the formal banking sector. It further noted that it is important that MSBs comply with the requirements of the BSA and applicable state laws and remain within the formal financial sector and be subject to appropriate AML controls. The joint statement announced the intent of the regulators and FinCEN to issue the interagency guidance for banks on providing services to MSBs, which, as previously discussed, was intended to clarify BSA requirements and supervisory expectations as applied to accounts opened or maintained for MSBs. More recently, in November 2014, FinCEN issued a statement reiterating that banks can serve the MSB industry while meeting their BSA obligations and referring to the interagency guidance to banks on providing services to MSBs. The statement noted concerns that banks were indiscriminately terminating the accounts of all MSBs, or refusing to open accounts for any MSBs, thereby eliminating them as a category of customers. It noted, similar to the March 2005 joint statement, that regulatory scrutiny, the perceived risks presented by MSB accounts, and the costs and burdens associated with maintaining such accounts appeared to play a part in these decisions. In the 2014 statement, FinCEN cautioned that a wholesale approach to MSB customers runs counter to the expectation that financial institutions can and should assess the risks of customers on a case-by-case basis. Similarly, it noted that a blanket direction by U.S. banks to their foreign correspondents not to process fund transfers of any foreign MSBs, simply because they are MSBs, runs counter to the risk-based approach. FinCEN stated that refusing financial services to an entire segment of the industry can lead to an overall reduction in financial sector transparency, and that such transparency is critical to making the sector resistant to the efforts of illicit actors. Federal banking regulators also issued separate statements addressing BSA/AML risk posed by MSBs and foreign banks. See table 6 for a summary of key statements and guidance related to MSBs issued in recent years by FinCEN and the federal banking regulators. In 2018, we reported that regulators had taken only limited steps to understand how banks’ regulatory concerns and BSA/AML compliance efforts may be influencing banks to derisk. We reported that regulators had taken some actions in response to derisking, including issuing the guidance previously discussed, and that some agencies took steps aimed at trying to determine why banks may be terminating accounts. We also reported that regulators had conducted retrospective reviews on some BSA/AML requirements. We noted that actions regulators had taken to address concerns raised in BSA/AML retrospective reviews had focused primarily on the burden resulting from the filing of Currency Transaction Reports and SARs. However, we noted that these actions had not been aimed at addressing—and, if possible, ameliorating—the full range of factors that influence banks to engage in derisking, particularly how banks’ regulatory concerns and BSA/AML compliance efforts may be influencing their willingness to provide services. We concluded that without a broader assessment of the full range of BSA/AML factors that may be influencing banks to derisk, FinCEN, the federal banking regulators, and Congress do not have the information needed to determine if BSA/AML regulations and their implementation are achieving their regulatory objectives in the most effective and least burdensome way. Therefore, we recommended that FinCEN and the federal banking regulators conduct a retrospective review of BSA regulations and their implementation for banks, with a focus on how banks’ regulatory concerns may be influencing their willingness to provide services. According to the federal banking regulators and FinCEN, they and Treasury established an interagency working group in early 2018 that they believe will address our recommendation. The interagency working group is intended to identify ways to improve the efficiency and effectiveness of BSA/AML regulations, supervision, and examinations while continuing to meet the requirements of the BSA and its implementing regulations, supporting law enforcement, and reducing BSA/AML compliance burden. Staff from FinCEN and the federal banking regulators identified several interagency statements that the working group has completed. Interagency Statement on Sharing BSA Resources (issued on October 3, 2018): This statement clarified how banks may reduce the costs of meeting BSA requirements effectively by sharing employees or other resources in a collaborative arrangement with one or more banks. The statement highlighted potential benefits to sharing resources and provided examples of resources that may be appropriate to share, such as certain internal controls, independent testing, and BSA/AML training functions. The statement also highlighted potential risks of sharing resources and cautioned that any collaborative arrangements should be designed and implemented according to each bank’s risk profile. Joint Statement on Innovative Efforts to Combat Money Laundering and Terrorist Financing (issued on December 3, 2018): This statement clarified the working group’s position with respect to innovative approaches in BSA/AML compliance and encouraged banks to consider such approaches. For example, some banks are experimenting with artificial intelligence and digital identity technologies applicable to their BSA/AML compliance programs. The statement notes that these innovations and technologies can strengthen BSA/AML compliance approaches and that the regulators welcome these types of innovative approaches to further efforts to protect the financial system against illicit financial activity. According to the statement, pilot programs undertaken by banks to test and validate the effectiveness of innovative approaches should not subject banks to supervisory criticism even if the pilot programs ultimately prove unsuccessful. Joint Statement on Risk-Focused Bank Secrecy Act/Anti-Money Laundering Supervision (issued on July 22, 2019): This statement was intended to improve the transparency of the risk-focused approach used for planning and performing BSA/AML examinations. In this statement, FinCEN and the banking regulators emphasized that they scope their examinations in response to the unique risk profile for each bank because banks vary in focus and complexity. The regulators also clarified common practices for assessing a bank’s risk profile, including leveraging available information such as the bank’s own risk assessment, contacting the banks between examinations, and considering the bank’s ability to identify, measure, monitor, and control risks. Federal banking regulators and FinCEN staff said the working group’s focus on regulatory reform and on reducing the burden associated with BSA/AML compliance may indirectly address derisking concerns, including those related to money transmitters. In particular, they said these efforts may help agencies as they clarify their supervisory expectations for banks with respect to managing BSA/AML risk. For example, the staff said that the joint statement on the risk-focused approach to supervision clarifies that the role of the examiner is not to determine what level of risk a bank should assume. Instead, the examiners should review risk management practices to evaluate whether a bank has effective processes to identify, measure, monitor, and control risks and to assess the effectiveness of a bank’s processes. They said that reminding examiners and institutions of the risk-focused approach will help dispel the perception that banks will be criticized for taking certain higher-risk customers when the bank is properly managing that risk. Similarly, they said that the joint statement on innovation could help address derisking concerns because it allows banks to leverage new technologies and innovative approaches to help reduce costs of implementing the strong risk management practices that may be necessary to provide banking services to some higher-risk customers. The actions taken to date by the interagency working group are important steps toward improving the efficiency and effectiveness of BSA/AML regulations and supervision. As previously discussed, one reason some banks reported terminating or limiting money transmitter accounts was because of the cost associated with BSA/AML compliance. The interagency statements on sharing BSA resources and innovative efforts to combat money laundering and terrorist financing could help reduce banks’ implementation costs associated with providing banking services to potentially higher-risk customers. However, consistent with our prior work, our evidence demonstrates that banks terminate or limit customer accounts not only as a way to address legitimate money-laundering and terrorist-financing threats, but also as a way to manage regulatory concerns, which may indicate derisking. Reminding examiners and banks of the risk-focused examination approach may help to dispel the perception that banks will be criticized for taking certain higher-risk customers when the bank is properly managing that risk and may indirectly address some factors that influence banks to derisk. Nevertheless, the working group has not yet considered whether there are other supervisory concerns that factor into banks’ decisions to derisk. As we stated in our prior work, it is important to evaluate and address the full range of factors that may be influencing banks to derisk. Therefore, we maintain that FinCEN and the banking regulators should continue to work toward implementing our prior recommendation to conduct a retrospective review of BSA/AML regulations focusing on how banks’ regulatory concerns may be influencing their willingness to provide services. Regulators and FinCEN issued the 2005 interagency guidance to clarify BSA/AML requirements and supervisory expectations with regard to accounts banks open or maintain for money transmitters and other MSBs. However, some examiners in our discussion groups said they were unclear about how much due diligence is reasonable to expect banks to conduct for their money transmitters. Improving examiners’ ability to evaluate banks’ BSA/AML compliance controls with respect to money transmitter accounts would help ensure that such evaluations are done in accordance with BSA/AML examination objectives of identifying and assessing risks and banks’ ability to manage risks, as set out in the examination manual. Options for making such improvements could include providing examiners with more detailed examination procedures, enhanced information, additional training, or a combination of methods. We are making a total of four recommendations to the Federal Reserve, OCC, FDIC, and NCUA: The Board of Governors of the Federal Reserve System should, in coordination with the other federal banking regulators, and with input from BSA/AML examiners and other relevant stakeholders, take steps to improve examiners’ ability to evaluate the effectiveness of banks’ BSA/AML compliance controls with respect to money transmitter accounts. Steps may include providing updates to examination procedures, examiner training, or a combination of methods. (Recommendation 1) The Comptroller of the Currency should, in coordination with the other federal banking regulators, and with input from BSA/AML examiners and other relevant stakeholders, take steps to improve examiners’ ability to evaluate the effectiveness of banks’ BSA/AML compliance controls with respect to money transmitter accounts. Steps may include providing updates to examination procedures, examiner training, or a combination of methods. (Recommendation 2) The Chairman of the Federal Deposit Insurance Corporation should, in coordination with the other federal banking regulators, and with input from BSA/AML examiners and other relevant stakeholders, take steps to improve examiners’ ability to evaluate the effectiveness of banks’ BSA/AML compliance controls with respect to money transmitter accounts. Steps may include providing updates to examination procedures, examiner training, or a combination of methods. (Recommendation 3) The Chairman of the National Credit Union Administration should, in coordination with the other federal banking regulators, and with input from BSA/AML examiners and other relevant stakeholders, take steps to improve examiners’ ability to evaluate the effectiveness of banks’ BSA/AML compliance controls with respect to money transmitter accounts. Steps may include providing updates to examination procedures, examiner training, or a combination of methods. (Recommendation 4) We provided a draft of this report to the Federal Reserve, FDIC, NCUA, OCC, and Treasury’s FinCEN for review and comment. The federal regulators provided technical comments on the draft report, which we have incorporated as appropriate. The Federal Reserve, FDIC, NCUA, and OCC also provided written comments (reproduced in appendixes III through VI). They agreed with GAO’s recommendations and expressed a commitment to implement them. We are sending copies of this report to the appropriate congressional committees, the Director of the Financial Crimes Enforcement Network, the Chairman of the Board of Governors of the Federal Reserve System, the Chairman of the Federal Deposit Insurance Corporation, the Comptroller of the Currency, and the Chairman of the National Credit Union Administration. The report will also be available at no charge on our website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are listed on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VII. This report (1) describes regulators’ Bank Secrecy Act (BSA)/anti-money laundering (AML) supervisory expectations for banks that provide services to money transmitters and other money services businesses (MSB) and examiner views on bank challenges in complying with these requirements; (2) examines challenges reported by examiners in conducting BSA/AML assessments; (3) examines the extent to which banks are terminating or limiting money transmitters’ access to banking services and the effects on money transmitters; and (4) evaluates how the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) and the federal banking regulators have assessed and responded to concerns about the derisking of money transmitters. The federal banking regulators included in our review are the Board of Governors of the Federal Reserve System (Federal Reserve), the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of the Currency (OCC), and the National Credit Union Administration (NCUA). We define “derisking” as the practice of banks limiting certain services or ending their relationships with customers to, among other things, avoid perceived regulatory concerns about facilitating money laundering. We developed this definition in our prior work addressing account terminations and branch closures in the U.S. Southwest border region. To describe regulators’ BSA/AML supervisory expectations for banks that provide services to money transmitters and other MSBs and federal bank examiners’ views on banks’ challenges in complying with these requirements, we reviewed joint guidance issued by FinCEN and the federal banking regulators in April 2005 on banking MSBs and the Federal Financial Institutions Examination Council’s (FFIEC) BSA/AML examination manual, which federal banking regulators use to examine banks for BSA/AML compliance. We also interviewed the federal regulators named above. Further, we interviewed representatives of 16 banks, six credit unions, and relevant industry groups and trade associations. Because of our judgmental sampling, the views expressed by these groups may not be representative. To identify the universe of banks for interviews, we used data from FDIC’s Statistics on Depository Institutions database as of December 31, 2016. Next, we excluded banks that did not offer the product types relevant to our study, including credit card banks and banks that offer nontraditional accounts; multiple subsidiaries of large holding companies; and federal branches of foreign banks. We also excluded banks with insufficient information to determine the types of accounts offered. In addition, we excluded banks selected to participate in a web- based survey (we describe our survey methodology below). After these exclusions, our initial list consisted of 5,922 banks. Because the primary regulators (Federal Reserve, OCC, and FDIC) do not track which banks have money transmitter customers, we used a judgmental sample to randomly select banks to interview from each of the primary regulators based on asset size (small, medium, and large). For small and medium banks, we interviewed one bank of each size from each of the three regulators. For large banks, all were regulated by OCC, and we interviewed two of these banks. We defined banks’ asset-size categories as follows: (1) “small” consisted of banks with assets of less than $1 billion, (2) “medium” consisted of banks with assets of $1 billion to less than $10 billion, and (3) “large” consisted of banks with assets of $10 billion to less than $50 billion. Once we selected our sample, we contacted each bank to confirm that it had money transmitter or other types of MSB customers. If a bank did not have money transmitter or other MSB customers or declined to speak with us, we selected another bank in the same asset-size category. We initially selected nine banks to interview—three in each asset-size category—but one large bank declined to speak with us. Because there were no other large banks in our sample, we interviewed two large banks, for a total of eight small, medium, or large banks. We also jointly interviewed eight extra-large banks (with assets of $50 billion or more) in coordination with our other work on derisking. Because NCUA tracks which credit unions have money transmitter customers, we obtained data from NCUA on credit unions that served money transmitters as of April 2017 and stratified them according to small, medium, and large asset-size categories. We defined credit unions’ asset-size categories as follows: (1) “small” consisted of credit unions with assets of less than $100 million, (2) “medium” consisted of credit unions with assets of $100 million to $500 million, and (3) “large” consisted of credit unions with assets of more than $500 million. We chose three credit unions with the largest numbers of money transmitter customers and randomly selected one credit union from each asset-size category, for a total of six credit unions. From our initial selection, we emailed or called each of the six credit unions to ascertain if it had a money transmitter customer. If a credit union did not have a money transmitter customer or declined to speak with us, we selected another credit union in the same asset-size category. We then conducted two discussion groups per regulator with bank examiners from the Federal Reserve, OCC, FDIC, and NCUA to understand how they applied the FFIEC manual in assessing BSA/AML compliance controls of banks with money transmitter customers. To determine the composition of the discussion groups, we identified BSA/AML specialists or subject-matter experts from the district and regional offices of each federal banking regulator located in geographic areas with relatively large numbers of money transmitters. To do this, we first identified the states with the largest numbers of registered money transmitters by analyzing FinCEN money transmitter registration data from January 2015 through May 2017. We then requested rosters of staff designated as BSA/AML subject-matter experts and specialists from each regulator for each district or regional office in those states. We administered a questionnaire to the individuals on each roster asking about their experience with examining banks with money transmitter customers and other questions, such as years of experience in conducting bank examinations. We excluded from consideration BSA/AML subject-matter experts and specialists who either self-identified as supervisors or who had not examined a bank with a money transmitter customer in the past 3 years. We then randomized and selected BSA/AML subject-matter experts and specialists for participation in our discussion groups. Depending on scheduling and availability, the number of participants for each discussion group ranged from six to 14. Each session was digitally recorded and transcribed by an outside vendor, and we used the transcripts to summarize participants’ responses. An initial coder assigned a code that best summarized the statements from discussion group participants and provided an explanation of the types of statements that should be assigned to a particular code. A separate individual reviewed and verified the accuracy of the initial coding. The initial coder and reviewer discussed orally and in writing any disagreements about code assignments and documented consensus on the final analysis results. Discussion groups were intended to generate in-depth information about the reasons for the participants’ views on specific topics. The opinions expressed by the participants represent their points of view and may not represent the views of all BSA/AML subject-matter experts and specialists at the federal banking regulators. For purposes of this report, we used the following terms to describe the number of discussion groups in which an issue is mentioned: “some” to describe two to three groups out of the eight discussion groups, “many” to describe four to five discussion groups, and “most” to describe six to seven discussion groups. To examine challenges reported by federal bank examiners in assessing banks’ BSA/AML compliance controls around money transmitters, we asked examiners in our discussion groups to identify any challenges they encountered when assessing these compliance controls. We also reviewed examination guidance and procedures for assessing BSA/AML compliance controls around money transmitters. We assessed this information against federal internal control standards related to identifying risks and communicating information. We also reviewed bank examination and related documentation from the federal BSA/AML examinations of 56 selected banks and credit unions to gain additional context about BSA/AML examinations, including BSA/AML compliance violations—10 from FDIC, 12 from the Federal Reserve, 22 from OCC, and 12 from NCUA. For the documentation review, we selected a nongeneralizable sample of banks and credit unions based on asset-size categories and geographic location (based on each regulator’s field, district, or regional offices) from each federal banking regulator. For banks, we used the same asset-size categories described earlier for our interview selection process. We also included six banks that were issued final BSA/AML enforcement actions—two each from OCC, FDIC, and the Federal Reserve—for calendar years 2014 through 2016. For credit unions, we selected randomly from the same asset-size categories we used for selecting credit unions for interviews—along with geographic locations—and randomly selected four credit unions from each asset-size category, for a total of 12 credit unions. To obtain geographic representation, we ensured that each bank and credit union selected within each asset-size category also represented multiple geographic locations. For each of the 56 banks and credit unions, we requested and reviewed bank examination reports and related workpaper documentation for 2014, 2015, and 2016, including scoping and planning memorandums, bank- or examiner-prepared BSA/AML risk assessments, and conclusion memorandums or documents that summarized BSA examiner findings. For some banks, we also received banks’ BSA policies as part of the examination report and supplemental documentation package. To examine the extent to which banks are terminating or limiting money transmitters’ access to banking services and their reasons why, we administered a web-based survey to a nationally representative sample of banks in the United States for a total survey sample of 406 banks. We did not include credit unions in our sample. In the survey, we asked banks about terminations of money transmitter accounts and limitations on account offerings related to BSA/AML risk and the reasons for these decisions for the 3-year period from January 1, 2014, to December 31, 2016. We obtained a weighted survey response rate of 46.5 percent. While we designed the survey to be nationally representative of all banks in the United States, some results are statistically nongeneralizable because of the relatively low number of banks that reported having money transmitters as customers. For survey questions that are statistically nongeneralizable, we present only the number of responses to each survey question, and these results are not generalizable to the population of banks. Moreover, not all banks responded to every survey question or provided information for every year covered by our survey; therefore, we are not able to provide trend information from 2014 through 2016. We administered the survey from July 2017 to September 2017. To obtain information on the effects of bank account terminations on and limitations in the number of accounts with money transmitters, we interviewed a nongeneralizable sample of representatives from 11 money transmitters. To select the money transmitters, we obtained money transmitter licensure data from the Conference of State Banking Supervisors’ Nationwide Multistate Licensing System. Using the number of state licenses as a proxy for the size of the money transmitter, we developed five size categories and selected the top four money transmitters in the first stratum (40 or more licenses) along with one money transmitter in the second, third, and fourth strata (20–39, 10–19, and 2–9 licenses, respectively) and four money transmitters in the fifth stratum (one license). To evaluate how FinCEN and the federal banking regulators have assessed and responded to concerns about derisking of money transmitters, we reviewed agency documentation and guidance the agencies issued to banks related to derisking and MSBs, and we interviewed agency management. We also reviewed a prior GAO report that evaluated regulators’ response to derisking along the Southwest border and assessed actions regulators have taken to respond to a recommendation we made in that report. We utilized multiple data sources throughout our review. We assessed the reliability of FDIC’s Statistics on Depository Institutions database by reviewing related documentation and conducting electronic testing for missing data, outliers, or any obvious errors. Furthermore, we used NCUA data that track which credit unions bank money transmitters, the Nationwide Multistate Licensing System, and FinCEN’s MSB registration database to help select our nongeneralizable samples of credit unions and money transmitters to interview. We did not assess the data reliability of these sources because we used these data purely to inform our sampling population, and once we selected our samples, we took additional steps to confirm that the institutions we selected had MSB or money transmitter customers and were willing to speak to us. For FinCEN’s MSB registration database, as previously discussed, we used the data to help identify which states had the most money transmitters registered. In analyzing the data, we found a clear difference in the number of MSB registrations between the top five states (California, Texas, Michigan, Florida, and Illinois) with the most MSBs (ranging from close to 800 to almost 4,000 MSBs) and the remaining states (all with fewer than 500 MSBs). Because we used these data to help facilitate the identification of BSA/AML subject-matter experts and specialists who had experience examining banks with money transmitter customers, we did not need to confirm the exact number of MSBs registered. As a result, we did not assess the reliability of FinCEN’s registration database. We concluded that all applicable data were sufficiently reliable for the purposes of describing BSA/AML risks and compliance challenges and identifying banks to survey on account terminations and limitations. We conducted this performance audit from August 2016 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. From July 2017 through September 2017, we administered a web-based survey to a nationally representative sample of banks. In the survey, we asked banks about account terminations and restrictions (also referred to as limitations) for reasons associated with managing Bank Secrecy Act/anti-money laundering (BSA/AML) risk; whether banks are terminating or limiting accounts with money transmitters; and the reasons for these decisions. We collected information for the 3-year period from January 1, 2014, to December 31, 2016. Responses to selected questions from our survey that are directly applicable to the research objectives in this report are shown in tables 7–19 below. While we designed the survey to be nationally representative of all banks in the United States, results specific to money transmitters are statistically nongeneralizable because of the relatively low number of banks that reported having money transmitters as customers. Because these survey questions are statistically nongeneralizable, we present only the number of responses to each survey question, and the results are not generalizable to the population of banks. Moreover, not all banks responded to every survey question or provided information for every year covered by our survey; therefore, we are not able to provide trend information from 2014 through 2016. Our survey included multiple-choice and open-ended questions. For a more detailed discussion of our survey methodology, see appendix I. In addition to the contact named above, Stefanie Jonkman (Assistant Director), Kun-Fang Lee (Analyst-in-Charge), Carl Barden, Lilia Chaidez, Giselle Cubillos-Moraga, Joshua Garties, Toni Gillich, Shamiah Kerney, Jill Lacey, Patricia Moye, Aku Shika Pappoe, Jennifer Schwartz, Jena Y. Sinkfield, Tyler Spunaugle, Verginie Tarpinian, and Deme Yoo made key contributions to this report.", "summary": "The World Bank and others have reported that some money transmitters have been losing access to banking services. Money transmitters play an important role in the financial system, in part because they provide financial services to people less likely to use traditional banking services. GAO was asked to review the causes and potential effects of derisking by banks. This report examines, among other issues, (1) the extent to which banks are terminating or limiting services for money transmitters, (2) challenges in assessing banks' BSA/AML compliance related to money transmitters, and (3) regulators' actions to address derisking concerns. GAO reviewed bank examination reports and documents, held eight discussion groups with federal bank examiners, surveyed a nationally representative sample of 406 banks (excluding credit unions), and interviewed federal and bank officials, money transmitters, industry associations, and other stakeholders. From 2014 through 2016, 40 of 86 banks with money transmitter customers that responded to GAO's survey indicated they terminated at least one money transmitter account for money-laundering-related reasons. Money transmitters transfer money for their customers to recipients domestically or internationally. Common reasons given for terminating accounts included the customer not providing information needed to satisfy the banks' due diligence requirements under Bank Secrecy Act (BSA)/anti-money laundering (AML) regulations and that the cost of BSA/AML compliance made these customers unprofitable. However, banks also cited concerns that these customers drew heightened regulatory oversight; this may indicate “derisking,” the practice of banks limiting services or closing accounts with customers to avoid any perceived regulatory concerns about facilitating money laundering. Federal bank examiners in some of GAO's discussion groups identified challenges in assessing banks' compliance with due diligence requirements. In 2005, the Department of the Treasury's (Treasury) Financial Crimes Enforcement Network (FinCEN) and the federal banking regulators issued interagency interpretive guidance to clarify BSA/AML requirements and supervisory expectations for banks providing banking services to money transmitters. The guidance was incorporated in the Federal Financial Institutions Examination Council BSA/AML examination manual. However, examiners from some discussion groups said it was unclear how much due diligence is reasonable to expect banks to conduct for their money transmitter customers. For example, while the manual's examination guidance pertaining to money transmitters states that due diligence on higher-risk accounts can include reviewing the money transmitter's BSA/AML compliance program or conducting on-site visits, the related examination procedures do not clarify what these reviews or visits might entail. Unless federal banking regulators take steps to improve examiners' ability to evaluate banks' compliance with BSA/AML requirements as applied to money transmitter accounts, examiners may not be fully achieving examination objectives. In response to derisking concerns associated with money transmitters, FinCEN and the federal banking regulators have issued general guidance that discourages banks from terminating accounts with any particular customer type without evaluating individual customers' risks. In prior work, GAO noted that regulators had not fully evaluated how banks' regulatory concerns may be influencing decisions to derisk. GAO recommended that FinCEN and the federal banking regulators conduct a retrospective review of BSA regulations and their implementation, with a focus on how banks' regulatory concerns may affect their decisions to provide services. According to federal banking regulators and FinCEN, they and Treasury established an interagency working group in early 2018 that they believe will address the recommendation. The working group has taken important steps toward improving the efficiency and effectiveness of BSA/AML supervision, including issuing an interagency statement intended to improve the transparency of the risk-focused approach examiners use to plan and conduct BSA examinations. However, the working group has not yet evaluated the full range of factors that may influence banks to derisk. GAO is making a total of four recommendations to the federal banking regulators that each regulator improve examiners' ability to evaluate banks' BSA/AML compliance as applied to money transmitter accounts. The federal banking regulators agreed with GAO's recommendations. GAO also reiterates its recommendation in GAO-18-263 that FinCEN and the federal banking regulators conduct a retrospective review of BSA regulations and implementation.", "document_type": "gao"}
{"report": "Created as part of the Employee Retirement Income Security Act of 1974, as amended (ERISA), traditional IRAs provide tax advantages to help individuals—including small business owners, independent contractors, and other workers not covered by employer-sponsored retirement plans— save for retirement. Employees who have employer-sponsored retirement plans, such as a 401(k), can also roll over these assets into an IRA when they retire or change jobs. Since the enactment of ERISA, different types of IRAs with different features for individuals and small businesses have been created. The two IRA types with federal income tax benefits for individuals are traditional IRAs (which allow eligible individuals to make tax-deductible contributions and accumulate tax-deferred investment earnings) and Roth IRAs (which allow eligible individuals to make after-tax contributions and accumulate investment earnings tax free). IRA owners are able to invest their IRA savings in a wide variety of asset types. IRA owners generally make tax-favored contributions to their accounts to purchase assets from investment options offered through banks or other IRS-qualified firms acting as custodians of the IRA assets. Most IRA custodians limit holdings in IRA accounts to firm- approved stocks, bonds, mutual funds, and CDs. Some custodians offer so-called “self-directed IRAs” that allow investments in a broader set of unconventional assets—such as real estate, certain precious metals, private equity, and virtual currency—than is permitted by most IRA custodians. As we previously reported, custodial agreements for these accounts often require IRA account owners to be responsible for directing their investments, and to oversee the selection, management, monitoring, and retention of all investments in the account. The account owners bear the consequences of any mistakes made in managing their accounts, such as being noncompliant with IRA rules. Through our prior work, we identified the following four areas where complex rules are likely to apply to IRA owners investing in unconventional assets: Barred investments. Investments in life insurance contracts and collectibles, such as artwork and antiques, are prohibited. Although precious metals are generally prohibited collectibles, certain types of coins and bullion are permitted provided that they meet specific purity and custody requirements. Prohibited transactions. IRA owners are not permitted to engage in prohibited transactions that personally benefit the owner or other disqualified persons in a way other than as a vehicle to save for retirement. Examples of such prohibited transactions include IRA owners selling their own property to an IRA, or taking a salary from an IRA-funded business. IRA owners who believe that an otherwise prohibited transaction should be permitted, may apply to the Department of Labor (DOL) to request an exemption for a specific transaction. Unrelated business income. Earnings and profits made in tax- deferred savings vehicles like IRAs generally are reinvested in the account without generating current federal tax liability, but investments in certain unconventional assets can generate ongoing tax liability for IRA owners. Any IRA that earns $1,000 or more of gross income from an unrelated business must file Form 990-T Exempt Organization Business Income Tax Return with IRS and pay related taxes. Fair market value (FMV). When IRA owners invest in less conventional and nonpublicly traded assets, custodians may find it challenging to properly report the FMV of those assets. Starting with tax year 2015, IRS began requiring IRA custodians to report selected information on unconventional assets in their clients’ accounts. For some hard-to-value unconventional assets, IRA owners may need to supply custodians with independent appraisals or other evidence to substantiate an asset’s current FMV. Failure to abide by the rules governing IRAs with unconventional assets can have significant consequences for IRA owners. For example, if an IRA owner engages in a prohibited transaction that has not been exempted by DOL, the IRA will lose its tax-favored status, and the account is treated as distributing all of its assets to the owner at the FMV on the first day of the year in which the prohibited transaction occurred. Noncompliance with IRA rules—if not detected—can also lead to millions of dollars in uncollected tax revenue for the government. Individuals who invest in certain unconventional assets using Roth IRAs can avoid taxation on investment gains. For example, founders of companies (or key initial investors) who use IRAs to invest in nonpublicly traded shares of their newly formed companies can realize many millions of dollars in tax-favored gains on their investment if the company is successful. IRS is responsible for enforcing IRA tax laws, including rules that apply when IRA owners invest in unconventional assets. Within IRS, four business operating divisions have responsibilities for enforcing compliance with IRA rules. Table 1 provides an overview of each division’s IRA enforcement activities. Third-party reporting by IRA custodians provides information that taxpayers can use in preparing their tax returns and that IRS can use to identify noncompliant taxpayers and help close the tax gap. In 2015, IRS began requiring custodians to report new information to help identify IRAs with hard-to-value unconventional assets. IRS Form 5498 IRA Contribution Information has a new box 15a for custodians to report the portion of the IRA FMV attributable to nonmarket assets as well as a box 15b with codes describing the type of nonmarket assets. Custodians are to report similar information on IRS Form 1099-R identifying distributions of IRA assets that do not have a readily available FMV. The first article in the Taxpayer Bill of Rights is the right to be informed which means that taxpayers have the right to know what they need to do to comply with tax laws. IRS’s Publication 1, Your Rights as a Taxpayer, further states that taxpayers are entitled to clear explanations of the laws and IRS procedures in all forms, instructions, publications, notices, and correspondence. To help taxpayers and their advisors better understand tax rules, such as those governing IRAs with unconventional assets, IRS produces several types of resources. Taxpayers (or their advisers and paid tax preparers) with complicated returns or transactions may require detailed and technical resources, such as guidance published in a weekly IRS publication called the Internal Revenue Bulletin (IRB). Tax regulations— issued by the Department of the Treasury (Treasury)—are published in the IRB together with technical IRS guidance such as revenue rulings and revenue procedures. IRS has stated that only guidance published in the IRB contains IRS’s authoritative interpretation of the law. IRS also produces resources that are less technical and intended to be more easily understood by most taxpayers. IRS issues hundreds of publications on a variety of tax topics, and many are updated annually. IRS also produces a variety of information on its website (IRS.gov) such as online tools, instructions, and FAQs. IRS’s Publication 590-A, Contributions to Individual Retirement Arrangements (IRAs), and Publication 590-B, Distributions from Individual Retirement Arrangements (IRAs), serve as a general IRA handbook for IRA owners and a logical starting point for all IRA owners with tax questions, including those with unconventional assets. At more than 120 pages combined, Publications 590-A and 590-B comprise one of IRS’s longest publications on retirement related topics. Publications 590-A and 590-B provide some limited information on the four compliance topics that we identified through prior work as likely to affect IRA owners with unconventional assets. However, the two-part publication lacks additional information that IRA owners with unconventional assets need to comply. Publications 590-A and 590-B recommend that taxpayers research IRS’s website (IRS.gov) for additional information. We found some additional information on IRS’s website about three of the four compliance topics. This information was typically in the form of FAQs in a section of IRS’s website about retirement plans (https://www.irs.gov/retirement-plans). Table 2 summarizes: what information for IRA owners with unconventional assets can be found in Publications 590-A and 590-B; what other IRS sources provide relevant information; and what information was not readily available on the IRS website for the four compliance areas likely to affect IRA owners with unconventional assets. Appendix II describes in more detail the information available and the information lacking in Publications 590-A and 590-B and other IRS sources. Given the complexity of the four compliance topics we identified as well as the relatively few numbers of taxpayers affected and the already large publication size, it may not be feasible to provide complete information on these topics within Publications 590-A and 590-B. IRS publications (like 590-A and 590-B) are intended to explain the law in plain language for taxpayers and their advisors. They generally summarize and translate into layperson’s terms more complex and technical information from authoritative sources like the Internal Revenue Code and more authoritative guidance like tax regulations, revenue procedures, and revenue rulings. IRS analysis indicates that perhaps only about 2 percent of IRAs have invested in hard-to-value unconventional assets. However, even small numbers of taxpayers with particular circumstances have the right to know what they need to do to comply with tax laws. IRA owners with unconventional assets who turn to Publications 590-A and 590-B are unlikely to fully understand how certain IRA investment decisions can increase their risks for noncompliance. Misunderstanding the rules governing IRAs could result in increased tax liability for taxpayers making unintentional errors and jeopardize their retirement savings. Given the serious consequences that could result for a taxpayer found to be noncompliant, IRS’s current publications are not clearly providing information for IRA owners with unconventional assets. Adding information to Publications 590-A and 590-B would be one solution that IRS could explore, but we recognize that it may not be practical for IRS to add substantially more information to Publications 590-A and 590-B for a relatively small percentage of IRA owners. Alternatives to adding more pages to Publications 590-A and 590-B could include directing readers with questions about rules affecting unconventional IRA assets to other IRS resources, such as IRS web pages or tax regulations that contain more technical and specialized information. As shown in table 2 above, we found some additional information on IRS web pages that would be helpful to IRA owners with unconventional assets. Adding language in Publication 590-A or 590-B directing taxpayers to specific web page URL addresses for additional information could help taxpayers more easily locate this information. For more technical or specialized information, IRS could direct readers of Publications 590-A and 590-B to the relevant sections of the Internal Revenue Code and related tax regulations. This additional information could help IRA owners better understand and navigate the potential compliance challenges associated with certain types of unconventional assets. In October 2017, the Deputy Commissioner for Service and Enforcement commissioned a cross-divisional team comprised of representatives from all four IRS operating divisions to identify, assess, and mitigate risks of IRA noncompliance. In its February 2018 interim presentation, the IRS cross-divisional team categorized potential noncompliance risks over an IRA life cycle into two mitigation strategies, which are summarized below. 1. Noncompliance risks for most contribution and distribution IRA rules can be mitigated systemically through automated enforcement. For example, IRS can detect excess IRA contribution deductions and unreported IRA distributions by matching information from taxpayer returns with information reported by custodians. For the large population of IRA owners investing in conventional assets held by custodians, IRS relies on automated enforcement. 2. Noncompliance risks associated with the small population of IRAs with hard-to-value unconventional assets or under direct control of the IRA owner are generally mitigated through case-by-case audits. For example, noncompliance with the complex rules governing prohibited transactions and unrelated business income is generally not reflected on individual tax returns. Some custodians rely on IRA owners to provide asset value information and may not have complete and accurate data to report to IRS. Undervaluing IRA assets hampers automated enforcement, for example, to detect excess contributions and taxable distributions. Noncompliance involving IRAs with unconventional assets is generally detected through labor-intensive audits of individual taxpayers. IRS’s SB/SE division uses field audits to pursue complex individual tax return cases, including those that could involve IRAs with unconventional assets. In February 2018, an IRS cross-divisional team that studied the risks of IRA noncompliance reported that, from fiscal years 2012 to 2016, IRS audited about 26,000 tax returns with IRA issues. IRS officials provided us examples of SB/SE job aides and training materials designed to help examiners recognize different types of noncompliance associated with IRAs invested in unconventional assets. For example, the job aides provide instructions on prohibited transactions, barred collectibles, and FMV issues involving IRAs. When interviewing taxpayers, examiners are instructed to ask a series of questions covering subjects such as: what kind of advice the taxpayer received from promoters or custodians of self-directed IRAs, whether the taxpayer had direct involvement in purchasing unconventional assets through a control feature known as “checkbook access,” whether the taxpayer has a limited liability company (LLC) tied to the how the taxpayer determined the FMV of unconventional assets. IRS officials told us that enforcing rules associated with IRAs investing in unconventional assets can be particularly challenging for investments involving LLCs or special partnership arrangements. An IRA owner may establish an LLC that is owned by the IRA. Once the LLC is set up, a business checking account is linked to the IRA funds and the account owner is named the manager of the LLC with control over the checkbook. This allows IRA owners to purchase assets directly from investment sponsors without having to wait for custodians to execute a purchase or sale. The LLC may be used to invest in businesses that could generate unrelated business income. According to IRS officials, prohibited transactions may also be more likely to occur when custodians allow “checkbook” access to IRAs, in part because the marketing of this IRA structure is appealing to individuals who want less oversight of their IRA transactions and are more likely to intentionally engage in self-dealing transactions. IRS examination officials told us that the 3-year statute of limitations for assessing taxes owed remains an obstacle in pursuing noncompliance that may span the many years of an IRA investment. For example, abuses involving prohibited transactions frequently are not reflected on any filed tax return and may be difficult to detect within the general 3-year statute of limitations period. IRS agreed with our October 2014 recommendation for the Commissioner to work in consultation with the Department of the Treasury (Treasury) on a legislative proposal to expand the statute of limitations on IRA noncompliance. IRS said Treasury is aware of IRS’ support for changing the limitation period for IRA noncompliance. Treasury reviews and presents the administration’s tax proposals and has not released a legislative proposal as of October 2019. With electronically compiled data for tax year 2016 filed in 2017, IRS was positioned for the first time to quantify the number of IRAs with specified types of hard-to-value assets. IRS officials said that even with the new custodian reporting, the broad IRA asset type data alone may be inadequate for improving audit selection criteria and identifying potentially abusive IRAs in a timely manner. In February 2018, using the newly available data, an IRS cross-divisional team identified that about 2 million IRAs included one or more types of hard-to-value assets for tax year 2016. However, custodians reported an FMV dollar amount for hard-to- value assets for only 1.6 million of those IRAs, as shown in table 3. The combined FMV was approximately $137 billion. As shown in table 3, about 400,000 (about 20 percent) of the Form 5498s reporting that the IRA held investments in one or more of the specified unconventional categories were missing the 2016 FMV dollar amount for those assets. The cross-divisional team identified that undervaluation risk affects custodian reporting. IRS officials said that the team did not review the custodian reporting patterns as part of its initial analysis of the 2016 Form 5498 data. Forthcoming tax regulations on IRAs may help to improve custodian reporting of FMVs on Form 5498. IRS officials told us that the new IRA regulations would address FMV for certain categories of hard-to-value unconventional assets. IRS officials also told us that it would be premature to publish new guidance for IRA owners and custodians on the FMV of unconventional assets until the new regulations are issued. The tax year 2016 Form 5498 information indicated about 141,000 IRAs invested in LLCs—an asset type which IRS has determined presents greater noncompliance risk. Prior to the newly available asset type data, SB/SE conducted an interim Compliance Initiative Project (CIP) using external state government information to identify businesses, including LLCs and partnerships, owned by IRAs as a way to select IRA owners for audit. Completed in October 2019, the interim compliance research revealed that audits detecting prohibited transactions can result in substantial tax adjustments. In September 2018, SB/SE approved a new CIP using the asset type data from Form 5498s for tax year 2017 to select a sample of traditional and Roth IRAs that had an ownership in an LLC or real estate. The latest compliance research field work began in February 2019 and is to be completed in January 2021. IRS officials told us they plan to use this research in combination with the interim research results to improve criteria for selecting tax returns with IRAs at greater risk of noncompliance for audit. To detect abusive transactions, IRS can require taxpayers to self-report certain transactions that have been used by other taxpayers to avoid taxes. Transactions become “reportable” (meaning a taxpayer must report it to IRS) when IRS designates them as a “listed transaction” or “transactions of interest.” Listed Transaction. A listed transaction is reportable when it is the same or substantially similar to one of the types of transactions that IRS has determined to be an avoidance transaction. In 2004, IRS determined that Roth IRA “stuffing” is an abusive tax avoidance transaction that taxpayers must report to IRS as a listed transaction. “Stuffing” involves shifting value through transactions that disguise Roth IRA contributions exceeding annual IRA limits, such as selling receivables at less than FMV to a Roth IRA, or other transactions between a closely-held business in which the Roth IRA invests and another closely-held business of the Roth IRA owner. Transaction of Interest. A transaction of interest is one that IRS and Treasury believe to have the potential for tax avoidance or evasion, but which lacks enough information for IRS and Treasury to determine whether the transaction should be identified as a tax avoidance transaction. As of December 2019, IRS has not identified or classified any IRA asset types or investment transactions as reportable transactions of interest. Taxpayers are required to disclose all types of reportable transactions on Form 8886, Reportable Transaction Disclosure Statement. Similarly, advisers helping taxpayers conduct reportable transactions are required to file Form 8918, Material Advisor Disclosure Statement. Results from the ongoing IRS compliance research may yield insights about existing and emerging abusive schemes involving IRAs. This information could be useful for evaluating the feasibility of requiring greater disclosure by IRA owners and their custodians and advisors. For example, IRS could consider requiring reporting of known abusive IRA arrangements and prohibited transactions as listed transactions. Also, IRS could explore disclosure of high-risk IRA asset types susceptible to gross valuation misstatements, such as LLCs, as transactions of interest. We recently found that IRS’s Research, Analysis and Statistics office had developed the capability to analyze the narrative fields of tax forms. Additional disclosure of potentially abusive IRA transactions coupled with greater use of tax form’s narrative fields may help IRS to select IRA owner tax returns for more detailed review. The cases identified by such detailed review would help IRS better allocate limited audit resources. Responsibility for addressing IRA noncompliance detected through case- by-case audits is fragmented among multiple IRS organizational units. This fragmentation creates challenges for IRS examiners from different units that may need to share expertise and collaborate on enforcement of complex rules applicable to IRAs that invest in unconventional assets. In February 2018, the IRS cross-divisional team concluded that no one IRS operating division alone can effectively identify and penalize IRA noncompliance regarding unrelated business income and undervaluation of unconventional assets. Unrelated business income. SB/SE and TE/GE officials told us that detecting unrelated business income unreported by an IRA can also require the involvement of multiple IRS divisions. IRS responsibility and expertise in detecting noncompliance with the rules for unrelated business income resides in IRS’s TE/GE division. TE/GE is responsible for enforcing the unrelated business income taxation rules across tax-exempt organizations. Its Exempt Organizations group audits Form 990-T filed by tax- exempt charities and its examiners are required to check if tax exempt charities have reported unrelated business income. Examiners in TE/GE’s Employee Plans group have been trained on how to determine if a tax-exempt employee retirement plan has engaged in activities that constitute unrelated trade or business. SB/SE has primary responsibility for auditing individuals owning IRAs, and its examiners are to verify that all returns within the taxpayer’s sphere of influence are filed. IRS officials told us that when SB/SE examiners discover potential unrelated business income issues when reviewing an individual taxpayer’s IRAs, those examiners can seek assistance from TE/GE examiners via an internal Specialist Referral System used to refer cases to other divisions. Although IRS officials described to us how SB/SE examiners, at their own initiative, can seek out expertise on unrelated business income, the topic is not addressed in SB/SE examiner training materials and job aids on auditing IRAs with unconventional assets. SB/SE officials provided us training slides used to teach examiners how to recognize excess contributions, prohibited transactions, barred collectibles, and valuation issues involving IRAs. While the slides instruct examiners to contact a Senior Program Analyst or Counsel for assistance with complicated issues or cases, there is no information educating SB/SE examiners about unrelated business income or informing examiners that specialized knowledge about this topic resides in the TE/GE division. Without resources, such as training materials or job aides, that provide such information, SB/SE examiners carrying out the ongoing compliance initiative project are not positioned to surface unrelated business income tax issues for referral to TE/GE. Given that IRS plans to use those research results to refine its audit selection criteria, IRS is missing an opportunity to learn more about IRA noncompliance with unrelated business income taxation. Undervaluation of unconventional assets. In February 2018, the cross-divisional IRA team cited undervaluation of unconventional assets as another compliance risk that involves the expertise and enforcement responses from multiple IRS units. If SB/SE examiners determine in auditing an IRA owner that the IRA custodian had inaccurately reported IRA asset values, other IRS divisions can take action against the custodian. LB&I can penalize a large financial institution custodian, although the cross-divisional IRA team reported the $50 penalty for filing an incorrect Form 5498 poses little deterrent effect. For the approximately 75 non-bank IRA trustees approved by IRS, TE/GE can revoke a non-bank’s trustee status for violating any fiduciary, accounting, or financial requirements. The cross-divisional IRA team explored an approach for joint examination to more effectively identify and penalize noncompliance associated with prohibited transactions, unreported unrelated business income, and undervaluation of IRA assets. Based on knowledge from prior examinations, the team identified a small subset of non-bank trustees publicly marketing alternative investments that held IRAs more than $5 million in reported FMV as of tax year 2016. As of February 2018, the team reported that it had been premature for the separate divisions to commit examination resources. As of October 2019, IRS officials said they plan to reconvene the cross-divisional IRA team after the ongoing SB/SE compliance initiative project is complete in 2021. IRS officials said the plan is for the team to use the compliance research results to refine audit selection. Also, the team could continue work on establishing a joint examination approach for IRA noncompliance associated with hard-to-value unconventional assets. IRA owners that invest in unconventional assets—such as real estate, certain precious metals, virtual currency, or private equity—assume greater responsibility for navigating complex rules that govern tax-favored retirement investments. To understand these rules, taxpayers are likely to consult IRS Publications 590-A and 590-B. While this two-part publication provides some information on compliance issues likely to affect IRA owners with unconventional assets, the information in the publication as well as on IRS web pages is limited. By assessing options for making such information clearer, IRS could better inform taxpayers and help them comply. This is particularly important because misunderstanding the rules governing IRAs can result in increased tax liability for these taxpayers and jeopardize their retirement savings. Noncompliance associated with nonpublicly traded IRA assets has been difficult for IRS to detect and time consuming to pursue. In contrast to automated enforcement for IRAs with conventional investments, noncompliance involving IRAs with unconventional assets is generally detected on a case-by-case basis through labor-intensive audits of individual taxpayers. In recent years, IRS has begun collect information from IRA custodians that IRS can use to quantify the dollar amounts of specified types of hard-to-value assets held by IRAs. However, the broad IRA asset type data alone may not be sufficient for audit selection and identifying potentially abusive IRAs in a timely manner. When IRS lacks sufficient data to detect abusive transactions, IRS can require taxpayers to self-report certain transactions that have been used by other taxpayers to avoid taxes. Additional disclosure of certain IRA transactions coupled with mining the narrative fields of tax forms could help IRS to efficiently identify potentially abusive IRA activity and better allocate limited audit resources. Fragmented responsibility among IRS operating divisions creates additional challenges for IRA enforcement. The division responsible for tax-exempt entities trains its examiners on how to determine if an employee retirement plan has unrelated business activities subject to taxation. Yet, examiners in the division that audits complex individual tax returns, including those involving IRAs, do not receive similar training. Training for those examiners on unrelated business income tax issues, and how examiners can refer those cases to other divisions for assistance, could help improve collaboration on IRA enforcement. We are making the following three recommendations to IRS: The Commissioner of Internal Revenue should assess options for updating Publications 590-A and 590-B to either include more information or direct taxpayers to other resources for IRA owners with investments in unconventional assets. Such information could include: storage requirements for IRA investments in certain precious metals; valuation methods for hard-to-value IRA assets; the Department of Labor’s process for granting exemptions to IRA prohibited transactions rules; and IRA investments with the potential to create unrelated business income tax liabilities. (Recommendation 1) The Commissioner of Internal Revenue, building on forthcoming compliance research using new IRA asset data, should evaluate the feasibility of requiring disclosure for high-risk IRA asset types associated with abusive schemes as transactions of interest. (Recommendation 2) The Commissioner of Internal Revenue should develop resources (such as training materials or job aids) for Small Business/Self-Employed examiners conducting IRA owner audits that explain how IRAs with unconventional assets can generate unrelated business income tax liability, and how examiners can refer cases to unrelated business income experts in IRS for assistance. (Recommendation 3) We provided a draft of this report to the Treasury and IRS for review and comment. In its comments, reproduced in appendix III, IRS generally agreed with our recommendations. For recommendation 1, IRS said it will review its educational publications and web pages for appropriate updates within the scope of the tax code. For recommendation 2, IRS said that it will determine whether there are abusive schemes associated with certain IRA asset types, and if the data indicate such a correlation, it will evaluate the feasibility of requiring disclosure of such arrangements as transactions of interest. For recommendation 3, IRS said it will review and update resources for examiners conducting IRA owner audits, including guidance on how to address unrelated business income tax (UBIT). It will incorporate guidance for agents on how to refer such cases to UBIT experts when assistance is needed. IRS also said that it will renew its efforts at ensuring collaboration with relevant subject matter experts. IRS in consultation with Treasury also provided technical comments which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of the Treasury, the Commissioner of Internal Revenue, the Secretary of Labor, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact James R. McTigue, Jr. at (202) 512-9110 or Charles A. Jeszeck at (202) 512-7215. You may also reach us by email at jeszeckc@gao.gov or mctiguej@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff making key contributions to this report are listed in appendix IV. This appendix describes: what information for individual retirement account (IRA) owners with unconventional assets can be found in Publications 590-A and 590-B, what other Internal Revenue Service (IRS) sources provide relevant information, and what information was not readily available on the IRS website for the four compliance areas we identified through prior work as likely to affect IRA owners with unconventional assets. The information below does not include the Internal Revenue Code or detailed and technical resources published in the weekly Internal Revenue Bulletin, such as tax regulations, revenue rulings, and revenue procedures. Publications 590-A and 590-B explain what types of IRA investments are barred, such as collectibles, but the publication does not have additional information that could be useful to IRA owners with allowable investments in coins and bullion. The publications define collectibles as including artworks, rugs, antiques, metals, gems, stamps, coins, alcoholic beverages, and certain other tangible personal property. The publications explain that if a traditional IRA invests in collectibles, the amount invested is considered distributed, and that the IRA owner could be subject to an additional tax on early distributions. Publications 590-A and 590-B further explain that an exception exists for IRA investments in certain types of coins and bullion. However, the two-part publication does not indicate that certain types of bullion must be stored by a bank or an IRS-approved non-bank trustee. The two-part publication also does not mention that IRA investments in life insurance contracts are not permitted. Two IRS web pages listing frequently asked questions (FAQs) about retirement plans contain additional information about bullion storage requirements and IRA investments in life insurance contracts. Both web pages state that investing IRA funds in life insurance contracts and collectibles are prohibited, and they also note the exception for certain precious metals. One of the web pages further explains that allowable bullion must be stored with a bank or an IRS-approved non-bank trustee. Publications 590-A and 590-B define prohibited transactions in general terms, list examples, and explain the consequences of engaging in a prohibited transaction. The two-part publication also cautions that the risk of engaging in a prohibited transaction in connection with an IRA account may be increased when an IRA owner invests in nonpublicly traded assets or assets that an IRA owner directly controls. However, the publication does not provide any information about applying for an exception to the prohibited transaction rules. We found some limited information about exemptions to the prohibited transaction rules on an IRS web page entitled “Retirement Plan Investments FAQs.” The web page explains that the Department of Labor (DOL) has granted class exemptions for certain types of investments under specific conditions, and that a plan sponsor may apply to DOL to obtain an administrative exemption for a particular proposed transaction that would otherwise be prohibited. However, the web page does not provide any links to DOL information such as a DOL publication that explains the prohibited transactions exemption process. In February 2018, IRS updated Publications 590-A and 590-B to include information about IRAs with unrelated business income. Publications 590- A and 590-B now explain that an IRA is subject to tax on unrelated business income if the IRA carries on an unrelated trade or business. Publications 590-A and 590-B state that the IRA trustee is required to file a Form 990-T if an IRA has $1,000 or more of unrelated trade or business gross income. For more information, Publications 590-A and 590-B direct taxpayers to consult Publication 598, Tax on Unrelated Business Income of Exempt Organizations. Publication 598 lists IRAs as one of many exempt entities subject to taxes on unrelated business income, and the requirement to file Form 990-T for gross income of $1,000 or more. Publication 598 describes dozens of activities by tax-exempt organizations that would be considered an unrelated business; but the publication does not include any examples specific to IRA investments that could also be considered unrelated business activities and subject to taxes. Our search did not find additional information on IRS.gov relating to IRAs and unrelated business income taxes. Publications 590-A and 590-B do not provide guidance about how to accurately determine the FMV of hard-to-value unconventional assets. IRS requires custodians to report (on Form 5498) an IRA’s FMV at year’s end as well as some additional information for IRAs with unconventional assets. The instructions for completing Form 5498 explain that IRA custodians are responsible for ensuring that “all IRA assets (including those not traded on established markets or not having a readily determinable market value) are valued annually at their FMV.” However, neither the form’s instructions nor Publications 590-A and 590-B provide guidance or tips on how to determine the FMV of non-publicly traded or other hard-to-value assets. As we previously reported, some unconventional assets may require a third-party appraisal to determine their FMV. One IRS web page titled, “Valuation of Plan Assets at Fair Market Value,” provides some additional FMV information but it is intended more for the valuing assets in employer-provided retirement benefits like traditional pensions and 401(k) plans. The web page states that an accurate assessment of the FMV of retirement plan assets is essential for complying with Internal Revenue Code requirements and avoiding prohibited transactions. The web page also states that for defined contribution plans like a 401(k) plan, investments must be valued at least once per year in accordance with a consistent and uniform method. For traditional pensions (defined benefit plans), tax regulations define FMV for purposes of valuing plan assets as “the price at which the property would change hands between a willing buyer and a willing seller, neither being under any compulsion to buy or sell and both having reasonable knowledge of relevant facts.” The Department of the Treasury (Treasury) plans to issue regulations on IRAs. IRS officials told us that these new regulations would address FMV for certain categories of hard-to-value unconventional assets. IRS officials also told us that it would be premature to publish new guidance for IRA owners and custodians on the FMV of unconventional assets until the new regulations are issued. In their October 2019 update of planned guidance projects, Treasury’s Office of Tax Policy and IRS listed planned IRA regulations. In addition to the contacts named above, MaryLynn Sergent and David Lehrer (Assistant Directors), Ted Burik, Susan Chin, Steven Flint, Emily Gruenwald, Mark Kehoe, Jungjin Park, and David Reed made key contributions to this report. James Bennett, Amy Bowser, Jacqueline Chapin, Edward J. Nannenhorn, Andrew J. Stephens, Walter Vance, and Adam Wendel also provided support.", "summary": "Unconventional IRA investments—such as real estate, certain precious metals, private equity, and virtual currency—can introduce risks to account owners who assume greater responsibility for navigating the complex rules that govern tax-favored retirement savings. IRS enforces tax rules relating to IRAs and can assess additional taxes. GAO was asked to examine the challenges associated with enforcing rules governing IRAs invested in unconventional assets. This report examines (1) the extent to which IRS offers guidance to help taxpayers understand the rules governing unconventional IRA assets; and (2) the challenges IRS faces in enforcing those rules. GAO identified and analyzed IRS information to help taxpayers understand four compliance areas. GAO reviewed IRS analysis of nonmarket IRA assets reported by IRA custodians, and IRS audit procedures and training materials; and interviewed relevant IRS officials to identify enforcement challenges. The Internal Revenue Service's (IRS) Publications 590-A and 590-B serve as a general handbook for millions of taxpayers with individual retirement accounts (IRA). However, the two-part publication provides limited information for IRA owners with unconventional assets surrounding complex tax rules in four compliance areas: (1) barred investments, (2) prohibited transactions, (3) unrelated business income, and (4) fair market value. GAO found other limited information about these topics on IRS's website. With only about 2 percent of IRAs invested in unconventional assets, adding more pages to Publications 590-A and 590-B may not be practical. By assessing options for informing IRA owners investing in unconventional assets, such as directing them to web pages with specialized information and technical regulations, IRS could better help them comply. Noncompliance involving unconventional IRA assets is difficult to detect and time consuming for IRS to pursue. Whereas IRS relies on automated enforcement for IRAs invested in conventional assets held by custodians and trustees, enforcement for IRAs invested in unconventional assets or under IRA owner control requires labor-intensive audits of individual taxpayers. Using newly compiled information, IRS identified about 2 million IRAs that held certain types of hard-to-value assets as of 2016; however, about 20 percent of the forms were missing fair market value amounts for these assets (see fig.). IRS officials said this type of reporting alone may be inadequate for audit selection and identifying potentially abusive IRAs. When IRS lacks sufficient data to detect abusive transactions, IRS can require taxpayers to self-report certain transactions that have been used by other taxpayers to avoid taxes. Additional taxpayer or custodian disclosure of potentially abusive IRA transactions coupled with IRS analysis of reported details may help IRS to select IRA owner tax returns to audit. Fragmented responsibility among IRS divisions creates challenges for examiners who need to share expertise and collaborate on IRA enforcement. The division responsible for tax-exempt entities trains its examiners on how to determine if an employee retirement plan has engaged in business activities subject to taxation. However, examiners in the division that audits complex individual tax returns, including those involving IRAs, do not receive such training. Training for those examiners could help improve collaboration on IRA enforcement. GAO is recommending that IRS (1) assess options for updating its IRA publications to provide more information for taxpayers with unconventional assets, (2) evaluate the feasibility of requiring disclosure for high-risk IRA asset types associated with abusive tax schemes, and (3) develop auditor resources (such as training materials or job aids) that explain how IRAs with unconventional assets can generate unrelated business income tax. IRS generally agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The Medicaid Drug Rebate Program was established through the Omnibus Budget Reconciliation Act of 1990 and requires drug manufacturers to pay rebates to states on outpatient drugs as a condition of having their drugs covered by Medicaid. The 340B Program, named for the statutory provision authorizing it in the Public Health Service Act, was created in 1992 following the enactment of the Medicaid Drug Rebate Program and allows covered entities to purchase outpatient drugs at discounted prices. HRSA and CMS both have roles in overseeing compliance with the prohibition on duplicate discounts. The Medicaid Drug Rebate Program helps to offset the federal and state costs of most outpatient prescription drugs dispensed to Medicaid beneficiaries. Under the rebate program, drug manufacturers pay rebates to states as a condition for the federal contribution to Medicaid spending for the manufacturers’ outpatient drugs. State Medicaid programs generally must cover all of the drugs of manufacturers that participate in the rebate program. Originally, rebates were available only for drugs paid for by the state on a FFS basis, but the Patient Protection and Affordable Care Act extended the program to outpatient drugs paid for under Medicaid managed care; there are more Medicaid enrollees, prescriptions, and spending for drugs under managed care than FFS. The rebates received for both FFS and managed care are shared by the federal government and states. The amount of Medicaid rebates for a drug is based on a statutory formula. Using that formula CMS calculates a unit rebate amount for each drug and provides that amount to states so they can determine the amount of rebates to request. Every quarter, each state multiplies the number of units of each drug it either paid for on a FFS basis or provided through its managed care plans by the CMS-provided unit rebate amount. For drugs provided under FFS, the state calculates the number of units based on drug claims it reimbursed, while states use drug utilization data provided by managed care plans to determine the number of units of each drug that were provided by the plans to Medicaid beneficiaries. Each state then sends rebate requests to each manufacturer reflecting the total quarterly amount of rebates owed for each of the manufacturer’s drugs. States are to exclude claims for 340B drugs from their rebate requests. Participation in the 340B Program is voluntary for both covered entities and drug manufacturers, but there are strong incentives for both to do so. Covered entities can realize substantial savings through the program’s price discounts. In addition, covered entities can generate revenue to the extent that they can purchase 340B drugs for eligible patients whose insurance reimbursement exceeds the price paid. Incentives for participation by drug manufacturers are strong because they must participate in the 340B Program to receive Medicaid reimbursement for their drugs. Covered entities generally become eligible for the 340B Program by qualifying as certain federal grantees or as one of six specified types of hospitals. Eligible federal grantees include federally qualified health centers, which provide comprehensive community-based primary and preventive care services to medically underserved populations, as well as certain other federal grantees, such as family planning clinics and Ryan White HIV/AIDS program grantees, among others. Eligible hospitals include critical access hospitals—small, rural hospitals with no more than 25 inpatient beds; disproportionate share hospitals—general acute care hospitals that serve a disproportionate number of low-income patients; and four other types of hospitals. To participate in the 340B Program, covered entities must register with HRSA and annually recertify their continuing eligibility. Once their eligibility is approved by HRSA, covered entities can begin purchasing drugs from manufacturers at the 340B discounted prices. Covered entities may provide drugs, including 340B drugs, to patients through one or more dispensing methods. Specifically, covered entities may dispense these drugs through pharmacies—either through in-house pharmacies they own; through the use of contract pharmacy arrangements, in which they contract with outside pharmacies and pay them to dispense drugs on their behalf; or both. In addition, providers who work at covered entities, such as doctors and nurses, may administer 340B drugs to patients directly, such as during office visits. These are known as provider-administered drugs. As a condition of participating in the 340B Program, covered entities must follow certain requirements. For example, they are prohibited from diverting a 340B drug to an individual who is not a patient of the covered entity. Covered entities are also prohibited from subjecting manufacturers to duplicate discounts. Both states and covered entities play key roles in preventing duplicate discounts and forgone rebates. States must know whether covered entities provided 340B drugs to Medicaid beneficiaries in order to exclude those drugs from the rebate requests they submit to manufacturers. When covered entities provide 340B drugs to Medicaid beneficiaries, it is known as “carving in;” if covered entities do not dispense these drugs to Medicaid beneficiaries, it is known as “carving out.” As shown in figure 1, if a state is not aware that a covered entity provided 340B drugs to Medicaid beneficiaries, it would not know to exclude those drugs from its rebate requests, which could lead to duplicate discounts. In contrast, if a state mistakenly believes the entity used 340B drugs when it did not, it might exclude those drugs from its rebate requests and would forgo eligible rebates. To help prevent duplicate discounts, in 1993, HRSA and CMS collaborated to establish the Medicaid Exclusion File (MEF) as a mechanism to assist in the identification of 340B drugs provided to Medicaid FFS beneficiaries. The MEF lists the covered entities that reported to HRSA that they choose to use or “carve in” 340B drugs for their Medicaid FFS patients. Specifically, HRSA requires that covered entities that decide to carve in these drugs for Medicaid provide the agency with the provider number or numbers that the entities use to bill the state for those drugs. The entity and the provider number or numbers it specifies are then listed on the MEF. HRSA guidance specifies that all drugs billed with the provider numbers listed on the MEF should be 340B drugs so a state that choses to use the MEF knows the drugs should be excluded from rebate requests; there is no requirement for states to use the MEF to identify 340B drugs. If a covered entity wants its contract pharmacy to dispense 340B drugs to patients covered under Medicaid FFS, HRSA guidance requires the covered entity, the contract pharmacy, and the state Medicaid program to have an arrangement to prevent duplicate discounts; any such arrangement must be reported to HRSA. When the MEF was created, Medicaid drug rebates were only required for drugs provided under FFS. As such, in a 2014 policy release, HRSA clarified that the MEF is only intended for use for Medicaid FFS, that is, only covered entities that elect to carve in 340B drugs for Medicaid FFS are required to provide the provider numbers used for billing Medicaid FFS for inclusion on the MEF. The MEF is not intended to capture whether covered entities have decided to carve in 340B drugs for Medicaid managed care and, if so, what provider numbers they use for billing for those drugs. HRSA has not created a mechanism for covered entities to use to identify 340B drugs provided to Medicaid managed care beneficiaries, but encourages covered entities to work with states to develop strategies to prevent duplicate discounts for drugs reimbursed through managed care. While HRSA requires covered entities to use the MEF, there is no similar requirement for state Medicaid programs. CMS provides states the flexibility to determine procedures for identifying and excluding 340B drugs from their Medicaid rebate requests. Under a May 2016 final rule, states’ contracts with Medicaid managed care plans that provide coverage of outpatient drugs must require the plans to provide the states with drug utilization data that is necessary for the states to claim Medicaid rebates. In addition, the contracts must require the plans to establish procedures for excluding 340B drugs from the drug utilization data provided to states for purposes of rebate collection. To oversee covered entities’ compliance with 340B Program requirements, in fiscal year 2012, HRSA implemented a systematic approach to conducting audits of a small sample of covered entities, and began conducting audits of 200 entities per year in fiscal year 2015. HRSA audits include covered entities that are randomly selected based on risk-based criteria (approximately 90 percent of all audits conducted each year), or targeted based on information from stakeholders such as drug manufacturers about potential noncompliance (10 percent of the audits conducted). HRSA’s criteria for risk-based audits include a covered entity’s volume of 340B drug purchases, number of contract pharmacies, time in the program, and complexity of its program. Among other things, HRSA’s audits include reviews of each covered entity’s policies and procedures, an assessment of the entity’s compliance with respect to 340B Program requirements, including the prevention of duplicate discounts in Medicaid FFS, and reviews of a sample of prescriptions filled during a 6-month period to identify any instances of noncompliance. Under HRSA’s audit procedures, a covered entity with audit findings is required to 1) submit a corrective action plan to HRSA that indicates it will determine the full scope of any noncompliance (beyond the sample of prescriptions reviewed during an audit) and 2) outline the steps it plans to take to correct findings of noncompliance, including any necessary repayments to manufacturers, among other things. If the HRSA audit shows that duplicate discounts may have occurred, the covered entity must, as part of its corrective action plan, contact the state Medicaid program to determine whether duplicate discounts actually occurred—namely, whether the state requested a rebate on the claims in question, and if so, contact the drug manufacturer to offer repayment. HRSA closes the audit when a covered entity submits a letter attesting that its corrective action plan, including its assessment of the full scope of noncompliance, has been implemented and any necessary repayments to manufacturers have been resolved. In addition, HRSA may re-audit a covered entity (i.e. subject it to a targeted audit) to determine whether it has implemented its corrective action plan. To oversee the Medicaid Drug Rebate Program, CMS receives copies of states’ Medicaid rebate requests each quarter. States are required to submit this data to manufacturers for FFS and managed care drugs, which should not include drugs purchased through the 340B Program, within 60 days of the end of the quarterly rebate period. Specifically, states provide drug utilization data that includes the drug name, national drug code (a unique identifier for each drug), the unit rebate amount, the number of units reimbursed, the rebate amount claimed, and the number of prescriptions, among other things. CMS has a system that reviews this information for errors, such as the inclusion of drugs from manufacturers that no longer participate in the Medicaid Drug Rebate Program, and generates a discrepancy report for the state. CMS also has a system in place to identify, for state review, cases in which the utilization data reflect a substantial increase or decrease in the number of FFS records submitted compared to prior quarters; such a review is not currently performed for managed care. In addition, CMS reviews state Medicaid programs’ contracts with managed care plans using a checklist to ensure that the contracts include elements required by statute or regulation. State Medicaid programs’ policies varied in whether they allowed covered entities to use 340B Program drugs for Medicaid beneficiaries. Most states allowed covered entities to decide whether to use, or “carve in,” 340B drugs for Medicaid beneficiaries at their in-house pharmacies and for provider-administered drugs. Fewer states allowed covered entities to dispense these drugs to Medicaid beneficiaries at contract pharmacies, particularly beneficiaries whose drugs were covered under FFS. Table 1 below summarizes states’ policies on covered entities’ use of 340B drugs for Medicaid beneficiaries for both FFS and managed care by dispensing method. In addition to varying by state, policies on the use of 340B drugs sometimes varied within a state; that is, some states had different policies depending on whether the drugs were provided to Medicaid FFS or managed care beneficiaries, the dispensing method used, or both. For example, Oregon allowed covered entities to decide whether to dispense 340B drugs at contract pharmacies to Medicaid managed care beneficiaries, but required covered entities to carve out (not use) these drugs at contract pharmacies under Medicaid FFS. Illinois required covered entities to carve in 340B provider-administered drugs and those dispensed at in-house pharmacies for Medicaid beneficiaries in both FFS and managed care, but prohibited their use for Medicaid beneficiaries at contract pharmacies. See appendix II for information on each state Medicaid program’s policies regarding covered entities’ use of 340B drugs. The states that allowed or required covered entities to carve in 340B drugs for Medicaid beneficiaries used several different procedures to identify and exclude those drugs from Medicaid rebate requests. These procedures included relying on the MEF, requiring covered entities to use a 340B claim identifier—a code on the claim that indicates that the drug used was purchased at the 340B discounted price, or using other state- developed procedures to identify and exclude 340B drugs from rebate requests. The procedures states used varied between Medicaid FFS and managed care, and among dispensing methods. For example, states were more likely to use HRSA’s MEF to identify and exclude provider- administered drugs in both Medicaid FFS and Medicaid managed care and to use a 340B claim identifier to identify and exclude drugs dispensed at in-house pharmacies. Some states used a combination of procedures or created their own state-specific procedures. For example, 11 states required that covered entities inform them of their decisions to carve in 340B drugs for Medicaid beneficiaries. The states then maintained a list of these covered entities or their providers, which they used to exclude 340B drugs from rebate requests. Oregon required covered entities to provide the state with a list of each 340B drug dispensed to a Medicaid managed care beneficiary at a contract pharmacy so that the state could exclude those drugs from its rebate requests. Vermont required covered entities, on a monthly basis, to send the state a file listing each 340B drug provided to a Medicaid beneficiary; the state used this information to exclude those drugs from rebate requests. See table 2 for a summary of the procedures used by states to identify 340B drugs provided to Medicaid beneficiaries, and appendix III for a listing of the procedures by state. State Medicaid programs’ policies related to 340B drugs were not always documented and some states’ policies may not prevent duplicate discounts. Some states had written policies for the use of 340B drugs, and procedures to identify them, for some dispensing methods, but not for others, such as states that had documented policies for in-house pharmacies but not contract pharmacies. Without written policies, covered entities in those states may not be aware of requirements for dispensing and identifying 340B drugs, increasing the risk of duplicate discounts. Specifically, we found that nine states did not have written policies or procedures on the use or identification of 340B drugs for all dispensing methods. Seven of the nine states had policies or procedures regarding the use and identification of 340B drugs that were used in practice, but these policies and procedures were not always documented. For example: Connecticut did not have documented policies on the use and identification of 340B drugs, but officials from the state reported that it allowed covered entities to provide these drugs to Medicaid beneficiaries and relied on the MEF to identify and exclude them from rebate requests. While Pennsylvania and Ohio had written policies regarding the use of 340B drugs in Medicaid FFS and for some dispensing methods under managed care, the states’ policies requiring covered entities to carve out these drugs for Medicaid managed care beneficiaries at contract pharmacies were not documented. The remaining two states did not have policies or procedures, documented or otherwise, for all dispensing methods: Officials from Washington, D.C. reported that D.C. did not have a policy regarding the use of provider-administered 340B drugs nor did it have procedures to identify and exclude those drugs from its Medicaid drug rebate requests. A Rhode Island Medicaid official told us that the state did not have written policies regarding the identification of 340B drugs dispensed to Medicaid FFS beneficiaries at in-house pharmacies, and that the state did not have procedures, written or otherwise, by which to exclude such drugs from rebate requests. Additionally, while the state had a written policy for identifying and excluding 340B drugs administered by providers at hospitals, officials told us that they had no policy or exclusion procedures for drugs administered by providers at other types of covered entities. In addition, we found that states’ policies may not prevent duplicate discounts. For example, some states used the MEF to identify and exclude 340B drugs from their rebate requests in a manner contrary to the MEF’s purpose as set forth by HRSA. As noted previously, HRSA guidance specifies that the MEF is not intended to be used to identify and exclude 340B drugs provided to Medicaid managed care beneficiaries from Medicaid drug rebate requests. Covered entities are only required to be listed on the MEF if they carve in 340B drugs for Medicaid FFS. Since the MEF may not accurately reflect covered entities’ use of 340B drugs for Medicaid managed care, states’ use of the MEF in this instance may increase the risk of duplicate discounts or forgone rebates unless states require covered entities to make the same decisions on the use of 340B drugs for FFS and managed care. For example, as shown in figure 2, a state’s use of the MEF for managed care would likely result in a duplicate discount if covered entities carve out 340B drugs for Medicaid FFS, but carve in these drugs for managed care, as those entities would not be listed on the MEF. Consequently, the state would not know to exclude drugs provided by those entities from the managed care plans’ utilization data that are used for requesting rebates. If covered entities did the opposite—carved in for FFS and carved out for Medicaid managed care—then the state would likely forgo Medicaid rebates as it would exclude drugs from its rebate request that were not purchased through the 340B Program. Seven of the 13 states that used the MEF exclusively to identify and exclude Medicaid managed care drugs from rebate requests for at least one dispensing method did not require covered entities to make the same carve-in decisions for both FFS and managed care. Additionally, while the six remaining states required covered entities to make the same decision regarding use of 340B drugs in FFS and managed care, that requirement was not always clearly explained in the states’ policies. For example, an official from Arkansas, which used the MEF for identifying and excluding 340B drugs from rebate requests, told us that covered entities are required to make the same carve-in decisions for both Medicaid FFS and managed care. However, it is unclear how covered entities would be aware of that requirement, as it was not documented in the state’s policy manuals at the time of our information request. Finally, states that rely on the MEF or state-developed lists of providers carving in 340B drugs for Medicaid beneficiaries may not be able to identify instances where covered entities are unable to purchase drugs at the 340B Program discounted price, and instead need to purchase drugs outside of the 340B Program. For example, orphan drugs are excluded from the discounted 340B Program price for some covered entities. In these situations, states that rely on the MEF or other state-developed lists of providers may be forgoing rebates. For example, if covered entities do not have a separate provider number for billing Medicaid for these non- 340B drugs, the states would be excluding both 340B and non-340B drugs from their rebate requests. State Medicaid officials in Oregon and Pennsylvania acknowledged that their states were likely forgoing rebates when covered entities listed on the MEF were unable to purchase drugs at the 340B Program price. While these state officials indicated that they did not consider the lost rebates financially significant, the loss of these rebates would also increase federal Medicaid expenditures, since rebates are shared between the state and the federal government. CMS oversight of state Medicaid programs’ efforts to prevent duplicate discounts is limited. States have the flexibility to select the procedures used for identifying and excluding 340B drugs from rebate requests. Although CMS collaborated with HRSA to establish the MEF as a tool for identifying 340B drugs in Medicaid FFS, CMS does not require states to use the MEF in their duplicate discount prevention efforts. Instead, CMS has provided states with options of procedures they could consider for identifying and excluding 340B drugs from rebate requests. For example, CMS’s February 2016 final rule on covered outpatient drugs, which detailed requirements for Medicaid reimbursement of covered outpatient drugs, included in its preamble examples of procedures that states could use to identify and exclude 340B drugs in FFS without prescribing any specific required procedure. Additionally, as noted earlier, the final rule CMS issued in May 2016 on Medicaid managed care included a provision relating to duplicate discounts for Medicaid managed care drugs. Specifically, it mandated that state Medicaid programs’ contracts with managed care plans that provide outpatient drugs require the plans to establish procedures for excluding 340B drugs from utilization data provided to states for use in seeking rebates, but did not specify what procedures plans should use. Most recently, in January 2020, CMS released a bulletin to state Medicaid programs on best practices for preventing duplicate discounts. CMS has some visibility into state Medicaid programs’ 340B-related policies and procedures through its oversight activities, but these activities are not intended to, and do not enable CMS to, assess compliance with the duplicate discount prohibition. For example, CMS has a system in place that reviews copies of states’ quarterly Medicaid drug rebate requests; however, CMS officials told us that these requests do not contain detailed, claim-level information that could be used to determine if specific drugs purchased through the 340B Program were incorrectly included. Additionally, CMS reviews states’ contracts with Medicaid managed care plans to ensure that they include language requiring the plans to have procedures to exclude 340B drugs from Medicaid rebate data provided to states, but CMS officials told us that the contract language does not have to specify or describe those mechanisms, limiting the information available regarding duplicate discount prevention efforts. CMS also required states to submit their plans for reimbursing covered entities for 340B drugs provided under Medicaid FFS to ensure that the states’ payment methodologies complied with federal requirements, but these reviews were not focused on ensuring that such drugs were excluded from rebate requests. CMS officials told us that they do not track which procedures states use to prevent duplicate discounts; review states’ policies or procedures for identifying and excluding 340B drugs from rebate requests for deficiencies or to ensure effectiveness; or audit states’ compliance with the prohibition on duplicate discounts. This is problematic because, as noted previously, we found that not all state Medicaid programs have written policies and procedures that specify the extent to which covered entities can use 340B drugs for Medicaid beneficiaries, or how they are to identify these drugs so the state can exclude them from Medicaid rebate requests. If states do not have written policies, covered entities may not be aware of whether, or under what circumstances, they are permitted to provide 340B drugs to Medicaid beneficiaries or how to properly inform the state of their use, which could result in errors that lead to duplicate discounts and forgone rebates. We found some evidence of confusion from covered entities about state policies. For example, officials from Apexus, which manages HRSA’s 340B Prime Vendor Program, told us that Apexus’s call center, which fields questions from covered entities and other stakeholders about the 340B Program, most frequently receives questions related to clarifying states’ duplicate discount-related policies. These inquiries about state requirements indicate that there is currently confusion among covered entities. CMS’s limited oversight of state Medicaid programs’ efforts to prevent duplicate discounts is also problematic because we found that states’ policies and procedures were not always effective at preventing duplicate discounts, or in line with federal guidance. For example, the MEF is only intended to be used for Medicaid FFS. CMS officials told us that, while the agency was not aware of any states using the MEF for Medicaid managed care, such use would be concerning because it is not an accurate tool for that purpose. However, as previously shown in table 2, we found that eight states relied on the MEF to identify and exclude Medicaid managed care drugs dispensed at in-house pharmacies from rebate requests and 13 states used the MEF to identify and exclude managed care drugs administered by providers. The lack of CMS oversight of state Medicaid programs’ policies and procedures related to duplicate discount prevention is inconsistent with federal standards for internal control for information and communication, which state that management should obtain relevant data from reliable internal and external sources in a timely manner based on the identified information requirements so that data can be used for effective monitoring. Without reviewing states’ policies and procedures, CMS does not have the information needed to effectively oversee states’ compliance with the Medicaid drug rebate statute, which exempts 340B drugs from Medicaid rebate requirements, and ensure that states have effective policies and procedures for preventing duplicate discounts. The lack of oversight of states’ policies and procedures also results in CMS not having reasonable assurance that states are seeking rebates for all eligible drugs, and since Medicaid rebates are shared by the states and the federal government, forgoing rebates increases Medicaid costs for both states and the federal government. We identified several areas of weaknesses in HRSA’s oversight processes that impede its ability to ensure that duplicate discounts are prevented or remedied: Covered entities’ compliance with state policies and procedures is not assessed. HRSA’s auditors are instructed to look for the potential for duplicate discounts in Medicaid FFS by assessing whether the covered entity’s information on the MEF is correct; whether the entity is following its policies and procedures to prevent duplicate discounts; and whether a sample of claims reveals any noncompliance. Auditors are also instructed to use information provided by the covered entity to determine if the covered entity is following state policies. However, HRSA officials told us that its auditors are not expected to independently identify or verify state Medicaid programs’ policies to determine whether the covered entity is actually following what the state requires. Instead, HRSA officials stated that it is a best practice for covered entities to include a description of state Medicaid programs’ policies related to the 340B Program, such as how relevant drugs are to be identified, in their policy and procedure manuals. In addition, HRSA told us that its auditors interview covered entity staff about the controls in place to prevent duplicate discounts, and may discuss state requirements during these interviews. The auditor is then required to use this information to determine whether the covered entity is following state policy. For example, if the covered entity says that the state requires a 340B claim identifier, the auditor is to look to see if the covered entity used that identifier in the sample of claims that are reviewed. However, the auditor is not expected to determine if the state actually requires a claim identifier, or allows covered entities to use 340B drugs. The fact that HRSA does not assess whether covered entities are actually following state policies and procedures regarding the use and identification of 340B drugs for Medicaid beneficiaries is inconsistent with federal standards for internal control related to information and communication. Those standards state that management should obtain relevant data from reliable internal and external sources in a timely manner based on the identified information requirements and evaluate both internal and external sources of data for reliability so that it can be used for effective monitoring. This lack of HRSA oversight is especially concerning because we found that the covered entities we interviewed did not always have a correct understanding of their states’ policies. For example, officials from two of the four Pennsylvania covered entities we spoke with told us they were dispensing 340B drugs to Medicaid managed care beneficiaries at contract pharmacies, despite state officials telling us the state does not allow that practice. As a result of this confusion, duplicate discounts may have occurred as the state was not excluding drugs dispensed by contract pharmacies from its Medicaid rebate requests. Additionally, of the 13 covered entity policy and procedure manuals we reviewed, only four had descriptions of their states’ policies and two of those descriptions were incorrect. If HRSA were to audit the majority of those 13 covered entities, its auditors would likely be unable to appropriately assess the entities’ compliance with state requirements. Without fully assessing compliance with state policy, HRSA’s audits do not provide the agency with reasonable assurance that covered entities are taking the necessary steps to prevent duplicate discounts. As a result, drug manufacturers are at risk of being required to erroneously provide duplicate discounts for Medicaid drugs. Not all identified duplicate discounts are repaid. HRSA officials told us that covered entities’ obligations for preventing duplicate discounts are the same for Medicaid FFS and managed care. However, as we reported in 2018, HRSA audits do not assess for the potential for duplicate discounts in Medicaid managed care despite the fact that the potential for duplicate discounts related to Medicaid managed care has existed since 2010, when manufacturers were required to begin paying Medicaid rebates under managed care in addition to FFS. As we noted in 2018, HRSA indicated that it does not audit for duplicate discounts in managed care because the agency has not issued guidance on how covered entities should prevent this. As a result, we recommended that HRSA issue guidance to covered entities on the prevention of duplicate discounts under Medicaid managed care and incorporate into its audit process an assessment of covered entities’ compliance with the prohibition on duplicate discounts as it relates to Medicaid managed care claims. HHS concurred with these recommendations and, as of October 2019, HRSA reported that it was working to determine next steps related to these recommendations. However, HRSA has noted that the agency lacks explicit general regulatory authority to issue regulations on most aspects of the 340B Program, and also told us, in October 2019, that guidance does not provide the agency with appropriate enforcement capability. As a result, HRSA requested authority in the President’s budget request for fiscal year 2020 to issue regulations on all aspects of the 340B Program, as the agency believes that binding and enforceable regulations would provide it with the ability to more clearly define and enforce policy. In addition, the agency is not pursuing additional guidance under the 340B Program at this time. We note, however, that the law prohibits the payment of duplicate discounts and requires HRSA to issue guidance to covered entities describing methodologies and options for avoiding duplicate discounts. In the absence of federal guidance, HRSA instructs covered entities to work with their states on duplicate discount prevention. HRSA requires covered entities to work with affected drug manufacturers regarding the repayment of duplicate discounts in FFS that are identified through HRSA or manufacturer audits. However, HRSA officials told us that the agency does not require covered entities to take the same actions to address duplicate discounts for managed care claims that HRSA learns about through its audits or other means. For example, HRSA officials told us that they did not follow up on a letter from a state that confirmed a duplicate discount occurred on a Medicaid managed care claim, because the agency did not yet have guidance for covered entities related to Medicaid managed care claims. Additionally, HRSA officials told us they would not require a covered entity to develop a corrective action plan or make offers of repayment to a manufacturer if a drug manufacturer’s audit of that covered entity identified a duplicate discount in managed care. Although HRSA officials told us that they expect covered entities to work in good faith with all parties involved to resolve potential duplicate discounts in managed care, HRSA does not require these actions if a duplicate discount is identified in managed care, as it does in FFS. This is particularly problematic as the majority of Medicaid enrollees, prescriptions, and spending for drugs are in managed care, and the drug manufacturers we contacted believe that duplicate discounts are more prevalent in Medicaid managed care than FFS. HRSA expecting but not requiring covered entities to address identified duplicate discounts related to Medicaid managed care is contrary to federal law, which provides that covered entities are liable to drug manufacturers for duplicate discounts that are identified through HRSA or manufacturer audits. It is also inconsistent with federal internal control standards related to monitoring, which state that management should oversee the prompt remediation of deficiencies and the audit resolution process, which begins when the results of an audit or other review are reported to management, and is completed only after action has been taken that corrects identified deficiencies. Without HRSA requiring covered entities to address identified duplicate discounts in Medicaid managed care as they would duplicate discounts in FFS, drug manufacturers may erroneously provide both 340B discounts and Medicaid rebates on the same drug claim. The prevention of duplicate discounts in the 340B and Medicaid Drug Rebate Programs requires extensive coordination between state Medicaid programs and covered entities, and among agencies within HHS. Similar levels of coordination are required to ensure that states are not forgoing rebates on drugs not purchased at the 340B price, which would result in increased costs for both state and federal governments. Limitations in federal oversight impede CMS’s and HRSA’s ability to ensure compliance with the prohibition on duplicate discounts. CMS does not assess whether states have 340B policies and procedures and, if so, whether they are documented, effective, and accessible to stakeholders. As a result, it is unable to proactively identify and correct problematic policies and procedures, and prevent duplicate discounts and forgone rebates. Additionally, without knowing state Medicaid programs’ 340B policies, HRSA is unable to perform a comprehensive review of whether covered entities are taking the necessary actions to prevent duplicate discounts. In addition, HRSA’s audits are not assessing compliance with the prohibition against duplicate discounts in managed care because the agency has yet to put forth guidance on this issue. While HRSA is not currently pursuing 340B-related guidance, the agency continues to work on determining next steps to respond to our 2018 recommendations on the issue. In the meantime, however, HRSA still must ensure that covered entities are complying with 340B Program requirements, including the prohibition on duplicate discounts in managed care. Failure to do so not only puts drug manufacturers at risk of providing duplicate discounts, but also compromises the integrity of the 340B Program. We are making a total of three recommendations, including one to CMS and two to HRSA. Specifically: The Administrator of CMS should ensure that state Medicaid programs have written policies and procedures that specify the extent to which covered entities can use 340B drugs for Medicaid beneficiaries, are designed to effectively identify if 340B drugs were used, and if so, how they should be excluded from Medicaid rebate requests. The policies and procedures should be made publically available and cover FFS, managed care, and all of the dispensing methods for outpatient drugs. (Recommendation 1) The Administrator of HRSA should incorporate assessments of covered entities’ compliance with state Medicaid programs’ policies and procedures regarding the use and identification of 340B drugs into its audit process, working with CMS as needed to obtain states’ policies and procedures. (Recommendation 2) The Administrator of HRSA should require covered entities to work with affected drug manufacturers regarding repayment of identified duplicate discounts in Medicaid managed care. (Recommendation 3) HHS provided written comments, which are reproduced in app. IV, and technical comments, which we have incorporated as appropriate. In its written comments, HHS concurred with one of our three recommendations and did not concur with the remaining two recommendations. HHS concurred with our recommendation that CMS ensure that state Medicaid programs have written policies and procedures for identifying 340B drugs and excluding them from Medicaid rebate requests and stated that it will work with states to strengthen policies and procedures related to 340B drugs for Medicaid beneficiaries. HHS did not concur with our recommendation that HRSA incorporate assessments of covered entities’ compliance with state Medicaid programs’ policies and procedures into its audit process. HHS stated that HRSA does not have authority to determine whether state Medicaid policies and procedures are “accurate and appropriate.” We agree that HRSA is not the appropriate party for reviewing and assessing state Medicaid programs’ policies and procedures, which is why we recommended that CMS, not HRSA, strengthen its oversight of states’ 340B-related policies and procedures, a recommendation with which HHS concurred. We recommended that HRSA update its 340B Program audits to include assessments of whether covered entities are following state Medicaid programs’ policies and procedures regarding the use and identification of 340B drugs. HHS stated that HRSA does not have authority to enforce covered entities’ compliance with state Medicaid programs’ policies and procedures and that doing so would be “beyond the scope of the 340B Program” and would require additional training for HRSA auditors, who currently “do not have this level of expertise.” While we understand that HRSA does not have authority to enforce compliance with state Medicaid programs’ policies and procedures, covered entities’ compliance with state Medicaid programs’ policies and procedures is fundamental to preventing duplicate discounts and assessing compliance with state policies and procedures is essential to ensuring covered entities’ compliance with the 340B Program’s prohibition on duplicate discounts. Further, HRSA already audits for compliance with certain aspects of states’ 340B-related Medicaid policies for preventing duplicate discounts. Specifically, HHS states that covered entities are expected to include a description of state policy in their policy and procedure manuals. If such descriptions exist, HRSA auditors are required to review those descriptions and determine if covered entities are following them. Thus, HRSA auditors already interpret state Medicaid policies and procedures when performing audits and the agency already enforces compliance with state policies by issuing audit findings when covered entities are not following them. However, as noted in our report, HRSA does not require its auditors to review state Medicaid programs’ actual policies and procedures. Instead, the auditors currently rely on covered entities’ descriptions of those policies and procedures, which we found were not always accurate. Additionally, knowledge of state policies would allow HRSA to incorporate an assessment of compliance into all audits as opposed to only those of covered entities that have such descriptions in their manuals. Finally, without considering states’ actual policies and procedures and ensuring that covered entities are following them, HRSA’s audits cannot effectively identify the potential for duplicate discounts. For example, simply checking covered entities’ actions against information on the MEF does not provide useful information if the covered entities are in one of the many states that do not use the MEF and instead direct entities to identify 340B drugs dispensed to Medicaid beneficiaries via a different mechanism, such as 340B identifiers. HHS states that implementing this recommendation would be burdensome and difficult to operationalize because HRSA would need to be notified of any changes to states’ policies and procedures. We understand that the lack of knowledge of state Medicaid programs’ policies related to duplicate discount prevention at the federal level complicates the ability of HRSA and its auditors to determine what state- level requirements exist and to apply them to audits. This is, in part, why we recommended that CMS ensure that state Medicaid programs’ policies are publicly available—a recommendation that, as noted above, HHS concurred with—and that HRSA work with CMS to obtain these policies as needed. Though we understand that this creates an additional step in HRSA’s audit process, we continue to believe that including an assessment of covered entities’ compliance with state Medicaid programs’ policies and procedures related to 340B drugs is necessary to identify potential duplicate discounts and to ensure covered entities’ compliance with 340B Program requirements. HHS also did not concur with our recommendation that HRSA should require covered entities to work with affected drug manufacturers regarding repayment of identified duplicate discounts in Medicaid managed care. In its response, HHS noted that because HRSA does not have guidance related to preventing duplicate discounts in Medicaid managed care, “it is difficult to assess compliance in this area.” However, our recommendation is not asking HRSA to assess compliance related to duplicate discounts in Medicaid managed care; instead, we are recommending that, when actual duplicate discounts have been identified, HRSA require covered entities to remedy those duplicate discounts. As noted in the report, actual duplicate discounts may be identified and confirmed by state Medicaid agencies through audits or other means. Given that HRSA officials told us that covered entities’ obligations for preventing duplicate discounts are the same for Medicaid FFS and managed care, the steps for addressing identified noncompliance should be similar, and thus, the agency should require and not just “encourage” covered entities to work with manufacturers to remedy any duplicate discounts related to managed care as they do for those related to FFS. Additionally, the potential for duplicate discounts related to Medicaid managed care has existed since 2010, when manufacturers were required to begin paying Medicaid rebates under managed care in addition to FFS. Ten years later, HRSA still has not issued guidance on how covered entities should prevent duplicate discounts in Medicaid managed care and has indicated that it is not pursuing new guidance at this time. This inaction continues to leave the 340B Program vulnerable to noncompliance with federal law. HHS concurred with our 2018 recommendations that HRSA issue guidance to covered entities on the prevention of duplicate discounts under Medicaid managed care and incorporate into its audit process an assessment of covered entities' compliance with the prohibition on duplicate discounts as it relates to Medicaid managed care claims. Until these recommendations are implemented, HRSA must, at a minimum, ensure that covered entities work with manufacturers regarding any identified duplicate discounts in managed care to help ensure compliance with 340B Program requirements. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the Administrator of HRSA, the Administrator of CMS, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at DraperD@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix V. Officials from all three drug manufacturers and the organizations that work on their behalf that we contacted reported challenges preventing and detecting duplicate discounts due to a lack of information. For example, officials from drug manufacturers told us that state Medicaid programs do not always provide data on the individual claims for which they were requesting rebates. Specifically, to obtain rebates, states submit requests to participating manufacturers for all drug purchases made that quarter; these requests contain the total quarterly amount owed for each of the manufacturers’ drugs, but not information detailing each claim for which rebates are being sought. Although the Centers for Medicare & Medicaid Services (CMS) encourages states to respond to reasonable manufacturer requests for claim-level data, the provision of such data is not required. Without this claim-level data, manufacturers reported that it is difficult to determine if rebate requests include claims for drugs purchased at the 340B discounted price. Additionally, manufacturers lack complete information on the extent to which covered entities use 340B drugs for Medicaid beneficiaries. This is because the Medicaid Exclusion File (MEF), a list maintained by the Health Resources and Services Administration (HRSA) to assist in the prevention of duplicate discounts, is only required to reflect the provider numbers used by covered entities that choose to use (carve in) 340B drugs provided directly by the covered entity to Medicaid fee-for-service (FFS) beneficiaries. The MEF does not include information on whether covered entities are using 340B drugs for Medicaid managed care beneficiaries and may not include information on contract pharmacies that are dispensing these drugs to Medicaid beneficiaries on covered entities’ behalf. Despite these limitations, the drug manufacturers we contacted reported that when claim-level data is available they review that data to detect potential duplicate discounts before they issue rebate payments. For example, officials from one drug manufacturer told us that they compare the provider numbers on the claim-level data obtained from states with the information on the MEF and dispute rebate requests for any claims from a provider number listed on the MEF. However, officials from some drug manufacturers told us that this approach is ineffective for preventing duplicate discounts for drugs dispensed at contract pharmacies because, as noted above, the MEF may not include information on contract pharmacies, and the claim-level data may only list the provider number for the dispensing pharmacy, not the prescribing covered entity. The drug manufacturers we contacted also reported trying to identify duplicate discounts after rebates have been paid by looking at 340B purchasing patterns. For example, officials from one drug manufacturer told us they look at covered entities’ purchases and assess whether the proportion of 340B purchases is consistent with their carve-in status. Specifically, these officials explained that if a covered entity is not listed on the MEF, then the entity should not be using 340B drugs for Medicaid FFS patients. Therefore, if all or nearly all of the purchases made by that covered entity were at the discounted price, it could indicate the presence of duplicate discounts. While the MEF is only intended to indicate covered entities that are using 340B drugs for Medicaid FFS beneficiaries, officials reported that drug manufacturers also rely on the MEF as a proxy for covered entities’ carve-in practices for Medicaid managed care since there is no equivalent data source. If there are concerns that duplicate discounts occurred, officials from the drug manufacturers we contacted indicated that they may conduct what is referred to as a “good faith inquiry,” in which the manufacturer, or a consultant working on the manufacturer’s behalf, requests data from covered entities on a specific set of drug claims for which they have paid rebates to determine if those claims involved 340B drugs. If drug manufacturers confirm that a duplicate discount did occur, officials reported that they may work to negotiate a repayment from the state or covered entity, depending on which party was responsible for the error. Additionally, one official who works on behalf of manufacturers told us that manufacturers also will work with covered entities to remedy the cause of the duplicate discount to prevent future occurrences. Drug manufacturers told us that it is not always clear whether states or covered entities are responsible for duplicate discounts, and thus, which party should be contacted regarding repayment. Additionally, drug manufacturers reported that some states refer them directly to covered entities to resolve all inquiries. Medicaid program officials in Michigan and Texas, for example, said that their states refer manufacturers to the covered entities because they believe that the covered entities would most likely be responsible for any duplicate discounts that occurred due to a failure to correctly apply the required claim identifiers. If drug manufacturers need assistance resolving their concerns or obtaining repayment for duplicate discounts, they can access options made available by HRSA and CMS. Specifically, drug manufacturers can request approval from HRSA to audit a covered entity to investigate suspicions of duplicate discounts in both Medicaid FFS and managed care. To receive approval from HRSA to conduct an audit, a drug manufacturer must document reasonable cause and provide an audit plan. In addition, HRSA requires the drug manufacturer to use an independent auditor who follows government auditing standards. According to HRSA, from October 2011 through August 2019, 45 audits were requested by drug manufacturers and 26 requests were approved. Of the 26 audits approved by HRSA, the agency received 13 final audit reports, six of which had duplicate discount-related findings. However, while audits can be a tool for identifying duplicate discounts and obtaining repayment, some drug manufacturers we spoke with indicated that the cost of audits may outweigh the benefits received in the form of repayments. Additionally, as noted previously, HRSA does not require covered entities to repay manufacturers for duplicate discounts that occur in managed care. Drug manufacturers also may use the state hearing process or pursue a dispute resolution in conjunction with states through CMS if their issues with state Medicaid programs cannot be resolved through inquires. According to CMS officials, through the dispute resolution process, the agency provides drug manufacturers and states with guidance to assist in determining responsibilities and identifying next steps to work through conflicts. CMS officials said that, in general, they have received five to 10 Medicaid drug rebate disputes per year, about half of which are related to 340B duplicate discount issues. Appendix II: State Medicaid Programs’ Policies on Covered Entities’ Use of 340B Drugs, by Dispensing Method California allows covered entities to dispense 340B drugs at contract pharmacies if there is an approved arrangement between the state, the covered entity, and the contract pharmacy. At the time of our information request, California officials indicated that they only had approved arrangements for certain hemophilia centers and had no approved arrangements with other types of covered entities. New Hampshire allows covered entities to provide 340B drugs to Medicaid beneficiaries, but generally does not allow them to bill Medicaid for these drugs. The one exception is that the state does allow covered entities that are approved family planning clinics to bill Medicaid for 340B drugs administered by providers to Medicaid beneficiaries. The term 340B drugs refers to drugs purchased by covered entities at a discounted price through the 340B Program. Carve out means that the state did not allow covered entities to provide 340B drugs to Medicaid beneficiaries. Carve in means that the state required covered entities to provide 340B drugs to eligible Medicaid beneficiaries. New Hampshire allows covered entities to provide 340B drugs to Medicaid beneficiaries, but generally does not allow them to bill Medicaid for these drugs. The one exception is that the state does allow covered entities that are approved family planning clinics to bill Medicaid for 340B drugs administered by providers to Medicaid beneficiaries. Managed care plans in this state do not cover outpatient drugs dispensed at pharmacies; they only cover provider-administered drugs. Appendix III: State Medicaid Programs’ Procedures for Identifying 340B Drugs, by Dispensing Method State does not allow covered entities to use 340B drugs for Medicaid fee-for-service beneficiaries for this dispensing method, and thus does not need a procedure to identify these drugs. Massachusetts requires contract pharmacies to include the covered entities’ National Provider Identifier on claims using 340B drugs, which the state then uses to exclude those claims from its rebate request. New Hampshire allows covered entities to provide 340B drugs through this dispensing method, but does not allow them to bill Medicaid for these drugs. Rhode Island uses a 340B claim identifier to identify and exclude associated drugs administered by providers at hospitals, but does not have any procedures to identify these drugs administered by providers at other types of covered entities. State does not allow covered entities to use 340B drugs for Medicaid managed care beneficiaries for this dispensing method and thus does not need a procedure to identify these drugs. New Hampshire allows covered entities to provide 340B drugs through this dispensing method, but does not allow them to bill Medicaid for these drugs. Managed care plans in this state do not cover outpatient drugs dispensed at pharmacies; they only cover provider-administered drugs. In addition to the contact named above, Michelle Rosenberg (Assistant Director), David Lichtenfeld (Analyst-in-Charge), Amanda Cherrin, and Sarah Tempel made key contributions to this report. Also contributing were Jennie Apter, Ethiene Salgado-Rodriguez, and Jennifer Whitworth.", "summary": "Covered entities can receive substantial discounts on outpatient drugs through the 340B Program, an estimated 25 to 50 percent of the cost of the drugs, according to HRSA. Additionally, Medicaid drug rebates are an important source of savings for states and the federal government, saving more than $36 billion in fiscal year 2018. However, ensuring that manufacturers are not subject to both discounts requires coordination within HHS, and between covered entities and states. GAO was asked to provide information on the prevention of duplicate discounts. Among other things, this report examines HHS's efforts to ensure compliance with the prohibition on duplicate discounts. GAO reviewed documentation, including federal policies and those from all 50 states and Washington, D.C. on preventing duplicate discounts. GAO also interviewed officials from CMS, HRSA, and 16 covered entities from four states selected to obtain variation in the types of entities and other factors. The 340B Drug Pricing Program (340B Program) and the Medicaid Drug Rebate Program require manufacturers to provide discounts on outpatient drugs in order to have their drugs covered by Medicaid. These discounts take the form of reduced sales prices for covered entities participating in the 340B Program—eligible hospitals and federal grantees—and rebates on drugs dispensed to Medicaid beneficiaries, shared by states and the federal government. However, federal law prohibits subjecting manufacturers to “duplicate discounts” in which drugs provided to Medicaid beneficiaries are subject to both 340B Program discounted prices (i.e., are 340B drugs) and Medicaid rebates. To prevent duplicate discounts, state Medicaid programs must know when covered entities dispense 340B drugs to Medicaid beneficiaries, so the state programs can exclude those drugs from their Medicaid rebate requests. GAO found that limitations in the Department of Health and Human Services's (HHS) oversight of the 340B and Medicaid Drug Rebate Programs may increase the risk that duplicate discounts occur. HHS's Centers for Medicare & Medicaid Services (CMS) conducts limited oversight of state Medicaid programs' efforts to prevent duplicate discounts. CMS does not track or review states' policies or procedures for preventing duplicate discounts, and GAO found that the procedures states used to exclude 340B drugs are not always documented or effective at identifying these drugs. As a result, CMS does not have the information needed to effectively ensure that states exclude 340B drugs from Medicaid rebate requests. CMS also does not have a reasonable assurance that states are seeking rebates for all eligible drugs, potentially increasing costs to state and federal governments due to forgone rebates. HHS's Health Resources and Services Administration's (HRSA) audits of covered entities do not include reviews of states' policies and procedures for the use and identification of 340B drugs. As a result, the audits are unable to determine whether covered entities are following state requirements, and taking the necessary steps to comply with the prohibition on subjecting manufacturers to duplicate discounts. GAO reported in 2018 that HRSA had not issued guidance on, and did not audit for, duplicate discounts in Medicaid managed care and recommended the agency do so as the majority of Medicaid enrollees, prescriptions, and spending for drugs are in managed care. HRSA is working to determine next steps to address these recommendations. In this report, GAO found that, unlike Medicaid fee-for-service, when duplicate discounts in Medicaid managed care claims are identified, HRSA does not require covered entities to address them or work with manufacturers to repay them. As a result, manufacturers may be subject to duplicate discounts for drugs provided under managed care. Given these limitations in federal oversight, HHS does not have reasonable assurance that states and covered entities are complying with the prohibition on duplicate discounts. GAO is making three recommendations, namely that: 1) CMS ensure that state Medicaid programs have written policies and procedures that are designed to prevent duplicate discounts and forgone rebates; and that HRSA 2) incorporate covered entities' compliance with state policies into its audits, and 3) require covered entities to work with manufacturers regarding repayment of identified duplicate discounts in managed care. HHS agreed with the recommendation to CMS, but disagreed with those to HRSA. GAO continues to believe these are needed to improve oversight and the integrity of the 340B Program, as explained in the report.", "document_type": "gao"}
{"report": "The primary purpose of the CORD Project is to develop and implement strategies for reducing obesity among low-income children. According to CDC, strategies that have been used to prevent and manage obesity include screening patients using body mass index (BMI), so children and their parents understand their risks; supporting healthy behaviors—such as eating vegetables and promoting physical activity—in early care and education centers and schools; and educating parents on how to reinforce healthy living habits at home. BMI is used to determine overweight and obesity (see sidebar). Percentiles are calculated from the Centers for Disease Control and Prevention (CDC) growth charts developed from national survey data collected between 1963 and 1994. Funding for the CORD Project was first made available through the enactment of the Patient Protection and Affordable Care Act, about one year after the CORD Project was authorized. In January 2011, CDC published the funding opportunity announcement—which outlined the goals of the grant as well as the eligibility criteria and other requirements—and, in September 2011, the first demonstration projects began. Congress subsequently appropriated additional funding for the CORD Project in April 2015 and January 2018, bringing the total amount appropriated to $65 million for fiscal years 2010 through 2023. CDC officials told us that during this time period the CORD Project was the primary source of CDC funding for childhood obesity research focused on low-income children. CDC implemented the CORD Project in three separate grant phases, with different design approaches and grantees. (See fig. 1.) Across the three CORD Project phases—only the first of which is complete—CDC has awarded ten grants to entities to implement demonstration projects aimed at reducing obesity in low-income children. (See table 1.) In the first phase of the CORD Project, CDC also awarded a grant to the evaluation center to conduct a cross-site evaluation of the implementing grantees’ demonstration projects. CDC made four key design changes between the three CORD phases. CDC changed the scope of the project (i.e., type of strategies implemented), the type of evaluations (i.e., how it evaluated the strategies), the purpose of the study design, and the extent of participation by state Medicaid or CHIP programs. (See fig. 2.) CDC officials designed the CORD Project based on the language and requirements in CHIPRA and the CORD Project Plan developed by HHS, according to CDC officials. For CORD phases 2 and 3, CDC officials modified elements of the design in response to lessons learned, time frames for implementation, and recommendations related to childhood obesity made by national organizations such as the U.S. Preventive Services Task Force (hereafter referred to as the Task Force). Scope of CORD Project. After CORD phase 1, CDC officials shifted the scope of the CORD Project from prevention to the treatment of children who are overweight or have obesity, according to CDC officials. Specifically, CDC designed CORD phase 1 to require grantees to implement demonstration projects that integrated public health and primary care strategies by promoting children and their families’ use of healthy behaviors and by modifying community environments. CORD phase 1 grantees implemented strategies in two types of settings: (1) community and (2) health care settings. Public health strategies are activities and programs delivered in community settings, such as schools and early care and education centers. Grantees also implemented primary care strategies, which in general are BMI screenings or other activities implemented in health care settings, such as during physician visits in federally qualified health centers. While CORD 1 grantees implemented strategies in both types of settings, the specific strategies that each CORD phase 1 grantee implemented varied. (See text box and app. I for additional information about the strategies CORD 1 grantees implemented.) Examples of Strategies Childhood Obesity Research Demonstration Phase 1 Grantees Implemented California Demonstration Project Public health strategies implemented included training staff at early care and education centers on health behavior change strategies and providing centers with large self-service water containers to promote increased water intake. Primary care strategies implemented included body mass index (BMI) screenings for children participating in early care and education centers. BMI is a measure used to determine overweight and obesity. Massachusetts Demonstration Project Public health strategies implemented included training teachers in participating elementary schools on how to implement evidence-based health education curricula that encouraged learning about nutrition and physical activity. Primary care strategies implemented included establishing a healthy weight clinic located in the participating health centers. Texas Demonstration Project Public health strategies implemented included providing classroom-based nutrition and gardening curricula in the early care and education centers. Primary care strategies included modifying electronic health records systems to increase provider awareness and action related to maintaining healthy weight, such as prompting clinicians to refer children who were overweight or had obesity to additional services. Pediatric Weight Management Interventions The Centers for Disease Control and Prevention (CDC) defines pediatric weight management interventions as intensive behavioral interventions designed to address excess weight through child and parental counseling on diet, physical activity, or behavior change management. The U.S. Preventive Services Task Force refers to these as interventions for weight management interventions. For CORD phases 2 and 3, CDC shifted the scope of the CORD Project to the treatment of children who are overweight or have obesity. Specifically, CDC modified the scope to only focus on implementing pediatric weight management interventions, one type of primary care treatment strategy (see sidebar). CDC officials told us they changed the scope of CORD phase 2 in response to the shorter, 2-year funding period authorized by law. CDC officials stated that unlike CORD phase 1, the shorter time frame for CORD phase 2 did not allow for a planning year to establish and solidify community relationships across multiple community settings while also enabling sufficient time to implement the strategies and analyze outcome and other data. CDC also modified the scope for CORD phase 2 and 3 to focus on pediatric weight management interventions in response to existing national recommendations related to childhood obesity, according to CDC officials. The Task Force recommended that primary care providers screen children 6 years and older for obesity and offer, or refer children with obesity to, pediatric weight management interventions. In making its recommendation, the Task Force found that pediatric weight management interventions should involve at least 26 hours of contact between the provider and the child, family, or both over a period of 2 to 12 months. According to CDC’s funding opportunity announcement for CORD phase 2, a 2007 expert committee convened by the American Medical Association similarly recommended that all health care providers address weight management and lifestyle issues with children at least once a year and provide behavior counseling on key obesity-related behaviors. CDC officials stated they designed CORD phase 2 to meet the guidelines and standards outlined in these recommendations. After Congress extended the CORD Project for a 6-year period beginning in fiscal year 2018 and appropriated additional funding, CDC designed the scope of CORD phase 3 as a 5-year grant to continue efforts to implement pediatric weight management interventions only. CDC officials stated they considered returning to an integration of public health and primary care strategies for CORD phase 3, similar to CORD phase 1, but decided that the best use of resources was to focus on integrating pediatric weight management interventions into communities, which includes linking families with resources already available in the community, such as low-cost physical activity offerings. Common Outcome Measures for Childhood Obesity Research Demonstration (CORD) Phase 1 Frequency of fruit and vegetable consumption Frequency of sugar-sweetened beverage consumption Physical activity Sleep time Screen time (e.g., watching television and playing video games) Body mass index Quality of life (e.g., physical, emotional, and social) Type of evaluations. In CORD phase 1, CDC awarded a grant to another entity—the evaluation center—to conduct a cross-site evaluation to aggregate results of the three implementing grantees’ demonstration projects. In designing CORD phases 2 and 3, CDC did not award grants to independent entities to conduct cross-site evaluations of the implementing grantees’ demonstration projects. In CORD phase 1, the cross-site evaluation was intended to help inform national policy decision- making, including recommendations regarding the applicability of CORD strategies in other communities. To assess the effectiveness of CORD phase 1, CDC designed the cross-site evaluation to examine the demonstration projects using a set of common outcome measures, which the evaluation center developed in collaboration with CDC officials and implementing grantees (see sidebar). CDC officials told us they removed the cross-site evaluation component for CORD phases 2 and 3 in part due to challenges executing the cross- site evaluation in CORD phase 1. Officials explained, for example, that the difficulty in developing common outcome measures that could be analyzed across the three demonstration projects that were both valid and specific enough to the strategies was a challenge given the variation in the strategies implemented by each grantee, data collection time frames, and methodologies. In addition, CDC officials stated the implementing grantees had sufficient capacity to conduct their own evaluations. For these reasons, CDC officials said they concluded that the cross-site evaluation was not an efficient use of resources. The CORD phase 1 grantees also identified the following challenges related to the cross-site evaluation: Grantees told us there was insufficient time to develop the common outcome measures prior to implementing the strategies. One grantee noted this resulted in them needing to collect some data retrospectively instead of collecting it in real time. Grantees also collected data at different time frames from each other, which resulted in limited data for measuring outcomes via the common measures. Evaluation center officials stated that the lack of a common timeline for collecting data resulted in them only being able to analyze changes in common outcomes measures at the two common time points across all three grantees—baseline and 12 months—even though some grantees collected data at later time points (e.g., 24 months after implementation began). Thus, evaluation center officials said they were unable to determine whether changes in outcomes observed were sustained 24 months after implementation. Grantees reported challenges in creating valid common outcome measures applicable across the varying age ranges, locations, and strategies implemented for the three demonstration projects that affected results of the cross-site evaluation. For example, only the Massachusetts demonstration project chose to implement strategies in the Special Supplemental Nutrition Program for Women, Infants and Children offices, making any data collected about that strategy unable to be included in the cross-site evaluation. CDC required the implementing grantees in all CORD phases to conduct their own evaluations and report on outcomes associated with the strategies implemented under their demonstration projects. Specifically, CDC expected the grantee-specific evaluations to measure health outcomes—such as changes to BMI, nutrition, and physical activity—and quality of life, and to report information on the processes, outcomes, and costs of the individual demonstration projects in the evaluations. Purpose of study design. While CDC designed CORD phases 1 and 2 to build knowledge and evidence on strategies for reducing obesity among low-income children, CDC designed CORD phase 3 to focus on translating strategies proven to reduce childhood obesity into routine use for low-income families. More specifically, for CORD phases 1 and 2, CDC required grantees to use or adapt strategies that previously had not been rigorously tested in low-income children. For example, in CORD phase 2, the Arizona demonstration project adapted a preexisting program—which was aimed at preventing child behavior issues through motivational interviewing techniques and parent education—to improve weight-related health behaviors in low-income children. By comparing low-income participants receiving the strategies with those who did not, the Arizona demonstration project aims to develop evidence about whether or not these strategies work to reduce obesity in low-income children. Arizona officials told us that while the CORD phase 2 study design is appropriate for helping to expedite the translation of knowledge into practice, it has nonetheless been challenging to implement the demonstration project in a 2-year period. The officials explained 2 years is a short period of time for this type of demonstration project. For CORD phase 3, CDC is requiring grantees to take an existing evidence-based pediatric weight management intervention and convert it into a user-friendly package of information, containing all materials clinical or community-based entities would need to easily, efficiently, and completely replicate the pediatric weight management intervention. Materials may include implementation manuals, training curricula, technical assistance, and evaluation materials. CORD phase 3 grantees are required to partner with clinical or community entities that will then use the package to implement the set of pediatric weight management interventions in their community. Additionally, CORD phase 3 grantees are required to make edits to the packaged materials based on the results of the implementation and develop sustainability and dissemination plans to implement the pediatric weight management intervention at additional locations. CDC officials and agency documentation outlined multiple reasons why they modified the study design for CORD phase 3. For example, in its funding opportunity announcement for CORD phase 3, CDC noted that there have been challenges in moving research-based, national recommendations, like Task Force recommendations, into practice. According to CDC officials, this challenge is especially great in low- income communities, where there are a limited number of available pediatric weight management interventions that are rigorous enough to meet the standards outlined by the Task Force. Additionally, officials noted that when these interventions are available, families are generally charged for the services. CDC officials told us that, according to the literature, it can take many years for evidence-based clinical interventions to make it into mainstream practice. Thus, by designing CORD phase 3 to package evidence-based pediatric weight management interventions that will be targeted to communities with low-income families, CDC officials told us they hope to reduce the number of years before adoption of such treatment strategies is prevalent. Participation by state Medicaid or CHIP program officials. In the design for CORD phase 1, implementing grantees were not required to develop relationships with officials from their state Medicaid or CHIP offices or with other payers, but these relationships were encouraged, according to CDC officials. At each subsequent CORD phase, CDC modified its expectations of grantees regarding the involvement of state Medicaid and CHIP program officials in the demonstration projects. Specifically, CDC added a requirement that the implementing grantees form a payer advisory board with representatives from state Medicaid or CHIP offices and encouraged grantees to collaborate with other relevant health care stakeholders, such as private payers, to foster discussions about how to obtain reimbursement for CORD strategies. Noting the importance of establishing these types of relationships, CDC officials told us that grant funding and in-kind donations—which CDC encouraged grantees to identify and use to supplement CORD grant funding—are not sustainable sources of funding for continued implementation of childhood obesity programs. As a result, the officials told us reimbursement from insurers, such as Medicaid or CHIP, is necessary to sustain the implemented strategies at the level of intensity required by the Task Force recommendations. For example, in CORD phase 2, officials from the Arizona demonstration project told us they included representatives from United Healthcare’s private and Medicaid health plans and also a representative from Mercy Care, a not-for-profit Medicaid plan, on their payer committee. Arizona demonstration project officials stated they were working with representatives of the state Medicaid program and private health plans to determine what kind of evidence payers would need to reimburse for obesity-related services. Reimbursement is a key focus in CORD phase 3, and CDC officials told us they plan to assist grantees in determining which services provided within the pediatric weight management interventions may be reimbursable. Specifically, CDC officials stated they will coordinate opportunities for information sharing, technical assistance, and networking between CORD phase 3 grantees, states, and CMS in order to explore broader Medicaid and CHIP coverage options for the services delivered through the grants. CMS officials noted that medical services provided under the grant could be reimbursable under states’ Medicaid and CHIP programs, including under the Early and Periodic Screening, Diagnostics and Treatment benefit. While CDC changed some design elements of the CORD Project between the phases, according to CDC officials, the agency used a consistent approach in managing grantees. Specifically, CDC officials told us that in CORD phases 1 and 2 they promoted collaboration between themselves and the grantees, as well as among the grantees, and monitored the grantees through regular interactions with them. CDC officials told us they used a team of personnel with different expertise to oversee the CORD phase 1 and 2 grants. For example, the team included a project officer who specialized in program management to oversee the day-to-day operations, as well as subject matter experts, including one experienced in evaluation design. CDC officials told us they interacted with CORD phase 1 and 2 grantees on regular conference calls and conducted annual site visits to each grantee. Grantees stated that CDC’s site visits aided them in implementing their demonstration projects by keeping them and their community partners accountable. In addition, grantees told us that CDC collaborated with them to provide expertise on, or troubleshoot the design of, the implementation of their demonstration projects. For example, Arizona demonstration project officials told us that CDC officials helped them to figure out how to best achieve their desired sample size for a strategy they were implementing. CDC officials told us they plan to continue a similarly collaborative management approach for CORD phase 3. CDC officials stated they also monitored CORD phase 1 and 2 grantees by requiring grantees to regularly report on their efforts and generally plan to monitor CORD phase 3 grantees the same way. For example, CDC required CORD phase 1 grantees to submit annual progress reports at least 90 days before the end of the budget period that included descriptions of progress made towards the research goals, information on expenditures, and a detailed budget justification for the new budget period. CDC also required CORD phase 1 grantees to submit both annual progress reports and a final progress report. CORD phase 1 grantees told us that CDC officials were helpful in providing administrative support that ensured grant paperwork was completed consistent with requirements. The evaluation center’s cross-site evaluation and the implementing grantees’ evaluation findings reported some improvements in BMI and other outcomes measured among children who received CORD phase 1 strategies. Specifically, the evaluation center reported that positive changes on these outcomes were observed most often among the following groups of children, providing some evidence of the effectiveness of the strategies delivered: Children who received primary care strategies, such as individualized counseling. Children who received public health strategies, such as an evidence- based nutritional program, in addition to the primary care strategies. In evaluating the CORD 1 demonstration projects, the evaluation center did not examine which specific strategies were the most effective. The primary objective of the cross-site evaluation was to determine if there was evidence that an integrated approach had any advantage over implementing either public health only or primary care only strategies. The evaluation center examined the extent to which the three CORD 1 demonstration projects collectively were associated with positive changes over time in behavior or reductions in BMI. Because of the considerable variation in each of the three demonstration projects, the evaluation center grouped the various strategies implemented by the three grantees into two categories for the analysis: public health and primary care plus. Next, the evaluation center categorized children by the types of strategies they received (public health only, primary care plus only, or both public health and primary care plus) and by age (2 to 5 years, 6 to 8 years, and 9 to 12 years). The evaluation center tested whether each of the possible combinations of strategy and age showed improvement over a 12-month period for each common measure. Using this approach, the evaluation center found some improvements for all of the common outcomes measured; however, improvements were not observed for each strategy or age group. Specifically, of the 81 possible combinations of strategy and age, 52 demonstrated some improvement over the 12-month period; however, only 16 of them showed a statistically significant improvement. (See fig. 3.) For example, BMI improved for children over the 12-month period in three of the strategy and age combinations, but the improvement was statistically significant for just one of those combinations. Among the 52 groups that showed improvements at 12 months, most of the differences observed were very small. For example, from the start of the intervention to 12 months after the intervention, there was about a 1 percent increase in the percentage of children who reported they were physically active for 60 minutes at least one day a week. The implementing grantees—each of which conducted their own evaluations—also reported some improvements in the children who received CORD phase 1 strategies. Similar to the evaluation center’s findings, the implementing grantees did not report improvements for all participating age groups or all outcomes they examined. Among their findings, the grantees reported the following: Children at participating early care and education centers in Texas, who were exposed to strategies such as classroom-based nutrition and gardening curricula, demonstrated modest improvements in BMI over a 2-year period when compared with children who did not receive these Texas demonstration project strategies. The Texas demonstration project also reported improvements in BMI for some children who participated in a weight management program administered in YMCAs compared with a different weight management program administered in primary care clinics. Specifically, researchers found that the YMCA program was more effective in reducing BMI for low-income children at 3 months but not at 12 months after implementation of the program. Children who received both public health and primary care strategies under the California demonstration project experienced some improvement on some outcome measures when compared to children who only received one type of strategy. For example, children who are overweight or have obesity who received both public health and primary care strategies reported playing less hours of video games during the week than those who only received the primary care strategies. During CORD phase 1, the Massachusetts demonstration project observed some improvements over time in the children who received CORD strategies. For example, the percentage of seventh grade students with obesity decreased from the start of implementation compared with 24 months after implementation in the two communities where the strategies were implemented. However, these results were modest; the decrease in the percentage of students with obesity was less than 3 percent in both communities. CDC officials, implementing grantees, and the evaluation center noted that modest or no effects were likely in part due to small sample sizes because of recruitment issues. Regarding recruitment, CDC officials told us that two of the three CORD phase 1 demonstration projects had issues with recruitment that caused sample size issues and ultimately statistical power issues. Specifically, when there is a smaller sample size, a study may be underpowered, which means that statistically significant effects are less likely to be detected even when differences exist. CDC officials explained that having limited statistical power affects the ability for more specific modeling or analysis to determine for whom the strategies works best (e.g., those with obesity or severe obesity). Grantees and CDC officials told us that when faced with recruitment issues, grantees made changes to their recruitment strategies. For example, grantees reduced the minimum BMI required for children participating in the demonstration projects in an attempt to increase participation. However, grantees told us they were still not able to reach their anticipated number of participants. Additionally, an official from the evaluation center told us some common outcome measures used in the cross-site evaluation were limited. The official explained that, had the grantees had more time to reach consensus on how to collect the data for the common outcome measures, or had the common outcome measures been identified in advance of the implementing grantees developing their own evaluations using measures specific to their demonstration projects, the evaluation center might have had more precise data to demonstrate improvements among participants. In planning for CORD phase 1, CDC officials acknowledged that the demonstration projects might not result in significant changes for some outcomes. CDC’s funding opportunity announcement noted that changes in health indicators, such as BMI, are long-term objectives, and that the period of funding for the projects might be too short to demonstrate significant improvement in these outcomes. A CDC official stated that although strong results were not found across each of the demonstration projects, the results of the implemented strategies provided evidence that these strategies could be implemented in a real-world setting. Thus, they noted the lack of stronger and larger effects does not mean that the demonstration projects were not successful. CORD phase 1 grantees told us they continue to analyze the data and expect to publish additional findings, even though the grant period has concluded. For example, the evaluation center told us they had enough data from the CORD Project to continue publishing for many years and planned to publish studies examining how existing community policies— such as physical activity policies—affected the outcomes of the implemented strategies. One of the implementing grantees also told us that having more time to fully analyze, use, and publish results from the data was needed. CDC officials and CORD grantees identified several factors that affected grantees’ ability to implement strategies to reduce childhood obesity among low-income children. According to CDC officials, policymakers and researchers should consider these factors when implementing similar strategies in the future. CDC officials or implementing grantees identified the following factors they observed across the CORD grantees: Staff turnover. CDC officials told us that the turnover of principals and other administrative personnel trained to provide the strategies is one factor that negatively affected the implementation of the strategies in schools or clinics. For example, CDC officials noted that in the Massachusetts demonstration project, researchers had to establish a relationship with a new principal of one of the participating schools when the other principal left, which delayed progress in implementation at that location. Similarly, the Arizona demonstration project also experienced staff turnover at the clinics, which led to a need for retraining and challenges in staff flows. CDC officials suggested that future research should consider incorporating staff retraining costs in the design of public health strategies to help mitigate this challenge. Family support. CDC officials told us that grantees had to provide more support than initially anticipated to families to better ensure their participation. CDC officials told us that grantees addressed this challenge by allowing siblings to also attend or participate in the activities or by holding activities on weekends or after school to accommodate parents’ work obligations. Strategies should be designed to be flexible for families, as there are competing demands on the families participating in the demonstration projects, CDC officials explained. Pertinent programs and policies. Implementing grantees noted that the preexistence of programs or policies that promoted healthy behaviors in the public health and primary care sectors positively affected their implementation of CORD strategies. For example, Massachusetts demonstration project officials told us that the strategies they implemented complemented an existing statewide program that promoted opportunities for healthy eating and active living in the communities, schools, childcare centers, and businesses. Grantee officials attributed the organizational commitment and motivation they observed in participating schools to these preexisting activities. Commitment from partner organizations. Implementing grantees found that the commitment of partner organizations, such as schools, was an important factor affecting implementation. According to implementing grantees, determining the willingness and ability of an organization to implement the strategies is important—by identifying, for example, leaders who support the strategies and can help ensure staff commitment to execute them. The Massachusetts demonstration project reported that 90 percent of the stakeholders they worked with noted the presence of leadership and administrative support for the project reduced feelings of conflict between program implementation and other priorities. Alternatively, the California demonstration project identified the lack of a strong supporter in a leadership position as a barrier to implementation. Parental stresses. Implementing grantees found that parental stresses related to social economic status (e.g., food insecurity or accessibility challenges, including transportation to intervention sites) was a major factor negatively affecting family participation and the implementation of the strategies. Grantees explained that understanding the effect of these stresses on a family’s ability to focus on the strategies to reduce childhood obesity is important and grantees should plan for ways to mitigate those stresses. CDC told us that the CORD phase 3 demonstration projects may be able to help mitigate some of the challenges identified from prior CORD experiences, as noted above. For example, CDC officials told us they plan to work with CORD phase 3 grantees to find ways to mitigate challenges associated with staff turnover, which could include taping trainings or allowing for virtual opportunities for retraining. Additionally, the CORD phase 3 grants are implementing pediatric weight management interventions in different settings—some in clinical settings and some in community settings—which CDC officials said may provide parents with additional flexibility to participate in the strategies. CDC has taken steps to share CORD phases 1 and 2 design materials and available results with researchers and others. For example, CDC shared on its website information for CORD phases 1 and 2, including project summaries, background information about the grantees, and published literature describing the project designs and results. In addition, CDC shared lessons learned about the CORD Project and evidence-based childhood weight management programs during a series of webinars. According to CDC officials, the intended audience for the webinars included public health practitioners and researchers; local, state, and federal government agency officials; health care professionals; policy analysts; and community health workers. CDC officials also told us they have presented CORD results and lessons learned at conferences and at meetings organized by other HHS agencies. Specifically, a CDC official and grantees summarized results from the first phase of the CORD Project at the American Academy of Pediatrics’ Annual Conference in 2016. CORD phase 1 results were also presented at the 2018 Annual Meeting for the Association of State Public Health Nutritionists. Additionally, in November 2017, CORD phase 1 grantees met with researchers from the National Institutes of Health’s Childhood Obesity Prevention and Treatment Research program to share lessons learned from their respective research. To further disseminate CORD results, CDC officials highlighted their planned report to Congress, as required by CHIPRA, which was subsequently issued in September 2019. The report describes the findings for CORD phase 1 and provides brief descriptions of the CORD phase 2 grantees and their demonstration projects, since the results of those projects are not yet available. The report identifies CORD phase 1 findings, including information about the costs of implementing the strategies. CDC officials noted that the implemented public health strategies, such as providing classroom-based nutrition and gardening curriculum or programs that promote physical activity, cost less than primary care strategies. Specifically, CDC reported that the costs of public health strategies in early care and education centers ranged from $26 to $96 per child, the costs of some primary care strategies ranged from $164 to $181 per child, and the cost of more intensive family-based weight management programs ranged from $2,107 to $2,220 per child. CDC, in collaboration with other HHS agencies, has also taken some steps to promote the wider adoption of CORD strategies in low-income communities. For example, CDC and CMS have had preliminary discussions about how CMS could help CORD grantees understand how Medicaid and CHIP programs could reimburse for the obesity-related strategies they are implementing as part of the CORD Project, which CDC officials told us could help to sustain and expand these strategies to other low-income communities. CMS officials told us they are considering whether to issue guidance to state Medicaid and CHIP programs that explains how some states have been able to reimburse entities for the provision of overweight- and obesity-related services. CDC officials told us that after discussions with CMS officials, they provided information to CMS in October 2018 that could be used for a possible CMS information bulletin to state Medicaid and CHIP officials on childhood obesity. In addition, CDC and the Office of the Assistant Secretary for Planning and Evaluation within HHS have awarded a cooperative agreement to the National Association of Community Health Centers to increase the implementation of an evidence-based childhood weight management program—Mind, Exercise, Nutrition, Do It!—by federally qualified health centers. According to HHS officials, the National Association of Community Health Centers is assisting 14 federally qualified health centers in five states (Arizona, Florida, Illinois, Mississippi, and North Carolina) to implement this intervention and, based on lessons learned, plans to develop an implementation guide to support the expansion of this strategy to other health centers. CDC officials also told us they are coordinating with the National Cancer Institute within the National Institutes of Health to share knowledge with CORD phase 3 grantees about how to develop business models to support the expansion of successful strategies, which aligns with one of CDC’s goals for CORD phase 3 to determine how to increase the adoption of successful strategies beyond the CORD intervention sites. CDC officials and implementing grantees provided us some examples of CORD strategies and materials that continue to be used in the states where they were implemented or have been implemented in other low- income communities. Officials from the Massachusetts demonstration project told us that some of the primary care strategies they developed during CORD phase 1 are still provided in the healthy weight clinics that participated in the project. Officials from the Arizona demonstration project told us they have received funding from the U.S. Department of Agriculture to develop a new training module for health care providers interested in implementing the project’s pediatric weight management intervention. They explained that the new training module will include information on parenting strategies specific to child health behaviors (e.g., monitoring of physical activity) and examples of stories from the families who participated in the Arizona demonstration project. CDC officials also told us that materials that CORD grantees used as part of their strategies are publically available for use by researchers and other communities. These materials include a primary care resource guide developed in collaboration with the American Academy of Pediatrics, the Coordinated Approach to Child Health early childhood kit, and a healthy weight clinic implementation guide. We provided a draft of this report to HHS for comment. HHS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services, the appropriate congressional committees, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix II. The Children’s Health Insurance Program Reauthorization Act of 2009 (CHIPRA) authorized the Department of Health and Human Services (HHS) to establish the Childhood Obesity Research Demonstration (CORD) Project. CHIPRA specified that HHS provide project grants to universities or other eligible entities to implement activities to reduce childhood obesity among low-income children. HHS designated the Centers for Disease Control and Prevention (CDC) as the agency responsible for designing, awarding, and managing the grants. Subsequent laws provided additional funding and extended the CORD Project for two more phases. The first phase of the CORD Project began in September 2011 and was completed in September 2016. The purpose of CORD phase 1 was to determine whether implementing strategies in public health sectors, including early care and education centers, schools and community organizations, and primary care sectors, such as health care clinics, could improve low-income children’s risk factors for obesity. CDC funded three implementing grantees: San Diego State University, the Massachusetts State Department of Public Health, and the University of Texas Health Science. CORD phase 2 started in June 2016. The purpose of this phase was to further test if strategies implemented in the primary care sector would reduce the body mass index (BMI) in children with obesity, or who were overweight with risks including medical and behavioral risks and family history. CDC funded the following grantees: the Massachusetts State Department of Public Health and Arizona State University. As of July 2019, CORD phase 2 was ongoing. Early care and education centers (23 centers) Collected height and weight for children aged 2-5 years. Trained center staff on health behavior change strategies to use at their centers. Provided centers with large self-serve water containers and cooking kits with child-friendly cooking and serving items. Elementary schools (13 schools) Worked with school nurses and trainees to collect BMI measurements from kindergarteners, third graders, and fifth graders in the El Centro Elementary School District; and kindergarteners, second graders and fifth graders in the Brawley Elementary School District. Provided schools physical activity equipment. Installed water jets and other water containers to provide self-serving access by students. Developed lesson plans promoting sleep for grades kindergarten through sixth grade. Community (three community organizations and three independent restaurants) Provided a water dispenser at two community recreations centers in Brawley and El Centro and at one Boys and Girls Club in Brawley. Developed community gardens at the Boys and Girls Club in Brawley and a recreation center in El Centro. Introduced healthy children’s menu items in three restaurants. The grantee conducted a non- randomized study which sought to determine whether strategies implemented in both public health sectors and primary care sectors would be more effective at preventing and controlling childhood obesity when compared with strategies implemented in public health sectors only, primary care sectors only, or when strategies were not implemented. Community health clinics (three clinic sites) Modified the clinics’ electronic health record systems to improve health care provider screening and treatment of childhood obesity including through the use of alerts and prompts. To facilitate the adoption of the system changes, a patient care coordinator was hired to work across the participating clinics. Hired community health workers and a community health worker coordinator to administer the Family Wellness Program, a 12-month program that delivered wellness and physical activity workshops, motivational interviewing, and newsletters. Early care and education centers (nine centers) Trained mentors to provide support to staff to implement evidence-based programs on nutrition and physical activity. Schools and after school programs (six schools and 17 after school programs) Provided evidence-based health education curricula and training to teachers to encourage student learning about nutrition and physical activity. Implemented a nutrition curriculum for after-school program staff to use with children aged 5 to12 years. Community Implemented a communications campaign, including text messaging, small billboards, transit ads, and handouts, to spread the demonstration project’s brand and to change community norms and practices in physical activity and healthy eating. Special Supplemental Nutrition Program for Women, Infants and Children (one program in each community) Collaborated with the Special Supplemental Nutrition Program for Women, Infants and Children to implement intervention activities including training nutritionists and nutrition assistants in best practices on assessment and counseling for childhood obesity prevention and developing an obesity counseling toolkit for providers. Health centers (two centers) Modified existing electronic health records to deploy a computerized, point-of-care decision support alert at the time of a well-child care visit for a child who is overweight or has obesity. The alert prompted clinicians to document weight status, nutrition and physical activity counseling, and place referral to the on-site healthy weight clinic for weight management support. Implemented a healthy weight clinic in each participating health centers. Each healthy weight clinic was staffed with a physician, a nutritionist, and a community health worker who met with each patient and family. Patients participating in the healthy weight clinics engaged in dietary and physical activity assessment, goal setting, and were connected to community resources to support healthy lifestyles. Early care and education centers (28 centers) Provided classroom materials on nutrition and gardening and bilingual parent tips sheets on nutrition, activity, and screen time. Provided physical activity equipment to participating centers. Schools (40 schools) Trained school staff on a nutrition and physical education classroom curricula. Sent text messages in English or Spanish to participants once a week that emphasized program concepts and linked families to resources. Community Provided training sessions to teach community health workers, teachers, parents, physicians, and others stakeholders about advocacy and the implementation of environmental changes for healthy eating and active living. Health care clinics (11 clinics) Provided BMI screening for children who are overweight or have obesity, which included decision supports to integrate guidelines for the appropriate clinical screening, evaluation and treatment into day-to-day practice. Modified electronic health records to identify children who were overweight and had obesity, provide prompts for treatment, and provide clinicians with access to referral information for weight management. The Texas demonstration project implemented and evaluated a primary and secondary obesity prevention program. In the primary prevention intervention, the grantee collected data on risk factors and the utilization of health care services and community programs. This intervention was focused on the entire community, with the goal of preventing the development of obesity. The secondary prevention program consisted of a randomized control trial, targeted to children who were already overweight or had obesity. Children and their families were randomly assigned to either a community centered or a primary care centered weight management program. The Arizona demonstration project is led by Arizona State University. The purpose of the project is to implement an adapted program in three pediatric primary care clinics located in Maricopa County, Arizona. These clinics serve a minority patient demographic of about 60 to 65 percent, of which the largest groups are Mexican American and American Indian. Program adaptation: Adaptation began by assessing the needs and capacity of a primary care organization and the families they serve. The program was then pilot-tested in a general pediatrics clinic and a clinic for children with advanced obesity to determine feasible delivery modifications as well as enhanced content for obesity management and prevention. During and at the end of the pilot trial, feedback was solicited from stakeholders and families. A draft of the adapted version of the program was then developed, additional feedback was sought from experts and stakeholders and a second pilot-testing phase was completed. Feedback was again collected from families who received the intervention and from stakeholders who participated in the pilot. The intervention protocol and content were further refined to implement in the three pediatric primary care clinics. Effectiveness study: Participants were identified during clinic well- and sick-child visits and through queries of electronic health records. After completing a family health assessment, families were randomly assigned to the adapted program or services as usual. Participating families completed routine assessments about family health behaviors, child health behaviors, family well-being and support, and other topics. Following the assessments, feedback sessions were initiated. The first feedback session focused on understanding (a) the caregivers’ perception of their needs; (b) their child’s health, adjustment, and behavior; and (c) the caregivers’ motivation to change parenting and family management practices in support of health behavior change. Additionally, over a 6-month period, families participated in eight to 16 parenting sessions tailored to the specific needs identified in the family health routine assessment and focused on a specific behavior change goal, such as setting limits on snacking between family meals or monitoring children’s sedentary and physical activity time. In the second and third feedback sessions, the coordinator began by checking in with the family about their progress, discussing barriers they experienced, and exploring the ways that the previous feedback and parenting sessions were helpful for them in catalyzing and supporting healthy lifestyle behavior change. Additionally, coordinators provided families with referrals to existing resources in the community. In weeks where a face-to-face session was not scheduled or did not occur, the coordinator conducted a 15- to 30-minute phone-based coaching session. The purpose was to maintain contact with the family and help problem- solve challenges, reinforce positive achievements, and continually address motivation to change and barriers to engagement. Primary care screening and assessment of child BMI: Children were referred to the demonstration project by their primary care provider during a health care visit where a height and weight was obtained and it was determined that the child was overweight or had obesity. After the referral was made, parents were mailed an introductory letter and fact sheet by the study team. A bilingual study coordinator contacted parents by phone and explained that the research study was to examine strategies to improve the care that is provided for children who require weight management. The coordinator obtained verbal informed consent from the parent and administered a 20-minute baseline survey. Child assigned to intervention: After the parent completed the survey, the child was randomly assigned to a healthy weight clinic in one of the two federally qualified health centers or to the weight management program delivered at one of the two YMCAs. Each of the two intervention groups received an intensive 6- month intervention, followed by a 6-month maintenance period that delivered 30 or more hours of contact time over one year. In addition, children in both intervention groups were exposed to quality of care improvements in their federally qualified health centers, which included primary care provider weight management training and text messages to participating families for self-guided behavior change support. Healthy weight clinic: This intervention was clinic-based and used a multidisciplinary team, including, a pediatrician, community health worker, dietician, and access to behavioral/mental health providers, as needed. The team was trained to deliver motivational interviewing and behavioral modification techniques to engage families in setting and following through on healthy eating and activity goals. Visits alternated between group visits with other children and families in the program and individual visits for the first 6 months and individual visits in the second 6 months. During the first 6 months of the intervention, the community health worker or dietitian made bi-weekly phone calls to the family on weeks they did not have an in person visit. During the second 6 months, they provided once-monthly calls. YMCA weight management program: This intervention was a community- based intervention where staff at two local YMCAs were trained to implement the program. Two YMCA group leaders provided support, education and activities during sessions, which included goal setting and action planning, a parent discussion, and 60 minutes of physical activity for the children. The program was delivered over 12 months, which included 16 weekly sessions, followed by four sessions delivered every other week and concluded with five monthly sessions. In addition to the contact named above, Shannon Slawter Legeer (Assistant Director), Deitra H. Lee (Analyst-in-Charge), and Kristen M. Pinnock made key contributions to this report. Also contributing were Krister Friday, Richard Lipinski, Laurie Pachter, Ethiene Salgado- Rodriguez, and Emily Wilson Schwark.", "summary": "Childhood obesity affects nearly 14 million children aged 2 to 19 years in the United States. Children in low-income families are disproportionately affected, with about 1 in 5 having obesity. Studies suggest that children with obesity are likely to become adults who are overweight or have obesity, which can contribute to poorer health and higher health care expenditures. CDC was designated as the agency to design and manage the project and has awarded grants in three separate phases. GAO was asked to examine the CORD Project, including what has been learned regarding strategies to reduce childhood obesity. In this report, GAO describes 1) the extent to which CDC changed the design of the CORD Project between grant phases, 2) the results of the CORD Project and factors that have affected implementation, and 3) efforts by CDC and others to disseminate results and lessons learned. To conduct this work, GAO reviewed planning and grant documentation for the three CORD phases, published articles about the design of CORD phase 1 and 2, and documentation describing the results of CORD phase 1. GAO also interviewed CDC officials, CORD phase 1 and 2 grantees, and officials from other HHS agencies involved in the design of the CORD Project. HHS provided technical comments on a draft of this report, which GAO incorporated as appropriate. The Centers for Disease Control and Prevention (CDC) has made four key changes to the design of the Childhood Obesity Research Demonstration (CORD) Project between each of the three grant phases. Established by law in 2009, the project provides research grants to develop and implement strategies to reduce obesity among low-income children. One of CDC's design changes, for example, was to modify the scope of the project (i.e., type of strategies implemented by grantees). After CORD phase 1, CDC officials shifted the scope from prevention—through the implementation of strategies in community settings, such as schools, and in health care settings—to the treatment of children who were overweight or had obesity. According to CDC officials, the agency made this change due to the shorter time frame for implementing CORD phase 2 and in response to existing national recommendations related to childhood obesity. CDC also changed the purpose of the project's study design prior to phase 3. Whereas CORD phases 1 and 2 were intended to build knowledge and evidence of effective strategies, CDC modified CORD phase 3 to focus on translating effective strategies into routine use by converting them into a package of materials that others could replicate. To evaluate the effectiveness of CORD phase 1—the only phase that is complete—CDC awarded a grant to an independent entity to aggregate results across the three grantees, and each grantee conducted their own evaluation. The evaluation center and the grantees reported some improvements in children who received CORD 1 strategies. For example, the evaluation center reported small but positive changes in outcomes measured, which included body mass index and fruit and vegetable consumption. These improvements were most often observed among children who received primary care strategies, such as individualized counseling, and children who participated in public health strategies, such as an evidence-based nutritional program, in addition to the primary care strategies. CDC and grantees identified several factors during the first two phases that affected the ability to implement strategies to reduce obesity among low-income children. For example, grantees noted that the preexistence of programs and policies that promoted healthy behaviors positively affected their implementation of CORD strategies. CDC officials identified the turnover of principals and other school or clinic staff as negatively affecting the implementation and suggested that future researchers incorporate staff retraining costs into their strategies as a way to help mitigate this challenge. CDC has taken steps to share CORD design materials and results through published literature, websites, and conferences. It has also coordinated with other Department of Health and Human Services (HHS) offices and agencies to promote the wider adoption of CORD strategies in low-income communities. For example, CDC has collaborated with an office in HHS to fund a project to increase the use of a specific weight management program used in CORD phase 1.", "document_type": "gao"}
{"report": "The Secret Service has processes to vet individuals differently depending on the person’s expected proximity to the President, using a combination of physical screening and background checks, as illustrated in figure 1. According to Secret Service officials, physical screening includes the use of equipment such as wands and magnetometers to secure the property. Background checks assess in part whether an individual has a history of criminal activity. In some cases, enhanced background checks identify other types of threats. The Secret Service develops and executes a security plan to ensure that the outer, middle, and inner layers at the travel location are secure. Officials from the Secret Service confirmed that agency policies aim to provide comprehensive planning guidance for their agents’ activities but are not meant to be all inclusive. Outer Layer: The Secret Service uses physical screening measures to establish a layer of security around the Mar-a-Lago property. According to Secret Service officials, state and local law enforcement and the U.S. Coast Guard may monitor entry onto the property or perform visual checks of individuals entering the property and surrounding waterways. Depending on where the President is, guests may be required to pass through a physical security checkpoint that employs magnetometers, wands, and visual checks to assess physical threats. Middle Layer: Officials from the Secret Service said that they use physical screening measures for individuals and any rooms that the President may access during his visit. Officials told us that if they are notified of the President’s planned arrival to a specific room, they will secure that room. Inner Layer: In advance of the President’s arrival, the Secret Service has a process requiring vetting of individuals who are expected to be within close proximity to the President for a planned purpose or in certain secure areas. According to Secret Service officials, individuals who need access to secure areas but who are not expected to interact directly with the President, such as wait staff and other workers, are to undergo a background check in addition to physical screening. Individuals who are expected to meet the President are to undergo a background check and an enhanced background check. Officials from the Secret Service said that they are responsible for collecting the findings from these checks and making recommendations to the Executive Office of the President on whether individuals with derogatory findings should be allowed to access a space. According to officials from the Secret Service, staff at Mar-a-Lago routinely undergo background checks. In order to conduct the background check, the Secret Service is to use personally identifiable information for each individual, and those Individuals’ names may be checked against indexes maintained by the Secret Service and other federal, state, and local law enforcement organizations. The Secret Service’s guidance notes that submission of the requested information to run a background check is based on individuals voluntarily providing the needed information. In order to conduct an enhanced background check, the Secret Service collaborates with the Federal Bureau of Investigation and other federal agency partners. According to officials from the Secret Service, the Executive Office of the President is responsible for identifying individuals who are expected to meet with the President and providing the Secret Service with the names and the personally identifiable information needed to complete these checks. According to Secret Service guidance, White House staff is expected to submit all names to the Secret Service at least 72 hours in advance of the President’s arrival. Advance agents are also responsible for setting deadlines for completing background checks. Officials from the Secret Service said that, based on the information received from these checks, the Secret Service will make a recommendation to the Executive Office of the President on whether an individual should be granted access to the President. According to these officials, the Executive Office of the President ultimately determines whether or not an individual will have access. However, the Secret Service is responsible for ensuring that the area is safe and that the individual is physically screened. DOD’s White House Communications Agency and the Secret Service each have specific responsibilities for establishing secure communications and secure areas for handling classified information when the President travels to domestic locations, such as Mar-a-Lago. DOD’s White House Communications Agency: This organization is an information technology unit within DOD that supports the President and his staff during presidential trips. This organization’s mission is to provide information services to the President, Vice President, National Security Staff, Secret Service, and others when directed. According to agency guidance and officials, the White House Communications Agency is responsible for installing secure communications equipment that enables the exchange of classified information in areas that may be used by these entities. Secret Service: According to officials from the Secret Service, they send an advance team that coordinates with the White House Communications Agency to set up a conference center for the President where classified information may be exchanged, among other things. These officials stated that they provide security at the entrance of this conference center and perform security sweeps to ensure that it is safe and secure. DOD and the Secret Service coordinate to establish and secure several areas that are available for handling classified information when the President travels to locations such as Mar-a-Lago, as shown in figure 2. These areas include a conference center, spaces used by staff of the National Security Council and Executive Office of the President, and presidential transportation vehicles. Details associated with these areas and facilities are sensitive and have been omitted from this report. The Secret Service and DOD are subject to regulations governing reimbursements to employees for official travel. Processes exist to review these travel-related expenses when personnel from these agencies travel. These processes are the same when personnel accompany the President to Mar-a-Lago. Two regulations implement statutory requirements and executive branch policies for travel, allowing agencies to pay for or reimburse their employees’ per diem expenses (lodging, meals and incidental expenses) and other travel-related expenses: The Federal Travel Regulation (FTR), issued by the General Services Administration applies to the Secret Service’s personnel. The Joint Travel Regulations (JTR), issued by the Department of Defense apply to DOD personnel. Both regulations allow agencies to pay for employees’ daily expenses when they are traveling within the continental United States, based on allowances set by the General Services Administration for the applicable location and date (per diem rates) or the actual expense of travel. Under the Federal Travel Regulation, the maximum amount that a civilian employee may be reimbursed is 300 percent of the applicable per diem rate. The Joint Travel Regulations allow uniformed service members to be reimbursed up to 300 percent of the per diem rate when they are traveling in the continental United States, but they can be reimbursed more than 300 percent of the per diem rate for lodging when traveling outside the continental United States. Officials from the Secret Service stated that they apply the same cost oversight processes for all presidential travel. Expenses for lodging and operational space are centrally billed to the agency, and employee meals and incidental expenses are reimbursed to the traveler. In accordance with policy, the Secret Service tries to acquire lodging at the General Services Administration’s per diem lodging rate and must submit a waiver request for any room that exceeds this designated rate by any amount. The Secret Service field office closest to the travel destination is responsible for arranging for these spaces, negotiating rates, and if necessary submitting a waiver request to officials in the Secret Service’s Logistics Resource Center. The Logistics Resource Center is to review the waiver request, determine whether a more cost effective method exists to meet the need, and approve or reject the request. In some cases, the Secret Service may not be able to acquire rooms at the per diem lodging rate, or agents may need rooms for operational purposes that exceed 300 percent of the per diem rate, which is more than is allowed for lodging under the Federal Travel Regulation. For example, the Secret Service may use a room for operational purposes or reserve rooms adjacent to the President to better protect him. In addition, to meet operational demands, the Secret Service may require a certain number of agents to stay at the hotel in which the President is staying, so that they are within a certain proximity of the President at all times. Furthermore, officials from the Secret Service said that members of the Secret Service canine teams must stay at hotels that allow animals, and rooms at these hotels may exceed the General Services Administration lodging rate. The authorities the Secret Service has relied on to pay for hotel rooms needed to meet its operational requirements do not limit how much the agency can pay. Further, Congress passed a law in May of 2017 excepting the Secret Service from regulatory caps on room rentals, regardless of room purpose. Nevertheless, consistent with the Secret Service waiver process, personnel are still required to submit waiver requests for operational spaces to justify the need to book rooms during the President’s trips to Mar-a-Lago at prices higher than the General Service Administration lodging rates. We confirmed that a blanket waiver request was submitted and approved for all rooms at Mar-a-Lago that exceeded the General Services Administration per diem lodging rate during the President’s trips to Mar-a-Lago that are covered by this review. Additionally, we reviewed Secret Service documentation and confirmed that Secret Service personnel did not exceed the 300 percent threshold for lodging. For meals and incidental expenses, the Secret Service’s employees who are on official duty are to submit a claim for reimbursement electronically or by paper and receipts, as applicable, at the conclusion of the trip. Approving officials are to approve (or deny) expenses, and the Secret Service’s Financial Management Division authorizes reimbursement for approved travel. DOD personnel use the same processes for travel to Mar-a-Lago as they do for other Presidential trips to oversee costs for lodging, meals, and incidental expenses. According to officials from DOD’s Defense Travel Management Office, their office establishes travel policy that applies to the four organizations that travel in support of the President’s trips. DOD personnel use the Defense Travel System to submit travel documents, including vouchers and receipts, as applicable. According to officials, lodging may be booked and reimbursed on an individual basis or centrally billed if a block of rooms is needed over the same period. Meals and incidental expenses are reimbursed to the traveler. Like Secret Service’s personnel, DOD personnel must obtain approval from an authorizing official prior to the trip to exceed the General Services Administration per diem lodging rate, consistent with the Federal Travel Regulation and Joint Travel Regulations. According to officials from the Defense Travel Management Office, DOD typically would not reimburse expenses above the approved lodging rate if lodging at the approved rate was available within the region. However, officials from the Defense Finance and Accounting Service indicated that presidential trips may require such a deviation. These approvals are to be tracked in the Defense Travel System. The White House Military Office, which includes the White House Communications Agency, also sends personnel with the President when he travels. White House Communications Agency officials told us that its lodging and operational space for these personnel are typically coordinated by the White House Travel Office and that DOD personnel pay for the associated costs and seek reimbursement from DOD after the trip is complete. According to officials from the White House Communications Agency, some personnel are required to remain at, or near, the Mar-a-Lago property. If they are not required to stay at or near the property, they will try to obtain lodging at hotels in the area at the General Services Administration’s per diem rate for lodging. DOD officials told us that according to the Joint Travel Regulations, DOD is not authorized to pay or reimburse daily expenses above the 300 percent ceiling. In connection with the President’s travel to Mar-a-Lago between February 3, 2017 and March 5, 2017, DOD personnel exceeded the General Services Administration per diem rate but did not exceed the 300 percent threshold. According to officials from the Defense Travel Management Office, operational space used for official business is governed by the Federal Acquisition Regulation. White House Communications Agency officials told us that they have generally used space near the Mar-a-Lago property but leased property, effective September 2017, near Mar-a-Lago to reduce the cost of supporting the President’s trips to the property. Treasury has regular processes for receiving payments designated as gifts to the United States and gifts to reduce the public debt. Treasury officials stated that any payments received from The Trump Organization or the President that are designated as gifts would be handled using these processes. Under federal law, Treasury may receive general gifts to the U.S. Government and may also receive gifts to reduce the public debt. Treasury has developed processes to accept these types of payments, as shown in figure 3. Treasury officials said there are three accounts available to receive payments as gifts—a general gift account, a general fund receipts account, and an account for gifts to reduce the public debt. Any of these accounts could receive payments designated as gifts by the President or The Trump Organization. Treasury officials told us they would deposit such payments into the account for gifts to the U.S. Government unless the payment source specified that the funds should be used to reduce the public debt. Treasury received one payment from The Trump Organization, for $151,470 that was submitted through Treasury’s processes on February 22, 2018. In May 2017, The Trump Organization issued a policy addressing profits generated from foreign government patronage at its businesses. The Trump Organization’s policy states that it will make a single lump-sum payment annually after the end of its fiscal year, which ends on December 31st. We did not identify any other payments that Treasury received from The Trump Organization or the President between January 21, 2017, and August 1, 2018. In September 2018, an attorney for The Trump Organization confirmed that the organization had not made any payments since February 22, 2018. We provided copies of this draft report to DOD, DHS, the Department of Justice, the General Services Administration, the Department of Treasury, and the Executive Office of the President for comment. We also provided a section to the Trump Organization for comment. DHS provided written comments, which are reprinted in their entirety in appendix I. DHS, DOD, the Department of Treasury and the Department of Justice also provided technical comments, which we incorporated into this report as appropriate. The Executive Office of the President and the Trump Organization provided no comments. As agreed with your offices, unless you publicly release this report earlier, we will not issue the report until 30 days from the report date. At that time, we will also provide copies to the Secretary of Defense, the Director of the Secret Service, the Secretary of Homeland Security, the Attorney General, the Director of the Federal Bureau of Investigation, the Administrator of the General Services Administration, and the Secretary of the Treasury. In addition, this report will be available at no charge on the GAO website at www.gao.gov. If you or your staff have any questions about this report, please contact Joseph (Joe) Kirschbaum at (202) 512-9971 or at KirschbaumJ@gao.gov or Diana Maurer at (202) 512-9627 or at MaurerD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in Appendix II. In addition to the contacts named above, Gina R. Hoffman, Assistant Director; Joseph P. Cruz, Assistant Director; Tracy Barnes, Nicholas Benne, Jennifer Kamara, Joanne Landesman, Amie Lesser, Thomas Lombardi, Carol Petersen, Michael Silver, Janet Temko-Blinder, Christopher Turner, Kayli Westling, and Alex Winograd made key contributions to this report.", "summary": "The President has made numerous trips to the Mar-a-Lago property in Palm Beach, Florida, during which he met with foreign leaders and conducted presidential activities. GAO was asked to review the establishment of secure areas for use by the President at Mar-a-Lago. This report provides information on, among other things, (1) vetting of individuals expected to be near the President; (2) efforts to establish secure areas for handling classified information; and (3) regulations and processes for agency expenditures on employees who travel with the President. This is a public version of a sensitive report that GAO issued in October 2018. Information that the Secret Service and DOD deemed sensitive has been omitted. GAO analyzed laws, regulations, policies, and procedures; reviewed agreements between federal agencies and trip after-action reports; and interviewed DOD and Secret Service officials. GAO also reviewed vouchers from the four presidential trips to Mar-a-Lago from February 3, 2017 through March 5, 2017.GAO also reviewed documentation and descriptions of specific security practices with DOD and Secret Service officials. The Executive Office of the President has not responded to requests regarding its role in assisting DOD and the Secret Service in carrying out their responsibilities. The U.S. Secret Service (Secret Service) vets individuals differently depending on the person's expected proximity to the President when he travels, including during his visits to Mar-a-Lago. According to Secret Service officials, vetting may include using physical screening (measures to detect physical threats to the president and secure the property) and background checks intended to identify individuals who have prior criminal activity or present other types of threats. Individuals at Mar-a-Lago who are not expected to meet with the President or enter spaces the President may visit pass through an outer layer of security consisting of physical screening checkpoints surrounding the property. The Secret Service physically screens all individuals who will access areas where the President will be present, such as a dining room. According to Secret Service officials, individuals who have a meeting with the President generally undergo both physical screening and enhanced background checks. The Department of Defense (DOD) and the Secret Service coordinate to establish and secure several areas that are suitable for handling classified information when the President travels to Mar-a-Lago. These areas include a conference center, spaces used by staff of the National Security Council and the Executive Office of the President, and presidential transportation vehicles. Details associated with these areas and facilities are sensitive and have been omitted from this report. The Secret Service and DOD are subject to regulations that govern the reimbursement of employees for official travel expenses. Both organizations have processes to review these travel-related expenses when their personnel travel with the President and try to acquire lodging at the General Services Administration's per diem lodging rate. When the Secret Service is not able to acquire rooms at the per diem lodging rate, including when it needs rooms for operational purposes that exceed 300 percent of the per diem rate (a threshold set by the General Services Administration), employees must submit a waiver request. DOD personnel must also obtain approval when costs exceed the General Services Administration's lodging rate. Our review of DOD vouchers and Secret Service documentation confirmed that personnel did not exceed the 300 percent threshold for lodging during the Mar-a-Lago trips examined in this review. We assessed the costs of Presidential travel in a separate report.", "document_type": "gao"}
{"report": "Prior to January 1, 2018, TRICARE provided benefits through three main plan options for its non-Medicare-eligible beneficiary population— TRICARE Prime, Standard, and Extra. These options varied by enrollment requirements, choices in civilian and military treatment facility providers, and the amount beneficiaries must contribute toward the cost of their care. (See table 1.) The NDAA for Fiscal Year 2017 terminated the TRICARE Standard and Extra plans beginning on January 1, 2018, and introduced TRICARE Select. Beneficiaries who had used the TRICARE Standard and Extra plans as of December 31, 2017 were automatically enrolled in TRICARE Select for the first year of the new plan, but as of January 1, 2019, beneficiaries were required to actively enroll in TRICARE Select. DOD uses two regional managed care support contractors to develop networks of civilian providers to serve all TRICARE beneficiaries. Within the regions, contractors are required to develop these networks of providers in areas called Prime Service Areas (PSA), which are geographic areas usually within an approximate 40-mile radius of a military inpatient treatment facility, as well as in areas outside of PSA locations, or non-PSAs. To develop the networks, the contractors enter into contracts with some providers—referred to as network providers—to treat TRICARE patients at an agreed upon reimbursement rate. Beneficiaries can also receive care from certified nonnetwork providers. However, beneficiaries visiting a nonnetwork provider may have to pay for the care at the time of the visit and later file a claim for reimbursement, whereas beneficiaries visiting a network provider are only responsible for paying a copayment or cost-sharing amount. The NDAA for Fiscal Year 2017 also mandated that DOD ensure at least 85 percent of the TRICARE Select beneficiary population be covered by the TRICARE network of providers by January 1, 2018, and that DOD determine access standards and ensure the program meets or exceeds access standards of “high-performing health care systems in the United States” for health care appointments. DOD has contracted both of these efforts to the two contractors. Non-Prime beneficiaries’ ratings of TRICARE were generally unchanged during the first year following the transition from TRICARE Standard and Extra to TRICARE Select. Specifically, there was no statistically significant change from the 2017/2018 surveys to the 2019 survey in the percent of beneficiaries who positively rated their health care and their health plans—defined as giving responses of 8 or higher (out of 10) on each survey question. In the 2019 survey, 80 percent of beneficiaries rated their health care positively, and 67 percent rated the TRICARE health plan positively. (See fig. 1.) Non-Prime TRICARE beneficiaries also rated three different types of providers and of the three, ratings of primary care providers decreased from the 2017/2018 to 2019 surveys. The percent of beneficiaries who positively rated their primary care providers decreased from 85 to 80 percent in the 2019 survey. We found no statistically significant differences from the 2017/2018 surveys to the 2019 survey in beneficiaries’ positive ratings of specialty care and mental health care providers, with 83 and 73 percent of beneficiaries reporting positive ratings of their specialty care and mental health care providers, respectively in 2019. (See fig. 2.) In the first year of TRICARE Select, a higher percentage of non-Prime beneficiaries reported experiencing problems finding civilian health care providers who accepted TRICARE than before the transition, particularly for specialty care. We found there was a statistically significant increase in the percentage of beneficiaries who reported problems finding a provider that would accept TRICARE from 27 to 32 percent from the 2017/2018 surveys to the 2019 survey. In particular, there was a statistically significant increase in the percentage of beneficiaries who reported problems finding a specialty care provider in the 2019 survey (24 percent) compared to the 2017/2018 surveys (18 percent). The percent of beneficiaries who reported problems accessing primary care or mental health care remained statistically unchanged with 26 and 31 percent reporting problems, respectively, in the 2019 survey. (See fig. 3.) We also found that a higher percentage of beneficiaries located in PSAs reported experiencing problems finding providers, whereas there was no change for beneficiaries located in non-PSA areas. Specifically, from the 2017/2018 surveys to the 2019 survey, there was a statistically significant increase in the percentage of beneficiaries located in PSAs who reported problems finding any type of civilian provider (27 to 34 percent), primary care providers (21 to 29 percent), and specialty care providers (18 to 25 percent). There was no statistically significant change among beneficiaries in PSAs reporting problems finding mental health care providers or among beneficiaries in non-PSAs for any provider types. (See fig. 4.) To help beneficiaries find providers that accept TRICARE patients, managed care support contractors develop networks of providers in PSAs and some non-PSA locations. Each month, these contractors report to DOD the percent of Select beneficiaries who were covered by the TRICARE network of providers, according to contractor-developed measures of adequate access to care. Although nearly one-third of beneficiaries reported experiencing problems finding a civilian provider, DOD officials told us that nearly 100 percent of beneficiaries in the East have had adequate access to a network provider since January 1, 2018, exceeding the 85 percent requirement. For the West, DOD officials said the contractor reported that more than 85 percent of beneficiaries had adequate access to a network provider as of August 2018. According to DOD officials, the two contractors used different methods to ensure adequate access to a network provider: In the East region, the contractor decided to develop networks of civilian providers in the entire region. In the West region, the spread-out geography of the region made it difficult to develop networks of civilian providers throughout the entire region. Therefore, the contractor used mapping software to determine areas within non-PSAs which had large populations of TRICARE Select beneficiaries. As a result, the contractor identified 12 areas in the West region—which it called Select Areas—to develop additional networks of civilian providers in order to meet the requirement. Contractors also provide resources to beneficiaries to help them identify providers that accept TRICARE patients. Contractors maintain lists of network and other TRICARE-certified providers that accept TRICARE patients, and monitor and report on the accuracy of these lists to DOD monthly. However, contractor representatives noted that providers can decide to accept or not accept TRICARE patients at any time, and these changes are not always reflected in the lists. Contractor representatives explained that if a beneficiary cannot find a provider to accept TRICARE for needed care, the beneficiary can submit a complaint to the contractor. Contractor representatives said that they can address beneficiary complaints by attempting to identify and certify new providers, but noted that some subspecialty providers are not available in all areas. Representatives from one contractor told us that they have identified alternative sources of care when providers are not available. For example, when no civilian psychiatrists were accepting new patients in a remote area, the contractor offered beneficiaries telehealth services from a military treatment facility. There was no statistically significant change after the transition to TRICARE Select in the percent of non-Prime beneficiaries who reported being able to get an appointment as soon as they needed. In the 2019 survey, 88 percent of beneficiaries reported that they could usually or always obtain an appointment for primary care as soon as they needed and 86 percent reported being able to do so for specialty care. (See fig. 5.) Similarly, about 65 percent of beneficiaries reported waiting a week or less between scheduling an appointment for non-urgent care and meeting with their doctor in the 2019 survey, and 83 percent of beneficiaries reported waiting 2 weeks or less. There was no change in the percent of civilian providers nationwide who reported accepting new TRICARE patients if they were also accepting other new patients after the transition to TRICARE Select. Across all provider types, 67 percent of providers in the 2019 survey reported accepting new TRICARE patients if they were also accepting other new patients; this percentage was not statistically significantly different from the 2017/2018 surveys. There was also no statistically significant change among specific provider types—in the 2019 survey, 47 percent of mental health care providers and about 90 percent of primary care and specialty care providers reported accepting new TRICARE patients if they were accepting any new patients. When we analyzed provider responses by network status and specialty, the surveys indicated a decrease in the percentage of network mental health providers who were accepting new TRICARE patients if they were also accepting other new patients. The percent of these network mental health providers decreased a statistically significant amount from 91 percent in the 2017/2018 surveys to 84 percent in the 2019 survey. (See fig. 6.) However, there was no change in the overall percentage of all network or all nonnetwork providers that were accepting new TRICARE patients if they were also accepting any new patients—93 percent of network and 58 percent of nonnetwork providers in the 2019 survey. When we analyzed provider responses by location, we found that provider acceptance of new TRICARE patients decreased by a statistically significant amount in non-PSAs. Specifically, a lower percentage of providers located in non-PSAs reported accepting new TRICARE patients if they were accepting other new patients, decreasing from 72 percent in the 2017/2018 surveys to 68 percent in the 2019 survey. This percentage did not significantly change for providers in PSAs. (See fig. 7.) There were few changes in the reasons providers gave for not accepting TRICARE patients in the first year of TRICARE Select. (See Table 2 for a list of reasons providers offered in the 2019 survey.) Of 14 categories of reasons that providers gave, there was a statistically significant change in two categories between the 2017/2018 surveys to the 2019 survey. Specifically, the percentage of providers who listed reimbursement as a reason for not accepting new TRICARE patients declined from 11 percent to 8 percent, and the percentage of providers who listed that the doctor was not available or too busy increased from 4 percent to 8 percent. DOD provided technical comments on a draft of this report, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. James Cosgrove, (202) 512-7114 or cosgrovej@gao.gov. In addition to the contact named above, individuals making key contributions to this report include Tom Conahan (Assistant Director), A. Elizabeth Dobrenz and Jeffrey Mayhew (Analysts-in-Charge), Jennie Apter, Alexander Cattran, Jacquelyn Hamilton, Vikki Porter, and Jeffrey Tamburello. Defense Health Care: TRICARE Surveys Indicate Nonenrolled Beneficiaries’ Access to Care Has Generally Improved, GAO-18-361 (Washington, D.C.: Mar. 29, 2018). Defense Health Care: More-Specific Guidance Needed for Assessing Nonenrolled TRICARE Beneficiaries’ Access to Care, GAO-14-384 (Washington, D.C.: Apr. 28, 2014). Defense Health Care: TRICARE Multiyear Surveys Indicate Problems with Access to Care for Nonenrolled Beneficiaries, GAO-13-364 (Washington, D.C.: Apr. 2, 2013). Defense Health Care: DOD Lacks Assurance That Selected Reserve Members Are Informed About TRICARE Reserve Select, GAO-11-551 (Washington, D.C.: June 3, 2011). Defense Health Care: Access to Civilian Providers under TRICARE Standard and Extra, GAO-11-500 (Washington, D.C.: June 2, 2011). Defense Health Care: 2008 Access to Care Surveys Indicate Some Problems, but Beneficiary Satisfaction Is Similar to Other Health Plans, GAO-10-402 (Washington, D.C.: Mar. 31, 2010).", "summary": "DOD provided health care to more than 9 million eligible beneficiaries through TRICARE in fiscal year 2018. Most of these beneficiaries were enrolled in TRICARE's managed care plan—TRICARE Prime. However, about 2 million beneficiaries received care primarily from civilian providers through TRICARE's non-Prime options: TRICARE Standard and Extra. Effective January 1, 2018, these two options were eliminated and TRICARE Select was implemented. TRICARE Select has similar benefits for provider choice and obtaining care from civilian providers as TRICARE Standard and Extra, but includes access standards to ensure at least 85 percent of enrollees are covered by TRICARE's network of civilian providers, among other things. The National Defense Authorization Act (NDAA) for Fiscal Year 2008 included a provision for GAO to review results of DOD surveys of non-Prime beneficiaries and civilian providers. Additionally, the NDAA for Fiscal Year 2017 included a provision for GAO to review access to care after implementation of TRICARE Select in 2018. This report addresses both provisions. GAO analyzed DOD's survey results to determine changes after implementation of TRICARE Select in (1) non-Prime beneficiaries' ratings of TRICARE, (2) non-Prime beneficiaries' reported ability to find providers and obtain appointments, and (3) civilian providers' reported acceptance of TRICARE. GAO analyzed the results of the 2017-2019 surveys, and interviewed agency officials and DOD contractors. DOD provided technical comments, which GAO incorporated as appropriate. On January 1, 2018, the Department of Defense (DOD) implemented a new health plan option—TRICARE Select—for beneficiaries who primarily obtain care from civilian providers rather than through TRICARE's managed care plan—TRICARE Prime. DOD surveys indicate few changes in these non-Prime beneficiaries' satisfaction and access to care during the first year following the implementation of TRICARE Select, though GAO cannot directly attribute these differences to implementation due, in part, to other changes in the TRICARE program during the same time frame. Specifically, GAO found the following: There was no change in the percent of beneficiaries reporting positive ratings of their TRICARE health care and health plans—80 percent and 68 percent, respectively—in the first year of TRICARE Select. There was an increase in the percent of beneficiaries reporting problems accessing specialty providers from 18 to 24 percent in the first year of TRICARE Select. However, as the figure shows, there was no statistically significant change in the percent of beneficiaries reporting they received care as soon as needed for primary and specialty care appointments. There was no change in the percent of providers that reported accepting new TRICARE patients if they were also accepting any new patients—about 90 percent of primary care and specialty care providers, and 47 percent of mental health care providers—in the first year of TRICARE Select.", "document_type": "gao"}
{"report": "In 1994, Executive Order 12898 directed each federal agency to develop an environmental justice strategy that identifies and addresses disproportionately high and adverse human health or environmental effects of its programs, policies, and activities on minority populations and low-income populations. Together, the 1994 executive order and the 2011 MOU include eight areas that agencies’ environmental justice efforts should address, as appropriate, such as NEPA implementation and public participation. Working group members have documented their environmental justice strategies using environmental justice strategic plans. We have previously reported on the importance of certain leading practices in developing or updating strategic plans and developing periodic progress reports, including in our October 2011 review of EPA’s environmental justice efforts. We reported that a multi-year strategic plan articulates the fundamental mission of an organization and lays out its long-term general goals for implementing that mission, including resources needed to achieve the goals. To that end, during strategic planning, which should occur at least every 4 years, an agency should review its mission statement, review its strategic goals, align strategic goals and strategies, and align strategic and annual performance goals. In addition, a strategic plan should contain a description of how the goals will be achieved, including human capital, information, and other resources needed. Finally, agencies should develop annual performance plans with annual performance goals—linked to the overall strategic goals—and describe how the goals will be measured to assess progress in achieving them. As one method for assessing such progress, we identified key attributes of successful performance measures, such as having measurable targets. The 1994 executive order also created an interagency working group to coordinate federal environmental justice efforts by serving the following seven functions: Provide guidance to federal agencies on criteria for identifying disproportionately high and adverse human health or environmental effects on minority populations and low-income populations. Coordinate with, provide guidance to, and serve as a clearinghouse for each federal agency as it develops an environmental justice strategy, in order to ensure consistent administration, interpretation, and enforcement of programs, activities, and policies. Assist in coordinating research by, and stimulating cooperation among, EPA; the Department of Health and Human Services (HHS); Department of Housing and Urban Development (HUD); and other agencies conducting certain research, data collection, or analysis. Assist in coordinating data collection. Examine existing data and studies on environmental justice. Hold public meetings. Develop interagency model projects on environmental justice that demonstrate cooperation among federal agencies. After a period of relative inactivity, 16 agencies and CEQ recommitted to collaborating on environmental justice efforts through a revitalized interagency working group when they signed the 2011 MOU. We have previously found that federal agencies have used a variety of mechanisms to implement interagency collaborative efforts, including working groups, and that interagency collaboration mechanisms benefit from key features, which raise issues to consider when implementing such mechanisms. These features include defining and articulating a common outcome; reinforcing agency accountability for collaborative efforts through agency plans and reports; developing mechanisms to monitor, evaluate, and report on results; agreeing on or clarifying roles and responsibilities; including all relevant participants and determining their ability to commit resources; identifying and addressing resource needs; and documenting written guidance and agreements. The 1994 executive order did not create new authorities or programs to carry out federal environmental justice efforts. As a result, federal environmental justice efforts seek to use existing federal laws, programs, and funding to address environmental and health problems that disproportionately burden minority and low-income communities, such as exposure to environmental pollutants. Example of Capacity Building Funded by an EPA Environmental Justice Grant in Spartanburg, South Carolina EPA provided a $20,000 environmental justice grant to a community organization in Spartanburg, South Carolina, in 2000 to support three research projects on the health of residents and former employees at a fertilizer plant and landfill sites. The target area, on the south side of Spartanburg, had a 96 percent African-American population according to EPA’s 2002 IWG Status Report. EPA’s initial $20,000 grant paid for research to help confirm health issues related to nearby hazardous waste sites. According to EPA officials, this initial investment has helped Spartanburg secure investments in the community. As a result, Spartanburg now has community health centers, affordable housing, and a recreation center. Several environmental laws regulate pollutants in the air, water, or soil and generally require a regulated facility to obtain permits from EPA or a state. These laws also authorize the issuance of administrative orders, among other things, to require cleanup of contamination. For example: Under the Clean Air Act, EPA, along with state and local government units and other entities, regulates air emissions of various substances that harm human health. The Clean Water Act regulates discharges of pollutants into waters of the United States, including lakes, streams, and other water bodies. The Resource, Conservation, and Recovery Act prohibits the treatment, storage, and disposal of hazardous waste without a permit. In addition, the Comprehensive Environmental Response, Compensation, and Liability Act authorizes EPA to compel the responsible parties to clean up contaminated sites and also allows EPA to conduct cleanups and then seek reimbursement from the responsible parties. Federal enforcement actions include administrative orders issued by EPA and civil or criminal judicial actions brought by the Department of Justice (DOJ). Under NEPA, federal agencies must evaluate the environmental impacts of their proposed major federal actions using an environmental assessment or a more detailed environmental impact statement, with some exceptions. CEQ is responsible for overseeing federal agencies’ implementation of NEPA. In 1997, the council issued guidance stating that agencies should consider environmental justice issues at several stages of the NEPA process, as appropriate. This guidance provides principles for considering whether particular agency actions raise environmental justice issues, such as looking at the demographic composition of the affected area and seeking public participation. HHS has programs and initiatives that address environmental health issues. Such efforts include the Centers for Disease Control and Prevention’s National Environmental Public Health Tracking Network—a data initiative which brings together health and environmental data from national, state, and city sources—and the Centers for Disease Control and Prevention’s National Report on Human Exposure to Environmental Chemicals—a series of reports that uses biomonitoring to assess the U.S. population’s exposure to environmental chemicals. Title VI of the Civil Rights Act of 1964, as amended, prohibits discrimination based on race, color, or national origin in programs or activities that receive federal financial assistance. To carry out and enforce the provisions of the act, federal agencies have developed programs to receive and investigate allegations of discriminatory actions taken by recipients of federal funding. In addition to these laws and programs, EPA also established a National Environmental Justice Advisory Council (NEJAC) in 1993 to provide advice and recommendations to EPA’s Administrator about issues related to environmental justice. NEJAC provides a forum for diverse perspectives, with representatives from various sectors, including academia, community groups, industry and business, non-governmental and environmental organizations, state and local governments, and tribal governments and indigenous groups. In recent years, NEJAC has issued reports on key environmental justice issues, including one on industrial waterfront areas (ports) and another on water and wastewater infrastructure. Most of the agencies that signed the 2011 MOU have developed environmental justice strategic plans that contain strategic goals, but most have not shown clear progress toward these goals. Specifically, 14 of the 16 agencies have developed environmental strategic plans, and 12 also established strategic goals in these plans, but several agencies have not updated their plans in recent years. In addition, most agencies have not issued annual progress reports or established methods to assess progress. Most of the 16 agencies have developed environmental strategic plans, and most of these plans included strategic goals to help direct the agencies’ environmental justice efforts. As shown in table 1, 14 of the 16 agencies issued environmental justice strategic plans after 2011, when they agreed to develop or update such plans under the 2011 MOU. Of the 14 agencies that developed environmental justice strategic plans, 12 also established strategic goals in these plans, as shown in table 1. Many of the agencies had multiple goals with common themes. For example, eight agencies included goals that involved providing assistance, such as grants, technical assistance, or direct services, to environmental justice communities. Eight agencies also included goals that involved promoting public participation; seven agencies included goals that involved identifying and addressing environmental justice issues; four agencies included goals related to training or educating agency staff on environmental justice; four agencies included goals related to promoting enforcement of Title VI; three agencies included goals related to conducting research on environmental justice issues; and three agencies included goals related to incorporating environmental justice considerations into policies or guidance. Two agencies—the Department of Defense (DOD) and Small Business Administration (SBA)—did not issue environmental strategic plans after 2011 even though by signing the MOU they agreed, as appropriate, to develop or update their environmental justice strategies by early 2012. DOD issued such a plan in 1995, shortly after the executive order was signed but has not updated its plan since. We have previously reported that strategic planning serves as the starting point and foundation for defining what the agency seeks to accomplish, identifying the strategies it will use to achieve desired results, and then determining how well it succeeds in achieving goals and objectives. DOD officials said that the agency has not prioritized environmental justice efforts. By updating its environmental justice strategic plan, DOD would have a foundation for such efforts. SBA has never issued an environmental justice strategic plan. SBA officials said that the agency is uncertain whether it has a role in implementing environmental justice and they were in the process of reviewing whether SBA should continue its membership in the working group. By assessing whether to participate in the 2011 MOU, SBA could clarify its role. Of the 14 agencies that developed environmental justice strategic plans after 2011, six agencies have updated those plans and one has updated its priority areas on its website. The 2011 MOU directs agencies to update their strategic plans periodically, and GAO’s leading practices for strategic planning suggest that strategic plans should be updated every 4 years. Five of the six agencies—the U.S. Department of Agriculture (USDA), Department of the Interior (DOI), DOT, EPA, and General Services Administration (GSA)—issued updated strategic plans in 2016 in response to a request from the working group that all agencies update their strategic plans. The sixth agency, the Department of Energy (DOE), issued an updated strategic plan in 2017. HHS posted a list of “priority areas of focus” for environmental justice for 2015 through 2016 on its website. Agency officials noted that this was less resource-intensive than conducting a full review and update of the strategic plan. The remaining seven agencies—Commerce, Education, DHS, HUD, DOJ, Department of Labor (DOL), and Department of Veterans Affairs (VA)—have not updated their plans since issuing them after 2011. Six of these agencies issued their environmental justice strategic plans in 2012, and one of these agencies, DOJ, issued its revised strategic plan and a companion guidance document in 2014. As a result, as of 2019, these plans are more than 4 years old and may not reflect the agencies’ current approach. Some of these agencies have taken preliminary steps to update their plans, but with the exception of DHS, they do not have a time frame for developing an update according to agency officials. DHS officials stated that the agency was developing an updated environmental justice strategic plan, which is scheduled for formal internal review during calendar year 2019 and for release in 2020. DOJ officials stated that they plan to meet in 2019 to review and discuss possible updates to their strategic plan, but the agency does not intend to update it unless any significant changes have taken place since they reissued it in 2014. According to HUD officials, HUD prepared a draft of an updated environmental justice strategic plan for 2016 through 2020 and posted it online for public comment in November 2016, but the agency has not worked on the draft plan since then. According to agency officials, the draft plan has not been finalized because of staff losses and because HUD leadership prioritized other issues, such as long-term disaster recovery, over environmental justice issues. Officials from Commerce stated that the agency has not updated its environmental justice strategic plan because of the time and resources that this would require. Officials from Education, DOJ, DOL, and VA said that they do not believe it is necessary to update their agency plans because they are continuing to implement their existing plans or because their approach to environmental justice work has not changed since their plans were issued. However, in updating their plans, which are no longer current, the agencies could explain that significant changes were not made. By updating their strategic plans or by reaffirming the validity of their current plans, these agencies (Commerce, Education, DHS, HUD, DOJ, DOL, VA) would have a current plan to guide their environmental justice activities as they committed to do in the 2011 MOU. While 12 agencies have developed an environmental justice strategic plan with strategic goals, most of them have not shown clear progress toward achieving their environmental justice goals and the purpose of the executive order. Specifically, the agencies have not comprehensively assessed how environmental justice fits with their overall missions or their progress toward the implementation of their strategic goals by issuing annual progress reports or by establishing methods to gauge their progress, such as performance measures. Furthermore, officials from most agencies said that they are unable to determine how much progress they have made toward achieving the major requirement from the executive order because they do not have a way to assess progress. Of the 14 agencies that developed environmental justice strategic plans after 2011, we found that seven of the agencies—Commerce, DHS, DOE, DOL, EPA, GSA, and HUD—assessed and discussed how their environmental justice efforts aligned with their overall missions. For example, HUD’s environmental justice strategic plan contains a section that describes HUD’s mission to create strong, sustainable, inclusive communities and quality, affordable homes for all. The section then discusses its overall strategic goals and their relationship to environmental justice. For example, HUD’s goal to build inclusive and sustainable communities free from discrimination includes a subgoal to promote energy-efficient buildings and location-efficient communities that are healthy, affordable, and diverse. Similarly, Commerce includes a section in its environmental justice strategic plan entitled “Relationship of Environmental Justice to Agency Mission and Agency Strategic Plan Goals or Objectives.” Among the agency-wide goals that support environmental justice, Commerce describes the National Oceanic and Atmospheric Administration’s (NOAA) efforts to manage fisheries, coastal habitats and species, and protected areas, and to provide information and warnings about weather conditions to the nation, including vulnerable populations. In our review of the 14 agencies’ environmental justice strategic plans, we found that seven of these plans did not clearly show how the agencies assessed alignment between the agencies’ environmental justice plans and overall mission, although the 1994 executive order directed each agency to make achieving environmental justice part of its mission by identifying and addressing, as appropriate, disproportionately high and adverse human health or environmental effects of its programs, policies, and activities on minority populations and low-income populations. In addition, EPA officials questioned how some environmental justice strategic plans from agencies related to their agency’s core missions and stated that to be effective, environmental justice should be considered throughout agencies’ missions. Our previous work found that effective strategic plans include, among other things, agency missions and long-term goals, and that to encourage the use of performance information, agency-wide goals and measures should align. Specifically, we have previously found that an agency’s program goals should flow from its mission statement and that its strategic goals—those that explain what results are expected and when they should be achieved—should also grow out of the mission statement. Although half of the agencies’ environmental justice strategic plans did not clearly show that their agencies assessed their connection to their overall mission, officials from DOI, DOJ, USDA, and VA said that they considered their agencies’ overall strategic plan’s mission and goals when they developed their environmental justice strategic plans. HHS officials commented that although HHS’s overall strategic plan is at a very high level, some elements within its environmental justice strategic plan, such as research, align with its overall strategic plan. The remaining agencies did not explain whether they had considered their agencies’ overall mission and goals when developing their environmental justice strategic plans. The 1994 executive order requires that each federal agency makes achieving environmental justice part of its mission and requires the working group to provide guidance to agencies in developing their environmental justice strategies. However, the working group has not provided guidance to federal agencies on how to develop a strategic plan, including how to demonstrate they have considered their broader agency missions in developing their environmental justice strategic plans. According to the working group’s charter, the working group creates committees to carry out its responsibilities under this executive order, and one of those committees—the Strategy and Implementation Progress Report Committee—is to be available as a resource to federal agencies as they develop and update their environmental justice strategies. However, according to officials from EPA, which chairs the working group, this committee has not provided guidance to agencies on what to include in their strategic plans because each agency determines the direction of their plans. By developing such guidance, the working group could assist agencies in planning more strategically about which parts of their mission are important for achieving environmental justice. Of the 14 agencies that developed environmental justice strategic plans after 2011, all have issued at least one annual progress report on the implementation of these plans, but most have not issued such reports every year, as they agreed to do in the 2011 MOU (see table 2). As shown in table 2, two of the 16 agencies—DHS and DOJ—have issued progress reports every year. In addition, several agencies issued progress reports consistently during the first few years after signing the 2011 MOU but subsequently stopped issuing reports. For example, four agencies—DOE, HHS, DOI, and DOL—issued progress reports through 2016 but have not issued reports for 2017. Four additional agencies issued reports through either 2014 or 2015 but have not issued any reports since then. Only four agencies—DHS, DOJ, EPA, and GSA— have issued progress reports for 2017. The two agencies that did not develop environmental justice strategic plans after 2011—DOD and SBA—have not issued any progress reports. According to the 2011 MOU, each agency should issue an annual report on the progress it has made over the previous year in implementing its environmental justice strategic plan. However, agency officials from most of the agencies said that they had not issued annual progress reports because of competing priorities. In addition, officials from some agencies, including USDA, DOE, and VA, cited the change in administration in January 2017 as a factor in delaying or not issuing their progress reports. Officials from DOE, HHS, and DOT said that they planned to issue overdue progress reports in the near future. The remaining agencies who have not issued a progress report since 2016 or earlier either did not have plans to issue progress reports or did not provide information on the status of their progress reports. However, we have previously found that annual program performance reports can provide essential information needed to assess federal agencies’ performance and hold agencies accountable for achieving results. Further, we have previously found that reporting is part of a broader performance management process that includes identifying mission and desired outcomes, measuring performance, and using this information to report on performance and to identify gaps in performance. By issuing progress reports each year, the agencies—Commerce, DOD, DOE, DOI, DOL, DOT, Education, HUD, HHS, USDA, and VA—can have more reasonable assurance that they have the information needed to assess their performance and to demonstrate results. The agencies’ progress reports generally describe the environmental justice activities that the agencies conducted but do not include any methods to assess progress. In our review of the most recent progress reports issued by each of the 14 agencies, we found that these reports contain information on activities undertaken by the agency over the previous year. Some of the reports are organized by the goals that the agencies identified in their environmental justice strategic plans and include information on the agencies’ future plans for environmental justice efforts. However, most agencies have not established a method that would allow them to evaluate their progress toward their environmental justice goals, such as establishing performance measures. According to Office of Management and Budget (OMB) guidance, performance measures are a means of evaluating efficiency, effectiveness, and results. The guidance also describes different types of these measures, including outcome measures—indicating an agency’s progress toward achieving the intended results of its efforts—and output measures—usually expressed quantitatively and describe the level of activities that will be provided over a period of time (e.g., the number of meetings held or the number of people trained). Agencies may assess their progress using milestones, which are scheduled events signifying the completion of a major deliverable or a phase of work (e.g., a date by which the agency will release a certain product), according to OMB guidance. While not performance measures, milestones can help agencies track the actions they have completed in implementing their environmental justice strategic plans. Of the 16 agencies that signed the 2011 MOU, four agencies—DOI, EPA, HHS, and USDA—have established performance measures or milestones for their environmental justice efforts. Of these four agencies, two agencies—HHS and EPA—have reported on their progress toward achieving the performance measures or milestones they established. Examples of how the four agencies measured the progress of their environmental justice efforts include the following: DOI established performance measures in its 2012 environmental justice strategic plan and reported on progress using these measures in its 2013, 2014, and 2015 annual progress reports. DOI changed from performance measures to milestones in its 2016 strategic plan. For example, in the 2016 plan, DOI has target years for establishing public outreach strategies and creating a best practices report on public outreach activities for environmental justice communities. According to agency officials, DOI made this change because the performance measures from the 2012 plan were difficult and time- consuming to use, were not helpful in tracking progress, and did not result in actionable outcomes. DOI believed that an action plan would be easier to use for identifying actions to meet goals and for measuring progress. DOI has not yet reported on the milestones from its 2016 strategic plan. Its most recent progress report is from fiscal year 2016, the first year that the strategic plan covers. Agency officials stated that DOI plans to report on the milestones in its fiscal year 2017 progress report but did not provide a timeline for when this report would be issued. In its environmental justice strategic plan for 2016 through 2020, EPA established four goals for reducing environmental and health hazards: reducing children’s exposure to lead, reducing contamination of small and tribal drinking water systems, reducing fine particle air pollution, and reducing contamination at hazardous waste sites. EPA established performance measures for tracking progress toward each of these goals at the national level. For example, EPA’s goal is to achieve air quality that meets national standards for fine particle pollution in all areas of the country, with special emphasis on communities with poor air quality and low-income populations. EPA collected data from air monitors to determine its progress toward achieving this goal. In its progress report for fiscal year 2017, EPA reported an increase from 43 percent of low-income populations living in counties that attained the standards in 2006 through 2008 to 92 percent in 2014 through 2016. According to agency officials, EPA plans to continue reporting on the goals in the future. EPA has also established several other performance measures and milestones for its environmental justice activities. For example, in its environmental justice strategic plan for 2016 to 2020, EPA provides the status for 28 environmental justice activities that it had included in its environmental justice 2014 strategic plan. HHS established many performance measures and milestones in its 2012 environmental justice strategic plan and reported on its progress toward these measures and milestones in its annual progress reports. In its most recent progress report, HHS reported that, as of January 2017, 30 of the 37 actions that it committed to undertake in the 2012 strategic plan had a status of “complete or substantial progress,” three had achieved “some progress,” and four could not be carried out and were deemed “inactive.” For example, HHS reported that it has conducted outreach events to educate local communities on the purpose and functions of the HHS Office for Civil Rights. In this report, HHS also stated that it will no longer be reporting on these measures and milestones going forward and that it would be developing a new plan of action to achieve its environmental justice goals. HHS has not yet developed such a plan and therefore does not have any current performance measures or milestones. USDA established several performance measures and milestones for its five strategic goals in its environmental justice strategic plan for 2016 through 2020. For its first environmental justice strategic goal, USDA established performance measures involving increased funding for environmental justice-related programs. USDA established milestones for the rest of its goals. Its five strategic goals are: ensure USDA programs provide opportunities for environmental justice communities; increase capacity-building within environmental justice communities; expand public participation in program operations, planning activities, and decision-making processes to benefit environmental justice communities; ensure USDA’s activities do not have disproportionately high and adverse human health impacts on environmental justice communities and resolve environmental justice issues and complaints; and increase awareness, skills, and abilities of USDA employees regarding environmental justice issues. However, the agency has not issued a progress report since its 2016 strategic plan and has not yet reported on these measures and milestones. Agency officials said that USDA has collected information on these measures and milestones, but has not issued progress reports with this information. In our interviews with agency officials, a few described plans for developing new performance measures. In particular, EPA has proposed to implement a measure that would involve identifying key decisions across the entire agency in which environmental justice was taken into account. According to EPA officials, a significant way to incorporate environmental justice into an agency’s mission, including its programs, policies, and activities, is to include environmental justice considerations in its various decision-making processes. For example, EPA has set a goal of including environmental justice issues in the analyses for regulatory or permitting decisions, such as Clean Air rules or permits; officials stated that they could count the number of such decisions that that have included environmental justice issues in the underlying analyses for the decisions. Under the new performance measure, every EPA office would be responsible for identifying a certain number of decisions it has made and explaining how these decisions were affected by environmental justice considerations. The measure would also allow EPA to share examples of how various offices are taking environmental justice into account, so that other offices could learn from these examples (e.g., integrating environmental justice into permitting decisions). EPA plans to pilot this new measure through September 2019. The remaining 12 agencies have not established any performance measures or milestones. In the absence of annual progress reports that evaluate progress using performance measures or milestones, we interviewed agency officials about the progress they had made toward the primary directive in Executive Order 12898—to identify and address disproportionately high and adverse human health or environmental effects of their programs, policies, and activities on minority or low-income populations. Officials from most of these agencies said that they are unable to determine how much progress they have made toward achieving this directive. Specifically, officials from six of the agencies (Commerce, DOD, Education, DOJ, DOL, and VA) stated that they do not have a method for gauging their progress, although several of these agencies stated that they are able to identify specific accomplishments they have made toward addressing environmental justice issues. A seventh agency, DOT, said that it has made significant progress, but faced challenges in developing quantitative performance measures. Officials from DHS and GSA said that they gauge their progress by tracking the completion of action items or goals from their environmental justice strategic plans, and DOE said that it periodically gauges its progress through conducting qualitative reviews of its environmental justice work. Finally, DOD and SBA reported no efforts to gauge progress toward implementing the executive order. Officials for most of the 12 agencies that have not developed performance measures for their environmental justice efforts said they have not done so because it would be difficult and they are unsure how to do so. For example, DOJ officials commented that it would be difficult to develop meaningful measures that are indicative of true progress toward achieving environmental justice. EPA officials commented that encouraging agencies to adopt performance measures for environmental justice would align with their agency’s efforts and would involve, among several things, providing guidance and training to the agencies. The 2011 MOU states that annual progress reports issued by the agencies should include performance measures as deemed appropriate by each agency. In our previous work, we have found that it is important for agencies to establish a method to assess their progress toward their goals; such methods should ideally include performance measures or milestones. We have also reported that performance measures are important for tracking progress in achieving goals and are a key element of effective strategic planning. Performance measures provide managers with information on which to base their decisions, including how effectively offices are integrating environmental justice in their decisions. Performance measures also create powerful incentives to influence organizational and individual behavior. Leading practices we have identified include clearly relating performance measures to the performance they will be used to evaluate and creating a set of performance goals and measures that addresses important and varied aspects of program performance. The executive order directs the working group to provide guidance to agencies in developing their environmental justice strategies. However, the working group has not provided guidance to its members on methods to assess and report on their environmental justice progress, such as through performance measures, according to officials from EPA, which chairs the working group. According to these officials, EPA is still pursuing its own agency-wide performance measures. By developing such guidance or creating a committee, the working group could assist agencies in tracking and measuring their progress in achieving their environmental justice goals. Most agencies that signed the 2011 MOU reported taking various actions to identify and address environmental justice issues related to their programs, policies, and activities; most also reported having limited resources for these efforts. Examples of actions they reported taking included improving research and data collection by creating data tools, considering environmental justice issues when implementing NEPA and enforcing environmental laws, and revising processes to ensure greater public participation. Most agencies used resources from existing related programs (e.g., civil rights or environmental programs) to support environmental justice efforts, although two agencies provided dedicated resources specifically to environmental justice efforts from fiscal years 2015 through 2018. Most of the 16 agencies reported planning and implementing actions to identify and address environmental justice issues to carry out the 1994 executive order and 2011 MOU. The executive order contains four areas that agencies’ environmental justice strategies should include, as appropriate: Promote enforcement of all health and environmental statutes in areas with minority populations and low-income populations. Ensure greater public participation. Improve research and data collection relating to the health of and environment of minority populations and low-income populations. Identify differential patterns of consumption of natural resources among minority populations and low-income populations (e.g., subsistence fishing or hunting). The 2011 MOU contains four additional areas that the 16 agencies agreed federal environmental justice efforts should include, as appropriate: Implement the National Environmental Policy Act (NEPA). Implement Title VI of the Civil Rights Act of 1964, as amended. Consider impacts from climate change. Consider impacts from commercial transportation and supporting infrastructure (goods movement). Each of the 14 agencies that produced an environmental justice strategic plan discussed in their most recent plan how they would identify and address environmental justice issues related to at least one of these eight areas. Although most agencies did not formally report on progress annually, all of the 14 agencies provided examples—in their strategic plans or progress reports, in other related documents or on their websites, or in interviews with us—of actions they implemented to identify and address environmental justice issues. In addition to the eight areas outlined in the 1994 executive order and 2011 MOU, agencies also provided examples of actions they took to provide internal training and conduct external capacity building. See appendix II for additional examples of agency actions to identify and address environmental justice issues. Improve research and data collection. In their most recent environmental justice strategic plans, 11 agencies discussed planning to improve research and data collection on environmental justice issues. At least eleven agencies provided examples of research or data actions they implemented, including creating data tools. For example, in 2015, EPA publicly released its Environmental Justice Mapping and Screening Tool (EJSCREEN), a web-based mapping tool that includes environmental and demographic data at a local level, allowing users to identify potential exposure to environmental pollutants and related health risks across different communities. Officials from DOJ’s Environmental and Natural Resources Division told us that they regularly use EJSCREEN to help determine if cases involve environmental justice issues. Also, since 2015, EPA and HHS’s National Institute on Minority Health and Health Disparities and National Institute of Environmental Health Sciences have co-funded a collaborative research and data effort called the Centers of Excellence on Environmental Health Disparities Research. This effort facilitates research on diseases that are a burden on populations with environmental justice issues and promotes knowledge sharing among researchers. Example of Addressing Environmental Justice Issues in EPA Rulemaking In January 2017, EPA released a final rule amending its Risk Management Program, a program under the Clean Air Act that requires facilities using extremely hazardous substances to develop a risk management plan to submit to EPA at least once every 5 years. The rule changes were identified by a Chemical Facility Safety and Security Working Group composed of the Administrator of EPA, and the department heads of Labor, Homeland Security, Justice, Agriculture, and Transportation, which was created in 2013 by Executive Order 13650 after chemical facility incidents that resulted in fatalities. The executive order requires that the working group develop ways to improve operational coordination with state, local, tribal, and other partners, including enhancing federal agency information sharing. In a May 2014 report, the working group cited the need to familiarize all agencies with Executive Order 12898 on environmental justice. It identified concerns of communities living adjacent to chemical facilities, many of them low-income and minority, and the need to share information with these communities, including first responders. Under EPA’s 2017 rule, risk management plans must be provided to members of the public upon request. The notice publishing the final rule contained a section on environmental justice comments and its response to address environmental justice concerns. In May 2018, EPA proposed to rescind several amendments to its rule. Industry and some states raised concerns about the cost and burden to carry out the rule. Promote enforcement of health and environmental statutes. In their most recent environmental justice strategic plans, 13 agencies discussed planning to promote enforcement of health or environmental statutes in some form. At least 12 agencies provided examples of actions they implemented to promote enforcement, including ensuring enforcement of environmental laws in communities with environmental justice issues and addressing such issues in the resolution of cases against violators. For example, in its 2017 progress report, EPA reported combining EJSCREEN with enforcement and compliance data to help regional offices and state, local, and tribal authorities focus reviews of compliance with environmental laws in overburdened communities. EPA reported reviewing all enforcement cases to see if communities with environmental justice issues were affected and tracking how agency enforcement actions to resolve these cases benefitted the affected communities. As a result, EPA reported tracking that 45 percent of Supplemental Environmental Projects—a type of beneficial environmental project implemented as part of a civil enforcement action settlement—in fiscal year 2017 were in locations with potential environmental justice issues. Ensure greater public participation. In their most recent environmental justice strategic plans, 14 agencies discussed planning to ensure greater public participation in decision-making processes. All 14 agencies provided examples of public participation actions they implemented, including seeking public input on their environmental justice strategic plans or consulting communities directly during environmental analyses under NEPA, siting decisions, or enforcement cases. For example, in its 2016 progress report, DOI reported formally inviting tribes to participate in environmental analyses and revising policies on tribal-government relations. DOI also continued to have publicly designated environmental justice coordinators for each of its bureaus (e.g., Bureau of Land Management), many of which deal directly with tribes or manage natural resources they rely on, such as land or water. Example of an EPA Environmental Justice Grant to Study Microplastics in Tribal Foods In 2017, the Sitka Tribe of Alaska received an Environmental Protection Agency (EPA) Environmental Justice Small Grant to study microplastics in its traditional food sources, such as mussels and clams. Microplastics are tiny pieces of plastic that are less than 5 millimeters in length and, according to EPA, may contain toxic chemicals that can pose human health and ecosystem risks when ingested by aquatic animals. According to EPA, the tribe planned to collect samples of water and traditional foods from four locations within its traditional territory and test them for the presence of microplastics and associated toxins. The results were to be shared with the tribe and the public to inform decisions about harvesting traditional foods. Local students collected and tested Butter Clam and Blue Mussel samples in 2018, which showed that more than 80 percent of the mussels and 100 percent of the clams contained microfibers and other microplastic particles. Identify differential patterns of consumption of natural resources. Because many Native Americans and other minority communities rely on hunting, foraging, or fishing for food, five agencies planned actions to identify or address risks to these food sources in their most recent environmental justice strategic plans. At least eight agencies provided examples of actions they implemented in this area, including collecting or providing information on human health risks associated with the consumption of polluted fish or wildlife. For example, in its 2015 progress report, USDA reported that the Forest Service’s Alaska Regional Office coordinated with DOT’s Federal Aviation Administration to accelerate cleanup of petroleum-contaminated soil at a mixed-ownership site containing national forest lands. According to USDA, the need for accelerated cleanup arose because increasing sea-levels and tidal surges that were encroaching on the area would have washed the pollutants into nearby waters supporting a local subsistence fishery. Implement NEPA. In their most recent environmental justice strategic plans, 12 agencies discussed planning to consider environmental justice issues in their NEPA analyses. At least 13 agencies provided examples of NEPA actions they had implemented, including providing internal guidance on how to include environmental justice issues in NEPA analyses. For example, at DOI, it is departmental policy for all bureaus to include consideration of environmental justice in the NEPA process and some bureaus have developed their own guidance for doing so. For example, DOI’s 2015 National Park Service NEPA Handbook requires the agency’s environmental analyses to discuss and evaluate the impact of proposals on minority and low-income populations and communities, including the distribution of the benefits and risks among different communities and populations. Implement Title VI of the Civil Rights Act of 1964. In their most recent environmental justice strategic plans, 11 agencies planned to consider environmental justice issues when implementing their Title VI programs. At least 10 agencies provided examples of Title VI environmental justice actions they implemented, some of which focused on providing training and guidance. For instance, in 2016, DOJ, DHS, HUD, HHS, and DOT jointly issued interagency guidance on Title VI to state and local agencies involved in emergency activities. DHS and DOJ reported that DHS’s Office for Civil Rights and Civil Liberties and DOJ’s Civil Rights Division coordinated to distribute this guidance in the aftermath of the 2017 hurricane season to ensure that federal funding recipients (e.g., state and local agencies) were aware of their obligations to provide emergency management services across communities without discrimination. Consider impacts from climate change. In their most recent environmental justice strategic plans, nine agencies discussed planning to address impacts from climate change on communities with environmental justice issues. At least 11 agencies provided examples of actions they implemented in this area, including providing communities with information on how climate change may affect them. For example, in its 2016 progress report, DOI reported that the U.S. Geological Service working with the Swinomish Indian Tribal Community and Skagit River System Cooperative to build a coastal model to evaluate the impacts of sea-level rise, storm surge, and waves, including effects on foods such as salmon and shellfish. DOI reported that the model was used to inform tribal climate adaptation and resilience plans. Consider impacts from goods movement. In their most recent environmental justice strategic plans, three agencies discussed planning to address environmental justice issues arising from goods movement, and at least five agencies provided examples of actions they implemented in this area. For example, DOT’s Federal Highway Administration developed a detailed freight and land use handbook in 2012, which highlights potential negative impacts in communities with minority or low- income residents (e.g., air quality or light pollution) and provides guidance on integrating freight and land-use planning to balance freight’s beneficial economic impacts and harmful environmental impacts for affected communities. For example, the handbook advises using off-peak deliveries or anti-idling technologies to reduce impacts from emissions. Provide internal training. Eleven agencies also provided us with examples of training programs to help their staff identify and address environmental justice issues within their work. For example, EPA developed an introductory training on environmental justice, which was required training for all EPA staff agency-wide when it was first launched in 2015. More recently, EPA reported providing environmental justice training in 2017 to more than 1,000 employees and contractors across the government who were responsible for implementing NEPA. DOI developed a web-based introductory training on environmental justice in 2015 that is available to all DOI employees and became required training for project managers for the Central Hazardous Materials Fund in 2016. Example of an EPA Environmental Justice Grant to Build Community Capacity to Reduce Exposure to Contaminated Soil through Community Education In 2017, the Trumbull Neighborhood Partnership in Warren, Ohio, received an EPA Environmental Justice Small Grant for an educational initiative to reduce residents’ exposure to soil contamination from former industrial activities, such as steel production. According to EPA, with support from the grant, the neighborhood partnership planned to create a curriculum of best practices, repurpose vacant land, and share a range of educational materials with residents to help them learn how to avoid exposure to contaminated soil. As part of the educational campaign on safe soil handling practices for residential and community land use, the partnership created a website to host educational materials and also shared the materials in person with residents and contacted local contractors to help ensure safe demolition practices. Conduct external capacity building. Thirteen agencies also provided examples of actions they implemented to fund and assist communities with environmental justice issues to build their capacity to access available resources and participate in federal decisions that affect them. For example, since its inception in 1994, EPA’s Environmental Justice Small Grants Program has awarded more than $24 million to over 1,400 organizations working with communities with environmental justice issues. EPA provides these grants for up to $30,000 to support projects that help communities build understanding of local environmental and public health issues, develop strategies for addressing these issues, and facilitate discussions about community priorities. From fiscal year 2015 through 2018, most of the 16 agencies reported supporting environmental justice efforts through existing related program funding and staffing resources that were not specifically dedicated to environmental justice. EPA and DOE were the only agencies that dedicated resources specifically for environmental justice efforts in their budgets. In fiscal year 2018, EPA provided about $6.7 million, which, according to EPA officials, supported 31 full-time-equivalents (FTE) for Office of Environmental Justice staff in its headquarters and environmental justice coordinators in regional offices and two environmental justice grant programs. These staff support data tools such as EJSCREEN, provide training sessions, and coordinate federal efforts through the Interagency Working Group on Environmental Justice. The two grant programs provide communities with funding to research and understand potential environmental and health issues in their communities. For fiscal years 2015 through 2018, EPA awarded an average of about $1.2 million annually in environmental justice grants to communities through the Environmental Justice Small Grants Program and Environmental Justice Collaborative Problem-Solving Cooperative Agreement Program. EPA officials also reported using other related resources to support environmental justice efforts, but said the agency does not track these resources separately. In fiscal year 2018, DOE provided about $1.6 million and, according to DOE officials, one FTE for its environmental justice program in its Office of Legacy Management. These resources support activities to manage problems and concerns arising from the materials and chemicals on DOE sites by giving communities and tribes near these sites opportunities and tools to participate in DOE decisions. DOE also uses its funds and staff to sponsor the annual National Environmental Justice Conference and Training Program and to participate in the interagency working group. Eleven of the remaining 14 agencies reported undertaking some examples of environmental justice efforts with support from funding and staff from existing related programs (e.g., civil rights or environmental programs) from fiscal year 2015 through 2018. According to budget documents and agency officials, these 11 agencies did not formally track resources used to support environmental justice activities. Four of these agencies—USDA, DOI, GSA, and HUD—provided us with estimates of staffing or funding resources used to support environmental justice efforts. USDA estimated that a total of about eight FTEs annually were charged by many different staff for fiscal years 2015 through 2018 and that between $10,000 and $22,500 in funding annually supported the National Environmental Justice Conference and Training Program. DOI reported that it has one full-time Environmental Justice Outreach Specialist and that most DOI bureaus have an Environmental Justice Coordinator who handles environmental justice responsibilities as a collateral duty. DOI also reported funding one small research project related to environmental justice. GSA reported that staffing related to environmental justice efforts constituted a portion of the total FTE allocation within its Office of Civil Rights and estimated that this amounted to less than one FTE annually for fiscal years 2015 through 2018. HUD also estimated that less than one FTE was used specifically to support environmental justice efforts annually for the period, with one designated environmental justice lead and other staff serving on the working group as needed. Officials from the other seven agencies did not quantify estimates of resources but told us that staff conduct these activities as collateral duties. For example, DHS told us that its Office of the Chief Readiness Support Officer, Office for Civil Rights and Civil Liberties, the Office of General Counsel support its environmental justice efforts as needed. In another instance, DOJ designated an Environmental Justice Director, created a Senior Litigator for Environmental Justice position, and reported that the department has other staff that spend a portion of their time working on environmental justice efforts. Several agencies also reported establishing internal working groups or other coordinating bodies to help implement their environmental justice efforts, which means using some staffing resources to support these coordinating efforts. Three agencies—DOD, Education, and SBA—reported providing no funding or staffing resources to carry out any environmental justice efforts and also did not report any examples of environmental justice efforts from fiscal year 2015 through 2018. Agency resources for environmental justice were one of the concerns several stakeholders that we interviewed raised (see textbox). Stakeholder Perspectives on Federal Environmental Justice Efforts Several stakeholders expressed concerns about agency resources, agency responsiveness to and awareness of environmental justice issues, legal tools for raising environmental justice concerns, or overall prioritization of environmental justice efforts. Stakeholders expressed concerns about the limited availability of resources for environmental justice efforts, including staff to carry out environmental justice work and funding for related programs. One stakeholder told us that agencies need to prioritize their environmental justice efforts because they have not identified all communities with potential environmental justice issues and lack the resources to address all environmental justice issues. Several stakeholders discussed concerns about variation in agency staff familiarity with environmental justice issues or responsiveness to issues raised. Stakeholders also expressed concerns about the ability of existing legal tools to address environmental justice issues in the absence of a legal framework that specifically addresses them. For example, stakeholders said that risks from cumulative pollutant exposure are not addressed by existing environmental statutes. Several stakeholders also expressed concern about federal prioritization of environmental justice issues overall, including enforcement, changes to existing environmental regulations, and limited consideration of environmental justice in rulemaking processes. Some stakeholders we interviewed, including representatives from local and national nonprofit organizations, university professors, federal officials, and employees of private companies, also said that agencies’ efforts to build community capacity and develop tools that address environmental justice issues have been helpful. Stakeholders told us that EPA’s Environmental Justice Small Grants Program has helped communities, and DOE’s National Environmental Justice Conference and Training Program brings together grassroots leaders, stakeholders, and agencies. Stakeholders said that EJSCREEN is a useful tool for agencies and the public to screen for communities with potential environmental justice issues. Stakeholders also said agencies could use EJSCREEN in additional ways (e.g., in rulemaking and permitting) and discussed some limitations for its use (e.g., data limitations and the need to directly engage communities). The working group has collaborated in issuing guidance and in several other areas regarding environmental justice. The working group has also demonstrated three of the key features of interagency collaboration that we reviewed—leadership, clarity of roles and responsibilities, and written guidance and agreements. However, its use of two features of interagency collaboration—participation and organizational outcomes and accountability—was limited. Collaboration from an Interagency Working Group Committee Assists with Environmental Justice Issues in Lowndes County, Alabama A November 2017 American Journal of Tropical Medicine and Hygiene study of hookworm conducted in Lowndes County, Alabama, highlighted a long-standing situation created by poor wastewater management affecting a largely rural, minority population in the state. The makeshift septic tanks that residents use in the absence of proper wastewater treatment infrastructure do not function properly in the moist, rich soil common in that area. This problem increased residents’ exposure to parasites, such as hookworm, through untreated wastewater. According to agency officials, in 2018, the General Services Administration collaborated with the Rural Communities Committee of the Interagency Working Group on Environmental Justice to help apply for Department of Agriculture rural development grant funding for decentralized sewer systems in Lowndes by using federal surplus personal property as matching funds. As of March 2016, the Equal Justice Initiative and Alabama Center for Rural Enterprise were working to identify and employ alternative decentralized technologies to treat wastewater in the county. The two entities were also attempting to write and implement policies requiring residents to connect to public sewers. In 2017, the Impacts from Commercial Transportation committee released a compendium on publicly available federal resources to assist communities impacted by goods movement activities. In fiscal year 2017, with input and vetting from the Rural Communities committee, USDA compiled and launched a web page with links to community tools, funding opportunities, educational or training assistance, and case studies to support rural communities according to USDA officials. In March 2016, the NEPA committee issued guidance entitled, “Promising Practices for Environmental Justice Methodologies in NEPA Reviews.” According to working group officials, this guidance can assist federal agencies with incorporating environmental justice during their NEPA reviews. In March 2019, the committee also completed guidance for communities entitled, “Community Guide to Environmental Justice and NEPA Methods.” Hookworms can be found in soil contaminated by untreated wastewater. In 2016, the working group’s Rural Communities committee participated in a brownfields redevelopment conference to help local organizations understand and access resources to redevelop brownfields in their communities. In 2016, the Regional Interagency Working Groups committee coordinated technical assistance to communities in EPA’s regions 2 and 4. For example, the group is working in North Birmingham, Alabama, and other communities to evaluate air, water, and waste issues. With respect to the five key features of interagency collaboration that we reviewed, we found that the working group demonstrated leadership, clarity of roles and responsibilities, and written guidance and agreements. However, its use of two other key features—participation and clear goals—was limited. In our September 2012 report on interagency collaborative mechanisms, we identified leadership as a key feature of collaborative groups and stated that identifying a leader and sustaining that role throughout the groups’ efforts are important. For the working group, EPA’s Administrator was identified as the chair of the group in both the 1994 executive order and the 2014 Charter for Interagency Working Group on Environmental Justice. EPA officials we interviewed described the agency’s role as providing guidance to the working group agencies and coordinating their efforts. More specifically, EPA officials we interviewed said that as chair of the working group, EPA’s responsibilities include the following: Convene monthly meetings with the working group. Provide public access to working group agencies’ environmental justice strategic plans and annual implementation progress reports, a list of working group agencies, and other information relevant to the working group. Lead the development and publication of the working group’s plans and reports. Our September 2012 report identified the need for collaborative groups to have clarity about the roles and responsibilities of the participating agencies. We stated that clarity can come from agencies working together to define and agree on their respective roles and responsibilities, as well as steps for decision-making. The working group has done this by assigning roles to its chair and most of its member agencies. In particular, according to working group officials, the topics for the nine working group committees were based on the seven functions that the executive order assigned to the working group and public input. Officials from 13 of the working group members agreed to either chair or become a member of one or more committees. The topics that these committees address, their chair, members, and purpose are identified in table 3: Our September 2012 report on interagency collaborative mechanisms stated that agencies that articulate their agreements in formal documents can strengthen their commitment to working collaboratively. Since 2011, when the 16 agencies and CEQ recommitted to carrying out environmental justice efforts, the working group has developed several such documents including: MOU on Environmental Justice. This document, signed in 2011, is an agreement among member agencies to recommit to addressing environmental justice issues. It also listed the four areas that the agencies agreed to work on: NEPA, Title VI of the Civil Rights Act, impacts from climate change, and impacts from goods movement. Charter for Interagency Working Group on Environmental Justice. This document, which was adopted in 2011 and updated in 2014, outlines the governance structure for the working group. It also lists four committees to help carry out the working group’s responsibilities under the executive order: public participation, regional interagency working group, Title VI, and strategy and implementation progress reports. Framework for Collaboration. This document, which was issued in 2016 and covered a 3-year period through 2018, listed four goals of the working group to advance greater federal agency collaboration. It also listed and described the purpose of the nine working group committees. In our September 2012 report, we found that it is important to ensure that the relevant participants have been included in the collaborative effort. Participation in working group activities has been mixed. In the 2011 MOU, the 16 signing agencies and CEQ agreed to address environmental justice issues and participate as members of the working group. According to agency officials, most working group members attend the monthly meetings. The most active members of the working group, in terms of participation in working group committees, have been EPA and DOJ. EPA, the chair of the working group, also chaired or co-chaired six committees, and DOJ chaired or co-chaired four. Both also participated in all eight of the active committees (see table 4). However, four agencies—DOD, Education, SBA, and VA—did not attend any of the working group’s monthly meetings in fiscal year 2018. These agencies also did not participate as leaders or members in any working group committees in fiscal year 2018. Furthermore, DOD and SBA did not have a designated representative as of March 2019. These four agencies had various reasons for not participating more actively in the working group or its committees. DOD officials said that DOD has not been involved with the working group since August 2017, when its working group representative retired, because it does not have the resources to participate in the working group. Education officials also said that they have had a limited role with the working group because many of the topics discussed have not been relevant to their agency’s missions. For example, according to Education officials, while research has established that schools with poor environmental health conditions often serve disadvantaged students, Education does not have authority to plan, fund, construct, maintain, or operate school facilities and grounds. As discussed earlier, SBA officials we interviewed said that they were unclear on whether environmental justice applied to SBA’s mission and that they were in the process of reviewing whether SBA should continue its membership in the working group. VA officials confirmed that it has also been inactive with the working group, but will call in to a meeting if there are topics of relevance. EPA officials commented that it is difficult to characterize what specific opportunities are missed from the lack of representation by an agency. However, they also commented that nonparticipation limits the working group’s ability to fulfill its mandates in a strategic, methodical way across the entire federal government. EPA officials further stated that the limiting factor for the working group in its efforts to address the executive order on environmental justice has always been the will of leadership across federal government to make clear, measurable commitments of those priorities and to adequately resource the attainment of those commitments. However, the participants signed the 2011 MOU about 8 years ago, and the agreement has become dated and may not reflect the agencies’ current commitments or abilities to participate in the working group or the broader environmental efforts. Our 2012 report on interagency collaborative mechanisms stated that written agreements and documents are most effective when they are regularly updated and monitored. By updating the 2011 MOU and renewing the commitment among participating agencies, EPA and the working group agencies would have more reasonable assurance that those agencies who sign the agreement are committed to participating. Our September 2012 report found that collaborative mechanisms such as the working group benefit from clear goals to establish organizational outcomes and accountability. The report stated that participants might not have the same overall interests or may even have conflicting interests, but by establishing a goal based on common interests, a collaborative group can shape its own vision and define its purpose. The executive order that created the working group assigned the working group seven functions to carry out, as listed in table 5. While the working group has developed documents with agreed-upon goals, which is beneficial to collaboration, none of them address all the seven functions of the executive order. The working group’s organizational documents do not contain strategic goals aligned to address the executive order as suggested by our previous work on establishing clear goals for collaborative mechanisms. Further, the three functions involving environmental justice research, data collection, and studies are not described as part of the goals of the working group, as laid out in its various documents: The 2011 MOU includes four focus areas for the working group members: NEPA, Title VI, impacts from climate change, and impacts from goods movement. These do not include the executive order functions of environmental justice data collection, research, and studies. The 2011 Charter for Interagency Working Group on Environmental Justice states that the committees were created to help carry out the working group’s responsibilities under the executive order. The committees focus on certain working group roles and responsibilities, including NEPA, goods movement, strategic planning, and public participation. However, none of the committees focus on environmental justice research, data collection, or studies. The working group’s fiscal year 2016-2018 Framework for Collaboration’s has four goals for collaboration: (1) enhance communication and coordination to improve the health, quality-of-life, and economic opportunities in overburdened communities; (2) enhance multi-agency support of holistic community-based solutions to provide assistance as needed to address environmental justice issues; (3) advance interagency strategies to identify and address environmental justice issues in agency programs, policies, and activities; and (4) develop partnerships with academic institutions to assist in providing long-term technical assistance to overburdened communities. These goals do not pertain to environmental justice research, data collection, or studies. We found that the organizational documents do not provide strategic goals with clear direction for the committees to carry out the functions of the working group as laid out in the executive order. Our analysis, which compares the functions of the executive order to documented working group roles and responsibilities, shows that coordinated data collection and examination of research and studies on environmental justice are not included in these documents or committee purposes and have not been a focus of the interagency working group since at least 2011. A DOI official acknowledged that the working group has not addressed all of these functions from the executive order; the official attributed the omission to a lack of resources for the working group. EPA officials commented that some individual agencies, such as HHS and EPA, have done work in environmental justice data collection and research. As leaders of the working group, EPA officials told us that the 2011 MOU, committee groups, and framework for collaboration reflect the current priorities of the working group, based on the public’s input. They were unsure whether a coordinated effort in the data collection, research, and studies areas was needed, but they said such an effort could be useful. They said that the most useful role of the working group in research may be as a forum for sharing of information and providing training opportunities. By clearly establishing strategic goals in the working group’s organizational documents to carry out the 1994 executive order, EPA, in consultation with working group members, could enhance its strategic direction for intergovernmental environmental justice efforts. The interagency working group on environmental justice and its 16 member agencies have put in place the building blocks for an environmental justice program across the federal government. They have conducted a number of efforts over the last 25 years to implement the Executive Order on Environmental Justice. Through these efforts, they have developed tools such as EJSCREEN and guidance for incorporating environmental justice under NEPA. Most of the agencies have also developed strategic plans since 2011, although two agencies we reviewed have not, and many others have not kept their plans updated. SBA is in the process of reviewing whether it should continue its membership in the working group, which should clarify its role after SBA completes its review. DOD developed an environmental justice strategic plan in 1995 after the executive order was issued but not since 2011 when the interagency working group members signed the MOU. By updating its environmental justice strategic plan, DOD would have a foundation for its environmental justice efforts. Another seven agencies developed environmental justice strategic plans in 2012 but have not updated them since. By updating their strategic plans, these agencies— Commerce, DHS, DOJ, DOL, Education, HUD, and VA—would have a current plan to guide their environmental justice activities as they committed to do in the 2011 MOU. Moreover, most agencies—Commerce, DOD, DOE, DOI, DOL, DOT, Education, HHS, HUD, USDA, and VA—have not shown clear progress toward achieving their environmental justice goals in the 8 years since they signed the working group’s 2011 MOU because they have not consistently issued progress reports. By issuing progress reports each year, the agencies can provide essential information needed to assess their performance and demonstrate results. The 16 agencies and CEQ signed the 2011 MOU to establish a collaborative initiative across agencies to carry out environmental justice efforts. Under the leadership of EPA, they have also put in place a structure to coordinate with each other on their environmental justice efforts. One area that the group has not coordinated, however, is in developing guidance on what to include in strategic plans, such as demonstrating how environmental justice is part of an agency’s mission, or developing methods to assess and report on progress, which many of the agencies said they needed. Under GAO’s leading practices for strategic planning, agencies’ plans should address their missions, articulate goals, and lay the groundwork for assessing progress. Only half of the agencies that developed environmental justice strategic plans after 2011 clearly assessed how their plans fit into their overall missions. By developing guidance on what agencies should include in their environmental justice strategic plans, the working group could assist agencies in planning more strategically about what parts of their mission are important for achieving the environmental justice directives outlined in Executive Order 12898. Few of the agencies had performance measures or other methods to assess progress. By developing guidance on methods that the agencies could use to assess and report on progress, or creating a committee to do so, the working group could assist agencies in tracking and measuring their progress in achieving their environmental justice goals. In addition, the working group faces challenges of unclear strategic goals and mixed levels of participation. As noted in our earlier work, collaborative mechanisms, such as the working group, benefit from clear goals to establish organizational outcomes and accountability. Although the 1994 executive order created the working group to carry out the functions of the executive order, the working group’s framework focuses on how the agencies will collaborate rather than setting clear strategic goals to carry out the executive order. As a result, several of the executive order’s functions are not being carried out by the working group. By clearly establishing, in its organizational documents, strategic goals for the federal government’s efforts to carry out the 1994 executive order, EPA and the working group members could enhance the strategic direction for intergovernmental environmental justice efforts. Furthermore, by updating the 2011 MOU and having the 16 agencies and CEQ renew their commitment to participating in the interagency collaborative effort and the working group, EPA, as chair of the working group and consulting with other working group members, would have more reasonable assurance that those who sign the agreement are committed to participate. We are making a total of 24 recommendations to 15 agencies of the Interagency Working Group on Environmental Justice—nine to the federal agencies that need to develop or update strategic plans (recommendations 1-9); 11 to the federal agencies that need to develop annual progress reports (recommendations 10-20); and four to the Environmental Protection Agency as chair of the working group (recommendations 21-24). The Secretary of Commerce should update the department’s environmental justice strategic plan. (Recommendation 1) The Assistant Secretary of Defense for Sustainment should update the department’s environmental justice strategic plan. (Recommendation 2) The Secretary of Education should update the department’s environmental justice strategic plan. (Recommendation 3) The Secretary of Homeland Security should update the department’s environmental justice strategic plan. (Recommendation 4) The Secretary of Housing and Urban Development should update the department’s environmental justice strategic plan. (Recommendation 5) The Attorney General of the United States should update the department’s environmental justice strategic plan. (Recommendation 6) The Secretary of Labor should update the department’s environmental justice strategic plan. (Recommendation 7) The Administrator of the Small Business Administration should complete the agency’s assessment of whether to participate in the 1994 Executive Order and the 2011 Memorandum of Understanding, and, if appropriate, develop an environmental justice strategic plan. (Recommendation 8) The Secretary of Veterans Affairs should update the department’s environmental justice strategic plan. (Recommendation 9) The Secretary of Agriculture should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 10) The Secretary of Commerce should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 11) The Assistant Secretary of Defense for Sustainment should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 12) The Secretary of Education should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 13) The Secretary of Health and Human Services should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 14) The Secretary of Energy should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 15) The Secretary of Housing and Urban Development should issue a progress report on its environmental justice efforts each year. (Recommendation 16) The Secretary of the Interior should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 17) The Secretary of Labor should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 18) The Secretary of Transportation should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 19) The Secretary of Veterans Affairs should issue a progress report on the department’s environmental justice efforts each year. (Recommendation 20) The Administrator of EPA, as chair of the working group, should develop guidance for agencies on what they should include in their environmental justice strategic plans. (Recommendation 21) The Administrator of EPA, as chair of the working group, should develop guidance or create a committee of the working group to develop guidance on methods the agencies could use to assess progress toward their environmental justice goals. (Recommendation 22) The Administrator of EPA, as chair of the working group, and in consultation with the working group, should clearly establish, in its organizational documents, strategic goals for the federal government’s efforts to carry out the 1994 Executive Order. (Recommendation 23) The Administrator of EPA, as chair of the working group, and in consultation with the other working group members, should update the 2011 Memorandum of Understanding and renew the agencies’ commitments to participate in the interagency collaborative effort and the working group. (Recommendation 24) We provided a draft of this report to CEQ and 16 federal agencies— Commerce, DHS, DOD, DOE, DOI, DOJ, DOL, DOT, Education, EPA, GSA, HHS, HUD, SBA, USDA, and VA—for review and comment. Fourteen agencies provided comments on our report. The comments of 12 agencies—DHS, DOD, DOE, DOI, DOJ, DOL, DOT, Education, EPA, HHS, USDA, and VA—are reproduced in appendixes III-XIV, respectively. HUD and SBA provided comments by email. Of these 14 agencies, eight agencies—DHS, DOE, DOI, DOJ, HHS, SBA, USDA, and VA—agreed with our recommendations. Of the other six agencies that provided comments, EPA agreed with two recommendations and disagreed with two others; DOD agreed with one recommendation and disagreed with one other; DOT partially agreed with the recommendation; DOL and HUD neither agreed nor disagreed with their recommendations, and Education did not agree with its two recommendations. We also made recommendations to Commerce, but it did not provide comments in time to include them in our report. Although we did not make recommendations to them, CEQ and GSA reviewed our report. CEQ provided technical comments, which we incorporated as appropriate; GSA did not have any comments on our report. In addition to CEQ, we also received technical comments and clarifications from DHS, DOJ, DOT, EPA, HHS, and USDA, which we incorporated as appropriate. We directed four recommendations to EPA as chair of the Interagency Working Group on Environmental Justice; the recommendations are aimed at improving the strategic direction of the working group and the federal government’s efforts. EPA stated that it appreciates our work on this subject area and understands the need for interagency coordination and is working closely and collaborating with its federal partners. EPA agreed with the two recommendations to develop guidance for agencies on what they should include in their environmental justice strategic plans (recommendation 21) and to develop guidance or create a committee of the working group to develop guidance on methods the agencies could use to assess progress toward their environmental justice goals (recommendation 22). However, EPA disagreed with the recommendations to update the 2011 MOU and renew the agencies’ commitments to participate in the interagency collaborative effort and the working group (originally recommendation 23, now recommendation 24) and to clearly establish strategic goals for the federal government’s efforts to carry out the 1994 Executive Order (originally recommendation 24, now recommendation 23). EPA stated that it disagrees with recommendations 23 and 24; instead of updating the MOU, the agency will lead efforts to update the working group’s fiscal year 2016-2018 Framework for Collaboration to include guidance for strategic plans, tracking progress toward goals, and defining alignment with the executive order. The agency also said that it believes that the intent of recommendation 24 could be combined with recommendation 23, making recommendation 24 unnecessary. We believe that EPA misunderstood recommendation 24 and do not agree it should be combined with recommendation 23. We agree with EPA that the working group can benefit from greater guidance on strategic plans, tracking goals, and alignment with the executive order to carry out federal environmental justice efforts. In our report, we list three organizational documents—the 2011 MOU, the 2011 Charter for Interagency Working Group on Environmental Justice, and the Framework for Collaboration. Our recommendation is for EPA to clearly establish strategic goals for federal efforts to carry out the executive order and does not specify which organizational document needs to be updated to address these issues. To help avoid confusion about the intent of this recommendation, we made two changes in the report. First, we clarified in the report that we were referring to the interagency working group’s strategic goals and organizational documents to show that we are not specifically recommending that the MOU be updated to meet this recommendation. Second, we switched the order of recommendations 23 and 24 so that our recommendation to establish strategic goals (previously recommendation 24) would no longer follow our recommendation to update the MOU. We disagree with EPA that it does not need to update the working group’s MOU because it plans to update the working group’s Framework for Collaboration. We believe that the MOU needs to be updated to address the matter of participation by the members who signed it but do not participate. As discussed in our report, the 2011 MOU is an agreement among member agencies to commit to addressing environmental justice issues. We do not have an opinion on when this document needs to be updated, however, and we believe that it can be updated after the working group discusses its strategic goals and updates its other organizational documents. Federal agencies may clarify how they can best participate through discussions of the working group’s goals and how they can meet the purposes of the executive order. DOD agreed with the recommendation that it update its environmental justice strategic plan (recommendation 2), but disagreed with the recommendation that it issue a progress report on its environmental justice efforts each year (recommendation 12). DOD provided two primary reasons why it disagreed with this recommendation. First, DOD stated that it had achieved the intent of Executive Order 12898 by including environmental justice considerations in its decision-making processes, primarily by using the NEPA review process. Second, the department stated that it has limited ability to further the implementation of environmental justice and create new goals and metrics in operating locations and mission. DOD stated that it is bound by its mission with limited opportunities to change where the department operates. According to DOD, for it to create new bases or close existing ones, it must first obtain congressional approval and then perform a NEPA analysis prior to implementation; also, its mission does not include a federal role in regulating or directing off-base activity or land uses; and aside from the U.S. Army Corps of Engineers civil regulatory functions, it does not routinely issue environmental permit decisions like federal regulatory agencies. DOD stated that these reasons make it a significant challenge for the department to meet our recommendation and therefore does not see a tangible benefit to additional reporting. We disagree with DOD that it does not need to issue a progress report on its environmental justice efforts each year. As we state in the report, the purpose of an annual progress report is to provide essential information needed to assess federal agencies’ performance and hold agencies accountable for achieving results. Reporting is part of a broader performance management process that includes identifying mission and desired outcomes, measuring performance, and using this information to report on performance and to identify gaps in performance. DOD would be reporting on goals that it set within its mission and authorities. For this reason, we continue to believe that by issuing progress reports each year, DOD could have more reasonable assurance that it has the necessary information to assess its performance and to demonstrate results. DOT stated that it partially concurs with recommendation 19 that it issue progress reports annually. DOT stated that it commits to issuing progress reports on its environmental justice efforts “when it determines that the circumstances of its activities so warrant.” However, we continue to believe that DOT should issue progress reports each year because doing so would give DOT more reasonable assurance that it has the information needed to assess its performance and to demonstrate results. DOL neither agreed nor disagreed with the two recommendations for it to (1) update its environmental justice strategic plan and (2) issue a progress report on its environmental justice efforts each year (recommendations 7 and 18). DOL stated that it values our review of its work in this area and will review the recommendations and take appropriate actions to improve program performance and delivery of services. HUD also neither agreed nor disagreed with our recommendations for it to update its environmental justice strategic plan and issue a progress report on its environmental justice efforts each year (recommendations 5 and 16). In an email, a HUD audit liaison official stated that the agency had no comments at this time and will continue to work with the current administration and the working group to update its environmental justice strategic plan and issue a progress report on its environmental justice efforts. Education stated that our report did not sufficiently account for the limitations on its legal authority in the subject area of environmental justice and that our report would be more accurate and comprehensive if it included more information about the department’s limited role. Education also stated that it did not agree with the recommendations to update its environmental justice strategic plan (recommendation 3) and issue a progress report on its environmental justice efforts each year (recommendation 13) because it does not believe this is the most appropriate course of action for the department or an efficient use of resources. We disagree with Education’s assessment. In the report, we discuss Education officials’ comments that they have a limited role with the working group because many of the topics discussed have not been relevant to their agency’s missions. We also discuss Education’s legal authority by including Education officials’ comment that the department does not have federal authority to plan, fund, construct, maintain, or operate school facilities and grounds. As discussed in the report, by updating its strategic plan, Education would have a current plan to guide its environmental justice activities, as it committed to do in the 2011 MOU. By issuing progress reports each year, Education could have more reasonable assurance that it has the necessary information to assess its performance and to demonstrate results. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. We are sending copies of this report to the appropriate congressional committees; the Chair of the Council on Environmental Quality; the Attorney General, Department of Justice; the Administrators of the Environmental Protection Agency and General Services Administration; the Acting Administrator of the Small Business Administration; the Secretaries of the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Housing and Urban Development, the Interior, Labor, Transportation, and Veterans Affairs; and the Acting Secretary of the Department of Homeland Security. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix XV. This report examines (1) the extent to which the 16 working group agencies have developed environmental justice strategic plans and shown progress toward environmental justice goals since 2011; (2) the actions agencies have taken to identify and address environmental justice issues related to their programs, policies, and activities since the executive order was issued in 1994 and the resources they have used to do so in recent years; and (3) the extent to which the Interagency Working Group on Environmental Justice (working group) has collaborated on environmental justice efforts. Sixteen federal agencies and one agency of the Executive Office of the President are involved in environmental justice efforts: the Council on Environmental Quality (CEQ), Environmental Protection Agency (EPA), General Services Administration (GSA), Small Business Administration (SBA), Department of Agriculture (USDA), Department of Commerce (Commerce), Department of Defense (DOD), Department of Education (Education), Department of Energy (DOE), Department of Health and Human Services (HHS), Department of Homeland Security (DHS), Department of Housing and Urban Development (HUD), Department of the Interior (DOI), Department of Justice (DOJ), Department of Labor (DOL), Department of Transportation (DOT), and Department of Veterans Affairs (VA). To address these objectives, we reviewed Executive Order 12898 (Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations), the 2011 Memorandum of Understanding on Environmental Justice (MOU), working group documents, and agency environmental justice strategic plans and progress reports, and interviewed federal agency officials about the documents. We also attended the 2018 National Environmental Justice Conference and Training Program, in which leaders from various sectors share ideas and approaches to achieving environmental justice. At this conference, we observed sessions to gain background and context and interviewed some attendees whom we identified and arranged to interview prior to the conference. We also visited sites in Oakland, California, and Richmond, California, to add context to our review with observations of communities with environmental justice issues. We selected these sites because they had minority and low-income populations with environmental and health concerns. Including interviews we conducted at the conference, we conducted 33 interviews with environmental justice stakeholders about federal environmental justice efforts and related issues. Of these interviews, 10 were with representatives from national nonprofit organizations, seven were with representatives from nonprofit groups who work on local issues, six were with university professors, four were with employees of private companies, two were with current or former government officials, and four were with mixed groups of stakeholders. We identified these stakeholders for interviews from our background interviews and document reviews. The views of the stakeholders we interviewed cannot be generalized to all similar stakeholders, but they represent a range of stakeholder perspectives and provide illustrative examples of views of agency efforts. To examine the extent to which the 16 agencies developed environmental justice strategic plans since 2011, we determined which agencies had completed an environmental justice strategic plan after signing the 2011 MOU and which agencies had also updated their plans at EPA’s request in 2016. We made these determinations by reviewing the website of each agency for its environmental justice documents, reviewing the environmental justice strategic plans, and interviewing agency officials about the origin and status of these environmental justice strategic plans. To examine the extent to which the 16 agencies showed progress toward environmental justice goals since 2011, we determined whether each agency had completed annual environmental justice progress reports for each year for fiscal year 2012 through fiscal year 2017 by reviewing the website of each agency to identify these progress reports, reviewing the progress reports we located, and interviewing agency officials about the status and content of these progress reports. We also reviewed the environmental justice strategic plans and progress reports to assess whether agencies included a method to assess progress in accordance with GAO’s leading practices for strategic planning and reporting, including establishing goals and establishing a method to assess progress toward goals. Specifically, we analyzed whether each agency’s environmental justice strategic plan included goals and performance measures or milestones, and whether each agency assessed progress toward these goals using performance measures or milestones in subsequent progress reports. We also interviewed agency officials about their progress toward the goals of Executive Order 12898. To examine the actions the 16 agencies took to identify and address environmental justice issues related to their programs, policies, and activities since the executive order was issued in 1994, we reviewed agency environmental justice strategic plans, progress reports, and related documents to identify illustrative examples of agency efforts in each of the areas outlined in Executive Order 12898 and the 2011 MOU as well as two additional areas identified by agencies. We also interviewed officials from each agency to confirm or gather additional information on these examples. The analysis included a detailed review of the most recent environmental justice strategic plan and progress report for each agency to identify examples of agency actions and a content analysis of the most recent environmental justice strategic plan for each agency. From this review, we (1) counted how many agencies discussed plans to identify and address environmental justice issues related to the areas outlined in the 1994 executive order and 2011 MOU in their most recent environmental justice strategic plan, (2) developed a list of illustrative examples of agency efforts to identify and address environmental justice issues related to these areas, and (3) counted how many agencies provided examples of actions they implemented related to these areas. The examples are not a generalizable sample of the types or instances of agency actions, but illustrate the various ways that different agencies are implementing plans to identify and address environmental justice issues and different approaches to doing so that may be useful for other agencies, the Interagency Working Group on Environmental Justice, and environmental justice stakeholders. We report a minimum count of agencies that provided examples for each area because most agencies did not formally report on progress annually and the information we reviewed does not provide a complete record of agency environmental justice efforts. To examine what resources working group members used to support their environmental justice efforts for fiscal year 2015 through 2018, we obtained and reviewed agency budget justification documents and agency estimates of resources data to determine which agencies (1) had any funding or staffing resources dedicated specifically for environmental justice in their budgets, (2) supported environmental justice efforts with a mix of existing funding and staff from related programs, or (3) did not report any examples of environmental justice efforts or use any resources specifically for any environmental justice efforts. We assessed the reliability of the agencies’ estimated resources data, including for agencies that estimated no resources were used to support any environmental justice efforts, by corroborating it with agency budget justification documents or internal agency budget documentation, interviewing agency officials about the data, and comparing it with information on any reported examples environmental justice efforts. We found it reliable for our purposes of describing which agencies had any resources dedicated specifically for environmental justice in their budgets and of presenting estimates of other funding and staffing resources used to support environmental justice efforts. To determine the extent to which the working group has collaborated on environmental justice efforts, we reviewed working group documents including the group’s fiscal year 2016-2018 Framework for Collaboration and associated progress reports, its published guidance entitled Promising Practices for Environmental Justice Methodologies in NEPA Reviews, and its resource guide entitled Goods Movement Federal Resources Compendium. We also conducted semi-structured interviews with officials from working group committees. We compared the working group’s organization, documents, and actions with key features of collaborative mechanisms that GAO has identified, including clarifying roles and responsibilities, participation, establishing written guidance and agreements, and establishing outcomes and accountability. We selected these features because they were most relevant to the activities of the working group organization. We conducted this performance audit from November 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Agencies provided examples of actions to identify and address environmental justice issues: Improve research and data collection In 2017, the Department of Housing and Urban Development (HUD) and the Environmental Protection Agency (EPA) entered into a memorandum of understanding (MOU) to improve communication and data sharing about public and HUD-assisted housing located near contaminated Superfund sites to help both agencies prioritize actions protecting against human health and environmental risks. The Department of the Interior (DOI) provided an example in which the National Park Service used EPA’s Environmental Justice Mapping and Screening Tool (EJSCREEN) in 2015 to check for populations with respiratory health risks near a prescribed burn area (i.e., a planned, controlled fire to manage wildfire risks) in Jean Lafitte, Louisiana, as part of an environmental assessment (see fig. 1 for example of EJSCREEN display). Promote enforcement of health and environmental statutes The Department of Justice (DOJ) officials told us that its attorneys consider environmental justice issues when pursuing cases to enforce federal environmental laws, and in 2014 it updated and reissued guidance on how its attorneys should identify and address environmental justice issues in their work. For example, DOJ reported in its 2017 progress report that it sought and incorporated community input on resolutions for a 2017 case involving several petrochemical facilities alleged to be violating the Clean Air Act that were located in Texas and Louisiana communities with environmental justice issues. DOJ reported that some of the injunctive relief and monitoring requirements included in the case settlement reflected suggestions made by the community. According to internal DOI guidance from 2018, the Central Hazardous Materials Fund, which supports cleanup of contaminated sites on federal lands through the Comprehensive Environmental, Response, Compensation, and Liability Act, requires projects to be screened for any potentially affected environmental justice communities and for the requesting bureau to work with any communities that are identified near the proposed project. In its 2014 progress report, Commerce reported that the National Oceanic and Atmospheric Administration (NOAA) developed a handbook on procedures for government-to-government consultation with federally recognized Indian tribes and Alaska Native Corporations as part of an effort to facilitate meaningful and timely input from Tribes into federal decisions that directly affect them. In 2013, DOJ and EPA reported seeking and incorporating input from low-income and minority communities on resolutions for several Clean Water Act violations for sewer overflows in cities in Tennessee, Mississippi, and Washington; these resolutions included requiring the cities to address overflows at specific sites impacting these communities and developing Supplemental Environmental Projects for the cities to fix leaking private sewer pipes. Identify differential patterns of consumption of natural resources In its 2016 progress report, DOJ reported that its Environment and Natural Resources Division negotiated a settlement to help improve the passage of steelhead and salmon—fish that are important to the Muckleshoot and Puyallup tribes—on the White River in Washington. In its 2016 progress report, DOI reported that the U.S. Geological Service worked with the Stillaguamish tribe in Washington, to assess the effects of possible wastewater contamination on fish and wildlife in the Stillaguamish River. The Department of Homeland Security (DHS) issued an agency-wide directive on the National Environmental Policy Act (NEPA) implementation in 2014 and the accompanying 2014 NEPA instruction manual included public involvement requirements for populations with environmental justice issues. For agency staff to implement this guidance, DHS included questions about potential environmental justice issues related to the proposed action in its NEPA assessment system. Since at least 2012, as part of the NEPA process for HUD-assisted projects, HUD requires the environmental review record to document any adverse and disproportionate impacts on low-income or minority populations, and steps to engage the community in meaningful participation about mitigating the adverse impacts or moving the project. The General Services Administration’s (GSA) 1999 Public Building Service NEPA Desk Guide includes a section specifically on environmental justice, which states that each GSA NEPA review should include some level of environmental justice analysis. In its 2015 progress report, GSA reported that it continues to consider environmental justice issues for proposed Public Buildings Service projects. The U.S. Department of Agriculture’s (USDA) 1997 Departmental Regulation on Environmental Justice directs USDA component agencies to incorporate environmental justice into their NEPA processes (e.g., Rural Development’s official guidance includes a section on integrating environmental justice and socioeconomic analyses into environmental reviews as part of the NEPA process). Implement Title VI of the Civil Rights Act of 1964 In its 2017 progress report, EPA reported that its External Civil Rights Compliance Office provided training and technical assistance on federal civil rights obligations to local agencies, tribal governments, and 38 states across the agency’s 10 regions through outreach calls and meetings in 2017. Consider impacts from climate change According to the Department of Commerce, NOAA has developed information, tools, and services to help society understand, plan for, and respond to climate variability and change. As part of this effort, NOAA built a web-based resource called Digital Coast, which can be used to identify the risk of potential sea-level rise and inundation to vulnerable populations (e.g., low-income). According to the Department of Energy’s (DOE) 2015 progress report, the 2015 National Environmental Justice Conference and Training Program focused on climate change and climate justice. DOE also issued a 2015 report on the vulnerabilities that tribal energy systems, such as electric grid infrastructure, have to climate change and extreme weather, and announced a grant opportunity to establish clean energy projects and energy efficiency projects on tribal lands. Consider impacts from goods movement In its 2017 progress report, EPA reported prioritizing funding projects to reduce elevated diesel emissions from equipment moving goods and people near seaports and airports through its Diesel Emissions Reduction Act grants. The Department of Transportation’s (DOT) Federal Highway Administration created an Environmental Justice Tools Peer Network to share transportation practitioners’ experiences using EJSCREEN and other relevant data tools in decisions about transportation planning or project development. DOJ officials told us that new attorneys and staff in its Environment and Natural Resources Division—the primary division responsible for prosecuting environmental cases—received training on environmental justice issues. In its most recent environmental justice strategic plan, DOT reported that it offers environmental justice training throughout the agency to help federal employees and grantees ensure compliance with environmental justice policies. For example, in its 2015 progress report, DOT stated that its Federal Highway Administration and Federal Transit Administration offered courses and webinars on such topics as environmental justice fundamentals, planning, and analysis; Title VI; and freight impacts. USDA officials told us that its National Resources Conservation Service developed a webinar in 2014 to assist conservation planners, partners, and technical service providers understand, analyze, and document environmental justice issues related to planned conservation actions under NEPA, such as data sources and potential mitigation measures. In its 2017 progress report, EPA reported holding training sessions for community organizations on how to use EJSCREEN, how to apply for grants, and other strategies and resources to deal with specific environmental justice issues, such as lead exposure and poisoning. Since 2007, DOE has sponsored an annual conference, the National Environmental Justice Conference and Training Program, with support from other agencies, to bring together community leaders; federal, state, and local government representatives; tribal leaders; environmental justice organizations; and others. The conference provides a forum to share information, tools, and strategies for identifying and dealing with specific environmental justice issues that communities may be facing, and agencies in the working group reported participating. Since at least 2012, HUD has offered online training on environmental justice for HUD grantees to help build their capacity to meet environmental review responsibilities for HUD-assisted projects. In 2017, DOI and EPA entered into an MOU to collaborate on environmental justice and economic development issues by assisting underserved communities through academic partnerships, technical assistance, and training, in collaboration with the communities. In its 2016 progress report, the Department of Labor reported that the Employment and Training Administration’s Job Corps, a job training program for low-income and at-risk youth, offers training in fields such as green building and hazardous waste removal. J. Alfredo Gómez, (202) 512-3841 or gomezj@gao.gov. In addition to the individual named above, Susan Iott (Assistant Director), Allen Chan (Analyst-in-Charge), Peter Beck, Hannah Dodd, Juan Garay, Rich Johnson, Matthew Levie, Ben Licht, Cynthia Norris, Amber Sinclair, Kiki Theodoropoulos, and Elise Vaughan Winfrey made key contributions to this report.", "summary": "Environmental justice seeks to address the disproportionately high distribution of health and environmental risks among low-income and minority communities by seeking their fair treatment and meaningful involvement in environmental policy. In 1994, Executive Order 12898 directed 11 federal agencies to identify and address environmental justice issues related to their activities and tasked an interagency working group to coordinate federal environmental justice efforts. In 2011, 16 agencies, including the 11 original agencies, recommitted to planning and reporting on environmental justice efforts by signing an MOU. GAO was asked to review federal environmental justice efforts. This report examines agencies' environmental justice actions, strategic plans and progress reports, and working group collaboration. GAO reviewed agency environmental justice plans, reports, and funding data; interviewed agency officials; and compared working group collaboration to leading collaborative practices. Most of the 16 agencies that are members of the interagency working group on environmental justice—created by Executive Order 12898 in 1994—reported taking some actions to identify and address environmental justice issues, such as creating data tools, developing policies or guidance, and building community capacity through small grants and training. For example, the Environmental Protection Agency (EPA) created a mapping tool that can help identify low-income and minority communities exposed to health or environmental risks. Several agencies, such as EPA and the Departments of Justice, Homeland Security, and the Interior, also developed policies or guidance to analyze environmental justice issues during environmental reviews or enforcement activities. Most of the agencies supported their efforts with funds and staff from related programs, but EPA and the Department of Energy provided funds ($8.3 million in fiscal year 2018) and staff specifically for environmental justice. Agencies' progress toward environmental justice is difficult to gauge, however, because most do not have updated strategic plans and have not reported annually on their progress or developed methods to assess progress. As they agreed to do in a 2011 Memorandum of Understanding (MOU), most of the agencies developed environmental justice strategic plans, but only six have updated them more recently. Few agencies have measures or methods for assessing progress, and the working group has not provided guidance to help agencies with such assessments. The number of agencies issuing annual progress reports has declined (see fig.). Updated strategic plans and annual progress reports, along with guidance on performance measures and methods, would help agencies provide essential information to assess their progress. The working group, chaired by EPA, has developed committees and written agreements to carry out its responsibilities to coordinate agencies' environmental justice efforts, but it is not carrying out several functions in the 1994 Executive Order. GAO has found that collaborative mechanisms, such as the working group, benefit from clear goals, but the working group's organizational documents do not contain clear strategic goals aligned to address the order. Clear strategic goals to carry out the executive order could enhance the group's strategic direction for intergovernmental environmental justice efforts. GAO is making 24 recommendations, including that agencies update environmental justice strategic plans and report on progress annually, and that EPA consult with other working group members to provide guidance on assessing progress and to set strategic goals. Of the 15 agencies with recommendations, eight agreed. Other agencies' responses included partial agreement, disagreement, and no comment. GAO continues to support its recommendations.", "document_type": "gao"}
{"report": "1993. For the version of this requirement that applied to DOL, HHS, and Education, the Stevens Amendment has appeared in all but one of the full appropriations acts passed in Congress since 1993. In proposing the amendment in 1988, Senator Ted Stevens described the role of states, local governments, and the federal government in forging a partnership to share in the costs of many projects and said that the federal contribution should be identified as a matter of taxpayer concern. Further, Senator Stevens said that taxpayers “ought to be informed how much money comes from Federal sources in any program, project, or grant activity.” More recently, the Consolidated Appropriations Act of 2018 and the appropriations for these agencies in 2019 renewed this requirement for DOL, HHS, and Education (see sidebar). total costs of the project or program that will be financed by non-governmental sources. Consolidated Appropriations Act of 2018, Pub. L. No. 115- 141, 132 Stat. 348, div. H, Title V, Sec. 505 (Mar. 23, 2018). The combined amount of grant funding that went to state and local governments from these three departments in federal fiscal year 2017 amounted to approximately $504 billion, or almost 75 percent of the $675 billion total distributed by all federal grant-making agencies to state and local governments that year. HHS had the largest amount of grant outlays to state and local governments with about $455 billion (67.4 percent of the total), Education distributed about $42 billion (6.2 percent), while Labor distributed about $7 billion (1.1 percent). Generally, agencies or their subdivisions provided grantees with the exact text of the Stevens Amendment, paraphrased its language, or in some cases referred grantees to other guidance containing the Stevens Amendment. Figure 1 summarizes what we found at each of the three agencies we reviewed with regard to the Stevens Amendment guidance they provide to grantees. According to ETA officials, grants from DOL’s ETA comprised more than 95 percent of DOL’s $22.1 billion in active grant awards as of October 1, 2018. ETA’s Office of Grants Management (OGM) developed standard terms and conditions that serve as a template for written agreements for grant awards. The terms and conditions template includes language largely similar to the Stevens Amendment, with one instance of paraphrasing, which is permissible under the relevant regulations. ETA’s paraphrased language states that the Stevens Amendment requirements apply to “all non-federal entities receiving federal funds,” whereas the actual Stevens Amendment wording is that the requirements apply to “all grantees receiving federal funds in this Act, including but not limited to state and local governments and recipients of federal research grants.” The Stevens Amendment has been in the agency’s terms and conditions library for grant awards since fiscal year 2014. ETA officials said they added the Stevens Amendment requirements to the terms and conditions because they wanted to ensure that grantees knew about the Stevens Amendment’s existence. ETA also disseminates its standard terms and conditions template to grantees on behalf of five other DOL grant-making subagencies, including the Veterans Employment and Training Service, the Chief Evaluation Office, the Bureau of International Labor Affairs, the Women’s Bureau, and the Office of Disability Employment Policy. According to ETA officials, OGM administers the front-end application processing for grants awarded by these subagencies, while the subagencies are responsible for any post-award grantee oversight. OGM also administers the final grant closeout for these subagencies. According to DOL officials, together with ETA, these subagencies awarded more than 99.8 percent of DOL’s active grant funds as of October 2018. According to DOL officials, three other DOL grant-making subagencies, the Mine Safety and Health Administration (MSHA), the Occupational Safety and Health Administration (OSHA), and the Bureau of Labor Statistics (BLS), administer their sub-agencies’ grant award processes themselves. Officials said that two of these agencies, MSHA and OSHA, disseminate their own separate grant award terms and conditions, and have their own separate guidance for grantees regarding compliance with the Stevens Amendment. For example, OSHA paraphrased the Stevens Amendment language in its terms and conditions. OSHA officials told us that instead of stating the amendment’s requirements in three parts, OSHA broke them out into four requirements that reflect the full content of the Stevens Amendment’s original language. MSHA also had its own terms and conditions that contain the exact language of the Stevens Amendment’s requirements, according to officials. The third agency, BLS, told us that its grantees only produce narrowly focused press releases and that these documents do not fall within the Stevens Amendment description of documents “describing projects or programs funded in whole or in part with Federal money.” BLS officials said that since none of the other qualifying public statements mentioned in the Stevens Amendment are part of BLS grantee operations, BLS cooperative agreements do not produce public statements that qualify for Stevens Amendment compliance. At the department level, HHS publishes a Grants Policy Statement that contains language equivalent to the Stevens Amendment, but it does not quote the amendment verbatim. Consistent with the Stevens Amendment, the Grants Policy Statement provision directs grantees to disclose information on the percentage and dollar amount of federal contributions to grantees’ programs or projects in addition to the same information for nongovernmental sources, but collapses the three Stevens Amendment requirements into two requirements with slight wording changes. Officials told us that HHS expects its operating divisions to follow the Grants Policy Statement together with the relevant HHS regulations, but does not instruct operating divisions on what to include in their grant award terms and conditions. A number of HHS operating divisions provide grantees with grant award terms and conditions that contain the exact language of the Stevens Amendment. Examples include: Centers for Disease Control and Prevention (CDC) - Provides grantees with general terms and conditions for both research and non-research grants and cooperative agreements that include a requirement for an “Acknowledgement of Federal Support” that is an exact re-statement of the Stevens Amendment. Health Resources and Services Administration (HRSA) - Provides grantees with the Standard Form 424 Application Guide (grants application guide), which includes a section that quotes the exact language of the Stevens Amendment. Office of the National Coordinator for Health Information Technology (ONC) - Added a section in 2018 to the terms and conditions section for every Funding Opportunity Announcement that specifically references the Stevens Amendment verbatim. One operating division, the Centers for Medicare and Medicaid Services (CMS) provides grantees with a section of its terms and conditions titled “Public Reporting” that shows the language of the Stevens Amendment, but with the addition of tribal governments to the list of applicable grant recipients. Another operating division, the National Institutes of Health (NIH), publishes its own grants policy statement separate from the one published by HHS. The NIH grants policy statement contains the standard terms and conditions for all NIH grant awards. It uses the same Stevens Amendment guidance language HHS uses, with the same paraphrasing of the language that collapses the three Stevens Amendment requirements into two requirements. Four relevant HHS operating divisions told us that they relied solely on a reference to the HHS Grants Policy Statement to instruct grantees with regard to the Stevens Amendment requirements. This reference made no specific mention of the Stevens Amendment and did not include either the exact or paraphrased Stevens Amendment language in the agencies’ grant agreement terms and conditions or funding opportunity announcement. HRSA’s “Acknowledgement of Federal Funding” provision in its grants application guide contains the exact language of the Stevens Amendment and its requirements. Further, HRSA’s application guide provides grantees with what HRSA officials stated was a sample acknowledgement and disclaimer paragraph written in “plain language” that the operating division developed to assist HRSA grantees in complying with the Stevens Amendment. HRSA officials said that they consulted with HHS’s Office of General Counsel to simplify the language, while ensuring that it met the requirements of the Stevens Amendment. HRSA’s sample acknowledgement and disclaimer paragraph reads, “This supported by the Health Resources and Services Administration (HRSA) of the U.S. Department of Health and Human Services (HHS) as part of an award totaling $XX with xx percentage financed with nongovernmental sources. The contents are those of the author(s) and do not necessarily represent the official views of, nor an endorsement, by HRSA, HHS or the U.S. Government.” Later in the section, HRSA further defines the Stevens Amendment’s “other documents describing projects or programs” as including, among other things, HRSA-supported documents such as manuals, toolkits, resource guides, case studies, and issues briefs. In addition to HRSA’s efforts to interpret the Stevens Amendment, HRSA posted a web page in October 2018 that provided grantees with additional written guidance and a list of “frequently asked questions” about communicating and acknowledging federal funding. The HRSA web page provided examples of HRSA disclosure statements to show grantees how disclosure language should be drafted to comply with the Stevens Amendment. The web page also featured frequently asked questions, one of which clarified that the disclosure should reflect the overall amount of the grant rather than the cost of developing the publication where the acknowledgement appears. The other frequently asked question directed grantees to consult with HRSA officials if they intend to use language that differs from the examples provided to ensure that their alternative wording complies with the Stevens Amendment requirements. HRSA officials also instructed their grantees on compliance with grant award terms and conditions, including the Stevens Amendment, through informal discussions during workshops and conference calls. HRSA officials provided examples of Stevens Amendment discussions such as a May 2018 Healthy Grants Workshop presentation to grantees, as well as a July 2018 question and answer period during an HRSA conference call with grantees. The grantee conference call featured several HRSA presenters, including one representing the Division of Grants Policy. Officials said that during these technical assistance calls, HRSA wanted to ensure that grantees were made aware of legislative mandates, but the calls were not tailored to focus on a specific mandate. Education grantees that receive discretionary and formula grants are provided with information on the Stevens Amendment through a Grant Award Notification attachment. The attachment is included with the terms and conditions of the grant award and has the exact language of the Stevens Amendment’s requirements, but paraphrases with regard to the types of entities to which the Stevens Amendment applies. Instead of applying the requirements to “all grantees receiving federal funds included in this act including but not limited to state and local governments and recipients of federal research grants” as noted in the Stevens Amendment, Education’s phrasing applies the requirements specifically to “U.S. Department of Education grantees.” According to Education officials, the grant notification process involves providing guidance to grantees and ensuring that they are made aware of various statutory requirements, including the Stevens Amendment. Education officials told us that another way that their agency communicates information about the Stevens Amendment to grantees is through Education’s required post-award conference call, during which the program offices reinforce grant recipients’ need to be aware of the requirements. The regulations that govern DOL, HHS, and Education’s management of grant awards state that “the Federal awarding agency must manage and administer the federal award in a manner so as to ensure that Federal funding is expended and associated programs are implemented in full accordance with U.S. statutory and public policy requirements.” The Stevens Amendment is a statutory requirement that these federal agencies must ensure is implemented by their grantees. Agencies’ management of the grant award so as to ensure implementation of the Stevens Amendment can be accomplished by various means, including the monitoring of grantees, through processes such as reviews of grantee reports and correspondence, desk audits, and grantee site visits. In our review of Stevens Amendment grants management practices at DOL, HHS, and Education, we found that DOL’s ETA had processes in place that were able to identify instances of grantee noncompliance with the Stevens Amendment and demonstrate that noncompliance was being remedied. ETA’s grants management processes took the form of grantee monitoring. Figure 2 below summarizes the Stevens Amendment monitoring practices of DOL, HHS, and Education. ETA officials told us that their subagency’s active grants represented more than 95 percent of DOL’s total active grant dollars, or approximately $21.1 billion. According to ETA officials, their operating plan for grant oversight targets 26 percent of the active ETA grants universe for monitoring each fiscal year, representing approximately 2,100 grants in fiscal year 2019. The regional office staff in each of ETA’s six regional offices conduct a risk analysis of the grants within their regions and assign a risk rating to each grant indicating its risk level. The grant’s risk level, which includes factors such as the dollar amount of the grant award and whether the grantee is on track to meet the grant’s performance goals, determines which grants ETA selects for monitoring and inclusion in its regional monitoring plans for that fiscal year. Each annual regional monitoring plan consists of a list of grants and schedule of ETA staff monitoring reviews. According to ETA, monitoring reviews are used to measure grantee progress toward achieving project goals, identify areas of grantee compliance, offer opportunities for technical assistance to help resolve compliance issues, and ensure that federal funds are used responsibly. ETA conducts these reviews either through an on-site monitoring visit or an “Enhanced Desk Monitoring Review” that is conducted remotely. ETA officials stated the regional monitoring plans are designed to be flexible management tools, and are updated throughout each fiscal year to ensure that ETA meets its operating plan’s goal to monitor 26 percent of its grants annually. According to ETA’s Grantee Handbook, upon completion of the monitoring review, ETA drafts a monitoring report to each of the grantees reviewed. The monitoring report includes, among other things, compliance findings and the required grantee corrective action for any noncompliance with the findings, along with the due date for the corrective action. In response to our request for examples of grantee noncompliance with the Stevens Amendment requirements, ETA officials from each of the agency’s six regional offices conducted a manual search of monitoring reports from fiscal years 2016 and 2017. ETA officials in four of the six ETA regional offices located monitoring reports with a finding stating that grantees’ public materials did not include the Stevens Amendment’s required language or information to properly identify the project’s federal funding dollar amount and the project’s percentage of federal and nongovernmental funding. Three of the four monitoring reports provided the grantee with the exact language of the Stevens Amendment and instructed the grantee to ensure that statements, such as brochures, promotional materials, and other public announcements, contain a statement that identifies the project’s funding sources in accordance with the three requirements of the Stevens Amendment. In the fourth monitoring report, while finding that the grantee did not include the required funding source statement in its documents, ETA’s comments in the monitoring report did not provide the grantee with the full language of the Stevens Amendment and had omitted the requirement to provide the percentage and dollar amount of costs financed by nongovernmental sources. For each of these examples, ETA officials showed that the grantees subsequently corrected their documents to bring them into compliance with the Stevens Amendment requirements. In the fourth example, the grantee’s subsequent inclusion of the required funding source statement in its documents showed that the program was 100 percent funded by federal dollars. In August 2018, ETA also created a “Core Monitoring Guide” that references the Stevens Amendment requirements as an element to be monitored by ETA officials when speaking with grantees. ETA intended this guide to be used as a tool in the on-site review of a grantee’s activities, and it provides officials with a series of checklists as well as the steps to take when conducting monitoring. For Stevens Amendment compliance, the guide includes a “Question for Review and Discussion” that uses the exact language of the Stevens Amendment. However, the Stevens Amendment is only one issue among many addressed in the guide, and ETA officials said they do not have the resources to audit all of the elements included in the guide. ETA officials said that their grant reviewers select from one to four sections of the guide to use when conducting monitoring, depending on the nature of the grant, and that the choice of which items to monitor is based on a risk analysis of the grantee and the grant projects’ quarterly financial reports. ETA officials acknowledged that the scope of their monitoring overall is limited to 26 percent of their grant universe for a given fiscal year, therefore the extent of noncompliance among ETA grantees cannot be determined. Of the eight DOL subagencies we spoke to other than ETA, two, OSHA and BLS, stated that they did not monitor grantees for compliance with Stevens Amendment requirements. These subagencies’ officials said they did not monitor for Stevens Amendment compliance because monitoring is not explicitly required under the statute and, in the case of BLS, because it believes that the type of press releases generated by their grantees do not fall within the scope of the Stevens Amendment. Six of the eight DOL subagencies told us that they conducted grantee compliance monitoring. However, based on the information and documents provided by officials from these six subagencies, they have not demonstrated that they have processes to manage grantees’ compliance with the Stevens Amendment. For example, the Chief Evaluation Office, the Bureau of International Labor Affairs (ILAB), and the Veterans’ Employment and Training Service stated that they do not track the extent of grantee compliance; and the Mine Safety and Health Administration said that it does not maintain records of grantee compliance with the Stevens Amendment. In addition, both ILAB and the Women’s Bureau, while stating that they conducted monitoring of grantee compliance with the Stevens Amendment, provided examples of grantee disclosures that did not meet all of its requirements. Further, the Office of Disability and Employment Policy (ODEP) said that all of its grantees were fully compliant with the Stevens Amendment, but produced no examples of grantee disclosures. The Uniform Administrative Requirements that govern certain federal agencies, including DOL, state with regard to the management of grants that “the Federal awarding agency must manage and administer the Federal award in a manner so as to ensure that Federal funding is expended and associated programs are implemented in full accordance with U.S. statutory and public policy requirements.” Other than ETA, DOL’s subagencies have not developed the processes needed to manage and administer grantees’ compliance with the Stevens Amendment. Without these processes, these DOL subagencies are not able to ensure that grant programs are being implemented by grantees in full accordance with the statutory requirements of the Stevens Amendment. At the department level, HHS officials said that they have no knowledge about whether their operating divisions conduct monitoring and enforcement of the Stevens Amendment, and they did not collect information from their operating divisions on grantee compliance with the Stevens Amendment’s requirements. According to HHS officials, any efforts to manage grant awards for adherence to Stevens Amendment requirements would be carried out by staff at the agency’s 10 relevant operating divisions. HHS officials said that operating divisions have an obligation to monitor their grantees for compliance with all of the agency’s standard grant award terms and conditions, which includes the Stevens Amendment. Of the 10 relevant HHS operating divisions we spoke with in our review, officials from eight of them—the Administration for Children and Families (ACF), the Agency for Healthcare Research and Quality (AHRQ), the Centers for Disease Control and Prevention (CDC), the Food and Drug Administration, the Health Resources and Services Administration (HRSA), the National Institutes of Health (NIH), the Office of the Assistant Secretary for Health (OASH), and the Substance Abuse and Mental Health Services Administration—told us that they did not monitor grantees’ compliance with Stevens Amendment requirements. Two of these operating divisions, ACF and AHRQ, further stated that the Stevens Amendment did not require them to monitor for grantee compliance. These operating divisions maintained the position that they are not required to monitor for grantee compliance despite HHS policy regarding operating division monitoring of grants that states “…to fulfill their role in regard to the stewardship of Federal funds, OPDIVs monitor their grants to identify potential problems and areas where technical assistance might be necessary. This active monitoring is accomplished through review of reports and correspondence from the recipient, audit reports, site visits, and other information available to the OPDIV.” As mentioned earlier in this report, agencies are required to manage grant awards and have a number of possible means available to do so—including grant monitoring. However, grant monitoring is not explicitly required by the Stevens Amendment. NIH officials stated that they do not specifically monitor for Stevens Amendment compliance and that NIH officials have not received any reports of noncompliance with the Stevens Amendment. They said they would address any non-compliance issues if they were raised. Similar to NIH, HRSA officials told us that they conduct grantee monitoring, but do not specifically review grantee documents for compliance with Stevens Amendment requirements unless there is a cause for concern regarding noncompliance. Similarly, CDC officials said that their grantee monitoring practices do not specifically target Stevens Amendment compliance. CDC officials further explained that while grant program officers may find instances of noncompliance during a grant review, it would be tangential to other issues more central to the focus of the grant review, such as grantee financial performance and goal accomplishment. Officials from OASH stated that while they do not specifically review grantees’ written statements for Stevens Amendment compliance, they provide grantees with guidance regarding how to comply with its requirements. For example, a grantee asked whether a Stevens Amendment acknowledgement statement had to be included on billboards the recipient rented to promote their program’s services. OASH determined that the grantee did not need to include the statement on the billboards. ONC officials told us that all of their grantees were in compliance with the Stevens Amendment. ONC officials stated that while they do not specifically look for Stevens Amendment compliance, it was their belief that ONC monitoring practices would identify instances of noncompliance for their small number of grantees. ONC officials told us their belief is based on interactions with a wide range of grantees’ employees during monitoring visits that seek to ensure that all compliance issues among their grantees are addressed. The remaining HHS operating division in our review, CMS, told us that its monitoring processes include reviews for Stevens Amendment requirements and that CMS had a process for reviewing grantee documents. According to HHS policy, the results and accomplishments of the activities CMS funds should be made public and CMS requires grantees to make the results and accomplishments of their activities available to the research community and to the public at large. The grantee must submit any materials to CMS in advance of publication, including brochures, recruitment materials, informational materials, advertisements, website copy, website pages, videos, and op-ed articles that report results from or describe information obtained through the grant award. CMS officials told us they reviewed for Stevens Amendment compliance, and provided us with examples of materials they said were from grantees that were in compliance. However, in our analysis of the sample grantee materials from CMS, we found that the grantees were not in compliance with the cost requirements of the Stevens Amendment. Despite the claims and efforts of some HHS operating divisions with regard to monitoring for Stevens Amendment compliance, none of HHS’s operating divisions could demonstrate that they had a process to manage and administer grantees’ compliance with the Stevens Amendment requirements. In addition to the previously-mentioned Uniform Administrative Requirements applicable to all grant awards, HHS regulations that govern the agency’s grant making state that, “The Federal awarding agency must manage and administer the Federal award in a manner so as to ensure that Federal funding is expended and associated programs are implemented in full accordance with U.S. statutory and public policy requirements.” Further, these regulations also state, “The Federal awarding agency must communicate to the non- Federal entity all relevant public policy requirements, including those in general appropriations provisions, and incorporate them either directly or by reference in the terms and conditions of the Federal award.” Neither HHS, nor its operating divisions, had developed processes to manage and administer grantees’ Stevens Amendment compliance. Without having processes to manage and administer their grantees’ compliance with the Stevens Amendment, which is included in HHS’s appropriations provisions, there is no way for HHS or its operating divisions to ensure that grantees are in full accordance with the statutory requirements of the Stevens Amendment appropriations provision and the agency-communicated conditions of the federal award. Further, without monitoring grants in accordance with their Grants Policy Statement, HHS and its operating divisions are not able to identify potential problems related to grantees’ Stevens Amendment compliance. Education officials stated that its program offices do not explicitly track individual grantees for Stevens Amendment compliance. Education officials told us that their grant review process does not collect Stevens Amendment documentation nor do they gather information regarding the extent of grantee compliance with the appropriations provision. As a consequence, Education cannot determine the extent of their grantees’ compliance with the requirements of the Stevens Amendment. Representatives from Education’s Office of General Counsel stated that Education has an “obligation to correct” instances of Stevens Amendment noncompliance, but does not have an “obligation to monitor” its grantees to determine whether they are in compliance. Education officials told us that due to limited resources, they use risk assessment results to identify and prioritize which items among their standard terms and conditions they will monitor during the course of a grant review. Officials told us they had not received any complaints related to the Stevens Amendment. The uniform regulations that govern federal agencies, including Education’s management of grants, state that “the Federal awarding agency must manage and administer the federal award in a manner so as to ensure that Federal funding is expended and associated programs are implemented in full accordance with U.S. statutory and public policy requirements.” Education has not developed the processes it needs to manage and administer grantees’ compliance with the Stevens Amendment which is included in Education’s appropriations provisions. Without these processes, Education is not able to ensure that grant programs are being implemented by grantees in full accordance with the statutory requirements of the Stevens Amendment appropriations provision and the agency-communicated conditions of the federal award. With two exceptions, the subagencies and operating divisions we reviewed that stated they conducted monitoring had no information on the methods used by grantees to calculate the federal funding dollar amounts or funding percentage figures required by the Stevens Amendment. As an example, DOL’s ETA officials told us that they do not know how the dollar amounts reported by grantees were calculated, and they have not inquired about the level of detail factored into indirect costs involving the grantee organization’s structure and the percentage of funds spent on salaries. In addition, officials at DOL’s ILAB said that it is not always clear how grantees calculate these costs, and the Stevens Amendment does not provide specific guidance on how costs should be determined. Officials also noted that some grantees expressed confusion regarding the requirements and how to calculate the total federal funds, including in cases where there may be collaboration across federally-funded programs. Similarly, officials from HHS’s NIH operating division noted that calculations can be difficult given that research programs can have multiple funding streams that feed into a grant project and grantees’ research portfolios are now more complex than they have been in the past. Officials at one DOL subagency, ODEP, said that grantees calculate the total funds received in the grant awarding document and that these funds include negotiated indirect cost rates. The remainder of the DOL subagencies and HHS operating divisions that produced examples of either compliance or noncompliance with the amendment did not have information on how grantees made their disclosure calculations. In addition, officials at one HHS operating division, HRSA, said the HRSA Notice of Award lists the total federal and non-federal amounts for the grant project or program. Grantees can use this information to calculate the percentage of federal funding and nongovernmental funding. However, in the Stevens Amendment compliance examples that HRSA provided to us, this calculation was not necessary because these projects were 100 percent funded by the HRSA grant award. In addition, HRSA officials told us that they are not aware of any other methods that grantees would need to use to arrive at the percentage. With regard to indirect costs, HRSA officials said that these costs are already included in the federal award amount and, therefore, any calculation of funding percentage should already account for the inclusion of both direct and indirect costs. Congress has repeatedly taken action to include the Stevens Amendment requirements with agencies’ appropriations. Ensuring grantee compliance with accountability requirements is achieved through investment of federal agency resources that reflect decisions regarding how best to ensure efficient and effective use of grant funds while reinforcing statutory requirements. DOL’s largest grant making subagency, ETA, showed that its grantee review processes were, to some extent, actively monitoring for Stevens Amendment compliance and that when ETA found compliance issues, it was able to provide grantees with the technical assistance needed to correct them. While a couple of HHS operating divisions showed some evidence that they were enhancing their guidance to grantees with regard to the Stevens Amendment, none of the operating divisions could demonstrate that they had a process to manage and administer grantees’ compliance with the Stevens Amendment requirements. Education officials stated that while their agency does not have an “obligation to monitor” its grantees to determine whether they are in compliance with the Stevens Amendment, they do have an “obligation to correct” instances of noncompliance if brought to their attention. While none of the agencies in this review can determine the extent of their grantees’ compliance with the Stevens Amendment, DOL’s ETA has monitored grantee compliance with the provision, and when noncompliance is found, has taken steps to bring their grantees into compliance. However, with no such processes in place, the remaining DOL subagencies, HHS’s operating divisions, and Education are not able to manage or administer grantee compliance with the Stevens Amendment appropriation provision so as to ensure that grant funds are being expended in full accordance with these statutory and regulatory requirements. We are making a total of three recommendations, one to each of the three agencies in our review, to take steps to manage grantees’ compliance with the Stevens Amendment. Specifically: The Secretary of Labor should direct its subagencies, other than ETA, to design and implement a process to manage and administer grantees’ compliance with the Stevens Amendment, including determining to what extent to provide guidance to grantees on calculations. (Recommendation 1) The Secretary of Health and Human Services should direct its operating divisions to design and implement processes to manage and administer grantees’ compliance with the Stevens Amendment, including determining to what extent to provide guidance to grantees on calculations. (Recommendation 2) The Secretary of Education should design and implement a process to manage and administer grantees’ compliance with the Stevens Amendment, including determining to what extent to provide guidance to grantees on calculations. (Recommendation 3) We provided a draft of this report to DOL, HHS, and Education for review and comment. We received written concurrence from DOL, and written comment letters from DOL’s OSHA, HHS, and Education. The comment letters are reprinted in appendixes I, II, and III, respectively and are summarized below. DOL stated that it concurs with our recommendation. OSHA provided written comments and stated that it generally agreed with GAO’s recommendation. OSHA said it will take steps to establish processes to monitor grantee compliance with Stevens Amendment requirements, to include reviewing what assistance the agency can provide to grantees on how to calculate funding percentages. OSHA further stated that it has begun updating its grant and cooperative agreement instructions to include the Stevens Amendment language verbatim, rather than paraphrasing the language, and is adding guidance to grant monitoring guidelines to assist OSHA’s Regional Offices in reviewing compliance with the Stevens Amendment. DOL subagencies ILAB, BLS, ETA, and ODEP also provided technical comments, which we incorporated into the report where appropriate. In its written comments, HHS stated that it concurs with our recommendation and would implement the recommendation to the fullest extent feasible. HHS officials said they would direct all operating divisions to design a process for implementing and monitoring the Stevens Amendment and would update HHS grants policy to reflect this new process. HHS also provided technical comments, which we incorporated into the report where appropriate. Education provided written comments stating that it did not concur with our recommendation, but would consider enhancing its existing approach to compliance with the Stevens Amendment. We reiterate our recommendation that Education should design and implement a process to manage and administer grantees’ compliance with the Stevens Amendment, including determining to what extent to provide guidance to grantees on calculations. Education had three concerns regarding the recommendation. First, Education said that our recommendation is not based on any evidence of noncompliance with the Stevens Amendment by Education grantees. As noted in our report, we found that Education lacks information regarding whether its grantees are, or are not, complying with the requirements of the Stevens Amendment. As indicated in this report, Education officials told us that they do not collect documentation from grantees to monitor their compliance with the Stevens Amendment, nor do they analyze information regarding the extent of grantee compliance with the Stevens Amendment. As a consequence, Education does not know the extent to which its grantees are or are not complying with the statutory requirements of the Stevens Amendment. Without this knowledge, Education does not have assurance that its grant awards are managed and administered in accordance with federal regulations. Second, Education referred to its tiered risk-based approach to grantee monitoring that balances compliance requirements with limited monitoring resources in alignment with the President’s Management Agenda. According to Education, implementation of the recommendation would require them to devote limited resources to managing and administering grantee compliance with the Stevens Amendment when there is no evidence of grantee noncompliance. We acknowledge that the cross- agency priority goal in the President’s Management Agenda refers to maximizing the value of grant funding by applying a risk-based, data- driven framework that balances compliance requirements with demonstrating successful results. However, because Education does not collect information or documentation on this aspect of grantee compliance, it lacks the data needed to make an informed risk-based assessment with regard to monitoring for Stevens Amendment compliance. The recommendation could be implemented within the context of Education’s risk-based approach to grantee monitoring as long as Education gathers the grantee compliance information needed to apply their risk-based, data-driven framework. Third, Education said that it has already taken numerous steps to make its process for awarding and overseeing grant funds transparent to the public. However, these steps do not eliminate the legal requirements that grantees must comply with the Stevens Amendment, and that federal agencies, including Education, must manage and administer the federal award in a manner that is fully in accordance with statutory requirements. Education did state that it would consider enhancing its existing approach to Stevens Amendment compliance with actions that further explain the requirements to grant recipients. While such efforts could enhance grantees’ understanding of the Stevens Amendment, they would not give Education the grantee compliance information it needs to apply to a risk- based, data-driven framework or to manage and administer its grant awards in accordance with federal regulations. For all of these reasons we continue to believe that our recommendation to Education is valid and that Education should fully implement it. We are sending copies of this report to the Secretaries of Labor, Health and Human Services, and Education, as well as interested congressional committees and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or sagerm@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In addition to the contact named above, Tom James (Assistant Director), Anthony Bova (Analyst-in-Charge), Jacqueline Chapin, Jehan Chase, Robert Robinson, Wesley Sholtes, and Walter Vance made key contributions to this report.", "summary": "Since 1989, an appropriations provision, colloquially known as the “Stevens Amendment,” has reflected Congress's longstanding effort to ensure transparency and accountability in federal grant spending. GAO was asked to review agency guidance and grantee compliance related to the Stevens Amendment. This report (1) describes the guidance DOL, HHS, and Education provide to grantees regarding the Stevens Amendment; (2) examines the extent to which DOL, HHS, and Education are managing grantees' compliance with the Stevens Amendment; and (3) describes what is known about how grantees calculate the dollar amounts and percentages of their federal and nongovernmental funding disclosures. GAO asked for agency guidance documents, reviewed monitoring reports, interviewed officials on agencies' Stevens Amendment oversight efforts, and asked agencies how grantees calculate funding amounts. The Stevens Amendment is an appropriations provision that requires grantees of the Departments of Labor (DOL), Health and Human Services (HHS), and Education (Education) to disclose for a grant program the percent of the costs financed with federal funds, the federal dollar amount, and the percentage and dollar amount financed by nongovernmental funds. The provision requires that recipients of grants funded by DOL, HHS, and Education make certain funding disclosures when issuing statements, press releases, bid solicitations, and other documents describing their grant project or program. DOL, HHS, and Education generally provide written guidance to grantees with the exact text of the Stevens Amendment or a paraphrased equivalent. In addition, a number of operating divisions within HHS referenced the HHS Grants Policy Statement, which includes language equivalent to the Stevens Amendment, as a way to instruct grantees. One HHS operating division, the Health Resources and Services Administration, provided grantees with additional guidance in the form of a web page that contained examples of funding disclosure statements and frequently asked questions intended to clarify the Stevens Amendment's requirements. One DOL subagency, the Employment and Training Administration (ETA), whose active grants represented more than 95 percent of DOL's total grant dollars, had processes for managing grantees' compliance that were able to identify instances of grantee noncompliance with Stevens Amendment requirements. ETA's operating plan for grant oversight targets 26 percent of its active grants for risk-based monitoring each fiscal year, representing approximately 2,100 grants in fiscal year 2019. The other DOL subagencies either stated that they did not monitor grantees for compliance with Stevens Amendment requirements or did not have processes in place for managing grantee compliance with the requirements of the Stevens Amendment. Most HHS operating divisions said they did not review grantees for Stevens Amendment compliance. Education also did not monitor for grantee compliance with the Stevens Amendment's requirements. Regulations governing federal agencies' management of grants require federal agencies to manage and administer the federal award in a manner that ensures that programs are implemented in full accordance with U.S. statutory and public policy requirements. Without processes for managing compliance, some DOL subagencies, HHS operating divisions, and Education are unable to ensure that grant programs are being implemented by grantees in full accordance with the statutory requirements of the Stevens Amendment. Most of the subagencies and operating divisions monitoring compliance did not gather information from grantees about how the grantees calculate the dollar amounts and percentages in their Stevens Amendment funding disclosures. For example, DOL's ETA officials said that they do not know how the dollar amounts reported by grantees were calculated, and have not inquired about the level of detail factored into indirect costs involving the grantee organization's structure and the percentage of funds spent on salaries. Similarly, officials from HHS's National Institutes of Health operating division noted that calculations can be difficult given that a research program can have multiple funding streams that feed into a grant project and grantees' research portfolios are now more complex than they have been in the past. GAO recommends that DOL subagencies (other than ETA), HHS operating divisions, and Education design and implement processes to manage grantees' compliance with the Stevens Amendment. In responding to the report, DOL, one DOL subagency, and HHS agreed with GAO's recommendation. Education disagreed with GAO's recommendation, citing limited monitoring resources and other reasons. GAO believes the recommendation should be fully implemented, as discussed in the report.", "document_type": "gao"}
{"report": "We have previously reported on various aspects of national preparedness, including examining the extent to which FEMA programs encourage disaster resilience and identifying gaps in federal preparedness capabilities. We have found that when federal, state, and local efforts aligned to focus on improving disaster resilience and preparedness, there was a noticeable reduction in the effects of the disaster. However, our prior and ongoing work also highlight opportunities to improve disaster resilience and preparedness nationwide. Hazard mitigation is a key step in building resilience and preparedness against future disasters. In July 2015, we found that states and localities experienced challenges when trying to use federal funds to maximize resilient rebuilding in the wake of a disaster. In particular, they had difficulty navigating multiple federal grant programs and applying federal resources towards their most salient risks because of the fragmented and reactionary nature of the funding. In our 2015 report, we recommended that the Mitigation Framework Leadership group—an interagency body chaired by FEMA—create a National Mitigation Investment Strategy to help federal, state, and local officials plan for and prioritize disaster resilience. As of May 2019, according to FEMA officials, the Mitigation Framework Leadership group is on track to address the recommendation, and they expect the strategy to be published by July 2019. In September 2017, we reported that the methods used to estimate the potential economic effects of climate change in the United States—using linked climate science and economics models—could inform decision makers about significant potential damages in different U.S. sectors or regions, despite the limitations. For example, for 2020 through 2039, one study estimated between $4 billion and $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms. We found that the federal government has not undertaken strategic government-wide planning on the potential economic effects of climate change to identify significant risks and craft appropriate federal responses. As a result, we recommended the Executive Office of the President, among others, should use information on the potential economic effects of climate change to help identify significant climate risks facing the federal government and craft appropriate federal responses, such as establishing a strategy to identify, prioritize, and guide federal investments to enhance resilience against future disasters; however, as of June 2019, officials have not taken action to address this recommendation. In November 2017, we found that FEMA had taken some actions to better promote hazard mitigation as part of its Public Assistance grant program. However, we also reported that more consistent planning for, and more specific performance measures related to, hazard mitigation could help ensure that mitigation is incorporated into recovery efforts. We recommended, among other things, that FEMA (1) standardize planning efforts for hazard mitigation after a disaster and (2) develop performance measures for the Public Assistance grant program to better align with FEMA’s strategic goal for hazard mitigation in the recovery process. FEMA concurred with our recommendations, and as of March 2019, officials have reported taking steps to increase coordination across its Public Assistance, mitigation, and field operations to ensure hazard mitigation efforts are standardized and integrated into the recovery process. Additionally, FEMA officials reported taking actions to begin developing disaster-specific mitigation performance measures. However, FEMA has yet to finalize these actions, such as by proposing performance measures to FEMA senior leadership. As such, we are continuing to monitor FEMA’s efforts to address these recommendations. In March 2011, we reported that FEMA had not completed a comprehensive and measurable national preparedness assessment of capability gaps—for example the amount of resources required to save lives, protect property and the environment, and meet basic human needs after an incident has occurred. Developing such an assessment would help FEMA to identify what capability gaps exist and what level of resources are needed to close such gaps. Accordingly, we suggested that FEMA complete a national preparedness assessment to evaluate capability requirements and gaps at each level of government to enable FEMA to prioritize grant funding. As of December 2018, FEMA had efforts underway to assess urban area, state, territory, and tribal preparedness capabilities to inform the prioritization of grant funding; however, the agency had not yet completed a national preparedness assessment with clear, objective, and quantifiable capability requirements against which to assess preparedness. We are continuing to monitor FEMA’s efforts to complete such an assessment. Furthermore, in March 2015, we reviewed selected states’ approaches to budgeting for disaster costs to help inform congressional consideration of the balance between federal and state roles in funding disaster assistance. Specifically, we reported that none of the 10 states in our review maintained reserves dedicated solely for future disasters, and some state officials reported that they could cover disaster costs without dedicated disaster reserves because they generally relied on the federal government to fund most of the costs associated with disaster response and recovery. In response to the 2017 disasters, we also have ongoing work to review national preparedness capabilities to assist communities in responding to and recovering from disasters. Based on our preliminary observations, some states and localities we interviewed reported that while they are prepared to deal with immediate response issues in the aftermath of a disaster, gaps exist in their capacity to support longer term recovery. One reason for this, according to these state and local officials, is because federal preparedness grant funds are largely dedicated to maintaining response capabilities and sustaining personnel costs for local emergency management officials. While these preparedness grants fund critical elements of the national preparedness system, there are some limitations to using them. Specifically, some state and local officials told us that the preparedness grant activities are generally focused on terrorism issues rather than all-hazards. In addition, they reported that the preparedness grants are generally spent on maintaining response capabilities rather than to enhance their capacity for disaster recovery—such as additional training and exercises. In addition to the state, territory, and urban region assessments that FEMA is conducting, FEMA is currently in the process of developing the first national Threat and Hazard Identification and Risk Assessment. This national assessment may help FEMA and policymakers better understand how to target federal resources in a way that enhances the nation’s capacity to respond and recover from future catastrophic or sequential disasters. We are continuing to evaluate national preparedness efforts and plan to report on FEMA’s Threat and Hazard Identification and Risk Assessment process in January 2020. In September 2018, we reported that the response to the 2017 hurricanes and wildfires in Texas, Florida, and California showed progress made since the 2005 federal response to Hurricane Katrina. We also found that FEMA coordinated closely with Texas, Florida, and California emergency management officials and other federal, local, and volunteer emergency partners to implement various emergency preparedness actions prior to the 2017 disasters in each state, and to respond to these disasters. According to FEMA and state officials, these actions helped officials begin addressing a number of challenges they faced such as meeting the demand for a sufficient and adequately-trained disaster workforce and complex issues related to removing debris in a timely manner after the hurricanes and wildfires. In contrast, we also reported in September 2018, that in Puerto Rico and the USVI a variety of challenges—such as the far distance of the territories from the U.S. mainland, limited local preparedness for a major hurricane, and outdated local infrastructure—complicated response efforts to hurricanes Irma and Maria. Many of the challenges we identified are also described in FEMA’s 2017 Hurricane Season FEMA After-Action Report, including: the sequential and overlapping timing of the three hurricanes—with Maria being the last of the three—caused staffing shortages and required FEMA to shift staff to the territories that were already deployed to other disasters; the far distance of both territories from the U.S. mainland complicated efforts to deploy federal resources and personnel quickly; and the incapacitation of local response functions due to widespread devastation and loss of power and communications, and limited preparedness by Puerto Rico and the USVI for a category 5 hurricane resulted in FEMA having to assume response functions that territories would usually perform themselves. We also reported that FEMA’s 2017 Hurricane Season FEMA After-Action Report noted that FEMA could have better leveraged information from preparedness exercises in the Caribbean, including a 2011 exercise after- action report for Puerto Rico which indicated that the territory would require extensive federal support during a large scale disaster in moving commodities from the mainland to the territory and to distribution points throughout. In our September 2018 report, we also found that FEMA’s efforts in Puerto Rico after Hurricane Maria were the largest and longest single response in the agency’s history. According to FEMA, the agency’s response included, among other things, bringing in approximately $1 billion in food and supplies; and distributing food, commodities, and medicine via approximately 1,400 flights, which constituted the longest sustained air operations in U.S. disaster history. FEMA officials explained that the agency essentially served as the first responder in the early response efforts in Puerto Rico, and many of services FEMA provided—such as power restoration, debris removal, and commodity distribution—were typically provided by territorial or local governments. We also reported in September 2018, that in the USVI, recent disaster training and the pre-positioning of supplies due to the anticipated impact of Hurricane Irma facilitated the response efforts for Hurricane Maria, which made landfall less than two weeks later. According to FEMA’s federal coordinating officer, the lead federal official in charge of response for the USVI, the federal government deployed assets, including urban search and rescue teams and medical assistance teams. In addition, due to the sequence of Hurricane Irma hitting the USVI immediately before Hurricane Maria, the Department of Defense (DOD) already had personnel and resources (i.e., ships) deployed to the area, which enabled DOD to respond to Hurricane Maria faster than it otherwise would have. Additional challenges we have reported on regarding response operations have included providing short-term housing and sheltering for disaster survivors. The Department of Homeland Security’s (DHS) 2017 National Preparedness Report states that providing effective and affordable short- term housing for disaster survivors has been a longstanding and continuing challenge. For example, following the California wildfires, local officials faced challenges identifying shelter for displaced survivors, in part due to a housing shortage that existed before the wildfires. Federal, state, and local officials formed housing task forces which facilitated a joint decision-making approach to address these challenges. While this approach has enabled the state to meet its most pressing short-term housing needs, according to FEMA officials, the state faces other challenges in the long term. For example, FEMA officials in the region covering California told us that because of the nature of damage following a wildfire and because of housing shortages in California, some of FEMA’s forms of housing assistance have been less relevant in the wake of the California wildfires than for other disasters. We will continue to evaluate these and other challenges and plan to report in fall 2019. We also have ongoing work to review efforts to provide mass care— which includes sheltering, feeding and providing emergency supplies— following the 2017 hurricanes. Our preliminary observations indicate that during and immediately following the hurricanes, the number of people seeking public shelters outpaced the capacity. In Texas and Florida, emergency managers we spoke with described having unprecedented numbers of residents needing shelters but not always enough staff initially to operate the shelters. In Texas, Puerto Rico, and the USVI, hurricanes Harvey, Irma, and Maria flooded or destroyed many buildings planned for use as shelters, according to emergency management and local government officials in these areas. As a result, some remaining shelters were at maximum capacity. In the USVI, residents of some public housing units that had sustained significant damages sought help at the territory’s Department of Human Services because there was no more space in the shelters, according to local government officials. While they were turned away from the shelters, these families were able to take refuge in the lobby of the Department of Human Services building. We will continue to evaluate these and other challenges and plan to report in summer 2019. In December 2018 and April 2019, we reported that, in response to hurricanes Harvey, Irma, and Maria, as well as the 2017 California wildfires, FEMA and other federal partners relied heavily on advance contracts—which are established before a disaster to provide for life- sustaining goods and services such as food, water and transportation typically needed immediately after a disaster—and post disaster contracts—which can be used for various goods and services, such as debris removal and installation of power transmission equipment. FEMA is required to coordinate with states and localities and encourage them to establish their own advance contracts with vendors. In December 2018, we reported on inconsistencies we found in that coordination and in the information FEMA used to coordinate with states and localities on advance contracts. As a result of this and other challenges identified, we made nine recommendations to FEMA, including that it update its strategy and guidance to clarify the use of advance contracts, improve the timeliness of its acquisition planning activities, revise its methodology for reporting disaster contracting actions to Congress, and provide more consistent guidance and information for contracting officers in coordinating with states and localities to establish advance contracts. FEMA concurred with all of these recommendations, and we are continuing to monitor its efforts to implement each recommendation. Furthermore, in April 2019, we reported on challenges that we found in the federal government’s use of post-disaster contracts. These challenges included a lack of transparency about contract actions, challenges with requirements development, and with interagency coordination. In our report, we found that FEMA had begun taking some steps to address the consistency of post-disaster contract requirements with contracting officers, but that inaccurate or untimely estimates in the contracts we reviewed sometimes resulted in delays meeting the needs of survivors. As a result of our findings in this report, we made 10 recommendations to FEMA and other federal agencies that use these post-disaster contracts related to improving the management of such contracts. FEMA and other agency officials concurred with nine of the recommendations and have reported taking actions to begin implementing them. We will continue to monitor FEMA’s progress in fully addressing these recommendations. FEMA provides multiple forms of disaster recovery assistance after a major disaster has been declared, including Public Assistance and Individual Assistance. Through these grant programs, FEMA obligates billions of dollars to state, tribal, territorial, and local governments, certain nonprofit organizations, and individuals that have suffered injury or damages from major disaster or emergency incidents, such as hurricanes, tornados, or wildfires. In September 2016, we reported that, from fiscal years 2005 through 2014, FEMA obligated almost $46 billion for the Public Assistance program and over $25 billion for the Individual Assistance program. According to FEMA’s May 2019 Disaster Relief Fund report, total projected obligations through fiscal year 2019 for the Public Assistance and Individual Assistance programs for just the 2017 hurricanes—Harvey, Irma, and Maria—are roughly $16 billion and $7 billion, respectively. Given the high cost of these programs, it is imperative that FEMA continue to make progress on the challenges we have identified in our prior and ongoing work regarding its recovery efforts. FEMA’s Public Assistance program provides grants to state, tribal, territorial, and local governments for debris removal; emergency protective measures; and the repair, replacement, or restoration of disaster-damaged, publicly owned facilities. It is a complex and multistep program administered through a partnership among FEMA, the state, and local officials. Prior to implementing the Public Assistance program, FEMA determines a state, territorial or tribal government’s eligibility for the program using the per capita damage indicator. In our September 2018 report on federal response and recovery efforts for the 2017 hurricanes and wildfires, we reported on FEMA’s implementation of the Public Assistance program, which has recently undergone significant changes as a result of federal legislation and agency initiatives. Specifically, we reported on FEMA’s use of its redesigned delivery model for providing grants under the Public Assistance program, as well as the alternative procedures for administering or receiving such grant funds that FEMA allows states, territories, and local governments to use for their recovery. Our prior and ongoing work highlights both progress and challenges with FEMA’s Public Assistance program, including the agency’s methodology for determining program eligibility, the redesigned delivery model, and the program’s alternative procedures. FEMA’s Public Assistance program provides grants to repair public infrastructure such as water storage systems, roads, and power lines. In September 2012, we found that FEMA primarily relied on a single criterion, the per capita damage indicator, to determine a jurisdiction’s eligibility for Public Assistance funding. However, because FEMA’s current per capita indicator, set at $1 in 1986, does not reflect the rise in (1) per capita personal income since it was created in 1986 or (2) inflation from 1986 to 1999, the indicator is artificially low. Our analysis of actual and projected obligations for 508 disaster declarations in which Public Assistance was awarded during fiscal years 2004 through 2011 showed that fewer disasters would have met either the personal income-adjusted or the inflation-adjusted Public Assistance per capita indicators for the years in which the disaster was declared. Thus, had the indicator been adjusted annually since 1986 for personal income or inflation, fewer jurisdictions would have met the eligibility criteria that FEMA primarily used to determine whether federal assistance should be provided, which would have likely resulted in fewer disaster declarations and lower federal costs. We recommended, among other things, that FEMA develop and implement a methodology that more comprehensively assesses a jurisdiction’s capacity to respond to and recover from a disaster without federal assistance, including fiscal capacity and consideration of response and recovery capabilities. DHS concurred with our recommendation and, in January 2016, FEMA was considering establishing a disaster deductible, which would have required a predetermined level of financial or other commitment before FEMA would have provided assistance under the Public Assistance program. In August 2018, FEMA told us that it was no longer pursuing its proposed disaster deductible due to concerns about the complexity of the proposal. FEMA is considering options that leverage similar approaches, but does not have an estimated completion date for implementation. In addition, the DRRA requires FEMA to initiate rulemaking to (1) update the factors considered when evaluating requests for major disaster declarations, including reviewing how FEMA estimates the cost of major disaster assistance, and (2) consider other impacts on the capacity of a jurisdiction to respond to disasters, by October 2020. Until FEMA implements a new methodology, the agency will not have an accurate assessment of a jurisdiction’s capabilities and runs the risk of recommending that the President award Public Assistance to jurisdictions that have the capacity to respond and recover on their own. Prior to our September 2018 report, we had previously reported on the Public Assistance program in November 2017. Specifically, we reported that FEMA redesigned the delivery model for providing grants under the Public Assistance program. As part of the redesign effort, FEMA developed a new, web-based case management system to address past challenges, such as difficulties in sharing grant documentation among FEMA, state, and local officials and tracking the status of Public Assistance projects. Both FEMA and state officials involved in testing of the redesigned delivery model stated that the new case management system’s capabilities could lead to greater transparency and efficiencies in the program. However, we found that FEMA had not fully addressed two key information technology management controls that are necessary to ensure systems work effectively and meet user needs. We recommended, among other things, that FEMA (1) establish controls for tracking the development of system requirements, and (2) establish system testing criteria, roles and responsibilities, and the sequence and schedule for integration of other relevant systems. FEMA concurred with these recommendations and has fully implemented the first recommendation. Regarding the second recommendation, FEMA has not yet finalized its decision on whether to integrate its new case management system with its current grants management system. As of March 2019, we are awaiting a final decision from officials to determine whether their actions fully address our recommendation. FEMA’s original intention was to implement the redesigned delivery model for all future disasters beginning in January 2018. However, in September 2017, FEMA expedited full implementation of the redesigned model shortly after Hurricane Harvey made landfall. In September 2018, we reported that local officials continued to experience challenges with using the new Public Assistance web-based, case management system following the 2017 disasters, such as not having sufficient guidance on how to use the new system and delays with FEMA’s processing of their projects. In February 2019, we also reported that FEMA and the USVI were transitioning from using the standard Public Assistance program to using Public Assistance alternative procedures. FEMA and USVI officials stated that the alternative procedures will give the USVI more flexibility in determining when and how to fund projects and allow the territory to use any excess funds for cost-effective hazard mitigation measures, among other uses. Further, when using the alternative procedures, the Bipartisan Budget Act of 2018 allows FEMA, the USVI and Puerto Rico to repair and rebuild critical services infrastructure—such as medical and education facilities—so it meets industry standards without regard to pre-disaster condition (see Figure 1). Regarding the implementation of the Public Assistance program in Puerto Rico, in March 2019, we reported that Puerto Rico established a central recovery office to oversee federal recovery funds and was developing an internal controls plan to help ensure better management and accountability of the funds. In the interim, FEMA instituted a manual process for reviewing each reimbursement request before providing Public Assistance funds to mitigate risk and help ensure financial accountability. We also reported that officials we interviewed from FEMA, Puerto Rico’s central recovery office, and municipalities said they experienced initial challenges with the recovery process, including concerns about lack of experience and knowledge of the alternative procedures; concerns about missing, incomplete, or conflicting guidance on the alternative procedures; and concerns that municipalities had not been fully reimbursed for work already completed after the hurricanes, causing financial hardships in some municipalities. FEMA officials stated that the agency is taking actions to address reported recovery challenges, such as additional training for new FEMA employees and drafting supplemental guidance for the alternative procedures process. We continue to monitor FEMA’s efforts in our ongoing work. As part of our ongoing work, we are continuing to examine hurricane recovery efforts in the USVI and Puerto Rico. Our preliminary observations indicate that the USVI plans to take a cautious approach in pursuing permanent work projects using the Public Assistance alternative procedures program, which requires the use of fixed-cost estimates. Specifically, USVI officials we interviewed told us that developing such fixed-cost estimates that accurately incorporate the future impact of inflation and increases in materials and labor costs for certain projects was difficult. Further, these officials stated that since the territory is financially responsible for any costs that exceed these fixed-cost estimates, the USVI plans to pursue projects that do not include high levels of complexity or uncertainty to reduce the risk of cost overruns. From our ongoing work on Puerto Rico’s recovery efforts, we have learned that, in March 2019, Puerto Rico’s central recovery office released the Disaster Recovery Federal Funds Management Guide, including an internal controls plan for the operation of the recovery office. On April 1, 2019, FEMA removed the manual reimbursement process and began a transition to allow the central recovery office to take responsibility for review and reimbursement approval of federal recovery funds. We will review this transition process as a part of our ongoing work. Our preliminary observations also indicate that some of the challenges we reported in our March 2019 report continue. For example, officials from Puerto Rico’s central government agencies told us they did not feel they had sufficient guidance on the FEMA Public Assistance program and where they did, written and verbal FEMA guidance was inconsistent or conflicting. For example, officials from one agency expressed their desire for more FEMA guidance communicated in writing as it frequently happened that different FEMA officials would interpret existing guidance differently. Similarly, officials from two agencies described situations where they had initially been directed to follow one interpretation of a policy, only to be directed to follow a different, conflicting interpretation in the subsequent months. Puerto Rico agency officials also stated that the lack of sufficient instruction led to a “back and forth” with FEMA for clarifications, which led to delays in the phases of project development. FEMA officials in Puerto Rico stated that the agency has developed specific guidance for disaster recovery in Puerto Rico and that there are various ways, such as in-person meetings, where officials from Puerto Rico can obtain clarification. We are continuing to examine this issue as part of our ongoing review of Puerto Rico’s recovery. In addition, our preliminary observations from our ongoing work for both the USVI and Puerto Rico indicate that FEMA, USVI and Puerto Rico officials have reported challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. This section of the Act allows for the provision of assistance under the Public Assistance alternative procedures to restore disaster-damaged facilities or systems that provide critical services to an industry standard without regard to pre-disaster condition. Officials from Puerto Rico’s central government stated that they disagreed with FEMA’s interpretation of the types of damages covered by section 20601 of the Bipartisan Budget Act of 2018. In response, FEMA officials in Puerto Rico stated they held several briefings with Puerto Rico’s central recovery office to explain FEMA’s interpretation of the section. Further, FEMA officials in the USVI told us that initially, they had difficulty obtaining clarification from FEMA headquarters regarding how to implement key components of section 20601 of the Act. As of May 2019, FEMA officials in the USVI stated that they continue to move forward with developing alternative procedures projects. USVI officials also told us that FEMA had been responsive and helpful in identifying its options for using the new authorities the Act provides. We will continue to evaluate these identified challenges and any efforts to address them, as well as other aspects of recovery efforts in the USVI and Puerto Rico, and plan to report our findings in late 2019 and early 2020, respectively. FEMA’s Individuals and Households Program provides individuals with financial assistance, such as grants to help repair or replace damaged homes, and temporary direct housing assistance, such as recreational vehicles. The Individual Assistance program provides financial and direct assistance to disaster victims for expenses and needs that cannot be met through other means, such as insurance. In May 2019, we reported on FEMA’s effort to provide disaster assistance under the Individual Assistance program to older adults and people with disabilities following the 2017 hurricanes. We found that aspects of the application process for FEMA assistance were challenging for older individuals and those with disabilities. Further, according to stakeholders and FEMA officials, disability-related questions in the Individual Assistance registration materials were confusing and easily misinterpreted. While FEMA had made some efforts to help registrants interpret the questions, we recommended, among other things, that FEMA (1) implement new registration-intake questions that improve FEMA’s ability to identify and address survivors’ disability-related needs, and (2) improve communication of registrants’ disability-related information across FEMA programs. DHS concurred with the first recommendation and described steps FEMA plans to take, or is in the process of taking, to address it. However, DHS did not concur with the second recommendation, noting that it lacks specific funding to augment its legacy data systems. FEMA officials stated that they began a long-term data management improvement initiative in April 2017, which they expect will ease efforts to share and flag specific disability-related data. While we acknowledge FEMA’s concerns about changing legacy systems when it has existing plans to replace those systems, we continue to believe there are other cost-effective ways that are likely to improve communication of registrants’ disability-related information prior to implementing the system upgrades. For example, FEMA could revise its guidance to remind program officials to review the survivor case file notes to identify whether there is a record of any disability-related needs. We also have work underway to assess FEMA’s Individuals and Households Program, a component program of Individual Assistance. Through this program, as of April 2019, FEMA had awarded roughly $4.7 billion in assistance to almost 1.8 million individuals and households for federally-declared disasters occurring in 2017 and 2018. Specifically, we are analyzing Individuals and Households Program expenditures and registration data for recent years; reviewing FEMA’s processes, policies, and procedures for making eligibility and award determinations; and examining survivors’ reported experiences with this program, including any challenges, for major disaster declarations occurring in recent years. We plan to report our findings in early 2020. FEMA’s experiences during the 2017 disasters highlight the importance of continuing to make progress on addressing the long-standing workforce management challenges we have previously reported on and continue to observe in our ongoing work. In September 2018, we reported that the 2017 disasters—hurricanes Harvey, Irma, and Maria, as well as the California wildfires—resulted in unprecedented FEMA workforce management challenges, including recruiting, maintaining, and deploying a sufficient and adequately-trained FEMA disaster workforce. FEMA’s available workforce was overwhelmed by the response needs caused by the sequential and overlapping timing of the three hurricanes. For example, at the height of FEMA workforce deployments in October 2017, 54 percent of staff were serving in a capacity in which they did not hold the title of “Qualified”—according to FEMA’s qualification system standards—a past challenge we identified. FEMA officials noted that staff shortages, and lack of trained personnel with program expertise led to complications in its response efforts, particularly after Hurricane Maria. In February 2016, we reported on, among other things, FEMA’s efforts to implement, assess, and improve its Incident Management Assistance Team program. We found that while FEMA used some leading practices in managing the program, it lacked a standardized plan to ensure that all national and regional Incident Management Assistance Team members received required training. Further, we found that the program had experienced high attrition since its implementation in fiscal year 2013. We recommended, among other things, that FEMA develop (1) a plan to ensure that Incident Management Assistance Teams receive required training, and (2) a workforce strategy for retaining Incident Management Assistance Team staff. DHS concurred with the recommendations. FEMA fully implemented our first recommendation by developing an Incident Management Assistance Team Training and Readiness Manual and providing a training schedule for fiscal year 2017. In response to the second recommendation, FEMA officials stated in July 2018 that they plan to develop policies that will provide guidance on a new workforce structure, incentives for Incident Management Assistance Team personnel, and pay-for-performance and all other human resource actions. We are continuing to monitor FEMA’s efforts to address this recommendation. In November and December 2017, we reported on staffing challenges in FEMA’s Public Assistance program. In November 2017, we reported on FEMA’s efforts to address past workforce management challenges through its redesigned Public Assistance delivery model. As part of the redesign effort, FEMA created consolidated resource centers to standardize and centralize Public Assistance staff responsible for managing grant applications, and new specialized positions to ensure more consistent guidance to applicants. However, we found that FEMA had not assessed the workforce needed to fully implement the redesigned model, such as the number of staff needed to fill certain new positions, or to achieve staffing goals. Further, in December 2017, we reported on FEMA’s management of its Public Assistance appeals process, including that FEMA increased staffing levels for the appeals process from 2015 to 2017. However, we found that FEMA continued to face a number of workforce challenges, such as staff vacancies, turnover, and delays in training, which contributed to processing delays. Based on our findings from our November and December 2017 reports, we recommended, among other things, that FEMA (1) complete workforce staffing assessments that identify the appropriate number of staff needed to implement the redesigned Public Assistance delivery model, and (2) document steps for hiring, training, and retaining key appeals staff, and address staff transitions resulting from deployments to disasters. FEMA concurred with our recommendations to address workforce management challenges in the Public Assistance program and have reported taking some actions in response. For example, to address the first recommendation, FEMA officials have developed preliminary models and estimates of staffing needs across various programs, including Public Assistance, and plan to reevaluate the appropriate number of staff needed and present recommendations to senior leadership by the end of June 2019. To address the second recommendation, FEMA has collected information on the amount of time regional appeals analysts spend on appeals, and the inventory and timeliness of different types of appeals. FEMA officials stated in September 2018 that they plan to assess this information to prepare a detailed regional workforce plan. As of June 2019, we are evaluating plans and documents provided by FEMA to determine whether they have fully addressed this recommendation. In our March 2019 report on the status of recovery efforts in Puerto Rico, we also reported Puerto Rico officials’ concerns about FEMA staff turnover and lack of knowledge among FEMA staff about how the Public Assistance alternative procedures are to be applied in Puerto Rico. As part of our ongoing work, we are continuing to examine recovery efforts in Puerto Rico. Our preliminary observations indicate that the concerns we reported on in our March 2019 report continue. For example, Puerto Rico agency officials said that the lack of continuity in FEMA personnel has been a challenge for communication and project development. Further, officials from all seven Puerto Rico government agencies we interviewed felt that the FEMA staff they interacted with did not have a complete understanding of FEMA processes and policies. We are continuing to evaluate FEMA’s recovery efforts in Puerto Rico and plan to issue our findings in late 2019. In April 2019, we reported on the federal government’s contracting efforts for preparedness, response, and recovery efforts related to the 2017 hurricanes and California wildfires. We found, among other things, that contracting workforce shortages continue to be a challenge for disaster response and recovery. Further, although FEMA’s 2017 after-action report recommended increasing contract support capacities, it did not provide a specific plan to do so. We also found that while FEMA evaluated its contracting workforce needs in a 2014 workforce analysis, it did not specifically consider contracting workforce needs in the regional offices or address Disaster Acquisition Response Team employees. In our April 2019 report, we recommended, among other things, that FEMA assess its workforce needs—including staffing levels, mission needs, and skill gaps—for contracting staff, to include regional offices and Disaster Acquisition Response Teams, and develop a plan, including timelines, to address any gaps. FEMA concurred with this recommendation and estimates that it will implement it in September 2019. In our May 2019 report on FEMA disaster assistance to older adults and people with disabilities following the 2017 hurricanes, we found that FEMA began implementing a new approach to assist individuals with disabilities in June 2018, which shifted the responsibility for directly assisting individuals with disabilities from Disability Integration Advisors— which are staff FEMA deploys specifically to identify and recommend actions needed to support survivors with disabilities—to all FEMA staff. To implement this new approach, FEMA planned to train all of the agency’s deployable staff and staff in programmatic offices on disability issues during response and recovery deployments. According to FEMA, a number of Disability Integration Advisors would also deploy to advise FEMA leadership in the field during disaster response and recovery. We found that while FEMA has taken some initial steps to provide training on the changes, it has not established a plan for delivering comprehensive disability-related training to all staff who will be directly interacting with individuals with disabilities. We recommended, among other things, that FEMA develop a plan for delivering training to FEMA staff that promotes competency in disability awareness and includes milestones and performance measures, and outlines how performance will be monitored. DHS concurred with this recommendation; however, officials stated that FEMA is developing a plan to include a disability integration competency in the guidance provided for all deployable staff, rather than through training. We will monitor FEMA’s efforts to develop this plan and fully address our recommendation. In addition to our prior work on FEMA’s workforce management challenges related to specific programs and functions, we are continuing to evaluate FEMA’s workforce capacity and training efforts during the 2017 and 2018 disaster seasons. Our preliminary observations indicate that there were challenges in FEMA’s ability to deploy staff with the right kinds of skills and training at the right time to best meet the needs of various disaster events. For example, according to FEMA field leadership we interviewed, for some of the functions FEMA performs in the field, FEMA had too few staff with the right technical skills to perform their missions—such as inspections of damaged properties—efficiently and effectively. For other functions, these managers also reported that they had too many staff in the early stages of the disaster, which created challenges with assigning duties and providing on-the-job training. For example, some managers reported that they were allocated more staff than needed in the initial phases of the disaster, but many lacked experience and were without someone to provide direction and mentoring to ensure they used their time efficiently and gained competence more quickly. Groups of FEMA field managers we interviewed told us that difficulties deploying the right mix of staff with the right skills led to challenges such as making purchases to support FEMA operations, problems with properly registering applicants for FEMA programs, or poor communication with nonfederal partners. Nonetheless, FEMA staff have noted that, despite any suboptimal circumstances during disaster response, they aimed to and have been able to find a way to deliver the mission. As part of this ongoing work, FEMA field leadership and managers also reported challenges using agency systems to ensure the availability of the right staff with the right skills in the right place and time. FEMA uses a system called the Deployment Tracking System to, among other things, help identify staff available to be deployed and activate and track deployments. To help gauge the experience level and training needs of its staff, the agency established the FEMA Qualification System (FQS), which is a set of processes and criteria to monitor staff experience in competently performing tasks and completing training that correspond to their job titles. According to the FQS guidance, staff who have been able to demonstrate proficient performance of all the relevant tasks and complete required training receive the designation “qualified,” and are expected to be ready and able to competently fulfill their responsibilities. Those who have not, receive the designation “trainee,” and can be expected to need additional guidance and on-the-job training. FQS designations feed into the Deployment Tracking System as one key variable in how the tracking system deploys staff. Among other challenges with FEMA’s Deployment Tracking System and Qualification System, FEMA managers and staff in the field told us an employee’s recorded qualification status was not a reliable indicator of the level at which deployed personnel would be capable of performing specific duties and responsibilities or their general proficiency in their positions, making it more difficult for managers to know the specialized skills or experience of staff and effectively build teams. We are continuing to assess these and other reported workforce challenges and plan to report our findings in January 2020. In April 2019, we reported on FEMA’s Grants Management Modernization program, which is intended to replace the agency’s 10 legacy grants management systems and modernize and streamline the grants management environment. We found that, of six important leading practices for effective business process reengineering and information technology requirements management, FEMA fully implemented four and partially implemented two for the Grants Management Modernization program. The two partially implemented leading practices were (1) establishing plans for implementing new business processes and (2) establishing complete traceability of information technology requirements. In addition, we found that the program’s initial May 2017 cost estimate of about $251 million was generally consistent with leading practices for a reliable, high-quality estimate; however, it no longer reflected the current assumptions about the program at the time of our review. Moreover, the program’s schedule–specifically its final delivery date of September 2020—did not reflect leading practices for project schedules, as the date was not informed by a realistic assessment of development activities. Lastly, we found that FEMA fully addressed three and partially addressed two of five key cybersecurity practices. The two partially addressed practices were (1) assessing security controls, and (2) obtaining an authorization to operate the system. We made 8 recommendations to FEMA to implement leading practices related to reengineering processes, managing information technology requirements, scheduling system development activities, and implementing cybersecurity. DHS concurred with all of our recommendations and provided estimated completion dates for implementing each of them through July 2020. Thank you, Chairman Rouda, Ranking Member Comer and Members of the Subcommittee. This concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff has any questions concerning this testimony, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Joel Aldape (Assistant Director), Matthew T. Lowney (Analyst-in-Charge), Rebecca Mendelsohn, David (Ben) Nelson, and Amanda R. Parker. In addition, Aditi Archer, Bryan Bourgault, Lorraine Ettaro, Aaron Gluck, Kathryn Godfrey, Taylor Hadfield, Eric Hauswirth, Robert (Denton) Herring, Adam Hoffman, Susan Hsu, Sara Kelly, Amy Moran Lowe, Heidi Nielson, Danielle Pakdaman, Sara Pelton, Amanda Prichard, and Johanna Wong made contributions to this statement. Key contributors for the previous work that this is based on are listed in each product. Opportunities to Reduce Potential Duplication in Government Programs, Save Tax Dollars, and Enhance Revenue. GAO-11-318SP, March 1, 2011. Federal Disaster Assistance: Improved Criteria Needed to Assess a Jurisdiction’s Capability to Respond and Recover on Its Own. GAO-12- 838, September 12, 2012. Fiscal Exposures: Improving Cost Recognition in the Federal Budget. GAO-14-28, October 29, 2013. Emergency Preparedness: Opportunities Exist to Strengthen Interagency Assessments and Accountability for Closing Capability Gaps. GAO-15-20, December 4, 2014. High-Risk Series: An Update. GAO-15-290, February 11, 2015. Budgeting for Disasters: Approaches to Budgeting for Disasters in Selected States. GAO-15-424, March 26, 2015. Hurricane Sandy: An Investment Strategy Could Help the Federal Government Enhance National Resilience for Future Disasters. GAO-15-515, July 30, 2015. Disaster Response: FEMA Has Made Progress Implementing Key Programs, but Opportunities for Improvement Exist. GAO-16-87, February 5, 2016. Disaster Recovery: FEMA Needs to Assess Its Effectiveness in Implementing the National Disaster Recovery Framework. GAO-16-476, May 26, 2016. Federal Disaster Assistance: Federal Departments and Agencies Obligated at Least $277.6 Billion during Fiscal Years 2005 through 2014. GAO-16-797, September 22, 2016. Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720, September 28, 2017. Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30, November 8, 2017. Disaster Recovery: Additional Actions Would Improve Data Quality and Timeliness of FEMA’s Public Assistance Appeals Processing. GAO-18- 143, December 15, 2017. 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335, February 28, 2018. Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18- 366, May 31, 2018. 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472, September 4, 2018. Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354, September 6, 2018. Continuity of Operations: Actions Needed to Strengthen FEMA’s Oversight and Coordination of Executive Branch Readiness. GAO-19- 18SU, November 26, 2018. 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93, December 6, 2018. U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253, February 25, 2019. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP, March 6, 2019. Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256, March 14, 2019. Huracanes de Puerto Rico: Estado de Financiamiento de FEMA, Supervisión y Desafíos de Recuperación. GAO-19-331, March 14, 2019. Disaster Recovery: Better Monitoring of Block Grant Funds Is Needed. GAO-19-232, March 25, 2019. FEMA Grants Modernization: Improvements Needed to Strengthen Program Management and Cybersecurity. GAO-19-164, April 9, 2019. 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296, April 18, 2019. Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery, GAO-19-281, April 24, 2019. Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318, May 14, 2019. 1. Review of U.S. Virgin Islands recovery planning and progress; 2. Puerto Rico disaster recovery planning and progress; 3. 2017 wildfire response and recovery; 4. Federal internal control plans for disaster assistance funding; 5. Electricity grid restoration and resilience after the 2017 hurricane 6. Mass care sheltering and feeding challenges during the 2017 7. Department of Transportation highway and transit emergency relief 8. Drinking water and wastewater utility resilience; 9. Review of disaster death count information in selected states and 10. Department of Health and Human Services disaster response efforts; 11. Disaster and climate change impacts on Superfund sites; 12. FEMA Public Assistance program fraud risk management efforts; 13. Wildland fire collaboration on fuel reduction efforts; 14. Preparedness challenges and lessons learned from the 2017 15. FEMA workforce management and challenges; 16. Small Business Administration response to 2017 disasters; 17. Development of the GAO disaster resilience framework; 18. FEMA Individuals and Households Program operations and 19. National Flood Insurance Program post-flood enforcement; 20. Emergency alerting capabilities and progress; 21. National Flood Insurance Program buyouts and property acquisitions; 22. Economic costs of large-scale natural disasters and impacts on 23. Community Development Block Grants – disaster recovery; and 24. Disaster Housing Assistance Program. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Recent hurricanes, wildfires, and flooding have highlighted the challenges the federal government faces in responding effectively to natural disasters. The 2017 and 2018 hurricanes and wildfires affected millions of individuals and caused billions of dollars in damages. In March 2019, the Midwest experienced historic flooding that affected millions of acres of agriculture and damaged significant infrastructure. Since 2005, federal funding for disaster assistance is at least $450 billion. Increasing reliance on federal help to address natural disasters is a key source of federal fiscal exposure, particularly as certain extreme weather events become more frequent and intense due to climate change. This statement discusses, among other things, FEMA's progress and challenges related to disaster resilience, response, recovery, and workforce management. This statement is based on GAO reports issued from March 2011 through May 2019, and also includes preliminary observations from ongoing GAO reviews of FEMA operations. For ongoing work, GAO reviewed federal laws; analyzed documents; interviewed agency officials; and visited disaster damaged areas in California, Florida, South Carolina, North Carolina, Puerto Rico, Texas, and the U.S. Virgin Islands, where GAO also interviewed FEMA and local officials. GAO's issued and ongoing work identified progress and challenges in the Federal Emergency Management Agency's (FEMA) disaster resilience, response, recovery, and workforce management efforts, as discussed below. Disaster Resilience. GAO found that federal and local efforts to improve resilience can reduce the effects and costs of future disasters. FEMA has made progress in this area, but in July 2015, GAO found that states and localities faced challenges using federal funds to maximize resilient rebuilding following a disaster. GAO recommended that the Mitigation Framework Leadership Group—an interagency body chaired by FEMA—create a national strategy to better plan for and invest in disaster resilience. FEMA is working to address this recommendation and plans to publish the strategy by July 2019. Response and Recovery. In September 2018, GAO reported that the response to the 2017 disasters in Texas, Florida, and California showed progress since Hurricane Katrina in 2005. Specifically, FEMA and state officials' pre-existing relationships and exercises aided the response and helped address various challenges. However, GAO and FEMA identified challenges that slowed and complicated FEMA's response to Hurricane Maria, particularly in Puerto Rico. GAO's issued and ongoing work also identified challenges in implementing FEMA Public Assistance grants. For example, FEMA and Puerto Rico officials identified challenges with Public Assistance policies and guidance that have complicated and slowed the recovery. GAO did not make recommendations, but continues to evaluate recovery efforts and will report its findings later this year. FEMA Workforce Management. GAO has previously reported on long-standing workforce management challenges, such as ensuring an adequately-staffed and trained workforce. For example, GAO reported in September 2018 that the 2017 disasters overwhelmed FEMA's workforce and a lack of trained personnel with program expertise led to complications in its response efforts, particularly after Hurricane Maria. While FEMA has taken actions to address several of GAO's workforce management-related recommendations since 2016, a number of recommendations remain open as the 2019 hurricane season begins. Also, GAO is currently reviewing FEMA's workforce management efforts and lessons learned from the 2017 disasters and will report its findings early next year. GAO has made numerous recommendations in its prior reports to FEMA designed to address the challenges discussed in this statement. As of May 2019, FEMA has addressed about half of these recommendations and GAO is monitoring FEMA's ongoing efforts.", "document_type": "gao"}
{"report": "We have previously reported on various aspects of national preparedness, including examining the extent to which FEMA programs encourage disaster resilience and identifying gaps in federal preparedness capabilities. We have found that when federal, state, and local efforts aligned to focus on improving disaster resilience and preparedness, there was a noticeable reduction in the effects of the disaster. However, our prior and ongoing work also highlight opportunities to improve disaster resilience and preparedness nationwide. Hazard mitigation is a key step in building resilience and preparedness against future disasters. In July 2015, we found that states and localities experienced challenges when trying to use federal funds to maximize resilient rebuilding in the wake of a disaster. In particular, they had difficulty navigating multiple federal grant programs and applying federal resources towards their most salient risks because of the fragmented and reactionary nature of the funding. In our 2015 report, we recommended that the Mitigation Framework Leadership group—an interagency body chaired by FEMA—create a National Mitigation Investment Strategy to help federal, state, and local officials plan for and prioritize disaster resilience. As of May 2019, according to FEMA officials, the Mitigation Framework Leadership group is on track to address the recommendation, and they expect the strategy to be published by July 2019. In September 2017, we reported that the methods used to estimate the potential economic effects of climate change in the United States—using linked climate science and economics models—could inform decision makers about significant potential damages in different U.S. sectors or regions, despite the limitations. For example, for 2020 through 2039, one study estimated between $4 billion and $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms. We found that the federal government has not undertaken strategic government-wide planning on the potential economic effects of climate change to identify significant risks and craft appropriate federal responses. As a result, we recommended the Executive Office of the President, among others, should use information on the potential economic effects of climate change to help identify significant climate risks facing the federal government and craft appropriate federal responses, such as establishing a strategy to identify, prioritize, and guide federal investments to enhance resilience against future disasters; however, as of June 2019, officials have not taken action to address this recommendation. In November 2017, we found that FEMA had taken some actions to better promote hazard mitigation as part of its Public Assistance grant program. However, we also reported that more consistent planning for, and more specific performance measures related to, hazard mitigation could help ensure that mitigation is incorporated into recovery efforts. We recommended, among other things, that FEMA (1) standardize planning efforts for hazard mitigation after a disaster and (2) develop performance measures for the Public Assistance grant program to better align with FEMA’s strategic goal for hazard mitigation in the recovery process. FEMA concurred with our recommendations, and as of March 2019, officials have reported taking steps to increase coordination across its Public Assistance, mitigation, and field operations to ensure hazard mitigation efforts are standardized and integrated into the recovery process. Additionally, FEMA officials reported taking actions to begin developing disaster-specific mitigation performance measures. However, FEMA has yet to finalize these actions, such as by proposing performance measures to FEMA senior leadership. As such, we are continuing to monitor FEMA’s efforts to address these recommendations. In March 2011, we reported that FEMA had not completed a comprehensive and measurable national preparedness assessment of capability gaps—for example the amount of resources required to save lives, protect property and the environment, and meet basic human needs after an incident has occurred. Developing such an assessment would help FEMA to identify what capability gaps exist and what level of resources are needed to close such gaps. Accordingly, we suggested that FEMA complete a national preparedness assessment to evaluate capability requirements and gaps at each level of government to enable FEMA to prioritize grant funding. As of December 2018, FEMA had efforts underway to assess urban area, state, territory, and tribal preparedness capabilities to inform the prioritization of grant funding; however, the agency had not yet completed a national preparedness assessment with clear, objective, and quantifiable capability requirements against which to assess preparedness. We are continuing to monitor FEMA’s efforts to complete such an assessment. Furthermore, in March 2015, we reviewed selected states’ approaches to budgeting for disaster costs to help inform congressional consideration of the balance between federal and state roles in funding disaster assistance. Specifically, we reported that none of the 10 states in our review maintained reserves dedicated solely for future disasters, and some state officials reported that they could cover disaster costs without dedicated disaster reserves because they generally relied on the federal government to fund most of the costs associated with disaster response and recovery. In response to the 2017 disasters, we also have ongoing work to review national preparedness capabilities to assist communities in responding to and recovering from disasters. Based on our preliminary observations, some states and localities we interviewed reported that while they are prepared to deal with immediate response issues in the aftermath of a disaster, gaps exist in their capacity to support longer term recovery. One reason for this, according to these state and local officials, is because federal preparedness grant funds are largely dedicated to maintaining response capabilities and sustaining personnel costs for local emergency management officials. While these preparedness grants fund critical elements of the national preparedness system, there are some limitations to using them. Specifically, some state and local officials told us that the preparedness grant activities are generally focused on terrorism issues rather than all-hazards. In addition, they reported that the preparedness grants are generally spent on maintaining response capabilities rather than to enhance their capacity for disaster recovery—such as additional training and exercises. In addition to the state, territory, and urban region assessments that FEMA is conducting, FEMA is currently in the process of developing the first national Threat and Hazard Identification and Risk Assessment. This national assessment may help FEMA and policymakers better understand how to target federal resources in a way that enhances the nation’s capacity to respond and recover from future catastrophic or sequential disasters. We are continuing to evaluate national preparedness efforts and plan to report on FEMA’s Threat and Hazard Identification and Risk Assessment process in January 2020. In September 2018, we reported that the response to the 2017 hurricanes and wildfires in Texas, Florida, and California showed progress made since the 2005 federal response to Hurricane Katrina. We also found that FEMA coordinated closely with Texas, Florida, and California emergency management officials and other federal, local, and volunteer emergency partners to implement various emergency preparedness actions prior to the 2017 disasters in each state, and to respond to these disasters. According to FEMA and state officials, these actions helped officials begin addressing a number of challenges they faced such as meeting the demand for a sufficient and adequately-trained disaster workforce and complex issues related to removing debris in a timely manner after the hurricanes and wildfires. In contrast, we also reported in September 2018, that in Puerto Rico and the USVI a variety of challenges—such as the far distance of the territories from the U.S. mainland, limited local preparedness for a major hurricane, and outdated local infrastructure—complicated response efforts to hurricanes Irma and Maria. Many of the challenges we identified are also described in FEMA’s 2017 Hurricane Season FEMA After-Action Report, including: the sequential and overlapping timing of the three hurricanes—with Maria being the last of the three—caused staffing shortages and required FEMA to shift staff to the territories that were already deployed to other disasters; the far distance of both territories from the U.S. mainland complicated efforts to deploy federal resources and personnel quickly; and the incapacitation of local response functions due to widespread devastation and loss of power and communications, and limited preparedness by Puerto Rico and the USVI for a category 5 hurricane resulted in FEMA having to assume response functions that territories would usually perform themselves. We also reported that FEMA’s 2017 Hurricane Season FEMA After-Action Report noted that FEMA could have better leveraged information from preparedness exercises in the Caribbean, including a 2011 exercise after- action report for Puerto Rico which indicated that the territory would require extensive federal support during a large scale disaster in moving commodities from the mainland to the territory and to distribution points throughout. In our September 2018 report, we also found that FEMA’s efforts in Puerto Rico after Hurricane Maria were the largest and longest single response in the agency’s history. According to FEMA, the agency’s response included, among other things, bringing in approximately $1 billion in food and supplies; and distributing food, commodities, and medicine via approximately 1,400 flights, which constituted the longest sustained air operations in U.S. disaster history. FEMA officials explained that the agency essentially served as the first responder in the early response efforts in Puerto Rico, and many of services FEMA provided—such as power restoration, debris removal, and commodity distribution—were typically provided by territorial or local governments. We also reported in September 2018, that in the USVI, recent disaster training and the pre-positioning of supplies due to the anticipated impact of Hurricane Irma facilitated the response efforts for Hurricane Maria, which made landfall less than two weeks later. According to FEMA’s federal coordinating officer, the lead federal official in charge of response for the USVI, the federal government deployed assets, including urban search and rescue teams and medical assistance teams. In addition, due to the sequence of Hurricane Irma hitting the USVI immediately before Hurricane Maria, the Department of Defense (DOD) already had personnel and resources (i.e., ships) deployed to the area, which enabled DOD to respond to Hurricane Maria faster than it otherwise would have. Additional challenges we have reported on regarding response operations have included providing short-term housing and sheltering for disaster survivors. The Department of Homeland Security’s (DHS) 2017 National Preparedness Report states that providing effective and affordable short- term housing for disaster survivors has been a longstanding and continuing challenge. For example, following the California wildfires, local officials faced challenges identifying shelter for displaced survivors, in part due to a housing shortage that existed before the wildfires. Federal, state, and local officials formed housing task forces which facilitated a joint decision-making approach to address these challenges. While this approach has enabled the state to meet its most pressing short-term housing needs, according to FEMA officials, the state faces other challenges in the long term. For example, FEMA officials in the region covering California told us that because of the nature of damage following a wildfire and because of housing shortages in California, some of FEMA’s forms of housing assistance have been less relevant in the wake of the California wildfires than for other disasters. We will continue to evaluate these and other challenges and plan to report in fall 2019. We also have ongoing work to review efforts to provide mass care— which includes sheltering, feeding and providing emergency supplies— following the 2017 hurricanes. Our preliminary observations indicate that during and immediately following the hurricanes, the number of people seeking public shelters outpaced the capacity. In Texas and Florida, emergency managers we spoke with described having unprecedented numbers of residents needing shelters but not always enough staff initially to operate the shelters. In Texas, Puerto Rico, and the USVI, hurricanes Harvey, Irma, and Maria flooded or destroyed many buildings planned for use as shelters, according to emergency management and local government officials in these areas. As a result, some remaining shelters were at maximum capacity. In the USVI, residents of some public housing units that had sustained significant damages sought help at the territory’s Department of Human Services because there was no more space in the shelters, according to local government officials. While they were turned away from the shelters, these families were able to take refuge in the lobby of the Department of Human Services building. We will continue to evaluate these and other challenges and plan to report in summer 2019. In December 2018 and April 2019, we reported that, in response to hurricanes Harvey, Irma, and Maria, as well as the 2017 California wildfires, FEMA and other federal partners relied heavily on advance contracts—which are established before a disaster to provide for life- sustaining goods and services such as food, water and transportation typically needed immediately after a disaster—and post disaster contracts—which can be used for various goods and services, such as debris removal and installation of power transmission equipment. FEMA is required to coordinate with states and localities and encourage them to establish their own advance contracts with vendors. In December 2018, we reported on inconsistencies we found in that coordination and in the information FEMA used to coordinate with states and localities on advance contracts. As a result of this and other challenges identified, we made nine recommendations to FEMA, including that it update its strategy and guidance to clarify the use of advance contracts, improve the timeliness of its acquisition planning activities, revise its methodology for reporting disaster contracting actions to Congress, and provide more consistent guidance and information for contracting officers in coordinating with states and localities to establish advance contracts. FEMA concurred with all of these recommendations, and we are continuing to monitor its efforts to implement each recommendation. Furthermore, in April 2019, we reported on challenges that we found in the federal government’s use of post-disaster contracts. These challenges included a lack of transparency about contract actions, challenges with requirements development, and with interagency coordination. In our report, we found that FEMA had begun taking some steps to address the consistency of post-disaster contract requirements with contracting officers, but that inaccurate or untimely estimates in the contracts we reviewed sometimes resulted in delays meeting the needs of survivors. As a result of our findings in this report, we made 10 recommendations to FEMA and other federal agencies that use these post-disaster contracts related to improving the management of such contracts. FEMA and other agency officials concurred with nine of the recommendations and have reported taking actions to begin implementing them. We will continue to monitor FEMA’s progress in fully addressing these recommendations. FEMA provides multiple forms of disaster recovery assistance after a major disaster has been declared, including Public Assistance and Individual Assistance. Through these grant programs, FEMA obligates billions of dollars to state, tribal, territorial, and local governments, certain nonprofit organizations, and individuals that have suffered injury or damages from major disaster or emergency incidents, such as hurricanes, tornados, or wildfires. In September 2016, we reported that, from fiscal years 2005 through 2014, FEMA obligated almost $46 billion for the Public Assistance program and over $25 billion for the Individual Assistance program. According to FEMA’s May 2019 Disaster Relief Fund report, total projected obligations through fiscal year 2019 for the Public Assistance and Individual Assistance programs for just the 2017 hurricanes—Harvey, Irma, and Maria—are roughly $16 billion and $7 billion, respectively. Given the high cost of these programs, it is imperative that FEMA continue to make progress on the challenges we have identified in our prior and ongoing work regarding its recovery efforts. FEMA’s Public Assistance program provides grants to state, tribal, territorial, and local governments for debris removal; emergency protective measures; and the repair, replacement, or restoration of disaster-damaged, publicly owned facilities. It is a complex and multistep program administered through a partnership among FEMA, the state, and local officials. Prior to implementing the Public Assistance program, FEMA determines a state, territorial or tribal government’s eligibility for the program using the per capita damage indicator. In our September 2018 report on federal response and recovery efforts for the 2017 hurricanes and wildfires, we reported on FEMA’s implementation of the Public Assistance program, which has recently undergone significant changes as a result of federal legislation and agency initiatives. Specifically, we reported on FEMA’s use of its redesigned delivery model for providing grants under the Public Assistance program, as well as the alternative procedures for administering or receiving such grant funds that FEMA allows states, territories, and local governments to use for their recovery. Our prior and ongoing work highlights both progress and challenges with FEMA’s Public Assistance program, including the agency’s methodology for determining program eligibility, the redesigned delivery model, and the program’s alternative procedures. In September 2012, we found that FEMA primarily relied on a single criterion, the per capita damage indicator, to determine a jurisdiction’s eligibility for Public Assistance funding. However, because FEMA’s current per capita indicator, set at $1 in 1986, does not reflect the rise in (1) per capita personal income since it was created in 1986 or (2) inflation from 1986 to 1999, the indicator is artificially low. Our analysis of actual and projected obligations for 508 disaster declarations in which Public Assistance was awarded during fiscal years 2004 through 2011 showed that fewer disasters would have met either the personal income-adjusted or the inflation-adjusted Public Assistance per capita indicators for the years in which the disaster was declared. Thus, had the indicator been adjusted annually since 1986 for personal income or inflation, fewer jurisdictions would have met the eligibility criteria that FEMA primarily used to determine whether federal assistance should be provided, which would have likely resulted in fewer disaster declarations and lower federal costs. We recommended, among other things, that FEMA develop and implement a methodology that that more comprehensively assesses a jurisdiction’s capacity to respond to and recover from a disaster without federal assistance, including fiscal capacity and consideration of response and recovery capabilities. DHS concurred with our recommendation and, in January 2016, FEMA was considering establishing a disaster deductible, which would have required a predetermined level of financial or other commitment before FEMA would have provided assistance under the Public Assistance program. In August 2018, FEMA told us that it was no longer pursuing its proposed disaster deductible due to concerns about the complexity of the proposal. FEMA is considering options that leverage similar approaches, but does not have an estimated completion date for implementation. In addition, the DRRA requires FEMA to initiate rulemaking to (1) update the factors considered when evaluating requests for major disaster declarations, including reviewing how FEMA estimates the cost of major disaster assistance, and (2) consider other impacts on the capacity of a jurisdiction to respond to disasters, by October 2020. Until FEMA implements a new methodology, the agency will not have an accurate assessment of a jurisdiction’s capabilities and runs the risk of recommending that the President award Public Assistance to jurisdictions that have the capacity to respond and recover on their own. Prior to our September 2018 report, we had previously reported on the Public Assistance program in November 2017. Specifically, we reported that FEMA redesigned the delivery model for providing grants under the Public Assistance program. As part of the redesign effort, FEMA developed a new, web-based case management system to address past challenges, such as difficulties in sharing grant documentation among FEMA, state, and local officials and tracking the status of Public Assistance projects. Both FEMA and state officials involved in testing of the redesigned delivery model stated that the new case management system’s capabilities could lead to greater transparency and efficiencies in the program. However, we found that FEMA had not fully addressed two key information technology management controls that are necessary to ensure systems work effectively and meet user needs. We recommended, among other things, that FEMA (1) establish controls for tracking the development of system requirements, and (2) establish system testing criteria, roles and responsibilities, and the sequence and schedule for integration of other relevant systems. FEMA concurred with these recommendations and has fully implemented the first recommendation. Regarding the second recommendation, FEMA has not yet finalized its decision on whether to integrate its new case management system with its current grants management system. As of March 2019, we are awaiting a final decision from officials to determine whether their actions fully address our recommendation. FEMA’s original intention was to implement the redesigned delivery model for all future disasters beginning in January 2018. However, in September 2017, FEMA expedited full implementation of the redesigned model shortly after Hurricane Harvey made landfall. In September 2018, we reported that local officials continued to experience challenges with using the new Public Assistance web-based, case management system following the 2017 disasters, such as not having sufficient guidance on how to use the new system and delays with FEMA’s processing of their projects. In February 2019, we also reported that FEMA and the USVI were transitioning from using the standard Public Assistance program to using Public Assistance alternative procedures. FEMA and USVI officials stated that the alternative procedures will give the USVI more flexibility in determining when and how to fund projects and allow the territory to use any excess funds for cost-effective hazard mitigation measures, among other uses. Further, when using the alternative procedures, the Bipartisan Budget Act of 2018 allows FEMA, the USVI and Puerto Rico to repair and rebuild critical services infrastructure—such as medical and education facilities—so it meets industry standards without regard to pre-disaster condition (see Figure 1). Regarding the implementation of the Public Assistance program in Puerto Rico, in March 2019, we reported that Puerto Rico established a central recovery office to oversee federal recovery funds and was developing an internal controls plan to help ensure better management and accountability of the funds. In the interim, FEMA instituted a manual process for reviewing each reimbursement request before providing Public Assistance funds to mitigate risk and help ensure financial accountability. We also reported that officials we interviewed from FEMA, Puerto Rico’s central recovery office, and municipalities said they experienced initial challenges with the recovery process, including concerns about lack of experience and knowledge of the alternative procedures; concerns about missing, incomplete, or conflicting guidance on the alternative procedures; and concerns that municipalities had not been fully reimbursed for work already completed after the hurricanes, causing financial hardships in some municipalities. FEMA officials stated that the agency is taking actions to address reported recovery challenges, such as additional training for new FEMA employees and drafting supplemental guidance for the alternative procedures process. We continue to monitor FEMA’s efforts in our ongoing work. As part of our ongoing work, we are continuing to examine hurricane recovery efforts in the USVI and Puerto Rico. Our preliminary observations indicate that the USVI plans to take a cautious approach in pursuing permanent work projects using the Public Assistance alternative procedures program, which requires the use of fixed-cost estimates. Specifically, USVI officials we interviewed told us that developing such fixed-cost estimates that accurately incorporate the future impact of inflation and increases in materials and labor costs for certain projects was difficult. Further, these officials stated that since the territory is financially responsible for any costs that exceed these fixed-cost estimates, the USVI plans to pursue projects that do not include high levels of complexity or uncertainty to reduce the risk of cost overruns. From our ongoing work on Puerto Rico’s recovery efforts, we have learned that, in March 2019, Puerto Rico’s central recovery office released the Disaster Recovery Federal Funds Management Guide, including an internal controls plan for the operation of the recovery office. On April 1, 2019, FEMA removed the manual reimbursement process and began a transition to allow the central recovery office to take responsibility for review and reimbursement approval of federal recovery funds. We will review this transition process as a part of our ongoing work. Our preliminary observations also indicate that some of the challenges we reported in our March 2019 report continue. For example, officials from Puerto Rico’s central government agencies told us they did not feel they had sufficient guidance on the FEMA Public Assistance program and where they did, written and verbal FEMA guidance was inconsistent or conflicting. For example, officials from one agency expressed their desire for more FEMA guidance communicated in writing as it frequently happened that different FEMA officials would interpret existing guidance differently. Similarly, officials from two agencies described situations where they had initially been directed to follow one interpretation of a policy, only to be directed to follow a different, conflicting interpretation in the subsequent months. Puerto Rico agency officials also stated that the lack of sufficient instruction led to a “back and forth” with FEMA for clarifications, which led to delays in the phases of project development. FEMA officials in Puerto Rico stated that the agency has developed specific guidance for disaster recovery in Puerto Rico and that there are various ways, such as in-person meetings, where officials from Puerto Rico can obtain clarification. We are continuing to examine this issue as part of our ongoing review of Puerto Rico’s recovery. In addition, our preliminary observations from our ongoing work for both the USVI and Puerto Rico indicate that FEMA, USVI and Puerto Rico officials have reported challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. This section of the Act allows for the provision of assistance under the Public Assistance alternative procedures to restore disaster-damaged facilities or systems that provide critical services to an industry standard without regard to pre-disaster condition. Officials from Puerto Rico’s central government stated that they disagreed with FEMA’s interpretation of the types of damages covered by section 20601 of the Bipartisan Budget Act of 2018. In response, FEMA officials in Puerto Rico stated they held several briefings with Puerto Rico’s central recovery office to explain FEMA’s interpretation of the section. Further, FEMA officials in the USVI told us that initially, they had difficulty obtaining clarification from FEMA headquarters regarding how to implement key components of section 20601 of the Act. As of May 2019, FEMA officials in the USVI stated that they continue to move forward with developing alternative procedures projects. USVI officials also told us that FEMA had been responsive and helpful in identifying its options for using the new authorities the Act provides. We will continue to evaluate these identified challenges and any efforts to address them, as well as other aspects of recovery efforts in the USVI and Puerto Rico, and plan to report our findings in late 2019 and early 2020, respectively. The Individual Assistance program provides financial and direct assistance to disaster victims for expenses and needs that cannot be met through other means, such as insurance. In May 2019, we reported on FEMA’s effort to provide disaster assistance under the Individual Assistance program to older adults and people with disabilities following the 2017 hurricanes. We found that aspects of the application process for FEMA assistance were challenging for older individuals and those with disabilities. Further, according to stakeholders and FEMA officials, disability-related questions in the Individual Assistance registration materials were confusing and easily misinterpreted. While FEMA had made some efforts to help registrants interpret the questions, we recommended, among other things, that FEMA (1) implement new registration-intake questions that improve FEMA’s ability to identify and address survivors’ disability-related needs, and (2) improve communication of registrants’ disability-related information across FEMA programs. DHS concurred with the first recommendation and described steps FEMA plans to take, or is in the process of taking, to address it. However, DHS did not concur with the second recommendation, noting that it lacks specific funding to augment its legacy data systems. FEMA officials stated that they began a long-term data management improvement initiative in April 2017, which they expect will ease efforts to share and flag specific disability-related data. While we acknowledge FEMA’s concerns about changing legacy systems when it has existing plans to replace those systems, we continue to believe there are other cost-effective ways that are likely to improve communication of registrants’ disability-related information prior to implementing the system upgrades. For example, FEMA could revise its guidance to remind program officials to review the survivor case file notes to identify whether there is a record of any disability-related needs. We also have work underway to assess FEMA’s Individuals and Households Program, a component program of Individual Assistance. Through this program, as of April 2019, FEMA had awarded roughly $4.7 billion in assistance to almost 1.8 million individuals and households for federally-declared disasters occurring in 2017 and 2018. Specifically, we are analyzing Individuals and Households Program expenditures and registration data for recent years; reviewing FEMA’s processes, policies, and procedures for making eligibility and award determinations; and examining survivors’ reported experiences with this program, including any challenges, for major disaster declarations occurring in recent years. We plan to report our findings in early 2020. FEMA’s experiences during the 2017 disasters highlight the importance of continuing to make progress on addressing the long-standing workforce management challenges we have previously reported on and continue to observe in our ongoing work. In September 2018, we reported that the 2017 disasters—hurricanes Harvey, Irma, and Maria, as well as the California wildfires—resulted in unprecedented FEMA workforce management challenges, including recruiting, maintaining, and deploying a sufficient and adequately-trained FEMA disaster workforce. FEMA’s available workforce was overwhelmed by the response needs caused by the sequential and overlapping timing of the three hurricanes. For example, at the height of FEMA workforce deployments in October 2017, 54 percent of staff were serving in a capacity in which they did not hold the title of “Qualified”—according to FEMA’s qualification system standards—a past challenge we identified. FEMA officials noted that staff shortages, and lack of trained personnel with program expertise led to complications in its response efforts, particularly after Hurricane Maria. In February 2016, we reported on, among other things, FEMA’s efforts to implement, assess, and improve its Incident Management Assistance Team program. We found that while FEMA used some leading practices in managing the program, it lacked a standardized plan to ensure that all national and regional Incident Management Assistance Team members received required training. Further, we found that the program had experienced high attrition since its implementation in fiscal year 2013. We recommended, among other things, that FEMA develop (1) a plan to ensure that Incident Management Assistance Teams receive required training, and (2) a workforce strategy for retaining Incident Management Assistance Team staff. DHS concurred with the recommendations. FEMA fully implemented our first recommendation by developing an Incident Management Assistance Team Training and Readiness Manual and providing a training schedule for fiscal year 2017. In response to the second recommendation, FEMA officials stated in July 2018 that they plan to develop policies that will provide guidance on a new workforce structure, incentives for Incident Management Assistance Team personnel, and pay-for-performance and all other human resource actions. We are continuing to monitor FEMA’s efforts to address this recommendation. In November and December 2017, we reported on staffing challenges in FEMA’s Public Assistance program. In November 2017, we reported on FEMA’s efforts to address past workforce management challenges through its redesigned Public Assistance delivery model. As part of the redesign effort, FEMA created consolidated resource centers to standardize and centralize Public Assistance staff responsible for managing grant applications, and new specialized positions to ensure more consistent guidance to applicants. However, we found that FEMA had not assessed the workforce needed to fully implement the redesigned model, such as the number of staff needed to fill certain new positions, or to achieve staffing goals. Further, in December 2017, we reported on FEMA’s management of its Public Assistance appeals process, including that FEMA increased staffing levels for the appeals process from 2015 to 2017. However, we found that FEMA continued to face a number of workforce challenges, such as staff vacancies, turnover, and delays in training, which contributed to processing delays. Based on our findings from our November and December 2017 reports, we recommended, among other things, that FEMA (1) complete workforce staffing assessments that identify the appropriate number of staff needed to implement the redesigned Public Assistance delivery model, and (2) document steps for hiring, training, and retaining key appeals staff, and address staff transitions resulting from deployments to disasters. FEMA concurred with our recommendations to address workforce management challenges in the Public Assistance program and have reported taking some actions in response. For example, to address the first recommendation, FEMA officials have developed preliminary models and estimates of staffing needs across various programs, including Public Assistance, and plan to reevaluate the appropriate number of staff needed and present recommendations to senior leadership by the end of June 2019. To address the second recommendation, FEMA has collected information on the amount of time regional appeals analysts spend on appeals, and the inventory and timeliness of different types of appeals. FEMA officials stated in September 2018 that they plan to assess this information to prepare a detailed regional workforce plan. As of June 2019, we are evaluating plans and documents provided by FEMA to determine whether they have fully addressed this recommendation. In our March 2019 report on the status of recovery efforts in Puerto Rico, we also reported Puerto Rico officials’ concerns about FEMA staff turnover and lack of knowledge among FEMA staff about how the Public Assistance alternative procedures are to be applied in Puerto Rico. As part of our ongoing work, we are continuing to examine recovery efforts in Puerto Rico. Our preliminary observations indicate that the concerns we reported on in our March 2019 report continue. For example, Puerto Rico agency officials said that the lack of continuity in FEMA personnel has been a challenge for communication and project development. Further, officials from all seven Puerto Rico government agencies we interviewed felt that the FEMA staff they interacted with did not have a complete understanding of FEMA processes and policies. We are continuing to evaluate FEMA’s recovery efforts in Puerto Rico and plan to issue our findings in late 2019. In April 2019, we reported on the federal government’s contracting efforts for preparedness, response, and recovery efforts related to the 2017 hurricanes and California wildfires. We found, among other things, that contracting workforce shortages continue to be a challenge for disaster response and recovery. Further, although FEMA’s 2017 after-action report recommended increasing contract support capacities, it did not provide a specific plan to do so. We also found that while FEMA evaluated its contracting workforce needs in a 2014 workforce analysis, it did not specifically consider contracting workforce needs in the regional offices or address Disaster Acquisition Response Team employees. In our April 2019 report, we recommended, among other things, that FEMA assess its workforce needs—including staffing levels, mission needs, and skill gaps—for contracting staff, to include regional offices and Disaster Acquisition Response Teams, and develop a plan, including timelines, to address any gaps. FEMA concurred with this recommendation and estimates that it will implement it in September 2019. In our May 2019 report on FEMA disaster assistance to older adults and people with disabilities following the 2017 hurricanes, we found that FEMA began implementing a new approach to assist individuals with disabilities in June 2018, which shifted the responsibility for directly assisting individuals with disabilities from Disability Integration Advisors— which are staff FEMA deploys specifically to identify and recommend actions needed to support survivors with disabilities—to all FEMA staff. To implement this new approach, FEMA planned to train all of the agency’s deployable staff and staff in programmatic offices on disability issues during response and recovery deployments. According to FEMA, a number of Disability Integration Advisors would also deploy to advise FEMA leadership in the field during disaster response and recovery. We found that while FEMA has taken some initial steps to provide training on the changes, it has not established a plan for delivering comprehensive disability-related training to all staff who will be directly interacting with individuals with disabilities. We recommended, among other things, that FEMA develop a plan for delivering training to FEMA staff that promotes competency in disability awareness and includes milestones and performance measures, and outlines how performance will be monitored. DHS concurred with this recommendation; however, officials stated that FEMA is developing a plan to include a disability integration competency in the guidance provided for all deployable staff, rather than through training. We will monitor FEMA’s efforts to develop this plan and fully address our recommendation. In addition to our prior work on FEMA’s workforce management challenges related to specific programs and functions, we are continuing to evaluate FEMA’s workforce capacity and training efforts during the 2017 and 2018 disaster seasons. Our preliminary observations indicate that there were challenges in FEMA’s ability to deploy staff with the right kinds of skills and training at the right time to best meet the needs of various disaster events. For example, according to FEMA field leadership we interviewed, for some of the functions FEMA performs in the field, FEMA had too few staff with the right technical skills to perform their missions—such as inspections of damaged properties—efficiently and effectively. For other functions, these managers also reported that they had too many staff in the early stages of the disaster, which created challenges with assigning duties and providing on-the-job training. For example, some managers reported that they were allocated more staff than needed in the initial phases of the disaster, but many lacked experience and were without someone to provide direction and mentoring to ensure they used their time efficiently and gained competence more quickly. Groups of FEMA field managers we interviewed told us that difficulties deploying the right mix of staff with the right skills led to challenges such as making purchases to support FEMA operations, problems with properly registering applicants for FEMA programs, or poor communication with nonfederal partners. Nonetheless, FEMA staff have noted that, despite any suboptimal circumstances during disaster response, they aimed to and have been able to find a way to deliver the mission. As part of this ongoing work, FEMA field leadership and managers also reported challenges using agency systems to ensure the availability of the right staff with the right skills in the right place and time. FEMA uses a system called the Deployment Tracking System to, among other things, help identify staff available to be deployed and activate and track deployments. To help gauge the experience level and training needs of its staff, the agency established the FEMA Qualification System (FQS), which is a set of processes and criteria to monitor staff experience in competently performing tasks and completing training that correspond to their job titles. According to the FQS guidance, staff who have been able to demonstrate proficient performance of all the relevant tasks and complete required training receive the designation “qualified,” and are expected to be ready and able to competently fulfill their responsibilities. Those who have not, receive the designation “trainee,” and can be expected to need additional guidance and on-the-job training. FQS designations feed into the Deployment Tracking System as one key variable in how the tracking system deploys staff. Among other challenges with FEMA’s Deployment Tracking System and Qualification System, FEMA managers and staff in the field told us an employee’s recorded qualification status was not a reliable indicator of the level at which deployed personnel would be capable of performing specific duties and responsibilities or their general proficiency in their positions, making it more difficult for managers to know the specialized skills or experience of staff and effectively build teams. We are continuing to assess these and other reported workforce challenges and plan to report our findings in January 2020. In April 2019, we reported on FEMA’s Grants Management Modernization program, which is intended to replace the agency’s 10 legacy grants management systems and modernize and streamline the grants management environment. We found that, of six important leading practices for effective business process reengineering and information technology requirements management, FEMA fully implemented four and partially implemented two for the Grants Management Modernization program. The two partially implemented leading practices were (1) establishing plans for implementing new business processes and (2) establishing complete traceability of information technology requirements. In addition, we found that the program’s initial May 2017 cost estimate of about $251 million was generally consistent with leading practices for a reliable, high-quality estimate; however, it no longer reflected the current assumptions about the program at the time of our review. Moreover, the program’s schedule–specifically its final delivery date of September 2020—did not reflect leading practices for project schedules, as the date was not informed by a realistic assessment of development activities. Lastly, we found that FEMA fully addressed three and partially addressed two of five key cybersecurity practices. The two partially addressed practices were (1) assessing security controls, and (2) obtaining an authorization to operate the system. We made 8 recommendations to FEMA to implement leading practices related to reengineering processes, managing information technology requirements, scheduling system development activities, and implementing cybersecurity. DHS concurred with all of our recommendations and provided estimated completion dates for implementing each of them through July 2020. Thank you, Chairman Thompson, Ranking Member Rogers and Members of the Committee. This concludes my prepared statement. I would be happy to respond to any question you may have at this time. If you or your staff has any questions concerning this testimony, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Joel Aldape (Assistant Director), Amanda R. Parker (Analyst-in-Charge), Matthew T. Lowney, Rebecca Mendelsohn, and David (Ben) Nelson. In addition, Aditi Archer, Bryan Bourgault, Lorraine Ettaro, Aaron Gluck, Kathryn Godfrey, Taylor Hadfield, Eric Hauswirth, Robert (Denton) Herring, Adam Hoffman, Susan Hsu, Sara Kelly, Amy Moran Lowe, Heidi Nielson, Danielle Pakdaman, Sara Pelton, Amanda Prichard, and Johanna Wong made contributions to this statement. Key contributors for the previous work that this is based on are listed in each product. Opportunities to Reduce Potential Duplication in Government Programs, Save Tax Dollars, and Enhance Revenue. GAO-11-318SP, March 1, 2011. Federal Disaster Assistance: Improved Criteria Needed to Assess a Jurisdiction’s Capability to Respond and Recover on Its Own. GAO-12- 838, September 12, 2012. Fiscal Exposures: Improving Cost Recognition in the Federal Budget. GAO-14-28, October 29, 2013. Emergency Preparedness: Opportunities Exist to Strengthen Interagency Assessments and Accountability for Closing Capability Gaps. GAO-15-20, December 4, 2014. High-Risk Series: An Update. GAO-15-290, February 11, 2015. Budgeting for Disasters: Approaches to Budgeting for Disasters in Selected States. GAO-15-424, March 26, 2015. Hurricane Sandy: An Investment Strategy Could Help the Federal Government Enhance National Resilience for Future Disasters. GAO-15- 515, July 30, 2015. Disaster Response: FEMA Has Made Progress Implementing Key Programs, but Opportunities for Improvement Exist. GAO-16-87, February 5, 2016. Disaster Recovery: FEMA Needs to Assess Its Effectiveness in Implementing the National Disaster Recovery Framework. GAO-16-476, May 26, 2016. Federal Disaster Assistance: Federal Departments and Agencies Obligated at Least $277.6 Billion during Fiscal Years 2005 through 2014. GAO-16-797, September 22, 2016. Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720, September 28, 2017. Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30, November 8, 2017. Disaster Recovery: Additional Actions Would Improve Data Quality and Timeliness of FEMA’s Public Assistance Appeals Processing. GAO-18- 143, December 15, 2017. 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335, February 28, 2018. Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18- 366, May 31, 2018. 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472, September 4, 2018. Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354, September 6, 2018. Continuity of Operations: Actions Needed to Strengthen FEMA’s Oversight and Coordination of Executive Branch Readiness. GAO-19- 18SU, November 26, 2018. 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93, December 6, 2018. U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253, February 25, 2019. High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP, March 6, 2019. Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256, March 14, 2019. Huracanes de Puerto Rico: Estado de Financiamiento de FEMA, Supervisión y Desafíos de Recuperación. GAO-19-331, March 14, 2019. Disaster Recovery: Better Monitoring of Block Grant Funds Is Needed. GAO-19-232, March 25, 2019. FEMA Grants Modernization: Improvements Needed to Strengthen Program Management and Cybersecurity. GAO-19-164, April 9, 2019. 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296, April 18, 2019. Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery, GAO-19-281, April 24, 2019. Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318, May 14, 2019. 1. Review of U.S. Virgin Islands recovery planning and progress; 2. Puerto Rico disaster recovery planning and progress; 3. 2017 wildfire response and recovery; 4. Federal internal control plans for disaster assistance funding; 5. Electricity grid restoration and resilience after the 2017 hurricane 6. Mass care sheltering and feeding challenges during the 2017 7. Department of Transportation highway and transit emergency relief 8. Drinking water and wastewater utility resilience; 9. Review of disaster death count information in selected states and 10. Department of Health and Human Services disaster response efforts; 11. Disaster and climate change impacts on Superfund sites; 12. FEMA Public Assistance program fraud risk management efforts; 13. Wildland fire collaboration on fuel reduction efforts; 14. Preparedness challenges and lessons learned from the 2017 15. FEMA workforce management and challenges; 16. Small Business Administration response to 2017 disasters; 17. Development of the GAO disaster resilience framework; 18. FEMA Individuals and Households Program operations and 19. National Flood Insurance Program post-flood enforcement; 20. Emergency alerting capabilities and progress; 21. National Flood Insurance Program buyouts and property acquisitions; 22. Economic costs of large-scale natural disasters and impacts on 23. Community Development Block Grants – disaster recovery; and 24. Disaster Housing Assistance Program. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Recent hurricanes, wildfires, and flooding have highlighted the challenges the federal government faces in responding effectively to natural disasters. The 2017 and 2018 hurricanes and wildfires affected millions of individuals and caused billions of dollars in damages. In March 2019, the Midwest experienced historic flooding that affected millions of acres of agriculture and damaged significant infrastructure. Since 2005, federal funding for disaster assistance is at least $450 billion. Increasing reliance on federal help to address natural disasters is a key source of federal fiscal exposure, particularly as certain extreme weather events become more frequent and intense due to climate change. This statement discusses, among other things, FEMA's progress and challenges related to disaster resilience, response, recovery, and workforce management. This statement is based on GAO reports issued from March 2011 through May 2019, and also includes preliminary observations from ongoing GAO reviews of FEMA operations. For ongoing work, GAO reviewed federal laws; analyzed documents; interviewed agency officials; and visited disaster damaged areas in California, Florida, South Carolina, North Carolina, Puerto Rico, Texas, and the U.S. Virgin Islands, where GAO also interviewed FEMA and local officials. GAO's issued and ongoing work identified progress and challenges in the Federal Emergency Management Agency's (FEMA) disaster resilience, response, recovery, and workforce management efforts, as discussed below. Disaster Resilience. GAO found that federal and local efforts to improve resilience can reduce the effects and costs of future disasters. FEMA has made progress in this area, but in July 2015, GAO found that states and localities faced challenges using federal funds to maximize resilient rebuilding following a disaster. GAO recommended that the Mitigation Framework Leadership Group—an interagency body chaired by FEMA—create a national strategy to better plan for and invest in disaster resilience. FEMA is working to address this recommendation and plans to publish the strategy by July 2019. Response and Recovery. In September 2018, GAO reported that the response to the 2017 disasters in Texas, Florida, and California showed progress since Hurricane Katrina in 2005. Specifically, FEMA and state officials' pre-existing relationships and exercises aided the response and helped address various challenges. However, GAO and FEMA identified challenges that slowed and complicated FEMA's response to Hurricane Maria, particularly in Puerto Rico. GAO's issued and ongoing work also identified challenges in implementing FEMA Public Assistance grants. For example, FEMA and Puerto Rico officials identified challenges with Public Assistance policies and guidance that have complicated and slowed the recovery. GAO did not make recommendations, but continues to evaluate recovery efforts and will report its findings later this year. FEMA Workforce Management. GAO has previously reported on long-standing workforce management challenges, such as ensuring an adequately-staffed and trained workforce. For example, GAO reported in September 2018 that the 2017 disasters overwhelmed FEMA's workforce and a lack of trained personnel with program expertise led to complications in its response efforts, particularly after Hurricane Maria. While FEMA has taken actions to address several of GAO's workforce management-related recommendations since 2016, a number of recommendations remain open as the 2019 hurricane season begins. Also, GAO is currently reviewing FEMA's workforce management efforts and lessons learned from the 2017 disasters and will report its findings early next year. GAO has made numerous recommendations in its prior reports to FEMA designed to address the challenges discussed in this statement. As of May 2019, FEMA has addressed about half of these recommendations and GAO is monitoring FEMA's ongoing efforts.", "document_type": "gao"}
{"report": "DOD space systems support and provide a wide range of capabilities to a large number of users, including the military services, the intelligence community, civil agencies, and others. These capabilities include positioning, navigation, and timing; meteorology; missile warning; and secure communications, among others. Space systems can take a long time to develop and involve multiple segments, including space, ground control stations, terminals, user equipment, and launch, as figure 1 below shows. DOD satellite systems are also expensive to acquire. Unit costs for current DOD satellites can range from $500 million to over $3 billion. The associated ground systems can cost over $6 billion to develop and maintain and the cost to launch a satellite can climb to well over $100 million. Table 1 provides highlights of the current status of DOD’s major space programs. As the table shows, DOD is also in the beginning phases of acquiring several constellations of new satellites and ground processing capabilities—including for missile warning, protected communications, space-based environmental monitoring, and space command and control. We have work underway to assess the Air Force’s space command and control development efforts and examine DOD’s analysis of alternatives for wideband communication services. For a more complete description of these major space programs, see appendix I. In addition, DOD is exploring alternatives for acquiring wideband satellite communications as well as funding development of new launch vehicles as it pursues a new acquisition strategy for procuring launch services. Our prior work has shown that many major DOD space programs have experienced significant cost increases and schedule delays. For instance, the total program cost for the Advanced Extremely High Frequency (AEHF) satellite program, a protected satellite communications system, has grown 117 percent since the program’s original cost estimate and its first satellite was launched more than 3.5 years late. For the Space Based Infrared System (SBIRS), a missile warning satellite program, the program cost grew 265 percent from its original estimate and the launch of the first satellite was delayed roughly 9 years. Both programs moved to the production phase where fewer problems tend to surface, and where there is typically less risk of significant cost and schedule growth. A more recent major satellite program, Global Positioning System (GPS) III, has seen an almost 4-year delay due to technical issues and program cost growth of about 32 percent. Cost and schedule growth has also been a challenge for satellite ground systems and user equipment. Ground system delays have been so lengthy, that satellites sometimes spend years in orbit before key capabilities can be fully exploited. For example, The command and control system for GPS III satellites, known as the Next Generation Operational Control System, or OCX, is approximately 5 years behind schedule. As a result, the Air Force has had to start two separate back-up efforts to modify the current ground system to ensure the continuity of GPS capabilities and to make anti- jamming capabilities available via Military Code, or M-code, until OCX is delivered. Our ongoing review of GPS includes an assessment of OCX schedule risk and potential impacts on OCX delivery, acceptance, and operation. We expect to issue our report on GPS in spring 2019. Development of GPS user equipment that can utilize the M-Code signal has lagged behind the fielding of GPS M-code satellites for more than a decade, due to prolonged development challenges. In December 2017, we found that while DOD had made some progress on initial testing of the receiver cards needed to utilize the M-code signal, additional development was necessary to make M-code work with the over 700 weapon systems that require it. We also found that DOD had begun initial planning to transition some weapon systems to use M-code receivers, but significantly more work remained to understand the cost and schedule of transitioning to M-code receivers across DOD. Further, in December 2017, we found that multiple entities were separately maturing their own receiver cards. We recommended that DOD assign responsibility to a single organization to collect test data, lessons learned, and design solutions so that common design solutions are employed and DOD could avoid duplication of efforts. DOD concurred with the recommendation, but has not yet taken action on it. We have previously reported that over 90 percent of the capabilities to be provided by Mobile User Objective System communications satellites—currently, five satellites are in orbit, the first of which launched in 2012—are being underutilized because of difficulties with integrating the space, ground, and terminal segments and delays in fielding compatible user terminals. Largely because of technical and management challenges, the Joint Space Operations Center Mission System (JMS) Increment 2 program—intended to replace and improve upon an aging space situational awareness and command and control system—was almost 3 years behind schedule and 42 percent over budget before the Air Force stopped development work last year. Earlier this month, we reported that operational testing in 2018 found that JMS Increment 2 was not operationally effective or suitable due, in part, to missing software requirements, urgent deficiencies that affected system performance, and negative user feedback. Cost and schedule growth in DOD’s space programs is sometimes driven by the inherent risks associated with developing complex space technology; however, over the past 10 years we have identified a number of other management and oversight problems that have worsened the situation. These include making overly optimistic cost and schedule estimates, pushing programs forward without sufficient knowledge about technology and design, and experiencing problems in overseeing and managing contractors, among others. We have also noted that some of DOD’s programs with operational satellites, such as SBIRS, were also exceedingly ambitious, which in turn increased technology, design, and engineering risks. While SBIRS and other satellite programs provide users with important and useful capabilities, their cost growth has significantly limited the department’s buying power at a time when more resources may be needed to protect space systems and recapitalize the space portfolio. DOD faces significant challenges as it replenishes its satellite constellations. First, DOD is confronted with growing threats in space, which may require very different satellite architectures and acquisition strategies. Second, DOD is in the midst of planning major changes to its leadership for space. While these changes are designed to streamline decision-making and bring together a dispersed space workforce, they could cause some disruption to space system acquisition programs. Third, in fiscal year 2016, Congress gave DOD authority to speed up acquisition timeframes by streamlining acquisition processes and oversight. GAO is examining DOD’s application of streamlining to its weapons programs. For space, challenges with past streamlining efforts may offer some lessons learned. And fourth, DOD may face resource and capacity challenges in taking on multiple space acquisitions at one time. For example, our work and other reports point to potential gaps in the space acquisition workforce and ongoing difficulties managing software development. According to Air Force Space Command and others, U.S. space systems face intentional and unintentional threats that have increased rapidly over the past 20 years. These include radio frequency interference (including jamming), laser attacks, kinetic intercept vehicles, and ground system attacks. Additionally, the hazards of the already-harsh space environment (e.g., extreme temperature fluctuations and radiation) have increased, including numbers of active and inactive satellites, spent rocket bodies, and other fragments and debris. According to a February 2019 Defense Intelligence Agency report, China and Russia in particular are developing a variety of means to exploit perceived U.S. reliance on space-based systems and challenge the U.S. position in space. The report also states that Iran and North Korea have demonstrated some counterspace capabilities that could pose a threat to militaries using space-based services. In response, recent governmentwide and DOD strategic and policy guidance have stressed the need for U.S. space systems to be survivable or resilient against such threats and DOD has taken steps to be more resilient in some of its new programs. As we found in October 2014, one way to do this is to build more disaggregated systems, including dispersing sensors onto separate satellites; using multiple domains, including space, air, and ground to provide full mission capabilities; hosting payloads on other government or commercial spacecraft; or some combination of these. With capabilities distributed across multiple platforms, rather than centralized onto just a few satellites, it may be more difficult for an adversary to target all assets to attack full system capabilities, and if an attack does take place, the loss of one smaller satellite or payload could result in less capability loss than damage to, or loss of, a large multifunctional satellite. In addition to disaggregation, DOD could make satellites more maneuverable and build in defense capabilities to protect themselves as a means to increase survivability. We also found in October 2014 that some of these options could have beneficial impacts on acquisition. For example, acquiring smaller, less complex satellites may require less time and effort to develop and produce. This may be in part due to improved requirements discipline, as more frequent production rates may allow program managers to delay new requirements to the next production cycle instead of incorporating them into ongoing timelines midstream. Building more, less-complex satellites might also provide DOD the opportunity to use commercial products and systems that have already been tested in the market. At the same time, however, addressing the need to make satellites more resilient could introduce complications. For example, DOD may need to acquire higher quantities of satellites, which may make it more difficult to manage acquisition schedules. In addition, potentially more development and production contracts may result in more complexity for program offices to manage, requiring increased oversight of contractors. Adding more satellites and new technologies may also complicate efforts to synchronize satellite, terminal, and ground system schedules, limiting delivery of capabilities to end users. Our work has also found potential barriers to making satellites more resilient. For example, in October 2014, we found that disaggregation could require DOD to make significant cultural and process changes in how it acquires space systems—for instance, by relying on new contractors, relinquishing control to providers who host government payloads on commercial satellites, using different contracting methods, and executing smaller but more numerous and faster-paced acquisition programs. It will likely require DOD to be more flexible and agile when it comes to satellite acquisitions, especially with regard to coordinating satellite delivery with interdependent systems, such as user equipment. Yet, as we have previously found, DOD’s culture has generally been resistant to changes in space acquisition approaches, and fragmented responsibilities have made it very difficult to coordinate and deliver interdependent systems. Senior leaders have recognized the need to change the space acquisition culture, and as discussed below, changes are being made to space leadership and acquisition approaches. More recently, in July 2018, we found that two factors have contributed to DOD’s limited use of commercially hosted payloads. First, DOD officials identified logistical challenges to matching government payloads with any given commercial host satellite. For example, most of the offices we spoke with cited size, weight, and power constraints, among others, as barriers to using hosted payloads. Second, while individual DOD offices have realized cost and schedule benefits from using hosted payloads, DOD as a whole has limited information on costs and benefits of hosted payloads. Further, the knowledge DOD obtained is fragmented across the agency—with multiple offices collecting piecemeal information on the use of hosted payloads. The limited knowledge and data on hosted payloads that is fragmented across the agency has contributed to resistance among space acquisition officials to adopting this approach. We recommended, and DOD concurred, that the department bolster and centralize collection and analysis of cost, technical, and lessons learned data on its use of hosted payloads. Lastly, in October 2018, we found that DOD faced mounting challenges in protecting its weapon systems—satellites and their ground systems included—from increasingly sophisticated cyber threats. We reported that this was due to the computerized nature of weapon systems, DOD’s late start in prioritizing weapon system cybersecurity, and DOD’s nascent understanding of how to develop more secure weapon systems. In operational testing, DOD routinely found mission-critical cyber vulnerabilities in systems that were under development, yet program officials GAO met with believed their systems were secure and even discounted some test results as unrealistic. Using relatively simple tools and techniques, testers were able to take control of systems and operate largely undetected, due in part to basic issues such as poor password management and unencrypted communications. DOD has recently taken several steps to improve weapon system cybersecurity, including issuing and revising policies and guidance to better incorporate cybersecurity considerations. Further, in response to congressional direction, DOD has also begun initiatives to better understand and address cyber vulnerabilities. We and others have reported for over two decades that fragmentation and overlap in DOD space acquisition management and oversight have contributed to program delays and cancellations, cost increases, and inefficient operations. For example, in February 2012 we found that fragmented leadership contributed to a 10-year gap between the delivery of GPS satellites and associated user equipment. The cancellations of several large programs over the past 2 decades were in part because of disagreements and conflicts among stakeholders. In July 2016, in response to a provision of a Senate Report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2016, we issued a report that reviewed space leadership in more depth and concluded that DOD space leadership was fragmented. We identified approximately 60 stakeholder organizations across DOD, the Executive Office of the President, the Intelligence Community, and civilian agencies. Of these, eight organizations had space acquisition management responsibilities; eleven had oversight responsibilities; and six were involved in setting requirements for defense space programs. At the same time, many experts stated that no one seemed to be in charge of space acquisitions. Our report highlighted the pros and cons of various options to reorganize space functions recommended in prior congressionally-chartered studies. The issue has taken on more importance in recent years, as DOD has realized satellites are highly vulnerable to attacks and needs to make dramatic changes in space system architectures and operations. We have found that leadership has not been focused enough to overcome interagency rivalries and resistance to change, and it has not been able to get concurrence on future architectures. The President’s Administration and DOD have taken significant steps to change space leadership. Most recent is the President’s Space Policy Directive-4, issued on February 19, 2019, and DOD’s subsequent legislative proposal submitted on March 1, 2019, to establish a United States Space Force as a sixth branch of the United States Armed Forces within the Department of the Air Force. The Policy Directive states that this is an important step toward a future military department for space and that the Space Force will (1) consolidate existing forces and authorities for military space activities, as appropriate, to minimize duplication of effort and eliminate bureaucratic inefficiencies; and (2) not include the National Aeronautics and Space Administration, the National Oceanic and Atmospheric Administration, the National Reconnaissance Office, or other non-military space organizations or missions of the United States Government. According to the Policy Directive, the Space Force would include the uniformed and civilian personnel conducting and directly supporting space operations from all DOD Armed Forces, assume responsibilities for all major military space acquisition programs, and create the appropriate career tracks for military and civilian space personnel across all relevant specialties. Pertaining to organization and leadership, the Policy Directive creates a civilian Under Secretary of the Air Force for Space, to be known as the Under Secretary for Space, appointed by the President, and establishes a Chief of Staff of the Space Force, who would serve as a member of the Joint Chiefs of Staff. Furthermore, the Policy Directive states that as the Space Force matures, and as national security requires, it will become necessary to create a separate military department, to be known as the Department of the Space Force. This department would take over some or all responsibilities for the Space Force from the Department of the Air Force. The Policy Directive requires the Secretary of Defense to conduct periodic reviews to determine when to recommend that the President seek legislation to establish such a department. Our past work has identified fragmentation in space leadership, but because implementation has not yet occurred, it remains to be seen whether this policy directive and proposed legislation would resolve these issues. In implementing these changes there are many complexities to consider. For example, because space capabilities are acquired and used across the military services and defense agencies, it will be important to address many details on how to implement a Space Force among these equities. Our past work suggests that without close attention to the consequences of the compromises that will inevitably have to be made to carve out a new force structure from existing space functions, there is risk of exacerbating the fragmentation and ineffective management and oversight the Space Force is intended to address. For instance, earlier this month, DOD established the Space Development Agency to unify and integrate efforts across DOD to define, develop, and field innovative solutions. But it is unclear how this new organization will mesh with the Air Force Space and Missile Systems Center, which acquires satellites, the Defense Advanced Research Projects Agency, which creates breakthrough technologies and capabilities, and similar organizations. Moreover, even if changes are implemented effectively, they are only a first step toward addressing space acquisition problems. As we discuss below, programs will still need to embrace acquisition best practices, such as using demonstrable knowledge to make decisions. Our prior work has found that they will also need to be open to flexible and innovative approaches, and work effectively with a very wide range of stakeholders, including those that will not be part of the Space Force, such as the intelligence agencies, civilian space agencies, the current military services, as well as entities within the Office of the Secretary of Defense who help oversee and manage acquisitions. Senior leaders have acknowledged that additional changes are needed and have taken steps to help bring them about, such as the restructuring of the Air Force’s Space and Missile Systems Center, which is designed to break down stovepipes and streamline acquisition processes. DOD is managing a number of new space acquisition programs using a new authority, established under Section 804 of the National Defense Authorization Act for Fiscal Year 2016, which is to provide a streamlined alternative to the traditional DOD acquisition process. Specifically, the programs—which include follow-on missile warning and protected communications satellites, among others—will be exempted from the acquisition and requirements processes defined by DOD Directive 5000.01 and the Joint Capabilities Integration and Development System. Instead, program managers are encouraged to use a tailored approach to documentation and oversight to enable them to demonstrate new technologies or field new or updated systems within 2 to 5 years. We have ongoing work looking across the military departments at how middle-tier acquisition authority is being implemented, including for the Air Force’s space acquisition programs, and plan to issue a report later this spring. GAO and others have highlighted lessons learned from past efforts to streamline, specifically with an approach adopted for space systems in the 1990s known as Total System Performance Responsibility (TSPR). TSPR was intended to facilitate acquisition reform and enable DOD to streamline its acquisition process and leverage innovation and management expertise from the private sector. Specifically, TSPR gave a contractor total responsibility for the integration of an entire weapon system and for meeting DOD’s requirements. We found in May 2009 that because this reform made the contractor responsible for day-to-day program management, DOD did not require formal deliverable documents—such as earned value management reports—to assess the status and performance of the contractor. As a result, DOD’s capability to lead and manage the space acquisition process diminished, which magnified problems related to unstable requirements and poor contractor performance. Further, the reduction in DOD oversight and involvement led to major reductions in various government capabilities, including cost- estimating and systems-engineering staff. This, in turn, led to a lack of technical data needed to develop sound cost estimates. Best practices that we identified in the aftermath of TSPR include retaining strong oversight and insight into programs; using quantifiable data and demonstrable knowledge to make decisions to proceed, not allowing development to proceed until certain thresholds are met, empowering program managers to make decisions on the direction of the program but also holding them accountable for their choices, and canceling unsuccessful programs. Similarly, in its study of TSPR programs, the Defense Science Board/Air Force Scientific Advisory Board Joint Task Force emphasized the importance of managing requirements, sufficiently funding programs, participating in trade-off studies, and assuring that proven engineering practices characterize program implementation, among other actions. See appendix II for a more complete list of the best practices we have identified for developing complex systems. DOD is simultaneously undertaking new major acquisition efforts to replenish its missile warning, protected communications, GPS, and weather satellites. At the same time, it is boosting efforts to increase space situational awareness and protect space assets. It is also helping to fund the development of new launch vehicles, and it is considering additional significant acquisitions in wideband satellite communications and in support of missile defense activities. While there is increased attention within DOD on funding for space and building the Space Force, such widespread acquisition activities could still pose resource challenges. For example: Funding requests for space system modernization have in the past 10 years represented a small percentage (3.9 to 5 percent) of total weapon system modernization funding DOD requested. Space is competing with ships, aircraft, and the nuclear triad, among other programs for funding. This can be challenging, because over the past 2 years, DOD has begun over 9 new space acquisition programs to recapitalize current space capabilities and enhance system resiliency. In the past, we have found that it has been difficult for DOD to fund multiple new space programs at one time, particularly when it was concurrently struggling with cost overruns and schedule delays from its legacy programs. For example, OCX system development challenges have resulted in a $2.5 billion cost increase and approximate 5-year delay to the system becoming operational— using more resources for a longer time—at a cost to other programs. It is unclear whether DOD has a sufficient workforce to manage multiple new space programs. We issued a report this month that found DOD did not routinely monitor the size, mix, and location of its space acquisition workforce. We collected and aggregated data from multiple DOD space acquisition organizations and found that at least 8,000 personnel in multiple locations nationwide were working on space acquisition activities at the end of 2017. Echoing concerns raised in our prior work, we also found that DOD had difficulty attracting and retaining candidates with the requisite technical expertise. Officials from the Air Force’s Space and Missile Systems Center were concerned that there are not enough experienced mid- level acquisition personnel and also expressed concern that the bulk of military personnel assigned to program management positions were more junior in rank than the Center was authorized to obtain. We recommended that DOD (1) identify the universe of its space acquisition programs and the organizations that support them, and (2) collect and maintain data on the workforce supporting these programs. DOD concurred with our first recommendation but not the second. Software is an increasingly important enabler of DOD space systems. However, DOD has struggled to deliver software-intensive space programs that meet operational requirements within expected time frames. Although user involvement is critical to the success of any software development effort, we found in our report issued earlier this month on DOD software-intensive space programs that key programs that experienced cost or schedule breaches often did not effectively engage users to understand requirements and obtain feedback. Program efforts to involve users and incorporate feedback frequently did not match plans. The lack of user engagement has contributed to systems that were later found to be operationally unsuitable. The programs we reviewed also faced challenges in delivering software in shorter time frames, and in using commercial software, applying outdated tools and metrics, as well as having limited knowledge and training in newer software development techniques. DOD acknowledged these challenges and is taking steps to address them, including identifying useful software development metrics and ways to include them in new contracts. We recommended, and DOD concurred, that the department ensure its guidance addressing software development provides specific, required direction on the timing, frequency, and documentation of user involvement and feedback. Moreover, it should be noted that software development has been a struggle for other non-space weapons programs as well. The Defense Innovation Board recently reported that the department’s current approach to software development is broken and is a leading source of risk to DOD—it takes too long, is too expensive, and exposes warfighters to unacceptable risk by delaying their access to the tools they need to assure mission success. Chairman Fischer, Ranking Member Heinrich, and Members of the Subcommittee, this concludes my statement. I am happy to answer any questions that you have. If you or your staff have any questions about this statement, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contacts for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this statement include Rich Horiuchi, Assistant Director; Burns C. Eckert; Emily Bond; Claire Buck; Maricela Cherveny; Erin Cohen; Susan Ditto; Laura Hook, and Anne Louise Taylor. Key contributors for the previous work on which this statement is based are listed in the products cited. Our previous work on weapons acquisitions in general, and space programs in particular, identified best practices for developing complex systems. We summarize these best practices in table 3, below. DOD Space Acquisitions: Including Users Early and Often in Software Development Could Benefit Programs. GAO-19-136. Washington, D.C.: March 18, 2019. Defense Space Systems: DOD Should Collect and Maintain Data on Its Space Acquisition Workforce. GAO-19-240. Washington, D.C.: March 14, 2019. Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilitie., GAO-19-128. Washington, D.C.: October 9, 2018. Military Space Systems: DOD’s Use of Commercial Satellites to Host Defense Payloads Would Benefit from Centralizing Data. GAO-18-493. Washington, D.C.: July 30, 2018. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: April 25, 2018. Global Positioning System: Better Planning and Coordination Needed to Improve Prospects for Fielding Modernized Capability. GAO-18-74. Washington, D.C.: December 12, 2017. Space Launch: Coordination Mechanisms Facilitate Interagency Information Sharing on Acquisitions GAO-17-646R. Washington D.C.: August 9, 2017 Satellite Acquisitions: Agencies May Recover a Limited Portion of Contract Value When Satellites Fail. GAO-17-490. Washington, D.C.: June 9, 2017 Space Acquisitions: DOD Continues to Face Challenges of Delayed Delivery of Critical Space Capabilities and Fragmented Leadership. GAO-17-619T. Washington, D.C.: May 17, 2017. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: March 30, 2017. Global Positioning System: Observations on Quarterly Reports from the Air Force. GAO-17-162R. Washington, D.C.: October 17, 2016. Defense Space Acquisitions: Too Early to Determine if Recent Changes Will Resolve Persistent Fragmentation in Management and Oversight. GAO-16-592R. Washington, D.C.: July 27, 2016. Evolved Expendable Launch Vehicle: DOD Is Assessing Data on Worldwide Launch Market to Inform New Acquisition Strategy. GAO-16-661R. Washington, D.C.: July 22, 2016 Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs. GAO-16-769T, Washington, D.C.: July 7, 2016. Defense Weather Satellites: Analysis of Alternatives is Useful for Certain Capabilities, but Ineffective Coordination Limited Assessment of Two Critical Capabilities. GAO-16-252R. Washington, D.C.: March 10, 2016. Space Acquisitions: Challenges Facing DOD as it Changes Approaches to Space Acquisitions. GAO-16-471T. Washington, D.C.: March 9, 2016. Space Acquisitions: GAO Assessment of DOD Responsive Launch Report. GAO-16-156R. Washington, D.C.: October 29, 2015. Space Situational Awareness: Status of Efforts and Planned Budgets. GAO-16-6R. Washington, D.C.: October 8, 2015. GPS: Actions Needed to Address Ground System Development Problems and User Equipment Production Readiness. GAO-15-657. Washington, D.C.: September 9, 2015. Evolved Expendable Launch Vehicle: The Air Force Needs to Adopt an Incremental Approach to Future Acquisition Planning to Enable Incorporation of Lessons Learned. GAO-15-623. Washington, D.C.: August 11, 2015. Defense Satellite Communications: DOD Needs Additional Information to Improve Procurements. GAO-15-459. Washington, D.C.: July 17, 2015. Space Acquisitions: Some Programs Have Overcome Past Problems, but Challenges and Uncertainty Remain for the Future. GAO-15-492T. Washington, D.C.: April 29, 2015. Space Acquisitions: Space Based Infrared System Could Benefit from Technology Insertion Planning. GAO-15-366. Washington, D.C.: April 2, 2015. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-15-342SP. Washington, D.C.: March 12, 2015. Defense Major Automated Information Systems: Cost and Schedule Commitments Need to Be Established Earlier. GAO-15-282. Washington, D.C.: February 26, 2015. DOD Space Systems: Additional Knowledge Would Better Support Decisions about Disaggregating Large Satellites. GAO-15-7. Washington, D.C.: October 30, 2014. U.S. Launch Enterprise: Acquisition Best Practices Can Benefit Future Efforts. GAO-14-776T. Washington, D.C.: July 16, 2014. 2014 Annual Report: Additional Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve Other Financial Benefits. GAO-14-343SP. Washington, D.C.: April 8, 2014. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-14-340SP. Washington, D.C.: March 31, 2014. Space Acquisitions: Acquisition Management Continues to Improve but Challenges Persist for Current and Future Programs. GAO-14-382T. Washington, D.C.: March 12, 2014. Evolved Expendable Launch Vehicle: Introducing Competition into National Security Space Launch Acquisitions. GAO-14-259T. Washington, D.C.: March 5, 2014. The Air Force’s Evolved Expendable Launch Vehicle Competitive Procurement. GAO-14-377R. Washington, D.C.: March 4, 2014. Space Acquisitions: Assessment of Overhead Persistent Infrared Technology Report. GAO-14-287R. Washington, D.C.: January 13, 2014. Space: Defense and Civilian Agencies Request Significant Funding for Launch-Related Activities. GAO-13-802R. Washington, D.C.: September 9, 2013. Global Positioning System: A Comprehensive Assessment of Potential Options and Related Costs is Needed. GAO-13-729, Washington, D.C.: September 9, 2013. Space Acquisitions: DOD Is Overcoming Long-Standing Problems, but Faces Challenges to Ensuring Its Investments are Optimized. GAO-13-508T. Washington, D.C.: April 24, 2013. Satellite Control: Long-Term Planning and Adoption of Commercial Practices Could Improve DOD’s Operations. GAO-13-315. Washington, D.C.: April 18, 2013. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-13-294SP. Washington, D.C.: March 28, 2013. Launch Services New Entrant Certification Guide. GAO-13-317R. Washington, D.C.: February 7, 2013. Evolved Expendable Launch Vehicle: DOD Is Addressing Knowledge Gaps in Its New Acquisition Strategy. GAO-12-822. Washington, D.C.: July 26, 2012. Space Acquisitions: DOD Faces Challenges in Fully Realizing Benefits of Satellite Acquisition Improvements. GAO-12-563T. Washington, D.C.: March 21, 2012. Space and Missile Defense Acquisitions: Periodic Assessment Needed to Correct Parts Quality Problems in Major Programs. GAO-11-404. Washington, D.C.: June 24, 2011. Space Acquisitions: Development and Oversight Challenges in Delivering Improved Space Situational Awareness Capabilities. GAO-11-545. Washington, D.C.: May 27, 2011. Space Acquisitions: DOD Delivering New Generations of Satellites, but Space System Acquisition Challenges Remain. GAO-11-590T. Washington, D.C.: May 11, 2011. Global Positioning System: Challenges in Sustaining and Upgrading Capabilities Persis., GAO-10-636. Washington, D.C.: September 15, 2010. Defense Acquisitions: Challenges in Aligning Space System Components. GAO-10-55. Washington D.C.: October 29, 2009. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "DOD space systems provide critical capabilities that support military and other government operations. They can also be expensive to acquire and field, costing billions of dollars each year. As DOD seeks to replenish its satellite constellations, it faces a number of challenges to ensuring funds are used effectively. Because space-based capabilities are fundamental to U.S. national security and civilian activities, it is essential that DOD manage its space system acquisitions carefully and avoid repeating past problems. This statement provides an update on DOD's space acquisitions, focusing on challenges facing acquisitions of new space systems. This statement is based on GAO reports issued over the past 10 years on DOD space programs. In addition it draws on recent work performed in support of GAO's 2019 annual reports on the progress of major defense acquisition programs as well as duplication, overlap, and fragmentation across the federal government, among other sources. DOD is simultaneously undertaking new major acquisitions to replenish its missile warning, protected communications, navigation, and weather satellites. At the same time, it is boosting efforts to increase space situational awareness and protect space assets. Such widespread acquisition acitivites could face a wide range of resource and management challenges that GAO has reported on, including: Growing threats to satellites . Threats to satellites from both adversaries— such as jamming and cyber attacks—and space debris are increasing. DOD is making changes to how it designs its space systems to increase the resilience and survivability of space capabilities. But it has been challenged in adopting new approaches, such as using commercial satellites to host payloads, and in prioritizing cybersecurity for all of its weapon systems. For hosted payloads, GAO recommended, and DOD concurred, that the department bolster and centralize collection and analysis of cost, technical, and lessons learned data. Implementing leadership changes . DOD is planning major changes to leadership for space. It recently proposed legislation to establish a United States Space Force—initially to be housed within the Department of the Air Force—that would, according to the President's Space Policy Directive, consolidate existing military space activities and minimize duplicative efforts across DOD. GAO found in July 2016 that changes are needed to reduce fragmentation that has negatively affected space programs for many years. But open questions remain about governance as new programs get underway and whether the changes themselves may result in further fragmentation. For example, it is unclear at this time how the new Space Development Agency will mesh with organizations currently involved in testing and acquiring new space technologies. Having the right resources and know-how . While there is increased attention on funding for space and building the Space Force, new programs can still face resource challenges. DOD has begun over 9 new space programs at a time when it is also seeking increased investments in ships, aircraft, and the nuclear triad, among other programs. Moreover, it is unclear whether DOD has a sufficient workforce to manage its new programs. GAO issued a report earlier this month that found DOD does not routinely monitor the size, mix, and location of its space acquisition workforce. Further, DOD has difficulty attracting and retaining candidates with the requisite technical expertise. GAO recommended that DOD collect and maintain data on its space acquisition workforce. DOD did not concur, but GAO maintains that DOD should have better information on such personnel, especially in light of its proposal for establishing the Space Force. GAO also found in March 2019 that key software-intensive space programs often did not effectively engage users to understand requirements and obtain feedback. GAO recommended, and DOD concurred, that the department ensure its guidance addressing software development provides specific, required direction on the timing, frequency, and documentation of user involvement and feedback. Past GAO reports have recommended that DOD adopt acquisition best practices to help ensure cost and schedule goals are met. DOD has generally agreed and taken some actions to address these recommendations.", "document_type": "gao"}
{"report": "Each year more than a dozen federal agencies and state and local jurisdictions were involved in the Fourth of July events on the National Mall. Some were involved in the overall planning, production, and execution of the events as a whole, while others played specific roles in only one event. Figure 1 shows the overall geographic layout of each event that occurred on the National Mall. For 2016 through 2019, the National Park Service (NPS) was responsible for the overall organization and execution of Fourth of July events on the National Mall, including the National Independence Day Parade; A Capitol Fourth Concert; Independence Day Fireworks Display; and in 2019, A Salute to America. Successful completion of these events depended on NPS, including United States Park Police (Park Police), coordinating with federal agencies and state and local jurisdictions to ensure that attendees could safely and securely attend each event. In addition, during the 2019 events, because of the addition of the Salute to America event and attendance by the President of the United States, additional federal agencies were involved with the planning, production, and execution of the events. Overall event security for the 2016 though 2019 events on the National Mall was coordinated among several federal agencies and state and local jurisdictions. Specifically, the following organizations provided security personnel and assets for the events overall: Park Police provided overall coordination with federal, state, and local law enforcement agencies and assisted with event security. State and local law enforcement agencies assisted with security, traffic, and crowd control. The District of Columbia Government (DC Government) provided a comprehensive command, control, and coordination system, in conjunction with federal partners, to ensure seamless event activities and the safety and security of all attendees. The DC Government tasked multiple offices in its organization to help with ensuring event security, including the Metropolitan Police Department, which deployed uniformed officers in areas surrounding the National Mall and provided traffic control and road closures. The National Guard deployed hundreds of personnel who provided security, movement of supplies, and crowd management at road intersections and metro stations. The Washington Metropolitan Area Transit Authority provided buses to barricade road closures for 2016 through 2018. The Federal Bureau of Investigation; Bureau of Alcohol, Tobacco, Firearms and Explosives; and Department of Energy deployed specialized law enforcement and security support units during all of the Fourth of July events on the National Mall. Given the large crowds and potential for high temperatures in July in Washington, D.C., it was important that organizers ensured that adequate medical resources were available to attendees and participants for the 2016 through 2019 events. This was accomplished by coordination between the following federal agencies and state and local jurisdictions: The Department of Health and Human Services (HHS) provided medical aid stations for attendees and participants and veterinarian services for NPS working animals at various locations on the National Mall. In 2019, HHS provided additional efforts, including a larger medical aid station at the end of the parade route to assist with heat casualties and a command and control team to coordinate and support HHS personnel on the National Mall. The Federal Emergency Management Agency participated in the public safety planning for the Fourth of July events on the National Mall in 2016 through 2018. Because of increased security levels in 2019, the agency coordinated the support of federal agencies and state and local jurisdictions, and deployed an emergency response team. The DC Government deployed numerous personnel from its offices, including Fire and Emergency Medical Services and the Department of Health to respond to health emergencies at the events. The Smithsonian Institution (SI) and the Federal Protective Service (FPS) assisted by providing their facilities as safe havens for citizens to seek shelter in the event of severe weather or other emergency. Each year, SI staffed its facilities near the National Mall with security protection officers, grounds cleanup crews, and emergency medical technician support as part of its assistance. In addition, FPS personnel staffed federal buildings near the National Mall and operated safe haven locations. For 2016 through 2019, the National Independence Day Parade ran along Constitution Avenue NW from 7th Street NW to 17th Street NW. A private entity produced the parade, and obtained a Public Gathering Permit from NPS. The entity managed the parade, its participants, and associated costs, with funding from nonfederal sponsors. NPS participated in the parade by coordinating with an additional private entity, which fully funded the creation and operation of a parade float for NPS. In addition, several military bands regularly participated in the parade. To ensure security for the parade, the Park Police requested assistance annually from the DC Government, National Guard, and FPS. The DC Government assisted by ensuring roads were closed to vehicle traffic on the parade route, the National Guard assisted by providing personnel and assets for road closure, and FPS provided personnel to ensure parade- route safety. For 2016 through 2019, the Capitol Fourth Concert was broadcast live from the West Lawn of the U.S. Capitol by the Public Broadcasting Service. As we have previously reported, a private entity in the District of Columbia has produced the annual concert for many years. The private entity received federal funding from NPS through a cooperative agreement that provided funding from NPS and the Department of the Army and sponsorships from other private entities. The private entity was responsible for producing the concert, including the selection of musical acts and coordination with DOD for military band attendees. Because of its jurisdiction over the Capitol grounds, the United States Capitol Police (Capitol Police) provided perimeter security and security screening of concert attendees, in coordination with multiple federal agencies and local jurisdictions. In addition, the Architect of the Capitol provided security barriers, fencing, ground protection, turf restoration, trash removal, and setup and teardown of the security elements on the Capitol grounds. For 2016 through 2019, annually, NPS entered into a contract with a private entity that was responsible for producing and executing the fireworks display. For 2016 through 2018, the fireworks were launched from the Reflecting Pool between the Lincoln Memorial and the Washington Monument, with that area being restricted to visitors for safety and security. However, in 2019, the launch site was relocated to the West Potomac Park. The Park Police provided security over the fireworks and coordinated with federal law enforcement agencies, which provided security and conducted a sweep of the fireworks launch area. Many attendees of the fireworks display viewed the show from their personal watercraft on the Potomac River. The United States Coast Guard (Coast Guard) provided security on Potomac River waterways to ensure attendee safety and to establish a secured perimeter for the launch site. In 2019, the Salute to America event was held for the first time in front of the Lincoln Memorial. The event included military band performances, a military display, a speech by the President of the United States, military aircraft flyovers, and a fireworks display. The planning of the event began after a meeting at the White House where the Secretaries of the Interior and Defense were tasked with event planning, production, and execution. The Executive Office of the President (EOP) coordinated the content of the event and contracted with a private entity, which was responsible for general event production. NPS and EOP entered into a reimbursable agreement whereby EOP, and the private entity with which it contracted, coordinated and produced the event, paid for with NPS appropriations. The EOP determined the guest list and distributed tickets for the event. According to EOP, it distributed tickets in a manner similar to that for other White House events. The Secretary of the Interior tasked NPS with permitting for the event, coordinating with the United States Secret Service (Secret Service) on security and with the DC Government on movement of DOD assets, relocating the existing contracted fireworks display from the Reflecting Pool to the West Potomac Park and coordinating the acceptance of an additional donated fireworks display. The DC Government had additional responsibilities in 2019 compared to prior years because of the vehicles that the Department of the Army provided for the Salute to America event. For example, DC Government personnel consulted with engineers to verify that affected roads, sewer pipes, and bridges could withstand the weight of bringing in the M2 Bradley Infantry Fighting Vehicles and conducted damage assessments after the event, during which no damage was identified. The DOD Joint Staff received orders from the Secretary of Defense directing United States Northern Command (NORTHCOM) to organize a flyover and provide support to the Salute to America event. NORTHCOM tasked the Coast Guard, Department of the Army, Department of the Navy, United States Marine Corps, and United States Air Force to ensure that various DOD assets were in attendance. The Department of the Army stood up a Joint Operations Center within its Joint Force Headquarters Branch, National Capital Region, to coordinate the various DOD assets involved. Prior to the President’s speech, several military bands performed for the audience in front of the Lincoln Memorial. Displayed on both sides of the performing bands were two M2 Bradley Infantry Fighting Vehicles provided by the Department of the Army. At designated times during the President’s speech, DOD aircraft participated in flyovers, including Air Force B-2 Stealth Bombers, Air Force One, F-22 Raptors, and F- Navy F/A 18 Hornet Blue Angels and F-35 Lightning IIs; Marine Corps MV22 Osprey helicopters and Marine One; Army AH-64 Apache and CH-47 Chinook helicopters; and Coast Guard H-65 Dolphin and H-60 Jayhawk helicopters and HC- 144 Medium Range Surveillance Aircraft. Following the President’s speech and associated flyovers, a fireworks display, donated by two private entities through a donation agreement with NPS, was presented from the Lincoln Memorial. Because the President, Vice President, and other government officials attended the event, the Secret Service had primary responsibility for security of the event and surrounding areas, in coordination with the Park Police. The Secret Service requested the assistance of the Transportation Security Administration, which provided security screening for the event. The Coast Guard provided additional support on the Potomac River during the event, because of the additional firework display, and requested the assistance of the United States Customs and Border Protection, which provided additional waterway security. The Federal Aviation Administration provided an air traffic controller that shut down the airspace around the National Mall and assisted with the Salute to America flyovers. Because of the additional fireworks, the Park Police provided additional security at the storage site of the fireworks and additional road closures. The Park Police coordinated with state and local law enforcement to provide escorts for the M2 Bradley Infantry Fighting Vehicles. According to estimates we obtained, federal agencies and state and local jurisdictions combined spent millions of dollars annually for the Fourth of July events on the National Mall during 2016 through 2019. Not all costs were tracked separately by the organizations for each of the Fourth of July events. Therefore, in order to develop a comprehensive estimate of the costs, we grouped costs into five categories, which include general event costs as well as costs for each of the specific events held on the National Mall. Table 1 summarizes the event costs we obtained, by year and event. In addition to costs that could be directly attributed to Fourth of July events on the National Mall, there were other costs incurred associated with federal personnel and assets that we did not capture as event costs because they would have been incurred regardless of whether the Fourth of July events had occurred. For example, costs such as salaries of federal civilian, military, and law enforcement personnel who worked during the events were not included in cost estimates because those salaried personnel would have been paid even if the Fourth of July events did not occur. We categorized costs attributable to more than one specific event, or to agencies that did not track costs by event, as general event costs. According to documents we reviewed and interviews with agency officials, more than $2 million was spent annually on general event costs. Table 2 contains general event cost by federal agency and state or local jurisdiction, and by year. General event costs consisted primarily of the personnel and supplies costs for HHS medical aid stations, Department of the Interior overtime, holiday pay and supply costs, and costs for DC Government personnel payroll. Specifically, federal and local law enforcement agencies provided security, screening of attendees, traffic control, road blockades, and escorts for participants at all the events. These agencies incurred salaries, overtime, and overtime with differential pay for civilian and law enforcement personnel. Other costs included providing personnel and supplies for fire and emergency medical services, crowd control, information and directions for attendees, cleaning of the grounds, and safe haven areas in case of an emergency. According to documents we reviewed and agency officials we interviewed, no federal agency recorded costs specifically attributable to the National Independence Day Parade for 2016 through 2019. A private entity produced the parade and managed its participants and associated costs, which was funded through nonfederal sponsors. The security during the event, provided by the National Guard and FPS, was not included in cost estimates because those salaried personnel would have been paid regardless of the parade. The majority of federal participants in the parade were local ceremonial military personnel, including military bands, marching platoons, color guards, Army Old Guard fife and drum corps, an Army anthem vocalist, and other ceremonial military participants who would have received their salaries and benefits on the Fourth of July even if the parade did not occur. According to documents we reviewed and agency officials we interviewed, the concert cost the federal government an estimated $4 million annually from 2016 through 2019. The concert takes place on the grounds of the Capitol and the costs are primarily for the contractor that plans and executes the concert. NPS provided minimal operations support to the entity that produced the concert but was responsible for funding the concert from its annual appropriations and with additional funding that the Department of the Army provides each year. Table 3 contains the concert cost by agency for 2016 through 2019. The Capitol Police is the primary law enforcement agency responsible for security and screening the attendees on the Capitol grounds. The Capitol Police estimated that it incurred several hundred thousand dollars annually in overtime and holiday pay costs that would not have been incurred had the concert not taken place. The Architect of the Capitol incurred other concert costs for its involvement. Additionally, DOD had bus rental costs for movement of ceremonial military personnel in 2017. Other costs not considered directly attributable to the concert included salaries and benefits of federal military participants. The salary costs for these personnel would have been incurred regardless of their participation in the Fourth of July events. Independence Day Fireworks Display event costs were estimated from $253,000 to $409,000 annually from 2016 through 2019 (see table 4). Each year, NPS contracted with a private entity, which produced and executed the fireworks display. The cost associated with this contract was the majority of the cost of the event. In addition to the contract costs, other fireworks display event costs included paying overtime for security personnel during the event, conducting security sweeps prior to the event, securing areas for storage of fireworks, closing roads, and performing cleanup after the fireworks. In addition, the Coast Guard had personnel travel costs in 2019. Other event costs not considered directly attributable to the fireworks display were for Coast Guard personnel and boats that patrolled a security perimeter around the event area. The Coast Guard stated that these boats and personnel would have been operating on the Fourth of July regardless of whether the fireworks display event occurred. The 2019 Salute to America Event cost an estimated $4.3 million, primarily related to the EOP contract with a private entity to plan and execute the event (see table 5). The cost of that contract was approximately $2.45 million and was funded with NPS appropriations through a Memorandum of Agreement with EOP. The movement of DOD ground assets to the Washington, D.C., area was also a cost for the event. Specifically, DOD used a contractor to transport vehicles and other military equipment to the event area at a cost of more than $1.12 million. The Secret Service had significant involvement with events on the National Mall, and specifically with the Salute to America event, because the President, Vice President, and other government officials attended. In order to prepare for and execute security, the Secret Service used numerous special agents from its Washington, D.C., Field Office, and incurred overtime pay and cost for materials. In addition, the airspace in the area was shut down for this event, which included a fireworks display. Various federal agencies incurred overtime costs for storing the donated fireworks and for keeping additional roads closed. While DOD and the Coast Guard provided military flyovers during the Salute to America event, most of the costs associated with the flyovers, such as crew salaries, fuel, and asset depreciation, were not attributable to the event. According to DOD and the Coast Guard, flying hours associated with the event were used to satisfy annual training requirements for their pilots. However, some travel costs were incurred for pilots and crew, which we included in the cost estimates in table 5. Finally, the estimate includes salaries for a small number of DOD civilian personnel who were paid holiday or overtime pay. We found that the majority of the agencies funded costs of the Fourth of July events with annual appropriations and did not receive any other funding. NPS used amounts from multiple appropriation accounts to pay for costs of the Fourth of July events for 2016 through 2019. For the Salute to America event in 2019, NPS used the Operation of the National Park System, Centennial Challenge, and Federal Lands Recreation Enhancement Act (FLREA) accounts to cover costs. NPS obligated $2.45 million of the FLREA amounts to pay for the private entity with which the EOP contracted to plan and execute the event. NPS also used the Centennial Challenge appropriation account to pay for certain costs attributable to the Salute to America event. NPS used the Operation of the National Park System account to fund the other Fourth of July events during 2016 through 2019. The Department of the Army transferred funds from its annual appropriations for fiscal years 2016 through 2019 to NPS to support the Capitol Fourth and Memorial Day concerts. The Army entered into an agreement with NPS each fiscal year and transferred a lump sum to NPS. NPS allocated the funding for the two concerts each fiscal year. The DC Government received an appropriation each fiscal year from the federal government for emergency planning and security costs in the District of Columbia that remains available until expended. This appropriation is for the costs of providing public safety at events related to the presence of the National Capital in the District of Columbia. According to DC Government officials, DC Government obligated the entire amount appropriated in fiscal year 2019 for the various events in the District of Columbia, including the Fourth of July events on the National Mall. DC Government officials stated that they did not request additional appropriations from Congress because they used funds from other appropriations to cover the cost of events exceeding the fiscal year 2019 appropriation. Park Police reimbursed local law enforcement outside of the District of Columbia for assistance with security, traffic, and crowd control, costs which were estimated from $85,000 to $132,000 annually from 2016 through 2019. These costs are included as regular operations. Finally, according to the officials at agencies we contacted, none of them delayed, deferred, or canceled any programs or activities as a result of resources being used for the Fourth of July events for 2016 through 2019. We provided a draft of this report to the EOP, DOD, Department of the Interior, Department of Homeland Security, Capitol Police, Architect of the Capitol, DC Government, SI, American Red Cross, Department of Energy, HHS, Washington Metropolitan Area Transit Authority, Department of Transportation, and Department of Justice for review and comment. The EOP, DOD, Department of the Interior, DC Government, Washington Metropolitan Area Transit Authority, and Department of Justice provided technical comments, which we incorporated as appropriate. The Department of Homeland Security, Capitol Police, Architect of the Capitol, SI, Department of Energy, HHS, and Department of Transportation informed us that they had no comments on the draft report and the American Red Cross did not provide comments. As agreed with your offices, unless you publically announce the contents of this report earlier, we plan no further distribution until 8 days from the report date. At that time, we will send copies to the Executive Office of the President, the Secretary of the Interior, the Acting Secretary of Homeland Security, the Secretary of Defense, the Secretary of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2989 or kociolekk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our objectives were to describe for the Fourth of July events on the National Mall for 2016 through 2019 (1) the total costs that federal agencies and state and local jurisdictions are estimated to have incurred and (2) the appropriations that were used to pay for the estimated federal costs; the extent, if any, to which the federal government has reimbursed costs incurred by state and local jurisdictions; and the extent, if any, to which federal agencies delayed, deferred, or canceled other programs or activities as a result of resources being used for Fourth of July events. To accomplish these objectives, we obtained and reviewed documentation, such as financial data, contracts, and relevant agreements, from federal agencies and state and local jurisdictions that contributed resources to the events. Agencies we contacted were the Executive Office of the President, Department of Defense (DOD), Department of the Interior, Department of Homeland Security, United States Capitol Police, Architect of the Capitol, District of Columbia Government, Smithsonian Institution, American Red Cross, Department of Energy, Department of Health and Human Services, Washington Metropolitan Area Transit Authority, Department of Transportation, and Department of Justice. In addition, we reviewed cost documents and other agency records to gain an understanding of the assets, including financial, physical, and human capital that each agency devoted to the events. In addition, we interviewed officials about estimated costs; any reimbursed costs; and any delayed, deferred, or canceled programs or activities. The scope of our review consisted of estimated costs of the events and associated appropriations incurred by federal agencies and state and local jurisdictions. For the purposes of this engagement, we defined estimated costs as the costs that are directly traceable to the planning, production, and execution of the specific Fourth of July events on the National Mall. For example, we included the transportation costs of moving material, equipment, and supplies to the National Mall for Fourth of July events as well as personnel overtime and holiday pay expenses for federal employees. The costs also included contracts that various federal agencies awarded to private entities that were specifically attributable to the events. We excluded costs that are not directly attributable to the planning, production, and execution of the specific Fourth of July events on the National Mall, such as salary costs for civilian federal employees and military personnel who performed duties during the events that would have been incurred regardless of whether the events took place. Also, we excluded the costs to operate and maintain DOD aircraft that were used in the Salute to America event. According to DOD, the aircraft were existing DOD assets, and the flying hours associated with the event were used by DOD to meet annual pilot training requirements that were required regardless of the events on the Fourth of July. In addition, we excluded the cost associated with private entity parade participation and firework donations. Finally, cost estimates were provided by and attributable to each agency and department, and we did not independently verify the data during this audit. We conducted this performance audit from July 2019 through June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Kristen Kociolek, (202) 512-2989 or kociolekk@gao.gov In addition to the contact named above, Jonathan Meyer (Assistant Director), Kevin Scott (Auditor in Charge), and John Ledford made major contributions to this report. Other key contributors include Carl Barden, Anthony Clark, Marcia Carlsen, Elizabeth Erdmann, Pat Frey, Richard Geiger, Jason Kelly, Jason Kirwan, Quang Nguyen and Shahrzad Nikoo.", "summary": "The Second Continental Congress formally adopted the Declaration of Independence on July 4, 1776. Since that day, Americans have celebrated this holiday through events held in towns and cities across the country. In the nation's capital, Washington, D.C., visitors have celebrated on the National Mall by attending federally sponsored events such as the National Independence Day Parade; A Capitol Fourth Concert; Independence Day Fireworks Display; and in 2019, A Salute to America. GAO was asked to review the impacts and estimated costs associated with the Fourth of July events on the National Mall. Specifically, this report describes the following for the Fourth of July events on the National Mall for 2016 through 2019: (1) the total costs federal agencies and state and local jurisdictions are estimated to have incurred and (2) the appropriations that were used to pay for the estimated federal costs; the extent, if any, to which the federal government reimbursed costs incurred by state and local jurisdictions; and the extent, if any, to which federal agencies delayed, deferred, or canceled other programs or activities as a result of resources being used for Fourth of July events. To perform this work, GAO reviewed documentation and interviewed personnel from federal agencies and state and local jurisdictions about their estimated costs and resources used for the events. From 2016 through 2019, hundreds of personnel from numerous federal agencies, state and local jurisdictions, and private entities planned, produced, and executed events on the National Mall that celebrated Independence Day of the United States. The National Park Service (NPS) was responsible for the overall execution of Fourth of July events on the National Mall. In addition, various federal agencies—including the Department of Homeland Security, United States Capitol Police, United States Coast Guard, and Department of Justice—helped to ensure safety. Beyond the federal effort, the District of Columbia Government (DC Government) and local law enforcement played a role in the overall events. Further, given the crowds and potential for high temperatures in July in Washington, D.C., it was important that organizers—including the Department of Health and Human Services—ensured adequate medical resources were available to attendees and participants. The estimated costs for the events held in 2016, 2017, and 2018 ranged from $6 million to $7 million annually, and included contract costs with private entities tasked with producing and executing the concert and fireworks. They also included the costs for overtime and holiday pay for federal employees working at the events. In 2019, with the addition of the Salute to America event, the Department of Defense (DOD) and Executive Office of the President undertook additional efforts. Estimated costs for the 2019 events on the National Mall increased to more than $13 million. This increase was attributable to the cost for DOD to transport several vehicles to the National Mall, the production and execution of the Salute to America event, and the additional security involved because the President attended the event. In addition, there were costs not directly attributable to the events, including salaries of some federal employees who performed duties during the events, as well as costs for fuel and depreciation on DOD assets. These costs were classified as not directly attributable to the Fourth of July events because they would have been incurred regardless of whether the events occurred. For example, according to DOD, the flight time related to the military flyovers for the Salute to America event were required training hours that pilots must complete annually, and therefore the related expenses, such as pilot salaries and fuel costs, were not included in event cost estimates. Finally, federal agencies and the DC Government primarily used annual federal appropriations to pay for the event costs. The DC Government received an appropriation each year to provide for public safety at certain events within the District of Columbia. According to DC Government officials, DC Government obligated the entire amount appropriated in fiscal year 2019 for the various events in the District of Columbia, including the Fourth of July events on the National Mall. DC Government officials stated that they did not request additional appropriations from Congress because they used funds from other appropriations to cover the cost of events exceeding the fiscal year 2019 appropriation. Agency officials did not identify any federal activities that were delayed, deferred, or canceled because of the resources used for the Fourth of July events on the National Mall in 2016, 2017, 2018, and 2019.", "document_type": "gao"}
{"report": "While the core mission of protecting federal facilities has remained constant as FPS has moved from one agency to another, its responsibilities have changed. In the 1970s, GSA created FPS as part of its Public Buildings Service (PBS). While in GSA’s PBS, FPS was responsible for protecting GSA’s held or leased facilities, providing both physical security and law enforcement services. To protect buildings, FPS officers developed physical security risk assessments, installed security equipment, and oversaw contract guard services. As a part of its law enforcement services, among other duties, FPS officers enforced laws and regulations aimed at protecting federal facilities and the persons in such facilities and conducted criminal investigations. Following the attacks on September 11, 2001, the Homeland Security Act of 2002 was enacted. It created DHS and moved FPS from GSA to the new department, effective in March 2003. Within DHS, FPS was placed in U. S. Immigration and Customs Enforcement (ICE), where its responsibilities grew beyond solely protecting GSA buildings to include homeland security activities such as implementing homeland security directives and providing law-enforcement, security, and emergency- response services during natural disasters and special events. In 2009, DHS proposed transferring FPS from ICE to NPPD. In explaining this transfer in DHS’s fiscal year 2010 budget justification to Congress, DHS stated that having FPS and NPPD’s Office of Infrastructure Protection in the same organization would further solidify NPPD as DHS’s lead for critical infrastructure protection. FPS was placed in NPPD and continued to lead physical security and law enforcement services at GSA- held or GSA-leased facilities and continued its efforts in homeland security activities. In November 2018, legislation was enacted that reorganized NPPD to an organization that had a greater statutory focus on managing cyber risks and authorized the Secretary of Homeland Security to determine the appropriate placement for FPS within DHS and begin transfer of FPS to that entity. Throughout FPS’s organizational placements in DHS, we have reported on persistent challenges it faced in meeting its mission to protect facilities. In 2011, we reported on FPS’s challenges in transferring mission support functions from ICE to NPPD. While FPS was in NPPD, we reported on FPS’s challenges related to managing and overseeing contract guards and collaborating with GSA and the United States Marshals Service (Marshals) on facility security. We made recommendations to help address these challenges and FPS has made progress on some of these recommendations. For example, in September 2018, FPS and GSA established a formal agreement on roles and responsibilities related to facility protection, as we recommended. However, in our January 2019 report, we identified challenges related to other aspects of overseeing contract guards and collaboration with other agencies on physical security that had persisted. As of June of 2019, FPS continues to work on establishing a contract guard-management system. However, FPS is unable to assess its guards’ capabilities across its portfolio because the system is not fully implemented nor does it interact with its training system. As of 2019, federal physical security continues to be part of our federal real-property management’s high-risk area. In 2002, we reported on organizational and accountability criteria for establishing DHS. From this prior work, we identified key criteria that are relevant to assessing potential placement options for FPS, as shown in table 1. For our January 2019 report, we applied these key criteria for evaluating organizational placement to eight agencies that could be potential placement options for FPS. We found that none of the selected agencies met all the organizational placement criteria; thus, any of the organizational placement options could result in both benefits and trade- offs. In instances where placing FPS within DHS met our criteria (that is, instances where DHS was similar to FPS), FPS could experience benefits. In those instances where the criteria were not met, we reported it would be incumbent upon any agency to consider and address any potential trade-offs in order to ensure the decision was successful. We reviewed FPS as a “standalone” entity reporting directly to the Deputy Secretary of DHS and found this placement option met several key criteria. Table 2 below summarizes our analysis. For the first four criteria—(1) mission, goals, and objectives; (2) responsibilities; (3) organizational culture; and (4) information sharing and coordination—we determined that DHS met the criteria if the agency or its subcomponents had any similarities to FPS. For the last criterion— mission support—we determined that DHS met the criterion if the agency or its subcomponents had similarities to FPS or could provide FPS needed mission support. Mission, Goals, and Objectives. In January 2019, we reported that FPS’s mission focused on the protection of federal facilities and the people working in and visiting those facilities. DHS was similar to FPS in that its mission statement and goals as stated in its strategic plan include an explicit focus on the protection of infrastructure or specific facilities. Our prior work found that placing an agency into an organization that has a similar mission might help ensure that the agency’s mission receives adequate funding, attention, visibility, and support. Our January 2019 work reported that one of DHS’s goals—as noted in its strategic plan covering fiscal years 2014 to 2018—was to reduce risk to the nation’s critical infrastructure. DHS and FPS share objectives that focus on mitigating risks and responding to incidents. Responsibilities. In January 2019, we reported that FPS has facility- protection and physical-security responsibilities and law-enforcement, and contract-guard oversight responsibilities. DHS was similar to FPS as it had responsibilities for physical security and performed law enforcement functions. As a part of its physical security activities, FPS conducted facility security assessments, identified countermeasures (e.g., equipment and contract guards) best suited to secure a facility, and oversaw contract guards. As a part of its law enforcement activities, FPS proactively patrolled facilities, responded to incidents, and conducted criminal investigations. FPS also provided additional operational law enforcement support, at the direction of the Secretary of Homeland Security, to address emerging threats and homeland security incidents. One of FPS’s most critical activities was overseeing about 13,500 contract guards who were posted at federal facilities and were responsible for controlling access to facilities, responding to emergency situations involving facility safety and security, and performing other duties. FPS was responsible for ensuring, among other things, that these guards are performing their assigned duties and have the necessary training and certifications. DHS, however, only used a limited number of contract guards and therefore had less responsibility. At the time of our review, DHS officials told us they procured about 130 guards. Organizational Culture. In January 2019, we reported that while there are many areas relevant to organizational culture, law enforcement was a key aspect of FPS’s organizational culture, according to officials we interviewed from an association of security companies and a former, high- ranking official in NPPD. DHS had a similar culture in that it was a law enforcement agency. Information Sharing and Coordination. In January 2019, we reported that Component Intelligence Programs (CIP) were organizations in DHS that collected, gathered, processed, analyzed, produced, or disseminated information related to national homeland security. In 2016, DHS designated a division within FPS as a CIP, a move that allowed FPS more access to information on threats other DHS agencies have identified and actions they plan to take. While DHS, like FPS, had access to and could share information related to national homeland security, DHS did not have joint responsibility for coordinating facility protection with FPS. Rather, FPS shared this responsibility with GSA, and these two agencies and Marshals had joint responsibility for protecting courthouses. FPS has faced challenges with coordinating with these agencies in the past. For example, in September 2011, we reported that FPS, Marshals, and other agencies involved in protecting courthouses (i.e., GSA and the Administrative Office of the U.S. Courts) faced challenges related to coordination, such as in the implementation of roles and responsibilities and the use or participation in existing collaboration mechanisms. Mission Support. In January 2019, we reported that mission support was comprised of financial management, human capital, information technology systems for financial management, and law enforcement training. FPS owned and used many of the key operational and business- related information technology (IT) systems and applications it needs to carry out its mission. However, FPS received some mission support services from other agencies in DHS, such as human capital and some aspects of information technology. We found that if FPS changed its organizational placement it would need mission support in these areas. For example, FPS did not have delegated examining authority to allow it to fill competitive civil service jobs and relied on NPPD to provide this service. DHS had the authority to fill competitive service jobs that could support FPS needs. Further, FPS used a financial management IT system owned by ICE. DHS could provide FPS access to financial management systems that can support FPS. Finally, FPS offered its own training courses and would still need access to DHS’s Federal Law Enforcement Training Centers. In our January 2019 report, we did not assess FPS as a placement within DHS’s Management Directorate. Further, we recommended DHS (1) identify the specific goals of a change in FPS’s placement—that is, what DHS expects to achieve by moving FPS to another agency, and (2) fully evaluate placement options for FPS based on what DHS expects to achieve by changing FPS’s placement, an assessment of FPS’s current placement, and other best practices such as an analysis of alternatives assessing the benefits and trade-offs. DHS agreed with our recommendations. In May 2019, FPS officials told us that the Acting Secretary’s decision to place FPS within the Management Directorate was based upon an assessment of placement options within DHS using criteria and analyzing the trade-offs. GAO has not yet received DHS’s assessment of placement options. We will assess the actions DHS has taken in response to our recommendations when we receive DHS’s assessment. Our prior work offers valuable insights for agencies to consider when evaluating or implementing a reorganization or transformation, and can provide insights for making any transition regarding FPS. These include considering (1) key questions for consolidations and (2) leading practices when implementing an organizational change. Two sets of considerations for organizational transformations provide insights for making any FPS organizational placement. First, in May 2012, we reported on key questions for agency officials to consider when evaluating and implementing an organizational change that involves consolidation. Table 3 provides a summary of these key questions. Answering these questions would help provide FPS with assurance that important aspects of effective organizational change are addressed. Second, we reported in July 2003 on key practices and implementation steps for mergers and organizational transformations. The practices we noted are intended to help agencies transform their cultures so that they can be more results oriented, customer focused, and collaborative in nature (see table 4). In summary, the questions and practices for organizational change that we previously identified could provide insights to DHS and FPS for any transition. . Madam Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff has any questions concerning this testimony, please contact Lori Rectanus at 202-512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contacts named above: Amelia Bates Shachoy (Assistant Director); Roshni Davé; George Depaoli (Analyst-in-Charge); Geoffrey Hamilton; Kelly Rubin; Sarah Veale; and Amelia Michelle Weathers made key contributions to the testimony. Other staff who made contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "FPS conducts physical security and law enforcement activities for about 9,000 federal facilities and the millions of employees or visitors who work in or visit these facilities. Legislation enacted in November 2018 required DHS to determine the appropriate placement for FPS. The legislation also gave the Secretary of DHS authority to move FPS within DHS. In May 2019, DHS announced its decision to place FPS within the DHS Management Directorate as a direct report to the Under Secretary for Management. GAO has reported that FPS faces persistent challenges in meeting its mission to protect facilities, and, as of 2019, physical security continues to be part of GAO's federal real property management high-risk area. For example, FPS has not yet fully implemented its guard management system. Thus, FPS is unable to obtain information to assess its guards' capability to address physical security risks across its portfolio. This statement describes considerations for FPS's placement in DHS's Management Directorate based upon five key organizational placement criteria GAO identified, as well as steps to transition FPS based upon GAO's prior work on organizational change. This testimony is based on reports GAO issued from 2002 through 2019, particularly, GAO's January 2019 report on FPS's organizational placement. Detailed information on the scope and methodology for this work can be found in these published products, cited throughout this testimony. In its January 2019 report, GAO identified five key criteria relevant for evaluating placement options for the Federal Protective Service (FPS) within the Department of Homeland Security's (DHS) or other federal agencies. (See table.) Placing FPS, in the DHS Management Directorate was not an option GAO assessed in its January 2019 report. However, GAO did assess the option of making FPS a “standalone” entity reporting directly to the Deputy Secretary of DHS. GAO found that this placement met the first criteria ( mission, goals, and objectives ) and the third criteria ( organizational culture ) but did not completely meet the other criteria. For example, FPS had joint responsibility for coordinating facility protection with other federal agencies. DHS did not have joint responsibility for coordinating facility protection with FPS. GAO recommended DHS fully evaluate placement options for FPS. DHS concurred, and officials stated they conducted an assessment. GAO has not yet received DHS's assessment of placement options. GAO's prior work on implementing an organizational change provides valuable insights for making any transition regarding FPS. These insights include key questions to consider such as: “What are the goals of the consolidation?” “How have stakeholders been involved in the decision-making?” In addition, GAO has identified key practices for organizational transformation, practices that include ensuring that top leadership drives the transformation and establishing a communication strategy to create shared expectations, among others. These questions and practices could provide insights to DHS and FPS as they implement FPS's new placement.", "document_type": "gao"}
{"report": "In connection with the Strengthening DHS Management Functions high- risk area, we monitor DHS’s progress in the area of employee morale and engagement. In 2010, we identified, and DHS agreed, that achieving 30 specific outcomes would be critical to addressing the challenges within the department’s high-risk management areas. These 30 outcomes are the criteria by which we gauge DHS’s demonstrated progress. We rate each outcome on a scale of not-initiated, initiated, partially addressed, mostly addressed, or fully addressed. Several of these outcome criteria relate to human capital actions needed to improve employee morale. Specifically, we monitor DHS’s progress to: seek employees’ input on a periodic basis and demonstrate measurable progress in implementing strategies to adjust human capital approaches; base hiring decisions, management selections, promotions, and performance evaluations on human capital competencies and individual performance; enhance information technology security through improved workforce planning of the DHS cybersecurity workforce; and improve DHS’s FEVS scores related to employee engagement. Since we began monitoring DHS’s progress on these outcomes, DHS has worked to strengthen employee engagement through several efforts both at DHS headquarters and within its component agencies. In this statement, we discuss nine recommendations related to DHS employee engagement and workforce planning, eight of which have been implemented by the department. Within DHS, the Office of the Chief Human Capital Officer (OCHCO) is responsible for implementing policies and programs to recruit, hire, train, and retain DHS’s workforce. As the department-wide unit responsible for human capital issues within DHS, OCHCO also provides guidance and oversight related to morale issues to the DHS components. Seeking employees’ input and demonstrating progress to adjust human capital approaches. DHS, OCHCO, and the components have taken action to use employees’ input from the FEVS to inform and implement initiatives targeted at improving employee engagement. For example, in 2017 and 2018 DHS implemented our two recommendations for OCHCO and DHS components to establish metrics of success within their action plans for addressing employee satisfaction problems and to better use these plans to examine the root causes of morale challenges. DHS components have continued to develop these employee engagement action plans and several components report implementing initiatives to enhance employee engagement. For example, the U.S. Secret Service’s action plan details a sponsorship program for all newly hired and recently relocated employees. In addition, one division of U.S. Immigration and Customs Enforcement (ICE) used FEVS survey data to identify a need for increased engagement between employees and component leadership. ICE’s employee action plan includes goals with milestones, timelines, and metrics to improve this engagement through efforts such as leadership town halls and leadership site visits. At the headquarters level, DHS and OCHCO have also established employee engagement initiatives across the department. For example, DHS established initiatives for employees and their families that aim to increase awareness and access to support programs, benefits, and resources. Through another initiative—Human Resources (H.R.) Academy—DHS provides education, training, and career development opportunities to human resource professionals within the department. DHS uses an Employee Engagement Steering Committee to guide and monitor implementation of these DHS-wide employee engagement initiatives. As a result of these steps, among other actions, we have considered this human capital outcome area fully addressed since 2018. Basing hiring decisions and promotions on competencies and performance. OCHCO has conducted audits to better ensure components are basing hiring decisions and promotions on human capital competencies and individual performance and we have considered this outcome fully addressed since 2017. Our past work has highlighted the importance of selecting candidates based on qualifications, as doing otherwise can negatively affect morale. Working to ensure that components’ human capital decisions are based on performance and established competencies helps create a connection between individual performance and the agency’s success. Enhancing information technology security through improved workforce planning for cybersecurity positions. In February 2018, we made six recommendations to DHS to take steps to identify its position and critical skill requirements among its cybersecurity workforce. Since then, DHS has implemented all six recommendations. For example, in fiscal year 2019, regarding its cybersecurity position identification and coding efforts, we verified that DHS had identified individuals in each component who are responsible for leading those efforts, developed procedures, established a process to review each component’s procedures, and developed plans for reporting critical needs. However, DHS has not yet implemented a recommendation we made in March 2019 to review and correct its coding of cybersecurity positions and assess the accuracy of position descriptions. Specifically, we stated that DHS had not correctly categorized its information technology/cybersecurity/cyber-related positions. We noted that having inaccurate information about the type of work performed by 28 percent of the department’s information technology/cybersecurity/cyber-related positions is a significant impediment to effectively examining the department’s cybersecurity workforce, identifying work roles of critical need, and improving workforce planning. DHS officials stated that they plan to implement this recommendation by March 2020. As a result, this outcome remains mostly addressed. Until DHS accurately categorizes its positions, its ability to effectively identify critical staffing needs will be impaired. Improving FEVS scores on employee engagement. Since our last High-Risk report in March 2019, DHS has demonstrated additional progress in its employee engagement scores, as measured by the FEVS Employee Engagement Index (EEI). The EEI is one of three indices OPM calculates to synthesize FEVS data. The EEI measures conditions that lead to engaged employees and is comprised of three sub-indices related to employees’ views on leadership, supervisors, and intrinsic work experience. As a result of continued improvement on DHS’s EEI score, we have moved this outcome rating from partially addressed to mostly addressed based on DHS’s 2019 score. As shown in figure 1, DHS increased its EEI score across 4 consecutive years, from a low of 53 percent in 2015 to 62 percent in 2019. In particular, DHS improved its score by two points between 2018 and 2019 while the government average remained constant over the same period. With its 2019 score, DHS also regained the ground that it lost during an 8-point drop between 2010 and 2015. While DHS has made progress in improving its scores including moving toward the government average, it remains below the government average on the EEI and on other measures of employee morale. For example, in 2019 DHS remained six points below the government-wide average for the EEI. In addition to the EEI and other indices OPM calculates, the Partnership for Public Service uses FEVS data to produce an index of the Best Places to Work in the Federal Government®. The Partnership for Public Service’s analysis of FEVS data indicates low levels of employee satisfaction and commitment for DHS employees relative to other large federal agencies. In 2019, the Partnership for Public Service ranked DHS 17th out of 17 large federal agencies for employee satisfaction and commitment. Across the department, employee satisfaction scores vary by component. Some DHS components have EEI scores above the government average and rank highly on the Partnership for Public Service’s index. For example, the U.S. Coast Guard and U.S. Citizenship and Immigration Services have EEI scores of 76 and 74, respectively, and rank 85th and 90th, respectively, out of 420 subcomponent agencies on the Partnership for Public Service’s index. Further, some DHS component agencies have improved their scores in recent years. The U.S. Secret Service raised its EEI score 7 points between 2018 and 2019, and it moved from the last place among all subcomponent agencies on the Partnership for Public Service’s Ranking in 2016 to 360th out of 420 subcomponent agencies in 2019. However, other DHS component agencies continue to rank among the lowest across the federal government in the Partnership for Public Service rankings of employee satisfaction and commitment. For example, in 2019 out of 420 subcomponent agencies across the federal government, the DHS Countering Weapons of Mass Destruction office ranked 420th, the DHS Office of Intelligence and Analysis ranked 406th, and the Transportation Security Administration ranked 398th for employee satisfaction and commitment. As a result, continuing to increase employee engagement and morale remains important to strengthening DHS’s management functions and ability to implement its missions. DHS employee concerns about senior leadership, among other things, is one area that negatively affects DHS’s overall employee morale scores. In 2015, we identified effective management practices agencies can use to improve employee engagement across the government. One of these practices is the direct involvement of top leadership in organizational improvement efforts. When top leadership clearly and personally leads organizational improvement efforts, it provides an identifiable source for employees to rally around and helps processes stay on course. A DHS analysis of its 2012 FEVS scores indicated DHS low morale issues may persist because of employee concerns about senior leadership and supervisors, among other things, such as whether their talents were being well-used. Within the 2019 FEVS results for both DHS and government wide, leadership remains the lowest of the three sub-indices of the EEI. In addition, for several years DHS components have identified several root causes of engagement scores. For example, in 2019, the Transportation Security Administration identified the performance of managers, time constraints and understaffing, and lack of manager and leadership accountability for change as root causes of the component’s engagement scores in recent years. Another component, U.S. Citizenship and Immigration Services, identified in 2019 that the areas of leadership performance, accountability, transparency, and training and development opportunities were 2018 engagement score root causes. We have previously reported that DHS’s top leadership, including the Secretary and Deputy Secretary, have demonstrated commitment and support for addressing the department’s management challenges. Continuing to identify and address the root causes of employee engagement scores and addressing the human capital management challenges we have identified in relation to the DHS management high- risk area could help DHS maintain progress in improving employee morale. Implementing our recommendation to review and correct DHS coding of cybersecurity positions and assess the accuracy of position descriptions will assist the department in identifying critical staffing needs. In addition, as we reported in May 2019, vacancies in top leadership positions could pose a challenge to addressing aspects of DHS’s high- risk area, such as employee morale. There are currently acting officials serving in ten positions requiring Senate confirmation. Filling vacancies—including top DHS leadership positions and the heads of operational components—with confirmed appointees, as applicable, could help ensure continued leadership commitment across DHS’s mission areas. We will continue to monitor DHS’s progress in strengthening management functions, and may identify additional actions DHS leadership could take to improve employee morale and engagement. In conclusion, DHS has made notable progress in the area of human capital management, specifically in improving employee engagement and morale, but still falls behind other federal agencies. It is essential for DHS to continue improving employee morale and engagement given their impact on agency performance and the importance of DHS’s missions. Continued senior leadership commitment to employee engagement efforts and filling critical vacancies could assist DHS in these efforts. Madam Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this completes my prepared statement, I would be happy to respond to any questions that you may have at this time. If you or your staff have any questions concerning this statement, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Alana Finley (Assistant Director), Mara McMillen (Analyst-in-Charge), Nina Daoud, Michele Fejfar, Andrew Howard, and Tom Lombardi. In addition, Colette Alexander, Richard Cederholm, Ben Crossley, Eric Essig, Laura Ann Holland, Tammi Kalugdan, Neelaxi Lakhmani, Shannin O’Neill, Kevin Reeves, John Sawyer, and Julia Vieweg made contributions to this statement. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "DHS is the third-largest cabinet-level department in the federal government, employing more than 240,000 staff in a broad range of jobs, including countering terrorism and homeland security threats, providing aviation and border security, emergency response, cybersecurity, and critical infrastructure protection. Since it began operations in 2003, DHS has faced challenges with low employee morale and engagement. Federal surveys have consistently found that DHS employees are less satisfied with their jobs compared to the average federal employee. For example, DHS's scores on the FEVS and the Partnership for Public Service's rankings of the Best Places to Work in the Federal Government® are consistently among the lowest for similarly-sized federal agencies. This statement addresses our past and ongoing work monitoring human capital management and employee morale at DHS and select work on employee engagement across the government. This statement is based on products GAO issued from September 2012 through May 2019 as well as GAO's ongoing efforts to monitor employee morale at DHS as part of GAO's high-risk work. For these products, GAO analyzed DHS strategies and other documents related to DHS's efforts to address its high-risk areas, interviewed DHS officials, conducted analyses of FEVS data, and interviewed officials from other federal agencies that achieved high employee engagement scores, among other things. GAO provided a copy of new information in this statement to DHS for review. DHS confirmed the accuracy of this information. The Department of Homeland Security (DHS) has undertaken initiatives to strengthen employee engagement through efforts at its component agencies and across the department. For example, at the headquarters level, DHS has instituted initiatives to improve awareness and access to support programs, benefits, and resources for DHS employees and their families. In 2019, DHS improved its employee engagement scores, as measured by the Office of Personnel Management's Federal Employee Viewpoint Survey (FEVS)—a tool that measures employees' perceptions of whether and to what extent conditions characterizing successful organizations are present in their agency. As shown below, DHS increased its scores on a measure of employee engagement, the Employee Engagement Index (EEI), across 4 consecutive years, from a low of 53 percent in 2015 to 62 percent in 2019. While DHS has made progress in improving its scores, in 2019 it remained six points below the government-wide average for the EEI. For several years, DHS and its component agencies have identified root causes for their engagement scores including concerns about leadership accountability and understaffing, among others. This statement discusses nine recommendations related to DHS employee engagement and workforce planning. DHS implemented all but one of these recommendations—to review and correct its coding of cybersecurity positions and assess the accuracy of position descriptions. Finally, filling vacancies could help ensure continued leadership commitment across DHS's mission areas.", "document_type": "gao"}
{"report": "Promoting the rule of law abroad has been a U.S. government priority for decades. As early as 1985, rule of law was added to the Foreign Assistance Act of 1961 as a policy priority. Prior to the 1990s, rule of law assistance was primarily focused on activities in Latin America and the Caribbean. With the end of the Cold War and subsequent collapse of the Soviet Union, the U.S. government invested resources to support rule of law and justice sector reform in Central and Eastern Europe. Following the September 11, 2001 terrorist attacks, Afghanistan became a primary recipient country of U.S. rule of law assistance. The United States continues to support rule of law activities around the world. Department of State’s Standardized Definition of Rule of Law Rule of law is a principle of governance under which all persons, institutions and entities, public and private, including the State itself, are accountable to laws that are publicly promulgated, independently adjudicated, equally applied and enforced, and consistent with international treaties and customary law. Rule of law is demonstrated by adherence to the principles of publicly accepted legitimacy of the law, institutions, and process; checks and balances on structures of power; supremacy of the law; equality before the law; accountability to the law; fairness; effective application of the law; equitable access to justice; participation in decision-making; legal certainty; avoidance of arbitrariness; and procedural and legal transparency. Activities include support for strengthening of judicial systems including court administration, management, and operations; judicial proceedings; constitutional and legal reform efforts; judicial independence; access to justice; and legal education and associations. Millennium Challenge Corporation (MCC), also provide assistance that can be related to improving the rule of law. At each agency, several offices participate in rule of law assistance. The Bureau for International Narcotics and Law Enforcement (INL) is the lead office for rule of law within State. According to INL, it has three main objectives related to rule of law assistance: (1) effectiveness, (2) accountability, and (3) respect for fundamental rights and freedoms. One principle that also guides INL’s rule of law assistance is effectively coordinating assistance with other donors, other bureaus and offices within State, and interagency partners, according to INL. According to USAID, USAID designs, oversees and manages rule of law programming primarily through country-level missions, which ensures programming is tailored to local context. These programs are, in turn, supported by Washington-based regional and pillar bureaus. As the home base for USAID’s Democracy, Human Rights and Governance (DRG) programs, the DRG Center (1) leads USAID efforts to achieve self-reliant, citizen-responsive, democratic societies that respect human dignity, rights and the rule of law; (2) provides proactive and responsive technical support to missions and bureaus on core DRG sectors, including rule of law; and (3) conducts assessment, design, and evaluation of related DRG programs around the world to support more effective, systemic, cost- efficient and sustainable development. DOJ does not directly fund rule of law assistance, but its Office of Overseas Prosecutorial Development, Assistance and Training (OPDAT) and the International Criminal Investigative Training Assistance Program (ICITAP) implement activities funded by agencies such as State, USAID, and DOD through interagency agreements. From fiscal years 2014 through 2018, State and USAID allocated $2.7 billion for rule of law assistance, with annual allocations increasing from $496 million in fiscal year 2014 to $551 million in fiscal year 2018, or 11 percent. Within this time period, allocations fluctuated. Specifically, allocations increased by 20 percent from fiscal years 2014 through 2016, and subsequently decreased by 7 percent from fiscal years 2016 through 2018. According to the Congressional Research Service, the fluctuations in rule of law funding mirrored the fluctuations in foreign operations appropriations, which also increased by 11 percent from fiscal years 2014 through 2018. State allocated more than $2 billion from fiscal years 2014 through 2018 in that time period and USAID allocated over $700 million. See figure 1 for annual allocations by State and USAID for rule of law assistance from fiscal years 2014 through 2018. In fiscal year 2018, activities promoting justice systems and institutions received more allocated funding than all other types of rule of law assistance combined. Justice Systems and Institutions funds were allocated toward activities such as improving the systems, capacity, and sustainability of the civil and criminal justice sectors by harmonizing policies, fostering public / private partnerships, providing training programs, and strengthening administrative and operational systems. Recipients of this assistance can include police forces, prosecutors, judges, public defenders, bar associations, and training institutions. See figure 2 for rule of law allocations by program element, and appendix II for more information on how State and USAID track rule of law funding. DOJ’s ICITAP and OPDAT track funding in obligations, not allocations. According to DOJ, State and USAID used DOJ to implement certain rule of law programs, obligating $691 million from fiscal year 2014 through July 2019. Of this amount, $327.6 million went to ICITAP and $363.5 million went to OPDAT. From fiscal years 2014 through 2018, State and USAID allocated funds for rule of law assistance to 20 regional or programmatic operating units in Washington, D.C., and 72 field-based operating units, primarily bilaterally to country missions. The top four recipients of rule of law allocations were State’s Western Hemisphere Region and bilateral programs in Afghanistan, Mexico, and Colombia. These four recipients were allocated $1.7 billion of $2.7 billion, or 63 percent of the total rule of law allocations from fiscal years 2014 through 2018. The top three bilateral recipients, Afghanistan, Mexico, and Colombia, received 40 percent of rule of law assistance during this time period, which exceeded the total allocation to all 69 other bilateral recipients combined. Figure 3 shows worldwide distribution of bilateral rule of law assistance allocations from fiscal years 2014 through 2018. See appendix III for a complete list of countries and regional programs listed by funds received. State and USAID participate in an annual foreign assistance budget process, managed by State’s F bureau, which determines the allocation of foreign assistance funds for a variety of projects for all recipient countries and programs worldwide. According to agency officials, allocations of rule of law assistance are determined during this process. Agencies develop budget requests on an annual basis, usually starting this process 2 years before the start of any particular fiscal year. According to agency officials, the requests begin with the overseas missions providing annual reports and performance plans to State and USAID headquarters. They said that, during this process, each mission determines its need for financial resources related to foreign assistance, including rule of law assistance. Officials also hold interagency roundtable discussions regarding various aspects of foreign assistance. According to State officials, State chairs a roundtable on rule of law assistance that includes other interagency partners such as DOJ, DOD, MCC, and others. According to these officials, this roundtable allows the relevant agencies and bureaus to make decisions related to the amount of rule of law assistance funding that goes to specific regions and countries and align the funding with broader foreign assistance goals. Each agency also compiles and analyzes these annual reports and performance plans and provides initial budget requests to the Office of Management and Budget (OMB) in September. From September to November, OMB reviews each agency’s budget request submission and conducts analysis on how the budget requests align with the overall federal budget. After OMB conducts its review, it communicates to each agency the level of funding it can request from Congress. The President usually submits the overall federal budget request to Congress on the first Monday in February. As part of this request, each agency, including State and USAID, provides a more detailed Congressional Budget Justification that explains the need for specific funding levels to the relevant congressional subcommittees. Once the House of Representatives and the Senate agree on the language of the bills, including the levels of funding, and pass the State and Foreign Operations appropriations bill, the President can then sign it into law. Once the President signs the State and Foreign Operations appropriations bill into law, OMB apportions the amount of funds that State, USAID, and other agencies may use. Agencies then allocate and obligate these funds for certain programs. In the case of rule of law assistance, these obligated funds are often used to engage in partnership with implementing partners overseas through contracts, grants, or cooperative agreements, according to agency officials. Improving the rule of law in partner countries overseas is identified as an important objective in several strategic documents including the 2017 National Security Strategy, the 2018-2022 State-USAID Joint Strategic Plan, the 2018-2022 DOJ Strategic Plan, and bureau-specific plans. Each of these strategic documents is linked to U.S. national security goals and discuss U.S. agencies’ roles in improving the rule of law in partner countries. See figure 4. 2017 National Security Strategy. This strategy identifies the rule of law as a central U.S. governing principle and a part of the foundation of American alliances overseas. It also states that the United States should provide assistance to support democracy and rule of law in partner countries. 2018-2020 State-USAID Joint Strategic Plan. This plan articulates the importance of improving the rule of law in partner countries overseas and identifies this as a strategic objective. It also requires coordination between the two agencies to deliver sustainable assistance that strengthens their democratic institutions. The plan also calls for State and USAID to work together at the country level to develop country-specific strategies that ensure investments are sustainable and that results are valued by partner countries. Foreign Affairs Manual (FAM). The FAM includes specific roles and responsibilities for rule of law assistance and notes that the lead office for such assistance, INL, is responsible for, among other things, the “development of assistance programs directed at U.S. Government objectives abroad on international criminal justice issues.” Bureau-specific plans and documents. INL and several other State bureaus also have their own strategic documents with elements that relate to the provision of rule of law assistance. Specifically: INL’s Functional Bureau Strategy provides a framework for connecting its responsibility for providing rule of law assistance with its specific programs overseas. The strategy also defines how the bureau matches U.S. foreign policy goals with its foreign assistance portfolio, including its allocation to rule of law assistance. State’s other functional bureaus and offices are guided by strategic documents that relate to rule of law assistance. According to State officials, programs provided by these bureaus and offices can touch on rule of law-related efforts such as training on techniques related to investigating and prosecuting trafficking cases. These bureaus include the Bureau of Democracy, Human Rights, and Labor; the Bureau of Counterterrorism; and the Office to Monitor and Combat Trafficking in Persons. State’s regional bureaus are also guided by strategic documents that can relate to rule of law assistance. For example, the Joint Regional Strategy for the Bureau of European and Eurasian Affairs includes a strategic goal related to protecting core U.S. interests by advancing democracy and human rights and strengthening civil society. USAID Strategy on Democracy, Human Rights, and Governance. This strategy identifies the strengthening of institutions that enable the rule of law as part of USAID’s work to foster greater accountability of leaders to citizens and the law. USAID programs are designed to strengthen the institutional and decisional independence of judiciaries, develop judicial self-governance, and introduce best practices in judicial effectiveness. The strategy also states that USAID will continue to offer timely support for institutional development of oversight bodies, including legislatures and auditor general’s offices. 2017 DOJ Strategic Plan. The strategic plan identifies the development of rule of law as a key responsibility for DOJ. According to DOJ officials, DOJ has two main offices that provide rule of law assistance. Both of these offices are within DOJ’s Criminal Division. ICITAP. This office works with foreign governments to develop professional and transparent law enforcement institutions that protect human rights, combat corruption, and reduce the threat of transnational crime and terrorism. ICITAP focuses on law enforcement, correctional institutions, and forensics (whereas OPDAT works primarily with prosecutors and courts). According to DOJ, ICITAP and OPDAT often coordinate their rule of law assistance efforts and pursue a comprehensive approach to criminal justice reform in countries with both a Resident Legal Advisor and an ICITAP advisor. ICITAP programs are implemented by a combination of federal employees and contractors. OPDAT. According to DOJ officials, OPDAT builds foreign partners who can work with the U.S. agencies to enhance cooperation in transnational cases and to fight crime before it reaches the United States. OPDAT has Resident Legal Advisors, Intermittent Legal Advisors, and International Computer Hacking and Intellectual Property Advisors posted at U.S. embassies overseas who provide assistance and case-based mentoring to foreign counterparts to develop justice systems that can combat transnational crime, corruption, and terrorism consistent with the rule of law. According to these officials, OPDAT’s efforts and programming align with, reinforce, and further U.S. law enforcement and national security objectives. The Integrated Country Strategy (ICS) outlines goals and objectives for country-level priorities, such as rule of law assistance. The ICS is developed jointly by State and USAID in the country mission and establishes overall goals and objectives of the U.S. government in the particular country. The ICSs are 4-year strategic plans for whole-of- government priorities in a given country. According to State, the goals and objectives in the ICS are linked to and informed by the National Security Strategy, the State/USAID Joint Strategic Plan, and department regional and functional bureau strategies. ICS documents are organized around higher-level goals to be achieved by meeting objectives and sub- objectives. For example: In Kosovo, the ICS lists two objectives that help achieve the goal of improved rule of law: (1) ensuring that all Kosovo’s citizens have access to reliable, transparent, and accountable governance and justice and that it is responsive to citizens’ needs, and (2) improving delivery of services, implementation of laws and regulations, and committing to countering corruption. In Colombia, the goal to advance Colombia’s capacity to strengthen governance includes the objective of extending the effective presence of democratic institutions and processes, such as the rule of law. To further detail USAID’s in-country efforts, USAID develops a Country Development Cooperation Strategy (CDCS) to plan agency goals and objectives, which are achieved by meeting intermediate and sub- intermediate results for its work in a specific country, such as the provision of rule of law assistance. According to USAID, the CDCS objectives are integrated into the ICS and inform overall rule of law assistance goals and strategy. Some examples include the following: In Liberia, the 2013-2019 CDCS states that the overall goal of “Strengthened Liberian Institutions” should be reached by achieving, among others, the development objective of more effective, accountable, and inclusive governance. This development objective would in turn be achieved by meeting, among others, the intermediate result of increased access to justice, according to the CDCS. In the Philippines, the 2013-2019 CDCS includes the sub-intermediate result of “judicial efficiency improved” as supporting the intermediate result of “economic competitiveness enhanced.” This intermediate result must be reached to achieve the development objective of broad-based and inclusive growth, which in turn contributes to the goal of a more stable, prosperous and well-governed Philippines, according to the CDCS. The mission-wide strategies for the four selected countries varied in how they prioritized rule of law assistance. In Kosovo, Liberia, and the Philippines rule of law was a higher-level priority, such as a goal in the ICS or development objective in the CDCS. In Colombia, the ICS includes improving rule of law as an objective, but not a main goal, and the CDCS lists rule of law as a sub-intermediate result. Depending on the emphasis of rule of law assistance in a particular country, the in-country mission may develop strategies, in addition to the ICS and CDCS, to address a specific priority such as rule of law. In two of the four selected countries, we found that missions had developed additional strategic documents specific to rule of law assistance. In Kosovo, the mission developed a specific rule of law strategy document to guide activities across State, USAID, and DOJ in support of the rule of law goal in the ICS. In Colombia, State and USAID developed a mission rule of law strategy in 2015. In addition, agency officials said they had adapted strategies to fit changing contexts. For example, when a spate of violence targeted human rights defenders and social activists in 2018, the mission in Colombia developed a human rights strategy as a supplement to the rule of law strategy. State, USAID, and DOJ conduct assessments, consult with host governments, and use interagency reviews to identify local rule of law needs. Agency officials noted that local context affects the nature of rule of law programs, and that needs assessments are critical to understanding this context. While each country faces unique and specific rule of law challenges, and agencies have flexibility to conduct foreign assistance as they deem appropriate, some key interventions are consistent across several or all of the selected countries. See appendix IV for more information on key interventions and priority issues in each selected country. Assessments. State and USAID officials said that they can identify needs by conducting assessments of the rule of law in some of the countries we reviewed. They also sometimes contract with other organizations to conduct these assessments as part of the broader contract for a program. DOJ noted that they have used these assessments as an initial baseline against which to evaluate progress, identify critical local assistance needs, inform development of mission strategies such as the ICS and CDCS, and prepare for future activities. According to U.S. officials, program implementing partners can also use assessments to prepare for specific projects and activities according to the terms of grants and contracts with U.S. government agencies. For example, according to officials: In Colombia, State concluded a letter of agreement with the Pan American Development Foundation to conduct an assessment of the function of the local justice sector. Following this assessment, INL officials said they funded a project with the foundation to strengthen the capacity of Colombia’s Attorney General to address issues related to the original assessment. Also in Colombia, USAID’s Justice for Sustainable Peace program conducted a local justice study with civil society organizations and academic experts in 45 municipalities and also conducted six regional political economy analyses during the initial phase of the project, among other analytical tools that shaped the project’s implementation. In the Philippines, a USAID assessment of closed cases and similar studies supported by the World Bank showed that judicial inefficiency was the most serious concern of litigants. Subsequently, USAID officials said they designed and funded a project intended to, among other things, address the two most significant results of inefficiency: docket congestion and court delay. They did this through supporting case inventories and disposition, streamlined litigation procedures, and automated case management. Late in fiscal year 2018, USAID also funded a project to improve access to justice by increasing access to legal information and assistance, and strengthening formal and informal alternative dispute resolution mechanisms. Host government consultation. U.S. officials said they have also involved the host government in identifying rule of law needs. For example: In Liberia, USAID worked closely with the Liberian government while preparing the 5-year CDCS to best capture local views on justice sector needs, according to USAID officials. In the Philippines, DOJ followed up judicial and prosecutor trainings with informal conversations to elicit local official views on rule of law needs and gaps, according to DOJ officials. According to USAID officials, USAID and the government of the Philippines convened interagency meetings consisting of justice system stakeholders to jointly develop the Joint Country Action Plan which includes rule of law priorities and programmatic activities. In Colombia, USAID and the Colombian Ombudsman’s Office jointly identify overlapping areas of interest and develop programs that fit these priorities, according to USAID officials. Interagency review. U.S. officials described collaborative efforts used at missions to identify local rule of law needs. For example: In the Philippines, officials from State, USAID, and DOJ discuss local needs and capacity gaps in the Law Enforcement Working Group and ad-hoc rule of law technical panels. Agency officials noted that, unlike an independent assessment, these groups review proposed and ongoing activities to ensure they meet technical needs identified by all agencies, including potential projects before solicitations for proposals are made public. In Kosovo, U.S. officials who participate in the rule of law working group jointly discuss potential needs and areas of intervention for local rule of law assistance. Also in the Philippines, State and USAID officials jointly serve on technical evaluation committees to ensure that the design matches local needs and U.S. assistance goals. In the selected countries, U.S.-supported rule of law assistance is implemented through country-specific programs, and we identified five examples, among others, of distinct types of rule of law activities. 1. Technical assistance to build human and institutional capacity in the justice system. U.S. agencies provide assistance to improve rule of law capacity in the form of trainings and exchange programs, and through the use of embedded advisors in local institutions. In Liberia, for example, trainings supported by USAID address a variety of issues. According to officials there, trainings are used in programs to increase the number of magistrates, supplement legal education, increase capacity of the Liberian Land Authority, integrate rule of law and property rights concepts into surveyors’ training, and increase the capacity and number of pro bono legal aid providers. (See fig. 5.) Multiple exchange programs provide training to enhance the rule of law, but local government officials from all four selected countries received training at International Law Enforcement Academies, which provide local law enforcement and justice sector officials with rule of law-related training and technical assistance. (See fig. 6.) 2. Embedded advisors. Embedded advisors provide onsite advice to local government officials and may operate in some of the selected countries as either a supplement or the primary agents of training and capacity building, according to agency officials. In several of our selected countries, the U.S. government embeds advisors with local government agencies or courts. According to U.S. officials, these advisors simultaneously provide technical assistance to local officials, but also can report back to the U.S. mission on the opinions and suggestions of local government. In Colombia, DOJ officials said that advisors now focus primarily on counter-narcotics issues but previously worked with host government agencies on human rights and rule of law-related work. They noted that DOJ advisors trained thousands of Colombian judges and attorneys prior to this shift in emphasis. Also in Colombia, USAID supports embedded advisors to provide technical assistance to the Office of Colombia’s Attorney General on human rights defender homicides and gender-based violence and the Inspector General’s Office to support public official disciplinary actions related to human rights protections. In Kosovo, OPDAT and ICITAP embedded advisors provide advice and training to their counterparts in a variety of Kosovo government agencies, including the Ministry of Justice, Ministry of the Interior, and Kosovo Corrections. 3. Legislative and regulatory reform. U.S. agencies and funded implementers work with local governments and programs to reform specific laws and administrative procedures. For example, U.S. programs introduced or expanded the concept of and legal structure for plea bargaining into Colombia, Kosovo, and the Philippines, according to U.S. officials in those countries. In the Philippines, members of the national court system provided data showing how the expanded use of continuous trial methods and plea bargaining, supported by U.S.-funded programs, increased courts’ ability to process cases and begin to reduce the pre-trial detainee population. 4. Resource and equipment provision. Programs provide resources directly to government agencies and civil society groups that are engaged in advocacy around rule of law issues. In the Philippines, for example, USAID provided funds to install e-courts to improve how courts record case information, monitor case flow, and provide public access to the status of cases, according to USAID. They said this productivity tool automates the tasks and functions of the courts, improving overall efficiency, transparency and accountability. (See fig. 7.) 5. Public outreach. Missions conduct interagency public outreach campaigns to promote the rule of law in the host country, including greater awareness of legal rights, responsibilities, access, and resources, according to agency officials. Interagency coordination via the Rule of Law working group allows the Kosovo mission to conduct consistently voiced rule of law-themed public communication, for example. The mission jointly publishes a rule of law tweet to update the public on relevant issues, supports “anti-corruption week,” and provides feedback to host government officials to emphasize U.S. activities and views on specific rule of law issues. (See fig. 8.) In some situations, agency officials have the flexibility to amend a project during the lifespan of the project. For example, in Colombia, officials noted that a sudden rise in violence against social activists and community leaders led State, USAID, and DOJ to adjust their rule of law strategy and programming to focus more on the prevention and prosecution of those crimes. We found that agencies in the four selected countries coordinate rule of law assistance in various ways that do not consistently include relevant agencies, and the sufficiency of these coordination efforts is unknown. Officials in Colombia, Liberia, and the Philippines described their respective approaches to coordinating rule of law assistance as follows, citing their Law Enforcement Working Groups as the usual forum for formal coordination. In Colombia, INL officials said they operated a rule of law project coordination group specifically for INL staff, but the group did not always include other relevant agencies, such as USAID. INL officials said they sometimes also coordinated rule of law assistance amongst agencies through a Law Enforcement Working Group—which also did not always include other relevant agencies—or through the Human Rights Working Group, which did include State, USAID, and DOJ, according to INL. In Liberia, agency officials said that State and USAID sometimes coordinated rule of law assistance through a Law Enforcement Working Group, but the mission did not have a rule of law-specific working group. In the Philippines, agency officials said they coordinated rule of law assistance through a Law Enforcement Working Group, which they said included all relevant members. Although the mission also operated a Counterterrorism Working Group, agency officials noted that rule of law was not a common topic at its meetings. The mission did not have a rule of law-specific working group. By contrast, agencies at the fourth mission we visited—in Kosovo—used a rule of law-specific working group, which included all relevant agencies, to coordinate rule of law activities. Agency officials, including the Chief of Mission, described the working group as a highly effective means of ensuring interagency collaboration and coordination, and as having had a significant positive impact on the effectiveness of rule of law assistance in Kosovo. Agency officials in Kosovo described the working group as a more effective means of coordinating rule of law assistance than other thematic working groups they had utilized in other posts, such as one on Law Enforcement. State and USAID guidance and our prior work have highlighted the importance of coordinating with relevant entities for interagency efforts, such as rule of law assistance, which is provided by multiple U.S. agencies. The 2018-2022 State-USAID Joint Strategic Plan notes that State and USAID will work with their interagency partners to coordinate strategies and programs, including their efforts related to providing rule of law assistance. In addition, we have reported on the importance of interagency collaboration when efforts involve multiple agencies, and have noted that interagency coordination mechanisms or strategies may reduce potentially duplicative, overlapping, or fragmented efforts. The Law Enforcement Working Groups were designed for purposes other than coordinating rule of law activities and are not required to include agencies that play a key role in providing rule of law assistance. The FAM notes that the Law Enforcement Working Group is the primary forum meant to coordinate U.S. law enforcement operations and law enforcement assistance programs under Chief of Mission authority. State and USAID categorize law enforcement assistance differently from rule of law assistance. Specifically, the FAM states that law enforcement assistance coordinated by the Law Enforcement Working Groups includes bilateral or multilateral foreign assistance programs where the host country unit receiving the assistance is authorized to use force. In addition, the FAM permits but does not require the inclusion of development agencies, including those that provide rule of law assistance, such as USAID, in the Law Enforcement Working Groups. The extent to which interagency rule of law assistance coordination mechanisms are sufficient is unknown, because officials, led by the Chief of Mission, at overseas embassies have not assessed the sufficiency of interagency coordination of foreign assistance at overseas posts or ensured that such coordination includes all relevant agencies and bureaus. Given that strategic guidance is largely decentralized, country- level coordination and collaboration efforts are critical to achieving agency and government-wide objectives. Without assessing the sufficiency of a mission’s mechanisms for coordinating rule of law assistance, such mechanisms may not be as effective as they could be, and may also increase the risk of duplicating efforts or fragmenting limited resources. In addition, agencies may also be missing opportunities to leverage interagency resources. Improving the rule of law in partner countries overseas is a key objective of America’s foreign and national security policy. Ensuring that State, USAID, DOJ, and other agencies involved in providing rule of law assistance coordinate their efforts effectively—including involving all relevant entities—is key to providing that assistance in an efficient and accountable way. Overseas missions have the ability to develop whole-of- government strategies that guide their priorities and activities in a given country. As a result, the quality of strategic planning and coordination at the mission level is critical. Agency officials at overseas posts often work in a decentralized manner to design, implement, and coordinate rule of law assistance. While there is a range of coordination mechanisms in place, in selected countries, the extent and nature of interagency coordination varied and the sufficiency of those efforts is unknown. One of the key mechanisms used in-country to coordinate rule of law assistance is designed for other purposes, and, therefore, does not consistently include agencies that play a key role in providing rule of law assistance. Without assessing the sufficiency of their coordination methods, agencies could be missing opportunities to fully leverage limited resources for rule of law assistance, and could also be duplicating efforts and not providing assistance as effectively and efficiently as possible. The Secretary of State should require Chiefs of Mission at overseas missions that receive allocations for rule of law assistance to assess the sufficiency of their coordination methods to verify that this assistance is coordinated with all relevant interagency partners. (Recommendation 1) We provided a draft of this report to State, USAID, DOJ, and DOD for their review and comment. State and USAID provided written comments, which are reproduced in their entirety in appendices V and VI, respectively. State, USAID, DOJ, and DOD provided technical comments, which we incorporated as appropriate. In its written comments, State accepted our recommendation and agreed that an assessment of coordination mechanisms would improve the overall provision of rule of law assistance. State also said that, on behalf of the Secretary of State, INL will provide guidance to require posts to perform an assessment on their coordination of rule of law assistance and come to a determination if coordination sufficiently involves all relevant agency partners. In its written comments, USAID noted that it prioritizes rule of law as a fundamental development outcome, and that it works with State and DOJ in its pursuit of this and other related objectives. USAID also noted a preference for formal rule of law-specific coordination groups to align efforts and reduce duplication. We are sending copies of this report to the appropriate congressional committees and to the Secretaries of State and Defense, the Acting Administrator of USAID, the Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2964 or gurkinc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VII. This report examines (1) how much funding the Department of State (State) and U.S. Agency for International Development (USAID) allocated for rule of law assistance in fiscal years 2014 through 2018; (2) how agencies strategically plan and coordinate the allocation of rule of law assistance; and (3) what processes agencies have to design, implement, and coordinate rule of law assistance programs in selected countries. This is the first of two reports that will address this issue. To identify which agencies were relevant for a review of global rule of law assistance, we spoke with officials from State, USAID, the Department of Justice (DOJ), the Department of Defense (DOD), and representatives from nongovernmental organizations (NGO) involved in the rule of law sector. On the basis of these interviews and our previous work, we selected State, USAID, and DOJ to review. To address our first objective, we analyzed funding data from State and USAID, and obligation data from DOJ. We primarily relied on allocation data provided by State’s Office of Foreign Assistance Resources (F) for fiscal years 2014 through 2018—the most recent data available at the time of our review. F’s data included allocation data disaggregated by specific recipient country or regional program. Allocation data also was reviewable by the relevant rule of law program area and program elements as listed in State’s and USAID’s Standardized Program Structure and Definitions (SPSD). Rule of law is listed as a program area under the Democracy, Human Rights, and Governance (DR) category within the SPSD as “DR 1” and is composed of five program elements— DR 1.1 through DR 1.5. According to F officials, in fiscal year 2018, F changed its policy to allow operating units to designate activities with other SPSD codes to also count toward rule of law through the “cross- attribution” process. We assessed the reliability of State’s allocation data and determined the data to be sufficiently reliable for the purposes of reporting allocation totals and allocations disaggregated by program element and recipient country. F gathered this information from its FACTSInfo data system, which itself draws from data reported in annual Operational Plans prepared by relevant operating units, according to F officials. We verified the allocation data for the four countries we selected for our review by reviewing the allocated funds listed in the annual Operational Plans for each respective country. The data in the Operational Plans matched the allocation data from FACTSInfo. In addition to the allocation data provided by F, we collected limited obligation data from State’s Bureau for International Narcotics and Law Enforcement (INL) and DOJ. Since DOJ functions primarily as a rule of law assistance program implementer, it reported all of its funding as obligations from State via interagency agreements. DOJ reported obligated funds separately for its two rule of law-focused bodies, the International Criminal Investigative Training Assistance Program (ICITAP) and the Office of Overseas Prosecutorial Development, Assistance and Training (OPDAT). DOJ’s data described all obligated funding for rule of law assistance globally from fiscal years 2014 through July 2019. To evaluate the reliability of DOJ’s data, we asked INL to confirm that DOJ’s obligation totals for the four selected countries matched INL’s. Ultimately, we found the data reported by INL and DOJ to be consistent and sufficiently reliable for the purposes of our reporting objective. To address our second objective, we reviewed documents and interviewed officials in Washington, D.C. We compared strategies and guidance described for the whole of government, specific departments and agencies, and bureaus and offices within those departments. We also reviewed the annual foreign assistance budget process to describe how agencies at headquarters collaborate to determine foreign assistance allocations generally and for rule of law assistance in particular. We reviewed the Integrated Country Strategy documents for each selected country, as well as USAID’s Country Development Cooperation Strategy. We reviewed these documents to identify rule of law thematic priorities and any guidance regarding roles and responsibilities, program implementation, and intra- or interagency coordination. To address our third objective, we selected a non-generalizable sample of four countries: Colombia, Kosovo, Liberia, and the Philippines for site visits or in-depth analysis. We also reviewed one international program— the Regional Training Center, based in Accra, Ghana, part of the International Law Enforcement Academy Program. In selecting these countries, we considered, among other things, (1) countries in which at least two of the three focus agencies had allocated or obligated rule of law assistance funds during fiscal years 2014 through 2018; (2) countries that were among the top half of recipients of rule of law assistance allocations from State and USAID during the same period, as reported in publically available information; (3) geographic dispersal of selected countries, to ensure that no more than one country was selected in each of State’s designated regions; and (4) suggestions from State, USAID, DOJ, and NGO officials with experience in the rule of law sector. We traveled to the Philippines in August 2019 and to Ghana, Liberia, and Kosovo in September 2019. We met with and interviewed officials from State, USAID, and DOJ, and from NGOs that had implemented U.S.- funded rule of law assistance projects, as well as local government officials who had participated in U.S.-funded rule of law assistance activities. We did not travel to Colombia, but conducted interviews with State, USAID, DOJ, NGO, and local government officials in Colombia by phone. We also interviewed officials in Washington, D.C., in person. To examine the processes used by State, USAID, and DOJ to design, implement and coordinate rule of law assistance in selected countries, we reviewed documents and interviewed agency and local government officials and implementing organization staff. We interviewed U.S. and local officials in Washington, D.C.; Colombia; Ghana; Liberia; Kosovo; and the Philippines on methods of identification of local needs, the process of program / activity design, and means of coordinating implementation among multiple agencies, among other topics. We also visited projects in the Philippines, Liberia, and Kosovo, where we were able to observe activities and speak with project implementers, partners, and beneficiaries. We compared the collaboration mechanisms used at these three missions to the collaboration requirements in the 2018-2022 State-USAID Joint Strategic Plan. We conducted this performance audit from December 2018 to June 2020, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Department of State (State) and U.S. Agency for International Development (USAID) categorize and track their foreign assistance according to the Standardized Program Structure and Definitions (SPSD). State and USAID use the SPSD to define overall foreign assistance themes, and to code foreign assistance funds in order to track how U.S. agencies allocate their resources. The SPSD divides foreign assistance into category, program area, and program element. The SPSD comprises seven categories, including Democracy, Human Rights, and Governance, within which rule of law is a specific program area. Rule of law is composed of five program elements: (1) Constitutions, Laws and Legal Systems, (2) Culture of Lawfulness, (3) Checks and Balances with Judicial Independence and Supremacy of Law, (4) Justice Systems and Institutions, and (5) Fairness and Access to Justice. According to State officials, allocated funds are linked to specific SPSD codes in the annual Operational Plans, which are developed by either country-specific or regional operating units. Operating units also determine which program area and program element is the appropriate code for a specific activity. While the SPSD provides definitions of each program element, the definitions may overlap and operating units have some leeway to apply the SPSD codes based on their judgement. Table 1 shows funding associated with each rule of law program element and provides examples of rule of activities that were allocated funds in the selected countries. Beginning in fiscal year 2018, State’s Office of Foreign Assistance Resources (F) began to track allocated funds that were not coded as part of the rule of law program area, but were also planned to be used for rule of law themes, according to F officials. This process is referred to as “cross-attribution.” Cross-attributed funds are designated by operating units in their annual Operational Plan. State officials provided an example from fiscal year 2018, explaining that funding classified under two program elements from the Peace and Security program area were cross- attributed to rule of law. Table 2 shows the cross-attributed allocated funds in fiscal year 2018. Definition: Support the development of constitutions, laws, and legal systems that are procedurally and substantively fair, derived through participatory democratic processes, and consistent with international human rights standards. Both the substance of the law and the process by which it is developed must be legitimate and should be transparent. Includes analysis and dissemination of jurisprudence, innovations, and best practices in constitutional and law-making processes. Includes programs that assist in strengthening systems and processes for developing and enacting laws. Supports efforts to end impunity and enable peaceful transitions to democracy. Customary or religious dispute resolution mechanisms are included as laws, and legal systems do not have to be written or formal to be legitimate. Definition: Foster and maintain a culture that is generally law-abiding, including through legal literacy, public awareness, constituency building, and citizen engagement in legal processes. Ensure that the public is educated about laws and regulations, perceives laws as legitimate and worthy of adherence, and respects the authority of law and legal institutions. Develop citizen demand for an effective and accountable justice system, and develop associations to advocate for all citizens. This includes programs that spur a culture of lawfulness by changing beliefs and attitudes by socializing people into a rule of law culture and changing norms so that people abide by the law. This also includes rule of law programs or civil society programs with a very specific focus on rule of law-related citizen awareness and education—i.e., supporting civil society organizations to participate in public hearings as part of a larger effort to strengthen the parliament or working with a civil society organization to provide legal representation of indigent populations as part of an overall judicial strengthening strategy. Definition: Strengthen judicial independence as a means to maintain separation of powers and check excessive power in any branch or level of government. Strengthening judicial independence includes reducing improper influences on the judiciary through: open and participatory processes for judicial selection and appointment; security of tenure; satisfactory budget allocations to ensure adequate infrastructure, training, and working conditions; judicial self-governance including management of administrative, budgetary, ethics, and disciplinary processes and reform; and transparent court operations and judicial processes. Enhance the judiciary’s ability to check abuses of power by any branch or level of government through creating and strengthening constitutional or judicial review. This element also helps ensure that government is bound by law, and government decision-making is in accordance with the law. Work to create an independent and impartial justice system through institutional and behavioral change, and also to promote public respect for the justice system and judicial decision-making. Definition: Improve the systems, capacity, and sustainability of civil and criminal justice sector and institutions, improve the ability and skills of justice sector actors, and enhance coordination amongst them where appropriate (includes harmonization of policies, procedures, and systems, and public / private partnerships relating to both criminal and civil law). Justice sector actors and institutions include: police, border security, prosecutors, forensics experts, judges, court personnel, public defenders, mediators, arbitrators, conciliators, corrections personnel, private bar, law schools, legal professional associations, and training institutions for each of them. Support educational and training programs for all justice system actors, to include reform of pedagogy and curricula, continuing and in- service training, and support of accreditation and legal professional associations to promote professionalism; and encourage public service. Improve administrative and operational systems, including strategic planning, budget, procurement, and personnel. Definition: Work toward an equitable justice system by ensuring fairness in law and process. Fairness programs include non-discrimination law fair trial standards, effective administrative law systems to guard against arbitrary government action, and observance by all justice system actors and institutions of international treaties and customary law. Support monitoring and advocacy by justice sector NGOs, including strategic lawyering, trial monitoring, and policy dialogue. Improve equitable access to justice through increasing the quality and quantity of state and non- state justice services, with a particular focus on women, youth, the poor, LGBT persons, and other marginalized or vulnerable groups. This includes access to state and non-state dispute-resolution fora; court redistribution; mobile courts; the removal of language, gender, cultural, sexual orientation, gender identity and physical barriers; circulation of laws and legal decisions; alternative dispute resolution systems; and expanding access to legal services (e.g., public defenders’ offices, legal aid and legal services, labor law services, justice or legal resources centers). This also includes programs to educate the citizenry about their rights, how to access services, and how to encourage change. Programs primarily focused on trafficking in persons should be captured under Peace and Security (PS) PS.5 and programs focused on alien smuggling under PS.4. Definition: Develop modern police forces through capacity-building (training and education both in the classroom and in the field) with focus on creating police institutions that can effectively fight crime and serve the public. Activities include, but are not limited to, police academy reform, organizational restructuring, professionalization, developing internal affairs, civil service reform (pay and rank reform), management and leadership, equipment and infrastructure support, aviation support, gender sensitivity, community-oriented policing, and public affairs. Assistance can also support the establishment and sustainment of effective, professional, and accountable law enforcement services (civilian police, stability / formed police units, and specialized units trained and equipped for specific issues such as port and maritime security, border security, gangs, or kidnapping). As the foundation for such a service is fundamentally rooted in the rule of law and respect for human rights, activities conducted in support of this element should be coordinated with programs under the Rule of Law elements in the Democracy, Human Rights, and Governance (DR) category. Definition: Provide consultation on facilities, system, and process design; increase the capabilities and professionalization of corrections personnel at all levels through training, with the goal of developing sustainable operations and infrastructure in compliance with international guidelines, especially with respect to human rights. Implement an objective classification system to separate inmates by risk and status (felony / misdemeanor / pretrial); reduce pretrial detentions and other causes of overcrowding; eliminate factors that lead to violent uprisings and intergang violence; provide specialized equipment and vehicles to ensure secure operations; and develop a path toward independent international accreditation of facilities and operations to ensure effective, transparent, and accountable corrections systems. Activities conducted herein are in support of long-term development of effective, transparent, and accountable penal systems (described under the Democracy, Human Rights, and Governance (DR) Category). For this review, we collected and analyzed foreign rule of law assistance allocation data from the Department of State’s (State) Office of Foreign Assistance Resources (F). F tracks funding allocations by operating unit, which may be either one particular country, such as Afghanistan or Colombia, or a regional or programmatic unit, such as “State Western Hemisphere Regional” or “Near East Regional Democracy.” Allocations to regional and programmatic operating units shown in table 3 below are not inclusive of the allocations to individual countries on this list. For example, the funding allocated to State’s Western Hemisphere Regional operating unit does not include the funding allocated for the Colombia operating unit. While the regional operating units may conduct activities within particular countries, because the funds are managed from the regional perspective, they are considered different streams of funding. Both regional and country-specific operating units include funds for both State and the U.S. Agency for International Development. This appendix provides a review of rule of law-related issues in selected countries in four different geographic regions. We selected a non- generalizable sample of four countries—Colombia, Kosovo, Liberia, the Philippines—to review specific rule of law programs and the ways agencies coordinate their rule of law assistance in-country. The following pages include some key facts and background information about those countries, key challenges to the rule of law, and U.S. rule of law assistance activities. In 2016 the government of Colombia and the Revolutionary Armed Forces of Colombia (FARC) signed a final peace accord calling for demobilization of armed insurgents, the establishment of new transitional justice institutions, and the introduction of the FARC as a non-violent actor in the Colombian political community, according to the Central Intelligence Agency’s World Factbook. The World Factbook also reports that conflict resulted in many lives lost, more than seven million internally displaced persons, and tens of thousands of “disappeared” victims. While the FARC has laid down its arms, challenges posed by remaining insurgent groups and narco traffickers remain. According to U.S. officials, in the absence of a full establishment of rule of law and equal access to justice for all populations, the country risks sliding back into conflict. Key Challenges to the Rule of Law In recent years, according to officials from the Department of State’s (State) Bureau for International Narcotics and Law Enforcement (INL), the presence of illegal armed groups and narcotics trafficking organizations—which have led to an increase in violence against human rights defenders and social activists—has challenged the government of Colombia’s ability to project the rule of law into rural and former conflict zones. In addition, the Integrated Country Strategy for Colombia notes that much of the gold production in Colombia is carried out by organized criminal actors and armed groups, which robs the government of tax revenue, harms human health and the environment, and prevents licit producers from entering the market. $14,400 GDP per capita (2017 est.) Professional / technical capacity Need for enhanced skills for targeting complicated criminal acts (narcotics trafficking, money laundering, and dismantling organized crime) Corruption Corruption related to narcotics trafficking risks overwhelming the government U.S. Rule of Law Assistance Activities Colombia is one of the largest recipients of U.S. rule of law assistance in the world, and programs have sought to address an array of interrelated issues, according to U.S. officials. These officials said that State and the U.S. Agency for International Development (USAID) have collaborated on responding to violence against human rights defenders. INL works with the Department of Justice to improve the capacity of local prosecutors and law enforcement. USAID officials said that they support programs to increase access to justice, including strengthening indigenous justice, instituting alternative dispute resolution mechanisms, and collaborating with the Colombian Public Defender’s Office to expand legal representation for indigent and at-risk communities. They also said that they strengthen the investigation and prosecution of gender-based violence and social leader cases, investigation of public officials failing to protect social leaders, and justice and reparations for victims of armed conflict. Following violent internal conflict from 1998 through 1999, Kosovo remained under the stewardship of the United Nations (UN) until it declared independence in 2008, according to the Central Intelligence Agency’s World Factbook. According to Department of State (State) officials, the 2013 Brussels Agreement resulted in Kosovo and Serbia further partially normalizing relations; however, Kosovo is not universally recognized as a state and is not currently permitted to join the UN, North Atlantic Treaty Organization, or European Union (EU), among others. With U.S. support, the government of Kosovo has sought to reform its legal institutions with the aim of joining the EU. The United States is committed to helping the government of Kosovo reach this goal. 10,887 square kilometers in area (slightly larger than Delaware ) 1,907,592 (July 2018 est.) In 2018, administration of the legal system transferred from foreign oversight to full Kosovo government control, according to State officials. Consequently, local officials said they had to staff courts, translate casefiles kept in other languages, set new rules and regulations, and accomplish a range of other administrative functions in addition to day-to-day court operations. In addition, Kosovo’s legal system had to integrate the previously parallel Serbia-run legal system into Kosovo’s legal and judicial institutions, according to State officials. Albanian 92.9%, Bosniak 1.6%, Serb 1.5%, Turk 1.1%, Ashkali 0.9%, Egyptian 0.7%, Gorani 0.6%, Romani 0.5%, other / unspecified 0.2% (2011 est.). These estimates may exclude northern Kosovo because of census boycotts by Serb and Romani communities. Professional / technical capacity Need for enhanced basic and advanced skills to address complicated criminal acts (money laundering, cybercrimes, trafficking in persons) Corruption Nepotism and cronyism are persistent features of the civil service and political culture $10,900 GDP per capita (2017 est.) U.S. agencies have provided assistance to the government of Kosovo through a variety of means. The Department of Justice embeds advisors in multiple offices of the government of Kosovo, including the Ministry of Justice, Ministry of the Interior, Kosovo Corrections, and police inspectorate, according to agency officials. These officials also said that the advisors provide traditional classroom- based technical training to Kosovo government officials, as well as real-time advice on particular cases and guidance for the development of new regulations. Officials also said that several U.S.-funded small-grant and educational exchange programs have enhanced the capability of local officials and civil society representatives to manage and advocate for an improved justice sector. To ensure an inclusive and transparent judicial process, officials from the U.S. Agency for International Development said they train local government officials in areas such as transparent procurement processes, and local and central government officials on drafting policies and legislation. Agencies at the U.S. Embassy in Kosovo also collaboratively operated a public affairs campaign to engage with Kosovo citizens on rule of law issues, according to U.S. officials. Liberia, which the World Bank categorizes as a low income country, has a history that includes a 14-year civil war as well as the West African Ebola epidemic of 2014 and 2015. When the United Nations peacekeeping mission in Liberia completed its nearly 14-year deployment, the withdrawal of the several thousand peacekeeping personnel caused a significant economic recession, according to U.S. officials. The recession was exacerbated by drops in commodity prices, which left the government of Liberia unable to pay salaries to officials for months at a time, according to U.S. and Liberian officials. Within this context, the U.S. government has identified rule of law assistance as a priority for Liberia. U.S. officials stated that, by improving local rule of law, the United States can simultaneously address weaknesses in multiple sectors of Liberia’s government and social services, including land management, health, and justice. Key Challenges to the Rule of Law According to U.S. officials in Liberia, enhancing Liberia’s land-management system is key to helping establish rule of law throughout Liberia. Land disputes were one underlying cause of the civil war and remain a threat to stability, according to U.S. officials. These officials explained that disputes are complicated by the destruction of the national property registry during the war, a critical shortage of qualified arbiters and surveyors, and some judicial officials’ poor understanding of property laws. Further, the officials said that persistent and slow-to-resolve land disputes highlight gaps in the administrative capacity of courts, local officials’ lack of technical skills necessary to resolve such disputes, and the ease with which corruption may subvert the rules-based order. Corruption Allegations of corruption threaten the government’s authority but present an opportunity for empowering local anti-corruption actors U.S. Rule of Law Assistance Activities Both the Department of State (State) and U.S. Agency for International Development (USAID) have embedded trainers within Liberian government ministries, such as the Ministry of Justice and the Liberia Land Authority. USAID funded an integrated rule of law and property dispute program to address multiple areas of weakness. State adapted a Centers for Disease Control and Prevention- sponsored rapid response program to identify and resolve potentially destabilizing conflicts. USAID also supported wider access to justice by funding a new legal aid network and providing fellowships for law students to work in rural communities. The government of the Philippines’ expansion of the anti-drug campaign has counteracted progress made in reducing congestion in the Philippine courts and trial duration, according to U.S. officials. One local official we interviewed noted that violations of drug laws make up more than 70 percent of the criminal docket and that large numbers of arrests have led to a highly congested court system. A high volume of arrests and slow processing of cases has also resulted in a dramatic increase in the number of pretrial detainees, according to U.S. officials. 105,893,381 (July 2018 est.) Court docket congestion Anti-drug campaign has overwhelmed an already burdened case management system $8,400 GDP per capita (2017 est.) U.S. Rule of Law Assistance Activities Department of State (State) U.S. Agency for International Development (USAID) and Department of Justice (DOJ) programs are designed to respond to the shift in the government of the Philippines’ priorities, according to U.S. officials. State provided training to Philippine law students, judges, and law enforcement officials that emphasized improved collection and interpretation of evidence. State also funded the establishment of legal aid clinics to improve community access to representation. USAID funded the introduction of “e-courts” and other information technologies in the judicial sector to improve the efficiency and transparency of court proceedings. USAID also funded programs to introduce new legal mechanisms, such as plea bargaining and continuous trial, to reduce the pre-trial detainee population and speed the administration of justice. DOJ has programs to increase prosecutor-police cooperation and to build capacity to combat specific threats, including trafficking in persons, cybercrime, terrorism, and financial crime. In addition to the contact named above, Joe Carney (Assistant Director), Brian Hackney (Analyst in Charge), Benjamin Legow, Carolina Morgan, Afsana Oreen, Abena Serwaa, Parul Aggarwal, Debbie Chung, Justin Fisher, Jenny Grover, Chris Keblitis, and Alex Welsh made key contributions to this report.", "summary": "Rule of law strengthens protection of fundamental rights, ensures a robust civil society, and serves as a foundation for democratic governance and economic growth. According to State, countries with a strong rule of law provide a more level playing field for American businesses to engage and compete, and countries with a weak rule of law can potentially export transnational threats and economic insecurity, undermining the interests of the United States. GAO was asked to review U.S. rule of law assistance around the world. This report examines (1) how State and USAID allocated funds for this assistance in fiscal years 2014 through 2018, (2) how agencies strategically plan and allocate this assistance globally, and (3) what processes agencies have to design, implement, and coordinate this assistance in selected countries. GAO reviewed State, USAID, and DOJ documents and data for fiscal years 2014 through 2018 and interviewed officials in Colombia, Kosovo, Liberia, the Philippines, and Washington, D.C. GAO chose these countries on the basis of funding amounts and other factors. The Department of State (State) and the U.S. Agency for International Development (USAID) allocated more than $2.7 billion for rule of law assistance from fiscal years 2014 through 2018—the latest available data as of GAO's review. Of that, State allocated over $2 billion and USAID allocated over $700 million. State and USAID funded some of these programs through the Department of Justice (DOJ). Rule of law assistance funded a variety of activities including improving justice institutions, legal reform, and promoting a culture of lawfulness. The agencies implemented these programs globally but allocated most funds to the Western Hemisphere and Afghanistan. After Congress appropriates funding, agencies determine rule of law allocations through the foreign assistance budget process. State and USAID identify rule of law as a goal in agency-wide strategic documents and hold an annual interagency roundtable regarding rule of law assistance to determine those allocations. Rule of law assistance is guided by national and agency-, bureau-, and mission-specific strategies that are linked to the national security goals of the United States. These strategies discuss the agencies' roles and responsibilities in improving the rule of law. State and USAID guidance highlights the importance of coordination between agencies as they design and implement rule of law assistance, but not all agencies are included in some of the key coordination mechanisms used in four countries GAO selected for review. Agency officials in the selected countries cited the use of some informal and formal coordination practices, such as the use of law enforcement working groups, but State policy does not require all entities that may be involved in rule of law assistance to participate in these working groups. For example, in three of the four selected countries, officials described coordinating rule of law assistance, in part, through these working groups, which may not include critical agencies such as USAID. According to State policy, these working groups are designed to achieve other goals using agencies and offices that are not involved in providing rule of law assistance. Without verifying that interagency coordination includes all relevant entities, missions may not know whether they are fully leveraging interagency resources or ensuring that they do not duplicate or overlap rule of law assistance. GAO recommends that State require overseas missions where rule of law assistance funds have been allocated to assess whether this assistance is coordinated with all relevant interagency partners. State concurred with our recommendation.", "document_type": "gao"}
{"report": "To be eligible for Job Corps, youth must generally be 16 to 24 years old at the time of enrollment; be low-income; and have one or more barriers to education and employment, such as being homeless, a school dropout, or in foster care. The vast majority of students live at Job Corps centers in a residential setting, while the remaining students commute on a daily basis from their homes to their respective centers. This residential structure is unique among federal youth programs and enables Job Corps to provide a comprehensive array of services to students 24 hours a day, 7 days a week. These services include housing, meals, clothing, medical and dental care, academic instruction, and job training. ETA administers the Job Corps program through its Office of Job Corps under the leadership of a national director and a field network of six regional offices located in Atlanta, Boston, Chicago, Dallas, Philadelphia, and San Francisco. Of the 119 centers, 94 are operated under contracts with various businesses, Native American tribes, and nonprofit organizations. Job Corps’ predominantly contractor-operated structure is unique among ETA’s employment and training programs, according to ETA officials, as other programs it administers are generally operated by states through grants. Several Job Corps contractors have operated centers for two or more decades, and some contractors operate multiple centers. For example, by the end of program year 2016, over two-thirds of Job Corps’ contract centers were operated by seven contractors. The remaining 25 centers (called Civilian Conservation Centers) are operated by USDA’s Forest Service through an interagency agreement with DOL. Figure 1 presents a map of ETA’s Job Corps center locations and regions. Multiple offices within DOL at the national and regional levels are involved in Job Corp center contracting (see fig. 2). Three offices within ETA award and monitor Job Corps center contracts. The Office of Job Corps oversees program operations and monitors contractors who operate Job Corps centers. Each regional office has between seven and nine program managers who carry out these functions and assist in the contracting process. The Office of Contracts Management awards and manages Job Corps center and other support contracts, and oversees ETA’s Contract Review Board, which, among other things, generally reviews all competitive Job Corps center contracts over $1 million. Each regional office has one contracting officer who is the designated official with the legal authority to enter into, administer, and terminate Job Corps contracts on behalf of the government. In addition, regions have contract specialists who assist the contracting officer in managing Job Corps center and support contracts. Contracting officers and contract specialists in Job Corps’ regional offices report to the Office of Contracts Management. The Office of Financial Administration monitors Job Corps’ budget and spending, communicates information about the availability of funds for Job Corps center and support contracts, and calculates and pays incentive fees to contractors, among other types of fees. At the national level, budget analysts carry out these functions and are assigned to each Job Corps regional office. In addition, other DOL offices are involved in Job Corp center contracts. Specifically, DOL officials said that the Office of the Solicitor provides legal advice and representation to ETA on legal matters related to Job Corps center contracts, such as protests and contractors’ failure to meet specific contractual requirements. DOL’s department-wide Procurement Review Board within the Office of Procurement Policy reviews and approves all noncompetitive Job Corps center and support contracts. DOL’s Office of Small and Disadvantaged Business Utilization reviews and makes recommendations on all ETA procurements over a certain threshold. DOL officials told us this includes reviewing whether to set aside Job Corps center and support contracts for small businesses. Similar to other federal agencies, ETA is generally required to use full and open competition—meaning all responsible parties are permitted to compete—when awarding contracts. Competition is considered a cornerstone of the federal acquisition system and a critical tool for achieving the best return on investment for taxpayers. In addition, competitively-awarded contracts can help conserve scarce resources, improve contractor performance, curb fraud, and promote accountability. In fiscal year 2017, over 80 percent of obligations at federal civilian agencies (non-defense) were awarded competitively. Despite the preference for competition, federal procurement law recognizes that full and open competition is not feasible in all circumstances and authorizes contracting without full and open competition under certain conditions. For example, contracting officers may award a contract noncompetitively if one of seven exceptions listed in Federal Acquisition Regulation (FAR) subpart 6.3 applies. Examples of allowable exceptions include circumstances when products or services required by the agency are available from only one source, or when the need for products and services is of such an unusual and compelling urgency that the federal government faces the risk of serious financial or other injury. Generally, exceptions to full and open competition must be supported by written justification and approval documents that contain sufficient facts and rationale to justify use of an exception. ETA’s process for awarding and monitoring Job Corps center contracts generally consists of several phases, which we have categorized into six areas that reflect the federal contracting process. As shown in figure 3, Job Corps’ contracting process starts with acquisition planning and concludes with contract administration. Within each phase, regional program and contracting officials conduct various contracting activities, such as evaluating proposals received from prospective contractors. In addition, budget analysts support the acquisition process by communicating information about the availability of funding for Job Corps center contracts, among other duties. Interested parties—including actual or prospective offerors—may make written objections (which are referred to as protests) of an agency’s actions concerning the solicitation and award of contracts. For example, interested parties may object to the award of a Job Corps center contract if they believe the contract was awarded improperly. Parties may file protests in several different venues, including with the agency, GAO, or the U.S. Court of Federal Claims. Parties that disagree with the agency’s protest decisions or GAO’s recommendations can file a protest with the U.S. Court of Federal Claims. The legal procedures and the length of time it can take to resolve a protest varies based on the venue in which the protest was filed. For example, protests filed with the agency should be resolved within 35 days, while GAO generally decides protests within 100 days. In some instances, interested parties may seek to halt the award or suspend performance of the contract until the protest is resolved. This can introduce potential delays in the agency’s acquisition process or interrupt the performance of an existing contract. Protests may be resolved in a variety of ways depending on which venue the protest was filed. For protests that are found to have merit, the agency may take actions such as issuing a new solicitation, re-competing a contract, or terminating a contract. Parties can also withdraw their protest at any time during the process. ETA established a performance management system (commonly referred to as the Job Corps’ Outcome Measurement System) to assess center performance and program effectiveness. In program years 2016 and 2017, center contractors collected and reported to ETA data related to performance measures that generally fall under three areas of services provided to students: (1) direct center services (e.g., helping students attain a high school diploma or high school equivalency); (2) short-term career transition services (e.g., placement of graduates in a job related to their training); and (3) long-term career transition services (e.g., job placements of graduates 6 and 12 months after completing the program). For each measure reported, ETA established a national performance goal and assigned a weight that represents its relative importance for achieving student outcomes. The sum of the ratings on each performance measure was used to develop an overall ranking for each center. According to ETA officials, they revised Job Corps’ outcome measurement system for program year 2018 to align with requirements under the Workforce Innovation and Opportunity Act (WIOA). Under the Act, ETA is required to annually assess the performance of each Job Corps center and to report to Congress on their performance based on specified performance indicators. Officials said they are currently tracking Job Corps data on eight performance measures related to various student outcomes such as measurable skills gain and credential attainment (i.e., earning a high school diploma or its equivalent, or completing career and technical training). ETA reported these new measures for program year 2018. In certain situations, it may become evident that services could lapse before a subsequent contract can be awarded. In these cases, because of time constraints, contracting officers may, for example: (1) extend the existing contract or (2) award a short-term stand-alone contract to the incumbent contractor on a sole-source basis to avoid a lapse in services. Both these extensions and new sole-source contracts are informally referred to as bridge contracts by some in the acquisition community, and we have used this definition in previous work. In our October 2015 report, we found that the three selected agencies included in our review—the Departments of Defense, Health and Human Services, and Justice—had limited or no insight into their use of bridge contracts, as bridge contracts were not defined or addressed in department-level guidance or in the FAR. In response, we recommended that the Administrator of the Office of Federal Procurement Policy (OFPP)—an office within the Office of Management and Budget (OMB) that provides government-wide guidance on federal contracting— take the following actions: (1) develop a standard definition for bridge contracts and incorporate it as appropriate into relevant FAR sections and (2) provide guidance to agencies as an interim measure until the FAR is amended. OFPP agreed with these two recommendations; however, as of May 2019, OMB had not yet implemented them. We acknowledge that in the absence of a government-wide definition, agencies may have differing views of what constitutes a bridge contract. For example, ETA informed us that it does not consider competitive contracts that exercise the “Option to Extend Services” under FAR 52.217-8 to be bridge contracts. However, ETA and DOL could not provide us with a documented definition of bridge contracts for their agency. Contracts and extensions (both competitive and noncompetitive) are included in our definition of a bridge contract because the focus of the definition is on the intent of the contract or extension. Nearly three-quarters of the Job Corps centers (68 of 97) were operated by contractors under bridge contracts at some point during program year 2016. Of the 68 centers that operated under bridge contracts, 58 centers had at least one bridge contract awarded on a sole source basis, or noncompetitively. The other 10 centers had bridge contracts based on use of the “Option to Extend Services” clause. While GAO has found that bridge contracts are generally envisioned as short-term, over two- thirds of the centers (49 of 68) that used bridge contracts in program year 2016 operated under them for at least 12 months, with over a third of these centers operating under bridge contracts for at least 2 years or potentially longer. Figure 4 shows the minimum length of time ETA used bridge contracts to operate Job Corps centers. Our in-depth review of 10 centers highlights how a center may use bridge contracts for longer periods of time. For example, for 1 of the 10 centers we reviewed and that operated under bridge contracts for 30 months, ETA first opted to exercise the option to extend services clause with the same contractor for 6 months, between May and October 2014. By the end of the extension, ETA was unable to award the follow-on contract and instead awarded a 2-year bridge contract to the same contractor. ETA stated that with respect to this center, it needed to use a bridge contract due to several factors, including protests, funding challenges, and internal efforts to strengthen aspects of the procurement process. Subsequently, ETA awarded a competitive follow-on contract in September 2016 to a new contractor. ETA cited several reasons that contributed to its need to use bridge contracts during program year 2016, according to the justification and approval documents we reviewed and our interviews with national and regional officials. For example, acquisition workforce challenges were a primary reason ETA cited for its need to use bridge contracts. ETA also frequently cited protests by Job Corps contractors; at times citing protests that dated back to 2011. Leading up to program year 2016, ETA national officials said they encountered a number of acquisition workforce challenges that affected their ability to competitively award Job Corps center contracts. These challenges included: (1) staff attrition in key contracting positions, (2) the need to hire and train new contracting staff, and (3) the need to divert staff to address new requirements under WIOA and other issues. As discussed earlier, ETA has one contracting officer position for each of its six regions. ETA officials said they faced significant attrition in the Office of Contracts Management around 2013 when all but one of the six regional contracting officers left or retired, leaving them with limited regional resources to award center contracts. San Francisco was the only Job Corps region that did not lose its contracting officer. Officials said that this may help to explain why the region operated under fewer bridge contracts as compared to the other five regions. In addition, ETA officials said the agency decided to centralize contracting positions in the national office in 2013 due to concerns about oversight of regional contracting staff. In 2015, ETA decided to reestablish its regional contracting structure, with one contracting officer in each region. To address the large number of staff departures, ETA hired new contracting officers and all of the contracting officers we spoke with told us that they joined ETA’s Office of Contracts Management in 2015 or 2016. When ETA filled its staff vacancies, it hired contracting officers who had prior experience at other agencies. Nonetheless, some contracting officers said it still took time for them to get up to speed due to the uniqueness and complexity of Job Corps center operations contracts. Program officials said that the additional time needed to explain program requirements to new contracting staff slowed down the contracting process. Also, national officials said that contracting officers were unable to competitively award center contracts because of the time needed to carry out acquisition planning tasks, which as we have previously reported, are important to establishing a strong foundation for the contracting process. Such activities include market research, which is used to collect and analyze information about capabilities within the market available to satisfy agency needs. According to ETA’s Acquisition Handbook, market research should occur at least 16 months prior to the anticipated award of a new center contract and after the requirements have been developed by the Office of Job Corps. Figure 5 provides an example of how acquisition workforce challenges affected one of the centers in our in-depth review. Additionally, in the written justification and approval documents for noncompetitive bridge contracts related to 35 of the 68 Job Corps centers that operated under bridge contracts during program year 2016, ETA officials noted that they had to divert contracting staff to implement contracting changes that resulted from the passage of WIOA. WIOA included provisions that affected the Job Corps contracting process, including requiring that certain criteria be considered when selecting an entity to operate the centers. DOL issued regulations implementing these provisions in August 2016. Additionally, in written justification and approval documents for noncompetitive bridge contracts related to 34 of the 68 Job Corps centers that operated under bridge contracts during program year 2016, ETA officials noted that they diverted staff from awarding Job Corps procurements to address financial issues encountered by the program. GAO and DOL’s Office of Inspector General previously reported on earlier problems with ETA’s financial management oversight of Job Corps. In particular, DOL’s Inspector General reported insufficient management oversight and inadequate documentation led to ETA obligating funds that had yet to be appropriated across multiple years. In response, ETA officials said that the agency had, among other actions taken, provided training to its program and contracting staff in program year 2016. In our review of ETA’s written justification and approval documents for noncompetitive bridge contracts related to 42 of the 68 Job Corps centers that operated under bridge contracts during program year 2016, ETA officials cited protests from Job Corps offerors as a reason for using bridge contracts. Some of these justifications cited specific center protests, while others cited the accumulation of protests beginning in 2011. According to ETA officials, in general, each time a protest is filed, the center contract in question is either not awarded or performance on the contract is suspended until the protest is resolved. Our analysis of DOL’s data of protests filed with GAO, the agency, or the U.S. Court of Federal Claims shows that a total of 11 protests were filed in program year 2016 related to seven centers; however, Job Corps offerors filed 44 protests in the four proceeding program years. Figure 6 presents DOL’s data on the number of Job Corps center protests by decision outcome filed in program years 2012 to 2016 before GAO, the agency, or the U.S. Court of Federal Claims. ETA officials said that the accumulation of protests filed since 2012 contributed to the agency’s heavy reliance on bridge contracts in 2016. ETA officials explained that they temporarily suspended the issuance of solicitations for center contracts prior to program year 2016 to address the issues raised in the protests. This resulted in a backlog of contracts waiting to be competitively awarded. We found that protests were not the only factor contributing to ETA’s need to use bridge contracts. Figure 7 provides an example of how a protest and other factors affected one center in our in-depth review. In one partially sustained protest filed at GAO, GAO found that ETA failed to meaningfully consider whether another contractor was capable of performing the procured services before it awarded a noncompetitive bridge contract to the incumbent contractor. In this instance, ETA published a notice of its intent to award a sole-source contract, inviting companies to submit a statement demonstrating their capabilities within 7 days. However, a day after publishing the notice, DOL’s chief procurement officer signed the justification for the sole-source contract, and DOL entered into the sole-source contract with the incumbent contractor without considering other prospective contractors’ capability to perform the procured services. ETA officials told us that some of the protests were caused in part by the agency’s decision to set aside more Job Corps center contracts for small businesses. Federal regulations require all federal agencies with procurement authority to “provide maximum practicable opportunities” for small businesses to win awards for government contracts, thereby meeting specific government-wide goals. ETA officials said that the agency’s decision to set aside more center contracts for small businesses precluded larger incumbent contractors—some of which had historically operated centers—from competing for some center contracts. In response, ETA officials said some of these contractors filed protests that challenged ETA’s decisions to set aside center contracts for small businesses. ETA identified a number of other contracting issues as reasons for using bridge contracts. For example, in the justification and approval documents we reviewed related to contracts for four centers, ETA officials said procurements for competitive Job Corps center contracts were suspended because the pre-award processes had been compromised due to the unauthorized release of confidential contractor information in 2015. This included sensitive information on the incumbent contractor’s staffing levels and rates of pay, among other information. In response to this unauthorized release, ETA delayed new competitive procurements and used bridge contracts to continue services until the released information was no longer applicable and would not harm the contractor’s ability to compete. ETA officials said they more recently used various strategies to improve the contracting process, which allowed them to award competitive contracts more quickly and reduce their reliance on noncompetitive bridge contracts to operate Job Corps centers. According to our analysis of FPDS-NG data and contracting documentation, most of the centers (48 of 68) that operated under bridge contracts during program year 2016 transitioned to competitively awarded contracts by the end of program year 2017. The strategies ETA identified as contributing to reducing the backlog of centers awaiting contract awards included: Prioritizing staff efforts on competitive awards. Contracting officials said that they awarded competitive contracts for an average of 12 to 14 Job Corps centers in a region at the same time, which they noted is a high volume of contract activity to execute concurrently. They said that Job Corps center contracts typically can take approximately 8 to 12 months from solicitation to award for new 5- year competitive procurements. In regions without a contracting officer, officials said that they had to rely on contracting officers from other regions and the national office to handle the workload. In addition, some program officials said that they were instructed to prioritize competitive procurements over some of their other program responsibilities, such as conducting on-site visits at Job Corps centers. As of January 2019, officials said they were able to clear the entire procurement backlog for center contracts during 2018. Using oral presentations to evaluate prospective contractors. ETA officials said they increased their use of oral presentations, in accordance with FAR 15.102, from prospective contractors during the initial evaluation phase of the contract award process. In a typical initial evaluation, regional program and contracting officials assess prospective contractors’ ability to meet the contract requirements, among other areas. Contracting and program officials told us that reviewing technical proposals can be very time consuming because each proposal can be more than 100 pages long; thus, in ETA’s view, oral presentations can streamline the proposal review process. Awarding indefinite-delivery/indefinite-quantity (IDIQ) contracts. In November 2016, ETA awarded IDIQ contracts that allow ETA to quickly award task orders in the event a center may experience a lapse in services, such as when a center contractor files for bankruptcy and abandons the center. ETA officials also said that such contracts could be used when a center contract is expiring and no follow-on contract has been awarded. According to the solicitation for the IDIQ contracts, selected contractors should be able to quickly take over center operations with limited disruption, provide the upkeep of the facility, and ensure safe living and learning environments for students, among other duties. Twelve contractors were awarded IDIQ contracts and may compete for task orders to operate specific centers. Regional contracting officials said the process for awarding a task order is generally faster than their typical competitive center contracts. They also noted that IDIQ contracts have been a helpful tool in continuing operations at centers during protests. Regional officials told us that incumbent contractors would previously file protests when they were unsuccessful in winning new center contracts because their existing contract was extended while the protest was resolved. In the future, ETA officials said they can quickly award a task order from an IDIQ contract to replace an incumbent contractor during a protest. Also, under the terms of the solicitation for the IDIQ contracts, contractors who received one of the 12 IDIQ contracts would be prohibited from competing for task orders for centers where they are the incumbent contractor. In program year 2017, ETA awarded task orders to continue services at four centers. Despite ETA’s efforts to reduce its use of bridge contracts, we identified ongoing acquisition planning and workforce challenges. These challenges fall into three categories: (1) planning for future procurements; (2) addressing acquisition workforce vacancies; and (3) implementing a new contracting approach. These areas could pose a risk to ETA’s management of Job Corps center contracts, including its ability to minimize the use of bridge contracts in the future, if unresolved. Based on our analysis, we project that more than half (57 of 97) of Job Corps center contracts may need new contracts in program years 2021 and 2022, according to our analysis of FPDS-NG data and contract documentation (see fig. 8). Contracting officials expressed concerns about their capacity to conduct acquisition planning to award future center contracts given that two of six regions are currently without contracting officers, despite efforts to fill all vacant contracting officer positions. For the centers that we projected will need new contracts in program years 2021 and 2022, ETA will need to begin conducting acquisition planning relatively soon. According to contracting officials, acquisition planning and market research can take anywhere from 6 months to several years, depending on the requirement. Once these steps are completed, officials said it can take approximately 8 to 12 months from solicitation to award for new 5-year competitive procurements. Therefore, acquisition planning for a Job Corps center contract set to expire in January 2021 would need to begin before early 2020. We have previously reported that agencies have faced challenges allowing sufficient time to conduct acquisition planning, which can increase the risk that the government may receive services that cost more than anticipated, are delivered late, and are of unacceptable quality. According to the FAR, agencies should generally begin acquisition planning as soon as the agency need is identified, preferably well in advance of the fiscal year when the contract needs to be awarded to obtain timely services. The FAR also notes that the lack of advance planning is not a basis for justifying the use of other than full and open competition. Contracting officials said that finding ways to stagger Job Corps center contracts could help prevent a future procurement backlog. However, they had not received documented guidance from the national office on how to stagger center contracts to help mitigate this problem. In particular, national and regional contracting officials told us that one possibility for staggering center contracts is to decline to exercise option years. Officials in one region said that they are exploring this option, but noted it is still fairly uncommon for them not to exercise option years. GAO’s prior work emphasized the importance of comprehensive planning to ensure agencies effectively execute their missions and are accountable for results. Also, federal internal control standards state that agency leadership should anticipate and plan for significant changes by using a forward-looking process to identify risks that would affect its ability to achieve its objectives. Without a comprehensive strategy that considers when current center contracts will expire and how—or whether—Job Corps staff can effectively plan for and competitively award future center contracts, ETA is at increased risk of again having a backlog of center contracts to award competitively and, in turn, needing to use bridge contracts. Contracting officials said that filling vacant contracting officer positions in 2015 and 2016 was essential to reducing the procurement backlog of competitive contracts to operate Job Corps centers. By the end of program year 2016, ETA officials said contracting officers were in all six regions. However, at the time of our review, ETA was again without contracting officers in two of Job Corps’ six regions. According to officials, staff vacancies can create workload challenges. Each region is assigned one contracting officer who is responsible for awarding contracts for center operations, among other support contracts. Most of these contracting officers oversee 15 or more centers operated by contractors. When one of the six regional contracting officer positions has a vacancy, the contracting workload for that region is redistributed to other regions and the national office, which can have significant implications. For example, at the time of our review, national contracting officials told us that they were assisting the two regions where contracting officers had recently left. They said this increased their workload, as they had to attend to the contracting needs of these two regions while fulfilling their national contracting oversight duties. Similarly, contracting officials we spoke with in five regions noted vacancies in other positions that support the contracting process, such as those for contract specialists who provide support during the contracting process and program officials who provide technical expertise during proposal evaluations. In addition, program officials we spoke with during our site visits told us that some program manager positions have been vacant for at least a year in three regions. As a result, program officials said they have to manage and oversee additional centers to ensure coverage until those positions are filled. Further, past workforce assessments of ETA indicate that staff vacancies have been a longstanding challenge. For example, a 2013 study found that there were an insufficient number of program and contracting officials to efficiently and effectively handle the workload for Job Corps. Similarly, a 2014 assessment found that the Office of Job Corps, the Office of Contracts Management, and the Office of Financial Administration were understaffed to meet their missions. ETA officials said they have not developed a written acquisition workforce strategy to address staff vacancies for Job Corps. We have previously reported on the benefits of federal agencies planning strategically for their acquisition workforces, particularly for those agencies that rely heavily on contracting personnel with the necessary experience and skills to award and oversee complex contracts to accomplish their missions. In addition, our prior work has highlighted key components of agencies’ strategic workforce plans, including identifying gaps between current and needed workforce capabilities and developing strategies to meet these capabilities. Agency officials stated that DOL assesses and prioritizes needs across the agency when authorizing hiring actions, including for the Job Corps program. National and regional contracting officials told us that they have not been included in decisions regarding efforts to fill vacancies in critical contracting positions or to determine the number of contracting positions and the location of those positions (i.e., among the regions). ETA officials said that DOL has a new initiative to reorganize several functions across the agency, including potentially consolidating procurement functions. As previously discussed, ETA has restructured its contracting function twice over the past 6 years, consolidating contracting positions in the national office in 2013 and then moving them back to the regions in 2015. When asked about this new reorganization and how it might affect Job Corps procurements, DOL officials responded that they are in the planning phase, which is expected to conclude in the second half of fiscal year 2019. Officials commented that the goal of the reorganization is “to maximize DOL’s Federal buying power through effective procurement management.” According to officials, they plan to maintain a contracting office focused on supporting the Job Corps program. However, they did not provide additional information on the structure and location of this new Job Corps contracting office, or more specific time frames for when it would be established. It was unclear the extent to which the agency had evaluated how structural changes could affect its current contracting office and procurements, or whether they had consulted key stakeholders. GAO’s principles for effective strategic workforce planning emphasize the need to align an agency’s human capital program with its current and emerging mission and programmatic goals, and develop long-term strategies for acquiring, developing, and retaining staff to achieve those goals. Further, federal internal control standards state that agency leadership needs to demonstrate commitment to various workforce planning activities and determine the critical skills and competencies that will be needed to achieve key results. Without a comprehensive workforce strategy, ETA risks not having a sufficient number of trained acquisition personnel to ensure that it is able to adequately plan for and competitively award future center contracts as current center contracts expire. ETA has begun awarding fixed-price contracts for Job Corps center operations, which is a significant departure from the agency’s longstanding approach of using cost-reimbursement contracts, according to contracting officials. Under cost-reimbursement contracts, ETA pays allowable and reasonable costs incurred by the contractor to the extent prescribed by the contract. As of March 2019, ETA officials told us they had awarded 12 fixed-price contracts for Job Corps center operations. Officials said they did not have a timeline for transitioning other centers to fixed-price contracts for Job Corps center operations, but said that as center contracts expire, they will be reviewed to determine if a fixed-price contract would be appropriate. Regional contracting officials noted two primary advantages of using fixed-price contracts to operate Job Corps centers. First, they said fixed- price contracts reduce the government’s risk because the government pays only for work that meets specifications outlined in the contract. Second, regional officials said fixed-price contracts are easier to manage and administer compared to cost-reimbursement contracts because they are less administratively burdensome and require less oversight of contractor costs. For example, under cost-reimbursement contracts, regional program officials play a role in examining and approving contractor invoices to verify that they are allowable under the contract, and reasonable for the product or service identified. Under fixed-price contracts, contractors will have to demonstrate that they delivered on the contract or otherwise become subject to default, but program officials do not need to verify each expense to the same degree, according to regional and national contracting officials. ETA officials noted that the Office of Contracts Management provided training to program and contracting officials on the overall procurement process and the transition to fixed-price contracts to ensure they understood how to administer future contracts. ETA used various approaches to monitor contractor performance to ensure selected centers were operating appropriately and to encourage contractors to achieve certain program outcomes. These approaches included (1) risk-based center monitoring and (2) contract monitoring to hold contractors accountable. ETA primarily conducts two types of center assessments as part of the agency’s national risk-based monitoring strategy to identify emerging problems at Job Corps centers, including those operated by contractors. Regional office center assessments. ETA officials said they generally conduct unannounced visits to examine all aspects of center operations to ensure contractors comply with program requirements. For centers that operate for the full 5-year period of performance through a competitively awarded contract, these assessments are typically conducted twice over that time period. According to one regional director, these unannounced visits provide the opportunity to hear directly from Job Corps students and observe the conditions at the facilities. Program officials said that these visits are critical because some issues are not always apparent based on the data and reports they receive. For example, one program official said that during a center visit, she found questionable facility conditions at some student dormitories that had not been reported. Another program official said that during a center visit, she was able to observe the dynamics between students and center leadership and staff. Regional office targeted assessments. Regional program officials said they conduct onsite targeted unannounced assessments that typically focus on specific deficiencies that were identified as areas of concern in prior reviews or through other sources of information such as the student satisfaction survey. For example, contractor performance concerns could trigger this type of review. In particular, regional program officials said that center contractors who do not achieve national performance targets for student outcomes could be subject to a review. Following a center assessment, program officials prepare a report to summarize their findings and contractors may be required to submit and implement corrective action plans to address any deficiencies identified, according to Job Corps’ Policy and Requirements Handbook. Contractors who do not meet expected performance levels are placed on a performance improvement plan. According to some regional program officials, bridge contracts may lead to monitoring challenges. In particular, some regional program officials said that it is more difficult to address long-term challenges when centers operate under a bridge contract because the contract may only be in place for a few months while the procurement process for the next contract is underway. In some cases, they said the current contractor may not be operating the center by the time program officials conduct an assessment and issue their report. Program officials also noted that the short-term nature of bridge contracts can make it difficult for center contractors to recruit and retain high-quality staff. Some officials said that some program staff will look for a new job if they are uncertain whether a longer-term contract will be awarded. To monitor contractor performance, ETA used additional tools that generally reflect federal acquisition practices government-wide. Contractor performance assessments. ETA contracting and program officials are required to evaluate contractor performance annually and record the final assessment in the Contractor Performance Assessment Reporting System (CPARS). DOL, similar to other federal agencies, is required to use the system to document contractor performance. This system serves as a key source of information about the performance of Job Corps center contractors and includes ratings on their quality of service, management, and cost control. Based on our review of CPARS, we found that ETA completed annual contractor performance assessments during 2016- 2017 for all 10 Job Corps centers in our in-depth review. According to ETA’s guidance and program officials, these assessments can include information from regional monitoring visits and performance data on student outcomes and safety. Contract option years. Job Corps center contracts may be awarded for an initial term of no more than 2 years, with three 1-year options. For each option year, ETA has an opportunity to assess the contractor’s performance to determine whether to continue with the contract. ETA and regional officials said that they have typically exercised option years for Job Corps center contracts. However, in recent years, officials in one region said they have declined to exercise option years when questions are raised about a contractor’s performance. Officials said they are implementing provisions under WIOA that prohibit ETA from exercising an option year in a Job Corps center contract under certain circumstances. WIOA generally prohibits ETA from exercising an option year if, in the prior 2 program years, the center: (1) has been ranked in the lowest 10 percent of all Job Corps centers; and (2) did not achieve at least an average of 50 percent of its expected level of performance with respect to each primary performance indicator. ETA officials said that to date, every contractor has exceeded these minimum performance standards and, therefore, they have not had to decline an option year on these grounds. Formal notices to contractors. When ETA finds performance challenges, it may issue formal notices to contractors starting with a letter of concern to notify contractors of the deficiencies. If deficiencies are not addressed, a formal letter referred to as a cure notice may be sent to notify contractors that their failure to perform specific contract specifications may endanger the contract. If the contractor does not correct the condition, ETA may issue a notice (referred to as a “show cause”) informing the contractor that it intends to terminate the contract for default. DOL has indicated that it will terminate a contract for default if the contractor fails to satisfactorily address any serious performance challenges identified. None of the center contractors included in our in-depth review received a cure notice or a show cause notice from ETA during program year 2016. However, we found that ETA issued letters of concern to two center contractors in our in- depth review after it identified issues related to safety and student conduct. The letters of concern required the contractor to submit a corrective action plan and explain how it would address the areas of non-compliance identified by ETA, such as the presence of controlled substances at one of the centers. In the cost-reimbursement contracts for the 10 centers we reviewed, ETA generally included various incentive fees to encourage contractors to meet or exceed specific targets or technical goals, such as those for student achievement. Specifically, contracts for seven centers in our in- depth review included the following fees: Technical performance incentive fee. This fee is payable based on the contractor’s performance on specific outcome measures established by ETA, such as the number of students obtaining a high school diploma or high school equivalency. These fees varied but were up to 2.4 percent. One of the 10 contracts we reviewed received slightly over half of the incentive fee they were eligible to earn. Technical performance excellence bonus. This bonus is payable to top performing center contractors that exceed Job Corps’ national performance targets. Contractors can earn this bonus on top of the technical performance fee that they are eligible to earn. These fees varied but were up to 0.6 percent. While all of the contracts we reviewed included this provision for program years 2016 and 2017, we found that only one of the contractors received it. Cost incentive fee. This fee is payable based on the contractor’s efforts to meet the government’s needs within the estimated cost of the contract. Contractors can earn higher fees by completing the work at a lower cost. The fees received varied from 3 percent to 4 percent. For example, in program year 2017, contracts for four of the centers we reviewed included cost incentive fees. Two contractors received the maximum fee of 4 percent, while the other two contractors received a fee of at least 3 percent, according to the fee information provided by ETA. For bridge contracts, ETA officials said that they did not include incentive fees, given the intended short-term nature of these contracts. Instead, they said they included fixed fees, which do not vary based on actual costs or performance. In our in-depth review, we found that seven centers that had noncompetitive bridge contracts in program years 2016 or 2017 included only fixed fees that were paid regardless of contractor performance. While each contract we reviewed included estimates of how much a contractor might earn in technical incentive fees, the final amount paid by ETA was determined by whether the contractor met or exceeded Job Corps’ national center performance targets, which ETA shares with the Job Corps community. ETA officials noted that performance targets can vary from year to year based on the national goals of the program. As a result, they said a contractor with the same performance in two years, as measured by ETA performance targets, may qualify for a technical incentive fee in one year but not in another. Contracting and program officials at the national and regional levels with contract oversight responsibilities reported having limited or no insight into how contractors earn incentive fees to operate Job Corps centers, despite the critical role these fees can play in motivating contractor performance. During our interviews, program and contracting officials said they were unaware of how the final fee amounts were calculated, and noted that ETA’s Office of Financial Administration is currently responsible for making these determinations. In particular, some contracting officials said that they simply execute the contract actions calculated and approved by ETA’s Office of Financial Administration. Because of their limited insight, some program officials said that it is difficult for them to address questions from contractors about how fees are calculated. National officials from ETA’s Office of Financial Administration expressed concern and said they were somewhat surprised that program and contracting officials told us that they were unaware of how contractor fees were determined and calculated. ETA officials said that budget analysts currently perform the fee calculations in a worksheet, which is later reviewed by their supervisor, and that ETA officials expected program and contracting officials to be familiar with the process. Officials from the Office of Financial Administration provided the fee calculations for the centers in our in-depth review, and noted that Job Corps’ Policy and Requirements Handbook includes some publicly-available information about fee calculations. However, at the time of our review, the Office of Financial Administration had not developed an internal documented process to share information about its fee calculations on specific Job Corps center evaluations with program and contracting officials. Further, in one region, program officials monitoring contractors described what they see as a potential disconnect between the incentive fees paid to a Job Corps center contractor and the contractor’s performance assessment. In this case, two contractors were paid an incentive fee for meeting performance targets, and received a “marginal” rating on an annual performance assessment, according to the program official monitoring the contractors. Without a coordinated and documented process, program and contracting officials may continue to have a limited awareness of how incentive fees are earned by contractors. In 2009, OFPP developed guidance that states incentive strategies should be developed through close collaboration among the contracting officer, program officials, and other key staff. Further, federal internal control standards state that agency leadership should document operational processes in policies, and communicate these policies to key personnel so that they can implement their assigned responsibilities. The questions raised by program and contracting officials in our discussions about how Job Corps contracts’ incentive fees are structured and related to certain outcomes increases the risk that ETA, including its contracting and program officials, will miss opportunities to maximize the use of incentives to help monitor and improve the performance of center contractors. Contracts are key means through which ETA secures operators for Job Corps centers across the country and delivers comprehensive services to Job Corps students. ETA has implemented some strategies to address the contracting challenges that led to the widespread use of bridge contracts during program year 2016. While bridge contracts can be a useful tool to ensure that there is no lapse in services provided to Job Corps students, our work has found that when noncompetitive bridge contracts are used frequently or for prolonged periods of time, the government is at risk of paying more than it should for products and services. Further, ongoing acquisition planning and workforce challenges, which our work has found are associated with the use of bridge contracts, could pose risks to its ability to manage and award future Job Corps contracts in a way that avoids a reliance on bridge contracts in the future. Further, ETA’s efforts to reduce its reliance on bridge contracts in program year 2016—a step in the right direction—may result in an unintended consequence later down the road. Specifically, we project that more than half of the recently awarded competitive contracts may expire and services will need to be re-solicited in program years 2021 and 2022. A comprehensive strategy that accounts for Job Corps’ current and future workload could help ETA better anticipate its workforce needs in critical positions, and thereby helping to reduce its risk of relying on bridge contracts in the future. In the absence of such a strategy, ETA is likely to be back in the same position it was 3 years ago, when more than two- thirds of its Job Corps centers were operating under some form of bridge contract. ETA used various monitoring and contracting tools, including incentive fees, to encourage Job Corps center contractors to meet or exceed performance outcomes. However, contracting and program officials we spoke with were not aware of how these incentive fees had been calculated and paid. Additionally, ETA’s Office of Financial Administration had no documented process for sharing information with ETA’s program and contracting officials about the calculation and payment of these fees or how a contractor’s performance impacted these fees. In the absence of a coordinated and documented process, program and contracting officials may lack key information regarding contractor performance. We are making the following two recommendations to ETA: The Assistant Secretary of ETA should develop, document, and implement a comprehensive strategy that (1) accounts for Job Corps’ projected workload requirements and (2) considers its acquisition workforce needs—including the number of staff, skills, and other supports necessary to plan, award, and monitor Job Corps center contracts—to enable it to effectively plan for and competitively award future Job Corps center contracts. (Recommendation 1) The Assistant Secretary of ETA should develop a coordinated and documented internal process to share relevant information on incentive fees paid to contractors with staff in its key offices. (Recommendation 2) We provided a draft of this report to DOL for its review and comment. We received written comments from DOL, which are reprinted in appendix IV. In addition, DOL provided technical comments which we incorporated as appropriate. DOL concurred with our two recommendations. DOL stated that it will develop, document, and implement a comprehensive strategy that accounts for Job Corps’ projected workload requirements and considers its acquisition workforce needs. DOL noted that it has released a new procurement plan which reflects its decision to re-procure 28 Job Corps centers prior to the final option year of their contract. DOL said that this action would result in each region having no more than five procurements each year, which it considers a manageable procurement workload for its current staffing level. DOL also stated that it would develop a written process for determining and awarding incentive fees to Job Corps contractors. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees and the Secretary of Labor. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Cindy S. Brown Barnes at (202) 512-7215 or brownbarnesc@gao.gov, or Timothy J. DiNapoli at (202) 512-4841 or dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report examines (1) the extent to which, and why, the Employment and Training Administration (ETA) used bridge contracts to operate Job Corps centers during program year 2016; (2) the strategies ETA used to decrease its use of noncompetitive bridge contracts; and (3) how ETA monitored contractor performance at selected Job Corps centers. To address these three objectives, we used several data collection methods, which are described in greater detail below. These methods include analyzing data from the Federal Procurement Data System-Next Generation (FPDS-NG), conducting a nongeneralizable review of 10 Job Corps centers that operated under bridge or noncompetitive contracts, and conducting interviews with ETA regional and national officials. In addition, we reviewed relevant federal laws and regulations, and agency policies and procedures such as Job Corps’ Policy and Requirements Handbook, the Acquisition Handbook for Job Corps Regional Contracts, and other information ETA provided related to incentive fees and the number of staff vacancies and protests filed in program years 2012 to 2016. We also reviewed ETA’s evaluations of contractor performance, and past GAO reports on the use of bridge and noncompetitive contracts, and the evaluation of contractor performance. To identify the extent to which ETA used bridge contracts to operate Job Corps centers, we analyzed FPDS-NG data for center contracts that were in effect—that is, contracts that were newly awarded or ongoing—in program year 2016. We selected this program year because it reflected the most recent year with complete available data at the time we began our review. We did not review data for centers operated by the U.S. Department of Agriculture (USDA) because they are operated through an interagency agreement between DOL and USDA and are therefore not relevant for the purpose of this review. We also used FPDS-NG data to identify centers that appeared to have operated under bridge contracts at some point during program year 2016. Since there is no government-wide definition for bridge contracts and ETA does not have a documented definition, we used GAO’s definition that has defined them as an extension to an existing contract beyond the period of performance (including base and option years), or a short-term stand-alone contract awarded to an incumbent contractor to avoid a lapse in service. We acknowledge that in the absence of a government-wide definition, agencies may have differing views of what constitutes a bridge contract. Contracts and extensions (both competitive and non-competitive) are included in GAO’s definition for bridge contracts. While ETA does not consider contracts that exercise the “Option to Extend Services” under Federal Acquisition Regulation (FAR) 52.217-8 to be bridge contracts, we include these contracts because our definition is focused on the intent of the contracts or extensions—that is, whether they serve as a mechanism to “bridge services” until the next follow-on contract can be competitively awarded. Based on our definition, we identified 68 centers that operated under bridge contracts in program year 2016. We verified our contract selections with ETA officials to ensure we identified all centers contracts that were in effect—that is, contracts that were newly awarded or ongoing—in program year 2016. We also reviewed relevant contracting documentation, such as justification and approval documents for noncompetitive contracts and contract modifications. To calculate the length of time ETA used bridge contracts to operate Job Corp centers, we included those centers that had a bridge contract at some point during program year 2016. We report the length of time that ETA used bridge contracts to operate Job Corps centers as the minimum amount of time these contracts were in use. We did not review bridge contracts that were completed prior to program year 2016 because it was outside the scope of our review. Therefore, our analysis may underestimate the length of time ETA operated some centers under bridge contracts. Based on our electronic testing, review of contract files and documentation, and discussions with ETA officials, we determined that the data were sufficiently reliable for the purposes of assessing ETA’s use of bridge contracts for Job Corps center operations, and the characteristics of these contracts. To estimate upcoming center procurements from program years 2019 to 2023, we used FPDS-NG data and information from agency officials to determine when the period of performance might end for certain center contracts. In this analysis, we excluded centers that were still operating under noncompetitive bridge contracts, operating under task orders, or were no longer open. Competitively awarded Job Corps center contracts generally have periods of performance that total a maximum of 5 years, which includes a 2-year base and three 1-year options. GAO’s analysis accounts for this complete period of performance; however, if all three option years are not exercised, the center would need a new contract sooner. To identify the strategies that ETA used to decrease its use of noncompetitive bridge contracts, we reviewed FPDS-NG data to identify the number of the bridge contracts ETA used in program year 2016 that transitioned to competitive follow-on contracts by the end of program year 2017. We also reviewed agency guidance and contracting documentation, and followed up with ETA contracting and program officials at the national and regional levels to verify our contract selections. We conducted a nongeneralizable in-depth review of 10 Job Corps centers that operated under bridge or noncompetitive contracts during program year 2016 to provide illustrative examples. The 10 centers we selected were Alaska, Carville, Cassadaga, Keystone, Milwaukee, Northlands, Paul Simon, Pinellas, Turner, and Woodland. We selected these 10 centers because (1) they were operated by contractors with varying levels of success in achieving ETA’s student performance indicators, according to ETA’s performance data, and (2) to ensure we included at least one center from each of Job Corps’ six regions. Specifically, we selected 6 of the 10 Job Corps centers because they were generally the lowest performing contract center in their region based on ETA’s performance data from program year 2015. We reviewed performance data for this program year because it allowed us to identify the actions, if any, ETA took to help improve low performing centers in program years 2016 and 2017. The other four Job Corps centers were randomly selected from the remaining Job Corps centers, which reflected a mix of center performance levels. We excluded from our selection centers that were not operational or were closed in program years 2016 or 2017, operated under a task order, or that had an open protest as of June 30, 2018. In addition, we excluded centers with a competitive, non- bridge contract, and centers operated by the U.S. Department of Agriculture. After selecting the 10 centers, we reviewed the contract file for all bridge contracts, the contract preceding the bridge contracts, and, if awarded by the time of our review, the competitive follow-on contract. We also interviewed contracting and program officials to understand the reasons why ETA used bridge contracts and any challenges related to their use. In addition, we obtained and reviewed ETA’s evaluations of contractor performance from the Contractor Performance Assessment Reporting System (CPARS) for these centers to understand how ETA monitored contractor performance. We also examined other information related to incentive fees paid to contractors for the 10 centers in our in-depth review. The results of our in-depth review provide insight into ETA’s contracting practices for Job Corps center operations contracts but cannot be generalized to all Job Corps centers. We conducted site visits to three of Job Corps’ six regional offices: Atlanta, Boston and Dallas. We selected these offices to capture the regions that awarded a large number of bridge or noncompetitive contracts, and to reflect both geographic diversity and a mix of contractor performance. For the remaining three regions—Chicago, Philadelphia, and San Francisco—we conducted phone interviews. For each regional visit or call, we interviewed program officials in the Office of Job Corps, including the regional director and program managers (who may serve as contracting officer representatives). In addition, we interviewed regional contracting officials in the Office of Contracts Management, including the regional contracting officer and contract specialists who support the contracting officer in carrying out their responsibilities. Additionally, we interviewed national officials in ETA’s Office of Job Corps and Office of Contracts Management to better understand ETA’s process for awarding and monitoring Job Corps center contracts at the national level. We also interviewed budget officials in ETA’s Office of Financial Administration to better understand how incentive fees are calculated and paid to contractors. We conducted this performance audit from February 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In January 2015, ETA national and regional officials implemented a national risk-based monitoring strategy to identify emerging problems at Job Corps centers, including those operated by contractors. We reported on this strategy as part of our prior work. Table 2 provides a summary of ETA’s monitoring strategy. In addition to the contact named above, Mary Crenshaw (Assistant Director), Janet McKelvey (Assistant Director), Ashanta Williams (Analyst- in-Charge), Anna Blasco, LaToya Jeanita King, Matthew Saradjian, Lindsay Taylor, Tomás Wind, and Jocelyn Yin made key contributions to this report. Additional assistance was provided by Sandra Baxter, James Bennett, Sarah Cornetto, Caitlin Croake, Andrea Dawson, David Forgosh, Lauren Gilbertson, Kurt Gurka, Julia Kennon, Sheila R. McCoy, Corinna Nicolaou, Monica Savoy, Ben Sinoff, Kathleen van Gelder, Almeta Spencer, Walter Vance, and Alyssa Weir. Information Technology: Agencies Need Better Information on the Use of Noncompetitive and Bridge Contracts. GAO-19-63. Washington, D.C.: December 11, 2018. Job Corps: DOL Could Enhance Safety and Security at Centers with Consistent Monitoring and Comprehensive Planning. GAO-18-482. Washington, D.C.: June 15, 2018. Defense Contracting: Use by the Department of Defense of Indefinite- Delivery Contracts from Fiscal Years 2015 through 2017. GAO-18-412R. Washington, D.C.: May 10, 2018. New Trauma Care System: DOD Should Fully Incorporate Leading Practices into Its Planning for Effective Implementation. GAO-18-300. Washington, D.C.: March 19, 2018. Defense Contracting: DOD Needs Better Information on Incentive Outcomes. GAO-17-291. Washington, D.C.: July 11, 2017. Job Corps: Preliminary Observations on Student Safety and Security Data. GAO-17-596T. Washington, D.C.: June 22, 2017. Federal Contracts: Agencies Widely Used Indefinite Contracts to Provide Flexibility to Meet Mission Needs. GAO-17-329. Washington, D.C.: April 13, 2017. Elections: DOD Needs More Comprehensive Planning to Address Military and Overseas Absentee Voting Challenges. GAO-16-378. Washington, D.C.: April 20, 2016. Defense Acquisition Workforce: Actions Needed to Guide Planning Efforts and Improve Workforce Capability. GAO-16-80. Washington, D.C.: December 14, 2015. Sole Source Contracting: Defining and Tracking Bridge Contracts Would Help Agencies Manage Their Use. GAO-16-15. Washington, D.C.: October 14, 2015. Federal Construction Subcontracting: Insight into Subcontractor Selection Is Limited, but Agencies Use Oversight Tools to Monitor Performance. GAO-15-230. Washington, D.C.: January 29, 2015. Job Corps: Assessment of Internal Guidance Could Improve Communications with Contractors. GAO-15-93. Washington, D.C.: January 22, 2015. Standards for Internal Control in the Federal Government. GAO-14-704G. Washington, D.C.: September 2014. Market Research: Better Documentation Needed to Inform Future Procurements at Selected Agencies. GAO-15-8: Washington, D.C.: October 9, 2014. Contractor Performance: Actions Taken to Improve Reporting of Past Performance Information. GAO-14-707. Washington, D.C.: August 7, 2014. Federal Contracting: Noncompetitive Contracts Based on Urgency Need Additional Oversight. GAO-14-304: Washington, D.C.: March 26, 2014. Acquisition Workforce: Federal Agencies Obtain Training to Meet Requirements but Have Limited Insight into Costs and Benefits of Training Investment. GAO-13-231. Washington, D.C.: March 28, 2013. Defense Contracting: Competition for Services and Recent Initiatives to Increase Competitive Procurements. GAO-12-384. Washington, D.C.: March 15, 2012. Acquisition Planning: Opportunities to Build Strong Foundations for Better Service Contracts, GAO-11-672. Washington, D.C.: August 9, 2011. Federal Contractors: Better Performance Information Needed to Support Agency Contract Award Decisions. GAO-09-374. Washington, D.C.: April 23, 2009. 2010 Census: Census Bureau generally Follows Selected Leading Acquisition Planning Practices, but Continued Management Attention is Needed to Help Ensure Success. GAO-06-277. Washington, D.C.: May 18, 2006. Defense Acquisitions: DOD Has Paid Billions in Award and Incentive Fees Regardless of Acquisition Outcomes, GAO-06-66. Washington, D.C.: December 19, 2005. Human Capital: Framework for Assessing the Acquisition Function at Federal Agencies. GAO-05-218G. Washington, D.C.: September 2005. Human Capital: Key Principles for Effective Strategic Workforce Planning. GAO-04-39. Washington, D.C.: December 11, 2003.", "summary": "Job Corps' 119 centers, which are operated primarily by contractors, provide an array of services to help low-income youth find a job, go to college, or enter the military. ETA is generally required to award competitive contracts, but can award noncompetitive contracts in certain instances. Some noncompetitive contracts act as bridge contracts—which can be a useful tool to avoid a lapse in service but, when used frequently and for prolonged periods, can increase the risk of the government overpaying for services. This report examines (1) the extent to which ETA used bridge contracts to operate Job Corps centers in program year 2016; (2) strategies ETA used to decrease the use of noncompetitive bridge contracts; and (3) how ETA monitored contractor performance at selected Job Corps centers. GAO analyzed data from program years 2016 and 2017(the most current data available at the time we began our review) from the Federal Procurement Data System-Next Generation, and reviewed contract documents. GAO also conducted an in-depth review of 10 centers that reflected a mix of contractor performances and at least one center from Job Corps' six regions, and interviewed ETA officials. In program year 2016, the Department of Labor's (DOL) Employment and Training Administration (ETA) operated 68 of its 97 Job Corps centers using bridge contracts. GAO has generally defined a bridge contract as an extension to an existing contract or a new noncompetitive contract awarded to the current contractor to avoid a lapse in service. GAO found that ETA operated most of these Job Corps centers (49 of 68) under bridge contracts for at least a year, with over a third operating under bridges for 2 years or potentially longer. ETA cited workforce challenges such as staff vacancies and the need to address issues raised in protests as contributing to its use of bridge contracts. ETA officials said they used various strategies to decrease their use of noncompetitive bridge contracts, including prioritizing efforts to award more contracts competitively. By the end of program year 2017, most of the centers operating under bridge contracts during program year 2016 (48 of 68) had transitioned to competitive contracts. Despite these efforts, ETA continues to face workforce challenges. Contracting officials expressed concern about having sufficient staff to award a large group of contracts that will begin to expire in program years 2021 and 2022 (see figure). ETA officials said it takes about 8 to 12 months from solicitation to contract award for new 5-year competitive procurements. Therefore, acquisition planning for a center contract set to expire in January 2021 would usually need to begin early 2020. However, ETA does not have a comprehensive workforce strategy to address its workforce challenges or support these new contract awards. As a result, ETA risks relying on noncompetitive bridge contracts again in the future. Note: Centers are operated on a program year basis, which runs from July 1 of a given year to June 30 of the following year. ETA used various strategies to monitor and incentivize contractor performance at the 10 centers GAO reviewed, including conducting onsite visits to Job Corps centers and paying incentive fees to contractors. However, contracting and program officials GAO interviewed had limited or no insight into how ETA calculates and pays incentive fees. Without coordinating and documenting the process for calculating incentive fees, ETA's program and contract officials may lack key information regarding contractor performance. GAO is making two recommendations, including that ETA develop (1) a comprehensive strategy to account for workforce needs and future center contracts, and (2) a coordinated and documented process for sharing information on incentive fees paid to contractors. DOL agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Enrollment is generally the first step veterans take to obtain health care services, within VA or through community care. VA’s Health Eligibility Center manages the process of accepting applications, verifying eligibility, and determining enrollment, in collaboration with VA medical centers. VA requires veterans’ enrollment applications be processed within 5 business days of receipt, including pending applications that require additional information from the applicant to process. Once enrolled, veterans can access VA health services by scheduling an appointment. VA’s scheduling policy establishes the procedures for scheduling medical appointments, as well as sets the requirements for staff directly or indirectly involved in the scheduling process (e.g., training). A scheduler at the VA medical facility is responsible for making appointments for new and established patients (i.e., patients who have visited the same VA medical center in the previous 24 months), which are then recorded in VA’s electronic scheduling system. VA scheduling policy requires patients who have requested an appointment and have not had one scheduled within 90 days to be placed on VA’s electronic wait list. VA determines wait times at each facility based on outpatient appointment information from its scheduling system. VA is required to publish information on appointment wait times at each VA medical facility for primary care, specialty care, and hospital care and medical services, which it does through two public websites. In November 2014, VA began posting monthly wait times for scheduling appointments at all VA medical facilities. One public website provides links to spreadsheets containing data for each VA medical facility, such as the average wait times for primary, specialty, and mental health care appointments and the number of patients on the electronic wait list. In April 2017, VA created a second public “Access and Quality in VA Healthcare” website to post both patient access data and information on VA medical facilities’ performance on various quality metrics. This website aims to help veterans find wait times at a specific facility. This information would allow veterans and their family members to use the wait-time data on this website to determine the best option for obtaining timely care. In order to receive needed care in a timely manner, veterans may need to obtain care outside of VA medical facilities through one of VA’s community care programs. VA has purchased health care services from community providers through various community care programs since 1945. Veterans may be eligible for community care when they are faced with long wait times or travel long distances for appointments at VA medical facilities, or when a VA facility is unable to provide certain specialty care services. Since 2014, Congress has taken steps to expand the availability of community care for veterans. The Veterans Access, Choice, and Accountability Act of 2014 provided up to $10 billion in funding for veterans to obtain health care services from community providers. The law established a temporary program—called the Veterans Choice Program (Choice Program)—to offer veterans the option to receive hospital care and medical services from a community provider when a VA medical facility could not provide an appointment within 30 days, or when veterans resided more than 40 miles from the nearest VA facility or faced other travel burdens. VA contracted with two third-party administrators (TPA) to establish networks of community providers, schedule veteran appointments with those providers, and pay those providers for services rendered through the Choice Program. In June 2018, the VA MISSION Act of 2018 was enacted to further address some of the challenges faced by VA in ensuring timely access to care. The Act required VA to implement within 1 year a permanent community care program—the Veterans Community Care Program (VCCP). The act identified criteria that all veterans enrolled in the VA health care system would be able to qualify for care through the VCCP; for example, if VA does not offer the care or service needed by the veteran or VA cannot provide the veteran with care and services that comply with its designated access standards. The access standards include appointment wait times for a specific VA medical facility; for example, veterans may be eligible for care through the VCCP if VA cannot provide care within 20 days for primary and mental health care, and 28 days from the date of request for specialty care, unless veterans agree to a later date in consultation with their VA health care provider. VA has taken a number of actions to address our recommendations regarding deficiencies we found in wait-time measurement and implementation of its scheduling policy. For wait-time measurement, these actions included changes to the wait-time measurement definitions, provision and documentation of scheduler training, and improved oversight through audits, all of which have been in a state of flux for the past 6 years. On July 12, 2019, VA provided us additional updates on efforts to implement our related recommendations. This new information fully addresses one of our recommendations. In December 2012, we found that outpatient medical appointment wait times reported by VA were unreliable, and, therefore, VA was unable to identify areas that needed improvement or mitigate problems for veterans attempting to access care. VA typically has measured wait times as the time elapsed between the ‘start date’—a defined date that indicates the beginning of the measurement—and the ‘end date’, which is the date of the appointment. At the time of our 2012 report, VA measured wait times as the number of days elapsed from the start date identified as the desired date—the date on which the patient or health care provider wants the patient to be seen—to the date of the appointment. We found that the reliability of the reported wait-time measures was dependent on the consistency with which schedulers recorded the desired date in the scheduling system, as required by VA’s scheduling policy. However, VA’s scheduling policy and training documents for recording the desired date were unclear and did not ensure consistency. We observed that not all schedulers at VA medical centers that we visited recorded the desired date correctly. Therefore, we recommended that VA either clarify its scheduling policy to better define the desired date, or identify clearer wait- time measures that are not subject to interpretation and prone to scheduler error. VA concurred with the recommendation, which we have identified as among those recommendations that warrant priority attention. Actions VA has taken or is taking to address this recommendation include: changes to the start date and definitions for wait-time measurement, provision and documentation of scheduler training, and improved oversight through scheduler audits. In addition, we are currently assessing new information VA provided in July 2019, which will include obtaining additional evidence and clarification from VA to see whether it has fully addressed our concerns. VA’s Actions to Change Start Dates for Wait-Time Measurement While the terminology for the start dates of the wait-time measurement has changed several times over the past 6 years, we believe that the current definitions of the start dates are substantively the same as those we reviewed—and found to be deficient—in our 2012 report. VA subsequently introduced new terms with similar definitions—from “desired date” to “preferred date”—without fundamentally addressing the deficiency. See table 1 for the changes to and definitions of the start dates for measuring outpatient appointment wait times and wait-time goals since June 2010. As table 1 shows, for new patients and established patients seeking appointments without a return-to-clinic date specified by their provider, VA changed the terminology of the start date to preferred date in its July 2016 scheduling policy from what it had established in its June 2010 policy. However, the definition of preferred date is substantively the same as the definition of desired date in the previous scheduling policy, the latter of which we found to be subject to interpretation and prone to scheduler error in our 2012 report. We continue to believe that the preferred date is also subject to interpretation and prone to scheduler error, which poses concerns for the reliability of wait times measured using the patient’s preferred date. In its updated July 2016 scheduling policy, VA also changed the terminology of the start date to the “clinically indicated date” for established patients whose provider has documented a clinically appropriate return-to-clinic date in the patient’s electronic health record. The clinically indicated date is substantively the same as the definition of desired date for established patients in the previous scheduling directive. While VA has not clarified the definitions of start dates, VA has taken actions intended to improve the accurate recording of the clinically indicated date in three ways: 1. VA requires clinical leadership (such as the Associate Chief of Staff) at each VA medical facility to ensure that providers enter the clinically indicated date in the electronic health record for future appointments; 2. VA standardized the entry of the clinically indicated date in the electronic health record to improve the accuracy of the date, which was implemented across all VA medical facilities as of July 2018; and 3. VA created a technology enhancement to enable the automatic transfer of the clinically indicated date from the electronic health record to the scheduling system. As a result, the scheduler no longer has to retrieve the date from veterans’ electronic health records and manually enter it into the scheduling system. VA reported that this enhancement was implemented at all but three VA medical facilities as of January 2019. In July 2019, VA reported to us that the error rate for the patient indicated date (either the clinically indicated date, or in the absence of that date, the patient’s preferred date) was 8 percent of about 667,000 appointments audited in the most recent biannual audit cycle, ending March 31, 2019. VA cites an almost 18 percent improvement in reducing the number of errors caused by manual entry of the clinically indicated date due to the use of the technology enhancements. VA’s Actions to Provide and Document Scheduler Training Although VA updated its scheduling policy in 2016, we believe the instructions, which form the basis for wait-time measurement, are still subject to interpretation and prone to scheduler error, making training and oversight vital to the consistent and accurate implementation of the policy. VA reported that 97 percent of all staff who scheduled an appointment within 30 days completed the required scheduling training as of July 2, 2019. VA stated that the department will closely monitor compliance with scheduler training completion for the remaining staff. Given the high turnover among schedulers, it is important that VA remain vigilant about scheduler training, ensuring all who need it receive it. VA’s Actions to Improve Oversight through Scheduler Audits VA has taken a number of actions to improve oversight of the scheduling process through biannual scheduling audits at VA medical centers and second level audits, as well as completion of the first system-wide internal audit of scheduling and wait-time data. Biannual scheduler audits. VA’s July 2016 scheduling policy required biannual audits of the timeliness and appropriateness of schedulers’ actions and accuracy of entry of the clinically indicated date and preferred date, the start dates of wait-time measurement as identified by the revised scheduling policy. In June 2017, VA deployed a standardized scheduling audit process for staff at VA medical centers to use. As part of our recommendation follow-up in July 2019, VA reported 100 percent completion of the required biannual scheduling audits in fiscal year 2018. As noted above, VA reported to us that the error rate for the patient indicated date (either the clinically indicated date, or in the absence of that date, the patient’s preferred date) was 8 percent of about 667,000 appointments audited. While VA asserts that errors in the clinically indicated date have decreased, an error rate of 8 percent still yields errors in more than 53,000 appointments audited. Given these errors, we remain concerned about the reliability of wait times measured using preferred date (one part of the patient indicated date), and have requested additional information from VA about these errors. Second level scheduler audits. In November 2018, VA implemented a second-level scheduling audit (Audit the Auditors program), which is overseen by the VA integrated service networks tasked with oversight of VA medical facilities within their regions. Each medical center within a network region is paired with another medical center and they audit each other’s scheduling audit. Throughout the cycle, medical centers share their findings with each other and the network. The goal is to standardize scheduling audit practices across the network and to ensure reliability of the scheduler audit results. According to VA, the first cycle was completed April 30, 2019, by all VA medical centers. First internal system-wide audit of wait-time data and scheduling. In its first internal audit completed in August 2018, VA was unable to evaluate the accuracy and reliability of scheduling and the wait-time data. Specifically, VA was unable to determine the accuracy and reliability of the scheduling and wait-time data, databases, and data flow from the electronic health record and scheduling system to the VA Access and Quality website because they were not able to obtain the rules for calculating wait times. Given our continued concerns about VA’s ability to ensure the reliability of the wait-time data, we plan to obtain additional information from VA about its methodology and assessment of evidence underlying the audit findings. In December 2012, we also found inconsistent implementation of VA’s scheduling policy that impeded VA medical centers’ scheduling of timely medical appointments. Specifically, we found that not all of the clinics across the medical centers we visited used the electronic wait list to track new patients that needed medical appointments as required by VA’s scheduling policy, putting these patients at risk of being lost for appointment scheduling. Furthermore, VA medical centers’ oversight of compliance with VA’s scheduling policy, such as ensuring the completion of required scheduler training, was inconsistent across facilities. Scheduler training was particularly important given the high volume of staff with access to the scheduling system—as of July 2, 2019, VA reported there were approximately 33,000 staff that had scheduled an appointment within the last 30 days. We also found that VA medical centers identified the outdated and inefficient scheduling system as one of the problems that can impede the timely scheduling of appointments and may impact their compliance with VA’s scheduling policy. We recommended VA ensure that VA medical centers consistently and accurately implement VA’s scheduling policy, including use of the electronic wait list, as well as ensuring that all staff with access to the scheduling system completes the required training. VA concurred with this recommendation, which we also have identified as among those recommendations that warrant priority attention. VA’s actions to improve implementation of the scheduling policy, including updated information VA provided in July 2019, fully addresses this recommendation. VA issued an updated scheduling policy in July 2016 that provided clarification on scheduling roles and responsibilities for implementing the policy and business rules for scheduling appointments, such as using the electronic wait list, and required biannual scheduler audits. VA also ensured almost all schedulers received training on the updated scheduling policy and improved oversight through audits, as previously described. In addition, VA plans to rapidly deploy a single nationwide scheduling system that is intended to simplify the operating environment for schedulers and may mitigate challenges identified in our 2012 report. The new scheduling system will be a resource-based system where each provider’s schedule is visible on one screen, instead of requiring the need to toggle through multiple screens as it currently exists. VA plans to roll out the new scheduling system starting in 2020, which is expected to be implemented in coordination with the planned modernization of the electronic health records system across VA facilities. According to VA, the scheduling system will be available for use in advance of the completion of the electronic health record implementation at some sites. In addition to the recommendations we made to improve VA’s wait-time data and implementation of its scheduling policy, we have also made recommendations to address other factors that affect the timeliness by which veterans obtain appointments. These recommendations have targeted VA’s enrollment processes and its management of veterans’ initial requests for care. While VA has taken some steps to address these recommendations, they have not yet been fully addressed. For example, we have found that VA’s wait-time measures do not yet capture the time it takes the agency to enroll veterans in VA health care benefits, or manage a veterans’ initial request for care. In September 2017, we found that VA did not provide its medical centers, who historically receive 90 percent of enrollment applications, with clear guidance on how to resolve pending applications, which led to delays in veteran’s enrollment. For example, we found instances in which pending applications remained unresolved for more than 3 months. We concluded these delays in resolving pending applications, along with previously documented delays due to errors in enrollment determinations, may result in veterans facing delays when obtaining health care services or incorrectly denied benefits. We made several recommendations to address these deficiencies, two of which we determined to be priority recommendations for VA to clearly define roles and responsibilities for (1) resolving pending applications and (2) overseeing the enrollment process. VA has made progress in addressing these priority recommendations by beginning to update, but not yet finalizing, its policies, procedures, and guidance on enrollment processing. In 2017, VA’s Health Eligibility Center began conducting secondary reviews of enrollment determinations. However, in fiscal year 2018, Health Eligibility Center staff found that 18 percent of rejected enrollment determinations and 8 percent of ineligible enrollment determinations that underwent secondary reviews were incorrect. These recommendations remain unimplemented as of July 2019. Once enrolled, we have found that VA’s management of veterans’ initial request for care have led to delays; and although VA has clarified timeliness requirements, it has yet to fully capture the wait veterans experience in scheduling initial appointments. In a number of reports from 2015 to 2018, we found instances in which newly enrolled veterans were not contacted to schedule initial primary care appointments, and did not complete initial primary care appointments and mental health evaluations according to VA timeliness requirements. These delays may be understated in VA data, because VA’s wait-time measures do not take into account the time it takes VA medical center staff to contact the veteran to determine a preferred date (the starting point for wait-time measurement) from the veteran’s initial request or referral. We found that the total amount of time it took for veterans to be seen by providers was often much longer when measured from the dates veterans initially requested to be contacted to schedule an appointment or were referred for an appointment by another provider than when using the veterans’ preferred dates as the starting point. See figure 1 for an example of how the two wait-time calculations differ for an initial primary care appointment. We made several recommendations to VA, including a priority recommendation to monitor the full amount of time newly enrolled veterans wait to be seen by a provider. VA has taken several steps to address the priority recommendation, including revising an internal report to help identify and document newly enrolled veterans and monitor their appointment request status. The report is intended to help VA and its medical centers oversee the enrollment and appointment process by tracking the total time from application to appointment. However, VA is still in the process of enhancing its electronic enrollment system to capture the application date for all newly enrolled veterans. Until the enhancements are implemented, VA may not consistently capture the start date for newly enrolled veterans, which, in turn, affects the reliability of its wait-time data. The priority recommendation remains unimplemented as of July 2019. VA has not implemented several of our recommendations related to the Choice Program that could impact veterans’ timely access to care under the VCCP. These recommendations address (1) establishing achievable community care wait-time goals and a scheduling process consistent with those goals, (2) collecting accurate and complete data to systematically monitor veteran community care wait times, and (3) other factors that could adversely affect veterans’ access to community care. VA has begun taking steps to address these recommendations as it implements the VCCP. Our review of the Choice Program in June 2018 found that despite having a wait-time goal, VA developed a scheduling process for the Choice Program that was not consistent with achieving that goal. The Veterans Access, Choice, and Accountability Act of 2014 required VA to ensure the provision of care to eligible veterans within 30 days of the clinically indicated date or, if none existed, within 30 days of the veteran’s preferred date. However, we found that those veterans who were referred to the Choice Program for routine care because services were not available at VA in a timely manner could potentially wait up to 70 calendar days for care. Under VA’s scheduling processes, this potential wait time included VA medical centers having at least 18 calendar days to prepare veterans’ Choice Program referrals to TPAs and another 52 calendar days for appointments to occur as scheduled by TPAs. Based on this finding, we recommended that VA establish an achievable wait-time goal for the VCCP that will permit VA to monitor whether veterans are receiving community care within time frames that are comparable to the amount of time they would otherwise wait to receive care at VA medical facilities. We also recommended that VA should design an appointment scheduling process for the VCCP that sets forth time frames within which (1) veterans’ referrals must be processed, (2) veterans’ appointments must be scheduled, and (3) veterans’ appointments must occur that are consistent with the wait-time goal VA has established for the program. VA agreed with both recommendations, which remain unimplemented, and officials stated that they are in the process of finalizing metrics to capture wait-time performance and designing an appointment scheduling process. Without specifying wait- time goals that are achievable, and without designing appointment scheduling processes that are consistent with those goals, VA lacks assurance that veterans are receiving care from community providers in a timely manner. In June 2018, we reported that VA could not systematically monitor wait times for veterans accessing care under the Choice Program due to incomplete and inaccurate data. Without complete and accurate data, VA was not able to determine whether the Choice Program was achieving its goals of (1) alleviating the wait times veterans experienced when seeking care at VA medical facilities, and (2) easing geographic burdens veterans may have faced when accessing care at VA medical facilities. We made three recommendations to address VA’s incomplete and inaccurate data related to the Choice Program, and VA is taking steps to implement two of those recommendations. We found that the data VA used to monitor the timeliness of Choice Program appointments captured only a portion of the total appointment scheduling process. Though VA had a 30-day wait-time goal to provide veterans with care under the Choice Program, VA’s timeliness data did not capture (1) the time VA medical centers took to prepare veterans’ referrals and send them to the TPAs, and (2) the time spent by TPAs in accepting the referrals and opting veterans into the Choice Program. For example, we found that it took VA medical center staff an average of 24 calendar days after the veteran’s need for care was identified to contact the veteran, compile relevant clinical information, and send the veteran’s referral to the TPAs. For those same authorizations, it took the TPAs an average of 14 calendar days to accept referrals and reach veterans to opt them into the Choice Program. In 2016, VA also conducted its own manual review of appointment scheduling times and found that wait times could be longer than the 30 days (see fig. 2). Specifically, out of a sample of about 5,000 Choice Program authorizations, VA analyzed (1) the timeliness with which VA medical centers sent referrals to the TPAs, and (2) veterans’ overall wait times for Choice Program care. VA’s analysis identified average review times when veterans were referred to the Choice Program to be greater- than-30-day wait time for an appointment at a VA medical facility. For example, for overall wait times (i.e., the time veterans’ need for care was identified until they attended initial Choice Program appointments), wait times ranged from 34 to 91 days across the 18 VA integrated service networks. The national average was 51 days. In September 2017, VA began implementing an interim solution to monitor overall wait times, but this solution relied on VA medical center staff consistently and accurately entering data on referrals, a process that is prone to error. In June 2018, we recommended that VA establish a mechanism to monitor the overall wait times under the VCCP. VA agreed with this recommendation, and stated that it is developing a monitoring mechanism that will be incorporated into a new system that will be fully implemented across all VA medical facilities by fiscal year 2021. We also reported that the clinically indicated dates included on referrals that VA medical centers sent to the TPAs, which are used to measure the timeliness of care, may not have been accurate, further limiting VA’s monitoring of veterans’ access to care. Our review of 196 Choice Program authorizations found that clinically indicated dates were sometimes changed by VA medical center staff before they were sent to the TPAs, which could mask veterans’ true wait times. We found that VA medical center staff entered later clinically indicated dates on referrals for about 23 percent of the 196 authorizations reviewed. We made two recommendations to improve the accuracy of the Choice Program data. For example, we recommended that VA establish a mechanism under the VCCP that prevents clinically indicated dates from being modified. VA agreed with our recommendation, and stated that a new system will interface with VA’s existing referral package to allow a VA clinician to enter in a clinically indicated date while restricting schedulers from making alterations to it. In June 2018, we also reported that numerous factors adversely affected veterans’ timely access to care through the Choice Program and could affect access under the VCCP. These factors included the following: (1) administrative burden caused by complexities of VA’s referral and appointment scheduling processes; (2) poor communication between VA and its medical facilities; and (3) inadequacies in the networks of community providers established by the TPAs, including an insufficient number, mix, or geographic distribution of community providers. VA has taken steps to help address these factors; however, none have been fully addressed. For example, to help address administrative burden and improve the process of coordinating veterans’ Choice Program care, VA established a secure e-mail system and a mechanism for TPAs and community providers to remotely access veterans’ VA electronic health records. However, these mechanisms only facilitate a one-way transfer of necessary information. They do not provide a means by which VA medical facilities or veterans can view the TPAs’ step-by-step progress in scheduling appointments or electronically receive medical documentation associated with Choice Program appointments. We made five recommendations to VA to address the factors that adversely affected veterans’ access to Choice Program care. VA agreed or agreed in principle with all five recommendations and has taken some steps in response to these recommendations. However, our recommendations remain unimplemented. On June 6, 2019, VA began implementing the VCCP, which created a consolidated community care program. Under the VCCP, VA began determining veteran eligibility based on designated access standards, such as wait-time goals of 20 days for primary and mental health care and 28 days for specialty care and other criteria identified in the MISSION Act. According to VA officials, the implementation of the VCCP also included the use of the new Decision Support Tool—a system that combines eligibility and other information to help veterans, with assistance from VA staff, decide whether to seek care in the community. VA officials previously identified the Decision Support Tool along with another new system—known as the Health Share Referral Management system—as key efforts in addressing many of our recommendations related to VA’s community care wait-time data and monitoring issues. VA expects the Health Share Referral Management system, which will manage community care referrals and authorizations as well as facilitate the exchange of health information between VA and community providers, to be fully implemented across all VA medical facilities in fiscal year 2021. We began work in May 2019 to review VA’s implementation of the VCCP, including how it will address issues such as appointment scheduling. In addition to the actions described above, VA has taken other steps to improve veterans’ access to care by, for example, offering veterans access to routine care without an appointment. We have ongoing work related to same-day services provided in VA primary care and mental health clinics. In order to improve access, VA implemented the same-day service initiative in 2016, and by 2018 offered same-day services in over 1000 facilities. As part of the initiative, VA medical facility staff are directed to address veterans’ primary care and mental health needs that day through a variety of methods, including face-to-face visits, telehealth, prescription refills, or by scheduling a follow-up appointment. Our ongoing work indicates that the six VA medical facilities we visited were generally providing same-day services prior to the initiative; however, according to VA officials, ongoing staffing and space shortages created challenges implementing the initiative. Our ongoing work also indicates that VA does not have performance goals and measures to determine same-day services’ impact on veterans’ access to care. We plan to issue our report on VA’s same-day services initiative in August 2019. In closing, we have identified various weaknesses in VA’s wait-time measurement and scheduling processes over the years. These weaknesses have affected not only VA’s internal delivery of outpatient care, but also that provided through community providers. As we have highlighted here, we have made a number of recommendations to address these weaknesses. VA has taken actions to address our recommendations, but additional work is needed for some. The implementation of enhanced technology, such as a new scheduling system, is crucial and will provide an important foundation for improvements. However, this is not a panacea for addressing all of the identified problems. Moving forward, VA must also continuously ensure that it has clear and consistent policies and processes, adequate oversight, and effective training. Chairman Takano, Ranking Member Roe, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Debra A. Draper, Director, Health Care at (202) 512-7114 or DraperD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony were Sharon Silas (Acting Director), Ann Tynan (Assistant Director), Cathy Hamann, Aaron Holling, Akbar Husain, Kate Tussey, and E. Jane Whipple. Also contributing were Jacquelyn Hamilton and Vikki Porter.", "summary": "The majority of veterans utilizing VA health care services receive care in VA-operated medical facilities, including 172 VA medical centers and more than 1,000 outpatient facilities. For nearly 20 years, GAO has reported on the challenges VA medical facilities have faced providing health care services in a timely manner. When veterans face wait times at VA medical facilities, they may be able to receive services from VA's community care programs, which VA estimates will be 19 percent of its $86.5 billion in health care obligations in fiscal year 2020. This testimony focuses on GAO's large body of work on veterans' access to care and the status of VA's efforts to address GAO's recommendations, including those from GAO's June 2018 report on VA's community care programs and from GAO's December 2012 report on VA's scheduling of timely medical appointments that VA has provided information on through July 2019. It also includes preliminary observations on related ongoing work. GAO has issued several reports recommending that the Department of Veterans Affairs (VA) take action to help ensure its facilities provide veterans with timely access to medical care. VA has taken a number of steps to address GAO's recommendations to improve wait-time measurement and its appointment scheduling policy. However, additional actions are needed to fully address most of GAO's recommendations. GAO found in 2012 that outpatient appointment wait times reported by VA were unreliable because VA did not ensure consistency in schedulers' definitions of the dates by which wait times were measured. GAO recommended that VA clarify these definitions. VA concurred and has taken a number of actions in response, including improved oversight through scheduling audits. However, VA's first internal audit in August 2018 was unable to evaluate the accuracy and reliability of its wait-time data due to the lack of business rules for calculating them, indicating that additional efforts are needed to address this issue. GAO also found in 2012 that not all facilities GAO visited used the electronic wait list to track new patients that needed medical appointments, as required by VA's scheduling policy. This put patients at risk for being lost for appointment scheduling. GAO recommended VA ensure consistent implementation of its policy, and that all schedulers complete required training. VA concurred, and with the information VA provided in July 2019 GAO considers VA's actions, including updating its scheduling policy and completing scheduler training, sufficient to fully address the recommendation. While improvements to VA's scheduling policy and processes will help ensure veterans receive timely access to care, there are other factors that may also affect access that are not currently reflected in VA's wait-time data. For example, GAO found instances in which the time it took the agency to initially enroll veterans in VA health care benefits was more than 3 months. GAO has also made recommendations to improve appointment scheduling and ensure timely access to care from non-VA providers in VA's community care programs that remain unimplemented. GAO found in June 2018 that the data VA used to monitor the timeliness of the Veterans Choice Program's appointments captured only a portion of the total appointment scheduling process. Although VA had a wait-time goal of 30 days, VA's timeliness data did not capture certain processes, such as the time taken to prepare veterans' referrals and send them to a third-party administrator. GAO found that if these were accounted for, veterans could potentially wait up to 70 calendar days to see a community care provider. VA officials stated that most recommendations will be addressed with new program tools it plans to implement. For example, VA is implementing a system for referral management and appointment scheduling expected to be available in all VA medical facilities by fiscal year 2021. While technology may be an important tool, VA will also need clear and consistent policies and processes, adequate oversight, and effective training to help avoid past challenges. GAO has made a number of recommendations to VA to address timely scheduling and reliable wait-time data for outpatient appointments and through community care. VA generally agreed with GAO's recommendations. As of July 2019, VA has taken actions to fully implement one recommendation discussed in this statement. GAO continues to believe that all of the recommendations are warranted.", "document_type": "gao"}
{"report": "Records are the foundation of open government, supporting the principles of transparency, participation, and collaboration. Effective management of federal agency records is important for efficient government operations: it ensures that sufficient documentation is created; that agencies can efficiently locate and retrieve records needed in the daily performance of their missions; and that records of historical significance are identified, preserved, and made available to the public. Requirements for managing federal records include the following: The FRA establishes requirements for the management of records in federal agencies. Every federal agency is required to preserve records that document the organization, functions, policies, decisions, procedures, and essential transactions of the agency to furnish the information necessary to protect the legal and financial rights of the government and of persons directly affected by the agency’s activities. The act also gives NARA regulatory responsibilities for records management as well as general responsibilities for archiving records. In response to a presidential memorandum to begin an executive branch effort to reform records management policies and develop a framework for the management of electronic government records, the Director of OMB and the Archivist of the United States jointly issued the Managing Government Records Directive to heads of federal departments and agencies. This directive aimed at creating a robust records management framework for electronic records that complied with statutes and regulations to achieve the benefits outlined in the presidential memorandum. It required agencies to eliminate paper and use electronic recordkeeping to the fullest extent possible. Among other things, the directive identified two requirements related to electronic records that agencies were to implement between December 2016 and December 2019. By December 31, 2016, federal agencies were to manage all permanent and temporary email records in an accessible electronic format. Email records were to be retained in an appropriate electronic system that supports records management litigation requirements, including the capability to identify, retrieve, and retain the records for as long as they are needed. By December 31, 2019, federal agencies are to manage all permanent electronic records in an electronic format to the fullest extent possible for eventual transfer and accessioning by NARA. Under the FRA and its implementing regulations, NARA has general oversight responsibilities for records management and the preservation of permanent records documenting the activities of the government in the National Archives of the United States. Thus, NARA is responsible for overseeing agency management of temporary and permanent records used in everyday operations and, ultimately, for taking control of permanent agency records judged to be of historic value. In particular, NARA is responsible for: issuing records management guidance covering topics such as managing electronic records; assigning an appraisal archivist to each agency to answer agency questions about federal records management; providing services to agencies, such as records scheduling and working with agencies to implement effective controls over the creation, maintenance, and use of records in the conduct of agency business; approving the disposition (destruction or preservation) of records; providing storage facilities for agency records; and conducting inspections or surveys of agency records and records management programs. NARA is also responsible for reporting to Congress on the state of federal records management. It accomplishes this responsibility, in part, by requiring all federal agencies to submit an annual report to the Office of the Chief Records Officer for the federal government. As part of these annual reports, agencies are required to include three submissions: The Senior Agency Official Records Management Report includes responses about the agency’s progress toward the targets and requirements in the Managing Government Records Directive. The Federal Email Management Report includes a self-evaluation of their email management. The Records Management Self-Assessment includes a self- evaluation of their compliance with federal records management statutes, regulations, and program functions. In addition to NARA’s responsibilities, the FRA requires each federal agency to make and preserve records that document the organization, functions, policies, decisions, procedures, and essential transactions of the agency. Effective Records Management Must Address Electronic Records, Including Email The FRA covers documentary material, regardless of physical form or media, although, until the advent of computers, records management and archiving mostly focused on handling paper documents. However, as information is increasingly created and stored electronically, records management has had to take into account the creation of records in various electronic formats, including email messages. As such, agencies need to adapt their records management practices to manage those electronic files that may be federal records. NARA’s implementing regulations and guidance, such as periodic NARA bulletins, provide direction to agencies about the management of electronic records. To ensure that the management of agency electronic records is consistent with provisions of the FRA, NARA requires each agency to maintain an inventory of all agency information systems that identifies basic facts about each system, such as technical characteristics and the electronic records it contains. NARA also requires that agencies maintain all federal records, including those in electronic format, in its systems. Further, NARA requires agencies to provide instructions to staff regarding how to maintain the agency’s operational records and what to do when they are no longer needed for current business. Like other records, electronic records must be scheduled either under agency- specific schedules or pursuant to a general records schedule. Further, in order to effectively address NARA regulations, agencies are to establish policies and procedures that provide for appropriate retention and disposition of their electronic records. Disposition involves transferring records of permanent, historical value to NARA for the archiving of records (preservation) and the destruction of all other records that are no longer needed for agency operations. In addition to adherence to general requirements governing electronic records, according to the electronic records management regulation, agencies are to also issue instructions to staff that specifically address retention and management of their email records. The regulation requires agencies’ email records to be managed as are other federal records with regard to the adequacy of documentation, recordkeeping requirements, agency records management responsibilities, and records disposition. The FRA Amendments enacted on November 26, 2014, include, among other things, disclosure requirements for official business conducted using a non-official electronic messaging account. The law states an officer or employee of an executive agency may not create or send a record using a non-official electronic messaging account unless the officer or employee (1) includes a copy to an official electronic messaging account of the officer or employee in the original creation or transmission of the record or (2) forwards a complete copy of the record to an official electronic messaging account of the officer or employee not later than 20 days after the original creation or transmission of the record. In 2015, we reported that the 24 major federal departments and agencies covered by the Chief Financial Officers Act of 1990 had taken action in response to the Managing Government Records Directive, but not all of the agencies met all of the requirements. In that report, we stated that most of the agencies, including the Department of Commerce (Commerce) and the National Aeronautics and Space Administration (NASA), described plans to manage permanent electronic records, reported progress in managing permanent and temporary email records, and identified unscheduled records. We also noted that certain requirements were not fully met by a few agencies, including the National Science Foundation (NSF) and Office of Personnel Management (OPM), because these agencies were either still working on addressing the requirement, or did not view the requirement as being mandatory. Specifically, we reported that NSF did not submit a Senior Agency Official report that would have provided information to NARA on how it intended to manage permanent records electronically. In addition, we reported that NSF did not report to NARA on its possession of permanent 30-year-old records, and had not completed its identification of, or reported on, any portion of its unscheduled records. As a result, we recommended that NSF establish a date by which the agency would complete, and then report to NARA, its plans for managing permanent records electronically and its progress toward managing permanent and temporary email records in an electronic format. We also recommended that the agency complete the identification of unscheduled records stored at agency records storage facilities. NSF concurred with our recommendations and, in response, completed its plans for managing permanent records electronically and managing permanent and temporary email records in an electronic format. We verified in February 2017 that the agency reported these plans to NARA. For OPM, the agency had not designated their Senior Agency Official at the assistant secretary level or its equivalent because they did not view the requirement as mandatory. We recommended that the designated Senior Agency Official be at or equivalent to the level of an assistant secretary. OPM concurred with our recommendations and, in response, designated the Chief Information Officer as the Senior Agency Official with direct responsibility for ensuring that OPM efficiently and appropriately complies with all applicable records management statutes, regulations, and NARA policy. The 17 agencies selected for review varied in the extent to which their records management policies, procedures, and documentation addressed 10 key requirements in the Managing Government Records Directive, the FRA and its amendments, and implementing regulations related to electronic records. Specifically, most of the selected agencies addressed the requirements related to establishing records management programs, submitting records schedules to NARA, incorporating activities for electronic records into their overall records management program, developing plans for managing permanent electronic records in an electronic format, managing email records in an electronic format, and using non-official electronic messaging. However, agencies did not fully address the requirements related to maintaining an inventory of electronic information systems, establishing controls and preservation considerations for their electronic information systems, and issuing retention and management requirements for email. According to the FRA and its amendments, agencies are to establish effective records management programs, which includes developing comprehensive records schedules, in order to achieve adequate and proper documentation of the policies and transactions of the federal government and to aid in the effective and economical management of agency operations. Specifically, each agency is required to: establish and maintain an active, continuing records management program that, among other things, includes effective controls over the creation, maintenance, and use of records and submit lists and schedules of records to the Archivist of the United States that describe, among other things, when eligible temporary records must be disposed of. As shown in figure 1, the majority of the 17 selected agencies addressed these requirements. Establishing a records management program: Fourteen of the 17 selected agencies—Armed Forces Retirement Home (AFRH), Consumer Financial Protection Bureau (CFPB), Commerce, U.S. Election Assistance Commission (EAC), Federal Housing Finance Agency (FHFA), Federal Trade Commission (FTC), NASA, NSF, Office of Management and Budget (OMB), Office of National Drug Control Policy (ONDCP), Overseas Private Investment Corporation (OPIC), OPM, Peace Corps, and Special Inspector General for Afghanistan Reconstruction (SIGAR)—had developed policies and procedures that outlined their records management program. The agencies’ records management documentation discussed, among other things, the requirement for effective controls over the creation, maintenance, and use of records at the agency. However, three agencies—Marine Mammal Commission, Presidio Trust, and the Morris K. Udall and Stewart L. Udall Foundation (Udall Foundation)—did not have an active, continuing agency records management program, including documentation that described effective controls over the creation, maintenance, and use of records at the agency. All three agencies indicated that they have taken or intend to take actions to establish such a program. Marine Mammal Commission officials responsible for records management stated that the agency had engaged a contractor who completed and submitted for agency review and approval a draft policy that would govern its records management program. As of January 2020, the Executive Director stated that the commission has a signed policy and draft handbook to govern its records management program and that it is working towards full implementation and compliance by December of 2022. Presidio Trust officials responsible for records management stated that the agency intends to address the requirements and plans to have records management policies and procedures at the agency in fiscal years 2020 and 2021. Udall Foundation officials responsible for records management stated that the agency had entered into an interagency agreement with NARA for consulting services to assess its current records management environment. According to the same officials, their intent is to review NARA’s recommendations and develop a plan to comply with the FRA, federal regulations, and NARA guidelines as they relate to records management. The agency did not provide an estimated date for completing these activities. Until these agencies establish an active and continuing records management program, they cannot provide assurance that, among other things, effective controls are in place over the creation, maintenance, and use of records in the conduct of current business. Submitting lists and schedules of records to the Archivist: Thirteen of the 17 selected agencies—AFRH, CFPB, EAC, FHFA, FTC, Marine Mammal Commission, NASA, ONDCP, OPIC, Peace Corps, Presidio Trust, SIGAR, and the Udall Foundation—had submitted a comprehensive list of records and disposition schedules to the Archivist. The remaining four agencies—Commerce, NSF, OMB, and OPM—had partially addressed this requirement because they had submitted only partial lists and schedules to the Archivist. Each of these agencies acknowledged they did not provide comprehensive lists of records and disposition schedules and stated they were currently working toward submitting them to the Archivist. OMB officials stated that they plan to complete this task by the end of calendar year 2019, while the other agencies did not provide an estimated date for completion. Without submitting lists of records and disposition schedules to the Archivist, Commerce, NSF, OMB, and OPM are at risk of maintaining records that are no longer relevant or needed. The Managing Government Records Directive was aimed at creating a robust records management framework for electronic records that complies with statutes and regulations. In order to ensure transparency, efficiency, and accountability, the directive instructed agencies to manage all permanent and temporary e-mail records in an accessible electronic format by December 2016 and manage all permanent electronic records in an electronic format to the fullest extent possible by December 2019. The directive also required NARA to develop revised guidance for transferring permanent electronic records and issue new guidance describing methods for managing, disposing of, and transferring e-mail. Accordingly, NARA regulations and guidance outline requirements for agencies to establish a framework for managing electronic records, including requirements pertaining to electronic systems and email. Additionally, the FRA Amendments described the disclosure requirements for official business conducted using non-official electronic messaging accounts. Based on our analysis, these documents identify, among other things, eight key requirements that agencies should include in their policies and procedures to ensure that they can effectively manage electronic records. These requirements are summarized in table 1. The 14 agencies with an established records management program varied greatly in the extent to which they addressed these electronic records requirements, as seen in figure 2. Incorporate activities for electronic records into the agency’s overall records management program: Thirteen of 14 agencies that had established records management programs—AFRH, Commerce, CFPB, EAC, FHFA, FTC, NASA, NSF, OPIC, ONDCP, OPM, Peace Corps, and SIGAR—developed written policies and procedures that incorporated the management of electronic records into their records management program. The remaining agency—OMB—did not address this requirement. Staff from OMB responsible for records management stated that the Executive Office of the President’s (EOP) Office of Administration is responsible for records management for all Executive Office components and has procedures that incorporate the management of electronic records into their records management program. However, the officials did not provide evidence that the existing policies and procedures incorporated the management of electronic records into their records program. Without being able to ensure that records management considerations are incorporated into the design and implementation of electronic systems, OMB risks not being positioned to properly manage records electronically. Maintain an inventory of electronic systems: Three of the 14 agencies that had established records management programs— Commerce, FHFA, and SIGAR—also maintained an inventory of electronic information systems that documented the information and records produced and maintained by each application. Officials responsible for records management at these agencies stated that their inventory was maintained with the agency’s security plans. Additionally, three of the 14 agencies that had established a records management program —FTC, NSF, and Peace Corps—partially addressed the requirement, as their policies and procedures addressed some, but not all, of the necessary elements. More specifically: FTC documented various technical characteristics, such as authorizations, purpose and function of the electronic information systems, and authorized procedures for the disposition of records. However, the agency did not include the characteristics for reading and processing the records contained in the system, inputs and outputs, contents of the files and records, and cycle updates. NSF documented the categories of records in the electronic information systems, record access procedures, purpose of the systems, and retention and disposition of the system’s records. However, the agency did not specify the technical characteristics of the systems, identify inputs and outputs, or describe update cycles. Peace Corps documented update cycles and the purpose of the electronic information systems. However, the documentation did not specify the technical characteristics necessary for reading and processing the records contained in the system, identify system inputs and outputs, define the contents of the files and records, determine restrictions on access to and use of the system, and specify how the agency ensures the timely disposition of records. According to officials responsible for records management at each of these agencies, they intend to address or would consider addressing the requirement. However, none of them provided a time frame for doing so. The remaining eight agencies—AFRH, CFPB, EAC, NASA, OMB, ONDCP, OPM, and OPIC—either did not maintain an inventory of electronic information systems or did not provide documentation that outlined the technical characteristics, such as identifying all inputs and outputs necessary for reading and processing records contained in the system. Records management officials at AFRH, CFPB, EAC, NASA, OPM, and OPIC stated that they intend to address the requirement, but did not provide a time frame for doing so. Staff from OMB and ONDCP responsible for records management stated that EOP’s Office of Administration is responsible for records management for all components and maintains an inventory of electronic information systems. However, the officials did not provide evidence of this inventory. Without maintaining an inventory and documentation of electronic information systems used to store agency records, these agencies are at a heightened risk of records being lost and not identified and scheduled in accordance with agency records schedules. Manage permanent electronic records in an electronic format: The Managing Government Records Directive requires each agency to develop and begin to implement plans to manage all permanent records in an electronic format. In accordance with this requirement, 12 of the 14 agencies that had established records management programs—AFRH, CFPB, Commerce, FHFA, FTC, NASA, NSF, OMB, ONDCP, OPIC, Peace Corps, and SIGAR—described their efforts to address the requirement in their Senior Agency Official reports to NARA. For example, these agencies described, among other things, plans on how permanent electronic records were being captured, retained, searched, and retrieved. However, two agencies—EAC and OPM—did not address how they plan to manage permanent electronic records in their Senior Agency Official reports or other agency documentation. EAC officials stated that they were still deciding on a solution to manage permanent records, and OPM officials stated they were planning to update policies to ensure automated systems incorporate proper records management life cycle controls. Further, neither agency provided a time frame for developing and implementing a plan. By not having a plan to manage their permanent records in an electronic format, these agencies face an increased risk that they may not be positioned to manage permanent electronic records. Incorporate required recordkeeping functionalities: Eight of the 14 selected agencies that established records management programs— Commerce, CFPB, FHFA, FTC, NASA, NSF, ONDCP, and SIGAR— had documented policies, procedures, or other records management documentation that addressed the required functionalities for recordkeeping systems. Additionally, one agency—OPIC—partially addressed this requirement because it included some, but not all, of the required functionality. More specifically, the agency did not identify whether the system could declare records and assign unique identifiers, capture records, maintain security, and preserve records. According to OPIC officials, the agency intends to work toward having better documentation outlining system functionalities in alignment with the requirements; however, the officials did not provide a time frame for completing this documentation. Further, five of the 14 agencies that had established records management programs— AFRH, EAC, OMB, OPM, and Peace Corps—did not address this requirement. Officials responsible for records management at each of these agencies stated that their records management system encompassed all of the aforementioned functionality or that the agency was working toward a full electronic records management system. However, these agencies’ policies and procedures did not include the required functionalities for recordkeeping systems. According to the same officials, each agency intends to have written documentation that outlines the records management functionalities; however, they did not provide a time frame in which the documentation will be completed. Without using electronic recordkeeping systems with appropriate functionalities, these agencies face increased risk of not being able to reliably access and retrieve the records needed to conduct agency business. Establish records management controls and preservation considerations: Seven of the 14 agencies that had established a records management program—CFPB, Commerce, FHFA, FTC, NASA, OPM, and SIGAR—included all records management controls in their electronic information systems policy and included preservation considerations in the design, development, and implementation of electronic information systems. Additionally, six of the 14 agencies that had established records management programs—AFRH, EAC, OMB, ONDCP, OPIC, and the Peace Corps—had policies that partially addressed establishing the records management controls for their electronic information systems. More specifically: AFRH records management documentation included information controls to ensure the reliability, authenticity, and integrity of records. However, the documentation did not define controls for usability, content, context, and structure. EAC’s documentation included controls for reliability, authenticity, integrity, and usability. However, the agency did not define controls for content, context, and structure. OMB and ONDCP’s documentation outlined controls for authenticity, integrity, usability and content. However, the documentation did not define controls for reliability, context, and structure. Staff stated that both offices’ records management was handled by the Office of Administration in the EOP and that the office had acquired an object-based data storage system that was expected to address all of the required controls. However, the offices did not provide any evidence that the new system or the associated policies and procedures would address the required controls. OPIC’s documentation defined controls for authenticity, integrity, and usability. However, the documentation did not define controls for reliability, content, context, and structure. Peace Corps’ documentation included controls for reliability, authenticity, integrity, and content. However, the agency did not define controls for usability, context, and structure. Additionally, each agency’s documentation did not describe how the agency ensures that records in the system are retrievable and useable for as long as needed to conduct agency business. Records management officials at each of the agencies acknowledged that not all of the controls or preservation considerations were included in their systems and that they planned to work toward implementing all of the controls; however, the agencies did not provide a time frame for documenting the controls. The remaining agency—NSF—did not address this requirement because its existing policies and procedures did not demonstrate that the agency had established the required controls. NSF officials stated that they intend to comply with this requirement but did not provide a time frame for doing so. Without ensuring that records management controls and preservation considerations are incorporated into electronic information systems, the agencies cannot ensure these systems can produce retrievable and useable records for as long as needed to conduct agency business. Manage permanent and temporary email records in an electronic format: Thirteen agencies—AFRH, CFPB, EAC, FHFA, FTC, NASA, NSF, OMB, ONDCP, OPIC, OPM, Peace Corps, and SIGAR— addressed this requirement. The remaining agency—Commerce—did not address this requirement. Officials responsible for records management at Commerce stated that they use an email management system for email, email preservation, and litigation holds. However, their policies and procedures did not show how the agency managed both permanent and temporary email records in an accessible electronic format. Until Commerce ensures that its systems are capable of managing permanent and temporary email records and have the capability to identify, retrieve, and retain these records, the agency faces an increased risk that its emails are not able to be preserved or accessed when needed. Issue retention and management requirements: Nine of the 14 agencies that had established records management programs— AFRH, Commerce, CFPB, EAC, FHFA, FTC, NASA, Peace Corps, and SIGAR—issued instructions or had policies on retention and management requirements for electronic mail. Additionally, two of the 14 agencies that had established records management programs— OPIC and OPM—had policies that partially addressed this requirement. More specifically: OPIC’s policies and procedures documented that agency email messages and attachments that meet the statutory definition of a record are to be documented as an official record. However, the agency documentation did not discuss retention requirements for calendars. Officials responsible for records management stated that they intend to update the records and information management handbook to include the calendar requirement, but did not provide a time frame for updating the handbook. OPM’s policies and procedures described how employees were to ensure that email records included most of the requirements, but the policies and procedures did not address retaining calendars and draft documents. Officials responsible for records management stated that they intend to review and update its records management policy, but did not provide a time frame for doing so. The policies of the remaining three agencies—NSF, OMB, and ONDCP—did not address this requirement for various reasons. NSF officials responsible for records management stated that the agency issued instructions regarding record retention and management of email to staff through memos and bulletins. However, these documents did not include instructions to staff that ensured the names and addresses of the sender, date of message, attachments, calendars, and draft documents would be retained. Additionally, staff from OMB and ONDCP responsible for records management stated that the Office of Administration within the EOP captured and managed all email on behalf of all components. According to these staff, email is permanent until the end of the presidential administration, at which time the email is transferred to NARA in accordance with each component’s records schedules. However, the staff did not provide evidence that the existing policies and procedures included these instructions. By not issuing instruction to staff on retention and management requirements for email, agencies are at risk of not being able to retrieve email and its associated metadata when needed to conduct agency business. Use of non-official electronic messaging: Twelve of the 14 agencies that had established records management programs — CFPB, Commerce, FHFA, FTC, NASA, NSF, OMB, ONDCP, OPM, OPIC, Peace Corps, and SIGAR—had policies and procedures outlining the rules that their employees are to follow when creating records using a non-official electronic messaging account. The remaining two of 14 agencies that had established records management programs—AFRH and EAC—did not have written documentation describing the agencies’ disclosure requirements for official business conducted using non-official electronic messaging accounts. The EAC records management officials acknowledged that the agency did not outline this requirement and stated that policies and procedures were being drafted to address this requirement; however, the officials did not provide an estimated completion date. AFRH stated that it had updated its “Network Rules of Behavior” document and its IT information security awareness training to new employees to reflect the requirement, but we were unable to verify the updates. Without establishing rules for employees on the use of non-official electronic messaging accounts, agencies are at risk of not retaining email records sent from personal accounts. The 10 aforementioned requirements are important elements to address while establishing a framework for managing electronic records. While most of the selected agencies had established policies and procedures addressing the requirements, some had not. Until these agencies do so, they will lack assurance that electronic records are being managed in a way that promotes openness and accountability in documenting agency actions and decisions. NARA provided various forms of assistance to the selected agencies, which included issuing guidance regarding electronic records management, training, and professional development. In addition, NARA monitored the selected agencies’ compliance with records management regulations and implementation of policies, guidance, and other records management best practices through its self-assessment program. However, NARA had not ensured that any of the selected small or micro agencies that self-assessed to be at high risk of improper records management in calendar year 2017 were taking appropriate actions to improve their records management program. According to the FRA, NARA is responsible for providing guidance and assistance to federal agencies with respect to ensuring economical and effective records management, adequate and proper documentation of the policies and transactions of the federal government, and proper records disposition. In accordance with its responsibilities, NARA provided guidance and assistance to the selected agencies through various methods. All of the selected agencies stated that NARA guidance and assistance were generally helpful and that they relied on it to some extent for implementing the electronic records management requirements discussed in this report. Specifically, NARA issued guidance particular to electronic records creation, policies and procedures, management, and disposition. Officials from the selected agencies found NARA’s guidance related to managing email and its December 2017 General Records Schedule to be helpful when fulfilling their responsibilities with respect to electronic records. The guidance related to managing email describes federal agencies’ responsibilities for email management and the Capstone approach to email management. The Records Officer at AFRH stated that the agency used guidance that described the minimum set of metadata elements that must accompany transfers of permanent electronic records to NARA. The General Records Schedule provides mandatory disposition instructions for records that are common to several or all federal agencies. An FHFA official responsible for records and information management stated this guidance was useful because it was used at the agency during regular records management activities, such as records disposition. Further, NARA provided assistance to the selected agencies such as professional development training and assigning an archivist to assist each agency. Officials responsible for records management at the selected agencies stated that NARA offers agencies records management training and professional development to federal employees and contractors. For example, NARA provides a certificate program for Federal Agency Records Officers and records management professionals to manage information collected by their agency. In addition, these officials stated that NARA offers a bi-monthly Records Information Discussion Group where individuals involved with federal records management can share their experiences and discuss the latest developments from NARA. Additionally, officials responsible for records management at the selected agencies stated that NARA assigns an archivist to each agency to field questions about federal records management, including services such as records scheduling and appraisal, and technical assistance. For example, Udall Foundation officials responsible for records management stated that the agency worked with its assigned archivist who provided direction on how to manage agency records, connected the agency with other records management subject matter experts, and fielded questions on the scheduling of agency records. In addition to providing assistance to federal agencies, NARA also has the responsibility to monitor compliance with records management regulations and implementation of NARA policies, guidance, and other records management best practices by federal agencies. One way in which NARA accomplishes this is to require federal agencies to conduct an annual self-assessment that evaluates the agency’s reported compliance with federal records management statutes, regulations, and program functions and is also useful to target resources to areas needing improvement. NARA scores each agency’s responses and, based on this score, determines whether an agency is at risk of not complying with statutory and regulatory records management requirements. For the self-assessments that covered calendar year 2017, four of our 17 selected agencies—AFRH, Marine Mammal Commission, Presidio Trust and the Udall Foundation—were assessed as being at high risk of not complying with statutory and regulatory records management requirements. See table 2 for how 16 of the 17 selected agencies scored. While NARA requires agencies to self-assess their records management programs annually, it does not ensure that agencies that scored poorly on their self-assessments develop a plan to improve their programs or monitor their progress in such efforts. According to NARA officials, after reviewing the reports the agency conducted phone interviews with staff from selected small and micro agencies to determine if there were any common factors for why they scored poorly on the self-assessments and what NARA could do to help them improve their records management programs. Given the self-assessment process was designed to measure agency compliance and to target resources to areas needing improvement, it is important for NARA to ensure the small and micro agencies that have assessed their programs as high-risk are taking appropriate actions to improve their records management programs. Until NARA requires high- risk small and micro agencies to develop plans to make necessary improvements to their record management programs and monitor their progress, it cannot be certain that these agencies are managing electronic records in accordance with governing regulations. Similarly, agencies that have not submitted self-assessments may also not be addressing statutory and regulatory records management requirements. While most of the selected agencies addressed the key electronic recordkeeping requirements, others did not. Specifically, many agencies did not address requirements related to electronic system and email implementation, including establishing controls for their electronic information systems, incorporating preservation considerations into systems, and issuing retention and management requirements for email. Until these agencies do so, they will lack assurance that electronic records are being created, managed, retained, preserved, and disposed of in a way that improves performance and promotes openness and accountability by better documenting agency actions and decisions. NARA continues to assist the selected agencies in managing electronic records by providing guidance and training as well as monitoring their compliance with records management regulations. However, while NARA oversees the selected agencies’ compliance through records management self-assessments, it has not ensured that the selected small and micro agencies that were at high risk of improper records management have developed plans to address weaknesses in their records management programs. We are making 42 recommendations to 15 agencies. Specifically, we are making the following recommendations to NARA: The Archivist of the United States should 1. require small and micro agencies that were determined to be at high risk of not complying with statutory and regulatory records management requirements to develop plans and timelines to address their records management weaknesses (Recommendation 1) 2. monitor the agencies’ progress towards these efforts on a regular basis. (Recommendation 2) In addition, we are making 40 recommendations to 14 agencies to fully address the electronic recordkeeping requirements found in the Managing Government Records Directive and the Presidential and Federal Records Act Amendments of 2014 in their policies and procedures. Appendix II contains these recommendations. We requested comments on a draft of this report from NARA and the 17 other agencies included in our review. All of the agencies provided responses, as further discussed. In written comments, NARA concurred with our recommendations and stated that the agency will develop an action plan to require small and micro agencies that consistently score in the high risk category on NARA’s annual records management self-assessment to address their records management weaknesses. In addition, NARA stated that it will continue to gather data to identify where inspections, guidance, and training are needed to ensure that small and micro agencies are improving their records management programs. NARA’s comments are reprinted in appendix III. Of the 17 other agencies in our review, six agencies (CFPB, Commerce, NASA, NSF, OPM, and the Udall Foundation) concurred with our recommendations; five agencies (Marine Mammal Commission, OMB, ONDCP, OPIC, and Presidio Trust) did not state whether they agreed or disagreed with our recommendations; and six agencies (AFRH, EAC, FHFA, FTC, Peace Corps, and SIGAR) stated that they had no comments on the report. Multiple agencies also provided technical comments, which we incorporated as appropriate. Among these agencies, the following six concurred with our recommendations and, in most cases, described steps planned or under way to address them: The Consumer Financial Protection Bureau provided written comments in which the agency stated that it did not object to our recommendation. The agency added that it would establish a time frame to update its current inventory of electronic systems used to store agency records, so that the inventory includes all of the required elements. CFPB’s comments are reprinted in appendix IV. In written comments, the Department of Commerce concurred with our two recommendations and stated that the agency intends to take additional steps to implement them. Specifically, with regard to our recommendation regarding up-to-date records schedules, the agency stated that it will ensure that its records schedules are updated and submitted to NARA no later than December 2020. Commerce also stated that, while it believes its current electronic system that manages email meets our recommendation, the agency intends to take additional steps by updating its policies and ensuring that users are correctly implementing the system to address federal recordkeeping requirements by December 2020. Commerce’s comments are reprinted in appendix V. The National Aeronautics and Space Administration provided written comments in which it concurred with our recommendation. The agency added that it is currently developing a comprehensive inventory to serve as an authoritative source for identifying where the agency’s electronic records reside, which should be completed by June 2021. NASA comments are reprinted in appendix VI. In written comments, the National Science Foundation concurred with our four recommendations. NSF stated that the agency is updating its schedules and intends to ensure that its records management practices and policies address current requirements and best practices for federal records management. NSF’s comments are reprinted in appendix VII. The Office of Personnel Management provided written comments in which it concurred with our five recommendations and noted steps that the agency has begun or is planning to take to address them. OPM stated that, in fiscal year 2020, it intends to issue a strategic plan on the digitization and management of permanent and electronic records, update agency policies and procedures to include the required electronic information system function for recordkeeping systems, and implement the requirements of the agency’s Capstone email policy. The agency also noted that, in fiscal year 2021, it plans to complete the updates needed on all agency disposition schedules and develop an inventory of all electronic information systems that store agency records. OPM’s comments are reprinted in appendix VIII. In written comments, the Udall Foundation concurred with our recommendation and described the steps it plans to take in fiscal years 2020 and 2021 to establish records management policies and procedures. For example, according to the foundation, in September 2020, it plans to complete the initial build-out of required infrastructure to manage electronic records. Further, in March 2021, it plans to finalize a formal records management policy and associated procedures for creating, maintaining, and using records across the agency. The Udall Foundation’s comments are reprinted in appendix IX. Further, the following five agencies did not state whether they agreed or disagreed with the recommendations: In written comments, the Office of Management and Budget did not state whether it agreed or disagreed with our recommendations. However, OMB stated that it is diligently working with NARA to revise and update its records schedule and intends to closely review and close any gaps in documentation that GAO identified. The office also provided technical comments, which we incorporated as appropriate. OMB’s comments are reprinted in appendix X. In an email from the Executive Director, the Marine Mammal Commission did not state whether it agreed or disagreed with our recommendations. However, according to the executive director, the commission now has a signed records management policy that describes staff responsibilities for the management of electronic records and email as well as a draft records management handbook. The official also stated that the commission will continue efforts to fully implement the records management policy and procedures aiming toward full implementation and compliance by December 2022. The Commission also provided technical comments, which we incorporated as appropriate. In an email from the Acting General Counsel, the Office of National Drug Control Policy did not state whether it agreed or disagreed with our recommendations. The office provided technical comments, which we incorporated as appropriate. In an email from its GAO audit liaison, the Overseas Private Investment Corporation did not state whether it agreed or disagreed with our recommendations. However, the liaison stated that the agency intends to implement a new solution for electronic records and information management that includes the recordkeeping functionalities required by NARA. The liaison added that the agency plans to update its records and information management policies and procedures to strengthen the records management controls and preservation guidance in fiscal year 2021. In an email from the Chief Financial and Administrative Officer, Presidio Trust did not state whether it agreed or disagreed with our recommendations. However, the official stated that the trust had recently implemented the Capstone approach for email and would continue to work on records management throughout 2020 and 2021. Lastly, we received emails from the Armed Forces Retirement Home’s Information Technology Manager, the U.S. Election Assistance Commission’s Communication Specialist, the Federal Housing Finance Agency’s Privacy Act Officer, the Federal Trade Commission’s attorney representative in the Office of General Counsel, the Peace Corps Agency Records Officer, and the Special Inspector General for Afghanistan Reconstruction’s Director of Information Technology. All of the emails stated that these agencies had no comments on the draft report. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Commerce; the Administrator of the National Aeronautics and Space Administration; the Archivist of the United States; the Chief Executive Officers of the Armed Forces Retirement Home and Overseas Private Investment Corporation; the Executive Directors of the U.S. Election Assistance Commission and Udall Foundation; the Directors of the Consumer Financial Protection Bureau, Federal Housing Finance Agency, National Science Foundation, Office of Management and Budget, Office of National Drug Control Policy, Office of Personnel Management and Peace Corps; the Chairman of the Federal Trade Commission, Marine Mammal Commission, and the Presidio Trust Board; the Special Inspector General for Afghanistan Reconstruction and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9342 or marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XI. Our objectives were to determine the extent to which (1) selected agencies’ policies and procedures address electronic recordkeeping requirements in the Managing Government Records Directive and the Presidential and Federal Records Act Amendments of 2014 and (2) NARA assisted selected agencies in managing their electronic records. To determine the agencies for our review, we identified agencies that established a Senior Agency Official for Records Management and submitted an annual report on NARA’s website between fiscal year 2015 and fiscal year 2017. Of the 95 agencies that met these criteria, we removed two from consideration because they were not part of the executive branch: one was a judicial branch agency and the other was a legislative branch agency. The 93 remaining agencies to include in our review represented the following categories: (1) executive departments, (2) Executive Office of the President, and (3) independent agencies. To ensure that a variety of agencies were selected across the designated categories, we chose a selection of 17 agencies and ensured that at least two agencies were selected from the three identified categories. In order to generate this selection, we sorted the list of 93 agencies by assigned random numbers and selected the top 17 agencies in this list, while ensuring that at least two agencies from each category were selected. The selection of 17 agencies cannot be used to make generalizable statements about the full population of agencies. The 17 agencies selected were: 1. Armed Forces Retirement Home 2. Consumer Financial Protection Bureau 3. Department of Commerce 4. U.S. Election Assistance Commission 5. Federal Housing Finance Agency 6. Federal Trade Commission 7. Marine Mammal Commission 8. Morris K. Udall and Stewart L. Udall Foundation 9. National Aeronautics and Space Administration 10. National Science Foundation 11. Office of Management and Budget 12. Office of the National Drug Control Policy 13. Office of Personnel Management 14. Overseas Private Investment Corporation 17. Special Inspector General for Afghanistan Reconstruction To address the first objective, we identified key requirements specified in the Federal Records Act, the Presidential and Federal Records Act Amendments of 2014, and its implementing regulations, and the Office of Management and Budget’s (OMB) and NARA’s Managing Government Records Directive. In selecting the requirements for our assessment, we focused on requirements related to electronic records management, such as managing permanent and temporary records, managing email records, and managing electronic records management programs. To assess whether agencies’ policies and procedures addressed the key requirements, we collected and analyzed policies, procedures, and other documentation that described how agencies are positioned to effectively manage electronic records. In particular, we reviewed agencies’ recordkeeping handbooks, agencies’ bulletins, file plans, records schedules, and electronic system user guides. Further, we collected and reviewed documentation that described agencies’ actions or planned actions to meet the specified deadlines in the Managing Government Records Directive. Specifically, we analyzed agencies’ records schedules, reports from NARA’s Senior Agency Official for Records Management’s web page, agencies’ email management system specifications, and agencies’ Capstone approach to email management. We also verified with NARA records management officials whether selected agencies submitted records schedules by the December 31, 2016, deadline specified in the Managing Government Records Directive. We assessed these documents against each of the key requirements to determine each agency’s status in developing policies and procedures to address federal record keeping requirements. Subsequent to our initial assessment, we conducted interviews with records management officials from the 17 selected agencies to discuss steps taken and obtain additional supporting evidence to determine the agencies’ status for implementing key federal recordkeeping requirements. We followed up with those agencies that did not fully address the key federal recordkeeping requirements to determine reasons for their lack of implementation. For the second objective, we reviewed federal laws and guidance, such as the Federal Records Act, NARA regulations, and OMB’s and NARA’s Managing Government Records Directive, to determine NARA’s role and responsibilities in assisting the 17 agencies in managing their electronic records. Subsequently, we collected and analyzed guidance and other documentation from NARA, such as the agency’s Records Management Oversight and Reporting Handbook, Guidance on Senior Agency Officials for Records Management bulletin, and Frequently Asked Questions about Selecting Sustainable Formats for Electronic Records, to determine whether the documentation addressed all of the requirements needed to assist agencies in managing their electronic records. We also analyzed responses in agencies’ fiscal year 2017 and 2018 Senior Agency Official for Records Management reports stating what assistance the agencies would like NARA to provide. We then conducted interviews with NARA’s Chief Records Officer and other agency officials regarding their interactions with the 17 agencies on the use of electronic recordkeeping and implementation of federal records management policies and practices to determine to what extent NARA assisted selected agencies in managing their electronic records. We also conducted interviews with officials from each of the 17 selected agencies to gain insight into how the agencies use the resources provided by NARA. Lastly, we reviewed NARA’s annual self-assessment program that evaluates agencies’ reported compliance with federal records management statutes, regulations, and program functions to obtain information on how NARA was determining which agencies needed assistance with implementing their records management programs. We supplemented our document reviews and analysis with interviews of selected agency officials responsible for records management and NARA agency officials to gain an understanding of these and other relevant documents aimed at helping agencies implement their records management programs. Additionally, to identify which of our selected agencies were to be categorized as small and micro agencies, we used OMB’s definition of small agencies as agencies with fewer than 6,000 employees and micro agencies as agencies having fewer than 100 employees. We conducted our work from March 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We are making a total of 40 recommendations to 14 of the 17 agencies in our review to fully address the electronic recordkeeping requirements in their policies and procedures. The Chief Executive Officer of the Armed Forces Retirement Home should take the following four actions: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 3) Establish a time frame to update its policies and procedures to include all of the required electronic information system functionalities for recordkeeping systems. (Recommendation 4) Establish a time frame to update the agency’s policies and procedures to include the (1) following records management controls required for electronic information systems: usability, content, context, and structure and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 5) Ensure existing policies and procedures describe the rules for using personal email accounts when conducting official agency business to include instructing the employee to (1) copy an official electronic messaging account of the employee in the original creation or transmission of the records and (2) forward a complete copy of the record to an official electronic messaging account of the employee no later than 20 days after the original creation or transmission of the record. (Recommendation 6) The Secretary of Commerce should take the following two actions: Establish a time frame to ensure all records schedules are up-to-date and submitted to NARA. The schedules should include all required information, including when eligible temporary records must be destroyed or deleted and when permanent records are to be transferred to NARA. (Recommendation 7) Ensure the electronic system that manages email provides the capabilities to manage permanent and temporary email records and to identify, retrieve, and retain records. (Recommendation 8) The Director of the Consumer Financial Protection Bureau should take the following action: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 9) The Executive Director of the Election Assistance Commission should take the following five actions: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 10) Establish a time frame to develop a plan on how the agency intends to manage permanent electronic records. (Recommendation 11) Establish a time frame to update its policies and procedures to include all of the required electronic information system functionalities for recordkeeping systems. (Recommendation 12) Establish a time frame to update the agency’s policies and procedures to include the (1) following records management controls required for electronic information systems: content, context, and structure and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 13) Develop a written policy that describes the rules for using personal email accounts when conducting official agency business to include instructing the employee to (1) copy an official electronic messaging account of the employee in the original creation or transmission of the records and (2) forward a complete copy of the record to an official electronic messaging account of the employee no later than 20 days after the original creation or transmission of the record. (Recommendation 14) The Chairman of the Federal Trade Commission should take the following action: Establish a time frame to update the agency’s electronic information system inventory to include the following characteristics: reading and processing the records contained in the system, inputs and outputs, contents of the files and records, and cycle updates. (Recommendation 15) The Chairman of the Marine Mammal Commission should take the following action: Use recently developed policies and procedures to implement and maintain an active, continuing agency records management program that includes policies and procedures to provide for effective controls over the creation, maintenance, and use of records in the conduct of current business. (Recommendation 16) The Administrator of the National Aeronautics and Space Administration should take the following action: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 17) The Director of the National Science Foundation should take the following four actions: Establish a time frame to ensure all records schedules are up-to-date and submitted to NARA. The schedules should include all required information, including when eligible temporary records must be destroyed or deleted and when permanent records are to be transferred to NARA. (Recommendation 18) Establish a time frame to update the agency’s electronic information system inventory to include the following characteristics: technical characteristics of the systems, identify inputs and outputs, and describe update cycles. (Recommendation 19) Establish a time frame to update the agency’s policies and procedures to include all of the records management controls required for electronic information systems and the required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 20) Develop policies and procedures for the required retention and management requirements for email, including instructions to staff to ensure that the names and addresses of the sender, date of message, attachments, calendars, and draft documents will be retained. (Recommendation 21) The Director of the Office of Management and Budget should take the following five actions: Ensure, in conjunction with the Executive Office of the President’s Office of Administration, that existing policies and procedures incorporate the management of electronic records into its overall records management program. (Recommendation 22) Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 23) Establish a time frame to update its policies and procedures to include all of the required electronic information system functionalities for recordkeeping systems. (Recommendation 24) Establish a time frame to ensure, in conjunction with the Office of Administration, that policies and procedures include the (1) following records management controls required for electronic information systems: reliability, context, and structure and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 25) Ensure, in conjunction with the Office of Administration, that existing policies and procedures include the required retention and management requirements for email. (Recommendation 26) The Director of the Office of National Drug Control Policy should take the following three actions: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 27) Establish a time frame to ensure, in conjunction with the Office of Administration, that policies and procedures include the (1) following records management controls required for electronic information systems: reliability, context, and structure; and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 28) Ensure, in conjunction with the Office of Administration, that existing policies and procedures include the required retention and management requirements for email. (Recommendation 29) The Director of the Office of Personnel Management should take the following five actions: Establish a time frame to ensure that all records schedules are up-to- date and submitted to NARA. The schedules should include all required information, including when eligible temporary records must be destroyed or deleted and when permanent records are to be transferred to NARA. (Recommendation 30) Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 31) Establish a time frame to develop a plan to manage permanent electronic records. (Recommendation 32) Establish a time frame to update its policies and procedures to include all of the required electronic information system functionalities for recordkeeping systems. (Recommendation 33) Establish a time frame to update the agency’s policies and procedures on retention and management for email to include retaining electronic calendars and draft documents. (Recommendation 34) The Chief Executive Officer of the Overseas Private Investment Corporation should take the following four actions: Establish a time frame to develop an inventory of electronic information systems used to store agency records that includes all of the required elements. (Recommendation 35) Establish a time frame to develop policies and procedures that define required electronic information system functionalities for recordkeeping systems including declaring records and assigning unique identifiers, capturing records, maintaining security, and preserving records. (Recommendation 36) Establish a time frame to update the agency’s policies and procedures to include the (1) following records management controls required for electronic information systems: reliability, content, context, and structure; and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 37) Establish a time frame to update the agency’s policies and procedures on retention and management for email to include policies for retaining electronic calendars. (Recommendation 38) The Director of the Peace Corps should take the following three actions: Establish a time frame to update the agency’s electronic information systems inventory to (1) specify technical characteristics necessary for reading and processing the records contained in the system, (2) identify system inputs and outputs, (3) define the contents of the files and records, (4) determine restrictions on access and use, and (5) specify how the agency ensures the timely disposition of records. (Recommendation 39) Establish a time frame to update its policies and procedures to include all of the required electronic information system functionalities for recordkeeping systems. (Recommendation 40) Establish a time frame to update the agency’s policies and procedures to include (1) following records management controls required for electronic information systems: usability, context, and structure and (2) required preservation mechanisms to ensure that records in its electronic recordkeeping system will be retrievable and useable. (Recommendation 41) The Executive Director of Udall Foundation should take the following action: Establish a time frame to develop and maintain an active, continuing agency records management program that includes policies and procedures to provide for effective controls over the creation, maintenance, and use of records in the conduct of current business. (Recommendation 42) Nick Marinos, (202) 512-9342, marinosn@gao.gov In addition to the individual named above, Marisol Cruz Cain (Assistant Director), Anjalique Lawrence (Assistant Director), Elena Epps (Analyst- in-Charge), Roger Bracy, Kami Brown, Christopher Businsky, Alan Daigle, Nancy Glover, Charles Hubbard, Lee McCracken; Brian Palmer, and Monica Perez-Nelson made significant contributions to this report.", "summary": "The Federal Records Act , a subsequent directive, and NARA regulations establish requirements for agencies to ensure the transparency, efficiency, and accountability of federal records, including those in electronic form. In addition, NARA plays an important role in overseeing and assisting agencies' records management efforts. GAO was asked to evaluate federal agencies' implementation of the aforementioned requirements related to electronic records. The objectives were to determine the extent to which (1) selected agencies' policies and procedures address the electronic recordkeeping requirements in the Managing Government Records Directive and the Presidential and FRA Amendments of 2014 and (2) NARA assisted selected agencies in managing their electronic records. To do so, GAO selected 17 agencies and reviewed their records management policies and procedures. GAO also reviewed laws and requirements pertaining to NARA's roles and responsibilities for assisting agencies in managing their electronic records. Further, GAO analyzed NARA guidance and other documents that discussed NARA's efforts in carrying out these responsibilities. Seventeen agencies GAO selected for review varied in the extent to which their policies and procedures addressed the electronic recordkeeping requirements in the Managing Government Records Directive and the Federal Records Act ( FRA ) and its amendments. More specifically, 14 of the 17 agencies established records management programs, while three agencies did not. Of those 14 agencies with established records management programs, almost all addressed requirements related to incorporating electronic records into their existing programs, but many did not have policies and procedures to fully incorporate recordkeeping functionalities into electronic systems, establish controls and preservation considerations for systems, and issue instructions on email requirements (see table). NARA provided guidance and assistance to the selected agencies, including guidance on electronic records management and training. All of the agencies stated that the assistance was generally helpful and that they relied on it to some extent for implementing the key requirements discussed in this report. Further, NARA oversaw the selected agencies' implementation of federal records management regulations through their self-assessment progam. However, NARA had not ensured that the selected small or micro agencies that self-assessed to be at high risk of improper records management in calendar year 2017 were taking appropriate actions to make improvements to their records management programs. NARA officials stated they conduct follow-up with the agencies that report poor scores, but they do not proactively require the agencies to address their weaknesses. Until NARA requires these agencies to develop plans to make necessary improvements, these agencies will likely miss important opportunities to improve their record management practices. GAO is making 40 recommendations to 14 of the 17 selected agencies to improve their management of electronic records. GAO is also recommending that NARA (1) require high-risk smaller agencies to create improvement plans and (2) monitor progress on a regular basis. Six agencies, including NARA, agreed with the recommendations, while 11 did not state whether they agreed or disagreed, or had no comments.", "document_type": "gao"}
{"report": "There are three main pillars of retirement income in the United States: Social Security benefits, employer-sponsored or other retirement savings plans, and individual savings and assets. Social Security is a cash benefit that partially replaces earnings when an individual retires or becomes disabled. The monthly benefit amount depends on a worker’s earnings history and the age at which he or she chooses to begin receiving benefits, as well as other factors. Social Security benefits are paid to workers who meet requirements for the time they have worked in covered employment, that is, jobs through which they have paid Social Security taxes. To qualify for retirement benefits, workers must typically have earned a minimum of 40 quarters of coverage (also referred to as credits) over their lifetime. Social Security benefits are calculated based on the highest 35 years of earnings on which workers paid Social Security taxes. Those who wait until the full retirement age, which has gradually increased from 65 to 67, to claim Social Security receive unreduced benefits. Social Security provides larger benefits, as a percentage of earnings, to lower earners than to higher earners. Social Security makes up a large portion of income for many older Americans, and older Americans face greater risk of poverty without Social Security benefits. We previously reported that data from the Federal Reserve Board’s most recent Survey of Consumer Finances showed that in 2016, among households age 65 and over, the bottom 20 percent, ranked by income, relied on Social Security retirement benefits for 81 percent of their income, on average. According to a 2014 Census report, about 43 percent of people age 65 or older would have incomes below the poverty line if they did not receive Social Security. The most common type of employer-sponsored retirement plan is a defined contribution plan, such as a 401(k) plan. Defined contribution plans generally allow individuals to accumulate tax-advantaged retirement savings in an individual account based on employee and employer contributions, and the investment returns (gains and losses) earned on the account. Individuals or employers may make contributions up to statutory limits. Individuals typically pay fees for account maintenance, such as investment management or record keeping fees. An employee may take funds out of the account prior to age 59 ½, but will owe taxes, possibly including an additional tax, for early withdrawal. Workers can also save for retirement through an individual retirement account (IRA). IRAs allow workers to receive favorable tax treatment for making contributions to an account up to certain statutory limits. Most IRAs are funded by assets rolled over from defined benefit and defined contribution plans when individuals change jobs or retire. Individuals must have taxable earnings to contribute to an IRA, and the amount of their contribution cannot exceed their earned income. IRAs also have account maintenance fees, which are generally higher than those charged to participants in employer-sponsored plans. IRAs are a major source of retirement assets. As we reported in 2017, IRAs held about $7.3 trillion in assets compared to $5.3 trillion held in defined contribution plans. Individuals may augment their retirement income from Social Security and employer-sponsored plans with their own savings, which includes any home equity and other non-retirement savings and investments. Non- retirement savings and investments might include income from interest, dividends, estates or trusts, or royalties. Through our review of literature and interviews with experts, we identified several federal and state efforts that may provide support to caregivers: Medicaid. This federal-state health financing program for low-income and medically needy individuals is the nation’s primary payer of long- term services and supports for disabled and aged individuals. Within broad federal requirements, states have significant flexibility to design and implement their programs based on their unique needs, resulting in 56 distinct state Medicaid programs. Under Medicaid requirements governing the provision of services, states generally must provide institutional care to Medicaid beneficiaries, while home and community based long-term services and supports is generally an optional service. All 50 states and the District of Columbia provide long-term care services to some Medicaid beneficiaries in home and community settings under a variety of programs authorized by statute. Some of these programs include self-directed services under which participants, or their representatives if applicable, have decision- making authority over certain services and take direct responsibility for managing their services with the assistance of a system of available supports. Under one such program, participants can hire certain relatives to provide personal care services. Tax-related provisions. Caregivers may be able to use dependent care accounts, tax credits, or tax deductions for financial assistance with caregiving costs. Dependent care accounts are set up through an employer and allow individuals to set aside pre-tax funds to care for a qualifying individual, such as a spouse who is unable to care for himself or herself. As an example of a tax credit, beginning in 2018, caregivers may be eligible to obtain a $500 non-refundable credit for qualifying dependents other than children, such as a parent or a spouse. As an example of a deduction, taxpayers may deduct the cost of qualifying medical expenses. The Family and Medical Leave Act of 1993 (FMLA). This act generally provides up to 12 weeks of unpaid leave per year for eligible employees to help care for a spouse, child, or parent with a serious health condition or for their own serious health condition, among other things. Employees are generally eligible for FMLA leave if they have worked for their employer at least 12 months, at least 1,250 hours over the past 12 months, and work at a worksite where the employer employs 50 or more employees or if the employer employs 50 or more employees within 75 miles of the worksite. The Older Americans Act of 1965. This act was passed to help older individuals remain in their homes and includes grant funding for services for older individuals. Since its reauthorization in 2000, the Older Americans Act of 1965 has provided supports for caregivers through programs such as the National Family Caregiver Support Program. This program provides grants to states to fund a range of supports to help caregivers. For example, the program provides access to respite care. According to the National Institute on Aging, respite care provides in-home or facility-based care by a trained care provider to give the primary caregiver short-term relief from caregiving. Paid sick leave. This form of leave provides pay protection to workers for short-term health needs, and paid family leave is used by employees for longer-term caregiving. No federal sick or paid family leave policy exists. However, as of March 2019, 10 states (AZ, CA, CT, MA, MD, NJ, OR, RI, VT, WA) and the District of Columbia (DC) have guaranteed paid sick days for specific workers, according to the National Partnership for Women and Families, with eligibility varying by state. As of February 2019, six states (CA, NJ, NY, RI, MA, and WA) and DC have paid family leave laws in effect or soon will be implementing them, according to the National Partnership for Women and Families. The covered family relationships, wage replacement rate, and funding mechanism of these programs vary by state. An estimated 45 million people per year provided unpaid eldercare from 2011 through 2017, according to American Time Use Survey (ATUS) data. About 26 million people—roughly one in 10 adults in the U.S. population—cared for their parent or spouse, and about 22 million people cared for other relatives, such as grandparents, aunts and uncles, or non- related adults (see fig. 1). Among parental and spousal caregivers, 88 percent (about 23.4 million people) provided care to a parent, and 12 percent (3.2 million people) provided care to a spouse. About 7.4 million parental or spousal caregivers (close to 30 percent) provided care for more than one person. We examined several demographic and economic characteristics of parental and spousal caregivers compared to the general population. Women and men were almost evenly divided in the general population, but women were more likely than men to be parental or spousal caregivers, according to ATUS data from 2011 through 2017. Women made up 52 percent of the general population, but represented 56 percent of parental caregivers and 63 percent of spousal caregivers (see fig. 2). Parental caregivers were younger than spousal caregivers, but both groups were older, on average, than the general population. The average age of parental caregivers was 50, and the average age of spousal caregivers was 70, according to ATUS data. While about half of the general population was under 45, most parental caregivers were over 50, and most spousal caregivers were over 65 (see fig. 3). While far fewer in number, spousal caregivers were considerably older than parental caregivers. Almost three-quarters of spousal caregivers were over Social Security claiming age for full retirement benefits compared to less than 10 percent of parental caregivers. The racial/ethnic distribution of parental and spousal caregivers was consistent with the general population in that a significant majority of caregivers were white. When compared to the general population, caregivers were more likely to be white and less likely to be minorities. The distribution in the marital status of parental caregivers was similar to the general population in that most people in the general population were married, followed by single, divorced, widowed, and separated. About two-thirds of parental caregivers were married, and not surprisingly, almost all spousal caregivers were married. Parental caregivers were more educated than spousal caregivers and the general population, according to ATUS data. For example, 38 percent of parental caregivers had completed college compared to 26 percent of spousal caregivers (see fig. 4). These differences may reflect that spousal caregivers are generally older and may come from a generation in which women were less likely to attend college. Parental caregivers were more likely to be employed and to have higher earnings than spousal caregivers and those in the general population. Over 70 percent of parental caregivers worked either full-time or part-time compared to 26 percent of spousal caregivers and 62 percent of the general population (see fig. 5). This may be related to the older age of many spousal caregivers, as the percentage of spousal caregivers out of the labor force was about equal to the percentage over age 65. Further, parental caregivers tended to earn higher wages than spousal caregivers. Among wage and salary workers with a single job, parental caregivers earned $931 per week while spousal caregivers earned $513 per week, and the general population earned $743 per week, according to ATUS data. We found that women who provided parental or spousal care were more likely to be employed part-time and to have lower earnings than men who were parental or spousal caregivers (see fig. 6). Women caregivers were less likely to work than men caregivers, but among those who worked, women caregivers were more likely to work part-time, according to ATUS data. For example, among parental caregivers, 66 percent of women were employed either full-time or part-time compared to 77 percent of men, but 17 percent of women worked part-time compared to 10 percent of men. Similarly, among spousal caregivers, women were less likely to be employed than men. In addition, differences in the employment status of women and men caregivers are similar to differences between women and men in the general population. When we examined the distribution of men and women caregivers in earnings quartiles, we found that men caregivers were more likely to be among the highest earners. For parental caregivers, 43 percent of men compared to 25 percent of women were among the highest earners. For spousal caregivers, 22 percent of men compared to 14 percent of women were among the highest earners. Regression results show that these differences between men and women caregivers were significant for parental and spousal caregivers, and remained significant after controlling for caregiver age and years of education. In terms of education, women parental caregivers were more likely to have completed some college or more (69 percent) while women spousal caregivers were less likely to have done so (50 percent) compared to men parental and spousal caregivers (63 and 56 percent, respectively). Similar to the education levels of the parental and spousal caregiving populations generally, these results may reflect generational differences. Spousal caregivers were more likely to provide care daily compared to parental caregivers, and parental caregivers who lived in the same house as their parents were unsurprisingly more likely to provide care daily than those who did not, according to ATUS data. The vast majority of spousal caregivers (81 percent) provided care on a daily basis compared to 21 percent of parental caregivers. When we examined the frequency of caregiving among those who lived in the same house as their parents, we found that about 63 percent of these parental caregivers provided care daily, suggesting there is a positive relationship between frequency of care and cohabitation (see fig. 7). Experts we spoke with said the frequency of care may depend on whether the care recipient has a disability and the type of disability. For example, someone with a severe disability may be more likely to require care daily compared to someone with a less severe disability. Women and minorities tended to provide care more frequently. Among parental and spousal caregivers, 30 percent of women provided care daily compared to 25 percent of men. While the majority of caregivers were white, as discussed above, black and Hispanic caregivers were more likely to provide daily care than white caregivers—35 percent of black caregivers and 39 percent of Hispanic caregivers provided care daily compared to 26 percent of white caregivers (see fig. 8). While most parental caregivers were married, parental caregivers who were never married were more likely to provide daily care than divorced, widowed, separated, and married caregivers. Daily caregiving may be concentrated among those with the fewest financial resources. Parental or spousal caregivers with lower levels of education and earnings were more likely to provide care daily (see fig. 9). For example, 48 percent of caregivers without a high school degree provided care daily compared to 21 percent who had completed college. Those who worked part-time were also more likely to provide care daily compared to those who worked full-time (27 percent versus 18 percent, respectively). Those who provided care daily were also more likely to be among the lowest earners. In addition to examining frequency of care, we also found that most parental or spousal caregivers provided care that lasted several years. The majority of parental or spousal caregivers (54 percent) provided care for at least 3 years, and 16 percent provided care for 10 years or more. On average, parental or spousal caregivers provided care for about 5 years, regardless of gender. The number of years of care provided increased with the age of the parental or spousal caregivers (see fig. 10). Women caregivers, spousal caregivers, and Hispanic caregivers were more likely to provide long-term daily care. Among parental or spousal caregivers who said they provided care daily and provided care for at least 5 years, 61 percent were women. In comparison, among all parental and spousal caregivers, 56 percent were women. Twenty-nine percent of spousal caregivers provided long-term daily care compared to 8 percent of parental caregivers. In addition, 16 percent of Hispanic caregivers provided long-term daily care compared to 10 percent of whites and 12 percent of blacks. An estimated 68 percent of working parental and spousal caregivers said they experienced at least one of eight job impacts about which they were asked, according to our analysis of data used in the 2015 National Alliance for Caregiving and AARP sponsored study, Caregiving in the U.S. The highest percentage of parental and spousal caregivers—more than half—reported that they went in late, left early, or took time off during the day to provide care (see fig. 11). Spousal caregivers were more likely to experience adverse job impacts than parental caregivers. About 81 percent of spousal caregivers said they experienced at least one of the eight job impacts they were asked about compared to 65 percent of parental caregivers. Spousal caregivers were more likely to reduce their work hours, give up work entirely, or retire early, compared to working parental caregivers. For example, 29 percent of spousal caregivers said they went from working full-time to part-time or cut back their hours due to caregiving, compared to 15 percent of parental caregivers. Our prior work has reported that some older workers felt forced to retire for professional or personal reasons and that individuals approaching retirement often have to retire for reasons they did not anticipate, including caregiving responsibilities. In addition, our prior work has reported that job loss for older workers, in general, can lead to lower retirement income, claiming Social Security early, and exhaustion of retirement savings. We also found that older workers face many challenges in regaining employment. Consistent with these results, we also found that spousal caregiving was negatively associated with the number of hours caregivers worked. Specifically, spousal caregivers who were ages 59 to 66 worked approximately 20 percent fewer annual hours than married individuals of the same age who did not provide spousal care, according to HRS data from 2002 to 2014. We found that spousal caregivers who were at or near the age of full retirement eligibility had lower levels of IRA assets, non-IRA assets, and Social Security income compared to those who did not provide care. We did not detect the same relationship between parental caregiving and retirement income, which may be due, in part, to the older age of the caregivers we examined. Spousal caregivers at or near retirement age had lower levels of retirement assets and income compared to married individuals who did not provide spousal care. Spousal caregivers tended to have lower levels of IRA assets, non-IRA assets—such as real estate or stocks—and Social Security income than non-caregivers (see table 1). After controlling for certain characteristics of caregivers, we found that spousal caregivers still had less retirement assets and income than non- caregivers. For example, spousal caregivers had an estimated 39 percent less in non-IRA assets than non-caregivers, after controlling for characteristics such as level of education and race/ethnicity. When we compared women and men spousal caregivers, we found both had less in IRA and non-IRA assets than non-caregivers, but only women had less in Social Security income. Specifically, we found that women and men caregivers had 37 to 54 percent less in IRA and non-IRA assets than non-caregivers, after controlling for demographic and other characteristics. However, the effect of spousal caregiving on Social Security income was only significant among women. Women caregivers had 15 percent less in Social Security income than married women who did not provide care. Many older Americans rely on Social Security for a significant portion of their retirement income. Therefore, a lower Social Security benefit could have serious consequences for these individuals’ retirement security. One possible explanation experts offered for why spousal caregivers may have less in retirement income and assets than non-caregivers is that the care recipient may be in poor health, resulting in reduced workforce participation of both members of the household, which could then have a large negative impact on household wealth. This scenario could leave spousal caregivers in a precarious financial situation heading into retirement. We did not find that parental caregivers at or near retirement age had lower levels of retirement assets or income than non-caregivers. We compared the retirement assets and income of parental caregivers to the retirement assets and income of individuals who did not provide parental care and did not find a statistically significant effect of parental caregiving on IRA assets, non-IRA assets, defined contribution balances, or Social Security income. See appendix I for more information on this analysis. We may not have seen a significant effect of parental caregiving for a few reasons. First, because of the scope of the HRS data we used, we limited the analysis to individuals who provided care in the 6 years leading up to ages 65 or 66. Therefore, this analysis does not capture the possible effects of parental caregiving prior to age 59, which may be during the middle of a person’s career or during their peak earning years. Second, similar to spousal caregivers, experts said a caregiver may reduce their workforce participation to care for a parent; however, parental caregiving may not affect household income because married caregivers’ spouses may be able to continue working and offset any lost earnings. In addition, unlike spousal care, parental care may be provided by multiple individuals, so the effect on retirement security may be distributed across siblings. Our analysis could not definitively identify the causal effect or lack of effect of caregiving on retirement income due to three main limitations. First, because caregiving is not random but is a function of an individual’s circumstances, it is difficult to isolate its effect. For example, individuals who provide care may do so because they have jobs that are more flexible, or because they have better family support. Second, there may be other ways of providing care beyond an individual giving their time that were not captured in the HRS data and therefore could not be included in our analysis. For example, a child may provide financial assistance to a parent rather than providing time. However, the HRS does not capture whether financial help to parents was specifically used for caregiving expenses. Third, common to analyses of this type, alternate measures of certain variables may produce different estimates. For example, we controlled for a caregiver’s level of education based on data included in the HRS; however, a measure of education that included the type of education, such as whether the person was a trained caregiver, might have changed our estimates. As a result of these limitations, our estimates may not capture the effect of caregiving on retirement income for the broader population. Our analysis of literature and expert interviews found that parental or spousal caregivers could face several retirement security challenges: Caregivers may have high out–of-pocket expenses. Caregivers may face immediate out-of-pocket expenses that could make it difficult to set aside money for retirement or that could require them to prematurely withdraw funds from existing retirement accounts. These financial burdens can include, for example, travel and medical expenses for a care recipient. AARP’s study, Family Caregiving and Out-of-Pocket Costs, estimated that family caregivers spent an average of nearly $7,000 on caregiving costs in 2016. Caregiving costs amounted to about 14 percent of income for white family caregivers and 44 percent and 34 percent for Hispanic and black caregivers, respectively. Caregivers may reduce their workforce participation. In addition to foregone earnings, caregivers who reduce their workforce participation may also lose access to employer-provided retirement benefits, such as participating in an employer-sponsored 401(k) plan or receiving an employer’s matching contributions. About 68 percent of working parental and spousal caregivers reported job impacts due to caregiving responsibilities, which included reducing their workforce participation. For those who leave the workforce, re-entry can be challenging, and wages and retirement savings can be negatively affected long-term. Caregivers may not contribute to retirement accounts. Caregivers may face challenges contributing to retirement accounts due to caregiving, and some working caregivers may not be eligible for employer-sponsored retirement benefits. For example, some part-time employees may not be eligible to participate in employer-sponsored retirement plans, or some employees may lose access if they reduce their workforce participation. Individual and employer-sponsored retirement accounts serve as important supplements to Social Security as income replacements in retirement. Caregivers may have lower Social Security benefits. Caregivers may have less in Social Security benefits if they reduce their workforce participation. Social Security benefits are calculated using the highest 35 years of earnings. If a caregiver retires after working for 33 years, he or she would have 2 years of zero income in their benefit calculation, which would result in lower benefits throughout retirement compared to what their benefit would have been if they had a full 35- year earnings history. Social Security makes up a large portion of retirement income from many older Americans, so a lower Social Security benefit could have significant consequences for financial security. We identified four policy categories that could potentially address retirement security challenges faced by caregivers. To do so, we identified specific actions that could improve caregivers’ retirement security based on a review of literature and interviews with experts. We then grouped these actions into four categories: 1) decrease caregivers’ out–of-pocket expenses, 2) increase caregivers’ workforce attachment and wage preservation, 3) increase caregivers’ access or contributions to retirement accounts, and 4) increase caregivers’ Social Security benefits. See figure 12 for example actions in each category. Experts we interviewed identified potential benefits of each of the four policy categories. They also identified specific groups of parental or spousal caregivers who could benefit, including women, lower-income caregivers, and working caregivers (see table 2). As discussed previously, women were more likely to provide parental and spousal care, to work part-time, and to have lower earnings than men caregivers. In addition, over one-third of parental caregivers and almost two-thirds of spousal caregivers were in the bottom two income quartiles, and caregivers in the bottom earnings quartile were more likely to provide care daily. Experts also said all four categories have potential costs and challenges (see table 3). Experts identified three implementation issues that would need to be addressed regardless of the policy category. Determining responsibility for implementation. It is unclear who would be responsible for implementing and funding certain actions under each approach, according to experts. Some may require legislative changes, steps by employers, or public-private partnerships that integrate both sectors. The RAISE Family Caregivers Act enacted in January 2018 requires the Department of Health and Human Services (HHS) to develop a strategy, including recommendations related to financial security and workforce issues, to support family caregivers and to convene an advisory council to help develop the strategy. The advisory council will include representatives from federal agencies, employers, state and local officials, and other groups. Between October 12, 2018 and December 3, 2018, HHS sought nominations for individuals to serve on the advisory council. Defining caregiving for benefit eligibility. Experts said some actions may require a definition of caregiving to use in determining eligibility for benefits. Current definitions related to federal caregiving policy vary. For example, FMLA defines a caregiver by specific familial relationships. In contrast, the RAISE Family Caregivers Act defines a family caregiver more broadly as an “adult family member or other individual who has a significant relationship with, and who provides a broad range of assistance to, an individual with a chronic or other health condition, disability, or functional limitation.” Identifying and verifying caregivers. Experts said some actions may require a mechanism for identifying and verifying a caregiver’s status. Experts noted that many caregivers do not identify themselves as such, particularly those caring for a spouse, and therefore do not claim existing benefits. In addition, certain actions may require a decision about whether benefits extend to the primary caregiver or to all caregivers, for example, siblings who may jointly provide care to a parent. Several experts we interviewed said caregivers could benefit more from a retirement system that incorporates actions across the policy categories so that actions can work in tandem to address caregivers’ needs. For example, if caregivers have lower out-of-pocket caregiving costs, they might be able to contribute more to their retirement savings. If caregivers can contribute more to their retirement savings because they have better access to accounts, they might have to rely less on Social Security in retirement. Some experts pointed to Hawaii’s Kupuna Caregivers Program as an example of a program with complementary goals—to alleviate out-of-pocket expenses and reduce barriers to staying fully employed while providing care for a family member. Specifically, according to experts, the program provides a financial benefit of $70 per day for up to 365 days to caregivers who work at least 30 hours a week to spend on respite care, home health care workers, meal preparation, and transportation costs for a care recipient age 60 or older. Although the program is in the early stages of implementation, experts said several states already see it as a model for meeting these two goals. Experts also said it would be helpful to implement actions that address the needs of caregivers in the long- and short-term and across their lifespans. In general, experts said each of the policy categories could help longer-term caregivers more than short-term caregivers. However, they said certain actions to decrease caregivers’ out-of-pocket expenses or to increase workforce attachment could also help in addressing immediate needs. For example, experts said actions such as paid time off and flexible work schedules could help those caring for individuals with acute conditions to attend doctor’s appointments. Experts also said policies should address the needs of caregivers with different levels of workforce attachment. For example, one expert said there are disparate policy impacts to consider depending on whether someone is a salaried worker, an hourly worker, or a caregiver who does not work. Similarly, someone who depends on other types of government assistance, such as Social Security Disability Insurance, may also have different needs. Another expert said the age at which caregiving takes place may impact retirement security; people may be caring for older parents or a spouse at a point in their careers when they are supposed to be catching up on retirement contributions or have peak earnings, so they may not be able to make up for lost time in terms of retirement savings. Finally, several experts mentioned public awareness as critical to helping people understand the implications of caregiving on retirement security. They stressed the importance of financial literacy and making caregivers aware of existing and new benefits. Experts said people are not well informed about their Social Security benefits or their options for private retirement savings. In addition, it can be difficult to understand the long- term impacts of becoming a caregiver, and experts pointed to the need for education about how the decision, along with those to leave the workforce or reduce workforce participation, could affect caregivers’ long- term financial security. One expert noted that education and services that help families proactively think about their financial security and plan for caregiving needs could be useful. Educating the public about what supports exist, new supports as they become available, and eligibility and enrollment procedures, is critical to ensuring caregivers take advantage of available supports. We provided a draft of this report to the Department of Labor, the Department of Health and Human Services, the Department of the Treasury, and the Social Security Administration for review and comment. The Departments of Labor, Health and Human Services, and the Treasury provided technical comments, which we incorporated as appropriate. The Social Security Administration told us they had no comments on the draft report. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretaries of Labor, Health and Human Services, and Treasury, the Acting Commissioner of Social Security, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix IV. The objectives of this review were to (1) examine what is known about the size and characteristics of the parental and spousal caregiving population, including differences among women and men; (2) examine the extent to which parental or spousal caregiving affects retirement security; and (3) identify and discuss policy options and initiatives that could improve caregivers’ retirement security. This appendix provides information about the methods we used to answer these questions. Section I describes key information sources we used, and section II describes the empirical methods we used to answer the first and second research questions and the results of supplementary analyses. To answer our research questions, we analyzed data from three nationally representative surveys—the American Time Use Survey (ATUS), the Health and Retirement Study (HRS), and Caregiving in the U.S.—conducted an extensive literature search, and interviewed relevant experts or stakeholders. This section provides a description of our data sources and the steps we took to ensure their reliability for the purposes of our review. To answer the first objective, we analyzed data collected through ATUS’ eldercare module from 2011 through 2017, the most recent year of data available. The ATUS—which is sponsored by the Bureau of Labor Statistics and conducted by the U.S. Census Bureau—provides nationally representative estimates of how, where, and with whom Americans spend their time. Individuals interviewed for the ATUS are randomly selected from a subset of households that have completed their eighth and final month of interviews for the Current Population Survey (CPS). Starting in 2011, the ATUS began asking questions about eldercare. We weighted the data and calculated relative standard errors to reflect CPS guidance on the sample design. A relative standard error is equal to the standard error of a survey estimate divided by the survey estimate. We analyzed data used in the 2015 Caregiving in the U.S. study sponsored by the National Alliance for Caregiving and the AARP Public Policy Institute to estimate job impacts of parental and spousal caregiving for working caregivers. The survey was conducted through online interviews. To identify caregivers, respondents were asked whether they provided unpaid care to a relative or friend 18 years or older to help them take care of themselves. Respondents were also asked to whom they provided care, which allowed us to identify parental and spousal caregivers. We considered someone to be a parental caregiver if they provided care to a parent or a parent-in-law. We considered someone to be a spousal caregiver if they provided care to a spouse or partner. To determine the job impacts of caregiving, respondents were asked whether they were currently employed while providing care or whether they were employed in the last year while providing care and whether they experienced any of the following job impacts as a result of caregiving: Went in late, left early, or took time off during the day to provide care Went from working full-time to part-time, or cut back hours Took a leave of absence Received a warning about performance or attendance at work Gave up working entirely Turned down a promotion Lost any job benefits All estimates derived from random samples are subject to sampling error. All percentage estimates from this survey have margins of error at the 95 percent confidence level of plus or minus 5 percentage points or less, unless otherwise noted. To analyze the effects of caregiving on retirement security, we analyzed data collected through the HRS, a nationally representative survey sponsored by the National Institute on Aging and the Social Security Administration and conducted by the Survey Research Center at the University of Michigan’s Institute for Social Research. This biennial longitudinal survey collects data on individuals over age 50 and contains information on unpaid parental and spousal caregivers. Each biennial period is referred to as a “wave.” The HRS includes both members of a couple as respondents. There are currently 12 waves of core data available from 1992 to 2014 with about 18,000 to 23,000 participants in any given wave. The initial 1992 cohort consisted of respondents who were then ages 51 to 61, and these respondents have been interviewed every 2 years since 1992. New cohorts have been added over time to maintain the representation of the older population from pre-retirement through retirement and beyond. We used data from 2002 to 2014 for our analyses; we did not use data prior to 2002 because data on spousal caregivers were formatted differently. We adjusted asset and income values for inflation. We weighted the data and calculated standard errors to reflect HRS guidance on the sample design. For each of the datasets described above, we conducted a data reliability assessment of variables included in our analyses. We reviewed technical documentation, conducted electronic data tests for completeness and accuracy, and contacted knowledgeable officials with specific questions about the data. We determined that the variables we used from the data we reviewed were sufficiently reliable for the purposes of describing and comparing the caregiving populations to each other or to non-caregivers. We also cited studies conducted by other researchers to supplement our findings; each of these studies was reviewed by two social scientists with expertise in research methodology and was found to be sufficiently methodologically sound for the purposes of supplementing our descriptions or comparisons. To gain an understanding of policy options that could improve caregivers’ retirement security, we reviewed prior GAO work, conducted an extensive literature review of journal articles, working papers, and think-tank studies on caregiving and topics related to retirement security, and conducted preliminary interviews with experts in caregiving or retirement security. Based on this information, we identified specific actions that could affect caregivers’ retirement security, which we categorized into four different categories based on common themes. We then conducted semi- structured interviews with or received written responses from a range of experts and stakeholders—including some of the experts we met with to identify specific policy actions—to obtain their views on the benefits and costs of the specific policy options and approaches we identified, and we also asked them to identify any additional actions. We selected experts and stakeholders who are engaged in research or advocacy around caregiving or retirement issues, or those who might be affected by the actions identified. We also aimed to interview experts or stakeholders who might have different viewpoints regarding the identified actions. See table 4 for a list of the experts or stakeholders we interviewed or received written comments from over the course of our work. This section discusses the quantitative analysis methods we used to describe the characteristics of parental and spousal caregivers and the regression analyses we conducted to estimate the impact of caregiving on retirement security. We used ATUS and HRS data for these analyses. To describe the characteristics of parental and spousal caregivers, we conducted descriptive analyses to examine differences between parental and spousal caregivers and the general population. For all univariate and multivariate statistics calculated using the ATUS data, we constructed variance estimates using replicate weights. The ATUS eldercare module defines caregiving as “assisting or caring for an adult who needed help because of a condition related to aging.” The eldercare module contains one observation per eldercare recipient, and for each recipient, includes information about the duration of care provided to the recipient, the age of the recipient, the relationship of the recipient to the care provider, and whether the care recipient and the care provider share a household. To analyze data on eldercare providers rather than recipients, we restructured the data into a single observation per care provider. While any given care provider could provide care to multiple recipients, we defined care provider types as follows: Spousal caregivers were those who provided care to a spouse or cohabiting domestic partner, regardless of whether they also provided care to another person. Parental caregivers were those who provided care to a parent or parent-in-law, regardless of whether they also provided care to another person. Caregivers of another relative were those who provided care to someone related to them (such as a grandparent or aunt or uncle), regardless of whether they also provided care to another person. Caregivers of a non-relative were those who provided care to an unrelated person, such as a friend or neighbor, regardless of whether they also provided care to another person. Data on frequency of care—how often a respondent provided eldercare— is collected once for each care provider, rather than for each recipient, and therefore did not require restructuring. However, as noted above, data on the duration of care—how long a respondent provided care—is collected for each care recipient. Therefore, we analyzed the duration of care for the relevant care recipient (parent or spouse) using the same caregiver types as described above. For example, if someone provided both parental and spousal care, the duration of care for the relevant recipient would be used. We conducted descriptive analyses to examine parental and spousal caregivers’ characteristics including gender, age, race and ethnicity, marital status, level of education, employment status, and earnings. The following are important considerations of these analyses: Age. We examined caregivers who provided care to an adult recipient of any age, and, except where indicated in the text, we compared the characteristics of adult caregivers to the general adult population of all ages. We used four age categories (15 to 44, 45 to 50, 51 to 64, and 65 and older). We chose these age groups so that we could examine the characteristics of care providers with a similar age profile to those we examine in our analysis of household income and assets. Presence of a living parent. We did not have information in the ATUS to determine whether those who provided parental care had living parents; therefore, our analyses included all parental caregivers who said they provided care to a parent or parent-in-law within the past three to four months, even if the parent was deceased by the time of their interview. Certain analyses, where indicated in the text, control for the presence of a parent in the respondent’s household. Earnings. ATUS provides current information on respondent’s usual weekly earnings at their main job. Because we did not have current information on earnings from all jobs, for this analysis only, we restricted the sample to those respondents who have a single job. Because we did not have current information on self-employment income, we restricted our analysis of earnings to those respondents who are wage and salary workers. In our report, we present data on the unadjusted demographic and economic characteristics of caregivers and the general population. We present the unadjusted characteristics so that readers can view the actual demographic profile of caregivers. However, we also conducted logistic regression analyses that predict the likelihood of caregiving as a function of various demographic and economic characteristics and found that most characteristics are qualitatively similar in the multivariate and univariate context. Our independent variables for this multivariate analysis were age, education, gender, marital status, race, ethnicity, and labor force status—employed, unemployed, or not in the labor force. Where indicated, as mentioned above, we included a categorical variable for whether the respondent’s parent lives in the respondent’s household. Where indicated, we included quartiles of usual weekly earnings; in logistic regressions that included weekly earnings as an independent variable, the analyses were restricted to wage and salary workers with a single job. See appendix III for more detail about these logistic regression analyses. To analyze the impact of caregiving on retirement assets and income, we compared the assets and retirement income of caregivers and non- caregivers. We conducted separate analyses for each type of care, as described below. To determine the effect of spousal caregiving on retirement security, we took two approaches: 1. We conducted descriptive analyses to examine differences between spousal caregivers and non-caregivers in terms of assets at or near retirement and Social Security income during retirement. We also examined differences between spousal caregivers and non-caregivers in terms of work, education, and health status of both the person providing and the person receiving care. 2. We conducted regression analyses to examine whether observed differences in assets and Social Security income were still statistically significant when we controlled for these differences in the spousal caregiving and non-caregiving populations. In order to construct our analysis sample of spousal caregivers, we took the following steps. First, we identified married individuals at ages 65 or 66. We chose these ages because they are at or near the full retirement age at which individuals can receive unreduced Social Security benefits. We then identified the respondents that provided spousal care in the current wave or in the prior two waves of data, a 6-year period of time. To determine whether someone provided spousal care, the HRS asks the respondent whether they received help with activities of daily living (ADLs) or with instrumental activities of daily living (IADLs) and who helped with these activities. If the respondent indicated that their spouse or partner provided help, we then identified that person as a spousal caregiver. This resulted in a sample of about 5,000 observations. We found that about 10 percent of the sample provided spousal care in the 6 years we examined. We also obtained information on the asset levels, hours worked, and other descriptive attributes at ages 65 or 66. To determine the level of Social Security retirement income, we looked ahead to the household’s Social Security income at age 71 using data from future waves of the HRS because some individuals may receive benefits at a later age. We found differences between spousal caregivers and non-spousal caregivers, and differences were often statistically significant (see table 5). As the table shows, spousal caregivers tended to have lower asset levels—IRA assets, non-IRA assets, or defined contribution account balances—as well as lower levels of Social Security income. Although the asset levels of spousal caregivers did not increase as much as for non-caregivers, the differences were not statistically significant. Spousal caregivers also tended to work fewer hours, were less likely to have a college degree, and were more likely to be in self-reported poor or fair health. Spouses receiving care also had different characteristics than spouses not receiving care, indicating that the care recipient also could affect household assets. Spouses receiving care tended to work less and to be in poorer self-reported health. Spouses receiving care also worked fewer hours—1,100 compared to 2,700 for spouses who did not receive care (see table 5). About 66 percent of spouses that received care were in self-reported fair or poor health, as opposed to 15 percent of those who did not receive care. We also compared differences between spousal caregivers and non- caregivers by gender (see table 6). We found some of the same differences between men and women spousal caregivers and non- caregivers as we did among spousal caregivers and non-caregivers more generally. However, there were also additional differences. For example, among women, growth in assets was larger among caregivers, and was statistically significant. However, differences in the cumulative hours worked was not statistically significant. In order to investigate whether observed differences in retirement assets or income might be due to factors other than caregiving, we controlled for additional variables using a multiple regression. Specifically, we generated a binary variable which took the value of one if the respondent had provided spousal care and took the value of zero if not and examined the estimated coefficient on this variable. We ran six different regression models for each of the assets, with six different sets of controls, in addition to the spousal caregiving variable. The different models are as follows, with each building on the model prior. Unless otherwise noted, the findings presented in the report are from model 5. Model 1 estimated the differences, with only controls for the year of the wave. This helps control for the effects that would be experienced by all retirees in that year, like an economic recession. Model 2 included the controls from model 1 and also whether the person has a college degree. This helps control for the effects of education on assets and income. Model 3 included the controls from models 1 and 2 as well as earnings for the respondent in the period before we observed them caregiving. This helps control for caregivers having lower earnings before caregiving, which could affect assets and income. Model 4 included the controls from models 1, 2, and 3 and also demographic characteristics, such as race and ethnicity, which can be associated with assets or income. Model 5 included the controls from models 1, 2, 3, and 4 and also controlled for the self-reported health of the potential caregiver. Model 6 included the controls from models 1, 2, 3, 4, and 5 and also controlled for the self-reported health of the potential care recipient. Having a spouse in poor health might affect assets or income, even if no caregiving was provided. We estimated effects on four different types of assets and income at ages 65 and 66: IRA assets, non-IRA assets, defined contribution balances, and Social Security income (see table 7). We took the logarithm of the value before running the regression to normalize the distribution. We also considered the possibility that caregiving might not only affect the level of assets, but might affect the accumulation or growth of assets. We did that by including models that estimated the effect on the growth of IRA and non-IRA assets. The table below shows the parameter estimates of the effect of spousal caregiving with different levels of controls or dependent variables. In the table, the columns represent the different models (1 through 6). The rows represent different dependent variables—different types of assets or Social Security income for which we estimated the effect of spousal caregiving. In the table, the upper panel shows the effects on women’s assets and income based on caregiving. The middle panel shows the effects on men’s assets and income based on caregiving, and the final panel shows the effect when the men’s and women’s samples were pooled. As the table shows: For women, men, and when the sample was pooled, we found significant negative effects of spousal caregiving on both IRA and non-IRA assets. However, the coefficient decreased in magnitude when we added additional controls. For example, when we controlled for the health of the person receiving the help, the coefficient almost fell by half, from about .5 to about .25 in the case of non-IRA assets. This indicates that it is difficult to differentiate the effect of spousal caregiving from the effect of having a spouse in poor self-reported health. For women, men, and when the sample was pooled, we found significant negative effects of spousal caregiving on Social Security income. But for men, the effect was only significant at the 10 percent level for models with fewer controls. In addition, when we added controls for demographics and health, the effect for men no longer was significant. For the growth of assets, we found negative effects for non-IRA assets for women, but not for men and not for the pooled sample. However, the effects were only significant at the 10 percent level and not significant when we controlled for the health of the care recipient. In addition to the regression coefficients, we also calculated the differences in percent terms, which may be easier to interpret (see table 8). We found results that were strongest when comparing women spousal caregivers to women who did not provide spousal care. The effect for women was resilient to the inclusion of controls. In the model that included the health of the recipient (model 6), the effect ranged from a 40 percent reduction in IRA assets, to an 8 percent reduction in household Social Security income. For men, we found effects for IRA assets, but the effects for Social Security income were not resilient to the inclusion of controls besides the education of the recipient. To determine the effect of parental caregiving on retirement security, we conducted descriptive analyses to examine differences between parental caregivers and non-caregivers in terms of assets at or near retirement age and Social Security income during retirement. In order to construct our analysis sample of parental caregivers, we took the following steps. First, we identified individuals at age 65 or 66 who had living parents or parents-in law. We made this restriction because having living parents at ages 60 to 66 (and the opportunity to provide care) might be associated with higher socio-economic strata. Therefore, we did not want to compare caregivers to those who did not provide care because their parents were deceased. We then identified the respondents that provided parental care in the current wave or in the prior two waves of data. To determine who is a parental caregiver, the HRS asks respondents two separate questions. The first asks whether a respondent spent a total of 100 hours or more since their last interview or in the last 2 years helping a parent or parent-in-law with basic personal activities like dressing, eating, or bathing. The second question asks whether a respondent spent a total of 100 hours or more since their last interview or in the last 2 years helping a parent or parent-in-law with other things, such as household chores, errands, or transportation. We limited the analysis to those with living parents or in-laws. This resulted in a sample of about 2,499 observations. We found that about 57 percent of the sample provided parental care in the 6 years we examined. Unlike our analysis of spousal caregivers, we found that parental caregivers had higher levels of assets at or near retirement than non- caregivers, but differences between parental caregivers and non- caregivers were not statistically significant (see table 9). The following tables provide information about the characteristics of various types of eldercare providers. Table 13 shows the adjusted odds of providing care for people with different economic and demographic characteristics, from multivariate analyses. Models 1, 2, 3 and 4 show the adjusted odds of providing parental care, and models 5 and 6 show the adjusted odds of providing spousal care. Model 1 estimates the probability of providing parental care as a function of gender, age, marital status, race, education, and labor force status. Model 2 estimates the probability of providing parental care as a function of gender, age, marital status, race, education, and income quartiles. This model is restricted to employed workers, and therefore does not include labor force status as a regressor. Model 3 is identical to model 1, except that model 3 includes an indicator for whether the parental caregiver and the parental care recipient live in the same household. Model 4 is identical to model 2, except that model 4 includes an indicator for whether the parental caregiver and the parental care recipient live in the same household. Model 5 estimates the probability of providing spousal care as a function of gender, age, marital status, race, education, and labor force status. Model 6 estimates the probability of providing spousal care as a function of gender, age, marital status, race, education, and income quartiles. Like model 2, this model is restricted to employed workers, and therefore does not include labor force status as a regressor. In addition to the contact named above, Erin M. Godtland (Assistant Director), Nisha R. Hazra (Analyst-in-charge), Benjamin Bolitzer, Jessica Mausner, and Rhiannon C. Patterson made key contributions to this report. Also contributing to this report were Susan Aschoff, Deborah Bland, Justin Fisher, Avani Locke, Michael Naretta, Mimi Nguyen, Rachel Stoiko, Shana Wallace, and Adam Wendel.", "summary": "According to the U.S. Census Bureau, the number of people in the United States over age 65 is expected to almost double by 2050. As Americans age, family caregivers, such as adult children and spouses, play a critical role in supporting the needs of this population. However, those who provide eldercare may risk their own long-term financial security if they reduce their workforce participation or pay for caregiving expenses. GAO was asked to provide information about parental and spousal caregivers and how caregiving might affect their retirement security. This report (1) examines what is known about the size and characteristics of the parental and spousal caregiving population, including differences among women and men; (2) examines the extent to which parental or spousal caregiving affects retirement security; and (3) identifies and discusses policy options and initiatives that could improve caregivers' retirement security. GAO analyzed data from three nationally representative surveys; conducted an extensive literature review; and interviewed experts who are knowledgeable about caregiving or retirement security, engaged in research or advocacy around caregiving, or represent groups that might be affected by the identified policy approaches. An estimated one in 10 Americans per year cared for a parent or spouse for some period of time from 2011 through 2017, and women were more likely than men to provide care, according to Bureau of Labor Statistics survey data. Both parental and spousal caregivers were older than the general population, with spousal caregivers generally being the oldest. In addition, spousal caregivers were less likely to have completed college or to be employed, and they had lower earnings than parental caregivers and the general population. Most parental and spousal caregivers provided care for several years, and certain groups were more likely to provide daily care, including women and minorities. Some caregivers experienced adverse effects on their jobs and had less in retirement assets and income. According to data from a 2015 caregiving-specific study, an estimated 68 percent of working parental and spousal caregivers experienced job impacts, such as going to work late, leaving early, or taking time off during the day to provide care. Spousal caregivers were more likely to experience job impacts than parental caregivers (81 percent compared to 65 percent, respectively). According to 2002 to 2014 data from the Health and Retirement Study, spousal caregivers ages 59 to 66 had lower levels of retirement assets and less income than married non-caregivers of the same ages. Specifically, spousal caregivers had an estimated 50 percent less in individual retirement account (IRA) assets, 39 percent less in non-IRA assets, and 11 percent less in Social Security income. However, caregiving may not be the cause of these results as there are challenges to isolating the effect of caregiving from other factors that could affect retirement assets and income. Expert interviews and a review of relevant literature identified a number of actions that could improve caregivers' retirement security, which GAO grouped into four policy categories. Experts identified various benefits to caregivers and others from the policy categories—as well as pointing out possible significant costs, such as fiscal concerns and employer challenges—and in general said that taking actions across categories would help address caregivers' needs over both the short-term and long-term (see figure). Several experts also said public awareness initiatives are critical to helping people understand the implications of caregiving on their retirement security. For example, they pointed to the need for education about how decisions to provide care, leave the workforce, or reduce hours could affect long-term financial security.", "document_type": "gao"}
{"report": "The Great Lakes Pilotage Act of 1960 established the system of compulsory pilotage on the Great Lakes. Senate committee reports accompanying the legislation indicate pilotage requirements in the Great Lakes were established because they were viewed as essential to helping ensure maritime safety. The committees also recognized that international coordination between the United States and Canada would be required at a federal level and the act specifically precludes any state, municipality, or local authority from regulating any aspect of pilotage in the waters of the Great Lakes-Seaway. All oceangoing commercial vessels are required to use U.S. or Canadian registered pilots during their transit through regulated waters of the Great Lakes-Seaway. Generally, these vessels are assigned a U.S. or Canadian pilot depending on (1) the order in which they transit a particular area of the Great Lakes-Seaway and (2) their destination port(s). Vessels do not choose which pilot they receive. The U.S. waters of the Great Lakes-Seaway are divided into three pilotage districts, each operated by an association of independent pilots certified by the Coast Guard (see figure 1). The registered pilots only operate within their designated district and do not cross district boundaries. If a vessel needs to cross a district boundary to reach the next port, there will be a change of registered pilots at predetermined locations. Each pilotage district is further divided into “designated” and “undesignated” areas. Designated areas of the Great Lakes-Seaway include areas that are generally more challenging to navigate and require pilots to be fully engaged in the navigation of vessels in their charge at all times. In undesignated areas, which are generally open bodies of water, pilots are required to be “on board and available to direct the navigation of the vessel at the discretion of and subject to the customary authority of the master.” Given the size of the Great Lakes-Seaway, and depending on the port calls planned, registered pilots can be onboard vessels for multiple days. This contrasts with marine pilot transits in most U.S. coastal waters that may be just a few miles each way. Commercial vessels transiting the Great Lakes-Seaway are also generally smaller than many of the vessels that operate at coastal ports. As a result, pilotage fees typically represent a greater proportion of the vessel costs than many larger commercial vessels operating in coastal waters. Pursuant to the Great Lakes Pilotage Act of 1960, the Coast Guard regulates the operation of U.S. pilotage services and establishes the rates they may charge. These rates are to be established through a full rulemaking process at least every 5 years, but must be reviewed and adjusted on an annual basis. The rate-setting process currently includes a 10-step methodology generally designed to account for the estimated annual revenues needed by registered U.S. Great Lakes pilots to provide pilotage services and total vessel traffic expected in each of the three U.S. pilotage districts. (See appendix I for further details on the pilotage rate-setting methodology.) Among other regulatory roles, the U.S. Coast Guard is also responsible for developing competency standards for pilot training and issuing pilot registrations, providing oversight of the pilot associations, and determining the total number of authorized pilots operating in the U.S. waters of the Great Lakes-Seaway. For the 2019 shipping season, 54 U.S. pilots were authorized to serve the Great Lakes- Seaway. The Great Lakes Pilotage Advisory Committee (GLPAC) was established in November 1998 to provide advice and make recommendations to the Coast Guard on matters relating to Great Lakes pilotage. The GLPAC, which meets at least once annually, is comprised of seven members that include the presidents of the three U.S. Great Lakes-Seaway pilotage districts; three members that represent the ports, shipping industry, and vessel operators, respectively; and one member with a finance and accounting background that is selected by unanimous vote of the other six members. The number of U.S. pilots in the Great Lakes-Seaway decreased from 44 in 2007 to 36 in 2014, which, according to the Coast Guard, resulted in pilot shortages and contributed to shipping delays. In 2016, the Coast Guard initiated a number of changes to its pilotage rate-setting methodology that were intended, in part, to provide sufficient pilot compensation to attract, hire, and retain appropriate numbers of qualified Great Lakes pilots. As shown in Figure 2, after continuing to increase between 2014 and 2016, hourly rates for U.S. pilotage services in 4 of the 6 pilotage areas of the Great Lakes-Seaway were reduced for the 2017 shipping season. Since 2017, they have increased by about 10 percent annually. According to the Coast Guard, these hourly rates are intended to generate the revenues needed to cover the annual operating expenses of the pilot associations; compensate working pilots; maintain infrastructure, such as pilot boats and dispatch equipment; and train new pilots. In May 2016, shipping industry stakeholders filed a complaint in the U.S. District Court for the District of Columbia contesting specific elements of the Coast Guard’s 2016 rate-setting methodology. In November 2017, the court dismissed 3 of the 5 original claims and found for the industry plaintiffs for the two remaining claims. In March 2018, the court remanded the matter to the Coast Guard to address those two claims while leaving the 2016 rule in place. In November 2018, a coalition of shipping industry stakeholders filed an additional complaint challenging the underlying data and decision-making process used by the Coast Guard for determining the 2018 Great Lakes pilotage rates. This case is still pending before the court. The Coast Guard uses several mechanisms to obtain stakeholder input on the Great Lakes Pilotage Program, which stakeholders have used to raise a number of issues to the Coast Guard’s attention. Some of the mechanisms are more formal and include obtaining stakeholder input on proposed rule changes and at annual meetings, while other mechanisms are informal and are employed on an as-needed basis. Since 2016, shipping industry stakeholders and pilots have identified a number of issues, or suggestions, they would like to see integrated within the Great Lakes Pilotage Program. Issues identified by shipping industry stakeholders relate, in large part, to the financial impacts associated with the Coast Guard’s methodology for calculating pilotage rates, as well as other areas where enhanced transparency or oversight is suggested. Issues identified by pilots and their representatives include updating the list of “designated waters” to include areas like Great Lakes ports and addressing changes that may be needed to respond to the increasing volume and variety of vessels needing Great Lakes pilotage services, such as cruise ships. The Coast Guard uses several mechanisms to obtain stakeholder input on the Great Lakes Pilotage Program. Formal mechanisms include obtaining stakeholder comments during the rulemaking process and soliciting input during annual meetings of the Great Lakes Pilotage Advisory Committee. According to the Coast Guard, additional inputs are also provided more informally during ad-hoc communications and operational coordination efforts. The federal rulemaking process represents a key mechanism by which the Coast Guard obtains stakeholder input regarding proposed changes to annual rates pilots may charge for services. Pursuant to the Administrative Procedure Act, the Coast Guard publishes a notice of proposed rulemaking in the Federal Register and allows a minimum of 30 days for public comment on any applicable changes to the rate-setting methodology and proposed pilotage rates. According to Coast Guard Great Lakes Pilotage Program officials, public participation is essential to the rulemaking process and they consider all comments and information received. In the final rule published to the Federal Register, the Coast Guard summarizes the nature of the public comments received on the notice of proposed rulemaking and characterizes how the comments were incorporated into the final rule, as applicable. For example, the 2018 Final Rule summarizes the comments received in eight different categories, including pilot compensation benchmarks and staffing model calculations. According to Coast Guard officials, they have historically received about five to seven comments each year. However, they received nearly 60 comments regarding the proposed rulemaking in 2016 given the broader scope of revisions and the higher rate of pilot compensation proposed in that year. As previously stated, the GLPAC is to meet at least once annually to provide advice and make recommendations to the Coast Guard on matters relating to Great Lakes pilotage. This committee is governed by the Federal Advisory Committee Act, which calls for a published agenda, public participation, and a written transcript of the proceedings. Our review of 2017 and 2018 GLPAC meeting transcripts indicate the meetings were well-attended and provided a venue for sharing a variety of ideas and perspectives; as well as for providing specific input to the Coast Guard. In addition to the annual GLPAC meetings, Coast Guard officials also noted that GLPAC members participate in scheduled phone calls to discuss pertinent matters—such as a discussion of executive orders or revised regulations—on an as-needed basis. According to the Coast Guard, since 2013 there have been up to three GLPAC meetings per year, ranging in length from 5 hours to 2 days. Coast Guard Great Lakes Pilotage Program officials also stated that GLPAC recommendations from the 2014 meeting were a key input for many of the rate-setting methodology changes implemented in 2016. Although the Coast Guard is not required to implement them, program officials commented that considerable weight is given to GLPAC-issued recommendations. At the September 2018 meeting, the Committee developed three recommendations addressing issues related to the billing dispute process and issuance of temporary registrations to applicant pilots. According to the Coast Guard, these recommendations are still being considered for future action. Coast Guard program officials reported that they have extensive ad-hoc communications with shippers, pilots associations, and their Canadian counterparts to coordinate pilot assignments and help reduce vessel traffic delays on the Great Lakes-Seaway. These stakeholders corroborated their communications with the Coast Guard during our meetings with them. Other venues for information sharing and stakeholder interaction identified by Coast Guard officials include visits to the pilots’ offices to perform oversight functions, meetings with shipping industry representatives and Canadian counterparts (Great Lakes Pilotage Authority) at maritime meetings and conventions; as well as interactions with Coast Guard officials from District 9 (Cleveland, OH), which is responsible for broader Coast Guard activities in the Great Lakes-Seaway. According to these Coast Guard program officials, operational coordination and routine meetings with stakeholders provide ongoing opportunities to obtain input on the Great Lakes Pilotage Program and help inform potential changes that may be needed. Since 2016, when the Coast Guard implemented several significant programmatic changes, shipping industry stakeholders and pilots have identified a number of issues. Collectively, these issues have been the subject of discussion during annual GLPAC meetings, documented in written comments submitted as part of the annual rulemaking process, and included in supplemental correspondence to the Coast Guard and Members of Congress. Issues identified by shipping industry stakeholders relate, in large part, to the financial impacts associated with the Coast Guard’s methodology for calculating pilotage rates, as well as other areas where enhanced oversight is suggested. The key issues cited by shipping industry stakeholders in recent years generally fall into four categories: (1) financial oversight and cost accounting, (2) vessel traffic estimates, (3) pilot compensation and staffing, and (4) billing and dispute resolution. Some of these issues remain the subject of ongoing litigation initiated by a coalition of shipping industry stakeholders against the U.S. Coast Guard. (See appendix II for additional details on selected issues identified by shipping industry stakeholders, including a summary of the specific claims that are in litigation). Financial oversight and cost accounting. Since 2016, shipping industry stakeholders have cited several issues regarding the timeliness and transparency of financial information provided by the U.S. pilot associations that is used during the rulemaking process. These issues include a request for disclosure of individual pilot compensation levels, and additional clarification and transparency regarding the use of the pilot districts’ working capital funds. For example, shipping industry representatives claim that disclosure of individual pilot compensation levels would help ensure that compensation practices remain fair and are not a disincentive to attracting and retaining Great Lakes pilots. At the September 2018 GLPAC meeting, a pilots’ representative noted that this information was previously provided for District 1, but was eliminated due to concerns that the data could be used out of context. For example, this individual stated that although all pilots in his association generally receive the same rate of pay, some may obtain higher annual compensation because of additional days worked. According to Coast Guard officials, they do not collect or retain individual compensation data on pilots; however, they do review such data during visits to the pilot associations’ offices to help ensure fair compensation practices. Vessel traffic estimates. In 2016, the Coast Guard began using a 10- year rolling average of Great Lakes-Seaway vessel traffic volumes to estimate projected vessel traffic for each district in the coming year as part of its annual pilotage rate-setting calculations. According to the Coast Guard, this change was implemented to help reduce rate volatility and remedy traffic overestimates that occurred in the past, largely based on shipping industry projections. However, given the increasing volume of vessel traffic on the Great Lakes-Seaway since the 2008-2009 recession, shipping industry stakeholders contend that the 10-year rolling average represents a significant underestimate of vessel traffic volume. For example, in the 2017 shipping season, vessel traffic in 5 of the 6 pilotage areas of the Great Lakes-Seaway exceeded the estimates (calculated using a 10-year rolling average) by over 25 percent. According to its 2018 Notice of Proposed Rulemaking, the Coast Guard noted that use of the rolling average will result in pilots taking in more revenue than projected in some years, and in other years will result in less revenue. Coast Guard officials believe that, over the long term, this methodology will help ensure infrastructure is maintained and that pilots receive adequate compensation and rest between assignments to enhance pilot retention. Shipping industry organizations challenged the Coast Guard’s use of 10 years of traffic data in the complaint filed with the U.S. District Court for the District of Columbia in November 2018, and that case is ongoing. Pilot compensation and staffing needs. The data sources and methodology used by the Coast Guard to develop a target compensation benchmark for U.S. Great Lakes pilots have been subject to ongoing disagreement among pilots and shipping industry stakeholders for several years. Since 2016, the Coast Guard has used two primary data sources as a basis for comparison—the average compensation of Canadian Great Lakes-Seaway pilots, and compensation data for first mates on domestic Great Lakes vessels (lakers). Shipping industry stakeholders identified concerns with some of the specific adjustments made by the Coast Guard related to both of these data sources and filed complaints in 2016 and 2018 in federal court contesting the Coast Guard’s methodology. A related issue identified by shipping industry stakeholders concerns the number of average pilot working days the Coast Guard uses to determine the number of pilots needed each season. For example, the Coast Guard uses 270 working days as a baseline to calculate pilot compensation figures, but uses 200 working days to calculate staffing requirements so as to account for a 10-day per month rest standard for pilots. The Coast Guard states that this 10-day rest standard is not a requirement and generally does not apply during the busiest times of the season. During the busiest time, pilots generally remain available to work additional days to service the increased vessel traffic on the Great Lakes-Seaway. The 2018 complaint filed by shipping industry stakeholders includes a claim challenging the Coast Guard’s use of a 270-working day assumption, and that case is ongoing. Billing and dispute resolution. Other issues cited by shipping industry stakeholders pertain to billings from pilot associations and the Coast Guard’s dispute resolution process. The primary billing issues cited by shipping industry stakeholders since 2016 include an increase in the number of tug boats requested, as well as cases where double pilotage was employed that shipping industry officials did not believe were necessary. In the case of tug boat usage, pilot representatives acknowledged that there may have been an increase in tug boat usage, but they noted that they do not have any financial incentive to call for the use of tug boats and they only request them, in coordination with the shippers’ agents, when they deem them necessary. According to Great Lakes Pilotage Program officials, the Coast Guard routinely reviews inquiries from shippers on this issue, but noted that decisions to use tug boats remain safety decisions that are made between the vessel operators and the Great Lakes pilots. In contrast, authorizations for double pilotage are provided on a case-by-case basis by the Director of the Great Lakes Pilotage Program. According to the Coast Guard, there were instances in which pilot associations charged for double pilotage without obtaining authorization from the Director and, in such instances, the Coast Guard has ruled in favor of vessel operators with regard to billing disputes. Both of these issues were topics addressed at the September 2018 GLPAC meeting, as well as discussion regarding reasonable time frames for filing billing disputes. According to Great Lakes Pilotage Program officials, some disputes were filed after an extended period of time had elapsed, making it more difficult to adjudicate the issues. For this reason, the Coast Guard reported that it is considering introducing a maximum amount of time allowable for vessel operators to initiate a billing dispute, and corresponding time frames for pilot associations and the Coast Guard to respond and adjudicate, respectively. Issues raised by Great Lakes pilots and their representatives generally include the following categories: (1) recognition of the pilots’ unique qualifications and role, (2) review of “designated waters,” and (3) review of protocols for vessel priorities. Recognition of pilots’ unique qualifications and role: Representatives of the U.S. Great Lakes pilots state that the shipping industry remains overly focused on pilotage costs and may fail to recognize the unique qualifications that registered Great Lakes pilots possess and the fundamental public interest the pilots serve by ensuring the safety of vessel navigation and environmental protection on the Great Lakes- Seaway. The pilots noted that, in addition to the often challenging weather conditions they face, they also serve a security role in that they may be the only U.S. citizen on board to provide situational awareness to U.S. authorities in the event of any suspicious activities given that foreign vessels in the Great Lakes-Seaway can travel close to major infrastructure and U.S. cities. The pilots also stated that it can be easy for the shipping industry to select individual routes and billings to make a case that U.S. pilots charge significantly more than their Canadian counterparts, but they contend that is not an accurate picture of actual system-wide costs. Review of designated waters: Great Lakes pilots commented that “designated water” determinations have not been reviewed for over 50 years and they should be reassessed. In particular, pilots note that increases in the volume and variety of vessels; as well as expanded port infrastructure on the Great Lakes-Seaway since establishment of the Great Lakes Pilotage Program in 1960, warrant the consideration of additional areas as “designated waters,” which are generally more challenging to navigate and require registered pilots to be in full navigational control of the vessels at all times as they transit these designated areas. For example, pilots contend that the Straits of Mackinac and all ports on the Great Lakes-Seaway should be considered designated waters. Coast Guard officials reported that it is their understanding that masters are already relying on pilots to direct navigation in waters such as the Straits of Mackinac. Additionally, the officials stated that the Coast Guard does not have the authority to make these designation changes through regulation; rather, such revisions require a presidential declaration. Review of protocols for vessel priorities: Great Lakes pilots also commented that increases in the volume and variety of vessel traffic on the Great Lakes-Seaway in recent years may necessitate a review of the first-come, first-served standard for assigning pilots to vessels. For example, the pilots note that plans for increasing the volume of cruise ships on the Great Lakes-Seaway may require adjustments to the priority process for assigning pilots given that cruise ships are generally on fixed itineraries and tight timelines. This issue was discussed at the 2018 GLPAC meeting and is the subject of ongoing discussions among the Coast Guard and Great Lakes-Seaway stakeholders. Some shipping industry stakeholders, and a recent report commissioned by the Conference of Great Lakes and St. Lawrence Governors and Premiers, have suggested that it is time to evaluate potential governance alternatives to help ensure the Great Lakes pilotage system is efficient, cost-effective, and better serves the needs of the maritime shipping industry and the public. Some of the proposed alternatives include changes that could be implemented within the existing governance system, such as the consolidation of the three U.S. pilotage districts and a review of some pilotage requirements. Other changes, such as transferring the pilotage rate-setting function from the Coast Guard to another entity, would entail more sweeping reforms and require statutory changes. Finally, some proposals, such as the introduction of competitive pilotage services, would reflect an even more significant change from the existing model of Great Lakes pilotage consisting of federal oversight and economic regulation of independent pilot associations, known as a regulated monopoly. Some shipping industry stakeholders and the report commissioned by the Conference of Great Lakes and St. Lawrence Governors and Premiers suggest that consolidation of the three existing U.S. Great Lakes-Seaway pilotage districts might help reduce administrative costs. According to these sources, such a consolidation could also limit the complexity associated with vessel agents and shippers interacting with multiple pilot associations over the course of a single journey on the Great Lakes- Seaway. Apart from consolidating all three of the existing districts into one, industry stakeholders did not identify any other proposed alternatives for changing the existing district boundaries. According to representatives of the Great Lakes pilots, the expansive area of the Great Lakes-Seaway and natural geographic boundaries lend themselves to maintaining the three pilot associations. The pilot representatives also noted that if the districts were to be consolidated, shippers and agents would lose some degree of localized service currently provided by each district, such as knowledge of local conditions and transit times. It remains unclear to what extent cost savings could be realized through consolidation of the three existing U.S. pilotage districts. According to the pilot association presidents, there are relatively few administrative and support staff employed for such a large geographic area and some perform multiple functions. Specifically, the pilots reported that, collectively, there were 23.5 administrative positions (non-pilots), comprised mostly of 8.5 seasonal dispatchers and 10 pilot boat operators. Assuming that existing pilot boat operations would generally remain consistent following district consolidation, administrative and dispatch services represent the principal source of potential cost savings. Based on our review of the Canadian Great Lakes Pilotage Association (GLPA) model, which operates a single, consolidated administrative office, it is not clear that the number of administrative staff, including dispatchers, would be reduced after consolidation of the three U.S. pilotage districts and associations. For example, during the 2018 shipping season, the Canadian Great Lakes Pilotage Association included 21 administrative positions, of which 10 were designated as dispatchers— which is similar in proportion to the existing U.S. Great Lakes Pilotage dispatcher distribution. It is also important to note that even with a potential consolidation of administrative functions within one U.S. pilotage district; pilots would still be limited to operating within the geographic area where they are licensed. According to pilots and Coast Guard program officials, cross- licensing is generally not feasible for multiple waterways between districts given the extent of local specialized training and knowledge required and is not practiced anywhere else in the United States or the Great Lakes- Seaway. Some shipping industry stakeholders state that a broader review of Great Lakes pilotage requirements may be necessary, particularly the compulsory use of pilots in “undesignated” or open areas of the Great Lakes. According to these stakeholders, such a review is warranted given the significant technology improvements that have occurred since initial passage of the Great Lakes Pilotage Act in 1960. Any proposed changes to the existing pilotage requirements could not be implemented through Coast Guard regulatory changes and would require legislative changes or a presidential declaration. Although a significant portion of a Great Lakes-Seaway vessel transit may occur in “undesignated” open waters, the Coast Guard and pilots’ representatives cited several logistical challenges that would likely occur if pilotage requirements in these areas were revised or eliminated. For example, if a pilot was not on board a vessel in open waters, there likely would be no way to get one on board in the event of severe weather, equipment failure, or other emergency. In addition, the officials noted that if a pilot did not remain on board the vessel for the entire transit, one would still be required to navigate the vessel in and out of each port destination. This would entail additional costs for picking up the disembarking pilot and transporting the pilot to a designated shore location and then later to transport another pilot to the vessel to navigate into port. These additional pilot transfers may require the acquisition of additional pilot boats, which are generally customized and can cost in excess of $1 million. Alternately, each individual port could employ its own registered pilot and make the necessary infrastructure investments, including pilot boats and related dispatch equipment, but the result could be an overall increase in the number of pilots operating in the system, which could also increase pilotage costs. Finally, an increasing number of vessels that otherwise are not compelled to use pilots (e.g., domestic oil tankers) are requesting pilotage services due, in part, to requirements by insurance providers. Because of this increase in the requests for pilotage services, a change in open water pilotage requirements may not result in a reduction in the number of pilots required in some areas of the Great Lakes-Seaway. The report commissioned by the Conference of Great Lakes and St. Lawrence Governors and Premiers cites an opportunity for enhanced input into the governance process through the establishment of an advisory board or other oversight mechanism, such as those used commonly in state pilotage commissions nationwide. According to the report, such a mechanism would provide for increased industry participation in the governance process beyond the consultative inputs currently available through the GLPAC and rulemaking processes, and could include responsibility for the pilotage rate-setting function. The principal advantage cited for this increased level of participation would be to better align pilotage services with user needs. Under this proposal, an advisory board would be formed and the board members would be involved in the full range of pilotage governance functions as generally provided by state pilotage commissions. These responsibilities commonly include safety oversight and related functions, such as selecting individuals for admission into the training program, overseeing the training process, issuing licenses, investigating accidents or pilot complaints, taking disciplinary actions, and establishing pilotage rates. All of these activities are current regulatory functions performed by the Coast Guard and statutory changes would be required to designate a new pilotage regulatory body and delineate these responsibilities. Given that stakeholders we met with generally do not advocate for transferring any of the safety oversight and related regulatory functions from the Coast Guard, for the purposes of this report we will focus on the potential tradeoffs associated with having an advisory board formed that would only take responsibility for the Great Lakes pilotage rate-setting function from the Coast Guard. With regard to the rate-setting function, the introduction of an advisory board to determine pilotage rates may not improve one of the core issues cited by both shipping industry and pilot stakeholders at the most recent GLPAC meeting that was held in September 2018. That is, no matter what entity has responsibility for pilotage rate-setting—a new advisory board or the Coast Guard—such an entity would face similar rate-setting challenges posed by the competing interests of pilots and shipping industry representatives. Further, according to a recent report reviewing the pilotage system in the state of Washington, proposed changes to pilotage rates are often evenly split between shipping industry representatives and pilot representatives and final determinations routinely come down to committee chairpersons or independent board members, sometimes without full transparency regarding how decisions were reached. In contrast, the current GLPAC process provides for considerable input by committee members, stakeholder and public participation, and is documented through publicly available transcripts. Coupled with the rulemaking requirements that incorporate public review and comments, we found that the existing mechanisms represent a fairly transparent system of pilotage rate-setting as compared to the process used by some coastal states. One variation used in some U.S. coastal states to help overcome the challenge of competing stakeholder interests during the pilot rate-setting process is the establishment of an independent rate-setting entity, similar to a public utility commission. In fact, one of the principal recommendations in the Washington report was to transfer the rate- setting function from the state pilotage commission to an independent utility and transportation commission in an effort to establish a more clearly defined, rigorous, and transparent process with enforceable timelines. In many respects, we found that the Coast Guard is currently performing this independent function as its rate-setting process includes many of the characteristics identified as a best practice, such as a defined methodology, clear data submission and review process, and the absence of any direct material interest in the outcome of the rate determinations. While individual stakeholders may not agree with the specific inputs and assumptions used by the Coast Guard, the current process is generally transparent and provides an opportunity for informed stakeholder feedback and identification of any grounds on which they can choose to take legal action. Another option presented by various stakeholders is to transfer pilotage rate-setting authority to another federal entity. Under this scenario, the Coast Guard would retain its jurisdiction over safety and related regulatory functions, but responsibility for pilotage rate-setting would be transferred to another federal entity. One specific entity that has been identified as a potential replacement for the Coast Guard is the Saint Lawrence Seaway Development Corporation (SLSDC). According to some stakeholders we spoke with, the SLSDC would have more of a vested interest in ensuring that pilotage rate changes consider the potential impact of such changes on the viability of commercial shipping in the Great Lakes-Seaway. SLSDC representatives declined to comment specifically on this proposal, but they cited historical precedent to indicate that if SLSDC were statutorily required to assume pilotage rate-setting responsibilities, additional staffing resources would likely be needed. It should be recognized that shipping industry and pilotage stakeholders will continue to have vested interests in each of the rate-setting inputs and assumptions that are used to determine pilotage rates and some degree of contention is likely to remain no matter the entity responsible. In addition, pilots’ representatives previously filed a complaint regarding the transfer of pilotage rate-setting authority from the Coast Guard to the SLSDC in the 1990s, and they told us that they continue to oppose such a move. According to pilot representatives, they are concerned with a potential transfer of the pilotage rate-setting function to SLSDC given its role in trade promotion, which could potentially affect SLSDC’s ability to remain fully independent in this role. Whether the Coast Guard maintains responsibility for pilotage rate-setting or that function is transferred to another federal entity like SLSDC, the continued role of a federal entity in performing the pilotage rate-setting process would ensure that Administrative Procedure Act requirements still apply, thereby retaining transparency and providing stakeholders and the public an opportunity for review and comment. While there may be some potential for redundancy or increased administrative burden on the pilot associations if the safety oversight and pilotage rate-setting functions were split between the Coast Guard and another federal entity, similar division of responsibilities currently exist in the handful of states that use an independent rate-setting entity, such as a public utility commission. It is the Coast Guard’s position that authorizing two federal agencies to oversee different aspects of the Great Lakes Pilotage Program could be challenging. For example, Coast Guard officials noted that a transfer of the rate-setting function may not consider potential impacts to other authorities associated with rate setting, such as limiting the number of pilot pools; prescribing a uniform system of accounts; performing audits; determining the number of pilots to be registered; and establishing conditions for services. The existing model of Great Lakes pilotage consisting of federal oversight and economic regulation of independent pilot associations is referred to as a regulated monopoly. This model of regulating pilotage is employed almost exclusively within U.S. coastal states and is also a common method for delivering marine pilotage services worldwide. However, there is also some precedent for pilots serving as government employees. One reason why this government employee model has been identified as one potential alternative for U.S.-registered pilots in the Great Lakes- Seaway is because a majority of the Canadian pilots that operate in the Great Lakes-Seaway are federal employees. Although making U.S. Great Lakes pilots federal employees could eliminate the need for the Coast Guard to provide administrative and financial oversight of independent pilots, we found that U.S. Great Lakes pilot associations provide many administrative and logistical functions, such as dispatching and pilot transfers, which would need to be assumed by the federal government under this type of alternative model. According to pilots’ representatives, one of the principal impacts of the government employee model would likely be the provision of some financial benefit to the shipping industry, given that taxpayers would potentially be assuming the cost of pilotage salaries, benefits, and retirement-related benefits. Additional costs to the U.S. government would also likely be required to fund initial procurement of existing pilot association infrastructure and assets, such as offices and pilot boats. Another factor to consider in evaluating the pilots as federal employees model involves how the Coast Guard budget process may also affect the future funding and operation of pilotage operations. A significant expansion of the pilotage program staffing and associated resource requirements would likely pose an additional challenge to ensure sufficient annual appropriations are obtained, given the ongoing need to balance funding and resources across the Coast Guard’s 11 statutory missions. According to representatives of the Canadian Great Lakes Pilotage Association, pilotage operations in their jurisdiction are to be financially self-supporting through pilotage tariffs, and the Canadian government does not provide an annual appropriation for this purpose. They noted that government pension benefits are also incorporated into the pilotage rates to help achieve these offsets. Similar mechanisms could also potentially be used to fund the additional costs borne to the U.S. government within a federal employee pilot model. Additional considerations associated with a government employee model include the different compensation and overtime structures, and the potential for reduced flexibility afforded to the government if fewer numbers of pilots are needed due to reduced pilotage demand. For example, according to representatives of the U.S. pilot associations, each pilot presently receives the same compensation for each working day they are available, regardless of seniority. However, the U.S. federal government routinely employs a system of graduated compensation based on years employed and may face difficulties in hiring or terminating pilot employees if necessary due to shifting pilotage demand. Another approach identified within the government employee model is the use of harbor pilots. This option would generally entail pilots working directly for an individual or group of ports as municipal or port employees. According to one pilot representative, the key challenge identified with such an approach is that individual ports would each require its own infrastructure and pilot boats to service incoming vessels, which could represent a substantial investment. In addition, the geography of the Great Lakes and the long transits many times involved present additional hurdles associated with pilot transfers and related logistical support services make the harbor pilot approach less feasible. Shipping industry stakeholders have also proposed that the Coast Guard consider the introduction of some level of competition for pilotage service delivery, which would represent the most significant change to the existing model of pilotage regulation. According to shipping industry stakeholders, the introduction of competition would be intended to provide an additional incentive for pilot associations to contain costs. Some specific mechanisms identified include introducing a competitive bidding process to provide pilotage services under multi-year contracts, or allowing individual pilots or groups of pilots to compete for business from vessel operators. The concept of using some form of competitive bidding to grant multi-year contracts for pilotage service delivery is generally consistent with government cost-containment efforts. However, stakeholders we spoke with were unable to identify any pertinent examples where market competition for pilotage services was currently used within U.S. coastal states to provide a basis for further evaluation of this model. According to the Coast Guard and pilot representatives, several features of the Great Lakes-Seaway pilotage system present challenges for potentially implementing competitive pilotage services in the Great Lakes- Seaway. Most notably, the nature of marine pilotage requires several years of specialized training and local experience that entail significant time and investment to acquire. These requirements generally result in a limited supply of available pilots that could compete for a competitive contract in the same geographical area. This represents a potential barrier to market entry and could lead to a single, entrenched service provider, which may reduce the competitive pressure toward cost containment. Further, if registered pilots did not have the assurance of steady employment in the Great Lakes, there may be increased incentives for them to seek opportunities outside of the region, thereby reducing the overall pool of available pilots. Other mechanisms of pilotage competition, such as allowing individual pilots or pilot associations to compete for business, would represent a fundamental shift from the norms of compulsory pilotage services worldwide. As a representative of the American Pilots Association stated at the September 2018 GLPAC meeting, one of the foundations of the existing regulated monopoly system is that pilots provide services using their independent judgement to ensure marine safety and the public interest and should not be subject to any potential financial incentive or business pressure from a vessel operator. Similar statements can be seen in Florida state statutes, which specify the need for economic regulation of marine pilotage at the state level, rather than competition in the marketplace, to better serve and protect the public health, safety, and welfare. In contrast, shipping industry stakeholders suggest that there are likely comparisons to the deregulation implemented in other industries where public safety is also of paramount concern, such as commercial aviation. However, an evaluation of models of competition used in other industries was outside the scope of our review. An additional challenge noted by pilot representatives is that, in a competitive model, pilots may prefer to pursue customers offering more regular or profitable work rather than operate in a non-discriminate manner as is currently the case under the existing numbered rotation system of pilotage assignment. Along these lines, research conducted by KPMG on international models of marine pilotage, found that although a model “comprised of independent contractor pilots could result in theoretically more competitive rates, the combination of what appears to be relatively the same demand for pilotage services in the market, and the uniqueness of pilot skillsets have resulted in a scenario where competition is limited in reality.” The authors’ findings also suggest that, in the few cases where competitive pilotage was introduced, it was generally unsuccessful; and that absent sufficient oversight, direct competition among pilots could potentially lead to incentives to cut costs through reduced focus on safety and quality of service. In May 2019, we provided a draft of this report to the Department of Homeland Security and the Coast Guard for review and comment. The Coast Guard provided technical comments which we incorporated into the report. We are sending copies of this report to the appropriate congressional committee, the Secretary of Homeland Security, the U.S. Coast Guard, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (206) 287-4804 or AndersonN@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. Pursuant to the Great Lakes Pilotage Act of 1960, the Coast Guard regulates pilotage for oceangoing vessels on the Great Lakes—including setting the rates for pilotage services and adjusting them on an annual basis. For the 2018 shipping season, these base pilotage rates ranged from $271 to $653 per pilot hour depending on the specific areas where pilotage service is provided. According to the Coast Guard, the three U.S. pilot associations use this revenue to cover operating expenses, compensate working pilots, maintain infrastructure, such as pilot boats, dispatch equipment, and personal pilotage units; and train new pilots. The Coast Guard uses the following 10-step methodology to calculate revenues needed for each Great Lakes pilotage association based on the estimated volume of foreign vessel traffic for the upcoming shipping season. Step 1 – Recognize previous operating expenses. The Director of the Great Lakes Pilotage Program reviews audited operating expenses from each of the three U.S. Great Lakes pilot associations. This number forms the baseline amount that each association is budgeted. There is a 3-year delay between the year the expenses were incurred and when they are included in the rate-setting calculation. For example, the 2019 pilotage rates are calculated using 2016 operating expenses. Step 2 – Project operating expenses, adjusting for inflation or deflation. The Coast Guard applies 3 years of inflation adjustors to the baseline of operating expenses identified in Step 1. The inflation adjustors routinely used are from the Bureau of Labor Statistics’ Consumer Price Index. Step 3 – Estimate the number of working pilots. The Coast Guard determines the number of working pilots that need to be compensated via collection of pilotage fees. As part of this step, the Coast Guard also uses a “staffing model” to determine how many pilots may be needed for each district to handle expected shipping traffic at the beginning and close of the season. According to the Coast Guard, this number helps inform the Director of the Great Lakes Pilotage Program regarding how many total pilot credentials may be authorized for each district to help meet future demand. Step 4 – Determine target pilot compensation. This step contains two phases to determine the revenue needed for pilot compensation. In the first phase, the Coast Guard determines a target “compensation benchmark” for each of the working pilots. For the 2018 shipping season, this number was derived from 2015 data provided by the American Maritime Officers Union regarding labor contracts, along with annual inflation adjustments deemed applicable by the Director. The second phase entails multiplying this compensation figure by the number of working pilots in each pilotage district and area. Step 5 – Project working capital fund. This value is obtained by adding total operating expenses (step 2) and total pilot compensation figure (step 4) and multiplying that figure by the annual rate of return from the preceding year for new issues of high-grade corporate securities. Step 6 – Project needed revenue. The Director of the Great Lakes Pilotage Program adds the total values produced for operating expenses, total pilot compensation, and the working capital fund. This number, which is calculated separately for each district and area, represents the total projected revenue needed for the upcoming season. Step 7 – Calculate initial base rates. This step consists of first calculating the 10-year vessel traffic average for each district and area. Then, the figure for needed revenue is divided by the 10-year traffic averages. Step 8 – Calculate average weighting factors by area. Since each vessel that requires a U.S. Great Lakes pilot pays a multiple of the “base rate” based on its size (ranging from 1.0 for the smallest vessels to 1.45 for the largest vessels), the Coast Guard calculates the extra revenue that has historically been produced by the weighting factor in each area. Step 9 – Calculate revised base rates. The Coast Guard modifies the base rate to account for the extra revenue generated by the weighting factors. This is done by dividing the initial base rate by the average weighting factor to produce a revised rate. Step 10 – Review and finalize rates. According to the Coast Guard, this step can be referred to informally as “director’s discretion” and is principally intended to help ensure that the rates meet the goals set forth in applicable law and regulation. The Coast Guard reported that no additional adjustments were included as part of this step for the 2018 Final Rule. After the base pilotage rates are set, the Coast Guard also considers whether surcharges are necessary, such as those used to help fund the training of new pilots. This amount is calculated as a percentage of total revenue for each district and that percentage is applied to each bill until the total amount of the surcharge is collected. Financial Oversight and Cost Accounting Shipping industry stakeholders identified a number of issues related to improving the timeliness and transparency of pilotage association financial information used in pilotage rate-setting process. Among these include (1) addressing the 3-year time lag that exists to incorporate pilotage expenses into the rate calculations; (2) presentation of financial information in a uniform format; (3) disclosure of individual pilot compensation data; and (4) clarifying the purpose and authorized uses of the working capital fund. 3-year time lag to incorporate pilotage expenses. Shipping industry stakeholders suggest that the Coast Guard make an effort to reduce the 3-year time lag to incorporate pilotage expenses into the rate-setting calculations. For example, audited financial information for the 2016 shipping season is used in the development of the 2019 rulemaking. At the most recent GLPAC meeting in September 2018, Coast Guard representatives identified several reasons for this time lag, including about 6 months required for an auditor to conduct an independent review of pilotage expenses and multiple stages of federal review that can take an additional 6 months for the Coast Guard to develop and publish the proposed rate in the Notice of Proposed Rulemaking each year. Pilot representatives and Coast Guard officials generally agree that shortening this lag would be preferable, but are unable to identify a method by which this could be achieved given the existing time frames required for the financial auditing and rulemaking processes. Uniform format for financial reporting. Shipping industry stakeholders have requested that audited financial statements for the pilot associations be presented in a uniform format. According to an industry representative, the audited financial statements (prepared individually by each pilotage association each year after the shipping season) differ primarily due to the standard accounting practices of the different organizational structures. Specifically, two pilot associations are partnerships and one is a corporation. Our review indicates that a consistent format is used by the Coast Guard and its designated independent reviewer to present summary information of applicable expenses for all three pilot associations as part of the rulemaking process. Public reporting of individual pilot compensation. Shipping industry stakeholders contend that individual pilotage compensation levels should be disclosed to help ensure revenues are being shared equally among the associations’ workforce. According to one pilot representative, individual compensation data were previously provided for District 1 as part of audited financial statements, but was eliminated because the information was being used out of context. The pilot representative noted that although all pilots in his association generally receive the same rate of pay, some may obtain higher annual compensation due to additional days worked. According to Coast Guard officials, they do not collect or retain individual compensation data on the pilots, but they do review such data during visits to the pilot association offices to help ensure fair compensation practices. Enhanced transparency of the working capital fund. Members of the shipping industry also identified an issue related to the “working capital” component of the rate-setting process. According to these stakeholders, this fund could potentially be used to augment general revenue and compensation levels and there is a lack of transparency regarding how these funds are being applied to fund capital improvements. This position was the basis of one of the claims included in the complaint filed by a coalition of industry stakeholders in November 2018. In that complaint, the plaintiffs claim that the Coast Guard’s failure to eliminate the working capital element as a basis for additional revenue requirements or to bound revenue raised as working capital to particular uses is arbitrary and capricious, among other things. That case is ongoing. According to pilots’ representatives, this fund is important to help fund capital improvements, particularly through the winter months, but they also recognize that additional clarity could be provided about its intended uses and potential limitations. In November 2018, the Coast Guard issued guidance to each of the pilotage association’s presidents regarding the reporting and uses of the working capital fund. Specifically, the Coast Guard directed the associations to segregate revenues generated by this fund and place them into a separate account at least once per quarter, and further clarified that funds from this account could be applied only toward capital projects, infrastructure improvements/maintenance, and non-recurring technology purchases necessary for providing pilotage services. In 2016, the Coast Guard initiated changes to its rate-setting methodology regarding how it estimates projected vessel traffic for each district and the corresponding hours worked for related pilotage services. Citing a recommendation issued by the Great Lakes Pilotage Advisory Committee in 2014, the Coast Guard initially proposed using a rolling average of 5 years of historical shipping data to estimate traffic volume as part of its ratemaking calculations for the 2016 shipping season. However, based on public comments received on the 2016 Notice of Proposed Rulemaking, the Coast Guard increased this number to 10 years of historical data. According to the Coast Guard, this change was implemented to further reduce rate volatility and help remedy traffic overestimates that occurred in the past, largely based on industry projections. Given the increasing volume of actual Great Lakes-Seaway vessel traffic in recent years, shipping industry stakeholders contend that the 10-year rolling average used for rate-setting calculations represents an underestimate of traffic volume. Responding to the 2018 Notice of Proposed Rulemaking, industry commenters asserted that the 10-year average included a period of substantially depressed traffic volume caused by the recession in 2008-2009, which if used to estimate future traffic volume could result in increased pilotage rates. See Table 1 for a summary of the variance between actual traffic volumes during the 2017 Great Lakes-Seaway shipping season compared with the estimates calculated using a 10-year rolling average. In the November 2018 complaint, shipping industry organizations argued that the Coast Guard’s use of 10 years of traffic data, in contrast with the shorter periods used to determine expenses and manning levels, was arbitrary and capricious, among other things, and that case is ongoing. The process and sources used by the Coast Guard to develop a target compensation benchmark for Great Lakes pilots have been subject to ongoing disagreement among stakeholders. Prior to 2016, the Coast Guard used compensation data for first mates on domestic Great Lakes vessels as the basis for comparison. This data was based on labor contracts of the American Maritime Officers Union (AMOU). However, in 2016, when the AMOU determined it would no longer provide this data to the Coast Guard, program officials revised the rate-setting methodology to begin using the average compensation of Canadian vessel pilots as the primary source, along with a 10 percent adjustment that program officials believed was appropriate to reflect the different level of benefits provided to Canadian pilots as government employees. After the court found that the 10 percent adjustment to the Canadian compensation level benchmark was not supported by reasoned decision-making and remanded the matter to the Coast Guard, for the 2018 rulemaking, the Coast Guard reverted to using the pre-2016 compensation data of domestic “laker” first mates. However, the November 2018 complaint included a claim that the Coast Guard improperly applied an adjustment of “guaranteed overtime” to the compensation benchmarks based on additional input provided by the AMOU during the notice and comment period. This case is ongoing. Regardless of the basis used, the benchmark pilot compensation levels have not varied greatly in recent years after accounting for annual inflation adjustments. That is, target compensation in 2016 was $326,114 and has increased to $359,887 in 2019, an average annual increase of approximately 3.3 percent. One related change implemented by the Coast Guard in 2016 that can also affect pilot compensation figures includes the determination to calculate pilotage rates based on the actual number of working Great Lakes pilots rather than the total number authorized. For example, in 2019 there were 54 total authorized U.S.-registered Great Lakes pilots, but only 51 were actually employed and available to provide pilotage services. According to the Coast Guard, this change serves, in part, to remove any financial incentive of pilot associations to operate with fewer pilots than allowable to increase individual compensation levels. The shipping industry has also identified issues regarding the number of working days the Coast Guard uses to calculate compensation figures and its application of a 10-day per month rest standard for pilots. For example, in 2016, the Coast Guard began using 200 working days per season as the basis for staffing calculations—down from 270—to allow for up to 10-days of rest per month. According to the Coast Guard, this change was made, in part, to address recommendations from the National Transportation Safety Board regarding reducing possible “pilot fatigue.” However, shipping industry stakeholders have suggested that if 200 days is the benchmark for working days, it should also be used to determine pilot compensation levels. Instead, the Coast Guard multiplies the weighted daily rate derived from AMOU compensation data by 270 to calculate the target annual compensation. This issue is also the subject of a claim included in the 2018 complaint, which alleges that the Coast Guard’s use of the 270-day multiplier value is arbitrary and capricious, among other things. The shipping industry stakeholders further contend that the 10-day rest standard may need to be revisited to ensure adequate pilot availability and avoid any unnecessary increases in total pilot numbers. The Coast Guard states that this 10-day rest standard is not a requirement and generally does not apply during the busiest times of the season, when pilots would remain available to work additional days to service increased vessel traffic on the Great Lakes-Seaway. Billing Concerns and Dispute Resolution There is ongoing concern among shipping industry stakeholders about certain billings from pilot associations they view as unnecessary and the Coast Guard’s dispute resolution process. The primary billing issues cited by shipping industry stakeholders since 2016 include an increase in the number of tug boats requested, as well as cases where double pilotage was employed that vessel operators did not believe were necessary. In the case of tug usage, pilot representatives generally recognize an increase in tug usage but respond that they do not have any financial incentive to call for the use of tug boats and that pilots only request them, in coordination with the shippers’ agents, when they are deemed necessary. Pilot representatives at the 2018 GLPAC meeting also stated that tug boats represent additional insurance to avoid any potential collisions in an increasingly risk-averse environment. Further, they noted that the newer pilots that have come onboard in recent years may also be a contributing factor for an increase in tug usage. According to the Coast Guard, the program routinely reviews inquiries from shippers and masters on this issue, but decisions to use tug boats remain safety decisions between the master and pilot. In contrast, authorizations for double pilotage are provided on a case-by- case basis by the Director of the Great Lakes Pilotage Program as specified in regulation. In general, the Director may authorize double pilotage when aids-to-navigation have been removed due to ice and weather conditions, dead ship tows, adverse weather and sea conditions, or any abnormal condition that will likely result in extended transits in designated waters. According to the Coast Guard, there were instances in which pilot associations charged for double pilotage without obtaining authorization from the Director of the Great Lakes Pilotage Program. In such cases, the Coast Guard has ruled in favor of vessel operators with regard to billing disputes. According to Great Lakes Pilotage Program officials, if vessel operators believe a billing error was made, they should first engage directly with the respective pilot association to review the charges and rectify any mistakes. If no agreement is reached with the pilot association, then the vessel operator can make an appeal to the Coast Guard to conduct a further review. If the Coast Guard review determines that a chargeback is justified, they can issue an advisory opinion that the pilot association refund any amount not approved by the Coast Guard or reissue the bill. At the September 2018 GLPAC meeting, Coast Guard representatives noted that some billing concerns were presented after more than 2 years and did not include sufficient details to effectively review and make an informed decision. The Coast Guard is currently working on a proposal to establish reporting timelines for presenting and making determinations on billing disputes. Another billing concern cited by industry stakeholders at the 2018 GLPAC meeting includes objections to an absence of limits to charges when pilots are onboard a vessel but it cannot get underway due to inclement weather or for other reasons. Pilot representatives point out that such delays consume pilotage resources and the charges are needed to provide an incentive for shippers and agents to remain efficient when ordering and releasing a pilot. Shipping industry stakeholders note that there are a range of factors that can cause a pilot to be detained onboard and the charges, which can exceed $20,000 per day, are unreasonable and represent a large, unforeseen cost. According to Coast Guard officials, they plan to continue engagement with GLPAC members on this issue, recognizing that pilot resources should be employed efficiently, but also that weather/ice conditions may require pilots to remain onboard a vessel for an extended period of time at significant additional cost. In addition to the contact named above, Christopher Conrad (Assistant Director), Ryan Lambert (Analyst-in-Charge), Chuck Bausell, Dominick Dale, Michele Fejfar, Eric Hauswirth, and Tracey King made key contributions to this report.", "summary": "The Great Lakes-St. Lawrence Seaway maritime transportation system is the longest inland navigation system in the world. In 2016, the Coast Guard implemented a number of changes, including amending its methodology for setting the rates charged to shippers for using U.S. marine pilotage services in these waters. GAO was asked to review the Coast Guard's management of the Great Lakes Pilotage Program. This report (1) describes how the Coast Guard obtains stakeholder input on the Great Lakes Pilotage Program, and identifies key stakeholder issues that exist; and (2) discusses alternatives to the current structure and governance of the Great Lakes pilotage system identified by stakeholders, and the reported tradeoffs they may present. GAO reviewed applicable laws, Coast Guard rulemakings from 2016-2019, Great Lakes Pilotage Advisory Committee meeting minutes for 2017 and 2018, and issues identified by stakeholders. GAO also interviewed a range of stakeholders, including shipping industry and pilot representatives, to obtain perspectives on the Coast Guard's management of the program and any alternative governance options that may exist. The Coast Guard manages the Great Lakes Pilotage Program to implement federal requirements that any oceangoing or foreign commercial vessel entering the Great Lakes-St. Lawrence Seaway use a registered marine pilot to safely navigate the vessel through the system. The Coast Guard employs several mechanisms for communicating with stakeholders and obtaining their input on the program. These include the federal rulemaking process, meetings of the Great Lakes Pilotage Advisory Committee, and ad-hoc communications with local pilotage stakeholders. Since 2016, when the Coast Guard implemented several programmatic changes, shipping industry stakeholders and pilots have identified a number of issues that they would like to have considered for the program. The issues cited by shipping industry stakeholders relate, in large part, to the financial impacts associated with the Coast Guard's methodology for calculating pilotage rates. The issues raised by Great Lakes pilots and their representatives are varied and include changes that may be needed to respond to the increasing volume and variety of vessels needing Great Lakes pilotage services, such as cruise ships. U.S. Pilot Associations in the Great Lakes-St. Lawrence Seaway Shipping industry stakeholders and others have suggested potential alternatives to the structure and governance of Great Lakes pilotage. The proposed alternatives include consolidating the three U.S. pilot associations and districts, revising the existing governance structure and entities responsible for pilotage rate-setting, and introducing some level of competition for providing pilotage services. Each of these options presents various tradeoffs. For example, it is unclear if consolidating the three associations and districts would result in cost savings because there are relatively few administrative positions that could be reduced. According to the Coast Guard and pilot representatives, the specialized training and local experience needed to become registered pilots also presents a challenge to implementing competition because there is generally a limited supply of pilots available to compete in the same geographic area. Further, many of the governance structures and procedures of the existing Great Lakes pilotage system were established by statute and revisions would require legislative changes.", "document_type": "gao"}
{"report": "The federal government faces long-standing challenges in strategically managing its workforce. As shown in table 1, in addition to strategic human capital management, skills gaps played a role in 16 of the 34 other high-risk areas on our 2019 High-Risk List, including information technology management and acquisitions, and veterans’ health care. We have also designated as priority 29 of our prior recommendations to OPM because, upon implementation, they may have an especially significant impact on OPM’s operations. Twenty-one of these priority recommendations are aimed at addressing government-wide human capital challenges, including some of the ones discussed above. OPM agreed or partially agreed with most of these recommendations. OPM has implemented 10 of these priority recommendations to date, but needs to take additional action on the other 11. For example, OPM should continue to streamline hiring authorities to strengthen the government’s ability to compete in the labor market for top talent and improve the federal hiring process. We will continue to monitor OPM’s progress in implementing our recommendations. The government’s system of current employment policies was designed generations ago for a workforce and types of work that largely no longer exist. Much has changed since the Civil Service Reform Act of 1978 and the Classification Act of 1949 laid the foundation of today’s federal personnel system. We have identified several structural challenges within the federal human capital system that impede the ability of agencies to recruit, retain, and develop employees, both today and in the future. For example: Classification system. The General Schedule classification system—which defines and organizes federal positions, primarily to assign rates of pay—has not kept pace with the government’s evolving requirements. Recruiting and hiring. Federal agencies need a hiring process that is applicant friendly and flexible, and meets policy requirements. Pay system. Employees are compensated through an outmoded system that (1) rewards length of service rather than individual performance and contributions, and (2) automatically provides across- the-board annual pay increases, even to poor performers. Performance management. Federal agencies have faced long- standing challenges developing modern, credible, and effective employee performance management systems and dealing with poor performers. Additionally, the changing nature of federal work and high percentage of employees eligible for retirement could produce gaps in leadership and institutional knowledge. It could also threaten to aggravate the problems created from existing skills gaps. For example, 31.6 percent of permanent federal employees who were on board as of September 30, 2017 will be eligible to retire in the next five years, with some agencies, such as the Department of Housing and Urban Development and the Environmental Protection Agency, having particularly high levels of employees eligible to retire. In March 2019, we identified key trends in agency operations and attitudes toward work that are affecting how federal work is done and consequently, the skills and competencies that workers will need to accomplish agency missions (see fig. 1). Agencies will need to apply talent management strategies that are adapted to these trends to recruit, develop, and retain a high-performing workforce and better meet their missions. In light of trends and other challenges facing the government’s human capital management efforts, our prior work has identified actionable strategies that agencies may be able to use to effectively manage the future federal workforce in key talent management areas (see table 2). We noted that while these strategies are not an exhaustive list, collectively they suggest basic steps that agencies can take within existing authorities to position themselves to meet their talent needs. These practices are based on our review of related reports, group interviews with federal Chief Human Capital Officers (CHCO), and interviews with selected private organizations and foreign governments. For each strategy, we highlight examples of the challenges agencies face, actions OPM can take to implement related recommendations from our prior work, and practices that may help agencies implement the strategy. Align human capital strategy with current and future mission requirements. With shifting attitudes toward work, technological advances, and increased reliance on nonfederal partners, agencies need to identify the knowledge and skills necessary to respond to current and future demands. Key practices include identifying and assessing existing skills, competencies, and skills gaps. In May 2014, we reported that agencies should be aware of existing skills and competencies in their workforce to help inform workforce planning. As one example, the Department of the Treasury CHCO told us that, following the Puerto Rico debt crisis—where it needed to be able to identify the necessary skills to manage the crisis—the agency decided to implement an Integrated Talent Management System to facilitate workforce and succession planning as well as learning and performance management. Acquire and assign talent. To ensure agencies have the talent capacity to address evolving mission requirements and negative perceptions by some of federal work (e.g., that it is too bureaucratic), agencies can cultivate a diverse talent pipeline through strategic partnerships with academic and other institutions, highlight their respective missions, recruit early in the school year, support rotations, and assign talent where needed. As one example, consulting firm representatives that we interviewed for our prior work stated that their internship programs are among their most successful practices for cultivating a talent pipeline because the firms can offer full-time positions to rising seniors during the internship. A representative from one consulting firm said that, after experiencing challenges in recruiting on college campuses, the firm built a competitive internship program to promote the firm’s brand and reputation. Participants in the firm’s 10-week program are paid and assigned challenging projects, and successful participants are given job offers upon completion. According to the representative, approximately a quarter of the firm’s workforce is former interns. Similarly, CHCOs and federal employee and management group representatives we interviewed noted that internships are important for establishing a pipeline for recruitment. The federal government’s Pathways Programs, which consist of the Internship Program, the Recent Graduates Program, and the Presidential Management Fellows Program, were designed to promote employment opportunities for students and recent graduates by providing distinct paths to federal internships and potential careers in government. The Internship Program provides paid opportunities for students (high school, vocational, technical, undergraduate, and graduate) to work in agencies and explore federal careers while still in school. Students who successfully complete academic and program requirements may be eligible for non-competitive conversion to a term or permanent position in the civil service. In our prior work, we have also reported on the importance of cultivating a diverse talent pipeline through active campus recruiting which includes developing long-term institutional relationships with faculty, administrators and students, and by building a “brand” on campus. Other strategies to expand a talent pool include developing strategic partnerships with such entities as trade schools, apprentice programs, and affinity organizations from across the country. Another strategy for attracting strong candidates is for agencies to highlight their missions and innovative work, which, according to our expert and CHCO interviews, can help counter negative perceptions of federal employment. For example, the Department of Homeland Security (DHS) provides “Day in the Life” information on its work to promote public awareness of how its everyday tasks tie in with its mission of protecting the United States, according to the DHS CHCO. The DHS CHCO stated that promoting agency mission can be done while cultivating a talent pipeline and assessing applicants’ abilities. The department holds recruitment events where potential candidates can participate in law enforcement-related activities such as fitness testing. The CHCO noted that these events both promote homeland security careers and help prospective candidates determine if a position is a good fit for them. Incentivize and compensate employees. While federal agencies may struggle to offer competitive pay in certain labor markets, they can leverage existing incentives that appeal to workers’ desire to set a schedule and to work in locations that provide work-life balance. However, agencies do not always promote these benefits and incentives as part of a total compensation package, in part because managers are not always aware of the importance of doing so. Some agencies are addressing this issue by advertising and helping employees use available benefits, work-life balance programs, and other resources. For example, the National Science Foundation offers employees many opportunities to learn about existing benefits, according to the foundation’s CHCO. These opportunities include triannual retirement seminars where employees receive personalized retirement estimates, quarterly financial planning seminars where employees receive a free 1-hour consultation, and annual benefit fairs where employees can learn about various health care providers, the work-life programs, and the employee assistance program. Our prior analysis of CHCO and expert interviews also found that employees may value different benefits and incentives depending on their stage in life. By better understanding the desires of the workforce at various life stages, agencies can better tailor benefits packages and incentives to their employees. For example, the Social Security Administration’s CHCO said that the agency’s younger workers value work-life and wellness programs, so the agency implemented a health- tracking program and a fitness discount program for all employees. CHCOs also suggested identifying and incorporating the benefits that would be most useful to various groups of employees, such as sabbaticals for midlevel employees or paid parental leave for employees starting families. One CHCO found that her cybersecurity workforce values subsidies for training and additional certifications more than bonus pay. Further, OPM’s 2018 Federal Work-Life Survey Governmentwide Report found that the number of respondents who anticipate adult dependent care responsibilities in the next 5 years (31 percent) is double the number of respondents with current adult dependent care needs (15 percent). OPM officials stated in light of this change, agencies may need to provide greater workplace flexibilities and other support services to retain talent. Some CHCOs we interviewed for prior work said that they believe that paid parental leave could be a powerful retention tool for federal workers. Representatives from consulting firms that we interviewed said that they have observed positive impacts from these types of benefit programs. For example, representatives from one firm said that providing employees with peace of mind when managing life events helps them feel more committed to the organization. Engage employees. Engaged employees are more productive and less likely to leave, according to OPM. Agencies can better ensure their workforces are engaged by managing employee performance, involving employees in decisions, and developing employees. Experts we interviewed for prior work said that employees desire an environment where they can collaborate with their peers and feel a sense of comradery. In contrast, even a small number of poor performers can negatively affect employee morale and agencies’ capacity to meet their mission, according to CHCOs and our previous work. In the 2017 Federal Employee Viewpoint Survey (FEVS), 64 percent of federal employee respondents agreed that their supervisor provides them with constructive suggestions to improve job performance and 31 percent agreed that steps are taken to deal with poor performers. Without effective performance management, agencies risk not only losing the skills of top talent, they also risk missing the opportunity to effectively address increasingly complex and evolving mission challenges. Agencies can make performance management more effective by improving the selection and training of supervisors and managers, creating a “line of sight” between individual performance and organizational results, and implementing meaningful reward programs. Our prior analysis found that employees seek autonomy in the workplace, meaningful work, and opportunities to achieve results by developing creative and innovative solutions. Also, experts noted that in some cases, connecting federal employees to a sense of inclusion and meaning can compensate for the opportunity to make higher salaries in other sectors. Creating an inclusive work environment is one practice that can help increase employee involvement in decisions. CHCOs and federal employee and management group representatives said that more can be done to prioritize training, even in an era of resource constraints. In 2017, only 55 percent of FEVS respondents were satisfied with training. As an example of an agency prioritizing training efforts, the Social Security Administration has national and regional development programs that offer 12 to 18 months of training and rotations for entry-, mid-, and senior-level employees to strengthen foundational, technical, and leadership knowledge and skills, according to the agency’s CHCO. For example, its Leadership Development Program assigns selected GS-9 through GS-12 employees to developmental assignments in new areas of work, and provides leadership training that broadens their perspective of the agency’s mission. Chairman Connolly, Ranking Member Meadows, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Robert Goldenkoff, Director, Strategic Issues, at (202) 512-2757 or GoldenkoffR@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Shirley Hwang (Assistant Director), Shelby Kain (Analyst-In-Charge), Sarah Green, Allison Gunn, and Alexander Ray. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal workforce is critical to federal agencies' ability to address the complex social, economic, and security challenges facing the country. However, the federal government faces long-standing challenges in strategically managing its workforce. We first added federal strategic human capital management to our list of high-risk government programs and operations in 2001. Although Congress, OPM, and individual agencies have made improvements since then, federal human capital management remains a high-risk area because mission-critical skills gaps within the federal workforce pose a high risk to the nation. This testimony focuses on (1) key hiring and other human capital management challenges facing federal agencies, and (2) talent management strategies identified from GAO's prior work that agencies can use to be more attractive employers in a tight labor market. This testimony is based on GAO's large body of work on federal human capital management issued primarily between July 2014 and July 2019. To conduct these studies, GAO reviewed government-wide employment data and interviewed officials from OPM and subject matter specialists from think tanks, academia, government employee unions, and other areas. Outmoded approaches to personnel functions such as job classification, pay, and performance management are hampering the ability of agencies to recruit, retain, and develop employees. At the same time, agency operations are being deeply affected by a set of evolving trends in federal work, including how work is done and the skills that employees need to accomplish agency missions. Given these challenges and trends, federal agencies will need to apply talent management strategies such as the following: Align human capital strategy with current and future mission requirements. Agencies need to identify the knowledge and skills necessary to respond to current and future demands. Key practices include identifying and assessing existing skills, competencies, and skills gaps. Acquire and assign talent. To ensure the appropriate capacity exists to address evolving mission requirements, agencies can use internships, cultivate a diverse talent pipeline, highlight their respective missions, and recruit early in the school year. Incentivize and compensate employees. While agencies may struggle to offer competitive pay in certain labor markets, they can leverage existing incentives that appeal to workers' desire to set a schedule and to work in locations that provide work-life balance. Engage employees. Engaged employees are more productive and less likely to leave, according to the Office of Personnel Management (OPM). Agencies can better ensure their employees are engaged by managing their performance, involving them in decisions, and providing staff development. Of the 29 recommendations to OPM that GAO has designated as priorities for implementation, 21 are aimed at improving strategic human capital management efforts government-wide. OPM agreed or partially agreed with most of these recommendations, of which 11 are still open. GAO will continue to monitor OPM's progress in addressing them.", "document_type": "gao"}
{"report": "The boards that oversee the Social Security and Medicare trust funds are technically separate entities under the Social Security Act, but the same set of trustees have served as board members for each trust fund and the boards meet concurrently. For each board, four of the trustees are ex officio, i.e. members by virtue of their office and position: the Secretary of the Treasury, Secretary of Labor, Secretary of Health and Human Services, and the Commissioner of Social Security. The remaining two trustees are members of the public, nominated by the President, confirmed by the Senate, and the public trustees must not be from the same political party as one another. The public trustee positions were established in 1983; they have been vacant since 2015. The boards issue two separate Trustees reports each year, one on the Social Security trust funds and one on the Medicare trust funds. Under the Social Security Act, these reports are due by April 1 of each year. The Trustees reports provide information on the present and projected statuses of the trust funds, including their projected balances over the next 10 years (short-term), the next 75 years (long-term), and the assumptions and methods used to make these projections. The reports provide estimates of the projected costs and incomes of the trust funds, and any dates that the boards project the trust funds’ reserves to become depleted, among other information about the programs. Because projections are inherently uncertain, the reports include three projection scenarios: intermediate, low-cost, and high-cost alternatives, along with other information about uncertainty. The intermediate scenario is based on assumptions that reflect the boards’ best estimate of future experience. The low-cost scenario makes assumptions that are relatively more favorable with respect to the projected statuses of the trust funds, while the high-cost scenario does the opposite. For example, the low-cost scenario assumes more workers will pay into the trust funds and fewer beneficiaries will receive benefits, while the high-cost scenario assumes fewer workers and more beneficiaries. Officials in the Social Security Administration Office of the Chief Actuary (SSA OCACT) and the Centers for Medicare & Medicaid Services Office of the Actuary (CMS OACT) work with other agency officials and trustees to develop assumptions and draft and revise the Trustees reports in an annual cycle, according to agency officials and the board meeting minutes and report development schedules we reviewed (see fig. 1). At the end of each cycle, the boards have established a working group that is largely responsible for overseeing the day-to-day development of the next year’s report. This working group consists of officials in the four agencies that are led by the ex officio trustees (Treasury, DOL, HHS, and SSA), officials from SSA OCACT and CMS OACT, and the public trustees, when confirmed. All of the working group’s discussions and agreements are subject to the approval of the boards. The Secretary of the Treasury serves as the Managing Trustee and Chairperson of the boards. Treasury staff has historically coordinated the report development process, including organizing the development schedule and hosting the working group and boards’ meetings. The reports are drafted by SSA and CMS. SSA OCACT and CMS OACT officials we interviewed said they work to update the assumptions—both long-term and short-term—they propose as the basis for the trust fund projections in the reports. Assumptions are the demographic, economic, and program-specific factors that the actuaries use to model the future financial status of the trust funds (see appendix I). For each assumption, SSA OCACT and CMS OACT go through a process of updating the values for the 75-year projection period as needed and use those updated values as inputs in their models to project future costs and income for the trust funds. As a part of this process, the working group discusses issues that inform the assumptions proposed by SSA OCACT and CMS OACT. The work on assumptions is divided according to the specializations and expertise of the two actuarial offices, and is developed by staff from a range of disciplines, including actuaries, demographers, and economists. SSA OCACT develops the demographic and economic assumptions that are common to both reports, including rates for fertility, mortality, and growth in gross domestic product. SSA OCACT also prepares the programmatic assumptions for Social Security, such as the numbers of retirement and disability beneficiaries and the anticipated income into the trust funds from payroll taxes. CMS OACT prepares the programmatic assumptions that are specific to Medicare, such as the number of Medicare beneficiaries and expected growth in health care costs. SSA OCACT and CMS OACT officials update assumptions and revise their methodologies based on recent data, if a change is warranted. For example, the 2017 Social Security Trustees report projected an increase in the total fertility rate. Information collected in the subsequent year showed that fertility rates had not risen as expected, so officials reduced the fertility rate assumptions for the 2018 report. SSA OCACT officials told us that they look at both the reasonableness of the assumptions individually and in the aggregate, as some assumptions interrelate. According to agency officials we interviewed, the assumptions generally undergo gradual or no changes from year to year, unless there are significant policy changes. SSA OCACT and CMS OACT also update their models by incorporating more recent data into them. For example, in the 2017 Social Security Trustees report, the model for projecting average age benefit levels of retired worker and disabled worker beneficiaries who are newly entitled to benefits used a sample of these beneficiaries from 2013. In the 2018 report, this model was updated to use a sample from 2015. The working group considers and works towards consensus on the assumptions proposed by SSA OCACT and CMS OACT. Members of the working group meet periodically to discuss the assumptions and come to an agreement on the values for them. In these meetings, the working group often hears presentations from internal or external experts on specific topics. For example, in one meeting, SSA staff led a presentation and discussion on Disability Insurance, and DOL staff led a presentation and discussion on how globalization might affect long-term economic trends. To inform their discussions, the working group may also review reports from technical panels or invite panel members to discuss their findings and recommendations at a working group meeting. For example, in September 2012, the working group discussed a Medicare technical panel recommendation that the board continue to present alternative projections in which average Medicare spending per beneficiary rises faster than the current law baseline; the working group and board agreed to implement this recommendation. Throughout the working group’s activities, the members representing the ex officio trustees generally serve as a liaison between the trustee for their agency and the working group. When confirmed, public trustees participate directly on the working group. After consideration, the working group finalizes long-term assumptions at a fall board meeting. The long-term assumptions serve as the basis for the short-term assumptions and the 75-year trust fund projections. For each long-term assumption, the boards set the “ultimate value”, i.e. the constant rate or number that is projected to be met in a particular year (within 10 years in most cases) and then continued through the remainder of the 75-year projection period. For example, for the 2019 Trustees reports, the boards set the ultimate value for the annual change in covered earnings as a percent of total labor compensation for each year beginning in 2028 and continuing through 2093. In most cases, according to agency officials we interviewed, the working group achieves consensus on the assumptions before the fall board meeting. However, when the working group is unable to reach consensus, the boards settle any outstanding issues and tend to either make no changes or incremental changes over time to avoid major swings in year-to-year projections, according to some agency officials we interviewed. Once the long-term ultimate values are set by the boards, the working group then discusses the short-term assumptions that bridge the gap between current data and the ultimate values. The working group first considers and works toward agreement on the short-term economic assumptions and then the health assumptions. Short-term economic assumptions can vary during the early years of the projection period. The projection of Medicare’s HI Trust Fund depletion date is based on detailed short-term growth rate assumptions for individual types of Medicare services, such as inpatient hospital care. Once the assumptions are set, officials at SSA OCACT develop the projections that determine the actuarial status and then draft the Social Security Trustees report, and officials at CMS OACT do the same for the Medicare Trustees report. The reports include information on and values of the assumptions, projected financial statuses of the trust funds and programs, actuarial analyses and estimates, and technical information on the methodologies and projections. In addition, the reports note changes to the assumptions, methodology, and projections from prior reports, and explain the implications for the trust funds. The reports also include statements of opinion by the relevant agency’s Chief Actuary regarding whether the techniques and methodologies used are generally accepted within the actuarial profession and whether the assumptions used and the resulting actuarial estimates are reasonable. When the drafts are completed, SSA OCACT and CMS OACT circulate them to the working group for comments and agreement. According to one former public trustee, these comments are mostly related to the presentation of the information, such as word choices, as members have previously agreed to the assumptions. SSA OCACT or CMS OACT officials respond to these comments, and make revisions to the reports in several rounds, engaging with the working group for comment on each new version of the reports. As with the earlier round when the working group worked toward consensus on the assumptions, the working group members that represent the ex officio trustees can brief the trustee from their agency and bring any input back to the working group to help ensure that the trustees agree with the reports. The final drafts of the Trustees reports are presented and approved at the annual spring meeting of the boards. Under the boards’ bylaws, members of the boards must be present at these meetings to approve the reports. During the meeting, agency officials provide an overview of the reports to the trustees and other attendees, and explain changes in the overall projections from the previous year’s reports. For those trust funds with an estimated depletion date, agency officials explain the estimated dates of depletion and the potential implications for beneficiaries. After any discussion, the trustees sign the reports and the boards formally issue them to Congress. Public trustees, when confirmed, play unique roles as members of the boards and also the working group that develops the Trustees reports. Former public trustees we interviewed said their role was to represent the public in the report development process, independent of the ex officio trustees and other agency officials in the administration. To become members of the board, public trustees must be nominated by the President and confirmed by the Senate, and the public trustee cannot both be from the same political party. Those we interviewed stressed the importance of not allowing personal and political opinions to influence their work on the Trustees reports. As a result, according to both agency officials and former public trustees, having public trustees in place lends credibility to the reports. Former public trustees stated that they worked closely with their counterpart public trustee to coordinate their comments and input to the working group. Historically, public trustees sometimes questioned or encouraged changes to some assumptions used in the reports, according to former public trustees and some agency officials. When in place, public trustees regularly attend working group meetings, whereas ex officio trustees do not. According to the former public trustees we interviewed, they saw part of their role as facilitating conversations as leaders and moving the group towards consensus on assumptions. Additionally, former public trustees and some agency officials said trustees are more hesitant to change the assumptions in the reports when there are no public trustees in place, out of concern that any change could be viewed as politically motivated. For example, in 2017 the boards discussed whether or not to change the long-range real interest rate assumption from the rate used in the previous year’s Trustees reports. The boards decided to keep the assumptions unchanged, in part because there were no public trustees in place. When they are in place, public trustees can also help communicate the message of the Trustees reports to policy makers and the public. As an example, the Trustees reports can be technical and difficult to understand; to address this, the public trustees introduced a summary of the reports in 1991, which presented the reports’ findings in a way that is more accessible to the general public. Former public trustees said they were able to inform policy makers on the contents of the reports through congressional testimony and direct conversations with congressional staff. One former public trustee reported that he was a resource for the media, spending hours on the phone providing his perspective and explaining the reports’ implications for policy decisions. In addition, public trustees published a separate message that allowed them to present what they believe to be the main idea of the reports. The boards issued the Trustees reports to Congress after the April 1 statutory deadline in 17 of the 25 years from 1995 to 2019, including every year from 2009 through 2019 (see fig. 2). Since 2009, the boards have issued the reports at least 2 months late six times; they only issued the reports this late one time in the 14 years from 1995 to 2008. Agency officials and former public trustees provided a number of reasons why the Trustees reports have been late in recent years. Agency officials and former public trustees said they may delay reports in order to include the impact of late-breaking legislation or policy changes on the assumptions or data. SSA OCACT told us that this decision is based on (1) if the policy change results in substantial changes to assumptions and (2) if the policy change affects a policy that is directly governing a trust fund. For example, agency officials and former public trustees stated that the Patient Protection and Affordable Care Act (PPACA), enacted on March 23, 2010, significantly contributed to the 2010 reports being issued August 5, 2010, over 4 months past the deadline. PPACA significantly affected many of the factors that were the basis for the Medicare Trustees report projections, such as reducing projected Medicare expenditures through various policy changes, including a change to the payment formula for the Medicare Advantage program—the private health plan alternative to traditional Medicare. According to one former public trustee, if the boards had issued a report that did not reflect the changes made by PPACA, it would not have been applicable to the current outlook of the Medicare trust funds and therefore not as useful to Congress and the public. Agency officials have also reported that there have been instances of waiting for more complete or recent data sets to become available before calculating the actuaries’ projections. According to CMS officials, a tradeoff exists between updating data and meeting the deadline. For example, Treasury officials told us that because the working group decided that CMS OACT should not wait for January 2019 Medicare Advantage enrollment data, the 2019 Trustees reports were issued earlier (April 22) than they would have been if they had waited for the complete end of year data, as they had in previous years. Agency officials and public trustees also cited difficulties in scheduling the spring board meetings as a factor that contributed to delays in issuing the Trustees reports. The boards’ bylaws require the annual reports to be adopted by a majority of the trustees who are present and voting. However, sometimes Treasury staff experienced difficulty scheduling the meeting. According to Treasury officials responsible for scheduling the meeting, they generally wait until the first drafts of the Trustees reports are completed before they schedule the spring board meeting to avoid having to reschedule the meeting if the draft reports are provided after the working group’s internal deadline. For the last 15 years (2005-2019), report development schedules from SSA OCACT indicated that the draft reports were provided to the working group after the internal deadline 12 times. In the other 3 years, the report development schedules did not show the actual date that the draft reports were provided. As a result of scheduling the meeting later in the process, Treasury staff has sometimes not been able schedule a meeting that all of the Trustees can attend prior to the statutory deadline of April 1. Other challenges that contribute to delays include government shutdowns and staff having conflicting concurrent responsibilities, according to some agency officials or former public trustees. When the government shut down for 11 business days in October 2013, the board meeting minutes show that it affected the timelines for the 2014 Trustees reports. However, according to HHS, government shutdowns have never materially delayed the release dates for the Trustees reports. Some former public trustees and one agency official we spoke to stated that agency officials involved in the report process sometimes had other duties competing for their time, which could result in delaying their work on the Trustees reports, while other agency officials stated this was not a factor. Agency officials’ scheduling process is inconsistent with GAO’s guide on best practices for schedule management. Agency officials and former public trustees said they attempted to meet the statutory deadline each year, but did not believe issuing the report after the deadline created serious negative consequences. As a result, agency officials and former public trustees involved with developing the reports in recent years said they developed a schedule designed to meet the deadline knowing it would most likely not be met. Several agency officials and former public trustees described the schedule as “ambitious” and difficult to achieve. If the schedule is unrealistic from the start of the process, and if involved parties view it as an unlikely goal, rather than the expected outcome, then the schedule does not serve as a useful tool for managing the timely development of the Trustees reports. In addition to designing an unrealistic Trustees reports schedule, agency officials did not always document actual progress in meeting scheduled dates or modify the schedule in a way that would allow them to overcome early setbacks. Treasury officials, who organize the schedule for developing the Trustees reports, stated that the initial proposed schedule is updated only once during the report process, after the first drafts of the reports are completed. According to best practices, the schedule should be updated regularly with actual progress and remaining work. Without doing so, it could be difficult to respond to actual events while still meeting set deadlines. Treasury has not regularly archived the final version of the schedule with the dates that milestones were actually met. According to best practices, the final iteration of the schedule that was actually followed should be archived and used to inform and improve future schedules. Treasury officials were able to provide us with the archived, updated schedules for only 6 of the last 25 years, and these schedules were incomplete. While these updated schedules showed the actual dates that the draft reports were provided and the planned dates for later milestones, they did not include the dates for milestones before the draft reports were provided or the actual dates for the later milestones, including the reports’ issuance dates. Further, although the boards have regularly missed the statutory deadline, the initial report-development schedules have not significantly changed in recent years. Based on the proposed schedules for the Trustees reports that are presented in the spring board meeting minutes we reviewed, the initial schedules for each milestone in the report development process, such as obtaining agreement on assumptions or circulating drafts, has not significantly changed in the last 6 years, although the schedules have consistently proven difficult to meet (see table 1). Without recording the actual report production schedule that was followed, participating officials do not have the historical data that would assist them in making meaningful and effective changes to future schedules. Finally, according to best practices, it is important that stakeholders, including decision makers, have access to information on the progress of the project. Agency officials and former public trustees stated that they do not have a policy or practice of informing Congress of delays or changes to the schedules for the Trustees reports, even in years when the board issues the reports months after the deadline. Given this, Congress, the recipient of the Trustees reports, remains uninformed of the reports’ release date or the factors contributing to a delay in any given year. This uncertainty may hinder Congress from planning legislative sessions in advance that would use the findings of the Trustees reports. For example, congressional committees of jurisdiction may be hindered in scheduling hearings on or around the time of the reports’ release date and having access to the latest data from the reports to inform their oversight. Trustees and agency officials set out at the start of each report cycle with a schedule to meet the statutory deadline to issue the Social Security and Medicare reports each year by April 1. However, over the past 25 years, they have mostly issued the reports after the deadline. Some of the factors contributing to the boards delivering the reports late may seem reasonable to agency officials and trustees. For example, investing time to make the report consistent with new legislation impacting Social Security or Medicare programs, or waiting for end of year data to be available, may make the report more useful than if it contained older information. However, other factors related to the management of the schedule for developing the reports, such as not formally tracking the reports’ progress or adjusting the schedule based on lessons learned in prior years, may have contributed to delays. Taking steps to improve the management of the report-development schedule would better position the trustees and agency officials to anticipate and plan for scheduling the spring boards meeting and to meet the statutory deadline in future years. Additionally, recognizing that there may continue to be instances in which the issuance of the reports will be delayed, establishing a policy to inform Congress of potential delays and factors contributing to those delays would enhance Congress’s ability to conduct oversight and make decisions about these important programs. We are making the following two recommendations to the Secretary of the Treasury: The Secretary of the Treasury, as Chairperson of the Boards of Trustees, should work with the other trustees to take steps—in consultation with the chief actuaries of SSA and CMS—to improve the management of the report development schedule in order to provide the Trustees reports to Congress by the statutory deadline. These steps could include regularly updating the schedule using actual progress and archiving the final iteration of the schedules. (Recommendation 1) The Secretary of the Treasury, as Chairperson of the Boards of Trustees, should work with the other trustees to establish a policy to inform Congressional committees of jurisdiction when the trustees determine that the reports are expected to miss the issuance deadline. This outreach should include 1) the factors that are contributing to delays, and 2) the reports’ expected issuance dates. (Recommendation 2) We provided a draft of this report to the Secretary of the Treasury, the Secretary of Health and Human Services, the Secretary of Labor, and the Commissioner of Social Security for review and comment. Treasury and SSA provided formal written comments, and both agencies agreed with our recommendations. (See appendixes II and III.) Treasury, SSA, and HHS provided technical comments, which we incorporated as appropriate. DOL had no comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Treasury, the Secretary of Health and Human Services, the Secretary of Labor, the Commissioner of Social Security, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Elizabeth Curda at (202) 512-7215 or curdae@gao.gov or James Cosgrove at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In addition to the contact named above, Mark Glickman (Assistant Director), Gregory Giusto (Assistant Director), Paul Schearf (Analyst-in- Charge), Christie Enders, and Samuel Gaffigan made key contributions to this report. Additional assistance was provided by Bill Boutboul, Juana Collymore, Robert Dacey, Alex Galuten, Yvette Gutierrez, Janice Latimer, Emei Li, Sheila R. McCoy, Art Merriam, Mimi Nguyen, Stacy Ouellette, Oliver Richard, Joseph Silvestri, Dawn Simpson, Ardith Spence, Almeta Spencer, Frank Todisco, and Walter Vance.", "summary": "The Social Security Act requires boards of trustees to issue reports to Congress by April 1 each year on the financial status of the Social Security and Medicare trust funds. Policymakers and others can use these reports to understand the programs' finances, conduct oversight, and consider legislative proposals for the programs. GAO was asked to review the timeliness of these reports. This report (1) describes how the boards of trustees develop the annual Trustees reports, and (2) examines the extent to which the boards of trustees have provided the reports to Congress by the April 1 deadline since 1995, and what factors account for any delays. GAO reviewed boards of trustees meeting minutes from 1995-2018, working group agendas from 2011-2018, and report development schedules and the annual Trustees reports from 1995-2019; as well as relevant federal law. GAO also interviewed agency working group officials from SSA and CMS; the Departments of Health and Human Services, Labor, and the Treasury; and eight former public trustees who served since 1995. Annual reports on the status of Social Security and Medicare trust funds are developed through a collaboration between agency officials and trustees, which include relevant Cabinet members and public members nominated by the President (if confirmed). Offices of the Chief Actuaries from the Social Security Administration (SSA) and the Centers for Medicare & Medicaid Services (CMS) submit data and draft reports to a working group of agency officials representing trustees and any public trustees. The working group reviews the information and, after gaining consensus, submits it to the boards of trustees for final approval. The boards of trustees send the final reports to Congress. The trustees missed the April 1 statutory deadline for submitting the reports to Congress in 17 of the 25 years from 1995 to 2019, and have issued them more than 2 months late in 6 of the last 10 years (see figure). According to agency officials and former public trustees GAO interviewed, factors that may account for delays include late-breaking changes to assumptions or data, and difficulty scheduling the boards' meetings. Additionally, contrary to GAO's guide on best practices for project schedules, officials have not taken steps to update the report-development schedules to reflect actual progress, maintained a formally documented baseline schedule to incorporate lessons learned from prior years, or notified Congress of their progress. Without taking steps to improve report-development schedule management, these trust fund reports will likely continue to be untimely, missing the April 1 statutory deadline. Also, without improved efforts to keep congressional committees informed, Congress will be unaware of when the reports will be issued, potentially hindering oversight of the trust funds. GAO recommends that Treasury take steps to work with the other trustees to improve schedule management for developing the annual Trustees reports, and to establish a policy to inform congressional committees of jurisdiction about expected delays in issuing the reports. Treasury agreed with the recommendations.", "document_type": "gao"}
{"report": "SAMHSA and other organizations recognize recovery homes—peer-run and peer-managed supportive homes—as an important step in SUD treatment and recovery. Definitions of and terms for recovery homes can vary, and recovery homes may differ in the types of services offered and resident requirements. Alcohol- and drug-free homes for individuals recovering from SUD may be referred to as “recovery residences,” “sober homes,” or other terms. For the purposes of our March 2018 report, we used the term “recovery homes” to refer to peer-run, nonclinical living environments for individuals recovering from SUD in general. Recovery homes generally are not considered to be residential treatment centers, are not eligible to be licensed providers for the purposes of billing private insurance or public programs—such as Medicaid—and residents typically have to pay rent and other home expenses themselves. Recovery home residents may separately undergo outpatient clinical SUD treatment, which is typically covered by health insurance. In addition, recovery homes may encourage residents to participate in mutual aid or self-help groups (e.g., 12-step programs such as Alcoholics Anonymous) and may require residents to submit to drug screening to verify their sobriety. Residents may be referred to recovery homes by treatment providers, the criminal justice system, or may voluntarily seek out such living environments. In our March 2018 report, we found that the prevalence of recovery homes nationwide was unknown, because complete data were not available. We found these data are not collected at the federal level to provide a nationwide picture, in part, because there was no federal agency responsible for overseeing them. However, as we reported in March 2018, two national organizations with missions dedicated to recovery homes collect data on the prevalence and characteristics for a sub-set of recovery homes and the number of homes that were not affiliated with these organizations was unknown. NARR collected data on recovery homes that sought certification by one of its 15 state affiliates that actively certify homes. As we previously reported, as of January 2018, NARR told us that its affiliates had certified almost 2,000 recovery homes, which had the capacity to provide housing to over 25,000 individuals. Oxford House, Inc. collected data on the prevalence and characteristics of its individual recovery homes (known as Oxford Houses). In its 2018 annual report, Oxford House, Inc. reported that there were 2,542 Oxford Houses in 45 states. Officials from four of the five selected states we reviewed for our March 2018 report (Florida, Massachusetts, Ohio, and Utah) told us that since 2007, state agencies had conducted, or were in the process of conducting, law enforcement investigations of unscrupulous behavior and potential insurance fraud related to recovery homes. According to the state officials, the outcomes of some of these investigations included criminal charges and changes to health insurance policies. Across the four states, officials told us that the potential insurance fraud may have relied on unscrupulous relationships between SUD treatment providers (including laboratories that perform tests to check for substance use) and recovery home operators. Officials explained that recovery home operators establish these relationships, because they cannot directly bill health insurance themselves due to the fact that recovery homes are not considered eligible providers for the purposes of billing health insurance. For example, treatment providers may form relationships with recovery home operators who then recruit individuals with SUD in order to refer or require residents to see the specific SUD treatment providers. This practice is known as patient brokering, for which recovery home operators receive kickbacks, such as cash or other remuneration from the treatment provider, in exchange for patient referrals. The extent of potential fraud differed across the four states, as discussed below. Officials from several state agencies and related entities described investigations into fraud related to recovery homes in southeastern Florida as extensive, although the scope of the fraud within the industry is unknown. In 2016, the state attorney for the 15th judicial circuit (Palm Beach County) convened a task force composed of law enforcement officials tasked with investigating and prosecuting individuals engaged in fraud and abuse in the SUD treatment and recovery home industries. The task force found that unscrupulous recovery home operators or associated SUD treatment providers were luring individuals into recovery homes using deceptive marketing practices. These practices included online or other materials that willfully misdirected individuals or their family members to recruiters with the goal of sending these individuals to specific treatment providers so that the recruiters could receive payments from those treatment providers for each referral. According to officials from the Florida state attorney’s office, these individuals—often from out of state—were lured with promises of free airfare, rent, and other amenities to recover in southern Florida’s beach climate. Recruiters brokered these individuals to SUD treatment providers, who then billed their private insurance plans for extensive and medically unnecessary urine drug testing and other services. Officials from the Florida state attorney’s office told us that SUD treatment providers were paying $300 to $500 or more per week to recovery home operators or their staff members for every individual they referred for treatment. In addition, these officials cited one case in which a SUD treatment provider billed an individual’s insurance for close to $700,000 for urine drug testing over a 7-month period. Officials from the state attorney’s office noted that the recovery homes that the task force investigated were not shared homes in the traditional, supportive sense, but rather existed as “warehouses” intended to exploit vulnerable individuals. As a result of these investigations, as of December 2017, law enforcement agencies had charged more than 40 individuals primarily with patient brokering, with at least 13 of those charged being convicted and fined or sentenced to jail time, according to the state attorney’s office. In addition, the state enacted a law that strengthened penalties under Florida’s patient brokering statute and gave the Florida Office of Statewide Prosecution, within the Florida Attorney General’s Office, authority to investigate and prosecute patient brokering. An official from the Massachusetts Medicaid Fraud Control Unit told us that the unit began investigating cases of Medicaid fraud in the state on the part of independent clinical laboratories associated with recovery homes in 2007. The unit found that, in some cases, the laboratories owned recovery homes and were self-referring residents for urine drug testing. In other cases, the laboratories were paying kickbacks to recovery homes for referrals for urine drug testing that was not medically necessary. According to the Medicaid Fraud Control Unit official, as a result of these investigations, the state settled with nine laboratories between 2007 and 2015 for more than $40 million in restitution. In addition, the state enacted a law in 2014 prohibiting clinical laboratory self-referrals and revised its Medicaid regulations in 2013 to prohibit coverage of urine drug testing for the purposes of residential monitoring. At the time of our March 2018 report, Ohio had begun to investigate an instance of potential insurance fraud related to recovery homes, including patient brokering and excessive billing for urine drug testing. Officials from the Ohio Medicaid Fraud Control Unit told us that the unit began investigating a Medicaid SUD treatment provider for paying kickbacks to recovery homes in exchange for patient referrals, excessive billing for urine drug testing, and billing for services not rendered, based on an allegation the unit received in September 2016. Officials from other state agencies and related state entities, such as the state’s substance abuse agency and NARR affiliate, were not aware of any investigations of potential fraud on the part of recovery home operators or associated treatment providers when we interviewed with them. According to these state officials, this type of fraud was not widespread across the state. In our March 2018 report, we reported that officials from the Utah Insurance Department told us that the department was conducting ongoing investigations of private insurance fraud similar to the activities occurring in Florida, as a result of a large influx of complaints and referrals the department had received in 2015. These officials told us that the department had received complaints and allegations that SUD treatment providers were paying recruiters to bring individuals with SUD who were being released from jail to treatment facilities or recovery homes; billing private insurance for therapeutic services, such as group or equine therapy, that were not being provided, in addition to billing frequently for urine drug testing; and encouraging individuals to use drugs prior to admission to qualify them and bill their insurance for more intensive treatment. In addition, insurance department officials told us that they believed providers were enrolling individuals in private insurance plans without telling them and paying their premiums and copays. According to these officials, when doing so, providers may lie about the individuals’ income status in order to qualify them for more generous insurance plans. Officials found that providers were billing individuals’ insurance $15,000 to $20,000 a month for urine drug testing and other services. Officials noted that they suspect that the alleged fraud was primarily being carried out by SUD treatment providers and treatment facilities that also own recovery homes. The officials said the department had not been able to file charges against any treatment providers, because it had been unable to collect the necessary evidence to do so. However, according to the officials, the state enacted legislation in 2016 that gave insurers and state regulatory agencies, such as the state’s insurance department and licensing office, the authority to review patient records and investigate providers that bill insurers. As we noted in our March 2018 report, this authority may help the insurance department and other Utah regulatory agencies better conduct investigations in the future. In addition to actions taken in response to state investigations, our March 2018 report described steps taken by three of the five selected states (Florida, Massachusetts, and Utah) to formally increase oversight of recovery homes by establishing state certification or licensure programs. Florida enacted legislation in 2015 and Massachusetts enacted legislation in 2014 that established voluntary certification programs for recovery homes. Further, Florida established a two-part program for both recovery homes and recovery home administrators (i.e., individuals acting as recovery home managers or operators). According to officials from the Florida state attorney’s office and Massachusetts Medicaid Fraud Control Unit, their states established these programs, in part, as a result of state law enforcement investigations. Utah enacted legislation in 2014 to establish a mandatory licensure program for recovery homes. According to officials from the Utah substance abuse agency and the state licensing office, Utah established its licensure program, in part, to protect residents’ safety and prevent their exploitation and abuse. In our March 2018 report, we found that although state recovery home programs in Florida and Massachusetts are voluntary, there are incentives for homes to become certified under these states’ programs, as well as incentives to become licensed under Utah’s programs. Specifically, all three states require that certain providers refer patients only to recovery homes certified or licensed by their state program; therefore, uncertified and unlicensed homes in the three states are ineligible to receive patient referrals from certain treatment providers. Further, state officials told us that state agencies are taking steps to ensure providers are making appropriate referrals. For example, according to officials from the Florida substance abuse agency, treatment providers may refer individuals to certified recovery homes managed by certified recovery home administrators only and must keep referral records. To become state-certified or licensed, recovery homes in Florida, Massachusetts, and Utah must meet certain program requirements, including training staff, submitting documentation (such as housing policies and a code of ethics), and participating in onsite inspections to demonstrate compliance with program standards. However, specific requirements differ across the three states. For example, while all three state programs require recovery home operators or staff to complete training, the number of hours and training topics differ. In addition, for recovery homes to be considered certified in Florida, they must have a certified recovery home administrator. Similar to Florida’s certification program for the homes, individuals seeking administrator certification must meet certain program requirements, such as receiving training on recovery home operations and administration, as well as training on their legal, professional, and ethical responsibilities. Features of the state- established oversight programs also differ across the three states, including program type, type of home eligible for certification or licensure, certifying or licensing body, and initial fees. As we noted in our March 2018 report, the state-established oversight programs in Florida, Massachusetts, and Utah also include processes to monitor certified or licensed recovery homes, and take action when homes do not comply with program standards. For example, an official from the Florida Association of Recovery Residences—the organization designated by the state to certify recovery homes—told us that the entity conducts random inspections to ensure that recovery homes maintain compliance with program standards. State-established oversight programs in the three states also have processes for investigating grievances filed against certified or licensed recovery homes. Further, officials from certifying or licensing bodies in all three states told us their organizations may take a range of actions when they receive complaints or identify homes that do not comply with program standards, from issuing recommendations for bringing homes into compliance to revoking certificates or licenses. According to officials from Florida’s certifying body, the entity has revoked certificates of recovery homes that have acted egregiously or have been nonresponsive to corrective action plans. Officials from the certifying and licensing bodies in Massachusetts and Utah told us that they had not revoked certificates or licenses, but had possibly assisted homes with coming into compliance with certification standards or licensure requirements. Officials from Ohio and Texas told us that their states had not established state oversight programs like those in Florida, Massachusetts, and Utah, but said their states had provided technical assistance and other resources to recovery homes in an effort to increase consistency, accountability, and quality. Officials from the Ohio substance abuse agency told us that since 2013 the state has revised its regulatory code to define recovery homes and minimum requirements for such homes. Officials also told us that the agency did not have authority to establish a state certification or licensure program for recovery homes. According to these officials, the state legislature wanted to ensure that Ohio’s recovery homes community maintained its grassroots efforts and did not want a certification or licensure program to serve as a roadblock to establishing additional homes. However, officials from the Ohio substance abuse agency told us that the agency encourages recovery homes to seek certification by the state’s NARR affiliate—Ohio Recovery Housing—to demonstrate quality. In addition, these officials told us that the state substance abuse agency also provided start-up funds for Ohio Recovery Housing, as well as continued funding for the affiliate to provide training and technical assistance, and to continue certifying recovery homes. According to officials from Ohio Recovery Housing, the NARR affiliate regularly provides the state’s substance abuse agency with a list of newly certified recovery homes, as well as updates on previously certified homes as part of ongoing efforts to develop a recovery home locator, under its contract with the agency. Officials from the Texas substance abuse agency told us that establishing a voluntary certification program would be beneficial. However, the state legislature had not enacted legislation establishing such a program at the time of our review. At the time of our report, the agency was in the process of developing guidance for providers on where and how to refer their patients to recovery housing, which includes a recommendation to send patients to homes certified by the Texas NARR affiliate. Chairman Grassley, Ranking Member Wyden, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff members have any questions concerning this testimony, please contact me at (202) 512-7114 or deniganmacauleym@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals who made key contributions to this testimony include Tom Conahan (Assistant Director), Kristin Ekelund (Analyst-in-Charge), Drew Long, Sarah Resavy, and Emily Wilson. Other staff who made key contributions to the report cited in the testimony are identified in the source product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Substance abuse and illicit drug use, including the use of heroin and the misuse of alcohol and prescription opioids, is a growing problem in the United States. Individuals with a substance use disorder may face challenges in remaining drug- and alcohol-free. Recovery homes can offer safe, supportive, drug- and alcohol-free housing to help these individuals maintain their sobriety and can be an important resource for recovering individuals. However, as GAO reported in March 2018, some states have conducted investigations of potentially fraudulent practices in some recovery homes. This statement describes (1) what is known about the prevalence of recovery homes across the United States; and (2) investigations and actions selected states have undertaken to oversee such homes. It is largely based on GAO's March 2018 report (GAO-18-315). For that report, GAO reviewed national and state data, among other things, and interviewed officials from the Department of Health and Human Services, national associations, and five states—Florida, Massachusetts, Ohio, Texas, and Utah. GAO selected these states based on their rates of opioid overdose deaths, their rates of dependence or abuse of alcohol and other drugs, and other criteria. In March 2018, GAO found that the prevalence of recovery homes (i.e., peer-run or peer-managed drug- and alcohol-free supportive homes for individuals in recovery from substance use disorder) was unknown. Complete data on the prevalence of recovery homes were not available, and there was no federal agency responsible for overseeing recovery homes that would compile such data. However, two national organizations collected data on the prevalence of recovery homes for a subset of these homes. The National Alliance for Recovery Residences (NARR), a national nonprofit and recovery community organization that promotes quality standards for recovery homes, collected data only on recovery homes that sought certification by some of its state affiliates. As of January 2018, NARR told us that its affiliates had certified almost 2,000 recovery homes, which had the capacity to provide housing to over 25,000 individuals. Oxford House, Inc. collected data on the number of individual recovery homes it charters. In its 2018 annual report, Oxford House, Inc. reported that there were 2,542 Oxford Houses in 45 states. The number of recovery homes that were not affiliated with these organizations was unknown. In March 2018, GAO also found that four of the five states in its review—Florida, Massachusetts, Ohio, and Utah—had conducted, or were in the process of conducting, investigations of potentially fraudulent recovery home activities in their states. Activities identified by state investigators included schemes in which recovery home operators recruited individuals with substance use disorder to specific recovery homes and treatment providers, and then billed those individuals' insurance for extensive and unnecessary drug testing for the purposes of profit. For example, officials from the Florida state attorney's office told GAO that, in some instances, substance use disorder treatment providers were paying $300 to $500 or more per week to recovery home operators for every individual the operators referred for treatment. Then, in one of these instances, the provider billed an individual's insurance for hundreds of thousands of dollars in unnecessary drug testing over the course of several months. Further, these officials told GAO that as a result of these investigations at least 13 individuals were convicted and fined or sentenced to jail time. To increase oversight, officials from three of the five states—Florida, Massachusetts, and Utah—said they had established state certification or licensure programs for recovery homes in 2014 and 2015. Officials from the other two states—Ohio and Texas—had not established such programs, but were providing training and technical assistance to recovery homes.", "document_type": "gao"}
{"report": "Depots are government-owned, government-operated industrial installations that maintain, overhaul, and repair a multitude of complex military weapon systems and equipment for the Department of Defense. Depots are essential to maintaining readiness for DOD and play a key role in sustaining weapon systems and equipment in meeting operational, contingency, and training requirements. There are 17 depots operated by the military services that perform depot-level maintenance on a wide range of vehicles and other military assets, including aircraft, engines, helicopters, combat vehicles, ships, and software. Five are Army depots, four are Naval shipyards, three are Navy fleet readiness centers, two are Marine Corps production plants, and three are Air Force air logistics complexes. Figure 1 below shows the location of these 17 depots across the United States. The depots are part of a larger, DOD-wide logistics enterprise that involves a number of different organizations (See fig. 2.). Office of the Under Secretary of Defense for Acquisition and Sustainment. This office is responsible for, among other things, ensuring the defense industrial base, including depots, is robust, secure, resilient and innovative. Office of the Assistant Secretary of Defense for Sustainment. This office serves as the principal assistant and advisor to the Under Secretary of Defense for Acquisition and Sustainment on material readiness. Among other responsibilities, the Assistant Secretary of Defense for Sustainment prescribes policies and procedures on maintenance, materiel readiness, and sustainment support. Office of the Deputy Assistant Secretary of Defense for Materiel Readiness. This office establishes and maintains maintenance policies and programs to maintain the desired levels of weapon systems and military equipment readiness to accomplish the Department's missions. Further, according to DOD officials as well as DOD’s March 2018 report to Congress on sharing best practices, the Office of the Deputy Assistant Secretary of Defense for Materiel Readiness has established a governance framework for materiel maintenance at DOD depots. There are a number of stakeholders involved in this framework, including the Maintenance Executive Steering Committee (Committee) and the Joint Group-Depot Maintenance. Maintenance Executive Steering Committee. This Committee consists of senior maintenance and logistics representatives from the Office of the Secretary of Defense, the Joint Staff, the Defense Logistics Agency, and the military services. According to DOD, this Committee advises the Deputy Assistant Secretary of Defense for Materiel Readiness on initiatives affecting efficiency, effectiveness, and affordability of maintenance management and operations. The Committee also serves as a forum for a coordinated review of maintenance policies, systems, programs and activities and helps optimize and steer DOD enterprise maintenance practices and strategy. Joint Group–Depot Maintenance. As a standing committee of the Maintenance Executive Steering Committee, the mission of the Joint Group–Depot Maintenance is to promote and review depot maintenance functions at the enterprise level to achieve effective and affordable depot maintenance support for weapon systems and to execute responsibilities assigned in DOD maintenance of military materiel policy. Military service organizations. Each military service has its own logistics or materiel command component, which provides day-to-day management and oversight of the military services’ depots. The Chairman of the Joint Chiefs of Staff is responsible for formulating policies for gathering, developing, and disseminating joint lessons learned for the armed forces. Chairman of the Joint Chiefs of Staff (CJCS) Instruction 3150.25G, Joint Lessons Learned Program, defines: best practice as “a validated method or procedure which has consistently shown results superior to those achieved with other means, and appears to be worthy of replication,” and lesson learned as “a resolved issue or best practice that improves operations or activities and results in an internalized change to capability, process, or procedure.” The Joint Staff’s Joint Lessons Learned Program collects, validates, and disseminates lessons learned to support sustainment and improvement of joint force readiness and effectiveness via refinements in doctrine, organization, training, materiel, leadership and education, personnel, facilities, and policy. Specific military service guidance on their respective lessons learned programs share the same purpose. Best practices and lessons learned are captured in the Joint Lessons Learned Information System—DOD’s system of record for lessons learned—and are generally focused on sharing operational information from after-action reports and joint training exercises, rather than maintenance-related lessons learned. The DOD maintenance community, including the military service logistics or materiel command component and depots, do not typically coordinate with the military services’ lessons learned centers or enter lessons learned into the Joint Lessons Learned Information System. Our prior work has identified multiple challenges that can affect depot performance, including having the right facilities and having personnel with the right skills, among other challenges (See fig. 3.). Specifically, in April 2019 we reported on the condition of facilities at DOD depots, such as the condition of these depots are poor and the age of equipment is generally past its useful life, and the military services do not consistently track the effect that these conditions have on depot performance. To address these challenges, we recommended that DOD improve its data collection on the effect of facilities and equipment condition on depot performance, among other things. DOD concurred, and stated, in general, that the Service Chiefs for the Army, Navy, Air Force, and Marine Corps will ensure that their respective material commands take actions to implement the recommendations for their respective service. Also, in December 2018 we reported on depot workforce challenges, such as hiring personnel in a timely manner and providing inexperienced personnel with the training necessary to become proficient in skilled operations. According to DOD officials, these workforce challenges contributed to delays in the maintenance of some weapon systems. To address these workforce challenges, we recommended that the military services assess the effectiveness of the actions they have taken to maintain critical skills in the depot workforce. DOD concurred, and stated that each of the four services will take action to assess the effectiveness of the hiring, training, and retention programs at their respective depots, shipyards, fleet readiness centers, and air logistics complexes. The Related GAO Products page at the end of this report provides a list of our depot-related reports and testimonies. DOD shares best practices and lessons learned among the depots through a variety of venues, including networking, working groups, and benchmarking. Networking. DOD shares best practices and lessons learned through informal networking, such as personal contacts and conferences. All 17 depots reported engaging in networking to share best practices and lessons learned and coordinating with their materiel commands, program managers and/or program offices, and academia. The majority of the depots also coordinated with industry, other depots, and/or a point of contact or group within the Office of the Secretary of Defense (see table 1 below). All 17 depots reported that the DOD Maintenance Symposium (Symposium), an annual department-wide conference addressing the maintenance of weapon systems and equipment, is the most regularly attended and most beneficial venue for networking. All 17 depots reported attending the Symposium regularly or occasionally, with depot officials stating in the survey and interviews that the Symposium provides opportunities to build relationships and network with peers in DOD and external contacts in industry. Depots reported in our survey that the Symposium was valuable because it offered opportunities to make contacts with equipment vendors and other services, as well as break-out sessions and informal discussions to exchange ideas. During the Symposium, a number of maintenance awards, including the Robert T. Mason Award for Depot Maintenance Excellence, are awarded to recognize maintenance excellence (see sidebar). Three depots reported that the recognition of the award-winning depots gives other depots the opportunity to reach out to the award-winning depots for relevant information. This success has been shared with Fleet Readiness Centers East and Southeast, which are both implementing similar systems. Successfully training new artisans is particularly important for depot performance, as our prior work has shown that this workforce is aging and the Department of Defense faces challenges in hiring and retaining workers with key skills. Officials cited examples of maintenance taking months or years longer than expected, in part due to shortages in skilled personnel. Working Groups. DOD depots’ leadership and staff use working groups and communities of practice as venues for the DOD maintenance community to collaborate and to share expertise on specific topics. When surveyed, 13 of 17 depots reported they share best practices and lessons learned in working groups, and they identified more than 60 such working groups. Our analysis of survey responses shows that depots value working groups because they improve depot support to the warfighter by allowing the depot to evaluate best practices, review new technology, exchange data, initiate relationships, and gain stakeholder support. In our interviews, depot officials affirmed the value of working groups to promote collaboration and open discussions among peers focused on specific topics of common interest. We found that the working groups fall into three topic areas: new technologies, specific weapon systems, and depot management. For example: New technologies. The Joint Technology Exchange Group was chartered to improve coordination in the introduction of new or improved technology, new processes, or new equipment into DOD depot maintenance activities. To do this, the Joint Technology Exchange Group facilitates a number of forums and working groups centered on specific technologies, which allow representatives from the depots to learn from other services, academia, and industry (See fig. 4.). One example of this is cold spray, a new technology that sprays high velocity metal particles to repair worn surfaces and damaged parts that are unrepairable by traditional processes. Working groups facilitated by the Joint Technology Exchange Group have shared the usefulness of cold spray technology, and 12 depots from all service branches reported that they have begun adopting the technology. One depot estimates that its annual savings from using cold spray will be $202,000 annually, as well as additional time savings. Weapon systems. According to Navy officials, depot officials and maintainers for the CH-53E/MH-53E heavy lift helicopter participate in the H-53 Fleet Support Team working group. Fleet Readiness Center East reported that its production team was able to implement lessons learned from this group for repairing misalignment in a piece of the helicopter’s tail. As a result, the safety of the helicopter was increased. See figure 5 for details on this heavy lift helicopter. Depot management. Depot commanders participate in the Industrial Base Commanders’ monthly teleconference to share best practices and lessons learned related, in part, to management of depot operations. Twelve of the 17 depots indicated that the Industrial Base Commanders’ monthly teleconference is beneficial. The depots reported that the Industrial Base Commanders’ monthly teleconference allows base commanders time to share and to work on specific depot maintenance problems and is particularly productive in the areas of personnel and policy. Benchmarking. To benchmark, depot officials visit another depot to compare performance and find improvement ideas, particularly best practices and lessons learned related to weapon systems and depot management. Our analysis of site visit and survey data shows 10 of the 17 depots reported benchmarking trips. For example, in 2018 the Marine Corps Albany Production Plant sent a team of managers and technicians from their electronics and fabrications branches on a benchmarking trip to learn best practices from the team at Tobyhanna Army Depot. They visited six areas, where they observed processes and ideas that they could take back to their plant. In its trip report, the Marine Corps Albany Production Plant team highlighted a number of processes that increased efficiency in the electronics shop at Tobyhanna Army Depot, such as steps to eliminate unnecessary travel in sheet metal processes and updated electronics workstations. According to our prior work, benchmarking is useful for reducing internal resistance to change—a barrier to sharing best practices and lessons learned cited by the depots—because knowing what others actually are accomplishing changes perceptions of what can be done and what should be attempted. One depot told us that it intentionally brings maintainers and depot officials together on benchmarking trips so that the maintainers can benefit firsthand from seeing the best practices and lessons learned. DOD has communication challenges, such as the lack of awareness of venues, that may hinder the ability of the 17 depots to share best practices and lessons learned. While many sharing venues exist, such as working groups, the depots’ knowledge of them has gaps. According to our survey, 12 of the 17 depots reported being unaware of the existence of some venues where best practices and lessons learned can be shared. Additionally, 7 of the 17 depots reported not knowing who to contact to participate in some venues for sharing best practices and lessons learned. Moreover, in our interviews officials explained that staff turnover is also a challenge. Specifically, officials from one depot said that when the depot representative to a venue leaves, the institutional knowledge of the venue and its point of contact can be lost. They recounted having to resort to cold-calling other depots for information. Depots also reported that their staff did not attend best practices and lessons learned venues because they believed that those venues were for higher command levels. For example, one depot expressed confusion about the Industrial Base Commanders’ meeting and reported that while the depot officials were aware of the meeting, they believed that it was for officials at a higher level, such as their Materiel Command. Department of Defense Instruction 4151.18 states that DOD materiel maintenance programs should adopt business practices and quality management processes to continuously improve maintenance operations and maintenance production, achieve cost savings and avoidance, and realize process cycle time reduction. Further, GAO’s Standards for Internal Control in the Federal Government states that management should communicate quality information down and across reporting lines to enable personnel to perform key roles in achieving objectives. However, the Office of the Secretary of Defense has not created, shared, or maintained a comprehensive and updated list of all depot-specific DOD sharing venues (i.e., working groups) that includes points of contact. Officials from the Office of the Secretary of Defense stated that the Joint Technology Exchange Group maintains a list on its website. However, the list is incomplete, only containing three of the over 60 working groups we identified in our analysis of our interview and survey data. Moreover, we found that not all depot officials were aware of the Joint Technology Exchange Group and so would not be familiar with the Joint Technology Exchange Group’s website. Without a centralized list of venues and points of contact, it is unclear what groups exist and who to contact to participate, which may impede sharing of best practices and lessons learned. Each military service has initiatives or organizations to encourage the sharing of best practice and lessons learned; however, the Army has not maintained its lessons learned organizations. The depots from the Navy, Marine Corps, and Air Force reported, in our survey and interviews, that their military services have initiatives and organizations that encourage knowledge sharing regarding best practices and lessons learned among the depots. For example: Navy’s Fleet Readiness Center’s Naval Sustainment System. The Naval Sustainment System is an initiative to increase maintenance capacity and readiness among the Navy’s fleet readiness centers by process reviews and benchmarking. The depots reported in our survey that it improves production by encouraging them to identify constraints and to share lessons learned. The Naval Sustainment System is also in the process of being adopted by the shipyards. Navy’s “One Shipyard” Concept. The “One Shipyard” concept is a Navy workforce initiative in which maintainers are exchanged among the shipyards to ensure that the shipyards will have the required number of workers and skill sets to meet current and planned maintenance requirements. A Navy depot stated that as a result of the communication required by this concept, they are better able to share best practices. Marine Corps’ Marine Depot Maintenance Command. Based on responses to our survey, Marine Corps officials stated that the Marine Corps depots have a single command structure. With this structure, all process improvement meetings are held with both depots in attendance, resulting in the sharing of best practices and lessons learned between the two depots. Air Force’s Art of the Possible. The Air Force Sustainment Center created this management program to focus attention on restrictions in workflow in the depots. Depots report that it creates a culture of collaboration and sharing of best practices and lessons learned because it focuses on process improvement and creates a culture in which it is acceptable to discuss problems with other depots. Competition for Workload To determine which depot will receive new workload, the Department of Defense (DOD) Instruction 4151.24, Depot Source of Repair Determination Process (Oct.13, 2017) outlines a process under which workloads necessary to sustain core logistics capabilities are assigned to DOD depots that have the requisite competencies. Two Army depots reported that this process created competition for workload that hinders sharing for them. Depot officials stated that they fear that other depots will take workload from them if they share weapons system maintenance best practices. In one such instance, Marine Corps depot officials stated they visited an Army depot and observed a best practice for repairing 50-caliber machine gun receivers. However, when the Marine Corps depot reached out for technical details, the Army depot was not inclined to share, for a variety of reasons including competition for the same workload. Then, the Marine Corps depot asked Marine Corps Logistics Command to facilitate, and they resolved the issue by finding a Navy depot that had similar technology and was willing to share. In contrast, the Army does not have similar initiatives or organizations. Army regulations direct the establishment and maintenance of two organizations for sharing depot best practices and lessons learned. First, Army Regulation 750-1 directs the Army Materiel Command to establish and maintain the Army Materiel Lessons Learned Analysis Program to identify potential systemic materiel sustainment issues and examine root and contributing causes. Second, Army Regulation 11-33 directs Army Materiel Command to establish and maintain the Center for Army Acquisition and Materiel Lessons Learned to provide support in the collection, analysis, dissemination, and archiving capability of materiel lessons learned, with the objective of creating a knowledge sharing culture within the Army. Moreover, the Standards for Internal Control in the Federal Government states that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. Senior Army officials concurred that competition between depots for jobs can be a barrier for sharing, particularly when it involves the preservation of specific depot workloads. However, depots in other services did not report competition for workload to be a barrier to sharing. The Army stated it established these organizations for sharing materiel best practices and lessons learned; however, Army Headquarters, Army Materiel Command, and Army depot officials stated that they were not aware of analysis or knowledge sharing of depot best practices and lessons learned that were performed by these organizations. Further, the Army did not maintain these organizations for sharing materiel best practices and lessons learned. First, officials from Army Futures Command confirmed that the Army Materiel Lessons Learned Analysis Program was transferred from Army Materiel Command to Army Futures Command in July 2018 and no longer focuses specifically on materiel lessons learned. Second, the officials confirmed that the Army ceased to maintain the Center for Army Acquisition and Materiel Lessons Learned in early 2017 due to direct funding limitations. In addition, some Army depots reported being unable to identify peers in other depots to share with, and they reported that competition hinders sharing (see sidebar). Senior Army officials concurred that there are cultural challenges, which result in the depots being less open to sharing and implementing best practices and lessons learned. Establishing and maintaining effective organizations dedicated to sharing materiel best practices and lessons learned would encourage knowledge sharing among the Army depots. DOD is implementing some best practices and lessons learned among the 17 depots that have led to benefits, including cost and time savings. In response to our survey, 16 of the 17 depots reported benefits from successfully implementing best practices and lessons learned, such as sharing technology to reduce costs and improving maintenance processes to repair parts and systems. These implemented best practices and lessons learned can be defined as intra-service (within a military service), inter-service (between two or more military services), or DOD and external entities (between a military service and private industry). Intra-service collaboration. Depots within each military service are collaborating to implement best practices and lessons learned to improve depot management processes and repairs related to weapon systems. For example, Red River Army Depot implemented a best practice learned from Anniston Army Depot to improve its depot management process in meeting its production schedule. The production schedule is a plan that identifies, among other things, working hours for maintainers, available storage, and parts supply. To facilitate the implementation of this best practice, Army Tank-Automotive and Armaments Command, which oversees these two depots, hosted a joint event for the purpose of Anniston’s sharing how a small group of individuals at its depot is responsible for maintaining visibility of all end-item (i.e., components and parts ready for their intended use) production schedules. According to Army officials, Red River did not have an organization that performed a similar function, and during the joint event, depot officials from Red River saw this as a lesson learned that they could take back to their depot and implement. Additionally, Anniston shared how it conducts its risk assessments, or program reviews, and weekly execution meetings, among other processes, in meeting its production schedules. As a result, Army officials told us that Red River implemented the best practices they thought would be beneficial in helping them make progress in meeting their production schedules. In another example, two Air Force depots that maintain the Navy’s C-130 aircraft are working together to implement a best practice, which, according to program documentation, has led to cost and time savings (See fig. 6.). Specifically, the Navy’s C-130 aircraft, which, according to Ogden officials, is maintained at Ogden Air Logistics Complex and Warner Robins Air Logistics Complex, contains a shelf bracket, which holds the pieces of the aircraft together. The aircraft becomes structurally vulnerable and unfit for operations and training if the shelf bracket is removed. The process of blasting, inspecting, plating, and reinstalling the shelf bracket takes an average of 63 days. During this time, some maintenance activities cannot occur until the shelf bracket is reinstalled. To address this issue, engineers at Ogden told us they created a series of specially-sized pins to lock the Navy’s C-130 aircraft in place to help maintain the structural integrity of the airframe while other areas of the aircraft are being repaired. As a result of this best practice, maintainers have eliminated 16 days in the maintenance process for the C-130. Also, depot officials told us for a one-time cost of $13,000 for one set of specially-sized pins, eliminating 16 days in the maintenance process in turn generates a cost avoidance of $32,000 per day (the cost to dock the aircraft) or more than $500,000 per aircraft. In implementing this best practice, the total annual benefit to the C-130 fleet at Ogden amounts to 288 days of aircraft availability and about $9 million in cost avoidance. Officials at Ogden told us they have implemented this new process and are discussing this best practice with maintainers at Warner Robins for implementation at their depot as well. Further, Air Force depots are partnering to further implement another best practice, cold spray technology, which allows depots to repair damaged parts instead of replacing them. Replacing these damaged parts can be expensive or difficult if they are low in supply. Also, limited parts and long lead times can cause delays in the supply system, and existing repair processes have a long turnaround time. Cold spray technology has not been fully implemented; however, even with its limited implementation, cold spray technology has yielded cost and time benefits (See fig. 7.). According to Air Force officials, Ogden has been collaborating with the Oklahoma City Air Logistics Complex to cold spray its F-16 gearboxes until Ogden can obtain adequate workload to sustain the cold spray technology. According to Ogden officials and program documentation, cold spraying each gearbox costs about $1,300 whereas replacing each gearbox costs about $38,000; at 13 units per year, this amounts to almost $500,000 in annual cost avoidances. Additionally, it would take 95 weeks to build and receive a new gearbox unit; however, with the cold spray repair the unit is back in service in 4 weeks. Ogden officials are currently working to include cold spraying gearboxes for the F-15, C-5 and E-3 weapon systems to its workload. Inter-service collaboration. Depots from two or more military services are collaborating to implement best practices and lessons learned which has led to benefits. For example, the Navy’s Fleet Readiness Center Southwest implemented a best practice learned from Ogden Air Logistic Complex to improve testing of electrical circuits. Specifically, according to depot officials, a maintainer at Ogden created a method—Intermittent Fault Detection and Isolation System—which tests systems and software to detect, isolate, and repair intermittent problems due to open circuits, short circuits, and poor wiring by replicating the environment of the aircraft in flight (See fig. 8.). According to Ogden officials and program documentation, by implementing this best practice, they have recovered out-of-service assets and generated about $62 million in cost savings. For example, after testing its F-16 chassis, Ogden officials recovered 138 out- of-service assets—amounting to $42 million of flight hardware returning to service. Moreover, officials at Fleet Readiness Center Southwest visited Ogden during a benchmarking trip to discuss the process of implementing the Intermittent Fault Detection and Isolation System to test their systems. According to officials from the Office of the Secretary of Defense, the intermittent faults due to aircraft electrical systems amounted to more than $300 million in operating and support costs in fiscal year 2014. The Fleet Readiness Center Southwest used the Intermittent Fault Detection and Isolation System to test its F/A-18 aircraft generators, which provide electrical power to the aircraft. As a result of testing these generators using the Intermittent Fault Detection and Isolation System, the mean time between failures for the generators has increased, according to officials, from 104 flight hours to over 400 flight hours, and the Navy anticipates a reduction of about 30 to 90 days of repair time. DOD and external entities. Depots are also partnering with private industry to implement best practices and lessons learned, which has led to time-savings benefits (See fig. 9.). For example, according to program officials, the Air Force, Navy, original equipment manufacturer, and contractor collaborated to implement a best practice for the U-2 aircraft. Specifically, in 2018, generators for the Air Force’s U-2 aircraft had decreased their mean time between failures from 1,000 hours to 400 hours. To sustain the fleet, the Air Force was cannibalizing—removing parts from one aircraft to another—generators from aircraft in depot maintenance to those preparing for deployment. The U-2 program office identified the Navy’s F/A-18 A/B generator as similar to the U-2 generator and learned valuable information on the repair and overhaul process, root cause analysis of failure of critical parts, and the Navy’s recommendation for procuring and building overhaul generator kits. In order to implement the Navy’s processes, the Air Force program office, working with the original equipment manufacturer and contactor, incorporated the Navy’s best practices in overhauling its generator kit concept. As a result, the Air Force is no longer cannibalizing these generators and the mean time between failures has returned to about 1,000 hours of flight time. DOD has not been able to implement some best practices and lessons learned among the 17 depots, but DOD is taking steps to mitigate challenges to implementation. In its March 2018 Report to Congress on Sharing of Best Practices for Depot-Level Maintenance Among the Military Services, DOD noted some of the challenges in implementing best practices such as differing military service priorities, strategies, and resourcing of technologies and infrastructure. In responding to our survey, 15 of the 17 depots reported challenges in implementing best practices and lessons learned, including insufficient resources, restrictions related to information technology, approval process, and acquisition and contracting policies, among others (See table 2.). Insufficient resources. Ten of the 17 depots reported insufficient resources as a challenge to implementation for various reasons. First, depots reported not having adequate time, staff, or funding to attend knowledge sharing activities or to analyze data from best practices and lessons learned. According to depot officials, not being able to attend knowledge sharing activities has made networking more difficult because these activities allowed them to discuss best practices and lessons learned with colleagues from other depots and industry. Second, in addition to not having adequate funding, depots also reported identifying sources of funding as a challenge to implementing best practices and lessons learned for specific weapon systems. For example, according to officials from one depot, they have been unable to identify a funding source to implement the laser de-painting system for the F-16, which would allow the aircraft to stay in service longer and would produce less hazardous materials than the current blasting process to remove paint from the aircraft. Third, depots reported insufficient equipment to implement a best practice. For example, one depot reported not having enough hand-held tablets, which contain electronic technical data and best practices from private industry to assist maintainers working on a weapon system. Another depot reported that it has not implemented the tablets and are relying on paper documentation to maintain its weapon systems. According to depot officials, the lack of tablets has had direct effects at the depot, such as delays in standing-up new capability and maintainers waiting on available tablets to perform their work. To mitigate challenges with insufficient resources, DOD, military service, and depot officials have taken a variety of steps. For example, officials from the Office of the Secretary of Defense held an event through the Joint Technology Exchange Group to discuss available funding sources for new and emerging technologies, such as the funding sources for the cold spray technology. According to officials at a Navy depot, depots can petition the Office of Naval Research for federal laboratory designation. With this designation, depots can partner with private industry to evaluate technology in any area that is consistent with the federal laboratory’s mission and may receive funds from private industry for technology research and development. Specific to the tablets, depot officials told us that the materiel command has taken responsibility for managing the funding of these assets and the depots will receive a technical upgrade every 4 years. Moreover, in February 2019 the Office of the Secretary of Defense launched the Enterprise Sustainment Dashboard (Dashboard), a web-based tool that will provide access to an online central repository of sustainment data for the military services and will allow senior leaders to steer resources to needed programs. The Dashboard will allow users to analyze metrics such as materiel availability (condition of a weapon system to perform an assigned mission), operational availability (availability of active inventory to conduct military service operations), and cost per day availability (maintenance cost per day for a population of weapon systems by type, model, and series). The Dashboard will also consolidate inventory, availability, and cost data systems from each of the military services. This Dashboard is in its early phase and the implementation plan includes milestones extending into fiscal year 2020. Restrictions related to information technology. Ten of the 17 depots reported restrictions related to information technology as a challenge to implementation of best practices. Specifically, depots reported having outdated and incompatible software systems and a lack of a consolidated database for departments and product lines, which may hinder their ability to connect computer systems to automate a repair process. Additionally, depots stated that it may take years to obtain authority and approval to operate information technology systems, making data collection, sharing, and implementation of best practices difficult. For example, one depot reported a technology tool was not user friendly and had a rigid infrastructure, making it difficult for maintainers to use to analyze metrics to improve depot maintenance. Specifically, depot officials told us that this technology tool performs its functions as designed but is limited in its scope of meeting depot requirements, such as identifying bottlenecks in the maintenance process. In another example, one depot reported cybersecurity concerns with commercial off-the-shelf products, which may not be compatible with the depot’s information technology system. To mitigate challenges related to information technology, depots reported using information systems, such as SharePoint, as a primary source for collecting, storing, organizing, sharing, and accessing information via a web browser. For example, Navy officials told us that there are SharePoint sites for different departments within their organization, including portals dedicated to training, aircraft, and business processes and procedures, which capture best practices and lessons learned from subject matter experts. In another example, an Air Force depot reported that its SharePoint portal includes a section focused on practical problem solving methods for some of its continuous process improvement projects, such as balancing weight on an aircraft and issues related to the wings of the C-130T. Further, depot officials told us they conducted an analysis to mitigate concerns about a technology tool, mentioned above, that was not user friendly and had a rigid infrastructure. Based on this analysis, depot officials found a modeling and simulation tool that would help resolve challenges in several key areas, including projecting workload and personnel required to perform depot maintenance and determining the depot’s capability for the volume of work that can be inducted into the depot, among other areas. The modeling and simulation tool has not been implemented yet because it was recently funded in September 2019. Moreover, in 2018, we reported on steps that DOD is taking to improve its information technology systems. Specifically, the Secretary of Defense asked the Defense Business Board to provide actionable recommendations that DOD could adopt to transform its six core business processes, including acquisition and procurement, logistics and supply, and real property management, and their supporting information technology systems. We recommended, in part, that DOD identify timeframes and deliverables for identifying and adopting optimal information technology solutions. DOD concurred with this recommendation and is taking steps to improve its information technology systems, such as issuing its initial plan for business operations reform in April 2019, collecting federal and private industry benchmarks, and reviewing information technology costs. Approval process. Eight of the 17 depots reported that the approval process and guidance for implementing best practices is challenging. Specifically, depots reported that the layers of leadership approval prevent timely implementation of best practices and, at times, can cause enthusiasm for a project’s implementation to wane. Depot officials also told us that implementing new ideas for maintaining or repairing weapon systems is challenging because they have to get multiple approvals from their chain of command as well as the program manager for a specific weapon system, thus making implementation more difficult and less timely. For example, depot officials told us that implementing best practices at the depot from one weapon system to another requires retesting of the practice and approval from each program manager. Additionally, in response to the survey, a depot reported that many of the essential, time-sensitive engineering decisions for one of its new weapon system reside at another location, which has caused delays in making timely decisions. In another example, depot officials told us that they had to get approval from individual program managers to implement the cold spray technology and the Intermittent Fault Detection Isolation System. To mitigate challenges in the approval process, such as these, depot officials told us it is beneficial when technological development that affect the DOD-wide logistics enterprise or an entire military service occurred at a higher organizational level, making it easier for new ideas to be implemented at the lower levels. For example, one depot reported on the Navy’s approach of implementing a best practice across its platforms to eliminate corrosive plating on its weapon systems. Navy officials told us that these decisions are made at the headquarters level and implemented across the depots. Moreover, one depot reported allowing decision authority for specific weapon systems to reside within the depot, rather than at another location, to help the depot make timely decisions on implementing new ideas. Finally, the Office of the Assistant Secretary of Defense is providing specific guidance in implementing best practices and lessons learned, such as the memorandum issued in April 2019 on the Intermittent Fault Detection and Isolation System directing the military services to adopt this best practice. Acquisition and contracting policies. Five of the 17 depots reported acquisition and contracting policies as a challenge to implementation. Specifically, depots reported that current acquisition and contracting policies are complex and time consuming, which causes government to lag behind industry in implementing best practices. For example, officials from one depot told us that even when two depots need the same item to repair a weapon system, each depot was encouraged to pursue a separate contract. Depot officials described this as an inefficient and burdensome process, which sometimes resulted in an inferior item. Similarly, officials from another depot told us that they started an initiative to make equipment and software more similar across their service’s depots; however, they were unable to implement this initiative for similar reasons. Further, officials from one depot told us that the procurement of a weapon system does not always include access to all data necessary to maintain the system. According to depot officials, this limits their ability to implement a best practice or lesson learned from a similar weapon system because the contractor retains ownership of the intellectual property needed to repair or optimize the system. To mitigate challenges related to acquisition and contracting policies, depot officials told us that military services are purchasing enough new technology for all their depots rather than have each depot purchase technology individually. For example, according to Navy officials, they purchased the equipment to implement cold spray technology across all four shipyards, which makes implementing the best practice or lesson learned more timely. Additionally, officials from one depot told us that they use public-private partnerships to bridge gaps for systems that lack access to the necessary data rights to conduct maintenance on the systems. Our February 2019 report identified additional steps DOD is taking to mitigate challenges related to intellectual property, especially software sustainment. First, our prior work found that DOD is in the early stages of addressing a statutory provision for DOD to (1) develop policy on the acquisition or licensing of intellectual property; and (2) establish a cadre of intellectual property experts to help support the acquisition workforce on intellectual property matters. Second, in our prior work, we reported that DOD officials we spoke with emphasized that there are situations in which the data rights needed may not be known until years into sustainment and that it would be useful if data rights could have a pre-negotiated price and be an option as part of the initial contract. Such an option would give the government the right, but not the obligation, to purchase the data rights at the pre-negotiated price if needed in the future. The sharing and implementation of best practices and lessons among the 17 depots is crucial to sustaining military readiness by ensuring that the military services can regularly maintain critical weapon systems and return them to the warfighter for use in training and operations. Successful collaboration of maintenance best practices and lessons learned across military services, private industry, and academia is increasingly essential as DOD operates, and thus needs to maintain, weapon systems. DOD shares best practices and lessons learned among the depots through a variety of venues, including networking, working groups, and benchmarking. However, DOD has communication challenges, including a lack of awareness of many sharing venues, which may hinder the ability of the depots to share best practices and lessons learned. The Office of the Secretary of Defense has not created, shared, or maintained a comprehensive and updated list of all depot-specific DOD sharing venues (i.e., working groups) that includes points of contact. Without a centralized list and points of contact, it is unclear what groups exist and who to contact to participate, which may impede sharing of best practices and lessons learned. Further, while the Army stated it established lessons learned organizations for sharing materiel best practices and lessons learned, it did not maintain them due to organizational restructuring and resource constraints. Establishing and maintaining effective organizations dedicated to sharing materiel best practices and lessons learned would encourage knowledge sharing among the Army depots. We are making two recommendations, including one to the Under Secretary of Defense for Acquisition and Sustainment and one to the Secretary of the Army. Specifically, the Secretary of Defense should direct that: The Under Secretary of Defense for Acquisition and Sustainment should ensure that the Deputy Assistant Secretary of Defense for Materiel Readiness create, share, and maintain a comprehensive and up-to-date list of all DOD sharing venues (i.e., working groups), including points of contact, related to depot maintenance. (Recommendation 1) The Secretary of the Army should ensure that Army Materiel Command reestablish and maintain organizations dedicated to sharing materiel best practices and lessons learned, as required by Army regulations. (Recommendation 2) We provided a draft of this report to DOD for review and comment. In written comments on a draft of this report, DOD concurred with the recommendations. DOD’s comments are reprinted in their entirety in appendix III. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretaries of the Army, Navy, and Air Force, and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report, please contact Diana Maurer at (202) 512-9627 or maurerd@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report are listed in appendix IV. To conduct the work for our reporting objectives, we reviewed relevant laws and the Department of Defense (DOD) and military service guidance that govern depot maintenance and the sharing of best practices and lessons learned. We included in our scope DOD depots performing major depot-level maintenance. We conducted a survey of DOD’s 17 depots performing depot-level maintenance to gain an understanding of how each depot shares with each other and implements best practices and lessons learned. The response rate for the survey was 100 percent. These depots included: Anniston Army Depot, Anniston, Alabama Corpus Christi Army Depot, Corpus Christi, Texas Letterkenny Army Depot, Letterkenny, Pennsylvania Red River Army Depot, Texarkana, Texas Tobyhanna Army Depot, Tobyhanna, Pennsylvania Norfolk Naval Shipyard, Portsmouth, Virginia Pearl Harbor Naval Shipyard, Honolulu, Hawaii Portsmouth Naval Shipyard, Kittery, Maine Puget Sound Naval Shipyard, Bremerton, Washington Fleet Readiness Center East, Cherry Point, North Carolina Fleet Readiness Center Southeast, Jacksonville, Florida Fleet Readiness Center Southwest, San Diego, California Albany Production Plant, Albany, Georgia Barstow Production Plant, Barstow, California Ogden Air Logistics Complex, Ogden, Utah Oklahoma City Air Logistics Complex, Oklahoma City, Oklahoma Warner Robins Air Logistics Complex, Warner Robins, Georgia We analyzed survey responses to gain an understanding, for example, of which depot officials are coordinating with others to share best practices and lessons learned, which sharing venues are attended, and the extent to which this information sharing is beneficial. To ensure that the survey questions were clear, comprehensible, and technically correct, we conducted expert reviews of our draft survey with four subject matter experts with knowledge and experience in auditing DOD depots. We also conducted two pre-tests of our draft survey with the depot commanders of Anniston Army Depot and Warner Robins Air Logistics Complex, respectively.During each pre-test, conducted by teleconference, we read the instructions and each survey question aloud and asked the depot commanders to tell us how they interpreted the question. We then discussed the instructions and questions with each depot commander to identify any problems and potential solutions by determining whether (1) the instructions and questions were clear and unambiguous, (2) the terms we used were accurate, (3) the survey was unbiased, and (4) the survey did not place an undue burden on the depot officials completing it. We noted any potential problems and modified the survey based on feedback from the subject matter experts and depot commanders, as appropriate. We sent a fillable survey and a cover email to 17 depots on May 29, 2019, and asked them to complete the survey and email it back to us by June 14, 2019. We closed the survey on July 3, 2019. Data were auto- extracted from the Adobe PDF form into an Excel spreadsheet. Our examination of the survey results included both a quantitative data analyses on closed-ended questions and a review of open-ended responses to identify common themes. Additionally, to gather detailed examples of DOD’s efforts to share best practices and lessons learned, we visited a non-generalizable sample of 5 depots (Anniston Army Depot, Anniston, Alabama; Norfolk Naval Shipyard, Portsmouth, Virginia; Fleet Readiness Center Southwest, San Diego, California; Marine Corps Albany Production Plant, Albany, Georgia; and Ogden Air Logistics Complex, Ogden, Utah). To select our sample, we considered variation in geographic location, military service representation, and types of weapon systems maintained. At these sites, we conducted group discussions with individuals across the depot to gain insight into their roles in sharing best practices and lessons learned. Qualitative data analyses were conducted by our staff who have subject matter expertise to identify themes and select examples of best practices or lessons learned shared through collaboration with another depot. We then obtained and analyzed documentation of sharing, such as working group charters and trip reports documenting results from visiting another depot; as well as benefits experienced from implementing a best practice or lessons learned, including time and cost savings. We interviewed officials from the Office of the Under Secretary of Defense (Acquisition and Sustainment) (Deputy Assistant Secretary of Defense for Materiel Readiness), Joint Chiefs of Staff (Joint Lessons Learned Division), and the military service headquarters (Headquarters, Department of Army G4; Deputy Assistant Secretary of the Navy for Expeditionary Programs and Logistics Management; Headquarters Marine Corps, Installations & Logistics; and Air Force Acquisition, Logistics & Product Support. We also interviewed officials from the military service logistics or materiel components (Army Materiel Command; Naval Sea Systems Command; Naval Air Systems Command (Commander, Fleet Readiness Center); Marine Corps Logistics Command; and the Air Force Materiel Command) as well as the military lessons learned centers (Center for Army Lessons Learned, Naval Warfare Development Command, Marine Corps Center for Lessons Learned, and the Air Force LeMay Center for Lessons Learned). Finally, we reviewed our prior reports related to challenges experienced at DOD depots and DOD’s report to Congress on the sharing of best practices for depot-level maintenance among the military services. We assessed the documentary and testimonial evidence we collected against DOD and military service guidance on lessons learned and materiel maintenance and GAO’s Standards for Internal Control in the Federal Government. Specifically, the information and communication component of internal control—the actions management uses to internally communicate the necessary quality information to achieve the entity’s objectives—was significant to this audit. We conducted this performance audit from January 2019 through January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. During the course of our work examining the extent to which the Department of Defense (DOD) experiences benefits and has challenges with (1) sharing and (2) implementing best practices and lessons learned among the depots, we collected information from the depots on the working groups and communities of practice in which they participate. The list below is compiled from analysis of our survey data, in which we surveyed all 17 of DOD’s depots, as well as the interviews we conducted during our site visits to a non-generalizable sample of five depots. Note that this is not a list of all the possible working groups and communities of practice which exist among the depots, simply those which the depots shared with us. 1. 448th Supply Chain Management Wing 2. Air Force Metrology and Calibration Working Group 3. Air Force Sustainment Center Logistics Directorate’s Strategic 4. Aircraft Cyber Threat Working Group 5. Aircraft Maintenance Group Summit 6. Aircraft Storage Strikeboard 8. Army Safety and Occupational Health Information Management 9. Army Safety and Occupational Health Management System Working 10. Carrier Team One 11. Cold Spray Action Team 12. Commander, Fleet Readiness Centers Advanced Technology & 13. Commercial Technologies for Maintenance Activities Working Group – 14. Commodities, Electronics, Missiles, & Propulsion Maintenance 15. Coordinate Measuring Machine Community of Practice 16. Corporate Electrical Community of Practice 17. Corrosion Control Working Groups 18. Cyber Resiliency Office for Weapon Systems Working Groups 19. Depot Maintenance Activation Working Group 20. Depot Maintenance Enterprise Action Group 21. Diminishing Manufacturing Sources and Material Shortages 22. DOD Digital Manufacturing Users Group 23. DOD Unmanned Systems & Robotics Summit 24. DOD Voluntary Protection Programs 26. Enterprise IT Systems Strikeboard 27. F-35 Joint Risk Working Group 28. H-53 Fleet Support Team 29. Heavy Metal Working Group 30. Industrial Base Commander’s Meetings 31. Integrated Quality Teams 32. Investment Working Group 33. Joint Additive Manufacturing Steering Group 34. Joint Additive Manufacturing Working Group and Community of 35. Joint Intermittence Team 36. Joint Requirements Working Group 37. Joint Robotics Working Group 38. Joint Technology Exchange Group 39. Metrics Community of Practice 40. Modernization Working Group 41. National Center for Defense Manufacturing and Machining 42. Naval Surface Warfare Center, Carderock Division Human 43. Naval Undersea Warfare Center Division, Keyport Human 44. Navy Forum for Small Business Innovation Research/Small Business Technology Transfer Transition 45. Non-Destructive Inspection Forum 46. Non-Destructive Testing Working Group 47. Norfolk Naval Shipyard Technology and Innovation Community of 48. Organic Industrial Base Commander’s Summit 49. Project Management Executive Steering Committee 50. Public-Private Partnership Community of Practice 51. Quality Performance System Community of Practice 52. Quality Work Environment Working Group 53. Residential Economic Development Inc. 54. RepTech Working Group 55. Shipyard departmental level Communities of Practice: C200, C1200, C1200N, C600, C400, etc. 56. Shipyard-only Community of Practice 57. Software Engineering Institute Agile Collaboration Group 58. Software Maintenance Group Summit 59. Sub Team One 60. Tri-Air Logistics Complex Summits 61. Weapon-system Specific Enterprise Cross-talks: C-130 Enterprise Crosstalk, A-10 Enterprise Crosstalk, etc. In addition to the contact listed above, Jodie Sandel (Assistant Director), Laura Czohara (Analyst-in-Charge), Clarine Allen, Felicia Lopez, Amie Lesser, Christina Murphy, Clarice Ransom, Andrew Stavisky, and Courtney Tepera made key contributions to this report. Navy Maintenance: Persistent and Substantial Ship and Submarine Maintenance Delays Hinder Efforts to Rebuild Readiness. GAO-20-257T. Washington, D.C.: December 4, 2019. Naval Shipyards: Key Actions Remain to Improve Infrastructure to Better Support Navy Operations. GAO-20-64. Washington, D.C.: November 25, 2019. F-35 Aircraft Sustainment: DOD Faces Challenges in Sustaining a Growing Fleet. GAO-20-234T. Washington, D.C.: November 13, 2019. Depot Maintenance: DOD Should Adopt a Metric That Provides Quality Information on Funded Unfinished Work. GAO-19-452. Washington, D.C.: July 26, 2019. Military Depots: Actions Needed to Improve Poor Conditions of Facilities and Equipment That Affect Maintenance Timeliness and Efficiency. GAO-19-242. Washington, D.C.: April 29, 2019. Weapon System Sustainment: DOD Needs to Better Capture and Report Software Sustainment Costs. GAO-19-173. Washington, D.C.: February 25, 2019. Army Modernization: Steps Needed to Ensure Army Futures Command Fully Applies Leading Practices. GAO-19-132. Washington, D.C.: January 23, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Depot Maintenance: DOD Has Improved the Completeness of Its Biennial Core Report. GAO-19-89. Washington, D.C.: November 14, 2018. Air Force Readiness: Actions Needed to Rebuild Readiness and Prepare for the Future. GAO-19-120T. Washington, D.C.: October 10, 2018. Weapon System Sustainment: Selected Air Force and Navy Aircraft Generally Have Not Met Availability Goals, and DOD and Navy Guidance Need to Be Clarified. GAO-18-678. Washington, D.C.: September 10, 2018. Military Readiness: Analysis of Maintenance Delays Needed to Improve Availability of Patriot Equipment for Training. GAO-18-447. Washington, D.C.: June 20, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. Depot Maintenance: Executed Workload and Maintenance Operations at DOD Depots. GAO-17-82R. Washington, D.C.: February 3, 2017. Depot Maintenance: Improvements to DOD’s Biennial Core Report Could Better Inform Oversight and Funding Decisions. GAO-17-81. Washington, D.C.: November 28, 2016. Naval Shipyards: Actions Needed to Improve Poor Conditions that Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Army Working Capital Fund: Army Industrial Operations Could Improve Budgeting and Management of Carryover. GAO-16-543. Washington, D.C.: June 23, 2016. Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Defense Inventory, Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations. GAO-16-450. Washington, D.C.: June 9, 2016. Navy Working Capital Fund: Budgeting for Carryover at Fleet Readiness Centers Could Be Improved. GAO-15-462. Washington, D.C.: June 30, 2015. Sequestration: Documenting and Assessing Lessons Learned Would Assist DOD in Planning for Future Budget Uncertainty. GAO-15-470. Washington, D.C.: May 27, 2015. Operational Contract Support: Actions Needed to Enhance the Collection, Integration, and Sharing of Lessons Learned. GAO-15-243. Washington, D.C.: March 16, 2015.", "summary": "DOD operates depots nationwide to maintain complex weapon systems and equipment through overhauls, upgrades, and rebuilding. These depots are crucial to sustaining military readiness by ensuring that the military services can regularly maintain critical weapon systems and return them to the warfighter for use in training and operations. For fiscal year 2018, DOD reported $19 billion in total maintenance expenditures and about 84,000 personnel performing depot-level maintenance. In June 2018, the Senate Armed Services Committee, in a report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019, included a provision for GAO to review DOD's sharing and implementation of best practices and lessons learned among the depots. GAO evaluated the extent to which DOD experiences benefits and has challenges with (1) sharing and (2) implementing best practices and lessons learned among the depots. GAO reviewed agency guidance; surveyed 17 depots; conducted site visits at five depots; and interviewed DOD, military service, and depot officials. The Department of Defense (DOD) experiences benefits from sharing best practices and lessons learned among its depots, but communication and organization challenges exist. Best practices and lessons learned are shared among the depots through a variety of venues, including networking, working groups, and benchmarking trips to other depots. However, DOD has communication challenges, such as the lack of awareness of venues for sharing information. While Office of the Secretary of Defense officials reported posting a list of working groups, the list only contains three of the more than 60 working groups GAO identified. Without a centralized list of sharing venues and points of contact, it is unclear what groups exist and who to contact to participate, which may impede sharing of best practices and lessons learned. Further, while the Army stated it established lessons learned organizations for sharing maintenance best practices and lessons learned, it did not maintain them due to organizational restructuring and resource constraints. Establishing and maintaining effective organizations dedicated to sharing materiel best practices and lessons learned would encourage knowledge sharing among the Army depots. DOD is experiencing benefits and taking steps to mitigate challenges with implementing best practices and lessons learned among the depots. Depots reported that implementing some best practices and lessons learned has led to benefits, including time and cost savings. For example, Navy Fleet Readiness Center Southwest, California, implemented an intermittent fault detection system from Ogden Air Logistics Complex, Utah, on its F/A-18 aircraft generators. According to officials, the depot reduced repair time from 90 days to 30 days and quadrupled the generators' time between failures. Depots reported a variety of challenges to implementing lessons learned and best practices, including a lack of resources, lengthy approval processes, and acquisition and technology restrictions. DOD is taking steps to mitigate challenges to implementation, such as creating a new technology tool for viewing metrics on weapon systems' cost and availability which will allow senior leaders to steer resources to needed programs. GAO is making two recommendations to improve the depots' ability to share best practices and lessons learned by creating a comprehensive list of sharing venues, including points of contact, and re-establishing and maintaining materiel lessons learned organizations. DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "Wireless broadband connects users to the Internet using spectrum to transmit data between the customer’s location and the service provider’s facility, and can be transmitted using fixed wireless and mobile technologies, as shown in figure 1. Fixed wireless broadband technologies establish an Internet connection between fixed points—such as from a radio or antenna that may be mounted on a tower, to a stationary wireless device located at a home— and generally requires a direct line of sight. Mobile wireless broadband technologies also establish an Internet connection that requires the installation of antennas, but this technology provides connectivity to customers wherever they are covered by service, including while on the move, such as with a cell phone. Spectrum is the resource that makes wireless broadband connections possible. Spectrum frequency bands each have different characteristics that result in different levels of ability to cover distances, penetrate physical objects, and carry large amounts of information. Examples of some of the frequency bands that can be used by commercial and nonfederal entities for broadband services are shown in figure 2. The frequency bands that can be used for broadband services are either licensed or unlicensed. For licensed spectrum, FCC can assign licenses through auctions, in which prospective users bid for the exclusive rights to transmit on a specific frequency band within geographic areas. Having exclusive rights ensures there will be no interference from other spectrum users in that band. License holders may sell or lease their license, in whole or in part, to another provider, a process that is known as a secondary market transaction, with FCC’s approval. FCC has assigned licenses administratively in two frequency bands that can be used for broadband services. FCC also authorizes the use of unlicensed spectrum, where an unlimited number of users can share frequencies without a license, such as wireless microphones, baby monitors, and garage door openers. In contrast to users of licensed spectrum, unlicensed users have no regulatory protection from interference by other licensed or unlicensed users in the bands. In March 2010, FCC issued the National Broadband Plan that included a centralized vision for achieving affordability and maximizing use of high- speed Internet. The plan made recommendations to FCC, including that FCC should take into account the unique spectrum needs of tribal communities when implementing spectrum policies and evaluate its policies and rules to address obstacles to spectrum access by tribal communities. With regard to tribal lands, the plan recommended that FCC increase its commitment to government-to-government consultation with tribal leaders and consider increasing tribal representation in telecommunications planning. FCC established the Office of Native Affairs and Policy in July 2010 to promote the deployment and adoption of communication services and technologies to all native communities, by, among other things, ensuring consultation with tribal governments pursuant to FCC policy. For our November 2018 report, we identified 18 tribal entities from FCC’s license data that held active spectrum licenses in bands that can be used to provide broadband services as of September 2018. Of those 18, 4 obtained the spectrum through a secondary market transaction and 2 from an FCC spectrum auction. We interviewed 16 tribal entities that were using wireless technologies at the time to provide service, and 14 told us that they were accessing unlicensed spectrum to do so. While representatives from most of the 16 tribal entities reported some advantages of unlicensed spectrum, such as the spectrum is available at no cost, they also discussed their experiences with the limitations of unlicensed spectrum, including issues with interference and speed or capacity. Some of the stakeholders we contacted and FCC have highlighted the importance of exclusive-use licensed spectrum for tribal entities. For example, FCC’s Office of Native Affairs and Policy reported in 2012 that unlicensed spectrum is not an option across all tribal lands and that tribal access to robust licensed spectrum is a critical need. In addition, representatives from the stakeholders we interviewed told us that there are non-technological benefits for tribal entities to obtain greater access to licensed spectrum, including: enhanced ability to deliver additional Internet services, enhanced ability to sell or lease spectrum for profit, and additional opportunities to obtain federal funding that requires entities to hold or have access to licensed spectrum. Furthermore, two tribal stakeholders and representatives from several tribal entities told us that having access to licensed spectrum would enable tribes to exercise their rights to sovereignty and self- determination. For example, representatives from four of the tribal entities told us that having access to licensed spectrum would ensure that spectrum is being used in a way that aligns with tribal goals and community needs, further supporting their rights to self-determination. In our November 2018 report, we described barriers tribal entities reported facing in accessing licensed spectrum. First, representatives from tribal entities we contacted said that obtaining a spectrum license through an auction was too expensive for many tribal entities. Indeed, over 60 percent (983 of 1,611) of the winning bids from a 2015 spectrum auction were more than $1 million. Representatives from some tribal entities told us they were unable to obtain financing to participate in auctions because tribal governments cannot use tribal lands as collateral to obtain loans and that participating in spectrum auctions requires auction-specific expertise that tribal entities may not have. Second, tribal entities reported facing barriers obtaining spectrum through secondary market transactions. Most of the spectrum allocated for commercial use has already been assigned through spectrum auctions and other mechanisms to private providers that may not be providing service on tribal lands. As such, there may be tribal areas where providers hold licenses for bands but are not using the spectrum to provide Internet service. All three of the tribal associations we contacted confirmed that there were unused spectrum licenses over tribal lands, and representatives from a nationwide provider indicated that they only deploy services if there is a business case to support doing so. Accordingly, the secondary market is one of few avenues available to tribal entities that would like to access licensed spectrum. However, representatives from tribal entities we contacted told us it could be challenging to participate in the secondary market because there is a lack of willing sellers, license holders are not easily identified, and tribal entities may not be aware of how to pursue secondary market transactions. For example, representatives from a tribal entity that had been successful in obtaining a license through the secondary market told us that an Indian-owned telecommunications consulting company was pivotal in identifying the license holder and facilitating the transaction, and without such assistance, the transaction would not have occurred. At the time of our November 2018 report, we found that FCC had taken some actions to increase tribal access to spectrum. In particular: FCC issued a proposed rulemaking in March 2011 that sought comments on three proposals to create new spectrum access opportunities for tribal entities (see fig. 3). As of July 12, 2019, FCC had not adopted new rules or taken further action on the 2011 rulemaking. FCC issued a proposed rulemaking in May 2018 that sought comment on establishing a priority window for tribal nations located in rural areas to obtain a license in the Educational Broadband Service spectrum band (also known as the 2.5 GHz band). In the proposed rulemaking, FCC had found that significant portions of this band were not being used, primarily in rural areas. FCC had not finalized this rule at the time of our November 2018 report, but published a draft order in June 2019 that would establish a priority filing window so that tribal entities could get access to unassigned spectrum in the 2.5 GHz band on rural tribal lands prior to an FCC auction. FCC adopted this order on July 10, 2019. FCC’s Office of Native Affairs and Policy conducts training, consultation, and outreach to tribal entities on spectrum-related issues, such as communicating with tribal entities prior to FCC auctions or when FCC regulatory actions or policies would affect tribal governments and spectrum over their lands. FCC’s 2010 National Broadband Plan stated that ongoing measurement of spectrum utilization should be developed to better understand how spectrum resources are being used because some studies indicated that spectrum goes unused in many places much of the time. The plan stated that any spectrum utilization studies that FCC conducts should identify tribal lands as distinct entities. The plan also stated that FCC should make data available that would promote a robust secondary market for spectrum licenses, such as information on how and to whom spectrum is allocated on tribal lands. In FCC’s 2018 strategic plan, FCC stated that it will implement ongoing initiatives that will assist in spectrum policy planning and decision making, promote a robust secondary market in spectrum, and improve communications services in all areas of the United States, including tribal areas. Additionally, federal internal control standards state that agencies should use quality information, including information that is complete, to inform the decision-making processes and communicate with external entities. Tribal governments are an example of such external entities. However, in our 2018 report, we found that FCC had not consistently collected data related to tribal access to spectrum or communicated important information to tribes. In particular: FCC did not collect data on whether spectrum license-holders or auction applicants are tribal entities. Without this information, FCC did not have a comprehensive understanding of the extent that tribal entities are attempting to obtain or access licensed spectrum or have been successful at obtaining and accessing it. FCC did not analyze the extent that unused licensed spectrum exists over tribal lands, even though FCC had the information—broadband availability data from providers and information on geographic areas covered by spectrum licenses—needed for such an analysis. Although FCC officials told us evaluating the effectiveness of FCC’s secondary market policies is a way to increase the use of unused spectrum, FCC’s approach did not include an analysis of unused spectrum licenses on tribal lands. As a result, FCC’s evaluations of the secondary market may not have accurately reflected how its policies affect tribal entities. Because the secondary market is one of few ways for tribal entities to access licensed spectrum, such an assessment would enable FCC to better promote a robust secondary market that provides opportunities for tribes to access spectrum. FCC did not communicate information to tribes that could benefit them in their efforts to obtain spectrum in the secondary market. As described earlier, the secondary market is a significant mechanism for tribal entities to obtain spectrum licenses, but representatives from the tribal entities we interviewed reported challenges related to participating in the secondary market, such as not knowing whom to contact should they wish to engage in a secondary market transaction to obtain a spectrum license. We concluded that FCC’s efforts to promote and support tribal entities’ access to spectrum had done little to increase tribal use of spectrum. In particular, FCC lacked information that could help inform its decision- making processes related to spectrum policy planning, which is intended to improve communications services in all areas of the United States, including tribal lands. By collecting data on the extent that tribal entities are obtaining and accessing spectrum, FCC could better understand tribal spectrum issues and use this information as it implements ongoing spectrum initiatives. Furthermore, the ability of tribal governments to make informed spectrum planning decisions and to participate in secondary market transactions is diminished without information from FCC on the spectrum transactions that occur over tribal lands. Providing this information directly to tribal entities could enable them to enter into leasing, partnership, or other arrangements to obtain spectrum. In our November 2018 report, we recommended that FCC (1) collect data on the extent that tribal entities are obtaining and accessing spectrum and use this information as FCC implements ongoing spectrum initiatives; (2) analyze data to better understand the extent that unused spectrum licenses exist over tribal lands, such as by analyzing the data for a sample of tribal lands, and as appropriate use this information to inform its oversight of the secondary market; and (3) make information on spectrum-license holders more accessible and easy to understand for interested parties, including tribal entities, to promote their ability to purchase or lease spectrum licenses from other providers. FCC agreed with these recommendations and described the actions it plans to take to implement them. For example, according to FCC, it will consider ways to collect data on the extent to which tribal entities are obtaining and accessing spectrum; analyze data from a sample of spectrum licenses on tribal lands to inform FCC’s spectrum policies; and transition to a more user-friendly system for its licensing data. Chairman Hoeven, Vice Chairman Udall, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staff have any questions about this testimony, please contact Andrew Von Ah, Director, Physical Infrastructure Issues at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Sally Moino and Anne Doré. Other staff who made contributions to the report cited in this testimony are identified in the source product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Broadband service on tribal lands continues to lag behind the rest of the country, especially on rural tribal lands. Broadband service can be delivered through wireless technologies using radio frequency spectrum. According to FCC, increasing tribal access to spectrum would help expand broadband service on tribal lands. This statement is based on GAO's November 2018 report ( GAO-19-75 ) related to spectrum use for broadband services by tribal entities and selected updates. Specifically, it discusses (1) tribal entities' ability to obtain and access spectrum to provide broadband services and the reported barriers that may exist, and (2) the extent to which FCC promotes and supports tribal efforts to obtain and access spectrum. For that report, GAO interviewed 16 tribal entities that were using wireless technologies. Selected entities varied geographically, among other characteristics. GAO analyzed FCC's license and auction data as of September 6, 2018, reviewed FCC's rulemakings on spectrum for broadband services, and interviewed other tribal and industry stakeholders and FCC officials. The information obtained was not generalizable to all tribes or industry participants. As an update, GAO reviewed FCC's June 2019 draft order related to spectrum in the 2.5 GHz band. The tribal entities—tribal governments and tribally owned telecommunications providers—GAO contacted for its November 2018 report cited various barriers to obtaining spectrum licenses in bands that can be used to provide broadband services. Based on data from the Federal Communications Commission (FCC) as of September 2018, GAO identified 18 tribal entities that held active spectrum licenses in such bands. For example, of these 18 tribal entities, 4 obtained licenses through secondary market transactions—that is, they bought or leased the license from another provider, and 2 obtained a license through an FCC spectrum auction. The barriers tribal officials identified to obtaining licensed spectrum include high costs at auctions and, in the case of secondary market transactions, a lack of information on who holds licenses over tribal lands. Because most spectrum allocated for commercial use has already been assigned, the secondary market is one of the few avenues available to tribal entities that would like to access licensed spectrum. At the time of GAO's November 2018 report, FCC had taken some actions to increase tribal access to spectrum. For example, FCC issued proposed rulemakings in 2011 and 2018 that sought comment on tribal-specific proposals, such as establishing tribal-licensing priorities and initiating processes to transfer unused spectrum licenses to tribal entities. FCC had not finalized these rules at the time of GAO's report, but FCC published a draft order in June 2019 that would create a tribal-licensing priorty window, whereby tribal entities would have an opportunity to obtain spectrum in the 2.5 gigahertz (GHz) band prior to the spectrum being auctioned. FCC adopted the order on July 10, 2019. FCC stated that it will implement spectrum initiatives and that it recognizes the importance of promoting a robust secondary market to improve communications throughout the United States, including tribal lands. However, GAO found that FCC had not consistently collected data related to tribal access to spectrum. For example: FCC did not collect data on whether spectrum auction applicants are tribal entities and therefore did not have a comprehensive understanding of the extent that tribal entities are attempting to obtain licensed spectrum. FCC did not analyze the extent that unused licensed spectrum exists over tribal lands. Although FCC officials said evaluating the effectiveness of FCC's secondary market policies is a way to increase the use of unused spectrum, FCC's approach did not include an analysis of unused spectrum licenses on tribal lands. As a result, FCC's evaluations of the secondary market may not accurately reflect how its policies affect tribal entities. By collecting data on the extent that tribal entities are obtaining and accessing spectrum, FCC could better understand tribal spectrum issues and use this information as it implements ongoing spectrum initiatives. Further, given that the secondary market is one of few ways for tribal entities to access licensed spectrum to provide Internet service, FCC could promote a more robust secondary market by analyzing unused licensed spectrum over tribal lands and using that information to inform FCC's oversight responsibilities. In the November 2018 report, GAO made three recommendations to FCC, including that FCC should collect data on tribal access to spectrum and analyze unused licensed spectrum over tribal lands. FCC agreed with the recommendations and described actions to address them.", "document_type": "gao"}
{"report": "In January 2019, we reported on the initial steps the Army has taken to consolidate all its modernization efforts under one authority. Establishing Army Futures Command is reported to be the most significant institutional change to the Army since it reorganized in 1973 after the Vietnam War. According to Army documentation, the intent of the new command is to provide unity of command, accountability, and modernization at the speed and scale required to prevail in future conflicts. The organization is led by a four-star general like its organizational peers: Army Materiel Command, Training and Doctrine Command, and Forces Command. The Army declared the commencement of operations for the command in July 2018, and has begun to define its organizational structures. Army Futures Command is expected to be fully operational by July 2019, meaning it will have sufficient staff with operational facilities, secure funding, and the ability to execute its assigned mission, roles, and responsibilities. Army Futures Command is headquartered in Austin, Texas. According to Army officials and documentation, the Army chose Austin because of its proximity to science, technology, engineering, and mathematics talent, as well as private sector innovators that officials believe will assist the command in achieving its modernization goals. According to senior Army leadership, the new command headquarters will have around 300 staff in place by July 2019, a workforce that may grow to as many as 500 employees—100 military and 400 civilians. Our analysis of Army’s plans for initial staffing at the Army Futures Command headquarters, based on data from July 1, 2018, found that about one-third of headquarters staff would be involved directly in modernization efforts, such as engineers and operations specialists, and the remaining two-thirds would consist of support staff, including legal counsel and contracting professionals. According to Army Futures Command officials and documentation, the new organization will be organized around three major components: Futures and Concepts Center is responsible for identifying and prioritizing capability and development needs and opportunities. This organization subsumed the Army Capabilities Integration Center on December 7, 2018. The center was formerly part of Army Training and Doctrine Command and is located at Fort Eustis, Virginia. Combat Capabilities Development Command is responsible for conceptualizing and developing solutions for identified needs and opportunities. This organization subsumed the Research, Development and Engineering Command on February 3, 2019 and is located at Aberdeen Proving Ground, Maryland. Combat Systems Directorate is responsible for refining, engineering, and producing new capabilities. This directorate will communicate with the program executive offices and program management offices reporting to the Assistant Secretary of the Army for Acquisition, Logistics and Technology. Combat Systems Directorate is in the process of being established and is located in Austin, Texas. Among other things, the reorganization is intended to establish Army Futures Command to oversee development of Army’s six modernization priorities. The Army’s then-Acting Secretary and the Chief of Staff in an October 3, 2017 memorandum identified these priorities to guide Army modernization: next generation combat vehicle, air and missile defense, and soldier lethality. As we reported in January 2019, to pursue the six priority areas, the Army established eight cross-functional teams. These teams were initially created as a pilot effort to increase the efficiency of requirements and technology development for modernization before the announcement of the new command. They were subsequently moved into Army Futures Command in 2018. These cross-functional teams are located throughout the country in areas of relevance to their mission. The eight cross- functional teams and the priority areas they address are outlined in table 1. These cross-functional teams are intended to: take steps toward achieving the six modernization priorities; leverage expertise from industry and academia; identify ways to use experimentation, prototyping, and demonstrations; and identify opportunities to improve the efficiency of requirements development and the overall defense systems acquisition process. The cross-functional team pilots were structured to help achieve these goals. Each cross-functional team consists of core staff and subject matter experts from across the Army. To facilitate the rapid approval of requirements, each cross-functional team is led by a general officer or a senior civilian official who could communicate directly with the highest levels of the Army. The goal of staffing these teams is to ensure that each team had individuals who specialized in acquisition, requirements, science and technology, test and evaluation, resourcing, contracting, cost analysis, sustainment, and military operations. The goal of bringing different experts together is to facilitate collaboration and immediate opportunities for stakeholders to provide input as opposed to the more traditional requirements development process, in which input has typically been provided separately. Officials told us that, while all of these subject matter experts may have provided input on the requirements development process in the past, placing them on a single team offers the promise of streamlining those efforts and could eliminate the need for multiple reviews. Figure 1 below compares the requirements development process under cross-functional teams to how the Army has traditionally developed requirements. In January 2019, we recommended that Army Futures Command incorporate leading practices for effective cross-functional teams. We determined that the documentation that established the cross-functional team pilots fully addressed four of our eight leading practices for effective teams, and at least partially addressed another four. The leading practices and their implementation by the cross-function teams are described in table 2 below. In addition to the practices listed above, the cross-functional team pilots generally applied leading practices for requirements development. One leading practice the teams generally applied was promoting communication between requirements developers, warfighters, and industry representatives. This enables the cross-functional teams to better match developer resources with end-user needs. While applying this practice, the cross-functional team pilots had initial progress in writing requirements documents more efficiently. According to cross-functional team officials, they were able to shorten the requirements development process for several capabilities. However, we found that Army Futures Command does not have a formal plan to identify and share lessons learned from cross-functional team pilots to incorporate or expand application of these leading practices. Doing so would allow Army Futures Command the opportunity to accelerate the progress these teams made and spread the benefits across all of the teams and a wider range of specific military capabilities they are pursuing. We recommended that the Army (1) incorporate cross- functional teams’ experiences in applying leading practices and (2) execute a process for identifying and incorporating lessons learned. The Department of Defense concurred with these recommendations, and stated that Army Futures Command expects to apply leading practices and capture lessons learned by the end of 2019. Our January 2019 report also identified leading practices for mergers and organizational transformations. These leading practices are listed in table 3 below. We found that the Army Futures Command had implemented some of these practices, particularly leadership’s dedication to the new command and the clear statement of its mission. However, we have previously reported that, according to federal internal controls standards, it is important to implement all of these practices in order to establish the organizational structure necessary to enable an entity to plan, execute, control, and assess the organization in achieving its objectives. Establishment of this structure is particularly important for the Army where leadership and its priorities can change frequently. Therefore, we recommended in January 2019 that Army Futures Command fully apply these leading practices. The Department of Defense concurred with the recommendation, and stated that it would start pilot processes in fiscal years 2019 and 2020. In addition to further implementing leading practices, Army Futures Command can reduce risk to meeting its goals by fully assessing the workforce necessary to develop requirements—the testable and measurable characteristics necessary for the design of a proposed system. Historically, the Army has been unable to ensure that requirements for new capabilities are feasible due, in part, to a declining workforce for requirements development. In June 2017, we reported that the Army had prioritized combat readiness over resourcing its requirements development process to meet future readiness needs. We recommended that the Army assess the resources, particularly personnel, necessary for requirements development. The Army concurred with the recommendation, and has stated it would implement this recommendation once Army Futures Command is fully operational. As Army Futures Command centralizes and takes responsibility for requirements development, this recommendation is even more pertinent. Therefore, we recently elevated the status of the recommendation to a priority recommendation for the Secretary of the Army, as we believe it warrants greater attention from the Department of the Army. As Army Futures Command approaches full operating status, it is important to define not only how the command functions, but how it works with other organizations. In our January 2019 report, we found that Army Futures Command had not yet established policies and procedures detailing how it will execute its responsibilities in coordination with other Army organizations that do not directly report to it. One such organization is the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology—the civilian authority responsible for the overall supervision of Army acquisition matters—and the acquisition offices it oversees. To mitigate concerns about coordination, the Army issued a directive in August 2018, signed by the Secretary of the Army, designating the military deputy to the Assistant Secretary as an advisor to Army Futures Command, and Army Futures Command officials have stated that the Assistant Secretary will retain full acquisition authorities as required by law. The command expects to continue to refine its coordination with the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology. Since announcing the modernization efforts in 2017, the Army has directed more funding toward closing near-term capability gaps, focused on fiscal years 2019 through 2023. For example, as part of the planning for the fiscal year 2019 budget process, the Army identified 67 high- priority programs, such as the M-1 Abrams tank and the AH-64 Apache helicopter, which require further investment. To support these priorities, the Army identified a need for $16 billion in increased funding in fiscal years 2019 through 2023. The 2018 Army Modernization Strategy report identified the need for additional resources for near-term efforts, including plans to spend billions of dollars for acquisition of maneuverable short range air defense capabilities in fiscal years 2020 through 2024. In addition to the near-term capabilities the Army is pursuing, it has identified a number of long-term needs—those focused after fiscal year 2024—and begun to align research and development efforts with these needs. The Army identified long-term capabilities for all of the modernization priorities, as well as dates that science and technology efforts should transition to programs of record. As part of this overall effort, the Army has evaluated its science and technology portfolio to realign funding toward its six modernization priorities. In an October 2017 Army review, the eight cross-functional teams examined science and technology investments to identify which efforts contributed to the priorities and which did not. The review was performed for the Office of the Deputy Under Secretary of the Army. Based on that work, as of our January 2019 report, the Army had taken steps to realign over $1 billion from previous priorities and toward the new priorities for fiscal years 2019 through 2023. Army officials stated that they expect to undertake similar reviews annually. The Army is executing near-term modernization programs, but could better manage how it evaluates them and estimate their costs. In September 2018, we reported that the Army used its six priority capabilities to identify key mission areas—such as long-range artillery, air and missile defense, brigade combat teams, and cyber and electronic warfare—that require near-term modernization investments. Based on its assessments, the Army prioritized and proposed several near-term solutions to address its critical capability gaps. These solutions included adding personnel—and different types of personnel—to combat forces, updating existing weapon systems, and investments in research and development. However, the Army had not established processes for evaluating whether its modernization efforts allow it to deter or defeat potential adversaries during a major conflict. We also found that the Army had not fully estimated the costs or sources of funding for its near-term modernization efforts. In particular, we found that the Army did not report in its modernization strategy the extent to which it relied on Overseas Contingency Operations appropriations. We recommended that the Army (1) develop a plan to finalize the processes for evaluating how its near-term investments contribute to the Army’s ability to decisively defeat a major adversary, and (2) finalize its cost analysis of near-term investments and report those costs to Congress in its fiscal year 2020 budget request. Army officials told us in April 2019 that the Army has taken steps to implement these recommendations. The most recent efforts to modernize follow several past efforts. Unfortunately, the Army has a history of failed, costly weapon system procurements to replace older weapons systems. These failures are due, in part, to requirements that could not be met and the immaturity of key technologies. Many of these programs failed to provide any capability to the warfighter despite the considerable time and funding expended. Some examples of these cancelled programs are listed in table 4 below. While the Army has dedicated significant funding towards its long-term modernization priorities, other changes may also be needed. Among them, we recommended in our January 2019 report, that Army Futures Command take steps to follow our leading practices to mature technology to a sufficiently high level prior to system development, which can reduce risk. There are indications that, in some cases, the Army plans to mature technology to a sufficiently high level prior to system development. For example, officials from the Future Vertical Lift cross-functional team told us they will complete technology demonstrations on two competitive prototypes before choosing to develop a design for the Future Attack Reconnaissance Aircraft. However, we found that the Army may continue its past practice of proceeding into system development with less mature technologies. In particular, we identified some plans to mature technologies in a relevant environment prior to authorizing the start of a new acquisition program, rather than the higher level of demonstrating them in an operational environment as recommended by our leading practices. This increases risk that new capabilities will require further maturation in system development, which could raise costs and extend timelines for delivery of equipment to the warfighter. We recommended in our January 2019 report that the Army should demonstrate technologies in an operational environment before starting a formal acquisition program. The Department of Defense concurred with the recommendation and stated that the Army Futures Command will execute a new development process that will include operational technology demonstrations. Pilot processes for this are expected to begin in 2019. In summary, we recognize that the Army is early in its modernization efforts but could make changes now that would be helpful. Army Futures Command should implement not only the leading practices we describe as well as the lessons learned by its own cross-functional teams. The Army should also increase the transparency of its efforts by clarifying how it evaluates its progress towards modernization goals and clearly stating the full costs of pursuing those goals. Finally, the Army can reduce the risk to the long-term modernization of its capabilities by ensuring that the technologies it uses in future weapon systems are fully mature. Chairman Norcross, Ranking Member Hartzler, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to answer any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Jon Ludwigson, Acting Director, Contracting and National Security Acquisitions at (202) 512-4841, or ludwigsonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are J. Kristopher Keener (Assistant Director), Joe E. Hunter (Analyst-in-Charge), Emily Bond, Matthew T. Crosby, Cale Jones, Kevin O’Neill, John Pendleton, and Roxanna Sun. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Army is investing in near- and long-term modernization efforts to maintain its technological edge over potential adversaries. It is doing this by upgrading and updating current weapon systems, developing new capabilities, and reshaping its doctrine, force structure, training, and leader development. This testimony is based on prior GAO work conducted 2016 through 2019 and addresses the Army's progress in: (1) establishing Army Futures Command, and (2) developing its near-term and long-term modernization strategies. It also highlights several actions recommended in prior reports related to Army modernization. To conduct this work, GAO assessed the Army's near- and long-term modernization efforts, application of leading practices to those efforts, budget documents, and the effectiveness of the process for developing requirements for major weapon systems. This statement includes updates to this information, as of April 2019. In January 2019, GAO reported on initial steps the Army has taken to consolidate its modernization efforts under one authority—Army Futures Command. Army officials call it their most significant institutional change since 1973, when the Army was reorganized after the Vietnam War. As a precursor to this new command, the Army established eight cross-functional teams as a pilot program to increase the efficiency of requirements and technology development in six key modernization areas. These areas are described in the table below. Since announcing the modernization efforts in 2017, the Army has directed more funding toward closing near-term capability gaps. For example, as part of the planning for the fiscal year 2019 budget process, the Army identified 67 high-priority programs that require a $16 billion investment between now and fiscal year 2023. In addition to the near-term capabilities the Army is pursuing, it has identified a number of long-term needs—those focused after fiscal year 2024—and taken steps to realign research and development efforts and funding with those needs. Over the past 2 years, GAO highlighted several steps Army should take to improve its modernization efforts, including: Apply leading practices to Army Futures Command's cross-functional teams, and capture their lessons learned. Assess the resources, particularly personnel, necessary to support its requirements development process. Increase the transparency of its efforts by clarifying how it evaluates whether its modernization efforts are achieving the Army's goals and clearly stating the full costs of pursuing those goals. Reduce risk by ensuring technologies are fully mature—such as demonstrating technologies in an operational environment before starting a formal acquisition program. By implementing these recommendations, Army Futures Command could better ensure its ability to deliver enhanced capabilities to the warfighter and decrease the risk of cost and schedule growth. Over the past 2 years, GAO has made recommendations related to this body of work. Department of Defense and Army concurred with all the recommendations and are working to implement them.", "document_type": "gao"}
{"report": "DOD is the largest U.S. government department and one of the most complex organizations in the world. In support of its military operations, the department manages many interdependent business functions, including logistics management, procurement, health care management, and financial management. DOD relies extensively on IT to support its business functions. The department’s IT budget organizes investments in four categories, called mission areas—enterprise information environment, business, warfighting, and intelligence. Figure 1 shows the amount of DOD’s total requested fiscal year 2020 IT budget (of $36.1 billion) that the department plans to spend on each of its mission areas (including the approximately $8.9 billion it plans to spend on developing, modernizing, operating, and maintaining its business systems). The department further organizes its IT budget by segments. In this regard, the business mission area segments are logistics/supply chain management, human resource management, health, financial management, acquisition, real property management, training and readiness, other business services, and defense security enterprise. Figure 2 shows the department’s projected fiscal year 2020 spending (of $8.9 billion) for each segment in the business mission area. As amended in 2016, the U.S. Code requires DOD to perform certain activities aimed at ensuring that its business system investments are managed efficiently and effectively. Specifically, the amendments established four sets of requirements for the department related to (1) issuing policy and guidance for managing defense business systems; (2) developing and maintaining a defense business enterprise architecture; (3) establishing a Defense Business Council to provide advice to the Secretary on managing defense business systems; and (4) obtaining approvals before systems proceed into development (or if no development is required, into production or fielding). Further, the amendments to the code established specific designations and thresholds that, among other things, provided additional details about the department’s requirements: Covered defense business systems. The code defines a covered defense business system as a system that is expected to have a total amount of budget authority of over $50 million over a period of 5 years or more. Priority defense business systems. The code establishes a category of system, called a priority defense business system. This refers to a system that is (1) expected to have a total amount of budget authority of over $250 million over the period of the current future-years defense program, or (2) designated by the DOD chief management officer (CMO) as a priority defense business system based on specific program analyses of factors including complexity, scope, and technical risk, and after notification to Congress of such designation. Thresholds and officials responsible for review and certification of defense business systems. The code states that, unless otherwise assigned by the Secretary of Defense, military department CMOs are to have approval authority for their covered defense business system investments of below $250 million over the future- years defense program. The CMO is to have approval authority for defense business systems owned by DOD components other than the military departments, systems that will support the business process of more than one military department or other component, and priority defense business systems. Certification requirements. The code requires that a defense business system program be reviewed and certified at least annually, on the basis of its compliance with the business enterprise architecture and appropriate business process reengineering. In addition, the code requires that the business system program be reviewed and certified on the basis of having valid, achievable requirements and a viable plan for implementing the requirements; having an acquisition strategy designed to eliminate or reduce the need to tailor commercial off-the-shelf systems; and being in compliance with the department’s auditability requirements. DOD Instruction 5000.75: Business System Requirements and Acquisitions assigns roles and responsibilities for managing defense business system investments. Table 1 identifies the key entities and their responsibilities for managing defense business system investments. GAO designated the department’s business systems modernization efforts as high risk in 1995 and has continued to do so in the years since. In addition, since 2005, we have issued 12 reports in which we assessed DOD’s actions to respond to the business system investment management requirements contained in U.S. Code Title 10, Section 2222. These 12 reports, which are listed in appendix I, collectively contained 29 recommendations to help strengthen the department’s management of its business systems. For example, In 2014, we reported that DOD had taken steps to comply with key provisions in the NDAA for Fiscal Year 2005; however, the department continued to face challenges in fully complying with the provisions and modernizing its business systems environment. As a result, we recommended that the department improve its business system certification and approval process. DOD agreed with, and implemented this recommendation. In 2015, we reported that DOD had implemented 5 of the 16 recommendations made by GAO since June 2011 to address each of the overarching provisions for improving business systems management described in the NDAA for Fiscal Year 2005. The department had partially implemented the other 11 recommendations. We also reported that DOD’s business enterprise architecture and process reengineering efforts were not fully achieving the intended outcomes described in statute. Thus, we made a recommendation aimed at ensuring that the department better achieve business process reengineering and enterprise architecture outcomes and benefits. DOD agreed with this recommendation and took steps toward implementing it. In 2018, we reported that DOD had made progress in complying with most legislative provisions for managing its defense business systems, but that additional actions were needed. For example, the NDAA for Fiscal Year 2016 required DOD and the military departments to issue guidance to address five requirements for reviewing and certifying the department’s business systems. We reported that, while DOD had issued guidance addressing all of the requirements, the military departments had shown mixed progress. Accordingly, we recommended that the military departments issue guidance to address certifiying their business systems on the basis of the five requirements. While DOD partially agreed with these recommendations, the military departments implemented them. As of June 2019, the department had implemented 15 of the 29 recommendations contained in the 12 reports. In addition, we closed two of the recommendations as “not implemented” because the actions taken by the department did not sufficiently address the recommendations. The department had not yet taken actions to address the other 12 recommendations. Table 2 identifies the four sets of requirements for strengthening DOD’s management of defense business systems identified in the U.S. Code. In addition, the table identifies a fifth category associated with human capital, which supports the department’s execution of the other four sets of requirements. The table also identifies the 12 GAO recommendations that remained to be implemented as of June 2019. DOD took actions toward addressing GAO’s recommendations related to business system requirements contained in the U.S. Code. In doing so, the department made progress in strengthening the management of its defense business system investments. Specifically, between June 2019 and November 2019, the department demonstrated that it had implemented four of the 12 remaining recommendations aimed at strengthening business systems management. As of November 2019, for example, the department had taken actions to implement a recommendation that helped the department comply with the code’s requirement to establish guidance for effectively managing its defense business system investments. In this regard, the Office of the CMO demonstrated that DOD had implemented our recommendation to improve the department’s policy to require full consideration of sustainability and technological refreshment requirements for its defense business systems investments. Specifically, the department demonstrated that its Instruction 5000.75, DOD Directive 5000.01, and DOD Financial Management Regulation Volume 2B guidance includes policy requiring consideration of sustainability and technological refreshment. The department also demonstrated that its DOD Directive 5000.01 guidance includes policy to ensure that best systems engineering practices are used in the procurement and deployment of commercial systems, modified commercial systems, and defense-unique systems. In addition, with regard to the requirement that DOD ensure that business systems are reviewed and certified in accordance with U.S. Code Title 10, Section 2222, the Army demonstrated that it had implemented our recommendation that the department improve its guidance for certifying defense business systems. Specifically, the Army issued guidance to require that the systems be certified on the basis of (1) having valid, achievable requirements and a viable plan to implement the requirements; (2) having an acquisition strategy designed to eliminate or reduce the need to tailor commercial off-the-shelf systems to meet unique requirements, incorporate unique requirements, or incorporate unique interfaces to the maximum extent practicable; and (3) being in compliance with DOD’s auditability requirements. The Air Force also demonstrated that it had implemented our recommendation that the department improve its guidance for certifying defense business systems. Specifically, the Air Force issued guidance to require that systems be certified on the basis of (1) having an acquisition strategy designed to eliminate or reduce the need to tailor commercial off-the-shelf systems to meet unique requirements, incorporate unique requirements, or incorporate unique interfaces to the maximum extent practicable; and (2) being in compliance with DOD’s auditability requirements. Further, with regard to this requirement, the Office of the CMO demonstrated that it had addressed the recommendation to implement and use business enterprise architecture and business process reengineering compliance assessments more effectively. Specifically, in September 2019, the Office of the CMO demonstrated that it had reviewed business enterprise architecture and business process reengineering compliance assessments and identified in investment decision memorandums which systems had assessments that required action. Even with the actions taken, however, more remained to be done to implement eight other recommendations relating to the code’s requirements that could help strengthen the department’s management of its business systems. Specifically, with regard to the requirement to ensure that business systems are reviewed and certified in accordance with the code, the department had not implemented two of our related recommendations. For example, it had not implemented our recommendation to ensure that portfolio assessments are conducted in key areas identified in GAO’s IT investment management framework, such as current schedule, project reporting, and risks. In addition, with regard to the requirement to develop and maintain a defense business enterprise architecture and IT enterprise architecture, in accordance with relevant laws and Office of Management and Budget policies and guidance, the department had developed a business enterprise architecture. However, it had not implemented our five related recommendations. For example, it had not implemented our recommendation to integrate its business and IT architectures. According to officials in the Office of the CIO, the office plans to finalize the first increment of version 3 of its DOD Information Enterprise Architecture (i.e., IT enterprise architecture) by the end of December 2019, and intends to integrate the business enterprise architecture into the Information Enterprise Architecture as a part of that effort. Further, with regard to human capital, which supports the other requirements, the department had not implemented our related recommendation to develop a skills inventory, needs assessment, gap analysis, and plan to address identified gaps as part of a strategic approach to human capital planning. In commenting on its status in addressing the recommendation in September 2019, the Office of the CMO stated that it intends to publish a Defense Business Operations Management Workforce Plan by December 31, 2019. According to office officials, the plan is to include skills requirements for both Office of the CMO permanent employees and DOD employees detailed to the Office of the CMO in support of the management and reform of defense business operations management. Table 3 summarizes the status of the 12 recommendations, as of November 2019, relative to the requirements established in the code. Further, appendix II provides additional information about the status of the recommendations, as of November 2019. By taking actions to implement four of the 12 remaining recommendations, DOD made important progress in its efforts to comply with the requirements established in the U.S. Code. Nevertheless, taking further actions to implement all of the recommendations is essential to helping the department comply with all of the requirements—and ultimately, to strengthen the management of its defense business system investments and efforts to effectively transform its business operations. DOD provided written comments on a draft of this report, which are reprinted in appendix III. In its comments, the department stated that it appreciated GAO’s recognition of the progress that DOD has made to strengthen business systems management. The department agreed that more needs to be done to strengthen the management of investments in DOD business operations and stated that, in the coming months, it plans to execute a reform agenda intended to strengthen oversight and improve business performance. Further, while this report made no new recommendations, the department concurred with our assessment of the status of seven of the eight open recommendations that DOD has not yet implemented. In addition, the department suggested that we close one recommendation that it perform specific activities as part of a strategic approach to human capital planning for the Office of the CMO, based on the CMO’s submission of a human capital analysis report to Congress in early January 2020. The department subsequently provided us a copy of the CMO’s human capital analysis report on February 7, 2020. We plan to assess the report to determine if it meets the intent of our recommendation. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Secretary of Defense, and other interested parties. This report also is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions on matters discussed in this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. Since 2005, GAO has issued 12 reports in which we assessed DOD’s actions to respond to business systems modernization requirements contained in U.S. Code, Title 10, Section 2222. These requirements specify how DOD is to manage its business system investments. The reports are listed below: Defense Business Systems: DOD Needs to Continue Improving Guidance and Plans for Effectively Managing Investments, GAO-18-130 (Washington, D.C.: April 16, 2018). DOD Business Systems Modernization: Additional Action Needed to Achieve Intended Outcomes, GAO-15-627 (Washington, D.C.: July 16, 2015). Defense Business Systems: Further Refinements Needed to Guide the Investment Management Process, GAO-14-486 (Washington, D.C. May 12, 2014). DOD Business Systems Modernization: Further Actions Needed to Address Challenges and Improve Accountability, GAO-13-557 (Washington, D.C.: May 17, 2013). DOD Business Systems Modernization: Governance Mechanisms for Implementing Management Controls Need to Be Improved, GAO-12-685 (Washington, D.C.: June 1, 2012). Department of Defense: Further Actions Needed to Institutionalize Key Business System Modernization Management Controls, GAO-11-684 (Washington, D.C.: June 29, 2011). Business Systems Modernization: Scope and Content of DOD’s Congressional Report and Executive Oversight of Investments Need to Improve, GAO-10-663 (Washington, D.C.: May 24, 2010). DOD Business Systems Modernization: Recent Slowdown in Institutionalizing Key Management Controls Needs to Be Addressed, GAO-09-586 (Washington, D.C.: May 18, 2009). DOD Business Systems Modernization: Progress in Establishing Corporate Management Controls Needs to Be Replicated Within Military Departments, GAO-08-705 (Washington, D.C.: May 15, 2008). DOD Business Systems Modernization: Progress Continues to Be Made in Establishing Corporate Management Controls, but Further Steps Are Needed, GAO-07-733 (Washington, D.C.: May 14, 2007). Business Systems Modernization: DOD Continues to Improve Institutional Approach, but Further Steps Needed, GAO-06-658 (Washington, D.C.: May 15, 2006). DOD Business Systems Modernization: Important Progress Made in Establishing Foundational Architecture Products and Investment Management Practices, but Much Work Remains, GAO-06-219 (Washington, D.C.: November 23, 2005). Table 4 summarizes the status of recommendations made to the Department of Defense (DOD), based on GAO’s assessments of DOD’s actions to respond to defense business system investment management requirements contained in U.S. Code Title 10, Section 2222. The recommendations, included in GAO reports issued from 2005 through 2018, were aimed at helping the department strengthen its approach to managing its business system investments. As of June 2019 (when GAO began its current review of DOD’s actions to address the recommendations), the department had not yet addressed 12 of 29 total recommendations. Subsequently, between June 2019 and November 2019, the department implemented four of the recommendations, but did not implement eight other recommendations. In addition to the contact above, individuals who made contributions to this report include Michael Holland (Assistant Director), Tyler Mountjoy (Analyst in Charge), Camille Chaires, Cheryl Dottermusch, William Hutchinson, Monica Perez-Nelson, Priscilla Smith, and Adam Vodraska.", "summary": "DOD spends billions of dollars each year on systems to support its key business areas, such as personnel and logistics. For fiscal year 2020, DOD reported that its business system investments are expected to cost about $8.9 billion. GAO has made many recommendations to DOD aimed at strengthening defense business systems management. Further, U.S. Code Title 10, Section 2222 requires DOD to perform activities aimed at ensuring that these investments are managed efficiently and effectively. The National Defense Authorization Act for Fiscal Year 2016 included a provision for GAO to report on the extent to which DOD is complying with the code's requirements. Accordingly, the objective of this review was to assess the extent to which DOD has taken actions that comply with the code's requirements for ensuring that business system investments are managed efficiently and effectively. To do so, GAO selected 12 recommendations that DOD had not implemented as of June 2019, and assessed the department's subsequent actions on the recommendations (through November 2019) against the requirements in the code. GAO also analyzed DOD's business systems guidance and business enterprise architecture documentation, and interviewed relevant DOD officials. As of November 2019, the Department of Defense (DOD) had taken actions that addressed some, but not all, of the 12 prior GAO recommendations for strengthening defense business systems management. In doing so, the department made progress in complying with related business system investment management requirements contained in U.S. Code Title 10 Section 2222 (the code or U.S. Code). Specifically, as of November 2019, DOD had implemented four of the 12 recommendations (see table). For example, with respect to the requirement associated with investment management guidance, DOD had implemented the recommendation to issue policy requiring full consideration of sustainability and technological refreshment requirements for its business system investments. However, DOD had not yet implemented eight other recommendations relating to the code's requirements. The recommendations that had not been implemented relate to the department's actions to: integrate its business and information technology (IT) architectures, ensure that portfolio assessments are conducted in key areas identified in the GAO Information Technology Investment Management framework. develop a skills inventory, needs assessment, gap analysis, and plan to address identified gaps as part of a strategic approach to human capital planning, among other things. Taking further actions to implement all of the recommendations is essential to helping the department achieve compliance with all of the requirements—and, ultimately, further strengthen the management of its defense business system investments as well as its efforts to effectively transform its business operations. GAO is not making any new recommendations in this report. As of November 2019, DOD had not yet implemented eight of the 12 prior recommendations. GAO will continue to monitor DOD's actions to address the remaining recommendations.", "document_type": "gao"}
{"report": "To the Commissioner of Internal Revenue In our audits of the fiscal years 2019 and 2018 financial statements of the Internal Revenue Service (IRS), we found IRS’s financial statements as of and for the fiscal years ended September 30, 2019, and 2018, are presented fairly, in all material respects, in accordance with U.S. generally accepted accounting principles; although internal controls could be improved, IRS maintained, in all material respects, effective internal control over financial reporting as of September 30, 2019; and no reportable noncompliance for fiscal year 2019 with provisions of applicable laws, regulations, contracts, and grant agreements we tested. The following sections discuss in more detail (1) our report on the financial statements and on internal control over financial reporting, which includes required supplementary information (RSI) and other information included with the financial statements; (2) our report on compliance with laws, regulations, contracts, and grant agreements; and (3) agency comments. In accordance with our authority conferred by the Chief Financial Officers (CFO) Act of 1990, as amended by the Government Management Reform Act of 1994, we have audited IRS’s financial statements. IRS’s financial statements comprise the balance sheets as of September 30, 2019, and 2018; the related statements of net cost, changes in net position, budgetary resources, and custodial activity for the fiscal years then ended; and the related notes to the financial statements. We also have audited IRS’s internal control over financial reporting as of September 30, 2019, based on criteria established under 31 U.S.C. § 3512(c), (d), commonly known as the Federal Managers’ Financial Integrity Act (FMFIA). We conducted our audits in accordance with U.S. generally accepted government auditing standards. We believe that the audit evidence we obtained is sufficient and appropriate to provide a basis for our audit opinions. IRS management is responsible for (1) the preparation and fair presentation of these financial statements in accordance with U.S. generally accepted accounting principles; (2) preparing, measuring, and presenting the RSI in accordance with U.S. generally accepted accounting principles; (3) preparing and presenting other information included in documents containing the audited financial statements and auditor’s report, and ensuring the consistency of that information with the audited financial statements and the RSI; (4) maintaining effective internal control over financial reporting, including the design, implementation, and maintenance of internal control relevant to the preparation and fair presentation of financial statements that are free from material misstatement, whether due to fraud or error; (5) evaluating the effectiveness of internal control over financial reporting based on the criteria established under FMFIA; and (6) its assessment about the effectiveness of internal control over financial reporting as of September 30, 2019, included in the accompanying Management’s Report on Internal Control over Financial Reporting in appendix I. Our responsibility is to express an opinion on these financial statements and an opinion on IRS’s internal control over financial reporting based on our audits. U.S. generally accepted government auditing standards require that we plan and perform the audits to obtain reasonable assurance about whether the financial statements are free from material misstatement, and whether effective internal control over financial reporting was maintained in all material respects. We are also responsible for applying certain limited procedures to RSI and other information included with the financial statements. An audit of financial statements involves performing procedures to obtain audit evidence about the amounts and disclosures in the financial statements. The procedures selected depend on the auditor’s judgment, including the auditor’s assessment of the risks of material misstatement of the financial statements, whether due to fraud or error. In making those risk assessments, the auditor considers internal control relevant to the entity’s preparation and fair presentation of the financial statements in order to design audit procedures that are appropriate in the circumstances. An audit of financial statements also involves evaluating the appropriateness of the accounting policies used and the reasonableness of significant accounting estimates made by management, as well as evaluating the overall presentation of the financial statements. An audit of internal control over financial reporting involves performing procedures to obtain evidence about whether a material weakness exists. The procedures selected depend on the auditor’s judgment, including the assessment of the risk that a material weakness exists. An audit of internal control over financial reporting also includes obtaining an understanding of internal control over financial reporting, and evaluating and testing the design and operating effectiveness of internal control over financial reporting based on the assessed risk. Our audit of internal control also considered IRS’s process for evaluating and reporting on internal control over financial reporting based on criteria established under FMFIA. Our audits also included performing such other procedures as we considered necessary in the circumstances. We did not evaluate all internal controls relevant to operating objectives as broadly established under FMFIA, such as those controls relevant to preparing performance information and ensuring efficient operations. We limited our internal control testing to testing controls over financial reporting. Our internal control testing was for the purpose of expressing an opinion on whether effective internal control over financial reporting was maintained, in all material respects. Consequently, our audit may not identify all deficiencies in internal control over financial reporting that are less severe than a material weakness. An entity’s internal control over financial reporting is a process effected by those charged with governance, management, and other personnel, the objectives of which are to provide reasonable assurance that (1) transactions are properly recorded, processed, and summarized to permit the preparation of financial statements in accordance with U.S. generally accepted accounting principles, and assets are safeguarded against loss from unauthorized acquisition, use, or disposition, and (2) transactions are executed in accordance with provisions of applicable laws, including those governing the use of budget authority, regulations, contracts, and grant agreements, noncompliance with which could have a material effect on the financial statements. Because of its inherent limitations, internal control over financial reporting may not prevent, or detect and correct, misstatements due to fraud or error. We also caution that projecting any evaluation of effectiveness to future periods is subject to the risk that controls may become inadequate because of changes in conditions, or that the degree of compliance with the policies or procedures may deteriorate. In our opinion, IRS’s financial statements present fairly, in all material respects, IRS’s financial position as of September 30, 2019, and 2018, and its net cost of operations, changes in net position, budgetary resources, and custodial activity for the fiscal years then ended in accordance with U.S. generally accepted accounting principles. In accordance with federal accounting standards, IRS’s financial statements do not include an estimate of the dollar amount of taxes that are owed to the federal government but that taxpayers have not reported or that IRS has not identified through its enforcement programs, often referred to as the tax gap, nor do they include information on tax expenditures. Further detail on the tax gap and tax expenditures, as well as the associated dollar amounts, is provided in the other information included with the financial statements. In our opinion, although internal controls could be improved, IRS maintained, in all material respects, effective internal control over financial reporting as of September 30, 2019, based on criteria established under FMFIA. Our fiscal year 2019 audit identified continuing deficiencies concerning IRS’s internal control over unpaid assessments and continuing and new deficiencies concerning IRS’s internal control over financial reporting systems. While not considered material weaknesses, these deficiencies are collectively important enough to merit attention by those charged with governance of IRS. Therefore, we considered these issues affecting IRS’s internal controls over unpaid assessments and financial reporting systems to be significant deficiencies in internal control as of September 30, 2019. These two significant deficiencies are discussed in more detail below. We considered these significant deficiencies in determining the nature, timing, and extent of our audit procedures on IRS’s fiscal year 2019 financial statements. Although the significant deficiencies in internal control did not affect our opinion on IRS’s fiscal year 2019 financial statements, misstatements may occur in unaudited financial information reported internally and externally by IRS because of these significant deficiencies. In addition, because of the significant deficiencies in internal controls over unpaid assessments and financial reporting systems that existed during fiscal year 2019, IRS’s financial management systems did not comply substantially with federal financial management systems requirements as required by the Federal Financial Management Improvement Act of 1996. We will be reporting additional details concerning any new issues relating to these significant deficiencies separately to IRS management, along with recommendations for corrective actions. We also identified other deficiencies in IRS’s internal control over financial reporting that we do not consider to be material weaknesses or significant deficiencies. Nonetheless, these deficiencies warrant IRS management’s attention. We have communicated these matters to IRS management and, where appropriate, will report on them separately along with related recommendations for corrective actions. Further, as we have reported in past audits, IRS continues to face significant ongoing financial management challenges relating to safeguarding taxpayer receipts and associated information, and preventing and detecting fraudulent refunds based on identify theft. Although these challenges do not rise to the level of significant deficiencies in internal control, we believe they are sensitive matters requiring IRS management’s attention. We have made several recommendations to IRS to enhance its internal controls to mitigate these challenges. It is important that IRS continue its efforts to minimize the risks these challenges pose to taxpayers and any associated losses to the federal government. Limitations in the financial systems IRS uses to account for federal taxes receivable and other unpaid assessment balances, as well as other control deficiencies that led to errors in taxpayer accounts, continued to exist during fiscal year 2019. As a result of these deficiencies, IRS’s systems were unable to provide the timely, reliable, and complete transaction-level financial information necessary to enable IRS to appropriately classify and report unpaid assessment balances. As in prior years, IRS used a complex and labor-intensive statistical estimation process to compensate for the effects of its system limitations and other deficiencies on a material portion of its federal taxes receivable balance to help ensure that this balance was free of material misstatement. During fiscal year 2019, IRS recorded adjustments totaling about $17 billion to correct the effects of continued errors in its underlying data that IRS identified during its manual estimation process. While using this process to determine a material portion of taxes receivable has enabled IRS to produce reliable related balances for year- end reporting, it does not provide IRS management with readily available, reliable unpaid assessment information on a daily basis throughout the year in order to effectively manage unpaid assessment balances. Further, errors in taxpayer accounts create a burden for those taxpayers whose accounts were affected. While not collectively considered a material weakness, IRS’s ongoing control deficiencies related to unpaid assessments are important enough to merit attention by those charged with governance of IRS. Therefore, these issues represent a significant deficiency in IRS’s internal control over financial reporting as of September 30, 2019. During fiscal year 2019, IRS documented the key management decisions in the design and use of the estimation process. This step should reduce the risk that IRS may perform sampling procedures inconsistent with management intent or plans. Continued management commitment and sustained efforts are necessary to build on the progress made to date and to fully address IRS’s remaining unresolved issues concerning the management and reporting of unpaid assessments. During our fiscal year 2019 audit, we determined that unresolved information system control deficiencies from prior audits, along with new control deficiencies pertaining to business process application controls and general controls in IRS’s information systems, collectively represent a significant deficiency in IRS’s internal control over financial reporting systems. Specifically, IRS did not correct control deficiencies we reported as of September 30, 2018, concerning (1) unnecessary access rights granted to accounts, (2) inconsistent monitoring of systems and accounts, (3) out-of-date and unsupported hardware and software, (4) change controls over tax and financial management processing on the mainframe, and (5) developing and implementing effective policies and procedures as part of IRS’s security management program. In addition, during this year’s audit, we found new control deficiencies in the following areas: (1) implementing automated financial controls of interfaces between key applications, (2) ensuring that authorized personnel reviewed key documents for external systems, (3) enforcing multifactor authentication, (4) enforcing adequate encryption to protect systems and data, or (5) ensuring that patches installed on systems were current to protect against known vulnerabilities. The potential effect of these continuing and new deficiencies on IRS’s financial reporting for fiscal year 2019 was mitigated primarily by IRS’s compensating management controls designed to detect potential misstatements on the financial statements. Nevertheless, these application and general control deficiencies increase the risk of unauthorized access to, modification of, or disclosure of sensitive financial and taxpayer data and disruption of critical operations, and are therefore important enough to merit the attention of those charged with governance of IRS. According to IRS management, IRS has developed a plan that focuses on strengthening its information system controls. Continued and consistent management commitment and attention will be essential to addressing existing financial reporting system deficiencies. U.S. generally accepted accounting principles issued by the Federal Accounting Standards Advisory Board (FASAB) require that the RSI be presented to supplement the financial statements. Although the RSI is not a part of the financial statements, FASAB considers this information to be an essential part of financial reporting for placing the financial statements in appropriate operational, economic, or historical context. We have applied certain limited procedures to the RSI in accordance with U.S. generally accepted government auditing standards, which consisted of inquiries of management about the methods of preparing the RSI and comparing the information for consistency with management’s responses to the auditor’s inquiries, the financial statements, and other knowledge we obtained during the audit of the financial statements, in order to report omissions or material departures from FASAB guidelines, if any, identified by these limited procedures. We did not audit and we do not express an opinion or provide any assurance on the RSI because the limited procedures we applied do not provide sufficient evidence to express an opinion or provide any assurance. IRS’s other information contains a wide range of information, some of which is not directly related to the financial statements. This information is presented for purposes of additional analysis and is not a required part of the financial statements or the RSI. We read the other information included with the financial statements in order to identify material inconsistencies, if any, with the audited financial statements. Our audit was conducted for the purpose of forming an opinion on IRS’s financial statements. We did not audit and do not express an opinion or provide any assurance on the other information. In connection with our audits of IRS’s financial statements, we tested compliance with selected provisions of applicable laws, regulations, contracts, and grant agreements consistent with our auditor’s responsibility discussed below. We caution that noncompliance may occur and not be detected by these tests. We performed our tests of compliance in accordance with U.S. generally accepted government auditing standards. IRS management is responsible for complying with laws, regulations, contracts, and grant agreements applicable to IRS. Our responsibility is to test compliance with selected provisions of laws, regulations, contracts, and grant agreements applicable to IRS that have a direct effect on the determination of material amounts and disclosures in IRS’s financial statements, and perform certain other limited procedures. Accordingly, we did not test compliance with all laws, regulations, contracts, and grant agreements applicable to IRS. Our tests for compliance with selected provisions of applicable laws, regulations, contracts, and grant agreements disclosed no instances of noncompliance for fiscal year 2019 that would be reportable under U.S. generally accepted government auditing standards. However, the objective of our tests was not to provide an opinion on compliance with laws, regulations, contracts, and grant agreements applicable to IRS. Accordingly, we do not express such an opinion. The purpose of this report is solely to describe the scope of our testing of compliance with selected provisions of applicable laws, regulations, contracts, and grant agreements and the results of that testing, and not to provide an opinion on compliance. This report is an integral part of an audit performed in accordance with U.S. generally accepted government auditing standards in considering compliance. Accordingly, this report on compliance with laws, regulations, contracts, and grant agreements is not suitable for any other purpose. In commenting on a draft of this report, IRS stated that it was pleased to receive an unmodified opinion on its financial statements. IRS also commented on its continued efforts to address its financial reporting systems control deficiencies and improve its internal controls in financial reporting of unpaid assessments. The complete text of IRS’s response is reproduced in appendix II.", "summary": "In accordance with the authority conferred by the Chief Financial Officers Act of 1990, as amended, GAO annually audits IRS's financial statements to determine whether (1) the financial statements are fairly presented and (2) IRS management maintained effective internal control over financial reporting. GAO also tests IRS's compliance with selected provisions of applicable laws, regulations, contracts, and grant agreements. IRS's tax collection activities are significant to overall federal receipts, and the effectiveness of its financial management is of substantial interest to Congress and the nation's taxpayers. In GAO's opinion, the Internal Revenue Service's (IRS) fiscal years 2019 and 2018 financial statements are fairly presented in all material respects, and although controls could be improved, IRS maintained, in all material respects, effective internal control over financial reporting as of September 30, 2019. GAO's tests of IRS's compliance with selected provisions of applicable laws, regulations, contracts, and grant agreements detected no reportable instances of noncompliance in fiscal year 2019. Limitations in the financial systems IRS uses to account for federal taxes receivable and other unpaid assessment balances, as well as other control deficiencies that led to errors in taxpayer accounts, continued to exist during fiscal year 2019.These control deficiencies affect IRS's ability to produce reliable financial statements without using significant compensating procedures. In addition, unresolved information system control deficiencies from prior audits, along with application and general control deficiencies that GAO identified in IRS's information systems in fiscal year 2019, placed IRS systems and financial and taxpayer data at risk of inappropriate and undetected use, modification, or disclosure. IRS continues to take steps to improve internal controls in these areas. However, the remaining deficiencies are significant enough to merit the attention of those charged with governance of IRS and therefore represent continuing significant deficiencies in internal control over financial reporting related to (1) unpaid assessments and (2) financial reporting systems. Continued management attention is essential to fully addressing these significant deficiencies. Based on prior financial statement audits, GAO made numerous recommendations to IRS to address internal control deficiencies. GAO will continue to monitor and will report separately on IRS's progress in implementing prior recommendations that remain open. Consistent with past practice, GAO will also be separately reporting on the new internal control deficiencies identified in this year's audit and providing IRS recommendations for corrective actions to address them. In commenting on a draft of this report, IRS stated that it continues its efforts to improve its financial reporting systems controls and internal controls over unpaid assessments.", "document_type": "gao"}
{"report": "Our nation’s critical infrastructure refers to the systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of them would have a debilitating impact on our security, economic stability, public health or safety, or any combination of these factors. Critical infrastructure includes, among other things, banking and financial institutions, telecommunications networks, and energy production and transmission facilities, most of which are owned and operated by the private sector. Threats to the systems supporting our nation’s critical infrastructures are evolving and growing. These systems are susceptible to unintentional and intentional threats, both cyber and physical. Unintentional, or nonadversarial, threat sources include equipment failures, software coding errors, or the accidental actions of employees. They also include natural disasters and the failure of other critical infrastructures, since the sectors are often interdependent. Intentional or adversarial threats can involve targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, and disgruntled employees. Adversaries can leverage common computer software programs to deliver a threat by embedding exploits within software files that can be activated when a user opens a file within its corresponding program. Due to the cyber-based threats to federal systems and critical infrastructure, the persistent nature of information security vulnerabilities, and the associated risks, GAO first designated federal information security as a government-wide high-risk area in our biennial report to Congress in 1997. In 2003, we expanded this high-risk area to include the protection of critical cyber infrastructure and, in 2015, we further expanded this area to include protecting the privacy of personally identifiable information. We continue to identify the protection of critical cyber infrastructure as a high-risk area, as shown in our March 2019 high- risk update. Because the private sector owns the majority of the nation’s critical infrastructure, it is vital that the public and private sectors work together to protect these assets and systems. Toward this end, federal law and policy assign roles and responsibilities for agencies to assist the private sector in protecting critical infrastructure, including enhancing cybersecurity. Presidential Policy Directive 21 establishes the SSAs in the public sector as the federal entities responsible for providing institutional knowledge and specialized expertise. The SSAs lead, facilitate, and support the security and resilience programs and associated activities of their designated critical infrastructure sectors. The directive identified 16 critical infrastructure sectors and designated the nine associated SSAs, as shown in figure 1. In addition, the directive required DHS to update the National Infrastructure Protection Plan to address the implementation of the directive. The directive called for the plan to include, among other things, the identification of a risk management framework to be used to strengthen the security and resilience of critical infrastructure and a metrics and analysis process to be used to measure the nation’s ability to manage and reduce risks to critical infrastructure. DHS, in response, updated the National Infrastructure Protection Plan in December 2013 in collaboration with public- and private-sector owners and operators and federal and nonfederal government representatives, including SSAs, from the critical infrastructure community. According to the 2013 plan, SSAs are to work with their private-sector counterparts to understand cyber risk and they are to develop and use metrics to evaluate the effectiveness of risk management efforts. To work with the government, the SCCs were formed as self-organized, self-governing councils that enable critical infrastructure owners and operators, their trade associations, and other industry representatives to interact on a wide range of sector-specific strategies, policies, and activities. The SSAs and the SCCs coordinate and collaborate in a voluntary fashion on issues pertaining to their respective critical infrastructure sector. In addition to the directive, federal laws and policies have also established roles and responsibilities for federal agencies to work with industry to enhance the cybersecurity of the nation’s critical infrastructures. These include the Cybersecurity Enhancement Act of 2014 and Executive Order 13636. In February 2013, Executive Order 13636 outlined an action plan for improving critical infrastructure cybersecurity. Among other things, the executive order directed NIST to lead the development of a flexible performance-based cybersecurity framework that was to include a set of standards, procedures, and processes. The executive order also directed SSAs, in consultation with DHS and other interested agencies, to coordinate with the SCCs to review the cybersecurity framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and operating environments. Further, in December 2014, the Cybersecurity Enhancement Act of 2014 established requirements that are consistent with the executive order regarding NIST’s development of a cybersecurity framework. According to this law, NIST’s responsibilities in supporting the ongoing development of the cybersecurity framework included, among other things, identifying an approach that is flexible, repeatable, performance-based, and cost- effective. Additionally, the Cybersecurity Act requires NIST to coordinate with federal and nonfederal entities (e.g., SSAs, SCCs, and ISACs) to identify a prioritized, performance-based approach to include information security measures to help entities assess risk. In May 2017, Executive Order 13800 directed federal agency heads to use the framework to manage cybersecurity risks. The executive order also required them to provide a risk management report to DHS and the Office of Management and Budget within 90 days of the date of the executive order. The risk management report calls for agencies to document the risk mitigation and acceptance choices including, for example, describing the agency’s action plan to implement the framework. In response to Executive Order 13636, NIST published, in February 2014, the Framework for Improving Critical Infrastructure Cybersecurity, a voluntary framework of cybersecurity standards and procedures for industry to adopt. According to NIST, as of February 2019, the framework had been downloaded more than a half million times since its initial publication in 2014. Additionally, it has been translated into Arabic, Japanese, Portuguese, and Spanish, and has been adopted by many foreign governments. The framework is composed of three main components: the framework core, the implementation tiers, and the profiles. The framework core provides a set of activities to achieve specific cybersecurity outcomes and references examples of guidance to achieve those outcomes. Through the use of the profile, the framework is intended to help organizations align their cybersecurity activities with business requirements, risk tolerances, and resources. The framework core is divided into four elements: functions, categories, subcategories, and informative references. Functions consist of five elements—(1) identify, (2) protect, (3) detect, (4) respond, and (5) recover. When considered together, these functions provide a strategic view of the life cycle of an organization’s management of cybersecurity risk. Categories are the subdivisions of a function into groups of cybersecurity outcomes tied to programmatic needs and particular activities (i.e. asset management). Subcategories further divide a category into specific outcomes of technical and/or management activities (i.e. notifications from detection systems are investigated). Lastly, informative references are specific sections of standards, guidelines, and practices that illustrate a method to achieve the outcomes described and support one or more informative references (i.e. NIST Special Publication (SP) 800-53A). Implementation tiers characterize an organization’s approach to managing cybersecurity risks over a range of four tiers. The four tiers are partial, risk informed, repeatable, and adaptive. They reflect a progression from informal, reactive responses to approaches that are flexible and risk- informed. Profiles enable organizations to establish a road map for reducing cybersecurity risks that is well aligned with organizational and sector goals, consider legal/regulatory requirements and industry best practices, and reflect risk management priorities. Organizations can use the framework profiles to describe the current state (the cybersecurity outcomes that are currently being achieved) or the desired target state (the outcomes needed to achieve the desired cybersecurity risk management goals) of specific cybersecurity activities. In December 2015, we issued our first report on the development and promotion of the framework in response to the 2014 Cybersecurity Act. We reported that the framework met the requirements established in federal law that it be flexible, repeatable, performance-based, and cost- effective. We also reported that SSAs and NIST had promoted and supported adoption of the cybersecurity framework in the critical infrastructure sectors. For example, we reported that DHS had established the Critical Infrastructure Cyber Community Voluntary Program to encourage adoption of the framework and had undertaken multiple efforts as part of this program. These efforts included developing guidance and tools intended to help sector entities that use the framework. However, we noted that DHS had not developed metrics to measure the success of its activities and programs. Accordingly, we concluded that DHS could not determine if its efforts were effective in encouraging adoption of the framework. We recommended that the department develop metrics to assess the effectiveness of its framework promotion efforts. DHS agreed with the recommendation and subsequently took actions to implement it. We also reported in December 2015 that SSAs had promoted the framework in their sectors by, for example, presenting the framework at meetings of sector stakeholders and holding other promotional events. In addition, all of the SSAs, except for DHS and the General Services Administration (GSA), as co-SSAs for the government facilities sector, made decisions, as required by Executive Order 13636, on whether to develop tailored framework implementation guidance for their sectors. However, we noted that DHS and GSA had not set a time frame to determine, as required by Executive Order 13636, whether sector-specific implementation guidance was needed for the government facilities sector. We concluded that, by not doing so, DHS and GSA could be hindering the adoption of the framework in this sector. As a result, we recommended that DHS and GSA set a time frame to determine whether implementation guidance was needed for the government facilities sector. Both DHS and GSA agreed with our recommendations and subsequently took actions to implement them. More recently, in February 2018, we issued our second report on the adoption of the framework. We reported that most of the 16 critical infrastructure sectors had taken action to facilitate adoption of the framework by entities within their sectors. We also reported that 12 of the 16 critical infrastructure sectors had taken actions to review the framework and, if necessary, develop implementation guidance or supplemental materials that addressed how entities within their respective sectors can adopt the framework. We also reported that none of the SSAs had measured the cybersecurity framework’s implementation by entities within their 16 respective sectors. We noted that the nation’s plan for national critical infrastructure protection efforts stated that federal and nonfederal sector partners (including SSAs) were to measure the effectiveness of risk management goals by identifying high-level outcomes and progress made toward national goals and priorities, including securing critical infrastructure against cyber threats. However, we reported that none of the 16 coordinating councils reported having qualitative or quantitative measures of framework adoption because they generally did not collect specific information from entities about critical infrastructure protection activities. As of November 2019, most of the SSAs had not developed methods to determine their level and type of cybersecurity framework adoption, as we previously recommended. The SSAs and SCCs identified a number of impediments to developing a comprehensive understanding of the use of the framework, including the voluntary nature of the framework. However, most SSAs have taken steps to encourage and facilitate use of the framework. Further, the 12 selected organizations we interviewed reported either fully or partially using the cybersecurity framework. Best practices identified in the National Infrastructure Protection Plan recommend that entities, such as SSAs and SCCs, take steps to evaluate progress toward achieving their goals—in this case, to implement or adopt the cybersecurity framework. As we previously reported, until the SSAs had a more comprehensive understanding of the use of the cybersecurity framework by entities within the critical infrastructure sectors, they would be limited in their ability to understand the success of protection efforts or to determine where to focus limited resources for cyber risk mitigation. As a result, we recommended that the SSAs take steps to consult with respective sector partner(s), such as the SCCs, DHS, and NIST, as appropriate, to develop methods for determining the level and type of framework adoption by the entities across their respective sectors. However, as of November 2019, most of the SSAs had not developed methods to determine the level and type of framework adoption. Specifically, only two of the nine SSAs—the Department of Defense (DOD) in collaboration with the defense industrial base sector and GSA in conjunction with DHS’s Federal Protective Service—had methods to determine the level and type of framework adoption across their respective sectors. DOD, in coordination with the defense industrial base sector, had developed a process to monitor the level or extent to which all contracts (not including commercial off-the-shelf contracts) were or were not adhering to the cybersecurity requirements in DOD acquisition regulations. The regulations called for organizations to implement the security requirements in NIST SP 800-171, which is mapped to the functional areas of the cybersecurity framework. By doing so, DOD is able to determine the level at which the sector organizations are implementing the framework and the type of framework adoption through mapping to the functional areas. Additionally, the federal departments and agencies that form the government facilities sector had submitted their risk management reports to DHS and OMB that described agencies’ action plans to implement the framework, as required under Executive Order 13800. The risk management assessments are included as part of OMB’s FISMA Annual Report to Congress. As a result, the reports could be used as a resource to inform the level and type of framework adoption. In addition, two other SSAs had begun taking steps to develop methods to determine the level and type of framework adoption in their sectors. Specifically, in October 2019, DHS, in coordination with its information technology (IT) sector partner, administered a survey to all small and midsized IT sector organizations to gather information on, among other things, framework use and plans to report on the results in 2020. Further, officials in the Department of Transportation’s (DOT) Office of Intelligence, Security, and Emergency Response, in coordination with its co-SSA (DHS), told us that they planned to develop and distribute a survey to the transportation systems sector to determine the level and type of framework adoption. DOT officials stated that the draft survey was undergoing DHS legal review and that the completion of the review and subsequent OMB review would determine when the survey is approved for distribution. The remaining five SSAs did not have efforts underway to determine the level and type of framework adoption: Department of Agriculture, Department of Energy, Department of Health and Human Services (HHS), Environmental Protection Agency (EPA), and Department of the Treasury. These SSAs identified impediments to determining framework adoption but also noted steps taken to encourage use of the framework within their respective sector. Department of Agriculture’s Office of Homeland Security officials stated that their sector is diverse and includes over 500 sector members that can range from small farms that are family operated to large corporations that deal with selling food wholesale. The officials noted that the diversity makes it difficult to develop a method for determining the level and type of framework adoption across the sector that would apply to all their members. The framework, however, is adaptive to provide a flexible and risk- based implementation. Accordingly, the framework can be used with a broad array of cybersecurity risk management processes. Agriculture officials added that the SCC frequently invites DHS to semi-annual meetings to present on both the threat to cybersecurity and resources available to support the needs of the sector. Department of Energy’s Office of Cybersecurity, Energy Security, and Emergency Response officials stated that the voluntary nature of the framework made it difficult to determine the level and type of framework adoption. However, the department published the Cybersecurity Capability Maturity Model in May 2012, with the most recent update (version 1.1) published in February 2014. The model focused on the implementation and management of cybersecurity practices, and was intended to be descriptive, rather than prescriptive, guidance that could be used by organizations of various types and sizes to strengthen their cybersecurity capabilities. The model was designed for organizations to use with a self-evaluation methodology and toolkit to measure and improve their cybersecurity programs and serve as an example for how to implement the framework. In February 2020, officials stated that they were in the process of updating the model and will update the framework implementation guidance once the model has been updated. HHS’s Assistant Secretary for Preparedness and Response (ASPR) officials stated that, since the use of the framework by the private sector is voluntary, organizations were free to choose any cybersecurity framework(s) that they believed to be most effective for their particular environment. However, HHS, in collaboration with NIST, DHS, and the Joint Healthcare and Public Health Cybersecurity Working Group, released a cybersecurity publication (Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients) that contained 10 best practices in December 2018 for the healthcare and public health services sector based on the framework. This publication allowed stakeholders to identify how to use the framework with existing sector resources by raising awareness and providing vetted cybersecurity practices to enable the organizations to mitigate cybersecurity threats to the sector. In addition, officials from HHS’s ASPR stated that the working group discussed the challenges associated with measuring the use and impact of the NIST framework, and approved the establishment of a task group in 2020 to further investigate the issue. ASPR officials added that some of the ideas discussed included the use of surveys and identification of a set of voluntary reporting indicators. EPA officials told us that the agency will coordinate with its SCC to identify appropriate means to collect and report information, such as a survey, to determine the level and type of framework adoption. They explained that, in the past, the water sector had expressed concerns with sharing sensitive cybersecurity information and in developing metrics to evaluate cybersecurity practices. However, EPA officials stated that they have conducted training, webcasts, and outreach related to cybersecurity, including using the framework and tailoring its efforts to sector needs. According to EPA officials, the agency’s goal in doing so was to ensure that sector organizations understood the importance of the framework. Department of the Treasury officials noted the size of the financial services sector as an impediment to determine framework adoption. Specifically, officials stated that, because of the large number of members, it is difficult to survey all 800,000 organizations to determine framework adoption. However, officials stated that the department, in coordination with the Financial and Banking Information Infrastructure Committee, and in consultation with NIST, developed the Cybersecurity Lexicon in March 2018. The lexicon addressed, among other things, common terminology for cyber terms used in the framework. Additionally, the financial services sector, in consultation with NIST, created the Financial Services Sector Cybersecurity Profile (profile) in October 2018, which mapped the framework core to existing regulations and guidance, such as the Commodity Futures Trading Commission System Safeguards Testing Requirements. Officials stated that these efforts will facilitate the use of the framework. While the five SSAs have ongoing initiatives, implementing our recommendations to gain a more comprehensive understanding of the framework’s use by critical infrastructure sectors is essential to the success of protection efforts. Executive Order 13636 directs SSAs, in consultation with DHS and other agencies, to review the cybersecurity framework and, if necessary, develop implementation guidance or supplemental materials to address sector-specific risks and facilitate framework use. Most of the SSAs developed guidance to encourage and facilitate use of the framework. Specifically, SSAs for 13 of the 16 sectors had developed implementation guidance that included mapping the existing sector cybersecurity tools, standards, and approaches to the framework. For example, the implementation guidance for the healthcare and public health sector provides instruction on how to align a host of existing voluntary or required standards (such as those promulgated pursuant to the Health Insurance Portability and Accountability Act of 1996), guidelines, and practices to the framework core functions. Table 1 describes the 13 sectors and the associated cybersecurity framework implementation guidance. The Cybersecurity Capability Maturity Model helps organizations evaluate and potentially improve their cybersecurity practices. Appendix A of the Energy Sector Cybersecurity Framework Implementation Guidance provides a mapping of the model to the framework. The Financial Services Sector Cybersecurity Profile was created for financial institutions of all sizes to use for cyber risk management assessment and a mechanism to comply with various regulatory frameworks and the NIST Cybersecurity Framework. The remaining three sectors (government facilities, food and agriculture, and IT) had not developed implementation guidance. In this regard, DHS’s Federal Protective Service officials stated that, in 2015, the co- SSAs of the government facilities sector (DHS and GSA) decided that implementation guidance was not needed based on a consensus within the government facilities sector. DHS’s Federal Protective Service officials added that this decision was reevaluated in 2017 and they determined that the guide was still not needed. Department of Agriculture officials from the Office of Homeland Security stated that the co-SSAs (Agriculture and HHS) and the SCC for the sector collectively decided that a single implementation guidance document was not sufficient for addressing the needs of the diverse membership of the food and agriculture sector and that the creation of such a document was a low priority for the sector. These officials added that, due to the complexity of operations and large number of entities within the sector, the coordinating councils determined that it was more appropriate to refer sector members to DHS's Critical Infrastructure Cyber Community Voluntary Program. DHS officials representing the SSA for the IT sector stated that the SSA and SCC jointly determined that creating formal implementation guidance within the sector was not necessary. They added that the IT sector continued to play an active role by participating in framework development and promotion across the sectors, to include the development of a small and midsize business cybersecurity survey that was issued in 2019. In addition to the above efforts, NIST officials stated that they took steps to encourage framework adoption through three main mechanisms for federal and nonfederal entities and organizations that were interested in the framework: (1) conferences and speaking engagements, (2) requests for information to solicit ways in which organizations are using the framework to improve cybersecurity risk management and how best practices are being shared, and (3) industry and agency events, such as webcasts. The 12 selected organizations reported either fully or partially using the cybersecurity framework. Specifically, six organizations reported fully using the framework, whereas six others reported partially using the framework. For example, one organization that reported fully using the framework stated that the framework core, profiles, and tiers were implemented across all the components or business units in the organization. In contrast, one organization that reported partially using the framework stated that it used the framework profiles, but did not fully use the framework core and tiers. Two other of the organizations that reported partially using the framework stated that they considered themselves to be using the framework since they use International Organization for Standardization (ISO) 27001, an international standard that has elements that overlap with those in the framework. The 12 selected organizations using the framework reported varying levels of improvements. Such improvements included identifying risks and implementing common standards and guidelines. However, the SSAs have not collected and reported sector-wide improvements as a result of framework use. The SSAs, SCCs, ISACs, and the selected organizations identified impediments to collecting and reporting such improvements, including developing precise measurements of improvement, the voluntary nature of the framework, and lack of a centralized information sharing mechanism. NIST and DHS have identified initiatives to help address these impediments. The 12 selected organizations reported varying levels of improvements as a result of using the framework. Specifically, four of the 12 reported great improvement, six reported some improvement, and two reported little improvement. Examples of each category are described below: Great improvement: One organization stated that the framework allowed it to determine the current state (the cybersecurity outcomes that are currently being achieved) and the desired target state (the outcomes needed to achieve the desired cybersecurity risk management goals). The organization stated that identifying the current and target states enabled the organization to identify risks and implement common policies, standards, and guidelines across their organization. Officials of the organization also stated that the common language provided by the framework made it easier to communicate within the organization when discussing budgets for cybersecurity that resulted in budget increases. Some improvement: One organization explained that the framework is accepted across organizations and that modeling its capabilities against the framework provided assurance that it covered the critical aspects of security. However, the organization noted that, if the framework did not exist, it would have used another framework to protect its critical infrastructure and facilitate decision making. Little improvement: One organization noted that it already had a very robust risk management process through the use of international standards before using the framework. As a result, the organization stated that use of the framework resulted in little improvements. Another organization that reported little improvements stated that use of the framework helped the organization, but there were no specific improvements that it could identify in protecting its critical infrastructure as a result of using the framework. NIST Special Publication 800-55 guidance on performance measurement states that agency heads are responsible for actively demonstrating support for developing information security measures and facilitating performance improvements in their information security programs, which is to include a periodic analysis of data to determine lessons learned. Additionally, the National Infrastructure Protection Plan directed SSAs and their federal and nonfederal sector partners (including SCCs) to measure the effectiveness of risk management goals by identifying high- level outcomes to facilitate the evaluation of progress toward national goals and priorities, including securing critical infrastructure from cybersecurity threats. The SSAs are not collecting and reporting on improvements in the protection of critical infrastructure as a result of using the framework across the sectors. The SSAs, SCCs, ISACs, and organizations reported a number of impediments to identifying sector-wide improvements, including developing precise measurements of improvement, the voluntary nature of the framework, difficulty in measuring the direct impact of using the framework, lack of use cases, and lack of a centralized information sharing mechanism. Figure 2 depicts the number of entities and organizations that identified these five impediments, and is followed by a discussion of each challenge. Two SCCs, two ISACs, and two organizations identified the difficulty of having precise measurements of improvements as a result of using the framework. SCC officials from the communications and healthcare and public health sectors stated that authoritative and precise measurements of improvements are difficult to determine in a consistent and non-subjective manner. For example, the SCC officials for the healthcare and public health sector stated that they were not aware of a direct or precise form of sector-wide measurements to define success in mitigating cybersecurity risk using the framework within the sector. These officials added that future efforts could include methodologies to track sector-wide improvements based on the framework structure or other cybersecurity guidance. However, officials from NIST’s Information Technology Laboratory stated that they were in the early stages of initiating an information security measurement program to facilitate identifying improvements sector-wide. Officials stated that the program aims to provide foundation tools and guidance to support the development of information security measures that are aligned with an individual organization’s objectives. The officials stated that they had not established a time frame for the completion of the measurement program. They added that, once the program is developed, the SSAs are expected to be able to customize the program and work with their respective sector organizations to determine sector-wide improvements based on their unique objectives. Eight SSAs, two SCCs, and four organizations stated that the voluntary nature of using the framework made it difficult to identify sector-wide improvements. Officials stated that private sector framework adoption was voluntary and, therefore, there were no specific reporting requirements to provide information on improvements. For example, DOT officials from the Office of Intelligence, Security, and Emergency Response stated that, while the department and its co-SSA (DHS) intended to develop a survey to determine sector-wide improvements, consolidating voluntarily shared information will not reflect the depth and breadth of sector stakeholders, as organizations that share information will not collectively represent a sector. In April 2019, NIST issued the NIST Roadmap for Improving Critical Infrastructure Cybersecurity, version 1.1, which included a self- assessment tool that provided a mechanism for individual organizations to self-assess how effectively they manage cybersecurity risks in the context of broader enterprise risk management activities and identify improvement opportunities. In addition to the road map, NIST’s framework included a section that encouraged organizations to incorporate measurements of their risks, which can be used to identify sector-wide improvements related to using the framework. In addition, as previously mentioned, DHS, in partnership with its IT sector partners, administered a survey to the small and mid-sized IT sector organizations to gather information on, among other things, framework adoption, challenges, and related improvements. While DHS did not plan to report on the results until 2020, the survey was intended to help the department in identifying improvements across the small and mid-sized IT sector organizations. The survey was administered to the small and mid-sized organizations within the IT sector. DHS officials stated that any small or mid-sized business across all critical infrastructure sectors could complete the survey and that the department had promoted the survey to all sectors. Moreover, among all 16 sectors, only DOT and its co-SSA (DHS) had considered the applicability of a similar approach for their sector organizations. Specifically, DOT, in conjunction with DHS, plans to distribute a survey intended to cover framework adoption, challenges, and related improvements across the sector. DOT officials stated that the survey completion is contingent upon DHS’s Transportation Security Administration’s coordination of the review and approval process to meet Paperwork Reduction Act compliance requirements. Three SSAs, four SCCs, one ISAC, and seven organizations stated that identifying sector-wide improvements as a result of using the framework was difficult due to organizations struggling with determining the direct impact from framework use. For example, the Department of Energy officials from the Office of Cybersecurity, Energy Security, and Emergency Response stated that the sector cannot relate improvements to any one framework or model because the sector organizations are engaged in numerous concurrent public and private cybersecurity initiatives, each of which could impact cybersecurity to varying degrees. In addition, EPA officials from the Office of Groundwater and Drinking Water stated that most organizations will not be able to link improvements directly to the framework because EPA does not exclusively incorporate the framework into the agency’s sector guidance. The officials added that existing industry standards and best practices are also recognized in the development of EPA cybersecurity guidance. Therefore, although an organization might experience improvements from using elements of the framework, it might not be readily apparent that those improvements came directly from the framework. To provide the sector organizations with access to various framework resources, NIST updated its website to include sector-specific implementation guidance and case studies, as well as insights from organizations using the framework. Five organizations identified the lack of use cases as an impediment to determining improvements. For example, one organization stated that small and medium organizations struggled with identifying improvements from using the framework because of the lack of use cases (examples for how to determine or measure improvements as a result of using the framework). To address the challenge, the organization stated that it would be helpful if NIST, in collaboration with federal and nonfederal entities, would share and provide use cases or direction on common scenarios small and medium organizations faced and how these could be addressed through the framework. NIST officials stated that they were in the early stages of developing a cybersecurity framework starter profile for small organizations. NIST officials stated that they did not have a time frame for completing the profile. However, they added that the profile will aim to identify common solutions to a specific challenge, such as threat surface or cybersecurity challenges in cloud computing, using a customized adaptation of the framework. In addition, DHS created a small and midsize business road map for all critical infrastructure sectors in 2018. The road map provided a guide for small and mid-sized businesses to use in enhancing their cybersecurity posture. The road map also included DHS’s cybersecurity information sharing and collaboration program and secure information sharing portal. The purpose of the information sharing and collaboration program was to enable actionable, relevant, and timely unclassified information exchange through trusted public- private partnerships across all critical infrastructure sectors. In addition, the secure information sharing portal served as a forum to share cybersecurity strategies and insights with the critical infrastructure sectors. Five organizations identified the lack of a centralized information sharing mechanism as an impediment. For example, one organization stated that there is a challenge in sharing information among all critical infrastructure sectors in a more open and non-judgmental way. To address this challenge, the organization stated that it would be helpful to establish a centralized information sharing mechanism to share and exchange information in an anonymous manner. Another organization added that the challenge with determining improvements is that there is no centralized information sharing mechanism to obtain information. The organization added that it would be helpful to see how organizations compare with one another in terms of goals through this type of mechanism. DHS, however, identified its homeland security information network as a tool that was intended to be the primary system used by entities to collaborate to protect critical infrastructure. Officials in DHS’s Stakeholder Engagement and Cyber Infrastructure Resilience division stated that the information in its homeland security information network could be used by all sectors to report on best practices, including sector-wide improvements and lessons learned from using the framework. Although NIST and DHS have identified initiatives to help address the impediments, the SSAs have not reported on sector-wide improvements. Until they do so, the extent to which the 16 critical infrastructure sectors are better protecting their critical infrastructures from threats will be largely unknown. Most of the SSAs have not determined the level and type of framework adoption, as we previously recommended. Most of the sectors, however, had efforts underway to encourage and facilitate use of the framework. Even with this progress, implementation of our recommendations is essential to the success of protection efforts. While selected organizations reported varying levels of improvements, the SSAs have not collected and reported sector-wide improvements as a result of framework use. The SSAs and organizations identified impediments to collecting and reporting sector-wide improvements, including the lack of precise measurements of improvement, voluntary nature of the framework, and lack of a centralized information sharing mechanism. However, NIST and DHS have initiatives to help address these impediments. These included an information security measurement program, cybersecurity framework starter profile, information sharing programs, self-assessment tools, and surveys to support SSAs in measuring and quantifying improvements in the protection of critical infrastructure as a result of using the framework. However, NIST has yet to establish time frames for completing the information security measurement program and starter profile. Moreover, the SSAs have yet to report on sector-wide improvements using the initiatives. Until they do so, the critical infrastructure sectors may not fully understand the value of the framework to better protect their critical infrastructures from cyber threats. We are making the following 10 recommendations to NIST and the nine sector-specific agencies. The Director of NIST should establish time frames for completing NIST’s initiatives, to include the information security measurement program and the cybersecurity framework starter profile, to enable the identification of sector-wide improvements from using the framework in the protection of critical infrastructure from cyber threats. (Recommendation 1) The Secretary of Agriculture, in coordination with the Secretary of Health and Human Services, should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 2) The Secretary of Defense should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 3) The Secretary of Energy should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 4) The Administrator of the Environmental Protection Agency should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 5) The Administrator of the General Services Administration, in coordination with the Secretary of Homeland Security, should take steps to consult with respective sector partner(s), such as the Coordinating Council and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 6) The Secretary of Health and Human Services, in coordination with the Secretary of Agriculture, should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 7) The Secretary of Homeland Security should take steps to consult with respective sector partner(s), such as the SCC and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sectors using existing initiatives. (Recommendation 8) The Secretary of Transportation, in coordination with the Secretary of Homeland Security, should take steps to consult with respective sector partner(s) such as the SCC and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 9) The Secretary of the Treasury should take steps to consult with respective sector partner(s), such as the SCC, DHS, and NIST, as appropriate, to collect and report sector-wide improvements from use of the framework across its critical infrastructure sector using existing initiatives. (Recommendation 10) We received comments on a draft of this report from the ten agencies to which we made recommendations—the Departments of Agriculture, Commerce, Defense, Energy, Health and Human Services, Homeland Security, Transportation, and the Treasury; and the Environmental Protection Agency and the General Services Administration. Among these agencies, eight agreed with the recommendations, one neither agreed nor disagreed with the recommendation, and one partially agreed with the recommendation. In written comments, the Department of Agriculture generally concurred with the recommendation in our report. The department’s comments are reprinted in appendix II. In written comments, the Department of Commerce concurred with the recommendation in our report. The department stated that the National Institute of Standards and Technology expects to document its cybersecurity measurement program scope, objectives, and approach by about June 2020 and publish two cybersecurity starter profiles by about September 2020. The department’s comments are reprinted in appendix III. In written comments, the Department of Defense concurred with the recommendation in our report and described ongoing steps to evaluate defense organizations’ cybersecurity maturity levels. The department’s comments are reprinted in appendix IV. In written comments, the Department of Energy partially concurred with the recommendation in our report. The department stated that it will coordinate with the energy sector to develop an understanding of sector- wide improvements from use of the framework. The department, however, stated that implementing our recommendation as written prescribes the SCC as a forum for coordination regarding the framework. Our recommendation is not intended to be prescriptive, but rather, to provide suggestions for consideration. Thus, we have revised the wording of the recommendation to emphasize coordination with other entities, as appropriate. The department also stated that the recommendation implies that improvements from the use of the framework could accurately be attributed to a single initiative, which may be misleading. We do not agree. Our report identifies the challenge of determining the direct impact from framework use and notes that NIST’s website provides the sector organizations with access to various framework resources, to include sector-specific implementation guidance and case studies, as well as insights from organizations using the framework. Hence, organizations can report on improvements from use of the framework using multiple initiatives. Further, the department stated that suggesting government collection and reporting of information regarding adoption or improvements erodes the voluntary character of the framework. We do not agree with this statement. Our report recognizes the voluntary character of the framework but also notes that, without collecting and reporting such information, critical infrastructure sectors may not fully understand the benefits and value of the framework to better protect their critical infrastructures from cyber threats. The department’s comments are reprinted in appendix V. In written comments, the Department of Health and Human Services concurred with the recommendation in our report and stated that it would work with the appropriate entities to refine and communicate best practices to the sector. The department’s comments are reprinted in appendix VI. In written comments, the Department of Homeland Security concurred with the recommendation in our report. The department stated that, once it receives the results of the survey on framework adoption that it sent to small- and mid-sized IT sector partners, it will determine the feasibility of issuing similar surveys to other sectors. The department’s comments are reprinted in appendix VII. In written comments, the Department of the Treasury neither agreed nor disagreed with the recommendation in our report. The department stated that it will assess using the identified initiatives and their viability for collecting and reporting sector-wide improvements from use of the framework with input from the SCC and financial regulators. The department added, however, that it does not have the authority to compel financial institutions to respond to inquiries regarding the sector’s use of the framework or resulting improvements. We acknowledge the lack of authority but believe that implementing the recommendation to gain a more comprehensive understanding of the framework’s use by the critical infrastructure sector is essential to the success of protection efforts. The department’s comments are reprinted in appendix VIII. In written comments, the Environmental Protection Agency concurred with the recommendation in our report. The agency stated that it will coordinate with its SCC to investigate options to collect and report sector- wide improvements from use of the cybersecurity framework that are consistent with statutory requirements and the sector's willingness to participate. The agency’s comments are reprinted in appendix IX. In written comments, the General Services Administration concurred with the recommendation in our report and stated that it is working with the Department of Homeland Security to develop a plan to address the recommendation. The agency’s comments are reprinted in appendix X. In comments sent via e-mail, the Department of Transportation’s Director of Audit Relations and Program Improvement stated that the department concurred with the recommendation in our report. In addition to the aforementioned comments, we received technical comments from officials of the Departments of Agriculture, Energy, Health and Human Services, Homeland Security, Transportation, and Treasury. We also received technical comments on the report from the Environmental Protection Agency and General Services Administration. We incorporated the technical comments in the report, where appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Agriculture, Commerce, Defense, Energy, Health and Human Services, Homeland Security, Transportation, and Treasury; the Administrators of the Environmental Protection Agency and General Services Administration; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6240 or at dsouzav@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XI. Our objectives were to determine the extent to which (1) agencies with lead roles in critical infrastructure protection efforts, referred to as sector- specific agencies (SSAs), have determined the level and type of National Institute of Standards and Technology Cybersecurity Framework (framework) adoption and (2) implementation of the framework has led to improvements to the protection of critical infrastructure from cyber threats. To address the first objective, we analyzed documentation and evidence, such as implementation guidance and survey instruments that discussed actions federal and nonfederal entities have taken since our report in 2018 to develop methods to determine the level and type of adoption across their sectors, as we previously recommended. These entities included nine SSAs,13 out of the 16 Sector Coordinating Councils (SCC) representing all 16 critical infrastructure sectors established in federal policy, the National Institute of Standards and Technology (NIST), and Information Sharing and Analysis Centers (ISAC). We also analyzed documentation from the SSAs and SCCs, such as the Department of Energy’s Cybersecurity Capability Maturity Model and the Department of the Treasury’s Financial Services Sector Cybersecurity Profile. We compared these to best practices, such as the National Infrastructure Protection Plan and the Standards for Internal Control in the Federal Government to determine efforts to facilitate framework adoption across the sectors. We supplemented our review by interviewing officials from these entities to determine any actions taken to determine framework adoption. In addition, we selected six critical infrastructure sectors identified in the 2018 National Cyber Strategy of the United States of America as having critical infrastructure with the greatest risk of being compromised. The six sectors were (1) communications, (2) financial services, (3) energy, (4) healthcare and public health, (5) information technology, and (6) transportation systems. We asked SCCs, trade associations (e.g., the American Petroleum Institute), and ISACs to provide a list of organizations that were users of the framework. We divided up the list of identified organizations by sector, and we randomly selected one large and one small or medium organization from each sector, resulting in a final list of 12 organizations. We then conducted semi-structured interviews with officials from the selected organizations to understand the extent to which these organizations were using the framework. To address the second objective, we collected and reviewed documentation from NIST and the federal and nonfederal entities, such as NIST’s framework and its April 2019 Roadmap for Improving Critical Infrastructure Cybersecurity, the Department of Homeland Security’s Information Technology Sector Small and Midsize Business Cybersecurity Survey and 2018 Cybersecurity Resources Road Map, and other SSA efforts to determine ongoing efforts to enable the identification and measurement of improvements as a result of using the framework. We compared these efforts to the 2014 Cybersecurity Act and best practices, such as NIST Special Publication 800-55 on performance- based measures to determine the measures the SSAs and SCCs had taken to determine improvements from using the framework. In addition, we interviewed officials from the selected organizations to understand the extent to which they realized improvements as a result of framework adoption and the support the organizations received from federal and nonfederal entities. We also interviewed officials from other federal and nonfederal entities, to include NIST, nine SSAs, 13 of the 16 SCCs, and six ISACs on efforts to measure improvements from use of the framework, and any related challenges. We conducted this performance audit from January 2019 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Neelaxi Lakhmani (assistant director), Kendrick M. Johnson (analyst in charge), Christopher Businsky, Nancy Glover, Douglas Harris, Ceara Lance, Edward Malone, Gabriel Nelson, Harold Podell, and Dana Pon made key contributions to this report.", "summary": "Cyber threats to the nation's critical infrastructure (e.g., financial services and energy sectors) continue to increase and represent a significant national security challenge. To better address such threats, NIST developed, as called for by federal law, a voluntary framework of cybersecurity standards and procedures. The Cybersecurity Enhancement Act of 2014 included provisions for GAO to review aspects of the framework. The objectives of this review were to determine the extent to which (1) SSAs have developed methods to determine framework adoption and (2) implementation of the framework has led to improvements in the protection of critical infrastructure from cyber threats. GAO analyzed documentation, such as implementation guidance, plans, and survey instruments. GAO also conducted semi-structured interviews with 12 organizations, representing six infrastructure sectors, to understand the level of framework use and related improvements and challenges. GAO also interviewed agency and private sector officials. Most of the nine agencies with a lead role in protecting the 16 critical infrastructure sectors, as established by federal policy and referred to as sector-specific agencies (SSAs), have not developed methods to determine the level and type of adoption of the National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity (framework), as GAO previously recommended. Specifically, two of the nine SSAs had developed methods and two others had begun taking steps to do so. The remaining five SSAs did not yet have methods to determine framework adoption. Most of the sectors (13 of 16), however, noted that they had taken steps to encourage and facilitate use of the framework, such as developing implementation guidance that links existing sector cybersecurity tools, standards, and approaches to the framework. In addition, all of the 12 selected organizations that GAO interviewed described either fully or partially using the framework. Nevertheless, implementing GAO's recommendations to the SSAs to determine the level and type of adoption remains essential to the success of protection efforts. The 12 selected organizations using the framework reported varying levels of resulting improvements. Such improvements included identifying risks and implementing common standards and guidelines. However, the SSAs have not collected and reported sector-wide improvements. The SSAs and organizations identified impediments to doing so, including the (1) lack of precise measurements of improvement, (2) lack of a centralized information sharing mechanism, and (3) voluntary nature of the framework. NIST and the Department of Homeland Security (DHS) have initiatives to help address these impediments. Precise measurements: NIST is in the process of developing an information security measurement program that aims to provide the tools and guidance to support the development of information security measures that are aligned with an individual organization's objectives. However, NIST has not established a time frame for the completion of the measurement program. Centralized sharing: DHS identified its homeland security information network as a tool that was intended to be the primary system that could be used by all sectors to report on best practices, including sector-wide improvements and lessons learned from using the framework. Voluntary nature: In April 2019, NIST issued its NIST Roadmap for Improving Critical Infrastructure Cybersecurity , version 1.1, which included a tool for organizations to self-assess how effectively they manage cybersecurity risks and identify improvement opportunities. While these initiatives are encouraging, the SSAs have not yet reported on sector-wide improvements. Until they do so, the extent to which the 16 critical infrastructure sectors are better protecting their critical infrastructures from threats will be largely unknown. GAO is making ten recommendations—one to NIST on establishing time frames for completing selected programs—and nine to the SSAs to collect and report on improvements gained from using the framework. Eight agencies agreed with the recommendations, while one neither agreed nor disagreed and one partially agreed. GAO continues to believe that all ten recommendations are warranted.", "document_type": "gao"}
{"report": "Wildfires play an important ecological role on the nation’s landscapes but various management practices over the past century—including fire suppression, timber harvesting, and grazing—have altered the normal frequency of fires in many forest and grassland ecosystems and have reduced these ecosystems’ resilience to wildland fire. This history of fire exclusion and changes in forest management have resulted in a buildup of surface fuels—burnable material found on or near the ground—and the overstocking of some forests with trees and other fuels. In addition, the reduced frequency of wildfire in some ecosystems has resulted in increased amounts of vegetative debris (e.g., dead trees, branches, leaves, and grasses) accumulating on the ground, which serves to increase fuel quantities and can create more continuous fuels. When this occurs, surface fires—fires that occur on the ground—may ignite more quickly and burn with greater intensity, causing fires to spread more rapidly and extensively than they may have in the past. The arrangement of living vegetation also affects the way wildfires burn. For example, an increase in the density of small trees creates a layered forest structure with fuels going from the forest floor into the forest’s canopy. These layers are sometimes referred to as ladder fuels. This arrangement may allow fire that previously would have remained on the ground to climb the ladder fuels and spread into the trees’ crowns, becoming a high-intensity crown fire. In addition, reducing the frequency of fire in fire-adapted forests and other ecosystems can result in changes to the plant species that make up the forest or ecosystem, which may cause the vegetative composition to shift toward species that are not well adapted to fire, including non-native invasive species. For example, many areas with sagebrush ecosystems—that historically had fires only once every few decades—have been invaded by cheatgrass that when dried creates large swaths of fuels that increase rates of fire spread, intensity, and frequency. Approximately 70,000 communities nationwide are considered to be at risk from wildfire, according to the National Association of State Foresters, Communities at Risk, Fiscal Year 2018 Report. Communities face different levels of risk from wildfires depending on such factors as the flammability of vegetation in and around the community, the flammability of materials used in constructing structures, and the location of the structures in relation to vegetation. Structures not located immediately adjacent to wildland vegetation can also be vulnerable to wildfire because winds can transport flaming embers that can ignite homes more than a mile away from a wildfire. In addition to residential housing, other valuable assets and infrastructure that support communities may be located in the WUI, including power lines; highways; and natural resources that provide economic benefits, such as timber, oil and gas wells, and recreational areas. According to the Cohesive Strategy, reducing fuels can help reduce a wildland fire’s intensity, which in turn can help lower the risk fires pose to communities, structures, and other valuable assets and infrastructure. The Forest Service, BLM, FWS, and NPS manage more than 670 million acres of federal land across the country. In addition, BIA is responsible for administering approximately 55 million acres of lands held in trust by the United States for Indian tribes, individuals, and Alaska Natives. Figure 1 shows the lands that these five agencies managed or administered in the contiguous United States. The agencies have estimated that over 100 million of these acres are at high risk from wildfire. Each agency has a unique mission that shapes how it manages or administers its associated lands. Specifically: The Forest Service manages land for multiple uses, such as grazing, timber, recreation, and watershed protection, and to sustain the health, diversity, and productivity of the nation’s forests and grasslands. The agency operates through nine regional offices that manage 154 national forests and 20 national grasslands. BIA provides services, directly or through contracts or compacts, to federally recognized tribes comprising approximately 1.9 million American Indian and Alaska Natives, many of whom live on BIA- administered lands. Tribal forests provide a source of revenue and jobs for many tribal governments and their members, and play an important role in sustaining tribal cultures and traditions, according to BIA documents. The agency operates through 12 regional offices that manage 83 BIA field units. BLM manages land for multiple uses, such as recreation, mining, grazing, timber, and natural scenic values. The agency operates through 12 state offices that manage subsidiary district and field offices. FWS manages the National Wildlife Refuge System, a network of lands and waters that provides for the conservation; management; and, where appropriate, restoration of fish, wildlife, and plants and their habitats, as well as opportunities for wildlife-dependent recreation, including hunting, fishing, and wildlife observation. The refuge system includes approximately 585 refuges. The agency operates through eight regional offices that manage the refuges. NPS manages the National Park System to conserve the scenery, natural and historic objects, and wildlife therein and to leave them unimpaired for the enjoyment of future generations. Individual park units have varied designations corresponding to the natural or cultural features they are to conserve, including national parks, monuments, lakeshores, seashores, recreation areas, preserves, and historic sites. The agency operates through seven regional offices that manage 419 individual park units. Generally, after receiving its annual appropriation, the Forest Service allocates its fuel reduction funds to its nine regional offices, which in turn allocate the funds they receive to individual field units (e.g., national forests and grasslands). Interior, upon receiving its annual appropriation, allocates its fuel reduction funds through its Office of Wildland Fire to BIA, BLM, FWS, and NPS. These agencies then allocate the funds to their regional offices, which, in turn, allocate the funds to individual field units, such as national parks or wildlife refuges. Once the field units receive their allocations, they select fuel reduction projects to implement during the fiscal year. For fiscal years 2009 through 2018, the Forest Service and Interior implemented fuel reduction projects that treated, respectively, approximately 1.4 million and 1.1 million acres per fiscal year on average. Figure 2 illustrates the annual appropriation and allocation processes for fuel reduction funds. From fiscal years 2009 through 2018, Congress appropriated approximately $5 billion in fuel reduction funds to the Forest Service and Interior, with the Forest Service and Interior annually receiving on average about $339 million and $177 million, respectively (see fig. 3). Most development in the WUI occurs on nonfederal lands. Accordingly, state and local government agencies, as well as property owners, play a major role in protecting communities and other development from wildfire. The Forest Service and the National Institute of Standards and Technology have developed publicly available resources that describe ways communities can adapt to wildfire. Specifically, two critical actions for protecting structures from wildfires are (1) reducing vegetation and flammable objects within an area of 30 to 100 feet around a structure, referred to as creating defensible space, and (2) using fire-resistant roofing materials and covering attic vents with mesh screens to block embers from entering the structure. Individuals and communities can also take steps to mitigate fire risk by avoiding development in higher-risk areas. To help protect structures, state and local agencies may conduct, or help fund, fuel reduction projects to protect communities and other nonfederal lands from wildfire. For example, a rural fire department in Montana funds a crew to reduce fuels around private residences to create defensible space for those homes. In addition, individual property owners may reduce fuels around their homes. In previous reports, we found that state and local agencies have adopted laws or ordinances that require homeowners to maintain a specified level of defensible space or have adopted building codes that require the use of fire-resistant building materials in fire-prone areas. For example, in our May 2017 report, we found that under an Oregon law, property owners in certain at-risk areas must reduce excess vegetation around structures and along driveways. According to Forest Service and Interior documents and officials, the Forest Service and the four Interior agencies use various methods to reduce fuels, which have advantages and disadvantages under different conditions. For example: Mechanical treatments. This method entails using equipment such as chainsaws, masticators, bulldozers, or mowers to cut and remove vegetation. Mechanical treatments reduce tree density where there are abnormally dense groups of trees or ladder fuels to help reduce the risk of a wildfire becoming severe. Interior officials said that mechanical treatments are also widely used for removing shrubs and other vegetation in rangeland ecosystems. However, mechanical treatments may also increase the amount of smaller fuels on the ground, including treetops and limbs (referred to as slash) and other debris from thinning, which can in some cases increase a fire’s intensity or rate of spread. Prescribed burns. This method entails using deliberate, planned fires set by land managers to restore or maintain desired ecosystem conditions and reduce fuels. Prescribed burning under specified fuel and weather conditions is designed to enable a fire to burn at a relatively low intensity level within a confined area. Prescribed burns typically work best when combined with previous prescribed burns or mechanical treatments because they are effective in removing smaller vegetation that can fuel a fire—such as grasses, leaves, pine needles, and twigs—which can reduce a fire’s intensity and rate of spread, but are not as effective in removing larger fuel, such as trees. Smoke produced from prescribed burns and the risk of a prescribed burn spreading into other areas can limit the use of prescribed burns around communities, according to the Forest Service’s Fuels Technical Guide. Herbicides and targeted grazing. Herbicides can be used to reduce fuels or when needed to kill fast growing vegetation to maintain an existing fuel reduction project. However, herbicide kills vegetation but does not remove it, potentially increasing an area’s susceptibility to fire if further action is not taken to remove the dead fuel. Targeted grazing—the intentional use of cows, sheep, or goats to eat vegetation in a specified area—can also be used to reduce grasses and other smaller fuels that can fuel fires. One advantage of such methods is that they often can be applied with a greater level of control over the location, timing, and desired outcome of the treatment. These methods can be particularly helpful in removing smaller fuels in areas where prescribed burning is undesirable, such as in proximity to structures. With grazing, however, it may take multiple years before there is a noticeable difference in the fuels, and according to agency officials, moving livestock to different areas for grazing is labor-intensive and can potentially increase the spread of invasive plants if livestock movement is not controlled. While some fuel reduction projects may be completed with a single treatment method, other projects may require multiple treatment methods and may span several years. For example, a project may first use mechanical treatment to thin accumulated vegetation, followed by a prescribed burn to remove remaining slash and litter on the ground. Moreover, once a project is completed, it needs to be maintained over time to retain its effectiveness as vegetation grows back. Depending on the ecosystem, fuels treatment effectiveness can vary in length from only a few years to over a decade. For example, fuel reduction projects are generally effective for 3 to 5 years in southeastern U.S. pine forests given the high rate at which vegetation grows in that region. In contrast, projects are generally effective for 8 to 12 years in dry conifer forests in the western United States. The most appropriate fuel reduction method or methods—as well as how they are applied (i.e., how much vegetation is removed)—depends on the outcomes desired (e.g., protecting communities, restoring ecosystems); the type of forest or other vegetation present; and site-specific factors, such as topography and proximity to communities, according to the Forest Service’s Fuels Technical Guide and agency officials. The Forest Service and Interior have long-standing research programs that are designed to support agency managers’ understanding of how to implement effective fuel reduction projects. As of November 2019, Forest Service research priorities included refining the scientific understanding of how wildfire burns across landscapes and the effects of fuel reduction projects conducted at different scales. In addition, the agencies conduct assessments, known as fuel treatment effectiveness monitoring reports, in cases where a wildfire either starts within or burns into a fuel reduction project area to evaluate the project’s effect on fire behavior and fire suppression actions. Officials believe that such research helps their agencies continue to improve how they design and implement fuel reduction projects to account for site-specific factors. Regardless of the method used, the purpose of fuel reduction projects is to reduce the intensity of future wildfires to help protect communities, restore ecosystems, or both, according to agency documents. The following examples illustrate various fuel reduction methods that the agencies have used to help protect communities and ecosystems: Officials from BIA and the San Carlos Apache Tribe said that they perform prescribed burns and mechanical treatments annually on approximately 1,000 to 1,600 acres of the San Carlos Apache Indian Reservation in Arizona to remove rapidly growing grasses, which could quickly carry a wildfire into the community. The officials said that they primarily use prescribed burns as this allows them to inexpensively treat the most acres. The officials said that they perform these treatments close to the community, to help keep fires from reaching structures and to provide space for firefighters to work more safely in the event of a fire (see fig. 4). An FWS official at the Mississippi Sandhill Crane National Wildlife Refuge said that the refuge uses prescribed burns and mechanical treatments to reduce the wildfire risk to several nearby communities. For example, for a 1,000-acre area near Ocean Springs, Mississippi, the refuge has been doing fuel reduction projects for decades in an effort to protect nearby residential and commercial areas, as well as a highway, railroad, and other infrastructure (see fig. 5). The official said that because the dominant tree species on the refuge is slash pine, which grows very quickly, they have to treat the area every 3 to 5 years to maintain the effectiveness of the project. The official also said that the refuge uses more mechanical treatments than prescribed burns in this area because of concerns about smoke drifting into nearby communities but that they also use prescribed burns when weather conditions are favorable. Santa Fe National Forest officials said that since the early 2000s, they have partnered with the New Mexico State Forestry Division and the New Mexico Department of Game and Fish to conduct a series of fuel reduction projects, including mechanical treatments and prescribed burns, covering 8,000 acres in the Jemez Mountains of New Mexico. These projects were designed to reduce both the likelihood of a fire reaching nearby communities and potential ecosystem damage. The officials said that given the proximity to development and the large accumulation of fuels in that area, they used mechanical treatments first because a prescribed burn would be hazardous until fuel levels were reduced. After the mechanical treatments were completed, they used prescribed burns to remove as much of the remaining fuels as possible. Officials told us that the utility of these projects was demonstrated in July 2018 when the Venado Fire burned from an untreated into a treated area and changed from a high-intensity fire burning the crowns of the trees to primarily a low-intensity fire burning on the ground (see fig. 6). The officials said that while they do not know what the Venado Fire would have done without the fuel reduction projects, they believe that the projects slowed the fire sufficiently to provide firefighters with time to contain the fire before it spread to populated areas and also helped reduce ecosystem damage. NPS officials at the Whiskeytown National Recreation Area near Redding, California, said that many of the fuel reduction projects they undertake are designed to reduce risk to local communities and restore ecosystem health. For example, the officials said that in 2013 they began a 1,000-acre project, consisting primarily of prescribed burns but also some mechanical treatments, located adjacent to privately owned houses and timber land. The officials said that they primarily use prescribed burns because the lower cost of the burns allows them to treat more acres. The project was intended to reduce fire risk to adjacent private property and to help improve the ecological health of old-growth Douglas-fir stands within the recreation area. The officials said that they believed the project helped to reduce the intensity in some areas burned by the 2018 Carr Fire but also noted that the fire was too intense for the treatments to be effective in other areas, as shown in figure 7. Officials at the BLM West Desert District office in Utah said that they have been working on a 4,680-acre fuel reduction project since 2017. The primary purpose of this project is to improve breeding and winter habitat for the greater sage-grouse by removing juniper and other vegetation that pose a wildfire risk to the sagebrush habitat the bird relies on. The project area is home to the largest population of greater sage-grouse in the state. The officials said that they mostly use mechanical treatments, including mastication, because mastication, unlike other fuel reduction methods, allows for the selective removal of juniper trees while still preserving sagebrush. Figure 8 shows the project area before and after treatment, with juniper trees removed and sagebrush remaining. Agency officials told us that in deciding how to allocate their fuel reduction funds in fiscal year 2018, they primarily considered information related to the wildfire hazard potential on lands they manage or administer, the proximity of communities and infrastructure to those potential fires, and ecosystem health. Wildfire hazard potential. To allocate their fuel reduction funds, officials from the five agencies said they considered information regarding the likelihood and severity of wildfires that may occur across the areas they manage and administer. For example, officials said they generally used information incorporated into a national geospatial database that the Forest Service developed to estimate the relative probability a given area faces of experiencing a wildfire that would be difficult for suppression resources to contain and therefore may cause damage to communities or ecosystems. To produce this database, the Forest Service used, among other things, satellite imagery to identify fuel conditions across the landscape. The Forest Service then ran computer models that used this fuel condition information to estimate the potential intensity of future wildfires. The Forest Service’s identification of the likelihood and potential intensity of a wildfire in a given area helps the agencies compare the relative hazard potential different geographic areas face from such fire. The agencies also used information from another national geospatial database that the Forest Service developed on historical fire occurrence data to identify where fires have most frequently occurred, whether because of natural causes (e.g., lightning) or human causes (e.g., accidental ignitions or arson). Figure 9 shows the wildfire hazard potential, as assessed by the Forest Service in July 2018, on lands the five agencies managed and administered in the contiguous United States. Location of communities and infrastructure. Officials from the five agencies told us that they considered the location of communities and important infrastructure, such as municipal watersheds and electrical transmission lines, which could be damaged by wildfires. The officials said they used several information sources to help them identify the locations of these communities and infrastructure. For example, the agencies used a national geospatial database that the Forest Service developed that maps the WUI as defined by the Forest Service and Interior in 2001. Field unit officials said that they also considered local knowledge about areas that are important to protect in or near to a given community when selecting fuel reduction projects to prioritize and implement. For example, officials said that many communities had developed Community Wildfire Protection Plans— plans identifying areas the communities believe are important to protect—and that they would consider these local plans when selecting fuel reduction projects to implement. Ecosystem health and location of natural resources. Officials from four of the five agencies said that they considered information on the locations of particularly valued natural resources, such as rare or otherwise important plants, including those that provide habitat for threatened or endangered species. Using an interagency tool, they also considered information on the overall ecological condition of forests, grasslands, and other vegetation and how current conditions related to historical conditions in given locations. The officials said that this information helped them identify areas where wildfires may be more damaging than they were in the past because of changes in the density, age, and species composition of the vegetation. For example, officials said that in part because of decades of fire suppression, many ponderosa pine forests currently contain more trees than they would have historically, and as a result, today’s wildfires may burn hotter and cause more damage to those forests than fires did in the past. Reducing fuels can help the agencies to restore an area closer to its historical conditions, which in some ecosystems may reduce the risk of wildfire damaging an ecosystem and the resources it contains, according to the Cohesive Strategy. As they considered similar information on potential damage to communities and ecosystems, each agency used a different approach for allocating fuel reduction funds in fiscal year 2018, according to agency documents and agency officials. Officials from each of the agencies said that professional judgment plays an important role in making these decisions. The general approaches each agency used for allocating fuel reduction funds in fiscal year 2018 were: Forest Service. Forest Service headquarters officials said they allocated fuel reduction funds to their regions based primarily on the allocation levels from the previous fiscal year. However, they also said they considered information based on the best available science on the wildfire risk facing the regions and each region’s contributions to meeting the agency’s acreage targets for fuel reduction projects in the previous fiscal year. According to a 2017 Forest Service manual, the agency was to develop national and regional risk assessments to help inform their approach to allocation decisions, but the national assessment had not been finalized for use in fiscal year 2018. Forest Service officials initially allocated approximately 70 percent of the agency’s total fuel reduction funds to the regions, withholding about 30 percent to make available to regions and national forests on a competitive basis later in the fiscal year. The regions and forests then competed for additional fuels funds for projects aligned with specific national priorities as determined by Forest Service headquarters. Interior. Interior’s Office of Wildland Fire officials said they allocated fuel reduction funds to the Interior agencies based primarily on allocation levels from fiscal year 2017. However, late in the third quarter of fiscal year 2018, Interior officials began testing an approach for reviewing each of the four Interior agencies’ planned fuel reduction projects for consistency with the Secretary of the Interior’s priorities for the fiscal year. The agencies’ plans for such projects were to be updated each quarter to keep Interior officials informed on the implementation status for projects underway and of changes to planned projects, according to Interior documents. BIA. BIA headquarters officials told us they allocated fuel reduction funds to their regional offices based on an allocation model that the agency adopted around fiscal year 2012. The model analyzes wildfire hazard potential and agency staffing levels across BIA regions, among other factors. According to a BIA document, the model includes information that captures risk-related information for wildfires on BIA-administered tribal lands. It also captures information on performance and fiscal management for each BIA regional office’s fuel reduction program during the previous fiscal year and each BIA regional office’s contributions to the total number of acres treated overall by the BIA fuel reduction program. BIA officials said the comparative scores for each regional office derived from the model served as a starting point for discussions with BIA senior leadership when determining the fuel reduction allocations to the regions. BLM. BLM headquarters officials said they allocated fuel reduction funds to their state offices based on the results of the 5-year allocation model the agency adopted in 2015. The model analyzes the location of communities, critical infrastructure, and sagebrush habitat, among other factors, as well as wildfire fire hazard potential for the area covered by each BLM state office. According to BLM officials, the model provides a relative ranking for each BLM state office based on acreage at risk, which helps determine the state offices’ respective fuel reduction allocations. For example, BLM state offices that manage more sage-grouse habitat that is at high risk for wildfire received larger allocations than offices in states without such habitat or where the sage-grouse habitat was at lower risk for wildfire. FWS. FWS headquarters officials said they allocated fuel reduction funds to their regional offices based on the results of an allocation system—the Fuels Management Allocation and Accountability System—that they have used since fiscal year 2016. This system generates a risk profile for each FWS region based on, for example, the location of infrastructure, population density, and how fuel conditions may affect wildfires that occur on FWS-managed land. According to FWS officials, this system provides a relative ranking for each FWS region based on acreage at risk, which helps determine the regions’ respective fuel reduction allocations. In general, the FWS regions with the most acreage at risk receive the largest percentage of FWS’s fuel reduction funds. NPS. NPS headquarters officials told us that they allocated fuel reduction funds to their regions based primarily on historical allocation levels from fiscal year 2017. Headquarters officials said they are considering ways to improve their allocation process, such as potentially adopting a model developed in one of their regions. Specifically, officials from the NPS region in our review said that they had developed a model to help analyze the relative risk facing the field units in their region when making allocation decisions. This model is designed to identify highly valued assets in the national parks and other NPS-managed lands in the region and provide relative rankings for those assets requiring protection through fuel reduction projects, according to the officials. Officials we interviewed from the five federal agencies cited a variety of factors affecting their efforts to implement fuel reduction projects. The officials also identified steps they were taking to help mitigate some of the factors. Scale of problem. Officials from all five agencies we interviewed said that the number of acres needing fuel reductions is significantly larger than the number of acres the agencies are able to treat in any given year. As previously noted, the Forest Service estimated in 2018 that there were approximately 63 million acres of national forest lands at high to very high risk from uncharacteristic wildfire, and Interior officials estimated in 2019 that 54 million acres of the lands that they manage or administer were at high or very high risk from wildfire. In fiscal year 2018, the Forest Service and Interior implemented fuel reduction projects that treated approximately 1.7 million and 1.3 million acres, respectively, of lands they manage or administer. Agency officials told us that they recognize that their efforts will not allow them to reduce fuels on all high-risk lands needing treatment but said that in addition to the projects they undertake to reduce fuels, wildfires also serve to reduce fuels in areas burned by such fires. In some circumstances, officials said, wildfires may provide similar fuel reduction benefits as prescribed burns and other fuel reduction methods. To the extent that wildfires reduce fuels in areas that the agencies would otherwise plan to implement fuel reduction projects, such wildfires would serve to reduce fuels on more acreage than they would otherwise be able to treat. Agency officials also said, as previously discussed, that they are working to improve their ability to identify areas to prioritize for treatment. For example, scientists at the Forest Service’s Rocky Mountain Research Station are helping the agency refine its methods for identifying areas most at risk from wildfire and the communities closest to those areas by expanding and updating agency risk assessments to more accurately depict where fuels reduction projects on national forest lands could provide the most protection to communities. This may also allow Forest Service officials to reduce the total number of acres needing treatment through better targeting of the highest-risk acres. According to Forest Service officials, the agency intends to consider this research to help inform its budget requests and funding allocations for fuel reduction efforts in future fiscal years. The Forest Service and Interior are also working to improve their existing fuel reduction project computer simulation software—called the Interagency Fuels Treatment Decision Support System—so that it can be used to model and quantify the risk reduction effects of potential projects across larger geographic areas. Officials said these improvements would help them prioritize areas to treat by allowing agency officials to explore how different combinations of locations and types of treatments affect predicted future wildfire behavior. Operating under continuing resolutions. Officials we interviewed from all five agencies said that operating under continuing resolutions negatively affected their ability to implement fuel reduction projects. Specifically, agency officials said that they tend to budget conservatively until they receive their regular appropriation and therefore implementation of planned projects may be delayed. For example, Forest Service officials said that the weather for doing prescribed burns is often better in the fall and winter and that receiving their annual appropriation later in the fiscal year can reduce their ability to perform these burns in a given year. In addition, the officials said they had delayed hiring and training staff in previous years when the agencies were operating under continuing resolutions, reducing the number of staff available to implement projects. The Forest Service has taken some steps to mitigate the effects of operating under continuing resolutions. For example, officials in one region said they recently adopted an approach that allows them to more readily shift funding from one planned fuels project to another, either within the same national forest or to other national forests in the region, to complete projects as weather conditions and budgets allow. Officials from one national forest in this region said that this approach has facilitated sharing fuels reduction staff among neighboring national forests to plan additional projects, thereby leading to a broader array of projects being ready for implementation when the agency receives its regular annual appropriations. Balancing fuels projects in new areas with maintaining past treatments. Officials from all five agencies said that it can be difficult to balance conducting fuel reduction projects in new areas with maintaining areas that have already had initial fuel reduction projects completed. Some agency officials said that while it is important to conduct projects to reduce wildfire risk in new areas, they also need to conduct projects in previously treated areas to maintain the effectiveness of past treatments. Agency officials said that in balancing their investments between new and previously treated areas, they consider the relative costs of projects. Conducting fuel reduction projects in new areas can be more expensive than conducting maintenance projects because of the type of treatments that need to be done, according to officials. For example, officials from one national forest said that initial mechanical treatments may cost from $300 to $1,500 per acre, depending on the area where the treatment is located, while conducting prescribed burns to maintain a previously treated area may cost from $25 to $100 per acre. Availability of staff. Agency officials from all five agencies said that fuel program staff may be involved in wildfire suppression efforts and therefore may not be available to plan or perform fuel reduction projects, leading to delays in completing such projects. Officials noted that this was largely an unavoidable result of the agencies’ approach to suppression operations, whereby staff from many of the agencies’ program areas, including fuels, are mobilized through temporary emergency assignments to respond to large wildfires across the country as they occur. Agency officials said that they are used to working within staff availability constraints. However, some officials expressed concern about the potential for staff burnout. Specifically, fuel program staff may work many overtime hours when suppressing fires and additional overtime hours when they return to their field units to catch up with planned fuel reduction projects that were delayed because of the emergency suppression assignments. Higher cost of treating WUI areas. Officials we interviewed from four of the five agencies said that costs are a factor when determining which projects to pursue and that it can be more expensive to conduct fuel reduction projects close to homes and infrastructure in the WUI. For example, officials at one national forest said that conducting prescribed burns close to communities in the WUI typically costs almost $250 per acre, whereas it may cost $60 per acre to reduce fuels further away from communities. Agency officials told us that they try to balance their work between WUI and non-WUI areas to ensure treatment of high-risk areas. In balancing between WUI and non-WUI areas, some Forest Service field unit officials noted that Forest Service headquarters annually sets fuel reduction acreage targets for each region; each region then sets targets for each of its national forests and grasslands. Some officials said that as their annual targets for acres of fuel reduction increase, they may feel pressure to choose projects in locations where they can treat more acres to meet their targets, even if those acres may not be located in the areas at highest risk from wildfire damage. Forest Service headquarters officials said that they do not pressure field units to meet the targets but that they are aware that increasing the annual fuels targets, while budgets remain relatively flat, may incentivize field units to select lower cost areas, which may be at lower risk from wildfire. The officials added that the field units, consistent with Forest Service guidance, should be selecting their project locations based on their risk assessments, not cost. Community acceptance of fuel reduction projects. Officials we interviewed from four of the five agencies said that community concerns about the effects of proposed fuel reduction projects have affected their ability to conduct some projects but that they are often able to work with communities to gain their acceptance. For example, the officials said that community members are frequently concerned that smoke from prescribed burns will have negative impacts on their health and quality of life, or that mechanical thinning of vegetation near their communities will be visually unattractive or have negative impacts on wildlife. Agency officials said that they work to minimize these impacts. For example, Forest Service officials schedule prescribed burns at times when weather conditions are not expected to cause a significant volume of smoke to drift into communities. The officials also said that they work with community members to educate them about the benefits of reducing fuels, steps the agencies are taking to reduce negative impacts on the community and wildlife, and steps community members can take to help avoid some impacts. In other instances, agencies partner with various stakeholders to help mitigate negative effects of fuel reduction projects on communities. For example, the Forest Service in New Mexico is part of the Greater Santa Fe Fireshed Coalition, a group that loans air filters to community members who are sensitive to smoke to help them avoid negative health impacts from prescribed burns. Limited economic value of biomass. Officials from three of the five agencies we interviewed said that, in contrast to commercial timber harvests in which contractors pay the agency for the material they remove, fuel reduction projects often produce small trees and other biomass with limited economic value. As a result, fuel reduction projects are unlikely to generate revenues that the agencies could use to help offset the costs of completing such projects. To help mitigate this issue, Forest Service officials said they are working to expand their use of a practice known as stewardship contracting. Through stewardship contracting, the agencies can trade goods—such as timber—for fuel reduction or forest restoration services that the agencies would otherwise pay for with appropriated dollars. Officials we interviewed at two national forests said that the use of stewardship contracts had facilitated their ability to conduct fuel reduction projects, although officials at one of the forests also said they were concerned that the relatively long length of the contracts could slow the rate at which contractors completed the projects. The Forest Service is also researching ways to increase demand for small trees and other biomass—for example, by expanding their use in energy production and building materials—which, if successful, could help to increase the economic value of the material. We provided a draft of this report to the Department of Agriculture and the Department of the Interior for review and comment. In comments reproduced in appendix II, the Forest Service, responding on behalf of the Department of Agriculture, generally agreed with our findings. In addition, the Forest Service and Interior provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Agriculture, the Secretary of the Interior, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Appendix I: Federal Agencies, Agency Units, and Nonfederal Entities Interviewed Regional office (geographic area covered by region) Field unit (state in which unit is located) Southwestern Region (Arizona, New Mexico, Oklahoma, Texas) Cibola National Forest (New Mexico) Santa Fe National Forest (New Mexico) Pacific Southwest Region (California, Hawaii) Cleveland National Forest (California) Shasta-Trinity National Forest (California) Pacific Northwest Region (Oregon, Washington) Deschutes National Forest (Oregon) Southern Region (Alabama, Arkansas, Florida, Georgia, Kentucky Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia, and the territory of Puerto Rico) Francis Marion and Sumter National Forests (South Carolina) Western Region (most of Arizona, Nevada, Utah) San Carlos Agency (Arizona) Utah State Office (Utah) West Desert District (Utah) Southeast Region (Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, South Carolina, Tennessee, and the territories of Puerto Rico and the U.S. Virgin Islands) Mississippi Sandhill Crane National Wildlife Refuge (Mississippi) Pacific West Region (portions of Arizona; California; Hawaii; Idaho; portions of Montana; Nevada; Oregon; Washington; and the territories of American Samoa, Guam, and the Northern Mariana Islands) Whiskeytown National Recreation Area (California) In addition to the contact named above, Jonathan Dent (Assistant Director), David Lysy (Analyst-in-Charge), Aditi Archer, Kathryn Godfrey, Richard Johnson, Gwen Kirby, Anne Rhodes-Kline, Dan Royer, and Kyle Stetler made key contributions to this report.", "summary": "Wildfires have been increasing in size and severity, exacerbated by abnormally dense vegetation, drought, and other climate stressors. Development in and around wildlands also continues to increase, placing more people at risk from wildfires. To reduce vegetation that can fuel such fires, federal land management agencies implement fuel reduction projects on public lands. GAO was asked to examine the federal government's preparedness, response, and recovery efforts following the wildfires and other natural disasters of 2017. This report describes (1) methods federal agencies use to reduce fuels to help protect communities and ecosystems, (2) information the agencies considered in allocating fuel reduction funds in fiscal year 2018, and (3) factors affecting agency efforts to implement fuel reduction projects. GAO examined laws, regulations, and agency policies and budget documents; interviewed federal agency officials at headquarters, as well as in eight regional offices and 10 field units selected based on their locations' high wildland fire hazard potential; and interviewed officials from nonfederal entities, including representatives from the state forestry agencies for the seven states where selected field units were located (three field units were in California and two were in New Mexico). Five federal land management agencies—the Department of Agriculture's Forest Service and the Department of the Interior's Bureau of Indian Affairs, Bureau of Land Management, Fish and Wildlife Service, and National Park Service—use several methods to reduce fuels (vegetation) to help lower the intensity of wildland fires on lands they manage or administer. These methods primarily include mechanical treatments, which use equipment to cut and remove vegetation, and prescribed burns, which are deliberate, planned fires set by land managers. The agencies have long-standing research programs designed to further develop their understanding of how to implement effective fuel reduction projects, including conducting assessments to evaluate project effectiveness. Officials said the research helps the agencies to improve how they design and implement fuel reduction projects to address site-specific conditions. In fiscal year 2018, when allocating fuel reduction funds, the agencies considered information on wildfire hazard potential, the location of communities, and ecosystem health and the location of natural resources. Total fuel reduction appropriations exceeded $5 billion in fiscal years 2009 through 2018 (see figure). Officials from the five agencies cited several factors affecting implementation of fuel reduction projects. A key factor officials cited is that the number of acres needing treatment is significantly larger than the agencies can treat annually. The agencies have estimated that over 100 million acres they manage or administer are at high risk from wildfire, but, for example, in fiscal year 2018 they treated approximately 3 million acres. The agencies are developing risk assessments to help identify areas to prioritize for fuel reductions.", "document_type": "gao"}
{"report": "Coastal communities face hazards from coastal storms and flooding that can cause loss of life, property damage, and damage to the environment. More specifically, coastal communities face threats from erosion and damages from waves, wind, and storm surges. For example, during Superstorm Sandy in 2012, shoreline water levels rose across the East Coast, causing billions of dollars in property damage to homes and businesses. These threats can be exacerbated by several factors, including sea level rise and commercial and residential development, according to Corps documents on coastal risk reduction and resilience. For example, rising sea levels increase the risks from regular tidal flooding and coastal storms and new construction along coastlines can increase the number of people and buildings at risk from the storms. The Corps constructs projects to help reduce the risks from coastal storm hazards and mitigate erosion, wave damage, and flooding, which may include the use of hard structures. The Corps has decades of experience developing projects that use hard structures, such as revetments, seawalls, and storm surge barriers, to reduce the risks from coastal storm hazards, according to a 2014 report by the National Academy of Sciences (see fig. 1). Natural infrastructure can also be designed and developed for coastal storm and flood risk reduction purposes. Natural infrastructure can involve several types of natural features that have the potential to reduce risks to coastal areas from storms (see fig. 2). Diverse natural features occur in different areas of the United States. For example, some areas along the Florida Gulf Coast are host to mangroves—coastal wetlands found in tropical and subtropical regions—that can reduce the impacts of high energy waves from storm surges. The extent to which natural infrastructure can reduce risks to coastal areas from storms and flooding depends on the types of natural features being used. For example, underwater vegetation, such as seagrass, has less capacity to reduce wave energy than a coral reef, which is a hard underwater structure, according to scientific studies. According to a 2014 National Academy of Sciences report, in addition to reducing the risks of storms and flooding for coastal communities, projects using natural infrastructure may provide other benefits, depending on the type of natural feature associated with the project. Among other things, natural infrastructure has the potential to enhance commercial and recreational fisheries and create recreational opportunities. For example, natural infrastructure may support fish habitats, which could enhance a commercial or recreational fishery. In addition, wetlands may improve habitats for birds, which could enhance bird watching activities. Similarly, replenishing beaches may provide more beach area for individuals to use for recreational activities, and provide nesting habitat for birds and sea turtles. The Corps’ Civil Works program—responsible for water resources projects—is organized in three tiers: a national headquarters in Washington, D.C.; eight regional divisions; and 38 districts (see fig. 3). Corps headquarters primarily develops the policies and guidance that the agency’s divisions and districts carry out as part of their oversight responsibilities for the water resources projects under the Corps’ purview. Corps districts are responsible for planning, engineering, constructing, and managing water resources projects in their districts, including projects that consider or use natural infrastructure. The Corps has several programs and initiatives related to using natural infrastructure for water resources projects. For example, the Engineer Research and Development Center, the research organization within the Corps, manages a portfolio of research related to water resources projects that includes research focused on flood risk management and coastal systems. The Corps also has an initiative called Engineering With Nature®, which the Corps’ scientists and engineers developed to facilitate using sustainable practices in Corps projects. The Corps develops water resources projects, including coastal storm and flood risk management projects, in conjunction with nonfederal sponsors, such as state and local governments. According to Corps guidance, the planning process for these projects begins with a nonfederal sponsor identifying a problem and approaching the Corps to help develop a solution. Upon statutory authorization for a study and appropriations to fund it, the Corps and the nonfederal sponsor enter into an agreement to conduct a feasibility study for a potential project. Nonfederal sponsors are to participate in the planning process, as well as remain involved through project design, construction, and post-project operations and maintenance. For example, for projects where the Corps constructs hard infrastructure, such as a seawall, the nonfederal sponsor is to assume responsibility for monitoring and maintenance costs associated with the seawall after its construction. In contrast, for a project that involves replenishing a beach, the Corps and the nonfederal sponsor usually share the cost of replenishment for a specific period of time, typically 50 years. The U.S. Water Resources Council’s 1983 Economic and Environmental Principles and Guidelines for Water and Related Land Resources Implementation Studies (Principles and Guidelines) outline the standards and procedures that the Corps is to follow for planning water resources projects, including those with coastal storm and flood risk management objectives. The Principles and Guidelines establish that the federal objective of water resources projects is to contribute to national economic development while protecting the nation’s environment. The Corps implements the planning process outlined in the Principles and Guidelines by conducting feasibility studies for proposed water resources projects. The Corps’ Planning Guidance Notebook (Planning Guidance) provides detailed guidance on how to implement the general process outlined in the Principles and Guidelines for planning water resource projects. The Corps’ feasibility study process includes four major phases and five milestones, as shown in figure 4. The Corps initiates a feasibility study by forming a project team, comprising Corps engineers, economists, planners, and other specialists, to conduct the study. The Corps project team begins with a scoping phase that specifies the problem, such as the potential for coastal storm and flood damage, and identifies opportunities for a project to address the problem. The project team then inventories conditions in the project area, including physical, economic, and social conditions, and forecasts how these conditions may change over the life of a potential project. As it continues the scoping phase, the project team identifies various measures that could address the problem, such as replenishing an existing beach or constructing a seawall. The project team then develops potential individual measures or combinations of measures (e.g., beach replenishment and seawall construction) into an initial list of alternatives. Since 2016, the Corps has been required by statute to consider natural infrastructure in certain circumstances. With its initial list of alternatives, the Corps project team is to then evaluate each alternative by (1) comparing it to the scenario of proceeding with no project; (2) applying criteria established in the Principles and Guidelines; (3) identifying beneficial and adverse effects of each alternative; and (4) considering other relevant factors, such as compliance with environmental requirements. To identify beneficial and adverse effects of each alternative, the Corps uses four general categories established in the Principles and Guidelines, as shown in table 2. The Corps’ Planning Guidance states that project teams should evaluate alternatives using the four categories of analysis, but the evaluation from two categories—National Economic Development and Environmental Quality—must be included in each feasibility study. According to the Planning Guidance, evaluating projects’ potential costs and benefits through these categories of analysis provides a basis for determining which alternatives should be eliminated from consideration, modified, or selected for further analysis. This evaluation can eliminate alternatives that do not meet planning objectives and may narrow the initial list of alternatives to a final list for more detailed analyses and comparison. Corps officials stated that the process of evaluating alternatives can be iterative and is project specific. The Corps project team then is to conduct detailed analyses of its final list of alternatives to compare them to each other and select a recommended alternative. The project team includes the recommended alternative in a draft report with its analysis. The draft report is made available for review and comment by nonfederal sponsors, federal and state agencies, and other stakeholders. The project team incorporates comments into the report, as appropriate, and determines whether the agency will endorse the recommended alternative. The project team finalizes its feasibility study after internal review. The Corps then prepares a report summarizing the proposed plan—known as the Chief’s report—and submits it to Congress for consideration and potential authorization. Based on our review of Corps guidance and eight selected projects that used natural infrastructure, we found that the Corps typically identified project costs and damage reduction benefits in selecting the alternative, although for some projects it also considered additional benefits, such as recreational benefits. Once a Corps project team develops a final list of alternatives in conducting a feasibility study for a particular project, the project team is to conduct an economic analysis for each alternative. This analysis allows the team to compare costs and benefits directly across the alternatives, including alternatives using natural infrastructure, hard infrastructure, or a combination of the two. Specifically, the project team is to develop estimates for each project alternative’s net economic benefits—benefits minus costs—to identify and select the project alternative with the maximum net benefits. The Corps’ Planning Guidance states that the Corps shall select coastal storm and flood risk management projects determined to have the maximum net benefits. Our review of Corps guidance and eight selected projects identified the following costs and benefits that the Corps generally incorporated into its economic analyses: Project costs. According to the Corps’ Planning Guidance, project costs include three categories: implementation costs, other direct costs, and associated costs. Implementation costs, for example, include planning and design, construction, construction contingency, operations, maintenance, repair, and other costs necessary to implement a project. The eight selected projects that we reviewed included analyses of project costs, which mostly focused on implementation and interest costs. For example, the costs for the Corps’ Jacksonville District Lido Key project included initial construction costs (i.e., beach construction and hard infrastructure designed to reduce shore currents), future beach replenishment costs (i.e., operations related to placing material on beaches to replenish eroding shores), and monitoring costs (e.g., measurement of beach fill, sediment type, and habitat quality). Damage reduction benefits. Reducing damages to existing structures, including homes and commercial buildings, is the primary benefit the Corps considers when identifying benefits for coastal storm risk management project alternatives, according to the Corps’ Planning Guidance. The guidance outlines general steps for estimating damage reduction benefits, which are to be calculated and included in each coastal storm and flood risk management alternative’s economic analysis. In seven of the eight projects we reviewed, the Corps analyzed damage reduction benefits as part of its economic analysis. For example, the Corps’ project team for the New York District Union Beach project determined the potential damage reduction benefits of each alternative by estimating the alternative’s potential to reduce (1) damages to coastal property from flooding and waves, (2) public emergency spending, and (3) administrative costs for the National Flood Insurance Program (see fig. 5). We also found that for some selected projects, the Corps identified and incorporated additional benefits into the projects’ economic analyses, including the following: Incidental recreational benefits. Corps project teams may include in the economic analysis recreational benefits that stem directly from the project alternative but that are incidental to the primary purpose of damage reduction, according to the Corps’ Planning Guidance. Specifically, Corps project teams may include recreational benefits, such as increases in recreational visits because beaches are larger in their economic analysis of project alternatives, but recreational benefits are limited to no more than 50 percent of the total economic benefits used to justify an alternative (i.e., demonstrate that an alternative has greater benefits than costs). After an alternative has been economically justified, the team can use the full estimated recreational benefits with the damage reduction benefits to select the alternative with maximum net benefits. In our review of eight projects, we identified four projects where the Corps project team included recreational benefits in its economic analysis for the project alternative that was selected. For one such project, the Los Angeles District’s Encinitas-Solana Beach project, the Corps’ economic analysis showed that the selected project alternative had lower damage reduction benefits than project costs. However, when the Corps added recreational benefits—as allowed by Corps policy—the combined annual damage reduction and recreational benefits resulted in the alternative having greater benefits than costs (see fig. 6). Other direct incidental benefits. The Corps may also consider other direct incidental benefits in its economic analysis, as appropriate, according to the Principles and Guidelines. In our review of eight projects, we identified three projects that included estimated incidental benefits aside from recreational benefits. The three projects included economic benefits associated with reduced maintenance costs for local communities, whose expenses for maintaining local beaches would decline after the Corps projects were constructed. Other than these reduced maintenance costs, the Corps did not include other types of direct incidental benefits, such as environmental or other social benefits, in the economic analyses for the eight projects we reviewed. According to Corps officials, some project alternatives using natural infrastructure may provide direct incidental benefits that are not included in the economic analysis, such as environmental and social benefits. For example, the draft feasibility study for the New York District’s Jamaica Bay project states that natural infrastructure can provide direct incidental benefits, such as improving ecosystems, filtering water, and improving aesthetics. The Corps acknowledged these incidental benefits and their importance to communities in its draft feasibility study, but did not incorporate these benefits into its economic analysis because they could not be monetized, according to Corps district officials. Corps headquarters officials said incidental benefits that cannot be monetized in the economic analysis are considered in the planning process through the evaluation of other Principles and Guidelines categories. Two reports published by the National Academy of Sciences stated that when assessing project alternatives, the Corps primarily uses qualitative measures to assess benefits that are difficult to monetize but that relegates such effects to secondary status compared to the monetized estimates of costs and benefits. Moreover, a 2004 National Academy of Sciences report found that the Principles and Guidelines outlines a process that focuses on the effects that can be monetized, which does not allow for full consideration of a project’s total economic effects. Nonetheless, for three of the eight projects we reviewed, we found that the Corps modified its approach in selecting the use of natural infrastructure as part of the recommended alternative. For instance, for the Encinitas-Solana Beach project, the Corps granted an exception to its planning process and recommended a locally preferred plan. In certain circumstances, Corps project teams can deviate from the Corps’ Planning Guidance that calls for the Corps to select the project alternative with the maximum net benefits. Corps headquarters officials said that requesting such an exception is the primary method the agency uses for recommending a project alternative that does not meet the Corps maximum net benefits requirement for a project focused solely on coastal storm or flood risk management. For the Encinitas-Solana Beach project, the California Coastal Commission found that the Corps’ proposed alternative with the maximum net benefits was inconsistent with the mission of California’s coastal management program to protect and enhance the state’s coastal environment. In particular, the Commission had concerns about the size of the project and the amount of sand to be added to the beach under the proposed alternative, as well as the potential adverse effects on a nearshore natural reef and marine resources. In response, the Corps’ Los Angeles District worked with the project’s nonfederal sponsors to address the commission’s concerns and revised the project by reducing its size and potentially lessening its environmental impacts. The commission approved the revised project alternative in November 2013. The Corps’ Planning Guidance also allows projects with multiple objectives to incorporate other analyses in selecting a recommended alternative. For the Philadelphia District’s Lower Cape May project, ecosystem restoration was the project’s primary objective, but it also had a coastal storm risk management objective. According to the project’s feasibility study, the project focused on protecting and restoring a freshwater marsh that was being flooded with salt water from storms because of continued beach erosion. The Corps used a cost- effectiveness analysis to meet the primary objective, which compared environmental measures (e.g., the number of acres of habitat restored) with the costs of different alternatives. In addition, this project included a beach component to protect the marsh from saltwater intrusion. In the process of designing beach alternatives, the Corps project team conducted a damage reduction benefit analysis to determine an optimal size for the beach that would provide the greatest net damage reduction benefit to nearby communities. This analysis helped inform the Corps decision to select a beach design option that met the project’s primary objective of protecting the ecosystem, while also providing the most incidental damage reduction benefits to local communities, according to Corps district officials. For the third project, the New York District’s Jamaica Bay project, the Corps incorporated natural features into the project, although it did not directly include the economic benefits of these features in its economic analysis. For the project, the Corps project team recommended an alternative that was designed to address frequent flooding within Jamaica Bay at three locations. The project team incorporated wetlands into the design at one location, along with hard infrastructure. The nonfederal sponsors of the project told us that they advocated for the inclusion of these natural features, where appropriate, because of their risk reduction and ecological benefits. In response to the interests of nonfederal sponsors, the Corps project team developed and recommended the alternative incorporating hard infrastructure, such as floodwalls, along with coastal wetlands. The Corps did not include the risk reduction benefits from the wetlands in the economic analysis, but the draft feasibility study noted that the project was economically justified based on the monetary benefits of the hard infrastructure alone and that the wetlands provided additional benefits that could not be monetized. Based on our literature review, agency documentation, and interviews with Corps officials and other stakeholders, we found that the Corps faces challenges developing cost and benefit information for some natural infrastructure to help inform the process for selecting project alternatives and conducting economic analyses in feasibility studies. Specifically, these challenges related to (1) assessing the performance of some types of natural infrastructure and (2) monetizing the social and environmental benefits associated with using natural infrastructure. The Corps recognizes the need to obtain additional data to better develop cost and benefit information for some types of natural coastal infrastructure, and it has begun taking steps to do so. Information is not readily available on the performance of some types of natural features in reducing coastal storm and flood damages, which makes it challenging for the Corps to develop cost and benefit information for these features and compare them to other alternatives, such as those that use hard infrastructure. For example, Corps headquarters officials said that—in contrast to beaches and dunes—there are significant knowledge gaps about the extent to which wetlands, reefs, and subaquatic vegetation can reduce the risks associated with coastal storms by, for example, moderating wave heights and flooding. In addition, there are knowledge gaps about how these natural features will change over time and how any changes might affect the long-term performance of the features. A Corps report from January 2015 also identified knowledge gaps in understanding how some natural infrastructure, such as wetlands, may perform during coastal storms or floods. According to the report, wetlands may reduce storm surge, but in some instances water can be redirected, potentially causing a storm surge increase elsewhere. Corps officials noted that all structures—whether natural or hard—change over time, requiring maintenance and repair, but said that natural infrastructure may change more dramatically than hard infrastructure and over a shorter period of time. For example, a healthy wetland could restore itself and reduce maintenance costs after a major storm or require the Corps to take action to restore the wetland after the storm event, which could increase the costs of maintaining the wetland. Corps officials also stated that there are knowledge gaps regarding whether wetlands can absorb major storm surges and how these features would perform in the event of recurring coastal storms in a short period of time. Specifically, natural features may be damaged during intense storms (e.g., wetlands can erode and vegetation may be stripped apart), which may degrade the long-term performance of the features. Because the Corps does not have information on performance for some natural features, it has been unable to update engineering guidance to include the use of some natural features, according to Corps officials. A Corps headquarters official explained that the agency must first develop a broader understanding of how some natural features, such as wetlands, perform under various coastal storm scenarios over time before it can begin to develop design guidance for using these features for coastal storm protection and flood risk management projects. A Corps headquarters official said that the agency recognizes the need to obtain additional information on natural infrastructure and has initiated steps to address the challenge related to developing information on the performance of some types of natural infrastructure. In particular, in October 2016, the Engineer Research and Development Center began collaborating with several entities, including other federal agencies, international partners, academic institutions, and nongovernmental organizations, to develop guidelines for using some types of natural infrastructure. According to the scoping document, this effort is to entail developing guidelines to support various phases of building natural infrastructure projects, including conceptualization, design, engineering, construction, and maintenance. According to the Corps official, an anticipated key output from the international effort includes developing information on defining performance for different types of natural infrastructure features and options for measuring performance depending on project objectives. The final product is expected to include chapters with information on analyzing natural infrastructure benefits and related monitoring, maintenance, and adaptive management issues, among others. The Corps official stated that the guidelines will not be official Corps guidance or policy, but Corps project teams and other practitioners can use the guidelines as a resource for identifying best practices in planning projects and assessing potential alternatives. For example, the guidelines will include case studies illustrating design and engineering concepts for certain types of natural features. The guidelines are scheduled for publication in March 2020. The Corps has also developed a separate internal initiative to help fill knowledge gaps regarding how some natural features’ performance can provide benefits relevant to flood risk management, among other benefits. Specifically, the Corps’ Engineering With Nature® Initiative is focused on sharing natural infrastructure best practices that are emerging, and communicating the information to staff in the Corps’ district offices and other key stakeholders. According to a Corps official, the goal of this initiative, among other things, is to help familiarize the Corps’ district staff with existing natural infrastructure information and relevant case studies. The Corps’ Galveston and Philadelphia Districts have projects that may incorporate natural infrastructure. For example, the Galveston District is considering opportunities through the Coastal Texas study to use natural features, such as barrier islands, wetlands, and reefs, in combination with hard infrastructure (e.g., levees), to reduce the risks from storms and floods. Similarly, the Corps’ Philadelphia District is considering a plan to design, construct, and evaluate natural features as part of the New Jersey Back Bays Storm Flood Risk Management study. In addition, in 2018, the Corps’ coastal working group initiated a project within the Corps to help identify natural infrastructure knowledge gaps and prioritize key areas for research based on requests for information received from Corps’ districts. The Corps plans to incorporate information gathered from this project into a strategic plan that is intended to help inform research funding decisions for fiscal year 2020, according to a Corps official. Our review of economic literature identified challenges in estimating the total economic benefits associated with using natural infrastructure features. Several studies noted that data for conducting economic analyses are not readily available. For example, one study noted that there is insufficient information on how restoring wetlands might affect the survival of certain endangered species. Such information is needed, according to the study, to provide insight on the extent to which such features might generate economic benefits. Another study noted that because projects that combine natural features with more traditional structures (i.e., hybrid projects) are relatively new, less is known about their effectiveness or their costs and benefits. Finally, according to another study, estimating recreational benefits associated with natural habitats, such as coastal marshes, can be difficult because there is insufficient information about the extent to which the public visits those sites. In the eight projects we reviewed, Corps project teams did not estimate incidental benefits other than recreational benefits or through avoiding maintenance costs for coastal storm and flood risk management projects. As previously discussed, environmental and social benefits are considered incidental benefits, and Corps guidance indicates that they do not have to be included in the economic analysis. On the other hand, when assessing potential alternatives of coastal storm and flood risk management projects in its feasibility studies, the Corps can quantify or describe the benefits qualitatively and consider these effects during the planning process, outside of the economic analysis. For example, the Corps has measures to quantify changes in habitat, such as number of acres of wetlands restored. The Corps can also qualitatively describe habitat benefits for specific species. However, these nonmonetized benefits may not affect the selection of the recommended alternative, which is generally based on the monetized net benefit estimates of each proposed alternative. The Corps has begun developing a process for identifying, describing, and considering a broader array of potential benefits when assessing natural infrastructure alternatives for specific projects. Specifically, a June 2017 memorandum from the Corps’ Director of Civil Works indicated that projects with coastal storm and flood risk management objectives as well as other objectives should consider social and environmental benefits in the formulation, design, and implementation of projects within existing legislation and Corps policy. A Corps headquarters official said that the agency is not attempting to monetize all potential benefits but is considering options for accounting for potential benefits other than through the traditional monetary assessments of costs and economic benefits. A Corps headquarters planning group is currently working on developing an initiative that would identify a process for using a flexible approach for considering the social and environmental effects of natural infrastructure for coastal storm and flood risk management projects. For example, project teams may have the option of determining whether to incorporate nonmonetized social and environmental benefits, such as enhancing public safety in coastal communities, into the decision-making process for selecting the recommended alternative. The Corps official stated that the agency has begun working on developing guidance for this initiative and expects to issue the guidance in calendar year 2019. We provided a draft of this report for review and comment to the Department of Defense. The department provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Defense, the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to the report are listed in appendix II. This appendix presents information on the eight projects that we selected for review with coastal storm and flood risk management objectives that the U.S. Army Corps of Engineers (Corps) constructed and that included natural infrastructure. We randomly selected eight projects across Corps districts on the Atlantic, Gulf, and Pacific coasts. In seven of the eight projects, the Corps recommended alternatives with either beaches or dunes as the type of natural features to be used for coastal storm and flood risk reduction (see table 3). According to several Corps district officials we interviewed, alternatives featuring beaches are often most appropriate because other natural features, such as wetlands, would not survive the impacts of the high-energy storm waves in open ocean coastal areas where these projects are located. In addition to the contact named above, Alyssa M. Hundrup (Assistant Director), Leo Acosta (Analyst-in-Charge), Mark Braza, Eric Charles, Timothy Guinane, and Jeanette Soares made key contributions to this report. Important contributions were also made by John Delicath and Sara Sullivan.", "summary": "The Corps constructs water resources projects to reduce risks to coastal communities from storm damage, among other things. These projects can involve building hard structures, such as seawalls, to protect against flooding and wave damage. The Corps and some state and local agencies are increasingly considering using natural infrastructure, such as wetlands, to reduce risks from coastal storms and flooding. GAO was asked to review the uses, costs, and benefits of natural coastal infrastructure for the Corps' coastal storm and flood risk management projects. This report describes (1) how the Corps considered costs and benefits for selected projects that used natural infrastructure and (2) challenges the Corps faces in developing cost and benefit information for using natural infrastructure and steps taken to address them. GAO reviewed Corps guidance; obtained information on projects that used natural infrastructure and received funding from fiscal years 2012 through 2017; randomly selected eight coastal storm and flood risk reduction projects from the Atlantic, Gulf, and Pacific coasts; and reviewed each project's planning documentation and economic analyses. Findings from these projects are not generalizable to all Corps' projects. GAO also reviewed economic literature, reviewed Corps documents related to the use of natural infrastructure, and interviewed Corps officials and stakeholders with experience in using natural infrastructure. The U.S. Army Corps of Engineers (Corps) typically identified project costs and damage reduction benefits for the eight projects using natural infrastructure that GAO reviewed. In selecting projects, the Corps is to conduct economic analyses of project alternatives, which may include hard structures, natural infrastructure, or a combination, to compare their costs and benefits. Corps guidance states that for coastal storm and flood risk management projects it is to select the alternative determined to have the maximum net benefits (benefits minus project costs). The Corps calculated project costs for the eight projects, such as planning, design, construction, and maintenance costs. It calculated damage reduction benefits for seven projects by estimating reduced damages to existing structures in the project area, including to homes and commercial buildings. Corps guidance allows the economic analysis to also include incidental benefits of a project, and four projects incorporated recreational benefits of alternatives, such as increases in recreational visits because beaches would be larger. The Corps did not include other types of incidental benefits, such as environmental or other social benefits, for the eight projects. Corps documentation for one project identified environmental benefits of constructing wetlands as part of the project, such as improving ecosystems and filtering water. However, Corps officials said they did not incorporate these benefits into the economic analysis because the benefits could not be monetized. The Corps faces challenges in developing cost and benefit information for some types of natural infrastructure and has initiated steps to address this. For example, a 2015 Corps report identified knowledge gaps in understanding how natural coastal infrastructure, such as wetlands, may perform during coastal storms. These knowledge gaps make it challenging for the Corps to develop cost and benefit information for some natural infrastructure alternatives and compare them to other alternatives, such as those that use hard infrastructure. The Corps recognizes the need to obtain additional data to better develop cost and benefit information and has begun taking steps to do so. For example, in 2018, the Corps initiated a project to help identify natural infrastructure knowledge gaps and prioritize key areas for research. The Corps plans to incorporate information gathered from this project into a strategic plan that is intended to help inform research funding decisions for fiscal year 2020, according to a Corps official.", "document_type": "gao"}
{"report": "In the United States, deaths from all causes are recorded and tracked through a multi-step registration process, which may vary by state, according to CDC officials. According to CDC officials, when an individual dies, a death certificate is filed with the state. Funeral directors are responsible for providing demographic information about the deceased individual, while physicians, coroners, and medical examiners are responsible for providing information on cause of death. The local registrar of vital statistics is responsible for verifying the information, and then transferring copies of the death certificate to the city or county health department in some jurisdictions, and to the state registrar. The state vital registration office is responsible for verifying the information, maintaining official copies, and creating an electronic record. According to CDC officials we interviewed, state vital records offices submit their death certificate information to CDC electronically. In 2003, CDC revised the standard death certificate to include a checkbox to indicate whether a woman was pregnant at the time of her death or up to 1 year after delivery or end of pregnancy. (See fig. 3) The checkbox is part of the medical portion of the death certificate that is completed by a physician, coroner, or medical examiner. According to CDC officials, there has been staggered adoption of the revised death certificate by states, and not every state death certificate included the pregnancy checkbox until 2019. CDC collects maternal mortality data using two national surveillance systems, NVSS and PMSS. In addition, CDC has developed a data application that state or local MMRCs can use to centrally collect information abstracted from various sources about each death. Federal law directs CDC’s National Center for Health Statistics to collect statistics on maternal mortality. According to CDC officials, the National Center for Health Statistics receives copies of electronic records for deaths from all states and jurisdictions, such as the District of Columbia. It uses this death certificate information to assign ICD-10 codes based on the cause of death. According to CDC officials, the National Center for Health Statistics uses these coded records to compile national vital statistics files in NVSS, which is the source of official statistics on mortality in the United States, including maternal deaths. NVSS data are used to identify national trends and make international comparisons. CDC published national maternal mortality rates for deaths that occurred in 2007 based on data collected in NVSS in its report on all deaths in the United States. CDC also made these data publicly available in microdata files that can be downloaded through website applications and, according to officials, in response to specific requests when additional details, such as geography, are sought. However due to staggered implementation of the 2003 revised death certificate by the states and reliability concerns about the use of the pregnancy checkbox, CDC officials said that as of September 2019, they have not published NVSS statistics on maternal mortality in the agency’s annual mortality reports since the report on deaths that occurred in 2007. For example, as specified in the technical notes of a June 2019 CDC report on national vital statistics for deaths in 2017, CDC noted evidence of an increase in false reporting of maternal deaths as a result of incorrect completion of the pregnancy checkbox on death certificates. According to CDC officials, the individual who completed the pregnancy checkbox may have incorrectly noted that a woman was pregnant or had been pregnant within 1 year of her death, and as a result, the death would have been recorded as a maternal death or late maternal death. However, prior to the addition of the pregnancy checkbox, there was a general concern that the United States was not identifying all of the maternal deaths and thus did not have a full picture of maternal mortality. According to CDC officials, the agency has recently taken steps to improve NVSS data on maternal mortality. For example, in 2018, CDC developed training for individuals who complete the cause of death portion of a death certificate, and in 2019 was developing guidance on completing the pregnancy checkbox. The agency also participated in a quality assurance pilot from January 2016 through March 2017 with four states, Georgia, Louisiana, Michigan, and Ohio, to test processes that may improve state-level data on maternal mortality. The results of the pilot were made available in articles in 2019, and CDC officials said the agency is currently disseminating the findings from the pilot to other states. According to agency officials, one of the findings from the pilot was that a greater proportion of deaths where the pregnancy checkbox on the death certificate was marked incorrectly were for women aged 45 and older. As a result, CDC officials said they plan to use additional criteria when classifying deaths for these women. Specifically, they will only code the death as a maternal death or late maternal death if the cause of death is explicitly reported on the death certificate as due to pregnancy or an obstetric cause. CDC officials stated that the changes they made improved the accuracy of data on maternal mortality, and they will implement the new reporting criteria for 2018 data. On January 30, 2020, CDC published maternal mortality statistics in a National Vital Statistics Report. For data on maternal mortality accessible through CDC’s website, CDC officials said they will direct users of these data to its limitations that are noted in the annual report. Officials said they will also publish guidance on the limitations of the maternal mortality statistics, and they will continue to monitor the accuracy of the data. Taking these steps to improve the NVSS data on maternal mortality and noting their limitations should help provide federal, state, and local organizations with accurate data. For example, CDC notes on its CDC WONDER website that state, local, and county health departments rely on this source of publicly accessible data to review their community’s population health trends, evaluate their program’s performance for planning purposes, and compare their community with other locations. In 1986, CDC initiated a second national surveillance system for maternal mortality, PMSS. Unlike NVSS, PMSS is exclusively focused on pregnancy-related deaths. According to CDC, the system was developed because more clinical classification of the causes of these deaths was needed in order to fill data gaps and help clinicians and public health professionals to better understand circumstances surrounding pregnancy- related deaths, including the causes and appropriate actions to prevent them. This collection effort included expanding the scope of deaths under surveillance to those up to 1 year after the end of pregnancy, which is beyond the international standard of up to 42 days after the end of a pregnancy. To collect the additional data, CDC officials annually send requests to vital records offices for all 50 states and other applicable jurisdictions to provide the following: death certificates, linked live birth or fetal death certificates, and any other supporting information for 1) deaths with an ICD-10 Chapter O code for the previous year, and 2) all deaths from any cause (including injury or trauma) among women who were pregnant or were within 1 year of pregnancy as identified by matching the death certificate to a birth or fetal death certificate or by a pregnancy checkbox on the death certificate. According to CDC officials and related literature, linking information on death certificates to information on infant birth or fetal death certificates can help confirm that the pregnancy checkbox on the death certificate was completed accurately. In addition to confirming validity of a pregnancy-related death as indicated by the checkbox, linking information on death certificates to infant birth or fetal death certificates can identify pregnancy-related deaths where the checkbox did not indicate a pregnancy but should have (false negatives). CDC officials said that PMSS data are considered the most reliable source of national data on pregnancy-related deaths because (1) PMSS links death certificates with birth or fetal death certificates and additional information when available (e.g., hospital records), and (2) these files are reviewed by medically trained epidemiologists to determine if the cause and time of death are related to the pregnancy. CDC publishes national data from PMSS on the leading causes of pregnancy-related deaths and pregnancy-related mortality ratios using this system. However, the data are not published annually—such as is generally the case with NVSS data on deaths—and only national level data are made publicly available from PMSS in annual updates on the website and periodically in reports. According to agency officials, states and jurisdictions voluntarily provide the records in response to CDC’s request that specifies that PMSS analyses will only be published at the national and regional level, and those records are subject to confidentiality protections. Additionally, according to CDC officials, because of the time involved in collecting documentation from states, the most recent data available from PMSS as of September 2019 were for deaths in 2016. To improve the timeliness of PMSS data, CDC is taking steps to gain access directly to the records that states have been submitting to the agency. Specifically, CDC entered into a contract, effective August 2019, for a pilot project with the National Association for Public Health Statistics and Information Systems to become an approved user of the State and Territorial Exchange of Vital Events system. According to the National Association for Public Health Statistics and Information Systems, this vital events system provides timely access to state vital records, including records on deaths, to federal and state data partners for use in authorized public health and administrative programs, like those at CDC. According to the contract, over the next 5 years, select CDC staff will receive training on the use of the system and will coordinate phased access to state and jurisdiction vital records. At the conclusion of the contract, authorized CDC staff are expected to have access to electronic vital records data from up to 51 states and jurisdictions. CDC officials said this should allow them to link birth and death certificate information and no longer rely on states and jurisdictions to conduct vital records linkages for PMSS. According to CDC officials, being able to access the vital events system will allow them to confirm and report pregnancy-related deaths with improved timeliness. In 2017, CDC released MMRIA, in which MMRCs— multidisciplinary committees at the state and other jurisdictional level that review pregnancy-related deaths—can collect and review data from various sources (e.g., medical records, social service records, autopsy reports, and vital records) to determine preventability, and identify factors that contributed to these deaths as well as prevention strategies to address these factors. As of June 2019, CDC officials said that 25 states and one other jurisdiction were using this system. While MMRCs provide the information collected in MMRIA, federally published reports only include aggregate information from select states collected through the application. For example, in May 2019, CDC published a study using information from 13 states. In the study, state MMRCs identified an average of three to four contributing factors per pregnancy-related death based on information collected through MMRIA, such as: community factors (e.g., unstable housing and limited access to transportation); health facility factors (e.g., limited experience with obstetric emergencies and lack of appropriate personnel or services); patient factors (e.g., lack of knowledge of warning signs and nonadherence to medical regimens); provider factors (e.g., missed or delayed diagnosis); and system-level factors (e.g., inadequate access to care and poor case coordination). Similar to PMSS data, the most current aggregated data that CDC publishes from the MMRIA can be for deaths that occurred 2 or more years prior to the date of the report. As noted in the May 2019 article, the most recent information from states contributing to the article varied with some state data on these deaths being as recent as 2017 while the most recent data from other states was from 2014. According to CDC officials, in August 2019, CDC awarded 24 cooperative agreements covering 25 states, and under these agreements, the committees will use the system to record review results within 2 years of a death. Our analysis of CDC’s PMSS data shows that from 2007 through 2016, over 6,700 women died of causes related to or aggravated by their pregnancy—either while pregnant or within 1 year of the end of pregnancy. Our analysis also shows that while there was an overall increase in the pregnancy-related mortality ratio during this time frame, the annual mortality ratio in the United States fluctuated. As previously noted, CDC data also show that racial and age disparities exist in the rates of pregnancy-related deaths. For example, from 2007 through 2016, non-Hispanic black women were more than three times as likely to die than non-Hispanic white women, while non-Hispanic American Indian/Alaska Native women were more than two times as likely to die than non-Hispanic white women. Similarly, rates of pregnancy-related deaths for women 35 years old and older are higher than the rates for women under 30 years old. During this time period, the specific causes of death varied by race/ethnicity and age. Further, CDC data show that most of the deaths occurred within 42 days of delivery or the end of pregnancy. CDC’s PMSS data show that among all pregnancy-related deaths, the cause of death varied. In general, what CDC classifies as “other cardiovascular conditions” was the most common cause of pregnancy- related deaths, followed by infection, hemorrhage, and cardiomyopathy. (See fig. 4.) These four leading causes comprised about 50 percent of all pregnancy-related deaths from 2007 through 2016. See appendix I for more information on leading causes of pregnancy-related deaths. CDC data shows that the leading causes of pregnancy-related deaths differed by racial/ethnic groups. Specifically, for non-Hispanic white and black women, the leading cause was other cardiovascular conditions from 2007 through 2016; for non-Hispanic American Indian/Alaska Native and Asian/Pacific Islander women, it was hemorrhage; for Hispanic women, it was infection, as indicated by figure 5. CDC has reported that multiple factors contribute to pregnancy-related mortality and to racial/ethnic disparities, including community, health facility, patient/family, provider, and system factors. Leading causes of pregnancy-related deaths also differed by the age of the woman, as indicated by figure 6. Specifically, the leading cause for women under 25 was infection, while for all other women the leading cause was other cardiovascular conditions. In a 2017 article, the authors noted that maternal morbidity and mortality rates increase with advanced maternal age, due in part to increased prevalence of chronic conditions (e.g., hypertension, diabetes, and chronic heart disease.). This may help explain the variation in the rate of pregnancy-related deaths among women of different ages. Our analysis of CDC’s PMSS data shows that from 2011 through 2016, most pregnancy-related deaths occurred between 0 and 42 days postpartum—meaning that they occurred either on the day of delivery or end of pregnancy up to 42 days after pregnancy. (See fig. 7.) According to CDC officials, understanding the timing of pregnancy-related deaths is important for prioritizing intervention strategies. The officials noted that deaths resulting from cardiomyopathy can occur months after pregnancy but can also be prevented with appropriate interventions. In particular, the American College of Obstetricians and Gynecologists published guidance for managing pregnancy and heart disease that noted that complications are frequently encountered in the days, weeks, and months after delivery in women with known cardiovascular disease and in those with latent cardiovascular disease. Women with multiple risk factors for cardiovascular disease may be particularly at risk of manifesting symptoms for the first time during their postpartum course. CDC’s data show that the leading causes of pregnancy-related death varied depending on when the death occurred. For example, over the period 2011-2016, hemorrhage and amniotic fluid embolism were leading causes of pregnancy-related deaths on the day of delivery or the end of pregnancy, while cardiomyopathy was the leading cause of pregnancy- related deaths between 43 and 365 days postpartum. (See fig. 8.) A recent article on pregnancy-related deaths stated that multiple factors contribute to pregnancy-related deaths during pregnancy, labor and delivery, and the postpartum period. Further, the article notes that no single intervention strategy is sufficient, and reducing these deaths requires reviewing and learning from each death, improving women’s health, and reducing social inequities across the life span, as well as ensuring quality care for pregnant and postpartum women, according to the article. See appendix II for supplemental data on pregnancy-related deaths. State Participation in the Alliance for Innovation on Maternal Health (AIM) Initiative According to the American College of Obstetrics and Gynecology, as of June 2019, 26 states were enrolled in the AIM initiative. The AIM initiative, funded by the Health Resources and Services Administration, engages provider organizations, state-based public health systems, consumer groups and others in a national partnership to assist state- based teams in implementing evidence-based maternal safety bundles. Ten of the 26 states joined in the last year and are beginning to implement maternal safety bundles and collect data. Five of these bundles are being implemented by one or more states. Bundle topics: Maternal Venous Thromboembolism, Postpartum Care Basics for Maternal Safety: From Birth to Comprehensive Postpartum Visit, Obstetric Care for Women with Opioid Use Disorder, Obstetric Hemorrhage, Reduction of Peripartum Racial/Ethnic Disparities, Safe Reduction of Primary Cesarean Birth, Severe Hypertension in Pregnancy, and Postpartum Care Basics for Maternal Safety: Transition from Maternity to Well Woman Care. Preventing Maternal Deaths: Supporting Maternal Mortality Review Committees Cooperative Agreements. Under these cooperative agreements, CDC is providing funding to state agencies and organizations that coordinate and manage MMRCs. As previously mentioned, MMRCs systematically and comprehensively review pregnancy-related deaths in order to identify prevention opportunities. Funding recipients will identify and review deaths within 1 year of death and enter clinical and non-clinical data and committee decisions in MMRIA—a standardized data system managed by CDC—within 2 years of death. As part of the agreement, recipients—in coordination with CDC—analyze data and share findings with stakeholders, such as clinicians, to inform policy and prevention strategies to reduce pregnancy-related deaths, such as screening procedures. According to CDC officials, in August 2019, CDC awarded these 5-year cooperative agreements to 24 recipients covering 25 states. Recipients received different amounts ranging from $150,000 to over $550,000 in the first year to support their MMRC. CDC anticipates awarding a similar level of funding for the 5- year period of performance. Maternal and Child Health (MCH) Services Block Grant Program. HRSA provides funding through this program to 59 states and jurisdictions to improve maternal and child health. According to agency officials, many recipients reported using their MCH Services Block Grant funding to help support or complement other federal initiatives, such as an MMRC, a Perinatal Quality Collaborative (PQC), and Alliance for Innovation on Maternal Health (AIM) maternal safety bundles. For example, according to HRSA officials, in fiscal year 2018, 38 recipients self-reported that the block grant partially or fully funded their MMRCs, and additional states and jurisdictions reported using block grant support for planning activities to begin development of their MMRC. Further, states and jurisdictions cited PQCs, networks of multidisciplinary teams that work to improve measurable outcomes for maternal and infant health, in their block grant narrative. Additionally, implementation of a HRSA-supported AIM maternal safety bundle, sets of actionable, evidence-based practices for improving maternal outcomes was cited. (Appendix III includes more information on funding for PQCs and AIM maternal safety bundles.) Our review of HRSA documentation shows that in fiscal year 2017, total federal expenditures for the block grant program were about $540 million for women and children covered by the program, and expenditures for services for pregnant women from all sources—federal funds, as well as state, local, program income, and other funds—was about $300 million. Indian Health Service (IHS) Implementation of Alliance for Innovation on Maternal Health (AIM) Maternal Safety Bundles In 2017, IHS’s leadership released a request that IHS federal hospitals that provide inpatient obstetric care implement at least one maternal safety bundle—sets of evidence- based practices that when implemented collectively and reliably in the delivery setting may improve patient outcomes and reduce maternal mortality and severe maternal morbidity. According to IHS, since 2014, IHS has had phased implementation of the bundles in federal hospitals that provide inpatient obstetric care. Officials said that for many facilities, Obstetric Hemorrhage was the first bundle implemented. Others have also been implemented, such as the Severe Hypertension in Pregnancy bundle, and the Obstetric Care for Women with Opioid Use Disorder bundle. According to officials we interviewed in five selected states, they use these two efforts—MMRC findings and MCH block grant funding—and other efforts collectively to address pregnancy-related deaths. For example, according to Georgia officials, Georgia’s PQC received funding from CDC and implemented the AIM obstetric hemorrhage maternal safety bundle in 2018 based on the state’s MMRC finding that hemorrhage was a leading cause of pregnancy-related deaths in Georgia. According to officials, Georgia’s MMRC was funded primarily through the MCH Services Block Grant. Similarly, according to Maryland officials, Maryland’s PQC oversees implementation of the state’s AIM initiative. Officials we interviewed from three of the five selected states said that the AIM initiative had an immediate or the largest effect on addressing maternal mortality in their state. Officials from the other two states said they could not identify which efforts had the largest or most immediate effect on addressing maternal mortality. Officials from one state noted the importance of their collaborative approach and the other noted that there is no one contributing factor for maternal mortality. See appendix V for more information about how the selected states we interviewed are using these funding efforts. All five states also mentioned beginning or continuing to address racial/ethnic or other health disparities with block grant funding, through their MMRCs, or other efforts. For example, officials in one state said they use block grant funding to support its Black Infant Health Program, which helps address maternal morbidity and mortality of black mothers in the late maternal period. Additionally, two of the HHS funding efforts awarded in fiscal year 2019 have outcomes related to decreasing racial and ethnic disparities in maternal mortality: the Alliance for Innovation on Maternal Health Community Care Initiative and the State Maternal Health Innovation Program. In addition to those efforts that are exclusive to maternal mortality or have a focus on maternal mortality, HHS agencies have other funding efforts that may reduce maternal mortality by improving maternal health. For example, agency officials also identified the following: HRSA’s Maternal, Infant, and Early Childhood Home Visiting Program supports voluntary, evidence-based home visiting services for at-risk pregnant women and parents with children up to kindergarten entry. Our review of agency documentation shows that in fiscal year 2019, HRSA awarded about $351 million in funding to 56 states, territories, and nonprofit organizations to support communities in providing voluntary evidence-based home visiting services through the Maternal, Infant, and Early Childhood Home Visiting Program. The Substance Abuse and Mental Health Services Administration, which is responsible for leading public health efforts to advance the behavioral health of the nation and reducing the impact of substance abuse and mental illness on America’s communities. The agency funds two programs that provide grants to public and private nonprofit entities and state substance abuse agencies for substance use disorder treatment and recovery services for pregnant and postpartum women. Our review of agency documentation and interviews with agency officials shows that from fiscal year 2017 through 2019, the Substance Abuse and Mental Health Services Administration awarded 41 Services Grant Program for Residential Treatment for Pregnant and Postpartum Women and six State Pilot Grant Program for Treatment for Pregnant and Postpartum Women grants. The Centers for Medicare & Medicaid Services, which administers the Medicare and Medicaid programs, developed the Maternal Opioid Misuse Model. Through this model, state Medicaid agencies will coordinate with care-delivery partners to test whether payments for evidence-based, coordinated care delivery improve outcomes and reduce costs for pregnant and postpartum Medicaid beneficiaries with opioid use disorder and their infants. According to agency officials, funding for cooperative agreements with 10 state Medicaid agencies began in January 2020. We provided a draft of this report to HHS. HHS provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of HHS, and appropriate congressional committees. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact me at (202) 512-7114 or deniganmacauleym@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. In 1986, the Centers for Disease Control and Prevention (CDC) initiated national surveillance of pregnancy-related deaths in the Pregnancy Mortality Surveillance System (PMSS) because more clinical information was needed to fill data gaps about causes of these deaths. A pregnancy- related death, as defined in statute, is the death of a woman while pregnant or within 1 year of the end of a pregnancy—regardless of the outcome, duration or site of the pregnancy—from any cause related to or aggravated by the pregnancy or its management, but not from accidental or incidental causes. As of September 2019, CDC used 11 categories when coding the cause of death for pregnancy-related deaths in PMSS, and 2016 data were the most recent data available. From 2007 through 2016, there were 6,765 pregnancy-related deaths, according to PMSS data. See table below for information on the 11 cause of pregnancy-related death categories, including PMSS data on leading causes, most common time frame, and most common age group affected. The following tables include supplemental data on pregnancy-related deaths by racial/ethnic and age groups. As of September 2019, the Department of Health and Human Services was providing funding for 13 efforts with a stated outcome, goal, or focus on reducing pregnancy-related deaths. One of the these—Supporting Maternal Mortality Review Committees—is funded by CDC and has an exclusive focus on reducing deaths of the women during pregnancy or up to 1 year of pregnancy, while the other 12 have additional focus areas, such as improving infant health. Two of these efforts are not discrete funding opportunities, but rather a variety of research funding opportunities offered by the Health Resources and Services Administration and the National Institutes of Health. Table 5 lists the 13 efforts, their current awards, funding, purpose, and examples of goals or research. Health Resources and Services Administration (HRSA) and National Institutes of Health (NIH) officials noted research the agencies support, including funding related to maternal health that also includes projects specific to maternal mortality or that can affect maternal mortality. The Maternal and Child Health Bureau supports field-based, applied and translational research through an extramural research program that provides leadership and funding that support innovative research to inform practitioners, the scientific community, and the public. According to HRSA officials, this research program helps to advance the field of maternal and child health; improve the health and well-being of women, children, and families; and address the needs of economically or medically vulnerable maternal and child health populations. According to HRSA officials, in fiscal year 2018, HRSA awarded a total of about $1.2 million in funding for six research projects related to maternal illness. The following HRSA website includes an option for searching for funded projects using key terms, https://mchb.hrsa.gov/research/. Baeva, S., D.L. Saxton, K. Ruggiero, et al. “Identifying Maternal Deaths in Texas Using an Enhanced Method, 2012”, Obstetrics & Gynecology, vol. 131, no. 5 (2018): 762-769. Casey, M.M., P. Hung, C. Henning-Smith, et al. “Rural Implications of Expanded Birth Volume Threshold for Reporting Perinatal Care Measures.” Joint Commission Journal on Quality and Patient Safety, vol. 42, no. 4 (2016): 179-187. Hung, P., K.B. Kozhimannil, M.M. Casey, et al. “Why Are Obstetric Units in Rural Hospitals Closing Their Doors?” Health Services Research, vol. 51, no. 4 (2016): 1546-1560. Kozhimannil, K.B., C. Henning-Smith, P. Hung, et al. “Ensuring Access to High-Quality Maternity Care in Rural America.” Women’s Health Issues, vol. 26, no. 3 (2016): 247-250. Kozhimannil, K.B., P. Hung, M.M. Casey, et al. “Factors Associated with High-Risk Rural Women Giving Birth in Non-NICU Hospital Settings.” Journal of Perinatology, vol. 36, no. 7 (2016): 510-515. Kozhimannil, K.B., M.M. Casey, P. Hung, et al. “Location of Childbirth for Rural Women: Implications for Maternal Levels of Care.” American Journal of Obstetrics and Gynecology, vol. 214, no. 5 (2016): 661e1- 10. Kozhimannil, K.B., C. Henning-Smith, and P. Hung. “The Practice of Midwifery in Rural US Hospitals.” Journal of Midwifery & Women’s Health, vol. 61, no. 4 (2016): 411-418. Kozhimannil, K.B., P. Hung, M.M. Casey, et al. “Relationship between Hospital Policies for Labor Induction and Cesarean Delivery and Perinatal Care Quality among Rural U.S. Hospitals.” Journal of Health Care for the Poor and Underserved, vol. 27, no. 4 (2016): 128-143. Weigel, P.A., F. Ullrich, D.M. Shane, et al. “Variation in Primary Care Service Patterns by Rural-Urban Location.” Journal of Rural Health, vol. 32, no. 2 (2016): 196-203. NIH support research, including funding maternal health research through a number of its institutes and centers, such as the Eunice Kennedy Shriver National Institute of Child Health and Human Development; the National Heart, Lung, and Blood Institute; the National Institute of Alcohol Abuse and Alcoholism; the National Institute of Diabetes and Digestive and Kidney Diseases; the National Institute of Mental Health; the National Institute of Nursing Research, and the Office of Research on Women’s Health. For example, NIH officials noted that The Eunice Kennedy Shriver National Institute of Child Health and Human Development supports essential research designed to overcome many of the complex challenges that women encounter in trying to achieve and maintain healthy pregnancies, and to prevent maternal mortality and severe maternal morbidity. In fiscal year 2018, NIH funded 661 projects totaling almost $303 million that included a focus on maternal health. The following NIH website includes a link to funded research for fiscal years 2015 through 2018 and estimates for fiscal year 2019 and 2020 by category, including maternal health, https://report.nih.gov/categorical_spending.aspx. MacDorman, M.F., E. Declercq , and M.E. Thoma. “Making Vital Statistics Count: Preventing U.S. Maternal Deaths Requires Better Data.” Obstetrics & Gynecology, vol. 131, no. 5 (2018): 759-761. MacDorman, M.F., E. Declercq, H. Cabral, et al. “Recent Increases in the U.S. Maternal Mortality Rate: Disentangling Trends from Measurement Issues.” Obstetrics & Gynecology, vol. 128, no. 3 (2016): 447-455. Thoma, M.E., D.A. De Silva, and M.F. MacDorman. “Examining Interpregnancy Intervals and Maternal and Perinatal Health Outcomes Using U.S. Vital Records: Important Considerations for Analysis and Interpretation.” Paediatric and Perinatal Epidemiology, vol. 33, no. 1 (2019): O60-O72. Brogly, S.B., K.E. Saia, M.M. Werler, et al. “Prenatal Treatment and Outcomes of Women with Opioid Use Disorder.” Obstetrics & Gynecology, vol. 132, no. 4 (2018): 916-922. Dimidjian, S., S.H. Goodman, J.N. Felder, et al. “Staying Well During Pregnancy and the Postpartum: A Pilot Randomized Trial of Mindfulness-based Cognitive Therapy for the Prevention of Depressive Relapse/Recurrence.” Journal of Consulting and Clinical Psychology, vol. 84, no. 2 (2016): 134-145. Hauspurg, A., S. Parry, B.M. Mercer, et al. “Blood Pressure Trajectory and Category and Risk of Hypertensive Disorders of Pregnancy in Nulliparous Women.” American Journal of Obstetrics and Gynecology, vol. 221, no. 3 (2019): 277.e1-277.e8. Liu, T., M. Zhang, E. Guallar, et al. “Trace Minerals, Heavy Metals, and Preeclampsia: Findings from the Boston Birth Cohort.” Journal of the American Heart Association, vol. 8, no. 16 (2019): e012346. Miller, E.C., M. Gallo, E.R. Kulick, et al. “Infections and Risk of Peripartum Stroke during Delivery Admissions.” Stroke, vol. 49, no. 5 (2018): 1129-1134. Sheen, J.J., J. D. Wright, D. Goffman, et al. “Maternal Age and Risk for Adverse Outcomes.” American Journal of Obstetrics and Gynecology, vol. 219, no. 4 (2018): 390.e1-390.e15. To describe how selected states use Department of Health and Human Services (HHS) funds to implement select efforts to reduce maternal mortality, we interviewed officials from five states—California, Georgia, Illinois, Maryland, and Texas—selected because of their geographic diversity and because these state have the following efforts shown in Table 6. Officials from three of the five states we interviewed said that the Alliance for Innovation on Maternal Health (AIM) Initiative had an immediate or the largest effect on addressing maternal mortality in their state. Officials from the other two states said they could not identify which efforts had the largest or most immediate effect on addressing maternal mortality. Officials from one state noted the importance of a collaborative approach and the other noted that there is no one contributing factor for maternal mortality. Some of the HHS-funded efforts previously described in appendix III had not been awarded at the time of our interviews, such as the State Maternal Health Innovation Program cooperative agreements. See table 6 below for information about these states’ efforts. Mary Denigan-Macauley, Director, (202) 512-7114 or deniganmacauleym@gao.gov. In addition to the contact above, Raymond Sendejas (Assistant Director), Natalie Herzog (Analyst-in-Charge), Sam Amrhein, Margaret Cullinan, Kaitlin Dunn, Laura Ann Holland, Diona Martyn, Jennifer Rudisill, and Vikki Porter made key contributions to this report. Other contributors include Jieun Chang, Leia Dickerson, Sandra George, and Amy Leone.", "summary": "Every year in the United States, hundreds of women die of complications related to pregnancy and childbirth. According to CDC data, racial/ethnic disparities exist with regard to these deaths. For example, non-Hispanic black women were more than three times as likely to die as non-Hispanic white women, and non-Hispanic American Indian/Alaska Native women were more than two times as likely to die as non-Hispanic white women. GAO was asked to review issues related to maternal mortality in the United States. In this report, GAO describes, among other things, (1) trends in pregnancy-related deaths in the United States, including trends in causes and timing of these deaths, and (2) HHS funding efforts focused on reducing pregnancy-related deaths. GAO reviewed documentation about HHS's surveillance efforts related to pregnancy-related deaths; and analyzed CDC data on leading causes of pregnancy-related deaths from 2007 through 2016 (the most recent 10-year period available at the time of GAO's review). GAO also reviewed documentation and interviewed HHS and state public health officials in five selected states about HHS's funding efforts aimed at reducing pregnancy-related deaths, including select efforts used in these states. GAO selected these states primarily based on their geographic diversity and their implementation of select efforts to address maternal mortality. GAO provided a draft of this report to HHS. HHS provided technical comments, which GAO incorporated as appropriate. GAO's analysis of the Centers for Disease Control and Prevention's (CDC) Pregnancy Mortality Surveillance System data shows that from 2007 through 2016, over 6,700 women died of causes related to or aggravated by their pregnancy—either while pregnant or within 1 year of the end of pregnancy. While CDC data show an overall increase in the pregnancy-related mortality ratio in the United States during this time frame, the annual ratio fluctuated. Cardiovascular conditions, infection, and hemorrhage were the leading causes of pregnancy-related deaths, and comprised about 50 percent of all pregnancy-related deaths from 2007 through 2016. In addition, CDC data show that the leading causes of pregnancy-related deaths differed by racial ethnic groups. (See figures.) The Department of Health and Human Services has 13 ongoing efforts aimed at reducing pregnancy-related deaths. The following are key examples of these: Supporting Maternal Mortality Review Committees Cooperative Agreements . According to CDC officials, in September 2019, CDC awarded 5-year cooperative agreements to 24 recipients covering 25 states with amounts ranging from $150,000 to over $550,000 in the first year, totaling about $8.4 million. Under these agreements, CDC is providing funding to state agencies and organizations that coordinate and manage Maternal Mortality Review Committees. The committees are responsible for comprehensively reviewing deaths to identify prevention opportunities. Maternal and Child Health (MCH) Services Block Grant Program .The Health Resources and Services Administration provides funding through this program to 59 states and jurisdictions to improve maternal and child health. In fiscal year 2017, total expenditures for services for pregnant women from all sources—federal funds, as well as state, local, program income, and other funds—was about $300 million. According to agency officials, many recipients reported using their block grant funding to help support or complement other federal initiatives, such as their review committee, quality collaborative, and use of maternal safety bundles. According to officials GAO interviewed in five selected states, they use these efforts and others collectively to address pregnancy-related deaths. For example, according to officials in one state, they implemented an obstetric hemorrhage maternal safety bundle in 2018 based on the state's Maternal Mortality Review Committee finding that hemorrhage was a leading cause of pregnancy-related deaths in the state. According to officials, the state's Maternal Mortality Review Committee was funded primarily through the MCH Services Block Grant. All five states also mentioned beginning or continuing to address racial/ethnic or other health disparities with block grant funding, through their Maternal Mortality Review Committees, or other efforts. For example, officials in one state said they use block grant funding to support their Black Infant Health Program, which helps address maternal morbidity and mortality of black mothers in the late maternal period. Additionally, two of the HHS funding efforts awarded in fiscal year 2019 have outcomes related to decreasing racial and ethnic disparities in maternal mortality: the Alliance for Innovation on Maternal Health Community Care Initiative and the State Maternal Health Innovation Program.", "document_type": "gao"}
{"report": "FAA defines an FBO as a business granted the right by the airport to operate fueling facilities, hangars, aircraft tie-downs, aircraft rental, aircraft maintenance, flight instruction, and other aeronautical services at an airport. In addition, FBOs sometimes manage parking ramps for transient aircraft at the airport. FBOs may charge a fee for parking, as they also maintain the ramp areas for the airport. According to FAA, airports, within certain parameters, have the ability to charge or not to charge users for access to airport ramp space. FBOs generally serve pilots who operate general aviation aircraft, but can also support commercial flights. The type of amenities and services any one FBO provides varies. For example, representatives of one FBO said that it provides high-level customer service and offers more services such as catering, pilot lounges, concierge services, and aircraft maintenance and repair facilities for its clients. See figure 1 for an illustration of FBO services. As of March 2019, we identified 3,070 FBOs operating at 3,016 airports located in the contiguous United States; these airports are included in FAA’s National Plan of Integrated Airport Systems (NPIAS). FBOs can be run by the airport, an independent operator, or a network chain with multiple locations. The Transportation Research Board estimated in 2016 that 47 percent of all FBO locations were airport-operated. Most stakeholders with whom we spoke agreed that there are fewer FBOs today than in the past, although estimates vary on the extent of the decline in FBO numbers. Stakeholders we interviewed said that this decline is due to factors such as a drop in general aviation activity that resulted in a reduction in fuel sales. More recent innovations, such as more fuel-efficient aircraft and decision-making software that provides information to pilots on where to purchase fuel to fly more efficiently, also contributed to the decline. Airports that receive federal AIP grants contractually agree to FAA “grant assurances” that require those airports to adhere to certain requirements. One of those key grant assurances is a prohibition of unjust economic discrimination. This assurance requires airports to provide to users equal access to airport facilities. Likewise, tenant businesses (e.g. FBOs) operating at airports are required to make services available and price those services not in an unduly discriminatory fashion. Although FAA is required to ensure that airports, as a condition for accepting federal grants, provide fair and equal access to services and nondiscriminatory pricing, FAA does not regulate prices in the FBO industry. As a condition of accepting federal grants, airports have a responsibility to ensure that they and their contractors and concessionaires abide by the grant assurances. FAA’s Airport Compliance Office oversees airports’ adherence to grant assurances by taking and responding to inquiries and complaints, developing and circulating advisories and guidance documents, and coordinating with airports and industry to conduct compliance training and airport land use inspections. The Department of Justice (DOJ) also plays a role in overseeing the FBO industry under its antitrust responsibilities to preserve competition. For example, in the Final Judgement entered by a federal court in the DOJ’s case regarding the acquisition by BBA Aviation (Signature Flight Support) acquisition of Landmark Aviation, BBA was required to divest FBO facilities in six locations where the transaction would have created a monopoly or duopoly for FBO services. In addition, the court order required BBA to provide advance notice of certain future acquisitions for the 10-year duration of the final judgment. Based on our review of FBO and third party websites, we found that fuel prices at FBOs are readily available to anyone on the internet. Nearly all of the pilots we spoke with told us they use these resources for making flight plans. For example, current prices for fuel are readily available on third party websites such as AirNav and Sky Vector, among others, and on about a third of the websites for FBOs we visited. See figure 2 for a representation of a website providing FBO information. However, fees for other services such as for parking and aircraft handling are less transparent. Our review of FBO and third-party websites found that such fees are not always available online, and that fees may vary by type of aircraft, are sometimes waived, and are called by different terms. According to FBO staff we spoke with, fees for services other than fueling can be lengthy and unwieldy to post on their websites for multiple reasons. First, some fees will vary based on the size and approved weight of the aircraft. For example, the price sheet for services other than fuel at one FBO showed fees varying by the aircraft’s approved weight, so there were 11 different prices for each of those services. The same pricing sheet also included prices for dozens of incidental services, such as aircraft towing and lavatory service that are not based on aircraft weight. Additionally, customers may be eligible for discounts on fuel purchases either by volume or through a membership program. FBOs may also waive fees in some cases—for example, with a qualifying fuel purchase an FBO might waive a parking, ramp, or handling fee. Further, a few stakeholders and pilots we spoke to indicated that FBOs don’t always use the same terms for a fee. For example, a landing fee or a ramp fee might be a fee for doing essentially the same thing. Consequently, to find out how much an FBO visit will cost, 16 of the 18 pilots we interviewed told us they call the FBO in advance. Based on information such as their type of aircraft, length of stay, and other services they might require, the FBO provides an estimate of their total cost. Recently, some industry stakeholders have called for increased price transparency and consistency among FBOs regarding how they characterize their fees, and have taken some actions to increase the transparency of fees. A campaign called, “Know Before You Go,” developed through the cooperation of six aviation associations, encourages FBOs to communicate and expeditiously provide available services and a listing of currently applicable posted fuel prices, as well as fees and charges for other available services. Further, the campaign suggests that these fees and charges should be made accessible to aircraft operators online in a user friendly manner and with sufficient clarity. Additionally, it encourages customers to contact the FBO to ask questions so pilots can make informed decisions. In response, one large- chain FBO began posting fees online for piston aircraft at its locations and another FBO company created a trip calculator on its web site for pilots to calculate the cost of their visit (see fig 3). We also found that a third party company recently began a web site that provides FBO parking ramp fees similar to those providing fuel prices. In addition, AOPA invited FBOs to include their fees in the association’s online airport directory. The association also indicated it categorizes the variety of fees into basic types of fees such as landing, using a hanger, or using lavatory service to help clarify what pilots could be expected to pay. In October 2019, AOPA officials indicated that FBOs’ posting of fees had not increased as much as they hoped. Selected stakeholders we interviewed—including officials from 26 airports, 16 FBOs, as well as 18 general aviation pilots—highlighted key factors that may influence FBO prices at airports across the country. Our statistical model confirmed a correlation between certain key factors identified by stakeholders and FBO prices. Consistent with general economic theory, these factors fall into three groups: (1) an FBO’s costs, (2) demand for an FBO’s services, and (3) competition among FBOs. Selected stakeholders we interviewed highlighted cost factors such as airport leases, infrastructure investment, fuel, labor, and security as influencing FBO prices. They cited the following examples: Airport Leases. Airport leases dictate terms and conditions of contracts between an FBO and an airport and include provisions related to the services an FBO must provide for pilots. Depending on the specific requirements or minimum standards developed at a given airport, FBO lease requirements vary and can affect an FBO’s costs. For example, at one airport we visited, the FBO is required to offer an after-hours self-service fueling option, which necessitates the acquisition and maintenance of additional equipment. In another case, the manager at an FBO we spoke to said that its overhead costs are relatively high because it is required to offer flight training and aircraft maintenance as part of its lease. To offer these services the FBO needs additional hangar space and must pay qualified skilled employees. Infrastructure Investment. As with leasing costs, the greater the investment an FBO makes at an airport, the higher its prices to users may be. According to airport and interest group officials we spoke with, FBOs typically have 20 to 30 year leases during which they may make infrastructure investments such as building hangars or lounges, based on FBO’s assessment of customer demand for its services. For example, according to airport and FBO officials we spoke to, an FBO will choose to invest in high-end facilities and amenities if it determines there is sufficient demand and revenues earned are expected to be sufficient to recoup the costs over the term of the lease. Fuel Transportation Costs. FBOs generally sell two types of aviation fuel for general aviation aircraft: Jet A and 100 low lead (100LL). Jet A is generally delivered over long distances via pipeline. According to one petroleum company, 100LL is generally moved by truck, rail, or barge—less cost-effective methods of transport than pipeline—due to the smaller volumes being produced. Further, there are parts of the United States, specifically on the East Coast, where little or no 100LL is produced and, as a result, transportation costs can significantly affect the cost of fuel to the FBO. Labor costs. FBOs compete in the local labor market for staff. The cost of labor for FBOs may vary across local labor markets around the country. Further, a particular FBO may need specialized skills to provide the services they offer, and this factor can affect the FBO’s costs. For example, some FBOs offer maintenance services, so will have trained mechanics on staff to perform such services. State taxes. Aviation fuel excise taxes on 100LL vary considerably from state to state and may also affect the costs to a consumer. For example, both Oregon and Idaho have a lower state aviation fuel tax compared to neighboring Washington State. An FBO manager told us that in some cases, a pilot will fly over to Idaho to obtain less expensive fuel, even though he or she may base the aircraft in Washington. Security. Some airports—particularly those with commercial service—are responsible for implementing security requirements in accordance with their Transportation Security Administration (TSA)- approved security programs, notably the security of perimeters and access controls protecting restricted areas of the airport, such as ramps and taxiways. We found that some FBOs are responsible for security and access controls on their leased property based on our review of individual lease requirements and the airport security plan. These FBOs might require staff on site 24 hours a day to maintain airfield and perimeter security, a requirement that can increase FBO costs. For example, an FBO operating at an airport with commercial service told us that it is responsible for perimeter security on the land it leases from the airport. In addition, it is subject to unannounced security checks by TSA. In contrast, smaller general aviation airports without commercial service are not required to have as many security requirements. Selected stakeholders told us that the location of an airport may influence demand for FBO services. Economic theory indicates that increased demand for a service will generally result in increased prices, all else equal. In particular, stakeholders cited the following examples of demand factors that may influence prices: Busy and congested airports may have higher prices for FBO services due to greater demand. Prices may be higher during part of the year in locations with significant seasonal traffic, such as beach resorts with a summer high season and ski resorts with a winter high season. The increased demand at FBOs during high seasons results in higher prices than during the off season. An airport’s proximity to the central business district may be associated with higher demand and higher prices in such locations. In addition to cost and demand factors, the extent to which the market for FBO services is competitive may also influence prices. According to the stakeholders we interviewed, competition among FBOs may lead to lower prices than would be the case when only one FBO provides the service at that airport. In our analysis of FAA airport and FBO data, however, we found that nearly 90 percent of NPIAS airports that offer FBO services are served by only one FBO (see table 1). According to a Transportation Research Board report, a strong indicator of the number of FBOs that can be financially viable at an airport can be the amount of fuel sales. For example, two airport managers we spoke to said that there was an insufficient volume of fuel sold at their airports to support more than one FBO. While the majority of NPIAS airports in the contiguous United States have only one FBO, pilots we spoke to said that competition from FBOs at nearby airports can also affect prices. For example, within 30 miles of Spokane International Airport, there are five other airports, each of which is served by an FBO that may compete with the services provided at Spokane International. (See fig. 4) We asked selected managers of FBOs and airports and selected general aviation pilots to describe how off-airport competition may influence FBO pricing. FBO and airport managers told us that they view nearby airports as competitors and monitor the FBO prices at these locations. For example, an FBO manager in Maine told us he regularly checks the prices at the larger international airport that is nearby. This finding suggests that when an FBO sets its prices, it takes into account the extent to which nearby airports may compete for its services. On the buyer’s side of the market, 11 of the 18 general aviation pilots we interviewed told us that they generally “price shop” for aviation fuel. Further, most general aviation pilots we spoke with told us they use online flight-planning tools to map their route and consider the fuel cost and service fees of the airports along that route. Further, four pilots and an FBO manager indicated that on longer trips that require refueling before reaching a destination, pilots may have options that are hundreds of miles from each other. For example, when flying from California to Texas, a pilot could choose to stop either in New Mexico or Arizona to obtain fuel. In this scenario, a pilot would compare prices of many FBOs in those two states and likely choose one with lower fuel prices. Likewise, an FBO manager in Kansas indicated that for these types of customers, he competes with FBOs at airports more than 100 miles away. However, we interviewed some pilots who said that they do not consider every nearby airport as a substitute. To be a true substitute the airport must meet the pilot’s needs to be a viable option. For example, the airport’s runway must be of sufficient length for the aircraft, and some runways may be too short for certain aircraft. Also, pilots take into account the type of fuel offered at an FBO. The pilot of a piston-driven aircraft will be unable to refuel at an FBO that offers only jet fuel. Finally, some pilots said the price differential would need to be sufficiently large to compensate them for any inconvenience. Some mentioned that the price of 100LL would have to be 30 to 40 cents per gallon lower to affect their flight plan, while others put that threshold at a lower point, 25 to 30 cents per gallon. Pilots also told us they take travel time into account. For example, some pilots said that they would consider landing at an alternative airport with lower prices if it were no more than 20 to 30 miles out of their way and if the change in destination were to add no more than 10 to 20 minutes to their trip. As a first step in examining the relationship of FBO competition with pricing, we examined differences in the average posted prices for 100LL and Jet A across NPIAS airports in the contiguous United States where only one FBO sold a fuel type compared to airports at which more than one FBO sold that fuel, without controlling for other factors that might also be correlated with prices. We also calculated the average prices at airports with one FBO and airports with multiple FBOs for a subset of airports with an air traffic control tower. We examined this subset of towered-airports, as they generally have more operations, and thus more demand. As shown in table 2 below, the average price per gallon of aviation fuel was lower at airports with only one FBO than at airports with on-airport competition. For example, at airports with only one FBO, the average price posted for full-service 100LL was $5.01 per gallon, while the average price posted at airports with more than one FBO was about 73 cents higher. However, examining average differences in price fails to control for other factors that might be correlated with prices. In particular, airports that have more than one FBO are likely to be those that have higher traffic volumes and that are located in areas with larger populations and higher per-capita incomes—all factors likely correlated with higher prices. Therefore, to more fully assess the issue, we developed a statistical model that examines how fuel prices may be correlated with measures of competition when controlling for other factors, such as demand, that also may be correlated with prices. Our statistical model confirmed a correlation between selected cost and demand factors and FBO-posted pricing of full-service 100LL and Jet A. It also confirmed a correlation between some of the competition factors described by stakeholders and the price of aviation fuel. Our analysis included information on posted prices for both 100LL as well as Jet A. In addition to running the model for NPIAS airports in the contiguous United States for which posted prices were available (all-airports), we also ran the model for a subset of these airports that have air traffic control towers (towered-airports). See appendix II for a more detailed discussion of the model structure and findings. As we have noted, we expected fuel prices to be correlated with a variety of cost, demand, and competition factors that pertain to characteristics of airports and their locations, as well as characteristics of FBOs operating at airports. We found the following correlations: Airport Characteristics. Our model found that the size of an airport—measured as the total number of operations—was associated with higher prices for both 100LL and Jet A. The operational size of an airport is likely associated with higher demand for airport services and also is likely related to higher costs of providing those services. Specifically, we found that an increase of 10,000 airport operations per year was associated with higher prices of about 2 cents per gallon for both 100LL and Jet A in both the all-airports and towered-airports datasets. The length of the longest runway available at an airport was also correlated with higher fuel prices. The length of the runway is an indicator of the types of aircraft an airport can support. In particular, longer runways are able to accommodate larger and heavier aircraft— aircraft that generally use more fuel and thus may indicate higher demand for fuel at the airport. Specifically, we found that a 1,000-foot increase in runway length was associated with a higher price of about 7 to 8 cents per gallon for both fuels. Demographic Characteristics of Airport Location. Our analysis found that FBOs’ fuel prices were generally higher at airports in areas with higher incomes, but not always at airports in areas with larger population. We found that prices for both types of fuel were higher at airports located in counties with higher per-capita incomes. Where incomes are higher, we would expect the demand for travel to be greater. Moreover, where there are higher incomes, the cost of providing FBO services—particularly labor costs—are likely higher. We found income correlated with fuel prices for both the 100LL and Jet A in the all-airports datasets and for 100LL in the towered-only airport dataset. We also found that 100LL aviation fuel prices were higher at airports located in counties with larger populations. This was expected due to the likely greater demand for air travel in more populous areas. However, county population was not statistically significant in relation to the price of Jet A. Geographic Characteristics of Airport. Our model found that airports located in states on the East Coast tend to have higher 100LL prices. Specifically, the model suggests that 100LL prices are between 22 to 26 cents higher per gallon on average in these states. We expected FBOs operating in East Coast states to have higher 100LL prices due to higher transportation costs, as we found that there is no production of 100LL in these states. As mentioned earlier, 100LL is generally moved by truck, rail or barge due to the smaller volumes being produced—a less cost-effective means of transport than pipeline. Jet A, on the other hand, is transported by pipeline over long distances. We thus expected higher prices for 100LL at airports in these states. We found this geographic differential in all specifications for the 100LL model. Large-Chain FBOs. Our model found that both types of fuel tend to have higher posted prices at airports that have a large-chain FBO operating on the premises, regardless of whether or not there was another competitor on the premises. Specifically we found that when a large-chain FBO operates at an airport, fuel at the airport tends to be more expensive on average—on the order of 60 cents more per gallon for 100LL, and an even greater differential for Jet A, more than $1.20 per gallon. Availability of Self-Serve 100LL fuel. Our model found that when self-serve 100LL is available at an airport, the prices for full-serve 100LL tend to be lower than at airports with no self-serve 100LL available. Specifically, we found that if a self-serve 100LL option is available at an airport, the price of full-service 100LL will be about 10.5 cents per gallon lower, on average, compared to FBOs at airports without self-service 100LL. We expected a self-service option might be correlated with somewhat lower prices for full service 100LL—even if the full service option is provided by the same FBO— because pilots are presented with a lower price option may constrain the prices that FBOs will charge for a full-service option. Competition. Within our statistical model, we examined whether the extent of competition among FBOs had a correlation with fuel pricing in two ways. On-airport competition. On-airport competition occurs when two or more FBOs at an airport sell the same kind of fuel. We estimated that the price of Jet A is lower, on average, at an airport when two or more FBOs provided that fuel at an airport. Specifically, for the all-airports dataset, we found that, on average, the posted price of Jet A was 35 cents per gallon higher if only one FBO sold the fuel at an airport compared to the case when at least one additional competitor also served the airport. In the towered-airports dataset, the posted price of Jet A was about 50 cents higher on average if there were only one FBO at the airport. For 100LL, we did not find a statistical relationship between on- airport competition and prices in the all-airports dataset; however, we did find a statistical relationship between on-airport competition and prices in the towered-airports dataset. The finding of no correlation between on-airport competition and 100LL prices may be linked to the rarity of airports with more than one FBO selling 100LL in the all-airports dataset. In fact, in the all-airports dataset, only 13 percent of FBOs faced on-airport competition in the sale of 100LL while in the towered-airports dataset about one-third of FBOs faced competition in the sale of 100LL. Specifically, we estimated that the price of 100LL is 11 cents lower, on average, if there are at least two FBOs selling that fuel at a towered airport. Nearby competition. Our model also tested whether the availability of additional FBOs at airports within a 30-mile distance from a given airport had any correlation to prices for 100LL. We included this factor because many of the stakeholders we spoke to noted that general aviation pilots will consider using an airport near their preferred airport if prices were more favorable at the alternative location. However, across all model specifications, we did not find that prices for 100LL were correlated with the presence of FBOs at nearby airports. FAA officials told us they primarily rely on airports to self-certify their compliance with federal airport grant assurances when they accept AIP grant funding. This reliance includes the grant assurance that relates to FBO fees—an airport must ensure aeronautical services are available to all users on a reasonable and not unjustly discriminatory basis. FAA officials indicated that airport compliance staff conduct outreach to stakeholders and provide training aimed at ensuring that airports comply with these assurances. One recent outreach effort focused on FBO pricing. Additionally, FAA responds to phone and email inquiries and informal and formal complaints, and conducts periodic airport land use inspections, as discussed below, but none of these efforts has identified FBO pricing as a widespread area of concern. Training and Outreach. According to FAA, compliance staff conducts periodic training and outreach to the airport community on a variety of compliance issues. FAA headquarters annually conducts recurrent compliance training—which includes overseeing airport grant assurances—with regional and other FAA offices. FAA officials told us they use these sessions to address concerns brought up by regional compliance officials and airport compliance staff. One example of FAA’s outreach efforts occurred in December 2017 after AOPA raised questions about FBO pricing earlier that year. To bring clarity to the issue of FBO pricing and the role of FAA, the agency released questions and answers that emphasized: (1) FAA does not regulate FBO prices; and (2) airports are responsible for ensuring FBO prices are reasonable and applied in a non-unjustly discriminatory manner. Furthermore, FAA stated that whether an FBO’s fees are reasonable (i.e., higher than average than other FBOs) involves a number of economic, business, and other factors that vary widely from airport to airport and FBO to FBO and may include underlying costs, market conditions, quality of service, and other factors. Inquiries and Complaints. According to FAA, airport compliance staff respond to (1) phone and e-mail inquiries, (2) informal complaints, and (3) formal complaints. FAA officials told us that, while FAA does not regulate FBO prices, if someone contacts them with inquiries or a concern about a potential grant assurance violation, such as one involving FBO prices, they first refer the issue to the local airport to resolve. If the issue is not resolved, the complainant may file an informal complaint with an FAA regional office. According to FAA guidance, each FAA regional office will review the complaint and issue a letter indicating whether FAA sees a grant violation that the airport should fix or not. If the complainant is dissatisfied with the regional office’s letter, the complainant may then file a formal complaint about a violation of grant assurances with headquarters. Headquarters will then review the circumstances of the complaint and make a formal determination as to whether a grant violation occurred and work with the airport to address the violation. Data on informal and formal complaints filed with FAA headquarters and regional offices indicate FAA has not received many complaints on FBO pricing. Specifically, we reviewed informal complaint data from 2013 through 2018 from each FAA region, and found a total of 142 informal complaints about potential grant violations. Seven of these complaints related to FBO prices, and FAA found one violation later resolved by the airport by providing space for aircraft to do routine maintenance. In addition, we obtained and reviewed FAA’s responses to formal complaints from 2013 through 2018, and found that none of these formal complaint responses dealt with FBO prices. While FAA received few complaints related to FBO prices, there are limitations in relying on complaint data to understand the magnitude of an issue. For example, some pilots we spoke with stated if they have an issue with an FBO, they will use an alternative FBO rather than submit a complaint to FAA. We found that in addition to informal and formal complaints, each FAA regional office independently records inquiries about airport grant assurance issues ranging from inappropriate hanger use to noise complaints to FBO lease arrangements. Further, each region varies in the way it captures airport compliance information such as airport location, dates, and description of an inquiry or concern. For example, some regions indicate the specific grant assurance that was potentially violated while others simply describe the nature of the concern. To help see if there is a pattern of concerns across the country, FAA’s Office of Airport Compliance in headquarters has an initiative to centralize information on inquiries and concerns about grant assurances, including any that may be related to FBO prices. As envisioned, this “Enhanced Information Sharing Initiative” will provide FAA compliance staff with the ability to record and track inquires and complaints in comparable systems and should facilitate information sharing among regions and between regions and headquarters. According to FAA officials, centralizing this information will help identify issues that may be of a concern to airport users. According to FAA officials, this initiative, originally planned to be completed in August 2019, has faced delays due to a government shutdown earlier this year and information technology security difficulties. However, FAA has hired a new contractor and anticipates completion sometime in fiscal year 2020. According to an FAA compliance manager, problems that arise in the regions are brought to the attention of the airport compliance offices and discussed, and whether additional actions should be taken. Airport Land-Use Inspections. FAA is required to conduct a minimum of two airport land-use inspections per year per region, reviewing whether airports are complying with grant assurances such as airport property use requirements and lease agreements. We reviewed FAA’s annual land use inspection reports to Congress from fiscal year 2013 through 2018 and did not identify any FBO pricing concerns. We provided a draft of this report to DOJ and DOT for review and comment. DOJ provided technical comments, which we incorporated as appropriate. DOJ also suggested that we discuss more directly the implications that airport ownership of FBOs might have for fuel prices. We agree that airport-owned FBOs might price fuel differently than privately- owned FBOs. However, we were not able to obtain reliable data on airport ownership of FBOs. DOT did not have any comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, the Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov If you or your staff any have questions about this report, please contact me at (202) 512-2834 or VonahA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This appendix describes a model we developed to assess factors that may correlate with fixed base operator (FBO) aviation fuel prices across airports. The model uses data on posted prices for full-service 100LL aviation fuel (100LL) and Jet A (Jet A) fuel at a sample of airports in the contiguous United States that are part of the National Plan of Integrated Airport Systems (NPIAS), along with data on selected other factors that may be correlated with fuel prices. Specifically, this appendix discusses (1) the structure of the model, data sources, and variable definitions, and (2) base-case and alternative model results. Based on our audit work as well as economic reasoning, we hypothesized that a variety of factors may be correlated with aviation fuel prices across airports. Generally, factors that influence the price of any product are the demand for the product, the cost of producing and marketing the product, and the extent of competition among those selling the product. To examine the correlation between these factors and the price of both 100LL and Jet A fuel sold by FBOs, we developed an econometric model. Specifically, our model analyzed the independent correlation of selected key factors with aviation fuel prices. We used several specifications of the model for both full-service 100LL and full-service Jet A. Each specification used airport-level data to analyze variation in the price of a single type of fuel across airports. For each type of fuel, we included only NPIAS airports within the contiguous United States for which our data on aviation fuel prices reported a price for at least one FBO. In addition, we ran the analysis not only on the full dataset of all of the airports for which we were able to obtain fuel-pricing information (which we refer to as the all-airports dataset), but also on a subset of airports limited to those with an air traffic control tower (towered-airports dataset). For each type of aviation fuel, the dependent variable—or the variable to be explained in the model—is the average price of that fuel at an airport, net of state taxes. If an airport has only one FBO selling a fuel, the average price of that fuel at that airport is simply the price charged by the FBO that sells it. At an airport where two or more FBOs compete to sell the same type of fuel, the average price of the fuel is calculated as a simple (unweighted) average across all of the FBOs that sell the fuel at the airport. For 100LL, about 87 percent of airports in the all-airports dataset are served by only one FBO, and for Jet A, the share is lower, at about 84 percent. We obtained data on posted aviation fuel prices from a company that publishes such data online for two separate dates—a Wednesday in October of 2018 and a Wednesday in May of 2019. All of the fuel price data we received had been updated within 30 days of these dates. Independent variables in our model included a variety of demand, cost, and competitive factors that we hypothesized may explain the variation in fuel prices across airports. In particular, these factors relate to characteristics of (1) airports, (2) the locations where an airport resides, (3) the FBOs operating at a given airport, and (4) the availability of competing FBOs. Characteristics of airports. We expected certain characteristics of each airport to be related to the level of fuel prices. Airport size. We measured airport size based on the number of total operations—takeoffs and landings—at the airport. Greater activity at an airport reflects higher demand for services, which we expected to correlate with higher prices. Moreover, it is likely more costly to provide services at these busier airports. As such, based on both demand and cost factors, we expected larger airports to have higher fuel prices. We obtained data on airport operations from the Federal Aviation Administration (FAA). Length of the longest runway. Longer runways can accommodate larger and heavier aircraft, which may increase demand of such traffic. Because larger and heavier aircraft require more fuel, a longer runway may be indicative of greater demand for fuel at the airport. At the same time, longer runways are more costly to construct and maintain. Thus both demand and supply factors related to having a longer runway would suggest that fuel prices could be higher at such airports. We obtained information on runway length, which we measure in thousands of feet, from FAA. Characteristics of locations. We also expected demographic and geographic characteristics of the location of each airport to be correlated with fuel prices. Demographic characteristics of the population living in the area near an airport. Personal income per capita. Areas where per-capita incomes are higher could signal a greater demand for air travel and airport services. At the same time, areas with higher per-capita incomes also suggest that costs for labor and other resources the FBO will need to procure will be higher. Thus, we hypothesize that airports located in counties with higher per-capita incomes will have higher fuel prices. We obtained data on personal income per capita by county from the Bureau of Economic Analysis, Department of Commerce. Square of per-capita income. We also expected that, as income levels rise, the effect of even higher levels of income on fuel prices will attenuate. To account for the possibility of a nonlinear relationship between income and fuel prices, we included a variable equal to the square of personal income per capita. Population. A larger population in the area surrounding an airport would likely indicate higher demand for airport services. We obtained population data by county from the Bureau of Economic Analysis, Department of Commerce. Distance from Source of 100LL aviation fuel production. Following production, 100LL is typically shipped over longer distances by truck, rail, or barge, while Jet A tends to be transported over longer distances by pipeline. As such, long-haul transport is relatively more costly for 100LL. We found that there is no production of 100LL in East Coast states, while most other states in the contiguous United States have production sources for 100LL in closer proximity. Therefore, we controlled for the greater cost of transporting 100LL to states along the East Coast with a dummy variable in the 100LL pricing model. We obtained information on production sources for 100LL from the Energy Information Administration, Department of Energy. Characteristics of FBOs. We included two variables in the model that relate to the services provided by FBOs at the airport Large-Chain FBOs. Based on our audit work, we hypothesized that large-chain FBOs—those with operations at numerous airports—are more likely to focus their business model on meeting the demands of pilots looking for a suite of services and amenities. We thus expected that an airport served by a large-chain FBO may have higher average fuel prices due to the costs of providing such services. We used the data on aviation fuel prices to determine the number of operations run by each FBO. For purposes of the model, we defined an FBO as a large-chain if the owner had at least 25 FBO operations across airports reported in our dataset. Availability of self-service fuel at airport. We hypothesized that the price for full-service 100LL might be lower at an airport where a self- service 100LL is also offered for sale. That is, the ready availability of a cheaper fueling option may influence the pricing of full-service 100LL. Therefore, we included a dummy variable in the 100LL pricing model if self-service 100LL was also available at the airport. In many cases, only one FBO is available at an airport and provides both self- service and full-service 100LL. The variable is derived from the data on aviation fuel prices. Degree of competition among FBOs. Economic theory suggests that market prices for a product will be lower when more firms are selling a product, all else equal. We examined “on-airport” competition among FBOs for both fuels, and for 100LL, we also developed a variable to account for competition at nearby airports. The number of on-airport FBOs selling a given fuel. The most immediate and likely relevant competition among FBOs would occur at a given airport. To examine the correlation between on-airport competition and aviation fuel prices, we used two alternative measures: (1) the number of FBOs selling the fuel at each airport and (2) a dummy variable that equals 1 for airports where more than one FBO sells the fuel and 0 otherwise. These competition measures were derived from the data on aviation fuel prices. Availability of alternative FBOs at airports in the vicinity. Because stakeholders we interviewed said that pilots using 100LL may consider using nearby airports where that fuel is less expensive rather than their intended destination airport, we examined whether the availability of FBO services at nearby airports correlated with 100LL prices. Specifically, we counted the number of different FBOs selling 100LL at airports within a 30-mile radius of each airport where 100LL is sold. We derived this measure of competition from nearby airports by combining geospatial data for each airport with information from our data on aviation fuel prices. As noted, we ran the fuel-pricing model for both 100LL and Jet A aviation fuels. Table 4 provides descriptive statistics for all of the variables included in the models. We report regression results for several specifications in tables 5–9. Specifically these tables provide the extent and direction (plus or minus) of the estimated correlation of each of the independent variables on aviation fuel prices. We also indicate whether each estimated correlation is statistically different from zero. The per-gallon price of aviation fuel (100LL and Jet A)—the dependent variable in our model—is measured in dollars and cents. Some of the independent variables are measured in levels—for example, annual airport operations are measured in tens of thousands, and the length of the longest runway in thousands of feet. For these variables, the regression model results indicate the estimated correlation of a one-unit increase in the level of the independent variable on the price of aviation fuel. For example, as shown in table 4, an increase in runway length of 1,000 feet is associated with an increase in the price of both 100LL and Jet A of about 8 cents, and this estimated correlation is statistically different from zero at the 1 percent level. The model also includes some “dummy” variables—variables that take a value of either 1 or 0, depending on whether a specific attribute does or does not apply. For a dummy variable, the estimated correlation is interpreted as the effect of the attribute on the per-gallon fuel price. Based on the findings in table 5, being located on the East Coast is associated with an increase in the price per gallon of 100LL fuel of about 22 cents. This correlation was also found to be statistically different from zero. In another example, the model specification shown on table 5 uses a dummy variable to indicate the presence of competition at an airport—the variable equals 1 for airports that are served by more than one FBO and 0 for airports that are served by only one FBO. Results in table 5 indicate that the price per gallon of Jet A fuel is about 35 cents lower at airports that are served by more than one FBO than at airports with only one FBO. In addition to the individual named above, Cathy Cowell (Assistant Director); Nick Nadarski (Analyst-in-Charge); Amy Abramowitz; Dave Hooper; Christopher Jones; Ned Malone; Malika Rice; Ardith Spence; and Michelle Weathers; made key contributions to this report.", "summary": "Since 2007, the FAA has provided more than $37 billion in grants to airports to fund capital development and is responsible for ensuring compliance with requirements airports assume when they accept these grants. One such requirement is that the airports provide users equal access to airport services such as fueling and parking. Recently, an industry group and pilots raised concerns about the transparency and reasonableness of prices charged for these and other services at airports. GAO was asked to examine FBOs' pricing and FAA's oversight of related airport grant assurances. This report examines: (1) the transparency of FBO prices, (2) the factors that influence prices, and (3) the extent to which FAA ensures compliance with federal airport grant assurances related to FBO activities. GAO analyzed FAA data related to complaints from 2013 through 2018 and reviewed relevant literature, key laws and regulations, and program documentation. GAO developed a statistical model to analyze variation in fuel prices across airports in the contiguous United States. GAO interviewed FAA compliance staff at headquarters and all regional offices, as well as a non-probability selection of stakeholders. Fixed base operators (FBO) at airports (see figure) offer a variety of services to pilots and passengers. While anyone can view fuel prices offered by FBOs online, other service fees, such as for aircraft parking, can vary by type of aircraft and are not always available online, although they can be obtained by calling the FBO. Recently, industry groups developed the “Know Before You Go” campaign that calls for greater transparency of FBO prices. Some of the FBOs GAO interviewed list their fees online; however, others do not. Stakeholders GAO interviewed––including general aviation pilots, airports, FBOs, and industry groups––said FBOs' costs to build and maintain facilities—such as hangars and fueling facilities—as well as operating expenses such as labor and fuel––influence their prices. Stakeholders also said that demand for FBOs' services can influence prices, such as when seasonal demand affects operations at an airport near a ski resort. Finally, they also said that competition affects FBO's prices. GAO's statistical model confirmed a correlation between many cost and demand factors and aviation fuel prices and found higher prices at airports with higher costs and demand. This model also found that on-airport competition is associated with lower prices at the country's busiest airports: Prices for aviation fuels were lower at such airports with more than one FBO. However, not all airports can support more than one FBO due to, for example, the amount of business each gets. Airports receiving Federal Aviation Administration (FAA) grants must meet “grant assurances” such as charging reasonable and not unjustly discriminatory prices for services, including prices charged by FBOs. FAA officials said FAA oversight relies on (1) airports' consent to adhere to grant assurances; (2) training and outreach; and (3) complaints. Since 2013, in complaints received by FAA, GAO found few complaints about FBOs' prices. GAO found each regional office independently records additional inquiries. FAA is moving to collect regional inquires centrally, and by 2020 that step may allow FAA to stay abreast of apparent nationwide trends or issues with any grant assurance concerns.", "document_type": "gao"}
{"report": "The Food and Nutrition Service at USDA is responsible for overseeing the school meals programs at the federal level, which includes issuing regulations and guidance. The school meals programs are administered at the state level by a designated state agency—generally an education or agriculture agency—that issues guidance to school districts providing the meals. School districts are responsible for certifying students as eligible for free or reduced-price meals, providing children with nutritionally balanced meals each school day, and counting and claiming eligible meals for federal reimbursement, among other things. USDA and state agencies also conduct oversight of the school meals programs. Figure 1 summarizes the responsibilities of the different entities within the school meals programs. All students in schools operating the school meals programs may participate in the programs, and eligible students may be certified to receive free or reduced-price meals. Individual students can be certified into the school meals programs either through household application or direct certification. Household application. A household can submit an application that lists all sources of household income and the names of all household members, among other information. School districts compare this information to income-eligibility guidelines to determine whether the student is eligible for free or reduced-price meals. Alternatively, the household can indicate on the application that it participates in certain public-assistance programs—such as the Supplemental Nutrition Assistance Program (SNAP)—or that the student meets an approved designation, which confers categorical (automatic) eligibility for free meals. No documentation to support income listings—such as tax returns or pay stubs—is required at the time of application. Direct certification. Under the direct certification method, data matching is used to identify and certify students who are categorically eligible for free meals. State agencies are required by statute to match student enrollment records against SNAP records and may also match against records for other public-assistance programs or approved designations. Students who are directly certified into the school meals programs are eligible for free meals without a household application. Alternatively, schools can use certain program provisions to serve meals at no charge to all students (i.e., eligibility is not determined for each student individually on an annual basis). Community eligibility provision. Schools and school districts may apply for community eligibility if their percentage of students identified as eligible for free meals without an application—known as the identified student percentage—is at or above 40 percent. Meals served at schools using the community eligibility provision are reimbursed using a formula based on the identified student percentage. Other special provisions. Under these special provisions, schools generally use standard procedures to certify free and reduced-price eligible students and count meals by eligibility category to establish a base year. Following the base year, schools serve free meals to all students and are reimbursed based on the information collected in the base year. USDA reimburses state agencies, which in turn reimburse school districts, for qualifying meals through the process of meal counting and claiming. A meal is reimbursable if it meets federal nutrition requirements and is not reimbursable if it is missing a required food component or fails to meet the meal pattern requirements. Meals are recorded at the point of sale in a school. Generally, individual meals are recorded as either free, reduced price, or paid based on the student’s certification status, unless the school is operating under community eligibility or a special provision. Reimbursable meals are tallied at each school. School districts aggregate meal tallies from each school and then report to the respective state agencies on a monthly basis. State agencies then aggregate the reports from each district and submit tallies of free, reduced-price, and paid meals to USDA. USDA then reimburses states for the amount reported. Meals in each category (free, reduced-price, and paid) are reimbursed at different rates. Given that the school meals programs are administered on a daily basis at schools across the country, USDA officials stated that the agency relies on two key oversight practices—management evaluations and administrative reviews—to monitor these programs. Management evaluations. USDA conducts management evaluations of state agencies’ administration of the school meals programs. USDA uses risk-based criteria, such as the level of turnover in state agency staff, to select the state agencies to review each year. According to USDA officials, starting in fiscal year 2019, USDA will automatically select a state agency for review if it has not been reviewed in the past 3 years. According to USDA guidance, examples of operations it reviews during management evaluations include (1) state oversight of certification and verification of students into the school meals programs, (2) administrative reviews of school districts conducted by state agencies, (3) claims for reimbursement, and (4) state oversight of compliance with federal meal pattern requirements, among other areas. According to USDA officials, if USDA considers state agencies reviewed in one year as high risk for program noncompliance, those agencies may receive an additional management evaluation in the following year focused on technical assistance. Administrative reviews. USDA develops guidance for administrative reviews in which state agencies review school districts’ administration of the school meals programs. State agencies are required to conduct administrative reviews of each of their school districts at least once in a 3-year review cycle. USDA guidance states that the objectives of administrative reviews include identifying noncompliance, providing technical assistance, and assessing fiscal actions. Among other things, state agency staff are to review a school district’s certification records and its meal counting and claiming data for the most recent month for which a claim for reimbursement was submitted. State agency staff are also to review school meals served while the staff are on-site to determine whether the meals contain the required food components. State agency staff are to record any identified noncompliance and also provide technical assistance to school district staff. The Improper Payments Information Act of 2002 (IPIA), as amended, requires agencies to identify, estimate, and report their improper payment amounts and to develop and implement improper payment reduction plans, among other things. USDA estimates improper payments for the school meals programs through a model based on its APEC study, which is conducted by contractors. The most recent APEC study (APEC II) was released in May 2015 and covered activity during the 2012–2013 school year. USDA conducts an APEC study about every 5 years, with APEC III expected to be released in 2020. Conducting the APEC study involves multiple sampling and data analysis efforts, including the following examples from APEC II. In-person surveys. Contractors conducted in-person surveys of over 3,000 sampled households to collect information on each household’s circumstances at the time of application, including income, household size, and receipt of other public-assistance benefits. Using this information, contractors determined a sampled student’s eligibility status and compared it to the school district’s master benefit list and application or direct certification documentation. Data matching. Contractors assessed the accuracy of the identified student percentage—the figure used to determine reimbursement for schools using the community eligibility provision—for over 100 sampled schools. To do so, contactors used an iterative process to match sampled students to SNAP and Temporary Assistance for Needy Families records, as well as additional data sources if necessary. Observation of meal service. Contractors observed approximately 25,000 lunch transactions and 23,000 breakfast transactions at over 400 sampled schools to identify the food items in each meal at the point of sale, whether the meal was served to a student or nonstudent, and whether the meal was recorded as reimbursable. USDA determined that conducting the APEC study annually would not be feasible. Instead, the APEC study includes a model that allows USDA to use program participation data to report estimated improper payment error rates on an annual basis. Changes in program participation data result in small changes to the estimated improper payment error rates USDA reports during years between APEC studies. According to federal standards and guidance, executive-branch agency managers are responsible for managing fraud risks and implementing practices for combating those risks. Federal internal control standards call for agency management officials to assess the internal and external risks their entities face as they seek to achieve their objectives. The standards state that as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks. In July 2015, GAO issued the Fraud Risk Framework, which provides a comprehensive set of key components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The Fraud Risk Framework describes leading practices in four components, as shown in figure 2. The Fraud Reduction and Data Analytics Act of 2015, enacted in June 2016, requires the Office of Management and Budget (OMB) to establish guidelines for federal agencies to create controls to identify and assess fraud risks and design and implement antifraud control activities. The act further requires OMB to incorporate the leading practices from the Fraud Risk Framework in the guidelines. In July 2016, OMB published guidance about enterprise risk management and internal controls in federal executive departments and agencies. Among other things, this guidance affirms that managers should adhere to the leading practices identified in the Fraud Risk Framework. Further, the act requires federal agencies to submit to Congress a progress report each year for 3 consecutive years on the implementation of controls established under OMB guidance, among other things. It is important to note that fraud and “fraud risk” are distinct concepts. Fraud is challenging to detect because of its deceptive nature. Additionally, once suspected fraud is identified, alleged fraud cases may be prosecuted. If the court determines that fraud took place, then fraudulent spending may be recovered. Fraud risk exists when individuals have an opportunity to engage in fraudulent activity, have an incentive or are under pressure to commit fraud, or are able to rationalize committing fraud. When fraud risks can be identified and mitigated, fraud may be less likely to occur. Although the occurrence of fraud indicates there is a fraud risk, a fraud risk can exist even if fraud has not yet been identified or occurred. For example, suspicious billing patterns or complexities in program design may indicate a risk of fraud. Information to help identify potential fraud risks may come from various sources, including whistleblowers, agency officials, contractors, law-enforcement agencies, or beneficiaries. USDA has reported various actions aimed at lowering the school meals improper payment error rates in its agency financial reports. These actions—including onetime actions and longer-term efforts—cover multiple aspects of the programs. The actions USDA reported included the creation of a new household application prototype intended to reduce applicant errors and the development of training for food service workers to address administrative errors. USDA also reported on mechanisms to collect information on program errors to support agency analysis and monitoring efforts. Examples of the reported actions are illustrated in figure 3 below. Because the study used to develop improper payment error rates in school meals programs—APEC—is conducted about once every 5 years, the effect of these actions is currently unknown. Estimated improper payment error rates reported in years between APEC studies will generally not reflect the effect of most actions until the next study is released. Currently, the next APEC study is expected to be released in 2020. USDA changed what it considers to be an improper payment in the school meals programs for fiscal year 2018 reporting, resulting in improper payment error rates that are not comparable to those of prior years. Specifically, USDA determined that meal claiming errors do not meet the definition of an improper payment. According to USDA, meal claiming errors occur when meals are incorrectly categorized as reimbursable or nonreimbursable at the point of sale. For example, a meal claiming error occurs when a meal that is missing a required meal component (e.g., the required quantity of a vegetable) is counted as reimbursable. USDA officials reported that the rationale for the change in what constitutes an improper payment is that meal claiming error does not result in the payment of federal funds for services that were not provided or that were provided to ineligible recipients. Agency officials also stated that the remedy for meal claiming error is to add the missing food component to the meal, so correcting the error would not reduce program payments. Although the errors will not be considered in determining the reported estimated improper payment error rates, USDA officials stated that the agency is committed to reducing meal claiming error and will continue to measure it as part of its periodic APEC studies. Prior to fiscal year 2018 reporting, meal claiming errors were considered improper payments. As a result, this change contributed to a significant decrease in the estimated improper payment error rates for the school meals programs reported for fiscal year 2018, as shown in figure 4. Accordingly, the results shown for 2015 through 2018 in figure 4 are not comparable. Although USDA considers certain program integrity risks through specific processes, it has not assessed fraud risks in the school meals programs. As a result, USDA cannot determine whether its key oversight processes—extensive efforts designed for broad monitoring purposes— address areas at risk for fraud. The assess component of the Fraud Risk Framework calls for federal managers to plan regular fraud risk assessments and to assess risks to determine a fraud risk profile. Furthermore, federal internal control standards state that management should consider the potential for fraud when identifying, analyzing, and responding to risks. According to USDA officials, fraud in the school meals programs would look the same as nonfraudulent errors. For example, income listed on an application may be misreported intentionally or unintentionally. Consequently, agency officials stated that they have not established a process to plan or conduct a specific fraud risk assessment for these programs. Instead, fraud risks are considered through the agency’s efforts to assess overall program integrity risk in the programs. We have previously reported that integrating fraud risk management into a larger program integrity approach could limit the amount of resources and attention focused specifically on fraud prevention, detection, and response. The deceptive nature of fraud makes it harder to detect than nonfraudulent errors, potentially requiring control activities that are specifically designed to prevent and detect criminal intent. According to agency officials, USDA’s efforts to assess overall program integrity risks in the school meals programs include researching, monitoring, and reporting activities designed to identify areas of program operations susceptible to improper payments and program error. Specifically, agency officials stated that these efforts include research projects—the APEC study used to estimate improper payment error rates and other smaller-scale, informal projects—and a consideration of specific risks when annually determining which states USDA will review through management evaluations. These efforts to assess overall program integrity risk serve specific purposes and are not designed to identify or address fraud risks in the school meals programs. For example, the purpose of one research project mentioned by USDA officials was to identify challenges related to alternative service models for the School Breakfast Program, which include serving breakfast in locations other than a cafeteria and at a later time in the morning. USDA has not developed a process to consider these disparate efforts to comprehensively assess fraud risks. As a result, USDA’s efforts do not align with the overarching concepts of planning and conducting fraud risk assessments in the Fraud Risk Framework. The Fraud Risk Framework identifies leading practices for planning fraud risk assessments. Specifically, the leading practices include tailoring the fraud risk assessment to the program and planning to conduct the assessment at regular intervals and when there are changes to the program or operating environment. The leading practices also include identifying the tools, methods, and sources for gathering information about fraud risks and involving relevant stakeholders in the assessment process. Information to help identify potential fraud risks may come from various sources, including whistleblowers, agency officials, contractors, law-enforcement agencies, or beneficiaries. Existing oversight efforts— such as USDA’s management evaluations and administrative reviews— may also be a useful source, as information on errors and noncompliance may highlight areas at risk for fraud. The Fraud Risk Framework also identifies leading practices for conducting fraud risk assessments, as illustrated in figure 5. Without a process to plan and conduct regular assessments, USDA cannot identify and assess fraud risks facing the school meals programs. Such information is necessary to appropriately design and implement an antifraud strategy—including specific controls like USDA’s key oversight processes—and evaluate and adapt its strategy and controls to improve fraud risk management in these programs. Historically, the school meals programs have reported high estimated improper payment error rates. USDA has reported various steps to reduce the error rates, though a change in what USDA considers an improper payment in the school meals programs resulted in error rates for fiscal year 2018 that are not comparable to those of prior years. Although the two concepts are different, high improper payment error rates may suggest that the school meals programs may also be inherently vulnerable to fraud. However, USDA has not established a process to plan and conduct regular fraud risk assessments for the school meals programs, and existing efforts to assess specific risks in the school meals programs do not comprehensively consider fraud risks. According to leading practices, such an assessment is a pivotal step in managing fraud risks, helping to ensure that USDA’s key oversight efforts are targeted at areas at greatest risk for fraud in these programs, and helping safeguard the government’s substantial investment in them. The Administrator of the Food and Nutrition Service should establish a process to plan and conduct regular fraud risk assessments for the school meals programs that align with the leading practices in the Fraud Risk Framework. (Recommendation 1) We provided a draft of this report to USDA for review and comment. On April 29, 2019, the Director of the Office of Program Integrity for Child Nutrition provided us with the agency’s oral comments on the draft report. FNS officials generally agreed with the recommendation in the draft report. FNS officials noted that the agency does not currently conduct a formal fraud risk assessment, but they explained that the agency considers fraud risks through multiple existing efforts. These efforts include APEC and other studies, as well as key oversight processes. For example, FNS noted that the APEC study aims to identify the factors that contribute to errors in the school meals programs. Officials explained that this study includes an interview of sampled households, in part to determine whether these households underreported income on their applications and whether such underreporting suggests anything about the applicants’ intent. As noted in our report, we agree that these efforts may be a useful source of information on areas at risk for fraud. However, we continue to believe that additional action is necessary to comprehensively assess fraud risks in the school meals programs, consistent with the Fraud Risk Framework. USDA also provided technical comments, which we incorporated into the report, as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Agriculture, the FNS Administrator, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contact named above, the following staff members made key contributions to this report: Gabrielle M. Fagan, Assistant Director; James M. Healy, Analyst in Charge; and Matthew L. McKnight. Also contributing to this report were Rachel Frisk, Maria McMullen, Jean McSween, and Sabrina Streagle.", "summary": "In 2018, almost 30 million children participated in the National School Lunch Program and over 14 million participated in the School Breakfast Program, with cash payments totaling almost $17 billion. Historically, the school meals programs have reported high estimated improper payment error rates, which suggest that these programs may also be vulnerable to fraud. GAO was asked to review improper payment error rates and potential fraud in the school meals programs. This report (1) describes steps USDA has reported taking since 2015 to lower improper payment error rates and (2) examines the extent to which USDA has assessed areas of risk for fraud in the school meals programs. GAO reviewed the results of the most recent study USDA uses to estimate improper payments in the school meals programs, as well as the error rates and actions to reduce them reported in USDA's agency financial reports from fiscal years 2015 through 2018. Further, GAO analyzed guidance for key oversight practices and documentation regarding USDA's risk assessment processes. GAO examined these processes against the leading practices in the Fraud Risk Framework for assessing fraud risks. GAO also interviewed agency officials. The Department of Agriculture (USDA) has reported various actions aimed at lowering estimated improper payment error rates in the National School Lunch Program and School Breakfast Program (school meals programs). Examples include a new application prototype intended to reduce applicant errors and training for food service workers to reduce administrative errors. USDA uses a model based on a periodic study to estimate improper payments, and reported error rates will generally not reflect the effect of most actions until USDA's next study is released, likely in 2020. However, in fiscal year 2018, USDA redefined what it considers an improper payment. Specifically, meal claiming errors—for example, meals that are missing a required nutritional component but that are counted as reimbursable—are no longer considered improper payments, resulting in error rates for fiscal year 2018 that are not comparable to prior years. USDA has not assessed fraud risks in the school meals programs, which hinders its ability to ensure that its key oversight practices—extensive processes designed for broad monitoring purposes—address areas at risk for fraud. The assess component of A Framework for Managing Fraud Risks in Federal Programs (Fraud Risk Framework) calls for managers to plan regular fraud risk assessments and to assess risks to determine a fraud risk profile. USDA officials stated that the agency considers fraud risks through efforts to assess overall program integrity risk in the programs, which include research projects and consideration of specific risks when allocating monitoring resources. However, GAO found that USDA's efforts to assess risk do not comprehensively consider fraud risks. As a result, these efforts are not aligned with the overarching concepts of planning and conducting fraud risk assessments in the Fraud Risk Framework. Establishing a process to plan and conduct regular fraud risk assessments that align with the leading practices in the Fraud Risk Framework—including those in the figure below—will help USDA design and implement an antifraud strategy, as well as evaluate and adapt its strategy to improve fraud risk management in the school meals programs. GAO recommends that USDA establish a process to plan and conduct regular fraud risk assessments for the school meals programs that align with the leading practices in the Fraud Risk Framework. USDA generally agreed with the recommendation.", "document_type": "gao"}
{"report": "The Bureau’s address canvassing operation updates its address list and maps, which are the foundation of the decennial census. An accurate address list both identifies all living quarters that are to receive a notice by mail to respond to the census, and serves as the control mechanism for following up with households that fail to respond to the initial request. Precise maps are critical for counting the population in the proper locations—the basis of congressional apportionment and redistricting. Our prior work has shown that developing an accurate address list is challenging—in part because people can reside in unconventional dwellings, such as converted garages, basements, and other forms of “hidden” housing. For example, as shown in figure 1, what appears to be a single-family house could contain an apartment, as suggested by its two doorbells. During address canvassing, the Bureau verifies that its master address file and maps are accurate to ensure the tabulation for all housing units and group quarters is correct. For the 2010 Census, the address canvassing operation mobilized almost 150,000 field workers to canvass almost every street in the United States and Puerto Rico to update the Bureau’s address list and map data—and in 2012 reported the cost at nearly $450 million. The cost of going door to door in 2010, along with the emerging availability of imagery data, led the Bureau to explore an approach for 2020 address canvassing that would allow for fewer boots on the ground. To reduce costs for the 2020 Census, the Bureau took a new approach and some address canvassing work was completed in-office. The Bureau compared current satellite imagery to the contents of its master address file to determine if areas had housing changes, such as new residential developments or repurposed structures. If the satellite imagery and the master address file matched, then the Bureau considered those areas to be resolved or stable and did not canvass them in-field. These areas that were unresolved by the in-office review were sent to in- field address canvassing. Field staff called listers used laptop computers to compare what they saw on the ground to the address list and maps. Listers confirmed, added, and deleted addresses or moved addresses to their correct map positions. The listers were trained to speak with a knowledgeable resident at each housing unit to confirm or update address data, ask about additional units, confirm the housing unit location on the map (known as the map spot), and collect a map spot either using global positioning systems (GPS) or manually. If no one was available, listers were to use house numbers and street signs to verify the address data. The data were then transmitted electronically to the Bureau. The Bureau completed in-field address canvassing on time despite nationwide hiring shortfalls. The Bureau credits this success to better- than-expected productivity. The Bureau conducted “in-field” address canvassing for approximately 35 percent of the housing units (approximately 50 million housing units) across the country (see fig. 2). The Bureau had already determined “in-office” that the other 65 percent of addresses (approximately 93 million housing units) were part of stable blocks. The Bureau began the in-field address canvassing operation at seven of its 39 Area Census Offices on August 4, 2019, and then rolled out the operation to the remaining 32 offices on August 18, 2019. It conducted this phased approach to ensure all operations and systems worked together before commencing the operation nationwide. The total in-field address listing workload was more than 50 million addresses from the Bureau’s address file. Bureau officials reported that listers were generally more productive than expected, thus allowing the Bureau to complete the operation as scheduled on October 11, 2019 (see fig. 3). The actual hourly productivity rate for the operation was 19.8 addresses versus the anticipated rate of 15.8 addresses. According to Bureau officials, listers were more productive due to efficiency gains from the Bureau’s new approach, including an automated time and attendance system, the use of computer laptops to collect census data, and a new operational control system that was used to electronically optimize assignments and transmit work to listers. Bureau officials stated that the high productivity also helped the operation come in under budget. The operation’s cost was $118.6 million—while the anticipated cost was $185 million—a reduction of 36 percent. For in-field address canvassing, listers received online training, which detailed the procedures they were to follow, such as: comparing the housing units they see on the ground to the housing units on the address list, knocking on all doors so they could speak with a resident to confirm the address (even if the address is visible on the mailbox or house) and to confirm that there are no other living quarters such as a basement apartment, looking for hidden housing units, and confirming the location of the housing unit on a map with GPS coordinates collected on the doorstep. In our observations of in-field address canvassing, the majority of listers generally followed these procedures. However, some listers we observed did not always follow procedures. For example, Ten out of 59 listers did not work ground to book (i.e., compare what they saw on the ground to what was on their list). Nine out of 59 listers did not walk up to the doorstep to collect the GPS coordinate. Specifically, we observed listers use mailboxes to confirm address information and collect the GPS coordinates from the mailbox. Following proper procedures is important because getting a GPS reading from the doorstep of every address contributes to the accuracy of the address file. Fourteen of 59 listers did not consistently knock on every door as required to confirm the address and ask about “hidden” housing units. Seventeen of 59 listers did not always look for or ask about “hidden” housing units. Not knocking on doors or asking about hidden housing units represents missed opportunities to potentially add missing addresses to the Bureau’s master address file. Further, not all listers we observed provided the required confidentiality notices to occupants. Seven listers we observed did not provide confidentiality notices. Occupants may be more willing to provide their information if they know their responses will not be shared. We communicated the information regarding our observations to the Bureau, and on August 26, 2019, the Bureau instructed its field offices to remind listers of the appropriate procedures. According to Bureau officials, some amount of temporary staff deviates from following procedures with every decennial census. As such, to control for this, the Bureau implemented a Quality Control (QC) component for in-field address canvassing that is designed to detect and correct deficient production listers’ work. QC started on August 11, 2019, and included a total workload of around 3.4 million addresses. For this operation, an automated system selected the sample of addresses to review; these addresses were assigned to QC listers. QC listers received instructions to begin canvassing at a specified location, usually an intersection, and to continue canvassing addresses until the system identified the work unit as “complete” for QC purposes. An address worked by a production lister was considered to have “failed” QC if the QC lister recorded changes, or if the lister missed the address and the QC lister found it. Depending on the size of the block, after a predetermined number of addresses fail within a block, the system fails the entire block. Once a block fails, the QC lister must recanvas all the addresses in that block. Based on preliminary results, Bureau officials estimate that 4.3 percent, or about 2.2 million addresses, failed. According to Bureau officials, while they did not have a predetermined target for what was an acceptable range for the total number of addresses that failed QC, they nevertheless are reasonably confident that this was in an acceptable range for QC errors encountered during the operation. They further stated that they could not compare 2020 QC results to 2010 because the 2010 Address Canvassing Operation canvassed 100 percent of the addresses in-field, while the 2020 In-field Address Canvassing Operation only covered approximately 35 percent of the addresses across the country. Lister productivity for QC was also higher than expected. The Bureau anticipated the QC productivity at 8.03 addresses per hour compared to the actual rate of 14.05 addresses per hour. Higher-than-expected productivity rates contributed to a reduction in costs and the actual cost of QC production was $10.3 million versus the anticipated cost of $25.6 million, a savings of $15.3 million. Additionally, Bureau officials stated that QC came in so far under budget because the use of laptops increased efficiency and the actual QC workload was lower than the budget estimate. While the Bureau conducted real-time quality control follow-up of selected blocks during address canvassing, it also has two studies underway that will evaluate the re-engineered address canvassing approach, as well as the in-field address canvassing operation. Similar studies conducted by the Bureau in 2010 found that 95.7 percent of addresses were correctly deleted and 83.6 percent of addresses were correctly added. Both studies underway have a set of research questions designed to evaluate the accuracy and effectiveness of address canvassing. For example the Bureau seeks to answer questions such as: What percentage of the housing units added during in-field address canvassing were correctly added (and added-in-error)? What percentage of the housing units identified as deleted or duplicated by the listers during in-field address canvassing were correctly deleted or duplicated (and deleted-in-error)? Answering these and other questions contained in both studies will be critical to determining the quality of the operation, as not all listers followed procedures, which may have led to errors in the address file. It is anticipated that the final report for the 2020 Census In-Field Address Canvassing Operational Assessment study will be available September 2020, and the 2020 Census Evaluation: Reengineered Address Canvassing study will be available March 2023. In addition to completing in-field address canvassing on schedule and under budget Bureau officials highlighted other successes from the operation including: Automated solutions for training staff. Bureau-developed training materials that used a blended training approach including instructor- led, computer-based, and hands-on training. This is a change from the 2010 paper-based and classroom-only training approach. Efficiency gains from conducting reengineered field operations using: New operational control systems, which were used to electronically assign and transmit work to the listers. New automated time and expense reporting (timecards) for employees. In 2010, timecards were paper-based and the listers had to meet with their supervisors to submit them. Enhanced software application for validating and updating addresses. Implementation of rapid response to Hurricane Dorian, which affected areas of the Southeastern United States, resulted in minimal disruptions to the operation. Additionally, the Bureau was able to resolve some unforeseen challenges at the seven Area Census Offices that opened early. For example, the Bureau identified issues with training login and new hires not being on the training roster and rectified those issues before the operation expanded to the rest of the country. The Bureau experienced delays in hiring for its early operations, raising concerns about hiring for peak operations. The Bureau’s target was to hire 40,300 listers by September 7, 2019, but as of September 9, 2019, the Bureau had hired 31,151 listers. Though address canvassing productivity was higher than expected, in some parts of the country the operation was at risk of falling behind because of a shortage of listers. The Bureau told us it filled the gap with listers who lived well outside of the area in which they were supposed to work—in some cases from a different state. This strategy allowed the Bureau to complete the operation on schedule; however, though the operation as a whole was under budget, the Bureau incurred unplanned costs for travel (airfare, personal mileage rates, rental cars, hotel stays, and per diem). As we previously reported, these hiring problems are an early warning for what may occur later in the census during nonresponse follow-up, when the Bureau intends to hire between 320,000 to 500,000 enumerators to follow up with households that did not initially respond to the census. The Bureau said the hiring issues were caused by delays in processing background checks and greater-than-expected attrition. According to the Bureau, these delays arose, in part, due to early shortages of staff to review background checks and because a significant number of applicants did not completely or accurately fill out related forms. In February 2019, the Bureau began to bring on about 130 temporary staff to review forms for accuracy and completeness prior to submission for investigation and to help investigators conduct the pre-employment background checks. Those delays in turn contributed to subsequent challenges in onboarding listers for address canvassing. For example, according to Bureau officials, the delays in early hiring for Area Census Office staff meant some offices did not have enough clerks in place to process paperwork for listers or make reminder phone calls to hire and onboard listers. Regarding attrition, more listers quit than expected at two points in the hiring process: Fingerprinting: The Bureau expected about 15 percent of applicants would leave the hiring process after being selected and before submitting fingerprints. However, the attrition rate was closer to 25 percent. Bureau officials told us they attributed this to selected applicants, in some cases, having to travel long distances to be fingerprinted. Training: The Bureau found that fewer selected and cleared applicants attended training than anticipated. Bureau officials attributed this to fewer clerks being available to call trainees with reminders to attend training due to delays in clerks receiving their own background checks. Bureau officials also attributed some of this attrition to the 60-day period between the selection of applicants and their training. This new time frame was put in place for the 2020 Census to provide adequate time for adjudication of background checks. The Bureau has begun to address these challenges by adapting its hiring and onboarding processes for peak operations, such as nonresponse follow-up, which is to begin May 2020. For example, the Bureau: Increased the number of fingerprinting locations and machines. According to Bureau officials, it added 133 additional sites and 300 additional machines, bringing the total number of vendor sites for fingerprinting to 829. Staffed Area Census Offices to help newly-selected applicants for positions complete their forms and initiate the background check process. Hired additional staff to help clear background checks. The Bureau hired 200 staff at the National Processing Center and an additional 150 at the Regional Census Centers. Changed the recruiting goals due to the attrition experienced during address canvassing. The recruiting goal has increased from 2.3 million to 2.7 million to ensure it has a large enough applicant pool. This increases the ratio of recruited applicants to positions from 5:1 to 6:1. Completed a wage rate study and increased wages in 73 percent of counties by an average of $1.50 per hour for enumerators. Developed an email campaign to maintain contact with individuals in the recruiting pool. Decreased the types, and therefore the number, of positions that required a full background check. Included additional training for replacement hires in the training schedules. A make-up session was added to the nonresponse follow- up training schedule, May 14-19, 2020. If effectively implemented, these steps hold promise for helping to address the hiring issues. To effectively manage address canvassing, the Bureau provides data- driven tools for the census field supervisors to manage listers, including system alerts that identify issues that require the supervisor to follow up with a lister. Operational issues such as listers not working assigned hours or falling behind schedule need to be resolved quickly because of the tight time frames of the address canvassing and subsequent operations. For the address canvassing operation, the system generated codes that covered a variety of operational issues such as unusually high or low productivity (which may be a sign of fraud or failure to follow procedures) and administrative issues such as compliance with overtime and completion of expense reports and time cards. During the operation, more than 621,000 alerts were sent to census field supervisors. Each alert requires the supervisor to take action and then record how the alert was resolved. To assist supervisors, these alerts need to be reliable and properly used. However, nine out of 22 census field supervisors we spoke to indicated the alerts were not always useful. For example, almost 40 percent of those alerts were related to no progress being made on a block. This was due in part to listers opening all of the blocks they were assigned on their laptops in order to manage their workload, triggering the system that work had begun on all assigned blocks when in fact the lister was only working one block. We first heard about this issue from field supervisors in late August. Census field supervisors we spoke to indicated that these alerts took an inordinate amount of time to resolve, in part because almost every lister would open every block to plan his or her day. We alerted Bureau officials in headquarters, and they notified area census offices to remind supervisors to instruct listers not to open all of their blocks at once. After the notification was sent out, Bureau officials reported that the number of alerts due to blocks not being worked declined. Bureau officials further stated that this issue would not impact nonresponse follow-up because enumerators do not receive multiple assignments, but instead receive, work, and transmit only one assignment of housing units for follow-up a day. Another challenge faced by census field supervisors was providing feedback to listers on why addresses failed quality control. Four of 22 census field supervisors we spoke with were not aware that they had access to the reasons why addresses on a block failed quality control. Knowing where to find this information would have allowed census field supervisors to communicate this information to listers, thus improving lister performance as well as the accuracy of the data collected. We shared this information on some census field supervisor’s lack of awareness with the Bureau and on August 26, 2019, the Bureau notified its field offices to remind supervisors that detailed information on why addresses failed quality control was available on their laptops. For nonresponse follow-up, Bureau officials told us QC information about any enumerator with a specified number of failed cases will be sent directly to the Regional Census Center rather than the census field supervisor. The Regional Census Center will decide whether the enumerator should continue working and, if so, what corrective action to take, such as retraining. However, if it is determined that an enumerator falsified data, then the enumerator would not be given new assignments and all of his or her work would then be reinterviewed. We provided a draft of this report to the Secretary of Commerce. In its written comments, reproduced in appendix I, the Bureau noted that our report made no formal recommendations and that we highlighted several successes of the in-field address canvassing operation. The Bureau also described several claims of cost savings and efficiency gains which it attributed to various address list-building activities. While we have previously reported on the Bureau’s 2020 address list-building efforts, we have not audited claims made in the Bureau’s response or elsewhere regarding potential cost savings from innovations for the 2020 Census. The Bureau also provided us with technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Commerce, the Under Secretary of Economic Affairs, the Director of the U.S. Census Bureau, and interested congressional committees. The report also will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report please contact me at (202) 512-3236 or mihmj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made major contributions to this report are listed in appendix III. J. Christopher Mihm, (202) 512-3236 or mihmj@gao.gov In addition to the contact named above, Lisa Pearson, Assistant Director; Timothy Wexler, Analyst-in-Charge; Margaret Fisher; Robert Gebhart; Richard Hung; Cynthia Saunders; Anna Sorrentino; Kate Sharkey; Dylan Stagner; Jon Ticehurst; Peter Verchinski; and Alicia White made key contributions to this report.", "summary": "The decennial census is a costly and complex undertaking and its success depends largely on the Bureau's ability to locate every person residing in the United States. To accomplish this monumental task, the Bureau must maintain accurate address and map information for every person's residence. If this information is inaccurate, people can be missed, counted more than once, or included in the wrong location. To help control costs and to improve accuracy, the Bureau used new procedures to build its address list for 2020. GAO was asked to review how the in-field address canvassing operation performed. This report (1) determines the extent to which the Bureau followed its plans and schedule for in-field address canvassing, and (2) identifies the successes and challenges that occurred during 2020 Census In-Field Address Canvassing that have potential implications for future operations. To address these objectives, GAO reviewed key documents including the 2020 Census operational plan that discussed the goals and objectives for the operation. GAO observed in-field address canvassing across the country at 18 area census offices, including a mix of rural and urban locations. GAO also interviewed field supervisors, listers, and office management to discuss the operation's successes and challenges. GAO provided a draft of this report to the Bureau. The Bureau provided technical comments, which were incorporated as appropriate. The Census Bureau (Bureau) completed in-field address canvassing as scheduled on October 11, 2019, despite nationwide hiring shortfalls. The Bureau credits this success to better-than-expected productivity—the actual hourly productivity rate for the operation was 19.8 addresses versus the anticipated rate of 15.8 addresses. The total workload included more than 50 million addresses. GAO observations of in-field address canvassing found that a majority of field staff (listers) generally followed procedures, but there were a number of exceptions. For example, 14 of 59 listers we observed did not consistently knock on every door as required to confirm the address and ask about “hidden” housing units. Not knocking on doors or asking about hidden housing units represents missed opportunities to potentially add missing addresses to the Bureau's address file. GAO communicated to Bureau officials that listers were not following procedures and they sent out a nationwide reminder for listers to do so. The Bureau credits efficiency gains to new systems for assigning work and a new reporting mechanism for collecting timecards, but experienced delays in hiring for address canvassing. Though address canvassing productivity was higher than expected, in some parts of the country the operation was at risk of falling behind because of a shortage of listers. The Bureau told GAO that it filled the gap with listers who lived well outside of the area in which they were supposed to work—in some cases from a different state. The Bureau is taking actions to address hiring problems for later operations, including nonresponse follow-up, when the Bureau intends to hire between 320,000 to 500,000 enumerators to follow up with households that did not initially respond to the census. Those actions include increasing wage rates in 73 percent of the counties nationwide.", "document_type": "gao"}
{"report": "Air Force pilots are required to complete various phases of training before they are considered to be mission ready. To assess pilot candidates’ flying aptitude for both traditional (i.e., manned) and remotely-piloted aircraft, the Air Force first requires these candidates to attend initial flight training. Successful candidates for traditional aircraft then attend one of two schools: Euro-NATO Joint Jet Pilot Training, the graduates of which become Specialized Undergraduate Pilot Training, the graduates of which become fighter, bomber, airlift, or tanker aircraft pilots, depending on pilot strengths and Air Force needs. During or following this training, a pilot is assigned to a specific aircraft, and the flight training program proceeds through three stages: Initial Qualification Training. This stage of training qualifies a pilot for basic flying duties associated with the type of aircraft (e.g., an F-16). The pilot accomplishes this stage at a formal training unit before moving to an assigned squadron. Graduates of initial qualification training courses have basic aircraft qualification status. Mission Qualification Training. This stage of training occurs once the basic aircraft qualified pilot is at the assigned unit. The pilot undergoes mission qualification training in the type of aircraft assigned to qualify for the specific missions the unit is required to perform. Continuation Training. This stage of pilot training has two components. Pilots participate in continuation training to (1) in some instances upgrade their qualifications to fill certain positions, such as flight lead, instructor, or forward air controller through specialized continuation training; and (2) in all instances maintain proficiency and improve their capabilities to perform their units’ assigned missions. The Ready Aircrew Program establishes the minimum number of live training events, or “sorties,” and virtual simulator training events, or “simulator missions,” that aircrews of a particular combat aircraft must complete during the annual training cycle to maintain mission readiness. These sorties and simulator missions are aligned with the units’ primary missions, for which the units must maintain “proficiency,” and secondary missions, for which they must maintain “familiarity.” The Air Combat Command, as lead command for the Ready Aircrew Program, with the assistance of other major commands (including the Air Force Global Strike Command, Pacific Air Forces, and U.S. Air Forces in Europe) and associated subordinate organizations (i.e., air wings and squadron commanders), develops tasking memorandums for the Ready Aircrew Program that delineate and specify the annual continuation training requirements for personnel assigned to each of the subordinate combat units. On the basis of our analysis, we found that the RAND report addressed each of the three statutory elements required by Congress in Section 351. First, the RAND report addressed two statutory elements by reviewing and assessing the assumptions underlying annual continuation training requirements for the Ready Aircrew Program and the overall effectiveness of the Ready Aircrew Program in managing aircrew training requirements. These two statutory elements focus on issues raised in our prior report recommendations, which we discuss in more detail later in this report. Table 1 provides detailed information about these statutory elements, our assessment of RAND’s findings, and RAND’s findings associated with each element. The RAND report addressed the third statutory element by making recommendations for the improved management of training requirements. Specifically, the RAND report made nine recommendations, listed in table 2. The RAND report and its underlying analysis is consistent with generally accepted research standards for design, execution, and presentation. Table 3 summarizes our assessment of the extent to which the RAND report conformed with these standards. The RAND study and our previous audit work identified similar deficiencies in the management and operation of the Ready Aircrew Program. Specifically, in September 2016, we reported that the Air Force had used the same underlying assumptions to establish its annual training requirements in the Ready Aircrew Program from 2012 through 2016, which may not reflect current and emerging training needs. We concluded that without fully reassessing the assumptions underlying its training requirements, the Air Force could not be certain that its annual training plans are aligned with its stated goals to ensure a full-spectrum- capable force that can successfully achieve missions across a broad range of current and emerging threats. We recommended that the Air Force comprehensively reassess the assumptions underlying its annual training requirements—and make any appropriate adjustments in future aircrew training plans to ensure that its forces can accomplish a full range of missions. Additionally, in our September 2016 report, we also reported that the Air Force did not systematically evaluate the effectiveness of training performed as part of the Ready Aircrew Program. We recommended that the Air Force establish desired learning objectives and training support elements needed to accomplish the training expectations identified by the Ready Aircrew Program and develop a process to collect data to assess the effectiveness of annual training against these features. We discuss these recommendations and their status in more detail later in this report. Section 351 of the NDAA for Fiscal Year 2017 required the Air Force to report on any actions it plans to take in response to RAND’s recommendations and to estimate the resources required to implement the recommendations. On August 30, 2018, the Air Force provided its report—a one-page transmittal letter from the Secretary of the Air Force with the RAND report incorporated as an enclosure—to congressional committees in fulfillment of the Section 351 requirements. In its report, the Air Force agreed with RAND that more investment is needed in data collection because its current system does not lend itself to analysis that could be used to gain efficiencies. The Air Force also stated that it is addressing the RAND recommendations by working to link readiness to Ready Aircrew Program training requirements. Specifically, the Air Force stated that it was taking the following three actions: building training matrices to help commanders assess their units’ establishing common data architecture through the Air Force’s Chief Data Officer–led effort, and evaluating aspects of the Ready Aircrew Program to increase lethality and improve readiness as the Air Force shifts to executing the mandates of the 2018 National Defense Strategy. However, in its August 2018 report, the Air Force did not provide any additional details to further describe or link these broad actions to the RAND findings and recommendations. Therefore, the extent to which these three actions are responsive to the RAND recommendations is unclear. In October 2019, upon completion of our audit work, Air Force officials provided us with a briefing they described as a corrective action plan that further elaborated on the Air Force’s position with respect to each of RAND’s nine recommendations. Air Force officials conceded that the actions described in that briefing and plan were already underway at the time of the study and were not initiated in response to the study’s recommendations. They stated that, though they generally agreed with the recommendations, the Air Force lacked the manpower, resources, and means to implement them. As such, the Air Force considers each of the recommendations closed and plans no further actions. Further, the Air Force has no plans for future follow-up on implementation of the RAND recommendations. Accordingly, we did not further assess the actions described by the Air Force in relation to the RAND study. Table 4 summarizes the Air Force’s position as provided in its corrective action plan briefing. As described in table 4, the Air Force concurred with three recommendations, partially concurred with five, and did not concur with one. The following summarizes the Air Force position by concurrence category: Concur: In concurring with RAND Recommendations 2 and 8—to invest in data systems for the collection, access, and storage of data to correct deficiencies in current systems and improve analysis and readiness reporting—the Air Force stated that, before the recommendations were made, it had made available $5.15 million in fiscal year 2020 funding to develop an Aircrew Readiness Training Management Module as an upgrade to the Air Force’s Aviation Resource Management System. The Air Force expects that this module will centralize management of the Air Force Ready Aircrew Program Tasking Memorandum at the command level, transfer aircrew training data whenever a member moves to a new station, and improve capability to track the types of flight simulators used for training. Further, because the Air Force does not plan to take additional actions, it estimated no resources are required, beyond the $5.15 million already funded, prior to RAND making these recommendations. In concurring with RAND Recommendation 5—to document training quality to support requests for training resources—the Air Force explained that it is documenting the quality of training prescribed in its annual Air Force Ready Aircrew Program Tasking Memorandum at the squadron level. However, this is not a change based on the RAND recommendation and was being done prior to RAND making this recommendation. The Air Force factors unit training, accomplishments, and readiness inputs into the Air Force Ready Aircrew Program Tasking Memorandum and overall flying hour program. As the flying hour program is the basis for resource training requests and the Air Force factors unit training and accomplishments into its flying hour program, the Air Force explained that it plans to take no additional actions based on this recommendation. Further, because the Air Force does not plan to take additional actions, it estimated no resources were required to implement this recommendation. Partially Concur: In partially concurring with RAND recommendations 1, 3, 4, 6, and 9, Air Force officials explained that the mechanisms reflected in its comments are sufficient to address the intent of the RAND recommendations even though these mechanisms predated RAND’s recommendations. Consequently, according to the Air Force officials who briefed us, the Air Force plans no additional actions based on the recommendations, obviating the need to estimate resources in the case of these five recommendations. Nonconcur: In not concurring with RAND Recommendation 7—to consider changing how Air Force Flying Hour Program requirements affect the flying hour program—the Air Force explained that the flying hour program determination is standard across the Total Air Force, affecting more than combat aircrews alone, and that the centrality of the flying hour program to readiness and combat capability cannot be overemphasized and must be defendable and auditable. Further, based on its not concurring with this recommendation, the Air Force did not estimate resources for this recommendation. Notwithstanding the RAND study, the actions taken by the Air Force may not fully implement our prior recommendations as described previously. Specifically, we recommended that the Air Force comprehensively reassess the assumptions underlying its annual training requirements— including for example the total annual training requirements by aircraft, the criteria for designating aircrews as experienced or inexperienced, and the mix between live and simulator training—and make any appropriate adjustments in future aircrew training plans to ensure that its forces can accomplish a full range of missions. While RAND accomplished such an analysis as part of its review (see table 1, items 1(a) through 1(e) above), RAND concluded in its analysis that the Air Force did not have the objective measures of proficiency needed to determine the minimum and optimum number of sorties and that the combat air forces aviation community lacks consensus on how to define and measure an aircrew member’s proficiency. While the Air Force has defined proficiency in an Air Force manual issued in September 2019, the Air Force has not reassessed its assumptions underlying training requirements and made appropriate adjustments to future training plans per our recommendation. Further, we recommended that the Air Force establish desired learning objectives and training support elements needed to accomplish the training expectations in its annual Ready Aircrew Program tasking memorandums, and develop a process to collect data to assess the effectiveness of annual training. In commenting on RAND’s recommendations 2 and 8, the Air Force stated that, before the recommendations were made, it had made available $5.15 million in fiscal year 2020 funding to develop an Aircrew Readiness Training Management Module as an upgrade to the Air Force’s Aviation Resource Management System. The Air Force’s effort to upgrade this system, while not a result of the RAND recommendations, may meet the intent of our recommendation. For example, the Air Force’s development of the Aviation Resource Management System is expected to centralize management of the Air Force’s Ready Aircrew Program training requirements data at the command level, transfer aircrew training data whenever a member moves to a new station, and improve capability to track the types of flight simulators used for training. When fully implemented, these improvements may ultimately allow the Air Force to assess the effectiveness of annual training, as we recommended. However, it is too early to tell as the actions were under development or had just begun at the end of September 2019, and sufficient data to evaluate the results have not been collected. Fully implementing both of our recommendations would better position the Air Force to ensure that its aircrews receive effective training to achieve a range of missions for current and emerging threats. We provided a draft of this report to DOD for review and comment. In its written comments (reprinted in appendix II), DOD stated that it saw great value in our discussion. DOD added that its position on the two recommendations we made in our 2016 report—with which DOD did not concur—is fundamentally unchanged. However, we continue to believe the recommendations should be implemented by the Air Force, as previously discussed in this report. In its comments, DOD also stated that it is addressing training infrastructure and aircrew proficiency through two initiatives. First, in response to the 2018 National Defense Strategy, the department's Joint Operational Infrastructure Plan is framing the modernization effort of DOD-wide Operational Infrastructure. The Joint Operational Infrastructure Plan specifically addresses areas such as Live Virtual Constructive and aircrew training. Second, the department is pursuing efforts to align training events with the range of current and evolving threats. According to DOD, both efforts will address the underlying assumptions for aircrew training and proficiency with reportable readiness metrics. However, the Joint Operational Infrastructure Plan is a draft and not yet officially issued, according to an official at the Office of the Under Secretary of Defense for Personnel and Readiness. Therefore, details needed to assess this plan are not yet available for us to consider in determining whether the change will help to address the recommendations we made in 2016. Regarding efforts the department is pursuing to better align training events, the DOD comments did not include sufficient details to allow us to state whether the change could be helpful in addressing our recommendations. Nonetheless, to the extent that DOD is successful in completing, issuing, and implementing its new Joint Operational Infrastructure Plan, or takes further actions related to our prior recommendations, we will consider them as we continue to analyze DOD efforts to address our recommendations. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense for Personnel and Readiness, and the Secretary of the Air Force. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-5431 or russellc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. To determine whether the RAND report followed generally accepted research standards, we chose the following criteria, which are based on a review of research literature and Department of Defense (DOD) guidance, from which we identified frequently occurring, generally accepted research standards that are relevant for defense studies, including those related to the presentation of results. These standards have been used in a number of our prior reports, modified as appropriate for each situation. For the purposes of this engagement, we assessed the RAND study against three major elements, listed below, that fall under generally acceptable research standards, as based on our prior work. These generally accepted research standards are consistent with Office of Management and Budget (OMB) Guidelines and DOD guidance on ensuring and maximizing the quality of information disseminated by federal agencies to the public. We discussed these standards with RAND officials, who agreed that they were generally consistent with their own quality standards for research and were applicable to this study. We determined that these standards are still current and relevant for the purposes of this report, based on their consistency with OMB and DOD guidance, discussions with RAND officials, and consideration of prior GAO work applying generally accepted research standards with the assistance of GAO’s Applied Research and Methods Team. The standards include the following: Design—Study is well designed. For the RAND study, we focused on the following elements for design: The study plan, scope, and objectives follow existing guidance. Assumptions and constraints are reasonable and consistent. Execution—Study is well executed. For the RAND study, we focused on the following elements for execution: The methodology is successfully executed. Data used to support study and analyses are validated. Presentation—Results are well presented. For the RAND study, we focused on the following elements for presentation: Timely, complete, accurate, concise, and relevant to stakeholders. Presentation of results supports findings. In addition to the contact named above, Beverly Schladt (Assistant Director), John Strong (Analyst in Charge), John Beauchamp, Vincent Buquicchio, Martin De Alteriis, and Lillian Moyano Yob made key contributions to this report.", "summary": "In September 2016, GAO reported that annual combat aircrew training requirements delineated in the Air Force's Ready Aircrew Program might not address pilot training needs, and that the Air Force did not systematically evaluate the effectiveness of its training. As a result, Congress included a provision in Section 351 of the NDAA for Fiscal Year 2017 for the Air Force to commission an independent review of its Ready Aircrew Program, report on actions it planned to take in response to any recommendations, and provide an estimate of any resources required. Section 351 also included a provision for GAO to assess the Air Force report. This report examines whether (1) the independent review conducted by the RAND Corporation addressed statutory requirements to review and assess the Ready Aircrew Program, and (2) the Air Force has reported on completed or planned actions to implement the RAND report recommendations. To address these objectives, GAO reviewed the RAND and Air Force reports on the Ready Aircrew Program, assessed the study against generally accepted research standards, and interviewed officials at RAND, Air Force Headquarters, and the Air Combat Command. A July 2018 RAND report—commissioned by the Air Force—addressed the statutory requirements of the National Defense Authorization Act (NDAA) for Fiscal Year 2017 to review and assess the Air Force's Ready Aircrew Program and make recommendations for ways to improve it. The Ready Aircrew Program establishes minimum annual training requirements for combat aircrew. RAND's report, entitled Independent Review and Assessment of the Air Force Ready Aircrew Program , made nine recommendations to improve its management: 1. Leverage internal expertise to implement measures for proficiency. 2. Invest resources to design data collection and storage solutions that facilitate analysis and readiness reporting. 3. Document the Ready Aircrew Program Tasking Memorandum development process in Air Force instruction supplements and ensure that the process incorporates squadron-level input and feedback. 4. Establish a more explicit and formal link between proficiency and Ready Aircrew Program requirements. 5. Document training quality to support requests for training resources. 6. Identify the conditions under which Ready Aircrew Program requirements, including mission types, can be accomplished. 7. Consider changing how Ready Aircrew Program requirements affect the Flying Hour Program. 8. Invest in data systems to correct data collection and assess deficiencies. 9. Leverage the Air Force Research Laboratory's performance data work and invest in added analysis to produce enterprise-wide proficiency metrics. The nine RAND recommendations aligned with two GAO recommendations made in 2016 to comprehensively assess the assumptions underlying the annual aircrew training requirements and develop a process to collect data to assess the effectiveness of the training. The Air Force's August 2018 one-page report to Congress included three broad actions in response to RAND's recommendations. The Air Force planned to build training matrices to help commanders assess their units' effectiveness, establish common data architecture through the Air Force's Chief Data Officer–led effort, and evaluate aspects of the Ready Aircrew Program to increase lethality and improve readiness as the Air Force shifts to executing the mandates of the 2018 National Defense Strategy. The Air Force, however, did not explain how these three efforts would specifically address the nine recommendations. Air Force officials said that, though they generally agreed with RAND's recommendations, the Air Force lacked the resources to fully implement them beyond actions that were underway prior to the RAND report, and considers all recommendations as “closed.” In part due to its not fully implementing RAND's recommendations, the Air Force has not fully addressed GAO's two recommendations. Fully implementing GAO's recommendations would better position the Air Force to ensure its aircrews receive effective training to achieve a range of missions. GAO is not making any new recommendations in this report but restates the need to fully implement GAO's two 2016 recommendations. In comments on a draft of this report, DOD did not concur with the two 2016 recommendations. GAO maintains that the Air Force should implement both recommendations. recommendation. GAO will consider these in its annual recommendations follow-up.", "document_type": "gao"}
{"report": "In 1968, Congress created NFIP, with the passage of the National Flood Insurance Act, to help reduce escalating costs of providing federal flood assistance to repair damaged homes and businesses. According to FEMA, NFIP was designed to address the policy objectives of identifying flood hazards, offering affordable insurance premiums to encourage program participation, and promoting community-based floodplain management. To meet these policy objectives, NFIP has four key elements: identifying and mapping flood hazards, floodplain management, flood insurance, and incentivizing flood-risk reduction through grants and premium discounts. NFIP enables property owners in participating communities to purchase flood insurance and, in exchange, the community agrees to adopt and enforce NFIP minimum floodplain management regulations and applicable building construction standards to help reduce future flood losses. A participating community’s floodplain management regulations must meet or exceed NFIP’s minimum regulatory requirements. Insurance offered through NFIP includes different coverage levels and premium rates, which are determined by factors that include property characteristics, location, and statutory provisions. NFIP coverage limits vary by program (Regular or Emergency) and building occupancy (for example, residential or nonresidential). In NFIP’s Regular Program, the maximum coverage limit for one-to-four family residential policies is $250,000 for buildings and $100,000 for contents. For nonresidential or multifamily policies, the maximum coverage limit is $500,000 per building and $500,000 for the building owner’s contents. Separate coverage is available for contents owned by tenants. NFIP also offers Increased Cost of Compliance coverage for most policies, which provides up to $30,000 to help cover the cost of mitigation measures following a flood loss when a property is declared to be substantially or repetitively damaged. Through NFIP, FEMA maps flood hazard zones on a Flood Insurance Rate Map, which participating NFIP communities must adopt. According to FEMA, floodplain management standards are designed to prevent new development from increasing the flood threat and to protect new and existing buildings from anticipated flooding. FEMA has a division responsible for flood mapping activities and policy and guidance, but stakeholders from various levels of government and the private sector participate in the mapping process, as appropriate. A community’s Flood Insurance Rate Map serves several purposes. They provide the basis for setting insurance premium rates and identifying properties whose owners are required to purchase flood insurance. Since the 1970s, homeowners with federally backed mortgages or mortgages held by federally regulated lenders on property in a special flood hazard area have been required to purchase flood insurance. Others may purchase flood insurance voluntarily if they live in a participating community. The maps also provide the basis for establishing minimum floodplain management standards that communities must adopt and enforce as part of their NFIP participation. As of May 2020, 22,487 communities across the United States and its territories voluntarily participated in NFIP by adopting and agreeing to enforce flood-related building codes and floodplain management regulations. FEMA supports a variety of community-level flood mitigation activities that are designed to reduce flood risk (and thus NFIP’s financial exposure). These activities, which are implemented at the state and local levels, include hazard mitigation planning; adoption and enforcement of floodplain management regulations and building codes; and use of hazard control structures such as levees, dams, and floodwalls or natural protective features such as wetlands and dunes. FEMA provides community-level mitigation funding through its HMA grant programs. In addition, FEMA’s Community Rating System is a voluntary incentive program that recognizes and encourages community floodplain management activities that exceed the minimum NFIP requirements. Flood insurance premium rates are discounted to reflect the reduced flood risk resulting from community actions that meet the three goals of reducing flood damage to insurable property, strengthening and supporting the insurance aspects of NFIP, and encouraging a comprehensive approach to floodplain management. At the individual property level, mitigation options include property acquisition—or “buyouts”—to either demolish a building for green space or relocate a building to a low flood risk area, elevation, or floodproofing. Acquisition and demolition (acquisition) is one of the primary methods by which states or localities use FEMA funding to mitigate flood risk. Through this process, a local or state government purchases land and structures that flooded or are at risk from future floods from willing sellers and demolishes the structures. The community restricts future development on the land, which is maintained as open space in perpetuity to restore and conserve the natural floodplain functions. According to FEMA officials, an advantage of property acquisition is that it offers a permanent solution to flood risks, whereas other mitigation methods make properties safer from floods but not immune. Property acquisition and demolition is a voluntary process, and property owners are paid fair market value for their land and structures. Acquisition is typically done on a community-wide scale, purchasing several or all properties in an at-risk neighborhood. Acquisition projects typically require building consensus from property owners and sustained communication and collaboration between residents and the government executing the project. Acquisition and relocation (relocation) refers to purchasing a structure and moving it to another location instead of demolishing it. Through this process, state or local governments use FEMA funding to help purchase land from willing sellers and assist the property owners with relocating the structure. The structure must be sound and feasible to move outside of flood-prone areas. Relocation is a voluntary process and property owners are paid fair market value for their land. Elevation involves raising a structure so that the lowest occupied floor is at or above the area’s base flood elevation. Structure elevation may be achieved through a variety of methods, including elevating on continuous foundation walls; elevating on open foundations, such as piles, piers, or columns; and elevating on fill. Structures proposed for elevation must be structurally sound and capable of being elevated safely. Further, elevation projects must be designed and adequately anchored to prevent flotation, collapse, and lateral movement of the structure from flooding, waves, and wind. Floodproofing falls into two categories: dry floodproofing and wet floodproofing. Dry floodproofing involves sealing a structure to prevent floodwater from entering. Examples of dry floodproofing measures include using waterproof coatings or coverings to make walls impermeable to water, installing waterproof shields, and installing devices that prevent sewer and drain backup. Dry floodproofing is appropriate only where floodwaters do not exceed three feet, the speed of flood waters is low, and the duration of flooding is relatively short because walls and floors may collapse from the pressure of higher water levels. Wet floodproofing involves changing a structure to allow floodwaters to enter and exit with minimal damage. Wet floodproofing is used in parts of a structure that are not used as living space, such as a crawlspace, basement, or garage. Examples of wet floodproofing measures include installing flood openings in the foundation and enclosure walls below the base flood elevation, using flood-resistant building materials and furnishings located below the base flood elevation, and either elevating or floodproofing all utility systems and associated equipment to protect them from damage. FEMA administers three HMA grant programs that can be used to fund flood mitigation projects: the Hazard Mitigation Grant Program (HMGP), Pre-Disaster Mitigation (PDM), and Flood Mitigation Assistance (FMA). Eligible HMA applicants include states, territories, and federally recognized tribal governments. Local communities cannot apply directly to FEMA for HMA funding but instead must collaborate as sub-applicants with their state, territory, or tribal government and then receive funding through that entity. Certain nonprofit organizations can act as sub- applicants but only under HMGP. Generally, individuals may not apply for HMA funding, but they may benefit from a community application. Applicants to all three programs must have FEMA-approved hazard mitigation plans. FEMA evaluates HMA applications based on technical feasibility and cost-effectiveness, among other factors. In fiscal year 2019, HMA awarded $859 million in funding. Eligible activities differ for the three programs but must be consistent with FEMA’s National Mitigation Framework. The Hazard Mitigation Grant Program helps communities implement hazard mitigation measures following a presidential major disaster declaration to improve community resilience to future disasters. HMGP provides funding to protect public or private property through various mitigation measures based on state or tribal priorities. Mitigation project examples include acquisition, relocation, retrofitting structures to minimize damages from various natural hazards, and elevating flood prone structures. HMGP recipients (states, territories, and federally recognized tribal governments) are primarily responsible for prioritizing, selecting, and administering state and local hazard mitigation projects. According to FEMA guidance, although individuals may not apply directly to the state for assistance, local governments engage interested property owners during the application process. A formula based on the size of the presidential disaster declaration determines the amount of money available to HMGP. Pre-Disaster Mitigation seeks to reduce overall risk to the population and structures from future natural hazard events, while also reducing reliance on federal funding in future disasters. PDM grants fund mitigation plans and eligible projects that reduce or eliminate long-term risk to people and property from natural disasters, such as property acquisition, property elevation, earthquake hardening, and construction of tornado and high-wind safe rooms. Generally, local governments (i.e., sub-applicants) submit mitigation planning and project applications to their state, territory, or federally recognized tribal government (i.e., applicants) for review and prioritization. The state, territory, or federally recognized tribal government then submits one PDM grant application to FEMA for consideration. Annual Congressional appropriations fund these grants, and FEMA awards them on a nationally competitive basis. In fiscal year 2019, Congress appropriated $250 million to PDM, which was the program’s final year of funding. In 2018, Congress passed the Disaster Recovery Reform Act, which included amendments to PDM, which FEMA calls the Building Resilient Infrastructure and Communities program. According to FEMA officials, this program is replacing PDM in fiscal year 2020 and will be funded through the Disaster Relief Fund as a 6 percent set-aside from the estimated total amount of grants for each major disaster declaration. FEMA has solicited public input on the program and said it expects to release a notice of funding opportunity in summer 2020. Flood Mitigation Assistance is designed to reduce or eliminate flood insurance claims by funding cost-effective flood mitigation projects that reduce or eliminate long-term risk of flood damage to structures insured under NFIP. Typical projects may include acquisition of RL properties, elevation of buildings, and neighborhood-scale flood defense investment. Generally, local communities will sponsor applications on behalf of homeowners and then submit the applications to their state. A state or federally recognized tribal government must submit the grant applications to FEMA. Annual Congressional appropriations fund FMA grants, and FEMA awards them on a nationally competitive basis. FMA appropriations have remained relatively stable at about $175 million for fiscal years 2016 through 2019. RL properties present a financial challenge for NFIP. FEMA has three definitions for such properties that vary slightly to meet the specific needs of different programs: NFIP Repetitive Loss refers to an NFIP-insured structure that has incurred flood-related damage on two occasions during a 10-year period, each resulting in at least a $1,000 claim payment. FEMA uses the NFIP RL definition for insurance purposes related to the Community Rating System, for local hazard mitigation plans, and for eligibility determinations for preferred risk policies and individual assistance. FMA Repetitive Loss refers to an NFIP-insured structure that (a) has incurred flood-related damage on two occasions in which the cost of repair, on average, equaled or exceeded 25 percent of the value of the structure at the time of each such flood event; and (b) at the time of the second incidence of flood-related damage, the flood insurance policy contained Increased Cost of Compliance coverage. FEMA uses this definition for FMA purposes, as these properties are eligible for the largest federal cost share for mitigation, up to 90 percent. This is also the same definition NFIP uses to approve an Increased Cost of Compliance payment. Severe Repetitive Loss refers to an NFIP-insured structure that has incurred flood-related damage for which (a) four or more separate claims have been paid that exceeded $5,000 each and cumulatively exceeded $20,000; or (b) at least two separate claim payments have been made under such coverage, with the cumulative amount of such claims exceeding the fair market value of the insured structure. FEMA has two severe RL definitions for mitigation and insurance, which are similar except that the insurance definition includes only residential structures, while the mitigation definition includes all structures. FEMA uses the severe RL definition for grant eligibility and cost share, the Community Rating System, and insurance rate setting. HMGP is the largest of FEMA’s three HMA programs and, unlike the others, it is based on the amount of disaster assistance a state or territory receives following a presidential disaster declaration (see table 1). PDM and FMA are smaller grant programs that receive annual appropriations and are not directly tied to an immediately preceding disaster. Because these programs do not require an immediate disaster declaration, FEMA considers them pre-disaster programs, as their intent is to mitigate potential damage before disasters occur. HMGP and PDM can be used for projects that mitigate the risk of many hazards, including flood, wind, fire, earthquake, and drought, but FMA can only be used to mitigate the risk of flood (see table 1). Furthermore, FMA funds can only be used to mitigate properties that are insured by NFIP, but HMGP and PDM funds can be used to mitigate properties without NFIP coverage. Properties mitigated in a special flood hazard area, where the structure remains on the parcel, must maintain a flood insurance policy after project completion. HMA grants fund a variety of methods to mitigate the flood risk of properties, including acquisition, elevation, relocation, and floodproofing. In most cases, HMA grants cover up to 75 percent of the project cost, and the grantee generally must contribute the remainder using nonfederal funds (although there are some exceptions, discussed below). However, PDM will cover up to 90 percent of project costs for communities that meet FEMA’s definition of small and impoverished. Moreover, FMA will cover up to 90 percent for projects that mitigate RL properties and up to 100 percent for severe RL properties. Funding levels for the three programs have varied over time because they have depended on disaster declarations and annual appropriations (see fig. 1). HMGP is the largest of the three programs—adjusted for inflation, annual HMGP grants have reached $2.9 billion, while PDM and FMA have never exceeded $300 million. According to FEMA officials, the estimated annual funding for the Building Resilient Infrastructure and Communities program, the successor to PDM, will average $300 million to $500 million, as it will be funded by a 6 percent set aside of annual estimated disaster grant expenditures. HMA funding also varies by state. Louisiana has obligated the most funding. After adjusting for inflation, it has obligated more than $3.1 billion from all three programs since HMGP was created in 1989, followed by California ($2.0 billion), Texas ($1.8 billion), New York ($1.6 billion), and Florida ($1.5 billion), while the bottom 18 states and territories each obligated less than $50 million (see fig. 2). Because HMGP is the largest program and is tied to presidential declarations, these totals reflect, in part, the extent to which states and territories have experienced natural disasters in this time period. Typically, recipients of federal mitigation grants must use nonfederal funds to meet cost share requirements because federal law prohibits the use of more than one source of federal disaster recovery funding for the same purpose. However, according to FEMA, some federal programs are exempt from these requirements due to authorizing statutes and therefore may be used in concert with HMA funds. Department of Housing and Urban Development’s Community Development Block Grant (CDBG) program. The Department of Housing and Urban Development awards CDBG funds to state and local governments to support a variety of community and economic development needs. According to FEMA’s HMA Cost Sharing Guide, HMA applicants may use several categories of CDBG funds as a source of project cost share, as long as the project meets Department of Housing and Urban Development rules. CDBG Disaster Recovery funds are the most frequently used form of HMGP cost share from a federal agency, according to FEMA. FEMA Increased Cost of Compliance coverage. NFIP offers Increased Cost of Compliance coverage, which provides up to $30,000 for policyholders to fund mitigation efforts on their property if they experience substantial damage or if their structure is an RL property. Between 1997 and 2014, the vast majority (99 percent) of Increased Cost of Compliance claims met the substantially damaged property definition, according to a 2017 report from the University of Pennsylvania. Unlike CDBG, which is awarded to states and local governments, Increased Cost of Compliance is awarded directly to individuals. According to FEMA, it is eligible as an HMA nonfederal cost share because it is considered a direct contract between the insurer and policyholder. FEMA allows recipients to assign their funds to the community as part of a collective mitigation project, and the community is then obligated to provide HMA funding to any property owner who contributed Increased Cost of Compliance dollars toward the nonfederal cost share. As of September 2019, FEMA had closed more than 38,000 Increased Cost of Compliance claims with dates of loss since 1997, totaling more than $877 million. Small Business Administration disaster loans. Small Business Administration disaster loans provide up to $200,000 for repairing or replacing a primary residence and $40,000 for repairing or replacing personal items that have been affected by a disaster. The interest rate cannot exceed 4 percent for applicants unable to access credit elsewhere, and cannot exceed 8 percent for all others. Secondary or vacation homes are not eligible, but qualified rental properties may be eligible under the Small Business Administration’s business disaster loan program, which offers loans of up to $2 million. According to FEMA guidance, these loans can serve as a source of cost share if HMA grants are disbursed early enough; however, the differing award timelines often make these funding sources incompatible. Further, disaster loans may not be eligible in conjunction with HMA funds due to duplication of benefits, but general-purpose Small Business Administration loans are not subject to this restriction, according to FEMA. In addition to FEMA’s three HMA programs, other federal, state, and local programs have helped acquire properties. Community Development Block Grants. In addition to its use as a cost- share complement to HMA grants, states and communities can use CDBG Disaster Recovery funding as a stand-alone source of property acquisition funds, according to the Department of Housing and Urban Development. Availability of CDBG Disaster Recovery funds is subject to supplemental appropriations following a presidential disaster declaration and must be used in response to that specific disaster. CDBG Disaster Recovery funds are disbursed to state and local governments and not to individuals directly. However, the governmental recipient can award CDBG Disaster Recovery funds to private citizens, nonprofits, economic development organizations, businesses, and other state agencies. The Bipartisan Budget Act of 2018 appropriated funding for CDBG, of which the Department of Housing and Urban Development allocated almost $6.9 billion for CDBG mitigation funds for the first time, as a result of the 2015 to 2017 disasters. Unlike CDBG Disaster Recovery funds, which the recipient must use in response to a specific disaster, recipients may use CDBG Mitigation funds to mitigate risks from future disasters. U.S. Army Corps of Engineers’ National Nonstructural Committee. The Army Corps of Engineers (Corps) conducts a range of mitigation measures through the National Nonstructural Committee, including acquisitions, elevations, relocations, and floodplain mapping. Nonstructural refers to measures that attempt to mitigate the consequences of floods, as opposed to structural measures intended to prevent floods from occurring. According to the Corps, except for limited research funding, it does not offer grants for flood risk management projects, and large projects generally require specific authorization from Congress. However, the Corps’ Continuing Authority Program allows it to execute smaller projects at its discretion. For example, for one of the programs, the federal government funds 65 percent of a project’s cost, and the project sponsor must provide all land, easement, rights-of-way, relocations, and disposal areas required for the project. The sponsor’s cost share includes credit for provision of the requirements above and pre-approved work-in-kind, but at least five percent must be provided in cash. Department of Agriculture’s Natural Resources Conservation Service Emergency Watershed Protection Program. The Federal Agriculture Improvement and Reform Act of 1996 enables the Emergency Watershed Protection Program to purchase floodplain easements on residential and agricultural land for flood mitigation purposes and to return the land to its natural state. For agricultural and residential land, this program pays up to the entire easement value and also funds property demolition or relocation, according to the Department of Agriculture. Land generally must have flooded in the past year or twice within the previous 10 years to be considered eligible. State and local acquisition programs. While state and local governments are active participants in federal acquisition projects, some have also developed their own acquisition programs. These programs vary on the extent to which they rely on federal funds, if at all. For example: The Harris County Flood Control District, a special purpose district, in Texas acquired about 3,100 properties between 1985 and 2017, according to a 2018 report from Rice University, using a combination of FEMA grants, Corps funds, and local dollars. Charlotte-Mecklenburg Storm Water Services, a joint city-county utility in North Carolina, has acquired more than 400 homes since 1999. Initially, it primarily used federal funds, but now it uses almost solely stormwater fees and other local revenue to fund acquisitions. The utility’s Quick Buys program allows it to acquire properties soon after a flood, before homeowners invest in repairs, whereas federal acquisitions often occur after property owners have begun rebuilding, according to FEMA officials. New Jersey, through its Blue Acres program, plans to acquire up to 1,300 properties damaged by Superstorm Sandy. The program has used state funds, including $36 million in bonds, as well as more than $300 million in federal funding received from multiple agencies. Since 1989, the primary means by which FEMA has mitigated flood risk at the property level has been by funding property acquisitions. Acquisitions accounted for about 75 percent of FEMA’s $5.4 billion in flood mitigation spending, adjusted for inflation, from 1989 to 2018 (see fig. 3). Most of the remaining spending was used to elevate properties, with smaller amounts used to floodproof and relocate properties. The average federal cost-per-property was $136,000 for acquisitions and $107,000 for elevations, according to 2008-2014 FEMA data. As seen in figure 4, FEMA-funded property acquisitions have fluctuated over time but have generally increased since FEMA’s HMA programs began. For example, from 1989 through 1992—the first four years of HMGP funding and prior to the creation of PDM and FMA—less than $8 million, adjusted for inflation, was obligated for property acquisitions each year, resulting in fewer than 200 acquisitions each year (see fig. 4). The highest acquisition funding generally was associated with years that had significant flood events, such as Superstorm Sandy (2012) and Hurricanes Harvey, Irma, and Maria (2017). From fiscal years 1989-2018, approximately $3.3 billion of property acquisition funding, adjusted for inflation, occurred through HMGP, resulting in the acquisition of 41,458 properties (see fig. 5). HMGP represented about 90 percent of all property acquisitions and 82 percent of all acquisition funding, with PDM and FMA representing the remainder. As a result, most FEMA-funded acquisitions occurred following flood events. Most of the funding, adjusted for inflation, for HMGP’s and PDM’s flood mitigation projects has been for property acquisition (83 percent and 89 percent of total funds, respectively), while most FMA funding has been for elevation (49 percent). Although FEMA mitigated more than 57,000 properties for flood risk from 1989 to 2018, including more than 46,000 through acquisition, the number of nonmitigated RL properties increased from 2009 to 2018. Figure 6 shows that this growth in the number of RL properties has outpaced efforts to mitigate their flood risk. From 2009 through 2018, FEMA’s inventory of new RL properties grew by 64,101. During this period, FEMA mitigated 4,436 RL properties through its three HMA programs, and an additional 15,047 were mitigated through other federal or state programs. As a result, the number of nonmitigated RL properties increased by 44,618—more than double the number of RL properties that were mitigated in that time period. States varied in the extent to which they mitigated high-risk properties, including RL properties, between 1989 and 2018. While FEMA does not require a property to be an RL property to receive flood mitigation funding, the number of properties mitigated by a state relative to its population of RL properties provides context to its flood mitigation progress. For example, some states with large numbers of RL properties, such as Texas, Louisiana, Florida, and New York, mitigated few properties relative to their numbers of RL properties (see table 2). Other states, such as Missouri and North Carolina, have far fewer RL properties but have mitigated more properties relative to their numbers of RL properties. States also varied in their methods for flood mitigation (see table 2). For example, while property acquisition accounted for 81 percent of mitigated properties nationwide, it represented closer to half of mitigated properties in Virginia, New Jersey, and Florida and only 19 percent in Louisiana. According to some FEMA and local officials, high property values in some regions can make acquisitions cost prohibitive and other mitigation methods such as elevation more attractive because they do not incur the cost of purchasing the land. Many other factors could affect mitigation, including homeowners’ preferences. Further, the voluntary nature of FEMA’s HMA programs may limit states’ ability to acquire properties with known flood risk. According to FEMA, acquisition permanently addresses flood risk because, unlike elevation or floodproofing, it moves individuals and structures away from flood risk rather than mitigating a structure in place. In a subsequent report, we plan to explore in more detail the factors, including homeowner demand for acquisition, that have affected the extent to which states have used acquisition to mitigate flood risk. NFIP represents a fiscal exposure to the federal government because its premium rates have not kept pace with the flood risk of the properties it insures. Addressing this imbalance would mean reducing the flood risk of the insured properties, increasing premium revenue, or some combination of both. Despite FEMA’s efforts to mitigate its insured properties’ flood risk, premium rates for many properties do not reflect the full estimated risk of loss. As we have reported previously, mitigation alone will not be sufficient to resolve NFIP’s financial challenges; structural reforms to the program’s premium rates will also be necessary. NFIP’s total annual flood claim payments have grown in recent years, potentially indicating an increase in flood risk. For example, the eight years of the highest annual NFIP claims have all occurred since 2004, with particularly catastrophic flood events accounting for much of these claims: In 2005, claims reached $17.8 billion ($23.3 billion, adjusted for inflation), largely due to Hurricanes Katrina, Rita, and Wilma. In 2012, claims reached $9.6 billion ($10.7 billion, adjusted for inflation), largely due to Superstorm Sandy. In 2017, claims reached $10.5 billion ($11.0 billion, adjusted for inflation), largely due to Hurricanes Harvey, Irma, and Maria. These severe weather events appear to be contributing to the long-term increases in claims paid by NFIP, as would be expected with infrequent but severe events. As seen in figure 7, the amount of claims paid per policy, adjusted for inflation, does not show a steady increase in claims but rather substantial spikes in certain years associated with catastrophic flooding events. RL properties have contributed heavily to NFIP’s claims and, as noted earlier, the number of RL properties continues to rise despite FEMA’s mitigation efforts. Of the $69.7 billion in claims NFIP paid out from 1978 to 2019, $22.2 billion was for flood damage sustained by RL properties (32 percent). The frequency and intensity of extreme weather events, such as floods, are expected to increase in coming years due to climate change, according to the U.S. Global Change Research Program and the National Academies of Sciences. Further, numerous studies have concluded that climate change poses risks to many environmental and economic systems and a significant financial risk to the federal government. For example, according to the November 2018 National Climate Assessment report, the continued increase in the frequency and extent of high-tide flooding due to sea level rise threatens America’s trillion-dollar coastal property market. According to the National Oceanic and Atmospheric Administration, minor flood events (sometimes referred to as nuisance flooding) also are projected to become more frequent and widespread due to climate change. While it is uncertain the exact extent to which flood risk has changed and will continue to change, NFIP’s fiscal exposure will persist as long as premium rates do not keep pace with flood risk. As we have been reporting since 1983, NFIP’s premium rates do not reflect the full risk of loss because of various legislative requirements and FEMA practices. To set premium rates, FEMA considers several factors, including location in flood zones, elevation of the property relative to the community’s base flood elevation, and characteristics of the property, such as building type, number of floors, presence of a basement, and year built relative to the year of the community’s original flood map. Most NFIP policies have premium rates that are deemed by FEMA to be full-risk rates, which FEMA defines as sufficient to pay anticipated losses and expenses. However, FEMA’s overall rate structure may not reflect the full long-term estimated risk of flooding, as discussed below. Subsidized rates. NFIP offers some policyholders subsidized rates—that is, rates that intentionally do not reflect the full risk of flooding. These premium rates are intended to encourage the widespread purchase of flood insurance by property owners and encourage floodplain management by communities. Subsidized rates generally are offered to properties in high-risk locations (special flood hazard areas) that were built before flood maps were created. FEMA staff said they have begun increasing rates for certain subsidized properties as prescribed under the Biggert-Waters Flood Insurance Reform Act of 2012 and the Homeowner Flood Insurance Affordability Act of 2014. In addition, the percentage of subsidized policies is decreasing. According to FEMA data, the percentage of NFIP policies receiving subsidized rates dropped from about 22 percent in July 2013 to about 17 percent in June 2019. In 2013, we recommended that FEMA obtain elevation information to determine full-risk rates for subsidized properties. As of January 2020, FEMA had not fully implemented this recommendation but was in the process of doing so. For example, FEMA had requested proposals from third-party vendors for obtaining the elevation information and was reviewing these proposals. This information remains necessary for FEMA to determine the adequacy of its premium rates and the costs of any subsidization. It will also allow Congress and the public to understand the amount of unfunded subsidization within the program and the federal fiscal exposure it creates. Grandfathered rates. FEMA allows some property owners whose properties are remapped into higher-risk flood zones to continue to pay the premium rate from the lower-risk zone. FEMA data show that about 9 percent of NFIP policies were receiving a grandfathered rate as of June 2019. In 2008, we recommended that FEMA collect data to analyze the effect of grandfathered policies on NFIP’s fiscal exposure. As of February 2020, FEMA officials said they had not fully implemented this recommendation but were in the process of doing so. The officials told us they had finished collecting data on grandfathered policies and that they planned to analyze it as they completed efforts to update their premium rate setting approach. Collection and analysis of data on grandfathered policies will help FEMA understand and communicate the extent to which these policies are contributing to NFIP’s fiscal exposure. Rates designated full-risk. As we reported in 2008 and 2016, it is unclear whether premiums FEMA considers to be full-risk actually reflect the full long-term estimated risk of loss. For example, NFIP full-risk premium rates do not fully reflect the risk of catastrophic losses or the expenses associated with managing them. Private insurers typically manage catastrophic risk using capital, reinsurance, and other instruments, such as catastrophe bonds, and include the associated expenses in premium rates. By contrast, FEMA has traditionally managed catastrophic risk by relying on its authority to borrow from Treasury. In January 2017, FEMA began purchasing reinsurance to transfer some of its flood risk exposure to the private reinsurance market. However, FEMA has not accounted for these expenses in setting its NFIP premium rates. Reinsurance could be beneficial because it would allow FEMA to recognize some of its flood risk and the associated costs up front through the premiums it must pay to the reinsurers rather than after the fact in borrowing from Treasury. However, because reinsurers must charge FEMA premiums to compensate for the risk they assume, reinsurance’s primary benefit would be to manage risk rather than to reduce NFIP’s expected long-term fiscal exposure. Congress has directed FEMA to provide discounted premium rates to promote affordability for policyholders but did not provide FEMA with dedicated funds to pay for these subsidies. As a result, premium revenue has been insufficient to pay claims in some years, requiring borrowing from Treasury to make up for the shortfall. While Congress passed reforms to NFIP in 1994 and 2004, neither set of actions sufficiently addressed program revenue. In 2005, Hurricanes Katrina, Rita, and Wilma hit the Gulf Coast and resulted in NFIP borrowing nearly $17 billion from Treasury to pay claims (see fig. 8). In July 2012, Congress passed the Biggert-Waters Flood Insurance Reform Act, which contained significant reforms to NFIP’s premium rates. But a few months later, Superstorm Sandy occurred, pushing NFIP’s debt to $24 billion. Following policyholders’ concerns about the rate increases authorized by the 2012 act, Congress slowed the pace of many of these rate increases in 2014 with the Homeowner Flood Insurance Affordability Act. In the fall of 2017, Hurricanes Harvey, Irma, and Maria occurred, prompting additional borrowing from Treasury and causing NFIP to reach its borrowing limit. In response, Congress canceled $16 billion of NFIP’s debt in October 2017, which allowed NFIP to pay claims from these storms. Since September 2017, NFIP has been operating under a series of short-term authorizations, the most recent of which expires in September 2020. As of March 2020, NFIP’s debt remained at $20.5 billion. To improve NFIP’s solvency and enhance the nation’s resilience to flood risk, we suggested in 2017 that Congress could make comprehensive reforms that include actions in six areas. We reported that it was unlikely that FEMA would be able to repay its debt and that addressing it would require Congress to either appropriate funds or eliminate the requirement that FEMA repay the accumulated debt. However, eliminating the debt without addressing the underlying cause of the debt—insufficient premium rates—would leave the federal taxpayer exposed to a program requiring repeated borrowing. To address NFIP’s fiscal exposure, there are two general approaches: decrease costs or increase revenue. Decreasing costs to the program in the form of claims involves mitigating insured properties’ flood risks. Mitigation can be very costly, but there will be some properties for which the cost to mitigate will be outweighed by the benefit of reduced flood risk and, ultimately, fiscal exposure. Mitigation may be a cost-effective option for those properties for which full-risk rates would be cost-prohibitive. Increasing revenue would require reforms to NFIP’s premium rates. FEMA has begun increasing rates on subsidized properties. But, as we suggested in 2017, Congress could remove existing legislative barriers to FEMA’s premium rate revisions. Members of Congress and others have raised concerns about such reforms because raising premium rates may make coverage unaffordable for some policyholders. To address these concerns, we suggested that all policies include full-risk premium rates, with targeted, means-based, appropriated subsidies for some policies. This would improve the program’s solvency while also addressing affordability concerns. Assigning full-risk premium rates to all policies would remove subsidies from those who do not need them, helping improve solvency. It would also more accurately signal the true flood risk to property owners and enhance resilience by incentivizing mitigation measures, such as acquisition. Means-based subsidies would ensure that property owners who needed help would get it, and an explicit appropriation for the subsidies would make their true cost transparent to taxpayers. We maintain that a comprehensive approach that includes mitigation and rate reform is needed to address NFIP’s fiscal exposure. Because several categories of NFIP premium rates do not reflect the full risk of flood loss, FEMA has had to borrow $36.5 billion from Treasury to pay claims from several catastrophic flood events since 2005. To address this, some have suggested additional funding to mitigate RL properties. While we acknowledge that mitigation is part of the solution, we maintain that a more comprehensive approach is necessary to address the program’s fiscal exposure. We have made two recommendations to FEMA that, if implemented, could help inform Congress’ efforts to reform NFIP. In 2008, we recommended that FEMA collect information on grandfathered properties and analyze their financial effect on NFIP, and in 2013, we recommended that FEMA obtain elevation information on subsidized properties. By implementing these recommendations, FEMA would better understand NFIP’s fiscal exposure and be able to communicate this information to Congress. Further, we suggested in 2017 that Congress take a comprehensive approach to reforming NFIP. One important first step would be to implement full-risk premium rates for all policies, with appropriated means-based subsidies for some policies. Full-risk premium rates would remove subsidies from those who do not need them, helping improve solvency, and also more accurately signal the true flood risk to property owners and incentivize efforts to mitigate flood risk. Further, means- based subsidies would ensure that property owners who need help will get it, and having Congress explicitly appropriate for the subsidies would make the true cost of the subsidy transparent to taxpayers. While this would be an important step to putting NFIP on a sustainable path, comprehensive reform of the program should also address the other issues we have identified, including mitigating the flood risk of insured properties. We provided a draft of this report to the Department of Homeland Security for its review and comment. The agency provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report addresses the Federal Emergency Management Agency’s (FEMA) National Flood Insurance Program (NFIP). Our objectives were to examine (1) funding programs available for property acquisitions, (2) FEMA’s flood mitigation efforts, and (3) factors contributing to NFIP’s fiscal exposure. To describe funding programs available for property acquisitions, we reviewed authorizing legislation, the Code of Federal Regulations, and FEMA guidance and manuals, including the Hazard Mitigation Assistance Guidance and Cost Share Guide, to identify program characteristics, eligibility requirements, and application guidelines. To identify funding for these programs, we analyzed FEMA’s project-level Hazard Mitigation Assistance (HMA) data from its Enterprise Applications Development Integration and Sustainment system, which FEMA uses to track mitigation projects funded through its HMA grant programs. To summarize Increased Cost of Compliance coverage, which NFIP policyholders can use to fund mitigation efforts, we analyzed FEMA’s NFIP claims database to identify the number and amount of such claims. We also interviewed the FEMA officials responsible for administering these grant programs. Further, we identified other federal agency programs that can fund property acquisitions or meet cost share requirements and reviewed their authorizing legislation and their relevant federal regulations. Finally, to identify examples of state and local programs that have been used to fund property acquisitions, we reviewed academic reports, including from the University of North Carolina and Rice University. To review FEMA’s flood mitigation efforts, we analyzed FEMA’s project- level HMA data from the “Mitigation Universe” of its Enterprise Applications Development Integration and Sustainment system. We analyzed several variables in this dataset, including number of properties, federal share obligated, mitigation type category, grant program area, grant program fiscal year, and state. For the analyses by mitigation type category, we excluded projects (79 percent of the total records) that did not include a flood mitigation activity (those with values of “Other” or “Pure Retrofit”). Of the remaining records, 98 percent were “Pure,” meaning all properties within each project were of a single mitigation method type (acquisition, elevation, floodproof, or relocation). The remaining 2 percent were “Mixed,” indicating a project contained at least one acquisition and at least one elevation but could also contain other mitigation methods. For analyses by grant program area, we treated projects funded through the Severe Repetitive Loss and Repetitive Flood Claims grant programs as being part of the Flood Mitigation Assistance program and projects funded through the Legislative Pre-Disaster Mitigation program as being part of the Pre- Disaster Mitigation program. For data on the number of flood mitigated properties, we used the final number of properties mitigated by a project. For data on funding, we used the federal share of the project’s obligated funding. To analyze mitigated and nonmitigated repetitive loss (RL) properties, we summarized FEMA’s RL property mitigation report, which tracked the cumulative number of RL properties by year from June 2009 through June 2018. To describe the number of RL properties by state, we analyzed FEMA’s list of RL properties as of August 31, 2019, which included every property that at any point FEMA had designated as an RL property under any of its three definitions. The list included properties that had since been mitigated, as well as those that are no longer insured by NFIP. To examine factors contributing to NFIP’s fiscal exposure, we analyzed FEMA’s claims dataset as of September 30, 2019. This dataset includes the more than 2 million claims paid to NFIP policyholders since the beginning of the program. We excluded records whose status was “open” or “closed without payment.” Further, we excluded records whose year of loss was before 1978 because FEMA officials told us that that was the first year they considered their claims data to be reliable and complete. To identify factors that contribute to NFIP’s fiscal exposure and illustrate how this fiscal exposure has materialized and changed over time, we reviewed several of our previous reports and the Department of the Treasury’s statements of public debt. Finally, to summarize how flood risk could change in the future, we reviewed our previous reports on climate change. In general, we adjusted for inflation any dollar figures that we compared or aggregated across multiple years and indicated this accordingly. To do this, we used the Bureau of Labor Statistics’ Consumer Price Index for All Urban Consumers. To assess the reliability of all of the datasets we analyzed for this report, we requested and reviewed preliminary versions of the data and accompanying data dictionaries. We used the data dictionary to identify potential variables for use in our analyses and output statistics on these variables (e.g., frequencies of values, number of blanks or zero values, minimum, maximum, and mean) to identify any potential reliability concerns such as outliers or missing values. We met with relevant FEMA officials to discuss each of the data sets to understand how FEMA collected, used, and maintained the data; the reliability and completeness of key variables; reasons for any potential discrepancies we identified; and whether our understanding of the data and approach to analyzing them were accurate and reasonable. After these meetings, we requested updated versions of the data and updated our analyses accordingly. We determined that all data elements we assessed were sufficiently appropriate and reliable for this report’s objectives. We conducted this performance audit from January 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. January 1983: We recommended that FEMA improve its rate-setting process to ensure adequate income for NFIP and suggested that Congress either limit FEMA’s borrowing for extraordinary losses or establish an emergency fund for such losses, and pay for NFIP subsidies with appropriations. March 1994: We found that NFIP’s premium income was insufficient to meet expected future losses because of subsidized rates and suggested that Congress consider how any changes in premium rates would affect policyholder participation. September 1994: National Flood Insurance Reform Act. Developed a mitigation assistance program and expanded the mandatory purchase requirement. June 2004: Flood Insurance Reform Act. Authorized grant programs to mitigate properties that experienced repetitive flooding losses. August-October 2005: Hurricanes Katrina, Rita, Wilma. Caused $17.1 billion in NFIP claims. FEMA debt to Treasury increased to $16.9 billion in fiscal year 2006. March 2006: We added NFIP to our high-risk list. October 2008: We recommended that FEMA collect data to analyze the effect of grandfathered policies on NFIP’s fiscal exposure. November 2008: We identified three options for addressing the financial impact of subsidies: increasing mitigation efforts; eliminating or reducing subsidies; and targeting subsidies based on need. June 2011: We suggested that Congress allow NFIP to charge full- risk premium rates to all property owners and provide assistance to some categories of owners to pay those premiums. July 2012: Biggert-Waters Flood Insurance Reform Act. Required FEMA to increase rates for certain subsidized properties and grandfathered properties; create a NFIP reserve fund; and improve flood risk mapping. October 2012: Superstorm Sandy. Caused $8.8 billion in NFIP claims. FEMA debt to Treasury increased to $24 billion in fiscal year 2013. February 2013: We added limiting the federal government’s fiscal exposure by better managing climate change risks to our high-risk list. July 2013: We recommended that FEMA obtain elevation information to determine full-risk rates for subsidized policyholders. March 2014: Homeowner Flood Insurance Affordability Act. Reinstated certain rate subsidies removed by the Biggert-Waters Flood Insurance Reform Act of 2012; established a new subsidy for properties that are newly mapped into higher-risk zones; restored grandfathered rates; and created a premium surcharge that would be deposited into the NFIP reserve fund. October 2014: We recommended that FEMA amend NFIP minimum standards for floodplain management to encourage forward-looking construction and rebuilding efforts that reduce long-term risk and federal exposure to losses. July 2015: We recommended that the Mitigation Framework Leadership Group establish an investment strategy to identify, prioritize, and guide federal investments in disaster resilience and hazard mitigation-related activities. August-October 2016: Hurricane Matthew and Louisiana floods. Caused $3.1 billion in NFIP claims. FEMA debt to Treasury debt increased to $24.6 billion in early fiscal year 2017. April 2017: We suggested that Congress make comprehensive reforms to NFIP that include actions in six areas: (1) addressing the debt; (2) removing legislative barriers to full-risk premium rates; (3) addressing affordability; (4) increasing consumer participation; (5) removing barriers to private-sector involvement; and (6) protecting NFIP flood resilience efforts. August-September 2017: Hurricanes Harvey, Irma, and Maria. Caused $10 billion in NFIP claims. FEMA reached the limit of its Treasury borrowing authority of $30.4 billion. September 2017: NFIP’s last long-term authorization ended, resulting in a string of short-term reauthorizations. October 2017: Congress canceled $16 billion of NFIP’s debt to enable FEMA to continue paying flood claims. This reduced FEMA’s debt to Treasury to $20.5 billion. March 2020: FEMA’s debt to Treasury remained at $20.5 billion. September 2020: NFIP’s current short-term authorization ends. Alicia Puente Cackley, (202) 512-8678 or cackleya@gao.gov In addition to the contact named above, Patrick Ward (Assistant Director), Christopher Forys (Analyst in Charge), Emily Bond, Christina Cantor, William Chatlos, Eli Dile, Lijia Guo, Holly Halifax, Laura Ann Holland, Yann Panassie, Stephen Ruszczyk, Jessica Sandler, Joseph Silvestri, Jena Sinkfield, and Kelsey Wilson made key contributions to this report.", "summary": "NFIP has faced significant financial challenges over the years, highlighted by a rise in catastrophic flood events and its $20.5 billion debt to Treasury. Contributing to these challenges are repetitive loss properties—those that have flooded and received a claim payment multiple times. Acquiring and demolishing these properties is one alternative to paying for repeated claims, but questions exist about the cost, efficiency, and effectiveness of this approach. GAO was asked to review FEMA's property acquisition efforts as a means of addressing NFIP's financial challenges. This report examines (1) funding programs available for acquisitions, (2) FEMA's flood mitigation efforts, and (3) factors contributing to NFIP's fiscal exposure. To conduct this work, GAO reviewed FEMA guidance and other documentation; analyzed FEMA data sets related to NFIP policies and claims, repetitive loss properties, and mitigation projects; and interviewed FEMA officials. The Federal Emergency Management Agency (FEMA) administers three grant programs that can fund efforts to mitigate the flood risk of properties insured by the National Flood Insurance Program (NFIP). Together, these three programs funded $2.3 billion in mitigation projects from fiscal years 2014 through 2018. The largest program's funding is tied to federal recovery dollars following presidential disaster declarations, while the other two programs are funded each year through congressional appropriations. States and localities generally must contribute 25 percent of the cost of a mitigation project, but some other federal program funds can be used for that purpose. One example of such a project is property acquisition—purchasing a high-risk property from a willing property owner, demolishing the structure, and converting the property to green space. From 1989 to 2018, FEMA has helped states and localities mitigate more than 50,000 properties; however, the number of nonmitigated repetitive loss properties (generally meaning those that flooded at least twice in 10 years) has grown. Mitigation efforts varied by state. Property acquisition accounted for about 80 percent of mitigated properties nationwide, but, in some states, elevation (raising a structure) was more commonly used. In addition, some states (e.g., Missouri and North Carolina) mitigated a high number of properties relative to their numbers of repetitive loss properties, while others (Florida, New York, Louisiana, and Texas) mitigated a low number. While these efforts can reduce flood risk and claim payments, the federal government's fiscal exposure from NFIP remains high because premium rates do not fully reflect the flood risk of its insured properties. NFIP has experienced several catastrophic flood events in recent years, and the frequency and severity of floods is expected to increase. However, NFIP's premium rates have not provided sufficient revenue to pay claims. As a result, FEMA still owed Treasury $20.5 billion as of March 2020, despite Congress cancelling $16 billion of debt in 2017. As GAO has reported in the past (GAO-17-425), Congress will need to consider comprehensive reform, including mitigation and structural changes to premium rates, to ensure NFIP's solvency. GAO suggested in GAO-17-425 that Congress make comprehensive reforms to NFIP to improve the program's solvency. Given NFIP's continued debt growth, GAO maintains that comprehensive reform warrants consideration.", "document_type": "gao"}
{"report": "Each major facilities project has a sponsoring office from within NSF’s seven research directorates. The sponsoring office assesses the scientific merit of a potential project, proposes projects for funding through NSF’s MREFC account, and is responsible for overseeing the project during the following five stages of its life cycle. Development. Initial project ideas emerge, and a broad consensus is built within the relevant scientific community for the potential long-term needs, priorities, and general requirements for research infrastructure that NSF may consider funding. Design. Entrance into this stage occurs when the NSF Director approves the proposed research infrastructure as a national priority and the sponsoring directorate makes an award (either through a cooperative agreement or contract) for developing detailed project cost, scope, and schedule for possible construction. This stage is divided into conceptual, preliminary, and final design phases. According to NSF documentation, the goal of the conceptual design phase is to create a comprehensive design that clearly articulates project elements that NSF will consider, such as a description of research infrastructure and technical requirements, a concept of operations, and an initial risk analysis, among others. The preliminary design phase further develops projects through the formulation of a site-specific scope, an accurate budget estimate, a revised and updated project execution plan, and other deliverables to establish a project baseline. In the final design phase, a candidate project will refine cost and contingency estimates, complete recruitment of key staff needed to undertake construction of the project, and develop the necessary documentation needed to undergo final design review. A candidate project will exit the design stage and enter the construction stage after a successful review by the NSF director and other key stakeholders of its project execution plan and authorization of its not- to-exceed total project cost by the National Science Board, as discussed below. Construction. The construction stage begins when NSF makes awards to external recipients for acquisition or construction of research infrastructure. Such awards generally take the form of cooperative agreements, although NSF occasionally uses contracts, according to agency officials. The policies and procedures in NSF’s Major Facilities Guide apply to research infrastructure projects regardless of the award instrument employed. According to NSF’s Major Facilities Guide, the transition from construction to operations could be a single acceptance event or multiple events depending on the nature of the project, and many projects require an integration and testing phase, followed by a commissioning phase to bring the facility up to the design level of operational readiness. The construction stage ends after final delivery and acceptance of the defined scope of work and facility performance per terms of the award instrument. Operations. The operations stage includes the day-to-day work necessary to operate and maintain the research infrastructure (including refurbishment or upgrade activities) and to perform research. Operations awards, which are separate from construction awards, may be made to the construction award recipients or to a different entity. Depending on the project, initial operations may begin before completion of construction. Integration and testing activities may continue during the operations stage, depending upon the complexity and time needed to reach design specifications. Divestment. Divestment can include the transfer of the research infrastructure to another entity’s operational and financial control or the decommissioning of the research infrastructure, including its complete deconstruction and removal. NSF generally decides to divest when the agency or the scientific community determines that the facility is no longer considered an operational priority with regard to advancing science, according to NSF’s Major Facilities Guide. NSF funding for the development, design, operations, and divestment stages generally comes from the sponsoring directorate. Funding for the construction stage generally comes from the MREFC account. However, if the sponsoring directorate funds construction, the policies and procedures in NSF’s Major Facilities Guide apply if total project costs meet the definition of a major multiuser research facility project under the American Innovation and Competitiveness Act—that is, if the costs exceed $100 million or 10 percent of the responsible directorate’s annual budget, whichever is less. NSF has established an oversight structure for major facilities projects that includes offices from across the agency (see fig. 1). This includes the National Science Board, a policy and advisory body that is part of NSF and consists of the NSF Director and 24 members, drawn from industry and universities, who represent a variety of science and engineering disciplines. The NSF Office of the Director and the National Science Board provide high-level, ongoing oversight of major facilities projects, including the approval of new projects to be included in NSF’s annual budget request. Within NSF’s Office of Budget, Finance, and Award Management, the Large Facilities Office (1) develops business-related oversight policies for all life-cycle stages with a focus on the design and construction stages and (2) provides assistance on nonscientific and nontechnical aspects of project planning, budgeting, implementation, and management. To that end, the office maintains the Major Facilities Guide, which contains NSF policies for agency staff and recipients on the planning, management, and oversight of major facilities. Prior to requesting the National Science Board’s authorization to include a proposed project in a future NSF budget request, the Large Facilities Office provides independent assurance—apart from the sponsoring office and external panels—that NSF oversight processes have been followed, project plans are construction ready, and construction and operations budgets are justified. In addition, it prepares a bimonthly status report for NSF leadership on all ongoing major facilities in construction and candidate projects in design. NSF also uses external panels of experts to review projects at several points during their life cycles. An external panel may first review a project proposal during the development stage. Separate panels then review the project at the culmination of each of its design phases. In addition, an external panel periodically reviews each project during both construction and operations; according to NSF officials, those reviews are generally on an annual basis. According to NSF officials and policy documents, the agency selects panelists based on the questions that need to be addressed and on the type of review taking place. For example, for panels charged with reviewing all aspects of a project, NSF will generally select panelists to represent the academic and broader national or international research community, as well as experts in administrative aspects of facilities and project management, according to NSF’s Major Facilities Guide. Furthermore, the responsible directorate and the Large Facilities Office jointly manage the external panel review process and other NSF staff may attend as observers, according to the agency’s Major Facilities Guide. Each panel is to provide NSF with a report summarizing the review’s findings and any recommendations to NSF. Under NSF’s major facilities construction process, the recipients of design awards develop construction cost and schedule estimates for projects and submit them to NSF for review. In particular, after a project’s final design review, the National Science Board authorizes a not-to-exceed award amount and an award duration. According to NSF officials, this finalizes the initial budget request previously submitted to Congress after the project’s preliminary design review. The not-to-exceed award amount that the National Science Board authorizes is the amount against which NSF measures cost increases to implement its no cost overrun policy. NSF’s Major Facilities Guide defines two components that together make up the total project cost and schedule for the construction of major facilities projects. The total project cost awarded in a project’s construction agreement may be less than the not-to-exceed cost but not more. These components of the total project cost and schedule are the following: Performance measurement baseline. During design, the cost, scope, and schedule are refined and eventually become the project baseline. Once the baseline has been authorized and included in a construction award, it is known as the performance measurement baseline. NSF documents the performance measurement baseline in the terms and conditions of the award instrument and requires that any changes to it be made through a formal change control process. The performance measurement baseline does not include the project’s budget or schedule contingency. Contingency. This is an amount of budget or time for covering the cost increases or delays that would result if foreseen project risks were to occur. During development of a total project cost estimate, the timing and impacts of such risks are uncertain. As a project progresses, the impacts of risks that materialize may exceed the cost or schedule in the performance measurement baseline and lead to use of the project’s budget or schedule contingency. According to NSF’s Standard Operating Guidance on budget contingency, it is likely no contingency will be left over by the end of a project because all of it will have been used during normal execution of the project to manage known risks and uncertainties. NSF approval is needed when use of contingency exceeds certain project-specific thresholds, which are described in the project’s execution plan and codified in the award. In this report, we identify total project costs for the construction of major facility projects which were developed during the design phase based on the latest estimates available from NSF officials; those estimates are subject to change before construction awards are made. For projects under construction, we identify total project costs based on the amounts awarded in the cooperative support agreements for construction and the not-to-exceed amounts authorized by the National Science Board. Only at the end of the projects—when construction is complete and the awards have been closed out—will the final total project costs be known. In addition to the performance measurement baseline and budget contingency, a project’s not-to-exceed cost that the National Science Board authorized may include the following: Fee. NSF may provide recipients the opportunity to earn a fee (formerly referred to by NSF as a management fee) for major facilities projects. According to NSF’s Standard Operating Guidance on negotiation, award, and payment of a fee, such a fee can stimulate efficient performance. Management reserve. NSF, not the award recipient, holds management reserve to manage budget uncertainties, unforeseeable events, and risks that the recipient is not able to manage, according to NSF officials. According to agency officials and the Major Facilities Guide, NSF does not hold a management reserve except in rare circumstances. Since February 2008, NSF has had a policy to manage cost overruns on major facilities projects. Under this policy, the cost estimate developed at the preliminary design review should have adequate contingency to cover all foreseeable risks. Any cost increases not covered by contingency are generally to be accommodated by reductions in scope. Figure 2 provides a breakdown of the total project cost components in relation to the not-to-exceed award amount. NSF officials said that under this policy, they will only request an increase to the not-to-exceed cost that the National Science Board authorized if the recipient cannot address the increase through use of the project’s budget contingency or acceptable reductions to the project’s scope. Accordingly, at the preliminary design review, projects must have a prioritized, time-phased list of options for reducing scope during construction, known as scope contingency, and the potential cost savings associated with those options is to total at least 10 percent of the project’s baseline. As defined by NSF’s Major Facilities Guide, scope contingency is scope that can be removed without affecting the overall project’s objectives but that may still have undesirable effects on facility performance. As of September 2019, NSF continued construction of three major facilities projects with no changes to their authorized total project costs or scheduled completion dates since our March 2019 report. In addition, NSF approved a fourth project to enter the construction stage, completed construction of one project, and advanced two major facilities projects in the design stage. The four major facilities projects under construction have a combined total cost of approximately $1.6 billion (see table 1). Ongoing construction projects. Three projects—the Daniel K. Inouye Solar Telescope, the Rubin Observatory and the Regional Class Research Vessels—continued construction with no changes to their authorized total project costs or scheduled completion dates since our March 2019 report. Instead, NSF managed cost increases on the projects through the use of budget contingency, as specified under its no cost overrun policy, and managed delays through the use of schedule contingency. For example, the Rubin Observatory utilized $11.9 million in budget contingency and 5 months of schedule contingency to better align testing of the camera within the project schedule due to delays associated with the completion of the dome enclosure and telescope mount assembly, among other delays. The project team for the Rubin Observatory is also evaluating scope reduction options in order to complete the project within its total project cost and by its scheduled completion date of October 2022. New construction project. In February 2019, the National Science Board authorized a not-to-exceed total project cost of $410.4 million for the AIMS project and NSF awarded an initial contract modification for construction. We previously reported that in NSF’s fiscal year 2019 budget request, the estimated total project cost for construction of the AIMS project was $355.0 million. By the project’s final design review in October 2018, the AIMS team determined that it could not execute the project with the desired scope for this amount because of changing market conditions. NSF evaluated scope reduction options for the project but decided to maintain the project’s scope at the higher total project cost of $410.4 million. This change in total project cost did not count as an increase under NSF’s no cost overrun policy because the previous amount had not been authorized by the National Science Board as the project’s not-to-exceed cost. Completed construction project. In May 2019, NSF completed construction of the National Ecological Observatory Network project within the $35.5 million cost increase authorized by the National Science Board and a schedule increase of 2.8 years (57 percent). In 2011, NSF made the original award for construction of this nationwide network of ecological observation sites which was planned for completion in July 2016 at a total project cost of $433.8 million. In 2017, NSF increased the not-to-exceed cost for the project to $469.3 million. In accordance with NSF’s no cost overrun policy, the NEON project implemented scope reductions, such as reducing the number of observation sites from 106 to 81 and eliminating certain scientific instruments at the project’s observation sites. The scope reductions resulted in an estimated cost savings of $62.4 million. According to NSF documentation as of November 2019, NSF obligated a total of $458.9 million from the MREFC account for the construction of NEON, $10 million below the authorized total project cost. As of January 2020, NSF extended the construction stage award for NEON to allow for award close-out activities, which NSF officials expected to be complete in August 2020. Projects in design. In addition, in 2019, NSF advanced the design of two major facilities projects in the design stage, the Large Hadron Collider High Luminosity Upgrade (HL-LHC) and the Leadership- Class Computing Facility (LCCF). Under NSF policy, a major facility project’s cost, scope, and schedule are not finalized until after the final design review, when the National Science Board authorizes a not-to- exceed cost and an award duration. The not-to-exceed cost that the National Science Board authorized is the amount against which NSF measures cost increases to implement its no cost overrun policy. In September 2019, NSF convened two external panel reviews for the final design of the two separate detector upgrades that make up the HL-LHC program. According to NSF officials, the panels recommended to the NSF Director that the detector upgrades proceed to the construction stage. According to NSF documentation dated November 2019, the HL-LHC program had an estimated total project cost of $150 million for both upgrade projects. However, this amount was subject to change since the projects had not yet been authorized by the National Science Board to advance to the construction stage. According to NSF officials, the National Science Board authorized the total program cost at $153 million in early February 2020, setting the not-to-exceed costs for both awards. The LCCF project entered the conceptual design phase in March 2019. As of September 2019, the LCCF project had not developed an initial estimated total project cost because it had so recently entered design. Further details on the two projects in design are located in appendix II. NSF has fully implemented two of the six recommendations we made in June 2018 and March 2019—recommendations on policies for estimating the costs of major facilities projects and revising the Rubin Observatory’s schedule to better meet best practices. NSF has taken steps to address but has not fully implemented the remaining four recommendations concerning the agency’s management of major facilities, specifically our recommendations on policies for developing schedules for major facilities projects, project management competencies of the agency’s major facilities project management expertise of award recipients for major facilities ensuring the sharing of lessons learned or best practices on major facilities projects. Cost estimating policies. In our June 2018 report, we found that procedures documented in NSF’s policies for major facilities projects fully or substantially met many best practices and partially or minimally met others identified in GAO’s guide for developing project cost estimates. Specifically, we found that NSF’s procedures fully or substantially met seven of the 12 best practices in GAO’s cost guide and partially or minimally met the remaining five, such as the best practice for conducting a sensitivity analysis to understand which variables most affect the cost estimate. The American Innovation and Competitiveness Act requires that NSF ensure that its policies for estimating and managing costs and schedules are consistent with the best practices in GAO’s cost guide, and NSF requires the same of its recipients. We recommended that NSF revise the agency’s policies for estimating the costs of major facilities projects, and for reviewing those costs, to better incorporate best practices. In response, NSF revised its Major Facilities Guide and certain internal Standard Operating Guidance policies that documented procedures for estimating costs. In our current assessment of these revised guidance and policy documents, we found that NSF fully met the five cost estimating best practices in GAO’s cost guide that we previously found were minimally or partially met. For example, in our 2018 report, we concluded that NSF’s procedures required a sensitivity analysis but did not describe how one is to be conducted. In our updated assessment, we found that NSF’s procedures describe the best practice and how it should be applied to NSF major facility cost estimates. Specifically, the procedures describe, among other things, (1) identifying key variables—cost drivers, ground rules, and assumptions—for inclusion in the analysis, with examples particular to NSF major projects included as part of the procedures; (2) evaluating the effect of these variables on the cost estimate by varying them one at a time; and (3) developing a strategy to deal with the variables to which the estimate is most sensitive. Table 2 provides an overview of our original and updated assessments of NSF’s cost estimating policies. Between our June 2018 assessment and our current assessment, NSF’s policies substantially or fully met all 12 of the best practices in GAO’s cost guide. Rubin Observatory schedule. In our March 2019 report, we found that the Rubin Observatory’s schedule could not be considered reliable because it did not substantially or fully meet all four characteristics of a reliable schedule from GAO’s schedule guide—comprehensive, controlled, well-constructed, and credible, as described in table 3. While the schedule substantially met the comprehensive and controlled characteristics, it partially met five scheduling best practices associated with the well-constructed and credible characteristics. Specifically, we found certain issues related to the construction of the project’s schedule, including (1) the sequencing of activities, (2) the schedule’s critical path— a chain of dependent activities that drive a project’s earliest completion date, and (3) the amount of float calculated in the schedule—the amount of time by which a project activity can slip before the delay affects the project’s estimated completion date. We recommended that NSF ensure that the project’s schedule meets the well-constructed and credible characteristics of a reliable schedule, as defined in GAO’s schedule guide. Our current assessment found that the revised schedule addressed our recommendation. Specifically, the schedule substantially met four of the five best practices that we previously found had been partially met within the well-constructed and credible characteristics of a reliable schedule and partially met the remaining best practice (ensuring reasonable total float). Between our two assessments, the Rubin Observatory project’s schedule substantially or fully met the four characteristics and nine of the 10 best practices in GAO’s schedule guide. We consider NSF’s actions sufficient to address our recommendation. Table 3 provides our original and current assessments of the Rubin Observatory project’s schedule. In addition to implementing two of our recommendations, NSF has taken initial steps to address the other four recommendations from our June 2018 and March 2019 reports, but has not fully implemented them. Once NSF completes the steps discussed below, we will evaluate its actions to determine whether they are sufficient to fully address our recommendations. Policies for developing project schedules. In our June 2018 report, we found that NSF’s procedures for recipients substantially met one of the 10 best practices for developing project schedules—the best practice on conducting a schedule risk analysis. In contrast, NSF’s procedures partially or minimally met six and did not meet three of the remaining best practices. For example, we found that NSF’s procedures did not meet the best practice of establishing the durations of all activities because the NSF documents we reviewed did not include policy or guidance related to this practice, such as guidance on using realistic assumptions in estimating durations. The American Innovation and Competitiveness Act requires that NSF ensure that its policies for estimating and managing costs and schedules are consistent with the best practices in GAO’s schedule guide, and NSF requires the same of its recipients. We recommended that NSF revise its policies for developing schedules for major facilities projects, and for reviewing those schedules, to better incorporate the best practices in GAO’s schedule guide. As of November 2019, NSF had updated its internal guidance on standardized cost analysis to include a new section related to schedule reviews to help address this recommendation. This guidance states that the NSF Large Facilities Office will lead analysis of the schedule for each proposed major facilities project, which will include a technical evaluation by the sponsoring office, and may include input from an independent cost estimate and schedule review, or other reviews. As further steps to implement this recommendation, NSF plans to update two other policy and guidance documents, according to NSF officials. Specifically, NSF plans to: develop a new section of the Major Facilities Guide on schedule development, estimating, and analysis and post the guidance for public comment; and develop new internal guidance to help NSF staff more fully utilize external panels to address elements of schedule—in addition to cost—as part of the panels’ oversight reviews. According to NSF officials, they plan to complete these actions by the end of fiscal year 2020. Once NSF completes these actions, we will re-assess NSF’s procedures against the nine best practices that NSF partially or minimally met or did not meet in the assessment we conducted for our June 2018 report. Project management competencies of NSF’s major facilities oversight workforce. In our March 2019 report, we found that NSF had not (1) assessed potential gaps in how well its key major facilities oversight staff met project management competencies or (2) developed human capital plans for its major facilities oversight staff to address any gaps that may exist. Taking these steps would be consistent with leading principles for strategic workforce planning that we and the Office of Personnel Management have previously identified. Therefore we recommended that NSF assess its major facilities oversight workforce to identify any project management competency gaps, develop a plan to address any gaps and time frames for doing so, and monitor progress in closing them. In September 2019, in response to our recommendation, NSF awarded a contract for a proficiency assessment and workforce gap analysis. NSF expects this analysis to assess the core competencies and necessary proficiency levels of agency staff overseeing the major facilities portfolio and promote long-term workforce development. According to contract documentation, the contractor will take the following actions, among others: conduct a proficiency assessment and gap analysis based on a review of existing workforce materials, such as relevant position descriptions, vacancy announcements, performance plans, and other NSF guidance documents; work with NSF staff to refine competency guidance to better meet needs of the agency; and work with NSF to update training plans as necessary, based on the findings in the gap analysis and a review NSF’s existing training plan. According to contract documentation, NSF anticipates finishing the competency assessment and workforce gap analysis by the second quarter of calendar year 2020 and the implementation of contract tasks by March 2021. According to NSF officials, depending on the results of the assessment and analysis, improvements to address any identified gaps may involve developing standards of performance for the oversight workforce, identifying training opportunities in support or workforce development, and clarifying minimum competency requirements. Project management expertise of award recipients for major facilities projects. In our March 2019 report, we found that NSF had some procedures in place to help ensure that award recipients had project management expertise, but that the agency had not established criteria for the expertise needed by recipients or how they should demonstrate it. We concluded that, as a result, NSF was at risk of making awards to organizations that may not be well qualified to manage construction of major facilities projects. We recommended that NSF establish criteria for the project management expertise of award recipients for major facilities projects and incorporate the criteria in project requirements and external panel reviews. As of November 2019, NSF had drafted new language for the Major Facilities Guide and related supplemental award terms and conditions for major facilities that would require award recipients to document how project management competencies will be met. NSF officials told us they had shared the draft documents with targeted recipient representatives for review and comment in September 2019. NSF officials stated that the supplemental terms and conditions are planned to be published in fiscal year 2020, with an effective date of June 2020. The officials also said that, for existing awards, the agency will work with recipients on a phased implementation of the new guidance and terms and they will automatically be incorporated into future awards. Sharing of lessons learned or best practices on major facilities projects. In our March 2019 report, we found that NSF formalized a process for identifying and sharing lessons learned on major facilities projects. The process, which NSF refers to as its knowledge management program, responded to a 2015 recommendation by the National Academy of Public Administration and to the American Innovation and Competitiveness Act’s requirements that NSF coordinate the sharing of best management practices and lessons learned from major facilities projects. We recommended that NSF ensure, through a requirement or other means, that award recipients for major facilities projects provide information to NSF on any lessons learned or best practices. NSF developed supplemental award terms and conditions for major facilities to require recipients to participate in NSF’s knowledge management program. According to NSF officials, among other things, the requirement can be met by recipients: sending appropriate staff to the annual major facilities workshop that NSF hosts to provide a collaborative forum for continuous learning and information sharing among participants; presenting lessons learned or good practices at the annual workshop; participating in a workshop planning committee; or providing lessons learned or good practices to NSF. According to NSF officials, the draft terms and conditions will be included in the same revision as those related to recipients’ project management expertise, planned for publication in fiscal year 2020. As described above, NSF officials said that for existing awards, the agency will work with recipients on a phased implementation of the new terms and conditions, and they will automatically be incorporated into future awards. According to NSF documentation, NSF requested $45 million for fiscal year 2020 within the MREFC account to fund its first set of mid-scale projects with a total project cost between $20 million and $70 million. In response to a solicitation it issued in December 2018, NSF received approximately 50 preliminary proposals for mid-scale projects from research areas spanning all of NSF’s directorates, according to NSF officials. NSF invited 14 of these applicants to submit a full proposal and received full proposals from 11. The solicitation specified a list of information each full proposal should contain, including a project summary and description, a budget, and a project execution plan. NSF is currently reviewing the full proposals and expects to award its first portfolio of mid-scale projects in August 2020, according to NSF documentation. NSF’s solicitation anticipated that $150 million will be available over five years to fund its first batch of mid-scale projects. According to NSF officials, NSF plans to award subsequent sets of mid- scale projects biennially, depending on the availability of funds for future projects. According to NSF’s solicitation, the agency is seeking prospective mid- scale projects that are innovative and potentially transformative, that include a strong component of student training, and that provide unique research capabilities relative to what currently exists in the research community. Based on the definition of mid-scale projects in the American Innovation and Competitiveness Act, the solicitation stated that NSF would consider upgrades to existing major facilities projects currently in operation as candidates for mid-scale projects. The solicitation required full proposals to describe the full life cycle cost and schedule—including development, design, implementation, operations, and divestment. According to agency officials, NSF is only seeking to fund construction and acquisition costs from the MREFC account but needs to understand potential cost impacts on other life cycle stages. According to NSF officials, the mid-scale program is designed to identify potential projects with shorter implementation timelines and high levels of readiness as compared to the multiyear, incremental refinements to cost, scope, and schedule that occur with major facilities projects. NSF officials also stated that, to assess the readiness of the mid-scale projects for which full proposals were received, the agency will use an internal proposal review process similar to the final design review process used for major facilities projects. In addition, NSF policies state that there can be multiple inputs to the proposal review process, such as external panels or ad hoc reviews, which ensure that the mid-scale projects NSF awards will reflect the needs and interests of the scientific community. To provide guidance on oversight for mid-scale projects, NSF has included a chapter in its September 2019 update of the Major Facilities Guide to outline minimum recipient requirements and NSF oversight activities for mid-scale projects. In addition, NSF has created a management plan for NSF personnel that outlines procedures for reviewing proposals, selecting mid-scale projects, and managing the award process. NSF last updated the plan in November 2019, and according to NSF officials, the agency will continue to update the plan as it leads its initial set of projects from award to execution. According to NSF officials, oversight requirements for mid-scale projects will be dependent upon the technical scope and complexity of each individual project. As a result, NSF has tailored its guidance to provide the level of oversight commensurate with each project’s technical scope, type and mix of work, and risk profile. In addition, NSF is incorporating some aspects of its existing guidance for major facilities projects into its guidance for mid-scale projects. However, NSF officials anticipate that mid-scale projects will be less complex than major facilities projects. The following describes aspects where NSF has adapted its guidance for major facilities projects to the lower level of complexity anticipated for mid-scale projects. Performance measurement baselines. Similar to major facilities projects, NSF requires that the scope, cost, and schedule for mid-scale projects be defined at the time of award. In addition, NSF requires budget management, cost controls, and identification of potential risks and mitigation strategies for mid-scale projects, and its guidance states that budgets should be developed in accordance with GAO’s cost estimating best practices. While NSF officials state that NSF will apply substantial rigor in assessing the defined total project cost, mid-scale projects will not be subject to NSF’s no-cost-overrun policy. As a result, unlike for major facilities projects, NSF will not require all mid-scale projects to include budget contingency and scope reduction options, both of which are necessary for implementing the no-cost-overrun policy, although it may choose to include contingency in the budgets for certain mid-scale projects. For those mid-scale projects that have budget contingency, they must follow guidance for budget contingency laid out in the Major Facilities Guide, such as obtaining approval from NSF for using budget contingency. Monitoring and assessment. Like major facilities projects, NSF will monitor the award progress of mid-scale projects through periodic reports that provide quantifiable measurements on technical progress as well as cost and schedule performance. Depending on the complexity of each project, annual site visits or reviews may also be conducted. However, recipients of mid-scale projects may use alternatives to an earned value management system to report progress, such as reporting on milestone events or expenditure reports. According to NSF officials, the burden of establishing an earned value management system for some mid-scale projects may outweigh the benefits of using such a system, depending on the technical nature of the project. Project execution plan. According to the Major Facilities Guide, NSF will require a project execution plan for all mid-scale projects to demonstrate how recipients will manage the projects. A project execution plan serves as the stand-alone document that explains all of a project’s requirements for execution. According to NSF officials, the project execution plan used for major facilities projects would be excessive for mid-scale projects and may discourage potential proposals. Thus, NSF guidance for mid-scale projects requires only nine of the 16 sections normally required in a project execution plan and allows the recipients to tailor the detail and scope of each section to the specifics of each project. In addition, NSF will not require mid-scale projects to include design and development plans or site and environment information, which are required sections for major facilities projects. Since it is only funding the construction of mid- scale projects and seeking to award projects with high levels of readiness, NSF does not consider these sections to be beneficial in assessing how a recipient would manage a mid-scale project. We provided a draft of this report to NSF for review and comment. In its comments, reproduced in appendix III, NSF stated that our report provides the agency with an independent assessment of its oversight of projects in design and construction and its stewardship of the MREFC account. With regard to our recommendations on policies for estimating the costs of and developing schedules for major facilities projects, NSF stated it is proud of the progress it has made in meeting GAO best practices for cost estimating on major facilities projects and that it recognizes the remaining work needed to codify NSF guidance on project schedules. NSF also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Director of the National Science Foundation, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6888 or neumannj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix provides individual summaries of the National Science Foundation’s (NSF) four major facilities projects under construction: (1) the Daniel K. Inouye Solar Telescope, (2) the Vera C. Rubin Observatory, (3) the Regional Class Research Vessels, and (4) the Antarctic Infrastructure Modernization for Science. Each project’s summary is based on project documents and other information that NSF officials provided and includes the following: An overview of the project and its purpose. A timeline identifying key project dates, including the date of the original construction award, which we report as the start of construction. Project information, such as the project’s estimated completion date for construction (including schedule contingency), the type and latest amounts of the awards for construction, the responsible NSF directorate, project partners, and expected duration of operations. Tables summarizing the project’s current status and its cost, any cost or schedule increases or scope reductions made under NSF’s no cost overrun policy, and changes since our March 2019 report. A summary of the project’s cost and schedule performance history. A chart depicting the latest construction award’s total project cost for construction, including the performance measurement baseline and budget contingency. If applicable, a chart showing the increase in the construction award’s total project cost since the original construction award. Information on remaining project risks and potential for cost or schedule increases, including the amount of remaining contingency and scope reduction options. When completed, the National Science Foundation’s (NSF) Daniel K. Inouye Solar Telescope (DKIST), formerly named the Advanced Technology Solar Telescope, will be the world’s flagship facility for the study of magnetic phenomena in the solar atmosphere. It will help answer fundamental questions in solar physics and enable understanding of solar variability and activity, which can affect Earth through phenomena generally described as space weather. Construction of NSF’s DKIST project was 94 percent complete as of September 2019. The project was in its 10th year of construction and in the integration, testing, and commissioning phase. Since our March 2019 report, the project completed installation of all telescope optics. Testing of the optics, originally planned for October 2019, was delayed until January 2020 to allow the project to replace a key piece of equipment that is essential to safely perform the testing. Despite the delay, the estimated completion of construction and beginning of full operations remained unchanged at June 2020, including 1.5 months of schedule contingency. Estimated construction completion date, including schedule contingency: June 2020. Construction award: Cooperative support agreements with the Association of Universities for Research in Astronomy, Inc., consisting of 42 U.S. institutional members and five international affiliates. Responsible NSF directorate: Mathematical and Physical Sciences. Project partners: More than 20 U.S. and international organizations. Kiepenheuer-Institut für Sonnenphysik (Germany) and Queens University Belfast (Northern Ireland) are supplying additional equipment for the project. Expected duration of operations: 50 years. Legend: ▲ = cost or schedule increase; ▼= scope reduction. NSF’s DKIST project had no changes to its authorized total project cost, June 2020 completion date or project scope since our March 2019 report, which used data as of September 2018. From April to November 2019, NSF approved the project’s use of about $6.2 million in budget contingency, with the largest usage of about $4.6 million in August 2019. Project delays requiring use of 3 months of schedule contingency— primarily because the project faced challenges with the installation and testing of the mirror systems, as described above—accounted for $4.3 million of the $4.6 million. We previously reported that the DKIST project’s risk of delays had the potential to increase costs for such items as labor, utilities, real estate, and equipment. NSF officials stated that most of the activities at risk of further delays would be achieved during the testing planned for January 2020. In 2013, NSF increased DKIST’s total project cost and the not-to-exceed cost that the National Science Board authorized from $297.9 million to $344.1 million, an increase of $46.2 million (16 percent) since 2010. NSF also delayed the project’s estimated completion date by about 2.5 years (31 percent), from December 2017 to June 2020. Prior to the National Science Board’s authorization to increase the total project cost, the recipient also reduced DKIST’s scope, resulting in estimated cost savings of $5.9 million but generally low expected impacts for the project. According to NSF officials, these cost and schedule increases resulted primarily from unforeseeable legal and administrative challenges to the construction site’s environmental permits. Remaining Project Risks and Potential for Cost or Schedule Increases As of September 2019, the DKIST project had $7.8 million of budget contingency remaining—$0.4 million more than the estimated remaining risk exposure of about $7.4 million when weighted for the risks’ probability. The project also had 1.5 months of schedule contingency remaining to help avoid any potential delays in completing construction. According to the project documentation, the largest remaining risk category is project completion and closeout risks. As of October 2019, 10 risks in this category remained, some of which had been partially realized, according to NSF officials, with about $4.0 million in risk exposure when weighted for probability. The remaining risks included staff retention as the construction project nears completion, and damage to or wear of equipment during integration and commissioning. For example, contingency may be needed to make minor repairs to the dome enclosure in preparation for full operations. In accordance with NSF policy, the project maintains a list of scope reduction options, which as of October 2019 included approximately $56,700 in total possible project de-scopes, such as reductions in travel. However, the ability of these remaining de-scope options to reduce costs will continue to decrease as the project continues to spend down remaining funds as it approaches completion. The National Science Foundation’s (NSF) Vera C. Rubin Observatory (Rubin Observatory), formerly named the Large Synoptic Survey Telescope (LSST), is an 8.4- meter, wide-field optical telescope. It will initially be used to image the entire visible southern sky—every 3 days for a decade—using the world’s largest digital camera (3.2 billion pixels). Built on a mountaintop in Chile to take advantage of the location’s pristine skies, the observatory will collect data and images that will allow for charting billions of galaxies as well as increased knowledge about potentially hazardous asteroids, dark matter, and dark energy. The observatory has the potential to advance every field of astronomical study, from the inner solar system to the large-scale structure of the universe. As of September 2019, the Rubin Observatory was 75 percent complete and in its sixth year of construction. NSF made the initial operations award in October 2018, and NSF officials anticipate completion of construction and start of full operations in October 2022, including contingency. Since our March 2019 report, the project has experienced delays related to both the telescope’s dome enclosure and mount assembly, leading NSF to add the project to the Director’s Watch List. Estimated construction completion date, including schedule contingency: October 2022. Construction award: Cooperative support agreement with the Association of Universities for Research in Astronomy, Inc., consisting of 42 U.S. institutional members and five international affiliates. Responsible NSF directorate: Mathematical and Physical Sciences. Project partners: The LSST Corporation, Department of Energy. Expected duration of operations: 50 years. Legend: ▼= scope reduction. Since our March 2019 report, NSF’s Rubin Observatory project had no changes to its authorized total project cost and implemented one scope reduction option valued at $1.4 million to increase available budget contingency. In addition, the project utilized $11.9 million in budget contingency and 5 months of schedule contingency to better align the testing of the camera within the project schedule. According to project documentation, the use of schedule contingency was due to delays with completion of the telescope mount assembly and dome enclosure that will house the telescope and other buildings. NSF officials attributed the delays to contractor performance and adverse weather conditions. For example, due to high winds, the project was able to use a crane to complete dome construction for only two days in September 2019. Remaining Project Risks and Potential for Cost or Schedule Increases Project data on the remaining risks and contingencies and the findings of two recent reviews indicate that the final cost of the Rubin Observatory may exceed the not-to-exceed cost authorized by the National Science Board, unless the project implements scope reduction options under NSF’s no-cost-overrun policy. As of September 2019, the project had an estimated remaining risk exposure of $26.4 million, which is equal to the remaining budget contingency of $26.4 million. In addition, the project had 3.5 months of schedule contingency remaining as of September 2019 to help avoid any potential delays in completing construction by October 2022. According to project documentation, the project’s largest remaining risks included delays in the completion of the telescope’s dome enclosure, the installation of the mount assembly, and delivery of the camera from the Department of Energy (DOE). The project team is modifying activity plans to mitigate these delays. For example, the project plans to complete dome enclosure and telescope mount assembly activities in parallel. As part of the Director’s Watch List, NSF plans to closely track updates on the project, including potential execution of scope reduction options. In August 2019, NSF and DOE jointly convened an external committee of experts to review the project’s construction progress. The committee found that the project may face difficulty in completing the baseline scope within the authorized total project cost. Specifically, the committee expressed concerns with the rate at which schedule contingency has been used (5 months of schedule contingency within the past 18 months), delays in completing the dome due to contractor performance issues, and the risks associated with maintaining an aggressive schedule composed of parallel activities in order to minimize further delays. The review committee recommended that NSF direct the project team to develop a proposal for executing scope reductions in fiscal year 2020 to complete the telescope within an acceptable level of risk at the current total project cost, among other recommendations. Remaining Contingency and Scope Reduction Options As of September 2019 with construction 75 percent complete. Budget contingency: $26.4 million (Equal to the probability- weighted risk exposure of $26.4 million). Schedule contingency: 3.5 months (included in the October 2022 estimated completion date). Estimated value of remaining scope reduction options: $24.8 million. as compared to a separate risk exposure analysis from July 2019 that indicated a 50 percent confidence. The panel recommended that the project report risk based on the analysis with the lower confidence level and conduct more frequent risk exposure analyses based on changes that have occurred, such as the realization or retirement of identified risks, to better inform management decisions. According to NSF documentation, the project team has recently acquired enhanced risk management software for analyzing risk exposure, including the effects of mitigating actions within the schedule. In a July 2019 update to its scope management plan, the project team identified 39 scope reduction items with a total value of $25.0 million. Among them is a de-scope option for reducing the amount of final commissioning surveys that may potentially return $4.3 million of budget contingency and 3.5 months of schedule contingency. According to NSF officials, NSF has yet to evaluate the impact of reducing the surveys to the project’s capabilities or operational costs. According to the external panel review convened by NSF and DOE, the project team identified potential scope reductions options valued at $14 million that the project can exercise in fiscal year 2022. However, the panel questioned the feasibility of executing the project’s scope reduction options and recommended that the project prioritize viable options while pursuing a no-cost extension to complete the project without an increase to the total project cost. The U.S. Department of Energy (DOE), a cosponsor of the Rubin Observatory, is responsible for delivering the observatory’s camera at a cost of $168 million. SLAC National Accelerator Laboratory manages a collaboration of DOE national laboratories and universities to develop, fabricate, and deliver the camera. As of September 2019, the project had the camera integration on the telescope scheduled for September 2021. Budget contingency accounts for the risk of a delayed delivery that would impact integration. The LSST Corporation is a not-for-profit organization representing nearly 40 institutional members and 34 international contributors. It acts as the agent for nonfederal funding contributed to the project and has raised more than $50 million for certain long-lead construction items and additional development efforts. The National Science Foundation’s (NSF) Regional Class Research Vessels (RCRV) project will construct three 199-foot vessels to support the nation’s ability to conduct fundamental scientific research in the coastal zone and continental shelf, including from the ocean’s surface through the water column to the sea floor and subsea floor environment. These vessels will provide enhanced capabilities beyond those of the retiring vessels they will replace. The three vessels’ research locations will depend on locations of the greatest science demand, but NSF planned to operate the first vessel along the west coast, the second along the east coast, and the third along the gulf coast of the United States. As of September 2019, NSF’s RCRV project was 20 percent complete and was in its third year of construction. Since our March 2019 report, the project progressed with construction of the first vessel and began construction of the second vessel in September 2019. NSF also awarded funds for construction of the third vessel, which was scheduled to begin in March 2020, and awarded a cooperative agreement for its future operations to the Gulf-Caribbean Oceanographic Consortium. In February 2019, the RCRV project experienced a partial suspension of work due to the status of necessary production design and modeling deliverables, among other concerns. This resulted in 16 weeks of schedule contingency usage. However, there was no overall increase to the scheduled construction completion date of July 2024. Estimated construction completion date, including schedule contingency: July 2024 for three vessels. Construction award: Cooperative support agreement with Oregon State University, which contracted with Gulf Island Shipyards, LLC. Responsible NSF directorate: Geosciences. Project partners: The U.S. Navy performed initial design for the vessels. Expected duration of operations: 30 years. Construction Status of the Regional Class Research Vessels, as of September 2019 Percentage complete (based on construction of three vessels) aScope changes included are reductions in response to NSF’s policy on cost overruns or as part of a cost increase. As of September 2019, the RCRV project had no changes to its authorized total project cost, no changes to its estimated completion date of July 2024 for all three vessels, and no scope reductions. The National Science Board had authorized a not-to-exceed cost of $365.0 million for construction of three vessels. However, the shipyard bid was ultimately lower than expected, reducing the total project cost of building three vessels to $354.0 million. NSF accepted the project’s earned value management system in May 2019, following a surveillance review of the system. The review team found that the project’s system met the intent of NSF requirements and that its data were reliable. (In our March 2019 report, we reported that NSF conditionally accepted the project’s earned value management system in November 2018.) As of September 2019 with construction of three vessels 20 percent complete. Budget contingency: $44.0 million (exceeded the probability- weighted risk exposure of $24.6 million). Schedule contingency: 6 months (included in the July 2024 estimated completion date for three vessels). Estimated value of remaining scope reduction options: $9.8 million. Beginning in February 2019, the RCRV project utilized 16 weeks of schedule contingency and $2.4 million of budget contingency due to a partial suspension of work issued by the construction award recipient, Oregon State University (OSU). OSU was concerned with Gulf Island Shipyards’s (GIS) project management capacity and its ability to manage subcontractors, such as engineering vendors responsible for providing design specifications. During the work suspension, GIS developed a corrective action plan that identified eight areas of improvement, such as a subcontract management plan and updated schedules that better align the development of necessary design specifications with construction activities. OSU’s management team assessed and monitored GIS’s progress on these areas and subsequently lifted the work suspension in May 2019. However, the project continues to face subcontractor management issues. OSU has requested NSF approval for an estimated $6.1 million of budget contingency and 4 months of schedule contingency to compensate for the delays associated with these issues. According to project documentation, this issue may cause the construction completion date of each vessel to slip. Remaining Project Risks and Potential for Cost or Schedule Increases According to project documentation, the project had an estimated risk exposure of $24.6 million and $44.0 million in remaining contingency as of September 2019. With the utilization of 4 months of schedule contingency in 2019, the RCRV project had 6 months of contingency remaining until construction is scheduled to end in 2024. According to project documentation, 12 options for reducing scope were available as of December 2019, with potential savings estimated at $9.8 million. and schedule expertise, which resulted in a decrease in the impact of the risk. In addition, the RCRV project is closely monitoring two risks related to newer technologies and requirements for regional operability of each vessel. First, the project team identified newer technologies for systems such as communications compared to those specified during the design phase. According to project documentation, the project may utilize contingency to integrate such technologies into the vessels. Second, the project may incur additional engineering, labor, and material costs associated with certain potential design changes that NSF and the operating institutions for the three vessels have identified. These design changes are intended to improve quality and performance within the different regions where the three vessels will be operating. The National Science Foundation’s (NSF) Antarctic Infrastructure Modernization for Science (AIMS) project will modernize the core infrastructure of McMurdo Station in Antarctica, the largest of three stations operated by NSF’s United States Antarctic Program and used by multiple agencies. McMurdo Station serves as a logistics hub for remote field sites and for the Amundsen-Scott South Pole Station. The AIMS project is expected to make environmental and safety upgrades to McMurdo Station and redevelop it into a more compact, energy and operationally efficient core facility to support research. The planned core facility will consolidate critical buildings, such as medical facilities and field science support. Construction of NSF’s AIMS project was about 6 percent complete as of September 2019. The project was in its first year of construction. In February 2019, the National Science Board approved the project’s not-to- exceed cost of $410.4 million, and NSF awarded an initial contract modification for construction equipment and materials to be delivered to California by December 2019, in time for deployment to McMurdo station through two supply vessels. In April 2019, NSF awarded the second contract modification for construction of the first major components of AIMS: the Vehicle Equipment and Operation Center (VEOC) and a new lodging facility structure and exterior shell. According to NSF, the VEOC will facilitate maintenance and repair of both heavy and light equipment ranging from tractors and cranes to trucks, vans, snowmobiles, and field generators. The lodging facility will include space for 285 beds, which the project’s final design review panel expected to be adequate to support short- and long-term plans for McMurdo station, including construction needs. As of September 2019, the start of initial operations for the VEOC and lodging facility were planned for 2022 and 2023, respectively, and completion of both facilities was planned for 2022, according to NSF officials. Later phases of the AIMS project will include construction of central services, emergency operations, field science support, and industrial trades facilities. In November 2018, the U.S. Army Corps of Engineers completed an independent cost estimate (ICE) report for the AIMS project. According to NSF officials, the ICE was critical for negotiations with the contractor as NSF utilized data within the ICE, such as labor rates and cost of materials, to verify costs. Specifically, the ICE assisted NSF in determining the reasonableness of the contractor’s proposed cost estimate and schedule for the project and associated risks. According to NSF officials, NSF and the contractor resolved all recommendations from the ICE report to NSF’s satisfaction prior to setting the not-to-exceed cost. Cost and Schedule Performance History As of September 2019, NSF’s AIMS project had no changes to its authorized total project cost, changes to its estimated completion date, or scope reductions since the National Science Board authorized the project’s not-to-exceed cost of $410.4 million, which included $67.2 million in budget contingency, in February 2019. Remaining Contingency and Scope Reduction Options As of September 2019 with construction about 6 percent complete. $59.2 million ($7.1 million more than the probability-weighted risk exposure of $52.1 million). 18.4 months (included in the 2028 estimated completion date). By the project’s final design review in October 2018, the AIMS team determined that it could not execute the project with the desired scope for the $355.0 million estimate—as was previously presented in NSF’s fiscal year 2019 budget request—because of changing market conditions. In response, NSF convened a review panel, which evaluated scope reduction options such as relocating and reducing bed space in the lodging facility from 285 to 100 beds, which would also entail keeping the current lodging facility in operation instead of demolishing it to make room for a new facility. While it accepted some of these options, such as a reduction of warehouse space within the VEOC, the panel noted that relocation of the lodging facility and a reduction of bed space would have adverse effects on the project. For example, the panel found that constructing a new 100-bed lodging facility in an alternate location would not support the eventual construction of sky bridges. According to the project’s Final Design Review report, these sky bridges would improve efficiency by avoiding the need for personnel to put on Antarctic gear before moving between buildings, reduce energy use by reducing the need to open exterior doors, and significantly improve the quality of life for personnel. NSF therefore decided to maintain the 285-bed plan and finalized the total project cost at $410.4 million. and four of 11 procurements for the lodging facility to the 2021 vessel, but NSF officials do not expect significant construction delays as a result. The officials explained that the VEOC procurements are not required for 2020 construction and that the deferral of lodging procurements is expected to be accommodated by re-sequencing activities on site. Remaining Project Risks and Potential for Cost or Schedule Increases As of September 2019, the AIMS project had a risk exposure of $52.1 million and $59.2 million in remaining contingency, and all of the project’s 18.4 months of schedule contingency remained available. The project had cumulatively used $7.9 million in budget contingency. Of this, $7.8 million was used during initial award for contract modifications for initial construction, with the remainder used for additional equipment purchases and leases in August and September 2019. As of September 2019, the AIMS project had $14.2 million in high- likelihood risks. The largest remaining risk, with an estimated value of $12.5 million and a 23-day delay, was that subcontractor proposals would exceed planned construction costs. Another such risk was an increase in the estimated base price of key construction materials—such as steel, copper wire, concrete, gypsum, and specialty items—before the materials were procured. NSF’s contractor for the project, Leidos Innovations Corporation, was working with one of its subcontractors to ensure material costs were accurate and consistent with market pricing. In accordance with NSF policy, the project maintains a list of scope reduction options, which as of April 2019 included approximately $34.0 million to $43.1 million in total possible project de-scopes. For example, the largest scope reduction option, with an estimated value of up to $19.1 million, is to remove the new trades shop from the AIMS scope and instead use the current facility. Another option, with an estimated value of up to $4.0 million, is to remove the gymnasium from the emergency operations facility and instead continue to use and maintain the existing gymnasium. This appendix provides individual summaries of the two National Science Foundation (NSF) projects that were in design and planned for construction as major facilities projects: (1) the Large Hadron Collider High Luminosity Upgrade and (2) Leadership Class Computing Facility. As of September 2019, no construction funds had been awarded for these projects and all cost, schedule, scope, and design information for these projects was subject to change. Each project’s summary is based on project documents and other information that NSF officials provided and includes the following: An overview of the project and its purpose. A timeline identifying key project dates. Project information, such as the expected date for completion of construction; the anticipated type of awards for construction; the responsible NSF directorate; project partners; and expected duration of operations. A summary of the project’s current status. A summary of the project’s design and construction costs, if available, and the budget account NSF planned to use for construction of the project. Information on potential project risks. The Large Hadron Collider (LHC) is the world’s most powerful particle accelerator. The facility’s four detectors observe new particles that are produced when high-energy protons are accelerated and collided, providing insight into fundamental forces of nature and the condition of the early universe. Through the National Science Foundation’s (NSF) Large Hadron Collider High Luminosity Upgrade (HL-LHC) program, the agency will fund a portion of a larger international effort to upgrade the facility’s accelerator and detectors. Specifically, NSF plans to fund the design and implementation of certain parts of the upgrades as two separate projects for the facility’s detectors, the A Toroidal LHC Apparatus (ATLAS) and Compact Muon Solenoid (CMS) detectors. The Department of Energy (DOE) is also contributing to upgrades to the LHC’s accelerator and to the ATLAS and CMS detectors. As of September 2019, NSF’s HL-LHC program was approaching its fifth year of design. The program has conducted several required activities to complete the design stage. In September 2019, NSF convened an external panel for the final design review of the program. The panel found that both detector upgrades met the readiness criteria within NSF’s Major Facilities Guide to proceed to construction. NSF also convened the internal Facilities Readiness Panel in November 2019 and conducted life cycle cost reviews for each detector upgrade in October 2019, according to NSF officials. Estimated construction completion date, not including schedule contingency: 2026. Construction awards: If approved, planned for 2020 as cooperative agreements with Columbia University (ATLAS detector) and Cornell University (CMS detector). Responsible NSF directorate: Mathematical and Physical Sciences. Project partners: European Organization for Nuclear Research and the Department of Energy. Expected duration of operations: 12 years. According to NSF officials, NSF planned to request National Science Board authorization in February 2020 to make construction awards. As a prerequisite for making the awards in April 2020, NSF received the independent cost estimates for both projects from the Army Corps of Engineers in January 2020. According to NSF documentation, these results align with the current total project cost reviewed during the final design review. According to the Major Facilities Guide, NSF uses independent cost estimates to validate recipient estimates, negotiate awards, check for compliance with GAO best practices and Uniform Guidance cost principles, and inform NSF’s cost analysis. According to NSF officials, the estimated completion for both upgrade projects is 2026. According to program documentation, NSF had obligated a total of $24.3 million for the design of its detector upgrades as of September 2019. Funding for the design has come from NSF’s Research and Related Activities account, rather than the Major Research Equipment and Facilities Construction account. Planned Contingency and Scope Reduction Options As of November 2019, with finalization of the NSF cost analysis still pending. Budget contingency: $38.9 million as follows $20.0 million for the ATLAS detector. $18.9 million for the CMS detector. Schedule contingency: To be determined. Estimated value of scope reduction options: $15.1 million as follows $8.4 million for the ATLAS detector. $6.7 million for the CMS detector. until authorization by the National Science Board. These figures remained subject to change before completion of the final design phase. According to NSF documentation, the total project cost may increase slightly based on a detailed evaluation of both projects’ contingency budgets following the final design review. NSF plans to fund the upgrades with separate cooperative agreements for each detector and to monitor each agreement in accordance with its distinct terms and conditions, total project cost, and earned value management metrics, according to agency officials. In August 2019, NSF initiated independent cost estimates of both projects (ATLAS and CMS) under the HL-LHC program, as required by the American Innovation and Competitive Act for projects in the design phase. The U.S. Army Corps of Engineers is conducting the estimates under an interagency agreement with NSF, with contractor support. In addition, NSF is conducting a cost analysis that will be informed by the final design review panels, internal assessments by the NSF’s Large Facilities Office and other business units, and the independent cost estimates. DOE’s Contributions to Upgrading the Large Hadron Collider DOE’s High Energy Physics program helped fund the construction of the Large Hadron Collider and continues to support researchers using the facility as well as upgrades to it. According to DOE’s fiscal year 2020 budget request, the department planned to support the upgrades to the ATLAS and CMS detectors at an estimated cost range of $149 million to $181 million for the ATLAS detector and $125 million to $155 million for the CMS detector. The scope of DOE’s work on the detectors was to focus on areas where the expertise and infrastructure of the department’s national labs were needed, whereas the scope of NSF’s work was to focus on areas led by university researchers. In addition, DOE approved upgrades to the accelerator itself with a total project cost of $242.7 million, according to DOE’s fiscal year 2020 budget request. NSF plans to fund the construction of the detector upgrades through its Major Research Equipment and Facilities Construction account. While the upgrades would involve separate cooperative agreements for each detector, NSF considers them one program consisting of two distinct projects, according to agency officials. Project Risks and Potential Scope Reduction Options Under NSF policy, a project’s cost should include enough budget contingency to cover all foreseeable risks. Following the preliminary design review, the amount of budget contingency included in the construction cost for the upgrades was approximately $38.9 million, or 26 percent of the planned total project cost. At the time of this report, the NSF cost analysis following the final design review was still pending and therefore the estimated amount of contingency is subject to change. NSF policy also directs a project’s design to include prioritized, time- phased options for reducing its scope during construction if needed. As of the final design review, the project teams had identified a total of $15.1 million of potential scope reduction options for the projects, which are subject to change throughout the design and construction of a project. According to the projects’ scope management plans we reviewed, the ATLAS detector has nine options to reduce scope totaling $8.4 million, with the options ranging in value from $0.6 million to $1.7 million. The CMS detector has 17 scope reduction options with a total value of $6.7 million. According to the project’s scope management plan, both NSF officials and external panels reviewed and provided input to determine the current scope reduction options. The National Science Foundation’s (NSF) Leadership-Class Computing Facility (LCCF) project is intended to provide advanced computational capabilities to enable transformative research in all areas of science and engineering that would not be possible by theory or experiment alone. According to NSF officials, future research using LCCF might include extremely detailed simulations ranging from biological molecules to supernovae and analyses of very large data streams such as satellite images to create high-resolution Earth maps. Project Status As of September 2019, the LCCF project was in its first year of design; consequently, all cost, schedule, scope, and design information for the project was subject to change. In March 2019, the NSF Director approved the project to enter the design stage as a candidate major facilities project. The project represents the final phase of a two-phase deployment of high-performance computing systems. The first phase—known as the Frontera project at the Texas Advanced Computing Center at the University of Texas at Austin—was completed in September 2019. According to NSF, at that time, Frontera was the largest high- performance computing system deployed on a U.S. academic campus. The LCCF project will support the design and construction of an upgrade to the Frontera system as well as to the physical facility that will host it. In project documentation, NSF has described the upgrade as providing a substantial improvement in application performance but has not specified the extent of improvement. Estimated construction completion date, not including schedule contingency: Fiscal Year 2025. Construction award: Planned for 2024. Responsible NSF directorate: Directorate for Computer & Information Science & Engineering. Project partners: None. Expected duration of operations: 10 years. In July 2019, NSF awarded both an overarching cooperative agreement for the LCCF project and a cooperative support agreement for the conceptual design phase to the University of Texas at Austin. As of November 2019, the project was focused on leading and participating in activities with experts within the community for high-performance computing. The purpose of these activities was to document the science, technology, and facilities requirements for LCCF, as well as to shape the design and cost of long-lead items, such as the power and cooling infrastructure to service the facility. NSF plans to conduct the conceptual design review in June 2020. NSF’s Support for High- Performance Computing Systems NSF has supported high-performance computing capabilities for nearly 4 decades. In 2007, NSF awarded $226.6 million for the Blue Waters high- performance computing system through a cooperative agreement with the University of Illinois at Urbana- Champaign. According to NSF, at the time of its deployment in 2013, Blue Waters was one of the most powerful supercomputers in the world and was one of the fastest on a university campus. Scientists and engineers across the country used the computing and data power of Blue Waters to tackle a wide range of problems, including predicting the behavior of complex biological systems and simulating the evolution of the cosmos. Because of the rapid evolution of computer technology, by 2019, NSF no longer considered Blue Waters to be the leadership computing system for fundamental science and engineering research. Anticipating these technological advances, in September 2018, NSF awarded about $63.0 million to the University of Texas at Austin for the follow-on project to Blue Waters. Frontera was intended to provide three to five times the computing capability and twice the storage capacity to support the increased computational requirements for science and engineering research. NSF also anticipated that Frontera would help inform science requirements and reduce risks for LCCF, which is planned to provide substantially more computational capabilities than both Blue Waters and Frontera. obligated $2 million from its Research and Related Activities account for the design of LCCF. According to the project’s cooperative agreement, NSF may provide additional funding to advance the design of LCCF— $3.5 million in fiscal year 2020 and $2.5 million in fiscal year 2022 following successful completion of the conceptual and preliminary design reviews, respectively, subject to availability of appropriations. As of September 2019, NSF had not yet formally identified risks for the LCCF project because the project was early in the design stage. NSF requires recipients to develop and follow formalized risk management during the design and construction stages of major facility projects to identify potential risks, assess the nature of those risks, and identify actions that can be taken to either reduce the probability of those risks occurring or reduce their impact to the project. NSF officials told us that an assessment of risks associated with the LCCF project will be part of the conceptual design review, planned for June 2020. According to NSF officials, one anticipated challenge for the LCCF project is the rapid pace of technological change in the field of high-performance computing. The officials stated that forecasting the technology marketplace in the future can be challenging as technology can change radically because of external market forces. Conversely, the rapid pace of change can also be an opportunity if the LCCF project can incorporate the latest technological advances that result in the most advanced computing capabilities. According to NSF officials, taking advantage of such opportunities as late in the design stage as possible will be important for the success of the project. John Neumann, (202) 512-6888 or neumannj@gao.gov In addition to the contact named above, Joseph Cook (Assistant Director), Sean Manzano (Analyst in Charge), Louise Fickel, Yvette Gutierrez, Patrick Harner, Douglas G. Hunker, Jason T. Lee, Serena Lo, and Anika McMillon made key contributions to this report.", "summary": "NSF supports the design, construction, and operations of major facilities projects–science and engineering research infrastructure such as telescopes and research vessels that typically have construction costs of at least $70 million and may take many years to design and construct. The agency oversees the performance of each project against an authorized total project cost and schedule. NSF currently has four projects under construction at a combined authorized cost of $1.6 billion and two additional projects in design. Prior GAO reports reviewed NSF's cost estimating and schedule policies, as well as project management expertise of its oversight workforce. Senate Report 114-239 and House Report 114-605 included provisions for GAO to review NSF's major facilities projects. Among other objectives, this report (1) describes the cost and schedule performance of NSF's ongoing major facilities projects and (2) assesses the extent to which NSF addressed prior GAO recommendations related to its management of major facilities. GAO analyzed NSF policies and documents for projects in design and construction, interviewed agency officials, and compared NSF's processes to best practices identified in prior GAO work. Since GAO's March 2019 report on the status of its major facilities projects, the National Science Foundation (NSF) had no increases to the authorized total project costs or schedules for its four projects under construction (see figure): The Daniel K. Inouye Solar Telescope was on track to be completed within its $344.1 million cost and June 2020 completion date. NSF was evaluating options for reducing the scope of the Vera C. Rubin Observatory (previously the Large Synoptic Survey Telescope), which it believed might be necessary to keep the project within its $473 million cost and October 2022 completion date. Construction of a second Regional Class Research Vessel began in September 2019 and was anticipated to begin on a third and final vessel in March 2020 at a combined cost of $365 million. The Antarctic Infrastructure Modernization for Science entered the construction phase in February 2019 at a cost of $410.4 million. NSF fully implemented two of the six prior GAO recommendations including revising policies for estimating the costs of major facilities projects and revising the Vera C. Rubin Observatory's schedule to better meet best practices. NSF took steps to address but has not fully implemented the remaining four recommendations on the agency's oversight of major facilities. NSF agreed with and has taken initial steps to address four open recommendations from GAO's prior work, including to revise policies for developing schedules and to ensure the sharing of lessons learned for major facilities projects. NSF needs to complete additional steps to fully address the recommendations.", "document_type": "gao"}
{"report": "Traditionally, federal surface-transportation funding has been primarily delivered through formula grant programs based on distributions prescribed by statute. Discretionary grant programs, such as INFRA, represent an alternative approach for directing federal funding toward national priorities. Through a discretionary grant program, Congress or federal agencies establish desired goals or outcomes—such as improving the condition of critical infrastructure, enhancing economic competitiveness, or reducing fatalities. Generally, federal agencies review grant applications against published selection criteria and statutory and regulatory requirements before selecting projects to receive awards. This approach can help assure accountability for federal investment by more clearly linking program funds to desired outcomes and can support projects of national or regional significance that cross state lines. In prior work, we have recommended that a merit-based competitive approach— like INFRA—be used to direct a portion of federal funds to transportation projects of national and regional significance. The FAST Act authorized over a dozen discretionary transportation-grant programs, and Congress may consider additional programs as it considers reauthorizing DOT’s surface transportation programs in 2020. State, local, and tribal governments, as well as multistate or multijurisdictional groups, are among the entities eligible to receive INFRA funding. Freight or highway projects must meet the statutory requirements outlined in the FAST Act to receive INFRA funding. Notable statutory requirements regarding the distribution of awards include: Ten percent of available funds are reserved for small projects each fiscal year. At least 25 percent of available funds are reserved for rural areas each fiscal year unless DOT does not receive enough qualified rural project applicants. No more than $500 million, in aggregate, over fiscal years 2016 through 2020 may be used to fund freight rail, water (including ports), or other freight intermodal projects. The Secretary must consider geographic diversity during the selection process. Large projects have to meet seven additional statutory requirements to be eligible for selection by the Secretary. Specifically, the Secretary must determine that the project: will generate national or regional economic, mobility, or safety will be cost-effective; will contribute to one or more of the national goals for the transportation system: improved safety, infrastructure maintenance, congestion reduction, system reliability, freight movement, economic vitality, environmental sustainability, and reduced project delivery delays; is based on the results of preliminary engineering; for related non-federal financial commitments, has stable and dependable funding and financing sources to construct, maintain, and operate the project, and contingency amounts to cover unanticipated cost increases; cannot be easily and efficiently completed without other federal funding or financial assistance; and is reasonably expected to begin construction no later than 18 months after the date of obligation of funds for the project. In the July 2017 NOFO for the INFRA program, DOT established four new criteria for INFRA outlining how projects would be evaluated (see table 1). DOT did not require that projects address every criterion. DOT noted that in addition to these criteria, called merit criteria, it would also evaluate a project’s readiness, meaning the likelihood of a project’s successful delivery and that the project will meet statutory deadlines for certain milestones. In December 2018, DOT issued a NOFO in which it called for applications for grants of fiscal year 2019 INFRA funds, and made some changes to the program’s criteria. However, that process is ongoing and is outside the scope of this review. In reviewing applications submitted in response to the July 2017 NOFO, DOT evaluated proposed projects against the statutory and merit criteria using a multiphase review process involving technical and senior management teams. The process had three phases—application intake, technical evaluation, and senior review—each supported by different teams. The process also included a Quality Control and Oversight Team (QCO) that was involved throughout the process and responsible for ensuring consistent reviews and documentation. QCO consisted of team leads from each of the seven technical evaluation teams as well as liaisons from FHWA, MARAD, and FRA (see fig. 1). The application intake phase consisted of two sequential steps performed by two different teams. First, the intake review team assessed each of the projects to: 1. verify that the applicant type, project type, and cost-sharing met the statutory requirements; 2. determine the project’s size as being either small or large; 3. identify the highway and non-highway cost components; 4. determine whether the project is in an urban or rural area; 5. identify which technical evaluation teams should review the 6. which modal administration should perform the Operating Administration screen (described below). DOT received 258 applications for projects in November 2017 and determined that 24 projects did not qualify for INFRA funding. The remaining 234 projects then moved to the Operating Administrations’ screen. As part of the Operating Administrations’ screen, staff from the appropriate modal agency provided input on: 1. the applicant’s history with delivering projects on time; 2. whether the applicant had previously received federal funding from 3. whether the applicant contacted the agency about their INFRA project, the nature of the contact, and the level of technical and financial assistance provided by the agency; 4. whether the project is on the Transportation Improvement Program or the Statewide Transportation Improvement Program; and, 5. any specific issues with the project that evaluators should be aware of. The 234 projects then advanced to the Technical Evaluation phase of the process. The seven technical evaluation teams, made up of experts from across the agency, assessed and rated projects against the merit criteria. Each team was responsible for rating a different merit criterion (as noted in figure 1, the innovation criterion was split into three factors, so there were three innovation teams). Since DOT did not require projects to address all the criteria, teams only reviewed the projects that related to their criterion. The teams used the factors outlined in DOT’s INFRA evaluation plan to assess and rate the projects and documented their rating and a narrative justification for the assigned rating in DOT’s tracking spreadsheet. Generally, raters assigned scores of high, medium, or low for each criterion, with some exceptions. For example, the economic vitality team calculated the project’s benefit-cost ratio and net present value, while also noting whether the uncertainty associated with the rating was high, medium, or low. Similarly, the leveraging team assigned a rating score of high, medium, or low, but also calculated the percentage of non-federal funding, and noted whether the project included private-sector funding. Technical teams did not provide an overall rating of projects (such as not recommended, recommended, or highly recommended), an approach that differs from prior DOT discretionary grant programs we have reviewed. For detailed information about the evaluation factors and possible scores for each criterion, see appendix I. Each technical review team was assigned a team lead, who was responsible for ensuring that the projects were evaluated consistently and per the plan that governed that team’s criterion. All 234 projects received technical evaluation ratings for their merit criteria and then advanced for further review. According to DOT’s evaluation plan, the Quality Control and Oversight Team (QCO) was responsible for ensuring the consistency of reviews and documentation throughout the INFRA process. QCO consisted of team leads from each of the seven technical evaluation teams and liaisons from FHWA, MARAD, and FRA. QCO was also responsible for performing a “large project determination,” in which QCO assessed whether projects met each of the seven statutory requirements for large projects. QCO used information from the technical evaluations and the information provided in the application to determine whether projects met the statutory requirements. In cases where QCO could not definitively determine whether a large project met a statutory requirement, it would note “additional information is necessary” in DOT’s tracking spreadsheet. After QCO recorded its assessment, it submitted the projects to the Senior Review Team for review. The Senior Review Team was responsible for assembling a list of projects for consideration by the Secretary, and consisted of senior officials from the Office of the Secretary, and the Administrators of FHWA, FRA, FTA, and MARAD. The Senior Review Team, with QCO present to answer questions, met to review the projects and their technical evaluation scores for each criterion. The evaluation plan stated the Senior Review Team could, at its discretion, request that QCO seek additional information from applicants to help QCO determine if a large project met the statutory requirements. The final list of projects for consideration developed by the Senior Review Team contained 165 projects (all of the small projects and all of the large projects that QCO and the Senior Review Team determined met the statutory requirements). At the end of the review process, the Secretary received a series of spreadsheets ranking each of the 165 projects according to how well they scored on each merit criteria. According to a member of the Senior Review Team, the Secretary formally met twice with her chief of staff, deputy secretary, and other senior advisors to discuss the projects, first to analyze all of the projects on the list and second to finalize the award decisions. In June 2018, DOT announced it had awarded approximately $1.54 billion in INFRA funding to 26 projects (see fig. 2). For the 26 awarded projects, 44 percent of funds went to rural projects and 5 percent of funds went to small projects. In addition as shown in figure 2, highway projects received the largest percentage of funding (85 percent), and rail projects received the smallest percentage (1 percent). In designing its process for evaluating INFRA applications submitted in response to the July 2017 NOFO, DOT took steps to address issues that we found led to inconsistencies in DOT’s review of FASTLANE applications. Specifically, we reported that technical teams were divided by modal administrations (FHWA, MARAD, and FRA) and lacked clear guidance on how to score applications. This led to inconsistent scoring practices among the FASTLANE teams because one team applied a higher standard than the others. We recommended that DOT develop an evaluation plan for INFRA that clearly defined how all review teams should apply criteria, assess applications, and assign ratings to ensure that all applications are consistently reviewed. In response, DOT developed an INFRA evaluation plan that provided guidance on how to evaluate and assign a rating for each criterion, and in some cases, provided discrete numeric rating categories, allowing for less interpretation by technical review teams when assigning a score. In addition, DOT organized technical review teams by merit criteria and selected staff with the relevant expertise to serve on each team—for example, economists from the various modal agencies served on the economic vitality team. DOT also took steps to improve the transparency of its process by better communicating with unsuccessful applicants. Specifically, DOT formally notified unsuccessful INFRA applicants of selection decisions via email, addressing a concern we raised regarding the FASTLANE process. In our review of FASTLANE, we recommended that DOT notify unsuccessful applicants of DOT’s decision and that the notification should include a brief explanation of the decision. For INFRA, DOT emailed unsuccessful applicants notifying them of its decision. While the email did not include a brief explanation of the decision, it did offer applicants the chance to schedule a debriefing with DOT officials. Some of the selected applicants and consultants we spoke to said that the debriefing was helpful. For example, one applicant told us that during the debriefing, DOT shared how the project was rated by criterion. One applicant we met with said the debriefing was not helpful because the applicant did not receive a substantive answer about why they did not receive an award. Another applicant said he requested a debriefing but did not receive one. A DOT official told us that prior to issuing the fiscal year 2019 INFRA NOFO, DOT contacted all previous applicants to notify them of the upcoming round and again offer debriefs. We found that DOT’s process for following up with applicants lacked consistency and transparency, due to a lack of guidance and documentation. Specifically, DOT followed up with some applicants and not others to request additional information about their projects, and the rationale behind which applicants were selected for follow-up is not clear. We identified similar issues in our review of FASTLANE. As discussed earlier, for large projects to be eligible for an award, DOT must determine that the project meets several statutory requirements, such as generating benefits and demonstrating cost-effectiveness, among others. Our review of DOT documents revealed that DOT staff originally determined that 97 (of 116) applications for large projects did not include sufficient information for DOT to assess if the projects met each of the statutory requirements. At the request of officials on the Senior Review Team, QCO requested more information from 42 of those 97 applicants to help DOT determine if their projects met the requirements. Of the 42 applicants that DOT followed up with, 28 provided information that QCO determined was sufficient to ensure that they met the statutory requirements, and 13 of the projects received an award. Similarly, at the request of officials on the Senior Review Team, DOT staff reduced the scope of a number of projects. QCO staff split 9 projects into “components,” to scope out pieces of projects that could not meet a statutory requirement (for example, cost-effectiveness). Four of these component projects received an award. OMB guidance states that the intent of a NOFO is to make the application review process transparent so applicants can make informed decisions when preparing their applications to maximize fairness of the process. The guidance also states that federal agencies should make clear whether an applicant’s failure to meet an eligibility criterion by the time of an application deadline will result in the awarding agency returning the application without review or, even though an application may be reviewed, will preclude the awarding agency from making an award. Similarly, internal control standards note that federal agencies should communicate with external entities and enable these entities to provide quality information to the agency that will help it achieve its objectives. DOT’s NOFO states that the applications must include sufficient information for DOT to determine whether projects meet the statutory requirements, but also notes that DOT may seek additional information from applicants. The NOFO does not provide information on the basis for why DOT would follow up with one applicant and not another. After reviewing DOT’s documentation, we found that the rationales for following up with specific applicants were insufficient to explain why DOT followed up with certain applicants over others. The documentation, with few exceptions, included generally vague statements that additional information from the applicant could help DOT determine whether the project met the statutory requirements. We asked two officials from the Senior Review Team about several specific projects for which those officials requested additional information. These officials both stated they could not recall their rationale, given that roughly a year had elapsed and the large number of projects reviewed. However, they did provide some reasons why they might have requested additional information, such as the need for more clarity on a project, a high score on a criterion of interest to that official, or the desire to ensure that the list provided to the Secretary included a diverse array of projects (in terms of location, urban or rural status, and project type). Further, one official noted that there was insufficient time to follow up with every applicant. We have previously identified recommended practices for evaluating and selecting discretionary grant awards and noted that in order to align with these practices, it is important to document decisions, including decisions regarding which projects should have the opportunity to advance in the process. When we identified similar issues related to a lack of consistent and transparent follow-up with FASTLANE applicants, we recommended DOT develop an INFRA evaluation plan that clearly defines how all review teams should apply criteria, assess applications, and assign ratings to ensure that all applications are consistently reviewed. DOT’s INFRA evaluation plan states that if QCO has been unable to make an affirmative determination with respect to whether a large project meets a statutory requirement, a Senior Review Team member may direct QCO to seek clarifying information from the applicant or provide the necessary clarifying information themselves to support a determination. However, DOT’s evaluation plan does not require documentation of the reasons why the Senior Review Team asked QCO to follow up with certain projects over others. Without clearly outlining in the NOFO and the evaluation plan the situations in which certain applicants may be asked to provide additional information, as well as clear documentation for why follow-up does occur with specific projects over others, the process lacks transparency and the assurance of fairness. For example, we found examples in which reviewers noted that additional information could help them determine whether a project met the statutory requirements (such as whether the project was cost-effective) but less than half of the projects had the chance to provide such information. Of the 26 awarded projects, half of those projects (13 large projects) were afforded the opportunity to provide additional information to demonstrate that their projects met the statutory requirements. We were unable to determine the rationale for the selection of projects for INFRA awards; an issue we also found with the FASTLANE process. This is due to: inconsistency in the NOFO regarding how merit criteria would be used to select awardees; a large number of applications forwarded for potential award regardless of merit scoring; and limited documentation regarding why 26 projects were ultimately selected out of 165 for award. In the NOFO for INFRA, DOT provided inconsistent and unclear messages regarding the extent to which the merit criteria should be addressed to be competitive for an award, which also reduced transparency and caused confusion for some applicants. OMB guidance states that the intent of a NOFO is to make the application review process transparent so applicants can make informed decisions when preparing their applications to maximize fairness of the process. In the NOFO, DOT stated it would evaluate applications against four merit criteria, but also stated, “The Department is neither weighting these criteria nor requiring that each application address every criterion, but the Department expects that competitive applications will substantively address all four criteria.” In some cases, this approach led to confusion among applicants, as several of the selected applicants and consultants we interviewed noted that it was difficult to address the innovation merit criterion, with some stating the criterion was confusing or unclear and others stating that they faced difficulties adapting their projects to meet the criterion. Compounding this issue, several applicants and consultants also expressed uncertainty as to how DOT determined which projects should receive awards and which factors affected a project’s ability to get an award. For example, representatives for one applicant noted that they spent a considerable amount on a consultant for the benefit-cost analysis (which was common among most of the applicants we interviewed), but it was not clear how the benefit-cost analysis affected DOT’s decision-making. Despite the language in the NOFO, DOT did not use the merit scores— which reflect the extent to which projects addressed all four criteria— when it determined which projects should be provided to the Secretary for consideration. While DOT reviewers did score applications on all four merit criteria, all of the 165 projects that QCO found to be statutorily eligible—47 large projects and 118 small projects—were sent to the Secretary for potential award, regardless of merit criteria scores or whether the applicant substantively addressed all four merit criteria. DOT officials told us that DOT sought a “portfolio” approach in which the Secretary selected projects that scored highly on at least one criterion. Thus, the Secretary received a 25-page spreadsheet showing 14 different lists (7 for small projects and 7 for large projects) sorting all of the projects against the merit criteria, with each list arranged from highest to lowest score for that criterion. This method of presenting information on projects (and the volume of information presented) would make it challenging for any decision maker to compare projects and readily see how 165 projects scored across all criteria and whether all criteria were “substantively addressed.” In addition, projects were provided to the Secretary for consideration—and in some cases awarded—despite concerns raised by technical reviewers and regardless of whether projects addressed all of the merit criteria. For example, we found instances in which awarded projects had: Low cost-effectiveness scores. Over 50 percent (14 of 26) of all awarded projects received a high uncertainty rating related to their benefit-cost ratio and net present value score, meaning that the technical team had a low degree of confidence in the assigned score. Only 38 percent of all projects had this uncertainty rating. Moreover, of the 14 awarded projects with this rating, 11 had benefit-cost ratios of 1.0 to 1.5, which, when combined with the high uncertainty rating, raises the risk that the project would not be cost-effective. For example, for one large project, a technical reviewer noted, “… we conclude that the benefits of this project are reasonably likely to exceed its costs, though the case is very marginal and highly uncertain, as even a small change in some of the key assumptions and parameters could result in a negative finding.” Uncertainty regarding projects’ benefit-cost ratios is particularly important as DOT used these scores to assess whether large projects met the FAST Act requirement to be cost-effective. While comments from technical reviewers were not included in the spreadsheets provided to the Secretary, an official stated that the Senior Review Team reviewed each project in-depth with the Secretary, and other DOT officials noted that the spreadsheet provided to the Secretary included the uncertainty ratings for each project. Low scores on multiple criteria, or did not address all criteria. Two awarded small projects had a benefit-cost ratio of less than one, and one of those projects did not address the innovation criteria at all. Three of the 26 awarded projects (11.5 percent) did not address the innovation criteria at all. In addition, several of the selected applicants and consultants we interviewed expressed confusion regarding how DOT reviewed the applications and moved them forward within DOT. Some of the applicants and consultants thought that DOT used the project scores to determine which projects should move forward to the Secretary (similarly to previous rounds of other DOT grant programs in which projects were sorted into categories such as “highly recommended,” “recommended,” and “not recommended”). One applicant noted that it is important to know how many projects make it to the Secretary in order to understand the extent to which decisions are based on technical scores versus other considerations. DOT’s guidance states that grant recipients should be selected based on technical merit and those projects most likely to achieve the intended purpose. In addition, we have identified recommended practices for awarding discretionary grants, one of which includes documenting the rationale for award decisions. Documenting the rationale for award decisions becomes even more important in light of DOT’s decision to provide every eligible INFRA application to the Secretary, rather than providing the Secretary a list of the projects “most likely to achieve the intended purpose.” However, DOT’s documentation on the final selection of projects states the anticipated benefits of the projects but does not indicate why these projects, according to DOT’s guidance, “best address program requirements and, therefore, are most worthy of funding.” In our review of the FASTLANE process, we also noted that due to limited documentation, we could not determine how DOT selected which projects should receive awards. We recommended that DOT require program teams to document their decision-making rationale throughout all levels of review in the application selection process. DOT agreed with this recommendation; however, it has not yet been implemented. Therefore, it remains unclear whether DOT is awarding discretionary grants on the basis of merit principles or other considerations. An absence of documentation can give rise to challenges to the integrity of the evaluation process and thus the decisions made. Since 2011, we have found similar issues with DOT’s management of other competitive discretionary grant programs, including a lack of documentation of key award decisions, and have made recommendations aimed at increasing consistency and transparency. In some cases, DOT implemented our recommendations for one program, but we subsequently found similar or recurring problems in other DOT programs. In 2011, we reviewed DOT’s Transportation Investment Generating Economic Recovery (TIGER) program and FRA’s High Speed Intercity Passenger Rail program—two discretionary grant programs funded through the American Recovery and Reinvestment Act of 2009. For both programs, we found, among other things, limitations in the agencies’ documentation of the rationale for award decisions. With respect to TIGER, we noted that a lack of documentation could subject DOT to criticism that projects were selected for reasons other than merit. However, we also noted that documenting key decisions could help build confidence in DOT’s ability to administer competitive discretionary grant programs. We recommended that DOT and FRA improve their documentation of key decisions for both programs. DOT implemented these recommendations by updating its TIGER and FRA guidance to require additional documentation. Despite the steps DOT took to address our prior recommendations, in 2014, we found continued issues in the TIGER program and made more targeted recommendations. Specifically, we found that DOT did not document key decisions to, among other things, (1) advance projects with lower technical ratings instead of more highly rated projects, and (2) change the technical ratings of lower-rated projects that had been selected for an award. We recommended that the Secretary of Transportation establish additional accountability measures for management of the TIGER program, to include using a decision memorandum or similar mechanism to document a clear rationale for decisions to: change the technical evaluation rating of an application, not advance applications rated as highly recommended, and advance for senior review applications other than those rated as highly recommended. Subsequently, DOT revised its guidance for the TIGER program to prohibit changes to the technical ratings, require that all highly rated projects be advanced, define the conditions through which lower rated projects may be advanced, and require that all such decisions be fully documented. DOT did not require that these decisions be documented through a decision memorandum or similar mechanism, as we had recommended. However, taken together, we determined DOT’s actions were sufficient to address our recommendation for the TIGER program. In December 2016, we found similar problems during our review of the Hurricane Sandy transit-resilience grant program administered by the Federal Transit Administration (FTA). For example, we found that FTA did not document rationales for changes to project ratings nor did it document how it addressed high-level project concerns raised by reviewers in their evaluation comments. In addition, we found that DOT lacked clear department-wide requirements for what should be documented when evaluating and selecting discretionary grant awards. We noted that internal control standards state that all transactions and significant events need to be clearly documented, and that a recommended practice for evaluating and selecting discretionary grant awards is documenting the rationale for awards decisions, including reasons individual projects were selected or not selected. We also found that FTA did not develop an evaluation plan prior to calling for applications, despite the fact that this was a requirement in DOT’s Financial Assistance Guidance Manual and that recommended practices for administering discretionary grant programs note the importance of having an evaluation plan that describes a method for overseeing the technical review panels to ensure a consistent review. Finally, we found that FTA did not assess projects against the policy priorities it outlined in its notice of funding availability, despite an OMB directive to provide sufficient information to help an applicant make an informed decision about whether to submit a proposal. At this time, we noted a pattern of problems occurring across DOT and its modal administrations’ discretionary grant programs and determined that a department-wide action was needed to address these issues. Specifically, we recommended that the Secretary issue a department- wide directive that should include requirements to: develop a plan for evaluating project proposals in advance of issuing a notice of funding availability that defines the stages of the process, including how the process will be overseen to ensure a consistent review of applications; document key decisions, including the reason for any rating changes and the officials responsible for those changes, and how high-level concerns raised during the process were addressed; and align stated program purpose and policy priorities with the evaluation and selection process. DOT concurred with our 2016 recommendation to develop a department- wide directive and initially stated that it would address it by updating its Financial Assistance Guidance Manual by September 2018 (DOT recently extended this to December 2019). In response, we noted that in order to address our recommendation, DOT needed to issue a directive that incorporates all of the elements identified in our recommendation. In addition, it remains unclear whether updating the manual would have the same effect as issuing the department-wide directive that we recommended. Specifically, we have found that DOT has not always followed its own guidance despite clear language that certain actions are required. For example, in our 2017 review of the FASTLANE program, we noted that the Financial Assistance Guidance Manual required finalization of the evaluation plan prior to soliciting applications for grants, but this guidance was not followed. Since 2017, we have sent letters to the Secretary of Transportation noting that this is a high-priority recommendation that warrants her attention. In March 2019, DOT issued a one-page memo to all offices and departments that administer discretionary grants. This memo directed the offices to update their policies and procedures to implement our 2016 recommendation and to send the updated policies to DOT’s Office of the Senior Procurement Executive by June 30, 2019. DOT officials told us that DOT believes this action has addressed the recommendation. Due to a number of issues, however, it is unclear how this action will address our recommendation to create clear department-wide requirements aimed at improving transparency and consistency. Specifically, we found that the memo was essentially limited to a repetition of our recommendation. That is, DOT did not take steps to ensure that the various affected offices consistently interpret and implement the recommendation. For example, DOT did not define key terms such as “high level concerns,” or “key decisions.” In addition, DOT did not communicate to offices how they should sufficiently document their decisions to ensure that the rationale for those decisions—including the reasons individual projects were selected or not selected—is clear. DOT officials told us they wanted to provide the affected offices flexibility to implement the recommendation and would assess the need for additional guidance based on the completion of the Financial Assistance Guidance Manual. However, the lack of information regarding how offices should implement the memo raises significant questions about whether various offices will interpret and implement the recommendations differently, and enhances the risk that DOT will continue to lack a department-wide approach to ensure that discretionary grant programs are consistently and transparently administered. As DOT continues to try to address these long-standing issues with its discretionary grant programs, Congress has an opportunity through reauthorization legislation, scheduled for 2020, to build requirements for enhanced consistency and transparency into these programs. This is particularly important as DOT has two additional rounds of INFRA funding to award under the FAST Act, and the President’s Budget proposal proposed providing an additional $1 billion to INFRA. Moreover, the FAST Act also authorized over a dozen discretionary transportation grant programs, and Congress may consider additional programs during the reauthorization of DOT’s surface transportation programs. Through legislation, Congress could craft requirements around the administration of DOT’s discretionary grants to improve the processes for awarding grants. Absent effective action by DOT going forward, the recurring and long-standing issues we have identified could continue to affect DOT’s discretionary grant programs. While DOT has taken some steps to improve its reviews of INFRA grant applications since we reviewed the FASTLANE program, issues related to consistency and transparency remain. Specifically, without clear communication from DOT regarding (1) the situations in which DOT may provide certain applicants the opportunity to supplement their applications with additional information, and (2) how merit scoring is used, if at all, to determine whether projects advance to the Secretary for selection and which projects are selected, applicants lack the information needed to make informed decisions about whether to apply. In addition, without documentation outlining why DOT decided to request additional information from certain applicants over others, the process lacks transparency. Since the FAST Act was enacted in 2015, we have been unable to determine the basis for the resulting awards of about $2.3 billion through the FASTLANE and INFRA program. This lack of clarity is significant and is the product of long-standing issues that we have identified with DOT’s discretionary grant programs since 2011. We have previously noted that competitive discretionary grant programs have promise in better targeting federal transportation spending to areas of national and regional significance; however, this promise cannot be fulfilled if DOT’s process and rationale for making awards remains unclear. In 2019, DOT issued a department-wide memo aimed at addressing our 2016 recommendation, but it is unclear how DOT’s approach will improve consistency and transparency in its management of grant programs. We will continue to monitor DOT’s efforts to address our recommendation. However, given the long-standing nature of the issues we identified and the potential that they could continue to affect DOT’s discretionary grant programs, the reauthorization of DOT’s surface transportation programs scheduled for 2020 provides Congress the opportunity to require DOT to take additional action to ensure consistency and transparency in the management of its discretionary grant programs. During the next reauthorization for surface transportation programs, Congress should consider including language in the reauthorization bill that would require DOT to develop and implement transparency measures for DOT’s review and selection process for discretionary grants. Such measures should, at a minimum, help to ensure that the evaluation process is clearly communicated, that applications are consistently evaluated, and that the rationale for DOT’s decisions are clearly documented. Such measures should be developed in line with OMB guidance, federal internal control standards, and recommended practices for evaluating and selecting discretionary grant awards (Matter for Consideration 1) We are making the following three recommendations to DOT: The Secretary of Transportation should ensure that DOT, in its notice of funding opportunity and evaluation plan for each remaining INFRA- funding cycle, clarify the circumstances under which DOT may select applicants to receive requests for additional information. (Recommendation 1) The Secretary of Transportation should develop procedures for each remaining INFRA-funding cycle to ensure that when additional information is requested from an applicant, the specific rationale behind the request is documented (for example, to promote geographic diversity among projects), as well as to ensure that DOT documents the rationale if similar projects were not afforded an opportunity to provide additional information. (Recommendation 2) The Secretary of Transportation should ensure that DOT provides information to applicants in its notice of funding opportunity for each remaining INFRA-funding cycle regarding: (1) how scores on merit criteria are used, if at all, to determine whether projects advance to the Secretary for selection, and (2) how, if at all, DOT plans to use merit scores to determine which projects should receive an award. (Recommendation 3) We provided a draft of this report to DOT for review and comment. In comments, reproduced in appendix II, DOT concurred with our recommendations. DOT noted its efforts to improve the INFRA process for the 2019 round of funding and stated that it looks forward to assisting Congress in addressing the matter for congressional consideration in a manner that is feasible within DOT’s timing and resource constraints. DOT also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Transportation, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Likely NEPA status/type of action required, based on available information (such as expecting the project to be found to have no significant impact on the environment or that the project would be required to be reevaluated) The likelihood the project will be able to be delivered by its obligation timeframe High risk = high likelihood that the project will not be obligated on time Medium risk = some possibility the project will not be obligated on time Low risk = highly likely the project will be obligated on time The Special Experimental Project authorities (SEP 14/15 waiver) is a program that identifies and tests innovative project-delivery methods (such as non-traditional contracting techniques). Susan Fleming, (202) 512-2834 or flemings@gao.gov. In addition to the contact named above, Steve Cohen (Assistant Director); Crystal Huggins (Analyst in Charge); Amy Abramowitz; Melissa Bodeau; Michelle Everett; Geoffrey Hamilton; Joshua Ormond; Oliver Richard; Kelly Rubin; and Charles Truxillo made key contributions to this report.", "summary": "The cost to repair and upgrade the nation's surface transportation system to meet current and future demands is estimated in the hundreds of billions of dollars. In December 2015, Congress established a DOT discretionary grant program to fund nationally significant freight and highway projects. DOT awarded $1.54 billion for such projects for fiscal years 2017 and 2018. GAO was asked to review DOT's process for evaluating and selecting applications for awards. This report discusses the consistency and transparency of DOT's process for evaluating and awarding INFRA grants for the fiscal-year 2017–2018 round of funding, among other objectives. GAO reviewed DOT's documentation of its evaluation process, and interviewed DOT staff and officials, as well as 11 INFRA applicants selected to ensure diversity in projects' size, type, location, and award status, as well as type of applicant. The Department of Transportation's (DOT) process for reviewing applications for grants to fund projects under the Infrastructure for Rebuilding America (INFRA) program lacked consistency and transparency in aspects related to following up with applicants and evaluating applications. Following up with applicants. DOT must determine that an applicant's project meets statutory requirements in order for the project to be eligible for an INFRA award. DOT initially found that 97 applications had insufficient information for an eligibility determination. DOT followed up with 42 of the 97 applicants to request additional information. DOT did not sufficiently document why it followed up with certain applicants over others. If DOT does not clearly communicate and document its process regarding applicant follow-up, the process lacks transparency and the assurance of fairness. Evaluating applications. In addition to the statutory requirements, DOT established merit criteria (e.g., economic vitality) to evaluate projects against, and stated that competitive projects would substantively address all of the criteria. DOT teams scored the projects on how well they addressed each criterion. However, DOT forwarded the information on all 165 projects that were found to be statutorily eligible to the Secretary for potential award, regardless of how well they scored on the merit criteria. In the end, DOT awarded some projects that did not address all of the criteria. Several applicants told GAO they were uncertain how DOT determines which projects should receive awards. In addition, DOT's documentation does not provide insight into why projects were selected for awards, an issue GAO has previously noted and recommended DOT address. The above limitations reflect long-standing issues GAO has identified in DOT's discretionary grant programs. Specifically, since 2011, GAO has recommended actions to increase consistency and transparency. In some cases, DOT implemented the recommendations for one program, but GAO later found similar problems in other programs. After finding repeated issues, GAO recommended in 2016 that DOT develop a department-wide directive that would, among other things, require that key decisions be documented. DOT agreed with the recommendation. In a March 2019 memo, DOT directed offices to implement GAO's recommendation by June 2019. However, it is unclear how this action will improve transparency and consistency because, among other things, DOT did not communicate how offices should sufficiently document decisions to ensure that the rationale for decisions is clear. The next reauthorization of surface transportation programs provides Congress the opportunity to build requirements for greater consistency and transparency into DOT's grant programs. This is particularly important as DOT has two additional rounds of INFRA funding to award under the FAST Act, and the President's Budget proposal proposed providing an additional $1 billion to INFRA. Absent effective action by DOT going forward, the recurring and long-standing issues GAO has identified could continue to affect DOT's competitive discretionary grant programs. GAO is making three recommendations, including that DOT should communicate and document the rationale for asking specific applicants for more information and provide information to applicants on how, if at all, DOT uses merit criteria scores to advance projects through its evaluation and selection process. Also, Congress should consider directing DOT to develop and implement transparency measures in the next surface-transportation reauthorization bill. DOT concurred with GAO's recommendations and provided technical comments that GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "Over the past decade, our prior work has highlighted the evolving nature of individual IDT refund fraud and the challenges IRS faces in keeping up with fraudsters’ tactics. Since 2015, our biennial High-Risk Report has highlighted the challenges associated with IDT refund fraud, the actions IRS needs to take to address them, and the cybersecurity issue of protecting PII amid large-scale data breaches. These challenges are relevant to business IDT and further compounded by the complexity of the business tax environment. According to IRS officials, this complexity stems, in part, from the number of business types or structures, the various taxes that businesses pay, and the different tax forms businesses must file. Further, many businesses file tax returns throughout the year, unlike individual taxpayers who generally file income tax returns once a year. These factors make detecting, researching, and resolving potential business IDT cases more challenging than individual IDT cases. When establishing a business, a business owner must determine the structure of the business for tax purposes, among other things, and may link business entities together in networks with multiple tiers. In addition, unlike individuals, businesses are required to pay different types of taxes depending on the business structure. For example, C corporations and S corporations pay income tax, and may also pay employment taxes and excise taxes on certain products and services such as fuel. Businesses are required to file different forms for each type of tax and may also file forms to claim various tax credits. Table 1 provides examples of business types and associated tax forms, volume, and total refunds for fiscal year 2018. IRS officials said that the complexity of the business tax environment makes it difficult for tax examiners to distinguish between true business IDT and frivolous tax arguments or noncompliance, such as incorrect or missing information on a form. Officials also noted that fraudsters may be attracted to the potential large payout associated with business tax refunds. According to IRS data, the average 2018 tax refund for corporations was about $286,200 and about $24,700 for estates and trusts. In contrast, the IRS Data Book, 2018 reports that the average individual tax refund was about $2,900. Further, business IDT may also lead to other types of tax fraud. In addition to filing false business returns seeking a refund, fraudsters may use stolen EINs and business information to support an individual income tax refund scheme. For example, fraudsters may file fraudulent Forms W- 2, Wage and Tax Statement with information on fictitious employees. These forms could then be used to file fraudulent individual tax returns seeking refunds. According to IRS, there are two ways a fraudster can commit business IDT, both of which involve the fraudulent use of the EIN. 1. Obtain an existing EIN. In this scenario, a fraudster obtains federal tax information from an existing business (see fig. 1). The business may be active or dormant, meaning that the business owner has not filed a tax return for at least two tax periods. The fraudster then uses the EIN and other key business information to file a fraudulent business return, such as Form 1120. 2. Fabricate an EIN. In this scenario, a fraudster steals the identifying information of an individual, such as a Social Security number and uses it to apply for an EIN. The fraudster would then use the fabricated EIN to complete and file false business returns. In June 2016, Congress passed and the President signed into law the Fraud Reduction and Data Analytics Act of 2015 (FRDAA), which created requirements for agencies to establish financial and administrative controls for managing fraud risks. These requirements are aligned with leading practices outlined in our Fraud Risk Framework. In addition, guidance from OMB affirms that managers should adhere to the leading practices identified in the framework. The Fraud Risk Framework provides key components and leading practices for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The framework consists of four primary components of fraud risk management: commit, assess, design and implement, and evaluate and adapt, as shown in figure 2. Specifically, the components call for agencies to (1) commit to combatting fraud by creating an organizational culture conducive to fraud risk management, (2) plan regular fraud risk assessments and assess risks to determine a fraud risk profile, (3) design and implement a strategy with specific control activities to mitigate assessed fraud risks, and (4) evaluate outcomes using a risk-based approach and adapt activities to improve fraud risk management. According to the Fraud Risk Framework, the four components are interdependent and mutually reinforcing. For example, fraud response efforts can inform preventive activities, such as using the results of investigations to enhance fraud detection efforts. We have previously reported that preventive activities generally offer the most cost-efficient use of resources, since they enable managers to avoid a costly and inefficient “pay-and-chase” model. The framework also reflects ongoing activities for monitoring and feedback that apply to all four components. IRS uses computerized checks, or fraud filters, to screen incoming tax returns for known or suspected characteristics of fraud. As of September 2019, IRS had implemented 19 unique fraud filters that assess incoming returns on certain business and employment tax forms. These fraud filters help IRS determine if an incoming return exhibits suspicious characteristics. IRS also cross-references these returns against lists of taxpayer identification numbers previously involved in data breaches and at greater risk of tax-related identity theft. IRS officials stated that they plan to implement additional fraud filters for three employment tax forms for the 2020 filing season. Our analysis of IRS’s data shows that from January 2017 to August 2019, business IDT fraud filters stopped about 188,500 incoming business returns as potential IDT, claiming $47.6 billion in refunds. Of these, IRS performed in-depth research on about 182,700 returns claiming $47.3 billion in refunds. IRS determined that about 77 percent of these cases (140,100 cases) claiming $38.3 billion in refunds were not business IDT while about 4 percent (7,900 cases) were confirmed business IDT claiming $384 million in fraudulent refunds. The remaining cases were still under review as of August 2019. However, as we discuss later in this report, these estimates do not capture the full size and scope of business IDT. In addition to developing fraud filters, IRS has established more advanced fraud detection efforts through the Return Review Program (RRP). As of September 2019, IRS was developing and testing fraud detection models in RRP for certain business tax forms. IRS officials said they intend to develop additional models, such as those to address fuel tax credit fraud and entity fabrication. Officials also noted that they will continue to rely on fraud filters to detect potentially fraudulent business returns, even after expanding RRP’s functionality. Further, IRS’s broader fraud detection efforts include working with external partners. For example, IRS collaborates with states and industry partners through the Security Summit Business IDT sub-workgroup. This group has identified business-related data elements that are captured during the tax filing process and analyzed for potential suspicious patterns that could indicate business IDT. During the 2018 filing season, IRS analyzed 37 data elements from incoming business tax returns and 10 data elements on incoming employment tax returns, including, for example, characteristics of the computer used to submit the return. IRS officials also stated that they are working directly with tax practitioners to help improve the quality of the data they collect to better inform future business IDT fraud filters and models. In addition, in December 2017, IRS initiated a pilot project with the Alabama Department of Labor to help detect and prevent business IDT. IRS officials stated that they send the department a data extract on all newly issued EINs from the prior month. The state performs research on these businesses and, in turn, sends IRS a list of businesses that it has determined to be fraudulent. As a result, IRS is able to deactivate the fraudulent EINs before the fraudster files a false business, employment, or individual tax return claiming a refund. This allows IRS to reject returns associated with the fraudulent EINs. According to IRS data, in 2018 IRS identified about 3 percent (1,343 out of 53,826) of new EINs in Alabama as fraudulent. The early results of this collaborative effort indicate that this project shows promise, and IRS officials stated that they are working to determine if they can expand the initiative to other states. One component of our Fraud Risk Framework calls for agencies to create an organizational culture conducive to combating fraud. Such a culture can be created through “tone at the top,” whereby senior-level staff demonstrate commitment to integrity and combating fraud, and actions that involve all levels of the agency in setting an antifraud tone that permeates the organization. In addition, the Fraud Risk Framework calls for agencies to designate an entity to lead fraud risk management activities. Among other things, the designated entity should have defined responsibilities and the necessary authority to perform its role, including managing a fraud risk assessment process and coordinating antifraud activities across the program. Our prior work has shown that when agencies formally designate an entity to design and oversee fraud risk management activities, their efforts can be more visible across the agency, particularly to executive leadership. Consistent with the Fraud Risk Framework, IRS leadership has demonstrated a commitment to identifying and combating overall IDT refund fraud. For example, the agency has recognized the broad and evolving challenge of IDT refund fraud in its fiscal year 2018–2022 strategic plan. Also, as previously discussed, IRS has expanded its fraud detection activities to prevent payment of fraudulent refunds, including refunds on business-related returns. In addition, our 2019 High-Risk Report noted that IRS took significant actions to facilitate information sharing with states and industry partners through the Identity Theft Tax Refund Fraud Information Sharing and Analysis Center. Further, IRS has implemented agency-wide antifraud efforts, including bringing officials together from across the organization to discuss potential fraud risks. These efforts have helped to foster an antifraud tone across IRS, according to IRS officials. At the business unit level, four IRS entities have responsibility for detecting, preventing, and resolving business IDT, as described below. However, IRS has not designated a lead entity to design and oversee business IDT fraud risk management activities across the agency, including a fraud risk assessment, consistent with leading practices. During our interviews with IRS, we found that IRS officials were knowledgeable about the business IDT policies, processes, and outcomes in their individual unit. However, none of the entities has defined responsibilities and the necessary authority to manage fraud risk across the business units. Further, no one we spoke with could articulate an agency-wide view of the problem and its potential impact on IRS. Return Integrity and Compliance Services (RICS) is responsible for detecting potential fraud on incoming business tax returns during the “pre-refund” phase (i.e., the period from when IRS accepts the return but before it issues a refund). About 20 RICS and Integrity and Verification Operations tax examiners are responsible for researching taxpayer accounts to confirm whether or not business IDT occurred. Tax examiners are also responsible for resolving cases to both prevent IRS from paying out fraudulent refunds and ensure that legitimate taxpayers’ returns are released for processing. RICS refers cases to other IRS units if the case shows other signs of fraud, such as a frivolous return. Accounts Management (AM) is responsible for researching and resolving potential business IDT cases identified during the “post- refund” phase (i.e., after a refund has been paid). AM customer service representatives perform in-depth account research and work with taxpayers to determine if business IDT has occurred. In cases of confirmed business IDT, AM corrects related account errors and enters appropriate IDT markers on the taxpayer’s account. According to IRS officials, about five AM staff work on business IDT cases one day a week or as needed. Criminal Investigation (CI) investigates large-scale tax schemes and other financial fraud, including fraud related to IDT. Office of Research, Applied Analytics and Statistics (RAAS) is responsible for supporting RICS and other business units in identifying and developing various business IDT fraud detection capabilities. RAAS also performs analyses to help IRS determine how best to proceed with other fraud detection and prevention efforts. IRS officials stated that representatives from the four business units meet regularly to share information on cases and discuss challenges. Further, IRS officials stated that the IDT Executive Steering Committee—which last met in October 2018—is responsible for providing general oversight and guidance to business units working on IDT-related efforts. However, our review of several sets of Committee meeting minutes indicates that while RICS has briefed committee members on the status of various business IDT efforts, they have not specifically discussed business IDT program priorities, potential fraud risks, or resources. When asked why IRS has not designated an entity to be responsible for overseeing business IDT fraud risk efforts, IRS officials said its business IDT efforts may not require additional oversight because they are significantly smaller than IRS’s individual IDT efforts in terms of both case volume and number of employees. They also said that the business IDT efforts are relatively new. However, with no more than 30 IRS employees working on business IDT issues, each business unit is mainly focused on day-to-day operations. The absence of an entity to lead business IDT fraud risk efforts may contribute to the issues we identify later in this report related to identifying and assessing business IDT fraud risks consistent with leading practices and delays in resolving business IDT cases. The Fraud Risk Framework’s leading practices provide flexibility in structuring the designated entity to best support an agency’s fraud risk management efforts. For example, leading practices note that the designated entity could be an individual or a team, and can vary depending on factors like existing organizational structures and expertise within the agency. In addition, employees across an agency or program, as well as external entities, can be responsible for the actual implementation of fraud controls. For example, IRS could designate one business unit as a lead entity, or leverage existing cooperative relationships between RICS, AM, CI, and RAAS to establish a business IDT leadership team with defined responsibilities and authority for managing fraud risk. A lead entity could help provide a strategic direction, coordination across business units, and oversight for managing IRS’s business IDT fraud risks. Further, without a designated entity, it is not clear which entity would be responsible for assessing business IDT risks and documenting the results, consistent with leading practices. These activities are important to combat the evolving threat of business IDT. The Fraud Risk Framework calls for agencies to regularly plan and perform fraud risk assessments to determine a risk profile. Fraud risk assessments that align with the Fraud Risk Framework involve (1) identifying inherent fraud risks affecting the program, (2) assessing the likelihood and impact of those fraud risks, (3) determining fraud risk tolerance, (4) examining the suitability of existing fraud controls and prioritizing residual fraud risks, and (5) documenting the results (see fig. 3). Such a risk assessment provides the detailed information and insights needed to create a fraud risk profile, which, in turn, is the basis for creating an antifraud strategy for the program. IRS has taken preliminary steps to understand fraud risks associated with business IDT through data analysis efforts and internal discussions with subject matter experts. However, IRS has not fully identified and assessed fraud risks to business IDT consistent with leading practices. These practices include identifying and assessing the likelihood of inherent fraud risks, determining a fraud risk tolerance, and examining the suitability of existing fraud controls to determine if they appropriately address identified risks. IRS business units use current and prior year tax return data and information on known business IDT threats to improve existing fraud detection efforts and develop new efforts. For example, RICS and RAAS officials stated that they regularly collaborate to discuss the feasibility of new fraud filters and identify and prioritize analyses on business IDT data. This effort has resulted in IRS business units identifying 38 discrete projects to, for example, analyze existing fraud filter performance and understand business tax return filing behaviors. RICS officials stated they typically identify two to three projects to begin each year, resources permitting. In addition, IRS officials stated that at the end of each filing season, they review and analyze confirmed business IDT cases to identify any new patterns or trends that may be useful for enhancing existing fraud filters and developing fraud detection models in RRP. Further, RAAS has performed ad hoc data analyses, such as on the characteristics of fabricated entities, to help understand potential risks to the business tax environment. While these are positive steps, IRS has not assessed business IDT fraud risks consistent with leading practices in the Fraud Risk Framework. For example, IRS has not identified and documented inherent fraud risks in the business tax environment, or assessed the likelihood of their occurrence and impact on IRS—the first two steps of a fraud risk assessment process. Further, our review of past GAO, Treasury Inspector General for Tax Administration (TIGTA), and National Taxpayer Advocate reports identified issues that pose inherent risks to IRS’s business IDT efforts. These risks include weaknesses with correspondence-based authentication, EIN vulnerabilities, and the high false detection rates for IDT fraud filters. We consider these to be inherent risks due to the complex nature of the business tax environment and IRS management’s overall limited response to them. Weaknesses with correspondence-based authentication. To help verify whether a suspicious business tax return is legitimate, IRS’s business IDT procedures rely on correspondence-based authentication. This involves the taxpayer answering several brief, written questions about the business and sending this information to IRS via mail. IRS officials stated that they believe correspondence-based authentication is no less secure than other forms of authentication, such as having business owners verify their identity in-person at a Taxpayer Assistance Center or authenticating via telephone. However, unlike other forms of authentication, correspondence-based authentication is inherently less secure because it may not require the taxpayer to verify their identity using a government-issued form of identification. Consequently, IRS has less assurance that the person is the actual business owner and the return in question is legitimate. In June 2018, we reported that IRS had not performed risk assessments to identify, assess, and mitigate risks associated with correspondence- based authentication because it did not have a policy that requires regular assessments and timely mitigation of identified issues. Therefore, without a policy for conducting risk assessments for correspondence- based authentication and a plan for performing an assessment, IRS may underestimate known risks and overlook emerging threats to the tax environment. We recommended that IRS establish a policy for conducting such risk assessments and develop a plan for performing them. IRS agreed with our recommendations and, as of November 2019, had developed a draft policy for conducting risk assessments. However, IRS had not yet developed a plan for performing these assessments. IRS officials stated that they intend to address these recommendations by May 2020. EIN vulnerabilities. In February 2018, TIGTA identified concerns with IRS’s EIN application process and made 18 recommendations, including that IRS improve processes to ensure that the applicant meets the requirements for obtaining an EIN and implement policies to help detect potential abuse of the online EIN application system. IRS agreed with 15 of TIGTA’s recommendations and, as of September 2019, IRS reported that it had addressed 11 recommendations. The four unaddressed recommendations aim to improve data collection and validation in the EIN system, which could help IRS identify suspicious applications. IRS officials stated that these improvements are on hold due to limited resources and competing priorities. In addition, characteristics of the EIN may make it inherently risky and susceptible to fraudsters. According to IRS, a business’s EIN is not considered PII and is not required to be protected like a Social Security number. This may make it easier for a fraudster to obtain an existing EIN and file a fraudulent business tax return. In addition, we have previously reported that fraudsters may target paid preparers, tax software providers, and other third parties to steal taxpayer data to commit IDT refund fraud or other types of financial crimes. These data may include existing EINs or the necessary information to obtain a new EIN, making it easier for fraudsters to file fake business returns. IRS officials stated that they recognize the potential risk of the EIN application process, but must balance the needs of legitimate businesses against IRS’s responsibility to detect and prevent fraud. Officials noted that they have security measures in place to detect potentially suspicious activity in the online EIN application and fraud filters to detect when taxpayers file a return with a dormant EIN. A fraud risk assessment consistent with leading practices would help IRS establish a risk tolerance for the EIN process and determine if its existing fraud controls are sufficient to address the vulnerabilities inherent to the EIN application process. High false detection rates for IDT fraud filters. The National Taxpayer Advocate’s 2018 Annual Report to Congress noted that one of IRS’s most serious problems is a high false detection rate in its fraud detection systems. In general, the false detection rate is the number of legitimate returns selected by the IRS as potentially fraudulent, divided by the total number of returns selected as potentially fraudulent. The National Taxpayer Advocate noted that IRS’s false positive rate for individual IDT filters was 63 percent in 2018. The high rate contributed to increased processing times and delays in issuing refunds for legitimate returns. It also created additional work for IRS. Similarly, our data analysis of BMFIC data shows that IRS’s business IDT fraud filters had about an 85 percent false detection rate for returns screened by fraud filters from mid- January 2017 to December 2018. In September 2019, IRS officials described several factors contributing to the high false detection rate for business IDT fraud filters. These factors include taxpayers and tax preparers failing to update key information with IRS, cross-referenced fraud filters triggering other filters, and changes in taxpayer filing behaviors due to new tax laws. The officials said they are working to reduce the false detection rate. While it is reasonable to expect fraud filters will catch some legitimate returns, IRS has not conducted a risk assessment—or developed a fraud risk tolerance—consistent with leading practices. Determining a fraud risk tolerance would help officials determine how best to balance the risks of missing fraudulent returns with the risks of flagging legitimate returns. Doing so may also help IRS prioritize any needed improvements to existing filters. According to the Fraud Risk Framework, a fraud risk assessment is the basis for developing an antifraud strategy. Among other things, an antifraud strategy considers the benefits and costs of control activities to address risks, such as the inherent business IDT risks described above, and other risks facing the program. As of July 2019, IRS’s Wage and Investment division had identified the overall threat of business IDT as one of 12 risks it is currently facing. However, IRS’s risk documentation does not include important components of a fraud risk assessment consistent with GAO’s Fraud Risk Framework. Specifically, the documentation does not include information on the likelihood or impact of each risk, IRS’s risk tolerance, or clear plans or responsibilities for mitigating risks. A business IDT fraud risk assessment with these key items would position IRS to develop a fraud risk profile and an antifraud strategy for business IDT going forward. In addition, officials from IRS’s Office of the Chief Risk Officer stated that consistent with the Fraud Reduction and Data Analytics Act of 2015 (FRDAA), the agency compiles an annual enterprise-wide fraud risk report based on program-level risks that IRS business units identify and monitor. The Office of the Chief Risk Officer’s October 2019 report acknowledges business IDT as one of 11 enterprise fraud risks for 2019– 2020. A fraud risk assessment and a fraud risk profile on business IDT consistent with leading practices would also help support IRS’s broader efforts to report and monitor enterprise-wide fraud risks. IRS officials stated that they have not performed a formal fraud risk assessment or developed a fraud risk profile for business IDT because they have directed their resources toward identifying and addressing fraud that is occurring right now and improving fraud detection efforts. When asked whether they had plans to further identify and assess inherent fraud risks for business IDT—the first step of the fraud risk assessment process—IRS officials said they thought that the costs of identifying and assessing inherent risks of business IDT would likely outweigh the benefits given the relatively low volume of confirmed business IDT cases, compared with individual IDT refund fraud. Without assessing inherent risks, determining the likelihood, impact, and IRS’s tolerance for each risk, and examining the suitability of existing fraud controls, IRS lacks reasonable assurance that it is aware of the most significant fraud risks facing business IDT. Such an analysis would also help IRS determine whether additional fraud controls are needed and whether to make adjustments to existing controls. Further, without this critical information, IRS will be unable to develop a fraud risk profile consistent with leading practices. A fraud risk profile for business IDT may help IRS make better informed decisions about allocating resources to combat business IDT and minimize financial losses. Consistent with our Fraud Risk Framework, a fraud risk profile that considers the likelihood and impact of fraud risks, IRS’s tolerance for risk, and the suitability of existing fraud detection activities is critical for developing an antifraud strategy and ensuring that IRS has an effective approach to addressing risks to business IDT. The Fraud Risk Framework states that managers may conduct quantitative or qualitative assessments, or both, to help determine the likelihood and impact of inherent fraud risks on the program’s objectives and help estimate fraud losses and frequency. Further, federal internal control standards call for program managers to use quality information to achieve their objectives, address relevant risks, and communicate that information as necessary to internal and external stakeholders. As of September 2019, IRS was collecting fraud filter data for some, but not all, business-related forms that may be susceptible to business IDT. Our analysis of IRS’s data shows that for 2018, business IDT fraud filters covered about 88 percent of business tax forms claiming a refund (14.0 million out of 15.9 million returns) and nearly all employment tax forms claiming a refund (30.7 million out of 31.0 million returns). IRS officials stated that since 2016, they have incrementally implemented business IDT fraud filters for the most commonly filed forms. We recognize that IRS has made progress in implementing filters for commonly filed forms and that the deceptive nature of fraud makes developing accurate fraud estimates challenging. However, our analysis shows that IRS has not developed business IDT fraud filters for at least 25 additional business-related tax forms. In 2018, these forms represented about $10.4 billion in refunds. As a result, IRS is not able to analyze data from these forms for emerging fraud patterns or schemes. Further, while current business IDT fraud filters cover the most commonly filed forms, IRS has not assessed which remaining forms or fraud scenarios pose the greatest risk to IRS and taxpayers. IRS also has not determined a risk tolerance for existing fraud filters, and whether the benefits of expanding existing filters outweigh the risks of flagging legitimate returns. Given the complexity of business tax forms and the evolving nature of fraud schemes, IRS’s existing fraud filters may not be sufficient to detect different business IDT scenarios. For example, IRS has implemented two fraud filters related to business tax credits, but they are each limited to a specific scenario. TIGTA has previously reported that tax credit forms have been found to be attractive to fraudsters. For example, in 2015, TIGTA reported that fraudsters have targeted individual tax credits when filing a fraudulent tax return to increase their refund. In September 2019, TIGTA reported that IRS lacked systematic controls to identify or prevent fraudulent use of an electric motor vehicle tax credit which is available to individuals and businesses. Without additional data on business IDT, IRS cannot estimate the full size and scope of this problem. As we have previously reported, IRS’s annual Identity Theft Taxonomy (Taxonomy) is a valuable tool to inventory, characterize, and analyze available individual IDT refund fraud data and to assess the performance of IRS’s individual IDT refund fraud defenses. Following each filing season, IRS estimates the volume of returns and associated dollar amounts on attempted and prevented individual IDT refund fraud, and on refunds it paid to fraudsters. While we recognize there may be differences in how IRS estimates the extent of individual versus business IDT, the Taxonomy is a useful framework to understand the data IRS needs to estimate the size and scope of business IDT. For example, the Taxonomy estimates the number of identified individual IDT refund fraud cases where IRS prevented or recovered the fraudulent refunds (e.g., returns caught by fraud filters or suspicious refunds returned by banks). In December 2018, IRS developed a draft plan for an initial business IDT taxonomy based on two business tax forms on which IRS has collected data since 2016. IRS officials stated that they intend to begin preliminary work on this effort in December 2019. However, these efforts will be limited until IRS collects additional data. IRS officials stated that they are committed to better understanding business IDT and expanding their fraud detection and data collection efforts. However, officials said that doing so depends on the availability of resources to develop and test new fraud filters prior to each filing season. IRS may address these constraints by, for example, determining which forms or fraud scenarios pose the greatest risk for business IDT based on a fraud risk assessment and profile. This would include determining a risk tolerance for business IDT on these forms and prioritizing new filters or filter enhancements based on its risk assessment. Having additional data to better estimate the size and scope of business IDT is critical in helping IRS understand how fraudsters are evading IRS defenses. Additionally, such data will help IRS identify unknown business IDT fraud risks, allocate limited resources, assess the suitability of its existing fraud control activities, and develop tools such as a business IDT taxonomy. Further information on the size and scope of business IDT could better position IRS to assess the risk of business IDT on tax administration and inform the Congress and the public about the risk. IRS has established procedures for resolving business IDT cases in its Internal Revenue Manual (IRM) and officials described general guidelines for resolving both pre-refund and post-refund business IDT cases. However, IRS does not resolve all cases within these guidelines due to various challenges IRS could potentially address, such as correspondence-based authentication; and challenges which are more difficult to address, such as the overall complexity of business IDT cases. In addition, we found that a lack of customer service-oriented performance goals for resolving cases may also contribute to delays. Key IRS documents highlight both a commitment to combating IDT refund fraud and improving customer service for taxpayers by, for example, reducing case resolution time frames through new technologies, among other things. In addition, Office of Management and Budget guidance highlights that federal program and project managers have an obligation to ensure that their programs deliver efficient and effective services to the public. This includes assessing how well a program is working to achieve intended results, and delivering customer service to align with the program’s goals. Our review of IRS documentation found that business units have developed procedures to manage and resolve business IDT cases identified during different stages of the tax return process. For example, during the pre-refund stage, RICS notifies business taxpayers via mail if their return shows signs of potential IDT refund fraud and has been held for review. Similarly, when a taxpayer notifies IRS about potential IDT refund fraud during the post-refund stage, Accounts Management (AM) may require the taxpayer to submit a form describing how and when the fraud occurred. IRS business units have also established procedures for conducting in-depth research on taxpayer accounts to determine if a case is business IDT or another type of fraud. However, RICS and AM have had some difficulty in resolving cases within their respective guidelines, as described below. Pre-refund cases. In regards to pre-refund business IDT, cases are generally to be resolved within 90 days, according to IRS’s IRM and agency officials. RICS officials stated that they aim to meet this guideline because it provides enough time to reach the correct taxpayer via mail and for the taxpayer to respond. However, RICS has been challenged in resolving cases within 90 days. Our analysis of pre-refund business IDT cases opened from mid-January 2017 through December 2018 shows that RICS did not meet this guideline for about 87 percent of cases, including open cases. RICS also took between 6 months to 2 years to resolve about 29 percent of cases (see fig. 4). Further, our analysis found that this delay was consistent across case outcomes. On average, RICS took 136 days to resolve cases of confirmed business IDT (7,248 cases) and 171 days to resolve cases determined not to be business IDT (58,279 cases). As of August 2019, IRS had not resolved 4,649 cases which had been open for an average of 383 days. RICS officials identified several reasons for the delay in resolving pre- refund cases, including ones rooted in business IDT policies and procedures. Specifically, officials stated that communicating with the taxpayer via correspondence is the primary driver of delays in resolving cases. RICS officials stated that mail-based authentication generally takes more time because letters can get lost, thrown away, or not reach the right person. RICS officials stated that in March 2018, they began making two attempts to correspond with a business with a potentially suspicious return before closing a case, rather than one attempt. RICS made this change because taxpayers were taking longer than 45 days to respond to the letter, often after RICS had closed the case as a nonresponse. Officials stated that while they are aware of IRS’s other methods of authenticating taxpayers for individual IDT refund fraud, such as by phone or in person, they have not explored similar options for the business IDT program. As we reported in June 2018, IRS uses a risk-based approach to determine the ways in which a taxpayer can authenticate his or her identity and what data are required during the authentication process. High risk interactions include those when a taxpayer accesses prior year tax information and other PII, while lower risk interactions include a taxpayer paying a bill online. According to IRS officials, as the risk level of taxpayer interactions increases, the authentication process becomes more rigorous. This approach minimizes risk to both the taxpayer and IRS. In addition, officials identified other challenges that contribute to delays, including incorrect information on the business taxpayer’s account, nonresponses to authentication requests, and the complexity of business IDT cases, which may be more difficult to address. RICS officials noted that taxpayers do not always update the business’s responsible party with IRS when they sell or transfer a business to someone else. This can make it more difficult for IRS to contact the taxpayer when their return has been selected for review. RICS officials stated that IRS reminds business taxpayers to check and update their information each year to avoid unnecessary delays in processing tax returns; however, IRS does not require taxpayers to make updates. IRS officials also stated that a business’s failure to respond to mail-based authentication requests contributes to case resolution delays. Finally, RICS officials noted that the inherent complexity of the business IDT environment may require RICS staff to research cases across multiple IRS business units or refer cases outside of RICS, which can contribute to delays. Post-refund cases. Our review of AM procedures and discussions with officials indicate that post-refund business IDT cases are generally to be resolved within 6 months. AM officials stated they established this guideline for individual IDT refund fraud cases and extended it to business IDT cases when the program started in 2016. We analyzed post-refund cases that AM opened from July 2016 (when IRS began collecting data) through December 2018. We found that AM resolved about 84 percent of post-refund cases within 6 months. However, about 17 percent of these cases—including open cases—took more than 6 months to resolve (see fig. 5). Similar to RICS officials, AM officials cited several reasons for case resolution delays, including the complexity of the business tax environment and the need to research associated businesses, employment, and individual tax returns. AM officials also noted challenges inherent to the case research process, including that staff often pursue multiple lines of inquiry to determine a case outcome. This may involve referring cases to other business units if, for example, AM staff do not have access to a specific IRS system to complete their research. Finally, AM officials stated that AM staff do not always recognize business IDT cases and may initially classify them as an individual IDT case, which results in delays. To help address this issue, AM officials stated that management periodically reviews business IDT operations, and provides refresher training in areas where staff did not follow procedures consistently. While RICS and AM officials have stated that they have general guidelines for resolving business IDT cases, they have not established customer service-oriented performance goals. We have previously found that a fundamental element in an organization’s efforts to manage for results is its ability to set meaningful goals for performance, including customer service standards, and to measure progress toward those goals. Standards that include customer service-oriented performance targets or goals allow agencies to define, among other things, the level, quality, and timeliness of the service they provide to their customers. In the context of IRS’s business IDT efforts, a customer service-oriented goal could be, for example, to resolve a certain percentage of cases within a specific timeframe. This is particularly important for IRS because one of its strategic goals is to empower customers to meet their tax obligations by providing exceptional customer service. Identifying and implementing methods to address challenges that IRS can control—such as reliance on correspondence-based authentication— could help IRS improve its timeliness in resolving business IDT cases and address its overall strategic objective to reduce case resolution time frames. It is also consistent with OMB guidance to deliver efficient and effective services to the public. Further, establishing customer service- oriented performance goals could help IRS measure progress, identify opportunities for improvement, and communicate reasonable time frames for resolving cases to taxpayers. Case resolution performance goals may also help reduce costs to the Treasury. Specifically, IRS has a legal obligation to pay interest on refunds issued after 45 days from the due date of the tax return. This requirement includes incoming tax returns that IRS holds for review for potential business IDT but then later releases for processing. Specific and relevant performance goals for both pre-refund and post-refund cases may help IRS balance its efforts to protect revenue against the burden on legitimate taxpayers and additional costs to the Treasury. IRS has recognized business IDT as a growing threat to both taxpayers and tax administration. The complexity of the business tax environment— including different business types and taxes that businesses must pay— makes detecting, researching, and resolving potential business IDT cases more challenging for IRS compared with individual IDT cases. IRS has taken important steps to prevent business IDT, including using fraud filters to screen incoming business returns on selected forms and collaborating with state and industry partners to identify and respond to potentially suspicious activity. IRS leadership has demonstrated an overall commitment to identifying and combating IDT refund fraud. However, IRS has not designated a lead entity to design and oversee business IDT fraud risk management activities consistent with leading practices. A lead entity could also help IRS ensure its business IDT activities are better coordinated to combat the evolving threat of business IDT. Further, while IRS has taken some steps to understand business IDT fraud risks, it has not developed a fraud risk profile based on an assessment of inherent risks, the likelihood and impact of risks, IRS’s risk tolerance, and an evaluation of existing fraud controls. Assessing inherent fraud risks, such as those that we highlighted—correspondence-based authentication, vulnerability of EINs, and a high false detection rate for IDT fraud filters—would help IRS to establish a fraud risk tolerance and form the basis for an antifraud strategy. IRS has made progress in detecting and preventing business IDT by implementing fraud filters and collecting data on six business-related tax forms. However, without a risk profile, IRS does not have assurance that its existing filters mitigate inherent risks. For example, risks may also be associated with at least 25 other tax forms, and IRS has not determined which forms or fraud scenarios pose the greatest risk to IRS and taxpayers based on an analysis of risk. Collecting additional data by implementing new fraud filters would better position IRS to estimate the full size and scope of business IDT. IRS’s planning documents articulate a commitment to reducing case resolution time frames and improving customer service, but RICS and AM have been delayed in resolving business IDT cases due to various challenges. Identifying and implementing ways to address the challenges IRS can control, such as its methods for taxpayer authentication, and establishing customer service-oriented case resolution performance goals could help IRS better serve taxpayers and minimize additional costs to the Treasury. We are making the following six recommendations to IRS: The Commissioner of Internal Revenue should designate a dedicated entity to provide oversight of agency-wide efforts to detect, prevent, and resolve business IDT, consistent with leading practices. This may involve designating one business unit as a lead entity or leveraging cooperative relationships between business units to establish a business IDT leadership team. This entity should have defined responsibilities and authority for managing fraud risk. (Recommendation 1) The Commissioner of Internal Revenue should develop a fraud risk profile for business IDT that aligns with leading practices. This should include (1) identifying inherent fraud risks of business IDT, (2) assessing the likelihood and impact of inherent fraud risks, (3) determining fraud risk tolerance, and (4) examining the suitability of existing fraud controls. (Recommendation 2) The Commissioner of Internal Revenue should develop, document, and implement a strategy for addressing fraud risks that will be identified in its fraud risk profile. (Recommendation 3) The Commissioner of Internal Revenue should ensure that IRS collects additional data on business IDT by identifying and implementing new fraud filters consistent with its fraud risk profile. This should include prioritizing IDT filters for tax forms determined to be most at risk based on an analysis of risk tolerances. (Recommendation 4) The Commissioner of Internal Revenue should identify and implement methods to address delays in resolving business IDT cases due to correspondence-based authentication. This could involve using different methods for taxpayer authentication based on the risk level of the return. (Recommendation 5) The Commissioner of Internal Revenue should establish customer service-oriented performance goals for resolving business IDT cases. (Recommendation 6) We provided a draft of this report to IRS for review and comment. In written comments, which are summarized below and reproduced in appendix II, IRS’s Deputy Commissioner for Services and Enforcement agreed with five of our six recommendations and neither agreed nor disagreed with one of our recommendations. IRS agreed with our four recommendations to better identify, assess, and manage business IDT fraud risks consistent with leading practices in our Fraud Risk Framework. IRS agreed to designate a dedicated entity to provide oversight of agency-wide business IDT efforts and stated that it will determine the appropriate oversight structure and scope of authority. IRS also agreed with our recommendations to, consistent with leading practices, develop a business IDT fraud risk profile; develop, document, and implement a strategy for addressing fraud risks; and implement and prioritize new fraud filters consistent with its fraud risk profile. IRS did not provide details on the actions it plans to take to address these recommendations. In its written comments, IRS stated that formally implementing leading practices in the Fraud Risk Framework may be helpful, but noted that it has consistently completed business IDT fraud risk assessments and developed risk profiles. However, during our review, IRS did not provide evidence that it had taken such actions. Figure 3 in our report outlines leading practices for performing a fraud risk assessment and developing a risk profile. For example, regarding the leading practice to identify and assess inherent fraud risks, IRS stated that it has found that the risks associated with in-person or telephone authentication are higher for business IDT than correspondence-based authentication. However, we could not verify this assertion, as IRS did not provide evidence during our audit that it had assessed the risks of different authentication options for business taxpayers. Further, IRS stated that our report does not acknowledge that multiple individuals may be authorized to act on behalf of a business, including authenticating a potentially suspicious tax return. We have added this information to our report. IRS also stated that our report implies that it would be acceptable for a percentage of potentially fraudulent returns to be filed, unchecked, solely to reduce false detections or business costs. However, as we indicate in our report, fraud risk tolerance does not mean IRS management tolerates fraud, or that it needs to eliminate controls to detect and prevent fraud. Rather, it means that IRS management accepts a certain amount of risk, based on its assessment of the likelihood and impact of the fraud. Determining a fraud risk tolerance would help IRS management establish appropriate and cost-effective controls that are commensurate with the fraud risk. Relatedly, we agree with IRS’s statement that IDT victims suffer significant financial, social, and emotional hardships. We have updated the report’s introduction to acknowledge these hardships. In addition, IRS stated that its work on business IDT filters is more robust than stated in our report. Our report recognizes various IRS efforts to improve business IDT fraud detection and prevention, including efforts to refine its fraud filters. However, having fraud filters does not preclude IRS from identifying and assessing other potential fraud risks. Further, IRS cannot accurately determine the suitability of its business IDT filters—or other controls—without first identifying inherent fraud risks, assessing the likelihood and impact of those risks, and determining a fraud risk tolerance. Additionally, IRS did not provide evidence that it has examined the suitability of other antifraud controls, including controls to prevent fraudsters from obtaining new EINs using stolen information. IRS neither agreed nor disagreed with our recommendation to establish customer service-oriented performance goals for resolving business IDT cases. However, IRS stated that it will review its customer service- oriented performance goals and modify them, as warranted, to address the resolution of business IDT cases. Doing so would meet the intent of our recommendation. In its written comments, IRS stated that our report does not fully address obstacles that prevent timely case resolution. We have revised our discussion of pre-refund cases to more clearly identify nonresponses from taxpayers as a cause for delays. IRS also said our methodology for determining the time to close business IDT cases does not adequately consider the impact of nonresponses on the agency’s ability to close cases in a timely manner. We have added a note to figure 4 to acknowledge the challenge of nonresponses. However, IRS did not provide evidence during the audit that it collects data on how long a case is suspended while it waits for the taxpayer to respond—information that would provide insight into the challenges associated with resolving business IDT cases in a timely manner. As agreed with your offices, we plan no further distribution of this report until 30 days from the report date. At that time, we will send copies to the Chairmen and Ranking Members of other Senate and House committees and subcommittees that have appropriation, authorization, and oversight responsibilities for IRS. We will also send copies of the report to the Commissioner of Internal Revenue and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff members who made major contributions to this report are listed in appendix III. Our objectives were to (1) describe the Internal Revenue Service’s (IRS) efforts to detect business identity theft refund fraud (business IDT), (2) evaluate the extent to which IRS’s efforts to prevent business IDT are consistent with selected fraud risk management leading practices, and (3) assess IRS’s efforts to resolve business IDT cases. In this report, business IDT refers to the fraudulent use of both business and employment tax forms. Both of these types of forms require an Employer Identification Number (EIN) when filing with IRS, and a fraudster can file these forms to obtain a refund. To address all of our objectives, we reviewed our prior reports on individual identity theft refund fraud and the Treasury Inspector General for Tax Administration’s (TIGTA) prior reports on business IDT. We also interviewed IRS officials from business units responsible for detecting, preventing, and resolving business IDT cases, specifically from Return Integrity and Compliance Services (RICS), Accounts Management (AM), and Criminal Investigation (CI). In December 2018, we visited IRS’s campus in Ogden, Utah, to interview officials responsible for IRS’s business IDT efforts and to observe how RICS and AM staff process and research business IDT cases using IRS information technology systems and tools. To describe IRS’s current processes to detect business IDT refund fraud, we reviewed documentation describing the business IDT fraud filters IRS implemented from 2017 through 2019, including the logic for each filter and the forms to which they apply. In addition, we analyzed data from IRS’s Dependent Database (DDb) on business IDT fraud filter results for applicable incoming business and employment tax returns IRS received from mid-January 2017 through mid-August 2019. This was the most recent, complete, and available set of data at the time of our review. This analysis showed the volume of returns selected by IRS’s business IDT fraud filters by form, tax processing year, and associated refund amount. We also analyzed data from IRS’s Business Master File Identity Check (BMFIC) system—RICS’s case management system for business IDT returns flagged by DDb—for cases opened from mid-January 2017 through mid-August 2019. These were the most complete set of data available at the time of our review. Our analysis of BMFIC data showed the number of returns that RICS researched as potential business IDT, the outcome of the case, and associated refund amounts. For the purpose of analysis and reporting, we grouped business IDT case outcomes into three categories: confirmed business IDT, not business IDT, and open/unresolved. We assessed the reliability of data from these systems by: (1) testing key data elements, including checks for missing, out-of-range, or logically inaccurate data; (2) reviewing documents for information about the data and IRS’s systems; and (3) interviewing officials knowledgeable about the data to discuss any limitations. We determined that these data were sufficiently reliable to describe the volume of incoming returns stopped by business IDT fraud filters, associated refunds, and the outcome of business IDT cases. To understand IRS’s efforts to collaborate with external partners to detect and prevent business IDT, we interviewed IRS and state officials from the Security Summit’s Business IDT sub-workgroup and reviewed IRS’s 2018 report which analyzed business-related data elements from incoming tax returns. We also interviewed IRS officials about a pilot program with the Alabama Department of Labor to help detect and deactivate potentially suspicious EINs established in that state. For context, we obtained information from January to December 2018 from IRS on the performance of this pilot, including the number of EINs identified as fraudulent. To evaluate the extent to which IRS’s efforts to prevent business IDT are consistent with selected fraud risk management leading practices, we reviewed the Fraud Reduction and Data Analytics Act (FRDAA) of 2015 and leading practices outlined in A Framework for Managing Fraud Risks in Federal Programs (Fraud Risk Framework). We generally focused our review on the first two components of the Fraud Risk Framework: (1) commit to combating fraud by creating an organizational culture and structure conducive to fraud risk management, and (2) plan regular fraud risk assessments and assess risks to determine a fraud risk profile. We reviewed agency documents and information obtained from interviews, as described below, and compared them against leading practices identified in the Fraud Risk Framework related to these two components. We reviewed IRS’s most recent strategic planning documents related to reducing fraud, IRS organizational charts, and relevant Internal Revenue Manual (IRM) sections on business IDT operations and procedures. We interviewed officials from RICS, AM, CI, and the Office of Research, Applied Analytics, and Statistics (RAAS) to understand each business unit’s respective role in detecting, preventing, and resolving business IDT cases and the extent to which business units work together on day-to-day and longer-term efforts. In addition, we reviewed IRS reports on business IDT case workload. We also reviewed meeting notes from IRS’s IDT Executive Steering Committee (July and October 2017, and January and October 2018) to understand the extent to which IRS’s executive-level groups are, for example, involved in helping guide business IDT efforts or made aware of business IDT challenges. We interviewed officials from RICS, AM, CI, and RAAS and reviewed documentation on IRS’s efforts to identify and assess business IDT fraud risks. These included reviewing RAAS’s analyses on business IDT fraud filter performance, descriptions of potential new fraud filters that IRS may implement in the future, and the Wage and Investment Division’s risk register. We also interviewed officials from IRS’s Office of the Chief Risk Officer to understand IRS’s efforts to compile and report on enterprise-wide fraud risks and agency efforts to develop an antifraud culture. Further, we reviewed documentation related to three inherent fraud risks to business IDT that we identified in the course of our work: correspondence-based authentication, EIN vulnerabilities, and high false-detection rates for IDT fraud filters. This included reviewing prior GAO, TIGTA, and National Taxpayer Advocate reports and the status of open recommendations, and relevant IRM sections. We reviewed the methodologies of these reports and found them reasonable for the purpose of describing the inherent risks related to business IDT. In addition, we identified a false detection rate for business IDT fraud filters based on BMFIC cases opened from mid-January 2017 through December 2018. To do so, we compared the number of cases IRS determined were not business IDT, relative to the total number of cases. We did not include BMFIC cases from 2019 because at the time of our analysis, about 27 percent of those cases were unresolved. We also assessed the extent to which IRS is positioned to estimate the size and scope of business IDT. To do so, we reviewed documents and information on IRS’s efforts to collect quality data on incoming business and employment returns. We compared these efforts to leading practices associated with the first two components of the Fraud Risk Framework and Standards for Internal Control in the Federal Government related to using quality information. Specifically, we determined what proportion of incoming business and employment tax forms filed in 2018 would have been screened by business IDT fraud filters, by tax form type. We also reviewed a preliminary plan and interviewed RAAS and RICS officials on their efforts to develop a business IDT taxonomy. To assess IRS’s efforts to resolve business IDT cases, we reviewed IRS procedures for managing, researching, and resolving pre-refund and post-refund business IDT cases. We interviewed officials from RICS and AM to understand the rationale behind their respective current case resolution time frames, and potential reasons for case resolution delays. We compared RICS and AM’s efforts to resolve business IDT cases against Office of Management and Budget guidance on program management and providing customer service. To determine RICS’s performance in resolving business IDT cases identified during the pre- refund phase, we analyzed 181,032 cases from BMFIC, described above. Specifically, we calculated the duration between when RICS opened the case in BMFIC to when the case was closed. In addition, we determined how many cases in RICS’s inventory were open at the time of our analysis in August 2019. For these open cases, we manually added the date we received the data as the date the case was closed. This was an indicator of the minimum amount of time RICS could have taken to close these cases. For this analysis, we did not include cases opened and closed in 2019 because we wanted to ensure there was sufficient time for RICS to research and close a case. We determined that cases opened by the end of December 2018 gave both RICS and AM (discussed below) enough time to resolve a case. In addition, we identified an anomaly in RICS’s 2019 cases. IRS officials stated that a new fraud filter inaccurately flagged incoming returns on one form, and IRS released these returns. Our analysis of RICS’s data showed that these returns accounted for about 65 percent of closed cases in 2019, and that they were resolved in an unusually short time frame (fewer than 45 days) thus skewing the overall data. We also did not include 1,679 cases that were opened and closed in zero or fewer days. To determine AM’s performance in resolving business IDT cases identified during the post-refund phase, we analyzed 1,997 relevant business IDT cases from IRS’s Correspondence Imaging System (CIS) that AM opened from July 2016 through December 2018. As discussed earlier, we did not include cases opened and closed in 2019 to allow AM enough time to research and resolve a case. We calculated the duration between when AM opened the case in CIS to when the case was closed. We also determined how many cases in AM’s inventory were open at the time of our analysis. For these open cases, we manually added the date we received the data as the date the case was closed. This was an indicator of the minimum amount of time AM could have taken to close these cases. We assessed the reliability of the CIS data by reviewing relevant documents, testing key data elements, and interviewing knowledgeable IRS officials. We determined that the data from CIS was sufficiently reliable to determine how long it took AM to resolve post- refund business IDT cases during this time period. We conducted this performance audit from July 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Shannon Finnegan (Assistant Director), Heather A. Collins (Analyst-in-Charge), Ann Czapiewski, Michele Fejfar, Robert Gebhart, Tonita Gillich, Bethany Graham, James Andrew Howard, Krista Loose, Jungjin Park, Bryan Sakakeeny, and Rebecca Shea made significant contributions to this report.", "summary": "Business IDT is an evolving threat to both taxpayers and IRS and if not addressed can result in large financial losses to the government. The risk of business IDT has increased due to the availability of personally identifiable information and general ease of obtaining business-related information online. This makes it more difficult for IRS to distinguish legitimate taxpayers from fraudsters. GAO was asked to review IRS's efforts to combat business IDT. This report (1) describes IRS's current efforts to detect business IDT, (2) evaluates IRS's efforts to prevent business IDT against selected fraud risk management leading practices, and (3) assesses IRS's efforts to resolve business IDT cases. GAO reviewed IRS documents and business IDT fraud detection data, evaluated IRS's efforts to combat business IDT against two components of GAO's Fraud Risk Framework , analyzed case resolution data, and interviewed IRS officials. The Internal Revenue Service (IRS) has efforts in place to detect business identity theft refund fraud (business IDT), which occurs when thieves create, use, or try to use a business's identifying information to claim a refund. IRS uses computerized checks, or fraud filters, to screen incoming returns. From January 2017 to August 2019, IRS researched about 182,700 returns stopped by business IDT fraud filters. IRS determined that about 77 percent of returns (claiming $38.3 billion) were not business IDT and about 4 percent of returns (claiming $384 million) were confirmed business IDT. As of August 2019, IRS was reviewing the remaining returns. The Fraud Reduction and Data Analytics Act of 2015 created requirements for agencies to establish financial and administrative controls for managing fraud risks. These requirements are aligned with leading practices outlined in GAO's A Framework for Managing Fraud Risks in Federal Programs ( Fraud Risk Framework) . IRS has taken steps to understand fraud risks associated with business IDT but has not aligned its efforts with selected components within the Fraud Risk Framework . First, IRS leadership has demonstrated a commitment to identifying and combating overall identity theft refund fraud, but has not designated a dedicated entity to design and oversee business IDT fraud risk management efforts agency-wide. This is because the program is relatively new. Without designating an entity to help guide agency-wide business IDT fraud risk efforts, it is not clear which entity would be responsible for assessing business IDT risks and documenting the results. Second, IRS has not conducted a fraud risk assessment or developed a fraud risk profile for business IDT consistent with the Fraud Risk Framework's leading practices. Doing so would help IRS determine the likelihood and impact of risks, the level of risk IRS is willing to tolerate, and the suitability, costs, and benefits of existing fraud risk controls. IRS officials stated that they have not formally performed a fraud risk assessment or developed a risk profile because they have directed their resources toward identifying and addressing business IDT that is occurring right now and improving fraud detection efforts. Documenting a risk profile would also help IRS determine whether additional fraud controls are needed and whether to make adjustments to existing controls. Third, IRS has not assessed which business-related tax forms or fraud scenarios pose the greatest risk to IRS and taxpayers. Current business IDT fraud filters cover the most commonly filed tax forms; however, IRS has not developed fraud filters for at least 25 additional business-related forms that may be susceptible to business IDT. Without additional data on business IDT, IRS cannot estimate the full size and scope of this problem. IRS has procedures for resolving business IDT cases and has described general guidelines for resolving business IDT cases, but it does not resolve all cases within these guidelines. Further, IRS has not established customer service-oriented performance goals for resolving business IDT cases, which is inconsistent with federal guidance. Establishing performance goals may help IRS better serve taxpayers and minimize additional costs to the Treasury. GAO is making six recommendations, including that IRS designate a dedicated entity to manage its business IDT efforts, develop a fraud risk profile consistent with leading practices, implement additional fraud filters consistent with the profile, and establish customer service-oriented performance goals for resolving business IDT cases. IRS agreed with five recommendations. IRS neither agreed nor disagreed with our recommendation to establish customer service-oriented performance goals, but stated it would take actions consistent with the recommendation.", "document_type": "gao"}
{"report": "Mass transit rail operators have primary responsibility for securing their own systems. Unlike the aviation environment, where TSA has operational responsibility for screening passengers and baggage for prohibited items prior to boarding a commercial aircraft, TSA has no operational role for securing mass transit, such as employing screeners or purchasing and acquiring security equipment. Rather, TSA regularly partners with mass transit operators to address their security needs by conducting vulnerability assessments, sharing intelligence information and best practices, and working to mitigate security risks to their systems by assessing commercially available security technologies, among other measures. Mass transit operators which can be public or private entities, administer and manage all transit activities and services, including acquiring and operating any technologies designed to augment their existing security infrastructure. Securing transit systems presents inherent challenges for mass transit operators for numerous reasons. In general, mass transit systems are designed to expedite the movement of large numbers of people through multiple stations, situated along extended routes, and technologies used in the mass transit environment should not disrupt the efficiency of these operations. In addition, individual stations within these systems frequently include multiple points of entrance and exit that vary in the extent to which they may be accessed by passengers. For example, open systems include walk-up platforms with little to no barrier to entry, while other, more closed systems, typically include dedicated points of entry and exit that allow or prohibit entry access through various mechanisms. Given the size and complexity of these systems, it can be difficult for operator personnel to comprehensively monitor them for security threats. Finally, the large number of riders that pass through these systems during peak hours generally makes the sustained use of some security measures and technologies (e.g., metal detectors) difficult because such measures could result in long lines that would disrupt scheduled service. Though mass transit systems are difficult to secure, mass transit operators commonly employ a number of standard security measures for the transit environment, including: public awareness announcements and signage (e.g., reminders to report unattended baggage or suspicious activities to operator personnel immediately); use of canine teams; access controls, such as the use of lasers for intrusion detection; station design (e.g., designing transit stations to limit recess areas where bombs could be hidden, such as under a bench or a ticket machine); and video surveillance, which includes video cameras that transmit a signal to a set of television monitors to display real-time footage of transit system platforms, entrances, exits, etc. (see figure 1). Federal requirements for mass transit R&D efforts guide department and agency efforts. Specifically, the Implementing Recommendations of the 9/11 Commission Act of 2007 requires that S&T, in consultation with TSA and the Federal Transit Administration, carry out an R&D program to improve the security of public transportation systems. Additionally, Executive Order 13416, Strengthening Surface Transportation Security, requires the Secretary of Homeland Security to coordinate research, development, testing, and evaluation of technologies related to the protection of surface transportation, including commercial off-the-shelf products. To implement these requirements and other related activities to help secure mass transit systems, DHS, S&T, and TSA, in coordination with mass transit operators, have assumed the following roles and responsibilities: DHS. DHS carries out its requirement to coordinate department-wide R&D (including that for mass transit and other surface transportation modes) through its Integrated Product Team (IPT) process. The IPTs themselves are comprised of officials across DHS components, and are tasked with identifying DHS technology capability gaps, which are defined as differences between a department or agency’s current capabilities and those capabilities needed to perform its mission. Each IPT is responsible for identifying capability gaps related to a broad security area (such as preventing terrorism) and potential R&D efforts to address those gaps. Capability gaps relevant to surface transportation, including mass transit, fall under the Prevent Terrorism IPT and its Explosive Screening sub-IPT. S&T’s Research Council receives IPT information on security gaps and is responsible for prioritizing them across all IPTs. The results are used to inform which R&D research projects S&T and DHS components will undertake (see figure 2). S&T. Once capability gaps are agreed upon and prioritized by DHS components through the IPT process, S&T undertakes R&D projects intended to address the highest prioritized capability gaps. S&T can undertake R&D projects on behalf of any of the department’s components, including TSA, and will either initiate development of a new technology solution or coordinate or adapt existing technologies to meet the project’s needs. Once S&T’s R&D efforts result in a preliminary technology, or prototype, S&T will begin the testing process. S&T’s technology development process includes developmental and operational testing phases that are carried out by staff at laboratories S&T contracts with. Developmental testing is typically conducted in simulated environments, such as laboratories, test facilities, or engineering centers, which can sometimes be representative of the complex operational environment (i.e., an actual subway station). Operational testing includes field tests performed under realistic conditions by actual users (i.e., the transit operators testing in a subway or rail station) and overseen by S&T in order to determine the effectiveness and suitability of a prototype technology. Once testing is complete, S&T contracts with staff at partner laboratories and works with private sector industry partners on further developing the product for the commercial market, where it can be purchased by mass transit operators to help secure their systems. TSA. While TSA does not conduct R&D for mass transit security, it does sponsor testing of commercially available security technologies for the mass transit environment. This testing can take place in both laboratory environments and in operational, real-world environments. Regarding the latter, TSA uses its Surface Transportation Operational Test Bed Program (Operational Test Bed Program) to place commercially available security technologies in surface transportation environments, such as mass transit systems, for performance testing and evaluation. TSA established the program to assess the effectiveness of emerging and existing security technologies in real-world environments; verify prior laboratory testing performance results versus performance in a TSA mass transit system (or other surface transportation mode serving as a test bed); and develop recommendations for use of certain technologies in surface transportation. As part of the program, TSA establishes memorandums of agreement with surface transportation entities that participate in the program and also provides them with logistical support, such as installing technology and providing personnel to help operators with technology training and operating needs. As of 2019, there are nine mass transit operators participating as test beds in the program (test beds), and TSA officials reported working to add two more mass transit agencies as test beds. In addition, there are five other surface transportation test beds, including two pipeline and two freight rail test beds. Mass Transit Operators. Mass transit operators generally do not have dedicated portions of their budgets for, and therefore do not conduct, R&D. However, selected operators work with TSA to test commercially developed technology solutions intended to enhance their system security. In general, mass transit operators must assume security-related expenses for their systems, including the purchase or acquisition of surface security technologies. In 2010, S&T’s Explosives Division began work on the Surface Transportation Explosive Threat Detection (STETD) program to address the threat of improvised explosive devices (IED) on persons or in objects within a mass transit station. S&T officials stated that, as of fiscal year 2019, the STETD program remains S&T’s sole R&D program related to surface transportation. In addition, it is the only DHS technology development program focused on developing products to address the threat of IEDs in a mass transit security environment. The STETD program consists of four separate technologies designed to address explosive threats within a mass transit station, each of which is in a different stage of development and maturation. Specifically, the four technologies are known as Forensic Video Exploitation and Analysis (FOVEA), Standoff Detection, Real-Time Threat Detection Agent, and Layered Architecture. The technologies are designed to address unique aspects of the mass transit environment (i.e., multiple access points, lack of access barriers, etc.) while also working together to provide IED detection coverage from the point at which the passenger enters a mass transit station, boards a train, and then finally exits the system. These technologies would allow mass transit operators to scan large unstructured crowds to detect concealed explosives worn or carried on a person (person-borne IED), or placed in stationary objects such as baggage, or intentionally deposited in an unnoticed location for detonation by a timer or remote control (leave-behind IED). S&T intends for STETD technologies to perform without requiring checkpoint baggage screening or other measures that could impede the traveling public moving through mass transit systems during periods of high passenger volume (e.g., rush hour). FOVEA is a software suite designed to interface with video management systems already installed in mass transit systems, and is intended to help operators use recently recorded camera footage to quickly determine a person’s movement through the system. S&T began developing the technology in fiscal year 2013, and it is generally directed at helping operators identify responsible parties when objects are left behind in a mass transit system. Specifically, FOVEA includes a number of tools to enable its video analysis (see figure 3). As of December 2018, the FOVEA video suite has been installed in the Washington Metropolitan Area Transit Authority’s Security Operations Control Center. During our site visit to the control center to view the use of the FOVEA suite, officials told us that FOVEA has enhanced the ability of personnel to analyze video footage for active law enforcement investigations. Officials also told us that because of this functionality, FOVEA is a valuable tool. S&T anticipates it will transition the technology to commercial development in fiscal year 2020. S&T is developing a set of imaging sensors designed to scan unstructured crowds to detect hidden potential threat items (e.g., a person-borne IED) on travelers without requiring passengers to open bags or remove outerwear. According to S&T, the sensor technology would be placed in walls, near platforms, or other structures. These screening devices are designed to unobtrusively scan for detailed information on possible person-borne threat objects, such as wires connected to a pressure cooker, and provide alerts to operators via the Real-Time Threat Detection Agent (described below). Development of these sensors began in fiscal year 2014, and since 2017, S&T officials have been using the Massachusetts Bay Transportation Authority training facility to test prototypes of the technology. S&T expects to transition the technology to commercial development in fiscal year 2023. The Real-Time Threat Detection Agent technology is intended to automatically detect abandoned objects that could be potential threats, and notify transit operators of their existence. Specifically, the system is to analyze live video footage to identify, tag (i.e., mark on the video footage), and track left-behind objects (i.e., baggage possibly containing IEDs), as well as individuals associated with the object, without the need for continuous human monitoring of video footage. To track potential IEDs without human monitoring, the system is intended to have the capability to identify abandoned objects that could be potential threats and compare them against defined criteria for person-borne, as well as leave-behind, IED threats. Based on its analysis, the system would then create alerts and send them to operators, as well as to video review software, such as FOVEA. Development of this system began in fiscal year 2013, and S&T began developmental testing of the technology at Washington Metropolitan Area Transit Authority facilities in October 2018. S&T expects to transition the equipment to commercial development in fiscal year 2021. Layered architecture, the final component of the STETD program, is intended to have the capability to integrate information from the various existing security technologies utilized by a mass transit system to enable more accurate threat identification. The goal of this component is to gather input from multiple pieces of technology, such as distributed sensors and tools used across a mass transit environment (to include existing sensors and other STETD technologies), to present a consolidated threat profile to operators in a command center. This technological component is the least developed of the STETD program technologies, with ongoing work focused on experimentation with different prototypes. S&T expects to transition the technology to commercial development in fiscal year 2023. Since 2013, S&T’s funding for mass transit R&D has decreased, delaying the development of associated technologies. Specifically, during fiscal years 2013 through 2017 funding for the STETD program—the only DHS R&D program focused solely on mass transit security—decreased by 78 percent, but then increased again in fiscal year 2018 (see figure 4). According to S&T officials, one reason funding was reduced during this period was to direct additional funds to R&D for a newly-identified threat. Specifically, in fiscal years 2015 and 2016, following the landing of a gyrocopter on the U.S. Capitol grounds and other incidents, unmanned aerial systems became a significant and emerging threat, and a top DHS priority. At the time, S&T had no funding allocated for a related R&D effort, so S&T leadership subsequently redirected funding from the STETD program toward R&D on unmanned aerial systems. S&T officials told us that, due to fluctuations in funding, in addition to other factors, the program’s completion date has shifted from 2017 to 2023, which has delayed efforts to make the technologies commercially available to mass transit operators. Although S&T began increasing funds for the STETD effort in 2018, according to program officials, decreases in program funding have delayed program deliverables and pushed timelines out. For example, according to S&T officials, lower levels of program funding have made it difficult to employ highly-skilled contract staff at the laboratories S&T partners with to carry out STETD R&D, which has slowed the pace of development. S&T officials also stated that a lack of funding and changes in funding slow down what is already a technically challenging development effort. As S&T officials explained, the STETD program is pushing the performance boundaries and capabilities of existing technologies, and in some cases, inventing entirely new technologies for screening highly trafficked environments. S&T is not using milestones that fully adhere to DHS guidance for milestone descriptions to track its progress on developing STETD technologies. Specifically, DHS budget development guidance directs DHS components to develop program milestones that are specific, measurable, results-oriented and relevant, and time-bound. To be results-oriented and relevant, milestones must clearly link to activities in program strategy, budget, or other planning documents. Linking milestones to such activities allows parties reviewing the milestones, such as DHS leadership and Congress, to understand how achieving the milestones move the development process forward overall. We assessed all 22 STETD milestones that S&T has used to report progress on the program from fiscal years 2013 through fiscal year 2018. We found that 17 of the 22 milestones were not results-oriented as required by DHS guidance because they did not clearly link to any key activities described by STETD program documents. Specifically, one STETD program document identified several key activities for completing work on the technologies, including a requirements development phase, developmental testing, and operational testing, but STETD milestones did not clearly link to these activities. For example, One fiscal year 2018 STETD milestone for the layered architecture technology was to conduct a simulation and analysis of layered sensing configurations to optimize sensor placement and system performance, to be completed by the end of fiscal year 2018. While this milestone was specific, measurable, and time-bound, it did not clearly link to a key activity (e.g., developmental or operational testing) identified in the STETD program’s plan, and thus was not results- oriented. Another milestone from 2013 was to demonstrate advanced leave- behind detection software in a mass transit system. The milestone was to be met by the second quarter of fiscal year 2014, and remained unmet as of March 2019. Because the milestone was not results-oriented (i.e., it did not link back to activities in program documents), it was unclear how failing to achieve the milestone impacted, or potentially delayed, the overall technology development process. S&T officials explained because they are dealing with technology innovation and invention, they plan to develop milestones that closely align to program plans after they develop a potential technology solution that is ready for developmental or operational testing. However, according to STETD program plans, it can take several years for STETD technologies to begin developmental testing. For example, one STETD technology (layered architecture) is not expected to begin developmental testing until the fiscal year 2021-2022 time frame. Therefore, under S&T’s current practice, the program would not begin using results-oriented milestones, clearly linked to program plans, for this STETD technology until more than ten years after work on the program was initiated. Furthermore, we found that for one STETD technology (FOVEA), the program did not consistently use results-oriented milestones after the technology began developmental testing. Specifically, in fiscal year 2015 S&T began developmental testing for FOVEA, but, two of three FOVEA milestones reported in fiscal years 2017 and 2018 were not results- oriented. Without milestones for the STETD program that reflect DHS guidance to clearly link the milestone to key events in program planning documents, Congress and DHS decision makers cannot fully assess whether the STETD program is meeting its goals within identified time frames. Additionally, DHS decision makers are not positioned to identify adjustments that may be needed to facilitate the achievement of program goals. We previously recommended in March 2019 that S&T take steps to more fully incorporate DHS’s budget development guidance, to include more results-oriented milestones, for its R&D programs. DHS concurred with this broader recommendation, and as of June 2019, is taking initial steps to ensure its implementation. TSA sponsors tests of commercial products at contracted partner laboratories, as well as at mass transit stations and other surface transportation venues through its Operational Test Bed Program. The purpose of these tests is to inform surface transportation operators about different technological products that could address their security needs and to confirm whether the products will operate effectively. As part of the testing process, TSA officials assist in product installation, hold technical demonstrations, and provide training for mass transit officials. Once product testing concludes, TSA officials document test results in written assessments, which they make available to mass transit and other surface transportation stakeholders to review upon request. TSA officials told us they use a number of methods to identify products that are currently available in the commercial marketplace and could be tested. Officials stated they conduct market research on vendors currently making technology products that could potentially meet the needs of mass transit operators, such as portable screening devices used to detect potential person-borne IEDs. To do so, officials maintain and utilize an existing list of vendors, conduct market research on their products, attend relevant symposiums and university conferences on technological advancements, and solicit information on these products and their capabilities from both vendors and operators who have used them. TSA officials also work with national laboratories to assist with relevant research on specific technological products and their capabilities that could be good candidates for testing. To determine which technology products to test, TSA prioritizes technologies that can be used in the mass transit environment. TSA officials told us that because of the level of risk facing mass transit systems, they generally try to ensure that the commercial products that are tested address capability gaps relevant to the mass transit environment. In addition, TSA officials stated that while they try to address all identified surface transportation capability gaps, due to limited resources, they tend to select, on an annual basis, products for testing related to the following gaps: anomaly and explosive detection, high throughput threat detection, intrusion detection, infrastructure protection, and chemical and biological threat security, all of which have applicability to the mass transit environment. Moreover, TSA officials told us that anomaly and explosive detection and high throughput threat detection are the technology gaps that are critical to securing mass transit systems. TSA officials also identify other criteria used for testing, including performance requirements and vendor claims about their products’ ability to address specific capability gaps. Regarding performance requirements, TSA officials told us any products selected for testing must meet a set of minimum performance requirements in order to be considered appropriate for addressing the unique security needs for different surface transportation modalities. For example, for an explosive screening product used in mass transit, TSA officials established requirements for probability of detection and probability of false alarm. TSA officials stated they work with mass transit operators and others to identify these requirements to ensure that IED detection technologies can effectively identify threats without disrupting mass transit operations. Lastly, TSA officials said they also try to select technologies that can be used to secure multiple surface transportation modes. For example, officials said they may select an intrusion detection sensor for testing that could be adapted for securing pipelines or freight rail yards. From fiscal years 2013 through 2018, TSA sponsored laboratory and field tests of approximately 110 commercial products that are designed to address identified surface transportation capability gaps (such as intrusion detection and explosive detection). These tests take place in either of two environments—laboratory or field (i.e., within a mass transit venue)—and are designed to address surface transportation security capability gaps. Since 2013, 67 percent of the technology products (72 products) assessed by TSA focused on detection-related gaps, most of which were related to intrusion detection. The remainder of products tested addressed interoperable information systems or a combination of capability gaps, such as anomaly and explosive detection and chemical and biological threat security (see figure 5). Of the products that addressed more than one capability gap, 78 percent (14 of 18) of these products could be used for anomaly and explosive detection, as well as high throughput threat detection. TSA officials told us that because anomaly and explosive detection and high throughput threat detection technologies can be easily transported to different locations within a station, they are of particular interest to mass transit operators. On our site visits to two mass transit operators that TSA utilizes to test technology products, we observed the testing and use of commercial products. These products were designed to detect anomalies on the underside of railcars as well as among persons traversing transit platforms, terminals, and stations. The products were being used to support both normal operations and a national security special event (see figure 6). Mass transit officials told us during our site visits that they considered these commercial technologies to be useful additions to their existing security measures. They also said the test results, which TSA made available to them, were helpful in determining whether to invest in purchasing the products for long-term use. In addition to allowing TSA to perform technology assessments, the program also gives transit operators hands-on experience with technologies they are unfamiliar with. For example, an official from one mass transit test bed told us that equipment often performs differently when the manufacturer’s employees are operating it due to their prior experience with, and dedicated training on, the equipment. This official noted that transit system employees, who often do not have similar experience and training with a particular technology, can sometimes have different performance results when operating this equipment. The official told us that TSA’s Operational Test Bed Program gives transit employees an opportunity to develop structured, hands-on experience with certain products with TSA’s assistance, allowing them to understand the full potential and capabilities of the technology. This official said that, in her case, observing fellow transit employees using a particular technology for several hours convinced her of the product’s application in a real-world environment, and subsequently was an important factor in her decision to recommend its purchase for use by her transit agency. Although mass transit operators we spoke with valued the Operational Test Bed Program, TSA has decreased funding for the program since fiscal year 2013. Specifically, our analysis of program funding showed that the program experienced an approximately 70 percent decrease in funding from fiscal years 2013 through 2018 (see figure 7). TSA officials stated that recent decreases in program funding, coupled with projected funding shortfalls for the Operational Test Bed Program for 2019 through 2024, will limit the program’s capacity to conduct testing and assessments of technologies. Specifically, the TSA program manager for the Operational Test Bed Program told us that the recent decreases in funding for the program to its current level will materially impact the operation of the program moving forward. Furthermore, a TSA May 2019 budget planning document shows that, to fully meet project requirements, the program will require approximately $20 million in additional funding for fiscal years 2019 through 2024. Should the program not receive this funding, TSA officials stated they would not be able to test as many products or address as many surface transportation capability gaps through the program. They also stated that the funding shortfalls would limit TSA’s analysis of technology performance. Program managers are in the process of identifying additional funding requirements for the program through TSA’s internal budget review process. S&T, TSA, and mass transit operators regularly collaborate on issues related to identifying mass transit capability gaps and testing security technologies to address those gaps. During the course of our review, we identified four key mechanisms that S&T, TSA, and mass transit operators use to collaborate on mass transit security issues—the DHS IPT process’s sub-IPT focusing on surface transportation capability gaps (including those pertaining to mass transit); the Intermodal Transportation Systems Research and Development Working Group (RDWG); TSA’s Operational Test Bed Program; and the Transit Policing and Security Peer Advisory Group (PAG) (see table 1). We assessed the effectiveness of collaboration in these four mechanisms using our leading collaboration practices (see side bar) and found that each of them generally followed these practices. We reported in March 2019 that DHS-wide R&D collaboration has improved through the IPT process but some challenges remain, such as ensuring all components participate in the process, among other things. However, as discussed below, we found that S&T and TSA collaborate effectively through the IPT process for identifying mass transit security capability gaps and security technologies. sustained over the long-term? If leadership is shared, have roles and responsibilities been clearly identified and agreed upon? Have participating agencies clarified roles and responsibilities? participants been included? Do they have the ability to commit resources for their agency? mechanism be funded and staffed? Have online collaboration tools been developed? Written Guidance and Agreements: If appropriate, have participating agencies documented their agreement regarding how they will be collaborating? Have they developed ways to continually update and monitor these agreements? Prevent Terrorism sub-IPT on Explosive Screening. S&T and TSA collaborate on identifying surface transportation (including mass transit) capability gaps through the Prevent Terrorism’s sub-IPT on Explosive Screening. At the federal level, we found that TSA and S&T’s ongoing use of this mechanism met several leading collaboration practices, including bridging organizational cultures, leadership, clarity of roles and responsibilities, participants, and written guidance and agreements. Specifically, the Explosive Screening sub-IPT has a formal structure that is outlined in the Prevent Terrorism IPT’s charter. This written agreement establishes leadership and clarifies the roles and responsibilities of each of the participants. As key participants and voting members, S&T and TSA possess the necessary expertise to identify capability gaps for mass transit (i.e., S&T has expertise in technology research and development, and TSA has in-depth knowledge of the mass transit and other surface transportation sectors). Moreover, by requiring S&T and TSA to work together to prioritize capability gaps, the process allows them to operate across agency boundaries (i.e., to bridge their respective organizational structures). In 2012, S&T officials stated that they collaborated with TSA as members of the Explosive Screening sub-IPT to identify anomaly and explosive detection and high-throughput threat detection as the highest priority capability gaps for surface transportation. These gaps were the basis for S&T’s STETD program. RDWG. We also found that the RDWG facilitates effective collaboration between S&T, TSA, and surface transportation stakeholders, including 30 mass transit operators. The RDWG generally follows leading collaboration practices related to bridging organizational cultures, leadership, clarity of roles and responsibilities, participants, resources, and written guidance and agreements. Specifically, the RDWG is a working group with an established charter that brings together federal and surface transportation representatives to operate across agency and sector boundaries to identify surface transportation-related capability gaps, including those for mass transit. The RDWG charter clarifies the participant roles and responsibilities and establishes a framework for nominating new members to ensure all relevant participants are included. TSA, as the designated chair, funds the working group and ensures its continuation. In addition to identifying surface transportation security gaps, an S&T official told us that the members of the RDWG review the prior year’s security capability gaps to determine whether they are still relevant and if there are commercially available technologies to address them. The S&T official explained that they then use the results of these reviews to inform their work on the Explosive Screening sub-IPT, specifically using them as basis for R&D project requirements. For example, S&T officials said that anomaly and explosive and high- throughput threat detection were the gaps identified by the participants of the RDWG and then reported through the DHS IPT process, which ultimately helped inform the scope of S&T’s STETD program. In addition, S&T officials told us that they use the RDWG annual meetings to communicate to surface transportation stakeholders the progress they have made to address these gaps through the STETD program. Operational Test Bed Program. TSA’s Operational Test Bed Program facilitates collaboration between S&T, TSA, and mass transit operators on the testing and evaluation of security technologies. The program, through its memorandums of agreement with mass transit operators, generally follows leading collaboration practices related to collaboration criteria for bridging organizational cultures, clarity of roles and responsibilities, participants, resources, and written guidance and agreements. Specifically, memorandums of agreement serve as a mechanism for TSA and S&T to operate outside of their agency boundaries to test technologies in real-world environments (i.e., mass transit systems). The agreements also clarify the roles and responsibilities and serve as guidance for TSA, S&T, and mass transit operators on how testing is to be carried out. For example, the agreements clarify responsibilities for installing and operating test equipment. The program is funded and managed by TSA, and S&T and mass transit operators leverage TSA’s resources through their participation. Collaboration through the program has led to numerous benefits for TSA, S&T, and mass transit operators. According to TSA officials, the program allows TSA to fulfill federal requirements to test and evaluate mass transit security technologies and to expand the market for these products. Additionally, S&T has used the program’s established agreements with transit systems to facilitate the testing of STETD program prototypes. Lastly, transit operators use the program to obtain first-hand information on the performance of security technologies within their system. For example, an official from one mass transit operator participating in the test bed program told us they purchased two different types of passive millimeter wave scanners that they tested through the program and found to be effective. Transit Policing and Security Peer Advisory Group (PAG). The PAG facilitates collaboration among mass transit stakeholders to share information and meets the bridging organizational cultures, leadership, participants, resources, and written guidance and agreements collaboration key features criteria. Specifically, the PAG follows several practices through its charter, which designates a transit police chief as the chair of the group. The charter also outlines the participating mass transit stakeholders and allows them to share information across agency boundaries on security-related issues, including information on incident response, emerging threats, and other best practices on mitigating security issues. Officials from all nine of the mass transit operators we spoke with are members of the PAG, and seven of them stated that the PAG fosters collaboration between mass transit operators by providing a forum for transit officials to connect and share information. Particularly, one mass transit operator stated that the PAG was beneficial to the safety and security of her system because it has allowed mass transit officials to share experiences and disseminate best practices for responding to threats. Another official said that the PAG helped him stay informed about the current risks facing all of the mass transit operators, and without the group, collaboration probably would not happen. TSA engages in a number of collaborative activities to share information on security technologies with mass transit stakeholders to help improve their technology investments. Specifically, TSA disseminates a quarterly newsletter to surface transportation stakeholders (including mass transit operators) which summarizes TSA’s efforts to address various surface transportation security issues. Among other things, the newsletter shares information on the technologies for which TSA has sponsored testing in different mass transit operator systems. Additionally, TSA maintains a collective email account that was created for all mass transit operators to send TSA suggestions for technologies or products to test, among other things. Further, TSA officials stated that they notify and communicate to regional mass transit stakeholders any information on upcoming test bed demonstrations, so these stakeholders can attend in person if they prefer. Finally, according to the TSA program manager, TSA officials utilize the American Public Transportation Association’s annual conference, industry symposiums, and security roundtables to engage with mass transit stakeholders to share information on security threats, capability gaps, and technology. In addition, to assist transit operators, TSA produces a number of assessments and reports (products) that include performance information on a range of technologies. These products include: TSA’s Market Survey. TSA officials regularly update a market survey, which contains a list of commercial vendors who develop technological products capable of addressing surface transportation security issues. This list, which does not contain sensitive information and may be readily shared with operators, includes vendors and their associated products that TSA believes may be applicable to mass transit security; it does not catalog the list of products TSA has sponsored testing for. TSA officials populate this list by attending relevant symposiums and university conferences, as well as soliciting input from partner laboratories. Surface Transportation Sensor Catalog. The Surface Transportation Sensor Catalog documents the technology assessments performed by TSA and contains summaries of various security technologies evaluated since 2007. In addition to evaluated products, it also contains summaries of the vendor product demonstrations received by TSA since fiscal year 2016. TSA officials stated that the catalog is updated each year with new entries for recently evaluated products, and is intended as a resource for both TSA and its stakeholders to have greater awareness of technologies and help them make more informed technology investment decisions. State of Technology Reports. TSA publishes a State of Technology report that provides a detailed overview of a specific challenge to surface transportation stakeholders (such as person-borne IEDs) and gives a high-level summary of available products that could address it, and a technology maturation roadmap (with objectives) that needs to be implemented in order to meet surface transportation stakeholders’ operational and security needs to address those specific threats. Although these TSA products contain technology assessment and other information that would benefit mass transit operators seeking to purchase and implement security technologies, mass transit operators may not be receiving them. Specifically, TSA shares these products with transit operators upon request. However, officials from seven of the nine mass transit operators that we spoke with said they wanted more technical assessment information on commercially available security technologies, indicating that they may not be routinely requesting, and therefore not receiving, the TSA products that would provide this information. In addition, four of the nine said they would like TSA’s assessment information on technologies to be more accessible. Finally, an official from one mass transit system who previously worked for TSA on mass transit issues, and thus has knowledge of the broader mass transit community, stated that many operators would benefit from the Surface Transportation Sensor Catalog, but smaller operators are not aware of this resource and therefore do not know how to request it. TSA officials stated they do not routinely share information on security technologies with mass operators for two reasons. First, TSA officials explained that many of the in-depth reports that result from its testing of security technologies contain sensitive information and cannot be distributed without first assessing whether the requester is eligible to receive it. However, officials from most of the mass transit operators we spoke with said they would like more technical assessment information. Therefore it could be useful for mass transit operators to know when TSA publishes these reports so they can request the full report for review. This notification could consist of non-sensitive, high-level information on technologies assessed so that mass transit operators could request the information in full. Second, the TSA program manager responsible for these assessments told us that his office does not have sufficient resources to develop and maintain a centralized, web-based repository that would allow mass transit operators to search and retrieve sensitive information independently, such as the sensor catalog and technology assessment reports. Despite these limitations, in the past, TSA has shared information related to technology assessments routinely with mass transit operators. For example, TSA used to post a verified technology list on a Federal Emergency Management Agency web page. A TSA official stated that the information posted on the website included summary information on technology evaluations and other technology information. Further, TSA received feedback from surface transportation (including mass transit) stakeholders that the information posted was useful. TSA no longer posts information on the web page because the Federal Emergency Management Agency no longer maintains the website. In addition, TSA officials stated that they had plans to include more comprehensive information about TSA’s technology assessments within an online information resource known as the DHS Responder Knowledge Base—a department-wide database previously developed to house information for first responders. In April 2019 officials from DHS’s Countering Weapons of Mass Destruction Directorate said they had plans to reach out to TSA and other DHS components on how to utilize the Responder Knowledge Base as a repository for their reports and other sensitive information. Furthermore, officials from that directorate told us that the database is about 2 years from being launched, and they do not have a specific completion date. Standards for Internal Control in the Federal Government states that management should communicate externally to their stakeholders through the appropriate means. Further, the 2013 National Infrastructure Protection Plan states that in order to ensure that situational awareness capabilities keep pace with the evolving risk environment, officials should improve practices for sharing information that will improve security and resilience. Until the Responder Knowledge Base is operational, mass transit operators could benefit from TSA routinely sharing appropriate information on the technology assessments and other performance information at its disposal. For example, TSA could leverage the resources of existing coordination mechanisms, like the PAG, or develop a listserv to automatically notify a more comprehensive group of mass transit operators of the existence of a new technology assessment or sensor catalog. Notifying more mass transit operators on an ongoing basis that this information is available would help ensure they have the benefit of all relevant TSA information when making strategic security technology investments. Further, doing so would help mass transit operators to better use their limited resources to acquire proven technologies that could enhance the overall security posture of their systems. Monitoring and securing surface transportation systems continues to present unique challenges. With respect to mass transit systems, for example, operators must balance the need to efficiently move passengers through the system with the need to screen for explosives and other threats. Since 2010, S&T’s STETD program has been the only DHS R&D program that has developed technologies to address these challenges. Although S&T has made progress, as of fiscal year 2019, none of the technologies associated with the STETD program have matured enough to undergo commercial development, and the program’s completion date has been extended from fiscal year 2017 to fiscal year 2023. While fluctuations in the program’s funding have contributed to delays, S&T has not followed DHS guidance for developing milestones that would help officials understand whether the program is achieving key activities identified in planning documents when faced with funding and other challenges. Without milestones that clearly convey an understanding of the program’s progress, DHS decision makers are not positioned to identify any adjustments that may be needed to facilitate the achievement of program goals. S&T, TSA, and mass transit operators effectively collaborate through a number of stakeholder groups to identify mass transit security gaps and to test possible technology solutions that could address them. TSA also supports greater awareness of available technologies by publishing key information on commercially available products (such as technology assessment results) and making it available to mass transit operators upon request. However, TSA does not comprehensively or routinely share this information, and seven of the nine mass transit operators we spoke with stated they wanted more technology assessment information. Without a mechanism to share technology assessments and related information with more mass transit operators and on a routine basis, TSA cannot ensure that mass transit operators will be fully informed about available technologies they could use to secure their systems. Moreover, without this information, mass transit operators may not be positioned to make the best possible use of the limited funding available for purchasing these technologies. We are making two recommendations, one to DHS and one to TSA. The Deputy Secretary of Homeland Security should ensure that S&T take steps to more fully incorporate practices for developing milestones within DHS’s budget preparation guidance, into the Surface Transportation Explosive Threat Detection program. (Recommendation 1) The Administrator of TSA should develop a mechanism to more routinely and comprehensively share appropriate information on the performance of mass transit security technologies (such as the annual sensor catalog and security technology assessments) with mass transit operators and stakeholders until DHS completes work on a more permanent information sharing resource. (Recommendation 2) We provided a draft of this report to S&T and TSA for review and comment. DHS provided written comments which are reprinted in appendix I. In its comments, DHS concurred with both recommendations and described actions planned to address them. S&T and TSA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the acting Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact William Russell at (202) 512-8777 or russellw@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. William Russell (202) 512-8777 or RussellW@gao.gov. In addition to the contact named above, Christopher Ferencik (Assistant Director), Mona Nichols Blake (Analyst in Charge), Jason Blake, Frederick K. Childers, Michele Fejfar, Jonathan G. Felbinger, Eric Hauswirth, Tracey King, Kristiana D. Moore, Claire Peachey, Jack Sheehan, Sarah Veale, and Robert Ward made key contributions to this report.", "summary": "Since 2016, bombings of subways and bus systems in foreign cities and attempted attacks in U.S. cities demonstrate continued security threats to mass transit and other surface transportation systems. S&T and TSA are the primary federal entities responsible for researching, developing, and testing technologies designed to address threats to these systems. GAO has previously identified challenges with S&T's oversight of R&D projects. GAO was asked to review S&T and TSA's roles in developing and testing surface transportation security technologies. This report, among other objectives, (1) assesses the extent to which S&T is developing technologies to secure surface transportation systems and progress made, and (2) identifies the key mechanisms that S&T, TSA, and stakeholders use to collaborate and share information on identifying capability gaps and security technologies, and analyzes the extent to which they are effective. GAO assessed S&T's mass transit program because it was the only active R&D effort for surface transportation security. GAO interviewed officials from S&T, TSA, and nine mass transit operators; observed technologies; reviewed documentation; and analyzed budget information from fiscal years 2013 to 2018. GAO also used GAO's leading collaboration practices to assess collaboration on security technologies. The Department of Homeland Security's (DHS) Science and Technology Directorate (S&T) has one research and development (R&D) effort focused on surface transportation, the Surface Transportation Explosive Threat Detection (STETD) program, which is developing technologies to secure mass transit systems (see figure). DHS guidance requires S&T to develop results-oriented milestones to track progress. GAO found, however, that S&T has not used milestones that fully adhered to DHS guidance. For example, most STETD program milestones did not clearly link to key activities described in program plans. As a result, DHS may not have the information needed to determine whether the STETD program is meeting its goals. S&T, TSA, and stakeholders effectively collaborate, but TSA could better share test results with mass transit stakeholders. For example, S&T, TSA, and mass transit operators regularly collaborate on issues related to identifying mass transit capability gaps and testing security technologies to address those gaps. Nevertheless, GAO found TSA's efforts to share information on existing technologies to secure mass transit could be improved. Specifically, TSA regularly assesses commercially available technologies, but does not routinely or comprehensively share its results with mass transit operators. For example, TSA's reports on its testing of commercially available products would provide mass transit operators with technical assessment information. However, seven of the nine mass transit operators GAO spoke with asked for more technical assessment information on existing commercial technologies, indicating that they may not be receiving the TSA products that would provide this information. Sharing this information more routinely and comprehensively with mass transit operators would allow TSA to better inform them about the capabilities of technologies that could be acquired to secure thteir systems. GAO is making two recommendations: that S&T incorporate DHS milestone guidance for its STETD program, and that TSA develop a mechanism to routinely and comprehensively share security technology information with mass transit operators. DHS concurred with both recommendations.", "document_type": "gao"}
{"report": "DHS and its components invest billions of dollars each year to acquire IT and other capabilities to support the department’s critical functions. The department plans to spend approximately $2.3 billion on major IT investments in fiscal year 2020. However, DHS has faced long-standing challenges in acquiring and managing IT. We have highlighted the department’s IT management issues on our high-risk list since 2003 and have made numerous recommendations to improve its IT management practices. For example, in 2013, we testified that, out of 68 major IT investments that the department had in development, 21 had one or more subsidiary projects that were not meeting cost and/or schedule commitments due to technical issues in the development phase, changes in agency priorities, or a lack of understanding of user requirements, among other things. Many federal agencies, including DHS, are accustomed to using a waterfall software development model. This type of model typically consists of long, sequential phases, resulting in product delivery years after program initiation. With many federal IT investments in a development phase, it is important to ensure that agencies are making the most efficient use of their financial resources through effective management practices. However, as we have previously reported and testified, historically federal IT projects often fail—that is, even after exceeding their budgets by millions of dollars and delaying the schedules by years—and the results do not meet requirements. Recognizing the severity of challenges related to the government-wide management of IT, in December 2014, federal IT acquisition reform provisions (commonly referred to as FITARA) were enacted as a part of the Carl Levin and Howard P. ”Buck” McKeon National Defense Authorization Act for Fiscal Year 2015. One of the provisions requires that the Office of Management and Budget (OMB) require in its annual IT capital planning guidance that each covered agency’s chief information officer (CIO) certify that IT investments are adequately implementing incremental development, as defined in capital planning guidance issued by OMB. Agile software development—one form of incremental development— calls for the rapid delivery of software. Probably the most well-known feature of Agile software development is iterative product development and delivery; that is, development of software in segments that are continuously evaluated against requirements. This method is well suited for programs in which the final product is to include distinct features, some of which may be discovered during the process rather than planned at the beginning. These frequent iterations can effectively measure progress and allow developers to respond quickly to feedback from customers, thus reducing technical and programmatic risk. With its emphasis on early and continuous delivery of working software, Agile can be a valuable tool for agencies in mitigating schedule and budget risks. Figure 1 compares requirements, design, development, and testing using Agile software methods versus a traditional waterfall approach; illustrating how requirements, design, development, and testing are performed concurrently in smaller time-boxed iterations for Agile and sequentially in waterfall development. As a result, using an Agile framework should result in producing high-quality software with frequent reviews and customer feedback to ensure that the highest value requirements are being met. The figure assumes that planning for both Agile and waterfall development has already occurred. In February 2016, the DHS Under Secretary for Management announced an effort to pilot the use of Agile development methodologies to improve the department’s execution and oversight of IT acquisitions. This resulted in five Agile pilot programs. Each pilot program was overseen by a component integrated program team. Collectively, the first pilot programs were also overseen and supported by a DHS integrated program team. In April 2016, the department issued an Agile instruction, which identified Agile software development as the preferred approach for all DHS programs and projects that are to deliver an IT, or embedded-IT, capability. The department also set an expectation for its component CIOs to develop plans to increase the use of Agile development and justify any major IT programs that did not intend to use Agile development practices. Many DHS programs were already using Agile or similar incremental development methods before the department identified it as the preferred approach. The DHS CIO, as the individual delegated departmentwide responsibility for approving, managing, and overseeing all of the department’s IT programs, sets the policies and procedures to help ensure Agile practices meet the department’s goals and comply with acquisition management policy. The DHS CIO is supported in this effort by the heads of other major DHS lines of business, such as the Chief Procurement Officer. Table 1 describes the roles and responsibilities that support Agile development within the department. Additionally, DHS established a headquarters-level team—the ITPM COE—to collaborate across the department on improvements to policy, governance, and acquisition guidance. In April 2017, the ITPM COE assumed responsibilities for the department’s transition to Agile development. The Office of the Chief Technology Officer (OCTO) Strategic Technology Management (STM) division within the OCIO facilitates the ITPM COE and serves as the official liaison between other OCIO divisions, other partner headquarters directorate and management offices, and operational components as needed. We have reported on various programmatic and technical challenges that were limiting DHS’ efforts on Agile programs. For example, In 2016, we reported that the U.S. Citizenship and Immigration Services Transformation program, which was using Agile software development to modernize citizenship and immigration benefits processing, needed to improve testing of its software code and ensure its approaches to interoperability and end user testing met leading practices. We made 12 recommendations to improve Transformation program management, including ensuring alignment among policy, guidance, and leading practices in areas such as Agile software development and systems integration and testing. DHS concurred with the recommendations and has thus far implemented eight of them. We reported in October 2017 that the Transportation Security Administration Technology Infrastructure Modernization program had not defined key roles and responsibilities, prioritized system requirements, or implemented automated capabilities that were essential to ensuring effective adoption of Agile. We made 14 recommendations including that DHS should prioritize requirements and obtain leadership consensus on oversight and governance changes. DHS concurred with the recommendations and to date has implemented 13 of them. In November 2018, we reported that the U.S. Secret Service OCIO did not fully measure post-deployment user satisfaction with one project supporting the Information Integration and Technology Transformation investment. We made 13 recommendations to the U.S. Secret Service including that the Secret Service establish a process that ensures the CIO reviews all IT contracts, as appropriate; and identify the skills needed for its IT workforce. DHS concurred with the recommendations but has not yet implemented them. We reported in April 2019 that the Federal Emergency Management Agency Grants Management Modernization program had not yet fully established plans for implementing new business processes or established completed traceability of IT requirements. We made eight recommendations to implement leading practices related to reengineering processes, managing requirements, scheduling, and implementing cybersecurity. DHS concurred with the recommendations and has thus far implemented two of them. According to the Project Management Institute, the practice of change management is a comprehensive, cyclic, structured approach for transitioning individuals, groups, and organizations from a current state to a future state with intended business benefits. It helps organizations to integrate and align people, processes, structures, culture, and strategy. The Project Management Institute and GAO have both described leading practices for effective organizational change management. Leading practices in organizational change management advise an agency to (1) plan for, (2) implement, and (3) measure the impact when undertaking a significant change, such as a transition from one software development approach to another. Since DHS committed to its transition to Agile software development in policy in April 2016, the department has fully developed plans to facilitate the transition. However, DHS has not fully implemented these plans and has experienced challenges in measuring progress against its intended goals. In addition, many of the plans are part of a larger effort to improve overall IT acquisitions rather than specific to a transition to Agile development, an approach that may delay DHS’s execution of these plans. Leading practices for Agile software development adoption advise an agency to focus on three organizational levels of adoption: (1) agency environment, (2) program processes, and (3) team activities and dynamics. DHS has partially adopted practices at all three organizational levels. For example, the agency activities fully supported Agile methods through actions such as developing policies and procedures that called for the alignment of software, program goals, and agency goals. However, the department’s culture can better support Agile methods by, among other things, demonstrating an incentives and rewards structure to incentivize Agile teams. Leading practices that we developed for Agile software development adoption are organized into three areas, called organizational levels: agency environment, program processes, and team activities and dynamics. The organizational levels are further divided into nine leading practices. Table 2 identifies the three organizational levels and nine leading practices associated with these levels (three practices within each area). A detailed assessment of DHS’s implementation of each of the nine leading practices can be found in appendixes III, IV, and V. We refer to the leading practices related to an agency’s processes, culture, and acquisition strategies as agency environment practices. For an agency to successfully transition from an agency that supports traditional development methods, it should ensure that its activities, culture, and acquisition policy and procedures support Agile methods. DHS partially implemented the agency environment practice level by fully implementing two leading practices and partially implementing the remaining one. A more detailed assessment of DHS’s agency environment leading practices can be found in appendix III. Agency activities support Agile methods–fully implemented. DHS established appropriate life cycle activities to support Agile methods. For example, the department has outlined its policies, procedures, and guidance in several documents to assist its components in the acquisition and implementation of Agile software development. The department also developed policies and procedures that called for the alignment of software, program goals, and agency goals. Agency culture supports Agile methods–partially implemented. DHS established an environment that supported Agile development, and senior stakeholders supported its development throughout the agency. However, DHS did not take sufficient steps to ensure that senior stakeholders serving as executive sponsors understood Agile development, as called for by leading practices that are described in further detail in appendix III. The Director of STM stated that Agile sponsors were considered to be chief executive officers (e.g. Executive Director of PARM and the Deputy Under Secretary for Management). These parties oversaw the actions of the ITPM COE and approved the Agile action plans in June 2017. In addition, the department did not require training for senior stakeholders serving as executive sponsors, as called for by leading practices. In a written response, the Office of the Chief Human Capital Officer said that there were no Agile training requirements for officials at this level. By training executive-level sponsors in Agile development, the department can mitigate the risk of setting expectations for programs and projects that do not align with the values and principles of Agile software development. DHS also did not demonstrate that it established an incentives and rewards structure to incentivize Agile teams, as called for by leading practices. Officials from the Office of the Chief Human Capital Officer stated that the department’s existing rewards structure allowed for incentivizing team and individual performance even though it was not focused specifically on Agile methods. These officials stated that they did not believe that additional policy, guidance, or modifications to their existing policy were necessary. The Director of STM within OCIO stated that rewarding Agile teams was not a topic the ITPM COE was currently considering, but that OCIO might be interested in pursuing the topic after completing existing, higher-priority activities. By considering modifications to policy and guidance governing the incentives and rewards structure to promote team performance, DHS could improve team productivity and output. Agency acquisition policies and procedures support Agile methods–fully implemented. DHS guidance for acquisition strategies supported the unique needs of Agile programs. For example, DHS offered guidance for preparing acquisition strategies through its Procurement Innovation Lab and published Agile guidance that discussed contracting and acquisition strategies. Program processes involve staff being appropriately trained in Agile methods, technical environments enabling Agile development, and project planning controls being compatible with Agile development. DHS partially implemented the program processes practice level by fully implementing one leading practice and partially implementing the remaining two. A more detailed assessment of DHS program process leading practices can be found in appendix IV. Staff are appropriately trained in Agile methods–partially implemented. DHS training policy and guidance called for some of the acquisition management program staff to be trained in Agile methods. DHS has also taken steps to incorporate Agile concepts into required training for members of the acquisitions workforce. In addition, DHS offered elective training covering Agile methods and guidance for Agile teams, including contractors, to have the appropriate technical expertise needed to perform their role. The department also took steps to identify the necessary competencies for Agile teams and individuals. In April 2019, the Strategic Workforce Planning team within OCIO published a white paper identifying 27 competencies necessary for teams and individuals to use and training courses associated with the competencies. The white paper also made recommendations to help DHS address challenges in implementing Agile methods, such as establishing communities of practice for Agile practitioners to identify best practices and provide workshops. According to a written response by OCIO, the Strategic Workforce Planning team will create an implementation and communication plan for any deliverables associated with the white paper. However, the department did not provide policy or guidance to ensure that all program staff were trained in Agile methods, as called for by leading practices described in further detail in appendix IV. Existing Agile training requirements covered only the acquisitions workforce. DHS did not establish training requirements for program staff outside of the acquisitions workforce—such as a product owner or other staff—who may be assigned to an Agile program. As a result, individual programs must independently decide on and enforce training requirements if they want to ensure that all staff receive the needed training. DHS officials stated that the department focuses on key acquisition career fields in part because those career fields are defined in policy and procedures. According to the Director of STM, the department also encourages programs to independently find coaching and training because the components are more likely to have funding. By providing policy or guidance to ensure that all personnel staffed to an Agile program or project receive appropriate training, the department can better prepare program staff to plan and execute appropriately, and increase the likelihood of achieving the expected outcomes of the transition to Agile. Technical environments enable Agile development–fully implemented. DHS guidance called for technical and project tools to be available to support Agile development. For example, DHS test and evaluation guidance stated that automated testing should be implemented where practical. In addition, DHS guidance called for system designs that will support iterative delivery. For example, DHS enterprise architecture guidance and supplementary design considerations for acquisition programs discussed loose coupling and different methods for establishing a modular system. Project planning controls are compatible with Agile development–partially implemented. DHS guidance called for defining and incorporating non-functional requirements and critical features throughout development. In addition, DHS provided guidance for establishing a sustainable development pace. For example, the Agile instruction manual identified the benefits of monitoring the amount of work completed by Agile teams across each iteration in order to monitor ongoing team progress. However, DHS was not tracking and monitoring the pace of Agile team development as called for by DHS guidance and described further in appendix IV. According to the Director of STM, programs were not consistently reporting the Agile core metrics associated with development team pace as required. The Director of STM stated that the department was taking steps to begin tracking and monitoring the pace of Agile teams. In addition, the Director stated that he allocated staff to assist programs with consistently reporting the Agile core metrics. According to the Director of STM, the department was in the process of updating the core metrics and intended to publish a new version of them in the future, which would include tracking the pace. Nevertheless, DHS did not provide assurance that the metrics associated with development pace would be included in this revised set of metrics or that programs would consistently report that information in order for the department to track and monitor the pace of Agile teams. Until the department consistently tracks and monitors Agile programs and projects, it will not have the information needed to help ensure the development pace is maintained. Practices at the team activities and dynamics level include team composition supporting Agile methods, work being prioritized to maximize value for the customer, and repeatable processes being in place. DHS partially implemented the team activities and dynamics practice level by fully implementing one leading practice and partially implementing the remaining two. A more detailed assessment of DHS team activity and dynamics leading practices can be found in appendix V. Team composition supports Agile methods—fully implemented. DHS established guidance that called for self-organizing teams and defined the role of a product owner. For example, the Agile instruction and Agile instruction manual both explain that collaborative, self- organizing, and cross-functional teams help achieve the flexibility needed for the iterative development that characterizes Agile development methods. In addition, the Agile instruction manual states that the product owner is responsible for representing stakeholders and should be available to the development team throughout the iteration to answer questions and clarify requirements on behalf of the stakeholders. Work is prioritized to maximize value for the customer—partially implemented. DHS guidance called for Agile teams to craft user stories to define work. The guidance also called for user stories to be prioritized in a backlog based on value. However, the guidance did not describe how Agile teams can estimate the relative complexity of the user stories as called for by leading practices and described in further detail in appendix V. The Director of STM stated that relative estimation is a basic exercise and that guidance on this topic can be found in a number of sources outside of DHS. However, without providing guidance or directing Agile teams to external sources for additional information on relative estimation, OCIO risks that teams supporting Agile projects will not appropriately estimate user stories relative to each other. By providing guidance on estimating the relative complexity of user stories, the department can help Agile teams to effectively commit to an appropriate amount of work during a given iteration. Repeatable processes are in place—partially implemented. DHS guidance addressed holding daily meetings to review progress and discuss impediments, using a demonstration for the acceptance of a user story and conducting a retrospective to evaluate progress. In addition, the department’s guidance called for Agile programs to employ continuous integration and emphasized the need for mechanisms to help ensure code quality. However, DHS did not set expectations for automated testing and code quality, as called for by DHS guidance and described further in appendix V. DHS’s Agile core metrics included a series of metrics that addressed automated testing and code quality. The core metrics included targets but the targets were notional and, therefore, not expectations that DHS required a program to meet. According to the Director of STM, the initial core metrics were intended to assess the level of DHS team achievement without imposing artificial industry- based target measures for each. The Director stated that, on receiving the metrics for a period of time, the department would then adjust the core metrics and begin to include target measures based on the results achieved. According to the Director, this effort is currently underway and an updated set of core metrics will be distributed in early fiscal year 2020. Moreover, the department did not track and monitor automated testing or code quality against expectations. As discussed under project planning controls, DHS intended to track and monitor Agile practices, such as automated testing and code quality, through the Agile core metrics. However, according to the Director of STM, programs and projects were not consistently reporting these core metrics and those that were reporting did not collect data or report on particular metrics. By setting expectations for automated testing and code quality and beginning to track and monitor project performance against these expectations, DHS can increase the likelihood that Agile programs and projects are delivered within cost, schedule, and performance estimates. DHS has taken many positive steps in its transition to Agile software development. It has implemented activities and artifacts that support all levels of adoption, from the department and component offices to Agile programs, projects, and teams. These activities and artifacts include providing opportunities for Agile programs and projects to streamline acquisition and life cycle processes to allow for iterative delivery and exhibiting senior support for the transition to Agile. The department successfully planned for the transition to Agile software development and completed many of its intended implementation activities. However, because DHS did not assess the skills and resources needed to complete deferred activities, it risks continued delays in completing these. In addition, without identifying target measures tied to expected outcomes, the department is limited in determining whether the transition is achieving its desired outcomes. Moreover, until DHS can ensure that all programs are consistently reporting on Agile core metrics, the department will not be able to track programs’ development techniques. Further measuring and communicating the benefits of the transition can enable the department to know whether Agile programs are performing better than those used prior to the transition. DHS has demonstrated significant progress in implementing leading Agile practices. The department can further improve its performance through full execution of the remaining partially implemented practices. At the agency environment level, DHS can mitigate risk and improve productivity through executive level training and modifications to policy to incentivize Agile teams. For program level practices, addressing training requirements for all necessary staff and tracking and monitoring the pace of Agile team development can help ensure teams’ success. With respect to team-level practices, DHS has not established guidance for estimating the relative complexity of user stories. As a result, Agile teams are hampered in effectively committing to an appropriate amount of work during a given period of time. Finally, because DHS has not set expectations for performance metrics for monitoring and tracking the use of automated testing and code quality, DHS is at a greater risk for programs breaching their cost and schedule expectations. We are making the following 10 recommendations to the Secretary of the Department of Homeland Security (DHS). The Secretary should ensure that the Director of Strategic Technology Management (STM), in collaboration with other members of the Information Technology Program Management Center of Excellence (ITPM COE), identifies the skills and resources needed to complete the work intended for the upcoming fiscal year, including the availability of supplementary staff, such as subject matter experts. (Recommendation 1) The Secretary should ensure that the Executive Steering Committee overseeing the activities of the ITPM COE establishes target measures for the department’s desired outcomes of its transition to Agile development. (Recommendation 2) The Secretary should ensure that the DHS Chief Information Officer (CIO) defines a process and associated set of controls to ensure that Agile programs and projects are reporting a set of core required performance metrics for monitoring and measuring Agile adoption. (Recommendation 3) The Secretary should ensure that the ITPM COE, in coordination with the CIO, begins measuring results associated with the transition to Agile and the success of the transition based on its impact on the department. (Recommendation 4) The Secretary should ensure that the CIO, in collaboration with the Chief Procurement Officer, through the Homeland Security Acquisition Institute, establish Agile training requirements for senior stakeholders. (Recommendation 5) The Secretary should ensure that the Chief Human Capital Officer, in collaboration with the CIO, consider modifications to the current employee recognition and performance management governance to ensure that teamwork and team performance of Agile programs and projects are incentivized. (Recommendation 6) The Secretary should ensure that the CIO, in collaboration with the Chief Procurement Officer, through the Homeland Security Acquisition Institute, establish Agile training requirements for staff outside of the acquisition workforce but assigned to Agile programs. (Recommendation 7) The Secretary should ensure that the CIO, upon establishing a set of core performance metrics, tracks and monitors the pace of Agile team development. (Recommendation 8) The Secretary should ensure that the CIO, in collaboration with the Executive Director of the Office of Program Accountability and Risk Management (PARM), update or develop new guidance on Agile methodologies to describe how Agile teams can estimate the relative complexity of user stories. (Recommendation 9) The Secretary should ensure that the CIO, upon establishing a set of core performance metrics, sets expectations for automated testing and code quality, and tracks and monitors against those expectations. (Recommendation 10) DHS provided written comments on a draft of this report. In its comments (reproduced in Appendix VI), the department agreed with our 10 recommendations and described actions that it had completed and planned to address them. Based on the actions DHS said it had taken, the department requested that we close the first three recommendations as implemented. For example, the department described steps it had taken to address our recommendation that it identify the skills and resources needed to complete the work intended for the upcoming fiscal year, including the availability of supplementary staff such as subject matter experts. In addition, the department stated that it had addressed our recommendation to define a process and controls to ensure that Agile programs and projects are reporting a set of core required performance metrics for monitoring and measuring Agile adoption. We plan to follow up with DHS to assess the sufficiency of its actions to address our recommendations. The department also described actions that it plans to take to address the other seven recommendations. For example, DHS stated that it will use the results of its Agile core metrics and Agile Software Delivery Maturity Model to measure the success of the transition to Agile and its impact on the department. According to the department, it expects this action to be completed by June 30, 2021. Further, DHS stated that it will identify Agile training requirements for staff in Agile programs, and will use that to establish Agile training requirements for staff outside of the acquisition workforce but assigned to Agile programs. Specifically, DHS stated that the DHS OCIO will gather requirements from components via its IT workforce planning integrated project team to identify training resources available across the department that also address the skill sets needed for Agile programs. The department added that the DHS OCIO will utilize information from the April 2019 white paper, titled “OCIO Agile White Paper” to inform proposed Agile program training requirements. The department estimated that these actions are to be completed by September 30, 2020. DHS also provided technical comments, which we have incorporated as appropriate. We are sending copies of this report to the Acting Secretary of Homeland Security and interested congressional committees. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. Our objective was to assess the extent to which the Department of Homeland Security (DHS) addressed selected leading practices for its transition to the use of Agile software development. To accomplish this objective, we assessed the extent to which the department adhered to leading practices in two specific areas: organizational change management and Agile software development adoption. With regard to organizational change management, we reviewed leading practices published by the Project Management Institute and GAO. Based on this review, we identified 15 leading practices. We then grouped these 15 practices in three broad organizational change management areas: planning, implementing, and measuring change. To determine the extent to which DHS addressed leading practices for organizational change management in its transition to Agile development, we assessed DHS policies, procedures, guidance, plans, and other working group artifacts and compared them against leading practices. In particular, we reviewed working group charters for the DHS headquarters Agile Acquisition Integrated Program Team and IT Program Management Center of Excellence (ITPM COE), and any plans developed by these working groups, including the DHS Agile Action Plans and associated implementation plans. We then reviewed working group meeting minutes, presentation slides, and status update charts to assess the progress of the transition to Agile, identified artifacts prepared to support the transition to Agile, and assessed the status of plans for the transition to Agile. We reviewed all Agile artifacts prepared by or supporting the Agile working groups, such as a preliminary software development maturity model, the DHS Agile Acquisition Software Delivery Core Metrics (Agile core metrics), and an updated test and evaluation master plan template for Agile, among other artifacts. We also interviewed officials from DHS headquarters line of business representatives explicitly identified in the Agile Development and Delivery for Information Technology instruction (Agile instruction). This included officials from the Office of the Chief Procurement Officer, Office of the Chief Financial Officer, Office of the Chief Information Officer (OCIO), Office of Program Accountability and Risk Management (PARM), and the Science and Technology Directorate, and offices of Test and Evaluation and Systems Engineering. Within OCIO, we interviewed officials from the Office of the Chief Technology Officer (OCTO) within the Strategic Technology Management (STM) division, among others, as STM is the entity tasked with facilitating the ITPM COE and serves as the official liaison between other OCIO divisions, other partner headquarters directorate and management offices, and operational components. We also interviewed representatives from groups participating in ITPM COE activities but not explicitly called out in the Agile instruction, including the Privacy Office and Joint Requirements Council. In addition, we interviewed representatives from other groups not represented on the ITPM COE but potentially impacted by the transition to Agile. This included officials from the Office of the Chief Readiness Support Officer and Office of the Chief Human Capital Officer. With regard to leading practices for Agile software development adoption, we reviewed work performed by GAO to develop generally accepted leading practices. In developing these leading practices, GAO reviewed information from a variety of sources related to Agile adoption and compiled a draft of leading practices commonly mentioned across these different sources. We then convened a working group of experts from the public and private sectors and academia. This working group met three times a year between August 2016 and August 2019 to review and discuss these leading practices. More than 200 experts participated in the meetings, including more than 20 officials from DHS. GAO received comments from some of these experts both during these meetings and by email after the meetings. Based on this work, GAO developed a set of nine leading practices for Agile adoption. GAO grouped these leading practices into three organizational levels: (1) agency environment, (2) program processes, and (3) team activities and dynamics. The leading practices were further described by a series of core elements and core element expectations that, collectively, can be used to assess the status of an agency’s implementation. To determine the extent to which the department had implemented the leading practices for the adoption of Agile development, we obtained and assessed DHS policies, procedures, guidance, plans, and other documentation and compared them against the nine leading practices. In particular, we reviewed department acquisition policy, procedures, and guidance, such as acquisition management directive 102-01; software engineering life cycle policy, procedures, and guidance, such as those published in the software engineering life cycle guidebook; requirements policy, procedures, and guidance, such as the Joint Requirements Integration and Management System and Requirements Engineering User’s Guide; testing policy, procedures, and guidance, such as the Test and Evaluation Master Plan template and Test and Evaluation Management Guide; technical assessment and enterprise architecture policy, procedures, and guidance; program health assessment policy, procedures, and guidance such as the Acquisition Program Health Assessment instruction and CIO Program Health Assessment Scoring Guideline; and Agile-specific policy, procedures, and guidance, such as the Agile instruction and the Agile Development and Delivery for Information Technology Instruction Manual (Agile instruction manual), among other policy, procedures, and guidance. In addition to reviewing the department policy, procedures, and guidance, we obtained and assessed supplementary Agile documentation. In particular, we reviewed training materials prepared by the Homeland Security Acquisition Institute for acquisition workforce certifications and webinars offered by the Procurement Innovation Lab; ITPM COE Agile artifacts discussed under our assessment of the implementation of organizational change management leading practices, such as the Agile core metrics; and Agile-specific technical review completion letters, such as the release planning review. We also interviewed officials from the components responsible for the associated policy, procedures, and guidance and those specifically cited in the Agile instruction. This included officials from the Office of the Chief Procurement Officer, Office of the Chief Financial Officer, OCIO, PARM, Science and Technology Directorate, offices of Test and Evaluation and Systems Engineering, the Joint Requirements Council, Office of the Chief Readiness Support Officer, and Office of the Chief Human Capital Officer. As with our assessment of DHS implementation of organizational change management practices, within OCIO, we interviewed officials from the OCTO STM division, among others. We assessed a core element as being “met” if the department provided supporting documentation that demonstrated it met all of the expectations associated with the core elements. We assessed a core element as being “partially met” if the department provided supporting documentation that demonstrated some, but not all, aspects of the underlying expectations. We assessed a core element as “not met” if the officials did not provide any supporting documentation for the core element, or if the documentation provided did not demonstrate any aspect of the underlying expectations. The expectations associated with each core element are described more fully in appendixes III, IV, and V. We assessed each leading practice and practice level as being “fully implemented” if DHS provided evidence that it had met all of the core elements. We assessed each leading practice and practice level as being “not implemented” if DHS did not provide evidence that it had met or partially met any of the core elements. We assessed each leading practice and practice level as being “partially implemented” if DHS provided evidence that it had not met all core elements and partially met at least one core element. To supplement our assessment of the department’s implementation of the leading practices for adopting Agile development, we also assessed selected projects’ implementation of selected program process and team activity and dynamics leading practices. We updated the core element test plans to include general control objectives, associated controls, and associated test steps in order to reach a determination on the extent to which these projects implemented a particular aspect of a leading practice. We identified potential case study projects based on data provided by DHS from the Investment Evaluation, Submission, & Tracking system. We determined that the data in the Investment Evaluation, Submission, & Tracking system was sufficiently reliable for our use in selecting projects for our case studies. We selected case study projects, rather than programs, because, according to DHS officials from OCIO, programs report software development life cycle data to the Investment Evaluation, Submission, & Tracking system at the project level only. We selected only the projects supporting programs on the Major Acquisition Oversight List because these programs are expected to comply with the Agile instruction and acquisition management policy. We then further limited the scope of projects to those within components where GAO has not previously assessed a program using Agile methods or was not in the process of assessing such a program. This excluded the U.S. Citizenship and Immigration Services, Federal Emergency Management Agency, Transportation Security Administration, and U.S. Secret Service. We then further refined our selection based on the following criteria: Software development life cycle methodology (iterative development only) Project completion date (in-progress only) DHS component (selection of only one project per component) We then selected a random sample of three projects, with no more than one project selected from a component. The three case study projects we selected were the U.S. Coast Guard (USCG) Command, Control, Communications, and Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) program New Asset Acquisition Offshore Patrol Cutter project, with particular attention to the SeaWatch portion of this project; the U.S. Customs and Border Protection (CBP) Biometric Entry Exit (BEE) program Air Exit project, with particular attention to the Traveler Verification Services portion of this project; and the U.S. Immigration and Customs Enforcement (ICE) Student and Exchange Visitor Information System (SEVIS) program 8001 project, with particular attention to the SEVIS modernization portion of this effort. In preliminary interviews, we confirmed that these projects were applying Agile practices in order to validate data reported to the Investment Evaluation, Submission, and Tracking system. These case studies were used to supplement our findings from our program process and team activity and dynamics-level evaluations of the department’s implementation of leading practices for adopting Agile development. To evaluate case studies’ implementation of these leading practices, we reviewed artifacts from the selected projects. In particular, we reviewed artifacts demonstrating a project’s use of Agile including testing metrics, evidence of Agile ceremonies, the existence of user stories and a backlog, and the availability of Agile coaching and training. We then interviewed officials responsible for program and project management and representatives of groups responsible for software development for the three selected case study projects to discuss gaps we identified. We shared our initial assessment with DHS, USCG, CBP, and ICE and obtained feedback and additional supporting documentation. Regarding our analysis of project implementation of the program process and team activity and dynamics core elements, we followed the aforementioned process in assessing a core element as being “met”, “partially met”, or “not met”. These assessments were used to gain insight into the extent to which DHS policy, procedures, and guidance prepared programs and projects for the successful adoption of Agile leading practices. We did not evaluate the projects in order to make specific recommendations to the individual projects. We conducted this performance audit from December 2017 through April 2020, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In June 2017, Department of Homeland Security (DHS) senior stakeholders endorsed Recommendations Action Plans: Agile Acquisition Pilots, developed by the Agile Acquisitions Working Group. These recommendations were an effort to sustain the success of the information technology (IT) acquisition and delivery pilot program. The action plans were developed in response to the February 18, 2016, Acquisition Decision Memorandum from the Under Secretary for Management, which recognized the expressed need for both components and headquarters directorates to continue driving organizational change and process improvement to DHS IT acquisitions and delivery. The action plans were intended to codify lessons learned and recommendations based on independent interviews and retrospective meetings with those who participated in the five acquisition pilots. These plans were organized by priority: 12 critical, three high, and three moderate. The recommendations were weighted against one another based on impact, level of difficulty, and alignment with the original five goals of the Agile acquisition pilot program charter: reduce risk, increase customer value, faster time to market, economic value, and increased accountability and oversight. Table 3 describes the DHS Agile action plans, including the associated goal, primary organization(s), level of difficulty, impact, and executive priority. Each DHS action plan included a problem statement and recommendation, as detailed in table 4. This appendix describes in detail our evaluation of the three leading practices for agency environment when adopting Agile development, including a further explanation of expectations for each practice as well as some of the findings associated with each practice. We do not present any additional recommendations from these findings; this information is intended to assist the Department of Homeland Security (DHS) in implementing the recommendations described in our report. Establish appropriate life cycle activities Agency activities should support Agile methods by allowing for incremental and iterative software delivery that is tailored to the cadence of Agile software development and by incorporating technical reviews that occur throughout the development process. These activities and supporting policy and guidance should allow for requirements to be changed during development and the requirements change approval process should not impede the cadence of iterative and incremental development. Life cycle activities should also be user-focused and call for collaboration between the development team and users. To manage its multi-billion dollar investments, DHS has established policies, procedures, and guidance for IT program management. These publications govern the complete life cycle of a system, from technology development through integration and testing and, finally, implementation and operations and maintenance. DHS has outlined its policies, procedures, and guidance in several documents to assist its components in the acquisition and implementation of software development. Policies for managing its major acquisition programs are primarily set forth in a directive and supporting instruction. These policies outline an acquisition life cycle framework (ALF) that includes a series of predetermined milestones—known as acquisition decision events—at which the Acquisition Decision Authority reviews a program to assess whether it is ready to proceed to the next phase of the ALF. DHS’s Under Secretary for Management serves as the Acquisition Decision Authority for the department’s major acquisition programs. A separate DHS instruction and associated guidebook outline a framework of major systems engineering activities and technical reviews, collectively considered the systems engineering life cycle (SELC), which should be conducted by all DHS programs, both major and non-major. The SELC helps to ensure that appropriate systems engineering activities are planned and implemented and that a program’s development effort is meeting business needs. The SELC consists of major activities and a set of related technical reviews and artifacts that fit within the acquisition life cycle. Figure 2 depicts the acquisition life cycle and associated technical reviews established in DHS acquisition management policy. DHS provided programs with flexibility in their SELC technical reviews. Within the ALF, Agile processes are applied primarily within the obtain phase, where design, development, testing, and implementation of a system takes place. Prior to entering the obtain phase, a program selects its software development approach, such as Agile. The agreed-upon approach is then codified in an SELC Tailoring Plan, which is approved at acquisition decision event 2A. The SELC Tailoring Plan identifies the technical reviews and artifacts that the program is responsible for completing based on its unique characteristics (e.g., scope, complexity, and risk). To assist in tailoring efforts and further guide the implementation of Agile, DHS published an Agile instruction that includes the scope, definitions, roles and responsibilities, and procedures for establishing an Agile framework for developing all DHS IT acquisitions. DHS supplemented this instruction with an Agile instruction manual and provided a template that Agile programs can follow to tailor their activities. For example, instead of holding a system definition review, an Agile program is encouraged to conduct a release planning review (which encompasses the development and release of a segment of software). This optional approach to tailoring a technical review is depicted in figure 3. Outside of technical reviews, DHS updated acquisition policy in February 2019 and associated guidance in May 2019 to allow programs greater flexibility in the larger ALF. The Director of Strategic Technology Management (STM) stated that, under the previous acquisition policy and guidance, IT programs were using in-house expertise due to limited funding to prepare for the 2B decision, when full program funding was received. He noted that, by the time a contract was awarded for development following a 2B decision, the contractor might or might not have been using planning artifacts developed by the program and instead might have recreated them, thereby rendering 2 to 3 years of work useless. The Director stated that programs were unable to fully flesh out the program architecture and other key aspects of the program because programs did not receive funding until the 2B decision and in-house expertise was limited. For example, if a program had not proven out its architecture prior to a 2B decision, it could continue to refine and modify the architecture during the course of development, thereby impacting productivity and quality. DHS updated acquisition management policy and guidance to modify the requirements for the acquisition decision events and addressed a related GAO recommendation. DHS policy and guidance also allowed for programs to modify requirements over the course of development. The traditional process for requirements may be modified as part of tailoring the SELC in order to allow for increased flexibility. The DHS Requirements Engineering User’s Guide detailed requirements engineering steps, activities, and methods for performing those steps. DHS developed this user guide to supplement SELC policy and guidance. One section of this guide focused on Agile development. According to the guide, requirements are broken down over the course of the ALF and commitments are made at different levels of specificity. Fundamental capability gaps are defined in the mission needs statement presented at acquisition decision event 1. Subsequently, the analyze/select phase would ultimately define the high-level features and functions of each required capability, define the fundamental performance of those high- level features and functions, and establish the business case to support approving the acquisition at an acquisition decision event 2A. Often, a preliminary concept of operations is developed and delivered with the mission needs statement. The guide also states that the activities to evaluate these potential alternatives will ultimately result in a preferred solution with defined business practices, methods, and processes that allow the development of business epics and associated architecture epics. Business epic is an Agile term that defines the high-level “stories” that describe a capability, or what the new system is required to perform. Architectural epic is an Agile term that defines the architecture the system will be incorporated into. In addition, the preferred solution would have defined high-level performance requirements (stated from the operational perspective) in terms of how well the solution must perform to be operationally effective and suitable. Key constraints such as security, Section 508 compliance, privacy, reliability, etc., should also be identified. These top-level requirements will be documented in the operational requirements document. According to the guide, Agile teams capture the capabilities and constraints (essentially the functional and non-functional requirements that reflect the business epic level of performance) in an artifact called the capabilities and constraints document. Requirements statements in this document should follow the standard “shall statement” format for ease of translation between the operational requirements document and the capabilities and constraints document. The capabilities and constraints document and its contents mature over time and, as the document matures, business and architectural epics decompose to features/functions or themes, and ultimately to user stories that reflect the specific tasks that users will perform. Officials within the DHS Joint Requirements Council noted that headquarters involvement occurred at this level to approve the high-level operating requirements. After headquarters oversight and approval, the program may then decompose requirements as part of planning for and executing technical reviews. If tailored into an Agile program, the capabilities and constraints document should drive the development of a backlog. The backlog is a list of all the user stories that describe what the system needs to do. The backlog should become more refined as the program decomposes the high-level features (a service that fulfills a user need) and functions down to specific stories that an individual software developer will code and test during a specific iteration. To prevent the backlog from becoming unmanageable, DHS guidance stated that backlogs may be established at different levels. For example, the business and architectural epics along with the associated operating requirements would constitute the “program backlog.” Sub-epics are usually broken down into “high-level features” with business epics broken down into business features and architectural epics broken down into architectural features. Features or functions are decomposed into detailed stories that are then allocated to a “release”. The list of user stories in a specific release constitutes the release backlog. This process of decomposing stories continues to the iteration backlog. DHS guidance places an emphasis on end user needs. The Requirements Engineering User’s Guide raised the importance of identifying stakeholders, including system users, and capturing the needs of those users via requirements or, in the case of Agile, user stories. The Agile instruction manual placed an emphasis on the importance of users to a program and articulated that the product owner represent the user community and was expected to continually seek ongoing feedback and elicit requirements from users. The Agile core metrics also strongly recommended the use of a net promoter score. This score was one mechanism for measuring customer satisfaction through asking users to rank how likely they would be to recommend the system or application to a friend or colleague, based on a score of 1 to 10. Clearly align goals and objectives Program goals should clearly reflect stakeholder needs and concerns based on input from stakeholders and stakeholder review and approval. Program goals should align with strategic IT objectives. Software-related goals should be defined and clearly aligned with program goals. The agency should collect objective measures that are well defined to track progress towards achieving software goals so the agency knows which features and capabilities have been achieved. The Requirements Engineering User’s Guide described program expectations for tracing from mission needs to operating and functional requirements, or user stories. The guide recognized that, as a program progressed through the ALF and SELC, it was important to trace requirements from the top-level mission needs or capabilities and/or business requirements down to the system/sub-system, component, or configuration item level that enabled those requirements to be met. This helped ensure continuity across various DHS artifacts, such as the program’s mission need statement, concept of operations, and operational requirements document, to vendor specifications (or applicable equivalent artifacts). Although an Agile program will modify the SELC to accommodate its needs, generally programs were expected to follow the same conceptual approach to the requirements of planning, development, and management. The user’s guide stated that collaboration among the various stakeholders was important and the program requirements team must continuously work to establish partnerships and networks. To do so, the guide stated that the program team must identify all individuals and organizations that may be impacted by their program and ensure those stakeholders were engaged throughout development to facilitate understanding of their perspectives and needs. The first step was to identify applicable stakeholders, which would include end users, program sponsors, developers, maintainers, trainers, and other affected individuals or organizations. The program requirements team then solicited input from these stakeholders to understand their needs, policies, processes, and operations to begin the requirements definition effort. It identified some ways a team might begin the process of eliciting requirements from the stakeholders. After collaborating with stakeholders, the stakeholder needs must be translated into the program requirements, or goals. The guide stated that the program requirements team should take the inputs from the various stakeholders and decompose, prioritize, de-conflict, and validate the needs identified. It clarified that a “good” requirement was achievable, testable, clear, concise, technology-independent, feasible, and able to stand alone. The guide grounded all of the requirements elicitation and development process in the overall contribution to the agency mission, recognizing the need for general strategic alignment. In particular, the guide noted that requirements were “mission need” driven as opposed to “solution” driven. Requirements were developed throughout the life of a program, with the first formal requirements being the operating requirements documented in the operational requirements document. To ensure that DHS’s mission or strategic goals were key inputs for decision making, DHS relied, in part, on its enterprise architecture process. DHS policy for enterprise architecture stated that the enterprise architecture program provided a vehicle to tie the strategic mission goals and objectives of DHS to the business processes, information resources, and technology investments necessary to reach key performance outcomes. This methodology was intended to integrate IT into the mission and strategic priorities of DHS, which provided the core foundation for all subsequent processes. DHS capital planning and investment control guidance reinforced this fact, stating that the Federal Acquisition Streamlining Act of 1994 required capital investments to align with mission and strategic goals. This included the framework within which the department formulated, managed, and maintained its portfolio of investments as critical assets for achieving success in the DHS mission and alignment to the DHS IT Strategic Plan and the DHS Strategic Plan. Cascading sponsorship for Agile software development Senior stakeholders should support and model the use of Agile, along with its values and principles, through explicit policy or guidance impacting the business and should take steps to complete responsibilities defined in agency Agile policy or guidance. Agile should also be supported in all relevant areas of the business impacting a software development project through the use of Agile sponsors. These sponsors should represent the lines of business in key agency decisions on Agile. Senior stakeholders at DHS demonstrated support for Agile through the publication of policy and guidance that established Agile development as the department’s preferred approach for software development. As discussed previously, the department published Instruction 102-01-004 Agile Development and Delivery for Information Technology (Agile instruction), which provided the scope, definitions, roles and responsibilities, and procedures to establish an Agile framework for the development of IT acquisitions at DHS. Specifically, the Agile instruction established responsibilities for the CIO, the Chief Procurement Officer, the Chief Financial Officer, the Director, Office of Test and Evaluation within the Science & Technology Directorate, and the Executive Director of PARM. Each of these five stakeholders and their associated components demonstrated their support for Agile development by taking steps to complete their responsibilities defined in the Agile instruction. For example, the Office of the Chief Information Officer (OCIO), the Office of the Chief Procurement Officer, and the Director, Office of Test and Evaluation within the Science and Technology Directorate all had responsibilities related to providing guidance for the implementation of Agile within their specific area of expertise. All three components had taken steps to execute these responsibilities, such as by publishing the Agile instruction manual, providing supplementary guidance for test and evaluation in an Agile environment, and offering elective training on contracting strategies for Agile services. Representatives from offices with a role in software development also supported Agile via membership in the IT Program Management Center of Excellence (ITPM COE). In addition to the stakeholder organizations identified in the Agile instruction, the ITPM COE membership included representatives from the Joint Requirements Council and the Chief Privacy Officer. According to the ITPM COE charter, the ITPM COE served as a cross-functional team to identify and promote best practices, provide tools, and coordinate assistance for programs and projects to maximize the successful management of DHS IT investments. This included making progress towards the 18 Agile action plans that resulted from the Agile acquisition pilots. The ITPM COE membership requirements called for representatives of the member organizations to be involved in key decisions regarding Agile. According to the Director of STM within OCTO, ITPM COE members were selected and approved by their organization’s executives. The ITPM COE charter stated that these representatives must be authorized to represent or make decisions on behalf of their officers or organizations. Officials from all ITPM COE member organizations expressed support for the ITPM COE and confirmed that their component was appropriately represented in decision making. This was represented, in part, by the fact that at least one representative for each ITPM COE member group attended at least half of the meetings. For example, at least one representative from the Science and Technology Directorate attended approximately 95% of the meetings. Sponsor understanding of Agile software development Sponsors should understand and communicate changes resulting from Agile development. Sponsors should attend training or receive coaching on Agile and the agency’s framework, the agency should monitor completion of training, and sponsors should transmit learning from training to staff. Sponsors should also commit to achieving those intended results and sponsor performance should be tied to achieving those intended results. The Director of STM stated that Agile sponsors were considered to be chief executive officers (e.g. Executive Director of PARM and the Deputy Under Secretary for Management). They oversaw the actions of the ITPM COE and approved the Agile action plans in June 2017. DHS did not ensure that Agile sponsors attended training or received coaching in Agile development. The department made training available for Agile, including courses such as those required for acquisition professionals. However, in a written response, the Office of the Chief Human Capital Officer stated, and the Director of STM confirmed, that the department did not administer mandatory training on Agile for Agile sponsors. The department also did not monitor the completion of sponsor training in Agile. Although DHS employees leveraged the Federal Acquisition Institute Training Application System to track their training and certifications, the department was not using this system to monitor sponsor training in Agile. According to a written response from the Office of the Chief Human Capital Officer, the department did not keep a record of whether sponsors completed training in Agile because the department did not require Agile training specifically for sponsors. DHS Agile sponsors exhibited support for achieving the intended results from the transition to Agile. Agile sponsors committed to achieving these results through an endorsement of the 18 Agile action plans and the associated implementation plans. However, DHS did not demonstrate that Agile sponsor performance was tied to achieving the intended results of the transition to Agile. According to a written response from the Office of the Chief Human Capital Officer, the department’s employee performance management policy did not specifically address Agile. This written response further stated that addressing Agile in these policies was unnecessary because the Office of the Chief Human Capital Officer incorporated goals derived from project plans in individual performance plans. DHS policy and guidance for performance management identified individual performance goals as a component of employee performance, but the department did not provide evidence that specific performance plans for the sponsors were linked to such goals. Establish an environment supportive of Agile software development Team dynamics should be facilitated through access to common team rooms and/or modern communication and social media methods and headquarters infrastructure operations should allow for communal spaces and co-location in program offices. A headquarters technical environment should allow access to tools by programs to foster distributed communication, and there should be a process for continuous feedback on the Agile environment and modifications to that process (e.g. communities of practice, routine working group sessions). Agency governance bodies should allow programs greater autonomy and flexibility within existing acquisition processes through the modification of gate reviews and other touchpoints in the acquisition process for Agile projects and increased transparency for governance bodies into project operations when necessary. DHS policy and guidance allowed for team dynamics to be facilitated through access to common team rooms and modern communication methods. In addition, department policy promoted and allowed program offices to support team dynamics through the use of communal spaces and co-location. Specifically, the Director of Systems and Information Integration within the Chief Readiness Support Office confirmed that DHS had modified policy related to infrastructure operations to allow any office to reorganize their space, citing the USCIS Transformation program as an example of this reorganization. The Director of Systems and Information Integration also noted that he was not aware of any restrictions to this practice in policy. With respect to facilitating access to modern methods of communication, DHS offered programs the option of using a suite of tools that included those for distributed communication. DHS took multiple steps to establish a process for continuous feedback related to the department’s Agile environment and process modifications. According to the Director of STM, OCIO built support for Agile through the Centers of Excellence, communities of interest, brown bag lunches, and public speaking engagements. The Director added that these sessions facilitated the discussion of Agile and could be used to compile feedback. The Director of STM explained that, as this feedback came in, it was either addressed immediately or put into a backlog. Efforts to further streamline the acquisition process were tracked via Agile action plan 6. The department’s governance bodies also increased transparency into project operations when necessary. The Agile Development and Delivery for Information Technology Instruction Manual (Agile instruction manual) stated that the program or project manager should coordinate with the various oversight bodies that govern IT development. These bodies varied depending on the level of investment, but, for major programs, executive steering committees were often established to oversee all aspects of program planning and execution between major acquisition decision events. In addition, PARM officials stated that DHS increased the frequency of acquisition review board reviews and modified the content presented at the reviews to allow it to be more actively involved with projects earlier in the acquisition life cycle. Specifically, PARM updated the Acquisition Review Board slide templates and informed us of its intent to update acquisition management policy to require Agile projects to hold Acquisition Review Board reviews once every six months, as opposed to once every 12 months. Align incentives and rewards to Agile methods The agency should establish an incentive and reward structure promoting team successes and the value of individuals within those teams. Management should establish agency goals to align incentives and rewards with Agile methods. Goals for incentives and rewards should align with the agency’s goal(s) and focus on team success. The agency should allocate incentives and rewards based on team success. DHS did not establish an incentives and rewards structure that promoted team successes and did not demonstrate that management had established agency goal(s) to align incentives and rewards with Agile methods. Furthermore, the department did not demonstrate that human resources and others were actively involved in setting goals for incentives and rewards alignment. DHS guidance specifically discussed contract incentives for Agile projects. For example, the Agile instruction manual suggested that consideration be given to address the duration of the base term and options, scalability, deliverables, and pricing with a mindset that contractors need appropriate incentives to encourage them to perform well. The manual also stated that contract award terms could provide a greater incentive for contractors working on longer-term Agile projects. Although the department made efforts to adapt incentives and rewards for contractors supporting Agile projects, it acknowledged that it did not update existing incentives and rewards for federal employees working on Agile projects. Officials within the Office of the Chief Human Capital Officer stated that existing human capital and performance plan policy allowed for rewarding and incentivizing Agile teams as well as individuals. These officials further noted that DHS had numerous opportunities to recognize and reward team or individual performance, regardless of the development methodology a program relied on. Specifically, these officials clarified that the Office of the Chief Human Capital Officer used project plans to set goals and included those goals in employee performance plans. As these officials felt the existing performance plan policy was sufficient, they did not believe additional guidance or modifications to existing policy were necessary. Guidance is appropriate for Agile acquisition strategies Agency acquisition policy and guidance should support awarding contracts for the unique needs of an Agile program. Acquisition strategies should recognize the need for interim delivery of software, allow for close coordination between the contracting office and program office staff, and allow for changing requirements and contract oversight mechanisms to be tailored to support Agile development methods. DHS offered guidance for preparing acquisition strategies through its Procurement Innovation Lab. Webinars offered by the Procurement Innovation Lab on acquisition strategies for Agile programs discussed the need for interim delivery of software, close coordination between contractors and program office staff, contract oversight mechanisms that were tailored to support Agile development, and changing requirements. For example, the “Transportation Security Administration Agile Services Procurement” webinar discussed planning, executing, and de-briefing technical demonstrations used to select the contract recipient, paying particular attention to the value of transparency and modifying contract oversight mechanisms. Officials from the Office of the Chief Procurement Officer clarified that the webinars were available as needed and were not required training. DHS also published Agile guidance that discussed contracting and acquisition strategies. From an oversight perspective, according to the Agile instruction manual, DHS executive steering committees oversee all aspects of program planning and execution between acquisition decision events. This authority extends to assisting programs in developing acquisition strategies where appropriate. The manual included a section that specifically called out Agile contracting considerations that pointed back to Office of Management and Budget Contracting Guidance to Support Modular Development, the TechFAR handbook, the Digital Services playbook, and innovative contracting case studies. Among other useful information in the Agile instruction manual were key contracting considerations for an Agile program or project manager. These considerations included, among other things, frequent, iterative deliveries of software, an ability to monitor changes to maintain contract and project scope, flexibility to accommodate refinement of requirements, transparency and collaboration, and prior experience in the Agile methodology. The manual also highlighted goals for the acquisition to discuss with a contracting officer, such as rapid contracting processes to keep pace with Agile development, contracting to accommodate incompletely defined scope and requirements, and the ability to respond to requirements changes without requiring extensive change orders. According to officials within OCTO and the Office of the Chief Procurement Officer, the department also supported Agile programs in preparing acquisition strategies through the IT acquisition review process. This process was established to provide a mechanism for the DHS Chief Information Officer to review and guide agency IT expenditures. The process was intended to analyze IT acquisitions to ensure alignment with DHS missions, goals, policies, and guidelines. This process relied on subject matter experts to assist in the review of IT acquisitions, including one for Agile reviews. According to the IT Acquisition Review Essentials Guide, Agile reviews occurred where software was being developed to ensure development activities adhered to Agile best practices and DHS SELC guidance. The Agile subject matter expert was expected to review acquisition materials against an established set of criteria for both the acquisition plan and the requirements document. For example, when reviewing the acquisition plan for approval, the subject matter expert should consider if the statement of need adequately addresses Agile or iterative project-specific activities and/or deliverables. The Director of STM stated that there is one staff member in STM who actively participates in the IT acquisition review process and was responsible for ensuring Agile language was correctly implemented in contract statements of work. The Director also added that they were willing to help teams that were having trouble providing explanations of Agile processes in their statements of work. The Director of STM stated that there was no policy to guide his staff member reviewing Agile language in the statement of work, but that he asked his division to put together a checklist review to govern this process. The Director added that the department sent programs and projects requiring assistance with Agile contracting to the Procurement Innovation Lab by request to streamline the acquisition plan. According to the Leader of the Procurement Innovation Lab Team, the Office of the Chief Procurement Officer was primarily focused on supporting Agile pilot programs, such as the Federal Emergency Management Agency Grants Management Modernization program. The team leader noted that, while the procurement office supported these programs, it relied on the program offices to ensure accuracy. For example, the program management office ensures that the requirements are structured and delivered, which could be challenging for Agile programs. The team leader mentioned that a particular focus at the moment was defining the pricing for contract line item numbers in such a way as to afford the flexibility needed for Agile development while still holding contractors accountable. This appendix describes in greater detail our evaluation of the three leading practices for program processes when adopting Agile development. It does not present new findings; rather, the information is intended to assist the Department of Homeland Security (DHS) in implementing the recommendations described in this report. Program processes refer to leading practices related to the program office and technical environment. For programs to successfully transition from processes used for traditional development projects, programs should ensure that staff are appropriately trained in Agile methods by ensuring Agile teams have the appropriate technical expertise needed to perform their roles technical environments enable Agile development through making technical and project support tools available, and designing a system that supports iterative delivery project planning controls are compatible with Agile methods by maintaining a sustainable development pace and tracking and defining and incorporating non-functional requirements in defining and incorporating critical features in development The department develops an environment that supports these processes. Within DHS, program management offices are responsible for planning and executing individual programs and implementing applicable Agile methodologies. In addition, the DHS Office of the Chief Information Officer (OCIO) is responsible for setting policies and procedures to ensure that programs leverage Agile development best practices to meet the department’s goals and are within acquisition policy. The DHS OCIO is also responsible for providing guidance for and reviewing the adoption and execution of Agile development. Train all program staff in Agile methods The agency should provide a training program in Agile for staff and track and monitor the training. All members supporting the team, not only the software development team, should be trained in the specific Agile framework they will be using. DHS required its acquisitions workforce to take training that incorporated Agile methods. DHS Instruction 102-01-006, Acquisition Program Management Staffing, established certifications for key acquisition career fields, which included training requirements. According to the Associate Director for Training from the Homeland Security Acquisitions Institute, the certification requirements included training that has been updated to incorporate Agile methods. Specifically, the department updated course content for AQN 101: DHS Fundamentals of Systems Acquisition to include Agile development concepts, such as small team management and Agile metrics, following the issuance of department policy governing Agile development. This course was required training for seven of the acquisition career fields, including program and project managers, systems engineers, and test and evaluation managers. DHS tracked and monitored the completion of training requirements for the acquisitions workforce. According to DHS Directive 064-04, Acquisition Professional Career Information, component acquisition executives were responsible for ensuring that acquisition personnel met the mandatory training requirements. Officials from the Homeland Security Acquisitions Institute within the Office of the Chief Procurement Officer stated that DHS employees leveraged the Federal Acquisition Institute’s training application system to track their training and certifications. According to the catalog of product services of the institute, members of the DHS acquisition workforce were required to attach copies of their training certificates to request certification of completion of the required training. Because the DHS acquisitions workforce may not cover all personnel staffed to Agile projects, some program staff may not be subject to training requirements that incorporate Agile methods. According to the Director of the Homeland Security Acquisition Institute, certain Agile team members, such as the product owner, were not necessarily classified as part of the acquisitions workforce. For example, according to the U.S. Immigration and Customs Enforcement (ICE) Student and Exchange Visitor Information System (SEVIS) program staffing plan, the product owner role was not part of the acquisitions workforce and did not require any certifications. To help address the Agile training needs of all staff, including those who are not part of the acquisitions workforce, DHS also provided elective training in Agile methods. The department offered commercial training through the Homeland Security Acquisition Institute, such as acquisition of Agile services and Agile requirements for creating user stories. The DHS Agile instruction manual also identified training offered by the U.S. Citizenship and Immigration Services Office of Information and Technology as another resource on Agile concepts, such as user stories and automated testing. In addition to elective training, the Agile Development and Delivery for Information Technology Instruction Manual (Agile instruction manual) encouraged program managers to seek out an Agile coach to help teams adopt Agile methods and supplement training. The instruction manual suggested that program managers should identify an Agile coach to serve as an embedded trainer, consultant, and team advisor. This Agile coach could help the team adapt Agile methods to their environment and work through challenges. An Agile coach could also help individual team members understand the responsibilities of their role on an Agile team. Although DHS did not provide coaches for Agile teams, the department offered resources that could help programs select and obtain an Agile coach. First, the department established a blanket purchase agreement for programs to acquire Agile development support in the form of hands- on coaching services for the design and use of Agile methods. According to Homeland Security Acquisition Institute officials, this agreement would enable programs and projects to acquire Agile coaching. Among other things, this agreement defined the scope of Agile coaching services and their pricing so that programs would not need to develop these terms on their own. Second, the Agile instruction manual included considerations to help program managers select a qualified Agile coach. For example, the instruction manual encouraged program managers to collaborate with contracting officials to identify an Agile coach who had demonstrated successful past performance on projects implementing similar technology and Agile methodologies. The U.S. Customs and Border Protection’s (CBP) Biometric Entry Exit (BEE) program’s Air Exit project provided informal training for new team members that included a discussion of Agile methods. According to the Air Exit project manager in the Office of Information and Technology, new team members received onboarding training that covered CBP’s approach to Agile methods. The project did not track attendance for this onboarding training, but an Air Exit project manager noted that team members were incentivized to attend the training in order to learn how to satisfy their responsibilities. The Scrum master for the Air Exit project stated that this training was also available to the team as a refresher course approximately every fiscal quarter. The BEE program also relied on an Agile coach to support the Agile team. According to the Agile coach supporting the Air Exit project, this role included training for the Agile team on basic Agile topics and working with the team on their use of a project management software tool. According to a project manager within the Office of Field Operations Air Exit project management office, the Agile coach that supported the project was instrumental in designing the CBP Office of Information and Technology’s Agile development program beyond the BEE program. Ensure Agile teams have the appropriate technical expertise needed to perform their roles The agency should have policy or guidance in place to help programs ensure Agile teams have the appropriate technical expertise. A program should also consider Agile-centric skills when forming teams. In addition, programs should define requirements for contractor proposals and evaluate contractor proposals for Agile services (e.g., source selection). DHS guidance provided programs with considerations for forming teams with Agile-centric skills. The DHS Agile instruction manual stated that a development team with experience in Agile practices can mitigate risks to on-time delivery. This experience included Agile processes as well as technical skills, such as automated testing. In the context of the Agile Scrum methodology in particular, the Agile instruction manual stated that teams needed to be cross-functional and have all of the skills required to deliver a project from conception to delivery. To enable teams to deliver a project from conception to delivery, the Agile instruction manual stated that program managers should seek team members with general skills. The manual advised that team members should contribute to routine development activities and possess cross- functional expertise that allows the team to achieve work without depending on individuals outside of the team. For example, in Agile development, testers are part of the development team and should therefore possess both testing and development skills. In addition, the instruction manual stated that, according to industry experts, program managers should seek some overlap in team member’s skillsets to mitigate risks associated with a key person becoming temporarily unavailable. DHS guidance further provided programs with considerations for defining requirements in solicitations for contract proposals for Agile services. For example, DHS supplemental guidance for incorporating testing and evaluation into contract requirements noted that contracts should specify government test and evaluation staff, as well as contractors, on the development team in order to access the test data they need. The DHS IT acquisition review process also helped to ensure that requirements were defined in solicitations for contractor proposals. According to the Information Technology Acquisition Review Essentials Guide, Agile subject matter experts in the department review proposed contracts to ensure that they will enable development activities that adhere to Agile best practices and DHS systems engineering life cycle (SELC) guidance. For example, Agile subject matter experts should assess whether contract requirements documents, such as the statement of work, are prepared in terms that will enable vendors to clearly understand the Agile requirements. The department also provided guidance to assist programs in evaluating contractor proposals for Agile services. The Agile instruction manual noted that programs can consider certifications in various Agile methodologies and recommended that programs coordinate with contracting officials to review vendors’ past performance in implementing Agile methods. In addition, the department established the Procurement Innovation Lab within the Office of the Chief Procurement Officer to help programs address challenges in procuring Agile services, such as validating contractor qualifications. According to a Procurement Innovation Lab team leader, the lab shares lessons learned from Agile services contracts via webinars, which are available to staff on an as-needed basis. Several of these webinars highlighted the value of using technical demonstrations to validate the qualifications of vendors. The ICE SEVIS program provided training for all team members, including contractors, to ensure they had the necessary Agile-centric skills and expertise. A team process agreement for one development module showed that the technical lead, development team, test engineer, and Scrum master roles were filled by contractors, while other positions such as the project manager, product owner, and test automation subject matter expert roles were filled by government employees. According to the ICE SEVIS program manager and Scrum master, the program provided training for contractors that covered Agile processes as well as technical and project management support tools. In addition, some government employees took role-specific training. For example, the program’s test automation subject matter expert completed training in continuous integration and test automation. To further ensure contractors on ICE SEVIS Agile teams had the necessary Agile-centric skills, the ICE SEVIS program defined the Agile methodology and necessary technical expertise for contractors in the contract requirements. For example, the performance work statement for one development module required contractors to use the program’s management software tool to track user stories. The performance work statement also required use of the program’s continuous integration and automated testing tools. The terms and conditions for this contract also identified the required experience for key personnel, such as proven experience working in an Agile environment. The ICE SEVIS program also evaluated contractor qualifications to ensure they had the necessary technical expertise. According to the program manager, contractor qualifications were evaluated in two stages; first, by assessing the contractor’s proposal, and second, by conducting a technical challenge to ensure that contractors could demonstrate the technical skills in the proposal. According to the instructions included in the request for contractor proposals, this technical challenge required the contractor to leverage Agile best practices to design, develop, and demonstrate working software that addressed user stories provided by the program. Although the instructions stated that contractors were required to follow Agile methods, the ICE SEVIS program manager stated that the primary goal of the technical challenge was to assess development skills rather than knowledge of Agile. Agency policy or guidance should call for technical and project tools to be available to support Agile development and for system design that will support iterative delivery. Make technical and project support tools available Project management and technical support tools should be integrated into a program’s technical environment, where appropriate. The tools within this technical environment should be readily available to Agile teams. DHS policy and guidance called for Agile projects’ technical environments to support Agile methods. The department published guidance for standing up technical environments specifically for Agile projects. For example, the DHS Agile instruction manual identified the benefits of using program support tools for tracking program progress, reporting on that progress as part of program governance, and automating tests within an Agile technical environment. The manual stated that a program or project manager is responsible for fostering an environment that enables the Agile team to succeed, including obtaining the appropriate tools. To supplement this guidance, DHS offered a suite of tools that Agile programs could access. The suite of tools was referenced in a checklist of activities for program or project managers in the Agile instruction manual. According to an IT specialist from the Technical Architecture and Engineering division within the Office of the Chief Technology Officer (OCTO), the tools available included program management tools as well as technical tools. The specialist stated that OCTO provided programs with access to this suite of tools to build support for and familiarity with the tools, evaluating any requested plug-ins from programs and doing their best to accommodate them. The ICE SEVIS program defined the technical environment to include technical tools for automated testing and continuous integration. The team process agreement for one of the program’s development modules identified technical tools that supported continuous integration and testing within the program’s technical environment. This included Jenkins for continuous integration as well as MUnit and Soap UI for continuous testing. In addition, the ICE SEVIS Modernization Test and Evaluation Master Plan discussed that tools for helping to ensure code quality, such as an automated code analytics tool, should be used to identify test coverage of code and cybersecurity code vulnerabilities. The program also defined management support tools in the process agreement. Specifically, it identified support tools for tracking and knowledge management, such as JIRA and Confluence. The team process agreement stated that JIRA should be the main knowledge management tool and that all changes, discussion, and history should be tracked in each ticket. This process agreement also stated that JIRA should be the team’s tracking tool with Confluence used to provide transparency. Design a system that supports iterative delivery The agency should adopt policy or guidance that allows project designs to develop modular system components and the program should establish a loosely coupled architecture that allows for modular development. DHS guidance allowed project designs to develop modular system components through upfront architecture planning. The DHS Technical Review Guide advises stakeholders to discuss and approve the technical design of the system, including its top-level architecture, as part of the system definition review. This review should take place prior to development work. For Agile programs, DHS suggested that programs may elect to switch the system definition review with a release planning review. The SELC Tailoring Examples for Selected Types of DHS Acquisition Programs specified that this design discussion should take place as a part of release planning. The department referred to this design as an “architectural runway”, a description that should enable the team to conceptualize how the user stories will be implemented. In exiting the release planning review, the Technical Review Guide noted that programs should answer whether or not an architecture exists, if the architecture enables the deployment of the release, if architecture collaboration is explained and understood for this development process, and if the appropriate resources are available. In addition to transitioning to a release planning review, DHS guidance urged Agile programs to move away from traditional artifacts associated with a system definition review. In this shift from traditional artifacts, the department proposed that programs document software design within a system design document on a release-by-release basis. According to the Requirements Engineering Users Guide, in Agile methodologies detailed design occurs at the iteration level and, as such, the design is documented in an iterative fashion in the system design document. The guide further stated that the system design document allows the development team to communicate the design to others including customers, managers, and other developers and that industry best practice was to represent the design through a series of “design views.” Each software design stakeholder could have a distinct perspective on what are the essential aspects of a software design. Together, these views provide a comprehensive description of the design in a concise and usable form that simplifies information access and assimilation. DHS guidance did not discuss the system design document as a delivered artifact until after the sprint review and demo and a release readiness review had been discussed. At the end of each iteration, DHS guidance stated that the system design document should represent the design of the feature, function, and/or system as it existed at that moment. To facilitate communication between Agile teams and to ensure the most up-to-date description of the design is available, guidance called for the system design document to be developed and maintained in an electronic form using any number of programs or web tools that are available. The Requirements Engineering Users Guide noted that the system design document is to be considered complete when each identified design concern is the topic of at least one design view, all design constraints have been applied, and sufficient detail exists to be an authoritative and primary “code-to” artifact. The system design document should also provide traceability to the feature, epic, and operational requirements document “shall” statements. The SELC Tailoring Examples for Selected Types of DHS Acquisition Programs stated that, prior to releasing software to the production environment, a release readiness review should be conducted. As part of this guidance, the department stated that the intent of this release readiness review included ensuring that all elements of the release were complete, including a system design document. DHS guidance also discussed designing a loosely coupled architecture, another important aspect of project design that facilitates modular development. A member of the contractor support staff for the DHS OCIO stated that the Enterprise Architecture Team was expected to consider modularity and loose coupling generally through consideration of technical complexity. According to DHS Enterprise Architecture principles, technical complexity is to be mitigated in part by the implementation of loose coupling. According to the principles, DHS will incorporate loose coupling into architecture and systems design to minimize the risk resulting from changes within one system necessitating changes within an interoperable system. The BEE Air Exit project design document defined the planned design for the system and addressed design and architectural concerns that could affect the system’s operating environment. As part of this design consideration, the project established a loosely coupled architecture. This loosely coupled architecture was illustrated within the project’s system design document. This system design document defined the Traveler Verification Services software as consisting of two distinct components: 1) traveler verification services core and 2) traveler verification services matcher. The functionality and responsibility of these two components were distinguished throughout the document. Moreover, the document detailed how the Traveler Verification Services software would be delivered as a system of applications, combining an integration layer, business layer, data access layer, and data layer. Agency policy or guidance should call for teams to maintain a sustainable development pace and track and monitor that pace and for non-functional requirements and critical features to be defined and incorporated in development. Maintain a sustainable development pace and track and monitor that development pace The agency should have policy or guidance that calls for Agile projects to establish a sustainable development pace. This guidance should be supplemented by tracking and monitoring the pace. The program should establish a sustainable pace for Agile projects and that pace should be tracked and monitored. DHS guidance called for Agile projects to manage the pace of the software development. The Agile instruction manual stated that Agile projects should consider velocity and burndown rates to track the overall project status and update the project plan to reflect this status. In a separate appendix, the Agile instruction manual also identified metrics for project and program managers and executives to consider in order to monitor how a project was progressing, how Agile was optimizing the use of team members and resources, and where the project stood in terms of key Agile measures. In the list of Agile metrics, DHS highlighted burndown rate and velocity, and offered a description and method of calculation for each. In addition to the Agile instruction manual, the department provided training that spoke to development team pace. For example, the curriculum for lesson six of course APM 350 on managing program execution included a section covering Agile development metrics. Among the metrics discussed were those associated with progress, including velocity and burndown charts. Progress metrics were also covered in other course offerings. However, DHS guidance and training materials did not cover the concept of ensuring a sustainable pace. In order to track and monitor the development team’s pace, the department incorporated several related measures into the Agile core metrics. Among others, programs executing Agile were expected to report on the following pace-related metrics after each iteration: story points planned to be completed, number of production deployment per quarter, and average product deployment lead time. These measures could provide programs and the department with an understanding of the development team’s pace and the extent to which it was or was not sustainable. However, the department was not tracking and monitoring development team pace as intended. The Agile instruction required Agile programs to submit Agile core metrics within six months of the instruction’s publication. However, according to the Director of STM, programs were not consistently reporting these core metrics. According to the Director of STM, the department was still working with programs to ensure they consistently reported the core metrics to the Investment Evaluation, Submission, & Tracking system. The SeaWatch project at the United States Coast Guard (USCG) demonstrated that it was monitoring development pace on a monthly basis. SeaWatch officials stated that they used TAIGA as a tool to manage the overall project and to auto-calculate pace. Additionally, SeaWatch officials stated that contractors delivered a monthly progress report, which contained the accomplishments of each team and a snapshot from the latest TAIGA report. For example, one monthly report for SeaWatch included a burndown chart for the SeaWatch project’s development backlog and the monthly output of user stories and associated story points by development effort that could be used to assess development pace over time. SeaWatch officials stated that the teams used velocity to help plan for the next iteration. Officials added that they tracked the collective velocity of all four teams as they were all working together on the same ship build. In the future, officials stated that this tracking of velocity could also be used to track individual team velocities as necessary. The project demonstrated that it was adapting in order to achieve a sustainable pace. According to the April 2018 monthly report, the team completed 55 user stories worth 500 story points. The following month, in the May 2018 monthly report, the number of user stories dropped from 55 user stories to 17, worth 130 story points. According to the June 2018 monthly report, the team completed a development effort of 31 user stories and 278 story points. According to the SeaWatch acquisition manager, development pace fluctuated because not all sprints were of equal difficulty. The acquisition manager added that the number of completed story points per sprint could also be inconsistent due to inaccurate user story estimates, changes in staff availability from sprint to sprint, and other external factors such as weather. Define and incorporate non-functional requirements in development The agency should have policy or guidance in place for incorporating non-functional requirements for Agile projects and the program should account for non-functional requirements, such as security and privacy, in the program strategy and throughout development. DHS guidance addressed the incorporation of non-functional requirements for Agile projects. According to the Technical Review Guide, non-functional requirements could be governed via a system definition review. According to the guide, this review was required at the end of the requirements definition phase to focus on the completeness of the requirements engineering activities, including the gathering, analysis, and documentation of functional and non-functional requirements. This review assessed the traceability of these requirements to the operational requirements document and concept of operations. In the case of Agile programs, DHS suggested replacing the system definition review with a release planning review. In place of traditional artifacts associated with a system definition review, DHS guidance stated that the capabilities and constraints document, backlogs, and the system design document, which are developed iteratively throughout the release, should document the requirements and provide traceability to the operational requirements document. These artifacts served the function and filled in for the functional requirements document and the system requirements document previously required for a system definition review. The Technical Review Guide noted that, as the capabilities and constraints document matures, business and architectural epics should decompose to features or themes, and, ultimately, user stories that reflect the specific tasks that users will perform. The Technical Review Guide cited as exit criteria that a program or project should answer whether the capabilities and constraints document identified the specific features and non-functional requirements to be addressed in the release. DHS requirements engineering guidance expanded on how Agile programs and projects could manage non-functional requirements. The guidance explained that there were various ways that the constraints or non-functional requirements such as security, Section 508 accessibility, privacy, or reliability could be translated down to the iteration level. It stated that some Agile teams may include these non-functional requirements in the backlog, while other teams may include them as part of acceptance criteria or in an artifact called the “definition of done”. According to officials from the Science and Technology Directorate Office of Systems Engineering, once defined, the day-to-day operations and testing for non-functional requirements were the responsibility of the operational test agent. DHS maintained some governance over non-functional requirements. According to the DHS acquisition management instruction, the operational requirements document should be approved by the Acquisition Decision Authority after validation by the Joint Requirements Council. The operational requirements document should include both the functional and non-functional requirements. Officials from the Office of the Director of Test and Evaluation said that they do not usually provide feedback on the decomposed functional or technical requirements for software development projects, focusing only on the operating requirements, because that is what directly impacts operations. The CBP BEE program’s functional requirements document outlined a series of non-functional requirements as the requirements used to define how the system is to behave as opposed to functional requirements that define what the system should do. The project included 10 non-functional requirements in the functional requirements document. For example, the biometric match service should have an overall availability of greater than or equal to 99%, which included both scheduled and unscheduled downtime. These ten non-functional requirements comprised five related to availability, three related to reliability, one related to scalability, and one related to security. All of these non-functional requirements were scheduled for release as part of the initial operating capability. CBP officials noted that non-functional requirements were also captured within the operational requirements document as measures of effectiveness. According to project officials, measures of effectiveness and other security-related parameters translated into the key performance parameters for the project. Officials noted that these key performance parameters were tracked on a daily basis and that information was fed into a monthly report. The operational requirements document stated that the program’s suitability requirements conformed to the DHS and CBP enterprise architectures and all DHS and CBP infrastructure policies and guidelines. Moreover, it noted that National Institute for Standards and Technology guidance and DHS guidance factored into the development of security related non-functional requirements. For example, system security controls should be compliant with National Institute of Standards and Technology and DHS sensitive system guidelines based on its Federal Information Processing Standard 199 rating for availability, integrity, and confidentiality. Define and incorporate critical features in development The agency should have policy or guidance in place for incorporating critical features for Agile projects. The program should ensure that its strategy considers all mission, architectural, and critical safety components, along with their dependencies, on a regular basis. DHS policy and guidance addressed the incorporation of critical features for Agile projects. As discussed in the non-functional requirements section, programs were expected to document functional requirements via the systems design review or, as recommended for Agile programs, a release planning review. Artifacts associated with these reviews served to capture the functional requirements for the program and should be evaluated as part of the entrance and exit criteria defined in the technical review guide. Additional guidance elaborated on the process for decomposing requirements. Unlike non-functional requirements, applicable exit criteria on critical features expanded into the solution engineering review. This criteria included questions devoted to critical features and how they tied back to performance measures (e.g. key performance parameters). According to the Director of STM, headquarters oversight of critical features was limited to the higher-level requirements defined in the operational requirements and concept of operations documents. The ICE SEVIS program captured critical features in documents required by department acquisition management policy and guidance. The ICE SEVIS Modernization Concept of Operations listed specific functional capabilities associated with mission and mission support scenarios. The ICE SEVIS Modernization Operational Requirements document expanded on these functional capabilities and identified the operational and program-level requirements. These requirements were necessary to achieve the performance goals and mission of the Student and Exchange Visitor Program and the Department of State, the primary sponsors for the program. In particular, the SEVIS Modernization Operational Requirements document identified business capabilities and key performance parameters that measured system capabilities. The core capabilities are long-term initiatives intended to span multiple contracts and deliver the major components necessary for SEVIS modernization. The SEVIS Modernization Operational Requirements document stated that these capabilities must be present for the SEVIS modernization to be considered a success. These business capabilities represented the core SEVIS functions needed to close outstanding SEVIS vulnerabilities. According to the ICE SEVIS Modernization SELC Tailoring Plan, there were 79 sub-capabilities supporting the eight core capabilities. The sub-capabilities generally fulfilled one or more stakeholder needs and were delivered within a release or series of releases. The SEVIS Modernization Operational Requirements document confirmed that the program should prioritize and sequence the capabilities for delivery during the release planning and delivery processes. The program provided a road map for one development module. This road map listed areas for development in the order they were intended to be developed and identified the associated business capabilities. The business capabilities identified in the road map aligned with the sub- capabilities listed in the SEVIS Modernization Operational Requirements document. Examples of business capabilities in the road map that were also sub-capabilities identified in the operational requirements document included: create nonimmigrant record (including supporting forms), align nonimmigrant eligibility information with unique nonimmigrant, update nonimmigrant biographical information, and add/update dependent information. This appendix describes in more detail our evaluation of the three leading practices for team activities and dynamics when adopting Agile development. It does not present new findings; rather, the information is intended to assist the Department of Homeland Security (DHS) in implementing the recommendations described in this report. For teams to successfully transition from processes using traditional software development methods to Agile methods, leading practices for team activities and dynamics recommend that the composition of the team supports Agile methods by defining the role of a product owner work is prioritized to maximize value for the customer through creating user stories to define work prioritizing requirements in a backlog based on value estimating the relative complexity of user stories repeatable processes are in place by meeting daily to review progress and discuss impediments ensuring the quality of code being developed Within DHS, program management offices are responsible for planning and executing individual programs and implementing applicable Agile methodologies. According to Office of the Chief Technology Officer (OCTO) officials, DHS contracts for Agile services, including development, rather than performing development in-house. As a result, Agile teams may be predominantly contractors rather than federal employees. In addition, DHS Office of the Chief Information Officer (OCIO) is responsible for setting the policies and procedures to ensure that programs and, in turn, the teams that make up those programs, leverage Agile development best practices to meet the department’s goals and are within acquisition policy. DHS OCIO is also responsible for providing guidance for and reviewing the adoption and execution of Agile development. Agency policy or guidance should require individual, self-organizing Agile teams for each segment or iteration and define the role and responsibilities of the product owner. Agile teams should be self-organizing, meaning they are empowered to collectively control how to accomplish their work and the resulting product. An Agile team’s authority should include lower-level decision making and team formation and highlight the importance of team stability. The team’s composition should be cross-functional and consist of members who possess all the skills needed to produce working software, including, but not limited to, contract specialists, developers, and testers. DHS provided guidance to Agile teams on self-governance. The Agile Development and Delivery for Information Technology instruction (Agile instruction) and the Agile Development and Delivery for Information Technology Instruction Manual (Agile instruction manual) both explain that collaborative, self-organizing, and cross-functional teams help achieve the flexibility needed for the iterative development that characterizes Agile development methods. The Agile instruction manual notes that most Agile methodologies assume the dedicated involvement of all stakeholder, developer, and integration staff throughout the project. DHS guidance also discusses team formation. The Agile instruction manual recommends that the project team include the roles of the program or project manager, a product owner, a development team of approximately five to nine members, testers, and an Agile coach, and any additional expertise as needed. According to DHS guidance, a program or project manager is responsible for establishing the project team. The program or project manager is supported in this by the component acquisition executive and other component management. At DHS, U.S. Immigration and Customs Enforcement’s (ICE) Student and Exchange Visitor Information System (SEVIS) program had self-organizing teams that defined their own processes for completing work. ICE Agile teams, including those supporting the SEVIS program, were expected to document their processes in a team process agreement, where a team had the authority to define its own operational strategy and make decisions about the product, including when to consider the product completed according to the program’s “definition of done.” According to the ICE Agile principles instruction, a program chooses a baseline set of practices that are documented in a team process agreement and are adjusted over time. ICE SEVIS teams were self-managing and included the roles necessary to deliver what they committed to in a sprint. ICE’s Agile playbook suggested minimum levels of experience, knowledge, and certifications necessary for key personnel to support Agile methodologies. For instance, the playbook suggests that Scrum masters be certified and have a minimum of one year of experience. To help ensure that contractors have the requisite skills necessary, ICE SEVIS officials stated that vendors are required to demonstrate their ability to develop a small software application before a contract is awarded to them. Define the role of a product owner A product owner should understand the business and strategic values of the agency and its alignment with the vision of the product team and support Agile methods. A product owner’s responsibilities include availability to the team, authority for making programmatic decisions, general responsibilities as a member of the team, and the need to possess subject matter expertise related to the business needs. A product owner is an authoritative user who manages the requirements prioritization, communicates operational concepts, and provides continual feedback to the team. DHS provided guidance on the role and responsibilities of a product owner. According to the Agile instruction manual, the product owner is responsible for representing stakeholders. To do so, the product owner should be available to the development team throughout the iteration to answer questions and clarify requirements on behalf of the stakeholders. The manual stated that the product owner is also responsible for ensuring that the product meets user needs and delivers value. This includes, for example, prioritizing user stories in the backlog and serving as an acceptance authority for work completed by the team. The department also provided elective training on the role of a product owner. For example, the U.S. Citizenship and Immigration Services Office of Information Technology offered an elective product owner training course. The USCIS product owner training covered concepts such as the importance of the product owner’s availability to the team and the product owner’s authority for making programmatic decisions. ICE identified a product owner for SEVIS to represent two user communities. The program identified one product owner from ICE’s Student and Exchange Visitor Program and a second product owner from a stakeholder organization within the Department of State. Both product owners were identified in the ICE SEVIS staffing plan. According to a team process agreement for one development module, a product owner is responsible for, among other things: Prioritizing and deciding which user stories will be implemented in each iteration. Making an acceptance decision for each user story based on the story’s acceptance criteria. Ensuring that the intended value of the functionality is delivered. According to program officials, product owners for the ICE SEVIS program prioritized user stories during planning sessions. The Student and Exchange Visitor Program Agile Overview slides stated that the team, including the product owner, attends sprint planning to review the prioritized product backlog and to ensure a common understanding of the product owner’s immediate priorities. Product owners also exercised authority to validate acceptance criteria and subsequently close user stories. The program’s “definition of done” stated that the product owner must test and indicate acceptance of each user story in order for a user story to be considered complete. In a written response, ICE SEVIS officials stated that ICE SEVIS product owners indicated a user story had met the acceptance criteria and could be closed by changing the user story’s status to “closed” using the team’s program management software tool. In addition, product owners were available to the development team to ensure timely input. According to a team process agreement for a development module, the product owner should work closely with the development team to communicate the details of requirements and answer questions about user stories. In an interview, the ICE SEVIS product owner representing the Student and Exchange Visitor Program stated that the role was a full-time position and did not have any competing responsibilities. To ensure availability, the ICE SEVIS product owner representing the Student and Exchange Visitor Program stated that there was a designated backup who had the same authority and responsibilities as the full-time product owner. Agency policy or guidance should call for Agile teams to create user stories to define the work; prioritize requirements in a backlog based on value, including tracking and monitoring the value of work accomplished; and estimate the relative complexity of user stories. Individual Agile teams within the respective programs and projects should implement these aspects of Agile development. Create user stories to define work A user story is to reflect a small segment of work that can be completed in a single iteration. The agency should have policy or guidance in place for writing user stories for Agile projects. The product owner should determine the value of a user story in consultation with the development team, including the acceptance criteria and defining what “done” means. User story value should then be re-evaluated based on requirements to ensure the greatest return on investment. DHS provided guidance that Agile programs and projects could leverage when writing a user story. The Agile instruction manual, Homeland Security Acquisition Institute Agile lessons, such as “Managing Program Execution” and the Requirements Engineering User’s Guide provided a basic format for how to craft a user story. These resources noted that a user story defines where a “role” wants some “goal/desire” accomplished to result in a “benefit”. The Requirements Engineering User’s Guide also discusses the role of acceptance criteria and a definition of done in user story development. The guide highlighted that acceptance criteria defines the boundaries of a user story and confirms when a story has been completed and is working as intended. It specifies that acceptance criteria should be included in an Agile program or project’s capabilities and constraints document, a DHS artifact unique to Agile development and highlighted in the systems engineering life cycle (SELC) tailoring example for Agile. This guide added that the definition of done identifies all of the activities/artifacts besides working code that must be completed for a feature or sub-epic to be ready for deployment or release including testing, documentation, training material development, certifications, etc. The Agile instruction manual places much of the responsibility for defining a user story under the purview of the product owner. The Agile instruction manual stated that the product owner is the individual tasked with providing requirements to the development team and is responsible for determining the features necessary for the product release. The manual also emphasized that the product owner is only responsible for clarifying the user story requirements that would meet his or her needs and not responsible for clarifying how user stories should be implemented to meet those needs. The ICE SEVIS program developed user stories based on business capabilities and other requirements as determined by the product owner and the business stakeholders. The SEVIS Modernization Operational Requirements Document describes eight business capabilities that represent core SEVIS functions. According to ICE SEVIS officials, these business capabilities are addressed through user stories, so there is traceability in the backlog from user stories to epics to business capabilities/operating requirements. The team’s process agreement for one development module—Information Sharing—assigned responsibility for writing user stories to the product owner. This agreement also noted that acceptance criteria would be required for most stories. User stories for the program were managed through a program management software tool. An output of the backlog from the program management software tool for one development module—Managing Nonimmigrant Information—contained 525 user stories. These user stories generally followed DHS and ICE guidance for capturing what a user needs and why. Most of these user stories also included acceptance criteria. The program also developed a “definition of done” for all user stories in the team process agreement. According to the definition, a user story was “done” when the following steps were addressed: All code to meet the story’s needs was written according to the system’s development standards. Unit tests were written and run successfully. All code was checked in and the build completed successfully. All database changes (if required) were complete and checked in (a functional test could be run). The software had been deployed to the system test environment and passed system tests. The product owner agreed that the implementation met the acceptance criteria written in the story as appropriate. All documentation required to support the story was completed (test cases, interface updates, etc.) Prioritize requirements in a backlog based on value Agile teams should pull work from a prioritized backlog and provide frequent deliveries of software with immediate value to the user. The team should determine the value of the user stories, prioritize work in a product backlog, and provide an ongoing assessment of value expected versus value delivered. The value of the work accomplished by Agile projects should be tracked and monitored. DHS guidance called for prioritizing user stories in a backlog. The department published an example of a SELC tailoring plan for Agile development that encouraged programs and projects to prioritize user stories in a backlog as part of each release. To ensure that programs or projects took these steps, the Technical Review Guide exit criteria for the release planning review asks if programs or projects will have a process in place for prioritizing user stories prior to the development of features for each release. Planning sessions were one such process that programs and projects could use to prioritize user stories in the backlog. The DHS Agile instruction manual stated that, during sprint planning, the product owner meets with the development team in order to identify user stories from the backlog that should be prioritized for the upcoming sprint and that prioritization decisions should be made based on value to the users. In addition, the product owner should ensure that prioritization decisions maximize mission values. The Requirements Engineering User’s Guide also states that requirements should be prioritized based on continuous stakeholder input so that programs can prioritize what users need the most. DHS guidance also discussed how to determine the value of individual user stories. While the Director of STM said that the product owner is responsible for interpreting the concept of value as it applies to a user story and the relative prioritization of the backlog, Agile Requirements and Road Mapping Guidance for DHS includes a discussion on how a program can sequence its road map for learning, risk, and economic value. In this section, DHS offers models to consider to assist in user story prioritization decisions and considerations for the product owner, such as seeking to balance between business value and cost. The Director added that there were venues, such as Agile “chat and chews,” where program staff could ask questions and receive informal guidance. DHS modified acquisition procedures to allow for an ongoing assessment of progress, and indirectly the value of work accomplished, via the release road map. DHS guidance stated that the release road map is submitted to the Acquisition Review Board prior to acquisition decision event 2B, as required by the Agile instruction. The Technical Review Guide exit criteria for the release planning review and the release readiness review asked if the development team was following the release road map and making adjustments that supported the successful completion requirements defined at acquisition decision event 2B. Thereafter, programs submitted a road map to the Acquisition Review Board during regular program reviews. In addition to tracking and monitoring the value of work accomplished against a release road map, regular Acquisition Review Board program reviews allowed for the assessment of value expected versus value delivered. The presentation template for Acquisition Review Board program reviews included a slide for programs to report their progress toward planned features. For each review, programs identified a percentage of each capability that they planned to complete by the next review. In addition, programs reported on the percentage of each capability that they had completed since the last review. The U.S. Coast Guard (USCG) SeaWatch Agile teams prioritized requirements in a backlog based on the team’s ability to complete them within a sprint. According to the acquisition manager for the Command, Control, Communications, and Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) program, the SeaWatch product owner for new development determined priorities for new requirements with stakeholders. The product owner then defined those requirements as an epic or as a user story. The C4ISR acquisition manager stated that the user stories were prioritized in the backlog during sprint planning primarily based on whether the Agile team could complete the work in the upcoming sprint rather than on the value assigned by the stakeholders. According to SeaWatch officials, user stories that could not be completed during the current sprint were marked as a priority item for the next sprint. Although the SeaWatch program assessed value to the user for some epics, this did affect how the epic or its associated user stories were prioritized in the backlog. The C4ISR acquisition manager stated that SeaWatch assigned a value (e.g. extra large, large, or medium) to an epic based on the epic’s value to the user. However, the acquisition manager noted that user stories were not typically prioritized by the value of the associated epic. User stories were instead prioritized based on the Agile team’s ability to complete the work within the current sprint. The project reported on its accomplishments via a road map. In May 2018, SeaWatch reported on progress toward milestones in its road map during an annual briefing for the Non-Major Acquisition Oversight Council. The program reported that it had installed SeaWatch v3.0 on 65 out of 70 in-service cutters. Estimate the relative complexity of user stories The agency should have policy or guidance in place for relative estimation practices for Agile projects. Teams should use relative estimation for sizing the effort of work required to satisfy a user story by estimating its complexity based on work of similar size and complexity. Relative estimation enables teams to maintain a sustainable software development pace and predict work commitments. The team should size user stories relative to one another, assess the complexity of the work, refine user stories and estimates over time, and use prior estimates to inform future estimates. The product owner and team should continually revisit the estimates as they learn more about the business priorities and as user stories rise in the order of priority. DHS did not provide policy or guidance for relative estimation. Although the Agile instruction manual identified estimating user story size as an integral part to sprint planning, it did not describe the specific techniques or processes for estimating the relative complexity of user stories. Instead, the Agile instruction manual discussed how programs could successfully apply traditional earned value management and cost estimating principles to Agile projects. DHS guidance noted that programs had largely moved from measuring story points to feature points to help programs quantify incremental progress The U.S. Customs and Border Protection’s (CBP) Biometric Entry Exit (BEE) program defined practices and guidelines for how the program expected to estimate user stories. For example, the Traveler Verification Services process definition document identified a formula for calculating story point values on the basis that one story point would equate to approximately four working hours. Moreover, the process definition document noted that story points must be reconciled to better reflect the level of effort and task completion at the end of a given sprint. However, it was not evident that the BEE program had implemented its own guidance on the estimation of story points. Although the process definition document outlined procedures for estimating user stories, only two of 358 user stories in the Air Exit project backlog were estimated using story points. Agency policy or guidance should call for Agile teams to meet daily to review progress and discuss impediments, and to observe end-iteration demonstrations and end-iteration retrospectives. In addition, agency policy or guidance should call for Agile projects to employ continuous integration and confirm mechanisms are in place to ensure the quality of code being developed. This includes setting expectations for automated testing and code quality and tracking and monitoring against these expectations. Responsibility for these aspects of Agile development should lie with the individual Agile teams. Meet daily to review progress and discuss impediments The agency should have policy or guidance in place for holding the daily stand-up and teams should hold daily meetings in order to stay on track to meet the iteration goals for Agile projects and adjust as necessary. DHS guidance defined the general procedure for holding a daily stand-up. The Agile instruction manual stated that teams should conduct a daily stand-up meeting for all team members. It can be conducted in person or via another method of communication (particularly for remote employees) for a brief, informal meeting every work day. According to the manual, all team members should discuss the work each has accomplished since the last daily stand-up, the work to be accomplished by the next daily stand- up, and highlight any impediments that are preventing the team members from completing their work. Additionally, the manual suggests that it is necessary to conduct the daily stand-up with strict discipline, so that the meetings stick to their allotted brief time and are consistently productive. The Agile instruction manual also highlighted the importance of the daily stand-up meeting to an Agile process. It called this meeting an essential collaboration event during which all team members were expected to participate and discuss their work. The manual suggested that holding these meetings allowed the team to practice discipline that would assist them in their work and foster mentoring and partnering relationships within the team that were reinforced through the constant communication of meeting every single day. The manual added that this activity allowed the team to hold its members accountable and be made aware of issues that may be mitigated through collaboration. The Traveler Verification Services team supporting the BEE program Air Exit project at CBP held daily stand-up meetings. According to project officials and supporting project artifacts, a daily stand-up meeting was held each day at 10:00 a.m. Project officials noted that the daily stand- ups included the entire 40-person team. The agency should have policy or guidance in place for holding demonstrations or other interactions for acceptance of user stories in Agile projects. Teams should hold frequent demonstrations to showcase features that have been implemented and obtain feedback for acceptance of user stories in Agile projects. DHS guidance defined the general procedure for holding an end-iteration demonstration or review. In the SELC Tailoring Plan example for Agile development, DHS recommended a sprint review and demo as one type of technical review at the end of each iteration. The purpose of the review was to demonstrate the working software to end users and other stakeholders and to obtain feedback that could result in additional items being added to the backlog. It stated that this review should also ensure that the software design was documented for inclusion in the system design document, a proposed DHS Agile-specific artifact. The tailoring example noted that this review should formally end the iteration’s work with no further development or testing occurring on any stories. The Agile instruction manual added that this demonstration should confirm the value of the incremental piece of software produced. DHS guidance also encouraged the use of demonstrations. The Agile instruction manual states that a demonstration or review could be used to reach a consensus on whether the work associated with a user story met expectations or not. The manual also recommended that program and project managers ensure that the functional software developed during each iteration was demonstrated to the stakeholder at an iteration review meeting. The ICE SEVIS program held end-iteration demonstrations. The ICE SEVIS Modernization Systems Engineering Lifecycle Tailoring Plan stated that sprint demonstrations were tailored into the program to replace other review activities, such as the preliminary design, critical design, and integration readiness review. The Test and Evaluation Master Plan for SEVIS Modernization stated that standard sprint testing results were to be reported at sprint reviews. According to program artifacts, the sprint demonstration was to be conducted at the completion of each sprint, every other Wednesday from 11:00 a.m. to 12:00 p.m. The agency should have policy or guidance in place for holding a retrospective to adapt and continuously improve on Agile projects. Teams should hold a retrospective at the end of each iteration to identify areas for improvement to adapt and continuously improve Agile practices. DHS guidance defined the general procedure for holding a retrospective. The program or project manager and team reviewed progress after each iteration and release. This included the use of a retrospective to discuss what went well, what didn’t go well, and to identify actions to correct problems. Guidance noted that the team should immediately incorporate feedback from the retrospective into future iterations. The DHS Agile instruction manual highlighted the importance of the retrospective. The manual stated that the end-iteration retrospective is a key part of ensuring that teams following Agile methodologies are able to identify problems and adapt to continuously improve for future sprints. Additionally, the manual stated that end-iteration retrospectives are useful in satisfying governance needs. For example, the Agile instruction manual stated that programs could tailor standard-format SELC artifacts (as codified in the SELC Tailoring Plan) to instead rely on assessment and performance data addressed in end iteration retrospectives. The Traveler Verification Services team supporting the BEE program’s Air Exit project held end-iteration retrospectives. According to the process definition for this team, a retrospective was to be held between the end- iteration review and the subsequent planning session for the upcoming sprint. The process definition defined the goal of the retrospective as obtaining an honest review of the process with a consensus on how to adapt it. In an interview, project officials noted that the team documented the results of retrospectives on a release-by-release basis in a project management software tool. The agency should have policy or guidance that defines and emphasizes the use of automated testing and continuous integration. This guidance should be supplemented by defining expectations for automated testing and tracking and monitoring against these expectations. Agile teams should adopt practices for continuous integration and automated testing to ensure that software handoffs are repeatable and dependable. Automated testing should be tracked and monitored based on established expectations. The DHS Agile instruction manual defined continuous integration as the practice where delivery teams frequently integrate their code into a shared master copy. It noted that these integrations are verified by an automated build process, which performs testing to detect any integration errors quickly and automatically. The manual stated that continuous integration in Agile projects should be planned and recorded on a release-by-release basis. The Agile instruction manual also emphasized the importance of continuous integration and automated testing. With regard to automated testing, the manual set an expectation for program or project managers and stakeholders to consider both automated testing tools and infrastructure support for the Agile software build and test processes as part of general project planning efforts. Moreover, the manual identified continuous integration, automated acceptance testing, and automated unit testing as key practices program or project managers can use for continuously monitoring and reporting project health. These practices could also help to identify opportunities for improving project team performance. DHS officials acknowledged that current DHS programs implemented testing and evaluation inconsistently and that the department’s existing guidance and policies did not effectively support modern best practices in automated testing and continuous integration. To address these gaps, DHS had an Agile action plan that set an expectation for updating DHS acquisition guidance, policy, and practices for testing and evaluation to enable modern best practices in automated testing and continuous integration. In lieu of more explicit guidance, DHS incorporated training as part of a curriculum geared toward test and evaluation managers that discussed both continuous integration and automated testing. According to the Deputy Director of Policy and Workforce Development in the Test and Evaluation Division of the Science and Technology Directorate, an alternative course containing content addressing Agile and continuous integration and automated testing was recently merged with a required test and evaluation course, creating a new course. According to the Deputy Director, the new course was piloted during fiscal year 2019 and will be standard in fiscal year 2020 as the required course for level II test and evaluation certification. In order to track and monitor automated testing, the department incorporated several measures into the Agile core metrics. Programs executing Agile were expected to report on the following testing-related metrics after each iteration: Percentage of unit test coverage, Percentage of automated tests, and Percentage of regression testing coverage. DHS had not established expectations for these Agile core metrics. The Agile core metrics included a target. For example, the department suggested a program strive for seventy percent of tests to be automated. However, the instructions accompanying the Agile core metrics stated that all targets were notional and not expected to be reached. According to the Director of STM, the initial core metrics were intended to assess the level of DHS team achievement without imposing artificial industry- based target measures for each. The Director stated that, on receiving the metrics for a period of time, the department would then adjust the core metrics and begin to include target measures based on the results achieved. According to the Director, this effort was underway and an updated set of core metrics would be distributed in early fiscal year 2020. Moreover, the department was not tracking and monitoring automated testing as intended. The CBP BEE program Air Exit project stood up a technical environment that allowed for continuous integration. This technical environment was outlined within the process definition of the Traveler Verification Services team that was developing software. The Traveler Verification Services process definition identified three operating environments: the development, test, and production environments. All development activities during the sprint were conducted within the development environment. Similarly, all testing activities in preparation for the release were conducted in the test environment. The final approved software would then be deployed to the production environment. CBP officials noted that the BEE program primarily used Jenkins to integrate code for both continuous builds and deployment. The Air Exit systems design document also mentioned the role of Jenkins in continuous integration and continuous deployment for the project. The Traveler Verification Services team incorporated JaCoCo and FindBugs automated tests as part of the continuous delivery process and they were run automatically when the code was checked in. Moreover, the project’s system design document noted that the Traveler Verification Services team integrated JaCoCo with the Eclipse Integrated Development Environment as a code coverage inspection tool for unit testing. Officials also noted that Selenium was used for automating the testing within the technical environment. Ensure the quality of the code being developed The agency should have policy or guidance for an Agile project on ensuring the quality of code being developed. This guidance should be supplemented by defining expectations for code quality and tracking and monitoring against these expectations. Agile teams should adopt practices for code quality, such as having a test-driven development, pair programming, and manual code reviews to supplement automated testing. Agile teams should incorporate refactoring into code quality practices and understand the importance of setting aside time for refactoring. DHS guidance recognizes the importance of ensuring code quality as part of the development and testing process. The SELC Guidebook set an expectation that code review and testing should be part of the software development environment. The guide recommended setting up servers where developers could test code and check whether the developed application runs successfully with that code. The guide suggested another level of tests on application reliability to help ensure that the application did not fail on the production server. The guide stated that the program manager should ensure that the team takes corrective action for any hardware and software deficiencies. In order to find deficiencies early, DHS guidance identified coding and testing practices that could help development teams. The Agile instruction manual cited pair programming as one practice where two programmers work simultaneously on a single task: one programmer observes and reviews each line of code as it is written. DHS guidance also identified test-driven development as a practice that could motivate developers to write effective code. The Supplemental Guidance for Test and Evaluation stated that this approach consists of writing test cases that define a desired improvement, then writing the code to meet the desired functionality, ensuring that the test passes, and refactoring the code as necessary. Refactoring, or re-coding, without changing the way the application functions, is an Agile practice that DHS guidance recommends for correcting deficiencies in the code. The Agile instruction manual stated that refactoring aims to improve code readability and reduce the complexity of previously delivered increments of software. It noted that refactoring is important because development teams are focused on adding the desired functionality with each release and may proceed with making improvements to the code. Refactoring was cited as one way to address this accumulation of needed improvements to the code, which are known as technical debt. The Agile instruction manual further emphasizes the importance of setting aside time for refactoring to address risks associated with technical debt. The manual states that refactoring a previously developed increment of software to improve code quality may force a change in the release schedule. However, if the team does not make these revisions in a timely manner, the effort required to correct them later tends to increase. The manual states that this increasing technical debt is a risk factor to be addressed as soon as feasible. If the technical debt is allowed to accumulate unchecked, or if the project team loses track of the scope of its technical debt, the project could suffer from schedule and performance problems. In order to track and monitor the quality of code being developed, the department incorporated several code quality and testing measures into the Agile core metrics. Among others, programs executing Agile were expected to report on the following quality-related metrics after each iteration: Number of critical or major defects fixed. Number of critical or major defects in the backlog. Number of technical debt issues completed. Number of technical debt issues in the backlog. However, the department was not tracking and monitoring code quality as intended. These measures could provide programs and the department with an understanding of the development team’s ability to address defects and technical debt. In addition to these metrics, programs are also expected to report quarterly on the number of outages requiring a rollback or patch after production deployment. The ICE SEVIS program used manual testing to ensure code quality. The definition of done for the program stated that new code should be peer reviewed to identify risk to the existing code, assess compliance with coding best practices, and evaluate refactoring. According to ICE SEVIS officials, an independent specialist provides internal code reviews and offers feedback on areas for improvement. The ICE SEVIS program also employed automated testing to ensure code quality. The definition of done required that unit tests cover a minimum of 85 percent of code. Program officials stated that vulnerabilities and bugs identified through this process were added to the backlog and classified as technical debt. The program refactored code to address technical debt, but did not set aside time for refactoring each sprint. According to ICE SEVIS officials, the development team refactored code as necessary to improve overall quality but did not set aside time for refactoring unless they were addressing a consistent issue. ICE SEVIS officials stated that the development team could propose refactoring code during sprint planning if there was a specific technical debt they had identified. However, according to the Scrum master for the program, addressing technical debt was additional work for the team to take on beyond the user stories they planned to complete and this additional work incentivized the development team to prevent the accumulation of technical debt. Although DHS allowed Agile programs to tailor the core metrics, ICE SEVIS submitted some of the code quality-related Agile metrics to the department. The program included Agile metrics in June 2018 presentation slides for the Acquisition Review Board. For this initial reporting period, the program reported no critical or major defects in the backlog and no technical debt issues in the backlog. It also provided a screenshot of the Agile core metrics reported to DHS via the Investment, Evaluation, Submission, & Tracking system in February 2019. This reporting period covered two iterations. The program reported that it fixed four critical or major defects during the first iteration and did not have any critical or major defects in the backlog for either iteration. The program also reported that it completed eight technical debt issues in the first iteration, out of 14 technical debt issues in the backlog. The program did not report on the number of outages after deployment as part of the Acquisition Review Board program review or as part of the metrics submitted via the Investment Evaluation, Submission, and Tracking system. In addition to the contact named above, the following staff made key contributions to this report: Michael Holland (assistant director), Mathew Bader (analyst in charge), Lamis Alabed, Jennifer Beddor, Christina Bixby, Hannah Brookhart, Chris Businsky, Alan Daigle, Aryn Ehlow, Nancy Glover, Gina Hoover, Anna Irvine, Hoyt Lacy, Jennifer Leotta, Alexis Olson, Zsaroq Powe, Martin Skorczynski, Natalie Smith, and Daniel Spence.", "summary": "Many of DHS's major IT acquisition programs have taken longer than expected to develop or failed to deliver the desired value. In April 2016, to help improve the department's IT acquisition and management, DHS identified Agile software development as the preferred approach for all of its IT programs and projects. GAO was asked to examine DHS's adoption of Agile software development. The objective of this review was to assess the extent to which DHS has addressed selected leading practices for its transition to the use of Agile software development. GAO identified leading practices for planning, implementing, and measuring organizational change that apply to DHS's transition to Agile through its review of guidance published by the Project Management Institute and GAO. GAO also reviewed work it performed to develop leading practices for Agile software development adoption. GAO analyzed DHS documentation, such as policies, guidance, plans, and working group artifacts and assessed them against the selected leading practices. GAO also reviewed the implementation of selected practices within individual IT projects. Finally, GAO interviewed DHS officials to discuss any practices that were not fully implemented. The Department of Homeland Security (DHS) has taken steps to implement selected leading practices in its transition from waterfall, an approach that historically delivered useable software years after program initiation, to Agile software development, which is focused on incremental and rapid delivery of working software in small segments. As shown below, this quick, iterative approach is to deliver results faster and collect user feedback continuously. DHS has fully addressed one of three leading practice areas for organization change management and partially addressed the other two. Collectively, these practices advise an organization to plan for, implement, and measure the impact when undertaking a significant change. The department has fully defined plans for transitioning to Agile development. DHS has partially addressed implementation—the department completed 134 activities but deferred roughly 34 percent of planned activities to a later date. These deferred activities are in progress or have not been started. With respect to the third practice, DHS clarified expected outcomes for the transition, such as reduced risk of large, expensive IT failures. However, these outcomes are not tied to target measures. Without these, DHS will not know if the transition is achieving its desired results. DHS has also addressed four of the nine leading practices for adopting Agile software development. For example, the department has modified its acquisition policies to support Agile development methods. However, it needs to take additional steps to, among other things, ensure all staff are appropriately trained and establish expectations for tracking software code quality. By fully addressing leading practices, DHS can reduce the risk of continued problems in developing and acquiring current, as well as, future IT systems. GAO is making 10 recommendations to DHS to implement selected leading practices for its transition to Agile software development. DHS agreed with GAO's recommendations and described actions taken and planned to address them.", "document_type": "gao"}
{"report": "Civil aviation, including U.S.-bound flights, remains a target of coordinated terrorist activity. In the last 2 years, we issued reports on TSA’s foreign airport and air carrier inspection programs (December 2017), assessments of Cuban aviation security (July 2018), and TSA’s process for reviewing security directives and emergency amendments that apply at last point of departure airports (October 2019). Foreign airport assessments and air carrier inspections. In December 2017, we reported that TSA had taken steps to enhance its foreign airport assessments and air carrier inspections since 2011, including aligning resources based on risk, resolving airport access issues, making evaluations more comprehensive, and creating operational efficiencies. For example, we found that TSA had implemented targeted foreign airport assessments in locations where risk was high and developed a system to strengthen its data analysis capabilities. However, we also found that TSA’s database for tracking the resolution status of security deficiencies did not have comprehensive data on security deficiencies’ root causes and corrective actions. In addition, the database lacked adequate categorization mechanisms such as capturing subcategories that would better explain the root causes of security deficiencies. We recommended, among other things, that TSA fully capture and more specifically categorize data on the root causes of security deficiencies that it identifies and corrective actions. To implement this recommendation, TSA developed a tool to capture airport vulnerability data and provided training to staff in the use of the tool and developed guidance that delineates updated categories for root causes in its data systems. Cuban aviation security. In July 2018, we reported on TSA’s efforts to ensure the security of air carrier operations between the United States and Cuba. We found that TSA’s inspections and assessments in Cuba generally followed standard operating procedures, but TSA did not inspect all air carriers at its own established frequency. We recommended that TSA improve its ability to identify certain air carriers requiring inspection in Cuba and develop and implement a tool that more reliably tracks their operations between the United States and Cuba. In response to our recommendation and as required under the TSA Modernization Act, TSA developed several tools and processes that corroborate and validate flight schedule data. For example, TSA developed a tool to analyze aggregate flight data and validate or identify service to the United States from international locations and began issuing monthly reports on unscheduled operations to its inspectors responsible for Cuba. By taking these steps, TSA is better able to identify operations requiring inspection and corroborate and validate flight schedule data. Security directives and emergency amendments. When threat information or vulnerabilities at foreign airports indicate an immediate need for air carriers to implement additional security measures, TSA may issue new or revise existing security directives (for domestic air carriers) and emergency amendments (for foreign air carriers). The TSA Modernization Act includes a provision for us to review the effectiveness of the TSA process to update, consolidate, or revoke security directives, emergency amendments, and other policies related to international aviation security at last point of departure airports. As of March 2019, there were 46 security directives and emergency amendments (i.e., directives) in effect related to air carrier operations at foreign airports. Earlier this month, we reported that TSA reviews directives, but its process does not fully define how to coordinate with industry representatives and TSA has not determined if it is appropriate to incorporate the security measures of many longstanding directives into air carrier security programs in accordance with TSA policy. Representatives from four domestic air carriers stated that coordination with TSA on directives has improved. However, representatives from six air carriers and two associations indicated that TSA has issued revised directives that are vague or difficult to implement because TSA did not sufficiently involve them in the review process. This contributed to TSA officials offering different interpretations of aircraft cabin search requirements. Further, TSA policy states that directives are not intended to be permanent and are expected to eventually be canceled or incorporated into security programs. Our analysis found that TSA issued more than one half (25) of the directives prior to 2014, meaning they have been in effect for more than 5 years. Several have been in effect for more than 10 years. We recommended, among other things, that TSA better define how to coordinate with air carriers when reviewing directives and when to cancel or incorporate longstanding security directives and emergency amendments into security programs. TSA agreed with our recommendations and plans to develop a process for more formal and consistent coordination with air carrier and industry association stakeholders and consideration of directives for cancellation or incorporation into security programs. Public area security. In November 2013, an armed individual entered the Los Angeles International Airport, firing multiple shots killing a transportation security officer and injuring two others and a passenger. As a result of this and subsequent airport attacks, TSA co-hosted a series of security summits with stakeholders and published the Public Area Security National Framework in May 2017 outlining a series of best practices and recommendations to secure airport pubic areas. The TSA Modernization Act requires TSA and the DHS Cybersecurity and Infrastructure Security Agency to establish a public area security working group to promote collaboration between TSA and public and private stakeholders to develop non-binding recommendations for enhancing security in public areas of transportation facilities. The Act also requires TSA to periodically share best practices developed by TSA and transportation stakeholders related to protecting public spaces of transportation infrastructure from emerging threats. In March 2019, TSA officials established the public area security working group to engage with stakeholders to validate and update the best practices that were developed in the 2017 Public Area Security National Framework. The working group consisted of security stakeholders from both aviation and surface transportation modes. In October 2019, TSA officials told us that they plan to issue an updated list of best practices in the fall of 2019. Insider threats. Recent incidents involving aviation workers misusing their access privileges have heightened concerns regarding the risk of insider threats at airports. TSA estimated in 2018 that there were approximately 1.8 million people with unescorted access to secured areas of the nation’s airports. We have ongoing work examining the actions TSA, airport operators, and air carriers have taken to mitigate concerns regarding insider threats at airports and the extent to which TSA’s Insider Threat Program is guided by a strategic plan. Additionally, the TSA Modernization Act requires TSA, in consultation with the Aviation Security Advisory Committee to conduct a study examining the cost and feasibility to airports, airlines, and TSA of implementing enhanced employee inspection measures at all access points between non-secured areas and secured areas of certain airports. We will review this study once submitted by TSA. Screening rule changes. In 2010, TSA began identifying passengers for enhanced screening who are not known or suspected terrorists, but who fall within the scope of screening rules. Specifically, TSA identifies passengers for enhanced screening through the application of screening rules, which TSA develops by considering current intelligence and other factors. TSA refers to these rules and lists as Silent Partner and Quiet Skies. Silent Partner rules identify passengers for enhanced screening on inbound flights to the United States. Quiet Skies rules—a subset of the Silent Partner rules—identify passengers for enhanced screening on subsequent domestic and outbound flights. The TSA Modernization Act includes a provision for GAO to review the oversight mechanisms and effectiveness of Silent Partner and Quiet Skies. We found that TSA coordinates reviews of Silent Partner and Quiet Skies through quarterly meetings and notifies an expanded set of DHS and TSA stakeholders—including DHS Traveler Redress Inquiry Program and the Federal Air Marshal Service—of rule changes as required under the Act. We also found that TSA has not identified a means to comprehensively measure rule effectiveness. TSA officials explained that they had not yet fully assessed the rules’ effectiveness because it was difficult to measure. TSA has access to data—such as the outcomes of enhanced screening of Silent Partner and Quiet Skies passengers at airport checkpoints—that could be explored to better assess rule effectiveness. Exploring additional data sources could help TSA refine and supplement the agency’s existing efforts to measure program effectiveness. In our draft report, we recommended that TSA explore additional data sources for measuring the effectiveness of Silent Partner and Quiet Skies rules. TSA is currently reviewing the draft report and is scheduled to provide any comments by early November 2019. To protect the U.S. aviation sector, including the roughly 440 airports it regulates, TSA deploys technologies to screen passengers and their carry-on and checked baggage for homemade explosives and other prohibited items that could, among other things, cause catastrophic damage to an aircraft. The ongoing threat of terrorism requires TSA to continually assess the effectiveness of its screening operations and, when necessary, develop and deploy new screening technologies. The TSA Modernization Act includes a provision for us to review whether TSA allocates resources appropriately based on risk at TSA-regulated airports, among other things. Our review of TSA acquisition documents found that TSA considers risk at the beginning of the screening technologies acquisition process. However, TSA officials could not provide an example of when risk information for specific airports had directly influenced decisions about where and in what order to deploy screening technologies to airports in the recent past. Fully disclosing what risk factors are weighed and how decisions are made could better ensure that TSA’s deployment of screening technologies matches potential risks. We recommended that TSA officials document their assessments of risk and the rationale behind decisions to deploy screening technologies. We also found that TSA does not ensure that screening technologies continue to meet detection requirements after they have been deployed to airports, when performance can degrade over time. According to officials, the agency uses certification—a step in the test and evaluation process— to confirm that technologies meet detection requirements before they are deployed to airports, and calibration of the technologies to confirm that technologies are at least minimally operational while in use at airports. They stated that these processes are sufficient to assure TSA that screening technologies are operating as intended. While these processes serve important purposes, they do not ensure that screening technologies continue to meet detection requirements after they have been deployed because performance can degrade over time. Developing and implementing a process to ensure technologies continue to meet detection requirements after deployment would help ensure that TSA screening procedures are effective and enable TSA to take corrective action if needed. In our draft report, we recommended that TSA develop and implement a process to ensure technologies continue to meet detection requirements after deployment. TSA is currently reviewing the draft report and is scheduled to provide any comments by early November 2019. The TSA Modernization Act includes a provision that we review resources provided to TSA surface transportation programs and the coordination between relevant entities related to surface transportation security. According to our analysis, TSA Surface Programs received $123 million in fiscal year 2017 and $129 million in fiscal year 2018. The surface program appropriation represented about 1.6 percent of TSA’s total appropriation in both fiscal years, according to DHS data. We also found that in fiscal years 2017 through 2019, TSA reported using surface program resources for non-surface activities. For example, in fiscal year 2018, TSA reprogrammed $5 million from the Surface Programs account to Mission Support activities to address security requirements and increase hiring of transportation security officers. Further, we found that TSA could improve internal coordination roles and responsibilities for planning and implementing its voluntary Intermodal Security Training and Exercise Program (I-STEP)—a program intended to engage with system operators and governmental security partners to enhance surface transportation security. For example, officials from TSA’s office that provides intelligence briefings during program exercises stated that they do not typically participate in planning meetings because they are not consistently invited to attend. In our draft report, we recommended that TSA clarify roles and responsibilities for all offices involved in the coordination of surface transportation exercises, including when these offices are to coordinate. TSA is currently reviewing the draft of this report and is scheduled to provide any comments by early November 2019. More than 2.7 million miles of pipelines transport and distribute the natural gas, oil, and other hazardous liquids that the people and businesses within the United States depend on to operate vehicles and machinery, heat homes, generate electricity, and manufacture products. Responsibility for safeguarding these pipelines is shared by TSA; the Pipeline and Hazardous Materials Safety Administration (PHMSA), within the Department of Transportation (DOT); and pipeline operators. TSA oversees the security of all transportation modes, including pipelines. PHMSA oversees pipeline safety. DHS and DOT signed a memorandum of understanding (MOU) on their roles across all transportation modes in 2004, and an Annex to the MOU in 2006 to further delineate their pipeline security-related responsibilities. The TSA Modernization Act includes a provision for GAO to review DHS and DOT roles and responsibilities for pipeline security. We reported in June 2019 that key pipeline security documents need to better reflect the current operating environment. For example, the MOU Annex has not been reviewed to consider pipeline security developments since 2006. As a result, the MOU Annex may not fully reflect the agencies’ pipeline security and safety-related activities. We reported that by developing and implementing timeframes for reviewing the MOU and updating it, as appropriate, TSA and PHMSA could better ensure any future changes to their respective roles and responsibilities are clearly delineated and updated on a regular basis. In addition, TSA’s Pipeline Security and Incident Recovery Protocol Plan, issued in March 2010, defines the roles and responsibilities of federal agencies and the private sector, among others, related to pipeline security incidents. For example, in response to a pipeline incident, TSA coordinates information sharing between federal and pipeline stakeholders and PHMSA coordinates federal activities with an affected pipeline operator to restore service. However, TSA has not revised the plan to reflect changes in at least three key areas: pipeline security threats (e.g., cybersecurity threats), incident management policies, and DHS’s terrorism alert system. By periodically reviewing and, as appropriate, updating its plan, TSA could better ensure it addresses changes in pipeline security threats and federal law and policy related to cybersecurity, incident management and DHS’s terrorism alert system, among other things. We made five recommendations to address these issues, including for TSA and DOT to develop and implement a timeline for reviewing and updating the 2006 MOU Annex and for TSA to periodically review and update its 2010 pipeline incident recovery plan, as appropriate. TSA and PHMSA have actions under way to address our recommendations. For example, PHMSA officials stated that PHMSA and TSA continue to collaborate on updates to the 2006 MOU Annex. TSA has also developed and provided pipeline operators with voluntary security guidelines, and evaluates the vulnerability of pipeline systems through security assessments. However, in December 2018 we identified some weaknesses and made recommendations to strengthen TSA’s management of key aspects of its pipeline security program. For example, we reported that the number of TSA security reviews of pipeline systems has varied considerably over time. TSA officials stated that staffing limitations— ranging from 1 full-time equivalent in 2014 to 6 from fiscal years 2015 through 2018—within its Pipeline Security Branch have prevented TSA from conducting more reviews. Further, TSA does not have a strategic workforce plan to help ensure it identifies the skills and competencies—such as the required level of cybersecurity expertise— necessary to carry out its pipeline security responsibilities. We recommended that TSA develop a strategic workforce plan. As of October 2019, TSA has not yet fully addressed this recommendation. We will continue to monitor progress. Chairman Correa, Ranking Member Lesko, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals making key contributions to this work include Kevin Heinz, Assistant Director; Paul Hobart, Analyst-in-Charge; Josh Diosomito; Amber Edwards; Michele Fejfar; Melissa Greenaway; Barbara Guffy; Winchee Lin; Tom Lombardi; Michelle Serfass; and Adam Vogt. Key contributors to the previous work discussed in this statement are listed in each of the cited reports. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Threats to the nation's transportation systems persist and continue to evolve. Within DHS, TSA is the federal agency with primary responsibility for the prevention of and defense against terrorist and other threats to the United States' civil aviation, and rail, public transit, pipeline, and other surface transportation systems. The TSA Modernization Act includes provisions intended to enhance security across this broad range of systems and further calls on GAO to review TSA's progress in these areas. This statement summarizes past and ongoing work related to TSA's actions to address selected aviation and surface transportation security areas covered by the TSA Modernization Act. This statement is based on products GAO issued from December 2017 through October 2019 and draft reports currently with TSA for comment. To perform this work GAO reviewed TSA program documents, visited domestic and foreign airports, and interviewed TSA officials, DHS officials, and transportation industry stakeholders, including associations and air carriers. The Department of Homeland Security's (DHS) Transportation Security Administration (TSA) has made initial progress in certain security areas mandated by the TSA Modernization Act, but additional actions are needed. International aviation security. In December 2017, GAO reported that TSA has taken steps to enhance its foreign airport assessments. Since that time, TSA has developed a tool to better track and address foreign airport vulnerabilites. In addition, TSA reviews security directives and emergency amendments it issues to address security concerns. However, TSA's review process does not fully define how to coordinate with industry representatives and it has not determined if it is appropriate to incorporate the security measures of many longstanding directives into air carrier security programs in accordance with TSA policy. In October 2019, GAO recommended, and TSA officals agreed, that TSA better define how to coordinate with air carriers when reviewing directives and when to incorporate directives into security programs. Passenger screening rules. TSA develops screening rules by considering current intelligence and other factors to identify passengers who fall within the scope of the rules for enhanced screening. GAO found that TSA coordinates rules reviews through quarterly meetings and notifies an expanded set of DHS and TSA stakeholders of rule changes as called for by the Act. TSA tracks some data on rule implementation but does not comprehensively measure rule effectiveness. In its draft report, GAO recommended that TSA explore additional data sources for measuring the effectiveness of its rules. TSA is currently reviewing this recommendation. Aviation screening technologies. GAO found that TSA does not ensure that screening technologies continue to meet detection requirements after they have been deployed to airports. According to officials, the agency uses certification—a step in the test and evaluation process—to confirm that technologies meet detection requirements before they are deployed to airports, and calibration of the technologies to confirm that technologies are at least minimally operational while in use at airports. While these processes serve important purposes, performance can degrade over time. In its draft report, GAO recommended that TSA implement a process to ensure technologies continue to meet detection requirements after deployment. TSA is currently reviewing this recommendation. Surface transportation pipeline security . In December 2018, GAO identified some weaknesses and made recommendations to strengthen TSA's management of key aspects of its pipeline security program. For example, TSA does not have a strategic workforce plan to help ensure it identifies the skills and competencies—such as the required level of cybersecurity expertise—necessary to carry out its pipeline security responsibilities. GAO recommended, and TSA concurred, that TSA develop a strategic workforce plan. As of October 2019, TSA has not yet fully addressed this recommendation. We will continue to monitor progress. GAO has made recommendations designed to address the challenges discussed in this statement. TSA concurred with recommendations from prior work and is currently reviewing recommendations from our draft reports, including those regarding passenger screening rules and aviation screening technologies.", "document_type": "gao"}
{"report": "The FHLBank System comprises 11 federally chartered banks. The FHLBanks represent 11 districts and are headquartered in Atlanta, Boston, Chicago, Cincinnati, Dallas, Des Moines, Indianapolis, New York City, Pittsburgh, San Francisco, and Topeka (see fig. 1). Each FHLBank is cooperatively owned by its members––such as commercial and community banks, thrifts, credit unions, and insurance companies. As previously noted, the FHLBank System also includes the Office of Finance, which is the fiscal agent for the 11 banks. As of December 31, 2018, the total amount of assets each FHLBank held varied widely, as did the number of member institutions in each district (see table 1). FHLBanks primarily obtain funding to provide loans to their member institutions by issuing debt. The Office of Finance (also regulated by FHFA) issues the debt on behalf of the FHLBanks. FHLBanks’ debt products include discount notes (short-term debts) and bonds (short- to long-term debts). The debt transactions can vary in size and be conducted by one or more broker-dealers. Additionally, FHLBanks individually invest in permissible securities, including mortgage-backed securities, which generate additional income for the banks. Broker- dealers are compensated in fees for certain transactions they conduct. Generally, the fees a broker-dealer can earn for capital markets transactions depend on the type of the transactions or the broker-dealer’s role in transactions. The Office of Finance identifies and approves broker-dealers for the banks’ debt issuance transactions, including diverse broker-dealers that are minority-, women-, disabled-, and veteran-owned. As part of its approval process, the Office of Finance assesses the broker-dealers based on their track record in conducting certain debt transactions, and reviews documents including broker-dealers’ audited financial statements, documentation on capital sustainability, legal or regulatory issues, diversity certification, procedures, and any other issues that may affect their eligibility or performance. For investment transactions, the banks approve broker-dealers for their own investment needs according to their own qualification requirements. Similar to the Office of Finance’s requirements, the banks’ qualification requirements can include financial performance and capital requirements. To implement requirements in HERA, in December 2010, FHFA issued the Minority and Women Inclusion rule to set forth minimum requirements for FHLBank diversity programs and reporting, as previously noted. Among other things, the 2010 rule required each bank to create its own OMWI or designate an office to perform duties related to the bank’s diversity efforts, and establish policies related to diversity and inclusion, including workforce and business activities (which can include suppliers and broker-dealers used for capital markets activities). The 2010 rule also requires FHLBanks to submit an annual report to FHFA that describes the gender and racial/ethnic composition of the bank’s workforce and of the suppliers and broker-dealers used in business activities and past and future diversity and inclusion efforts in these areas. The 2010 rule also requires the banks to report on businesses owned by individuals with disabilities that enter into contracts with the FHLBank and the number of individuals with a disability or disabilities for certain workforce data, including the number of individuals who separated from the bank and the number of employees promoted. In 2017, FHFA added the requirement for each FHLBank to develop a standalone strategic plan on diversity and inclusion or incorporate a diversity and inclusion plan into their general strategic plan. FHFA conducts annual examinations and off-site monitoring of FHLBanks. FHFA’s examination includes reviewing the banks’ diversity and inclusion efforts, financial reporting, and corporate governance by bank board directors. We previously reported on diversity in the financial services sector, including FHLBank board governance and board diversity. In 2017, we reported that representation of women and minorities at the management level in the financial services sector showed marginal or no increase during 2007–2015. In a 2015 report on FHLBank board governance, we found that FHFA and FHLBanks had taken steps to increase board diversity, including creating regulations that encouraged the banks to consider diversity in board candidate selection and developing processes to identify and nominate independent directors. In a 2019 report on FHLBank board diversity, we found that since 2015, FHLBanks increased the share of women and minority directors on FHLBank boards, but the banks continued to face challenges in increasing diversity among directors elected from member institutions. We recommended that FHFA, in consultation with FHLBanks, review the banks’ data collection processes for board demographic information and communicate effective practices to banks. FHFA agreed with our recommendation. The agency stated that it planned to engage with FHLBank leadership in 2019 to discuss board data collection issues and explore the feasibility and practicability for FHLBanks to adopt processes that could lead to more complete data on board director demographics. Across the 11 FHLBanks, the share of women in senior-management positions increased from 2011 to 2017, while the share of minorities remained about the same. In the FHLBank workforce overall, the share of female and minority employees was similar in 2011 and 2017. Individual FHLBanks reported a number of challenges in recruiting and retaining a diverse workforce, including limited hiring opportunities due to low employee turnover and a small workforce and competition for diverse talent from larger and better-known companies. Despite these challenges, banks have been taking steps to help maintain or increase a diverse workforce. Female representation. The share of women in senior management across all 11 FHLBanks increased by about 7 percentage points from 2011 to 2017 based on the most recently available EEOC data. As shown in figure 2, the percentage of women across 11 banks was about 21 percent in 2011 (35 individuals) and 28 percent in 2017 (47 individuals). While female representation in senior management collectively increased for the 11 FHLBanks from 2011 to 2017, there was substantial variation among the individual banks. We discuss representation at individual banks in more detail later in this section. Six banks increased the share of women in senior management during this time period (ranging from about 10 to 20 percentage points); three banks decreased (from about 6 to 13 percentage points); and the share for two banks did not change. One FHLBank decreased its number of senior-management positions between 2011 and 2017 by reclassifying those positions, while another bank increased the number of senior-management positions through reclassification, according to staff from each bank respectively. Bank staff noted some banks have fewer senior-management positions because they interpret EEOC’s definition of senior management more narrowly, while others have more senior-management positions because they interpret the definition more broadly. These differences could have affected the comparability of the share of women and minorities in senior management among individual banks in the period we reviewed. Also, because of the relatively small number of senior managers at the FHLBanks, a small change in the number of such managers can result in a larger change in the associated percentage. Minority representation. The share of minority senior management across all 11 FHLBanks was approximately 14 percent (23 individuals) in both 2011 and 2017. Five banks increased the share of minority senior management (from about 1 to 23 percentage points); three banks decreased (from about 6 to 13 percentage points); and three banks did not change. Four banks did not have any minorities in senior management in 2017 (see fig. 3). The largest racial/ethnic group among senior management in 2017 was Asian (about 5 percent) followed by African-American and Hispanic (both at about 4 percent). See figure 4. Female and minority representation combined. The combined share of female and minority senior management across 11 banks increased 7 percentage points—from about 32 percent (54 employees) in 2011 to 39 percent (65 employees) in 2017. At individual FHLBanks, the percentage of female and minority senior management increased at seven banks by a range of about 3 to 29 percentage points, decreased at three FHLBanks by about 11 to 13 percentage points, and stayed the same at one bank. While combined female and minority representation increased overall, eight of the 11 banks did not have any female minorities in senior- management positions in 2017 (see fig. 5). Using EEOC data, we also examined the composition of the senior- management workforce in the financial services industry to determine how FHLBank senior management compares with the broader financial services industry. The percentage of women, minorities, and women and minorities combined in senior management in FHLBanks overall was similar to the corresponding share of senior management in the financial services industry in 2017. Specifically, the respective percentages for the FHLBanks and the financial services industry in 2017 were approximately 28 percent and 30 percent for female senior management; 14 percent and 13 percent for minority senior management; and 39 percent and 38 percent for female and minority senior management. Shares of women and minorities in senior management for individual FHLBanks varied more in comparison with the financial services industry in their districts. Four banks had a higher share of women in senior management than the financial services industry in their respective bank districts (from about 1 to 14 percentage points higher); and seven banks had a lower share (from about 3 to 15 percentage points lower). Five FHLBanks had a higher share of minorities in senior management than the financial services industry in their respective districts (from about 2 to 27 percentage points higher); the other six had a similar or lower share (from about 1 to 8 percentage points lower). Four banks had a higher percentage of women and minorities combined in senior management than the financial service industry in their respective bank districts (from about 7 to 27 percentage points higher), two banks had a modestly lower share (no more than 3 percentage points), and the remaining five banks had a share that was lower by more than 8 percentage points. We also reviewed the representation of women and minorities in the overall FHLBank workforce and for each FHLBank. Although the difference in the share of female and minority employees across 11 FHLBanks in 2011–2017 was not large, both women and minorities were better represented in first- and mid-level management and professional positions than in senior management. Female representation. Across the 11 FHLBanks, the overall share of female employees in 2017 (about 45 percent) was somewhat lower than the share in 2011 (about 47 percent), although the total number of female employees increased from 1,317 in 2011 to 1,355 in 2017 (see fig. 6). In 2017, the share of women in job categories below the senior- management level was higher than the share of women in senior management. Specifically, the share of women in first- and mid-level management positions was about 41 percent and in professional positions about 44 percent, both higher than the percentage of women in senior management (about 28 percent). Employees in these positions can be potential candidates for the banks’ management. Minority representation. The share of racial/ethnic minority employees in the overall FHLBank workforce in 2017 (about 33 percent) was slightly higher than the share in 2011 (about 31 percent), and the number of racial/ethnic minorities increased during this period from 864 employees in 2011 to 1,007 employees in 2017. During this time period, the share of minorities in first- and mid-level management positions increased by approximately 6 percentage points (from about 21 percent in 2011 to 27 percent in 2017); the share of professionals increased by about 3 percentage points (from about 34 percent in 2011 to 37 percent in 2017), and the share of minorities in other job categories, such as administrative, decreased by about 3 percentage points (from about 41 percent in 2011 to 38 percent in 2017). Similar to the share of female employees, the share of minority employees in first- and mid-level management (about 27 percent) and professional positions (about 37 percent) was higher than that for senior management (about 14 percent) in 2017. Among these employees in 2017, Asians accounted for the largest share (about 16 percent), followed by African-Americans (about 11 percent) and Hispanics (about 5 percent), as shown in figure 7. Female and minority representation. When looking at the combined representation of women and minorities in the overall FHLBank workforce, the share of women and minorities was similar in 2011 and 2017 at about 61 percent (1,704 employees in 2011 and 1,847 employees in 2017). The number of female and minority employees increased by 143 (about 8 percent) during this period. Similarly, the number of total employees increased by about 200 (about 8 percent) from 2011 to 2017. At the individual bank level, the share of female and minority employees increased at six banks (from about 1 to 6 percentage points) and decreased at the remaining five banks (from about 2 to 4 percentage points) from 2011 to 2017. In 2017, the percentage of female and minority employees across the 11 banks ranged from about 48 to 77 percent of the workforce at the individual banks (see fig. 8). Women generally were less represented among FHLBank employees than in the financial services industry (overall and by FHLBank district) and in college-educated populations in selected metropolitan areas. Minorities were similarly represented across the categories. First, we compared the representation of women and minorities among FHLBank employees (overall and by bank) with such representation in the financial services industry (overall and by FHLBank district) in 2017 to help determine how similar the FHLBank workforce was to that of other financial institutions. The workforce in the financial service industry can represent a pool of potential employees for the FHLBanks. The share of female employees in FHLBanks overall was about 14 percentage points lower than the corresponding share in the financial services industry (about 45 percent in FHLBanks and 59 percent in the financial services industry) in 2017. Each of the FHLBanks had a lower share of female employees than the financial services industry in the bank’s district (by about 2 to 27 percentage points). The share of racial/ethnic minority employees was about 33 percent across the FHLBanks and the financial services industry in 2017. Six FHLBanks had a similar or higher share of minority employees than the financial services industry in their respective districts (by about 1 to 21 percentage points); the other five had a lower share (by less than 1 percentage point to about 11 percentage points). The combined percentage of female and minority employees across the FHLBanks was about 10 percentage points lower than the corresponding percentage in the financial services industry in 2017 (about 61 percent and 71 percent, respectively). All FHLBanks except one had a lower share in this combined category than the financial services industry in their districts. Second, we compared the share of women and minorities among each FHLBank’s employees in 2017 with the population with at least a bachelor’s degree in the metropolitan statistical areas associated with each bank’s headquarters city in 2018 (see table 2). This population can provide potential employees for the banks’ workforce. The percentage of female employees in seven banks was lower than the estimated share of females with at least a bachelor’s degree in their respective metropolitan areas (smaller than the lower end of the range of the estimated percentage for each area). For the remaining four banks, the share of female employees was similar to that of the estimated share for their respective metropolitan areas (within the range of the estimated percentage for each area). The percentage of minority employees in nine banks was similar to the estimated share of minorities in the population in the respective metropolitan areas around each bank’s headquarters. In two banks, the share of minority employees exceeded the corresponding estimated percentage for this population (larger than the upper end of the range of the estimated percentage for each area). To provide additional context on the demographic composition of the population served by the FHLBanks, we compared the share of female and minority employees at each FHLBank in 2017 with the share of the female and minority population in each bank district (all of which are multistate areas). All FHLBanks except two had a lower share of female employees than the female share of the population in their respective bank districts (by at least 5 percentage points). The percentage of minority employees at one bank was higher than the share of the minority population in its bank district (by about 11 percentage points); the individual percentages at five banks were similar (no more than 3 percentage points difference); and the individual percentages at the remaining five banks were lower by at least 4 percentage points. FHLBanks reported continuing challenges to recruiting and retaining a diverse workforce, including the following: Low turnover rates and small workforce. Staff of four banks said that low turnover rates have limited opportunities for hiring or promoting diverse candidates. For example, the percentage of employees leaving individual banks in 2017 ranged from about 5 to 12 percent. In comparison, the average estimated separation rate for the financial services industry as a whole was about 25 percent in 2017. Additionally, staff of four banks noted that the size of their workforce is relatively small, which also limits opportunities for hiring and promotion. The number of employees in individual FHLBanks ranged from 202 to 462 in 2017 (see table 3). Population in geographic location not diverse. Staff of four banks stated that their geographic location makes it challenging to recruit diverse talent because the population in the area is relatively undiverse. Two banks indicated it can be difficult to attract potential candidates to work in their geographic location. Despite these stated challenges, as we previously noted, the 2017 share of minorities in each bank was similar to or exceeded the 2018 share of minorities with at least a bachelor’s degree in their respective metropolitan areas. Competition for women and minority candidates. Staff of five banks said that competition for diverse talent is high because banks compete with other companies in their districts that are larger or have better brand recognition, such as large investment banks and technology companies. For example, staff of four banks noted that the FHLBanks are not well known compared with these larger organizations. Staff from one bank noted that the compensation the bank offered was lower than that of larger firms—including for internships—which can make it difficult to attract diverse candidates. Staff of two banks also noted that relatively low unemployment rates in their areas mean that diverse candidates have other employment options, making it more challenging to attract such candidates. Difficulty aligning bank needs and requirements with skillsets of diverse candidates. Staff of six banks said that there may be few women or minority candidates who meet specific skill or job requirements. For example, staff of five of these banks noted that it can be challenging to find diverse candidates in certain technical fields, such as information technology. Staff of three banks also noted that diversity in the financial services industry overall is limited, which contributes to a limited pool of diverse candidates. We found that FHLBanks implemented and continue to implement a variety of practices to maintain and increase diversity in their workforces, based on our review of the FHLBanks’ annual Office of Minority and Women Inclusion (OMWI) reports, FHFA examination documents, FHLBank diversity and inclusion strategic plans, and interviews with FHLBank staff from all 11 banks. These practices align with leading practices we previously identified on diversity management. The leading practices can help the banks address some of the challenges described previously and recruit and retain a diverse workforce, which also can contribute to a more diverse pipeline for management positions. Bank leadership commitment to diversity and inclusion. All 11 FHLBanks have implemented practices intended to demonstrate leadership’s commitment to diversity and inclusion, which included the following examples. All 11 FHLBanks include workforce diversity objectives in their diversity and inclusion strategic plans and generally established goals that were quantitative, qualitative, or both related to their workforce diversity programs, based on our review of the banks’ annual reports. Examples of such goals included increasing employee awareness of diversity and inclusion and percentage targets for workforce diversity composition and recruitment. The FHLBanks also incorporate diversity and inclusion into their incentive compensation goals or performance competencies. An example of such goals relates to participation in diversity and inclusion training and other events. All 11 FHLBanks track data on the diversity composition of their workforce; external and internal applicants for open positions, new hires, promotions, and separated employees; and progress in meeting diversity and inclusion goals and objectives. The OMWI officers at all 11 banks report directly to the bank’s chief executive officer/president or the equivalent of the chief operating officer. The board of each bank also receives periodic updates on the bank’s diversity and inclusion efforts. Staff of eight banks said that senior leaders, such as the chief executive officer, express their commitment to diversity and inclusion through participation in internal diversity and inclusion events, in written materials, and by sponsoring employee groups that represent diverse employees. Targeted recruitment. All 11 banks reported several targeted diversity recruitment efforts to increase recognition and build a potential pipeline of diverse employees. For example, all banks conducted outreach to colleges that have diverse student populations, according to banks’ annual reports and staff, and FHFA examination documents. All banks also conducted outreach to local and national professional and other organizations that represent diverse communities. Seven banks indicated that they engage with their communities, such as by participating in community events and volunteer activities, and partnering with community organizations. They noted that these efforts can help enhance their bank’s brand recognition and in turn can help recruit and retain diverse employees. To build a pipeline of diverse employees, all 11 banks offered a college internship program and six banks offered a high school internship or work study program for which they try to recruit diverse candidates. The banks also engaged in efforts to build the potential pipeline of diverse employees in the long term, such as by participating in programs or activities to increase skillsets among young women and minorities in technical or financial services fields. Employee involvement/feedback. All 11 banks described efforts to create a more inclusive environment for employees, according to banks’ annual reports and bank staff. For example, nine banks have an employee resource group or other organization representing employees, and can engage in diversity and inclusion activities, such as professional development and cultural events, according to the banks’ annual reports. Nine banks reported that they conducted employee surveys or meetings to obtain feedback from employees on diversity and inclusion efforts, according to the banks’ annual reports and staff. Staff from one bank told us that when conducting interviews with employees leaving their organization, they include a question specifically on diversity and inclusion to identify potential employee retention practices. Training on diversity and inclusion topics. Ten banks offered training courses on diversity and inclusion topics for all employees, according to the banks’ annual reports and FHFA examination documents. Ten banks hosted events or informal training related to diversity and inclusion, including events sponsored by employee groups, according to bank documents and staff. Development of succession plans that address diversity and inclusion. All 11 banks engaged in succession planning, but FHFA’s 2018 diversity and inclusion examination found that the banks addressed diversity and inclusion in their succession planning to varying degrees. FHFA staff explained that banks should evaluate potential successors on their demonstrated ability to manage diversity and inclusion using performance competencies. Examples of such competencies include assessing candidates on their ability to include diverse groups when making team decisions and supporting the bank’s diversity and inclusion efforts. FHFA worked with FHLBanks and developed instructions and templates for more consistent reporting of 2018 data on the banks’ use of diverse suppliers and broker-dealers, including those that are minority- and women-owned. FHLBanks’ use of minority- and women-owned suppliers and broker-dealers in 2018 varied among the banks. Banks also told us there are challenges that may slow or limit their use of diverse suppliers and broker-dealers. They generally implemented key practices to help ensure they consider diverse suppliers and broker-dealers in searches for business partners. Data reporting. Before 2018, FHFA had not issued a standardized data reporting template for FHLBank data on use of diverse suppliers and broker-dealers; therefore, data were not comparable across banks or years. As part of the requirements of FHFA’s 2010 Minority and Women Inclusion regulation, in 2012 the banks and the Office of Finance began reporting data on their business activities with diverse businesses (minority-, women-, and disabled-owned) in the preceding year. However, the data prior to 2018 were not comparable across years and banks because the banks did not use consistent methods or definitions in their data reporting. To develop a common understanding and make the data more consistent, FHFA and the banks began working together in 2017 to develop a data dictionary and data templates. FHLBanks used the new templates to report their 2018 data. Minority- and women-owned suppliers. In 2018, FHLBanks varied in their use of minority- and women-owned suppliers (see fig. 9). The 11 banks entered into more than 2,900 supplier contracts overall in 2018 (ranging from 60 to 477 per bank). Of the total number of contracts, about 10 percent (279 contracts) were with minority-owned suppliers and about 12 percent (340 contracts) were with women-owned suppliers. Among the individual banks, the share of contracts entered into with minority- owned suppliers in 2018 ranged from about 1 percent to 38 percent and from about 4 percent to 25 percent for contracts with women-owned suppliers. In 2018, FHLBanks’ total supplier expenditure was about $453 million, of which about 8 percent and 13 percent, respectively, went to minority- and women-owned suppliers. Among the individual banks, the percentage of the total annual 2018 expenditure that went to minority-owned businesses varied from about 3 percent to 15 percent, and to women-owned businesses from about 2 percent to 31 percent (see fig. 10). According to FHFA staff, annual expenditure paid to suppliers can vary from year to year. More specifically, an increase in a bank’s annual supplier expenditure in any one year is usually related to long-term, large investments made during that year, such as construction costs or investment in technology products and services. FHFA staff noted that these one-time increases in expenditures can provide opportunities to increase the use of diverse suppliers. FHFA staff said bank data showed that for example, in 2018, three FHLBanks each had large one time investments in construction or building maintenance. Diverse broker-dealers in debt transactions. FHLBanks conduct capital markets transactions with broker-dealers that meet certain qualifications (such as capital sustainability and financial performance), including those that have been approved as diverse broker-dealers. As previously mentioned, these transactions include debt issuance and investments. The Office of Finance acts as an agent to the banks and primarily functions to issue and service all debt transactions. In addition, it identifies and approves broker-dealers for the banks’ debt issuance transactions, including dealers that are minority-, women-, disabled-, and veteran-owned. As of December 31, 2018, the Office of Finance had 64 approved broker- dealers, 16 of which were diverse broker-dealers, including seven minority-owned and five women-owned firms. In 2019, the Office of Finance added two additional diverse broker-dealers, one minority-owned and one disabled veteran-owned, bringing the total to 18. This represents an increase in the number of approved diverse broker-dealers from 10 in 2014 (see table 4). A total of 69 broker-dealers conducted at least one debt transaction with the Office of Finance in 2018. Ten percent of these broker-dealers were minority-owned and 7 percent were women-owned. In 2018, FHLBanks issued about $8 trillion in debt transactions. Of this total volume, approximately 3 percent of transactions were conducted with minority-owned broker-dealers and less than 1 percent with women- owned broker-dealers. Similarly, minority-owned broker-dealers received approximately 5 percent of the fees paid to broker-dealers overall on these transactions, and women-owned broker-dealers received approximately 0.5 percent. While the Office of Finance reports debt volume data and other data, such as number of transactions conducted by diverse broker-dealers, to FHFA, staff noted that they also use two other performance goals to measure their capital markets diversity efforts. These two goals are the utilization of diverse broker-dealers in debt issuance programs and the number of outreach engagements with diverse broker-dealers (such as marketing and investor meetings). According to Office of Finance staff, as of June 2019, diverse broker- dealers had the opportunity to participate in all FHLBank debt issuance programs. However, as discussed later, some practices that the Office of Finance implements to control risk may limit diverse broker-dealers from taking a more substantial role in certain types of transactions. Diverse broker-dealers in investment transactions. FHLBanks make investments based on their investment needs and identify and approve broker-dealers for their investment needs according to their own qualification requirements. As shown in figure 11, the number of minority- owned broker-dealers approved by the FHLBanks ranged from five to 12, and the number of approved women-owned broker-dealers ranged from one to seven as of December 2018. Of the total number of broker-dealers that conducted at least one investment transaction with FHLBanks in 2018, the share of minority- or women-owned broker-dealers varied among banks (see fig. 12). Of the 10 banks that made investment transactions in 2018, shares for individual banks ranged from 0 percent to about 22 percent for minority-owned broker-dealers and from 0 percent to 10 percent for women-owned broker-dealers. In 2018, FHLBanks conducted about $12 trillion in investment transactions, less than 1 percent of which was conducted with minority- owned broker-dealers or with women-owned broker-dealers. Of the total number of transactions conducted by the banks, minority-owned dealers and women-owned dealers each accounted for less than 1 percent. FHLBank staff reported some challenges that may slow or limit their use of diverse suppliers and broker-dealers, such as those owned by minorities, women, and individuals with a disability. For example, staff from seven banks said that the bank’s needs for goods and services are small or can fluctuate from year to year. Staff from two banks added that this can make it difficult to consistently increase or maintain the use of diverse suppliers. For example, staff from one bank described a building construction project that increased the use of diverse suppliers during the year in which the construction took place, but had no effect in the subsequent year because construction had been completed. In addition, staff from five banks said some bank procurement needs are fulfilled by continuing contracts with existing vendors. For example, staff from two banks said that some bank needs, such as existing information system support, are offered by continuing suppliers that may not be diverse suppliers. Additionally, staff from five banks said that there are not always diverse suppliers that can meet the bank’s needs. For instance, staff from one bank said it can be difficult to find diverse suppliers to fill some contracting needs that require specific skills or expertise, such as the vendors used to review technical risk-assessment models. FHLBank staff also reported challenges that may slow or limit their use of diverse broker-dealers. For example, staff from six banks and the Office of Finance said that diverse broker-dealers often do not have the level of capital required by the banks to make the capital markets transactions the banks need. Staff from five banks said this is because diverse broker- dealers generally are smaller firms. In addition, staff from seven banks said that diverse broker-dealers may be limited in the services and products they can offer the banks. For example, staff from one bank told us that some diverse broker-dealers have fewer financial resources, which limits them to basic transactions as opposed to more complex transactions. Staff from six banks also said that their capital markets transactions are dependent on membership needs or market conditions for funding, which can lead to year-by-year fluctuations in transaction levels. Staff from four banks said that the fluctuations affect the bank’s need for broker-dealers overall, and make it challenging for the bank to maintain or increase use of diverse broker-dealers. Office of Finance staff also noted this challenge, adding that many factors, such as underwriting capacity and experience, may affect a broker-dealer’s ability and desire to participate in the FHLBanks’ debt issuance programs. Staff further said that individual broker-dealers are responsible for identifying investors to be able to participate in debt transactions; the Office of Finance cannot control whether a broker-dealer can identify an investor. We previously identified key practices for increasing opportunities for minority- and women-owned asset managers. We found these practices can be applied to diverse suppliers and broker-dealers and used by organizations, such as FHLBanks, to help ensure they consider qualified diverse suppliers and broker-dealers in their selection process. Diverse suppliers and broker-dealers include businesses owned by minorities, women, and individuals with a disability. The key practices are Demonstrate top leadership commitment: Demonstrate commitment to increasing opportunities for diverse businesses. Conduct outreach: Conduct outreach to inform diverse businesses about opportunities and the selection processes. Communicate priorities and expectations: Explicitly communicate priorities and expectations about inclusive practices to staff and ensure those expectations are met. Remove potential barriers: Review policies and practices to remove barriers that limit the participation of diverse businesses. We found that FHLBanks generally implemented the four key practices in their supplier management programs, based on our review of the FHLBanks’ 2017 and 2018 annual OMWI reports and interviews with OMWI staff from all 11 banks, and with bank staff with responsibility for vendor management. Demonstrate top leadership commitment. The FHLBanks demonstrated top leadership commitment to supplier diversity through strategic plans, goals, and reporting. All 11 FHLBanks include supplier diversity as a component of their diversity and inclusion strategic plans. In addition, the banks generally established quantitative or qualitative goals related to their supplier diversity programs; for example, the percentage of total expenditure with diverse suppliers. FHFA told us that they have been working with the banks to assess these goals and ensure they are outcome-based. Furthermore, the 11 banks track their progress in meeting diversity and inclusion objectives and goals. Each FHLBank’s OMWI director reports to the bank’s chief executive officer/president or the equivalent of the chief operating officer. The FHLBank boards also receive periodic updates on the bank’s diversity and inclusion efforts. Conduct outreach. FHLBanks use a variety of methods to reach potential diverse suppliers. All 11 banks work with local or national industry organizations, such as the National Minority Supplier Development Council and Women’s Business Enterprise National Council, to identify potential suppliers. Nine banks described attending events hosted by these organizations, such as matchmaking sessions or business fairs, and at least two banks reported using their databases to search for diverse suppliers. Staff from seven banks said that they proactively meet with potential vendors to educate them on bank needs and processes. Staff from one bank said they have invited a number of diverse vendors to the bank to meet bank managers and discuss their goods and services. This has resulted in contract proposals from five different diverse vendors. Staff from five banks also described using advertising and social media to reach a broad base of potential diverse suppliers; for example, one bank described placing advertisements in publications that target diverse businesses. Communicate priorities and expectations. FHLBanks communicated priorities and expectations on supplier diversity to bank staff through policies and training. All 11 banks have a written policy that outlines the requirements for bank staff to include a diverse supplier in their search whenever the need for a new contract is identified. In addition, all 11 banks conducted staff training on supplier diversity or on their vendor management policy. Remove potential barriers. According to our interviews with external stakeholders knowledgeable about working with diverse suppliers, diverse businesses may face barriers as they seek to obtain contracts. FHLBanks took steps that could ameliorate these barriers. Supplier contracts are often made through existing relationships and networks. Diverse suppliers may not have access to these networks and therefore miss opportunities to apply for contracts. As previously mentioned, FHLBanks conducted targeted recruitment of diverse suppliers. By actively seeking to build relationships with these suppliers, the FHLBanks have been working to address this barrier. The procurement process itself can be complicated and difficult to understand. Smaller diverse businesses may have limited staff and skill to navigate the process. Staff from seven banks have addressed this barrier by conducting one-on-one meetings with potential vendors to walk them through the bank’s procurement processes. Third- Party Certification of Supplier Diversity Status According to the Federal Housing Finance Agency’s (FHFA) 2010 Minority and Women Inclusion regulation, a firm qualifies as a minority- or women-owned business when it is more than 50 percent owned and controlled by one or more minority individuals or women and more than 50 percent of net profit or loss accrues to a member of those groups. Businesses can submit documentation to approved third-party certifiers to obtain a certification of their diversity status. Certifiers then review the documentation and sometimes conduct site visits to confirm the diversity status of the business. The process to certify as a diverse business with a third party can be confusing or costly, according to two external stakeholders we interviewed. The preambles to the 2010 Minority and Women Inclusion rule and its 2017 amendments state that while FHFA prefers reliance on certifications from qualified, independent third parties, FHFA also allows for reliance on self-certifications by the businesses. The FHLBanks each confirmed that they allow businesses to self- certify their diversity status. A small diverse supplier may not be able to fulfill a large contract requiring multiple services. An external stakeholder we interviewed told us that this barrier can be overcome when diverse suppliers join forces to fulfill multipart contracts. For example, a supplier that provides pens can join with a supplier that provides paper to fulfill a single office supplies contract. To do this, suppliers need advance notice of bank needs to create a business plan. Three banks told us that before meeting with potential suppliers, they work with various business departments in the bank to identify upcoming purchasing needs and share those with the suppliers. All 11 banks have a representative on the systemwide OMWI Council Procurement Sub-Working Group, which meets monthly. The subgroup spent the majority of 2017 addressing the challenge of FHFA data reporting. An OMWI Council representative told us that the members use the subgroup as forum to discuss key issues. In addition, the representative said the subgroup plans to focus on improving its outreach efforts in 2019. Two banks reported that they hold internal meetings to discuss trends and potential barriers and make updates to their supplier diversity program. We found that the FHLBanks and the Office of Finance generally implemented the four key practices for their capital markets programs, based on our review of the FHLBanks’ 2017 and 2018 annual OMWI reports and interviews with OMWI staff from all 11 banks, the Office of Finance, and with bank staff with responsibility for capital market activities. Demonstrate top leadership commitment. Similar to the banks’ supplier management programs, FHLBanks demonstrated top leadership commitment to capital markets diversity through strategic plans, goals, and reporting. All 11 FHLBanks and the Office of Finance include capital markets diversity as a component of their diversity and inclusion strategic plans. They also generally established quantitative or qualitative goals related to their capital markets diversity programs, such as the percentage of transactions conducted with diverse broker-dealers. The 11 banks and the Office of Finance track their progress in meeting diversity and inclusion objectives and goals. In addition, the OMWI director reports to the chief executive officer/president or the equivalent of the chief operating officer. The FHLBank and the Office of Finance boards also receive periodic updates on the bank’s and the Office of Finance’s diversity and inclusion efforts, respectively. Conduct outreach. FHLBanks and the Office of Finance interacted with diverse broker-dealers through regular communication and face-to-face meetings. Staff from all 11 banks and the Office of Finance reported some form of regular communication with diverse broker-dealers to keep the broker-dealers informed on bank capital markets activities and needs. In addition, all 11 banks and the Office of Finance reported attending events to interact with diverse broker-dealers. For example, on behalf of the OMWI Council Capital Markets Subgroup, the FHLBank of New York hosts an annual Diverse Dealer Reception at which the banks and the Office of Finance can interact with current approved diverse broker- dealers and those in the pipeline for potential approval. At the 2017 reception, diverse broker-dealers were provided with contact information for all capital market staff in the FHLBank System and a brochure listing examples of ways diverse broker-dealers could engage with the system. Staff from all 11 banks and the Office of Finance also told us they hold one-on-one meetings with diverse broker-dealers to explain bank processes and needs. In addition, Office of Finance staff told us they help diverse broker-dealers build relationships with investors by accompanying them to one-on-one meetings with investors to introduce FHLBank securities products. Communicate priorities and expectations. FHLBanks communicate priorities and expectations on capital markets diversity to bank staff through policies and by sharing practices systemwide. Ten of the banks and the Office of Finance have a written policy or procedure related to the use of diverse broker-dealers, which outlines the importance of engagement with diverse broker-dealers or how bank staff should interact with them. The OMWI Council Capital Markets Subgroup also developed a list of aspirational practices for the 11 banks. These practices include many activities related to the four key practices we identified, such as engaging in regular communication and periodically examining capital market operations to identify potential obstacles to increasing business with diverse broker-dealers. Staff from one bank told us that having the practices codified in a document helps ensure consistent expectations across the system. Remove potential barriers. FHLBanks and the Office of Finance made changes to their capital markets practices and certain features of their debt products to increase access for diverse broker-dealers. For example, the Office of Finance, with input from the OMWI Council Capital Markets Subgroup, reduced the capital requirements on some types of debt transactions to bring in more diverse broker-dealers. The Office of Finance also told us that in the case of a new type of debt product created in November 2018, they allow multiple broker-dealers to participate in various roles, including diverse broker-dealers. However, FHFA staff told us that although the FHLBanks and the Office of Finance made changes to debt and investment products offered to diverse dealers, the banks and the Office of Finance have not always used a systematic process to review and evaluate debt and investment policies and procedures for potential changes that may expand participation by diverse broker-dealers. In 2017 and 2018, FHFA asked the banks and the Office of Finance, respectively, to develop such a process to facilitate opportunities for diverse broker-dealers. FHFA determined that 10 banks had addressed this request. FHFA staff noted that they will review the remaining entities’ progress in addressing this request in 2019 examinations. In addition, each bank and the Office of Finance has a representative on the systemwide OMWI Council Capital Markets Subgroup. According to staff from four banks, the subgroup’s monthly meetings provide them with an opportunity to discuss barriers and practices. In 2018, the subgroup administered a survey to the approved diverse broker-dealers to solicit suggestions and feedback on their interactions with the banks. Bank staff told us the survey did not result in any program changes, but provided information on how they could communicate more effectively. However, diverse broker-dealers still may face barriers in some areas, according to three diverse broker-dealers and two industry stakeholders, with whom we spoke. The Office of Finance has been taking steps to address these barriers where possible. Some practices that the Office of Finance implements to control risk can limit diverse broker-dealers from taking a more substantial role in transactions associated with certain debt products. For example, according to Office of Finance staff, only the top eight broker-dealers (ranked by the Office of Finance based on performance) can lead transactions for certain longer-term and larger-size debt products. Two diverse broker-dealers told us this requirement limits their ability to participate in these transactions. For example, one broker-dealer told us that because diverse broker-dealers generally are newer firms with less capacity relative to the top eight broker-dealers, it would be unlikely that they would ever be one of the top eight. Office of Finance staff told us these products accounted for less than 1 percent of the FHLBank’s total debt issuance in 2018 based on net proceeds received. According to the Office of Finance, they rely on these top eight broker-dealers because they can better cover any risk posed by the transactions. The Office of Finance allows diverse broker-dealers to serve as co-managers on these larger transactions, but diverse broker-dealers told us that acting as a co-manager did not noticeably increase the share of transactions they could execute or their own fee revenue. Staff from the Office of Finance said the office does not implement quotas as a way to maintain or increase the use of diverse broker- dealers, but rather focuses on providing diverse broker-dealers with opportunities and on implementing outreach opportunities. According to these staff, the percentage of transactions conducted and fees received by diverse broker-dealers as a whole has increased over time. The Office of Finance told us they recently met with diverse broker- dealers about another risk-management practice that may limit the participation of diverse broker-dealers. According to Office of Finance staff, this practice requires broker-dealers to have at least $100 million in capital to conduct certain complex debt transactions. According to external stakeholders, a higher capital requirement may limit the participation of diverse broker-dealers, who generally have less capital, in these transactions. Staff from the Office of Finance said that they have been evaluating whether it is appropriate to modify the requirement. Their evaluation is part of the office’s continual process to evaluate debt issuance programs. Three diverse broker-dealers and one industry stakeholder we interviewed said that increased transparency by FHLBanks and the Office of Finance in information provided to broker-dealers could help diverse broker-dealers identify opportunities and better understand the banks’ needs. For example, one diverse broker-dealer and one industry stakeholder said that access to information on the fees paid to broker-dealers on different types of capital markets transactions could help them take advantage of areas of greater opportunity. This information is reported by the Office of Finance and FHLBanks to FHFA, but generally is not released publicly. The preamble of FHFA’s Minority and Women Inclusion rule notes that FHFA treats this information as confidential because it can affect the agency’s oversight of the banks. However, FHFA does not prohibit FHLBanks and the Office of Finance from publishing their diversity information if they so choose. Office of Finance staff told us that they do not publish data on fees or broker-dealer transactions for certain debt product because they consider this proprietary and competitive information. They said publishing the data could increase the leverage of broker- dealers and also could lead to an adverse impact on investor participation and support. FHFA’s oversight of FHLBanks includes annual examinations, development of instructions and templates to improve data quality, incorporation of bank data in oversight, and communication of agency expectations for diversity and inclusion efforts to the banks through various mechanisms. Began examining FHLBanks’ diversity and inclusion efforts in 2017. In 2017, FHFA started reviewing FHLBanks’ diversity and inclusion efforts in its annual examinations of the banks. FHFA developed a separate examination module (to add to its examination manual) in 2016 for reviewing the banks’ diversity and inclusion efforts and the banks’ oversight of these efforts. The areas that FHFA reviews include strategic planning and associated goals for diversity and inclusion, board oversight, organizational structure of diversity and inclusion programs, workforce, suppliers (which encompasses broker-dealers in the capital markets program), reporting structure and processes, and internal audit and compliance. In the 2017 and 2018 examinations, FHFA found the banks generally took steps to promote and maintain diversity and inclusion in their workforce and use of diverse suppliers and broker-dealers. FHFA also identified some areas for improvement. Specifically, in the 2017 examinations, FHFA recommended that all 11 banks improve their reporting and program goals on workforce diversity and use of diverse suppliers and broker-dealers. For example, FHFA specifically found that six banks needed to improve performance measurement of their supplier diversity goals. In the 2018 examinations, FHFA recommended that seven banks enhance their succession planning to ensure that potential successors are assessed on how well they manage and implement diversity and inclusion. As previously discussed, FHFA also asked FHLBanks and the Office of Finance to develop a more systematic process to review and determine potential changes to their debt and investment policies that could expand participation by diverse broker-dealers. Based on our review of FHFA’s examination documentation, FHFA followed its processes to document, communicate, and resolve examination findings related to diversity and inclusion in its 2017 and 2018 examinations. For example, FHFA examiners prepared memorandums to document the assessment and findings of each individual bank’s diversity and inclusion efforts and communicated findings to bank management and boards. Consistent with the examination manual, FHFA followed up on 2017 examination findings and banks’ remediation actions during the 2018 examinations. As of March 2019, FHFA determined that 10 banks satisfactorily remediated findings from the 2017 examination related to goals and reporting issues, among other things. For the remaining bank, management has not completed all remediation steps to address FHFA’s examination findings, according to FHFA staff. FHFA staff added that they will review the bank’s actions again in the 2019 examination and assess the banks’ progress in addressing the 2018 examination findings. According to FHFA staff, they plan to make some changes to the diversity and inclusion examination module. For example, in the module FHFA plans to more explicitly separate the information on the review of diversity efforts related to use of diverse broker-dealers from use of diverse suppliers (they are currently under one examination component). Developed instructions and templates to improve data quality. To enhance the quality of the data and information submitted by FHLBanks on their workforce diversity and use of diverse suppliers and broker- dealers, FHFA worked with FHLBanks and developed instructions and templates to help FHLBanks submit more consistent data on a quarterly basis. During 2018, FHFA requested that banks submit quarterly diversity data on their workforce and the use of diverse suppliers and broker- dealers. FHFA also developed a data reporting manual that includes a data dictionary, and templates for the quarterly and annual data and for the annual report to help FHLBanks more consistently report diversity data for their workforces and use of diverse suppliers and broker-dealers. FHFA staff told us that they reviewed the banks’ 2018 data to identify any discrepancies, and they worked with the banks to clarify data definitions and correct the discrepancies. For example, some banks had used an incorrect definition to account for their diverse supplier expenditures. Because 2018 was the first year in which the banks used the new templates, FHFA staff said they had expected some discrepancies in the data as the banks became familiar with the data definitions. Staff said FHFA plans to continue to work with the banks to help them achieve a common understanding of the data definitions. Incorporated bank data in oversight. According to FHFA staff, in 2018 they began to use the banks’ quarterly data for ongoing monitoring of the banks’ diversity and inclusion efforts in workforce, procurement, and capital markets. For example, the FHFA OMWI office assesses each bank’s diversity performance in these three areas using the quarterly data, and has been considering developing benchmarks. FHFA staff said the quarterly data provide more detailed information on the banks’ use of diverse businesses; for example, the types of goods or services for which the banks contract with diverse businesses. FHFA staff noted that the additional data not only inform FHFA’s oversight but also can help the banks’ internal reporting on diversity and inclusion efforts. Additionally, FHFA plans to review the banks’ data reporting systems as part of its annual examinations to help ensure banks have the appropriate controls for data reporting. FHFA staff said that the agency expects the banks to establish the appropriate data system to ensure the quality of data reported to FHFA and for internal reporting. Communicated with FHLBanks, including on data templates and expectations. FHFA provided clarification on the roles and duties of the banks’ OMWI officers and the scope of diversity regulations. FHFA collected the banks’ feedback and responded to questions on the new quarterly data reporting and the new data instructions and templates. Subsequently, FHFA modified the data templates in 2019 to allow the banks to more efficiently report their diversity data on a quarterly and annual basis. For example, FHFA consolidated data fields common to quarterly and annual reporting, among other things. Additionally, FHFA provided responses to the banks on their questions on the data and annual report templates when the templates were first introduced in 2018 and revised in 2019. FHFA staff said the annual report template helped clarify FHFA’s expectation on annual report content. In addition, FHFA staff noted that since 2015, FHFA’s OMWI director has met with the bank presidents and board of directors of most of the FHLBanks, and began in 2018 to have at least one visit for each bank every other year. The FHFA OMWI director also generally attends the semi-annual conferences of the banks’ OMWI officers, during which she has the opportunity to meet with the banks’ presidents individually. During these meetings, the OMWI director or staff discussed diversity issues such as strategic planning, results of the banks’ annual reports, and examinations. We provided a draft of this report to FHFA, each of the 11 FHLBanks, and the Office of Finance for review and comment. FHFA, six FHLBanks, and the Office of Finance provided technical comments, which we incorporated as appropriate. The other five FHLBanks did not have any comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Director of FHFA, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or ortiza@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. Anna Maria Ortiz, (202) 512-8678, ortiza@gao.gov. In additional to the individual named above, Kay Kuhlman (Assistant Director), Anna Chung (Analyst in Charge), Meghana Acharya, Laurie Chin, Kaitlan Doying, Jill Lacey, Moon Parks, Barbara Roesmann, Jessica Sandler, and Jena Sinkfield made key contributions to this report.", "summary": "The FHLBank System consists of 11 regionally based banks that are cooperatively owned by member institutions (such as community banks and credit unions) and of the Office of Finance. The banks, which are regulated by FHFA, provide liquidity for their member institutions to use in support of housing finance and community lending. GAO was asked to review FHLBanks' implementation of diversity and inclusion matters in workforce and business activities (including the use of suppliers and broker-dealers). This report examines (1) trends in gender, race, and ethnicity in FHLBank workforces, and challenges faced and practices used to maintain and increase a diverse workforce; (2) use of minority- and women-owned suppliers and broker-dealers in 2018, and challenges faced and practices used to increase and maintain their use; and (3) FHFA oversight of FHLBank diversity and inclusion efforts. GAO analyzed FHLBank and Equal Employment Opportunity Commission data on the banks' workforce, suppliers, and broker-dealers. GAO also reviewed FHFA and FHLBank policies and regulations and previous GAO work on these issues. GAO interviewed FHFA and FHLBank staff and a nongeneralizable sample of external stakeholders knowledgeable about supplier and broker-dealer diversity. From 2011 to 2017, the share of women in senior management in Federal Home Loan Banks (FHLBank) increased from about 21 percent (35 individuals) to 28 percent (47 individuals). The share of minority senior management remained the same at about 14 percent (23 individuals). The overall share of women employees slightly decreased and minority employees slightly increased during this period, but gender and minority representation varied by individual bank. FHLBanks identified challenges to maintaining and increasing workforce diversity, such as limited hiring opportunities due to low turnover. FHLBanks have been taking steps to promote workforce diversity, such as outreach to organizations that represent women or minorities and incorporation of diversity and inclusion in incentive compensation goals or performance competencies. In 2018, use of minority- and women-owned suppliers (for goods and services) and broker-dealers varied among individual FHLBanks. Overall, minority- and women-owned suppliers accounted for 8 percent and 13 percent of procurement expenditures, respectively. Minority- and women-owned broker-dealers accounted for about 3 percent and less than 1 percent of the debt issuance amount, respectively. FHLBanks and the Office of Finance (which issues debts on behalf of the banks) have been taking steps to increase diversity in these business activities, such as conducting outreach to diverse entities. However, external stakeholders said such suppliers and broker-dealers may continue to face some barriers—for example, capital requirements that limit participation by diverse broker-dealers, which generally have fewer resources. In 2017, the Federal Housing Finance Agency (FHFA) started reviewing the diversity and inclusion efforts of FHLBanks in its annual bank examinations. In the 2017 and 2018 examinations, FHFA found the banks generally took steps to promote diversity and inclusion but also identified areas for improvement, such as improving goals for workforce and supplier diversity. In 2018, FHFA issued a manual and templates for reporting of quarterly and annual diversity data to help ensure consistent reporting of the data. FHFA also began using the quarterly data for ongoing monitoring of the banks' diversity and inclusion efforts.", "document_type": "gao"}
{"report": "We reported in September 2017 that while estimates of the economic effects of climate change are imprecise due to modeling and information limitations, they can convey useful insight into broad themes about potential damages in the United States. We also reported that according to the two national-scale studies available at the time that examined the economic effects of climate change across U.S. sectors, potential economic effects could be significant and these effects will likely increase over time for most of the sectors analyzed. For example, for 2020 through 2039, one of the studies estimated from $4 billion to $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms. In addition, the national-scale studies we reviewed and several experts we interviewed for the September 2017 report suggested that potential economic effects could be unevenly distributed across sectors and regions. For example, one of the studies estimated that the Southeast, Midwest, and Great Plains regions will likely experience greater combined economic effects than other regions, largely because of coastal property damage in the Southeast and changes in crop yields in the Midwest and Great Plains (see fig. 1). This is consistent with the findings of the Fourth National Climate Assessment. For example, according to that assessment, the continued increase in the frequency and extent of high- tide flooding due to sea level rise threatens America’s trillion-dollar coastal property market and public infrastructure sector. As we reported in September 2017, information on the potential economic effects of climate change could help federal decision makers better manage climate risks, according to leading practices for climate risk management, economic analysis we reviewed, and the views of several experts we interviewed. For example, such information could inform decision makers about significant potential damages in different U.S. sectors or regions. According to several experts and our prior work, this information could help federal decision makers identify significant climate priorities as an initial step toward managing climate risks. Such a first step is consistent with leading practices for climate risk management and federal standards for internal control. For example, leading practices from the National Academies call for climate change risk management efforts that focus on where immediate attention is needed. As noted in our September 2017 report, according to a 2010 National Academies report, other literature we reviewed, and several experts we interviewed, to make informed choices, decision makers need more comprehensive information on economic effects to better understand the potential costs of climate change to society and begin to develop an understanding of the benefits and costs of different options for managing climate risks. The federal government faces fiscal exposure from climate change risks in a number of areas, and this exposure will likely increase over time, as we concluded in September 2017. In the March 2019 update to our High-Risk List, we summarized our previous work that identified several of these areas across the federal government, including programs related to the following: Disaster aid. The rising number of natural disasters and increasing reliance on federal assistance are a key source of federal fiscal exposure, and this exposure will likely continue to rise. Since 2005, federal funding for disaster assistance has been at least $450 billion. In September 2018, we reported that four hurricane and wildfire disasters in 2017 created an unprecedented demand for federal disaster resources and that Hurricanes Harvey, Irma, and Maria ranked among the top five costliest hurricanes on record. Subsequently, the fall of 2018 brought additional catastrophic disasters such as Hurricanes Florence and Michael and devastating California wildfires, with further needs for federal disaster assistance. Disaster costs are projected to increase as certain extreme weather events become more frequent and intense due to climate change—as USGCRP observed and projected. We reported in July 2015 that the federal government’s fragmented and reactive approach to funding disaster resilience presented challenges to effective reduction of climate-related risks. In addition, our prior work found that the Federal Emergency Management Agency’s (FEMA) primary indicator for determining whether to recommend that a jurisdiction receive disaster assistance—which was set in 1986—is artificially low because it does not accurately reflect the ability of state and local governments to respond to disasters. Without an accurate assessment of a jurisdiction’s capability to respond to a disaster without federal assistance, we found that FEMA runs the risk of recommending that the President award federal assistance to jurisdictions that have the capability to respond and recover on their own. Federal insurance for property and crops. The National Flood Insurance Program (NFIP) and the Federal Crop Insurance Corporation are sources of federal fiscal exposure due, in part, to the vulnerability of insured property and crops to climate change. These programs provide coverage where private markets for insurance do not exist, typically because the risk associated with the property or crops is too great to privately insure at a cost that buyers are willing to accept. From 2013 to 2017, losses paid under NFIP and the federal crop insurance program totaled $51.3 billion. Federal flood and crop insurance programs were not designed to generate sufficient funds to fully cover all losses and expenses, which means the programs need budget authority from Congress to operate. NFIP, for example, was about $21 billion in debt to the Department of the Treasury as of April 2019. Further, the Congressional Budget Office estimated in May 2019 that federal crop insurance would cost the federal government an average of about $8 billion annually from 2019 through 2029. Operation and management of federal property and lands. The federal government owns and operates hundreds of thousands of facilities and manages millions of acres of land that could be affected by a changing climate and represent a significant federal fiscal exposure. For example, the Department of Defense (DOD) owns and operates domestic and overseas infrastructure with an estimated replacement value of about $1 trillion. In September 2018, Hurricane Florence damaged Camp Lejeune and other Marine Corps facilities in North Carolina, resulting in a preliminary Marine Corps repair estimate of $3.6 billion. One month later, Hurricane Michael devastated Tyndall Air Force Base in Florida, resulting in a preliminary Air Force repair estimate of $3 billion and upwards of 5 years to complete the work. In addition, we recently reported that the federal government manages about 650 million acres of land in the United States that could be vulnerable to climate change, including the possibility of more frequent and severe droughts and wildfires. Appropriations for federal wildland fire management activities have increased considerably since the 1990s, as we and the Congressional Research Service have reported. As we reported in October 2019, our past work shows an absence of government-wide strategic planning for climate change. Specifically, our past work identifies limitations related to strategic planning for climate change that include a lack of coordination, prioritization, and consolidation of strategic priorities. For example, we reported in October 2009 that the federal government’s emerging climate resilience activities were carried out in an ad hoc manner and were not well coordinated across federal agencies. In May 2011, we reported that federal officials did not have a shared understanding of strategic government-wide priorities related to climate change. In the same report, we found that there was not a consolidated set of strategic priorities integrating climate change programs and activities across the federal government. In our March 2019 High-Risk Update, we reported that one area of government-wide action needed to reduce federal fiscal exposure is in the federal government’s role as the leader of a strategic plan that coordinates federal efforts and informs state, local, and private sector action. For our 2019 High-Risk Update, we assessed the federal government’s progress since 2017 related to climate change strategic planning against five criteria and found that the federal government had not met any of the criteria for removal from the high-risk list. Specifically, since our 2017 high-risk update, four ratings regressed to “not met” and one remained unchanged as “not met.” (See fig. 2.) We have made 62 recommendations related to the climate change high-risk area, 17 of which address improving federal climate change strategic planning. As of August 2019, no action had been taken toward 14 of those 17 recommendations—one dating back to 2003. Although the federal government faces fiscal exposure to climate change, its investments in resilience to climate change impacts have been limited. One way to reduce federal fiscal exposure is to enhance resilience by reducing or eliminating long-term risk to people and property from natural hazards. For example, in September 2018 we reported that elevated homes and strengthened building codes in Texas and Florida prevented greater damages during the 2017 hurricane season. In addition, one company participating in a 2014 forum we held on preparing for climate- related risks noted that for every dollar it invested in resilience efforts, the company could prevent $5 in potential losses. Finally, a 2018 interim report by the National Institute of Building Sciences examined a sample of federal grants for hazard mitigation. The interim report estimated approximate benefits to society (i.e., homeowners and communities) in excess of costs for several types of resilience projects through the protection of lives and property, and prevention of other losses, though precise benefits are uncertain. According to the interim report, for every grant dollar the federal government spent on resilience projects, over time, society is estimated to accrue benefits amounting to the following: About $3 on average from projects addressing the effects of fire in the wildland urban interface, with most benefits (approximately 70 percent) coming from the protection of property (i.e., avoiding property losses). About $5 on average from projects to address hurricane-force and tornado-force winds, with most benefits (approximately 90 percent) coming from the protection of lives. This includes avoiding deaths, nonfatal injuries, and causes of posttraumatic stress. About $7 on average from projects that buy out buildings prone to riverine flooding, with most benefits (approximately 65 percent) coming from the protection of property. The interim report also projected that society could accrue benefits amounting to about $11 on average for every dollar invested in designing new buildings to meet the 2018 International Building Code and the 2018 International Residential Code—the model building codes that the International Code Council developed—with most benefits (46 percent) coming from the protection of property. We reported in October 2009 that the federal government’s activities to build resilience to climate change were carried out in an ad hoc manner and were not well coordinated across federal agencies. We reported similar findings in October 2019. Federal agencies have included some of these activities within existing programs and operations—a concept known as mainstreaming. For example, the Fourth National Climate Assessment reported that the U.S. military integrates climate risks into its analysis, plans, and programs, with particular attention paid to climate effects on force readiness, military bases, and training ranges. However, according to the Fourth National Climate Assessment, while a significant portion of climate risk can be addressed by mainstreaming, the practice may reduce the visibility of climate resilience relative to dedicated, stand-alone approaches and may prove insufficient to address the full range of climate risks. In addition, as we reported in March 2019, the Disaster Recovery Reform Act of 2018 (DRRA) was enacted in October 2018 and could improve state and local resilience to disasters. DRRA, among other things, allows the President to set aside, with respect to each major disaster, a percentage of the estimated aggregate amount of certain grants to use for predisaster hazard mitigation and makes federal assistance available to state and local governments for building code administration and enforcement. However, it is too early to tell what impact implementing the act will have on state and local resilience. The federal government has made some limited investments in resilience, and DRRA could enable additional improvements at the state and local levels. However, we reported in October 2019 that the federal government does not have a strategic approach for investing in climate resilience projects—that is, an intentional, crosscutting approach in which the federal government identifies and prioritizes projects for the purpose of enhancing climate resilience. Federal agencies may take actions to invest in projects with potential climate resilience benefits related to their own mission areas using funds from federal programs designed for other purposes. In addition, the National Climate Assessment provides high- level information on what is known about observed and projected climate risks in the United States. However, no federal entity looks holistically at the federal government’s investments to strategically prioritize projects to ensure that they address the nation’s most significant climate risks and provide the highest net benefits relative to other potential projects. Further, we reported in September 2017 that the federal government had not undertaken strategic government-wide planning to manage significant climate risks before they become fiscal exposures. As an initial step in managing climate risks, most of the experts we interviewed for the September 2017 report told us that federal decision makers should prioritize risk management efforts on significant climate risks that create the greatest fiscal exposure. Moreover, several stakeholders told us that the federal government’s emphasis has been on funding postdisaster efforts instead of funding resilience projects before a disaster occurs. This is consistent with findings from our July 2015 report that most federal funding for hazard mitigation is only available after a disaster. In addition, according to FEMA officials, some of the agency’s hazard mitigation programs are designed to empower state and local governments to determine their mitigation funding priorities, and these state and local priorities may or may not align with the federal interest. Finally, although we did not identify a government-wide strategic approach specifically for investing in climate resilience projects, the National Mitigation Investment Strategy—a national effort under way to plan for predisaster resilience investments—represents a potential cross- agency vehicle for climate resilience planning. However, the strategy does not specifically address climate change or identify and prioritize specific climate resilience projects. As we reported in March 2019, the federal government could reduce its fiscal exposure to climate change by focusing and coordinating federal efforts. However, the federal government is currently not well organized to address the fiscal exposure presented by climate change, partly because of the inherently complicated and crosscutting nature of the issue. We have made a total of 62 recommendations related to limiting the federal government’s fiscal exposure to climate change over the years, 12 of which have been made since February 2017. As of December 2018, 25 of these recommendations remained open. In describing what needs to be done to reduce federal fiscal exposure to climate change, our March 2019 High-Risk Report discusses many of the open recommendations.Implementing these recommendations could help reduce federal fiscal exposure. Several of them, including those highlighted below, identify key government-wide efforts needed to help plan for and manage climate risks and direct federal efforts toward common goals, such as improving resilience. Develop a national strategic plan: In May 2011, we recommended that appropriate entities within the Executive Office of the President (EOP), including the Office of Management and Budget, work with agencies and interagency coordinating bodies to establish federal strategic climate change priorities that reflect the full range of climate- related federal activities, including roles and responsibilities of key federal entities. Use economic information to identify and respond to significant climate risks: In September 2017, we recommended that the appropriate entities within EOP use information on the potential economic effects of climate change to help identify significant climate risks facing the federal government and craft appropriate federal responses. Such federal responses could include establishing a strategy to identify, prioritize, and guide federal investments to enhance resilience against future disasters. Provide decision makers with the best-available climate information: In November 2015, we reported that federal efforts to provide information about climate change impacts did not fully meet the climate information needs of federal, state, local, and private sector decision makers, which hindered their efforts to plan for climate change risks. We reported that these decision makers would benefit from a national climate information system that would develop and update authoritative climate observations and projections specifically for use in decision-making. As a result, we recommended that EOP (1) designate a federal entity to develop and periodically update a set of authoritative climate observations and projections for use in federal decision-making, which other decision makers could also access, and (2) designate a federal entity to create a national climate information system with defined roles for federal agencies and nonfederal entities with existing statutory authority. Consider climate information in design standards: In November 2016, we reported that design standards, building codes, and voluntary certifications established by standards-developing organizations play a role in ensuring the resilience of infrastructure to the effects of natural disasters. However, we reported that these organizations faced challenges in using forward-looking climate information that could help enhance the resilience of infrastructure. As a result, we recommended in the November 2016 report that the Department of Commerce (Commerce), acting through the National Institute of Standards and Technology—which is responsible for coordinating federal participation in standards organizations— convene federal agencies for an ongoing government-wide effort to provide the best-available forward-looking climate information to standards-developing organizations for their consideration in the development of design standards, building codes, and voluntary certifications. In addition, in October 2019, we recommended that Congress consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. We also identified six key steps the federal government could use to prioritize climate resilience investments and opportunities to increase the climate resilience impacts of federal funding options that Congress could use in designing the arrangement. In October 2019 we also issued the Disaster Resilience Framework to serve as a guide for analysis of federal action to facilitate and promote resilience to natural disasters. The framework identifies three key principles that can help federal efforts to promote disaster resilience, including building resilience to climate change. First, authoritative and understandable information can help decision makers identify current and future risks and the impact of risk-reduction strategies. Second, integrated analysis and strategic planning can help decision makers take coherent and coordinated resilience actions. Third, financial and nonfinancial incentives can help make long-term, forward-looking risk-reduction investments more viable and attractive among competing priorities. In conclusion, the effects of climate change have already posed and will continue to pose risks that can create fiscal exposure across the federal government, and this exposure will continue to increase. The federal government does not generally account for such fiscal exposure to programs in the budget process, and it has not undertaken strategic efforts to manage significant climate risks that could reduce the need for far more costly steps in the decades to come. To reduce its fiscal exposure, the federal government needs a cohesive strategic approach with strong leadership and the authority to manage risks across the entire range of related federal activities. The federal government could make further progress toward reducing fiscal exposure by implementing the recommendations we have made. Chairman Rouda, Ranking Member Comer, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact J. Alfredo Gómez, Director, Natural Resources and Environment, at (202) 512-3841or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Joseph Dean Thompson (Assistant Director), Micah McMillan (Analyst in Charge), Holly Halifax, Caitlin Jackson, Richard Johnson, Joe Maher, Oliver Richard, and Kiki Theodoropoulos. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Since 2005, federal funding for disaster assistance is at least $450 billion, including approximately $19.1 billion in supplemental appropriations signed into law on June 6, 2019. In 2018 alone, there were 14 separate billion-dollar weather and climate disaster events across the United States, with a total cost of at least $91 billion, according to the National Oceanic and Atmospheric Administration. The U.S. Global Change Research Program projects that disaster costs will likely increase as certain extreme weather events become more frequent and intense due to climate change. The costs of recent weather disasters have illustrated the need for planning for climate change risks and investing in resilience. Resilience is the ability to prepare and plan for, absorb, recover from, and more successfully adapt to adverse events, according to the National Academies of Science, Engineering, and Medicine. Investing in resilience can reduce the need for far more costly steps in the decades to come. Since February 2013, GAO has included Limiting the Federal Government's Fiscal Exposure by Better Managing Climate Change Risks on its list of federal program areas at high risk of vulnerabilities to fraud, waste, abuse, and mismanagement or most in need of transformation. GAO updates this list every 2 years. In March 2019, GAO reported that the federal government had not made measurable progress since 2017 to reduce fiscal exposure to climate change. This testimony—based on reports GAO issued from October 2009 to October 2019—discusses 1) what is known about the potential economic effects of climate change in the United States and the extent to which this information could help federal decision makers manage climate risks across the federal government, (2) the fiscal exposure facing the federal government due to climate risks and current efforts to address that exposure, (3) the extent to which the federal government has invested in resilience to climate change impacts, and (4) how the federal government could reduce fiscal exposure to the effects of climate change. GAO had made 62 recommendations related to the Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks high-risk area. As of December 2018, 25 of those recommendations remained open. The estimated economic effects of climate change, while imprecise, can convey useful insight about potential damages in the United States. In September 2017, GAO reported that the potential economic effects of climate change could be significant and unevenly distributed across sectors and regions (see figure). This is consistent with the 2018 findings of the U.S. Global Change Research Program's Fourth National Climate Assessment, which concluded, among other things, that the continued increase in the frequency and extent of high-tide flooding due to sea level rise threatens America's trillion-dollar coastal infrastructure. Information about the potential economic effects of climate change could inform decision makers about significant potential damages in different U.S. sectors or regions. According to prior GAO work, this information could help decision makers identify significant climate risks as an initial step toward managing them. The federal government faces fiscal exposure from climate change risks in several areas, including: Disaster aid: due to the rising number of natural disasters and increasing reliance on federal assistance. GAO has previously reported that the federal government's fragmented and reactive approach to funding disaster resilience presented challenges to effective reduction of climate-related risks. GAO has also reported that, due to an artificially low indicator for determining a jurisdiction's ability to respond to disasters that was set in 1986, the Federal Emergency Management Agency risks recommending federal assistance for jurisdictions that could recover on their own. Federal insurance for property and crops: due, in part, to the vulnerability of insured property and crops to climate change impacts. Federal flood and crop insurance programs were not designed to generate sufficient funds to fully cover all losses and expenses. The flood insurance program, for example, was about $21 billion in debt to the Treasury as of April 2019. Further, the Congressional Budget Office estimated in May 2019 that federal crop insurance would cost the federal government an average of about $8 billion annually from 2019 through 2029. Operation and management of federal property and lands: due to the hundreds of thousands of federal facilities and millions of acres of land that could be affected by a changing climate and more frequent extreme events. For example, in 2018, Hurricane Michael devastated Tyndall Air Force Base in Florida, with a preliminary repair estimate of $3 billion. As we reported in October 2019, our past work shows an absence of government-wide strategic planning for climate change. Specifically, our past work has identified limitations related to strategic planning for climate change that includes a lack of coordination, prioritization, and consolidation of strategic priorities. In our March 2019 High-Risk Update, we assessed the federal government's progress since 2017 related to climate change strategic planning against five criteria and found that the federal government had not met any of the criteria for removal from the high-risk list. Federal investments in resilience to reduce fiscal exposures have been limited. As GAO has reported, enhancing resilience can reduce fiscal exposure by reducing or eliminating long-term risk to people and property from natural hazards. For example, a 2018 interim report by the National Institute of Building Sciences estimated approximate benefits to society in excess of costs for several types of resilience projects. While precise benefits are uncertain, the report estimated that for every dollar invested in designing new buildings to particular design standards, society could accrue benefits amounting to about $11 on average. GAO's March 2019 High-Risk report identified a number of recommendations GAO has made related to fiscal exposure to climate change. The federal government could reduce its fiscal exposure by implementing these recommendations. Among GAO's key government-wide recommendations are: Entities within the Executive Office of the President (EOP) should work with partners to establish federal strategic climate change priorities that reflect the full range of climate-related federal activities; Entities within EOP should use information on potential economic effects from climate change to help identify significant climate risks and craft appropriate federal responses; Entities within EOP should designate a federal entity to develop and update a set of authoritative climate observations and projections for use in federal decision making, and create a national climate information system with defined roles for federal agencies and certain nonfederal entities; and The Department of Commerce should convene federal agencies to provide the best-available forward-looking climate information to organizations that develop standards and building codes to enhance infrastructure resilience. Further, in October 2019, GAO reported that Congress could consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. GAO also issued the Disaster Resilience Framework to serve as a guide for analysis of federal action to facilitate and promote resilience to natural disasters, including resilience to climate change.", "document_type": "gao"}
{"report": "Reducing transportation-related fatalities and serious injuries has consistently been DOT’s top priority. Traffic fatalities and serious injuries may result from unsafe driver behaviors, such as speeding and alcohol- or drug-impaired driving, or from the design or condition of the road and its accompanying infrastructure. Within DOT, both NHTSA and FHWA are charged with reducing fatalities and serious injuries on the nation’s highways and, respectively, provide grant funding to states to mitigate the behavioral and infrastructure-related causes of vehicular crashes. NHTSA provided over $600 million in fiscal year 2018 to state highway safety offices through the Highway Safety Grants Program for activities designed to improve traffic safety by modifying driver behavior. For example, states may use NHTSA grant funding for efforts to increase seatbelt use, or to reduce impaired driving. FHWA provided about $2.6 billion in fiscal year 2018 to state departments of transportation through the Highway Safety Improvement Program (HSIP) for projects to improve safety on all public roads. HSIP funds can be used for infrastructure projects, such as rumble strips, and other projects such as road safety audits, safety planning, and improving safety data. States are allowed to transfer up to 50 percent of their HSIP safety apportionment made available each fiscal year to the other core FHWA highway programs. For example, from 2013 through 2018, 24 states transferred HSIP safety funding totaling over $1 billion to other core programs and three states transferred approximately $600 million into their HSIP safety program from other core programs. Over the last decade, the federal government has taken steps to move toward a performance-based framework for traffic safety funding. Historically, most federal surface transportation funds were distributed through formulas that often had no relationship to outcomes or grantees’ performance. In 2008, we recommended that Congress consider integrating performance-based principles into surface transportation programs such as NHTSA’s Highway Safety Grants Program and FHWA’s HSIP to improve performance and accountability in states’ use of federal funds. In particular, we noted that tracking specific outcomes that are clearly linked to program goals can provide a strong foundation for holding grant recipients responsible for achieving federal objectives and measuring overall program performance. The Moving Ahead for Progress in the 21st Century Act, enacted in 2012, formally required the Secretary of the Department of Transportation to, among other things, establish performance measures for states to use to assess fatalities and serious injuries to ensure further accountability for federal traffic safety funding provided to states. See table 1 for a complete list of mandatory performance measures. States are also required to establish targets annually for each of the performance measures and measure progress toward these targets. NHTSA first required states to develop targets for their performance measures as part of their planning for fiscal year 2014, and FHWA first required states to establish targets for their performance measures set in 2017 for calendar year 2018. Starting with these targets, state highway safety offices and departments of transportation were required by both NHTSA and FHWA to set identical targets for the three common performance measures in both frameworks. Both NHTSA’s and FHWA’s frameworks provide flexibility to states in how they may establish targets and emphasize using data to develop realistic and achievable targets rather than aspirational ones that reflect a long-term vision for future performance. Because the frameworks do not require a specific reduction in fatalities or serious injuries, states may set targets that are higher or lower than their historical averages depending on state-specific factors, such as population increases or economic conditions. As a result, targets may reflect either an anticipated increase or decrease in fatalities or serious injuries. NHTSA and FHWA require states to submit annual plans and reports to establish targets and describe their use of federal funds to improve safety and the results they have achieved relative to their targets. (See table 2.) NHTSA requires that states submit an annual Highway Safety Plan to, among other things, set targets, identify projects they will implement in the upcoming fiscal year, and describe how they will use funds from the Highway Safety Grants Program. States are also required to submit an Annual Report to NHTSA that includes an assessment of the state’s progress in achieving safety performance targets in the previous fiscal year. States are required to submit an HSIP report to FHWA that describes, among other things, how they have used federal HSIP funding for highway safety improvement projects during the prior reporting period as well as performance targets for the upcoming calendar year. In addition to the annual requirements, FHWA requires a Strategic Highway Safety Plan from states every 5 years that identifies a state’s key safety needs and long-term goals, and guides investment decisions to reduce fatalities and serious injuries. NHTSA and FHWA rely on states and localities to collect and report fatality and serious injury data used in the performance framework. In addition to providing information through annual plans and reports, states report traffic fatalities to NHTSA’s FARS database, which tracks all fatal traffic crashes nationwide. When a fatal crash occurs, a state or local police officer completes a crash report form unique to each state. These forms can include a variety of data fields, such as the time of the crash, weather conditions, and the number of killed or injured persons. FARS analysts—state employees who are trained by NHTSA’s data validation and training contractors—use the data in crash report forms to compile a record of the fatal crash. However, NHTSA’s collection and validation of these data may take up to 24 months following the end of a calendar year before it is finalized. FARS also contains serious injury data associated with fatal crashes, though neither NHTSA nor FHWA maintain a database of all serious injuries. Rather, the agencies rely on states and localities to collect and store records of serious injuries resulting from traffic crashes and report this information to them each year. Based on data the states and localities provide, NHTSA estimates the number of total injuries resulting from crashes to track overall national trends. From 2014 through 2017, states did not achieve about two-thirds of the targets they set for the required fatality performance measures, according to our analysis of state-reported NHTSA data. In addition, for a majority of the fatality performance measures required by NHTSA, these data show that the number of targets states achieved generally decreased from 2014 through 2017. (See table 3.) Over this same time, fatalities increased nationwide by 13 percent from about 33,000 in 2014 to over 37,000 in 2017. NHTSA officials said that fewer states achieved their targets over this time because fatalities increased nationwide over the same period due to increases in vehicle miles traveled and corresponding exposure to driving-related risks. Officials from the 10 states we selected said that achieving targets often depends on factors outside of their control, such as demographic and economic factors, as well as changes to state laws. Demographic factors. Officials from eight of the 10 selected states said that demographic factors such as increases or decreases in population affect traffic safety. For example, officials from one state said that when companies expanded in the state, the population increased rapidly and the economy improved and led to more driving. Officials from another state noted that the increasing population in the state’s urban areas has increased the number of pedestrian fatalities. Economic factors. Officials from seven of the 10 selected states noted that economic factors such as low unemployment can affect traffic safety. For example, officials in one state said that fatalities decreased during the 2009 recession, but when the economy began to improve and more people were employed, fatalities increased. These officials noted that the number of people driving is also affected by gas prices because when prices increase, people drive less. Changes to state laws. Officials from eight of the 10 selected states said that changes in state laws can affect whether a state meets its targets. For example, officials from one state said fatalities increased beginning in 2012 when the state legislature passed a law allowing the operation of a motorcycle without a helmet, and continued to increase through 2017 when the state legislature increased the speed limit on some roads from 70 to 75 miles per hour. These officials also noted that they expect fatalities in their state to further increase as a result of the recent legalization of the recreational use of marijuana. However, the extent to which states achieve targets does not necessarily reflect whether the number of fatalities has increased or decreased over time. First, states that achieved fatality targets did not necessarily experience reduced traffic fatalities. For example, for the 2017 targets, state-reported NHTSA data shows that 10 of 52 states achieved their target for the pedestrian fatalities performance measure, but five of these 10 states also experienced an increase in pedestrian fatalities compared to their 2012 through 2016 historical average. These data also show that the remaining 42 states did not achieve their total fatality target. Second, some states have experienced a decrease in traffic fatalities while not achieving their targets. For example, state-reported NHTSA data shows that 31 states did not achieve their targets for the speeding-related fatalities performance measure. However, these same data show that 11 of these 31 states decreased the total of number of these fatalities over their 2017 target period compared to their 2012 to 2016 average. Further, states that established targets that represented an increase in fatalities from historical averages (increasing targets) were more likely to achieve them than states that established targets that represented a decrease or no change in fatalities compared to their historical averages (decreasing targets), according to state-reported NHTSA data. Specifically, in 2017, for all of the required fatality performance measures, these data show that states that set increasing fatality targets relative to their historical 2012 to 2016 average achieved them at a higher rate than states that set targets that represented a decrease or no change to the number of fatalities (See fig.1.) For example, for the total fatality performance measure, eight states set increasing targets relative to their historical 2012 to 2016 average, while 44 states set decreasing or unchanged targets relative to their averages. However, these data show that six of the eight states with increasing targets for the total fatalities performance measure achieved them, while only three of the 44 states with decreasing or unchanged targets achieved theirs. In response to statute, NHTSA requires states to assess and report progress in achieving targets in the following year’s Highway Safety Plan and the NHTSA Annual Reports each year. Such an approach is consistent with federal standards for internal control, which state that agencies should communicate quality information, including about activities and achievements. According to NHTSA officials, state evaluations of their progress in these plans and reports are designed to be an interim assessment of a state’s progress. For example, because fatality data can take up to 2 years to be recorded by states in FARS and validated by NHTSA, final FARS data are not available when states are required to report on the achievement of the prior fiscal year’s targets in their Highway Safety Plans. Therefore, NHTSA encourages states to use state data to conduct this assessment or provide a qualitative analysis of the progress made in achieving these targets when FARS data are not available. Upon review of these reports, NHTSA publishes them on its website. While NHTSA has established requirements for states to provide assessments of their progress on achieving the prior year targets in their Highway Safety Plans and Annual Reports, we found that many states have not done so. For example, in the 2019 Highway Safety Plans submitted to NHTSA in July 2018, a third of states (19 of 52) did not provide an assessment of the progress they had made in achieving the fatality targets established in their 2018 Highway Safety Plans. Similarly, in the 2018 Annual Reports, submitted to NHTSA in December 2018, half of states (26 of 52) did not provide an assessment of whether they had made progress toward achieving the fatality targets established in their 2018 Highway Safety Plans. Instead, many of these states assessed progress for an earlier year or performance period. NHTSA officials acknowledged that some states are not clear on which target years to assess in their Highway Safety Plans and Annual Reports. NHTSA officials stated that they work closely with states to review the contents of the Highway Safety Plans and Annual Reports. To do so, NHTSA has developed guides to help its staff review Highway Plans and the Annual Reports to ensure states meet requirements to provide assessments of their progress. NHTSA officials stated they expect most states to comply with the requirements to assess progress in future Annual Reports and Highway Safety Plans because states will be more familiar with the reporting requirements. However, NHTSA has had similar requirements for states to provide in-progress assessments in these documents for a number of years. For example, the requirement to report on progress achieving highway safety performance measure targets identified in the Highway Safety Plans in the Annual Report was introduced in 2013. Similarly, NHTSA’s regulations have also required states to include an assessment of their progress in meeting state performance targets in their Highway Safety Plans since 2013. Without additional clarification from NHTSA to states on which target years to assess in their Highway Safety Plans and Annual Reports, NHTSA and other stakeholders may lack a timely understanding of the progress states have made in achieving their targets. NHSTA could provide such clarification through outreach to states, or by providing guidance on NHTSA’s website. Beyond the required interim state assessments of progress contained in the Annual Reports and Highway Safety Plans, NHTSA does not communicate to the public and other stakeholders about whether states eventually achieve their fatality targets. Federal standards for internal control state that agencies should communicate quality information, including about activities and achievements, so that external parties–such as Congress and other stakeholders–can help realize agency goals and objectives. NHTSA officials said that they have reported on states’ achievement of fatality targets in the past. For example, NHTSA previously reported to Congress in 2017 on states’ achievement of the fatality targets established in the 2014 and 2015 Highway Safety Plans in response to a statutory requirement. However, NHTSA did not provide this report to other stakeholders, and it has not subsequently reported to Congress or the general public on whether states achieved targets. NHTSA officials told us they did not have any plans to develop a similar report in the future because the requirement to report to Congress was repealed in January 2019. NHTSA was directed by statute in January 2019 to provide information on its website on state performance relative to the targets in the Highway Safety Plan. The statute broadly directs NHTSA to report on state performance and does not specifically direct NHTSA to communicate whether states eventually achieve their performance targets. NHTSA officials told us that this effort was in its initial stages and NHTSA is still in the process of determining how to meet the statutory requirement. By improving external communication of states’ achievement of fatality targets, NHTSA could give stakeholders better insight into the results states and NHTSA have achieved in their efforts to reduce fatalities and hold states more accountable for their use of federal safety funds. NHTSA could provide such information to all stakeholders through its planned website or by developing an alternative mechanism to convey this information. We were not able to determine the extent to which states achieved NHTSA serious injury targets from 2014 through 2017 because states’ definitions of “serious injury” have changed over time. As a result, state serious injury data used to set targets and analyze results may not be comparable year to year over this time period. NHTSA officials noted that changes to serious injury definitions can affect the total number of serious injuries recorded by the states. Similarly, officials from the Association of Transportation Safety Information Professionals told us that based on their experience, when there is a change to how serious injury data are defined or collected by states, total serious injury numbers in that state may change by up to 15 percent the following year. In some cases, changes to serious injury totals may be more extensive. For example, in 2016, one state changed its definition as part of implementing a new database to store crash records. After this change, the number of serious injuries nearly doubled from the previous year. NHTSA and FHWA have taken steps to standardize how states define and report serious injury data. In 2016, both FHWA and NHTSA set out requirements for all states to use a specific definition of serious injury by April 15, 2019, establishing a single national standard definition that will be used under both NHTSA’s and FHWA’s performance management framework. This standard includes requirements for states to integrate this definition into their practices for collecting and recording serious injury data. According to NHTSA and FHWA, this standard will ensure consistent, coordinated, and comparable data at the state and national levels and will assist stakeholders in addressing highway safety challenges. Moreover, according to officials from the Association of Transportation Safety Information Professionals, adoption of this standard will be an improvement upon the previous approaches used by states to define serious injuries. However, it will take time for states to adopt this standard and collect consistent data under the new national standard for serious injuries to use in the NHTSA’s and FHWA’s performance management frameworks. First, NHTSA’s and FHWA’s regulations require that states establish 5-year averages for serious injury targets; however, according to states’ most recent reporting, many states have only recently adopted NHTSA and FHWA’s national standard for defining serious injuries. Specifically, based on our review of information submitted by states in their 2018 HSIP reports, we found that 18 states had reported that they were fully compliant with the national standard as of the end of August 2018. FHWA officials told us that, based on their review of the information in the 2018 HSIP reports, they estimated that an additional 22 states planned to fully align their serious injury definition with requirements in the national standard by April 2019, and that the remaining 12 states had not indicated if they would be compliant with the national standard by that time. FHWA officials said they would conduct a compliance assessment in fall 2019 to determine whether states fully adopted the national standard. Second, data collected under previous, differing definitions cannot be retroactively converted to equivalent data under the definition established by the national standard, and thus it will take time to develop a consistently defined set of serious injury data. Specifically, for those states that have adopted the new standard in the last year, it may be 4 to 5 years until a 5-year average of serious injury data under the new standard can be reported, while the transition period may be longer for those states that have yet to adopt the standard. For example, the American Association of State Highway and Transportation Officials noted that if a state was not currently using the national standard, it would take a lengthy and resource-intensive effort to adopt the standard, including changing reporting processes, guidance, and training. State officials we interviewed also said the costs of updating software and paper forms to collect and store serious injury information, and of training state officials to collect serious injury data using the national standard, could further delay implementation. NHTSA and FHWA have taken steps to assist states with the transition to the new national standard for serious injuries. For example, in preparation for issuing the regulations, NHTSA and FHWA published state-specific guidance to help states adopt an interim standard before the national standard took effect in 2019. According to NHTSA and FHWA officials, this guidance, which aligned states’ existing definitions with a scale for injury severity, helped states provide more consistent serious injury statistics prior to implementing the new national standard in the FHWA rulemaking. While this interim standard helps improve consistency of the definition of serious injury within a state, it does not standardize the specific definition across all states as does the new national standard. In addition, NHTSA and FHWA developed an outreach program and training to help states adapt to the new requirement prior to implementation in 2019. While the transition occurs and until states have collected 5 years of data under the new national standard for serious injuries, NHTSA and FHWA plan to take different approaches to assessing states’ progress toward serious injury targets and communicating the results of their assessments. NHTSA officials told us that they would wait to assess progress until the states had adopted a consistent set of data under the national standard for serious injuries. NHTSA officials also noted that they did not assess whether states achieved their serious injury targets in NHTSA’s 2015 and 2017 reports to Congress, because of limitations with the data that the new standard seeks to mitigate. However, once the transition to the new national standard for serious injuries is complete, similar to state fatality targets, NHTSA does not have a formal mechanism for communicating whether states eventually achieve their serious injury targets. Communication of states’ achievement of both fatality and serious injury targets could help NHTSA hold states more accountable for their use of federal funds. In contrast, as directed by statute and regulations, FHWA plans to evaluate whether each state has met or made “significant progress” toward meeting both the fatality and serious injury-related targets by improving upon the state’s historical 5-year baseline for four of the five required performance measures. As directed by statute and FHWA’s regulations, states that FHWA determines either have not met their 2018 targets or not made significant progress are required to develop an implementation plan to describe how they will achieve targets in future years. Further, these states must use a portion of these states’ fiscal year 2021 HSIP funding exclusively for HSIP projects and may not transfer this portion of their HSIP funding to other core highway programs. Once FHWA’s evaluation of state progress is complete, it plans to communicate the extent to which states achieve these targets on its website, which contains information on the 5-year averages that make up the baseline, targets, and results, and tracks this information over time. FHWA officials said that, as states transition to the new national standard for serious injuries, the use of data collected under multiple definitions in a state may occur in future assessments of significant progress as states collect 5 years of data under the national standard. However, FHWA officials said that states will be able to take the limitations in the data into consideration and adjust targets each year as needed to minimize the risk that states’ results will vary significantly from their targets. An official from the Association of Transportation Safety Information Professionals said that he expects states may recalculate targets to account for changes in the data over the transition to the national standard for serious injuries, but that states have not expressed concerns about doing so. More broadly, FHWA officials also stated that modifying its approach for the transition period would require additional rulemakings by both FHWA and NHTSA, which could be a lengthy process and thus may not be completed before most states collect 5 years of data under the new standard. Officials from a majority of the states we surveyed reported that the performance measures and targets in the NHTSA framework influenced which projects they selected to fund to improve traffic safety and reduce fatalities and serious injuries. (See fig. 2.) For example, officials from two states we surveyed reported that the performance measures helped them identify emerging traffic safety trends, such as higher rates of speeding; as a result, the states directed more funding to projects addressing those issues. Officials from another state noted that the performance measures have led them to develop new projects to reduce cyclist and pedestrian fatalities, in addition to their traditional projects targeting impaired driving or seat belt use. In addition, other state officials responded that setting targets influenced their project selection by requiring staff to identify and fund projects that would have a positive effect on the targets established. When NHTSA developed the performance measures for states, it noted that, in addition to helping states monitor and evaluate their progress, performance measures can be used to allocate resources towards the most pressing safety issues. Officials from 19 states we surveyed said that the performance measures in the NHTSA framework did not influence their project selection. Similarly, officials from 23 states said the targets did not influence their project selection. Officials we surveyed cited a variety of reasons for why they did not use this performance information to select projects. For example, officials from three of these states said their states already had a data-driven or performance-based approach to project selection. Officials from one state explained that the NHTSA performance measures provide them with a general overview of safety trends in the state, but that they rely on more detailed data analysis of safety trends in different localities to select projects. Officials from another state said they do not use the specific targets to select projects, because they look for ways to decrease fatalities, not to achieve a specific number of fatalities in a given year. Officials from another state explained that they receive limited safety funding and therefore select projects to make sure they are eligible to qualify for NHTSA grants. NHTSA officials acknowledged that the performance management framework can pose challenges for some states, but noted that they provide technical assistance and guidance to help states make the best use of their performance information. State officials reported other safety benefits from NHTSA’s performance framework in addition to improved project selection. Specifically, officials from almost three-quarters of states we surveyed said the NHTSA framework helped them to improve highway safety in their state. For example, officials from five states we surveyed reported that the framework has improved how they identify highway safety problems, such as by formalizing a data-driven approach to highway safety in their state. Officials we surveyed also noted that by requiring states to reach agreement on some NHTSA and FHWA targets, the framework helped them to increase collaboration with other highway safety stakeholders in the state. For example, officials from one state reported that the collaboration between the state department of transportation and highway safety office has increased their awareness of how physical road improvements and behavioral projects can work together to improve safety in the state. Officials from the 14 states who reported that the framework has not helped them improve safety cited various reasons, including that they used data-driven approaches prior to NHTSA’s framework and that the framework has increased their administrative burden. NHTSA officials agreed that the framework imposed some administrative burdens on states, but stated that the benefits of using a performance-based approach to manage state highway safety programs outweighed any costs for states. To ensure that the framework helps states to improve traffic safety, NHTSA regulations require states to include at least one performance measure (and associated target) for each program area contained in their Highway Safety Plans. These requirements are consistent with federal standards for internal control that agencies should establish and operate activities to monitor the internal control system. Such monitoring activities should be built into the agency’s operation. We found 49 states included performance measures with all the program areas in their 2019 Highway Safety Plans. For example, one state uses the number of motorcyclist fatalities and unhelmeted motorcyclist fatalities as performance measures for its motorcycle safety program area. The remaining three states included performance measures for at least 80 percent of their program areas. By requiring states to establish performance measures for their program areas, NHTSA can help ensure states have appropriate performance measures in place to evaluate whether they are achieving the objectives of their highway safety programs. NHTSA’s regulations also require states to describe the linkage between the countermeasure strategies—the safety initiatives a state plans to fund to address highway safety problems—and the performance targets in their Highway Safety Plans. Requiring states to link their funding decisions with their targets aligns with a leading practice for performance management we have previously identified: that agencies should use performance information to allocate resources. We examined the sections of 2019 Highway Safety Plans where states are prompted to provide this linkage, and found, however, that less than a third of states (12 of 52) described all the linkages between their performance targets and the countermeasure strategies in those sections. NHTSA officials noted that states are directed to submit similar information in other locations throughout the plans, and that NHTSA’s review of the 2019 plans credited states with making these linkages by considering information in other sections of the plan. NHTSA has taken steps this year to improve states’ reporting and its own review of the 2020 Highway Safety Plans. For example, NHTSA officials told us that they have held in-person meetings with state highway safety officials to emphasize the need to provide linkages between their targets and countermeasures in their 2020 Highway Safety Plans. NHTSA officials said they have also held training in 2019 for staff who review these plans to ensure states adhere to reporting requirements. Specifically, during the training, NHTSA officials said they provided guidance to staff on reviewing Highway Safety Plans; this guidance prompts reviewers to check whether states link their countermeasure strategies with targets, and to provide feedback to states that have not provided these linkages. As a result of these actions, NHTSA anticipates that states will more clearly identify linkages in their 2020 plans. While states recently began setting performance measure targets under FHWA’s framework in 2017, officials from about a third of states we surveyed reported that performance measures in FHWA’s framework influenced their decisions about which infrastructure-based safety projects to fund. (See fig. 3.) Slightly fewer respondents said the targets they set influenced their project selection. These states reported that this performance information influenced their decision making in different ways. For example, officials from one state reported funding more pedestrian and bicycle safety projects as a result of the trends indicated by the performance measures. Officials from another state said they have shifted to selecting projects that can be constructed quickly in order to reach their annual safety targets. Officials from about two-thirds of states we surveyed said the performance measures and performance targets did not influence their HSIP project selection. Instead, many of these state officials reported that the FHWA performance framework has not changed their project selection methodology, and that they used alternative data-driven approaches to select highway projects. For example, officials from four states reported that they used their 5-year Strategic Highway Safety Plans, which highlight traffic safety issues to guide project selection. In other cases, state officials reported that they continued to use a data- driven approach, such as cost-benefit analysis or crash data analysis, to maximize safety benefits and select the most cost-effective highway safety projects. This approach is consistent with a recent FHWA survey of state departments of transportation, which reported that most states used their 5-year Strategic Highway Safety Plans and cost to prioritize projects. Federal guidelines, including those at FHWA, encourage the use of cost- benefit analysis for selecting infrastructure projects. We have also previously reported that such analysis can lead to better-informed transportation decisions. According to FHWA officials, performance management is not intended to supplant the use of other data-driven project selection methods, but to complement and be integrated into existing methods. To help further this synthesis, FHWA officials told us that they are developing a guide to better explain how states can incorporate the use of performance measures into existing methods, such as cost-benefit analysis, to select projects and achieve their safety targets. FHWA officials expect to issue this guide by January 2020. Overall, a slight majority of states we surveyed (27 of 52) reported that FHWA’s performance framework assisted them in improving safety. Officials cited safety benefits beyond improved project selection, such as increased awareness of highway safety issues for state leaders and the public; and increased collaboration with other highway safety agencies within the state. State officials who did not find the framework helpful cited various reasons. For example, some state officials we surveyed said they were already using performance measures prior to FHWA’s framework. Other officials surveyed said FHWA’s performance framework was not helpful because they have a “Vision Zero” or a “Toward Zero Deaths” policy in their state. According to these officials, under such a policy, the state’s goal is to achieve zero traffic fatalities. Officials from a state with such a policy explained that setting a target to achieve any fatalities was not acceptable to the public or the state because it suggests that not every life is important. FHWA officials said that setting annual targets, however, can ensure states are on track to reach their long-term goals, such as to reduce fatalities to zero. To encourage states to integrate the performance framework into their other safety plans, FHWA regulations require states to link their performance measure targets to the long-term goals in their 5-year Strategic Highway Safety Plans. States must provide a description in their HSIP reports of how each target supports these goals. FHWA has developed and issued a template for the HSIP report that prompts states to describe the link between their targets and their Strategic Highway Safety Plans’ goals. However, about half of the states did not describe how all of their targets support their Strategic Highway Safety Plans’ goals in their 2018 HSIP report, and thirteen of these states did not describe these linkages for any of their targets. In response to our analysis, FHWA officials have taken additional actions to improve states’ HSIP reporting. Specifically, FHWA officials provided training to staff and state officials that referenced our analysis that states did not describe the linkages between targets and long-term goals in their HSIP reports. During the training, FHWA officials emphasized the importance of including such information as states prepare their 2019 HSIP reports. Additionally, FHWA officials said they are updating the guide its staff uses to review HSIP reports to ensure states are describing how the targets they set support their Strategic Highway Safety Plan’s goals. In light of the large number of fatalities that occur each year on the nation’s highways and the billions of federal dollars DOT provides annually to states to improve traffic safety, the ability to assess the outcomes of federal surface transportation safety programs and hold grant recipients accountable for results is critical. NHTSA and FHWA have made great strides over the last decade in moving to a performance-based approach for traffic safety funding to improve accountability for federal funds. The results, however, that states have achieved under these frameworks are not always clear. For example, NHTSA has required states to report on their interim progress achieving targets, but states have not had clear direction on what results to assess. In addition, NHTSA lacks a formal mechanism to communicate whether states have been achieving the targets set under their framework. Without improved communication of progress, Congress will be limited in its ability to hold NHTSA and states accountable for their use of federal funds. Moreover, improved reporting of states’ achievements under NHTSA’s framework could help provide insight into the effectiveness of the overall federal traffic safety program. We are making two recommendations to NHTSA: The NHTSA Administrator should provide direction and clarification to states to ensure compliance with requirements to assess and report progress made in achieving fatality targets. (Recommendation 1) The NHTSA Administrator should develop and implement a mechanism that communicates to Congress and other stakeholders whether states achieve their fatality and serious injury targets. (Recommendation 2) We provided a draft of this report to DOT for comment. In its comments, reproduced in appendix III, DOT stated that it concurred with our recommendations. DOT also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Transportation, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Susan Fleming at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. The questions we asked in our survey of state Highway Safety Offices and the aggregate results of the responses to the closed-ended questions are shown below. Our survey was comprised of closed- and open-ended questions. We do not provide results for the open-ended questions. We sent surveys to 52 state highway safety offices about the National Highway and Traffic Safety Administration’s (NHTSA) performance framework from the 50 states, Puerto Rico and the District of Columbia. We received responses from 50 state highway safety offices, for a 96 percent response rate. For more information on our survey methodology, see page 4 of this report. Q1a. NHTSA has implemented a performance management framework that requires states to set targets for highway safety performance measures and to track their progress towards meeting those targets. Generally speaking, has NHTSA’s highway safety performance framework assisted you in improving highway safety in your state? Q1b. Why has NHTSA’s highway safety performance framework assisted or not assisted you in improving highway safety in your state? (Written responses not included.) Q2a. Each year, states use Highway Safety Plan (HSP) funding and select projects to address identified highway safety problems. How much, if at all, has NHTSA’s highway safety performance framework changed your state’s current approach to selecting HSP projects? Q2b. In what ways, if any, has NHTSA’s highway safety performance framework changed your state’s current approach to selecting HSP projects? (Written responses not included.) Q3a. Thinking about your state’s current HSP program, how much, if at all, did NHTSA’s required highway safety performance measures influence which projects your state selected? Q3b. In what ways, if any, have NHTSA’s required performance measures influenced which HSP projects your state selected? (Written responses not included.) Q4a. Thinking again about your state’s current HSP program, how much, if at all, did the specific targets your state set for NHTSA’s required performance measures influence which projects your state selected? Q4b. In what ways, if any, have the specific targets your state set for NHTSA’s required performance measures influenced which HSP projects your state selected? (Written responses not included.) The questions we asked in our survey of state departments of transportation and the aggregate results of the responses to the closed- ended questions are shown below. Our survey was comprised of closed- and open-ended questions. We do not provide results for the open-ended questions. We surveyed 52 state departments of transportation about the Federal Highway Administration’s (FHWA) performance framework from the 50 states, Puerto Rico and the District of Columbia. We received responses from all 52 state departments of transportation, for a 100 percent response rate. For more information on our survey methodology, see page 4 of this report. Q1a. FHWA has implemented a performance management framework that requires states to set targets for highway safety performance measures and to track their progress towards meeting those targets. Generally speaking, has FHWA’s highway safety performance framework assisted you in improving highway safety in your state? Q1b. Why has FHWA’s highway safety performance framework assisted or not assisted you in improving highway safety in your state? (Written responses not included.) Q2a. Each year, states use Highway Safety Improvement Program (HSIP) funding and select projects to address identified highway safety problems. How much, if at all, has FHWA’s highway safety performance framework changed your state’s current approach to selecting HSIP projects? Q2b. In what ways, if any, has FHWA’s highway safety performance framework changed your state’s current approach to selecting HSIP projects? (Written responses not included.) Q3a. Thinking about your state’s current HSIP program, how much, if at all, did FHWA’s required highway safety performance measures influence which projects your state selected? Q3b. In what ways, if any, have FHWA’s required performance measures influenced which HSIP projects your state selected? (Written responses not included.) Q4a. Thinking again about your state’s current HSIP program, how much, if at all, did the specific targets your state set for FHWA’s required performance measures influence which projects your state selected? Q4b. In what ways, if any, have the specific targets your state set for FHWA’s required performance measures influenced which HSIP projects your state selected? (Written responses not included.) In addition to the contact named above, Sara Vermillion (Assistant Director); Matt Voit (Analyst-in-Charge); Carl Barden; Caitlin Cusati; Timothy Guinane; Geoffrey Hamilton; Georgeann Higgins; Catrin Jones; Jesse Mitchell; Joshua Ormond; Kelly Rubin; and Laurel Voloder made key contributions to this report.", "summary": "Over 37,000 people were killed in traffic crashes on the nation's highways in 2017. Within the U.S. Department of Transportation (DOT), two agencies—NHTSA for behavioral factors and FHWA for highway infrastructure—provide about $3 billion annually to states for programs to improve traffic safety. To ensure that states are held accountable for these funds, NHTSA and FHWA developed performance management frameworks that require states to use performance measures and targets in tracking traffic fatalities and serious injuries. GAO was asked to review NHTSA's and FHWA's traffic safety performance management frameworks. This report examines the extent to which: (1) states have met fatality and serious injury targets, and NHTSA's and FHWA's approaches to assessing states' achievements, and (2) states have used performance measures and targets to make traffic safety funding decisions. GAO analyzed state-reported targets and NHTSA data from 2014 through 2017—the most recent data available—for all 50 states, the District of Columbia, and Puerto Rico; surveyed these states on the use of performance measures and targets; reviewed requirements in NHTSA's and FHWA's frameworks; and interviewed officials from NHTSA, FHWA, and 10 states, selected to obtain a mix of population sizes, geographic locations, and other factors. From 2014 through 2017, states did not achieve most of the fatality-related targets they set under the National Highway Traffic Safety Administration's (NHTSA) performance management framework (see table), and the number of serious injury targets states achieved during this period is unclear. GAO did not assess whether states achieved targets they set under the Federal Highway Administration's (FHWA) framework because the data were not yet available. State officials we interviewed said that achieving fatality targets may depend on factors outside their control, such as demographic, economic, and legislative changes. GAO's analysis of states' reports showed that nearly half of states did not provide the required assessment of progress to NHTSA on their most recent set of fatality targets. While NHTSA has taken steps to improve its review of these reports, officials acknowledged states are not clear on which target years to assess. Further, NHTSA lacks a mechanism to report whether states eventually achieve these targets. As a result, NHTSA and other stakeholders have limited insight into the results states have achieved from their use of federal safety funds. The extent to which states achieved serious injury targets is unclear because states have changed their definitions of serious injury over time. To ensure the consistency of these data, NHTSA and FHWA established a standard definition for reporting serious injuries, which states are in the process of adopting. In a survey that GAO administered, officials from a majority of states said that performance measures informed how they selected projects under NHTSA's framework. GAO found, however, that in the 2019 plans submitted by states to NHTSA, less than a third of states reported how performance targets and funded projects were linked. Since the submission of those plans, NHTSA has provided training and guidance to its staff to ensure future plans will more clearly identify these links. Under FHWA's framework, about one-third of states reported in GAO's survey that performance measures influenced their project selection; the remaining two-thirds reported using an alternative data-driven approach, such as cost-benefit analysis. FHWA officials said they are developing guidance to help states integrate performance measures and targets into methods that states are currently using to select highway safety projects. GAO recommends that NHTSA (1) provide additional direction and clarification to ensure states assess and report progress in meeting fatality targets, and (2) report on states' final achievement of targets. DOT concurred with the recommendations.", "document_type": "gao"}
{"report": "VA’s mission is to promote the health, welfare, and dignity of all veterans in recognition of their service to the nation by ensuring that they receive medical care, benefits, social support, and lasting memorials. In carrying out this mission, the department operates one of the largest health care delivery systems in America, providing health care to millions of veterans and their families at more than 1,500 facilities. The department’s three major components—the Veterans Health Administration (VHA), the Veterans Benefits Administration (VBA), and the National Cemetery Administration (NCA)—are primarily responsible for carrying out its mission. More specifically, VHA provides health care services, including primary care and specialized care, and it performs research and development to address veterans’ needs. VBA provides a variety of benefits to veterans and their families, including disability compensation, educational opportunities, assistance with home ownership, and life insurance. Further, NCA provides burial and memorial benefits to veterans and their families. The use of IT is critically important to VA’s efforts to provide benefits and services to veterans. As such, the department operates and maintains an IT infrastructure that is intended to provide the backbone necessary to meet the day-to-day operational needs of its medical centers, veteran- facing systems, benefits delivery systems, memorial services, and all other systems supporting the department’s mission. The infrastructure is to provide for data storage, transmission, and communications requirements necessary to ensure the delivery of reliable, available, and responsive support to all VA staff offices and administration customers, as well as veterans. Toward this end, the department operates approximately 240 information systems, manages approximately 314,000 desktop computers and 30,000 laptops, and administers nearly 460,000 network user accounts for employees and contractors to facilitate providing benefits and health care to veterans. These systems are used for the determination of benefits, benefits claims processing, patient admission to hospitals and clinics, and access to health records, among other services. VHA’s systems provide capabilities to establish and maintain electronic health records that health care providers and other clinical staff use to view patient information in inpatient, outpatient, and long-term care settings. The department’s health information system—VistA—serves an essential role in helping the department to fulfill its health care delivery mission. Specifically, VistA is an integrated medical information system that was developed in-house by the department’s clinicians and IT personnel, and has been in operation since the early 1980s. The system consists of 104 separate computer applications, including 56 health provider applications; 19 management and financial applications; eight registration, enrollment, and eligibility applications; five health data applications; and three information and education applications. Within VistA, an application called the Computerized Patient Record System enables the department to create and manage an individual electronic health record for each VA patient. In June 2017, the former VA Secretary announced that the department planned to acquire the same Cerner electronic health record system that the Department of Defense (DOD) has acquired. VA’s effort—the Electronic Health Record Modernization (EHRM) program—calls for the deployment of a new electronic health record system at three initial sites in 2020, with a phased implementation of the remaining sites over the next decade. In addition, VBA relies on the Veterans Benefits Management System (VBMS) to collect and store information such as military service records, medical examinations, and treatment records from VA, DOD, and private medical service providers. In 2014, VA issued its 6-year strategic plan, which emphasizes the department’s goal of increasing veterans’ access to benefits and services, eliminating the disability claims backlog, and ending veteran homelessness. According to the plan, the department intends to improve access to benefits and services through the use of enhanced technology to provide veterans with access to more effective care management. The plan also calls for VA to eliminate the disability claims backlog by fully implementing an electronic claims process that is intended to reduce processing time and increase accuracy. Further, the department has an initiative under way that provides services, such as health care, housing assistance, and job training, to end veteran homelessness. Toward this end, VA is working with other agencies, such as the Department of Health and Human Services, to implement more coordinated data entry systems to streamline and facilitate access to appropriate housing and services. Since 2007, VA has been operating a centralized organization, OI&T, in which most key functions intended for effective management of IT are performed. This office is led by the Assistant Secretary for Information and Technology—VA’s Chief Information Officer (CIO). The office is responsible for providing strategy and technical direction, guidance, and policy related to how IT resources are to be acquired and managed for the department, and for working closely with its business partners—such as VHA—to identify and prioritize business needs and requirements for IT systems. Among other things, OI&T has responsibility for managing the majority of VA’s IT-related functions, including the maintenance and modernization of VistA. As of January 2019, OI&T was comprised of about 15,800 staff, with more than half of these positions filled by contractors. VA’s fiscal year 2020 budget request includes about $5.9 billion for OI&T and its new electronic health record system. Of this amount, about $4.3 billion was requested for OI&T, which represents a $240 million increase over the $4.1 billion enacted for 2019. The request seeks the following levels of funding: $401 million for new systems development efforts to support current health care systems platforms, and to replace legacy systems, such as the Financial Management System; approximately $2.7 billion for the operations and maintenance of existing systems, which includes $327.3 million for infrastructure readiness that is to support the transition to the new electronic health record system; and approximately $1.2 billion for administration. Additionally, the department requested about $1.6 billion for the EHRM program. This amount is an increase of $496 million over the $1.1 billion that was enacted for the program for fiscal year 2019. The request includes the following: $1.1 billion for the contract with the Cerner Corporation to acquire the $161,800 for program management, and $334,700 for infrastructure support. In 2015, we designated VA Health Care as a high-risk area for the federal government and noted that IT challenges were among the five areas of concern. In part, we identified limitations in the capacity of VA’s existing systems, including the outdated, inefficient nature of certain systems and a lack of system interoperability—that is, the ability to exchange and use electronic health information—as contributors to the department’s IT challenges related to health care. Also, in February 2015, we added Improving the Management of IT Acquisitions and Operations to our list of high-risk areas. Specifically, federal IT investments were too frequently failing or incurring cost overruns and schedule slippages while contributing little to mission- related outcomes. We have previously reported that the federal government has spent billions of dollars on failed IT investments, including at VA. Our 2017 update to the high-risk report noted that VA had partially met our leadership commitment criterion by involving top leadership in addressing the IT challenges portion of the VA Health Care high-risk area; however, it had not met the action plan, monitoring, demonstrated progress, or capacity criteria. We have also identified VA as being among a handful of departments with one or more archaic legacy systems. Specifically, in our May 2016 report on legacy systems used by federal agencies, we identified two of VA’s systems as being over 50 years old—the Personnel and Accounting Integrated Data system and the Benefits Delivery Network system. These systems were among the 10 oldest investments and/or systems that were reported by 12 selected agencies. Accordingly, we recommended that the department identify and plan to modernize or replace its legacy systems. VA addressed the recommendation in May 2018, when it provided a Comprehensive Information Technology Plan that showed a detailed roadmap for the key programs and systems required for modernization. The plan included time frames, activities to be performed, and functions to be replaced or enhanced. The plan also indicated that the Personnel and Accounting Integrated Data system and the Benefits Delivery Network system are to be decommissioned in quarters 3 and 4 of fiscal year 2019, respectively. Our March 2019 update to our high-risk series noted that the ratings for leadership commitment criterion regressed, while the action plan criterion improved for the IT Challenges portion of the VA Health Care area. The capacity, monitoring, and demonstrated progress criteria remained unchanged. Our work continued to indicate that VA was not yet able to demonstrate progress in this area. Since its 2015 high-risk designation, we have made 14 new recommendations in the VA Health Care area, 12 of which were made since our 2017 high-risk report was issued. For example, in June 2017, to address deficiencies we recommended that the department take six actions to provide clinicians and pharmacists with improved tools to support pharmacy services to veterans and reduce risks to patient safety. VA generally concurred with these recommendations; however, all of them remain open. Congress enacted FITARA in December 2014 to improve agencies’ acquisitions of IT and enable Congress to better monitor agencies’ progress and hold them accountable for reducing duplication and achieving cost savings. The law applies to VA and other covered agencies. It includes specific requirements related to seven areas, including agency CIO authority, data center consolidation and optimization, risk management of IT investments, and government-wide software purchasing. Agency CIO authority enhancements. CIOs at covered agencies are required to (1) approve the IT budget requests of their respective agencies, (2) certify that IT investments are adequately implementing incremental development, as defined in capital planning guidance issued by the Office of Management and Budget (OMB), (3) review and approve contracts for IT, and (4) approve the appointment of other agency employees with the title of CIO. Federal data center consolidation initiative. Agencies are required to provide OMB with a data center inventory, a strategy for consolidating and optimizing their data centers (to include planned cost savings), and quarterly updates on progress made. The law also requires OMB to develop a goal for how much is to be saved through this initiative, and provide annual reports on cost savings achieved. Enhanced transparency and improved risk management in IT investments. OMB and covered agencies are to make detailed information on federal IT investments publicly available, and department-level CIOs are to categorize their major IT investments by risk. Additionally, in the case of major investments rated as high risk for 4 consecutive quarters, the act required that the department- level CIO and the investment’s program manager conduct a review aimed at identifying and addressing the causes of the risk. Government-wide software purchasing program. The General Services Administration is to enhance government-wide acquisition and management of software and allow for the purchase of a software license agreement that is available for use by all executive branch agencies as a single user. Additionally, the Making Electronic Government Accountable by Yielding Tangible Efficiencies Act of 2016, or the “MEGABYTE Act,” further enhanced CIOs’ management of software licenses by requiring agency CIOs to establish an agency software licensing policy and a comprehensive software license inventory to track and maintain licenses, among other requirements. In June 2015, OMB released guidance describing how agencies are to implement FITARA. This guidance is intended to, among other things: assist agencies in aligning their IT resources with statutory establish government-wide IT management controls that will meet the law’s requirements, while providing agencies with flexibility to adapt to unique agency processes and requirements; clarify the CIO’s role and strengthen the relationship between agency CIOs and bureau CIOs; and strengthen CIO accountability for IT costs, schedules, performance, and security. The federal approach and strategy for securing information systems is prescribed by federal law and policy. The Federal Information Security Modernization Act (FISMA) provides a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets. In addition, the Federal Cybersecurity Enhancement Act of 2015 requires protecting federal networks through the use of federal intrusion prevention and detection capabilities. Further, Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, directs agencies to manage cybersecurity risks to the federal enterprise by, among other things, using the National Institute of Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (cybersecurity framework). Federal agencies, including VA, and our nation’s critical infrastructures— such as energy, transportation systems, communications, and financial services—are dependent on IT systems and electronic data to carry out operations and to process, maintain, and report essential information. The security of these systems and data is vital to public confidence and national security, prosperity, and well-being. Because many of these systems contain vast amounts of personally identifiable information, agencies must protect the confidentiality, integrity, and availability of this information. In addition, they must effectively respond to data breaches and security incidents when they occur. The risks to IT systems supporting the federal government and the nation’s critical infrastructure are increasing, including insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Cybersecurity incidents continue to impact federal entities and the information they maintain. According to OMB’s 2018 annual FISMA report to Congress, agencies reported 35,277 information security incidents to DHS’s U.S. Computer Emergency Readiness Team in fiscal year 2017. VA has made limited progress toward addressing the IT management challenges for three critical initiatives: VistA, the Family Caregiver Program, and VBMS. Specifically, the department has recently initiated its fourth effort to modernize VistA, but uncertainty remains regarding the program’s governance. In addition, although VA has taken steps to address our recommendations for the Family Caregiver Program and VBMS, the department has not fully implemented most of them. VA has pursued four efforts over nearly 2 decades to modernize VistA. These efforts—HealtheVet, the integrated Electronic Health Record (iEHR), VistA Evolution, and EHRM—reflect varying approaches that the department has considered to achieve a modernized health care system. Figure 1 shows a timeline of the four efforts that VA has pursued to modernize VistA since 2001. In 2001, VA undertook its first VistA modernization project, the HealtheVet initiative, with the goals of standardizing the department’s health care system and eliminating the approximately 130 different systems used by its field locations at that time. HealtheVet was scheduled to be fully implemented by 2018 at a total estimated development and deployment cost of about $11 billion. As part of the effort, the department had planned to develop or enhance specific areas of system functionality through six projects, which were to be completed between 2006 and 2012. In June 2008, we reported that the department had made progress on the HealtheVet initiative, but noted concerns with its project planning and governance. In June 2009, the Secretary of Veterans Affairs announced that VA would stop financing failed projects and improve the management of its IT development projects. Subsequently in August 2010, the department reported that it had terminated the HealtheVet initiative. In February 2011, VA began its second VistA modernization initiative, the iEHR program, in conjunction with DOD. The program was intended to replace the two separate electronic health record systems used by the two departments with a single, shared system. In addition, because both departments would be using the same system, this approach was expected to largely sidestep the challenges that had been encountered in trying to achieve interoperability between their two separate systems. Initial plans called for the development of a single, joint iEHR system consisting of 54 clinical capabilities to be delivered in six increments between 2014 and 2017. Among the agreed-upon capabilities to be delivered were those supporting laboratory, anatomic pathology, pharmacy, and immunizations. According to VA and DOD, the single system had an estimated life cycle cost of $29 billion through the end of fiscal year 2029. However, in February 2013, the Secretaries of VA and DOD announced that they would not continue with their joint development of a single electronic health record system. This decision resulted from an assessment of the iEHR program that the secretaries had requested in December 2012 because of their concerns about the program facing challenges in meeting deadlines, costing too much, and taking too long to deliver capabilities. In 2013, the departments abandoned their plan to develop the integrated system and stated that they would again pursue separate modernization efforts. In December 2013, VA initiated its VistA Evolution program as a joint effort of VHA and OI&T. The program was to be comprised of a collection of projects and efforts focused on improving the efficiency and quality of veterans’ health care, modernizing the department’s health information systems, increasing the department’s data exchange and interoperability with DOD and private sector health care partners, and reducing the time it takes to deploy new health information management capabilities. Further, the program was intended to result in lower costs for system upgrades, maintenance, and sustainment. However, VA ended the VistA Evolution program in December 2018 to focus on its new electronic health record system acquisition. In June 2017, VA’s Secretary announced a significant shift in the department’s approach to modernizing VistA. Specifically, rather than continue to use VistA, the Secretary stated that the department would acquire the same electronic health record system that DOD is implementing. In this regard, DOD awarded a contract to acquire a new integrated electronic health record system developed by the Cerner Corporation. According to the Secretary, VA decided to acquire this same product because it would allow all of VA’s and DOD’s patient data to reside in one system, thus enabling seamless care between the department and DOD without the manual and electronic exchange and reconciliation of data between two separate systems. According to the Secretary, this fourth VistA modernization initiative is intended to minimize customization and system differences that currently exist within the department’s medical facilities, and ensure the consistency of processes and practices within VA and DOD. When fully operational, the system is intended to be a single source for patients to access their medical history and for clinicians to use that history in real time at any VA or DOD medical facility, which may result in improved health care outcomes. According to VA’s Chief Technology Officer, Cerner is expected to provide integration, configuration, testing, deployment, hosting, organizational change management, training, sustainment, and licenses necessary to deploy the system in a manner that meets the department’s needs. To expedite the acquisition, in June 2017, the Secretary signed a “Determination and Findings,” for a public interest exception to the requirement for full and open competition, and authorized VA to issue a solicitation directly to Cerner. Accordingly, the department awarded a contract to Cerner in May 2018 for a maximum of $10 billion over 10 years. Cerner is to replace VistA with a commercial electronic health record system. This new system is to support a broad range of health care functions that include, for example, acute care, clinical decision support, dental care, and emergency medicine. When implemented, the new system will be expected to provide access to authoritative clinical data sources and become the authoritative source of clinical data to support improved health, patient safety, and quality of care provided by VA. Further, the department has estimated that, as of November 2018, an additional $6.1 billion in funding, above the Cerner contract amount, will be needed to fund additional project management support supplied by outside contractors, government labor costs, and infrastructure improvements over a 10-year implementation period. Deployment of the new electronic health record system at three initial sites is planned for March 2020, with a phased implementation of the remaining sites over the next decade. Each VA medical facility is expected to continue using VistA until the new system has been deployed at that location. After VA announced in June 2017 that it planned to acquire the Cerner electronic health record system, we testified in June 2018 that a governance structure had been proposed that would be expected to leverage existing joint governance facilitated by the Interagency Program Office. At that time, VA’s program officials had stated that the department’s governance plans for the new program were expected to be finalized in October 2018. However, the officials had not indicated what role, if any, the Interagency Program Office was to have in the governance process. This office has been involved in various approaches to increase health information interoperability since it was established by the National Defense Authorization Act for Fiscal Year 2008 to function as the single point of accountability for DOD’s and VA’s electronic health record system interoperability efforts. In September 2018, we recommended that VA clearly define the role and responsibilities of the Interagency Program Office in the governance plans for acquisition of the department’s new electronic health record system. The department concurred with our recommendation and stated that the Joint Executive Committee, a joint governance body comprised of leadership from DOD and VA, had approved a role for the Interagency Program Office that included providing expertise, guidance, and support for DOD, VA, and joint governance bodies as the departments continue to acquire and implement interoperable electronic health record systems. However, the department has not yet provided documentation supporting these actions and how they relate to VA’s governance structure for the new acquisition. In addition, the role described does not appear to position the office to be the single point of accountability originally identified in the National Defense Authorization Act for Fiscal Year 2008. We continue to monitor the department’s governance plans for the acquisition of the new electronic health record system and its relationship with the Interagency Program Office. In May 2010, VA was required by statute to establish a program to support family caregivers of seriously injured post-9/11 veterans. In May 2011, VHA implemented its Family Caregiver Program at all VA medical centers across the country, offering caregivers an array of services, including a monthly stipend, training, counseling, referral services, and expanded access to mental health and respite care. In fiscal year 2014, VHA obligated over $263 million for the program. In September 2014, we reported that the Caregiver Support Program office, which manages the program, did not have ready access to the types of workload data that would allow it to routinely monitor the effects of the Family Caregiver Program on VA medical centers’ resources due to limitations with the program’s IT system—the Caregiver Application Tracker. Program officials explained that this system was designed to manage a much smaller program and, as a result, the system has limited capabilities. Outside of obtaining basic aggregate program statistics, the program office was not able to readily retrieve data from the system that would allow it to better assess the scope and extent of workload problems at VA medical centers. Program officials also expressed concern about the reliability of the system’s data. The lack of ready access to comprehensive workload data impeded the program office’s ability to monitor the program and identify workload problems or make modifications as needed. This runs counter to federal standards for internal control which state that agencies should monitor their performance over time and use the results to correct identified deficiencies and make improvements. We also noted in our report that program officials told us that they had taken initial steps to obtain another IT system to support the Family Caregiver Program, but they were not sure how long it would take to implement. Accordingly, we recommended that VA expedite the process for identifying and implementing a system that would fully support the Family Caregiver Program. VA concurred with our recommendation and subsequently began taking steps to implement a replacement system. However, the department has encountered challenges related to the system implementation efforts. We have ongoing work to evaluate VA’s effort to acquire a new IT system to support the Family Caregiver Program. In September 2015, we reported that VBA had made progress in developing and implementing VBMS—its system for processing disability benefit claims—but also noted that additional actions could improve efforts to develop and use the system. Specifically, VBA had deployed the initial version of the system to all of its regional offices as of June 2013. Further, after initial deployment, it continued developing and implementing additional system functionality and enhancements to support the electronic processing of disability compensation claims. Nevertheless, we pointed out that VBMS was not able to fully support disability and pension claims, as well as appeals processing. While the Under Secretary for Benefits stated in March 2013 that the development of the system was expected to be completed in 2015, implementation of functionality to fully support electronic claims processing was delayed beyond 2015. In addition, VBA had not produced a plan that identified when the system would be completed. Accordingly, holding VBA management accountable for meeting a time frame and demonstrating progress was difficult. Our report further noted that, even as VBA continued its efforts to complete the development and implementation of VBMS, three areas were in need of increased management attention: cost estimating, system availability, and system defects. We also noted in our report that VBA had not conducted a customer satisfaction survey that would allow the department to compile data on how users viewed the system’s performance and, ultimately, to develop goals for improving the system. We made five recommendations to improve VA’s efforts to effectively complete the development and implementation of VBMS. VA agreed with four of the recommendations. In addition, the department has addressed one of the recommendations—that it establish goals for system response time and use the goals as the basis for reporting system performance. However, the department has not yet fully addressed our remaining recommendations to (1) develop a plan with a time frame and a reliable cost estimate for completing VBMS, (2) reduce the incidence of system defects present in new releases, (3) assess user satisfaction, and (4) establish satisfaction goals to promote improvement. Continued attention to these important areas can improve VA’s efforts to effectively complete the development and implementation of VBMS and, in turn, more effectively support the department’s processing of disability benefit claims. FITARA included provisions for federal agencies to, among other things, enhance government-wide acquisition and management of software, improve the risk management of IT investments, consolidate data centers, and enhance CIOs’ authorities. Since its enactment, we have reported numerous times on VA’s efforts toward implementing FITARA. VA’s progress toward implementing key FITARA provisions has been uneven. Specifically, VA issued a software licensing policy and has generated an inventory of its software licenses to inform future investment decisions. However, the department did not fully address requirements related to IT investment risk, data center consolidation, or CIO authority enhancement. VA has made progress in addressing federal software licensing requirements. In May 2014, we reported on federal agencies’ management of software licenses and stressed that better management was needed to achieve significant savings government-wide. Specifically regarding VA, we noted that the department did not have comprehensive policies that included the establishment of clear roles and central oversight authority for managing enterprise software license agreements, among other things. We also noted that it had not established a comprehensive software license inventory, a leading practice that would help the department to adequately manage its software licenses. The inadequate implementation of these and other leading practices in software license management was partially due to weaknesses in the department’s policies related to licensing management. Thus, we made six recommendations to VA to improve its policies and practices for managing licenses. For example, we recommended that the department regularly track and maintain a comprehensive inventory of software licenses and analyze the inventory to identify opportunities to reduce costs and better inform investment decision making. Since our 2014 report, VA has taken actions to implement all six recommendations. For example, the department implemented a solution to generate and maintain a comprehensive inventory of software licenses using automated tools for the majority of agency software license spending and/or enterprise-wide licenses. Additionally, the department implemented a solution to analyze agency-wide software license data, including usage and costs; and it subsequently identified approximately $65 million in cost savings over 3 years due to analyzing one of its software licenses. VA has made limited progress in addressing the FITARA requirements related to managing the risks associated with IT investments. In June 2016, we reported on risk ratings assigned to investments by CIOs. We noted that the department had reviewed compliance with risk management practices, but had not assessed active risks when developing its risk ratings. VA determined its ratings by quantifying and combining inputs such as cost and schedule variances, risk exposure values, and compliance with agency processes. Metrics for compliance with agency processes included those related to program and project management, project execution, the quality of investment documentation, and whether the investment was regularly updating risk management plans and logs. When developing CIO ratings, VA chose to focus on investments’ risk management processes, such as whether a process was in place or whether a risk log was current. Such approaches did not consider individual risks, such as funding cuts or staffing changes, which detail the probability and impact of pending threats to success. Instead, VA’s CIO rating process considered several specific risk management criteria: whether an investment (1) had a risk management strategy, (2) kept the risk register current and complete, (3) clearly prioritized risks, and (4) put mitigation plans in place to address risks. As a result, we recommended that VA factor active risks into its CIO ratings. We also recommended that the department ensure that these ratings reflect the level of risk facing an investment relative to that investment’s ability to accomplish its goals. VA concurred with the recommendations and cited actions it planned to take to address them. VA has reported progress on consolidating and optimizing its data centers, although this progress has fallen short of targets set by OMB. Specifically, VA reported a total inventory of 415 data centers, of which 39 had been closed as of August 2017. While the department anticipated another 10 data centers would be closed by the end of fiscal year 2018, these closures fell short of the targets set by OMB. Further, while VA reported $23.61 million in data center-related cost savings and avoidances from 2012 through August 2017, the department did not realize further savings from the additional 10 data center closures. In addition, as of February 2017, VA reported meeting one of OMB’s five data center optimization metrics related to power usage effectiveness. Also, the department’s data center optimization strategic plan indicated that VA planned to meet three of the five metrics by the end of fiscal year 2018. Further, while OMB directed agencies to replace manual collection and reporting of metrics with automated tools no later than fiscal year 2018, the department had only implemented automated tools at 6 percent of its data centers. We have recommended that VA take actions to address data center savings goals and optimization performance targets identified by OMB. The department has taken actions to address these recommendations, including reporting data center consolidation savings and avoidance costs to OMB and updating its data center optimization strategic plan. However, the department has yet to address recommendations related to areas that we reported as not meeting OMB’s established targets, including implementing automated monitoring tools at its data centers. VA has made limited progress in addressing the CIO authority requirements of FITARA. Specifically, in November 2017, we reported on agencies’ efforts to utilize incremental development practices for selected major investments. We noted that VA’s CIO had certified the use of adequate incremental development for all 10 of the department’s major IT investments. However, VA had not updated the department’s policy and process for the CIO’s certification of major IT investments’ adequate use of incremental development, in accordance with OMB’s guidance on the implementation of FITARA, as we had recommended. As of October 2018, a VA official stated that the department was working to draft a policy to address our recommendation, but did not identify time frames for when all activities would be completed. In January 2018, we reported on the need for agencies to involve CIOs in reviewing IT acquisition plans and strategies. We noted that VA’s CIO did not review IT acquisition plans or strategies and that the Chief Acquisition Officer was not involved in the process of identifying IT acquisitions. Accordingly, we recommended that the VA Secretary ensure that the office of the Chief Acquisition Officer is involved in the process to identify IT acquisitions. We also recommended that the Secretary ensure that the acquisition plans or strategies are reviewed and approved in accordance with OMB guidance. The department concurred with the recommendations and, in a May 2018 update, provided a draft process map that depicted its forthcoming acquisition process. However, as of March 2019, this process had not yet been finalized and implemented. In August 2018, we reported that the department had only fully addressed two of the six key areas that we identified—IT Leadership and Accountability and Information Security. The department had partially addressed IT Budgeting, minimally addressed IT Investment Management, and had not at all addressed IT Strategic Planning or IT Workforce. Thus, we recommended that the VA Secretary ensure that the department’s IT management policies address the role of the CIO for key responsibilities in the four areas we identified. The department concurred with the recommendation and acknowledged that many of the responsibilities provided to the CIO were not explicitly formalized by VA policy. In December 2018, we reported on the effectiveness of the government’s approach and strategy for securing its systems. The federal approach and strategy for securing information systems is prescribed by federal law and policy, including FISMA and the presidential executive order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Accordingly, federal reports describing agency implementation of this law and policy, and reports of related agency information security activities, indicated VA’s lack of effectiveness in its efforts to implement the federal approach and strategy. Our December 2018 report identified that the department was deficient or had material weaknesses in all four indicators of departments’ effectiveness in implementing the federal approach and strategy for securing information systems. Specifically, VA was not effective in the Inspector General Information Security Program Ratings, was found to have material weaknesses in the Inspector General Internal Control Deficiencies over Financial Reporting, did not meet CIO Cybersecurity Cross-Agency Priority Goal Targets, and had enterprises that were at risk according to OMB Management Assessment Ratings. We reported on federal high-impact systems—those that hold sensitive information, the loss of which could cause individuals, the government, or the nation catastrophic harm—in May 2016. We noted that VA had implemented numerous controls, such as completion of risk assessments, over selected systems. However, the department had not always effectively implemented access controls, patch management, and contingency planning to protect the confidentiality, integrity and availability of these high-impact systems. These weaknesses existed in part because the department had not effectively implemented elements of its information security program. We made five recommendations to VA to improve its information security program. The department concurred with the recommendations and, as of March 2019, had implemented three of the five recommendations. Our March 2019 report on the federal cybersecurity workforce indicated that VA was not accurately categorizing positions to effectively identify critical staffing needs. The Federal Cybersecurity Workforce Assessment Act of 2015 required agencies to assign the appropriate work role codes to each position with cybersecurity, cyber-related, and IT functions. Agencies were to assign a code of “000” only to positions that did not perform IT, cybersecurity, or cyber-related functions. As we reported, VA had assigned a “000” code to 3,008 (45 percent) of its 6,636 IT positions. Human resources and IT officials from the department stated that they may have assigned the “000” code in error and that they had not completed the process to validate the accuracy of their codes. We recommended that VA take steps to review the assignment of the “000” code to any of the department’s positions in the IT management occupational series and assign the appropriate work role codes. VA concurred with the recommendation and indicated that it was in the process of conducting a cyber coding review. In conclusion, VA has long struggled to overcome IT management challenges, which have resulted in a lack of system capabilities needed to successfully implement critical initiatives. In this regard, VA is set to begin deploying its new electronic health record system in less than 1 year and questions remain regarding the governance structure for the program. Thus, it is more important than ever for the department to ensure that it is managing its IT budget in a way that addresses the challenges we have identified in our previous reports and high-risk updates. If the department continues to experience the challenges that we have previously identified, it may jeopardize its fourth attempt to modernize its electronic health record system. Additionally, the department has been challenged in fully implementing provisions of FITARA, which has limited its ability to improve its management of IT acquisitions. Until the department implements the act’s provisions, Congress will be unable to effectively monitor VA’s progress and hold it accountable for reducing duplication and achieving cost savings. Further, the lack of key cybersecurity management elements at VA is concerning given that agencies’ systems are increasingly susceptible to the multitude of cyber-related threats that exist. As VA continues to pursue modernization efforts, it is critical that the department take steps to adequately secure its systems. Chair Lee, Ranking Member Banks, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staffs have any questions about this testimony, please contact Carol C. Harris, Director, Information Technology Management Issues, at (202) 512-4456 or harrisc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony statement. GAO staff who made key contributions to this testimony are Mark Bird (Assistant Director), Eric Trout (Analyst in Charge), Justin Booth, Rebecca Eyler, Katherine Noble, Scott Pettis, Christy Tyson, and Kevin Walsh. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The use of IT is crucial to helping VA effectively serve the nation's veterans. Each year the department spends billions of dollars on its information systems and assets. However, VA has experienced challenges in managing its IT programs, raising questions about its ability to deliver intended outcomes needed to help advance the department's mission. To improve federal agencies' IT acquisitions, in December 2014 Congress enacted FITARA. GAO has previously reported on IT management challenges at VA, as well as its progress in implementing FITARA and cybersecurity requirements. GAO was asked to summarize key results and recommendations from its work at VA that examined systems modernization efforts, FITARA implementation, and cybersecurity efforts. To do so, GAO reviewed its recently issued reports and incorporated information on the department's actions in response to GAO's recommendations. The Department of Veterans Affairs (VA) has made limited progress toward addressing information technology (IT) system modernization challenges. From 2001 through 2018, VA pursued three efforts to modernize its health information system—the Veterans Health Information Systems and Technology Architecture (VistA). However, these efforts experienced high costs, challenges to ensuring interoperability of health data, and ultimately did not result in a modernized VistA. Regarding the department's fourth and most recent effort, the Electronic Health Record Modernization, GAO recently reported that the governance plan for this program was not yet defined. VA has not fully implemented GAO's recommendation calling for the department to define the role of a key office in the governance plans. The Family Caregiver Program, which was established to support family caregivers of seriously injured post-9/11 veterans, has not been supported by an effective IT system. Specifically, GAO reported that, due to limitations with the system, the program office did not have ready access to the types of workload data that would allow it to routinely monitor workload problems created by the program. GAO recommended that VA expedite the process for identifying and implementing an IT system. Although the department concurred with the recommendation, VA has not yet fully addressed it. VA had developed the Veterans Benefits Management System—its system that is used for processing disability benefit claims; however, the system did not fully support disability and pension claims, as well as appeals processing. GAO made five recommendations for VA to improve its efforts to effectively complete the development and implementation of the system. The department concurred with the recommendations but has implemented only one thus far. VA has demonstrated uneven progress toward fully implementing GAO's recommendations related to key Federal Information Technology Acquisition Reform Act (FITARA) provisions. Specifically, VA has implemented all six recommendations in response to GAO's 2014 report on managing software licenses, leading to, among other things, savings of about $65 million over 3 years. However, the department has not fully addressed two recommendations from GAO's 2016 report on managing the risks of major IT investments. Further, the department has not implemented (1) two of four recommendations related to its effort to consolidate data centers and (2) GAO's four recommendations to increase the authority of its Chief Information Officer. VA's management of cybersecurity has also lacked key elements. For example, GAO reported in May 2016 that VA had established numerous security controls, but had not effectively implemented key elements of its information security program. In addition, as GAO reported in March 2019, the department had not accurately categorized positions to effectively identify critical staffing needs for its cybersecurity workforce. VA has implemented three of six cybersecurity-related recommendations from these two reports. GAO has made numerous recent recommendations to VA aimed at improving the department's IT management. VA has generally agreed with the recommendations and has taken steps to address them; however, the department has fully implemented less than half of them. Fully implementing all of GAO's recommendations would help VA ensure that its IT effectively supports the department's mission.", "document_type": "gao"}
{"report": "VHA’s Family Caregiver Program is designed to provide support and services to family caregivers of post-9/11 veterans who have a serious injury that was incurred or aggravated in the line of duty. The program provides approved primary family caregivers with a monthly financial stipend as well as training and other support services, such as counseling and respite care. The Family Caregiver Program has a series of eligibility requirements that must be satisfied in order for family caregivers to be approved. To meet the program’s initial eligibility criteria, the veteran seeking caregiver assistance must have a serious injury that was incurred or aggravated in the line of duty on or after September 11, 2001. According to the program’s regulations, a serious injury is any injury, including traumatic brain injury (TBI), psychological trauma, or other mental disorder, that has been incurred or aggravated in the line of duty and renders the veteran or servicemember in need of personal care services. The veteran must be in need of personal care services for a minimum of 6 continuous months based on any one of the following clinical eligibility criteria: (1) an inability to perform one or more activities of daily living, such as bathing, dressing, or eating; (2) a need for supervision or protection based on symptoms or residuals of neurological or other impairment or injury such as TBI, post-traumatic stress disorder, or other mental health disorders; (3) the existence of a psychological trauma or a mental disorder that has been scored by a licensed mental health professional, with a Global Assessment of Functioning score of 30 or less, continuously during the 90-day period immediately preceding the date on which VHA initially received the application; or (4) the veteran has been rated 100 percent service connected disabled for a qualifying serious injury and has been awarded special monthly compensation that includes an aid and attendance allowance. To be considered competent to care for the veteran, family caregivers must meet certain requirements including (1) having the ability to communicate and follow details of the treatment plan and instructions related to the care of the veteran; (2) not determined by VA to have abused or neglected the veteran; (3) being at least 18 years of age; and (4) either being a family member—such as a spouse, son or daughter, parent, step-family member, or extended family member— or an unrelated person who lives or will live full-time with the veteran. Family caregivers must also complete required training before being approved for the program. VHA’s Caregiver Support Program office is responsible for developing policy and providing guidance and oversight for the Family Caregiver Program. It also directly administers the program’s stipend, provides support services such as a telephone hotline and website, and arranges coverage through the Civilian Health and Medical Program of the Department of Veterans Affairs (CHAMPVA) for eligible caregivers if they have no other coverage. Further, the office provides funding to VAMCs to cover certain program costs. These costs may include the salaries of the caregiver support coordinators (CSC), who implement and administer the Family Caregiver Program at the local VAMC level, and the costs VAMCs incur for having their clinical staff, such as nurses, conduct the program’s required in- home visits to approved caregivers and their veterans. CSCs are generally licensed social workers or registered nurses, and they have both clinical and administrative responsibilities. Their clinical responsibilities may include identifying and coordinating appropriate interventions for caregivers or referrals to other VA or non-VA programs, such as mental health treatment, respite care, or additional training and education. Their administrative responsibilities may include responding to inquiries about the program, overseeing the application process, entering information about applications and approved caregivers into IT systems, and facilitating the processing of appeals. As of May 2014, there were 233 CSCs assigned to 140 VAMCs or health care systems across the country. Additionally, each regional VISN office has a VISN CSC lead for the program, who provides guidance to CSCs and helps address their questions or concerns. CAT, which was deployed in May 2011, is a web-based system that was designed to facilitate the exchange of information about approved caregivers between VAMCs and other VHA entities. Such entities include the Health Administration Center, which processes the caregiver stipend payments and administers CHAMPVA. In 2014, we reported that the Caregiver Support Program office was not able to easily retrieve data from CAT that would allow officials to better assess workload trends at individual VAMCs—such as the length of time applications are delayed or the timeliness of home visits—even though these data were already captured in the system. Caregiver Support Program officials only retrieved workload data on an ad hoc, as-needed basis, which limited their ability to assess the scope and extent of workload problems comprehensively at individual VAMCs and on a system-wide basis. Program officials also expressed concern about the reliability of the system’s data. As we noted in our report, program officials also identified the need for a more capable and flexible system that could interface with other departmental systems. The officials told us that they had taken initial steps to obtain another IT system to support the Family Caregiver Program; however, the officials were not sure how long it would take to implement the system. Accordingly, we recommended that VA expedite the process for identifying and implementing a system that would fully support the Family Caregiver Program. VA concurred with our recommendation and subsequently began taking actions in 2015 to implement a replacement system. These actions included taking steps toward implementing short-term improvements to CAT that were to be followed by the implementation of a long-term replacement system. The recommendation continues to remain open. The John S. McCain III, Daniel K. Akaka, and Samuel R. Johnson VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (VA MISSION Act), which was enacted in June 2018, included provisions directing VA to implement an IT system to support the Family Caregiver Program and the incremental expansion of program eligibility. Specifically, the act required VA to implement an IT system to fully support the Family Caregiver Program by October 1, 2018. According to the act, the system is to allow for data assessment and comprehensive monitoring of the program. In particular, the system is to have, among other things, the ability to (1) retrieve data to monitor workload trends at the medical center and aggregate levels; (2) manage an increased number of caregivers as the program expands; and (3) integrate with other relevant IT systems at VHA. The act also stated that VA was to submit an initial report to Congress regarding the status of the planning, development, and deployment of this system within 90 days of enactment of the VA MISSION Act, and that the department is to submit a final report to Congress by October 1, 2019. The final report is to include a certification by the VA Secretary that the system has been implemented, along with a description of how the Secretary is using the system to monitor the workload of the program. Although we previously recommended that VA expedite implementation of a replacement for CAT, and the MISSION Act directed the department to implement an IT system to support the Family Caregiver Program, VA has not yet been successful in its multiple efforts to implement such a system. Specifically, VA has faced a number of difficulties in developing and implementing short-term improvements as well as a long-term replacement system for CAT. In July 2015, VHA and the Office of Information and Technology (OIT) initiated a joint acquisition project, called CAT Rescue, to update CAT and improve the system’s data reliability. However, the department reported in January 2017 that this project had experienced delays and identified a large number of defects during system testing. VA terminated the project in April 2018 before any new system capabilities were implemented. A companion project to CAT Rescue that VA initiated in September 2015 was to develop the Caregivers Tool (CareT), a new system intended to be a long-term replacement for CAT. As envisioned, this system was to use the improved data from CAT Rescue while also adding new system capabilities. However, the user acceptance testing of CareT identified the need for the department to develop more system capabilities than originally planned. Further, the department determined that the time period needed to perform additional system development would have extended beyond the term of the development contract, which ended in April 2017. VA subsequently awarded a new CareT development contract in July 2017. However, after additional system development, the department determined during user acceptance testing that the system was not performing as expected and implementation of CareT was further delayed. In October 2018, the department reported to congressional committees that implementing a system to fully support the Family Caregiver Program by the VA MISSION Act deadline was not feasible. Subsequently, the department determined that CareT was not a viable solution and VHA and OIT terminated work on the system in February 2019. VHA and OIT began a third effort in March 2019 to acquire a replacement system that is to be based on an existing commercial product. According to OIT officials, the new IT solution, referred to as the Caregiver Record Management Application (CARMA), is intended to replace CAT. However, the department has not yet established a date for completing CARMA. Thus, VA’s efforts to implement an IT system that supports the Family Caregiver Program have been continuing with no end in sight. We have ongoing work to further evaluate the status and progress of the department’s efforts to implement a system to support the Family Caregiver Program consistent with the VA MISSION Act requirements. Figure 1 provides a timeline of the various IT projects that VA has undertaken to support the program. Our prior work has determined that successfully overcoming IT acquisition challenges can best be achieved when critical success factors are applied. Specifically, we reported in 2011 on common factors critical to the success of IT acquisitions, based on seven agencies having each identified the acquisition that best achieved the agency’s respective cost, schedule, scope, and performance goals. These factors remain relevant today and can serve as a model of best practices that agencies can apply to enhance the likelihood that the acquisition of an IT system such as CARMA will be successfully achieved. Among the agencies’ seven IT investments, agency officials identified nine factors as having been critical to the success of three or more of the seven investments. These nine critical success factors are consistent with leading industry practices for IT acquisition. The factors are: Active engagement of program officials with stakeholders. Qualified and experienced program staff. Support of senior department and agency executives. Involvement of end users and stakeholders in the development of requirements. Participation of end users in testing system functionality prior to formal end user acceptance testing. Consistency and stability of government and contractor staff. Prioritization of requirements by program staff. Regular communication maintained between program officials and the prime contractor. Sufficient funding. Officials for all seven selected investments cited active engagement with program stakeholders—individuals or groups (including, in some cases, end users) with an interest in the success of the acquisition—as a critical factor to the success of those investments. Agency officials stated that stakeholders, among other things, reviewed contractor proposals during the procurement process, regularly attended program management office sponsored meetings, were working members of integrated project teams, and were notified of problems and concerns as soon as possible. Further, officials from two investments noted that actively engaging with stakeholders created transparency and trust, and increased the support from the stakeholders. Additionally, officials for six of the seven selected investments indicated that the knowledge and skills of the program staff were critical to the success of the program. This included knowledge of acquisitions and procurement processes, monitoring of contracts, large-scale organizational transformation, Agile software development concepts, and areas of program management such as earned value management and technical monitoring. Finally, officials for five of the seven selected investments identified having the end users test and validate the system components prior to formal end user acceptance testing for deployment as critical to the success of their program. Similar to this factor, leading guidance recommends testing selected products and product components throughout the program life cycle. Testing of functionality by end users prior to acceptance demonstrates, earlier rather than later in the program life cycle, that the functionality will fulfill its intended use. If problems are found during this testing, programs are typically positioned to make changes that would be less costly and disruptive than ones made later in the life cycle. In conclusion, VA has invested considerable time in multiple efforts toward improving and replacing its IT system to better serve the Family Caregiver Program. However, even with these efforts, the department has not yet implemented a system and the program is not prepared for expansion. Going forward, it is important that VA take steps to improve its efforts to implement a replacement IT system for the Family Caregiver Program. In this regard, the department could benefit from applying critical success factors we previously reported as leading to successful federal IT acquisitions. These factors can serve as a model of best practices that the department can apply to enhance the likelihood that its effort to replace the IT system for the Family Caregiver Program will be successful. Chairs Lee and Brownley, Ranking Members Banks and Dunn, and Members of the Subcommittees, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staffs have any questions about this testimony, please contact Carol C. Harris, Director, Information Technology Management Issues, at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony statement. GAO staff who made key contributions to this testimony are Mark Bird (Assistant Director), Rebecca Eyler, Jacqueline Mai, Monica Perez-Nelson, Scott Pettis, and Jennifer Stavros-Turner (Analyst in Charge). This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "To provide greater support for caregivers of post-9/11 veterans, Congress and the President enacted legislation requiring VA to establish a program to assist caregivers with the rigors of caring for seriously injured veterans. In May 2011, the Veterans Health Administration (VHA), which operates VA's health care system, established the Family Caregiver Program at each of its VA medical centers across the United States. At that time, the department implemented an IT system, called CAT, to help support the program. Subsequently, the VA MISSION Act was enacted in June 2018, requiring VA to implement an IT system to fully support the Family Caregiver Program by October 1, 2018. Further, VA's Secretary is to certify the system by October 1, 2019. GAO was asked to discuss its September 2014 report that examined how VHA is implementing the Family Caregiver Program. In addition, the statement includes relevant information VA provided on its actions toward addressing GAO's prior recommendation. The statement also discusses critical success factors related to IT acquisitions as identified in GAO's prior work. The reports cited throughout this statement include detailed information on the scope and methodology of GAO's prior reviews. In September 2014, GAO reported on the Department of Veterans Affairs' (VA) Program of Comprehensive Assistance for Family Caregivers (Family Caregiver Program) and found that the program office had limitations with its information technology (IT) system—the Caregiver Application Tracker (CAT). Specifically, the program did not have ready access to workload data that would allow it to monitor the effects of the program on VA medical centers' resources. VA has initiated various projects since 2015 to implement a new system, but has not yet been successful in its efforts. (See figure.) Specifically, in July 2015 VA initiated a project to improve the reliability of CAT's data, called CAT Rescue. However, the department reported in January 2017 that it had identified numerous defects during system testing. The project ended in April 2018 before any new system capabilities were implemented. A companion project was initiated in September 2015 to develop the Caregivers Tool (CareT), a new system intended to replace CAT. The CareT project was expected to use improved data from CAT Rescue, while also adding new system capabilities. However, the user acceptance testing of CareT identified the need for the department to develop more system capabilities than originally planned. Further, VA reported that implementing a system by October 1, 2018, as specified in the Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (MISSION Act), was not feasible. Subsequently, VA terminated CareT in February 2019. The department initiated another project in March 2019 to implement a new system, the Caregiver Record Management Application (CARMA). GAO has ongoing work to evaluate the department's efforts to implement an IT system to support the Family Caregiver Program as required by the MISSION Act. GAO's prior work has determined that successfully overcoming IT acquisition challenges can best be achieved when critical success factors are applied. These factors can serve as a model of best practices that VA could apply to enhance the likelihood that the acquisition of a replacement IT system for the Family Caregiver Program will be successfully achieved. Examples of these critical success factors include, maintaining active engagement of program officials with stakeholders, involving end users and stakeholders in the development of requirements, and ensuring participation of end users in testing system functionality prior to formal end user acceptance testing. GAO recommended in 2014 that VA expedite the process for identifying and implementing an IT system that would fully support the Family Caregiver Program. VA concurred with the recommendation and subsequently began taking steps to implement a replacement system. The recommendation remains open.", "document_type": "gao"}
{"report": "Most private employers subject to Title VII of the Civil Rights Act of 1964 with 100 or more employees, and all federal contractors who have 50 or more employees and meet certain other requirements, must submit data to the EEOC on the racial/ethnic and gender characteristics of employees by occupations for a range of industries, including financial services. Employers are required to submit these data to EEOC every year using the EEO-1 report. EEOC requires employers to use the North American Industry Classification System to classify their industry. Under this system, the financial services industry includes the following five sectors: Credit intermediation and related activities (banks and other credit institutions), which include commercial banks, thrifts, and credit unions; Securities and other activities, which includes firms that bring together buyers and sellers of securities and commodities and offer financial advice; Insurance firms and agents that provide protection against financial risks to policyholders; Funds and trusts, which include investment trusts and holding Monetary authorities, including central banks. Beginning in 2007, EEOC changed its requirements for reporting data on managers. Specifically, employers were required to report separately on senior-level management positions rather than combining data on senior- level managers with data for first- and mid-level managers, as had been the practice until 2007. Employers are required to review EEOC guidance describing the two management positions and determine how their firm’s job positions fit into these classifications. In a January 2005 report, we identified a set of nine leading practices that should be considered when an organization is developing and implementing diversity management. They are (1) commitment to diversity as demonstrated and communicated by an organization’s top leadership; (2) the inclusion of diversity management in an organization’s strategic plan; (3) diversity linked to performance, making the case that a more diverse and inclusive work environment could help improve productivity and individual and organizational performance; (4) measurement of the impact of various aspects of a diversity program; (5) management accountability for the progress of diversity initiatives; (6) succession planning; (7) recruitment; (8) employee involvement in an organization’s diversity management; and (9) training for management and staff about diversity management. In 2017, we reported that industry representatives confirmed that these nine practices are still relevant. As we reported in November 2017, at the overall management level, representation of minorities in the financial services industry increased from 2007 through 2015, though representation varied by individual minority groups (see fig. 1). Specifically, minorities’ representation in overall management positions increased by 3.7 percentage points. Asians had the largest gains since 2007, increasing their representation among managers from 5.4 percent to 7.7 percent. Hispanics made smaller gains; their representation among managers increased from 4.8 percent to 5.5 percent. In contrast, the proportion of African-Americans in management positions decreased from 6.5 percent to 6.3 percent. Representation of minorities also increased between different levels of management from 2007 through 2015 (see fig. 2). Minority representation among first-and mid-level managers increased by 3.7 percentage points. In contrast, representation of minorities among senior- level management increased at a slower pace during this period (1.7 percentage points). Minority representation among senior-level managers remained considerably lower than among first- and mid-level managers. Among first- and mid-level managers, representation of Asians experienced the largest increase from 2007 through 2015 (2.6 percentage points). Hispanic representation increased by less than 1 percentage point, while African-American representation slightly decreased by 0.3 percentage point. In addition, among senior-level managers, representation of each racial and ethnic group changed by less than 1 percentage point. We also reported in November 2017 that representation of women at the overall management level had generally remained unchanged. From 2007 through 2015, women represented about 45 percent of overall management. Representation of each racial and ethnic group varied by gender during this time period. For example, among minority women, African-American women consistently had the highest representation in overall management (about 4 percent of managers per year). Among minority men, Asian men consistently had highest representation in overall management (3.1 percent to 4.6 percent of all managers). The proportion of men and women within various levels of management remained unchanged from 2007 through 2015, though there were some increases in the representation of both minority women and minority men. During this timeframe, women represented around 48 percent of first-and mid-level managers and about 29 percent of senior-level managers. Among first- and mid-level management positions, the representation of minority women increased by 1.6 percentage points and the representation of minority men increased by 2.2 percentage points (see fig. 3). Among senior-level management positions, representation of minority women and minority men increased by smaller amounts (0.3 percentage points and 1.5 percentage points, respectively). In November 2017, we reported that management-level diversity varied across sectors within the financial services industry. Minorities’ representation in overall management increased in all four sectors of the financial services industry (see fig. 4). For example, representation of minorities in the banks and other credit institutions sector increased by 3.1 percentage points and 4.3 percentage points in the funds and trusts sector. Also, the representation of minorities in overall management was consistently the greatest in the banks and other credit institutions and lowest in the insurance sector. The representation of women in overall management also varied by financial services sector (see fig. 5). The insurance sector consistently had the highest proportion of women in management positions, followed by banks and other credit institutions. The proportion of women in management decreased in each sector except for the insurance sector where it increased by 1.9 percentage points from 47.7 percent to 49.6 percent. Our November 2017 report found that the representation of minorities in overall management positions increased as firm size (number of employees) increased, whereas the representation of women in management generally remained the same across firm size. More specifically, in 2007, the representation of minorities in overall management was nearly 5 percentage points greater in firms with 5,000 or more employees compared to firms with 100–249 employees. By comparison, in 2015, the representation of minorities in overall management was about 6 percentage points greater in firms with 5,000 or more employees compared to firms with 100–249 employees. Across firms of different sizes, the representation of women in management positions in 2015 was generally the same as it was in 2007. Our November 2017 report found that from 2007 through 2015, representation of minorities in all levels of management increased in the financial services sector, the professional services sector, and the overall private sector. However, among first- and mid-level managers, representation of minorities increased at a lower rate in the financial services sector during this time period (3.7 percentage points) than in the professional services sector (7.5 percentage points) and slightly lower than the overall private sector (3.8 percentage points) . In addition, the financial services sector generally had a greater proportion of women in management compared to the overall private sector and professional services sector. For example, women represented 36.7 percent and 38.2 percent of first- and mid-level managers in the professional services sector and overall private sector, respectively, in 2015. As previously mentioned, women represented about 48 percent of first- and mid- level managers in the financial services sector from 2007 through 2015. Potential employees for the financial services industry can come from a range of academic and professional backgrounds. Financial firm representatives we spoke to for our November 2017 report told us that undergraduate or graduate degrees are an important consideration for employment. Some firm representatives also told us that while graduates with Master of Business Administration (MBA) degrees are an important pool of talent, firms seek students with a variety of degrees. We also found that from 2011 through 2015, about one-third of the external pool of potential talent for the financial services industry—that is, those obtaining undergraduate or graduate degrees—were racial/ethnic minorities (see fig. 6). Additionally, rates of attainment of bachelor’s, master’s, and MBA degrees by racial/ethnic minorities all increased during this time period. For example, minorities’ representation among those who attained an MBA increased from 35.6 to 39.2 percent. Furthermore, from 2011 through 2015, minority women consistently earned a greater proportion of master’s and MBA degrees compared to minority men. Additionally, we found that from 2011 through 2015, a majority of those obtaining undergraduate or graduate degrees have been women (see fig. 7). For example, women consistently earned about 58 percent of bachelor’s degrees, just over 60 percent of master’s degrees, and about 45 percent of MBA degrees during this time period. As we reported in November 2017, the internal pool of potential talent for the financial services industry is known as the “internal pipeline” of staff that could potentially move into management positions. There are two nonmanagement job categories in the financial services sector that are considered to be part of the internal pipeline: professional and sales positions. From 2007 through 2015, EEOC data show that minorities’ representation in professional and sales positions had changed over time, but had generally been greater than minorities’ representation in overall management positions. Similarly, EEOC data over the same timeframe show that representation of women in professional positions in the financial services industry had generally been greater than women’s representation in overall management. For example, from 2007 through 2015, women consistently represented about 50 percent of all employees in professional positions and about 45 percent of overall management. The percentage of women in sales positions in the financial industry had generally been lower, at about 40 percent. Representatives from financial services firms and organizations that advocate for women or racial/ethnic minorities who we spoke to for our November 2017 report described a variety of challenges to recruiting a diverse workforce for the financial services sector. These challenges included negative perceptions of the financial services industry that might discourage potential candidates and a lack of awareness of career paths in the industry. Research we reviewed and representatives we spoke with identified several practices believed or found to be effective for recruiting women and racial/ethnic minorities, which included: Recruiting students from a broad group of schools and academic disciplines. Representatives from three firms stated that they were increasingly hiring and interested in recruiting students from a variety of academic disciplines, such as liberal arts or science and technology. For example, representatives from one firm said that they were interested in candidates with critical thinking skills, and that technical skills could be taught to new employees. Additionally, representatives from several firms noted the importance of recruiting at a broad group of schools, not just a small number of elite universities. Offering programs to increase awareness of careers in financial services. Several representatives of financial firms told us that they had established relationships with high school students to expose diverse students to the financial services field. For example, representatives from one firm described a program that pairs high school students with a mentor from the firm. Additionally, a 2016 consulting firm report on women in financial services organizations in 32 countries found that a majority of asset managers who were interviewed thought it was important for financial services firms to educate students about careers in financial services. Financial services firms and other sources also noted challenges to retaining women and racial/ethnic minorities. For example, some representatives of financial firms noted that employee resistance, particularly from middle-managers, poses a challenge to diversity efforts. In addition, officials from some organizations we interviewed noted that unconscious bias can negatively affect women and minorities. As we noted in our November 2017 report, according to reports on diversity, representatives from financial services firms and other stakeholders, certain practices that may help improve the retention of women and racial/ethnic minorities, included: Establishing management-level accountability. Representatives from three financial services firms told us that management should be held accountable for workforce diversity goals. For example, two representatives discussed the use of a “diversity scorecard,” which is a set of objectives and measures derived from a firm’s overall business strategy and linked to its diversity strategy. Additionally, one firm representative noted that tying senior managers’ compensation to diversity goals had been an effective practice for retaining women and minorities. Researchers have noted that efforts to establish organizational responsibility for diversity have led to the broadest increases in managerial diversity. Assessing Data on Workforce Diversity. Financial services firms and organizations we talked to generally agreed that assessing demographic data to understand a firm’s diversity is a useful practice. All of the financial services firms we interviewed agreed on the importance of analyzing employee data. Several firms stated that it is important for organizations to understand their progress on workforce diversity–and, if data trends indicate problems, such as retention issues, they then can take steps to address them. Representatives of firms and organizations that advocate for diversity differed on the benefits of making demographic data public. Representatives of one organization said requiring businesses to be transparent about their workforce data creates incentives to improve the diversity of their workforce. However, representatives of two financial firms expressed concerns that publicly disclosing firm-level employee characteristics would not be beneficial to businesses. For example, one representative noted that publicly disclosing that firms are not diverse could damage their reputation and make improvement of workforce diversity more difficult. In closing, I would like to thank you for the opportunity to discuss trends in management-level diversity in the financial services industry. I look forward to working with this subcommittee on these important issues. Chairwoman Beatty, Ranking Member Wagner, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information on this testimony, please contact Daniel Garcia- Diaz at (202) 512-8678 or GarciaDiazD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Lisa Moore (Assistant Director), Christine Ramos (Analyst in Charge), Kay Kuhlman, Jill Lacey, Tovah Rom, Jena Sinkfield, and Tyler Spunaugle. Financial Services Industry: Trends in Management Representation of Minorities and Women and Diversity Practices, 2007—2015. GAO-18-64. Washington, D.C.: November 8, 2017. Investment Management: Key Practices Could Provide More Options for Federal Entities and Opportunities for Minority- and Women-Owned Asset Managers. GAO-17-726. Washington, D.C.: September 13, 2017. Corporate Boards: Strategies to Address Representation of Women Include Federal Disclosure Requirements. GAO-16-30. Washington, D.C.: December 3, 2015. Federal Home Loan Banks: Information on Governance Changes, Board Diversity, and Community Lending. GAO-15-435. Washington, D.C.: May 12, 2015. Diversity Management: Trends and Practices in the Financial Services Industry and Agencies after the Recent Financial Crisis. GAO-13-238. Washington, D.C.: April 16, 2013. Federal Reserve Bank Governance: Opportunities Exist to Broaden Director Recruitment Efforts and Increase Transparency. GAO-12-18. Washington, D.C.: October 19, 2011. Financial Services Industry: Overall Trends in Management-Level Diversity and Diversity Initiatives, 1994—2008. GAO-10-736T. Washington, D.C.: May 12, 2010. Financial Services Industry: Overall Trends in Management-Level Diversity and Diversity Initiatives, 1993—2004. GAO-06-617. Washington, D.C.: June 1, 2006. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The financial services industry is a major source of employment that affects the economic well-being of its customers and the country as a whole. As the makeup of the U.S. workforce continues to diversify, many private sector organizations, including those in the financial services industry, have recognized the importance of recruiting and retaining minorities and women in key positions to improve business or organizational performance and better meet the needs of a diverse customer base. However, questions remain about the diversity of the workforce in the financial services industry. This statement is based on GAO's November 2017 report on changes in management-level diversity and diversity practices in the financial services industry. This statement summarizes (1) trends in management-level diversity in the financial services industry, (2) trends in diversity among potential talent pools, and (3) challenges financial services firms identified in trying to increase workforce diversity and practices they have used to address those challenges. In November 2017, GAO reported that overall management representation in the financial services industry increased marginally for minorities and remained unchanged for women from 2007 to 2015. Similar trends also occurred at the senior-level management of these firms. For example, women represented about 29 percent of senior-level managers throughout this time period. As shown below, representation of minorities in senior management increased slightly, but each racial/ethnic group changed by less than 1 percentage point. The diversity of overall management also varied across the different sectors of the financial services industry. For example, the banking sector consistently had the greatest representation of minorities in overall management, whereas the insurance sector consistently had the highest proportion of women in overall management. As GAO reported in November 2017, potential employees for the financial services industry, including those that could become managers, come from external and internal pools that are diverse. For example, the external pool included those with undergraduate or graduate degrees, such as a Master of Business Administration. In 2015, one-third of the external pool were minorities and around 60 percent were women. The internal talent pool for potential managers included those already in professional positions. In 2015, about 28 percent of professional positions in financial services were held by minorities and just over half were held by women. Representatives of financial services firms and other stakeholders GAO spoke to for its November 2017 report described challenges to recruiting and retaining members of racial/ethnic minority groups and women. They also identified practices that could help address those challenges. For example, representatives from several firms noted that an effective practice is to recruit and hire students from a broad group of schools and academic disciplines. Some firms also described establishing management-level accountability to achieve workforce diversity goals. Firm representatives and other stakeholders agreed that it is important for firms to assess data on the diversity of their employees but varied in their views on whether such information should be shared publicly.", "document_type": "gao"}
{"report": "The FSM and RMI are independent countries about 3,000 miles southwest of Hawaii. The FSM is a federation of four semiautonomous states—Chuuk, Kosrae, Pohnpei, and Yap—whose population and income vary widely. Chuuk, the largest state by population, has the lowest per-capita gross domestic product (GDP). Overall, the FSM had a 2016 population of approximately 102,000 and a GDP per capita of about $3,200. The RMI’s 2016 population was approximately 54,000 with a GDP per capita of about $3,600. The RMI’s most recent census, in 2011, found that approximately three-quarters of the population lived in Majuro, the nation’s capital, and on the island of Ebeye in the Kwajalein Atoll. Table 1 shows the FSM’s, FSM states’, and RMI’s estimated populations and annual GDP per capita in fiscal year 2016. U.S. relations with the FSM and the RMI began during World War II, when the United States ended Japanese occupation of the region. Starting in 1947, the United States administered the region under a United Nations trusteeship. In 1986, after a period of negotiations, the United States entered into a compact of free association with the FSM and RMI that provided for economic assistance to the two countries, secured U.S. defense rights, and allowed FSM and RMI citizens to migrate to the United States. In 2003, after a period of negotiations, the United States approved separate amended compacts with the FSM and the RMI that went into effect on June 25, 2004, and May 1, 2004, respectively. The amended compacts’ implementing legislation authorized and appropriated direct financial assistance to the FSM and the RMI in fiscal years 2004 through 2023, with the base amounts decreasing in most years. The legislation also provided for partial inflation adjustment of the base amount of compact sector grants and trust fund contributions each year. As the base amount of compact sector grants decreases, the trust fund contributions generally increase by an equivalent amount. Because the annual inflation adjustment is less than full inflation, the value of compact sector grants declines in real terms. Figure 1 shows the amount of compact sector grants and trust fund contributions each fiscal year from 2004 through 2023. The amended compacts and associated fiscal procedures agreements require that compact sector grants support the countries in six core sectors—education, health, infrastructure, environment, private sector development, and public sector capacity building—with priority given to the education and health sectors. These grants are described in section 211(a) of each compact and are referred to as compact sector grants or 211(a) grants. Section 211(b) of the RMI compact further states that the RMI must target a specified amount of grants to Ebeye and other Marshallese communities within Kwajalein Atoll. The RMI military use and operating rights agreement (MUORA) states that the Kwajalein- related funds provided to the RMI in the compacts shall be provided through fiscal year 2023 and thereafter for as long as this agreement remains in effect. The amended compacts and their subsidiary trust fund agreements provided that each trust fund is to be managed by a compact trust fund committee. Each compact trust fund committee includes representatives from both the United States and the respective country, but the United States is required by the terms of the trust fund agreements to hold the majority of votes on each committee. The Director of Interior’s Office of Insular Affairs serves as the chair of each committee. Trust fund committee responsibilities include overseeing fund operation, supervision, and management; investing and distributing the fund’s resources; and concluding agreements with any other contributors and other organizations. As part of this oversight, the committees are to establish an investment and distribution policy. The committees are also to determine fiscal procedures to be used in implementing the trust fund agreements on the basis of the fiscal procedures used for compact grant administration, unless otherwise agreed by the parties to the agreement. The U.S.–FSM and U.S.–RMI trust fund agreements allow for the agreements to be amended in writing at any time, with mutual consent of the governments. However, the U.S. legislation implementing the amended compacts requires that any amendment, change, or termination of all, or any part, of the compact trust fund agreements shall not enter into force until incorporated into an act of Congress. The compact trust fund agreements state that no funds, other than specified trust fund administrative expenses, may be distributed from the funds before October 1, 2023. From fiscal year 2024 onward, the maximum allowed disbursement from each compact trust fund is the amount of the fiscal year 2023 annual grant assistance, as defined by the trust fund agreement, with full inflation adjustment. In addition, the trust fund committees may approve additional amounts for special needs. The RMI compact trust fund agreement excludes Kwajalein-related assistance, defined in section 211(b) of the RMI compact, from the calculation of the allowed disbursement. Although the compact trust fund agreements state the maximum allowable disbursement level, they do not establish or guarantee a minimum disbursement level. Each country’s compact trust fund consists of three interrelated accounts: the “A” account, the “B” account, and the “C” account. The A account is the trust fund’s corpus and contains the initial, and any additional, U.S. and FSM or RMI contributions; contributions from other countries; and investment earnings. No funds, other than specified trust fund administrative expenses, may be disbursed from the A account. The B account is the trust fund’s disbursement account and becomes active in fiscal year 2023. All income earned in 2023 will be deposited in the B account for possible disbursement in 2024. Each subsequent year’s investment income will similarly be deposited in the B account for possible disbursement the following year. If there is no investment income, no funds will be deposited in the B account for possible disbursement the following year. The C account is the trust fund’s buffer account. Through 2022, any annual income exceeding 6 percent of the fund balance is deposited in the C account. The size of the C account is capped at three times the amount of the estimated annual grant assistance in 2023, including estimated inflation. From 2023 onward, if annual income from the A account is less than the previous year’s disbursement, adjusted for inflation, the C account may be tapped to address the shortfall. After 2023, any funds in the B account in excess of the amount approved for disbursement the following fiscal year are to be used to replenish the C account as needed, up to the maximum size of the account. If there are no funds in the C account and no prior-year investment income in the B account, no funds will be available for disbursement to the countries the following year. Figure 2 shows the compact trust fund account structure and associated rules. According to the U.S. trust fund agreements with the FSM and the RMI, contributions from other donors are permitted. In May 2005, Taiwan and the RMI reached an agreement that Taiwan would contribute a total of $40 million to the RMI’s compact trust fund A account between 2004 and 2023. A “D” account may also be established to hold any contributions by the FSM and the RMI governments of revenue or income from unanticipated sources. According to the trust fund agreements, the D account must be a separate account, not mixed with the rest of the trust fund. Only the RMI has a D account, governed in part by the agreement between Taiwan and the RMI. The amended compacts’ implementing legislation incorporates, by reference, related agreements extending programs and services to the FSM and RMI. The programs and services agreement with each country identifies the following programs and services as being available to each country: U.S. postal services, weather services, civil aviation, disaster preparedness and response, and telecommunications. Each programs and services agreement extends for 20 years from the compact’s entry into force. The agreement with the FSM ends on June 24, 2024, and the agreement with the RMI ends on April 30, 2024. The amended compacts’ implementing legislation (Pub. L. No. 108-188) and other U.S. legislation authorize other U.S. grants, programs, and services for the FSM and RMI. Pub. L. No. 108-188 authorized an annual supplemental education grant (SEG) for the FSM and RMI in fiscal years 2005 through 2023, to be awarded in place of grants formerly awarded to the countries under several U.S. education, health, and labor programs. The FSM and RMI are not eligible for the programs replaced by the SEG during these years. Unlike the compact sector grants, the amended compacts’ implementing legislation authorized the SEG but did not appropriate funds for it. Funding for the SEG is appropriated annually to the U.S. Department of Education (Education) and is transferred to Interior for disbursement. Other provisions of the amended compacts’ implementing legislation, as well as other U.S. law, make the FSM and RMI eligible for a number of additional programs. As of fiscal year 2016, compact sector grants and the SEG, each of which end in 2023, supported a substantial portion of government expenditures in the FSM and RMI. Compact sector grants and the SEG supported about one-third of all FSM government expenditures. The four FSM states relied on these grants to a greater extent than the FSM national government does. In the RMI, compact sector grants and the SEG supported about one-quarter of all government expenditures. The end of the compacts’ programs and services agreements in 2024 would also require the FSM and RMI to bear additional costs to provide services currently provided by the United States under the agreements. Compact sector grants, the SEG, and other U.S. grants supported almost half of FSM national and state government expenditures in fiscal year 2016. Compact sector and supplemental education grants that end in 2023 supported approximately one-third of total FSM national and state government expenditures in fiscal year 2016, while other U.S. grants supported an additional 15 percent of total FSM government expenditures (see fig. 3). While the supplemental education grant ends in 2023, the FSM would be eligible for some of the programs that the supplemental education grant replaced after 2023. A small number of other U.S. grants also end in 2023. See GAO-19-648T, app. I, for a discussion of grants and programs that do and do not end in 2023. In fiscal year 2016, compact sector and supplemental education grants that end in 2023 supported a larger proportion of FSM state governments’ expenditures than of the FSM national government’s expenditures. Compact sector grants and the SEG supported 8 percent of national government expenditures but supported 50 percent or more of each state’s government expenditures. Among the FSM states, Chuuk, which has both the largest population and the lowest per-capita income in the FSM, had the highest percentage of expenditures supported by U.S. grants. (See table 2 for a summary of FSM national and state government expenditures supported by compact sector grants and the SEG and by other U.S. grants.) Compact sector and supplemental education grants that end in 2023 supported approximately 25 percent of the RMI’s $123.5 million in government expenditures in fiscal year 2016, while other U.S. grants supported an additional 8 percent. Kwajalein-related compact grants that do not end in 2023 supported an additional 3 percent (see fig. 4). While the supplemental education grant ends in 2023, the RMI would be eligible for some of the programs that the supplemental education grant replaced after 2023. A small number of other U.S. grants also end in 2023. See GAO-19-648T, app. I, for a discussion of grants and programs that do and do not end in 2023. FSM and RMI budgets would be further affected if the countries assumed responsibility for providing programs and services currently provided by the United States. The following describes the status after 2023 of U.S. grants, programs, and services in the FSM and RMI under current law: Compact sector grants are scheduled to end in 2023, but the RMI MUORA extends the time frame of Kwajalein-related compact grants for as long as the MUORA is in effect. The SEG and additional grants identified in the amended compacts’ implementing legislation are scheduled to end in 2023. Also, after fiscal year 2023, the FSM and RMI will no longer be eligible for some programs that the SEG replaced, including Head Start (early childhood education, health, and nutrition services for low-income children and their families). The compact-related programs and services agreements with each country will end in 2024. However, some U.S. agencies, such as the National Weather Service, Federal Aviation Administration, and U.S. Agency for International Development, may continue to provide programs and services similar to those provided in the agreement under other authorities. The FSM and RMI will generally remain eligible for other programs identified in the amended compacts’ implementing legislation. These programs include U.S. Department of Agriculture (USDA) Rural Utilities Service grant and loan programs and U.S. Department of Education Pell grants for higher education and grants under Part B of the Individuals with Disabilities Education Act for children with disabilities. The FSM and RMI will remain eligible for additional programs we identified that have been provided under other current U.S. laws. Examples of these programs include USDA housing assistance programs and multiple public health, medical, and disease control and prevention grants provided by the U.S. Department of Health and Human Services. See appendix I for more information about the status after 2023 of U.S. grants, programs, and services in the FSM and RMI under current law. Our May 2018 projections for the compact trust funds showed that after fiscal year 2023, the funds are unlikely to provide maximum annual disbursements and may provide no disbursements at all in some years. The risk of disbursements below the maximum and the risk of zero disbursements increase over time for both funds. Potential strategies we analyzed in our May 2018 report would reduce or eliminate the risk of the compact trust funds’ experiencing years of zero disbursement. However, all of the potential strategies would require the countries to exchange a near-term reduction in resources for more-predictable and more- sustainable disbursements in the longer term. Our May 2018 projections for the FSM and RMI compact trust funds after 2023 indicated that, given their balance at the end of fiscal year 2017 and current compact trust fund rules—the baseline scenario—the funds will be unable to provide maximum disbursements (equal to the inflation- adjusted amount of annual grant assistance in 2023) in some years and unable to provide any disbursement at all in some years, with the likelihood of zero disbursement in a given year increasing over time. The compact trust funds’ C account—designed as a buffer to protect disbursements from the B account in years when the funds do not earn enough to fund the disbursement—could be exhausted by a series of years with low or negative annual returns. Since current rules do not allow disbursements from the compact trust fund corpus (the A account), exhaustion of the C account would result in zero disbursement in years when fund returns are zero or negative. Thus, there may be no funds available to disburse even if the funds’ A accounts have a balance. As a result of low or zero disbursements, the countries could face economic and fiscal shocks and significant challenges in planning programs and budgets. Since we published our May 2018 report, an additional year of compact trust fund performance data and updated estimates of future inflation have become available; however, the updated information does not alter the conclusions we presented in May 2018. The updated data and inflation estimates change our model’s assumptions about the current compact trust fund balance, size of future U.S. contributions to the FSM and RMI compact trust funds, annual grant assistance in fiscal year 2023, and C account balance—each of which are relevant variables for our analysis. However; the updated variables would result in only slight changes to our 2018 report’s projections of future compact trust fund performance presented in this testimony and do not alter our broader conclusions about future risks to the compact trust funds. FSM compact trust fund projections. In May 2018, our model projected that, given the baseline scenario and a 6 percent net return, the FSM compact trust fund will experience declining disbursements relative to the maximum allowable disbursements and an increasing chance of zero disbursements. (See app. I of GAO-18-415 for a full description of our methodology, and see app. V of GAO-18-415 for the baseline results with alternative net returns.) Projected disbursements. We projected that the FSM compact trust fund will, on average, be able to provide disbursements equal to 82 percent of the maximum allowable disbursement—the inflation- adjusted amount of 2023 annual grant assistance—in its first decade of disbursements. The likely average disbursement falls to 49 percent of the maximum in the next decade and falls further in subsequent decades. In addition, the amount available for disbursement may fluctuate substantially from year to year. Depending on the compact trust fund’s performance in the previous year, disbursements may be higher or lower than the average amount if the balance in the C account is not sufficient to provide additional disbursements. Likelihood of providing zero disbursement. We projected a 41 percent likelihood that the FSM compact trust fund will be unable to disburse any funds in 1 or more years during the first decade of trust fund disbursements. This likelihood increases over time, rising to 92 percent in fiscal years 2054 through 2063. Figure 5 shows our May 2018 projections of the FSM compact trust fund’s average disbursements as a percentage of maximum disbursement and the likelihood of 1 or more years of zero disbursement, given the baseline scenario and a 6 percent net return. RMI compact trust fund projections. In May 2018, our model projected that, given the baseline scenario and a 6 percent net return, the RMI compact trust fund will experience declining disbursements relative to the maximum allowable disbursements and an increasing chance of zero disbursements. Projected disbursements. We projected that in its first decade of disbursements, the RMI compact trust fund will, on average, be able to provide disbursements nearly equal to the inflation-adjusted amount of 2023 annual grant assistance as defined by the trust fund agreement—the maximum allowable. However, in each subsequent decade, the projected disbursements as a percentage of the maximum disbursements decline by about 10 percentage points. In addition, from year to year, the amount available to disburse may fluctuate substantially. Depending on the compact trust fund’s performance in the previous year, disbursements may be higher or lower than the average amount if the balance in the C account is not sufficient to provide additional disbursements. Likelihood of providing zero disbursement. We projected a 15 percent likelihood that the RMI compact trust fund will be unable to disburse any funds in 1 or more years during the first decade of trust fund disbursements. This likelihood increases over time, rising to 56 percent in fiscal years 2054 through 2063. Figure 6 shows our May 2018 projections of the RMI compact trust fund’s average disbursements as a percentage of maximum disbursement and its likelihood of 1 or more years of zero disbursement, given the baseline scenario and a 6 percent net return. For our May 2018 report, we conducted a series of simulations to determine the likely effects of potential strategies for improving the outlook of the FSM and RMI compact trust funds. For example, we developed and analyzed potential strategies in which: annual disbursements are reduced below the maximum allowable additional annual contributions are made to the trust fund prior to the end of fiscal year 2023, and the trust fund agreement disbursement policies are modified to limit the annual disbursement to a fixed percentage of the fund’s moving average balance over the previous 3 years, up to the maximum disbursement amount defined by the current trust fund agreement. All of the potential strategies we analyzed would reduce or eliminate the risk of the compact trust funds experiencing years of zero disbursement. However, some of the potential strategies may require changing the trust fund agreements and all of the potential strategies would require the countries to exchange a near-term reduction in resources for more- predictable and more-sustainable disbursements in the longer term. (See app. VII of our May 2018 report for detailed results of our analysis.) The trust fund committees have not taken the actions we recommended in 2018 to prepare for the 2023 transition to trust fund income. The compact trust fund committees have not yet prepared distribution policies, required by the trust fund agreements, which could assist the countries in planning for the transition to trust fund income. In addition, the committees have not established fiscal procedures for oversight of compact trust fund disbursements as required by the trust fund agreements. Further, the committees have not yet addressed a potential misalignment between the timing of their annual calculation of the amounts available to disburse and the FSM’s and RMI’s budget timelines, potentially complicating each country’s planning and management. The compact trust fund committees have not yet developed, as the compact trust fund agreements require, policies to guide disbursements from the trust funds after fiscal year 2023. Under the agreements, each trust fund committee must develop a distribution policy, with the intent that compact trust fund disbursements will provide an annual source of revenue to the FSM and RMI after the scheduled end of compact grant assistance. The trust fund committees could use distribution policies to address risks to each fund’s sustainability. For example, the committees have the discretion to disburse an amount below the established maximum. Our analysis of potential strategies for improving the funds’ outlook shows that reducing the size of disbursements would improve each compact trust fund’s long-term sustainability. Without a distribution policy that provides information about the size of expected disbursements, the FSM and RMI are hampered in their current and ongoing efforts to plan for the potential reduction in U.S. compact assistance after 2023. The compact trust fund committees have not yet established fiscal procedures for compact trust fund disbursements after fiscal year 2023. Each trust fund agreement requires the respective committee to determine the fiscal procedures to be used in implementing the trust fund agreement. The committees are to base their procedures on the compact fiscal procedures agreements, unless the parties to the trust fund agreement agree to adopt different fiscal procedures. No compact trust fund disbursements are to be made unless the committee has established such trust fund fiscal procedures. Without fiscal procedures in place, the trust fund committees will not be able to provide disbursements and the United States, the FSM, and the RMI will lack clear guidance to ensure oversight for trust fund disbursements. The timing for the trust fund committees’ calculation of the amounts available for annual disbursement to the FSM and the RMI after fiscal year 2023 does not align with the countries’ budget and planning timelines. The amounts available for disbursement in a given fiscal year cannot be determined until each fund’s returns have been determined at the end of the prior year. Further, if the disbursement amounts are calculated from audited fund returns as determined by annual audits required by the trust fund agreements, the amounts may not be determined until as late as March 31, 6 months into the fiscal year for which the disbursement is to be provided. However, both the FSM and the RMI government budget cycles are completed before the annual amounts available for disbursement will be known. As a result, the FSM and RMI would have to budget without knowing the amount to be disbursed, complicating their annual budget and planning processes. The trust fund committees, chaired by Interior, have discussed potential actions to address the recommendations in our May 2018 report. In May 2018, we made six recommendations to Interior—three parallel recommendations regarding each country’s trust fund. We recommended that the Secretary of the Interior ensure that the Director of the Office of Insular Affairs work with other members of the trust fund committees to: develop distribution policies, develop the fiscal procedures required by the compact trust fund address the timing of the calculation of compact trust fund disbursements. Interior concurred with our recommendations and has stated that it plans to implement them before the FSM and RMI transition to trust fund income in 2023. The FSM and RMI also concurred with our recommendations to Interior. According to the Trust Fund Administrator and Interior officials, the distribution policy was discussed at subsequent trust fund committee meetings—including the most recent, in May 2019. According to the trust fund administrator, trust fund representatives met with FSM and RMI representatives in January 2019 to discuss the status of the trust fund and future scenarios for its management. Interior officials further stated that discussions about trust fund policies and controls were frequent and ongoing among committee members and staffers as well as the trust fund manager and investment advisers. The FSM’s and RMI’s transition to relying on income from the compact trust funds will likely require significant budgetary choices. However, the lack of trust fund distribution policies, and the lack of alignment between the trust fund committees’ annual disbursement calculations and the countries’ budget cycles hamper the countries’ ability to plan for the transition. In addition, without the required fiscal procedures governing trust fund actions after 2023, the trust fund committees will be unable to make disbursements and the United States, the FSM, and the RMI will not have assurance of necessary oversight. However, as of June 2019, Interior had not implemented our recommendations to address these issues. Further, while Interior has continued to discuss possible actions to address our recommendations with the trust fund committees, it targeted implementation of our recommendations for 2023. Chairwoman Murkowski, Ranking Member Manchin, and Members of the Committee, this concludes my statement. I would be pleased to respond to any questions you may have. If you or your staff have any questions about this testimony, please contact David Gootnick, Director, International Affairs and Trade, at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Emil Friberg (Assistant Director), Ming Chen, Neil Doherty, Mark Dowling, Christopher Keblitis, Reid Lowe, Moon Parks, and Michael Simon. The amended compacts, compact–related agreements, the amended compacts’ implementing legislation, and other U.S. laws provide grants or eligibility for U.S. programs and services for the Federated States of Micronesia (FSM) and Republic of the Marshall Islands (RMI). The amended compacts provide compact sector, Kwajalein-related, and audit grants. Under current law, compact sector and audit grants are each scheduled to end in 2023, but the RMI military use and operating rights agreement (MUORA) extends the time frame of Kwajalein-related compact grants for as long as the agreement is in effect. The amended compacts’ implementing legislation provides additional grants, including authorizing a supplemental education grant (SEG), and identifies several specific U.S. programs as available to the FSM and RMI. Under current law, the additional grants end in 2023, but the statutory authorizations for some programs identified in Pub. L. No. 108-188 provide for the continued eligibility of the FSM and RMI to receive benefits under the programs. However, after fiscal year 2023, the FSM and RMI will no longer be eligible under current U.S. law for some programs that the SEG replaced. The compact-related programs and services agreements with each country identify additional programs and services that the United States makes available to the FSM and RMI. While these agreements will end in 2024, under current law, some U.S. agencies may continue to provide programs and services similar to those provided in the agreement under other authorities. Based on the status of current law, the FSM’s and RMI’s eligibility for other programs we identified that have been provided under other current U.S. laws will not change after fiscal year 2023. Under current law, compact sector grants provided to the FSM and the RMI under section 211(a) of the amended compacts are scheduled to end in 2023. However, the RMI is scheduled to continue to receive $7.2 million, partially inflation adjusted, related to the U.S. military base in Kwajalein Atoll and provided under section 211(b) of its compact. Under the terms of the RMI MUORA, the United States agreed to provide these Kwajalein-related grants for as long as the MUORA is in effect. The MUORA continues until 2066 and may be extended at the discretion of the United States until 2086. The amended RMI compact provides for $18 million, partially inflation adjusted, in annual payments to the RMI government to compensate for impacts from the U.S. Army Garrison– Kwajalein Atoll. These payments will continue for as long as the MUORA is in effect. Annual compact grants of up to $500,000 (not inflation adjusted) to each country to pay for required annual audits of compact grants are scheduled to end in 2023. See table 3 for a summary of compact sector, Kwajalein-related, and audit grants. The supplemental education grant (SEG) authorized by the amended compacts’ implementing legislation is scheduled to end in fiscal year 2023 and, under current law, FSM and RMI eligibility for most programs that the SEG replaced will not resume after fiscal year 2023. Absent changes to current law, the FSM and RMI will not be eligible after fiscal year 2023 for the following programs that the SEG replaced during fiscal years 2005 through 2023: U.S. elementary and secondary education grant programs, adult education and literacy programs, career and technical education programs, job training programs, and Head Start early education programs. However, under other provisions of current law, qualifying individuals in the FSM and RMI will be eligible after fiscal year 2023 for undergraduate education grants and work-study programs that the SEG replaced. See table 4. Although the programs and services agreements with the FSM and RMI will end in fiscal year 2024, current U.S. law enables U.S. agencies to continue providing some programs and services now provided under the agreements. After the agreements end, no current provisions of U.S. law will enable the Federal Emergency Management Agency (FEMA) to provide disaster response funding, enable the Federal Deposit Insurance Corporation to provide deposit insurance, or enable the U.S. Postal Service to provide the services that it currently provides to the FSM and RMI. However, the National Weather Service, the U.S. Department of Transportation’s (DOT) Federal Aviation Administration (FAA), and the U.S. Agency for International Development (USAID) could, under other legal authorities, provide services similar to those they now provide under the programs and services agreements. National Weather Service. The programs and services agreements authorize the National Weather Service to fund the operations of weather stations in the FSM and RMI, which it can continue to fund after the end of the agreements under other authorities, according to Department of Commerce officials. Federal Aviation Administration. The programs and services agreements authorize DOT’s FAA to provide technical assistance in the FSM and RMI, which it can continue to provide after the end of the agreements under other provisions of current U.S. law. However, DOT officials stated that FAA would require new bilateral agreements with the FSM and the RMI in order for the countries to continue to receive the civil aviation safety services that FAA currently provides under the programs and services agreements. The FAA would also seek reimbursement for any technical assistance it provides to the FSM and RMI. With regard to the civil aviation economic services provided under the programs and services agreements, DOT officials stated that, while the FSM and RMI could voluntarily decide to allow U.S. air carriers to continue operations in the FSM and RMI, new bilateral agreements would be needed to assure that result. U.S. Agency for International Development. Following a U.S. presidential disaster declaration, FEMA provides the funding for disaster relief and reconstruction, which is programmed through USAID. Under current law, FEMA funds will no longer be available to the FSM and RMI for this purpose once the agreements end; however, USAID will be able to provide foreign disaster assistance funding to the two countries under the same terms as it provides this assistance to other countries. After the programs and services agreements end, FEMA will be able to support disaster relief efforts only if USAID or the countries request such support on a reimbursable basis. In addition, according to State and Interior officials, telecommunications- related services that the two agencies provide to the FSM and RMI under the programs and services agreements will continue as long as the FSM and RMI provide appropriate authorization for such services. Table 5 shows the status after the programs and services agreements end of programs and services currently provided to the FSM and the RMI under the agreements. Although additional grants provided to the FSM and the RMI under the amended compacts’ implementing legislation will end in fiscal year 2023, the countries’ eligibility for programs now provided under that legislation will generally continue under current U.S. law. Grants provided under the amended compacts’ implementing legislation for (1) judicial training in the FSM and the RMI, and (2) agricultural and planting programs on the RMI’s nuclear-affected Enewetak Atoll are scheduled to end. However, under current U.S. law, legal authorities permitting the operation of other programs will remain available to the FSM and RMI after fiscal year 2023. Eligibility under these legal authorities continues either because the amended compacts’ implementing legislation does not specify an ending date or because other provisions in current U.S. law make the FSM and RMI eligible for the program. Programs provided in the amended compacts’ implementing legislation include U.S. Department of Agriculture Rural Utilities Service grant and loan programs; U.S. Department of Education Pell grants for higher education and grants under Part B of the Individuals with Disabilities Education Act for children with disabilities; programs for nuclear-affected areas in the RMI; and additional programs provided by the Departments of Commerce and Labor as well as law enforcement assistance provided by the U.S. Postal Service. See table 6 for a summary of the programs identified in the amended compacts’ implementing legislation and their status as of the end of fiscal year 2023. In addition to being eligible for the programs provided through the compact, its associated agreements, and the amended compacts’ implementing legislation, the FSM and RMI are also eligible for a number of programs under other provisions of current U.S. law. The FSM and RMI have each received funds from the U.S. Department of Agriculture for forestry and rural housing programs, multiple U.S. Department of Health and Human Services public health program grants, U.S. Department of the Interior technical assistance and historic preservation programs, and the DOT FAA airport improvement program, among others. Under current U.S. law, the legal authorities permitting the provision of these programs in the FSM and RMI would not necessarily change after 2023. Table 7 shows the FSM’s and RMI’s eligibility for these additional grants and programs under current law after fiscal year 2023.", "summary": "In 2003, the United States approved amended compacts of free association with the FSM and RMI, providing a total of $3.6 billion in economic assistance in fiscal years 2004 through 2023 and access to several U.S. programs and services. Compact grant funding, overseen by the Department of the Interior (Interior), generally decreases annually. However, the amount of the annual decrease in grants is added to the annual U.S. contributions to the compact trust funds, managed by joint U.S.-FSM and U.S.-RMI trust fund committees and chaired by Interior. Trust fund earnings are intended to provide a source of income after compact grants end in 2023. This testimony summarizes GAO's May 2018 report on compact grants and trust funds ( GAO-18-415 ). In that report, GAO examined (1) the use and role of U.S. funds and programs in the FSM and RMI budgets, (2) projected compact trust fund disbursements, and (3) trust fund committee actions needed to address the 2023 transition to trust fund income. For this testimony, GAO also reviewed key variables for its trust fund model as of June 2019 to determine whether these variables had substantially changed. In addition, GAO reviewed the status of Interior's response to GAO's May 2018 recommendations. The Federated States of Micronesia (FSM) and the Republic of the Marshall Islands (RMI) rely on U.S. grants and programs, including several that are scheduled to end in 2023. In fiscal year 2016, U.S. compact sector grants and supplemental education grants, both scheduled to end in 2023, supported a third of the FSM's expenditures and a quarter of the RMI's. Agreements providing U.S. aviation, disaster relief, postal, weather, and other programs and services are scheduled to end in 2024, but some U.S. agencies may provide programs and services similar to those in the agreements under other authorities. GAO's 2018 report noted that the FSM and RMI compact trust funds face risks and may not provide disbursements in some future years. GAO projected a 41 percent likelihood that the FSM compact trust fund would be unable to provide any disbursement in 1 or more years in fiscal years 2024 through 2033, with the likelihood increasing to 92 percent in 2054 through 2063. GAO projected a 15 percent likelihood that the RMI compact trust fund would be unable to provide any disbursement in 1 or more years in fiscal years 2024 through 2033, with the likelihood increasing to 56 percent in 2054 through 2063. Potential strategies such as reduced trust fund disbursements would reduce or eliminate the risk of years with no disbursement. However, some of these strategies would require changing the trust fund agreements, and all of the strategies would require the countries to exchange a near-term reduction in resources for more-predictable and more-sustainable disbursements in the longer term. Interior has not yet implemented the actions GAO recommended to prepare for the 2023 transition to trust fund income. The trust fund committees have not developed distribution policies, required by the agreements, which could assist the countries in planning for the transition to trust fund income. The committees have not developed the required fiscal procedures for oversight of disbursements or addressed differences between the timing of their annual determinations of the disbursement amounts and the FSM's and RMI's annual budget cycles. In its May 2018 report, GAO made three recommendations to Interior regarding each country's trust fund to address trust fund disbursement risks. Interior concurred with GAO's recommendations and discussed actions in response at subsequent trust fund committee meetings, with implementation targeted for 2023.", "document_type": "gao"}
{"report": "NNSA largely executes its missions at eight sites that comprise the nuclear security enterprise and that are managed by seven M&O contractors. These eight sites are three national security laboratories—Lawrence Livermore National Laboratory in California, Los Alamos National Laboratory in New Mexico, and Sandia National Laboratories in New Mexico and other locations; four nuclear weapons production plants—the Pantex Plant in Texas, the Y-12 National Security Complex in Tennessee, the Kansas City National Security Complex in Missouri, and tritium operations at DOE’s Savannah River Site in South Carolina; and the Nevada National Security Site, formerly known as the Nevada Test Site. As shown in figure 1, each of NNSA’s eight sites has specific responsibilities within the nuclear security enterprise. NNSA also executes portions of its missions across several other DOE sites, such as the Pacific Northwest National Laboratory in Washington and the Oak Ridge National Laboratory in Tennessee. At this time, NNSA’s common financial reporting efforts are focused on the eight sites, as required by the National Defense Authorization Act for Fiscal Year 2017. NNSA’s sites are owned by the federal government but managed and operated by M&O contractors. According to DOE, the use of M&O contracts is supported by an underlying principle: the federal government employs highly capable companies and educational institutions to manage and operate government-owned or -controlled scientific, engineering, and production facilities because these companies and educational institutions have greater flexibility than the government in bringing scientific and technical skills to bear. As we previously found, an M&O contract is characterized by, among other things, a close relationship between the government and the contractor for conducting work of a long-term and continuing nature. To support its missions, NNSA is organized into program offices that oversee the agency’s numerous programs. For example, the Office of Defense Programs oversees the B61-12 Life Extension Program, and the Office of Defense Nuclear Nonproliferation oversees the Nuclear Smuggling Detection and Deterrence Program. NNSA’s program offices are Defense Nuclear Nonproliferation; Safety, Infrastructure, and Operations; Defense Nuclear Security; Counterterrorism and Counterproliferation; and Naval Reactors. Mission-related activities are primarily overseen by these program offices, which are responsible for integrating the activities across the multiple sites performing work. NNSA field offices, co-located at the sites, oversee the day-to-day activities of the contractors as well as mission support functions such as safety. NNSA is subject to different cost accounting requirements than its seven M&O contractors. NNSA is required to follow Managerial Cost Accounting Standards. The principal purpose of Managerial Cost Accounting Standards is to determine the full cost of delivering a program or output to allow an organization to assess the reasonableness of this cost or to establish a baseline for comparison. The standards state that federal agencies should accumulate and report the costs of their activities on a regular basis for management information purposes. The standards also state that agencies should allow flexibility for agency managers to develop costing methods that are best suited to their operational environment. Such information is important to Congress and to NNSA managers as they make decisions about allocating federal resources, authorizing and modifying programs, and evaluating program performance. Separate standards—referred to as federal Cost Accounting Standards—govern how NNSA’s M&O contractors structure and account for their costs. Federal Cost Accounting Standards provide direction for the consistent and equitable distribution of a contractor’s costs to help federal agencies more accurately determine the actual costs of their contracts and the contractor’s costs associated with specific projects and programs. To comply with federal Cost Accounting Standards, M&O contractors classify costs as either direct or indirect when they allocate these costs to programs. Direct costs are assigned to the benefitting program or programs. Indirect costs—costs that cannot be assigned to a particular program, such as costs for administration and site support—are to be accumulated, or grouped, into indirect cost pools. The contractor is to estimate the amount of indirect costs to distribute to each program (accumulated into indirect cost pools) and make adjustments by the end of the fiscal year to reflect actual costs. The contractor is then to distribute these costs proportionally across all programs based on a rate in accordance with the contractor’s cost allocation model. The final program cost is the sum of the total direct costs plus the indirect costs distributed to the program. In implementing these allocation methods, federal Cost Accounting Standards provide contractors with flexibility regarding the extent to which they identify incurred costs directly with a specific program and how they collect similar costs into indirect cost pools and allocate them among programs. Therefore, different contractors may allocate similar costs differently because the contractors’ cost allocation models differ—that is, a cost classified as an indirect cost at one site may be classified as a direct cost at another. Because each contractor can allocate similar indirect costs differently and contractors may change the way they allocate indirect costs over time, it is difficult to compare contractors’ costs among sites and accurately calculate total program costs when work for a program is conducted at multiple sites. The seven NNSA M&O contractors and NNSA’s program offices account for and track costs differently. We previously found that NNSA’s M&O contractors have historically developed their own processes to manage and track costs for work at each site even when their work contributes to the same program. These processes have generally differed from the ones NNSA program offices have developed to describe the scope of its programs. This makes it difficult for NNSA and others to track and compare costs for analogous activities across programs, contractors, and sites. For example, in May 2018, we found that NNSA’s work breakdown structure for the B61-12 Life Extension Program and its $7.6 billion cost estimate (at that time) did not include $648 million in activities that were undertaken by other NNSA programs, such as research and development, test and evaluation activities, and infrastructure elements. Leading practices for developing work breakdown structures state that a work breakdown structure should include all activities that contribute to a program’s end product, and should not treat contributing activities separately. DOE’s and NNSA’s financial management and accounting system—the Standard Accounting and Reporting System (STARS)—provides budget execution, financial accounting, and financial reporting capabilities for the department. STARS is also integrated with other agency systems for procurement, funds distribution, travel, and human resources. The M&O contractors’ financial systems must be able to directly provide cost reports to NNSA’s financial management system. The primary source of cost data contained in STARS comes from summary-level cost reports provided by M&O contractors, which they report for NNSA’s appropriations at the budget and reporting code level. Program offices access STARS financial data through the DOE Office of the Chief Financial Officer’s integrated data warehouse. While financial data collected through STARS represent DOE’s official financial data, the data are not detailed and therefore may not satisfy the information needs of NNSA’s program offices. For example, STARS financial data do not differentiate labor costs from other programmatic costs, nor do they provide detailed information about the costs of activities that contribute to program costs. In addition, according to M&O contractor representatives, if one M&O contractor provides funding to another contractor, such as to conduct testing, NNSA does not have the ability in STARS to identify that funding was transferred. In the absence of an automated managerial cost accounting system that collects data from financial systems and relevant operating systems to consistently and uniformly produce useful cost information, NNSA’s program offices developed various systems, tools, and spreadsheets to track relevant cost information. Specifically, NNSA’s program offices separately collect cost information from M&O contractors that is more detailed than costs reported through STARS. Collecting these data requires M&O contractors to map, or “crosswalk,” their cost data to the work breakdown structures of one or more of NNSA’s program offices. Some program offices collect financial data through ad hoc data calls, rather than regular data calls. Some tools the program offices use include program management systems or spreadsheets designed to meet each program office’s programmatic, budgetary, and project requirements. For example, the Office of Defense Programs built the Enterprise Portfolio Analysis Tool in 2007 to capture financial data from the M&O contractors for its programs. Also, in 2007, officials from the Office of Defense Nuclear Nonproliferation developed a program management system designed to integrate and manage data such as scope, schedule, budget, and cost at the program level with greater detail than the data in STARS. The Office of Safety, Infrastructure, and Operations later adopted this system and called it the G2 program management system. M&O contractors use the G2 system to upload crosswalks of financial data for those program offices’ work breakdown structures after the costs were incurred. This process allows M&O contractors to report detailed financial data to the respective program offices every month. The process to track cost information is different for each program office and depends on the tool used and the information collected. However, for all program offices the process to track cost information is in addition to the financial reporting that M&O contractors provide for STARS (see fig. 2). To implement common financial reporting and standardize financial reporting by the M&O contractors across programs and sites, NNSA is pursuing an approach in which the agency collects M&O contractors’ financial data in a common reporting framework using an NNSA-wide data reporting and analysis tool. M&O contractors produce crosswalks of their financial data and submit the data to NNSA using a data reporting and analysis tool called CostEX. NNSA then stores the reported financial data in the DOE Office of the Chief Financial Officer’s integrated data warehouse. The Office of Defense Programs has used this process to collect financial data from the M&O contractors for its programs since fiscal year 2017. NNSA implemented this process for the broader common financial reporting effort in fiscal year 2018. Figure 3 illustrates NNSA’s data management process for common financial reporting. To implement common financial reporting, NNSA established a common reporting framework using agreed-upon work breakdown structures and common cost elements and definitions. However, in January 2019, we found that NNSA did not establish a common work breakdown structure for all of the participating program offices, although the agency had established 22 common cost elements and definitions. Specifically, the Offices of Defense Programs, Emergency Operations, Defense Nuclear Security, and Counterterrorism and Counterproliferation used NNSA’s common work breakdown structure, while the Offices of Safety, Infrastructure, and Operations and Defense Nuclear Nonproliferation used their own programmatic work breakdown structures. The M&O contractors crosswalk their internal financial data into a work breakdown structure for each of the participating program offices (either NNSA’s common work breakdown structure or a programmatic work breakdown structure) using common cost elements and definitions. The M&O contractors’ business systems capture their financial data at a more detailed level than is needed for common financial reporting. Each M&O contractor tracks financial data for its site based on how it manages the work using projects, tasks, and expenditure types. For example, M&O contractors collect time and attendance data from their employees based on the number of hours spent working on a project for the pay period. The M&O contractors aggregate this information across multiple employees to report on labor costs for a project. When the M&O contractors prepare their data for common financial reporting, site managers identify the component(s) of the applicable work breakdown structure and cost elements with which the project aligns and crosswalk their financial data to the NNSA structure using professional judgment. Figure 4 shows an example of how an M&O contractor crosswalks its financial data into an NNSA work breakdown structure in CostEX. After the M&O contractors submit their financial data in CostEX, NNSA performs data quality and accuracy checks of the M&O contractors’ data, referred to as “data validation” and “data reconciliation.” NNSA performs data validation using CostEX, which automatically checks each row for data quality—such as confirming that the correct contractor is entering data for the site—and formatting based on 45 validation checks. CostEX identifies data that do not pass the validation check as errors and rejects them, and the M&O contractor corrects and resubmits the data until it passes the validation check. NNSA performs data reconciliation with STARS using CostEX at the budget and reporting code level. CostEX extracts STARS data for selected budget and reporting codes and compares it with the data the M&O contractors submitted for common financial reporting. CostEX identifies data that differ from the STARS data by more than $1 as an error and rejects the data, and the M&O contractor corrects and resubmits the data until it passes the reconciliation check. According to NNSA officials, it is important for the agency to perform these data validation and reconciliation checks prior to accepting the M&O contractors’ financial data to ensure data quality. NNSA has made progress toward implementing common financial reporting across the nuclear security enterprise since our last report in January 2019, but it faces challenges in fully implementing the effort. We identified seven steps related to NNSA’s efforts to implement common financial reporting in our January 2019 report: (1) identifying an approach and developing a tool to implement common financial reporting, (2) developing a policy, (3) establishing common cost elements and definitions, (4) identifying and reporting costs for programs of record and base capabilities, (5) implementing a common work breakdown structure, (6) collecting financial data from the M&O contractors, and (7) publishing and analyzing data. To date, the agency has completed three steps but has not yet completed four others, as shown in table 1. As required by the National Defense Authorization Act for Fiscal Year 2017, NNSA is to implement common financial reporting by December 23, 2020, to the extent practicable. NNSA’s progress to implement common financial reporting in these seven steps since our January 2019 report is described below: Identify an approach and develop a tool to implement common financial reporting. NNSA identified an approach and developed a tool to implement common financial reporting prior to our January 2019 report. NNSA continues to use CostEX to collect financial data from the M&O contractors and stores the data in DOE’s integrated data warehouse. Develop a policy. NNSA developed a policy for common financial reporting. NNSA began developing the policy in October 2016 and approved it in February 2019. Establish common cost elements and definitions. NNSA established common cost elements and definitions prior to our January 2019 report. An NNSA official said NNSA established the cost elements and definitions based on data that the M&O contractors could readily provide from their business systems. In fiscal year 2019, NNSA used the established cost elements to collect the M&O contractors’ data and added a requirement for the contractors to report data on unpaid commitments. NNSA officials are considering adding cost elements in the future, such as additional details on labor categories. NNSA is working with the M&O contractors to ensure they can provide the additional data. Identify and report costs for programs of record and base capabilities. NNSA has not yet identified and reported costs for all programs of record or costs for base capabilities. The National Defense Authorization Act for Fiscal Year 2017 required NNSA to establish definitions and methodologies for identifying and reporting costs for programs of record and base capabilities as part of its efforts to implement common financial reporting. According to the program director for financial integration, NNSA establishes its programs of record in its congressional budget justification and other documents to align with agency appropriations, which include Weapons Activities, Defense Nuclear Nonproliferation, and Federal Salaries and Expenses. Through common financial reporting in fiscal year 2018, NNSA collected financial data from the M&O contractors for $8.9 billion of $13 billion from these appropriations. In May 2018, NNSA issued guidance that identified 25 base capabilities that the M&O contractors used to develop their site strategic plans. We reviewed the M&O contractors’ site strategic plans for 2018 and found that the contractors identified base capabilities for their sites, but did not include information about the costs to maintain each sites’ base capabilities. NNSA is working to determine whether or how to collect information on the cost of base capabilities through the M&O contractor site strategic planning process in coordination with the common financial reporting effort. We will continue to monitor NNSA’s progress in addressing this requirement. Implement a common work breakdown structure. NNSA has not yet implemented a common work breakdown structure across the program offices in the nuclear security enterprise, but plans to assess the feasibility of implementing a common structure in fiscal year 2020. The National Defense Authorization Act for Fiscal Year 2017 requires NNSA to develop a common work breakdown structure as part of its efforts to implement common financial reporting. In January 2019, we found that NNSA decided not to pursue a common work breakdown structure. Rather, NNSA collected financial data from the M&O contractors using a common work breakdown structure for four program offices and used different, programmatic work breakdown structures for two other program offices. As we found in January 2019, these two offices did not want to change their work breakdown structures to the common structure. For example, the Office of Safety, Infrastructure, and Operations did not want to change its work breakdown structure because it uses the structure for scope, schedule, and risk management, in addition to budget and cost. We recommended that NNSA implement a common work breakdown structure across its participating program offices because without doing so, NNSA could not ensure that its efforts would result in the collection of reliable, enterprise-wide financial data that satisfies the needs of Congress and enables NNSA to report the total costs of its programs. At the time of that report, NNSA neither agreed nor disagreed with the recommendation. The agency stated that it would continue to use its current approach, while focusing on enhancing analysis and reporting to provide comparative data across the enterprise. Once this was completed, NNSA planned to assess the effectiveness of the approach and evaluate what changes, if any, were necessary to the work breakdown structures to meet the overarching objectives of common financial reporting. In May 2019, in response to our recommendation, NNSA changed its approach and decided to conduct an assessment in fiscal year 2020 of the feasibility of implementing a common work breakdown structure across all participating program offices. To do so, NNSA plans to collect M&O contractors’ financial data in fiscal year 2020 using both the common work breakdown structure for all program offices and— specifically for the Offices of Safety, Infrastructure, and Operations and Defense Nuclear Nonproliferation—the programmatic work breakdown structures while it assesses the feasibility of a common work breakdown structure. NNSA decided to take this approach to assess the potential benefits while mitigating potential risks to the program offices that use the data collected through the programmatic work breakdown structures to oversee their programs. NNSA officials said that reporting the same data using two different work breakdown structures will require additional resources for the M&O contractors to prepare their data submissions, which NNSA does not view as a long-term solution for common financial reporting. NNSA planned to collect data using these two approaches in parallel starting in November 2019 and make a decision on whether to implement a common work breakdown structure across the nuclear security enterprise in March 2020. NNSA plans to assess the feasibility of implementing a common work breakdown structure using criteria such as (1) whether using a common work breakdown structure reduces burden on the M&O contractors, (2) how much it will cost NNSA to update other program management systems, (3) whether NNSA can collect financial data quickly enough to meet the needs of the program offices, and (4) whether financial data collected using the common work breakdown structure provides program offices with comparable data to support existing program analysis. Collect financial data from M&O contractors. Since our January 2019 report, the M&O contractors submitted their financial data for fiscal years 2018 and 2019 for the participating program offices using CostEX. However, NNSA and the M&O contractors faced challenges in collecting accurate and consistent financial data for common financial reporting across the nuclear security enterprise. Specifically, NNSA faced challenges in (1) fully implementing its data validation and reconciliation process, (2) collecting financial data from each M&O contractor for all of the program offices, and (3) communicating information about changes in a timely manner. First, NNSA faced challenges fully implementing its data validation and reconciliation process for fiscal year 2018. NNSA designed CostEX to automatically validate the M&O contractors’ data to check data quality and formatting and perform data reconciliation with STARS. However, according to an NNSA official, for fiscal year 2018, the agency manually reconciled the M&O contractors’ fiscal year 2018 data with STARS to identify and fix issues with the process prior to automation. For example, an NNSA support contractor manually submitted and reconciled data for one M&O contractor that manages two sites because the M&O contractor submits combined data for the two sites into STARS, but NNSA collects financial data for common financial reporting by site. For the fiscal year 2019 data collection effort, NNSA officials said they corrected the submission issue and CostEX was able to automatically reconcile the M&O contractors’ data with STARS. Another M&O contractor’s fiscal year 2018 financial data did not reconcile each month with STARS. NNSA officials and representatives from the M&O contractor said the reconciliation issue was due to timing differences between when the contractor reported data into STARS and CostEX. Specifically, M&O contractor representatives for the site said that when NNSA is delayed in collecting data for common financial reporting in CostEX, the relationships between the data reported into STARS and CostEX will have changed, which may result in reconciliation errors. During that time, the site changed how it tracked some of the data, which led to differences in how the data were provided for STARS and common financial reporting, and which caused the reconciliation errors. NNSA officials said they resolved the issue with the M&O contractor for fiscal year 2019 and completed data collection in October 2019. Second, NNSA faced challenges in collecting data from each M&O contractor for all of the participating program offices. Specifically, the Office of Defense Nuclear Nonproliferation made ongoing changes to its work breakdown structure templates throughout the fiscal year 2018 data collection effort. This resulted in challenges for the M&O contractors when reporting data for this program office. NNSA did not collect complete fiscal year 2018 financial data for this office, in part because one of the contractors had significant data validation and reconciliation errors, resulting in data that NNSA could not validate and reconcile. Third, NNSA faced challenges in communicating information about changes to the work breakdown structure in a timely manner to M&O contractors. Leading project management practices emphasize the importance of establishing and implementing change control processes, which include reviewing and approving all change requests, documenting the changes, and communicating the decisions. In fiscal years 2018 and 2019, not all NNSA programs consistently ensured that changes to the work breakdown structure were approved, documented, or communicated to the M&O contractors in a timely manner because NNSA had not established and implemented a work breakdown change control process. NNSA established aspects of such a process, in which program offices submitted changes to the work breakdown structures to the financial integration team so the team could upload the changes into CostEX and notify the M&O contractors of the changes prior to their data submissions. However, according to officials with the financial integration team, the federal program managers did not always follow the process. Officials with the financial integration team said that in some instances, the sites’ program managers contacted the M&O contractors directly to request changes to their work breakdown structures. The financial integration team identified issues with the program offices’ work breakdown structures when the M&O contractors’ data could not be validated and reconciled. In such instances, the financial integration team contacted the program managers to request the updated work breakdown structures for CostEX. Further, the existing process does not include some aspects of change control processes that are consistent with leading practices. Approving changes. Under the existing process, the financial integration team does not check whether changes that federal program managers submit to them have been reviewed and approved, at a minimum, by program office management prior to making changes to the work breakdown structures in CostEX. The program director for financial integration said that they defer to the program offices to ensure that program office management review and approve changes to the work breakdown structure before the program managers submit these changes to the financial integration team. Documenting changes. NNSA officials said that not all program offices have tracked changes to their work breakdown structures over time. NNSA’s Office of Defense Programs has a process for tracking changes to its work breakdown structure, but that process—or a similar process—was not utilized consistently by all of NNSA’s other program offices. If the program offices do not track the changes to their work breakdown structures over time, they cannot ensure the data are comparable across fiscal years. According to officials, NNSA built a tool in CostEX to track work breakdown structure changes across fiscal years. NNSA officials said the tool was tested at the end of fiscal year 2019 by the Office of Defense Programs. NNSA plans to test using the tool to track changes for the other program offices in fiscal year 2020. Communicating decisions. NNSA did not always communicate changes to the work breakdown structure to the M&O contractors in a timely manner. Representatives from the seven M&O contractors stated that they encountered challenges in submitting their data in CostEX on multiple occasions throughout fiscal years 2018 and 2019 because federal program managers in some offices made frequent changes to the work breakdown structures that often were not communicated to the M&O contractors in a timely manner. When work breakdown structures change, representatives from the seven M&O contractors said they have to redo the crosswalk of their financial data to the new work breakdown structures before they submit the data— this takes time and additional resources and may result in delayed data submissions. Representatives from three of the M&O contractors said the frequency of changes to the work breakdown structures decreased for the fiscal year 2019 data collection effort, but representatives from six M&O contractors said they continued to encounter challenges when changes were made to the work breakdown structures. Without establishing and systematically implementing a work breakdown structure change control process, NNSA will not be able to verify that, at a minimum, program office management has approved changes to the work breakdown structure or that these changes have been documented, potentially leading to challenges in ensuring that the data are comparable over time. Furthermore, NNSA cannot ensure that changes to the work breakdown structures are communicated to the M&O contractors in a timely manner, which results in contractors using additional time and resources to address validation or reconciliation errors. Publish and analyze data. NNSA has published the M&O contractors’ financial data for fiscal years 2018 and 2019, but NNSA has not conducted agency-wide analysis of the data. The NNSA financial integration team has a website for common financial reporting from which the program offices can download financial data. However, an NNSA official stated that agency-wide analysis of the data was not feasible for fiscal years 2018 or 2019 because NNSA did not use a common work breakdown structure for all participating program offices. In addition, an NNSA official stated that the agency needs to collect at least 3 years of data to produce useful NNSA-wide findings. Some of the NNSA program offices have started to analyze the financial data collected through the common financial reporting effort. For example, the Office of Defense Programs is using financial data collected through common financial reporting for program evaluation and to make budgetary decisions. In addition, an NNSA official from the Office of Counterterrorism and Counterproliferation stated that the office has used financial data from common financial reporting to identify and address accounting issues, such as identifying previously unidentified unspent funds carried over from prior fiscal years and redirecting these funds to support program activities in fiscal year 2019. However, some of the program offices have not used the data collected through common financial reporting for various reasons. For example, officials from the Office of Safety, Infrastructure, and Operations stated that the fiscal year 2018 data were not useful for analysis because they were not collected in a timely manner. NNSA officials said they completed data validation and reconciliation of the M&O contractors’ fiscal year 2018 financial data in February 2019—nearly halfway through the following fiscal year—making the data late and not useful for that office’s purposes. Additionally, officials from the Office of Defense Nuclear Security stated that they have not used the data collected through the common financial reporting effort because they want to ensure that the data are accurate and consistent before using it for decision-making. As discussed previously, M&O contractors crosswalk their financial data into a reporting framework using work breakdown structures and common cost elements and definitions, and they submit their data to NNSA using CostEX. To help ensure the accuracy of the data, NNSA performs data quality checks of the M&O contractors’ financial data submitted using CostEX. If NNSA cannot validate and reconcile the submitted data using the agency’s processes, it rejects and returns the data to the M&O contractor to correct the errors. NNSA also provides the M&O contractors with error reports from CostEX that they can use to identify and correct errors. Each M&O contractor has established processes to check data quality prior to submitting the data to NNSA in CostEX. For example, representatives from all of the M&O contractors said they reviewed their data for missing information and errors before submitting the data into CostEX. In addition, all of the M&O contractors performed checks to compare their data submissions for common financial reporting with their STARS submissions before submitting the data into CostEX. After the M&O contractors complete their internal data quality checks, they submit their financial data into CostEX. At most sites, M&O contractor representatives said the way their site tracks financial data does not align with how NNSA requests the data be reported in the work breakdown structure and cost elements. Officials from NNSA’s Office of Cost Estimating and Program Evaluation said that because the M&O contractors do not track their financial data using NNSA work breakdown structures, the contractors have to make decisions using professional judgment as to how to crosswalk their project costs, raising concerns that each M&O contractor may make different decisions about how to allocate costs. The officials said this may result in data that are not accurate or comparable for conducting agency- wide analysis. We identified several limitations to the approach NNSA uses to collect common financial data that could affect the accuracy and consistency of the data: NNSA’s data reconciliation process does not ensure M&O contractors’ financial data are accurate. M&O contractors identified potential issues with using STARS for reconciliation to ensure data accuracy. For example, two M&O contractors said that errors can sometimes occur in their monthly STARS reporting. Errors in STARS can be created when a number is mistyped or corrections are made to purchase card or time sheet information. Once the M&O contractor submits its data to STARS, errors cannot be corrected until at least the following month. However, because the common financial reporting data must reconcile with STARS, the M&O contractor has to submit financial data into CostEX that includes the error. The program director for financial integration said a process is in place for the M&O contractors to identify any issues with STARS reporting and correct their reported data in the future. More significantly, some M&O contractors said they make changes to their data before submitting it into CostEX to ensure that the data reconcile. Specifically, representatives from two M&O contractors said they compare their financial data for common financial reporting with their STARS data submission. If data from the two systems do not match for small dollar amounts, the contractors manually make adjustments to the data for common financial reporting rather than making the corrections in their business systems. The representatives also said they do not notify NNSA officials of the manual changes. NNSA requires that financial data for common financial reporting reconcile with STARS. Specifically, NNSA rejects M&O contractor financial data that differs from the STARS data by more than $1. According to federal standards for internal control, management should define objectives clearly to enable the identification of risks and define risks tolerances. For the fiscal year 2018 data collection effort, NNSA documentation indicated that M&O contractors reported financial data for $8.9 billion of costs and reconciled the data with their STARS cost reporting to a total difference of $5.03. According to an NNSA official, M&O contractors reported financial data for $10.2 billion of costs and reconciled the data with STARS to a total difference of $8.97 for fiscal year 2019. However, NNSA has limited assurance that the financial data provided internally reconcile as required because the agency does not know the extent of changes that M&O contractors made to ensure the data reconcile with STARS or the potential effects of those changes on the accuracy of the data. Assessing the extent to which M&O contractors make manual changes to ensure reconciliation with STARS for common financial reporting and determining the effect of these changes could provide additional assurance that the financial data collected through common financial reporting are accurately reported. M&O contractors crosswalk site projects and tasks to NNSA work breakdown structures, resulting in the potential for differences in how costs are allocated. Each M&O contractor tracks financial data for its site based on how it manages the work using projects and tasks, as allowed by federal Cost Accounting Standards. When a site’s projects and tasks do not align with NNSA’s work breakdown structure, site program managers identify the component of the NNSA work breakdown structure with which the project and tasks best align and crosswalk their financial data to the NNSA structure using professional judgment. One site program manager said it is sometimes challenging to identify which of their internal projects and tasks aligns with the NNSA work breakdown structure, especially when internal projects have similar names to describe different project scopes. Another site program manager said the site’s projects and tasks closely align with the NNSA work breakdown structure approximately 30 to 40 percent of the time, and contractor representatives use professional judgment to crosswalk the remaining 60 to 70 percent of their projects and tasks. To create the crosswalk, site program managers consider which NNSA program the project mostly supports. It can be difficult to crosswalk the site data into NNSA’s work breakdown structure, especially for work that benefits multiple weapons programs. For example, a site program manager said that the site’s project to develop inert material for NNSA’s high explosives activities supports multiple weapons programs. The site tracks that work as one project, but NNSA’s work breakdown structure requires that the costs be reported across multiple programs. When M&O contractors make decisions to crosswalk their financial data using professional judgment, the contractors do not provide information to NNSA on how the costs are allocated. By verifying this information, NNSA could ensure that allocation decisions are made consistently across the nuclear security enterprise. M&O contractors provided different financial data for the same projects. M&O contractors continue to report financial data for some program offices into multiple systems, including the G2 program management system, WebPMIS, and spreadsheets. For fiscal year 2018, NNSA compared financial data that the M&O contractors reported, for two NNSA program offices, into the G2 program management system and the CostEX tool used for common financial reporting and found differences between the data reported for the same budget and reporting codes and levels of the work breakdown. The program director for financial integration said he worked with the program offices and identified the cause of the differences in the data. NNSA cannot ensure the accuracy of the data submitted for common financial reporting because NNSA does not have an internal process to verify whether M&O contractors crosswalk their financial data accurately from their business systems to the NNSA work breakdown structure. According to federal standards for internal control, management should use quality information to achieve the agency’s objectives. Under the financial integration policy, the program director for financial integration is responsible for executing a plan for NNSA to achieve enterprise-wide financial integration to collect standardized financial management data; increase transparency of financial accountability; and improve cost analysis, comparability, and reporting consistency among programs and M&O contractors. The program director for financial integration said that verifying whether the M&O contractors properly crosswalk their data to the work breakdown structure is an area in which the agency should improve its common financial reporting effort. NNSA officials stated that the common financial reporting effort does not have a process to validate financial data that are more detailed than STARS and indicated that until the agency has assurances the reported data are accurate, NNSA should not use that more detailed data for agency decision-making. By developing an internal process for NNSA to verify the M&O contractors’ crosswalks, the agency will have better assurance that the data collected through common financial reporting will produce accurate, enterprise- wide financial data that is comparable across the M&O contractors and that satisfies the needs of Congress and other stakeholders. Further, this would help address long-term issues with NNSA’s ability to report the total costs of its programs, in accordance with Managerial Cost Accounting Standards. As part of common financial reporting, M&O contractors crosswalk their financial data to NNSA’s cost elements. Cost elements capture discrete costs of a particular activity of work and include direct costs such as labor and equipment and indirect costs such as general and administrative costs. In March 2018, NNSA established 22 cost elements and definitions—including 10 indirect cost elements—that the M&O contractors use to report financial data. As we found in our January 2019 report, NNSA officials said this was a critical step toward implementing common financial reporting because without common cost elements, the agency was limited in its ability to report lower-level costs consistently across programs and sites. In addition, having the M&O contractors report financial data across common cost elements would allow NNSA to improve its management of programs across the enterprise. NNSA developed the cost elements and definitions in consultation with the M&O contractors based on the data they could provide because officials said it is important for the contractors to report accurate financial data using the NNSA cost elements. M&O contractors manage their sites’ financial data using expenditure types to track the costs of their projects. These expenditure types capture similar costs as the cost elements, but at a more detailed level, and are specific to each individual M&O contractor based on how the contractor manages its expenses. M&O contractors have flexibility to determine how they structure their work and the expenditures they track in their financial systems consistent with Cost Accounting Standards. Based on our review of M&O contractor documents, M&O contractors varied significantly in the number of expenditure types they tracked. For example, the M&O contractor for one of the national laboratories tracked its financial data using over 900 expenditure types, while another national laboratory used around 50 expenditure types. NNSA officials said that the number of expenditure types at the sites varies based on the nature of the work performed at each site. Most of the M&O contractors cannot crosswalk their expenditures to certain NNSA cost elements because of how they track costs in their systems. Specifically, representatives from five of the M&O contractors said they cannot accurately crosswalk their indirect expenditure types to NNSA’s indirect cost elements because their systems do not capture the data in the way that NNSA wants these data reported. M&O contractors have discretion to classify which costs are considered indirect, and costs for similar activities can be allocated differently by each contractor. In fiscal year 2018, NNSA’s M&O contractors reported spending $3.5 billion on indirect activities. Generally, in cases in which the M&O contractors could not crosswalk their indirect costs to specific NNSA cost elements, representatives from one of the M&O contractors said they allocated their indirect costs to NNSA’s cost elements using percentages, while others said they reported data that did not adhere to the NNSA cost elements. Below are examples of situations in which M&O contractors were not able to accurately report expenditures into NNSA’s indirect cost elements: Representatives from one M&O contractor said they could not accurately report financial data for the general and administrative cost element and site support from other overhead cost elements because the site did not capture its data in that way. As a result, the M&O contractor allocated its indirect costs using formulas and composite rates, rather than reporting actual cost data to NNSA. Representatives from two M&O contractors said they could not accurately report financial data across the site support and infrastructure support cost elements because the structure of their indirect cost pool did not allow them to track those expenditures separately. As a result, representatives from one of the M&O contractors said they reported all of their infrastructure expenditures to the site support cost element. NNSA officials said they were aware of the M&O contractors’ issues with reporting their expenditure types using the NNSA cost elements. Although M&O contractors are required to provide financial data using NNSA’s cost elements, the program director for financial integration said he was aware that M&O contractors report some indirect costs for separate cost elements to a single cost element in CostEX, meaning that they do not accurately report some indirect costs based on NNSA’s definitions. Additionally, the financial integration team identified differences between indirect cost data collected from the M&O contractors for common financial reporting and data reported to another group in NNSA’s Office of Management and Budget. NNSA plans to conduct a review of the data reported through the two efforts to determine the cause of the differences. Officials from the Office of Safety, Infrastructure, and Operations stated that it is important that the common financial reporting effort is able to collect accurate information on M&O contractors’ costs related to infrastructure spending. NNSA is aware of the challenges its M&O contractors have with accurately reporting their expenditure types against the NNSA cost elements. However, NNSA cannot ensure that the agency collects accurate financial data because NNSA does not have a process to verify how the M&O contractors crosswalk their expenditure types to NNSA’s cost elements, consistent with the previously described information quality standard under the federal standards for internal control and NNSA’s financial integration policy. M&O contractors reporting data based on allocated—as opposed to actual—costs is not ideal because NNSA cannot ensure that each M&O contractor is consistently applying the allocation and because the data may not be standardized and comparable across the sites, which affects the quality of the data. By developing an internal process for NNSA to verify how the M&O contractors crosswalk their expenditure types, the agency could better ensure that the data collected through common financial reporting will produce accurate financial data across the nuclear security enterprise that satisfies the needs of Congress and other stakeholders. Further, this would help address long-term issues with NNSA’s ability to report the total costs of its programs. NNSA continues to make progress toward implementing agency-wide common financial reporting. However, NNSA faces challenges in fully implementing the effort. For example, NNSA has not consistently ensured that changes to the work breakdown structure are approved, documented, and communicated to the M&O contractors in a timely manner because NNSA has not established and implemented a change control process for the changes. Without establishing and fully implementing a work breakdown structure change control process, NNSA will not be able to verify that the changes to the work breakdown structure are approved by program office management, at a minimum; documented and tracked for accurate data analysis and comparison over time; and communicated to the M&O contractors on a timely basis. NNSA’s approach to implementing common financial reporting relies on M&O contractors to crosswalk their internal financial data into a common reporting framework using a work breakdown structure and common cost elements and definitions, with certain quality checks to help ensure the accuracy of the data. However, NNSA has limited assurance that the financial data that the M&O contractors provide for common financial reporting are accurate because the agency does not know the extent of the changes the M&O contractors make to the data so that the data reconcile to the agency’s accounting system or the potential effects of these changes. By determining the extent of these changes and whether these changes affect the accuracy of the data, NNSA could have greater assurance that the financial data collected through common financial reporting are accurate. Additionally, NNSA cannot ensure that M&O contractors accurately crosswalk their financial data to either the NNSA work breakdown structure or the common cost elements because NNSA has not established processes to verify the information. By developing internal processes that would allow NNSA to verify how the M&O contractors crosswalk their data to the work breakdown structure and common cost elements, NNSA could better ensure that the data collected through common financial reporting will produce accurate enterprise-wide financial data that is comparable across the M&O contractors and that satisfies the needs of Congress and other stakeholders. Further, this would help to address long-term issues with NNSA’s ability to report the total costs of its programs. We are making four recommendations to NNSA: The Program Director for Financial Integration, with input from NNSA’s Office of Management and Budget and respective program offices, should establish and implement a work breakdown structure change control process for common financial reporting that ensures changes are approved by program office management, at a minimum; documented; and communicated to M&O contractors on a timely basis. (Recommendation 1) The Program Director for Financial Integration should assess the extent to which M&O contractors make manual changes to their financial data to reconcile with STARS and determine whether it has an effect on the accuracy of the data collected for common financial reporting. (Recommendation 2) The Program Director for Financial Integration should develop and implement an internal process for NNSA to verify how the M&O contractors crosswalk financial data from their systems to the appropriate NNSA work breakdown structure to ensure the reported data are accurate and consistent. (Recommendation 3) The Program Director for Financial Integration should develop and implement an internal process for NNSA to verify that the M&O contractors are consistently applying common cost element definitions at their sites and across the nuclear security enterprise. (Recommendation 4) We provided a draft of this report to NNSA for comment. In its written comments, which are reproduced in appendix II, NNSA agreed with the report’s four recommendations and described actions it intends to take to address them. NNSA also provided technical comments that we incorporated into the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of NNSA, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix III. In our January 2019 report on the National Nuclear Security Administration’s (NNSA) efforts to implement common financial reporting, we made seven recommendations. Table 2 describes NNSA’s progress to implement these recommendations, as of December 2019. In addition to the individual named above, key contributors to this report included Hilary Benedict (Assistant Director), Amanda K. Mullan (Analyst in Charge), Colette Alexander, Antoinette Capaccio, Jennifer Echard, Cindy Gilbert, Michael LaForge, Jason Lee, Holly Sasso, and Sheryl Stein.", "summary": "NNSA has long faced challenges in determining and comparing the costs of its programs, which are principally performed by M&O contractors across eight sites. Congress needs this information to provide effective oversight and make budgetary decisions. The National Defense Authorization Act for Fiscal Year 2017 required NNSA to implement a common financial reporting system, to the extent practicable, across all sites by December 2020. NNSA's efforts began in 2016 and are ongoing. The Senate report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 includes a provision for GAO to periodically review NNSA's implementation of common financial reporting. This is GAO's second report on this issue. This report examines (1) the steps NNSA has taken to implement common financial reporting since GAO's January 2019 report, and (2) the extent to which NNSA's approach to data collection aligns with the purpose of common financial reporting, including collecting accurate and consistent data from its M&O contractors. GAO reviewed NNSA documents about implementing common financial reporting, including policy and briefing documents, and interviewed NNSA officials and M&O contractor representatives. The National Nuclear Security Administration (NNSA)—a separately organized agency within the Department of Energy (DOE)—is required to implement common financial reporting, to the extent practicable, across its sites to better understand the total costs of its programs. NNSA has taken additional steps to implement such reporting since January 2019 but faces challenges in fully implementing the effort (see table). For example, for fiscal years 2018 and 2019, NNSA used separate work breakdown structures—a method of dividing a project into successive levels of detail—to collect data for some offices. Without a common work breakdown structure, NNSA cannot ensure that it can collect reliable financial data across its sites. NNSA plans to assess the feasibility of implementing a common work breakdown structure, in response to GAO's January 2019 recommendation. In fiscal years 2018 and 2019, NNSA also faced challenges in collecting financial data from management and operating (M&O) contractors, including collecting complete data for all program offices. NNSA is working to resolve these issues. NNSA's approach to data collection provides limited assurance that the data collected for common financial reporting are accurate and consistent across the M&O contractors. At most sites, the M&O contractors track their financial data in a way that does not align with how NNSA requests the contractors report the data. M&O contractors use professional judgment to crosswalk, or map, the financial data from their business systems to the NNSA structures to report the data. NNSA's data quality checks on the M&O contractors' financial data focus on data formatting and ensuring the data match the agency's accounting system. NNSA does not have a process to verify whether the contractors accurately crosswalk their financial data. Under NNSA's financial integration policy, the program director for financial integration is to, among other things, execute a plan to improve cost analysis, comparability, and reporting consistency among programs and M&O contractors. By developing an internal process for NNSA to verify how the M&O contractors crosswalk their financial data to the work breakdown structures, NNSA will have better assurance that it is collecting accurate financial data that are comparable across the M&O contractors, that satisfy the needs of Congress and other stakeholders, and that address long-term issues with its ability to report the total costs of its programs. GAO is making four recommendations, including that NNSA implement an internal process to verify the M&O contractors' crosswalks of their financial data to NNSA's work breakdown structures for reporting information. NNSA agreed with the four recommendations.", "document_type": "gao"}
{"report": "Established by the Communications Act of 1934, FCC regulates interstate and international communications by radio, television, wire, satellite, and cable in all 50 states, the District of Columbia, and U.S. territories. FCC is responsible for, among other things, making available nationwide worldwide wire and radio communication service. More recently, it has been responsible for promoting competition and reducing regulation of the telecommunications industry in order to secure lower prices and higher quality services for consumers. FCC’s functions include: issuing licenses for broadcast television and radio; overseeing licensing, enforcement, and regulatory functions of carriers of cellular phones and other personal communication services; regulating the use of radio spectrum and conducting auctions of licenses for spectrum; investigating complaints and taking enforcement actions if it finds that there have been violations of the various communications laws and commission rules that are designed to protect consumers; addressing issues related to public safety, homeland security, emergency management, and preparedness; educating and informing consumers about communications goods and reviewing mergers of companies holding FCC-issued licenses. FCC relies extensively on computerized systems to support its mission- related operations, and on information security controls to protect the commission’s data. FCC’s Information Technology Center, within the Office of the Managing Director, uses IT to perform the commission’s business operations. Through its computer network and systems, the commission collects and maintains nonpublic information, including proprietary information of businesses regulated by the commission, as well as information available to the public through rulemaking proceedings. FCC’s Chairman, chief information officer (CIO), and chief information security officer (CISO) each have specific responsibilities for information security. Specifically, the FCC Chairman has responsibility for, among other things: 1. providing information security protections commensurate with the risk and magnitude of harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of the commission’s information systems and information; 2. ensuring that senior officials provide security for the information and systems that support the operations and assets under their control; and 3. delegating to the CIO the authority to ensure compliance with the information security requirements imposed on the commission. In addition, the CIO is responsible for establishing and enforcing policies and procedures for protecting information resources. Toward this end, the CIO has designated and assigned responsibilities to the CISO for managing the cybersecurity program. The CISO, among other things, is responsible for providing information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the commission. The Federal Information Security Modernization Act of 2014 (FISMA) provides a comprehensive framework for information security controls over information resources that support federal operations and assets. The law also requires each agency to develop, document, and implement an agency-wide information security program to provide risk-based protections for the information and information systems that support the operations and assets of the agency. Such a program should include assessing risks; developing and implementing policies and procedures to cost-effectively reduce risks; developing and implementing plans for providing adequate information security for networks, facilities, and systems; and providing security awareness and specialized training. Further, the program should include testing and evaluating the effectiveness of controls; planning, implementing, evaluating, and documenting remedial actions to address information security deficiencies; developing and implementing procedures for detecting, reporting, and responding to security incidents; and ensuring continuity of operations. FISMA requires agencies to comply with the federal information processing standards (FIPS) publications issued by NIST and Office of Management and Budget (OMB) Circular A-130 requires agencies to comply with the information security guidelines prescribed in NIST special publications. Consequently, NIST FIPS publications and special publications contain many of the cybersecurity-related requirements for federal agencies. For example, NIST FIPS Publication 199 requires agencies to categorize their information and information systems according to the potential harm and impact to agency assets, operations, or individuals should the confidentiality, integrity, or availability of its information and information systems be compromised through unauthorized access, use, disclosure, disruption, modification, or destruction. In addition, NIST FIPS Publication 200 requires agencies to meet minimum security requirements by selecting the appropriate security controls, as described in NIST Special Publication 800-53. This special publication provides a catalog of 18 security control areas for federal information systems and a process for selecting controls to protect organizational operations and assets. The publication provides baseline security controls for low-, moderate-, and high-impact systems, and agencies have the ability to tailor or supplement their security requirements and policies based on agency mission, business requirements, and operating environment. Further, in May 2017, the President issued an executive order requiring agencies to immediately begin using NIST’s cybersecurity framework for managing their cybersecurity risks. The framework, which provides guidance for cybersecurity activities, is based on five core security functions: Identify: Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. Protect: Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect: Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond: Develop and implement the appropriate activities to take action regarding a detected cybersecurity incident. Recover: Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. According to NIST, these five functions occur concurrently and continuously, and provide a strategic view of the life cycle of an organization’s management of cybersecurity risk. Within the five functions are 23 categories and 108 subcategories that include information security program-related controls and technical controls for achieving the intent of each function. Appendix II provides a description of the framework categories and subcategories of controls. On May 7 and 8, 2017, FCC experienced a dramatic surge in the number of comments sent to the commission through its ECFS during a public comment period. This surge led to a disruption of services, which prevented the system from being able to accept additional comments for a period of time. The FCC Office of Inspector General determined that the system service disruption was likely due to a combination of the sudden increase in traffic from commenters all trying to access the system’s website over a short period of time and system design deficiencies that negatively impacted the capacity and performance of the system to collect and process the increase in traffic. Figure 1 presents a timeline of the May 2017 ECFS service disruption and subsequent related events. Additional details on the timeline are provided in appendix III. In response to the ECFS service disruption that occurred on May 7 and 8, 2017, FCC Information Technology Center officials took four key actions to reduce the risk of future service disruptions to the system. 1. Conducted Internal Assessments In response to the service disruption, in early May 2017, the FCC CIO initially stated that the cause was a cyberattack on the ECFS. However, upon further assessment, FCC Information Technology Center officials later determined that the disruption was caused by a surge in comment traffic to the system and existing system performance and capacity deficiencies. In response to multiple congressional inquiries, in late July 2017, FCC Information Technology Center officials assessed the extent to which malicious intent was involved in causing the disruption based on whether: (a) internet protocol (IP) addresses from foreign sources were present on the commission’s network at the time of the May 2017 event; (b) comment submissions were denied (i.e., dropped) from the commission’s network, (c) observable botnet traffic was present; and (d) duplicate comment submissions were accepted into ECFS. The assessment concluded that the commission did not have sufficient information and tools to determine whether there was any malicious intent. 2. Deployed Additional Virtual Hardware Following the disruption, in early May 2017, FCC deployed additional virtual hardware to address system performance issues and support system stabilization efforts of ECFS during the period in which service was disrupted. In early July 2017, the commission installed security sensors and forwarding agents on the ECFS virtual servers. These devices are intended to provide additional layers of security capability for the system. In mid-July 2017, FCC automated the process for deploying virtual hardware resources to support system availability subsequent to the May 2017 service disruption. 3. Optimized and Acquired System Software From late May 2017 to early June 2017, FCC acquired a diagnostic tool to measure system performance. According to the commission, this tool is used to determine the maximum amount of simultaneous user capacity within ECFS during periods of high web traffic. In early June 2017, the commission optimized the search functionality within the ECFS database to reduce the system response time. In mid-June 2017, FCC removed redundant internal processes for ECFS web requests to increase the responsiveness of the system. During late July 2017, the commission acquired a security information and event management tool to collect and analyze security-related events that may indicate a cybersecurity incident. In late August 2017, FCC established rate control limits within ECFS to safeguard against potential distributed denial-of-service attacks aiming to flood one target with network traffic. 4. Updated Incident Response Policy and Procedures In January 2018 and March 2018, during its annual policy review, FCC Information Technology Center officials updated the commission’s incident response and reporting policy and procedures to incorporate lessons learned from the May 2017 ECFS service disruption and clarify their processes. For example, FCC Information Technology Center officials revised the commission’s incident response procedures to document internal escalation time frames for notifying management of potential security incidents and reporting the incidents to the United States Computer Emergency Readiness Team within 1 hour of identification of an incident. Figure 2 shows a chronological sequence of the hardware and software improvements that FCC officials implemented after the May 2017 event. FCC provided evidence that indicated its actions to add additional hardware and software resources increased ECFS’s capacity and performance and demonstrated that the system was stable from June 2017 through December 2017. For example, FCC acquired a performance diagnostic tool in late May 2017, which was designed to determine the maximum number of potential simultaneous public users within ECFS during periods of high web traffic. Using the diagnostic tool, FCC Information Technology Center officials determined in June 2017, that the system became unstable when the number of simultaneous simulated public users reached 500. However, by December 2017, the system had demonstrated that it could accept a capacity of over 3,000 simultaneous public users without a service disruption. FCC data showed that the increased capacity and improved performance of the ECFS prevented further service disruptions during periods of sharp spikes in the volume of comments received. For example, on May 8, 2017, service was disrupted on the system when it received a peak of about 249,000 comments in 1 day, whereas on July 12, 2017, the system accepted and processed at least 1.4 million comments in 1 day without a reported service disruption. Similar spikes in traffic volumes that occurred through December 2017 also did not result in service disruptions. Figure 3 shows the daily comment submissions to ECFS from May 2017 through December 2017 and demonstrates FCC’s ability to accept a higher volume of comments without a service disruption. We reported in September 2019 that FCC had implemented numerous security controls for the three systems we reviewed, but it had not consistently implemented the NIST cybersecurity framework’s five core security functions to effectively protect the confidentiality, integrity, and availability of these systems and the information maintained on them. Deficiencies existed in the FCC information security program and technical controls for the five core functions that were intended to (1) identify risk, (2) protect systems from threats and vulnerabilities, (3) detect cybersecurity events, (4) respond to these events, and (5) recover system operations when disruptions occur. These deficiencies increased the risk that sensitive information could be disclosed or modified without authorization or be unavailable when needed. As shown in table 1, deficiencies existed in all five core security functions for the FCC systems we reviewed. Also shown are the numbers of recommendations we made to FCC to rectify the deficiencies. Activities associated with the identify core security function are intended to help an agency to develop an understanding of its resources and related cybersecurity risks to its organizational operations, systems, and data. Essential elements of a FISMA-mandated information security program include assessing risks, developing system security plans, and authorizing information systems to operate. NIST guidance states that agencies should assess risks and authorize systems on an ongoing basis. Additionally, FCC requires that security plans, risk assessments, and system authorizations be reviewed annually or whenever significant changes occur to the information system, computing environment, or business operations. Consistent with its guidance, FCC had developed system security plans for each of the three systems we reviewed and had updated the risk assessments for two of the systems in 2017 and 2018, respectively. However, as of March 2019, the commission had not reviewed or updated the risk assessment for the third system reviewed since May 2017—a lag of about 22 months. Commission officials stated that they had not reviewed or updated the system’s risk assessment because the commission had implemented a new risk assessment process and officials had not yet had time to review and update documentation for this system. In addition, FCC continued to operate two of the three selected systems on expired authorizations to operate. Although FCC granted a full authorization to operate to one system in May 2018, the commission allowed the authorizations for the other two systems we reviewed to expire. Both of these systems had received a conditional authorization to operate so that the systems could continue to operate while the commission mitigated known system vulnerabilities. However, in December 2018, the conditional authorizations for both systems expired because, according to FCC officials, the commission had not mitigated the vulnerabilities. Nevertheless, FCC continued to operate the systems. By not regularly updating the risk assessment of one system and continuing to operate another system without a current authorization to operate, FCC unnecessarily exposed the information on these systems to increased risks of unauthorized changes and access to information. Subsequent to our September 2019 report, FCC reviewed and updated the system’s risk assessment in accordance with its new risk assessment process. In addition, FCC granted a full authorization to operate to one of the systems in October 2019, but does not expect to grant a full authorization to operate for the other system until later in 2020. NIST SP 800-144, Guidelines on Security and Privacy in Public Cloud Computing, states that a service-level agreement should define the terms and conditions for access and use of the services offered by the cloud service provider. In addition, FedRAMP Control Specific Contract Clauses provides security control specifications that may need to be included in the task order for the service and specified in the service level agreement. These contract clauses include specifications related to data jurisdiction, audit records storage, time frames for reporting security incidents, and system boundary protection. FCC’s task order and service level agreement with its cloud service provider specified activities the provider was to perform, such as providing access and support for products and services, and completing performance deliverables to ensure service availability. However, FCC had not documented specific contract clauses associated with implementing security control requirements related to retaining audit records, meeting reporting incident time frames, and protecting system boundaries in accordance with FedRAMP. According to FCC’s associate chief information officer, the commission relied on FedRAMP’s oversight to ensure that its cloud provider implemented security controls that comply with federal data requirements. However, FedRAMP assesses and monitors only the security controls that the program and cloud service provider agree that the provider will implement. These agreed-upon controls may not include an agency’s specific security requirements. Thus, responsibility falls on FCC to ensure that its information security requirements are being implemented in cloud computing environments. Nevertheless, by not specifying its specific control requirements when procuring services from its cloud provider, FCC increased the risk that its data and sensitive regulatory information will not be adequately protected in the event that its cloud service provider experiences a security breach. Subsequent to our September 2019 report, FCC developed a plan of action and milestones (POA&M) for this deficiency and stated that it plans to rectify the deficiency by May 2020. Activities associated with the protect core security function are intended to help agencies develop and implement appropriate system safeguards. These activities include limiting access to computing resources to authorized users, processes and devices; encrypting data to protect its confidentiality and integrity; configuring devices securely; and updating software to protect systems from known vulnerabilities. FCC implemented activities that established multiple layers of technical controls, including access controls and firewalls, encryption of sensitive data, and system configuration management. However, we reported in September 2019 that implementation of these technical controls were not consistent. For example, 37 technical control deficiencies and an information security program-related deficiency diminished the effectiveness of the controls protecting the systems we reviewed. A brief summary of the results of our tests of FCC’s controls for protecting the three systems we reviewed follows. FCC policy states that, in accordance with NIST SP 800-53 guidelines, users should not share the same identifier and the commission should configure its information systems to require users to create complex passwords. FCC’s policy also stipulates that the commission employ the principle of “least privilege” and enforce approved authorizations for controlling the flow of information within the system and between interconnected systems. However, FCC did not consistently implement technical controls to effectively limit access to the systems we reviewed, as the following examples illustrate. Although FCC policy states that individual user accounts are not to be shared, the commission allowed multiple users to share the credentials of several privileged accounts. While FCC policy established minimum requirements for password complexity and account lock-out provisions, the commission did not routinely enforce these requirements. While FCC policy requires limiting access rights for users to only those they need to perform their work, the commission inappropriately granted excessive permissions to users to access server configuration files. Although FCC established a policy for monitoring and controlling access between systems, it did not securely configure network devices to effectively control access and communications between systems. Access control deficiencies existed primarily because FCC network administrators did not adequately monitor configuration settings and did not implement sufficient controls to enforce consistent authentication and authorization across all of the commission’s systems that we reviewed. However, until FCC fully implements those actions and remediates related technical deficiencies, the commission remains at increased risk that unauthorized individuals or attackers could obtain inappropriate access to its network devices, firewalls, and servers, and compromise its network. As of November 2019, FCC had acted to address several technical control deficiencies related to access control. NIST SP 800-53 recommends that organizations employ cryptographic mechanisms to prevent the unauthorized disclosure of information during transmission and establish a trusted communications path between users and security functions of information systems. NIST also requires that, when agencies use encryption, they use an encryption algorithm that complies with FIPS Publication 140-2. In addition, FCC’s System and Communication Protection Policy states that confidentially sensitive data must be encrypted before being transmitted using any nonprotected communication method and that all passwords must be encrypted. However, in seven instances, the commission did not consistently deploy strong encryption capabilities to protect sensitive data or establish a secure communications path between users and information systems. For example, FCC sometimes sent data in clear text over the network and did not enable FIPS 140-2 compliant encryption algorithms on certain devices. These deficiencies existed primarily because commission personnel did not adequately monitor configuration settings. By not consistently deploying strong encryption capabilities, FCC limits its ability to protect the confidentiality and integrity of its sensitive information. According to Information Technology Center officials, as of November 2019, the commission was still working toward full compliance with federal encryption standards. NIST SP 800-53 states that agencies should configure security settings to the most restrictive mode consistent with operational requirements and disable services within the information system deemed to be unnecessary or non-secure. FCC policy on risk assessment states that systems and devices should be scanned periodically and software patches should be applied for all known critical security vulnerabilities. In addition, OMB Circular A-130 states that agencies are to implement current updates and patches for all software components of information systems, and prohibit the use of unsupported systems and system components. Although FCC established policies for applying software patches on a prescribed basis, it did not update software in a consistent or timely manner to effectively protect the three systems we reviewed. For example, FCC did not apply software patches in a timely manner to resolve known security vulnerabilities, and used unsupported or out-of- date system software on multiple network devices, firewalls, and servers. Patching control deficiencies existed because FCC did not adequately monitor configuration settings of devices on its network. According to Information Technology Center officials, as of February 2019, the commission was in the process of (1) migrating and modernizing its systems’ portfolio and (2) implementing an application monitoring and testing tool to reduce patching times. However, until FCC applies software patches in a timely manner, and replaces unsupported software and devices, it will remain at increased risk that individuals could exploit known vulnerabilities to gain unauthorized access to its computing resources. As of November 2019, FCC had taken corrective actions to address certain technical control deficiencies related to configuring servers securely and updating software in a timely manner. Developing, documenting, and implementing information security policies and procedures are essential elements of an agency’s FISMA-mandated information security program. FCC’s Policy for Information Security and Privacy states that FCC shall implement procedures and controls at all levels to protect the confidentiality and integrity of information stored and processed on the commission’s systems, and to ensure that the systems and information are available to authorized persons when required. Although FCC developed and documented commission-wide policies addressing the 18 control areas—such as access control, configuration management, security awareness training, and contingency planning— identified in NIST SP 800-53, the commission had not fully developed or documented the detailed operating procedures that are needed to effectively implement its security policies. For example, FCC had not documented detailed procedures for implementing the following NIST- specified control areas: (1) access control, (2) configuration management, (3) identification and authentication, (4) system maintenance, (5) media protection, (6) physical and environmental protection, (7) information security program management, (8) risk assessment, (9) system and services acquisition, (10) system and communication protection, and (11) system and information integrity. The lack of detailed operating procedures likely was an underlying cause for many of the technical control deficiencies we identified. According to the FCC CISO, as of February 2019, the commission was in the process of reviewing and revising its information security policies and had issued POA&Ms to develop and document the missing procedures. Nevertheless, until FCC fully develops and documents detailed operating procedures for implementing its security policies, the commission faces increased risks that it will not effectively protect its information systems and information from cyber threats. The detect core security function is intended to allow for the timely discovery of cybersecurity events and deficiencies. Controls associated with this function include logging and monitoring system activities, and assessing security controls in place. NIST SP 800-53 states that agencies should enable system logging features and retain sufficient audit logs to support the investigations of security incidents and monitoring of select activities for significant security-related events. Additionally, NIST SP 800-53 and industry leading practices state that organizations should increase their situational awareness through enhanced monitoring capabilities to analyze network traffic data over an extended period of time at external boundaries and inside their internal network to identify anomalous, inappropriate, or unusual malicious activities. Lastly, FISMA requires each agency to periodically test and evaluate the effectiveness of its information security controls in place applicable to policies, procedures, and practices. In September 2019, we reported that FCC had implemented security monitoring controls, such as performing regular vulnerability scanning and deploying a system information and event management tool, to detect the presence of potential malicious threats. However, six technical control deficiencies in these capabilities diminished the effectiveness of the controls to detect cybersecurity events in the systems we reviewed. For example, FCC did not fully capture system log data on certain devices and had limited network monitoring visibility into portions of its data center environment. According to Information Technology Center officials, FCC had deficiencies in logging, retention, and monitoring because the commission had not fully configured its security information and event monitoring tool to capture and monitor sufficient system log and network traffic data to adequately detect cybersecurity events. As a result, FCC may not be able to detect or investigate anomalous activities inside its network. In addition, although the commission established a process for assessing the effectiveness of the security controls for its systems, its control tests and evaluations were not sufficiently robust. For example, the commission’s evaluations did not identify many of the security control deficiencies we identified. Consequently, FCC had limited assurance that the security controls were in place and operating as intended. As of November 2019, FCC had acted to address several technical control deficiencies, and associated recommendations, such as capturing network traffic data and providing for real-time network monitoring; however, other technical control deficiencies remain. The respond core security function is intended to support the ability to contain the impact of a potential cybersecurity event. Controls associated with this function include implementing an incident response capability and remediating newly identified deficiencies. We reported in September 2019 that, as part of its information security program, FCC had implemented controls for incident response by developing, documenting, and annually updating its incident handling policy and procedures, along with its guidelines for remediating deficiencies. However, two information security program-related deficiencies and a technical control deficiency diminished the effectiveness of the controls to respond to cybersecurity events for the systems we reviewed. For example, the commission did not adequately address security incidents and mitigate known deficiencies in a timely manner. NIST SP 800-53 and SP 800-61 state that agencies should develop, document, and implement incident response policy and procedures, and keep them updated according to agency requirements. FCC incident response policy also states that all employees are required to report suspected security incidents to the FCC Network Security Operations Center (NSOC) group within 1 hour of discovery or detection, and all other incidents within 24 hours of discovery. Further, FCC’s incident response procedures require internal escalation and external notification to the United States Computer Emergency Readiness Team (US-CERT) within 1 hour. FCC had developed, documented, and updated its incident response policy and procedures on an annual basis to address security incidents. The commission also established a NSOC group as the single point of contact for potential security incidents. However, FCC did not report internally to the NSOC group or externally to US-CERT in a timely manner for three of 10 security incidents we reviewed. Specifically, A FCC employee took 2 days to report the existence of an information spillage incident to the NSOC instead of the required 1-hour reporting time frame. The NSOC group took approximately 4 hours to report a December 2017 distributed denial-of-service attack incident and a February 2018 malicious attack incident to the US-CERT, instead of the 1 hour required for each. According to the FCC CISO, the commission plans to review its incident response policy and procedures, as well as re-train its staff, to ensure that staff consistently follow the commission’s policy and US-CERT incident notification guidelines. Subsequent to the issuance of our September 2019 report, FCC indicated that it plans to address these matters by October 2020. Until it does so, the commission may impede its ability to receive timely assistance from appropriate federal agencies and mitigate any harm. NIST 800-53 states that agencies are to develop a POA&M for an information system to document the agencies’ planned remedial actions to correct identified deficiencies. FCC’s Plan of Action and Milestone Guide also states that the maximum completion time frames for implementing POA&M items related to critical and high severity level deficiencies are 30 and 60 days, respectively. Although FCC developed a remedial action process and maintained a management system to document and track the status of POA&M items, it did not complete remedial actions in a timely manner for the three systems we reviewed. Specifically, FCC did not remedy critical and high severity level deficiencies within the required time frames as stated in its policy. For example, FCC took an average of approximately 3 months to implement four critical severity level POA&M items for one system. FCC took an average of more than 1 year to remediate three critical and nine high severity level POA&M items for another system. Additionally, as of October 2018, this system had seven open critical and four open high severity level POA&M items that exceeded the remediation threshold on average by 1 year, 4 months, and 5 months, respectively. FCC took an average of more than 3 years to implement two critical and seven high severity level POA&M items for the third system. FCC officials attributed these delays to operational priorities and resource constraints, such as financial, personnel, and technological factors. However, such longstanding delays in remediating weaknesses pose a significant threat to the overall security posture of the commission, since the delays could allow intruders to exploit critical and high severity level deficiencies to gain access to FCC’s information resources. As of November 2019, FCC stated that it planned to address security program deficiencies related to remediating weaknesses in a timely manner by October 2020. The recover core security function is intended to support timely recovery of system operations to reduce the impact from a cybersecurity event. Controls associated with this function include developing and testing contingency plans to ensure that, when unexpected events occur, critical operations can continue without interruption or can be promptly resumed, and that information resources are protected. In September 2019, we reported that, as part of its information security program, FCC had developed contingency plans for selected systems and established priorities for application disaster recovery. However, two information security program-related deficiencies diminished the effectiveness of the controls to recover the systems we reviewed. Specifically, the commission did not document detailed procedures for restoring two of the three systems conduct an annual test of its disaster recovery plan for the three selected systems in fiscal year 2018. NIST SP 800-34 Contingency Planning Guide for Federal Information Systems states that an information system contingency plan should provide detailed procedures to restore the information system or components to a known state. In addition, FCC’s Policy for Contingency Planning states that system contingency plans should reflect the restoration activities required for information systems to recover after an incident. FCC developed and documented a contingency plan for one system that specified detailed procedures for restoring system operations, data, and supporting applications. However, FCC did not include detailed procedures for restoring the other two systems we reviewed in their respective contingency plans—both of which are major application systems. For example, the contingency plans for these two systems did not specify procedures for restoration activities such as restoring critical operating system, application software, and system data to a known state. According to Information Technology Center officials, they did not consider the two systems as supporting mission essential functions, which would necessitate the inclusion of the applications in the detailed restoration procedures. However, both of the systems are major application systems and support mission essential functions at FCC. Subsequent to our September 2019 report, FCC documented detailed restoration procedures in the two other systems’ contingency plans that included activities associated with restoring critical operating system, application software, and system data to a known state. By doing so, FCC increased the likelihood that it will be able to restore operations to its mission essential functions in the event of a disaster. NIST SP 800-84 states that a disaster recovery test should assess the ability of an agency to restore IT processing capabilities in the event of a disruption. Moreover, FCC’s policy for contingency planning states that all information system and facility disaster recovery plans should be tested annually to determine the effectiveness of the plan and the organizational readiness to execute the plan. In September 2019, we reported that FCC did not conduct test exercises of the disaster recovery plans for the three systems we reviewed during fiscal year 2018, nor did it test system backup, recovery, restoration, and reconstitution procedures for these systems. According to FCC officials, the test exercise did not take place in fiscal year 2018 because other business operation activities took precedence over the exercise since the test exercise requires all mission-essential function applications to be unplugged. As a result, FCC had limited assurance that it would be able to recover from unexpected disruptions in a timely and efficient manner. While it did not complete the exercise in fiscal year 2018, FCC did subsequently conduct a disaster recovery exercise at the beginning of fiscal year 2019. By doing so, FCC increased its assurance that it would be able to recover use of its systems from unexpected disruptions in a timely and efficient manner. In our September 2019 report, we made 136 recommendations to FCC to bolster its agency-wide information security program and strengthen its technical security controls. Specifically, we recommended that FCC take nine actions to improve its information security program by, among other things, authorizing systems to operate, documenting operating procedures, resolving known vulnerabilities and reporting security incidents in a timely manner, and testing disaster recovery plans. We also recommended that FCC take 127 actions to address technical control deficiencies by implementing stronger access controls, encrypting sensitive data, configuring network devices securely, strengthening firewall rules, implementing audit and monitoring controls more effectively, among other actions. Since the issuance of our September 2019 report, FCC has made significant progress in implementing the recommendations we made to improve its information security program and resolve the technical control deficiencies in the information systems we reviewed. Specifically, as of November 2019, FCC had implemented 85 (63 percent) of the 136 recommendations we made in the September 2019 report and had effectively resolved the underlying deficiencies associated with the recommendations. The commission also had partially, but not fully, implemented 10 recommendations. In these instances, FCC provided evidence that it had resolved a portion of the underlying control deficiency, but had not completed all of the actions necessary to fully resolve the underlying control deficiencies. FCC did not provide any evidence that it had begun implementing the remaining 41 (30 percent) recommendations. The status of our recommendations to FCC is illustrated in figure 4. Table 2 provides additional details on the status of FCC’s actions to implement our recommendations to improve its information security program and the technical controls for the systems we reviewed. By implementing 85 recommendations, FCC (as of November 2019) had reduced risks associated with certain key activities. Specifically, FCC’s actions to implement four information security program-related recommendations included conducting a disaster recovery test exercise, documenting detailed system restoration procedures, and updating risk assessments to reflect the commission’s current computing environment. Regarding the technical controls, the commission had implemented 81 of our recommendations to rectify technical control-related deficiencies. For example, FCC strengthened firewall rules and access controls on its information system servers and internal networks—that we highlighted in our September 2019 report as being particularly vulnerable and requiring the commission to take immediate corrective actions. FCC also had developed a POA&M for each of the identified information security program-related and technical control deficiencies that remained open as of November 2019. The POA&M items contained required elements, such as severity levels (i.e., high, medium, and low) for identified weaknesses; identified estimated costs; designated points of contact; and established time frames for resolving those weaknesses and fully implementing the related recommendations. The commission’s plans called for it to implement the majority of the remaining information security program and technical control-related recommendations by May 1, 2020, and all recommendations by April 30, 2021, as shown in figure 5. Fully implementing the remaining recommendations is essential to ensuring that the commission’s systems and sensitive information are adequately protected from cyber threats. Key actions that remain include: documenting operational procedures, applying security patches and software updates, and enhancing network monitoring capabilities. Until FCC fully implements all of our recommendations and resolves the associated deficiencies, its information systems and information will remain at increased risk of misuse, improper disclosure or modification, and loss. We received written comments on a draft of this report from FCC. In its comments, which are reprinted in appendix IV, the commission expressed its commitment to protecting the confidentiality, integrity, and availability of its information systems. FCC noted our evaluation of its efforts to implement 85 of the 136 recommendations made in our September 2019 report and stated that it had also addressed nine additional recommendations. The commission further stated that it plans to address the remaining recommendations over the next 14 months with full mitigation anticipated by April 2021. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees. We are sending copies of this report to the appropriate congressional committees, the Federal Communications Commission, the commission’s Office of the Inspector General, and interested congressional parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, our primary point of contact is Vijay A. D’Souza at (202) 512-6240 or dsouzav@gao.gov. You may also contact Seto J. Bagdoyan at (202) 512-4749 or bagdoyans@gao.gov. GAO staff who made key contributions to this report are listed in appendix V. Our objectives were to determine 1) the actions FCC took to respond to the May 2017 event that affected the Electronic Comment Filing System (ECFS), and 2) the extent to which FCC implemented security controls to effectively protect the confidentiality, integrity, and availability of selected systems. In September 2019, we issued a report which detailed the findings from our work in response to these two objectives. In the report, we made 127 recommendations to FCC to resolve the technical security control deficiencies in the information systems we reviewed and nine additional recommendations to improve its information security program. We designated that report as “limited official use only” (LOUO) and did not release it to the general public because of the sensitive information it contained. This report publishes the findings discussed in our September 2019 report, but we have removed all references to the sensitive information. Specifically, we deleted the names of the information system software, network devices, and resource tools that we examined, disassociated identified control deficiencies from named systems, deleted certain details about information security controls and control deficiencies, and omitted an appendix that was contained in the LOUO report. The appendix contained sensitive details about the technical security control deficiencies in the FCC’s information systems and computer networks that we reviewed, and the 127 recommendations we made to mitigate those deficiencies. We also provided a draft of this report to FCC officials to review and comment on the sensitivity of the information contained herein and to affirm that the report can be made available to the public without jeopardizing the security of the commission’s information systems and networks. In addition, this report addresses a third objective that was not included in the September 2019 report. Specifically, this objective was to determine the extent to which FCC had taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement that we identified in the earlier report. To address the first objective, we reviewed FCC’s security and incident response policies and procedures, examined related reports prepared by the commission and its Office of Inspector General, reviewed an internal assessment of the May 2017 event that was performed by the FCC Information Technology Center, and reviewed artifacts associated with system enhancement and performance such as change requests and email. We also extracted comment submission data derived from the data.gov application programming interface between May 1, 2017 and December 31, 2017 to identify the peak periods of increased comment submissions during and after the May 2017 event. In addition, we examined the aforementioned documents to assess whether the updated incident response policy and procedures, along with system enhancement and performance artifacts, were directly related to changes made subsequent to the May 2017 event. Lastly, we interviewed FCC Information Technology Center officials, including system and security staff, and Office of Inspector General officials to identify FCC’s actions to respond to the May 2017 event. To address the second objective, we reviewed FCC’s overall network environment, identified interconnectivity and control points, and examined controls for the commission’s networks and facilities. We performed this work at FCC facilities located in West Virginia, Pennsylvania, and Washington, D.C. As noted in our September 2019 report, we determined the extent to which FCC had implemented security controls to effectively protect the confidentiality, integrity, and availability of selected systems. To do so, we selected three of the commission’s information systems for review. We selected these systems because they (1) are essential to FCC’s mission and (2) were assigned a Federal Information Processing Standards Publication 199 rating of moderate or high impact. The results of our review of these systems is not generalizable to the commission’s other systems. To evaluate FCC’s controls for its information systems, we used GAO’s Federal Information System Controls Audit Manual, which contains guidance for reviewing information system controls that affect the confidentiality, integrity, and availability of computerized information. We based our assessment of controls on requirements of the Federal Information Security Modernization Act of 2014 (FISMA), which establishes key elements for an effective agency-wide information security program; National Institute of Standards and Technology (NIST) guidelines and standards; FCC policies and procedures; and standards and guidelines from relevant security organizations, such as the National Security Agency, and the Center for Internet Security. For reporting purposes, we categorized the security controls that we assessed into the five core security functions described in the NIST cybersecurity framework. The five core security functions are: Identify: Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Protect: Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. Detect: Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond: Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Recover: Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. These core security functions are described in more detail in appendix II. For each of the five core security functions, we examined selected FCC security controls and related documentation: For the identify core security function, we examined FCC’s reporting for its hardware and software assets; analyzed risk assessments for the three selected systems to determine whether threats and vulnerabilities were being identified; analyzed FCC policies and procedures to determine their effectiveness in providing guidance to personnel responsible for securing information and information systems; and analyzed security plans for the three selected systems to determine if those plans had been documented and updated according to federal guidance. For the protect core security function, we examined access controls for the three systems. These controls included the password complexity and settings to determine if password management was being enforced; administrative users’ system access permissions to determine whether their authorizations exceeded the access necessary to perform their assigned duties; and firewall configurations, among other things, to determine whether system boundaries had been adequately protected. We also examined configurations for providing secure data transmissions across the network to determine whether sensitive data were being encrypted. In addition, we examined configuration settings for routers, network management servers, switches, and firewalls to determine if settings adhered to configuration standards, and we inspected key servers and network devices to determine if critical patches had been installed and/or were up to date. For the detect core security function, we analyzed security control assessments, and centralized logging and network traffic monitoring capabilities for key assets connected to the network. For the respond core security function, we reviewed FCC’s implementation of incident response practices, including an examination of incident tickets for 10 incidents the commission considered most significant from January 1, 2017 to May 29, 2018; and examined the commission’s process for correcting identified deficiencies for the three selected systems. For the recover core security function, we examined contingency and disaster recovery plans for the three selected systems to determine whether those plans had been developed and tested. For the core security functions, as appropriate, we evaluated elements of FCC’s information security program. For example, we analyzed risk assessments, security plans, remedial action plans, and contingency plans for each of the three selected systems. We also evaluated FCC’s security policies and procedures. In assessing FCC’s controls associated with these core functions, we interviewed FCC’s Information Technology Center personnel, chief information officer, chief information security officer, general counsel, inspector general, and Public Safety and Homeland Security Bureau officials, as needed. To determine the reliability of FCC’s computer-processed data for incident response records, we evaluated the materiality of the data to our audit objective and assessed the data by various means, including reviewing related documents, interviewing knowledgeable FCC officials, and reviewing internal controls. Through a combination of these methods, we concluded that the data were sufficiently reliable for the purposes of our work. To accomplish our third objective—on FCC’s actions to address the previously identified security program and technical control deficiencies and related recommendations—we requested that the commission provide a status report of its actions to implement each of the recommendations. For each recommendation that FCC indicated it had implemented as of November 2019, we examined supporting documents, observed or tested the associated security control or procedure, and/or interviewed the responsible agency officials to assess the effectiveness of the actions taken to implement the recommendation or otherwise resolve the underlying control deficiency. Based on this assessment and FCC status reports, we defined the status of each recommendation according to three categories: fully implemented—FCC had implemented the recommendation (i.e., the commission provided evidence showing that it had effectively resolved the underlying control deficiency); partially implemented—FCC had made progress toward, but had not completed implementing the recommendation (i.e., the commission provided evidence showing that it had effectively resolved a portion of the underlying control deficiency); and not started—FCC did not provide evidence that it had acted to implement the recommendation (i.e., the commission provided no evidence showing that it had effectively resolved the underlying control deficiency). We conducted the performance audit for the first two objectives from February 2018 through September 2019 in accordance with generally accepted government auditing standards. We conducted work supporting the third objective and, where applicable, included updates to our work in the second objective, from October 2019 through March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings. The National Institute of Standards and Technology’s cybersecurity framework consists of five core functions: identify, protect, detect, respond, and recover. Within the five functions are 23 categories and 108 subcategories of security-related controls (see table 3). Below is a timeline of the Federal Communications Commission’s (FCC) May 2017 Electronic Comment Filing System (ECFS) event and subsequent related events: On April 27, 2017, FCC issued the Restoring Internet Freedom Notice of Proposed Rulemaking in the Federal Register. The notice directed interested parties to submit comments via FCC’s ECFS. On the evening of May 7, 2017, a late night talk show aired a segment on the Restoring Internet Freedom notice and encouraged viewers to submit comments via ECFS. On the evening of May 7, 2017, according to a report by the FCC Office of Inspector General (IG), ECFS experienced a significant increase in the level of comment traffic attempting to access the system, resulting in the disruption of system availability. A contractor providing web performance and cloud security solutions to FCC identified a 3,116 percent increase in traffic to ECFS between May 7 and May 8, 2017. In the early morning of May 8, 2017, ECFS became unavailable to commenters. FCC’s vendor sent automated alerts indicating a spike in network traffic, in addition to preliminary network statistical data, to FCC. During the mid-morning of May 8, 2017, FCC’s Information Technology Center responded to the alerts from the vendor and initiated stabilization efforts to ECFS. During the afternoon of May 8, 2017, FCC issued a press release in which FCC’s chief information officer (CIO) at that time provided a statement about the cause of delays experienced by commenters trying to file comments on the ECFS. The CIO’s statement said that FCC was subjected to multiple distributed denial-of-service attacks. He further stated that, “these were deliberate attempts by external actors to bombard the FCC’s comment system with a high amount of traffic.” During May 9-10, 2017, FCC restored ECFS but still experienced response-time problems relating to system performance. On May 10, 2017, FCC’s Information Technology Center responded to inquiries from the Federal Bureau of Investigations and FCC OIG via email and phone. On June 21, 2017, the FCC OIG opened a full investigation into the event because of, according to the OIG, the importance of FCC’s cybersecurity posture and the possibility that cybercrimes had been committed that had the potential of being ongoing threats to the integrity of FCC’s computer systems. On January 4, 2018, FCC OIG referred the investigation to the Justice Department. On August 7, 2018, the FCC OIG published an investigative report on the ECFS event. According to the OIG report, the allegations of multiple distributed denial-of-service attacks alleged by the FCC CIO at that time were not substantiated. The FCC OIG concluded that the spikes in web traffic to ECFS had coincided exactly with the timing of the late night television show where the host discussed the FCC’s Restoring Internet Freedom proceeding and encouraged viewers to visit the commission’s website and file comments. The FCC OIG’s report also indicated that the commission did not define the event (i.e., any observable occurrence in a network or system) as a cybersecurity incident (i.e., an imminent threat or violation of computer security policies, or security practices). Therefore, according to the OIG report, FCC did not take actions to: refer the matter to the United States Computer Emergency Readiness Team (US-CERT) in accordance with federal policy, implement internal incident handling procedures in accordance with its incident handling policy, or conduct a thorough analysis before or after the event to determine if it was an incident. On August 16, 2018, the FCC Chairman testified at a Senate Committee on Commerce, Science and Transportation oversight hearing on the conclusions of the FCC OIG investigative report on the ECFS event. In addition to the contacts named above, Gary Austin, David Bruno, Tammi Kalugdan, Duc Ngo, and Christopher Warweg (assistant directors); David Hong (analyst-in-charge); Breanne Cave; Chris Businsky, Jr.; Saar Dagani; Marshall Williams, Jr.; Corey Evans; Andrew Howard; Elizabeth Kowalewski; Priscilla Smith; Henry Sutanto; and April Yeaney made significant contributions to this report.", "summary": "FCC relies extensively on information systems to accomplish its mission of regulating interstate and international communications in the United States. FCC uses one such system, ECFS, to receive public comments about proposed changes in FCC regulations. In May 2017, a surge in comments caused a service disruption of ECFS during a public comment period. GAO was requested to review ECFS and the reported disruption. In September 2019, GAO issued a limited official use only report on the actions FCC took to respond to the May 2017 event, and the extent to which FCC had effectively implemented security controls to protect the confidentiality, integrity, and availability of selected systems. This current report is a public version of the September 2019 report with sensitive information removed. In addition, for this public report, GAO determined the extent to which FCC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement. In the prior report, GAO compared FCC's policies, procedures, and reports to federal cybersecurity laws and policies. GAO examined logical access controls and security management controls for three systems selected based on their significance to FCC. For this report, GAO examined supporting documents regarding FCC's actions on previously identified recommendations, observed controls in operation, and interviewed personnel at FCC. As GAO reported in September 2019, the Federal Communications Commission (FCC) bolstered the capacity and performance of the Electronic Comment Filing System (ECFS) to reduce the risk of future service disruptions. FCC also implemented numerous information security program and technical controls for three systems that were intended to safeguard the confidentiality, integrity, and availability of its information systems and information. systems from threats and vulnerabilities, detecting and responding to cyber security events, and recovering system operations. GAO made 136 recommendations to address these deficiencies (see table). As of November 2019, FCC had made significant progress in resolving many security deficiencies by fully implementing 85 (about 63 percent) of the 136 recommendations GAO made in September 2019. FCC had also partially implemented 10, but had not started to implement the remaining 41 recommendations (see figure). Additionally, FCC has created remedial action plans to implement the remaining recommendations by April 2021. Until FCC fully implements these recommendations and resolves the associated deficiencies, its information systems and information will remain at increased risk of misuse, improper disclosure or modification, and loss.", "document_type": "gao"}
{"report": "DOD’s policy is to ensure that eligible personnel and their families have access to affordable, quality housing facilities and services consistent with grade and dependent status, and that the housing generally reflects contemporary community living standards. From the inception of MHPI, the military departments were provided with various authorities to obtain private-sector financing and management to repair, re novate, construct, and operate military housing in the United States and its territories. Through these authorities, the military departments have entered into a series of agreements with private partners to provide housing to servicemembers and their families. The military departments have flexibility in how they structure their privatized housing projects, but typically the military departments lease land to private developers for 50-year terms and convey existing housing located on the leased land to the developer for the duration of the lease. The developer then becomes responsible for renovating and constructing new housing and for the daily management of these housing units. At the end of fiscal year 2017, 14 private partners were responsible for 79 privatized military family housing projects—34 for the Army, 32 for the Air Force, and 13 for the Navy and the Marine Corps—in the United States, each of which includes housing at one or more military installation. Each privatized housing project is a separate and distinct entity governed by a series of legal agreements that are specific to that project. However, there are some common elements in how projects invest and use funds. Every project takes in revenue, which consists mostly of rent payments. Projects then pay for operating expenses, including administrative costs, day-to-day maintenance, and utilities, among other things. After that, projects generally allocate funds for taxes and insurance, followed by debt payments. In the typical funding structure for a privatized housing project, once debt payments are made, funds are allocated to accounts that fund scheduled maintenance, such as repair and replacement of items like roofs, heating and cooling systems, and infrastructure. After that, funds are then allocated to a series of management incentive fees, such as the property management fee. Finally, the project divides these remaining funds according to a fixed percentage between accounts that (1) fund major renovations and rebuilds and (2) are provided to the developer. The Deputy Assistant Secretary of Defense for Facilities Management, under the authority, direction, and control of the Assistant Secretary of Defense for Sustainment, is responsible for all matters related to MHPI and is the program manager for all DOD housing, whether DOD-owned, DOD-leased, or privatized. In this capacity, the Deputy Assistant Secretary is to provide both guidance and general procedures related to military housing privatization, as well as required annual reports to Congress on the status of privatized military housing projects. However, it is the responsibility of the military departments to execute and manage privatized housing projects, including conducting financial management and monitoring their portfolio of projects. Each military department has issued guidance that outlines its responsibilities for privatized housing, such as which offices are responsible for overseeing privatized housing projects. In our draft report, currently with DOD for review and comment, we found that each military department conducts a range of oversight activities— some more extensive than others—for its privatized housing projects. For example, among other things, military departments review sample work order requests and inspect housing during the change–of-occupancy process. DOD guidance states that because privatization creates a long- term governmental interest in privatized housing, it is essential that projects be attentively monitored. Through its guidance, DOD delegates oversight responsibility of the individual privatized housing projects to each of the military departments. In our draft report, we noted that OSD and the military departments’ oversight efforts have been limited in the following key areas. Specifically, we found that (1) the scope of oversight of the physical condition of privatized housing has been limited; (2) performance metrics focused on quality of maintenance and resident satisfaction do not accurately reflect private partner performance related to the condition of privatized housing; (3) there is a lack of reliable or consistent data on the condition of privatized housing; and (4) past DOD reports to Congress on resident satisfaction are unreliable due to the inconsistent handling and calculation of the data and therefore may be misleading. DOD delegates oversight responsibilities of the individual privatized housing projects to each of the military departments, and each military department has subsequently issued guidance outlining oversight roles and responsibilities. Military department oversight activities generally fall into two categories—(1) daily oversight of management and operations and (2) periodic reviews of compliance with each project’s business agreements. Daily oversight of management and operations. Daily oversight of a project’s management and operations is to be conducted by each installation’s military housing office. Military housing officials told us that activities to monitor the physical condition of housing units generally include reviewing sample work order requests, following up with a sample of residents to check on their experience with recently completed work, and inspecting housing units during the change-of-occupancy process. As we noted in our draft report, the implementation and scope of these activities varies and can be limited. For example, during our site visits conducted from June through August 2019, we observed that the rate of inspections of homes following change-of-occupancy maintenance varied at the installations we visited. Military housing office officials at one Air Force installation told us that they inspect 100-percent of homes that have completed change-of-occupancy maintenance, while officials from a different Air Force installation stated they inspect 10 to 20 percent of these homes. Military department officials told us that in spring 2019, each department conducted a “100-percent” review of privatized housing by directing installation commanders to contact all residents of privatized housing and offering a visual inspection of their privatized housing unit. In addition, in March 2019 the Army issued an order directing military housing office officials to inspect 100-percent of homes where change-of-occupancy maintenance has been completed. Officials from Army installations we visited noted that this was an increase from previous practices, and for one installation was a change in practice from only conducting inspections during the move-out process, which occurs prior to change- of-occupancy maintenance. Similarly, in November 2019, Air Force officials told us they were moving to a 100 percent inspection policy. Periodic reviews of compliance with each project’s business agreements. Periodic reviews of compliance with a project’s business agreements are a joint effort between the local military housing office, the private partners, military department installation commands, and other echelons of command. These reviews can include neighborhood tours to view project amenities such as community centers, playgrounds, and pools, all of which are owned, maintained, and operated by the private partner companies, as well as exteriors of housing units. However, our draft report showed these annual reviews have been narrow in the scope of their assessment of the physical condition of the housing units, as interior walk-throughs were, at times, focused on just a few homes at each installation. According to military department officials, each department has completed initiatives and is undertaking initiatives to revise guidance and standardize daily oversight activities in an effort to provide consistent oversight across projects and installations, and to increase the focus on the physical condition of housing. In addition, the military departments have initiatives to increase staffing levels, improve training for military housing office officials, and ensure that military department housing officials have independent access to work order data, to strengthen their oversight activities. However, each military department is working to implement service-specific initiatives with only limited guidance from OSD on the level of oversight expected of the services as it relates to the condition of the housing. Specifically, OSD guidance is focused on the oversight of the implementation of projects, the construction of new housing units, and project financial monitoring. The guidance stipulates that after privatized housing projects are awarded, monitoring should include descriptions of deal structure and strategies for project monitoring. In contrast, OSD guidance for military-owned housing provides clearly defined objectives to the military departments for oversight, including the physical condition of the homes. Unless OSD updates its guidance on the oversight of privatized housing with objectives for overseeing the physical condition of housing units, it cannot be assured that the military departments’ oversight activities will be sustained over time or be sufficiently consistent across projects, raising the risk that private partners may not provide adequate quality housing. The military departments each use a range of project-specific performance metrics to monitor private partner performance, but as we note in our draft report, the metrics designed to focus on resident satisfaction and on the quality of the maintenance conducted on housing units do not provide meaningful information or reflect the actual condition of the housing units. Most, but not all, of the private partners are eligible to receive performance incentive fees based on generally meeting the performance metrics established in each individual project’s business agreement. Private partner performance is commonly measured through four key metrics—resident satisfaction, maintenance management, project safety, and financial management. To determine how well the private partners are performing under the metrics, military housing office officials told us they rely on a range of specific indicators established in the project business agreements. However, the indicators themselves do not provide meaningful information on the private partner’s performance in maintaining quality housing units. For example, we identified the following in our draft report: Maintenance management. One indicator of performance of maintenance management that is regularly included in project business agreements measures how often the property manager’s response time to work orders meets required timeframes established in the project’s business agreements. While this indicator measures the timeliness of the private partner’s response, it does not measure or take into account the quality of the work that was conducted or whether the resident’s issue was fully addressed. As such, a property manager may fully meet the metric for maintenance management even if a given repair has not been adequately completed. Residents in 13 of our 15 focus groups noted that they typically have had to submit multiple work order requests before an individual maintenance issue has been fully addressed. Some projects include indicators that aim to more directly measure quality, such as the number of work orders placed during the first 5 business days of residency, which may indicate the extent to which all of the change-of-occupancy maintenance was completed. Resident satisfaction. One example of an indicator of resident satisfaction is whether a project has met target occupancy rates established in the project’s business agreements. An OSD official and private partner representatives told us they use occupancy as an indicator of satisfaction based on the assumption that residents would move if they were dissatisfied with their home’s condition. However, based on our focus groups, this may not be a reliable assumption. Although most residents are not required to live in military housing, residents in each of our 15 focus groups indicated a variety of reasons for choosing to live in privatized housing, many of which did not have to do with their satisfaction with the quality or condition of their homes. For example, residents in our focus groups cited other factors influencing their decision to live in privatized housing, such as living in close proximity to military medical or educational services for children or other family members that are part of the military’s Exceptional Family Member Program, a lack of safe and affordable housing in the surrounding community, and access to quality schools. OSD and military department officials have recognized that the current indicators for measuring performance do not consistently focus on or prioritize the private partners’ performance with maintaining housing units and ensuring resident satisfaction. For example, Army officials told us they are no longer using occupancy rates as an indicator of resident satisfaction and have taken steps to standardize performance indicators across all Army projects, while still allowing for flexibility at the installation level to modify the weight of indicators to provide incentives reflective of the specific needs of the installation. Limitations to the current indicators may hinder the military departments’ ability to accurately determine private partner performance. However, OSD and military department officials told us they have not yet reevaluated the specific indicators used to determine whether a private partner has met a specific metric because doing so will require negotiation with each of the private partners for each project. Nonetheless, without reviewing the specific indicators used to award performance incentives, OSD and the military departments do not have assurance that the information the military departments are using to award these incentives reflects the actual condition of the housing. The housing projects’ business agreements typically include a requirement for the private partner to maintain a records management system to record, among other things, maintenance work requested and conducted on each housing unit. According to private partner officials, each company uses commercial property management software platforms for activities such as initiating maintenance work orders and dispatching maintenance technicians. Some private partner representatives stated that while data from the work order tracking systems are primarily used to prioritize and triage maintenance work, the data were never intended to monitor the overall condition of privatized housing units. While data from these work order tracking systems may be useful for point-in-time assessments of work order volume at a given installation, military department officials told us that efforts are underway to monitor work order data to increase the military departments’ oversight and the accountability of the private partners for providing quality housing. However, as we noted in our draft report, we found that these data are not captured reliably or consistently for use in the ongoing monitoring of the condition of privatized housing units. We received and reviewed data from each of the 14 private partners’ work order tracking systems covering each of the 79 privatized family housing projects. Based on our review of these data and discussions with private partner representatives for our draft report, we found two primary factors that would limit the reliability or consistency of using these data for ongoing monitoring of the condition of privatized housing units over time—(1) inconsistent use of terminology in work order records and (2) differing practices for opening and closing work orders: Inconsistent use of terminology. Based on our review of the data provided by the private partners and discussions with private partner officials, we noted cases where work orders were inconsistently entered into the work order tracking systems with respect to two primary factors—(1) how the request is described by the resident or interpreted by the official entering the data, which can differ for each work order, and (2) the existing range of pre-established service category options in the private partner’s work order tracking system, which differ among the partners. Differing practices for opening and closing work orders. At some installations we visited, private partners noted changes in practices for opening and closing work orders, limiting the usefulness of the data in monitoring the status of work orders over time and thus the condition of privatized housing. In addition, we identified other anomalies in work order data from each of the 14 partners. For example, we identified instances of, among other things, duplicate work orders, work orders with completion dates prior to the dates that a resident had submitted the work order, and work orders still listed as in-progress for more than 18 months. According to military department officials, efforts to review data from the private partners’ work order tracking systems have increased, and military department officials told us they have found similar limitations. However, neither OSD nor the military departments have identified minimum data requirements, established consistent terminology or practices for data collection, or developed processes for the military departments to validate the work order data collected by the private partners. Without direction from OSD to establish minimum data requirements and consistent terminology or practices for data collection, as well as a requirement for the military departments to validate data, the military departments’ ability to use data from the private partners’ work order tracking systems to monitor the condition of privatized homes over time will remain limited and may vary across projects. DOD is statutorily required to provide reports to Congress that include, among other things, information about military housing privatization projects’ financial health and performance and backlog, if any, of maintenance and repairs. These reports have included information on resident satisfaction with privatized housing based on the results of the annual military department satisfaction surveys. As we state in our draft report, we determined that information on resident satisfaction in these reports to Congress on privatized housing have been unreliable and are misleading due to (1) variances in the data the military departments collect and provide to OSD and (2) OSD’s calculation and presentation of the data. In May 2019, OSD issued its report for fiscal year 2017, which stated that overall resident satisfaction for calendar year 2017 was 87 percent. For OSD’s fiscal year 2017 report, the military departments provided data on resident satisfaction based on information from the annual resident satisfaction surveys. Specifically, OSD’s instructions to the military departments required the military departments to report satisfaction based on resident responses to the question that asks: “Would you recommend privatized housing,” with results indicating how many tenants responded “yes,” “no,” or “don’t know.” However, the military departments’ approaches for collecting data in their annual resident satisfaction surveys vary, which limits their ability to assess whether residents would recommend privatized housing. Instead of asking whether residents would recommend privatized housing, the military departments’ annual resident satisfaction survey asks residents the following: “How much do you agree or disagree with the following statement, ‘I would recommend this community to others.’” A resident’s satisfaction with his or her community and inclination to recommend it to others may not be reflective of satisfaction with either the privatized housing unit or privatized housing in general. Residents are then provided the following response categories on a scale of five to zero: (5) strongly agree, (4) agree, (3) neither agree nor disagree, (2) disagree, (1) strongly disagree, and (0) not applicable, no opinion, don’t know, or no answer. Through our analysis, we have identified variances in the methods that each of the military departments use to translate the residents’ responses into the “yes,” “no,” or “don’t know” categories. The variances in how the military departments calculate “yes,” “no,” or “don’t know” resulted in inconsistencies in how resident satisfaction is ultimately reported to Congress. For example, for the fiscal year 2017 report, Navy and Army officials told us they counted responses reported in category 3 (neither agree nor disagree) as “don’t know.” For the same time period, however, Air Force officials told us they counted responses in category 3 (neither agree nor disagree) as “yes.” If the Air Force had not counted category 3 as “yes,” reported resident satisfaction rates would have been lower. For example, for one Air Force installation, if officials had not counted responses in category 3 as “yes,” the resident satisfaction rate for newly constructed units would have been more than 20 percent lower than what was reported. In our draft report, we also identified instances of errors and inaccuracies in how OSD calculates these data and reports on resident satisfaction to Congress. Specifically, we found missing data points and incorrect formulas, among other errors, in OSD’s calculation of the data submitted by the military departments for OSD’s fiscal year 2017 report to Congress. For example: The formula used by OSD to calculate overall resident satisfaction for the fiscal year 2017 report did not include data for several projects, including for four Army projects that, as of September 30, 2017, accounted for over 18 percent of the Army’s total housing inventory. For one Air Force project, OSD reported identical resident satisfaction data for the fiscal year 2015, 2016, and 2017 reports, despite the fact that Air Force officials had noted in their submissions to OSD that the resident satisfaction data were from the annual resident satisfaction survey conducted in December 2013. In our draft report, we also found that presentation of data in OSD’s report to Congress may be misleading because OSD did not explain the methodology it used to calculate the overall resident satisfaction percentage or include caveats to explain limitations to the data presented. Specifically, OSD did not include information on overall response rates to the annual satisfaction survey for each military department, nor did it include response rates by project. Low response rates can create the potential for bias in survey results. For example, in the report for fiscal year 2017, OSD reported that 25 percent of residents living in renovated housing units for one privatized housing project were satisfied with their housing, but we found that only four residents had provided responses to this question. Thus, only one resident reported being satisfied. In addition, we found that OSD did not provide an explanation in the report for why five projects were listed as “not applicable.” According to OSD officials, this error was a quality control issue that they plan to address. According to OSD officials, there are no plans for quality control in development at this time. The National Defense Authorization Act for Fiscal Year 2020 (fiscal year 2020 NDAA) includes a provision requiring each military installation to use the same satisfaction survey for tenants of military housing— including privatized military housing—the results of which are not to be shared with private partners until reviewed by DOD. Until OSD makes changes to the data collection and calculation efforts that make up the department’s report to Congress and provides explanations of the data in the reports, OSD will not be able to provide Congress with an accurate picture of resident satisfaction with privatized housing. Military housing office officials, located at each installation, are available to provide resources to servicemembers experiencing challenges with their privatized housing, among other services. However, as we stated in our draft report, we found that these offices have not always clearly and systematically communicated this role to residents of privatized housing. The military housing office is to provide new residents with information on their local housing options, to include referral services for housing options. According to some military housing office officials, the military housing office then works with the private partner to identify the eligibility and type of home the servicemember qualifies for, if the resident chooses to live in privatized housing. According to some residents we spoke with in one of our focus groups, beyond this initial interaction, military housing office officials generally do not interact with residents on a regular basis. Additionally, residents who participated in our focus groups noted they were sometimes confused about the military housing offices’ roles and responsibilities with regard to the maintenance of their home; there was a perception that the military housing office was not working independently of the partner in the residents’ best interest; or they did not know the military housing office existed. The military department oversight agencies have also found that the military departments have not clearly and systematically communicated their roles to residents, and resident confusion and a lack of awareness regarding the role of the military housing offices is an issue. In April 2019 the Air Force Inspector General reported that less than half of the residents interviewed used their military housing office to resolve complaints, and at some installations officials visited, many residents did not know the military housing office had an oversight role. Similarly, in May 2019, the Army Inspector General reported to the Secretary of the Army that at 82 percent of Army installations with privatized housing, residents did not know how to escalate issues to either the private partner or the Army housing office. Additionally, the Army Inspector General reported that installation command teams and staff cited multiple circumstances where military housing offices and tenant advocacy roles and responsibilities were unclear. Further, some military housing office officials with whom we spoke during our site visits acknowledged the gap in resident awareness regarding the existence and purpose of the military housing office. Some military housing officials also noted that some residents are unaware of the difference between the military housing office and the private partner office, due in part to their physical co- location and unclear building signage. Each military department has issued information that establishes that its housing offices can assist in the resident dispute resolution process. Specifically, if servicemembers are experiencing a dispute with a private partner, military department guidance establishes varying roles for their respective military housing office officials. For example, Army policy states that each installation should have an official tasked with supporting servicemembers regarding resident issues that cannot be resolved by the private property manager. This individual is also responsible for resolving every resident complaint and the military housing office, if required, can request mediation by the garrison commander. OSD has recognized that the military departments’ communication with residents about their role as a resource for them has been limited. In February 2019, the Assistant Secretary of Defense for Sustainment testified before Congress that a way forward in addressing resident concerns would require focus in three key areas: communication, engagement, and responsiveness. Some military housing office officials told us they have taken steps to increase resident awareness, such as increasing the advertising of the military housing office’s role and contact information, conducting town hall meetings, and rebranding their military housing offices to differentiate them from the private partners. For example, a Marine Corps housing office official stated that the housing office established a document, which is distributed to residents by the private partner, informing residents of housing office contact information and the service’s three-step dispute resolution process, but efforts have not been standardized across all projects. Moving forward, having plans in place to clearly and systematically communicate the difference between the military housing office and the private partners—including the military departments’ roles, responsibilities, and military housing office locations and contact information—will better position the military departments to achieve the intended objectives of their initiatives aimed at improving residents’ experience. OSD, the military departments, and the private partners have identified and begun collaborating on a series of initiatives aimed at improving residents’ experiences with privatized housing, but as we state in our draft report currently with DOD for review and comment, these efforts face challenges. In addition, in the fiscal year 2020 NDAA, Congress established several requirements regarding privatized military housing reform. Several of the statutory requirements provide specific provisions that DOD will need to incorporate into its development and implementation of existing MHPI initiatives, as well as additional requirements aimed at improving oversight of privatized housing. In our draft report, we discuss several of these key initiatives, including the following. Development of a resident bill of rights. DOD has been working to develop a resident bill of rights intended to provide clarity to residents on their rights and responsibilities while living in privatized military housing. The fiscal year 2020 NDAA includes specific requirements to be included in the bill of rights, for example, ensuring residents have the right to have their basic allowance housing payments segregated and held in escrow, with approval of a designated commander, and not used by the property owner, property manager, or landlord pending completion of the dispute resolution process. In January 2020, DOD officials told us that they were in the process of updating their existing resident bill of rights to include these provisions. In February 2020, the Secretary of Defense signed the resident bill of rights, noting that the rights would be available to residents on May 1, 2020. Implementation of a common (enterprise) dispute adjudication process that will apply to all projects. The military departments and private partners have been working to develop a common dispute resolution process that would apply to all privatized housing projects. The fiscal year 2020 NDAA includes requirements reinforcing this initiative, specifically stating that the military department Secretary concerned shall implement a standardized formal dispute resolution process to ensure the prompt and fair resolution of disputes between landlords providing housing units and tenants residing in housing units concerning maintenance and repairs, damage claims, rental payments, move-out charges, and such other issues relating to housing units as the Secretary determines appropriate. Additionally, the statute requires that each military department Secretary designate the installation or regional commander in charge of oversight of housing as the deciding authority under the dispute resolution process. Reviewing MHPI resident satisfaction data collection process and the process by which DOD measures and reports on resident satisfaction data. According to OSD officials, the department is reviewing the process by which it measures and reports resident satisfaction data, and has plans to review the survey questions used to measure resident satisfaction. In line with these planned efforts, the fiscal year 2020 NDAA further requires that DOD’s reports to Congress include additional information, such as the results of residence surveys and other factors related to the condition of privatized housing. Standardizing Performance Incentive Fee Ranges. In October 2019, OSD issued new guidance standardizing the performance incentive fee ranges across the military departments. The fiscal year 2020 NDAA requires that DOD publically report information regarding the use of performance incentive fees. The statute also requires that DOD take into consideration any decision a commander renders in favor of the tenant in the formal dispute resolution process in determining whether to pay or withhold all or part of any incentive fees for which a private partner may otherwise be eligible under the contract. In addition to requirements impacting current DOD initiatives, the fiscal year 2020 NDAA included requirements for increased oversight of the physical condition of privatized housing. For example, the statute requires the Secretary of Defense to designate a Chief Housing Officer to oversee housing units, including the creation and standardization of policies and processes regarding housing units. The statute also requires the Secretary of Defense to establish a uniform code of basic standards for privatized military housing, as well as plans to conduct inspections and assessments of the condition of privatized homes. However, both DOD and private partner representatives have cited several challenges that could affect their ability to implement initiatives aimed at improving MHPI. Specifically: Timeliness of implementation due to the need to collaborate with and obtain input and agreement from the large number of stakeholders involved in privatized housing. According to DOD officials and private partner representatives, many of the initiatives designed to improve privatized housing not only require agreement between DOD and the private housing partners, but also discussion with and, in some cases, approval by the project bond holders. Because DOD does not have the ability to unilaterally make changes to existing business agreements, this need for stakeholder agreement limits DOD’s control over the implementation timeline of any initiative that requires changes to a project’s business agreement. The need for more military department staff with targeted expertise. The military departments reduced their involvement in daily privatized military housing operations as part of the overall privatization effort, to include reducing staffing levels at the installations. Military housing office officials at over half of the installations we visited stated that reduced staffing levels impacted their ability to carry out oversight duties, such as work order data analysis and housing inspections. Each of the military departments has plans to increase the military housing office staffing at each installation to allow for enhanced oversight. In particular, according to military department officials, these positions will focus on quality control and quality assurance of the maintenance of privatized homes. The potential for unintended negative financial impacts on the projects that could outweigh the intended benefits of the initiatives. OSD officials and private partner representatives have expressed concern that some initiatives could result in unintended financial consequences for the housing projects. For example, increased frequency of change-of-occupancy inspections could result in homes remaining vacant longer than planned and therefore not collecting rent. This could unintentionally impact a project’s cash flow. Some of the private partners noted that the financial impact of unfunded requirements to projects that are already experiencing financial distress could result in even fewer funds available to reinvest in improvements to the current and future physical condition of the homes. Without assessing risks to the financial viability of the MHPI projects associated with the implementation of these initiatives aimed at improving privatized housing, DOD’s efforts to improve the privatized housing program over the long term could be compromised. In summary, as we state in our draft report, we found that while DOD and the private partners have taken steps to address concerns raised about their ability to adequately maintain and oversee the condition of these housing units and provide quality housing for servicemembers, the extent to which the efforts will be sustained and result in improvements remains unclear. Our draft report includes several recommendations to OSD to strengthen oversight of MHPI, such as updating oversight guidance and assessing the risks to the financial viability of housing projects. Our draft report also includes recommendations to the military departments to enhance monitoring of privatized housing projects, such as improving processes used for data collection; reviewing private partner performance; collecting and reporting resident satisfaction data; and communicating with residents. Chairwoman Wasserman Schultz, Ranking Member Carter, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact Elizabeth A. Field, Director, Defense Capabilities and Management, at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony include Kristy Williams (Assistant Director), Tida Reveley (Analyst in Charge), Austin Barvin, Ronnie Bergman, William Carpluk, and Jordan Tibbetts. In addition, key support was provided by Vincent Buquicchio, Juliee Conde- Medina, Mae Jones, Kelly Rubin, Monica Savoy, John Van Schaik, Madeline Welter, and Kelsey Wilson. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Congress enacted the Military Housing Privatization Initiative in 1996 to improve the quality of housing for servicemembers. DOD is responsible for general oversight of privatized housing projects. Private-sector developers are responsible for the ownership, construction, renovation, maintenance, and repair of about 99 percent of military housing in the United States. Recent reports of hazards, such as mold and pest infestation, have raised questions about DOD's oversight. This statement summarizes GAO's draft report on privatized housing, which is currently at DOD for review and comment. Specifically, the statement discusses, among other objectives, OSD and the military departments' (1) oversight of privatized military housing and (2) development and implementation of initiatives to improve privatized housing. For its draft report, GAO reviewed policies and guidance; visited a non-generalizable sample of 10 installations representing each military department, among other factors; analyzed work order data; and interviewed DOD officials and private partner representatives. The Office of the Secretary of Defense (OSD) and the military departments conduct a range of oversight activities, but some of these activities have been more extensive than others. Specifically, GAO's draft report notes: The military departments conduct some oversight of the physical condition of housing, but some efforts have been limited in scope. Military departments have authority to conduct oversight of the condition of privatized housing; that oversight generally consists of reviewing a sample of work order requests, visual inspections of housing during change of occupancy, and other point in time assessments. However, GAO found that these efforts are limited in scope. For example, annual interior walk-throughs are limited to just a few homes at some installations, which may not comprehensively reflect the condition of the housing units at those installations. Military departments use performance metrics to monitor private partners, but metrics do not provide meaningful information on the condition of housing. OSD has recently issued guidance to ensure consistency in the framework used to measure project performance. However, the specific indicators used to determine if the metrics are being met do not accurately reflect private partner performance related to the condition of the home. For example, a common indicator is how quickly the private partner responded to a work order, not whether the issue was actually addressed. The military departments and private partners collect maintenance data on homes, but these data are not captured reliably or consistently. The Department of Defense (DOD) is expanding its use of work order data to monitor and track the condition of privatized housing. However, based on GAO's analysis of data provided by all 14 private partners, these data cannot reliably be used for ongoing monitoring of privatized housing because of data anomalies and inconsistent business practices in how these data are collected. DOD provides reports to Congress on the status of privatized housing, but some data in these reports are unreliable, leading to misleading results. DOD provides periodic reports to Congress on the status of privatized housing, but reported results on resident satisfaction are unreliable due to variances in the data provided to OSD by the military departments and in how OSD has calculated and reported these data. OSD and the military departments have made progress in developing and implementing a series of initiatives aimed at improving privatized housing. In addition, Congress established several requirements addressing privatization housing reform. However, DOD officials and private partner representatives have identified challenges that could affect implementation of these various initiatives. These include concerns that implementation could have unintended negative impacts on the financial viability of the privatized housing projects. GAO's draft report includes several recommendations, including that DOD take steps to improve housing condition oversight, performance metrics, maintenance data, and resident satisfaction reporting as well as to assess the risk of initiatives on project finances.", "document_type": "gao"}
{"report": "Companies that offer executive retirement plans typically do so to supplement benefits provided under qualified retirement plans or to provide retirement benefits in lieu of a qualified retirement plan. In an executive retirement plan, a select group of managers or highly compensated employees defer the receipt of compensation earned in one year to be paid in a future year, generally at or after retirement. Executive retirement plans are not subject to certain statutory limits that apply to qualified retirement plans, such as limits on the annual amount of benefits received, the annual amount of contributions made to the plan, or the annual compensation level used to determine benefits and contributions. Executive retirement plans can be structured as defined benefit plans or defined contribution plans but generally must defer compensation to a future year. For executive retirement plans structured as a defined contribution plan, executives’ benefits are based on a plan account balance. During the deferral period, companies will typically allow executives to select from among a menu of market indices (e.g., of stock, or bond performance or of interest rates) or other investment options and base the plan account balance on the performance of those selections. The company generally credits plan contributions and changes in the value of the plan account balance to executives, but does not have to make actual investments that correspond to executives’ selections because companies are not obligated to designate funds for the plan before distributions are made. For executive retirement plans structured as a defined benefit plan, executives are typically paid based on a formula that accounts for salary and years of employment. Distributions from all executive retirement plans are made from company assets. In the first objective of this report, we discuss and illustrate the defined contribution form of executive retirement plans, except as otherwise indicated. ERISA contains various provisions intended to protect the interests of plan participants and beneficiaries in workplace retirement plans. These protections include requirements related to reporting and disclosure, participation, vesting, and benefit accrual, as well as plan funding. Generally, most of the substantive protections of ERISA do not apply to executive retirement plans. Specifically, ERISA requirements pertaining to participation, vesting, funding, and fiduciary responsibilities do not apply to executive retirement plans. The policy underlying the executive retirement plan exemption from the substantive provisions of ERISA has been described by DOL as based on a recognition by Congress that “certain individuals, by virtue of their position or compensation level, have the ability to affect or substantially influence, through negotiation or otherwise, the design and operation of their deferred compensation plan.” Additionally, ERISA grants DOL the authority to prescribe alternative methods of compliance for the reporting and disclosure provisions under Part 1 of Title I for any plan or class of plans, which includes executive retirement plans. Using this authority, DOL issued a regulation permitting administrators of executive retirement plans to submit a one- time single page filing statement to satisfy ERISA reporting requirements in 1975, according to DOL. DOL’s executive retirement plan filing statement includes: the name and address of the employer, the employer identification number (EIN) assigned by the IRS, a declaration that the employer maintains a plan or plans primarily for the purpose of providing deferred compensation for a select group of management or highly compensated employees, and a statement of the number of such plans and the number of employees in each plan. In addition, plan administrators are required to provide plan documents to DOL upon request. The Internal Revenue Code (IRC) provides preferential tax treatment for workplace retirement plans that meet certain qualification requirements set out in the IRC. The structure of tax incentives and certain limits on qualified retirement plans are intended to balance encouraging employers to establish and maintain voluntary, tax-qualified pension plans with ensuring lower-income employees receive an equitable share of the tax-subsidized benefits. Although executives may benefit from tax deferral under an executive retirement plan, these plans are not eligible for the same preferential tax treatment afforded to qualified retirement plans under the IRC. For the executive to be eligible for the tax deferral, executive retirement plans must be an “unfunded and unsecured” company promise to pay benefits in the future. Generally, for an executive retirement plan to be considered unfunded and unsecured, the executive’s rights to receive plan distributions will be no greater than the rights of an general unsecured creditor in the event of company bankruptcy or insolvency. Companies are not permitted to fund (i.e., set aside assets for the exclusive benefit of participants that are separate from company assets and beyond the reach of creditors) executive retirement plans while maintaining the benefits of tax-deferral for executives. However, companies are able to “informally fund” executive retirement plans by transferring amounts to a trust that remains part of the company’s general assets—often referred to as a “Rabbi Trust”—to help keep its promise to pay benefits. Because executive retirement plans are unfunded, executives’ benefits in these plans can be subject to credit risk of non-payment, such as in the event of a company bankruptcy, according to IRS officials. The IRC provides rules regarding deferring compensation in executive retirement plans, including restrictions on the timing of distributions, restrictions on payment acceleration, and restrictions on the timing of deferral elections. At the time of deferral, the amount of compensation deferred under the plan is generally excluded from executives’ income for tax purposes and not tax deductible for the company (see fig. 1). During the deferral period, because any assets associated with the executive retirement plan remain company assets (and subject to creditor claims), the company is subject to applicable taxes on any investment earnings attributable to the assets. Executives are subject to federal income taxes on their executive retirement plan distributions when they are received. However, if an executive retirement plan fails to meet the applicable requirements at any time during a taxable year, all of the compensation deferred, including investment earnings associated with the deferred compensation, is included in each executive’s gross income for the taxable year to the extent it is vested, along with an additional 20 percent tax on the compensation to be included in gross income plus additional income tax. Companies must defer taking their tax deductions, up to statutory limits, for plan contributions they make until the executive is taxed on those benefits. In addition to DOL’s role under ERISA and IRS’s role administering the IRC requirements related to executive retirement plans, other federal agencies may have roles related to executive retirement plans. For example, SEC requires public companies to provide an annual proxy statement that includes information on the amount and type of executive compensation—including benefits from executive retirement plans—paid to their Chief Executive Officer (CEO), Chief Financial Officer (CFO), and the next three most highly compensated executive officers. Other federal agencies that play a role with respect to qualified retirement plans, such as the PBGC, may monitor the status of executive retirement plans in certain circumstances, such as in bankruptcy proceedings involving a company with both an executive retirement plan and a qualified single-employer defined benefit plan (see table 1). According to our analysis, more than 400 of the 500 largest U.S. public companies provided executive retirement plans to almost 2,300 top executives, totaling about $13 billion in accumulated plan benefits in 2017 (see fig. 2). Although DOL collects limited data on the prevalence of executive retirement plans, public companies subject to SEC reporting requirements for executive retirement plans must report the benefits provided to the Chief Executive Officer (CEO), Chief Financial Officer (CFO), and the next three most highly compensated executive officers. Industry experts we interviewed said that most large companies offer executive retirement plans to help executives and highly compensated employees save more for retirement because most executives have reached the contribution and income limits imposed on savings in qualified retirement plans. Top executives at large public companies generally accumulated more executive retirement plan benefits than top executives at smaller companies. The most recent available data from 2017 show that the average accumulated plan benefit among the top five executives in large companies was about $5.7 million, about twice as much as their counterparts in smaller companies, where the average was about $2.8 million. The average and median accumulated plan benefits generally remained consistent for large and smaller companies from 2013 to 2017 (see fig. 3). In addition, our analysis showed that, among the top five executives at large public companies, accumulated plan benefits are concentrated among a subset of these top executives based on their job title, company contributions, and plan type. The average accumulated plan benefit among top executives in large companies was consistently greater than the median accumulated plan benefit from 2013 to 2017 (see fig. 3). For example, as of 2017, the average accumulated plan benefit among top executives was more than four times the median, indicating that plan benefits for a smaller subset of executives is greater than a majority of other individual executives. CEOs accumulated more executive retirement plan benefits than the next four highest compensated executives. As of 2017, the CEOs had accumulated, on average, about $14 million in executive retirement plan benefits. In contrast, CFOs had accumulated, on average, about $3 million and the next three most highly compensated executive officers with other titles accumulated an average of about $3.4 million in accumulated plan benefits. Our analysis also showed that, for each of the three job title categories (CEO, CFO, and the next three most highly compensated executive officers), the average accumulated plan benefits were at least twice the median amount from 2013 to 2017 (see fig. 4). From 2013 to 2017, about 80 percent of large companies that offered an executive retirement plan made company contributions to the plan. As of 2017, the average accumulated plan benefit for top executives among companies providing company contributions was more than $6.5 million. This was more than twice the average of nearly $2 million for executives in about 20 percent of the remaining companies that offered an executive retirement plan that did not include company contributions. Our analysis showed that plan benefits are also concentrated among a subset of executives as the average amount of accumulated plan benefits for executives in plans that received company contributions were several times greater than the median from 2013 to 2017 (see fig. 5). The top five executives with defined benefit executive retirement plans generally accumulated more plan benefits than those with defined contribution executive retirement plans alone. As of 2017, about 30 percent of large companies that sponsored an executive retirement plan offered a defined benefit plan, as compared with about 70 percent that only offered a defined contribution plan. In 2017, the top five executives at large companies with a defined benefit plan had accumulated plan benefits of nearly $9 million on average, more than twice the average of about $4.4 million for top five executives with defined contribution executive retirement plans alone. Our analysis showed that plan benefits are concentrated among a subset of executives as the average accumulated plan benefits for top five executives with a defined benefit plan was several times more than the median from 2013 to 2017 (see fig. 6). However, industry experts told us the number of companies offering defined benefit executive retirement plans has declined over time. Executive retirement plans can help executives reduce their potential tax liability, increase retirement savings, and provide financial planning advantages through: (1) tax substitution of investment earnings, (2) additional company compensation for investment earnings, (3) additional company compensation for personal income taxes, and (4) allowable distributions during working years. Treasury officials and some industry experts told us that executives who participate in executive retirement plans may be able to reduce their potential federal tax liability on plan investment earnings and increase their savings because these plans substitute the executive’s applicable individual tax rate on investment earnings with the company’s corporate tax rate (see fig. 7). In an executive retirement plan, the company defers compensation for the executive, but investment earnings on associated assets during the deferral period are taxed to the company at the company’s applicable corporate tax rate (see “Executive defers compensation” at top of fig. 7). In contrast, the executive who chooses not to defer compensation and instead takes the current compensation (paying income taxes) and invests the balance will pay taxes on investment earnings at the individual tax rate (see “Executive does not defer compensation” at bottom of fig. 7). The actual taxes paid under either scenario—deferring compensation or not—will depend on a number of factors, including the type of investments, if any, selected by the executive or the company, length of time invested, and applicable tax rates. For example, an executive who does not defer compensation and invests outside of the plan might select investments that are expected to produce long-term capital gains, which are taxed at lower individual rates than short-term capital gains. This same executive, if deferring compensation through the plan, might elect to invest in short-term bonds or investment earnings based on a market interest rate, which are taxed at a lower corporate tax rate inside the plan than outside. As another example, a company might invest deferred compensation in a tax-favored vehicle such as corporate- owned life insurance. According to Treasury officials and some industry experts, by participating in an executive retirement plan, executives may be able to effectively reduce their potential federal income tax liability during the deferral period because investment earnings on associated plan assets are taxed at the company’s corporate rate that may be lower than the executive’s individual tax rate. This tax substitution of investment earnings may allow the plan account to grow over time at a higher rate of investment return than if an executive invested in the same or similar assets outside the plan. Further, any such tax advantages may allow companies to reduce their total compensation costs. Conversely, Treasury officials told us the IRC may effectively disadvantage executive retirement plans to the extent the tax on an executive’s investment earnings outside the plan is lower than the tax the company would pay if invested through the plan. In this circumstance, the tax disadvantage may increase the cost of companies’ total compensation. However, our analysis of tax rates suggests that the corporate tax rate may be lower than the individual tax rate on several forms of investment income. In this case, the company may be able to achieve a higher after-tax rate of return on investments than the executive can, depending on the type of investment and amount of time invested. The lower the applicable corporate tax rate is relative to the applicable individual tax rate, the greater the tax benefit for the executive or the company. Treasury officials and some industry experts told us that, in this scenario, the potential tax advantage resulting from tax substitution of investment earnings is effectively a federal subsidy because the federal government receives less in tax revenue. And due to the effects of compounding, the tax advantage is also greater the longer the deferral period (and higher the investment return). Treasury officials and experts whose published work we reviewed and interviewed told us the potential effective federal tax subsidy for executive retirement plan investment earnings can be greater when companies have effective tax rates that are lower than statutory tax rates. This can occur, for example, when a company’s losses from the current year or losses carried over from prior years offset all other company income, including any investment earnings associated with their executive retirement plan. In these instances, the federal government could effectively subsidize the plan investment earnings because it receives no taxes on those earnings until funds are distributed. Companies also provide executives with additional executive retirement plan compensation that increases their overall savings by not passing along taxes paid on investment earnings during the deferral period, according to Treasury officials and some industry experts. In this scenario, a company’s assets associated with the executive retirement plan are reduced for taxes it pays on investment earnings, but the executive’s corresponding plan account balance is unaffected by tax because the company provides the executive with additional plan compensation in the same amount as the taxes the company pays. Unaffected by taxation on investment earnings, the account balance accumulates over time at a pre-tax investment rate of return, rather than at the company’s potentially lower after-tax investment rate of return, until those funds are distributed to the executive. In this manner, this additional compensation provided by the company allows the account balance of an executive retirement plan to accumulate in the same way as in a qualified defined contribution retirement plan (e.g., a 401(k) plan). The additional compensation can result in a substantial benefit for an executive, and due to the effects of compounding, the benefit is greater the longer the deferral period (and higher the investment return). Lastly, industry experts said some companies provide additional executive retirement compensation to pay for the personal income taxes that executives expect to pay when plan benefits are distributed. This practice is known as a tax “gross-up” because the company increases the amount of gross or pre-tax executive retirement plan benefits to pay for the executive’s anticipated income taxes at distribution. As a result, the executive effectively receives the total amount of the initial pre-tax benefit at distribution. For example, a company that wants an executive who is in the 37 percent income tax bracket to receive $1,000 from the plan on an after-tax basis would provide an additional $588 in plan compensation (for a total of $1588) to cover the executive’s anticipated taxes at distribution. Treasury officials said that while tax gross ups and other similar executive compensation practices provide an economic benefit to executives, these practices by companies to offset executives’ tax burden is a corporate governance issue for shareholders to decide and that tax law does not address their appropriateness. Some industry experts told us that it has become less common for public companies to offer tax gross-ups, mostly due to shareholder concerns about their appropriateness in light of required public disclosures. Executive retirement plans can also provide executives with financial planning benefits through allowable distributions during their working years. Treasury officials and industry experts said that while executive retirement plans are intended for retirement purposes, plans typically also allow executives to take distributions while still working. These distributions generally are allowed if they comply with applicable statutory requirements. Industry experts told us that executives can align distributions during their working years with income needs, such as to pay for a child’s college expense, or for specific goals, such as buying a home. Industry experts said that the ability to structure pre-retirement distributions can allow executives to smooth out their overall income over time to better coordinate use of other income sources during their working years and retirement, which they said can lead to overall tax savings. Executive retirement plans can provide tax advantages that may have revenue effects for the federal government, but the extent of those effects currently is unknown. Treasury is responsible for providing economic analysis and revenue estimates of tax legislation for the executive branch, and Treasury officials said that the Congressional Joint Committee on Taxation prepares official revenue estimates of all tax legislation considered by the Congress. Treasury officials told us that while executive retirement plans do not receive the preferential tax treatment afforded to qualified retirement plans, these arrangements can result in tax advantages that may have revenue effects for the federal government. These officials explained that executive retirement plans are tax revenue neutral when corporate tax rates and individual tax rates (or taxes paid) are the same because the federal government would generally receive the same amount of taxes regardless of the executive’s decision to defer compensation. Treasury officials also told us that executive retirement plans could have federal revenue effects to the extent corporate and individual tax rates (or taxes paid) diverge from each other. Among the 38 Chapter 11 corporate bankruptcy cases we reviewed, 30 cases showed that participants in executive retirement plans expected to receive general unsecured creditor status when settling their plan benefit claims. As a general unsecured creditor, executives in these plans are part of what is typically the last creditor class to be paid in bankruptcy, and only if funds remain after claims from all other creditors with payment priority have been paid in full (see fig. 8). Our review of bankruptcy cases showed that executives’ expected losses and recoveries varied among the 30 Chapter 11 cases we reviewed where all or some plan participants were expected to receive general unsecured creditor status for their plan benefit claims (see fig. 9). In 21 of the 30 cases, plan participants were expected to sustain losses of more than 75 percent of their plan benefit claims, and in 17 of these 21 cases, participants were estimated to lose 90 percent or more. However, the remaining nine cases showed that participants were expected to recover more than half of their plan benefit claims with six of those cases expecting a full recovery and one case expecting a 99 percent recovery. Companies generally file for bankruptcy when they do not have sufficient assets to pay off their debts. Bankruptcy and industry experts said that executive retirement plan participants as general unsecured creditors may expect to sustain a significant or even a total loss of their deferred compensation in a company bankruptcy. However, bankruptcy and industry experts noted that the level of losses or recoveries depends on the facts and circumstances of each case, including the type of bankruptcy the company filed. Our review of bankruptcy cases showed differences in expected benefit losses and recoveries based on whether the bankrupt company intended to continue to operate by filing a reorganization plan or sell all of its assets to pay creditors by filing a liquidation plan. Among the 30 Chapter 11 bankruptcy cases where participants in executive retirement plans were expected to receive general unsecured creditor status, 14 filed a reorganization plan and 16 filed a liquidation plan. Among the bankruptcy cases we reviewed, executives were generally estimated to sustain less severe claims losses and recover more of their plan benefits if their company filed a reorganization plan to continue to operate and restructure its debts. In seven of 14 reorganization cases we reviewed, executive retirement plan participants were estimated to recover about 80 percent or more of their plan benefit claims, with participants in six of those cases expected to fully recover their benefits. In contrast, participants in the remaining seven of 14 cases were estimated to sustain benefit claims losses of about 20 percent or more, with participants in five cases expected to lose 90 percent or more. Industry experts told us plan participants are more likely to sustain fewer losses when their bankrupt company reorganizes because it has a plan to emerge from bankruptcy and pay its debts as it continues to operate. Bankruptcy and industry experts noted that in some reorganization cases, general unsecured creditors can receive full recoveries. Executives were generally estimated to sustain greater plan benefit claim losses if their company filed a liquidation plan. In 15 of 16 liquidation cases we reviewed, executive retirement plan participants were estimated to sustain losses of nearly 50 percent or more of their plan benefit claims. Participants in the remaining case were expected to nearly fully recover their benefits. Industry experts told us that whether a company has a viable post-bankruptcy future affects its ability to fulfill its debt obligations, including paying promised plan benefits to executive retirement plan participants. Bankruptcy experts said the severity of plan benefit claims losses for participants is generally greater when a bankrupt company liquidates because it signals the end of a company and is a last resort after it has exhausted all other options to restructure its debts and continue to operate. Among the 38 Chapter 11 bankruptcy cases we reviewed, 11 involved the situation where all or some of the executive retirement plan participants were not expected to receive general unsecured creditor status for their benefit claims. Although the circumstances varied among these 11 cases, the expected outcome was that some of these participants’ plan benefits which were accrued at or around the time the company filed for bankruptcy were expected to be preserved or paid. Among the 11 cases we reviewed in which executive retirement plan benefits were expected to be maintained, eight occurred with a bankrupt company that filed a reorganization plan. In three of the eight cases, benefits for all plan participants were expected to be preserved; in five cases participants were divided into different groups where some were expected to have their benefits preserved and others were not. Bankruptcy and industry experts said that, paying plan benefit claims in a bankruptcy often depends on the financial health of the company and the value of the executive to the future of the company. These experts also said that not all executive retirement plan participants receive the same treatment for their claims. These experts added that a common scenario is to preserve in some manner the benefits for key executives who are retained, while giving executives who are not retained, or former executives no longer with the company, less favorable treatment as a general unsecured creditor. Industry experts also told us that some executive retirement plan participants’ benefits may be preserved or the participants may be provided with more favorable treatment because they are key executives who need to be retained to help ensure their company successfully reorganizes and emerges from bankruptcy. These experts explained that key executives may not be willing to risk staying on without assurances that accrued plan benefits will be preserved or made up in some manner. Bankruptcy and industry experts said that because key high-level executives can be integral to the success of a company reorganization, its major creditors are more likely to agree to preserve plan benefits for them because it will likely result in increased overall recoveries and greater benefits for their stake in the company. Lastly, bankruptcy and industry experts said that in order for bankrupt companies to retain key executives, they typically need to provide assurances that, in addition to executive retirement plan benefits, executives will receive other forms of compensation. Bankruptcy and industry experts noted that because various forms of executive compensation may be interchangeable to the executive, informal agreements may be arranged so that executive retirement plan benefit losses that may occur as a general unsecured creditor are made-up through other forms of compensation. However, they told us these types of arrangements are not discernable from bankruptcy filings. In three of the 11 cases we reviewed in which executive retirement plan benefits were expected to be preserved, the companies filed a Chapter 11 liquidation plan. Court filings indicated executive retirement plan participants in two of the three cases received distributions shortly before the company filed bankruptcy. In one case, the bankruptcy estate chose not to seek to recover those funds despite restrictions for early distributions before a bankruptcy in part because the costs to recover the monies outweighed the benefits. Bankruptcy and industry experts said that while there are restrictions and penalties for early distributions before a bankruptcy, the costs and time associated with suing to recover monies can discourage bankruptcy estates from pursuing legal action. IRS oversees executive retirement plans for compliance with the IRC during audits of companies who offer such plans. The Pension Protection Act of 2006 amended the IRC to provide that, during a restricted period, which includes bankruptcy, if a company that sponsors a qualified single- employer defined benefit plan sets aside or reserves assets in a trust for the purposes of paying nonqualified deferred compensation (which includes executive retirement plan compensation) to applicable covered employees (key executives), the key executives are required to include the amount of assets in their gross income for the taxable year. A restricted period is defined as: (1) any period in which the plan sponsor is a debtor in bankruptcy; (2) any period when the qualified single-employer defined benefit plan of the company is in at-risk status; or (3) the 12- month period that begins 6 months before the date the qualified single- employer defined benefit plan is terminated if, as of the termination date, the plan’s assets are not sufficient to cover benefit liabilities. In general, a company’s qualified single-employer defined benefit plan is in at-risk status if it is less than 80 percent funded. As part of its oversight effort, IRS officials said that its examiners can use IRS’s Nonqualified Deferred Compensation Audit Techniques Guide (the guide) to audit these plans for compliance with the IRC, including the relevant provision, which was added by the Pension Protection Act of 2006. The guide describes the requirements in section 409A of the IRC related to deferred compensation set aside during a restricted period. While the guide is designed to provide guidance for IRS employees, the guide is publicly available and also useful for businesses and tax professionals who prepare returns. However, the guide does not instruct examiners or other users on how to determine compliance with the relevant provision. For example, the guide does not instruct examiners or other users to determine if the company has set aside assets—such as by making contributions of funds to a Rabbi Trust—to pay deferred compensation during bankruptcy. It also does not require examiners or other users to obtain data sufficient to determine whether there exists a restricted period with respect to the company’s qualified single-employer defined benefit plan. Lastly, it does not provide instructions regarding the type of data to collect or questions to ask to determine whether a company’s defined benefit plan is in a restricted period. When asked if additional instructions were available to examiners on auditing companies with these plans for compliance with the relevant provision, IRS officials pointed us to sections of the Internal Revenue Manual (IRM), IRS’s primary source of instructions to staff, and other internal training manuals. However, we found no specific instructions in these sources related to the relevant IRC provision or its oversight. IRS officials said examiners can also review SEC filings to determine whether there exists a restricted period with respect to a company’s qualified single-employer defined benefit plan. However, SEC filing requirements do not apply to many privately-held companies, limiting the usefulness of this information source for IRS audit examiners for this purpose. IRS officials also said that Form 5500, Annual Return/Report of Employee Benefit Plan, and the attached schedules are available on the DOL website and that examiners can download and review these data during their examinations. For example, officials said information on the 5500 Form’s Schedule SB, Single-Employer Defined Benefit Plan Actuarial Information, can be used to verify the income tax deduction for contributions to pension plans. Specifically, the schedule’s Item 4 box, Part I Basic Information, will be marked if the plan is in at-risk status. The form, however, does not capture whether companies set aside assets for the purpose of paying deferred compensation or elicit information about a company’s bankruptcy. Moreover, the IRM, the guide, and the IRS training manuals provide no instruction to examiners regarding how to review this information during audits of companies with executive retirement plans. IRS also may be able to use non-confidential information that PBGC collects to monitor the financial condition of companies that sponsor single-employer defined benefit plans. In its capacity to provide plan termination insurance, PBGC monitors single-employer defined benefit plans—including companies’ financial condition and plans’ at-risk status— through a variety of reporting requirements and initiatives. For example, because PBGC represents itself and the pension plan and participants as a creditor when companies (publicly and privately-held) sponsoring single-employer defined benefit plans file for bankruptcy, it is aware of such bankruptcy filings. PBGC also uses data that companies are required to report on Form 5500, describing the assets and liabilities of their single-employer defined benefit plans, to identify when a defined benefit plan is underfunded or in at-risk status. IRS may be able to use the timely, non-confidential information PBGC possesses to help IRS identify whether companies with single-employer defined benefit plans are setting aside assets for the purpose of paying deferred compensation under an executive retirement plan during a restricted period. Federal standards for internal control require federal agencies to obtain and use quality information and to communicate this information to internal and external parties that can help the agency achieve its objectives and address related risks. Without providing specific instruction to its examiners to collect and evaluate information that describes company actions relative to this requirement limiting tax deferral for key executives for amounts deferred under an executive retirement plan and set aside by the company during a restricted period, IRS cannot sufficiently determine if companies are including these amounts in the executives’ gross income as required by the IRC provision. Without taking steps to improve the sufficiency of its audit instructions to help strengthen its oversight, IRS cannot know if companies are reporting the correct amount of income for taxation for these key executives and if the correct amount of tax is being paid by the executives in these instances. IRS also may not be collecting additional taxes and interest due from key executives who participate in executive retirement plans. Absent improved IRS oversight in this area, companies may be failing to report assets set aside to pay deferred compensation to key executives while in a restricted period as income for these employees. To the extent some companies are failing to report this income, they may continue to do so at the cost of foregone federal tax revenues while lacking an important incentive from IRS to cease this practice. Another aspect of executive retirement plan oversight is ensuring that only eligible executives are allowed to participate since these plans are excluded from most of ERISA’s substantive protections. DOL requires companies to report on their executive retirement plans, but the reporting lacks important information that could allow the agency to identify plans that may be including ineligible employees. Currently, under its alternative reporting method regulation, DOL regulations require the administrator of the executive retirement plan, typically the sponsoring company, to submit a one-time single page filing statement within 120 days of the executive retirement plan being established to satisfy ERISA reporting requirements (see fig. 10). According to DOL officials, no other filings are required for executive retirement plans to comply with Part 1 of Title I of ERISA. The information provided in the filing statement does not describe the job title or salary of executives participating in the plan, the percentage of the company’s workforce that is eligible to participate, or the actual percentage of employees who participate in the plan; nor does it compare the salaries of executives with rank-and-file workers. Because DOL only requires companies to submit the filing statement once within 120 days of plan formation, the agency is not aware when participation in the plan changes over time or if plans are terminated. When asked if these additional data would be useful to the agency, one DOL official said that they could be used to increase oversight of executive retirement plans. For example, the official said if the filing statement included the percentage of the company’s workforce that participated in such a plan, a high participation percentage could signal to DOL that the company might be permitting employees to participate in the plan who do not meet the “select group” requirements, and that such information could prompt a DOL audit. However, the DOL official said the agency would need to evaluate how the data would be used and the collection costs before determining the data’s overall value. The preamble to DOL’s regulation states that the agency chose to require limited reporting because these plans are for executives who generally have access to information concerning their rights and obligations under the plan and do not need ERISA protections. Moreover, DOL officials said there is no statutory requirement specifically directing the agency to collect executive retirement plan data and no requirement for companies to file an amended filing statement to report substantive plan changes. However, ERISA authorized DOL to prescribe an alternative method of reporting and the agency chose to require a limited one-time single page filing statement for executive retirement plans. DOL officials said the data currently collected can only be used for simple analysis or to facilitate the agency’s ability to respond to requests from Congress, the media, or the public. This limited usefulness regarding eligibility is due to the age and limits of the original data submitted. However, officials told us there currently is no plan to place executive retirement plan reporting on DOL’s regulatory project agenda. Federal standards for internal control state that agencies should (a) use quality information to achieve its objectives; (b) obtain data from reliable sources in a timely manner based on identified information requirements; and (c) process the data into quality information—information that is appropriate, current, complete, accurate, accessible, and timely—to support its internal control system. Without reviewing or clarifying its reporting requirements to allow the agency to collect more useful information on executive retirement plans, DOL will continue to lack insight into the composition of these plans and, as a result, may be missing opportunities to ensure that companies with executive retirement plans are meeting the eligibility requirements for the plan. Many industry experts we spoke to said that eligibility requirements for executive retirement plans are not clearly defined and that companies are unclear on how to establish eligibility. DOL has acknowledged that at least in one case a company may have denied ERISA protections to rank- and-file employees by allowing them to participate in executive retirement plans. DOL officials also said the agency has issued guidance on the executive retirement plan provisions in ERISA. For example, DOL pointed us to Advisory Opinion 90-14A, which DOL officials said is the agency’s most recent advisory opinion on provisions related to plan participant eligibility. The Advisory Opinion restates that executive retirement plans are excluded from most of ERISA’s substantive protections and describes DOL’s view that the term “primarily,” as used in the statute, refers to the purpose of the plan—the benefits provided—rather than the participant composition of the plan (see fig. 11). The Advisory Opinion further states DOL’s view that executive retirement plans that include employees who are not from a select group of management or highly compensated would fail to constitute a “select group” under ERISA, which would subject the plan to all of the requirements of Title I. Despite the information in the Advisory Opinion, several industry experts expressed the view that DOL’s current policy lacks specific information on the factors companies should consider when establishing eligibility for participation in these plans. Recent industry surveys we reviewed have suggested some companies may be extending employee eligibility to a relatively high percentage of their workforce—in some cases, more than 30 percent—and to relatively lower-paid or lower-ranked employees. For example, results from a recent survey of executive retirement plan sponsors suggested that just over 8 percent of respondents offer eligibility to between 20 to 30 percent of their workforce and just over 4 percent offer eligibility to more than 30 percent of their employees. Further, over 20 percent of respondents indicated that over 15 percent of their workforce was considered highly compensated employees and eligible to participate in an executive retirement plan. Industry experts pointed to court cases that they identified as contributing to the confusion regarding executive retirement plan eligibility, including cases that have suggested a limit on the percentage of employees who may participate in an executive retirement plan and still constitute a select group. Several industry experts suggested that DOL could help to address this issue in the future by providing a safe harbor that describes limits or thresholds companies could follow to establish eligibility. Two industry experts identified a range of possible information DOL could provide, such as a ceiling on the percentage of the company’s workforce permitted to participate, job titles that could be eligible for participation, or a compensation threshold. Industry experts also suggested more detailed information on factors to consider for eligibility, rather than a “one-size-fits-all” design, would help to ensure the information would be flexible enough for a variety of companies to apply. We asked DOL officials about issuing clarifying information on the statutory requirements under ERISA for eligibility into these plans. DOL officials stated that the agency has the authority to do so but has no plans to issue guidance because it has not encountered eligibility problems during plan audits and enforcement actions. Rather, DOL officials said that in light of resource constraints, other high priority guidance projects, and the absence of systematic abuses involving these plans, it does not believe it advisable to shift resources from other projects to undertake a guidance project in this area. DOL officials said the agency no longer renders decisions on the status of “select group” eligibility for executive retirement plans in advisory opinions or in response to external inquiries because such determinations involve factual questions that are not well suited to an advisory opinion or informal participant assistance process. Federal standards for internal control require federal agencies to communicate quality information externally through reporting lines so that external parties can help the entity achieve its objectives and address related risks. By exploring ways it may be able to help reduce the incidence of ineligible employees participating in executive retirement plans, DOL could help ensure ineligible rank-and-file employees are not participating in these plans and are receiving the applicable protections under ERISA. One such way may be by providing information to companies on factors to consider when determining a “select group” to aid companies in establishing plan eligibility. A related issue that companies can face is dealing with eligibility decisions that turn out to be in error. DOL officials told us they have not issued any guidance on how companies are to correct eligibility errors found in executive retirement plans. Officials referred us to a 2015 amicus brief DOL filed in a particular case that described the department’s views on how companies might consider addressing eligibility errors. The amicus brief suggests that the company could modify the plan to exclude the ineligible rank-and-file employees and award them the full vesting and other protections under ERISA while maintaining the plan’s status under ERISA as an executive retirement plan for those executives who do qualify. However, the amicus brief states that DOL took no position on the form of equitable relief appropriate under ERISA to redress an employer’s violation of vesting requirements by including rank-and-file employees in an executive retirement plan. The amicus brief also suggests that this approach would avoid providing a windfall gain to executives who properly could have been included in such a plan, because they possess sufficient bargaining power to protect their rights, and are not the intended beneficiaries of the substantive provisions under Parts 2, 3, and 4 of Title I of ERISA. When asked about this remedy, DOL officials said that funds from the executive retirement plan could be distributed to a qualified retirement plan for rank-and-file employees, with their benefits immediately fully vested and receiving ERISA protections. When we discussed the possible remedy described in the amicus brief with IRS officials, they said that while 409A regulations were being drafted, they were aware that applying strict distribution rules could have adverse tax consequences for rank-and-file employees participating in executive retirement plans. IRS officials said that removing these employees from these plans and awarding them full vesting of their benefits under Title I of ERISA could violate section 409A, raising concerns that the possible remedy noted in DOL’s amicus brief may be inadequate for companies seeking a method to correct plan errors. Officials also said that there are certain exceptions under section 409A when accelerated payments may be permitted; however, IRS officials said there is no current exception permitting an accelerated payment to be made to a rank-and-file employee in order to correct a violation of Title I of ERISA. IRS officials said they are willing to work with DOL to promulgate new section 409A regulations to create an exception to the accelerated payment rule for plans that seek to remove ineligible rank-and-file employees from the plan and make distributions to an employee’s qualified retirement plan in order to maintain the plan’s ERISA exemption. However, IRS officials said that prescribing corrective action in these situations is under DOL’s purview and that DOL first would need to further delineate the meaning of an executive retirement plan employee and then decide the proper approach for removing ineligible rank-and-file employees from a plan before any new regulations under section 409A could be considered. As mentioned above, federal standards for internal control require federal agencies to externally communicate necessary quality information to achieve their objectives. Without additional information from DOL on what companies can do to reduce the incidence of ineligible rank-and-file employees participating in these plans, some ineligible employees may continue to participate in some instances, potentially subjecting them to unexpected tax consequences such as if they are removed from the plan and the payment of their deferred compensation is accelerated. Further, without knowing how to properly remove ineligible rank-and-file employees when they are found participating in executive retirement plans, companies may be uncertain on how to re-establish an executive retirement plan’s exemption from the substantive provisions of Title I of ERISA for otherwise eligible participants. Although executive retirement plans are an important retirement savings vehicle for corporate executives and other highly compensated employees, little is known about certain key aspects of these arrangements. While some federal regulatory data exist on plans provided to the top five executives of publicly owned companies, information about the design, participation, and benefits provided under plans offered by privately owned companies or offered to employees beyond top five executives are largely unknown, as is their net revenue effect on the federal government. In addition, IRS has not taken steps nor collected adequate information to know if companies under audit with a qualified single-employer defined benefit plan are setting aside assets for the purpose of paying benefits deferred under executive retirement plans while the companies are in at- risk status—a practice the law intended to discourage. Through effective oversight, IRS can help ensure that it is collecting the appropriate amount of income taxes as a result of this potential practice. Another important consideration with respect to executive retirement plans is their potential to permit ineligible rank-and-file employees to participate in the plan, thereby leaving such employees without the protections of ERISA. Little information is available at the federal level about who is included in executive retirement plans because companies provide minimal information to DOL only once when they implement such a plan. By revisiting its reporting requirements, DOL can help ensure that only executives who can bear the risks inherent in these plans are permitted to participate. DOL has other opportunities to diminish this risk by providing assistance to companies, such as additional information describing plan eligibility, which could help companies reduce the incidence of rank-and-file employees participating in these plans. In addition, DOL can provide direction that companies can follow to remove rank-and-file employees found participating in these plans to ensure their benefits are protected and coordinate with the IRS so that these employees do not incur unexpected tax consequences that could result from erroneous inclusion in an executive retirement plan. We are making a total of four recommendations, including one to IRS and three to DOL. The IRS Commissioner should develop specific instructions within the Internal Revenue Manual, the Nonqualified Deferred Compensation Audit Techniques Guide, or other IRS training material to aid examiners in obtaining and evaluating information they can use to determine whether there exists a restricted period with respect to a company with a single- employer defined benefit plan and if a company with a single-employer defined benefit plan has, during a restricted period, set aside assets for the purpose of paying deferred compensation under an executive retirement plan. (Recommendation 1) The Secretary of Labor should review and determine whether its reporting requirements for executive retirement plans should be modified to provide additional information DOL could use to oversee whether these plans are meeting eligibility requirements. (Recommendation 2) The Secretary of Labor should explore actions the agency could take to help companies prevent the inclusion of rank-and-file employees in executive retirement plans and determine which, if any, actions should be implemented. (Recommendation 3) The Secretary of Labor should provide specific instructions for companies to follow to correct eligibility errors that occur when rank-and-file employees are found to be participating in executive retirement plans, and should coordinate with other federal agencies on these instructions, as appropriate. (Recommendation 4) We provided a draft of this report to DOL, IRS, PBGC, SEC, Treasury, and the United States Trustee Program within the Department of Justice for review and comment. DOL, IRS, PBGC, SEC, and Treasury provided technical comments, which we have incorporated where appropriate. IRS and DOL also provided formal comments, which are reproduced in appendices II and III, respectively. In response to our recommendation to develop specific instructions to aid IRS examiners in monitoring executive retirement plans for compliance with federal tax law, IRS stated that they would review and consider developing further specific instructions within the Internal Revenue Manual, the Nonqualified Deferred Compensation Audit Techniques Guide or other IRS training material to aid examiners. GAO continues to maintain that implementing this recommendation will help ensure that IRS is aware of when companies with at-risk single-employer defined benefit plans are reporting assets set aside to pay deferred compensation to key executives while in a restricted period as income for those employees. DOL stated that it does not have plans to issue guidance or regulations regarding executive retirement plans, citing, among other considerations, existing resource constraints and priority regulatory and guidance projects in development, and that it would not be advisable to shift resources from other projects. GAO continues to maintain that DOL’s one-time single page alternative reporting for executive retirement plans lacks important information sufficient to help the agency identify whether companies may be including ineligible employees in its plan and DOL’s current data on executive retirement plans has limited usefulness due to the age and limits of the original data submitted. DOL also stated that the agency has not encountered evidence of systematic abuses involving executive retirement plans or that ERISA’s claims procedure rules and judicial remedies are inadequate to protect participants’ benefit rights. As we report, industry surveys indicate that some companies may be extending employee eligibility to high percentages of their workforce who are lower- paid and lower-ranked employees who may not be considered a part of a select group. Industry experts also told us that plan eligibility requirements for executive retirement plans are not clearly defined and that companies are unclear on how to establish eligibility, and they identified court cases that contribute to the confusion regarding plan eligibility. Additionally, the remedy DOL suggested in an amicus brief for companies to follow to correct eligibility errors in these plans could have unintended consequences for participants because, according to IRS officials, it could result in violations of federal tax law and additional tax for participants. Without implementing our recommendations, DOL will continue to be unable to ensure that only executives who can bear the risks inherent in these plans are participating. We urge DOL to develop instructions to correct eligibility errors, in coordination with other federal agencies, as needed, in a way that does not adversely affect rank-and-file employees participating in these plans. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees; the Secretaries of the Departments of the Treasury, Labor, and Justice; the Commissioner of the Internal Revenue Service; the Chairman of the Securities and Exchange Commission; and the Director of the Pension Benefit Guaranty Corporation. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix IV. This report examines (1) what is known about the prevalence, key advantages, and revenue effects of executive retirement plans; (2) the potential outcomes of executive retirement plan benefits in company bankruptcy; and (3) how federal agency oversight protects benefits and prevents ineligible participation in executive retirement plans. To address these objectives, we reviewed relevant federal laws, regulations, guidance, and other agency documents related to executive retirement plans. We reviewed relevant research on executive retirement plans, which we identified with the help of a GAO librarian, through stakeholder interviews, by reviewing sources cited in documents we obtained, and through limited internet searches driven by stakeholder and documentary evidence. This research included published research on the costs of executive retirement plans on the companies that offer them and the revenue effects on the federal government. We interviewed a non- generalizable sample of executive retirement plan experts representing different roles in the industry, including plan consultants, plan providers (including record keepers and insurers), attorneys, investment advisors, actuaries, proxy advisors, and researchers. We also interviewed an array of bankruptcy experts—including those with experience in executive compensation—to understand bankruptcy procedure and the treatment of executive retirement plans in company bankruptcy. We selected executive retirement plan and bankruptcy experts to interview based on a combination of published work, breadth and depth of experience, as well as peer referrals. We interviewed representatives from industry associations representing a diverse range of stakeholder groups, such as those that offer, provide services to, or conduct research on executive retirement plans. As part of this effort, we contacted the American Institute of Certified Public Accountants to discuss their perspective on the use of executive retirement plans but they declined to meet with us. We also interviewed agency officials from the Department of Labor’s (DOL) Employee Benefits Security Administration (EBSA), Department of the Treasury’s Office of Tax Policy, the Internal Revenue Service (IRS), the Securities and Exchange Commission, the Pension Benefit Guaranty Corporation (PBGC), and the United States Trustee Program within the Department of Justice. To understand the prevalence of executive retirement plans, we analyzed data provided by the Main Data Group (MDG), an executive compensation benchmarking and corporate governance analytics firm. MDG compiled the data provided from required SEC disclosures from filing years 2013 to 2017 (the most recent data available at the time of our analysis) for executive retirement plan benefits provided to top executives in Standard & Poor’s (S&P) 500 and Russell 3000 companies as reported in the annual 10-K, proxy statement, and other documents. Companies listed in the S&P 500 are generally also listed in the Russell 3,000. The SEC generally requires public companies to disclose executive compensation information—including executive retirement plan benefits— provided to the Chief Executive Officer, Chief Financial Officer, and the next three most highly compensated executive officers. These data are principally found in the annual proxy statement within the Summary Compensation Table, Pension Benefits Table, and Nonqualified Deferred Compensation Table. The data include executive retirement plan benefits offered as a defined benefit plan and defined contribution plan. For a given year, the total accumulated value of executive retirement plans structured as a defined benefit provided to top executives are based on the “present value of accumulated benefit” and “payments during the last fiscal year” as reported in the Pension Benefits Table. For defined contribution plans, the total accumulated values are based on the “aggregate balance at last fiscal year end” and the “aggregate withdrawals/distributions” for the reporting period as disclosed in the Nonqualified Deferred Compensation Table. To determine the average level of plan benefits for top executives, we summed the total accumulated plan benefits for all top executives in a given year and divided them by the total number of executives. For the median, we sorted the total accumulated plan benefits for all executives in a given year and determined the midpoint. To assess the reliability of the data provided, we interviewed MDG officials regarding their data collection processes. We also independently compared executive retirement plan data from a random sample of SEC filings obtained from Edgar (the SEC’s public database for required disclosures) with data for the same companies as reported by MDG. We found the data to be sufficiently reliable for the purpose of describing the prevalence of executive retirement plans among companies subject to SEC’s disclosure requirements. To understand the expected outcomes for executive retirement plan benefits during company bankruptcy, we analyzed data collected from our non-generalizable review of a random sample of companies that offered an executive retirement plan and filed for bankruptcy during the period from October 17, 2005—the effective date for most of the provisions of the Bankruptcy Abuse Prevention and Consumer Protection Act of 2005 (2005 Bankruptcy Act)—through November 30, 2017— the most recent at the time of our analysis. The 2005 Bankruptcy Act made significant changes to federal bankruptcy law, including provisions limiting executive compensation in corporate bankruptcy. Using the unique Employer Identification Number (EIN) the IRS assigns to companies, we matched corporate Chapter 7 and Chapter 11 bankruptcy cases with DOL’s database of executive retirement plans to obtain lists of companies that filed for bankruptcy and offered at least one executive retirement plan. We obtained lists of corporate bankruptcy filings from New Generation Research Inc.’s (NGR) online database. NGR is a provider of data on corporate bankruptcies and companies in financial distress. We obtained from DOL its comprehensive list of executive retirement plans as filed with the agency from July 1982 to August 2017. The NGR and DOL data are not exclusive to public or private companies. To assess the reliability of the NGR and DOL data, we corresponded with officials regarding their respective data collection processes and requirements. We found the data to be sufficiently reliable for our purposes. The results of our data matching produced 138 Chapter 7 cases and 594 Chapter 11 cases of companies that filed for bankruptcy and offered an executive retirement plan. We reviewed a random selection of 151 cases (30 Chapter 7 and 121 Chapter 11) from a total of 732 relevant bankruptcy cases. To review bankruptcy court cases, we developed a standardized protocol to review each identified case and data collection instrument to input the data. The protocol included step-by-step instructions for reviewers to follow, including prescribed court documents to review and data to be collected. We obtained feedback on our case review protocol and data collection instrument from two outside bankruptcy experts—an attorney with expertise in the tax aspects of corporate bankruptcies and a bankruptcy law professor and former attorney who previously served as a federal bankruptcy judge—and incorporated their technical feedback on the documents. We also worked with a GAO methodologist to pretest our case review protocols and data collection instruments on a review of a select sample cases from the matched list to ensure our review process could collect reliable data between different reviewers. To obtain bankruptcy case documents to review, we used court filings obtained from PACER exclusively and did not rely on other data sources. PACER is an electronic public access service provided by the Federal Judiciary that allows users to obtain case and docket information online from federal appellate, district, and bankruptcy courts. Case documents are available on PACER as they are filed or entered into the court’s case system. Based on our case review protocol, we reviewed (where available), the court docket, case summary, bankruptcy petition, first day motions, management affidavit, schedule of assets and liabilities, statement of financial affairs, court-approved disclosure statement, court- approved plan (of reorganization or liquidation), and settlement agreements, among other documents with information relevant to executive retirement plans and their expected resolution in bankruptcy. We reviewed cases based on documents available in PACER between April and May 2018. Our review of 151 cases (30 Chapter 7 and 121 Chapter 11) from the matched lists resulted in 38 Chapter 11 cases where we identified executive retirement plan benefits in existence at or around the time of company bankruptcy and were able to determine the expected resolution of those benefits for employees as a result of the bankruptcy proceeding. As part of our review, we excluded cases if: (1) we were unable to confirm the presence of an executive retirement plan through review of court documents, (2) the case did not have a court-approved disclosure statement with estimated recovery percentages for various creditor classes in the case docket, or (3) if the case was open (i.e., not terminated) and had a reorganization or liquidation plan confirmed on or after May 2016, about 2 years from the start of our review. For the foregoing reasons, we were unable to identify expected outcomes in any of the Chapter 7 cases reviewed. For Chapter 11 cases, we were unable to ascertain actual outcome information for any of the cases we reviewed, but based the expected outcome of the executive retirement plan benefits on estimates provided in the court-approved disclosure statement, bankruptcy plan (reorganization or liquidation), or settlement agreement, which may differ from actual recoveries. To determine the expected resolution of executive retirement plan benefits, we reviewed case filings for evidence of specific treatment provided to employees with these claims. To the extent we did not find evidence of specific treatment for executive retirement plan benefits, we relied on estimated recovery information for the class of general unsecured creditors. Because the nature of bankruptcy proceedings depends on the facts and circumstances of each individual cause, the results of our analysis are not generalizable but provide illustrative examples of the potential outcomes of such cases. We reviewed selected court cases related to employee eligibility in executive retirement plans as identified by DOL, industry experts, and other literature. We also reviewed executive retirement plan surveys produced by industry firms, including plan sponsor organizations, benefit consultancies, record keepers, and other plan providers. We also interviewed representatives from many of these organizations regarding the use of executive retirement plans and determined that their survey data generally accorded with these discussions. We found the data to be sufficiently reliable for our purposes. In addition to the contact named above, the following individuals made important contributions to this report: Tamara Cross (Assistant Director), David Lin (Analyst-in-Charge), Ted Burik, Dan Powers, and David Reed. Also contributing to this report were James Bennett, Joanna Berry, Colenn Berracasa, Sherwin Chapman, Nina Daoud, Sarah Gilliland, Laura Hoffrey, Angie Jacobs, Kirsten Lauber, Ted Leslie, Avani Locke, Sheila R. McCoy, James R. McTigue Jr., Jeffrey Miller, Ed Nannenhorn, Oliver Richard, Marylynn Sergent, Frank Todisco, Walter Vance, Kathleen Van Gelder, and Adam Wendel.", "summary": "Some types of employers offer executive retirement plans to help select employees save for retirement. There are no statutory limits on the amount of compensation that executives can defer or benefits they can receive under these plans. However, employees in these plans do not receive the full statutory protections afforded to most other private sector employer-sponsored retirement plans, such as those related to vesting and fiduciary responsibility, among other things. These plans can provide advantages but they also have disadvantages because plan benefits are subject to financial risk, such as in a company bankruptcy. GAO was asked to review these plans. This report examines, among other objectives, (1) the prevalence, key advantages, and revenue effects of executive retirement plans and (2) how federal oversight protects benefits and prevents ineligible participation. GAO analyzed industry-compiled Securities and Exchange Commission plan data for 2013 to 2017 (the most recent data available at the time of our analysis); reviewed relevant federal laws, regulations, and guidance; and interviewed officials from IRS and DOL, among others. Executive retirement plans allow select managers or highly compensated employees to save for retirement by deferring compensation and taxes. As of 2017, more than 400 of the large public companies in the Standard & Poor's 500 stock market index offered such plans to almost 2,300 of their top executives, totaling about $13 billion in accumulated benefit promises. Top executives at large public companies generally accumulated more plan benefits than top executives at the smaller public companies in the Russell 3000 stock market index. Advantages of these plans include their ability to help executives increase retirement savings and potentially reduce tax liability, but the plans come with risks as well. To receive tax deferral, federal law requires the deferred compensation to remain part of a company's assets and subject to creditor claims until executives receive distributions (see figure). Department of Treasury officials and industry experts said executive retirement plans can be tax-advantaged and may have revenue effects for the federal government; however, the revenue effects are currently unknown. The Internal Revenue Service (IRS) oversees executive retirement plans for compliance with federal tax laws. For example, IRS must ensure that key executives are taxed on deferred compensation in certain cases where that compensation has been set aside, such as when a company that sponsors a qualified defined benefit retirement plan is in bankruptcy. However, IRS audit instructions lack sufficient information on what data to collect or questions to ask to help its auditors know if companies are complying with this requirement. As a result, IRS cannot ensure that companies are reporting this compensation as part of key executives' income for taxation. The Department of Labor (DOL) oversees these plans to ensure that only eligible employees participate in them since these plans are excluded from most of the federal substantive protections that cover retirement plans for rank-and-file employees. DOL requires companies to report the number of participants in the plan; however, the one-time single page filing does not collect information on the job title or salary of executives or the percentage of the company's workforce participating in these plans. Such key information could allow DOL to better identify plans that may be including ineligible employees. Without reviewing its reporting requirements to ensure adequate useful information, DOL may continue to lack insight into the make-up of these plans and will lack assurance that only select managers and highly compensated employees are participating. GAO is making four recommendations, including that IRS improve its instructions for auditing companies that offer these plans, and that DOL consider modifying reporting by companies to better describe participants in these plans. IRS and DOL neither agreed nor disagreed with our recommendations.", "document_type": "gao"}
{"report": "Key requirements related to improper payments during the period of our audit were included in IPIA, OMB M-18-20, and OMB Circular A-136. Federal agencies were required to take various steps regarding improper payments under IPIA and as directed by OMB M-18-20. The steps include the following: 1. Review all programs and activities and identify those that may be susceptible to significant improper payments (commonly referred to as a risk assessment), 2. For those programs and activities that agency risk assessments, OMB, or statute identifies as being susceptible to significant improper payments, agencies should develop statistically valid improper payment estimates, as well as analyze the root causes of improper payments and develop corrective actions to reduce them, 3. Report on the results of addressing the foregoing requirements. According to OMB officials, agencies are responsible for maintaining the documentation to demonstrate that these steps, if applicable, were satisfied. Figure 1 illustrates these steps, as well as the major components of conducting an improper payment risk assessment. IPIA required that agencies conduct improper payment risk assessments for all federal programs and activities at least once every 3 years and identify any program or activity that may be susceptible to significant improper payments. OMB M-18-20 provides guidance for implementing the IPIA requirements and covers agencies’ responsibilities for improper payment risk assessments, estimation, and reporting. According to the OMB guidance, agencies must institute a systematic method of reviewing all programs and activities to identify those that may be susceptible to significant improper payments. This systematic method can be a quantitative evaluation based on a statistical sample or a qualitative method, such as a risk-assessment questionnaire. Regardless of which method of review is used, IPIA required agencies to consider seven risk factors during the risk assessment. (See table 1.) OMB is also required to designate a list of high-priority programs for greater levels of oversight and review. The threshold for high-priority program determinations for fiscal year 2018 reporting and subsequent years is $2 billion in estimated improper payments, regardless of the improper payments rate estimate. In addition, OMB may determine that a program is high-priority for reasons other than exceeding the $2 billion threshold. High-priority programs are subject to additional requirements, such as submitting information about semi-annual or quarterly actions taken to reduce improper payments that can be used as a tool for tracking progress. According to OMB M-18-20, another fundamental requirement that agencies must meet is to recover any federal dollars that are a monetary loss to the government, unless legislation specifically prevents such recovery. Specifically, the Improper Payments Elimination and Recovery Improvement Act of 2012 (IPERIA) requires any program that expends at least $1 million during the year to implement payment recapture audits, if cost-effective to the agency, in order to recover improper payments. The requirement to conduct payment recapture audits applies to all agencies regardless of whether they have a program susceptible to significant improper payments. A payment recapture audit is a review and analysis of an agency’s or program’s accounting and financial records, supporting documentation, and other pertinent information supporting its payments, that is specifically designed to identify overpayments. It is not an audit that is performed in accordance with government auditing standards. OMB M-18-20 also states that for high-priority programs the agency shall report any action it has taken or plans to take to recover improper payments and intends to take to prevent future improper payments. If an agency has determined that performing payment recapture audits for any applicable program or activity is not cost-effective, a justification for that determination must be reported. Further, OMB M-18-20 states that agencies should report a justification for that determination through AFRs, Performance Accountability Reports, or in the format required through data requests from OMB. DOE’s 15 field Chief Financial Officers, in cooperation with DOE contracting officers, are responsible for overseeing contractor and other activities in the field, and they assist the OCFO in implementing improper payment reporting requirements. The OCFO issues Annual Payment Integrity Requirements and Guidance that transmits DOE’s instructions for meeting improper payments reporting and recapture requirements prescribed by OMB M-18-20. This guidance includes instructions for completing an attached template for reporting risk assessments and improper payments and payment recapture information. Using this template, 48 payment reporting sites provide information that is the basis for DOE’s department-wide improper payment risk assessment and reporting. These payment reporting sites consist of four types of federal entities and two types of contractors. (See appendix I for more information about DOE’s payment reporting sites.) In addition to the completed template, sites are directed to submit a signed certification that attests to the accuracy of the improper payment information and risk assessment and, if applicable, a justification for why payment recapture audits were not conducted. The OCFO completes a quality assurance checklist for each site and consolidates and reports the data as one program in DOE’s annual AFR. DOE reports on its improper payments 1 year in arrears; meaning, for example, that DOE’s fiscal year 2019 AFR included information on its improper payments identified in fiscal year 2018. In addition to reporting payment recovery information, as required by OMB Circular A-136, DOE has optionally reported some information it collected about improper payments that it identified at the time of the AFR issuance each year for fiscal years 2015 through 2019. (See table 2.) Specifically, DOE reported the amount of improper payments that had been made and identified in the preceding year—not based on a statistically valid estimate of improper payments but, rather, on reported amounts of known improper payments from individual payment reporting sites. DOE also reported improper payment rates that it calculated based on these reported amounts. DOE was not required to report a statistically valid estimate of improper payments in its AFRs because it determined it was at low risk of susceptibility to significant improper payments. See appendix II for additional details about improper payments in the data that DOE collected from the sites. In previous years, DOE reported statistical estimates of its improper payments. Specifically, DOE’s Performance and Accountability Reports and AFRs from fiscal years 2004 and 2007 through 2011 indicated that DOE used statistical sampling to produce projected improper payment estimates for certain payment categories. During these years, DOE reported estimated improper payment rates of less than 1 percent in these categories. However, in 2012 the DOE OIG determined that the estimated improper payment rate presented in DOE’s fiscal year 2011 AFR was not based on a statistical method. According to OCFO officials, DOE discontinued the use of statistical sampling to produce estimates in fiscal year 2012 because it was not required to do so, due to DOE’s determination that it was at low risk for significant improper payments. Since 2012, the DOE OIG has found DOE to be compliant with requirements for improper payment reporting and risk assessments as part of its required review. Specifically, the DOE OIG reported each year that DOE met the requirements for publishing improper payment information in its AFRs and performed the required risk assessments. According to an OIG official, the OIG is not required to perform evaluative procedures to determine the adequacy and completeness of DOE’s risk assessment and reporting in its AFR, and they have not optionally performed these procedures. The DOE OIG and other federal agencies or external audit organizations conduct periodic incurred cost audits and assessments of DOE’s cost- reimbursement contracts. The purpose of incurred cost audits is to determine whether such incurred costs are reasonable; applicable to the contract; allowable under generally accepted accounting principles and cost accounting standards applicable in the circumstances; and not prohibited by the contract, statute, or regulation. If, as a result of these audits or assessments, improper payments are identified—such as reimbursements for costs determined to be unallowable under the contract—DOE will question these costs, indicating that there is a possibility the costs are improper. DOE may then negotiate or otherwise work with the contractor to resolve the questioned costs. Sometimes, this can result in DOE recovering funds. According to DOE’s fiscal year 2019 annual payment integrity requirements and guidance, for the purpose of improper payment reporting, a questioned cost is not deemed an improper payment until it has been determined by the contracting officer to be unallowable. In addition, investigations conducted by DOE OIG, the Department of Justice, and other federal agencies may identify potentially unallowable DOE payments. Upon their resolution, these investigations may find such DOE payments to have been improper. According to OIG officials, improper payments identified through OIG investigations may be recovered through civil or administrative processes, and some of the improper payments identified through OIG investigations may lead to government-run criminal investigations. OCFO officials told us that recovered amounts may differ from the monetary loss associated with the original payments because of fees or fines, among other reasons. IPERIA requires agencies to include all identified improper payments in their reported estimate, regardless of whether the improper payment has been or is being recovered. According to DOE’s fiscal year 2019 annual payment integrity requirements and guidance, if the terms of a settlement require repayment to DOE, then the settlement amount would be considered an unallowable cost. Furthermore, the 2019 guidance states that due to the timing of when a settlement is reached, it is not possible to report these costs as an improper payment in the current year of reporting. Beginning in fiscal year 2018, DOE reported information in its AFR on improper payments made in prior years that were identified for recapture in the current reporting year. For example, in its fiscal year 2018 AFR, DOE reported that $92.69 million in prior years’ improper payments had been identified for recapture in fiscal year 2017. Similarly, in its fiscal year 2019 AFR, DOE reported $14.18 million in prior-year payments identified for recapture in fiscal year 2018. DOE’s reporting sites generally identify prior years’ improper payments identified for recapture through audits and investigations, among other strategies. DOE did not provide information on the years in which the prior-year improper payments were made, and the prior year improper payments identified for recapture were reported separately but not included in DOE’s reported improper payment amount and rate in any of its AFRs. The improper payment amounts that DOE reported in its AFRs for fiscal years 2015 through 2019 may not be accurate or complete and are likely understated, for two key reasons. First, we found that some DOE payment reporting sites did not correctly identify, track, and report their improper payments. Second, DOE reported improper payment amounts and rates for the current year, but did not report that the amounts and associated rates do not include a substantial amount of improper payments that may be identified in the years following the year in which the payment took place. The information in DOE’s AFRs for fiscal years 2015 through 2019 may not be accurate or complete, in part because DOE does not ensure that payment reporting sites correctly identify, track, and report their improper payments to the OCFO. Our review of documentation and interviews with officials at the selected payment reporting sites found some instances in which payment reporting sites’ processes for identifying and tracking improper payments did not always result in accurate and complete financial reporting as required. Specifically, we identified the following errors in reporting improper payments to the OCFO at three of the 10 sites we selected for review: Officials at one site told us that they resolve a portion of their improper payments by adjusting future invoices to account for the error. Site officials told us that in such cases, they do not track or report the amounts to the OCFO as improper payments. While adjusting future invoices is an efficient way to recapture improper payments, not tracking such adjustments as improper payments results in understated improper payments reported to the OCFO. The total amount of the understatement of these improper payments is not known. In addition, the site may have overstated other improper payments. In particular, site officials told us that they were unsure whether some of the annual adjustments from its indirect cost reconciliation process were reported as improper payments, even though OCFO officials told us that such adjustments are routine and are not considered improper payments. This could have resulted in an overstatement of improper payments, but the amount overstated is unknown. Officials at another site told us that they mistakenly included almost $1 million in questioned costs in their fiscal year 2017 improper payment reporting to the OCFO. Because questioned costs are not considered improper until they are determined to be unallowable, this means that the site overstated its improper payments by almost $1 million for that year. Additionally, this site subtracted its underpayments from its overpayments for its fiscal year 2015 reporting, resulting in an understatement of improper payments. Improper payments, regardless of whether they are over- or underpayments, should be added together and not netted, as both amounts are considered improper. Officials at the site told us that these issues had been corrected as of fiscal year 2018. Officials at a third site told us that they do not closely track underpayments and cannot state with certainty that all underpayments are included in the site’s annual improper payments report. The site therefore may be understating its improper payments each year. DOE’s Financial Management Oversight order states that financial management processes must include procedures and methods for ensuring that financial managers provide accurate, relevant financial reporting to customers, such as Congress and OMB. Additionally, federal internal control standards state that management should implement control activities through policies, including documenting policies in the appropriate level of detail to allow management to effectively monitor the control activity. However, not all of the payment reporting sites have fully documented their procedures for correctly identifying, tracking, and reporting their improper payments or ensuring the quality of their data, in part because there was no requirement to do so. Specifically, officials from all 10 selected payment reporting sites we interviewed told us they have procedures for tracking their identified improper payments. However, three of the 10 selected sites had not documented their procedures and two sites had documented some of their procedures but not others, including two of the sites mentioned in the examples above. By requiring payment reporting sites to document their procedures for identifying, tracking, and reporting their improper payments to ensure the quality of their data, the OCFO could better ensure that each payment reporting site maintains consistent procedures and provides comparable information about that site’s improper payments over time. Furthermore, the OCFO cannot ensure that sites are correctly identifying, tracking, and reporting improper payments and ensuring the quality of their data because the OCFO does not have a process to monitor that sites have documented—and are implementing—procedures to do so. The OCFO has taken some steps to help ensure the quality of the improper payments data that the sites report to the OCFO. For example, OCFO officials said they confirm that sites provide accurate information by requiring sites to self-certify the accuracy and completeness of the data, but does not take steps to verify the certification. Further, four of the five contractor payment reporting sites we interviewed told us the DOE field sites that oversee the contractors review the contractors’ submissions before sending the information to the OCFO; OCFO officials told us that the field sites do not formally approve these submissions. Additionally, OCFO staff complete a quality assurance checklist for each site’s submission. The checklist contains a series of questions to determine whether a site has submitted the required documentation and whether certain elements of that documentation are complete. OCFO quality assurance reviews also include simple mathematical checks for internal consistency, such as ensuring that the amount for total identified improper payments is the same across multiple tables. These steps, however, are not sufficient to ensure that sites are correctly identifying, tracking, and reporting improper payments and ensuring the quality of their data. For example, the quality assurance checklist does not include any tests to verify the accuracy of the procedures sites used to generate that data to ensure the sites’ data are reliable. By developing a monitoring process to ensure that payment reporting sites have developed and implemented procedures for identifying, tracking, and reporting their improper payments to the OCFO and ensuring the quality of their data, the OCFO could better ensure that the information it reports about improper payments in its AFR is accurate and complete. The amount of current year improper payments DOE reports in each fiscal year, as well as the improper payment rate DOE calculates based on this amount and reports in its AFRs, is not accurate or complete because it does not disclose that there are additional improper payments that are (1) not identified or that DOE’s OCFO is not aware of until a later date, or (2) potential improper payments that may be identified at a later date. Additionally, DOE does not conduct payment recapture audits, which may identify additional improper payments that could be recovered. DOE identifies many of its improper payments after the end of the fiscal year in which the payments occur and does not identify some improper payments until several years after they occur. These improper payments are identified through processes such as post-payment reviews, audits and assessments, and investigations that do not conclude until after the end of the fiscal year in which DOE made the payments. As a result, there is a known lag in identifying certain improper payments. The current year improper payment amount and associated rate DOE reported in its AFR excludes any improper payments that are identified after the end of the fiscal year in which the payments occurred. For example, in its fiscal year 2018 AFR, DOE reported $32.86 million of current reporting year (fiscal year 2017) improper payments, with an associated improper payment rate of 0.09 percent. In its fiscal year 2018 AFR DOE also reported $92.69 million of improper payments made earlier than fiscal year 2017; however DOE did not disclose that the amount of improper payments originally reported for any prior fiscal year had subsequently increased as a result of improper payments identified after the end of the fiscal year. While it is not possible for DOE to report on the specific amount of improper payments it has not yet identified, DOE also did not disclose in its fiscal year 2018 AFR that it expected to complete audits and investigations in subsequent years that could increase the amount of improper payments reported for fiscal year 2017. See figure 2 for categories of improper payments and the extent to which they are included in DOE’s improper payment amount and rate. Specifically, the OCFO excludes some known improper payments from the annual amount and associated rate it reports in its AFRs for the following reasons: Post-payment reviews may not conclude in the same fiscal year the reviewed payments were made. We have previously found that DOE identifies some improper payments through post-payment reviews. For example, DOE has not required its contractor payment reporting sites—most of which are M&O contractors—to submit invoices before DOE makes payments; instead DOE uses a “payments cleared funding arrangement,” which authorizes the contractors to withdraw funds directly from federal accounts. OCFO officials told us that improper payments made by DOE to contractors without such an agreement would be reported by the responsible federal site, and improper payments made by M&O contractors would be reported by the M&O contractor. DOE policies and procedures do not require that DOE site officials monitor M&O contractor withdrawals to determine the appropriateness of their incurred costs. DOE officials do not review M&O contractor withdrawal of funds to determine the appropriateness of M&O contract costs, and thus can only identify improper payments associated with these contracts through post-payment reviews of contractor costs that may occur after the end of the fiscal year. However, such post-payment reviews, such as monthly or quarterly reviews of invoices, may not identify certain improper payments— including improper payments that occurred late in a given fiscal year—leading DOE to exclude them from their annual reported improper payment amount and associated rate. For example, according to a document describing improper payments that one selected payment site reported to the OCFO, the site identified about $103,000 in fiscal year 2016 improper payments associated with travel during that same fiscal year. Additional reviews of fiscal year 2016 travel payments conducted in fiscal year 2017 identified further improper payments for travel of more than $35,000. Because the contractor identified these additional travel payments as improper through quarterly reviews that did not conclude until after the end of fiscal year 2016, this increase of about 35 percent in the site’s known improper travel payments was not included in the OCFO’s reported improper payment amount or rate for that year. In our March 2017 report, we recommended that DOE help ensure that necessary data are available to employ data analytics—which can identify improper payments more quickly than post-payment reviews can, increasing the likelihood that DOE will include them in its reported amount and rate for each fiscal year—as a tool to perform contractor cost-surveillance activities. Specifically, we recommended that DOE require contractors to maintain sufficiently detailed transaction-level cost data that are reconcilable with amounts charged to the government, including (1) cost data that, at a minimum, represent a full data population; and (2) the details necessary to determine the nature of each cost transaction. DOE disagreed with the recommendation. According to DOE officials, DOE is now developing plans to begin to use data analytics in fiscal year 2021. We continue to believe it is important for DOE to employ data analytics as a cost surveillance tool so DOE can better identify improper payments to its contractors in a timely manner and look forward to reviewing DOE’s plans and actions to address our prior recommendation. Audit coverage of DOE payments is limited, and some audits are not completed until several years after the audited payments were made. As we also found in March 2017, DOE uses incurred cost audits and assessments to identify contractors’ improper payments. However, our review of DOE OIG and other external entities’ audits and assessments of incurred costs for DOE’s 24 largest contractors for this report shows that, historically, these audits are infrequent and may occur several years after the costs have been incurred. For example, our updated analysis shows that as of September 2019, only about $25 billion—or 23 percent—of the nearly $108 billion in costs incurred during fiscal years 2014 through 2018 by DOE’s 24 largest contractors had been audited or assessed (see table 3). Although there is no requirement for how often contractors should be audited, the Contract Disputes Act of 1978 imposes a 6-year statute of limitations for the government to seek recovery of unallowable costs that could be identified through audits. According to our review of DOE reporting and documentation, known DOE improper payments amounts for a given fiscal year can increase in later years as more costs are audited. For example, one payment reporting site reported to the OCFO nearly $164,000 in improper payments made and identified in fiscal year 2017, and OCFO included this amount in the improper payment rate it reported in its fiscal year 2018 AFR. According to site documentation, the same site also identified, as the result of an audit in fiscal year 2017, an improper payment of nearly $920,000 that had occurred in a prior year. This improper payment was substantially more than the total amount of improper payments that the site reported in the fiscal year 2018 AFR. However, because the improper payment occurred prior to fiscal year 2017, the OCFO did not include it in its current year improper payment amount or rate for any fiscal year. For fiscal year 2020, DOE’s OIG has planned several assessments of costs the contractors incurred in prior fiscal years. However, contractor costs the OIG plans to review in the fiscal year 2020 planned assessments were incurred as early as fiscal year 2015. Therefore, any improper payments identified through the planned assessments will not be included in DOE’s reported improper payment rate using the current reporting methods and will instead be included in an overall lump sum amount of prior year improper payments, which has no effect on DOE’s reported improper payment rate. DOE does not track questioned costs centrally, and such costs can take several years to resolve. Audits and assessments can identify questioned costs that require additional review before they are either allowed or deemed improper. In its Semiannual Report to Congress, DOE’s OIG reported nearly $700 million of unresolved, questioned costs identified through its own audits and investigations as of September 30, 2019. Our analysis of the DOE OIG’s reporting found that a substantial portion of questioned costs the OIG identified were ultimately determined to be allowable once they were resolved; however, our analysis also found that DOE has not consistently resolved questioned costs in a timely manner. For example, some of the questioned costs that the DOE’s OIG identified—such as potential state gross receipts tax overpayments of $15.1 million that a DOE payment site made in fiscal years 2010 and 2011—have remained unresolved for nearly a decade. Large amounts of unresolved costs reported by DOE’s OIG add uncertainty about the completeness of the OCFO’s improper payment reporting. Moreover, the nearly $700 million of unresolved questioned costs that the DOE OIG reported does not include questioned costs identified through external audits of non-M&O contractors, such as those conducted by the Defense Contract Audit Agency or nongovernmental entities. Questioned costs identified through these external audits can be substantial, like those the DOE OIG has reported. For example, a 2017 incurred cost audit of a DOE contractor’s fiscal year 2010 costs conducted by an external firm identified nearly $280 million in questioned and unresolved DOE payments to the contractor. In November 2019, DOE officials told us that these questioned payments were resolved when DOE reached a settlement agreement with the contractor. DOE disallowed $34 million of the questioned costs as part of the settlement agreement, according to DOE officials. DOE’s Financial Management Oversight order states that financial management processes must include procedures and methods for ensuring that financial managers provide accurate, relevant financial reporting to customers. DOE customers include Congress and OMB. Additionally, federal internal control standards state that management should implement control activities through policies, including documenting policies in the appropriate level of detail to allow management to effectively monitor the control activity. According to OCFO officials, DOE does not have a mechanism for tracking questioned costs identified through external audits. Instead, OCFO officials said they rely on payment reporting sites to track these costs to resolution. However, the office does not require payment reporting sites to document policies for such tracking. DOE officials from two selected sites told us that their sites do not have policies for tracking questioned costs identified through external audits, including questioned costs that may later be deemed improper. As a result, the OCFO may not be aware of all potentially improper payments identified through external audits or know the status of their resolution. Without a requirement for sites to have policies to track questioned costs to their resolution, the OCFO cannot ensure that payment reporting sites are tracking—and ultimately reporting—all improper payments, and thus cannot ensure that it is including all improper payments in the amount it reports as actual in its AFRs. Investigations that identify DOE improper payments may not conclude until years after the payments were made. Investigations by DOE’s OIG, the Department of Justice, and other federal agencies can also identify DOE improper payments. However, similar to improper payments identified through audits, these improper payments—which can be substantial—may not be identified until years after they occur due to the length of time it takes to investigate and resolve criminal, civil, or administrative cases. For example, in fiscal year 2018, DOE reported $60.6 million of improper payments identified through a fiscal year 2017 settlement with a contractor. DOE made some of these improper payments as early as 2001. Also, in fiscal year 2018, a DOE payment site reported that no improper payments were made or identified in fiscal year 2017, but the site reported a $4.6 million prior-year improper payment associated with a subcontractor’s false claims that were settled with the subcontractor in fiscal year 2017. The OCFO reported these two cases, along with other DOE improper payments identified through investigations, as lump sum prior-year improper payments identified for recapture in its fiscal year 2018 AFR. However, the OCFO did not include these known improper payments in the improper payment amounts used to calculate its improper payment rates for the years in which DOE incurred the disallowed costs. Furthermore, some DOE improper payments are not reported as current or prior-year improper payments because the investigations of the payments were resolved in a manner that prevented DOE from formally considering the payments improper. For example, in 2015, DOE’s OIG reported that a company received a loan guarantee of more than $500 million from DOE after it “provided the Department with statements, assertions, and certifications that were inaccurate and misleading, misrepresented known facts, and, in some instances, omitted information that was highly relevant to key decisions in the process to award and execute” the loan guarantee. The company later declared bankruptcy and did not repay the loan. However, because DOE did not determine this payment to be improper through a legal case or any other process, the $500 million of known monetary loss was not included in DOE’s improper payments reporting in its AFR for any fiscal year. Also, in fiscal year 2017, DOE excluded a six- figure settlement with an outside party from its improper payment reporting. OCFO officials told us that they excluded payments associated with this case from their office’s reporting due to certain aspects of the settlement agreement. DOE’s Information Quality Guidelines state that information disseminated to the public, such as information on improper payments reported in DOE’s AFRs, should be presented in an accurate, complete, unbiased, and clear manner and should be useful to the intended users of the information. As previously noted, agencies with programs that are susceptible to significant improper payments—defined to include improper payments exceeding $100 million in a year—are required to develop improper payment estimates and corrective action plans. However, the OCFO cannot determine whether improper payments in a given year exceeded the $100 million threshold because the OCFO does not track information on the year that payments were made for all known improper payments for a given fiscal year—including improper payments identified in later years through resolution of questioned costs or conclusions of audits or investigations. By tracking information on the year the payment occurred for all improper payments identified, to include those identified in later years, and determining and disclosing in its AFR whether improper payments in a given year exceeded the $100 million threshold, DOE could better inform Congress, OMB, and the public about whether it has made significant improper payments. Additionally, DOE sites perform some payment recapture activities, but does not conduct payment recapture audits, which could identify additional improper payments that could be reported, and potentially recovered. As previously discussed, IPIA required any program that expended at least $1 million annually to conduct payment recapture audits, if cost-effective to the agency, or to provide justification if such audits are determined not to be cost-effective. A payment recapture audit is a review and analysis of an agency’s or program’s accounting and financial records, supporting documentation, and other pertinent information supporting its payments, that is specifically designed to identify overpayments. As such, payment recapture audits are tools to identify improper payments, in addition to an avenue for recovering those overpayments. DOE included a justification for its decision not to conduct payment recapture audits in its AFRs for fiscal years 2015 through 2019. For example, in its fiscal year 2019 AFR, DOE cited its improper payment rate of 0.09 percent and recapture rate of 97 percent to support the department’s determination that it was not cost-effective to perform payment recapture audits. DOE also cited other activities it employed to identify and recapture improper payments, such as prepayment review and approval of invoices, post-payment reviews, contractor internal audits, results of cost allowability audits of integrated contractors, and results from travel audits, among others. The OCFO fiscal year 2018 payment integrity guidance included a list of seven criteria that sites were to use to determine whether payment recapture audits are cost-effective. For fiscal year 2018, 42 of DOE’s 48 payment reporting sites submitted a justification stating that it would not be cost-effective to employ payment recapture auditors. Our review of the 42 justifications found that the quality of the justifications varied by site. We found that 40 of the 42 justifications did not demonstrate consideration of any of the seven criteria in support of their determinations that payment recapture audits would not be cost- effective. One DOE field site’s justification included three bullet points, as shown in figure 3, none of which aligned with the criteria. The OCFO uses a quality assurance checklist to review payment sites’ improper payment reports that includes verifying that the site submitted a justification and that the justification is “adequate.” The checklist does not define “adequate,” and the OCFO approved all of the justifications submitted, even those that did not demonstrate consideration of any of the seven criteria from the payment integrity guidance. DOE’s Financial Management Oversight order states that financial management processes must include procedures and methods for ensuring that financial managers provide accurate, relevant financial reporting to customers. Furthermore, under OMB M-18-20, agencies are required to recover any federal dollars that are a monetary loss to the government, unless legislation specifically prevents such recovery. By clarifying guidance to define the factors for assessing the adequacy of the justifications, and reviewing sites’ justifications for not performing or arranging for payment recapture audits, DOE could better ensure that the justifications it reports have a sound basis and that DOE is not missing opportunities to identify and recover improper payments. Additionally, DOE may be missing opportunities to recover federal dollars that are a monetary loss to the government, as required under OMB M- 18-20, because it has not evaluated whether sites could identify additional improper payments through payment recapture audits. Our analysis of information provided by DOE shows that in fiscal year 2003 the department conducted payment recapture audits and that the improper payments identified through these audits far exceeded the costs of conducting the audits. According to OCFO officials, the information on payment recapture efforts was from a payment recapture audit at one site; it was not an OCFO recovery audit program. The OCFO officials reiterated that the majority of the payment reporting sites have not performed payment recapture audits because they believe existing efforts are effective in recovering identified improper payments. However, payment recapture audits are designed to identify additional improper payments not previously identified. By evaluating whether it could identify enough additional improper payments to make payment recapture audits cost-effective, such as performing audits at a limited number of sites, DOE would have an opportunity to identify and recover additional improper payments or have better information to justify that payment recapture audits are not cost-effective. In its fiscal year 2018 improper payment risk assessment, DOE assessed its risk of susceptibility to significant improper payments as low. However, DOE did not provide sufficient documentation to support how it conducted its risk assessment and made this low-risk determination. Consequently, we could not determine if the process DOE used to perform its improper payment risk assessment provided a reasonable and reliable basis for making its risk determination. DOE’s process to conduct its fiscal year 2018 risk assessment may not be adequate to support its low-risk determination of susceptibility to significant improper payments. DOE has a decentralized process for conducting its statutorily required improper payment risk assessment every 3 years. For fiscal year 2018, DOE developed and provided each payment reporting site with an improper payment risk assessment template to complete. DOE directed all of its payment reporting sites to consider the seven risk factors listed in IPIA, as well as four additional risk factors that DOE developed. Table 4 lists the additional DOE-developed risk factors that sites were to consider in their risk assessments. DOE’s improper payment risk assessment template included a variable scale for rating each of the risk factors. The OCFO provided guidance instructing payment reporting sites to, when populating the template, consider the site’s exposure to the risk factors and to rate them by applying a numerical score to each risk factor. Each payment site totaled its numerical scores to calculate the site’s overall level of susceptibility to significant improper payments. DOE then consolidated all of the payment site assessments into an overall department-wide risk assessment. However, DOE could not explain, and did not provide us documentation to support, its rationale for the variable scales used to score such risk factors in its fiscal year 2018 assessments—both in the 10 payment-site risk assessments we reviewed and in DOE’s department-wide risk assessment—and how the scores assigned for each risk factor affected DOE’s susceptibility to significant improper payments. As a result, we could not determine if DOE’s process for conducting its fiscal year 2018 improper payment risk assessment provided a reasonable basis for DOE’s overall risk determination. Furthermore, the OCFO weighted all of the payment reporting sites equally in terms of overall risk when it aggregated the risk ratings into an overall assessment of susceptibility to significant improper payments. However, DOE did not provide an explanation or documentation of why the sites were weighted equally in the overall department-wide improper payment risk assessment, even though the payment types and dollar amounts of outlays processed by the sites varied widely. For example, a payment site processing $3 million of outlays in fiscal year 2017 had the same weight in the aggregated assessment as a payment site processing $5.7 billion of outlays. Finally, the OCFO did not provide evidence that it considered the known lag in identifying certain improper payments as an inherent risk during its fiscal year 2018 department-wide improper payment risk assessment process. This inherent risk relates to certain limitations affecting DOE’s ability to determine the extent of improper payments until several years after they occur, such as those identified through incurred cost audits and investigations, as previously discussed. For example, in its fiscal year 2018 AFR, DOE reported that a total of $124.35 million in payments were identified for recapture during fiscal year 2017, including $31.66 million made in fiscal year 2017 and $92.69 million made in years prior to fiscal year 2017. However, DOE did not provide us documentation to support how it considered the $92.69 million in improper payments made during years prior to fiscal year 2017—which could represent an inherent risk to the department—when assessing its risk of susceptibility to significant improper payments. As discussed earlier, some of the $92.69 million of improper payments identified for recapture occurred in fiscal year 2016. Thus, the amount of fiscal year 2016 improper payments that DOE reported in its fiscal year 2017 AFR is understated. Federal internal control standards state that management should design control activities to achieve objectives and respond to risks, and should implement control activities through policies. To contribute to the effective design and implementation of such control activities, management should clearly document internal control and all transactions and other significant events in a manner that allows the documentation to be readily available for examination. Additionally, management should periodically review policies, procedures, and related control activities for continued relevance and effectiveness. Further, although OMB does not direct agencies to demonstrate how each risk factor contributes to the agency’s overall susceptibility of risk for significant improper payments, OMB M-18-20 states that if a qualitative method is used during an improper payment risk assessment, it must be designed to accurately determine whether the program is susceptible to significant improper payments. DOE may not have an adequate process to support its risk determination because it did not properly document how it developed and considered risk factors during its fiscal year 2018 risk assessment. Until DOE revises its department-level process for conducting improper payment risk assessments, it cannot ensure that the process produces a reliable assessment of whether it is susceptible to significant improper payments. Specifically, without documenting its rationale for the variable scale used to score risk factors and weighting of the payment reporting sites, and consideration of the known lag in identifying the extent of total improper payments each fiscal year to support the development of its department- level risk assessment, DOE cannot demonstrate that its process for determining its low risk of susceptibility to significant improper payments is reasonable. Addressing these issues may result in DOE determining that it is susceptible to significant improper payments, and therefore subject to additional requirements—such as developing a statistically valid estimate of improper payments and reporting on actions to reduce improper payments, including a description of the root causes, and developing corrective actions to reduce them, including program-specific improper payment reduction targets. We also found that DOE’s OCFO did not sufficiently review the reasonableness of the selected payment reporting sites’ improper payment risk assessments. When we reviewed the risk assessments of the 10 selected sites, we found a lack of consistency in how the sites applied DOE guidance, as well as inadequate documentation supporting how the sites considered improper payment risk factors. Specifically, we found that the OCFO review process did not identify instances in which these sites did not adequately support certain ratings or did not adhere to DOE instructions for completing the improper payment risk assessment template. Staff from the OCFO used a quality assurance checklist to review the sites’ fiscal year 2018 improper payment risk assessments. However, the extent to which the OCFO reviewed documentation supporting payment sites’ risk assessments is unclear. Although the reviewer guidance provided in the quality assurance checklist directs reviewers to ensure that the documentation supporting the payment site’s risk rating adequately supports the risk factor being evaluated, a payment site official told us that OCFO reviewers did not consistently request to view their supporting documentation. Eight out of 10 payment reporting sites we reviewed had documentation to support that they followed DOE’s guidance to consider the results of prior GAO and DOE OIG audit reports and OMB Circular A-123-related assessment results. However, we found that two sites did not have such documentation. One site rated itself as having no significant deficiencies despite audit reports that indicated some deficiencies and findings for that site. Another payment site did not discuss the OMB Circular A-123 assessment results in its improper payment risk assessments, despite OCFO guidance to include such results when conducting improper payment risk assessments. However, quality assurance checklists completed by OCFO staff for these two sites did not indicate that documentation supporting the sites’ consideration of these prior reports and assessments in their risk assessments was missing. Further, five of the 10 payment reporting sites we reviewed did not provide sufficient explanation or documentation supporting their ratings for several of the risk factors they considered in their improper payment risk assessment, despite instructions in DOE’s guidance to do so. For example, one site cited “discussions with team lead” as the primary source of support for its ratings assigned for several risk factors. However, the site did not have documentation to support the results of these discussions and how such discussions supported the ratings for each risk factor. Federal internal control standards state that management should design control activities to achieve objectives and respond to risks, and should implement control activities through policies. To contribute to the effective design and implementation of these control activities, management should clearly document internal controls and other significant events in a manner that allows the documentation to be readily available for examination. We also found that OCFO staff did not document any potential changes to the payment sites’ risk ratings in the 10 quality assurance checklists we reviewed. However, the process to be followed in the event OCFO reviewers find that payment site risk ratings are not reasonable is unclear because DOE has not defined and documented in its policies and procedures the process for OCFO reviewers to override these risk ratings. DOE’s Financial Management Oversight order directs business units to evaluate and assess the effectiveness of their financial management oversight activities and other internal controls, such as the OCFO’s oversight of the payment reporting sites’ risk assessments. Further, the order charges the OCFO with reviewing and analyzing activities throughout DOE to evaluate the adequacy of established policies, procedures, and standards governing accounting and related reporting functions; evaluating the performance of internal controls over those functions; and recommending corrective actions as needed. In addition, according to federal internal control standards, management should also establish and operate monitoring activities to monitor the internal control system and evaluate the results. Such monitoring includes regular management and supervisory activities, comparisons, reconciliations, and other routine actions. Additionally, management should periodically review policies, procedures, and related control activities for continued relevance and effectiveness. Further, federal internal control standards state that management should use quality information to achieve the entity’s objectives. By developing, documenting, and implementing policies and procedures to require OCFO to review documentation supporting payment site risk assessments and define the process for overriding their risk determinations, DOE would enhance its ability to adequately monitor its decentralized improper payment risk assessment process and help ensure the accuracy and reliability of payment reporting sites’ risk assessments and DOE’s assessment of overall risk of susceptibility to improper payments. DOE’s OCFO relies on its 48 payment reporting sites to provide information about improper payments that DOE reports in its AFR; however, we identified several reasons that the information in DOE’s AFRs for fiscal years 2015 through 2019 may not be accurate or complete. First, DOE’s improper payments information may not be accurate or complete because the OCFO does not require the payment reporting sites to document their procedures for correctly identifying, tracking, and reporting their improper payments. By doing so, the OCFO could better ensure that the payment reporting sites provide consistent and comparable information about their improper payments over time. Second, the OCFO cannot ensure that sites are correctly identifying, tracking, and reporting improper payments to the OCFO and ensuring the quality of their data because OCFO does not have a process to monitor that sites have—and are implementing—procedures to do so. By developing such a monitoring process, the OCFO could better ensure that the information it reports about improper payments in DOE’s AFRs is accurate and complete. Third, DOE may not be reporting additional improper payments in the form of unallowable costs claimed by some contractors because, as we have previously found, DOE policies and procedures do not require that DOE sites monitor M&O contractor withdrawals to determine the appropriateness of costs incurred by the contractor. Under this arrangement, DOE does not use prepayment reviews to determine the appropriateness of M&O contract costs and, thus, can only identify improper payments associated with these contracts through post-payment reviews that typically occur after the end of the fiscal year. We previously recommended that DOE ensure data are available to employ data analytics—which can identify improper payments more quickly than post-payment reviews can—but DOE has not fully implemented the recommendation. We continue to believe it is important for DOE to employ data analytics as a cost surveillance tool so DOE can better identify improper payments to its contractors in a timely manner. DOE only includes improper payments that occur and are identified in the same fiscal year in its reported improper payment amount and rate in the AFR. However, DOE does not identify a substantial amount of improper payments in the same fiscal year due to the known lag in identifying such payments. Audits and assessments of DOE’s contractors can identify questioned costs that require additional review before they are either allowed or deemed improper, but DOE has not consistently resolved questioned costs in a timely manner because the OCFO does not direct payment reporting sites to document policies for tracking questioned costs to resolution. Without a requirement for sites to have policies to track questioned costs to their resolution, the OCFO cannot ensure that payment reporting sites are tracking—and ultimately reporting—all improper payments, and thus cannot ensure the accuracy and completeness of improper payments reported in DOE’s AFRs. Additionally, the OCFO cannot determine whether improper payments in a given year exceeded the $100 million threshold because the OCFO does not track information about the year that payments were made for all known improper payments for a given fiscal year. By tracking and disclosing information about all improper payments identified and the year in which these payments were made in its AFR, DOE would have better information to provide to Congress, OMB, and the public about whether it has made significant improper payments. Although DOE’s sites submitted individual justifications for not completing payment recapture audits, the quality of the justifications varied and did not meet DOE requirements. By clarifying guidance to define the factors for assessing the adequacy of the justifications, and reviewing sites’ justifications for not performing or arranging for payment recapture audits to ensure that the justifications meet requirements and are supported by appropriate analysis that considers the costs and benefits of performing the audits, DOE can better ensure that the justifications it reports have a sound basis and that DOE is taking advantage of all opportunities to both identify and recover improper payments, which in turn will help reduce the monetary loss to the government. Further, DOE may be missing opportunities to recover federal dollars that are a monetary loss to the government because it has not evaluated whether sites could identify additional improper payments through payment recapture audits. DOE has concluded that based on its self-assessed low improper payment rate and recapture rate, it is not cost effective to perform payment recapture audits. By evaluating whether it could identify enough additional improper payments to make payment recapture audits cost-effective, such as performing audits at a limited number of sites, DOE would have an opportunity to identify and recover additional improper payments or have better information to justify that payment recapture audits are not cost- effective. Finally, DOE may not have an adequate process to support its risk determination because it did not properly document how it developed and considered risk factors during its fiscal year 2018 risk assessment. Until DOE revises its department-level process for conducting improper payment risk assessments, it cannot ensure that the process produces a reliable assessment of whether it is susceptible to significant improper payments. Further, the process for the OCFO to oversee the accuracy of payment site risk ratings is unclear because DOE has not defined and documented, in its policies and procedures, the process for OCFO reviewers to override a payment site’s risk ratings in the event the reviewer finds that the rating was not reasonable. By developing, documenting, and implementing department-wide policies and procedures, DOE would enhance its ability to adequately monitor its decentralized improper payment risk assessment process and help ensure that individual payment reporting sites accurately score their risk factors—leading DOE to obtain a more accurate and reliable assessment of its overall risk of susceptibility to improper payments. We are making the following nine recommendations to DOE: The Office of the Chief Financial Officer should require payment reporting sites to document their procedures for identifying, tracking, and reporting improper payments to ensure they provide consistent and comparable information about their improper payments over time. (Recommendation 1) The Office of the Chief Financial Officer should develop a monitoring process to ensure that payment reporting sites document and implement procedures that will enable them to correctly identify and report improper payments to the OCFO. (Recommendation 2) The Office of the Chief Financial Officer should require payment reporting sites to document policies for tracking questioned costs to resolution. (Recommendation 3) The Office of the Chief Financial Officer should track information on the year the payment occurred for all improper payments, regardless of when they are identified, and determine and disclose in DOE’s AFR whether the department’s total annual improper payments exceeded $100 million in any given year. (Recommendation 4) The Office of the Chief Financial Officer should clarify guidance to (1) define the factors for assessing adequacy of payment reporting sites’ justifications that conducting recapture audits would not be cost-effective, and (2) require that the Office of the Chief Financial Officer review the sufficiency of these justifications against the criteria defined. (Recommendation 5) The Office of the Chief Financial Officer should evaluate whether payment reporting sites could identify enough additional improper payments through payment recapture audits to make those audits cost- effective, such as by performing audits at selected sites. (Recommendation 6) The Office of the Chief Financial Officer should revise DOE’s department- level process for conducting improper payment risk assessments to include (1) developing and documenting the rationale for the variable scale used to score risk factors and weighting of the payment reporting sites; and (2) documenting DOE’s consideration of the inherent risk associated with the lag in identifying certain improper payments subsequent to the fiscal year they occurred to ensure that the process results in a reliable assessment of whether the department is susceptible to significant improper payments. (Recommendation 7) The Office of the Chief Financial Officer should revise DOE’s department- level policies and procedures for reviewing risk assessments submitted by payment reporting sites to require a review and approval of the documentation supporting these assessments to help ensure the accuracy of the sites’ assessments. (Recommendation 8) The Office of the Chief Financial Officer should revise DOE’s department- level policies and procedures for conducting improper payment risk assessments to define the process for overriding a payment reporting site’s risk determination, when appropriate. (Recommendation 9) We provided a draft of this report to DOE for review and comment. DOE concurred with six of our recommendations and said that it plans to complete actions from November 2020 through December 2021 to address these recommendations. DOE did not concur with three of our recommendations; however, we believe that these recommendations remain valid. DOE’s written response is reproduced in appendix III and summarized below. In addition, DOE provided technical comments, which we incorporated as appropriate. DOE did not concur with our sixth recommendation to evaluate whether its payment reporting sites could identify enough additional improper payments through payment recapture audits to make those audits cost- effective, such as by performing audits at selected sites. In response to this recommendation, DOE stated in its comments that it has an ongoing Fraud Risk Management Working Group and that officials have developed a Fraud Risk Management and Data Analytics Implementation Plan to strengthen DOE’s capability to prevent, identify, and recover improper payments and fraud. However, DOE’s plan is still in draft form, and according to DOE’s technical comments, they will not begin using data analytics until fiscal year 2021. In addition, DOE stated in its comments that existing payment recapture activities such as pre- and post-payment reviews, contractor internal audits, use of the results of cost allowability audits of integrated contractors, and interim and close-out reviews of contracts and financial assistance awards are sufficient. As we discuss in the report, DOE determined that it does not need to conduct payment recapture audits based on justifications submitted by the reporting sites. However, most of the sites’ justifications did not include consideration of the OCFO criteria for making determinations about the cost-effectiveness of conducting payment recapture audits. We continue to believe that by evaluating whether it could identify enough additional improper payments to make payment recapture audits cost-effective, such as by performing audits at a limited number of sites, DOE would have an opportunity to identify and recover additional improper payments or have better information to justify that payment recapture audits are not cost-effective. DOE did not concur with our seventh recommendation to (1) develop and document the rationale for weighting risk factors, including the weighting of all payment reporting sites; and (2) document its consideration of the inherent risk associated with the lag in identifying certain improper payments subsequent to the fiscal year they occurred to ensure that the process results in a reliable assessment of whether the agency is susceptible to significant improper payments. Regarding the weighting of risk factors, DOE said that its risk assessment evaluates the volume and dollar amount of payments by payment category, payments subject to manual controls, and fluctuations in volume and dollar amounts. We recognize that DOE’s risk assessment template asks each site to assess its risk with regard to payment amounts and fluctuations. However, we are recommending that the OCFO document the weighting of all its risk factors, including its decision to consider as equal the risks identified by all sites—regardless of the dollar amount of outlays. While assessing the risk of improper payments at an individual site is important, it does not address the intent of our recommendation. We continue to believe that, because DOE did not properly document how it developed and considered risk factors during its fiscal year 2018 risk assessment, it cannot ensure that the process produces a reliable assessment of whether DOE is susceptible to significant improper payments. Regarding the consideration of inherent risk, DOE stated in its comments that the Payment Integrity Risk Assessment directs payment reporting sites to consider inherent risk as part of DOE’s Internal Control Program. We recognize that sites are to assess the inherent risk that an improper payment may occur. However, even if none of the sites identifies the known lag in identifying improper payments as a risk, based on our review of DOE’s AFRs, this lag is a risk to DOE as a whole. Therefore, we continue to believe that DOE should document in its risk assessment process its consideration of the known lag in identifying improper payments. Finally, DOE did not concur with our eighth recommendation to revise DOE’s department-level policies and procedures for reviewing risk assessments. Specifically, we recommended a policy revision to require OCFO review and approval of documentation submitted by payment reporting sites in support of their risk assessments to help ensure the accuracy of these sites' assessments. DOE stated in its comments that sufficient processes are in place for ensuring the accuracy of payment reporting sites’ risk assessments. DOE also stated that OCFO’s Payment Integrity Guidance instructs payment reporting sites to maintain detailed information supporting risk assessments, which is available to the OCFO and DOE’s auditors upon request, and that review and approval of the documentation occurs during periodic payment reporting site visits by OCFO staff. Further, DOE stated that as part of the OCFO’s quality assurance reviews, the OCFO evaluates the documentation used to support risk assessment ratings and directs updates to risk assessments if documentation listed does not support the stated risk ratings. As we discuss in the report, five of the 10 sites we reviewed did not provide sufficient explanation or documentation supporting their ratings for several of the risk factors. This includes one site that cited “discussions with team lead” as the primary source of support for the ratings it assigned for several risk factors. We continue to believe that by developing, documenting, and implementing policies and procedures to require the OCFO to review documentation supporting payment site risk assessments, DOE would enhance its ability to adequately monitor its decentralized improper payment risk assessment process and help ensure that individual payment reporting sites accurately score their risk factors, leading DOE to obtain a more accurate and reliable assessment of its overall risk of susceptibility to improper payments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of the National Nuclear Security Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact Allison Bawden at (202) 512-3841 or bawdena@gao.gov; or Beryl Davis at (202) 512-2623 or davisbh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The Department of Energy (DOE) has 48 payment reporting sites that are responsible for conducting improper payment risk assessments and annually providing data on actual improper payments to DOE’s Office of the Chief Financial Officer (OCFO). The 48 sites consist of six types, four of which are types of federal entities and two of which are types of contractors. The four types of federal entities are Headquarters, DOE field sites, Power Marketing Administrations, and the Federal Energy Regulatory Commission. The two types of contractors are management and operating (M&O) contractor and non-M&O contractor. Table 5 lists the 48 payment reporting sites and provides the fiscal year 2017 outlays and improper payments data they reported to the OCFO for DOE’s fiscal year 2018 Agency Financial Report (AFR). The Department of Energy’s (DOE) Office of the Chief Financial Officer (OCFO) requires the payment reporting sites to provide some details about their improper payments that were not required to be included in the department’s Agency Financial Report (AFR) during the period under review. These details include information about how the improper payments were identified and the reasons why the payments were determined to be improper. As shown in figure 4, two methods accounted for most of the current year improper payments identified by DOE in fiscal year 2017: post-payment review (57.6 percent) and self-reporting (22.1 percent). As shown in figure 5, there was a broader range of reasons payments were determined to be improper in fiscal year 2017, although the majority (54.7 percent) were attributable to settlements as the result of litigation. In addition to the contacts named above, Hilary Benedict (Assistant Director), Michelle Philpott (Assistant Director), Kathy Pedalino (Analyst in Charge),Taya Tasse (Auditor in Charge), Perry Chen, Andy Furillo, Isabella Guyott, Latesha Love, Laura Pacheco, and Farrah Stone made key contributions to this report. Also contributing to this report were Kevin Bray, John Delicath, James Kernen, Jason Kirwan, Dan C. Royer, and Anne Thomas.", "summary": "Improper payments—payments that should not have been made or were made in an incorrect amount—are a significant problem in the federal government. Agencies are required to perform risk assessments to identify programs that are susceptible to significant improper payments. House Report 115-697 included a provision for GAO to review DOE's system for tracking improper payments. This report examines the extent to which (1) the amounts reported in DOE's AFRs for fiscal years 2015 through 2019 were accurate and complete, and (2) its fiscal year 2018 risk assessment provided a reasonable basis for its risk determination. GAO reviewed DOE's improper payment reporting for fiscal years 2015 through 2019 and its fiscal year 2018 risk assessment, and reviewed documents and interviewed officials from 10 of 48 reporting sites selected to provide a range of sites and about half of fiscal year 2018 reported improper payments. The improper payments amounts that the Department of Energy (DOE) reported in its annual agency financial reports (AFR) for fiscal years 2015 through 2019 may not be accurate or complete. Agencies with programs that are susceptible to significant improper payments—including those with more than $100 million of improper payments in a year—are required to report statistically valid estimates of their improper payments. DOE determined these requirements did not apply, but optionally reported information on actual improper payments it made and identified in the prior year. For example, in its fiscal year 2019 AFR, DOE reported fiscal year 2018 improper payments—such as those made to contractors for unallowable costs—totaling about $36 million, less than 0.1 percent of its outlays. However, DOE did not disclose that these amounts do not include improper payments identified through reviews, audits, and investigations completed several years after it issues its AFR (see figure). For example, as of September 2019, DOE had not audited $23.8 billion of its $38.5 billion in fiscal year 2018 outlays. Such audits may increase the improper payments in a year by millions of dollars. For example, based on a 2017 audit, DOE identified $34 million in fiscal year 2010 improper payments. DOE does not always track information on the year improper payments were made that would allow it to determine whether improper payments identified later would increase the total to more than $100 million. By tracking and disclosing such information, DOE could better inform Congress, the public, and others about whether it exceeded the $100 million threshold and should be subject to additional reporting requirements. DOE determined that its risk of significant improper payments was low in its fiscal year 2018 risk assessment. However, GAO found that the risk assessment may not provide a reasonable basis for DOE's determination. DOE did not provide sufficient documentation to support that it considered the known lag in identifying improper payments as an inherent risk, nor did it provide sufficient documentation to support its rationale for the scale it used to score risk factors or for weighting risk ratings of payment reporting sites. For example, a payment site processing $3 million of outlays had the same weight in the overall assessment as a payment site processing $5.7 billion of outlays. As a result, DOE cannot demonstrate that its low-risk determination is reasonable and that its risk assessment process produces reliable results. GAO is making nine recommendations to DOE, including to track and disclose information on improper payments identified later and determine whether these payments exceeded $100 million in any year, and to revise its risk assessment process to ensure the process has a reasonable basis and reliable results. DOE agreed with six of the recommendations, but did not agree with three recommendations, including to revise its risk assessment process. GAO maintains that the recommended actions are valid.", "document_type": "gao"}
{"report": "IRS began posting information on the internet in the 1990s. In the early 2000s, IRS launched its first two interactive services which allowed taxpayers to (1) check on the status of a refund, and (2) set up a payment plan to pay taxes they may owe over time. Since then, irs.gov has expanded to include other online services, such as personal informational accounts and tax transcript request services. In addition to online services, the irs.gov website contains information on various topics, including forms and publications offered on static web pages. While these static web pages do not provide taxpayers with personalized support or information, taxpayers seeking more targeted information may consult online calculators irs.gov offers (e.g., a tax withholding estimator). Two distinctions between these calculators and the online services our report examines are that taxpayers do not have to establish their identity before using a calculator and the calculators can be used to explore hypothetical tax planning situations. IRS reports that its website, which includes online services, static web pages, and calculators received more than 600 million visits in fiscal year 2018. With respect to taxpayer services, OLS is tasked with leading IRS’s business transformation efforts related to online services and improving the online experience for taxpayers. To improve online services for individual taxpayers, OLS primarily works with IRS’s relevant business operating divisions—Wage and Investment and Small Business/Self- Employed —which assist individual taxpayers in fulfilling their tax obligations. On the operations support side, Information Technology is responsible for delivering services and solutions related to technology and one of its responsibilities is to support IRS’s online services. IRS’s Research, Applied Analytics, and Statistics division conducts research related to taxpayer burden, which is defined as the time and money taxpayers spend complying with their tax obligations. Both Congress and presidential administrations have set the expectation that agencies provide high-quality customer service. Starting in the 1990s, they required agencies to develop plans for improving their services and regularly report on the progress they are making. In recent years, Congress and the executive branch have emphasized the importance of improving online services. In December 2018, Congress passed and the President signed the 21st Century Integrated Digital Experience Act (IDEA Act) that includes requirements for agencies when they are creating or redesigning a website or digital service that is intended to be used by the public. Among these requirements are to design the website or digital service around user needs, with data-driven analysis influencing management and development decisions, using qualitative and quantitative data to determine user goals, needs, and behaviors. The IDEA Act also requires agencies to ensure that any paper form related to serving the public is made available in a digital format by December 2020. In July 2019, the Taxpayer First Act became law. It includes a requirement that the Secretary of the Treasury (or designee) submit a comprehensive customer service strategy to Congress by July 2020 including, among other things, a plan to provide assistance to taxpayers that is designed to meet reasonable taxpayer expectations. This plan is to include online services. The act also requires this customer service strategy to identify metrics and benchmarks for quantitatively measuring progress in implementing it. Similarly, the administration has established a cross-agency priority goal called “improving customer experience with federal services” intended to improve the usability and reliability of the most important online services, which contains requirements related to IRS’s online services that will be discussed in more detail later in this report. In addition to these expectations for a high quality user experience, the GPRA Modernization Act of 2010 (GPRAMA) requires, among other provisions, strategic plans identifying Treasury’s and other cabinet departments’ and other executive agencies’ most important goals. It also requires annual performance plans that identify specific targets and reports to Congress and the public on results achieved. While GPRAMA is applicable to the department or agency level (e.g., Treasury), we have previously reported that these requirements should serve as leading practices at other organizational levels, such as component agencies, offices, programs, and projects, and are therefore applicable to IRS. IRS requires taxpayers whose income, filing status, and age fall within specified parameters to file a tax return. Taxpayers have five choices for filing a return: (1) hire a tax practitioner to file a return on their behalf with IRS, which the practitioner generally does electronically; (2) obtain tax preparation and filing services on the internet or download software, which allows for assisted preparation in addition to online filing; (3) file on paper for free; (4) use the Free File program; or (5) seek assistance from IRS’s Volunteer Income Tax Assistance or the Tax Counseling for the Elderly programs in which IRS provides funding to IRS-certified volunteers who meet in person with eligible taxpayers to help them prepare their return and the completed return is filed electronically. To encourage taxpayers to file electronically, IRS advertises that it will deliver refunds more quickly to those who file electronically than those who file on paper. In 2002, IRS signed a memorandum of understanding (which we will refer to as an agreement) with a consortium of tax preparation companies now known as Free File, Inc. Initially, the participating companies agreed to provide free electronic tax preparation and filing services for eligible taxpayers. In return, IRS stated that it would not offer its own free, online tax return preparation and filing services. This agreement has been periodically renewed, most recently in October 2018, when IRS and Free File, Inc. extended the terms of the agreement to October 2021. This requirement that IRS not offer its own online filing services has remained the same. The income limit for taxpayers to participate has evolved over time. In 2005, IRS and the consortium of tax preparation companies amended the agreement to provide for coverage for 70 percent of taxpayers based on the taxpayers’ adjusted gross income beginning in filing season 2006. They further agreed that while the percentage of taxpayers covered would remain the same throughout the agreement, the income limit for taxpayers would be adjusted each filing season. For the 2020 filing season—which IRS expects will begin in January 2020—taxpayers will be required to have an income below $69,000 and meet other eligibility requirements to use the participating companies’ preparation and filing services. For married taxpayers, the $69,000 threshold applies to their combined income if the two individuals file a joint return. Taxpayers whose income exceeds $69,000 are ineligible to use the participating companies’ software for free, but are allowed to use Free Fillable Forms (FFF), a service provided by one of the Free File, Inc. participating companies each year, with a link on irs.gov. FFFs are designed to be the online equivalent of paper forms, on which users can type information into a fillable field corresponding to each line item on the paper form. IRS.gov explains that to use FFFs, users “must know how to do your taxes yourself” and states that “only basic guidance” is provided. After a taxpayer completes the FFFs, the Free File, Inc. participating company that provides this service electronically transmits the return to IRS. IRS provides 10 online services for individual taxpayers (see table 1). We organized these online services into four categories based on common interactions between individual taxpayers and revenue agencies. IRS officials told us and we verified that all services are accessible from personal computers and nondesktop devices, such as smart phones and tablets. IRS also offers an app for mobile devices which taxpayers can use as a portal for accessing “Where’s My Refund” and for making payments. Usage across all online services in fiscal year 2018 was overwhelmingly concentrated within “Where’s My Refund?” (see figure 1). In 2018, taxpayers completed more than 300 million queries on “Where’s My Refund?”, IRS’s most used online service, attempting to determine when their anticipated refunds would arrive. To put this figure in perspective, IRS processed approximately 150 million individual tax returns and approximately 120 million individual income tax refunds in fiscal year 2018, meaning that some taxpayers are making multiple online inquiries about their refund. IRS.gov directs taxpayers to use this online service to follow up on their refund and suggests that taxpayers only call IRS in certain circumstances. “View Your Account Information” in fiscal year 2018 was IRS’s fifth most utilized online service, but it has experienced recent growth. Usage more than tripled between fiscal years 2017 and 2018. IRS has continued to add capabilities and make other improvements to “View Your Account Information” since it first launched in 2016, such as links to IRS’s online payment and transcript services. Further, officials told us in September 2019 that they plan to add information about the status of an installment agreement and additional payment history. As of October 2019, the capabilities of “View Your Account Information” focus on providing information to taxpayers about how much money they may owe IRS and payments made. For example, taxpayers who paid their full tax bill for prior tax years may log into “View Your Account Information” and see they have a $0 balance. Similarly, taxpayers who receive only refunds will log on and see a $0 balance, but not information about their refund. Officials noted that even a $0 balance may be of value to taxpayers who want reassurance that they and IRS have a common understanding of their tax situation. We identified three revenue agencies in other countries that offer online services that IRS does not: the Australian Taxation Office (ATO), New Zealand’s Inland Revenue Department (IRD), and the United Kingdom’s (U.K.) Her Majesty’s Revenue and Customs (HMRC) (see figure 2). In each of the selected countries, we found that taxpayers are offered a single online account that integrates the many different online services each revenue agency offers. As noted above, “View Your Account Information” on irs.gov provides links to other online services and taxpayers do not have to log in again to use those services. However, the remaining online services are not connected to “View Your Account Information” and taxpayers must leave the “View Your Account Information” platform to access those services. IRS officials told us that over the long term they would like to integrate additional services into “View Your Account Information,” but they explained that they have prioritized the development of new online services over connecting existing services to “View Your Account Information.” Further, IRS officials told us they also want taxpayers to be able to check their refund without having to establish an account. A second difference is that taxpayers in the three countries can complete their filing obligations on the revenue agency’s website. We examined the extent to which contextual differences between the U.S. income tax system and the three countries’ tax systems could enable or inhibit offering electronic filing on the revenue agency’s website. We found that the U.S. income tax system and the three other countries’ tax systems have similar definitions of income, employers withhold income taxes employees owe, and subsidies for certain social goals are channeled through the tax system. All three selected countries offer taxpayers the ability to communicate electronically with agency employees via the revenue agencies’ websites. For example, Australian taxpayers who are working on preparing their return in their account can communicate through an electronic chat with ATO employees about questions they may have, such as regarding deductions and the capital gains tax. In New Zealand, taxpayers can upload documents requested by IRD to their accounts, whereas American taxpayers generally must mail these documents. IRS’s pilots of electronic communication capabilities between taxpayers and its employees will be discussed later in this report. In addition to the three countries reviewed, we also selected three states that have integrated more services into a single online taxpayer account than IRS has done. Additionally, all three states provide taxpayers with two-way secure electronic communication (see figure 3). For example, Alabama and California taxpayers can log into their respective accounts for a secure electronic chat. California and New York taxpayers can share documents. We found that two of the states—Alabama and California—offer taxpayers the capability to file their tax return on the revenue agencies’ websites. However, officials in both states told us that few taxpayers have used this option. Alabama officials believed this was because many taxpayers prefer to use the same method to file their state tax return as their federal tax return, and as we have previously discussed, IRS does not currently offer this service. New York officials said they previously offered this service, but decided to stop offering it because they did not believe the benefits were sufficient to justify continuing it. Our review of the revenue agency websites for the states that have income taxes (43 states and the District of Columbia) found that 21 of the state revenue agencies, including Alabama and California, allow taxpayers to file their state tax return on the revenue agencies’ website (see figure 4). While IRS regularly surveys taxpayers who visit the static pages of irs.gov, the surveys do not provide information on the extent to which all of IRS’s online services meet taxpayer needs. All three of the foreign revenue agencies we reviewed collected survey information that allowed them to more clearly explain the extent to which they believe their online services are meeting taxpayer needs. In addition, IRS has long-running research seeking to estimate the time and money taxpayers spend complying with their tax obligations, but the implications of expanding online services for taxpayer burden have not yet been assessed. IRS seeks feedback from a randomly selected sample of users of the static pages of its website and we reviewed an example of feedback IRS had collected between February 28, 2019, and March 31, 2019. This feedback mechanism is not designed to measure taxpayers’ experiences with individual online services or the extent to which services meet their needs. The invitation to participate appears on the static pages of irs.gov, not when a taxpayer is logged into an online service. However, this does not necessarily exclude taxpayers using online services from providing feedback. IRS officials explained that it does allow IRS to capture feedback across irs.gov static pages and related applications, even though it does not provide feedback on any single online service. A hypothetical example would be a taxpayer starts the process of applying for a student loan by logging into IRS’s “Data Retrieval Tool” and then after completing that task peruses IRS’s publications on tax benefits for higher education on the static pages of irs.gov and is then invited to participate. IRS officials stated that one intent of the survey is to measure a taxpayer’s entire experience, including instances when a taxpayer is visiting for multiple reasons. If a user goes to a static page they may be invited to participate, however if they use the online services without visiting a static page, they will not have the opportunity to provide feedback. IRS officials told us that this feedback may provide insight into taxpayers who report coming to irs.gov to do a task, such as obtaining tax records, but then do not successfully complete the task. IRS told us that this information could alert IRS officials to challenges taxpayers may face in locating online services, but officials agreed that this method does not provide specific feedback on individual online services. IRS officials told us that they would like to combine this survey with surveys focused on specific online services, but face resource constraints. In addition to the survey of users from the static web pages, IRS collects feedback from taxpayers who access “View Your Account Information.” For example, IRS selected a random sample of “View Your Account Information” users between January 2019 and March 2019 who successfully logged into their accounts. OLS officials explained that IRS updated this survey to ask four questions that Office of Management and Budget (OMB) guidance directs agencies to use in assessing their customers’ experiences with the agency’s “highest-impact customer journeys.” IRS asked users: 1. If the online tax account tool met their needs. 2. About their overall satisfaction with irs.gov. 3. Whether this experience increased their confidence in IRS. 4. Whether they could find what they needed easily and quickly. IRS’s summary of the results of the “View Your Account Information” taxpayer experience survey identifies potential limitations. IRS states that users who have experienced challenges logging into protected services, such as “View Your Account Information,” provide negative feedback on the survey administered to users of static pages. However, the “View Your Account Information” experience survey is not designed to capture such negative feedback because a taxpayer must log into his or her account to be selected to participate in this survey. IRS officials agreed that our analysis is accurate, but had a different view on the implications. In their view, the purpose of the “View Your Account Information” taxpayer experience survey is to assess taxpayers’ experiences using this particular service. They believe that challenges legitimate taxpayers may experience in logging into “View Your Account Information” have broader implications and affect taxpayers’ experiences using other online services. And as noted above, IRS officials noted that the survey of users of static pages captures negative feedback from users who have had difficulty accessing online services. However, successfully passing the security checks is the first step in the journey legitimate taxpayers must take to use “View Your Account Information.” The result is a potential knowledge gap in the extent to which “View Your Account Information” is providing taxpayers with a satisfactory experience and very little knowledge on the extent to which the other online services are meeting taxpayers’ needs. OMB has directed agencies to ask two additional questions to gauge user experience with agency services: (1) Did it take a reasonable amount of time; and (2) Does the customer believe he or she was treated fairly. IRS asks the first question of a sample of users of static pages, but neither question is currently asked of a sample of “View Your Account Information” users. IRS told us that the first of these questions was covered by their question about whether taxpayers could find what they needed to easily and quickly, although OMB guidance considers these as separate questions. IRS does not believe the second question is relevant because its online services are automated. The OMB guidance authorizes agencies to request exemptions and modifications to the requirements. We confirmed with OMB staff that IRS had discussed its approach with OMB and that staff concurred with it. While OMB staff said they recognize that variation presently exists across agencies in the required survey questions, they told us that they would like to continue working with agencies to bring greater consistency to surveys so that comparable data will be collected by fiscal year 2021. Both IRS officials and OMB staff told us that that IRS is participating in an interagency working group focused on consistent implementation of this guidance. In addition to surveying customers, OMB’s Circular A-11 section 280 establishes government-wide guiding principles for all executive branch agencies which contain the following requirement: “Agency annual performance plans should include indicators for outcomes related to customer experience.” Our review of IRS’s congressional budget justification and performance plan and report for fiscal year 2020 found no performance measures or indicators summarizing the only taxpayer experience information that IRS collects on one of its online services—the “View Your Account Information” survey discussed above. In regards to the “View Your Account Information” survey, IRS officials told us they are not allowed to publicly share the results because of the process they used to obtain approval to administer this survey pursuant to the Paperwork Reduction Act. The act contains requirements that agencies justify the necessity of collecting information from the public and publish notices informing the public of the planned information collection. In addition the Office of Information and Regulatory Affairs (OIRA) within OMB must review and approve planned information collections. For authorization to administer the “View Your Account Information” survey, IRS officials used approval the Department of the Interior had obtained from OIRA for multiple agencies to administer customer satisfaction surveys for government websites. However, our review of the notice the Department of the Interior published found that while the contractor administering the survey must obtain permission from the agency before releasing the information, there is no prohibition on the agency choosing to release the information. Further to facilitate government-wide comparisons of the customer experiences different agencies are providing, the General Services Administration published a notice in the Federal Register in September 2019 stating that Treasury and other agencies will be publishing relevant data on Performance.gov. This notice does not prohibit agencies from publishing this same data in other publications (e.g., the agency’s performance plan and report). Until it collects more specific feedback on the other online services, it will not be possible for IRS to summarize and report information about the taxpayer experience with online services and the extent to which those services are meeting taxpayer needs. Without information about how effectively IRS’s online services are meeting taxpayer needs, it is difficult for decision makers to appreciate the potential value of these services and help ensure IRS has the necessary resources to maintain and improve these services. The three foreign revenue agencies reviewed all report to their parliaments on the extent to which they believe their online services are meeting taxpayer needs and use that information to help target areas for improvement: Australia: The Australian Taxation Office’s (ATO) annual reports for 2015-2016, 2016-2017, and 2017-2018 tracked “community satisfaction with ATO performance,” which combined more specific measures tracking satisfaction with different service channels—online, telephone, and mail—and satisfaction levels among different groups of taxpayers, such as individuals and small businesses. ATO publishes the more detailed satisfaction levels on its website with the most recent report presenting 2018 results. In its 2017-2018 report, ATO reported that the information collected showed that declining satisfaction with online services was negatively affecting its overall performance and stated that the office plans to use this feedback to improve online services. In its 2018-2019 report, ATO introduced a new measure—”community confidence in the ATO” —which it says is based on surveys of clients who have recently interacted with ATO and surveys of the general community. New Zealand: The Inland Revenue Department’s (IRD) annual reports for 2018 and 2019 present detailed results of its customer satisfaction and perceptions survey, including the overall percentage of customers satisfied with online services, as well as how satisfied subgroups of individual taxpayers are with online services, such as those receiving a tax credit for working families. United Kingdom: Her Majesty’s Revenue and Customs’ (HMRC) annual report presents a quantitative measure of customer satisfaction with online services. HMRC has published a more detailed explanation of how the agency measures customer satisfaction with online services. IRS states that the development of new online services should reduce taxpayer burden—referring to the time and money taxpayers spend to comply with their tax obligations—and one of IRS’s strategic goals states that IRS will reduce taxpayer burden. To help IRS officials and policy makers measure the progress they are making in achieving their goal of reducing taxpayer burden, IRS’s Research, Applied Analytics, and Statistics (RAAS) office has periodically surveyed taxpayers since 1984 about the time and money they spend to complete their tax obligations and uses the responses along with information from those taxpayers’ tax returns to estimate the total compliance burden for individual taxpayers. A RAAS official told us that IRS has not conducted any burden research specifically related to online services. IRS’s Data Book for fiscal year 2018 describes the magnitude of the taxpayer assistance provided through online services. More than 300 million electronic transactions took place through online services for individual taxpayers. IRS is missing an opportunity because taxpayers are already making extensive use of IRS’s online services for such tasks as setting up payment plans and obtaining records. Online services will likely continue to assist taxpayers in fulfilling their tax obligations. Two of the case study countries’ revenue agencies—in Australia and New Zealand—have conducted research on taxpayer burden. For example, New Zealand’s IRD’s annual report for 2019 stated that it has made progress in making taxes easier and simpler for its customers. To track its progress, IRD added online services to its taxpayer burden research in 2016 and updated this study in 2018. IRD compared the 2016 and 2018 survey results to burden research conducted in 2013 prior to expanding online services. As a result of this research, IRD found that 20 percent of taxpayers who run small businesses and participated in the survey reported that expanded online services and an improved IRD website have overall reduced their compliance burden. IRD’s report notes that additional online services will be launched in April 2019 and a follow-up survey is planned for 2020 to compare the reported burden with the earlier surveys and, thereby, track the progress it is making. A series of long-term planning documents establishes priorities to guide IRS decision-making and identify new online services, but does not contain evidence that taxpayer input was used to help identify the highest priority services. In April 2019, IRS published the IRS Integrated Modernization Business Plan (modernization plan). One of the plan’s goals is to modernize the taxpayer experience. To do this, IRS proposes to develop new services including delivering taxpayer notices electronically, modernizing online installment agreements, and establishing omni-channel communication capabilities provided that IRS continues to receive the requested resources from Congress. IRS does not currently incorporate taxpayer input into its prioritization process because it prioritizes services primarily based on their potential to benefit IRS’s operations or because they can be developed quickly. An OMB memorandum directs agencies to understand what their customers want by engaging in research to understand their goals, needs, and behaviors before beginning to develop new services. Going forward, the IDEA Act requires that new digital services be “designed around user needs with data-driven analysis influencing management and development decisions”. This requirement took effect in June 2019. IRS documents describing how new services were prioritized show that IRS did not incorporate taxpayer research or input into the score it assigns to each proposed service. Instead, IRS officials estimated the potential taxpayer value of a new service. For example, supporting documentation for one proposed project from the modernization plan to allow taxpayers to receive notices electronically states that IRS expects taxpayers to receive less paper mail and have easier online access to recent or historical notices if the project is developed. IRS expects that electronic delivery of notices will increase the timeliness of its service, which would improve the taxpayer experience. After a new online service is selected and approved, IRS does obtain input from taxpayers during the development phase, for example, to improve usability of the service and fine-tune technical capabilities. OLS officials provided us with documentation of user experience research they conducted on how to improve specific design elements of existing online services. For example, IRS reworded a button within “View Your Account Information” to access the online payment agreement service from “Need more time to pay?” to “Go to payment plans” to improve clarity. As a result of the change, the rate of taxpayers accessing the online payment agreement service from their online account has doubled, according to data IRS provided. While IRS’s modernization plan outlines new online services it plans to develop, the modernization plan also states that it expects additional services to be added over time as technology advances and customer expectations evolve. The Taxpayer First Act requires IRS to expand an online service—currently offered to taxpayers in nine states and the District of Columbia—to provide taxpayers with Identity Protection Personal Identification Numbers and an online platform to prepare and file a Form 1099 to report independent contractor earnings or other miscellaneous income. In May 2019, IRS officials told us that they will continue to reprioritize new service development based on available resources. As IRS reprioritizes the new services it plans to develop, IRS runs the risk of developing online services which may be of lower priority to taxpayers or that taxpayers do not utilize if IRS does not include input from taxpayers on what new services IRS should prioritize. By contrast, the United Kingdom’s HMRC has conducted taxpayer research to understand user needs and taxpayer preferences. For example, HMRC conducted taxpayer research in 2016 to inform decisions about which services to include in development of the “Personal Tax Account” which as noted above provides taxpayers with integrated access to various online services. HMRC’s research included workshops and interviews with taxpayers who use online services as well as an online survey of 4,000 taxpayers. The online survey asked taxpayers to rank the top five services they would like HMRC to develop from a list of 14 potential services and asked taxpayers to explain their rationale. HMRC then assessed preferences among taxpayers and concluded that secure electronic messaging was one of the services most highly sought, according to the report. As a result, HMRC incorporated taxpayer input into its new service prioritization process and began developing services that it knew taxpayers desired and were more likely to use. IRS’s modernization plan states that IRS intends to measure the success of its efforts to improve taxpayers’ experience consistent with the administration’s government-wide goal to improve customer experience with federal services. OMB’s guidance to agencies on this topic states that they should measure customer perceptions of the ease, efficiency, and equity in the process of obtaining the service. The modernization plan also states that IRS will measure taxpayer burden hours, which would capture changes in the amount of time taxpayers spend doing their taxes as a result of the modernization of information services and the development of new online services. The GPRA Modernization Act (GPRAMA) requires agencies’ annual performance goals to be expressed in an objective, quantifiable, and measurable form and this principle is relevant to IRS’s modernization plan. In prior work identifying leading practices related to this requirement, we explained that expressing goals in a quantifiable form provides an objective way to assess the agency’s performance. The Taxpayer First Act, enacted in July 2019, similarly requires the Secretary of the Treasury (or designee) to identify metrics and benchmarks for IRS for quantitatively measuring progress in implementing a customer service strategy that the act requires IRS to develop. That strategy must be submitted to Congress within 1 year of enactment. While Treasury and IRS are not required under the act to submit the strategy containing the metrics and benchmarks for quantitatively measuring progress until July 2020, we found that IRS’s modernization plan is not well positioned to help Treasury and IRS implement this new requirement. IRS’s modernization plan states that IRS intends to measure progress towards its customer experience goal through promoting ease and simplicity in taxpayer interactions. To measure that, IRS stated that it plans to increase its “American Customer Satisfaction Index” score, although IRS did not set a numerical target for improvement. The survey for this index score is administered by researchers outside the government and focuses on taxpayers’ experiences filing their tax return, which is not a service offered on irs.gov, making it of little use in assessing taxpayer satisfaction with IRS’s online services. IRS’s modernization plan does set numerical targets for output measures such as the percentage of notices available in an electronic format for taxpayers, but these targets are not aligned with any of IRS’s taxpayer experience feedback mechanisms, including those that come from the feedback mechanism discussed above administered to users of IRS’s “View Your Account Information.” For example, IRS asks a sample of “View Your Account Information” users if the online service met his or her needs, but IRS’s modernization plan does not set a target or desired level of performance for this question or for any other survey question. Our finding that IRS lacks targets for improving taxpayer experience is consistent with our prior work. In April 2013 we reported that previous IRS planning efforts to expand online services had not set a clear target for improving taxpayer experience and we recommended that IRS establish a numerical or other measureable goal to improve taxpayer satisfaction and a time frame for achieving it. While IRS neither agreed nor disagreed with this recommendation, in 2016 IRS said it would consider the development of numerical or other measurable goals related to taxpayer experience. Our current review shows that IRS has not developed such measures. We continue to believe this recommendation is valid and that the issue will continue to grow in importance along with the use of IRS’s online services. While IRS believes that the planned online services will promote “ease and simplicity,” no target is set in the modernization plan for reductions in taxpayer burden hours. As noted above, IRS has not started to examine the implications of expanding online services on taxpayer burden. Without targets for reducing taxpayer burden, IRS cannot determine the success of new online services in helping drive progress towards this goal. All three of the foreign revenue agencies we reviewed set numerical targets for performance measures related to improving online services and used these goals to target areas for further improvement. New Zealand’s IRD stated in 2015 that its business transformation program should improve the percentage of customers “who find it easy to comply” to between 90 and 95 percent by 2023/2024 to assess progress in its goal to reduce taxpayer burden. IRD’s annual report for 2019 states that the business transformation program remains on track and is delivering benefits and this section also provides an update on the percentage of customers “who find it easy to comply.” While the annual report does not refer to the target for 2023/2024, the percentage reported in the 2019 annual report is lower than the target identified for 2023/2024. The 2019 report explains that taxpayers are “getting used to our new systems and processes” and describes additional improvements IRD is planning. In addition, the United Kingdom’s HMRC set a target for 80 percent of taxpayers to report satisfaction with online services for 2018. HMRC published performance towards its goal in its 2018-2019 annual report, finding that 80.4 percent of taxpayers reported satisfaction with online services. IRS’s modernization plan states that taxpayers will be able to sign up to receive notices electronically by fiscal year 2021 and to have text or video chats with IRS employees by fiscal year 2024. IRS currently sends taxpayers notices via mail for identity verification, balance due, or if IRS needs additional information about a tax return. IRS plans to allow taxpayers to access certain notices electronically via a taxpayer’s online account. In July 2019, IRS Information Technology (IT) officials told us that they have established a team to start developing the capability to make notices available to taxpayers electronically, which is IRS’s first step towards developing full-scale digital communication capabilities. IT officials told us in October 2019 that they plan to conduct customer testing to pilot the service before it launches and gather customer feedback after launching the service. While IRS has just begun development of full-scale digital communication capabilities, IRS has experience providing a subset of taxpayers secure messaging capabilities through two pilot programs that we reviewed. Specifically, under the coordination of OLS, IRS began testing digital communication services in December 2016 to allow for secure and personalized correspondence between taxpayers and IRS employees through three pilot programs, as described below: An active pilot within the Small Business/Self Employed (SB/SE) business unit is testing digital messaging for examinations, which have traditionally been done by mailing questions and documents back and forth between the examiner and taxpayer. SB/SE began this pilot in fiscal year 2017 for a subset of taxpayers selected for examination for returns related to itemized deductions, the child care deduction, and education tax credits. Interested taxpayers must successfully complete security checks to verify their identity and then can exchange messages electronically with IRS employees and share requested documents through a platform accessed through irs.gov. A Taxpayer Advocate Service (TAS) pilot that tested the ability for taxpayers to send documents in electronic form began in fiscal year 2017 and ended in fiscal year 2019. TAS designed the pilot for the purpose of helping two sets of taxpayers: (1) those who were facing the prospect of IRS seizing their property to pay a tax debt, and (2) those who were facing an audit of their claim of the Earned Income Tax Credit and had sought TAS’ assistance. IRS officials told us that an authenticated chat pilot to assist taxpayers in completing an Online Payment Agreement was introduced in June 2019. Results for this pilot were unavailable as of October 2019. We evaluated the SB/SE and TAS pilots against leading practices. We found that the two digital communication pilots mostly addressed leading practices our prior work identified for designing a well-developed and documented pilot program. These leading practices are to: (1) establish objectives; (2) develop an assessment plan; (3) assess scalability; (4) evaluate results; and (5) ensure stakeholder communication. These practices enhance the quality, credibility, and usefulness of evaluations and help ensure that time and resources are used effectively. Although we found both pilots to be generally aligned with the leading practices to develop an assessment plan, evaluate results, and ensure stakeholder communication, neither pilot fully established objectives or assessed scalability. These leading practices are also relevant for testing of future capabilities of the electronic messaging platform that IRS plans to develop. Our leading practices state that objectives for pilot evaluations should be well defined, appropriate, clear, and measurable. We found differences in stated objectives between OLS and the participating offices. OLS set a target for the SB/SE pilot to reduce total case time from greater than 200 days to fewer than 100 days, and for the TAS pilot to improve the relief rate to taxpayers by 5 percent, which OLS officials explained were ambitious goals. However, SB/SE officials told us that they believed the magnitude of OLS’s goal for reduction in case time to be unrealistic. The National Taxpayer Advocate told us that she had narrower objectives for the pilot including testing the viability of sending documents electronically and assessing taxpayer willingness to participate. Having officials from relevant offices with different understandings of the quantitative target they are trying to achieve is not fully consistent with the leading practice and makes it more difficult for officials to evaluate the performance of the pilots. We previously reported that key features of an assessment methodology include a strategy for comparing the pilot’s implementation and results with other efforts; a clear plan that details the type and source of the data necessary to evaluate the pilot; and methods for data collection, including the timing and frequency. Our review found that the implementing offices for both pilots developed plans to conduct periodic assessments to assess the objectives. For example, the assessment plan for SB/SE’s pilot included measurements of average case time and participation levels. The TAS assessment plan also included measurements of average case time and participation levels as well as the reasons taxpayers provided for not enrolling in the online pilot. The purpose of a pilot is generally to inform a decision on whether and how to implement a new approach in a broader context. Identifying criteria or standards for identifying lessons about the pilot will help inform an agency’s decisions about scalability and when to integrate pilot activities into overall efforts. A common challenge that both of IRS’s communication pilots experienced was that only a small proportion of eligible taxpayers participated. Among the taxpayers selected for an SB/SE exam for whom the pilot was offered, approximately 11 percent of taxpayers participated in the digital communication pilot and sent their exam responses and supporting documentation through a secure, electronic messaging platform while approximately 51 percent of taxpayers sent their exam responses to IRS via mail. In contrast, 1 percent of invited taxpayers participated in the TAS pilot, according to the TAS report, which found that most taxpayers opted to communicate with TAS through more traditional methods such as telephone, mail, or fax. Officials involved in each pilot reported that additional taxpayers expressed interest in participating, but experienced challenges in getting through the identity verification requirements for enrollment. Of the potential participants in the SB/SE pilot, only 44 percent of those who began the secure enrollment process successfully enrolled. Pilot participants told TAS that they found the secure enrollment system for the TAS pilot to be too complicated to use and preferred instead to fax documents to avoid the burdensome sign up process. The National Taxpayer Advocate concluded that the participation rate was so low that it did not make sense to continue the pilot. In conjunction with a clearly articulated assessment methodology, a detailed data-analysis plan identifies who will analyze the data as well as when and how data will be analyzed to assess the pilot’s performance and draw conclusions about how to improve procedures moving forward. SB/SE’s pilot report found that use of the Taxpayer Digital Communications (TDC) electronic platform did reduce the number of days to complete an examination compared to paper. However, IRS examiners spent more hours on average on exams conducted through TDC than paper exams because taxpayers sent more attachments in their electronic messages, on average, than in the mail. TAS found that those taxpayers who enrolled in the pilot were able to successfully communicate with them.TAS officials expressed optimism that enrollment in secure communication could help reduce case processing time among those seeking assistance avoiding an IRS seizure of their property to pay a tax debt. A leading practice is that agencies identify who the relevant stakeholders are and communicate frequently to obtain feedback on the successes and challenges of the pilot. IRS identified taxpayers and participating business units as the relevant stakeholders for each pilot. We found that both the SB/SE and TAS pilots obtained feedback from stakeholders including employees and taxpayers who participated in a pilot as well as taxpayers who chose not to participate. In January 2018, SB/SE developed a web-based survey which sends taxpayers a voluntary survey upon closing of an exam, when communication ceases with a taxpayer. In addition, SB/SE called taxpayers who did not participate in the pilot program to discuss why they chose not to participate. Of the 262 taxpayers who were successfully contacted, taxpayer reasons for not signing up included that they did not remember seeing the invitation to enroll, they could not pass the secure enrollment process, and they thought it was a scam. TAS held focus groups with employees participating in its pilot and found that many employees raised concerns that the digital communication platform was not user friendly and discouraged uptake. The Office of Appeals conducted a pilot between fiscal years 2017 and 2018 using video conferencing software as a way for Appeals Officers who volunteered to participate to conduct video conferences with taxpayers in lieu of a telephone conference. The Office of Appeals concluded the pilot demonstrated the viability of this technology and allowed all Appeals officers who are willing to use this technology to offer it to the taxpayers they are working with as of October 1, 2018. We did not assess the pilot against our leading practices for conducting pilots because we had recently completed a review of IRS’s Office of Appeals, including its video conferencing capabilities, and the Treasury Inspector General for Tax Administration (TIGTA) recently published a review of the pilot. TIGTA identified a risk related to the scalability of videoconferencing. As of September 30, 2018, Appeals’ officials told us that less than 4 percent of invited taxpayers chose to participate in its pilot. They said that some of the taxpayers who declined to use videoconferencing thought it easier to have a phone call rather than go through the steps involved in setting up a videoconference. Unlike the digital communication pilots described earlier, participants in the Appeals pilot were not required to verify their identity through Secure Access, which is a multifactor authentication process for which taxpayers provide personal and financial information and then IRS verifies that the taxpayer has a mobile phone in his or her name by texting a code to the phone or mailing an activation code. Instead, Appeals officers verified taxpayer identities at the beginning of the videoconference. Despite the difference in security requirements, the participation rate for the Appeals pilot was also low. IRS’s modernization plan’s discussion of future video chats between IRS employees and taxpayers makes no mention of the challenges Appeals has experienced in getting taxpayers to use the videoconferences it already offers selected taxpayers. The same concerns about clear objectives and scalability that we found in the TAS and SB/SE digital communication and videoconferencing pilots also have implications for the full-scale services that IRS plans to develop. The modernization plan states that one of IRS’s objectives through development of an online notification service is to reduce mailing costs by sending fewer notices via mail. However, IRS officials told us in September 2019 that they plan to continue to mail all notices once an online notice service is developed. This suggests that IRS will move forward with development of an online notification service without clear objectives such as cost savings. In December 2019, IRS officials noted that while this may be true of initial deployment, future iterations could potentially allow users to change their delivery preferences. The services outlined in IRS’s modernization plan include delivery of tax credit qualification notices electronically to taxpayers, which IRS officials explained would be limited to low-income taxpayers who IRS believes to be eligible for, but not claiming, the Earned Income Tax Credit (EITC). TAS’s pilot of secure messaging with a similar set of taxpayers— taxpayers subject to an audit of their EITC claim—showed that many low- income taxpayers did not have the access to technology to properly enroll. IT officials told us that they plan to conduct customer testing before and after the introduction of the new electronic notice service. Because IRS is just beginning development of its new digital communication platform, it has not yet provided evidence that it plans to consider concerns and limitations identified in prior digital communication pilots. Without developing a pilot to test its new services and incorporate the lessons learned from prior pilots, IRS risks developing a full-scale service targeted to taxpayers with a low potential for uptake. Our discussions with IRS officials confirmed that they continue to address security and human capital challenges, which we have evaluated in recent reports. IRS’s modernization plan states that IRS faces increasingly sophisticated and frequent efforts by cybercriminals to steal taxpayer data. For example in 2015, IRS temporarily suspended online transcript services after fraudsters used personal information obtained from sources outside IRS to pose as legitimate taxpayers and access tax return information from up to 724,000 accounts. IRS relaunched this service in 2016 with the requirement that taxpayers go through Secure Access. IRS also uses Secure Access for “View Your Account Information”. The remaining online services require different levels of authentication. For example, taxpayers must provide their Social Security numbers or individual taxpayer identification numbers, filing status, and exact refund amounts to access “Where’s My Refund?” The information provided is limited to tracking IRS’s receipt of a return, approving the refund, and sending the refund. Users of this service cannot, for example, redirect the refund from the destination specified on the tax return or access the detailed personal information contained in transcripts. If IRS makes the authentication process too stringent, it may adversely affect legitimate taxpayers, but too easy of an authentication process presents security risks. In June 2018, we recommended 11 actions IRS should take to improve taxpayer authentication, including developing a plan to fully implement new federal guidelines for online authentication and IRS agreed with our recommendations. In June 2019, IRS officials stated that they have identified an approach for improving the security of online authentication consistent with new federal guidelines. However, additional work remains to fully address our recommendations. Further, the Taxpayer First Act, enacted in July 2019, requires IRS to verify the identity of any individual opening an “e-Services account” by January 2020 before the individual can use the e-Service tools. IRS also continues to face human capital challenges. The former Acting Director of OLS told us in March 2019 that her office has faced several challenges in recruiting and hiring: (1) competition with technology companies for employees with the necessary skills; (2) challenges in crafting position descriptions to inform job seekers of openings; and (3) delays in IRS’s Human Capital Office processing of applications. These challenges are similar to IRS-wide challenges we recently identified, including skill gaps in mission critical occupations and limited capacity by the Human Capital Office to hire employees. In March 2019, we recommended IRS take six actions, including improving its workforce planning and addressing delays in the hiring process. IRS agreed with our recommendations. In September 2019, the Deputy Commissioner for Operations Support reported that IRS is working to address our recommendations, including a plan to reduce the hiring backlog, increase hiring capacity, and improve monitoring and reporting capabilities. In November 2019, we determined IRS had addressed two of our recommendations by developing a strategy to address current and future hiring requirements and issuing guidance to business units’ executives on streamlining the hiring approval process. As noted above, the Deputy Commissioner for Operations Support reported that IRS is working to address our remaining recommendations. Taxpayers cannot file their tax returns on irs.gov and IRS officials told us they have no plans to develop such a capability. As noted above, the absence of electronic filing services on irs.gov is a notable difference between the services IRS provides and those provided in the three countries and two of the three states we reviewed. We found that IRS’s Free File agreement benefits a small proportion of taxpayers, but that the full benefits and costs of this agreement are uncertain. IRS has renewed the nearly 20-year old agreement eight times since its inception in 2002 without sufficient consideration of how this agreement relates to its growing portfolio of online services, such as the development of the capability for taxpayers to file amended returns electronically. IRS officials do not regard the absence of electronic filing capabilities on irs.gov to be a shortcoming. Rather, they believe that the Free File agreement has served both taxpayers and IRS well. Officials noted that eligible taxpayers can receive free access to electronic tax preparation and filing services provided by the companies which make up the Free File, Inc. consortium. Additional benefits accrue to IRS, according to officials, by encouraging electronic filing which reduces the costs of processing returns. Further, IRS officials noted that having industry assist taxpayers with electronic filing allows them to focus on providing other online services, such as the informational and payment services described above. Officials representing Free File, Inc. expressed similar views on what they consider to be the benefits of the agreement. However, IRS data show that less than 2 percent of all individual tax returns were filed using Free File in fiscal year 2018 (see figure 5). IRS’s annual data books started tracking the number of returns filed using Free File in fiscal year 2009. As the data show, excluding paper returns, approximately 2 to 3 percent of all electronically filed returns were filed through Free File for the 10 years with available data. IRS’s data include taxpayers who were eligible for and used free commercial software or websites and those who used Free Fillable Forms discussed earlier (see table 2). As the data show, the vast majority of taxpayers filing electronically either hired a practitioner to do so on their behalf or obtained commercial tax preparation and filing services outside of the Free File program. The low usage of Free File is one of the topics that has been reviewed in more detail in reports by the National Taxpayer Advocate and IRS’s Advisory Council. Usage was also cited in separate letters that the Chairman and Ranking Member of the Senate Committee on Finance and the Chairman and Ranking Member of the House of Representative’s Committee on Ways and Means sent to the IRS Commissioner in May 2019 requesting a review of Free File. In June 2019, IRS hired the MITRE Corporation to review, among other objectives, the Advisory Council’s findings and recommendations. In an October 2019 report submitted to IRS, the MITRE Corporation examined: (1) The extent to which eligible taxpayers were using Free File; (2) the participating companies’ compliance with the agreement between Free File, Inc. and IRS; and (3) researchers’ observations of taxpayers’ experiences using the software provided by companies participating in Free File. The report found that the program generally appeals to taxpayers who prefer a “do-it-yourself” method of tax preparation and filing and taxpayers’ preferences should be taken into account when interpreting IRS’s usage data. It found that participating companies had generally complied with the terms of the agreement but that taxpayers experienced challenges in navigating the Free File program. The report made a number of recommendations on these and other topics to IRS. Under the terms of the Free File agreement, IRS does not pay Free File, Inc. companies for the services provided. Rather, participating companies benefit from continuing this agreement because they stand to potentially lose business should IRS develop its own online filing capabilities. Although the agreement does not have a direct monetary cost to IRS, our review found there are indirect costs. Specifically, the agreement states that “the federal government has pledged to not enter the tax preparation software and e-filing services marketplace.” IRS’s decision not to develop and offer electronic filing on its website is a contrast to the capabilities offered by some other countries and U.S. states. The Free File agreement in its current form could potentially constrain the development of new online services such as allowing taxpayers to file amended returns on irs.gov. Online services have the potential to decrease both taxpayer burden and costs for revenue agencies in the long term. IRS’s efforts to assist taxpayers with amending previously filed tax returns illustrate the potential costs of renewing the Free File agreement without consideration of IRS’s long-term plans for online services. Irrespective of the method used to file the original return, taxpayers must file an amended return (Form 1040X) on paper. Officials in IRS’s Wage and Investment (W&I) business operating division provided a business case they drafted proposing to give taxpayers the option of filing an amended return electronically. The business case makes clear that IRS officials believe the current paper-based process is inconvenient for taxpayers because the vast majority of taxpayers are filing the original return electronically. It is also costly and challenging for IRS to process these paper forms with more than 3 million of these amended returns received in processing year 2017. The business case says IRS has been assessing a potential online service in this area for more than 10 years, but has not moved forward due to technical and resource challenges. One approach IRS is exploring is to allow private sector tax preparation and filing companies and practitioners to file an amended return on behalf of a client, which would be similar to the current arrangement for original returns established by the Free File agreement. The second approach IRS is exploring is allowing taxpayers to correct the return with a new online service on irs.gov. The business case states IRS currently prefers the first approach of having taxpayers work with industry or a tax practitioner because of a combination of cost and technical considerations. The business case states that IRS officials have had discussions with officials affiliated with Free File, Inc. According to IRS’s account of these discussions, industry is supportive of the first potential approach of having taxpayers electronically file amended returns through their industry. Further, IRS notes that some taxpayers who used software to prepare the original return may find it convenient to use the same software to prepare and file an amended return. However, the business case also states that, “the costs are not insignificant” for IRS in working with industry, even though IRS plans to leverage existing systems as much as possible. A further complication is how IRS’s plans to work with industry on electronic filing of amended returns relate to the Free File agreement. IRS’s business case states that Free File, Inc. officials told them participating companies would be willing to provide electronic filing of amended returns for free, but as noted above less than 2 percent of original returns are filed through Free File. While individual tax preparation and filing companies could choose to offer electronic filing of amended returns for free or include that capability in paid packages they offer for filing an original return, the agreement in its current form would not guarantee free access to electronically filing amended returns for the vast majority of taxpayers who file an original return outside of Free File. If IRS were to return to its earlier idea of offering the capability to file an amended return on irs.gov, that approach also comes with potential risks for IRS regarding the Free File agreement. IRS officials noted that the agreement states that, “this agreement does not limit IRS from providing phone-based, web-based, or electronic interaction between the IRS and a taxpayer (or a taxpayer’s representatives) regarding issues in a previously filed return after such a return has been accepted by IRS.” IRS officials told us they believe this language allows Form 1040X-type actions by IRS. However, as noted above, IRS made a commitment to “not enter the tax preparation software and e-filing services marketplace”. Our analysis determined that the Form 1040X is nearly identical to the Form 1040, with the difference being that a taxpayer notes which lines he or she needs to correct. IRS’s instructions for the Form 1040X state, “When you file Form 1040X for a tax year, it becomes your new tax return for that year. It changes your original return to include new information.” Therefore, the capability for taxpayers to file a Form 1040X on irs.gov would put irs.gov closer to having an online filing capability for original returns. In written documents that officials from Free File, Inc. provided to us, they said they would need to see a specific proposal for electronic filing of amended returns before they could comment. However, they made clear that they believe any future development of IRS’s online services should continue to leave the task of preparing and electronically filing a tax return to industry. Officials provided a copy of a letter the Executive Director of their organization had sent the W&I Commissioner in March 2019 recommending that IRS consider enabling the electronic acceptance of amended returns through the system industry uses to electronically file original returns on behalf of taxpayers. Circumstances, including IRS’s technical capabilities, have changed since the Free File agreement was first established in 2002. Today’s irs.gov provides “View My Account Information” and other online services which did not exist in 2002, and as discussed above, IRS is exploring allowing taxpayers to file amended returns electronically. Another potential new online service serves as a second example of a way that IRS might soon interact directly with taxpayers online without the use of private sector intermediaries in the tax preparation and filing industry. In the Taxpayer First Act, Congress directs IRS to develop a new online service for taxpayers to report miscellaneous payments. Specifically, Congress directed IRS to develop no later than January 1, 2023, an internet platform for persons to prepare and file the Form 1099, which is used by persons to report payments made to taxpayers for such things as rent and services performed by someone other than an employee. The House Committee on Ways and Means’ report accompanying the act explains that the committee believes that having IRS provide this online service will improve compliance with the reporting requirements and reduce the administrative burden for taxpayers who run small businesses. OLS coordinates the development of new online services and W&I oversees the Free File agreement. OLS officials referred our questions about the Free File agreement to W&I. W&I officials provided no documentation they had coordinated renewal of the Free File agreement in 2018 with OLS. IRS also could not provide us any evidence that it has analyzed the full costs and benefits of the Free File agreement to IRS, the participating private sector companies, and the public. For example, the MITRE Corporation report discussed above states that the researchers “assume that industry will continue to be the entity that provides free tax return preparation and filing offerings to taxpayers.” IRS’s approach to renewing the Free File agreement is not consistent with leading practices we identified in our prior work stating that decision makers should periodically review government programs, tax provisions, and regulations to ensure they are achieving desired goals. Among the leading practices we identified is that the costs and benefits should be assessed. Without more rigorous examination of costs and benefits to all parties of future renewals of the Free File partnership, IRS runs the risk of not being fully aware of the effects of the agreement; including the effects of constraints on new services that IRS could provide to taxpayers. The internet has reshaped how citizens interact with businesses and government agencies. IRS.gov has contributed to this by giving taxpayers access to detailed information about their taxes and allowing them to make arrangements to pay money they owe. Our comparison of IRS to other countries’ and states’ revenue agencies highlights areas for potential future development. IRS has told Congress and the public that developing electronic communication capabilities is an area of focus. Our review identified a number of challenges IRS will need to address as it moves forward, including measuring taxpayers’ experiences with the online services IRS already offers—including the extent to which those services meet taxpayer needs—and how these services may affect taxpayer burden. Summarizing and reporting that information would help decision makers appreciate the potential value of these services and help ensure IRS has the necessary resources to maintain and improve these services. Likewise, including input from taxpayers when prioritizing new services would help IRS reduce the risk of developing online services that taxpayers do not use. While IRS has recently published a modernization plan which outlines its vision for expanding online services, no targets are set for improving taxpayer experience or reducing taxpayer burden, which hinders decision-making. As we recommended in April 2013, we continue to believe that IRS should establish a numerical or other measureable goal to improve taxpayer satisfaction and a time frame for achieving it. IRS also faces a risk that plans for full-scale digital communication services will encounter enrollment challenges similar to those that IRS has experienced in prior digital communication pilots. In 2002, IRS established a Free File agreement in which participating tax preparation companies agreed to provide free electronic tax preparation and filing services for low- and middle-income taxpayers, provided that IRS does not enter the tax preparation software and e-filing services marketplace. IRS’s Free File agreement benefits a small proportion of taxpayers, but the full benefits and costs of this agreement are uncertain. IRS is currently constrained in providing the online services that are part of its long-term plans for taxpayers, including allowing electronic filing of amended tax returns. We are making the following seven recommendations to IRS: The Commissioner of the IRS should ensure that information is collected on taxpayers’ experiences with all online services and the extent to which the services are meeting taxpayers’ needs. (Recommendation 1) The Commissioner of the IRS should ensure that information collected on taxpayers’ experiences with online services is summarized in the document serving as IRS’s performance plan and report. (Recommendation 2) The Commissioner of the IRS should direct the Director of OLS and the Chief Research and Analytics Officer to work together to analyze the potential effects of online services on taxpayer burden. (Recommendation 3) The Commissioner of the IRS should ensure that taxpayer input is included as an element of IRS’s identification and prioritization process for new online services. (Recommendation 4) The Commissioner of the IRS should work with relevant officials to set a target to reduce taxpayer burden through the development of new online services. (Recommendation 5) The Commissioner of the IRS should direct the Chief Information Officer and the Director of OLS to ensure that planned future capabilities of digital communication platforms are tested or piloted before deployment with a particular focus on mitigating the risks that were identified in prior pilots of digital communication services, such as challenges in establishing common objectives and enrolling taxpayers. (Recommendation 6) The Commissioner of the IRS should direct the Commissioner of W&I to work with the Director of OLS to ensure that future decisions regarding whether to renew the Free File agreement incorporate findings from a comprehensive examination of the benefits and costs of the agreement as it relates to long term plans for IRS’s online services, including plans to file amended returns electronically. (Recommendation 7) We provided a draft of this report to IRS for review and comment. In written comments provided by IRS’s Deputy Commissioner for Services and Enforcement (reproduced in appendix II and summarized below), IRS agreed with six of our seven recommendations. IRS also provided technical comments, which we incorporated as appropriate. IRS agreed with our recommendations to ensure that information is collected on taxpayers’ experiences with online services, ensure that such information is summarized in IRS’s performance plan and report, analyze the potential effects of online services on taxpayer burden, include taxpayer input in its identification and prioritization of new online services, ensure that planned future capabilities of digital communication platforms are tested or piloted, and ensure that future decisions regarding renewal of the Free File agreement incorporate findings from a comprehensive examination of the benefits and costs of the agreement as it relates to long term plans for IRS’s online services. IRS indicated general steps it plans to take to address these recommendations but did not provide time frames for doing so. IRS disagreed with our recommendation that it set a target to reduce taxpayer burden through the development of new online services. IRS stated that it will continue to look for opportunities to reduce burden through the development of new online services, but believes that a measurable target cannot be set. We recognize that it may take time for the relevant IRS offices to review changes in individual taxpayer burden estimates over multiple years and begin to collect the necessary data to set a measurable target for burden reduction. However, as established in our prior work, goals should be expressed in as specific terms as possible and be expressed in a form which allows the agency and external audiences to assess the progress being made. As noted in our report, IRS has a strategic goal for reducing taxpayer burden and its strategic plan identifies expanding online services as one of the strategies it will use to drive progress on its goal. Further, IRS agreed with our related recommendation that relevant offices analyze the potential effect of online services on taxpayer burden, which should provide a starting point for IRS in working to identify a burden reduction target. In its response, IRS also stated that its methodology for estimating taxpayer burden is not designed to capture the effect of specific program improvements on taxpayer burden. We agree and are not suggesting IRS resurvey taxpayers and re-estimate burden for every new online service it may introduce. Rather, our recommendation refers to total burden reduction from all the online services IRS offers individual taxpayers. As noted above, IRS’s strategic plan anticipates that taken together all these different online services should make it easier over time for taxpayers to fulfill their tax obligations. We continue to believe that this recommendation has merit. We provided relevant sections of this report to OMB staff concerning information they provided us regarding the applicability of customer experience requirements to IRS. Staff confirmed we accurately summarized their statements. We provided relevant sections of the draft report to the revenue agencies and national audit offices in the three countries reviewed and to the revenue agencies in the three states reviewed. Two foreign revenue agencies, three national audit offices, and three state revenue agencies provided technical comments, which were incorporated as appropriate. One foreign revenue agency did not respond as of December 10, 2019. We also contacted 19 additional state revenue agencies which our draft report identified as offering electronic filing of a state income tax return on the revenue agency’s website and verified that 15 of them offer this service. The remaining four did not respond as of December 12, 2019. We provided relevant sections of the draft report to officials representing Free File, Inc.; specifically, sections describing the agreement between their organization and IRS and the views of Free File, Inc., officials towards IRS plans for allowing electronic filing of amended returns. An official representing the organization provided technical comments, which were incorporated as appropriate. We are sending copies of this report to the relevant congressional committees, the Secretary of the Treasury, the Commissioner of the IRS, and other interested parties. In addition, this report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-9110 or lucasjudyj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The four countries in this review—the United States and Australia, New Zealand, and the United Kingdom—define income similarly and tax investment income. For wages, all four revenue agencies require employers to withhold taxes from their employees’ paychecks. Withholding also means that the four revenue agencies have processes for sending refunds to taxpayers should the government end up collecting more money than the taxpayer owes in taxes. Further, all four countries use tax expenditures to channel subsidies through their tax systems to further social goals such as supplementing the wages of lower income workers. The requirement to file a tax return depends on a combination of factors: gross income, filing status such as whether a taxpayer is single or married, age, and whether a taxpayer is a dependent. For example, a single taxpayer who is under the age of 65 and has a gross income of at least $12,000 is required to file. Taxpayers who meet the specified criteria must file a return even if the government owes them a refund. A taxpayer married to another taxpayer can choose to file a joint return which reports the two individuals’ combined income and deductions. Selecting this option may provide a higher standard deduction and access to other tax benefits for married couples. The Australian Taxation Office’s (ATO) website states that most taxpayers need to lodge a tax return each year and taxpayers can choose among using their online account to electronically file a return, submit a paper return, hire a registered tax agent, or taxpayers meeting specified eligibility criteria may seek assistance from ATO-trained volunteers who help taxpayers complete their tax returns online. Spouses file separate returns, although taxpayers are required to report details about their spouse’s tax situation, such as their taxable income. After a return is lodged, ATO issues a notice of assessment informing the taxpayer whether he or she is entitled to a refund or owes tax. A taxpayer can correct errors on the original return electronically, on paper, or through a registered tax agent. An Inland Revenue Department (IRD) publication and the IRD website explain that the requirement to file depends on the sources of the taxpayer’s income. Taxpayers who received income other than salary, wages, interest, dividends, or taxable Maori authority distributions must file a return. For example, the filing requirement applies to taxpayers who had self-employed income, rental income, cash jobs, or income derived overseas exceeding 200 New Zealand dollars. Taxpayers required to file can log into their online account to electronically file a return or choose to file on paper or hire a tax agent to prepare their return. After receiving the return, IRD informs the taxpayer of any refund or tax they must pay. Taxpayers can correct errors on their return by logging into their online account or calling IRD. In regards to the remaining taxpayers whose income is from sources IRD is aware of, such as wages, the department sends them an assessment informing them of whether they owe taxes or are owed a refund and directing them to report any additional income over 200 New Zealand dollars IRD does not know about, such as cash jobs. To support this, an IRD official explained that his department receives information from employers on income paid and taxes withheld every pay cycle. Further, the official reported that beginning in April 2020 IRD will receive at least monthly information from financial institutions on investment income, which should help IRD further refine its calculations of the tax positions of taxpayers. Regarding married taxpayers, each spouse is required to file his or her own return or receives their own assessment, although the tax return states that the amount a spouse or partner (or ex-spouse or ex- partner) received for a tax credit for working families may affect the other spouse’s tax situation. The United Kingdom’s government website explains that Her Majesty’s Revenue and Customs (HMRC) uses a system—called pay as you earn—in which taxes are deducted automatically from wages and pensions. This means that taxpayers whose only income is from wages or pensions are generally not required to file a return. HMRC mails these taxpayers an annual tax summary (or taxpayers can view it online in their account) informing them of their taxable income and amount collected. If HMRC determines that they owe the taxpayer money or the taxpayer owes the government money, HMRC sends a separate form explaining how it will pay or collect this money. Taxpayers with untaxed income (e.g., renting a property, tips and commissions, income from investments and dividends, and foreign income) may be required to file a return (also referred to as a self-assessment). Even if a taxpayer is not required to file a return, he or she may choose to file a return to claim “income tax reliefs” for such activities as making pension or charitable contributions. Before filing a return, taxpayers who did not file a return in the previous tax year must register with HMRC, which can be done online. HMRC will mail an identification number and activation code and set up an online account for the taxpayer to use to complete the self-assessment. Once taxpayers confirm they are registered, they complete their tax return online using their personal account or choose among using commercial software, hiring an accountant or someone else to help them, filing on paper, or taxpayers meeting specified eligibility criteria may be able to get free professional advice. However, HMRC advises there are certain tax situations, such as a taxpayer receiving income from a partnership, in which its website cannot be used and taxpayers in these situations must use commercial software or file on paper. Regarding correcting errors on filed returns, taxpayers who submitted their return on HMRC’s website can make corrections there, while paper filers must mail a corrected form. Married taxpayers file separate returns, but the tax form has a marriage allowance section which allows a taxpayer to transfer a portion of his or her personal allowance to their spouse or civil partner under certain conditions. The ATO commenced development of new online services for individual taxpayers in 2015 under the direction of its modernization plan, titled “Reinventing the ATO”. The Australian National Audit Office (ANAO) reviewed ATO’s modernization plan in a 2017 report and found that the ATO’s modernization plan provided “clear road maps outlining program intent, deliverables and timing” but identified challenges for ATO in conformance to those processes, specifically in completing cost estimates for development of all new services. In addition, the ANAO found that the costs and benefits associated with the “Reinventing the ATO” program and most of its projects had not been tracked. ANAO reported that ATO collects survey information from taxpayers about the ease of accessing services and information, doing business with the ATO, and measures of timeliness in processing complaints. However, ANAO noted that ATO’s online services have experienced periods of outages, but ATO has not monitored the impact of service outages on satisfaction with its services. In 2017, ANAO reported that ATO had successfully implemented its recommendation to develop an overarching cross-channel strategy that detailed how the ATO plans to transition to an improved online service environment, while also continuing to provide and improve the performance of other service channels. In 2011, IRD began a long-term business transformation program, which plans to modernize tax administration in New Zealand and offer new online services to taxpayers. New Zealand’s Office of the Auditor General (OAG) reviewed IRD’s governance of the business transformation program in 2015 and found IRD to be providing clear direction and supporting clear and effective decisions, but recommended that IRD continue to manage risks, including identifying clear benefit estimates to decision makers. OAG also recommended that IRD manage risks by improving its outreach to stakeholders and taxpayers in advance of the release of new services. As a result, IRD stated in its 2018 program update that it intends to be more proactive in engaging with individual taxpayers. In regards to IRD’s procurement of goods and services for the business transformation program, OAG found instances in which IRD did not consistently comply with relevant rules and policies and made recommendations for improvement. OAG’s report, however, noted that IRD restructured its procurement function and brought in procurement specialists with appropriate skills and resources and OAG intends to follow up on the progress IRD is making in addressing its recommendations. An OAG official reported in November 2019 that his office is currently doing a performance audit of the measurement of benefits from the IRD business transformation program. OAG anticipates submitting the report to the House of Representatives in the first half of calendar year 2020. HMRC outlined a strategy in 2014 (it refers to as a transformation program) to improve its online services for individual taxpayers, which included goals of promoting voluntary tax compliance, designing services to meet customer needs, and improving ease and convenience to taxpayers. The United Kingdom’s National Audit Office (NAO) has reviewed HMRC’s customer service performance, including online services. A 2016 NAO review found that HMRC had reduced the cost of its personal tax operations between 2010-2011 and 2014-2015 in part by moving customers from traditional service channels to less expensive service channels, including online services. Initially, HMRC maintained or improved its customer service performance, but HMRC ended up releasing too many customer service staff and wait times for telephone service started to increase in 2015-2016. While HMRC’s performance improved after it recruited additional staff, NAO concludes that the sustainability of HMRC’s cost reductions will depend on the success of new online services in reducing demand for telephone and mail service. Another review by NAO in 2017 credited HMRC for exceeding its target set for customer satisfaction for digital services, which includes both existing services and new services. Moving forward, NAO recommended that HMRC continue to reevaluate its priorities for its transformation program at least annually, including by measuring the impact on customers, to ensure that new services are delivering the anticipated benefits. In addition, NAO recommended that HMRC be clearer about the way it tracks the costs and benefits of its transformation program. In 2019, NAO found that HMRC had reprioritized its plans due to other demands related to the agency’s preparations for the United Kingdom’s planned exit from the European Union, which has resulted in deferment of development of new online services. Jessica Lucas-Judy, (202) 512-9110 or lucasjudyj@gao.gov. In addition to the individual named above, Tara Carter (Assistant Director), Michael O’Neill (Analyst in Charge), Michael Bechetti, Jacqueline Chapin, Rianna Jansen, Edward Nannenhorn, Andrew Olson, Julia Robertson, Kayla Robinson, Cynthia Saunders, Stewart W. Small, Andrew J. Stephens, Robyn Trotter, and Christopher Woika made key contributions to this report.", "summary": "IRS recognizes that taxpayers want more choices in how they interact with IRS, including through online services. GAO was asked to review IRS's online services—those which allow IRS and individual taxpayers to exchange personalized information electronically. This report (1) examines what is known about how IRS's current online services are meeting taxpayers' needs, and provides information about selected foreign and state revenue agencies' online services; (2) evaluates the extent to which IRS's strategy for identifying and prioritizing the development of new online services is consistent with relevant requirements and leading practices; and (3) examines how IRS is addressing key challenges in providing online services. GAO assessed IRS's online services against relevant requirements, agency goals, and leading practices; interviewed IRS officials; and identified additional services and practices from six foreign and state revenue agencies selected for offering multiple online services for exchanging personalized information with taxpayers. The Internal Revenue Service's (IRS) online services for individual taxpayers primarily provide taxpayers one-way communication of key information derived from their tax return, such as when an anticipated refund should arrive, or allow taxpayers to pay money owed or make payment arrangements. IRS has done little research or reporting on the extent to which its online services are satisfying taxpayers' needs. Also, IRS has not set a target for using online services to help reduce taxpayer burden. Selected foreign and state revenue agencies' online services have developed online filing and communication capabilities, such as filing a tax return on the agency's website and offering electronic chats between revenue agency employees and taxpayers (see figure). IRS has long-term planning documents which detail online services it intends to develop, which include services to communicate digitally with taxpayers, to achieve its goal of modernizing the taxpayer experience. However, GAO found that IRS has not sufficiently considered taxpayer input in the prioritization process for these new services and instead prioritizes services primarily based on the potential benefit to IRS operations or how quickly a service might be developed. Without considering taxpayer input on user needs and preferences, IRS risks developing services that taxpayers do not use. A group of private sector tax preparation companies known as Free File, Inc., has a long-standing agreement with IRS in which the companies provide free electronic tax preparation and filing services to eligible taxpayers in exchange for IRS not offering its own filing capability. However, few taxpayers use these services and GAO found that IRS has given inadequate consideration to the full benefits and costs of the Free File agreement to all parties. Not considering these costs and benefits has implications for the future evolution of IRS's online services, including helping taxpayers electronically file amended returns. GAO is making seven recommendations to IRS, including measuring and reporting on the effect of online services on satisfaction and taxpayer burden and setting a target for reducing burden, considering taxpayer input when prioritizing new online services, and ensuring that any renewal of the Free File agreement reflects benefits and costs. IRS agreed with six recommendations, but disagreed on setting a target to reduce burden. GAO continues to believe IRS should set such a target.", "document_type": "gao"}
{"report": "According to the Summary of the 2018 National Defense Strategy and the Army, the character of warfare is changing. For decades, the United States enjoyed uncontested or dominant superiority in every operating domain—land, air, sea, cyber, and space—but today every domain is likely to be contested by other great-power competitors and potential regional adversaries. Figure 1 below describes these operating domains. Since at least 2012, DOD began shifting its focus from counterinsurgency operations in Iraq and Afghanistan to adversaries who possess more sophisticated capabilities. For example: In 2012, DOD issued strategic guidance that cited efforts by Iran and China to pursue cyber and electronic warfare capabilities with the ability to counter U.S. power projection and limit operational access. The 2014 Quadrennial Defense Review acknowledged the efforts of China and others to counter U.S. strengths using anti-access and area-denial approaches and using new cyber and space control technologies. The 2014 Quadrennial Defense Review also addressed the rapid evolution of modern warfare, including increasingly contested battlespaces in the air, sea, space and cyber domains. In 2016, an Army study of Russia’s operations and doctrine concluded that Russia employs formations, operational concepts, and capabilities that overmatch U.S. capabilities in range and lethality, thus challenging the Army’s ability to conduct operations and win battles. The 2017 National Security Strategy stated that U.S. advantages are shrinking as rival states modernize their forces. The 2017 National Security Strategy identified many of the challenges that China and Russia pose, including Russia’s use of offensive cyber efforts to influence public opinion, and how cyberattacks have become a key feature of modern warfare. A classified National Defense Strategy followed in January 2018, and the unclassified summary cited challenges to the U.S. military advantage as a shift in the global environment. The Army’s multi-domain operations concept originates from an Army effort to rethink how it will fight in the new, more complex operating environment. The Army defines multi-domain operations as ways for confronting adversaries in contested environments by presenting them with multiple challenges through the combining of multiple capabilities. This means that ground forces should be able to operate freely in other warfighting domains and, if necessary, be able to overwhelm an adversary’s forces by combining capabilities across different domains, such as land, air, sea, cyber, and space simultaneously. According to Army officials, in 2014 the then-Deputy Secretary of Defense tasked the Army to update its warfighting concept to deal with the threats and challenges posed by great-power competitors in the future operating environment. The Army officials added that around the same time, the Army began developing and running a wargame scenario focused on a threat that employed similar doctrine, tactics, and capabilities as those used by Russia in Ukraine. In 2016, the Army also assessed the increasingly sophisticated Russian military capabilities and identified specific multi-domain challenges that the Army would face if it came into conflict with Russia. Army officials said that its analysis highlighted the urgency of updating how it would fight such an adversary. In beginning to develop this concept, the Army reached out to the Marine Corps, as both services face similar problems in ground-combat operations. Since the Army began developing its concept, the Army established a framework for assessing how the adversary operates and the problems the Army needs to resolve as a ground force. For example, early on the Army developed an expanded battlefield that stretches far beyond the front lines, or “close area”, where ground forces face off against each other. Under this expanded battlefield, adversaries can use more sophisticated weapons and cyber capabilities that are based in distant and protected territories, potentially reaching targets that are located well behind the front lines, even within the continental United States. Figure 2 below depicts the Army’s new expanded battlefield for multi-domain operations, including a description of each area of the battlefield. The Army is changing aspects of its doctrine, organizations, and training simultaneously to develop a force that can effectively engage great-power competitors, such as Russia and China, across multiple domains, and expects this process to continue through the 2020s. Army concepts propose new approaches for the Army to develop capabilities against emerging challenges. The new Army Operating Concept built around multi-domain operations is intended to drive capability development, which is addressed through changes to the Army’s doctrine, organizations, and training, among other areas. The Army’s goal is to field a more lethal and capable force by 2028 that is able to dominate adversaries in a multi-domain environment. Figure 3 below summarizes how the Army uses validated concepts to drive changes in capabilities and the force. Doctrine. Given the Army’s attention to multi-domain operations, it has updated or is in the process of updating doctrine that guides how the Army fights. Primary among this effort is updating the Army’s overarching operations field manual, which establishes how the Army conducts large- scale ground combat operations against the threat posed by a great- power competitor, among other things. In its most recent revision to its doctrine, the Army incorporated several aspects of multi-domain operations, such as the expanded battlefield that includes cyber and the electromagnetic spectrum. TRADOC officials stated that they are also in the process of updating doctrine related to cyber operations and field artillery operations in order to build a force that can integrate both cyber capabilities and long-range fires—such as artillery, rockets, and missiles—for multi-domain operations. The officials added that the Army is developing or is planning to develop specific doctrinal guidance for new Army units that will focus on multi-domain operations in the areas of intelligence, cyber, electronic warfare, and space. Organizations. The Army wants to ensure that its warfighting organizations have the engineering, artillery, air defense, and other enabling capabilities needed to conduct multi-domain operations. For example, the Army believes that formations above the brigade level, such as division headquarters and corps headquarters, must have the ability to conduct electronic warfare and cyber operations. To that end, the Army is creating several new organizations focused on cyber and electronic warfare (discussed later in the report). Additionally, the Army is trying to align its multi-domain operations concept with a complementary concept focused on the roles and responsibilities of these organizations above the brigade level. Expanding the roles and responsibilities of formations above the brigade level signifies a departure from the Army’s modular force, which was implemented beginning in 2004. At that time, the Army embedded “key enablers” such as military intelligence, reconnaissance, and logistics functions, as well as other specialized personnel and equipment, into brigade combat teams to provide them independent capabilities. Moving forward, the Army envisions enhancing the capabilities of brigade combat teams for multi-domain operations, as well as providing additional key capabilities to formations above the brigade level. For example: Brigade combat teams. Brigade combat teams are the Army’s primary tactical unit, composed of around 4,400-4,700 soldiers. They are being adjusted to conduct operations in the cyber domain, including new platoons focused on electronic warfare. Army division headquarters. Army divisions command multiple brigade combat teams. The Army expects division headquarters to manage the electromagnetic spectrum and to be the primary echelon for integrating aviation, fires, and electronic warfare into ground maneuver to defeat enemies in a close fight. Army corps headquarters. Army corps command multiple divisions. Under the Army’s concept, the Army corps headquarters will be the primary echelon for defeating mid- and long-range enemy artillery fires. The Army corps will also integrate artillery rockets and missiles, as well as cyber capabilities in support of division or brigade ground operations. Field armies. Field armies, which have the ability to command two or more Army corps, are forward-stationed in regions with capable threats posed by great-power competitors. They will conduct campaigns to compete with adversaries short of armed conflict, and manage the transition to armed conflict should it be needed. The field army will also direct deception operations and provide long-range artillery and fires support. Theater armies. Theater armies are also forward-stationed forces and will be responsible for managing and combining Army capabilities in support of information environment operations and space operations. The theater army must be able to protect joint bases and networks and enable access to the theater. Training. The Army is also updating its training across a broad range of efforts. Army training officials stated that there is a need to train units collectively under multi-domain operations conditions against great-power competitors like Russia and China, per guidance from the Chief of Staff of the Army. The commander of Army Forces Command also issued guidance for fiscal year 2019 to help train and prepare soldiers to conduct multi-domain operations. This guidance included increasing the realism and rigor of every unit rotation to one of the Army’s combat training centers, as well as designing warfighter exercises that focus on units conducting operations in contested electronic warfare, cyber, and space environments. Additionally, the training officials stated that in recent years the Army has updated its decisive-action training scenarios to include regional versions for Europe, the Pacific, and Africa that comply with the multi-domain operations concept. The officials added that, in future years, several Army organizations will be collaborating to modernize the Army’s home-station training and combat training centers in support of fielding a force capable of conducting multi-domain operations. All of this builds upon the Army’s earlier efforts to shift its training focus to large-scale combat after a decade of training for counterinsurgency operations, as we testified to Congress in February 2019. The Army is also taking steps to revise the training for cyber and electronic warfare personnel. These steps include revising the U.S. Army Cyberspace Operations Training Strategy so that it accounts for new equipment and doctrine, but also for the new organizations being created and the tasks those units will be expected to perform, according to Army cyber officials. Additionally, the Army Cyber School is revising its cyber and electronic warfare training so that personnel will be able to conduct multi-domain operations. Furthermore, the Army is working on a joint solution for training cyber personnel on behalf of U.S. Cyber Command, according to Army Cyber Command officials. The Army’s goal is to provide the total cyber force with the ability to conduct joint cyber training, including exercises and mission rehearsals by developing a virtual training environment that simulates realistic cyber threats. This cyber training solution, called the Persistent Cyber Training Environment, will allow for experimentation, unit certification, and assessment and development of the cyber mission force in a virtual training environment. The Army’s goal is that the environment will decrease training time, increase throughput of personnel, and improve training quality. One of the stated operational imperatives of the Persistent Cyber Training Environment is to become integrated with multi-domain exercises. The Army is seeking to quickly create or design several new cyber and electronic warfare units in order to execute multi-domain operations; however, Army leadership is activating some units at an accelerated pace due to the sense of urgency imposed by the growing capabilities of potential great-power competitors. Some of these new Army units are more narrowly focused on a particular domain or skill set, such as the recently activated 915th Cyber Warfare Support Battalion based out of Fort Gordon, Georgia, and new Electronic Warfare Companies and platoons. The 915th Cyber Warfare Support Battalion will focus on providing offensive cyber capabilities consistent with its authorities to conduct offensive operations. The battalion is designed to fit with various Army formations—such as corps, divisions, or brigade combat teams—as assigned by the Army. The Electronic Warfare Companies, which are scheduled to be fielded during fiscal years 2023 through 2025 according to Army officials, will be attached to an Army corps and will be capable of planning and conducting electronic warfare operations. Electronic Warfare platoons, which Army officials said are scheduled to be fielded during fiscal years 2020 through 2022, will provide similar capabilities to brigade combat teams and other Army tactical-level formations. Other units are being designed to plan and conduct operations in and across multiple domains, with specialists in cyber, electronic warfare, space, and intelligence assigned to the same unit. For example, a recently activated Intelligence, Cyber, Electronic Warfare, and Space (ICEWS) unit will be capable of planning and directing operations in any or all of those areas. The ICEWS unit will function as part of a larger Multi-Domain Task Force, which will be capable of expanding those operations into other domains such as land and air. The Army plans to field at least two of these ICEWS units by the end of fiscal year 2020. Additionally, the Army is restructuring or creating Cyber, Electromagnetic Activities planning sections in the headquarters of more than 125 Army formations, from special forces units up to theater-level Army headquarters. This restructuring effort will take place during fiscal years 2020 through 2022, according to Army officials. Army guidance states that a unit’s activation date should be identified 1 to 2 years in advance, according to Army officials, in order to provide time to build up trained personnel and equipment in the unit before it is activated and available to be deployed. As a result of accelerating the activation of these units, the Army is facing interrelated challenges in terms of staffing, equipping, and training the units, as discussed below. Accelerated pace creates challenges filling positions. The Army has had difficulty filling its ICEWS unit and the 915th Cyber Warfare Support Battalion with personnel to conduct operations. See table 1 below. By accelerating the activation of the ICEWS unit in October 2018 as a pilot, or test, program, the Army activated the unit with only 32 percent of its personnel in place, and Army headquarters officials report that filling the unit with personnel with the right skills has been a slow process. The 915th Cyber Warfare Support Battalion is facing similar staffing challenges. As of the end of March 2019, the unit was understaffed by more than 80 percent as it filled 30 of 171 authorized positions for fiscal year 2019, according to an Army headquarters official. The official acknowledged that the 915th Cyber Warfare Support Battalion may not meet the authorized staffing levels for fiscal year 2019 if higher priorities arise for the service. Looking ahead, Army officials said that filling all of these new cyber and electronic warfare units could be challenging because cyber personnel are in high demand, with competition for these skilled personnel existing between the Army, other government entities, and the private sector. Army headquarters officials said they are exploring options to address the challenges and have taken steps to retain the personnel that they have, mostly in the form of retention bonuses and incentive pay. Some of those incentives are targeted at the senior enlisted levels, which are some of the personnel that Army officials indicated are in the most demand and of which they have a shortage. Accelerated pace creates equipping challenges. Officials with both Army headquarters and the Army Cyber School cited equipment challenges as one of the key issues that must be addressed when activating a unit on an accelerated basis. For example, in November 2018, an Army headquarters’ official responsible for building the ICEWS unit stated that the Army was having a difficult time identifying where the unit’s equipment would be coming from. By the end of January 2019, the official said the situation was improving and that 55 percent of the equipment had been identified, but the Army was trying to find a source for the remaining 45 percent. However, most of this is common Army equipment, such as firearms, according to an Army official; those percentages do not include the specialized cyber equipment that the unit will need to perform its missions, such as a communications system designed to transfer data beyond the line of sight during air defense operations. An Army headquarters’ official stated that the Army is prototyping different types of specialized equipment in order to expedite the acquisition of such capabilities. Revisions to training not keeping up with activation of units. Army officials acknowledged the need to update its cyber training, in part because the doctrine for new units is still being written. Officials with the Army Cyber School and the Army’s Combined Arms Center stated that the current U.S. Army Cyberspace Operations Training Strategy did not foresee all of the new cyber and electronic warfare organizations the Army now intends to create, including the Cyber Electromagnetic Activities sections attached to various formations. Army headquarters officials stated that they are working on a revision to the U.S. Army Cyberspace Operations Training Strategy to address these issues. However, the first ICEWS unit and the 915th Cyber Warfare Support Battalion were activated without this updated training strategy. With other units scheduled to be activated in fiscal year 2020, it is possible others may be activated without the training strategy as well. Without the updated doctrine and subsequent training strategies that will result from it, TRADOC officials said they would have difficulty designing training for the new units, and soldiers will not have a clear understanding of their tasks and missions. Obtaining equipment also could be a challenge for training servicemembers before they are assigned to cyber or electronic warfare units, according to some Army officials. Officials with the Army Cyber School stated that it could end up growing and producing a workforce that outpaces its ability to procure equipment. However, Army headquarters’ officials stated that equipping operational units is a higher priority than providing equipment to the schools for training, and the Army ensures that those units receiving the equipment get the training they need upon fielding the equipment. If the Army does not acquire new equipment quickly enough, the result could be that soldiers in the Army Cyber School will be trained on outdated equipment, which they will not use when they get to the field. In the process of creating some new units, the Army assessed the risk of whether it can meet the units’ staffing, equipping, and training requirements before the units’ activation date, but it did not do so for those units activated at an accelerated pace. For example, the Army conducted risk assessments for some new Electronic Warfare platoons and Cyber Electromagnetic Activities sections that it plans to begin activating in fiscal year 2020. Those assessments identified issues and mitigation strategies for the Army to consider when making fielding and resource decisions. For example, the risk of finding a sufficient number of qualified personnel for the Electronic Warfare platoons and Cyber Electromagnetic Activities sections would be mitigated by spreading the activations over a minimum of 3 years. The assessment for the Electronic Warfare platoons also identified some equipping issues that will require either more senior-level input or extending timeframes for completion. In contrast, the Army activated the ICEWS unit and the 915th Cyber Warfare Support Battalion in an accelerated manner because of the urgent need to develop these organizations, given the growing capabilities of potential great-power competitors. However, the Army did so without completely assessing the staffing, equipping, and training risk to those units over the long term. For example: According to Army officials, the Army did not perform a risk assessment for the ICEWS unit currently assigned to and participating in exercises in the Pacific, because the Army initiated the unit as a pilot, or test, program. According to Army officials, a risk assessment was unnecessary prior to activating the unit because the Army expects to refine the unit’s personnel, equipping, and training requirements during the pilot program. However, the ICEWS unit is expected to become part of a larger Multi-Domain Task Force in fiscal year 2020. Until that occurs, the ICEWS unit is attached to another active Army unit and, according to Army officials, eligible to be deployed if needed based on its current capabilities. Unless the Army assesses the staffing, equipping, and training risks of the ICEWS unit, the unit may be unable to provide the expected capabilities, either currently or as part of the larger task force to which it will belong. The Army performed an initial risk assessment for the 915th Cyber Warfare Support Battalion before the unit was activated in December 2018. However, Army officials told us that the Army has plans to grow the unit to as many as 627 personnel by 2024, at which point it would be considered fully operational. Unless the Army performs a more complete risk assessment of the 915th Cyber Warfare Support Battalion’s staffing, equipping, and training requirements prior to achieving full operational capability, the Army may be poorly positioned to make decisions about how to use and support the battalion. Army guidance states that the Army should assess its ability to support a new unit’s staffing, equipping, and training requirements, among other things, so that senior Army leaders can evaluate proposed organizational changes. For example, under a force integration functional area analysis, the Army staff evaluates all proposed organizational changes to ensure that they meet the intent of senior Army leaders, have the resources available to accomplish their mission, and that their projected benefits justify increased resources. These assessments analyze the proposed organization in nine areas, such as staffing, structuring, equipping, and training, and are intended to give senior Army leaders an understanding of whether the organizations are affordable, supportable, and sustainable. According to Army officials, the force integration functional area analysis is similar to a risk assessment. In addition, Standards for Internal Control in the Federal Government state that management should identify, analyze, and respond to the risks related to achieving the defined objective—in this case quickly fielding a cyber force to deal with current threats. Because the Army has not completely assessed the risk of organizing the ICEWS unit and the 915th Cyber Warfare Support Battalion, senior Army leaders may be left with an incomplete picture of the challenges in affording, supporting, and sustaining these units over the long term. Moreover, senior Army leaders lacked key information needed to understand the capability and capacity of the units at the time they were activated. For example, these units currently do not have what they need in terms of personnel and equipment to conduct their missions successfully. Further, according to some Army officials, without such an assessment, the Army does not know whether accelerated activation was the best course of action; what challenges they may face in staffing, equipping, and training the units; or how to mitigate challenges that may arise in other areas, such as deploying and sustainment. Army officials stated that there is a lot of informal discussion between relevant Army offices to try to identify and deal with challenges for these units. However, they also acknowledged the problems inherent in activating a unit by accelerating timelines. Such risk assessments also could inform future Army decisions as it activates new units for multi-domain operations. Given the Army’s perception of the threat environment, the Army may decide to activate other multi-domain operations units in an accelerated manner. For example, the Army is exploring ideas for creating several new units in future years to enhance its capability in multi-domain operations, such as a Theater Space Warfare Battalion. The Army also has been running wargames to see how they would operate new types of units at the division, corps, and theater level for commanding and operating long- range missiles and rockets. Army officials stated that as these units grow and evolve, it is uncertain when more comprehensive risk assessments would take place. If the Army does not perform a risk assessment for the activated ICEWS unit before it joins the larger Multi-Domain Task Force, or a more complete risk assessment for the 915th Cyber Warfare Support Battalion as that unit matures, the Army may end up fielding units that are not capable of providing the needed capabilities. Moreover, these risk assessments could provide vital lessons that could inform future Army decisions on the development, activation, and fielding of other units focused on enhancing the Army’s capability to conduct multi-domain operations. The Army engaged with the Joint Staff and other services to develop its Army Operating Concept and envisions opportunities for further coordination in the future. The Army’s overarching objective is to field a multi-domain-capable force by 2028, and it considers further engagement with the Joint Staff and other services as essential to accomplishing that goal. According to Army plans, the Army needs to finalize the next version of its Army Operating Concept by the fall of 2019 in order to incorporate multi-domain operations into all levels of Army leadership, training, and education by 2020. The Army plans indicate that maintaining this schedule is important to have a ready, lethal, and modern force for multi- domain operations by 2028. From the outset, the Army engaged with the Marine Corps to begin its concept development. Together the Army and Marine Corps published a white paper in January 2017 where they unveiled “Multi-Domain Battle” as a new concept for combat operations against a sophisticated great- power competitor. This white paper highlighted the need for ground forces to focus on all five warfighting domains and was intended as a first step toward further multi-domain concept development, wargaming, experimentation, and capability development. Once the white paper was written, the Army engaged with the Joint Staff and the other services in several ways to refine its concept: Joint Staff collaboration. The Army engaged with the Joint Staff on an Army-led study of recent contingency operations and used the lessons to refine the Army Operating Concept’s description of the emerging operational environment. Based on that study, the Army also refined some solutions for addressing threats posed by great- power competitors. Joint Staff officials reported that the Army engaged with the Joint Staff through other collaborative events as well, including tabletop exercises that tested and refined multi-domain concept ideas. Marine Corps collaboration. As the Army moved forward from the white paper, the Marine Corps’ input informed the concept’s development in various ways. This included changing the concept’s title from multi-domain battle to multi-domain operations in April 2018 to better reflect the scope of competition and conflict, as well as the inherent joint nature of modern warfare. The Marine Corps also hosted a multi-domain symposium in April 2018 that was attended by the Army, Air Force, Navy, and Joint Staff. Air Force collaboration. The Army initially collaborated with the Air Force Air Combat Command to inform concept-development efforts, and more recently began working with the Air Force Warfighting Integration Capability under Air Force headquarters. Also, the Army and Air Force collaborated on tabletop exercises focused on simulating multi-domain operations. Army officials told us that this helped them refine their thinking on how to enhance the maneuverability of its land forces by combining Army and Air Force capabilities across domains. Navy collaboration. The Army and Navy principally collaborated by testing multi-domain capabilities during real-world exercises. For example, the Army joined the Navy’s 2018 Naval Rim of the Pacific exercise to demonstrate capabilities for multi-domain operations in a real world environment. While the Army took steps to engage with the Joint Staff and the other services, it made the decision to move forward with the latest version of its Army Operating Concept in order to meet its overarching objective to develop a multi-domain operations-capable force by 2028. Given this urgency, Army officials told us that they may have missed opportunities to further refine its Army Operating Concept in 2018 with the perspectives of the Joint Staff and other military services. Joint Staff officials told us that by not fully including the Joint Staff in some tabletop exercises, the Army may have missed the Joint Staff’s perspective on key issues related to multi-domain operations, such as joint command and control. As the Army continues to revise its Army Operating Concept, the Army recognizes the need to continue to engage with the Joint Staff and other services. Joint Staff officials told us that the Joint Staff has initiated its own plans to engage with the services to refine key ideas of multi-domain operations in joint concepts, including logistics, intelligence, and command and control. Army officials told us that they recognize the importance of not getting too far ahead of these efforts, or the efforts of other services related to multi-domain operations. Army officials told us that the mechanisms built into the Joint concept-development framework would provide opportunities to engage the services and Joint Staff as the Army revises its own concept. Army officials added that beginning in the fall of 2019 the Army will participate with the Joint Staff in a wargame designed, in part, to analyze how the Army Operating Concept works with the other military service operating concepts. As a result, the current concepts are likely to evolve in the future as the Army synchronizes its efforts with those of the Joint Staff and other services. Rising threats posed by great-power competitors, particularly China and Russia, prompted the Army to initiate a profound and fundamental transformation to the way it plans to fight. The refinement of the Army’s Operating Concept is beginning to drive changes across the Army. The Army is making near-term changes by incorporating multi-domain operations into its doctrine, organizations, and training, which includes the accelerated creation of new cyber and electronic warfare units. However, these units are short of both people and equipment. While Army leadership believes that the urgency to confront threats justifies its decision to accelerate the development of those units, the Army did not assess the risks associated with staffing, equipping, and training its existing ICEWS unit prior to activation to determine whether it is affordable, supportable, and sustainable, and officials said it was uncertain when a more comprehensive assessment would take place. The Army plans to incorporate this unit into the first Multi-Domain Task Force by the end of Fiscal Year 2020, but in the meantime the unit could be deployed if needed. The Army did prepare a preliminary risk assessment for the 915th Cyber Warfare Support Battalion prior to activation, but it is unclear whether the Army will perform a more comprehensive risk assessment as the unit matures and nears full operational capability. For the units already activated, a risk assessment could benefit the Army by providing insights about the ability to deploy and sustain the units. It is important for the Army to assess its efforts before committing resources to activate new units. By formally assessing the risk of all new units activated in an accelerated manner, the Army will have the key information its leaders need for making decisions related to the activation of those units and other related units going forward. We are making the following three recommendations to the Secretary of the Army. The Secretary of the Army should ensure that the Deputy Chief of Staff, G-3/5/7 assess the risk associated with staffing, equipping, and training the existing ICEWS unit prior to its incorporation into the first Multi- Domain Task Force in fiscal year 2020. (Recommendation 1) The Secretary of the Army should ensure that the Deputy Chief of Staff, G-3/5/7 conduct a comprehensive risk assessment associated with staffing, equipping, and training the 915th Cyber Warfare Support Battalion prior to approving the expansion of the unit to its full operational capability. (Recommendation 2) The Secretary of the Army should ensure that the Deputy Chief of Staff, G-3/5/7 assess the risk associated with staffing, equipping, and training of new units that it plans to activate in an accelerated manner for the purposes of conducting multi-domain operations, taking into consideration the assessments performed on the first activated ICEWS battalion and the 915th Cyber Warfare Support Battalion. (Recommendation 3) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix I, the Army partially concurred with the first two recommendations and concurred with the third recommendation. The Army partially concurred with the first recommendation for it to conduct a risk assessment, such as a force integration functional area analysis, for the first activated ICEWS unit. The Army stated in its comments that it does not perform force integration functional area analyses for experimental or pilot organizations, and that because the first ICEWS was activated as a pilot, no such assessment was performed. The Army added that it would conduct a risk assessment at the conclusion of the pilot if and when the Army decides to establish such a unit. We met with Army officials to discuss their comments, during which they provided additional information and clarification regarding how they were assessing risks for the unit. Based on this information, we modified the report to reflect the Army’s position that a risk assessment was unnecessary prior to activating the unit because the Army plans on using the pilot period to determine the staffing, equipping, and training requirements for the unit. We also incorporated additional information on the status of the ICEWS unit. As a result, we clarified our recommendation to state that the Army should assess the risk associated with staffing, equipping, and training the existing ICEWS unit prior to its incorporation into the first Multi-Domain Task Force in fiscal year 2020. Army officials generally agreed with the revised recommendation. Moving forward, it will be important for the Army to implement this recommendation to ensure the ICEWS unit, which is active and eligible to be deployed, will be prepared to carry out its mission effectively. The Army partially concurred with the second recommendation for it to conduct a risk assessment, such as a force integration functional area analysis, for the 915th Cyber Warfare Support Battalion. The Army stated in its comments that it does not perform force integration functional area analyses for force generating units such as the 915th Cyber Warfare Support Battalion. Instead, it develops a concept plan, which applies rigor and analysis to determine the most efficient and effective way of fielding a new unit. We met with Army officials to discuss their comments, during which they provided additional information related to assessing risks for the 915th Cyber Warfare Support Battalion. Specifically, Army officials said that prior to activating the battalion, leadership approved the battalion’s concept plan, which included an initial risk assessment. We reviewed the concept plan for the battalion and found that the assessment only addressed the risk of not having the unit’s capabilities activated and in the field for operations. We incorporated this additional information on this initial risk assessment for the 915th Cyber Warfare Support Battalion into the report. As a result of this additional information, we clarified our recommendation to state that the Army should conduct a comprehensive risk assessment associated with staffing, equipping, and training the 915th Cyber Warfare Support Battalion prior to approving the expansion of the unit to its full operational capability. Army officials generally agreed with this. It will be important for the Army to implement the revised recommendation to ensure the 915th Cyber Warfare Support Battalion, which is active and performing operations, will be prepared to carry out its mission effectively. The Army concurred with the third recommendation for it to ensure that a risk assessment is conducted before activating any new organizations it plans to field in an accelerated manner for the purposes of conducting multi-domain operations. The Army added that any lessons learned from the activation of the first ICEWS unit and the 915th Cyber Warfare Support Battalion will be taken into consideration when assessing the risk before the activation of these new organizations. It will be important for the Army to implement the recommendation to ensure that any new organizations are prepared to carry out their missions, while potentially avoiding some of the challenges that the ICEWS and 915th Cyber Warfare Support Battalion have experienced. Lastly, the Army also recommended that we change the title of our report; however, we did not accept the title offered by the Army. We believe the title accurately reflects the issues and recommendations highlighted in the report. We are sending copies of this report to the appropriate congressional committees and to the Secretary of Defense; the Acting Under Secretary of Defense for Personnel and Readiness; the Chairman of the Joint Chiefs of Staff; the Acting Secretaries of the Departments of the Air Force and the Army; the Secretary of the Navy; and the Chief of Staff of the Army. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3489 or pendletonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Staff members making key contributions to this report are listed in appendix II. In addition to the contact named above, Kevin O’Neill (Assistant Director), Matt Spiers (Analyst-in-Charge), Tracy Barnes, Shannon Finnegan, Christopher Gezon, Ruben Gzirian, J. Kristopher Keener, Alberto Leff, Joshua Leiling, Amie Lesser, Jon Ludwigson, Ned Malone, and Clarice Ransom made key contributions to this report.", "summary": "The rise of great-power competitors, such as China and Russia, prompted the Army to transform the way it plans to fight. The Army is developing a new warfighting concept to guide how its forces will engage jointly with other services in multiple domains, especially in cyber and space. The House Armed Services Committee included a provision in House Report 115-200 accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 for GAO to review the Army's implementation of the concept. Among its objectives, this report addresses (1) how the Army is changing its doctrine, organizations, and training in order to execute multi-domain operations; and (2) the extent to which the Army has established new cyber and electronic warfare units, including any challenges faced by these units, and whether the Army assessed risks associated with its plan to establish these units. GAO reviewed Army concepts, doctrine, force design, and training documents concerning multi-domain operations. GAO also interviewed Army and Department of Defense officials. The Army is changing aspects of its doctrine, organizations, and training to develop a force that can effectively engage great-power competitors—Russia and China—through multi-domain operations by 2028. Multi-domain operations present adversaries with multiple challenges across multiple domains (land, air, sea, cyber, and space) in contested environments. To this end, the Army is revising its doctrine to guide how the force and specific units will function. The Army is also reorganizing its force by creating new units to conduct missions in multiple domains and by updating the responsibilities of key Army formations, such as Army divisions. Also, the Army is training its combat forces for multi-domain operations in part by increasing the focus on cyber operations. The Army is establishing new cyber and electronic warfare units for multi-domain operations, but did not fully assess the risk of activating some units at an accelerated pace and is experiencing staffing, equipping, and training challenges. For example, the Army activated a cyber battalion in December 2018, and as of March 2019, this unit was understaffed by more than 80 percent. Army guidance directs the Army staff to conduct assessments on new units to determine whether the Army can staff, equip, and train these organizations. However, Army leadership believed the threats justify developing these units at an accelerated pace. Consequently, the Army did not assess the staffing, equipping, and training risk before activating one unit, and only conducted an initial risk assessment before activating a second unit. As a result, senior Army leaders may not know what other challenges could arise, such as sustainment, as the units grow in capabililty. Army officials told GAO that as these units evolve, it is uncertain when more comprehensive risk assessments would take place. The Army has previously accelerated the activations of other units when it saw fit to do so, and is considering creating other new units for multi-domain operations. If the Army does not assess risks for units activated at an accelerated pace, those units may be unable to effectively conduct multi-domain operations. GAO is making three recommendations, including that the Army comprehensively assess the risk of staffing, equipping, and training the cyber and electronic warfare units that it has activated at an accelerated pace, and to do so for new organizations it plans to activate in an accelerated manner for multi-domain operations. The Army concurred with one recommendation and partially concurred with two recommendations. GAO clarified the recommendations, as discussed in the report.", "document_type": "gao"}
{"report": "VHA recommends that all veterans who receive VHA services be screened for HIV as part of routine medical care, including those who do not think they are at risk for acquiring the virus. The aim is to ensure that veterans who are infected with the virus can be diagnosed as early as possible, receive life-saving care, and avoid passing the virus on to others. VHA has made earlier diagnosis of HIV a priority for the agency and established certain requirements for VAMC providers that aim to achieve early diagnoses and rapid linkages to HIV care for veterans. HIV screening at VAMCs involves three stages, and related VHA policy sets forth providers’ requirements related to each of these stages. (See fig 1.) Stage one: providing HIV tests to consenting veterans. A provider in a primary care clinic, a specialty care setting (such as an infectious disease clinic), or other outpatient setting (such as a women’s health clinic) offers a voluntary HIV test to an eligible veteran. In accordance with Centers for Disease Control and Prevention (CDC) recommendations, VHA policy requires providers to offer a one-time test to all veterans; annual tests to veterans with known higher risk factors for acquiring the virus, such as injection drug use; and tests every 3 months to veterans with known higher risk factors who are prescribed preventive medication known as pre-exposure prophylaxis (PrEP). Once a provider obtains consent from the veteran to be tested for HIV, the provider initiates an HIV test order with the laboratory. Although VHA policy previously required that providers document that they obtained veterans’ verbal consent to be tested for HIV, as of April 2019, providers must obtain, but no longer need to document, such consent. In addition, under VHA policy, providers must order the most current CDC- recommended HIV test (which detects HIV antigens and antibodies) when clinically indicated, and laboratories must follow the CDC-recommended HIV testing algorithm (see text box). A blood sample is collected from the veteran, and the laboratory processes the HIV test. Officials from the five selected VAMCs reported using information technology solutions and other strategies to facilitate each of the three stages of HIV screening: providing HIV tests to consenting veterans (stage one), communicating HIV test results to veterans (stage two), and linking HIV-positive veterans to care (stage three). Officials from multiple VAMCs in our review stated their providers use information technology solutions, such as clinical reminders, to fulfill their requirements related to the first stage of HIV screening: offering HIV tests to veterans, obtaining veterans’ verbal consent to be tested, and ordering the most current recommended HIV test. Offering HIV tests to veterans. Officials from three VAMCs in our review told us that providers often use clinical reminders that were developed and implemented by the VAMC or associated VISN to prompt them to offer HIV tests to veterans. (See fig. 2.) According to these officials, clinical reminders are used to prompt providers to offer a one-time HIV test to veterans who have not been tested. They can also be used to facilitate providers’ identification of veterans who are at higher risk for acquiring HIV and subsequently prompt them to offer these veterans an HIV test on an annual, rather than a one-time, basis. For example, officials at two of these three VAMCs indicated that the reminders include prompts for determining if veterans are at higher risk of acquiring HIV or fields to document identified risk factors. One of these officials told us that the recurrence of these clinical reminders can subsequently be increased or decreased to prompt providers to offer an HIV test to veterans who are at higher risk of acquiring HIV on a more or less frequent basis, depending on the risk factors identified over time. Obtaining veterans’ verbal consent to be tested. According to officials from the three VAMCs that discussed the use of clinical reminders, this technology prompts providers to obtain veterans’ verbal consent to be tested for HIV before ordering tests. Further, the reminders give providers a way to document that consent was obtained. For example, officials at one of the three VAMCs stated that providers can access the laboratory menu, which they use to order an HIV test, through the clinical reminder. The officials stated that providers must either (a) document that they obtained veterans’ verbal consent within the clinical reminder before accessing the menu, or (b) document that verbal consent was obtained once they have accessed the menu. Ordering recommended HIV tests. Officials from four of the VAMCs in our review reported that the facilities’ laboratory menus are designed to make it easier for providers to order the most current CDC-recommended HIV test. For example, officials from two VAMCs told us that the most current CDC-recommended HIV test is either the first result that appears when searching for an HIV test within the laboratory menu or the first HIV test that appears within a list of different types of HIV tests. According to officials from another VAMC, the facility’s laboratory menu includes a prompt that explains that an HIV viral load test (a test that is primarily used to monitor an active HIV infection) is not recommended solely to be used for diagnostic purposes if a provider attempts to order such a test for this purpose. Officials at each of the five VAMCs in our review told us that staff contact veterans to schedule non-routine, in-person appointments within the 7 day time frame to inform them that they have tested positive for HIV. According to officials at four VAMCs, staff first place phone calls to veterans and request that the veterans schedule face-to-face visits with providers. Officials at two VAMCs explained that providers attempt to inform veterans of positive HIV test results in person given the sensitive nature of the diagnosis, as recommended by VHA policy. If staff cannot reach the veterans by phone, officials at these two VAMCs indicated that they send letters to the veterans asking them to contact their providers to obtain their test results. Further, officials at three VAMCs stated that staff send letters to veterans to inform them of negative HIV test results within the required 14 day time frame. Officials from all five VAMCs in our review also reported using various, additional approaches to communicating negative HIV test results to veterans, including notifying them by phone, informing them of test results during face-to-face visits, or uploading test results into veterans’ personal electronic health records (EHR). In addition, all five VAMCs in our review have developed protocols to prevent delays in the communication of positive HIV test results to veterans when the provider who ordered the test is unavailable. These protocols are generally outlined in facility-specific policies, which we reviewed, that require that a designee communicate positive HIV test results to veterans in lieu of the ordering provider. According to officials at three VAMCs, these protocols apply when the ordering provider is unavailable for a certain number of consecutive days (typically 3 days). Officials told us that if the designee is not available, their facility’s protocol requires that VAMC leadership (such as the Chief of Medicine) communicate the results to the veteran. Officials from all five VAMCs in our review indicated that providers may refer eligible HIV-positive veterans to care within the community to ensure that treatment occurs in a timely manner. According to officials at two of these VAMCs, these referrals are often made based upon veterans’ preferences or primary care providers’ comfort levels in providing HIV care to veterans who are also eligible for community care. An official at another of these VAMCs told us that eligible veterans who live further distances from the VAMC may ask to be referred to community care. According to officials from multiple VAMCs in our review, providers may also use telecommunications to provide HIV care to veterans. For example, officials from two VAMCs told us that their facilities offer telehealth consultations with an infectious disease provider to veterans who live outside the city in which the VAMC is located or who otherwise find it inconvenient to be seen in-person by an infectious disease provider at the facility. Telehealth allows infectious disease providers to care for veterans who would otherwise receive HIV care from primary care providers or in the community. Officials at another VAMC reported that infectious disease providers are available via cell phone or Skype (software that can be used to make one-to-one or group voice or video- based calls from a cell phone or computer) to assist primary care providers who assume responsibility for veterans’ HIV care. VHA facilitates monitoring of the first stage of HIV screening by providing information to VAMCs that include data on the number of veterans who have been tested for the viral infection. While VHA does not collect data on the timeliness with which HIV test results are communicated to veterans, data resulting from VHA’s monitoring of the communication of other test results may indicate whether veterans are informed of HIV test results within recommended time frames. However, HIV lead clinicians may not be aware that they have access to this information. VHA does not currently monitor whether veterans who test positive for HIV are linked to care within recommended time frames; however, VHA has taken steps to collect and disseminate data that can be used to monitor this stage of screening. According to HHRC officials, the office collects and disseminates annual and biannual data to each VAMC’s HIV lead clinician on the offering of HIV tests to veterans. (See table 2 for information related to VHA’s monitoring activities.) This includes data on (1) the number of veterans who are eligible to receive one-time HIV tests, as well as the number of eligible veterans who were tested, for each VAMC and VISN; and (2) the number of veterans who are prescribed PrEP who are tested for HIV every 3 months to document that they are still HIV negative as recommended by the CDC. HHRC officials told us that they share the one-time testing rate data with HIV lead clinicians on an annual basis, and that these clinicians can use the data to calculate their VAMCs’ one- time HIV test rates and, subsequently, compare their rates regionally or to VAMCs that offer the same complexity of services. According to HHRC officials, they upload these data to an internal data sharing website and notify HIV lead clinicians that the data are available via email and during regularly scheduled conference calls that facilitate the discussion of issues related to HIV screening. HHRC officials also told us that VHA uses the same method to share with HIV lead clinicians on a biannual basis data on the HIV test rate for veterans who are prescribed PrEP. VISNs and VAMCs have used VHA’s data on the offering of HIV tests to veterans to support local efforts to improve HIV screening. For example, HHRC officials told us that VISNs have used data on the number of veterans who are eligible to receive one-time HIV tests, and who were tested, to support applications for VHA-sponsored grants intended to improve the offering of such tests to homeless veterans. Officials from four VAMCs in our review told us that they have used these data to identify the need to increase testing, which led to the implementation of new strategies, such as clinical reminders that prompt providers to offer one-time and risk-based HIV tests to veterans. While VHA recently monitored the documentation of verbal consent by collecting data that VAMCs used to make related improvements, such monitoring is no longer needed due to a change in VHA policy. Between fiscal years 2013 and 2016, NCEHC (the VHA office responsible for VHA’s policy on informed consent) oversaw a system-wide review that led to improvements in the number of VAMC providers that documented in veterans’ medical records that they obtained veterans’ verbal consent to be tested for HIV. In 2019, VHA amended its policy and no longer requires providers to document that they obtained verbal consent. In addition, VHA recently monitored VAMC laboratory protocols for HIV testing, but HHRC noted that this monitoring is no longer needed, because the recommended testing technologies have been implemented. In 2018, VHA conducted a one-time review of VAMC laboratory protocols to ensure that CDC recommendations for the use of HIV tests were followed at each VAMC, such as recommendations related to the type of HIV test that providers should order for diagnostic purposes. VAMCs were required to submit verification to VHA showing that their laboratories had implemented the most current CDC-recommended testing technologies. According to HHRC officials, this provided assurance that providers were ordering the most current CDC-recommended HIV test and that laboratories were following the CDC-recommended HIV testing algorithm. VHA’s Director of Pathology and Laboratory Medicine Service reviewed the verification submitted by each VAMC, and VAMCs were required to develop action plans to address any identified deficiencies. As of August 7, 2018, VHA found that all VAMCs were following CDC’s recommendations related to the availability and use of HIV tests. According to HHRC officials, VHA does not need to continue its monitoring effort in this area, since the implementation of recommended testing technologies by VAMCs was a one-time effort. Further, officials from the five VAMCs in our review told us that the VAMCs were using the CDC-recommended HIV test, and nothing inconsistent came to our attention during our medical records review. OPC and RAPID (the VHA offices responsible for VHA’s policy on the communication of test results and related performance measurement) make data available to VAMC staff that may indicate the timeliness with which HIV test results are communicated to veterans. OPC and RAPID publish a quarterly report on the timeliness with which results from the eight tests that are included in its review of veterans’ medical records are communicated to veterans at each VAMC. While HIV tests are not one of the eight tests included in the OPC and RAPID review, VAMC officials we interviewed told us that VAMC procedures for communicating results are generally the same for all tests. OPC officials stated that VAMC officials could use the data to identify needed performance improvement efforts related to the communication of test results. OPC officials added that while it is not the primary goal of the OPC and RAPID review, data on the eight tests included in the review may serve as a sample, providing some indication as to whether VAMC procedures promote the timely communication of results of any test to veterans. Although OPC and RAPID publish a quarterly report on the timeliness of communicating test results, HIV lead clinicians may not be aware they have access to this information. OPC and RAPID officials told us that VAMC staff responsible for serving as liaisons for OPC’s medical records review are notified by RAPID via email of the report’s availability. RAPID officials added that any VAMC staff may opt in to the email group that officials use to notify liaisons that the timeliness data have been published. HIV lead clinicians we interviewed reported that they did not know that they can opt in to this email group. According to RAPID officials, the main mechanism for making VAMC staff aware that they can join this email group is through their VAMC colleagues. VHA has not taken steps to more systematically communicate the availability of these timeliness data to all VAMC staff (including HIV lead clinicians). Standards for internal control in the federal government require that agencies communicate necessary information throughout all agency reporting lines to achieve the agencies’ objectives and respond to identified risk. VHA policy requires that HIV lead clinicians serve as VAMC points of contact on HIV testing, diagnosis, and care, which may include monitoring HIV care. An HIV lead clinician we interviewed also noted that these data could be used as an indicator as to whether HIV test results are being communicated to veterans in a timely manner. Further, having these data could help staff determine if delays in communicating test results pose risks to the timely completion of HIV screening, such as whether veterans who test positive for HIV are linked to care for their diagnosis as expeditiously as possible. If there are unnecessary delays in communicating positive HIV test results to veterans, providers may be at risk of delaying the start of needed HIV treatment. According to VHA policy, and confirmed by RAPID officials, the timely communication of test results to veterans is essential for high quality care, and the timely follow- up of positive test results may help veterans achieve favorable health outcomes. Linking Veterans to Preventive Care for Human Immunodeficiency Virus (HIV) In addition to linking veterans who test positive for HIV to care for their diagnosis, Department of Veterans Affairs (VA) medical centers link veterans who test negative for HIV to preventive care. The use of preventive medication, or pre-exposure prophylaxis (PrEP), reduces the risk of acquiring HIV in adults. Officials from VA’s HIV, Hepatitis, and Related Conditions Programs (HHRC) told us that they implemented a PrEP quality improvement initiative in September 2016, which focuses on increasing the use of PrEP among veterans who live in areas of the country with a higher prevalence of HIV compared to the national average. HHRC officials told us that the initiative focuses on providing high quality care to veterans in accordance with current recommendations on the use of PrEP. For example, the Centers for Disease Control and Prevention (CDC) has recommended that providers prescribe PrEP medications to individuals who test negative for HIV within one week of documenting the test result. HHRC officials told us that they monitor the time frames in which veterans are prescribed PrEP medication by collecting data on a biannual basis on the date on which veterans’ blood was drawn for the purposes of conducting an HIV test and the date on which veterans’ were prescribed the medication. HHRC officials told us that these data are disseminated to VA medical center staff responsible for improving HIV screening to improve the appropriate use of PrEP as needed. source of information to determine whether veterans are linked to care specifically for their HIV diagnosis within the recommended time frame. According to officials, the data tool was implemented in October 2018, and as of early November 2019, they were in the process of building the capacity to generate a report based on these data showing the time frames in which veterans are linked to HIV care. HHRC officials initially indicated that they expected to begin monitoring linkage to HIV care in August or September 2019, but they were not able to do so for various reasons. According to HHRC officials, the process of building the new data tool and the capacity to generate a report has been lengthy due to competing priorities related to VHA’s ongoing development of a new EHR system. These officials added that they have been simultaneously focused on implementing required improvements in the diagnosis and treatment of veterans with Hepatitis C. According to officials, the time frame to develop the new data tool and report has been extended due to these competing priorities. HHRC officials told us that once monitoring begins, they will report on the number of veterans who are linked to HIV care within the recommended 30-day time frame for each VAMC on an annual basis, retroactive to fiscal year 2018. According to HHRC officials, the data will be disseminated by publishing them on an internal data sharing website that each VAMC’s HIV lead clinician can access. The officials explained that these clinicians will be notified when the data have been published via email and during regularly scheduled conference calls with HHRC. HHRC officials also told us that the data may be used to inform any needed improvements in the timeliness of linking newly diagnosed veterans to HIV care. Standards for internal control in the federal government require that agencies perform ongoing monitoring activities and evaluate results to remediate any identified deficiencies on a timely basis. VHA policy requires that HHRC develop data reports for monitoring the quality of HIV care that are to be disseminated to the VISNs or VAMCs, among other entities and individuals, and lead VHA efforts toward meeting the NHAS’s recommendations. However, until HHRC disseminates data on the timeliness with which veterans are linked to HIV care, VAMCs are limited in their ability to identify any delays and take the necessary steps to ensure that this occurs within recommended time frames, now and in the future. In our nongeneralizable review of the 38 medical records for veterans who tested positive for HIV, we observed some instances of delay. Specifically, we found that six veterans were first seen by an infectious disease provider, who typically treats HIV, more than 30 days after being informed of their positive test results. We were unable to identify a documented explanation in the six medical records for why linkages to care exceeded 30 days. Delays in linking veterans to HIV care can increase the risk that veterans are not promptly beginning treatment to help achieve favorable health outcomes. According to the 2015 NHAS, evidence shows that earlier treatment reduces the risk that an individual with HIV will develop AIDS or transmit the virus to others. Veterans who are voluntarily tested for HIV at VAMCs, informed of positive HIV test results in a timely manner, and expeditiously linked to care before their infections progress further have improved health outcomes, a longer life expectancy, and a reduced risk of transmitting the virus to, for example, a sexual partner. VHA has monitored the provision of HIV tests to veterans and reported related improvements resulting from these monitoring efforts, ensuring that, for example, veterans are receiving the most current CDC-recommended test. However, VHA’s dissemination of data on the time frames in which test results are communicated to veterans and monitoring of the time frames in which HIV-positive veterans are linked to care specific to their diagnosis needs improvement. We are making the following two recommendations to VA: The Under Secretary for Health should take steps to improve communication to VAMC staff (including HIV lead clinicians) about the availability of data on the time frames in which test results are communicated to veterans. (Recommendation 1) The Under Secretary for Health should disseminate data to HIV lead clinicians on the extent to which veterans who test positive for HIV are linked to care within recommended time frames. (Recommendation 2) We provided a draft of this report to VA for review and comment. In its written comments, which are reproduced in appendix I, VA concurred with our recommendations. VA stated that it will communicate to VAMC staff, including HIV lead clinicians, how providers may be notified when the data on the time frames in which test results are communicated to veterans have been published. Further, VA stated that HIV test results will be added to the OPC and RAPID quarterly review of such time frames beginning in the second quarter of fiscal year 2020. VA also indicated that as of December 2019, the agency began annual monitoring of whether veterans are linked to HIV care within recommended time frames and will notify HIV lead clinicians of the availability of the data during conference calls scheduled to take place in January and March 2020. We are sending copies of this report to the appropriate congressional committees and the Secretary of Veterans Affairs. In addition, this report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at DraperD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Hernán Bozzolo (Assistant Director), Karen Belli (Analyst-in-Charge), Hannah Grow, Cathy Hamann, and Tatyana Walker made key contributions to this report. Also contributing were Jacquelyn Hamilton, Diona Martyn, and Vikki Porter.", "summary": "VHA is the largest single provider of medical care to HIV infected individuals in the nation. In 2018, VAMCs tested approximately 240,000 veterans for HIV and provided HIV care to over 31,000 veterans. Early diagnosis and timely treatment is important for achieving favorable health outcomes and reducing the risk of transmitting the virus to others. The accompanying Joint Explanatory Statement for the Consolidated Appropriations Act, 2018 included a provision for GAO to examine how VAMCs have implemented VHA's HIV screening policy. This report examines (1) approaches that selected VAMCs use to facilitate HIV screening, and (2) the extent to which VHA monitors HIV screening. GAO analyzed VHA documents, including VHA directives and a nongeneralizable sample of 103 veterans' medical records, to understand how providers made decisions and documented actions related to HIV screening. GAO also interviewed VHA and VAMC officials, the latter from five facilities selected based on factors such as the range of HIV prevalence rates. Officials from five selected Department of Veterans Affairs (VA) medical centers (VAMC) reported using various approaches to facilitate human immunodeficiency virus (HIV) screening, which involves three stages. For example, for the first stage of HIV screening (providing HIV tests to consenting veterans), officials told GAO that VAMCs use information technology solutions, such as clinical reminders that prompt providers to offer HIV tests to veterans who have not been tested. These clinical reminders can also prompt providers to offer an HIV test on a repeated, rather than a one-time, basis to veterans with known higher risk factors for acquiring HIV. The Veterans Health Administration (VHA) monitors the first stage of HIV screening by collecting and disseminating data that VAMCs can use to calculate and, if necessary, improve facility HIV testing rates. VHA also collects data on the time frames in which results for eight types of tests are communicated to veterans; these data could indicate how timely test results are being communicated generally (stage two of HIV screening). However, VHA has not effectively communicated the availability of these data to HIV lead clinicians. In addition, VHA does not currently monitor whether VAMCs link veterans who test positive for HIV to care in a timely manner (stage three of HIV screening). VHA officials indicated that they are in the process of building the capacity to collect and disseminate to HIV lead clinicians data on the number of veterans at each VAMC who are linked to HIV care within 30 days, as recommended. However, the time frames for completing these efforts have been extended due to competing priorities, such as implementing required improvements in the diagnosis and treatment of veterans with Hepatitis C. Until VHA improves VAMC staff's access to, or provides them with, these data, it increases its risk that HIV-positive veterans do not receive timely treatment. Such treatment can improve veterans' health outcomes and prevent the transmission of the virus to others. VA should (1) improve communication regarding the availability of data on the timeliness with which test results are communicated to veterans, and (2) disseminate data to HIV lead clinicians on the timeliness with which veterans are linked to HIV care. VA concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Federal agencies can respond to a disaster when effective response and recovery are beyond the capabilities of affected state and local governments. In such cases, the President can declare a major disaster in response to a request by the governor of a state or territory or the chief executive of a tribal government. The SBA Administrator also can issue an agency physical disaster declaration for events that do not rise to the level of a major Presidential disaster declaration in response to a timely request by a state governor. The National Response Framework governs any type of federal disaster or emergency response. Under this framework, FEMA has lead responsibility and offers disaster assistance. At least 30 other federal agencies, including SBA, also administer disaster assistance programs and activities. The Small Business Act authorizes SBA to make direct loans to help businesses, nonprofit organizations, homeowners, and renters repair or replace property damaged or destroyed in a declared disaster (declared by the President or SBA). ODA is responsible for administering the SBA disaster loan program, primarily through the following offices: Customer Service Center is a single nationwide point of contact for disaster survivors who have questions about SBA disaster loans. It provides a call center, email response, disaster application mailings, and pre-application entry. Field Operations Centers coordinate disaster field operations and publicize ODA’s Disaster Loan Program before and after disasters. Field Operations Centers establish, staff, and maintain field operations in declared disaster areas, including Disaster Recovery Centers, Business Recovery Centers, and Disaster Loan Outreach Centers. Processing and Disbursement Center screens all applications, reviews and processes those that are complete, closes all approved loans, and disburses loan proceeds. In addition, ODA works with resource partners, such as SBDCs, to provide disaster assistance to businesses. SBDCs help SBA by conducting local outreach to disaster victims; assisting those who have had their business loan application denied or withdrawn with applications for reconsideration or re-acceptance; assisting declined applicants in remedying issues that initially precluded loan approvals; and providing business loan applicants with technical assistance, including to reconstruct business records, to better understand requirements to complete a loan application, and for compiling financial statements and collecting required documents. The Small Business Act authorizes SBA to make available two different types of direct disaster loans to survivors located in a declared disaster area (see table 1): Physical disaster loans are for the permanent rebuilding and replacement of uninsured or underinsured disaster-damaged property. They are available to homeowners, renters, most types of businesses regardless of size, and nonprofit organizations. Businesses in agriculture-related industries—also known as agricultural enterprises—are not eligible. Economic injury disaster loans help meet working capital needs (until normal operations resume) for most disrupted small businesses and private nonprofit organizations that utilized all reasonable available funds and were not able to obtain credit elsewhere after a disaster declaration. The loans cover operating expenses the businesses could have paid had the disaster not occurred. Business eligibility for the loans also differs. Certain businesses of all sizes are eligible for physical disaster loans, but only small businesses are eligible for economic injury disaster loans. Small businesses that did not sustain physical damage from a disaster cannot apply for physical disaster business loans but can apply for economic injury disaster loans. And, applicants seeking both types of loans may be approved for one type of disaster loan but denied for the other. SBA procedures generally require that applications for a physical disaster loan be submitted no later than 60 days following the disaster declaration and no later than 9 months after this date for an economic injury disaster loan. SBA may authorize an extension of the filing period, and did so for each of the 2017 hurricanes. Applicants can apply for a loan (1) at a FEMA Disaster Recovery Center, (2) at a Business Recovery Center or SBA Disaster Loan Outreach Center, (3) by mail, or (4) online through SBA’s electronic loan application system. SBA requires applicants seeking any disaster loan to submit documents with their application package, including permission for SBA to access applicants’ tax return information. SBA’s regulations contain underwriting criteria that require reasonable assurance of repayment. The regulations state that SBA must have reasonable assurance that all disaster loan applicants can repay their loans based on SBA’s analysis of the applicants’ credit or personal or business cash flow. Processing of disaster loan applications involves several stages (see fig. 1). For example, loss verifiers conduct desktop or on-site inspections for physical disaster loan applications to estimate the cost of restoring damaged property to predisaster condition. The verified loss becomes the basis for the loan amount. Loan officers determine eligibility during processing, taking into consideration any insurance or other recoveries, and make the decision to approve or decline an application. Case managers work with borrowers through the disbursement process (until the loan is fully disbursed). To plan for its response to Presidentially declared disasters, SBA maintains long-term disaster planning documentation, conducts disaster simulations, maintains an outreach plan, and creates action plans for specific disasters. Disaster planning documents. SBA’s major planning documents for disasters include its Disaster Preparedness and Recovery Plan and its Disaster Playbook. The Disaster Preparedness and Recovery Plan outlines SBA’s responsibilities as part of federal disaster response efforts. The plan is intended to ensure a broad scope of coordination, awareness, and support throughout the organization, and describes how SBA conducts its disaster-related missions. The plan also includes appendixes describing different aspects of SBA’s disaster response operations, including SBA’s forecasting and modelling to predict internal resource requirements such as staff. The document is revised annually. The Disaster Playbook outlines the roles and responsibilities of ODA departments, resource partners, and other private-sector partners at each major phase of the disaster recovery process. For example, it describes the steps taken by each ODA department to receive and process incoming disaster loan applications. According to SBA officials, the Disaster Playbook that guided the disaster response for the 2017 hurricanes was issued in 2014. Disaster simulations. SBA also participates in external and internal disaster simulation exercises. SBA participates in the FEMA-led National Exercise Program, which is a 2-year cycle of exercises that examine and validate capabilities in the National Preparedness System mission areas. SBA’s internal disaster simulations occur at SBA’s biennial Senior Leadership Summit. SBA is required by law to conduct an internal disaster simulation exercise at least once every 2 fiscal years. The exercises are designed to improve understanding of preparedness concepts, identify opportunities or problems in SBA’s response to disasters, and discuss solutions for improvement. Outreach plan. SBA maintains a marketing and outreach plan with the goal of continuing and strengthening lines of communication with stakeholders to build strong and productive partnerships. The plan describes how SBA promotes awareness of the risk of natural disasters, the need to be prepared, and SBA’s role in disaster recovery. The plan also outlines areas of responsibility, disaster event scenarios, strategies for achieving its outreach goals, and implementation of outreach efforts. According to the plan, implementation of outreach efforts should include distribution of SBA disaster information products by public information officers and SBA’s resource partners, including SBDCs. Action plans. SBA Field Operations Centers create disaster-specific action plans to guide disaster responses. According to officials from the centers, action plans outline projected resource requirements, such as staff, and may include descriptions of the impending disaster scenario, SBA leadership responsibilities, and operational support requirements. SBA has designated response levels that correlate staffing levels with anticipated numbers of applications. SBA has four response levels based on the number of loan applications it expects to receive (see fig. 2). Each level has different goals for staffing and processing applications. The 2017 hurricanes triggered a level III response from SBA. SBA established the Express Bridge Loan Pilot Program to supplement the agency’s disaster response capabilities. The pilot program became available for use on October 16, 2017, and is set to expire on September 30, 2020. The pilot allows 7(a) lenders with SBA Express lending authority to deliver SBA-guaranteed financing for disaster-related purposes to eligible small businesses on an emergency basis while the businesses apply for and await long-term financing. The businesses must be located in, or contiguous to, communities with Presidentially declared disasters and have a pre-existing banking relationship with the 7(a) lender. Loan applications are subject to a streamlined underwriting process to ensure that small business owners receive a quick decision. SBA’s major disaster planning documentation lacks an in-depth discussion of risks SBA could face when responding to disasters. The Disaster Preparedness and Recovery Plan states that SBA must assess risk from two perspectives. First, it must address risk to its own resources and capabilities through its employee safety and continuity of operations plans to preserve its mission-essential functions, including the Disaster Loan Program. Second, SBA must evaluate the demands various disaster scenarios can place on the agency regardless of the impact to its own assets. However, the Disaster Preparedness and Recovery Plan does not include a description of potential risks that may prevent SBA from successfully executing the Disaster Loan Program or discuss how SBA is to conduct risk analysis. Furthermore, SBA’s Disaster Playbook does not include any mention of risk and risk-mitigation techniques. Federal internal control standards state that management should identify, analyze, and respond to risks related to achieving defined objectives. For example, the types of challenges SBA faced in executing its response to Hurricane Maria in Puerto Rico and the U.S. Virgin Islands represent potential risks to the program because they could compromise SBA’s ability to successfully execute the program. These challenges included Loss of electricity: Electrical outages restricted SBA’s ability to quickly establish operations and help survivors access disaster loans. According to SBA officials, ODA established its base of operations at the SBA District Office in San Juan (which had generator power) because they had difficulty locating other usable office space due to power outages. In a report issued after the 2017 hurricanes, SBA noted that periodic outages also prevented applicant access to the online Disaster Loan Application Portal. Other infrastructure damage: Physical infrastructure damage restricted SBA’s mobility around Puerto Rico and the U.S. Virgin Islands following Hurricane Maria, delaying SBA’s execution of the Disaster Loan Program. According to SBA officials, there were no flights into or out of the islands, and driving was difficult due to damage to and debris on the roads. No or intermittent communications services: According to SBA officials, telephone lines were down and cellular phone service was intermittent in Puerto Rico immediately after Hurricane Maria, which made communicating with staff and disaster survivors more difficult. We present applicant, other stakeholder, and SBA perspectives on these and other challenges later in this report. SBA officials told us that the agency contracts with an outside firm to conduct monthly portfolio analysis reports. Officials also told us that they use this report to identify areas of credit risk and make adjustments to program parameters, such as minimum acceptable credit scores. However, officials told us that they do not formally document other types of risks, including operational risks, or the steps taken to mitigate these risks. For example, SBA’s major planning documentation does not include any discussion of steps taken by ODA to mitigate the risk to the program posed by the major infrastructure damage that occurred in Puerto Rico after Hurricane Maria. Without identifying risk elements associated with its disaster response and documenting how it plans to mitigate these risks, SBA may not be adequately prepared to respond to challenges that arise during its disaster response efforts. The action plans created for the 2017 hurricanes contained varied information and in some cases did not discuss certain resource requirements for responding to the disaster, such as equipment needs. For example, the Hurricane Harvey action plan is less detailed than the plans for Hurricanes Irma and Maria and only discusses the anticipated staffing needs and strategies to meet those needs. The action plans for Hurricanes Irma and Maria identified additional resource needs and issues unique to a particular location. FEMA provides guidance on developing disaster plans for local, state, and federal government planners to guide their on-site response to disasters. These plans should focus on managing personnel, equipment, and resources that play a direct role in the response. The plans are to define how specific actions will be performed to achieve a planned outcome and include the “who, what, where, and when” in describing deployment and direction of resources. SBA officials told us they created a template to help in estimating staffing needs, but SBA has not identified whether any other elements, such as those defined by FEMA, should be included in these plans. Moreover, SBA has not provided guidance to the Field Operations Centers that is specific to preparing action plans for impending disasters. In addition, SBA’s major disaster planning documents, the Disaster Preparedness and Recovery Plan and the Disaster Playbook, do not mention action plans. According to SBA officials, these plans are internal documents, and the template and the Field Operations Center director’s prior experience creating action plans are sufficient guidance. Without identifying the key elements of a disaster action plan and providing additional guidance to staff on how to incorporate these elements in future action plans, SBA’s Field Operations Centers may miss opportunities to better tailor their response to individual disasters, decreasing the effectiveness of their responses. As discussed previously, SBA participates in external and internal disaster simulation exercises to help it prepare for disasters. For instance, SBA participated in the 2019 National Level Exercise, which simulated the interagency response to a large earthquake in Tennessee. Prior to the 2017 hurricanes, SBA conducted an internal disaster simulation at its biennial leadership seminar in 2016. SBA simulated a series of three progressively more challenging events, including a simulated earthquake that, according to SBA officials, took out power to two major West Coast cities. According to SBA officials, this exercise helped them prepare for the widespread power outages encountered during the disaster response in Puerto Rico after Hurricane Maria. SBA officials told us that after an internal simulation, SBA prepares a report that summarizes the events and recommends disaster response improvements. For example, after the 2016 simulation, SBA determined it did not currently have the resources to adequately respond to a large event. Suggested improvements to increase SBA’s response capacity included establishing timelines for screening and training of new hires. In response to the 2017 hurricanes, SBA forecasted the need for additional staff and hired staff as outlined in its Staffing Strategy. SBA also encountered several challenges associated with its hiring and training processes. The Staffing Strategy used by SBA in its response to the 2017 hurricanes describes the types of staff SBA hires for disaster response, how SBA determines and manages staffing levels, and factors to consider when hiring new or returning staff. For example, the guidance describes business needs SBA should consider when making hiring decisions, such as workload, special skills required, and cost-saving measures. Before an impending disaster, SBA uses a model to forecast staffing levels. According to SBA officials, the model helps identify the expected number of staff needed in each ODA office and peak need based on the anticipated number of applications received. The officials noted that predicted applications typically peak about 3–4 weeks into the disaster response. Key assumptions and inputs to the model include the target application review and decision time frame; the requirements for specialized staff skills such as loss verification, loan processing, and legal review in the application process; staff productivity and training requirements; the total expected loan volume; and the type of disaster. As shown in figure 3, SBA’s actual staffing lagged behind its predicted levels for the first 4 months following the 2017 hurricanes. Officials told us that SBA encountered challenges quickly hiring and getting new staff on board immediately following the 2017 hurricanes. Due to the rapid need for qualified staff to respond to the 2017 hurricanes, SBA faced a variety of self-identified challenges in hiring the staff. Recruitment: ODA lacked a national recruitment strategy and vehicle for advertising vacant positions. In addition, SBA processed resumes manually, without the ability to effectively match resumes with required skillsets. Due in part to its manual processes, it took SBA time to hire qualified human resources specialists to process the large number of applicants for positions, which affected the ability to hire and deploy new staff to disaster areas. Hiring: Because of the size of the 2017 hurricanes, ODA initially was unable to effectively support staffing needs of centers. In addition, SBA officials said that the agency had to hire Puerto Rican attorneys because secured loans must be signed by a notary and in Puerto Rico, notaries must be lawyers. “On-boarding”: ODA’s on-boarding processes were manual, heavily paper-based, and inefficient and caused delays in processing new staff. In addition, not enough time was devoted to the on-boarding process, and delays, disruptions, and unforeseen issues routinely extended the process. Training: New staff required significant training that SBA did not have time to provide. Shortened or omitted training created a greater need to provide on-the-job training. In response to these challenges, SBA’s after-action report for the 2017 hurricanes and its 2018 Staffing Strategy made recommendations to improve SBA’s hiring processes. These recommendations included establishing regular intermittent postings; creating an enhanced recruitment toolkit that includes social media, advertisement, third-party partnerships, and an outreach plan; establishing interagency agreements for detailee staff; developing a template for deployment of staff; reviewing and updating position descriptions; building an applicant pipeline; developing an on-boarding plan; and implementing an integrated technology solution that includes recruitment, hiring, on-boarding, benefits, training, performance management, and “off-boarding.” SBA officials told us they have begun implementing these recommendations. For example, the agency consolidated its hiring processes for new staff through USA Staffing, a federal online recruitment, evaluation, and hiring system. SBA establishes outreach locations for businesses and individual disaster survivors, including Business Recovery Centers, in disaster areas. The SBA OIG noted that while the centers are designed to assist business owners, staff also were available to assist homeowners and renters. Based on our analysis of SBA data, SBA operated six such centers in response to Hurricane Harvey, 18 in response to Hurricane Irma, and 85 in response to Hurricane Maria. According to SBA officials, the number of Business Recovery Centers opened is dependent on two key data points—the number of declared counties with the greatest impact from the disaster and the business and population density. Officials told us that SBA opened the most centers in response to Hurricane Maria in Puerto Rico because of the high number of affected municipalities. Staffing levels at the centers are based on the number of businesses categorized as major and on population density, and then refined based on actual daily activity at the center. See figure 4 for a photograph of SBA staff at a center in a municipal sports complex in Bayamón, Puerto Rico. In some locations we visited, SBA worked with its district office or local SBDCs to set up and staff Business Recovery Centers. For example, the Field Operations Center–East and the Florida SBDC Network created a staffing and deployment plan that outlined center locations in the Florida counties most affected by Hurricane Irma. The Florida centers were jointly staffed by SBA and SBDC employees, and included a mobile center. According to SBA officials, SBA and SBDC representatives drove the mobile center to locations without a dedicated Business Recovery Center, such as the Florida Keys. Similarly, the Field Operations Center–East created a staffing and deployment strategy for Business Recovery Centers with SBA’s District Office in Puerto Rico. They established fixed and mobile centers and each week staff traveled to multiple municipalities without fixed centers. The SBA District Office coordinated with local mayors and other officials to select the locations and ensure the public was informed. SBA officials noted that staff visited all the Puerto Rican municipalities over about 7 months. SBA’s outreach for the 2017 hurricanes included local partners, generally was favorably regarded by stakeholders we interviewed, and met statutory requirements. But SBA’s current guidance on outreach efforts does not incorporate region-specific risks (such as those encountered after the 2017 hurricanes), and SBA has not evaluated its efforts. According to SBA officials, SBA relied on public information officers, staff at recovery centers, local partners such as SBDCs and local government, and media contacts to disseminate information about the Disaster Loan Program to disaster survivors. When communicating with disaster survivors was difficult immediately after Hurricane Maria struck Puerto Rico, SBA officials told us they worked with the only operational radio station on the island to broadcast information about the program. During our site visits to selected areas in the states and territories most affected by the 2017 hurricanes, stakeholders—including business owners and local SBA partners—told us they generally were satisfied with SBA’s outreach efforts to disaster survivors. Officials at one SBDC told us that they believed SBA public information officers did a good job reaching out to local businesses and keeping the SBDC informed about upcoming SBA disaster loan presentations and media outreach and went door-to- door to reach small businesses. Similarly, officials at an SBDC in Puerto Rico told us that SBA staff visited all the municipalities in their region, and that they participated in presentations about disaster assistance with SBA and FEMA. Nine of the 24 business owners with whom we talked told us they first learned about SBA’s disaster loans from prior experience with the loans or through the agency’s outreach efforts (presented online or on other media). As discussed in more detail below, SBA does not have metrics that allow it to assess the effectiveness of its outreach efforts. Outreach materials SBA provided to us contained required statutory elements. By statute, if a disaster is declared, SBA must make “every effort to communicate through radio, television, print and web-based outlets, all relevant information needed by disaster loan applicants.” SBA must include (1) the date of the declaration; (2) cities and towns in the areas of the declaration; (3) loan application deadlines related to the disaster; (4) all relevant contact information for victim services available through SBA (including links to SBDC websites); (5) links to relevant state and federal disaster assistance websites, including links that provide information on assistance available through FEMA; (6) information on eligibility criteria for SBA loan programs, including where applications can be found; and (7) application materials that clearly state SBA’s function as the federal source of disaster loans for homeowners and renters. We reviewed SBA Disaster Loan fact sheets available for Hurricanes Harvey, Irma, and Maria and other outreach materials distributed to disaster survivors and found they collectively included the required elements (see fig. 5 for examples). For example, the Hurricane Harvey fact sheet contains the date of the declaration and counties included in the declaration, as well as information about SBA’s function to provide disaster loans, the types of loans available, loan eligibility requirements, deadlines, and contact information for SBA disaster assistance. SBA’s guidance on outreach does not include steps on identifying regional disaster risks. In 2009, we recommended that SBA develop procedures to enable it to meet the region-specific requirements of the Small Business Act. Specifically, we recommended that SBA include likely scenarios for certain regions prone to disasters. In 2012, SBA completed a marketing and outreach plan that stated SBA would develop webinars for specific regional risks. However, SBA’s 2018 Marketing and Outreach Plan did not mention or incorporate regional challenges such as those SBA encountered responding to the 2017 hurricanes in Puerto Rico and the U.S. Virgin Islands. SBA officials told us that they experienced challenges in conducting outreach to the territories. As previously mentioned, SBA used the only operational media outlet in Puerto Rico—a radio station—immediately after Hurricane Maria to broadcast information. SBA officials told us that language barriers also presented a challenge during the response to Hurricane Maria. Outreach materials had to be printed in both Spanish and English (see fig. 6). Federal internal control standards state that management should internally communicate the necessary quality information to achieve the agency’s objectives. However, SBA’s guidance on outreach does not identify regional disaster risks. SBA officials told us that they have not considered documenting these challenges in their outreach guidance, although they may do so in the future. Without updating its outreach guidance to discuss region-specific challenges, such as those faced in responding to disasters in the U.S. territories, SBA misses a key opportunity to better ensure staff are adequately prepared to conduct outreach in similar situations and locations. SBA does not have metrics for how well its outreach efforts informed disaster survivors about the Disaster Loan Program. Although SBA surveyed a sample of disaster loan applicants in August 2018, the survey did not include questions specific to applicants’ perception of SBA’s outreach efforts that the agency could use to measure the success of its efforts. Officials told us the survey was primarily used to evaluate SBA’s loan processing and not its outreach efforts. In past work, we convened an expert panel to discuss challenges with consumer education and key planning components to overcome these challenges. One of the key practices identified in the expert panel was the need to establish metrics to measure success in achieving the objectives of an outreach campaign. For example, process metrics can help ensure the quality, quantity, and timeliness of a campaign, and outcome metrics evaluate how well the campaign influenced the attitudes and behaviors of the target audience. Without metrics evaluating its disaster outreach efforts, SBA will not be able to determine how well and to what extent its outreach efforts have informed disaster survivors about the Disaster Loan Program. Since 2005, SBA has streamlined its loan application and review process and recognized such changes resulted in a need for earlier staff activation. SBA’s approval rate for all disaster loan applications following the 2017 hurricanes was approximately 49 percent and Hurricane Maria had the highest approval rate (62 percent). Disaster loan applicants, SBA resource partners, and SBA officials identified challenges that affected application or review processes, including burdensome documentation requests and translation issues. Since 2005, SBA has made changes to its disaster loan program to streamline the loan application and review process. Some of the changes SBA implemented include Using electronic loan applications. In 2008, SBA created an online portal for the Disaster Loan Program, which eliminated the need for applicants to mail in applications or visit a recovery center. According to SBA officials, they typically receive paper applications within 14 days and electronic loan applications within 1–2 days after a disaster. They also indicated that increased usage of electronic loan applications has reduced data entry errors and improved loan processing times. The vast majority (96 percent) of the approximately 340,000 applications SBA accepted after the 2017 hurricanes were submitted electronically. Expediting declines for applicants with poor credit. According to SBA officials, in 2005 SBA established automatic declination for applicants with poor credit (instead of moving forward with full processing of all applications). SBA refers homeowners who are automatically declined to FEMA for a potential grant and refers such businesses to resource partners for assistance. Overall, more than half (55 percent) of the approximately 146,000 applications declined after the 2017 hurricanes were automatically declined. Expediting approvals for applicants with strong credit. In 2014, SBA revised its disaster loan program regulations for physical disaster loans to allow it to consider an applicant’s credit instead of only looking at a full cash flow analysis when determining an applicant’s ability to repay. Overall, SBA processed 28 percent of the applications approved after the 2017 hurricanes using this revised method. Using desktop verification. In 2017, SBA began conducting desktop verification to evaluate the cause and extent of property damage. The process involves an initial loss verification through interviews with the applicant and use of third-party information (such as from a tax assessor’s website or Google maps) to estimate the cost of repairs. SBA is to conduct a post-desktop review following the initial disbursement using FEMA’s inspection report, SBA’s on-site inspection, or supporting documentation to validate the initial estimate. In a September 2019 report, the SBA OIG found that the use of desktop loss verification contributed to SBA meeting its timeliness goals for processing loan applications for the 2017 hurricanes. Standardizing loan terms. In 2017, SBA established 15- and 30-year fixed terms for loans, which streamlined the loan process by using the loan amount (instead of income) to determine repayment. According to SBA officials, the use of fixed loan terms is consistent with standard private-sector lending practices and therefore is easier for borrowers to understand. SBA also has continued to make technological changes to streamline DCMS and the web portal. The DCMS version SBA used for the 2017 hurricanes supported up to 10,000 concurrent users. According to SBA officials, they have been transitioning to DCMS 2.0, which is expected to support more concurrent users. As noted in SBA’s fiscal year 2019 Congressional Budget Justification and its 2017 Annual Performance Report, SBA anticipates that DCMS improvements will increase loan officer productivity from processing three to processing six loan applications per day. Similarly, SBA integrated new features into the online portal to improve applicants’ access to information resources during the application process. For example, applicants can readily access general questions and information, check the status of their applications, receive status notifications, and electronically upload and sign documents such as Internal Revenue Service Form 4506-T. According to SBA officials, electronic loan application and other changes have reduced SBA’s processing times. For Hurricanes Harvey and Irma, the number of applications to be processed peaked about 2 months after each disaster; applications for Hurricane Maria peaked nearly 3 months after the disaster (see fig. 7). The number of business applications to be processed peaked more than 3 months after Hurricane Sandy made landfall on October 29, 2012. Our analysis of SBA data found that despite a high volume of applications, SBA exceeded its goal for the 2017 hurricanes of processing at least 85 percent of applications from receipt to decision within 45 days (see fig. 8). More specifically, SBA processed 96 percent of its applications within 45 days. As noted previously, SBA’s processing goal varies based on expected application volume. The average processing times for loans submitted after Hurricanes Harvey, Irma, and Maria were 16, 16, and 18 days, respectively. In general, SBA processed loans for homeowners faster than loans for businesses after the 2017 hurricanes. In contrast, SBA did not meet its 21-day processing goal after 2012’s Hurricane Sandy and developed a backlog of more than 6,000 applications that lasted approximately 4 weeks. The SBA OIG noted issues with and recommended two improvements to how SBA calculates processing time from acceptance to decision. In a June 2014 report, the OIG found that SBA included times for automatically declined applications in its average processing times. The OIG recommended SBA report processing times for automatically declined applications separately from applications requiring more processing. In the summary data SBA provided for the 2017 hurricanes, SBA continued to include automatically declined applications, which require significantly less time to process than other accepted loans, in its average processing times. The OIG also found SBA’s computation did not include all the processing time for applications previously submitted and withdrawn, but later reaccepted. SBA used only the days elapsed between the reacceptance and the decision date. As discussed in more detail later in the report, SBA and applicants can withdraw and later resubmit applications. The OIG recommended that SBA establish processing time goals that consider the full processing time for withdrawn applications that later are reaccepted. According to OIG officials, the OIG closed this recommendation although SBA did not implement it because SBA officials stated that system limitations would not allow for this measurement to be readily accomplished and reaccepted loans require a level of analysis and diligence that justifies separate measurement of processing time. Although SBA officials told us there are no timeliness goals associated with closing a loan, approved borrowers have up to 60 calendar days from the date of the loan authorization and agreement to sign and return all loan closing documents to close the loan. For Hurricanes Harvey and Irma, SBA took less than 50 days on average to close a loan, with business loans taking the longest. For Hurricane Maria, it took more than 53 days on average to close loans. In comparison, for Hurricane Sandy SBA took 66 days on average from approval to close a physical disaster business loan and 43 days for an economic injury loan. After the 2017 hurricanes, SBA also met its disbursement goal of providing initial disbursements to 95 percent of borrowers within 5 days of loan closing. On average, SBA provided initial disbursements to approved borrowers within about 4 days of closing. SBA also had met its initial disbursement goal following Hurricane Sandy. As a result of SBA’s changes to its loan processing and review functions, SBA reduced its overall processing times. For the 2017 hurricanes, SBA took about 70 days on average to go from acceptance to initial disbursement, which is much less time than it took for Hurricane Sandy and the 2005 Gulf Coast hurricanes (see fig. 9). According to SBA officials, increased usage of electronic loan applications and expedited loan processing has resulted in the need to activate staff earlier, although SBA still faced challenges doing so. The number of applications that SBA received peaked at 95,000 applications in October 2017. SBA began adding staff immediately after the hurricanes, but the number of staff in ODA’s Processing and Disbursement Center did not peak until December 2017 (see fig. 10). In contrast, following Hurricane Sandy, application numbers peaked in December 2012 but ODA’s Processing and Disbursement Center did not reach peak staffing until March 2013. While hiring processes were ongoing, SBA temporarily utilized staff from other SBA divisions to assist with reviewing applications. ODA then hired additional loan officers and also used other SBA employees and detailees from other federal agencies to process loans. By October 2017, ODA had more than quadrupled processing staff (from 536 in August to 2,302 in October), and the workload for those staff had peaked (see fig. 11). Each loan officer averaged more than 50 new loan applications in September 2017, but by January 2018 the average decreased to about six or fewer new applications per month. As discussed earlier, SBA anticipates its DCMS update will double loan officer productivity. In response to the 2017 hurricanes, SBA accepted about 340,000 applications and approved about 141,000 of them, making about $7.2 billion in loans (see fig. 12). SBA accepted the most applications for Hurricane Irma, but about half of the total approved loan amount was for applicants affected by Hurricane Harvey. Overall, SBA’s approval rate for all disaster loan applications following the 2017 hurricanes was approximately 49 percent (see fig. 13). Of the three 2017 hurricanes, Hurricane Maria had the highest approval rate, 62 percent. The approval rate for physical disaster loans for homeowners was higher for Hurricane Maria (64 percent) than for Harvey (46 percent) and Irma (42 percent). There was not much variation in approval rates for physical and economic injury disaster loans for businesses. As shown in figure 14, the overall approval rate for loan applications was lower for Hurricanes Harvey, Irma, and Maria than for Hurricane Sandy, but higher than the combined rate for Hurricanes Katrina, Rita, and Wilma. Following the 2017 hurricanes, SBA declined about 146,000 loan applications. The primary reasons for declining applications were lack of repayment ability and unsatisfactory credit history. Other common reasons included unsatisfactory history on a federal obligation and that the damaged property was not an applicant’s primary residence or a qualified rental property. Declined applicants can request that SBA reconsider their applications. SBA received about 15,000 such requests after the 2017 hurricanes. Of the requests SBA accepted, about half had their applications approved, and about 30 percent were denied. Applicants who have their reconsideration requests denied can appeal SBA’s decision. Ninety-one percent of applicants who were denied after the 2017 hurricanes and subsequently appealed won their appeal. We also discuss withdrawal and cancellation rates for the 2017 and prior hurricanes in appendix II. Disaster loan applicants, SBA resource partners, and SBA officials we interviewed in Florida, Puerto Rico, Texas, and the U.S. Virgin Islands identified a number of challenges that affected the application or review processes following the 2017 hurricanes. Disaster loan applicants and SBA resource partners we interviewed identified the following challenges that applicants had when applying for SBA disaster loans following the 2017 hurricanes: Providing required loan documentation. Eight (of the 24) business loan applicants and officials from 10 entities, including from five SBDCs, felt that meeting SBA’s loan documentation requirements was time-consuming or burdensome. Following the hurricanes, applicants experienced difficulty readily producing required documentation (such as insurance policies, property titles, and tax returns) because of extensive physical damage and power issues or outages. Additionally, 11 applicants reported that follow-up requests from SBA for additional documentation delayed processing, added confusion, or led some to withdraw their applications. According to the results of a 2018 customer satisfaction survey conducted for SBA, the satisfaction of business loan applicants with the disaster loan application process had decreased by 9 percentage points since the previous survey in 2017. The lowest-rated aspects of the application process for businesses were “ease of attaining information required for completing the application,” the “amount of paperwork involved,” and the “overall ease of filling out the application.” According to SBA officials, they are statutorily required to request certain information from disaster victims who apply for a disaster loan. Although more documentation is requested for business loans than for home loans, the officials believe the information requested from business applicants is similar to information requested from individuals applying for a loan at a commercial bank. In response to previous recommendations we made, SBA recently has taken steps to streamline the application process by improving accessibility and consistency of loan-related information and requirements in paper and electronic resources. For example, SBA added a list of frequently asked questions to its Disaster Loan Application Portal with a list of documents required to file an application. The paper applications for both home and business loans list potential additional documents that SBA may request as well as when they may be required. Officials from all three SBDCs in Puerto Rico told us that applicants in Puerto Rico particularly had difficulty accessing tax documentation in a timely manner. SBA has an automated process to request and obtain tax transcripts from the Internal Revenue Service for final approval of loans. However, in Puerto Rico SBA must use a manual process with the Departamento de Hacienda (Puerto Rican taxing authority). Further delays occurred due to widespread physical damage to infrastructure, including the Departamento de Hacienda. As a result, SBA permitted applicants in Puerto Rico to postpone submitting tax documentation until later in the application process. Instead of submitting tax documentation during the loan decision process, SBA allowed applicants to submit such documentation during conditional commitment (the point at which SBA’s recommendation for loan approval is contingent on the applicant submitting additional required documents). In addition, ODA co- located loan officers with staff from the commitments department to facilitate prompt access to the tax transcripts they were awaiting from the Departamento de Hacienda. Meeting flood insurance requirements. Officials from two Florida entities told us many of the small businesses with which they worked had problems submitting insurance documentation as part of their application. Officials from one SBDC in Puerto Rico told us they had a client who was unable to obtain flood insurance. By law, SBA requires borrowers whose damaged or collateral property is located in a special flood hazard area to obtain and maintain appropriate flood insurance for the term of the loan. Delays also occurred as a result of miscommunication between SBA and loan applicants about flood insurance requirements, according to an applicant we interviewed. That business owner told us that when he submitted a disaster loan application for physical and economic injury damages, SBA informed him the insurance requirements applied only to the physical damage portion of the loan. However, SBA later told the individual that insurance coverage was necessary for the entire loan, not just physical damages. Frequent changes in loan officers or case managers. More than two-thirds (17 of 24) of the business owners we interviewed and officials at four of the nine SBDCs told us they (or their clients) worked with more than one case manager or loan officer during the loan application process. Two small business owners said they had interacted with as many as nine. These changes led to the applicants having to repeat or resubmit information. In addition, they sometimes received different answers to questions when a new loan officer or case manager was assigned. SBA officials told us that SBA does not track the extent to which applicants work with multiple loan officers and case managers but that applicants should generally have only one of each. According to SBA officials, one loan officer is typically assigned to an application until a loan decision is made. Once a loan is approved, one case manager is assigned until the loan is fully disbursed. However, according to SBA officials, an applicant may interact with more than one loan officer and case manager for reasons such as staff turnover and staff downsizing. In addition, whenever an applicant requests reconsideration of a declined application, the application is to be assigned to a new loan officer for processing. According to SBA officials, a newly assigned loan officer or case manager should be able to use DCMS to access an applicant’s loan file, including records of past communication between prior loan officers and the applicant, loss verification reports, and previously submitted documents. When an applicant electronically submits a document through the web portal, ODA scans and uploads it into DCMS (typically in 24–48 hours), at which point it is viewable in DCMS. The officials explained that document storage methods in DCMS are uniform, which should minimize the possibility of documents being improperly stored. Poor customer service and translation issues. Five of the applicants (of 24) and officials from four entities we interviewed said disaster loan applicants perceived a lack of SBA responsiveness after submitting their applications. Staff from two of the entities attributed this lack of responsiveness to SBA having an inadequate amount of staff to handle the number of applications. SBA officials indicated that Processing and Disbursement Center staff strive to contact each applicant within 3 days of assigning a loan officer and within 5 days of assigning a case manager. They also stated the center should contact each applicant at least every 30 days using whatever available forms of communication, including mail, email, and telephone. But two applicants told us they only heard from their case manager after the applicant initiated the contact. Nine applicants also stated that when they did talk to their loan officer or case manager that person was not very helpful. For example, officials from one SBDC told us they talked to some loan officers on behalf of their clients and those loan officers were not able to clarify what documentation their clients needed to provide to SBA to complete their applications. One Puerto Rican applicant and officials from all three Puerto Rican SBDCs told us that applicants in Puerto Rico faced translation issues. They believed SBA had insufficient staff who spoke Spanish, which made it difficult to communicate with applicants regarding status updates and requests for additional documentation. The SBA OIG reported that SBA officials estimated that some disaster survivors waited more than 45 minutes for an interpreter or experienced dropped calls. In addition, officials from one Puerto Rican SBDC told us SBA only would accept official responses in English and believed that many applicants were denied in part because the documents with applicants’ personal and financial information were in Spanish. The SBDC officials were told only an SBA translator could translate official documentation between SBA and applicants from English to Spanish. According to SBA officials, they tried to hire as many Spanish- speaking staff as possible and relied on a contractor to provide interpretation services during telephone communications with applicants. But the volume of calls was higher than anticipated, resulting in long wait times and many lost telephone connections. Following Hurricane Maria, SBA replaced the contractor with three new language service providers, which SBA used during its response to Hurricanes Florence and Michael in 2018. Disbursement delays. Eight business disaster loan applicants and officials from three SBDCs told us that applicants experienced delays receiving disbursements after their initial disbursement. Although applicants said they received initial disbursements within expected time frames, subsequent disbursements took longer than anticipated. For example, three small business owners told us it took more than a year from the time they applied to receive their full loan disbursement, and two others had to contact their federal representative to help get their disbursements because of delays. SBA data show that after the 2017 hurricanes it took, on average, about 141 days after applying for a loan for businesses to receive their full disbursement, including an average of 63 days from closing to final disbursement. Similarly, business respondents to the 2018 customer satisfaction survey conducted for SBA expressed concerns about the timeliness of disbursements following loan closing. The lowest-rated aspect of the loan closing process was “timeliness of receiving loan funds after the closing was complete.” As a result, the firm that conducted the survey recommended that SBA examine data on the timing of loan disbursements over the past several years, determine whether the timing had changed significantly, determine the root causes of any notable changes, and develop plans to address any root causes. SBA guidance requires approved borrowers to arrange for and obtain all loan funds within 6 months from the date of the loan authorization and agreement. However, SBA may extend the time frame on a case- by-case basis for ongoing projects. According to SBA officials, there are no timeliness goals for subsequent disbursements because the time frame for receiving further disbursements is contingent on the borrower’s ability to meet insurance requirements, secure a contractor to repair damages, and submit receipts to SBA. SBA also has improved features within the web portal so that borrowers can now use direct deposit to receive disbursements and commence repairs more quickly. Additionally, the portal now enables borrowers to electronically submit receipts for repairs or invoices to loan officers, who in turn can verify the use of disbursed funds and make additional disbursements much sooner than before. During interviews and in an after-action report, SBA also identified challenges it experienced after the 2017 hurricanes that included a prolonged loss of electricity, DCMS performance issues, and unique loan closing requirements in Puerto Rico. Loss of electricity. As discussed previously, a prolonged loss of electricity adversely affected application submission and loan processing, especially in Puerto Rico. DCMS performance issues. SBA officials said the agency increased staffing to process incoming loan applications and the multitude of concurrent users caused technical issues and delays. Loan applicants also encountered periodic system outages. SBA released DCMS updates throughout the first few months of its response to the 2017 hurricanes to address system performance issues. As previously mentioned, SBA expects that DCMS 2.0 will address concurrent user issues. Unique loan closing requirements in Puerto Rico. SBA officials said they were initially unaware of loan closing requirements unique to Puerto Rico, which led to processing delays. They told us that secured loans must be signed by a notary, who in Puerto Rico must be a Puerto Rican-licensed attorney. As a result, SBA had to hire additional locally licensed attorneys and devote resources toward training attorneys and other staff involved in processing and closing loans in Puerto Rico, a process hampered by the previously discussed hiring challenges for the 2017 hurricanes. SBA has been implementing changes to its hiring process for future disasters. Number of loans. As of September 2019, lenders had issued two loans totaling $50,000 under SBA’s Express Bridge Loan Pilot Program. The loans were issued by one lender in 2018 to small businesses in North Carolina and South Carolina recovering from Hurricane Florence. Outreach. SBA generally has not targeted its outreach for the program to disaster-prone areas. According to SBA officials, to market the pilot program OCA issued two Federal Register notices and a program guide, and encouraged district office staff to notify area lenders of the program. Additionally, SBA officials told us that before anticipated disasters, they have mentioned the program on quarterly telephone conferences attended by 1,000–1,500 7(a) lenders, and referred to the pilot in press releases. One lender told us that it was notified of the pilot program through an SBA policy notice with program guide attached, while another noted receiving an email promoting the program. According to SBA officials, this same email was sent to OCA field staff to be shared with all 7(a) Express lenders before the 2019 hurricane season. Internally, according to SBA officials, OCA has made information on the Express Bridge Loan Pilot Program available to all SBA employees on an internal website. However, OCA has not marketed the Express Bridge Loan Pilot Program to ODA. OCA officials were unaware of any conversation with ODA (whose staff are on the ground after disasters and therefore most likely to interact with small business owners) about the pilot program, but assumed that ODA officials had high-level information about the pilot. However, staff we interviewed from both Field Operations Centers were unaware of the program. OCA also has not targeted its external marketing to partners, such as 7(a) Express lenders and SBDCs, in disaster-prone areas. Although SBA officials told us that they made presentations at a 2019 lender conference in Florida, they did not point to similar outreach in other disaster-prone areas. The small business owners and SBDC officials with whom we spoke in Florida, Puerto Rico, Texas, and the U.S. Virgin Islands generally were unaware of the SBA Express Bridge Loan Program. During our February 2019 interview with the Florida Department of Economic Opportunity (which helps administer the state’s bridge loan program), officials stated they were unaware of program specifics and asked if it had started. Evaluation. SBA officials do not currently plan to evaluate the program or determine why so few loans have been issued. SBA officials explained that the Express Bridge Loan Pilot Program’s performance during the 2019 hurricane season would determine whether SBA would continue or terminate the program after its pilot period. When SBA announced the pilot, SBA stated it planned to evaluate the program using three principal measures: (1) the number of small businesses served, (2) the percentage of loans made that were paid off or down using lower fixed-rate disaster loans versus those held to term, and (3) the default rate on Express Bridge Loans compared to regular SBA Express loans of similar size in the 7(a) portfolio. SBA officials told us they were not planning to conduct an evaluation because only two loans had been made, which the officials believe is not a large enough sample size to conduct a meaningful evaluation of the program. Although SBA has guaranteed only two loans issued under the Express Bridge Loan Pilot Program, the program received 93 applications. While most of the applications were not completed, they suggest a potentially larger demand for the program than initially indicated by the two completed loans. We discuss demand for bridge loans in more detail in the following section. SBA has guidelines for evaluating pilot programs. SBA issued a Policy Notice on September 29, 2016, that called for it to evaluate any pilot program. SBA subsequently incorporated this requirement in one of its standard operating procedures. In addition, our guide for designing evaluations states that an evaluation gives an agency the opportunity to refine the design of a program and provides a useful tool to determine whether program operations have resulted in the desired benefits for participants. We also previously reported that an evaluation can be valuable in determining why goals were not met, and can provide feedback on both program design and execution. Such an evaluation can help determine what program changes might be warranted to achieve the desired impact. In the absence of loan data, an evaluation could include consideration of feedback from lenders in disaster-prone areas on the pilot or their experiences with other bridge loan programs, such as the Florida program discussed in the following section. According to SBA officials, SBA had not actively solicited lender feedback on the current pilot since it became operational. However, SBA sought feedback from lenders on prior efforts to develop a bridge loan program. SBA officials told us that lenders commented on a prior proposal for a bridge loan pilot (the Immediate Disaster Assistance Program) and indicated that private lenders were not interested in participating in such a pilot because they considered disaster relief to be a governmental responsibility. Additionally, SBA officials told us during our previous work looking at the Immediate Disaster Assistance Program that they performed initial outreach to lenders—such as those who participated in SBA’s Gulf Opportunity Pilot Loan Program in the aftermath of Hurricanes Katrina and Rita—to obtain their reaction to and interest in the program. The current pilot provides a similar opportunity to obtain feedback from lenders on loan terms that could affect their willingness to participate in this or a potentially redesigned program. For example, one 7(a) lender with whom we spoke did not like the Express Bridge Loan Pilot Program due to the maximum loan amount and the SBA guaranteed percentage. Without evaluating the pilot program, including assessing potential demand and why so few loans have been made and the sufficiency of its outreach efforts, OCA will have limited information to inform its decision on the future of the pilot, including loan terms it may offer. Additional feedback, such as from lenders, could help SBA determine if design changes are warranted. The very low level of loans guaranteed under SBA’s bridge loan pilot contrasts with the desire for such loans indicated by our interviewees and the experience of the Florida Small Business Emergency Bridge Loan program. We interviewed small business owners and those who work with small businesses. Almost two-thirds of all the entities (16 of 26) we interviewed and six small business owners told us that businesses needed immediate financial support after a disaster (for example, to help remove debris, make repairs, and replace inventory). Although many businesses ultimately receive insurance payments to help cover losses, the payments may not be received for several months. Representatives from one municipality told us a lot of people, including the city itself, still were awaiting their insurance payments more than a year after the disaster. To help fund their immediate recovery, small business owners with whom we talked often relied on their own savings, credit cards, or other sources of credit. However, these financing sources typically have interest rates higher than those offered by the Express Bridge Loan Pilot Program. In addition, it can take applicants approved for SBA Disaster Loans months to receive funds—time that could determine whether a business remains in operation. Florida’s Small Business Emergency Bridge Loan program provides small business owners with interim disaster financing, similar to the Express Bridge Loan Pilot Program, but some structural differences exist (see table 2 for a comparison of principal terms and features). In particular, the Florida program uses public funds rather than being funded by financial institutions. Officials of the Florida Department of Economic Opportunity, which administers the program in partnership with the Florida SBDC Network and a third-party fiscal administrator, told us the Florida program is not focused on generating a return on investment. Rather, the program is focused on helping small businesses bridge the gap between the time their businesses incur damages and the time they secure other financial resources. Although SBA officials told us that the State of Florida’s program is not a valid comparison to SBA’s Express Bridge Loan Pilot Program because the loans for SBA’s program are made by private, for-profit lenders, the Florida program demonstrates demand for bridge financing for small business owners. Officials from the Florida Department of Economic Opportunity stated that when the Governor’s office activates the Florida Small Business Emergency Bridge Loan program, the department uses various outreach media, including social media, public-private partners, and state emergency response to disseminate information about the program. The program’s fiscal administrator and the Florida SBDC Network also circulate information about the program, including by providing hyperlinks to the loan application on their websites. Finally, the program has been in place since 1992, which likely contributed to word-of-mouth about the program. According to officials of the Florida Department of Economic Opportunity, following Hurricane Irma the program received 1,167 applications, of which 883 were approved, totaling $35 million in disaster bridge financing. Following Hurricane Michael, the program received 742 applications, of which 590 were approved, totaling $34.3 million in disaster bridge financing. Florida Department of Economic Opportunity officials attributed the wide utilization of the Florida Small Business Emergency Bridge Loan to expedited access to funding and favorable terms. For example, the program offers survivors a zero percent interest rate for the term of the loan, which is generally 1 year. Given the difference in loan terms between Florida’s program and SBA’s pilot program, the demand for SBA’s higher-interest loans may not equal the demand for Florida’s loans. However, in disaster areas in which there is no state bridge loan program, SBA’s pilot program could meet at least some of the need for bridge financing. Following Hurricanes Harvey, Irma, and Maria in 2017, SBA faced difficulties in delivering its disaster loans due to the magnitude of the storms and resulting infrastructure damage, especially in Puerto Rico and the U.S. Virgin Islands. Nevertheless, SBA accepted about 340,000 applications and approved about 141,000 of them, making more than $7 billion in loans to help business owners, homeowners, renters, and nonprofits recover. However, the planning documents and guidance to the field that SBA used to guide its response to the 2017 hurricanes did not identify risks and focus on risk assessments or include detailed instructions on how to prepare disaster-specific action plans. And after the 2017 hurricanes, the documents and guidance, including for outreach on disaster loans, has not incorporated lessons learned—particularly as they related to region- specific risks that could hamper the operations of the Disaster Loan Program. By identifying risks and enhancing guidance on actions plans and outreach efforts, SBA can better design its plans for and implementation of disaster response efforts and help ensure staff are adequately prepared to conduct operations in situations such as those encountered in Puerto Rico and the U.S. Virgin Islands. SBA also has not established metrics to measure the success of its outreach efforts. By establishing metrics, such as including questions when surveying disaster loan applicants on their perception of SBA’s outreach efforts, SBA would be better able to determine how well its outreach efforts have informed disaster survivors about the Disaster Loan Program and make adjustments to improve the effectiveness of such efforts. SBA also can improve its Express Bridge Loan Pilot Program, which offers small businesses the opportunity to quickly receive funding after disasters. The success of a Florida program offering a similar product and our own work suggest considerable demand for bridge loans. SBA has no plans to evaluate the program because it has issued so few loans. While SBA does not have the information needed to conduct a loan performance evaluation, it has the opportunity to conduct an evaluation of the pilot program’s design and implementation. Such an evaluation could help determine why so few loans were issued, what role program design and internal and external outreach may have played, and what, if any, changes to the pilot might be warranted. By evaluating the Express Bridge Loan Pilot Program, including obtaining lender feedback, OCA will be able to make an informed decision about the program’s future. We are making the following five recommendations to SBA: The Associate Administrator for the Office of Disaster Assistance should identify and document risks associated with its disaster response and plans to mitigate these risks in its disaster planning documentation. (Recommendation 1) The Associate Administrator for the Office of Disaster Assistance should identify the key elements of a disaster action plan and provide additional guidance to staff on how to incorporate these elements into future action plans. (Recommendation 2) The Associate Administrator for the Office of Disaster Assistance should update its outreach plan to include information on region-specific risks or challenges, such as those encountered after the 2017 hurricanes. (Recommendation 3) The Associate Administrator for the Office of Disaster Assistance should establish metrics to measure the success of its outreach efforts during the response to a disaster. (Recommendation 4) The Associate Administrator for the Office of Capital Access should evaluate the implementation of the Express Bridge Loan Pilot Program to determine why so few loans have been made and if any design changes may be warranted before the end of the pilot. Such an evaluation could include assessing SBA’s outreach efforts and seeking feedback from lenders. (Recommendation 5) We provided a draft of this report to SBA for review and comment. In written comments, which are reproduced in appendix III, SBA stated that overall it agreed with the report’s recommendations and provided comments, as summarized below. SBA described actions it planned to take to address the first four recommendations, which if implemented as planned would address them. For the first recommendation to identify and document risks—and plans to mitigate those risks—in its disaster planning documents, SBA noted that ODA would work with SBA’s Office of Continuous Operations and Risk Management, which updates and publishes the annual Disaster Preparedness and Recovery Plan, to identify and document known risks associated with SBA’s disaster response and implement a risk-informed approach to its direct response and recovery operations. SBA expected that its fiscal year 2021 plan would include this information. For the second recommendation to identify the key elements of a disaster action plan and provide related guidance to staff, SBA agreed and noted that ODA would develop the key elements of and templates for a disaster action plan, provide guidance to Field Operations Centers, and coordinate with the Office of Continuous Operations and Risk Management on including the information in appendixes to the Disaster Preparedness and Recovery Plan. For the third recommendation to update its outreach plan to include information on region-specific risks or challenges, SBA agreed and stated that ODA would update its outreach plan to include risks and challenges experienced during the 2017 hurricane season. For the fourth recommendation to establish metrics to measure its disaster outreach efforts, SBA agreed and noted that it would explore potential new metrics to measure the effectiveness of its outreach efforts, such as adding a question about the efforts to the annual American Customer Satisfaction Index survey. For the fifth recommendation to evaluate the implementation of the Express Bridge Loan Pilot Program to determine why so few loans have been made and if any design changes may be warranted before the end of the pilot (which could include assessing SBA’s outreach efforts and seeking feedback from lenders), SBA described some actions it planned to take in response to the recommendation that would partially address it. The agency also commented on some of our findings, which we discuss below. We maintain our recommendation. In its comments, SBA noted it would seek feedback from SBA Express Lenders during the upcoming spring National Association of Government Guaranteed Lenders conference on their interest and participation in the pilot. SBA also noted that it would provide ODA with information and a set of frequently asked questions about the pilot program that ODA could distribute to small business owners at Business Recovery Centers. Although beginning to seek lender feedback and improving its internal outreach are good first steps, SBA would still need to conduct an evaluation to determine if any design changes were warranted to fully address the recommendation. SBA stated it did not currently have adequate data to evaluate the effectiveness of the program because only two loans had been funded. It also noted that while there were more than 90 incomplete applications for the Express Bridge Loan Pilot Program, the agency had concluded that there were not sufficient data to suggest the applications were actual attempts to originate loans and that lenders likely started the loans in error. In the draft report, we acknowledged only two loans had been issued and included SBA’s views about why other applications were not completed. As we note in the report, in the absence of loan data an evaluation instead could focus on the pilot’s design and implementation, and include feedback from lenders. Therefore, we maintain that SBA can and should evaluate the pilot program. SBA noted it previously sought feedback from lenders on the Immediate Disaster Assistance Program (a prior proposal for a bridge loan program) and at that time, there was very little lender interest in the program. The draft report included this information and noted that the current pilot provides a similar opportunity to solicit lender feedback, including on loan terms. In response to this, SBA stated that making significant changes to the size and guarantee on the pilot loans based on lender feedback would affect the subsidy for the program. However, SBA will not know how lenders feel about the current pilot or what types of changes they might recommend until it seeks lender feedback. Lenders could call for changes to the program that were minor but still would improve their willingness to participate. In addition, if lender feedback suggested that the program would not work without significant changes and additional subsidy, such information could inform future actions to address borrower demand for bridge loans. SBA also stated that it did not believe our comparison of the Express Bridge Loan Pilot Program to the Florida Small Business Emergency Bridge Loan was appropriate. SBA stated the Florida program provides direct loans in contrast to SBA’s limited guarantee to lenders, and had been in existence since 1992 and was well known (versus a 2017 program start and less knowledge about SBA’s program). We highlighted both differences in the draft report. SBA also stated the Florida program has a larger pool of eligible applicants because it is not limited to Presidentially declared disasters or delivered only by certain lenders, as is the case with the SBA program. However, we note that the SBA program is available nationwide and the Florida program is limited to the state. In summary, SBA stated in its comments that the characteristics of the Florida program contributed to the demand for the program. We acknowledged this in the draft report, stating that given the differences between the programs, the demand for SBA’s loans may not be equivalent to the demand for Florida’s loans. Despite the program differences, we continue to believe that including a discussion of the Florida Small Business Emergency Bridge Loan program in the report was appropriate because its use indicates demand for bridge financing. In disaster areas in other states with no state bridge loan program, SBA’s pilot program, with changes determined to be appropriate, could meet at least some of the demand for bridge financing identified by people we interviewed. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees and the Administrator of SBA. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact William B. Shear at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix IV. Our objectives were to examine the Small Business Administration’s (SBA) (1) planning for and initial response to Hurricanes Harvey, Irma, and Maria (hereinafter referred to as the 2017 hurricanes); (2) loan application and review process (including changes since Hurricane Katrina in 2005), timeliness, and approval rates; and (3) implementation of the Express Bridge Loan Pilot Program. We focused our review on Florida, Texas, Puerto Rico, and the U.S. Virgin Islands—the states and territories most directly affected by the 2017 hurricanes. For all of our objectives, we visited two areas each in Florida, Texas, and the U.S. Virgin Islands, and three areas in Puerto Rico. We selected these areas based on the high numbers of approved homeowner and business disaster loans, high population, geographic diversity, presence of a Small Business Development Center (SBDC), and presence of an SBA district office. To help ensure geographic diversity, we selected locations from different metropolitan statistical areas in each state and Puerto Rico. In each location, we conducted a group interview with small business owners who applied for a disaster loan with SBA to learn about their experiences applying for a loan and working with SBA while their loan was processed and funds disbursed, and their need for bridge financing. These small businesses were recruited by representatives of the local SBDC and were selected to represent a range of outcomes (approved, denied, and withdrawn applications). Overall, we interviewed 24 small business owners across the nine areas we visited. In addition to small business owners, we met with officials from the SBDC and the local SBA district office responsible for each of the areas we visited. We also met with officials from seven local governments that oversaw eight of the areas we visited—either from a mayor’s office or economic development office. Lastly, we interviewed officials from six chambers of commerce or business associations, one in every area except one. While the results of these interviews are not generalizable to all areas affected by the 2017 hurricanes, they provided insight into the experiences of small businesses and local communities with the SBA Disaster Loan Program. In addition to the site visit interviews, we interviewed officials from SBA’s Office of Disaster Assistance, including officials from both Field Operations Centers and the Processing and Disbursement Center, to discuss the Disaster Loan Program and SBA’s response to the 2017 hurricanes. For our analysis of open-ended responses from these interviews, we used a software program designed for analyzing qualitative information. For each open-ended response, we coded, organized, and analyzed responses under a number of relevant themes. Specifically, team members independently reviewed a segment of the interview transcripts to code the responses to identify themes. Once each analyst had completed coding his or her respective sections, the documents were merged into a master file that was reviewed by the engagement’s methodologist. Possible alternative categorizations of the material were discussed and resolved jointly. This code-based method constituted our primary approach to validating the results of our analysis. All categorizations were sourced to the original interviews through the use of the qualitative analysis software. To evaluate SBA’s planning for and initial response to the 2017 hurricanes, we reviewed SBA planning documents in effect for the hurricanes—SBA’s 2017 Disaster Preparedness and Recovery Plan and its 2014 Disaster Playbook—as well as the targeted action plans SBA created for each of the hurricanes and summaries of exercises SBA conducted. We also reviewed the Office of Disaster Assistance’s after- action report following Hurricanes Harvey, Irma, and Maria; SBA’s 2017 and 2018 Staffing Strategies; models SBA used to guide its response; and reports issued by the SBA Office of Inspector General (OIG). We used these sources to identify challenges SBA faced planning for and responding to the 2017 hurricanes, including those it faced responding to Hurricane Maria in Puerto Rico and the U.S. Virgin Islands and with its hiring. We reviewed SBA data on hiring and compared SBA’s staffing modeling efforts to the actual staff activated after the 2017 hurricanes. We determined that these data were sufficiently reliable for the purposes of discussing SBA’s staffing after the 2017 hurricanes by interviewing knowledgeable officials about the data. We compared SBA’s planning efforts against federal internal control standards for identifying, analyzing, and responding to risks, and against Federal Emergency Management Agency guidance on disaster planning. To examine SBA outreach on disaster loans after the 2017 hurricanes, we reviewed marketing and outreach plans from 2012 and 2018 and a sample of outreach materials SBA used during its response to Hurricanes Harvey, Irma, and Maria. We compared SBA’s outreach efforts against federal internal control standards for internal communication and against key consumer education practices. To evaluate SBA’s loan application and review process, we reviewed prior GAO and SBA OIG reports on SBA’s Disaster Loan Program to help identify changes SBA made since Hurricane Katrina in 2005. We also analyzed summary data from SBA’s Disaster Credit Management System for applications submitted between August 31, 2017, and September 24, 2018. The August date corresponds to the date SBA received the first applications from the 2017 hurricanes and the September date to the one-year anniversary of Hurricane Maria, the last of the three 2017 hurricanes. SBA completed processing more than 99 percent of the applications for each hurricane during the period covered by our data. Because the hurricanes occurred in quick succession and SBA treated them as one event, we compared the combined data for the 2017 hurricanes to those from Hurricane Sandy and the combined data for Hurricanes Katrina, Rita, and Wilma, which SBA also treated as one event. We determined these data were sufficiently reliable for describing characteristics associated with SBA’s processing of applications by reviewing related documentation, interviewing knowledgeable agency officials, and reviewing related internal controls. We used the results from our thematic qualitative analysis and interviews with SBA officials to identify challenges associated with applying for or processing applications following the 2017 hurricanes. To evaluate SBA’s implementation of the Express Bridge Loan Pilot Program, we reviewed Federal Register notices and a program guide SBA published about the program. We interviewed SBA officials from its Office of Capital Access about their implementation of the program, and officials from three lenders to discuss their perspectives on and awareness of the program. We selected one lender because it had made loans under the pilot program, another because it had begun the most applications for the program, and the third because it was a 7(a) lender located in a state affected by Hurricane Florence or Michael. We chose those hurricanes because they occurred about 1 year after SBA began its pilot (in September and October 2018, respectively), allowing time for SBA to fully launch the pilot. We also interviewed officials from the Florida Department of Economic Opportunity to discuss the Florida Small Business Emergency Bridge Loan Program, which it helps administer. We compared SBA’s plans to evaluate the Express Bridge Loan Pilot Program against guidance for designing evaluations. We conducted this performance audit from September 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix presents withdrawal and cancellation rates for disaster loan applications the Small Business Administration (SBA) accepted after Hurricanes Harvey, Irma, and Maria (the 2017 hurricanes), after Hurricane Sandy in 2012, and after Hurricanes Katrina, Wilma, and Rita (the 2005 Gulf Coast hurricanes). For the 2017 hurricanes, withdrawal rates were generally comparable for each type of disaster loan, as shown in figure 15. Of the disaster loan applications SBA accepted for Hurricanes Harvey, Irma, and Maria, about 52,000 were withdrawn from consideration by SBA or the applicant. Of these, approximately 32,000 were withdrawn by SBA, and the rest were withdrawn at the applicant’s request. The leading reason for an SBA withdrawal was a lack of contact with the applicant to discuss disaster damages (inability to verify losses). Other common SBA-initiated reasons for withdrawals were the Internal Revenue Service having no record of the applicant filing taxes in the required time period and an applicant’s failure to provide requested additional information. The main reason for withdrawal by applicant was a change of plans. Applicants who withdrew their applications or had applications withdrawn by SBA could request that SBA reaccept their application. Nearly half (48 percent) of the approximately 52,000 withdrawn applications were submitted for reacceptance. Of those, 67 percent were approved, 20 percent were declined, and 13 percent were withdrawn again. As shown in figure 16, the overall withdrawal rate for the 2017 hurricanes was lower than that for Hurricane Sandy and the combined rate for the 2005 Gulf Coast hurricanes. Across each of the disasters, home disaster loan applications had the lowest withdrawal rates while nonprofit applications had the highest withdrawal rates. Among the 2017 hurricanes, Hurricane Harvey had the most cancelled disaster loans (10,945) with an overall cancellation rate of 25 percent (see fig. 17). More than half (56 percent) of the cancelled loans were due to the borrower’s decision, including receiving sufficient support from other sources and reluctance to incur additional debt. Of the loans SBA cancelled, the most common reasons included the borrower’s failure to complete and return all loan closing documents and an adverse change in the borrower’s credit or financial condition that required a referral to the Federal Emergency Management Agency’s Individuals and Household Program. As shown in figure 18, the overall cancellation rate for the 2017 hurricanes was lower than that for Hurricane Sandy and the combined rate for the 2005 Gulf Coast hurricanes. In addition to the contact name above, Paige Smith (Assistant Director), Daniel Newman (Analyst in Charge), Laura Gibbons, Marshall Hamlett, Marc Molino, Patrick Netherclift, Barbara Roesmann, Jessica Sandler, Cynthia Saunders, and Nina Thomas-Diggs made significant contributions to this report.", "summary": "SBA assists most types of businesses regardless of size and others affected by natural and other declared disasters through its Disaster Loan Program. Disaster loans can be used to help rebuild or replace damaged property or continue business operations. GAO was asked to review SBA's response to three 2017 hurricanes (Harvey, Irma, and Maria). This report examines SBA's (1) planning for and response to the 2017 hurricanes; (2) disaster loan application and review process; and (3) implementation of the Express Bridge Loan Pilot Program. GAO analyzed SBA planning documents; summary data from SBA's Disaster Credit Management System for applications submitted between August 31, 2017, and September 24, 2018 (the period in which SBA processed nearly all loan applications for each hurricane); and SBA guidance on the bridge loan program. GAO interviewed small business owners and officials from local governments, business advocacy organizations, and Small Business Development Centers in Florida, Texas, Puerto Rico, and the U.S. Virgin Islands. The Small Business Administration's (SBA) Office of Disaster Assistance, which administers the Disaster Loan Program, regularly develops disaster plans but does not discuss risks and risk mitigation in detail in its planning documents. Specifically, SBA's current Disaster Preparedness and Recovery Plan lacks an in-depth discussion of risks (including extended power and communications outages) that could affect its disaster response. SBA's disaster response includes deploying staff to and establishing centers in disaster areas to accept loan applications. The aftermath of the 2017 hurricanes (Harvey, Irma, and Maria) illustrates how the risks affected SBA's disaster loan operations. For example, because of widespread power outages (particularly in Puerto Rico), loan applicants often could not submit applications electronically and SBA often could not call or e-mail applicants. As a result, SBA may not be adequately prepared to respond to challenges that arise during its disaster response efforts. Changes SBA made to the loan application process since 2005 (such as implementing electronic applications) improved timeliness. For the 2017 hurricanes, SBA processed more than 90 percent of all loan applications (including those quickly declined or withdrawn) within its 45-day goal, averaging less than 18 days for each hurricane. Overall, about 49 percent of applications submitted after the 2017 hurricanes were approved (see figure). Applicants and others with whom GAO spoke noted some application challenges, including frequent changes to SBA contact staff and having to resend documents. According to SBA officials, staff changes resulted from turnover, among other reasons. Many applicants in Puerto Rico also encountered translation challenges during interactions with SBA. SBA has no plans to evaluate its Express Bridge Loan Pilot Program, a loan guarantee program that began in October 2017 and is set to expire on September 30, 2020, and is intended to offer small businesses quicker funding after disasters. As of September 2019, SBA had received 93 applications, but most of them were incomplete and SBA had guaranteed only two loans. The Office of Capital Access, which manages the pilot, had not sought feedback from lenders on why so few loans had been made. Without evaluating program design and implementation, SBA's ability to make an informed decision on the program's future, including assessing potential demand for bridge loans, is limited. GAO is making five recommendations to SBA, including that it more comprehensively document risks and plans to mitigate these risks and evaluate the implementation of the Express Bridge Loan Pilot Program. Overall, SBA agreed with the recommendations, but described actions that partially address the recommendation for evaluating the pilot. GAO maintains it should be fully implemented, as discussed in the report.", "document_type": "gao"}
{"report": "DOD currently relies on more than 900 commercial industry transportation service providers (TSPs) to move and store servicemembers’ and their families’ household goods. About 40 percent of DOD’s annual household goods moves occur during the 14-week annual peak moving season, which runs from May 15 through August 31. As figure 1 shows, servicemember survey satisfaction scores declined in 2018 during the peak moving season. According to TRANSCOM officials, this decline in satisfaction scores during the peak moving season has persisted for years. Under the current DP3, the military services own, operate, and staff most of the infrastructure involved in managing and overseeing the movement and storage-in-transit of DOD’s household goods, including the personal property processing offices and personal property shipping offices. The military services’ processing offices, among other things, ensure that the servicemembers’ reassignment orders and paperwork authorizing a move are in order, and that their application is accurate and complete. The processing offices also provide counseling, including advising servicemembers on the DP3 process, entitlements, and restrictions so they can make informed decisions about their moves. The military services’ shipping offices work with TSPs to schedule moves, monitor TSP performance, and take or recommend punitive action against poor performing TSPs. DOD has conducted and sponsored several studies to help address persistent DP3 performance issues, including those related to servicemember satisfaction and challenges with meeting capacity demands during the peak summer months. For example, LMI and the Institute for Defense Analyses (IDA) produced reports on behalf of DOD in 2012 and 2018, respectively, to analyze DP3 performance issues and make recommendations to improve DP3. In its report, LMI outlined the impact of a range of options for contracting out some or all of the management of DOD’s household goods movement and storage activities. IDA recommended that DOD create consistent performance metrics, unify its DP3 operating structure, and improve servicemember support. Concurrent with pursuing its Global Household Goods Contract, TRANSCOM has several ongoing initiatives intended to improve servicemember satisfaction in general, and household goods loss and damage specifically. According to survey data, loss of and damage to household goods is the number one reason servicemembers cite for dissatisfaction. Ongoing TRANSCOM initiatives to improve servicemembers’ moving experiences that are independent of the Global Household Goods Contract include the following: Increasing the use of shipping containers in domestic household goods moves to reduce the number of servicemember loss and damage claims. According to TRANSCOM officials, in the past TRANSCOM has primarily used shipping containers only for international moves. Replacing the internet-based system used to manage DOD household goods moves, the Defense Personal Property System, with a new, mobile-friendly information technology operating system platform called MILMOVE. MILMOVE is intended to provide servicemembers and their families with more reliable information about their planned and ongoing household goods moves through access to all phases of the move process via their personal smartphones or tablets. Tracking whether quality inspections occur in person or via telephone, and requiring that at least 50 percent of all shipments have an in- person quality inspection. Increasing the liability limits for damaged or lost household goods shipments to $6 per pound and the total loss cap to $75,000 per shipment, when claims are filed within a specified time. In November 2018, TRANSCOM, in coordination with OSD and the military services, began planning and developing requirements for the Global Household Goods Contract. According to TRANSCOM officials, the goal was to have the contract in place in time for the 2021 peak moving season. TRANSCOM announced that in April 2020 it would award a Global Household Goods Contract to a single commercial move manager to oversee DP3 activities that relate to the movement and storage-in-transit of household goods. The proposed contract includes an initial 9-month transition period that will commence in May 2020, a 3-year base period, three 1-year option periods, two 1-year award terms, and an option to extend the contract 6 months. Including all option periods and award terms, the contract is expected to be completed at the end of January 2029 or, if the option to extend services is exercised, by the end of July 2029. The 9-month transition period is intended to give the Global Household Goods contractor sufficient time to, among other things, integrate its information technology systems with existing DOD information technology systems. During the initial years of the contract, the contractor’s volume of workload will incrementally increase, including the volume of household goods moves that it will handle. The Global Household Goods Contract is not intended to replace DP3 in its entirety. Activities that are planned to be a part of the contract include the movement and storage-in-transit of household goods, direct procurement method shipments, and some level of servicemember counseling. DP3 activities that are not to be a part of the Global Household Goods Contract include the long-term storage of household goods (referred to as non-temporary storage) and the movement and storage of servicemembers’ privately owned vehicles. Additionally, while the contract is expected to include counseling to servicemembers, the military services will also perform some counseling. According to TRANSCOM and military service officials, they are working to determine the amount of counseling that will be retained by the military services. The movement and storage-in-transit of household goods in the current DP3 differs in key ways from the approach under the planned Global Household Goods Contract, as shown in table 1. TRANSCOM has developed preliminary and refined cost estimates for determining the cost implications associated with moving to a DP3 that incorporates the Global Household Goods Contract. According to TRANSCOM officials, they began developing preliminary cost estimates in December 2018 in order to (1) create a baseline cost estimate for the movement and storage of household goods under the current DP3, (2) create a cost estimate for those DP3 activities that will be a part of the Global Household Goods Contract, and (3) serve as a point of comparison between the two estimates to determine the cost implications of moving to the Global Household Goods Contract. TRANSCOM’s preliminary cost estimates for the current DP3 and for the activities that will be a part of the Global Household Goods Contract included costs associated with the movement and storage of household goods and government personnel costs associated with the military services’ personal property processing and shipping offices. TRANSCOM developed these preliminary cost estimates in part by requesting and collecting information from the military services about their current costs under DP3. Some DP3 costs were not included in the preliminary cost estimates, such as infrastructure and vehicle costs because these assets are used to support multiple programs and could not be easily isolated. However, our assessment of the preliminary DP3 cost estimates associated with moving to the Global Household Goods Contract found that TRANSCOM may not have accurately calculated some costs because of unanswered questions about how certain activities will be performed. TRANSCOM’s cost estimates associated with the number of government personnel that (1) will counsel servicemembers and (2) oversee contractor performance under the contract had weaknesses. Specifically, these estimates relied on assumptions that may have resulted in over- or underestimating some costs. First, TRANSCOM’s preliminary DP3 cost estimates associated with moving to the Global Household Goods Contract assume that DOD’s costs related to government personnel will be equivalent to those under the current DP3. However, TRANSCOM officials acknowledge that this assumption is based on discussions with military service officials that occurred before the Global Household Goods Contract draft request for proposals was issued in April 2019. Furthermore, military service officials told us they have not decided how much of the counseling function their service has provided will be moved to the planned contract, and the services’ approaches will likely differ. TRANSCOM officials pointed out that while the Global Household Goods contractor will perform some level of servicemember counseling, the contract will allow the individual military services to decide how much of the counseling responsibility to retain. Second, TRANSCOM’s cost estimates do not account for the number of DOD contracting officer’s representatives and quality assurance evaluators required to oversee contractor performance under the contract. According to TRANSCOM officials, the command’s preliminary cost estimates assume that government personnel who have been relieved of servicemember counseling responsibility will perform contract oversight and quality assurance responsibilities under the planned contract. For example, TRANSCOM officials told us that quality assurance inspectors under the current DP3 will transition to serve as quality assurance evaluators once the contract is in place. However, TRANSCOM officials acknowledge that it is possible that workload (and personnel costs) for the military services under the current DP3 will change under the planned contract. Moreover, if government personnel do switch roles and responsibilities, TRANSCOM did not take into account the cost to transition and train personnel to execute their contracting officer’s representative and quality assurance evaluator responsibilities under the contract. TRANSCOM officials told us that they were unable to determine with any precision the number and associated costs of government personnel required to counsel servicemembers and oversee the contract because of the fractured nature of the current DP3. Nonetheless, in September 2019, TRANSCOM tasked LMI with developing a BCA with refined cost estimates. LMI finalized the BCA and we received it on January 17, 2020. When we assessed the BCA, we found that like us LMI determined that it did not have complete information to fully calculate the cost of a DP3 that incorporates the Global Household Goods contract. Specifically, LMI acknowledged some of the same limitations in its cost estimates that we identified in TRANSCOM’s preliminary cost estimates, such as uncertainty about the number of government personnel required to oversee the Global Household Goods Contract. For example, LMI states in its BCA that the Global Household Goods Contract may reduce DOD staffing requirements for functions such as counseling; however, roles such as quality assurance evaluators and contracting officer’s representatives to oversee contractor performance may increase DOD staffing requirements. When we raised concerns about these unanswered questions and their potential cost implications with TRANSCOM officials, they told us that the move to the Global Household Goods Contract is less about saving money than it is about representing the best value to DOD when both cost and program performance are considered. They also told us they have developed a plan of action for the phase-in of the Global Household Goods Contract, and that plan includes conducting a manpower study during the third year of the contract. As described earlier in this report, the initial 3 years of the contract involve a gradual phase-in of household goods move volume for the contractor, and in the third year the contractor will be responsible for all of DOD’s household goods move volume. According to these officials, by waiting until year 3 of the contract to conduct a manpower study, DOD will have data to more precisely determine the number (and cost) of government personnel required to counsel servicemembers and oversee the contract, such as contracting officer’s representatives and quality assurance evaluators. However, we have determined that TRANSCOM does not have a process in place to track data that would inform its manpower study in year 3, such as how many personnel within each military service are needed to perform contract oversight duties and the costs associated with these personnel. We have reported that organizations should determine their personnel requirements as part of a systematic requirements- determination process that includes (1) identifying an organization’s mission, functions, and tasks and (2) determining the minimum number and type of personnel—military, civilian, and contractor—needed to fulfill those missions, functions, and tasks by conducting a workforce analysis. Without a way to track key data, DOD risks conducting a manpower study that does not allow it to fully understand the personnel and cost implications of its move to a DP3 that incorporates a Global Household Goods Contract. Notably, in its BCA LMI recommended that DOD reexamine the BCA when additional relevant information becomes available, such as when DOD completes its manpower study. TRANSCOM officials told us they are in agreement with this recommendation. However, if TRANSCOM does not have a process in place to collect key pieces of data during the first 3 years of the contract, a reexamination of the BCA will be less fruitful than it otherwise might be. First, TRANSCOM has developed performance metrics—referred to as performance indicators—for its Global Household Goods Contract, and has developed performance metrics for some, but not all, activities that fall outside of the contract. TRANSCOM’s draft quality assurance surveillance plan for the Global Household Goods Contract, which was developed in coordination with the military services, outlines how the contractor’s performance will be assessed against performance indicators. These performance indicators set measurable standards for, among other things, information technology systems’ availability, claims settlement timeliness for lost and damaged goods, and the timeliness of household goods pick-up and deliveries. Examples of performance indicators include: settling 90 percent of all loss and damage claims valued at less than $1,000 within 30 days and settling 95 percent of all claims, regardless of value, within 60 days; delivery of household goods on the scheduled date 95 percent of the time per month; and overall customer satisfaction rating of satisfactory at least 95 percent per month. Based on a DP3 briefing TRANSCOM provided us, the command has also developed metrics for assessing other contracted DP3 activities, such as the transport of privately owned vehicles and non-temporary storage, which TRANSCOM captures under contracts separate from the Global Household Goods Contract. For example, TRANSCOM tracks the number and cost of non-temporary storage lots maintained annually to support its storage requirements. However, TRANSCOM officials acknowledge that the command has not developed metrics for other activities that government personnel will continue to perform in DP3, once a Global Household Goods Contract is in place, such as servicemember counseling and claims resolution. Although TRANSCOM’s draft quality assurance surveillance plan includes a performance indicator to assess the contractor’s performance with respect to servicemember counseling, TRANSCOM officials told us the command has not developed commensurate metrics to assess the military services’ performance in providing servicemember counseling. TRANSCOM officials also noted that while the military services’ claims offices will be responsible for handling unresolved loss and damage claims between the servicemember and the contractor, the command has not developed metrics associated with this DP3 activity. Second, we found that, while TRANSCOM has articulated overarching DP3 goals, it has not clearly articulated how its performance metrics align with each of these goals. According to TRANSCOM officials, they decided to move certain DP3 activities to the Global Household Goods Contract because doing so could positively impact the program’s five goals regarding cost, quality, capacity, accountability, and responsibility, terms described in LMI’s BCA as shown below: Cost considers the potential financial impact, including either opportunities or risks to the future-state costs and any savings the program is likely to achieve. Quality encompasses the value of a move, typically measured by customer (i.e., servicemember) satisfaction. Quality may improve with on-time performance and minimized loss or damage. Capacity is the availability of industry providers to meet the program’s demands at a given time. This can be during peak or non-peak season. Accountability refers to the government’s ability to affix responsibility to the contractor and their supplier network for performance. Responsibility encompasses the authority of the government and how each government stakeholder will be held responsible for accomplishing their assigned tasks. Planned contract performance indicators and metrics are intended to assess contractor performance, but they may also provide information that TRANSCOM could use to more broadly assess the extent to which DP3 is meeting its overarching program goals. However, TRANSCOM has not clearly articulated which of the performance metrics it has established under the Global Household Goods contract align with which program goals. For example, one performance indicator for the Global Household Goods Contract is for contractor delivery of household goods to be on-time at least 95 percent of the time. While it appears that this performance indicator could relate to the quality and capacity goals, TRANSCOM has not established linkage between this performance indicator and either of these goals. Determining how it will assess improved capacity is particularly important. When we spoke with them about the move to the Global Household Goods contract, some military service officials, representatives of the moving and storage industry, and members of TRANSCOM’s Personal Property Relocation Advisory Panel told us that they doubt whether the Global Household Goods Contract will, indeed, improve capacity. Moreover, none of the existing performance indicators appear to relate to TRANSCOM’s responsibility goal. It is not surprising that the Global Household Goods Contract does not include performance indicators on how government stakeholders are to be held responsible for various program activities, because indicators under the contract are intended to evaluate contractor performance. However, we would expect to see performance metrics outside of the contract to measure government stakeholders’ performance. When we spoke with TRANSCOM officials about the gaps we identified in their performance assessment approach, they agreed that clarifying the linkage between performance metrics and the overarching program goals and ensuring there are performance metrics for assessing each of the goals would improve the command’s ability to assess overall program performance. While the performance indicators and metrics related to the various contracts, including the Global Household Goods Contract, are intended to assess contractor performance, they could also provide information that TRANSCOM could use to more broadly assess the extent to which DP3 is meeting its overarching program goals. DOD Instruction 4500.57, Transportation and Traffic Management, calls for TRANSCOM, in coordination with DOD components, to conduct annual program reviews to ensure the overall effectiveness of the DP3. The instruction calls for these reviews to include a metrics-based evaluation of the program, and assessments of TSP and service-provider cost and performance, information technology systems and contracts that support DP3, and external factors that impact the program such as industry capability and changes to servicemember shipping entitlements. Moreover, the Standards for Internal Control in the Federal Government call for management to define objectives (or metrics) in terms of what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement so that performance toward achieving those objectives (or metrics) can be assessed. We have also previously reported on the importance of linking lower-order performance metrics and higher-order strategic goals to achieve desired outcomes. Without performance metrics that account for those DP3 activities that fall outside of the Global Household Goods Contract and other DP3 contracts and without clearly articulating the linkage between performance metrics and program goals, TRANSCOM’s ability to assess progress toward, and take actions to help achieve, its overarching program goals will be hindered. The need to take these steps is particularly important, given some of the skepticism that TRANSCOM faces with its move to a DP3 that incorporates the Global Household Goods Contract. Further, because TRANSCOM officials have determined that the move to the Global Household Goods contract is about delivering better value, rather than just saving money, it is imperative that they have a robust performance assessment approach in place. DOD has experienced long-standing quality issues moving and storing the household goods of servicemembers and their families, despite numerous reform efforts. To address persistent quality-of-service issues, such as late pick-up and deliveries and high claims costs for lost and damaged goods, TRANSCOM intends to award a multi-year Global Household Goods Contract, under which a single commercial move manager would oversee the movement and storage of household goods shipments. DOD has been working to award its Global Household Goods Contract in time to meet the fiscal year 2021 peak season demand, and will award the contract without precise information on the number and cost of government personnel required to counsel servicemembers and oversee the contract. Given this determination, it is particularly important that DOD put in place a process to track key data during the first 3 years of the contract to inform its planned manpower study, so that it can fully determine the cost implications of this shift in DP3. Moreover, because DOD has stated that the purpose of the move to the Global Household Goods contract is to provide better value for the customers, DOD should ensure that it has in place performance metrics to assess all DP3 activities, including those that fall outside of the Global Household Goods contract, and clearly articulate the linkage between performance metrics and overarching program goals. Without doing so, TRANSCOM will be hindered in its ability to assess whether a DP3 that incorporates the Global Household Goods Contract is an improved program, particularly as it relates to the moving experiences of servicemembers and their families. We are making the following three recommendations to the Secretary of Defense: The Secretary of Defense, in coordination with the Chairman of the Joint Chiefs of Staff, should ensure that the TRANSCOM Commander, in coordination with the military services and the Coast Guard, develop a process for tracking data during the first 3 years of the Global Household Goods Contract to inform its planned manpower study during the third year of the contract to more precisely determine DP3 manpower needs and associated costs. (Recommendation 1) The Secretary of Defense, in coordination with the Chairman of the Joint Chiefs of Staff, should ensure that the TRANSCOM Commander develop performance metrics for those DP3 activities that will not be a part of the Global Household Goods Contract, such as servicemember counseling and claims resolution that will, at least in part, continue to be performed by the military services. (Recommendation 2) The Secretary of Defense, in coordination with the Chairman of the Joint Chiefs of Staff, should ensure that the TRANSCOM Commander articulate the linkage, where appropriate, between DP3 performance metrics, including Global Household Goods Contract performance indicators, and overarching program goals. (Recommendation 3) We provided a draft of this report to DOD for comment. In its comments, which are reproduced in Appendix III, DOD concurred with all of our recommendations and described ongoing and planned actions to address them. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense, the Chairman of the Joint Chiefs of Staff, and the Secretaries of the Army, the Navy, and the Air Force; and the Commandant of the Marine Corps. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our review focused on household goods movement and storage-in-transit for servicemembers in the Army, the Navy, the Air Force, the Marine Corps, and the Coast Guard. We did not evaluate Department of Defense (DOD) Defense Personal Property Program (DP3) activities that will not be a part of the Global Household Goods Contract, which include the long-term storage of household goods and the movement and storage of servicemembers’ privately owned vehicles. We did, however review metrics being tracked for these activities to determine the U.S. Transportation Command’s (TRANSCOM) ability to assess performance for the broader DP3. During our review, we coordinated with officials from the DOD Office of the Inspector General to gain an appreciation for the objectives, scope, and methodology of their ongoing audit on the timeliness of household goods deliveries and claims resolution under the current DP3. The resulting audit report contained several recommendations, including that TRANSCOM issue warnings or letters of suspension to transportation service providers (TSPs) within 14 days of missing the agreed-upon delivery date from storage, and that TRANSCOM help servicemembers and their families file inconvenience claims with TSPs within 14 days of a missed delivery date. To inform both of our objectives, we met with officials from the Office of the Secretary of Defense (OSD), TRANSCOM, the military services, the Coast Guard, and the DOD Office of the Inspector General. We also met with external stakeholders, including associations representing the moving and storage industry, the Small Business Administration, the American Federation of Government Employees, and members of TRANSCOM’s Personal Property Relocation Advisory Panel. For objective one, we assessed preliminary cost estimates TRANSCOM developed in connection with the move to a DP3 approach that incorporates the planned Global Household Goods Contract against best practices in the GAO Cost Estimating and Assessment Guide. The guide states that valid and useful historical data are important in developing sound cost estimates, and that risk and uncertainty and sensitivity analyses should be performed to mitigate the effects of changing assumptions. We analyzed TRANSCOM’s preliminary cost estimates, and discussed with TRANSCOM officials assumptions that were used to develop the estimates and techniques that were applied to account for variability in the assumptions. Given that TRANSCOM’s cost estimates were preliminary and likely to change based on the Logistics Management Institute’s (LMI) ongoing business case analysis (BCA), we did not conduct a reliability assessment of TRANSCOM’s cost estimates. We instead focused on TRANSCOM’s treatment of evolving assumptions in its preliminary cost estimates. We met with representatives from LMI to discuss their process for updating TRANSCOM’s preliminary cost estimates as part of a BCA that it was preparing for the command. We evaluated these cost estimates, including the cost estimates in the BCA that was issued in January 2020, using criteria from GAO’s Assessment Methodology for Economic Analysis that outlines five key elements for an economic analysis. Our assessment of LMI’s BCA is included in appendix II. For objective two, we reviewed relevant DOD guidance, including DOD Instruction 4500.57, Transportation and Traffic Management. The instruction requires TRANSCOM, in coordination with the DOD components, to annually evaluate the effectiveness of the DP3. We also reviewed the Global Household Goods request for proposals and TRANSCOM’s draft quality assurance surveillance plan. The draft quality assurance surveillance plan outlines how DOD will oversee the move manager’s performance under the Global Household Goods Contract and describes the performance indicators that will be used to assess contractor performance. Using the Standards for Internal Control in the Federal Government, which calls for management to define objectives (or metrics) in terms of what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement so that performance toward achieving those objectives can be assessed, we also assessed DOD’s DP3 performance metrics. Additionally, we discussed with TRANSCOM officials their approach for overseeing the Global Household Goods Contract, including the linkage between performance measures for those DP3 activities that will and will not be a part of the contract and DP3’s overarching goals. We conducted this performance audit from May 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: GAO’s Assessment of the Logistics Management Institute’s (LMI) Business Case Analysis (BCA) We assessed the cost and benefit information in LMI’s BCA against our Assessment Methodology for Economic Analysis. Our assessment methodology identifies the following five key components of an economic analysis: We found that the BCA informs decision-makers and stakeholders, with caveats, about the economic effects of the proposed Global Household Goods Contract. Further, we found that the BCA fully met four and partially met one of the five key components of an economic analysis. A summary of our rationale for these assessments is outlined in table 2. Elizabeth A. Field, (202) 512-2775 or fielde1@gao.gov. In addition to the contact named above, GAO staff who made key contributions to this report include Marc Schwartz, Assistant Director; Pedro Almoguera, John Bumgarner, William Cordrey (retired), Tim DiNapoli, Jennifer Echard, Christopher Gezon, Mae Jones, Jason Lee, Ned Malone, Tara Porter, Oliver Richard, Mike Shaughnessy, Susan Tindall, Nate Tranquilli, John Van Schaik, and Mary Weiland.", "summary": "DOD, through its DP3, arranges for the movement and storage of about 400,000 personal property shipments of servicemembers and their families annually—40 percent of them during peak moving season. DOD has identified problems meeting peak season demand and addressing long-standing quality-of-service issues. TRANSCOM announced that in April 2020 it would award a Global Household Goods Contract to a single commercial move manager to oversee DP3 activities that relate to the movement and storage-in-transit of household goods. GAO was asked to evaluate matters related to DOD's plans to implement the Global Household Goods Contract. GAO assessed the extent to which TRANSCOM has (1) determined the cost implications of moving to a DP3 that incorporates the Global Household Goods Contract and (2) developed metrics to assess program activities and that relate to overarching DP3 goals. GAO evaluated TRANSCOM's cost estimates against the GAO Cost Estimating and Assessment Guide and a DOD business case analysis against GAO's Assessment Methodology for Economic Analysis. The U.S. Transportation Command (TRANSCOM) has developed cost estimates to assess the cost implications of adjusting the Defense Personal Property Program (DP3), its program to move and store servicemembers' household goods, to incorporate a single move manager approach through the Global Household Goods Contract. However, TRANSCOM may not have accurately calculated some Department of Defense (DOD) costs because of unanswered questions about how tasks related to counseling servicemembers and overseeing contractor performance will be performed. DOD plans to conduct a manpower study in the third year of the contract to determine the number and cost of government personnel required to perform these tasks. However, TRANSCOM does not have a process in place to track data over the initial years of the contract to inform its manpower study, such as the number and associated cost of military service personnel needed to perform contract oversight. We have reported that organizations should determine their personnel requirements by identifying the minimum number and type of personnel needed to fulfill their missions, functions, and tasks by conducting a workforce analysis. Without a way to track key data, DOD risks conducting a manpower study that would result in less than a full understanding of the personnel and cost implications of the move to the Global Household Goods Contract. TRANSCOM has developed performance metrics for assessing some, but not all, DP3 activities. For example, TRANSCOM has developed indicators for assessing contractor performance, including the timeliness of household goods deliveries under the Global Household Goods Contract. However, TRANSCOM has not developed metrics for other activities that DOD personnel will continue to perform at least partially once the contract is in place, such as servicemember counseling. Further, TRANSCOM has not articulated how existing metrics link to TRANSCOM's program goals that relate to servicemembers' household goods movement and storage experience (see fig.). Without developing performance metrics for all DP3 activities, and articulating the linkage between metrics and goals, TRANSCOM will have limited ability to assess whether a DP3 incorporating the new contract is an improved program for servicemembers. GAO makes three recommendations–that DOD collect and track data to more precisely determine DP3's manpower needs and costs, develop performance metrics for DP3 activities not part of the contract, and articulate the linkage between performance metrics and program goals. DOD concurred with all three GAO recommendations.", "document_type": "gao"}
{"report": "USPS’s mission is to provide universal postal service while operating as a self-financing entity, but USPS’s current financial position is not sustainable. To achieve its mission, USPS must cover its expenses through revenues generated from the sale of its products and services. However, USPS’s total operating expenses have exceeded total operating revenue each year since fiscal year 2007, including a $2.6 billion loss from operations in fiscal year 2017 alone (see fig. 1). Moreover, we have reported that USPS’s overall financial condition is deteriorating. For example, in August 2018 we reported that USPS had about $149 billion in unfunded liabilities and debt at the end of fiscal year 2017. As a result, USPS’s financial condition remains on our list of high- risk areas needing attention by Congress and the executive branch. According to USPS financial documents, its ability to sell innovative products and services will be a key factor in improving its financial condition. Thus, USPS established a strategic goal to “innovate faster to deliver value” to its customers, by making investments in innovations that respond to rapidly evolving customer needs. A key element of this effort is to accelerate testing of innovative products and services to better serve these needs, according to USPS. While USPS is allowed to develop certain new postal products and services, there are statutory restrictions that currently limit the range of innovations USPS can offer. For example, under current statute, USPS is not permitted to ship alcoholic beverages. Similarly, although USPS is explicitly authorized to provide services to federal executive agencies (e.g., passport services), such authorization does not include services to state, local, and tribal governments. Legislation has been introduced in previous sessions of Congress that would permit USPS to deliver alcoholic beverages and allow USPS to provide property and services to state, local, and tribal governments under certain conditions. According to USPS officials, USPS supports these legislative proposals, which could enhance its ability to offer innovative products and services. According to USPS officials, two USPS handbooks include policies applicable to piloting key innovations. Specifically, the first handbook includes requirements, procedures, and responsibilities for all types of investment programs and projects undertaken by USPS, regardless of size, cost, or complexity. This handbook, for example, requires the identification and documentation of lessons learned for all investments and projects. The second handbook includes requirements and procedures specifically for major operating expense investments. This handbook, among other things, establishes requirements and procedures meant to ensure that new and enhanced products and services consistently meet customer needs, generate new revenue, and strengthen USPS as a business. This handbook further states that USPS has a responsibility to subject new initiatives to rigorous financial analysis, testing, and measurement, to determine whether these initiatives will make a positive financial contribution to the organization and ensure that USPS’s leadership has appropriate information for effective decision- making. USPS’s Office of Product Innovation generally has lead responsibility for piloting innovations. According to USPS’s policies, a project manager is responsible for establishing and coordinating a cross-functional team to design and evaluate the pilot. This team typically includes officials from a variety of USPS departments, such as finance, general counsel, information technology, marketing, and operations. The project manager, with support from the cross-functional team, is responsible for preparing a proposal for the pilot that includes key information, such as the pilot’s objectives and performance measures, and overseeing pilot implementation and communication with key stakeholders. In some cases, PRC has a role in overseeing postal innovation pilots. For example, USPS must notify PRC before it pilots any postal product innovation for which it will impose a price (i.e., a pilot that generates revenue for USPS) and must subsequently report quarterly revenue, volume, and cost data. PRC also ensures that certain safeguards are maintained during the pilot, such as limitations on the pilot’s duration and revenue. However, according to PRC officials, the commission has limited involvement in other areas of USPS’s efforts to develop innovations. USPS piloted 24 key innovations from fiscal years 2013 through 2017. For example, USPS piloted an Identity Verification Service that allows users to verify their identity either remotely (i.e., online) or in person at a postal facility. Similarly, USPS piloted an innovation to allow mailers to print shipping labels, track packages, and schedule package pick-ups by accessing USPS data. The primary goal of the majority of these key innovations (16 of 24) was to generate revenue, while the primary goal for the remaining innovations was generally to improve customers’ experience using USPS products or services (see fig. 2). Appendix I includes a complete list of key innovations USPS piloted from fiscal years 2013 through 2017. The following discussion provides additional information about the 4 key innovations we selected as illustrative examples of USPS’s efforts to pilot innovative products and services. Same-Day Delivery: From December 2012 to December 2015, USPS piloted same-day delivery for consumer e-commerce purchases (see fig. 3). According to the pilot proposal, this innovation was intended to generate revenue for USPS by allowing it to leverage its existing delivery infrastructure to capture part of the growing e-commerce market. To determine the potential scalability of same-day delivery, USPS first tested its operational feasibility and potential demand in several major metropolitan areas, including San Francisco, New York, and Phoenix. During the pilot, USPS delivered photos, chocolates, water, electronics, and other goods from 38 participating mailers to consumers in these areas. At the pilot’s conclusion, USPS decided to continue offering same-day delivery to interested participating mailers under Priority Mail contracts. Grocery Delivery: From November 2014 to October 2017, USPS piloted a grocery delivery product in nine selected metropolitan areas. According to USPS, the innovation was intended to generate additional revenue by taking advantage of the growing market for grocery delivery. To test the innovation’s operational feasibility, USPS required the pilot’s sole participating mailer to bring totes containing groceries and other prepackaged goods ordered by customers directly to post offices (see fig. 4). USPS was then responsible for sorting the totes and delivering them to customers. According to its proposal for this pilot, USPS expected grocery delivery to provide a substantial revenue generation opportunity. At the pilot’s conclusion, like same- day delivery, USPS decided to continue offering grocery delivery with the participating mailer under a Parcel Select contract. Informed Delivery: From spring 2014 through July 2016, USPS piloted a notification service called Informed Delivery in Northern Virginia and New York. According to USPS, this innovation is intended to bridge the gap between the physical and digital worlds by, for example, emailing customers with a scanned image of the exterior address side of letter-sized mail they should receive later that day (see fig. 5). Informed Delivery can also allow mailers to conduct marketing campaigns by integrating other elements—such as hyperlinks to mailers’ websites—into the email and other notifications that customers receive. In its proposal to pilot Informed Delivery, USPS stated the pilot was intended to help USPS understand the service’s business opportunity and increase the certainty of its potential benefits, which included retaining mail volume and generating new revenue from large advertisers. In addition, the pilot aimed to generate “statistically valid data” on how subscribers respond to marketing campaigns that mailers conduct. According to USPS, more than 70,000 customers were actively using the service at the pilot’s conclusion. In July 2016, USPS decided to end the pilot and launch the service nationally. According to USPS, about 13 million customers were subscribed to the service as of October 2018. USPS aims to have 40 million customers subscribed to the service by 2020. Keyless Parcel Lockers: Since October 2013, USPS has piloted keyless parcel lockers that allow customers to independently pick up packages in 98 selected post offices. According to USPS, among other things, this innovation is intended to reduce the number of missed package deliveries to customers’ post office boxes and thereby reduce USPS’s delivery costs (see fig. 6). The purpose of the pilot is to assess the performance and use of the lockers and to assess their performance. In October 2013, USPS began pre-testing the technical performance of 10 prototype keyless parcel locker units at post offices in New York City and Northern Virginia. Following this pre-test, in February 2015, USPS approved the installation of 50 made-to-order locker units in selected post offices across the country. Finally, in May 2016 USPS expanded the pilot to include an additional 50 units, including 2 units that a senior USPS official told us were not yet installed. As of November 2018, the pilot is still ongoing. USPS’s policies applicable to piloting key innovations fully reflect two of the five leading practices for pilot design and evaluation that we identified in prior GAO work and relevant standards for internal control (see table 1). These policies do not, however, fully reflect the other three leading practices due to policy gaps. Further, we found that USPS had not consistently followed its policies to document lessons learned at the conclusion of each pilot, as discussed below. Senior USPS officials acknowledged that gaps exist in its policies for pilot design and evaluation because they were not developed by USPS to fully reflect all leading practices. These policy gaps limit the extent to which USPS can ensure that it is making good resource allocation decisions based on pilot experiences. Below we further discuss the extent to which USPS’s policies reflect the five leading pilot practices we identified as well as how USPS applied these leading practices among the four piloted innovations that we reviewed. Establish appropriate and measurable objectives linked with identified performance measures: We found USPS’s policies do not fully reflect this leading practice. While USPS policies require that project managers establish pilot objectives and performance measures, they do not require that each objective be linked with identified performance measures. As a result, some pilots may have objectives without an associated performance measure. For example, although USPS established both objectives and performance measures for each of the four innovations we selected for review, it did not consistently link each established objective to performance measures. USPS’s proposal to pilot same-day delivery, for example, had objectives of generating new revenue and improving customers’ experience. However, while the proposal included performance measures associated with generating new revenue—i.e., package volume, gross revenue, and net revenue—it did not identify and link any performance measures with its objective of improving customer experience. Similarly, USPS’s proposal to pilot keyless parcel lockers included improving customers’ experience as one of its objectives. However, while the proposal included a variety of performance measures—reduction in the number of missed deliveries to post office boxes, locker rate utilization, and on-time locker installation—it did not identify and link any performance measures with its improving customers’ experience objective. Absent such measures, USPS may not know whether customers have experienced an improvement using keyless parcel lockers compared to using manual, keyed parcel lockers. Linking all objectives to performance measures could help ensure that USPS has the performance information to assess the extent to which a pilot has achieved all of its objectives. USPS officials told us that it can be difficult to measure performance for some objectives related to customer experience. While measuring customers’ experience can be challenging, it is important to understand the extent to which a pilot has achieved all of its objectives. Further, USPS has demonstrated that it can measure improvement in customers’ experience. For example, during its Informed Delivery pilot, USPS conducted a consumer survey with approximately 5,500 Informed Delivery subscribers to collect data on consumer adoption and satisfaction. In the survey, USPS found that over 80 percent were satisfied or very satisfied with the service. According to USPS officials, this data helped USPS to measure the pilot’s success in meeting its objective of improving customers’ experience. Articulate a methodology for evaluating pilot performance: We found that USPS’s policies fully reflect this leading practice because the policies require officials to develop and communicate a methodology for evaluating pilot performance. Articulating such a methodology helps managers to identify the types and sources of performance information necessary to evaluate the pilot. USPS’s policies require project managers to work with the pilot’s cross-functional team to develop and reach consensus on the methodology. These policies also require the project manager and cross-functional team to identify data needs, data sources, and how the data will be evaluated. For the four innovations we reviewed, we found that USPS articulated a methodology for evaluating the pilot’s performance. For example, for the Informed Delivery pilot, USPS identified its customer registration system as the method for tracking progress toward performance measures related to the number of Informed Delivery subscribers. Similarly, in its proposal to pilot keyless parcel lockers, USPS identified its central parcel locker monitoring system as a method of tracking progress toward performance measures related to utilization of keyless parcel lockers. Evaluate pilot performance and identify and document lessons learned: We found that USPS’s policies fully reflect this leading practice, but USPS did not consistently follow its policy that requires documenting lessons learned. Specifically, the policies require project managers to evaluate performance and document lessons learned at the conclusion of each pilot. Doing so can enable USPS to identify information needed to make conclusions about the pilot’s scalability and ensures that such information will be accessible to inform future related efforts. However, among the key innovations we selected for review USPS had not consistently documented lessons learned (see table 2). USPS officials told us that they discussed lessons learned during ongoing monitoring of pilot performance for these innovations, but had only documented lessons learned for its Informed Delivery pilot. Specifically, USPS identified lessons learned in its July 2016 proposal to launch its Informed Delivery service nationally. In this proposal, we found that USPS identified some lessons learned about the pilot related to user satisfaction and adoption rates. USPS officials told us that this information helped to inform USPS’s decision to launch the service nationally. However, USPS officials acknowledged that USPS did not document lessons learned for the other two concluded pilots that we selected for review (same-day delivery and grocery delivery). Senior USPS officials told us that USPS had not consistently documented lessons learned at the conclusion of pilots across the 24 key innovations because it had not developed tools, such as a template, or training that could help ensure such consistency. Without consistently documenting lessons learned for all of its pilots, USPS risks losing information garnered during pilot implementation that could be relevant to future innovation efforts. Doing so can be particularly important because, according to a senior USPS official, officials responsible for pilot projects sometimes retire or leave USPS for employment elsewhere, creating a gap in knowledge of pilot experiences. Standards for internal control underscore the importance of maintaining documentation in order to retain organizational knowledge and mitigate the risk of having knowledge limited to a few personnel. Draw and document conclusions about scalability based on pilot results: USPS’s policies do not fully reflect this leading practice. These policies require that project managers draw conclusions based on the results and lessons learned from the pilot. According to USPS officials, conclusions may include determining scalability—i.e., whether, how, and when to integrate pilot activities into overall efforts. However, USPS’s policies do not specifically require that officials document these conclusions. Documenting conclusions about scalability based on pilot results helps to ensure retention of organizational knowledge related to the pilot that may inform future decisions. Among the three innovations that we selected for review for which the pilots had concluded (i.e., same-day delivery, grocery delivery, and Informed Delivery), USPS officials told us that senior leadership discussed the results and lessons of the pilots and made determinations regarding whether, how, and when to launch them more broadly, but that they did not document these decisions or the rationale for them. By not documenting conclusions, USPS risks losing information that could affect the success of future related efforts and that could inform future USPS leadership of the rationale for maintaining investments in activities upon which pilots were based. Documenting conclusions for innovation pilots can be especially important in cases in which USPS decides to continue or expand pilot activities even when the pilots do not meet all of their intended objectives. For example, USPS’s same-day delivery and grocery delivery pilots had revenue objectives, along with associated performance measures; however, neither pilot achieved these objectives. For the same-day delivery pilot, costs exceeded revenue in 12 of the 13 fiscal year quarters in which the pilot was conducted, according to data USPS reported to PRC. Likewise, USPS data indicate it did not reach its annual revenue target for its grocery delivery pilot. Similarly, USPS’s pilot of Informed Delivery was intended to generate “statistically valid data” on how consumers respond to mailer marketing campaigns. However, according to a senior USPS official, the pilot did not generate the data as intended, because no such campaigns were conducted during the pilot. As discussed earlier in this report, USPS did not discontinue any of these three selected innovations when their pilots concluded. Although USPS may have had good reasons to continue with, or more broadly launch, these innovations despite the pilots not meeting all of their objectives, the lack of documentation regarding its reasoning and decisions limits information relevant to whether USPS is making judicious use of limited resources. Ensure appropriate two-way communication at all stages of the pilot with key internal and external stakeholders in order to understand and address their views: USPS’s policies do not fully reflect this leading practice. USPS’s policies require the involvement of key internal stakeholders in pilots. Specifically, USPS’s policies require the involvement of cross- functional teams—which include legal, finance, and other departments— and varying levels of review during the design and implementation of pilot proposals. However, USPS’s policies do not address communication with key external stakeholders. According to USPS officials, some pilot projects may be confidential or have limited or no direct effect on external stakeholders and, thus, communication with external stakeholders may not be appropriate. While external stakeholder communication may not be appropriate with some pilots, such communication, as appropriate, can help to ensure that issues critical to the success of a pilot activity are identified and addressed. Among the innovations that we selected for review, USPS officials explained various steps taken to involve internal stakeholders in the design and evaluation of the pilots, such as the involvement of cross functional teams to develop pilot proposals. Further, while USPS’s policies do not address external stakeholder communication, we found that USPS employed strategies for some of the innovations we selected for review to communicate with some external stakeholders—i.e., industry associations and mailers. For example, a representative of a postal association told us that USPS shared information and sought input about its Informed Delivery pilot during a quarterly meeting with industry groups. Similarly, a mailer we interviewed told us that USPS had shared information and sought input on the Informed Delivery pilot through direct outreach with the mailer. However, USPS did not consistently employ strategies to communicate with some key external stakeholders among the innovations that we selected for review. Specifically, USPS did not design or implement strategies to obtain feedback from consumers on its pilots for same-day delivery, grocery delivery, or keyless parcel lockers, despite the fact that each of these innovations directly affected consumers. In contrast, as previously discussed, for its Informed Delivery pilot, USPS planned and conducted a survey to obtain consumer feedback, the results of which helped USPS project managers support the proposal to expand the service nationally. Absent communication with all key stakeholders, USPS risks not having a complete understanding of perspectives that could inform the viability of its innovations. In recent years, USPS has sought to compete in a challenging business environment by piloting innovations intended primarily to generate revenue and enhance customers’ experience. The policies that USPS uses for piloting key innovations fully reflect some leading practices for pilot design and evaluation, such as articulating a methodology for evaluating pilot performance. However, addressing gaps between USPS’s policies and leading practices related to linking objectives and performance measures, documenting conclusions, and communicating with key external stakeholders would enable USPS leadership to better assess the outcomes of its pilots, understand the rationale for conclusions about scalability based on pilot results, and gauge customers’ reactions to innovative products and services. Moreover, developing tools or training to ensure that USPS consistently implements its policy of documenting lessons learned from pilots would provide USPS with key information to inform future related efforts. We are making the following two recommendations to USPS: The Postmaster General should direct the Vice President of Product Innovation to develop policies that fully reflect leading practices for pilot design and evaluation in areas such as linking objectives and performance measures; documenting conclusions about scalability based on pilot results; and communicating with key external stakeholders, as appropriate. (Recommendation 1) The Postmaster General should direct the Vice President of Product Innovation to develop tools, such as a template, or training to help ensure USPS consistently documents lessons learned at the conclusion of pilots, as required by USPS policies. (Recommendation 2) We provided a draft of this product to USPS and PRC for comment. USPS provided a written response, which is reproduced in appendix II of this report. In its response, USPS did not state whether it agreed with our recommendations, but described actions that it plans to take related to each. These actions, if fully implemented, would meet the intent of our recommendations. For example, USPS stated that it would develop policies specifically for pilot design, and would reflect leading practices for pilot design and evaluation based upon best practice research. USPS also noted that it would develop training to ensure consistent documentation of lessons learned from its pilots. USPS added that this planned training would cover best practices for pilot tests. Regarding our first recommendation USPS said that pilots are only one step in a larger process for developing innovations. We agree with this and noted in our report that piloting is one key element of USPS’s efforts to innovate. Nonetheless, given USPS’s financial position, effectively piloting innovations is a critical step to ensure that USPS invests its limited resources on innovations that are most likely to improve its long- term viability. USPS also stated that flexibility is important in innovation pilots, particularly as it pertains to linking pilot objectives with performance measures. We continue to believe that linking objectives with performance measures is key to effectively evaluating pilots. In so doing, however, there is flexibility to adjust pilot objectives and performance measures as new information is gleaned during the pilot. Finally, with regard to communication with external stakeholders during pilots, USPS said that it communicates consistently with external stakeholders regarding pilots at Mailers’ Technical Advisory Committee meetings (MTAC). In our report, we noted that USPS employed strategies to communicate with some external stakeholders—i.e., industry associations and mailers. We continue to believe, however, in the importance of communication with all key external stakeholders, which may include stakeholders, such as consumers, that do not participate in MTAC meetings. USPS and PRC also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committee, the Postmaster General, Chairman of PRC, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or RectanusL@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The U.S. Postal Service (USPS) piloted 24 key innovations from fiscal years 2013 through 2017 (see table 3). In addition to the individual named above, Derrick Collins (Assistant Director); William Colwell and James Leonard (analysts in charge); Barbara El Osta; Geoffrey Hamilton; Gina Hoover; Anthony Jackson; and Laurel Voloder made key contributions to this report.", "summary": "USPS faces a challenging business environment that has led to reduced demand for its traditional services and significant financial losses. USPS aims to address this challenge by offering innovative products and services. The success of these efforts will depend, in part, on how effectively USPS tests each innovation's performance on a small scale to determine whether, how, and when to launch an innovation more broadly—a practice known as “piloting.” GAO was asked to review USPS's efforts to develop postal innovations. This report (1) describes key innovations that USPS recently piloted and (2) examines the extent to which USPS's policies reflect leading practices for pilot design and evaluation. GAO analyzed information on USPS pilots from fiscal years 2013 through 2017; compared USPS policies for piloting innovations to leading practices for pilot design and evaluation in prior GAO work and relevant standards for internal control; and selected four key innovations based on various characteristics (e.g., innovation type) to serve as illustrative examples of USPS's piloting efforts. From fiscal years 2013 through 2017, the U.S. Postal Service (USPS) piloted 24 key innovations intended primarily to generate revenue or improve customers' experience. The following four selected innovations illustrate these efforts: Same-Day Delivery: USPS delivered goods consumers bought online or in stores. The pilot sought to test the product's feasibility and revenue potential. Grocery Delivery: USPS delivered groceries to consumers in metropolitan areas. The pilot sought to test the product's feasibility and revenue potential. Informed Delivery: USPS emailed customers an advance image of the mail they would receive. The pilot sought to test the service's potential benefits, such as generating new revenue from advertisers that may use the service. Keyless Parcel Lockers: USPS is testing lockers where customers can independently pick up packages at post offices. The pilot seeks to test the service's operation and potential benefits for USPS and customers. USPS's policies for piloting innovations do not fully reflect the five leading practices for pilot design and evaluation identified in GAO's prior work. The policies fully reflect two of the leading practices because they require articulating a methodology for evaluating pilot performance and documenting lessons learned. The policies do not fully reflect the other three practices because they do not require: (1) linking pilot objectives to identified performance measures; (2) documenting conclusions based on pilot results; or (3) communicating with key external stakeholders, as appropriate. These policy gaps limit the extent to which USPS can ensure that it is making good resource allocation decisions based on pilot experiences. For example, GAO found that USPS did not document its conclusions based on the results of its pilots of same-day delivery, grocery delivery, and Informed Delivery. Documenting conclusions can be especially important when USPS continues to offer the product or service after the pilot has concluded, even though the pilot did not achieve all of its objectives, as was the case with these three innovations. Further, while USPS's policies require documenting lessons learned from its pilots, USPS did not do so for some pilots GAO reviewed. Senior USPS officials said that USPS did not consistently follow this policy because it had not developed tools or training that could help ensure such consistency. As a result, USPS risks losing information that could be relevant to future innovation efforts. GAO recommends that USPS (1) develop policies that fully reflect leading practices for pilot design and evaluation and (2) develop tools or training to ensure consistent documentation of lessons learned from pilots. USPS neither agreed nor disagreed with the recommendations but described actions it plans to take related to each.", "document_type": "gao"}
{"report": "Ballistic missiles, which foreign adversaries generally use as a deterrent or instrument of coercion, are becoming increasingly important weapons to support military and political objectives. These weapons continue to proliferate and show advances in mobility, reliability, in-flight maneuverability, accuracy, and ability to reach longer distances. According to the defense intelligence community, there has been a dramatic increase in ballistic missile capabilities over the last decade, and the over 20 countries that already possess ballistic missiles are likely to pursue further expansions in their quantities and capabilities. Figure 1 shows the lineup of operational ballistic missiles from North Korea and Iran, two of the various countries that pose threats to the United States and its allies and are of concern to the BMDS. Ballistic missile threats are generally categorized by their range (i.e., ground distance covered between the launch point and impact of the missile) as shown in figure 2 below. The configuration of a ballistic missile is also largely determined by the range a missile is expected to travel. For example, longer range ballistic missiles typically have two or three distinct sections, known as stages, that separate during flight and each has an independent propulsion system to ensure the warhead reaches its target. Shorter range ballistic missiles generally only have one section, or a single stage, that remains intact until the warhead reaches its intended target and detonates. Ballistic missiles may also carry countermeasures or adversaries may employ tactics and techniques, both of which are intended to confuse missile defense systems. For example, countermeasures can include penetration aids that are released during flight, such as decoys, which are intended to complicate the ability of missile-tracking sensors and missile defense interceptors to identify the warhead among the multiple objects. Challenging tactics and techniques can include structured attacks, such as simultaneously launching a number of missiles or outfitting a single missile with multiple warheads. In addition, some newer missiles are capable of traveling at greater speeds, performing maneuvers during all phases of flight, and remaining in the atmosphere for longer durations of their flight. These newer missiles, generally referred to as hypersonics, possess a combination of high speed, maneuverability, and relatively low altitude that can make them a challenging target for missile defense systems to track and engage. According to a publicly released intelligence assessment, nearly all adversaries that possess ballistic missiles have devised various means to confuse missile defense systems. In November 2010, the Defense Intelligence Agency (DIA) established the Defense Intelligence Ballistic Missile Analysis Committee (DIBMAC) to oversee and coordinate intelligence analysis and threat assessment production activities pertaining to foreign ballistic missile developments. Under the leadership of this committee, the defense intelligence community performs important stakeholder, advisor, and oversight functions in support of MDA’s acquisitions by (1) producing threat assessments; (2) providing advice on important threat-related issues pertaining to BMDS acquisition; and (3) validating threat models and reports. Table 1 provides further explanation of these roles and additional information on the defense intelligence community is in appendix I. In November 2013, DOD’s acquisition leadership issued a memorandum that requested DIA work with the acquisition community to produce more timely, relevant, and dynamic defense intelligence community threat assessments for DOD acquisition programs. The memorandum notes that DOD acquisition program officials expressed concerns about the timeliness of threat assessments due to the lengthy process and varying timelines that sometimes left them with threat assessments that did not contain the most up-to-date information. In addition, the defense intelligence community noted its concerns with the significant duplication in producing certain threat assessments, which placed a huge burden on its manpower and resources. Consequently, DOD leadership directed the acquisition customers and defense intelligence community to work together to improve threat assessments and in 2016 the defense intelligence community set forth its planned revisions to threat assessment processes and products. Subsequent revisions include creating a library of threat modules and replacing a former type of threat assessment with a new Validated Online Lifecycle Threat (VOLT) report, among others. These revisions were codified in the defense intelligence community’s policies in September 2016 and in DOD policy in August 2017. However, defense intelligence community officials noted that they are still in the process of implementing these revisions. MDA is developing a variety of missile defense systems, known as elements, including sensors, interceptors, and battle management and communication capabilities. The ultimate goal is to integrate these various elements to function as a layered system called the Ballistic Missile Defense System (BMDS). The BMDS elements, when integrated, are designed to destroy enemy missiles of various ranges, speeds, sizes, and performance characteristics in different phases of flight, as seen in figure 3 below. When MDA was established in 2002, the agency was granted exceptional flexibilities to diverge from DOD’s traditional acquisition lifecycle and defer the application of acquisition policies and laws designed to facilitate oversight and accountability until a mature capability is ready to be handed over to a military service for production and operational use. In particular, MDA was exempted from DOD’s standard requirements-setting process and instead uses a unique and flexible requirements-setting process that is intended to enable MDA to quickly develop and field useful but limited capabilities, which can be incrementally improved over time and adapted to address changes in the threat. MDA also implemented a tailored process that is intended to use defense intelligence community threat assessments in a way that enables the BMDS to defend against a broad range of uncertain and evolving threats. MDA uses defense intelligence community threat assessments as the foundation for developing threat models and establishing wide-ranging critical threat parameters upon which to design, develop, and test the BMDS. Specifically, MDA’s process includes the following: Design: MDA uses threat assessments to select a set of threat models in which it incrementally designs BMDS capabilities to defend against. MDA combines the capabilities from the selected threat models into parameters, forming what MDA refers to as the “parametric threat space.” MDA assigns subsets of the threat space to each of the BMDS elements to inform the design of their respective systems. Development: MDA assigns specific threat models to each of the elements for use in simulations as they are undergoing development. MDA uses these threat models to verify that the element’s system design has the capability necessary to defend against its assigned threat space. Test: Toward the end of BMDS element development, MDA coordinates with the warfighter and test and evaluation communities to select specific threat models for use in testing to assess the performance of the BMDS elements. MDA also uses its threat models to prepare for flight tests to help ensure that the BMDS elements have a high probability of achieving their test objectives, such as successfully intercepting the target. Operational capability: MDA uses its threat models as the foundation for algorithms, which are embedded into the BMDS to enable its sensors and interceptors to determine which object(s) amongst a group of objects (e.g., countermeasures, debris, etc.) is lethal. This capability is referred to as “discrimination.” Various challenges have recently emerged that have affected the availability of the threat assessments MDA needs to inform the agency’s acquisition decisions. Challenges include an upsurge in threat missile activity, which has increased the overall demand for threat assessments; a transition period as the defense intelligence community works through how to implement recent revisions to its processes and products; and MDA’s request for accelerated support from the defense intelligence community. Defense intelligence community officials say they are contending with all of these challenges without the provision of additional manpower or resources. Consequently, defense intelligence community officials have stated that their manpower and resources are constrained, which can affect the timely delivery of threat assessments to customers, such as MDA. If MDA does not have the threat information it needs when it is needed, the delay of information could result in setbacks for the agency’s weapon system design, development, and testing, or could put the agency in the position of moving forward without the requisite information, thereby increasing the risk of performance shortfalls and costly retrofits. However, MDA has opportunities to mitigate these challenges by collectively prioritizing its threat assessment requests and working through existing venues with the defense intelligence community to determine what additional resources may be needed to secure the accelerated support that it needs. One challenge for the defense intelligence community is a recent upsurge in threat missile activity, which has increased MDA’s requests for threat assessments. For example, ballistic missile flight testing has more than doubled from 2005 to 2016, from about 70 tests in 2005 to nearly 180 tests in 2016, and the most notable increases have occurred since 2010 (see figure 4). This upsurge of threat missile activity increases the urgency for the defense intelligence community to provide the requisite type of threat assessments to MDA to enable the agency to counter and defeat such threats; however, defense intelligence community officials have said that manpower and resource constraints have limited their ability to do so. In 2016, we reported on how the defense intelligence community’s manpower and resource constraints have impacted its ability to provide threat assessments. Since then, defense intelligence community officials have said that the manpower and resource constraints have not been resolved, but threat missile activity has increased. For example, some countries have recently displayed or flight tested new threat missiles capable of reaching the United States. When new threat missiles emerge, MDA requests missile-specific threat assessments—known as reference documents—from the defense intelligence community to understand their size, performance characteristics, and signature when detected by a sensor. This detailed information on the threat missiles enables MDA to build the threat models used to design, develop, and test BMDS weapon systems. Defense intelligence community officials have said that, although important, missile-specific threat assessments utilize considerable manpower and resources because they can be labor-intensive, lengthy, and take months, and at times a year or longer, to prepare. According to these officials, one way to minimize the workload and shorten the preparation timeframe is for MDA to differentiate the specific information that it needs from anything that might be extraneous. As a simplified and hypothetical example, defense intelligence community officials explained that MDA may only need some simple, general information about a missile or conversely it may need complex, highly-detailed information on everything about the missile from tip to tail. The amount of time and effort it would take defense intelligence community officials to gather the information in these two scenarios would vary significantly. MDA officials have acknowledged that some extraneous information may be gathered and included in these threat assessments but noted that, at the time they request a threat assessment, they may not yet fully understand what information is essential for their purposes. Therefore, they prefer to have as much information as possible, with the ability to determine whether and how to use it. Defense intelligence community officials, however, told us that they believe this is an inefficient use of their manpower and resources, especially given current constraints. Another challenge for the defense intelligence community is the implementation of recent revisions to its threat assessment processes and products, which apply to all DOD acquisition programs. In 2016, in response to the November 2013 memorandum from DOD’s acquisition leadership, the defense intelligence community began overhauling its threat assessment processes and products to produce more timely, efficient, and relevant information. See table 2 for an overview of these revisions. While each of these revisions has potential benefits, defense intelligence community officials have said that implementing the revisions has been more time-consuming and difficult than anticipated, which has affected their ability to provide certain threat assessments to MDA when needed. For example, MDA and the defense intelligence community were initially uncertain about the responsibilities and processes for creating a VOLT report for the BMDS. Although it took some time to resolve these uncertainties, MDA is now compiling its own country-specific threat assessments—known as the BMDS VOLT report—which DIA then validates. The military services generally have their own defense intelligence production centers, and therefore, a means for compiling VOLT reports. MDA, however, uses information from multiple defense intelligence production centers and does not possess its own production center. In September 2017, MDA reached out to DIA on this matter and DIA responded that, per the DOD policy update, it does not see anything that would preclude MDA, as a DOD component, from compiling VOLT reports. DIA stated that MDA compiling its own VOLT report aligns the agency with the rest of the DOD acquisition community. MDA is waiting on threat modules from the defense intelligence community to prepare its preliminary BMDS VOLT report, which MDA will use to inform acquisition decisions. MDA needs specific threat modules from the defense intelligence community, including those for six specific countries, in order to compile its preliminary BMDS VOLT report. However, defense intelligence community officials have said that they are still in the process of creating some of the digitized threat modules MDA needs, because it has taken more time and effort than they expected to standardize the threat modules’ content and coordinate production across multiple defense intelligence community production centers. Consequently, MDA is planning to publish its preliminary BMDS VOLT report in 2019 (table 3). In the meantime, without the preliminary BMDS VOLT report or digitized threat modules used to compile the BMDS VOLT report, MDA is reliant on threat assessments written between 2014 and 2016 for some of its acquisition decisions. For example, MDA recently made design decisions for certain BMDS elements using these threat assessments, although these threat assessments have not yet been updated. Consequently, these weapon systems that MDA recently made design decisions for could have capability gaps or performance shortfalls that present risks for the warfighter. MDA has attempted to fill the void for digitized threat modules and the preliminary BMDS VOLT report by submitting ad hoc requests for threat assessments to the defense intelligence community, but this has only added to the defense intelligence community’s workload and exacerbated delays. Moving forward, MDA has asked the defense intelligence community to provide the digitized threat modules on an accelerated schedule to ensure the agency can compile BMDS VOLT reports in a timely manner to inform its acquisition decisions; however, some defense intelligence production centers have said that an accelerated schedule will be difficult, if not impossible, without additional manpower and resources. Specifically, MDA wants the defense intelligence community to provide the digitized threat modules every year, as opposed to every two years as required by DOD policy. MDA has stressed the importance of having these digitized threat modules on an accelerated schedule in order to be responsive to threat advancements and mitigate the potential for capability gaps or performance shortfalls in its weapon systems. Defense intelligence community officials have acknowledged MDA’s need to have the digitized threat modules on an accelerated schedule but are concerned about their ability to provide them due to personnel and resourcing issues at some defense intelligence production centers. For example, two defense intelligence production centers have said that MDA’s request for an accelerated schedule is currently unrealistic due to their manpower and resource levels. Defense intelligence officials have said that once the initial digitized threat modules are created, the threat modules will be easier and quicker to update, but whether they can provide them annually is still being determined. Although MDA has the capability to centrally and collectively prioritize its threat assessment requests submitted to the defense intelligence community, it currently prioritizes its threat assessment needs through two distinct, individual lanes—country-specific and missile-specific— supplemented by informal discussions with the defense intelligence community. According to MDA, the individual lanes are as follows: 1. Country-specific threat assessments (i.e., threat modules for BMDS VOLT reports) are prioritized via the VOLT Threat Steering Group, which is co-chaired by MDA and DIA. The VOLT Threat Steering Group’s objectives are to determine MDA’s threat module requirements, to achieve concurrence on the threat modules used in the BMDS VOLT report, and to review the BMDS VOLT production schedule. The first VOLT Threat Steering Group meeting was held in April 2018 and during that meeting, MDA presented its prioritized list of threat assessments by adversary country to the defense intelligence community personnel in attendance. 2. Missile-specific threat assessments (i.e., reference documents used to build threat models) are prioritized via an annual intelligence mission data process managed by the Joint Staff. Through the intelligence mission data process, MDA prioritizes the data it needs for threat missiles by most to least critical—119 total threat missiles in 2018. With these two individual lanes for prioritization, MDA treats each type of threat assessment as independent and unrelated. According to MDA, the agency maintains these individual lanes for prioritizing its threat assessment requests because the requests can be more easily managed by the defense intelligence community components that develop the threat assessments. For example, MDA stated that requests for missile-specific threat assessments are often routed to intelligence production centers while requests for country-specific threat assessments are often routed to DIA’s regional centers (see appendix I for more information on defense intelligence community components). According to MDA, the vast majority of new requirements submitted to the defense intelligence community are also accompanied by an informal verbal discussion and if MDA’s priorities shift because a new threat emerges, MDA stated that it can convey that shift to the defense intelligence community in an effort to work out the best path forward. If the defense intelligence community cannot meet MDA’s needs, MDA stated that it works with the defense intelligence community to determine the best course of action for resolving prioritization issues. For example, MDA cited a recent example where it had worked with the U.S. Navy’s Office of Naval Intelligence to develop a threat model production schedule for two threat systems; however, the emergence of a new threat shifted MDA’s priorities. MDA was able to understand the effect of choosing one system ahead of the others based on the priority and projected production timelines. MDA cited another recent example where it had similarly worked with the U.S. Air Force’s National Air and Space Intelligence Center to prioritize production of a threat model for a new, unique threat. After some initial informal discussions and questions about whether the threat model production effort was a top priority for MDA, both agreed in a meeting in January 2019 to lower the priority for the model production effort. The specific threats referenced in the examples above have been omitted because they are classified. However, MDA’s approach of prioritizing its threat assessment needs through individual lanes creates the potential for unresolved, competing priorities because the defense intelligence community produces threat assessments collaboratively rather than disparately. Defense intelligence community officials told us that the underlying analyses that support both country-specific and missile-specific threat assessments are developed and reviewed by many of the same subject matter experts and managers within the defense intelligence community. Defense intelligence community officials told us that they have no way of knowing whether the information to build a specific threat model is a greater or lesser priority than updating a particular threat module needed to support the BMDS VOLT report. Our prior best practices work found that successful commercial companies employ a formal process for prioritizing their investments collectively rather than as independent and unrelated initiatives. MDA instead stovepipes its threat assessment prioritization through individual lanes and informally discusses its collective priorities with the defense intelligence community. Consequently, MDA’s requests, and resulting output from the defense intelligence community, may not be based on the collective order of importance, as depicted in figure 5. MDA relies on both country- and missile-specific threat assessments for its acquisitions, as each characterizes threats in unique ways and for different purposes, and it uses other requests to fill information gaps, as needed. Thus, all of MDA’s requests are important, but one among them may be the most important or urgent due to the timing of an upcoming design or testing decision. In the example illustrated above in figure 5, the most important request is for a country-specific threat assessment; however, it will not likely be the next one out of the defense intelligence community’s queue because there is a missile-specific request ahead of it. Hence, MDA may have the information it needs to build the threat model used to test one weapon system’s performance, but it may delay the country-specific information it needs to make design decisions for another. This delay in the country-specific information could put MDA in a position of moving forward with design decisions without the requisite information or relying on outdated information, which increases the risk for performance shortfalls and costly retrofits. One opportunity that MDA has to address the availability of threat assessments from the defense intelligence community is to collectively prioritize its threat assessment requests based on the order of importance. We have previously identified collective prioritization as a best practice—specifically, that it is important for an agency to regularly evaluate the totality of its needs or tasks, to determine whether specific ones should be prioritized ahead of others, based on the costs, benefits, and risks. While MDA has no formal requirement to collectively prioritize its threat assessment requests, defense intelligence community officials said that they have had discussions with MDA through existing venues and requested that it do so to ensure it has the most urgently needed information. MDA has the capability to collectively prioritize its threat assessment requests because all of the requests go through a centralized intelligence requirements group within the agency’s engineering directorate. This group has insight into the totality of the agency’s threat assessment requests and is uniquely positioned to make determinations about the order of importance among them. As the group submits requests to the defense intelligence community, the defense intelligence community responds to the requests in the order that they were received, because, as we previously found, the defense intelligence community is not required to prioritize the requests, does not currently possess the capability to do so, and would not be in a position to dictate to an agency what is most important. Another opportunity for MDA to address the availability of threat assessments is through further collaboration with the defense intelligence community to determine the extent of additional resources that would be needed to enable accelerated support. When intelligence support requirements exceed the defense intelligence community’s responsibilities, DOD acquisition programs are generally required to account for resources to augment intelligence support. For example, according to defense intelligence community officials, the Air Force is providing one of the defense intelligence community’s production centers with additional resources to collect data and devise tools primarily to support a specific major defense acquisition program via a military interdepartmental purchase request because the program’s request exceeds the defense intelligence community’s responsibilities. According to MDA, intelligence mission data shortfalls are currently identified through an annual departmental review process. MDA stated that in fiscal year 2019 DOD approved budgeting additional funding in the future to help address intelligence mission data shortfalls for all of the military services, including MDA. MDA has not provided the defense intelligence community with additional resources for an accelerated schedule to update threat modules more frequently. MDA has requested that the defense intelligence community update the digitized threat modules it needs to compile a BMDS VOLT report every year to ensure that it has the updated threat information needed for acquisition decisions; however, the defense intelligence community is only required to update the digitized threat modules every two years. Some defense intelligence community officials have acknowledged MDA’s need to have an accelerated schedule, but have communicated to MDA that given its current manpower and resource constraints, the accelerated schedule is unrealistic without additional resources. Thus, MDA’s request for the defense intelligence community to update the digitized threat modules faster exceeds what the defense intelligence community is currently able to do given its manpower and resource constraints. With existing venues, like the VOLT Threat Steering Group, MDA and the defense intelligence community have a forum to further collaborate and identify what additional resources are needed and the potential funding scenarios to support an accelerated schedule for threat module production. Without collaboration through these existing venues, MDA and the defense intelligence community may not be utilizing an available method to ensure their individual needs are met. According to our best practices for inter-governmental agency collaboration, it is important for the inter-reliant agencies to collaboratively identify the resources— information, manpower, and funding—needed to accomplish their respective missions. Doing so enables the agencies to have a common understanding and explore opportunities to leverage each other’s resources; thus, realizing benefits that would not be available if they were working separately. Therefore, working together, MDA and the defense intelligence community would be better positioned to determine how to best meet their respective needs. MDA uses defense intelligence community threat assessments to inform its acquisitions, but the agency has not fully engaged the defense intelligence community on challenges in preparing the BMDS for existing and emerging threats. According to MDA, the rapid pace of threat evolution presents significant challenges for the agency to sufficiently plan for emerging threats. Although the defense intelligence community is uniquely positioned to assist MDA in addressing these challenges, the agency generally limits the defense intelligence community’s insight into and input on critical threat-related BMDS acquisition processes and decisions, such as establishing the BMDS threat space and assigning threat parameters and threat models to BMDS elements. Major defense acquisition programs are generally required to engage the defense intelligence community on how to design and test weapon systems, but MDA generally does not, due to the acquisition flexibilities DOD has granted to the agency. Moreover, DIA is currently unable to validate MDA’s threat models, as required by DOD policy, because MDA does not follow the department’s best practices on models and simulations. MDA has steadily increased its outreach to the defense intelligence community and other stakeholders over the past few years, but opportunities remain for more comprehensive engagement on key challenges the agency faces with keeping pace with the threat. According to MDA, the rapid pace of threat evolution presents significant challenges for the agency to sufficiently plan for emerging threats. MDA currently faces some difficult choices regarding what steps it needs to take and in what order to address recent threat advancements. In making these decisions, MDA has an opportunity to engage the defense intelligence community on whether and how it should make changes to the BMDS threat space, threat parameters, and threat models the agency uses as design requirements and test cases for BMDS elements. As previously noted, the defense intelligence community plays important stakeholder, advisor, and oversight roles for MDA’s acquisitions. Although the department has provided MDA with flexibilities on following many of the requirements that specifically define when and how major defense acquisition programs are to engage the defense intelligence community, DOD policy requires MDA to vet its threat models and consult with the defense intelligence community on threat-related acquisition matters. DOD, senior defense officials, and expert panels supported by DOD have consistently maintained that the defense intelligence community’s direct involvement in MDA’s acquisitions is critical to staying ahead of the threat: In a written response following a 2002 congressional hearing, a senior defense official stated that every effort was being made to coordinate development of the document establishing the BMDS threat space with the defense intelligence community and that the defense intelligence community’s participation was critical to the agency’s success. In 2010, DOD’s Ballistic Missile Defense Review similarly found the need to maintain a strong focus by the defense intelligence community on the ballistic missile threat and that accurate and timely intelligence should play a vital role in informing BMDS planning. In 2010, an expert panel known as JASON (not an acronym) found that MDA lacked sufficient plans for improving discrimination and that the agency risked falling behind the evolution of the threat’s countermeasure capabilities. The study recommended that DOD form stronger two-way connections between MDA and defense intelligence agencies. In 2012, the National Research Council found that MDA did not follow through on efforts to improve discrimination and that much of the agency’s expertise on discrimination was lost in the late 2000s. The study recommended that MDA seek assistance from experts with experience in understanding sensor data for threat missiles. In 2018, DOD’s National Defense Strategy stated that modernizing missile defense, among other items, was necessary to keep pace with adversaries and that the department must expand the role of intelligence analysis throughout the acquisition process in order to streamline rapid, iterative approaches for delivering performance at what DOD refers to as “the speed of relevance.” During a 2018 congressional hearing, the Under Secretary of Defense for Research and Engineering stated that catching up to near-peer adversaries in missile defense can be achieved by exceeding their technical capabilities and that the intelligence community was critical to making sure that we are outpacing our adversaries. Although MDA uses defense intelligence community threat assessments to inform BMDS acquisition, the defense intelligence community generally has limited insight into the BMDS, which is unprecedented among major defense acquisition programs. When MDA was established in 2002, DOD granted the agency exceptional flexibilities to diverge from the standard acquisition framework that most major defense acquisition programs follow. These flexibilities enable MDA to forego obtaining the defense intelligence community’s input on some critical threat-related BMDS acquisition processes and decisions, such as how MDA establishes the: threat space that informs overall BMDS design and development; threat parameters assigned to each BMDS element as design requirements; and threat models assigned to each BMDS element as test cases for design reviews and testing. However, according to MDA, the new BMDS VOLT report will serve as the source document for specific details on the BMDS threat space, threat parameters, and threat models. Although MDA may leverage the defense intelligence community’s threat assessments, MDA has not included the defense intelligence community in these key threat-related BMDS acquisition processes and decisions. For example, in response to a questionnaire we sent to MDA in May 2018, agency officials stated that decisions related to the threat parameters it assigns to the different BMDS elements should be left to MDA, as it is within the agency’s purview and authority to design threats as it deems necessary for research, development, test, and evaluation purposes. Moreover, MDA indicated that the defense intelligence community should provide the agency with the best intelligence information on adversary missile capabilities, in a timely manner, to support the agency’s mission. As such, MDA stated it does not support obtaining the defense intelligence community’s concurrence on the threat parameters it assigns to the BMDS elements. MDA has provided the defense intelligence community with some insight into the BMDS but not to the same extent DOD generally requires of major defense acquisition programs. For example, MDA has held a number of “immersion days” over the past nine years, which allow the defense intelligence community to receive briefings from MDA programs on priorities, future developments, and weapon system operations. According to MDA, it also assigns intelligence portfolio managers to BMDS elements and their mission, among other items, is to keep the defense intelligence community informed on key program developments and how intelligence feeds into the agency’s threat-related acquisition processes and decisions. In addition, MDA has briefed the DIBMAC on how it uses threat assessments to inform BMDS acquisition. However, defense intelligence community officials stated that they generally lack fundamental information on the BMDS and have no visibility into the BMDS threat space, threat parameters, or test cases MDA assigns to the BMDS elements. In contrast, for most major defense acquisition programs, the defense intelligence community is integrally involved in determining the: threat(s) of record upon which requirements of the weapon system are based; key performance parameters and attributes of the weapon system; threat parameters that could critically degrade or negate the weapon system; and operational threat environment the weapon system is tested against. These insights, enabled by DOD’s standard requirements-setting process and acquisition framework, are intended to provide the defense intelligence community with in-depth knowledge of the design and performance requirements for most major DOD weapon systems. Officials from other various organizations we met with, such as the Joint Staff, contractors, warfighters, and test and evaluation, expressed concerns about MDA’s ability to unilaterally define the threats it designs the BMDS against. As one MDA prime contractor told us, what really matters is how the BMDS would perform in the real world against real threats. Defense intelligence community officials acknowledged that MDA, as the BMDS developer, has a legitimate need to explore threat capabilities beyond those that the intelligence community has observed from specific adversaries. However, defense intelligence community officials rejected a sentiment expressed to us by MDA officials that the defense intelligence community lacks expertise in understanding the bounds of threat capabilities. To the contrary, according to defense intelligence community officials, this is exactly the type of analysis at which the defense intelligence community excels. In choosing not to engage the defense intelligence community on these key threat-related BMDS acquisition processes and decisions, MDA runs the risk of not sufficiently planning for existing and emerging threats. MDA’s reluctance to provide the defense intelligence community with insight into or input on some threat-related BMDS acquisition processes and decisions is consistent with how MDA has engaged other DOD stakeholders and oversight groups. Our prior work on defense acquisitions has shown that establishing buy-in from decision makers is a key enabler of achieving better acquisition outcomes because DOD components provide varying perspectives due to their unique areas of expertise and experience. However, in May 2017, we found that MDA generally limits the warfighter’s input on the requirements it pursues and overlooked stakeholder concerns on the acquisition strategy for a redesigned kill vehicle for the Ground-based Midcourse Defense system. We made recommendations aimed at increasing stakeholder engagement and oversight in BMDS acquisition, such as coordinating operational requirements with the warfighter and obtaining input from DOD’s Office for Cost Assessment and Program Evaluation (CAPE) on acquisition strategies for new efforts. DOD’s acting Assistant Secretary of Defense (Acquisitions) did not concur with the recommendations, stating that warfighters lacked the skillset to determine operational BMDS requirements and existing DOD policy does not require MDA to obtain CAPE’s concurrence on acquisition policies. We continue to maintain that DOD should implement the recommendations. MDA builds its own threat models to support BMDS design, development, and testing but it does not validate its threat models with DIA, which is inconsistent with DOD policy and best practices. Although the defense intelligence community builds threat models, MDA cannot currently use those models as-is because they are generally not compatible with MDA’s modeling and simulation framework. Even with MDA using its own threat models, DOT&E has found that integrating the various BMDS models and presenting them with a common threat scene has been an extremely challenging task for MDA. Moreover, MDA’s BMDS modeling and simulation architecture requires highly detailed threat models for simulations to function properly. Defense intelligence community officials stated that they generally do not need the same level of detail MDA requires for the types of analyses the defense intelligence community performs. In addition, according to a March 2018 MDA memorandum, the agency was previously told by representatives of the DIBMAC that they do not have the staff or resources to produce the high volumes of detailed threat models that MDA needs to support BMDS development and testing. Therefore, MDA continues to build its own threat models for use in BMDS development and testing. MDA uses defense intelligence community threat assessments to build its threat models, but independent evaluators have not been able to fully trace MDA’s threat models to defense intelligence community threat assessments. According to a briefing MDA presented to the defense intelligence community in September 2018, every target, model, and test can be traced back to defense intelligence data. However, in August 2018, the U.S. Army issued a memorandum for MDA stating that the BMDS Operational Test Agency (OTA)—the agency responsible for independently analyzing the verification and validation data for models used in operational testing—was only able to certify some of the threat models used in a recent ground test. In other ground tests, though, the BMDS OTA was able to trace MDA’s threat models back to defense intelligence community threat assessments. In February 2019, DOT&E reported that (a) credible threat models are the linchpins of BMDS models and simulation; (b) reducing threat model uncertainty is a high priority; and (c) MDA and the BMDS OTA should ensure that MDA-developed threat models are representative of the defense intelligence community’s understanding of the threat. MDA also has not implemented best practices established by DOD’s Models and Simulation Coordination Office that would enable DIA to be in a position to validate MDA’s threat models. According to DOD best practices on modeling and simulation, the validation agent should: (1) be brought on in the beginning of the modeling and simulation development process; (2) work closely with the model developers as the models are built and tested; and (3) perform validation as a continuing activity of the overall process of developing and preparing a model for use or reuse in a simulation. Conversely, defense intelligence community officials stated that they lack sufficient insight into and input on how MDA builds and uses threat models. For example, the defense intelligence community has emphasized to MDA that caveats need to be carried through with the model data and voiced concerns about the engineering judgments the agency makes in its threat models, because these judgments could lead to the BMDS performing well or poorly for reasons not based on the actual threat. Given these uncertainties and the defense intelligence community’s lack of insight into the purposes for which MDA uses its threat models, DIA lacks the insight and input necessary to validate MDA’s threat models. Although MDA has previously expressed interest in validating its threat models with the defense intelligence community, long-standing obstacles remain. During a May 2018 meeting between MDA and the DIBMAC, defense intelligence community officials identified the lessons they have learned from working with other acquisition programs to validate threat models. Model validation can be achieved if the acquisition program: establishes a partnership with the defense intelligence community; prioritizes its threat modeling needs; recognizes there are limits to how many threat models can be built in a given time; provides in-depth insight into its threat modeling needs and weapon system’s capabilities; discusses how the models will be applied; jointly defines model acceptance criteria early in the process; provides resources, including funding and staff; and invests in the defense intelligence community’s capability and capacity. MDA officials stated that the agency desires to have its threat models validated but noted that the defense intelligence community does not validate models produced by other organizations. MDA officials also emphasized that the defense intelligence community cannot meet MDA’s timeline for building threat models, whereas the agency can. In addition, MDA officials indicated to us that they do not believe it is practical to provide the amount of insight defense intelligence community officials told us they would need in order to validate MDA’s threat models. MDA officials told us that the only way in which the defense intelligence community could obtain such insight is by being co-located with MDA’s threat modelers as the models are being built. However, the 2010 JASON study found that this type of close working arrangement between MDA engineers and defense intelligence analysts is necessary to effectively plan for emerging threats. Defense intelligence community officials also clarified for MDA that the defense intelligence community can validate models produced by another agency but it would require the defense intelligence community having detailed knowledge of everything used to produce the model. As a result, although DOD policy generally requires that threat models used to support acquisition decisions be validated by DIA, MDA has yet to validate any of the numerous threat models it has developed since 2004. Without independent validation, MDA runs the risk that DOD and congressional decisionmakers may not have confidence that the agency’s plans and proposals for developing the BMDS are appropriate and sufficient to address the threat because any flaws or bias in MDA’s threat models can have significant implications on the BMDS’s overall performance. According to a Federally Funded Research and Development Center publication describing its efforts supporting MDA threat modeling, acquisition influences can place pressure on MDA threat modelers to tailor the missile threats to suit the currently feasible BMDS design. In May 2017, we found a parallel circumstance where, in the absence of warfighter validation of MDA-established requirements, the agency made critical design choices for three new BMDS efforts. These design choices reflected the needs and preferences of MDA ahead of the warfighter, potentially compromising performance to the extent of not being able to defeat current and future threats. MDA has undertaken a number of efforts over the past few years to generally increase stakeholder involvement in BMDS acquisition. The engagement efforts, in large part, are a result of efforts led by MDA’s previous director to improve the agency’s relationship with department stakeholders. In addition to previously serving as the Deputy Director for MDA, the Director also held a variety of assignments in operational, acquisition, and staff units within DOD. When we met with the MDA Director in March 2018, he told us that he wanted to change the agency’s culture of limiting stakeholder input, noting that he had recently provided updated guidance to his leadership team and agency personnel on bringing stakeholders in early, engaging them more frequently and substantively, and ensuring that the agency has obtained their buy-in on major undertakings. The MDA Director also stated that he was willing to take some actions that could effectively address a recommendation we made in May 2017 intended to provide the warfighter with greater input on operational requirements for ballistic missile defense. Officials from several DOD organizations we met with over the course of our review observed that MDA’s engagement with their respective organizations was improving. In 2018, MDA began working with the defense intelligence community to determine a more appropriate level of involvement for the defense intelligence community throughout MDA’s acquisition activities. MDA and defense intelligence community officials agreed during a May 2018 meeting that processes could be put in place to develop intelligence-based countermeasure assessments if adequate resources are provided. MDA officials also acknowledged that the defense intelligence community would benefit from having a better understanding of how the BMDS responds to threats and agreed to work towards providing such information. Defense intelligence community officials stated that increased insight would allow them to better focus their intelligence collection, analysis, and production by knowing which threat parameters MDA most often uses and the specificity of those parameters. The defense intelligence community and MDA also agreed that providing defense intelligence community engineers with MDA program-level access would improve the support the defense intelligence community provides to MDA. MDA has also recently increased its outreach to the defense intelligence community on some early BMDS planning decisions, although opportunities for more comprehensive engagement remain. For example, MDA engaged the defense intelligence community on an analysis of alternatives the agency completed in February 2017 that assessed future sensor options for the BMDS. According to MDA officials, they are also engaging the defense intelligence community on another analysis of alternatives pertaining to defense against hypersonic missiles. In addition, MDA worked with the defense intelligence community to establish threat space parameters for some specific threat systems. Also, as noted earlier, over the last nine years, MDA has held 18 “immersion day” events with the defense intelligence community, half of which occurred in the last two years. Moving forward, MDA has opportunities to more comprehensively engage the defense intelligence community on updating the BMDS threat space and determining threat parameters and threat models assigned as design requirements and test cases for BMDS elements. In addition, MDA has recently begun placing greater emphasis on ensuring its models are credible. According to an internal MDA memorandum signed by the MDA Director in April 2018, a culture exists within the agency that generally tolerates the use of models that have not been sufficiently vetted and is too willing to accept the associated risk. The memorandum states that the agency’s goal is for all MDA personnel to help address this culture problem and that model verification, validation, and accreditation is a high priority for MDA. During a meeting with the BMDS OTA in October 2018, officials confirmed that MDA is taking steps to address the challenges raised in the memorandum. MDA also increased its outreach to the defense intelligence community in 2016 to coordinate on threat modeling efforts. In the past three years, MDA and the defense intelligence community have collaborated to quickly model several newly-observed threat missiles, according to MDA. Figure 6 below shows that MDA held 93 threat model coordination meetings with the defense intelligence community over the last four years, with more frequent meetings occurring in early 2016 and again in early-to-mid 2018. In addition, MDA is working with the defense intelligence community to address compatibility issues that currently prevent MDA from directly using the defense intelligence community’s threat models in BMDS ground testing. MDA plans to include a few missile trajectory models produced by the defense intelligence community in the models and simulation framework for the agency’s upcoming Ground Test-08 campaign. The Technical Interchange Meetings and pathfinder efforts for MDA directly using defense intelligence community threat models are improving collaboration between MDA and the defense intelligence community on threat modeling efforts. However, they do not provide MDA with a pathway for validating its threat models with DIA. Even if compatibility issues that currently prevent MDA from using defense intelligence community threat models could be resolved, the defense intelligence community is currently not resourced to build threat models for MDA. Moreover, although MDA has indicated that the Technical Interchange Meetings can include any topic of interest, the meetings do not provide defense intelligence officials with sufficient insight into how MDA builds its models, including the assumptions, caveats, or intended use of the models. According to MDA, the agency continues to hold discussions with the defense intelligence community and explore process improvements, as well as technical and resource requirements, to ensure the creation of valid, threat-representative models for BMDS development. In March 2018, the MDA Director told us that one of his priorities was to ensure that the agency was using appropriately validated models and acknowledged the importance of ensuring its threat models are sufficiently representative. In April 2018, MDA subsequently began holding meetings with the DIBMAC to define the issues preventing the defense intelligence community from validating MDA’s threat models. MDA and the defense intelligence community met five times in 2018 to identify actions that would facilitate working together to develop threat models the defense intelligence community would be comfortable validating. During these meetings, both organizations agreed on specific actions intended to increase the defense intelligence community’s involvement in MDA’s threat modeling process. To achieve threat model validation, an initial plan was developed that included a combination of (a) MDA directly using aspects of defense intelligence community threat models; and (b) MDA partnering with the defense intelligence community to build threat models. MDA and the defense intelligence community plan to hold follow-on meetings in 2019 to further discuss the plan and review actions. MDA is reliant on threat assessments from the defense intelligence community, as they inform what weapon systems the agency pursues, the design of those systems, and how those systems are tested prior to being delivered to the warfighter for operational use. However, the defense intelligence community has been facing a variety of challenges that are affecting its ability to provide MDA the threat assessments it needs, when it needs them. If MDA does not have the threat assessments it needs, when needed, the agency’s weapon systems are at risk of being designed or tested against irrelevant or outdated information, which could result in performance shortfalls and costly retrofits. MDA has opportunities to mitigate these challenges and risks by collectively prioritizing its threat assessment requests and working through existing venues with the intelligence community to determine if and to what extent additional resources may be needed to secure the support that it needs. If MDA does not take advantage of these opportunities, the defense intelligence community’s challenges will likely continue, which will impact the availability of threat assessments and increase the likelihood that MDA’s weapon systems will not be designed or tested against the most up-to-date threat information. In addition, MDA faces a steep challenge in developing the BMDS and fielding capabilities at a rate that keeps pace with the threat. MDA was previously informed by expert panels and senior defense leaders that it needed to work more closely with the defense intelligence community to better prepare for future threats or risk falling behind the threat. Given these challenges, it is imperative for MDA to make the most out of its available resources. Aside from providing MDA with threat assessments, the defense intelligence community is a resource MDA has yet to fully tap into. The defense intelligence community is uniquely qualified to assist MDA on fundamental and critically important BMDS acquisition processes and decisions, such as establishing the BMDS threat space and the threat parameters and models it assigns to the BMDS elements. Moreover, after nearly 15 years of building numerous threat models, MDA has yet to fully implement a plan for DIA to validate these threat models, as generally required by DOD policy. However, MDA has recently begun laying the groundwork for more comprehensive engagement with the defense intelligence community through efforts which have the potential to address long-standing obstacles that have prevented DIA from validating MDA’s threat models. Resolving these issues would help MDA keep pace with emerging threats and improve the BMDS’s viability to defend against the complex missile threats of the future. We are making a total of three recommendations to DOD: The Director, MDA should coordinate with the defense intelligence community on the agency’s collective priorities for threat assessments and work with the defense intelligence community to determine if additional resources are needed to support the agency’s threat assessment needs. (Recommendation 1) The Director, MDA should fully engage the defense intelligence community on key threat-related missile defense acquisition processes and decisions, including providing insight into and obtaining input from the defense intelligence community on the threat space MDA establishes for the BMDS and the threat parameters and threat models MDA assigns to BMDS elements as design requirements and test cases. (Recommendation 2) The Secretary of Defense should require the Director, MDA and the Director, DIA to coordinate on establishing a process for MDA to obtain validation of its threat models. (Recommendation 3) DOD provided written comments in response to the classified version of this report (GAO-19-92C), indicating that the department concurred with all three of our recommendations. An edited version of DOD’s comments is reprinted in appendix II as some information had to be omitted due to classification. In addition, the summarized version of DOD’s comments below is reflective of the content in the classified version. DOD provided us with technical comments and a significant amount of new information in response to the classified version of this report. We incorporated this information into our report, as appropriate, but the new information did not substantively change our findings and did not alter our recommendations. Although DOD concurred with our third recommendation, DOD also raised concerns about statements in our report related to our third recommendation that the department believes are inaccurate. We do not believe DOD’s concerns are warranted because our findings are based on evidence we obtained during our review—evidence that we believe is sufficient and appropriate and provides a reasonable basis for our findings and conclusions. We address this in further detail below. DOD concurred with our first recommendation that the Director, MDA should coordinate with the defense intelligence community on the agency’s collective priorities for threat assessments and determine whether additional resources are needed. In its response, DOD stated that MDA will continue to follow established processes to identify threat assessment needs and to determine if additional resources are required. However, our review found that these established processes—prioritizing exclusively through distinct, individual threat assessment lanes—have not proven entirely effective. In addition, although MDA has participated in the department’s intelligence mission data review process since 2016, the agency has yet to provide the defense intelligence community with additional resources to address known funding and manpower shortages. Moreover, this review process is limited to intelligence mission data and does not cover all of the other types of threat assessments that MDA needs. As such, we maintain that MDA should take additional steps beyond continuing existing processes to address the challenges MDA currently faces in obtaining the threat assessments it needs, when it needs them. DOD also concurred with our second recommendation that the Director, MDA should provide insight into and obtain input from the defense intelligence community on the threat space MDA establishes for the BMDS and the threat parameters and threat models the agency assigns to BMDS elements as design requirements and test cases. DOD stated in its response that MDA has and will continue to fully engage the defense intelligence community on key threat-related missile defense acquisition processes and decisions. The efforts MDA has recently undertaken to expand its outreach to the defense intelligence community are positive steps. However, we have yet to see MDA provide the defense intelligence community with further insight into or input on the threat space the agency has established for the BMDS or the assignment of threat models and threat parameters to BMDS elements. We will continue to monitor MDA’s ongoing efforts to see whether it takes this next step toward more fully engaging the defense intelligence community. DOD concurred with our third recommendation that the Secretary of Defense should require the MDA and DIA Directors to coordinate on establishing a process for MDA to obtain validation of its threat models. In its response, DOD stated that the department will re-examine the most cost-effective approach to meet the intent of DIA validation to support development and fielding of effective BMDS elements. More specifically, DOD stated that MDA and the DIBMAC are currently having extensive discussions regarding how the defense intelligence community can best support MDA’s threat modeling requirements. As noted in our report, the discussions MDA has had with the defense intelligence community over the course of 2018 demonstrate that the department is beginning to consider substantive measures to address the long-standing issue of MDA not using DIA-validated threat models. However, MDA and defense intelligence community officials have also cautioned that obstacles remain and that alternative solutions may need to be explored. We will continue to monitor these ongoing discussions and any results that emerge. DOD also stated in its response that it was concerned that statements in our report pertaining to our third recommendation imply that MDA has not coordinated with DIA on validating its threat models and that our report could be interpreted as saying MDA does not internally conduct threat model validation. To be clear, our review did, in fact, find that, until recently, MDA did not sufficiently coordinate with DIA on establishing a process for creating valid threat models for use in MDA simulations. Furthermore, we explain in our report that MDA was told that the defense intelligence community can validate MDA’s threat models if it has sufficient insight into how MDA builds its models—insight which MDA officials previously told us was unnecessary. Additionally, although MDA may internally validate its threat models for each ground test, the BMDS OTA was not able to certify many of those threat models, in part, because some models could not be traced back to the defense intelligence community’s threat assessments. We therefore excluded MDA’s internal threat model validation process from our report, as it is not a comparable substitute for DIA threat model validation. We are sending copies of this report to the appropriate congressional committees and the Secretary of Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix Ill. In its entirety, the intelligence community is a federation of 17 agencies and organizations that span the executive branch of the U.S. government. The defense intelligence components responsible for assessing foreign ballistic missile threats are headed by the Defense Intelligence Agency and overseen and coordinated by the Defense Intelligence Ballistic Missile Analysis Committee. Table 4 below identifies each component and its respective focus areas. In addition to the contact named above, LaTonya Miller (Assistant Director), Rose Brister, Lori Fields, Laura Greifner, Kurt Gurka, Helena Johnson, Kevin O’Neill, Jay Tallon, Brian Tittle, Hai Tran, Alyssa Weir, and Robin Wilson made key contributions to this report.", "summary": "MDA is developing missile defense capabilities to defend the United States, deployed forces, and regional allies from missile attacks. However, missile threats continue to emerge, as adversaries continue to improve and expand their missile capabilities. The National Defense Authorization Act for Fiscal Year 2012 included a provision that GAO annually assess and report on the extent to which MDA has achieved its acquisition goals and objectives, and include any other findings and recommendations. This report is a public version of a classified report GAO issued in May 2019, which addresses (1) the challenges MDA and the defense intelligence community face in meeting the agency's threat assessment needs and (2) the extent to which MDA engages the defense intelligence community on missile defense acquisitions. GAO reviewed MDA's threat-related acquisition processes and interviewed relevant officials from the defense intelligence community, MDA, test community, and warfighters. Information deemed classified by DOD has been omitted. The Missile Defense Agency (MDA) is experiencing delays getting the threat assessments needed to inform its acquisition decisions. Officials from the defense intelligence community—intelligence organizations within the Department of Defense (DOD)—told GAO this is because they are currently overextended due to an increased demand for threat assessments from a recent upsurge in threat missile activity, as well as uncertainties related to their transition to new threat processes and products. The delays are exacerbated because MDA does not collectively prioritize the various types of threat assessment requests submitted to the defense intelligence community or provide resources for unique requests, as other major defense acquisition programs are generally required to do. Without timely threat assessments, MDA risks making acquisition decisions for weapon systems using irrelevant or outdated threat information, which could result in performance shortfalls. MDA has increased its outreach to the defense intelligence community over the past few years, but opportunities remain for further engagement on key threat­related processes and decisions. Specifically, MDA provides the defense intelligence community with limited insight into how the agency uses threat assessments to inform its acquisition decisions. MDA is not required to obtain the defense intelligence community's input, and instead has discretion on the extent to which it engages the defense intelligence community. However, the defense intelligence community is uniquely positioned to assist MDA and its involvement is crucial for helping MDA keep pace with rapidly emerging threats. Moreover, this limited insight has, in part, prevented the defense intelligence community from validating the threat models MDA builds to test the performance of its weapon systems. Without validation, any flaws or bias in the threat models may go undetected, which can have significant implications on the performance of MDA's weapon systems. MDA and the defense intelligence community recently began discussing a more suitable level of involvement in the agency's acquisition processes and decisions. Note: the threat missile coverage depicted is notional and not representative of MDA's actual threat coverage. GAO is making three recommendations to improve how MDA: prioritizes and resources its threat assessment needs; obtains input from the defense intelligence community on key threat-related processes and decisions for missile defense acquisitions; and validates its threat models. DOD concurred with all three recommendations, citing actions it is already taking. While DOD has taken some positive steps, GAO believes more action is warranted.", "document_type": "gao"}
{"report": "As of May 2019, the federal government recognized 573 Indian tribes as distinct, independent political communities with certain powers of sovereignty and self-government, including power over their territory and members. The tribes can vary greatly in terms of their culture, language, population size, land base, location, and economic status. As of the 2010 U.S. Census, about 21 percent, or 1.1 million, of all American Indians lived on tribal lands. Tribal lands include many land types (see table 1). According to BIA, the federal government holds about 46 million acres in trust for tribes (tribal trust land) and more than 10 million acres in trust for individual Indians (individual trust land). Some tribes also have reservations. According to BIA, there are approximately 326 Indian land areas in the United States administered as federal Indian reservations (including reservations, pueblos, rancherias, missions, villages, and communities). The land within the reservation may include a mixture of tribal trust land, individual trust land, restricted fee land, allotments, and land without trust or restricted status (that is, fee- simple land), which may be owned by tribes, individual Indians, or non- Indians. Agricultural producers (farmers, ranchers, or producers or harvesters of aquatic products) on tribal lands can be individual tribal members, the tribe itself, or non-Indians who lease the land from the tribe or Indian owner. According to USDA’s 2012 Census of Agriculture, about 75 percent of farms and ranches on 76 selected Indian reservations were operated by agricultural producers that identified as American Indian or Alaska Native (see table 2). On these reservations, Indian producers held 61 percent of total farm and ranch acreage. However, the total market value of agricultural products sold from Indian-operated farms and ranches was just over a tenth of that of non-Indian operated farms and ranches on the 76 selected reservations. In 2011, USDA, which operates several agricultural programs targeted to traditionally underserved populations, settled a class action lawsuit brought by Native American farmers and ranchers for $760 million (Keepseagle v. Vilsack). The lawsuit alleged that USDA discriminated against Native Americans in its farm loan and farm loan servicing programs. In 2018, $266 million of the remaining settlement proceeds were used to establish the Native American Agriculture Fund. The Fund will begin awarding grants in 2019 to fund the provision of business assistance, agricultural education, technical support, and advocacy services to Native American farmers and ranchers. Like other businesses, agricultural producers generally require financing to acquire, maintain, or expand their farms, ranches, or agribusinesses. Types of agricultural loans as categorized by their purpose or maturity may vary by lender but generally include the following: Short-term loans. These loans are used for operating expenses and match the length and anticipated production value of the operating or production cycle. They are typically secured by the product (crops or livestock). Intermediate-term loans. These loans are typically used to finance depreciable assets such as equipment, which serves as the loan collateral. The loan terms usually range from 18 months to 10 years. Long-term loans. These loans are used to acquire, construct, and develop land and buildings with terms longer than 10 years. They are secured by real estate and may be called real estate loans. Several types of lenders provide credit to U.S. agricultural producers. According to USDA’s Economic Research Service, in 2017, FCS and commercial banks provided most agricultural credit in the United States, with respective market shares of 40 and 41 percent. USDA’s Farm Service Agency—a lender that focuses on assistance to beginning and underserved farmers and ranchers and also guarantees the repayment of loans made by other lenders—provided 3 percent, and the remainder was provided by individuals, life insurance companies, and other lenders. FCS is a government-sponsored enterprise, established in 1916 to provide sound, adequate, and constructive credit to American farmers and ranchers. FCS is regulated by FCA, an independent federal agency. FCS’s statutory mission includes being responsive to the needs of all types of creditworthy agricultural producers, and in particular, young, beginning, and small farmers and ranchers. According to FCA, FCS is not statutorily mandated to focus on providing financial opportunities to any other group. FCS lends money to eligible agricultural producers primarily through its 69 lending associations (FCS associations), which are funded by its four banks (FCS banks). All are cooperatives, meaning that FCS borrowers have ownership and control over the organizations. As of 2017, FCS had approximately $259 billion in loans outstanding, of which 46 percent were long-term real estate-based loans; 20 percent were short- and intermediate-term loans (such as for farm equipment or advance purchases of production inputs); and 16 percent were for agribusiness activities, such as agricultural processing and marketing. FCS associations are not evaluated under the Community Reinvestment Act, which requires certain federal banking regulators to assess whether financial institutions they supervise are meeting the credit needs of the local communities. FCS receives certain tax exemptions at the federal, state, and local level. Little data exists on the credit needs of tribes and their members. One measure of unmet credit needs is the difference between the amount applied for and the amount received. However, we could not determine the amount of agricultural credit that Indian tribes and their members applied for or received. These data were limited in part because federal regulations historically have prohibited lenders from asking about the race of applicants for nonresidential loans, including agricultural loans. Additionally, even if data were available, the unmet need could be greater than that indicated by information on those who may have applied for and did not receive credit. Four tribal stakeholders and experts told us that tribal members may choose not to apply for agricultural credit because they were directly discouraged by loan officers, had problems completing paperwork, or had heard of other tribal members being denied loans. Two tribal agricultural experts told us that on some level, the agricultural credit needs of Indian tribes and their members are the same as other agricultural producers’ credit needs. In particular, tribal stakeholders and experts told us that the tribal members need short-term loans for operating expenses and intermediate-term loans for equipment. One difference between the agricultural credit needs of tribal members and other producers is that tribal members may have a greater unmet need for long-term loans, which are typically secured by real estate, because of difficulties in using tribal lands as collateral, as discussed later in this report. Credit needs vary based on the type of operation or borrower. Type of operation. Some tribal stakeholders we interviewed told us that members of their tribes were more likely to participate in ranching than farming, partly because farming has higher start-up costs. For example, one tribal agricultural expert told us a rancher can start with a few head of cattle and grow the herd over time, but a beginning farmer may need to purchase equipment. Additionally, several tribal stakeholders told us that land on their reservations was more suitable for ranching than farming. Type of borrower. Some tribes have agricultural businesses, which have credit needs different from those of individual tribal members, according to experts and BIA officials we interviewed. For example, they may be greater or more complex. According to an expert and a tribal stakeholder, established agricultural businesses likely would be able to receive credit from commercial lenders because they have more resources to pledge as collateral or stronger credit histories. Additionally, if a tribe has other profitable businesses, it likely will have less difficulty obtaining credit or financing agriculture with those other resources than those without such resources. According to tribal stakeholders, experts, and BIA officials we interviewed, tribal members who obtain agricultural credit likely receive it from USDA’s Farm Service Agency, other USDA programs, or Native CDFIs. Some tribal members receive agricultural credit from local private lenders, but they are typically larger, more established borrowers. One expert told us that tribal members who are smaller or beginning agricultural producers and cannot access commercial banks instead may borrow money from family members. A 2017 report found that Native business owners were less likely than other business owners to obtain start-up capital from banks. Some experts we interviewed cited Native CDFIs as growing providers of agricultural credit to tribal members. A 2014 survey of 41 Native CDFIs— credit unions, community banks, and loan funds—found more than 40 percent provided credit and training to farmers and ranchers. In total, these CDFIs made almost $6 million in agricultural loans annually. However, Native CDFIs are limited in how much agricultural credit they can provide. In the 2014 survey, 56 percent of the Native CDFIs that made agricultural loans reported not having enough capital for such loans, with a total unmet need of at least $3 million in the previous year. One Native CDFI we interviewed said its agricultural loans averaged about $100,000 per borrower, and another said its operating loans were about $50,000–$75,000 and its intermediate-term loans about $100,000. Selected literature we reviewed and interviews with some tribal stakeholders found that tribes have a growing interest in agriculture, motivated by concerns over tribal members’ access to food, health, and employment opportunities. Food access. A 2014 USDA study found that about 26 percent of individuals in tribal areas lived within 1 mile of a supermarket, compared to about 59 percent of all Americans. Health. According to the Centers for Disease Control and Prevention, American Indians and Alaska Natives have higher rates of obesity and diabetes than white Americans. Employment. A 2014 Interior report found that, on average, only about 50 percent of Native American adults in tribal statistical areas were employed either full or part-time. Two commissioned reports on tribal agriculture say that Indian tribes’ vast land base represents an untapped opportunity for tribes to increase agricultural production, including growing their own healthful foods and economic development. But, as previously discussed, for reservations featured in USDA’s 2012 Census of Agriculture, non-Indian producers received a large share of the agricultural revenue. Additionally, the agricultural products grown on tribal lands typically do not feed tribal members and instead are sold into the general agriculture commodity system. Furthermore, these reports and experts we interviewed noted that the growth of agriculture on tribal lands could require access to credit. For example, one tribal agriculture expert told us some tribes are interested in transitioning to “value-added” agriculture, which aims to help the community that produces raw agricultural materials capture the value of the products as they progress through the food supply chain (for example, by processing crops they grow or transitioning to more profitable products, such as organic). Value-added agriculture initiatives might require building facilities or acquiring more expensive inputs, and tribes likely would need financing to support these initiatives. According to some experts and a study we reviewed, if tribes and their members cannot access affordable credit, it could limit the growth of these initiatives. Tribes and their members face several barriers to obtaining agricultural credit, including land tenure issues, administrative challenges, lenders’ legal concerns, and loan readiness issues. As a result, there is limited commercial lending on tribal lands. Ten tribal stakeholders and experts we interviewed cited difficulties in using tribal lands as collateral as a barrier to obtaining credit because of federal laws or other constraints. Tribal trust and restricted fee lands. Federal law generally prohibits lenders from obtaining an ownership interest in tribal trust and restricted fee lands. As a result, tribes are not able to use their 46 million acres of tribal trust or restricted fee lands as collateral for a loan. However, tribes can lease such lands to other parties, including a tribal business or tribal member who wishes to use the land for agricultural purposes (lessees). These lessees can then pledge their “leasehold interest” in the lands as collateral for a loan, but may face challenges in doing so. For example, in general, leases of tribal trust and restricted fee lands must be approved by BIA and comply with its leasing regulations, which stipulate that agricultural leases generally have a maximum term of 10 years. While BIA generally allows leased tribal trust and restricted fee lands to be subject to a leasehold mortgage, three tribal stakeholders and experts we interviewed said that BIA’s maximum term for agricultural leases often was insufficient for obtaining an agricultural loan. Individual trust and restricted fee lands. Unlike tribal trust and restricted fee lands, the owners of individual trust and restricted fee lands can use these lands as collateral for a loan with permission of the Secretary of the Interior. However, many tracts of individual trust and restricted fee lands are allotments with fractionated ownership. According to nine tribal stakeholders and experts we interviewed, fractionated land is a barrier to agricultural activity and obtaining credit. Fractionated land occurs when an allottee dies without a will and ownership is divided among all the heirs, but the land is not physically divided. Thus, multiple owners (in some cases thousands) can have an ownership interest in the land and may have different ideas about how the land should be used. Interior estimated that out of the 92,000 fractionated tracts (representing more than 10 million acres), more than half generated no income in 2006–2011. For agricultural leases and leasehold mortgages on fractionated lands, BIA regulations require consent from owners of a majority interest in such lands. However, according to Interior, some allotments have thousands of co-owners, some of whose whereabouts are unknown, which could make it difficult to obtain their permission for an agricultural lease or a leasehold mortgage. Additionally, as a result of allotment, many Indian reservations contain different land ownership types, creating a “checkerboard” pattern of lands that can make the establishment and financing of large-scale agricultural projects difficult. For example, in addition to tribal and individual trust and restricted fee lands, reservations also may include lands that passed out of trust during the allotment period and were bought by non-Indians. Thus, multiple tracts within a large-scale agricultural project may need to be leased and financed separately because they have different owners and may be subject to different laws. This can also make legal jurisdiction unclear, which is a concern for private lenders financing projects on such lands, as discussed below. Experts and tribal stakeholders we interviewed reported that the barriers to collateralizing various types of tribal lands make it difficult for tribes and tribal members to access different types of agricultural loans. Most long- term loans—typically used for larger projects—generally need to be secured by real estate, which make these inaccessible to tribes and tribal members who do not have land that can be encumbered. For example, an Indian agricultural producer who operates on trust land and wants to build an agricultural facility for a value-added operation may not be able to obtain a long-term loan unless he or she has other unrestricted land to pledge as collateral. In addition, according to the former Executive Director of the Intertribal Agriculture Council, when most agricultural producers face economic distress, they can pledge land as security and receive an extended period of time (20–40 years) to pay off the debt. Tribal members may not have that option, making it difficult to obtain credit in an emergency (such as adverse weather). In addition, according to a tribal agriculture expert and three tribal stakeholders, tribal trust land is not counted as an asset on balance sheets, which may affect an agricultural lender’s assessment of a borrower’s creditworthiness for various types of loans. Processes at Interior—particularly at BIA—can increase the amount of time it takes to obtain a loan, which can discourage both lenders and borrowers, according to tribal stakeholders and experts. Most of the tribal stakeholders and experts we interviewed told us that tribal members often encounter delays when seeking necessary documentation from BIA. For example, for loans involving trust or restricted fee lands, BIA needs to provide a title status report to the lender that identifies the type of land ownership and current owners. Two tribal stakeholders told us that BIA takes months to produce a certified title status report. By that time, the growing season could be over. A representative from a Native CDFI serving a tribe in the Great Plains said it can take years to receive these reports. BIA reported that in fiscal year 2017, it certified 95 percent of land titles within 48 hours. However, BIA’s performance on this measure has varied considerably over the last several years, and BIA officials told us that it can take significantly longer to process title status reports for complicated cases. Tribal members also can encounter administrative challenges at other points in the process. One Native CDFI representative told us she found out that BIA did not record a leasehold mortgage when the CDFI attempted to foreclose on the loan, which almost prevented the CDFI from recovering the loan collateral. In other cases, Interior’s Appraisal and Valuation Services Office might need to conduct an appraisal, such as for an agricultural lease. According to Interior policy, these appraisals should be completed within 60 days, but one tribal economic development expert said they routinely take much longer. As a result of the unique legal status of tribes, some lenders, including FCS associations, reported concerns about their ability to recover loan collateral if the borrower defaulted on a loan involving tribal lands. Seven of the 11 FCS associations we contacted told us that they had legal concerns of this nature, and six of the associations said they had experienced the issues themselves. These concerns primarily arise from the following issues: Tribal sovereign immunity. Tribes are distinct, independent political communities with certain inherent powers of self-government and, as a result of this sovereignty, have immunity from lawsuits. A lender cannot sue to enforce the terms of a loan agreement with a tribe unless the tribe waives its sovereign immunity in connection with the agreement. Private lenders therefore might be hesitant to make a loan because they would not be able to sue the tribe if any disputes arose. We previously reported that tribes may waive sovereign immunity in agreements or contracts on a case-by-case basis and some tribes have formed separate companies to conduct business that are not immune from lawsuits. However, tribal government officials may decide that waiving the tribe’s sovereign immunity for purposes of enforcing the loan agreement is not in the tribe’s best interest. Additionally, tribal sovereign immunity would not bar lenders from seeking to foreclose on loans made to individual tribal members. Legal jurisdiction. Loans made to Indian tribes or their members and secured by tribal lands or collateral located on tribal lands may be subject to tribal laws, rather than state laws. In addition, it is sometimes unclear whether federal, state, or tribal courts would have jurisdiction in the event of a default or foreclosure. If tribal laws govern but do not adequately provide for the lender’s foreclosure, or if there is not a legal forum to hear the foreclosure lawsuit, lenders may be unable to recover the loan collateral. To address these types of concerns, some tribes have adopted secured transaction codes modeled after the Uniform Commercial Code, which can help to assure lenders of their ability to recover collateral in the event of default. Unfamiliarity with tribal laws. Laws and court systems vary among the nation’s 573 tribes, making it more difficult and costly for lenders to learn tribal laws. For example, one FCS association noted that it has many federally recognized tribes in its region, each of which may have different laws. If lenders have concerns regarding their ability to recover loan collateral in the event of a default, lenders may not make loans involving tribal lands due to concerns that the loan would not meet safety and soundness requirements. Five tribal stakeholders we interviewed said some tribal members may need assistance—such as credit repair and technical assistance for loan applications—to become ready for agricultural loans. Some tribal members have no credit history, which can be a barrier to obtaining a loan. One study found that compared to off-reservation counterparts, reservation residents were more likely to have no credit history and when credit scores were available, they were lower on average. Many Native CDFIs provide credit builder or credit repair products to help tribal members qualify for larger loans, such as small business loans. Four tribal stakeholders we interviewed said members of their tribes sometimes need technical assistance to complete the paperwork required for agricultural loans, such as a business plan. One tribal member who owns a ranch told us that the first time he tried to apply for a loan, he had trouble completing the required paperwork and ultimately chose not to apply. He felt tribal members seeking credit would benefit from assistance in completing loan applications. One Native CDFI representative told us that her organization provides technical assistance to its borrowers to help them complete loan paperwork but noted that commercial lenders often did not provide these services. We and others have noted that the barriers described above have depressed commercial lending on tribal lands. In 2010, we found that banks were reluctant to do business on tribal lands because of the cumbersome procedures and their lack of experience. More recently, a report for the Department of Housing and Urban Development surveying lenders found that BIA processing times were a major challenge in making mortgage loans involving tribal lands. A Native CDFI representative told us that lenders have little incentive to engage in a lengthy underwriting process, particularly if the loan is for a small amount and if other potential borrowers have less complicated circumstances. Some experts have described tribal lands as “credit deserts.” For example, one study of three different areas of tribal lands found that few financial institutions or automated teller machines were located on these reservations. One Native CDFI representative told us that in her experience, many people on her reservation never had a bank account. She noted that when people do not have a bank account, it can be challenging for them to see themselves as potential borrowers. Similarly, our analysis found that the land tenure issues, administrative process delays, lenders’ legal concerns, and loan readiness issues can make agricultural loans involving tribal lands more time-consuming and costly to underwrite. For example, one FCS association told us that loans involving tribal lands require specialized legal analysis, which may be an additional expense that it would not incur for otherwise comparable loans. These same issues can increase a lender’s exposure to the risks inherent in agricultural lending because they can affect the borrower’s ability to repay the loan, the adequacy of the collateral to secure the loan, and the lender’s ability to recover the collateral in the event of a default. According to FCA, consistent with the purposes of the Farm Credit Act of 1971, the ability of a lender to collect loans is an important element of the institution’s safety and soundness, and the continued availability of credit. Finally, some stakeholders said they believe that discrimination also contributes to the lack of commercial lending on tribal lands. Four experts, a tribal stakeholder, and a BIA representative told us that they believe that some commercial lenders do not want to make loans involving tribal lands because of bias. As previously discussed, the plaintiffs in the Keepseagle case that USDA settled for $760 million alleged that USDA discriminated against Native American farmers and ranchers in certain programs. According to a tribal economic development expert, tribal members who face discrimination or other negative experiences with commercial lenders may share these experiences with other tribal members and deter them from applying for credit. We found that FCS generally has authority to make loans involving tribal lands. Of the 11 FCS associations we contacted with tribal lands in their territories, some reported that they had recently made loans to Indian tribes or their members, and their outreach to these populations included support for agricultural education. Generally, FCS has authority to provide a broad range of credit services to eligible agricultural producers, which may include tribes, tribal businesses, and individual tribal members operating on various types of tribal lands. However, borrowers must meet various eligibility and underwriting criteria that are required by law. For example, applicants for agricultural loans must be determined to be eligible borrowers, which means they must own agricultural land or be engaged in the production of agricultural products, including aquatic products. Also, long-term real estate loans (which have terms of up to 40 years) made by FCS institutions must be secured by a first-position lien on interests in real estate, thus enabling FCS to obtain ownership or control of the land in the event of default. FCA has determined that this statutory requirement can be satisfied, for example, with leasehold interests in real estate—such as that held by a tribal member leasing reservation land from a tribe—provided that the lease grants the borrower significant rights to the land, and the loan is made on a safe and sound basis. As noted earlier, BIA regulations often limit agricultural leases of tribal lands to a term of up to 10 years. In such cases, FCS associations similarly may limit the term of the related loan (to less than 10 years). According to FCA, when loans are for shorter terms than the leases, the FCS association’s first lien is preserved, as required by law, and the loan is prudent from a safety and soundness perspective. FCA has not issued written guidance indicating whether interests in other types of tribal lands—such as individual trust or restricted fee lands—also satisfy the requirement for a first-position lien on interests in real estate. However, FCA has the authority to determine what types of interests in real estate will satisfy this requirement. Also, according to FCA, there is no statutory requirement that short- and intermediate-term loans be secured with interests in real estate; such loans instead can be secured by other collateral, such as equipment, crops, livestock, and business revenues. In addition to making direct loans to agricultural producers, FCS has authority to lend to non-FCS institutions, such as commercial banks and credit unions, which in turn make agricultural loans to FCS-eligible borrowers. These other financing institutions are known as OFIs. According to FCA, the OFI lending authority allows FCS banks to fulfill their mission as a government-sponsored enterprise by enhancing the liquidity of OFIs, thereby lowering the cost of agricultural credit. As noted earlier, FCS is required to establish programs to serve young, beginning, and small farmers and ranchers, but it is not statutorily mandated to focus on providing financial opportunities to any other group of eligible agricultural producers. Notwithstanding the authorities described above, FCS must comply with other applicable laws and requirements. For example, FCS institutions are subject to safety and soundness oversight by FCA, including with respect to loan underwriting. FCS institutions also must comply with applicable federal, state, and tribal laws governing any tribal lands or property thereon used as loan collateral. FCS associations may obtain Farm Service Agency guarantees on loans to borrowers who otherwise may not meet FCS underwriting requirements. However, by law, loans made by FCS associations are not eligible for a similar BIA loan guarantee program. Based on information from selected FCS associations located near tribal lands, some FCS associations have lent to Indian tribes or their members in the last 2 years. Of the 11 FCS associations we contacted with tribal lands in their territories, representatives of eight told us they had loaned to tribes or their members in the last 2 years—primarily to individual tribal members. We made the following observations based on the associations’ responses: Limited data on lending amounts. Representatives of 10 of the 11 FCS associations we queried stated that they either do not collect or do not maintain data on lending to specific racial populations, thus making it difficult to provide more detailed information on lending to Indian tribes and their members. However, four representatives provided estimates of their recent lending to this population on tribal lands. One association cited more than $25 million in total loans outstanding to a small number of tribes and tribal entities. Another association reported making about $5.5 million in new loans to tribes or their members on tribal lands in the last 2 years. A third reported a $3 million revolving line of credit to a family farm, and the fourth said it had made approximately $150,000 in five separate loans to two tribal members. Loan purposes. Seven associations reported on the type of credit they extended to Indian tribes and their members on tribal lands. In general, they made short-term operating loans and short- and intermediate-term loans for the purchase or refinance of items such as machinery and equipment, livestock, vehicles, or buildings and improvements. Two associations also reported making long-term real estate loans. The other association that reported lending to tribes or their members did not report on the types of loans it made. Type of collateral. Representatives of the eight associations that reported lending to tribes or their members all indicated that the associations secured loans with personal property, such as crops, livestock, or equipment. In addition, the associations that reported making real estate loans said they secured the loans with fee-simple land. Representatives of three FCS associations said they had not loaned to Indian tribes in the past 2 years. One association had not received any credit applications from tribal members, and another could not say if it had served tribal members because of a lack of racial data on borrowers. The third association had not provided loans to tribal members in the past 2 years, but the representative stated that it provided several letters of credit to guarantee the payments of BIA leases on tribal land. Although the FCS associations we contacted stated they have the resources to lend to tribes and their members on tribal lands, a few key factors affect their lending decisions. Representatives of all 11 FCS associations stated their associations had adequate financial capacity and resources to make potentially more complicated or time-consuming loans, such as those involving tribal lands. In general, they stated that the factors they consider in deciding whether to loan to Indian tribes or their members on tribal lands are the same as for any comparable loan—for example, creditworthiness, loan purpose, and the ability to secure a lien on collateral. However, as described earlier, some FCS association representatives described challenges related to tribal law, jurisdiction, tribal sovereign immunity, and recovery of collateral as complicating the lending process to Indian tribes and their members on tribal lands. Although three of the 11 FCS associations we queried reported making loans to tribes that had waived their sovereign immunity for those contracts, most loans the associations reported were to individual tribal members and secured by personal property or fee-simple land. According to two tribal stakeholders we interviewed, Indian tribes or tribal members who received loans from FCS or other commercial lenders may have larger agricultural operations, a longer credit history, and property that can be more easily used as collateral. For example, an established rancher may be able to secure operating loans with his or her cattle herd or interests in fee-simple land, thus preventing the need to rely on trust land as collateral. At the national level, FCS—through its trade association, the Farm Credit Council—conducts and facilitates outreach to tribes and tribal stakeholder groups. According to a representative of the Farm Credit Council, the Council and representatives of associations with tribal lands in their territories participate in an informal FCS working group focused on outreach and lending on tribal lands. One association representative described the group as sharing examples of lending success or reasons for missed opportunities; local, regional or national sponsorship opportunities; local or regional agricultural education events; and relevant legal proceedings, such as the Keepseagle settlement. At the institution level, FCS associations must prepare annual marketing plans describing, among other things, how they will be responsive to the credit needs of all eligible and creditworthy agricultural producers in their respective territories, with a focus on diversity and inclusion. The marketing plan must detail strategies and actions to market their products and services to potential borrowers who may not have been considered previously for reasons other than eligibility or creditworthiness. However, FCS associations are not required to achieve specific outcomes or quantifiable results. Our nongeneralizable review of the marketing plans of the 11 selected FCS associations with tribal lands in their territories and our analysis of their written responses to our queries for additional information found that outreach to tribes and their members focused on educational and charitable initiatives and direct marketing about agricultural lending, or did not directly target tribal populations. Seven of the 11 associations discussed actual or planned outreach to Indian tribes or their members in their marketing plans or written responses. Four of those seven associations cited financial support of specific agricultural education activities for tribes and their members. Two associations reported making charitable donations that benefited tribal members. Four of the seven associations reported direct marketing to potential tribal borrowers. However, in one case, the marketing was a one-time conversation with a tribe regarding financing for a new facility. The other three associations reported that they called potential Indian borrowers, sought referrals from existing tribal member customers, or conducted meetings with tribal government officials. In general, the four remaining associations, in their marketing plans and written responses, addressed outreach to minority producers through broader methods, such as participation in ethnic group organizations or through inclusion in the association’s overall outreach and marketing efforts. In addition, five of the 11 associations discussed outreach to minority producers in conjunction with their statutorily-mandated outreach to young, beginning, and small farmers. According to FCA officials, FCA’s guidance on providing credit to young, beginning, and small farmers, as well as to local food producers, would be broadly applicable to socially disadvantaged or minority populations that fall within the program definitions. Most of the tribal stakeholders with whom we spoke either were not familiar with FCS or did not know of the tribe or any of its members receiving FCS loans. One Native CDFI representative noted that although he was not familiar with any members of his tribe receiving FCS loans, he thought other nearby tribes or their members had worked with FCS. FCA also encouraged FCS associations to develop underwriting procedures to facilitate lending on Indian reservations. FCA identified one FCS association that developed such procedures, and another one of the associations we queried noted that they had such procedures. The first association provided an overview of its procedures, which identified links to information on borrower and collateral eligibility and actions that require BIA approval, among other topics. According to representatives of the second association, its procedure manual directs loan officers to treat tribal members’ applications for loans secured by personal property the same as any other applications. In addition, they said the manual contains instructions for working with BIA for real estate loans to tribal members on trust land and for making direct loans to tribes. Our review of literature and interviews with experts, tribal stakeholders, FCS associations, Farm Credit Council representatives, and FCA officials identified the following options for improving access to agricultural credit on tribal lands. Partnerships with local lenders. Tribal economic development experts and tribal stakeholders cited the importance of commercial or government lenders partnering with Native CDFIs and other Indian- owned lenders, which are the most capable of navigating the challenges related to Indian agricultural credit. According to these experts and stakeholders, if larger commercial or government lenders worked with Native CDFIs or other tribal lenders (such as tribal banks or economic development corporations) to provide funds or conduct outreach, the tribal organizations could more efficiently reach Indian tribes and their members. They noted these organizations are familiar with tribal members and the administrative processes for obtaining loans on tribal land. Partnership with tribal lenders and other tribal businesses also could support tribes’ efforts to improve members’ loan readiness, according to literature we reviewed and a tribal economic development expert and a Native CDFI representative we interviewed. Commercial and government lenders may need to clarify whether tribal lenders with which they might partner meet their lending requirements. For example, although FCS banks have authority to lend to OFIs, which in turn can lend to FCS-eligible borrowers, only certain types of CDFIs may qualify as OFIs. In addition, this authority does not extend to long-term funding, and thus cannot be used to fund agricultural real estate loans made by OFIs. One FCS bank that commented on a 2004 FCA rule noted the latter statutory limitation as a major impediment to OFI program expansion. Flexibility with collateral requirements. As noted earlier, multiple stakeholders we interviewed discussed the challenges related to collateralizing trust land. In addition, FCA officials cited the need for a statutory change or clarification of the requirement that long-term loans made by FCS be secured by a first lien on interests in real estate. They said that by removing or clarifying this requirement, lenders would have authority to provide larger, longer-term loans to creditworthy tribes or tribal members who cannot mortgage their tribal lands. Guarantees. Some stakeholders we interviewed mentioned loan guarantees as an option to improve access to agricultural credit on tribal lands. For instance, FCA officials and Farm Credit Council representatives told us they had spoken with leadership of the Native American Agriculture Fund (created as part of the Keepseagle settlement) regarding the potential establishment of a loan guarantee fund, such as a first-loss fund, which would step in to purchase a loan in default (thus substantially reducing credit risk to the lender). In addition, three of the 11 FCS associations we queried identified guarantees as a possible way to increase FCS lending to Indian tribes and their members on tribal lands. FCS associations still face challenges in using guarantees. With regard to the first-loss loan guarantee fund, FCS associations still must adhere to the FCS statutory requirement for a first-position lien on interests in real estate for long-term loans. According to an FCA official, although the first-loss loan guarantee fund could mitigate repayment risk, a statutory change or clarification would be necessary for FCS associations to accept guarantees in lieu of real estate for long-term loans. And as noted earlier, FCS loans are statutorily ineligible for BIA’s loan guarantee program. Two FCS associations noted that removal of this restriction could increase FCS lending on tribal lands. Finally, FCA officials stated that challenges FCS associations face in making loans involving tribal lands also can extend to Farm Service Agency guarantees on those loans. In other words, to obtain such guarantees, FCS associations must navigate issues around land tenure, legal jurisdiction, and tribal laws. Tribal options. In addition, stakeholders discussed the following tribal actions that could increase credit access for tribes and their members: Representatives of two FCS associations noted that waivers of sovereign immunity (limited to specific contracts) by tribes may increase lending involving tribal lands, as it helps to enable lenders to enforce the terms of loans made to tribes. According to the Office of the Comptroller of the Currency, some banks have negotiated limited waivers of sovereign immunity (restricted to a specific transaction). As noted earlier, tribes may decide that waiving sovereign immunity is not in their best interest. In addition to the limited waivers of sovereign immunity, representatives of three FCS institutions stated that increased adoption of uniform commercial laws (such as the Uniform Commercial Code) by tribes could increase lending involving tribal lands. One tribal economic development expert told us that tribes that adopted their own leasing regulations under the HEARTH Act have seen substantially increased economic development. As noted earlier, the HEARTH Act provides tribes with greater flexibility to enter into leases for agriculture or other purposes. Once a tribe’s leasing regulations have been approved by the Secretary of the Interior, tribes may negotiate and enter into agricultural leases with 25-year terms without further approval by the Secretary. The combination of longer lease terms and the ability to conduct business outside of the BIA approval process can expedite the process of obtaining a leasehold mortgage on tribal trust and restricted fee land. As of May 1, 2019, the Secretary had approved agricultural leasing regulations for seven tribes under the HEARTH Act. We provided a draft of this report to FCA, Interior, and USDA for review and comment. FCA and USDA provided technical comments, which we incorporated as appropriate. In comments provided in an email, Interior officials noted that efforts to simplify the Secretary of the Interior’s approval process could provide faster mortgage determinations and thus may result in expanded lending and production opportunities for Indian agricultural producers. We are sending copies of this report to the appropriate congressional committees, the Chairman and Chief Executive Officer of the Farm Credit Administration, the Secretary of the Interior, and the Secretary of Agriculture. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Our objectives in the report were to describe (1) what is known about the agricultural credit needs of Indian tribes and their members on tribal lands, (2) the barriers stakeholders and experts identified that Indian tribes and their members on tribal lands face in obtaining agricultural credit to meet their needs, (3) the Farm Credit System’s (FCS) lending authority and lending and outreach activities on tribal land, and (4) suggestions stakeholders have discussed to improve access to agricultural credit on tribal lands. For the purpose of this report, we use the term “tribal lands” to refer to reservations (including all land within the reservations’ boundaries), trust land, allotments, and restricted fee land. In general, our report focuses on the agricultural credit needs of tribes and their members in the lower 48 states. To describe what is known about the agricultural credit needs of Indian tribes and their members on tribal lands, we explored various potential data sources on agricultural loans that Indian tribes and their members applied for or received. We reviewed available data from the Consumer Financial Protection Bureau and Department of Agriculture (USDA). For example, we obtained borrower-reported loan data from USDA’s Agricultural Resource Management Survey, but for several data fields related to Indian producers on tribal lands, sample sizes were too small or the coefficients of variation were too high to produce reliable estimates. We also reviewed provisions of the Equal Credit Opportunity Act, federal regulations, and other legal documentation pertaining to collection of data regarding the personal characteristics of applicants for nonresidential loans. To describe what is known about Indian tribes and their members’ agricultural credit needs and the barriers they face in obtaining agricultural credit, we conducted a literature review. We conducted searches of various databases, such as EBSCO, ProQuest, Google Scholar, and Westlaw to identify sources such as peer-reviewed academic studies; law review articles; trade and industry articles; reports from government agencies, nonprofits, and think tanks; and Congressional transcripts related to tribal agriculture, barriers to accessing credit on tribal lands, and FCS. We identified additional materials through citations in literature we reviewed. In addition, we reviewed statutes and the Department of the Interior’s Bureau of Indian Affairs’ (BIA) regulations related to use and ownership of tribal lands, including leasing. To describe FCS’s authority and lending and outreach activities on tribal lands, we reviewed statutes and regulations governing FCS, as well as written guidance issued by the Farm Credit Administration (FCA). We also reviewed the marketing plans of a nongeneralizable sample of 11 FCS associations (16 percent of the 69 FCS associations that lend directly to agricultural producers) whose territories included large tribal land areas with high levels of agricultural activity, including the tribes we interviewed (described below). We selected an additional FCS association but on closer review realized it did not have a significant amount of tribal land in its territory; we therefore excluded this association from our analysis. For comparison purposes, we also reviewed three marketing plans from FCS associations that did not have significant tribal populations in their territories. In addition to reviewing the marketing plans, we sent the 11 FCS associations a questionnaire about their lending and outreach to tribes and their members and any challenges in making loans involving tribal lands. We also asked these associations about any suggestions to improve access to agricultural credit on tribal lands. We received responses from all 11 FCS associations, and followed up with some associations to clarify information they provided. While the sample allowed us to learn about many important aspects of FCS associations’ lending and outreach to tribes and their members on tribal lands, it was designed to provide anecdotal information, not findings that would be representative of all of 69 FCS lending associations. To address all four objectives, we attempted to interview representatives of six tribes. First, we selected these tribes to represent five regions (Great Plains, Rocky Mountain, Northwest, Southwest) and a state (Oklahoma) that—according to experts we interviewed—have tribes engaged in agricultural activity. Within these regions, we generally selected large tribal land areas that have high levels of agricultural activity, as indicated by the USDA 2012 Census of Agriculture data. Specifically, we selected tribes based on number of farms, land in farms, and market value of agricultural products. In addition, we selected one of the six tribes because two experts recommended that we speak with them. For the six tribes, we contacted tribal government leaders and employees of the relevant government offices, such as the agriculture or tribal lands departments. For two of the six tribes, we interviewed employees of the tribal agriculture department. One of these interviews also included representatives of the Native Community Development Financial Institution (Native CDFI) that serves the reservation. For the third tribe, we received written responses from a tribal farm. For the fourth tribe, we interviewed a representative of the Native CDFI that serves the reservation. For this series of interviews, we only received information relating to four tribes. We did not obtain meetings with relevant tribal government officials for the last two tribes. We also contacted farms or Native CDFIs associated with an additional three tribes based on USDA data or recommendations from experts we interviewed. For one of these tribes, we interviewed a tribal farm employee and a representative of the tribe’s community development corporation. For the second tribe, we interviewed a tribal farm employee. For the third tribe, we interviewed a representative of the Native CDFI that serves the reservation. In summary, we interviewed employees of two tribal agriculture departments, employees of three tribal farms, and representatives of three Native CDFIs and one tribal community development corporation. Throughout this report, we refer to tribal government employees, tribal farm employees, or representatives of Native CDFIs or community development corporations serving a tribe as “tribal stakeholders.” Although the information we obtained from the tribal agriculture employees allowed us to provide anecdotal tribal perspectives, it is not generalizable to the 573 federally recognized Indian tribes. In addition, the views of tribal farm employees and Native CDFI and community development corporation representatives cannot be generalized to tribes but illustrate views on needs, barriers, and other issues from the perspectives of the organizations. In addition, for all four objectives, we interviewed the following: Experts on agricultural and economic development on tribal lands. We interviewed subject matter experts on tribal agriculture and economic development from various organizations, including advocacy and academia. Specifically, we interviewed representatives of the following organizations: the Center for Indian Country Development at the Federal Reserve Bank of Minneapolis, First Nations Oweesta Corporation, the Indian Land Tenure Foundation, the Indigenous Food and Agriculture Initiative at the University of Arkansas, the Intertribal Agriculture Council, and the Native American Agriculture Fund. We selected these organizations based on relevant publications, testimonies before Congress, or recommendations from other experts. These organizations work with a number of tribes and thus could speak to general trends or commonalities in tribal agriculture and economic development. Throughout the report, we refer to the representatives of these organizations as “experts.” Agency and trade group representatives. We interviewed officials from FCA, USDA (including the Farm Service Agency, Economic Research Service, and National Agricultural Statistics Service), and BIA. We also interviewed representatives of the Farm Credit Council, the national trade association for the Farm Credit System. We conducted this performance audit from December 2018 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Karen Tremba (Assistant Director), Lisa Reynolds (Analyst in Charge), Miranda Berry, Tom Cook, Anne-Marie Fennell, John Karikari, Marc Molino, Kirsten Noethen, Barbara Roesmann, Jeanette Soares, and Farrah Stone made significant contributions to this report.", "summary": "About 46 million of the 56 million acres of the land that the federal government holds in trust for the benefit of Indian tribes and their members has an agricultural purpose. However, tribal agriculture and economic development experts have noted that Indian tribes and their members may need improved access to agricultural credit. Congress included a provision in statute for GAO to review the ability of FCS to meet the agricultural credit needs of Indian tribes and their members on tribal lands. This report describes (1) what is known about the agricultural credit needs of Indian tribes and their members, (2) barriers stakeholders identified to agricultural credit on tribal lands, (3) FCS authority and actions to meet those agricultural credit needs, and (4) stakeholder suggestions for improving Indians' access to agricultural credit on tribal lands. GAO explored potential data sources on Indians' agricultural credit needs, conducted a literature review, and reviewed statutes and regulations governing tribal lands and FCS. GAO also reviewed the marketing plans and written responses of a nongeneralizable sample of 11 FCS associations whose territories included tribal lands with high levels of agricultural activity. GAO interviewed stakeholders from a sample of seven tribes (generally selected based on tribal region and agricultural activity), experts in tribal agriculture and economic development (selected based on relevant publications, Congressional testimonies, and others' recommendations), and representatives from FCS and its regulator, the Farm Credit Administration, and other relevant government agencies. Limited data are available on the needs of Indian tribes and their members for agricultural credit, such as operating or equipment loans, to develop and expand agricultural businesses on tribal lands. Federal regulations have generally prohibited lenders from inquiring about the personal characteristics, such as race, of applicants on nonresidential loans. Some tribal stakeholders and experts said that tribal members may not have applied for agricultural credit because they heard of other tribal members being denied loans. They said that tribal members likely obtain agricultural credit from Department of Agriculture programs or tribal lenders. Another potential source of agricultural credit is the Farm Credit System (FCS), a government-sponsored enterprise that includes 69 associations that lend to farmers and ranchers. Tribal stakeholders and experts reported a general lack of commercial credit on tribal lands due to the following factors: Land use restrictions. Most tribal lands only can be used as loan collateral in certain circumstances or with federal permission. Administrative process delays. Tribal members reported often encountering delays obtaining necessary federal loan documents. Legal challenges. Lenders reported concerns about their ability to recover loan collateral due to the unique legal status of tribes. Loan readiness. Tribal members may have no or poor credit histories and be unfamiliar with the paperwork required for an agricultural loan, such as a business plan. FCS is authorized to provide a range of credit services to eligible agricultural producers, which may include Indian tribes, tribal businesses, and tribal members. FCS associations must obtain land as collateral for long-term real estate loans, but are not required to do so for shorter-term loans, such as for operating costs or equipment purchases. Some FCS associations GAO contacted reported making loans to Indian tribes or their members. In a sample of 11 FCS associations with tribal lands in their territory, eight said they have loaned to tribes or their members in the past 2 years. GAO's review of these 11 associations' marketing plans and written responses to GAO follow-up questions found that seven noted outreach—such as support for agricultural education activities—targeted to tribes and their members. The other four reported broad and general outreach efforts that also included minority groups. To improve access to agricultural credit on tribal lands, stakeholders discussed several options. For example, some stakeholders discussed the potential for partnerships between commercial or government lenders and tribal lenders (such as Native Community Development Financial Institutions) and increased use of loan guarantees. Some stakeholders also discussed actions tribes could take to ease barriers to lending, such as adopting their own leasing procedures to reduce administrative processing time with federal agencies for certain loans.", "document_type": "gao"}
{"report": "OMB provides guidance to federal managers on how to improve accountability and effectiveness of federal programs and operations by identifying and managing risks. OMB updated its Circular No. A-123 in July 2016 to establish management’s responsibilities for ERM. As part of the overall governance process, ERM calls for the consideration of a risk across the entire organization and how it may interact with other identified risks. When used appropriately, ERM is a decision-making tool that allows agency leadership to view risks across an organization and helps management understand an organization’s portfolio of top risk exposures, which could affect achievement of the agency’s goals and objectives. In December 2016, we issued a report that provided an overall framework for agencies to build an effective ERM program. In July 2016, OMB also updated Circular No. A-11, Preparation, Submission, and Execution of the Budget. In Circular No. A-11, OMB referred agencies to Circular No. A-123 for requirements related to ERM implementation, including for developing a risk profile as a component of the agency’s annual strategic review. A risk profile is a prioritized inventory of the most significant risks identified and assessed through the risk assessment process. It considers risks from a portfolio perspective, identifies sources of uncertainty that are both positive (opportunities) and negative (threats), and facilitates the review and regular monitoring of risks. Together, these two OMB circulars constitute the ERM policy framework for executive agencies by integrating and operationalizing specific ERM activities and helping to modernize existing risk management efforts. Standards for Internal Control in the Federal Government describes internal control as a process put in place by an entity’s oversight body, management, and other personnel that provides reasonable assurance that objectives related to performing operations effectively and efficiently, producing reliable internal and external reports, and complying with applicable laws and regulations will be achieved. Internal control serves as the first line of defense in safeguarding assets. Its importance to federal agencies is further reflected in permanent requirements enacted into law. The internal control processes required by FMFIA and the Standards for Internal Control in the Federal Government help to form an integrated governance structure designed to improve mission delivery, reduce costs, and focus corrective actions toward key risks. OMB Circular No. A-123 precludes agencies from concluding that their internal control is effective if there are one or more material weaknesses identified from its assessment. As a component of DOD, the Air Force is required to (1) identify and manage risks, (2) establish and operate an effective system of internal control, (3) assess and correct control deficiencies, and (4) report on the effectiveness of internal control through an annual Statement of Assurance. In addition, the Chief Financial Officers Act of 1990 (CFO Act), as amended by the Government Management Reform Act of 1994 and implemented by guidance in OMB Bulletin No. 19-03, Audit Requirements for Federal Financial Statements (August 27, 2019), requires the Air Force to annually undergo a financial statement audit. However, since 1990, the Air Force has continued to be unable to demonstrate basic internal control that would allow it to pass a financial statement audit, which has contributed to DOD’s financial management remaining on the GAO High-Risk List since 1995. For fiscal year 2018, the Air Force reported 11 material weaknesses in internal control over operations and 14 material weaknesses in internal control over reporting in its Statement of Assurance. For fiscal year 2019, it reported the same number of operations-related material weaknesses, and its reporting-related material weaknesses increased to 25. During the Air Force’s fiscal years 2018 and 2019 financial statement audits, independent auditors specifically considered the Air Force’s internal control over financial reporting in order to determine appropriate audit procedures to perform in order to express an opinion on the financial statements. The independent auditors disclaimed an opinion on the Air Force’s fiscal years 2018 and 2019 financial statements, stating that the Air Force continued to have unresolved accounting issues, and for each year, the auditors reported 23 material weaknesses in internal control over financial reporting. These material weaknesses included control deficiencies in processes related to the Air Force’s mission-critical assets and involved a lack of policies and procedures, inadequate financial information systems and reporting, and inaccurate and incomplete information in its accountability records and financial reports. The Air Force’s efforts to implement ERM are in the early stages, and accordingly, it has not fully incorporated ERM into its management practices. Since the July 2016 update to OMB Circular No. A-123 required agencies to implement ERM, the Air Force has been leveraging and relying on its existing risk management practices. To date, these practices have focused on the organizational unit level and not at the entity level, as required by OMB Circular No. A-123. The Air Force plans to integrate ERM increasingly into its management practices over the next several years, with expectations of a fully developed ERM approach after fiscal year 2023. The Air Force has taken the initial steps to establish an ERM governance structure, define risk classifications, and develop its ERM framework. For instance, the Air Force has drafted charters updating responsibilities for two senior management advisory councils—(1) the Enterprise Productivity Improvement Council (EPIC) and (2) the Executive Steering Committee (ESC)—to implement OMB Circular No. A-123. EPIC will oversee the agency’s risk management function, with a specific emphasis on overseeing the regular assessment of risk and approving risk responses and the Air Force’s risk profile. ESC will lead the implementation, assessment, and documentation of risk management over financial reporting, financial systems, all associated activities, and oversight with respect to the Air Force’s internal control program. EPIC is designed to focus exclusively on potential operational material weaknesses, and ESC will focus on potential financial reporting and financial systems material weaknesses. Air Force officials informed us that both councils would share responsibility for compliance objectives and resulting material weaknesses. During our audit, we analyzed the Air Force’s financial reports beginning with those for fiscal year 1999 and noted that the agency and the external auditors have generally reported material weaknesses each year involving the tracking, reporting, location, accountability, and cost of certain mission-critical assets. These weaknesses identified risks that decreased the Air Force’s ability to perform operations efficiently, prepare reliable financial reports, and comply with applicable laws and regulations. EPIC and ESC currently assess proposed material weaknesses that the primary reporting elements (PRE) submit and determine whether to recommend them to the Secretary of the Air Force for reporting in the annual Statement of Assurance. However, the Air Force’s governance structure does not include a mechanism for EPIC or ESC to oversee the management of risk associated with material weaknesses and consider its effect across the entire agency. Based on our review of the draft charters and documentation from governance meetings, the Air Force included provisions for ESC to identify material weaknesses related to financial reporting and financial systems and EPIC to identify material weaknesses related to operations objectives. However, there were no charter provisions for either council to identify, assess, respond to, and report on the risks associated with those material weaknesses or material weaknesses identified through external audits. A material weakness, reported by either the agency or an external auditor, by definition indicates a significant decrease in an agency’s ability, during the normal course of operations, to achieve objectives and address related risks. Under OMB Circular No. A-123, an agency’s risk management governance structure helps ensure that the agency identifies risks that have the most significant effect on the mission outcomes of the agency. Without a thorough and integrated ERM governance structure that includes oversight responsibilities managing risks associated with material weaknesses in internal control, there is an increased risk that the Air Force will not properly identify, assess, and respond to significant entity-level risks. The Air Force’s current internal control assessment process is not designed to facilitate the timely identification and correction of internal control deficiencies or to be used to support the Air Force’s annual Statement of Assurance. Specifically, Air Force management has not designed an adequate process for assessing internal control. Further, the process does not focus on areas with the greatest risk, such as mission- critical assets. In addition, the reviews of mission-critical assets in fiscal years 2018 and 2019 in support of the financial statement audit did not result in adequate assessments of internal control. The Air Force’s policy for assessing the effectiveness of its internal control system and for preparing the agency’s annual Statement of Assurance is based on DOD Instruction 5010.40, Managers’ Internal Control Program Procedures, dated May 2013. The Air Force’s policy is outlined in Air Force Policy Directive 65-2, Managers Internal Control Program. This policy is supported by the procedures outlined in Air Force Instruction (AFI) 65-201, Managers Internal Control Program Procedures, dated February 2016, which the Air Force currently is revising to address the July 2016 OMB Circular No. A-123 update. The Air Force provides additional guidance to supplement AFI 65-201 in its Statement of Assurance Handbook and its Internal Control Playbook. The Air Force’s OMB Circular No. A-123 program comprises 17 designated PREs, including the Secretariat and Air Force staff offices, major commands, the Army and Air Force Exchange Service, and direct- reporting units. The Air Force subdivides each PRE along organizational lines into more than 6,500 organizational assessable units (organizational units), such as a squadron or wing, and other specific programs and functions, where it evaluates internal controls per AFI 65-201. Each of the organizational units has an assessable unit manager (unit manager) who has authority over the unit’s internal control, including continual monitoring, testing, and improvement. Figure 1 illustrates how the Air Force’s organizational structure informs its overall annual Statement of Assurance. The Air Force requires each unit manager to submit an annual supporting statement of assurance providing the manager’s opinion on whether the unit has reasonable assurance that its internal controls are effective. The units submit the statements to the Assistant Secretary of the Air Force, Financial Management and Comptroller (SAF/FM), the office responsible for OMB Circular No. A-123 implementation and compilation of the annual Statement of Assurance. Based on discussions with Air Force officials, SAF/FM uses the unit managers’ supporting statements of assurance to develop the overall Air Force annual Statement of Assurance. The Air Force’s internal control assessment process does not require (1) an assessment of all required elements of an effective internal control system; (2) test plans that specify the nature, scope, and timing of procedures to conduct; and (3) management validation of results. In addition, existing policies and procedures that staff follow to perform the assessments do not fully implement OMB Circular No. A-123. Further, the Air Force provided inadequate training to those responsible for conducting and concluding on the internal control assessments. Although not required by policy, the Air Force performed its first assessment of the five components of internal control during fiscal year 2019 through an SAF/FM review of entity-level controls, which are controls that have a pervasive effect on an entity’s internal control system and may pertain to multiple components. Based on this assessment, SAF/FM concluded in the Air Force’s Statement of Assurance for fiscal year 2019 that three components of internal control (i.e., risk assessment, control activities, and information and communication) were not designed, implemented, or operating effectively. Although SAF/FM performed this assessment in 2019, the assessment did not include a determination of whether each internal control principle was designed, implemented, and operating effectively. Also, there was no indication that the Air Force designed the assessment of entity-level controls to be pertinent to all Air Force objectives, such as those related to operations, reporting, or compliance. In addition, SAF/FM did not provide the assessment results to the unit managers for input or consideration in their unit-specific control assessments and supporting statements of assurance. The Air Force’s Internal Control Playbook directs unit managers to assess the design and operating effectiveness of the relevant entity-level controls within their purview. However, for fiscal year 2019, SAF/FM performed this assessment, and officials informed us that it was not their intent for unit managers to assess entity-level controls. According to OMB Circular No. A-123, management must summarize its determination of whether each of the five components and 17 principles from Standards for Internal Control in the Federal Government are designed, implemented, and operating effectively and components are operating together in an integrated manner. The determination must be a “yes/no” response. If one or more of the five components are not designed, implemented, and operating effectively, or if they are not operating together in an integrated manner, then an internal control system is ineffective. AFI 65-201 states, as part of its discussion on assessing internal control over financial reporting, that OMB Circular No. A-123 prescribes a process to evaluate controls at the entity level for the five components of internal control (i.e., control environment, risk assessment, control activities, information and communication, and monitoring). The Air Force’s assessment lacked required determinations related to internal control principles because the Air Force lacked policies or procedures for the following: Clearly delineating who within the Air Force (e.g., unit managers or SAF/FM) is responsible for assessing the components and principles of internal control, how often assessments are performed, at what level (e.g., entity or transactional) components and principles are to be evaluated, what objectives are covered in the assessment of entity-level controls, to whom to communicate the results if the results are relevant to others performing assessments of internal control, and what Air Force guidance to follow. Documenting management’s summary, whether performed by the unit managers as outlined in the guidance or by SAF/FM as performed during fiscal year 2019, of its determination of whether each component and principle is designed, implemented, and operating effectively and whether components are operating together in an integrated manner. By not ensuring that management is assessing whether each internal control component and principle is designed, implemented, and operating effectively, the Air Force cannot determine whether internal control is effective at reducing the risk of not achieving its stated mission and objectives to an acceptable level. Moreover, given the entity-wide relevance of SAF/FM’s conclusions, unit managers may not be aware of all the necessary information with which to draw conclusions about the effectiveness of their organizational units’ internal control. Further, management’s assurances on internal control effectiveness, as reported in the Statement of Assurance, may not appropriately represent the effectiveness of the Air Force’s internal control. The Air Force did not have a process in place to base its annual assessment of internal control and Statement of Assurance preparation on uniform testing performed across its agency. Although the Air Force had standard test plans for reviews associated with financial reporting objectives, SAF/FM could not demonstrate what procedures are performed to support its assessment of internal control over its operational, internal reporting, and compliance objectives. Specifically, for these objectives, the Air Force did not develop guidance for those responsible for assessing internal controls on which tests to conduct to obtain the best evidence of whether controls are designed, implemented, and operating effectively; how much testing is needed in each area; when to conduct the tests; how to ensure that current year conclusions are based on current year how assessment procedures are to be adjusted or amended to reflect a consideration of prior year self-identified control deficiencies and internal and external audit results. Additionally, standard test plans for the reviews conducted as part of the Air Force’s financial statement audit remediation efforts did not include guidance on how to consider prior year self-identified control deficiencies and internal and external audit results in determining the nature, timing, and extent of procedures to be conducted for the current year. Further, although the Air Force outlines 20 overall objectives in its 2019 through 2021 Business Operations Plan (dated January 2019), it did not document the specific procedures the Air Force planned and performed to support an evaluation of its internal control over these 20 objectives. According to Standards for Internal Control in the Federal Government, management should establish and operate activities to monitor the internal control system and evaluate the results and should remediate identified internal control deficiencies on a timely basis. For example, as part of its monitoring activities, agency management responsible for the OMB Circular No. A-123 program could design a test plan or establish a baseline to monitor the current state of the internal control system and compare that baseline to the results of its internal control tests. The Air Force’s assessment of internal control and Statement of Assurance are not clearly supported by completed test plans or other documented monitoring activities because SAF/FM does not have a policy or procedures for conducting internal control assessments that require documented test plans that (1) tie back to specific objectives included in the Business Operations Plan; (2) specify the nature, scope, and timing of procedures to conduct under the OMB Circular No. A-123 assessment process; and (3) reflect a consideration of prior year self- identified control deficiencies and results of other internal and external audits. By not ensuring that its more than 6,500 unit managers are evaluating internal control based on the agency’s established baseline, the Air Force cannot ensure that it is consistently and effectively assessing its internal control in order to timely identify and correct deficiencies or that its design of internal control reduces, to an acceptable level, the risk of not achieving agency operational, reporting, and compliance objectives. As a result, Air Force management’s assurances on internal control, as reported in the overall agency Statement of Assurance, may not appropriately represent its internal control effectiveness. Air Force management did not have a process to validate whether its unit managers appropriately performed and documented their internal control assessments. During our review, Air Force management was uncertain about how many internal control assessments were being performed or by whom. SAF/FM officials initially stated that there were 5,567 organizational units responsible for assessing internal control, but officials later informed us that the actual number was more than 6,500. Furthermore, Air Force officials were unable to provide information on how many organizational unit managers failed to report on their specific internal control assessments or received waivers from performing such assessments. Finally, management lacked a process to ensure that results used to compile the current year Statement of Assurance are based upon current fiscal year assessments. The Air Force requires unit managers to assess internal control and submit results to SAF/FM through the automated statement of assurance submission system. SAF/FM then compiles the supporting statements of assurance submissions and prepares the Air Force’s annual Statement of Assurance. However, we found that the automated system that collects the annual assessments from more than 6,500 unit managers allows these managers to import internal control testing activities from the prior fiscal year. Air Force officials were unable to provide information about how they ensure that unit managers were not importing prior year results without performing current year testing. OMB Circular No. A-123 requires documentation to demonstrate and support conclusions about the design, implementation, and operating effectiveness of an entity’s internal control system, and requires agencies to consider carefully whether systemic weaknesses exist that adversely affect internal control across organizational or program lines. The Air Force’s process lacks management validation of results because it has not developed a documented policy or procedures to ensure that management can readily review and validate the results of its internal control testing. The Air Force has not required SAF/FM to validate (1) the number of organizational units reporting for its overall internal control assessment; (2) how it tested control procedures, what results it achieved, and how it derived conclusions from those results; and (3) whether it based the results used to compile the current year Statement of Assurance on current fiscal year assessments. Additionally, when PRE management waives assessments, SAF/FM does not have a process to track waivers and assess how they affect the current year assessment of internal control, determination of systemic weaknesses, and compilation of the Air Force’s overall Statement of Assurance. By not validating the internal control assessment results, Air Force management cannot ensure that the assessment was performed as expected to support related conclusions and timely identify internal control deficiencies. Further, management’s assurance on internal control, as reported in the overall Statement of Assurance, may not appropriately represent the internal control effectiveness. Air Force guidance for its assessment of internal control neither accurately nor completely reflects definitions included in OMB Circular No. A-123. For example, AFI 65-201 and the Statement of Assurance Handbook provided to unit managers for conducting internal control assessments, and the Internal Control Playbook that the Air Force developed in August 2019 to address internal control over reporting objectives, do not include the complete definitions of the four material weakness categories for deficiencies related to (1) operations, (2) reporting, (3) external financial reporting, and (4) compliance objectives, consistent with guidance in OMB Circular No. A-123. Additionally, the handbook does not define internal control as a process that provides reasonable assurance that objectives will be achieved or an internal control system as a continuous built-in component of operations, affected by people, that provides reasonable assurance that an entity’s objectives will be achieved. Although the playbook does adequately define internal control and a system of internal control, the Air Force developed this guidance after we initiated our review, and the guidance only addresses internal control over reporting objectives and not operational and compliance objectives. These inaccuracies and incomplete descriptions occurred because the Air Force did not provide its internal control assessment guidance preparers or reviewers with training to assist them in writing and reviewing the guidance to ensure proper application of the fundamental concepts of internal control and OMB Circular No. A-123, such as those related to definitions of internal control and material weakness. By not ensuring that Air Force guidance reflects accurate and complete definitions included in OMB Circular No. A-123, the Air Force is at increased risk that its officials performing internal control assessments will not properly conclude on the results; therefore, management’s assurances on internal control, as reported in the Statement of Assurance, may not appropriately represent the effectiveness of internal control. Among other things, OMB Circular No. A-123 requires staff to identify objectives, assess related risks, document internal controls, evaluate the design of controls, conduct appropriate tests of the operating effectiveness of controls, report on the results of these tests, and appropriately document the assessment procedures. However, the Air Force’s training provided to unit managers responsible for assessing internal control lacks sufficient instructions on how to perform such assessments. Specifically, the current annual training provided by SAF/FM lacks instruction on how to prepare documentation to adequately support conclusions, identify and test the key internal controls, and evaluate and document test results; limits discussion of OMB Circular No. A-123 internal control assessments to internal control over external financial reporting objectives and does not cover internal control over operational, compliance, and internal reporting objectives; lacks adequate definitions of material weaknesses included in OMB Circular No. A-123; lacks instruction on how to interpret, respond to, and correct self- identified deficiencies (control deficiencies, significant deficiencies, and material weaknesses); and is not required for individuals performing reviews related to external financial reporting. SAF/FM officials informed us that the definitions of material weakness and instructions on how to interpret, respond to, and correct deficiencies were included in other guidance documents, such as the newly created Internal Control Playbook. However, the Air Force did not provide the playbook to PREs during the fiscal year 2019 training, and it is not officially named as guidance in the Air Force’s policy for assessments of internal control. Although the Air Force has described the playbook as supplemental guidance, it does not refer to the playbook as such in its policy for assessing the effectiveness of its system of internal control to provide reasonable assurance that operational, reporting, and compliance objectives are achieved. These inadequacies occurred because SAF/FM has not fully evaluated and incorporated the requirements for assessing an internal control system into its training and has not designed training that (1) enhances skills in evaluating an internal control system and documenting the results; (2) reflects all OMB Circular No. A-123 requirements, such as those related to assessing controls for all objectives and determining material weaknesses; and (3) is provided to all who are responsible for performing internal control assessments. According to federal internal control standards, management should demonstrate a commitment to developing competent individuals. For example, management could provide training for employees to develop skills and competencies needed for key roles and responsibilities in assessing internal control. Without appropriate training, those responsible for assessing internal control may not do so adequately enough to identify internal control deficiencies timely and support the agency’s internal control assessments with appropriate documentation and summarization of the results. OMB Circular No. A-123 requires an agency to evaluate whether a system of internal control reduces the risk of not achieving the entity’s objectives using a risk-based assessment approach. However, the Air Force’s current AFI 65-201 approach calls for assessing internal control at more than 6,500 organizational units without regard to quantitative or qualitative risks. As previously discussed, the Air Force lacks procedures to verify whether its unit managers are performing internal control assessments as intended and does not provide guidance for uniform testing across the organization. Therefore, the Air Force’s current approach for assessing internal control does not ensure that areas of greatest risk are addressed, such as mission-critical assets, and instead may unnecessarily focus on areas of lower risk. As a result, the Air Force may not be using resources efficiently. The Air Force’s current design of assessing internal control does not ensure, at a minimum, the evaluation of internal control over areas key to meeting its mission. Specifically, the Air Force does not have a policy requiring evaluation of whether its internal control over processes related to areas of highest risk—such as processes related to mission-critical assets, including equipment, government-furnished equipment, and weapons-system spare parts managed and held by contractors and working capital fund inventory—reduces the risk of not achieving specific operation, reporting, or compliance objectives to an acceptable level. The Acting Secretary of Defense, during fiscal year 2019, emphasized two of these areas—government property in the possession of contractors, which includes government-furnished equipment, and working capital fund inventory—as high priority for corrective actions related to financial statement audit remediation. The Air Force’s current approach for assessing internal control calls for more than 6,500 organizational units to perform assessments without regard to risk because the Air Force has not developed a policy or procedures providing guidance on how to perform the assessment using a risk-based approach. A risk-based approach provides a methodology for Air Force management to focus and prioritize its internal control assessments on areas and activities of greater risk and importance to accomplishing mission and strategic objectives. By not evaluating internal control with a risk-based approach, Air Force management lacks the assurance that resources are used efficiently to assess key controls associated with achieving Air Force objectives subject to the highest risks along with those designated as high priority by agency management, such as controls over accounting for, managing, and reporting on mission-critical assets. Although the Air Force has not designed a process for performing OMB Circular No. A-123 internal control assessments based on risk, it did review certain business process assessable units, such as mission-critical assets, as part of its financial statement audit remediation efforts. However, Air Force’s reviews of internal control over processes related to mission-critical assets did not meet OMB Circular No. A-123 requirements or federal internal control standards for evaluating a system of internal control. During fiscal years 2018 and 2019, the Air Force engaged the Air Force Audit Agency (AFAA) to review control activities for five processes related to mission-critical assets and instructed business process assessable unit leads to conduct additional internal control reviews for select mission-critical asset areas during fiscal year 2019. However, the organizational unit managers did not formally consider the results of these reviews when concluding on their assessments of internal control. For fiscal year 2018, AFAA performed certain agreed-upon procedures to confirm current transactional processes and related internal control over external financial reporting for five mission-critical asset areas as documented in the related business process cycle memorandums. In order to perform the procedures, AFAA used SAF/FM-prepared templates to confirm certain processes and key controls included in the respective process cycle memorandums. However, the procedures SAF/FM instructed AFAA to perform in 2018 did not meet the requirements of an assessment of an internal control system as prescribed in OMB Circular No. A-123. Specifically: Procedures to test design of controls did not include steps for evaluating whether the controls individually or in combination with other controls would achieve objectives or address related risks. Instead, SAF/FM instructed AFAA to confirm whether the process cycle memorandums accurately reflected the controls and processes in place. Procedures to test operating effectiveness of controls were conducted even though there was no determination of whether the controls were designed to achieve objectives or address related risks. Procedures performed involved the use of process cycle memorandums as a baseline, which, as noted by the Air Force’s auditor, did not always reflect the current process, and there was no process in place for management to assess whether the differences related to an inaccurate cycle memorandum or improper implementation of the process. For fiscal year 2019, tests continued to (1) address operating effectiveness without first determining if the controls were designed to meet objectives and reduce risks and (2) involve the use of process cycle memorandums as a baseline that did not always reflect the current business process. For fiscal year 2019, business process assessable unit leads conducted the additional internal control reviews for select processes related to mission-critical assets based on the templates for tests of design and tests of operating effectiveness in Internal Control Playbook appendixes. Similar to the procedures developed for AFAA, the Air Force did not devise the fiscal year 2019 playbook’s template procedures to support conclusions on the design, implementation, and operating effectiveness of internal control over processes that are key to achieving Air Force operational, internal reporting, and compliance objectives. For example, the procedures that the Air Force used to assess the design of internal control over a process related to spare engines at one air base only considered controls related to external financial reporting objectives. The Air Force did not provide evidence that it tested additional controls key to achieving internal reporting, operating, and compliance objectives, such as improving and strengthening business operations and harnessing the power of data for timely decision-making and mission success, or evidence that the Air Force would test such controls during future reviews. Additionally, the Air Force lacked a process for the organizational unit managers or PREs to consider the results of internal control reviews performed at the business process assessable unit level in assessing internal control when they assess and report on the status of internal control for the overall Air Force Statement of Assurance (see fig. 2). Specifically, the current and draft AFI 65-201 and Statement of Assurance Handbook do not include procedures for how information gathered from AFAA agreed-upon procedures or business process unit leads’ testing of internal control over processes related to mission-critical assets is considered in the conclusions reported through the organizational unit managers’ supporting statements of assurance. OMB Circular No. A-123 requires that management, in accordance with federal standards for internal control, evaluate whether a system of internal control reduces the risk of not achieving the entity’s objectives related to operations, reporting, or compliance to an acceptable level. According to the federal internal control standards, when evaluating the design of internal control, management determines if controls individually and in combination with other controls are capable of achieving an objective and addressing related risks. A control cannot be effectively operating if it was not properly designed and implemented. Further, management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. For example, once established, management can use the baseline, or current state of the internal control system, as criteria in evaluating the internal control system and make changes to reduce the difference between the criteria (what is expected) and condition (what Air Force staff did do instead of what was expected). Also, per OMB Circular No. A-123, an agency may document its assessment of internal control using a variety of information sources, such as management reviews conducted expressly for the purpose of assessing internal control (e.g., AFAA agreed-upon procedures and Internal Control Playbook procedures). Air Force reviews of internal control over processes related to mission- critical assets were inadequate because SAF/FM did not include in the agreed-upon procedures or the Internal Control Playbook tests of design to determine if controls individually and in combination with other controls are capable of achieving an objective and addressing related risks, tests of implementation and operating effectiveness only after a favorable assessment of the design of control, and a baseline that has accurate descriptions of business processes and identifies key internal controls as designed by management to respond to risks. Further, SAF/FM did not document its approach for using results from the AFAA agreed-upon procedures in assessing the Air Force’s internal control over processes related to mission-critical assets because the Air Force did not provide guidance establishing the process and reporting lines of all the sources of information that it considered in preparing its overall Statement of Assurance. Also, SAF/FM did not have a documented process for integrating the results of internal control reviews performed at the business process assessable unit level into the organizational units’ assessment of internal control. Moreover, Air Force did not have guidance describing how often, through which conduit, or when the results from the business process internal control reviews were to be provided to relevant organizational units, or how this information would affect conclusions made in a unit’s respective assurance statement. By not comprehensively evaluating internal control over processes related to mission-critical assets, the Air Force is at increased risk that it may not timely identify internal control deficiencies and may lack reasonable assurance over the effectiveness of internal control over processes accounting for mission-critical assets. In addition, without performing internal control assessments in accordance with requirements or having a formal process to consider the results of the AFAA agreed-upon procedures and the Internal Control Playbook procedures in the organizational unit managers’ assessment process, the Air Force increases the risk that its assessment of internal control and related Statement of Assurance may not appropriately represent the effectiveness of internal control. Air Force senior leaders work to achieve complex and inherently risky objectives across the agency, while managing over $230 billion in mission-critical assets available to carry out its mission. To reduce the risk of not achieving its objectives or efficiently managing its resources, the Air Force needs to implement an ERM capability that is integrated with an effective system of internal control, as outlined in OMB Circular No. A-123 and federal standards for internal control. Although the Air Force has been working to improve its risk management and internal control practices, including remediation of deficiencies in its internal control over financial reporting related to mission-critical assets, it still faces significant challenges. For example, the agency continues to have difficulties with tracking and reporting, with reasonable accuracy, financial information about its mission-critical assets that directly affect its ability to efficiently support the warfighter, achieve its objectives, and accomplish its mission through reliable, useful, and readily available information. Without an effective ERM governance structure, there is an increased risk that the Air Force will not properly identify, assess, and respond to significant entity-level risks. In addition, by not comprehensively implementing and evaluating its internal control system, the Air Force cannot ensure that it is timely identifying and correcting internal control deficiencies or effectively reducing, to an acceptable level, the risk of not achieving its objectives. Further, Air Force management’s assurances on internal control, as reported in the overall agency Statement of Assurance, may not appropriately represent its internal control effectiveness. We are making the following 12 recommendations to the Air Force: The Secretary of the Air Force should develop and implement procedures for an ERM governance structure that includes oversight responsibilities for identifying, assessing, responding to, and reporting on the risks associated with agency material weaknesses from all relevant sources. These procedures should clearly demonstrate that risks associated with material weaknesses are considered by Air Force governance, as a whole, and are mitigated appropriately to achieve goals and objectives. (Recommendation 1) The Secretary of the Air Force should develop policies or procedures for assessing internal control to require (1) clearly delineating who within the Air Force is responsible for evaluating the internal control components and principles, how often they are to perform the evaluation, the level (e.g., entity or transactional) of the evaluation, what objectives are covered in the assessment, to whom to communicate the results if they are relevant to others performing assessments of internal control, and what guidance to follow; (2) documenting management’s determination of whether each component and principle is designed, implemented, and operating effectively; and (3) documenting management’s determination of whether components are operating together in an integrated manner. (Recommendation 2) The Secretary of the Air Force should develop policies or procedures for assessing internal control to require the use of test plans that (1) tie back to specific objectives to be achieved as included in the Business Operations Plan; (2) specify the nature, scope, and timing of procedures to conduct under the OMB Circular No. A-123 assessment process; and (3) reflect a consideration of prior year self-identified control deficiencies and results of internal and external audits. (Recommendation 3) The Secretary of the Air Force should develop policies or procedures for assessing internal control to require SAF/FM to validate (1) the number of organizational units reporting for its overall internal control assessment; (2) how control procedures were tested, what results were achieved, and how conclusions were derived from those results; and (3) whether the results used to compile the current year report are based on current fiscal year’s assessments. (Recommendation 4) The Secretary of the Air Force should develop policies or procedures for assessing internal control to require SAF/FM to assess how waivers affect the current year assessment of internal control, the determination of systemic weaknesses, and the compilation of the Air Force’s overall Statement of Assurance. (Recommendation 5) The Secretary of the Air Force should require that developers of the policy and related guidance associated with designing the procedures for conducting OMB Circular No. A-123 assessments receive recurring training and are appropriately skilled in conducting internal control assessments and are familiar with Standards for Internal Control in the Federal Government. (Recommendation 6) The Secretary of the Air Force should analyze all definitions included in Air Force ERM and internal control assessment policy and related guidance to ensure that all definitions and concepts are defined correctly. (Recommendation 7) The Secretary of the Air Force should require SAF/FM to design recurring training for those who will assess internal control that (1) includes enhancing their skills in evaluating the internal control system and documenting results; (2) reflects all OMB Circular No. A-123 requirements, such as those related to identifying objectives, evaluating deficiencies, and determining material weaknesses; and (3) is provided to all who are responsible for performing internal control assessments. (Recommendation 8) The Secretary of the Air Force should develop policy or procedures consistent with OMB Circular No. A-123 to assess the system of internal control using a risk-based approach. (Recommendation 9) The Secretary of the Air Force should develop procedures to assess internal control over processes related to mission-critical assets, including (1) tests of design that evaluate whether controls are capable of achieving objectives, (2) tests of effectiveness only after a favorable assessment of the design of the control, and (3) a baseline that has accurate descriptions of business processes and identifies key internal controls as designed by management to respond to risks. (Recommendation 10) The Secretary of the Air Force should establish a process and reporting lines of all the sources of information, including reviews performed of internal control processes related to mission-critical assets, that will be considered in the Secretary’s Statement of Assurance. (Recommendation 11) The Secretary of the Air Force should develop procedures to require coordination between business process leads and the Air Force’s unit managers to ensure that mission-critical asset–related internal control deficiencies are considered in the unit managers’ assessments of internal control and related supporting statements of assurance. These procedures should include how, when, and with what frequency the results from the business process internal control reviews should be provided to relevant organizational units for consideration in their respective assurance statements. (Recommendation 12) We provided a draft of this report to the Air Force for review and comment. In written comments, the Air Force concurred with all 12 of our recommendations and cited actions to address them. Air Force’s comments are reproduced in appendix I. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense (Comptroller)/Chief Financial Officer, the Secretary of the Air Force, the Assistant Secretary of the Air Force (Financial Management and Comptroller), and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2989 or kociolekk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, John Sawyer (Assistant Director), Russell Brown, Anthony Clark, Oliver Culley, Eric Essig, Patrick Frey, Jason Kelly, Aaron Ruiz, and Vanessa Taja made key contributions to this report.", "summary": "OMB Circular No. A-123 requires agencies to provide an annual assurance statement that represents the agency head's informed judgment as to the overall adequacy and effectiveness of internal controls related to operations, reporting, and compliance objectives. Although the Air Force is required annually to assess and report on its control effectiveness and to correct known deficiencies, it has been unable to demonstrate basic internal control, as identified in previous audits, that would allow it to report, with reasonable assurance, the reliability of internal controls, including those designed to account for mission-critical assets. This report, developed in connection with fulfilling GAO's mandate to audit the U.S. government's consolidated financial statements, examines the extent to which the Air Force has incorporated ERM into its management practices and designed a process for assessing internal control, including processes related to mission-critical assets. GAO reviewed Air Force policies and procedures and interviewed Air Force officials on their process for fulfilling ERM and internal control assessments. The Air Force's efforts to implement Enterprise Risk Management (ERM) are in the early stages, and accordingly, it has not fully incorporated ERM into its management practices as outlined in Office of Management and Budget (OMB) Circular No. A-123. As a result, the Air Force is not fully managing its challenges and opportunities from an enterprise-wide view. Until it fully incorporates ERM—planned for some time after 2023—the Air Force will continue to leverage its current governance and reporting structures as well as its existing internal control reviews. The Air Force has not designed a comprehensive process for assessing internal control, including processes related to mission-critical assets. GAO found that existing policies and procedures that Air Force staff follow to perform internal control assessments do not accurately capture the requirements of OMB Circular No. A-123. For example, the Air Force does not require (1) an assessment of each internal control element; (2) test plans that specify the nature, scope, and timing of procedures to conduct; and (3) validation that the results of internal control tests are sufficiently clear and complete to explain how units tested control procedures, what results they achieved, and how they derived conclusions from those results. Also, Air Force guidance and training was not adequate for conducting internal control assessments. In addition, GAO found that the Air Force did not design its assessment of internal control to evaluate all key areas that are critical to meeting its mission objectives as part of its annual Statement of Assurance process. Furthermore, GAO found that procedures the Air Force used to review mission-critical assets did not (1) evaluate whether the control design would serve to achieve objectives or address risks; (2) test operating effectiveness after first determining if controls were adequately designed; (3) use process cycle memorandums that accurately reflected the current business process; and (4) evaluate controls it put in place to achieve operational, internal reporting, and compliance objectives. GAO also found that the results of reviews of mission-critical assets are not formally considered in the Air Force's assessment of internal control. Without performing internal control reviews in accordance with requirements, the Air Force increases the risk that its assessment of internal control and related Statement of Assurance may not appropriately represent the effectiveness of internal control, particularly over processes related to its mission-critical assets. GAO is making 12 recommendations to the Air Force, which include improving its risk management practices and internal control assessments. The Air Force agreed with all 12 recommendations and cited actions to address them.", "document_type": "gao"}
{"report": "IPIA requires executive branch agencies to take various steps regarding improper payments in accordance with guidance issued by OMB, including the following: 1. reviewing all programs and activities and identifying those that may be susceptible to significant improper payments; 2. developing improper payment estimates for those programs and activities that agency risk assessments, OMB, or statutes identify as being susceptible to significant improper payments; 3. analyzing the root causes of improper payments and developing corrective actions to reduce them; and 4. reporting on the results of addressing the foregoing requirements. Figure 1 illustrates these steps, as well as the major components of analyzing root causes of improper payments and developing corrective action plans to remediate them. IPIA requires agencies with programs susceptible to significant improper payments to report a description of the causes of the improper payments identified, actions that the agency has planned or taken to correct those causes, and the planned or actual completion dates of those actions. It also requires agencies to report program-specific improper payment reduction targets that OMB has approved. OMB M-18-20 provides guidance to agencies for implementing IPIA requirements, including their responsibilities for preventing and reducing improper payments. The guidance directs agencies that have developed estimates for improper payments to categorize them by root causes, including the percentage of the total estimate for each category. According to the guidance, this level of specificity helps lead to more effective corrective actions and more focused prevention strategies. Table 2 summarizes OMB’s root cause categories. OMB M-18-20 directs agencies with programs deemed susceptible to significant improper payments to implement a corrective action plan that responds to their root causes to prevent and reduce them. As such, OMB directs that an agency must understand the true root cause of its improper payments in order to develop targeted, effective corrective actions, which are proportional to the severity of the associated amount and rate of the root cause. OMB M-18-20 also directs agencies to annually measure the effectiveness and progress of individual corrective actions by assessing results, such as performance and outcomes. In performing such measurements, OMB states that agencies should determine if any existing corrective actions can be intensified or expanded to further reduce improper payments and to identify annual benchmarks for corrective actions that agencies implement over multiple years. Agencies may use these benchmarks to demonstrate progress in implementing the actions or their initial effect on preventing and reducing improper payments. The eight programs we reviewed serve a variety of purposes and are administered by various agencies across the federal government, as discussed below. The Department of Agriculture’s (USDA) Supplemental Nutrition Assistance Program (SNAP) is the largest federally funded nutrition assistance program, providing benefits to about 40 million people in fiscal year 2018. SNAP is intended to help low-income households obtain a more nutritious diet by providing them with benefits to purchase food from authorized retailers nationwide. SNAP recipients receive monthly benefits on an Electronic Benefit Transfer (EBT) card and redeem them for eligible food at authorized food stores. The Food and Nutrition Act of 2008 established SNAP as a federally funded, state-administered program. States, following federal guidelines, are responsible for program administration. States determine applicant eligibility, calculate benefit amounts, issue EBT cards to recipients, and investigate possible recipient program violations. USDA’s Food and Nutrition Service (FNS) pays the full cost of SNAP benefits and shares 50 percent of administrative costs with the states. As part of oversight responsibilities, FNS develops program regulations and monitors states to ensure that they comply with program rules. FNS is also directly responsible for authorizing and monitoring retail food stores where recipients may purchase food. In accordance with IPIA, USDA has annually reported an improper payment estimate for SNAP since fiscal year 2004. In its fiscal year 2019 AFR, USDA reported an improper payment estimate of approximately $4 billion, or 6.8 percent of SNAP outlays of $59.1 billion. The Department of Education’s (Education) William D. Ford Federal Direct Loan (Direct Loan) program authorizes Education to make loans, through participating schools, to eligible undergraduate and graduate students and their parents. The Direct Loan program comprises four types of loans: Subsidized Stafford, Unsubsidized Stafford, PLUS, and Consolidation loans. Evidence of financial necessity is required for an undergraduate student to receive a Subsidized Stafford loan; however, borrowers at all income levels are eligible for the other three types. Education originates the loans and disburses them through each borrower’s school. Once a loan is disbursed, Education assigns a servicer responsible for communicating with the borrower, providing information about repayment, and processing payments from the borrower. Education first reported an improper payment estimate for the Direct Loan program in fiscal year 2013. In its fiscal year 2019 AFR, Education reported an improper payment estimate of approximately $483 million, or 0.5 percent of Direct Loan program outlays of $92.9 billion. Education’s Pell Grant program—the single largest source of grant aid for postsecondary education—awards federally funded grants to low-income undergraduate and certain post-baccalaureate students who are enrolled in a degree or certificate program and have a federally defined financial need. Students are eligible to receive Pell Grants for no more than 12 semesters (or the equivalent). To qualify, an applicant must, in addition to satisfying other requirements, demonstrate financial need and not have obtained a bachelor’s degree or a first professional degree. Grant amounts depend on the student’s expected family contribution, the cost of attendance (as determined by the institution), the student’s enrollment status (full-time or part-time), and whether the student attends for a full academic year or less. Education first reported an improper payment estimate for the Pell Grant program in fiscal year 2004. In its fiscal year 2019 AFR, Education reported an improper payment estimate of approximately $646 million, or 2.2 percent of Pell Grant program outlays of $28.9 billion. The Department of Health and Human Services’ (HHS) Children’s Health Insurance Program (CHIP) expands health coverage to uninsured children who are ineligible for Medicaid but cannot afford private coverage. The states and the federal government jointly fund CHIP benefit payments and administrative expenses. HHS’s Centers for Medicare & Medicaid Services (CMS) oversees the program; however, each state administers the program and sets its own guidelines regarding eligibility and services according to federal guidelines. HHS first reported an improper payment estimate for CHIP (based on one-third of the states) in fiscal year 2008. In its fiscal year 2019 AFR, HHS reported an improper payment estimate of approximately $2.7 billion, or 15.8 percent of CHIP outlays of $17.3 billion. The Earned Income Tax Credit (EITC) administered by the Department of the Treasury (Treasury) is a credit that offsets taxes owed by eligible taxpayers, and because the credit is refundable, EITC recipients need not owe taxes to receive a benefit. If the taxpayer’s credit exceeds the amount of taxes due, the Internal Revenue Service (IRS) issues a refund of the excess to the taxpayer. To claim the EITC, the taxpayer must work and have earnings that do not exceed the phaseout income of the credit. Additional eligibility rules apply to any children that a taxpayer claims for calculating the credit. Among other criteria, a qualifying child must meet certain age, relationship, and residency requirements. Treasury first reported an improper payment estimate for EITC in fiscal year 2003. In its fiscal year 2019 AFR, Treasury reported an improper payment estimate of approximately $17.4 billion, or 25.3 percent of EITC outlays of $68.7 billion. Through its Prosthetic and Sensory Aids Service (PSAS), the Department of Veterans Affairs’ (VA) Veterans Health Administration (VHA) provides prosthetics to veterans who have experienced the loss or permanent impairment of a body part or function. The items VA provides include those worn by the veteran, such as an artificial limb or hearing aid; those that improve accessibility, such as ramps and vehicle modifications; and devices surgically placed in the veteran, such as hips and pacemakers. In general, veterans enrolled in the VA health care system with a medical need for a prosthetic service or item are eligible; however, additional eligibility criteria for certain services or items may apply. PSAS officials in VA’s central office provide overall administration of VA’s provision of prosthetic items, including allocating funding among various networks, monitoring spending, and establishing and monitoring mechanisms to evaluate the agency’s performance. PSAS processes prescriptions and provides the prescribed items to individual veterans. PSAS government credit card holders, typically at VA medical centers, perform administrative actions—such as obtaining additional information from the prescribing clinician, obtaining price quotes from contractors, and creating purchase orders—to process prescriptions. PSAS also has staff who provide clinical services to veterans, such as evaluating prosthetic needs and designing and fitting artificial limbs. VA first reported an improper payment estimate for PSAS in fiscal year 2017. In its fiscal year 2019 AFR, VA reported an improper payment estimate of approximately $60 million, or 2.1 percent of PSAS outlays of $2.9 billion. The Social Security Administration’s (SSA) Old Age, Survivors, and Disability Insurance program (OASDI), collectively referred to as Social Security, provides cash benefits to eligible U.S. citizens and residents. OASDI is financed largely on a pay-as-you-go basis. Specifically, OASDI payroll taxes, paid each year by current workers, are primarily used to pay benefits provided during that year to current beneficiaries. OASDI consists of two separate insurance programs that SSA administers under the Social Security Act. Old Age and Survivors Insurance (OASI) provides benefits to retired workers, their families, and survivors of deceased workers. The monthly benefit amount depends on a worker’s earnings history and the age at which he or she chooses to begin receiving benefits, along with other factors. Benefits are paid to workers who meet requirements for the time they have worked in covered employment—that is, jobs through which they have paid Social Security taxes. Disability Insurance (DI) provides cash benefits to working-age adults who are unable to work because of long-term disability. SSA generally considers individuals to have a disability if (1) they cannot perform work that they did before and cannot adjust to other work because of their medical condition(s) and (2) their disability has lasted or is expected to last at least 1 year or is expected to result in death. Further, individuals must have worked and paid into the program for a minimum period of time to qualify for benefits. To ensure that only beneficiaries who remain disabled continue to receive benefits, SSA is required to conduct periodic continuing disability reviews in certain circumstances. SSA first reported an improper payment estimate for OASDI in fiscal year 2004. In its fiscal year 2019 AFR, SSA reported an improper payment estimate of approximately $2.7 billion, or 0.3 percent of OASDI program outlays of $948 billion. SSA’s Supplemental Security Income (SSI) is a federal income supplement program funded by general tax revenues (not Social Security taxes). The program provides payments to low-income aged, blind, and disabled persons—both adults and children—who also meet financial eligibility requirements. For adults, a disability is defined as the inability to engage in any substantial gainful activity because of any medically determinable physical or mental impairment(s) that can be expected to result in death or has lasted or can be expected to last for a continuous period of not less than 12 months. To ensure that only recipients who remain disabled continue to receive benefits, SSA is required to conduct periodic continuing disability reviews in certain circumstances. To be eligible to receive monthly SSI payments, the adult individual’s (or married couple’s) or child’s (and parent’s) monthly countable income has to be less than the monthly federal SSI benefit amount. The amount of the monthly SSI payment is then determined based on the countable income. In most cases, countable income received in the current month affects the SSI payment amount 2 months later. Furthermore, countable resources—such as financial institution accounts—must not exceed the maximum allowable threshold. While recipients are required to report changes in their income and financial resources, SSA also conducts periodic redeterminations to verify that recipients are still eligible for SSI. SSA first reported an improper payment estimate for SSI in fiscal year 2004. In its fiscal year 2019 AFR, SSA reported an improper payment estimate of approximately $5.5 billion, or 9.7 percent of SSI program outlays of $56.9 billion. We found that five out of six agencies—USDA, Education, HHS, VA, and SSA—used the results of their improper payment estimation methodologies as the basis for identifying the root causes of improper payments for the selected programs we reviewed. Specifically, the agencies generally used a two-step process to identify root causes of improper payments. First, the agencies reviewed a sample of payments to identify which payments were improper and to establish an improper payment rate. Second, the agencies analyzed the improper payment results to determine the causes of error. Further details on each agency’s process are provided below. USDA: According to USDA’s fiscal year 2018 AFR, FNS used SNAP’s Quality Control System to identify improper payments and determine improper payment rates for fiscal year 2018. According to agency officials, SNAP improper payment root causes occur at the state level. According to agency officials, as required by the Food and Nutrition Act of 2008 and subsequent program regulations, FNS requires states to conduct root cause analyses and develop corrective action plans because of the unique circumstances in each state owing to flexibilities under statute and regulations. SNAP’s Quality Control system uses a two-tier approach to report improper payments. In the first tier, each month, state agencies follow federal sampling requirements to select samples of households that participated in SNAP in their states and conduct quality control reviews to determine whether each selected household was eligible and received the right amount of benefits. In the second tier of the process, Federal SNAP staff select a subsample of the state data for review to confirm the validity of the states’ findings. Federal SNAP staff use that subsample data to aggregate the root cause information at a nationwide level in order to categorize the data into the OMB root cause categories for fiscal year 2018 reporting. Education: According to Education’s fiscal year 2018 AFR, Education conducted a risk-based, nonstatistical sample and estimation methodology, which OMB approved, to estimate Pell Grant and Direct Loan improper payment rates for fiscal year 2018 reporting. As part of this estimation process, Education analyzed identified improper payments to determine improper payment root causes. HHS: According to HHS’s fiscal year 2018 AFR, HHS estimated the CHIP improper payment rate for fiscal year 2018 reporting through the Payment Error Rate Measurement (PERM) program. CHIP improper payment root causes were identified at both the agency and state levels. Specifically, to determine improper payment root causes at the agency level, HHS analyzed the issues identified during the PERM review and identified primary drivers of the national PERM rate for CHIP. HHS also provided improper payment results to each state and required them to conduct more in-depth state-level root cause analyses as part of developing their corrective action plans. VA: According to VA’s fiscal year 2018 AFR, VA conducted a statistical sample and estimation methodology to estimate the PSAS improper payment rate for fiscal year 2018 reporting. VA then analyzed the improper payments identified during testing to determine improper payment root causes. SSA: According to SSA’s fiscal year 2018 AFR, SSA conducts stewardship reviews each fiscal year to estimate the improper payment rates for OASDI and SSI. Although SSA considers the stewardship review data sufficient to provide statistically reliable data on the overall payment accuracy of OASDI and SSI, SSA considered deficiency data from the most recent 5 years of stewardship reviews to determine improper payment root causes for each program for its fiscal year 2018 reporting. Treasury identified the root causes of EITC improper payments for fiscal year 2018 reporting based on the most recent detailed 3-year EITC compliance study IRS conducted, using data from tax years 2006 through 2008. IRS officials acknowledged that using older data creates additional potential for error; however, they stated that IRS is only able to conduct in-depth compliance studies on major refundable income tax credits, including EITC, on a rotating basis. IRS also conducted in-depth EITC compliance studies for tax years 1997 and 1999. These studies and IRS’s 2006 through 2008 compliance study, identified income misreporting and qualifying child errors as the main sources of errors. Therefore, agency officials indicated that Treasury is comfortable with using the 2006 through 2008 data as the basis for determining the root causes of fiscal year 2018 EITC improper payments. However, Treasury has reported changes to the tax environment since 2008, including legislative revisions that may have affected taxpayer compliance behavior. Specifically, EITC-related changes include expanding the credit to a third child, establishing new criteria for claiming a qualifying child, and amending the “age test” for qualifying children, among others. Furthermore, the 2006 through 2008 compliance study did not take into account the Protecting Americans from Tax Hikes Act of 2015 program integrity provisions that required tax filers to provide Form W-2 payer information to IRS for verification earlier than in previous tax years. Federal internal control standards state that management should use quality information to achieve the entity’s objectives. As part of these standards, management obtains relevant data from reliable internal and external sources in a timely manner and uses quality information to make informed decisions and evaluate the entity’s performance in achieving objectives and addressing risks. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Although a specific delivery date has not been set, agency officials stated that IRS plans to conduct another in-depth EITC compliance analysis within the next 2 years. We agree with Treasury’s plan to conduct another EITC compliance analysis using more timely data. However, until Treasury conducts an EITC improper payment root cause analysis using more timely data, it will be uncertain whether identified root causes are sufficiently relevant to inform decisions and evaluate risks. Specifically, continued use of outdated information to evaluate EITC improper payments increases the risk that Treasury may not be identifying these payments’ true root causes and therefore will lack quality information needed to develop appropriate corrective actions and reduce them. Four out of six agencies—Education, HHS, VA, and SSA—developed corrective actions that correspond to identified root causes of improper payments for the selected programs we reviewed, in accordance with OMB guidance. Specifically, we found that Education and VA developed corrective actions corresponding to each root cause of improper payments identified for fiscal year 2018 in Education’s Direct Loan and Pell Grant programs and VA’s PSAS, respectively. In addition, HHS stated that it developed corrective actions that corresponded to the root causes it determined to be significant to CHIP improper payments for fiscal year 2018, prioritizing large dollar over smaller dollar value root cause categories. Corrective action plans for CHIP improper payments were developed at both the agency and state levels. According to agency officials, CMS helped individual states develop and implement state-specific PERM corrective action plans to address the errors identified in each state. In addition, because each state’s errors do not necessarily represent errors that are the main drivers of the national PERM rate, CMS developed agency-level corrective action plans focused on those drivers, which typically occurred across multiple states. We also found that SSA’s corrective actions corresponded to root causes of improper payments identified in OASDI and SSI for fiscal year 2018. However, SSA did not develop corrective actions corresponding to three of the six major root causes it identified for OASDI improper payments based on its stewardship review findings. Agency officials explained that SSA’s corrective action development process was decentralized among the different SSA components, and therefore, there was no formalized process for components to develop corrective actions for all identified root causes. SSA has since developed a new standardized improper payment strategy and updated procedures to implement the strategy for fiscal year 2020. Although the scope of our review focused on processes in place for fiscal year 2018, we found that the updated procedures, if effectively implemented, will address our concerns because they include control activities designed to help ensure that corrective actions that SSA develops and implements correspond to the identified root causes of improper payments, as directed by OMB guidance. Specifically, the updated procedures direct SSA components to identify root causes of improper payments and develop mitigation strategies for each; conduct cost-benefit analyses for such strategies; and after considering these analyses, determine and prioritize necessary corrective actions. In contrast to HHS, which developed both agency- and state-level corrective actions for its state-administered CHIP, USDA did not develop agency-level corrective actions corresponding to the root causes of SNAP improper payments. USDA’s IPIA corrective action plan guidance directs its components, including FNS, to develop corrective actions that correspond to the identified root causes of improper payments for programs that are susceptible to significant improper payments. Instead of developing agency-level SNAP corrective actions, FNS requires the states to develop state-level corrective actions. Additionally, FNS provided technical assistance and support to the individual states to help them improve payment accuracy. As part of this assistance, agency officials stated that FNS regional offices provided routine formal training and guidance to the states and conducted site visits. According to agency officials, FNS did not develop agency-level corrective actions corresponding to the root causes of SNAP improper payments because FNS requires the states to develop individual state- level corrective actions. Additionally, because of varying root causes and the uniqueness of issues identified among the states, agency officials believe that state corrective actions may not easily aggregate to the state level. However, FNS’s procedures did not include a process to analyze state-level root causes to identify similarities and develop agency-level corrective actions, if warranted, to help address them. According to agency officials, FNS has made significant improvements in the last few years regarding its controls over SNAP. The officials said that FNS has also implemented major changes in oversight in the last few fiscal years to address previously identified deficiencies among the states. While these changes may be valuable in improving agency oversight and states may have unique circumstances that could lead to varying state-identified root causes of improper payments, FNS is ultimately responsible for preventing and reducing improper payments within SNAP. OMB guidance directs agencies to develop and implement appropriate corrective actions that respond to the root causes of improper payments to prevent and reduce them. OMB guidance also directs agencies to ensure that managers; programs; and, where applicable, states are held accountable for reducing improper payments. Additionally, federal internal control standards state that management should establish and operate activities to monitor the internal control system and evaluate the results and remediate identified internal control deficiencies on a timely basis. As part of these standards, management retains responsibility for monitoring the effectiveness of internal control over the assigned processes that external parties, such as state agencies, perform. Without considering similarities of root causes of SNAP improper payments among the states, USDA will be uncertain whether developing and implementing agency-level corrective actions (in addition to state-level actions) would also help to effectively reduce them. Instead of developing corrective actions corresponding to the identified root causes of EITC improper payments for fiscal year 2018, Treasury addressed improper payments through IRS’s compliance programs and through outreach and education efforts to taxpayers and preparers. According to agency officials, although some of the outreach efforts are indirectly related to root causes identified, it is difficult to link those efforts to the reduction of errors that result from being unable to authenticate eligibility—which Treasury considers the biggest issue in the EITC program—because of the complexity of statutory eligibility requirements. Although Treasury uses information from SSA and HHS to help IRS verify residency and relationship information for parents and children, Treasury’s strategy for addressing the root causes of EITC improper payments does not include continuing efforts to identify and reach out to additional agencies to (1) determine how they verify information for certain eligibility-based programs and whether they use strategies that Treasury could adopt or (2) identify other potential data sources that could be used to verify EITC information or confirm that other data sources do not exist. According to agency officials, such inquiries are not included because the eligibility requirements for EITC are not always the same as requirements for other government programs. Additionally, Treasury’s fiscal year 2018 AFR states that because of the nature of EITC, corrective actions implemented by IRS alone will not significantly reduce EITC improper payments. For example, according to Treasury officials, legislative changes are needed to help address certain EITC improper payments. While Treasury has made certain legislative proposals related to providing IRS greater flexibility to address correctable errors and increasing oversight of paid tax return preparers, it has not made proposals to help address EITC eligibility criteria issues. Additionally, Treasury’s strategy does not include identifying and proposing legislative changes needed to help reduce EITC improper payments related to these or other issues, such as those related to the inability to authenticate taxpayer eligibility discussed above. OMB guidance directs agencies to develop and implement appropriate corrective actions that respond to the root causes of improper payments to prevent and reduce them. Further, federal internal control standards state that management should use quality information to achieve the entity’s objectives. As part of these standards, management designs a process that uses the entity’s objectives and related risks to identify the information requirements needed to achieve the objectives and address the risks and obtains relevant data from reliable internal and external sources in a timely manner based on the identified information requirements. While we recognize the unique eligibility requirements for EITC, until Treasury coordinates with other agencies to identify potential strategies or data sources that may help in determining eligibility, it will be uncertain whether Treasury can leverage additional sources to help verify data. Additionally, without identifying and proposing legislative changes to help resolve such issues, Treasury will be at risk of continuing to be unable to significantly reduce EITC improper payments. All six agencies responsible for the programs we reviewed communicated with internal agency stakeholders regarding their improper payment corrective action plan information, in accordance with OMB guidance and federal internal control standards. However, as shown in table 3, three of the four agencies—Education, HHS, and SSA—that developed corrective actions corresponding to the identified root causes either did not establish planned completion dates, monitor the progress, or measure the effectiveness of their corrective actions. In fact, we found that VA was the only agency that measured the effectiveness of each corrective action for the selected program (PSAS) that we reviewed. As previously discussed, USDA and Treasury did not develop agency corrective actions corresponding to the identified root causes of improper payments for their selected programs and therefore did not establish planned related completion dates, monitor progress, or measure the effectiveness of such corrective actions. All six agencies we reviewed communicated information regarding the selected programs’ corrective action plans to internal stakeholders, consistent with OMB guidance and federal internal control standards. OMB M-18-20 directs agencies to ensure that managers, accountable officers (including the agency head), and program officials are held accountable for reducing improper payments. Additionally, federal internal control standards state that management should internally communicate the necessary quality information to achieve the entity’s objectives. As part of these standards, management communicates quality information down, across, up, and around reporting lines to all levels of the entity. We found that the six agencies communicated information, at least annually, to such internal stakeholders, including the relevant agency head, chief financial officer (CFO), and program managers. For example, some selected agencies—Education, HHS, VA, and SSA—provided briefings to the agency head and the CFO’s office regarding the status of the selected program’s improper payment corrective action activities during fiscal year 2019 for the corrective actions reported for fiscal year 2018. USDA and Treasury required their components to annually submit deliverables to the office of the CFO and coordinate accordingly with the Office of the Secretary as part of their fiscal year 2018 AFR reporting process. We found that two of the six agencies we reviewed—Education and VA— established planned completion dates for the selected programs’ corrective actions. Two agencies—HHS and SSA—did not consistently establish planned completion dates for all the selected programs’ corrective actions, as required by IPIA. Two agencies—USDA and Treasury—did not develop agency corrective actions corresponding to the identified root causes of improper payments for their selected programs and therefore did not establish planned completion dates for such corrective actions. Further details on each agency’s process are provided below. USDA: As previously discussed, FNS did not develop corrective actions at the agency level to address SNAP’s root causes of improper payments and, as a result, did not have planned completion dates for such corrective actions. However, in the event that FNS develops agency-level corrective actions, USDA’s IPIA corrective action plan guidance includes a directive for each corrective action to have an estimated completion date. Education: Education established planned completion dates for all Direct Loan and Pell Grant corrective actions that were not legislative proposals. For example, in fiscal year 2018, Education did not report a planned completion date for Federal Student Aid’s (FSA) corrective action related to proposed legislative changes, as the timeline for the legislative process is subject to external factors outside of Education’s control. HHS: HHS did not consistently establish planned completion dates for agency-level CHIP corrective actions. According to agency officials, most agency-level CHIP corrective actions are unlikely to have completion dates because the work is ongoing. We agree with HHS’s determination that establishing completion dates for ongoing corrective actions was not relevant. HHS provided a spreadsheet of CHIP’s corrective actions, which included a column of target completion dates. However, this column was not consistently filled out for actions that were not considered either ongoing or voluntary state processes. HHS officials stated that although HHS has a process for its improper payment corrective action plans, this process is not documented in formal policies and procedures. Instead, HHS uses OMB guidance as its policies and procedures. Lack of formally documented policies and procedures may have contributed to the inconsistencies in HHS establishing planned completion dates for agency-level CHIP corrective actions. Treasury: As previously discussed, instead of developing corrective actions to address root causes of EITC improper payments, Treasury addressed improper payments through IRS’s compliance programs and through outreach and education efforts to taxpayers and preparers. According to agency officials, Treasury did not establish planned completion dates for its compliance programs and outreach efforts because these activities were ongoing in nature and completed every year as part of IRS operations. We agree with Treasury’s determination that establishing completion dates for EITC ongoing compliance activities was not relevant. In the event that Treasury develops corrective actions for EITC improper payments, Treasury’s corrective action plan guidance includes a directive for each corrective action to have an estimated completion date. VA: VA established relevant planned completion dates for each PSAS corrective action. In addition, each task associated with each corrective action had a planned completion date. SSA: SSA did not consistently establish relevant completion dates for each OASDI and SSI corrective action. For example, SSA’s corrective action plans included sections for “target completion.” However, based on our review, these sections were not filled out consistently. According to agency officials, the process for developing and implementing its corrective actions was inconsistent because of SSA’s decentralized corrective action plan process. As previously discussed, SSA developed a new standardized improper payment strategy that if effectively implemented will address these concerns. Specifically, SSA’s procedures to implement this strategy include control activities designed to help ensure that the agency establishes planned completion dates for each corrective action, as required by IPIA. IPIA requires agencies to report on the planned or actual completion date of each action taken to address root causes of improper payments. Federal internal control standards state that management should design control activities to achieve objectives and respond to risks and implement control activities through policies. Further, federal internal control standards state that management should remediate identified internal control deficiencies on a timely basis. As part of these standards, management monitors the status of remediation efforts so that they are completed on a timely basis. Additionally, federal internal control standards state that management should implement its control activities through policies. Without documented policies and procedures for its improper payment corrective action plan process, including the establishment of planned completion dates, HHS lacks assurance that corrective action plan–related activities will be performed consistently. Additionally, without planned completion dates, HHS cannot demonstrate that it is effectively implementing and completing corrective actions timely and therefore cannot ensure that they will help reduce improper payments. Three of the four agencies—Education, HHS, and VA—that developed corrective actions corresponding to the identified root causes monitored the progress of the selected programs’ corrective actions, in accordance with OMB guidance. However, HHS’s process was not documented in policies and procedures. SSA did not monitor the progress for all relevant OASDI and SSI corrective actions but has since implemented policies and procedures to monitor such progress. USDA did not develop corrective actions at the agency level that corresponded to the identified root causes of improper payments for SNAP and therefore did not monitor the progress of such corrective actions. In addition, USDA’s corrective action plan guidance does not direct the agency to monitor the progress of its corrective actions. Although Treasury did not have corrective actions that corresponded to the root cause of improper payments, it did monitor the progress of its compliance and outreach efforts that are intended to help reduce EITC improper payments. Further details on each agency’s process are provided below. USDA: As previously discussed, FNS did not develop corrective actions at the agency level to address SNAP’s root causes of improper payments and, as a result, did not monitor the progress of such corrective actions. In addition, USDA’s IPIA corrective action plan guidance does not direct the agency to monitor the progress of its corrective actions. Without agency-level corrective actions to address the root causes of SNAP improper payments and a documented process to monitor the progress of implementing such agency-level corrective actions, USDA may miss opportunities to reduce SNAP improper payments. Education: Education monitored the progress of implementing each Direct Loan and Pell Grant corrective action. We found that Education maintained a spreadsheet to track the implementation status of each corrective action annually. Specifically, the status of each corrective action was updated to either “complete” or “open” for the annually recurring and long-term, multiyear corrective actions. The actions marked as “complete” had actual completion dates. Actions that Education considered ongoing, such as needed updates to help clarify verification requirements to the “Question and Answer” section of FSA’s website, were updated as “not applicable.” HHS: HHS monitored the progress of implementing each of its agency-level CHIP corrective actions. Specifically, HHS tracked the progress of implementing the corrective actions in a spreadsheet that included status updates for each agency-level corrective action. Agency officials stated that this information was updated approximately two to three times each fiscal year through an online interface; however, this process was not documented in policies and procedures. Without a properly documented process and related control activities, HHS is at increased risk that it may not consistently monitor the progress of CHIP corrective actions and has less assurance that such actions are implemented and completed timely. Treasury: Treasury did not develop corrective actions that corresponded to the root causes of EITC improper payments and, as a result, did not monitor the progress of such corrective actions. However, Treasury did monitor its compliance programs and outreach efforts that are intended to help reduce EITC improper payments during fiscal year 2018. VA: VA monitored the progress of implementing each PSAS corrective action. Specifically, we found that VA monitored the progress for each corrective action each month by calculating a completion percentage based on the status of tasks associated with each corrective action. SSA: SSA did not monitor the progress of implementing each OASDI and SSI corrective action. According to agency officials, the monitoring of corrective actions was inconsistent and evaluation of corrective actions was limited because of SSA’s decentralized corrective action plan process. As previously discussed, SSA developed a new standardized improper payment strategy that if effectively implemented will address these concerns. Specifically, SSA’s procedures to implement this strategy include control activities designed to help ensure that the agency monitors the progress of its corrective actions, as directed by OMB guidance. OMB guidance directs agencies to measure the progress of each individual corrective action annually. Federal internal control standards state that management should establish and operate activities to monitor the internal control system and evaluate the results and remediate identified internal control deficiencies on a timely basis. As part of these standards, management monitors the status of remediation efforts so that they are completed on a timely basis. Additionally, federal internal control standards state that management should implement its control activities through policies. Without monitoring the progress of its corrective actions, USDA cannot demonstrate that it is effectively implementing and completing its corrective actions timely and therefore cannot ensure that they will contribute to a reduction in improper payments. Further, unless HHS documents its process in policies and procedures, it will lack assurance that the progress of its corrective actions is monitored consistently and that such actions are implemented and completed timely. We found that one out of six agencies we reviewed—VA—measured the effectiveness of the selected programs’ corrective actions, including the establishment of reduction targets in accordance with OMB guidance. Education, HHS, and SSA did not measure the effectiveness of their corrective actions for the selected programs. In addition, USDA and Treasury did not develop agency corrective actions corresponding to the identified root causes of improper payments for their selected programs and therefore did not measure the effectiveness of such corrective actions. Further details on each agency’s process are provided below. USDA: As previously discussed, FNS did not develop agency-level corrective actions to address root causes of SNAP improper payments. Instead, FNS provided technical assistance and support to the individual states. According to agency officials, FNS cannot link each technical assistance initiative it provides to the states to the effect these efforts have on reducing payment integrity errors, as the technical assistance provided to the states can vary significantly. Additionally, USDA’s IPIA corrective action plan guidance did not include direction for the agency to measure the effectiveness of its corrective actions. Without agency-level corrective actions to address the root causes of SNAP improper payments and a documented process to measure the effect that agency actions have on improper payments, USDA will be unable to demonstrate whether such actions are effective in reducing improper payments and may risk continuing ineffective actions. In addition, as permitted by OMB, USDA did not establish a reduction target for SNAP improper payments because it lacked a sufficient baseline to accurately project future improper payment rates. USDA plans to reestablish reduction targets for fiscal year 2021 reporting. Education: Education’s policies and procedures state that to measure the effectiveness of the corrective actions, FSA solicits input from the corrective action owner, including, among other items, whether measuring and monitoring of the effectiveness of the corrective action has been established and a description of anecdotal evidence available to confirm the effectiveness of the corrective action. However, based on the procedures, it is unclear how the corrective action owners will conduct this analysis to demonstrate effectiveness. Education provided an example of communication to a corrective action owner requesting, among other items, that the corrective action owner (1) confirm that existing actions are focused on the true root causes of the improper payments and are actually reducing improper payments and (2) verify that existing corrective actions are achieving the intended purposes and results. Education officials informed us that although these items were discussed in stakeholder meetings, FSA was unable and did not attempt to quantify the direct effect of any one corrective action on the improper payment estimates. Education’s fiscal year 2018 AFR states that FSA does not attempt to quantify the reduction of the improper payment estimates in terms of percentage or amount due to Pell Grant and Direct Loan corrective actions. It further states that quantifying of results is not feasible because Education uses a nonstatistical alternative estimation methodology. However, according to Education’s fiscal year 2019 AFR, Education implemented a statistical estimation methodology for the fiscal year 2019 estimates. Education believes that the new methodology will allow FSA to better measure the effectiveness of corrective actions over time as FSA collects a baseline of statistically valid improper payment estimates. According to agency officials, FSA is currently refining its process for measuring the effectiveness of corrective actions based on its new statistical estimation methodology. However, until Education revises and documents its process to include measuring the direct effect that its Pell Grant and Direct Loan corrective actions have on improper payments, it will be unable to demonstrate whether the corrective actions are effective in reducing the associated improper payments and may risk continuing ineffective actions. As part of its overall payment integrity reporting in fiscal year 2018, Education established program-wide reduction targets for Pell Grant and Direct Loan. However, according to agency officials, because it used an OMB-approved nonstatistical methodology, Education’s confidence in using these results to establish reduction targets for the upcoming fiscal year was limited. Specifically, Education’s fiscal year 2018 AFR states that imprecision and volatility in the improper payment estimates continue to limit its ability to establish accurate out-year reduction targets. Therefore, for fiscal years 2016 through 2018, Education set the upcoming fiscal year reduction targets to match the current fiscal year reported improper payment rate for each program. According to agency officials, Education plans to consider the feasibility of setting meaningful reduction targets moving forward with its new statistical methodology. HHS: HHS did not measure the effectiveness of its corrective actions for CHIP improper payments. In addition, as discussed above, HHS does not have formal documented policies and procedures for its improper payment corrective action plan process. According to agency officials, establishing a one-to-one relationship between specific corrective actions and resulting changes in the improper payment rates is difficult because of the complexity of factors involved that lead to them. However, until HHS develops and implements a documented process to measure the effect that CHIP corrective actions have on improper payments, it will be unable to demonstrate whether the corrective actions are effective in reducing the associated improper payments and may risk continuing ineffective actions. As permitted by OMB’s implementing guidance, HHS did not establish a program-wide reduction target for CHIP improper payments for fiscal years 2019 or 2020, and does not anticipate setting one for 2021 because it lacks a sufficient baseline to accurately project future improper payment rates. According to agency officials, HHS plans to establish a CHIP reduction target for fiscal year 2022 reporting. Treasury: Treasury did not develop specific corrective actions to address root causes of EITC improper payments, so it could not measure the effectiveness of its corrective actions. Agency officials recognized that the current actions on their own will be unable to significantly reduce the amount of EITC improper payments. As approved by OMB, Treasury did not establish a program-wide reduction target for EITC improper payments for fiscal year 2018 reporting. However, Treasury set a reduction target for EITC improper payments in its fiscal year 2019 AFR, per OMB guidance. VA: VA has documented procedures in place to measure the effectiveness of its corrective actions for PSAS improper payments. As part of this process, VA set reduction targets and timelines for reducing the errors associated with each corrective action. VA maintained a timeline spreadsheet showing the corrective action reduction targets by year and the percentage of improper payments it expects to be reduced once each corrective action is fully implemented. VA updated the spreadsheet at the end of fiscal year 2019 with the current results of the effectiveness measure for corrective actions reported in fiscal year 2018. In addition, VA also set a program-wide reduction target for PSAS improper payments. SSA: SSA did not measure the effectiveness of its corrective actions for OASDI and SSI improper payments. According to agency officials, SSA did not have procedures to collect the necessary data and therefore was unable to measure the effectiveness of its corrective actions. SSA’s procedures for its new standardized improper payment strategy (discussed above) direct responsible components to define the metrics and information necessary to evaluate the corrective actions and to determine if the actions are effectively reducing improper payments. However, it is still unclear which metrics will be used to determine the effect that OASDI and SSI corrective actions have on the corresponding root causes to demonstrate effectiveness. Until SSA develops and implements a documented process to measure the effect that the OASDI and SSI corrective actions have on improper payments, it will be unable to demonstrate whether the corrective actions are effective in reducing the associated improper payments and may risk continuing ineffective actions. As part of its overall payment integrity reporting in fiscal year 2018, SSA established program-wide reduction targets for both programs. However, some of SSA’s reduction targets have remained constant since fiscal year 2004 reporting. Agency officials stated that although SSA believes OASDI’s payment accuracy rate is exceptionally high, if SSA’s mitigation strategies help decrease improper payments, it would consider changing the reduction target. For SSI, agency officials stated that SSA believes that SSI’s program complexity and reliance on self-reporting have made meeting the current accuracy goal challenging. Agency officials further stated that if planned mitigation strategies help decrease improper payments, SSA would consider changing the SSI reduction target. OMB guidance directs agencies to measure the effectiveness of each individual corrective action annually. Agencies may measure the effectiveness of corrective actions by assessing the results of actions taken to address the root causes, such as the performance and outcomes of these processes. In addition, OMB guidance states that for long-term, multiyear corrective actions, agencies should identify annual benchmarks used to demonstrate the initial effect on improper payment prevention and reduction. For corrective actions already in place, agencies should be able to describe how they evaluate these actions’ effectiveness and the results. Federal internal control standards state that management should establish and operate activities to monitor the internal control system and evaluate the results. As part of these standards, management performs ongoing monitoring of the design and operating effectiveness of the internal control system as part of the normal course of operations. Additionally, federal internal control standards state that management should implement its control activities through policies. Unless USDA, Education, HHS, and SSA develop and implement a process that clearly links corrective actions to effectively addressing improper payments, they will be uncertain whether the actions are actually reducing improper payments and the agencies may risk continuing ineffective actions. Further, unless these processes are documented in policies and procedures, agencies will lack assurance that the effectiveness of their corrective actions is measured consistently. Developing corrective action plans that respond to identified root causes of improper payments is a critical component in government-wide efforts to reduce improper payments. Agency processes to monitor the progress and measure the effectiveness of such plans are also essential to evaluating their efforts to address improper payments. However, certain agencies have not effectively taken these steps for the selected programs we reviewed. For example, USDA and Treasury have not developed agency-wide corrective actions that correspond to the identified root causes of improper payments in their SNAP and EITC programs, respectively, that would better position these agencies to reduce and prevent them. Also, HHS lacks important information to monitor its efforts to address CHIP improper payments because it does not consistently establish planned completion dates for agency-level corrective actions. Additionally, USDA, Education, HHS, and SSA do not have sufficient processes in place to measure the effectiveness of corrective actions to address improper payments for the selected programs we reviewed. Unless agencies develop corrective action plans that correspond to the root causes of improper payments and implement processes to effectively monitor progress and measure their effectiveness, their ability to ensure that their actions will reduce improper payments will be limited. We are making the following seven recommendations—one each to Education, HHS, and SSA and two each to USDA and Treasury. The Administrator of FNS should develop and implement a process, documented in policies and procedures, to analyze SNAP state-level root causes to identify potential similarities among the states and develop and implement SNAP agency-level corrective actions, if appropriate, to help address them. (Recommendation 1) The Secretary of Agriculture should revise USDA’s procedures to include processes for monitoring the progress and measuring the effectiveness of improper payment corrective actions. The process for measuring the effectiveness of corrective actions should clearly demonstrate the effect USDA’s corrective actions have on reducing improper payments. (Recommendation 2) The Secretary of Education should revise and document Education’s process for measuring the effectiveness of its corrective actions based on its new statistical estimation methodology for Direct Loan and Pell Grant improper payments. This process should clearly demonstrate the effect Education’s corrective actions have on reducing improper payments. (Recommendation 3) The Secretary of Health and Human Services should document in policies and procedures HHS’s improper payment corrective action plan process. As part of these procedures, HHS should include processes for (1) establishing planned completion dates, (2) monitoring the progress of implementing corrective actions, and (3) measuring the effectiveness of improper payment corrective actions. The process for measuring the effectiveness of corrective actions should clearly demonstrate the effect HHS’s corrective actions have on reducing improper payments. (Recommendation 4) The Secretary of the Treasury should determine whether Treasury’s current improper payment root cause analysis provides sufficiently relevant information that can be used as a basis for proposed corrective actions in reducing EITC improper payments and, if not, update the analysis using more timely data to ensure their reliability for identifying root causes of EITC improper payments. (Recommendation 5) The Secretary of the Treasury should update Treasury’s strategy for addressing the root causes of EITC improper payments to include (1) coordinating with other agencies to identify potential strategies and data sources that may help in determining EITC eligibility and (2) determining whether legislative changes are needed, and developing proposals as appropriate, to help reduce EITC improper payments, such as those related to the inability to authenticate taxpayer eligibility. (Recommendation 6) The Commissioner of SSA should develop and implement a process, documented in policies and procedures, to measure the effectiveness of SSA’s corrective actions for OASDI and SSI improper payments. This process should clearly demonstrate the effect SSA’s corrective actions have on reducing improper payments. (Recommendation 7) We provided a draft of this report for comment to OMB, USDA, Education, HHS, Treasury, VA, SSA, and the Council of the Inspectors General on Integrity and Efficiency (CIGIE). We received written comments from five agencies—USDA, Education, HHS, VA, and SSA—which are reproduced in appendixes I through V and summarized below. The Assistant Director of Treasury’s Risk and Control Group also provided comments in an email, which are summarized below. Treasury, HHS, VA, and SSA also provided technical comments, which we incorporated as appropriate. CIGIE and OMB liaisons informed us that CIGIE and OMB had no comments on the report. In its written comments, USDA stated that it generally agrees with our findings and recommendations. USDA stated that FNS has agency-level corrective actions that correspond to the identified root causes and establishes planned completion dates, monitors the progress, and measures the effectiveness of SNAP’s corrective actions. However, USDA officials did not provide documentation or other information supporting such agency-level corrective actions and efforts. Rather, as discussed in our report, FNS provides technical assistance and support to the states to help them improve payment accuracy and requires them to develop state-level corrective actions. Because FNS’s initiatives do not address specific root causes, we continue to believe that USDA does not have agency-level corrective actions that correspond to the identified root causes of SNAP improper payments. In regard to our recommendation to FNS to develop and implement a process to analyze SNAP state-level root causes and take other related actions, FNS stated that it already has an existing process and recommended that we revise our recommendation to indicate that its existing process should be formalized. In our report, we acknowledge that under statutory requirements and program regulations, FNS requires the states to identify the root causes and develop corrective actions that address them. However, USDA did not provide any evidence that FNS analyzes the states’ root causes to identify similarities and develop corrective actions at the agency level. Therefore, we continue to believe that our recommendation to FNS to develop and implement this process is valid to help ensure that it develops corrective actions at the agency level, if appropriate, and to help reduce improper payments within SNAP. In regard to our recommendation to revise USDA’s procedures, USDA stated that it will develop a proposed action plan to revise its procedures for monitoring the progress and measuring the effectiveness of improper payment corrective actions and the revised process will focus on the impact corrective actions have on the corresponding root causes of improper payments. The actions USDA described, if implemented effectively, would address our recommendation. In its written comments, Education neither concurred nor disagreed with our recommendation, stating that FSA will continue to evaluate and refine its processes to measure corrective actions and the effectiveness of these actions. Further, Education stated that FSA’s measurement of corrective action effectiveness and root cause identification will gain additional precision as FSA collects annual improper payment data and builds upon the new baseline of statistically valid improper payment estimates. Education stated that FSA annually measures the overall effectiveness of its corrective action plans collectively against the improper payment reduction targets, rather than measuring the effectiveness of each individual corrective action. However, as discussed in our report, OMB guidance directs agencies to measure the effectiveness of each individual corrective action annually. We continue to believe that our recommendation to Education is valid to help ensure that Education’s corrective actions are effective in reducing improper payments. In its written comments, HHS stated that it does not concur with our recommendation. Specifically, HHS stated that the portion of our recommendation providing that HHS’s process for measuring the effectiveness of corrective actions should clearly demonstrate their impact on the corresponding root causes of improper payments is operationally impossible and not required by OMB guidance. We acknowledge that given the unique circumstances across federal agencies concerning improper payments, OMB guidance provides some flexibility for how agencies are to measure the effectiveness of their corrective actions. However, if agencies’ corrective actions are effective, they should ultimately reduce improper payments. Without being able to demonstrate whether corrective actions are effective in reducing the associated improper payments, agencies will be uncertain if their actions are actually reducing improper payments and may risk continuing ineffective actions. While we acknowledge that OMB guidance does not explicitly require agencies to demonstrate the impact corrective actions have on the corresponding root causes of improper payments, agencies are required to analyze the root causes of improper payments and develop corrective actions to reduce improper payments. As such, we clarified this portion of our recommendation to indicate that HHS’s process should clearly demonstrate the effect corrective actions have on reducing improper payments, to better align with the purpose of corrective action plans. We also made this revision to our recommendations to USDA, Education, and SSA. In its written comments, VA stated that PSAS supported improper payments statutory requirements by completing annual audit reviews, identifying root causes, and developing a national program action plan to reduce improper payments. VA also stated that PSAS reduced improper payments from 39.7 percent in fiscal year 2018 to 2.1 percent in fiscal year 2019 and continues to make improvements through enhanced audit reviews and consultation with PSAS sites. In its written comments, SSA stated that it concurs with our recommendation and will determine the most cost-effective strategies to remediate the underlying causes of payment errors and monitor, measure, and revise the strategies as needed. The actions SSA described, if implemented effectively, would address our recommendation. In emailed comments, the Assistant Director of Treasury’s Risk and Control Group neither concurred nor disagreed with our recommendations. In regard to our recommendation to update its strategy for addressing root causes of EITC improper payments, Treasury stated that each year it indicates in its corrective action plan that IRS will continue to work with Treasury to develop legislative proposals that will improve refundable credit compliance and reduce erroneous payments. Treasury also stated that its fiscal year 2020 budget request included two legislative proposals that may improve refundable credit compliance and reduce erroneous payments and that both proposals have been in the President’s Budget for several years now. We acknowledge these legislative proposals in our report, and note that although Treasury has made certain legislative proposals, it has not made proposals to specifically help address EITC eligibility criteria issues. Additionally, as noted in the report, Treasury’s strategy does not include identifying and proposing additional legislative changes needed to help reduce EITC improper payments. Therefore, we continue to believe that our recommendation to Treasury is valid to help ensure that Treasury addresses EITC eligibility issues, which Treasury identifies as the primary root cause for EITC improper payments. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Secretary of Agriculture, the Secretary of Education, the Secretary of Health and Human Services, the Secretary of the Treasury, the Secretary of Veterans Affairs, the Commissioner of the Social Security Administration, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-2623 or davisbh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. In addition to the contact named above, Matthew Valenta (Assistant Director), Stephanie Adams (Auditor in Charge), William Beichner, Susanna Carlton, Virginia Chanley, Anthony Clark, Lindsay Hollup, James Kernen, and Diana Lee made key contributions to this report.", "summary": "Improper payments, estimated at almost $175 billion for fiscal year 2019, are a significant problem in the federal government. IPIA and OMB guidance directs agencies to analyze the root causes of improper payments and develop corrective actions to reduce improper payments. This report examines (1) actions that agencies took to identify root causes of improper payments for selected programs, (2) the extent to which their corrective action plans correspond to identified root causes, and (3) the extent to which they monitored progress and evaluated the effectiveness of corrective actions. GAO analyzed corrective action plans reported in fiscal year 2018 for the following eight programs: Department of Education's Direct Loan and Pell Grant; HHS's Children's Health Insurance Program; SSA's Old Age, Survivors, and Disability Insurance and Supplemental Security Income; Treasury's EITC; USDA's SNAP; and VA's Prosthetic and Sensory Aids Service. GAO selected these programs based, in part, on those programs with at least $1 billion in fiscal year 2018 improper payment estimates. Five out of six agencies used their improper payment estimation results to identify the root causes for the eight programs GAO reviewed. However, the Department of the Treasury (Treasury) used 2006 through 2008 taxpayer data to identify root causes of fiscal year 2018 Earned Income Tax Credit (EITC) improper payments. Without timely data on the true root causes of EITC improper payments, Treasury will lack quality information needed to develop appropriate corrective actions to reduce them. In addition, only one agency we reviewed—the Department of Veterans Affairs (VA)—adhered to relevant Improper Payments Information Act of 2002, as amended (IPIA), requirements and Office of Management and Budget (OMB) guidance. The Department of Agriculture (USDA) and Treasury did not develop agency corrective action plans corresponding to the identified root causes of improper payments for the Supplemental Nutrition Assistance Program (SNAP) and EITC, respectively. In addition, the remaining three agencies did not have processes in place to either establish planned completion dates, monitor progress, or measure the effectiveness of their corrective actions in reducing improper payments. Unless agencies develop corrective action plans that correspond to root causes of improper payments and implement processes to monitor progress and measure their effectiveness, their ability to ensure that their efforts will reduce improper payments will be limited GAO is making seven recommendations: one each to Education, HHS, and SSA and two each to USDA and Treasury to improve their processes for addressing root causes of improper payments and measure their effectiveness. In their responses, SSA agreed, USDA generally agreed, Education and Treasury neither agreed nor disagreed, and HHS disagreed with GAO's respective recommendation(s). GAO clarified four recommendations and continues to believe all the recommendations are valid.", "document_type": "gao"}
{"report": "The federal government relies on commercial communications networks to obtain various services, including video conferencing, local and long- distance telephone calls, email, text messages, file transfers, and more. Much of the communications infrastructure is owned or operated by commercial entities. Similarly, federal agencies rely on call centers (also known as contact centers) to handle public inquiries on government programs and services, such as Medicare. These centers utilize automated and live telephone response systems, websites, and trained customer service representatives to provide information to the public. Agencies that contract with industry to meet their telecommunications and call center needs report information about these contracts and their obligations in FPDS-NG—the federal government’s primary database for contract information at the prime contract level. When reporting contract data, agencies report information on the type of product or service being purchased as well as the NAICS code that best describes the principal purpose of the product or service being acquired. See table 1 for a description of the industry categories for businesses that provide telecommunications and call center goods or services. In addition to FPDS-NG, the federal government has developed other contract reporting systems to collect contracting information related to subcontracting. The Electronic Subcontract Reporting System (eSRS) was created in 2005 to streamline contractors’ reporting of progress toward meeting the small business subcontracting goals in their subcontracting plans and to facilitate agency oversight. The Federal Acquisition Regulation (FAR) generally requires that contractors be required to submit an acceptable subcontracting plan when they are awarded a contract that exceeds $700,000 and is expected to have subcontracting possibilities. Depending on the individual contract, the system may contain subcontracting information reported by both the prime contractor as well as multiple subcontractors. The Federal Funding Accountability and Transparency Act Subaward Reporting System (FSRS) was created in 2010 to provide transparency about federal spending. Prime contractors must register and report subcontract information for first-tier subcontractors, as applicable. Information on subcontracts awarded by first-tier subcontractors to other entities, or lower-tier subcontractors, is not required. USASpending.gov was created in 2007 to promote transparency by providing the public with information about where and how federal dollars are spent. USASpending.gov contains prime contract award data from FPDS-NG and subcontract information from FSRS. Telecommunications and information technology (IT) fields have been merging in recent years due to integration of the technologies and combined operational management of their functions. Federal telecommunications systems can include a multitude of IT equipment and products, as well as services, such as managed network services and IT security services. In addition, telecommunications include such broadband internet services. The Federal Information Security Modernization Act (FISMA) of 2014 provides a comprehensive framework for ensuring that effective information security controls are put in place for information resources and assets that support federal operations and for ensuring the effective oversight of the security of the information. Under FISMA, the Office of Management and Budget (OMB) is responsible for overseeing agency information security policies and practices. To implement FISMA, the National Institute of Standards and Technology (NIST)—a component within the Department of Commerce—developed standards and guidelines for agencies to use to help manage information security risks. Both FISMA and OMB require agencies to comply with applicable NIST standards and guidelines. The NIST framework has many components, but generally provides guidance to agencies to manage information security risks for communication and information technology networks. The framework emphasizes that an organization needs to develop and implement appropriate safeguards to ensure delivery of critical services. To accomplish this goal an agency generally must be able to develop an organizational understanding to manage cybersecurity develop and implement appropriate safeguards to ensure delivery of mitigate those events, and restore system capabilities or services that were impaired due to a cybersecurity event. NIST publications can help agencies mitigate potential risks by providing approaches on how to manage or resolve information technology risks. For example, NIST states that agencies should conduct continuous threat monitoring and suggests control activities to implement to help manage supply chain risks, among other things. Some of the controls that NIST recommends are access controls—authentication requirements and physical access controls to limit or detect inappropriate access to data, equipment, and facilities; security management controls—establish a framework and continuous cycle for assessing data systems for security weaknesses, implementing security procedures, and monitoring the procedures to ensure adequate protection of sensitive or critical resources; and contingency planning and restoration of services—planning for how to provide continued or restored services when system interruptions or problems occur. Various federal laws exist to protect workers, establishing requirements related to wages, hours worked, and worker safety and health, among other things. Some of these laws apply specifically to federal contractors, although the requirements may vary depending on factors such as the type and size of the contract. For example, the Service Contract Act establishes minimum wage, fringe benefit, and safety and health requirements for covered federal service contractors. Telecommunications service contracts are exempt from the Service Contract Act, but call center contracts may be subject to it. Similarly, the Walsh-Healey Act establishes minimum wage, overtime, and workplace safety and health requirements for covered federal supply contractors. Contractors are also generally subject to a number of non-discrimination and equal employment opportunity requirements under an executive order and federal laws. For example, covered contractors and subcontractors are prohibited from discriminating in employment based on race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. In addition, covered contractors and subcontractors generally are prohibited from discriminating against applicants or employees because they inquire about, discuss, or disclose their compensation or that of others, subject to certain limitations. Along with laws that apply specifically to federal contractors, worker protection requirements of other federal laws may also apply, such as the Fair Labor Standards Act or the Occupational Health and Safety Act. Federal contractors are also generally subject to the requirements set forth in the FAR, which provides uniform policies and procedures for acquisition by executive agencies. Specifically, Part 22 of the FAR, Application of Labor Laws to Government Acquisitions, establishes various labor-related requirements for federal contractors and implements applicable requirements, as described above. Federal contractors may also be subject to specific department or agency regulations. For example, when contracting with DOD, contractors must comply with applicable contract provisions and clauses from the Department of Defense Federal Acquisition Regulation Supplement (DFARS), such as clauses incorporated pursuant to DFARS Part 222, Application of Labor Laws to Government Acquisitions. FAR clauses in the prime contract can indicate whether the contractor’s requirements will flow down to its subcontractors. FAR flow-down clauses may be mandatory or discretionary, and are subject to other considerations such as whether a subcontract is performed extraterritorially. Federal agencies reported obligating a total of over $30 billion to acquire telecommunications products and services during fiscal years 2014 through 2018. Telecommunications spending accounted for 1.2 percent of total federal obligations for the 5-year period. Over these five years, the majority of the government-wide telecommunications obligations—84 percent—were awarded for services, such as internet and satellite services with the remainder going to products. In fiscal year 2018, federal agencies reported obligating $6.2 billion to acquire telecommunications products and services—an amount that is consistent with the preceding 4 fiscal years. DOD accounted for about two-thirds of this amount and civilian agencies for roughly one-third. These obligation levels are consistent with the previous 4 fiscal years. Within DOD, DISA—which has responsibility for providing, operating, and assuring command and control and information-sharing capabilities across the full spectrum of military operations—had the highest obligations for telecommunications services and products. Among civilian agencies, the National Aeronautics and Space Administration, the Department of Transportation, and the Department of Veterans Affairs had the highest obligations. These three agencies consistently had the highest obligations in each of the previous 4 fiscal years. Defense and civilian agencies’ obligations for telecommunications for the 5-year period are shown in figure 1. Agencies procured telecommunications products and services from an average of 1,500 vendors each year across the five telecommunications industry categories. A little more than half of these contractors were classified as small businesses. Ten contractors accounted for 52 percent of total federal telecommunications obligations for fiscal year 2018, which is generally consistent with obligation levels in the preceding 4 fiscal years. Appendix III provides additional information on the top federal telecommunications contractors based on dollars obligated. For the 5- year period we reviewed, our analysis shows that agencies reported the majority of dollars obligated were for purchases for wired telecommunications, as illustrated in figure 2. Agencies reported an average of $800 million annually for call center obligations for fiscal years 2014 through 2018, with HHS accounting for at least 80 percent of total spending. Call center spending accounted for 0.2 percent of all federal spending during the 5-year period we reviewed. Almost all—an average of 99.7 percent—of call center contract obligations were awarded for services each year, such as professional and administrative support, help desk, and technical assistance services. For example, the CMS contract in our sample was awarded to acquire management and staffing services for a call center that handles Medicare beneficiary inquiries for 1-800 MEDICARE and consumer inquiries for the Health Insurance Marketplace. Total government-wide call center obligations for fiscal years 2014 through 2018 are shown in figure 3. An average of 133 different contractors had contracts with obligations for call centers during the 5 years we reviewed and about half were classified as small businesses. One contractor accounted for the majority of all obligations with obligation levels ranging from 80 to 84 percent for fiscal years 2014 through 2018. Appendix IV provides additional information on the top call center contractors based on dollars obligated. Three federal reporting systems provide limited information about subcontracting and no information about offshoring because the systems were not designed to capture the extent of these activities. While FPDS-NG captures data on contracts entered into by federal agencies, it was not designed to include subcontracting data. The system has a field to indicate whether the prime contractor has developed a subcontracting plan, but does not have a field for contracting officials to specify details about what or how much of the products or services will be obtained through subcontracting. In addition, FPDS-NG was not designed to collect data on the extent to which prime contractors may offshore work performed on a federal contract. No field exists for contracting officials to indicate whether the contract involves business activities that include offshoring, regardless of what type of products or services are being acquired. eSRS collects information from prime contractors on their planned use of subcontractors. The FAR generally requires that contractors be required to submit an acceptable subcontracting plan when they are awarded a contract that exceeds $700,000 if subcontracting opportunities exist, and impose subcontracting plan requirements on subcontractors that receive subcontracts above certain thresholds. However, as we previously reported in December 2014, eSRS was not designed to provide a list of subcontractors associated with a particular contract. As a result, the utility of eSRS in linking reported subcontractors to prime contracts is limited. Additionally, in general, prime contractors are not required to report in eSRS if a subcontractor’s services are being performed outside of the United States or its territories. Contracting officials told us that they have limited insight into whether prime contractors subcontract with foreign entities. FSRS is used to collect award and entity information, such as subcontractor names and award amounts, from prime contractors on their subcontract awards. Prime contractors obtain and report information provided by their subcontractors into FSRS. However, in June 2014, we reported that we could not verify the subcontract data in FSRS as agencies frequently do not maintain the records necessary to verify the information reported by the awardees. In light of this, we recommended that the Director of OMB, in collaboration with Treasury’s Fiscal Service, clarify guidance on agency maintenance of records to verify the accuracy of required data reported. OMB generally agreed with our recommendation. As of our latest report in April 2017, OMB had not yet taken action to implement our recommendation. We identified several examples of worker protection requirements in our review of the five selected contracts. We categorized those requirements into three areas: wages and hours, workplace safety and health, and protections against certain employer actions. Wages and Hours. These protections ensure the payment of minimum wage rates and authorize overtime pay, as appropriate, among other things. For example: The GSA Networx services contract and the DISA contract for DOD Information Network operations include requirements to ensure that covered contractor employees are to be paid wages at least at the federal minimum wage rate. The CMS call center operations contract and the DISA emergency telecommunications services contract authorize the contractor to provide overtime pay to certain employees if they work more than their standard hours. The CMS call center operations contract and the DISA contract for DOD Information Network operations identify classes of workers and state the minimum wage rate and fringe benefits that may be or are payable to them. For example, the CMS call center operations contract reflects Department of Labor rates for federal hires. The CMS call center operations contract also includes an HHS- specific requirement related to salary rate limitations that specifies that the contractor shall not use contract funds to pay the direct salary of an individual at a rate that exceeds the Federal Executive Schedule Level II in effect on the date the funding was obligated. Workplace Safety and Health. These protections address dangers in the workplace that might affect the workplace safety or health of contractor employees. All five contracts reviewed contain requirements aimed at promoting or ensuring safe behaviors in the work environment, among other things. For example: All five contracts require the contractor to promote a drug-free workplace environment. DISA’s DOD Information Network operations contract requires the contractor to establish specific safeguards to protect the health of its workers who might work in a federal building complex that is known to be a toxic location, since asbestos and toxic metals have been located in the soil. DISA’s DOD Information Network operations contract also includes requirements for the contractor to ensure its employees have health screenings and vaccinations as applicable to ensure they are physically and psychologically fit to perform the work at specific locations, such as those in military operation zones. All five contracts encourage the contractor to establish policies to ban text messaging while driving. Protections against Certain Employer Actions. These protections are intended to protect workers from potentially harmful actions undertaken by employers—such as discrimination in hiring practices, retaliation for reporting company violations, and participation in human trafficking. For example: All five selected contracts included equal employment opportunity provisions that prohibit discrimination in employment based on specific characteristics, such as being a veteran or a person with a disability. The CMS call center operations contract also included an agency requirement for the contractor to cooperate in any investigations into allegations of employment discrimination. The CMS call center operations contract, the two DISA contracts, and the GSA Networx services contract incorporate clauses requiring their contractors to provide whistleblower protections that protect an employee from reprisal when they inform authorities of fraud, waste, abuse, or violations of contract law by the contractor. All five selected contracts include the clause that prohibits the contractor and its employees from any involvement in trafficking in persons. In addition, DISA’s DOD Information Network operations contract requires the contractor to offer employment to specific groups of people under certain circumstances. Specifically, the contractor is to employ local residents when work is to be performed in Hawaii. In addition, the contractor is to offer employment to former federal employees first when work is to be performed at a military base that is closing. Observations on Offshoring. We did not identify offshoring of the products or services being acquired in the five contracts we reviewed. Generally, if a prime contractor awards a subcontract, the contractor will flow down applicable requirements to the first-tier subcontractor and other subcontractors at lower tiers, unless otherwise specified. We identified only one worker protection clause that would flow down to the subcontractor in the event of offshoring—the requirement to prohibit involvement in trafficking in persons. The five selected contracts we reviewed include examples of various safeguards—such as limiting access to data systems and data, system management controls, contingency planning and restoration of services, and restrictions on the use of equipment—to protect data systems and personally identifiable information from unauthorized access and use. These safeguards are all part of NIST standards. Access Controls. Physical access controls and authentication requirements limit, block, or detect inappropriate access to data, equipment, and facilities. These controls help to reduce the chances of data systems being used for malicious purposes and protect the systems from unauthorized modification, loss, or disclosure. For example: The GSA Alaska telecommunications services contract states that the physical access point to the telecommunications closet must be limited to personnel with appropriate identification. In addition, this contract requires the contractor to follow agency security procedures, such as having personnel sign into and out of physical locations and abide by escort procedures. Further, the contractor is required to ensure that all employees have identification that meets specific federal guidelines. The contract also states that subcontractors are subject to personal identity verification, and are to comply with applicable standards. The CMS call center operations contract requires a multifactor authentication—which requires two pieces of identifying information to log in—for call center employees to remotely access sensitive government-owned data on computer systems. In addition, the contract requires all employees who have access to data systems and personally identifying information to pass a background check. Further, the contract reduces the ability of employees to copy or transmit a customer’s personal information by requiring the contractor to ensure a secure floor that prohibits cell phone usage or note taking on paper. According to the CMS officials, the call center employees are required to leave all personal items, such as cell phones, in lockers, and the scripts they reference during calls are laminated. In addition, the supervisor on duty checks desks to ensure personal items are not present. According to CMS officials these steps help protect callers’ sensitive data, such as their medical information. The DISA contract for the day-to-day operations for the DOD Information Network states that the contractor must have a plan in place that includes physical security and protection of the system infrastructure. Security Management Controls. These controls establish a framework and continuous cycle for assessing data systems for security weaknesses, implementing security procedures, and monitoring the procedures to ensure adequate protection of sensitive or critical resources. A variety of security management control requirements were included in the selected contracts. For example: The GSA Networx contract, which provides a variety of network services to the federal government, states that a contractor must comply with FISMA and NIST standards. According to a GSA contracting official, contractors have to show that their information systems are adequately protected against cybersecurity threats before performing any services on a task order. Government officials will certify the system once they agree the system is adequately protected. This certification occurs after a contract has been awarded, but before work begins. According to a government official, these systems are periodically reviewed and monitored to ensure the systems stay protected. The DISA contract for the day-to-day operations for the DOD Information Network requires the contractor to assist the government to ensure that all networks and information systems are accredited in accordance with DOD’s Certification and Accreditation Program, which requires certain cybersecurity protections are in place. This contract also requires that the contractor or any subcontractor implement safeguarding requirements to protect covered contractor information systems, such as limiting access to authorized users, verifying and controlling connections to and use of external information systems, authenticating the identities of users before allowing access to information systems, and limiting physical access to systems and equipment. The contract also requires that the government have access to the contractor’s databases in order to carry out vulnerability testing and audits to safeguard against threats to the integrity, availability, and confidentiality of data or to the functions of information technology systems operated on behalf DISA or DOD. The DISA contract that provides priority telecommunications for executive branch staff in case of an emergency requires that the contractor must identify and analyze threats to the system on a 24- hours-a-day, 7-days-a-week basis, and offer solutions to fix identified weaknesses. DISA contracting officials stated that threats to the data systems are mitigated before contract award because the government is trying to prevent attacks and not just react to threats. Additionally, the contractor has to provide periodic maintenance of the installed networking infrastructure to certify proper functioning of the equipment. The CMS call center operations contract requires that the contractor perform annual vulnerability assessments, which includes tests that attempt to break into the contractor’s systems, the contractor’s system programs, and the contractor’s facility in accordance with agency specific standards. Contingency Planning and Restoration of Services. Planning for how to provide continued or restored services when system interruptions or problems occur is necessary because even a minor interruption can result in lost or incorrectly processed data. NIST has published guidance on the contingency planning process. Several of the contracts we reviewed required the contractor to have contingency plans in place in case of any disruption of services and specified how quickly services are to be restored if disrupted. For example: The GSA Alaska telecommunication services contract requires that the contractor restore service within 4 hours of any system disruption. According to the contracting officer, not restoring the system within 4 hours, unless a longer time is agreed to by the contracting officer, would be considered a performance issue and would count against the contractor during its performance review. This includes restoring any equipment, transmission station, circuit, or area that the government deems critical. The DISA DOD Information Network services contract requires the contractor to ensure that there is no disruption of services on the government networks during routine maintenance of systems, during system upgrades, or while the system has vulnerability testing, among others. The CMS call center contract requires that the contractor develop a business continuity plan that identifies and prioritizes critical systems and recovery strategies, as well as a consolidated business continuity plan. The consolidated plan needs to account for the interdependence between applications and operations and address procedures for sustaining essential business operations while recovering from significant disruptions, including contingencies for a catastrophic loss of equipment required to deliver its services. Restricting the Purchase and Use of Equipment from Identified Countries or Manufacturers. As we reported in July 2018, reliance on a global supply chain introduces multiple risks to federal information systems, including the installation of intentionally harmful hardware or software, reliance on malicious service providers, or installation of hardware or software containing unintentional vulnerabilities such as defective code. NIST published several guidelines to help federal agencies select controls and activities relevant to managing supply chain risk. Our selected contracts included several requirements related to mitigating supply chain risks. For example: Under the CMS call center contract, certain government-provided systems are supplied to the contractor to meet the requirements of the contract. By providing the systems, the government controls what type of equipment is being used and reduces the risk that any compromised equipment is introduced in its network. The DISA contract for the day-to-day operations for the DOD Information Network requires the contractor to use the DISA-approved products list for purchasing equipment for use in repair and similar functional activities. According to a DISA contracting official, this list is continuously updated to make sure that vulnerable products are not being purchased. In addition, this contract specifically prohibits contractors from using certain Chinese-manufactured equipment or services utilizing that equipment. This requirement extends to any equipment or services provided by subcontractors. According to the contracting officer, the contractor requests confirmation from its subcontractors that they are not using prohibited equipment. The contractor then notifies the contracting officer that prohibited equipment is not used on the contract. All five contracts include a restriction on purchases of most goods and services from specific countries, such as Cuba and Iran. The contract requires this restriction to flow down to any subcontractor. Privacy for Personally Identifiable Information. The CMS call center contract involves handling personally identifiable information, such as private medical information. As part of the contract terms, contractor personnel are required to follow specific health care privacy requirements to protect customers’ personal health information. In addition, the contract includes agency-specific requirements to protect personally identifiable information and personal health information. Observations on Offshoring. The five contracts we reviewed included requirements that limited the contractors’ opportunity to use offshoring for labor. The DISA contract for the day-to-day operations for the DOD Information Network stipulates that only U.S. citizens can be hired to perform services. According to the contracting officer, the DISA contract that provides priority telecommunications for executive branch staff in case of an emergency also requires that the contractor hire only U.S. citizens. In addition, the GSA Networx services contract states that work on some orders may require U.S. citizenship. The GSA Alaska telecommunications services contract states that contractor personnel may be required to successfully pass a background check to work in controlled areas under the contract. The CMS call center contract requires that the call center be located in a facility within the continental United States. According to officials, this requirement helps protect data and privacy information. CMS officials stated that generally for call center contracts the contractor must obtain prior approval from the agency’s contracting officer in writing if it wants to subcontract or move operations to a location outside of the United States or its territories. According to CMS contracting officials, they have never received a request to offshore call center operations. We provided a draft of this product to DOD, DOL, GSA, and HHS for review and comment. DOL, GSA, and HHS provided technical comments, which we incorporated as appropriate. DOD informed us that it had no comments on the draft report. We are sending copies of this report to the appropriate congressional committees and the Secretaries of Defense, Labor, and Health and Human Services and the Administrator of General Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact William T. Woods at (202) 512-4841 or woodsw@gao.gov or Cindy S. Brown Barnes art (202) 512-7215 or brownbarnesc@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Our review of data from the Bureau of Labor Statistics (BLS) Quarterly Census of Employment and Wages shows that employment in the telecommunications sector overall declined 12 percent from calendar years 2014 through 2018, as illustrated in figure 4. In contrast, during the same 5-year period, total employment across all industries in the United States grew by 7 percent. According to BLS data, the decline in telecommunications employment has been underway since at least 2009. BLS projects this decline will continue through at least 2028. Department of Labor (DOL) data series on trends in employment are not designed to identify causes of employment changes. However, BLS officials and other researchers cited the role of technology as a possible cause of the decline in telecommunications employment. For example, BLS officials said the move toward newer technologies, such as satellite transmissions, has had an adverse impact on employment. Additionally, representatives of a major telecommunications contractor told us that technological advances either resulted in fewer employees being needed to perform specific functions or replaced previous manual operations with automated processes. In addition, the representatives stated that uses of artificial intelligence, such as smart networks and machine learning, facilitate tasks that in the past relied extensively on human labor. Finally, the effect of technology on employment in telecommunications has also been noted by an industry analyst. Employment in the telecommunications industry has been marked by job gains as well as losses in the last 5 years, although generally, losses have exceeded gains. BLS’s Business Employment Dynamics data capture the gross number of job gains from establishment openings and expansions and job losses from establishment closings and contractions across the U.S. economy. In the last 5 years, new jobs in telecommunications have been generated; however, job losses have exceeded job gains in almost every quarter since 2014, as shown in figure 5. The effect of offshoring on employment in telecommunications, if any, is unknown due to the absence of data. Although U.S. employment in telecommunications has declined, the role of offshoring as a potential contributor to the decline is unclear, due to a lack of data and because offshoring is one of many factors that can affect employment levels. According to BLS officials, no public or private data exist that estimate the extent of offshoring in this or any industry sector. BLS officials told us that little interest has been expressed in collecting data on offshoring. They noted that if BLS were to develop a new survey aimed at measuring the extent of offshoring, technical issues—including determining what data should be collected that would give such insight—would need to be resolved. Furthermore, the BLS officials stated that they did not identify offshoring as a factor contributing to recent employment declines in telecommunications based on their industry research, which included interviews with industry specialists. According to BLS researchers, offshoring is one of many factors that can affect job gains and losses for occupations within an industry. In a 2008 article estimating the susceptibility of different occupations to offshoring, BLS researchers cautioned that “no attempt should be made to attribute growth rates in an occupation, or differences between occupations, to offshoring.” Overall, employment in call centers has fluctuated recently, but appears relatively stable over the period of calendar years 2014 through 2018, though it remains higher than during the previous 5 years. As shown in figure 6, after rising for a few years, in 2018 employment returned to a level slightly below that reached in 2015. According to BLS officials, employment in the business support services industry, which includes call centers, is projected to increase modestly through 2028. BLS officials said it is not clear why employment in call centers declined in 2018. Although GAO and others have identified call centers as potentially subject to offshoring, the full extent of offshoring occurring within the U.S. call center industry is unknown. Some anecdotal evidence exists about the purported growth of offshore call centers that serve U.S. companies. However, we found no analyses in our literature review regarding the effects of offshoring on call center jobs overall. Just as with telecommunications, many other factors potentially affect call center employment, such as technological advances. For example, interactive voice response technology has been used to provide responses to simple inquiries, which to some extent may reduce or eliminate some call center work. Although we did not find studies that address the effects of offshoring on telecommunications and call centers specifically, the literature we reviewed discussed some characteristics of workers, services, and companies that potentially influence offshoring decisions, in general, across industries. As such, offshoring decisions may involve, but are not limited to, considerations of the presumed interchangeability of U.S.- based and overseas workers, workers’ languages and cultures, technical requirements for the services being offshored, and companies’ ability to manage offshoring. This report addresses: (1) total federal obligations for telecommunications and call center contracts; (2) worker protections identified in selected telecommunications and call center contracts; and (3) data security and privacy protection requirements identified in these contracts. This report also includes observations on the extent and effect of offshoring. For the purposes of this report we define “telecommunications” to encompass the preparation, transmission, communication, or related processing of information that can be in the form of voice, video, or data; “call centers” to include centers handling inquiries via multiple channels such as telephone, Web page, e-mail, and postal mail; and “offshoring” to mean the obtaining of goods or services from non-U.S.-based employer subcontractors located outside of the United States and its territories that use non-U.S. citizen employees. In addition, we gathered information on employment trends for the telecommunications and call center industries for calendar years 2014 through 2018. To determine the level of federal obligations for telecommunications and call centers, we used data from the Federal Procurement Data System- Next Generation (FPDS-NG) for fiscal years 2014-2018. We identified obligations for telecommunications and call center contracts by using the associated North American Industry Classification System (NAICS) codes for these industry sectors. As defined in the NAICS manual, telecommunications contracts are identified as having a NAICS code starting with the prefix 517, and call center contracts are identified as having a NAICS code starting with the prefix 56142. To identify examples of worker protections and data security and privacy protections in federal contracts, we selected a nongeneralizable sample of five contracts from three agencies with some of the highest obligations for telecommunications and call center contracts during fiscal years 2014 through 2018. Specifically, we selected (1) the Department of Defense (DOD) because it obligated the highest amount for telecommunications contracts; (2) the Department of Health and Human Services (HHS) because it obligated the highest amount for call center contracts; and (3) the General Services Administration (GSA), which is among the top ten agencies with the highest amounts for telecommunications contracts, because it provides a government-wide contract available for agencies to place orders for telecommunications and call centers. We then identified the component within each agency that obligated the most for these services or that provides a large government-wide contract vehicle. The components were DOD’s Defense Information Systems Agency, GSA’s Federal Acquisition Service, and HHS’s Center for Medicare and Medicaid Services (CMS). We selected contracts that included a large call center and a large government-wide telecommunications contract vehicle. We also selected a variety of telecommunications contracts that were among the highest obligations during fiscal years 2014 through 2018, and represented different types of telecommunications services procured during the period, such as wired and wireless services. Table 2 provides a synopsis of the 5 contracts included in our review. We reviewed documentation from the five selected contracts, along with the relevant federal acquisition regulations for worker protections, data security and privacy protections, subcontracting, and offshoring. We interviewed cognizant contracting officials to clarify our understanding of the contract requirements we identified related to worker protection and data security and privacy protections. We also met with representatives from three contractors to obtain their insights into contracting with the government, relevant contract requirements, and industry trends. The purpose of our contract review was to illustrate the different worker protections and data security and privacy protections that may be included in these types of contracts. To address the employment trends in telecommunications and call centers and how they were affected by offshoring, we reviewed employment data from the Quarterly Census of Employment and Wages published by the Bureau of Labor Statistics (BLS) within the Department of Labor. The Quarterly Census of Employment and Wages program publishes a quarterly count of employment and wages reported by employers that covers more than 95 percent of U.S. jobs and is supported by quarterly reports from all private sector employers. We also reviewed data from BLS’ employment projections program, which draws from several BLS data collections as well as interviews with industry specialists and reviews of relevant articles to develop information about the labor market for the nation as a whole for 10 years in the future. In addition, we reviewed BLS’ Business Employment Dynamics data, which consist of a quarterly series of statistics on gross job gains and gross job losses for the entire economy. Gross job gains and gross job losses reveal some aspects of business dynamics, including establishment openings and expansions, and establishment closings and contractions. The quarterly data series include the number and percent of gross jobs gained by opening and expanding establishments, and the number and percent of gross jobs lost by closing and contracting establishments. Furthermore, we reviewed DOL data on layoffs collected by the Trade Adjustment Assistance program that are considered to be caused by trade through shifts in production or services to a foreign country. While the data include layoffs in telecommunications, DOL officials did not believe the data would be useful for this report. Specifically, the data do not necessarily reflect all layoffs in a given sector, but only those associated with requests for investigations by DOL as to the role of trade in the layoff, and initial estimates of affected workers—those facing layoffs and those threatened by layoffs—are not representative. To review the potential effect of offshoring on employment trends, we performed a literature review of selected economic research and other relevant articles, and discussed the results with DOL officials. To identify relevant material—including reports, dissertations, working papers, and journal articles—we searched databases including the National Bureau of Economic Research, Bureau of Economic Analysis, Business Source Corporate Plus, EBSCO, EconLit, ProQuest (including dissertations and theses), Social SciSearch, Public Affairs Information Service via DIALOG, Lexis Trade files, SSRN, WorldCat, National Academies Press, and National Technical Information Service. We used search terms that included variations on “telecommunications” and “call centers,” as well as “offshoring,” “offshore outsourcing,” “labor market impact,” “worker displacement,” “layoffs,” “employment trends,” and “hiring trends.” From our initial literature search we selected 13 documents for more in-depth review. We excluded references that addressed the effects of offshoring on non-U.S. economies and labor forces, or were otherwise beyond our scope, such as working conditions, work flow, collective bargaining, customer service, service quality, or training in call centers. Based on this research, we identified reasonable observations about employment trends and offshoring in telecommunications and call centers. As noted in this report, research on the questions addressed in this report reaches different conclusions. The relevant research that we reviewed provided some insights on how offshoring could potentially affect the telecommunications and call center industries, but provided no information regarding the extent of the impact. Because of this and other data limitations, we were unable to determine the extent to which offshoring may be occurring and what effect offshoring is having on the telecommunications and call center industries. We conducted this performance audit from March 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Agencies reported obligations for approximately 1,500 different contractors that provided telecommunications products and services each year during fiscal years 2014 through 2018. Ten of these contractors accounted for 52 percent of obligations for telecommunications contracts in fiscal year 2018. The top contractor received 10 percent of the total telecommunications obligations in fiscal year 2018, and was also one of the top three contractors in the preceding fiscal years. Figure 7 shows the top 10 telecommunications contractors’ based on total obligations during fiscal years 2014 through 2018. Agencies reported obligations for approximately 133 different call center contractors each year during fiscal years 2014 through 2018. Ten contractors accounted for 94 percent of obligations for call centers in fiscal year 2018; with one contractor accounting for 83 percent of total obligations for the 5-year period we reviewed. Figure 8 shows the top 10 telecommunications contractors’ based on total obligations during fiscal years 2014 through 2018. Although the amount of obligations each year changed, these contractors were generally among the top 10 across all 5 fiscal years. In addition to the contacts named above, Candice Wright (Assistant Director), Blake Ainsworth (Assistant Director), R. Eli DeVan (Analyst-in- Charge), Pedro Almoguerra, Sarah Cornetto, Lorraine Ettaro, Suellen Foth, Stephanie Gustafson, Victoria Klepacz, Chris Morehouse, Patricia Powell, Miranda Riemer, Roxanna Sun, Alyssa Weir, and April Yeaney made key contributions to this report.", "summary": "The federal government relies on an extensive global telecommunications network to carry out operations and provide information to the public. These networks and call centers, which handle public inquiries, are often maintained or supported by contractors. Concerns have been raised about the extent to which federal contractors are subcontracting or offshoring work, and have in place worker protections and mechanisms to secure the technologies and the data they handle. GAO was asked to review aspects of contracting for federal telecommunications and call centers, including the extent of subcontracting and offshoring. This report provides information on, among other things (1) federal obligations on telecommunications and call center contracts, (2) worker protections identified in selected contracts, and (3) data security and privacy protections identified in selected contracts. GAO analyzed federal procurement data for fiscal years 2014 through 2018 (the most recent available), reviewed a nongeneralizable sample of five contracts from three agencies with significant telecommunications and call center procurements to identify worker protections and data security and privacy protections; and interviewed relevant officials and federal contractors about contracting and industry trends. The federal government obligated over $30 billion for telecommunications contracts and almost $4 billion for call center contracts from fiscal years 2014 through 2018. On average for the 5-year period, telecommunications and call center obligations were a nominal portion of total federal spending—accounting for 1.2 percent and less than 0.2 percent, respectively. Defense agency obligations accounted for the majority of federal telecommunications spending to support a range of information capabilities across the full spectrum of military operations. The Department of Health and Human Services accounted for the majority of call center obligations to support customer inquiries about Medicare and the health insurance marketplace, among other services. Federal procurement data systems do not collect information that can provide insight into the extent of subcontracting or offshoring—including for telecommunications and call center contracts—because they were not designed to do so. GAO's review of selected contracts found that four of the five contracts expressly stated that some or all work must be performed within the continental United States or by U.S. citizens. GAO identified several examples of worker protection requirements in the five selected contracts, generally falling into the areas of wages and hours, workplace safety and health, and protections against certain employer actions. With regard to data security and privacy protections, the five selected contracts GAO reviewed included requirements to limit access to data systems and data maintained, establish security management procedures for and monitoring of data systems, or establish contingency plans for how to provide continued or restored services when system interruptions or problems occur.", "document_type": "gao"}
{"report": "The MHS is a complex organization in which responsibility for health care delivery is shared among the military departments—the Army, the Navy, and the Air Force—and the Defense Health Agency (DHA), with oversight from the Office of the Secretary of Defense and advice from the Joint Staff. As such, several leaders have responsibility for DOD’s medical workforces, their readiness, and the MTFs to which many of them are assigned. Specifically: The Under Secretary of Defense for Personnel and Readiness is the principal staff assistant and advisor to the Secretary and Deputy Secretary of Defense for health-related matters and, in that capacity, develops policies, plans, and programs for health and medical affairs. The Secretaries of each military department are responsible for organizing, training, and equipping military forces as directed by the Secretary of Defense as well as responsibilities related to ensuring the readiness of military personnel, and providing military personnel and other authorized resources in support of the combatant commanders and the DHA. The Surgeon General of each respective military department serves as the principal advisor to the Secretary of the military department concerned on all health and medical matters of the military department. The Assistant Secretary of Defense for Health Affairs (ASD(HA)) serves as the principal advisor for all DOD health-related policies, programs, and activities. He or she has the authority to develop policies, conduct analyses, provide advice, and make recommendations to the Secretary of Defense and others; issue guidance; and provide oversight on matters pertaining to the MHS. Further, the ASD(HA) prepares and submits a DOD unified medical program budget which includes, among other things, the Defense Health Program budget to provide resources for MTFs and the TRICARE Health Program. The Director of the DHA manages, among other things, the execution of policies issued by the ASD(HA) and manages and executes the Defense Health Program appropriation. The Director of the DHA is also responsible for the TRICARE Health Program. In December 2016, Congress expanded the role of the DHA by directing the transfer of responsibility for the administration of each MTF from the military departments to the DHA. By no later than September 30, 2021, the Director of the DHA will be responsible for the administration of each MTF. Specifically, the Director of the DHA will be responsible for budgetary matters, information technology, health care administration and management, administrative policy and procedure, and military medical construction, among other things. As of October 2019, the DHA had assumed administration and management responsibilities for all MTFs within the United States. In fiscal year 2019, DOD’s Defense Health Program-funded workforce numbered over 174,000 personnel, comprising active-duty servicemembers from each military department (the Army, the Navy, and the Air Force), federal civilian employees of DOD, and private-sector contractors. These personnel included health-care providers, such as physicians (both primary and specialty care providers), nurses, and enlisted specialists who assist with medical procedures, and administrative and support personnel. MTFs vary in size and capabilities from small clinics, to ambulatory surgery centers, hospitals, and medical centers. Clinics generally provide primary-care services, which may include pediatrics at some locations. Other health-care services at clinics range from urgent care, women’s health, occupational health, and behavioral health, to orthopedics and other specialty services depending on location and population demand, according to MHS officials. Some clinics treat only active-duty servicemembers. Other clinics, along with hospitals and medical centers, also serve other eligible beneficiaries, including military family members, retirees, and some civilian employees of DOD. DOD’s hospitals provide emergency medicine, inpatient care and other specialty care services depending on population demand, according to MHS officials. For example, they generally offer surgical capabilities and labor and delivery services. According to DOD Instruction 6000.19, the primary purpose of MTFs is to support the readiness of the military services. In addition, the guidance states that the size, type, and location of MTFs must further this readiness objective. Further, each MTF must spend most of its resources supporting wartime skills development and maintenance for military medical personnel, or the medical evaluation and treatment of servicemembers. To that end, MTFs serve as training and readiness platforms for active-duty medical providers in two respects. First, many MTFs host graduate medical and dental education programs for physicians and dentists, and other training and education programs for medical providers. Graduate medical education (GME) programs train physician specialties through internships, residencies, and fellowships, thereby helping maintain the necessary pipeline of physicians to staff the MTFs and to deploy in support of military operations. The MTFs host non-GME training and education programs for other medical personnel, such as physician assistants, nurses, and enlisted technicians, which help them attain and maintain their skills. Second, day-to-day patient care at MTFs helps maintain the clinical skills and readiness of medical providers. The military departments track clinical readiness for providers using a series of checklists for deployable medical specialties. In addition, since 2018, DOD has piloted a clinical readiness metric for select physician specialties that provide combat casualty care. To meet the metric, a physician must attain a minimum threshold of points that indicate the complexity, diversity, and volume of patient care they provided. Finally, the MTFs also maintain data on physicians’ clinical workloads to measure their productivity against benchmarks and thereby approximate their clinical readiness. These clinical workload data are recorded as work Relative Value Units (wRVU), a metric of the level of professional time, skill, training, and intensity to provide a given clinical service. Under TRICARE, DOD maintains a purchased-care system of civilian providers to augment MTF capabilities. In each TRICARE region (East and West), DOD contracts with private-sector companies—referred to as managed-care support contractors—to develop and maintain networks of civilian providers and perform other customer service functions, such as processing claims, enrolling beneficiaries, and assisting beneficiaries with finding providers. The Director of the DHA awards and oversees the managed-care support contracts. TRICARE’s non-Medicare-eligible beneficiaries generally obtain coverage through two health plan options—TRICARE Prime (a managed-care option) and TRICARE Select (a self-managed, preferred provider option). All active-duty servicemembers are required to enroll in the Prime option, while other TRICARE beneficiaries may choose it. Prime enrollees receive most of their care from MTFs and also may receive purchased care from network civilian providers. Prime has the lowest out- of-pocket costs for beneficiaries, as care provided at MTFs does not have a copayment. TRICARE Prime has five access standards that set requirements for (1) travel time to provider sites, (2) appointment wait time, (3) availability and accessibility of emergency services, (4) composition of network specialists, and (5) office wait time. TRICARE Select beneficiaries are able to obtain health care from network and non-network providers. They can also receive care from MTFs, but they have a lower priority for receiving care than TRICARE Prime beneficiaries and are seen on a space-available basis. Section 703(a) of the NDAA for Fiscal Year 2017 added section 1073d to title 10, United States Code, which set forth various requirements for MTFs. To support the medical readiness of the armed forces and the readiness of medical personnel, the Secretary of Defense is required to maintain three types of MTFs—medical centers, hospitals, and ambulatory care centers (or clinics). All of these MTFs are required to provide specific health services required to maintain medical readiness. Hospitals are to be located in areas where civilian health care facilities are unable to support the health care needs of members of the armed forces and covered beneficiaries. Both hospitals and clinics are to provide limited specialty care that is cost-effective or is not available at civilian health care facilities in the area. In 2017, DOD appointed a Reform Leader for Health Care Management. Among other responsibilities, the Reform Leader led a work group to address Section 703 (hereafter, we refer to this as the 703 Work Group). The 703 Work Group included representatives from the Office of the ASD(HA), DHA, Joint Staff, the military services, and the TRICARE Health Plan. Together, the 703 Work Group members led DOD’s efforts to address section 703(c) of the NDAA for Fiscal Year 2017 by updating its 2016 Report on Military Health System Modernization (“the Modernization Study”) to address the future restructuring of MTFs pursuant to 10 U.S.C. § 1073d; determine the scope of its review of MTFs in the United States (i.e., identify which MTFs to evaluate for the Plan, as opposed to those to evaluate at a later date); develop MTF-specific recommendations for whether to restructure an MTF and in what ways to do so by developing and applying a methodology to assess each MTF in accordance with 10 U.S.C. § 1073d; and draft the final section 703(d) Plan to Congress delineating the restructuring actions it determined. In making determinations for selected MTFs, the 703 Work Group drafted a “Use Case” for each MTF summarizing potential restructuring actions and their analytical basis. The Work Group presented each MTF “Use Case” for review to a team of senior DOD leaders, including the Under Secretary of Defense for Personnel and Readiness, the ASD(HA), the undersecretaries of the military departments, and military service leaders, among others. When the senior leaders agreed on the restructuring actions for the MTFs, the 703 Work Group presented those determinations to the Secretary of Defense for approval. In recent years, DOD leaders have taken steps to refocus the MTFs as platforms for sustaining high-quality combat casualty care and the operational readiness of active-duty medical providers while increasing efficiency, in part by responding to congressional mandates. In 2016, for example, DOD submitted the Modernization Study to Congress in response to section 713 of the Carl Levin and Howard P. “Buck” McKeon National Defense Authorization Act (NDAA) for Fiscal Year 2015. Its main goals were to increase medical force readiness to support military operations and achieve cost savings. The Modernization Study included an MTF analysis of 24 hospitals to determine whether they should maintain inpatient capabilities or birthing centers. It recommended changes for 10 of the 24 hospitals, including closing inpatient services in whole or part at eight of them. In September 2016, we reported that the Modernization Study’s recommendations positioned DOD to improve the effectiveness and efficiency of the MHS, but there were shortcomings in its methodology. To strengthen any future assessments of MTF changes, we recommended that DOD describe steps taken to assess the reliability of supporting data. DOD concurred with the recommendation and has taken some steps to implement it. In response to other provisions in the NDAA for Fiscal Year 2017, DOD has made reforms aimed at improving the MHS focus on readiness. Our prior work has made recommendations to address gaps in those reforms. For example, in February 2019 we reported that DOD had not determined the required size and composition of its operational medical and dental forces who support the wartime mission or submitted a complete report to Congress, as required by section 721 of the NDAA. We recommended that DOD establish joint planning assumptions and a method for assessing efficiencies and risk, use them to determine its operational medical and dental requirements, and report the requirements to Congress. DOD concurred but had not implemented the recommendations as of May 2020. We also reported in February 2019 that DOD had begun initiatives to maintain the wartime readiness of medical providers in response to section 725 of the NDAA for Fiscal Year 2017. However, DOD’s methodology was limited with respect to a key initiative—the use of a metric to assess medical providers’ clinical readiness. We made three recommendations to improve DOD’s application of the metric. DOD concurred but had not implemented them as of May 2020. According to MHS leaders, efforts to identify the required number of operational medical personnel and the level of readiness they must maintain (pursuant to sections 721 and 725) were foundational steps toward section 703 of the NDAA for Fiscal Year 2017. A list of other related products is also included at the end of this report. The DOD 703 Work Group’s methodology for determining MTF restructuring actions was thoroughly documented and prioritized cross- cutting statutory elements, including support for military readiness, adequate nearby civilian health care, and cost-effectiveness. However, the group based key parts of its methodology on some incomplete and inaccurate information. In reviewing the 703 Work Group’s methodology for determining MTF restructuring actions, we found that the group prioritized cross-cutting elements from 10 U.S.C. § 1073d to guide its approach. Its methodology to evaluate each selected MTF consisted of data analyses and interviews with officials from the MTF and its host installation. The 703 Work Group based its MTF evaluation determinations on, by order of priority, the (1) support each MTF provides to servicemembers’ medical readiness and the readiness of military medical providers, (2) adequacy of civilian health care facilities and providers to support the health care needs of servicemembers and other beneficiaries through purchased care near where each MTF is located, and (3) the cost-effectiveness of direct care services at the MTF relative to purchased care in the area. In addition to thoroughly documenting this methodology for evaluating the MTFs, the 703 Work Group documented the basis for the resulting conclusions. Servicemembers’ and military medical providers’ readiness. According to 703 Work Group leaders, as a first step in developing a methodology for evaluating MTFs for restructuring actions, they decided on a strategy they believed would prioritize MTF support to servicemembers’ medical readiness and the readiness of military medical personnel. To that end, the Work Group established minimum criteria to determine an MTF’s level of support to readiness. In most cases, the Work Group determined that MTFs should maintain certain minimum capabilities for servicemembers’ individual medical readiness, including primary care and, on a case-by-case basis, specialty services such as behavioral health and physical therapy. In addition, through site visits and interviews with MTF and installation personnel, the Work Group determined that certain MTFs should maintain urgent and emergency care services if they support a large training component on an installation. The other element of the 703 Work Group’s strategy to prioritize readiness was to evaluate the contribution of each MTF toward the clinical readiness of military medical providers and recommend restructuring actions on the basis of attaining minimum standards therein. In particular, our review of methodology documents revealed the Work Group prioritized MTFs’ support to the readiness of combat casualty care physicians. In doing so, the Work Group analyzed clinical workloads (e.g., wRVUs) and readiness metrics to identify which MTFs supported the physicians’ attainment of minimum thresholds. Finally, the Work Group determined that MTFs that host a GME program for training a combat casualty care or other physician specialty, or a graduate dental education program, should preserve the inpatient services required to continue the program. Adequacy of nearby civilian health care. A secondary criterion the 703 Work Group applied in its methodology for evaluating MTFs for restructuring was its determination of whether civilian health care facilities and providers in proximity to a given MTF (i.e., TRICARE network providers as well as non-network providers) were adequate to absorb an increased demand for certain health care services from the MTF—that is, whether DOD could use purchased care from civilian providers to replace care divested from a restructured MTF. According to Work Group officials, their strategy in applying this criterion was to reduce or eliminate health care services from MTFs if those capabilities (1) were not needed for readiness purposes and (2) could be adequately replaced with civilian facilities and providers through purchased care. In making this determination, the 703 Work Group conducted two assessments for each evaluated MTF. These assessments applied different criteria and assumptions to determine the adequacy of civilian health care, as shown in table 1. In addition, the Work Group supplemented the assessments by interviewing MTF and installation personnel to gain their perspectives about the availability of civilian care nearby. Cost-effectiveness of direct-care services at MTFs. Last in order of priority was the 703 Work Group’s determination of whether the MTF- delivered health care is cost-effective relative to nearby purchased care. Specifically, the Work Group assessed whether the cost per unit of health care delivered at each evaluated MTF was less than, equal to, or greater than the unit cost of purchased care. According to Work Group officials, these assessments supplemented the criteria on readiness and civilian health care adequacy by lending a resource-informed perspective to the overall methodology. A determination that an MTF’s unit costs exceeded those of nearby purchased care would confirm to the Work Group that it should consider replacing health care services from that MTF with purchased care, provided that the group had first determined that the corresponding capabilities (1) were not needed to support readiness, and (2) could be adequately replaced with purchased care from civilian health care providers nearby. Table 2 below illustrates an example of the 703 Work Group’s calculation of cost-effectiveness at one MTF it evaluated—the 2nd Medical Group outpatient clinic at Barksdale Air Force Base in Louisiana. In this case, the MTF’s unit cost in fiscal year 2017 was more than two times the cost of purchased care. These results confirmed the Work Group’s recommendation that some of the MTF’s capabilities should be replaced with purchased care—specifically, the health care services that it provided to non-active-duty servicemembers. Notwithstanding the positive aspects of DOD’s methodology for evaluating MTFs previously discussed, our review found that information the 703 Work Group considered was sometimes limited in completeness, accuracy, or both. Specifically, the Work Group (1) conducted limited assessments of MTFs’ readiness support to military primary care and nonphysician medical providers, and did not include, as part of its methodology, (2) complete and accurate data about the quality of and access to purchased care from civilian providers, or (3) alternative assumptions that could affect the perceived cost-effectiveness of MTF- provided direct care. The 703 Work Group conducted limited assessments of MTFs’ support for the readiness of military primary care physicians and nonphysician medical providers, including nurses, physician assistants, and enlisted medical and surgical specialists, which constitute a substantial portion of DOD’s medical forces. As discussed previously, the Work Group prioritized assessments of MTFs’ support to combat casualty care physicians’ readiness. For military primary care providers, the Work Group determined whether a minimum amount of patient care workload (i.e., RVUs) was available at each MTF to support productivity goals. This was due in part to the fact that DOD has not developed a clinical readiness metric for primary care and nonphysician providers as it has for combat casualty care providers, according to Work Group officials. Unlike a clinical readiness metric, a productivity goal does not account for the types of workload needed for readiness. According to MTF medical providers, they could meet their productivity goal as their MTF restructures, but doing so would not ensure that they addressed diverse and complex medical issues needed to maintain their clinical skills. MHS senior leaders and MTF officials, including providers, expressed concern that opportunities to treat diseases and nonbattle injuries will be limited in MTFs that restructure to serve only active-duty servicemembers. We also found that the 703 Work Group did not assess the support that certain training and education programs provide to the readiness of medical personnel at evaluated MTFs. The Work Group surveyed each MTF within its scope to identify any graduate medical and dental education and non-GME training and education programs the facility hosts. The Work Group determined that nonprimary care GME and graduate dental education programs are essential to maintain at MTFs, but did not evaluate the readiness benefits of primary care GME and non- GME training to MTFs. We found that half of the MTFs identified for restructuring as active-duty clinics or for closure host one or more non- GME training program for nurses, nurse practitioners, and enlisted medical personnel, among others. Four MTFs that were deferred or identified for reduction in capabilities or closure either host or support a GME program for primary care physicians. MTF officials we interviewed expressed concerns about the effects on military providers’ readiness from reducing or displacing the programs. However, DOD’s Plan states that any effects on GME and non-GME training programs will be addressed later in a next phase of executing MTF restructuring transitions, as discussed later in this report. Although DOD assessed the availability of civilian health care providers and facilities in proximity to MTFs, as described above, our review of DOD’s assessments found that information gathered and applied in the course of its methodology was sometimes incomplete and inaccurate. Specifically, the information we reviewed did not consistently account for the quality of available civilian health care providers in proximity to MTFs and the extent to which those providers meet access-to-care standards, as described in detail below. As a result, DOD’s assessments may have included providers of lower quality health care and those who do not meet DOD’s access-to-care standards. Including such providers in its assessments means that DOD’s conclusions could be overestimated regarding the adequacy of civilian health care providers in proximity to some MTFs. Quality of available care near MTFs. The 703 Work Group’s assessments did not consistently account for the quality of available providers located in proximity to each MTF. Although the TRICARE Health Plan assessments documented and considered patient satisfaction scores and quality ratings for hospitals from the Centers for Medicare & Medicaid Services, its assessments of individual providers did not contain information about quality of care. The independent contractor’s assessments did not include any information about the quality of available providers it identified. Instead, DOD generally assumed that all identified providers were of sufficient quality. Officials from the 703 Work Group stated that they sometimes discussed the quality of available civilian health care during their site visits and interviews with MTF officials. However, our review found that quality of care was not consistently documented or considered for decision-making purposes. For example, in our review of 11 selected MTFs, we found that the Work Group documented and considered the quality of available civilian health care in proximity to one of the 11 MTFs—Bayne-Jones Army Community Hospital at Fort Polk, Louisiana. In this instance, the Work Group’s information about the variable quality of civilian health care near Fort Polk led to their determination that available care was not yet adequate to restructure the MTF. Other MTF officials discussed with us concerns they had about the quality of purchased care from some civilian providers. Similarly, a recent study found that TRICARE-insured families were less likely to report accessible or responsive care compared to civilian peers, whether commercially or publicly insured or uninsured. We have previously reported on concerns about DOD’s information about the quality of purchased care. In September 2018, we reported that the MHS does not monitor and report on quality measures for individual civilian providers, although it does so for purchased care networks as a whole. In contrast, the MHS maintains numerous measures for its MTFs to track, assess, and report the quality of care and related patient outcomes. Access to an accurate and adequate number of current civilian health care providers in the TRICARE networks. DOD’s assessments of available civilian health care surrounding MTFs did not consistently apply complete and accurate information about patients’ access to care in terms of the number of available TRICARE providers in proximity to MTFs. DOD’s assessments relied on the directories of network providers (primary and specialty care) that are maintained by each of the regional TRICARE contractors. In November 2019, we reported on problems with the accuracy of these provider directories. Specifically, we reported that as of June 2019, the TRICARE West region contractor’s directory of network providers was 76 percent accurate and the East region’s was 64 percent accurate, according to DHA officials. However, we found that the TRICARE Health Plan verified the accuracy of the directory entries of network providers in proximity to only one of 77 MTFs—the Army’s Farrelly Health Clinic at Fort Riley, Kansas. In this instance, the list of available health care providers in proximity to Farrelly clinic was overstated by 26 percent because of duplicate listings and practices that had closed, among other factors. Likewise, MTF officials we interviewed stated that the TRICARE network directories in their area contained inaccurate information, such as outdated provider listings, and overstated the number of providers who were accepting new TRICARE patients. Access to providers within standards for patients’ drive time. DOD’s independent contractor assessments of available civilian health care providers (both TRICARE network and non-network providers) used some inaccurate information about those providers, especially their locations. For 11 selected MTFs, we found that about 56 percent of primary care providers and 42 percent of specialty care providers that an independent contractor identified in its assessment exceeded DOD’s drive-time standards for TRICARE Prime patients by varying degrees, as shown in figure 1. A certain portion of the providers listed for each of the 11 selected MTFs were outside the drive-time standards, based on our analysis. In addition, for each of the 11 selected MTFs, there was one or more inaccuracies in the provider listing, such as providers that were no longer in practice, duplicate providers, or those that were mischaracterized as a medical provider. MTF officials we interviewed also expressed concerns that the assessments did not account for traffic, including bridges and tunnels that create traffic chokepoints. In other words, they believed that even providers that appeared to be within drive- time standards based on mileage could actually exceed the standard depending on their location and time of day. Appendix III illustrates the results of our analysis in detail. DOD guidance states that beneficiaries should have a choice of health care providers that is sufficient to ensure access to appropriate, high- quality health care. In addition, Standards for Internal Control in the Federal Government require the use of quality information that is appropriate, current, complete, accurate, accessible, and timely to inform decisions. Such standards also require that an agency’s management define objectives clearly to enable the identification of risk and risk tolerances, to include defining objectives in specific and measurable terms to allow for the assessment of performance toward achieving objectives. Applied to DOD’s analysis of civilian health care available in proximity to MTFs, such information would include (1) health care quality and (2) accurate and complete access-to-care data for civilian providers identified in its assessments. DOD’s assessments were missing complete and accurate information about the adequacy of purchased care through civilian health care providers because 703 Work Group officials stated that their analyses were detailed enough for the purposes of decision-making about restructuring. Furthermore, they stated that they plan to “test” the purchased-care networks of civilian providers during the transition of MTFs to their restructured end states. Officials stated they believe such a test will reveal that the supply of providers will increase over time to meet an increased demand for care from DOD beneficiaries. However, recent research has reported concerns about growing nationwide shortages of physicians, including primary care providers—a type of civilian health care provider that will be in high demand from DOD beneficiaries as MTFs restructure. For example, a 2019 study projected physician demand will continue to grow faster than supply, leading to a projected nationwide shortfall of between 46,900 and 121,900 physicians by 2032. DOD officials stated they expect to monitor health care quality and patients’ access during the implementation of MTF transitions. While this will be a positive step, a better understanding of the quality of civilian health care providers and patients’ access to an adequate supply of such providers within drive-time standards could help DOD in its implementation planning for MTF transitions and its tests of network capabilities by illustrating areas of highest risk. Until DOD consistently captures and assesses information about the quality of available civilian health care and the extent to which such care has met and will continue to meet patients’ access standards, DOD leaders may not fully understand risks to the achievement of their objectives in restructuring future MTFs. DOD applied a single set of assumptions in comparing the cost- effectiveness of direct care delivered at MTFs to that of purchased care, as previously discussed. On the basis of our analysis of the assumptions and related data elements, and interviews with DOD officials, we found that the assumptions do not account for uncertainties that could affect conclusions about an MTF’s cost-effectiveness. Specifically, DOD made assumptions about the costs of military personnel salaries, the workload performed at MTFs, and the reimbursement rates for TRICARE that individually and collectively likely result in the underestimation of the cost- effectiveness of MTFs, as described in more detail below. Including the full cost of military medical personnel does not account for their value outside of MTFs in support of military operations. DOD included the full cost of active-duty medical personnel salaries when calculating the unit-level cost of MTF health care. This approach assumed that military personnel spend all their time in MTFs. However, military personnel who staff MTFs sometimes spend half or more of their time contributing to other military work activities, according to MHS officials. These personnel are essential for military operations outside the MTFs. Accordingly, DOD referred to its medical personnel as a “fixed cost” in the Modernization Study. In its interim report to Congress for section 721 of the NDAA for Fiscal Year 2017, DOD determined that about 111,000 active-duty personnel are essential to support its war plans as part of the operational medical force. By including the full cost of military personnel salaries in calculations of the unit-level cost of MTF-provided care, DOD has likely underestimated the cost-effectiveness of MTFs given the dual purpose of active-duty medical personnel who staff MTFs but spend time on other military duties and deploy to support operations. According to MTF officials, some portion of the cost of military personnel salaries could be considered an approximation of the “cost of medical force readiness” for the wartime mission, though an imperfect one. Units of health care may underreport workload performed at MTFs. DOD calculated the cost of delivering a single unit (e.g., wRVU), of care at its MTFs. Doing so likely underestimates the cost- effectiveness of MTFs given concerns that wRVUs may be underreported. MTF officials at all 11 locations and 703 Work Group members agreed that wRVUs are likely underreported within MTFs for various reasons. For example, some MTF services are not recorded in wRVUs, such as telehealth consultations, which comprise a growing share of patient encounters, according to MTF officials. In addition, in February 2019 we reported that source data for DOD’s clinical readiness metric for physicians—the same data MTFs use to record wRVUs—had not passed DOD audits for at least 3 years. Likewise, in April 2016, we reported concerns that providers’ workload at MTFs was not being accurately recorded. TRICARE reimbursement rates for purchased care will likely need to increase. In comparing the cost-effectiveness of direct care at MTFs to purchased care from civilian providers in the TRICARE networks, DOD applied current TRICARE reimbursement rates in its calculations. MTF and 703 Work Group officials, along with senior MHS leaders, agreed that DOD may need to pay higher reimbursement rates in the future to attract new, quality network providers as its reliance on purchased care for beneficiaries increases in proportion to the decrease in access to health care services at many MTFs. In addition, MTF officials and MHS leaders stated that utilization of some purchased-care services from civilian providers may be higher than utilization of like services at MTFs because civilian providers are not incentivized to manage health services and costs the way the MHS does. This means that the cost of purchased care could increase by more than expected if utilization rates increase. For example, a research study completed in 2017 found that an estimated 21 percent of purchased medical care in the United States is attributed to unnecessary costs associated with overtreatment. In 2010, the Institute of Medicine reported that unnecessary services are the largest contributor to waste in the U.S. health care system, and could have accounted for about $210 billion in excess spending in 2009. By applying a single set of assumptions as described above, DOD’s assessment of the cost-effectiveness of MTFs was not consistent with a key practice in economic analysis. Our assessment methodology for economic analysis states that a sensitivity analysis is an essential element of a high-quality analysis of cost-effectiveness. Likewise, a DOD instruction on economic analysis states that analyses of investment alternatives should include, among other things, a sensitivity analysis, accounting for uncertainties by testing the sensitivity of the economic analysis results against various factors. A sensitivity analysis examines the effects that changes to key assumptions have on the analytic outcome and are helpful to understanding risk. To demonstrate the effect of a single set of assumptions versus an analytical approach that explored other assumptions, we adjusted some of the assumptions for illustrative purposes. Our analysis found that for two of seven MTFs we evaluated in detail, changing DOD’s assumptions in only one respect—by subtracting military personnel salaries—would have materially affected DOD’s assessment about whether direct care at the MTF was more cost-effective than purchased care. Further, if military personnel salaries are excluded from the assessments and TRICARE reimbursement rates increase by 5 percent, three of the seven MTFs would be more cost-effective than purchased care. For illustrative purposes, figure 2 shows how alternative assumptions could change both the data (i.e., costs and wRVUs) and the results of the assessments as to whether an MTF is more or less cost effective than purchased care. According to officials from the 703 Work Group, they did not apply alternative assumptions to analyze cost-effectiveness because readiness and the adequacy of civilian health care were more important in their methodology, and they generally assumed that purchased care is less costly. However, DOD could still maintain its prioritization sequence while augmenting its cost-effectiveness analyses with a sensitivity analysis to help provide more complete information for decision-making and, in the future, for executing MTF transitions. Without doing so, DOD leaders may further jeopardize their understanding of risks to the achievement of their objectives in restructuring future MTFs. Through its section 703(d) Plan to Congress, DOD has identified actions that will be needed to facilitate MTF restructuring. These actions include 17 recommendations for enterprise-wide changes across MTFs, and various MTF-specific steps to mitigate risks at a local level. However, DOD’s Plan also poses challenges for the military departments and the DHA related to medical provider readiness and MTF staffing. DOD does not have a process for monitoring MTF restructuring transitions to address these challenges. Through its Plan, DOD has taken preliminary steps toward transition planning by identifying actions needed to facilitate the restructuring and MTF transitions. Specifically, in the Plan DOD (1) recommended certain actions across the collective enterprise of MTFs to facilitate their restructure to reduced health-care delivery capabilities, and (2) identified risks and potential mitigation strategies specific to each MTF identified for restructuring. According to the Plan and 703 Work Group officials, DOD will begin to plan these transitions in detail after a congressional review period is completed in May 2020. Enterprise-wide actions for transition planning for restructured MTFs. In its plan, DOD recommended 17 enterprise-wide actions to facilitate MTF restructuring transitions. The Plan noted that the actions apply across various installations and MTFs, and were not specific to any certain region, military service, or population size. According to 703 Work Group officials, these actions will be critical to the successful transition of MTFs to their restructured end states. We found that the actions described in the Plan are interdependent and have implications for military readiness, the adequacy of civilian health care in proximity to MTFs, and the cost-effectiveness of MTF health care, which are discussed throughout our report. Moreover, we found that the recommendations require actions and coordination from multiple organizations and stakeholders. For example, the Plan recommends structuring health care operations to support patients from the military’s Exceptional Family Member Program in relevant markets. The military departments are responsible for oversight of this Program, and their coordination with the DHA, MTF officials, and with military commands will be needed to ensure those patients’ medical needs are met. This and the other 16 actions are listed below in table 3, along with the stakeholders who may be needed to implement them. MTF-specific actions for transition planning. A second step the 703 Work Group has taken toward preliminary transition planning is to identify, for each MTF, certain salient risks and potential mitigation strategies. The Work Group documented these risks and mitigations in the “Use Case” for each MTF, which are included in appendices to the Plan. The “Use Cases” summarize, among other things, the recommended restructuring actions and the related analytical basis. Specifically, the “Use Cases” list risks and related mitigation strategies, noting that the lists summarize observations from the Work Group’s analyses but are not exhaustive. For some risks, the “Use Cases” noted that a mitigation strategy should be determined later. For example, a risk associated with patients’ changes in expectations—from getting health care at the MTF to getting care outside the base (from a civilian provider)— will need to be monitored and managed. Other risks and mitigation strategies identified in the MTF “Use Cases” are specific to an MTF’s concerns based on local considerations, such as the health care services they deliver, the type of active-duty population they serve, and their knowledge of the nearby civilian health care providers. For example, at Langley Air Force Base, where DOD is recommending that the hospital transition to an ambulatory surgery center (which would not have inpatient care or an emergency room), the “Use Case” for the MTF notes that the elimination of inpatient capabilities would decrease the MTF’s support to readiness. This means that future numbers and types of patients and health care services delivered at Langley’s MTF, once it becomes an ambulatory surgery center, may not sustain the clinical readiness requirements of the active-duty medical personnel assigned to work there—requirements that they must meet for deployments. Accordingly, the “Use Case” notes that a related mitigation strategy would create partnerships across area hospitals where Langley’s medical personnel may be able to supplement their MTF workload and maintain their readiness. As another example, the “Use Case” for Fort Polk’s MTF in Louisiana— where DOD is recommending the MTF maintain inpatient care in the short term but monitor the expansion of local hospitals to determine when inpatient services can be replaced with purchased care—noted several specific risks related to patients’ access to care given the remote, rural location. One risk pertains to labor and deliveries, and the “Use Case” noted that the two nearest off-base hospitals in the TRICARE network have had problems with fiscal solvency and there is an insufficient number of obstetricians. Accordingly, DOD’s mitigation plan is for the MTF to initially maintain pre- and postnatal care services to expectant mothers, while (1) monitoring the TRICARE network hospitals and (2) ensuring the MTF’s obstetricians have privileges at those hospitals for labor and delivery until the number of network obstetricians is sufficient. Despite DOD’s preliminary steps toward transition planning, including the mitigation strategies for risks previously discussed, its Plan poses other challenges for the military departments and the DHA in executing MTF restructuring. In particular, our review highlighted two interrelated challenges with respect to medical providers’ clinical readiness and MTF staffing levels. Military departments’ efforts to maintain the clinical readiness of primary care and nonphysician medical providers. As discussed earlier in this report, MTF officials stated that MTFs that restructure will not likely present the diverse and complex medical conditions needed to sustain the readiness of military primary care and nonphysician providers. A senior enlisted leader at one MTF observed that the staff would “have to be creative” to find the right mix of opportunities for enlisted personnel to gain the clinical experience they need to be ready to deploy as the clinic transitions to seeing only active-duty patients. MHS leaders we interviewed agreed with these concerns. To address MTF and MHS leaders’ concerns, 703 Work Group officials stated that the MHS would need to develop better metrics for primary care and nonphysician providers’ clinical readiness requirements, as the MHS has done for combat casualty care physicians. The officials also stated that another mitigation plan will be to allow MTFs that become active-duty clinics to diversify the patient population available to providers by treating some family members and retirees. MTF officials we spoke with were encouraged that continuing to treat some family members and retirees could help address the provider readiness shortfalls they believe are inherent to becoming an active-duty clinic. However, they and senior MHS leaders were concerned about the prospect of differentiating among such beneficiaries in terms of who may be eligible for MTF care at an active-duty clinic. To that end, officials stated that having the DHA clarify its roles and responsibilities in executing this flexibility will be a helpful step. To address challenges in maintaining the clinical readiness of medical providers assigned to MTFs that restructure, 703 Work Group officials stated that existing MHS partnerships with civilian hospitals and the Department of Veterans Affairs should be sufficient for MTF providers along with other available mechanisms, such as temporary duty at other MTFs. However, MHS leaders stated that existing civilian partnerships, in particular, may not have sufficient capacity to take on additional military medical personnel. As a result, the leaders believe they may need to expand partnerships to accommodate the expected increase in demand from military providers for on-the-job readiness training as MTF capabilities decrease during restructuring transitions. Furthermore, MTF officials we interviewed had mixed opinions about the readiness benefits they derived from their experiences with civilian hospital partnerships and training at other MTFs. DHA and the military departments’ ability to fully staff the MTFs. According to MTF officials, sending their medical providers to work outside their assigned MTF in support of clinical readiness, though temporary, creates another challenge by reducing providers’ availability to the MTFs. As more providers require such experience due to MTF capabilities’ decrease from restructuring, MTF officials we interviewed noted that staffing gaps could complicate their ability to execute the transitions and ensure the continuity of care for patients. Furthermore, MTF officials stated that active-duty medical personnel reductions that occurred in fiscal year 2019 have also created shortfalls in staffing that could pose challenges for them in executing the MTFs’ transitions. According to these officials, this is because they expect their administrative workload to increase while transitions are ongoing, while clinical workload for patient care would not decrease soon enough to mitigate any shortfalls in providers. DOD’s Plan states that the DHA should collaborate with the military departments to establish standard staffing models to facilitate MTF transitions, and transition plans must specify reductions in personnel and resources for the future state of the MTFs. However, the continuation of a phased transfer of MTF administration and management to the DHA from the military departments may present challenges to the DHA’s ability to concurrently accomplish new tasks related to restructuring the MTFs and facilitating their transitions. Likewise and more broadly, we reported in November 2018 that the transfer of MTF administration and management to the DHA may present challenges to the management of military personnel given that the military departments are responsible for medical personnel readiness, not the DHA, while DHA assumes responsibility for staffing the MTFs. DOD has not established a process for monitoring MTF restructuring transitions to address the aforementioned challenges. Yet, the MHS plans to move forward with restructuring actions beginning in June 2020. While officials expect that transitions of certain smaller clinics to their restructured end state may be relatively simple, they acknowledged that other MTF transitions could be complex and take several years. According to the ASD(HA) and Work Group officials, DOD will readjust its plans by reversing or slowing an MTF transition, if needed, to address any challenges that arise with ensuring patients’ ability to access health care—one of the restructuring objectives. DOD’s Plan does not discuss conditions that would warrant slowing or reversing an MTF’s restructure, or how that would be determined. According to senior MHS leaders and MTF officials, the potential need to reverse or slow transitions will make monitoring the transitions important, and they are awaiting such decisions, along with associated roles and responsibilities from the DHA. However, the Plan does not establish a process for monitoring MTF restructuring transitions, as this was not within the scope of efforts, according to 703 Work Group officials. Rather, officials stated that decisions about monitoring should occur in a next phase of execution for MTF transitions after completion of the Plan. Accordingly, after DOD submitted its Plan to Congress in February 2020, the ASD(HA) issued a memorandum tasking the Director of the DHA to implement the changes specified in the Plan (i.e., the MTF restructuring actions) and providing high-level guidance. For example, the memorandum states that: MTF transitions are not authorized to start before May 19, 2020 (i.e., 90 days after the Plan was provided to Congress) but should be completed no later than October 1, 2025; transition planning may begin at the DHA Director’s discretion (but not later than the beginning of fiscal year 2021) and should include all impacts from ongoing personnel reductions and realignments; and detailed transition plans should include clear mechanisms for stakeholder tracking of activities and progress, and be arranged in a manner that addresses the needs of multiple stakeholders from the local to the national levels. Regarding the transition plans, the memorandum requested that that the DHA Director provide the ASD(HA) with a point of contact within 5 days, and a timeline, milestones, initial resource requirements, and task organization for the effort within 2 weeks—i.e., by February 26 and March 6, 2020, respectively. The DHA missed these milestones, having not yet provided the requested information, although an official from the Office of the ASD(HA) stated that, as of March 2020, the DHA response was being drafted. MHS reform and the DHA’s progress in achieving goals are longstanding challenges on which we have previously reported. In April 2012, before the DHA was established, we reported that DOD did not consistently employ key management practices in implementing initiatives to change its MHS governance structure. We recommended that the ASD(HA) and the Surgeons General implement a monitoring process across DOD’s portfolio of initiatives for overseeing progress and identify accountable officials and their roles and responsibilities for all of its initiatives. DOD implemented this recommendation by assigning each initiative a working group, an initiative leader, and executive sponsor to help ensure that the initiative remained on schedule, on budget, and achieved performance goals. After DOD established the DHA, we reported in November 2013 and later in September 2015 on its progress. In both reports, we identified deficiencies and made recommendations to provide decision makers with more complete information on the implementation, management, and oversight of the DHA. DOD concurred with the 10 related recommendations and implemented all but one. We reported in March 2004 that a process for monitoring progress is key to successful results-oriented management. However, DOD does not have such a process for the MTF restructuring transitions, in part because MHS officials stated they would first need to establish detailed roles and responsibilities for executing the transitions generally. Beyond the DHA Director’s role of transition leader, other roles and responsibilities have not been established, such as what involvement MTF officials will have in monitoring and tracking progress or challenges, and how the military departments will share responsibilities with the DHA. The Senior Military Medical Advisory Council could sufficiently monitor the transitions at a high level, according to the DHA Director. Other MHS leaders we spoke with believed that involvement from additional military department and Office of the Secretary of Defense leaders could also be needed. As we reported in October 2005, agreement on roles and responsibilities is a key step to successful collaboration when working across organizational boundaries, such as the military services. Committed leadership by those involved in the collaborative effort, from all levels of the organization, is needed to overcome the many barriers to working across organizational boundaries. Our prior work has also shown that a dedicated team vested with necessary authority and resources to help set priorities, make timely decisions, and move quickly to implement decisions is critical for a successful transformation. DOD also has not defined objectives in a measurable way with related thresholds and goals to enable monitoring of progress and challenges. For example, as previously discussed, DOD’s three general priorities, or objectives, for restructuring MTFs include ensuring (1) the medical readiness of servicemembers and readiness of medical providers, (2) that civilian health care facilities and providers adequately support the health care needs of beneficiaries near each MTF, and (3) the cost-effectiveness of MTF and purchased care. However, DOD has not decided how to define and measure any of those objectives. Furthermore, DOD has not established thresholds or goals in relation to the objectives. By first establishing clear roles and responsibilities for executing and monitoring restructuring transitions, DOD can be better positioned to navigate and overcome organizational boundaries between the DHA, which manages the MTFs, and the military departments that provide staff. In doing so, DOD could also be better positioned to address challenges in executing transitions, such as those that arise with mitigating providers’ clinical readiness challenges and MTF staffing gaps during transitions. Then, by defining measurable objectives, goals, and thresholds for tracking the progress of MTF transitions—such as the clinical readiness of providers, quality and accessibility of quality health care, and cost- effectiveness—DOD could better ensure its objectives are being met and help facilitate timely adjustments to the transitions, as needed. As MHS leaders have acknowledged, correctly aligning MTF infrastructure to the size of the armed forces, the medical forces, and their desired readiness levels is essential to balancing mission requirements within available resources. DOD’s substantial work over the past 2 years on its Plan for MTF restructuring is a positive step toward meeting statutory requirements and prioritizing MTF readiness outcomes in a resource-informed manner. Notwithstanding the work DOD has undertaken in making a series of analytically-based determinations for restructuring in its Plan, our review highlighted several gaps in DOD’s methodology. Until DOD takes action to address these gaps by using more complete and accurate information about civilian health care quality, access, and cost-effectiveness, DOD leaders may not fully understand risks to the achievement of their objectives in restructuring future MTFs. DOD officials agree that some MTF restructuring actions may be more challenging than others. These challenges could be exacerbated by concurrent MHS reform efforts, including the transition of MTF administration and management to the DHA. However, by establishing clear roles and responsibilities for executing and monitoring the transitions, DOD can be better positioned to overcome the difficulties in navigating organizational boundaries between the DHA and the military departments, and make timely adjustments to their transition plans, as needed. In addition, by defining measurable objectives, thresholds, and goals for restructuring transitions, and applying them to evaluate progress and challenges, DOD can be better positioned to execute the transition of its MTFs and ensure that the objectives are being met. We are making the following six recommendations to DOD: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, consistently collect complete and accurate information about the quality of available civilian health care in proximity to its MTFs (such as ratings from the Centers for Medicare and Medicaid Services and perceptions from MTF officials who regularly coordinate with civilian providers, among other means) and assess that information to inform recommendations for future MTF restructuring decisions. (Recommendation 1) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, consistently collect complete and accurate information about the extent to which current health care providers within the TRICARE networks meet access-to-care standards, and assess that information to inform recommendations on future MTF restructuring decisions. (Recommendation 2) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, consistently collect complete and accurate information about the extent to which non-network civilian health care providers that could be incorporated into the TRICARE network meet access-to-care standards in terms of drive time, and assess that information to inform recommendations on future MTF restructuring decisions. (Recommendation 3) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, conducts a sensitivity analysis of the relative cost-effectiveness of MTF-provided care compared to civilian-provided care under varying assumptions, and document that information for decision makers to inform recommendations on future MTF restructuring decisions. Varying conditions could include different types of health care services, reducing the cost of military personnel salaries, and increasing estimated MTF wRVUs and civilian reimbursement rates. (Recommendation 4) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, establishes clear roles and responsibilities for executing and monitoring transitions for MTFs identified for restructuring. (Recommendation 5) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Health Affairs, in coordination with the Surgeons General of the military departments and the Director of the DHA, defines measurable objectives for MTF restructuring transitions, establishes thresholds and goals for each objective, and applies them to evaluate progress and challenges. For example, measurable objectives, thresholds, and goals, should include an evaluation of medical providers’ clinical readiness, civilian health care provider adequacy, and the cost-effectiveness of MTF and purchased care. (Recommendation 6) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix IV, DOD concurred with two of our recommendations and partially concurred with four recommendations. DOD also provided technical comments on the draft report, which we incorporated as appropriate. DOD concurred with our recommendations to establish roles and responsibilities for executing and monitoring MTF restructuring transitions (recommendation 5), and to define measurable objectives with thresholds and goals and apply them to evaluate progress and challenges for the transitions (recommendation 6). In its response, the department described actions it is taking and plans to take to implement both recommendations. DOD partially concurred with our first recommendation—to collect complete and accurate information about the quality of available civilian health care in proximity to its MTFs and assess that information to inform recommendations for future MTF restructuring. DOD stated that complete and accurate information on the quality of available care would require substantial resources to accomplish on a routine basis. To that end, DOD stated that until standardized quality data becomes readily available, it intends to collect this level of information as needed to support actions at a particular MTF. As noted in our report, we have previously reported that standardized information about hospital and outpatient care quality is available through the Centers for Medicare & Medicaid Services and has been widely adopted by major private insurers. As the restructuring of the MTFs continues and DOD relies to a greater extent on civilian-provided care, it will be important for the department to monitor the quality of care it purchases on behalf of beneficiaries. Thus, we continue to believe that DOD should make it a priority to collect and assess such information. DOD partially concurred with our second recommendation—to consistently collect complete and accurate information about the extent to which current health care providers within the TRICARE networks meet access-to-care standards, and assess that information to inform recommendations on future MTF restructuring decisions. In its response, DOD stated that each month, TRICARE contractors report, by specialty, average wait times from referral placement to patient appointment. Further, DOD stated that it is piloting centralized booking of MTF and network appointments, which, if successful, will result in more complete, accurate, and timely network access information. In cases where access standards are not being met, DOD explained that it works to mitigate the access shortfall either through MTF or expanded network resources. We agree that TRICARE’s monthly reports on patient wait times for appointments are a helpful tool for DOD in monitoring access to care, and that the pilot for centralized appointment booking is also a promising step. As we noted in our report, however, DOD’s analyses of the adequacy of civilian health care in proximity to MTFs were based on network provider directories that are of questionable accuracy and can overstate the number of available providers. MTF officials we interviewed stated that TRICARE directories in their area overstated the number of providers accepting new TRICARE patients. Even if the provider directory issues have not led to access-to-care challenges in the past in terms of patients’ wait times to appointments, such issues could cause challenges in the future with increasing numbers of DOD patients needing TRICARE network care. Accordingly, we continue to believe that it will be important for DOD to collect complete and accurate information about the extent to which current health care providers within the TRICARE networks meet access-to-care standards as DOD moves forward with its restructuring plans. DOD partially concurred with our third recommendation—to consistently collect complete and accurate information about the extent to which non- network civilian health care providers that could be incorporated into the TRICARE network meet access-to-care standards in terms of drive time, and assess that information to inform recommendations on future MTF restructuring decisions. DOD stated that drive times for non-network providers were assessed in the development of the recommendations for its Plan. DOD added that the approach used in the Plan included assessing drive times and distances from the beneficiaries’ homes, rather than the MTF, yielding a more accurate assessment of access, availability, and convenience. However, our review of DOD’s methodology workpapers showed that its analyses measured the distance between providers and a single location point that corresponds with the center of the zip code boundary in which a majority of beneficiaries reside. While a perfect methodology and information for projecting actual drive times may not be possible to achieve, the alternative method in our report illustrates that a portion of the providers DOD identified for potential network expansion would exceed access-to-care standards for some of its beneficiaries—especially those who live or work near an MTF (such as those who live on a military installation). According to DOD’s comments on the report, future restructuring efforts will be informed by the section 703 approach, and DOD will adjust the approach as needed by future analysis and conditions. As DOD moves forward with restructuring efforts in the future, we continue to believe that more accurately measuring the distance between providers’ locations and beneficiaries’ residences would improve the quality of DOD’s information about access-to-care. Accordingly, we continue to believe that DOD should fully implement our recommendation. DOD partially concurred with our fourth recommendation—to conduct a sensitivity analysis of the relative cost-effectiveness of MTF-provided care compared to civilian-provided care under varying assumptions, and to document that information for decision makers to inform recommendations on future MTF restructuring decisions. In response, DOD stated that there is value in the use of sensitivity or scenario analysis to inform decisions where a range of possibilities exist and a clear analytical question can be formed as a guide to both the analysts and decision-makers. However, DOD stated that it does not support the generic use of this analysis suggested by the recommendation. We disagree that our recommendation suggests the “generic use” of a sensitivity analysis. A sensitivity analysis is appropriate for evaluating restructuring opportunities for MTFs for two reasons. First, the evaluation of each MTF presents decision makers with a range of possibilities—from reducing or expanding the capabilities of an MTF, to closing it entirely or maintaining the status quo. Second, a sensitivity analysis would address uncertainties in DOD’s analytic assumptions about costs and workload for each MTF, which our report identified. As our own sensitivity analysis— conducted using minimal resources and available DOD data— demonstrated, changing the assumptions also changes the resulting conclusions about whether MTF or civilian care is less expensive. Therefore, we continue to believe that analyzing the relative cost- effectiveness of MTF-provided care compared to civilian-provided care under varying assumptions would provide more complete information for decision-making and executing MTF transitions. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense for Personnel and Readiness, the Assistant Secretary of Defense for Health Affairs, the Director of the Defense Health Agency, and the Secretaries of the Army, the Navy, and the Air Force. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. In February 2020, the Department of Defense (DOD) submitted its implementation plan (“the Plan”) to Congress in response to section 703(d) of the National Defense Authorization Act (NDAA) for Fiscal Year 2017. This report addresses the extent to which (1) DOD’s methodology for determining military medical treatment facility (MTF) restructuring actions in the Plan prioritized cross-cutting elements from 10 U.S.C. § 1073d and considered complete information, and (2) DOD has positioned itself to execute transition planning for restructuring its MTFs. For both objectives, we selected a nongeneralizable sample of MTFs and applied a case study approach to review DOD’s methodology for determining restructuring actions and actions that may be needed for transition planning. From DOD’s initial list of 73 MTFs included in its scope, we selected 11 of them as case studies to represent a variety of characteristics, including a mix of hospitals and clinics from each military department, different recommendations for how they should be restructured, different conclusions about network adequacy, and urban and rural areas located in proximity to one another in terms of driving distance. Appendix II identifies the names and locations of each MTF within the scope of the DOD Plan. The 11 MTFs we selected are listed in table 4. For objective one, we reviewed DOD’s draft and final Plan and related documentation of the methodologies used to assess all 77 MTFs within its scope. We compared this information with cross-cutting elements for MTFs from 10 U.S.C. § 1073d. These elements include the (1) support an MTF provides to servicemembers’ medical readiness and the readiness of medical personnel, (2) adequacy of civilian health care facilities and providers in the proximity of the MTF to support the health care needs of servicemembers and other beneficiaries through purchased care, and (3) cost-effectiveness of direct care services at MTFs versus purchased care in the nearby civilian provider networks. We discussed the methodological approaches for assessing MTFs for possible restructuring actions, including assumptions, data sources, and any limitations, with representatives from relevant organizations across DOD, including the Office of the Assistant Secretary of Defense for Health Affairs; DOD’s Section 703 Work Group; Defense Health Agency; Office of the Assistant Secretary of the Army for Manpower and Reserve Affairs; U.S. Army Medical Command; Navy Bureau of Medicine; Air Force Medical Readiness Agency; and officials from 11 selected MTFs and from their host installations. Specifically, in analyzing DOD’s methodology for assessing MTFs’ support to readiness, we reviewed information DOD used to estimate MTFs’ readiness value in terms of support to servicemembers’ medical readiness and to medical force readiness. We compared this information with findings from our prior work regarding DOD’s methodology for assessing clinical readiness. We also reviewed records of interviews that DOD officials held with MTF, installation, and command officials during their visits to MTFs, noting the readiness-related effects and concerns that were documented. For DOD’s methodology for assessing available civilian health care services in proximity to each MTF, we reviewed reports on the results of DOD’s assessments to identify their findings, recommendations, and assumptions. For the civilian health care providers that DOD identified in proximity to each of 11 MTFs we selected, we verified the address of each listed provider by searching for each provider’s website and making phone calls to verify addresses and specialty types, and whether the practice was open or closed. We then used R software and data from openstreetmap.org to calculate to calculate the driving distance between the provider and the MTF, comparing the distance with DOD’s access-to- care standards. We evaluated the extent to which the assessment reports considered information about quality of health care services and access-to-care standards, comparing the information with DOD guidance for patients’ access to quality and timely health care services, and with federal internal control standards on the use of quality information to inform decision-making. Regarding DOD’s methodology for evaluating cost-effectiveness, we reviewed DOD’s work papers and interviewed officials about the calculations and source data they used. We compared DOD’s methodology with our assessment methodology for economic analysis and with DOD guidance for economic analysis. We also obtained the fiscal years 2017 and 2018 data DOD used to calculate the cost- effectiveness of MTF-provided direct care relative to civilian-provided purchased care. Using these data, we performed a sensitivity analysis by recalculating relative cost-effectiveness under different assumptions. Specifically, for seven of our 11 case study MTFs, we recalculated their cost-effectiveness relative to purchased care by (1) omitting military personnel salaries, given that DOD has characterized these as a fixed cost, (2) increasing the work Relative Value Units to adjust for potential underreporting of those data, and (3) increasing the reimbursement rate of purchased care to account for future increases that are likely necessary, according to DOD officials. We also assessed the reliability of each data source for DOD’s and our calculations of cost-effectiveness by administering questionnaires about the data to those who have quality control responsibilities, interviewing responsible DOD officials, reviewing the data for outliers and missing values, and reviewing our prior reports about the data. We determined that DOD’s data on the costs of MTF care and civilian health care were sufficiently reliable for the purpose of calculating the total costs of health care services. However, DOD’s data on units of health care delivered in fiscal year 2018 were of undetermined reliability for the purpose of calculating a unit-level health care cost. To provide additional information on DOD’s methodology and supplement our understanding of available data, we conducted a literature review of research articles. We conducted a search of the literature on military health system clinical readiness, trends in physician supply and demand across the United States, and cost analyses of military health care published from 2014 through 2019 to identify articles on key challenges and methodological alternatives. To identify relevant articles, we searched a variety of databases with the assistance of a research librarian, limiting our review to papers that were included in peer-reviewed publications, as well as government reports, trade and industry articles, and publications by associations, nonprofits, or think tanks. We then reviewed the results and excluded any that were technical in nature or did not have wide applicability across MTFs or to health care analyses. For objective two, we reviewed DOD’s draft and final Plan, including detailed appendices on the MTFs within the scope of the plan, noting any aspects of transition planning described or recommended, and the agencies and organizations that would be responsible for managing those transition aspects. We also interviewed MTF officials from the selected case study locations regarding steps they had begun taking and actions they believed would be needed to facilitate a restructuring of the facility. In addition, we reviewed our prior, related work on MHS reform and the establishment of the Defense Health Agency to identify related themes and challenges. We corroborated our understanding of transition planning steps described in the Plan by interviewing 703 Work Group officials, the Director of the Defense Health Agency, and the Surgeons General of the Army and the Air Force to better understand what roles and responsibilities and monitoring mechanisms they had considered. We compared this information from the Plan and from our interviews with practices identified in our prior work on results-oriented government. Specifically, our prior work has found that agreement on roles and responsibilities and committed leadership by those involved are key steps to successful collaboration when working across organizational boundaries. A dedicated team vested with necessary authority and resources to help set priorities, make timely decisions, and move quickly to implement decisions, along with a process for monitoring progress, are also key to success. Finally, to assess the extent to which DOD’s section 703(d) Plan addressed all requirements of section 703(d), we compared the Plan with the elements from the statute. Examples of those elements included, for each MTF, whether it will be restructured, whether its functions will be expanded or consolidated, and the related costs. Some of the elements required that multiple items be addressed. We considered an element “addressed” if it included all of the items listed in the NDAA; “partially addressed” if it included some, but not all, of the items; and “not addressed” if it did not include any of the items. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. A work group of representatives from across the Department of Defense (DOD) led efforts to address section 703(d) of the National Defense Authorization Act for Fiscal Year 2017—the restructure or realignment of military medical treatment facilities (MTF). The 703 Work Group developed a methodology to address section 703(d) and determined the scope of its review of MTFs in the United States by identifying which of those to evaluate for the mandated implementation plan (the “Plan”). Figures 3 through 5 below identify the name and location of each of the 77 MTFs within the scope of DOD’s Plan, which it submitted to Congress in February 2020. The Department of Defense’s (DOD) 703 Work Group based its military medical treatment facility (MTF) restructuring determinations for its implementation plan to Congress, in part, on its assessments of the adequacy of civilian health care facilities and providers to support the health care needs of DOD beneficiaries near each MTF. In one component of the assessments, DOD identified civilian health care facilities and providers in proximity to each of its 77 evaluated MTFs. For each provider DOD identified in proximity to 11 MTFs—which we selected from the 77 MTFs DOD evaluated—we verified the provider’s address, specialty type, and whether the practice was open or closed. We then calculated the driving distance between each MTF and the respective listed providers. Figures 6 through 16 below show that a certain portion of the providers listed for each of the 11 selected MTFs were outside DOD’s access-to-care standards for travel time to provider sites for TRICARE Prime patients, based on our analysis. In addition, for each of the 11 selected MTFs, there was one or more inaccuracies in the provider listing, such providers that were no longer in practice, duplicate providers, or those that were mischaracterized as a medical provider. In addition to the contact named above, Lori Atkinson (Assistant Director), Melissa Blanco (Analyst in Charge), John Beauchamp, Timothy Carr, Alexandra Gonzalez, Hannah Hubbard, David Jones, Amie Lesser, John Mingus, Jr., Oliver Richard, Terry Richardson, Guiovany (Geo) Venegas, and Lillian M. Yob made key contributions to this report. Defense Health Care: Opportunities to Improve Future TRICARE Managed Care Support Contract Transitions. GAO-20-39. Washington, D.C.: November 21, 2019. Defense Health Care: DOD’s Proposed Plan for Oversight of Graduate Medical Education Programs. GAO-19-338. Washington, D.C.: March 28, 2019. Defense Health Care: Actions Needed to Determine the Required Size and Readiness of Operational Medical and Dental Forces. GAO-19-206. Washington, D.C.: February 21, 2019 Defense Health Care: Additional Assessments Needed to Better Ensure an Efficient Total Workforce. GAO-19-102. Washington, D.C.: November 27, 2018. Defense Health Care: DOD Should Demonstrate How Its Plan to Transfer the Administration of Military Treatment Facilities Will Improve Efficiency. GAO-19-53. Washington, D.C.: October 30, 2018. Defense Health Care: Expanded Use of Quality Measures Could Enhance Oversight of Provider Performance. GAO-18-574. Washington, D.C.: September 17, 2018. Defense Health Reform: Steps Taken to Plan the Transfer of the Administration of the Military Treatment Facilities to the Defense Health Agency, but Work Remains to Finalize the Plan. GAO-17-791R. Washington, D.C.: September 29, 2017. Defense Health Care Reform: DOD Needs Further Analysis of the Size, Readiness, and Efficiency of the Medical Force. GAO-16-820. Washington, D.C.: September 21, 2016. Defense Health Care Reform: Actions Needed to Help Ensure Defense Health Agency Maintains Implementation Progress. GAO-15-759. Washington, D.C.: September 10, 2015. Military Health System: Sustained Senior Leadership Needed to Fully Develop Plans for Achieving Cost Savings. GAO-14-396T. Washington, D.C.: February 26, 2014. Defense Health Care Reform: Additional Implementation Details Would Increase Transparency of DOD’s Plans and Enhance Accountability. GAO-14-49. Washington, D.C.: November 6, 2013. Defense Health Care Reform: Applying Key Management Practices Should Help Achieve Efficiencies within the Military Health System. GAO-12-224. Washington, D.C.: April 12, 2012. Military Personnel: Enhanced Collaboration and Process Improvements Needed for Determining Military Treatment Facility Medical Personnel Requirements. GAO-10-696. Washington, D.C.: July 29, 2010.", "summary": "DOD's MTFs are critical to the medical readiness of servicemembers and providing readiness training for about 107,000 active-duty medical providers. About 9.6 million beneficiaries are eligible for DOD health care through MTFs and civilian network providers. To further support readiness, the National Defense Authorization Act (NDAA) for Fiscal Year 2017 required DOD to plan to restructure MTFs. DOD's February 2020 Plan included decreasing capabilities at 43 MTFs and closing five. The NDAA included a provision for GAO to review the Plan. This report addresses the extent to which 1) the Plan's methodology prioritized statutory elements and considered complete information, and 2) DOD is positioned to execute MTF restructuring transitions. GAO reviewed DOD's Plan, MTF workload and cost data, and interviewed DOD leaders and officials at 11 MTFs selected on the basis of military department, restructuring action, and location. The Department of Defense's (DOD) methodology to determine Medical Treatment Facilities' (MTF) restructuring actions in its implementation plan (the Plan) prioritized statutory elements. These included military readiness, adequacy of nearby civilian health care, and cost-effectiveness. However, DOD based part of its methodology on incomplete and inaccurate information. Civilian health care assessments did not consistently account for provider quality. DOD generally assumed that identified providers were of sufficient quality. GAO found that DOD considered the quality of nearby civilian providers for one of 11 selected MTFs. In this instance, information from the MTF about the variable quality of nearby civilian health care led to DOD's determination that such care was not yet adequate to support MTF restructuring. Officials GAO interviewed from other MTFs discussed concerns about quality of care from nearby civilian providers. Civilian health care assessments did not account for access to an accurate and adequate number of providers near MTFs. DOD may have included in its assessments providers who do not meet DOD's access-to-care standards for certain beneficiaries. For 11 selected MTFs, GAO found that about 56 percent of civilian primary care providers and 42 percent of civilian specialty providers that DOD identified as being nearby exceeded DOD's drive-time standards. Including such providers in its assessments means that DOD could have overestimated the adequacy of civilian health care providers in proximity to some MTFs. Cost-effectiveness assessments were based on a single set of assumptions. DOD concluded that civilian health care was more cost-effective than care in its MTFs without considering other assumptions that could affect its conclusions. For example, DOD applied assumptions about the cost of military personnel salaries, MTF workloads, and reimbursement rates for TRICARE that likely underestimated the cost-effectiveness of MTFs. GAO also found that DOD conducted limited assessments of MTFs' support to the readiness of military primary care and nonphysician medical providers—an issue DOD officials stated they will address during MTF transitions. Until DOD resolves methodology gaps by using more complete and accurate information about civilian health care quality, access, and cost-effectiveness, DOD leaders may not fully understand risks to their objectives in restructuring future MTFs. DOD's Plan identified actions needed to facilitate MTF restructuring, but the department is not well positioned to execute the transitions. DOD's Plan poses challenges for the military departments and the Defense Health Agency (DHA) related to MTF providers' readiness. Yet, DOD plans to move forward with restructuring without a process to monitor progress and challenges. By establishing roles and responsibilities for executing and monitoring MTF restructuring transitions, DOD can be better positioned to navigate organizational boundaries between the DHA that manages the MTFs and the military departments that provide staff. Additionally, by defining measurable objectives and progress thresholds, DOD can better ensure it is meeting objectives and facilitating timely adjustments to MTF restructuring transitions, as needed. GAO is making six recommendations, including that future MTF assessments use more complete and accurate information about civilian health care quality, access, and cost-effectiveness; and that DOD establish roles, responsibilities, and progress thresholds for MTF transitions. DOD partially concurred with four recommendations and concurred with two. As discussed in the report, GAO continues to believe that all six recommendations are warranted.", "document_type": "gao"}
{"report": "Numerous organizations have roles and responsibilities in formulating and executing the Marine Corps’ budget. Specifically: Office of Management and Budget. OMB directs federal agencies, including DOD and the military services, to develop, among other things, civilian personnel budget requests by calculating workload requirements, the time needed to complete the workload and the number of FTEs needed to perform the work for the upcoming fiscal year. Every year, OMB releases an update to OMB Circular A-11, which provides guidance for budget formulation for the upcoming fiscal year. OMB Circular A-11 states that federal agencies should take steps to assess, and as appropriate, restructure, retain, and resize their FTE counts to achieve missions as effectively and efficiently as possible. Office of the Under Secretary of Defense (Comptroller). OUSD(C) issues the DOD’s Financial Management Regulation for budget formulation and execution. The Financial Management Regulation directs statutory and regulatory financial management requirements, systems, and functions for all organizational entities within the DOD. Department of the Navy. According to Department of Navy budget officials, they provide annual budget formulation guidance to all of the budget submitting offices, including the Marine Corps, through the Program Budget Information System, the Navy’s Financial Management & Budget web portal. According to these officials, the guidance contains detailed instructions and updates for budget formulation, worksheets for checking the accuracy of submitted data, and points of contact for budget formulation questions. Marine Corps Deputy Commandant for Programs and Resources (DC P&R). DC P&R is the lead for determining and allocating civilian labor budgets. The DC P&R delegates this responsibility to the Fiscal Director who monitors major subordinate command and Headquarters Marine Corps labor budget execution to ensure compliance with Manage to Payroll budget controls. DC P&R sub-allocates the portion of the budget that will be executed against civilian labor by each major subordinate command and Headquarters Marine Corps. In order to hold the major subordinate commands and Headquarters Marine Corps accountable for exercising prudent Manage to Payroll authority, DC P&R monitors civilian labor execution and issues Mange to Payroll reports on a monthly basis. Marine Corps Director for Civilian Human Resources (DCHR). DCHR provides program direction, technical advice, guidance and assistance to major subordinate commands, Headquarters Marine Corps staff agencies, and servicing human capital resource offices in carrying out Manage to Payroll responsibilities, with regard to position classification. DCHR also holds individuals with delegated classification authority accountable for carrying out effective Manage to Payroll responsibilities, when it comes to classification of position descriptions. In June 2018, the DOD Inspector General reported that, among other things, the Marine Corps did not justify or fully provide supporting documentation for how it determined its civilian personnel pay requirements for the Marine Corps’ fiscal year 2017 budget request. The Department of the Navy concurred with a DOD Inspector General recommendation that the Department of Navy establish and implement controls for the civilian pay budget process. The Marine Corps stated in an unpublished written response that it is reviewing its current budget formulation and other metrics through the fiscal year 2020 budget formulation process, with a plan of implementing an updated budget documentation process for the fiscal year 2021 budget request. The DOD Inspector General also found that the Marine Corps did not determine civilian pay funding levels using FTEs calculated from projected hours to be worked, as required by OMB. As a result, the DOD Inspector General recommended that the Marine Corps determine its budgeted civilian pay funding levels using FTEs calculated based on projected hours to be worked, as required by OMB. In its unpublished written response to the DOD Inspector General report, the Marine Corps stated that it determines FTEs in accordance with OMB and is working to provide greater emphasis on FTEs in its budget documents. See appendix II for more details on the DOD Inspector General’s report. The Marine Corps formulates its annual civilian personnel budget request using prior fiscal year budget execution data as a baseline, then makes adjustments for the upcoming fiscal year based on inputs from various sources like the Department of the Navy and OUSD(C). First, according to Marine Corps officials, the Marine Corps gathers information from several sources to start the budget formulation process including previous fiscal year budget information, information from the Program Objective Memorandum (POM) process, feedback from Marine Corps commands, OUSD(C) guidance, Department of Navy guidance, and the National Security Strategy. To develop its civilian personnel budget request for fiscal year 2020, the Marine Corps used fiscal year 2018 information as a starting point and incorporated changes made through the POM process and other inputs, according to Marine Corps Programs and Resources officials. Second, Marine Corps officials explained during the budget formulation process, the Department of the Navy publishes a Civilian Pricing Tool that financial management and budget officials use to evaluate civilian personnel pricing estimates. The Marine Corps has access to the Civilian Pricing Tool throughout the budget process. After all the inputs are included and the pricing calculations are completed, the Marine Corps officials explained, the Deputy Commandant, Programs and Resources presents the POM to the Commandant of the Marine Corps for approval and inclusion in the Department of the Navy’s overall budget request. Third, according to Department of Navy officials, they conduct a thorough analytic review of each line item’s dollar amount and FTE request in the Marine Corps’ budget request before submitting its total budget to OUSD(C). Once the Department of the Navy has reviewed and approved of the Marine Corps budget request, including its request for civilian personnel funding, the Department of the Navy sends the budget request to OUSD(C) for review. Fourth, according to Department of the Navy officials, OUSD(C) reviews the Marine Corps’ civilian personnel budget request as part of the Department of the Navy’s overall budget request submission, including any change in year-to-year FTE growth, to determine if the Marine Corps properly justified these changes. Once OUSD(C)’s review of the Department of the Navy’s budget submission is complete, the Navy’s budget request is submitted with the other military department’s budget requests to OMB for review. During this period, according to Department of the Navy officials, OMB has monthly conversations with the military departments, including the Department of the Navy, about its budget formulation process. OMB has the authority to raise concerns with a particular military department’s budget request during a passback period. Once the passback period with OMB is complete and the budget request is approved by OUSD(C), the entire Department of Navy budget is submitted to the Office of the Secretary of Defense. Finally, according to Department of the Navy officials, the Office of the Secretary of Defense makes adjustments to the Department of the Navy’s budget request according to DOD and OMB priorities, and after OUSD(C) provides feedback to each military service, the military services’ budget request, as modified, is incorporated into the President’s budget request. The Marine Corps manages the execution of its civilian personnel budget based on the dollar amount, not FTE workload forecasts, through an approach referred to as “Manage to Payroll.” Specifically, the Manage to Payroll approach places an emphasis on spending the amount of dollars or funding available for civilian personnel and not on executing a calculated full-time equivalent civilian personnel workload. Further, Marine Corps Order 12510.2D requires officials delegated Manage to Payroll authority to be accountable for establishing positions to accomplish the mission with maximum efficiency and productivity balanced against the civilian labor budget. The Manage to Payroll approach is comprised of three separate functions: (1) position management, (2) position classification, and (3) compensation management. Position management. The process of organizing and structuring organizations to accomplish their mission with maximum economy, efficiency, and productivity. Managers and supervisors determine the type of organizational structure needed to fulfill the functions assigned to a particular unit, how many positions are needed, how positions should be designed, and the most cost effective way of filling the requirement. Position classification. The function that assigns an individual position to the appropriate pay plan, occupational series, title, and grade. Compensation management. For positions where funding levels are prescribed by the Deputy Commandant for Programs and Resources, the major subordinate commands and Headquarters Marine Corps staffing agencies must ensure salary costs and other cost drivers (i.e. overtime, awards, incentives, etc.) do not exceed the civilian labor funding levels. To implement this approach, the Marine Corps’ Director for Civilian Human Resources, among other things, provides program direction, technical advice, guidance and assistance to the major subordinate commands, Headquarters Marine Corps staff agencies, and servicing human resources offices for carrying out Manage to Payroll responsibilities. In order to hold individuals with delegated classification authority accountable for carrying out effective Manage to Payroll responsibilities, the Director for Civilian Human Resources also conducts consistency reviews in coordination with the human resources offices to validate proper classification of positions. These reviews involve verifying positions are classified in accordance with Office of Personnel Management classification standards and within sound position management principles. Additionally, the Marine Corps Deputy Commandant for Programs and Resources is the lead for determining and allocating the Marine Corps’ civilian personnel budget and sub-allocates the portion of the budget that will be spent against civilian labor by each major subordinate command and Headquarters Marine Corps. According to Marine Corps officials, there are benefits to using the Manage to Payroll approach for managing its civilian personnel budget execution. These benefits, according to Marine Corps officials, include: Flexibility in spending. This approach provides flexibility to the major subordinate commanders by allowing them the ability to prioritize their own current mission requirements and functions rather than spending their civilian personnel budget on workload requirements used to formulate a civilian personnel budget request during the previous fiscal year. Management of personnel requirements. The process allows commanders to manage their personnel requirements to fit with mission priority rather than adhering to the FTE-based workload requirements used to formulate their civilian personnel budget request. Visibility. This process enables officials at Marine Corps Programs and Resources and Headquarters Marine Corps to have direct control over and closely monitor the major subordinate commands’ civilian personnel budget execution. However, weaknesses exist with the Marine Corps’ Manage to Payroll approach to managing its civilian personnel budget execution. Our analysis of the Department of the Navy’s annual budget request, which includes Marine Corps civilian personnel FTE data, found that the number of civilian FTEs the Marine Corps reported does not match the number of civilian FTEs it requested. This discrepancy between the number of FTEs requested and the number of FTEs reported is a result of the Marine Corps managing civilian personnel to dollar amounts and not to FTEs. Specifically, funding provided by Congress annually for the Marine Corps to manage its civilian personnel is based on the number of FTEs the Marine Corps requested for a particular fiscal year. However, during the budget execution process, Headquarters Marine Corps distributes funding to the major subordinate commands by dollar amount and not by FTEs requested. The President’s budget request, which is the sole single document with budget information for the entire government, contains (1) a record of actual receipts and spending levels for the fiscal year just completed, (2) a record of current-year estimated receipts and spending, and (3) estimated receipts and spending for the upcoming fiscal year and 9 years beyond, as proposed by the President. Additionally, OMB Circular A-11 requires that current year FTE estimates should be consistent with previous year actuals, should be fully funded, and should be very close to the actual usage reported at the end of the fiscal year. For example, the estimates in the previous year’s budget should be very close to the actuals published in the current budget. Table 1 shows the difference between the Marine Corps FTEs estimates in its annual civilian personnel budget request and its reported usage of actual FTEs for the previous year’s budget execution contained in the budget requests from fiscal years 2013 through 2018. When asked about the difference between estimates and reported usage of actual FTEs, a Headquarters Marine Corps official stated that they were generally unaware of the importance of the budget data in measuring the degree to which an agency was exceeding or not reaching its requested FTEs. However, the official also acknowledged that a possible consequence of not managing to estimated FTEs could be a reduction in future funding for civilian personnel because budget data provided to Congress for civilian personnel is based on FTE workload and not the amount of dollars spent on civilian personnel. Therefore, a result of the Marine Corps managing to dollar amounts and not to FTEs may result in Congressional decision-making based on incorrect data, which may result in the major subordinate commands having to eliminate civilian positions. Department of the Navy officials confirmed this and told us that the Marine Corps’ use of Manage to Payroll puts Department of the Navy resources at risk of reduction. Additionally, according to Department of the Navy officials, the Navy’s financial management branch does not support the Marine Corps’ use of Manage to Payroll and recommends that the Marine Corps begin to manage its civilian personnel resources using the same process as the Navy’s other budget submitting offices, by formulating civilian personnel funding requests with estimated FTE requirements and then monitoring execution of the budget by actual FTEs. Additionally, by formulating and monitoring civilian personnel budgets by FTEs, there would be more transparency in how the Marine Corps is actually executing its civilian personnel budget. Our review of the Marine Corps’ policy for managing its civilian personnel budget execution found that it does not provide guidance for major subordinate commands to manage actual civilian FTEs to requested amounts. Specifically, Marine Corps Order 12510.2D provides budget execution requirements but does not include requirements on managing civilian FTEs. According to officials with Marine Corps Programs and Resources, Marine Corps Order 12510.2D is a Manpower and Reserve Affairs Department document that focuses on personnel actions rather than explicitly establishing cost controls. Specifically, the order states that individuals delegated Manage to Payroll authority are accountable for establishing positions to accomplish the mission with maximum efficiency and productivity balanced against the labor budget. Federal internal control standards state that management should document the organization’s internal control responsibilities in its policies at the appropriate level of detail to allow management to monitor the control activity effectively. Without updated guidance for major subordinate commands to formulate and execute its civilian personnel budget to estimated FTEs, the Marine Corps risks overspending or underspending on its personnel requirements. Additionally, decision makers may not have sufficient information to effectively and efficiently provide funding for Marine Corps civilian personnel. Our analysis of Marine Corps internal spending data found that the dollar amount the Marine Corps is projecting to spend on civilian personnel for fiscal year 2019 is $1,749,444,000, which is in line with the $1,750,500,000 provided in its budget request for managing civilian personnel. However, our analysis of 15 major subordinate commands found that four of them are either exceeding or not reaching their requested dollar amounts by $5 million dollars or more. For example, for fiscal year 2019, Marine Corps Systems Command is projected to overspend its requested civilian personnel dollar amount by $24.7 million and Marine Corps Cyber Command is projected to fall short of its requested civilian personnel dollar amount by $7.9 million dollars in fiscal year 2019. Table 2 shows the variation in projected dollar amount by major subordinate commands for fiscal year 2019. Marine Corps Programs and Resources officials stated that when a major subordinate command exceeds its requested dollar amount, the major subordinate command is not compensated from larger Marine Corps accounts, but the command must find additional funding from within its other accounts, which may mean a funding cut to another program to make up the difference. Our review of Marine Corps civilian personnel data also found that Marine Corps data on civilian FTEs is not consistent with data that OUSD(C) uses to formulate DOD’s request for civilian personnel FTEs in its annual budget submission. The Marine Corps uses a database called SABRS to maintain and track civilian personnel FTE data for fiscal years 2013 through 2019. To develop DOD’s defense-wide annual civilian personnel budget request, OUSD(C) uses data from the Program Resources Collection Process system. Our review of Marine Corps data maintained in SABRS found that it does not match the data DOD provided in its annual budget request submissions, which comes from OUSD(C)’s Program Resources Collection Process system, for fiscal years 2013 through 2018. Table 3 shows the difference between the Marine Corps’ internal civilian FTE data in SABRS and the civilian FTE data provided in the annual budget request. An OUSD(C) official told us that the two sources should match because all data, including civilian personnel dollar amounts and FTEs, should be submitted and processed through the Program Resources Collection Process system. Marine Corps officials explained that they were aware of the variations between their internal FTE data and the DOD budget request data. The officials further explained that one instance of variation in the data occurs because the Department of the Navy uses another database, the Work Year Personnel Cost system, to prepare its annual budget request, which includes the Marine Corps’ request for civilian personnel FTEs, before submitting the request to OUSD(C). According to the Marine Corps officials, the Work Year Personnel Cost system automatically deletes error transactions while SABRS does not, as error transactions in SABRS are manually edited. These types of error transactions occur because they did not pass one or more edits in SABRS, did not find the required matching transaction, or have some other issue that is keeping the transaction from processing. The Marine Corps corrects error transactions manually while errors transactions in the Work Year Personnel Cost System are deleted automatically without correction, which creates differences in the data between the two systems. Marine Corps officials stated that, as a result, the Work Year Personnel Cost database typically underestimates Marine Corps civilian FTEs, and that variations in actual FTE data between the SABRS and Work Year Personnel Cost databases explains why it appears the Marine Corps is not reaching its requested civilian personnel FTEs. The Marine Corps has not identified or reconciled differences between internal Marine Corps civilian personnel FTE data compared to data submitted in the annual budget request. Additionally, federal internal control standards state that management should use quality information to achieve the entity’s objectives; that reliable internal and external sources provide data that are reasonably free from errors and faithfully represent what they purport to represent; and that information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Congress and DOD leadership rely on information presented in an agency’s annual budget request to help determine policies and to make financial decisions. Our prior work has found that civilian FTEs, by themselves, may not be reliable measures of the cost of the civilian personnel workforce and changes in civilian FTEs may not achieve commensurate changes in monetary spending. However, in that report we also noted that, according to OUSD(C) officials, FTEs are typically the primary measure OUSD(C) uses in managing and reporting on DOD’s civilian workforce. Therefore, without reliable Marine Corps civilian personnel data, senior leaders in DOD and decision makers in Congress may not have sufficient and appropriate information to make informed planning and spending decisions and may risk funding not accurately tracking with actual needs. To develop its annual civilian personnel budget request, the Marine Corps uses a process that relies on prior fiscal year budget execution data instead of calculating civilian personnel workload requirements and the number of FTEs needed to perform the work. Without updated guidance for the major subordinate commands to manage their respective civilian personnel budget execution to requested FTEs, the Marine Corps risks overspending or underspending on its personnel requirements. Further, assessments of Marine Corps civilian personnel FTE and DOD budget data found that the Marine Corps’ data does not match comparable data DOD reported in its annual budget request documentation. Congress and DOD leadership rely on FTE information presented in the Marine Corps’ annual budget request to help determine policies and to make financial decisions. Without civilian personnel data that are free from errors and are consistent with how the Marine Corps is managing its civilian personnel, senior leaders in DOD and decision-makers in Congress will not be able to make informed planning and spending decisions and may risk funding not accurately tracking with actual needs. As a result, the Marine Corps risks having its annual civilian personnel funding reduced. We are making the following two recommendations to the Secretary of the Navy: The Secretary of the Navy should ensure that the Commandant of the Marine Corps updates the Marine Corps’ civilian personnel budget formulation and execution policies to include guidance for the major subordinate commands to manage civilian personnel to FTEs. (Recommendation 1) The Secretary of the Navy should ensure that the Commandant of the Marine Corps identifies and reconciles any differences between the Marine Corps’ internal civilian personnel data and the civilian personnel data the Department of the Navy uses to support its annual budget request. (Recommendation 2) We provided a draft of this report to DOD for review and comment. In written comments, DOD concurred with both recommendations and noted actions that the Marine Corps plans to take. DOD’s comments are reprinted in appendix III. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of the Navy, and the Commandant of the Marine Corps. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. For our first objective, to determine how the Marine Corps develops its civilian personnel budget request, we obtained and reviewed Marine Corps, Department of Defense (DOD), Department of Navy, and Office of Management and Budget policies that guide the budget process in order to determine what requirements exist across each level of oversight and discussed these requirements with agency officials. To further analyze the Manage to Payroll process, we also obtained and reviewed Marine Corps Program Objective Memorandum requests, budget formulation and execution documents, budget analyses, financial spreadsheets, and budget presentations. We also interviewed responsible officials about these processes and requirements. For our second objective, to assess the Marine Corps’ management of its civilian personnel budget and FTEs, we reviewed the Marine Corps’ process for managing its civilian personnel budget and FTEs and compared it against Marine Corps orders and administrative messages. To examine Marine Corps policies for budget data entry, coordination, and management, we compared them to the Marine Corps Financial Management Standard Operating Procedure Manual. To determine how the Marine Corps manages its civilian personnel funding, how the Marine Corps measures budget execution by major subordinate command, and how the Marine Corps monitors and collects data on budget execution, we interviewed officials from Marine Corps Programs and Resources. To identify Manage to Payroll requirements and Marine Corps policies for managing its civilian personnel we interviewed officials from Marine Corps Manpower and Reserve Affairs. We also interviewed officials in the Marine Corps Programs and Resources office, Marine Corps Systems Command, Marine Corps Cyber Command, the Department of the Navy, and the Office of the Under Secretary of Defense (Comptroller) about their perceptions of the benefits and weaknesses of the Manage to Payroll process. To measure whether the Marine Corps exceeded or fell below its civilian personnel full-time equivalents (FTE) budget request, we compared the Marine Corps’ civilian personnel budget execution data to its budget request data from the same fiscal year to determine if Marine Corps actual FTEs matched this data from year to year. To measure whether the Marine Corps was consistently exceeding or falling below its FTE budget request at each major subordinate command, we reviewed Marine Corps budget execution spreadsheets displaying end-of-year budget and FTE projections. To provide a statistical measurement of the Marine Corps’ efforts to manage its civilian personnel budget, we obtained and analyzed fiscal year 2013-18 budget execution data from the Marine Corps’ Standard Accounting, Budgeting, and Reporting System (SABRS) that tracks both dollar amount and FTE allotment across the major subordinate commands. We also used SABRS data to determine how funds are allocated to the major subordinate commands within the Marine Corps. To determine if differences in reported FTE totals existed between the Marine Corps’ internal data and publically available data, we compared SABRS’ civilian personnel FTE actual data from fiscal year 2013-18 to its requested FTEs. To assess the reliability of the Marine Corps’ data, we reviewed policies and procedures related to data collection and entry, evaluated Marine Corps internal data reliability checks, and interviewed cognizant officials. Based on this, we determined that the data were sufficiently reliable for the purposes of our reporting objectives. We conducted this performance audit from November 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In June 2018, the Department of Defense (DOD) Inspector General issued a report on the civilian personnel budget formulation process of the Department of the Navy, which included information on the Marine Corps. In its report, the DOD Inspector General found that the Marine Corps could not justify or support how it determined its civilian personnel pay requirements for fiscal year 2017’s Marine Corps budget request. Specifically, the report noted that Marine Corps budget officials could not fully explain the rationale for their civilian pay budget adjustments. According to the DOD Inspector General report, the Marine Corps did not maintain documentation to support these budget adjustments or material showing how it calculated average basic compensation amounts and benefit rates. The DOD Inspector General also reported that Marine Corps officials were unable to explain or provide support regarding the calculation of the civilian pay dollars and full-time equivalents (FTE) associated with these adjustments. In its unpublished written response to the DOD Inspector General’s report, the Marine Corps concurred with the DOD Inspector General’s recommendation that the Marine Corps determine budgeted civilian pay funding levels using full-time equivalents calculated based on projected hours to be worked, as required by Office of Management and Budget Circular A-11. The Marine Corps’ written response also acknowledged that having source data, assumptions, calculations, and better documentation related to budget formulation would provide for retention of institutional knowledge and would benefit budget officials formulating future budgets. The Marine Corps’ unpublished written response also stated that it is reviewing other command metrics within the department, which will be performed throughout the remainder of the present budget cycle with a plan of implementation during the next budget cycle. The DOD Inspector General’s report stated that the Marine Corps did not determine civilian pay funding levels using FTEs calculated from projected hours to be worked, as directed in Office of Management and Budget (OMB) Circular A-11. According to the DOD Inspector General’s report, in its fiscal year 2017 budget formulation, Marine Corps officials stated that they considered FTEs to be the same as end strength for budget formulation purposes, assuming that one person would be on board for an entire year even though these officials acknowledged that this was not expected to be the reality during budget execution. As a result, the DOD Inspector General recommended that the Marine Corps determine its budgeted civilian pay funding levels using FTEs calculated as required by OMB Circular A-11 requirements. In its unpublished written response to the DOD Inspector General’s report, the Marine Corps stated that it determines FTEs in accordance with OMB Circular A-11. Marine Corps Programs & Resources officials told us that they use cumulative hours paid in a fiscal year divided by the number of work hours in that fiscal year to generate the number of FTEs executed. These officials told us that they then divide the cumulative amount paid by the number of FTEs to receive the average work year cost for that fiscal year. Marine Corps officials stated that Programs & Resources budget officials then adjust the civilian personnel budget request during the Department of Navy pricing tool time frame, typically reducing FTEs by the recommendation provided by the tool, which uses 18 months of execution data. Marine Corps officials told us that, as result of the DOD Inspector General’s report, they are working to provide greater emphasis on FTEs in their budget formulation documents. Brenda S. Farrell, (202) 512-3604 or farrellb@gao.gov. In addition to the contact named above, Vincent Balloon (Assistant Director), Timothy Carr, Brian Pegram, Clarice Ransom, Aaron Safer- Lichtenstein, Shari Nikoo, Michael Silver, Carter Stevens, John Van Schaik and Gregory Wong made key contributions to this report. Defense Health Care: Additional Assessments Needed to Better Ensure an Efficient Total Workforce. GAO-19-102. (Washington, D.C.: Nov. 27, 2018). DOD Civilian and Contractor Workforces: Additional Cost Savings Data and Efficiencies Plan Are Needed. GAO-17-128. (Washington, D.C.: Oct. 12, 2016). Civilian and Contractor Workforces: Complete Information Needed to Assess DOD’s Progress for Reductions and Associated Savings. GAO-16-172. (Washington, D.C.: Dec. 23, 2015). Defense Headquarters: DOD Needs to Reassess Personnel Requirements for the Office of Secretary of Defense, Joint Staff, and Military Service Secretariats. GAO-15-10. (Washington, D.C.: Jan. 21, 2015). Human Capital: DOD Should Fully Develop Its Civilian Strategic Workforce Plan to Aid Decision Makers. GAO-14-565. (Washington, D.C.: July 9, 2014). Human Capital: Opportunities Exist to Further Improve DOD’s Methodology for Estimating the Costs of Its Workforces. GAO-13-792. (Washington, D.C.: Sept. 25, 2013). Human Capital: Additional Steps Needed to Help Determine the Right Size and Composition of DOD’s Total Workforce. GAO-13-470. (Washington, D.C.: May 29, 2013).", "summary": "The Marine Corps requested $1.81 billion to pay for approximately 16,000 civilian employees in its fiscal year 2020 budget request. The Office of Management and Budget directs federal agencies to develop civilian personnel budgets by calculating workload requirements, the time needed to complete the work, and the number of FTEs needed. The Marine Corps uses a unique budget formulation process that relies on prior fiscal year budget data to calculate FTE estimates for future civilian personnel budget requests. Senate Report 115-290, accompanying a bill for the DOD Appropriations Act, 2019, included a provision for GAO to review how the Marine Corps develops its civilian labor requirements for both FTEs and funding and examine the benefits and shortfalls of the Manage to Payroll process. This report (1) describes how the Marine Corps formulates its civilian personnel budget request and (2) assesses the Marine Corps' management of its civilian personnel budget and FTEs, including the benefits and weaknesses of the process. GAO reviewed DOD civilian personnel budget policies, analyzed fiscal years 2013 through 2018 Marine Corps budget data that tracks spending and FTE allotment, and compared 2013 through 2018 budget execution data to budget request data. The Marine Corps develops its civilian personnel budget request using prior fiscal year budget execution data with adjustments based on input from sources such as the Office of the Undersecretary of Defense (Comptroller) [OUSD(C)] and the Department of the Navy. As part of the Department of the Navy, the Marine Corps' budget request is added to the Navy's overall budget request, which is incorporated into the Department of Defense's (DOD) overall budget request. The Marine Corps manages its civilian personnel based on dollar amounts—not full-time equivalent (FTE) workload like the other military services—through an approach called Manage to Payroll. Specifically, while the Marine Corps requests a certain number of FTEs each year as required by policy, the Marine Corps distributes the funds it receives to its commands by dollar amount and not based on the FTEs requested. This approach has benefits, such as providing flexibility to employ civilians based on current mission requirements. However, under this approach, for fiscal year 2019, internal Marine Corps' data show that four of its commands are either exceeding or not reaching their requested dollar amounts. Marine Corps policy does not provide guidance to its commands to manage FTEs to requested amounts. Without such updated guidance the Marine Corps risks overspending or underspending on its personnel requirements. In addition, internal Marine Corps civilian FTE data for fiscal years 2013 through 2018 is not consistent with data that OUSD(C) used to formulate DOD's overall civilian personnel budget request, as shown in the figure below. The Marine Corps has not identified or reconciled differences between its internal data compared to data submitted in the annual budget request. If information in the Marine Corps' budget request does not reflect internal Marine Corps data, then Congress and DOD leadership may not have sufficient and appropriate information to make informed planning decisions. GAO recommends that the Marine Corps 1) updates its budget policies to include guidance for commands to manage civilian personnel to FTEs and 2) identifies and reconciles differences between its internal data and data OUSD(C) uses to formulate the Marine Corps' annual budget request. DOD concurred with both recommendations.", "document_type": "gao"}
{"report": "In fiscal year 2019, states are required to spend at least 8 percent of CCDF funding for “quality activities”—activities that are designed to improve the quality of child care services the state provides. These activities may include supporting the professional development of the child care workforce and improving the supply and quality of child care programs and services for infants and toddlers. Table 1 describes examples of quality activities states may choose to fund with their required quality set-aside, as well as requirements for states to carry out certain activities from the CCDBG Act of 2014, where applicable. After setting aside funds for quality activities and administrative activities, states must spend at least 70 percent of discretionary funds that remain on subsidies for eligible families. They provide subsidies to eligible families through the CCDF program in the form of certificates or vouchers to use for child care in homes, child care centers, and classrooms, or through grants or contracts to child care providers. Children receiving CCDF subsidies may receive care alongside nonsubsidized children— that is, children who may be eligible for child care subsidies but who do not receive them, or who may be ineligible for child care subsidies. A majority of states used fiscal year 2017 CCDF funds to entirely or mostly fund 7 of 10 major state child care activities, according to our survey of CCDF administrators in the 50 states and D.C. (see fig. 1). The 10 child care activities included in our survey, components of which are also required by CCDF, are key means through which states may choose to improve the quality of their child care services (i.e., quality activities). They also represent diverse aspects of a state’s child care system. Among states that relied on CCDF funding to support the quality activities, we found that, on average, states funded 6 of the 10 activities entirely or mostly with CCDF. Nearly one-third of states (16) funded at least 8 of the 10 to that degree. States reported that they relied on CCDF funding most frequently for the following activities: child care resource and referral systems, consumer education, and health and safety standards establishment and training. Child care resource and referral systems. More than three-quarters of states (40) reported in our survey that all (22) or most (18) of the funding they used for their child care resource and referral systems in fiscal year 2017 came from CCDF. Statewide systems of child care resource and referral agencies can serve an important role in supporting state quality improvement efforts, though not all states have them, according to HHS. For example, child care resource and referral agencies may provide training and technical assistance to child care providers and share consumer education with families, among other things. States may use CCDF funds to establish or support a system of local or regional agencies that is coordinated by a lead child care resource and referral organization. Officials in the states we interviewed described various ways in which their child care resource and referral agencies support child care providers and parents, such as: Delivering professional development, including training and technical assistance, to child care providers, regardless of whether or not the providers accept subsidized children, according to several CCDF administrators interviewed. Supporting parents by determining eligibility for subsidies, providing referrals for care, and offering information on child care quality, according to state officials. For example, one state houses eligibility specialists in regional child care resource and referral agencies, through which families apply for subsidies, while another state uses these agencies to refer families to child care providers and support families with specialists, including mental health consultants and infant specialists, as needed. Consumer education. About 70 percent of states (36) reported that all (12) or most (24) of the funding they used for consumer education activities in fiscal year 2017 came from CCDF. Consumer education activities are intended to help parents seeking child care make informed decisions and improve access to information that supports child development. States must certify that they have policies to make public the results of child care providers’ monitoring and inspection reports, as well as certify that they will collect and disseminate information on child care services available through CCDF, research and best practices concerning child development, and state policies regarding the social- emotional and behavioral health of children, among other requirements. Moreover, many of the 15 states we interviewed used child care resource and referral agencies to do this. Examples from our state interviews illustrate that: One state promotes awareness of its quality rating and improvement system for child care providers through materials available from the state’s child care resource and referral agencies, according to its CCDF administrator. Another state’s child care resource and referral system has a public awareness campaign aimed at the parents of infants, toddlers, and preschoolers to help families understand and identify quality child care, according to the head of the state’s child care resource and referral network. Parents in a third state can obtain information on child development through resources available from lending libraries, according to the state’s CCDF administrator. Health and safety standards. About 70 percent of states (36) also reported entirely funding (15) or mostly funding (21) the development or deployment of training for health and safety standards with CCDF in fiscal year 2017. According to the CCDBG Act, states are required to certify that they have health and safety standards in specific topic areas, such as the use of safe sleeping practices and pediatric first-aid, and certify that all CCDF providers will receive minimum health and safety training in these areas. Most of the 15 states that we interviewed went beyond CCDBG Act requirements and elected to apply their health and safety training requirements to all licensed child care providers in the state, and in some cases, to child care providers that are exempt from licensing. In doing so, officials described how their requirements served to elevate the health and safety of children in care regardless of whether they receive CCCF subsidies. Several state officials specifically credited the CCDBG Act as the impetus for their states’ changes. State officials we interviewed also described taking various approaches, including offering financial incentives, to facilitate child care providers in meeting training requirements. Examples of these approaches and their impact include the following: One state official said that while the state child care agency had wanted to increase health and safety requirements for child care providers for years, the reauthorization of the CCDBG Act propelled the state forward in its efforts to increase child care quality and require the same health and safety training of all licensed and license-exempt providers. One state offers health and safety grants to child care providers to meet these requirements, while another is considering increasing child care provider payment rates to a level that will allow them to meet the updated health and safety requirements, according to state officials. CCDF administrators in two states told us they are developing online training modules for the required health and safety training so child care providers can access the modules more easily and for free or have mailed training DVDs to every child care program in the state. CCDF administrators in almost all of the 15 states we interviewed told us their states set aside more than the minimum amount that CCDF required to support quality in 2017. They described how their states use quality set-aside funds to support child care licensing programs, accreditation, and quality rating systems for child care providers, among other things. Some state officials we interviewed also described specific supports for infants and toddlers, such as partnerships to provide training for child care providers around the care of this age group, and increases in provider payment rates for infant and toddler care, which is costly to provide, from the infant and toddler-specific set-aside. According to one state CCDF administrator, the ability to divert funds to activities that benefit infants and toddlers is critical as this is the neediest age—a time when children and parents need the most support. A range of CCDF quality activities, including consumer education, child care licensing, and professional development of the child care workforce affect the care of children not receiving subsidies (nonsubsidized children), according to our 51-state survey of CCDF administrators (see fig. 2). On average, states reported that 9 of the 10 activities included in our survey affect nonsubsidized children receiving child care in the state, with more than 40 percent of states (22) reporting that all of the activities affect nonsubsidized children, according to our analysis of the survey data. As previously noted, the activities serve as key supports for building quality in state child care systems. Of these activities, CCDF administrators unanimously cited three in our survey as affecting nonsubsidized children: consumer education; licensing, monitoring or background checks for child care; and professional development. Below are some specific examples of the way nonsubsidized children are affected by these activities, as discussed with CCDF administrators in our 15 state interviews. Consumer education. During our interviews, state officials discussed ways in which their CCDF programs share important information on child care quality and child development with all families, including those not receiving subsidies. As previously noted, many of the 15 states we interviewed rely on their child care resource and referral agencies to provide such information to the public. HHS requires states to have a website that includes, among other things, a searchable list of licensed child care providers and information about the provider’s quality rating, if available. States we interviewed use these and other consumer education tools, such as billboards, public service announcements, and commercials in an effort to reach a wide-ranging audience. Licensing, monitoring, or background checks. According to the CCDBG Act, states must certify they have policies to annually conduct unannounced inspections of all licensed CCDF providers for compliance with all child care licensing standards, including health, safety, and fire standards, with at least one pre-licensure inspection. But most of the 15 states we interviewed have elected to apply certain CCDBG Act requirements for CCDF providers, including those pertaining to monitoring and inspections, to all licensed providers in the state, according to their states’ CCDF administrators. Officials in several states suggested that updating their requirements for all licensed providers with the CCDF requirements establishes a high-quality foundation for child care that reflects the importance of a healthy and safe environment for all children receiving care, regardless of whether children receive a subsidy. Examples from some states that we interviewed are: In one state, where subsidized children make up about 20 percent of children in licensed care, the state’s CCDF administrator estimated that significant numbers of nonsubsidized children benefit from higher quality care, including from more extensive monitoring of all licensed providers. Another state applied the requirements for CCDF providers to all license-exempt child care providers (including those not serving subsidized children), which helps ensure that all children in care benefit from the updated monitoring, health and safety, and background check requirements. An official from another state that does not apply CCDBG Act requirements more broadly said that, because nonsubsidized children share classrooms with subsidized children, requirements that apply to subsidized providers, in turn, also still benefit the nonsubsidized children in their classrooms. In particular, he said that the requirement that all CCDF providers that serve subsidized children be inspected has opened up child care centers that previously, as license-exempt providers, were not inspected, and has resulted in improvements in some centers. Professional development. CCDF administrators we interviewed recognize professional development as key to high-quality child care for all children, including nonsubsidized children. The CCDBG Act requires states to describe the training and professional development requirements designed to enable CCDF providers to promote the social, emotional, physical, and cognitive development of children. According to HHS, states must also require ongoing training for CCDF providers that is accessible, appropriate to the age and setting of the children served, and aligned to a progression of professional development that includes a minimum number of annual hours of training for the child care workforce. As with certain other CCDBG Act requirements, a majority of states we interviewed have established the same professional development requirements for all licensed child care providers, whether or not they care for subsidized children, according to state officials. One CCDF administrator said that the updated CCDF requirements for subsidized providers were an impetus for her state to raise the training requirements for providers that do not care for children receiving subsidies and that are unlicensed. She said the updated, more comprehensive training requirements help ensure that all children are in care with child care providers that parents can trust. CCDF administrators also highlighted characteristics of their states’ professional development activities that serve to positively impact nonsubsidized children as well—namely, availability, accessibility, and affordability of professional development opportunities to child care providers. For example, state officials told us of making these opportunities available to all child care providers through online training courses, training and onsite consultation from child care resource and referral agencies, technical assistance and coaching, and resource lending libraries. Nearly all states we interviewed use their states’ quality set-aside funds to support such training, technical assistance, and/or coaching opportunities. Where training may not be free, CCDF administrators told us of financial incentives that assist child care providers in their efforts to increase quality through professional development. For example, several states use their quality set-aside funds to offer scholarship grant programs available to child care providers to help increase their qualifications, whether or not they care for subsidized children. One state offers incentive payments based on a provider’s level of attainment in the state’s career ladder, for which all providers are eligible to apply, according to its CCDF administrator, and can result in provider development that benefits the nonsubsidized children in their care. In addition to spending on quality activities, states reported through our interviews that nonsubsidized children also indirectly benefit from state spending on subsidies. According to officials in many of the 15 states that we interviewed, states’ spending on subsidies helps increase the economic stability of CCDF providers, which, in turn, also benefits nonsubsidized children in their care. Officials said that subsidizing providers to help pay for the cost of care for eligible families can provide a consistent source of revenue for CCDF providers that allows them to continue stable operations, invest in professional development, and increase teacher pay, for example. Such spending, in turn, can lead to improved child care quality as well as access (i.e., by helping providers stay in business) to nonsubsidized children, too, who are in their care, according to state officials. However, officials in many states we interviewed also noted that CCDF subsidies or related policies may negatively impact nonsubsidized children and families. For example, several said that state increases in payment rates for CCDF providers may lead providers to similarly increase the rates they charge for the nonsubsidized children in their care, which, some noted, could drive families for whom such care is no longer affordable to alternative, unregulated providers that may have lower quality standards. Rate increases can be particularly difficult for middle-income families who do not qualify for CCDF and are struggling to meet the current market rate of child care, according to one state’s CCDF administrator. CCDF administrators from several other states also noted a drop in CCDF child care providers in recent years due to various factors, including low payment rates, extensive CCDF requirements for inspections and background checks, and an insufficient number of children to sustain operating costs, for example. In much of one state’s neediest areas, local elementary schools often provide the highest quality care, according to the state’s CCDF administrator; however, with the addition of background checks that some school districts have found administratively burdensome and duplicative, the official said that many districts have dropped out of the CCDF program. Among quality activities, states most often reported plans to spend the new discretionary CCDF funding from the Consolidated Appropriations Act, 2018 on three—licensing, consumer education, and professional development—the same activities that all states reported affect nonsubsidized children, according to our survey of CCDF administrators in the 50 states and D.C. (see fig. 3). Licensing, monitoring, or background checks. More than two thirds of states we surveyed (34) plan to spend the new CCDF funds on child care licensing or related activities of monitoring and background checks. During our interviews, many state CCDF administrators provided examples of how they plan to use new funds on licensing-related activities, such as hiring or increasing pay of licensing staff or making administrative or system improvements to facilitate the interstate background checks required under the CCDBG Act. For example, one state plans to enhance its online background check portal to streamline interstate coordination while another state plans to help providers pay for the interstate background check fees by offsetting the increased cost for the next 1 or 2 years. A third state, which has been operating under an HHS waiver that allowed for delayed implementation of the interstate background check requirements, now plans to use new funds to conduct the required checks, according to the state’s CCDF administrator. Without the new funds, officials from two states said that they may have had to reduce funding to other child care activities, including subsidies, in order to allocate the additional resources needed to comply with licensing, monitoring, or background check requirements. Consumer education. More than half of states we surveyed (30) said they plan to spend new funds on consumer education activities. Some state officials we interviewed described plans to enhance public state child care websites to make them more user-friendly or available in other languages, such as Spanish. For example, one state plans to improve online access to provider information by featuring a dashboard with a snapshot of each provider’s license history, including inspection violations. Officials from another state said they plan to use new funds to launch a public engagement campaign to provide timely and important information about child care and state-based child care services. In the absence of the new funding, officials from two states said they would likely need to reduce their efforts to better educate families statewide about important child development information and the states’ publicly- available tools that can help parents identify high-quality child care. Specifically, officials from one state said they would have to forgo plans to make their public child care website more sophisticated and consumer- friendly and officials from another state said they would not be able to conduct their planned public education campaigns. Professional development. More than half of states we surveyed (30) said they plan to fund professional development activities for child care providers. Officials we interviewed in several states told us about plans to use the new funds to implement or improve online professional development systems, such as by increasing online course offerings or creating training applications accessible by cellphone, which can improve accessibility for all child care providers. We also heard about plans in five states to use some new funds to provide specialized training, including training focused on infant and toddler-specific topics, caring for children exposed to trauma, and emergency planning and response. CCDF administrators from two other states described plans to fund more scholarships for child care workforce training and certification programs, including Child Development Associate credential programs. Lastly, officials in one state told us they plan to create a mentorship program whereby high-quality licensed providers mentor licensed-exempt providers in order to help providers who are interested in becoming licensed improve their quality and professional development qualifications. Without the new funds, officials from one state said they would not have been able to continue to support as many professional development opportunities that support both subsidized and nonsubsidized children, such as conferences, networking events, and coaching. Another CCDF administrator expressed concern that in the absence of the new funds, her state may have struggled to implement a new workforce registry system that tracks child care providers’ education and credentials. Most states reported plans to allocate the new funds to multiple state child care activities, according to our analysis of the survey data. Specifically, we found that more than two thirds of states plan to fund at least three of the activities, and half of states plan to fund at least five activities. Moreover, according to our survey, about 40 percent of states (20) also plan to spend at least some of the new funds to increase the proportion of funding set aside for quality activities beyond the required minimum for the year—which, as described earlier, they can use to fund these activities. During our interviews, we heard about states’ plans to spend new funds on a variety of qualifying activities, including child care resource and referral systems, accreditation of child care providers, and development of high-quality program standards. In the absence of the new funds, one state CCDF administrator told us that the state would likely have had to eliminate some optional quality activities, such as financial support to help providers become accredited. She further explained that the state is more willing to cut back on quality activities when there is insufficient funding than to disenroll families from the CCDF program. Aside from quality activities, states we surveyed also reported plans to spend new CCDF funds toward subsidies. More than half of states (31) plan to spend at least some of the new funds on increasing payment rates for CCDF providers or lowering parental copayments. For example, one state official we interviewed told us about plans to increase payment rates for infant and toddler care, with a goal to increase access to child care for infants and toddlers across the state. In addition, about half of states (25) we surveyed reported plans to spend new funds to implement two requirements that allow families to continue receiving subsidies for a longer period of time—the 12-month eligibility period and the graduated phase-out of assistance. Lastly, nearly one-third of surveyed states (16) reported plans to use new funds to pay for subsidies for children on their wait lists to receive child care. CCDF administrators in all of the states we interviewed that use a wait list (5) stated that they might have had to expand their wait lists in the absence of the new funds. However, several state CCDF administrators expressed uncertainty about their states’ plans for using the new CCDF funds in interviews (conducted in May and June 2018). Officials from more than a third of the 15 states we interviewed (6) said their spending plans were still in flux. In some of these states, officials said they were still developing and reviewing their funding proposals as part of their state’s legislative and budgeting process and they were awaiting future legislative approval or spending authorization. For example, in one state, the CCDF administrator said she was awaiting information on how much money the state would receive before she planned to convene stakeholder groups to discuss potential funding proposals. In another state, the CCDF administrator said her office needed to wait for other local budget appropriation decisions before her office could commit the new CCDF funds to specific priorities. Officials in more than half of the 15 states we interviewed also told us they faced challenges making spending decisions because they were unclear whether the new funds would be provided on an ongoing basis. For example, CCDF administrators in two states that plan to expand subsidies to children on their wait lists expressed concerns about having to disenroll children from the program if funding is discontinued. Officials from several states suggested that they are proceeding cautiously with spending decisions given there is no guarantee that the increased funds will be provided in the future, while an official from another state told us they are operating under the assumption that the new funds will be provided on an ongoing basis and do not have a contingency plan in the event that the funds are not continued. We provided a draft of this report to HHS for review and comment. HHS provided technical comments only, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made key contributions to this report are listed in appendix II. In addition to the contact named above, Janet Mascia (Assistant Director), Avani Locke (Analyst-in-Charge), and Elizabeth Hartjes made key contributions to this report. Also contributing to the report were Seto Bagdoyan, James Bennett, Randy De Leon, Kirsten Lauber, Sheila R. McCoy, Jonathon Oldmixon, Jessica Orr, James Rebbe, Almeta Spencer, and Amy Sweet.", "summary": "CCDF is the primary source of federal funding for child care subsidies. States administering CCDF are subject to requirements that improve the quality of child care for all children, nonsubsidized as well as subsidized. In March 2018, the Consolidated Appropriations Act, 2018 was enacted, which provided $5.2 billion in additional CCDF discretionary funding for fiscal year 2018, approximately twice the amount provided in fiscal year 2017. GAO was asked to review state use of CCDF funds and their potential impact on nonsubsidized children. GAO examined (1) the extent to which states use CCDF funds to support their child care system, (2) the kinds of CCDF–related activities states engage in that affect children who are not receiving CCDF subsidies, and (3) how states plan to use the increase in CCDF funding from the Consolidated Appropriations Act, 2018. GAO collected information from state CCDF administrators through a survey to the 50 states and the District of Columbia (D.C.) and interviews with officials in 15 states, including D.C., selected to reflect diverse characteristics and locations. GAO also reviewed relevant federal laws, regulations, and guidance, and interviewed Department of Health and Human Services officials. GAO makes no recommendations in this report. A majority of states used funding from the Child Care and Development Fund (CCDF) in fiscal year 2017 to entirely or mostly support 7 of 10 major state child care activities GAO identified in its survey of 51 state CCDF programs. These activities, components of which are also required by CCDF, represent diverse aspects of state child care systems and are a key means through which states may choose to improve the quality of their child care. States reported that they relied primarily on CCDF funding for child care resource and referral systems, consumer education, and health and safety standards establishment and training more frequently than for other activities. States reported in GAO's survey that a range of CCDF quality activities affect the care of children not receiving CCDF subsidies (nonsubsidized children), including three activities cited by all states—consumer education, child care licensing, and professional development of the child care workforce. CCDF administrators in most of the 15 states GAO interviewed said they have elected to apply certain requirements for caregivers subsidized under CCDF to all state licensed child care providers. For example, child care providers may be subject to monitoring and professional development requirements, whether or not they care for children receiving subsidies. CCDF administrators also stated that, as a result, all children in the care of licensed providers in these states—including nonsubsidized children—benefit from the enhanced requirements. States most often reported in GAO's survey that they plan to spend new CCDF funds provided in the Consolidated Appropriations Act, 2018, on quality activities that benefit all children in child care including licensing, consumer education, and professional development. For example, officials GAO interviewed in several states described plans to enhance public state child care websites to make them more user-friendly for all families or available in other languages, such as Spanish. However, more than a third of the interviewed states said their spending plans were still in flux, and more than half said they faced challenges making spending decisions because it was unclear whether the new funds would be provided in the future.", "document_type": "gao"}
{"report": "As the landlord for the federal government, GSA acquires space on behalf of federal agencies through new construction and leasing. In this capacity, GSA leases space in 8,681 buildings or other assets and maintains a total inventory of more than 370 million square feet of workspace for 1.1 million federal employees, plus support contractors. Furthermore, GSA is authorized by law to enter into lease agreements for up to 20 years and is permitted to obligate funds for its multiyear leases one year at a time. GSA can delegate its leasing authority to agencies if GSA determines it is in the government’s best interest. Agencies may request this delegation of authority when they believe they can obtain the lease more efficiently than GSA. GSA grants three types of delegations of leasing authority, depending on the intended use of the leased space: General purpose – types of space that might be needed by almost any agency, such as office or warehouse space; Categorical – specific types of space that might be needed by some agencies, such as for antennas, depots, or docks; and Special purpose – types of space designated for 13 specified agencies, such as laboratories for the Department of Health and Human Services or office space in or near stockyards for USDA. GSA’s FMR Bulletin C-2, issued in 2014, (the 2014 Bulletin) provides usage and reporting requirements for delegations of leasing authority. Many of these requirements restate or elaborate on various requirements in statute and regulation. All delegations of leasing authority, including general purpose, categorical, and special purpose space delegations, are covered by the 2014 Bulletin. Agencies are responsible for compliance with all applicable requirements when using delegated leasing authority. Agencies must also conform with the requirements of any delegation approval from GSA. The requirements can include limits on square footage or the length of the lease. Although GSA delegates its leasing authority to other agencies, it acts as a guarantor for the leases in the event of a default by an agency. GSA officials said that there have not been any defaults to date. The process to apply for delegated leasing authority and then obtain a delegated lease is outlined in figure 1 below. In 2007, GAO found that GSA’s delegated leasing program documentation was incomplete, inconsistent, unclear, and outdated. Specifically, we found that GSA’s lease delegation process lacked certain management controls, such as current written policies and procedures. In addition, the GSA OIG found that some delegated leases had excessive rental rates and inadequately documented lease files, primarily due to customer agencies’ lack of expertise. Further, 56 percent of the lease files reviewed by the OIG contained insufficient documentation to support that the federal government received a fair and reasonable price. In response to problems identified in GAO and GSA reviews, GSA reformed its lease delegation program by clarifying requirements, documenting policies and procedures, and centralizing data management. In 2007, GSA issued new requirements for the delegated leasing program in the FMR Bulletin 2008-B1 (2008 Bulletin). For example, the 2008 Bulletin instructed GSA and the agencies on the proper submission of documents to GSA; and required agencies to have an organizational structure in place to support the delegation of authority, and to ensure compliance with all applicable laws, regulations, and GSA directives governing the lease acquisition. In 2014, GSA began using a new electronic system—G-REX—to review and process applications for delegations of leasing authority. Requesting agencies began electronically submitting pre-authorization and post award documents to G-REX. In 2014, GSA re-emphasized and updated the requirements applicable to GSA leasing delegations in its 2014 Bulletin, which continued to be in effect when this report was issued. GSA continues to address data quality issues that persist in spite of its reform efforts. These data quality issues affect GSA’s ability to monitor its delegated leasing program. First, we found that when information is compiled, the G-REX system overstates the total delegated lease contract values by 12 times higher than they actually were for every delegated lease in the G-REX system. This occurred because it multiplied annual rents by the number of months of the lease, instead of by the number of years. For example, for a lease with an annual rent of $2,300,000 and a lease term of 48 months, the calculated total contract value was $110,400,000 instead of the $9,200,000 total contract value it should have had for the 4 year lease. GSA officials confirmed this error and corrected it during the course of our review. Second, we also found data errors in G-REX resulting in approved delegated leasing projects with annual rental rates higher than they actually were. For example, we found a data entry within G-REX for an approved delegated lease with a total lease rental rate several times higher than the average annual rent rate. After reviewing the lease file, GSA officials confirmed that the rental rate was incorrectly entered by the user into G-REX. We also found two G-REX data entries for approved delegated leasing projects with 25 year lease terms. General purpose delegated leases can only be for terms of up to 20 years. GSA officials confirmed that both identified leases were within the authorized delegated leasing parameters but that the data entries were inaccurate due to a system error within G-REX that incorrectly calculated the renewal options. GSA officials said that they are aware of some data quality issues with the G-REX system and are working to address them in an updated version, which they plan to launch later in 2019. Officials said that the new version of G-REX will include more business rules to prevent missing data and identify anomalies. Further, uploading required post award documents is not currently a mandatory action in G-REX. Instead, G-REX sends automatic reminder emails to agencies if these documents have not been uploaded. To address this issue, GSA officials said that the new version of G-REX would improve the post award document upload process. As we discuss later in this report, we found that selected agencies did not always submit all required post award documents. While GSA is taking steps to improve the G-REX system, it does not reconcile FRPP and G-REX data. Specifically, the 2014 Bulletin states that GSA will perform an annual reconciliation of data between FRPP and G-REX. GSA officials described the annual reconciliation as an oversight procedure that would help ensure that GSA has an accurate listing of delegated leases by comparing FRPP data with the centralized records on delegated leases (currently stored in G-REX). According to GSA officials, they tried to fully reconcile the two databases in 2014 but were unable to do so. GSA officials stated that while they could identify certain specific discrepancies between FRPP and G-REX, conducting a full reconciliation of the two databases has many degrees of complexity. Specifically, G-REX does not include all delegated leases, in part, because not all existing delegated leases migrated into G-REX from the prior GSA leasing system. In addition, GSA officials said FRPP and G-REX do not directly match because each database serves different purposes. Specifically, FRPP is a single comprehensive database that contains information on federal real property worldwide, updated annually. In contrast, G-REX is considered a business process management software application and is primarily used by GSA to process and capture lease delegation applications, according to GSA officials. GSA officials now report that, even though the 2014 Bulletin still calls for the annual reconciliation of data in G-REX and FRPP, they believe fully reconciling the two datasets would have little, if any, value, and currently have no intentions to do so. The Standards for Internal Control in the Federal Government state that improving the reliability of data could help agencies better manage programs. For example, in this case, agencies could utilize real property data to measure performance and inform decision-making to ultimately improve the cost effectiveness and efficiency of their real property portfolio. Moreover, although FRPP data quality could be improved, FRPP can still provide reliable background information on GSA’s federal real property portfolio. Since agencies are required to report data to FRPP on all leased assets acquired under a delegation from GSA, FRPP may provide GSA with useful information on an agency’s delegated leases, in addition to what is included in G-REX. We recognize the challenges posed by attempting to fully reconcile G- REX and FRPP. However, the 2014 Bulletin does not explicitly state GSA will perform a full reconciliation. GSA could partially reconcile G-REX and FRPP by doing some cross-data comparison. For example, had GSA cross-verified G-REX and FRPP data, even on a case-by-case basis, it could have potentially caught and addressed the data quality issues we found in G-REX earlier. Some comparison of G-REX with the relevant data in FRPP could improve the reliability, and thereby the usefulness, of both data sets. For example, GSA officials said that GSA could, in theory, begin comparing leases reported in FRPP as being awarded with delegated authority against G-REX’s record of delegated leases. A partial reconciliation like this could identify leases possibly acquired without delegated leasing authority or other data quality issues and GSA could then take steps to increase the reliability of the G-REX data. Until GSA clarifies its position on what efforts it will take to reconcile G-REX and FRPP, GSA is potentially losing opportunities to enhance its oversight and is operating at odds with its own procedures. We found that GSA has not designed control activities that would allow it to regularly determine the adequacy of requesting agencies’ policies and procedures to manage their delegated leasing activities. Instead, GSA officials said that they expect agencies to have the capacity to manage their delegated leases until evidence suggests otherwise and said GSA assesses agencies’ activities on an ad hoc basis. For example, GSA officials said that GSA audited USDA and Bureau of Indian Affairs (BIA) because of tips from outside sources. Agencies requesting a delegation of leasing authority must submit, among other things, an organizational structure and staffing plan to support the delegation that identifies trained and experienced staff to support delegated leasing activities. In our review, we found that not all selected agencies had sufficient policies and procedures to manage their own delegated leases. For example, GSA’s ad hoc review of USDA’s delegated leases found significant oversight issues. Specifically, GSA found that USDA had awarded seven leases without a delegation of authority. In addition, USDA was unable to locate the executed lease for one of the delegated leases we reviewed. USDA officials said the agency has learned from experiences like this one and is currently developing better policies and procedures to prevent this from happening again. For example, USDA has centralized leasing oversight between two bureaus and plans to annually review selected delegated leases. Moreover, GSA’s ad hoc review of BIA’s delegated leases found that BIA had also leased property without delegated authority. Further, GSA’s 2012 audit of post award documents found that BIA had some delegated leases that had expired, and some exceeded the space threshold of 19,999 square feet. As a result of its review, GSA did not grant BIA any new delegated leasing authority until its OIG completed its findings and BIA responded with a corrections plan that corrected these deficiencies, according to GSA. GSA’s 2014 Bulletin states that GSA will review the adequacy of the requesting agency’s organizational structure and staffing proposed for the delegation; and whether the requesting agency has complied with all applicable laws, executive orders, regulations, OMB Circulars, and reporting requirements under previously authorized delegated leases. Further, according to federal standards for internal control, management should design control activities to achieve objectives and respond to risks. Control activities are the actions management establishes through policies and procedures to achieve objectives and respond to risks in the internal control system. Accordingly, agencies with delegated leasing authority should have an appropriate organizational structure and effective policies and procedures to support the delegation and to ensure compliance with applicable laws and other requirements, both of which help agencies manage their delegated leasing activities. If GSA had designed control activities to regularly review each agency’s policies and procedures for managing its delegated leases, GSA officials could have known earlier that an agency lacked the ability to manage its delegated leases and possibly delayed granting additional delegations of leasing authority until the agency had demonstrated their ability to manage its delegated leasing activities. GSA officials said assessing an agency’s policies and procedures to manage delegated leasing activities when reviewing the agency’s individual application for a delegation of leasing authority is not practical. GSA officials noted that it would become a repetitive and unproductive process to review an agency’s policies and procedures each time they applied for delegated leasing authority as the same agencies are requesting delegated leasing authority for many leases and an agency’s policies and procedures would not change with each new application. However, GSA could assess agencies’ policies and procedures for managing delegated leasing activities at regular intervals, such as annually or biennially. Because GSA is not following its own procedures set out in the 2014 Bulletin, or designing control activities that would allow it to assess, at regular intervals, agencies’ ability to manage their own delegated leasing activities, GSA cannot ensure that it is providing this authority to agencies that can manage it effectively. GSA does not track agencies’ performance toward meeting GSA’s management goals, which is inconsistent with the 2014 Bulletin and GSA policy. GSA has three key management goals for tracking the success of the delegated leasing program: 1. Delegated leases should have lease rates that are at or below private sector rates over half the time, according to GSA’s annual performance plan. The 2014 Bulletin states that, prior to granting the agency’s request for a leasing delegation, GSA will consider the demonstrated ability of the requesting agency to meet or exceed this published performance measure for the cost of leased space, among other things. 2. Delegated leases should not extend into holdover status. The 2014 Bulletin states that a lease in holdover status, or an agency occupying a building or space with no lease because it has expired, is in violation of the lease delegation authority. 3. Delegated leases should not be extended unless necessary to avoid a holdover. GSA’s leasing desk guide states that short-term lease extensions should only be used as a last resort because they typically cost more, among other reasons. The post award documents that agencies submit into G-REX do not allow GSA to track agencies’ performance in meeting these management goals. For example, G-REX does not calculate when lease rates are at or below private sector rates. GSA officials said that GSA does not track the performance of agencies with delegated leasing authority against these three management goals because it is primarily the agencies’ responsibility to ensure they meet them. However, the four agencies with delegated leases that we reviewed did not always meet GSA’s three goals. Officials from two of the agencies we interviewed said that they were unaware of GSA’s performance cost metric for negotiating lease rates at or below private sector rates or that it applied to delegated leases. Consequently, the agency officials did not know if they met it. Since neither G-REX nor the agencies with delegated authority track lease rates in this way, GSA does not know if agencies are meeting GSA’s performance cost metric or, more simply stated, if agencies are negotiating cost-effective lease rates. Regarding holdovers, we found all four agencies in our review were experiencing holdovers, which raises questions about how effective their policies are to prevent them. For example, USDA does not use its lease expiration data in an effective manner to track expiring leases to submit lease delegation applications, according to GSA’s audit of USDA delegated leases. Consequently, USDA had one quarter (1,100 of 4,000) of its delegated leases in holdover status in the past 24 months, according to the GSA report. Furthermore, according to our analysis of agency data, all four selected agencies have expired delegated leases where the agency either has a standstill agreement with the landlord, or is simply in holdover status. For example, VA had approximately 10 percent of its delegated leases in holdover status in fiscal year 2018. Regarding extensions, according to G-REX data, almost half of all approved delegated lease authority requests from fiscal year 2016 to fiscal year 2018 were for lease extensions, which goes against GSA’s goals. Officials from three of the four agencies in our review said that they use extensions because they need more time to develop the agency’s space need requirements for a new delegated lease, and they might not have the time to do so before the current delegated lease’s expiration date. GSA staff stated that if an agency has a large number of extensions or holdovers, it denotes that the agency may not be monitoring its leases and as a result is not fully aware of expiring delegated leases. Tenant agencies agree that lease extensions are often not in the best financial interest of the federal government because they are not open to competition, according to this previous work. For example, the USDA’s delegated lease site in Coquille, Oregon was extended without competition for 45 years. USDA officials agreed this was not in the best financial interest of the federal government and that delegated leases should be opened for competition after 20 years. Lease extensions and expired leases in holdover or standstill status are inefficient and costly for the federal government for two reasons. First, without competition among landlords, an agency may be unable to meet the goal of negotiating a lease rate at or below the private sector rate. Second, we have previously reported that the short-term nature of holdovers and standstill agreements creates uncertainties, which can make it challenging for agencies to plan and budget for space needs and difficult for lessors to secure financing. Moreover, we have reported that holdovers can create an adversarial relationship with building owners, prompt concerns about an agency’s portfolio management, and create unnecessary uncertainty for relevant stakeholders. We also noted that holdovers and standstills occur for a variety of reasons, including challenges finalizing space requirements, tenant agency labor shortages, and the sometimes lengthy duration of the leasing process. Absent procedures to regularly track the performance of agencies with delegated leasing authority to ensure cost effectiveness and limit the use of extensions, holdovers, and standstill agreements, GSA cannot ensure that these agencies are meeting the management goals of the delegated leasing program. When previously reviewing GSA’s management of its own portfolio, we found that tracking and monitoring several measures over the life cycle of the lease acquisition process may help reduce the overall number of holdovers and extensions. For example, using a tracking tool to alert management of delegated leases approaching their expiration date could help to reduce the reliance on extensions and to prevent holdovers and standstill agreements. Regularly tracking agencies’ ability to meet key management goals would alert GSA to holdovers and heavy use of extensions that are not cost effective and may warrant additional oversight. GSA requires that agencies submit an acquisition plan for their lease when requesting delegated leasing authority, but GSA does not systematically ensure that the subsequently executed leases follow those plans and meet program requirements. Agencies submit an acquisition plan along with other documents in order to request delegated leasing authority. GSA officials told us that they review requests for delegated leasing authority by verifying that all required information and documents are uploaded into G-REX and that a lease consistent with the acquisition plan would meet program requirements. GSA officials noted, however, that the acquisition plan is strictly a planning tool and that the terms and conditions are subject to change when finalizing the lease. When approving a request for delegated leasing authority, GSA issues an executive summary and approval letter to the agency identifying the parameters of the leasing authority delegated, such as space limits. Once the agency with delegated leasing authority awards the lease, the agency is required to upload to G-REX certain post award documentation, including the executed lease, within 30 days. These documents provide insight on final lease terms such as square footage, lease expiration date and cost, which may differ from the acquisition plans agencies submitted when applying for delegated leasing authority. We have previously identified risk-based assessment and mitigation as leading practices for providing assurances to managers that they are complying with existing legislation, regulations, and standards and effectively preventing, detecting, and responding to potential fraud, waste, and abuse. Assessing a selection of delegated leases’ post award documents could serve as an early warning system for managers to help mitigate or promptly resolve issues through corrective actions and ensure compliance with existing legislation, regulations, and standards. However, GSA officials said that they do not have a process in place to systematically review post award documents from delegated leases to determine whether the lease awarded met program requirements and were within the authority granted in the approval letter. We found that as of November 2018, GSA had reviewed approximately one percent of the post award documents agencies submitted into G-REX, according to G- REX data. GSA officials told us they had not developed a system for reviewing post award documents because GSA views it as primarily the responsibility of the agency with the delegated authority to ensure they comply with the 2014 Bulletin’s post award requirements. Further, according to GSA officials, GSA’s primary role in the lease delegation process is to review and approve requests for delegated leasing authority. As a result, GSA officials have determined that regularly reviewing post award documents is not the best use of their already constrained resources. However, GSA’s reliance on agencies to comply with all requirements absent any mechanism to ensure post award accountability could allow agencies to lease space outside of the delegated authority granted to them. GSA’s previously mentioned, ad hoc audits of USDA and BIA delegated leases reinforced the need for strengthened oversight to ensure that leases meet requirements, as both audits found problems. For example, the DOI’s OIG confirmed in 2014 GSA’s findings that BIA approved $32.7 million in delegated lease agreements that exceeded GSA square footage and purchase approval limits. GSA’s review of USDA’s delegated leases also found that approximately 540 lease files were missing the awarded lease documents in G-REX. In addition, the review found that no file, in its sample of 27 lease files, had all the required documents uploaded in G-REX. Furthermore, among our selected delegated leases, we found instances of agencies not uploading post award documents to G-REX after the lease was awarded. For example, one delegated lease file in our sample was still missing the executed lease over 2 years after the lease was signed. If post award documents are not uploaded as required, GSA may not even have the documentation necessary to determine if a delegated lease met program requirements and was within the authority granted. Even if all post award documents are uploaded, GSA still cannot verify that the leases were executed within the parameters of the granted delegated leasing authority and in accordance with program requirements without a systematic process for reviewing post award documentation. For example, as noted above, if GSA assessed a selection of delegated leases’ post award documents, it may have identified the missing executed lease and other deficiencies noted above and been able to notify the agency. Further, GSA cannot ensure that agencies are preventing fraud, waste, or abuse. GSA oversees the delegated leasing program and is a guarantor of the government’s monetary obligations under a delegated lease in the event of default. However, if not properly managed, delegated leases run the risk of not being cost effective for the federal government. GSA has taken some actions to address previously identified issues with the program, but its current oversight and management of the program is compromised by a lack of key processes that make it unable to ensure the program is working as intended. Because GSA has not determined how to reasonably reconcile G-REX and FRPP data, pursuant to its own procedure, it is missing oversight opportunities, such as finding leases with annual rent or lease terms that do not meet program requirements. Additionally, without a way to regularly assess agencies’ policies and procedures to manage their delegated leasing activities or track their performance in meeting key management goals, GSA cannot be sure agencies can sufficiently manage their leases or secure cost-effective rates. Periodic reviews of an agency’s ability to manage its delegated leasing activities would help GSA ensure that it is providing this authority to agencies that can manage it effectively and efficiently. Finally, without a systematic process for monitoring a selection of submitted post award documents to help identify and promptly resolve issues and ensure compliance with existing legislation, regulations, and standards, GSA cannot ensure that delegated leases comply with the terms of the delegation and the program is free from fraud, waste, and abuse. We are making the following four recommendations to GSA The Administrator of GSA should take steps to reconcile G-REX and FRPP to the extent practical. (Recommendation 1) The Administrator of GSA should develop a process for assessing at regular intervals, such as annually, agencies’ policies and procedures for managing their delegated leasing activities. (Recommendation 2) The Administrator of GSA should develop a process that would allow GSA to track agencies’ progress in meeting GSA management goals, such as cost effective lease rates, and avoiding holdovers. (Recommendation 3) The Administrator of GSA should develop a systematic, risk-based process for monitoring a selection of submitted post award documents. (Recommendation 4) We provided a draft of this product to GSA, VA, USDA, Interior, and Commerce for review and comment. In its comments, reproduced in appendix I, GSA concurred with the recommendations. GSA and USDA provided technical comments, which we incorporated as appropriate. VA, Interior, and Commerce did not have comments. We are sending copies of this report to the appropriate congressional committees, the Administrator of the General Services Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or RectanusL@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Lori Rectanus, (202) 512-2834 or RectanusL@gao.gov. In addition to the individual named above, other key contributors to this report were Keith Cunningham, Assistant Director; Sarah Jones, Analyst in Charge; Eli Albagli; Lacey Coppage; Josh Ormond; Colleen Taylor; Michelle Weathers; and Elizabeth Wood.", "summary": "As the federal government's landlord, GSA is authorized to lease property to accommodate federal agencies. It can also delegate this authority to other agencies, though GSA is still responsible for overseeing the delegated leasing program. However, prior audits found problems with delegated leasing, including excessive rental rates and insufficient documentation to support that the government received a fair and reasonable price for the lease. GAO was asked to review GSA's delegated leasing program. This report examines: 1) GSA's efforts to reform its delegated leasing program; 2) the extent to which GSA assesses agencies' policies, procedures, and performance in managing their delegated leasing activities; and 3) the extent to which GSA ensures delegated leases meet requirements. GAO reviewed federal statutes and regulations, and GSA's guidance and data on delegated leases. To illustrate how GSA approves and oversees delegated leases, GAO judgmentally reviewed 17 delegated leases selected to include lease contract value, type of lease, and agencies with high number of delegated leases. GAO interviewed officials from GSA and the four agencies associated with GAO's selected delegated leases. The General Services Administration (GSA) has taken steps to reform its delegated leasing program, but data reliability issues remain. For example, GSA created GSA's Real Estate Exchange (G-REX) to centralize delegated lease requests and approvals, but GAO found G-REX had incorrect information on lease rental values and rates—reporting rates 12 times higher than they actually were. Moreover, GAO found that GSA was not annually reconciling data between G-REX and the government-wide real property database, per GSA's own procedures. GSA officials said that their past efforts to fully reconcile the data were unsuccessful but acknowledged there may be ways to compare the data to improve the reliability of both datasets. Until GSA clarifies what it can do to partially reconcile the data sets, it is not obtaining the intended benefits of this data validation exercise. GSA does not know if agencies have the ability to manage their delegated leasing activities because it does not regularly assess their policies and procedures, or their performance in meeting GSA's management goals, such as avoiding extensions. GSA procedures state that GSA will consider the agency's organizational structure and ability to meet certain GSA performance measures prior to granting requests for delegated leasing authority. Moreover, federal internal control standards call for agencies to design control activities to better manage the program. However, GSA officials said that GSA relies on the agencies to oversee their own delegated leases. Nevertheless, GAO found instances of inadequate policies and procedures at one agency in managing its delegated leasing activities. Further, all 4 agencies had delegated leases that were in holdover status (occupying a space beyond the expiration of the lease term), which violates program requirements. Because GSA does not regularly assess agencies' procedures or performance, it cannot ensure that agencies are effectively managing their delegated leasing activities. GSA cannot ensure that the leases agencies execute under delegated authority meet program requirements and are within the authority granted because it lacks key procedures to do so. GAO found that GSA had only reviewed 1 percent of the post lease award documents agencies had submitted, and in some cases, agencies had not submitted required documentation. GSA officials said the agencies are responsible for ensuring that documents are submitted and requirements are met. However, a risk-based assessment of a selection of delegated leases' post award documents can provide assurances that agencies comply with existing regulations and prevent potential fraud, waste, and abuse. Because GSA did not have a process to systematically review these documents, GSA is unable to ensure that delegated leases meet requirements and that agencies are positioned to prevent fraud, waste, or abuse. GAO recommends that GSA (1) reconcile its databases; (2) regularly assess agency procedures for managing delegated leasing, (3) track agency performance, and (4) develop a review process for post lease award documents. GSA agreed with the recommendations.", "document_type": "gao"}
{"report": "The Airline Deregulation Act of 1978, which established the EAS program, specifies that if DOT determines that air service will not be provided without subsidy, DOT shall use EAS program funds to award a subsidy to a carrier willing to provide service. As of October 1, 2018, 108 communities within the contiguous United States (as well as 65 in Alaska and Hawaii) were receiving EAS (see fig.1). To be eligible for EAS, a community must: be located more than 70 miles from the nearest large or medium hub require a subsidy per passenger of $200 or less, unless the community is more than 210 miles from the nearest large or medium hub airport or unless DOT decides to issue a waiver; have a subsidy per passenger of less than $1,000 during the most recent fiscal year at the end of each EAS contract, regardless of the distance from a hub airport; have had an average of 10 or more enplanements per service day during the most recent fiscal year, unless the community is more than 175 driving miles from the nearest medium or large hub airport or unless DOT is satisfied that any decline below 10 enplanements is temporary; and have received subsidized EAS in fiscal year 2011 or were provided a 90-day termination notice by an air carrier, and the Secretary required the air carrier to continue such service to the community. EAS is funded through appropriations from a combination of discretionary funding provided through annual appropriations acts, and overflight fees, which are collected by the Federal Aviation Administration (FAA) from foreign aircraft traveling over U.S. airspace without taking off or landing in the United States. Historically, the amount of overflight fees provided to EAS has been $50 million per year, but the FAA Modernization and Reform Act of 2012 directed that all overflight fees be directed to EAS, an action that which resulted in an increased proportion of the program being funded by overflight fees (see fig. 2). The minimal level of service each community is required to receive—the minimum number of roundtrips and passenger seats that must be provided, certain characteristics of aircraft to be used, and the maximum number of permissible stops to a medium or large hub airport—are all established in law. In general, current law requires that an EAS carrier provide the following: service to a hub airport, defined as an FAA-designated medium- or large-hub airport; two daily round trips, 6 days a week, with not more than one intermediate stop to the hub; flights at reasonable times taking into account the needs of passengers with connecting flights and at prices that are not excessive compared to prices of other air carriers for like service between similar places; service in an aircraft with an effective capacity of at least 15 passengers, under certain circumstances, unless the affected community agrees in writing to the use of smaller air craft; service in an aircraft with at least two engines and using two pilots; and service with pressurized aircraft under certain circumstances. DOT awards contracts to individual air carriers to serve EAS communities on a rolling basis throughout the year. According to DOT officials, DOT takes the following steps: DOT issues a request for proposals to all carriers to provide air service to an eligible community. Air carriers submit proposals that include the size of the aircraft to be used, the frequency of service, potential hubs, and the amount of subsidy required. Air carriers request subsidies at a level to cover the difference between their projected revenues and expenses, and to provide a profit. While there are no limits on the amount of subsidy that a carrier can request in its proposal, a community can become ineligible for EAS if the annual subsidy exceeds $1,000 per passenger regardless of distance from the nearest hub airport or $200 per passenger if it is located fewer than 210 miles from the nearest large or medium hub airport. DOT reviews the proposals and selects an air carrier to provide air service to the community, generally for a contract period ranging from 2 to 5 years. When selecting air carriers to provide service to EAS communities, DOT is directed by statute to consider five factors: service reliability, contracting and marketing arrangements with a larger carrier at the hub, “interline agreements” with a larger carrier at the hub, whether the air carrier has included a plan in its proposal to market its service to the community, and user preferences. In addition, the Secretary may consider the relative subsidy requirements of the carriers. By statute, the subsidy is set at an amount to cover the difference between the carrier’s projected costs of operation and its expected passenger revenues, while providing the carrier with a profit element typically equal to 5 percent of total operating expenses. DOT awards a contract and pays air carriers based on the number of flights completed in the prior month. Air fares on EAS routes are set at the air carrier’s discretion without input from DOT. In 2003, the Vision 100—Century of Aviation Reauthorization Act established the AEAS, which allows communities to forgo subsidized EAS for a prescribed amount of time in exchange for a grant to spend on options that may better suit their transportation needs. For example, a community under AEAS may use the grant to purchase an aircraft to meet transportation needs or may receive some flexibility on operating requirements. Under AEAS, the community must still adhere to EAS eligibility requirements, and the maximum annual grant amount may not exceed the annual EAS subsidy at the time of application to the program or what DOT would pay to maintain EAS at the eligible community. For example, if an air carrier received a subsidy of $1 million per year to serve a community and the community decides to leave EAS and enter AEAS, then the grant amount to the community under AEAS may not be more than $1 million per year. As of September 2019, 8 of the 108 EAS communities in the contiguous United States were participating in the AEAS. In addition, federal funds are available to support airports—including airports that receive subsidized EAS—through the Airport Improvement Program (AIP). AIP grants are awarded to public entities to make capital improvements—such as runway and taxiway improvements. The level of AIP funding that an airport receives is based on the number of annual enplanements at the airport. For fiscal year 2018, airports with 10,000 or more passengers were entitled to at least $1 million; airports with between 8,000 and 10,000 passengers were entitled to $600,000, and airports with fewer than 8,000 passengers were eligible for $150,000. Thus, the number of enplanements at an airport receiving subsidized EAS may affect the amount of AIP funds for which the airport is eligible. Officials from the 14 communities receiving EAS that we interviewed cited several economic benefits of the local air service they receive: Economic development, including the ability to attract and retain businesses and professionals: When asked what benefits they received from local air service, officials from all 14 communities mentioned that having access to reliable air service through EAS was crucial for economic development in their community, including the ability to attract and retain businesses and professionals. In three of the communities, officials told us that the first question a business asks when deciding to locate to the area is if air service is available. Increased tourism to the community: When asked about benefits, officials in 6 of the 14 communities mentioned that EAS helps to bring tourists to the community. One community official told us that having access to air service through EAS was a key factor in the community’s being selected to host the Boy Scout Jamboree, which brought 8,000 volunteers and 45,000 Boy Scouts to the area. Creation of jobs related to air service: Officials from 4 of the 14 communities also mentioned that EAS brought jobs related to air service to the community, including TSA personnel, airport employees, airline employees, and concessionaire employees such as those at fixed-based operators and airport restaurants. In addition, some community officials told us that having air service in the community creates other types of jobs and supports area industries, such as hotels, restaurants, and rental car companies. Further, community officials told us that EAS provides other benefits in addition to economic benefits. Officials from 11 of the 14 communities mentioned that EAS allows residents to more easily travel and be connected to the rest of the world. Officials in 3 communities said that residents use EAS to travel to larger cities for medical services that are not available locally, such as procedures and appointments with specialists. Officials whom we interviewed in three communities that lost eligibility for subsidized EAS told us that losing air service has had a negative economic effect. For example, officials in one community told us that the lack of air service has decreased the ability of local businesses, hospitals, and colleges to recruit for professional-level jobs, such as physicians and professors, who have travel needs to maintain proficiency in their field. An official from another community told us that losing EAS led to decreased enplanements, which, in turn, reduced the amount of AIP funding that the airport receives. With less AIP funding, the airport is not able to pay for improvements that would attract or enable air carriers to serve the community. Most of the studies we reviewed found there to be a correlation between aviation activity and economic development. Specifically, several of the findings indicate that greater aviation activity in a region is correlated with some increase in the growth in population, employment, or per capita incomes. The size of the influence in these findings was relatively small but statistically significant. For example, one study found that a 1 percent rise in passengers per capita was associated with 0.055 percent rise in output per capita and another study found that a 10 percent increase in number of nonstop destinations served from an airport was associated with a 0.13 percent increase in employment and a 0.2 percent increase in average wage. One study that specifically examined the effect of subsidized air service found that the availability of EAS was related to a small but statistically significant increase in per-capita income in the local market. Specifically, this study found that a 1 percent increase in traffic at an airport receiving subsidized EAS was related to a 0.12 percent increase in per-capita income. Further, another study that focused solely on small airports found airport activity was associated with higher per-capita income, while another study found that more rural areas experienced an even greater benefit of nearby aviation activity than did more urban areas. However, two of the studies we reviewed found that the effect of aviation activity on local economic factors may be greater in areas with larger airports, which tend to be in larger metro areas, than in areas with smaller airports. Since 2010, four statutory changes and a change in DOT’s enforcement policy have limited the number of communities that are eligible to receive EAS. (See app. II for a detailed list of statutory changes.) The Airport and Airway Extension Act of 2011 prohibited DOT from continuing to provide subsidies to communities with annual per- passenger EAS subsidies of over $1,000, regardless of their distance from the nearest hub airport. The FAA Modernization and Reform Act of 2012 removed eligibility for communities within 175 miles of a large- or medium-hub airport that do not have an average of least 10 enplanements per day during the most recent fiscal year, unless DOT grants them a waiver. The FAA Modernization and Reform Act of 2012 removed EAS eligibility for communities that did not receive EAS between September 30, 2010, and September 30, 2011, thus preventing further growth of the program. This limitation does not apply to Alaska and Hawaii. The number of communities that would otherwise be eligible for service if not for this provision is unknown. We are aware of at least one community that lost eligibility based on this requirement. However, DOT has not been able to determine how many communities fall into this category due to a number of complicating factors, including an unclear count of the number of communities that were initially eligible for EAS in January 1979 and changes in eligibility in the intervening years. The Consolidated Appropriations Act of 2014 and subsequent appropriations acts required the Secretary of Transportation to negotiate a local cost share with communities located less than 40 miles from the smallest hub airport before entering into a new contract using EAS subsidies. Two communities in the contiguous United States—Pueblo, Colorado and Lancaster, Pennsylvania—were initially subject to this provision. Currently, Lancaster, Pennsylvania is the only community in the contiguous United States subject to the provision. In October 2014, DOT issued a Notice of Enforcement Policy stating that it would start enforcing the annual subsidy-per-passenger cap of $200 for communities located less than 210 miles from a medium- or large-hub airport after September 30, 2015, thereby limiting the number of communities eligible for EAS in 2016. However, DOT may grant a waiver to communities that have not met the cap. We also identified two statutory changes since 2010 that increased the flexibility of air carriers’ operations for the EAS program, and one that automatically grants waivers for the $200 subsidy-per-passenger cap to communities that meet certain requirements. The Consolidated and Further Continuing Appropriations Act of 2012 and subsequent appropriations acts eliminated the requirement that aircraft providing service under the EAS program have a minimum 15- seat passenger capacity. Officials from about half (8 of 17) of the communities that we interviewed were in favor of the elimination of this requirement. As a result of this change, the number of EAS communities in the contiguous United States receiving service with eight- or nine-seat aircraft increased from 23 percent (25 of 107 communities) in 2010 to 47 percent (50 of 107 communities) in 2019. The FAA Reauthorization Act of 2018 explicitly allowed the Secretary of Transportation to consider the flexibility of current operational dates and airport accessibility when issuing requests for proposal of EAS at seasonal airports. DOT had already been considering seasonal service for some communities. Two of the communities that we interviewed—Bar Harbor, ME, and Cody, WY—have seasonal EAS because the number of passengers fluctuates during different times of the year. The FAA Reauthorization Act of 2018 required DOT to automatically grant waivers for annual subsidy-per-passenger cap of $200 if (1) a community’s subsidy per passenger for a fiscal year is lower than any of the previous 3 fiscal years or (2) if the subsidy per passenger for a fiscal year is less than 10 percent higher than the highest subsidy per passenger for the previous 3 fiscal years. The Secretary may only waive this subsidy cap once per community. According to DOT, it began implementing this provision in 2019 using fiscal year 2018 data. As described earlier, DOT is allowed to waive some eligibility requirements. DOT can grant waivers to communities for (1) not meeting the 10-enplanements per-day requirement or (2) exceeding the $200 subsidy-per-passenger cap in the prior fiscal year. There are several steps that DOT generally follows when granting EAS waivers: DOT collects information from the prior fiscal year to determine which communities no longer meet EAS eligibility requirements. DOT issues a “show cause” order that directs the EAS community or other interested persons to submit information to show why DOT should not terminate the eligibility of the community. The communities that are listed in the “show cause” order may provide DOT with information demonstrating that they met EAS requirements or submit a petition to DOT that demonstrates that the community’s failure to meet eligibility requirements is a temporary situation in order to retain eligibility. If the community does not provide new information to demonstrate that they met EAS requirements or submit a petition, then the community’s eligibility for EAS is terminated. DOT then issues a final order that changes its initial determination, grants a waiver to the community, or terminates the community’s eligibility for EAS. If a community disagrees with DOT’s decision to terminate eligibility, it may submit a petition for restoration. As a result of these changes in statute and enforcement policy, 12 communities lost eligibility for EAS since 2010 and either were not eligible for a waiver, did not apply for one, or applied for a waiver and were not granted one (see table 1). While some communities lost eligibility for EAS, many communities that did not meet eligibility requirements since 2014 continue to receive EAS because they were granted at least one waiver from DOT. From fiscal year 2014 through fiscal year 2019, DOT granted a total of 110 waivers to 37 communities—about one-third of the number of communities currently in the program (see fig. 3). The number of communities that received waivers in recent years has increased during this time period, in part due to DOT’s decision to enforce the $200 subsidy-per-passenger cap. DOT granted waivers to 15 communities because they experienced a hiatus in service during the year that resulted in the community’s not meeting the 10 average daily enplanements requirement or exceeding the $200 subsidy-per-passenger cap. Of the communities that petitioned for waivers, DOT granted waivers to all but three—Jamestown, NY; Franklin/Oil City, PA; and Hagerstown, MD. Jamestown did not meet the 10 enplanements per-day requirement and exceeded the $200 subsidy cap in fiscal year 2016. DOT officials did not grant a waiver to Jamestown because they did not think there was sufficient evidence that Jamestown would ever have enough service to meet eligibility requirements. Franklin/Oil City has not met the 10 enplanements per-day requirement in each year since fiscal year 2013 and has exceeded the $200 subsidy cap in each year since fiscal year 2015. DOT did not grant a waiver to Franklin/Oil City because of its continued non- compliance with these requirements and its proximity to a medium hub airport. Pittsburgh International Airport is 85 driving miles away. In September 2019, Franklin/Oil City filed a petition to DOT for reconsideration. DOT denied the petition. Hagerstown has not met the 10 enplanements per-day requirement since fiscal year 2013 (except fiscal year 2016), and has exceeded the $200 subsidy cap each fiscal year since fiscal year 2015. DOT did not grant a waiver to Hagerstown because of its proximity to a large hub airport— Hagerstown is less than 70 miles from Washington Dulles International Airport—and the fact that there was not sufficient evidence to indicate that Hagerstown would be able to meet eligibility requirements in the future. In August 2019, Hagerstown filed a petition to DOT for reconsideration. DOT denied the petition, and Hagerstown filed suit to challenge the decision in federal court. Athens, GA, which did not meet the 10-enplanements per-day requirement, was eligible to submit a waiver request but did not do so. The number of communities in the contiguous United States receiving EAS changed little since the beginning of fiscal year 2010 to the beginning of fiscal year 2018—from 104 on October 1, 2009, to 109 on October 1, 2017. However, program expenditures for EAS communities in the contiguous United States have increased from approximately $161.3 million in fiscal year 2010 to $276.9 million in fiscal year 2018—an increase of nearly 72 percent (see fig.4). Some of the increased program expenditures were due to increased costs of certain critical resources over the last several years, such as pilots’ salaries. However, even when total expenditures are adjusted for the effect of inflation, expenditures still rose substantially. Notably, we found a nearly 50 percent increase in spending that is not accounted for by the general rise in prices over these years, despite a roughly consistent number of communities served by the program. According to DOT officials, some of the cost increase is related to factors that also affected the rest of the airline industry, such as increased costs for pilots, flight crew, and mechanics. For example, in 2018 we found that compensation for commercial airline pilots has increased in recent years, most noticeably in new-hire compensation at regional airlines. Our analysis of Bureau of Labor Statistics data from 2012 through 2017 showed that the median wages in the pilot occupation increased by approximately 2.4 percent per year, while wages for all occupations increased by about 1 percent per year over this period. DOT officials told us that other factors contributing to increased program costs are more specific to EAS. For example, some regional airlines that serve EAS communities have experienced financial difficulties, and in some cases, contracts with new carriers have increased in price to factor in costs associated with replacing the previous carrier’s service. DOT officials noted that larger air carriers that serve many markets have more options available to help offset industry-wide cost increases, such as increasing fares on more commercially viable routes, whereas some of the smaller carriers that primarily service EAS markets have fewer options on the revenue side to offset cost increases. Community officials and air carriers that we interviewed described several challenges they face with regard to maintaining viable service. Many of these challenges compound each other. Quality of Service: According to officials from the communities we interviewed, an air carrier provides good quality service to an EAS community when the service is reliable (i.e., flights are on time, at convenient times, and are not frequently cancelled), offers connections to multiple locations, and includes benefits such as the ability to easily catch a connecting flight and check bags to the final location. Some community officials also said good quality service involves seamless connections to large hubs with regional jets. When a carrier does not provide what communities and passengers see as quality service, the number of enplanements decreases because people stop using the service. As a result, the carrier may decrease the number of flights per day to make the service financially viable. However, the reduction in frequency could further degrade the quality of service. Carrier representatives explained that many factors affect the quality of service carriers are able to provide and communities explained that unreliable service can result in several problems for them. Decline in Enplanements: Officials in most of the communities (15 of 17) said that a lack of quality service from the carrier had been a challenge and in many instances (14 of 17) had led residents to opt to travel to an alternative larger airport for service. The resulting decline in the number of enplanements can put a community at risk of losing EAS eligibility because it may not be able to achieve an average of at least 10 enplanements per service day or stay under the $200 subsidy-per-passenger cap. Officials from one community said that its EAS carriers’ cancelled flights and lack of interline agreements with mainline airlines had resulted in customers choosing to drive 80 miles to fly out of a large hub airport rather than use the local airport. Providing Service within Subsidy Caps: Four of the carriers we interviewed said that increased costs—such as those resulting from increased pilot wages—make it difficult to provide service within the subsidy caps, which have not been increased to account for inflation. An official from one carrier said that factors such as the increasing costs for pilots and an insufficient number of aircraft operating with less than 50 seats make it difficult for a community airport to comply with the $200 subsidy-per-passenger cap. According to representatives of the carrier, in some instances, they are paying their pilots 75 percent more than they were 5 years ago. They said that to compensate, the carrier may have to raise fares, a step that could lead to losing passengers and potentially put communities at risk of losing eligibility for EAS. Loss of Customers’ Confidence: Three of the carriers we interviewed said that when they were selected to replace carriers that had not provided reliable service to a community, it took time to regain the community’s confidence and attract people to use their EAS air service. If these air carriers had not been able to regain the community’s confidence and increase enplanements, the community may have lost eligibility for EAS. Loss of AIP Funding: A decline in the number of enplanements may also lead to a reduction in AIP funding available to the airport. AIP funding is important for small communities that have fewer financial resources than large- or medium-sized airports. AIP funding can help airports make improvements that could attract more business, such as from commercial and business aviation. Pilot shortage: Aviation stakeholders have voiced concerns that there is an insufficient supply of qualified pilots to support current and future demand from U.S. regional and mainline airlines. In May, 2017, the Working Group on Improving Air Service to Small Communities found that as a result of the pilot shortage, there were too few pilots to fly all the EAS routes. In June 2018, we found that labor market indicators for the pilot occupation were consistent with the existence of a pilot shortage. Carriers and community officials that we interviewed cited the following as issues related to the pilot shortage. Difficulty Retaining Pilots: Officials from 6 of the 10 carriers we interviewed said that it has been a challenge to retain sufficient pilots to provide the air service they have committed to providing under EAS. Pilots often start their careers with smaller air carriers that may serve EAS communities, and after a few years in the business, pilots are hired by larger airlines offering higher pay and more opportunities for advancement. Officials from 3 of the 10 carriers we interviewed said that they have responded to the pilot shortage by operating eight- or nine-seat aircraft under Part 135 regulations, which allows them to use pilots that have less flight time as first-officers. This increases the pool of pilots who can fill first-officer positions and gives these pilots the opportunity to build flight hours toward their Airport Transport Pilot license. Reduced Service Quality: Officials from 15 of the 17 communities we spoke with said that a shortage of pilots has been a challenge. Specifically, the pilot shortage has resulted in a reduction in service quality for some EAS communities because the air carrier has not been able to attract enough pilots to provide reliable service. Six of 17 communities told us that their enplanements declined and that some had lost service for a period of time due to a lack of pilots. For example, an official from one community said their carrier ended service to the community in 2014 due the industry-wide pilot shortage. Airport costs: Air carriers must pay fees to use airport facilities. Fees are charged for landing, counter and gate space, parking, and other airport facilities. These varied fees are part of carriers’ operating costs. Officials from 3 of the 10 carriers we talked to said that these airport costs may be difficult to cover because carriers serving the EAS program use relatively smaller aircraft with fewer passengers, and therefore, the carrier must charge more per passenger to cover the costs. For example, an official from one carrier we interviewed said that a community wanted to have an EAS flight that flew into Las Vegas; however, the airport in Las Vegas charged a single-aisle 9-seat aircraft the same landing fee as any other single-aisle aircraft, some of which can hold hundreds of passengers. Production and supply of small aircraft: Because there is a lack of availability of aircraft between 19 and 50 seats, in some cases, DOT, airlines, and communities have to choose service with a plane that is either too small or too large for demand. Manufacturers have said they are generally not producing this size aircraft because there is less demand and higher costs since they must certify them under Part 25 regulations for scheduled commercial service as opposed to the lower costs incurred under Part 23 regulations. Insufficient or Excess Capacity: Officials from 12 of the 17 communities we interviewed said that the declining production and supply of 19- to 50-seat aircraft has been a challenge for the EAS program. Officials from 2 communities we interviewed said they have moved to larger 50-seat aircraft, which means the communities might have too much capacity. On the other hand, officials from 11 of the 17 communities we interviewed expressed concerns about receiving service from a carrier that operates aircraft with less than 15 seats because, according to six communities we spoke with receiving air service from a carrier that only operates eight- or nine-seat aircraft may not provide sufficient capacity to allow the community to fulfill the EAS annual enplanement requirements, and thus, the community could lose eligibility for EAS. In addition, officials from 5 of the 17 communities were concerned that some people have an aversion to or difficulty getting into small aircraft that could deter them from using the service. Financial Effects on Air Carriers: Officials from 5 of the 10 carriers we interviewed said that the lack of available aircraft between 19 and 50 seats is a challenge. For example, an official from one carrier was concerned that operating eight- or nine-seat aircraft may limit their ability to serve EAS communities whose enplanements are increasing because the carriers would have to add seat capacity either through increased frequency of flights or larger aircraft they do not currently own in order to decrease the subsidy-per-passenger costs. However, if the carrier uses an aircraft with 50 or more seats, the carrier must have sufficient increasing demand to fill that plane on a regular basis to justify the capital expenditure and increased costs to operate. Furthermore, according to officials from another air carrier, eight- or nine-seat aircraft were not designed to operate with the frequency that small carriers are using them, which can reduce reliability and increase maintenance and operating costs. Driving Distance Calculation: While communities that we interviewed cited several specific benefits of the local air service they receive, as previously discussed, some expressed concerns about specific aspects of the program. Officials from 5 of the 17 communities we interviewed said that DOT’s calculation of the shortest driving distance between the community and the nearest large- or medium-hub can affect their eligibility requirements. DOT relies on the driving distance calculation to determine which communities are subject to the 10-enplanement and $200 subsidy-cap requirements. According to community officials, the easiest, safest, and quickest route from the community to the airport may be further than what DOT has calculated as the shortest driving distance, which could make the community exempt from these requirements. For example, one community official we spoke with told us that most people in the community take the expressway to the nearest hub airport, which is further from the center of the community to the airport than the two-lane route DOT uses in its calculation. An official from another community we interviewed said that DOT should take into account the time required to drive the route and the safety of the roadway when calculating the distance for EAS eligibility. The official explained that the route should take 2 hours to drive but often takes much longer due to traffic and delays, and expressed concerns that the route is very dangerous. Carrier Contracts: Contracts in the EAS program are in the form of DOT Orders announcing the carrier selected to serve a route and the subsidy awarded to the carrier. The Orders contain information such as the annual subsidy rate, the time frame for service, and various carrier requirements. Officials from 6 of the 17 communities we interviewed said that the structure of DOT’s contracts with EAS carriers can present a challenge because the communities feel they provide little to no leverage over a carrier that provides unreliable service. Officials from five communities said that EAS contracts do not include performance requirements or have penalties if the carrier does not meet service quality standards or targets. As previously discussed, officials from 15 of the 17 communities we interviewed told us that they had not received quality service at some point in the EAS program, which can result in declining enplanements and, ultimately, the community losing eligibility for the EAS program. However, if a community wants to have DOT cancel a contract, the community might lose air service if there is not another carrier interested in providing service. DOT has stated that the EAS program already provides financial incentives for carriers to provide reliable service. For example, DOT states that its “no fly, no pay” policy encourages carriers to complete flights because DOT reimburses carriers only for flights that they actually operated. Further, DOT also believes that carriers have financial incentives to increase completion rates above the rate estimated in their proposals. Because carriers frequently account for predictable flight cancellations they have an incentive to beat their estimate. Furthermore, carriers have the financial incentive to provide quality service to avoid losing enplanements and maintain a financially viable service. The communities and air carriers we interviewed suggested potential reforms to EAS that they believed would improve service to their communities. Several of these changes would likely result in increased program costs. Change the subsidy cap: Officials from two communities and four carriers we interviewed said that the $200 per-passenger-subsidy cap should be changed, either by indexing the cap to inflation or increasing the cap temporarily for a community to allow a carrier more flexibility to develop a market for new service in a community or to account for higher labor costs. Since the subsidy cap is established in statute, revising it would require a legislative change. An official from one community said that increasing the cap for inflation would allow a carrier to use a larger aircraft, thereby improving use of the airport. One air carrier official said the cap needs to be increased to reflect rising labor costs. In its October 2014 notice of enforcement policy, DOT said that while it recognized the cap has not kept pace with inflation, the requirements of the statute did not provide DOT with the discretion to adjust the subsidy cap amount or refrain from enforcement. However, DOT issued waivers to 34 communities that did not meet the $200 subsidy cap from 2014 through 2019. If the subsidy cap were tied to inflation since its inception in 2000, the cap would be $283 in 2018. Of the 55 communities that were subject to the subsidy cap in 2018 because they are within 210 miles of a medium- or large-hub airport, 39 were under the subsidy cap and 16 exceeded it. Our analysis shows that if the subsidy cap were adjusted for inflation, an additional 10 communities would fall under the subsidy cap, and only 6 communities would exceed it. See figure 5. Renegotiate EAS agreements: Officials from 3 of the 10 carriers we interviewed said they should be permitted to request additional funds from DOT during the course of a contract. In 2009, we reported that allowing air carriers to renegotiate EAS contracts in response to rising costs would enable carriers to continue rather than file a Notice of Termination. As previously discussed, carriers we interviewed cited airport and operating costs as challenges they have encountered over the course of an EAS contract. Legislation passed in 2003 explicitly provided DOT with the option of adjusting the subsidy paid to an EAS carrier if the carrier’s expenses substantially increased. However, DOT officials said that to date no carrier has petitioned for such an increase. Revise DOT’s calculation of the driving distance: As mentioned earlier, to determine whether an EAS community is subject to the 10- enplanement-per-day and subsidy-cap requirements, DOT must determine the shortest driving distance from the center of the community to the nearest large- or medium-hub airport. Officials from four of 17 communities we interviewed suggested that DOT adjust its calculation to account for local factors, such as the time required to drive the shortest route, the condition of the road, and the most common route that members of the community use to get to the nearest large- or medium-hub airport. Considering these factors could result in communities not being subject to the limit on eligibility of requiring an annual subsidy per passenger of $200 or less, if the more commonly used or faster route is more than 210 miles from the nearest large or medium hub airport. Allow communities to regain eligibility: Officials from two communities and two carriers we interviewed suggested that subject to the availability of funds, communities that lost eligibility for the EAS program should be allowed to regain it if they are having difficulty obtaining air service without a subsidy. Officials from one community and one carrier we interviewed said communities that lost EAS eligibility as a result of unreliable service from their carrier should not be penalized by losing EAS program eligibility. According to DOT, they consider such circumstances when deciding to grant a community a waiver. In other instances, communities lost eligibility because they were not receiving EAS in fiscal year 2011. An official from one carrier suggested communities that regain eligibility could pay a co-share of the subsidy costs, possibly limiting the effect on the cost of the program. Some of the options that communities and carriers suggested, such as revising DOT’s process for carrier selection and restructuring DOT’s contracts with carriers could address the challenges in the EAS program but not necessarily increase program costs. Revise DOT’s process for carrier selection: Officials from 3 of the 17 communities and 4 of the 10 carriers we interviewed suggested that DOT adjust its method for carrier selection to account for factors such as the carrier’s financial viability, ability to comply with enplanement requirements, and agreements with mainline carriers, as well as the number of available pilots and mechanics in order to ensure that carriers are capable of providing good service to EAS communities. In addition, officials from one community also suggested that DOT give more weight to community preferences regarding carrier selection. While DOT is required to consider factors such as service reliability, interline agreements, and carrier financial and operating fitness when selecting a carrier, most of the communities we interviewed cited the quality of service they have received through the EAS program as a challenge. Include performance measures in DOT’s contracts with air carriers: Officials from four communities and one carrier suggested that DOT include performance measures in EAS contracts to ensure carriers are held accountable for providing a given level of service and subject to penalties for not meeting service quality targets. For example, one community official suggested that on-time performance and percentage of flights cancelled could be included as performance measures for EAS carriers. Officials from three communities and one carrier suggested that DOT include more requirements for service to EAS communities. For example, DOT could require that EAS carriers provide service to large-hub airports and have agreements with mainline carriers that could enhance quality of service; however, an official from one air carrier told us the carrier was reluctant to enter into agreements with smaller air carriers that serve EAS communities because they did not want their reputation to be negatively affected if the air carrier did not provide reliable service. An official from another carrier suggested that it is beneficial for carriers to enter into longer contracts because they can spend more time building the air service market for the communities they serve rather than renewing contracts. The officials said that for longer contracts DOT should include performance measures that require the carrier to provide a minimum level of reliable service or lose the route. Limit airport fees for EAS carriers: Officials from 3 of the 10 carriers we interviewed thought DOT should limit fees airports charge to EAS flights, such as landing fees and gate charges in order to increase the financial viability of EAS routes. Airport fees can be based on any number of factors including weight and number of seats on the aircraft. According to FAA’s policy on establishing airport charges, it recognizes airports are allowed to charge fees to help ensure their financial viability and at the same time those fees should be reasonable and not unjustly discriminatory. FAA’s policy further indicates that the issue of rates and charges is best addressed at the local level by agreement between users and airports. Change EAS from a carrier subsidy program to a community grant program: Officials from three communities we interviewed thought that similar to AEAS, DOT could consider providing a grant to a community in lieu of traditional EAS to allow the community more control over the service they receive. For example, an official from one community said that they liked the additional control the AEAS program has given the community over the service and that AEAS gives the community more weight with the carrier when there is a complaint about the service. Officials from three air carriers told us that a potential downside to this option is that it would be more complicated because carriers would need to work with individual communities for payment instead of just DOT. In addition, officials from three communities told us that they lack the technical expertise needed to effectively administer such a program. We provided a draft of this report to DOT for review and comment. DOT provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report please contact me at 202-512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the contact above, Cathy Colwell (Assistant Director); Stephanie Purcell (Analyst in Charge); Amy Abramowitz; David Hooper; Bonnie Pignatiello Leer; John Mingus; Dominic Nadarski; Malika Rice; Pamela Snedden; Laurel Voloder; and Elizabeth Wood made key contributions to this report.", "summary": "Congress established EAS as part of the 1978 deregulation of the U.S. airline industry. Through the EAS program, DOT provides subsidies to airlines to make service available to communities that airlines would otherwise not serve. Since 2010, several statutory changes have limited eligibility for EAS subsidies by, among other things, changing eligibility requirements. In spite of these changes, program costs have continued to rise, prompting questions about whether additional modifications should be made. A provision in the Federal Aviation Administration Reauthorization Act of 2018 directed GAO to examine several aspects of the EAS program. This report discusses, among other objectives, (1) how federal laws enacted since 2010 have affected air service to communities funded through the program; and (2) challenges that communities and air carriers face with EAS, and options for reform. GAO reviewed relevant federal laws, DOT orders, and DOT program data. GAO also interviewed representatives, such as airport managers and local government officials, from 17 communities that have participated in EAS; representatives from 10 of the 11 air carriers that participate in the program; and DOT officials. This report focuses on the EAS program as it operates in the contiguous United States, as there are different rules for EAS in Alaska and Hawaii. Statutory changes since 2010 have reduced the number of communities eligible for subsidized air service through the Essential Air Service (EAS) program; however, the Department of Transportation (DOT) granted waivers to most of the communities that applied, resulting in little change in the number of communities receiving EAS. In 2012, statutory changes limited eligibility for the program in the contiguous United States to those communities receiving EAS in fiscal year 2011. Further statutory changes set a maximum average per-passenger subsidy, and a minimum number of passengers, that some communities would have to meet to retain eligibility. DOT also resumed enforcing the $200 per-passenger subsidy cap for certain communities. While these changes limited eligibility, in some cases the changes also gave DOT the option of providing waivers—most of which DOT granted. Thus, as noted, the overall number of communities receiving EAS remained about the same; however, EAS expenditures increased from $161 million in fiscal year 2010 to $277 million in fiscal year 2018 (see figure). DOT officials said this increase was due, in part, to factors affecting the entire airline industry, such as increased labor wages. Community officials and air carriers GAO interviewed cited several challenges associated with EAS and suggested options for reform. For example, some carriers said it was difficult to find and retain pilots due to an insufficient supply of qualified pilots. At the same time, pilot wages have increased, making it difficult to provide quality service without exceeding the subsidy caps. Some carriers and community officials noted that the $200 subsidy cap has not changed for several years to account for inflation or these increased costs. To address these and other challenges, stakeholders suggested a number of options, such as indexing the $200 subsidy cap to inflation or allowing communities that lost eligibility to re-apply for the program. Several of these reforms would result in additional program costs.", "document_type": "gao"}
{"report": "The U.S. government implements export controls to manage risks associated with exporting sensitive items while ensuring that legitimate trade can still occur, and to advance U.S. national security and foreign policy objectives. These export controls are governed by a complex set of laws, regulations, and processes that multiple federal agencies administer to ensure compliance. State and Commerce each play a significant role in the implementation of U.S. export controls. State controls the export of sensitive military items, known as defense articles and defense services, such as tanks, fighter aircraft, missiles, and military training, which it lists on the U.S. Munitions List (USML). Commerce controls the export of U.S.-origin items with both commercial and military applications (known as “dual-use” items), such as computers, sensors and lasers, and telecommunications equipment, as well as less sensitive military items, which it lists on the Commerce Control List (CCL). Items subject to State and Commerce jurisdiction are governed by separate laws and regulations. The Arms Export Control Act of 1976, as amended, provides the statutory authority to control the export of defense articles and services, which the President delegated to the Secretary of State. State’s ITAR implements this authority and identifies the specific types of items subject to control in the USML. Within State, the Directorate of Defense Trade Controls (DDTC) is responsible for implementing controls on the export of these items. The Export Control Reform Act of 2018 provides the statutory authority for Commerce to control the export of less sensitive military items not on the USML, dual- use items, and basic commercial items. In general, items subject to the EAR include commodities, software, and technology. Commerce’s EAR, which contains the CCL, implements this authority. Commerce’s Bureau of Industry and Security (BIS) is responsible for administering these export controls. DDTC and BIS control the export of items within their respective jurisdictions by requiring, in certain instances, a license or other authorization to export an item. Whether a license is required will generally depend on the intended destination, end-use and end-user, and the item’s classification. Generally, unless a license exemption or exception applies, exporters submit a license application to DDTC if their items are controlled on the USML, or to BIS if their items are controlled on the CCL. In addition to the shipment of tangible commodities or the tangible or intangible transfer of software or technology outside of the United States, export control regulations also consider the transfer or release of certain U.S. technology or source code to a foreign person in the United States to be an export. These transfers or releases are commonly referred to as “deemed exports” and can take the form of written, oral, or visual disclosure of technology or source code. Under the ITAR, technical data is controlled for all exports, including deemed exports. Under the EAR, technology and source code are controlled for the purpose of deemed exports. Export-controlled items or source code used in U.S. universities’ research activities may be subject to export controls. Such activities could include shipping an export-controlled item—such as certain biological samples or research equipment—overseas. Additionally, the release of export- controlled items or source code in connection with research activities to a foreign student or scholar could qualify as a deemed export requiring a license. U.S. universities may be exempt from or not subject to export controls if the information they are planning to release falls into one of three categories: published information or information in the public domain, certain academic information, or fundamental research. Published information or information in the public domain: Under the ITAR, information that is published and generally available in the public domain through specific methods is not considered to be technical data, and is therefore not subject to ITAR export licensing requirements. Under the EAR, unclassified technology or software that has been made available to the public without restrictions upon its further dissemination is considered to be published and is therefore not subject to the EAR. Certain academic information: Under the ITAR, information regarding general scientific, mathematical, or engineering principles commonly taught in schools is not included in the definition of technical data and is not subject to ITAR export controls. Similarly, information that is taught in catalog-listed courses or associated teaching laboratories of academic institutions is not subject to the EAR. Fundamental research: Fundamental research is not subject to the ITAR or the EAR. The ITAR defines fundamental research as basic and applied research in science and engineering where the resulting information is ordinarily published and shared broadly within the scientific community, as distinguished from research the results of which are restricted for proprietary reasons or specific U.S. government access and dissemination controls. The EAR defines fundamental research as research in science, engineering, or mathematics, the results of which ordinarily are published and shared broadly within the research community, and for which the researchers have not accepted restrictions for proprietary or national security reasons. Under the EAR, software and technology that arise during or result from fundamental research that is intended to be published is also not subject to the EAR. For example, a foreign person may be able to read research reports or view presentations that result from fundamental research and are intended to be published without the university obtaining a license. However, if that research involves software or technology that is subject to the ITAR or the EAR and is not intended to be published or produces an item that is subject to the ITAR or the EAR, the foreign person generally could not participate in the research without the university securing an export license. According to the FBI and DOD, as foreign adversaries use increasingly sophisticated and creative methodologies to exploit America’s free and open education environment, the United States faces an ever-greater challenge to strike a sustainable balance between unrestricted sharing and sufficient security within the U.S. university research environment. According to a 2019 FBI white paper, the inclusion of foreign students and scholars at U.S. universities entails both a substantial benefit and a notable risk. Specifically, the FBI reported that while many of these foreign students and scholars contribute to advanced research, the development of cutting-edge technology in an open research environment puts academia at risk for exploitation by foreign actors who do not follow U.S. laws and regulations. Additionally, a DOD report from September 2019 stated that research targeted by foreign talent programs includes topics relevant to U.S. national defense. According to the FBI, while the majority of foreign students and scholars do not pose a threat to their host institution, fellow classmates, or research fields, some foreign actors seek to illicitly or illegitimately acquire U.S. academic research and information to advance their home countries’ scientific, economic, and military development goals. By doing so, they can save their home countries significant time, money, and resources while achieving generational advances in technology. The U.S. government, including GAO, has long identified vulnerabilities in U.S. agencies’ efforts to protect U.S. research from foreign entities who might seek to exploit the openness of the U.S. academic environment. In prior GAO reports, we identified weaknesses in the deemed export control system that could allow the unauthorized transfer or release of export-controlled items to foreign persons in the United States. Moreover, since 2007, we have identified the protection of technologies critical to U.S. national security interests—including through U.S. export controls—as a high-risk area. More recently, the Senate Homeland Security and Governmental Affairs Committee reported that federal agencies need to do more to mitigate the threat to American universities by foreign persons seeking to undermine the integrity of the American research enterprise and endanger our national security. More than 1.2 million foreign students and 21,000 foreign scholars studied or worked at U.S. universities in 2018. Nearly a third of foreign students studying in the United States are from China, and a large proportion of Chinese students major in science, technology, engineering and mathematics (STEM) fields (see table 1). In addition, 10 countries accounted for about 70 percent of the more than 21,000 foreign scholars who worked at U.S. universities in 2018 (see table 2). The federal government obligated approximately $33 billion for U.S. universities for research and development in fiscal year 2017. The National Institutes of Health obligated approximately 54 percent of federal research and development funding provided to U.S. universities that year. The Department of Energy, DOD, and the National Aeronautics and Space Administration also obligated significant funding for universities for research (see fig. 1). State’s DDTC and Commerce’s BIS have developed export compliance- related guidance and conducted outreach to support all exporters’ understanding of and compliance with the regulations. However, university and association officials raised concerns that DDTC and BIS guidance and outreach does not adequately address university-specific export compliance issues. In addition, DDTC’s export compliance guidelines do not explicitly promote risk assessments, identified by GAO as a key element for determining whether an entity’s processes address current threats. State’s DDTC and Commerce’s BIS have developed various forms of written guidance and conducted outreach to support all exporters’ understanding of export control regulations. The ITAR and the EAR regulations apply to all exporters, whether universities, private entities, non-profits, or government entities, and according to DDTC and BIS officials, the guidance and outreach materials they have developed are similarly applicable to all potential exporting entities, including universities. Both DDTC and BIS provide written guidance intended to (1) increase awareness of applicable export control regulations, (2) provide specific instructions or tools for complying with those regulations, and (3) dispense transaction or entity-specific information or guidance for all exporters. For example, DDTC’s and BIS’s websites include general information about their respective export control regulations, including guidance on when an export license is needed and how such a license can be procured. DDTC highlights useful resources available on its website in a letter it sends to entities, including universities, when those entities register with DDTC as potential exporters of ITAR-controlled items. BIS’s website includes information about deemed exports, which one BIS official said is particularly relevant to universities. Both websites also include sets of frequently asked questions. DDTC and BIS have also developed guidance that provides specific instructions or tools for complying with the agencies’ regulations, including export compliance guidelines (see below for more information about these guidelines) and decision tools for classifying items subject to the ITAR and the EAR. For example, DDTC offers exporters an online tool to help them identify steps to follow in reviewing the USML and in classifying items subject to the ITAR. Similarly, BIS provides exporters with (1) online tools to help them classify items subject to the EAR and (2) guidelines for completing the license application for both deemed exports and tangible exports, such as chemical and biological items. Finally, both DDTC and BIS offer several mechanisms for obtaining transaction- or entity-specific information or guidance. For example, DDTC and BIS provide advisory opinions when an exporter requests a formal answer to an export control-related question, and both agencies operate a hotline to provide informal guidance to potential exporters. In addition, BIS reviews and provides feedback on export compliance manuals adopted by exporting entities, including universities, when requested. Exporters may also request a commodity jurisdiction classification from DDTC and BIS to determine whether a commodity is subject to the ITAR or the EAR. Both agencies also provide training, present at conferences, and conduct site visits to further educate exporters. For example, DDTC provides in- house seminars on export licensing basics approximately twice a year. BIS has developed and conducts various types of training related to export control compliance, including training videos that are publicly available on its website. BIS also hosts regional seminars and an annual conference in Washington, D.C., on export controls and export compliance. Both DDTC and BIS participate in various conferences. For example, DDTC and BIS participate in an annual conference affiliated with the Association of University Export Control Officers, where agency officials discuss topics such as regulatory updates, license statistics, and export compliance best practices. In fiscal year 2019, DDTC participated in 52 outreach events, two of which were university-specific. During that year, BIS conducted or participated in over 80 outreach events, six of which were university-specific. DDTC and BIS also conduct site visits to learn more about a given entity’s export compliance program and provide feedback, among other things. According to officials, DDTC conducted three university site visits from 2015 through 2019. Similarly, according to officials, BIS conducted two university site visits from 2013 through 2019. Further, officials at both agencies stated that they share information at outreach events about export compliance program strengths and weaknesses they identified during site visits. Officials from universities in our sample and university association officials told us that most DDTC and BIS export control-related guidance and outreach does not address those issues most relevant to the university export compliance environment and that additional guidance and outreach efforts would be useful. For example, according to association officials and officials at six of the nine universities we visited, it is sometimes difficult to understand how to implement in the university environment what they perceive to be industry-focused guidance developed by DDTC and BIS. Some of these officials further noted that the export compliance environment for industry typically differs from that for academia. Specifically, university and association officials noted that companies are typically focused on developing proprietary technologies, whereas universities are primarily focused on expanding knowledge through fundamental and collaborative research. In addition, officials from two universities stated that researchers typically do not see themselves as exporters, which makes it difficult to explain to them how export control regulations pertain to university research. For example, one official told us that it is difficult to explain the concept of a deemed export within an open, academic setting to university researchers. Officials at two universities also noted that the term “defense service,” a type of export subject to the ITAR, is a difficult concept to explain to university researchers who do not consider their work to be a “service.” Officials at four universities told us that they rely on university associations to develop a common understanding or interpretation of the regulations for the university context. For example, officials from one university said that university associations are a resource for sharing information and best practices regarding export compliance in the university environment. An official from another university stated that although she reviews the DDTC and BIS websites periodically for regulatory updates, she relies on university associations to explain how any updates affect universities. Some university officials stated that some agency outreach efforts are useful, but others said that more outreach is needed. Specifically, five university officials mentioned specific agency training and outreach efforts as being useful. For example, the officials said they appreciate that BIS conducts regional seminars for all exporters, which they said are easier to get to than events in Washington, D.C. One of these officials further noted that these seminars discuss how to set up an effective compliance program. However, four university officials stated that additional outreach efforts by both DDTC and BIS were needed. For example, two of these officials suggested that agencies consider additional training for universities, such as webinars or videos providing examples of simple export scenarios for university audiences, to clarify the intent of the export control regulations and explain how regulatory requirements pertain to university research. In discussing additional guidance needs, university and association officials told us that a set of all-encompassing, university-specific guidance is not necessary, but that additional guidance addressing specific topics that are relevant to universities would be useful. For example, one university association told us that additional DDTC and BIS guidance could take the form of frequently asked questions regarding issues of interest to universities, such as deemed exports and fundamental research. Similarly, one university export control officer stated that additional sets of frequently asked questions focused on issues most relevant to university export compliance, examples of university export compliance best practices, and examples of export control violations committed by universities would be particularly helpful. This export control officer explained that such guidance would help her and her colleagues (1) explain why the export control regulations are relevant for university researchers and (2) better explain the need for additional compliance resources to university management. University and association officials further stated that it would be helpful if DDTC and BIS would work with university associations to develop guidance that would support universities’ efforts to interpret the regulations consistently. These officials said that a stronger partnership between the regulatory agencies and universities would support agencies’ understanding of the university environment and result in better guidance for universities. They noted, for example, that soliciting university input on existing guidance and suggestions for additional guidance could provide DDTC and BIS with helpful information about the challenges that universities face in complying with export control regulations in their distinct environment. DDTC officials acknowledged that additional guidance addressing university-specific issues could be helpful and agreed that it may be difficult for university export control officers to explain export control regulations to researchers. They told us that it could be useful for the department to draft white papers, sets of frequently asked questions, or tip sheets specifically addressing issues most relevant to universities. For example, officials suggested that DDTC could develop tips on what may constitute a defense service in the university context. DDTC officials explained that they had not drafted such guidance because of resource constraints and other priorities. When we asked BIS officials about the potential need for university- specific guidance, one official identified some currently available guidance that could be most useful to universities. For example, BIS maintains a set of frequently asked questions and a YouTube webinar concerning deemed exports, and has guidance related to fundamental research available on its website. According to BIS, it regularly updates guidance related to deemed exports and fundamental research, including in connection with regulatory changes that affected both areas in 2016. GAO’s Standards for Internal Control in the Federal Government state that management should communicate with, and obtain information from, external parties using established reporting lines. Although BIS has provided written guidance that is relevant to universities and both DDTC and BIS conduct university-specific outreach, officials at universities we visited and associations we interviewed raised concerns about the adequacy of this guidance and outreach for the university research environment. Without additional guidance and outreach from DDTC and BIS that addresses issues most relevant to universities, some universities may utilize guidance, training, or other resources developed by other entities that may not facilitate compliance with export control regulations in the way that DDTC and BIS intended. Hence, universities may be at risk of failing to comply with export control regulations and properly safeguard export-controlled items from foreign students and scholars who are not authorized under deemed export licenses to receive such items. In addition, such university-focused guidance is consistent with the Export Control Reform Act of 2018, which requires the President to enforce export controls by providing guidance in a form that facilitates compliance by academic institutions and other entities. Although State’s DDTC and Commerce’s BIS officials identified their respective export compliance guidelines, available on the agencies’ websites, as key sources of written guidance for supporting exporters’ compliance with each agency’s export control regulations, DDTC’s compliance guidelines do not explicitly promote risk assessments. Both sets of export compliance guidelines include similar elements that the agencies consider critical for an effective export compliance program. For example, both sets of guidelines include elements related to management commitment, recordkeeping, and training. However, DDTC’s guidelines do not advise entities on how to assess risk, which GAO has identified as a key element for determining whether an entity’s processes address current threats. BIS Guidelines. BIS’s export compliance guidelines identify eight elements of an effective export compliance program. BIS officials stated that the agency’s guidelines provide a useful compliance framework for all exporters, including universities. These guidelines include information about recordkeeping, conducting internal audits, performing risk assessments, and training, among other elements. BIS’s guidelines also provide templates, checklists, specific examples, and other tools exporters may use to develop an export compliance program or enhance an existing program. For example, the guidelines include a summary of potential risks involved in each phase of the exporting process with a list of tools to mitigate such risks. The guidelines also include an audit module tool to help exporters review and revise their current compliance program with a set of checklists for each of the eight elements. DDTC Guidelines. DDTC’s export compliance guidelines include nine elements that it has identified as important aspects of an effective export compliance program. According to DDTC, its guidelines are also applicable to all exporters, including universities, and the agency references them in a confirmation letter when entities register as exporters. The guidelines include information about organizational structure, corporate commitment and policy, internal monitoring, and training, among other elements. The guidelines also provide examples of questions a compliance program should address for some elements. However, DDTC’s export compliance guidelines lack a risk assessment element. Risk assessments provide entities with an opportunity to review their processes to determine whether the processes in place address current threats. According to DDTC, the agency has not added guidance related to risk assessments to the export compliance guidelines because it assumes that exporters conduct a risk assessment for each compliance element as a matter of course. GAO’s Standards for Internal Control in the Federal Government state that management should communicate quality information externally so that external parties can help the entity achieve its objectives and address related risks. Further, according to an Office of Management and Budget bulletin, agencies increasingly have relied on guidance documents to inform the public and to provide direction to their staffs as the scope and complexity of regulatory programs have grown. Exporters, including universities, may not conduct periodic risk assessments if DDTC’s guidance does not encourage them to do so. As such, they may be unaware of potential threats and may not take appropriate measures to protect export- controlled items. University and association officials we interviewed identified challenges working with and obtaining guidance from federal agencies that fund research and monitor threats to the United States, including threats to research security. Specifically, university and association officials identified the following three challenges working with and obtaining guidance from these agencies: (1) federal agencies are developing different requirements for reporting financial conflicts of interest to address foreign influence issues, (2) some agencies provide briefings and other forms of guidance related to export controls and foreign threats that do not sufficiently address universities’ needs, and (3) DOD officials inconsistently interpret export control regulations and misunderstand what constitutes fundamental research. Agencies are taking steps to address some of these challenges. For example, an interagency working group established by the White House Office of Science and Technology Policy and individual federal agencies are undertaking efforts to address university concerns regarding inconsistent financial conflict of interest reporting requirements and the lack of relevant, university-specific resources to address threats identified by some agencies. However, the actions that DOD plans to take to address agency officials’ inconsistent interpretation of the regulations and their misunderstanding of the term fundamental research may not fully address the challenge identified by university and association officials. University and association officials expressed concerns that federal agencies are developing different requirements for reporting financial or other conflicts of interest, such as foreign funding, but some of these differences in reporting requirements may be necessary to address varying agency-specific legal requirements. For example, recent reporting guidance from the National Institutes of Health reminds researchers to report all sources of support, including support for laboratory personnel and the provision of materials that are not freely available, whereas the most recent guidance from DOD does not include such clarification for what constitutes “support.” Although each agency has a separate mission and separate legal authorities, which may require agencies to have different financial or other conflict of interest reporting requirements, officials at several universities and associations discussed the challenges they face in complying with these varied reporting requirements. Representatives from one university association explained that these new requirements are especially challenging for universities because they typically accept funding from multiple agencies. In addition, officials from one university stated that the variation across the agencies’ reporting requirements makes it difficult to develop one process to support researchers’ efforts to comply with them. According to university and association officials, universities will need to spend more time and resources to understand and comply with each set of requirements. Moreover, one association official told us there is more room for universities to make mistakes when each agency develops different requirements to deal with the same issue. An interagency working group established by the White House Office of Science and Technology Policy is undertaking efforts to address university concerns regarding inconsistent financial conflict of interest reporting requirements. In May 2019, the Office of Science and Technology Policy established the Joint Committee on the Research Environment (JCORE), an interagency effort to address research security and other related issues. According to officials in the Office of Science and Technology Policy, JCORE has drafted one set of coordinated guidance for funding agencies to ensure that funding agencies consistently require researchers to report the same types of information regarding potential conflicts of interest. In addition, JCORE has drafted a set of non-binding guidelines for universities to support their efforts to comply with conflict of interest reporting requirements. Officials stated that the draft guidance for funding agencies and the non-binding guidelines for universities were under review as of January 2020. Officials further stated that JCORE is developing a set of case studies and other materials that federal agencies will be able to use to educate researchers and universities about the types of situations that represent a potential conflict of interest. Agencies such as the FBI, DHS, BIS’s Office of Export Enforcement, and DOD’s Defense Counterintelligence and Security Agency provide briefings and other forms of guidance related to export controls and foreign threats. For example, officials at these agencies provide briefings to individual universities or to groups of universities during university association events, such as the annual Association of University Export Control Officers conference and the annual Academic Security Conference hosted by the Texas A&M University System. In addition, DHS identified the 11 universities with the largest number of foreign students studying in STEM fields in 2018 to target university outreach efforts in late 2018 and early 2019. DHS developed a template presentation for DHS field offices to use during their outreach to these universities to increase awareness of export control laws. According to DHS, it plans to expand this effort to target the top 60 universities with foreign students in STEM fields. The Department of Justice and BIS’s Office of Export Enforcement have both published reports summarizing recent major U.S. export enforcement-related criminal and administrative prosecutions. Some university officials told us that the briefings and other information that some agencies provide are helpful for improving their awareness of threats. However, officials at five of the nine universities we visited and officials from three university associations said that these briefings and other information are not as useful as they could be. Some of these officials cited the following reasons for why they did not find such information to be useful: Classified information cannot be shared widely: Some university officials and an association representative stated that some agencies often provide classified briefings and materials that they cannot share widely with the university community. One university official said that it would be helpful if agencies, where possible, could also provide some unclassified information with clear examples that could then be shared with researchers about current threats and what these threats may look like in a university setting. Without such information, university officials are restricted in how they can use the threat-related information they obtain for raising awareness on campus, according to a university association official. Moreover, another university official stated that if export control officers cannot share relevant threat information with the university’s administration because of classification issues, the university may not get the resources it needs to improve its compliance programs and properly comply with export control regulations. Guidance and threat information does not address the university environment or utilizes outdated examples: Representatives from three university associations and one university stated that some federal agencies do not provide guidance and threat information that address the university research environment, and two associations said that any university-specific examples federal agencies provide during briefings are outdated, which limits the relevancy of guidance and threat information to the university environment. For example, an official from one association explained that in 2015 the FBI provided a threat briefing at an association meeting and requested that university officials contact the FBI if a researcher had, among other things, published in an international scientific journal or attended an international conference, or if any graduate students worked in university laboratories late at night. This official noted that these FBI officials did not understand that researchers must undertake such activities to obtain tenure and that it is common for students to work late at night. In addition, according to an official from one association, when university officials ask the FBI to provide recent examples of foreign students stealing sensitive or export-controlled items from U.S. universities, the FBI often cites cases that occurred more than 10 years ago. He further stated that federal agencies are raising alarms that universities are vulnerable to foreign theft of export-controlled items without any concrete, recent examples. FBI threat briefings lack actionable guidance: University officials told us that many FBI threat briefings are not helpful because they do not provide actionable guidance for addressing identified threats, which limits universities’ understanding of how to address them. For example, one university official stated that the FBI briefings do not provide any detailed information about what attendees should do with the information they obtain. He further stated that the briefings would be more beneficial if the FBI provided prescriptive guidance on how to use the information. DOD and the FBI are taking steps to partner with academia to address challenges regarding information sharing. DOD is undertaking several collaborative efforts with academia in response to Section 1286(d) of the 2019 National Defense Authorization Act, which directed the Secretary of Defense to establish an initiative to support protection of national security academic researchers from undue influence and other security threats. For example, DOD partnered with the National Academy of Engineering to establish the “Roundtable on Linking Defense Basic Research to Leading Academia Research and Engineering Communities,” or the “Deans’ Roundtable.” The Deans’ Roundtable brings DOD leadership together with deans from U.S. university engineering programs to facilitate dialogue between DOD and the academic research community on research protection. The roundtable’s objectives are to better understand major issues in the defense research community and to form working groups to help craft potential solutions to challenges identified by the roundtable. The roundtable is expected to help address issues of research espionage by foreign governments on university campuses and inform senior DOD officials about technological developments on university campuses, among other efforts. The FBI partnered with the Academic Security and Counter Exploitation Program, a university-led association focused on research security, to produce a series of unclassified “awareness-raising” materials for university audiences. According to FBI officials and a member of the Academic Security and Counter Exploitation Executive Committee, the FBI recognized that university officials were frustrated that relevant FBI documents regarding the foreign threat to U.S. research were classified. The association’s Executive Committee member further explained that this created significant restrictions on the way university officials could use the materials for awareness and training efforts on campus. He further noted that many of these “awareness-raising” materials were tone- deaf to the needs of academia and did not explain how the threats were related to university researchers’ work. The Academic Security and Counter Exploitation Executive Committee worked with the FBI to revise existing FBI handouts to create a series of academic-focused, unclassified documents suitable for inclusion in awareness and training programs on university campuses. For example, they revised a FBI handout regarding the threat that China poses to corporate America to instead focus on the threat that China poses to academia. Officials from multiple universities and associations stated that DOD officials inconsistently interpret export control regulations and misunderstand the term fundamental research and its implications when providing funding for university research, which some officials said leads to confusion, results in contract delays, and may limit universities’ ability to conduct research for DOD. DOD officials acknowledged that some officials have inconsistently interpreted the regulations. Moreover, DOD reported to Congress in September 2019 that it is mindful of the fact that reducing the quantity and competitiveness of early ideas flowing through the university system to the department by non-judicious use of controls could have negative consequences. Officials at four of the nine universities we visited identified DOD officials’ inconsistent interpretation of the regulations and their misunderstanding of what constitutes fundamental research as a challenge they face in complying with export control regulations. For example, officials at three universities asserted that DOD includes contract clauses, such as export control-related clauses, that are not relevant to or conflict with other stated terms in the contract, in some cases. Officials at two universities further stated that there appears to be an internal disagreement between the program officers and contracting officers about how to interpret some aspects of export control regulations. One university official said the university tries to negotiate with DOD when contracts that the university perceives as only containing fundamental research include export control- related clauses; however, the official said these types of delays slow the pace of research. Moreover, university association officials noted that member universities are reporting that DOD is increasingly including publication restrictions in research contracts for projects that the universities believe only entail fundamental research. Research does not qualify as fundamental research if the researcher accepts any restrictions on the publication of the information resulting from the research. Officials from one association stated that DOD is reluctant to remove publication restrictions from award contracts even when it acknowledges that the work may only involve fundamental research. As a result, universities that only accept contracts for fundamental research may decline an awarded contract if the conditions for the award vary from initial expectations, which may lead to a loss in research funding for many universities focused on fundamental research. In 2008 and 2010, DOD issued memoranda to its personnel providing clarifying guidance concerning fundamental research and directed that information about contracted fundamental research be included in general training modules for research program personnel. For example, these memoranda state that DOD must not place restrictions on subcontracted unclassified research that has been scoped, negotiated, and determined to be fundamental research within the definition of National Security Decision Directive 189 according to the prime contractor and research performer and certified by the contracting component, except as provided in applicable federal statutes, regulations, or executive orders. These memoranda also state that the effective implementation of the guidance requires that all DOD personnel involved in the acquisition and monitoring of fundamental research have a clear and common understanding of the relevant statutes, regulations, and policies, including the definitions of key terms. To implement these memoranda, DOD also amended the defense federal acquisition regulations in 2013 to update the relevant contract clause for inclusion in DOD contracts. The Deputy Director for Basic Research at DOD stated that most program officers and contracting officers are familiar with the export control regulations and understand the term fundamental research and how to interpret it in the context of university research, but acknowledged that some officials have inconsistently interpreted the regulations and misinterpreted the term fundamental research. Specifically, DOD officials stated that program officers and contracting officers who frequently work with universities through basic research grants understand what constitutes fundamental research; however, program officers and contracting officers working with applied research contracts may not be as familiar with it or with engaging with universities. Furthermore, DOD officials acknowledged that although DOD has developed export control-related training, it does not require program officers and contracting officers to take this training. Officials stated that not all program officers and contracting officers work with universities, so they do not all need to take training on export control regulations. To address these and other research-related concerns, DOD’s Office of Basic Research convened a workshop for basic research program officers in October 2019 to facilitate the sharing of best practices and identify any concerns. According to DOD, program officers raised a concern that they need to constantly ensure that the research being conducted is properly categorized as basic or fundamental research and has not transitioned into applied or non-fundamental research in the course of the contract. DOD’s Office of Basic Research is planning to develop a checklist based on input from program officers that program officers can use when determining whether the scope of a research project meets the definition of fundamental research. Following this workshop, a DOD official stated that program officers are best suited to make technical and nuanced fundamental research determinations because program officers have first-hand knowledge about the scope of the research project. These actions, however, may not address the concerns universities raised, because they do not include any effort to further educate contracting officers. Contracting officers may add export control clauses or publication restrictions to a contract award after the program officer writes the original solicitation. Additionally, contracting officers are the individuals with regulatory authority for defense contracts to certify that research is fundamental research. Hence, a checklist for program officers may not fully address program officers’ and contracting officers’ inconsistent interpretation of the regulations, including determining whether university research constitutes fundamental research. Without additional efforts to educate all relevant DOD officials on a clear and common understanding of the relevant statutes, regulations, and policies, as identified by the department’s 2010 memorandum, universities may continue to perceive that DOD officials inconsistently interpret the regulations and misunderstand whether research constitutes fundamental research, potentially hindering DOD-funded research at universities. The nine universities we visited have generally developed export compliance policies and practices to safeguard export-controlled items that align with State’s DDTC and Commerce’s BIS export compliance guidelines, but some of the universities’ compliance efforts have weaknesses in certain areas (see fig. 2). We reviewed DDTC’s and BIS’s export compliance guidelines to identify common elements and developed a list of eight elements that the agencies classified as critical for an effective compliance program, such as recordkeeping and training, among others. See table 3 for a description of the eight elements we identified for this assessment. We then interviewed officials at nine universities about their universities’ export compliance policies and practices. We selected universities with annual average expenditures for research and development during the 2013 through 2017 period that ranged from $15 million to over $750 million. In addition, we selected universities on the basis of a number of factors, including total research and development expenditures, number of graduate students, research funding received from certain federal agencies, and geographic dispersion (see app. I for more information about our selection methodology). Finally, we assessed the university officials’ responses against the eight elements of an effective export compliance program to determine the extent to which these universities’ policies and practices align with DDTC’s and BIS’s export compliance guidelines. See appendix III for a detailed description of our assessment of each university’s policies and practices against these elements and a description of the export compliance policies and practices the selected universities have in place. In addition, we reviewed the websites of a generalizable sample of 100 U.S. universities to determine the extent to which these universities provide publicly available information about export control regulations, training, and other topics pertinent to the campus community. In general, the universities with larger research and development expenditures provided more export control-related information on their websites. See appendix IV for the results of this analysis. The seven universities with the highest research expenditures among the nine we visited have export compliance policies and practices that generally align with the eight elements we identified from DDTC’s and BIS’s export compliance guidelines, while the two universities with the lowest expenditures among the nine have more weaknesses in their compliance programs. Most of the universities we visited have robust export compliance practices in the following four areas: Management commitment and organizational structure: All nine of the universities we visited have developed policies and practices that fully or partially align with this element. For example, management at seven of the nine universities we visited issued public statements supporting the university’s export compliance program. These statements briefly described export control regulations, discussed the importance of the universities’ compliance with export control regulations, and emphasized the universities’ commitment to compliance efforts. Export authorization and tracking export-controlled items: All but one of the nine universities we visited have developed policies and practices that fully align with this element. For example, officials at all nine of the universities we visited stated that their universities require researchers to submit research proposals to an office charged with reviewing proposals and awards for grants and contracts. When reviewing research proposals or awards, this office will flag those proposals and awards that may be subject to export control regulations for further review, either by the export control officer or another authorized university entity. In addition, officials at seven of the universities said they had developed mechanisms to track any export-controlled items being used or developed by the university. The universities we visited also employ various security mechanisms to safeguard export-controlled items. These include physical security mechanisms, as shown in figure 3, as well as information technology security mechanisms, such as setting up separate networks for researchers using export-controlled data in their research. Recordkeeping: Officials at all nine universities we visited have developed policies and practices that fully align with this element to ensure that they maintain appropriate export control-related records. For example, at least five of the nine universities we visited maintain their export compliance-related records in an electronic database or other electronic system. One of the universities utilizes a system that tracks each research project from start to finish. This system enables officials to search for all export control-flagged research proposals, awards, and technology control plans, among other documents. One of the officials also told us that the system will alert the export control officer to any technology control plans with an upcoming expiration date. Two of the remaining four universities maintained some files electronically and some in hard copy. The other two universities did not discuss how they maintained their files, but identified who is responsible for export control-related recordkeeping and the types of documents they maintain. Reporting violations: All nine universities we visited have developed policies and practices that fully align with this element. Specifically, these universities have developed clear procedures outlining the actions employees should take in the event that potential noncompliance is identified. For example, officials at seven universities told us that they have a compliance hotline that people can use to report suspected violations. Some of the universities we visited have weaknesses in their export compliance programs, particularly in the following four areas: Risk assessment: Four of the nine universities we visited do not currently conduct risk assessments to assess and identify potential risks in their export compliance programs, which may limit their ability to identify potential risks or build safeguards in their export compliance program to address potential risks. Three of these four universities are in the lowest tier for annual research and development expenditures. Training: Two of the nine universities we visited do not provide any formal training for researchers and other officials involved in implementing export control regulations. However, an official from one of the universities said that the university provides access to online export control-related trainings developed by a for-profit entity. The export control officer at the other university said that although the university does not conduct formal training, he conducts frequent outreach and provides materials to increase university officials’ awareness of export control regulations. Internal audits: Four of the nine universities we visited either partially conducted, or did not conduct, internal audits of their export compliance programs. The three universities that partially conducted internal audits have an export control officer who periodically reviews some internal processes but did not have a university audit group outside of the export control office that had reviewed the export compliance program. However, officials from two of these universities stated that their audit office plans to conduct an audit of the export compliance program soon. Export compliance manual: Four of the nine universities we visited have not developed an export compliance manual. According to DDTC and BIS guidelines, exporters are encouraged to develop a manual to document export control-related roles and responsibilities of various offices and officials. The manuals should also describe export control procedures, development of technology control plans for export-controlled work, training requirements, and processes for reporting potential violations, among other topics. Research conducted by U.S. universities and supported by visiting foreign students and scholars makes critical contributions to U.S. national security and economic interests. However, the relative openness of the university environment also presents a vulnerability that can be exploited by foreign adversaries. State’s DDTC and Commerce’s BIS administer systems of export controls to minimize these vulnerabilities while allowing legitimate business to occur, and the agencies provide guidance and conduct outreach to facilitate universities’ compliance with these controls. While DDTC and BIS provide some guidance and conduct outreach to universities, university officials told us that this guidance does not adequately address university-specific issues. The universities we visited primarily rely instead on guidance and training provided by other entities, which may not always facilitate compliance with the export control regulations as DDTC and BIS intended. We found that the nine universities we visited have generally developed export compliance policies and practices that align with agency guidance, but some of the universities’ compliance efforts have gaps. Improved guidance and outreach based on feedback from university stakeholders could further strengthen universities’ efforts to identify and protect export-controlled items from unauthorized transfers or releases to foreign students and scholars. This is especially important in light of continued reports of foreign entities’ exploitation of university research. Moreover, DDTC’s export compliance guidelines do not include information concerning risk assessments, a key element for determining whether an entity’s processes address current threats. Four of the nine universities we visited did not conduct risk assessments. Including information about risk assessments in DDTC’s written guidelines regarding the elements of an effective export compliance program would enable DDTC to remind universities and other exporters that conducting risk assessments is a beneficial practice. If exporters, including universities, do not conduct periodic risk assessments, they may be unaware of new threats and, consequently, may not take appropriate measures to protect export-controlled items. Furthermore, universities reported challenges working with DOD because of DOD officials’ inconsistent interpretation of export control regulations, including how to assess whether a university is engaging in fundamental research. DOD officials acknowledged this challenge, but DOD has not taken sufficient action to educate its personnel on the regulations. Without additional action, DOD may continue contributing to confusion and contract delays that hinder legitimate research. We are making four recommendations, including two to State, one to Commerce, and one to DOD. Specifically: The Secretary of State should ensure that the Deputy Assistant Secretary for Defense Trade Controls, in consultation with university representatives, provides additional or revises existing guidance and outreach to address university-specific export control issues to further support universities’ understanding and compliance with the International Traffic in Arms Regulations. (Recommendation 1) The Secretary of Commerce should ensure that the Under Secretary for Industry and Security, in consultation with university representatives, provides additional or revises existing guidance and outreach to address university-specific export control issues to further support universities’ understanding and compliance with the Export Administration Regulations. (Recommendation 2) The Secretary of State should ensure that the Deputy Assistant Secretary for Defense Trade Controls revises existing export compliance guidelines to include information concerning periodic risk assessments to remind exporters that it is beneficial to periodically identify, analyze, and respond to new risks as part of an effective International Traffic in Arms Regulations compliance program. (Recommendation 3) The Secretary of Defense should ensure that the Under Secretary of Defense for Research and Engineering takes steps to ensure that its program officers and contracting officers are interpreting export controls consistent with regulations and guidance and consistently determining whether university research constitutes fundamental research. (Recommendation 4) We provided a draft of this report to Commerce, DHS, DOD, FBI, State, and the White House Office of Science and Technology Policy for comment. In their comments, reproduced in appendixes V and VI, State and DOD concurred with the recommendations directed to them. State also provided information about the actions it plans to take to address recommendations 1 and 3. With respect to recommendation 1, State noted that it is already expanding its outreach to university representatives and planning to issue additional guidance to further support universities’ understanding of the ITAR. With respect to recommendation 3, State noted that it plans to revise existing export compliance guidelines to include information concerning periodic risk assessments. DOD also provided information about actions it plans to take to address recommendation 4. Specifically, DOD stated that it will develop new guidance for DOD personnel to clarify the process for identifying fundamental research, funding contracts containing fundamental research, and monitoring those contracts to ensure that they are performed in compliance with export control regulations and fundamental research policies. DOD also stated that it plans to work with State and Commerce to ensure that the new guidance is consistent with the ITAR and the EAR, respectively. Commerce concurred with recommendation 2, but it did not provide a comment letter in time for publication in the report. DHS, FBI, and the White House Office of Science and Technology Policy informed us that they had no comments. Commerce, DOD, and State provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Commerce, Defense, and State; the Acting Secretary of Homeland Security; the Attorney General of the United States; the White House Office of Science and Technology Policy; and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Our report examines (1) the extent to which the Departments of State (State) and Commerce (Commerce) have provided guidance and outreach that supports U.S. universities’ understanding of and compliance with both agencies’ export control regulations, (2) export control-related challenges that U.S. universities face while working with or obtaining guidance from other federal agencies, and (3) the extent to which export compliance policies and practices developed by U.S. universities align with State’s and Commerce’s export compliance guidelines. In addition to the methods discussed below, we reviewed government reports concerning (1) previously identified gaps in the U.S. export control system and (2) the threat that some foreign persons pose to U.S. universities to provide context for all three objectives, and reviewed relevant federal laws and regulations to address all three objectives. We also attended a conference in March 2019 hosted by Association of University Export Control Officers member universities to better understand how universities administer export control regulations and those aspects of the regulations most relevant to universities. We used the information we collected during the conference to inform our planning for our site visits. To provide context for all three objectives, we examined federal data concerning (1) the number of foreign students and scholars studying or working at U.S. universities, (2) federal agencies’ research and development funding provided to universities, and (3) U.S. universities’ export license applications. We examined data identifying the country of citizenship for foreign students and scholars studying or working at U.S. universities from 2013 through 2018. We received the foreign student data from the Department of Homeland Security (DHS), which pulled data from its Student and Exchange Visitor Information System. We used these data to identify the top 10 countries sending foreign students to U.S. universities in 2018. DHS also provided data identifying foreign scholars working at U.S. universities based on I-129 filings. The I-129 form is typically filed by a U.S. employer on behalf of a nonimmigrant worker to come to the United States to temporarily perform services or labor or to receive training. We used these data to identify the top 10 countries sending foreign scholars to U.S. universities in 2018. We utilized data collected by the National Science Foundation to determine the amount of research and development funding U.S. universities received from federal agencies in fiscal year 2017. The National Science Foundation collects funding information from federal agencies through its Survey of Federal Funds for Research and Development. We downloaded the data from the agency’s website and analyzed the data to determine how much funding selected federal agencies and the federal government as a whole provided to universities and university-administered Federally Funded Research and Development Centers. Finally, we analyzed State and Commerce data for export license applications received in calendar years 2014 through 2018 to identify trends in U.S. university export license applications and determine the percentage of export license applications from U.S. universities as a share of all export license applications. For both data sets, we reviewed each applicant to verify whether it was a U.S. university, because both agencies provided some data that included license applications submitted by entities that are not U.S. universities, such as associations or foreign universities. We then analyzed the data to determine trends in application results, identify the top 10 destination countries for approved U.S. university export license applications, and identify the top five categories of export-controlled items for export license applications submitted by U.S. universities. We determined that all of these data sources were sufficiently reliable for providing context for our report. To address our first objective, we interviewed relevant State and Commerce officials from the Directorate of Defense Trade Controls and Bureau of Industry and Security and reviewed the guidance and outreach materials these agencies developed related to export controls. We also analyzed information regarding their outreach efforts for fiscal year 2019 to identify the number of university-specific outreach events. In addition, we attended (1) the March 2019 Association of University Export Control Officers conference, at which both State and Commerce officials presented to university officials, and (2) Commerce’s annual conference on export controls in Washington, D.C., at which State officials also presented. To address our second objective, we interviewed officials from several agencies that provide research funding to universities, including the Departments of Defense (DOD) and Energy, the National Institutes of Health, and the National Aeronautics and Space Administration, to learn how they work with universities that receive research funding. Additionally, we met with a number of security agencies, including DOD’s Defense Counterintelligence and Security Agency, DHS, and the Federal Bureau of Investigation, and reviewed reports, handouts, and outreach materials regarding either export control regulations or the threat environment to learn how these agencies educate U.S. universities. Finally, we met with the White House Office of Science and Technology Policy to discuss an interagency effort to address research security and other related issues. To identify university perspectives for all three of our objectives, we interviewed (1) representatives from four university associations and (2) officials at nine U.S. universities. Specifically, for our first and second objectives, we interviewed representatives from the Association of University Export Control Officers, Association of American Universities, and Council on Governmental Relations. The Association of University Export Control Officers is a member organization composed of over 270 export control and other compliance officers at U.S. academic institutions to provide a forum for the exchange of information regarding higher education and export, import, and trade sanctions policies. The Association of American Universities represents 65 research universities and seeks to shape policy for higher education, science, and innovation. According to a representative, the association’s membership is composed of university presidents and chancellors. The Council on Governmental Relations provides information to over 185 member universities regarding research administration and compliance, financial oversight, and intellectual property. The association’s membership is mainly composed of Vice Presidents for Research and Directors of Sponsored Research, according to a representative. For our second objective, we also interviewed a representative from the Academic Security and Counter Exploitation Program, whose executive committee includes representatives from 11 universities and university systems. This university-led association is focused on providing a forum within academia for discussions concerning the protection of intellectual property, controlled information, key personnel, and critical technologies at U.S. universities conducting research relevant to national security. For all three of our objectives, we interviewed officials at nine U.S. universities. See below for our selection methodology. To inform all three of our objectives, we conducted site visits to nine U.S. universities to speak with various university officials. We selected a non- generalizable sample of nine U.S. universities on the basis of a number of factors, including total research and development expenditures, number of graduate students, research funding received from certain federal agencies, and geographic dispersion. To identify a sample of U.S. research universities, we first examined U.S. university research and development expenditures data collected by the National Science Foundation for the 2013 through 2017 period. The National Science Foundation collects this data from universities through its annual Higher Education Research and Development Survey and we downloaded the data from the agency’s website. We then calculated the average annual research and development expenditures for each university on this list for this period. We limited our scope of universities to those with an annual average total research and development expenditures of over $15 million. This resulted in a total sample size of 292 U.S. universities. To assess the reliability of the data, we reviewed related documentation on the National Science Foundation’s web page regarding the Higher Education Research and Development Survey and dataset. We determined these data to be sufficiently reliable for the purposes of our report. We then reviewed a number of other factors for each of these universities. First, we categorized each of the 292 universities in our sample as public or private. We then identified the number of full-time graduate students for each university on the basis of results from the National Science Foundation’s annual Survey of Graduate Students and Postdoctorates in Science and Engineering (2016), because federal officials told us that graduate students were more likely to conduct research involving items subject to export control regulations than undergraduate students. We also reviewed universities’ security clearance level and membership in a number of associations to identify those universities that may be more aware of research security-related issues. Finally, we downloaded data from the Federal Procurement Data System to identify the total amount of federal contracts for research and development each university in our sample had received from four main funding agencies—DOD, the Department of Energy, the National Institutes of Health, and the National Aeronautics and Space Administration. These four agencies represent four of the five major funding agencies for university research and development in fiscal year 2017. In addition, they represent the four agencies that we determined, in consultation with GAO stakeholders and State and Commerce officials, are most likely to provide funding for research involving items that may be subject to export control regulations. We grouped the universities in our sample into six geographic regions and initially selected 35 universities across these six regions that represented a cross-section of universities, on the basis of the factors discussed above. Ultimately, we selected nine universities for site visits from four of these regions on the basis of university officials’ availability and scheduling considerations. While we sought to include a range of university experiences regarding export control compliance in our non- generalizable sample, the university officials’ views stated in this report do not represent the entirety of the U.S. academic community. During our site visits, we conducted semi-structured interviews with about 80 university officials involved in export compliance on the main campus of nine universities, including officials in the following relevant positions: vice presidents for research, export compliance officers, facility security officers, and officials charged with reviewing grants and contracts, among others. During these interviews, we asked officials about the export control-related policies and practices their university had developed; their roles in implementing those practices; their perspectives concerning guidance and threat-related information from federal agencies; and any challenges they face in complying with export control regulations, among other topics. We also conducted seven focus groups with 44 faculty in Science, Technology, Engineering and Mathematics (STEM) fields. However, we were not able to meet with all of the same types of officials at each university we visited. To address our third objective, we assessed university officials’ responses concerning export compliance policies and practices against a set of eight elements of an effective export compliance program. We reviewed State’s and Commerce’s guidelines to identify a list of eight common elements that the agencies classified as critical for an effective compliance program. We then assessed the responses of university officials from the nine universities we visited against these eight elements. Within some of the elements, we identified sub-elements for assessing university policies and practices. For example, within the element for management commitment and organizational structure, we identified five sub-elements against which we reviewed university officials’ responses. For each element, we developed a scale for determining whether each university’s export compliance policies and practices fully aligned, partially aligned, or did not align with that element. For example, for the management commitment and organizational structure element, we defined the extent to which each university’s policies and practices aligned with this element as (1) “fully aligned” if policies and practices were in place for at least four out of five sub-elements, (2) “partially aligned” if they were in place for two or three out of five sub-elements, and (3) “not aligned” if they were in place for one or zero of five sub- elements. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Although U.S. universities generally promote an open learning environment that is focused on the free exchange of information through fundamental research, some U.S. universities conduct research involving export-controlled items and have applied for export licenses for deemed exports (releases within the United States to foreign persons) and exports of tangible items out of the United States. The Departments of State (State) and Commerce (Commerce) both control the export of items within their respective jurisdictions by requiring a license or other authorization prior to the export of an item. Within State, the Directorate for Defense Trade Controls (DDTC) is responsible for implementing export controls. Similarly, within Commerce, the Bureau of Industry and Security (BIS) is responsible for implementing export controls. State’s DDTC received 597 license applications from U.S. universities in calendar years 2014 through 2018. DDTC provides one of four decisions for each license application—approved, approved with provisos, denied, or returned without action. DDTC approved roughly 79 percent of license applications it received from U.S. universities during this period. Commerce’s BIS reviewed 680 license applications from U.S. universities during this same time period. BIS provides one of three decisions for each license application—approved, denied, or returned without action. BIS approved 74 percent of these license applications. DDTC and BIS denied a small number of license applications submitted by U.S. universities in calendar years 2014 through 2018. Specifically, DDTC denied five applications for exports to Mexico, Sri Lanka, and the United Kingdom, as well as one application involving various destination countries. BIS denied eight applications for exports to China, Iran, and Russia during this same period. See figure 4 for more information regarding the status of U.S. university export license applications submitted to DDTC and BIS in calendar years 2014 through 2018. In calendar years 2014 to 2018, approximately 70 percent of the license applications submitted by U.S. universities that DDTC approved were for exports (including tangible exports and deemed exports) to 10 destination countries or multiple countries. This total included applications that involved various destination countries, which on their own represented 26 percent of total approved applications during this period (see table 4). Similarly, 57 percent of the license applications submitted by U.S. universities that BIS approved in calendar years 2014 through 2018 were for exports (including tangible exports and deemed exports) to 10 countries (see table 5). The top five U.S. Munitions List (USML) categories for which U.S. universities applied for export licenses from DDTC accounted for 77 percent of all applications for calendar years 2014 through 2018. These include license applications for exports controlled under USML categories related to spacecraft, night vision, and missiles (see table 6). The top five categories for which U.S. universities applied for export licenses from BIS accounted for 85 percent of all license applications for calendar years 2014 through 2018. These include license applications for exports specified on the Commerce Control List (CCL) under categories related to chemicals, aerospace, and sensors and lasers, as well as the export of items designated as EAR99 (see table 7). The Departments of State (State) and Commerce (Commerce) have each developed a set of export compliance guidelines (guidelines), which agency officials identified as key sources of written guidance for supporting exporters’ compliance with the agency’s export control regulations. Both sets of guidelines include similar elements that the agencies have identified as being critical for an effective export compliance program. We reviewed both agencies’ guidelines and developed one set of eight elements of an effective export compliance program, which we then used to assess universities’ export control compliance practices. The eight sections below include descriptions of each element. We selected a non-generalizable sample of nine U.S. universities for site visits on the basis of a number of factors, including total research and development expenditures, number of graduate students, research funding received from certain federal agencies, and geographic dispersion. To learn more about our methodology for selecting universities for site visits, see appendix I. We visited these nine universities to learn about the export control policies and practices that they had developed. During our site visits, we conducted semi-structured interviews with about 80 university officials involved in export compliance, including officials in the following relevant positions: vice presidents for research, export compliance officers, facility security officers, and officials charged with reviewing grants and contracts, among others. We also conducted focus groups with 44 faculty in Science, Technology, Engineering and Mathematics (STEM) fields at seven of the nine universities we visited. During our university site visits, we asked officials about the export control-related policies and practices their universities had developed; their roles in implementing those practices; and the roles and responsibilities of others involved in implementing the university’s export compliance policies and practices, among other topics. We did not independently verify universities’ implementation of the export compliance policies and practices that university officials described during our site visits. We found that the nine universities we visited had generally developed export compliance policies and practices to safeguard export-controlled items that aligned with State and Commerce export compliance guidelines, but that some of the universities’ compliance efforts had weaknesses in certain areas (see fig. 5). In the following sections, we provide a (1) description of each element and (2) summary of the results of our assessment of each university’s policies and practices against each element. For this element, we assessed universities’ activities within five sub- elements: (1) public management support for the export compliance program, (2) management’s understanding of export control regulations, (3) whether the university had designated an export control officer, (4) sufficiency of resources and authority to conduct export compliance activities, and (5) whether the university had created a clear organizational structure identifying individuals responsible for compliance. See figure 6 for the results of our assessment. Management commitment and organizational structure Entities should have public management support for their compliance program, sufficient resources to conduct compliance activities, and a clear organizational structure identifying individuals responsible for compliance. All nine of the universities we visited have developed policies and practices that fully or partially align with this element concerning management commitment and organizational structure. Specifically, seven universities had practices that fully aligned and two had practices that partially aligned with this element. Below, we provide additional detail on universities’ activities within the following five sub-elements: Provides public management support for export compliance program. Seven of the nine universities we visited have issued public statements from university management supporting the export compliance program. These statements briefly describe export control regulations, discuss the importance of the universities’ compliance with export control regulations, and emphasize university management’s commitment to compliance efforts. In addition, university researchers who participated in our focus groups said that their universities had created an environment in which they felt comfortable reaching out to university staff with compliance-related questions. For example, participants in one of the focus groups told us that compliance officials are not trying to find violations, but are instead focused on building stronger compliance programs and stronger relationships with faculty. Understands export control regulations. Export control officers at all nine of the universities we visited said that university management understands and is knowledgeable about export control regulations and the implications of these regulations on the university’s research and development activities. For example, one export control officer stated that increasing awareness among the administrators, faculty, and staff has taken time, but that the administration now has a good knowledge of export control requirements following the outreach and training that the export control office provided over the last few years. Designates an export control officer position. Eight of the nine universities we visited have export control officers, and of those eight, five have had an export control officer position for over 10 years. The only university we visited that did not have an export control officer position had such a position prior to our visit. Among the universities we visited, this university had the lowest average research and development expenditures from 2013 through 2017—less than $30 million. Provides sufficient resources and authority to conduct export compliance activities. Officials at eight of the nine universities we visited stated that their university had sufficient resources and that relevant officials had adequate authority to conduct export compliance activities. Officials at one university said that they did not have adequate authority to conduct compliance activities, but that this condition might be changing because the export control officers now report directly to the Vice President of Research, which is giving them greater access to university management. Creates a clear organizational structure for export compliance. Officials at seven of the nine universities we visited identified individuals who are involved in export control compliance, including researchers and officials working in procurement, shipping, and contracting, among other things. Five of these seven universities also have export compliance manuals that specifically describe various officials’ export compliance roles and responsibilities. For this element, we assessed the extent to which the university conducted risk assessments of its export compliance program. See figure 7 for the results of our assessment. Five of the nine universities we visited have developed policies and practices that fully align with this element concerning risk assessments, while the other four have not developed such policies and practices. Below, we provide additional detail on universities’ risk assessment activities. Of the five universities that told us they conduct risk assessments, three stated that the export control officers periodically or annually conduct internal risk assessments of their export compliance efforts, while the other two described university groups that conduct periodic or annual, university-wide risk assessments that include an assessment of the export compliance program. For example, one university’s export control officer said that her office periodically reviews the university’s export compliance policies and practices to determine whether any gaps exist within the program. She also recently started reviewing her university’s export compliance policies and practices against those of other universities to determine whether other universities had developed any export compliance practices that would be appropriate for her university to emulate. She found, for example, that other universities had implemented a centralized loaner laptop program for researchers traveling abroad to minimize the risk of the theft of sensitive data from personal laptops, and said she hopes to implement such a program at her university. Officials at a university that periodically conducts university- wide risk assessments said they had conducted two such risk assessments since 2015 and were conducting a third assessment during our visit. During one assessment, reviewers recommended that the university increase export control training and staffing, which the export control office is working to address. Another university that conducts annual risk assessments has a research oversight committee that is made up of many subcommittees, including one for export controls. Each subcommittee conducts an annual risk assessment for its compliance area and reports any recommendations for optimizing compliance program effectiveness to the vice president for research. For this element, we assessed universities’ activities within seven sub- elements: whether the university (1) had processes in place to identify research involving export-controlled items, (2) had processes in place to monitor research to determine whether a license might be required at a later time, (3) tracked any export-controlled items being used or developed, (4) had developed any policies or practices for safeguarding export-controlled items, (5) used technology control plans to document and safeguard export-controlled items, (6) screened and monitored foreign visitors, and (7) screened all foreign parties associated with research projects prior to any export activities. See figure 8 for the results of our assessment. Export authorization and tracking export- controlled items Entities should develop processes to (1) ensure the organization makes correct export decisions, including identifying when U.S. government authorization is required prior to exporting; (2) track and protect any export- controlled items being used or developed by the organization; and (3) screen all parties associated with an export transaction against the U.S. proscribed/restricted parties lists prior to exporting. All but one of the nine universities we visited have developed policies and practices that fully align with this element concerning export authorization and tracking export-controlled items. Below, we provide additional detail on universities’ activities within the seven sub-elements, which fall under three process categories: making export decisions, tracking and safeguarding export-controlled items, and screening foreign parties. Under this category, we assessed universities’ activities in the following two areas: Identifies research involving export-controlled items: Officials at all nine of the universities we visited stated that they had, to varying degrees, developed policies and practices for identifying research projects that might involve items that are subject to export control regulations. Policies and practices for identifying research involving export-controlled items. All nine of the universities we visited require the lead researcher on a project to submit research proposals to an office charged with reviewing proposals and awards for grants and contracts, which we refer to as the Office of Grants and Contracts. The office also reviews the terms and conditions for awards—contracts, grants, or cooperative agreements—to ensure there is nothing in the paperwork that necessitates additional negotiation or that raises a concern related to export controls. When reviewing research proposals or awards, the Office of Grants and Contracts will flag those proposals and awards that may involve items subject to export control regulations for further review, either by the export control officer or another authorized university entity. Tools developed to support officials’ identification of research involving export-controlled items. The universities we visited have developed a variety of tools to support officials’ export control reviews of proposals and awards. For example, seven of the nine universities we visited require the lead researcher on a project to complete a questionnaire that includes export control- related questions when submitting research proposals for review. This questionnaire identifies research proposals that may be subject to export control regulations earlier in the process. In addition, at least four of the universities’ export control officers have developed flowcharts or checklists to help the Office of Grants and Contracts understand when to flag research proposals or awards for further review by the export control officer. In addition, seven of the nine universities we visited require that researchers obtain university approval to conduct research involving export-controlled items. For example, one university’s export control officer said that flagged proposals are sent to an export control review committee for review and approval. The committee reviews the risk associated with each of these research projects and determines whether the university is willing to accept the export control-related risks for that project. Another university requires the lead researcher to obtain approval from the university’s board before accepting an award for research involving export-controlled items. Monitors research to determine whether a license is required after the project starts. Officials at five of the nine universities described practices they had developed to monitor research projects in order to determine whether an export license is required after a research project is underway. For example, one university’s export control officer said her department monitors all research teams that intend to develop hardware or technology during their research because the resulting hardware or technology could be subject to export control regulations. These projects are flagged in the electronic system used to track research projects and the export control officer checks in with the lead researcher periodically to determine the status of the research. An official at another university explained that the university conducts periodic audits of timecards to see if any foreign persons have started charging time to ongoing projects involving export-controlled items. In contrast, one official at another university stated that the university relies on the lead researcher to alert the compliance office of any changes to the research team or research objectives, which may then require a license before continuing research. This official suggested that the lead researchers are better positioned than the export control officer to identify changes to the research that might necessitate obtaining an export license. Tracking and Safeguarding Export-Controlled Items Seven of the nine universities we visited used a variety of mechanisms to track and safeguard export-controlled items, including manual locks, electronic access systems, and other physical security systems, as well as separate computer networks to protect data subject to export control regulations. Under this category, we assessed universities’ activities in the following three areas: Tracks export-controlled items used at the university. Officials at seven of the nine universities we visited said they had developed mechanisms to track any export-controlled items being used or developed by the university. These mechanisms range from maintaining paper files to using electronic systems to track such information. For example, some of the universities maintain physical copies of documents they use to identify and track export-controlled items on campus. Other universities have developed electronic databases to track this information. One university maintains all records related to research projects in one electronic system, including technology control plans. Electronic databases and systems allow the export control officer to quickly identify the on-campus location of export-controlled items and who is working with these items. Safeguards export-controlled items. Eight of the nine universities we visited employ various security mechanisms to protect export- controlled items, including physical and information technology security mechanisms. For example, officials at seven of the nine universities we visited said their university protects export-controlled items by limiting access to spaces where these items are housed with locks or access cards, depending on the space. Three of these universities also require researchers to store export-controlled items in a locked box or storage space, in a locked room, when it is not in use. Some universities also use signs to indicate which spaces are restricted; however, officials at one university said that they do not use signage to indicate restricted spaces because it would draw more attention to the space. Some university officials also described information technology security mechanisms in place to protect data that may be subject to export control regulations. For example, officials at two universities noted the use of isolated or separate networks for researchers working with such data to limit access to this data. Uses technology control plans to document and safeguard export-controlled items. Officials at all nine of the universities we visited stated that researchers used export-controlled items on campus, and officials at eight of these universities said that their universities had developed and implemented technology control plans to safeguard such items. According to Commerce’s export compliance guidelines, organizations that possess or work with export-controlled items and either employ foreign persons or have frequent meetings with foreign persons should create a technology control plan. These plans should include a physical security plan, an information security plan, and training programs, among other components. According to the university officials we interviewed, the export control officer typically works with the lead researcher to develop the technology control plan. Six of the nine universities we visited require the lead researchers to sign the technology control plan to acknowledge that they understand their responsibilities for protecting the export- controlled items identified in the plan, and at least four of these universities require all the members of the research team to sign it as well. In addition, some of the universities we visited conduct annual audits of the technology control plans to ensure proper implementation. For example, an official at one of these universities explained that the university’s annual audit of the technology control plans verifies that security practices outlined in the plan are being followed by the research team and that only those researchers who signed the technology control plan have access to the export- controlled items. An official at another university said he reviews the human resources account information for projects involving export- controlled items annually to verify that only those individuals who have signed the technology control plan are working on those projects. Under this category, we assessed universities’ activities in the following two areas: Screens and monitors foreign visitors. All but one of the nine universities we visited screen and monitor foreign visitors to some extent. Specifically, four of these universities conduct restricted party screenings on all foreign visitors prior to their visit to verify that potential visitors are not on any U.S. government list of restricted or proscribed parties. The other four universities conduct restricted party screenings on some foreign visitors. Three of these four universities said that they do not have a formal process for reviewing foreign visitors and that the effort to invite and review visitors is decentralized. Some of the universities we visited also described how they monitor foreign visitors on campus. For example, officials at two universities said that the foreign visitors’ sponsor is responsible for monitoring their access. The export control officer at a third university told us that he briefs foreign persons visiting restricted spaces on the rules of their visit, including restrictions on camera usage. Screens foreign parties associated with research projects. All nine of the universities we visited use restricted party screening software, which searches several lists that U.S. agencies continually update to screen for restricted or denied parties. Universities and other exporters may be prohibited or restricted from doing business with any individuals or entities identified on one of these lists. Eight of the nine universities we visited screen all foreign individuals and entities associated with a research project using such software. Entities associated with a research project may include foreign researchers on the research team, foreign sponsors, or foreign collaborators, among others. Officials at the ninth university stated that they conduct ad hoc screening for research collaborations with foreign entities. Additionally, one of the universities has compiled a list of all the foreign entities the university works with and conducts weekly restricted party screenings of the foreign entities on this list. Although we focused our assessment on universities’ export compliance policies and practices in place to limit unauthorized deemed exports to foreign persons, officials at some of the universities we visited discussed their efforts to conduct restricted party screenings for other process areas, such as shipping, procurement, and gifts. We found that individuals or offices responsible for these processes at some universities manually screened entities. In one case, this was because the other offices did not have access to the restricted party screening software that the export control officer used. For this element, we assessed the extent to which the university had developed processes for maintaining relevant export control-related records. See figure 9 for the results of our assessment. All nine of the universities we visited have developed policies and practices that fully align with this element concerning recordkeeping. Below, we provide additional detail on universities’ recordkeeping activities. At least five of the nine universities we visited maintain their export compliance-related records in an electronic database or other electronic system. For example, one university’s system tracks each research project from start to finish and enables officials to search for all export control-flagged research proposals and awards, technology control plans, and other documents. One of the officials also told us that the system will alert the export control officer to any technology control plans with an upcoming expiration date. Officials at another university explained that their system also enables them to track all the approved technology control plans to quickly identify who is working under a technology control plan on campus at any point in time. Five of the nine universities we visited have written export compliance program manuals, and all of those universities’ manuals include information concerning recordkeeping requirements. For example, four of the five manuals specifically note that export control-related files must be maintained for at least 5 years, and four identify the types of records that need to be maintained, including export reviews, contracts, licenses, technology control plans, and shipping documents, among others. For this element, we assessed universities’ activities within two sub- elements: whether the university (1) provided export control-related training to all employees involved in exports and (2) required any individuals to complete mandatory export control-related training. See figure 10 for the results of our assessment. Seven of the nine universities we visited have developed policies and practices that fully align with this element concerning training, while the other two have not. Below, we provide additional detail on universities’ activities within the following two sub-elements: Provides export control-related training to all employees involved in exports. Seven of the nine universities we visited stated that they provide export control-related trainings to researchers and other officials involved in the implementation of export control regulations. The export control-related training available to various university officials at the universities we visited varies depending on officials’ level of interaction with export controls. For example, at least five of the universities’ export control officers we interviewed provide export control-related training tailored to the needs of staff whom the university relies on to identify requests for export-controlled items or research involving export-controlled items, including the procurement office and the Office of Grants and Contracts. One export control officer stated that he provides annual training to officials in the Office of Grants and Contracts and provides biannual training to officials in the procurement office. He noted that he spends the most time training officials responsible for reviewing grants and contracts because they are the “gate keepers” for all research proposals and research funding coming into the university. The two universities that do not provide export control-related training to all employees involved in exports do make some export control-related information available. An official from one of the universities said that the university provides access to online export control-related trainings developed by a for- profit entity. The export control officer at the other university said that although the university does not conduct formal training, he conducts frequent outreach and provides materials to increase university officials’ awareness of export control regulations. Conducts mandatory training for researchers conducting research involving export-controlled items. Seven of the nine universities we visited require researchers conducting research involving export-controlled items to complete training with the export control officer prior to beginning their project. Furthermore, researchers at four of these universities are required to complete additional periodic training to refresh their understanding of their compliance roles and responsibilities every 1 to 3 years. Most of the universities that conduct required export control training have varying systems in place to document attendance. For example, three of the nine universities we visited require attendees to sign a form certifying that they have completed the technology control plan training and understand their responsibilities. For this element, we assessed the extent to which the university conducted periodic audits of its export control compliance program to assess its effectiveness and integrity. See figure 11 for the results of our assessment. Eight of the nine universities we visited have developed policies and practices that fully or partially align with this element concerning internal audits, while one of the universities’ policies and practices did not align with this element. Below, we provide additional detail on universities’ efforts to conduct periodic audits of their export control compliance programs to assess their effectiveness and integrity. Eight of the nine universities we visited conduct some type of internal audit to assess the export compliance program’s effectiveness. For example, five export control officers at these universities review all technology control plans annually. One official said her office conducts these annual reviews to ensure that researchers are properly implementing the technology control plans and to determine if the plans need to be updated to address any changes to the export control regulations. In addition, seven of the nine universities we visited have an internal audit group, and four of these audit groups had conducted an audit of the export compliance program within recent years. One university official explained that the audit group’s periodic review of the export compliance program once found that the project management system did not provide enough transparency, and on the basis of this finding, the export control officer was able to petition the university for additional funding to further improve the system in place to track all research projects. According to an official at another university, a quality assurance official at his university audits a sample of research awards each month. Every few months, this official identifies a mistake, such as a failure to screen a foreign party against the lists of restricted parties. When a mistake is identified, the export control officer then screens the foreign party and counsels the person who missed this step. These audits provide universities with an opportunity to identify any potential gaps and continually improve their programs. For this element, we assessed the extent to which the university had developed clear procedures outlining the actions employees should take in the event that potential noncompliance is identified. See figure 12 for the results of our assessment. All nine of the universities we visited have developed policies and practices that fully align with this element concerning the reporting of violations. For example, officials at seven universities told us that they have a compliance hotline that people can use to report suspected violations. Two of these seven universities described additional actions they have taken to further educate their university community about the need to report potential export control violations by adding such information to flyers for the university compliance hotline and advertising this information online. Officials at three of the universities also discussed escalation procedures they have in place to investigate a potential export control violation. For example, one export control officer explained that he is responsible for investigating and reporting any violations. If he needs to initiate an investigation, he will select a team of university officials to enquire about the violation and determine whether a violation has occurred. Following the investigation, the Vice President for Research is responsible for determining whether the university needs to self-disclose a violation to the relevant federal regulatory agency. Five of the nine universities we visited had written export compliance program manuals, and all of those universities’ manuals included information concerning export control violations. For example, some of the manuals include a discussion about the legal and criminal penalties associated with export control violations and emphasize the importance of reporting any potential violations. In addition, two of the universities’ manuals describe the need to develop corrective action plans to prevent recurrence of any violations arising from systemic institutional practices or procedures. Three of the nine universities we visited had voluntarily disclosed export control violations. For example, one university disclosed information regarding a foreign person’s unauthorized access to ITAR-controlled technology because the lead researcher on the project and the procurement office did not know the technology was controlled. According to the export control officer at this university, her office is working with the procurement office to ensure that the future procurement of controlled technologies is flagged for review by the export control officer prior to ordering. This updated procedure will enable the export control officer to work with the lead researcher to develop a technology control plan if the university agrees to support the procurement of such a technology. For this element, we assessed the extent to which each university documented export control compliance processes, roles and responsibilities, and other relevant information in a manual to help the university implement its compliance program. See figure 13 for the results of our assessment. Five of the nine universities we visited have developed export compliance manuals, consistent with this element, while the other four have not. These manuals describe the export control-related roles and responsibilities of various offices and officials on campus, including the export control officer and university researchers, among others. In general, the manuals also describe a number of export control compliance procedures, including the initial review of research proposals, development of technology control plans for research involving export- controlled items, training requirements, and processes for investigating potential violations, among others. Four of the five universities developed manuals in 2015 or earlier, and one university developed a manual in 2018. Three of the universities that published manuals in or before 2015 have updated their manuals at least once, but one of these universities has not updated its manual since 2013. We reviewed the public websites of a statistically generalizable sample of 100 U.S. universities expending more than $15 million for research and development annually, on average, to determine the extent to which universities publicly share export control-related information with their campus community. Using research expenditure data collected by the National Science Foundation for 2013 through 2017, we identified 292 public and private U.S. universities that expended more than $15 million on research and development, on average, over a 5-year period. We selected a stratified, random sample of 100 universities from this list to provide representation from a diverse set of universities in our sample. Next, we created a top and bottom stratum based on total research and development expenditures. The top stratum included universities with expenditures above $250 million (85 universities) and the bottom stratum included universities with expenditures between $15 million and $250 million (207 universities). The sample included 55 universities from the bottom stratum and 45 from the top stratum. Of the 55 universities from the bottom stratum, 30 are public and 25 are private. Of the 45 universities from the top stratum, 25 are public and 20 are private. We assessed the information on the selected universities’ websites against six of the eight elements of an effective export compliance program: 1. Management commitment and organizational structure 2. Export authorization and tracking export-controlled items 5. Reporting and addressing violations 6. Export compliance manual We did not review information related to risk assessments or internal audits on the selected universities’ websites because we did not expect universities to publicly publish this type of information. Of the 100 universities in our sample, 77 maintained a dedicated web page for export control-related information, and 79 provided contact information for the person or office responsible for complying with export control regulations on their website. However, only about half of the universities’ websites identified an export control officer or similar official, and only 24 included a public statement from university management supporting the export compliance programs. See table 8 for additional results from our website analysis. Management commitment and organizational structure Entities should have public management support for their compliance program, sufficient resources to conduct compliance activities, and a clear organizational structure identifying individuals responsible for compliance. related information? Export Control Officer or similar title identified? Export control roles and responsibilities of researchers described? Export authorization and tracking export- controlled items Entities should develop processes to (1) ensure the organization makes correct export decisions, including identifying when U.S. government authorization is required prior to exporting; (2) track and protect any export- controlled items being used or developed by the organization; and (3) screen all parties associated with an export transaction against the U.S. proscribed/restricted parties lists prior to exporting. A majority of the 100 universities’ websites included information about relevant export regulations and a definition of exports, and almost half provided additional resources or tools for researchers to better understand how or whether their research involves items subject to export control regulations; however, a limited number provided information about practices the university may employ to protect export-controlled items. For example, 74 of the 100 universities published information about the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) on their websites. About half of the universities also maintained a frequently asked questions section concerning export control regulations and about half provided tools such as decision tree matrices to help researchers determine whether an export may require a license. However, less than a third of the universities’ websites included any information about technology control plans or guidance regarding foreign visitors, which are practices that universities may undertake to protect export-controlled items used in university research or other academic activities. For example, only 27 of the 100 universities’ websites contained explanations of when a technology control plan would be necessary. See table 9 for additional results from our website analysis. Twenty of the 100 universities’ websites provided information regarding export compliance recordkeeping requirements. See table 10 for these results. About half of the universities’ websites provided information about export control trainings available online, developed by the university, associations, or for-profit organizations, among others. However, only 21 of the 100 universities’ websites provided information about how to request university-provided, in-person training regarding export compliance. See table 11 for additional results from our website analysis. Only about a quarter of the universities’ websites provided guidance about when to report potential violations, but about half of the universities’ websites provided information about the potential administrative or criminal penalties associated with export control violations. See table 12 for additional results from our website analysis. Reporting and addressing violations Entities should develop clear procedures outlining the actions employees should take in the event that potential noncompliance is identified. Entities should also develop processes for identifying and addressing the root cause of any noncompliant activity. Guidance on when to report a potential export control violation? Less than half of the universities in our sample published an export compliance manual on their website. See table 13 for these results. Kimberly Gianopoulos, (202) 512-8612 or gianopoulosk@gao.gov. In addition to the contact named above, Juan Gobel (Assistant Director), Drew Lindsey (Assistant Director), Amanda Bartine (Analyst-in-Charge), Taylor Bright, Debbie Chung, Neil Doherty, Tina Huang, Kathryn Long, Sulayman Njie, and Jina Yu made key contributions to this report. Ashley Alley and Justin Fisher provided technical assistance.", "summary": "Over 1.2 million foreign students studied at U.S. universities in 2018 (see fig.). Although foreign students and scholars contribute to U.S. research, there is a risk that they will “export” sensitive knowledge they gain to their home countries. To mitigate this risk, the U.S. government implements export controls. GAO was asked to review agency guidance and universities' security practices. This report examines (1) the extent to which State and Commerce have provided guidance and outreach that supports U.S. universities' understanding of export control regulations; (2) challenges U.S. universities face working with other federal agencies, such as DOD; and (3) the extent to which universities' export compliance practices align with State and Commerce guidelines. GAO reviewed related laws, regulations, and guidance, and interviewed officials from relevant federal agencies and four university associations. GAO also visited nine universities—selected, in part, on the basis of research expenditures and geography—and assessed their compliance practices against agency guidelines. The Departments of State (State) and Commerce (Commerce) have each provided guidance and outreach to support exporters' understanding of and compliance with their separate export control regulations. Exporters, including universities, are subject to these regulations if they ship export-controlled items overseas or if they share such items, including technology or source code, with foreign persons in the United States. University and association officials raised concerns that State and Commerce guidance and outreach does not adequately address export compliance issues that are more common to universities than to industry, such as fundamental research—i.e., research that is ordinarily published and not subject to export control regulations. Without additional guidance and outreach that addresses such issues, universities may not have the information they need to adequately comply with these regulations and properly safeguard export-controlled items. Officials from selected universities and university associations identified three export control-related challenges in working with other federal agencies. For example, university and association officials asserted that Department of Defense (DOD) officials misunderstand the term fundamental research, which may limit universities' ability to conduct research for DOD. DOD acknowledged that some officials have inconsistently interpreted the regulations and that it has not yet fully addressed this challenge. Additionally, university and association officials expressed concerns that threat briefings and other guidance that the Federal Bureau of Investigation (FBI) and Department of Homeland Security provide are not helpful because, for example, they do not contain unclassified information that can be shared widely. To address these concerns, the FBI partnered with a university association to produce a series of unclassified “awareness-raising” materials for university audiences, among other efforts. Seven of the nine universities GAO visited have export compliance policies and practices that generally align with State's and Commerce's export compliance guidelines. For example, most have demonstrated a strong management commitment to export compliance and have robust practices for tracking export-controlled items, recordkeeping, and reporting potential violations. However, GAO identified gaps in some universities' practices in four areas—risk assessments, training, internal audits, and export compliance manuals. GAO is making four recommendations, including that State and Commerce should improve their export control guidance and outreach, which may help address gaps in university export control compliance practices. GAO also recommends that DOD take steps to ensure its officials consistently interpret export control regulations. State, Commerce, and DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "In a 2006 report, we stated that there was no generally agreed-upon definition of insurance and most definitions in the private sector differed because they were developed for specific purposes or had changed over time. However, the definitions share key elements of risk transfer and risk spreading, and include other elements such as indemnification, which is payment for losses actually incurred; the ability to make reasonable estimates of future losses; the ability to express losses in definite monetary amounts; and the possibility of adverse, random events occurring outside the control of the insured. The Financial Accounting Standards Board establishes generally accepted accounting principles for private-sector entities. The Board defines an insurance contract as “a contract under which one party (the issuing entity) accepts significant insurance risk from another party (the policyholder) by agreeing to compensate the policyholder or its designated beneficiary if a specified uncertain future event (the insured event) adversely affects the policyholder.” Generally, private insurers offer several types of insurance products for individuals, families, or businesses, including health, disability, life, annuity, and property and casualty insurance products. Per the terms of the contracts, insurers generally offer coverage for losses from specified events in exchange for premium payments. Private insurers spread risk over a large enough group of insured parties to reasonably predict total losses, then set risk- based premium rates to make a profit and cover costs, including claim payments for covered losses, administrative expenses, and other expenses associated with selling and servicing policies. Similarly, there is no generally agreed-upon definition of insurance as it relates to federal activities. FASAB, which establishes generally accepted accounting principles for federal entities, provides a definition for financial reporting purposes. FASAB defines an insurance program as “a general term used to refer to a program that is authorized by law to financially compensate a designated population of beneficiaries by accepting all or part of the risk for losses incurred as a result of an adverse event.” In addition to activities that may fall under the FASAB definition of insurance, the federal government undertakes other activities that compensate or provide benefits to individuals or other third parties that suffer losses from an adverse event. Unlike private insurance policies, these federal activities do not necessarily utilize a contract or charge premiums or fees in exchange for goods, services, or benefits. Even when premiums or fees exist, they may not cover all costs, as federal expenditures can be driven more by policy goals or agency missions than a desire to achieve fiscal solvency. For example, by design, premiums collected through the Federal Crop Insurance program do not cover its costs. One of the program’s goals is to help farmers manage the risks inherent in farming, such as the risk of poor crop yields and declines in prices, and it does so while subsidizing more than 60 percent of the premiums. In addition, Congress created the National Flood Insurance Program (NFIP) to address the increasing cost of federal disaster assistance by providing flood insurance to property owners in flood-prone areas, where such insurance either was not available or prohibitively expensive through the private sector. Subsidized premium rates, among other things, have precluded NFIP from achieving rates that reflect the full risk of loss, and the program has not had sufficient funds to pay claims. Similarly, the federal government uses the Disaster Relief Fund to provide disaster relief assistance without collecting premiums or other fees from the entities receiving the funds before or after an event occurs and without knowing beforehand who might receive compensation. The President’s Budget and the Financial Report present complementary perspectives on the federal government’s financial position and condition. As illustrated later in the report, differences in when costs are recognized for budgetary or financial reporting purposes can provide substantially different measures of cost in a given year for some federal activities, including federal insurance. First, the federal budget process serves as the primary financial plan of the federal government and thus plays a critical role in the decision- making process for all federal expenditures, including those for insurance programs and other activities that transfer risk or losses to the federal government. The President, federal agencies, and Congress use the annual budget process, in part, to plan how federal funds should be spent for federal activities and track budget approval and execution. Besides the President’s proposed appropriations for a given fiscal year, the President’s Budget also reports actual data for two prior fiscal years and estimated data for the prior fiscal year, such as the budget authority, unpaid obligations, and outlays (liquidated obligations). Generally, receipts are recorded when the federal government receives the cash and spending is recorded when outlays (payments) are made. We refer to the President’s Budget as primarily “cash-based.” The Secretary of the Treasury, in coordination with the Director of OMB, prepares the annual Financial Report, which consolidates and summarizes financial information from federal agencies and departments. The Financial Report provides an overall view of the annual financial results of operations, condition, and position of the federal government. In particular, it provides the net operating cost of the federal government by comparing its revenues and costs. The report follows FASAB accounting standards and generally records transactions on an accrual basis—not on a cash basis—to recognize and track assets, liabilities, revenues, and expenses. That is, expenses and liabilities are recorded when they are incurred, even if payment is due at a later date, and revenues (other than taxes and other nonexchange revenues) and related assets, such as receivables, are generally recorded when amounts are earned, even if actual receipt occurred at an earlier time. Our analysis allowed us to identify 148 federal activities that transfer risk or losses from adverse events to the government (see table 1). We broadly categorize the federal activities that met our criteria as follows: federal insurance programs; federal loan guarantee programs; senior preferred stock purchase agreements with two government-sponsored enterprises (enterprises), Fannie Mae and Freddie Mac; federal employee and veterans benefits (excluding education benefits and burial benefits); and other activities, such as those that provide property damage or financial loss compensation and those that offer life, health, or disability benefits to nonfederal employees. We generally only provide cost and exposure information for activities as available in the Financial Report and agency documents. See appendix I for more information on our scope and methodology. Through our analysis of the Financial Report, we identified five federal insurance programs. While there is no universally accepted definition of what constitutes a federal insurance program, federal agencies have reported insurance and guarantee liabilities and related note disclosures in the Financial Report for the following programs: Department of Agriculture, Risk Management Agency’s (RMA) Federal Crop Insurance Program; Department of Homeland Security, Federal Emergency Management Agency’s (FEMA) National Flood Insurance Program (NFIP); Pension Benefit Guaranty Corporation’s (PBGC) single-employer and multiemployer pension insurance programs; Federal Deposit Insurance Corporation’s (FDIC) deposit insurance program; and National Credit Union Administration’s (NCUA) share insurance program. See table 2 for descriptions of the programs as well as related funding and cost or exposure information. All five federal insurance programs collect premiums, assessments, or fees, but the programs differ in the extent to which they are designed to fund their liabilities using only these sources of income. Federal crop insurance premiums are subsidized by the federal government by law. In addition, RMA automatically receives a permanent indefinite appropriation each fiscal year for this premium subsidy and other expenses, and it returns unobligated balances to the U.S. Treasury at the end of the fiscal year. The other programs are generally intended to use premiums or assessments collected and other nonfederal assets and income to pay claims or guarantees. The programs also differ in their authority to borrow funds from the U.S. Treasury to pay claims and other expenses, as well as their use of such authority. As of September 30, 2018, NFIP had about $20.5 billion of outstanding debt with the U.S. Treasury (after Congress granted $16 billion in debt cancellation to NFIP in October 2017). Before 2004, NFIP was able to cover most of its claims and repay occasional loans from the U.S. Treasury with premiums it collected, but it has not been able to do so since, partly due to extraordinary catastrophic loss years resulting from Hurricane Katrina and Superstorm Sandy. According to FEMA, the program as currently designed is unlikely to be able to repay this debt. PBGC is expected to fund itself entirely through premiums, other nonfederal assets and income (such as investment income), and assets from underfunded, terminated single-employer plans it takes over, as it currently does not receive taxpayer funds and does not have authority to borrow funds from the U.S. Treasury. The balance in FDIC’s deposit insurance fund (DIF) fell to negative $20.9 billion as a result of bank failures triggered by the 2007–2009 financial crisis. As required by law, FDIC implemented a plan to replenish the DIF and raise the reserve ratio to its designated minimum in the time limits prescribed by the Federal Deposit Insurance Act. Pursuant to the plan, FDIC raised assessment rates and imposed a one-time special assessment to recapitalize the DIF. To meet the projected liquidity needs for failures of FDIC-insured depository institutions during the financial crisis, FDIC required the banking industry to prepay its quarterly risk-based assessments for the fourth quarter of 2009 and for the following 3 years. FDIC did not use its authority to borrow funds from the U.S. Treasury. On the other hand, NCUA’s Share Insurance Fund borrowed funds from the U.S. Treasury during the 2007–2009 financial crisis but has since repaid the loans. Lastly, the programs also differ in their expected ability to cover future losses. RMA receives a permanent indefinite appropriation each fiscal year to pay for its commitments, so certainty exists that the program will be able to pay future losses using such appropriations. According to FEMA, as currently designed, NFIP likely will not have enough funds to cover all future program expected losses. NFIP also would not have enough funds to cover a single super-catastrophic year, in which NFIP could experience as much as $40 billion in claims, according to FEMA. While PBGC programs have been able to pay all guaranteed benefits and financial assistance to date, PBGC forecasts a very high likelihood of insolvency for the multiemployer program in the next several years if there are no changes in law. DIF’s ability to pay future claims depends on whether the fund has sufficient assets. Congress sets a minimum ratio of assets to insured deposits for the DIF (called the reserve ratio), which by statute must be at least 1.35 percent by September 30, 2020. In addition, FDIC sets a target ratio (called the designated reserve ratio), currently set at 2 percent. FDIC views the designated reserve ratio as a minimum goal that will allow the fund to grow sufficiently large in good times to increase the likelihood of the fund remaining positive during bad times. DIF’s reserve ratio was 1.36 percent as of September 30, 2018. To comply with the statutory requirement that large banks—those with total assets of $10 billion or more—bear the responsibility of increasing the DIF reserve ratio from 1.15 percent to 1.35 percent, FDIC imposed a quarterly surcharge on large banks. According to FDIC officials, the surcharge began in the third quarter of 2016, the quarter after the reserve ratio first reached or exceeded 1.15 percent, and ended in the third quarter of 2018, the quarter in which the reserve ratio first reached or exceeded 1.35 percent. The fund ratio for NCUA’s Share Insurance Fund is called the equity ratio, and has a statutory minimum of 1.20 percent. NCUA’s target equity ratio is called the normal operating level and was set at 1.38 percent by the NCUA Board of Directors on December 13, 2018. NCUA’s equity ratio was 1.46 percent as of December 31, 2017, both above the statutory minimum and the normal operating level. We identified 33 federal loan guarantee programs that transfer risk or losses to the federal government (see full list in app. III). The federal government uses loan guarantees as tools to support specific social and public policy objectives, such as those for housing and small businesses. Federal loan guarantees are any guarantees, insurance, or other pledges with respect to the payment of all or a part of the principal or interest on any debt obligation of a nonfederal borrower to a nonfederal lender. Thus, the federal guarantee transfers some or all of the risks of borrower default from private lenders to the federal government. The Federal Credit Reform Act of 1990 requires agencies to estimate the cost to the government of guaranteeing credit in the President’s Budget, beginning in fiscal year 1992. This cost, the loan guarantee subsidy cost (referred to in this report as “subsidy cost”), equals the net present value of the following cash flows at the time a loan guarantee is disbursed by the lender: (1) the estimated payments by the government to cover defaults, delinquencies, interest subsidies, or other payments; and (2) the estimated payments to the government, including origination and other fees, penalties and recoveries. If the present value of estimated cash outflows exceeds cash inflows, there is a positive subsidy cost. If the present value of estimated cash inflows exceeds cash outflows, there is a negative subsidy cost, referred to as subsidy income. Every fiscal year, subsidy costs are (1) estimated for the loan guarantees obligated during that year and (2) reestimated for loan guarantees obligated in previous fiscal years to update costs for actual loan performance and to incorporate any changes in assumptions about future loan performance. If reestimates increase subsidy costs, an agency would need additional funds. If they decrease subsidy costs, an agency generally would return funds to the general fund of the Treasury. Regardless of whether credit programs are discretionary or mandatory, agencies do not need to request additional appropriations to cover upward reestimates because the Federal Credit Reform Act provides permanent indefinite budget authority for this purpose. In addition, the loan guarantee liability in the Financial Report is the present value of estimated net cash outflows. Thus, this liability is an estimate of the exposure to the federal government because of all outstanding loan guarantees. This liability is based on all loan guarantees obligated in a given fiscal year and previous years that are outstanding as of the end of a fiscal year. It takes into account the subsidy costs of these guarantees estimated as of the time the loan was obligated and subsequent adjustments such as modifications and reestimates. As is the case with federal insurance, federal loan guarantee liabilities are publicly reported in the Financial Report and related note disclosures. Table 3 presents some of the measures reported in the note disclosures as of September 30, 2017. The estimated subsidy cost to the government for loan guarantees, including reestimates, was $12.5 billion during fiscal year 2017, as reported in the Financial Report. This was largely attributable to guarantees under Federal Housing Administration (FHA) loans administered by the Department of Housing and Urban Development, the largest of which is FHA’s Mutual Mortgage Insurance (MMI) program. The program provides mortgage insurance to encourage lenders to make credit available to borrowers not adequately served by the conventional market, such as first-time homebuyers, minorities, and lower-income families. Similarly, federal loan guarantee liabilities were approximately $43 billion, with FHA loan guarantees accounting for about 48 percent of all guarantee liabilities. Current senior preferred stock purchase agreements between Treasury and the enterprises, Fannie Mae and Freddie Mac, transfer risk or losses to the federal government. The enterprises purchase mortgage loans that meet certain criteria for size, features, and underwriting standards, known as “conforming” loans. After purchasing mortgages, the enterprises create mortgage-backed securities and guarantee investors in these securities that they will receive timely payments of principal and interest. In 2008, because of the enterprises’ poor financial condition, the Federal Housing Finance Agency (FHFA) placed the enterprises into conservatorship and Treasury agreed to provide capital assistance in part to ensure timely payment to investors in exchange for shares of senior preferred stock, thus transferring risk to the federal government. Under the agreements, Treasury has committed to providing up to $445.6 billion in capital support to the enterprises while they are in conservatorship. If Fannie Mae or Freddie Mac has a net worth deficit at the end of a financial quarter, Treasury will provide capital support to eliminate the deficit. Under the most recent agreement, the enterprises must pay Treasury a dividend of all their quarterly positive net worth above a $3 billion capital reserve that each enterprise is allowed to retain. As of December 31, 2018, the enterprises had paid $292.3 billion in cumulative dividends to Treasury. Since the second quarter of 2012— with the exception of the first quarter of 2018 during which the enterprises required Treasury support due to devaluation of certain assets—Fannie Mae and Freddie Mac have not required additional support from Treasury. As of August 2018, Treasury had provided the enterprises with $191.4 billion of this amount since they were placed under conservatorship in 2008, leaving $254.1 billion in potential taxpayer exposure should Treasury need to provide any additional support. The latter represents the maximum amount of potential future federal spending under the current agreements. According to Treasury, based on their assessments, there were no probable future funding draws as of September 30, 2018, but it was reasonably possible that market volatility or non-recurring events could cause the enterprises to generate quarterly losses and, therefore, result in future funding draws against Treasury’s funding commitment. We identified 13 large federal employee and veterans benefit activities that transfer at least some of the risk or losses to the federal government (see app. IV for more information). The federal government offers its civilian and military employees health and life insurance, defined benefit pension and other retirement benefits (such as post-retirement health insurance and life insurance), and other benefits. Many of these benefit programs exchange current services for a guarantee of lifetime annuity payments or the continuation of health insurance coverage, inherently transferring at least part of the risk of an adverse experience—such as people living longer than expected, or health care costs rising faster than expected—from the employees to the federal government. For example, the following three pension activities account for more than 80 percent of all federal employee and veterans benefit liabilities: On the civilian side, the Office of Personnel Management (OPM) administers the Civil Service Retirement System and the Federal Employees Retirement System, which are the largest civilian pension plans covering nearly all full-time, permanent civilian federal employees. The Department of Defense and the Department of Veterans Affairs administer the largest military plans. The Department of Defense administers the Military Retirement System, and Veterans Affairs provides for the payment of compensation, pension, and burial benefits to veterans and survivors. Federal employee and veterans benefit liabilities are publicly reported in the Financial Report and related note disclosures. Generally, these liabilities are recorded as employee services are rendered. Table 4 presents liabilities of the government for certain federal employee and veterans benefit activities. Such benefits include deferred compensation that generally commit the federal government to provide cash compensation and health insurance following a term of service and to accept certain risks regarding the ultimate costs of those benefits. These liabilities were approximately $7.6 trillion as of September 30, 2017, and represented about 32 percent of all federal liabilities (which were $23.9 trillion). An analysis of the President’s Budget, the Catalog of Federal Domestic Assistance (CFDA), and the U.S. Code yielded 95 additional activities that met our criteria of transferring risks or losses from adverse events to the federal government. These activities can be broadly categorized into those that provide compensation for property or financial losses— including losses resulting from adverse environmental or manmade events—and those that offer life, health, or disability benefits to nonfederal employees. See appendix V for information on all 95 activities. Some of these federal activities provide compensation to specific third parties if they suffer certain losses from future adverse events, but the federal government may not always charge premiums for accepting this risk of loss. For example, the Department of Agriculture’s Price Loss Coverage Program provides payments to farmers of certain crops when the effective price of the commodity is less than a reference price for that commodity. Farmers can apply to receive such assistance and do not pay premiums to receive benefits. We also found other activities in which the beneficiaries who receive government compensation for their losses are known only after an adverse event occurred. This was generally the case for activities that provide compensation for property or financial losses to victims of unforeseen adverse environmental or manmade events, such as activities funded by the Disaster Relief Fund. Lastly, we found activities that offer life, health, or disability benefits. These include federal grants to states for Medicaid, which assists states in providing medical care to generally low-income individuals, and activities that support mental health services, treatment for substance abuse, or child health insurance services. For example, the Department of Health and Human Services administers the Children’s Health Insurance Program, which provides funds to states to help them maintain and expand health assistance to uninsured, low-income children and, at a state’s option, low-income pregnant women. Table 5 has information on the budget accounts we found with more than $10 billion in total new obligations for fiscal year 2017 that funded activities that transferred risk or losses to the federal government. While obligations are a legal liability for the federal government, they may not necessarily reflect an activity’s fiscal exposure if, for example, the activity has dedicated payment streams that reduce the government’s fiscal exposure. We found five additional activities authorized in law that have not yet caused financial liabilities to the federal government but may do so if certain adverse events occurred. Such events include acts of terrorism, nuclear power plant incidents, or catastrophic space launch-related incidents. In all five cases, the federal government is generally authorized to help finance third-party liability claims related to the event, if needed, after private-sector insurers have paid a certain level of claims. As seen in table 6, some of these activities could require large, previously unbudgeted expenditures by the federal government if an event occurred. As of December 31, 2018, these activities had not triggered losses to the federal government. As mentioned earlier, we listed federal activities that meet the following criteria: (1) a risk of financial loss or actual financial loss to a third party exists that stems from an adverse event; and (2) through the activity, the federal government accepts some or all of the risk of financial loss or actual financial loss from the adverse event by indemnifying, guaranteeing, or providing benefits to the affected entity or beneficiary. Our categorization of such activities as federal insurance activities, federal loan guarantees, senior preferred stock purchase agreements with Fannie Mae and Freddie Mac, certain federal employee and veterans benefits, or other programs, was driven by the sources we used, in particular the Financial Report. Our results were based solely on the criteria we developed for this report and the sources and methodologies we used. Other criteria, sources, or methodologies might yield lists that differ from ours in number and composition of activities. Expert opinions sometimes differed on which types of activities met our criteria. We acknowledge the different opinions. In updating our 2005 catalog of federal insurance activities, our efforts are aimed at providing Congress with an expanded list that helps convey the wide variety of activities that may not necessarily be considered federal insurance but share important aspects of insurance. We also intended to highlight laws that authorize the federal government to cover third-party liabilities from specific adverse events—such as terrorist attacks or nuclear accidents— and that have not yet resulted in liabilities to the federal government but could do if the events occurred. Our catalog may not be appropriate for other purposes. In our previous work, we found challenges in relation to measuring and reporting fiscal exposures caused by certain federal activities, including federal insurance programs. We previously reported that the primarily cash-based budget may not accurately reflect the costs the government incurs and the payments the government may be expected to make for some activities that transfer risk or losses to the government. In addition, the amount of the exposure to the federal government can be hard to measure for some activities. These challenges still exist, and to illustrate them, we reviewed six activities from among those we identified that transfer risk or losses to the federal government. Federal activities that transfer risk or losses to the federal government have a range of fiscal exposures in which the extent of the government’s legal commitment varies (see fig. 1). In 2003, we developed a conceptual framework for fiscal exposures that notes fiscal exposures may be explicit or implicit. Explicit exposures are commitments that the government is legally required to fund, while implicit exposures arise not from a legal commitment, but from current policy, past practices, or other factors that may create the expectation for future spending. Some federal activities have a combination of explicit and implicit exposures. For example, the government is not legally required to cover PBGC insurance claim losses in excess of PBGC’s available resources. Therefore, claims up to the statutory limit are explicit exposures, and losses in excess of PBGC’s available resources represent an implicit exposure for the federal government to the extent there is an expectation that the government would step in and cover losses beyond the program’s reserves. In contrast, loan guarantees under the MMI Fund represent an explicit exposure only, because the government has a legal commitment to pay claims if the borrower defaults on a loan. Implicit exposures may not be evident in the budget, because the primarily cash-based budget records spending only when payments are made. For example, as part of the Commercial Space Launch Insurance Program, the federal government is potentially liable for damages from commercial space launch accidents, subject to appropriation, up to $3.1 billion per licensed space launch in 2017. This program represents an implicit exposure because a new appropriation—which would represent the federal government’s legal commitment to pay for this program—is required to fund damages. Because there has never been such an event or appropriation, this fiscal exposure has not been included in the budget. According to Federal Aviation Administration officials, the agency has not designed internal processes or procedures to address these potential costs, such as estimating the costs, in part because the agency cannot presume the government will provide funds until such an appropriation were made. While implicit exposures do not present a legal commitment to the government, the federal government historically has shown a willingness to fund them in some cases. For example, NFIP has authority to borrow funds from the U.S. Treasury. To the extent there is an expectation that the federal government will cover claims exceeding the amount NFIP has been authorized to borrow from the U.S. Treasury, NFIP represents an implicit exposure. In October 2017 when NFIP was about to exhaust its borrowing authority, Congress demonstrated its willingness to fund NFIP implicit exposures by passing a supplemental appropriation, which the President signed into law, that cancelled $16 billion of NFIP’s past borrowing from the U.S. Treasury. This allowed NFIP to borrow an additional $6.1 billion that would have exceeded its borrowing authority without this intervention, while also reducing its overall debt. Additionally, in fiscal years 2005–2018 the federal government designated a total of $138 billion in supplemental appropriations to the Disaster Relief Fund for declared disasters (see fig. 2). These costs indicate that there was an implicit exposure because Congress must pass a supplemental appropriation to cover them. Congress passed at least one supplemental appropriation for a major disaster in 9 of the 14 years during 2005–2018. As we previously found, the federal budget may not accurately reflect the government’s costs or the likely claim on federal resources from activities that transfer risk or losses to the government. Again, except for loan guarantees, the federal government’s primarily cash-based budget generally does not record the full cost of commitments incurred in the present until corresponding payments are made in the future. However, for some claims, such as pension and post-retirement life insurance, the federal commitment occurs years before the related cash consequences are reflected in the budget. For example, the cost of pension plan insurance accrued in a given year is not reflected in the budget; rather, premiums are shown as receipts when they are collected and payments are shown as outlays when they are made. In fiscal year 2017, the budget showed PBGC’s annual receipts exceeded its outlays by $4.8 billion. But in the same year, the program also had a $76 billion negative net position, which is one measure of the magnitude of the government’s fiscal exposure and is not included in the budget (see fig. 3). Similarly, the budget may not indicate the government’s long-term exposure from weather-related events. Like PBGC, NFIP reports premiums in the budget as receipts in the year they are collected and payments as outlays in the year they are made. The budget does not currently include information on NFIP’s liabilities, assets, or net position. In fiscal year 2017, the budget showed a deficit (outlays exceeded receipts) for NFIP of $2.2 billion, a modest deficit compared to NFIP’s net position in the same year, which fell by $11.5 billion to negative $37.4 billion (see fig. 4). NFIP’s $30.425 billion in debt to the U.S. Treasury at that time, which was included in its liabilities, contributed to its net negative position. We previously reported that FEMA is required by law to charge many policyholders less than full-risk rates, otherwise known as subsidized rates. We found that FEMA’s budget does not recognize the subsidy, making it difficult to analyze the effect of subsidized premium rates on the overall financial stability of NFIP. In 2017, we recommended that Congress consider comprehensive reform to improve NFIP solvency and enhance national resilience to floods. At that time, we developed five policy goals for evaluating options for reforming NFIP that included requiring transparency of the program’s federal fiscal exposure. Congress is still considering various reforms related to NFIP. In addition, the budget request for the Disaster Relief Fund, which provides a significant portion of the total federal response to major disasters, traditionally has been intended to cover each fiscal year’s costs for previously declared disasters and the predictable cost of noncatastrophic events. It does not pre-fund anticipated needs from disasters that have yet to occur or seek funding for potential catastrophic events. As previously noted and shown in figure 2, extreme weather events have cost the nation more than $100 billion through supplemental appropriations to the Disaster Relief Fund since fiscal year 2005. According to the Analytical Perspectives of the President’s 2019 Budget, inflation, urbanization, and other factors are expected to contribute to increasing future disaster response and recovery costs. Additionally, climate change could increase the costs of severe weather events as more frequent and extreme weather and climate-related events are expected to continue to damage infrastructure, ecosystems, and social systems, according to the United States Global Change Research Program. This is one reason we added the federal government’s fiscal exposure created by climate change to our 2013 High Risk List. However, the increased fiscal exposures are not reflected in the Disaster Relief Fund’s financial measures in the budget. According to FEMA officials, the agency does not forecast costs or exposures for catastrophic disasters, in part because each catastrophe is different and presents its own set of risks that would be very difficult to predict with reasonable certainty. While the primarily cash-based budget may not represent an activity’s likely claim on federal resources, members of Congress and the public have access to information on the fiscal health of the activities through other avenues. Many of the activities we reviewed track exposures and other relevant data internally and provide that information to Congress and the public through a variety of reports outside the budget (see table 7). These include actuarial reviews, one-time analyses of various subjects, and annual reports that provide detailed financial information. For example, each year an independent actuarial contractor conducts two separate actuarial reviews of the MMI Fund—one for forward mortgages and one for Home Equity Conversion Mortgages (reverse mortgages)—to estimate the economic value of the two portfolios. FHA then compiles statutorily required annual reports for Congress based on the results of the actuarial analyses. The annual report includes the calculation of the MMI Fund’s overall capital ratio and some additional analyses of the MMI Fund’s financial condition. While these reports provide additional financial information, we previously reported that decision-making is best informed if the government includes in the budget the costs of its commitments at the time it makes them. If the full cost of a spending decision is included in the budget when the decision is made, then decision makers can consider the total costs when setting priorities, compare the cost of an activity with its benefits, or assess the cost of one method of reaching a specified goal against another. Decision makers’ ability to make informed choices would be improved by increased transparency about the impact of policy decisions on the expected path of spending and revenue. We previously recommended that Congress consider expanding the use of accrual-based information to other activities, such as insurance, because accrual measurement would advance the recognition of costs for these commitments, especially those that involve cash flows over many years. We determined that, for many programs, adopting accrual-based information selectively within the current, primarily cash-based budget might improve information while preserving up-front control. PBGC, Federal Employees’ Group Life Insurance (FEGLI), and NFIP officials stated that adding limited accrual accounting information, such as the balance sheet, to the President’s Budget would be relatively easy. NFIP officials agreed that while the financial statements and various reports show the full liability of the program, including this information in the budget would consolidate it in one place. The President’s Budget (Appendix) already includes a balance sheet from FHA’s MMI Fund, along with information on credit subsidy reestimates in the Federal Credit Supplement of the budget as required by the Federal Credit Reform Act of 1990. According to FHA officials, the main benefit of reporting balance-sheet information in the budget is that the public, OMB, and Department of Housing and Urban Development personnel have more data that can be used to make decisions. FHA officials also noted that creating a crosswalk between the financial reports and the budget has been a challenge because there is not always a one-to-one relationship, which is due to different reporting elements and concepts underlying their measurement. Given the variation in fiscal exposures, we previously concluded that while accrual budgeting better recognizes long-term costs, a uniform, across-the-board approach to make fiscal exposures more apparent in the budget may not be appropriate. One of several factors that should be considered is the extent to which the magnitude of the exposure can be reasonably estimated. The complexity and uncertainty surrounding some exposures create significant cost estimation challenges, while other activities are easier to estimate. For example, OPM considers various factors that are fairly stable and easily known or can be reasonably estimated (such as changes in the mortality of federal employees, federal salaries, and interest rates) when calculating FEGLI’s liability for current and future life insurance coverage. Because of this, FEGLI officials noted that they did not face significant challenges in estimating the program’s fiscal exposure. In contrast, exposures related to natural disasters are especially hard to estimate. According to NFIP officials, the extreme variability of flood losses is the single biggest challenge in estimating the program’s exposure. Similarly, officials from the Disaster Relief Fund said it is not possible to forecast catastrophic disasters because each is different. According to FEMA officials, the agency has begun working with catastrophe modeling firms and others in developing better estimates of loss exposures. While several components of the models are still in development, FEMA officials believe they show promise to be useful tools in the future. Agencies developed models to make estimates of fiscal exposures for several of the activities we reviewed, although the agencies noted that generating reasonably reliable estimates is difficult for a variety of reasons, such as the sufficiency of data on potential losses and the nature of the risks insured by the government. For example, PBGC developed the Pension Insurance Modeling System to help the agency better understand and quantify its long-term risk and exposure to loss under different economic conditions and policy alternatives. Agency officials stated that obtaining current, complete, comprehensive, and reliable data on the company pension plans likely to present claims was one of the most significant challenges in these estimates. FHA also uses economic assumptions and historical data to estimate and reestimate the net lifetime costs of the mortgages it insures. Agency officials noted that it is difficult to produce these estimates because risk can vary based on a variety of factors that are uncertain, volatile, or sensitive, such as the economy and housing market. In recognition of this difficulty, the Federal Credit Reform Act of 1990 provides permanent and indefinite budget authority for upward reestimates, so that FHA can receive additional funds when needed if reestimates increase subsidy costs. We previously recommended to Congress in 2007, and reiterated in 2013, that it consider requiring increased reporting of accrual-based cost information where appropriate alongside cash-based budget numbers for both existing and proposed activities—where accrual-based cost information includes significant future cash resource requirements not yet reflected in the primarily cash-based budget. From 2009 through 2014, several bills were introduced to budget for certain activities on an accrual basis, but none were signed into law. The Bipartisan Budget Act of 2018 created the Joint Select Committee on Budget and Appropriation Process Reform, but no bills were signed into law as a result. The committee was terminated by statute by December 2018. We continue to support this recommendation to improve budget recognition of these fiscal exposures, because, as shown, challenges remain in identifying and measuring fiscal exposures. The government undertakes a wide range of activities that create fiscal exposures by obligating the government to future spending or creating an expectation for such spending. The federal budget both allocates and controls resources, but does not provide complete information about some significant fiscal exposures. Failure to understand and address these exposures can have significant consequences. These fiscal exposures will require future federal spending and will absorb resources available for other activities. Not capturing the long-term costs of current decisions limits Congress’s ability to control federal fiscal exposures at the time decisions are made. Presenting accrual information alongside cash-based budget numbers, particularly in areas where it would enhance up-front control of budgetary resources, would be useful to policymakers when debating current activities and considering new legislation. We provided a draft of this report to OMB and Treasury. The agencies had no comments on the draft report but provided technical comments that we incorporated as appropriate. We sent relevant portions of the draft to the following agencies: Department of Agriculture’s RMA, Department of Homeland Security’s FEMA, Department of Housing and Urban Development’s FHA, Department of Transportation’s Federal Aviation Administration, FDIC, NCUA, OPM, and PBGC. All the agencies (except the Department of Transportation, Department of Housing and Urban Development, and Department of Agriculture) provided technical comments that we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, and the Director of OMB. This report will also be available at no charge on our website at http://www.gao.gov. Should you or your staff have questions concerning this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VII. In this report, we (1) identify federal insurance and other activities that transfer risk or losses to the federal government and, where possible, identify cost- and exposure-related information on these activities; and (2) use selected activities to illustrate some of the challenges that we identified in past reports with measuring and reporting fiscal exposures in budget documents. For this objective, we updated our 2005 catalog of federal insurance activities and used additional sources of information on federal activities to obtain cost- and exposure-related information and identify additional activities. To compile the 2005 catalog, we developed the following criteria for identifying federal insurance activities: (1) The federal government must accept the risk of financial loss in providing protection against specific types of losses, events, or conditions whose timing, magnitude, or duration, are uncertain or unknown; and (2) by accepting this insurance risk, the federal government must be obligated to pay compensation or provide benefits if the losses, events, or conditions occur. In addition, we verified that the activities we cataloged as federal insurance also were recognized lines of insurance in the private sector. We applied the criteria to the Appendix of the Budget of the United States Government (President’s Budget) for Fiscal Year 2005 to identify budget accounts that funded federal insurance activities per our criteria. In this report, we first developed our own criteria for activities that transfer risk or losses to the federal government using definitions of federal insurance from the Federal Accounting Standards Advisory Board’s (FASAB) Statement of Federal Financial Accounting Standards (SFFAS) 5: Accounting for Liabilities of the Federal Government and Statement of Federal Financial Accounting Standards SFFAS 51: Insurance Programs. Activities were assessed against the following two criteria: (1) a risk of financial loss or actual financial loss to a third party exists that stems from an adverse event; and (2) through the activity the federal government accepts some or all of the risk of financial loss or actual financial loss from the adverse event by indemnifying, guaranteeing, or providing benefits to the affected entity or beneficiary. We also reviewed our new criteria internally with input from GAO experts, including accountants, actuaries, and budget law experts. We then used the following sources to identify federal activities that met our criteria: (1) 2017 Financial Report of the United States Government (Financial Report) and underlying account-level data from the Government-wide Treasury Account Symbol Adjusted Trial Balance System (GTAS) of the Department of the Treasury (Treasury), (2) the Office of Management and Budget’s (OMB) President’s Budget; (3) OMB’s Catalog of Federal Domestic Assistance (CFDA) administered by the General Services Administration; and (4) the Code of Laws of the United States (U.S. Code). The resulting catalog is based solely on the criteria we developed for this report and the sources and methodology we used. Other criteria, sources, or methodologies might yield a list that differs from ours in both number and composition of activities. Because we use different criteria, sources, and methodologies, our results are not directly comparable to results in our 2005 catalog. First, we identified certain categories of federal activities that met our criteria using the note disclosures of the 2017 Financial Report: We identified the following federal insurance programs by analyzing the note disclosure on federal insurance and guarantee liabilities as well as our internal audit documents on that note disclosure for fiscal years 2014–2017: Federal Crop Insurance Program, National Flood Insurance Program (NFIP), Pension Benefit Guaranty Corporation’s (PBGC) single-employer and multiemployer pension insurance programs, Federal Deposit Insurance Corporation’s Deposit Insurance Fund, and National Credit Union Administration’s Share Insurance Fund. To find information on the programs, the role of the government in the administration of the programs, and cost- and exposure-related information on the programs, we analyzed GAO reports, individual agency annual, financial, or other reports, and reports from the Congressional Budget Office. We also identified the following categories of activities that met our criteria: federal loan guarantee programs, senior preferred stock purchase agreements with two government-sponsored enterprises— Fannie Mae and Freddie Mac; federal employee and veterans benefits excluding veterans’ burial and education benefits; and social insurance. We used GTAS to identify Treasury accounts for the federal loan guarantee and the federal employee and veterans benefit categories. We generally presented liabilities for these activities as available in the Financial Report and GTAS for fiscal year 2017. Second, we conducted searches of key words in the names of budget accounts reported in the Appendix of the President’s Budget using OMB’s MAX system. We analyzed the results and identified budget accounts that funded additional federal activities that met our criteria and reported budget obligation data for those accounts for fiscal year 2017. We also analyzed more than 2,200 federal activities in CFDA as of September 30, 2017. To do this, at least two analysts verified that a budget account or a CFDA program met or did not meet our criteria (with review from an additional analyst, if needed). We included a budget account or CFDA program in our catalog if all analysts reviewing the program agreed the account or program met our criteria. The additional federal activities we found through the President’s Budget and CFDA can be broadly categorized as providing compensation for property or financial losses— including losses resulting from adverse environmental or manmade events—or providing life, health, or disability benefits to nonfederal employees. We also crosschecked this list of federal activities with those we identified in our 2005 report. Lastly, we conducted a search of key words in the table of contents of the U.S. Code and found additional activities that provided compensation for property damage or financial loss and thus transferred risk or losses to the federal government. We conducted this search to identify potential federal activities that currently only exist in law but met our criteria. According to officials from OMB, activities may not appear in the President’s Budget for different reasons, including if the activities ended or expired or if they have no expected expenditures or proposed appropriations. In reviewing the U.S. Code, two analysts verified whether a search result represented a new federal activity that met our criteria. In addition, a senior attorney from our Office of General Counsel verified that the additional activities were accurately stated based on the language of the U.S. Code. We shared our catalog with and obtained expert opinion from officials from Treasury, OMB, the General Services Administration, the Congressional Budget Office, and FASAB, as well as from key GAO staff with relevant expertise (including accountants, actuaries, and experts on budget appropriation and other federal activities). We added an additional federal activity to our catalog that an outside expert brought to our attention and that we had not identified through the methodologies described above. To illustrate some of the challenges in measuring and reporting fiscal exposures that we identified in past reports, we reviewed prior reports on fiscal exposures, the federal budget, and accrual budgeting to identify key challenges relevant to insurance and other activities. We then selected six activities from those we identified for this report that illustrate these key challenges. We selected the (1) Disaster Relief Fund, (2) Federal Aviation Administration’s Commercial Space Launch Insurance Program, (3) Federal Employees’ Group Life Insurance program, (4) Federal Housing Administration’s Mutual Mortgage Insurance Fund, (5) NFIP, and (6) PBGC pension insurance programs. We reviewed the Financial Report and the President’s Budget for information and financial measures on these activities, such as receipts, outlays, and net position for NFIP and PBGC. We also reviewed the appropriation and supplemental appropriation laws for the Disaster Relief Fund from fiscal years 2005 through 2018. We analyzed the agencies’ financial and budget documents and conducted interviews with agency officials. We conducted this performance audit from October 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Federal Crop Insurance program is administered by the Risk Management Agency (RMA) of the Department of Agriculture. It helps farmers manage the risks inherent in farming by allowing them to insure against losses caused by poor crop yields, declines in prices, or both. Crop insurance premiums are subsidized in part to achieve high participation and coverage levels, which may reduce or eliminate the need for potentially costly disaster assistance payments from congressionally authorized ad hoc disaster programs. RMA partners with private insurers that sell and service policies. The program insures farmers against losses on more than 100 crops, which include corn, soybeans, wheat, cotton, and grain sorghum, as well as nursery crops and certain fruits and vegetables. In crop year 2018, RMA estimated it sold 1.1 million policies for a total of about $109.1 billion in insurance protection. The federal government subsidizes crop insurance policies by charging participating farmers less than the full amount of the policy premium. Congress sets the programs’ premium subsidy rates—the percentage of the premium paid by the government. RMA subsidized approximately 63 percent of total premiums in crop years 2017 and 2018 (or $6.36 billion and $6.27 billion, respectively), while farmers paid the remaining 37 percent. The federal government also reimburses participating private- sector insurance companies for administrative and operating expenses. The reimbursements are based on a percentage of crop insurance premiums and are intended to cover the companies’ expenses to sell and service policies, such as employee salaries; fees paid to insurance adjusters to verify claims; and sales commissions and other compensation (profit sharing) paid to the insurance agents who sell the crop insurance to farmers. The federal government is also the primary reinsurer for the private insurance companies that take on the risk of covering losses to insured farmers, allowing private insurers and the federal government to share in the risk of loss and opportunity for gain associated with the policies. The insurance companies retain part of the premiums and associated risk, and RMA holds the remaining premiums and risk. In addition, each company cedes to RMA a percentage of its underwriting gains or losses. The Federal Crop Insurance program is funded through mandatory spending authority, so that RMA receives a permanent indefinite appropriation each fiscal year for premium subsidy and other expenses and returns unobligated balances to the U.S. Treasury at the end of the fiscal year. According to RMA, the net cost of operations for the program was $5.5 billion and $6.8 billion for fiscal years 2018 and 2017, respectively (see table 8). Lastly, in April 2018, the Congressional Budget Office projected that federal crop insurance would cost the federal government an average of about $7.9 billion per year in 2018–2028. In 2017, we recommended that RMA and Congress consider improving the calculations related to the payments to and risk-sharing agreements with participating insurance companies to reduce year-to-year fluctuations in the subsidy costs of the program. In 2015, we also reported on the need for RMA to obtain more information on program costs and improve its premium setting calculations. We recommended that Congress consider reducing premium subsidies for the highest-income participants to reduce the cost of the program. As of December 31, 2018, these recommendations remained unaddressed. Administered by the Federal Emergency Management Agency (FEMA) of the Department of Homeland Security, the National Flood Insurance Program (NFIP) makes federally backed flood insurance available to residential property owners and businesses. By design, NFIP does not operate for profit. Instead, the program must meet a public policy goal—to provide flood insurance in flood-prone areas to property owners who otherwise would not be able to obtain it. Under NFIP, the federal government assumes the liability for the insurance coverage and sets rates and coverage limitations, while the private insurance industry sells the policies and administers the claims. As of September 30, 2018, NFIP provided about $1.3 trillion of insurance coverage on 5.1 million policies. NFIP generally is expected to cover its claim payments and operating expenses with the premiums it collects, but it has had to use its authority to borrow funds from the U.S. Treasury to cover large shortfalls. Since 2004, Congress increased NFIP’s initial borrowing limit from $1.5 billion to $30.4 billion, which was passed into law in 2013. Until 2004, NFIP was able to cover most claims with premiums it collected and occasional loans from the U.S. Treasury that it repaid. Cumulative debt increased substantially from 2005 to 2016 due to extraordinary catastrophic loss years resulting primarily from Hurricane Katrina and Superstorm Sandy. By September 2017, NFIP exhausted its borrowing authority following hurricane season, which prompted Congress to grant $16 billion in debt cancellation. NFIP then borrowed $6.1 billion to cover incurred and anticipated expenses for the 2018 hurricane season. As of September 30, 2018, NFIP had $20.5 billion of outstanding debt with the U.S. Treasury. According to FEMA, as currently designed, the program likely will not be able to repay this debt. According to FEMA, from October 1, 2017 through September 30, 2018, NFIP’s total expenses were more than $12 billion, which was more than twice its total revenue of $5.6 billion. In that time, NFIP collected $3.51 billion in premium revenues and $1.04 billion in reinsurance collections, but paid $9.21 billion in claims through the National Flood Insurance Fund. For fiscal year 2018, expenses also exceeded revenues by about $6.64 billion for the National Flood Insurance Reserve Fund. FEMA has produced estimates of its ability to pay claims and of annual maximum probable losses. FEMA calculated NFIP’s capacity to pay claims, which includes almost $10 billion in remaining borrowing authority from Treasury, at $15.82 billion as of September 30, 2018 (see table 9). Although FEMA entered into a reinsurance contract in 2018 for $1.5 billion, it projects it will not be able to cover potential future fiscal exposure from a single, low-probability, super-catastrophic event, which it estimates could cost as much as $40 billion in claims. In 2017, we again reported that NFIP premiums do not reflect the full risk of loss, which increases the federal fiscal exposure created by the program, obscures that exposure from Congress and taxpayers, contributes to policyholder misperception of flood risk (they may not fully understand the risk of flooding), and discourages private insurers from selling flood insurance (they cannot compete on rates). We concluded that eliminating rate discounts by requiring all rates to reflect the full risk of loss would help address these problems, but also would make policies less affordable and could reduce consumer participation. We stated that the decreases in affordability could be offset by other actions such as providing means-based assistance. We recommended that Congress consider comprehensive reform to improve NFIP's solvency and enhance the nation's resilience to flood risk. As of December 31, 2018, Congress still was considering various reforms as it worked to reauthorize the program. The Pension Benefit Guaranty Corporation (PBGC) is a wholly-owned government corporation established to insure the pension benefits of participants in and beneficiaries of private-sector defined benefit plans. The corporation operates a single-employer program and a multiemployer program. The single-employer program covers defined benefit pension plans that generally are sponsored by one employer. When an underfunded single-employer plan terminates, PBGC becomes the trustee and administers the plan. As of September 30, 2018, the single- employer program insured about 26 million people in approximately 23,400 plans and approximately 861,000 people were receiving benefits payments from PBGC. The multiemployer program insures plans arranged through collective bargaining between labor unions and employers, with two or more employers participating in a plan. PBGC provides financial assistance to multiemployer plans when they become insolvent. According to PBGC, as of September 30, 2018, the multiemployer program insured about 10.6 million people in approximately 1,400 plans and about 62,300 people were receiving benefits payments from plans receiving financial assistance from PBGC. Premium rates are set in law by Congress and plan sponsors or plans pay per-participant flat premiums under both programs. In addition, under the single-employer program, a plan sponsor or plan pays a variable-rate premium based on its plan underfunding. PBGC receives no funds from general tax revenue and assets from one program cannot be used to support the other, so both programs must pay claims primarily from nonfederal sources. The single-employer program had positive cash flow during fiscal year 2018 and both programs have been able to maintain enough assets to pay guaranteed benefits and financial assistance to date. But historically, PBGC’s statutory premium structure has not reflected significant risks PBGC insures against—for example, the risk that a single-employer plan sponsor becomes bankrupt, forcing the termination of an underfunded plan, or the risk that a multiemployer plan’s financial condition deteriorates, causing it to become insolvent—imposing claims on PBGC programs. As shown in table 10, PBGC’s multiemployer program had a negative net position (that is, total liabilities exceeded total assets) at the end of fiscal year 2018. The single-employer program reached a positive net position (for the first time since 2001) by the end of fiscal year 2018. PBGC projects a positive net position in 10 years for the single-employer program, but a negative net position for the multiemployer program (negative $68.9 billion by the end of fiscal year 2027), although there is inherent uncertainty around such a projection. PBGC’s forecasts for the following decade and beyond based on current economic conditions project a very high likelihood of insolvency for the multiemployer program before the end of fiscal year 2025 if there are no changes in law. In 2013, PBGC officials told us that once the multiemployer fund’s cash balance was depleted, the agency would have to rely solely on annual insurance premium receipts to pay financial assistance to plans. The precise effect that the insolvency of the multiemployer insurance fund would have on retirees receiving the PBGC guaranteed benefit would depend on a number of factors—primarily the number of guaranteed benefit recipients and PBGC’s annual premium income at that time. However, the impact likely would be severe. In 2012, we recommended that Congress consider redesigning PBGC’s premium structure to more fully reflect the risks posed by plans and sponsors to the agency and improve PBGC’s access to additional information needed to assess risk and assist in setting premiums. In 2013, we also recommended that Congress consider comprehensive and balanced structural reforms to reinforce and stabilize the multiemployer program. As of December 31, 2018, Congress had yet to authorize a redesign of PBGC's premium structure. However, in December 2014, Congress enacted the Multiemployer Pension Reform Act of 2014, which substantially established in law certain key structural reforms to the multiemployer system, including allowing severely distressed multiemployer plans to reduce accrued pension benefits; expanding PBGC’s ability to assist financially distressed plans; and raising multiemployer insurance premiums to provide PBGC with additional resources. The Federal Deposit Insurance Corporation (FDIC) insures the deposits of commercial banks and savings associations up to the statutory limit of $250,000. According to FDIC, as of September 30, 2018, there were 5,486 insured depository institutions with total insured deposits of $7.4 trillion. FDIC administers the federal deposit insurance program through its management of the Deposit Insurance Fund (DIF), which has two primary purposes: (1) to insure the deposits and protect the depositors of insured banks and (2) to resolve failed banks. FDIC manages the DIF by determining the size of the fund and of the DIF reserve ratio (the ratio of the fund balance to estimated insured deposits). The DIF is funded mainly through quarterly risk-based assessments on insured depository institutions, and it also earns interest income on its securities. The DIF is reduced by the amount of losses and expenses associated with failed banks and by FDIC operating expenses. The financial strength of the DIF can be gauged by comparing the fund’s actual reserve ratio to the minimum reserve ratio, and by measuring its progress to the designated, or desired, reserve ratio. Section 334 of the Dodd-Frank Wall Street Reform and Consumer Protection Act increased the minimum reserve ratio from 1.15 percent to 1.35 percent and required that the reserve ratio reach that level by September 30, 2020. To meet these requirements, large banks paid temporary surcharges from the third quarter of 2016 through the third quarter of 2018. In addition, under the long-term DIF management plan, the FDIC Board of Directors set the designated reserve ratio at 2.0 percent, with the goal of helping FDIC maintain a stable insurance assessment rate and sustain a positive DIF balance even during a serious economic downturn. In November 2018, FDIC announced that the DIF reserve ratio had reached 1.36 percent (as of September 30, 2018), exceeding the statutorily required minimum reserve ratio of 1.35 percent ahead of the statutory deadline (September 30, 2020). Obligations of FDIC are backed by the full faith and credit of the U.S. government. In addition, FDIC is authorized to borrow up to $100 billion from the U.S. Treasury and issue and sell up to $100 billion in obligations to the Federal Financing Bank (see table 11). A statutory formula, known as the maximum obligation limitation, limits the amount of obligations the DIF can incur to the sum of its cash, 90 percent of the fair market value of other assets, and the amount authorized to be borrowed from the U.S. Treasury. The maximum obligation limitation for the DIF was $191.5 billion as of December 31, 2017. FDIC did not use its authority to borrow funds from the U.S. Treasury when the DIF was depleted and fell to negative $20.9 billion, its lowest point in history, as a result of the 2007–2009 financial crisis. Instead, FDIC first replenished the DIF through increased assessments and a one- time special assessment. These actions were taken pursuant to a restoration plan established to replenish the DIF and raise the reserve ratio to its designated minimum within the time limits prescribed by the Federal Deposit Insurance Act. Finally, FDIC was able to improve the liquidity of the DIF by requiring the banking industry to prepay its quarterly risk-based assessments for the fourth quarter of 2009 and for the next 3 years. The National Credit Union Administration (NCUA) administers the National Credit Union Share Insurance Fund and provides up to $250,000 of insurance per depositor. According to NCUA, by the end of calendar year 2017, the Share Insurance Fund insured the deposits of more than 111 million members in 5,573 credit unions with $1.38 trillion in assets, and the fund insured $1.1 trillion of member shares, or dollars deposited. The Share Insurance Fund is primarily funded by contributions of 1 percent of the insured shares or deposits from each member credit union. Other sources of income include premiums, when assessed as explained below, and investment income. The financial performance of the Share Insurance Fund can be measured by comparing the equity ratio to the normal operating level (or desired equity ratio). The equity ratio is the total of credit unions’ contributions to the fund, less any gain or loss on investments, plus accumulated retained earnings, divided by total insured shares. By law, the equity ratio of the Share Insurance Fund cannot decline below 1.20 percent and may not exceed 1.50 percent. If NCUA expects the equity ratio to fall below this threshold, it must establish and implement a restoration plan to rebuild the equity ratio, which must include a premium assessment to each insured credit union. The reported equity ratio at the end of 2017 was 1.46 percent, which is above the normal operating level, set at 1.39 percent as of 2017. According to NCUA, a normal operating level of 1.39 percent was set with the goal of ensuring that the Share Insurance Fund could withstand a moderate recession without the equity ratio declining below 1.20 percent over a 5- year period. The Share Insurance Fund is backed by the full faith and credit of the U.S. government and, according to NCUA, has $6.0 billion in borrowing authority from the U.S. Treasury, all of which was available as of December 31, 2017. The fund also has the ability to borrow from the NCUA’s Central Liquidity Facility up to the amount of the liquidity facility’s unused borrowing authority, which was $6.6 billion as of December 31, 2017. As of December 31, 2017, the Share Insurance Fund had $12.6 billion in total available borrowing capacity, which is the combination of the borrowing authority from the U.S. Treasury and the liquidity facility (see table 12). The recent equity ratio contrasts with low points reached during and after the 2007–2009 financial crisis. NCUA had to take a number of steps to stabilize credit unions, stemming primarily from the failure of five large corporate credit unions. NCUA established the Temporary Corporate Credit Union Stabilization Fund, which replaced the Share Insurance Fund as the primary source to absorb the corporates’ losses. Congress increased NCUA’s borrowing authority with the U.S. Treasury up to $6 billion through a revolving loan fund to be shared between the Stabilization Fund and Share Insurance Fund. The Stabilization Fund borrowed and repaid a total of $11.2 billion from the U.S. Treasury from its inception in 2009 through its closure in October 1, 2017. The highest amount of total borrowing outstanding was $5.1 billion in October 2012. However, the Share Insurance Fund’s equity ratio fell below 1.20 percent in both 2009 and 2010, and two premiums totaling $1.7 billion were necessary to restore the equity ratio. NCUA stated that without the premiums the equity ratio would have fallen to 1.07 percent. Federal loan guarantees are any guarantees, insurance, or other pledges with respect to the payment of all or a part of the principal or interest on any debt obligation of a nonfederal borrower to a nonfederal lender. Thus, the federal guarantee transfers some or all of the risks of borrower default from private lenders to the federal government. Table 13 lists the 33 federal guaranteed loan activities that presented liabilities to the federal government as of September 30, 2017. Table 14 lists 13 large federal employee and veterans benefit activities— such as pension, health, life, and disability benefits—that transfer risk or losses to the federal government. Each of the activities listed represented $10 billion or more in benefit liabilities payable for the fiscal year ending September 30, 2017. Combined, the activities accounted for 99 percent of the total federal employee and veterans benefit liabilities of $7.7 trillion. Tables 15, 16, and 17 list a total of 95 federal activities that met our criteria of transferring risk or losses from adverse events from third parties to the federal government and that we found in the Budget of the United States Government (President’s Budget), the Catalog of Federal Domestic Assistance (CFDA), or the Code of Laws of the United States (U.S. Code). These activities can be broadly categorized into activities that, at least in part, provide compensation for property or financial losses—including losses resulting from adverse environmental or manmade events—and activities that offer life, health, or disability benefits to nonfederal employees. Table 15 has information on 39 budget accounts from the President’s Budget, generally organized by amount of obligations for fiscal year 2017. While budget obligations create a legal liability for the federal government, they may not necessarily reflect an activity’s fiscal exposure if, for example, the activity has dedicated payment streams. Table 16 has information on an additional 51 activities found through our sources that met our criteria. Table 17 has information on five activities authorized in law that had not triggered losses to the federal government as of December 31, 2018. With the exception of the Terrorism Risk Insurance Program, we identified these programs through an analysis of the U.S. Code, since the programs have not had liabilities or appropriations and could not be found in the Financial Report or the President’s Budget. We were able to find some financial and budgetary information on the Terrorism Risk Insurance Program because administrative expenses and potential projected payments under the program are identified in the President’s Budget on an annual basis. Federal social insurance programs are Social Security, Medicare (Parts A, B, and D), Railroad Retirement, and Black Lung. These programs provide eligible individuals with benefits, such as health insurance, disability, and retirement benefits, thus transferring risk to the federal government. Fiscal exposures from the four programs are discussed annually in the Statement of Social Insurance (SOSI) in the Financial Reports of the United States Government. Specifically, the SOSI details the present value of the estimated future revenues and expenditures for scheduled benefits over the next 75 years. The amounts in the SOSI and presented below are not considered liabilities in an accounting context. Future benefit payments will be recognized in the Financial Report as expenses and liabilities as they are incurred based on the continuation of the social insurance programs' provisions contained in current law. While future social insurance benefit payments that are not due and payable are not treated explicitly as legal liabilities to the federal government, the SOSI’s forward-looking projections are intended to help citizens understand the long-term sustainability of these programs and the fiscal exposures they present. The social insurance programs are mainly funded by taxes and premiums. Contributions and dedicated taxes consist of: payroll taxes from employers, employees, and self-employed persons; revenue from federal income taxation of Old-Age Survivors and Disability Insurance (OASDI) and railroad retirement benefits; excise tax on the domestic sale of coal; premiums from, and state transfers on behalf of, participants in Medicare; and reimbursements from the General Fund to the OASDI and Medicare Trust Funds. The social insurance trust funds account for all related program income and expenses, and have automatic funding authority to pay future benefits to the extent that funds are available. Taxes, premiums, and other income are credited to the funds, while benefit payments and program administrative costs are paid from the funds. However, as of January 1, 2017, based on information from the SOSI , the present value of federal expenditures for social insurance programs over 75 years was projected to exceed program revenues by about $19.0 trillion (see table 18). This represents about 1.5 percent of the present value of the gross domestic product over 75 years. To illustrate the sustainability of current benefits, the Social Security and Medicare Part A SOSI projections assume that scheduled social insurance benefit payments would continue after related trust funds are projected to be depleted, contrary to current law. The projections for Medicare Parts B and D for fiscal year 2017 include $30 trillion in transfers of general revenues that, under current law, are used to finance the remainder of the expenditures in excess of revenues. We have reported that there are significant uncertainties related to the achievement of projected reductions in Medicare cost growth assumed in the SOSI projections that have prevented us from expressing an opinion on the sustainability of the financial statements in the Financial Report. We previously reported on the fiscal problems presented by these programs, in particular Social Security and Medicare. The Social Security and Medicare programs are projected to face financial challenges. In June 2018, we noted that fiscal spending increases in 2017 were driven by Social Security, Medicare, Medicaid, and interest on debt held by the public. The spending increases were largely a result of the aging of the population and increasing health care costs rather than legislative changes to these programs. Spending on Social Security and these health programs is expected to continue to increase because of long- standing demographic and economic trends. The 2017 Financial Report of the United States Government, Congressional Budget Office, and our projections all show that, absent policy changes, the federal government’s fiscal path is unsustainable and that the ratio of debt to the gross domestic product would surpass its historical high of 106 percent within 14–22 years. All the projections also note that the longer action is delayed, the greater and more drastic changes will have to be. Alicia Puente Cackley, (202) 512-8678 or cackleya@gao.gov. In addition to the contact name above, Patrick Ward (Assistant Director), Silvia Arbelaez-Ellis (Analyst in Charge), Katherine Carter, Robert F. Dacey (Chief Accountant), Rachel DeMarcus (Assistant General Counsel), Jill Lacey, Janice Latimer (Assistant Director, Strategic Issues), Scott McNulty, Marc W. Molino, Angela Pun, Barbara Roesmann, Jessica Sandler, Dawn Simpson (Director, Financial Management and Assurance), and Frank Todisco (Chief Actuary) made significant contributions to this report.", "summary": "The federal government conducts many activities that protect parties from the effects of adverse events—for instance, by providing flood insurance, guaranteeing mortgage loans, or making payments to beneficiaries of deceased military personnel. Identifying these activities and understanding the fiscal exposures they create can be a challenge, making it difficult for Congress to oversee them through the budget and appropriation processes. GAO was asked to update information on federal insurance activities it created in 2005 ( GAO-05-265R ) and identify opportunities for improving budgeting for such activities. This report (1) identifies and provides cost- and exposure-related information on federal activities that transfer risk or losses to the government, and (2) illustrates challenges GAO identified in past reports with measuring and reporting fiscal exposures in budget documents. GAO primarily reviewed government-wide financial and budget data, the Catalog of Federal Domestic Assistance, and the U.S. Code. GAO also drew on previous work, conducted interviews with the Office of Management and Budget, Department of the Treasury, and other agencies, and reviewed agency financial and budget documents. Through analysis of sources containing government-wide information on federal activities, GAO identified 148 federal insurance and other activities that transfer risk or losses from adverse events to the government (see fig.). Unlike private insurance, the activities do not necessarily have a contract or charge premiums or fees in exchange for assuming risk. Even when premiums or fees exist they may not cover all costs, as federal expenditures can be driven by policy goals or agency missions rather than the aim of fiscal solvency. GAO generally was able to provide financial or budget information for the activities. Source: GAO . | GAO-19-353 Note: GAO's results are based solely on the criteria GAO developed for this report and the sources and methodology it used. Other criteria, sources, or methodologies might yield lists that differ from GAO's in number and composition of activities. a GAO identified 13 Treasury accounts that accounted for 99 percent of all federal employee and veterans benefits liabilities to the federal government as of September 30, 2017. These include accounts that fund retirement benefits, disability insurance, health insurance, and life insurance programs for civilian and military employees. The government's primarily cash-based budget generally does not record the full cost of commitments incurred until corresponding payments are made in the future. Therefore, the budget may not accurately reflect federal costs or the likely claim on federal resources for such activities. For some claims, such as pension and life insurance, the federal commitment occurs years before payments are reflected in the budget. Additionally, payments the government may be expected to make based on policies or past practices (but is not legally required to make) may not be evident in the budget. For example, the Commercial Space Launch Insurance Program created a potential liability to the government of up to $3.1 billion per licensed space launch in 2017 but never has been included in the budget. GAO previously recommended ( GAO-08-206 , and reiterated in GAO-14-28 ) that Congress consider expanding the use of accrual-based information in the budget documents submitted to Congress. However, this recommendation has not been implemented. Accrual measurement would provide enhanced control over future spending by recognizing long-term costs when decisions are made. This analysis provides additional support for GAO's 2007 recommendation that Congress consider improving recognition of fiscal exposures in budget documents such as by expanding use of information on expected future spending arising from present-day commitments.", "document_type": "gao"}
{"report": "Title VII of the Civil Rights Act of 1964 and Section 501 of the Rehabilitation Act of 1973 mandate that all federal personnel decisions be made without discrimination on the basis of race, color, religion, sex, national origin, or disability and require that agencies establish a program of equal employment opportunity for all federal employees and applicants. EEOC has oversight responsibility for federal agencies’ compliance with EEOC regulations, which direct agencies to maintain a continuing affirmative program to promote equal opportunity and to identify and eliminate discriminatory practices and policies. In order to implement the programs described above, each federal agency is required to designate an EEO director. The EEO director’s responsibilities include, among others, providing for counseling of aggrieved individuals, providing for the receipt and processing of individual and class complaints of discrimination, and advising agency leadership regarding equal employment opportunity matters. EEOC calls for federal agencies to conduct a continuing campaign to eradicate every form of prejudice or discrimination from the agency’s personnel policies, practices, and working conditions. EEOC’s Management Directive 715 (MD-715) calls for agencies to take appropriate steps to ensure that all employment decisions are free from discrimination and provides policy guidance and standards for establishing and maintaining effective affirmative programs of equal employment opportunity. The directive also sets forth the standards by which EEOC will review the sufficiency of agencies’ Title VII and Rehabilitation Act programs, including periodic agency self-assessments and the removal of barriers to free and open workplace competition. MD- 715 guidance further requires agencies to report annually on the status of activities undertaken pursuant to their equal employment opportunity programs and activities. Federal agencies are required to submit an annual MD-715 report to EEOC on the status of their EEO programs. In addition to including employee demographic data, among other things, the MD-715 reports are to include an agency self-assessment checklist, plans to correct any program deficiencies, and a description of any barrier analysis conducted and any plans to eliminate identified barriers. As part of a model EEO program to prevent unlawful discrimination, federal agencies are to regularly evaluate their employment practices to identify barriers to EEO in the workplace, take measures to eliminate identified barriers, and report annually on these efforts to EEOC, according to MD-715. EEOC’s MD-715 defines a barrier as an agency policy, procedure, practice, or condition that limits, or tends to limit, employment opportunities for members of a particular gender, race, or ethnic background or for individuals on the basis of disability status. According to EEOC’s MD-715 instructions, many employment barriers are built into the organizational and operational structures of an agency and are embedded in the agency’s day-to-day procedures and practices. USAID’s Office of Civil Rights and Diversity (OCRD) administers programs intended to promote equal opportunity, foster diversity at all levels and occupations, and sustain an inclusive workforce. According to USAID, OCRD strives to maintain a model EEO program. As table 1 shows, OCRD consists of the Complaints and Resolution Division, the Reasonable Accommodations Division, the Diversity and Inclusion Division, and the Program Operations Division. OCRD collaborates with the Office of Human Capital and Talent Management (HCTM) to develop and implement recruitment strategies intended to support a diverse and well-qualified workforce; consults with agency officials such as the Executive Diversity Council; partners with USAID employee resource groups to extend outreach opportunities and develop strategies of inclusion within USAID; and addresses allegations of discrimination, harassment, or retaliation. According to a June 2019 testimony by USAID’s Chief Human Capital Officer, OCRD collaborates with HCTM on the following recruitment programs intended to increase diversity: Donald Payne International Development Fellowship. Launched in 2012, the Donald Payne International Development Fellowship targets underrepresented groups in USAID’s Foreign Service. According to USAID officials, the purpose of the Payne Fellowship is to enhance diversity in the Foreign Service through outreach and strategic efforts focused on minority serving institutions. USAID provides support for selected candidates for 2 years of graduate school as well as an internship on Capitol Hill and another at a USAID mission overseas. On completion of the graduate program and internships, the selected candidate is appointed as a Foreign Service officer with a 5-year service agreement. According to USAID, each year the Payne Fellowship supports 10 fellows entering USAID’s Foreign Service. Development Diplomats in Residence. Established in 2016, the Development Diplomats in Residence program aims to educate, recruit, and channel talent to USAID by placing senior USAID officials at universities. These officials provide guidance and advice on careers, internships, and fellowships to students, professionals, and faculty members at minority-serving institutions. Two USAID career Senior Foreign Service officers serve in this role at California State University, Long Beach, and at Morehouse College, respectively. Pathways Internship Program. The Pathways Internship Program provides targeted diversity recruitment, salaries, and payments for Pathways Interns, according to the USAID Chief Human Capital Officer’s June 2019 testimony. The testimony states that the overall racial or ethnic minority representation rate in fiscal year 2018 for the Pathways Internship Program was 69 percent and that Hispanics, at 31 percent, represented the largest minority demographic. USAID officials said that the agency views its internship programs as a succession-planning tool designed to convert as many internships as possible into full-time positions. According to USAID, the agency had no Pathways Interns in 2019, as a result of funding limitations, but as of April 2020 was planning 21 internships for 2020. USAID provides training as well as a formal mentoring program intended to support diversity and inclusion, according to USAID officials. OCRD is responsible for providing mandatory agency-wide training on diversity awareness and equal opportunity. USAID officials stated that the agency has mandatory and nonmandatory training on diversity and inclusion issues. For example, USAID provides online mandatory training classes on the No FEAR Act and sexual harassment. According to USAID data, 326 people took versions of these courses in 2019. USAID also offers nonmandatory in-person classes such as EEO counselor training and unconscious bias training. In 2019, 17 people took EEO counselor training, and 36 people took USAID’s in-person unconscious bias training. Additionally, USAID officials said that external partners of USAID have developed training related to diversity and inclusion, to which OCRD refers employees on request. According to USAID, the agency’s mentoring programs build on informal mentoring efforts and support strategic human capital initiatives for recruitment and retention, employee development, succession planning, and diversity. USAID officials stated that the mentoring program includes a facilitated process for matching mentors and mentees, formal mentoring training, an established tracking system, and goals used to measure success. According to the officials, the mentoring program is open to all employees. USAID reported to Congress on its workforce categories in 2018. USAID defines its core workforce as those who have an employer– employee relationship with the agency. This includes the following employment categories: Civil Service employees. USAID’s Civil Service employees are U.S. U.S. Personal Services Contractors U.S. personal services contractors represent a significant and growing proportion of USAID’s workforce whose demographic composition is not included in USAID’s Management Directive 715 reports. As we reported in 2017, USAID uses personal services contractors for a broader range of functions than other agencies, as its regulations permit (see GAO-17-610). Those regulations provide that personal services contractors who are U.S. citizens may be delegated or assigned any authority, duty, or responsibility that direct-hire government employees might have, although they generally cannot supervise direct-hire government employees or sign obligating documents except when specifically designated as a contracting officer. Until recently, when looking to fill a vacancy through outside hiring or by promotions and reassignments, USAID bureaus and offices had to submit that action to USAID’s Hiring and Reassignment Review Board for review. The board’s guidelines exempted personal services contracts from review and approval. In April 2020, USAID officials told us that hiring decisions no longer required the board’s approval. From June 2016 to September 2018, U.S. personal services contractors were USAID’s fastest growing workforce category, increasing from 759 to 1,015 according to USAID’s staffing reports to Congress. During this period, USAID’s Civil and Foreign Service employees decreased from 3,548 to 3,002. contractors are non–direct hire U.S. citizens on contract for the specific services of those individuals. As we reported in 2017, USAID uses personal services contracts for a broad range of functions, such as program management, security analysis, and logistics. According to its staffing report to Congress, USAID had 1,015 U.S. personal services contractors at the end of fiscal year 2018. Foreign nationals. USAID’s foreign national employees are non–U.S. citizens who are locally employed at posts abroad. They may be direct hires or personal services contractors. USAID uses foreign nationals to manage mission operations and oversee development activities. According to its staffing report to Congress, USAID had 4,712 foreign national employees at the end of fiscal year 2018. While USAID collects demographic data on U.S. personal services contractors for its payroll processor, it does not analyze this information. USAID does not report these data, because USAID does not regard personal services contractors as U.S. government employees. USAID officials noted that current reporting requirements call only for demographics of direct-hire employees, which excludes a considerable portion of the agency’s workforce. Other categories of staff not directly employed by USAID, including institutional support contractors and staff detailed from other organizations and U.S. government agencies, also perform a wide range of services in support of the agency’s programs. According to its staffing report to Congress, USAID had 1,681 institutional support contractors at the end of fiscal year 2018. EEOC has determined that contractors are a vulnerable group because of confusion as to where such personnel should seek redress for EEO matters. However, according to OCRD officials, OCRD is responsible for EEO matters for both direct and non– direct hires, including contractors. Figure 1 shows the total number of staff in each of USAID’s workforce categories in fiscal year 2018. In fiscal year 2018, USAID had 2,964 full-time, permanent, career employees (i.e., direct-hire U.S.-citizens) in its Civil and Foreign Services, according to National Finance Center data. This number reflects an increase of more than 54 percent from fiscal year 2002. Figure 2 shows the numbers of full-time, permanent, career employees in USAID’s Civil and Foreign Services in fiscal years 2002 through 2018. USAID’s Civil Service made up 44 percent of the agency’s full-time, permanent, career workforce in fiscal year 2018. Civil Service employees are ranked in the GS classification system from GS-1 (lowest) to GS-15 (highest), followed by the executive rank. Civil Service promotions are filled through competitive procedures and noncompetitive career-ladder positions. To be eligible for a promotion, Civil Service candidates must meet minimum qualification standards such as fulfilling time-in-grade requirements and receiving sufficiently positive ratings on their most recent performance appraisals. For competitive promotion positions, USAID uses an automated system to evaluate and rate all eligible candidates and develop referral lists of employees eligible for the promotions. Officials interview all direct-hire USAID employees from the promotion referral lists and select employees for promotion on the basis of the announcement. Career-ladder positions are intended to prepare employees for successive, noncompetitive promotions up to the full performance of the positions. For career-ladder positions, USAID officials select employees for noncompetitive promotions and are responsible for developing individual learning and training plans, offering developmental work, and providing feedback regarding employees’ performance. Each year, USAID promotes varying numbers of Civil Service employees. Promotion generally becomes more competitive for higher ranks. For example, in fiscal year 2018, 45.3 percent of employees ranked GS-11 in fiscal year 2017 were promoted to GS-12, while 1.0 percent of employees ranked GS-15 in fiscal year 2017 were promoted to the executive rank. Table 2 shows the number and percentage of employees in each Civil Service rank as well as the rate of promotion from each GS level for promotions effective in fiscal year 2018. Foreign Service employees made up 56 percent of USAID’s full-time, permanent, career workforce in fiscal year 2018. Foreign Service officers enter at Class 4, 5, or 6, depending on their education and experience. Officers can be promoted from each level up to Class 1, after which they can apply for the executive rank. Foreign Service promotions are based on employee eligibility, a rank- ordered list prepared by a performance board, and the number of promotions authorized by USAID management. To be promoted to the next class, Foreign Service employees must meet eligibility requirements, such as time in their current class and overseas experience. Each year, performance boards evaluate the performance of eligible employees in Class 4 and higher, develop a rank-ordered list of employees recommended for promotion, and submit the list to HCTM. According to USAID policy, performance boards primarily consist of Foreign Service employees and, to the extent possible, include members of groups that are underrepresented in the service. The Chief Human Capital Officer, the Director of OCRD, and a representative of the American Foreign Service Association review the list before finalizing promotion decisions. USAID promotes varying numbers of its Foreign Service employees each year. Promotion generally becomes more competitive for higher ranks. For example, in fiscal year 2018, 33.2 percent of employees ranked Class 4 in fiscal year 2017 were promoted to Class 3, while 3.9 percent of employees ranked Class 1 in fiscal year 2017 were promoted to the executive rank. Table 3 shows the number and percentage of employees in each Foreign Service rank in fiscal year 2018 as well as the rate of promotion from each rank for promotions effective in that fiscal year. According to USAID’s Chief Human Capital Officer, USAID established the Hiring and Reassignment Review Board (HRRB) in July 2017 as a mechanism to allow USAID to prioritize positions during the government- wide hiring freeze and a subsequent period when all USAID external hires required approval from the Secretary of State. In fiscal years 2017 through 2019, the HRRB met regularly and was responsible for prioritizing U.S. direct-hire positions, monitoring attrition levels, and identifying gaps in national security and other key positions. According to June 2019 guidelines, the HRRB was required to review certain hiring and reassignment actions. Such actions included filling vacancies externally by hiring individuals from outside the agency, using operating expense funding, and filling vacancies internally by reassigning operating expense–funded Civil Service staff between the bureaus and independent offices. Hiring and reassignment actions exempted from HRRB review included, among others, hiring to compensate for attrition in certain defined high-risk mission-critical occupations, hiring into program- funded positions, Foreign Service limited appointments, personal services contracts, and institutional support contracts. According to USAID’s strategic workforce plan for fiscal years 2019 through 2021, USAID planned to have the HRRB, the Office of the Administrator, HCTM, and the Bureau for Management set broader staffing levels for the agency’s bureaus and independent offices beginning by the first quarter of fiscal year 2020. The workforce plan also states that a renamed HRRB would shift to serving as a strategic human capital governance board rather than performing position-by- position reviews. In April 2020, USAID officials told us that hiring decisions no longer required HRRB approval. From fiscal year 2002 to fiscal year 2018, the proportion of racial or ethnic minorities among USAID’s full-time, permanent, career employees increased from 33 percent to 37 percent, as figure 3 shows. This increase in the proportion of racial or ethnic minorities at USAID overall was driven by an increase in the proportion of racial or ethnic minorities in the Foreign Service. During this period, the proportion of racial or ethnic minorities in the Civil Service decreased slightly, from 49 to 48 percent and the proportion of racial or ethnic minorities in the Foreign Service increased from 18 to 27 percent. We compared the proportions of racial or ethnic minorities in USAID’s workforce with those in the federal workforce and relevant civilian labor force. Our comparison of USAID workforce data for fiscal year 2018 with federal workforce data for fiscal year 2017—the most recent available— found that the proportion of racial or ethnic minorities was 37 percent both at USAID and in the federal workforce. For more details, see appendix III. The proportion of racial or ethnic minorities at USAID increased from 33 percent in fiscal year 2002 to 37 percent in fiscal year 2018. In comparison, the proportion of racial or ethnic minorities in the federal workforce increased from 31 percent in fiscal year 2002 to 37 percent in fiscal year 2017. Our comparison of USAID workforce data from fiscal year 2018 with data for the relevant civilian labor force from 2006 through 2010 (the most recent available data) found larger proportions of racial or ethnic minorities at USAID than in the relevant civilian labor force for three occupational groups: (1) officials and managers, (2) professional workers, and (3) technical workers and technologists. For more details, see appendix III. Although the overall proportion of racial or ethnic minorities at USAID increased from fiscal year 2002 to fiscal year 2018, the direction of change for specific racial or ethnic minority groups varied—the proportions of Hispanics, Asians, and other racial or ethnic minorities rose, while the proportion of African Americans fell. As figure 3 shows, from fiscal year 2002 to fiscal year 2018, the proportion of Hispanics at USAID rose from 3 to 6 percent; Asians, from 4 to 7 percent; and other racial or ethnic minorities, from 1 to 2 percent of USAID employees. In contrast, during the same period the proportion of African Americans fell from 26 to 21 percent of the agency’s employees. Our analysis found that the overall decline in the proportion of African Americans at USAID reflected a substantial decline in the proportion of African Americans in USAID’s Civil Service. The proportion of African Americans in USAID’s Civil Service decreased from 42 percent in fiscal year 2002 to 32 percent in fiscal year 2018. The proportion of African Americans in USAID’s Foreign Service increased from 11 percent to 12 percent over the same period. In contrast to the proportion of African Americans, the proportions of Hispanics, Asians, and other racial or ethnic minorities at USAID increased in both the Civil and Foreign Services from fiscal year 2002 to fiscal year 2018. Our analysis of USAID data for fiscal year 2018 found that the proportions of racial or ethnic minority employees generally decreased as rank increased. As figure 4 shows, the proportions of racial or ethnic minorities in the Civil Service in fiscal year 2018 were progressively smaller in each rank above GS-12, except at the executive rank, where the proportion of racial or ethnic minorities was larger than in GS-15. Specifically, the proportions of racial or ethnic minorities decreased from 77 percent in GS-12 to 31 percent in GS-15. Our analysis similarly found that, in general, the proportions of racial or ethnic minorities in the Foreign Service in fiscal year 2018 were progressively smaller in all ranks above Class 6. In fiscal year 2002, the proportion of racial or ethnic minorities was also generally smaller at higher ranks in both the Civil and Foreign Services. From fiscal year 2002 to fiscal year 2018, the proportion of women at USAID increased from 51 to 54 percent, as figure 5 shows. Our analysis found that the overall increase in the proportion of women at USAID reflected a growth in the proportion of women in the Foreign Service. Specifically: The proportion of women in the Civil Service decreased from 66 percent in fiscal year 2002 to 61 percent in fiscal year 2018. The proportion of women in the Foreign Service increased from 38 percent in fiscal year 2002 to 49 percent in fiscal year 2018. We compared the proportion of women at USAID with the proportions of women in the federal workforce and relevant civilian labor force. Our comparison of USAID workforce data for fiscal year 2018 with federal government workforce data for 2017 found the following: The proportion of women at USAID in fiscal year 2018 (54 percent) was higher than the proportion of women in the federal workforce in fiscal year 2017 (43 percent). The proportion of women at USAID increased from 51 percent in fiscal year 2002 to 54 percent in fiscal year 2018. In contrast, the proportion of women in the federal workforce decreased slightly, from 44 percent in fiscal year 2002 to 43 percent in fiscal year 2017. Our comparison of USAID workforce data for fiscal year 2018 with data from the relevant civilian labor force for 2006 through 2010 (the most recent available data) found that the proportions of women were higher at USAID than in the relevant civilian labor force for two occupational groups—(1) officials and managers and (2) technical workers and technologists. However, the proportion of women was lower at USAID than in the relevant civilian labor force for professional workers. For more details, see appendix III. As figure 6 shows, our analysis of USAID data for fiscal year 2018 for the Civil Service found progressively smaller proportions of women in each rank above GS-11. The proportions of women ranged from 75 percent in GS-11 or lower ranks to 43 percent in the executive rank. Additionally, data for fiscal year 2018 for the Foreign Service show overall smaller proportions of women in the higher ranks. Specifically, women made up 55 percent of employees in Class 4 or lower ranks but 48 percent of Foreign Service executives. In fiscal year 2002, the proportion of women was also generally smaller in higher ranks in both the Civil and Foreign Services. Our analyses of USAID data on promotions in fiscal years 2002 through 2017 found lower promotion outcomes for racial or ethnic minorities than for whites in early to mid career. We found these differences when conducting descriptive analyses, which calculated simple average promotion rates, as well as adjusted analyses, which controlled for certain individual and occupational factors other than racial or ethnic minority status that could influence promotion. Promotion rates were generally lower for racial or ethnic minorities than for whites in both the Civil and Foreign Services, although the differences shown by our adjusted analyses were generally statistically significant only in the Civil Service. However, our analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, our analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. Both our descriptive analysis and adjusted analysis of data for USAID’s Civil Service found that promotion rates were lower for racial or ethnic minorities than for whites in early to mid career, as table 4 shows. In addition, our adjusted analysis found that racial or ethnic minorities in USAID’s Civil Service had lower odds of promotion than their white counterparts. As table 4 shows, our descriptive analysis of the data for USAID’s Civil Service found that the average percentage of racial or ethnic minorities promoted from ranks GS-11 through GS-14 was lower than the average percentage of whites promoted from the same ranks. For example, our descriptive analysis found that in fiscal years 2002 through 2017, an average of 38.9 percent of racial or ethnic minorities were promoted from GS-11 to GS-12, compared with an average of 69.9 percent of whites. This difference of 31.0 percentage points indicates that the average rate of promotion from GS-11 to GS-12 was 44.4 percent lower for racial or ethnic minorities than for whites. In addition, our analysis of yearly promotion rates in the Civil Service for fiscal years 2013 through 2017 showed that the rate of promotion from GS-11 and higher ranks was greater for whites than for racial or ethnic minorities for every rank and year, except for promotions from GS-15 to the executive class in fiscal years 2013, 2014, and 2016. However, our descriptive analysis does not account for the variety of factors besides racial or ethnic minority status, such as occupation, that may affect promotion rates. Our adjusted analysis of the data for USAID’s Civil Service, controlling for certain factors other than racial or ethnic minority status that could influence promotion, found that racial or ethnic minorities had lower adjusted rates and lower odds of promotion from each rank from GS-11 through GS-14 than their white counterparts. Specifically, our adjusted analysis of USAID data on promotions in fiscal years 2002 through 2017 found the following: The average adjusted rate of promotion from GS-11 to GS-12 for racial or ethnic minorities was 46.8 percent, compared with an average of 55.8 percent for whites. This statistically significant difference indicates that the odds of promotion from GS-11 to GS-12 in the Civil Service were 41.4 percent lower for racial or ethnic minorities than for whites. Our estimates of the adjusted rates and odds of promotion from GS- 12 to GS-13 and from GS-13 to GS-14 were also statistically significantly lower for racial or ethnic minorities than for whites. There was no statistically significant difference in the odds of promotion from GS-14 to GS-15 or from GS-15 to the executive rank for racial or ethnic minorities relative to whites in the Civil Service. Compared with our descriptive analysis, our adjusted analysis found smaller percentage differences in promotion outcomes for racial or ethnic minorities relative to whites in the Civil Service. Figure 7 shows key results of our descriptive and adjusted analyses of USAID data for racial or ethnic minorities and whites in USAID’s Civil Service. As table 5 shows, our descriptive analysis of data for USAID’s Foreign Service found that the rate of promotion was generally lower for racial or ethnic minorities than for whites. In addition, our adjusted analysis found differences between the promotion rates for racial or ethnic minorities and those for whites. These differences were not statistically significant for promotions from Class 4 to Class 3, from Class 2 to Class 1, or from Class 1 to the executive rank. However, the differences between promotion rates for racial or ethnic minorities and whites were statistically significant for promotions from Class 3 to Class 2. As table 5 shows, our descriptive analysis of the data for USAID’s Foreign Service found that for Class 4 and higher ranks, a lower average percentage of racial or ethnic minorities than of whites was promoted from each rank except Class 1. For example, our descriptive analysis found that in fiscal years 2002 through 2017, an average of 31.5 percent of racial or ethnic minorities were promoted from Class 4 to Class 3, compared with an average of 33.7 percent of whites. This difference of 2.2 percentage points indicates that the average rate of promotion from Class 4 to Class 3 was 6.4 percent lower for racial or ethnic minorities than for whites. However, our descriptive analysis does not account for the variety of factors besides racial or ethnic minority status, such as occupation, that may affect promotion rates. Our adjusted analysis of the data for USAID’s Foreign Service, controlling for certain factors other than racial or ethnic minority status that could influence promotion, found that racial or ethnic minorities had lower adjusted rates and odds of promotion than their white counterparts but that these differences were generally not statistically significant. Specifically, our adjusted analysis of USAID data on promotions in fiscal years 2002 through 2017 found the following: On average, the adjusted rate of promotion from Class 3 to Class 2 for racial or ethnic minorities was 11.0 percent, compared with 13.1 percent for whites. This statistically significant difference indicates that the odds of promotion from Class 3 to Class 2 in the Foreign Service were 21.5 percent lower for racial or ethnic minorities than for whites. The adjusted rates and odds of promotion for racial or ethnic minorities relative to whites were also lower for promotion from Class 4 to Class 3 and from Class 2 to Class 1 and were higher for promotion from Class 1 to the executive rank, but these differences were not statistically significant at the 95 percent confidence level. That is, we could not conclude that there was a statistical relationship between racial or ethnic minority status and promotion from these ranks. Compared with our descriptive analysis, our adjusted analysis found a larger percentage difference in promotion outcomes at all levels from Class 4 to the executive rank for racial or ethnic minorities relative to whites. Figure 8 shows key results of our descriptive and adjusted analyses of USAID data for racial or ethnic minorities and whites in the Foreign Service. Our analyses of USAID data on promotions in fiscal years 2002 through 2017 found differences between promotion outcomes for women relative to men, but these differences were generally not statistically significant. We found these differences when conducting descriptive analyses, which calculated simple average promotion rates, as well as adjusted analyses, which controlled for certain individual and occupational factors other than gender that could influence promotion. In particular, we found that average promotion rates for women in the Civil Service varied relative to men, but the differences were not statistically significant. In the Foreign Service, average promotion rates varied for women relative to men, but these differences were statistically significant only for promotion from Class 4 to Class 3. Our analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, our analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. As table 6 shows, our descriptive analysis of USAID data on promotions in fiscal years 2002 through 2017 found that the rate of promotion in USAID’s Civil Service was generally lower for women than for men at GS- 13 and lower ranks. However, our adjusted analysis did not find any statistically significant differences in the rates or odds of promotion for women relative to men in the Civil Service. Our descriptive analysis of the data for USAID’s Civil Service found that the average percentage of women promoted from GS-11 through GS-13 was lower than the average percentage of men. For example, our descriptive analysis found that in fiscal years 2002 through 2017, an average of 47.4 percent of women were promoted from GS-11 to GS-12, compared with an average of 58.7 percent of men. This difference of 11.3 percentage points indicates that the average rate of promotion from GS- 11 to GS-12 was 19.3 percent lower for women than for men. However, our descriptive analysis does not account for the variety of factors besides gender (e.g., occupation) that may affect promotion rates. Our adjusted analysis of the USAID data, controlling for certain factors other than gender that could influence promotion, found no statistically significant differences in the rates or odds of promotion for women compared with men in the Civil Service. Specifically, the adjusted analysis for promotions in fiscal years 2002 through 2017 found the following: The adjusted rates and odds of promotion from GS-12 to GS-13, from GS-13 to GS-14, and from GS-14 to GS-15 were lower for women than for men. Our estimates of the odds of promotion from GS-11 to GS-12 and from GS-15 to the executive rank were higher for women than for men. In all cases, we found no statistically significant differences at the 95 percent confidence level in the odds of promotion from any rank for women relative to men in the Civil Service. That is, we could not conclude that there was a statistical relationship between gender and promotion from these ranks. Figure 9 shows key results of our descriptive and adjusted analyses of USAID data for men and women in USAID’s Civil Service. Our descriptive and adjusted analyses of data on promotions in fiscal years 2002 through 2017 for USAID’s Foreign Service both found that the rate and odds of promotion were generally higher for women than for men, as table 7 shows. Our descriptive analysis of the data for USAID’s Foreign Service found that higher average percentages of women, relative to men, were promoted from Class 4 to Class 3, from Class 2 to Class 1, and from Class 1 to the executive rank. For example, our descriptive analysis found that in fiscal years 2002 through 2017, an average of 33.9 percent of women were promoted from Class 4 to Class 3, compared with an average of 32.2 percent of men. This 1.7 percentage point difference indicates that the average rate of promotion from Class 4 to Class 3 was 5.2 percent higher for women than for men. However, our descriptive analysis does not account for the variety of factors besides gender (e.g., occupation) that may affect promotion rates. Our adjusted analysis of the data for USAID’s Foreign Service, controlling for certain factors other than gender that could influence promotion, found that the adjusted rates and odds of promotion varied for women relative to men in the Foreign Service. Specifically, our adjusted analysis of data on promotions in fiscal years 2002 through 2017 found the following: On average, the adjusted rate of promotion from Class 4 to Class 3 for women in the Foreign Service was 34.7 percent, compared with 31.5 percent for men. This statistically significant difference indicates that the odds of promotion from Class 4 to Class 3 were 20.2 percent higher for women than for men. While the adjusted rates of promotion from Class 3 to Class 2 and from Class 1 to the executive rank were lower for women than for men, there were no statistically significant differences in the odds of promotion from these ranks for women relative to men in the Foreign Service. Thus, we could not conclude that there was a statistical relationship between gender and promotion from these ranks. Compared with the descriptive analysis, our adjusted analysis found a smaller percentage difference in promotion outcomes from Class 3 to Class 2 and from Class 2 to Class 1 for women relative to men. Our adjusted analysis also found positive, rather than negative, percentage differences in promotion outcomes from Class 4 to Class 3 and from Class 2 to Class 1 for women relative to men. Figure 10 displays key results of our descriptive and adjusted analyses of USAID data for men and women in USAID’s Foreign Service. USAID has determined that specific groups, such as Hispanics and African Americans, are underrepresented in its workforce, and the agency has a strategic plan that identifies goals, activities, and measures to support diversity and inclusion. However, staffing gaps stemming in part from a lack of leadership attention have prevented OCRD from conducting required equal employment opportunity functions. Specifically, staffing gaps have prevented OCRD from responding to EEO complaints within mandated timeframes, analyzing USAID’s workforce for trends and potential barriers to equal employment, and completing the annual MD- 715 reports on the agency’s diversity efforts. USAID has identified specific groups that are underrepresented in its workforce relative to the national civilian labor force. In each of its MD- 715 reports to EEOC for fiscal years 2013 through 2017, USAID identified the following groups as being underrepresented in its workforce: (1) Hispanic males and females in both the Civil Service and the Foreign Service; (2) individuals with a targeted disability; and (3) Hispanic, African American, and Asian American males and females in certain major occupations in areas such as health, contracting, program or project development, auditing, and management and program analysis. According to USAID officials, these groups remain underrepresented in USAID’s workforce. In fiscal years 2010 through 2016, USAID completed analyses intended to identify barriers that could contribute to underrepresentation of specific groups and other diversity issues and described such barriers in its MD- 715 reports. For example, in its report for fiscal year 2010, USAID stated that its recruitment and outreach efforts had failed to attract a representative pool of qualified applicants. In its report for fiscal year 2011, USAID stated that it had no executive development program to prepare employees to enter the senior executive service. In its report for fiscal year 2016, USAID reported on three barrier analyses examining the underrepresentation of, respectively, Hispanics; people with targeted disabilities; and African Americans, Asian Americans, and Hispanics in major occupations. Additional diversity issues may exist at USAID. For example, in 2014, EEOC found that black and Asian females may encounter barriers to equal employment when attempting to enter USAID’s Senior Foreign Service. Further, representatives from 10 of 11 employee resource groups told us that they believed members of their communities have fewer career prospects at USAID than members of other USAID communities. USAID outlined planned efforts to support diversity and inclusion in its June 2016 Human Resource Transformation Strategy and Action Plan, 2016-2021 (HR Transformation Strategy) as well as its 2017 Diversity and Inclusion Strategic Plan. According to the HR Transformation Strategy, USAID envisioned an environment in which diversity recruiting is targeted and strategic, selection bias does not prevent diverse candidates from being hired, all staff and supervisors are trained regularly in diversity and inclusion topics, and agency leaders incorporate diversity into staffing decisions. The HR Transformation Strategy included an objective focused on diversity and inclusion, with planned activities to work toward this goal. The 2017 Diversity and Inclusion Strategic Plan was developed concurrently with, and folded into, the HR Transformation Strategy’s diversity and inclusion objective. Shortly into the first year of the HR Transformation Strategy implementation, USAID narrowed its scope and suspended the diversity and inclusion objective. USAID’s 2017 Diversity and Inclusion Strategic Plan identifies three goals: (1) diversify the federal workforce though active engagement of leadership, (2) include and engage everyone in the workplace, and (3) optimize inclusive diversity efforts using a data-driven approach. The plan also identifies priorities, activities, and measures intended to meet USAID’s diversity goals, several of which cite, and overlap with, the original diversity and inclusion–related elements of the HR Transformation Strategy. HCTM and OCRD officials indicated that that the Diversity and Inclusion Strategic Plan includes some of the areas that would no longer be addressed through the HR Transformation Strategy. In addition, the officials noted that USAID has implemented some aspects of the plan. For example, according to the officials, its employee resource groups have participated in various outreach and recruitment events, as called for by the plan. HCTM and OCRD officials told us that USAID was drafting an update to the Diversity and Inclusion Strategic Plan, which it aimed to finish in June 2020. The officials stated that, although OCRD and HCTM will remain the plan’s primary implementers, the new plan will give USAID bureaus and offices more responsibility for diversity and inclusion activities. Additionally, the officials stated that working groups from USAID’s employee resource groups had begun reviewing the draft. The officials stated that OCRD expected to submit the draft to the Executive Diversity Council for comment after these reviews. OCRD has faced persistent staffing gaps stemming in part from a lack of management attention to the agency’s EEO programs. Moreover, the office has experienced turnover among its directors. OCRD officials stated that the staffing gaps and turnover challenges have prevented the office from completing required EEO functions. As figure 11 shows, the number of OCRD’s filled positions has consistently been less than its allocation. According to OCRD and EEOC officials, the office needs to fill its allocated positions to effectively perform its duties and responsibilities. These staffing gaps generally correspond to times when USAID reported that OCRD could not perform EEO investigations within mandated timeframes, conduct barrier analyses of the agency’s workforce, or complete an MD-715 report. OCRD cannot effectively perform its duties and responsibilities without sufficient staff, according to OCRD officials. Federal equal employment regulations require federal agencies to provide sufficient resources to their EEO programs to ensure efficient and successful operation. However, as table 8 shows, OCRD has faced staffing gaps since fiscal year 2010. According to USAID officials, vacancies have a greater effect on smaller offices such as OCRD, where fewer staff are available to take on the resulting extra work. The officials said that this can in turn affect morale, which can increase staff turnover. Such turnover is observable in USAID’s employee data showing the number of employees and new hires in OCRD. Specifically, while OCRD added new hires to the office each fiscal year, the number of filled positions generally stayed the same or decreased. For example, the number of filled positions in OCRD decreased from 10 to nine in fiscal year 2016, despite the addition of a new hire. Similarly, in fiscal years 2017 and 2018, OCRD’s filled positions remained constant at 10 despite four new hires during that period. As a result, OCRD’s vacancy rate remained near or above 30 percent from October 2015 through April 2020. EEOC similarly noted OCRD’s insufficient staffing in compliance letters to USAID in 2017 and 2019. In both letters, EEOC outlined its expectation that USAID establish a plan to allocate sufficient resources to its EEO program and demonstrate meaningful progress toward correcting this deficiency. USAID officials stated that these staffing gaps have limited OCRD’s capacity to carry out required EEO functions. For example, in November 2019, most of OCRD’s divisions had vacancy rates of 50 percent or more. At that time, all three allocated positions in the Reasonable Accommodation Division and five of six positions in the Diversity and Inclusion Division were vacant. In February 2020, OCRD officials reported that the division’s Affirmative Employment Program had no staff to implement the MD-715 report for fiscal year 2019. Additionally, OCRD reported that the Complaints and Resolution Division’s Anti-Harassment Program continued to receive cases while working through backlogs. Without sufficient staff, OCRD is unable to effectively perform its duties and responsibilities, according to OCRD officials. As part of its response to EEOC’s October 2019 compliance letter, USAID increased the number of positions approved for OCRD to 24. However, the office has struggled to fill those positions. HCTM and OCRD officials stated that, although they are working to resolve the staffing gaps in OCRD, high demand for staff with the specialized skills OCRD requires, as well as unexpected recent turnover in OCRD due to illness and retirement, have hindered this effort. According to USAID officials, long security clearance processes also caused several candidates to withdraw from the hiring process when they found other employment. As table 9 shows, OCRD continued to have staffing gaps of 30 to 50 percent in April 2020. Representatives from nine of the 13 USAID employee groups we spoke with echoed the concern that OCRD lacked sufficient staffing resources to do its job effectively. For example, one group attributed OCRD’s lack of responsiveness to information requests to a lack of sufficient staffing resources. Another group said that there was an implicit understanding in USAID that OCRD had to prioritize reacting to negative events rather than undertaking proactive efforts to increase diversity. Without sufficient staffing resources, USAID will lack the capacity to perform required functions such as responding to EEO complaints, analyzing demographic data, or completing annual MD-715 reports. According to EEOC MD-715 instructions to federal agencies, model EEO programs must have sufficient budget and staffing to support the success of the EEO program, including sufficient staffing to ensure thorough and fair processing of EEO complaints in a timely manner. According to USAID, a lack of staffing resources has prevented the agency from meeting required time frames for EEO investigations. In four of its six MD- 715 submissions for fiscal years 2010 through 2018, USAID reported that it did not have sufficient staffing to implement a successful complaint process. In recent years, USAID has consistently reported being unable to complete EEO counseling, EEO investigations, or final agency decisions on EEO complaints in a timely manner, as required by federal equal employment regulations. For example, in fiscal year 2013 and fiscal years 2015 through 2019, USAID reported being unable to complete EEO investigations within prescribed time frames. Further, in an October 2019 compliance letter, EEOC stated that in fiscal year 2018, USAID completed 67 percent of EEO counseling, 14 percent of EEO investigations, and none of the final agency decisions in a timely manner. As table 10 shows, USAID reported that it did not complete any stages of the EEO complaints response process in a timely manner for fiscal years 2016 through 2019, with the exception of EEO counseling in fiscal year 2016. In fiscal year 2019, the agency continued to lack sufficient funding and qualified staffing to process EEO complaints in a timely, thorough, and fair manner, according to USAID documentation. Representatives of three USAID employee groups also stated that OCRD lacked the capacity to address EEO issues in a timely manner and attributed this to understaffing. Representatives of the first group said that, at a certain point, USAID had a single EEO investigator for the entire agency and that investigations took more than a year. Representatives of the second group stated that because OCRD was short-staffed, it had a backlog of complaints of harassment and bullying. Representatives of the third group said that they had observed the reasonable-accommodation process taking longer than a year. They speculated that this had resulted from USAID’s assigning the handling of reasonable-accommodation requests across the worldwide portfolio to a single person. According to USAID, OCRD has made progress in reducing complaint backlogs. In February 2020, OCRD officials said that the timeliness requirement had been met for the EEO complaint process and that the office no longer had a backlog of complaints. However, OCRD officials said that backlogs remained in processing anti-harassment cases. Further, the officials said that the Reasonable Accommodation Program continued to be affected by a lack of staff. In an April 2020 compliance letter to EEOC, USAID reported that OCRD had developed metrics and new internal procedures for complaint processing. The letter further stated that thus far in fiscal year 2020, OCRD had been 100 percent timely with EEO counseling, EEO investigations, and final agency decisions. While USAID has noted recent improvement in its ability to conduct timely EEO counseling and investigations, without the capacity to consistently perform these functions, USAID cannot meet mandated timeframes for responding to EEO complaints and risks being unable to achieve its goal of a diverse and inclusive workforce environment. According to EEOC MD-715 instructions to federal agencies, model EEO programs must have sufficient budget and staffing to, among other things, conduct self-assessments of possible program deficiencies and conduct thorough barrier analyses of their agency’s workforce. Although USAID has previously completed barrier analyses of its workforce, the agency reported insufficient personnel resources to conduct annual agency self- assessments and self-analyses for its MD-715 submissions for fiscal years 2010, 2013, 2016, and 2017. For example, the fiscal year 2017 MD-715 report stated that USAID did not conduct trend analyses of the effects of management or personnel policies, procedures, and practices and that the agency lacked sufficient resources to enable it to conduct a thorough barrier analysis of its workforce. According to USAID officials, OCRD lost its staff member assigned to manage barrier analyses and was unable to fill that position during the hiring freeze. Further, OCRD continues to lack sufficient personnel to conduct barrier analyses. In November 2019, OCRD’s Diversity and Inclusion Division consisted of one supervisor and five vacant positions. Despite subsequent efforts to hire more staff, OCRD reported in February 2020 that it still lacked staff to perform its data analysis responsibilities. EEOC officials expressed concern regarding OCRD’s lack of capacity to analyze and address diversity issues. For example, EEOC officials said that USAID had not adequately used applicant flow data to identify potential barriers in fiscal year 2017. Despite having collected applicant data, USAID did not submit applicant flow data as part of its MD-715 submission for fiscal year 2017, the most recent year for which it submitted this report. According to the EEOC officials, OCRD told them that it lacked staff with sufficient technical expertise to conduct a barrier analysis of these data. Without the capacity to perform self-analysis, USAID is unable to proactively identify and address barriers to diversity in its workforce. EEOC MD-715 requires federal agencies to submit their MD-715 reports to the EEOC annually. The report is due by February 28 following the end of the fiscal year that is being reported, although EEOC has the discretion to grant extensions. However, OCRD did not complete the MD-715 report in fiscal years 2011 or 2012 and has not submitted an MD-715 report for fiscal year 2018. Despite being granted submission extensions, USAID had not submitted its MD-715 report for fiscal year 2018 by the certification deadline of September 30, 2019, according to EEOC’s October 2019 compliance letter. The letter stated that EEOC expected USAID to submit the MD-715 report for fiscal year 2018 and to ensure that the MD-715 report for fiscal year 2019 would be submitted by the deadline of February 28, 2020. In November 2019, USAID officials told us that OCRD lacked the staff needed to complete the fiscal year 2018 MD- 715 report by this deadline and therefore intended to concentrate on submitting a report for fiscal year 2019. However, in February 2020, USAID officials told us that OCRD’s Affirmative Employment Program continued to lack any staff to monitor and implement the MD-715 effort. In April 2020, USAID officials reported that they were using a contractor to complete the fiscal year 2019 MD-715 report. Without OCRD capacity to submit required reports on the agency’s diversity and inclusion efforts, USAID leadership will lack sufficient insight into the EEO program to ensure that its activities meet agency goals. Furthermore, inconsistent reporting could hamper EEOC’s oversight of USAID’s EEO programs. OCRD’s staffing gaps stem in part from a lack of leadership attention to USAID’s equal employment opportunity programs at both the office and agency levels. We have previously identified top leadership commitment as a leading practice for diversity management. Leaders and managers within organizations are primarily responsible for the success of diversity management, because they must provide the visibility and commit the time and necessary resources. Both USAID and EEOC officials attributed OCRD’s staffing problems to frequent management turnover within OCRD. According to information provided by USAID officials, OCRD has had five directors (permanent and acting) since 2013. USAID officials stated that this turnover made it difficult for any director to provide sufficient office-level leadership attention to sustain efforts to improve OCRD’s capacity. EEOC officials also expressed concern regarding this level of director turnover and asserted that without consistent office leadership that could effectively advocate for scarce personnel resources within USAID, OCRD would continue to face staffing shortages. EEOC officials said that OCRD could not draw sufficient attention from senior USAID leadership without a permanent director. According to EEOC MD-715 instructions to federal agencies, model EEO programs have a reporting structure for the EEO program that provides the principal EEO official with appropriate authority and resources to effectively carry out a successful EEO program. This includes, but is not limited to, an annual State of the Agency briefing given by the EEO Director (in USAID’s case, the Director of OCRD) to the agency head and other senior management officials after the submission of a MD-715 report. According to MD-715 instructions to federal agencies, the briefing must thoroughly cover all components of the agency’s MD-715 report, including an assessment of the agency’s performance in each of the six elements of a model EEO program, as well as a report on the agency’s progress in completing its barrier analysis. However, OCRD has not presented a State of the Agency briefing to the head of USAID and other senior leadership for 3 consecutive fiscal years. In April 2020, OCRD officials told us that the office planned to provide the briefing to USAID’s Executive Diversity Council once the MD-715 for fiscal year 2019 was completed, which they anticipated would occur in May 2020. HCTM and OCRD officials also told us that since receiving the EEOC’s October 2019 compliance letter, senior USAID leadership had been more engaged than previously. Without senior USAID leadership attention to diversity, OCRD will continue to lack the staffing resources necessary to build its capacity to support USAID’s diversity and inclusion efforts as well as operate an effective and efficient EEO program. Although USAID has made some progress in increasing representation of diverse groups in its Civil and Foreign Service workforces, continued underrepresentation and generally lower promotion outcomes for racial or ethnic minorities suggest that additional efforts are needed. Addressing these issues requires an effective and efficient EEO program. However, OCRD, which operates the agency’s EEO program, is currently unable to perform its key functions because of significant staffing gaps and turnover. USAID’s recent efforts to fill staff vacancies within various OCRD divisions could help increase OCRD’s capacity to perform its required EEO functions. However, such capacity will not be fully demonstrated until OCRD can consistently ensure timely processing of EEO complaints and investigations, regular analysis of workforce demographics for trends, and regular submission of required MD-715 reports. Further, sustained attention to diversity efforts from USAID’s senior leadership would help ensure that OCRD has the capacity to perform its required EEO functions. Without capacity to perform these functions, USAID cannot consistently respond to allegations of discrimination in a timely manner, identify potential barriers to equal employment opportunity, or maintain accountability for the progress of its diversity and inclusion efforts. We are making the following four recommendations to USAID: 1. The USAID Administrator should ensure that OCRD consistently responds to EEO complaints in a timely manner. (Recommendation 1) 2. The USAID Administrator should ensure that OCRD consistently analyzes USAID workforce demographic data for trends and potential barriers to equal employment opportunity. (Recommendation 2) 3. The USAID Administrator should ensure that OCRD submits required MD-715 reports to EEOC in a timely manner. (Recommendation 3) 4. The USAID Administrator should demonstrate senior leadership attention to diversity by ensuring that OCRD has the capacity to perform required EEO functions. (Recommendation 4) We provided a draft of this report to USAID, EEOC, and OPM for comment. USAID provided comments, which we have reproduced in appendix XV. EEOC and OPM stated they did not have comments. In its comments, USAID concurred with our four recommendations and described actions planned or underway to address them. For example, in response to recommendations 2 and 3, USAID stated that it is in the process of establishing an Affirmative Employment Program in OCRD to, among other things, analyze and report on workforce data and prepare and submit the agency’s annual MD-715 Report. USAID indicated that it expects to finish implementing actions addressing our EEO-related recommendations in 2020. We believe that, to demonstrate consistent capacity to perform its EEO functions, USAID will need to successfully complete these functions for at least two consecutive cycles. We are sending copies of this report to the appropriate congressional committees, the Administrator of USAID, the Chair of EEOC, and the Director of OPM. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or at bairj@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XVI. This report examines (1) the demographic composition of USAID’s workforce in fiscal years 2002 through 2018, (2) differences in promotion outcomes for racial or ethnic groups in USAID’s workforce, (3) differences in promotion outcomes for men and women in USAID’s workforce, and (4) the extent to which USAID has identified workforce diversity issues and worked to address them. For this report, we analyzed National Finance Center data on USAID’s full-time, permanent, career workforce (direct-hire U.S. citizen Civil and Foreign Service employees) for fiscal years 2002 through 2018. For each fiscal year, we analyzed record-level status data for USAID’s employees as of September 30 (the end of the fiscal year). This included demographic and administrative data for each employee, such as race, ethnicity, gender, grade or class, age, date of entry to USAID, years of service, veteran’s status, occupation, location or duty station, and the employee’s unique identifier. We also analyzed record-level dynamic data that included personnel actions, such as promotions or separations. In addition, we obtained “Post (Hardship) Differential Percentage of Basic Compensation” data from the Department of State’s website for fiscal years 2002 through 2018. Following guidance from the U.S. Equal Employment Opportunity Commission, we used data for nine federal job categories and their correspondence to specific occupation codes to match federal job categories to the occupations of USAID’s employees. We assessed the reliability of these data sets and of other data critical to our analyses through documentation review, electronic testing, and interviews with knowledgeable agency officials. We determined that these data were sufficiently reliable for our purposes. To examine the demographic composition of USAID’s workforce over time, we analyzed National Finance Center data for USAID’s full-time, permanent, career workforce for fiscal years 2002 through 2018. For each year, we calculated the demographic composition of the workforce by racial or ethnic group and by gender for USAID overall and for USAID’s Civil and Foreign Services. We also analyzed these numbers and percentages by occupation and rank, including General Service (GS) grade for the Civil Service, salary class for the Foreign Service, and executive rank (i.e., Senior Executive Service or Senior Foreign Service). We excluded political appointees and Office of Inspector General employees from our overall analysis because, according to agency officials, USAID’s Office of Human Capital and Talent Management does not have authority over these hires. We also compared the demographics of USAID’s workforce in fiscal year 2018 with the most recent available data on demographics of (1) the federal workforce, as reported by the Office of Personnel Management (OPM), and (2) the relevant civilian labor force, from the Census Bureau’s equal employment opportunity (EEO) tabulation. Because of USAID’s involvement in disability-related litigation during the course of this engagement, we did not analyze the numbers and percentages of employees with disabilities. Additionally, because the National Finance Center data we used did not include information about employees’ sexual orientation, we were unable to analyze the data on that basis. For the purposes of our report, racial or ethnic minorities exclude non- Hispanic whites; Hispanics include Hispanics of all races; and the remaining non-Hispanic racial or ethnic groups include white, African American, Asian, and other. Our analysis for the category we report as “other” includes non-Hispanics identified as American Indian or Alaskan Native, Native Hawaiian or other Pacific Islander, and individuals identifying as two or more races. For instances where an employee’s reported racial, ethnic, or gender category changed, we assigned the most recently recorded category to all available years. To examine promotion outcomes for racial or ethnic minorities and women in USAID’s workforce, we conducted two types of analyses— descriptive and adjusted—using USAID’s National Finance Center data for its full-time, permanent, career workforce in fiscal years 2002 through 2018. For both analyses, we considered promotion to be an increase in rank between 2 consecutive fiscal years. We included in these analyses all individuals in the original rank and did not distinguish between individuals who did or did not apply for promotion or who were eligible or ineligible. We conducted a descriptive analysis of USAID data, comparing annual promotion rates for racial or ethnic minorities and whites and for women and men. For each rank and fiscal year, we calculated these rates as the number of newly elevated employees in the next-higher rank in the following fiscal year divided by the number of employees in the given rank in the current year. We conducted adjusted analysis using a multivariate statistical method (i.e., duration analysis), which accounted for certain individual and occupational factors other than racial or ethnic minority status and gender that could influence promotion. Specifically, we used a discrete-time multivariate statistical logit model to analyze the number of yearly cycles it took to be promoted up to the executive level from GS-11 in the Civil Service and from Class 4 in the Foreign Service. We examined the statistical relationship between promotion and racial or ethnic minority status and gender, including adjusted promotion rates, odds ratios, and percentage differences in relative odds of promotion. Because a variety of factors besides racial or ethnic minority status and gender may influence promotion outcomes, we incorporated various individual and position-specific characteristics in our regression models to control for other potential factors. These included an employee’s (1) time in each rank before promotion; (2) years of prior federal government experience; (3) age when entering USAID; (4) receipt of veterans’ preference points; (5) having transferred between the Civil and Foreign Services; (6) having worked overseas in the previous year (for the Foreign Service); (7) having worked in at a location where the hardship differential was 20 percent or more in the previous year (Foreign Service only); (8) proficiency in two or more languages other than English (Foreign Service only); and (9) occupation as well as (10) fiscal years. We identified these attributes as being relevant to promotion by reviewing relevant literature and interviewing agency officials. Our primary model was a pooled model that included all employees whose records we used to determine summary statistics for USAID’s full-time, permanent, career workforce in fiscal years 2002 through 2018. Additionally, we conducted a number of sensitivity analyses, such as examining the robustness of our models to the inclusion of various sets of control variables (see app. XIII) and applying the multivariate statistical method for various permutations of racial or ethnic minority status (see app. XIV). To examine the extent to which USAID has identified workforce diversity issues and worked to address them, we reviewed all annual Management Directive 715 reports that it submitted to EEOC from fiscal year 2011 through fiscal year 2019. We also reviewed policies, guidance, and other USAID documentation related to diversity. Additionally, we met with relevant USAID officials from the Office of Civil Rights and Diversity and the Office of Human Capital and Talent Management as well as officials from EEOC. We also conducted interviews with representatives of 13 employee groups representing current employees in USAID’s Civil and Foreign Services to obtain their perspectives on diversity efforts at USAID. These groups included two unions: the Association of Federal Government Employees and the American Foreign Service Association. The 13 groups also included 11 employee resource groups: Arab- Americans in Foreign Affairs Agencies, the Asian Pacific American Employees Committee, Blacks in Government, Employees with Disabilities, Gender and Sexual Minorities, the Hispanic Employees Council of Foreign Affairs Agencies, the Jewish Affinity Group, the Native Americans in Foreign Affairs Council, the Personal Services Contractor Association, the USAID Muslims Employee Resource Group, and Women@AID. We conducted this performance audit from October 2018 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The following figures and tables present numbers and proportions of employees in racial, ethnic, and gender groups in the U.S. Agency for International Development (USAID) overall and in USAID’s Civil and Foreign Services in fiscal years 2002 through 2018. We compared summary statistics for the U.S. Agency for International Development’s (USAID) workforce overall with summary statistics for the federal government and relevant civilian labor force. We compared summary statistics calculated from USAID personnel data for fiscal year 2018 with summary statistics for the federal government for fiscal year 2017, published in the Federal Equal Opportunity Recruitment Program (FEORP) report. Our comparison of USAID personnel data with data from the Office of Personnel Management’s FEORP report for the federal government found differences between the proportions of racial or ethnic minorities at USAID and those in the federal workforce. In particular, the proportions of African Americans and Asians were higher at USAID in fiscal year 2018 than in the federal workforce in fiscal year 2017, but the proportion of Hispanics was lower at USAID than in the federal workforce for those years. The proportion of women at USAID was higher than in the federal workforce (see table 17). We compared summary statistics for USAID’s workforce with summary statistics for the relevant civilian labor force from the Census Bureau’s equal employment opportunity tabulation for three of the Equal Employment Opportunity Commission (EEOC) occupational classification system’s nine categories. Using an EEOC table that cross-classifies Office of Personnel Management occupation codes and federal sector occupational categories, we classified each USAID employee into one of the nine categories. We compared USAID and relevant civilian labor force statistics for the following three categories, corresponding to 99 percent of USAID’s full-time, permanent employees in fiscal year 2018: officials and managers, professional workers, and technical workers and technologists. Our comparison of USAID workforce data with relevant civilian labor force data found generally larger proportions of racial or ethnic minorities at USAID than in the relevant civilian labor force for officials and managers, professional workers, and technical workers and technologists (see tables 18 through 20). The proportions of women were lower at USAID than in the relevant civilian labor force for professional workers but were higher for officials and managers and for technical workers and technologists. To compare U.S. Agency for International Development (USAID) and federal government workforce data, we contrasted summary statistics on executive employees calculated from USAID personnel data for fiscal year 2018 with summary statistics on executives from federal government workforce data for fiscal year 2017 that were published in the Federal Equal Opportunity Recruitment Program (FEORP) report. As table 21 shows, our comparison of USAID workforce data with the FEORP data found a slightly higher proportion of white executives and a slightly lower proportion of racial or ethnic minority executives at USAID than in the federal workforce overall. We analyzed U.S. Agency for International Development (USAID) data on employees hired with veterans’ preference in fiscal years 2002 through 2018. The following tables present the numbers and percentages of employees hired with or without veterans’ preference in USAID’s workforce overall and in USAID’s Civil and Foreign Services during that period. Table 25 shows the proportions of permanent employees with a disability in the U.S. Agency for International Development’s (USAID) Civil and Foreign Services in fiscal years 2009 through 2017. The data shown are summary statistics from USAID’s Management Directive 715 (MD-715) reports to the Equal Employment Opportunity Commission. As the table shows, the proportion of permanent employees with disabilities increased in the Civil Service and remained constant in the Foreign Service in the years for which USAID reported these data. In addition to analyzing the demographic composition of the U.S. Agency for International Development’s (USAID) workforce, we analyzed USAID personnel data to determine summary statistics on political appointees in fiscal years 2002 through 2018. We considered employees to be political appointees if they were on the executive pay plan or the administratively determined pay plan. This includes Senate-confirmed political appointees as well as political appointees that did not require Senate confirmation. The following figures and tables present the numbers and proportions of political appointees in racial or ethnic and gender groups in USAID overall and USAID’s Civil Service and Foreign Service in fiscal years 2002 through 2018. We also analyzed USAID personnel data to determine summary statistics on employees of the agency’s Office of Inspector General in fiscal years 2002 through 2018. The following tables present the numbers and percentages of the office’s employees in racial or ethnic and gender groups in fiscal years 2002 through 2018. We analyzed data for applicants to the U.S. Agency for International Development’s (USAID) Civil Service in fiscal years 2012 and 2018 and applicants to USAID’s Foreign Service in fiscal years 2012 and 2016. According to USAID’s guidance on personnel recruitment, an applicant is considered eligible when USAID’s online application evaluation system, using the applicant’s online responses to standardized questions, determines that the applicant meets eligibility requirements and the minimum qualifications defined in the vacancy announcement. USAID’s Civil Service staffing guidance provides that officials may interview and make selections on the basis of referral lists of eligible applicants. USAID’s personnel recruitment guidance for the Foreign Service also notes that an applicant is considered selected when the applicant’s score is above the cut-off total score and the applicant has passed the onsite assessment to advance to the reference-check stage of the hiring process. We considered an applicant to have been rated eligible if the applicant data showed that the applicant had not been rated ineligible. We considered an applicant to have been selected if the applicant data showed that the applicant was either hired or selected. Tables 30 through 32 show the percentages of eligible applicants and selected eligible applicants to, respectively, USAID overall in fiscal years 2012 and 2018, USAID’s Civil Service in fiscal years 2012 and 2018, and USAID’s Foreign Service in fiscal years 2012 and 2016. In addition to analyzing the demographic composition of the U.S. Agency for International Development (USAID) workforce, we analyzed USAID personnel data to determine summary statistics on employees hired in fiscal years 2003 through 2018. We considered an employee to have been hired in a given fiscal year if the employee first appeared in USAID’s personnel data for that year. Because the USAID data we reviewed began in fiscal year 2002, we were unable to identify employees who were hired in that fiscal year; thus, fiscal year 2003 is the first for which we were able to identify newly hired employees. Figure 21 shows the number of newly hired employees at USAID from fiscal year 2003 to fiscal year 2018. The following figures and tables present the numbers and proportions of newly hired employees in racial, ethnic, and gender groups in USAID overall and USAID’s Civil Service and Foreign Service in fiscal years 2003 through 2018. In addition to analyzing the demographic composition of the U.S. Agency for International Development’s (USAID) workforce, we analyzed USAID personnel data to determine summary statistics for employees who left USAID in fiscal years 2003 through 2018 for reasons other than retirement or death. Figures 24 and 25 show the percentages of such employees in various racial, ethnic, and gender groups at USAID overall and in USAID’s Civil Service and Foreign Service in fiscal years 2003 and 2018. Table 35 presents attrition rates for white and racial or ethnic minority employees who left USAID in fiscal years 2003 through 2018 for reasons other than retirement or death. Table 36 presents attrition rates for men and women who left USAID in fiscal years 2003 through 2018 for reasons other than retirement or death. As table 37 shows, our analysis of yearly promotion rates for fiscal years 2013 through 2017 at the U.S. Agency for International Development (USAID) found that promotion rates for white employees exceeded those for racial or ethnic minority employees for Civil Service promotions from GS-11 and every higher rank in every year, except from GS-15 to executive in 3 years, and Foreign Service promotions from Class 4 and higher ranks for 11 of the 20 possible year-rank combinations. Table 38 shows the promotion rates for white employees and racial or ethnic minority employees in USAID’s Civil and Foreign Services in fiscal years 2013 through 2017. from Class 4 and higher ranks for 12 of the 20 possible year-rank combinations in the Foreign Service. Table 40 shows the promotion rates for men and women in USAID’s Civil and Foreign Services in fiscal years 2013 through 2017. Our analysis of U.S. Agency for International Development (USAID) workforce data found that racial or ethnic minorities generally spent more years in each rank than whites did in USAID’s Civil Service in fiscal years 2002 through 2018. Table 41 shows the average years in rank for whites and racial or ethnic minorities in USAID’s Civil and Foreign Services. Our analysis also found that in the Civil Service, women generally spent more years than men in early- to mid-career ranks (GS-13 and below) before being promoted. However, women spent fewer years than men in later career ranks (GS-14 and above) before being promoted. In the Foreign Service, women generally spent fewer years than men in early- to mid-career ranks (Class 2 and below) before being promoted. Table 42 shows the average years in rank for men and women in USAID’s Civil and Foreign Services in fiscal years 2002 through 2018. Tables 43, 44, 50, and 51 provide summaries of the multivariate statistical regression results (specifically, duration regression results) for our estimates of the percentage differences in odds of promotion for racial or ethnic minorities compared with whites and for women compared with men in the U.S. Agency for International Development’s (USAID) Civil and Foreign Services. Our analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, our analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. promotion slots (and therefore promotion outcomes) may be affected by budget constraints that vary across fiscal years. Model 6 used data for fiscal years 2011 through 2018 only. In addition to controlling for the same variables as model 5, model 6 controlled for use of long-term leave in the prior year. Tables 43 through 55 provide the regression results of these six models for all promotion stages that we analyzed in the Civil and Foreign Services. Tables 43, 44, 50, and 51 present the consolidated regression results for all six models and all promotion stages, presented as estimates of percentage differences. Tables 45 through 49 and tables 52 through 55 provide the full regression results of the first five models, presented as odds ratios. Odds ratios that are statistically significant and lower than 1.00 indicate that individuals with the given characteristic were less likely to be promoted. Odds ratios that are statistically significant and greater than 1.00 indicate that individuals with the given characteristic were more likely to be promoted. To convert the values in tables 45 through 49 and tables 52 through 55 to the values in tables 43, 44, 50, and 51, we linearly transformed the estimates. That is, the values for the estimates in tables 43, 44, 50, and 51 are equal to the values in tables 45 through 49 and in tables 52 through 55 multiplied by 100, minus 100. The values for the standard errors in tables 43, 44, 50, and 51 are equal to the values in tables 45 through 49 and in tables 52 through 55 multiplied by 100. For example, in table 45, the estimate for model 1a is 0.463; we arrived at the percentage difference of negative 54 percent in table 43 by 0.463*100-100. Additionally, in table 45, the estimate for the standard error for model 1a is (0.0624); we arrived at the converted standard error of (6) in table 45 by (0.0624)*100. Table 43 summarizes the regression results for our estimates of the percentage differences in odds of promotion for racial or ethnic minorities compared with whites in the Civil Service. We observed that racial or ethnic minorities’ lower odds of promotion from GS-11 through GS-14 were consistently statistically significant across all of our models examining combinations of factors that could influence promotion (i.e., models 1a through 5). In addition, our results were generally statistically significant when we examined the more recent time period fiscal years 2011 through 2018 (see model 6). (0.0624) (0.0629) (0.0950) (0.0850) (0.0972) 0.872 (0.200) 0.962 (0.229) 1.016 (0.255) Age at entry, squared (0.000627) (0.000640) (0.000659) 0.932*** (0.0197) 0.927*** (0.0200) 0.909*** (0.0211) Years of government service, squared (0.317) (0.362) (0.340) (0.393) (0.399) 0.764 (0.174) 0.802 (0.193) (1.043) (2.707) 1.750** (0.393) 1.919*** (0.459) (0.568) (0.559) 1.987** (0.662) 2.096** (0.728) Odds ratio (standard error) (0.718) (0.747) 1.147 (0.228) 1.235 (0.262) (5.832) (5.407) (6.191) (1.395) (1.142) (0.802) Legend: GS = General Schedule, — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p- value < 0.05, * = statistically significant at p-value < 0.1. Odds ratio (standard error) Model 3 Model 2 0.876 0.825* — (0.103) Model 4 0.833 (0.100) Model 5 0.806* (0.102) (0.150) (0.149) (0.163) 1.020 (0.0400) 1.022 (0.0410) 1.032 (0.0427) Age at entry, squared (0.000528) (0.000540) (0.000554) Odds ratio (standard error) Model 2 Model 3 0.937*** — (0.0170) (0.0174) (0.0184) Years of government service, squared 1.000 (0.000678) 1.000 (0.000687) 1.000 (0.000703) (0.158) (0.150) (0.152) (0.278) (0.316) 2.299 (3.283) (0.321) (0.306) 0.781 (0.261) 0.878 (0.303) (0.141) (0.142) 1.518 (0.482) 1.515 (0.500) 2.194*** (0.579) 2.050*** (0.548) 2.457*** (0.669) 2.315 (1.734) 1.564 (1.199) 0.648 (0.538) Legend: GS = General Schedule, — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p- value < 0.05, * = statistically significant at p-value < 0.1. Appendix XIII: Full Promotion Regression Results For example, the estimated odds ratio for racial or ethnic minority employees for promotion from GS- 12 to GS-13 is 0.640 (model 5), which means that the odds of promotion for racial or ethnic minority employees are about 64 percent of the odds for white employees. We conducted discrete-time duration analysis using logit models to analyze the time duration (number of years) before promotion from each GS grade shown. In all models, we controlled for the time that employees spent in each grade before promotion. The overall baseline population for the duration analysis represents individuals who possessed none of the characteristics indicated by the list of control variables. These analyses do not completely explain why differences in odds of promotion exist. While various independent variables capture and control for many characteristics across demographic groups, unobservable factors may account for differences in odds of promotion; thus, our regression results do not establish a causal relationship between demographic characteristics and promotion outcomes. Model 1b 0.912 (0.0897) Model 2 0.988 (0.0986) Model 3 0.855 (0.0906) Model 4 0.832* (0.0900) Model 5 0.838 (0.0926) (0.116) (0.120) (0.139) 1.021 (0.0385) 1.028 (0.0395) 1.034 (0.0405) Age at entry, squared (0.0158) (0.0165) (0.0170) Years of government, service squared 1.000 (0.000575) 1.000 (0.000594) 1.000 (0.000603) (5.518) (4.311) 0.865 (0.235) 1.013 (0.281) (0.159) (0.160) 0.788 (0.242) 0.703 (0.219) Odds ratio (standard error) (0.163) (0.180) 0.580 (0.210) 0.612 (0.223) (0.277) (0.284) 0.844 (0.263) 0.932 (0.295) 0.198*** (0.0621) 0.164*** (0.0520) 0.199*** (0.0636) 0.243* (0.183) 0.221* (0.172) 0.187** (0.154) Legend: GS = General Schedule, — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p- value < 0.05, * = statistically significant at p-value < 0.1. (0.0822) (0.0823) (0.0910) (0.0988) (0.111) 0.634* (0.150) 0.633* (0.151) 0.722 (0.175) Age at entry, squared (0.000670) (0.000673) (0.000690) 1.018 (0.0214) 1.024 (0.0221) 0.987 (0.0224) Years of government service, squared (0.327) (0.352) (0.473) (1.609) (1.437) 1.157 (0.497) 1.401 (0.612) (1.302) (1.511) 0.553 (0.229) 0.557 (0.232) (0.172) (0.146) 1.170 (0.451) 1.575 (0.617) Odds ratio (standard error) (0.227) (0.230) 0.856 (0.361) 1.009 (0.433) 0.0232*** (0.0103) 0.0202*** (0.00903) 0.0227*** (0.0102) 0.00362*** (0.00377) 0.00317*** (0.00336) 0.00526*** (0.00584) Legend: GS = General Schedule, — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p- value < 0.05, * = statistically significant at p-value < 0.1. (0.418) (0.413) (0.332) (0.360) (0.455) 4.827*** (2.417) 5.221*** (2.569) 6.051*** (3.095) (0.147) (0.141) (0.148) Odds ratio (standard error) Control variable Age at entry, squared (0.00180) (0.00173) (0.00174) 1.120* (0.0751) 1.143* (0.0785) 1.054 (0.0768) Years of government service, squared (0.963) (1.082) (1.282) (0.472) (0.514) (0.459) (0.485) (0.274) (0.242) 1.712 (1.907) 2.195 (2.500) — 1.287 (1.431) — 1.708 (1.964) (0.446) (0.414) Odds ratio (standard error 0.00117*** (0.00181) 0.00110*** (0.00171) 0.00109*** (0.00170) 0.000580** (0.00178) 0.000754** (0.00229) 0.00114** (0.00361) Legend: GS = General Schedule, — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p- value < 0.05, * = statistically significant at p-value < 0.1. Table 50 summarizes the regression results for our estimates of the percentage differences in odds of promotion for racial or ethnic minorities compared with whites in the Foreign Service. We found that racial or ethnic minorities had lower estimated odds of promotion than whites in early to mid career (Class 4 through Class 1), but these differences were generally not statistically significant. However, we observed statistically significantly lower odds of promotion for racial or ethnic minorities from Class 3 through Class 2. These results were consistently statistically significant across all of our models examining combinations of factors that could influence promotion (i.e., models 1a through 5). including in the more recent period fiscal years 2011 through 2018 (see models 5 and 6). Tables 52 through 55 present full regression results for models 1a through 5 for each rank in the Foreign Service. The results are presented as odds ratios. (0.0732) (0.0725) (0.0746) (0.0733) (0.0831) 0.910 (0.229) 0.819 (0.209) 1.010 (0.278) Age at entry, squared (0.000598) (0.000602) (0.000645) 1.104*** (0.0310) 1.104*** (0.0312) 1.098*** (0.0327) Years of government service, squared (0.126) (0.129) (0.128) 2.035*** (0.182) 2.018*** (0.182) 3.664*** (0.442) (0.217) (0.216) (0.346) (3.089) (3.039) 1.338 (0.266) 1.557** (0.339) (0.151) (0.157) 0.935 (0.151) 1.190 (0.209) Odds ratio (standard error) (0.124) (0.147) 1.592** (0.362) 1.391 (0.334) Duration controls Fiscal year controls (0.169) (0.212) Legend: — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p-value < 0.05, * = statistically significant at p-value < 0.1. (0.0722) (0.0745) (0.0817) (0.0831) (0.0911) 0.752*** (0.0769) 0.767** (0.0790) 0.767** (0.0803) 0.748*** (0.0801) 0.785** (0.0895) (0.154) (0.147) (0.201) Odds ratio (standard error) Control variable Age at entry Age at entry, squared (0.0679) (0.0688) (0.0650) 0.998** (0.000764) 0.998** (0.000769) 0.999 (0.000799) Years of government service, squared (0.00140) (0.00141) (0.00148) 1.077 (0.109) 1.078 (0.110) 0.855 (0.0970) (0.0868) (0.0868) (0.121) 1.033 (0.168) 1.024 (0.167) 0.929 (0.164) 2.641 (3.278) 2.499 (3.189) (0.185) (0.182) 1.063 (0.177) 1.166 (0.208) (0.126) (0.221) 1.534** (0.295) 1.857*** (0.386) (0.160) (0.215) Odds ratio (standard error) 0.000459*** (0.000257) 0.000467*** (0.000262) 0.000494*** (0.000277) 0.000022*** (0.000028) 0.000017*** (0.000022) 0.000417*** (0.000588) Legend: — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p-value < 0.05, * = statistically significant at p-value < 0.1. Odds ratio (standard error) Model 2 Model 3 1.122 0.997 (0.0951) (0.0986) (0.0922) (0.0948) (0.0970) 0.837* (0.0890) 0.820* (0.0882) 0.842 (0.0922) 0.830* (0.0922) 0.863 (0.0979) Age at entry, squared (0.0659) (0.0665) (0.0642) 0.998*** (0.000750) 0.998*** (0.000754) 0.998** (0.000772) Years of government service, squared (0.000815) (0.000821) (0.000859) Odds ratio (standard error) Model 2 Model 3 — 1.417*** (0.135) (0.137) (0.130) 1.480*** (0.165) 1.437*** (0.164) 1.777*** (0.227) (0.141) (0.144) (0.172) (1.409) (3.636) 1.181 (0.241) 1.203 (0.249) (0.200) (0.202) 1.050 (0.197) 1.280 (0.247) (0.274) (0.268) 0.966 (0.229) 1.003 (0.242) (0.130) (0.137) Legend: — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p-value < 0.05, * = statistically significant at p-value < 0.1. Appendix XIII: Full Promotion Regression Results (0.117) (0.117) (0.124) (0.127) (0.127) 1.028 (0.160) 1.034 (0.162) 1.089 (0.173) 1.220 (0.202) 1.321 (0.226) (0.0613) (0.0577) (0.0612) Age at entry, squared 1.002** (0.00104) 1.003*** (0.00101) 1.003** (0.00106) Years of government service, squared (0.000948) (0.00101) (0.00114) 0.954 (0.125) 0.996 (0.137) 0.918 (0.130) (0.139) (0.154) (0.200) 0.546* (0.182) 0.654 (0.223) 0.827 (0.306) 4.998*** (1.128) 3.924*** (0.907) Odds ratio (standard error) (0.326) (0.321) 0.586* (0.185) 0.514** (0.165) (0.418) (0.413) 1.168 (0.551) 1.139 (0.552) (0.189) (0.145) 1.156 (0.451) 0.882 (0.354) 0.00502*** (0.00303) 0.00513*** (0.00310) 0.00510*** (0.00308) 0.211 (0.312) 0.547 (0.813) 0.00422** (0.0100) Legend: — = not applicable, √ = controls applied, *** = statistically significant at p-value < 0.01, ** = statistically significant at p-value < 0.05, * = statistically significant at p-value < 0.1. Tables 56 and 57 summarize the multivariate statistical regression results (specifically, duration regression results) for our estimates of the percentage differences in odds of promotion for two groupings of racial or ethnic minorities in the U.S. Agency for International Development’s (USAID) Civil and Foreign Services. We examined odds of promotion for African Americans and non– African American racial or ethnic minorities compared with whites. We examined odds of promotion for the individual racial or ethnic groups—African Americans, Hispanics, Asians, and other racial or ethnic minorities—compared with whites. Our analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, our analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. Veteran’s status Transferring between the Foreign and Civil Services Having a hardship assignment in the prior year (Foreign Service only) Having an overseas post in the prior year (Foreign Service only) Proficiency in two or more languages other than English (Foreign Service only) Fiscal year fixed effects (indicator variables representing the fiscal year) The third model, which was limited to fiscal years 2011 through 2018, controlled for the same variables as the second model and also controlled for use of long-term leave in the previous year. Table 56 summarizes the regression results for our estimates of the percentage differences in odds of promotion for the two groupings of racial or ethnic minorities compared with whites in the Civil Service. For the first grouping, we found statistically significantly lower odds of promotion from GS-11 through GS-15 for African Americans than for whites in fiscal years 2002 through 2018 (model 2). The odds of promotion from GS-12 to GS-13 were also statistically significantly lower for non–African American racial or ethnic minorities during the same period. For the second grouping, we found statistically significantly lower odds of promotion from GS-12 to GS-13 for Asians than for whites in fiscal years 2002 through 2018. (46) (24) (24) (31) (74) -49 (22) -30 (22) -2 (31) 2 (38) Other racial or ethnic minority (198) (27) (26) (68) Legend: GS = General Schedule, *** statistically significant at p-value < 0.01, ** statistically significant at p-value < 0.05, * statistically significant at p- value < 0.1, — = not applicable. Table 57 presents the summary of the regression results for our estimates of the percentage differences in odds of promotion for the two groupings of racial or ethnic minorities compared with whites in the Foreign Service. For the first grouping, we found statistically significantly lower odds of promotion from Class 4 to Class 3 for African Americans than for whites in fiscal years 2002 through 2018 (model 2). For the second grouping, we found statistically significantly lower odds of promotion from Class 3 to Class 2 for members of the “Other” racial or ethnic minority group than for whites in fiscal years 2011 through 2018 (model 3). In addition to the contacts named above, Mona Sehgal (Assistant Director), David Hancock (Analyst-in-Charge), Cody Knudsen, Moon Parks, Nisha Rai, Deirdre Sutula, and Melinda Cordero made key contributions to this report. Reid Lowe, Justin Fisher, Nicole Willems, and Chris Keblitis provided technical assistance.", "summary": "USAID has a stated commitment to fostering an inclusive workforce that reflects the diversity of the United States and has undertaken efforts to increase diversity in its Civil and Foreign Services. However, concerns about the demographic composition of USAID's workforce are longstanding. GAO was asked to review issues related to the diversity of USAID's workforce. This report examines, among other things, the demographic composition of USAID's workforce in fiscal years 2002 through 2018, differences between promotion outcomes for racial or ethnic minorities, and the extent to which USAID has identified workforce diversity issues and worked to address those issues. GAO analyzed USAID's personnel data for its full-time, permanent, career workforce for fiscal years 2002 through 2018—the most recent available data. GAO's analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, GAO's analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. GAO also reviewed USAID documents and interviewed USAID officials and members of 13 employee groups. The overall proportion of racial or ethnic minorities in the U.S. Agency for International Development's (USAID) full-time, permanent, career workforce increased from 33 to 37 percent from fiscal year 2002 to fiscal year 2018. The direction of change for specific groups varied. For instance, the proportion of Hispanics rose from 3 to 6 percent, while the proportion of African Americans fell from 26 to 21 percent. The proportions of racial or ethnic minorities were generally smaller in higher ranks. During this period, the overall proportion of women increased from 51 to 54 percent, reflecting their growing proportion in USAID's Foreign Service. 8 Promotion outcomes at USAID were generally lower for racial and ethnic minorities than for whites in early to mid career. When controlling for factors such as occupation, GAO found statistically significant odds of promotion in the Civil Service were 31 to 41 percent lower for racial or ethnic minorities than for whites in early and mid career. In the Foreign Service, average promotion rates were lower for racial or ethnic minorities in early to mid career, but differences were generally not statistically significant when GAO controlled for various factors. USAID has previously identified underrepresentation of specific groups in its workforce, but staffing gaps, partly due to a lack of senior leadership attention, prevent the agency from consistently performing required Equal Employment Opportunity (EEO) activities. The Office of Civil Rights and Diversity (OCRD), responsible for USAID's EEO program, has been significantly understaffed. Vacancy rates in most OCRD divisions were 50 percent or higher in November 2019 and, despite attempts to hire more staff, remained at 30 to 50 percent as of April 2020. These staffing gaps have limited OCRD's capacity to process EEO complaints and investigations within mandated timeframes and analyze USAID's demographic data. Staffing gaps also prevented OCRD from submitting required reporting on the status of its EEO program in fiscal year 2018. A lack of consistent leadership in OCRD as well as a lack of senior USAID leadership attention to diversity has contributed to OCRD's staffing gaps. As a result, USAID lacks the capacity to respond to allegations of discrimination, identify potential barriers to equal employment opportunity, and submit required annual reports on the progress of its diversity and inclusion efforts in a timely manner—all of which are required EEO functions. GAO is making four recommendations to USAID, including three to perform required EEO activities and one to demonstrate senior leadership attention to diversity efforts. USAID concurred with the recommendations.", "document_type": "gao"}
{"report": "The Improper Payments Information Act of 2002 (IPIA), as amended by IPERA and the Improper Payments Elimination and Recovery Improvement Act of 2012, requires executive branch agencies, among other things, to (1) review all programs and activities and identify those that may be susceptible to significant improper payments (commonly referred to as conducting a risk assessment), (2) publish improper payment estimates for those programs and activities that the agency identified as being susceptible to significant improper payments, (3) implement corrective actions to reduce improper payments and set reduction targets, and (4) report on the results of addressing the foregoing requirements. IPERA also requires executive agencies’ IGs to annually determine and report on whether their respective agencies complied with six IPERA- related criteria. If an agency does not meet one or more of the six IPERA criteria for any of its programs or activities, the IG considers the agency to be noncompliant overall. The six criteria are as follows: 1. publish a financial report in the form and including all content required by OMB—typically an AFR or a PAR—for the most recent fiscal year, and post that report on the agency website; 2. conduct a program-specific risk assessment, if required, for each program or activity that conforms with IPIA, as amended; 3. publish improper payment estimates for all programs and activities deemed susceptible to significant improper payments; 4. publish corrective action plans for those programs and activities assessed to be susceptible to significant improper payments; 5. publish and meet annual reduction targets for all programs and activities assessed to be at risk for significant improper payments; and 6. report a gross improper payment rate of less than 10 percent for each program and activity for which an improper payment estimate was published. As described above, not all criteria are applicable to every agency. For example, if an agency publishes a financial report and conducts a risk assessment and determines that none of its programs or activities are susceptible to significant improper payments, then the remaining criteria would not be applicable. OMB plays a key role in implementing laws related to improper payment reporting. As required by statute, OMB has established guidance for federal agencies on estimating, reporting, reducing, and recovering improper payments. Such guidance includes OMB Circular A-123 Appendix C, Requirements for Payment Integrity Improvement, which also includes guidance to IGs on determining agency compliance with IPERA. The Council of the Inspectors General on Integrity and Efficiency (CIGIE) also published guidance in July 2019 to assist IGs who are required to conduct an annual improper payment review under IPERA. We continued to report improper payments as a material weakness in internal control in our audit report on the U.S. government’s consolidated financial statements for fiscal years 2018 and 2017 because of the federal government’s inability to determine the full extent to which improper payments occur and reasonably ensure that appropriate actions are taken to reduce them. We have also reported that estimation of improper payments is key to understanding the extent of the problem and to developing effective corrective actions to address it. However, the government’s ability to understand the full scope of its improper payments is hindered by incomplete, unreliable, or understated estimates; risk assessments that may not accurately assess the risk of improper payment; and noncompliance with criteria listed in IPERA. For example, we previously reported that issues and inconsistencies we identified in selected agencies’ processes for estimating improper payments may affect the quality of their estimates. In addition, certain IGs have reported issues with their agencies’ reported improper payment estimates that were caused by insufficient sampling methods and flawed estimation methodologies for calculating and reporting improper payment estimates. Based on agencies that reported improper payment estimates in their AFRs and PARs, government-wide estimated improper payments for fiscal years 2019 and 2018 totaled about $175 billion and $151 billion, respectively. See appendix I for the reported amounts by agency and program for fiscal years 2019 and 2018. As shown in figure 1, of the $175 billion for fiscal year 2019, about $121 billion (approximately 69 percent) is concentrated in three program areas: (1) Medicaid, totaling about $57.4 billion (approximately 32.8 percent); (2) Medicare (comprised of three reported programs: Fee-for-Service (Parts A and B), Advantage (Part C), and Prescription Drug (Part D)), totaling about $46.2 billion (approximately 26.5 percent); and (3) Earned Income Tax Credit (EITC), totaling about $17.4 billion (approximately 9.9 percent). Key information contained in agency AFRs and PARs regarding the types and causes of fiscal year 2019 estimates of improper payments, and reasons for significant changes in reported estimates from fiscal year 2018, are summarized as follows: The $175 billion total reported government-wide estimates for fiscal year 2019 is broken down per OMB’s Paymentaccuracy.gov Data Call Instructions by type as follows: overpayments, totaling about $79.1 billion (approximately 45.2 underpayments, totaling about $12.9 billion (approximately 7.4 unknown, totaling about $74.1 billion (approximately 42.4 technically improper due to statute or regulation, totaling about $8.7 billion (approximately 5 percent). About $74.6 billion (approximately 42.7 percent) of the government- wide estimates was reported as monetary loss. About $151.2 billion (approximately 86.6 percent) of the reported government-wide improper payment estimates for fiscal year 2019 related to root causes that occurred in the three areas below. See appendix II for details on the root causes that agencies identified for their reported improper payment estimates for fiscal year 2019. Insufficient documentation to determine payment accuracy. About $74.1 billion (approximately 42.4 percent) resulted from situations where the agency lacked supporting documentation necessary to verify the accuracy of the payments. Administrative or process error. About $39.1 billion (approximately 22.4 percent) resulted from incorrect data entry, classifying, or processing of applications or payments. Inability to authenticate eligibility. About $38 billion (approximately 21.8 percent) resulted from the agency not being able to authenticate eligibility criteria. The fiscal year 2019 total reported government-wide estimated improper payments, among programs that reported estimates, increased by about $24 billion from the fiscal year 2018 total reported. While decreases in estimated improper payments were reported for several programs, these were offset by increases for certain other programs. Between fiscal years 2018 and 2019, six programs had an increase and five programs had a decrease of over $1 billion in estimated improper payments. Appendix III provides information on all the programs that had a substantial change in estimated improper payments between fiscal years 2018 and 2019 and the reasons for those changes as reported in agency AFRs. Examples of substantial changes in improper payments and the reasons for such changes that agencies provided in their AFRs include the following: Department of Health and Human Services (HHS) reported an increase in the total estimated improper payments for the Medicaid program in excess of $21.1 billion for fiscal year 2019. The majority of the increase in the total estimated improper payments for the Medicaid program was due to HHS’s reintegration of the eligibility component of the Payment Error Rate Measurement (PERM) for Medicaid for fiscal year 2019. From fiscal years 2015 through 2018, HHS did not estimate improper payments attributed to eligibility determinations, but did include a proxy estimate, which was the last reported rate in fiscal year 2014 for the eligibility component, while HHS worked to update this component. For fiscal year 2019, HHS estimated improper payments attributed to eligibility determinations in 17 states (about one-third of all states). HHS’s national eligibility estimated improper payment rate still includes a proxy estimate for 34 remaining states that have not yet been measured since the reintegration of the PERM eligibility component. HHS reported that most eligibility errors identified through the new measurement process were due to insufficient documentation to verify eligibility or noncompliance with eligibility redetermination requirements. HHS also reported that these insufficient documentation situations were related primarily to income or resource verifications. HHS’s fiscal year 2019 AFR noted that another significant cause for estimated Medicaid improper payments is errors resulting from state noncompliance with provider screening and enrollment requirements. The Department of the Treasury (Treasury) began reporting improper payment estimates for fiscal year 2019 for two programs deemed newly susceptible to significant improper payments. Specifically, Treasury reported about $7.2 billion and $2.1 billion in improper payment estimates for Additional Child Tax Credit and American Opportunity Tax Credit, respectively. In addition, HHS reported a decrease in the total estimated improper payments for the Medicare Fee-for-Service (Parts A and B) program of about $2.7 billion. According to HHS’s fiscal year 2019 AFR, the decrease in the estimate is due to a reduction in estimated improper payments for home health; Medicare Fee-for- Service Part B; and Durable Medical Equipment, Prosthetics, Orthotics, and Supplies claims. As stated earlier, the federal government’s ability to understand the full scope of its improper payments is hindered by incomplete, unreliable, or understated agency estimates and risk assessments that may not accurately assess the risk of improper payment. For example, certain federal programs and activities that agencies determined to be at risk for significant improper payments did not report estimates of improper payments for fiscal year 2019, including the Premium Tax Credit and Temporary Assistance for Needy Families programs, and as we previously reported, the Department of Defense (DOD) lacks quality assurance procedures to ensure the completeness and accuracy of the payment populations from which it develops improper payment estimates. Eight years after the implementation of IPERA, half of the 24 CFO Act agencies were compliant with IPERA overall for fiscal year 2018, as reported by their IGs. See appendix IV for each CFO Act agency’s overall compliance with IPERA. With regard to the six IPERA criteria, as shown in figure 2, IGs reported all agencies as compliant with the requirement to conduct program-specific risk assessments if it was applicable to the agency. In addition, 22 of 24 agencies (92 percent) met the requirement to publish a PAR or AFR. Based on the IGs’ fiscal year 2018 compliance reports, agencies were most frequently reported as noncompliant with the IPERA requirement to publish and meet annual targets for improper payment reduction. Out of the 14 agencies for which this requirement was applicable, IGs for eight agencies (57 percent) reported that their agencies were noncompliant. The second most-frequently reported area of noncompliance related to the IPERA requirement for agencies’ reported improper payment rates to be below 10 percent for programs that published estimates. Out of the 15 agencies for which this requirement was applicable, IGs for five agencies (33 percent) reported that their agencies were noncompliant. See appendix IV for additional details on each CFO Act agency’s compliance with the six IPERA criteria for fiscal year 2018, as reported by their IG. In addition, IGs for certain CFO Act agencies reported quality issues in their agencies’ reporting of improper payment data. Although the issues did not result in noncompliance with the related IPERA criterion, the IGs noted these as areas that need improvement. For example, one agency reported inaccurate amounts for identified and recaptured improper payments in its AFR. However, the IG reported that the agency was compliant with the IPERA criterion for publishing financial information in a PAR or AFR. Another agency’s IG reported that its agency did not accurately evaluate its corrective actions’ effectiveness in recapturing improper payments. However, the IG reported that the agency was compliant with the IPERA criterion to publish corrective action plans. As we stated above pertaining to the IGs’ determination of compliance with IPERA criteria, these determinations are based on whether the agency met the requirements and is not a judgment on the quality of the work conducted in order to meet those requirements. As stated above, IGs for 12 of the 24 CFO Act agencies reported that their agencies were compliant with IPERA overall for fiscal year 2018. As shown in figure 3, this is an increase from 10 agencies reported as compliant for fiscal year 2017, and 11 agencies reported as compliant for fiscal year 2016. The improvement in IPERA compliance is attributable to the Departments of Commerce and Education, which were reported by their IGs as noncompliant in fiscal year 2017 but compliant in fiscal year 2018. No agencies that IGs reported as compliant in fiscal year 2017 were reported as noncompliant in fiscal year 2018. In addition, the IGs reported that 21 programs within these agencies were noncompliant with IPERA for each of the past 3 fiscal years (2016–2018). Improper payment estimates for these programs totaled about $78 billion, representing approximately 52 percent of the $151 billion government- wide reported improper payment estimates for fiscal year 2018. As shown in table 1, this includes improper payment estimates for Medicaid of about $36 billion and for EITC of about $18 billion. As shown in figure 4, the number of programs reported as noncompliant with IPERA for 3 or more consecutive years has increased since fiscal year 2016. Specifically, the number of programs reported as noncompliant for 3 or more consecutive years increased from 14 programs in fiscal year 2016 to 18 programs in fiscal year 2017 and 21 programs in fiscal year 2018. The reported improper payment estimates for these programs totaled about $109 billion for fiscal year 2016, $74 billion for fiscal year 2017, and $78 billion for fiscal year 2018. The total improper payment estimates for programs reported as noncompliant for 3 or more consecutive years decreased for fiscal 2017 primarily because the Medicare Fee-for-Service program, with about $41 billion of improper payments in fiscal year 2016, was reported as compliant beginning fiscal year 2017. We provided a draft of this report to OMB and CIGIE for review and comment. CIGIE stated that it had no comments. OMB did not provide any comments. We also provided the full draft for review and comment to agencies and respective IG offices we met with throughout the course of this work. In addition, we sent summary facts to other agencies that had substantial changes in reported improper payment estimates between fiscal years 2018 and 2019 (as shown in app. III), and provided the full draft for review and comment, upon request, to those agencies. We received written comments from the U.S. Agency for International Development, which is reproduced in appendix V. The Department of Health and Human Services, Department of Veterans Affairs, and the Social Security Administration’s Office of Inspector General provided technical comments, which we incorporated in the report as appropriate. The remaining agencies and IG offices informed us that they had no comments. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Chairman of the Council of the Inspectors General on Integrity and Efficiency, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2623 or davisbh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Table 2 details the improper payment estimates and rates that federal agencies reported to the Office of Management and Budget or in their agency financial reports or performance and accountability reports for fiscal years 2019 and 2018. In addition, as shown in the table 2, 17 programs had a substantial change in their reported improper payment estimates or rates between fiscal years 2018 and 2019. The reasons for the changes, as reported in the agency financial reports, are detailed in appendix III. Table 3 shows the government-wide agency-reported improper payment estimates and rates for fiscal year 2019, grouped by Office of Management and Budget (OMB) improper payment root cause categories. OMB defines the root cause categories as follows: Insufficient documentation to determine: For this category, there is a lack of supporting documentation necessary to verify the accuracy of a payment identified in the improper payment testing sample. For example, a program does not have documentation to support a beneficiary’s eligibility for a benefit, and without that particular documentation, the agency is unable to discern that the payment was for the correct amount or went to the right recipient. Administrative or process errors: In this category, errors were caused by incorrect data entry, classifying, or processing of applications or payments. For example, an eligible beneficiary receives a payment that is too high or too low because of a data entry mistake (such as transposing a number) or an agency enters an incorrect invoice amount into its financial system. Inability to authenticate eligibility: In this category, an improper payment is made because the agency is unable to authenticate eligibility criteria. These types of errors include but are not limited to (1) inability to access data and (2) data needed do not exist. Program design or structural issue: For this category, improper payments result from the design of the program or a structural issue. For example, a scenario in which a program has a statutory (or regulatory) requirement to pay benefits when due, regardless of whether all the information has been received to confirm payment accuracy. Medical necessity: For this category, a medical provider delivers a service or item that does not meet coverage requirements for medical necessity (for example, providing a power wheelchair to a patient whose medical record does not support meeting coverage requirements for a power wheelchair). Failure to verify data: In this category, the agency (federal, state, or local), or another party administering federal dollars, fails to verify appropriate data to determine whether a recipient should be receiving a payment, even though such data exist in government or third-party databases. In these situations, the data needed exist, and the agency or other party administrating federal dollars had access to them but did not check the payment against those data prior to making the payment. Other reason: This category covers when the improper payment does not meet any of the above categories. Table 4 shows the 17 programs that had a substantial change in the improper payment estimates or rates between fiscal years 2018 and 2019, and the reasons for those changes, as reported in the agency financial reports. Figure 5 details the Chief Financial Officers Act of 1990 (CFO Act) agencies’ overall compliance with the Improper Payments Elimination and Recovery Act of 2010 (IPERA), as well as the agencies’ compliance with each of the six IPERA criteria for fiscal year 2018, as reported by their inspectors general. Beryl H. Davis, (202) 512-2623 or davisbh@gao.gov In addition to the contact named above, Matt Valenta (Assistant Director), Cherry Vasquez (Auditor in Charge), Pat Frey, Jason Kelly, Jim Kernen, Anne Thomas, Judy Tsan, and Landon Western made key contributions to this report.", "summary": "Improper payments—payments that should not have been made or that were made in incorrect amounts—continue to be an area of fiscal concern in the federal government. Improper payments have been estimated to total almost $1.7 trillion government-wide from fiscal years 2003 through 2019. From fiscal year 2003 through 2016, a government-wide estimate and rate had been included in government-wide financial reports based on the programs and activities that reported estimates. However, financial reports for fiscal years 2017 and 2018 did not include a government-wide improper payment estimate or rate. Agency-reported improper payment estimates are posted on the Office of Management and Budget's Paymentaccuracy.gov website. IPERA requires IGs to annually determine and report on whether executive branch agencies complied with six IPERA criteria, such as conducting risk assessments and publishing and meeting improper payment reduction targets. This report summarizes (1) federal agencies' reported improper payment estimates for fiscal years 2018 and 2019, and reasons for substantial changes between years, and (2) CFO Act agencies compliance with IPERA criteria for fiscal year 2018, as determined by their IGs, and overall compliance trends for fiscal years 2016 through 2018. GAO summarized (1) improper payment estimates from agency financial reports and Paymentaccuracy.gov and (2) information on CFO Act agencies' IPERA compliance reported in IGs' fiscal year 2018 IPERA compliance reports and prior GAO reports. Agency-reported improper payment estimates for fiscal year 2019 totaled about $175 billion, based on improper payment estimates reported by federal programs, an increase from the fiscal year 2018 total of $151 billion. Of the $175 billion, about $121 billion (approximately 69 percent) was concentrated in three program areas: (1) Medicaid, (2) Medicare, and (3) Earned Income Tax Credit. About $74.6 billion (approximately 42.7 percent) of the government-wide estimate was reported as monetary loss, an amount that should not have been paid and in theory should or could be recovered. However, the federal government's ability to understand the full scope of its improper payments is hindered by incomplete, unreliable, or understated agency estimates; risk assessments that may not accurately assess the risk of improper payment; and agencies not complying with reporting and other requirements in the Improper Payments Elimination and Recovery Act of 2010 (IPERA). Eight years after the implementation of IPERA, half of the 24 Chief Financial Officers Act of 1990 (CFO Act) agencies—whose estimates account for over 99 percent of the federal government's reported estimated improper payments—complied with IPERA overall for fiscal year 2018, as reported by their inspectors general (IG). Based on the IGs' fiscal year 2018 compliance reports, agencies were most frequently reported as noncompliant with the requirement to publish and meet annual targets for improper payment reduction. Out of the 14 agencies for which this requirement was applicable, eight agencies were noncompliant. The second most-frequently reported area of noncompliance related to the requirement for agencies' reported improper payment rates to be below 10 percent for programs that published estimates. Out of the 15 agencies for which this requirement was applicable, five agencies were noncompliant. Chief Financial Officers Act of 1990 Agencies' Fiscal Year 2018 Compliance with IPERA Criteria, as Reported by Their IGs The IGs reported that 21 programs were noncompliant with IPERA for each of the past 3 fiscal years (2016–2018). These programs represented about $78 billion, or approximately 52 percent of the $151 billion government-wide reported improper payment estimates for fiscal year 2018.", "document_type": "gao"}
{"report": "DOD began the F-35 development program in October 2001 with plans to produce next-generation aircraft to replace aging aircraft in the military services’ inventories. Figure 1 shows the F-35 in flight. The program has developed and is delivering three variants of the F-35 aircraft; the F-35A conventional takeoff and landing variant for the Air Force, the F-35B short takeoff and vertical landing variant for the Marine Corps, and the F-35C carrier-suitable variant for the Navy. The characteristics of the services’ variants are similar, but each service’s variant also has unique operating requirements. For example, the Marine Corps requires that the F-35B be capable of operating from aircraft carriers, amphibious ships, and main and austere operating bases alike, requiring the ability to conduct short take offs and vertical landings. In March 2005, we found that the F-35 program had started development without adequate knowledge of the aircraft’s critical technologies or a solid design. Further, DOD’s acquisition strategy called for high levels of concurrency between development and production, which runs counter to best practices for major defense acquisition programs. In our prior work, we identified the F-35 program’s lack of adequate knowledge and high levels of concurrency as the major drivers of the program’s significant cost and schedule growth, and other performance shortfalls. Since the development program began in 2001, it has been restructured three times with revised cost and schedule estimates. The most recent restructuring was initiated in 2010 when the program’s cost estimates exceeded certain thresholds established by statute—a condition known as a critical Nunn-McCurdy breach. DOD subsequently certified to Congress in June 2010 that the program was essential to national security and needed to continue. DOD then established a new acquisition program baseline in 2012 that added $162.7 billion to the program’s cost estimate and extended the original delivery schedule by 5-6 years. Since then, the program’s cost and schedule estimates, as well as the expected number of aircraft to be delivered, have remained relatively stable, as shown in table 1. Of the F-35’s $406 billion estimated acquisition cost, DOD needs a majority of the funding ($270.3 billion) to purchase aircraft over the next 26 years. Of that future funding, the program plans to spend between $9.6 billion and $14 billion each year through fiscal year 2031. In addition, the program’s sustainment costs to operate and maintain the F-35 fleet over the next 52 years are estimated to be $1.12 trillion. Though the program’s total planned quantities have been relatively stable, the program’s timeframes for procuring these aircraft have changed multiple times. Since the start of development, the program has pushed the procurement of more than half of the total aircraft planned into the future, mostly due to significant concurrency between development and production. Specifically, the program office had originally planned to procure almost 2,000 aircraft by fiscal year 2019. However, according to the current plan, by the end of 2019, the program will have procured just over 500 aircraft. The F-35 baseline aircraft development program was complete in April 2018, when developmental testing concluded. As we reported in June 2018, the program office reported it had met all nine of its capability thresholds—or the minimum acceptable value for each capability—and delivered three of those nine capabilities. However, we also reported that the program has to complete operational testing before DOD can determine if the six remaining capabilities have been delivered. The purpose of operational testing is to assess the effectiveness, suitability, survivability, lethality, and mission capability of the F-35, including the information systems and the air vehicle, in an operationally representative environment. Operational testing includes cyber security assessments, some of which have been conducted. Production of the F-35 began in 2007 while development was in its early stages and before developmental flight testing had started. As a result of this concurrent development, the 357 aircraft delivered through 2018 will need retrofits to fix deficiencies and design issues found during testing. The program’s total estimated cost of concurrency is $1.4 billion. The program office plans for over 500 aircraft to be procured by the time operational testing is completed. Until operational testing is complete, there is a risk that additional problems with the aircraft may be identified. As a result, the concurrency costs of retrofitting delivered aircraft could increase. The F-35 program started formal operational testing in December 2018 after a 3-month delay. This testing was delayed for two main reasons: (1) to resolve critical deficiencies and (2) to accommodate an unexpected grounding following the crash of an F-35B in September 2018. According to a test official, the program expects to complete testing in December 2019, about three months later than planned due to delays with the simulator that is used for more complex testing. Figure 2 shows the program’s planned end to developmental testing and planned timeframes for operational testing for 2012 and the past four years and the delays the program has realized each year since the program was re-baselined in 2012. The operational testing was delayed for the following two main reasons. Resolution of deficiencies: First, before the program could begin operational testing, it had to resolve critical deficiencies with the aircraft that were identified during development testing. The program categorizes deficiencies according to their potential impact on the aircraft’s performance. Category 1 deficiencies are considered critical and could jeopardize safety, security, or another requirement. Category 2 deficiencies are those that could impede or constrain successful mission accomplishment. In January 2018, the F-35 program had 966 open deficiencies—111 category 1 and 855 category 2. At that time, the program planned to move forward before resolving all of them. In June 2018, we recommended that the Secretary of Defense direct the F-35 program to resolve all these deficiencies before the program’s October 2019 full-rate production decision. According to DOD officials, over the past year, the program has made progress in reducing the number of open deficiencies by resolving, re-categorizing, closing, or combining them. For example, in 2018, the program resolved nearly 50 category 1 deficiencies and re- categorized over 50 others to category 2. As a result, the program received approval from the Under Secretary of Defense for Acquisition and Sustainment to begin formal operational testing with 13 category 1 deficiencies and almost 900 category 2 deficiencies. According to the Program Executive Officer, none of the open category 1 deficiencies are a safety of flight concern, and all of them have operational workarounds. A current example of an open category 1 deficiency is with lines on the F- 35’s landing gear, which can rupture when a tire blows, potentially causing loss of a major aircraft system such as the brakes. Such an event requires some repair work to the landing gear, but contractor officials explained that it is not a safety concern. According to the program office, it is not a safety concern because the current workaround for this deficiency is pilot training to avoid braking on the side of the blown tire. Program test officials said that testing with deficiencies is not uncommon and they will continue to work to address them, but some may not be fully resolved for several years. Unexpected grounding: In October 2018, the F-35 fleet was grounded after the program identified a manufacturing fault with an engine fuel tube—a component in the F-35 engine produced by Pratt & Whitney. The fault was found in an inspection that stemmed from an F-35B crash in September 2018. This was the first crash of an F-35. Of the 23 operational test aircraft, the program replaced the fuel tubes on 18 aircraft by the start of operational testing in December 2018, which contributed to the 3-month delay. This and other key technical risks are described in more detail in appendix III. In addition to starting operational testing and the unexpected grounding, the program and the airframe contractor Lockheed Martin experienced other major events over the past year, as shown in figure 3. For example, the United States completed its first F-35 combat mission in September 2018 when an F-35B successfully hit a target in Afghanistan. The program took steps to mitigate delays to the start of operational testing. For example, the program office, in coordination with DOT&E, received approval to conduct some preoperational testing events starting in January 2018, before the official start date in December. According to DOT&E officials, the outcome of these preoperational test events should count towards the completion of operational testing. This included cold weather testing in Alaska, which took advantage of appropriate weather conditions. Despite the 3-month delay, program officials stated that they consider the F-35 operational test schedule to be adequate for addressing schedule risks, which pertain to unresolved deficiencies and potential problems with the availability of test and support aircraft, ground systems, test ranges, and necessary test models and simulations. According to a test official, as of April 2019, some of these risks have been realized, such as the delay with the simulator, and as a result, the end of operational testing is now planned for December 2019. In addition, there is the possibility of new deficiencies emerging from operational testing. Unresolved deficiencies: Existing or new deficiencies could negatively affect test results. According to DOT&E officials, since the start of operational testing, four new category 1 deficiencies have been identified, bringing the total to 17. According to DOD officials, it would not be unexpected during the course of operational testing for the program to discover additional deficiencies that may require resolution and re-testing. Availability of test and support aircraft: According to test officials, F-16s and F-18s are needed to represent adversaries during F-35 operational tests. These assets may not be available because they also support other test programs. According to officials, the F-35 program does not have control over the availability of these aircraft and must work with the Navy and Air Force to negotiate their use. In addition, the limited availability of F-35 test aircraft, in part due to R&M issues and shortages of replacement parts, may also pose a challenge to completing test events, according to officials. Availability of ground systems: Ground systems required for operational testing, such as the DOT&E developed Radar Signal Emulators, are late in development and may not be available when required. According to DOT&E officials, the emulators imitate modern threat radar capabilities of adversarial nations but their integration with the test range is approximately a year behind schedule. The program is currently using other threat simulators. DOT&E officials stated that they are working to have the radars ready by the spring of 2019, when needed. Availability of test ranges: Test officials at Edwards Air Force Base expressed concern about the availability of test ranges, which the F- 35 program shares with other programs. According to test officials, the F-35 was the fifth in line, in terms of priority, to use the range at Edwards Air Force Base, as of October 2018. DOT&E officials, however, stated that they did not observe any range availability issues during the F-35’s first month of operational testing. Availability of test models and simulations: According to program officials, the program’s testing simulator, which runs the F-35’s mission systems software and provides test scenarios that cannot be replicated in a real-world environment, will not be complete until at least November 2019. Completion of the testing simulator was originally scheduled for the end of 2017. Any additional delays in operational testing could affect another upcoming program decision: DOD’s decision to begin full-rate production in December 2019. This decision is typically made after operational testing is completed. The F-35 program has made slow, sustained progress in improving the F- 35’s R&M. R&M determines the likelihood that the aircraft will be in maintenance rather than available for operations. Each F-35 aircraft variant is measured against eight R&M metrics, four of which are in part of the contract. All F-35 variants are generally performing near or above targets for half of the R&M metrics while the other four are still falling short, which is the same as last year. While the program is on track to meet the targets for half of the metrics, the program has not taken adequate steps to ensure the targets for the others will be met. While DOD has an action plan to improve R&M, its guidance does not define specific, measurable objectives for what the desired goals for the F-35’s R&M performance should be. Furthermore, the program office has not prioritized funding for projects that will improve the R&M metrics that are not meeting their targets. All F-35 variants are measured against eight R&M metrics’ targeted performance levels, and all variants are generally performing near or above targets for four of the eight R&M metrics. This represents little change from their overall performance last year. All eight R&M metrics are described in the program’s Operational Requirements Document (ORD)—the document that outlines the requirements DOD and the military services agreed the F-35 should meet. However, in December 2018, DOT&E reported that, although performance for the four under- performing metrics has shown slow growth over the years, none of these metrics were meeting interim goals needed to reach requirements at each variant’s maturity. Each F-35 variants’ R&M performance against these metrics’ targets is shown in table 2. Since the program began tracking R&M performance in 2009, the program has seen small, annual improvements. Over the past year, all variants showed a slight improvement in targeted performance levels for one metric, the mean flight hours between failures (design controlled), but saw little or no discernable improvement for the four metrics not meeting targets. However, based on current performance, the program does not expect to meet those targets by full aircraft maturity. According to F-35 program officials, the ORD R&M metrics should be re-evaluated to determine more realistic R&M performance metrics, but they have not yet taken actions to do so. Until it does so, the program office remains accountable for ensuring those ORD R&M metrics are achieved. In June 2018, we recommended that the F-35 program identify what steps it needs to take to ensure the F-35 aircraft meet R&M requirements before each variant reaches maturity and update its R&M Improvement Program (RMIP)—DOD’s action plan for prioritizing and funding R&M improvement projects—with these steps. DOD concurred with our recommendation but has yet to take substantive actions to address it. It did, however, complete 16 improvement projects since we last reported on this. Despite completing these projects, there were not significant gains in the R&M metrics not meeting targets. Program officials advised, however, that measurable improvements in R&M can take time to manifest. To speed this process, the program is accelerating planned upgrades to older aircraft where appropriate, which officials stated should translate to an overall improvement in the program’s R&M performance. The F-35 program office has estimated that implementing all of the identified improvement projects currently contained in its RMIP could result in potential life cycle cost savings of over $9.2 billion by improving the F-35’s R&M. As of December 2018, the guidance the F-35 program office has used to implement the RMIP does not define specific, measurable objectives for what the desired goals for the F-35’s R&M performance should be or align improvement projects with R&M goals. Furthermore, the RMIP has not been a funding priority. Federal internal control standards state that programs should define objectives when implementing programs such as the RMIP. Although the F-35 program RMIP’s guidance has a general goal of improving R&M, it does not identify achieving the targets for the eight R&M metrics the program tracks as an objective. Program officials acknowledged that the RMIP’s guidance does not include such an objective. Instead, officials are using the RMIP to prioritize and fund projects that will improve aircraft availability and mission capability—neither of which are included in the eight R&M metrics, but are necessary and important initiatives. Officials stated that by prioritizing these projects, they will eventually improve performance under all R&M metrics, including the four that are not meeting targets. The RMIP’s guidance, however, does not discuss these priorities or align improvement projects with the eight R&M metrics. In our prior work on weapon system acquisitions, we have identified a number of best practices for improving program outcomes, such as clearly establishing well-defined requirements and securing stable funding that matches resources to requirements. The F-35 program office has not prioritized or dedicated funding in its budget to improve R&M in part because program officials explained that they have been focused on initiatives intended to lower the cost of the aircraft. Further, any current funding for R&M improvement projects comes from the program’s operation and maintenance funds, which are only available for one fiscal year. Officials further explained that, if such funding runs out or is used by the program for other efforts, then R&M projects will go unfunded or be suspended until new funding is available. In fiscal year 2018, for example, while some R&M improvement projects were completed, several other projects were suspended when that year’s funding ran out. According to officials, these projects may not be started back up until fiscal year 2019. In addition, most of the R&M improvement projects that were approved in fiscal year 2018 were not funded. For example, as of December 2018, according to a contractor representative, all of the identified improvement projects currently unfunded in the program’s RMIP would cost about $30 million to implement, but are on hold and waiting to be funded. Program officials stated that they are in the process of revising the RMIP and have considered including more specific objectives, such as a focus on improving aircraft availability and mission capability and a focus on improving R&M performance where the ORD R&M metrics’ targets are not being met. Additionally, in its 2019 annual lifecycle sustainment plan, the program office noted that a dedicated annual budget for R&M improvement projects would benefit the program. According to the program, any revisions to the RMIP and changes to how it will be funded, however, will not be complete until April 2019 or later. Without defining measurable objectives in its RMIP guidance for meeting all eight R&M metrics and aligning which improvement projects will ensure those metrics are met, the program is at risk of not fully meeting its R&M goals. Further, without prioritizing funding for improving R&M, projects may continue to be either prematurely suspended or never get underway. As a result, the warfighter may accept aircraft that (1) are less reliable than originally described in the program’s ORD, and (2) have operation and sustainment costs that may raise affordability questions. With development of the baseline program complete, the program is transitioning to early development and testing for modernization efforts known as Block 4, which are expected to cost about $10.5 billion. The F- 35 program plans to award Block 4 development contracts starting in May 2019, before completing a business case—a baseline cost and schedule estimate to track the program’s performance going forward. In doing so, the program will commit resources without adequate knowledge of Block 4’s full cost, schedule, and level of technology maturity, putting Block 4 at risk of experiencing cost and schedule overruns similar to those experienced by the baseline program during its development. The National Defense Authorization Act for Fiscal Year 2017 required DOD to submit a report containing certain elements of an acquisition program baseline—in essence, a full program business case—to include the cost, schedule, and performance information for Block 4. In 2018, we found that DOD’s report to Congress was incomplete but included information on some elements of the Block 4 acquisition program baseline. In its report, DOD stated that the acquisition program baseline would continue to be refined over the next year. As a result, we presented a matter for congressional consideration to restrict Block 4 funding until the program established a complete business case. DOD’s report to Congress also outlined the F-35 program office’s new development approach to deliver Block 4 capabilities—new requirements beyond the baseline aircraft capabilities to address evolving threats. As we reported in June 2018, this new approach, meant to deliver capabilities to the warfighter faster, is referred to as Continuous Capability Development and Delivery (C2D2). This approach consists of 6-month development cycles in which small groups of capabilities will be developed, tested, and delivered as they are matured. In January 2018, the F-35 program started using this C2D2 approach to develop and test software updates to address deficiencies identified during testing. According to the contractor, the first two software updates also established a foundation for new Block 4 capabilities to be fully developed later. According to program officials, as of December 2018, the program has executed contract actions valued over $1.4 billion to establish testing facilities and support early Block 4 development of capabilities the program plans to deliver through 2024. According to DOD’s January report, results from this work will help the program inform its Block 4 business case. The F-35 program plans to award Block 4 development contracts without knowledge of the effort’s full cost or the maturity of critical technologies. Over the past year, the program has been working to complete its business case for Block 4, including incorporating Block 4 activities into its acquisition strategy—which was approved in October 2018. However, three key Block 4 business case documents will not be ready before the program’s planned May 2019 contract awards for development efforts. Independent technology readiness assessment: Although the contracts for Block 4 development efforts are planned to be awarded in May 2019, the program will not conduct an independent technology readiness assessment by that time. A technology readiness assessment is a systematic, evidence-based process that evaluates the maturity of hardware and software technologies critical to the performance of a larger system or the fulfillment of the key objectives of an acquisition program. According to a program official, the program will conduct its own assessments on a rolling basis as initial capabilities are developed. The official stated that technologies will not be integrated into the aircraft until they are adequately mature. The program office plans to conduct a partial assessment of initial capabilities sometime between October and December 2019 with additional assessments to follow. However, without an independent technology readiness assessment, the program has not identified potential critical technology elements and as a result, may be at risk of delaying the delivery of new capabilities. Test and evaluation master plan: Although the F-35 program has begun testing Block 4 capabilities, it does not have an approved test and evaluation master plan. The test and evaluation master plan documents the overall structure, strategy, and objectives of the test program as well as the associated resources needed for execution. It provides a framework for the program office to provide detailed test plans and subsequently determine the resources needed. Test officials have expressed concerns about the lack of an approved test plan, uncertain funding, the number of test aircraft available, and the draft test schedule, among other things. Officials were also concerned as to whether the Block 4 test aircraft would be in the same configuration as fielded aircraft, which are in earlier configurations than the test fleet. Further, DOT&E stated in its annual report that it considers the current Block 4 schedule to be high risk due to the large amount of planned capabilities that will be developed and tested in 6- month development cycles. An approved, properly resourced test plan is essential for planning and preparing for adequate testing of the Block 4 capabilities. Without an approved test and evaluation master plan, the F-35 program is providing the test authorities with capabilities to be tested without giving them the necessary direction on how to adequately prepare to conduct the tests. Specifically, test officials stated the F-35 program office has not provided details on which capabilities are planned for each testing development cycle making it difficult to execute testing. While this is still a concern, F-35 program officials explained that over the past 3 months they have been providing the test authorities with the direction needed to conduct testing. Independent cost estimate: The Block 4 independent cost estimate, which details the program’s total estimated life cycle cost, is not complete. In August 2017, we reported that DOD estimated the development funding needed for the first phase of modernization for Block 4 to be over $3.9 billion through 2022. Since then, the program incorporated more scope and fidelity into the Block 4 cost estimate, which has increased to $10.5 billion for Block 4 capabilities planned through 2024. The program office has provided its Block 4 cost estimate to the Cost Assessment and Program Evaluation office (CAPE) for an independent cost estimate. According to CAPE officials, they will provide the independent cost estimate between October and December 2019 to support the program’s full-rate production decision, but this would occur several months after the program plans to award the Block 4 development contracts. Without an independent cost estimate, Congress does not have insight into the full potential cost of the Block 4 effort. The expected completion dates for these documents are between October and December 2019, at the earliest. Figure 4 shows key Block 4 dates, the planned development contract awards, and planned completion dates for the remaining business case documents. Major defense acquisition programs generally follow DOD acquisition policy, which states that prior to the release of a development contract request for proposal, program officials should have confidence that program requirements are firm. Program officials should also clearly state that the risk of committing to development has been reduced or will be adequately reduced prior to contract award. According to best practices identified by GAO, without several of the business case documents completed, program officials cannot have a high level of confidence that the requirements are firm and that the risk to committing an estimated $10.5 billion in funding to Block 4 has been adequately reduced. According to program officials, business case documents have not been completed because they took a step back to re-examine their approach and the cost estimate for Block 4 that DOD established in 2017. Counter to acquisition best practices, the program plans to initiate additional development work before they acquire the requisite knowledge of the necessary levels of technology maturity and funding. Program officials have reported the planned modernization contracting efforts shown in table 3. If program officials move ahead with awarding Block 4 contracts without gaining the knowledge that a full business case could would provide, Block 4 modernization efforts will be at risk of experiencing the same kind of cost and schedule growth the baseline development program experienced. With a few exceptions, the negotiated prices for all F-35 variants have generally been decreasing with each production lot, and more aircraft are being procured in each lot. In particular, the F-35A’s price has decreased in each subsequent production lot, with the most recent price per aircraft at $89 million in lot 11, as shown in figure 5 below. In 2018, we reported that while the F-35 program faces affordability challenges, it was investing in several projects to reduce production and sustainment costs. According to DOD, to improve production affordability, the F-35 program office is continuing to make investments to lower the price of an F-35A to below $80 million by lot 13. To realize this goal, the F-35 program office and the prime contractor are increasing the production rate and investing in various initiatives to lower production costs. For example: According to the program office, it has invested a total of $320.3 million in efforts to improve manufacturing processes that it estimates could result in up to $7.9 billion in savings over the life of the program. In addition, the prime contractor has invested $90 million and plans to invest an additional $25 million to lower its production costs. DOD issued a contract announcement for economic order quantity purchases for use in production lots 13-14. This approach involves making large purchases of components that will be used across multiple procurement lots of aircraft to reduce production costs by buying components in bulk and achieving economies of scale. The program had expected $1.2 billion in cost savings from this effort, but according to estimates from the CAPE, cost savings will more likely be $595 million. In addition, according to program officials, once the program achieves full-rate production, it plans to utilize a multi-year procurement strategy, beginning in fiscal year 2021. This strategy is intended to have similar benefits as the economic order quantity purchases by providing industry with a stable, long-term demand. According to Pratt & Whitney, the cost of the engine is also declining. For example, the price of the F-35A and C engine dropped by $100,000 per engine over the past year. The most recent negotiated price is $11.9 million per engine. The F-35 airframe and engine contractors saw a significant increase in their production rates in 2018, but faced some production challenges as well. The airframe contractor—Lockheed Martin—increased its production rate by 50 percent and delivered a total of 91 aircraft in 2018, with a total of 267 aircraft on its production floor or in contract negotiations as of December 2018, as shown in figure 6. In addition, Lockheed Martin delivered more aircraft on time. In 2012, none of the planned aircraft deliveries were on time whereas in 2018, 58 percent were on time. To incentivize the contractor to improve on-time deliveries, the program office has added a performance incentive fee to the lot 11 production contract. Table 4 shows some improvements in Lockheed Martin’s production metrics since 2012 and over the past 2 years. Between 2012 and 2017, Lockheed Martin saw some improvement for all variants’ production metrics, with the F-35A showing improvements through 2018. However, over the past year, several metrics for the F- 35Bs and F-35Cs saw a decline. According to Lockheed Martin, it faced several challenges with the increased production rate which led to these declines. For example, since January 2018, the contractor hired around 900 new personnel, nearly 30 percent of its workforce, all of whom needed training. According to officials, this influx of new personnel led to an increase in the average labor hours for the F-35C and the number of hours required for scrap, rework, and repair of the F-35B and F-35C. According to the contractor, as the newly hired personnel gain more experience in the production processes, the average labor hours it takes to build an F-35C should start decreasing again. The contractor faced several production quality issues and parts delays, which it worked to address over the past year. For instance, we reported last year that due to a fault in the production process, Lockheed Martin halted deliveries after the Air Force identified corrosion between the aircraft’s surface panels and the airframe because Lockheed Martin did not apply primer when the panels were attached. The program office stated that Lockheed Martin and the F- 35 Program Executive Officer reached a mutual agreement on the cost to resolve this issue, the details of which have not been disclosed publicly. With the production rate increase, the supply chain was strained to deliver parts on time, which led to increases in material shortages for key components, such as the radar. Pratt & Whitney has also increased production over the past year and has shown similar manufacturing performance for the F-35 engine as in past years; however, it had fewer on-time deliveries in 2018 due to the challenges it faced, including an increase in the average number of quality issues per engine. Pratt & Whitney’s production rate increased by 10 percent over the past year, with 81 engines delivered in 2018. Table 5 shows the trends in Pratt & Whitney production metrics’ performance. According to Pratt & Whitney, its late engine deliveries increased in 2018 partially due to a subcontractor that did not have all of the needed tooling in place to produce more F-35B engines. To address this and other issues causing the late deliveries, Pratt & Whitney is taking lessons learned from its other production facilities and applying them to the F-35’s engine production. The F-35 program has overcome significant hurdles in its 18 years of development of the baseline aircraft, which was completed last year. One recent hurdle that it overcame was resolving many critical deficiencies found during developmental testing, which allowed the program to begin operational testing this past December. Other hurdles remain, including with the F-35’s reliability and maintainability (R&M). Four of the eight R&M metrics continue to fall short of meeting performance targets. Program officials stated that the Operational Requirements Document (ORD) R&M targets need to be re-evaluated to determine more realistic R&M performance metrics but have not yet taken actions to do so. Until the program re-evaluates the targets, it is accountable for achieving those requirements. Furthermore, funding improvement efforts have not been a priority for the program. As a result, over the past year, some projects were started, several were halted while underway, and others are on hold, waiting for funding. As long as targets under all of the R&M metrics continue to fall short, the U.S. military services and the taxpayer will have to settle for aircraft that are less reliable and more costly to maintain than originally planned. Also, with continuing concerns about the program’s long-term affordability, the program is missing a prime opportunity to infuse affordability into the aircraft’s future with better R&M performance. As the program is considering revisions to its R&M Improvement Program (RMIP), it is in a good position to clearly define and communicate its R&M objectives for the aircraft to meet the targets under all of its eight R&M metrics. Until it does so, the program office will not know whether the steps it is taking now are sufficient to ensure each F-35 variant achieves its R&M requirements in the future. As we have reported in the past, the F-35 program started its development before it was ready. It is now at risk of doing the same thing with the Block 4 modernization effort. Since we last reported in June 2018, the program has still not established a solid business case to commit funding and other resources to developing new capabilities for the aircraft. This could result in the program delivering technologies late and over cost estimates. Finally, the program has committed a significant amount of funding to support Block 4, but it has not completed an independent cost estimate of the life-cycle cost. Consequently, Block 4 may follow in the footsteps of the F-35’s baseline program which saw significant cost and schedule growth during its development. This approach leaves the F-35 program, DOD, Congress, and the U.S. military services without key information to make decisions regarding Block 4. We are making the following five recommendations to the Department of Defense: The Secretary of Defense should ensure that the F-35 program office assesses whether the ORD R&M targets are still feasible and revise the ORD accordingly. (Recommendation 1) The Secretary of Defense should ensure that the F-35 program office, as it revises its RMIP, identifies specific and measurable R&M objectives in its RMIP guidance. (Recommendation 2) The Secretary of Defense should ensure that the F-35 program office, as it revises its RMIP, identifies and documents which RMIP projects will achieve the identified objectives of the RMIP guidance. (Recommendation 3) The Secretary of Defense should ensure that the F-35 program office prioritizes funding for the RMIP. (Recommendation 4) The Secretary of Defense should ensure that the F-35 program office completes its business case, at least for the initial Block 4 capabilities under development, before initiating additional development work, to include: an independent cost estimate; an approved test and evaluation master plan which addresses resources, aircraft shortfalls, and funding; and an independent technology readiness assessment. (Recommendation 5) We provided a draft of this report to DOD for review and comment. Our initial draft report contained only recommendations 2 through 5 above. During the comment period, DOD officials provided additional information about the program’s R&M performance concerning whether the ORD targets continue to be feasible and should be re-examined. As a result, we added our first recommendation above—that the F-35 program office assess whether the ORD R&M targets are still feasible and revise the ORD accordingly. DOD provided written comments on our report, which are reprinted in appendix IV. DOD concurred with our four recommendations on R&M but did not concur with our last recommendation on the Block 4 modernization. DOD also provided technical comments, which were incorporated as appropriate. In concurring with our four R&M recommendations, DOD stated that it would review its R&M requirements and possibly revise them, update its RMIP guidance, and plan for R&M funding going forward. DOD officials did not concur with our recommendation that the F-35 program office complete its business case before initiating additional development work. DOD stated that the F-35 program office has adequate cost, schedule, and technical maturity knowledge to begin the development of initial Block 4 capabilities. DOD also outlined when some of the remaining Block 4 business case documents would be complete. As we stated in our report, these documents will not be complete until after the contracts to initiate additional Block 4 development work will be awarded. We maintain that completing its business case before initiating additional development work would put DOD and the program in a better position to effectively and successfully develop Block 4 capabilities. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense for Acquisition and Sustainment, the Secretary of the Air Force, the Secretary of the Navy, and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or sullivanm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Key program event Start of system development and demonstration approved. Primary GAO conclusions/recommendations Critical technologies needed for key aircraft performance elements are not mature. We recommended that the program should delay start of system development until critical technologies are matured to acceptable levels. DOD response and actions DOD did not concur with our recommendation. DOD did not delay the start of system development and demonstration stating technologies were at acceptable maturity levels and that it will manage risks in development. Program sets in motion plan to enter production in 2007 shortly after first flight of the non-production representative aircraft. The program was entering production with less than 1 percent of testing complete. We recommended that the program delay investing in production until flight testing shows that the Joint Strike Fighter performs as expected. DOD partially concurred but did not delay start of production because it believed the risk level was appropriate. The program was restructured to reflect findings from a recent independent cost team and independent manufacturing review team. As a result, development funds increased, test aircraft were added, the schedule was extended, and the early production rate decreased. Costs and schedule delays inhibited the program’s ability to meet needs on time. We recommended that the program complete a comprehensive cost estimate and assess warfighter and initial operational capability requirements. We suggested that Congress require DOD to tie annual procurement requests to demonstrated progress. DOD continued restructuring, increasing test resources, and lowering the production rate. Independent review teams evaluated aircraft and engine manufacturing processes. Cost increases later resulted in a Nunn- McCurdy breach. Military services completed the review of capability requirements, as we recommended. The program incorporated positive and more realistic restructuring actions taken since 2010, including more time and funding for development and deferred procurement of more than 400 aircraft to future years. The program was moving in the right direction but needed to fully validate design and operational performance and at the same time make the system affordable. We did not make recommendations to DOD in this report. DOD agreed with GAO’s observations. Key program event The services established initial operational capabilities dates in 2013. The Marine Corps and Air Force planned to field initial operational capabilities in 2015 and 2016, respectively, and the Navy planned to field its initial capability in 2018. Primary GAO conclusions/recommendations Delays in developmental flight testing of the F-35’s critical software may hinder delivery of the warfighting capabilities to the military services. We recommended that DOD conduct an assessment of the specific capabilities that can be delivered and those that will not likely be delivered to each of the services by their established initial operational capability dates. DOD response and actions DOD concurred with our recommendation. On June 22, 2015, the Under Secretary of Defense for Acquisition, Technology, and Logistics issued a Joint Strike Fighter software development report, which met the intent of GAO’s recommendation. DOD planned to begin what it refers to as a block buy contracting approach that was anticipated to provide cost savings. In addition, DOD planned to manage the follow-on modernization program under the current F-35 program baseline and not as its own separate major defense acquisition program. The terms and conditions of the planned block buy and managing follow-on modernization under the current baseline could present oversight challenges for Congress. We recommended that the Secretary of Defense hold a milestone B review and manage follow-on modernization as a separate major defense acquisition program. DOD did not concur with our recommendation. DOD viewed modernization as a continuation of the existing program and the existing oversight mechanisms, including regularly scheduled high-level acquisition reviews, would be used to manage the effort. The DOD F-35 program office was considering contracts for economic order quantity of 2 years’ worth of aircraft parts followed by a separate annual contract for procurement of lot-12 aircraft with annual options for lot-13 and lot-14 aircraft. However, as of January 2017, contractors stated they were still negotiating the terms of this contract; therefore, the specific costs and benefits remained uncertain. Program officials projected that the program would only need $576.2 million in fiscal year 2018 to complete baseline development. At the same time, program officials expected that more than $1.2 billion could be needed to commit to Block 4 and economic order quantity in fiscal year 2018. GAO recommended DOD use historical data to reassess the cost of completing development of Block 3F, complete Block 3F testing before soliciting contractor proposals for Block 4 development, and identify for Congress the cost and benefits associated with procuring economic order quantities of parts. DOD did not concur with the first two recommendations and partially concurred with the third while stating that it had finalized the details of DOD and contractor investments associated with an economic order quantity purchase and would brief Congress on the details, including costs and benefits of the finalized economic order quantity approach. Key program event The program office determined that it could not resolve all open deficiencies found in developmental testing within the development program, and they would need to be resolved through post-development contract actions. DOD provided a report to Congress outlining preliminary plans to modernize the F-35. It stated it planned to develop a full acquisition program baseline for the modernization effort in 2018 and provide a report to Congress by March 2019. Primary GAO conclusions/recommendations The program office plans to resolve a number of critical deficiencies after full-rate production. We recommended that the F-35 program office resolve all critical deficiencies before making a full- rate production decision, and identify steps needed to ensure the F-35 meets reliability and maintainability requirements before each variant reaches maturity. We also suggested that Congress consider providing in future appropriations that no funds shall be available for obligation for F-35 Block 4 until DOD provides a report setting forth its complete acquisition program baseline for the Block 4 effort to the congressional defense committees. DOD response and actions DOD concurred with both recommendations and identified actions that it would take in response. The National Defense Authorization Act for fiscal year 2019 included a provision limiting DOD from obligating or expending more than 75 percent of the appropriations authorized under the Act for the F-35 continuous capability development and delivery program until 15 days after the Secretary of Defense submits to the congressional defense committees a detailed cost estimate and baseline schedule. The National Defense Authorization Act for fiscal year 2015 included a provision for GAO to review the F-35 acquisition program annually until the program reaches full-rate production. This is the fourth report under that provision. In this report, we (1) provide information on the program’s progress toward completing testing of the baseline aircraft; (2) assess the aircraft’s current reliability and maintainability (R&M) status; (3) assess the program’s modernization efforts (to add new aircraft capabilities), known as Block 4; and (4) provide information on the program’s production costs and efficiency initiatives. To provide information on progress in the F-35’s development, we reviewed the program’s costs, schedule, and performance plans and compared the actual progress in each area with the goals established in its 2012 baseline to identify any significant trends. We also reviewed the F-35’s selected acquisition report and its fiscal year 2019 budget request. To assess progress in testing, we reviewed test results and associated reports, program briefings, and internal DOD program analyses. We interviewed officials from the program office, military test authorities, and contractors—Lockheed Martin (airframe) and Pratt & Whitney (engine)— on key aspects of F-35 development progress, including flight testing, future test plans, and recent findings from test events. We also interviewed the Director, Operational Test and Evaluation office and F-35 program developmental and operational test pilots. To assess the program’s progress in achieving its R&M targets, we obtained and analyzed its monthly reports on R&M performance from January 2018 through December 2018. We compared these to the program’s R&M targets documented in the F-35 Operational Requirements Document and the Joint Contract Specification. We examined program data for the metrics’ performance across 12 months to identify any trends. We assessed the reliability of this data by reviewing supporting documentation and interviewing program office officials who track reliability metrics and other knowledgeable DOD officials. We also reviewed the program’s Reliability and Maintainability Improvement Program’s guidance to determine if it contained specific and measurable objectives and the projects needed to meet those objectives. We determined that the R&M metric data were sufficiently reliable for our purposes of determining whether the program will meet its targets. To assess the program’s Block 4 modernization plans, we reviewed documents that GAO best practices identify should be completed prior to awarding a development contract. We interviewed DOD and program office officials, and contractor representatives regarding the program’s Block 4 activities to date and future plans. We compared the program’s accomplishments over the past year and its future plans to the product development best practices identified by GAO. We reviewed the fiscal year 2019 budget request to identify costs associated with the Block 4 effort. We obtained contract documents for Block 4 activities between March 2014 and December 2018 to determine the total amount of funding that has been obligated to Block 4 and the scope of work that has been contracted. To provide information on ongoing manufacturing performance and the program’s plans to achieve full rate production, we obtained and analyzed the prime contractor’s production metrics and its aircraft delivery rates and from 2012 through 2018. We compared this performance to the program’s procurement plans from its selected acquisition reports since 2003. We reviewed metrics and briefings provided by the program office, Lockheed Martin, Pratt & Whitney, and the Defense Contract Management Agency to identify progress in improving manufacturing processes. We analyzed changes in delivery dates for lot 10 aircraft delivered in 2018. We discussed reasons for any delivery delays and plans for improvement with officials from Lockheed Martin and Pratt & Whitney. We obtained cost investment and savings estimates and discussed cost and manufacturing efficiency initiatives, such as the economic order quantity purchases, with the contractors and program office officials to understand potential cost savings and plans. We also obtained and analyzed metrics on parts and aircraft quality through December 2018 and discussed steps taken to improve quality and deliveries with Lockheed Martin and Pratt & Whitney officials. We determined that the contractor’s production metrics and delivery dates were sufficiently reliable for our purposes of determining production efficiency and deliveries. We conducted this performance audit from June 2018 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The F-35 program continues to address technical risks discovered in testing. Since our 2018 report, the program identified new risks with the canopy, fuel tubes, and cockpit, described below. The program has also incorporated design changes that have mitigated technical risks that we previously highlighted. The status of the Department of Defense’s (DOD) efforts to address these issues follows. Canopy Coating De-laminations and Corrosions: The F-35 fleet has experienced approximately 20 incidents of the canopy transparencies delaminating after less than 100 flight hours. The contractor is currently testing numerous solutions for the de-laminations, with intentions of completing testing by January 2019. F-35 aircraft are also experiencing canopy corrosion resulting from moisture intrusion due to the aircraft’s adhesive cracking under pressure and insufficient tape adhesion. The program has identified the need to modify over 173 canopies over 4 years. The contractor has begun to incorporate alternative material and tape into production, and released standardized repair procedures to mitigate this issue. Engine Fuel Tubes: In September 2018, a manufacturing fault in an engine fuel tube caused an in-flight failure, which resulted in an F-35B crash. The investigation identified several other life-limited fuel tubes in each F-35 variant. The fleet was grounded while all aircraft were inspected, and any fuel tubes identified were replaced or will be replaced by June 2019. Cockpit Display: In November 2018, operational test pilots experienced the cockpit display freezing and blanking, and identified the problem as a category 1 deficiency. The display issues occurred after a software update. The start of operational testing was delayed until the contractor could provide a software update to correct the problem, which was accomplished with a work-around in December 2018. Helmet Mounted Display: During low-light flights, the Helmet Mounted Display’s technology cannot display pure black, causing a green glow on the screen which makes it difficult to see the full resolution of the night vision video feed. The contractor is developing a new system to avoid this effect, and the contractor delivered this system to the test fleet in September 2018 with final flight testing planned through January 2019. Figure 7 is a photograph of the Helmet Mounted Display. Aerial refueling probes: The F-35B and F-35C variants use a “hose and drogue” system in which an aerial refueling tanker aircraft extends a long, flexible refueling hose and a parachute-like metal basket that provides stability, the receiving aircraft then connects to the drogue basket with its extendable refueling probe, as shown in figure 8. The refueling probe tips are meant to break in the event there is a stress occurring during refueling. However, the breaking is occurring more often than expected. Since April 2014, more than 20 incidents have occurred where the F-35’s aerial refueling probes broke off while conducting aerial refueling, leading to a restriction of aerial refueling operations. Tire service life: We reported in June 2018, the average service life of tires on the F-35B is below 10 landings. Lockheed Martin is currently working with three tire manufacturers to develop a new design with the goal of 20 landings. Testing of the new tires will occur throughout 2019. Figure 9 shows an F-35B during a landing. Life support system: The program has identified over 35 pilot physiological events, of which nearly 30 occurred in-flight. An action team made of government officials, contractors, and doctors completed their work by May 2018. A root cause investigation did not identify any F-35 system deficiencies, but reported it was difficult to fully determine the problem due to a lack of real-time data. Contracting officials stated that this is partially because the technology has not yet been developed to monitor pilot’s health in flight, in real time. The prime contractor continues to try to develop a means to monitor pilot health. In addition to the contact named above, the following staff members made key contributions to this report: Justin Jaynes (Assistant Director), Jennifer Baker, Emily Bond, Brandon Booth, Erin Butkowski, Matthew T. Crosby, Desirée E. Cunningham, R. Eli DeVan, Laura Jezewski, Jennifer Leotta, Meghan Perez, Hai Tran, Abby Volk, Mary Weiland, Alyssa Weir, and Robin M. Wilson. F-35 Joint Strike Fighter: Development is Nearly Complete, but Deficiencies Found in Testing Need to Be Resolved. GAO-18-321. Washington, D.C.: June 5, 2015. Warfighter Support: DOD Needs to Share F-35 Operational Lessons Across the Military Services. GAO-18-464R. Washington, D.C.: April 25, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. F-35 Joint Strike Fighter: DOD’s Proposed Follow-on Modernization Acquisition Strategy Reflects an Incremental Approach Although Plans Are Not Yet Finalized. GAO-17-690R. Washington, D.C.: August 8, 2017. F-35 Joint Strike Fighter: DOD Needs to Complete Developmental Testing Before Making Significant New Investments. GAO-17-351. Washington, D.C.: April 24, 2017. F-35 Joint Strike Fighter: Continued Oversight Needed as Program Plans to Begin Development of New Capabilities. GAO-16-390. Washington, D.C.: April 14, 2016. F-35 Sustainment: DOD Needs a Plan to Address Risks Related to Its Central Logistics System. GAO-16-439. Washington, D.C.: April 14, 2016. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress. GAO-16-489T. Washington, D.C.: March 23, 2016. F-35 Joint Strike Fighter: Assessment Needed to Address Affordability Challenges. GAO-15-364. Washington, D.C.: April 14, 2015. F-35 Sustainment: Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates. GAO-14-778. Washington, D.C.: September 23, 2014. F-35 Joint Strike Fighter: Slower Than Expected Progress in Software Testing May Limit Initial Warfighting Capabilities. GAO-14-468T. Washington, D.C.: March 26, 2014. F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities. GAO-14-322. Washington, D.C.: March 24, 2014. F-35 Joint Strike Fighter: Restructuring Has Improved the Program, but Affordability Challenges and Other Risks Remain. GAO-13-690T. Washington, D.C.: June 19, 2013. F-35 Joint Strike Fighter: Current Outlook Is Improved, but Long-Term Affordability Is a Major Concern. GAO-13-309. Washington, D.C.: March 11, 2013. Fighter Aircraft: Better Cost Estimates Needed for Extending the Service Life of Selected F-16s and F/A-18s. GAO-13-51. Washington, D.C.: November 15, 2012. Joint Strike Fighter: DOD Actions Needed to Further Enhance Restructuring and Address Affordability Risks. GAO-12-437. Washington, D.C.: June 14, 2012. Joint Strike Fighter: Restructuring Added Resources and Reduced Risk, but Concurrency Is Still a Major Concern. GAO-12-525T. Washington, D.C.: March 20, 2012.", "summary": "In 2018, DOD sent an F-35 aircraft to its first combat mission and started initial operational testing. DOD now plans to spend over $270 billion to buy more than 2,000 F-35 aircraft over the next 26 years. Since 2011, GAO has found the need for more attention to the F-35's R&M performance to achieve an operationally suitable system. The National Defense Authorization Act for Fiscal Year 2015 included a provision for GAO to review the F-35 acquisition program until it reaches full-rate production. This is GAO's fourth report under this provision. This report assesses, among other objectives, (1) the program's progress in meeting R&M requirements (such as mission reliability) and (2) its plans for spending on new capabilities. GAO reviewed and analyzed management reports and historical test data; discussed key aspects of F-35 development with program management and contractor officials; and compared acquisition plans to DOD policies and GAO acquisition best practices. The F-35 program has made slow, sustained progress in improving the aircraft's reliability and maintainability (R&M). The F-35 aircraft (see figure) are assessed against eight R&M metrics, which indicate how much time the aircraft will be in maintenance rather than operations. Half of these metrics are not meeting targets. While the Department of Defense (DOD) has a plan for improving R&M, its guidance is not in line with GAO's acquisition best practices or federal internal control standards as it does not include specific, measurable objectives, align improvement projects to meet those objectives, and prioritize funding. If the R&M requirements are not met, the warfighter may have to settle for a less reliable and more costly aircraft than originally envisioned. In 2019, the F-35 program will start modernization efforts—estimated to cost $10.5 billion—for new capabilities to address evolving threats, without a complete business case, or a baseline cost and schedule estimate. Key documents for establishing the business case, such as an independent cost estimate and an independent technology assessment, will not be complete until after the program plans to award development contracts (see figure). Without a business case—consistent with acquisition best practices—program officials will not have a high level of confidence that the risk of committing to development has been reduced adequately prior to contract awards. Moving ahead without a business case puts F-35 modernization at risk of experiencing cost and schedule overruns similar to those experienced by the original F-35 program during its development. GAO is making five recommendations to DOD, including that it identify specific and measurable R&M improvement objectives, align improvement projects, and prioritize resources to meet them. In addition, DOD should complete its business case for modernization before beginning additional development efforts. DOD did not concur with this recommendation, but did concur with the R&M recommendations and plans to take action to address them.", "document_type": "gao"}
{"report": "Under traditional Medicare, hospitals are paid for the inpatient and outpatient services they provide under two distinct payment systems. Inpatient stays, including services incurred after being admitted to the hospital, are paid under the IPPS. Under this system, Medicare pays hospitals a flat fee per beneficiary stay, set in advance, with different amounts generally based on the beneficiary’s condition. Payment rates are also influenced by hospital-specific factors such as the relative hourly wage in the area where the hospital is located, and whether the hospital qualifies for other case- or hospital-specific additional payments. Outpatient services, including services obtained through the emergency department or other services incurred without being admitted to the hospital, are paid under the outpatient prospective payment system. Under this system, Medicare pays hospitals a flat fee per service, set in advance, with different amounts for each type of service. As with the IPPS, payment rates are adjusted for geographic factors. Congress has established payment adjustments for certain hospitals under the IPPS by changing the qualifying criteria for IPPS payment categories, creating and extending exceptions to IPPS rules, or exempting certain types of hospitals from the IPPS. These adjustments may help ensure beneficiary access to care or to help hospitals recruit and retain physicians and other medical professionals. Created through the Omnibus Budget Reconciliation Act of 1989, the MDH designation is an example of how Congress can enhance payments to certain hospitals. To qualify as an MDH, a hospital must demonstrate that it is: Medicare-dependent, defined as having at least 60 percent of their inpatient days or discharges attributable to Medicare beneficiaries; small, defined as having 100 or fewer beds; and rural, defined as being located in a rural area, though hospitals can also be eligible if they are located in a state without any rural areas. CMS regulations provide that hospitals can meet the requirement of demonstrating a 60 percent Medicare share of days or discharges using two of the three most recently settled cost reports, or using cost reports from 1987 or 1988. We refer to hospitals that meet this criterion using 1987 or 1988 cost report data as “legacy MDHs.” Some, but not all, MDHs are eligible to receive additional payment each year if they meet the payment criterion. Specifically, MDHs are assigned a payment rate—known as the hospital-specific rate (HSR)—based on their historic reported inpatient operating costs, trended forward to adjust for inflation and other factors, from one of three years (1982, 1987, or 2002). If the payment based on the HSR is higher than what the MDH would have otherwise received under IPPS, the MDH receives an additional payment. In this case, the MDH additional payment is calculated as 75 percent of the difference between the HSR and the IPPS amount. If the IPPS amount were higher than the HSR, the MDH would receive no additional payment. (See fig. 1.) Hospitals with an MDH designation are also eligible to receive other benefits. For example, MDHs are eligible for a separate additional payment if the hospital experiences at least a 5 percent decline in inpatient volume due to circumstances beyond its control. The MDH program does not provide for additional payments for outpatient services. In addition to the MDH designation, four other rural hospital designations exist: (1) critical access hospitals (CAH), (2) sole community hospitals (SCH), (3) low-volume adjustment hospitals (LVA), and (4) rural referral centers (RRC). Our review of CMS documentation shows that the MDH payment designation differs from the other rural payment designations in terms of eligibility criteria, financial benefit, extent of legislative permanence, and size—that is, the number of hospitals receiving the designation. (For detailed information on the five rural payment designations, see app. II.) Eligibility Criteria. The MDH designation differs from the other designations in terms of eligibility criteria. As noted earlier, MDHs must have at least 60 percent of their inpatient days or discharges attributed to Medicare patients, must be small and, with few exceptions, rural. In contrast, both the SCH and CAH designations require hospitals to be remote rural hospitals (i.e., located a specified distance from the nearest hospital). Similarly, LVAs are generally required to be more than 15 miles from the nearest hospital. Rural hospital designations also differ in terms of eligibility criteria related to bed size. CAH-designated hospitals are required to have 25 inpatient beds or fewer, while MDHs must have 100 beds or fewer. RRCs must have at least 275 beds or meet other criteria, such as serving a high proportion of remote patients, among other things. Financial Benefit. The MDH designation has a relatively small financial benefit compared to most of the other rural hospital designations, and the benefit only applies to costs associated with inpatient services. MDHs generally can only receive 75 percent of the difference between payment based on their HSR and the payment they would have otherwise received based on the IPPS rate as an additional payment added to their IPPS rate payment. In contrast, the SCH and CAH designations have both inpatient and outpatient payment benefits. Hospitals with an SCH designation can receive an additional payment added to their IPPS rate payment equal to 100 percent of the difference between payment based on the HSR and what the hospital would otherwise receive as payment based on the IPPS rate, as well as a 7.1 percent addition to their outpatient payments. The CAH designation results in the highest financial benefit by generally providing 101 percent of the hospital’s reported costs in the current year for both inpatient and outpatient Medicare services. LVAs generally can receive up to 25 percent in additional payments, and while RRCs receive no direct financial benefit, they are exempt from certain requirements related to geographic reclassification (as are SCHs). Legislative Permanence. Unlike all but one other rural payment designation, the MDH program is a temporary program and must be extended periodically by Congress in order to continue. Historically, the extension by Congress has sometimes occurred after the program has expired and as a result there were temporary lapses in payments to MDH designated hospitals. The Bipartisan Budget Act of 2018 included a provision to extend the MDH program through fiscal year 2022. The only other designation that must be extended is the LVA designation. In 2010, the Patient Protection and Affordable Care Act temporarily expanded the LVA designation eligibility criteria to include hospitals with a higher volume of discharges and located closer to other hospitals than in previous years. These expanded eligibility criteria have been amended and extended through fiscal year 2022. If Congress does not extend the expanded eligibility criteria beyond fiscal year 2022, the LVA designation will return to the narrower eligibility criteria that were in place prior to the Patient Protection and Affordable Care Act. Relative size and overlap. Of the 2,204 rural hospitals in fiscal year 2017, a relatively small share of these hospitals were MDHs. (See fig. 2.) In total, 138 hospitals, or 6.3 percent of those rural hospitals with at least one designation, were MDHs. In contrast, CAHs comprised the largest proportion of rural hospitals with a designation. In fiscal year 2017, 1,246 rural hospitals—or 56.5 percent of those rural hospitals with at least one designation—were CAHs. Of the five designations, three—CAHs, MDHs, and SCHs—are exclusive to each other, meaning a hospital can only have one of the three designations at any time. Hospitals designated as MDHs and SCHs may also be designated as LVAs, RRCs, or both. Approximately 75 percent of MDHs and 81 percent of SCHs had at least one concurrent designation in fiscal year 2017; in contrast, none of the CAHs received a secondary designation because CAHs are not eligible to receive other designations. Those MDHs with a concurrent designation consisted of 88 that had an LVA designation, 14 that had an RRC designation, and 2 that had both an LVA and RRC designation. (For detailed information on the 5 rural payment designations including LVA and RRC eligibility and financial benefit, see app. II.) From fiscal years 2011 through 2017, the number of MDHs declined, as well as the number of MDHs that received an additional payment under the program. In addition, during this period MDHs varied on other operational and financial metrics, including the share of Medicare revenue coming from inpatient care, various measures of Medicare dependence, and profit margins. Our analysis of CMS data shows that the number of MDHs declined from 193 to 138—a 28 percent decrease over the 7-year period from fiscal year 2011 through fiscal year 2017. (See fig. 3.) This decline can be due to a number of factors, including hospital closures, mergers, or changes in designation. For example, we previously reported that 16 MDHs closed between 2013 and 2017. Moreover, our review of Medicare Administrative Contractor documentation found that some MDHs became ineligible for the program due to no longer meeting eligibility criteria. In addition, the number of MDHs that received an additional annual payment also declined, from 92 MDHs in fiscal year 2011 to 78 MDHs in fiscal year 2017—a 15 percent decrease. Among MDHs that received an additional payment, the amount received and the share of the hospital’s total revenue this payment represented varied widely across the years, though the average amount generally increased over time. (See table 1.) For example, in fiscal year 2017, one hospital received around $1,000 in additional payment while another received almost $10.5 million. While the trend was not uniform among all MDHs, the median additional payment increased from about $695,000 in fiscal year 2011 to about $812,000 in fiscal year 2017. Our analysis of CMS data also shows that the average additional payment MDHs received ranged from less than 0.1 percent up to 8.7 percent of total facility revenue, with a fairly consistent average of 1.2 to 1.6 percent. (See table 2.) This underscores that the additional payment under the MDH program can be small relative to the overall revenue that the hospital receives. Our analysis of CMS data also shows that from fiscal years 2011 through 2017, MDHs varied on selected operational and financial metrics: the mix of Medicare revenue that came from inpatient versus outpatient care, various measures of Medicare dependence, and profit margins. On average, MDHs experienced a decline in the share of Medicare revenue that came from inpatient services. (See fig. 4.) In fiscal year 2011, around 66 percent of MDH Medicare revenue came from inpatient services compared to 58 percent in fiscal year 2017—a 13 percent decrease. This trend was slightly greater than that for all rural hospitals (an 11 percent decrease) and all hospitals (a 10 percent decrease). The trends across three measures of Medicare dependence varied for MDHs over time. Looking at the Medicare share of total revenue for MDHs, we found this share decreased when comparing fiscal years 2011 and 2017, from 25 to 22 percent. (See fig. 5.) In contrast, in terms of the number of inpatient days and discharges attributable to Medicare beneficiaries, we found these measures both increased slightly over time. Specifically, the median share of MDH inpatient days attributable to Medicare beneficiaries increased, although by less than a percentage point, and the median Medicare share of inpatient discharges increased by about 2 percentage points, when comparing fiscal years 2011 and 2017. (See figures 6 and 7.) To obtain additional context on the relationship between MDH eligibility criteria and the various measures of Medicare dependence, we ran regression models to identify the extent to which hospitals’ bed size and rural status were associated with the Medicare share of days, discharges, and total care revenue for all hospitals from fiscal years 2011 through 2017. We found that rural hospitals with fewer beds were associated with higher Medicare shares of inpatient days and discharges, holding all other factors constant. This indicates that by targeting smaller, rural hospitals in its eligibility criteria, the MDH program is targeting hospitals that are Medicare-dependent defined in terms of inpatient volume. At the same time, rural hospitals with fewer beds generally received a smaller share of their total care revenue from Medicare compared with other hospitals. This suggests that hospitals associated with high Medicare inpatient volume may not have relatively high shares of total care revenue coming from Medicare. For more technical detail on our regression analyses and findings, see appendix III. Our analysis of self-reported data from hospitals shows that Medicare profit margins and total facility profit margins declined for MDHs from fiscal year 2011 through 2017. (See table 3.) The degree to which Medicare margins declined for MDHs during this time period (6 percentage points) was greater than the degree to which they declined for rural hospitals (4 percentage points) and all hospitals (3 percentage points). The self-reported data show that unlike rural and all hospitals, MDHs were not profitable in 2017—meaning that the revenue they received from Medicare and other payers was less than their reported costs for providing services. Specifically, the total facility profit margin turned from positive to negative and dropped almost two percentage points between fiscal years 2011 and 2017. We also ran regression models to examine the relationship between all hospitals’ total profit margins and the various measures of Medicare dependence. We found that hospitals with a higher Medicare share of total-care revenue had lower total facility margins on average, holding all other factors constant; in contrast, there was no significant relationship between total facility margins and the inpatient volume-based measures of Medicare dependence. This indicates that a higher volume of inpatient services was not associated with lower profitability. We provided a draft of this report to the Department of Health and Human Services for comment. The Department of Health and Human Services provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of the Department of Health and Human Services. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-7114 or farbj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix explains the quantitative scope and methodology used to examine how the Medicare-dependent hospital (MDH) designation differs from the other Medicare rural hospital designations. This appendix also explains the scope and methodology used to describe changes in the number and selected metrics of MDHs and other hospital types, including those used for a regression analysis to provide information on the relationship between MDH program criteria and Medicare dependence. To describe how the MDH designation differs from other rural hospital designations, we used CMS data—specifically, the Provider Specific File (PSF)—to identify the number of MDHs, critical access hospitals (CAH), sole community hospitals (SCH), rural low-volume adjustment hospitals (LVA), and rural referral centers (RRC) in fiscal year 2017. We then identified all rural hospitals without a designation in 2017 using the 2018 CMS Inpatient Prospective Payment System (IPPS) Impact File because those data are prepared in the middle of the year preceding the fiscal year. We define rural hospitals using the CMS MDH programmatic definition; that is, those hospitals that are not located in metropolitan statistical areas, as well as those hospitals that reclassified as rural for CMS payment purposes. We next identified the number of hospitals with each designation and the value of additional payments received under the rural designations that each hospital had in that year using data provided by each hospital through their Medicare Cost Report (MCR). The MCR is submitted to CMS by hospitals each fiscal year and contains information such as facility characteristics, utilization data, and costs to provide services to Medicare beneficiaries and all patients. Because CAHs are paid based on cost under a different payment system than the other hospitals, we did not have complete data to estimate what those hospitals would have been paid under the inpatient prospective payment system and thus could not identify the additional payments received by CAHs. In addition, RRCs only receive indirect payment benefits, and thus we could not calculate a comparable additional payment for that group of hospitals. For all analyses, we excluded hospitals within the Indian Health Service, as well as hospitals in Maryland and those outside of the remaining 49 states and the District of Columbia. We also excluded hospitals with reporting periods greater than 14 months or less than 10 months and those that reported zero or negative Medicare revenue. To describe changes in the number and select metrics of MDHs and other hospital types, we examined MCR data for fiscal years 2011 through 2017. To first identify the universe of MDHs, rural hospitals, and all acute care inpatient prospective payment system (IPPS) hospitals, we used the PSF and MCR for fiscal years 2011 through 2017, as well as CMS Impact Files for fiscal years 2012 through 2018. Then, we used the MCR to calculate the number of MDHs that received the MDH payment adjustment and the distribution of additional payments among MDHs in each year. Using those same data sources, we then calculated several metrics and examined trends for MDHs as compared to all rural hospitals and all hospitals overall. The first metric is the median proportion of total Medicare payments—referred to as revenue—each hospital group received from providing inpatient and outpatient care to Medicare beneficiaries. The second metric is hospitals’ median profit margins—a profitability measure calculated as the amount of revenue the hospital received minus reported costs, divided by the amount of revenue received. We calculated profit margins specific to Medicare revenue and costs (Medicare profit margins) but also for revenue and costs beyond Medicare (total facility profit margins), including payments for treating non-Medicare (including privately insured) patients. We calculated Medicare and total facility profit margins at the hospital level using hospital-reported costs and revenues from the MCRs, and reported the median margins for each hospital group. The Medicare margin reflects only payments and costs received for inpatient and outpatient services (about 90 percent of total Medicare revenue, according to CMS officials) and excludes payments and costs for other hospital-based services, such as those for skilled nursing and home health care. Third, we calculated hospitals’ degree of Medicare dependence using three separate definitions, or measures, of dependence: (1) the amount of revenue the hospital received from Medicare as a share of all the revenue the hospital received for inpatient and outpatient services (total care revenue), (2) the share of inpatient days of care the hospital provides that are attributed to Medicare beneficiaries, and (3) the share of inpatient discharges that are attributed to Medicare beneficiaries. We also calculated these metrics separately for those MDHs that were eligible for the program based on data from the 1980s—legacy MDHs. To do so, we used data provided by Medicare Administrative Contractors—third-party entities that administer Medicare program payments and determine MDH eligibility. To provide additional context on the relationship between MDH eligibility criteria and the various definitions of Medicare dependence, we developed an econometric model to analyze the association between bed size, rural status, and the three measures of Medicare dependence. We conducted the regression analysis using data from the CMS IPPS Impact Files and MCRs from fiscal years 2011 through 2017. We used the following measures as dependent variables: (1) the amount of revenue the hospital received from Medicare as a share of all the revenue the hospital received for inpatient and outpatient services (total care revenue), (2) the share of inpatient days of care the hospital provides that are attributed to Medicare beneficiaries, and (3) the share of inpatient discharges that are attributed to Medicare beneficiaries. 𝑌𝑌𝑖𝑖𝑖𝑖=log (𝑅𝑅𝑖𝑖𝑖𝑖) . Where 𝑅𝑅𝑖𝑖𝑖𝑖 represents the Medicare share of revenue, inpatient days or discharges, and the i and t subscripts represent the hospital and year, respectively. This formulation has the advantage of restricting the models’ predicted values to be positive and also allows for a relatively straightforward interpretation of the parameter estimates. We included hospital capacity or size as measured by the number of hospital beds. The number of beds is itself one of the criteria for MDH eligibility, and we were interested in whether hospitals of smaller sizes have more or less Medicare dependency. We included an indicator variable flagging whether the hospital is in a rural location. Rural location is one of the criteria for MDH program eligibility, and so this was a key variable in our model. We included the ownership category of the hospital, such as whether a hospital is for-profit or not for-profit, or whether it is a public or private institution. This organizational category may determine institutional characteristics, which affects the likelihood that the hospital serves either more or fewer Medicare beneficiaries. We included the degree of proximity to other hospitals of substantive size; specifically, the distance from the closest hospital with at least 100 beds. In addition to our rural indicator variable, this controlled for whether more remote hospitals are more likely to be more dependent on Medicare. We included whether the state in which the hospital is located has expanded Medicaid to provide coverage to low-income, non-elderly adults, because it is possible that an increased number of Medicaid- eligible patients may affect the number of Medicare patients using hospital services. This variable may be associated with less Medicare dependence if Medicaid becomes a relatively larger payer source, or it may be associated with more Medicare dependence if Medicaid eligibility brings Medicare-eligible people into the health care system. We included the percent of population in the hospital’s county over age 65, because areas with larger numbers of people over age 65 may be more likely to have a higher proportion of Medicare beneficiaries using health care services. We included the percent growth in county population, which allowed us to control for areas with declining populations that may be more likely to contain Medicare-dependent hospitals. Our model included time fixed effects (a dummy variable for each year in the analysis). The time fixed effects controlled for factors affecting hospitals nationally in as given year—in particular, those factors for which data were unavailable. We included a set of state fixed effects (a dummy variable for each of the states in the analysis) to control for effects that are common to a specific area, but for which data may have been unavailable. We estimated specifications that included interactions between our bed size categories and rural location. This allowed us to determine whether bed size had the same impact on Medicare dependence for hospitals in rural locations compared with those in urban locations. ln (𝑅𝑅𝑖𝑖𝑖𝑖)=�𝑓𝑓𝑖𝑖𝐹𝐹𝑖𝑖 +𝑋𝑋𝑖𝑖𝑖𝑖𝛽𝛽+𝐶𝐶𝑠𝑠𝑖𝑖𝛾𝛾+𝜀𝜀𝑖𝑖𝑖𝑖,𝑡𝑡=1,…,𝑇𝑇; 𝑖𝑖=1,…,𝐻𝐻. The dependent variable is the logarithm of our measure of Medicare 𝑋𝑋𝑖𝑖𝑖𝑖 is a 1 x k vector of hospital characteristics and possible 𝛽𝛽 is a k x 1 vector of parameters associated with the hospital interactions of these characteristics, where i denotes the ith hospital ∑ ∑ 𝐶𝐶𝑠𝑠𝑖𝑖 is a 1 x m vector of time-varying county-level variables hospital and their associated (lower case) parameters. 𝛾𝛾 is an m x 1 vector of parameters associated with the state-level characteristics such as the percent of the population over 65 and the dependence, 𝑅𝑅𝑖𝑖𝑖𝑖. and t denotes the year. 𝑋𝑋𝑖𝑖𝑖𝑖 contains key explanatory variables such as characteristics, 𝑋𝑋𝑖𝑖𝑖𝑖. ownership type, the number of beds, rural or urban location, whether 𝑇𝑇𝑖𝑖=2a hospital receives MDH program monies and other characteristics. represents the set of time (year) dummy variables (upper 𝑆𝑆𝑠𝑠=2 represents the set of state dummy variables (upper case) case) and their associated (lower case) parameters. characteristics such as the percent of the population over 65 and the county population growth rate. characteristics, 𝐶𝐶𝑐𝑐𝑖𝑖. Our model includes an interaction effect between the rural dummy variable and each of the characteristics except the geographic fixed effects. 𝜀𝜀𝑖𝑖𝑖𝑖 is a well-behaved Gaussian random error term that may have a heteroskedastic and/or clustered structure. We used Stata® to estimate the regression model, using fixed effects at the state-level to account for unobserved heterogeneity and clustering at the county-level. Our focus was on the main criteria for MDH eligibility—namely hospital size as measured by number of beds and rural versus no-rural hospital location. We divided the hospitals into five bed number categories: 50 beds or fewer Over 50 beds to 100 beds Over 100 beds to 300 beds Over 300 beds to 400 beds This categorization strikes a balance between having too many categories, which would reduce the statistical power of our analysis, and having too few categories, which would fail to identify any non-linear pattern in the statistical relationship. These categories also contain the 100 bed criterion as one of the cut-off points. Our analysis controls for location and possible heterogeneity by using geographic fixed effects but we also want to identify the impact of rural location. Selecting too detailed a level of geographic fixed effect such as county or zip code would limit our ability to identify the rural effect so we used states. We recognized that state fixed effects may not identify more localized effects; this is a limitation of our model. We also modeled the effects of hospital characteristics on total facility profit margins; that is, the difference between revenue and costs as a percent of revenue. For MDHs in our analysis, we excluded any MDH additional payment from the margin calculation in order to isolate and remove the program impact on financial status. We used the same explanatory factors in our econometric model of hospital margins as in our models of Medicare dependence but we supplement these factors with our three measures of Medicare dependence—a separate model for each measure. This allowed us to assess how our different measures of Medicare dependence are associated with financial well-being. We assessed the reliability of the relevant fields in each of the data sets we used for these analyses by interviewing CMS officials, reviewing related documentation, and performing data checks. On the basis of these steps, we concluded that the data were sufficiently reliable for the purposes of our reporting objective. We identified five Medicare rural hospital payment designations and categorized them into two categories: (1) primary payment designations and (2) secondary payment designations. Primary designations include critical access hospitals (CAH), sole community hospitals (SCH), and Medicare-dependent Hospitals (MDH). Each designation has distinct eligibility requirements and payment methodologies. This appendix describes the full results for our modeling of Medicare dollars as a percentage of total revenue, the percent of inpatient days, the percent of inpatient discharges, and total hospital profit margins. We tested for the hypothesis that key groups of parameters were significantly different between urban and rural locations. We performed a k-parameter post-estimation Wald linear restriction where 𝛽𝛽𝑘𝑘𝑢𝑢 and 𝛽𝛽𝑘𝑘𝑟𝑟 are matrices of the estimated urban and rural parameters, respectively, for each of the k categories (bed-size, ownership type, etc.). We rejected the null hypothesis of parameter equality for bed-size, ownership types, Medicaid expansion, and year dummies at the 5 percent level. The miles distance parameters rejected the hypothesis at marginally above the 5 percent level. Rural hospitals generally were associated with larger Medicare shares of revenue than urban hospitals. In every bed-size category, the parameters for rural hospitals were significantly greater than for urban hospitals. In addition, controlling for urban-rural location, with the exception of the largest hospital category (over 400 beds) hospitals with fewer beds had a smaller Medicare share of revenue, as shown in figure 8. Hospitals in counties with higher percentages of people over age 65 were significantly associated with greater Medicare dependence. Our Wald tests rejected the null that parameters rural and urban were equal in the bed-number categories and in the ownership categories. As with the Medicare share of total revenue, our model for Medicare share of inpatient days showed, controlling for bed numbers, that rural hospitals generally had significantly greater Medicare dependence than urban hospitals. In most bed-size categories, the parameters for rural hospitals were greater than for urban hospitals. The pattern for bed size was different for Medicare dependence measured in revenue in that for rural hospitals, dependence fell as bed numbers rose, but, for urban hospitals, we observed a hump- shape distribution with the middle bed-number categories having higher dependence than the smallest and largest categories, as shown in figure 9. Hospitals located in counties with higher percentages of people over age 65 had higher dependence. Our model for the Medicare share of inpatient discharges showed that, controlling for bed numbers, rural hospitals generally had greater Medicare dependence than urban hospitals. In most bed-size categories, the parameters for rural hospitals were significantly greater than for urban hospitals. Our Wald tests rejected the null hypothesis that parameters for rural and urban were equal in the bed-size categories, Medicaid expansion variables, and in the ownership categories. The pattern for bed numbers was also different to Medicare dependence measured in revenue. The urban hospitals had a hump- shape distribution with the middle bed-number categories having higher dependence than the smallest and largest categories, whereas the rural showed largest effects at the smallest and the larger intermediate categories, as shown in figure 10. Hospitals located in counties with higher percentages of people over age 65 had higher dependence. The Medicare share of total revenue was significantly associated with smaller total facility profit margins and was the only statistically significant measure of Medicare dependence in the margin models. In general, hospitals with small numbers of beds—fewer than 100—were associated with smaller hospital margins relative to our reference category of large urban hospitals. However, there was no significant difference in any of the bed-number categories between urban and rural hospitals. Jessica Farb, (202) 512-7114 or farbj@gao.gov In addition to the contact named above, Gregory Giusto (Assistant Director), Kate Nast Jones (Analyst-in-Charge), Britt Carlson, Rachel Gringlas, Michael Kendix, Vikki Porter, Caitlin Scoville, Jennifer Rudisill, and Jeffrey Tamburello made key contributions to this report.", "summary": "The MDH program was enacted in 1989, providing a financial benefit to some small, rural hospitals with high shares of Medicare patients. The original MDH program was established through statute for 3 years, and Congress has extended it on several occasions. The Bipartisan Budget Act of 2018 included a provision to extend the MDH program through 2022, as well as a provision for GAO to review the MDH program. This report describes, among other things, the changes that occurred in the number of MDHs and selected metrics over time. GAO analyzed data submitted to CMS by hospitals from fiscal years 2011 through 2017—the most recent year for which consistent data were available at the time of GAO's analysis—among other CMS data. GAO also reviewed CMS regulations and other agency documents. The Department of Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate. The Centers for Medicare & Medicaid Services (CMS) operates the Medicare-dependent Hospital (MDH) program, which assists hospitals that have 60 percent or more of inpatient days or discharges from Medicare patients, 100 or fewer beds, and that are generally located in a rural area. MDHs receive an additional payment if their historic costs in one of three base years adjusted for inflation, among other things, are higher than what the hospital would have otherwise received under the inpatient prospective payment system (IPPS). In contrast, if the IPPS amount was higher than historic costs, the MDH would receive no additional payment. In fiscal year 2018, CMS paid approximately $119 million in additional payments to MDHs. From fiscal years 2011 through 2017, the number of MDHs declined by around 28 percent. (See figure.) In addition, the number of MDHs that received an additional payment declined by around 15 percent. Over this period of time, MDHs also experienced a 13 percent decrease in the share of their Medicare revenue that came from inpatient services. In addition, there was a decline in the share of total MDH revenue that was attributed to Medicare patients, and a decline in Medicare profit margins by about 6 percentage points.", "document_type": "gao"}
{"report": "FAR Part 15 describes negotiated contracting, which includes the use of several competitive source selection processes. The processes are associated with the best value continuum, which includes the LPTA process on one end and the trade-off process on the other (see figure 1). Federal agencies may elect to use the LPTA process where the requirement is clearly defined and the risk of unsuccessful contract performance is minimal. In such cases, agencies can determine that cost or price should play a dominant role in the source selection. When using the LPTA process, the agency specifies the evaluation factors that establish the requirements of acceptability in the solicitation. Firms submit their proposals and the agency determines which of the proposals meet those requirements. No trade-offs between cost or price and non-cost factors (for example, technical capabilities or past performance) are permitted. Non-cost factors are rated on an acceptable or unacceptable basis. The award is made based on the lowest priced, technically acceptable proposal submitted to the government. In contrast, agencies may elect to use the trade-off process in acquisitions where the requirement is less definitive, more development work is required, or the acquisition has a greater performance risk. In these instances, non-cost factors may play a dominant role in the source selection process. Trade-offs between price and non-cost factors allow agencies to accept other than the lowest priced proposal. The FAR requires the solicitation to state whether all evaluation factors other than cost or price, when combined, are significantly more important than, approximately equal to, or significantly less important than cost or price. Contracting officials have broad discretion in the selection of the evaluation criteria that will be used in an acquisition. When one is required, a written acquisition plan generally should include a description of the acquisition’s source selection process and the relationship of the evaluation factors to the acquisition objectives. The FAR does not explicitly require contracting officials to document the reasons why the specific source selection process was chosen. The defense and civilian provisions required the DFARS and FAR, respectively, be revised to require that the LPTA process only be used if certain criteria are met, as described in table 1. The defense and civilian provisions also required that the use of the LPTA process be avoided, to the maximum extent practicable, in procurements that are predominantly for the products and services identified in table 2. The process for revising the FAR and DFARS is governed by statute, which generally requires agencies to issue a proposed rule in the Federal Register. Agencies are also required to provide at least a 30-day public comment period following publication of the proposed rule. Figure 2 illustrates the basic process that is generally used to revise the FAR and the DFARS. We have issued two reports in response to the defense provisions requiring us to review DOD’s use of the LPTA process. In November 2017, we found that the Army, Navy, and Air Force used the LPTA process for information technology and other services in 9 out of 133 instances when awarding contracts valued at $10 million or more in the first half of fiscal year 2017. Contracting officials stated that the LPTA process was used in these instances, in part, because the requirements were well-defined, noncomplex, or recurring. We also found that contracting officials’ use of the LPTA process was generally consistent with the criteria listed in the defense provisions. In November 2018, we estimated that about 26 percent of DOD’s contracts and orders valued at $5 million or more in fiscal year 2017 were competitively awarded using the LPTA process. We found that DOD used the LPTA process to buy equipment, fuel, information technology services, and construction services, among other things. We also found that contracting officials used the LPTA process for reasons consistent with the criteria in the defense provisions. Specifically, contracting officials associated with the 14 contracts and orders we selected used the LPTA process, in part, because they determined there was no trade-off available or determined that DOD would not derive any benefit from paying a premium for offers that exceeded the minimum capabilities. Finally, we found that some contracting officials were confused about how to apply two of the criteria included in the defense provisions. Specifically, contracting officials were confused regarding how to assess life cycle costs associated with their procurements (shown as criterion 6 in table 1) or whether the products and services they were acquiring would be considered expendable in nature (criterion 8). Absent clarification on how to consider these two criteria, we found there was potential for increased risk that DOD contracting officials would not consistently apply the criteria of the defense provisions. Accordingly, we recommended that DOD address how contracting officials should apply these two criteria when using the LPTA process. DOD concurred with our recommendations, and plans to address them by issuing guidance concurrent with publication of the final rule at the end of fiscal year 2019. In December 2018, DOD issued a proposed DFARS rule for public comment to address the defense provisions for using the LPTA process. The December 2018 proposed rule reflected the criteria and limitations for using the LPTA process set forth in the defense provisions, and provided further clarification that these provisions were applicable to both contracts and orders. The public comment period ended on February 4, 2019, during which time the Defense Acquisition Regulations Council received 15 comments. In commenting on the proposed rule, industry representatives generally indicated their support for the proposed rule. On June 19, 2019, the Council agreed to move forward with the process for issuing a final rule revising the DFARS. Defense Pricing and Contracting officials stated that DOD expects to finalize the rule by the end of fiscal year 2019. The time required to develop and finalize the revisions to the DFARS has been longer than provided for under the NDAA for fiscal year 2017, which required the DFARS be revised within 120 days after enactment, which would have been in April 2017. In July 2019, we found that it can take a year or longer to issue a final DFARS rule. For this DFARS case, a Defense Pricing and Contracting official cited several reasons why the revisions have been delayed, including the need to address LPTA-related provisions in two separate NDAAs and the need to resolve a backlog of DFARS changes. In addition to ongoing efforts to update DFARS regulations, DOD officials plan to update the DFARS Procedures, Guidance and Information to provide defense contracting officers with supplemental guidance on applying the new criteria for using the LPTA process. A Defense Pricing and Contracting official stated that this update would be finalized by the end of fiscal year 2019 to coincide with the issuance of the final DFARS rule. The FAR Council has also initiated efforts to incorporate the civilian provisions for using the LPTA process into the FAR. The NDAA for Fiscal Year 2019 required that the FAR be revised to incorporate the civilian provisions within 120 days after enactment, which would have been in December 2018. Officials from the Office of Federal Procurement Policy told us, however, that it generally takes much longer than 120 days to revise the FAR. According to an analysis provided by DOD, it takes 483 days on average to issue a FAR rule. The FAR case to implement the civilian LPTA provisions was initiated in August 2018—the same month the NDAA for Fiscal Year 2019 was enacted. Office of Federal Procurement Policy officials stated that a proposed FAR rule is scheduled to be published in the Federal Register in September 2019. The public comment period for the proposed rule is scheduled to end in November 2019. Figure 3 shows when the defense and civilian provisions were enacted, when the rules were required to be implemented, and some of the efforts associated with revising both the DFARS and the FAR. Of the six agencies we reviewed, we found that DOD and DHS had existing source selection guidance that already reflected some of the criteria for using the LPTA process identified in the defense and civilian provisions. The other four civilian agencies did not have source selection guidance specific to using the LPTA process. Table 3 shows the status of selected agencies’ existing guidance related to the LPTA process. We found the following: DOD’s March 2016 Source Selection Procedures generally includes five of the eight criteria for using the LPTA process. A Defense Pricing and Contracting official stated that this guidance could be updated after the DFARS rule is implemented and the Procedures, Guidance, and Information resource is updated. The DHS September 2013 Source Selection Guide generally includes the first four of the six criteria for using the LPTA process. DHS officials stated that they plan to update their guidance after the FAR is amended to reflect the criteria and limitations for using LPTA. Acquisition policy officials from VA, GSA, USDA, and HHS stated that they do not have agency-specific guidance for using the LPTA process beyond what is currently provided for under the FAR. These officials stated that they were waiting for regulations to be finalized before determining if there is a need to develop any new guidance. Based on the results of our generalizable samples, we estimate that the selected DOD components used the LPTA process for about 25 percent of competitive contracts and orders valued at $5 million or more in fiscal year 2018, compared to about 7 percent of such contracts and orders at selected civilian agencies, as shown in Table 4. Our findings regarding how often DOD uses the LPTA process are consistent with what we found in our prior work. In November 2018, for example, we reported that Army, Navy, Air Force, and DLA awarded about 26 percent of contracts and orders using the LPTA process in fiscal year 2017. In November 2017, we reported that officials told us the LPTA process was used in instances where the requirements were well- defined, noncomplex, or recurring. This is the first year we were required to evaluate civilian agencies’ use of the LPTA process. Civilian agency officials we interviewed provided various perspectives on the extent to which their agency used the LPTA process. HHS officials told us that their acquisitions are generally complex, so the LPTA process is not often deemed the appropriate mechanism for determining best value. USDA officials told us that they have few acquisitions valued at more than $5 million, and that those acquisitions are likely to have more complex requirements. In such cases, the officials told us, technical and performance considerations generally would be more important than price factors. In analyzing FPDS-NG data, we found that 1 percent of USDA’s fiscal year 2018 contracts and orders were valued at more than $5 million. GSA officials told us their agency often procures services where it is beneficial for industry to propose solutions to a stated need, rather than GSA dictating the solution, such as professional services or information technology systems for a secure network solution. In these cases, officials said they would not have the technical specifications that an LPTA process would require. Officials from DHS and VA stated that they do not centrally track the source selection method used and they do not have sufficient information to say why their agencies use LPTA less frequently than other source selection methods. Within the sample of contracts we reviewed, we found DOD and the five selected civilian agencies bought a variety of products and services using the LPTA process in fiscal year 2018 (see table 5). We found that four of these DOD contracts and orders and one civilian agency order were for services that could be considered within the categories for which the defense and civilian provisions place limitations on, but do not prohibit, use of the LPTA process. In November 2018, we found that DOD contracting officers generally justified the use of the LPTA process for products and services in these categories. As described earlier in this report, the DFARS and FAR are in the process of being revised and do not currently address the limitations on the use of LPTA for these products and services. We provided a draft of this report to OFPP, DOD, VA, HHS, GSA, DHS, and USDA for review and comment. OFPP, DOD, GSA, DHS and HHS provided technical comments, which we incorporated as appropriate. VA and USDA told us that they had no comments on the draft report. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Secretary of Defense, the Administrator of General Services, the Secretary of Veterans Affairs, the Secretary of Homeland Security, the Secretary of Agriculture, and the Secretary of Health and Human Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or dinapolit@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Section 813 of the National Defense Authorization Act (NDAA) for Fiscal Year 2017, as amended, included a provision that we report on the number of instances where Department of Defense (DOD) used the lowest price technically acceptable (LPTA) process for contracts exceeding $5 million, as well as provide an explanation of how acquisition officials considered the new criteria in making a determination to use the LPTA process. We have previously issued two reports in response to this provision. Subsequently, Section 880 of the NDAA for Fiscal Year 2019 included a provision that we report on the number of instances where civilian agencies used the LPTA process for contracts exceeding $5 million, as well as provide an explanation of how acquisition officials considered the six criteria in making a determination to use the LPTA process. This report, which addresses both provisions, describes (1) the status of regulatory changes required by the defense and civilian provisions for using the LPTA process and (2) the extent to which DOD and selected civilian agencies used the LPTA process to competitively award contracts and orders valued at $5 million or more in fiscal year 2018, and what they bought using this process. To address both objectives and select the DOD components and civilian agencies included in our scope, we used data from the Federal Procurement Data System-Next Generation (FPDS-NG) to identify the population of DOD and civilian agency contracts and orders that were reported as competitively awarded and valued at $5 million or more in fiscal year 2018. For DOD, we focused our review on the top four DOD components—Army, Navy, Air Force, and Defense Logistics Agency (DLA)—because they accounted for about 5,400—or about 88 percent— of all DOD contracts and orders valued at $5 million or more that were reported as competitively awarded in fiscal year 2018. Similarly, we focused our analysis on the top five civilian agencies—the Departments of Veterans Affairs (VA), Health and Human Services (HHS), Homeland Security (DHS), and Agriculture (USDA) and the General Services Administration (GSA)—which accounted for about 3,000—or about 66 percent—of all civilian agency contracts and orders valued at $5 million or more that were reported as competitively awarded in fiscal year 2018. To describe the status of regulatory changes governing the use of the LPTA process, we obtained information on agency officials’ efforts to amend the Defense Federal Acquisition Regulation Supplement (DFARS) and the Federal Acquisition Regulation (FAR). To do this, we met with DOD and Office of Federal Procurement Policy officials responsible for overseeing the regulatory changes. We also reviewed DOD’s December 2018 proposed rule to revise the DFARS and the 15 public comments DOD received on the proposed rule. Because revisions to the FAR and DFARS have not been finalized, regulations do not yet require or provide guidance to acquisition officials on how to consider the new criteria. Therefore, we also analyzed agency guidance and interviewed acquisition and contracting policy officials at DOD and each of the selected civilian agencies to determine whether agencies had existing guidance that addressed the defense and civilian provisions, in whole or in part. Specifically, we reviewed agency-specific source selection guidance from DOD, DHS, and VA. GSA, USDA, and HHS do not have source selection guidance that specifically addresses the LPTA process. According to officials, DOD and the selected civilian agencies do not maintain centralized data on whether the LPTA process is used to award contracts and orders. Consequently, to describe the extent to which DOD and civilian agencies used the LPTA process in competitively awarded contracts and orders valued at $5 million or more in fiscal year 2018, we used FPDS-NG to select two generalizable random samples of contracts and orders to estimate the use of LPTA by the DOD components and the civilian agencies within our scope. This resulted in samples of 102 contracts and orders for the four selected DOD components and 100 for the five selected civilian agencies. We removed five contracts and orders from our DOD sample: two contracts and one order because they were incorrectly reported by the agency in FPDS-NG as having been competitively awarded, and two contracts because they were classified. We removed three contracts and orders from our civilian agency sample: two orders because they were incorrectly reported by the agency in FPDS-NG as having been competitively awarded, and one contract because it was incorrectly reported as having an estimated value of more than $5 million. After removing these contracts and orders, our generalizable sample consisted of 97 DOD contracts and orders and 97 civilian agency contracts and orders. For each contract and order in our sample, we requested that the selected agencies identify whether the LPTA process was used. We independently verified agency responses by reviewing the solicitations for each of the contracts and orders within our two samples. We also verified relevant FPDS-NG data on estimated value and competition using agency-provided documentation for the contracts and orders we reviewed. Based on this, we determined these data were sufficiently reliable for us to estimate the percentage of contracts and orders valued at $5 million or more that the four components within DOD and the five selected civilian agencies competitively awarded in fiscal year 2018 using the LPTA process. We also used FPDS-NG product and service codes to identify whether the LPTA contracts and orders in our sample could be considered to be within one of the categories that the defense and civilian provisions direct agencies to avoid use of the LPTA process to the maximum extent practicable. The regulatory changes required by the defense and civilian provisions are not yet in place, and the defense and civilian provisions do not explicitly prohibit use of the LPTA process to acquire these categories of products and services. Therefore, we did not evaluate the reasons why an agency may have used the LPTA process in these instances. The findings based on our review of the product and services codes for the LPTA contracts and orders in our sample are not generalizable. We conducted this performance audit from February 2019 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Justin Jaynes (Assistant Director), Heather B. Miller (Analyst-in-Charge), Sarah Cantatore, Matthew T. Crosby, Lorraine Ettaro, Lori Fields, Stephanie Gustafson, Julia Kennon, Sarah Martin, Alyssa Weir, and Khristi Wilkins made key contributions to this report.", "summary": "When awarding a contract competitively, agencies can evaluate proposals using a best value, LPTA process that assesses which firm offered the lowest priced technically acceptable proposal. Section 813 of the NDAA for Fiscal Year 2017, as amended, included limitations on DOD's use of the LPTA process and required DOD to revise its acquisition regulation to reflect new criteria for use of the LPTA process. Section 880 of the NDAA for Fiscal Year 2019 required the FAR to be updated with similar requirements for civilian agencies. Sections 813 and 880 also included provisions for GAO to report on the number of instances where the LPTA process was used for contracts exceeding $5 million. This report describes (1) the status of regulatory changes governing the use of the LPTA process; and (2) the extent to which DOD and selected civilian agencies used the LPTA process to competitively award contracts and orders valued over $5 million in fiscal year 2018. GAO interviewed DOD and civilian agency officials involved in revising the DFARS and the FAR. GAO used data from the Federal Procurement Data System-Next Generation to select the top four DOD components and the top five civilian agencies based on the total number of contracts and orders valued at $5 million or more and competitively awarded in fiscal year 2018. Using this data, GAO developed generalizable samples to estimate these components' and agencies' use of the LPTA process in fiscal year 2018. Defense and civilian agencies are in the process of revising acquisition regulations to include criteria and limitations for using the lowest price technically acceptable (LPTA) process, as established under the National Defense Authorization Acts (NDAA) for Fiscal Years 2017 and 2019. While the Acts required revised regulations to be in place within 120 days of enactment, officials involved in revising the regulations stated that this process typically takes at least a year. The Department of Defense (DOD) issued a proposed Defense Federal Acquisition Regulation Supplement (DFARS) rule in December 2018 and expects the rule to be finalized by the end of fiscal year 2019. Officials responsible for revising the Federal Acquisition Regulation (FAR) have drafted a proposed FAR rule. The proposed FAR rule is scheduled to be published in the Federal Register in September 2019. See the figure below for the time frames and actions taken to update the DFARS and the FAR. Based on the results of GAO's generalizable samples, DOD used the LPTA process more frequently than selected civilian agencies in fiscal year 2018 for competitive contracts and orders valued at $5 million or more (see table).", "document_type": "gao"}
{"report": "In creating the military justice system, Congress established three types of military courts, called the summary, special, and general courts-martial, to adjudicate UCMJ violations. Each of these types of military courts respectively is intended to deal with progressively more serious offenses, and each court-martial type may adjudicate more severe maximum punishments as prescribed under the UCMJ. In addition, an accused servicemember can receive nonjudicial punishment under Article 15 of the UCMJ, by which a commander can punish a servicemember without going through the court-martial process. There are several steps in the discipline of a servicemember who allegedly commits a crime under the UCMJ, which are summarized in figure 1 below. The military justice process begins once an offense is alleged and an initial report is made, typically to law enforcement, an investigative entity, or the suspect’s chain of command. The commanding officer, law enforcement, or a military criminal investigative organization (MCIO) will conduct an inquiry or investigation into the accusation and gather all reasonably available evidence. Investigations are recorded in MCIO databases when a servicemember is the subject of a criminal allegation; for the purposes of our report, we say the servicemember had a “recorded investigation” to describe these cases. Following an investigation, the first step toward initiation of a court-martial is when the accused is presented with a list of charges signed by the accuser under oath, which is called preferral of charges. After charges are preferred, the charges are forwarded to an officer with sufficient legal authority to convene a court-martial, also known as the “convening authority.” The convening authority in receipt of preferred charges may, among other actions, refer the case to its own court or forward the case to a superior commander for disposition. Once referred to a general or special court- martial, an accused servicemember may be tried by a military judge alone or by a military judge with a military jury. In summary courts-martial, a single commissioned officer who is not a military judge adjudicates minor offenses and a sentence. Convictions at the general and special court- martial level are subject to a post-trial process and may be appealed to higher courts in cases where the sentence reaches a certain threshold. The military justice system, like the civilian criminal justice system, provides avenues for accused servicemembers to raise allegations of discrimination, improprieties in investigations, improprieties in disposition, and improprieties in the selection of the military jury at the court-martial proceeding, before a judge and on appellate review. The military services do not collect and maintain consistent information regarding race and ethnicity in their investigations, military justice, and personnel databases. Specifically, the number of potential responses for race and ethnicity within the 15 databases across the military services ranges from 5 to 32 options for race and 2 to 25 options for ethnicity, which can complicate cross-service assessments. For example, the Army’s personnel database maintains 6 options for race and 23 options for ethnicity, whereas the Coast Guard’s personnel database maintains 7 options for race and 3 for ethnicity. Table 1 below summarizes how the databases used by the military services vary in how the servicemember’s race is entered and the number of potential race options. Table 2 shows that the military services’ databases also vary in how information about servicemembers’ ethnicity is entered into the databases and the number of potential ethnicity options that are collected. Although the data collected and maintained was not consistent within and across the military services, each of the military services’ databases maintained race and ethnicity data for at least 99 percent of the servicemembers, with the exception of the Coast Guard. The Coast Guard did not track information about race or ethnicity in its military justice database, Law Manager. Coast Guard officials stated that this is because Law Manager was designed to determine the status of court- martial cases, and captures attributes that are needed to generate relevant UCMJ documents, such as court pleadings. Demographic information such as race and ethnicity is not included in these official documents, so this information is not input into Law Manager. Further, four of the databases we reviewed—including both of the Army’s military justice databases, and the Navy and the Marine Corps’ military justice databases—collect information on race and ethnicity in a combined data field as shown in table 2 above, whereas the other databases collect and maintain race and ethnicity information in two separate fields. These inconsistencies limit the military services’ ability to collectively or comparatively assess these demographic data to identify any racial or ethnic disparities in the military justice system within and across the services. Recommendations to collect and maintain race and ethnicity information in investigations and personnel databases. To address these inconsistencies, in our May 2019 report, we made four separate recommendations to each of the military departments and to the Secretary of Homeland Security for the Coast Guard. We recommended that these entities develop the capability to present servicemembers’ race and ethnicity data in their investigations and personnel databases using the same categories of race and ethnicity established in the uniform standards for the military justice databases that were issued in December 2018. As part of these uniform standards, the military services were directed to collect data related to race and ethnicity in their military justice databases, to collect race and ethnicity data in separate data fields, and to standardize the reporting of the data into categories identified in the standards. However, DOD applied these December 2018 standards only to the military justice databases and not to the investigations and personnel databases. DOD officials stated that the investigations and personnel databases do not fall under the charter of the DOD General Counsel, which issued the standards for the military justice databases. DOD and the Department of Homeland Security (DHS) concurred with these four recommendations. As of October 2019, officials from each of the military departments said that they were working to implement the uniform standards for race and ethnicity and the ability to aggregate the data, and they expected to implement these categories in December 2020. Similarly, as of May 2019, the Coast Guard expected to implement such modifications by September 2020. Although some military services report demographic information about the subjects of military justice actions internally, the military services have not externally reported data that provides visibility into, or would enable an analysis of, the extent of racial or ethnic disparities in the military justice system. Officials from all of the military services told us that they compile internal quarterly or monthly staff judge advocate reports, which include the total number of each type of court-martial handled by their legal offices and of nonjudicial punishments. According to military service officials, the Air Force and the Army reports include demographic information about servicemembers involved in these cases, such as the total number of each type of case broken out by the subject’s race and ethnicity. However, the Navy, Marine Corps, and Coast Guard reports do not include this demographic information, and there was no requirement to do so at the time of our May 2019 report. Regarding external reporting, the UCMJ directs the Court of Appeals for the Armed Forces, the Judge Advocates General, and the Staff Judge Advocate to the Commandant of the Marine Corps to submit annual reports on the military justice system to the Congressional Armed Services Committees, the Secretary of Defense, the secretaries of the military departments, and the Secretary of Homeland Security. These reports are to include information on the number and status of pending cases handled in the preceding fiscal year, among other information. The annual reports include the total number of cases each military service handled for each type of court-martial and for nonjudicial punishments. However, prior to our review, these annual reports did not include demographic information about servicemembers who experienced a military justice action, such as breakdowns by race, because the reporting requirement did not direct the military services to include such information. Recommendation to require military services to include data about race and ethnicity in annual reports about military justice actions. In our May 2019 report, we recommended that the Joint Service Committee on Military Justice, which is responsible for reviewing the UCMJ annually, consider an amendment to the UCMJ’s annual military justice reporting requirements to require the military services to include demographic information, including race and ethnicity, for all types of courts-martial. DOD concurred with this recommendation. According to a memorandum from the Joint Service Committee on Military Justice, in September 2019 the committee proposed an action item as part of its annual review. Specifically, the committee was considering an amendment to the UCMJ’s annual military justice reporting requirements to require the military services to include demographic information, including race and ethnicity, for all types of courts-martial. However, in December 2019, the National Defense Authorization Act for Fiscal Year 2020 included a provision directing the Secretary of Defense to include data on race, ethnicity, and gender in the annual military justice reports. We believe that this statutory change meets the intent of our recommendation. By requiring the military services to report this information, servicemembers and the public will have greater visibility into potential disparities, which will help build confidence that DOD is committed to a military justice system that is fair and just. DOD has not issued guidance that establishes criteria to specify when any data indicating possible racial or ethnic disparities in the investigations, trials, or outcomes of cases in the military justice system should be further reviewed, and to describe what steps should be taken to conduct such a review if it were needed. While equal employment opportunity enforcement is a very different context than the military justice system, other federal agencies have developed such criteria in the equal employment opportunity context that can indicate when disparities should be examined further. For example, the Department of Justice, the Department of Labor, the Equal Employment Opportunity Commission, and the Office of Personnel Management use a “four-fifths” test to determine when differences between subgroups in the selection rates for hiring, promotion, or other employment decisions are significant. These criteria, though inexact, provide an example of the type of criteria that DOD could consider using as a basis for determining when disparities among racial groups in the military justice process could require further review or analysis. Recommendation to issue guidance to establish criteria that determines when racial and ethnic disparities should be reviewed. In our May 2019 report, we recommended that the Secretary of Defense, in collaboration with the Secretaries of the military departments and the Secretary of Homeland Security, issue guidance that establishes criteria to specify when data indicating possible racial, ethnic, or gender disparities in the military justice process should be further reviewed, and that describes the steps that should be taken to conduct such a review. In commenting on a draft of our report, DOD partially concurred with this recommendation, agreeing with the content, but requesting that we modify the recommendation to direct it to more appropriate entities. That change was made before our report was issued. In October 2019, DOD officials said that the department was exploring the feasibility of conducting relevant research to inform implementation of this recommendation. At that time, they estimated that this research might be concluded in March 2021. In December 2019, the National Defense Authorization Act for Fiscal Year 2020 included a provision directing the Secretary of Defense to issue guidance consistent with our recommendation. DOD was directed to commence or carry out these activities by June 2020. We believe that issuing guidance that establishes criteria for determining when data indicating possible racial disparities in the investigations, trials, or outcomes of cases in the military justice system should be further examined, and describes the steps that should be taken to conduct such further examination, would better position DOD and the services to monitor the military justice system to help ensure that it is fair and just, a key principle of the UCMJ. Racial disparities exist in investigations, disciplinary actions, and punishment of servicemembers in the military justice system. Our analysis of available data from fiscal years 2013 through 2017, which controlled for attributes such as race, gender, rank, education, and years of service, found racial disparities were more likely in actions that first brought servicemembers into the military justice system, but we identified fewer statistically significant racial disparities in case outcomes— convictions and punishment severity. Black and Hispanic servicemembers were more likely than White servicemembers to be the subjects of recorded investigations in all of the military services, and were more likely to be tried in general and special courts-martial in the Army, the Navy, the Marine Corps, and the Air Force, as shown in figure 2 below. We could not analyze Coast Guard cases due to the small number of general and special courts-martial adjudicated in the Coast Guard from fiscal years 2013 through 2017. When separating general and special court-martial cases into those that either were or were not preceded by an investigation recorded in an MCIO database, we found fewer statistically significant racial disparities in most of the military services in general and special courts-martial that were preceded by a recorded investigation. However, as shown in figure 3 below, statistically significant racial disparities were also present in general and special courts-martial that did not follow a recorded investigation in all military services included in this analysis, which would include cases where the investigation was performed by the servicemember’s command. Specifically, as shown in figure 3 above, we found that: General and special courts-martial following a recorded investigation. Black, Hispanic, and servicemembers in the Other race category in the Army, and Hispanic servicemembers in the Marine Corps were more likely than White servicemembers to be tried in general and special courts-martial following a recorded investigation, after controlling for other attributes. We generally found fewer statistically significant differences compared to the results of our analyses for all special and general courts martial. General and special courts-martial without a recorded investigation. Black servicemembers in all of the military services were more likely than White servicemembers to be tried in general and special courts-martial without a recorded investigation after controlling for other attributes. These differences were consistent with the differences we identified for general and special courts-martial overall, as shown in figure 2 above. Hispanic servicemembers in the Army were more likely than White servicemembers to be tried in general and special courts-martial without a recorded investigation, but we found no statistically significant differences in the likelihood of Hispanic servicemembers to be tried in general and special courts-martial without a recorded investigation in the Marine Corps, the Navy, or the Air Force. Black servicemembers were more likely than White servicemembers to be tried in summary courts-martial and to be subjects of nonjudicial punishment in the Air Force and the Marine Corps, as shown in figure 4. The Army and the Navy did not maintain complete summary court-martial or nonjudicial punishment data, and the Coast Guard had too few summary courts-martial for us to analyze, and did not maintain complete nonjudicial punishment data. We could not determine whether disparities existed among servicemembers tried in summary courts-martial or subject to nonjudicial punishments in the Army and the Navy because the Army and the Navy did not collect complete summary courts-martial or nonjudicial punishment data in their investigations, military justice, or personnel databases. Specifically, as part of our data reliability checks, we identified the total number of summary courts-martial that the Army and the Navy reported in the Court of Appeals for the Armed Forces annual reports for fiscal years 2013 through 2017, and compared these totals to the number of cases we identified in their military justice databases. While our comparisons are not exact, due to differences in the dates we used to count the number of cases, we found that approximately 60 percent of the Army’s reported summary courts-martial cases and less than 50 percent of the Navy’s reported summary courts-martial cases were included in their military justice databases. The absence of complete summary court-martial data in the military justice databases of the Army and the Navy limits these services’ visibility into any disparities that may exist among servicemembers involved in these types of military justice proceedings. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140a of the Military Justice Act of 2016. As part of these uniform standards, the military services were directed to collect certain information about all cases in their military justice databases, which a DOD official said includes summary court- martial cases. The DOD General Counsel directed that military services are to implement the Secretary’s direction no later than December 23, 2020. Similarly, we identified the total number of nonjudicial punishments that the Army, the Navy, and the Coast Guard reported in the Court of Appeals for the Armed Forces annual reports for fiscal years 2013 through 2017, and compared these totals to the number of cases we identified in their military justice and personnel databases. As shown in figure 5 below, we found that 65 percent of the Army’s reported nonjudicial punishments, 8 percent of the Navy’s reported nonjudicial punishments, and 82 percent of the Coast Guard’s reported nonjudicial punishments were recorded in their military justice databases. Recommendation to include benefits and drawbacks of collecting and maintaining complete information for nonjudicial punishment. In our May 2019 report, we made separate recommendations to the Army, the Navy, and the Coast Guard to consider the feasibility, to include the benefits and drawbacks, of collecting and maintaining complete information for all nonjudicial punishment cases in one of the military service’s databases, such as information on the servicemembers’ race, ethnicity, gender, offense, and punishment imposed. DOD and DHS concurred with these recommendations. As of October 2019, Army and Navy officials said that they were developing the capability to collect data on race, ethnicity, gender, offense and punishment imposed for nonjudicial punishments. They expected to complete this action in December 2020. As of May 2019, the Coast Guard stated that it would consider the feasibility of collecting and maintaining complete information for all nonjudicial punishments cases through a military justice and personnel work group. The estimated completion date for this action had not been determined at that time. We identified fewer statistically significant racial disparities in case outcomes—convictions and punishment severity. Among the servicemembers convicted in general and special courts-martials, we found no statistically significant differences regarding the likelihood of conviction among racial groups in the Army, the Navy, the Marine Corps, and the Air Force, while controlling for other attributes, as shown in figure 6 below. In the military services that maintained complete punishment data—the Army, the Navy, the Marine Corps, and the Air Force—we found that minority servicemembers were either less likely to receive a more severe punishment in general and special courts-martial compared to White servicemembers, or there were no statistically significant differences in punishments among racial groups. Specifically, as shown in figure 7, Black servicemembers were less likely to receive a more severe punishment in general and special courts-martial compared to White servicemembers in the Navy, but there was no statistically significant difference for Black servicemembers in the Marine Corps, the Army, and the Air Force. Additionally, there were no statistically significant differences for Hispanic servicemembers in the Navy, the Marine Corps, the Army, or the Air Force. We could not determine disparities in case outcomes—convictions and punishment severity—in the Coast Guard’s general and special courts- martial for fiscal years 2013 through 2017 because the Coast Guard did not collect and maintain complete conviction and punishment data in its military justice database. Specifically, 16 percent of all Coast Guard cases were missing conviction and punishment data. When broken down by court-martial type, 20 percent of general court-martial cases, 15 percent of special court-martial cases, and 4 percent of summary court- martial cases were missing conviction and punishment data. Coast Guard officials acknowledged that incomplete conviction and punishment data entry is a consistent problem. They said that data entry had improved recently. On December 17, 2018, the General Counsel of the Department of Defense issued the uniform standards and criteria required by article 140a of the Military Justice Act of 2016. As part of these uniform standards, the military services were directed to collect information about the findings for each offense charged, and the sentence or punishment imposed. The DOD General Counsel directed that the military services are to implement the Secretary’s direction no later than December 23, 2020. DOD and the military services have taken some steps to study racial disparities in the military justice system over the last several decades, but they have not comprehensively studied the causes of any disparities. We previously reported in 1995 on DOD studies on discrimination and equal opportunity, and found DOD and the military services conducted seven reviews of racial disparities in discipline rates between 1974 and 1993. Since our 1995 report through 2016, DOD and military service assessments of military justice disparities have been limited. Officials in the Office of Diversity, Equity and Inclusion noted DOD has not conducted any department-wide assessments of racial disparities in military justice during this period. The military services’ diversity offices also were not able to identify any service-specific reviews of disparities in military justice. However, DOD has conducted climate surveys to address servicemembers’ perceptions of bias. In addition, the military services have some initiatives to examine and address disparities in military justice. For example, the Air Force routinely analyzes military justice data using a rates-per-thousand analysis to identify whether certain demographic groups are tried by courts-martial or subject to nonjudicial punishments at higher rates than others. These Air Force analyses found that Black servicemembers were more likely than White servicemembers to be subject to courts-martial and nonjudicial punishments from fiscal years 2013 through 2017, which is consistent with what we found. However, the other services do not routinely conduct such analyses. Officials from DOD and the military services acknowledged that they do not know the cause of the racial disparities that have been identified in the military justice system. This is because they have not conducted a comprehensive evaluation to identify potential causes of these disparities and make recommendations about any appropriate corrective actions to remediate the cause(s) of the disparities. Recommendation to identify causes of racial disparities in the military justice system. In our May 2019 report, we recommended that the Secretary of Defense, in collaboration with the Secretaries of the military services and the Secretary of Homeland Security, conduct an evaluation to identify the causes of any disparities in the military justice system, and take steps to address the causes of these disparities as appropriate. DOD partially concurred with this recommendation, agreeing with the content, but requesting that we modify the recommendation to direct it to more appropriate entities. We made that change before the report was issued. In October 2019, DOD officials said that the department was exploring the feasibility of conducting a research project to delve into the differences in military justice data to inform implementation of this recommendation. At that time, they estimated that this research might be concluded in March 2021. In December 2019, the National Defense Authorization Act for Fiscal Year 2020 included a provision directing the Secretary of Defense to conduct an evaluation consistent with our recommendation. DOD was directed to commence or carry out these activities by June 2020. We believe that conducting a comprehensive analysis into the causes of disparities in the military justice system, would better position DOD and the military services to identify actions to address disparities, and thus help ensure that the military justice system is fair and just, a key principle of the UCMJ. In conclusion, our analysis of available data identified racial disparities in all of the military services for servicemembers with recorded investigations, and for four of the military services for trials in special and general courts-martial, but these disparities generally were not present in the convictions or punishments of cases. These findings show an association for disparities at particular stages of the military justice process, but are inconclusive regarding other stages for the period covered by our analysis. However, our findings of racial disparities, taken alone, do not establish whether unlawful discrimination has occurred, as that is a legal determination that would involve other corroborating information along with supporting statistics. The absence of complete nonjudicial punishment data in the Army, the Navy, and the Coast Guard limits their visibility into the vast majority of legal punishments imposed on servicemembers under the UCMJ every year. Without such data, these three military services will remain limited in their ability to assess or identify disparities among populations subject to this type of punishment. Our May 2019 report included several recommendations with specific actions that can be taken to better position DOD and the military services to identify and address disparities, such as (1) developing the capability to present race and ethnicity data from the military services’ personnel and investigations databases using the same categories as the military justice databases; (2) establishing criteria to determine when possible disparities among racial or ethnic groups should be further reviewed, and describing the steps that should be taken in such a review; and, importantly, (3) conducting a comprehensive evaluation of the causes of these disparities and taking steps to address them. To help build confidence that DOD is committed to a military justice system that is fair and just, and for the system of military law to be recognized as fair and just by both members of the armed forces and by the American public, DOD and the military services need to take actions to address these recommendations. Madam Chairwoman Speier, Ranking Member Kelly, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you or other Members of the Subcommittee may have at this time. If you or your staff have any questions about this testimony, please contact Brenda S. Farrell, Director, Defense Capabilities and Management, who may be reached at (202) 512-3604 or farrellb@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kimberly C. Seay, Assistant Director; Christopher Allison; Renee S. Brown; Vincent M. Buquicchio; Christopher Gezon; Won (Danny) Lee; Serena C. Lo; Dae B. Park; Samuel J. Portnow; and Clarice Ransom. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Uniform Code of Military Justice (UCMJ) was established to provide a statutory framework that promotes fair administration of military justice. Every active-duty servicemember is subject to the UCMJ, with more than 258,000 individuals disciplined from fiscal years 2013-2017, out of more than 2.3 million unique active-duty servicemembers. A key principle of the UCMJ is that a fair and just system of military law can foster a highly disciplined force. This statement provides information on 1) the collection of race and ethnicity information in the military services' databases, 2) the extent of racial disparities in investigations, disciplinary actions, and case outcomes in the military justice system, and 3) steps taken by DOD to study any identified disparities. This statement is based on GAO -19-344 issued on May 30, 2019. As part of that work, GAO analyzed data from the investigations, military justice, and personnel databases from the military services, including the Coast Guard, from fiscal years 2013-2017 and interviewed agency officials. In May 2019, GAO found that the military services did not collect consistent information about race and ethnicity in their investigations, military justice, and personnel databases. Thus, the military services are limited in their ability to identify disparities (i.e., instances in which a racial or ethnic group was overrepresented) in the military justice system. The military services were not required to, and thus did not, report demographic information that would provide greater visibility into potential disparities in their annual military justice reports. GAO's analysis of available data identified disparities in how likely servicemembers of different races were to be subjects of investigations recorded in military criminal investigative organization databases and tried in general and special courts-martial in particular. For example, in three military services, Black servicemembers were about twice as likely as White servicemembers to be tried in general and special courts-martial. Racial disparities generally were not present in convictions or punishments. These findings show an association for disparities at particular stages of the military justice process, but are inconclusive regarding other stages. However, GAO's findings of racial disparities, taken alone, do not establish whether unlawful discrimination has occurred, as that is a legal determination that would involve other corroborating information and supporting statistics. Note: These analyses, taken alone, should not be used to make conclusions about the presence of unlawful discrimination. These multivariate regression analysis results estimate whether a racial group is more likely or less likely to be the subject of an investigation or a trial in general or special courts-martial after controlling for race, gender, rank, and education, and in the Air Force, years of service. GAO made all racial comparisons to White servicemembers, and grouped individuals of Hispanic ethnicity together, regardless of race. The Other race category includes individuals who identified as American Indian/Alaska Native, Asian, Native Hawaiian/Other Pacific Islander, and multiple races. The Department of Defense (DOD) has taken some steps to study disparities but has not comprehensively evaluated the causes of racial disparities in the military justice system. Doing so would better position DOD to identify actions to address disparities and to help ensure the military justice system is fair and just. GAO made 11 recommendations in prior work, including that the military services develop the capability to present consistent race and ethnicity data, and DOD and the Coast Guard include demographic information in military justice annual reports and evaluate the causes of disparities. DOD and the Coast Guard generally concurred. Progress has been made in addressing some of the recommendations. Continued attention is needed to ensure that the remainder of these recommendations are addressed.", "document_type": "gao"}
{"report": "Approximately 51,000 drinking water systems and 15,000 public wastewater systems provide clean and safe water to communities nationwide. About 9,000 drinking water systems provide service to 92 percent of the total population, or approximately 273 million people nationwide. The remaining 8 percent of the population is served by small systems that according to the American Society of Engineers frequently do not have the financial, managerial, and technical capabilities necessary to meet state and federal requirements for safe drinking water, such as limits in the levels of specific contaminants in drinking water. Drinking water and wastewater facilities include infrastructure such as tanks, pipes, pumps, and buildings that contain electrical, chemical, and mechanical equipment to treat and test water. The infrastructure is often built to last for over 50 years or longer, depending on the equipment. Many utilities in the country were built decades ago and therefore have existing and aging infrastructure that they must operate and maintain. Utilities generally develop long-term capital plans to identify the infrastructure they will need to replace or rebuild in the future. Utilities generally use historic records of seasonal precipitation, runoff, water temperature, and snow pack levels to determine how their systems should be designed and operated. According to the Water Research Foundation’s 2014 study, utilities have designed their infrastructure based on the expectation that future climate conditions will remain the same and have used historical climate or other data within a 100-year range. Generally, the study reported that utility infrastructure is designed and operated to convey or treat water up to a specific threshold amount based on these historic records. As they plan to rebuild or replace their infrastructure, utilities employ or contract with engineers to ensure that their infrastructure treats and transports water appropriately to meet standards under the Safe Drinking Water Act or the Clean Water Act. Under the Safe Drinking Water Act, EPA, among other actions, sets standards to protect the nation’s drinking water from contaminants, such as lead and arsenic. The Clean Water Act generally prohibits the discharge of pollutants from “point sources”—such as discharge pipes from industrial facilities and wastewater treatment facilities—without a permit. Drinking water and wastewater infrastructure remain the largest financial investment by communities nationwide, according to the Water Research Foundation’s 2014 Study. To pay for operations, maintenance, repair, and replacement of their infrastructure, drinking water and wastewater utilities generally raise revenues by charging their customers for the services they provide. In addition, the federal government invests in drinking water and wastewater infrastructure, as we reported in September 2017. In 2017, the most recent year for which data were available, state and local governments spent approximately $109 billion on their drinking water and wastewater infrastructure, according to Congressional Budget Office data. During the same time period, the federal government spent approximately $4 billion on drinking water and wastewater infrastructure. Agencies across the federal government, such as NOAA and the National Aeronautics and Space Administration, collect and manage many types of climate information and provide technical assistance to make this information more meaningful to federal, state, local, and private decision makers. Decision makers from all levels of government and the private sector use different types of climate information in their planning processes to reduce the potential impacts of climate change. To be useful, climate information must be tailored to meet the needs of each decision maker, such as an engineer responsible for building a bridge in a specific location, a county planner responsible for managing development in a large region, or a federal official managing a national-scale program. Decision makers also need climate information at different timescales corresponding to the short-, medium-, or long-term nature of their planning processes. A 2011 World Meteorological Organization report stated that decision makers need access to expert advice and support to help them select and properly apply climate information. According to a 2010 National Research Council report on making informed decisions about climate change and our November 2015 report on climate information, most decision makers need a basic set of information to understand and make choices about how to adapt to climate change. The set of information includes the following: Information and analysis about observed climate conditions. This includes information on, for example, temperature, precipitation, drought, storms, and sea level rise and how they may be changing in a local area. Information about observed climate impacts and vulnerabilities. This includes site-specific and relevant information on environmental, social, and economic impacts and vulnerabilities, resulting from observed changes in the climate against which past and current decisions can be monitored, evaluated, and modified over time. Projections of what climate change may mean for a local area. This includes, for example, projections based on easily understandable best- and worst-case scenarios with confidence intervals and probability estimates and examples of potential climate impacts. The primary source is NOAA’s online Climate Explorer, which provides climate projections in a range of climate variables relevant to decision makers for every county in the contiguous United States, enabling users to compare historical climate observations under two possible climate change scenarios that could occur this century. Information on the economic and health impacts of climate change. Observed and projected local impacts must be translated into costs and benefits, as this information is needed for many decision-making processes. Agencies across the federal government collect and manage many types of climate information, including observational records from satellites and weather monitoring stations on temperature and precipitation, among other things; projections from complex climate models; and other tools to make this information more meaningful to decision makers. Presidential Policy Directive 21 directs federal agencies to work with owners and operators and state, local, tribal, and territorial entities to manage risks and strengthen the security and resilience of critical infrastructure against all hazards. The directive, issued in 2013, identifies 16 critical infrastructure sectors whose assets, systems, and networks—either physical or virtual—are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on the nation’s security, economy, and public health or safety. One of the sectors is the Water and Wastewater Sector. The directive established a national policy on critical infrastructure security and resilience and made DHS the lead agency to coordinate the overall federal effort to promote security and resilience of the nation’s critical infrastructure. The directive assigned protection responsibilities to selected federal government agencies and departments, called Sector Specific Agencies, and designated EPA as the Sector Specific Agency for the Water and Wastewater Sector. As the Sector Specific Agency, EPA organized a Water and Wastewater Government Coordinating Council, including federal, state, and local decision makers. In turn, water utility owners and operators organized the Water and Wastewater Sector Coordinating Council. EPA and the councils work together and are responsible for planning and implementing the sector’s security and resilience activities. Presidential Policy Directive 21 also directed the DHS to update the National Infrastructure Protection Plan to provide a framework for how federal, state and local decision makers and private sector stakeholders can coordinate to improve the security and resilience of critical infrastructure. The DHS updated the National Infrastructure Protection Plan in 2013 and EPA issued the Water and Wastewater Sector-Specific Plan in 2015. In 2016, the Water and Wastewater Government Coordinating Council and the Water and Wastewater Sector Coordinating Council chartered the Water and Wastewater Sector Strategic Roadmap Work Group to review key threats and vulnerabilities of the sector, identify gaps in the sector’s capabilities relative to the key threats and vulnerabilities, and develop priorities and associated actions to address those gaps. In 2017, the work group issued the report, Roadmap to a Secure and Resilient Water and Wastewater Sector (Roadmap), in part, to help inform utilities’, industry groups’, and government agencies’ planning processes and to support collaboration and leverage resources between stakeholders in the sector. The resulting report identified weather-related disasters, such as floods and earthquakes, and long-term climate-related hazards, such as drought and sea level rise, as among the most significant risks to drinking water and wastewater infrastructure. Our previous work on climate change found that the federal government could improve the way that it provides information to facilitate more informed local infrastructure adaptation decisions. In November 2015, we reported that federal agencies could help local infrastructure decision makers by providing the best available climate-related information and by clarifying federal sources of technical assistance for incorporating climate- related information into their planning. In November 2015, we found that federal efforts to provide climate information could be improved by incorporating key organizational and data elements, including (1) a focused and accountable organization; (2) authoritative data that define the best available information for decision makers; and (3) technical assistance to help decision makers assess, translate, and use climate information in planning. We recommended that the Executive Office of the President direct a federal entity to develop a set of authoritative climate change projections and observations and create a national climate information system with defined roles for federal and nonfederal entities. The Executive Office of the President neither agreed nor disagreed with the recommendations and, as of May 2018, had not implemented them. Our previous work on natural disasters found that disaster costs are a key source of federal fiscal exposure. In our July 2015 report on Hurricane Sandy, we found that there was no comprehensive, strategic approach to identifying, prioritizing, and implementing investments for disaster resilience, which increases the risk that the federal government and nonfederal partners will experience lower returns on investments or lost opportunities to strengthen critical infrastructure. We recommended that the Mitigation Framework Leadership Group—an interagency group chaired by FEMA that organizes mitigation efforts across the federal government and assesses the effectiveness of mitigation strategies— establish an investment strategy to identify, prioritize, and guide federal investments in disaster resilience and hazard mitigation-related activities and make recommendations to the President and Congress on how the nation should prioritize future disaster resilience investments. The Mitigation Framework Leadership Group agreed and issued the National Mitigation Investment Strategy in August 2019. In September 2018, we reported that four near-sequential disasters in 2017—Hurricane Harvey, Hurricane Irma, Hurricane Maria, and the California wildfires—created an unprecedented demand for federal disaster response and recovery resources and that Hurricanes Harvey, Irma, and Maria ranked among the top five costliest hurricanes on record. As of June 2018, Congress had appropriated over $120 billion in supplemental funding for response and recovery related to the 2017 hurricanes and wildfires. In October 2019, we issued a Disaster Resilience Framework that identifies federal actions and opportunities to enhance and promote disaster and climate change resilience nationwide focusing on three principles where the federal government can influence decision-making. First, the framework states that federal action can help ensure that decision makers at all levels of government and across industrial sectors can access, understand, and use information on current and future disaster risk. As part of this, federal agencies can use risk reduction strategies, such as providing technical assistance to help decision makers use climate information in their infrastructure investment decisions. Second, the framework stated that federal agencies can help decision makers use risk reduction strategies and prioritize all types of risk. For example, federal agencies can ensure that federal programs and policies that support disaster risk reduction are well coordinated. Third, the framework stated that federal agencies can provide decision makers at all levels of government and across sectors with incentives to make long- term, forward-looking risk reduction investments and remove barriers to such investments. Projected increases in the frequency, severity, and duration of extreme temperature changes or precipitation events, as well as rising sea levels, are among the potential impacts of climate change that may affect drinking water and wastewater infrastructure. The type and severity of these potential impacts on drinking water and wastewater infrastructure will vary by region. EPA, the USGCRP, NOAA, and other federal agencies have identified a variety of potential climate change impacts that may affect drinking water and wastewater infrastructure, as well as other critical and interconnected industries. EPA’s Adaptation Strategies Guide for Water Utilities (Guide) identifies five general categories of climate change impacts that can affect drinking water and wastewater utilities: ecosystem changes, droughts, floods, water quality degradation, and changes in service demand and use. Within these five general categories, EPA has identified specific climate change impacts that may affect drinking water and wastewater infrastructure systems. For example, degraded water quality from decreased stream flows may lead to higher treatment costs and the need for capital improvements to treat wastewater before discharging it from wastewater treatment facilities to meet more stringent regulatory requirements. Additionally, projected sea level rise can lead to saltwater intrusion in coastal groundwater aquifers and in estuaries. This may degrade water quality and increase treatment costs for drinking water treatment facilities or require new desalination facilities to treat water supplies with higher salt content. According to the Fourth National Climate Assessment, compound extreme events—the combination of two or more hazard events or climate variables (e.g., extreme rainfall and storm surge) that occur simultaneously or consecutively that lead to an extreme impact—have a multiplying effect on the risk to drinking water and wastewater infrastructure systems. Compound extreme events can also increase the risk of cascading infrastructure failure since some infrastructure systems rely on others and the failure of one system can lead to the failure of interconnected systems. This includes a water infrastructure system relying on the energy sector for power to operate pump stations and drinking water and wastewater treatment facilities. For example, during Hurricane Sandy in 2012, extreme rainfall coincided with high tides creating a storm surge. Hurricane Sandy caused power outages and flooding at eight of New York City’s 14 wastewater treatment facilities and 42 of the city’s 96 pumping stations. Further, power outages and flooding of wastewater treatment facilities and the large influx of floodwater in the sewer system resulted in the release of approximately 562 million gallons of untreated and diluted sewage into local waterways, as shown in figure 1. The Fourth National Climate Assessment states that drinking water and wastewater infrastructure in every region in the United States are sensitive to weather- and climate-related events and noted that the effects of such events will vary in severity and type by region, meaning different measures will be required to make infrastructure more resilient. The Fourth National Climate Assessment established 10 climate regions to better address the risks and needs of specific regions across the United States. Further, EPA’s Guide states that the type and severity of potential climate impacts on utilities will vary by region, and identifies the impacts that have the greatest likelihood of affecting utilities in the different regions and along the U.S. coast. For example, in the Southwest, increased duration and intensity of drought may stress water supplies and increase water demand for agricultural uses, increase energy requirements to treat and cool drinking water and wastewater effluent, and require investments in new water sources and options for reusing water. In the Northwest, increased water temperatures, as well as wildfires that create increased nutrient runoff, may degrade drinking water quality from higher levels of harmful toxins and algal blooms, and require drinking water utilities to develop increased treatment capabilities. The interactive map in figure 2 displays the 10 climate regions as established in the Fourth National Climate Assessment and the U.S. coasts, the most relevant potential climate change impacts for each region and the coast, and examples of the potential effects on drinking water and wastewater utilities, according to EPA’s Guide. One federal program—EPA’s Creating Resilient Water Utilities initiative— is designed to provide technical assistance to drinking water and wastewater utilities for planning climate resilient infrastructure, although the 15 selected utilities used a mix of sources, including other federal programs, to obtain technical assistance with understanding climate impacts and designing resilient infrastructure. To provide additional technical assistance for climate resilience, selected experts generally supported the option of developing a coordinated network of technical assistance providers including federal and state agencies, universities, consultants, and industry groups. Our review of the programs federal agencies’ used to provide technical assistance to 15 selected utilities to help make drinking water and wastewater infrastructure more climate resilient found that one program— EPA’s Creating Resilient Water Utilities initiative (CRWU)—was specifically designed to provide drinking water, wastewater, and stormwater utilities with the practical tools, resources, training, and technical assistance needed to increase resilience to extreme weather events. The initiative provides web-based tools and resources in the form of an interactive guide, a case studies map, a risk assessment tool, climate scenario projection maps, and storm surge inundation maps to help drinking water and wastewater utilities understand potential long- term risks and options to enhance their resilience to climate impacts, including extreme weather events. Furthermore, CRWU provides direct utility technical assistance and training through workshops and onsite exercises with utilities. As part of the initiative, EPA developed the Climate Resilience Evaluation and Assessment Tool (CREAT), a web- based application to assist drinking water and wastewater utilities in understanding potential climate change impacts and assessing the related risks to their systems. EPA also developed a Resilient Strategies Guide for Water Utilities, a web-based interactive guide to help drinking water and wastewater utilities identify resilience strategies to prepare for droughts, protect water quality, build flood protections, preserve ecosystems, maintain service levels, improve energy efficiency, implement green infrastructure, and conserve water. In addition, from 2010 through 2013, EPA collaborated with the Water Research Foundation and NOAA to publish the results of a series of workshops assessing the information and tools necessary to incorporate climate risks into utility planning. As part of a pilot program to help EPA develop CREAT, most of the drinking water and wastewater utilities we reviewed used CREAT to conduct climate risk assessments of their systems. Utility representatives said the tool was a helpful starting point for thinking about potential climate risks and vulnerable infrastructure qualitatively. For example, Bozeman Water and Sewer (Bozeman, Montana) used CREAT to assess potential consequences of drought, water quality changes, and wildfires on their drinking water assets and operations to better understand their systems’ vulnerabilities and start thinking about potential resilience measures. Keene Public Works (Keene, New Hampshire) also used CREAT to assess potential climate change impacts from extreme precipitation events on their water supplies and drinking water system and evaluate the performance and costs of additional short-term and long-term resilience measures. However, representatives from a few drinking water and wastewater utilities said they used additional assistance from consulting firms to help them use CREAT, and to complete assessments on the current and future climate risks to their infrastructure systems. A few other federal agencies have been involved in efforts to help utilities incorporate climate resilience into their planning, but their programs were not specifically designed to provide technical assistance to water utilities. NOAA’s Regional Integrated Science Assessments (RISA) program and the National Center for Atmospheric Research (NCAR) worked with utilities and EPA, through an effort called the Water Utility Climate Alliance which aims to enhance the quality and accessibility of regional climate change data to help improve water resource planning, develop adaptation strategies, and assist overall decision-making for water-related policies. The alliance, which was formed in 2007 and includes 12 of the nation’s largest drinking water utilities, provides leadership and collaboration on climate change issues affecting the country’s water agencies. The alliance collaborates with member agencies, federal agencies, industry groups, academia, and consulting firms to provide workshops on planning for climate change uncertainty for drinking water and wastewater sector professionals. Representatives from the New York City Department of Environmental Protection (New York City, New York) and the San Diego County Water Authority (San Diego, California), stated that through their membership in the alliance, they have used technical assistance from NOAA’s RISA program research teams and the Water Research Foundation to manage their climate risks. Specifically, in 2010, four Water Utility Climate Alliance members, including the New York Department of Environmental Protection (New York City, New York), contributed to a pilot project to better understand how climate change might affect their water systems through collaboration between climate experts and utilities, with the goal of improving the process of producing climate information utilities need for decision-making. Two RISA research teams, the Consortium on Climate Risk in the Urban Northeast at Columbia University and the Pacific Northwest Climate Impacts Research Consortium at Oregon State University, provided technical assistance on climate information and modeling to support the effort. In 2013, three Water Utility Climate Alliance members, including the San Diego County Water Authority (San Diego, California), contributed to a research study to increase the adaptive capacity of water utilities in planning for and responding to pressures that may result from climate change, particularly related to the demand for water. The Water Research Foundation led the study. We found that other federal programs offer technical assistance, but the assistance is either not targeted to drinking water and wastewater utilities or it is not specific to climate impacts. For example, San Diego Public Utilities (San Diego, California) worked with the Bureau of Reclamation to assess the region’s water supply and demand, determine the potential effects from climate change impacts within the region, and explore alternatives for addressing future water management challenges. Utilities in Estes Park, Colorado and Iowa City, Iowa worked with FEMA after flood events to develop long-term recovery plans that made their river pipeline crossings stronger and moved a wastewater treatment plant from the floodplain, respectively. In addition, several of the selected utilities worked with NOAA or the U.S. Geological Survey to collect data necessary for planning efforts, including monitoring weather and storms, rainfall levels from stream gauges, and salt water intrusion into water supplies. Houston Water (Houston, Texas) also used NOAA’s Atlas 14 Precipitation-Frequency Atlas to update its floodplain regulations and redefine the amount of rainfall it takes to qualify as a 100-year or 1,000- year flood event (see fig. 3 for pictures of flooded infrastructure). To date, federal efforts to provide technical assistance to help drinking water and wastewater utilities manage climate risks have been small- scale or pilot efforts to develop tools and information. For example, EPA’s CRWU has developed a number of tools and guides for utilities and has provided training and assisted a number of utilities, but the number of utilities that EPA helped directly is small—about 50—and EPA does not have the resources to provide assistance to all utilities, according to EPA officials. Similarly, the Water Utility Climate Alliance’s membership consists of 12 utilities in large metropolitan areas, and has focused on large utilities when developing examples of how drinking water utilities can plan for climate risks according to Water Utility Climate Alliance representatives; however, these alliance members are large enough to have in-house climate expertise and have established relationships with federal or university-based climate services providers. According to industry group officials, the majority of the 70,000 utilities across the country are small and do not have resources to work with consultants or research climate information. While water utilities used federal technical assistance, we found that almost all of the selected drinking water and wastewater utilities, regardless of size, used a mix of technical assistance providers including consultants, industry groups, academia, or federal programs to help them plan for resilience projects, as shown in appendix IV. Most of the selected utilities said they used a mix of assistance because they needed help understanding what climate information and climate models were appropriate to use for their regions and locales. For example, Anacortes Public Works (Anacortes, Washington) worked with the Skagit Climate Science Consortium—a nonprofit organization—to conduct a climate risk assessment for their drinking water system. Anacortes Public Works used the initial climate risk assessment to implement projects that will increase their resilience to the most significant effects from climate- related impacts, flooding, and increased sediment levels in their water supply (see fig. 4). Anacortes Public Works plans to work with the consortium again to better understand how rising sea levels and increasing salinity levels will affect their drinking water supply in the future. A few utilities said that technical assistance efforts should be a collaborative process between the utilities using climate information to make decisions and the scientists providing the technical assistance to ensure that climate information and models are what drinking water and wastewater utilities need to plan for climate resilience. All 10 of the selected experts we interviewed said that drinking water and wastewater utilities need additional technical assistance to manage climate risks. Specifically, these experts stated that utilities need technical assistance to use key climate information to incorporate climate resilience into their planning and operations. This information includes the following: forward-looking climate information and models to identify vulnerabilities to specific geographic regions; potential climate change impacts on regional and local socioeconomic and demographic trends for utility users; hydrologic information on the movement, distribution, and quality of water at the local, regional, and/or watershed level; and estimates of benefits and costs of incorporating resilience into utility projects. According to several of the selected experts we interviewed, such information is provided through a mix of sources, depending on what is available, and all sources are needed. Several selected experts also said that the utilities could obtain forward-looking climate information and models from federal agencies, such as NOAA, and could obtain information on potential climate change impacts from CREAT. In addition, several experts stated that they could obtain local socioeconomic and demographic data, hydrologic information, and benefit-cost information from industry sources, universities, and consultants. Several of the experts we interviewed also said that such assistance is not a one-time event, but requires consistent and continuous collaborative efforts between utilities and technical assistance providers. For example, several experts said that utilities need technical assistance on an ongoing basis to reevaluate their planning and operations regularly given the uncertainty associated with the severity of some potential climate risks. In addition, several experts said that individual utilities need help understanding which climate information and analytical tools are appropriate for assessing the climate risks specific to their regions or localities, and how to use them to manage climate risks to their infrastructure. Almost all of the experts said that small and rural utilities would need additional technical assistance to collect and use the information necessary to enhance their resilience to climate change impacts. Specifically, several experts said that, as opposed to many large utilities, small utilities lack the technical capacity to use climate information and do not have the financial resources to hire consultants or develop the internal expertise necessary to manage climate risks to their drinking water and wastewater infrastructure. Further, most of the selected experts we interviewed stated that a network of providers would be needed to provide assistance to water utilities. This is consistent with what we and others have previously reported. For example, we reported in November 2015 that clearly organized technical assistance would improve federal climate information efforts by helping different types of decision makers—ranging from those who can define their needs to those who have limited experience using climate information—access, translate, and use climate information. We also found that key stakeholders and relevant studies generally called for a system of nonfederal technical assistance providers, with federal leadership to help federal, state, and local decision makers, including utility decision makers, use climate information. In addition, a 2014 task force of state, local, and tribal leaders stated that the greatest need for enhancing climate resilience is often not the creation of new data or information, but assistance and tools for decision makers, including utility managers, in navigating the wide array of resources already available. Further, in August 2019, the National Mitigation Investment Strategy recommended that the federal government increase investment in hazard mitigation by building the capacity of communities to address their risks, including climate-related risks. To implement the recommendation, the strategy said that the federal government should create a professional network to encourage collaboration and information sharing across different levels of government and the water and wastewater sector, and that the federal government and its nonfederal partners should work together to develop a pool of skilled mitigation professionals. The following is a list of options for providing a network of technical assistance providers that selected experts we interviewed discussed, as well as the advantages and disadvantages of each. Existing utility technical assistance providers. A strengthened and expanded network of existing federal technical assistance providers, including EPA’s Environmental Finance Centers, USDA’s Rural Utilities Service, the National Rural Water Association, and the Rural Community Assistance Partnership, could help consolidate climate information and provide technical assistance to utilities to improve their resilience. Most experts said that a network of existing utility technical assistance providers would have the advantage of established relationships with communities and utilities or could ensure that small and rural utilities obtain needed information and assistance to improve their resilience to climate change. However, several experts said that the network may lack the expertise necessary to effectively identify or develop climate information and planning tools to provide the technical assistance necessary to meet the specific needs of utilities to improve their resilience. See appendix V for additional information on these programs. Existing federal climate services providers. A strengthened and expanded network of existing federal climate services providers, such as USDA’s Climate Hubs, Interior’s Landscape Conservation Cooperatives, Interior’s Climate Science Centers, and NOAA’s RISA program could provide technical assistance to utilities to improve their resilience. Several experts said that a network of existing federal climate services providers would have a good understanding of the available climate information and would, for example, be best positioned to develop the specific tools and guidance necessary to provide the technical assistance utilities need to improve their resilience. In contrast, several experts said that federal climate services providers may not have the established relationships with utilities necessary to understand and tailor technical assistance to the needs of individual utilities. In addition, one expert said that the climate services providers may not have the funding to provide these services to utilities in a comprehensive way. See appendix V for additional information on these programs. Universities and university-based research centers. A new network of academic or university-based technical assistance providers, such as NCAR, organized by state, region, or watershed could provide technical assistance to all types of utilities to improve their resilience. According to several experts, this option would be advantageous because many universities and centers already have the technical capacity to use climate information to provide risk assessment and planning tools necessary to provide technical assistance to utilities at the local or regional level. Several experts also said that it would be cost-effective to expand this option because some universities and centers are already providing technical assistance. However, several experts said that without a clear shift in federal incentives to prioritize the applied research necessary to provide the technical assistance that utilities need, universities and centers are unlikely to provide sustained assistance nationwide. Similarly, several experts said that federal coordination would be needed to ensure that the universities and centers were consistently providing information, planning tools, and assistance that meet the specific needs of utilities. See appendix V for additional information on these programs. Industry groups and private-engineering consultants. A new network of nonfederal industry and nonprofit groups, such as the American Water Works Association and the Association of Municipal Water Utilities, could provide technical assistance to utilities to improve their resilience. Several experts said that this option would be advantageous because it could leverage existing relationships, for example, to strengthen information sharing between utilities regarding the best available climate information and approaches to resilience planning. In addition, several experts said that industry groups and private engineering consultants would have a better understanding of utility operations and management when compared to other options for providing technical assistance. In contrast, half of the experts said that this network would need additional federal oversight and coordination. For example, several experts said that there would need to be a certification process for industry groups and private consultants to ensure that the technical assistance being provided to utilities was sufficient and transparent. In addition, several experts said that the network would not be effective unless it was coordinated among stakeholders from, for example, the private sector; industry groups; and federal, state, and local governments. A network of utilities. A network of utilities, similar to the Water Utility Climate Alliance, could consolidate and update information and provide technical assistance for all types of utilities to improve their resilience. Similar to a network of industry groups and consultants, several experts said a network of utilities could help coordinate and strengthen information sharing between utilities on best practices and lessons learned from resilience planning. However, several other experts said that it would be difficult to develop and expand a network of utilities that was capable of providing technical assistance to utilities of different sizes or geographic locations. One expert also said that utilities that provide technical assistance would need to be certified by the federal government, academics, or industry groups to ensure the technical assistance being provided to utilities was sufficient. When asked how they would design a network to provide technical assistance, most experts supported an approach in which federal agencies organized a network of technical assistance providers for drinking water and wastewater utilities, a network that would include federal and state agencies, universities, consultants, and industry groups. For example, one expert said that EPA and other relevant federal agencies could provide guidance and leadership for a network of (1) university and federal climate services providers that would assess the risks that potential climate impacts pose to utilities and (2) utility technical assistance providers, including consultants and industry groups, to help utilities apply those assessments to their infrastructure to make it more resilient. Another expert said that existing networks of universities, industry groups and consultants, or utilities would not be as effective unless they were part of a larger networked effort with clear leadership that provides continuous technical assistance to utilities. Similarly, several experts stated that it was important that the network be a collaboration of different technical assistance providers to be able to tailor the technical assistance to the needs of different types of utilities, in different locations, with differing technical capabilities. For example, one expert said that universities, industry groups, and federal programs have different levels of resources and expertise in different regions of the country and a coordinated network could help utilities identify the sources of technical assistance in their regions or localities. Further, another expert said that it was important that the network have the capability to help utilities understand and respond to climate risks that other types of infrastructure create. Specifically, the expert said that while EPA has a role in regulating drinking water and wastewater infrastructure, the agency does not regulate larger-scale infrastructure, such as dams and reservoirs that need to be operational to reduce risks to utilities. Under Presidential Policy Directive 21, EPA, as the Sector Specific Agency for the water and wastewater systems sector, is to work to enable efficient information exchange between federal agencies and infrastructure owners and operators, and to implement an integration and analysis function to inform planning and operational decisions regarding critical infrastructure. In addition, one of the key activities of the Water Sector Government Coordinating Council, which EPA chairs, is to facilitate information sharing between federal, state, and local decision makers on critical infrastructure protection. This is consistent with our disaster resilience framework, which states that federal efforts should improve the availability of authoritative, understandable, and comprehensive information on disaster risks and risk reduction strategies to help entities effectively assess their climate risks, determine what viable alternatives are available to increase resilience to those risks, and better understand and measure the impact of resilience strategies. Our framework also states that federal efforts can help by providing technical assistance and capacity building to nonfederal partners. To date, however, federal efforts to provide technical assistance to drinking water and wastewater utilities do not provide the ongoing technical assistance that according to experts utilities need to plan and build climate resilient infrastructure. In addition, current efforts may not be widespread enough to provide comprehensive coverage of the drinking water and wastewater utilities across the nation. The 2017 Roadmap shows actions for the short term (2 years) and midterm (5 years), but it does not include actions such as developing guidance on technical assistance, building networks of technical assistance providers, or developing other methods to help utilities build capacity to manage their climate change risks and plan for resilient infrastructure. According to EPA officials we interviewed, the agency has worked within its existing authorities and available resources to prioritize developing voluntary guidance, tools, training, and webinars that utilities can use to identify potential risks from climate change and plan to improve their resilience. Further, EPA officials said that while the agency has collaborated closely with key federal, state, and local decision makers; industry groups; and utilities in its role as chair of the Water Sector Government Coordinating Council, the council has focused on other short-term threats to utilities, such as disasters and terrorism, and has not assessed how it could develop and coordinate a network to effectively provide the technical assistance that utilities need to enhance their climate resilience. By identifying and engaging existing technical assistance providers in a network to help drinking water and wastewater utilities incorporate climate resilience into their projects and planning on an ongoing basis, EPA would have more reasonable assurance that climate information was effectively exchanged among federal agencies and infrastructure owners and operators. Supporting the need for a broader collaborative approach, several of the selected utilities are already members of organizations that coordinate and collaborate among members and various technical assistance providers, including federal agencies, to understand the potential climate impacts for their regions, use similar climate models, and share best practices for projects to enhance climate resilience. For example, the Southeast Florida Regional Climate Change Compact is a decade-old partnership between Miami-Dade, Broward, Monroe, and Palm Beach Counties to coordinate mitigation and adaptation activities across county lines in response to the effects of climate change, including sea level rise, flooding, and economic and social disruptions. The compact and its partners work with various federal, state, regional, municipal, nonprofit, academic, and private sector partners to provide technical assistance and support for utilities in southeast Florida to help the region identify emerging issues and all move in one direction for resilience planning efforts. The supporting federal agencies include NOAA, EPA, and the Army Corps of Engineers. Another example is Charleston Water (Charleston, South Carolina), a member of the Charleston Resilience Network—a collaborative group of public, private, and nonprofit organizations in the region that work to increase resilience of communities, critical infrastructure, and the economy to natural disasters and chronic coastal hazards, such as rising sea levels. The network provides a forum to share science-based information, educate stakeholders, and enhance long-term resilience planning decisions. The network also works to provide consistent information for planning decisions. The federal agencies that advise the Charleston Resilience Network include NOAA, DHS, and the Army Corps of Engineers. The four selected federal agencies in our review provide broad financial assistance to help drinking water and wastewater utilities plan and build infrastructure projects. The agencies have taken some actions to promote climate resilience when providing financial assistance for water infrastructure projects, but they do not consistently include the consideration of climate resilience when funding such projects. Most selected experts we interviewed suggested that requiring the consideration of climate change risks in the planning and design of all federally funded water and wastewater infrastructure projects could help enhance climate resilience and limit future federal fiscal exposure. The four federal agencies we reviewed have nine programs that provide broad financial assistance, through loans or grants, for drinking water and wastewater infrastructure (see table 1). However, federal programs generally do not have selection criteria or requirements for utilities to incorporate climate resilience in the planning and design of projects that receive federal financial assistance. Each of the programs used different selection criteria for providing financial assistance to drinking water and wastewater utilities. EPA’s Drinking Water State Revolving Fund, Clean Water State Revolving Fund, and Water Infrastructure Finance and Innovation Act (WIFIA) programs generally provide financial assistance to projects that address the most serious risks to human health and ensure compliance with the Safe Drinking Water Act or Clean Water Act. Other programs, such as FEMA’s Public Assistance and Hazard Mitigation Grant programs provide financial assistance to repair or replace infrastructure damaged during natural disasters, or to enhance disaster resilience against future damage. HUD’s Community Development Block Grant-Disaster Recovery funding is used for, among other things, projects to help cities, communities, and states recover from presidentially-declared disasters or enhance disaster resilience of damaged infrastructure, especially in low- income areas. USDA provides financial assistance for drinking water and wastewater infrastructure in small and rural communities. According to EPA, FEMA, HUD, and USDA officials we interviewed, drinking water and wastewater utilities can use financial assistance from their programs to pay for projects that, in addition to other benefits, can help enhance climate resilience. We have previously reported that the federal government invests billions of dollars annually in infrastructure—such as roads, bridges, and wastewater infrastructure—but faces increasing risks from climate change. When the climate changes, infrastructure—typically designed to operate within past climate conditions—may not operate as well or for as long as planned, leading to economic, environmental, and social impacts. We have also reported that some federal agencies have made efforts to manage climate change risk within existing programs and operations—a concept known as mainstreaming—and these efforts may convey some climate resilience benefits. For example, an agency planning to build a seawall to protect a coastal facility might build it higher to account for rising sea level projections, but may not track this spending as related to climate change. Representatives of several of the drinking water and wastewater utilities we reviewed reported using selected federal financial assistance programs to help fund projects for fiscal years 2011 through 2018 that, in addition to other benefits, enhanced their climate resilience. For example, Iowa City Public Works used financial assistance from HUD Community Development Block Grant-Disaster Recovery funding and FEMA’s Public Assistance grant program to increase their resilience to floods by relocating a flood-prone wastewater treatment facility after flooding in 2008, as shown in figure 5. Similarly, as of December 2018, Houston Water was working with FEMA to use Public Assistance grants and Hazard Mitigation grants to increase the utility’s resilience to floods and extreme storm events when rebuilding the wastewater infrastructure damaged by Hurricane Harvey in 2017, according to Houston Water representatives. In addition, the San Diego Public Utilities Department received an EPA WIFIA loan to increase its resilience to droughts by building a new recycled wastewater treatment facility that will provide an additional source of drinking water and reduce the need for water imported from the Colorado River Basin (see app. VI for details on completed and ongoing infrastructure projects that utilities undertook to enhance their climate resilience, according to selected drinking water and wastewater utility representatives). The remaining selected utilities relied on other sources of funding such as municipal bonds and funds raised primarily through user rates and fees for fiscal years 2011 through 2018 to enhance their climate resilience (see app. VII for details on the financial assistance drinking water and wastewater utilities used for infrastructure projects). However, making the nation’s drinking water and wastewater infrastructure resilient will be expensive, costing anywhere from $448 billion to $944 billion, including operations and maintenance through 2050, according to a 2009 Association of Metropolitan Water Agencies study, the most recent such study. These costs would likely be in addition to the EPA-estimated $774 billion in costs for replacing and repairing existing infrastructure over the next 20 years. According to representatives of several of the selected utilities in our review, additional financial assistance will be necessary to enhance the resilience of drinking water and wastewater infrastructure. Representatives from several utilities said they would not be able to make the necessary upgrades to incorporate climate resilience into their drinking water or wastewater systems without additional grant assistance. Based on estimates from one of the selected utilities, the costs to enhance their resilience will be high. For example, in 2013, the New York Department of Environmental Protection estimated that it would cost about $315 million to build the protective measures necessary to make its wastewater treatment facilities and pump stations resilient to future flood projections. Officials from EPA, FEMA, HUD, and USDA said that federal agencies have taken action to change program requirements or selection criteria to provide financial assistance for projects that enhance climate resilience. However, according to federal officials, some federal agencies are providing financial assistance to utilities for projects that do not consider climate resilience in their planning and design consistently. In addition, federal officials stated that their ability to require that climate resilience be incorporated in the projects they fund is limited by requirements specific to their programs. Examples of their efforts, and limited authorities, include the following: EPA. EPA provides annual grants to states to capitalize their state- level drinking water and wastewater state revolving fund programs. The states use the revolving funds to provide low-cost loans or other financial assistance to communities for, among other things, a wide range of drinking water and wastewater infrastructure projects. According to EPA officials, states establish program criteria and do not consider climate resilience consistently in planning and designing projects that receive financial assistance from state revolving fund programs. Specifically, EPA officials said that despite agency efforts to promote climate resilience, states have discretion in setting project funding criteria and priorities for their state revolving fund programs, and that the agency does not have the authority to require that states prioritize projects that incorporate climate resilience. EPA continued to encourage the states to incorporate resilience planning in their priority systems. In documents released in May 2016, September 2016, and June 2017, the EPA described the types of climate resilience projects eligible for drinking water and clean water state revolving fund assistance. The September 2016 document also describes how programs can encourage resilient infrastructure through financial incentives. According to fiscal year 2015 data that EPA provided, 17 state clean water revolving fund programs have created additional financial incentives that utilities could use to fund climate resilience projects, and only New York’s program requires that climate risks from sea level rise be incorporated into the projects that receive financial assistance. In addition, utilities have discretion in whether to incorporate climate resilience into their state revolving fund project applications, and EPA cannot require utilities to incorporate climate resilience into the planning and construction of projects that states fund, according to EPA officials. Similarly, while EPA manages the WIFIA program and its application process and criteria, EPA officials said that the 2018 and 2019 program guidance did not prioritize protection against the impacts of climate change in its selection criteria, and that the agency does not require that applicants incorporate climate resilience into project planning and design. FEMA. FEMA’s Public Assistance Grant Program provides grants to state, tribal, territorial, and local governments, and nonprofits that can be used to repair and replace damaged infrastructure, including drinking water and wastewater infrastructure. In addition, FEMA’s Pre- Disaster Mitigation and Hazard Mitigation Grant Programs can provide financial assistance to states, communities, or tribes that can be used to reduce the risks to drinking water and wastewater infrastructure from future disasters. FEMA officials said they have developed guidance for states and communities to incorporate climate resilience into the planning for projects funded by all three programs. However, officials said that states and utilities do not consider climate change resilience consistently in planning and designing of projects that use financial assistance from FEMA. Specifically, according to FEMA officials, funding through the Public Assistance Program and the Hazard Mitigation Grant Program is limited to states and localities with a presidentially-declared disaster and generally is not provided for projects that incorporate climate resilience into their planning and design. In addition, according to FEMA officials, states and localities have discretion over the projects they choose to submit for funding and FEMA cannot require them to incorporate climate resilience into the planning and construction of projects that states fund without a change to program requirements. HUD. HUD provides grants to states and local governments through its Community Development Block Grant program to fund housing; economic development; neighborhood revitalization; and other community development activities, including drinking water and wastewater infrastructure. In addition, HUD can provide grants that can be used for reconstruction of drinking water and wastewater infrastructure to help communities recover from presidentially declared disasters through its Community Development Block Grant program. According to HUD officials, the agency has taken action to encourage states and local governments to incorporate climate resilience planning in the projects they fund after disasters. Officials also said that HUD provides guidance on how financial assistance requirements for states and entitlement communities can be waived so that states and communities can use Community Development Block Grant funding for disaster recovery and resilience in presidentially-declared disaster areas. In addition, in 2016, HUD finalized rules requiring states and localities to consider incorporating resilience to natural hazard risks and climate change into their planning documents for Community Development Block Grant funding in low- and moderate-income communities. However, officials said that states do not consider climate change resilience consistently when planning and designing projects using financial assistance from HUD. Specifically, according to HUD officials, the agency can only directly provide financial assistance to projects that enhance climate resilience using Community Development Block Grant-Disaster Recovery Grants if climate change resilience is specified in disaster relief appropriations language. Further, states and localities have discretion regarding whether to incorporate climate resilience into their project applications, and HUD cannot require them to incorporate climate resilience into the planning of projects that receive financial assistance, according to HUD officials. USDA. USDA’s Rural Utilities Service provides grants and loans for drinking water, wastewater, and stormwater projects in rural areas— defined as any area not in a city or town with a population in excess of 10,000 inhabitants. According to USDA officials, the agency has promoted climate resilience planning through its Water and Waste Disposal Program by requiring small and rural utilities to complete planning and vulnerability assessments for natural disasters. In addition, USDA officials said the agency has collaborated with EPA to develop guidance and training through the Sustainable Rural and Small Utility Management Initiative to help small and rural utilities create plans for improving their sustainability, including planning to help make the utilities resilient to potential climate impacts. According to USDA officials, utilities have discretion in whether to incorporate climate resilience into their Water and Waste Disposal project applications, and USDA cannot under its current regulations require them to incorporate climate resilience into the planning and construction of projects that receive financial assistance. As a result, according to officials, utilities do not consider climate resilience consistently when planning and designing projects that receive financial assistance from USDA. According to most selected experts, requiring the consideration of climate risks in projects that receive financial assistance will help limit the future fiscal exposure of the federal government and help enhance the climate resilience of drinking water and wastewater infrastructure. Specifically, most of the experts we interviewed said that a federal requirement that potential climate impacts be considered and, if necessary, incorporated into the design of all new drinking water and wastewater infrastructure projects that receive federal financial assistance, should be a high or very high priority for the federal government. Several of the experts said that this option would be advantageous because it could help ensure more effective and efficient use of federal dollars on drinking water and wastewater infrastructure. For example, several experts said that this option would help ensure that infrastructure funded by the federal government incorporated climate risks during the planning stages, helping avoid expensive retrofits or the abandonment of federally funded infrastructure that was not climate resilient. Several other experts said that such a federal requirement could help make consideration of future climate risks to enhance resilience a standard industry practice within the drinking water and wastewater sector. Several of the selected utilities said that a federal requirement for potential climate impacts to be considered and, if necessary, incorporated into the design of all new drinking water and wastewater infrastructure projects that receive federal financial assistance, would be moderately to extremely effective in helping utilities enhance their resilience. These selected utilities also said that it would be at least moderately feasible to implement. Several of the selected utilities are already required to consider some potential climate risks in the planning and design of their drinking water and wastewater infrastructure. For example, according to representatives from the Miami-Dade County Water and Sewer Department, Miami-Dade County adopted an ordinance requiring that potential climate risks be considered in the design of county-funded infrastructure. According to the same officials, this requirement has shifted the culture of the Miami-Dade County Water and Sewer Department to emphasize potential future climate change risks in the planning and design of all of the county’s drinking water and wastewater infrastructure. Representatives from a few selected utilities also said that a requirement could make it easier to access federal financial assistance programs for projects that enhance climate resilience. Several selected experts cautioned that many utilities do not have the climate information and technical capacity to carry out such requirements or that the uncertainty of the available climate science would make it difficult to implement for some utilities. In addition, several experts said that such a requirement may force utilities with limited funding to prioritize planning and investment in projects to improve climate resilience over more pressing concerns, such as repairing and replacing damaged or obsolete infrastructure. Several selected utilities said that it will be difficult to implement these new requirements, but added that additional technical and financial assistance could help. For example, representatives from Cottage Grove Public Utilities said that the federal government will need to provide additional financial and technical assistance opportunities for small and medium-sized public utilities that do not have the capacity to plan, implement, and fund large climate resilience projects. However, if the federal agencies do not require the incorporation of climate resilience into the projects that receive financial assistance, they may continue to fund drinking water and wastewater infrastructure projects that may be damaged or incapacitated by future floods, drought, water quality problems, and other climate change impacts. This increases the risk that critical infrastructure will not be well protected and drinking water and wastewater utilities will not be able to continue operations that provide critical public health and environmental services to the public. EPA and other federal, state, local, and sector-level officials, recognizing the need to incorporate climate resilience into drinking water and wastewater infrastructure, have taken action to promote climate resilience but generally do not require it to be incorporated in these projects. Specifically, the 2017 Roadmap calls for the Water Government Coordinating Council and the Water Sector Coordinating Council to promote eligibility criteria for financial assistance programs to support resilience activities by 2019. In addition, in a 2019 report, EPA’s Environmental Finance Advisory Board recommended that EPA create a coordination group to set priorities and reduce gaps in funding predisaster resilience for drinking water and wastewater infrastructure, and that EPA consider expanding the state revolving fund program to include financial assistance for flooding and storm-related damages. Further, the National Mitigation Investment Strategy, issued in draft in January 2018, and finalized in August 2019, states that successful mitigation of natural hazard risks requires shared priorities, consistent approaches, aligned funding, expanded incentives, and coordination between the federal government and nonfederal partners. It also states that the federal government and nonfederal partners should look at risk and resilience consistently by, for example, having similar requirements for assessing risk and rebuilding for long-term resilience. It emphasizes the need to focus on critical infrastructure in communities, such as drinking water and wastewater infrastructure. Incorporating climate resilience likely decreases the risk that water and wastewater infrastructure, some of which is paid for with federal financial assistance, will fail during extreme events. According to the National Research Council, as the climate changes and historical patterns—in particular, those related to extreme weather events—no longer provide reliable predictions of the future, infrastructure designs may underestimate the climate-related impacts to infrastructure over its design life, which can range as long as 50 to 100 years. In April 2013, we reported that according to one set of commonly used design standards, wastewater treatment plant components are typically designed for 25-, 50-, or 100-year storms. We reported that changes in characteristics of strong storms—for instance, a storm that historically occurred once every 100 years may occur every 50 years in the future—could cause wastewater management systems to be overwhelmed more frequently. Incorporating climate resilience into drinking water and wastewater infrastructure projects also likely decreases the risk that the federal government will need to pay to repair and replace damaged facilities. In our previous work, we said that building resilience can help reduce the federal fiscal exposure. As we reported in April 2013, such resilience means reducing potential future losses rather than waiting for an event to occur and paying for recovery afterward. We said that enhancing resilience can create additional up-front costs, but can also reduce potential future damage from climate-related events that—given expected budget pressures—would otherwise constrain federal programs. In 2018, the National Institute of Building Sciences found that every dollar spent on infrastructure hazard mitigation to enhance resilience to wind- and flooding-related disasters resulted in 7 to 8 dollars in avoided future losses, respectively. This potential can be considered in light of recent costs that the federal government incurred to address losses. In particular, from fiscal year 2011 through fiscal year 2018, we estimate that FEMA’s Public Assistance program and HUD’s Community Development Block Grant-Disaster Recovery Grants have obligated at least $2.3 billion and at least $1.4 billion, respectively, in federal disaster recovery funding on drinking water and wastewater infrastructure-related projects. Drinking water and wastewater utilities face challenges in using climate information to identify actions that they can take to enhance their climate resilience. At the moment, utilities obtain technical assistance and use climate information from a mix of sources and that assistance is not organized to help ensure more comprehensive coverage of the more than 70,000 drinking water and wastewater utilities across the nation. As designated lead agency for the resilience and security of the drinking water and wastewater sector and as chair of the Water Sector Government Coordinating Council, EPA is tasked with coordinating federal and sector efforts to provide the information and assistance that state and local decision makers—including utilities—need to enhance their climate resilience. The councils have identified a number of actions to support the drinking water and wastewater sector, but EPA, other federal agencies, and the water and wastewater sector, have not assessed how they could organize a network of technical assistance providers to effectively provide the assistance that utilities need to enhance their resilience to climate change. By identifying existing technical assistance providers and engaging them in a network to help drinking water and wastewater utilities consider climate resilience in the planning and design of projects on an ongoing basis, EPA, as chair of the Water Sector Government Coordinating Council, would have more reasonable assurance that climate information was effectively exchanged among federal agencies and infrastructure owners and operators. In recognition of the federal interest in protecting the health and economic benefits that clean and safe water provide, federal programs provide funding to support drinking water and wastewater infrastructure. In 2013, Presidential Policy Directive 21 identified the water and wastewater sector as critical infrastructure, with important implications for protecting and investing in that sector. Federal agencies such as EPA, FEMA, HUD, and USDA provide financial assistance to help ensure the long-term success of drinking water and wastewater utilities. These agencies have taken action to promote climate resilient infrastructure projects with the financial assistance they provide, but their abilities to ensure that projects receiving financial assistance are resilient are limited. To enable agencies to further drive climate resilient investments by drinking water and wastewater utilities, changes would be needed to programs that EPA, FEMA, HUD, and USDA administer to require that climate resilience be incorporated into planning for projects that receive federal financial assistance. Such changes could help ensure that drinking water and wastewater infrastructure projects that receive federal financial assistance adequately address risks from climate change and ensure that utilities carry out their critical operations. Such changes could also help limit the fiscal exposure to the federal government for future recovery costs. We are making the following matter for congressional consideration: Congress should consider requiring that climate resilience be incorporated in the planning of all drinking water and wastewater projects that receive federal financial assistance from programs that EPA, FEMA, HUD, and USDA administer. (Matter for Consideration 1) We are making one recommendation to EPA: The Director of Water Security of EPA, as Chair of the Water Sector Government Coordinating Council, should work with the council to identify existing technical assistance providers and engage these providers in a network to help drinking water and wastewater utilities incorporate climate resilience into their projects and planning on an ongoing basis. (Recommendation 1) We provided a draft of this report to EPA, DHS, HUD, NOAA, and USDA for review and comment. EPA provided written comments, which are reproduced in appendix VIII. The other four agencies did not provide comments on our draft report. EPA and USDA provided technical comments, which we incorporated as appropriate. In its written comments, EPA neither agreed nor disagreed with our recommendation that the Administrator, as Chair of the Water Sector Government Coordinating Council, should work with the council to identify existing technical assistance providers and engage these providers in a network to help drinking water and wastewater utilities incorporate climate resilience into their projects and planning on an ongoing basis. The agency noted in its technical comments that the Director of Water Security is the chair of the Water Sector Council, not the administrator. We made this change in the report. In its written response, EPA made two points related to the recommendation. First, it stated that it will, consistent with our recommendation, continue to work with its wide-ranging, existing technical assistance providers and coordinate with its stakeholders to identify additional providers as applicable. We agree with this approach and highlighted several of these efforts in our report. For example, EPA noted that it provides annual training to over 5,000 water utilities, state officials, and federal emergency responders on how to become more resilient to natural or manmade incidents that could endanger water and wastewater services. Second, in response to the part of the recommendation that EPA engage the providers in a network, the agency noted that states serve as a coordinating entity under its Small System Training and Technical Assistant grants. Further, EPA also noted that the providers work with states to identify the systems in greatest need of assistance and identify the training topics of greatest need for small public water systems. We agree that this could be a helpful approach, but note that EPA remained silent on how it plans to work with the states and the water and wastewater sector to develop a network of technical assistance providers. Our report showed that utilities obtain technical assistance from a number of different sources and that they could benefit from a larger network with continuous technical assistance. The Water Sector Coordinating Council functions as a forum to coordinate members of existing networks, and to ensure they have the most current and relevant information as they provide assistance to utilities. As EPA works with its wide-ranging technical assistance providers, consistent with our recommendation, we would encourage it to also work with the Water Sector Coordinating Council to ensure the coordination of the different networks that exist in the water and wastewater sector. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees; the Administrator of the Environmental Protection Agency; and the Secretaries of Homeland Security, Housing and Urban Development, Commerce, and Agriculture. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made key contributions to this report are listed in appendix IX. The objectives of our review were to examine (1) the potential impacts of climate change and the effects of these impacts on drinking water and wastewater infrastructure; (2) technical assistance selected federal agencies provided to selected utilities to help make drinking water and wastewater infrastructure more resilient to the impacts of climate change, and options experts identified for providing additional technical assistance to utilities; and (3) financial assistance federal agencies provided to selected utilities to help make drinking water and wastewater infrastructure more resilient to the impacts of climate change, and options experts identified for providing additional financial assistance to utilities. For the first objective, we reviewed the Fourth National Climate Assessment; the Environmental Protection Agency’s (EPA) Adaptation Strategies Guide for Water Utilities, Climate Resilience Evaluation and Awareness Tool Methodology Guide, and Climate Scenarios Projection Map, and the U.S. Climate Resilience Toolkit, which the Department of Commerce’s National Oceanic and Atmospheric Administration (NOAA) manages and hosts with oversight from the U.S. Global Change Research Program. Based on our review of these sources, we first identified different categories of potential climate change impacts, and how those impacts may vary in the different climate regions identified in the Fourth National Climate Assessment. For both the second and third objectives, we reviewed the efforts of and interviewed five federal agencies and 15 drinking water and wastewater utilities. We reviewed our previous reports to identify agencies that provide technical assistance or financial assistance, or both, to drinking water and wastewater utilities and identified five agencies: EPA, NOAA, the Department of Homeland Security’s (DHS) Federal Emergency Management Agency (FEMA), the Department of Housing and Urban Development (HUD), and the Department of Agriculture’s (USDA) Rural Utilities Service. For the second and third objectives, we also selected a nongeneralizable sample of 15 drinking water and wastewater utilities in 13 communities using a stratified purposeful sampling approach. We selected utilities to obtain variation in their size and climate region to capture similarities and differences among utilities. We classified utilities into small, medium, and large utilities based on the sizes of the populations that they serve. We defined small utilities (serving populations of 10,000 or less), medium utilities (serving populations of 10,001 to 999,999), and large utilities (serving populations of 1 million or more) for this report to capture utilities with the greatest resources available for climate resilience efforts. In order to ensure geographic diversity, we selected small, medium, and large utilities from different climate regions identified in the Fourth National Climate Assessment. Because this was a nonprobability sample, the findings related to the 15 utilities cannot be generalized to all drinking water and wastewater utilities but provide illustrative examples of how the selected utilities used federal technical assistance and financial assistance. Further, for the second and third objectives, we selected 10 experts in the climate change and disaster fields to interview about options for providing additional technical and financial assistance to drinking water and wastewater utilities. To identify experts on the resilience of water infrastructure to climate change, we searched Elsevier’s Scopus database for peer-reviewed articles published from January 2003 through September 2018 searching titles, abstracts, and keywords for “drinking water” or “wastewater” in close proximity to terms such as “infrastructure,” “climate change,” and “resiliency.” We identified approximately 300 studies from this search, identified the relevant studies from that group, and then found an additional eight studies from their citations. We reviewed the abstracts of these studies and found 96 that were within the scope of our objectives. To develop a list of potential experts, we extracted the names of the authors of these studies and the names of authors cited in these studies using the Python programming language and the Scopus Application Programming Interface. Next, we used statistical software to calculate the number of times that each author cited every other author. Using these calculations, we arrayed the authors into a network graph, in which authors who frequently cited each other were situated closer together and authors who did not cite each other were situated further apart. We analyzed this network using social network analysis techniques. Specifically, to measure each author’s prominence in the network, we calculated the number of times that each author was cited in the articles written by other authors in the network. To divide the network into groups, we used an algorithm known as hierarchical clustering. This algorithm allowed us to identify groups of authors who cited each other frequently and who cited authors in the rest of the network infrequently. We sorted authors by group and by the number of times they were cited. For the most frequently cited authors in the largest groups in the network, we examined biographical details and publication details via web searches, such as their geographic location and the relevance of their publications to our research topic. We selected a final list of 15 frequently cited experts who were primarily from the largest clusters in the network, who were based in North America, whose research was topically relevant, and who were still active in the field. Eight of these experts agreed to be interviewed and we included them in our final sample. We supplemented this list with two experts who served as lead authors for the water chapter of the Fourth National Climate Assessment. While these 10 experts are prominent researchers and correspond to a range of major fields of research on the topic, their views do not represent the views of all experts on the resilience of drinking water and wastewater infrastructure to climate change. To examine the first part of the second objective, the technical assistance selected federal agencies provided to selected utilities, we reviewed relevant laws, regulations, and planning guidance about programs that can provide technical assistance to drinking water and wastewater utilities to help enhance climate resilience for each selected federal agency. We also interviewed federal officials at each agency. To examine the first part of the third objective, the financial assistance selected federal agencies provided to selected utilities, we reviewed project eligibility criteria and appropriation amounts for EPA’s Clean Water State Revolving Fund, Drinking Water State Revolving Fund, and Water Infrastructure Finance and Innovation Act Programs; HUD’s Community Development Block Grant Program and Community Development Block Grant-Disaster Recovery Fund; and USDA’s Water and Wastewater Disposal Program for fiscal years 2011 through 2018. We also interviewed federal officials at each agency. As part of analyzing the federal financial assistance to drinking water and wastewater utilities, we estimated FEMA’s pre- and post-disaster spending to help such utilities recover from natural disasters. To identify federal disaster recovery and hazard mitigation obligations on drinking water and wastewater infrastructure, we analyzed federal financial assistance that FEMA’s Public Assistance, Hazard Mitigation, and Pre- disaster Mitigation Programs provide for disaster recovery for drinking water and wastewater infrastructure. Specifically, using a list of search terms associated with drinking water and wastewater infrastructure, we queried FEMA’s disaster recovery spending database to identify a list of drinking water and wastewater infrastructure disaster recovery and hazard mitigation projects funded from fiscal years 2011 through 2018. After we queried FEMA’s disaster recovery spending database, we manually reviewed records from a stratified sample to ensure that each project was related to water and wastewater infrastructure. We reviewed all 25 records with the highest obligated amounts, 15 records in which a project was associated with more than one site, and 35 records in which a project was associated with just one site. We chose this sample design to ensure that we were capturing projects with the highest dollar amounts as well as all other projects, while also ensuring that if one site in a project was water related, the rest of the sites under the project were also water related (manual review showed that if one site in a project was water related, 98 percent of the other sites in the project were also water related). After manual review, we generated an estimate of total obligated funds from the ratio of number of projects that we reviewed that were related to water and wastewater infrastructure to the total number of projects in our sample. The estimate we used was the lower bound of a 95 percent confidence interval. We chose this estimate in order to give a conservative estimate of the amount that FEMA’s public assistance program has obligated. The relative error was 0.07. To assess the reliability of the disaster recovery obligations data, we (1) performed electronic testing for errors in accuracy and completeness, (2) reviewed related documentation about the data and the system that produced them, (3) interviewed agency officials knowledgeable about the data, and (4) worked closely with agency officials to identify and resolve data discrepancies before conducting our analyses. We determined that the data were sufficiently reliable for the purposes of our reporting objectives. To examine what technical assistance and financial assistance selected drinking water and wastewater utilities used for the second and third objectives, we provided a short questionnaire and interviewed utility representatives from the 15 selected drinking water and wastewater utilities to understand what technical and financial assistance they used to enhance their climate resilience for fiscal years 2011 through 2018. In the questionnaire and interviews, we discussed their efforts to plan for climate resilience and the technical and financial assistance they used for such efforts, which could include the five agencies we selected to review or other federal and nonfederal entities we did not review, but knew could potentially be sources of technical and financial assistance for utilities based on our prior work. Specifically, the federal agencies we did not review, but included in our questionnaire were: NOAA, the Department of Defense’s U.S. Army Corps of Engineers, and the Department of the Interior’s Bureau of Reclamation (Reclamation). To examine the second parts of the second and third objectives, the options experts identified for providing additional technical and financial assistance to utilities, we conducted semistructured interviews with the 10 climate change and disaster resilience experts. To develop the semistructured interview documents, we assessed the content of the 96 articles identified in our literature review to develop a list of actions that the federal government could take to make drinking water and wastewater infrastructure more resilient to the effects of climate change. The articles used to develop this list of actions were identified by searching resources such as Agricola, ProQuest’s Environmental Databases, Policyfile, Harvard’s Think Tank Search, and Scopus. We searched for both peer-reviewed articles and reports from nonprofits and think tanks published between January 2003 and September 2018 searching titles, abstracts and keywords for “water” in close proximity to “climate change,” “utilities,” and terms such as “project,” “program,” “policy,” or “recommendation.” We asked the 10 experts about the list of actions during our interviews (see table 2). We conducted semistructured interviews with the 10 selected experts and asked the experts to rate the effectiveness of the nine actions we provided for making drinking water and wastewater infrastructure more resilient to the impacts of climate change, describe the advantages and disadvantages of each action, and describe how the actions could be implemented. We also asked experts to rate the administrative feasibility and cost of the actions. Finally, we asked the experts if any additional actions should be added to our list. We then analyzed the results of our interviews to identify five options to provide technical assistance and developed a follow-up questionnaire. The questionnaire asked the 10 selected experts to rate the effectiveness of the five options for providing additional technical assistance, describe the advantages and disadvantages of each option, and describe how the options could be implemented (see table 3). We also asked experts to rate the overall effectiveness, administrative feasibility, and cost of the options. We also requested written responses from the 15 selected utilities on the 5 technical assistance options and the 4 financial assistance options identified in our interviews with experts. We conducted this performance audit from October 2017 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 4 corresponds with figure 2 in the report, which is an interactive figure and contains the text for drinking water utilities that is not accessible to readers of print copies of this report. As readers scroll over the water-drop icons in the figure, separate pop-up boxes appear describing specific regional impacts. Table 5 corresponds with figure 2 in the report, which is an interactive figure and contains the text for wastewater utilities that is not accessible to readers of print copies of this report. As readers scroll over the water- drop icons in the figure, separate pop-up boxes appear describing specific regional impacts. Table 6 provides additional information on the selected drinking water and wastewater utilities and the sources of technical assistance they used for climate resilience planning for fiscal years 2011 through 2018. The following federal programs have the potential to help drinking water and wastewater utilities, in particular smaller utilities that do not have the resources to conduct climate risk assessments and plan for measures to help make their drinking water and wastewater infrastructure more resilient to climate change impacts. Several of the federal efforts we reviewed provide general assistance with planning and operating drinking water and wastewater infrastructure. Specifically: Environmental Protection Agency’s (EPA) Environmental Finance Centers. The Environmental Finance Centers provide targeted technical assistance to, and partner with states and the private sector to help manage the costs of environmental financing. Environmental Finance Centers can provide technical assistance for financing drinking water and wastewater infrastructure and its operations and maintenance. EPA’s Training and Technical Assistance for Small Systems Grants. EPA’s Training and Technical Assistance to Small Systems grants provide funding to nonprofit organizations to provide training and technical assistance to small public water systems, small wastewater systems, and private well owners, located in urban and rural communities in the U.S. and its territories. According to EPA officials, training and technical assistance to small systems facing drought, flooding, and other weather-related challenges is an eligible activity for the grants. Department of Agriculture’s (USDA) Rural Water and Wastewater Technical Assistance and Training Program. USDA’s Rural Water and Wastewater Technical Assistance and Training Program provides grants to nonprofits such as the National Rural Water Association and the Rural Community Assistance Partnership to provide training and technical assistance to small and rural utilities for operating, managing, and financing drinking water and wastewater infrastructure. USDA’s Rural Water and Wastewater Circuit Rider Program. USDA contracts with a qualified national organization, through its Circuit Rider program, to provide technical assistance to rural water and wastewater systems to provide technical assistance to rural utilities for operating, managing, and financing water and wastewater infrastructure. Circuit riders also provide critical assistance in disaster response and recovery. The circuit rider contract was awarded to the National Rural Water Association in fiscal year 2019. Other federal efforts help decision makers use climate information in existing planning processes. Specifically: USDA Climate Hubs. USDA established regional Climate Hubs to deliver science-based knowledge and practical information to farmers, ranchers, and forest landowners to support decision-making related to climate change. Department of the Interior’s (Interior) Landscape Conservation Cooperatives. Interior developed a network of collaborative Landscape Conservation Cooperatives composed of federal, state, local, and tribal governments; nongovernmental organizations; universities; and interested public and private organizations to, manage large landscapes such as national forests, grasslands, and wetlands. As part of this program, the groups develop and provide the science and technical expertise needed to apply climate data in natural resources decision-making. U.S. Geological Survey’s Climate Adaptation Science Centers. Climate Adaptation Science Centers partner with natural and cultural resource managers to provide science that helps fish, wildlife, ecosystems, and the communities they support adapt to climate change by, among other things, providing climate, water, and ecosystem information to decision makers. National Oceanic and Atmospheric Administration’s (NOAA) Regional Integrated Sciences and Assessments (RISA) Program. NOAA’s RISA program supports a network of 11 regional research teams that work with public and private decision makers to identify and provide specific climate information and models to identify risks and adaptation options to increase resilience to climate variability and change. One area of emphasis for the RISA teams is conducting research on climate and water management issues while engaging with a range of water management organizations, including some water utilities. National Center for Atmospheric Research (NCAR). NCAR carries out interdisciplinary research on adaptation to climate change by generating scenarios of projected climate change, developing scientific tools and methods for analyzing current and future vulnerability, and conducting integrated analyses of climate change impacts and adaptation. An important component of NCAR’s program is the integration of decision makers and users of climate information, including water utilities, into its research activities. NCAR provides the atmospheric research community in academia, government, and the private sector with the shared resources necessary to conduct their research. Table 7 presents examples of drinking water and wastewater capital improvement projects to enhance climate resilience, according to utility representatives, from fiscal years 2011 through 2018. Table 8 presents additional information on financial assistance used by utilities we reviewed for capital improvement projects to enhance their climate resilience for fiscal years 2011 through 2018. In addition to the contact named above, Susan Iott (Assistant Director), Micah McMillan (Analyst-in-Charge), Jim Ashley, Mark Braza, Colleen Candrl, Caitlin Cusati, John Delicath, David Dornisch, Kathryn Godfrey, Holly Halifax, Karen Howard, Rob Letzler, Jon Melhus, Patricia Moye, Eve Nealon, Sam Portnow, Dan Royer, Kiki Theodoropoulos, Joe Thompson, Seyda Wentworth, and Melissa Wolf provided key contributions to this report.", "summary": "Human health and well-being require clean and safe water, according to the Water Research Foundation. The Fourth National Climate Assessment states that the potential impacts of extreme weather events from climate change will vary in severity and type and can have a negative effect on drinking water and wastewater utilities. GAO's previous work on climate change and resilience to extreme weather and disasters has shown how the federal government can provide information and technical and financial assistance to promote and enhance climate resilience. In 2015, GAO reported that enhancing climate resilience means taking action to reduce potential future losses by planning and preparing for climate-related impacts, such as extreme rainfall. This report examines federal technical and financial assistance to utilities for enhancing climate resilience, and options experts identified for providing additional assistance, among other things. GAO reviewed relevant federal laws, regulations, and guidance from four federal agencies—EPA, FEMA, HUD, and USDA—and interviewed federal officials, representatives from 15 water utilities selected for diversity of size and geography, and 10 experts selected to represent different views. Four federal agencies—the Environmental Protection Agency (EPA), the Federal Emergency Management Agency (FEMA), and the Departments of Housing and Urban Development (HUD) and Agriculture (USDA)—provide technical and financial assistance (e.g., loans and grants), to drinking and wastewater utilities. Technical assistance. EPA provides technical assistance to drinking water and wastewater utilities to enhance their infrastructure's resilience to climate change. However, according to EPA officials, EPA's program is small and cannot assist utilities nationwide. All of the selected experts GAO interviewed stated that utilities need additional technical assistance on an ongoing basis to manage climate risks, and most experts said that organizing a network of existing technical assistance providers, including federal and state agencies, universities, and industry groups, would be needed to provide such assistance. Under a presidential policy directive, EPA is to work to enable efficient information exchanges among federal agencies and to help inform planning and operational decisions for water and wastewater infrastructure. By identifying existing technical assistance providers and engaging them in a network to help utilities incorporate climate resilience into their infrastructure projects on an ongoing basis, EPA would have better assurance that climate information was effectively exchanged among federal agencies and utilities. Financial assistance. Federal agencies have taken some actions to promote climate resilience when providing financial assistance for water infrastructure projects, but agencies do not consistently include the consideration of climate resilience when funding such projects. Most selected experts suggested that federal agencies should require that climate information be considered in the planning of water infrastructure projects as a condition of providing financial assistance. Moreover, representatives from several utilities said that such a requirement could be an effective and feasible way to help enhance utilities' climate resilience. A requirement would ensure that utilities consider climate resilience in planning for water infrastructure projects and potentially limit future fiscal exposures. For example, from fiscal years 2011 through 2018, the federal government provided at least $3.6 billion in disaster recovery financial assistance for drinking water and wastewater infrastructure related projects (see figure). GAO recommends that EPA identify technical assistance providers and engage them in a network to help water utilities incorporate climate resilience into infrastructure projects. Also, Congress should consider requiring that climate resilience be considered in planning for federally funded water infrastructure projects. EPA neither agreed nor disagreed. GAO believes the recommendation is still warranted.", "document_type": "gao"}
{"report": "USPS is one of the largest civilian employers in the United States. In fiscal year 2018, USPS reported that it employed approximately 634,000 people and retirement benefits were paid to over 600,000 retirees and their survivors. According to USPS, it is one of the leading employers of minorities, women, veterans, and disabled veterans; for example, USPS reports on its website that it currently employs about 100,000 military members and veterans, nearly one-sixth of its workforce. Ninety-two percent of the USPS workforce is comprised of employees who are represented by four unions that are roughly organized along occupation type (see table 1 for the unions and member representation). These employees are also divided into “career”, and “non-career” employees. Career employees are considered permanent and are entitled to a range of benefits (e.g., health and retirement) and privileges. Non- career employees are generally considered temporary and hired, for example, during times of large mail volume such as holidays. As discussed later, non-career employees receive fewer benefits and lower pay than career employees. The Postal Reorganization Act (PRA) established USPS as an independent establishment of the executive branch of the government of the United States. PRA also established a compensation system where career postal employees and officers generally receive the same benefits as federal government employees, but also authorizes employees to collectively bargain over pay. Pay at many federal agencies is not subject to collective bargaining. Instead, pay at those entities is set through the General Schedule, which is developed and updated by the Office of Personnel Management (OPM). Additionally, PRA established that USPS should maintain compensation and benefits “on a standard of comparability to the compensation and benefits paid for comparable levels of work in the private sector of the economy.” Reform bills have been introduced in Congress that would amend some of the current compensation requirements, but none have passed. USPS costs are concentrated in employee compensation, which accounted for approximately 72 percent of total operational costs in fiscal year 2018 (see fig. 1). The majority of compensation costs are payments to current employees, which include an employee’s hourly pay and benefits such as contributions to retirement and healthcare plans and USPS’s share of payroll taxes for Social Security and Medicare. USPS contributions for retirement benefits are made to OPM administered funds that pay out USPS retiree pension and health benefits, as well as to the Thrift Savings Plan (TSP). USPS negotiates contracts that include terms for the compensation of the 92 percent of employees represented by unions through a collective bargaining process. This process may entail a three-step process for USPS: negotiation, mediation, and interest arbitration (as described below). If USPS and its unions cannot reach agreement during initial negotiations, a federal mediator is appointed, unless both parties waive mediation. If no agreement is reached with the mediator, or if the parties waive mediation, the contract goes to impasse. An impasse then proceeds to final and binding interest arbitration. In interest arbitration, the dispute goes before a three-member panel, which determines factors impacting compensation, such as pay increases. The total cost of compensation for current USPS employees was about $9 billion less in fiscal year 2018 than in fiscal year 2009, when adjusted for inflation. However, most costs decreased between fiscal year 2009 and fiscal year 2014, and costs have generally risen since (see fig. 2). Without adjusting for inflation, USPS compensation costs for current employees are still lower—by almost $1 billion—when compared to 2009, but costs have been rising since 2014, and USPS has reported an anticipated total compensation cost increase for fiscal year 2019. Over the same time period, the number of employees followed a similar pattern of decline from fiscal years 2009 through 2013 and then generally increased. Overall, compared to fiscal year 2009, USPS has reduced its total number of employees as of fiscal year 2018 by over 77,000. One key reason for the decline in USPS compensation costs was the decrease of 90 million work hours over this period. The largest decrease in work hours was from fiscal years 2009 through 2013, when work hours declined about 12 percent. We reported in 2014 that this was accomplished in part through attrition and separation incentives. Recent trends, however, show total work hours are increasing, from a combination of new hiring and increased work hours for current employees. From fiscal years 2014 through 2018, work hours increased by 5.4 percent. Additionally, the number of work hours associated with higher costs—overtime and penalty overtime—have also been increasing. USPS reported that the recent increase in work hours and overall compensation costs is a result of increases in the number of delivery addresses and increases in more labor intensive package volume. USPS adds about one million new delivery points each year. Although overall mail volume declined from fiscal years 2009 through 2018, package volume increased almost 200 percent during the same period. However, package volume growth has slowed in recent months, largely due to significant competition among delivery providers, according to USPS. Generally, USPS compensation grew more slowly over the last decade than in the private sector and federal government. Based on our review of USPS data for fiscal years 2009 through 2018, USPS employee compensation has increased on average by 1.0 percent per year. According to Bureau of Labor Statistics data, average employee compensation increased by approximately 2.3 percent per year for workers in private industry. In a prior review of federal civilian compensation trends, we found average compensation increased 1.2 percent per year for the federal workforce from 2004 through 2012. Based on a review of publically available Office of Management and Budget data, we found this trend of about a 1.2 percent annual increase continued through 2018. Although USPS decreased compensation costs paid to current workers, its unfunded liabilities for retirement benefits significantly increased during the same time period. By law, USPS employees are entitled to participate in the federal retirement health benefits and pension programs. USPS is required to make annual payments into the OPM administered pension and retiree health benefits funds that support postal employee retirement benefits; however, USPS has failed to make a significant portion of these payments. Retiree Health Care Liabilities: OPM administers the Postal Service Retiree Health Benefits Fund, which pays USPS’s share of premiums for retired postal employee health care coverage. As of September 30, 2018, USPS had contributed $20.9 billion to the fund, and missed payments on an additional $33.9 billion in required payments to the fund for 2012-2016. For fiscal years 2017 and 2018, OPM billed USPS for required payments to the fund of $3.3 billion and $3.7 billion respectively and USPS did not make either payment. As of September 30, 2018, USPS reported the unfunded retiree health benefit liability to be $66.5 billion. Pension Liabilities: OPM also administers federal pension benefits through the Civil Service Retirement System (CSRS) and the Federal Employees Retirement System (FERS). USPS employees participate in one or the other of these plans. Both plans are funded through the Civil Service Retirement and Disability Fund (CSRDF). In 2018, USPS failed to make required payments to the CSRDF totaling approximately $2.4 billion; $958 million for FERS and $1.4 billion for CSRS. USPS reported the unfunded pension benefit liability, as of September 30, 2018, to be $25.1 billion for CSRS and $18.4 billion for FERS. As the total unfunded liabilities for health care and pension benefits owed to current and future retirees are about $110 billion, we have previously reported on the significant risk posed by these financial liabilities to USPS’s long-term sustainability. We have also reported that Congress should consider passing legislation to put postal retiree health benefits on a more sustainable financial footing, and recently provided options for proposed legislative changes related to retiree health costs in particular. For the remainder of this report we will focus mainly on those costs USPS incurs related to current employee services. In addition to decreasing the number of employees and work hours, USPS also implemented three major changes to decrease employee compensation: (1) lowering pay for new career employees, (2) increasing use of non-career employees, and (3) reducing USPS contributions to health insurance premiums for active employees. These changes were negotiated with the four unions representing the majority of postal employees and established in CBAs. According to USPS management officials, these actions were intended to decrease compensation costs and increase workforce flexibility, which were necessary responses to declining letter mail volume and revenue, growth in more labor-intensive package volume, and increases in the number of delivery addresses. We report USPS’s estimates, and our estimates, of how much these changes saved in employee compensation costs below; we further describe the differences between the two estimates in the next section. For additional technical details about our analysis, see appendix I. 1. Lowering Pay for New Career Employees: Beginning in 2010, USPS implemented a negotiated lower starting pay for new career employees. More specifically, career employees hired after a specified date have lower starting pay than previously hired career employees. For example, a city carrier hired in January 2016 would make about $37,640 a year compared to $48,406 a year if hired before the new starting pay agreement. USPS estimated about $2.3 billion in savings for fiscal years 2016 through 2018 as a result of this effort. We were not able to substantiate the estimated savings because USPS could only provide individual data for fiscal years 2016 through 2018, which were not enough data to develop comparison groups for employees hired before and after the pay rate change. 2. Increasing Use of Non-career Employees: In 2010 and 2011, USPS negotiated the ability to hire up to 20 percent of the workforce as non- career employees; the prior limit had been 10 percent for most employee types. USPS officials told us they also changed some work rules so that USPS could use non-career employees for some tasks previously only allowed for career employees. Non-career employees are less costly because they generally have lower pay rates and are not entitled to the full federal benefits received by career workers. According to USPS officials, non-career employees are also “more flexible” because there are fewer restrictions on their tasks and schedules. For example, USPS management officials told us that they use non-career employees for much of the Sunday package delivery service and to make extra trips needed to deliver packages to meet service targets. USPS estimated that increased use of non- career employees saved about $8.2 billion in compensation costs since fiscal year 2016, but our analysis found that USPS likely saved about $6.6 billion from fiscal years 2016 through 2018 from this effort. 3. Reducing Contribution for Employee Health Insurance Premiums: USPS decreased its contribution percentage for employee health insurance premiums from 84 and 85 percent in 2008 to 74 percent in 2018. Based on its recent agreement with NRLCA, USPS’s contribution will decrease from 73 percent in 2019 to 72 percent in 2020. In past CBAs with the three other unions (APWU, NALC, and NPMHU), negotiations over USPS contributions to health insurance premiums followed those agreed to by NRLCA. USPS officials estimated that USPS’s reduced contribution percentage to employee health insurance premiums has saved about $1.6 billion across the types of postal employees from fiscal years 2016 through 2018. However, our analysis found that USPS likely saved about $1.4 billion for the three-year period. Although USPS was able to decrease its share of the health insurance premium to achieve a larger saving in fiscal year 2018 than in fiscal year 2017, overall USPS expenditures for its share of employee health insurance premiums did not decrease due to annual increases in premiums. USPS reported that employee health benefits expenses increased from $5.0 billion in 2016 to $5.2 billion in 2018, even as its share of premium costs decreased from 76 percent to 74 percent for employees covered by the CBAs during the same period. Across all of its efforts, USPS estimated it saved approximately $12 billion for fiscal years 2016 through 2018. While there are multiple valid approaches for estimating cost savings based on policy changes, we found that USPS did not account for some significant factors and, therefore, potentially overstated the savings achieved. Specifically, USPS did not account for the effects of changes in work hours or tenure of employees. When we accounted for these additional factors, we were able to substantiate $8 billion, of USPS’s estimated $9.7 billion, in savings over the last three fiscal years for changes to the number of non-career employees and health insurance contributions. As noted above, we were not able to substantiate the estimated savings of lowering pay for new career employees. We summarize the specific factors below and include additional details about our review of USPS’s estimates and the effect of each factor in appendix I. As previously discussed, in recent years, USPS employees have worked significantly more overtime and other “premium” pay hours. According to USPS, use of overtime and premium hours enables it to meet irregular work demands (for example, spikes in volume resulting from holidays) or delivery performance targets, particularly for Sunday package delivery. Also, to incentivize or compensate employees for working extra or traditionally less desirable hours, USPS routinely uses overtime and other premium pay, such as additional pay for work at night and on Sundays. As a result, these types of work hours cost more to compensate than regular work hours (i.e., straight time hours) on a per hour basis. When calculating the savings it achieved from using lower-paid employees, USPS compared what it actually paid in compensation to estimates of what it would have paid in the absence of having non-career or lower-paid workers, using average pay rates and not individual level employee data. USPS’s method therefore did not fully account for the mix of types of hours worked in its estimates. As a result, USPS underestimated how much the lower-paid employees are compensated in its cost estimates. Our analysis of the last three years of data found that lower-paid employees work a different mix of hours, and overall they work more hours and more premium hours, factors that USPS does not capture in its estimates. For example, from our analysis of USPS payroll data, we found that, on average: a non-career employee worked 30 more straight hours, 73 more overtime hours, and 23 more night and Sunday hours per year than a career employee, and a lower-paid career employee worked a higher number of straight time hours and, depending on the craft, also may work more overtime, night work, and Sunday hours than a higher-paid career employee. USPS officials said it was not necessary to factor in work hours because the amount of work hours was not changed by introducing lower-paid employees. For example, USPS officials told us that, to meet the increase in packages, more carrier work hours were needed in recent years, to make deliveries on Sundays for instance. USPS officials also noted that to save costs, it is preferable that these hours go to lower-paid employees. However, our analysis suggests that lower-paid employees may work different amounts and mixes of work hours than higher paid employees. For example, newer, lower-paid employees may be more willing to work extra hours, and being newer, their inexperience could mean that they take longer to complete their work on average. USPS management officials said that they do not believe newer employees are less productive than more experienced employees, nor do they lead to increases in overall work hours. USPS management officials also told us that employees cannot opt into working more hours because overtime hours are assigned as necessary by supervisors. Our analysis did not include information that would allow us to determine whether management was pre-approving all overtime hours. However, in June 2019, the USPS OIG reported $136.6 million in unauthorized overtime— which occurs when an employee’s clock time exceeds eight hours without prior approval—for mail processing alone. USPS has saved billions by using a less costly and more flexible workforce. Indeed, based on fiscal year 2018 data, we calculated that USPS could potentially save up to an additional $4.4 billion a year if the current cap on non-career employees was doubled to 40 percent. However, USPS did not fully evaluate the impact of pay rates and work hours by employees. Given the growth in work hours, particularly overtime and premium pay hours, USPS risks overestimating savings and making ill-informed changes to employee compensation by not including information about employee work hours. USPS employees with longer tenure generally receive higher pay than similar employees with less tenure. Based on our analysis of USPS payroll data for fiscal year 2018, the average pay of career employees is driven in part by the high median tenure of those employees, which was 20 years (with a median age of 54 years old) in fiscal year 2018. However, when calculating its savings estimates for non-career employees, USPS did not factor in the effect of employee tenure. Specifically, USPS’s savings estimate for non-career employees compared what it was paying for a newly hired non-career employee against the average pay for a career employee, rather than the starting pay for a career employee. When we accounted for tenure in our analysis, we found that some of the savings from hiring new employees could be explained by the shorter tenure of the lower-paid employees. USPS officials told us that they agreed that tenure should have been taken into account and that they would recalculate these estimates. Without adjusting for mix of hours worked and tenure, we found the difference in pay between career and non-career employees to be, on average, $25 per hour. After adjusting for tenure and mix of workhours, we found the difference in pay to be, on average, $8.27 per hour. There are a variety of acceptable methods for conducting cost savings estimates, but all estimates should include all the relevant factors driving costs and be clearly documented. The GAO Cost Estimating and Assessment Guide—a best practices guide for developing and managing program costs—states that estimates should include a common set of agreed-upon estimating standards and ensure that assumptions are not arbitrary. USPS officials said that they do not have guidance for how to develop these estimates, including what significant factors should be considered. Given that USPS regularly evaluates and manages employee compensation in its labor negotiation, as well as overall budget planning, without guidance on what factors are necessary to consider when developing employee compensation cost estimates, USPS risks making ill-informed decisions about whether to maintain, or make additional, changes to compensation. Based on interviews with USPS and postal employee union officials, as well as recent research by the USPS OIG, we identified additional costs that USPS did not factor into its cost savings estimates related to lowering employee pay and benefits. Specifically, USPS did not include the impact of the changes on recruitment and turnover of non-career employees in its cost saving estimates, both of which could have a significant impact on the overall level of savings. Both USPS management and postal union representatives discussed the impact of lower pay on recruitment of non-career employees. Officials from two unions told us USPS is having a harder time recruiting and retaining some non-career employees, especially minorities and veterans because of the lower pay. In July 2019, USPS OIG reported that a post office in Denver had constant challenges filling letter carrier vacancies due in part to USPS’s inability to offer competitive compensation. The report noted that a high number of vacancies affected carriers’ ability to complete their routes on time, contributing to excess overtime and penalty overtime. USPS officials stated that with very few exceptions USPS has had little trouble attracting applicants to non-career positions. One example of an exception USPS officials provided was that in fiscal year 2018 USPS increased pay for non-career seasonal holiday workers to make it more competitive. USPS and postal union officials also told us that USPS had trouble specifically hiring truck drivers at the non-career pay scale. In addition to lower pay compared to the private sector, a high demand for drivers and low unemployment rates across the industry has made it challenging for USPS to find enough qualified drivers. In addition to the lower wages, USPS and postal union officials stated that the unpredictable non-career employee work schedules, as well as low unemployment rates, have created additional challenges for recruiting qualified non-career employees. In contrast, USPS officials told us that implementing a lower pay rate for new career employees has not affected recruitment because employees are generally recruited from the non- career employee pool, so these employees get an increase in compensation from their current position. USPS and postal stakeholders also raised concerns about the effect of lower pay on retaining non-career employees and the associated costs. USPS officials told us they expected the turnover rate among non-career employees to increase with the reduction in starting pay, but stated that recent turnover was higher than expected. According to USPS, the average monthly turnover rate for non-career employees has decreased from 3.57 percent in fiscal year 2016 to 3.08 percent in fiscal year 2017 and 3.02 percent in fiscal year 2018. USPS officials told us that USPS strives to keep the turnover rate as low as possible and that overall, postal employees voluntarily leave their jobs at a lower rate than in the private sector. According to two postal union estimates, it costs USPS about $4,000 to $7,000 to hire and train new employees. USPS OIG has reported that turnover costs USPS about $95.1 million in fiscal year 2015, with an additional $23.1 million in fiscal year 2016 and could be $29.8 million in fiscal year 2017. According to USPS officials, the lower pay rate for new career employees has not had a significant impact on employee turnover. New career employees were converted from the pool of non-career employees, who had a lower pay rate than the new career employees, thus getting an equivalent of a pay raise and more benefits. However, USPS provided us with its analysis showing that the turnover rate for career employees with a lower pay rate (average of 4.21 percent per month) was higher than for career employees with a higher pay rate (average of 0.36 percent per month) in fiscal year 2018. According to postal union officials and USPS OIG, decreases in pay and lack of work schedule flexibility have resulted in some negative effects on morale that increased turnover of non-career employees. Union officials told us that some managers have abused the flexibility of non-career employees, such as requiring them to work many consecutive days. In addition, non-career employees do not have regular work schedules and can be laid off for lack of work. Officials at one union told us that non- career employees would prefer being hired as career employees, but have to start as non-career employees before being converted to a career position, and getting such a conversion can take from one to seven years. USPS OIG reported that in exit surveys, non-career employees stated that the lack of schedule flexibility, low pay, and lack of benefits are among the most cited reasons for leaving their job. The report also stated that managers realized cost benefits by using non-career employees to provide coverage for vacation days, sick days, and unscheduled leave for career employees because their hourly rates are less than those of their career counterparts. Union officials also told us that some non-career employees do not receive the necessary training but are expected to perform their jobs correctly from the start. They also said that these new employees are less experienced and are more likely to make mistakes. In addition, they said that managers become upset that new employees cannot do their jobs correctly from the start, which leads to morale issues among employees. USPS officials told us that when they implemented the compensation changes discussed above, they expected higher rates of employee turnover, especially among non-career employees. USPS officials told us that they are developing an assessment of the cost of turnover and the preliminary results have not been validated. Specifically, USPS officials also told us that they have not yet determined how to accurately apply the turnover estimates to the population of employees who leave because some turnover is necessary and preferable. For example, there are seasonal needs for increases in labor hours, such as major holidays or in some vacation areas, and when these employees exit, it is often because the season ends and their employment is not needed. In contrast, other employees leave USPS voluntarily for higher paid, or less difficult, work elsewhere. USPS officials told us they recently began to develop estimates of employee turnover costs, estimates that include costs such as training, background checks, and drug screenings for new employees, and the estimates are preliminary. We have reported that legislative reform and additional cost-cutting are needed for USPS to achieve sustainable financial viability. As noted above, compensation costs are about three-quarters of USPS’s annual expenditures and many aspects of how USPS compensates its employees are defined in law. As a result, changes to the current statutory requirements for employee compensation are one way to alter USPS’s operational costs. A variety of reviews of USPS have also recommended legislative action to help address USPS’s long-term sustainability. We examined four broad reviews of USPS and found 12 recommendations that could impact employee compensation costs by amending statutes governing three areas: employee work hours, benefits, and pay. The four reviews we analyzed are: (1) Task Force Review of 2018, (2) Presidential Commission Review of 2003, (3) USPS 2010 Comprehensive Statement, and (4) PRC 2016 Analysis. The recommendations in these four reviews are not exhaustive of all possible statutory changes that could impact employee compensation costs. The recommendations we reviewed also do not include changes to the fundamental business model of USPS, such as privatization, or a return to annual appropriations to finance its operations. We are also not recommending or endorsing the adoption of any of these recommendations, in part, because our cost estimates and limitations discussed below are based on broad policy options and do not take into account many of the specific factors that would need to be determined when implementing any of these options. This information is meant to describe the potential for savings from increasing flexibility related to work hours, benefits, and pay, as well as highlight some potential challenges of implementing those changes. A major driver of USPS’s operating costs is delivering mail to nearly every mailing address, regardless of volume, six days per week. USPS’s mission to serve, as nearly as practicable, the entire population of the United States, requires a significant, continual use of employee work hours. This is particularly true of the mail carriers who visit addresses each delivery day. Based on USPS payroll data, we found mail carrier compensation in fiscal year 2018 was approximately $24.4 billion, or about 50 percent of compensation costs for current employees. Two of the twelve recommendations we reviewed suggest legislative changes to increase USPS’s authority to determine delivery frequency, which would enable USPS to manage work hours more closely to volume. Specifically, the 2018 Task Force report recommended that USPS be given more flexibility to determine delivery frequency. USPS recommended in its 2010 Comprehensive Statement that Congress change the current delivery requirement from six days a week to five days a week. Changing the frequency of USPS’s deliveries could reduce its employee compensation costs significantly by allowing USPS to reduce work hours, particularly for carriers. Reducing delivery by one day could potentially reduce carrier work hours by a maximum of one sixth—or 16.7 percent. Our analysis shows that, based on fiscal year 2018 payroll data, if USPS decreased the current mail carrier hours by one sixth, it could save up to $2.6 billion in compensation costs. This estimate assumes that USPS would reduce work hours from both the career and non-career carrier employee pools. If USPS reduced mail carrier hours from only the non- career carrier workforce by 16.7 percent, it could save approximately $1.96 billion. USPS officials agreed that USPS could potentially save work hours and associated costs due to a reduction in delivery frequency. However, they noted that, even if USPS went to 5-day delivery, it would still deliver packages seven days a week. Under that scenario, USPS has reported estimated savings of $1.4 to $1.8 billion a year. The 2018 Task Force report recommended that USPS be given increased delivery flexibility by allowing USPS to determine delivery frequency. Additional flexibility could result in a range of alternatives. For example, USPS could deliver to addresses every other day (three or four days a week) with optional dynamic routing as necessary up to an additional two days a week, and could potentially save more than 16 percent. USPS has begun to introduce technology and other options within its package handling that might alleviate undue burden caused by such a large decrease in service. For example, USPS now offers informed delivery, which is an email that is sent to mail recipients with pictures of their mail that is to be delivered, and enables people to have better insight into what to expect and when. In 2018, we reported that USPS was piloting keyless parcel lockers where customers could independently pick up their packages; it is possible similar types of backups could be provided for letters. Regardless of the delivery frequency, reducing mail carrier hours is more likely to come through a decrease in non-career employee hours. USPS reports that non-career employees are temporary in nature and can be laid off; therefore, it would be easier to implement hour reductions in this pool of employees. In contrast, if USPS were to reduce hours for career employees, savings would accrue more slowly over time, because career employees’ are usually covered by no lay-off clauses in their CBAs, and with low turnover rates, USPS would need employees to leave voluntarily. A large portion of the career mail carriers, however, are aging, and it is possible that many will leave through retirement in the next five years. Specifically, in analyzing the USPS payroll data, we found that, in fiscal year 2018, approximately 16 percent of career city carriers are currently 60 or older, with an additional 38 percent between the ages of 50 and 59. Approximately 21 percent of career rural carriers are 60 or older and 38 percent are between the ages of 50 and 59. Based on our analysis of the recommendations, we identified three potential challenges to reducing delivery frequency: (1) management of work hours (2) redistribution of mail volume; and (3) meeting delivery needs. Management of work hours: Realizing cost savings from a decrease in delivery frequency largely depends on USPS being able to reduce work hours accordingly. Prior USPS OIG and GAO reports have found that in two previous efforts USPS has not successfully decreased labor hours commensurate with a decreased level of service. Beginning in January 2015, USPS revised its First-Class Mail service standards, eliminating single-piece overnight service and shifting some mail from a 2-day to a 3-day service standard. According to USPS officials, these revisions were intended to, among other things, allow USPS to process mail on fewer machines and decrease the need for overnight work hours, which are paid at a higher rate than day time hours. USPS OIG, in its review of this service change, found that mail processing overtime costs increased by $68.4 million, or 9 percent, rather than decreasing. USPS OIG conducted a follow-up study that found USPS was not effectively managing mail processing overtime in fiscal year 2018. USPS management’s official response partially agreed with the recommended steps USPS OIG outlined to better manage overtime. In 2012, USPS implemented Post Office Structure Plan (POStPlan), which was intended to reduce work hours at some retail facilities, which USPS estimated would result in about $500 million in annual cost savings. In 2016, we found that this effort likely resulted in less savings than USPS had estimated. According to USPS officials, this is, in part, because USPS had to revise its plan after a union grievance and arbitrator award required it to change the way it was staffing post offices. We also reported concerns with USPS’s methodology for determining work hour and compensation savings. Overall, while USPS likely achieved an overall reduction in work hours at thousands of post offices, we found the accuracy of the saving may have been limited by errors we identified. For example, among other issues, we found that USPS had not included the increase in workload, and associated costs, from increasing the number of remotely managed post offices. Distribution of volume: Any reduction of delivery frequency would require USPS to re-distribute its mail volume to the remaining delivery days. In 2010, USPS recommended eliminating Saturday delivery and re- distributing the mail volume from Saturday to the delivery days Monday through Friday, though USPS continues to deliver mail on Saturdays. USPS stated that the additional volume in the remaining delivery days would result in higher mail carrier productivity. However, we reported in 2011 that USPS’s ability to efficiently absorb the cost of transferred workload from Saturday to weekdays is a key factor in determining potential cost savings. Meeting Delivery Needs: Another challenge to reducing delivery frequency is that it could reduce the demand and value of USPS products if customers are not getting their delivery needs met. Some stakeholders have raised concerns that a reduction in mail delivery frequency will decrease demand from mailers because products may not reach households in a timely manner. Other stakeholders, however, have stated that reducing delivery frequency is worth pursuing as long as it results in significant cost savings. Federal law requires USPS to provide certain benefits to its employees, which cost USPS billions each year to satisfy. Further, as noted above, USPS is mandated to pre-fund its retiree health benefits, which USPS has failed to do in recent years. Four of the twelve recommendations we reviewed suggest legislative changes to the funding mechanism and requirements for USPS retiree health benefits. In addition, in 2018, we issued a report with options for postal retiree health benefits and noted that it is up to Congress to consider the merits of different approaches and determine the most appropriate action to take. Here, we focus on the other three of the twelve recommendations we reviewed that suggest legislative changes to other USPS retiree benefits. USPS’s 2010 Comprehensive Statement and the 2003 Presidential Commission Report both have broad recommendations suggesting that USPS should be allowed to make changes to its retirement benefits package. USPS pays toward the following retirement benefits for current employees: contribution to retirement pension (FERS or CSRS) and contributions to the TSP, Medicare, and Social Security. For the purposes of estimating the impact of decreases in retirement contributions, we estimated savings based on decreases to the cost of pensions (CSRS and FERS) and TSP, and assume no changes to Medicare and Social Security costs. Decreases to Retirement Contributions: If USPS was able to decrease its cost of retirement payments made on behalf of current employees by 1 percent, 5 percent, and 10 percent, then we estimate based on fiscal year 2018 payroll data, the potential savings would be about $35 million, $175 million, and $350 million respectively. Implementation of such decreases could include USPS offering lower cost benefits by increasing the employee contribution or lowering the promised benefits. The 2018 Task Force report recommended reform for postal employees under FERS to move away from a “defined benefit” system—where the payment received in retirement is a specified amount—towards a defined contribution system—where the contribution into the system is a specified amount. There are many different ways to implement this kind of change, and we have not outlined potentially restructuring options. However, CBO has calculated potential savings of increasing civilian employees’ contribution for FERS and estimates it would save about $20 billion over five years. Decreases to Healthcare Contributions: If USPS was able to decrease its cost of health care payments for current employee coverage by 1 percent, 5 percent, and 10 percent, we estimate, based on fiscal year 2018 payroll data, the potential savings would be about $45 million, $224 million, and $449 million, respectively. If USPS no longer had to offer federal health care coverage for current employees, it is possible that USPS could substitute a less costly alternative. In 2013, we conducted a review of a specific USPS proposal for restructuring its health care benefits, and reported that the change could result in cost savings, but that other issues should be considered, such as exposure of health care funding if investments are made outside of Treasury securities. Based on our analysis of the recommendations, we identified three challenges to achieving cost savings from changes to employee benefits: (1) union agreement; (2) cost savings timeline; and (3) impact on federal benefit programs. Union Agreement: According to USPS officials, if there was a legislative change that allowed for USPS to alter the current retirement benefits, USPS would need to negotiate future benefits offerings with the unions. Savings, therefore, depend on the ability of USPS and the unions to develop alternative options that meet the needs of the current workforce, but also cost less than the current options. Implementation Timeline: Cost savings are not likely to be realized in the short-term because changes likely will not apply to current career employees. In the past, when Congress has made changes to benefits— as when Congress increased the required retirement contribution levels for federal employees under FERS, which also applied to USPS employees—it only applied to employees hired after the change was implemented. Therefore, savings would only occur as new employees replace current employees. This is also consistent with the lower pay for new career workers that USPS negotiated with the unions we discussed previously—it only applied to new career employees. Federal Benefit Impact: The Presidential Commission Review of 2003 stated that USPS should work with the Department of the Treasury and OPM to determine the impact that separating USPS’s pension and retiree health care programs would have on the existing federal systems. With over 600,000 USPS employees, the Presidential Commission review stated that it had concerns about the impact of removing USPS employees might have on the OPM administered fund, which also pays out retirement benefits for other federal employees. Two of the twelve recommendations we reviewed suggest legislative changes to collective bargaining rights, which could result in decreased pay rates. The 2018 Task Force report recommended the elimination of the right of USPS employees to bargain over compensation and that employee pay rates be frozen in the short term, which would lead to a slower rate in growth over time. If USPS was provided authority to determine pay rates for its employees without going through collective bargaining, it could reduce employee compensation costs through pay cuts. We estimated the potential annual cost savings associated with USPS implementing cuts for all current employee pay by 1 percent, 5 percent, and 10 percent across all current employees based on fiscal year 2018 payroll data. We find the potential savings to be about $321 million, $1.6 billion, and $3.2 billion, respectively. Based on our analysis of the recommendations, we identified three challenges to obtaining savings through reductions in pay: (1) difficulty of cutting current workers’ pay; (2) trade-offs of lower wage rates; and (3) history of collectively bargaining pay. Difficult to cut pay: As discussed previously, pay has been the area in which USPS has made progress in reducing employee compensation costs in the recent past. However, as discussed, the savings mostly comes from implementing lower pay rates for new employees. It is difficult to implement changes that decrease the current pay of workers below what they have previously received. In the private sector, a company can restructure and turnover a portion of the workforce as an effort to decrease compensation. USPS cannot easily turnover and restructure its workforce because of the no layoff clauses. Trade-off effects: Pay cuts to current employees could result in a variety of negative consequences for USPS. According to literature on labor economics, workers who face pay cuts may exhibit behavioral responses including adjusting worked hours, adjusting level of effort for each hour of work, or dropping out from the workforce altogether. Workers may adjust the hours of work from changes in pay for two reasons. First, a pay cut may reduce the incentive for employees to work because each hour of work generates less money than it did before, holding income constant. Second, a pay cut that reduces the income of the worker may induce an employee to work more hours because the employee feels poorer. Changes in pay rates may also change workers’ morale, and consequently the effort workers exert during worked hours. Economic literature has found that wage cuts can impact the effort workers provide, and that productivity may fall. For example, workers may exert less effort in an attempt to punish the employer for the wage cut, or they may be less worried about job loss because the cost of losing a job is lower after a wage cut. These consequences may be of particular concern as USPS has reported that productivity has stagnated in recent years, and USPS is currently not meeting its standards for on-time delivery service. Finally, pay cuts may also induce some individuals to leave the workforce altogether. Studies have found that the share of the population that is working may be influenced by pay rates. As we discussed previously, USPS has already experienced some difficulty in recruitment and retention as a result of the lower pay for new employees. History of Collective Bargaining: Elimination of collective bargaining rights—which could facilitate changes to USPS employee pay—would be a major change in management-labor relations at USPS, with possible negative effects on employee commitment and productivity. Unions representing USPS employees have been bargaining over pay since the 1970s. Prior to that time, USPS employees had major strikes over low compensation levels. USPS has a high approval rating from the public, which it attributes, in part, to its employees feeling a sense of duty related to their work. All of the union officials we spoke with said that they would not support the removal of collective bargaining rights over pay. One union official stated that both parties are better served through working as a team to meet the needs of postal customers at reasonable cost. USPS has made changes to employee compensation and saved billions through these efforts. USPS, however, has not achieved financial sustainability. USPS overestimated its cost savings from the employee compensation changes because it did not include significant factors such as tenure and mix of work hours when developing its estimates. In addition, USPS did not weigh the costs of tradeoffs, such as an increase in turnover, which likely further limits cost savings. Cost estimates that include the significant factors driving compensation costs would help USPS make better informed decisions about how to use, and potentially change, its workforce. Quality estimates are also important for USPS to make a business case for additional employee compensation changes, which it does regularly as it negotiates employee contracts and will be doing as it develops future strategic plans. Additionally, as Congress considers USPS reform legislation, comprehensive cost estimates will improve policymakers’ ability to fully assess savings, as well as costs associated with any efforts and associated implications for managing USPS compensation. We are making the following recommendation to USPS: The Postmaster General should direct executive leaders to develop guidance for cost savings estimates related to employee compensation specifying that analysis used to calculate estimates should, to the extent possible, include significant factors, such as work hours, tenure, and turnover. (Recommendation 1) We provided a draft of this report to USPS for review and comment. USPS provided written comments that are summarized below and reprinted in appendix III. In its written comments, USPS agreed that quality decision-making rests upon quantitative analysis using the best available data. In that respect, it stated that it accepts the recommendation to more formally articulate internal guidance for developing cost savings estimates to ensure appropriate factors—such as work hours, tenure, and turnover—are taken into account when evaluating potential business outcomes. USPS disagreed, however, that the lack of formal guidance adversely affected USPS’s ability to develop appropriate cost estimates. As discussed in detail in the report, we found that USPS’s analysis potentially overestimates savings because it did not take certain factors into account. Specifically, in its comments, USPS identified issues related to our findings about their cost-estimation analysis. For example, our analysis, which relied on USPS payroll data, showed that non-career employees have generally worked more overtime hours when compared to career employees. Although USPS did not dispute this finding, it said it believed our analysis reflected erroneous assumptions about the source and administration of overtime because we described some possible reasons for the overtime patterns we saw based on our analysis and other research. We did not intend to determine the full cause of overtime hours and how they are distributed among employees, rather, our analysis sought to identify important factors in employee compensation costs, and found that the mix of work hours was important and varied across types of employees. We also found that USPS estimates had not taken differences in the mix of work hours into account and in assuming that career and non-career employees work similar types of hours, USPS potentially overstates the savings from non-career employees. USPS agreed to take work hours into consideration in future cost estimates and this may provide a more accurate assessment of costs, and better opportunity to target future efforts to manage workforce costs. Regarding our analysis related to recruitment and retention issues among non-career employees, USPS stated that it disagreed with our statements regarding wages for non-career workers and their purported impact on recruitment of certain employees. It said that USPS has little trouble attracting applicants to non-career positions, and we made changes to the report to reflect this view. Regarding turnover, USPS acknowledged that turnover among certain groups will be higher and they account for these turnover rates in their analysis. However, we found that USPS did not fully account for costs associated with these turnover rates in the analysis they provided us. With a higher than expected turnover rate among non-career employees, which have become a significantly larger percentage of its workforce, USPS should be accounting for the additional costs of on-boarding of employees, like recruitment and training. USPS stated that, in response to the recommendation, it will incorporate the cost of turnover into future analysis. We are sending copies of this report to the appropriate congressional committees, the Postmaster General, Chairman of PRC, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff making key contributions to this report are listed in appendix IV. To support all parts of this review, we requested and received U.S. Postal Service (USPS) national payroll data for fiscal years 2009 through 2018. We specifically requested individual level payroll data for all ten years; however, individual employee level data before fiscal year 2016 were not readily available. For fiscal years 2009 through 2015, we received aggregate data at the post office level, and for fiscal years 2016 through 2018, we received the data at the individual level. For both sets of data, USPS provided point-in-time data at the end of the fiscal year. We conducted a data reliability assessment and found that, for describing general trends, the fiscal years 2009 through 2015 payroll data provided at the post office level was sufficient for our purposes. However, for evaluating policy changes to employee compensation, only fiscal years 2016 through 2018 payroll data provided at the individual level were appropriate. To assess the reliability of the payroll data for fiscal years 2009 through 2018, we reviewed technical documentation for the dataset, related publications, and information on USPS and Bureau of Labor Statistics websites about employee compensation. We performed several analyses in order to validate that these data were appropriate to use for the purposes of our work. We spoke with USPS payroll data specialists to discuss known limitations and issues with the data. USPS officials informed us that they do not keep a data dictionary for the entire payroll system because it is a conglomerate data system with over 40 sub- databases. However, we were able to obtain documentation on the variables relevant to our analysis to understand the definitions and limitations of those variables. We found the individual level payroll data provided for fiscal years 2016 through 2018 reliable for the purpose of examining policy changes to manage employee compensation, and to determine the effect of potential legislative changes to USPS employee compensation. To describe recent trends in USPS employee compensation, we analyzed high-level trends in the payroll data for fiscal years 2009 through 2018. We compared our analysis of USPS national payroll data with USPS annual reports to Congress and financial forms filed as a result of Securities and Exchange Commission requirements, from fiscal years 2009 through 2018. While we found that the data do not match exactly, we found that our estimates are close to reported USPS numbers for each year, (see table 2). We had several discussions with USPS payroll data specialists to clarify how to use the payroll data and ensure that the payroll data were reliable for reporting on changes in hours and overall compensation. To examine the results of recent actions taken by USPS to manage employee compensation costs, we identified three major changes implemented through collective bargaining agreements aimed a decreasing the cost of employee compensation. To evaluate the impact of these changes, we analyzed USPS payroll data. Using these data we developed models to determine trends in compensation based on worker characteristics, including pay rate, participation in various benefits, and career or non-career status. We analyzed data to determine the costs savings accrued by USPS from having undertaken changes to compensation in recent years. We also analyzed the data to determine the effect of potential legislative changes to USPS employee compensation. We received USPS National Payroll data from fiscal years 2016 through 2018 for individual employees with a detailed summary of a worker’s pay, benefits, and hours worked. Pay data include pay for straight time, overtime, and other time with pay differentials (Sundays, nights, holidays, and Christmas), and leave, including annual, sick, holiday, military and other types of leave. See table 3 for a summary description of the types of pay and hours. For each pay category (e.g., straight time, overtime), USPS provided information on the number of hours worked by each worker in a given fiscal year. Benefits include health insurance payments, pension contributions (FERS, CSRS and Dual CSRS with Social Security) and Thrift Savings Plan (TSP), life insurance, Social Security, and Medicare (see table 4). The data contained detailed information on the worker’s earnings, benefits, and hours of work and some characteristics, including age, and the worker’s start and separation dates, if the worker has separated from the USPS. We examined postal employees classified as career or non-career within each of the four main crafts based on the type of work performed. We separated employees into their respective craft and career or non-career status based on their Designation Activity Code. We used these individual-level data to estimate total compensation costs based on observable characteristics of the workers. This section discusses the quantitative analysis methods we used to determine the results of recent actions taken by USPS to manage employee compensation. Table 5 presents the numbers of employees in the postal workforce for fiscal years 2016 through 2018, within four crafts – city carriers, rural carriers, mail handlers, and clerks – and other employees not in the four crafts. Table 6 presents average pay, average benefits, average compensation, and the median age for postal workers by craft and career status. We examined the mix of straight and premium hours between the higher pay (Tier-1) and new career employees hired at the lower starting pay (Tier-2). We used USPS individual-level payroll data for fiscal years 2016 through 2018. Table 7 summarizes the effective dates for the lower starting pay for new career employees by craft. Table 8 summarizes differences in hours between these two groups among full-time equivalent employees. We examined several types of work hours. Straight time hours include all reported straight time hours in a fiscal year. Overtime hours include overtime work, penalty overtime, holiday work, and Christmas hours. Premium hours include hours worked in night work and Sunday work hours. Our analysis does not adjust for characteristics that can affect hours such as age or tenure. We found that Tier-2 employees worked a higher number of straight hours. Furthermore, carriers who are Tier-2 employees also worked a larger number of overtime hours. Among mail handlers, Tier-2 employees worked a higher number of night work and Sunday work hours (see table 8). To the extent that Tier-2 employees work more overtime hours, and assuming a similar productivity between the two tiers of employees, USPS may be miscalculating the effect of the lower pay rate on costs. To analyze the results of hiring more non-career employees, we examined differences in hourly compensation (pay and benefits) between career and non-career postal employees, and estimated cost savings from moving to a workforce with more non-career employees. The analysis examined the entire workforce, within the four different crafts (i.e., city carrier, clerk, mail handlers, and rural carriers) and the remainder of the workforce excluding employee from the four crafts (termed as “other”). 𝑦𝑦𝑖𝑖𝑖𝑖𝑖𝑖=𝛼𝛼+𝛽𝛽1𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑖𝑖+𝛽𝛽𝑋𝑋𝑖𝑖𝑖𝑖𝑖𝑖+𝛾𝛾𝑁𝑁𝑖𝑖+𝛿𝛿𝐹𝐹𝐹𝐹𝑖𝑖+𝜁𝜁𝑖𝑖+𝜑𝜑𝑖𝑖+𝜀𝜀𝑖𝑖𝑖𝑖𝑖𝑖 (2) Equation (2) predicts work hours, hourly pay, benefits, and compensation as a function of individual characteristics. All models are estimated using Ordinary Least Squares (OLS). (1) We examined several types of work hours. Straight hours include all reported straight hours in a fiscal year. Overtime hours include overtime hours, penalty overtime, holiday work hours, and Christmas work hours. Premium hours include hours worked in night shift differential and Sunday premium. Total work hours include straight time, overtime, holiday hours, Christmas work, and penalty overtime. We do not include night shift differentials and Sunday work in the calculations for total worked hours as these hours are already captured under straight hours. We also exclude from work hours any leave. (2) Per hour pay is defined as earnings for worked hours divided by total worked hours. Earnings for worked hours includes payments for straight time, overtime, holiday hours, Christmas work, penalty overtime, and premiums for night and Sunday work. (3) Hourly benefits include USPS contribution to health insurance, life insurance, retirement, TSP, Social Security and Medicare, and dollars associated with leave (see table 4). These variables were calculated by summing over all benefits and dividing by total work hours. (4) We calculated hourly total compensation by summing over hourly wage compensation and benefits that USPS paid to employees. The value of total compensation is divided by total work hours which include total work hours. The NonCareer variable (𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁𝑁 ) is a dummy taking the value of describing the employee’s position. The parameter 𝛽𝛽1 identifies how 1 for non-career employees and zero for career employees. We were 1 for non-career employees and zero for career employees. We were able to generate this variable based on designation activity codes different (if at all) non-career employees’ hours, pay, benefits and compensation are relative to career employees. To account for other variables that could be driving differences in pay, benefits and compensation between career and non-career employees, we included the variables described below in the estimation. Employee craft (𝑁𝑁𝑖𝑖,) are a series of binary indicators for city carriers, Finance unit binary indicators (𝜁𝜁𝑖𝑖), control for level difference in clerks, mail handlers, rural carriers, and the other employees category. City carrier is the benchmark category. These indicators were excluded in the results by craft, but were included in results for the entire workforce. demand between finance units (usually post offices), but also implicitly account for level differences in local level unemployment rates during the period of our study. Age, and age squared capture differences in potential labor market year as fiscal year minus the year of birth for the employee. Tenure and tenure squared describe years of experience with USPS began working for the USPS and the fiscal year in the data. To account for time effects that could affect compensation and The error term (𝜀𝜀𝑖𝑖𝑖𝑖𝑖𝑖 ) captures differences in earnings and experience and were included in (𝑋𝑋𝑖𝑖𝑖𝑖𝑖𝑖). We defined age in each fiscal (𝑋𝑋𝑖𝑖𝑖𝑖𝑖𝑖). We defined tenure as the difference between the year a worker 2018( 𝐹𝐹𝐹𝐹𝑖𝑖). earnings we included year indicators for fiscal years 2016 through compensation that are not observed in our data. We adjusted earnings and compensation by the Consumer Price Index for Urban Wage and Clerical Workers (CPI-W), and present values in 2018 constant dollars. We cluster all errors at the finance unit level to allow for correlation in errors between those within the same finance unit. Indexes i, c, and t designate the individual (i), cohort of hire (c) and time (t). Many non-career employees work a limited number of hours each year, because employees who work on short contracts may have different preferences about the number of work hours that they are willing to supply. Therefore, comparing the outcomes of those who work a limited number of hours to those who work on a full-time basis does not generate a valid comparison. We do not observe preferences for flexible work- schedules in our data, and as a result, analysis comparing individuals with different work schedules would be subject to omitted variables that could bias our estimates of cost differences between career and non- career employees. To facilitate a closer comparison between career and non-career employees, we restricted the sample to those employees who work more than 1,820 each year (excluding leave) which we computed by assuming a 35 hour work week. Furthermore, we excluded those who worked more than 80 hours a week, or the equivalent of working 4,160 hours each year. We refer to these employees as full-time equivalent employees, because their hours are equal to or exceed the full-time equivalent of 35 hours per week. Our analysis relied on payroll data, and these data have not been collected for research purposes. We limited our analysis to those with positive benefits and compensation per hour. We excluded from the sample those earning wages below the federal minimum wage ($7.25 per hour) in the study period. Our data on hourly wage, benefits, and compensation included values in the thousands of dollars. We considered these values to be aberrations related to adjustments in the payroll system. To address these values, we excluded observations that were above the 99.5 percentile for hourly wages, benefits, and compensation for a particular craft and in a fiscal year. Our final analytical sample included 1,373,717 observations over the three years of data, from fiscal years 2016 through 2018. The analysis described adjusted differences in components of compensation, but does not adjust for many characteristic differences among the different categories of employees that may matter in determining outcome variables (e.g., aptitude, gender, and race). The tenure variable is likely mis-measured because non-career employees may have previously been employed by USPS in some other capacity, but given that our individual-level dataset goes back to fiscal year 2016, we do not have previous USPS job experiences for these employees. Because the analysis restricted the data to those working between 1,820 and 4,160 hours a year, we were modeling the USPS workforce that is employed with USPS on what would be considered a full-time basis. While non-career employees on short-term contracts are expected to work a full-time schedule, we do not observe start and separation dates for these non-career employees in our data. As a result, the analysis including these employees cannot be conducted as we would be making assumptions about unobserved preferences of individuals who work on a full-time basis and those who do not. Unadjusted differences in work hours and hourly pay, benefits, and compensation can be found in table 9. We note that these differences compare full-time equivalent employees with non-career and career status. For the entire workforce, differences in work hours existed between career and non-career employees. For example, the average non-career employees worked 115 more straight time hours, 94 more overtime hours, and 6 more night and Sunday premium hours. Regarding differences in the hourly wage, benefits and compensation, we observe a difference of $11 in hourly pay, $14 in benefits per hour, and $25 in overall compensation between career and non-career employees. While these unadjusted differences capture the overall rate differentials between career and non-career employees, they do not account for the differences in characteristics in the career and non-career workforce. The majority of the USPS career workforce is comprised of employees who have been with USPS for a long time. In contrast, the non-career workforce, by its very function, is more flexible and comes and goes based on demand for postal products and services. Consequently, the non-career workforce may have less of an opportunity to accumulate on- the-job experience (tenure) with USPS. Previous literature finds that wages rise with tenure. As such, these large unadjusted differences between career and non-career employees can be attributed in part to the extensive on-the-job experience of career employees. To account for these differences, and other differences in labor market experience, we present adjusted estimates among the career and non-career workforce in table 10. Results from the analysis that controls for differences in employee characteristics are summarized in table 10. Differences in work hours indicate that full-time equivalent non-career employees perform 30 more straight time hours, 73 more overtime hours, and 23 more night and Sunday work hours. We observe variation in these estimated effects by craft. For example, differences in straight time hours are largest for clerks and mail handlers, followed by others, and city carriers. In contrast, the highest differences in overtime hours are observed for city and rural carriers, no differences in hours worked between career and non-career clerks. We also found that non-career mail handlers and other employees work fewer overtime hours relative to their respective career counterparts. The use of night and Sunday differential is higher among non-career city carriers and clerks, while it is lower for non-career mail handlers. While we found a small statistically significant effect for non-career rural carriers, this effect is relatively small given that rural carriers perform a very limited number of hours at night and on Sundays. We found that non-career employees receive $2.10 less in pay per hour, $6.17 less in benefits per hour and $8.27 less in compensation per hour. Examining the differences in pay by different types of work hours reveals that the largest difference in pay exists for overtime hours, where pay is $3.42 less among non-career relative to career workers. The difference in pay is $2.23 per hour, and while differences for night shift and Sunday differential are present, they are smaller at 13 cents per hour. Examining the effect across crafts, we find that clerks have the largest difference in per hour compensation at $8.43, followed by $8.04 for rural carriers, $7.72 for mail handlers, and $7.25 for city carriers. We also describe differences for the category of employees designated as other, which includes all other employees not designated as carriers, clerks and mail handlers. Among these employees, non-career employees receive $10.79 less in hourly compensation relative to career employees. These findings contrast with the findings in table 9, where we do not adjust for differences in characteristics between career and non-career employees. Adjusted differences are approximately 19 percent of the unadjusted difference in hourly pay, 43 percent of the unadjusted difference in benefits, and 33 percent of the difference in hourly compensation, highlighting the importance of controlling for employee characteristics in estimating difference in pay between career and non- career employees. We estimated savings USPS generate by hiring non-career employees, by calculating all hours serviced by non-career employees and multiplying this number by the difference in compensation estimate for the entire workforce ($8.27 per hour). Our calculations indicate that USPS was able to save $2.3 billion in fiscal year 2016, $2.1 billion in fiscal year 2017 and $2.2 billion in fiscal year 2018 from using non-career employees. To analyze the result of USPS reducing its contributions to health insurance premium for active employees, we examined the differences in cost of these contributions. We assumed that in the absence of decreases in the contribution percentage each year, USPS would continue to contribute health insurance premiums at the 2008 rate of 85 or 84 percent (see table 11). We examined employees with positive health insurance premiums contributions and generated average contributions per employee. We then calculated health insurance costs in the absence of any contributions by dividing the cost paid by USPS by the percentage contribution in each year (see table 11). We generated per employee savings by comparing the dollar values between what USPS paid each year and what it would have paid under an 85 or 84 percent contribution. We generated total savings by multiplying the number of employees who took up these plans by the savings per employee. We present these results in table 12. Our results indicated that the reduction in USPS health insurance contributions generated savings of $429.45 million in fiscal year 2016, $438.14 million in fiscal year 2017, and $513.77 million in fiscal year 2018, or $1.38 billion for the entire three year period. Our analysis does not model changes in health insurance participation arising from workers who drop insurance as a result of having to contribute a higher percentage of their health insurance costs. To understand the potential effects of changes to USPS employee compensation that would require legislative or statutory change, we conducted several analyses to estimate potential costs and savings from these changes. We examined the impact of (1) eliminating one day of delivery, (2) reducing benefits, such as shifting additional costs of health insurance premium to active employees, and (3) cutting employee pay across the board. Eliminating some of the current mail delivery would have varied effects on employees based on their craft. If all delivery were stopped for one day that USPS currently delivers mail, work hours for carriers may be reduced by a maximum of one-sixth but work hours for clerks, mail handlers, and other employees would not be affected in the same way. We examined two ways to reduce employee compensation costs, by cutting hours (1) across all career and non-career carriers (city and rural) and (2) only for non-career carriers. Cutting work hours for career and non-career carriers by one-sixth: We aggregated over all work hours for career and non-career city and rural carriers for fiscal year 2018. We multiplied the number of hours under a one-sixth hours reduction by the average pay for hours worked for city and rural carriers. We generated yearly savings for rural and city carriers. Our analysis suggests that cutting mail carrier hours by one-sixth, through a reduction in delivery frequency may have saved USPS $2.6 billion in fiscal year 2018. Cutting work hours for non-career carriers by one-sixth: We aggregated over all work hours for career and non-career city and rural carriers. We then reduced this amount of work by one-sixth, to roughly approximate a cut in hours on average equivalent to cutting one day of delivery for all carriers regardless of career status. We multiplied the hours by the pay of non-career carriers (i.e., rural and city carriers) and estimated savings generated if the one-sixth cut was applied only to non-career carriers. We expected the savings to be less than the scenario presented above, since non-career carriers receive a lower per hour wage rate. We also calculated the percent reduction of work hours for non-career workers that would be necessary to eliminate one day of delivery. Our analysis suggest that reducing non-career hours by the equivalent of cutting one-sixth of all carrier hours may have saved USPS $1.96 billion in fiscal year 2018. These cuts would imply a decrease in non-career hours of 49 percent for rural carriers and 69 percent for city carriers. This analysis does not account for substitution between hours worked. For example, cutting Saturday delivery may shift workers to work more overtime or premium time pay categories. The analysis assumed carrier productivity per hour does not vary with career status, and is not affected by cuts. Finally, it assumed that benefits do not change, but to the extent that benefits are a function of income they may also be reduced. We examined the overall effect of cutting benefits by 1.0 percent, 5.0 percent, and 10.0 percent for all employees. We considered the entire workforce and examined the total payments USPS contributed to health insurance and retirement accounts (e.g., FERS, CSRS, and TSP). Reducing Health Insurance Premiums: We examined the effect of reducing USPS’s contributions toward employee health insurance premiums by 1.0 percent, 5.0 percent, and 10.0 percent, by aggregating all health insurance contributions that USPS made on behalf of all employees in fiscal year 2018 and applying these respective cuts. The analysis does not account for the fact that health insurance participation may fall because the USPS contribution cuts would shift a higher proportion of the cost of insurance to workers. We present the results in table 15. Reducing Retirement Contributions: To examine the effect of cuts of 1.0 percent, 5.0 percent, and 10.0 percent in USPS retirement contributions (FERS normal cost) and USPS TSP contributions, we aggregated over all such USPS contributions for all USPS employees participating in these plans, and applied these respective cuts to contributions for fiscal year 2018. One limitation of this analysis is that it does not account for the change in work hours and, as a result, in compensation from the cut in these benefits. We present results in tables 16 and 17. To examine the effect of cuts of 1.0 percent, 5.0 percent, and 10.0 percent in USPS employee pay, we determined the total work hours (straight, overtime, other hours) and average pay rates for all USPS employees. We performed the following calculations. 1.0 percent reduction in pay: hours*Δwage= hours*(wage*0.01) 5.0 percent reduction in pay: hours* Δwage = hours*(wage*0.05) 10.0 percent reduction in pay: hours* Δwage= hours*(wage*0.10) We found the cost savings associated with cuts of 1.0 percent, 5.0 percent, and 10.0 percent across all current employees are $322 million, $1.61 billion, and $3.22 billion respectively for fiscal year 2018. Across the board wage cuts will produce both direct and indirect effects on overall compensation costs for USPS. In the section above, we provided a calculation of the savings that USPS may realize from the direct effect of a policy that cuts worker pay. The direct effect implies that a pay cut reduces the total wages paid. For example, a 10 percent reduction in pay should reduce the total wage paid by 10 percent, other things constant. However, workers who face pay cuts may exhibit responses to wage cuts that include: adjusting hours worked, adjusting their level of effort for each hour of work. These responses may negate or reinforce additional savings from a wage cut and are examples of indirect effects of wage cuts. Workers may adjust the hours of work from changes in wages, as these wage changes produce to both substitution and income effects on hours worked. The Substitution Effect implies that a pay cut reduces the incentive for employees to work because each hour of work generates less money than it did before, decreasing the opportunity cost of leisure (the time spent not working for pay), holding income constant. Thus a reduction in pay could lead to additional reductions in work hours that employees are willing to supply. Consequently, the reduction in pay may lead to additional savings for USPS in its labor costs from the substitution effect. In contrast, the Income Effect implies that a pay cut reduces the income of the worker; this reduction in income induces the employee to work more hours because the employee feels poorer. The income effect would therefore increase the hours worked, and could lead to reductions in savings for USPS. Income and substitution effects generally run in opposite directions, and uncertainty regarding which effect will dominate determines the overall effect on hours worked. A recent review of the literature from the Congressional Budget Office finds that combined hour elasticities that incorporate both income and substitution effects range between 0 and 0.2. These combined hours elasticities would suggest that a 10 percent cut in wages would reduce hours between zero and 2 percent (0.2*10%). While we are aware that the estimates from the general population may not extend to the USPS workforce, we provide the above example for illustrative purposes. While the effect on workhours from a change in wages may appear small, given the overall hours serviced by USPS each year – adjustments in hours arising from wage cuts may produce nontrivial changes in USPS compensation costs. Changes in wage rates may change workers’ morale, and consequently the effort workers exert during work hours. Economic literature finds that wage cuts can impact on the effort workers provide, and that productivity may fall. For example, workers may exert less effort in an attempt to punish the employer for the wage cut, or they may be less worried about job loss because the cost of losing a job is lower after a wage cut. It is important to note that wage cuts may also induce some individuals to leave the USPS workforce altogether. Estimates of participation elasticities in the literature range between zero and 0.2. Participation elasticities capture the percentage change in the share of the population that is working resulting from a 1 percent change in wage rates. These estimate elasticities would imply that a 10 percent wage cut could be met with a reduction in the USPS workforce between 0 and 2 percent. As we previously noted, it is not clear that these population estimates extend to the USPS workforce, thus we believe examining these effects from USPS workforce data may be an important step in understanding the potential changes in workforce that wage cuts may generate. We reviewed four reports and identified twelve recommendations that proposed legislative changes that relate to USPS employee compensation (see table 19). We categorized these recommendations as having the potential to impact wages, benefits, or required work hours. The reports we reviewed were: 1) 2018 Task Force Report: United States Postal Service: A Sustainable Path Forward. Report from the Task Force on the United States Postal System, U.S. Department of the Treasury. December 2018. 2) 2016 PRC Analysis: Section 701 Report: Analysis of the Postal Accountability and Enhancement Act of 2006, Postal Regulatory Commission, November 2016 3) 2010 USPS Comprehensive Statement: Foundation for the Future: 2010 USPS Comprehensive Statement on Postal Operations United States Postal Service. 4) 2003 Presidential Commission Report: Embracing the Future: Making the Tough Choices to Preserve Universal Mail Service. Report of the President’s Commission on the United States Postal Service, July 2003. In addition to the individual named above, Kyle Browning (Assistant Director); Jade Winfree (Analyst-in-Charge); Thanh Lu, Silda Nikaj; Josh Ormond; Steven Putansu; Oliver Richard, Frank Todisco, Michelle Weathers; Seyda Wentworth; and Crystal Wesco made key contributions to this report.", "summary": "USPS faces major financial challenges. In the last 11 years it has lost over $69 billion; an issue for an organization that is to be self-sufficient. Significant USPS expenses are concentrated in employee compensation—72 percent of its costs in fiscal year 2018—and USPS has taken actions to decrease these costs. GAO was asked to review issues related to USPS's employee compensation. This report examines: (1) recent trends in postal employee compensation, (2) the results of recent USPS efforts to manage compensation and (3) potential effects of proposed changes to employee compensation that would require legislative change. GAO analyzed USPS employee payroll data from fiscal years 2009 through 2018 to determine compensation trends and impacts of management efforts to manage compensation. GAO reviewed relevant legal documents, USPS policy documents and collective bargaining agreements. GAO assessed four broad reviews of USPS including recommendations for legislative change related to pay, benefits and required workhours. GAO also interviewed USPS officials, officials representing USPS employee unions, and industry and mailer stakeholders. Compensation costs for current United States Postal Service (USPS) employees are $9 billion lower than 10 years ago, when adjusted for inflation (see fig). Most of the decline happened in fiscal years 2009 through 2014 as a result of reductions in the number of USPS employees and the hours they worked. While compensation costs have increased in recent years, USPS reports that more work hours were necessary to handle growth in delivery points and labor intensive packages. In recent years, USPS has also failed to make required payments for retiree health and pension benefits—a total unfunded liability of about $110 billion. Compensation Costs for Current USPS Employees for Fiscal Years 2009 through 2018 USPS estimates a savings of about $9.7 billion from fiscal years 2016 through 2018 as a result of paying new employees less, among other efforts. GAO substantiated about $8 billion in savings, and found that USPS's cost savings estimates are likely overstated because they do not fully account for changes in work hours or tenure of employees. Also, USPS did not account for other costs such as increased turnover rates among lower-paid employees. USPS lacks guidance on what factors to consider in its cost savings estimates, and as a result may make future changes to employee compensation based on incomplete information. Changes to employee compensation that would require legislative change could save USPS billions, but the amount saved is dependent on USPS overcoming implementation challenges. If USPS could reduce delivery frequency and associated work hours, GAO estimated USPS could save billions a year. However, other recent USPS reductions in service have not fully achieved planned work hour reductions due to, among other things, issues with management of work hours and lack of union agreement. Changing employee pay and benefit requirements could also achieve significant long-term savings, but saving depends on USPS overcoming challenges, such as potential increases in turnover and reduced productivity resulting from decreases in pay and benefits. GAO recommends that USPS develop guidance that specifies that cost estimates include important factors, such as turnover. USPS accepted this recommendation stating it would formally articulate internal guidance to ensure appropriate factors are taken into account when developing cost estimates and evaluating outcomes.", "document_type": "gao"}
{"report": "NNSA uses professional SSCs in its program offices, headquarters offices, and field offices. Program offices plan and oversee NNSA’s numerous programs and projects and are generally responsible for integrating activities across the agency. NNSA’s program offices are: Defense Programs, Safety, Infrastructure, and Operations, Defense Nuclear Security, Counterterrorism and Counterproliferation, and Naval Reactors. Headquarters offices generally provide leadership, develop policy and budgets, or provide other functional support across NNSA. The headquarters offices include the offices of: Acquisition and Project Management, Cost Estimating and Program Evaluation, Information Management and Chief Information Officer, Management and Budget, and Policy. NNSA also has seven field offices across the country. The field offices are responsible for overseeing NNSA’s management and operating (M&O) contractors, including ensuring compliance with federal contracts. To provide oversight of the M&Os, each field office employs subject matter experts in areas such as emergency management, physical security, cybersecurity, safety, nuclear facility operations, environmental protection and stewardship, radioactive waste management, quality assurance, business and contract administration, public affairs, and project management. NNSA’s field offices are generally located at the sites they oversee. NNSA’s field offices are: Kansas City Field Office in Missouri, Livermore Field Office in California, Los Alamos Field Office in New Mexico, Nevada Field Office, NNSA Production Office in Tennessee and Texas, Sandia Field Office in New Mexico, and Savannah River Field Office in South Carolina. After an office determines that it has an unmet work need, officials are to consult an agency document that outlines the procedures to determine whether to hire a federal employee or use another hiring option, such as an SSC, to meet the office’s need. If, upon consulting the document, officials determine that an SSC is appropriate for their needs, they are then required to contact a representative from NNSA’s Office of Acquisition and Project Management to begin the procurement process. This office is responsible for acquisition support and contracting oversight for the agency throughout the acquisition lifecycle. NNSA’s Office of Management and Budget also has responsibilities for SSCs through, among other things, assisting offices in determining the appropriate funding source for contracts and providing advice on the development of performance work statements. Performance work statements provide a clear description of the activities that the contractor is expected to undertake and how the contractor’s performance will be assessed. NNSA guidance describes the performance work statement as the most important document in a procurement package, as the performance work statement is considered to be the binding agreement under which the contractor must perform. In addition, officials must submit a selection justification form to NNSA’s Office of Management and Budget for approval. In 2012, NNSA implemented the use of a form specific to SSCs—referred to as a determination form—to help mitigate the risk of awarding SSCs for activities that must be performed by federal employees. The form includes a series of questions to help officials from the office that plans to use the SSC and contracting officers to identify inherently governmental functions when reviewing a performance work statement. According to the determination form, if functions contemplated are closely associated with inherently governmental functions, an official must determine that NNSA has sufficient capacity to give special management attention to the contractor’s performance to preclude unauthorized personal services. If the support needed includes inherently governmental functions, the agency would not procure the service by contract. After officials confirm the services to be procured do not include work that must be performed by federal employees, officials sign the determination form to indicate that they have sufficient capacity and capability to, among other things, give special management attention to contractor performance, and include the completed form in the contract file. Once an SSC is awarded, NNSA relies on certain key personnel in various offices to oversee the contractor’s performance and ensure that the contractors comply with the terms of a contract. These include: Contracting officers. Contracting officers work within NNSA’s Office of Acquisition and Project Management and have the authority to enter into, administer, and terminate contracts. Contracting officers, along with program office officials, are responsible for determining the level of risk associated with a contract. Further, as part of the acquisition process, the office that identified the need for the SSC works with a contracting official to develop the performance work statement. Contracting officer’s representatives (COR). CORs are nominated by the program office and approved by the contracting officer. CORs are authorized representatives of the contracting officer and have the primary responsibility of overseeing the contractor, assessing performance, accepting deliverables, and reviewing invoices. Task monitors. Normally assigned by a program office, task monitors assist the COR with oversight of contractor performance. During the life of a contract, contracting officers and CORs regularly monitor contractors’ performance to ensure the contractors are complying with the terms of the contract. This monitoring varies across contracts and can include, for example, reviewing the contractor’s monthly invoices or reports and conducting formal annual evaluations. The monitoring activities can also vary based on the types of tasks included in the contract. For example, a contract requiring advanced technical analysis may warrant monitoring that is different from a contract that requires office administrative support. This difference is because the former is a more complex task that may include the review and approval of technical reports or other deliverables. Contracts for office support may not generate such deliverables. NNSA uses three appropriations accounts—or funding sources—to fund its SSCs. The first is NNSA’s Federal Salaries and Expenses appropriations account. Funding from this account is also referred to as program direction funding in NNSA’s annual budget justification materials. This account is generally used to pay for costs associated with NNSA’s federal employees, such as salaries, benefits, travel costs, and training, regardless of whether those federal employees work in headquarters, program, or field offices. The annual congressional budget justification materials define the Federal Salaries and Expenses account as used mostly to support the federal workforce. NNSA also uses this account to fund SSCs personnel who provide advice and assistance to a federal employee or in lieu of a federal employee. Because Federal Salaries and Expenses is the appropriations account used for most costs associated with federal employees, the amount of appropriations for this account helps determine the size of NNSA’s federal workforce. In addition, NNSA is subject to a statutory FTE cap on the total number of NNSA employees for each fiscal year. Congress and the President established a statutory cap in fiscal year 2013 that limited the total number of NNSA employees to up to 1,825 by October 1, 2014, and decreased that number in fiscal year 2015 to up to 1,690, where the number remains. NNSA can exceed the number of FTEs in the cap by submitting to the congressional defense committees a report justifying such excess. The other two sources NNSA uses to fund its SSCs are NNSA’s Weapons Activities and Defense Nuclear Nonproliferation appropriations accounts. Funding from these two accounts is referred to in NNSA’s annual congressional budget justification materials as program funding. Weapons Activities account. NNSA uses the Weapons Activities appropriation account to fund programs that provide for: (1) the maintenance and refurbishment of nuclear weapons to continue sustained confidence in their safety, reliability, and performance; (2) the investment in scientific, engineering, and manufacturing capabilities for certification of the enduring nuclear-weapons stockpile; and (3) the manufacture of nuclear weapon components. This account is also used to fund program offices other than the Office of Defense Nuclear Nonproliferation and Naval Reactors. Defense Nuclear Nonproliferation account. NNSA uses the Defense Nuclear Nonproliferation appropriation account to fund programs: (1) that provide, for example, policy and technical leadership to prevent or limit the spread of materials, technology, and expertise related to weapons of mass destruction; (2) that develop technologies to detect nuclear proliferation; (3) that secure or eliminate inventories of nuclear weapons-related materials and infrastructure; and (4) that ensure a technically trained emergency- management response is available both domestically and worldwide to nuclear and radiological incidents. Table 1 provides information on the three funding sources and the types of SSCs funded with each source. In recent years, we have reported concerns with federal agencies’ use of SSCs. In December 2011, we found that while agencies increasingly relied on contractors to provide professional and management support services, agencies generally did not consider and mitigate risks of acquiring such services, including the risk that contractors may inappropriately influence the government’s authority, control, and accountability for inherently governmental decisions. Additionally, in September 2018, we found that contracts requiring increased management attention, such as contracts for professional and management support services, have posed contractor oversight challenges for federal agencies. In that report, we found that there was an increased risk that contractors may perform tasks reserved for the government under contracts like those for management support services. We also found that the Office of Management and Budget (OMB) had taken steps to help agencies reduce some of the risks associated with contracts warranting increased management attention. For example, in September 2011, OMB’s Office of Federal Procurement Policy issued a policy letter to executive agencies to provide guidance on managing the performance of contractors performing work that is closely associated with inherently governmental and critical functions. The letter directed agencies to employ and train a sufficient number of qualified government personnel to provide active and informed management and oversight of contractors’ performance where contracts have been awarded for functions closely associated with the performance of inherently governmental functions. The September 2011 policy letter also provided guidance intended to clarify when governmental outsourcing for services is and is not appropriate. The letter identifies the need to increase management attention to using federal employees when functions that generally are not considered to be inherently governmental approach being in that category because of the nature of the function and the risk that performance may impinge on a federal official’s performance of an inherently governmental function. In addition, the policy letter calls for agencies to ensure that they have sufficient internal capability to control their missions and operations for managing critical functions. In 2013, NNSA’s Office of Defense Programs conducted an internal review of its use of nonfederal personnel to accomplish its missions. The study resulted in nine recommendations related to SSCs, including: developing policy on when to use each of the funding sources for SSCs and policy and guidelines on roles and responsibilities for federal employees; providing training for all NNSA employees on the proper use and management of SSCs; and evaluating current practices for the appearance of inherently governmental functions and terminating any inappropriate practices. As of July 2019, NNSA officials said the agency was working to finalize a policy on when to use each of the funding sources for SSCs. To address the recommendations on the two latter issues, NNSA developed training and guidance documents intended to assist staff in managing and working alongside contractors’ staff. Specifically, with regard to training, NNSA developed training for all NNSA’s federal employees to ensure that those employees understand the role of SSCs in the offices. This training covers, among other things, appropriate behavior and activities for federal staff who work alongside contractor personnel. With regard to guidance, NNSA developed documents that explain appropriate interactions with contractor personnel. For example, NNSA prepared a tip sheet for all staff to assist with maintaining proper relationships with SSC personnel; the tip sheet includes respecting the relationship between a contractor and its employees. NNSA also developed a contracting guide in 2014 that provides information on requirements, policies, and procedures, and that covers contracts for different purposes, including SSCs. The guide also includes descriptions of inherently governmental functions. In addition, NNSA’s Office of Management and Budget prepared a memorandum in 2014 for NNSA’s program offices to clarify the process for approving the funding source for SSCs. A July 2015 DOE Inspector General review of NNSA’s use of SSCs also found potential issues with the management of SSCs, particularly related to contractors’ performance of inherently governmental functions. For example, the review found that half of the 20 contracts in its sample included contracted services that approached being inherently governmental. The Inspector General’s review reiterated the recommendations in the Office of Defense Programs’ study and recommended that NNSA track the corrective actions to respond to the recommendations in that study to their completion. According to agency officials and documentation, NNSA has been tracking progress on these recommendations. In 2018, NNSA completed two workforce studies related to its use of SSCs. A joint workload and organizational analysis by NNSA and the Office of Personnel Management reviewed all program offices’ current workloads and federal staffing levels to assess the workforce needs to execute NNSA’s missions. The analysis concluded that NNSA did not have enough federal personnel to meet its mission requirements and called for an increase in the number of federal government employee FTEs by 238 over the agency’s current statutory cap of up to 1,690, for a total of 1,928. The analysis also concluded that the need for additional federal FTEs was driven, in part, by new mission requirements. NNSA’s Office of Cost Estimating and Program Evaluation also conducted an assessment of the number of federal personnel and contractors’ FTE personnel working on SSCs within each of NNSA’s program offices, as well as the appropriate workforce balance between federal and contractor FTEs, among other things. This assessment concluded that NNSA should rebalance its workforce by increasing the number of federal personnel to meet current and future missions. NNSA’s fiscal year 2020 budget justification materials request 1,753 federal FTEs, an increase of 63 FTEs over the current cap, in order to meet its mission requirements. In our March 2019 High-Risk Update, we stated that Congress should consider working with NNSA to ensure that the statutory cap on staffing is re-examined and is consistent with NNSA’s human capital needs, as evaluated in these two studies. NNSA increasingly used professional SSCs for a variety of functions in fiscal years 2010 through 2018. Specifically, based on our analysis of data from FPDS-NG, NNSA’s obligations for SSCs increased from about $139 million in fiscal year 2010 to about $193 million in fiscal year 2018 (see fig. 1). This is an increase of $54 million, or nearly 40 percent, in current dollars. The largest increase in NNSA’s obligations for SSCs occurred from fiscal year 2013 to 2014 when obligations for SSCs increased by about $26 million in current dollars—or about 16 percent, when adjusted for inflation to constant 2018 dollars. As discussed previously, in fiscal year 2013, Congress established a cap on the number of NNSA’s federal FTEs of up to 1,825 by October 1, 2014. After declining from a high of nearly 200 contracts in fiscal year 2010 to 160 in fiscal year 2011, the number of contracts did not fluctuate as much from fiscal years 2011 through 2018. NNSA used SSCs in nearly all of its offices in recent years (see table 2). The Offices of Defense Programs, Acquisition and Project Management, and Defense Nuclear Security together accounted for more than half of the FTE contractor personnel funded through professional SSCs in fiscal years 2015 through 2018. To understand how NNSA used these SSCs, we analyzed the product service codes associated with each of the SSCs. NNSA categorizes each of its SSCs using product service codes that provide some information on the types of tasks to be performed under the contract. NNSA identified 77 codes that define its professional SSCs when it started reporting information on SSCs in its congressional budget justification materials. These codes are arranged in five broad categories: (1) information technology and telecommunications support; (2) environmental consulting and legal support; (3) professional support; (4) administrative support; and (5) management support. Within each category, there are codes for specific activities, as well as a code for “other” support. For example, within the administrative support category, there are specific codes for word processing/typing, paper shredding, and transcription, and there is a separate code for “other” administrative services that is for tasks that do not fit within the other codes. According to several contracting officers and CORs we interviewed, officials try to select the code that best addresses all of the tasks included in the contract; however, most SSCs encompass a variety of tasks, so contracting officers often select the “other” category. Further, according to officials, if NNSA awards a task order under an existing contract, the task order has the same product service code as was assigned to the existing contract. As shown in figure 2, based on our analysis of FPDS-NG data, NNSA used three of the 77 product service codes—other professional services, engineering and technical services, and other administrative services—for more than 80 percent of its obligations to SSCs in fiscal year 2018. Because the product service codes encompass a wide range of activities, we reviewed the performance work statements for the 12 contracts in our sample to gain a greater understanding of the types of activities these codes may represent. The 12 contracts in our sample used five product service codes. Within those five product service codes, activities in the performance work statements for the 12 contracts in our sample include: Other professional services. Budgeting and evaluation analyses, technical support in training emergency response personnel, technical assessments and reviews, and policy analysis. One performance work statement included managing and maintaining databases, statistical analysis of budgetary data for decision makers, and programmatic assessments of data management systems for various programs. Engineering and technical services. Feasibility studies, acquisition planning, analysis of technical alternatives, project planning, risk analysis, general design support, and document preparation. One performance work statement included providing technical training support to the training program manager in a field office. Other administrative services. Analyzing the economic aspects of foreign nuclear programs, analyzing and producing reports on nuclear security issues in one region, processing correspondence, and data entry. One performance work statement included providing administrative and clerical support for functions such as responding to freedom of information act inquiries and providing support for training procurement, development, and evaluation. Other management support services. Providing technical coordination and document-editing services and reviewing, assessing, and linking government requirements to project documents. One performance work statement included support for maintaining an effective security program, including revising both federal and contractor sites’ requirements and procedures for two facilities and the field office. Program management and support services. Providing technical and advisory assistance in the design, construction, and operation of NNSA facilities for a certain program, technical evaluations, and technical and analytical support. One performance work statement included expert technical and advisory assistance related to the design, construction, and operation of facilities related to a certain program, including working with M&O contractors in engineering, equipment fabrication, construction, and tests. According to NNSA officials, NNSA increased its use of SSCs in fiscal years 2010 through 2018 due to: (1) increases in appropriations under the Weapons Activities appropriations account for additional work and (2) a decrease in the number of authorized federal employee FTEs due to a decrease in the statutory cap from fiscal years 2014 to 2015. First, as shown in figure 3, NNSA’s total appropriations increased from about $9.9 billion in fiscal year 2010 to $14.7 billion in fiscal year 2018 in current dollars. The increase in NNSA’s appropriations occurred mainly in the Weapons Activities appropriations account, which increased from $6.4 billion in fiscal year 2010 to $10.6 billion in fiscal year 2018 in current dollars. During the same period, NNSA’s appropriations for Defense Nuclear Nonproliferation generally remained around $2 billion per fiscal year in current dollars, and appropriations for Federal Salaries and Expenses—which covers the costs of all federal employees, including those working on Weapons Activities and Defense Nuclear Nonproliferation programs—remained around $400 million per fiscal year in current dollars. The increases in appropriations for the Weapons Activities account generally reflect the increasing workload to modernize the nuclear weapons stockpile and its associated infrastructure, as described in the 2010 and 2018 Nuclear Posture Reviews. According to an official in the Office of Defense Programs, that office has increased its use of SSCs because of the increase in refurbishment activities in the nuclear stockpile. Similarly, the internal review by NNSA’s Cost Estimating and Program Evaluation office attributed the increase in NNSA’s use of SSCs since 2012 to an increase in appropriations through the Weapons Activities account. According to an official from that office, the increased appropriations were for additional work related to weapons refurbishment and infrastructure modernization. Second, according to several NNSA officials, offices have increasingly used SSCs because of a decline in federal FTEs. As figure 4 shows, the number of NNSA’s federal FTEs funded through the Federal Salaries and Expenses account decreased from 1,897 in fiscal year 2010 to 1,608 in fiscal year 2018, a decrease of 15 percent. According to an NNSA official, this decline in federal FTEs is due, in part, to the annual statutory cap on federal FTEs that was to be implemented by October 1, 2014. An official explained that, by using SSCs, program offices have been able to accomplish the agency’s missions while remaining under the cap. Although the number of NNSA’s federal FTEs has generally decreased since fiscal year 2010, the change in federal FTEs has differed across program offices. From fiscal years 2013 through 2018, the number of federal FTEs in offices that support programs funded through the Defense Nuclear Nonproliferation appropriations account decreased, while those that support programs funded through the Weapons Activities appropriations account increased. For example, as shown in table 3, federal FTEs in the Office of Defense Nuclear Nonproliferation decreased by 22 percent from fiscal years 2013 through 2018. In contrast, the number of federal FTEs in the Office of Defense Programs increased 4 percent during the time period. In general, the number of federal FTEs supporting Defense Nuclear Nonproliferation activities has decreased, while appropriations for that office’s activities have remained consistent. In contrast, appropriations for Weapons Activities account have increased substantially, while the number of federal FTEs supporting those activities has increased by about 1.5 percent. According to some NNSA officials, SSCs provide the agency with flexibility to address new work needs that are episodic or specialized. This has led NNSA offices to use SSCs more frequently with the increased available appropriations and workload for Weapons Activities while remaining within the statutory FTE cap. Starting in fiscal year 2017, NNSA reported information on SSCs in its annual congressional budget justification materials, but the information was not complete because NNSA did not include data on (1) all of its professional SSCs or (2) the number of FTE contractor personnel who worked under an SSC for more than 2 years, as required by the fiscal year 2016 NDAA. Additionally, some of the information NNSA reported was not fully useful to support congressional decision-making because it did not present the cost of SSCs in terms of obligations for 1 fiscal year and did not identify the specific appropriations accounts used to fund SSCs. The NDAAs for fiscal years 2016 and 2017 require NNSA to report annually certain information on its use of SSCs in its congressional budget justification materials. NNSA reported information on its SSCs in its annual congressional budget justification materials for fiscal years 2017 through 2020, its most recent justification. Figure 5 shows an excerpt of the SSC information NNSA reported in its fiscal year 2020 annual congressional budget justification materials. NNSA obtained data for the first six columns of the information on SSCs reported in the fiscal year 2020 congressional budget justification materials from its accounting and contracting systems, called the Standard Accounting and Reporting System (STARS) and Strategic Integrated Procurement Enterprise System (STRIPES), respectively. The vendor name column identifies the name of the contractor performing the work. The contract number and order number columns provide the unique identifier that NNSA uses for the contract. If an SSC is a task order pursuant to an indefinite delivery/indefinite quantity contract, an order number is listed; otherwise the information is listed as “Unavailable.” The fund description column identifies the funding source for the contract—either (1) “Program” funding or (2) “FSE,” the latter of which represents SSCs funded through the Federal Salaries and Expenses appropriations account, which is also referred to as program- direction funding. In a few instances, the budget justification identifies the funding source as “both”—meaning both program funding and Federal Salaries and Expenses funding was combined to fund the contract. The “obligations to date” column provides the amount that NNSA has obligated on the contract since it was awarded. The “maximum value” column provides the total amount that could be obligated on the contract through the contract term and any options. NNSA collected the data on the number of FTE contractor personnel under each SSC—presented in the last column of figure 5—manually. Each year, the Office of Acquisition and Project Management requests information from contracting officers—in collaboration with program offices, CORs, and contractor staff, if needed—on the number of FTE contractor personnel working under contracts for professional SSCs. The information that the Office of Acquisition and Project Management provided to contracting officers states that each FTE represents 2,080 hours, each full-time employee is 1 FTE, and those who are less than full- time should be a portion of an FTE. According to NNSA officials, the agency uses this methodology for reporting FTE contractor personnel because the contracts do not require vendors to use a specific number of personnel to complete the work. Rather, the contractors determine the amount of labor needed to complete the scope of work under the contract. The information that NNSA reported on its professional SSCs in its annual congressional budget justification material was not complete because NNSA did not report information on all of its professional SSCs or on the number of FTE contractor employees who worked on the contract for more than 2 years, as required by the fiscal year 2016 NDAA. Reporting this information could provide some insight into how NNSA is using its SSCs and whether any of these contracts present increased risk for performance of personal services. Among other information, the NDAA for fiscal year 2016 required NNSA to include annually in its congressional budget justification materials a report on the number of its SSCs, as of the date of the report. Rather than report the number of SSCs, NNSA reported the names of vendors in its budget justifications. In its fiscal year 2017 congressional budget justification materials, NNSA reported the names of vendors but did not list the number of contracts it awarded to each vendor. In its congressional budget justification materials for fiscal years 2018 through 2020, NNSA reported the names of vendors and the contract number for each contract with a vendor. A count of the contracts included in NNSA’s annual congressional budget justification materials for this period showed NNSA used from 127 to 152 SSCs in fiscal years 2017 through 2020. NNSA officials involved with preparing the information included in the annual congressional budget justification materials said they made decisions on which SSCs to include and which to exclude based on the statutory language. According to these officials, because the requirements in the NDAA specified that NNSA was to report the data on the number of SSCs “as of the date of the report,” the officials interpreted that to mean they should only include contracts that were active on the date they queried their accounting and contracting databases. The officials said they excluded SSCs for which the contracts expired before NNSA officials prepared the information for the annual congressional budget justification materials. To prepare the information, the officials said that they obtained data on all contracts that were active on the day they queried the database, which was in mid- to late-October. The officials said that if a contract’s performance period ended prior to that date, they did not include the contract in the annual congressional budget justification materials, even if NNSA obligated funds to the contract in that year. For example, if a professional SSC reached the end of its 5-year term on September 15, 2018, that contract would not be included in NNSA’s reporting on SSCs for fiscal year 2018. However, according to the officials, information on the contract would have been included in the annual congressional budget justification materials in the 4 prior fiscal years. Although NNSA reported on SSCs that were active as of the date the officials queried the database in its congressional budget justification materials, this information is not complete because NNSA did not report information on all of the professional SSCs to which it obligated funds in those years. According to our analysis of data from FPDS-NG, NNSA excluded from 31 to 42 contracts each year from its annual congressional budget justification materials for fiscal years 2017 through 2020. These unreported contracts accounted for from about $10 million to $31 million in obligations for SSCs each year, as shown in table 4. The SSCs NNSA reported in the annual congressional budget justification materials align with the reporting requirements in the NDAAs for fiscal years 2016 and 2017. However, this information does not provide complete information on the number of SSCs that NNSA used or for which the agency obligated funds at some point during the fiscal year and does not disclose which contracts were excluded. For each SSC that NNSA excludes from its annual congressional budget justification materials, Congress does not have information, such as the amount obligated, number of FTE contractor personnel, or funding source— information that could assist congressional decision-making about NNSA’s workforce and annual appropriations levels. By reporting information on all professional SSCs to which funds were obligated during the fiscal year in its annual congressional budget justification materials, NNSA could provide more complete information on the number of SSCs used to meet mission requirements, assisting Congress in making better informed decisions about NNSA’s annual appropriations levels. The NDAA for Fiscal Year 2016 requires NNSA to report annually in its congressional budget justification materials on the number of FTE contractor personnel who have been working under each SSC for more than 2 years. NNSA did not provide this information in its annual congressional budget justification materials for fiscal years 2017 through 2020 because, according to the budget justification materials, NNSA does not collect information on individual contractor personnel from vendors. Specifically, NNSA included statements in its annual congressional budget justification materials for fiscal years 2017 through 2020 that the agency does not have information to address this requirement and that it is the responsibility of each individual contractor to determine who will perform the scope of work required by the terms and conditions of each contract. According to NNSA’s Office of the General Counsel, NNSA does not collect information on an individual contractor’s personnel because the vendor—not NNSA—is the employer for contractor’s employees and NNSA does not want to appear as if the agency is also their employer. Additionally, NNSA officials said that the agency does not have access to the personnel systems of its vendors and would not have information on whether contractor personnel worked on a contract for more than 2 years available to include in the annual congressional budget justification materials. NNSA officials also stated that they do not want to collect the names of individual contractors, although the NDAA for fiscal years 2016 and 2017 do not require NNSA to collect or report the names of individual contractor personnel working on contracts for more than 2 years. NNSA officials currently have access to information, such as employee badge records and office organizational charts, that can be used to develop notional, or approximate, information on the number of FTE contractor personnel who have worked on an SSC for more than 2 years. For example, we reviewed current organizational charts for several NNSA organizations that included the names of SSC personnel. Additionally, NNSA officials said that they could require vendors to track and report data on FTE contractor personnel assigned to an SSC for more than 2 years to NNSA on an annual basis. However, in addition to raising concerns about the perception of being a co-employer of the contractor personnel, the officials said that this additional requirement could increase contract costs and could be an administrative burden for NNSA and the contractors. Further, NNSA officials said it would be difficult to obtain the FTE data from vendors because, among other things, vendors’ methods for calculating FTE contractor personnel may vary from contract to contract and contractor personnel may work on a contract for only part of the year. The officials said the information would therefore need to be caveated significantly and may not be reliable. We understand the challenges in collecting the information; however, Congress has not modified or eliminated this reporting requirement in statute. In addition, the FAR identifies one element that may indicate a personal services contract as a service that can reasonably be expected to last more than 1 year. In a July 2015 report, the DOE’s Inspector General identified 14 contracts out of its sample of 20 that exhibited one or more characteristics of a personal services contract. According to the report, this situation could lead observers to question NNSA’s management of its SSCs, although the report did not find any clear violations. The report also stated that the Office of Defense Programs’ self-assessment found that many contractor employees appeared to be assigned to particular organizations for multiple years. However, NNSA cannot know the number of FTE contractor personnel who have been working under each SSC for more than 2 years because it does not collect this information. By collecting the information as required by law, NNSA could provide Congress—as well as its own decision makers—with greater insight into how NNSA is using its SSCs, including whether these SSCs display any of the characteristics of personal services contracts. NNSA reported information on obligations and funding sources used for SSCs in its annual congressional budget justification materials for fiscal years 2018 through 2020. However, some of the information is not fully useful to support congressional decision-making because it presents obligations for SSCs over multiple fiscal years, instead of presenting such obligations annually, and does not identify the specific program’s appropriation accounts, such as Weapons Activities and Defense Nuclear Nonproliferation, used to fund the contracts, as required by the fiscal year 2017 NDAA. The NDAA for fiscal year 2017 directs NNSA to report annually in its congressional budget justification materials on the cost of each SSC, as of the date of the report. According to NNSA officials who prepared the information, in the absence of specific guidance from Congress on the information to report, NNSA reported the obligations to date and the maximum value for each contract in its annual congressional budget justification materials for fiscal years 2018 through 2020 (see fig. 5). According to NNSA officials, the obligations-to-date column in the annual congressional budget justification materials represents the cumulative obligations on each contract from when it was awarded through the October prior to the submission of the materials, and the maximum value column represents the maximum amount that NNSA can obligate on the contract over the contract’s base term and any options. NNSA officials told us they reported the obligations to date and maximum value of the contracts because they determined that these measures met the definition for reporting information on the cost of the contracts, as required by the NDAA. According to the officials, they determined that obligations by fiscal year did not provide the total cost of an SSC because NNSA obligates funds on SSCs over multiple years, but the officials could provide obligations data by fiscal year if directed by Congress to do so. Additionally, NNSA officials said that the NDAA did not prescribe how the information was supposed to be reported, and they made a professional judgment on how best to report it. According to DOE’s information quality guidelines, the quality of information is measured, in part, by its utility, which the guidelines defined as the usefulness of the information to intended users. Because the information on the costs of SSCs is required to be included in NNSA’s report in its annual congressional budget justification materials, the intended users of the SSC information are the congressional appropriations and authorizing committees. However, staff from the Senate and House Armed Services Committees told us that the information on the cost of SSCs in the annual congressional budget justification materials was not fully useful because NNSA reported the amounts obligated over multiple fiscal years. By reporting information in this way, the cost data are not consistent across contracts and are not consistent with other information presented in the budget justification. Specifically: Cost data are not consistent across contracts. For fiscal years 2018 through 2020, NNSA presented the data on obligations to date and maximum value of the contract without identifying the period of time included for each individual contract. This period of time, particularly for the obligations-to-date data, could vary significantly and could represent a period of a few months if the contract was awarded late in the year or multiple years if a contract was reaching the end of its term and option periods. For example, NNSA reported obligating about $3.5 million on one SSC in its fiscal year 2019 annual congressional budget justification materials. Based on our analysis, NNSA obligated this amount over 4 years in amounts ranging from about $170,000 to about $1.2 million per year. Cost data are not consistent with other information in the budget justification. Other information in the annual congressional budget justification materials—which is used to support annual appropriations decisions or the budget request for the coming year—is subject to requirements in OMB’s Circular A-11, which states that agencies should generally present financial information in terms of budgetary resources by year in the annual congressional budget justification materials. As presented, users of the annual congressional budget justification materials could be unintentionally misled by the information that NNSA reported on its SSCs. For example, NNSA reported in its annual congressional budget justification materials for fiscal year 2020 that the maximum contract value for its SSCs in fiscal year 2018 totaled about $824 million and included 884 FTE contractor personnel, as shown in figure 5. Although the columns are labelled appropriately, users of the annual congressional budget justification materials could misinterpret the information to include obligations over a single year, and the user could—incorrectly—assume that NNSA spent an average of about $930,000 per contractor FTE. The NDAA for Fiscal Year 2016 directs NNSA to report annually in its congressional budget justification materials whether program or program- direction funds supported each SSC as of the date of the report. NNSA identified whether it funded each SSC through “program” or “Federal Salaries and Expenses” (which is program direction) accounts in its congressional budget justification materials for fiscal years 2017 through 2020 and totaled the cost data—which, as discussed earlier, represent multiple fiscal years of contract obligations—included in the table across all reported contracts (see fig. 5). As previously discussed, according to DOE’s information quality guidelines, quality information is measured by the usefulness of the information to the intended users. Staff from the Senate and House Armed Services Committees told us that the information on the funding source reported in the annual congressional budget justification materials was not fully useful because the budget justifications did not specify which program appropriation account—“Weapons Activities” or “Defense Nuclear Nonproliferation”—NNSA used to fund the SSCs and did not total the obligations by funding source. According to NNSA officials, they reported what was required by law. The NDAA directs NNSA to identify the funding source—either program or program direction accounts—for each SSC but does not specify that NNSA must report on the specific appropriations account or total the amount obligated by account. Based on our analysis of FPDS-NG data, NNSA’s obligations to SSCs varied significantly across the three appropriations accounts. For example, in fiscal year 2018, 84 percent of NNSA’s obligations for SSCs (about $162 million of the $194 million obligated for SSCs in that year) were from program appropriations and 15 percent (over $29 million) were from the Federal Salaries and Expenses account (see fig. 6). Of the amounts obligated for SSCs from program accounts in fiscal year 2018, 65 percent were from the Weapons Activities account, with the remaining 35 percent from the Defense Nuclear Nonproliferation account. These amounts represent about 1 percent of the total appropriations for Weapons Activities and about 3 percent for Defense Nuclear Nonproliferation. NNSA is reporting whether program or program direction funds support the contracts, as required. As previously discussed, NNSA guidance states that offices should use program funding for SSCs that produce deliverables and short-term, specific program-related technical support. However, by reporting in NNSA’s annual congressional budget justification materials the specific program appropriations account— Weapons Activities or Defense Nuclear Nonproliferation—used to fund each SSC and totaling the amounts obligated by appropriations account, NNSA would have more reasonable assurance that Congress had insight into which programs the SSCs supported. This reporting could facilitate congressional oversight of NNSA’s use of funds for SSCs by account and could assist NNSA in workforce planning should Congress reevaluate its FTE cap. NNSA identifies SSCs that are more likely to have the potential of including inherently governmental functions in its input to DOE’s annual service contract inventory analysis and its determination forms, but the agency may not be effectively managing the potential risks of SSCs that it determines may include such functions. The Consolidated Appropriations Act, 2010, requires civilian agencies to submit to OMB annual inventories of their service contracts. According to OMB guidance, the service contract inventory is a tool to assist an agency in better understanding how contracted services are being used to support mission and operations. NNSA’s input to DOE’s annual service contract inventory for fiscal years 2015 through 2017 identified a significant number of SSCs that included functions that approached being inherently governmental. For example, NNSA’s 2017 inventory analysis reported that contract specialists identified 621 of 775 contract actions, totaling over $170 million in obligations in that year, that were more likely to have the potential to include inherently governmental functions. The analysis identified 194 contract actions as closely associated with inherently governmental functions, 10 as critical functions, and 51 as both closely associated with inherently governmental functions and related to critical functions. Based on our analysis of data in FPDS-NG for fiscal year 2018, NNSA identified 37 of its 166 professional SSCs as closely associated with inherently governmental functions and 4 contracts as related to critical functions. Additionally, as discussed previously, prior to awarding an SSC, officials in the office for which the SSC will provide services and the contracting officer fill out a determination form that includes questions about whether the draft performance work statement includes tasks related to the parts of the FAR that identify inherently governmental functions and functions that can approach being inherently governmental. Tasks included in the performance work statements for SSCs vary widely and could present unique risks for including inherently governmental functions. The purpose of the determination form is to mitigate the risk of awarding an SSC that includes inherently governmental functions. The determination forms include a statement that, among other things, the agency has sufficient capacity and capability to give special management attention to contractor performance, limit or guide the contractor’s exercise of discretion, and avoid or mitigate conflicts of interest. To better understand how NNSA manages the risks of SSCs including inherently governmental functions, we reviewed the performance work statements for SSCs in our sample and, for contracts that had the potential to include inherently governmental functions, discussed how the contracting officials oversee contracts. For one contract we reviewed, the performance work statement called for the contractor to award contracts on behalf of NNSA with foreign organizations and review deliverables and technical performance. The FAR lists awarding contracts and administering contracts as two examples of functions considered to be inherently governmental. The contracting officials overseeing this contract said they do not typically see such a task in a performance work statement but noted that the contract was originally awarded in 2012, prior to those officials’ oversight of the contract. Contract oversight can change throughout the life of a contract—which can extend to 5 years and beyond—and the contracting officials assigned to manage an SSC can change throughout the contract. The contracting officials also told us that they were not concerned that the contract could include inherently governmental functions, as the program office supported by this contract was heavily involved in the activity. The FAR, however, states that awarding contracts and administering contracts are considered to be inherently governmental functions. In another contract we reviewed, the performance work statement included activities that, among other things, involved contractors conducting annual visits to a foreign country to meet and confer with military and governmental officials to develop opportunities for greater access by NNSA to foreign officials. The FAR lists the conduct of foreign relations and the determination of foreign policy among functions considered to be inherently governmental. The contracting officials for the contract said that the program office reviews information to be presented during the visits in advance of the meetings and that federal officials attend some of the meetings, allowing NNSA to ensure that the functions performed by the contractor do not become inherently governmental. In 2011, the Office of Federal Procurement Policy issued a policy letter that states agencies should review, on an ongoing basis, the functions being performed by their contractors, paying particular attention to the way in which contractors are performing, and agency personnel are managing, contracts involving functions that are closely associated with inherently governmental functions and contracts involving critical functions. According to the policy letter, these reviews should be conducted in connection with the development and analysis of inventories of service contracts. The policy letter also calls for agencies to ensure that they have sufficient internal capability to control their missions and operations. Additionally, according to the Consolidated Appropriations Act, 2010, after submitting the service contract’s inventories, the agency must review the contracts and information in the inventory and ensure that, among other things: the agency is giving special management attention to functions that are closely associated with inherently governmental functions; the agency is not using contractor employees to perform inherently governmental functions; the agency has specific safeguards and monitoring systems in place to ensure that work that contractors are performing has not changed or expanded during performance to become an inherently governmental function; the agency is not using contractor employees to perform critical functions in such a way that could affect the agency’s ability to maintain control of its mission and operations; and there are sufficient internal agency resources to manage and oversee contracts effectively. DOE’s service contract inventory analysis for fiscal year 2017 stated that NNSA offers training on inherently governmental contracts on a periodic basis and also uses the determination form, which is completed before the contract is awarded, to ensure that all contracts with inherently governmental potential receive proper attention. However, these steps may not allow NNSA to effectively manage the potential risks of contractors performing inherently governmental functions throughout the life of the contract. First, officials complete the required determination forms prior to awarding an SSC, and NNSA does not take steps to ensure that contracting officers document the steps that they plan to take to oversee specific SSCs, including those the agency determined carry a risk for the performance of inherently governmental functions. This is, in part, because the determination form does not require the contracting officers to include such information on the form. By documenting on the determination form specific steps that the contracting officer plans to take to address the risks of the particular contract, NNSA can better ensure that the functions contractors are performing and the way they perform them do not evolve into inherently governmental functions. Second, NNSA has no process—in connection with the development and assessment of the service contract inventory or another process—to verify that contracting officers are performing planned oversight. Under federal internal control standards, management should design control activities to achieve objectives and respond to risks, such as by comparing actual performance to planned or expected results and analyzing significant differences. By developing a process to verify that the contracting officer has implemented the planned oversight steps for SSCs that have a high risk of including inherently governmental functions throughout the term of the contract, NNSA would have better assurance that planned oversight was being carried out. Taking these actions could also help NNSA better ensure that planned oversight steps continue, even if the contracting officer or other oversight official changes during the term of the contract. Since 2010, NNSA has increasingly used professional SSCs across the agency to meet the demands of its increasing workload at a time when the size of its federal workforce has decreased. However, the use of SSCs can also prove challenging, as many of the services categorized as professional and management may be closely aligned with inherently governmental functions, increasing the risk that contractors may inappropriately influence the government’s authority, control, and accountability for decisions. We identified four ways NNSA could improve the completeness and usefulness of its reporting on its SSCs in its annual congressional budget justification materials. Such efforts could assist with congressional decision-making. First, NNSA did not include data on all professional SSCs to which funds were obligated during the fiscal year. By including such data, NNSA could provide more complete information on the number of SSCs used to meet mission requirements, assisting Congress in making better informed decisions about NNSA’s annual appropriations levels. Second, NNSA did not report information on the number of FTE contractor personnel working under the same contract for more than 2 years. NNSA officials identified difficulties in collecting the information. Collecting the information, as required by law, could provide Congress and NNSA’s own decision-makers with greater insight into how NNSA is using its SSCs. Third, NNSA did not present the cost of its SSCs in terms of obligations for 1 fiscal year. By reporting annual obligations data for each SSC, NNSA could more accurately represent its annual budgetary needs for the support needed to perform its missions. Fourth, NNSA did not identify the specific appropriations accounts used to fund SSCs. By identifying such accounts, NNSA would have more reasonable assurance that Congress had insight into which programs the SSCs supported, facilitating congressional oversight of NNSA’s use of funds for SSCs by account and assisting NNSA in workforce planning should Congress reevaluate NNSA’s FTE cap. Additionally, we identified two ways that NNSA could better manage the potential risks of contractors performing inherently governmental functions over the life of a contract. First, NNSA has not taken steps to ensure that contracting officers document the steps that they plan to take to oversee SSCs identified as at high risk of including inherently governmental functions on the determination forms. Second, NNSA does not have a process to verify that contracting officers are performing planned oversight for contracts that NNSA has identified as more likely to have the potential of including inherently governmental functions. By taking steps to document and verify that contracting officers have implemented the planned oversight steps for SSCs that may include inherently governmental functions throughout the term of the contract, NNSA would have better assurance that planned oversight was being carried out. We are making the following six recommendations to NNSA: The Associate Administrator for Acquisition and Project Management should report information on all professional SSCs to which funds were obligated during the fiscal year in its annual congressional budget justification materials. (Recommendation 1) The Associate Administrator for Acquisition and Project Management should collect and report all required data regarding the number of FTE contractor personnel employed under an SSC for more than 2 years. (Recommendation 2) The Associate Administrator for Acquisition and Project Management, in coordination with NNSA’s Office of Management and Budget, as appropriate, should report annual obligations data by fiscal year, as part of its reporting on SSCs in annual congressional budget justification materials. (Recommendation 3) The Associate Administrator for Acquisition and Project Management should report in NNSA’s annual congressional budget justification materials the program appropriations account—Weapons Activities or Defense Nuclear Nonproliferation—used to fund each SSC and total the amounts obligated by appropriations account. (Recommendation 4) The Associate Administrator for Acquisition and Project Management should take steps to ensure that contracting officers document—in the required determination form or elsewhere in the contract file—information on the steps that the contracting officers plan to take to oversee SSCs that NNSA has determined to be at high risk of including inherently governmental functions. (Recommendation 5) The Associate Administrator for Acquisition and Project Management should develop a process to verify that contracting officers are carrying out the steps identified to oversee contracts at risk of including inherently governmental functions throughout the term of the contract. (Recommendation 6) We provided a draft of this report to NNSA for review and comment. In its written comments, which are reproduced in full in appendix II, NNSA generally agreed with the report’s six recommendations and described actions that it intends to take in response to them. With regard to the second recommendation to collect and report required data on the number of full-time equivalent contractor personnel employed under an SSC for more than 2 years, we recognize the difficulties in collecting this information and appreciate that the agency intends to meet with congressional staff to discuss ways to address this issue. We continue to believe that collecting this information will provide NNSA and congressional decision-makers with greater insight into how NNSA uses its SSCs, including whether these SSCs display any of the characteristics of personal services contracts. With regard to the fifth recommendation to take steps to ensure that contracting officers document information on the steps the contracting officers plan to take to oversee SSCs that are determined to be at high risk of including inherently governmental functions, NNSA stated that it considers the recommendation closed based on processes already in place as well as the complementary activities discussed in response to our sixth recommendation. We continue to believe that documenting planned oversight activities in the contract files is important to ensure that planned oversight is consistent throughout the duration of the contract, particularly in light of OMB’s call for agencies’ ongoing review of the functions performed by its contractors and the potential for contracting officers to change over the life of the contract. The agency also provided technical comments, which we incorporated into our report, as appropriate. We are sending copies of this report to appropriate congressional committees, the Administrator of NNSA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or bawdena@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines the extent to which: (1) the National Nuclear Security Administration (NNSA) used professional support service contracts (SSC) in fiscal years 2010 through 2018, (2) the information about SSCs in NNSA’s annual congressional budget justification materials for fiscal years 2017 through 2020 is complete and useful to support congressional decision-making, and (3) NNSA manages the potential risks of SSCs that it determines are at high risk for providing inherently governmental functions. Overall, our review focused on NNSA’s use of professional SSCs. For the purposes of this report, we define professional SSCs to include contracts for activities such as program management support, administrative assistance, technical assistance, and engineering and technical services, consistent with NNSA’s definition of professional SSCs used to report the required information in its annual congressional budget justification materials. We excluded NNSA’s Office of Naval Reactors from our review because it is managed as a separate entity within NNSA. To address the first objective, we obtained and analyzed data on NNSA’s professional SSCs for fiscal years 2010 through 2018 from the Federal Procurement Data System –Next Generation (FPDS-NG), including the contract number, the amounts obligated to the contract in the fiscal year, the funding source, and the product service code assigned to the contract. We performed electronic testing of the data to identify missing data, obvious errors, or outliers and reviewed documentation and determined the data were sufficiently reliable to summarize the number of SSCs, amounts obligated, funding sources, and product service codes for NNSA’s SSCs in fiscal years 2010 through 2018. Unless otherwise specified, we report dollar figures as current dollars. In selected places, we also report inflation-adjusted dollars that are in constant 2018 dollars and were computed using a gross domestic product price deflator. To determine the kinds of tasks for which NNSA used its SSCs, we reviewed performance work statements for a nongeneralizable sample of 12 contracts. We selected contracts from the 407 SSCs NNSA reported in its annual congressional budget justification materials for fiscal years 2017 through 2019. We selected contracts that ranged in award amounts and represented work performed for different NNSA offices. In addition, to understand changes in NNSA’s use of SSCs, we analyzed data on NNSA’s appropriations and the number of federal full-time equivalent (FTE) employees for fiscal years 2010 through 2018. NNSA provided data on FTEs as of the last day of the last pay period of each fiscal year. We did not include federal FTE data by program office prior to fiscal year 2013 because NNSA restructured the organization, and the organizational structure prior to 2013 was not comparable to the current organization structure. We reviewed the data for obvious errors or outliers and compared the federal FTE data to other sources and discussed the data with officials and determined the data were sufficiently reliable to show changes in the size of NNSA’s work force over the time period. We also obtained and analyzed data by program office on the number of FTE contractor personnel from fiscal years 2015 through 2018. According to an NNSA official, NNSA did not collect data on FTE contractor personnel prior to fiscal year 2015. We reviewed the data for obvious errors or outliers and interviewed NNSA officials knowledgeable about the process to collect the data and NNSA officials that completed an internal study that, among other things, independently collected and verified the number of FTE contractor personnel by program office. Although we identified that NNSA did not report data on all of its SSCs, we determined the data were sufficiently reliable to illustrate changes in the number of FTE contractor personnel by program office for fiscal years 2015 through 2018. Further, to determine how NNSA uses its SSCs, we also reviewed two NNSA workforce studies and interviewed agency officials in program offices that used SSCs in fiscal years 2015 through 2018. To address the second objective, we compared the information on SSCs in NNSA’s annual congressional budget justification materials for fiscal years 2017 through 2020 with the requirements in the NDAA for fiscal years 2016 and 2017. We also reviewed documentation and interviewed NNSA officials from the Office of Acquisition and Project Management to determine how they prepared the information included in the annual congressional budget justification materials. We compared NNSA’s process for reporting information on SSCs to DOE’s information quality guidelines, particularly the sections related to completeness and usefulness of the information. Additionally, we compared the data on SSCs included in NNSA’s annual congressional budget justification materials to data in FPDS-NG to determine whether NNSA included all of its SSCs in the budget justification. To perform this analysis, we obtained data from FPDS-NG on all of NNSA’s active SSCs for fiscal years 2015 through 2018. We assessed the reliability for these data as described previously. For each fiscal year, we included only the SSCs that met NNSA’s definition of professional SSCs using the 77 product service codes. We also removed from the data any contracts listed that had $0 obligations or negative obligations for the fiscal year. For the remaining contracts, we compared the task order or contract numbers included in the FPDS-NG data to the task order or contract numbers that NNSA reported in its annual congressional budget justification materials. For those contracts where there was not a match between the annual congressional budget justification materials data and the FPDS-NG data on the task order or contract number, we reviewed the data manually to ensure there was not an error in the formula used or an error in the data that was easily identifiable, such as a transposed or missing digit in the task order or contract number. We discussed the list of contracts that was not included in NNSA’s annual congressional budget justification materials with officials responsible for the reporting to determine why the contracts were excluded. To address the third objective, we reviewed documents, such as applicable Federal Acquisition Regulation (FAR) provisions and NNSA policy documents, and interviewed officials from NNSA’s Office of Acquisition and Project Management, Office of Management and Budget, and Office of General Counsel to determine how NNSA oversees its SSCs. We also reviewed performance work statements for the nongeneralizable sample of 12 contracts discussed above to identify oversight activities and determine whether they included examples of tasks that could have characteristics of inherently governmental functions. We reviewed determination forms for eight of the 12 SSCs in our sample for which NNSA could provide the forms. We also interviewed NNSA’s contracting officers or contracting officer’s representatives and representatives from 11 of the 12 contractors in our sample to learn how NNSA and the contractors manage the contracts. When referring to the findings from these interviews, we use “some” to refer to 3 to 4 interviews, “several” to refer to 5 to 6 interviews, “many” to refer to 7 to 9 interviews, and “most” to refer to 10 to 11 interviews. In addition, we reviewed NNSA’s service contract inventory analysis reports from fiscal years 2015 through 2017 to obtain information on contracts that NNSA had identified as having the potential to include inherently governmental functions. We conducted this performance audit from October 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Hilary Benedict (Assistant Director); Bridget Grimes (Analyst in Charge); Ellen Fried; Cindy Gilbert; Elizabeth Jimenez; Julia Kennon; Dan C. Royer; Sylvia Schatz; and Tatiana Winger made key contributions to this report.", "summary": "The Department of Energy's NNSA relies on federal employees and contractor personnel to carry out its mission. SSCs fill essential needs, and their use requires special diligence to ensure applicable statutes, regulations, and management practices are followed. The House report on the National Defense Authorization Act for Fiscal Year 2018 included a provision for GAO to report on NNSA's use of SSCs. This report examines the extent to which: (1) NNSA used SSCs for professional support in fiscal years 2010 through 2018; (2) the information about SSCs in NNSA's annual congressional budget justification materials for fiscal years 2017 through 2020 is complete and useful to support congressional decision-making; and (3) NNSA manages the potential risks of SSCs that it determines are at high risk for providing inherently governmental functions. GAO analyzed agency data; reviewed documentation; and interviewed federal and contractor officials representing a non-generalizable sample of 12 SSCs out of 407, selected to represent a range of years and contract obligations. The National Nuclear Security Administration (NNSA) obligated about $193 million in fiscal year 2018 for support service contracts (SSC), an increase of nearly 40 percent since 2010. These contracts provide a variety of professional support services, such as program management support. Officials attribute the increased use of SSCs to increases in appropriations and workload for the modernization of nuclear weapons and related infrastructure and decreases in the number of authorized federal staff due to the decrease in the statutory cap from fiscal year 2014 to 2015. Information on SSCs in NNSA's congressional budget justification materials is not complete or fully useful for congressional decision-making because, among other things, NNSA did not include information on all of its professional SSCs. NNSA is required to report annually certain information about SSCs, including the number and cost of SSCs, in its materials. NNSA reported information on its SSCs in its materials for fiscal years 2017 through 2020. However, NNSA's reporting was not complete because NNSA excluded information on 31 to 42 contracts each year (see fig. for fiscal year 2020). According to officials, they excluded contracts that expired during the fiscal year. By reporting information on all professional SSCs to which funds were obligated during the fiscal year, NNSA could provide more complete information to Congress that it could use to make better informed decisions about NNSA's annual appropriations levels. NNSA may not be effectively managing the potential risks of contractors performing inherently governmental functions—those that must be performed by a government employee—for contracts NNSA identifies as having the potential for providing such functions. NNSA identifies such SSCs through required assessments. However, contracting officers are not required to document planned steps to oversee these contracts, and the agency does not verify that planned oversight is performed. Contracting officers who oversee SSCs can change during the life of a contract. By documenting steps that contracting officers plan to take to oversee contracts with a high risk of including inherently governmental functions—and verifying that the planned oversight occurs—NNSA can better ensure over the life of the contract that the functions contractors are performing do not evolve into inherently governmental functions and that planned oversight is completed. GAO is making six recommendations to NNSA, including that NNSA: (1) report information on all professional SSCs to which funds were obligated during the fiscal year; (2) document plans to oversee SSCs that have a high risk of including inherently governmental functions, and (3) verify that the planned oversight occurs. NNSA generally agreed with the recommendations.", "document_type": "gao"}
{"report": "In April 2018, Facebook disclosed that a Cambridge University researcher may have improperly shared the data of up to 87 million of Facebook’s users with a political consulting firm. This followed other incidents in recent years involving the misuse of consumers’ personal information from the Internet, which about three-quarters of Americans use. These types of incidents have raised public concern because Internet-based services and products, which are essential for everyday social and economic purposes, often collect and use various forms of personal information that could cause users harm if released. The federal privacy framework for private-sector companies is comprised of a set of tailored laws that govern the use and protection of personal information for specific purposes, in certain situations, or by certain sectors or types of entities. Such laws protect consumers’ personal information related to their eligibility for credit, financial transactions, and personal health, among other areas. We reported in 2013 that no overarching federal privacy law governs the collection and sale of personal information among private-sector companies, including information resellers—companies that collect and resell information on individuals. We found that gaps exist in the federal privacy framework, which does not fully address changes in technology and the marketplace. We recommended that Congress consider legislation to strengthen the consumer privacy framework to reflect the effects of changes in technology and the marketplace. Such legislation has not been enacted. As we reported in January 2019, FTC is primarily a law enforcement agency with authority to, among other things, address consumer concerns about Internet privacy, both for Internet service providers and content providers. It does so using its general authority under section 5 of the FTC Act, which prohibits “unfair or deceptive acts or practices in or affecting commerce.” Even though the FTC Act does not speak in explicit terms about protecting consumer privacy, the Act authorizes such protection to the extent it involves practices FTC defines as unfair or deceptive. According to FTC, an act or practice is “unfair” if it causes, or is likely to cause, substantial injury not reasonably avoidable by consumers and not outweighed by countervailing benefits to consumers or competition as a result of the practice. FTC has used this “unfairness” authority to address situations where a company has allegedly failed to properly protect consumers’ data, for example. According to FTC, a representation or omission is “deceptive” if it is material and is likely to mislead consumers acting reasonably under the circumstances. FTC has applied this “deceptiveness” authority to address deceptions related to violations of written privacy policies and representations concerning data security, for example. FTC staff investigate Internet privacy complaints from various sources and also initiate investigations on their own. If FTC staff have reason to believe that an entity is engaging in an unfair or deceptive practice, they may forward an enforcement recommendation to the commission. The commission then determines whether to pursue an enforcement action. With certain exceptions, FTC generally cannot directly impose civil monetary penalties for Internet privacy cases. Instead, FTC typically addresses Internet privacy cases by entering into settlement agreements requiring companies to take actions such as implementing reasonable privacy and security programs. If a company then violates its settlement agreement with FTC, the agency can request civil monetary penalties in court for the violations. In addition, FTC can seek to impose civil monetary penalties directly for violations of certain statutes and their implementing regulations, such as the statute pertaining to the Internet privacy of children and its corresponding regulations. FTC has not promulgated rules under section 5 specific to Internet privacy. According to FTC staff, the process the agency must use to issue such rules—known as the Magnuson-Moss procedures—includes steps that add time and complexity to the rulemaking process. FTC has not promulgated any regulations using the Magnuson-Moss procedures since 1980. Although FTC has not implemented its section 5 authority by issuing regulations regarding internet privacy, it has issued regulations when directed and authorized by Congress to implement other statutory authorities using a different set of rulemaking procedures. These procedures, spelled out in section 553 of the Administrative Procedures Act (APA), are those that most federal agencies typically use to develop and issue regulations. APA section 553 establishes procedures and requirements for what is known as “informal” rulemaking, also known as notice-and-comment rulemaking. Among other things, section 553 generally requires agencies to publish a notice of proposed rulemaking in the Federal Register. After giving interested persons an opportunity to comment on the proposal by providing “data, views, or arguments,” the statute then requires the agency to publish the final rule in the Federal Register. In contrast, the rulemaking procedures that FTC generally must follow to issue rules under the FTC Act are the Magnuson-Moss procedures noted above. These are required by the Magnuson-Moss Warranty Act amendments to the FTC Act and impose additional rulemaking steps beyond APA section 553. These steps include providing the public and certain congressional committees with an advance notice of proposed rulemaking (in addition to the notice of proposed rulemaking). FTC’s rulemaking under Magnuson-Moss also calls for, among other things, oral hearings, if requested, presided over by an independent hearing officer, and preparation of a staff report after the conclusion of public hearings, giving the public the opportunity to comment on the report. FTC has promulgated regulations using the APA section 553 notice-and- comment rulemaking procedures when authorized or directed by specific statutes. For example, the 1998 Children’s Online Privacy Protection Act (COPPA) required FTC to issue regulations concerning children’s online privacy; promulgate these regulations using the APA section 553 process; and, in determining how to treat a violation of the rules, to treat it as an unfair or deceptive act or practice in most cases. COPPA governs the online collection of personal information from children under the age of 13 by operators of websites or online services, including mobile applications. COPPA contained a number of specific requirements that FTC was directed to implement by regulation, such as requiring websites to post a complete privacy policy, to notify parents directly about their information collection practices, and to obtain verifiable parental consent before collecting personal information from their children or sharing it with others. Laws and regulations may be enforced in various ways, for example, by seeking civil monetary penalties for non-compliance. As mentioned, FTC has authority to seek civil monetary penalties when a company violates a settlement agreement or certain statutes or regulations. For example, in March 2018, FTC announced that it is investigating whether Facebook’s current privacy practices violate a settlement agreement that the company entered into with FTC. In the case that resulted in the 2012 settlement, FTC had charged Facebook with deceiving consumers by telling them they could keep their information private, but then allowing it to be shared and made public. FTC also has authority to seek civil monetary penalties for violations of the COPPA statute as well as FTC’s COPPA regulations. In our January 2019 Internet privacy report, we found that during the last decade, FTC filed 101 Internet privacy enforcement actions to address practices that the agency alleged were unfair, deceptive, a violation of COPPA, a violation of a settlement agreement, or a combination of those reasons. Most of these actions pertained to first-time violations of the FTC Act for which FTC does not have authority to levy civil monetary penalties. In nearly all 101 cases, companies settled with FTC, which required the companies to make changes in their policies or practices as part of the settlement. Various stakeholders we interviewed for our January 2019 Internet privacy report said that opportunities exist for enhancing Internet privacy oversight. Most industry stakeholders said they favored FTC’s current approach—direct enforcement of its unfair and deceptive practices statutory authority, rather than promulgating and enforcing regulations implementing that authority. These stakeholders said that the current approach allows for flexibility; that regulations could hinder innovation, create loopholes, and become obsolete; and that rulemakings can be lengthy. Other stakeholders, including consumer advocates and most former FTC and FCC commissioners we interviewed, favored having FTC issue and enforce regulations. Stakeholders said that regulations can provide clarity, flexibility, and act as a deterrent, and may also promote fairness by giving companies notice of what actions are prohibited. Those stakeholders who believe that FTC’s current authority and enforcement approach is unduly limited identified three main actions that could better protect Internet privacy: (1) enactment of an overarching federal privacy statute to establish general requirements governing Internet privacy practices of all sectors, (2) APA section 553 notice-and- comment rulemaking authority, and (3) civil penalty authority for any violation of a statutory or regulatory requirement, rather than allowing penalties only for violations of settlement agreements or consent decrees that themselves seek redress for a previous statutory or regulatory violation. Stakeholders from a variety of perspectives—including academia, industry, consumer advocacy groups, and former FTC and FCC commissioners—told us that a statute could enhance Internet privacy oversight by, for example, clearly articulating to consumers, industry, and privacy enforcers what behaviors are prohibited. Some stakeholders suggested that such a framework could either designate an existing agency (such as FTC) as responsible for privacy oversight or create a new agency. For example, in Canada, the Office of the Privacy Commissioner, an independent body that reports directly to the Parliament, was established to protect and promote individuals’ privacy rights. Some stakeholders also stated that the absence of a comprehensive Internet privacy statute affects FTC’s enforcement. For example, a former federal enforcement official from another oversight agency said that FTC is limited in how it can use its authority to take action against companies’ unfair and deceptive trade practices for problematic Internet privacy practices. Similarly, another former federal enforcement official from another agency said that FTC is limited in how and against whom it can use its unfair and deceptive practices authority noting, for example, that it cannot pursue Internet privacy enforcement against exempted industries. In addition, some stakeholders said FTC’s section 5 unfair and deceptive practices authority may not enable it to fully protect consumers’ Internet privacy because it can be difficult for FTC to establish that Internet privacy practices are legally unfair. Because of this difficulty, some stakeholders said that FTC relies more heavily on its authority to take enforcement action against deceptive trade practices compared with the agency’s unfair trade practices authority. This is consistent with the results of our analysis of FTC cases, which showed that in a majority of the actions FTC settled, FTC alleged that companies engaged in practices that were deceptive. Furthermore, a recently decided federal appeals court case illustrates potential limits on FTC’s enforcement remedies. The court found that FTC could not direct the company, which was accused of unfair practices, to create and implement comprehensive data security measures for the personal information the company stored on its computer networks as a remedy for the practices alleged. Instead, the court ruled that FTC’s authority was limited to prohibiting specific illegal practices. Various stakeholders said that there are advantages to overseeing Internet privacy with a statute that provides APA section 553 notice-and- comment rulemaking authority. Officials from other consumer and worker protection agencies we interviewed described their enforcement authorities and approaches. For example, officials from CFPB and FDA, both of which use APA section 553 notice-and-comment rulemaking, said that their rulemaking authority assists in their oversight approaches and supports their enforcement actions. EEOC officials said that regulations are used to guide investigations that establish whether enforcement action is appropriate. Some stakeholders suggested that FTC’s ability to levy civil penalties could also be enhanced. As noted, FTC can levy civil penalties against companies for violating certain regulations, such as COPPA regulations, or for violating the terms of a settlement agreement already in place. According to most former FTC commissioners and some other stakeholders we interviewed, FTC should be able to levy fines for initial violations of section 5 of the FTC Act. An academic told us that the power of an agency to levy a fine is a tangible way to hold industries accountable. Recent data breaches at federal agencies, retailers, hospitals, insurance companies, consumer reporting agencies, and other large organizations highlight the importance of ensuring the security and privacy of personally identifiable information collected and maintained by those entities. Such breaches have resulted in the potential compromise of millions of Americans’ personally identifiable information, which could lead to identity theft and other serious consequences. For example, the breach of an Equifax online dispute portal from May to July 2017 resulted in the compromise of records containing the personally identifiable information of at least 145.5 million consumers in the United States and nearly 1 million consumers outside the United States. We reported in August 2018 that Equifax’s investigation of the breach identified four major factors— identification, detection, segmenting of access to databases, and data governance—that allowed the attacker to gain access to its network and extract information from databases containing personally identifiable information. In September 2017, FTC and CFPB, which both have regulatory and enforcement authority over consumer reporting agencies such as Equifax, initiated an investigation into the breach and Equifax’s response. Their investigation is ongoing. According to a 2017 National Telecommunications and Information Administration (NTIA) survey conducted by the U.S. Census Bureau, 24 percent of American households surveyed avoided making financial transactions on the Internet due to privacy or security concerns. NTIA’s survey results show that privacy concerns may lead to lower levels of economic productivity if people decline to make financial transactions on the Internet. Consumers who were surveyed indicated that their specific concerns were identity theft, credit card or banking fraud, data collection by online services, loss of control over personal information, data collection by government, and threats to personal safety. Recent data breaches and developments regarding Internet privacy suggest that this is an appropriate time for Congress to consider what additional actions are needed to protect consumer privacy, including comprehensive Internet privacy legislation. Although FTC has been addressing Internet privacy through its unfair and deceptive practices authority and FTC and other agencies have been addressing this issue using statutes that target specific industries or consumer segments, the lack of a comprehensive federal privacy statute leaves consumers’ privacy at risk. Comprehensive legislation addressing Internet privacy that establishes specific standards and includes APA notice-and-comment rulemaking and first-time violation civil penalty authorities could enhance the federal government’s ability to protect consumer privacy, provide more certainty in the marketplace as companies innovate and develop new products using consumer data, and provide better assurance to consumers that their privacy will be protected. In our January 2019 report, we recommended that Congress consider developing comprehensive legislation on Internet privacy that would enhance consumer protections and provide flexibility to address a rapidly evolving Internet environment. Issues that should be considered include: which agency or agencies should oversee Internet privacy; what authorities an agency or agencies should have to oversee Internet privacy, including notice-and-comment rulemaking authority and first-time violation civil penalty authority; and how to balance consumers’ need for Internet privacy with industry’s ability to provide services and innovate. Chairman Portman, Ranking Member Carper, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. For further information regarding this testimony, please contact Alicia Puente Cackley at (202) 512-8678 or cackleya@gao.gov or Mark Goldstein at (202) 512-2834 or goldsteinm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony include Andrew Huddleston, Assistant Director; Kay Kuhlman, Assistant Director; Bob Homan, Analyst-in-Charge; Melissa Bodeau; John de Ferrari; Camilo Flores; Nick Marinos, and Sean Standley. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "This testimony summarizes the information contained in GAO's January 2019 report, entitled Internet Privacy: Additional Federal Authority Could Enhance Consumer Protection and Provide Flexibility ( GAO-19-52 ). cackleya@gao.gov goldsteinm@gao.gov The United States does not have a comprehensive Internet privacy law governing the collection, use, and sale or other disclosure of consumers' personal information. At the federal level, the Federal Trade Commission (FTC) currently has the lead in overseeing Internet privacy, using its statutory authority under the FTC Act to protect consumers from unfair and deceptive trade practices. However, to date FTC has not issued regulations for Internet privacy other than those protecting financial privacy and the Internet privacy of children, which were required by law. For FTC Act violations, FTC may promulgate regulations but is required to use procedures that differ from traditional notice-and-comment processes and that FTC staff said add time and complexity. In the last decade, FTC has filed 101 enforcement actions regarding Internet privacy; nearly all actions resulted in settlement agreements requiring action by the companies. In most of these cases, FTC did not levy civil penalties because it lacked such authority for those particular violations. The Federal Communications Commission (FCC) has had a limited role in overseeing Internet privacy. From 2015 to 2017, FCC asserted jurisdiction over the privacy practices of Internet service providers. In 2016, FCC promulgated privacy rules for Internet service providers that Congress later repealed. FTC resumed privacy oversight of Internet service providers in June 2018. Stakeholders GAO interviewed had varied views on the current Internet privacy enforcement approach and how it could be enhanced. Most Internet industry stakeholders said they favored FTC's current approach—direct enforcement of its unfair and deceptive practices statutory authority, rather than promulgating and enforcing regulations implementing that authority. These stakeholders said that the current approach allows for flexibility and that regulations could hinder innovation. Other stakeholders, including consumer advocates and most former FTC and FCC commissioners GAO interviewed, favored having FTC issue and enforce regulations. Some stakeholders said a new data-protection agency was needed to oversee consumer privacy. Stakeholders identified three main areas in which Internet privacy oversight could be enhanced: Statute . Some stakeholders told GAO that an overarching Internet privacy statute could enhance consumer protection by clearly articulating to consumers, industry, and agencies what behaviors are prohibited. Rulemaking . Some stakeholders said that regulations can provide clarity, enforcement fairness, and flexibility. Officials from two other consumer protection agencies said their rulemaking authority assists in their oversight efforts and works together with enforcement actions. Civil penalty authority. Some stakeholders said FTC's Internet privacy enforcement could be more effective with authority to levy civil penalties for first-time violations of the FTC Act. Comprehensive Internet privacy legislation that establishes specific standards and includes traditional notice-and-comment rulemaking and broader civil penalty authority could enhance the federal government's ability to protect consumer privacy.", "document_type": "gao"}
{"report": "Information on consumers is exchanged through a consumer reporting process that includes consumers, CRAs, furnishers of consumer information, and users of consumer reports (see fig. 1). Consumers are individuals whose information is collected by CRAs and shared by CRAs with users of consumer reports to make decisions about eligibility, such as for credit, insurance, or employment. Information about consumers is generated through their participation in markets for goods and services—such as the use of banking or insurance products. CRAs are companies that regularly assemble or evaluate consumer information for the purpose of providing consumer reports to third parties. CRAs obtain data from a wide variety of sources, including data furnishers, such as banks and mortgage lenders, and public records. They can generate revenue by selling consumer reports to third parties. In 2012, CFPB estimated that the consumer reporting market consisted of more than 400 CRAs. CFPB estimated in 2015 that the three nationwide CRAs—which also are the three largest CRAs—held information on about 208 million Americans. Data furnishers are companies that report consumer information to CRAs. Examples of furnishers include banks, payday lenders, mortgage lenders, collection agencies, automobile-finance lenders, and credit card issuers. The information provided by furnishers may include personally identifiable information such as names, addresses, Social Security numbers, and employment data and account status and credit histories. A furnisher may provide CRAs with consumer information on multiple types of products. For example, a financial institution may provide account information on student loans as well as bank deposits. Furnishing of information to CRAs is generally voluntary; therefore, a furnisher is not required to submit all of the records about a consumer’s activity on an account to CRAs. Some accounts may only be reported when the payment history turns negative, such as when the debt is transferred to debt collection. Users of consumer reports include banks, credit card companies, landlords, employers, and other entities that use consumer reports to determine individual consumers’ eligibility for housing, employment, or products and services such as credit and insurance. Companies use consumer information compiled in consumer reports to screen for consumer risks and behaviors. For example, banks and credit unions may rely on consumer reports to assess the risk of opening new accounts. Some companies may act as both furnishers and consumer report users. During the consumer reporting process, a consumer does not necessarily interact with the CRA; however, if consumers discover inaccurate or incomplete information on their consumer reports as a result of, for example, being denied credit, they can file a dispute with the CRA, the furnisher, or both. Consumers may also request copies of their consumer reports from CRAs directly, and CRAs may provide consumers with certain disclosures about how their information is being shared. Different types of CRAs compile different types of reports using the data they obtain. The three nationwide CRAs produce credit reports and credit scores that can be used to qualify consumers for credit. Credit reports generally contain personally identifiable information, employment information, account status and credit histories, and inquiries made about consumers’ credit histories (see fig. 2). Other CRAs, called specialty CRAs, provide a variety of specialized reports used for making decisions on employment, rental housing, or other purposes. For example, reports from a specialty background-screening CRA may include some of the same information as a credit report but may also contain criminal history, education verification, and employment history. Several federal laws govern the consumer reporting industry, including the accuracy, security, use, and sharing of consumer report information. The Fair Credit Reporting Act (FCRA) is the primary federal law governing the collection, assembly, and use of consumer reports. FCRA was enacted to improve the accuracy and integrity of consumer reports, and promote the consumer reporting agencies’ adoption of reasonable procedures regarding the confidentiality, accuracy, relevancy, and proper use of consumer information. FCRA has been amended several times since it was enacted in 1970. When FCRA was originally enacted, FCRA imposed certain requirements on CRAs and users of consumer reports. Amendments to FCRA, pursuant to the Consumer Credit Reporting Reform Act of 1996 and the Fair and Accurate Credit Transactions Act of 2003, expanded the duties of CRAs, including requirements for dispute investigations, and imposed duties on data furnishers, such as requirements related to data accuracy and dispute investigations. FCRA requires CRAs and furnishers to take steps regarding the accuracy of the information contained in consumer reports. In addition, FCRA’s implementing regulation—Regulation V—as well as FTC’s Furnisher Rule more specifically outline furnishers’ responsibilities regarding accuracy. FCRA requires CRAs to follow reasonable procedures to assure “maximum possible accuracy” of the information concerning the individual to whom the report relates when preparing consumer reports. FCRA prohibits furnishers from reporting information that they know or have reasonable cause to believe is inaccurate, unless the furnisher has clearly and conspicuously specified to consumers an address whereby consumers can notify the furnisher that specific information is inaccurate. Regulation V and FTC’s Furnisher Rule require furnishers to have reasonable written policies and procedures in place regarding the accuracy and integrity of the information they provide to a CRA, where accuracy means that the information is for the right person and reflects the terms of the account and the consumer’s performance on the account. They also require furnishers to consider and incorporate, as appropriate, guidelines such as internal controls for accuracy and integrity of furnished information. FCRA requires CRAs and furnishers to address disputes consumers submit to them about the completeness or accuracy of information in their consumer reports. FCRA requires CRAs and Regulation V and FTC’s Furnisher Rule require furnishers to conduct reasonable investigations of a consumer’s dispute to determine the accuracy of the disputed information. As part of the process, CRAs and furnishers are required to consider all relevant information, including information provided by the consumer. The Gramm-Leach-Bliley Act (GLBA), provisions in the Federal Trade Commission Act, and provisions of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act), among other laws, govern the security of consumer data. Congress enacted GLBA in part to protect the privacy and security of nonpublic personal information that individuals provide to financial institutions. Many financial institutions furnish consumer data to CRAs. In a prior report, FTC staff told us that CRAs themselves might be considered financial institutions under GLBA if they collect, maintain, and report on consumer information. GLBA includes a provision directing FTC and certain federal regulators—including the Federal Reserve, FDIC, and OCC—to establish standards relating to administrative, technical, and physical safety for customer records. Specifically, GLBA directs these federal agencies to establish appropriate standards for financial institutions under their jurisdiction to ensure the security and confidentiality of customer records and information; protect against any anticipated threats or hazards to the security or integrity of such records; and protect against unauthorized access to or use of such records or information that could result in substantial harm or inconvenience to any customer. Provisions in the Federal Trade Commission Act prohibiting unfair or deceptive acts or practices and provisions in the Dodd-Frank Act prohibiting unfair, deceptive, or abusive acts or practices also may apply to CRAs’ protection of consumer data. Specifically, section 5 of the Federal Trade Commission Act prohibits “unfair or deceptive acts or practices” in or affecting commerce. In the context of privacy and security, these provisions require companies to represent practices to consumers in a truthful manner. For example, we reported previously that FTC has found companies that alleged they were following certain security protections, but did not in fact have such security features, to have engaged in unfair or deceptive practices. Similarly, the Dodd- Frank Act prohibits providers of consumer financial products or services from engaging in “unfair, deceptive, or abusive acts or practices.” For example, we reported previously that CFPB has alleged that claims to consumers that transactions are safe and secure while simultaneously lacking basic security practices can constitute “unfair, deceptive, or abusive acts or practices.” FCRA, GLBA, and the Economic Growth, Regulatory Relief, and Consumer Protection Act govern how consumer information may be used and shared. However, as we have previously reported, consumers have limited legal rights to control what personal information is collected and how it is maintained, used, and shared. For example, consumers generally cannot exercise choice in the consumer reporting market—such as by choosing which CRAs maintain their information—and do not have legal rights to delete their records with CRAs. FCRA permits CRAs to provide users of consumer reports the report only if the user has a “permissible purpose,” such as to process a credit application, screen a job applicant, or underwrite an insurance policy, subject to additional limitations where the credit or insurance transaction is not initiated by the consumer. FCRA also prohibits a person from using or obtaining a consumer report for any purpose other than that specified to the CRA when the user obtained the report. Further, FCRA requires that CRAs take steps to validate the legitimacy of users and their requests for consumer report information. FCRA and Regulation V also allow consumers to opt out of allowing CRAs to share their information with third parties for prescreened offers and limits the ability of affiliated companies to market products or services to consumers using shared consumer data. GLBA contains provisions regarding the use and sharing of consumer information that apply to CRAs. GLBA restricts the sharing of nonpublic personal information collected by or acquired from financial institutions. In particular, generally a nonaffiliated third party that receives nonpublic personal information from a financial institution faces restrictions on how it may further share or use the information. For example, a third party that receives nonpublic personal information from a financial institution to process consumer account transactions may not use the information for marketing purposes or sell it to another entity for marketing purposes. Consumers can prevent certain users from accessing their consumer reports by placing a security freeze on their consumer reports, which generally prevents the opening of new lines of credit in the consumer’s name (provided the creditor checks the consumer’s credit). Consumers may place a credit freeze at the three nationwide CRAs free of charge. Federal and state agencies share oversight of CRAs and furnishers. At the federal level, CFPB has supervisory authority over certain CRAs and shares enforcement and rulemaking authority with FTC for certain statutes applicable to all CRAs. At the state level, state Attorney General offices have enforcement authority to oversee CRAs, and some state agencies have limited supervisory authority under state laws. Federal agencies that have oversight authority for data furnishers are CFPB, FTC, and prudential regulators—the Federal Reserve, FDIC, NCUA, and OCC. Their oversight authority depends on the size as well as the type of the furnisher, such as if the furnisher is a nonbank institution, depository institution, or credit union. CFPB is the only federal agency with supervisory authority over CRAs, but it generally shares enforcement authority over CRAs with FTC as well as rulemaking authority for certain statutes applicable to all CRAs (see table 1). CFPB’s supervisory authority includes the authority to perform examinations to assess compliance with FCRA and other Federal consumer financial laws and to detect and assess risk to consumers and markets. CFPB may issue matters requiring attention (MRA) based on its examinations. MRAs identify corrective actions that result from examination findings that require the attention of the supervised institution’s board of directors or principals, including violations of Federal consumer financial laws. According to CFPB, MRAs are not legally enforceable, but CFPB can use them to determine future supervisory work or the need for potential enforcement actions. CFPB’s supervisory authority is generally limited to CRAs that qualify as larger participants in the consumer reporting market. In 2012, CFPB defined larger participants of the consumer reporting market to include CRAs with more than $7 million in annual receipts resulting from consumer reporting activities. CFPB’s authority does not extend to CRAs that do not participate in activities involving the use of consumer information to make decisions regarding financial products or services. For example, a specialty CRA that only provides consumer reports regarding a consumer’s employment history may not be considered a larger participant for the purposes of CFPB supervision, even if the CRA’s annual receipts from this activity are more than $7 million. In the preamble to its 2012 rule defining larger participants, CFPB stated that the threshold of more than $7 million is consistent with the objective of supervising market participants that have a significant impact on consumers and is appropriate in light of the highly concentrated nature of the consumer reporting market. In particular, CFPB estimated that out of about 410 CRAs, 30 CRAs met the threshold. Of those 30 CRAs, CFPB estimated that the six largest CRAs generated approximately 85 percent of industry receipts. While CFPB generally has supervisory authority over only larger- participant CRAs, CFPB and FTC generally share enforcement authority over CRAs. For example, they both enforce CRA compliance with most provisions of FCRA and provisions in other laws related to unfair or deceptive acts or practices. Both agencies have similar enforcement tools, including investigation, civil penalties, monetary relief for consumers, and requirements for a company to conduct or refrain from conducting certain acts. CFPB and FTC entered into a memorandum of understanding to coordinate their enforcement efforts, and staff from both agencies told us they take additional actions to coordinate their enforcement activities. For example, FTC staff said that CFPB and FTC maintain a log of each agency’s investigations to avoid duplication. Additionally, CFPB and FTC staff said they hold periodic coordination meetings to discuss their enforcement activities. FTC staff told us that because CFPB possesses supervisory authority over the three largest CRAs, FTC has focused its FCRA enforcement efforts on other CRAs. However, FTC staff said that to the extent that the largest CRAs offer nonfinancial products or services, such as employment or tenant background screening, FTC will also investigate these activities. CFPB and FTC each have certain rulemaking authority in connection with statutes that may apply to CRA activities, but generally CFPB has broader authority than FTC. Generally, CFPB has broad authority to issue regulations for Federal consumer financial laws, including most provisions of FCRA, which are applied to all CRAs. FTC has specific rulemaking authority that may apply to CRAs under FCRA, the Federal Trade Commission Act, and GLBA. For example, FTC’s rule related to safeguarding the security and confidentiality of customer records under GLBA applies to CRAs. State agencies, such as state Attorney General offices, have enforcement authority to oversee CRAs, and some state agencies have limited supervisory authority under state laws. Federal laws establish enforcement authority for state agencies over CRAs. Under FCRA and the Dodd-Frank Act’s provisions prohibiting unfair, deceptive, or abusive acts and practices, state Attorney General offices (or another official or agency designated by the state) have certain enforcement authority over some companies, including certain CRAs. However, states are required to coordinate enforcement actions with CFPB and FTC. In addition to enforcement authority under federal laws, state agencies may have enforcement authority under their state laws that apply to CRAs. Staff from state agencies in four selected states—Ohio, New York, Maine, and Maryland—told us that their states’ Attorney General offices have enforcement authority over CRAs under state laws prohibiting unfair or deceptive acts or practices. In addition, according to the National Consumer Law Center, every state has a consumer protection law that prohibits deceptive acts or practices and many states prohibit unfair acts or practices, and the enforcement of such state laws typically is the responsibility of a state enforcement agency, such as the state Attorney General offices. Some state Attorney General offices have used their enforcement authority under FCRA and state laws prohibiting unfair or deceptive acts or practices to investigate and take enforcement actions against CRAs. For example, the three nationwide CRAs entered into two separate settlements with 30 state Attorney General offices in 2015 in which the CRAs agreed to implement a number of specific reforms, including reforms related to consumer report accuracy and dispute processes. Under these settlements, the state Attorney General offices claimed the CRAs violated FCRA and the states’ laws prohibiting unfair or deceptive acts or practices. Additionally, representatives of several states’ Attorney General offices told us in connection with a prior report that they launched a joint investigation into whether a nationwide CRA violated state laws in a 2017 data breach, including state laws prohibiting unfair or deceptive practices. In addition to the enforcement authority state Attorney General offices have under state laws prohibiting unfair or deceptive acts or practices, some state laws provide state agencies, such as financial regulators and consumer protection bureaus, with oversight authority over CRAs. Our interviews with staff from four selected states’ agencies—Ohio, New York, Maine, and Maryland—indicated that CRA oversight authority given to state agencies under state laws varies. Staff from Ohio’s Office of the Attorney General told us that Ohio does not have specific laws that provide Ohio state regulators with supervisory, rulemaking, or enforcement authority over CRAs, apart from Ohio laws prohibiting unfair or deceptive acts or practices that provide the Office of the Attorney General with enforcement authority. New York’s financial regulator told us that state laws provide the agency with supervisory, enforcement, and rulemaking authority over institutions that provide financial products and services, including certain CRAs. The agency issued a rule in 2018 requiring CRAs reporting on consumers within the state to register with the agency annually and provide information as required by the agency. Staff from Maine’s consumer protection agency told us that under Maine law, the agency has supervisory and enforcement authority over CRAs operating within the state. Agency staff told us that the agency examines certain CRAs every 2 years for compliance with Maine’s consumer reporting laws, such as by reviewing records and documents provided by CRAs. Maryland’s financial regulator told us that Maryland’s laws provide the agency with enforcement and rulemaking authority over CRAs but not supervisory authority. The agency can adopt regulations in order to administer provisions of Maryland statutes, such as procedures for ensuring accuracy in consumer reports. Additionally, agency staff said that the agency can investigate CRAs using its enforcement authority but cannot conduct supervisory examinations of CRAs. Representatives from several CRAs we interviewed told us that their supervision by state regulators has been limited. Representatives from two CRAs told us that a state agency has examined them. Representatives from three other CRAs we interviewed said they had limited encounters with state-level agencies. However, as previously stated, CFPB, FTC, and state agencies generally have enforcement authority over CRAs regarding consumer financial protection. CFPB, FTC, and the prudential regulators—the Federal Reserve, FDIC, NCUA, and OCC—share federal oversight of data furnishers for compliance with FCRA, among other Federal consumer financial laws. These furnishers include insured depository institutions and credit unions and nondepository institutions, such as student and mortgage loan servicers. Federal agencies generally split oversight of furnishers based on their charter type and asset size. Oversight of furnishers that are depository institutions or credit unions. CFPB and the prudential regulators have supervisory and enforcement authority over insured depository institutions and credit unions for compliance with FCRA and other federal consumer financial laws (see table 2). The Dodd-Frank Act generally divided authority between CFPB and the prudential regulators based on an institution’s charter type and the value of an institution’s total assets. Assets of more than $10 billion. In general, CFPB has enforcement and supervisory authority for insured depository institutions and credit unions (as well as their affiliates) that have more than $10 billion in total assets for compliance with many Federal consumer financial laws.However, a prudential regulator that is authorized to enforce a Federal consumer financial law may recommend that CFPB initiate an enforcement action, and if CFPB does not, the prudential regulator may initiate an enforcement action. Assets of $10 billion or less. In general, the four prudential regulators have enforcement and supervisory authority over insured depository institutions or credit unions with total assets of $10 billion or less. If, however, CFPB believes that an institution in this category has violated a Federal consumer financial law, it must notify the appropriate prudential regulator in writing and recommend action. Additionally, regardless of an institution’s asset size, CFPB generally has rulemaking authority for many Federal consumer financial laws that apply to insured depository institutions and insured credit unions. However, prudential regulators have limited rulemaking authority as related to furnishing activities for certain provisions specifically retained pursuant to the Dodd-Frank Act and FCRA. CFPB generally has supervisory and enforcement authority over insured depository institutions and insured credit unions, as well as their affiliates, that have more than $10 billion in total assets, for compliance with Federal consumer financial laws as defined under the Dodd-Frank Wall Street Reform and Consumer Protection Act. CFPB has broad rulemaking authority under many Federal consumer financial laws that apply to depository institutions and credit unions, with limited exceptions. The Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, National Credit Union Administration, and Office of the Comptroller of Currency (collectively called the prudential regulators) generally have supervisory and enforcement authority for Federal consumer financial laws (as defined under the Dodd-Frank Wall Street Reform and Consumer Protection Act) for insured depository institutions and credit unions that have $10 billion or less in total assets. The prudential regulators also have limited rulemaking authority related to furnishing activities under certain Federal consumer financial laws, including parts of FCRA. Oversight of furnishers that are nondepository institutions. CFPB and FTC share oversight of nondepository institutions. In general, CFPB has supervisory authority over certain types of nondepository financial institutions for compliance with FCRA and other Federal consumer financial laws (see table 3). Such institutions include certain kinds of mortgage market participants, private student lenders, and payday lenders. CFPB also has supervisory authority over institutions in markets for consumer financial products or services that it defines as larger participants. For example, CFPB has issued rules defining larger participants for automobile-financing and consumer debt-collection markets. CFPB and FTC share enforcement authority for many different types of nondepository institutions, such as mortgage lenders, payday lenders, debt collectors, and telecommunication companies. FTC additionally has enforcement authority over other nondepository institutions for which CFPB does not have enforcement authority, such as automobile dealers. FTC staff told us that, similar to their coordination efforts for CRAs, FTC and CFPB coordinate their enforcement activities with respect to furnishers. CFPB has rulemaking authority for most consumer financial laws, including FCRA, that may apply to furnishers that are nondepository institutions. In comparison to CFPB, FTC has specific rulemaking authority under FCRA, the Federal Trade Commission Act, and GLBA to promulgate rules that may apply to nondepository institution furnishers. CFPB has supervisory authority over certain nondepository institutions. It shares enforcement authority with FTC for certain nondepository institutions and has broad rulemaking authority for Federal consumer financial laws which apply to many institutions, including those for which it has supervisory jurisdiction. According to CFPB, in its oversight of the consumer reporting market, CFPB has prioritized CRAs representing the greatest potential risks to consumers. Additionally, CFPB has generally focused on certain compliance areas, particularly data accuracy and investigations conducted in response to consumer disputes. On an annual basis, CFPB updates its plans for supervision of CRAs and furnishers for the next 1 to 2 years. According to CFPB, it assesses specific risks in the market and determines entities and compliance areas to examine. In making these determinations, CFPB stated that it considers factors such as market presence, consumer complaints, its prior supervisory examinations and findings, and its resources. According to CFPB, since the start of its supervisory program for the consumer reporting market in 2012, CFPB has prioritized CRAs that pose the greatest risks to consumers and the marketplace for examinations. Specifically, CFPB staff told us that CFPB has prioritized CRAs that represent a significant share of the market and the largest volume of consumer complaints submitted to CFPB’s complaint database. CFPB has also examined one or more specialty CRAs. CFPB stated that in determining which specialty CRAs to examine, it considered factors such as the CRAs’ market share in the particular consumer reporting products they offer. According to CFPB, in setting supervisory priorities, supervision staff also consulted with stakeholders and considered CFPB’s resources and findings from prior examinations that may have indicated weaknesses. CFPB staff said that when CFPB began examining CRAs, its supervisory approach was to examine their compliance management systems first before focusing on other compliance areas. The staff said that the compliance management system reviews helped CFPB to learn about how CRAs operate. Based on the compliance management reviews, CFPB determined that it could review data accuracy, dispute investigations, and other compliance areas by examining the mechanisms CRAs use to comply with FCRA. After examining compliance management systems, CFPB prioritized examining other aspects of compliance related to data accuracy (including processes for monitoring furnishers) and dispute investigations, as well as performing follow-up examinations in those areas. CFPB staff stated that they have chosen to focus on data accuracy and dispute investigations because these were the largest problem areas based on CFPB’s assessment of complaint data. Additionally, CFPB identified compliance with the FCRA obligations regarding data accuracy and effective and efficient dispute resolution as agency priorities for the consumer reporting market. CFPB has also examined other CRA compliance areas, including procedures related to suppression and reinsertion of information that CRAs found to be inaccurate, unverifiable, or obsolete; procedures for ensuring a permissible purpose for obtaining consumer reports; and compliance management systems related to data security. According to CFPB, when determining compliance areas for examination, the agency considered factors such as its data on complaints, the extent to which it had previously examined the areas, and concerns identified in prior examinations. In February 2019, we found that CFPB’s examination process did not routinely include an assessment of CRAs’ data security risks, and we recommended that CFPB’s prioritization specifically account for data security risk. In conducting its examinations, CFPB has focused on assessing CRA procedures for complying with FCRA rather than on the extent of inaccuracy in consumer reports. For example, according to a 2017 CFPB report, CFPB directed one or more CRAs to establish quality control programs to regularly assess the accuracy of information included in consumer reports and to develop systems to measure the accuracy of consumer reports and identify patterns and trends in errors. CFPB staff said CFPB has not monitored the extent of inaccuracy in consumer reports produced by the CRAs it examines. They stated that FCRA requires CRAs and furnishers to follow reasonable procedures with regard to accuracy but does not require or identify acceptable thresholds for accuracy. CFPB staff explained that CFPB’s supervisory program has therefore focused on evaluating CRAs’ compliance with FCRA requirements for reasonable procedures with regard to accuracy and identifying weaknesses in such procedures. According to CFPB, in prioritizing examinations of data furnishers, the agency has primarily considered the furnishers’ market shares, the number of disputes CRAs received about the furnishers, and the number of complaints CFPB received in its complaint database. CFPB has prioritized large furnishers within their respective markets. For example, CFPB identified one or more student loan servicers furnishing data to CRAs that had large shares of the student loan servicing market. CFPB has also prioritized furnishers with high dispute rates relative to other furnishers within their markets. For example, CFPB identified one or more credit card issuers with higher dispute rates compared to their peers, based on CFPB’s review of dispute data provided by CRAs. According to CFPB, it has also considered the results of prior CFPB examinations and input from agency stakeholders. As with CRAs, CFPB’s examinations of furnisher activities have focused on accuracy and dispute investigations. In its Supervisory Highlights from March 2017, CFPB stated that the accuracy of consumer report information is a CFPB priority and that furnishers play an important role in ensuring the accuracy of consumer report information through the dispute process. For example, CFPB stated that furnishers’ timely response to consumer disputes may reduce the effect that inaccurate negative information on a consumer report may have on the consumer. From 2013 through 2018, CFPB examined several CRAs. Many of these examinations evaluated CRA compliance with accuracy and dispute investigation obligations under FCRA, such as by assessing data governance systems, quality control programs, and furnisher oversight and data monitoring. Additionally, some examinations evaluated other FCRA compliance areas, including ensuring that users had permissible purposes for requesting consumer reports and preventing reinsertion of previously deleted information. CFPB’s examinations related to data accuracy and dispute investigation obligations resulted in supervisory findings that CFPB directed CRAs to take actions to address. CFPB found that one or more CRAs had minimal compliance mechanisms in place to meet requirements for data accuracy and for dispute investigations (see table 4 for examples of CFPB’s supervisory findings and directed actions in these areas). For example, CFPB found that one or more CRAs lacked quality control policies and procedures to test compiled consumer reports for accuracy and had insufficient monitoring and oversight of furnishers that provided information used in the reports. CFPB also found that one or more CRAs did not review evidence that consumers provided to support their disputes and relied entirely on the furnishers to investigate the disputes. CFPB directed specific changes in some CRAs’ policies and procedures for ensuring data accuracy and conducting dispute investigations, including increasing oversight of incoming data from furnishers, developing internal processes to monitor furnisher dispute responses to detect those that may present higher risk of inaccurate data, and enforcing the CRAs’ obligation to investigate consumer disputes, including review of relevant information provided by consumers. In addition, CFPB directed one or more CRAs to establish quality control programs that regularly assess the accuracy and integrity of compiled consumer reports. In follow-up reviews of some of its supervisory findings, CFPB found that one or more CRAs took actions that resulted in improvements in policies and procedures. For example, CFPB has found that one or more CRAs established quality control programs, including developing tests to identify the extent to which consumer reports are produced using information for the wrong consumer. For other findings, CFPB determined that one or more CRAs had not taken actions to address the findings, or CFPB had not yet conducted follow-up examinations to determine if they had been addressed. From 2013 through 2018, CFPB conducted examinations of several data furnishers. These furnishers were involved in various consumer financial markets, such as automobile loan servicing, debt collection, mortgage servicing, and student loan servicing. CFPB staff told us that until 2017, CFPB generally examined furnishers’ compliance with FCRA as part of its assessment of compliance with other Federal consumer financial laws and regulations. CFPB staff said that in 2017, CFPB began conducting examinations specifically focused on furnishing activities under FCRA and Regulation V. CFPB stated that this change was made because the review of furnishers’ practices under FCRA and Regulation V was resource-intensive and merited dedicated resources. In a 2017 report, CFPB stated that it had found numerous furnisher violations of FCRA and Regulation V related to data accuracy and dispute investigations and that it directed furnishers to take corrective actions (see table 5 for examples of CFPB’s supervisory findings and directed actions). For example, CFPB found that certain furnishers failed to establish, implement, and maintain reasonable written policies and procedures consistent with Regulation V regarding the accuracy and integrity of the information furnished; provided information to CRAs despite having reasonable cause to believe the information was inaccurate; and lacked policies for their employees on how to conduct reasonable investigation of consumer disputes. In some cases, CFPB’s furnisher examinations conducted from 2013 through 2018 resulted in findings related to FCRA and Regulation V that CFPB directed the furnishers to take actions to address. For example, CFPB directed furnishers to develop reasonable written policies and procedures regarding accuracy, to promptly update the information provided to CRAs after determining that the information was not complete or accurate, and to update and implement policies and procedures to ensure disputes are handled in accordance with FCRA requirements. CFPB staff told us that the agency decides whether to investigate based on consideration of factors such as consumer complaints, extent of effects on consumers, and severity of misconduct. CFPB staff told us that, in many cases, CFPB has chosen to identify and correct FCRA violations and weaknesses in compliance management systems at CRAs through supervisory activity rather than enforcement investigations. However, CFPB has also investigated and used enforcement remedies, such as civil penalties and injunctive relief, against CRAs and furnishers that violated FCRA or Regulation V. From 2012 through 2018, CFPB settled 26 enforcement actions for violations related to FCRA and Regulation V, including four settlements involving CRAs and 16 settlements involving furnishers. Although CFPB found other FCRA violations in its investigations of these companies, such as those related to permissible purpose for obtaining consumer reports and disclosure issues, most of the violations related to data accuracy and dispute investigations. For example, two of the four FCRA-related settlements with CRAs involved dispute investigations or data accuracy procedures. Of the 16 settlements with furnishers for alleged violations related to FCRA and Regulation V, all contained violations related to the furnishers’ obligations regarding data accuracy or dispute investigations. CFPB’s settlements contained findings similar to its supervisory examination findings. For example, CFPB found that a CRA failed to investigate consumer disputes, and another CRA failed to take steps to ensure its consumer reports were accurate. For furnishers, CFPB found violations including furnishers that failed to establish and implement reasonable written policies and procedures regarding the accuracy and integrity of information provided to CRAs, as well as furnishers that provided inaccurate or incomplete information about consumers to CRAs or failed to conduct reasonable investigations of consumer disputes. CFPB has not defined its expectations—including views on appropriate practices—for how CRAs can comply with key FCRA requirements. Among other provisions, FCRA requires CRAs to (1) follow reasonable procedures when preparing a consumer report to assure maximum possible accuracy of consumer report information and (2) conduct reasonable investigations of consumer disputes. However, FCRA does not define what would constitute such reasonable policies and procedures or investigations or stipulate the types of procedures or investigations that would meet the requirements for CRAs. While CFPB has not defined its expectations for these two key FCRA requirements for CRAs, it has adopted Regulation V, which, as required by statute, includes information on CFPB’s requirements and guidelines in these areas for furnishers. Regulation V includes requirements and guidelines for reasonable policies and procedures concerning the accuracy and integrity of furnished consumer information and requirements for reasonable investigations of consumer disputes filed directly with the furnishers. In its supervision of furnishers, CFPB has examined furnishers for compliance with the requirements of Regulation V—for example, it has found in examinations that furnishers violated Regulation V’s requirement to establish written policies and procedures regarding the accuracy of consumer information furnished to a CRA. Although CFPB has not similarly established guidelines or otherwise provided information on its supervisory expectations for CRAs, CFPB has found specific weaknesses in CRA practices. In particular, CFPB has cited one or more CRAs for specific deficiencies related to determinations of noncompliance with FCRA provisions regarding reasonable procedures for accuracy and dispute investigations. For example, CFPB has directed one or more CRAs to take specific actions to improve their accuracy procedures. In addition, CFPB found one or more CRAs’ data governance programs to be decentralized and informal, and it directed the CRAs to develop and implement written policies and procedures to formalize the programs. However, CFPB has not issued any information on its supervisory expectations indicating that “reasonable procedures” include having formal written policies and procedures. CFPB also has identified FCRA violations related to reasonable dispute investigations. For example, CFPB determined that one or more CRAs failed to review and consider documentation attached by consumers to disputes and relied entirely on furnishers to investigate a dispute—therefore violating FCRA requirements for reasonable investigations and for reviewing and considering all relevant information submitted by the consumer—and directed the CRAs to independently investigate consumer disputes. However, CFPB has not issued any information on its supervisory expectations to help interpret FCRA’s requirement for CRAs to conduct a reasonable investigation of disputes and to review and consider all relevant information, including the expectation that CRAs investigate consumer disputes independently. Based on the FCRA requirements alone, it may be unclear to CRAs and others that these FCRA requirements include performing independent investigations. For example, representatives from one large CRA we interviewed stated that the company is not required to conduct an independent investigation. FCRA instructs CFPB to enact regulations that are necessary to carry out the purposes of the act, which could include issuing implementing regulations for CRAs regarding data accuracy and dispute investigations. Additionally, a 2018 policy statement issued by CFPB and the prudential regulators explains that information on supervisory expectations serves to articulate an agency’s general views regarding appropriate practices. The policy statement further states that it is important for such information to provide insight to industry, as well as to supervisory staff, in a transparent way that helps to ensure consistency in the supervisory approach. According to CFPB’s Supervisory Highlights from March 2017, CFPB’s vision for the consumer reporting system is a system in which furnishers provide and CRAs maintain and distribute data that are accurate, supplemented by an effective dispute management and resolution process for consumers. According to the same CFPB publication, this vision is rooted in the obligations and rights set forth in FCRA and Regulation V. One reason why accuracy guidelines exist for furnishers but not CRAs is that the Fair and Accurate Credit Transactions Act of 2003 added a provision to FCRA requiring the prudential regulators and FTC to establish and maintain guidelines for furnishers regarding the accuracy of consumer data furnished to CRAs and to prescribe regulations requiring furnishers to establish reasonable policies and procedures for implementing the guidelines. In 2011, CFPB adopted these regulations as part of Regulation V after assuming rulemaking authority from the other agencies. Neither the Fair and Accurate Credit Transactions Act of 2003 nor any other statutory provision within FCRA includes a similar provision for the agencies to establish and maintain guidelines or provide information concerning supervisory expectations regarding the accuracy of consumer data CRAs maintain, and CFPB has not established guidelines or defined supervisory expectations for CRAs. Since 2015, CFPB’s long-term rulemaking agenda has stated that it will evaluate possible policy responses to consumer reporting issues, including potential additional rules or amendments to existing rules governing consumer reporting accuracy and dispute processes. However, as of May 2019, CFPB had not conducted any rulemaking related to these topics. CFPB staff said that a substantial body of case law exists to guide CRAs regarding what practices may be considered compliant with FCRA requirements, including with respect to provisions for reasonable procedures for accuracy and performing reasonable dispute investigations. The staff also said that CFPB staff look to relevant case law when assessing CRA compliance with FCRA during examinations, and that supervisory findings serve to communicate to a supervised CRA how CFPB has applied FCRA during an examination. Providing information to CRAs about its supervisory expectations for these two key FCRA requirements—and ways in which CRAs could comply—could help CFPB to facilitate CRA compliance with FCRA and achieve agency objectives for the consumer reporting system. Without information about its expectations, CFPB’s supervision lacks transparency about what practices it considers appropriate or expects CRAs to adopt to comply with key FCRA requirements. Absent such information from CFPB, representatives from four CRAs we interviewed told us that they look to other sources to understand what CFPB will consider to be noncompliant during examinations and to determine if they are meeting FCRA requirements for maintaining reasonable procedures. These sources include publicly available information such as court cases, presentations from industry associations, CFPB publications highlighting supervisory actions, and public enforcement actions. While CFPB can communicate with individual CRAs during examinations and by directing corrective actions, the impact of such interactions is limited to specific CRAs rather than helping to ensure consistency in its supervisory approach by providing transparent insights to the industry. While relevant case law could provide CRAs with some information regarding practices that have been determined to be compliant with FCRA requirements, there may be a lack of clarity about the extent to which all case law fully reflects CFPB’s expectations. By communicating information about its expectations and ways in which CRAs could comply, CFPB could help ensure that CRAs receive complete and consistent information about how to interpret key FCRA requirements. Further, defining its expectations regarding how CRAs can meet key FCRA requirements could help CFPB promote consistency in its supervisory approach by providing examiners with information on the agency’s interpretation of FCRA provisions. FTC’s enforcement actions since 2010 have targeted smaller CRAs. FTC staff told us that because CFPB has supervisory authority over the larger CRAs, FTC has focused its FCRA enforcement efforts on other CRAs. Additionally, our review of FTC’s enforcement actions showed that FTC generally took enforcement actions against specialty CRAs that are smaller than the nationwide CRAs, such as CRAs conducting background screening. However, FTC staff also told us that they do not use a specific size threshold to initiate investigations against CRAs or furnishers and that they conduct their enforcement on a case-by-case basis, focusing on violations or potential violations of applicable laws. Prior to taking an enforcement action against a company, FTC conducts an investigation to determine if the company has violated a law. Using its investigative authority, FTC can compel companies to produce documents, testimony, and other materials to assist in its investigations. To determine whether to initiate investigations, FTC staff said they consider several sources, including leads from consumer advocacy groups and other FTC investigations, tips from whistleblowers, and monitoring of media reports. FTC staff also said that FTC regularly monitors its consumer complaint database to identify the types of complaints that consumers file and to determine if the activity described in the complaint indicates potential noncompliance with laws and regulations. FTC also can start investigations based on requests, such as by a member of Congress. FTC staff said that the agency targets its investigations based on the extent to which the potential noncompliance may affect a large number of consumers. For example, staff said FTC targets companies for investigation where inaccuracies may be occurring on a large scale. In addition, as we reported in February 2019, FTC staff said that when determining whether to initiate an investigation related to privacy and data security matters, they consider factors such as the companies’ size and the sensitivity of the data in the companies’ networks. FTC staff said that the consumer reporting market is a high priority for FTC, and that the accuracy of consumer reports and CRA activities has been a large part of FTC’s enforcement priorities. FTC staff said that they initiated about 160 FCRA investigations from 2008 through 2018. FTC staff stated that of the approximately 160 investigations, about 70 related to CRAs or companies, such as data brokers and companies selling public records, that FTC investigated to determine if they were engaged in conduct that would render them CRAs. Additionally, the staff said that about 20 of the approximately 160 investigations related to furnishers, about 55 related to users of consumer reports, and about 15 related to companies that fall under provisions of FCRA that do not require that the entity be a CRA, furnisher, or user. FTC staff stated that among these investigations, FTC investigated specialty CRAs, such as background- screening and check-authorization companies, and furnishers, such as debt collectors, lenders, and telecommunications companies. After an investigation, FTC may initiate an enforcement action if it has reason to believe that a law is being or has been violated. From 2010 through 2018, FTC took 30 enforcement actions related to FCRA, including against 14 CRAs, six furnishers, and two companies that acted as both a CRA and furnisher. Of the 30 enforcement actions, 14 contained issues related to data accuracy or disputes and two contained issues related to data security. In total, 20 of the 30 enforcement actions contained issues related to other consumer reporting topics, such as provision of consumer reports without permissible purpose. FTC staff told us that all of the enforcement actions related to FCRA involved injunctive relief. Additionally, some enforcement actions involved civil penalties. For example, in one action, a CRA was ordered to pay civil penalties for failing to use reasonable procedures to ensure the maximum possible accuracy of information it provided to its customers, and for failing to reinvestigate consumer disputes, as required by FCRA. FTC alleged that the CRA failed to take reasonable steps to ensure that the information in the reports was current and reflected updates, such as the expungement of criminal records. FTC staff said that there is no overarching definition regarding the FCRA provision for reasonable procedures for assuring maximum possible accuracy and that FTC determines on a case-by-case basis whether a violation has occurred. FTC staff also said that FTC’s enforcement actions provide industry with information on unacceptable practices and that the enforcement actions are closely monitored by the consumer reporting industry. In addition to enforcement actions related to FCRA, FTC staff told us that FTC took five actions against CRAs for unfair or deceptive acts or practices related to data security in the past 10 years. FTC alleged that all five CRAs failed to employ reasonable and appropriate security measures to protect sensitive consumer information. As discussed previously, the prudential regulators have supervisory and enforcement authority for FCRA over depository institutions and credit unions with total assets of $10 billion or less, some of which act as furnishers. The four prudential regulators told us they do not perform standalone examinations of these financial institutions for FCRA compliance. Rather, they examine for FCRA compliance in conjunction with other consumer financial laws and regulations and as part of examining an institution’s compliance with federal consumer protection laws and regulations. For example, OCC staff told us that if an examiner reviews an institution’s general compliance management system and identifies compliance, procedural, or other weaknesses related to FCRA, then the examiner would look at those issues more closely. Staff from the four prudential regulators told us they take a risk-based approach to determine the scope of examinations. They said that the approach includes consideration of factors such as an institution’s asset size, record of FCRA compliance, and trends in consumer complaints. As part of their compliance examinations from 2013 through 2018, staff from FDIC, the Federal Reserve, and NCUA said their agencies identified multiple FCRA- and Regulation V-related findings, including findings not related to financial institutions’ furnishing activities. FDIC staff said that examiners identified more than 1,200 violations related to FCRA and Regulation V at around 800 institutions, but found that the majority of the violations posed a low level of concern to the institution and consumers. Of these violations, FDIC staff stated that 106 related to furnisher obligations under Regulation V regarding the accuracy and integrity of information furnished to CRAs and that those types of violations were among the five most frequently cited violation topics related to FCRA and Regulation V. Federal Reserve staff said that in examinations that reviewed compliance with FCRA and Regulation V, Federal Reserve examiners cited FCRA and Regulation V about 210 times for an aggregate of about 4,200 related violations. Of these, Federal Reserve staff said the agency cited FCRA and Regulation V provisions related to furnisher accuracy about 20 times and cited an aggregate of about 3,600 violations. NCUA staff stated that NCUA identified 160 FCRA violations at around 150 credit unions. NCUA staff explained that 20 of the violations related to furnisher accuracy and that these types of violations were not among the five most frequently cited violation topics related to FCRA. OCC staff told us that OCC identified no findings related to FCRA or Regulation V from 2013 to 2018. Three prudential regulators stated that they consider the risk that a FCRA or Regulation V violation poses to the depository institution, including risk to consumers. For example, FDIC staff stated that the violations they cited may have had a small but negative effect on consumers, or may have the potential to have a negative effect in the future if uncorrected. FDIC staff added that such violations may also pose compliance and legal risks to the institution. NCUA staff stated that they require corrective action for any FCRA violation, and that they consider the pervasiveness of violations—particularly a risk of systemic or repeated violations—in determining the appropriate supervisory action. CFPB, FTC, and industry stakeholders attributed inaccuracies in consumer reports to several causes, including (1) CRAs matching data to the wrong consumer files due to missing, inaccurate, or inconsistent personally identifiable information; (2) errors in furnished data; (3) timing of data updates; and (4) identity fraud or theft. In particular, CFPB, FTC, and industry stakeholders most frequently cited CRAs mismatching data and errors in furnished data as the primary causes of consumer report inaccuracies. Several industry stakeholders identified CRAs’ mismatching of furnished data or public records to consumer files as a major source of inaccuracies in consumer reports. Two of the consumer groups we interviewed— Consumers Union and the National Consumer Law Center—also cited mismatching of data to consumer files as a source of inaccuracies in reports they published. In addition, FTC and CFPB reported in separate studies in 2012 that mismatching is a key source of inaccuracies in consumer reports. When CRAs do not correctly match data to the appropriate consumer files, the consumer’s file may contain data pertaining to another consumer. Alternatively, data can be excluded from the “correct” consumer’s file. For example, if one consumer’s report contains information about a different consumer’s debt payment history or collections activity, this information would also be missing from the file of the consumer who generated that activity. CFPB reported in its 2012 study that inconsistent, inaccurate, or incomplete personally identifiable information can cause errors in matching furnished data to the correct consumer’s file. CFPB, FTC, and industry stakeholders—three CRAs, a CRA industry group, and a consumer group—identified multiple reasons why personally identifiable information in data furnished to CRAs may be inconsistent, inaccurate, or incomplete, including the following examples: Consumers may use variations of their names when establishing an account with financial institutions (such as Kathy and Katherine). Consumers may change their names as a result of divorce or marriage, but the name change may not be reflected in furnished data. Consumers with suffixes in their names (such as junior or senior) may not consistently use suffixes in their applications. Furnishers may omit personally identifiable information. Furnishers may input consumers’ information incorrectly during data entry. In addition, CFPB stated in its 2012 report that matching public records to consumers’ files can be particularly challenging for CRAs because public records rarely contain Social Security numbers. The processes CRAs have in place to match data to consumers’ files may also contribute to inaccuracies in consumer reports. Generally, CRAs use various combinations of personally identifiable information to match data to consumers. For example, representatives from one CRA said the CRA uses at least the name and address to conduct matches. These representatives said that where only name and address are used, the address is required to be an exact match while the name can be a logical variation determined by the CRA’s algorithm. Representatives from another CRA said that the CRA matches public record information using at least the full name and date of birth but not the Social Security number because it is difficult to obtain. According to a CFPB report, the three nationwide CRAs—as part of their settlements with multiple state Attorney General offices—now require name, address, and Social Security number or date of birth to be present in public records furnished to them and use that personally identifiable information to conduct matches. Representatives from three consumer groups attributed consumer report inaccuracies to how CRAs make such matches. For example, representatives of two consumer groups said that CRAs could reduce inaccuracies arising from mismatching by using stricter requirements, such as requiring both Social Security number and date of birth, in addition to names and addresses, or only matching data to consumers if all nine digits of the Social Security number are present. Altogether, the errors originating from consumers or furnishers, as well as processes that CRAs have in place for matching, affect the accuracy of consumer reports (see fig. 3). CFPB and representatives from several industry stakeholders identified errors in furnished data as a primary cause of consumer report inaccuracies. Even when a CRA matches data to the correct consumer file, the consumer report can still contain inaccuracies if the information a furnisher provided to the CRA regarding the consumer contained errors (see fig. 4). CFPB has reported and a few CRAs told us that CRAs conduct quality checks to identify issues including blank fields or logical inconsistencies in furnished data, such as reporting of new account balance for closed consumer accounts. The CRA can reject furnished data or ask furnishers to provide corrected data. However, a CFPB report and a few industry stakeholders we interviewed identified weaknesses in furnisher and CRA processes as contributing to errors in furnished data. Two of the consumer groups we interviewed—Consumers Union and the National Consumer Law Center—also cited weaknesses in furnisher and CRA processes as contributing to errors in furnished data in reports they published. Processes for handling consumer transactions. CFPB reported that problems with processes used by furnishers include failing to update records, failing to post a payment, and misattributing ownership of an account to an individual who is only an authorized user. Processes for handling data accuracy. CFPB also reported and a few stakeholders told us that some furnishers lack processes for ensuring the accuracy of data submitted to CRAs and some CRAs lack processes for ensuring the accuracy of furnished data. CFPB reported and representatives from a few industry stakeholders said that timing of data updates in furnished data and court records could be a source of potential inaccuracies. For example, representatives from one CRA said that an address or name change can take up to two billing cycles to be reflected in a consumer report. Additionally, representatives from a CRA industry group told us that online court records, where CRAs may obtain data, often lag behind paper court records. Representatives from one consumer group pointed to the timing of when furnishers report debt as a source of potential inaccuracies. CFPB, the National Consumer Law Center, and Consumers Union have reported that identity fraud and theft are causes of inaccuracies in consumer reports. Additionally, representatives from one CRA also told us that identity fraud and theft are primary causes of inaccuracies. For example, identity thieves can create new credit accounts in a consumer’s name and let the debt go unpaid. Such debts then may be reflected in the consumer’s account and be reported to CRAs if not identified by the furnisher as resulting from fraudulent activity. Consumers can dispute the accuracy or completeness of their consumer reports with the CRAs that produced the consumer reports, with the data furnishers, or both. As stated previously, FCRA requires CRAs to conduct reasonable investigations of consumer disputes; FCRA, Regulation V, and FTC’s Furnisher Rule, as applicable, generally also require furnishers to conduct reasonable investigations of consumer disputes. If consumers are dissatisfied with the results of the investigations conducted by the CRAs or furnishers, they have a few options, discussed in detail below. FCRA requires CRAs and furnishers to take specific steps to respond to consumer disputes. When a consumer files a dispute with the CRA, the CRA must investigate the dispute internally, and once the CRA notifies the furnisher of the dispute, the furnisher must also investigate the disputed information (see fig. 5). If the CRA’s internal investigation or the furnisher’s investigation finds that the disputed item is inaccurate, incomplete, or cannot be verified, the CRA must delete the disputed item from the consumer’s file or modify the information and notify the furnisher of the action taken. The CRA must notify the consumer of the investigation results. Representatives from six of the CRAs we interviewed said that they consider disputes resolved when they or the furnishers complete their investigations and notify consumers of the results, even if the consumer does not agree with the results. If a furnisher does not conduct an investigation and report to the CRA within the time frame required by FCRA, then the CRA must remove the disputed information from the consumer’s file. Certain furnisher processes for investigating a dispute received from a CRA and a dispute received directly from the consumer are similar under FCRA. When a furnisher investigates a dispute received from a CRA, the furnisher must report the results of the investigation to the CRA that forwarded the dispute. If the furnisher receives the dispute directly from a consumer, then it must investigate the dispute and report the results of the investigation to the consumer, generally within 30 days (see fig. 6). In both cases, the furnisher must provide corrected information to every CRA to which it provided the information. CRAs may have differing dispute investigation processes in place because of regulatory requirements or because of how they obtained their data. Under FCRA, the nationwide CRAs are required to maintain an automated system through which furnishers can report incomplete or inaccurate information in a consumer’s file. The nationwide CRAs share the use of an automated system that sends disputes to furnishers and receives furnishers’ responses to the disputes. Other CRAs are not required by FCRA to use an automated system. Representatives from one CRA told us that the CRA uses email and phone calls to send disputes to and receive responses from furnishers. Representatives from a CRA industry group, as well as representatives from a background- screening CRA, said that compared to CRAs that obtain information from furnishers, background-screening CRAs generally obtain records from courts and therefore conduct their dispute investigations by confirming court records and contacting court officials. Consumers have several options to address potential inaccuracies in their consumer reports if they disagree with the results of a CRA or furnisher investigation, but these options have potential limitations, according to the stakeholders we interviewed. Placing a consumer statement on the report. Under FCRA, if the investigation does not resolve the dispute (where the dispute is filed with a CRA), the consumer may place a statement regarding the nature of the dispute on the consumer report, such as why the consumer disagreed with the reported item. According to the three nationwide CRAs, such statements alert creditors to the consumer’s disagreement. However, the statement does not modify or remove the information that the consumer perceived to be inaccurate from the consumer report, and users of the consumer report may or may not consider the consumer’s statement in their decision-making. Resubmitting disputes to CRAs or furnishers. Consumers who believe their disputes have not been satisfactorily resolved may choose to resubmit disputes regarding the same items that they disputed previously to CRAs or to the furnishers. If a consumer submits a dispute and does not provide sufficient information to investigate the disputed information or resubmits a dispute and does not provide additional or new supporting information, a CRA or furnisher may determine that the dispute is frivolous or irrelevant and does not warrant an investigation. Representatives from one CRA told us that if the CRA receives a dispute from a consumer about an item that was previously disputed, it would review consumer records to see if it has verified the consumer’s information previously. If so, the CRA would ask the consumer to provide additional documentation or to contact the furnisher to obtain support for the dispute. In some cases, consumers may turn to third parties that submit disputes on their behalf. Representatives from one CRA said that the CRA does not investigate disputes that certain third parties submit on behalf of consumers because these third parties dispute the same items repeatedly. Representatives from another CRA said that the CRA reviews third-party dispute requests to determine if the third party has proper authorization from consumers to act on their behalf. Submitting complaints to federal and state agencies. Consumers can submit complaints about inaccuracies in their consumer reports to federal and state agencies, such as CFPB and state Attorney General offices. CFPB has stated that it forwards these complaints to CRAs and works with them to obtain responses within 15 days. Staff from several state agencies we interviewed generally told us that after receiving complaints, they contact CRAs about the complaints to obtain responses but do not compel CRAs to take specific actions. CFPB has reported that CRAs handle complaints similarly to consumer disputes. As a result, although complaints are separate from the dispute process required under FCRA, the effectiveness of this option also depends on the same CRA processes for addressing inaccuracies. However, representatives from two consumer groups said that submitting complaints to CFPB through its consumer complaint database has helped consumers resolve inaccuracies in their reports. Representatives from one consumer group said the publication of complaints in CFPB’s database helps to hold CRAs accountable and incentivizes CRAs to respond. Taking private legal action. Under FCRA, consumers have private rights of action—or ability to litigate—against CRAs and furnishers, under certain provisions. Consumers have brought legal claims against CRAs and furnishers for failure to follow reasonable procedures to assure maximum possible accuracy or conduct a reasonable investigation of a dispute. Under FCRA, consumers can sue a furnisher for failure to conduct a proper investigation when notified by a CRA that a consumer has disputed information provided by the furnisher. However, before initiating suit, the consumer must first dispute the information with the CRA. A consumer may initiate a dispute through a CRA even if the consumer has previously initiated a dispute with the furnisher. Representatives from two consumer groups and one state agency told us that in general, consumer barriers to litigation include that it is time-consuming and has potentially high legal costs and that consumers might be unaware of their legal rights. As a result of CFPB and FTC oversight and settlements with multiple state Attorneys General, the nationwide CRAs and several other CRAs have made changes in their policies and procedures to improve data accuracy and processes for addressing inaccuracies in consumer reports. However, CFPB and a few industry stakeholders said that challenges to improving accuracy in consumer reports remain. According to CFPB and nationwide CRAs, examples of the changes that CRAs have made as a result of oversight include the following: Changes as a result of CFPB supervision. According to CFPB, as a result of supervisory findings, one or more CRAs have implemented or changed policies and procedures related to ensuring accuracy and dispute investigations. These include (1) establishing a data- governance structure to oversee furnisher monitoring, such as by developing policies and procedures for ongoing and systemic screening of furnishers; (2) implementing systems to forward relevant dispute documents submitted by consumers to furnishers; and (3) implementing policies and procedures to ensure consideration of all supporting material submitted by consumers. Changes as a result of CFPB and FTC enforcement. As a result of CFPB’s and FTC’s enforcement, the two agencies directed a few CRAs to revise the procedures they use to match data using personally identifiable information. For example, CFPB directed two background-screening CRAs to revise procedures for assuring accuracy, such as by using algorithms to distinguish records by middle name and to match common names and nicknames. In another example, FTC directed a background-screening CRA that required an exact match of a consumer’s last name and a nonexact match of first name, middle name, and date of birth to put in place reasonable procedures to ensure maximum possible accuracy. Changes as a result of state oversight. According to the three nationwide CRAs, they have implemented measures as a result of their 2015 settlements with multiple state Attorneys General. For example, they stated they monitor data furnishers’ dispute responses and take corrective actions against data furnishers for noncompliance with their dispute investigation responsibilities. Additionally, they established special handling procedures for disputes involving mixed files, fraud, and identity theft and provided CRA employees with discretion to resolve such disputes, rather than relying on furnishers’ responses. In addition to the changes described above, representatives at various CRAs said they had quality assurance processes in place to help ensure that furnished data are accurate and that furnishers are responsive to disputes. Monitoring of furnished data. Representatives from four CRAs said that they use various mechanisms to monitor furnished data to detect potential inaccuracies and take corrective actions against furnishers that do not comply with data furnishing standards. For example, representatives from three CRAs told us they compare data submissions against industry patterns and historical trends—such as data submission history over the past 6 months—to identify anomalies that would suggest erroneous data and take actions such as rejecting incoming data and returning data for correction. Representatives from one of these CRAs said that they analyze why a furnisher deviates from industry trends and help the furnisher identify and implement changes. Representatives from four CRAs told us that they provide regular reports, such as monthly reports, on data quality to furnishers. We reported previously that such steps may improve the quality of the information received from furnishers but cannot ensure the accuracy of such data. Monitoring of dispute investigations. Representatives from four CRAs said they have processes in place to help ensure that furnishers are responsive to disputes. For example, representatives from one CRA said that the automated system they use to correspond with furnishers about disputes automatically identifies illogical furnisher responses; the CRA contacts the furnisher to confirm the accuracy of those responses. Representatives from four CRAs told us that they monitor furnisher responses to disputes, such as dispute trends by furnisher type and the rate at which furnishers do not respond to disputes. Although CRAs have made changes to improve processes for ensuring accuracy and addressing inaccuracies, CFPB and industry stakeholders said that challenges remain in these areas. First, CFPB staff told us that the consumer reporting market has historically had comparatively less regulatory intervention than other regulated markets. As a result, the staff said that it has been challenging to change CRAs’ approach to a proactive one, whereby the CRAs proactively address compliance and change practices, as opposed to a defensive, reactive approach in response to consumer disputes and lawsuits. CFPB staff explained that this has been a focus of CFPB’s supervision and said that its examination findings have demonstrated that CRAs can take actions to improve accuracy. Further, representatives from three consumer groups said that consumer report inaccuracy remains a challenge because CRAs lack incentives to be responsive to consumers, in part because the CRAs’ customers are the users of consumer reports, such as banks and employers, rather than the consumers themselves. Additionally, two industry stakeholders identified gaps in furnisher responsibilities for ensuring accuracy as a challenge. Representatives from one of these stakeholders, a state agency, said that furnishers often do not know their responsibilities for ensuring the accuracy of their data. Representatives from the other stakeholder, a CRA, said that while the CRA has implemented policies and procedures to ensure accuracy in response to CFPB’s supervision, furnishers might not have implemented similar policies and procedures to ensure the accuracy of the data provided. Consumer reports affect the lives of millions of Americans because of the role they play in many important decisions, such as whether a lender decides to extend credit and at what terms or whether an employer offers a candidate a job. Therefore, it is important for CRAs to produce reports that are accurate and for consumers to have appropriate procedures available to correct any inaccuracies in their consumer reports, including disputing inaccuracies. We found that opportunities exist for CFPB to improve its oversight of CRAs. As part of its supervision, CFPB has directed CRAs it has examined to make specific changes based on examination findings related to FCRA requirements for (1) reasonable procedures for assuring accuracy and (2) reasonable investigation of consumer disputes. However, CFPB has not defined its expectations for how CRAs can comply with these requirements. Providing additional information to CRAs about its expectations for key FCRA requirements could help CFPB achieve its vision of promoting a consumer reporting system where CRAs maintain and distribute accurate data, supplemented by effective dispute resolution processes. Additionally, such information could help to promote consistency and transparency in CFPB’s supervisory approach. We are making two recommendations to CFPB: The Director of CFPB should communicate to CRAs its expectations regarding reasonable procedures for assuring maximum possible accuracy of consumer report information. (Recommendation 1) The Director of CFPB should communicate to CRAs its expectations regarding reasonable investigations of consumer disputes. (Recommendation 2) We provided a draft of this report to CFPB, the Federal Reserve, FDIC, FTC, NCUA, and OCC for review and comment. We received written comments from CFPB, which are summarized below and reprinted in appendix II. CFPB, the Federal Reserve, FDIC, and FTC provided technical comments, which we incorporated as appropriate. In email responses, officials indicated that NCUA and OCC did not have any comments on the draft of this report. In its written comments, CFPB neither agreed nor disagreed with the recommendations. CFPB stated that it has made oversight of the consumer reporting market a top priority and that its supervisory reviews of CRAs have focused on evaluating their systems for assuring the accuracy of data used to prepare consumer reports. CFPB noted that CRAs have made significant advances to, among other things, promote greater accuracy. With respect to the first recommendation—that CFPB should communicate to CRAs its expectations regarding reasonable procedures for assuring maximum possible accuracy—CFPB noted that case law includes interpretations of the reasonableness standard and provides guidance to CRAs about how the standard applies to various factual scenarios. CFPB also noted that it and FTC have settled enforcement actions regarding the reasonableness standard in which each agency provided examples of how it applied the standard and the relevant case law to the facts of each matter and described a consent order with two background-screening companies that made clear that a lack of certain written procedures was not reasonable. Additionally, CFPB noted that its examination procedures discuss factors that would be considered in evaluating compliance with the reasonable procedures standard and that it publishes “Supervisory Highlights” that document key examination findings. While we agree that case law may provide information to CRAs regarding how courts have interpreted the reasonableness standard in specific circumstances, as we note in the report, there may be a lack of clarity about the extent to which all case law fully reflects CFPB’s expectations. Absent additional information from CFPB, the current case law and case- by-case enforcement actions may not best serve to enable CRAs to proactively address compliance practices. More direct communication of CFPB’s expectations can provide CRAs with clearer information on what they should be doing and what actions might constitute a FCRA violation. Similarly, while FTC and CFPB have settled actions with certain CRAs regarding reasonable procedures, such settlements may be applicable only to the specific facts and circumstances and the parties involved in those cases. CFPB’s examination procedures provide information on factors that would be considered in evaluating compliance and areas that may be reviewed in examinations, but they do not provide information on CFPB’s oversight expectations regarding how CRAs may comply with the FCRA requirement for reasonable procedures. Likewise, while CFPB’s Supervisory Highlights provide information on key examination findings, the Supervisory Highlights do not represent CFPB’s expectations for how CRAs may or should comply with the reasonableness standard. For example, the Supervisory Highlights state that the legal violations described are based on particular facts and circumstances and may not lead to such findings under different facts and circumstances. With respect to the second recommendation—that CFPB should communicate to CRAs its expectations regarding reasonable investigations of consumer disputes—CFPB stated that what qualifies as a “reasonable investigation” has been articulated in court cases and noted that an FTC report summarizes how the reasonable investigations standard has been interpreted by courts and FTC. While we acknowledge that FTC may have interpreted and the courts may have ruled on this issue, CFPB has not communicated to CRAs specific information on what may and may not qualify as a “reasonable investigation.” CFPB also stated that it issued a bulletin in September 2013 that is relevant to this recommendation. However, in that bulletin, CFPB restated FCRA requirements and emphasized their importance, but it did not provide further information on what practices may represent a “reasonable investigation” or what it expects of CRAs. CFPB noted that it has and will continue to communicate its expectations to CRAs. As stated in our report, communicating information about CFPB’s compliance expectations and ways in which CRAs could comply could help to ensure that CRAs receive complete and clear information about how to comply with key FCRA requirements. CFPB could provide such information in several ways; for example, CFPB has put consumer reporting issues on its rulemaking agenda since 2015. We maintain that providing additional information to CRAs about its expectations for key FCRA requirements could help CFPB to promote consistency and transparency in its supervisory approach and that the recommendations should be addressed. We are sending copies of this report to the appropriate congressional committees and financial regulators, and other interested parties. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or OrtizA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. Our objectives for this review were to (1) describe the current oversight framework for consumer reporting agencies (CRA), (2) examine how the Consumer Financial Protection Bureau (CFPB) has overseen CRAs and entities that furnish consumer data, (3) examine how other federal agencies, including the Federal Trade Commission (FTC) and the prudential regulators, have overseen CRAs and entities that furnish consumer data, and (4) identify what is known about the causes of inaccuracies in consumer reports and the processes that are in place to help ensure accuracy. Some information has not been included in this public report because CFPB determined it was information prohibited by law from public disclosure. This report omits such information, but we will be issuing a nonpublic version of this report that includes all the information. Although the information provided in this report is more limited, it addresses the same objectives as the sensitive nonpublic report and uses the same methodology. To describe the oversight framework for CRAs, we identified and reviewed relevant federal laws and their application for CRAs and institutions that furnish data to CRAs (called furnishers). We identified and reviewed laws focused on the accuracy of consumer reports, the security of consumer information, and the use and sharing of consumer reports. These laws include the Fair Credit Reporting Act (FCRA) and its implementing regulation, Regulation V, the Gramm-Leach-Bliley Act, the Dodd–Frank Wall Street Reform and Consumer Protection Act, the Federal Trade Commission Act, and the Economic Growth, Regulatory Relief, and Consumer Protection Act. We interviewed staff from CFPB, FTC, and the prudential regulators—the Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, the National Credit Union Administration, and the Office of the Comptroller of the Currency—about applicable laws and regulations for CRAs and furnishers and their oversight authority over CRAs and furnishers. Additionally, we interviewed five categories of stakeholders to learn about federal and state oversight over CRAs: state agencies such as Attorney General offices and regulators, CRAs, groups representing state agencies, industry groups representing CRAs, and consumer groups. We selected four states—Maine, Maryland, New York, and Ohio—for a more in-depth review. We chose these states because they had laws and regulations related to consumer reporting or had oversight activities involving CRAs, such as prior enforcement actions. We interviewed staff from state regulatory agencies in Maine, Maryland, and New York, as well as staff from the New York Office of the Attorney General. In addition, we received written responses to our questions from the Ohio Office of the Attorney General. In each case, we asked questions about state oversight of CRAs, including the relevant state laws and state enforcement, rulemaking, and supervisory authorities. We interviewed three nationwide CRAs and four smaller or specialty CRAs that produce or compile consumer reports covering the credit and background-screening markets about federal and state oversight, including applicable laws. We selected these CRAs because of potential differences in oversight based on their size and market. In our selection, we considered the size of the CRA and the number of consumer complaints in CFPB’s database. We also interviewed two industry groups representing CRAs (the Consumer Data Industry Association and the National Association of Professional Background Screeners); two groups representing states (the Conference of State Bank Supervisors and the National Conference of State Legislatures); and four consumer groups (Consumers Union, the National Association of Consumer Advocates, the National Consumer Law Center, and U.S. Public Interest Research Group). We asked these groups about federal and state authorities for overseeing CRAs. We selected these groups because, based on our analysis of publicly available information and interviews with federal agencies, they are the primary organizations representing stakeholders in our review, such as CRAs, or have existing work, such as reports or testimonies, related to CRAs. The groups we included and the views they represent reflect a range of stakeholders but do not necessarily reflect the full scope of the industry. To examine how CFPB has overseen CRAs and furnishers, we interviewed CFPB staff about CFPB’s supervision and enforcement strategies and activities, and we reviewed relevant documents, including supervisory and examination documents. To examine CFPB’s supervisory strategies and activities, we reviewed CFPB’s supervisory plans that document how CFPB determined which CRAs and furnishers to examine and which compliance areas to examine. We also reviewed CFPB’s public reports, such as Supervisory Highlights, and nonpublic examination documents to evaluate CFPB’s supervisory activities for both CRAs and furnishers. To learn about CFPB’s enforcement strategies and enforcement activities in the consumer reporting market, we reviewed the types of enforcement actions available to CFPB for violations of relevant laws, and we identified specific enforcement actions CFPB brought against CRAs and furnishers for violations related to FCRA and Regulation V from 2012 through 2018. We identified these enforcement actions by reviewing CFPB’s publicly available enforcement activities on its website, and we corroborated our results with CFPB. We also interviewed stakeholders, including CRAs, consumer groups, state agencies, and state groups, to obtain their views on CFPB’s oversight. To examine how FTC and the prudential regulators have overseen CRAs and furnishers, we interviewed staff from FTC and the prudential regulators to discuss the agencies’ oversight and enforcement activities. To learn about FTC’s enforcement strategies and activities in the consumer reporting market, we reviewed the types of enforcement actions available to FTC for violations of relevant laws, interviewed FTC staff regarding the process for initiating investigations and the investigations FTC conducted, and identified specific enforcement actions brought against CRAs and furnishers for violations related to FCRA, Regulation V, and FTC’s Furnisher Rule from 2010 through 2018. We identified these enforcement actions by reviewing FTC’s publicly available enforcement activities on its website, and we corroborated our results with FTC. To learn about prudential regulators’ activities, we reviewed the prudential regulators’ policies and procedures for examining furnishers and interviewed regulators’ staff. We also collected information from the regulators about their FCRA-related findings for furnishers from 2013 through 2018. To identify what is known about the causes of inaccuracies in consumer reports and the processes that are currently in place to help ensure accuracy, we conducted interviews with stakeholders. In particular, we interviewed staff from CFPB, FTC, the prudential regulators, and the state agencies to learn about what they believe are the causes of inaccuracies in consumer reports and the options available to consumers to address inaccuracies. Similarly, we interviewed staff at three nationwide CRAs and four smaller or specialty CRAs about the causes of inaccuracies and the processes they have in place for ensuring accuracy and addressing inaccuracies, including the processes in place to meet FCRA requirements for addressing consumer disputes about consumer report information. Additionally, we spoke with staff from four consumer and two industry groups (described above) to gain their perspectives on the causes of inaccuracies and processes in place to address them. We also conducted a literature search on the causes of inaccuracies in consumer reports and processes in place to help ensure accuracy. The search covered academic literature and court cases from 2008 through 2018 and used subject and keyword searches of various databases, such as ProQuest, Westlaw, and CQ. The literature search resulted in limited relevant information. However, we identified reports from CFPB and FTC that included information on the causes of inaccuracies in consumer reports, as well as information CFPB has published, such as Supervisory Highlights, on the processes CRAs have in place to help ensure accuracy. Additionally, through our interviews, we identified information that stakeholders, such as the National Consumer Law Center, have published on these issues. We conducted this performance audit from July 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Kevin Averyt (Assistant Director), Weifei Zheng (Analyst in Charge), Yue Pui Chin, Sergio Enriquez, Marc Molino, Stephen Ruszczyk, Kelsey Sagawa, Jessica Sandler, Jennifer Schwartz, and Farrah Stone made key contributions to this report.", "summary": "CRAs collect data from various sources, such as banks and credit card companies, to create consumer reports that they sell to third parties. The three largest CRAs hold information on more than 200 million Americans. The Economic Growth, Regulatory Relief, and Consumer Protection Act, enacted in 2018, included a provision for GAO to examine issues related to the consumer reporting market. This report examines, among other objectives, the causes of consumer report inaccuracies and how CFPB has overseen CRAs. To answer these questions, GAO reviewed relevant laws, regulations, and agency documents related to CRA oversight. GAO interviewed representatives of federal agencies and stakeholders, including a nongeneralizable selection of state agencies from four states that had laws or oversight activities involving CRAs and seven CRAs selected based on size and the type of consumer reports produced. GAO also interviewed groups representing state agencies, consumers, and CRAs selected to reflect a range of stakeholders or based on their work related to CRAs. Businesses and other entities use consumer reports to make decisions about consumers, such as whether they are eligible for credit, employment, or insurance. Consumer report inaccuracies can negatively affect such decisions. The Consumer Financial Protection Bureau (CFPB) and other stakeholders identified various causes of consumer report inaccuracies, such as errors in the data collected by consumer reporting agencies (CRA) and CRAs not matching data to the correct consumer. In 2010, CFPB was granted supervisory and enforcement authority over CRAs. In using its oversight authorities, CFPB has prioritized CRAs that pose the greatest potential risks to consumers—such as those with significant market shares and large volumes of consumer complaints—for examination. CFPB's oversight has generally focused on assessing compliance with Fair Credit Reporting Act (FCRA) requirements regarding accuracy and the investigations CRAs conduct in response to consumer disputes. For example, since 2013, CFPB has conducted examinations of several CRAs and directed specific changes in CRAs' policies and procedures for ensuring data accuracy and conducting dispute investigations. CFPB has not defined its expectations for how CRAs can comply with key statutory requirements. FCRA requires CRAs (1) to follow reasonable procedures for ensuring maximum possible accuracy and (2) to conduct reasonable investigations of consumer disputes. CFPB has identified deficiencies related to these requirements in its CRA examinations, but it has not defined its expectations—such as by communicating information on appropriate practices—for how CRAs can comply with these requirements. Absent such information, staff from four CRAs GAO interviewed said that they look to other sources, such as court cases or industry presentations, to understand what CFPB will consider to be noncompliant during examinations. A 2018 policy statement issued by CFPB and other regulators highlighted the important role of supervisory expectations in helping to ensure consistency in supervision by providing transparent insight to industry and to supervisory staff. By providing information to CRAs about its expectations for complying with key FCRA requirements, CFPB could help achieve its goal of accurate consumer reporting and effective dispute resolution processes. Such information also could help to promote consistency and transparency in CFPB's supervisory approach. CFPB should communicate to CRAs its expectations regarding (1) reasonable procedures for assuring maximum possible accuracy and (2) reasonable investigations of consumer disputes. CFPB described actions it has taken to provide information to CRAs. GAO maintains that communicating expectations in these two areas is beneficial, as discussed in the report.", "document_type": "gao"}
{"report": "As part of our audit of the fiscal years 2018 and 2017 CFS, we considered the federal government’s financial reporting procedures and related internal control. Also, we determined the status of corrective actions Treasury and OMB have taken to address open recommendations relating to their processes to prepare the CFS, detailed in our previous reports that remained open as of the completion of our fiscal year 2017 audit. A full discussion of our scope and methodology is included in our March 2019 report on our audit of the fiscal years 2018 and 2017 CFS. We have communicated each of the control deficiencies discussed in this report to your staff. We performed our audit in accordance with U.S. generally accepted government auditing standards. We believe that our audit provides a reasonable basis for our findings and recommendations in this report. During our audit of the fiscal year 2018 CFS, we identified three new internal control deficiencies in Treasury’s processes used to prepare the CFS. Specifically, we found that (1) Treasury did not have sufficient procedures to analyze and determine whether appropriate disclosures related to new federal accounting standards were included in the draft fiscal year 2018 Financial Report; (2) Treasury did not have sufficient procedures to properly support and consistently report restatements, reclassifications, and adjustments to beginning net position reported in the draft fiscal year 2018 Financial Report; and (3) Treasury and OMB did not have adequate processes and procedures for reporting appropriate information regarding legal contingency losses in the fiscal year 2018 CFS. During our fiscal year 2018 CFS audit, we found that Treasury did not have sufficient procedures to analyze and determine whether appropriate disclosures related to new federal accounting standards were included in the draft fiscal year 2018 Financial Report. Treasury uses working groups, disclosure checklists, and other tools to assist in determining appropriate reporting in accordance with new standards. Treasury’s procedures include working with federal entities during the fiscal year to determine the reporting required based on new standards. Treasury presents the new standards for discussion at monthly Central Reporting Team meetings that include financial reporting representatives from federal entities. Treasury also establishes working groups for certain new standards, such as the working group established for the Federal Accounting Standards Advisory Board’s (FASAB) Statement of Federal Financial Accounting Standards (SFFAS) 47, Reporting Entity, to work with federal entities on their implementation. Treasury also utilizes a financial reporting disclosure checklist to help determine that all disclosures required by FASAB standards are included in the CFS. Treasury updates this disclosure checklist throughout the fiscal year and completes the checklist as a key focus of the CFS compilation process. Although Treasury has processes in place for the implementation of new standards, certain disclosures required by new standards were not included in the draft fiscal year 2018 Financial Report. For example, the draft fiscal year 2018 Financial Report did not include disclosures related to federal government land assets, such as the number of acres held at the end of each reporting period, explanations of federal entities’ election to include or exclude land and land rights from their opening balances, and a reference to the component reporting entity’s financial report, as required by SFFAS 50, Establishing Opening Balances for General Property, Plant, and Equipment. In addition, the draft fiscal year 2018 Financial Report did not include disclosures related to significant component entity amounts included in certain CFS line items that were determined in accordance with Financial Accounting Standards Board (FASB) standards rather than FASAB standards, in accordance with SFFAS 47. SFFAS 34, The Hierarchy of Generally Accepted Accounting Principles, Including the Application of Standards Issued by the Financial Accounting Standards Board, provides that general purpose federal financial reports prepared in conformity with accounting standards issued by FASB also may be regarded as in conformity with U.S. generally accepted auditing principles (U.S. GAAP). SFFAS 47 permits the consolidation of amounts determined in accordance with FASAB and FASB standards into a single line item without conversion for differences in accounting policies and also provides application guidance that emphasizes the need for disclosures of the different accounting policies and the related amounts to aid financial statement users’ understanding of the information provided. Treasury’s disclosure checklist was not updated in sufficient detail for Treasury accountants to identify appropriate disclosures for inclusion in the draft fiscal year 2018 Financial Report in accordance with these new federal accounting standards. The updated disclosure checklist used for fiscal year 2018 did not include (1) specific details about disclosures required by SFFAS 50 for land assets, such as the number of acres added or disposed of during the reporting period, and (2) questions to help determine the need for disclosures to communicate the effect on certain CFS line items that include material amounts determined using accounting policies in accordance with FASB standards rather than FASAB standards, as SFFAS 47 allows. Also, Treasury did not calculate in aggregate the amounts that are reported in the CFS on a FASB basis by line item in order to determine line items where the disclosures were needed. We communicated these matters to Treasury officials, who conducted a comprehensive analysis and included disclosures in the final fiscal year 2018 Financial Report, as appropriate. In addition, although Treasury established a working group to help implement SFFAS 47, Treasury’s procedures did not provide for sufficient consultation with technical experts in interpreting new standards and updating the disclosure checklist to reasonably assure that all requirements related to the new standard were incorporated during implementation. Actively consulting with technical experts, such as members of FASAB, the body designated as the source of U.S. GAAP for federal reporting entities, would help minimize the risk of misinterpreting the standards or presenting and disclosing information in the Financial Report that is incorrect, inconsistent, or incomplete. Standards for Internal Control in the Federal Government states that one of the key objectives of an organization’s internal control over financial reporting is to provide reasonable assurance as to the reliability of its financial reporting, including its financial statements and note disclosures. Accompanying notes are an integral part of financial statements and provide additional disclosures that are necessary to make the financial statements more informative. Without sufficient procedures for analyzing and determining the appropriate reporting of disclosures required by new federal accounting standards, Treasury cannot reasonably assure that disclosures included in the Financial Report are reliable and complete. We recommend that the Secretary of the Treasury should ensure that the Fiscal Assistant Secretary develops and implements procedures to enhance Treasury’s processes for reasonably assuring that the Financial Report includes disclosures required by new federal accounting standards, such as conducting an appropriate level of analysis to determine whether disclosures are needed, consulting with technical experts, and including additional details on these requirements in its financial reporting disclosure checklists. (Recommendation 1) During our fiscal year 2018 CFS audit, we found that Treasury did not have sufficient procedures to properly support and consistently report restatements, reclassifications, and adjustments to beginning net position in the draft fiscal year 2018 Financial Report. Treasury identifies changes to prior year amounts (either restatements or reclassifications) and adjustments to current year beginning net position based on its review of information that significant component entities submit to Treasury and applicable FASAB standards. Treasury also performs procedures to determine the consistency of such reporting with significant component entities’ audited financial statements. Treasury’s Subject Matter Analysis standard operating procedure includes steps for Treasury’s staff to obtain financial information from significant component entities and to prepare the draft Financial Report. According to these procedures, Treasury’s staff uses third quarter financial data that significant component entities report and other information to obtain a preliminary understanding of potential changes to prior year amounts and adjustments to beginning net position. Treasury’s staff compares these preliminary results to the entities’ year-end information and compares beginning net position amounts reported for the current year to ending net position amounts reported the prior year to identify changes to prior year amounts. The staff then prepares a table categorizing such changes as restatements, reclassifications, or adjustments to beginning net position. This table includes a separate line for each of the significant component entities but does not include separate lines for each line item or note disclosure affected. Treasury uses this table to prepare a summary analysis of its conclusions for reporting restatements, reclassifications, and adjustments to beginning net position and related note disclosures presented in the draft Financial Report. The subject area manager reviews the results of the procedures that Treasury’s staff performed and documented. Although Treasury’s staff followed these procedures for fiscal year 2018, we found that Treasury did not always maintain sufficient support for restatements, reclassifications, and adjustments to beginning net position included in the draft fiscal year 2018 Financial Report. For example, Treasury reported an adjustment to beginning net position but did not identify errors made in prior years to support such an adjustment. Treasury also reported that restatements affected the Statement of Changes in Cash Balance from Budget and Other Activities, but supporting documentation provided by Treasury for the draft fiscal year 2018 Financial Report did not clearly indicate how this statement was affected by restatements. Treasury included a summary of significant accounting policies in Note 1 to the CFS as required by U.S. GAAP, which contained information about restatements, reclassifications, and adjustments to beginning net position. However, Treasury did not disclose consistent information in related line item notes, such as those for loans receivable and loan guarantee liabilities, federal employee and veteran benefits payable, and funds from dedicated collections in the draft fiscal year 2018 Financial Report. Treasury included information in its summary analysis and supporting documentation that was not consistent with information that significant component entities reported. Although Treasury’s processes did not identify these inconsistencies, Treasury corrected them in response to our questions. We found that Treasury did not identify these inconsistencies, in part, because its subject matter review procedures did not include steps for coordinating with Treasury managers of other subject matter areas to reasonably assure consistency and appropriate support for conclusions. Also, although Treasury’s process involved preparing a summary of analyses performed, Treasury’s process did not include steps or other tools to reasonably assure that consistent information was communicated in all financial statement line items and note disclosures affected by restatements, reclassifications, and adjustments to net position. SFFAS 21, Reporting of Corrections of Errors and Changes in Accounting Principles, requires that reporting entities restate prior period financial statements for material errors discovered in the current period, if such statements are provided for comparative purposes and if the effect of an error would be material to the financial statements in either period. If not material, corrections should be made to the beginning balance of cumulative results of operations in the statement of changes in net position. A reclassification is the movement of a prior year amount in comparative financial statements in order to conform to the current year presentation. Standards for Internal Control in the Federal Government states that management should (1) design control activities to achieve objectives and respond to risks, such as procedures to help reasonably assure that financial information is completely and accurately reported, and (2) implement control activities, such as documenting responsibilities through policies and procedures. Management should periodically review policies, procedures, and related control activities for continued relevance and effectiveness in achieving objectives. Without sufficient procedures for reporting restatements, reclassifications, and adjustments to beginning net position, there is an increased risk of presenting information that is inaccurate or incomplete in the Financial Report. We are making the following two recommendations to Treasury: The Secretary of the Treasury should ensure that the Fiscal Assistant Secretary enhances existing procedures for Treasury management to perform additional reviews for restatements, reclassifications, and adjustments to beginning net position to reasonably assure that they are properly supported and accurately reported. (Recommendation 2) The Secretary of the Treasury should ensure that the Fiscal Assistant Secretary develops and implements steps to reasonably assure that restatements, reclassifications, and adjustments to beginning net position are consistently reported in the Financial Report, such as developing a tool that identifies all affected financial statement line items and note disclosures. (Recommendation 3) During our fiscal year 2018 CFS audit, we found that Treasury and OMB did not have adequate processes and procedures for reporting appropriate information regarding legal contingency losses in the fiscal year 2018 CFS. Significant component entities are responsible for properly accounting for and reporting legal contingency losses in their entity-level financial statements and submitting this information to Treasury for inclusion in the CFS. For each entity-level financial statement audit, U.S. generally accepted government auditing standards require that component entity auditors obtain written legal representations as part of the audit. The significant component entities provide interim and final legal representation letters, along with management schedules, to Treasury, the Department of Justice (DOJ), and GAO. According to DOJ’s established process, its legal counsel reviews individual cases included in these legal representation letters for which the potential loss exceeds $500 million individually or in the aggregate for similar cases. DOJ is responsible for preparing and submitting an interim and final government-wide legal representation letter to Treasury and GAO, containing its assessment of the potential litigation losses, including whether there are litigation, claims, or assessments that were not addressed in the significant component entities’ legal representation letters that DOJ believes should have been reported or which DOJ believes should have been reported differently. Treasury’s procedures call for it to determine whether the financial statement information that the significant component entities submitted and Treasury used to compile the fiscal year 2018 CFS is consistent with the significant component entities’ management schedules, legal representation letters, and the government-wide legal representation letter. For fiscal year 2018, Treasury identified various inconsistencies among the significant component entities’ financial statement information, management schedules, and legal representation letters as well as inconsistencies between the government-wide legal representation letter and the significant component entities’ management schedules and legal representation letters. There may be appropriate reasons for these differences. For example, although management often relies on advice of legal counsel on the likelihood of loss and estimate of the amount or range of potential loss, as reflected in the legal representation letter, management is ultimately responsible for determining whether the loss should be recognized as a liability or disclosed in the notes to the financial statements. As such, management may make a different determination as to the likelihood of loss or estimated loss amounts than those in the legal counsel’s assessment. Also, differences between the government-wide legal representation letter and the significant component entities’ legal representation letters can occur in situations in which DOJ has more current information on the likelihood of loss and estimated loss amounts. However, Treasury was not always able to timely determine whether there were appropriate reasons for the differences it identified or whether adjustments were needed to the legal contingency loss information reported in the fiscal year 2018 CFS. Based on our work, we found that certain of these differences required correction in the fiscal year 2018 CFS. For example, Treasury noted that one significant component entity included estimated loss amounts for reasonably possible cases in its management schedule and that such amounts were not reported in the financial information provided to Treasury for consolidation. Because Treasury was unable to timely resolve the issue, the fiscal year 2018 CFS was not appropriately adjusted to include these amounts. Further, DOJ did not provide us the final government-wide legal representation letter as of our audit completion date. Although Treasury has procedures for reviewing and analyzing the significant component entities’ legal contingency loss information and the government-wide legal representation letter, we found that Treasury lacked effective processes and procedures to reasonably assure that appropriate information regarding legal contingency losses was reported in the fiscal year 2018 CFS. Specifically, Treasury did not have sufficient processes and procedures to obtain the needed information in a manner that would facilitate the timely compilation of the legal contingency loss information for inclusion in the fiscal year 2018 CFS or for timely resolving issues identified during its review. For example, as part of Treasury’s procedures, it compares the estimated loss amounts for reasonably possible and probable cases included in the significant component entities’ management schedules with the financial statement information that the significant component entities report for inclusion in the fiscal year 2018 CFS. If discrepancies are greater than 10 percent, Treasury’s procedures call for significant component entities to provide an explanation. However, because of the extensive amount of time needed to perform this analysis, Treasury was not always able to timely follow up and resolve the differences with the significant component entities. SFFAS 5, Accounting for Liabilities of The Federal Government, as amended by SFFAS 12, Recognition of Contingent Liabilities Arising from Litigation, contains accounting and reporting standards for loss contingencies, including those arising from litigation, claims, and assessments. An entity should recognize a liability and a related charge to expense for an estimated loss from a loss contingency only when (1) a past event or exchange transaction has occurred, (2) a future outflow or other sacrifice of resources is probable, and (3) the future outflow or sacrifice of resources is measurable. A contingent liability should be disclosed if any of the conditions for liability recognition are not met and there is at least a reasonable possibility that a loss or an additional loss may have been incurred. Disclosure should include the nature of the contingency and an estimate of the possible liability, an estimate of the range of possible liability, or a statement that such an estimate cannot be made. OMB Bulletin 19-01 provides guidance to federal agencies on the preparation of legal letters and management schedules, and the Treasury Financial Manual provides federal agencies the legal letter reporting requirements. Also, Standards for Internal Control in the Federal Government provides that management should design control activities to achieve objectives and respond to risks. For example, management should design control activities so that financial information is completely and accurately reported. Until the federal government implements effective processes and procedures to obtain and assess information regarding legal contingency losses, the reliability of amounts and disclosures associated with legal loss contingencies reported in the CFS and the ability to assess their potential effect on the financial condition of the federal government will be limited. We recommend that the Secretary of the Treasury should ensure that the Fiscal Assistant Secretary, working in coordination with the Controller of OMB, establishes effective processes and procedures to reasonably assure that appropriate information regarding legal contingency losses is reported in the CFS. (Recommendation 4) At the completion of our fiscal year 2017 audit, 14 recommendations were open from our prior reports regarding control deficiencies in the processes used to prepare the CFS. During our fiscal year 2018 CFS audit, we found that Treasury, in coordination with OMB, implemented corrective actions that resulted in significant progress in resolving certain of the control deficiencies addressed by our prior recommendations. For two recommendations, the corrective actions resolved the related control deficiencies, and we closed the recommendations. While progress was made, 12 recommendations from our prior reports remained open as of March 20, 2019, the date of our report on the audit of the fiscal year 2018 CFS. These continuing control deficiencies contributed to the three material weaknesses that relate to the federal government’s processes used to prepare the CFS. Consequently, a total of 16 recommendations need to be addressed—12 remaining from prior reports and the four new recommendations we are making in this report. Appendix I summarizes the status as of March 20, 2019, of the 14 open recommendations from our prior years’ reports according to Treasury and OMB, as well as our own assessment and additional comments, where appropriate. Various efforts are under way to address these recommendations. As part of our fiscal year 2019 CFS audit, we will continue to monitor Treasury’s and OMB’s progress in addressing our recommendations. We provided a draft of this report to Treasury for comment. In its written comments, reproduced in appendix II, Treasury concurred with our four new recommendations. Treasury agreed that new processes and procedures would enhance its internal controls over the processes used to prepare the CFS. It also described actions it will take, and has taken, to address these recommendations as well as certain open recommendations from our prior reports that are summarized in appendix I of this report. Treasury also provided technical comments, which we incorporated as appropriate. Treasury stated that it implemented process improvements that addressed three of the new recommendations, which resulted from our review of the draft fiscal year 2018 Financial Report, prior to the publication of the final report. These three recommendations are aimed at enhancing Treasury’s processes related to (1) including appropriate disclosures required by new federal accounting standards in the Financial Report and (2) supporting and consistently reporting restatements, reclassifications, and adjustments to beginning net position. In our report, we acknowledged that Treasury addressed the need for certain additional disclosures related to new federal accounting standards and inconsistencies related to restatements, reclassifications, and adjustments to beginning net position in the final fiscal year 2018 Financial Report. However, addressing the specific issues we identified in the draft fiscal year 2018 Financial Report does not fully address our recommendations and Treasury did not provide sufficient documentation supporting its efforts to develop and implement or enhance procedures or other steps to reasonably assure that the Financial Report is complete and accurate related to these areas. Treasury also stated that it will work on addressing the remaining recommendation. Regarding five open recommendations from our prior year reports related to treaties and other international agreements, Treasury stated that its existing controls provide reasonable assurance that there are no material misstatements in the Financial Report and that it worked with federal entities in fiscal year 2018 to obtain reasonable assurance that proper amounts and disclosures are reported as commitments and contingencies. As noted in appendix I, Treasury established three broad categories to help agencies in classifying treaties and other international agreements with respect to their potential financial implications. The establishment of three standard categories provides some guidance for identifying and reporting treaties and other international agreements; however, as stated in appendix I, we continue to believe further guidance is needed to determine whether additional disclosure in the CFS is required by U.S. GAAP. The guidance should be consistent with FASAB standards and provide procedures for identifying and assessing all treaties and other international agreements for potential contingencies. Treasury also stated that its efforts to validate the material completeness of budgetary information included in the Financial Report and verify the consistency of such information with federal entity reports are sufficient to address the two open recommendations from our prior year reports related to the Reconciliations of Net Operating Cost and Budget Deficit and the Statements of Changes in Cash Balance from Budget and Other Activities (Reconciliation Statements). As noted in appendix I, Treasury has improved its process by documenting its detailed analyses related to the accrual-based and cash-based effects of federal entities’ transactions included in net operating cost and the budget deficit and by continuing to identify items needed to prepare the Reconciliation Statements. However, as noted in appendix I, we continue to believe additional work is needed to (1) reconcile line items to audited federal entity financial statements and (2) determine the appropriate presentation for the reconciling items, which could affect the line items included. Treasury stated that it appreciates our perspective and will continue to focus its efforts on cost-beneficial solutions to resolve the material conditions that preclude having an opinion rendered on the CFS. Treasury also indicated that it plans to work with GAO as it fulfills its commitment to improving federal financial reporting. As part of our fiscal year 2019 CFS audit, we will determine the status of corrective actions to address the four new recommendations made in this report and the 12 remaining open recommendations from our prior year reports. We provided a draft of this report to OMB for comment. In oral comments, OMB staff in the Office of Federal Financial Management stated that OMB generally agreed with the draft report and Treasury’s written response. OMB noted that the current administration is committed to continuing to work with Treasury and federal agencies to achieve sound financial management across the federal government. This report contains three recommendations to the Secretary of the Treasury and one recommendation to the Secretary of the Treasury, working in coordination with the Controller of OMB. The head of a federal entity is required by 31 U.S.C. § 720, to submit a written statement on actions taken or planned on our recommendations to the Senate Committee on Homeland Security and Governmental Affairs and to the House Committee on Oversight and Reform, the congressional committees with jurisdiction over the programs and activities that are the subject of our recommendations, and GAO not later than 180 days after the date of this report. A written statement must also be sent to the Senate and House Committees on Appropriations with the entity’s first request for appropriations made more than 180 days after the date of this report. Please send your statement of actions to me at simpsondb@gao.gov. We are sending copies of this report to appropriate congressional committees, the Fiscal Assistant Secretary of the Treasury, the Controller of the Office of Management and Budget’s Office of Federal Financial Management, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov/. We acknowledge and appreciate the cooperation and assistance that Treasury and OMB staff members provided during our audit. If you or your staffs have any questions or wish to discuss this report, please contact me at (202) 512-3406 or simpsondb@gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff members who made major contributions to this report are listed in appendix III. Table 1 shows the status of GAO’s prior year recommendations related to the processes used to prepare the consolidated financial statements of the U.S. government. The abbreviations used are defined in the legend at the end of the table. In addition to the contact named above, the following individuals made major contributions to this report: Carolyn M. Voltz and Paul F. Foderaro (Assistant Directors), LaTasha L. Freeman (Auditor-in-Charge), Youssef R. Amrani, Maria Hasan, W. Stephen Lowrey, Fabian J. Mendive, Maria M. Morton, and Kristine A. Papa.", "summary": "The Secretary of the Treasury, in coordination with the Director of OMB, prepares the Financial Report of the United States Government , which contains the CFS. Since GAO's first audit of the fiscal year 1997 CFS, certain material weaknesses and other limitations on the scope of its work have prevented GAO from expressing an opinion on the accrual-based consolidated financial statements. As part of the fiscal year 2018 CFS audit, GAO identified material weaknesses and other continuing control deficiencies in the processes used to prepare the CFS. The purpose of this report is to provide (1) details on new control deficiencies GAO identified related to the processes used to prepare the CFS, along with related recommendations, and (2) the status of corrective actions that Treasury and OMB have taken to address GAO's prior recommendations related to the processes used to prepare the CFS that remained open as of the completion of GAO's audit of the fiscal year 2017 CFS. During its audit of the fiscal year 2018 consolidated financial statements of the U.S. government (CFS), GAO identified control deficiencies in the Department of the Treasury's (Treasury) and the Office of Management and Budget's (OMB) processes used to prepare the CFS. These control deficiencies contributed to material weaknesses in internal control that involve the federal government's inability to adequately account for intragovernmental activity and balances between federal entities; reasonably assure that the consolidated financial statements are (1) consistent with the underlying audited entities' financial statements, (2) properly balanced, and (3) in accordance with U.S. generally accepted accounting principles; and reasonably assure that the information in the (1) Reconciliations of Net Operating Cost and Budget Deficit and (2) Statements of Changes in Cash Balance from Budget and Other Activities is complete, properly supported, and consistent with the underlying information in the audited entities' financial statements and other financial data. During its audit of the fiscal year 2018 CFS, GAO identified three new internal control deficiencies. Treasury did not have sufficient procedures to analyze and determine whether appropriate disclosures related to new federal accounting standards were included in the draft fiscal year 2018 Financial Report of the United States Government . Treasury did not have sufficient procedures to properly support and consistently report restatements, reclassifications, and adjustments to beginning net position in the draft fiscal year 2018 Financial Report of the United States Government . Treasury and OMB did not have adequate processes and procedures for reporting appropriate information regarding legal contingency losses in the fiscal year 2018 CFS. In addition, GAO found that various other control deficiencies identified in previous years' audits with respect to the processes used to prepare the CFS either were resolved or continued to exist. Specifically, Treasury, in coordination with OMB, implemented corrective actions that resolved the control deficiencies related to two of the 14 recommendations open as of the completion of GAO's fiscal year 2017 CFS audit, and as a result, GAO closed these recommendations. While progress was made, 12 of the 14 recommendations remained open as of March 20, 2019, the date of GAO's report on its audit of the fiscal year 2018 CFS. GAO will continue to monitor the status of corrective actions to address the four new recommendations made in this report as well as the 12 open recommendations from prior years as part of its fiscal year 2019 CFS audit. GAO is making four new recommendations—three to Treasury and one to both Treasury and OMB—to address the control deficiencies identified during the fiscal year 2018 CFS audit. In commenting on GAO's draft report, Treasury concurred with the four new recommendations and noted its ongoing commitment to improving federal financial reporting. OMB generally agreed with the draft report and noted its continuing commitment to achieving sound financial management across the federal government.", "document_type": "gao"}
{"report": "The Partnership Program is part of the Bureau’s Integrated Partnership and Communications (IPC) operation, which contains the Bureau’s varied partnership and outreach activities aimed at spreading the word about the importance of participating in the census. Specifically, the IPC operation is intended to: engage and motivate people to self-respond; raise and keep awareness high throughout the entire 2020 Census to encourage response; support field recruitment efforts for a diverse, qualified census workforce; and support dissemination of census data to stakeholders and the public. Several components of the IPC operation, including the Partnership Program, are described in more detail below. Figure 1 also demonstrates these components in example situations. The Partnership Program has two main components that deliver outreach at the national and local levels, respectively: the National Partnership Program (NPP) and the Community Partnership and Engagement Program (CPEP), as shown in table 1. NPP and CPEP are intended to complement and leverage their respective expertise to help maximize participation by partners. According to Bureau officials, the Bureau’s Census Open Innovation Labs is another important component that aims to integrate these partnership activities and provide guidance at the national and local levels on various strategies for messaging with partners. The roughly 1,500 Partnership specialists hired for 2020 are temporary Bureau employees who implement CPEP and are responsible for, among others things, establishing local partnerships and engaging those partners to host activities and events (known as “commitments”) within the communities they serve. These commitments could include activities and events such as conducting knowledge-sharing seminars, issuing press releases, providing questionnaire assistance, producing pamphlets, and hosting field recruiting events, among others. For the 2020 Census, the Bureau had a goal of establishing 300,000 community partners nationwide. In 2010, the Bureau secured approximately 256,000 local partners. The Partnership program also supports inter-governmental census outreach activities through state complete count commissions (SCCCs) at the state level and complete count committees (CCCs) at the tribal and local levels. These groups foster a collaborative partnership between political, business, and community leaders to deliver messages on the importance of participation in the census. The Bureau had a goal of encouraging every state to create an SCCC, formed at the highest level of state government, such as the governor’s office. SCCCs seek to leverage the state’s vested interest in a timely and complete population count. According to Bureau planning documentation, CCCs are usually formed by the highest elected official in that jurisdiction, such as a tribal leader, a mayor, county commissioner, or regional chairman. The Bureau notes that partnership specialists are the primary contact between the Bureau and the CCC. Partnership specialists may conduct workshops, train CCC members, and provide or direct CCCs to census promotional materials. Bureau officials noted that initial partnership specialists were hired earlier in the decennial cycle for 2020 in part to help form CCCs. Partnership specialists are also to play a role in assisting CCCs with identifying hard- to-count populations within their respective communities and assist in developing strategies to reach those communities. Similar to previous censuses, for 2020, the Bureau plans to use multiple paid media outlets such as radio, television, newspapers, magazine, and billboards as one of its means to promote awareness and encourage participation in the census. Along with the traditional advertising, the Bureau also plans to use digital advertising such as web banner ads, video ads, digital extensions of traditional outlets, and social media channels. According to Bureau officials, they plan to be able to use paid advertising modes to target specific audiences including hard-to-count populations that may be more apt to trust such communication. For example, the Bureau’s 2020 communication plan cites research that states that the majority of Asian-Americans use traditional media— whether in print, online, or from a mobile device—as their primary source of local news. The Bureau plans to implement its 2020 paid media campaign in four phases (see table 2). As of early May 2020, the Bureau has not yet indicated the revised timeframes for the phases of paid advertising to reflect the COVID-19 disruptions. Bureau officials told us that they are planning to spend an additional $160 million on advertising as part of its public education and outreach campaign, originally estimated to cost over $500 million. According to the Bureau, its paid advertising campaign is designed to reach more than 99 percent of the nation’s 140 million households. For the 2020 Census, to distribute these messages, the Bureau will conduct outreach to the media including providing talking points, media lists, news releases, fact sheets, frequently asked questions, and other scripts and messaging for multiple media platforms, such as a variety of radio, podcasts, and special events. Media-focused materials such as press kits and press releases will be available in the media section of 2020Census.gov. As part of its media relations effort, the Bureau has also developed a crisis communications plan for handling major events and potential messaging disturbances. According to the Bureau, its crisis communication plan is intended to allow it to respond quickly and effectively to any events or actions that jeopardize the public’s confidentiality or reduce its willingness to respond to the 2020 Census. For example, the Bureau stated that in response to the COVID-19 outbreak, it adapted part of its advertisement messaging to re-emphasize the importance of responding to the census online, avoiding the need for in-person follow-up interviews. The Bureau’s social media strategy for 2020 reflects the increased number of social media platforms that were not available during the last census, such as Snapchat, Instagram Live Stories, and Facebook Messenger. According to the Bureau, social media will play a critical role in raising awareness of the census—particularly among hard‐to‐count audiences—as well as enhancing customer service efforts, promoting recruiting efforts, driving online completion of the census, assisting with data dissemination, and mitigating disinformation. The Bureau’s social media outreach efforts are to leverage source material on the Bureau’s website. Such material includes prepared language for posts and graphics, lists of influential partners, messages for those partners, customer service-themed frequently asked questions that are tailored for social media, methods for sharing content across the Bureau’s regional offices, and social media events. In March 2020, the Bureau kicked off its Statistics in Schools (SIS) program. During the week of March 2-6, 2020, prior to the widespread closure of schools due to the COVID-19 outbreak, the Bureau provided daily modules to educators for dissemination to students. These modules included such topics as an introduction to the census, a virtual tour of the Bureau headquarters, and a take-home assignment in which students and their families were asked to summarize a discussion of what they want to see in their communities. According to the Bureau planning documentation, the SIS materials were to encourage students to pass along the importance of counting everyone to an adult in their home who will complete the census. SIS was also intended to raise awareness among students themselves, which can be important in instances where the presiding adult(s) have limited English proficiency and have to rely on children to translate or interpret information from English into their native language. We, the Bureau, and others, such as the Bureau’s National Advisory Committee, have previously identified several challenges the Bureau has faced related to its partnership and outreach efforts in prior censuses. While the Bureau has taken important actions to address these challenges, current events such as the COVID-19 outbreak provide a salient basis for which to continue to monitor these challenges and any effects they may have on the census. Nature of Challenge. The Bureau strives to conduct an accurate count of the nation’s population. However, some degree of inaccuracy is inevitable. While the Bureau reported that the 2010 Census did not have a significant net undercount or net overcount nationally, the Bureau also reported that errors in coverage were unevenly distributed through the population, as figure 2 shows. In addition to the undercounted groups shown below, prior censuses, such as the 1990 Census, also showed statistically significant undercounts of Non-Hispanic Asians, American Indians off (as well as on) Reservations, and Native Hawaiian or Pacific Islanders. These errors are problematic because certain groups such as minorities, young children, and renters are more likely to be missed in the census, while other groups such as those who may own a second, seasonal home are more likely to be counted more than once. The Bureau has noted these historical trends and has classified these and other subpopulations as hard to count. According to the Bureau, hard-to-count groups can share some or all of the following characteristics: Hard to Locate: Some groups are hard to locate because where they live is unknown, or they move frequently. Hard to Persuade: Other groups are hard to persuade to participate in the census. Hard to Interview: Some groups may have communication barriers, such as limited English proficiency. Hard to Contact: Other groups may live in places with access barriers, such as residents of gated communities or renters with doormen and locked buildings. Adding to the challenge in 2020 is the possibility that, as the Bureau adapts its timing and procedures for outreach and promotion, as well as data collection, there is a possibility of uneven effects resulting on the participation rates of different groups. For example, messaging and operations that emphasize the importance of filling out the census online, in response to the COVID-19 outbreak, may not be applicable to communities or groups with limited internet access. If social distancing measures result in fewer successful interviews during Non-Response Follow-Up, for instance, then these groups with less internet access will be at relatively greater risk of being missed by the census. Adapting field enumeration procedures to implement social distancing might also be less effective in addressing respondent concerns about interacting with strangers in apartment buildings or other densely populated areas if a census worker cannot practically distance themselves from the door. Actions Taken. As part of its integrated communications plan, the Bureau’s lead communications contractor segmented the market and developed a series of strategic frameworks targeting advertising and messaging to hard-to-count subpopulations through demographic profiles. These groups include: persons experiencing homelessness; households with young children; lesbian, gay, bisexual, transgender, queer, and questioning persons; persons with disabilities; the young and mobile. In addition to demographic profiles for each of these groups, the contractor compiled lists of relevant community partners and consulted with stakeholders to construct a “day-in-the-life” analysis and develop advertising strategies to align tailored census advertising with the experiences of each group. According to Bureau documentation, these strategic frameworks provide the NPP data to decide how to best target related outreach resources. The Bureau also developed for 2020 a publicly-available tool that displays the areas of the country that are considered hard to count, according to an index of demographic indicators known as the Low Response Score. Using this index, the Bureau is able to monitor incoming census data for those areas, such as response rates and hiring and recruitment numbers, to see if efforts to reach hard-to-count areas are succeeding amid challenging current events, such as the COVID-19 outbreak, which could affect willingness of workers to participate in work taking them door-to- door to nonrespondents. Using funds appropriated under the Further Continuing Appropriations Act, 2020, the Bureau also developed a mobile questionnaire assistance (MQA) initiative to deploy census workers to specific locations, such as grocery stores, houses of worship, and community centers, or at specific events, such as festivals, to assist residents of low-response areas in filling out the census. For the beginning of the self-response period, partnership specialists identified the initial locations and times for the initiative within hardest-to-count census tracts. The Bureau plans to then monitor actual self-response data later in the operation to target those areas reporting the lowest response rates. In April 2020, the Bureau announced an indefinite delay of this latter stage of MQA in response to the outbreak of COVID-19. Basis for Continued Monitoring. Participation in the census and availability of nonrespondents for follow-up will help indicate whether the Bureau is successfully reaching hard-to-count groups. With self-response and follow-up for nonrespondents still ongoing, it is too early to know the effectiveness of the Bureau’s outreach efforts. However, multiple streams of data will provide indications of Bureau success in enumerating areas and demographic groups considered hard to count: As during the 2018 Census Test, the Bureau is monitoring active data on self-response rates at the local level, which it can compare across areas it deems hard to count. The Non-Response Follow-Up operation will yield data on interview rates—namely, the rate at which census workers are able to complete interviews with residents who had not yet responded to the census. These rates can also be compared across areas deemed hard to count. Demographic evaluation data and the Bureau’s post-enumeration survey will further provide insight into whether racial, ethnic, and other demographic groups were counted accurately. Nature of Challenge. For its partnership and outreach strategies to be effective, the Bureau must have the necessary people and resources in the right places to execute those strategies. In prior censuses, we have reported on issues related to staffing and promotional materials faced by the Partnership Program. Specifically, during the 2000 Census we noted that partnership resources were stretched thin and in some cases took effect too late in the decennial cycle. We recommended that the Bureau review its staffing levels to ensure adequate support to partners, a recommendation the Bureau subsequently implemented. During the 2010 Census, partnership specialists expressed concern about the timely availability of promotional materials, and the impact on their ability to build relationships with potential partners. We recommended in December 2010 that the Bureau ensure that promotional materials are provided to partnership staff when they are hired, a recommendation that the Bureau agreed with but that remained open at the beginning of our audit work in December 2019. Similarly, in a 2012 Bureau evaluation of the 2010 NPP, the Bureau found that some national partners felt that promotional materials needed to be better tailored to target their audiences’ needs and that these partners had difficulty accessing relevant census data for their audiences. The Bureau also observed that improvements were needed in the distribution of promotional materials by region. Actions Taken. The Bureau increased its partnership specialist hiring from roughly 800 in 2010 to a little more than 1,500 in 2020. As figure 3 shows, collectively these partnership specialists were able to secure more than 307,000 community partners by the end of February 2020—higher than the Bureau’s goal of 300,000 and the roughly 256,000 local partners the Bureau had by the end of the 2010 Census. Partnership staff were also able to encourage the creation of state complete count commissions (SCCCs) in every state and territory except Nebraska and South Dakota. These SCCCs are complemented across the country by more than 10,000 complete count committees (CCCs) at the local level. The Bureau also set a priority of getting partners in the right places. In addition to the Bureau’s overall goal for community partners, the Bureau also set out to get at least one community partner in 100 percent of census tracts that, according to their predicted indicator of low response, are hardest to count. As of late March 2020, the Bureau had made progress towards this goal, establishing partnerships in 85 percent of such areas. The Bureau also provided partnership specialists a centralized website where they can access promotional materials for distribution to partners. These materials included fact sheets, brochures, and marketing messages translated into 13 languages. Bureau officials indicated that these materials were developed and published on the website prior to the completion of partnership specialist training. According to officials, the website was made available to partnership specialists when they started work. In addition to national and community partners, tribal, state, and local CCCs also have access to these materials. The Bureau also provided guidance on how to order hard copies of such materials through the U.S. Government Publishing Office. We found during the course of our audit work that these actions implemented our December 2010 recommendation. Basis for Continued Monitoring. The Bureau encountered some issues in onboarding partnership specialists and tracking the establishment of partnerships in hard-to-count areas. We will continue to monitor any effects of these issues as part of our ongoing work: The Bureau experienced delays in onboarding partnership specialists, which resulted in less time to form partnerships and meant less time for community engagement and education activities leading up to the census. While the Bureau was able to increase the number of partnership specialists from 2010, the Bureau did not get all of its more than 1,500 partnership specialists on board until November 2019, more than 4 months later than its initial goal. The Bureau successfully surpassed its nationwide goal for registering more than 300,000 community partners. However, we reported in February 2020 that the Bureau missed interim goals for getting at least 200,000 partners in place by January 1, 2020, and at least 250,000 partners in place by February 1, 2020. We reported during the 2000 Census on the benefits of having Partnership Program resources on the ground earlier in the decennial cycle. The Bureau varied by region in terms of getting community partners located in hard-to-count areas. As noted, the Bureau had a goal of getting at least one partner in each of the hardest-to-count census tracts by March 2020. Nationwide, the Bureau was able to achieve this in 85 percent of such areas as of late March 2020. According to Bureau data, five of the six regional offices reached at least 82 percent of this goal, with the Los Angeles region the farthest along at 90 percent as of late March 2020. On the other hand, only 70 percent of the hardest-to-count tracts in the Philadelphia region, which covers the Mid-Atlantic States, had at least one community partner. Bureau officials noted that partners in adjacent tracts can provide relevant services to the hardest-to-count tracts. Officials indicated that they would continue monitoring progress using this measure. Given the effect of the COVID-19 outbreak on partner activities, having partnership specialists on boarded and partnerships formed later than anticipated meant several months less time for in-person community engagement and education activities leading up to the census in some areas. In April 2020, Bureau officials told us that partnership specialists had been instructed to continue interactions with partners via conference calls, text, email, and other virtual means. Officials also cited the ability of partnership specialists to support virtual partner commitments such as radio interviews and virtual town halls, and officials noted that the Government Publishing Office could continue to directly supply hard copies of promotional materials to partners. Going forward, response rates the Bureau achieves in areas where the Bureau lagged in registering partners may shed light on whether or not having full partnership coverage in certain hard-to-count areas is associated with lower response rates. Additionally, the Bureau is conducting a survey of public awareness of and sentiment toward the 2020 Census, with a goal of evaluating the effectiveness of public communication efforts. This survey will also provide data that could help answer the question of whether having less time on the ground than anticipated for the full complement of partnership specialists and community partners affected community awareness of the census. Nature of Challenge. Partnership and outreach activities, along with local enumeration activities, span numerous decennial operations and phases of data collection, and the Bureau has at times struggled to fully integrate these efforts. For instance, we reported in July 2018 that, during the planning stages for the 2020 Census, the Bureau’s management of initiatives aimed at enumerating hard-to-count groups was decentralized and not fully integrated across operations. We recommended that the Bureau take steps to ensure greater integration of efforts going forward. Coordination across regions of the country can also be a challenge. Bureau officials overseeing CPEP told us that during the initial staffing of partnership specialists, they observed variations in how job expectations were communicated across regional offices through training. The COVID-19 outbreak further complicates coordination across the country where state, tribal, and local public health rules, guidance, and enforcement may affect how partners in different locations need to interact with the census, and messaging to Bureau partnership staff and partners may not be amenable to a one-size-fits-all approach nationwide. The challenge of coordination can also have effects on how local managers of census activities perceive the efficiency of census efforts. Partnership specialists are expected in 2020 to work on initiatives, such as MQA, to which area census office staff also contribute. However, partnership specialists do not report to managers within the area census office, but directly report to the Bureau’s regional offices. As part of our December 2010 report on hard-to-count populations, we found that about half of all local census office managers we surveyed were dissatisfied with the level of coordination between local census office staff and partnership staff, noting duplication of effort in some cases. We recommended that the Bureau develop mechanisms to increase coordination between partnership and local census office staff, a recommendation that remains open. Actions Taken. In January 2020, in response to our July 2018 recommendation cited above, the Bureau provided us evidence of ongoing, multi-team discussions focused on integrating perspectives on decisions and planning for hard-to-count enumeration activities. In closing the July 2018 recommendation, we noted that the Bureau’s use of such an integrated approach will help ensure that the Bureau’s otherwise decentralized efforts to address hard-to-count challenges will be more effective. For field operations, the Bureau is holding a series of weekly teleconferences, to which area census office managers and all partnership specialists are invited to hear about updates from Bureau management on field operations and partnership and outreach activities. Bureau officials told us that having these calls, along with providing emailed summaries of the calls, helps to standardize any updates to guidance on field procedures or messaging across the area census office and partnership staff. For example, the Bureau sent an email in mid- March 2020 to partnership staff that included guidance on emphasizing the importance of internet self-response when responding to inquiries on the COVID-19 outbreak. The Bureau indicated taking steps to standardize partnership staff training and integrate partnership staff into field enumeration operations. Specifically, officials told us they convened a nationwide, standardized training curriculum after the Bureau had hired all of its partnership specialists. This curriculum replaced what had been a regional office- specific approach. The Bureau developed guidance for partnership specialists on how to provide direct feedback to area census offices when they become aware of a potential facility or location that should be added to the Bureau’s database for enumeration. Specifically, if partnership staff become aware of soup kitchens, homeless shelters, and other locations potentially being missed, they are instructed to submit information including the address, type of living quarters, and any applicable contact information to the relevant area census office. Moreover, the Bureau indicated it had assigned at least one partnership specialist to every area census office to improve coordination between the Partnership Program and local census operations. In addition, the Bureau created a rumor control page on its website to quickly disseminate factual content in response to misinformation. Examples of misinformation that the Bureau has detected include the false suggestion of a citizenship question being on the census and the posting of a potentially fraudulent census job website. The Bureau’s rumor control page includes the email address rumors@census.gov for the public to report possible misinformation and disinformation. The web page also has a set of frequently asked questions on topics such as data confidentiality and ways to participate in the census, thus helping to ensure that partnership staff, partners, and the public alike with access to the internet have access to accurate online information. Basis for Continued Monitoring. As the Bureau experiences inevitable turnover in partnership specialists and needs to update its messaging and outreach to reflect changing conditions on the ground, such as the COVID-19 outbreak, ensuring consistent training and guidance across its partnership staff and keeping all staff abreast of changes will be important. As noted above, our December 2010 recommendation for the Bureau to increase coordination between the Partnership Program and its area census offices remains open. While partnership specialists were assigned to area census offices, the Bureau has not put in place formal expectations for how partnership staff should support area census office staff and their activities. To fully implement this recommendation, the Bureau would need to document how partnership specialists and area census office staff are expected to work together. We will also continue to monitor how area census office managers express their perspectives on the effectiveness of the Partnership Program in supporting implementation of census field operations. For example, we surveyed area census office managers in March 2020 and found that nationally a plurality (42 percent) who responded said they were dissatisfied with the level of communication and coordination between the Partnership Program and their offices, while 41 percent said they were satisfied. A plurality of respondents (44 percent) were also dissatisfied with the level of clarity of roles and responsibilities between the Partnership Program and their offices, while 38 percent of respondents were satisfied. Open-ended comments we received from survey respondents contained ideas for improving the level of communication between partnership staff and area census office staff, such as having partnership staff be more integrated within the area census office structure. We are sharing such suggestions with the Bureau in near- real time as we receive them for the Bureau to consider moving forward. We will continue to periodically survey the office managers throughout the summer of 2020. Nature of Challenge. We have previously reported on challenges the Bureau has faced across operations in measuring outcomes. Namely, during the 2018 Census Test we reported that the Bureau’s primary measure of operational progress during Non-Response Follow-Up overstated the amount of completed workload because it emphasized the number of follow-up attempts made instead of the number of cases in which the Bureau got the data it needed—the preferred outcome of the operation. Similarly, our 2017 review of in-office address canvassing—when the Bureau attempted to use aerial imagery to identify areas of the country called blocks that did not require fieldwork to validate the address list— found that the Bureau’s performance measures looked at how many of the addresses in the address list were reviewed in-office, rather than how many addresses did not require additional fieldwork. Separately measuring the contributions of partnership and outreach activities on the desired outcome of maximizing the number of residents who respond to the census is inherently difficult. In one of its evaluations of the 2010 Census, though, the Bureau noted that the Partnership Program needed to do a better job of measuring and rewarding the intensity of partner effort throughout census operations, rather than simply looking at the number of contacts made or the number of partners. As Bureau officials noted to us, the quality of partners ultimately matters more than the quantity. Actions Taken. In its performance measures of the Partnership Program, the Bureau has taken steps beyond measuring the number of partners nationwide. For example, as noted previously, the Bureau prioritizes and tracks the extent to which it secures partnerships in hard-to-count areas, acknowledging that partnerships are needed everywhere but are particularly critical in areas that may otherwise be less likely to have high response rates. Additionally, the Bureau tracks the number of events partners complete and the number of commitments partners signed up for but did not fulfill by their planned dates (known as overdue commitments). As of early March 2020, community partners had fulfilled more than 270,000 committed events nationwide, while nearly 14,000 commitments were overdue. Basis for Continued Monitoring. Going forward, Bureau evaluations of the 2020 Census will demonstrate what, if any, lessons learned the Bureau is able to draw regarding the quality of its 2020 partnership and outreach efforts. The Bureau has multiple sources of data that it is, and will be, collecting to better understand how success can be defined: While the Bureau monitors and reports the number of overdue partnership commitments (cited above), it is not clear what the current level of nearly 14,000 overdue commitments means in the context of the universe of more than 270,000 total committed events. When we asked about this issue, Bureau officials indicated that they monitor the status of overdue commitments mostly to see if partners are staying active in their communities. Officials also said they use the metric to verify that partnership specialists are recording any follow-up they do with partners that have not fulfilled their commitments. Similarly, the Bureau’s plan for the MQA initiative cites the number of census questionnaire responses received through MQA as an indicator of how successful the Bureau is in connecting partners and other census questionnaire assistance resources to areas that need them. Yet, it is unclear from Bureau documentation what levels of MQA uptake, if any, would constitute success. While low MQA uptake, for instance, could mean that partnership specialists and census response representatives were not successful in identifying the right times and locations for MQA, it could also mean that residents were successfully able to respond to the census via other means, or that they did not attend MQA events due to the COVID-19 outbreak. When we followed up with Bureau officials, they indicated that they have planned a series of required debriefings and exit interviews with partnership specialists, which will include MQA effectiveness as a topic. Such debriefings and exit interviews will likely be particularly important, given the MQA change necessitated by the COVID-19 outbreak. Lastly, the COVID-19 outbreak could further complicate the Bureau’s ability to determine the ultimate effectiveness of its partnership and outreach—how well the Bureau achieves the goal of counting everybody once, only once, and in the right place. The Bureau plans to estimate census quality by relying in part on interviews conducted door-to-door in a nationwide sample of households, scheduled for the summer and fall of 2020. The COVID-19 outbreak could prompt the Bureau to delay the related field operation to collect the data or affect household responsiveness to in-person visits. As the timing of this report coincides with ongoing implementation of the self-response period and field enumeration operations, planned Bureau evaluations and assessments will be best positioned to identify any lessons learned and determine whether, in light of the challenges cited above, the Bureau’s partnership and outreach efforts were successful in maximizing participation in the census. We provided a draft of this report to the Department of Commerce. In its written comments, reproduced in appendix I, the U.S. Census Bureau said it agreed with the findings of our report and would continue to work to implement related open recommendations from our prior reports. We are sending copies of this report to the Secretary of Commerce, the Undersecretary of Economic Affairs, the Director of the U.S. Census Bureau, and the appropriate congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report please contact me at (202) 512-6806 or mihmj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. J. Christopher Mihm, (202) 512-6806 or mihmj@gao.gov In addition to the contact named above, Ty Mitchell (Assistant Director), Devin Braun (Analyst-in-Charge), Mark Abraham, Carole J. Cimitile, Alexandra Edwards, Amalia Konstas, Kerstin Meyer, Cynthia Saunders, Kate Sharkey, Farrah Stone, Jon Ticehurst, Peter Verchinski, and Alicia White made key contributions to this report.", "summary": "The decennial census is used to apportion seats in Congress, redraw congressional districts, and allocate hundreds of billions of dollars in federal assistance annually and helps to guide public policy decisions based on social, economic, and demographic data. While recent censuses appear to have been increasingly accurate, measurement errors are not evenly distributed across the population. Given the uses of census data, ensuring an accurate count is important. As part of its partnership and outreach efforts, the U.S. Census Bureau's (Bureau) Partnership Program works with local and national organizations, businesses, and governments to promote awareness of and participation in the census, as well as to help recruit census workers. GAO was asked to review the Bureau's partnership and outreach efforts, including paid advertising and targeted communications. This report examines the Bureau's progress in addressing selected prior census challenges in these areas. GAO reviewed relevant Bureau planning documentation, collected regular Bureau reports on progress, and interviewed Bureau officials responsible for partnership and outreach efforts. GAO provided a draft of this report to the Bureau. The Bureau agreed with the report's findings. The Partnership Program, a core component of the Bureau's partnership and outreach activities, delivers outreach to partnering organizations at the national and local levels in order to ensure a more complete and accurate count. These partners include retail associations, tribal, state, and local governments, local businesses, and non-profit organizations, among others. Roughly 1,500 partnership specialists, who are temporary Bureau employees responsible for building relationships with and obtaining commitments from these partners, help to implement the Partnership Program, which exists alongside several other components of the Integrated Partnership and Communications operation, as shown below. The Bureau experienced delays, however, in getting these employees onboarded. The Bureau has taken important actions to address challenges that GAO, the Bureau, and others have previously identified. These challenges include: (1) Enumerating hard-to-count groups; (2) Mobilizing partnership and outreach resources; (3) Coordinating outreach across the Bureau's organization and operations; and (4) Measuring outcomes. Events taking place during implementation of partnership and outreach activities, such as the COVID-19 outbreak, provide a salient basis for which to continue to monitor these challenges and any effects they may have on the census. Moreover, continued monitoring of the Bureau's survey of public awareness of and sentiment toward the census, for example, will provide information on whether difficulties experienced in getting partnership specialists onboarded had an effect on the success of the Bureau's outreach.", "document_type": "gao"}
{"report": "More than a dozen federal agencies—known as National Drug Control Program agencies—have responsibilities for drug prevention, treatment, and law enforcement activities. For example, the Department of Health and Human Services (HHS) has led efforts to expand access to drug treatment, and the Departments of Justice (DOJ) and Homeland Security (DHS) have taken lead roles in limiting the availability of illicit drugs through criminal investigations and prosecutions. The Anti-Drug Abuse Act of 1988 established ONDCP to enhance national drug control planning and coordination. In this role, the office is responsible for (1) leading the national drug control effort, (2) coordinating and overseeing the implementation of national drug control policy, (3) assessing and certifying the adequacy of National Drug Control Programs and the budget for those programs, and (4) evaluating the effectiveness of national drug control policy efforts. Until its 2018 reauthorization, ONDCP had been operating under the provisions of the ONDCP Reauthorization Act of 2006 pursuant to annual appropriations acts. In October 2018, the Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (the SUPPORT Act) was enacted and reauthorized ONDCP and a number of its programs. The SUPPORT Act aims to address overprescribing and opioid misuse in the United States and includes provisions involving law enforcement, public health, and healthcare financing and coverage. Under both the ONDCP Reauthorization Act of 2006 and the SUPPORT Act, the Director of ONDCP is required to promulgate the National Drug Control Strategy and work with National Drug Control Program agencies to develop an annual National Drug Control Program Budget. Prior to the SUPPORT Act, the Director was required to promulgate a National Drug Control Strategy on an annual basis, while under the SUPPORT Act, generally, the National Drug Control Strategy is required to be developed every two years. ONDCP did not issue a National Drug Control Strategy for 2017 or 2018 despite the statutory requirement. Under both the ONDCP Reauthorization Act of 2006 and the SUPPORT Act, the National Drug Control Strategy is to set forth a comprehensive plan to reduce illicit drug use and the consequences of such illicit drug use in the United States by limiting the availability of and reducing the demand for illegal drugs. As part of our ongoing work, we are reviewing the 2019 National Drug Control Strategy that ONDCP issued on January 31, 2019. Agency officials told us that they began preparing the National Drug Control Strategy in early 2018—prior to the enactment of the SUPPORT Act in October 2018. Officials stated that the National Drug Control Strategy was intended to respond to the requirements of the ONDCP Reauthorization Act of 2006, which was the applicable law at that time. In light of ONDCP’s stated approach, we based our preliminary analysis of the National Drug Control Strategy on the ONDCP Reauthorization Act of 2006. However, the SUPPORT Act retained certain similar requirements for the National Drug Control Strategy contained in the prior law. According to ONDCP, the 2019 National Drug Control Strategy provides a high-level vision of federal drug control efforts by focusing on prevention, treatment and recovery, and reducing the availability of illicit drugs. The 2019 National Drug Control Strategy designates one overarching strategic objective—to reduce the number of lives lost to drug addiction— and provides some general descriptions of federal agencies’ activities. However, our preliminary observations related to the 2019 National Drug Control Strategy indicate that it does not include several pieces of required information, including the following: Quantifiable and measurable objectives. The National Drug Control Strategy was required to include “annual quantifiable and measurable objectives and specific targets to accomplish long-term quantifiable goals that the Director determines may be achieved during each year beginning on the date on which the National Drug Control Strategy is submitted.” However, our work showed that the 2019 National Drug Control Strategy does not include this information. While it lists seven items that it designates as measures of performance or effectiveness, it does not indicate how they would be quantified or measured, or targets to be achieved each year. For example, one of the measures of performance relates to educating the public, especially adolescents, about drug use. However, it lacks information on how ONDCP would measure its efforts to educate adolescents, as well as targets ONDCP hopes to achieve, such as the number of adolescents educated or specific knowledge gains. Further, none of the seven measures has a baseline of current performance or annual targets, and four of the seven measures do not have associated timelines—which are important ways that results could be quantified. For example, one of the Strategy’s measures of effectiveness is that evidence-based addiction treatment, particularly medication-assisted treatment for opioid addiction, is more accessible nationwide for those who need it. However, there is no information on the current level of treatment access, any targets for expanding access, or any associated timeline by which ONDCP hopes to achieve desired results. Program and budget priorities. The National Drug Control Strategy was required to include “a 5-year projection for program and budget priorities.” While the 2019 National Drug Control Strategy outlines several high-level priorities, including a top priority to address the current opioid crisis and its associated deaths, it does not include such a 5-year projection. Specific assessments. The National Drug Control Strategy was required to include specific assessments related to illicit drug use. For example, the National Drug Control Strategy was required to include “an assessment of the reduction of illicit drug availability.” This assessment was to be measured by, among other things, the quantities of cocaine, heroin, marijuana, methamphetamine, ecstasy, and other drugs available for consumption in the United States; the amount of marijuana, cocaine, heroin, methamphetamine, ecstasy, and precursor chemicals and other drugs entering the United States; and the number of illicit manufacturing laboratories seized and destroyed as well as the number of hectares of marijuana, poppy, and coca cultivated and destroyed domestically and in other countries. The 2019 National Drug Control Strategy does not include this information. In addition, the National Drug Control Strategy was required to include “an assessment of the reduction of the consequences of illicit drug use and availability.” This assessment was to include the burden illicit drug users placed on hospital emergency departments; the annual national health care cost of illicit drug use; and the extent of illicit drug-related crime and criminal activity. Similarly, the 2019 National Drug Control Strategy does not include this information. Performance measurement system. The ONDCP Director was required to submit “as part of the National Drug Control Strategy a description of a national drug control performance measurement system.” Among other things, this system was to describe the sources of information and data that would be used for each performance measure incorporated into the performance measurement system. This system was also to coordinate the development and implementation of national drug control data collection and reporting systems to support policy formulation and performance measurement. Further, the system was to monitor consistency across the drug-related goals and objectives of the National Drug Control Program agencies and ensure that each agency’s goals and budgets support are fully consistent with the National Drug Control Strategy. The 2019 National Drug Control Strategy does not contain a description of such a national drug control performance measurement system. As part of our ongoing work, we also asked ONDCP for information regarding how ONDCP officials determined the adequacy of National Drug Control Program agencies’ budget submissions without a National Drug Control Strategy in effect for 2017 and 2018. The National Drug Control Program Budget is to provide information on federal drug control funding requested by the executive branch to implement the National Drug Control Strategy. National Drug Control Program agencies are required to submit to ONDCP the portion of their annual budget requests dedicated to drug control activity undertaken by the department, agency, or program. Agencies are to prepare these as part of their overall budget submission to the Office of Management and Budget for inclusion in the President’s annual budget request. ONDCP is required to review and certify whether these budgets are sufficient to support the relevant goals and objectives outlined in the National Drug Control Strategy and then include these budgets in the consolidated National Drug Control Program Budget, which the President issues alongside his budget each year. As of March 4, 2019, ONDCP had not provided information on how it accomplished the required determination. In addition, as of March 4, 2019, the President’s FY 2020 budget, and the accompanying National Drug Control Program Budget, had not been released. We will continue to consider ONDCP’s activities in this area as part of our ongoing work. As part of our ongoing work, we will also discuss the 2019 National Drug Control Strategy with ONDCP and plan to examine how ONDCP intends to address additional requirements in the SUPPORT Act. The lack of information in the 2019 National Drug Control Strategy on assessing progress toward its objective to reduce lives lost reflects findings in our previous reports. Our prior work in general, and our work on federal drug control efforts in particular, has consistently emphasized the importance of setting clear priorities through measurable and quantifiable goals, and assessing progress toward those goals over time, in order to achieve results. For example: In March 2018, we reported on federal agencies’ efforts—including those of ONDCP—to limit the availability of and enhance their response to illicit opioids, such as heroin and fentanyl. We reviewed five strategies related to combating illicit opioids and determined that only one included outcome-oriented performance measures that aim to assess the effectiveness of its efforts—ONDCP’s Heroin Availability Reduction Plan (HARP). In contrast, we found that ONDCP’s High Intensity Drug Trafficking Areas (HIDTA) programs’ Heroin Response Strategy did not include any outcome-oriented performance measures. Outcome measures address the results of programs and services, such as reductions in overdose deaths, and they can help in assessing the status of program operations, identifying areas that need improvement, and ensuring accountability for results. Among other things, we recommended in March 2018 that ONDCP coordinate with the HIDTAs to establish outcome-oriented performance measures to assess progress towards the goals set out in the Heroin Response Strategy. While ONDCP neither agreed nor disagreed with our recommendation, ONDCP told us in June 2018 that they had engaged with leaders from the HIDTAs participating in the Heroin Response Strategy to develop performance measures, including some outcome performance measures. As of March 4, 2019, this recommendation has not yet been addressed and ONDCP has not provided additional information on these efforts. We continue to believe that establishing these measures would enhance the HIDTAs’ ability to assess whether these efforts are producing intended results. In October 2017, we reported on HHS’s efforts to reduce the prevalence of opioid misuse and the fatalities associated with it by expanding access to medication-assisted treatment (MAT) for opioid use disorder. These efforts included four grant programs that focus on expanding access to MAT in various settings (including rural primary care practices and health centers) and implementing regulatory and statutory changes that expanded treatment capacity by increasing patient limits for a MAT medication—buprenorphine—and by expanding the types of practitioners who can prescribe it in an office-based setting. We found that HHS had not established performance measures with targets that would specify the results that HHS hoped to achieve through its efforts, and by when. We concluded that without this information, HHS would not have an effective means to determine whether its efforts are helping to expand access to MAT or whether new approaches are needed. Among other things, we recommended that HHS establish performance measures with targets related to expanding access to MAT for opioid use disorders. HHS concurred with the recommendation and in February 2019, provided information that the agency had established performance measures with targets to increase the number of prescriptions for certain MAT medications, one of the potential ways to measure access to MAT. However, the recommendation has not yet been fully addressed, in part because HHS did not provide information on measures related to the treatment capacity of providers who prescribe or administer MAT medications, which HHS had identified as another way to measure access. We continue to believe that fully implementing this recommendation will help ensure that invested resources in the program are yielding intended results. As our prior work shows, using data—such as information collected by performance measures and findings from program evaluations and research studies—to drive decision-making can help federal agencies improve program implementation, identify and correct problems, and make other management decisions. Although agencies may struggle to effectively use this approach, regular performance reviews and evidence- based policy tools can help them incorporate performance information into federal decision-making. Without effective long-term plans, such as a national strategy, that clearly articulate goals and objectives and without specific measures to track performance, federal agencies cannot fully assess whether taxpayer dollars are invested in ways that will achieve desired outcomes. ONDCP’s responsibility to develop the National Drug Control Strategy and coordinate among federal agencies offers the agency an important opportunity to guide federal activities to address the unprecedented number of drug overdose deaths. We are continuing with ongoing and planned work to monitor and assess federal drug control efforts. Chairman Cummings, Ranking Member Jordan, and Members of the Committee, this concludes our prepared statement. We would be happy to respond to any questions you may have at this time. If you or your staff has any questions concerning this testimony, please contact Triana McNeil at (202) 512-8777 (McNeilT@gao.gov) or Mary Denigan-Macauley at (202) 512-7114 (DeniganMacauleyM@gao.gov). Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contacts named above, Joy Booth (Assistant Director), Will Simerl (Assistant Director), Michelle Loutoo Wilson (Analyst in Charge), Billy Commons, Helen Desaulniers, Wendy Dye, Jane Eyre, Kaitlin Farquharson, and Jan Montgomery made key contributions to the testimony. Other staff who made key contributions to the reports cited in the testimony are identified in the source products. Drug Control: DOD Should Improve Its Oversight of the National Guard Counterdrug Program. GAO-19-27. Washington, D.C.: January 17, 2019. Colombia: U.S. Counternarcotics Assistance Achieved Some Positive Results but State Needs to Review the Overall U.S. Approach. GAO-19-106. Washington, D.C.: December 12, 2018. Opioid Crisis: Status of Public Health Emergency Authorities. GAO-18-685R. Washington, D.C.: September 26, 2018. Prescription Opioids: Medicare Needs Better Information to Reduce the Risk of Harm to Beneficiaries. GAO-18-585T. Washington, D.C.: May 29, 2018. VA Health Care: Progress Made Towards Improving Opioid Safety, but Further Efforts to Assess Progress and Reduce Risk Are Needed. GAO-18-380. Washington, D.C.: May 29, 2018. Illicit Opioids: Office of National Drug Control Policy and Other Agencies Need to Better Assess Strategic Efforts. GAO-18-569T. Washington, D.C.: May 17, 2018. Illicit Opioids: While Greater Attention Given to Combating Synthetic Opioids, Agencies Need to Better Assess their Efforts. GAO-18-205. Washington, D.C.: March 29, 2018. Substance Use Disorder: Information on Recovery Housing Prevalence, Selected States’ Oversight, and Funding. GAO-18-315. Washington, D.C.: March 22, 2018. Substance-Affected Infants: Additional Guidance Would Help States Better Implement Protections for Children. GAO-18-196. Washington, D.C.: January 19, 2018. Opioid Use Disorders: HHS Needs Measures to Assess the Effectiveness of Efforts to Expand Access to Medication-Assisted Treatment. GAO-18-44. Washington, D.C.: October 31, 2017. Counternarcotics: Overview of U.S. Efforts in the Western Hemisphere. GAO-18-10. Washington, D.C.: October 13, 2017. Preventing Drug Abuse: Low Participation by Pharmacies and Other Entities as Voluntary Collectors of Unused Prescription Drugs. GAO-18-25. Washington, D.C.: October 12, 2017. Prescription Opioids: Medicare Needs to Expand Oversight Efforts to Reduce the Risk of Harm. GAO-18-15. Washington, D.C.: October 6, 2017. Newborn Health: Federal Action Needed to Address Neonatal Abstinence Syndrome. GAO-18-32. Washington, D.C.: October 4, 2017. Opioid Addiction: Laws, Regulations and Other Factors Can Affect Medication-Assisted Treatment Access. GAO-16-833. Washington, D.C.: September 27, 2016. Anti-Money Laundering: U.S. Efforts to Combat Narcotics-Related Money Laundering in the Western Hemisphere. GAO-17-684. Washington, D.C.: August 22, 2017. International Mail Security: Costs and Benefits of Using Electronic Data to Screen Mail Need to Be Assessed. GAO-17-606. Washington, D.C.: August 2, 2017. Drug Control Policy: Information on Status of Federal Efforts and Key Issues for Preventing Illicit Drug Use. GAO-17-766T. Washington, D.C.: July 26, 2017. Medicaid Expansion: Behavioral Health Treatment Use in Selected States in 2014. GAO-17-529. Washington, D.C.: June 22, 2017. Drug-Free Communities Support Program: Agencies Have Strengthened Collaboration but Could Enhance Grantee Compliance and Performance Monitoring. GAO-17-120. Washington, D.C.: February 7, 2017. Highlights of a Forum: Preventing Illicit Drug Use. GAO-17-146SP. Washington, D.C.: November 14, 2016. Drug Enforcement Administration: Additional Actions Needed to Address Prior GAO Recommendations. GAO-16-737T. Washington, D.C.: June 22, 2016. State Marijuana Legalization: DOJ Should Document Its Approach to Monitoring the Effects of Legalization. GAO-16-419T. Washington, D.C.: April 5, 2016. Firearms Trafficking: U.S. Efforts to Combat Firearms Trafficking to Mexico Have Improved, but Some Collaboration Challenges Remain. GAO-16-223. Washington, D.C.: January 11, 2016. Prenatal Drug Use and Newborn Health: Federal Efforts Need Better Planning and Coordination. GAO-15-203. Washington, D.C.: February 10, 2015. Office of National Drug Control Policy: Office Could Better Identify Opportunities to Increase Program Coordination. GAO-13-333. Washington, D.C.: March 26, 2013. Prescription Pain Reliever Abuse: Agencies Have Begun Coordinating Education Efforts, but Need to Assess Effectiveness. GAO-12-115. Washington, D.C.: December 22, 2011. This is a w ork of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety w ithout further permission from GAO. How ever, because this w ork may contain copyrighted images or other material, permission from the copyright holder may be necessary if you w ish to reproduce this material separately.", "summary": "Over 70,000 people died from drug overdoses in 2017, according to the most recently available Centers for Disease Control and Prevention data. Overdoses have become the leading cause of death due to injuries in the United States, and most of these deaths involve opioids. GAO has a body of work on drug policy and ongoing work on ONDCP's efforts, including issuance of the National Drug Control Strategy. GAO also noted in its March 2019 High Risk report that federal efforts to prevent drug misuse is an emerging issue requiring close attention. This statement includes preliminary GAO observations on the 2019 National Drug Control Strategy and related findings from select GAO reports on federal opioid-related efforts. It is based on ongoing GAO work, two reports that GAO issued in March 2018 and October 2017, and selected updates on recommendations from these reports as of February 2019. For ongoing work and recommendation updates, GAO assessed the 2019 National Drug Control Strategy against statutory requirements, reviewed ONDCP and HHS documents, and interviewed ONDCP officials. The Office of National Drug Control Policy (ONDCP)—responsible for coordinating and overseeing efforts by more than a dozen federal agencies to address illicit drug use—issued the 2019 National Drug Control Strategy on January 31, 2019. ONDCP describes the strategy as a high-level vision of federal drug control efforts, focused on prevention, treatment and recovery. The strategy designates one overarching objective to reduce the number of lives lost to drug addiction, and provides some description of federal agencies' activities, including steps to reduce the availability of illicit drugs. However, it does not include certain information required by law, such as annual objectives that are quantifiable and measurable, or a 5-year projection for program and budget priorities. This required information could help prioritize activities across federal agencies and measure progress over time, which previous GAO work has shown to be important for achieving results. GAO will continue to assess the strategy as part of ongoing work, and make recommendations as appropriate. The lack of information in the 2019 National Drug Control Strategy on measuring progress toward its objective to reduce lives lost is particularly concerning in light of previous GAO reports. These reports found that individual agencies could do more to assess their particular efforts related to opioids. For example, GAO reported in March 2018 on five agency-specific strategies to combat illicit opioids, and also reported in October 2017 on the Department of Health and Human Services' (HHS) efforts to expand access to medication-assisted treatment for opioid use disorder. In these reports, GAO recommended, among other things, that federal agencies establish performance measures to better determine progress toward their goals. While federal agencies have taken some action to implement these recommendations, such as establishing performance measures for access to medication-assisted treatment, additional actions to measure the effectiveness of related drug control efforts would further help to gauge agencies' success, determine if new approaches are needed, and efficiently target resources. GAO has made prior recommendations to ONDCP, HHS, and other federal agencies to address drug misuse, including establishing performance measures with targets to better gauge progress toward achieving agency goals.", "document_type": "gao"}
{"report": "The U.S. freight rail network is a private industry that moves about 40 percent of U.S. freight across about 140,000 miles of track. Freight railroads are responsible for the safety of their trains, tracks, and personnel. These railroads rely on their revenues for funding to perform track inspections and maintenance. Close to 600 freight railroads operate in the United States, and they are divided into three classes according to revenues. The seven Class I freight railroads, those with approximately $447.6 million or more in annual revenue over 3 consecutive years, account for more than 90 percent of the annual revenues of the railroad- freight industry and employ 90 percent of railroad employees. Class I freight railroads move freight over long-haul routes and face competition from each other and from other freight-shipping modes, such as trucks and barges. Class II and III railroads tend to operate over much smaller geographic areas than Class I railroads and employ fewer people. Trains operate on different types of train tracks, including main line tracks—the primary rail arteries trains use to travel—and sidings, which are primarily auxiliary tracks for trains to pass one another. Trains can be stored, sorted, and assembled in railyards. Railroads use main line and sidings to enable trains to enter and leave the yard. Outside railyards, some sections of main line track have sidings that lead to a parallel set of rails to allow trains to pass one another. In addition, some portions of main line track consist of two or more parallel sets of track to allow trains to pass one another or travel in opposite directions. See figure 1 for an illustration of different track types and siding. Train makeup refers to the placement of individual railcars that make up a train. A typical train consists of a locomotive—the power and control unit where the train operator sits at the front of the train—followed by connected railcars. The lead locomotive pulls the train and provides control for other functions, including braking. Freight trains carry a variety of freight using different types of railcars that vary in capacity, length, and weight. When assembling a train, railroads consider a variety of factors— such as each car’s weight, length, freight, and whether it is loaded or empty—when determining its position in the train. Train make up is also dependent on external conditions, such as variations in terrain and weather conditions. Railroads can place radio-controlled locomotives, called distributed power (DP) units, throughout trains to spread out pulling and pushing power, which we discuss in more detail below. Proper train makeup is critical for ensuring a train is able to effectively negotiate track and prevent derailment, according to FRA. Improperly assembled trains are more susceptible to derailment, in part because of vertical, longitudinal, and lateral forces throughout the train—also known as “in-train” forces—that can affect the stability of a train on its tracks, depending on a variety of factors, including the train’s speed and terrain. For example, excessive “in-train” forces can cause a long, heavy train to pull apart or climb off the track upon a change of grade (e.g., going up or down hills) or when the train enters a curve. “Unit trains”—which carry a single commodity, such as coal or oil, to one destination—experience in-train forces that are easier for railroads to model and engineers to predict because the railcars are generally uniform in size and weight. In comparison, determining train makeup is more complex in mixed freight trains, which can experience more unpredictable in-train forces resulting from railcars of different weights, lengths, and freight (e.g., bulk goods such as grain and coal, consumer goods such as automobiles, or hazardous materials). For example, if a train is assembled in a manner in which empty railcars alternate with loaded, heavy railcars, braking can create compression at the couplers and cause “buckling”—when an empty train car is compressed between heavier railcars and derails from the train tracks. Freight trains in the United States utilize air-braking systems to control speed and stop. A conventional air-braking system is controlled by an air pressure signal from the leading locomotive, which sends a signal through the train to engage brakes. Because each railcar receives this signal sequentially, it takes multiple seconds for railcars at the end of the train to receive the air pressure signal and begin braking, depending on the train’s length. The application of air brakes generates in-train forces, as railcars at the front of the train that have applied brakes will be pushed by railcars further back that have not yet received the air signal. Other technologies, including two-way end-of-train devices and DP, are frequently used by U.S. railroads in conjunction with conventional brakes to provide improved braking performance or other benefits. End-of-train devices measure brake pressure and transmit this information via radio signal to the front of the train. An end-of train-device can also engage air brakes at the rear end of a train in an emergency to decrease the time required to apply the brakes on all cars. As previously mentioned, railroads can also place radio-controlled locomotives, called DP units, throughout trains to spread out pulling and pushing power and improve braking. For example, engineers can engage a DP locomotive’s air brakes at the same time as a leading locomotive to decrease the time needed to activate brakes throughout the train. (See fig. 2.) Engineers can also use a locomotive’s dynamic brake system, which uses traction generated by the engine, to slow a train. While most railroads employ conventional brakes, railroads can also employ electronically controlled pneumatic brakes—which provide an electronic brake signal instantaneously throughout a train—allowing railcars to brake faster than with conventional air brakes. As we previously reported, electronically controlled pneumatic brakes reduce the in-train forces that occur during braking when individual cars push and pull against one another. Freight trains in the United States generally operate with two crew members—the conductor and the engineer. The conductor is responsible for the train, freight, and crew. The engineer operates the locomotive, including application of air brakes, dynamic brakes, and any radio- controlled DP locomotives. Train crews use hand-held radios to communicate when they are working in different parts of the train. For example, if the crew detects a train maintenance issue, the conductor may need to leave the locomotive and walk the length of the train to address the problem. In these situations, the conductor may use a hand- held radio to communicate. The U.S. Department of Transportation (DOT) is responsible for ensuring the safety of the transportation system. Within DOT, FRA is the primary federal agency responsible for formulating railroad safety policies and regulations and for monitoring and enforcing railroads’ compliance with requirements. FRA’s mission is to enable the safe, reliable, and efficient movement of people and goods. FRA provides regulatory oversight of the safety of U.S. railroads, including both passenger and freight. FRA issues and enforces safety regulations including requirements governing track, signal, and train control systems, grade-crossing warning systems, mechanical equipment such as locomotives and railcars, and railroad-operating practices. In developing most of its regulations, FRA seeks input from the railroad industry and other organizations through its Railroad Safety Advisory Committee. FRA provides oversight of railroad safety through a variety of activities, including periodic inspections and enforcement actions. FRA has safety inspectors and specialists in eight regional offices that are primarily responsible for the enforcement of federal laws and regulations related to railroad safety. FRA conducts inspections of railroads to monitor compliance with safety regulations, such as those governing the transport of hazardous materials, among other issues. In addition, 31 states conduct inspections for compliance with federal safety regulations. FRA trains state inspectors to enable them to conduct inspections according to FRA’s standards. In addition to these activities, FRA conducts other types of safety oversight to reduce train accidents, such as analyzing railroad safety data, investigating accidents, and reviewing complaints. FRA also funds research and development to support its safety oversight. FRA’s Office of Research, Development, and Technology conducts research to understand railroad safety risks and improve safety. This work contributes information used to inform FRA’s development of regulations, standards, and best practices. Other federal agencies also have roles in overseeing freight railroads, such as through promoting safety or regulating railroad industry economics. For example, NTSB is an independent federal agency that produces safety studies and investigates transportation-related accidents across all transportation modes to determine probable causes, identify safety issues, and make recommendations to prevent recurrences. STB oversees significant rail-service matters and resolves rate and service disputes between railroads and their customers, known as “shippers.” Class I railroads report data to STB on the amount and type of freight they transport. STB produces and releases statistical data derived from the railroad’s submitted data. According to officials from all seven Class I freight railroads and representatives from AAR, FRA, STB, and other stakeholders we interviewed, freight train-length has increased in recent years; however, the data are limited. According to data that two Class I railroads provided to us, their average train length increased over the 10-year period of 2008 through 2017 by about 1,500 feet for one railroad (from about 6,000 to 7,500 feet, or up to about 1.4 miles) and about 1,200 feet for the other railroad (from about 4,900 to 6,100 feet, or up to about 1.2 miles). These data represent an increase in the average length of a train of about 25 percent for both railroads. Two additional Class I railroads reported average train lengths between about 5,800 and 6,600 feet for the year 2017. However, we were not able to verify increases more broadly because FRA, STB, and AAR do not collect comprehensive data on train- length in feet, and while such data are collected by Class I railroads, they are not publicly available. Officials from two Class I railroads stated that operating longer trains is not a new practice, and one official noted that the railroad has been operating trains in excess of 10,000 feet in selected rail corridors for almost 30 years. Officials from AAR added that increases in train length over time have likely been gradual. While two Class I railroads provided data on average freight train-length over time, officials from each of the seven Class I railroads stated that they operate longer trains. Railroad officials said they operate these trains in certain rail corridors that have the capacity to accommodate longer trains, and not over their entire rail networks. For example, officials from one Class I railroad said they are running on a daily basis a 12,000-foot train—which is about 2.3 miles long—and another reported that twice weekly it operates a 16,000-foot train—which is about 3 miles long—on a route linking the mid-west to the west coast. Both of these Class I railroads noted that longer trains such as these are a small percentage of the trains they operate. More specifically, one of these railroads reported that over the previous 24 months, about 1 percent of its train-miles were traveled by trains over 10,000 feet long, and the other reported that about 2 percent of its current train-miles were traveled by trains over 10,000 feet long. Other data describing the average number of railcars per train and average weight of trains indicate an overall increase over the past 10 years. However, these measures are not proxies for freight train-length since the length and weight of railcars can vary significantly depending on their design and freight. Class I railroads are required to report data, such as the freight car-miles, to STB annually, and AAR aggregates and makes this information publicly available in various publications. We analyzed these data and found that the average number of railcars per freight train across all Class I railroads increased from 71.0 to 73.2 railcars per train (an increase of about 3 percent) from 2008 through 2017. Additionally, FRA and some Class I railroad officials stated that railroads operate freight trains that have more than twice this average number of railcars—including trains with 150 railcars or more. Similarly, the average train weight increased from about 5,978 tons to 6,577 tons per train (an increase of about 10 percent) from 2008 through 2017. Class I railroad officials said that there are advantages to operating longer freight trains in some rail corridors and that operating longer trains is part of strategic planning for many railroads for a variety of reasons. Officials from all Class I railroads stated that they operate longer trains in some rail corridors as a way to increase efficiencies, such as fuel efficiency, and decrease costs by reducing the number of train crew and other costs. Additionally, railroad officials said that running longer trains can mean that they do not need to operate as many trains—officials from six Class I railroads specifically indicated they are operating fewer shorter trains as a result of operating longer trains. Further, Class I railroad officials stated that market forces, such as competition from the trucking industry, create an incentive for them to increase efficiency. Class I railroad officials also stated that the use of certain technologies, such as DP locomotives, enables them to operate longer trains more safely. Other Class I railroad officials attributed their increased usage of longer trains to capital improvements on railroad tracks, such as lengthening the sidings to accommodate longer trains. While the need for proper train makeup and handling are not unique to longer trains, it is particularly important for their safe operation, according to stakeholders we spoke with. As previously discussed, the length of each train and its makeup—the manner in which its cars and locomotives are arranged—can affect the forces involved on a moving train. Stakeholders we spoke with said that the consequences of improper train makeup may be more pronounced in longer trains—especially in situations with extremes in track grade, curvature, or weather conditions—and may add to the challenges of operating longer trains. For example, FRA has investigated accidents in which it determined that train makeup and handling were the probable cause and contributing factors in train derailments of longer freight trains. According to officials from FRA, NTSB, railroad employee unions, and other stakeholders, longer mixed- freight trains may be more difficult to handle than unit trains in certain circumstances due to variations in car length and weight and the extent to which additional DP locomotives are employed. Stakeholders noted that placing additional DP locomotives within a train can improve train handling and prevent train separations and derailments. Stakeholders added that using DP can also help improve air brake performance and reduce braking response time, as previously discussed. In addition, according to stakeholders, use of properly positioned DP locomotives can improve radio communication between the lead locomotive and rear DP locomotives on longer trains. Union representatives added that in their view, the safest train-braking operations are when DP locomotives are used in conjunction with electronically controlled pneumatic brakes. According to representatives from AAR and Class I railroads, however, freight railroads have faced challenges with these braking systems, including reliability issues, as we have noted in a previous report. While there are no comprehensive federal regulations that govern train makeup, including use of DP locomotives, representatives of Class I railroads told us they consider a variety of factors when determining train makeup to ensure safe operation of all of their trains, including tonnage, train-length, and terrain. According to one railroad, using software to determine train makeup and predict train handling needs is an industry standard and critical best practice. Another railroad told us they use computer simulations to develop rules for train makeup in order to operate longer and heavier trains. Some railroads told us they impose length and weight restrictions on specific routes to ensure safe train operation and manage corridor capacity. Union representatives and rail experts we spoke with told us that in their view, railroads do not always properly assemble their longer trains, for example placing heavy railcars behind lighter railcars, a practice that can increase the likelihood of derailment. These stakeholders also said that railroads do not always use DP with longer trains, which experts attributed to the extra cost of deploying additional locomotives. We did not independently verify how the railroads we spoke with assemble or operate longer trains. Stakeholders we interviewed said that it is essential that crews are properly trained to operate longer freight trains. FRA regulations require railroads to train and certify their train crews. More specifically, FRA requires qualified locomotive engineers to demonstrate proficiency in operating trains in the most demanding type of service they may be permitted to perform, which includes operating longer trains. Railroads are required to conduct annual performance evaluations of engineers to ensure that they can safely operate trains according to federal railroad safety requirements. Representatives of Class I railroads told us they train their crews on trains and simulators with various routes, scenarios, and train lengths. However, union representatives said that some railroads do not provide sufficient training for crews to operate longer trains, and that some locomotive engineers and conductors lack the necessary training and experience to handle longer trains, a situation that can be challenging even for properly trained crew. As discussed later, FRA is planning to review this issue when it performs planned audits of Class I railroads’ training programs. Stakeholders we interviewed identified additional challenges for crews when operating longer freight trains related to crew members’ fatigue. For example, according to FRA, union representatives, and other stakeholders, a longer train may require crew members to walk a long distance if the train stops unexpectedly. For example, when there is a mechanical or other problem that causes a train to stop, the conductor may have to walk from the lead locomotive to the problem area and back again. This could mean walking 4 miles to the end and back on a 2-mile- long train. Also, according to FRA officials, as with any train that is left unattended, the crew must apply a sufficient number of handbrakes to prevent unintended movement. With longer and heavier trains, railroads may require additional handbrakes to be applied. According to union representatives, such physically demanding tasks can increase crew fatigue. Stakeholders we interviewed expressed divergent views about whether longer trains may increase or decrease blockages at grade crossings. Our prior work has noted a connection between the volume of freight rail traffic and the potential for grade-crossing blockages to increase. In 2014, we found that trends in freight flows, if they continue as expected, may exacerbate congestion issues in communities, particularly along certain corridors. FRA officials told us that complaints about blocked highway-rail grade crossings have increased in recent years. They noted that blocked crossings are a local concern and it is not clear the extent to which longer freight trains are contributing to increases in reporting about such blockages. According to FRA, trains sometimes block crossings for a limited time or for hours if an accident or mechanical problem occurs. They noted that such blockages can be created by trains of any length and that in their experience, railroads prioritize movement of longer trains, making it less likely that such trains would be responsible for prolonged blockages of crossings. Furthermore, officials from FRA and Class I railroads and others we spoke with pointed out that longer trains may decrease the frequency of blocked crossings, as railroads may run fewer trains. In contrast, officials from the National League of Cities, as well as state and local officials we spoke with, expressed concerns over increased frequency of longer trains and their impact on grade crossing safety. Although they also acknowledged that trains of any length can block grade crossings, they raised concerns that longer trains prolong the duration of a blockage and can block more crossings concurrently, making it harder for vehicles to find an alternate route around the train. Consequently, these stakeholders are concerned that longer trains create increased delays for emergency responders and increase the likelihood of unsafe behavior among motorists and pedestrians, as outlined below. Delayed emergency response. According to national, state, and local officials we interviewed, longer trains pose concerns about the potential for emergency response delays if responders encounter a train blocking one or more crossings and cannot quickly find an alternate route around it. (See fig. 3.) For example, officials in Mount Victory, Ohio, reported that 22 freight trains travel through their town daily, including a 16,000-feet train, which is nearly 3 miles long. This train blocks 4-to-5 grade crossings concurrently, which increases the time to access parts of the town, according to local officials. Our prior work has found that blocked highway-railroad grade crossings can have significant impacts on emergency response time and outcomes. For example, we reported an instance of a fire that destroyed a house while train traffic blocked the only two crossings in the town and prevented fire crews from responding in time. In another example, a local official in Texas said that one Class I railroad assembles trains and conducts brake checks on the main line tracks because the trains are too long to fit into sidings and railyards. Executing such procedures on mainline track has blocked grade crossings for up to several hours and poses safety challenges for surrounding communities, according to this local official. As a result of situations like these, communities are looking for ways to mitigate delays in emergency services when emergency vehicles must find ways around blocked grade crossings. For instance, some local officials in Washington and Ohio said they have revised their emergency response plans to avoid grade crossings that are likely to be blocked. Motorist and pedestrian behavior. Stakeholders we spoke with expressed concerns that longer trains may increase the likelihood of unsafe behavior among motorists and pedestrians. For example, fatalities can occur when motorists or pedestrians engage in risky behavior such as trying to make it across the tracks before an approaching train reaches the crossing. Moreover, pedestrians have been known to crawl over, through, or under stopped trains (see fig. 4). For example, local officials in Ohio and Texas told us that they have witnessed children crawling through stopped trains to get to school. Research sponsored by FRA has identified driver behavior as the main cause of highway-rail grade crossing collisions, but other factors such as train and traffic volume can contribute to the risk of a crash occurring. Although there are no current federal regulations that directly address blocked crossings or limit the amount of time trains can block grade crossings, some states and localities have attempted to address this issue. For example, some states and localities have passed laws limiting the duration of blocked crossings and proposed fines for railroads, but state and local officials and other stakeholders we spoke with said that federal law preempts such efforts. Other states and local communities have attempted to address blocked crossings through studies and communication with federal agencies and railroads, with mixed success. For example, the Texas Department of Transportation has undertaken mobility studies for the towns of El Paso and Laredo to identify options to address blocked crossings, such as constructing bridges or underpasses. According to officials with the Texas Department of Transportation, these studies identified alternatives that may help alleviate some of the vehicular/rail conflicts if they were implemented; however, the implementation of alternatives for any potential projects are constrained by the availability of funds. In other examples, local officials from Ohio and Illinois told us they have contacted Class I railroads and FRA to find solutions when idle trains lead to blocked crossings, especially when emergency access is a concern but continue to face challenges. Class I railroads and FRA officials said they work with local communities to find solutions to these issues. Additionally, state and local officials noted that they do not have access to information on the length of trains that travel through their communities. Some added that freight railroads are not required to provide such data and that local efforts to gather this information, such as through videotaping train movements and analyzing data, are costly. This circumstance makes it challenging for state and local officials to assess the extent to which longer trains may or may not be contributing to blocked crossings. In the fall of 2017, FRA began a study to understand operational risks of long freight trains. The study is examining issues related to train makeup and handling, including the use of DP locomotives, crew training and fatigue, and braking performance for longer trains. The study intends to identify strategies to reduce any risks identified. According to FRA, as the railroad industry has increased the length of freight trains, past accepted practices for train makeup and handling may not be appropriate for longer trains. For example, according to FRA, the current performance standard for air brakes was last updated in 1947 and based on tests for trains with up to 150 cars. FRA officials stated the study will conduct air brake tests to evaluate brake performance for trains with 150-to-250 railcars and use this data to conduct computer simulations of trains in a variety of configurations—for example, with and without DP and with DP locomotives at different locations throughout a train—to evaluate in-train forces. According to FRA officials, this information will help FRA determine whether rail safety issues exist for trains with over 150 railcars and if regulatory actions are necessary. The study employs a two-phase approach that includes data analysis, literature review, computer simulations, and brake testing. FRA officials said the agency plans to complete the first phase of its study and issue a report by the end of 2020 and issue a report on the second phase by the end of 2021. Table 1, below, outlines specific tasks of the study by phase. As we previously mentioned, FRA provides oversight of railroad safety through a variety of activities to ensure compliance with regulations, such as conducting inspections of railroad operations and reviewing and approving new and materially modified railroad crew training programs. According to FRA officials, these activities address safety for all freight trains, including longer trains. In addition to these activities, FRA plans to begin new, more in-depth audits of Class I railroads’ training programs on a systematic basis in 2019 to determine whether engineers are being adequately trained to operate longer trains and perform other types of demanding service. According to FRA, these audits will determine whether locomotive engineer certification programs are in compliance with federal rail safety regulations. For example, federal regulations require that railroads provide training to their engineers—through classroom lessons and in trains or simulators—on the most demanding type of service they may be called upon to perform. According to FRA officials, this would include operation of longer freight trains in challenging terrain. FRA plans to audit the training programs of three Class I railroads by the end of 2019, selected based upon safety risk factors, with additional audits of other railroads planned for the following year. Once the audits are complete, FRA plans to discuss its findings with each audited railroad and make recommendations for improvements, as needed. While FRA’s study to assess operational safety risks of longer trains is under way, the agency lacks a current, documented strategy for how it will use and share the results of its research with relevant stakeholders. According to FRA officials, after internal review and approval, the agency routinely shares its research results at conferences and on its website. However, FRA’s strategic plan for research and development, which outlined how the agency shares research results and engages with internal and external stakeholders in support of FRA’s rail safety mission, expired in 2017. More specifically, this plan outlined key internal and external stakeholders and their roles—including labor and industry partners—and specific outreach strategies, such as holding periodic, public events to present FRA’s research and development. This plan also stated that FRA’s research provides the scientific and technological basis for its rulemaking and regulation enforcement and that effectively sharing the results of its studies increases the likelihood that its research will have “real world” impacts. According to FRA officials, the agency is currently updating its strategic plan for research and development, which will outline FRA’s goals and objectives for its research, and expects to finalize the plan by the summer of 2019. FRA does not have any other documented policies in place for how it will use or disseminate the results of its study. Federal internal control standards call for management to communicate quality information—using appropriate methods—both internally and externally in order to achieve an entity’s objectives and respond to risks. Further, our work on best practices for strategic planning has found that formulating specific strategies and linking them with goals and objectives is critical for agencies to achieve these goals and objectives. In addition, we previously identified generally accepted research standards for sound studies, standards that include presentation of results. These standards call for relevant stakeholders to be informed of research results and any recommendations upon completion of a study. The Transportation Research Board—a part of the National Academies of Sciences, Engineering, and Medicine which provides research-based solutions to improve transportation, among other things—has found that organizations that develop processes and a systematic approach to implementing research are more effective and efficient at applying research results. FRA’s study is a first step for determining how, if at all, makeup and handling for longer trains as well as their crews’ needs may differ from shorter trains. If study results are effectively shared with relevant stakeholders, then those best situated to act on the results may be more likely to do so. For example, FRA officials—who have rulemaking and enforcement authority—could identify and implement changes needed to improve the safety of longer train operations, such as by issuing relevant guidance, rulemaking, or other actions. Similarly, external stakeholders, such as Class I railroads and workers, would have the opportunity to use study results to inform their practices and policies, such as making changes to internal train-makeup rules or operators’ training programs for longer trains. As FRA updates its strategic plan for research and development, formulating specific strategies for how it will share its research results with internal and external stakeholders would help to ensure FRA is in the best position to achieve its research goals and objectives in support of the agency’s mission of enabling the safe, efficient, and reliable transportation of people and goods. While FRA is taking steps to assess operational safety risks of longer trains through its study and other efforts, it is not assessing whether longer freight trains impact communities by blocking more grade crossings. Safety at grade crossings has been a longstanding issue in the United States, and according to stakeholders we spoke with, some of these issues may be exacerbated by longer trains. In 2006, as part of its report on the impacts of blocked grade crossings on emergency response services, FRA stated that future growth in rail and highway traffic will likely increase blocked crossings, and more recently FRA officials stated that this is still the case. In addition, while collisions at grade crossings have declined over time, FRA also expects the risk of grade-crossing incidents to grow as both rail and highway traffic increase during the next decade. However, FRA officials also stated that there is no evidence that more blocked crossings results in more grade-crossing incidents. Further, according to FRA, the agency is not in a position to address community- specific public safety issues. We have previously reported that the amount of time that grade crossings are blocked depends on a number of factors and is typically a function of the number, speed, and length of trains. Although there are no federal regulations directly addressing blocked grade crossings, to gauge the extent of reported instances of blocked crossings, in early 2018, FRA began to track data on the location of blocked-crossing complaints from state rail-safety managers in nine states. FRA officials stated they intend to use this data to identify communities where frequently blocked grade crossings are reported and work with the railroads and communities for resolution. However, FRA officials said they do not plan to explore any potential impacts of longer trains on grade crossings in communities, as FRA officials have stated they do not believe that longer trains are having an impact on blocked crossings. For example, FRA does not plan to use any of the information gathered in its longer train study—which will include a sampling of the routes longer trains travel—to inform the agency’s work on blocked crossings because FRA officials stated that they do not expect the study will yield relevant information. State and local officials we spoke with, as previously mentioned, expressed concerns about the potential for longer trains to increase the number of blocked grade crossings, causing delays for emergency responders and affecting the behavior of motorists and pedestrians. Federal internal control standards state that effective use of information and communication are vital for an entity to achieve its objectives. These standards call for management to use quality information—relevant, reliable information that is current, complete, accurate, accessible, and timely—to achieve an agency’s objectives and respond to risks. Further, we previously identified essential practices for agencies to help manage risks and identify opportunities that could impact the achievement of agencies’ goals. These risk-management practices call on agencies to systematically identify risks and use the best information available to assess them. Community officials acknowledged that while they believe longer trains are making blocked crossings worse, they do not have access to information needed to confirm this observation. As previously discussed, some local communities continue to face challenges after reaching out to FRA and Class I railroads to find solutions to issues related to grade crossings. As these issues continue to evolve and FRA works to identify locations where blocked crossings are reported, working with railroads and local communities to identify any potential impacts of longer trains on grade crossings would help FRA to determine whether and how longer trains are affecting these communities and what could be done to address those impacts. In addition, it would allow FRA to determine whether it should take additional action to ensure that longer trains are operating safely and to work with railroads to minimize their impact to the communities through which they travel. FRA faces a challenging task in assessing the safety impacts of longer trains and has taken some important steps to collect needed information through its study of longer trains’ operations. However, without documented strategies for how it plans to communicate the results of its research, FRA may lose an opportunity to effectively work with internal and external stakeholders—such as railroads, railroad workers, and local communities—to address any risks of operating longer trains in support of the agency’s mission of enabling the safe, efficient, and reliable transportation of people and goods. In addition, local community officials we spoke with raised concerns that longer trains are creating safety risks by causing emergency response delays and exacerbating dangerous motorist and pedestrian behavior, but acknowledged that they lack access to information on longer trains. FRA, however, is uniquely positioned to assess whether these concerns have merit. As FRA has stated, it expects that future growth in rail and highway traffic will increase incidences of blocked crossings and the risk of grade-crossing incidents. As traffic continues to grow—including railroads’ potential increased use of longer trains—having better information could be useful to FRA and other stakeholders. Without examining the potential impacts of longer trains on local communities, including on blocked grade crossings, FRA may lose an opportunity to identify what, if any, additional actions should be taken to ensure the safety of longer trains and the communities through which they travel. We are making the following two recommendations to FRA: The Administrator of FRA should develop a strategy for sharing FRA’s research results with internal and external stakeholders and implement that strategy for its research on the safety impacts of very long trains. (Recommendation 1) The Administrator of FRA should work with railroads to engage state and local governments to (a) identify community-specific impacts of train operations, including longer trains, where streets and highways cross railroad rights-of-way and (b) develop potential solutions to reduce those impacts. (Recommendation 2) We provided a draft of this report to DOT, NTSB, and STB for their review and comment. In its comments, reproduced in appendix I, DOT concurred with the recommendations. DOT and STB also provided technical comments, which we incorporated as appropriate. NTSB had no comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Transportation, the Chairman of NTSB, the Chairman of STB, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or FlemingS@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Andrew Huddleston (Assistant Director); Jean Cook (Analyst in Charge); Jason Coates; Philip Farah; David Hooper; Rosa Leung; Gail Marnik; John Mingus; Madhav Panwar; Malika Rice; Kelly Rubin; and Michelle Weathers made key contributions to this report.", "summary": "In 2017, the U.S. freight rail system moved over 1.5-billion tons of goods. The largest freight railroads—Class Is—dominate the industry and account for more than 90 percent of its annual revenue. In recent years, railroad workers and local communities have expressed safety concerns related to longer freight trains, and recent accidents involving such trains are currently under investigation by FRA. FRA does not currently place limits on freight train length. GAO was asked to review the safety and other impacts of longer freight trains. This report examines: (1) changes in freight train length over time, (2) safety considerations for operating longer freight trains, and (3) the extent to which FRA is assessing any safety risks. GAO reviewed relevant statutes, regulations, and federal agencies' reports and plans; analyzed available data on freight train length from railroads; and interviewed federal officials and various stakeholders, including state and local officials and first responders from five states (selected to represent different railroads and regions), and officials from the railroad industry, unions, and advocacy groups. Freight train length has increased in recent years, according to all seven Class I freight railroads. Data on train length are not publicly available; however data provided to GAO by two Class I railroads indicated that their average train length has increased by about 25 percent since 2008, with average lengths of 1.2 and 1.4 miles in 2017. Officials from all seven Class I railroads said they are currently operating longer than average trains on specific routes, although some said such trains are a small percentage of the trains they operate. One railroad said it runs a 3-mile-long train twice weekly. Officials identified increased efficiencies and economic benefits among the advantages of longer freight trains. Stakeholders said that the arrangement of train cars and locomotives—known as “train makeup”—and the potential for blocking highway-railroad crossings are issues to consider to safely operate longer freight trains. To prevent derailment, stakeholders said it is important that longer trains are arranged appropriately and that crews are trained to operate them. While Class I railroads and others said that longer trains may decrease the frequency of blocked crossings, some state and local officials said these trains can prolong their duration, posing challenges for emergency responders unable to cross the tracks. The Federal Railroad Administration (FRA) is studying the safety risks of and strategies for operating longer trains. As part of the study, FRA plans to analyze train-handling and braking capabilities under varying conditions. FRA officials said they plan to share their research results with relevant stakeholders; however, FRA currently has no documented strategy for sharing the results of its research. FRA officials are also analyzing which parts of the country are reporting frequently blocked crossings. However, FRA officials said they do not plan to use information from either of these efforts to determine whether longer freight trains might contribute to increases in blocked crossings, and the officials believe the issues are unrelated. Developing and implementing a strategy for sharing FRA's research results and identifying any potential impacts of longer freight trains on highway-railroad crossings would enable FRA and stakeholders to better determine what, if any, actions are needed to ensure the safe operation of longer freight trains. GAO recommends that FRA develop and implement a strategy to share the results of its study on longer trains and work with railroads to engage state and local governments to identify and reduce impacts of longer freight trains on highway-railroad crossings. FRA concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "Enacted on January 23, 1995, the CAA, as amended, applies 13 federal civil rights, workplace, and labor laws to legislative branch employees who were previously exempted from such coverage. Table 1 lists the 13 laws included under the CAA. The CAA contained a series of specific requirements for the Office of Compliance to meet as it carried out its responsibility to administer and enforce the act. Toward this end, the Office of Compliance took a number of actions, such as administering a dispute resolution process; conducting investigations and inspections to ensure compliance with safety, health, and disability access standards; investigating and managing matters concerning labor management relations, and educating both employees and employing offices about their rights and responsibilities under the CAA. The Reform Act expanded the office’s duties and responsibilities, as well as the number of employees covered by the CAA. These new duties and responsibilities include, among other things: changing the name of the office to OCWR; substantially modifying the administrative dispute resolution process under the CAA, including creating additional procedures for preliminary hearing officer review of claims; appointing one or more advisers to provide confidential information to legislative branch employees about their rights under the CAA; extending CAA protections to unpaid staff, including interns, detailees, and fellows, as well as previously unprotected legislative branch employees; conducting a workplace climate survey; significantly expanding OCWR reporting obligations; creating a program to permanently retain records of investigations, mediations, hearings, and other proceedings; and establishing an electronic system to receive and keep track of claims. The act mandated that OCWR institute some of these requirements, such as changing the name of the office, immediately. Other requirements, such as establishing an electronic system to receive and keep track of claims, were to be met no later than 180 days after the implementation of the act, or by June 19, 2019. To implement its statutory requirements, OCWR currently has 28 full-time equivalent positions, which includes five part-time members of OCWR’s Board of Directors (counted as one full-time equivalent) appointed by congressional leadership. This represents an increase of five full-time equivalents since April 2018. OCWR relies extensively on IT services and systems provided by external parties to support its mission-related operations and protect claims data. For example, the Library provides network and end-user computing services for OCWR, including email; network services such as Internet access and file sharing; and end-user services and support, such as desktop support and software management. OCWR also relied on an external contractor to develop and maintain its legacy claims management system, known as the Case Management System (CMS). Since 2014, the office used CMS to manage claims submitted by covered legislative branch employees using one of four ways: in person at OCWR’s office; or by mail, email, or fax. After a claim was received, an OCWR employee would manually enter the claim information into CMS and update the information as it progressed through the dispute resolution process. In response to the Reform Act enacted in December 2018, OCWR initiated the SOCRATES project to meet the requirement of implementing an electronic system for claims. SOCRATES is intended to enable covered legislative branch employees to file a claim via a web-based form, and an OCWR employee to electronically manage the workflow of claims as they progress through the dispute resolution process. Specifically, the system is expected to maintain and track claim deadlines, generate correspondence, as well as update and store claim information. OCWR relied on both the Library and an external contractor to upgrade CMS to SOCRATES. As part of its SOCRATES implementation efforts, OCWR first moved the CMS application and claim data from its office to the Library, which began hosting the system in April 2019. Between April 2019 and June 2019, OCWR’s external contractor continued work to develop and implement new and updated components for CMS to facilitate the electronic filing and management of claims. In addition, the external contractor worked to develop and implement the web-based form to electronically capture claims. According to OCWR, SOCRATES is comprised of three components that are hosted by the Library: SOCRATES web-based form: This form is intended to be used by covered legislative branch employees to submit a claim alleging a violation of civil rights, workplace, or labor laws during their employment. Secure information sharing platform: This platform is intended to be a web-based, secure workflow file collaboration application. The platform allows for the sharing of claim related information between OCWR, the covered employee, the employee’s office, and any other relevant parties (e.g., employee representatives). SOCRATES internal CMS console: Based on updated functionality from OCWR’s CMS, this console is intended to provide secure, detailed workflow management of each claim that is submitted. Specifically, the console introduces new workflows based on the Reform Act’s updated requirements for a claim and allows OCWR employees to internally manage a claim. Figure 1 shows the updated claim filing process using SOCRATES. According to OCWR, testing of SOCRATES the week prior to its June 19, 2019, due date revealed numerous problems with the system. For example, if a user did not submit his or her claim within a certain amount of time, the system refreshed the webpage without saving the user’s data, forcing the user to restart the claim. As a result, OCWR delayed the deployment 7 days to allow time to resolve this issue and others. On June 26, 2019, OCWR deployed SOCRATES and began accepting claims via the web-based form. In addition to SOCRATES, OCWR relies on the external contractor to provide hosting and application support for FMA. FMA is used by OCWR to document reported violations of the Occupational Safety and Health Act. The CAA requires OCWR to conduct biennial inspections of the legislative branch to ascertain compliance with the act and to report its findings to Congress. The office also reports its findings to the legislative branch agency that is reportedly in violation of the act in a Hazard Summary Report. The agency is responsible for responding, and providing verification of the abatement of violations and hazards documented in the findings, to OCWR. IT systems supporting federal agencies are inherently at risk. These systems are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the numerous operating systems, applications, and devices comprising the systems and networks. Compounding the risk, federal systems and networks are also often interconnected with other internal and external systems and networks, including the internet. This increases the number of avenues of attack. Information and systems are subject to serious threats that can have adverse impacts on organizational operations and assets, individuals, other organizations, and the nation. These threats can include purposeful attacks, environmental disruptions, and human/machine errors, and may result in harm to the national and economic security interests of the United States. In recognition of the growing threat, we have designated information security as a government-wide high-risk area since 1997. In 2003, we expanded the information security high-risk area to include the protection of critical cyber infrastructure. We further expanded the information security high-risk area in 2015 to include protecting the privacy of personally identifiable information. Cybersecurity incidents continue to impact federal agencies, including those entities in the federal executive and legislative branch. For example, in fiscal year 2017, federal executive branch civilian agencies reported 35,277 incidents to the U.S. Computer Emergency Readiness Team. These incidents included web-based attacks, phishing, and the loss or theft of computing equipment. These incidents and others like them can pose a serious challenge to economic and national security and personal privacy. The following examples highlight the impact of incidents from legislative and executive branch entities: In January 2019, the Department of Justice announced that it had indicted two Ukrainian nationals for their roles in a large-scale, international conspiracy to hack into the Securities and Exchange Commission’s computer systems and profit by trading on critical information they stole. The indictment alleges that the two hacked into the commission’s Electronic Data Gathering, Analysis, and Retrieval system and stole thousands of files, including annual and quarterly earnings reports containing confidential, nonpublic, financial information, which publicly traded companies are required to disclose to the commission. In July 2016, the Library announced that it had experienced a significant distributed denial-of-service attack that affected multiple internal and external Library systems and services. Specifically, the attack successfully disrupted services to multiple Library systems and services including email, databases, and public web domains, such as Congress.gov. According to the Library, the attack was sophisticated in both the size of the attack and methods that the attack employed. In June 2015, the Office of Personnel Management reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate, but related, incident had compromised its systems and the files related to background investigations for 21.5 million individuals. In total, the Office of Personnel Management estimated that 22.1 million individuals had some form of personally identifiable information stolen, with 3.6 million being a victim of both breaches. Recognizing the importance of information security and privacy, Congress enacted the Federal Information Security Modernization Act of 2014 (FISMA), which requires federal agencies in the executive branch to develop, document, and implement an information security program and to evaluate the program for effectiveness. The act retains many of the requirements for federal agencies’ information security programs previously set by the Federal Information Security Management Act of 2002. As legislative branch entities, OCWR and the Library are not subject to FISMA. However, OCWR’s Executive Director and the Library’s Chief Information Officer have chosen to follow aspects of the law’s requirements. For example, an interagency agreement between OCWR and the Library describes plans to protect OCWR’s CMS application and claim data using NIST guidance that is intended to satisfy FISMA requirements and relates to managing risks to the information system. The 2002 act also assigns certain responsibilities to NIST, which is tasked with developing standards and guidelines for systems other than national security systems. These standards and guidelines must include, at a minimum, (1) standards to be used by all agencies to categorize all of their information and information systems based on the objectives of providing appropriate levels of information security, according to a range of risk levels; (2) guidelines recommending the types of information and information systems to be included in each category; and (3) minimum information security requirements for information and information system in each category. Accordingly, NIST developed a risk management framework of standards and guidelines for agencies to follow in developing information security programs. The framework addresses broad information security and risk management activities to be followed in developing information systems, including categorizing the system’s impact level; selecting, implementing, and assessing security controls; authorizing the system to operate (based on progress in remediating control weaknesses and an assessment of residual risk); and monitoring the efficacy of controls on an ongoing basis. In December 2019, we reported that OCWR faced management challenges in implementing its new requirements under the Reform Act, such as establishing a program to permanently retain records of investigations, mediations, hearings, and other proceedings. Specifically, we determined that OCWR did not always use project schedules to manage the implementation of the requirements of the Reform Act. For example, we noted that the office used a project schedule for developing the workplace climate survey, but did not use a project schedule to manage the SOCRATES project. We also determined that OCWR did not address risks associated with its records retention program. For example, we noted that the office had not yet developed policies and procedures to address the risks associated with permanently retaining sensitive records, such as ensuring they remain confidential when stored in multiple locations. Our report also identified weaknesses in OCWR’s IT planning, including that the office did not develop long-term strategies for recruiting and retaining staff with critical skills and competencies needed to achieve current and future agency goals. Accordingly, our report included six recommendations for the office related to incorporating key management practices into project planning and ensuring that it has the necessary skills and capacity to meet its mission. OCWR agreed with our recommendations and described plans to address them. We have also previously reported on weaknesses with the Library’s information security program, as well as specific security controls that support OCWR’s systems and services. In March 2015, we issued a report that identified weaknesses in the Library’s information security program. We made 10 recommendations to the Library aimed at better protecting IT systems and reducing the risk that the information they contain will be compromised. These recommendations included, among other things, developing contingency plans for all systems and conducting comprehensive and effective security testing for all systems within the time frames called for by Library policy. The Library generally agreed with our recommendations and described planned and ongoing actions to address them. As of January 2020, the Library fully implemented nine of the 10 recommendations and has taken steps to implement the remaining recommendation. We have work underway to determine whether the steps taken by the Library fully address the remaining recommendation. In a related June 2015 limited official use only report, we made 74 detailed security recommendations aimed at addressing specific weaknesses in the Library’s security controls. The Library generally agreed with our security recommendations and described planned and ongoing actions to address them as well. As of January 2020, the Library had fully implemented 72 of 74 detailed security control recommendations from this report and had plans to implement the remaining two recommendations by February 2020. Effectively managing a project entails, among other things, developing a project schedule, defining and managing requirements, and effectively managing project risks. Project scheduling. The success of a program depends, in part, on having an integrated and reliable master schedule that defines, among other things, when work activities will occur, how long they will take, and how they relate to each other. A reliable schedule provides a road map for systematic execution of a program and a means by which to gauge progress, identify and address potential problems, and promote accountability. GAO’s Scheduling Assessment Guide lists 10 best practices associated with a high-quality and reliable schedule, including capturing and sequencing all activities, as well as establishing the duration of all activities. Requirements management. Requirements establish what the system is to do, how well it is to do it, and how it is to interact with other systems. The Software Engineering Institute’s Capability Maturity Model Integration® for Acquisition (CMMI-ACQ) and Capability Maturity Model Integration® for Development (CMMI- DEV) note that requirements management processes are important for enabling programs to ensure that their set of approved requirements is managed to support planning and execution needs. This should include steps to obtain stakeholder’s review and commitment to the requirements and to manage changes to requirements as customer needs evolve. Project risk management. The discipline of risk management is important to help ensure that projects are delivered on time, within budget, and with the promised functionality. According to leading practices for acquisition, the purpose of risk management is to identify potential issues that could endanger achievement of critical objectives before they occur. A continuous risk management approach effectively anticipates and mitigates risks that can have a critical impact on a project. Organizations that plan to acquire IT products and services for a project should also identify and assess risks associated with the acquisition process. Incorporating cybersecurity management activities (such as the selection and implementation of security controls) into each of these project planning areas can help to reduce cybersecurity risks and better protect critical assets. For example, according to NIST’s risk management framework, integrating system security requirements into a project’s planning activities, such as scheduling, can help to ensure that resources are available when needed and that project milestones are met. In addition, the framework notes that defining the system security requirements early and integrating them with other system requirements can result in a system having fewer deficiencies, and therefore, fewer security vulnerabilities that can be exploited in the future. The framework also describes the importance of identifying security risks early in a system project and addressing such risks on an ongoing basis. However, OCWR did not effectively manage the SOCRATES project because it did not establish a schedule, develop and manage requirements, and manage risks. Consequently, the office did not incorporate key cybersecurity management activities into each of these project planning areas. Specifically: OCWR did not manage the SOCRATES project using an established, approved project schedule that identified when cybersecurity activities would be completed. As discussed earlier, we previously reported that OCWR did not establish a project schedule to manage the SOCRATES project. Although the office drafted a project schedule in January 2019, this schedule was not finalized and used during the project. According to OCWR’s Director of the IT Governance, Risk Management, and InfoSec Compliance Program, the schedule was not used due to, among other things, challenges encountered in managing the interdependencies of SOCRATES development with the implementation of other Reform Act requirements (e.g., modifying the administrative dispute resolution process). Consequently, OCWR did not use a project schedule to manage key SOCRATES cybersecurity activities, including those to be completed by OCWR, the Library, and the contractor. To its credit, the Library provided an early project schedule with certain cybersecurity activities they performed related to CMS. For example, the Library’s project schedule documented initial activities the Library was to perform that related to procurement of equipment, installation of software, security testing, and vulnerability remediation in order to move CMS from OCWR to the Library. However, OCWR did not use a project schedule for the upgrade of CMS to SOCRATES that included the time frames for key cybersecurity management activities, such as selecting and documenting security controls, implementing controls, and assessing controls. The lack of a project schedule likely hindered OCWR’s ability to respond to changes during the project and execute key cybersecurity management activities in a timely manner. For example, in May 2019, OCWR made a decision to use a locally hosted platform at the Library for its secure information sharing platform instead of a cloud-based solution. Without a project schedule, OCWR was unable to assess the impact of this late change on the time available for completing remaining cybersecurity management activities. OCWR did not establish a requirements management process or develop a set of detailed system requirements, including cybersecurity requirements. OCWR did not establish a requirements management process that included steps to obtain stakeholders’ review and commitment to the requirements and to manage changes to the requirements. Instead, the office established a set of business flow diagrams, which identified how claim information would move within OCWR and SOCRATES. Further, OCWR did not establish a set of detailed system requirements, including the cybersecurity requirements (e.g., what cybersecurity controls were to be implemented). OCWR did not document and manage risks to the SOCRATES project, including those related to cybersecurity. OCWR did not document and manage risks for the SOCRATES project. Specifically, the office did not document and manage risks related to cybersecurity and did not mitigate those risks that could have had a critical impact on the project. For example, OCWR was not able to ensure that the Library tested all moderate-level security controls for the SOCRATES web-based form and secure information sharing platform before the system was deployed. However, this was not documented or managed by OCWR as a risk. In addition, as discussed later in this report, there were also risks associated with OCWR’s reliance on the Library and its external contractor that were implementing cybersecurity responsibilities on its behalf. For example, we identified shortfalls in the OCWR’s oversight of the planning and conducting of system security assessments. However, no risks related to the office’s reliance on external parties were documented or managed throughout the project. According to the Director of the IT Governance, Risk Management, and InfoSec Compliance Program, the office did not complete key project planning activities and documentation, in part, because of the compressed time frame associated with the project and the need to complete it by its mandated June 19, 2019, completion date. In aiming to meet this date, the OCWR official added that they held frequent discussions with the contractor and made changes “on the fly” to ensure that OCWR met the mandate. However, frequent discussions with the contractor does not negate the need to document and manage cybersecurity activities using leading project planning practices, including a project schedule, a requirements management process, and a risk management process. OCWR’s project management weaknesses also occurred, in part, because the office lacked policies and procedures for IT project scheduling, requirements management, and risk management. Such policies and procedures are critical to have in place as OCWR plans future IT projects. For example, as of October 2019, the office was planning to move its other key system, FMA, to the Library in 2020. Until OCWR develops and implements policies and procedures for incorporating cybersecurity management activities into its IT project planning using a project schedule, a requirements management process, and a risk management process, it will continue to have a limited ability to effectively manage and monitor the completion of cybersecurity activities and will face increased cybersecurity risks. The responsibility for adequately mitigating risks arising from the use of externally-operated systems remains with the agency itself. NIST Special Publications 800-53 and 800-53A guide agencies in selecting security and privacy controls for systems and assessing them to ensure that the selected controls are in place and functioning as expected. Additional NIST special publications on IT security services and risk management (Special Publications 800-35 and 800-37) identify several key activities important for assessing the security and privacy controls of information systems operated by external entities. The key activities and the steps included in NIST Special Publications 800-35 and 800-37 are shown in table 2. For the two selected systems—SOCRATES and FMA—OCWR either partially implemented, or did not implement, system oversight activities. Table 3 details the extent to which OCWR implemented system oversight activities and is followed by a discussion of each activity. Establish security and privacy requirements. OCWR partially implemented this oversight activity for both SOCRATES and FMA. Communicate requirements to external entities. OCWR communicated certain security and privacy requirements to its external partners for these two systems. For example, the office’s agreements with the Library for SOCRATES stated that the system will be secured in accordance with NIST security guidelines, including Special Publication 800-37, and the Library’s security policy guidelines. However, OCWR did not always include language in agreements in sufficient detail to ensure that requirements were communicated effectively. For example, the office did not always provide sufficient language to communicate privacy requirements related to the protection of personally identifiable information within its SOCRATES or FMA agreements. Further, OCWR’s agreements—related to FMA—expired during our review and contained references to retired Library guidelines that are no longer applicable or enforceable with regard to OCWR’s external contractor. Select and document security and privacy controls. OCWR worked with the Library to select and document about 300 security and privacy controls and control enhancements for SOCRATES within a system security plan. Further, the office worked with the Library to support the selection of controls by documenting privacy risks and impacts to SOCRATES within a privacy impact assessment—as called for by NIST to assess the privacy risks associated with collecting and using personal information—that was referred to in the system security plan. However, OCWR did not adequately oversee the selection and documentation of security and privacy controls in the system security plan that was used to plan and conduct initial control assessments for SOCRATES. In particular, the office did not always ensure that the system security plan for SOCRATES provided an appropriate description of controls to be implemented to meet the security and privacy requirements. For example, in certain instances, the system security plan described SOCRATES as a low-impact system when describing the security controls used to protect the system. These descriptions differed though from its actual classification as a moderate-impact system, as documented within an interagency agreement between OCWR and the Library. As another example, the system security plan for SOCRATES incorrectly described a security control related to the maintenance of SOCRATES as not applicable to moderate- impact systems. However, NIST’s classification of this control describes it as applicable to moderate-impact systems. For the FMA system, OCWR relied on its external contractor to document a system security plan that generally described security requirements for the system. However, the plan did not document the privacy requirements or the specific security and privacy controls that were expected to be implemented for FMA as a low-impact system. For example, the plan did not specify an authority to report information to in the event of a security incident. Further, the plan did not include or refer to other necessary security and privacy documentation, such as a privacy impact assessment. As a result, OCWR did not adequately oversee the completion of this key step for its FMA system. Plan assessment of security controls. OCWR partially implemented this oversight activity for SOCRATES and did not implement it for FMA. Select an independent assessor. OCWR relied on the Library to select an assessor for SOCRATES who was independent. For example, for SOCRATES, the Library used an external contractor to initially assess the system and reported taking steps to verify that the assessor was independent from the Library. However, the office did not adequately oversee the completion of this key step for SOCRATES and did not ensure that the assessor used for the system was independent from the office. Specifically, OCWR allowed the Library to select the assessor for SOCRATES and did not take steps to verify the assessor’s independence. Further, for FMA, OCWR did not select an assessor to review the system. Develop a test plan. Although OCWR relied on the Library to develop a test plan for SOCRATES, the test plan used to conduct initial control testing was not approved by the office and did not specify the procedures that were to be followed to test each control from the SOCRATES system security plan. For example, the SOCRATES test plan specified a high-level procedure for collecting relevant artifacts but did not specify what particular documentation would be collected or reviewed for each control identified in the system security plan. Regarding FMA, OCWR and its external contractor did not develop a test plan. Conduct assessment. OCWR partially implemented this oversight activity, which includes executing the test plan, for SOCRATES and did not implement it for FMA. Specifically, OCWR worked with the Library to perform initial control testing for SOCRATES and document the results in an online tracking system; however, as previously mentioned, the office did not ensure that a test plan with detailed procedures to test each control was developed and approved prior to the initial testing of SOCRATES. As a result, the office did not adequately oversee the execution of the test plan by the Library to ensure that controls that were assessed as implemented were effectively operating as intended. For FMA, OCWR and its external contractor did not execute a test plan or document the results of any tests for the system. Review assessment. OCWR partially implemented this oversight activity, which includes developing POA&Ms for remediation of weaknesses, for SOCRATES and did not implement it for FMA. Specifically, OCWR worked with the Library to develop POA&M data for SOCRATES that included many of the recommended NIST elements, such as estimated completion dates and issue identification. For example, following initial control testing in March 2019, OCWR and the Library worked to develop POA&M data for 62 security control weaknesses, including 24 high-risk and 38 moderate- risk weaknesses. As of November 2019, there were seven POA&Ms, including six categorized as high-risk and one as moderate-risk, that OCWR and the Library had not yet addressed. However, as previously mentioned, the office did not ensure that a test plan that included detailed procedures to test each control was developed and approved prior to the initial testing of SOCRATES. Therefore, the office could not ensure that controls were tested appropriately to identify necessary remedial actions in POA&Ms. As a result, OCWR did not adequately oversee the completion of this step and ensure that key POA&Ms were appropriately documented. For FMA, without an executed test plan, OCWR and its external contractor could not complete or update POA&Ms for the system. According to OCWR officials, including the office’s Deputy Executive Director, part of the reason for these shortfalls was that the office did not obtain expertise in security to aid in the completion of these oversight activities until September 2018 when the office hired a new IT Manager. In addition, OCWR officials, including the Deputy Executive Director, could not explain why the contractor did not produce key oversight related artifacts, such as those related to the security testing of controls, as agreed upon in contracts covering FMA during the performance period. However, a key contributing reason that we identified for the shortfalls in OCWR’s oversight of external partners was that OCWR had not documented procedures to direct the office in performing such oversight activities effectively. The lack of documented oversight procedures and shortfalls in OCWR’s oversight of its external partners contributed to concerns with the deployment of SOCRATES. For example: As previously discussed, OCWR did not ensure that all moderate- level security controls for the SOCRATES web-based form and secure information sharing platform were tested before the system was deployed in June 2019. For example, a control related to testing contingency plans for the SOCRATES web-based form was not assessed until August 2019, approximately 2 months after the system was deployed. Although penetration testing of the CMS portion of SOCRATES was completed in May 2019, OCWR did not ensure that penetration testing of the SOCRATES web-based form and secure information sharing platform was conducted before deployment. Penetration testing for the SOCRATES web-based form and secure information sharing platform was subsequently completed in December 2019, approximately 6 months after the system was deployed. Until OCWR develops and implements effective oversight procedures over its external partners, it may not be able to mitigate risks that could result in the loss of sensitive data or compromise of the office’s external systems. We also assessed selected security controls in place for SOCRATES and FMA including, but not limited to, configuration management, patch management, and personnel security. We intend to issue a separate limited official use only report that discusses the results of this review. NIST’s cybersecurity framework is intended to support federal agencies as they develop, implement, and continuously improve their cybersecurity risk management programs. In this regard, the framework identifies cybersecurity activities for achieving specific outcomes over the lifecycle of an organization’s management of cybersecurity risk. According to NIST, the first stage of the cybersecurity risk management lifecycle—which the framework refers to as “identify”—is focused on foundational activities for effective risk management that provide agencies with the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Additional NIST guidance, including its risk management framework, provides information on implementing foundational activities and achieving desired outcomes that calls for, among other things, the following: A risk executive in the form of an individual or group that provides agency-wide oversight of risk activities and facilitates collaboration among stakeholders and consistent application of the risk management strategy. This functional role helps to ensure that risk management is institutionalized into the day-to-day operations of organizations as a priority and integral part of carrying out missions. A cybersecurity risk management strategy that articulates how an agency intends to assess, respond to, and monitor risk associated with the operation and use of the information systems it relies on to carry out the mission. The strategy should, among other things, make explicit an agency’s risk tolerance, accepted risk assessment methodologies, a process for consistently evaluating risk across the organization, risk response strategies, approaches for monitoring risk over time, and priorities for investing in risk management. Risk-based policies and procedures that act as the primary mechanisms through which current security requirements are communicated to help reduce the agency’s risk of unauthorized access or disruption of services. If properly implemented, these policies and procedures may be able to effectively reduce the risk that could come from cybersecurity threats such as unauthorized access or disruption of services. For example, establishing policies and procedures that incorporate NIST’s risk management framework can help to ensure that a consistent approach is used to conduct a complete security assessment before a system is deployed and that a designated agency official certifies the system for operation based on progress in remediating control weaknesses and an assessment of residual risk. To its credit, OCWR’s strategic plan for fiscal years 2019 through 2023 includes a goal of developing, among other things, cybersecurity risk policies and procedures. The strategic plan also describes the office’s plans to ensure compliance with applicable IT and cybersecurity standards. Nevertheless, OCWR has not yet fully established an effective approach to organization-wide cybersecurity risk management that includes foundational elements. Specifically, although the office’s Director of the IT Governance, Risk Management, and InfoSec Compliance Program stated that he was serving as the risk executive, this role and its related responsibilities are not documented in OCWR’s policies. In addition, OCWR has not developed an organization-wide cybersecurity risk management strategy or determined a time frame for when the policies and procedures discussed in its strategic plan will be implemented. According to the Director of the IT Governance, Risk Management, and InfoSec Compliance Program, the reason for these shortfalls in risk management was that the office’s top priority was completing work on the SOCRATES system, and then it planned to work on its cybersecurity policies and procedures. Additionally, the official stated that OCWR considers development of documentation to be a continual process, and that the office would like to develop and build procedures to lay a foundation for effective risk management. However, until OCWR establishes the role and responsibilities of the risk executive function in policy, the office will lack an understanding of who is ultimately responsible for overseeing the cybersecurity risk activities of the organization and what those responsibilities include. Further, until OCWR establishes and implements a strategy for managing its cybersecurity risks using NIST’s framework, its ability to make operational decisions that adequately address security risks and prioritize IT security investments will be hindered. Finally, until OCWR establishes a time frame for developing and implementing risk-based policies and procedures, it will lack assurance that consistent steps are being taken to categorize systems; select, implement, and assess system security controls; and make risk-based decisions on authorizing systems to operate. Although OCWR completed the upgrade of its legacy claims management system through the SOCRATES project, the office did not incorporate cybersecurity activities into the project during planning. As a result, OCWR was left without a complete understanding of potential schedule issues, the system’s planned security requirements, and cybersecurity- related risks to the success of the project. These shortcomings existed, at least in part, because of a lack of OCWR policies and procedures that required cybersecurity management activities be incorporated into project scheduling, requirements management, and risk management. Until OCWR develops and implements such policies and procedures, future IT projects—such as the office’s planned transition of its FMA system to the Library—may face unnecessary cybersecurity risks and may not be carried out in an efficient and effective manner. OCWR made initial efforts to assess the implementation of security and privacy controls for the two selected externally-operated systems, but did not fully implement critical oversight activities. A contributing reason for these shortfalls is that OCWR had not documented procedures for the office to follow in order to perform such oversight of its external entities effectively. This ultimately contributed to OCWR not being able to first test important system security controls for ensuring the confidentiality, integrity, and availability of the system before it was deployed. Until OCWR establishes and implements specific procedures for overseeing external entities, it will have reduced assurance that external entities are adequately securing and protecting the office’s information. In addition, the office will face increased risks that system weaknesses may go undetected and unresolved, which could result in the loss of sensitive data or compromise of its systems. Given the increasing number and sophistication of cyber threats facing federal agencies, it is critical that organizations such as OCWR are well positioned to make consistent, informed risk-based decisions in protecting their systems and information against these threats. To its credit, OCWR has recognized the need for an improved organization-wide approach to its cybersecurity policies and IT governance in its most recent strategic plan. However, important elements of an effective organization-wide cybersecurity approach have not been fully implemented, including establishing the roles and responsibilities for the risk executive function in policy, a cybersecurity risk management strategy, and policies and procedures for managing cybersecurity risks. Until OCWR fully addresses these organization-wide cybersecurity risk management practices, its ability to ensure effective oversight and management of IT will remain limited. Moreover, OCWR may be limited in its ability to strengthen its risk posture, including ensuring effective cybersecurity across its relationships with external entities that are critical to its ability to provide IT services and systems needed to meet its mission. We are making five recommendations to the Office of Congressional Workplace Rights: The Executive Director should ensure the development and implementation of policies and procedures for incorporating key cybersecurity activities into IT project planning, including scheduling, requirements management, and risk management. (Recommendation 1) The Executive Director should ensure the development and implementation of oversight procedures for each externally-operated system that include establishing security and privacy requirements, planning the assessment of security controls, conducting the assessment, and, reviewing the assessment. (Recommendation 2) The Executive Director should ensure the establishment of roles and responsibilities for a risk executive function. (Recommendation 3) The Executive Director should ensure the development and implementation of a cybersecurity risk management strategy. (Recommendation 4) The Executive Director should ensure commitment to a time frame for developing and implementing policies and procedures for managing cybersecurity risk. (Recommendation 5) We provided a draft of this report to OCWR, the Library, and the third- party contractor for review and comment. In response, we received written comments from OCWR, which are reproduced in appendix II. In its comments, the office did not state whether it agreed or disagreed with our recommendations, but described initial actions taken and planned to address them. Specifically, OCWR noted that it has initiated several actions, such as revising the office’s IT systems project planning to ensure the development and implementation of policies and procedures incorporating key cybersecurity activities. Further, OCWR stated that it intends to implement additional changes, such as developing and implementing oversight procedures for each externally-operated system. Going forward, OCWR stated that it intends to update us on its progress in implementing the recommendations. We also received technical comments from the Library’s Deputy Chief Information Officer via email, which we incorporated as appropriate. In addition, the third-party contractor indicated via email that it had no concerns about, and worked with OCWR in responding to, the draft report. We are sending copies of this report to the appropriate congressional committees, the Executive Director of the Office of Congressional Workplace Rights, the Librarian of Congress, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9342 or marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The objectives of our review were to examine the extent to which the Office of Congressional Workplace Rights (OCWR) (1) incorporated key cybersecurity management activities into the project planning for its claims management system upgrade, (2) performed oversight of security controls and mitigated risks for selected systems operated by external parties on its behalf, and (3) established an effective organization-wide approach for managing cybersecurity risk. To assess OCWR’s incorporation of key cybersecurity management activities into the project planning for its claim management system upgrade (known as the Secure Online Claims Reporting and Tracking E- filing System, or SOCRATES), we reviewed available OCWR project planning documentation related to establishing a project schedule, requirements management process, and risk management process. This documentation included, for example, a draft SOCRATES project schedule, contract information, and business flow diagrams. We then compared OCWR’s documentation to leading practices for project planning, including those identified by the Software Engineering Institute. Three key areas needed to effectively managing projects are developing a project schedule; managing project requirements; and managing project risks. We also analyzed OCWR’s available project planning documentation to determine the extent that it incorporated key cybersecurity management activities, as identified by the National Institute of Standards and Technology (NIST) risk management framework. These key activities are: obtaining a system categorization, selecting and implementing security controls, assessing security controls, obtaining an authority to operate, and monitoring of security controls. Further, we conducted interviews with OCWR officials, including the General Counsel and the Director of the Information Technology (IT) Governance, Risk Management, and InfoSec Compliance Program, to assess the extent to which the office incorporated key cybersecurity management activities into its SOCRATES project planning. To assess the extent to which OCWR performed oversight of security controls and mitigated risks for selected externally-operated systems, we chose two systems—SOCRATES and the Facility Management Assistant (FMA). We chose these two systems because they process and maintain OCWR’s most sensitive information, including claims related to alleged violations of employee rights and protections and reported occupational safety and health violations. We then collected and reviewed cybersecurity policies, procedures, and documentation (e.g., system security plans) from the office and its external partners that related to protecting the security and privacy of information and systems. To assess the reliability of the SOCRATES system security plan and its security control testing data obtained from the Library’s online repository, we reviewed related documentation (e.g., security assessment results briefings), reviewed the data for obvious omissions (i.e., fields left blank), and performed electronic testing to identify outliers. We also interviewed Library officials to discuss the reliability of the data. Based on our assessment, we determined that the data were sufficiently reliable for the purpose of our reporting objectives. We then examined whether OCWR and its external partners implemented—for each selected system—four oversight activities important for assessing the security and privacy controls of information systems operated by external entities, as specified in federal requirements and guidance, including NIST Special Publications 800-35, and 800-37. The four oversight activities we examined were: (1) establishing security and privacy requirements, (2) planning the assessment of security controls, (3) conducting the assessment, and (4) reviewing the assessment. We chose these activities because of their importance to providing effective oversight of systems operated by external entities. Further, we assessed whether OCWR implemented policies and procedures set forth by the office, including contractor oversight activities performed by the responsible official. We also conducted interviews with officials from OCWR, including the General Counsel, Deputy Executive Director, and Director of the IT Governance, Risk Management, and InfoSec Compliance Program. In addition, we also interviewed key personnel from OCWR’s external partners, such as the Library’s Deputy Chief Information Officer and the President of the external contractor, to assess the extent of OCWR’s oversight activities for SOCRATES and FMA. We assessed selected security controls in place for SOCRATES and FMA including, but not limited to, configuration management, patch management, and personnel security. We intend to issue a separate limited official use only report that discusses the results of this review. To assess OCWR’s efforts to establish an effective organization-wide approach for cybersecurity risk management activities, we used NIST’s cybersecurity framework, which identifies foundational components of effective cybersecurity risk management. We also used additional guidance provided by NIST for implementing the foundational components and achieving desired outcomes. These components included the establishment of a risk executive function, cybersecurity risk management strategy, and risk-based security policies and procedures. We then evaluated OCWR’s organization-wide cybersecurity risk management approach by, among other things, analyzing available policies and plans, management reports, and strategic planning documentation against the foundational cybersecurity risk management components identified in NIST guidance. Further, we conducted semistructured interviews with relevant OCWR officials with responsibilities for managing their efforts to establish an approach for managing cybersecurity risk, including the General Counsel and the Director of the IT Governance, Risk Management, and InfoSec Compliance Program. We conducted this performance audit from January 2019 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jon Ticehurst (Assistant Director), Lisa Hardman (Analyst in Charge), Edward Alexander, Jr., Angela Bell, Christina Bixby, David Blanding, Hannah Brookhart, Kisa Bushyeager, Christopher Businsky, West Coile, Linda Erickson, Rebecca Eyler, Kaelin Kuhn, Sukhjoot Singh, Eugene Stevens, and Adam Vodraska made key contributions to this report. Giny Cheong, Edda Emmanuelli-Perez, Elizabeth Fan, Steven Lozano, Rebecca Woiwode, and Edith Yuh also provided valuable assistance.", "summary": "OCWR is an independent, nonpartisan office that administers and enforces various provisions related to fair employment, and occupational safety and health within the legislative branch. To meet its mission, OCWR relies extensively on external parties, such as the Library of Congress, for IT support. In December 2018, Congress passed the Congressional Accountability Act of 1995 Reform Act (Reform Act) which, among other things, required OCWR to create a secure, online system to receive and keep track of claims related to employee rights and protections, such as sexual harassment and discrimination. To meet this requirement, OCWR initiated the SOCRATES project to upgrade its legacy claims management system. The Reform Act included a provision for GAO to review OCWR's cybersecurity practices. This report examines the extent to which OCWR (1) incorporated key cybersecurity management activities into project planning for its claims management system upgrade, (2) performed oversight of security controls and mitigated risks for selected systems operated by external parties on its behalf and, (3) established an effective approach for managing organization-wide cybersecurity risk. To address these objectives, GAO compared OCWR IT policies, procedures, strategic plans, and documentation for two selected systems to leading IT project planning, system oversight, and cybersecurity management practices. The Office of Congressional Workplace Rights (OCWR) did not incorporate key cybersecurity management practices into the planning for its Secure Online Claims Reporting and Tracking E-filing System (SOCRATES) project. While OCWR drafted a SOCRATES project schedule, the office did not finalize and use this schedule to manage cybersecurity activities, such as the time frames for conducting information technology (IT) system security assessments. In addition, the office did not document project cybersecurity risks, such as the office's reliance on external parties to implement responsibilities on its behalf. These weaknesses were due, in part, to a lack of policies and procedures for IT project planning. Until OCWR establishes and implements such policies and procedures, it will continue to have a limited ability to effectively manage and monitor the completion of cybersecurity activities for its IT projects. OCWR did not fully implement important oversight activities for two selected systems—SOCRATES and the system used to document occupational safety and health violations known as the Facility Management Assistant (FMA)—operated by external entities (see table). These shortfalls contributed to concerns with the deployment of SOCRATES in June 2019. For example, important security controls needed to ensure the confidentiality, integrity, and availability of the system were not fully tested before the system was deployed. In addition, penetration testing—where evaluators mimic real-world attacks in an attempt to identify ways to circumvent the security features of the system—was not fully completed before deployment. GAO plans to issue a separate report with limited distribution on its assessment of security controls intended to, among other things, prevent successful attacks. Although OCWR's strategic plan includes a goal of developing cybersecurity policies and procedures, the office had not fully established an effective approach for managing organization-wide cybersecurity risk. For example, OCWR designated an executive to oversee risk, but had not established the responsibilities of the official in the office's policies. Until OCWR improves its appoach to managing cybersecurity risks, its ability to make operational decisions that adequately address security risks will be hindered. GAO is making five recommendations to OCWR to address weaknesses in cybersecurity management and oversight. OCWR did not state whether it agreed or disagreed with GAO's recommendations, but described actions planned or taken to address them.", "document_type": "gao"}
{"report": "As shown in table 1 the cost of counting the nation’s population has been escalating with each decade. The 2010 Census was the most expensive in U.S. history at about $12.3 billion, and was about 31 percent more costly than the $9.4 billion 2000 Census (in 2020 dollars). According to the Bureau, the total cost of the 2020 Census in October 2015 was estimated at $12.3 billion and in October 2017 that cost estimate grew to approximately $15.6 billion, approximately a $3 billion increase. Additionally, Bureau officials told us that while the estimated cost of the census had increased to $15.6 billion, it was nevertheless managing the 2020 Census to a lower cost of $14.1 billion. Bureau officials explained that the $14.1 billion includes all program costs and contingency funds to cover risks and general estimating uncertainty. The remaining $1.5 billion estimated cost is additional contingency for “unknown unknowns”—that is, low probability events that could cause massive disruptions—and several what-if scenarios such as an increase in the wage rate or additional supervisors needed to manage field operations. Moreover, as shown in figure 1, the average cost for counting a housing unit increased from about $16 in 1970 to around $92 in 2010 (in 2020 constant dollars). At the same time, the return of census questionnaires by mail (the primary mode of data collection) declined over this period from 78 percent in 1970 to 63 percent in 2010. Declining mail response rates have led to higher costs because the Bureau sends temporary workers to each non-responding household to obtain census data. Achieving a complete and accurate census has become an increasingly daunting task, in part, because the population is growing larger, more diverse, and more reluctant to participate in the enumeration. In many ways, the Bureau has had to invest substantially more resources each decade to conduct the enumeration. In addition to these external societal challenges that make achieving a complete count a daunting task, the Bureau also faces a number of internal management challenges that affect its capacity and readiness to conduct a cost-effective enumeration. Some of these issues—such as acquiring and developing IT systems and preparing reliable cost estimates—are long-standing in nature. At the same time, as the Bureau looks toward 2020, it has faced emerging and evolving uncertainties. For example, on March 26, 2018, the Secretary of Commerce announced his decision to add a question to the decennial census on citizenship status which resulted in various legislative actions and legal challenges. Ultimately, the case was heard by the U.S. Supreme Court, which, in a June 26, 2019, ruling, prevented the addition of the question because the Court found that the evidence Commerce provided in the case did not match the Secretary’s explanation. In addition, the Fourth Circuit Court of Appeals remanded other legal challenges to the district court on June 24, 2019, for further legal action, which is yet to be resolved. According to Bureau officials, on June 28, 2019, Commerce asked the Bureau to put its scheduled July 1 start date for printing questionnaires on hold while it considered legal implications of the Supreme Court ruling. On July 2, 2019, Commerce told the Bureau to proceed with printing questionnaires and other materials without the citizenship question on them. On July 5, 2019, the Department of Justice (DOJ) indicated that, although printing was continuing without the citizenship question, DOJ was evaluating legal options to include the question. However, on July 11, 2019, the President signed Executive Order 13880 stating that the Attorney General and Secretary of Commerce had informed him that the logistics and timing necessary to carry out the census, combined with delays from litigation, left no practical mechanism for including the question on the 2020 Decennial Census. Instead of collecting this information from the census questionnaire, the Executive Order requires all federal agencies to provide data on citizenship status to Commerce using legally available federal records. On the same day, DOJ notified the District Court of the issuance of the Executive Order and the Attorney General’s prepared statement that “as a practical matter, the Supreme Court’s decision closed all paths to adding the question to the 2020 decennial census.” DOJ advised the court of its intent to confer with opposing counsel regarding appropriate next steps in the proceedings. We have not analyzed these recent developments or their implications, if any, for how the Bureau will tabulate its official counts. We will continue to monitor developments for Congress. The Bureau also faced budgetary uncertainties that, according to the Bureau, led to the curtailment of testing in 2017 and 2018. However, the Consolidated Appropriations Act, 2018 appropriated for the Periodic Censuses and Programs account $2.544 billion, which more than doubled the Bureau’s request in the President’s Fiscal Year 2018 Budget of $1.251 billion. According to the explanatory statement accompanying the act, the appropriation, which is available through fiscal year 2020, was provided to ensure the Bureau has the necessary resources to immediately address any issues discovered during operational testing, and to provide a smoother transition between fiscal year 2018 and fiscal year 2019. The availability of those resources enabled the Bureau to continue preparations for the 2020 Census during the 35 days in December 2018 to January 2019 when appropriations lapsed for the Bureau and a number of other federal agencies. Moreover, the Consolidated Appropriations Act, 2019 appropriated for the Periodic Censuses and Programs account $3.551 billion. According to Bureau officials, this level of funding for fiscal year 2019 is sufficient to carry out 2020 Census activities as planned. Importantly, the census is conducted against a backdrop of immutable deadlines. In order to meet the statutory deadline for completing the enumeration, census activities need to take place at specific times and in the proper sequence. Thus, it is absolutely critical for the Bureau to stay on schedule. Figure 2 shows some dates for selected decennial events. The Bureau has begun to open its area census offices (ACO) for the 2020 Census. It has signed leases for all 248 ACOs, of which 39 of the offices will be open for the address canvassing operation set to begin in August 2019 where staff verifies the location of selected housing units. The remaining 209 offices will begin opening this fall. In 2010 the Bureau opened 494 census offices. The Bureau has been able to reduce its infrastructure because it is relying on automation to assign work and to record payroll. Therefore there is less paper—field assignments, maps, and daily payroll forms—to manually process. For the 2020 Census, the Bureau is refining its recruiting and hiring goals, but tentatively plans to recruit approximately 2.24 million applicants and to hire over 400,000 temporary field staff from that applicant pool for two key operations: address canvassing, and nonresponse follow-up, where they visit households that do not return census forms to collect data in person. In 2010 the Bureau recruited 3.8 million applicants and hired 628,000 temporary workers to conduct the address canvassing and nonresponse follow-up field operations. According to Bureau officials, it has reduced the number of temporary staff it needs to hire because automation has made field operations more efficient and there is less paper. As of July 2019, the Bureau reported that for all 2020 Census operations it had processed just over 500,000 applicants. In addition, the Bureau was seeking to hire approximately 1,500 partnership specialists by the end of June 2019 to help increase census awareness and participation in minority communities and hard-to-reach populations. The Bureau reported that as of July 6, 2019, it had hired 903 partnership specialists, and as of July 17, 2019, another 872 applicants were waiting to have their background checks completed. According to Bureau officials, hiring data are based on payroll dates generated biweekly, while background check data are tracked internally and can be updated daily. The Bureau did not meet its June 30 hiring goal, and told us that it expected to have all partnership specialists on board by September 1, 2019. Among other things, partnership specialists are expected to either provide or identify partners to help provide supplemental language support to respondents locally in over 100 different languages. We will continue to monitor the Bureau’s progress in meeting its partnership specialist staffing goals and addressing any turnover that takes place. Hiring partnership specialists in a timely manner and maintaining adequate partnership specialist staffing levels are key to the Bureau’s ability to carry out its planned outreach efforts, especially to hard-to-count communities. Moreover, Bureau officials also stated that the current economic environment (i.e., the low unemployment rate compared to the economic environment of the 2010 Census) has not yet impacted their ability to recruit staff. The Bureau will continue to monitor the impact of low unemployment on its ability to recruit and hire at the local and regional levels. For the 2020 Census, the Bureau is substantially changing how it intends to conduct the census, in part by re-engineering key census-taking methods and infrastructure, and making use of new IT applications and systems. For example, the Bureau plans to offer an option for households to respond to the survey via the internet and enable field-based enumerators to use applications on mobile devices to collect survey data from households. To do this, the Bureau plans to utilize 52 new and legacy IT systems, and the infrastructure supporting them, to conduct the 2020 Census. A majority of these 52 systems have been tested during operational tests in 2017 and 2018. For example, the Bureau conducted its 2018 End-to- End test, which included 44 of the 52 systems and was intended to test all key systems and operations in a census-like environment to ensure readiness for the 2020 Census. Nevertheless, additional IT development and testing work needs to take place before the 2020 Census. Specifically, officials from the Bureau’s Decennial Directorate said they expect that the systems will need to undergo further development and testing due to, among other things, the need to add functionality that was not part of the End-to-End test, scale system performance to support the number of respondents expected during the 2020 Census, and address system defects identified during the 2018 End-to-End test. To prepare the systems and technology for the 2020 Census, the Bureau is also relying on substantial contractor support. For example, it is relying on contractors to develop a number of systems and components of the IT infrastructure, including the IT platform that is intended to be used to collect data from households responding via the internet and telephone, and for non-response follow-up activities. Contractors are also deploying the IT and telecommunications hardware in the field offices and providing device-as-a-service capabilities by procuring the mobile devices and cellular service to be used for non-response follow-up. In addition to the development of technology, the Bureau is relying on a technical integration contractor to integrate all of the key systems and infrastructure. The contractor’s work is expected to include, among other things, evaluating the systems and infrastructure and acquiring the infrastructure (e.g., cloud or data center) to meet the Bureau’s scalability and performance needs; integrating all of the systems; and assisting with technical, performance and scalability, and operational testing activities. In February 2017, we added the 2020 Decennial Census as a high-risk area needing attention from Congress and the executive branch. This was due to significant risks related to, among other things, innovations never before used in prior enumerations, the acquisition and development of IT systems, and expected escalating costs. Among other things, we reported that the commitment of top leadership was needed to ensure the Bureau’s management, culture, and business practices align with a cost-effective enumeration. We also stressed that the Bureau needed to rigorously test census-taking activities; ensure that scheduling adheres to best practices; improve its ability to manage, develop, and secure its IT systems; and have better oversight and control over its cost estimation process. Our experience has shown that agencies are most successful at removal from our High-Risk List when leaders give top level attention to the five criteria for removal and Congress takes any needed action. The five criteria for removal that we identified in November 2000 are as follows: Leadership Commitment. The agency has demonstrated strong commitment and top leadership support. Capacity. The agency has the capacity (i.e., people and resources) to resolve the risk(s). Action Plan. A corrective action plan exists that defines the root causes and solutions, and that provides for substantially completing corrective measures, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated Progress. The agency has demonstrated progress in implementing corrective measures and in resolving the high-risk area. These five criteria form a road map for efforts to improve, and ultimately address, high-risk issues. Addressing some of the criteria leads to progress, while satisfying all of the criteria is central to removal from the list. As we reported in the March 2019 high-risk report, the Bureau’s efforts to address the risks and challenges for the 2020 Census had fully met one of the five criteria for removal from the High-Risk List—leadership commitment—and partially met the other four, as shown in figure 3. Additional details about the status of the Bureau’s efforts to address this high-risk area are discussed later in this statement. The 2020 Census is on our list of high-risk programs because, among other things, (1) innovations never before used in prior enumerations are not expected to be fully tested, (2) the Bureau continues to face challenges in implementing IT systems, (3) the Bureau faces significant cybersecurity risks to its systems and data, and (4) the Bureau’s cost estimate for the 2020 Census was unreliable. If not sufficiently addressed, these risks could adversely impact the cost and quality of the enumeration. Moreover, the risks are compounded by other factors that contribute to the challenge of conducting a successful census, such as the nation’s increasingly diverse population and concerns over personal privacy. The basic design of the enumeration—mail out and mail back of the census questionnaire with in-person follow-up for non-respondents—has been in use since 1970. However, a lesson learned from the 2010 Census and earlier enumerations is that this traditional design is no longer capable of cost-effectively counting the population. In response to its own assessments, our recommendations, and studies by other organizations, the Bureau has fundamentally re-examined its approach for conducting the 2020 Census. Specifically, its plan for 2020 includes four broad innovation areas: re-engineering field operations, using administrative records, verifying addresses in-office, and developing an internet self-response option (see table 2). If they function as planned, the Bureau initially estimated that these innovations could result in savings of over $5 billion (in 2020 constant dollars) when compared to its estimates of the cost for conducting the census with traditional methods. However, in June 2016, we reported that the Bureau’s initial life-cycle cost estimate developed in October 2015 was not reliable and did not adequately account for risk. As discussed earlier in this statement, the Bureau has updated its estimate from $12.3 billion and now estimates a life-cycle cost of $15.6 billion, which would result in a smaller potential savings from the innovative design than the Bureau originally estimated. According to the Bureau, the goal of the cost estimate increase was to ensure quality was fully addressed. While the planned innovations could help control costs, they also introduce new risks, in part, because they include new procedures and technology that have not been used extensively in earlier decennials, if at all. Our prior work has shown the importance of the Bureau conducting a robust testing program, including the 2018 End-to-End test. Rigorous testing is a critical risk mitigation strategy because it provides information on the feasibility and performance of individual census-taking activities, their potential for achieving desired results, and the extent to which they are able to function together under full operational conditions. To address some of these challenges we have made numerous recommendations aimed at improving reengineered field operations, using administrative records, verifying the accuracy of the address list, and securing census responses via the internet. The Bureau has held a series of operational tests since 2012, but according to the Bureau, it scaled back its most recent field tests because of funding uncertainties. For example, the Bureau canceled the field components of the 2017 Census Test including non-response follow-up, a key census operation. In November 2016, we reported that the cancelation of the 2017 Census Test was a lost opportunity to test, refine, and integrate operations and systems, and that it put more pressure on the 2018 End-to-End test to demonstrate that enumeration activities will function under census-like conditions as needed for 2020. However, in May 2017, the Bureau scaled back the operational scope of the 2018 End-to-End test and, of the three planned test sites, only the Rhode Island site would fully implement the 2018 End-to-End test. The Washington and West Virginia sites would test just one field operation. In addition, due to budgetary concerns, the Bureau delayed ramp up and preparations for its coverage measurement operation (and the technology that supports it) from the scope of the test. However, removal of the coverage measurement operation did not affect testing of the delivery of apportionment or redistricting data. Without sufficient testing, operational problems can go undiscovered and the opportunity to improve operations will be lost, in part because the 2018 End-to-End test was the last opportunity to demonstrate census technology and procedures across a range of geographic locations, housing types, and demographic groups under decennial-like conditions prior to the 2020 Census. We reported on the 2018 End-to-End test in December 2018 and noted that the Bureau had made progress addressing prior test implementation issues but still faced challenges. As the Bureau studies the results of its testing to inform the 2020 Census, it will be important that it addresses key program management issues that arose during implementation of the test. Namely, by not aligning the skills, responsibilities, and information flows for the first-line supervisors during field data collection, the Bureau limited its role in support of enumerators within the re-engineered field operation. The Bureau also lacked mid-operation training or guidance, which, if implemented in a targeted, localized manner, could have further helped enumerators navigate procedural modifications and any commonly encountered problems when enumerating. It will be important for the Bureau to prioritize its mitigation strategies for these implementation issues so that it can maximize readiness for the 2020 Census. To manage risk to the 2020 Census the Bureau has developed hundreds of risk mitigation and contingency plans. Mitigation plans detail how an agency will reduce the likelihood of a risk event and its impacts, if it occurs. Contingency plans identify how an agency will reduce or recover from the impact of a risk after it has been realized. In May 2019, we reported that the Bureau had identified 360 active risks to the 2020 census as of December 2018—meaning the risk event could still occur and adversely impact the census. Of these, 242 met the Bureau’s criteria for requiring a mitigation plan and, according to the Bureau’s risk registers, 232 had a plan (see table 3). In addition, 146 risks met the Bureau’s criteria for requiring one contingency plan and, according to the Bureau’s risk registers, 102 had a plan. Bureau guidance states that these plans should be developed as soon as possible after a risk is added to the risk register, but it does not establish a clear time frame for doing so. Consequently, some risks may go without required plans for extended periods. We found that, as of December 2018, some of the risks without required plans had been added to the Bureau’s risk registers in recent months, but others had been added more than 3 years earlier. We reviewed the mitigation and contingency plans in detail for six risks which the Bureau identified as among the major concerns that could affect the 2020 Census. These included cybersecurity incidents, late operational design changes, and integration of the 52 systems and 35 operations supporting the 2020 Census. We found that the plans did not consistently include key information needed to manage the risk. For example, the Bureau’s contingency plan for late operational design changes did not include activities specific to the three most likely late operational design changes—including removal of the citizenship question as a result of litigation or congressional action—that the Bureau could carry out to lessen their adverse impact on the enumeration. We found that gaps stemmed from either requirements that were missing from the Bureau’s decennial risk management plan, or that risk owners— the individuals assigned to manage each risk—were not fulfilling all of their risk management responsibilities. Bureau officials said that risk owners were aware of these responsibilities but did not always fulfill them given competing demands. Bureau officials also said that they are managing risks to the census, even if that is not always reflected in their mitigation and contingency plans. However, if such actions are reflected in disparate documents or are not documented at all, then decision makers are left without an integrated and comprehensive picture of how the Bureau is managing risks to the census. We made seven recommendations to improve the Bureau’s management of risks to the 2020 Census, including that the Bureau develop mitigation and contingency plans for all risks that require them, establish a clear time frame for plan development, and ensure that the plans have the information needed to manage the risk. Commerce agreed with our recommendations and said it would develop an action plan to address them. We have previously reported that the Bureau faces challenges in managing and overseeing IT programs, systems, and contractors supporting the 2020 Census. Specifically, we have noted challenges in the Bureau’s efforts to manage, among other things, the schedules and contracts for its systems. As a result of these challenges, the Bureau is at risk of being unable to fully implement the systems necessary to support the 2020 Census and conduct a cost-effective enumeration. To help improve its implementation of IT for the 2020 Census, the Bureau revised its systems development and testing schedule. Specifically, in October 2018, the Bureau organized the development and testing schedule for its 52 systems into 16 operational deliveries. Each of the 16 operational deliveries has milestone dates for, among other things, development, performance and scalability testing, and system deployment. According to Bureau officials in the Decennial Directorate, the schedule was revised, in part, due to schedule management challenges experienced, and lessons learned, while completing development and testing during the 2018 End-to-End test. The Bureau has made initial progress in executing work against its revised schedule. For example, the Bureau completed development of the systems in the first operational delivery—for 2020 Census early operations preparations—in July 2018, and deployed these systems into production in October 2018. However, our current work has determined that the Bureau is at risk of not meeting several near-term systems testing milestones. As of June 2019, 11 systems that are expected to be used in a total of five operational deliveries were at risk of not meeting key milestones for completing system development, performance and scalability testing, and/or integration testing. These 11 systems are needed for, among other things, data collection for operations, business and support automation, and customer support during self-response. Figure 4 presents an overview of the status for all 16 operational deliveries, as of June 2019. The at-risk systems previously discussed add uncertainty to a highly compressed time frame over the next 6 months. Importantly, between July and December 2019, the Bureau is expected to be in the process of integration testing the systems in 12 operational deliveries. Officials from the Bureau’s integration contractor noted concern that the current schedule leaves little room for any delays in completing the remaining development and testing activities. In addition to managing the compressed testing time frames, the Bureau also has to quickly finalize plans related to its IT infrastructure. For example, as of June 2019, the Bureau stated that it was still awaiting final approval for its Trusted Internet Connection. Given that these plans may impact systems being tested this summer or deployed into production for the address canvassing operation in August 2019, it is important that the Bureau quickly addresses this matter. Our past reporting noted that the Bureau faced significant challenges in managing its schedule for system development and testing that occurred in 2017 and 2018. We reported that, while the Bureau had continued to make progress in developing and testing IT systems for the 2020 Census, it had experienced delays in developing systems to support the 2018 End-to-End test. These delays compressed the time available for system and integration testing and for security assessments. In addition, several systems experienced problems during the test. We noted then, and reaffirm now, that continued schedule management challenges may compress the time available for the remaining system and integration testing and increase the risk that systems may not function or be as secure as intended. The Bureau has acknowledged that it faces risks to the implementation of its systems and technology. As of May 2019, the Bureau had identified 17 high risks related to IT implementation that may have substantial technical and schedule impacts if realized. Taken together, these risks represent a cross-section of issues, such as schedule delays for a fraud- detection system, the effects of late changes to technical requirements, the need to ensure adequate time for system development and performance and scalability testing, contracting issues, privacy risks, and skilled staffing shortages. Going forward, it will be important that the Bureau effectively manages these risks to better ensure that it meets near-term milestones for system development and testing, and is ready for the major operations of the 2020 Census. The risks to IT systems supporting the federal government and its functions, including conducting the 2020 Census, are increasing as security threats continue to evolve and become more sophisticated. These risks include insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Underscoring the importance of this issue, we have designated information security as a government-wide high-risk area since 1997 and, in our most recent biennial report to Congress, ensuring the cybersecurity of the nation was one of nine high-risk areas that we reported needing especially focused executive and congressional attention. Our prior and ongoing work has identified significant challenges that the Bureau faces in securing systems and data for the 2020 Census. Specifically, the Bureau has faced challenges related to completing security assessments, addressing security weaknesses, resolving cybersecurity recommendations from DHS, and addressing numerous other cybersecurity concerns (such as phishing). Federal law specifies requirements for protecting federal information and information systems, such as those systems to be used in the 2020 Census. Specifically, the Federal Information Security Management Act of 2002 and the Federal Information Security Modernization Act of 2014 (FISMA) require executive branch agencies to develop, document, and implement an agency-wide program to provide security for the information and information systems that support operations and assets of the agency. In accordance with FISMA, National Institute of Standards and Technology (NIST) guidance, and Office of Management and Budget (OMB) guidance, the Bureau’s Office of the Chief Information Officer (CIO) established a risk management framework. This framework requires system developers to ensure that each of the Bureau’s systems undergoes a full security assessment, and that system developers remediate critical deficiencies. According to the Bureau’s risk management framework, the systems expected to be used to conduct the 2020 Census will need to have complete security documentation (such as system security plans) and an approved authorization to operate prior to their use. As of June 2019, according to the Bureau’s Office of the CIO: Thirty-seven of the 52 systems have authorization to operate, and will not need to be reauthorized before they are used in the 2020 Census Nine of the 52 systems have authorization to operate, and will need to be reauthorized before they are used in the 2020 Census Five of the 52 systems do not have authorization to operate, and will need to be authorized before they are used in the 2020 Census One of the 52 systems does not need an authorization to operate before it is used in the 2020 Census. Figure 5 summarizes the authorization to operate status for the systems being used in the 2020 Census, as reported by the Bureau in June 2019. As we have previously reported, while large-scale technological changes (such as internet self-response) increase the likelihood of efficiency and effectiveness gains, they also introduce many cybersecurity challenges. The 2020 Census also involves collecting personally identifiable information (PII) on over a hundred million households across the country, which further increases the need to properly secure these systems. Thus, it will be important that the Bureau provides adequate time to perform these security assessments, completes them in a timely manner, and ensures that risks are at an acceptable level before the systems are deployed. We have ongoing work examining how the Bureau plans to address both internal and external cyber threats, including its efforts to complete system security assessments and resolve identified weaknesses. FISMA requires that agency-wide information security programs include a process for planning, implementing, evaluating, and documenting remedial actions (i.e., corrective actions) to address any deficiencies in the information security policies, procedures, and practices of the agency. Additionally, the Bureau’s framework requires it to track security assessment findings that need to be remediated as a plan of action and milestones (POA&M). These POA&Ms are expected to provide a description of the vulnerabilities identified during the security assessment that resulted from a control weakness. As of the end of May 2019, the Bureau had over 330 open POA&Ms to remediate for issues identified during security assessment activities, including ongoing continuous monitoring. Of these open POA&Ms, 217 (or about 65 percent) were considered “high-risk” or “very high-risk.” While the Bureau established POA&Ms for addressing these identified security control weaknesses, it did not always complete remedial actions in accordance with its established deadlines. For example, of the 217 open “high-risk” or “very high-risk” POA&Ms we reviewed, the Bureau identified 104 as being delayed. Further, 74 of the 104 had missed their scheduled completion dates by 60 or more days. According to the Bureau’s Office of Information Security, these POA&Ms were identified as delayed due to technical challenges or resource constraints to remediate and close them. We previously recommended that the Bureau take steps to ensure that identified corrective actions for cybersecurity weaknesses are implemented within prescribed time frames. As of late May 2019, the Bureau was working to address our recommendation. Until the Bureau resolves identified vulnerabilities in a timely manner, it faces an increased risk, as continuing opportunities exist for unauthorized individuals to exploit these weaknesses and gain access to sensitive information and systems. The Bureau is working with federal and industry partners, including DHS, to support the 2020 Census cybersecurity efforts. Specifically, the Bureau is working with DHS to ensure a scalable and secure network connection for the 2020 Census respondents (e.g., virtual Trusted Internet Connection with the cloud), improve its cybersecurity posture (e.g., risk management processes and procedures), and strengthen its response to potential cyber threats (e.g., federal cyber incident coordination). Federal law and related standards describe practices for strengthening cybersecurity by documenting or tracking corrective actions. As previously mentioned, FISMA requires executive branch agencies to establish a process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in their information security policies, procedures, and practices. Standards for Internal Control in the Federal Government calls for agencies to establish effective internal control monitoring that includes a process to promptly resolve the findings of audits and other reviews. Specifically, agencies should document and complete corrective actions to remediate identified deficiencies on a timely basis. This would include correcting identified deficiencies or demonstrating that the findings and recommendations do not warrant agency action. Since January 2017, DHS has been providing cybersecurity assistance (including issuing recommendations) to the Bureau in preparation for the 2020 Census. Specifically, DHS has been providing cybersecurity assistance to the Bureau in five areas: management coordination and executive support, including a CyberStat Review; cybersecurity threat intelligence and information sharing enhancement through, among other things, a DHS cyber threat briefing to the Bureau’s leadership; network and infrastructure security and resilience, including National Cybersecurity Protection System (also called EINSTEIN) support; incident response and management readiness through a Federal Incident Response Evaluation assessment; and risk management and vulnerability assessments for specific high value assets provided by the Bureau. In the last 2 years, DHS has provided 42 recommendations to assist the Bureau in strengthening its cybersecurity efforts. Among other things, the recommendations pertained to strengthening cyber incident management capabilities, penetration testing and web application assessments of select systems, and phishing assessments to gain access to sensitive PII. Of the 42 recommendations, 10 recommendations resulted from DHS’s mandatory services for the Bureau (e.g., risk management and vulnerability assessments for specific high value assets). The remaining 32 recommendations resulted from DHS’s voluntary services for the Bureau (e.g., Federal Incident Response Evaluation assessment). Due to the sensitive nature of the recommendations, we are not identifying the specific recommendations or specific findings associated with them in this statement. In April 2019, we reported that the Bureau had not established a formal process for documenting, tracking, and completing corrective actions for all of the recommendations provided by DHS. Accordingly, we recommended that the Bureau implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity findings identified by DHS. As of late May 2019, the Bureau was working to address our recommendation. Until the Bureau implements our recommendation, it faces an increased likelihood that findings identified by DHS will go uncorrected and may be exploited to cause harm to agency’s 2020 Census IT systems and gain access to sensitive respondent data. Implementing a formal process would also help to ensure that DHS’s efforts result in improvements to the Bureau’s cybersecurity posture. The Bureau faces other substantial cybersecurity challenges in addition to those previously discussed. More specifically, we previously reported that the extensive use of IT systems to support the 2020 Census redesign may help increase efficiency, but that this redesign introduces critical cybersecurity challenges. These challenges include those related to the following: Phishing. We have previously reported that advanced persistent threats may be targeted against social media web sites used by the federal government. In addition, attackers may use social media to collect information and launch attacks against federal information systems through social engineering, such as phishing. Phishing attacks could target respondents, as well as Bureau employees and contractors. The 2020 Census will be the first one in which respondents will be heavily encouraged to respond via the internet. This will likely increase the risk that cyber criminals will use phishing in an attempt to steal personal information. According to the Bureau, it plans to inform the public of the risks associated with phishing through its education and communication campaigns. Disinformation from social media. We previously reported that one of the Bureau’s key innovations for the 2020 Census is the large-scale implementation of an internet self-response option. The Bureau is encouraging the public to use the internet self-response option through expanded use of social media. However, the public perception of the Bureau’s ability to adequately safeguard the privacy and confidentiality of the 2020 Census internet self-responses could be influenced by disinformation spread through social media. According to the Bureau, if a substantial segment of the public is not convinced that the Bureau can safeguard public response data against data breaches and unauthorized use, then response rates may be lower than projected, leading to an increase in cases for follow-up and subsequent cost increases. To help address this challenge, the Bureau stated that it plans to inform the public of the risks associated with disinformation from social media through its education and communication campaigns. Ensuring that individuals gain only limited and appropriate access to 2020 Census data. The Bureau plans to enable a public- facing website and Bureau-issued mobile devices to collect PII (e.g., name, address, and date of birth) from the nation’s entire population— estimated to be over 300 million. In addition, the Bureau is planning to obtain and store administrative records containing PII from other government agencies to help augment information that enumerators did not collect. The number of reported security incidents involving PII at federal agencies has increased dramatically in recent years. Because of these challenges, we have recommended, among other things, that federal agencies improve their response to information security incidents and data breaches involving PII, and consistently develop and implement privacy policies and procedures. Accordingly, it will be important for the Bureau to ensure that only respondents and Bureau officials are able to gain access to this information, and enumerators and other employees only have access to the information needed to perform their jobs. Ensuring adequate control in a cloud environment. The Bureau has decided to use cloud solutions as a key component of the 2020 Census IT infrastructure. We have previously reported that cloud computing has both positive and negative information security implications and, thus, federal agencies should develop service-level agreements with cloud providers. These agreements should specify, among other things, the security performance requirements—including data reliability, preservation, privacy, and access rights—that the service provider is to meet. Without these safeguards, computer systems and networks, as well as the critical operations and key infrastructures they support, may be lost; information—including sensitive personal information—may be compromised; and the agency’s operations could be disrupted. Commerce’s Office of the Inspector General recently identified several challenges the Bureau may face using cloud-based systems to support the 2020 Census. Specifically, in June 2019, the Office of the Inspector General identified, among other things, unimplemented security system features that left critical 2020 Census systems vulnerable during the 2018 End-to-End Test and a lack of fully implemented security practices to protect certain data hosted in the 2020 Census cloud environment. Officials from the Bureau agreed with all eight of the Office of Inspector General’s recommendations regarding 2020 Census cloud-based systems and identified actions taken to address them. Ensuring contingency and incident response plans are in place to encompass all of the IT systems to be used to support the 2020 Census. Because of the brief time frame for collecting data during the 2020 Census, it is especially important that systems are available for respondents to ensure a high response rate. Contingency planning and incident response help ensure that, if normal operations are interrupted, network managers will be able to detect, mitigate, and recover from a service disruption while preserving access to vital information. Implementing important security controls, including policies, procedures, and techniques for contingency planning and incident response, helps to ensure the confidentiality, integrity, and availability of information and systems, even during disruptions of service. Without contingency and incident response plans, system availability might be impacted and result in a lower response rate. The Bureau’s CIO has acknowledged these cybersecurity challenges and is working to address them, according to Bureau documentation. In addition, we have ongoing work looking at many of these challenges, including the Bureau’s plans to protect PII, use a cloud-based infrastructure, and recover from security incidents and other disasters. Since 2015, the Bureau has made progress in improving its ability to develop a reliable cost estimate. We have reported on the reliability of the $12.3 billion life-cycle cost estimate released in October 2015 and the $15.6 billion revised cost estimate released in October 2017. In 2016 we reported that the October 2015 version of the Bureau’s life-cycle cost estimate for the 2020 Census was not reliable. Specifically, we found that the 2020 Census life-cycle cost estimate partially met two of the characteristics of a reliable cost estimate (comprehensive and accurate) and minimally met the other two (well-documented and credible). We recommended that the Bureau take specific steps to ensure its cost estimate meets the characteristics of a high-quality estimate. The Bureau agreed and has taken action to improve the reliability of the cost estimate. In August 2018 we reported that while improvements had been made, the Bureau’s October 2017 cost estimate for the 2020 Census did not fully reflect all the characteristics of a reliable estimate. (See figure 6.) In order for a cost estimate to be deemed reliable as described in GAO’s Cost Estimating and Assessment Guide and thus, to effectively inform 2020 Census annual budgetary figures, the cost estimate must meet or substantially meet the following four characteristics: Well-Documented. Cost estimates are considered valid if they are well-documented to the point they can be easily repeated or updated and can be traced to original sources through auditing, according to best practices. Accurate. Accurate estimates are unbiased and contain few mathematical mistakes. Credible. Credible cost estimates must clearly identify limitations due to uncertainty or bias surrounding the data or assumptions, according to best practices. Comprehensive. To be comprehensive an estimate should have enough detail to ensure that cost elements are neither omitted nor double-counted, and all cost-influencing assumptions are detailed in the estimate’s documentation, among other things, according to best practices. The 2017 cost estimate only partially met the characteristic of being well- documented. In general, some documentation was missing, inconsistent, or difficult to understand. Specifically, we found that source data did not always support the information described in the basis of estimate document or could not be found in the files provided for two of the Bureau’s largest field operations: Address Canvassing and Non- Response Follow-Up. We also found that some of the cost elements did not trace clearly to supporting spreadsheets and assumption documents. Failure to document an estimate in enough detail makes it more difficult to replicate calculations, or to detect possible errors in the estimate; reduces transparency of the estimation process; and can undermine the ability to use the information to improve future cost estimates or even to reconcile the estimate with another independent cost estimate. The Bureau told us it would continue to make improvements to ensure the estimate is well- documented. The 2017 life-cycle cost estimate includes much higher costs than those included in the 2015 estimate. The largest increases occurred in the Response, Managerial Contingency, and Census/Survey Engineering categories. For example, increased costs of $1.3 billion in the response category (costs related to collecting, maintaining, and processing survey response data) were in part due to reduced assumptions for self- response rates, leading to increases in the amount of data collected in the field, which is more costly to the Bureau. Contingency allocations increased overall from $1.35 billion in 2015 to $2.6 billion in 2017, as the Bureau gained a greater understanding of risks facing the 2020 Census. Increases of $838 million in the Census/Survey Engineering category were due mainly to the cost of an IT contract for integrating decennial survey systems that was not included in the 2015 cost estimate. Bureau officials attribute a decrease of $551 million in estimated costs for Program Management to changes in the categorization of costs associated with risks. Specifically, in the 2017 version of the estimate, estimated costs related to program risks were allocated to their corresponding work breakdown structure (WBS) element. Figure 7 shows the change in cost by WBS category for 2015 and 2017. More generally, factors that contributed to cost fluctuations between the 2015 and 2017 cost estimates include: Changes in assumptions. Among other changes, a decrease in the assumed rate for self-response from 63.5 percent in 2015 to 60.5 percent in 2017 increased the cost of collecting responses from nonresponding housing units. Improved ability to anticipate and quantify risk. In general, contingency allocations designed to address the effects of potential risks increased overall from $1.3 billion in 2015 to $2.6 billion in 2017. An overall increase in IT costs. IT cost increases, totaling $1.59 billion, represented almost 50 percent of the total cost increase from 2015 to 2017. More defined contract requirements. Bureau documents described an overall improvement in the Bureau’s ability to define and specify contract requirements. This resulted in updated estimates for several contracts, including for the Census Questionnaire Assistance contract. However, while the Bureau has been able to better quantify risk; in August 2018 we also reported that the Secretary of Commerce included a contingency amount of about $1.2 billion in the 2017 cost estimate to account for what the Bureau refers to as “unknown unknowns.” According to Bureau documentation these include such risks as natural disasters or cyber attacks. The Bureau provides a description of how the risk contingency for “unknown unknowns” is calculated; however, this description does not clearly link calculated amounts to the risks themselves. Thus, only $14.4 billion of the Bureau’s $15.6 billion cost estimate has justification. According to Bureau officials, the cost estimate remains at $15.6 billion; however, they stated that they are managing the 2020 Census at a lower level of funding—$14.1 billion. In addition, they said that, at this time, they do not plan to request funding for the $1.2 billion contingency fund for unknown unknowns or $369 million in funding for selected discrete program risks for what-if scenarios, such as an increase in the wage rate or additional supervisors needed to manage field operations. Instead of requesting funding for these contingencies upfront the Bureau plans to work with OMB and Commerce to request additional funds, if the need arises. According to Bureau officials they anticipate that the remaining $1.1 billion in contingency funding included in the $14.1 billion will be sufficient to carry out the 2020 Census. In June 2016 we recommended the Bureau improve control over how risk and uncertainty are accounted for. This prior recommendation remains valid given the life-cycle cost estimate still includes the $1.2 billion unjustified contingency fund for “unknown unknowns”. Moreover, given the cost growth between 2015 and 2017 it will be important for the Bureau to monitor cost in real-time, as well as, document, explain and review variances between planned and actual cost. In August 2018 we reported that the Bureau had not been tracking variances between estimated life-cycle costs and actual expenses. Tools to track variance enable management to measure progress against planned outcomes and will help inform the 2030 Census cost estimate. Bureau officials stated that they already have systems in place that can be adapted for tracking estimated and actual costs. We will continue to monitor the status of the tracking system. According to Bureau officials, the Bureau planned to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019; however, they released the update on July 15, 2019. We will review the documentation to see whether the revised estimate will address our recommendations. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement our recommendation related to the cost estimate. The difficulties facing the Bureau’s preparation for the decennial census in such areas as planning and testing; managing and overseeing IT programs, systems, and contractors supporting the enumeration; developing reliable cost estimates; prioritizing decisions; managing schedules; and other challenges, are symptomatic of deeper organizational issues. Following the 2010 Census, a key lesson learned for 2020 that we identified was ensuring that the Bureau’s organizational culture and structure, as well as its approach to strategic planning, human capital management, internal collaboration, knowledge sharing, capital decision- making, risk and change management, and other internal functions are aligned toward delivering more cost-effective outcomes. The Bureau has made improvements over the last decade, and continued progress will depend in part on sustaining efforts to strengthen risk management activities, enhancing systems testing, bringing in experienced personnel to key positions, implementing our recommendations, and meeting regularly with officials from its parent agency, Commerce. Going forward, we have reported that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency officials to (1) leadership commitment, (2) ensuring capacity, (3) developing a corrective action plan, (4) regular monitoring, and (5) demonstrated progress. Although important steps have been taken in at least some of these areas, overall, far more work is needed. We discuss three of five areas below. The Secretary of Commerce has successfully demonstrated leadership commitment. For example, the Bureau and Commerce have strengthened this area with executive-level oversight of the 2020 Census by holding regular meetings on the status of IT systems and other risk areas. In addition, in 2017 Commerce designated a team to assist senior Bureau management with cost estimation challenges. Moreover, on January 2, 2019, a new Director of the Census Bureau took office, a position that had been vacant since June 2017. With regard to capacity, the Bureau has improved the cost estimation process of the decennial when it established guidance including: roles and responsibilities for oversight and approval of cost estimation processes, procedures requiring a detailed description of the steps taken to produce a high-quality cost estimate, and a process for updating the cost estimate and associated documents over the life of a project. However, the Bureau continues to experience skills gaps in the government program management office overseeing the $886 million contract for integrating the IT systems needed to conduct the 2020 Census. Specifically, as of June 2019, 14 of 44 positions in this office were vacant. For the monitoring element, we found to track performance of decennial census operations, the Bureau relied on reports to track progress against pre-set goals for a test conducted in 2018. According to the Bureau, these same reports will be used in 2020 to track progress. However, the Bureau’s schedule for developing IT systems during the 2018 End-to-End test experienced delays that compressed the time available for system testing, integration testing, and security assessments. These schedule delays contributed to systems experiencing problems after deployment, as well as cybersecurity challenges. In the months ahead, we will continue to monitor the Bureau’s progress in addressing each of the five elements essential for reducing the risk to a cost-effective enumeration. Over the past several years we have issued numerous reports that underscored the fact that, if the Bureau was to successfully meet its cost savings goal for the 2020 Census, the agency needed to take significant actions to improve its research, testing, planning, scheduling, cost estimation, system development, and IT security practices. As of July 2019, we have made 107 recommendations related to the 2020 Census. The Bureau has implemented 74 of these recommendations, 32 remain open, and one recommendation was closed as not implemented. Of the 32 open recommendations, 10 were directed at improving the implementation of the innovations for the 2020 Census. Commerce generally agreed with our recommendations and is taking steps to implement them. Moreover, in April 2019 we wrote to the Secretary of Commerce, providing a list of the 12 open 2020-Census-related recommendations that we designated as “priority.” Priority recommendations are those recommendations that we believe warrant priority attention from heads of key departments and agencies. We believe that attention to these recommendations is essential for a cost-effective enumeration. The recommendations included implementing reliable cost estimation and scheduling practices in order to establish better control over program costs, as well as taking steps to better position the Bureau to develop an internet response option for the 2020 Census. In addition to our recommendations, to better position the Bureau for a more cost-effective enumeration, on March 18, 2019, we met with OMB, Commerce, and Bureau officials to discuss the Bureau’s progress in reducing the risks facing the census. We also meet regularly with Bureau officials and managers to discuss the progress and status of open recommendations related to the 2020 Census, which has resulted in Bureau actions in recent months leading to closure of some recommendations. We are encouraged by this commitment by Commerce and the Bureau in addressing our recommendations. Implementing our recommendations in a complete and timely manner is important because it could improve the management of the 2020 Census and help to mitigate continued risks. In conclusion, while the Bureau has made progress in revamping its approach to the census, it faces considerable challenges and uncertainties in implementing key cost-saving innovations and ensuring they function under operational conditions; managing the development and testing of its IT systems; ensuring the cybersecurity of its systems and data; and developing a quality cost estimate for the 2020 Census and preventing further cost increases. For these reasons, the 2020 Census is a GAO high-risk area. Going forward, continued management attention and oversight will be vital for ensuring that risks are managed, preparations stay on track, and the Bureau is held accountable for implementing the enumeration, as planned. Without timely and appropriate actions, the challenges previously discussed could adversely affect the cost, accuracy, schedule, and security of the enumeration. We will continue to assess the Bureau’s efforts and look forward to keeping Congress informed of the Bureau’s progress. Chairman Raskin, Ranking Member Roy, and Members of the Subcommittee, this completes our prepared statement. We would be pleased to respond to any questions that you may have. If you have any questions about this statement, please contact Robert Goldenkoff at (202) 512-2757 or by email at goldenkoffr@gao.gov or Nick Marinos at (202) 512-9342 or by email at marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other key contributors to this testimony include Jon Ticehurst (Assistant Director); Kate Sharkey (Assistant Director); Ty Mitchell (Assistant Director); Lisa Pearson (Assistant Director); Andrea Starosciak (Analyst in Charge); Christopher Businsky; Jackie Chapin; Jeff DeMarco; Rebecca Eyler; Adella Francis; Scott Pettis; Kayla Robinson; Robert Robinson; Cindy Saunders; Sejal Sheth; Emmy Rhine Paule; and Umesh Thakkar. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Bureau is responsible for conducting a complete and accurate decennial census of the U.S. population. The decennial census is mandated by the Constitution and provides vital data for the nation. A complete count of the nation's population is an enormous undertaking as the Bureau seeks to control the cost of the census, implement operational innovations, and use new and modified IT systems. In recent years, GAO has identified challenges that raise serious concerns about the Bureau's ability to conduct a cost-effective count. For these reasons, GAO added the 2020 Census to its High-Risk list in February 2017. GAO was asked to testify about the reasons the 2020 Census remains on the High-Risk List and the steps the Bureau needs to take to mitigate risks to a successful census. To do so, GAO summarized its prior work regarding the Bureau's planning efforts for the 2020 Census. GAO also included preliminary observations from its ongoing work examining the IT systems readiness and cybersecurity for the 2020 Census. This information is related to, among other things, the Bureau's progress in developing and testing key systems and the status of cybersecurity risks. The 2020 Decennial Census is on GAO's list of high-risk programs primarily because the Department of Commerce's Census Bureau (Bureau) (1) is using innovations that are not expected to be fully tested, (2) continues to face challenges in implementing information technology (IT) systems, and (3) faces significant cybersecurity risks to its systems and data. Although the Bureau has taken initial steps to address risk, additional actions are needed as these risks could adversely impact the cost, quality, schedule, and security of the enumeration. Innovations. The Bureau is planning several innovations for the 2020 Census, including allowing the public to respond using the internet. These innovations show promise for controlling costs, but they also introduce new risks, in part, because they have not been used extensively, if at all, in earlier enumerations. As a result, testing is essential to ensure that key IT systems and operations will function as planned. However, citing budgetary uncertainties, the Bureau scaled back operational tests in 2017 and 2018, missing an opportunity to fully demonstrate that the innovations and IT systems will function as intended during the 2020 Census. To manage risk to the census, the Bureau has developed hundreds of mitigation and contingency plans. To maximize readiness for the 2020 Census, it will also be important for the Bureau to prioritize among its mitigation and contingency strategies those that will deliver the most cost-effective outcomes for the census. Implementing IT systems. The Bureau plans to rely heavily on IT for the 2020 Census, including a total of 52 new and legacy IT systems and the infrastructure supporting them. To help improve its implementation of IT, in October 2018, the Bureau revised its systems development and testing schedule to reflect, among other things, lessons learned during its 2018 operational test. However, GAO's ongoing work has determined that the Bureau is at risk of not meeting near-term IT system development and testing schedule milestones for five upcoming 2020 Census operational deliveries, including self-response (e.g., the ability to respond to the 2020 Census through the internet). These schedule management challenges may compress the time available for the remaining system development and testing, and increase the risk that systems will not function as intended. It will be important that the Bureau effectively manages IT implementation risk to ensure that it meets near-term milestones for system development and testing, and that it is ready for the major operations of the 2020 Census. Cybersecurity. The Bureau has established a risk management framework that requires it to conduct a full security assessment for nearly all the systems expected to be used for the 2020 Census and, if deficiencies are identified to determine the corrective actions needed to remediate those deficiencies. As of the end of May 2019, the Bureau had over 330 corrective actions from its security assessments that needed to be addressed, including 217 that were considered “high-risk” or “very high-risk.” However, of these 217 corrective actions, the Bureau identified 104 as being delayed. Further, 74 of the 104 were delayed by 60 or more days. According to the Bureau, these corrective actions were delayed due to technical challenges or resource constraints. GAO recently recommended that the Bureau take steps to ensure that identified corrective actions for cybersecurity weaknesses are implemented within prescribed time frames. Resolving identified vulnerabilities more timely can help reduce the risk that unauthorized individuals may exploit weaknesses to gain access to sensitive information and systems. To its credit, the Bureau is also working with the Department of Homeland Security (DHS) to support its 2020 Census cybersecurity efforts. For example, DHS is helping the Bureau ensure a scalable and secure network connection for the 2020 Census respondents and to strengthen its response to potential cyber threats. During the last 2 years, as a result of these activities, the Bureau has received 42 recommendations from DHS to improve its cybersecurity posture. GAO recently recommended that the Bureau implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity findings identified by DHS. Implementing the recommendation would help better ensure that DHS's efforts result in improvements to the Bureau's cybersecurity posture. In addition to addressing risks which could affect innovations and the security of the enumeration, the Bureau has the opportunity to improve its cost estimating process for the 2020 Census, and ultimately the reliability of the estimate itself, by reflecting best practices. In October 2017, the 2020 Census life-cycle cost estimate was updated and is now projected to be $15.6 billion, a more than $3 billion (27 percent) increase over its earlier estimate. GAO reported in August 2018 that although the Bureau had taken steps to improve its cost estimation process for 2020, it needed to implement a system to track and report variances between actual and estimated cost elements. According to Bureau officials, they planned to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019; however, they released the update on July 15, 2019. GAO will review the released documentation to see whether the revised estimate will address the recommendations. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement GAO's recommendation related to the cost estimate. Over the past decade, GAO has made 107 recommendations specific to the 2020 Census to help address these risks and other concerns. The Department of Commerce has generally agreed with these recommendations and has taken action to address many of them. However, as of July 2019, 32 of the recommendations had not been fully implemented. While all 32 open recommendations are important for a high-quality and cost-effective enumeration, 10 are directed at managing the risks introduced by the Bureau's planned innovations for the 2020 Census. To ensure a high-quality and cost-effective enumeration, it will be important for the Bureau to address these recommendations. Over the past decade, GAO has made 107 recommendations specific to the 2020 Census to help address issues raised in this and other products. The Department of Commerce has generally agreed with the recommendations. As of July 2019, 32 of the recommendations had not been fully implemented.", "document_type": "gao"}
{"report": "Congress created a multi-agency framework that established agency responsibilities for securing the nation’s transportation systems. Following the terrorist attacks of September 11, 2001, the Aviation and Transportation Security Act, enacted in November 2001, established TSA as the federal agency with primary responsibility for transportation security. Within this framework, two components of DHS—TSA and Coast Guard—are responsible for most transportation security activities. TSA is the primary federal agency responsible for security in all modes of transportation, including civil aviation, passenger and freight rail, highway and motor carrier transportation, and pipeline transportation systems. Coast Guard is the lead federal agency responsible for maritime transportation security, though TSA plays a role in managing, for example, credentialing for workers at seaports. TSA and Coast Guard’s regulatory authorities vary across modes, which affects how transportation security activities are planned for and implemented. For example, TSA and Coast Guard exercise more regulatory authority over (and, in some cases, have operational responsibility for) the aviation and maritime modes pursuant to their respective statutory authorities. In the aviation mode, TSA has operational responsibility for the screening of passengers and property transported on aircraft, but also imposes and enforces security requirements established through regulation on air carriers and other industry stakeholders. Similarly, Coast Guard has responsibility for ensuring that maritime vessels and facilities are compliant with applicable security requirements. TSA’s statutory responsibilities for the surface transportation modes, however, are generally less prescriptive. With respect to these modes, TSA works with transportation operators on a broad set of risk-based activities such as training, information sharing, and community outreach within a collaborative environment. For example, in freight rail TSA and its partners undertake collaborative efforts to establish security priorities, identify vulnerabilities and capability gaps, and reduce risks. Freight rail operators, meanwhile, engage in cooperative and independent security initiatives to assess risks and refine security plans. Other federal agencies are involved in transportation security, but to varying degrees. At the department level, DHS is responsible for providing strategic guidance, directing a national unity of effort, and coordinating security across critical infrastructure sectors. CBP manages programs designed to secure cargo and ensure intermodal transportation security, among other things. CBP activities include programs to encourage trade partners to implement security best practices and identify high-risk shipments and travelers before they reach U.S. ports of entry. DOT also has some transportation security responsibilities, which we describe below. Figure 1 illustrates agencies’ activities across transportation modes. Federal policies and plans establish specific coordination mechanisms and activities for transportation security. Specifically, in accordance with the Homeland Security Act of 2002, as amended, DHS created the National Infrastructure Protection Plan to guide the national effort to manage risk to the nation’s critical infrastructure, including through coordination of agencies and various critical infrastructure sectors, including transportation systems. Under this structure, DHS and DOT are co-Sector-Specific Agencies for the Transportation Systems Sector. DHS delegated its sector responsibilities to TSA and Coast Guard. Within the transportation systems sector, agencies and stakeholders charter councils for individual transportation modes as well as the sector as a whole. Sector Coordinating Councils and Government Coordinating Councils for each critical infrastructure sector provide forums for promoting efficient collaboration within the sectors. Further, the Sector- Specific Agencies are to develop, in close collaboration with Sector Coordinating Councils and other sector partners, a sector-specific plan that tailors the National Infrastructure Protection Plan to the specific characteristics and landscape of each critical infrastructures sector. Under the Transportation Systems Sector-Specific Plan, DOT and DHS, through TSA, and Coast Guard, coordinate with infrastructure owners and operators, provide technical assistance, and carry out incident management responsibilities. CBP is also a permanent member of the Aviation Government Coordinating Council. The Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Commission Report), released in July 2004, identified concerns with aspects of transportation security planning, including the lack of an integrated strategic plan for the transportation sector. The Commission found that the screening of passengers and their property at airports accounted for the majority of transportation security investments, leaving vulnerable other facets of transportation security, such as cargo, general aviation, and surface transportation. The Commission recommended that the U.S. government identify and evaluate the transportation assets that need to be protected, set risk- based priorities for defending them, select the most practical and cost effective means of doing so, and then develop a plan, budget, and funding source to implement the effort. Congress subsequently passed the Intelligence Reform and Terrorism Prevention Act of 2004 (Intelligence Reform Act), which directed the Secretary of DHS to develop, prepare, implement, and update, as needed, a National Strategy for Transportation Security and transportation modal security plans. The statute further directs the Secretary of Homeland Security to work jointly with the Secretary of Transportation to develop, revise, and update the national strategy and transportation modal security plans. Within DHS, responsibility for such strategic planning had been delegated by the Secretary of Homeland Security in May 2003 to TSA for transportation security across all modes of transportation and to Coast Guard for maritime security, specifically. The Intelligence Reform Act called for a national strategy that was to include elements that aligned with the Commission’s recommendation. Table 1 illustrates parallels among the Commission’s multi-part recommendation, the Intelligence Reform Act, as amended, and the 2018 national strategy. Consistent with its underlying statute, the national strategy states that it is the governing document for federal transportation security efforts, and lays out a number of areas where it can govern those efforts. For example, the national strategy states that it contributes to departmental budgetary processes by applying multiple information sources to determine priorities and capability gaps that influence resource allocation decisions and budget projections across federal agencies. Further, the national strategy is intended to support out-year programming and budgeting by measuring progress toward achieving the security outcomes for funded activities. The national strategy states that its risk-based priorities help to narrow capability gaps and raise the security baseline. The risk-based priorities in the national strategy are also intended to inform security decisions about the types of activities government and industry modal security officials should pursue to address terrorism risks. The national strategy includes modal security plans as appendixes—also consistent with its underlying statute—and other, separate, statutorily required national strategy documents as annexes TSA determined were appropriate to include. The 2018 National Strategy for Transportation Security is generally consistent with desirable characteristics of an effective national strategy. In 2004, we reported that national strategies are not required to address a single, consistent set of characteristics, and they contain varying degrees of detail based on their different scopes. We have previously identified a set of desirable characteristics that we believe would provide additional guidance to responsible parties for developing and implementing the strategies—and to enhance their usefulness as guidance for resource and policy decision-makers and to better ensure accountability. Our analysis of the 2018 National Strategy for Transportation Security found that it is fully consistent with two of the six desirable characteristics of an effective national strategy and partially consistent with four, as summarized in table 2. We found that supporting documents of the national strategy (such as a planning guide, project plan, and budget document) include additional elements of desirable characteristics that are not currently included in the strategy. For example, the national strategy’s guidance document describes the methodology for developing the strategy. TSA officials indicated that as they develop the 2020 national strategy, they will take steps to incorporate additional elements of desirable characteristics. The national strategy plays a limited role in guiding federal transportation security efforts. Agencies rely instead on various agency- or mode- specific documents that DHS and DOT officials stated overlap with the national strategy. Similarly, agencies do not consult the national strategy to allocate resources for their federal transportation security efforts. They instead make such decisions based on various strategy documents and department and agency guidance, which the national strategy may inform to varying degrees. TSA identifies the national strategy as the governing document for federal transportation security efforts, consistent with its underlying statute; however, agency officials generally do not use it to guide their efforts and had disparate views about its functional role given overlapping strategic documents. The 2018 national strategy states: “While the strategy presents a whole community plan for reducing the risks to transportation from terrorist attacks, it is, as mandated, the governing document for federal transportation security efforts.” Officials representing TSA aviation, Coast Guard, TSA intermodal, and DOT stated that they did not use the national strategy to guide their efforts; TSA surface officials stated that it generally did guide surface transportation activities. Officials from TSA’s Strategy, Policy Coordination, and Innovation office, which coordinates the national strategy’s development, said that although the national strategy does not drive transportation security activities, it does inform such activities as they related to risk-based priorities. Although the national strategy states that it is to be the governing document for transportation security efforts, TSA strategy officials described it as a catalogue of transportation security activities. The vast majority of the activities and performance measures reported in the national strategy came from ongoing reporting mechanisms such as the DHS Annual Performance Report and TSA voluntary surface security assessments, according to TSA and Coast Guard officials. Therefore, the national strategy did not affect the number of activities or types of programs that agencies undertook, according to TSA and Coast Guard officials. Instead, the national strategy summarized information about current transportation security goals and performance as opposed to guiding such decisions. TSA surface and aviation, Coast Guard, and DOT officials stated that several different strategies and planning documents with similar areas of focus resulted in redundancy or overlap with the National Strategy for Transportation Security. We have reported that when overlap exists there may be opportunities to increase efficiency. For example, communicating the use of overlapping documents could promote efficiency in creating and using strategies to make transportation security- related decisions. Figure 2 shows the National Strategy for Transportation Security and numerous other documents, including several identified in the 2018 national strategy, that guide transportation security decisions. For specific examples of strategies used by each component, see appendix I. As shown in figure 2, the National Strategy for Transportation Security exists among more than a dozen other national-level strategic documents without a hierarchical alignment indicating how they interact or supersede each other. Officials from TSA’s strategy office stated that they view the functional role of the national strategy as informing transportation modes’ activities where applicable, and that transportation officials should use it to ensure consistency of effort across activities. Transportation officials had differing views on the varying role of the national strategy, as described below: TSA Aviation: The national strategy keeps security operations on track and aligned with priorities, but officials used the national strategy more for reference than to guide program or planning decisions. TSA officials stated that aviation policy is regulatory in nature, meaning policy is driven by requirements established through statute and regulation rather than by the national strategy. TSA aviation officials also stated that they could not provide an example of where the national strategy was used to make specific decisions or actions. Coast Guard: The national strategy informs federal partners of Coast Guard’s maritime transportation security activities, but Coast Guard officials stated that the national strategy does not require them to take on activities they are not already doing; instead, it puts those transportation security activities in context. Coast Guard officials stated that the national strategy did not drive decisions or activities. TSA Surface: The national strategy generally guides transportation security activities and drives a common understanding around goals for both TSA officials and industry partners. TSA surface officials stated that the need for voluntary cooperation and engagement makes the alignment of priorities with national strategy more valuable in the surface mode. TSA surface officials stated that they use the national strategy to guide their implementation of federal transportation security programs. Specifically, TSA surface officials stated that they use the national strategy to determine areas of focus for training and exercise programs. DOT: The national strategy delineates the transportation roles and responsibilities through the lens of terrorism, giving it value as a tool for communicating and coordinating within the transportation systems sector rather than as a planning tool. DOT officials stated that they did not use the national strategy as a major factor to prioritize budget decisions and cannot assign a causal relationship between the national strategy and policy. Officials from TSA’s strategy office stated that they created the national strategy to respond to legislative requirements; however, they had not fully considered or communicated to key stakeholders how the national strategy would functionally guide federal efforts. Officials acknowledged that it could be helpful to communicate this information to stakeholders as they develop future iterations of the national strategy. Such communication would be consistent with federal internal control standards, which state that management should externally communicate the necessary quality information to achieve the entity’s objectives. TSA has made efforts over the years to streamline and consolidate reporting requirements of the national strategy with similar documents. For example, in August 2010, TSA sent a letter to notify Congress that it was streamlining the national strategy and several other documents by incorporating them into the Transportation Systems Sector Annual Report. The letter stated that streamlining strategic planning and reporting requirements improves their usefulness and reduces federal government and stakeholder confusion. Similarly, TSA surface officials stated that they have attempted to consolidate their reporting requirements by integrating two strategies focused on mass transit and freight rail into the national strategy. Officials stated that those strategies were published as separate annexes in the 2018 National Strategy for Transportation Security in response to feedback, but had been integrated into the 2016 iteration of the national strategy. Officials from TSA’s strategy office said they believed the national strategy has value in providing a whole-of-government strategy for transportation security with a counterterrorism view. However, we have previously reported that the ultimate measure of the value of national security strategies is the extent to which they are useful as guidance in balancing homeland security priorities with other important, non- homeland security objectives. Though the national strategy lays out a number of areas where it can govern federal transportation security efforts, its unclear position among numerous strategic documents limits its ultimate value. For example, the risk-based priorities in the national strategy are intended to inform security decisions about the types of activities government and industry modal security officials should pursue to address terrorism risks. Instead, according to officials, the national strategy summarizes current transportation security activities within each mode and they generally use other documents to guide their transportation security decisions. By communicating to key stakeholders how the national strategy aligns with related strategies to guide federal efforts, stakeholders would be in a better position to use the strategy as a whole-of-government approach to preventing terrorist attacks. Officials representing TSA, Coast Guard, and DOT identified various documents and strategies as guiding resource decisions. TSA budget representatives stated that specific budgetary decisions and trade-offs result from other strategy documents, such as the TSA Strategy and Administrator’s Intent. TSA budget officials indicated a link between the National Strategy for Transportation Security and the budget process because other strategy documents incorporated the national strategy. Similarly, Coast Guard officials stated that they broadly consider the national strategy, the DHS Resource Planning Guidance, and other documents during their budgeting process. However, Coast Guard officials could not speak to the influence of the national strategy in particular. When asked about how the national strategy influences resource decisions, agency officials explained: TSA Aviation: The national strategy has not influenced any specific resource allocation decisions. Coast Guard: The national strategy is part of the broader budget process, but officials could not speak to its particular influence or provide examples of the national strategy changing the direction of maritime security activities. TSA Surface: The national strategy does not provide specific direction on resource allocation decisions. The national strategy provides a guidepost for where TSA wants to expend effort and can provide guidance during times of limited budgets and personnel, though officials did not provide specific examples of cases in which this occurred. DOT: The national strategy does not play any role in the department’s budget process. The national strategy identifies the creation of out-year budgets as a challenge. For example, the statute under which TSA develops the national strategy provides that it is to include both a 3-year and 10-year budget for federal transportation security programs that will achieve the priorities of the national strategy. However, the national strategy recognizes that it does not provide 3-year and 10-year budget information due to the challenge of anticipating future transportation security programming needs and aligning budget projections across multiple departments and agencies. To address this challenge, the national strategy aims to contribute to budgetary processes by applying multiple information sources to determine priorities and capability gaps that influence resource allocation decisions and budget projections. Further, the national strategy is to support budgeting by measuring progress towards achieving the security outcomes for funded activities. TSA officials explained that, rather than provide the 3-year and 10-year budget, TSA designed its budget process to align with, and be consistent with, the department’s five-year budget cycle set out in the Homeland Security Act. The national strategy explains that, accordingly, agency budget information will continue to be reported through their regular budget processes. TSA officials told us that they have been reporting budget information to Congress this way since before they produced the initial national strategy, and that Congress has not raised concerns with this approach. TSA, Coast Guard, and DOT officials told us they did not use the national strategy to make specific budget or resource allocation decisions because they did not believe the national strategy should direct those decisions. Officials from TSA’s strategy office confirmed that, in their view, the national strategy was not intended to guide resource decisions. TSA officials collaboratively developed the 2018 National Strategy for Transportation Security, which generally reflected risks identified in existing TSA and Coast Guard documents. TSA managed the creation of the national strategy by seeking input from stakeholders with responsibilities in each of the three transportation modes as well as intermodal transportation. Specifically, TSA officials sent out three data calls for information and feedback to officials at TSA, Coast Guard, and DOT responsible for providing information. Each data call built upon the prior one and provided the modal officials multiple opportunities to revise and edit their data. In addition, TSA officials sent the data calls to the Transportation Modal Government Coordinating Councils and recounted sending them to other groups, such as Sector Coordinating Councils. Because of the numerous agencies involved and the length of the development and review process, TSA began development of the 2018 national strategy before they submitted the 2016 national strategy to Congress. TSA planning officials stated that they encouraged officials responsible for overseeing implementation of transportation programs to help develop the strategy so TSA could leverage the expertise of each individual mode. TSA delegated the responsibility of identifying performance measures, activities, and related information to officials in each of the modes. These modal officials in turn contacted officials implementing transportation security programs to gather information and metrics related to their programs in the mode-specific appendixes, as well as coordinate general feedback on the national strategy’s base plan. TSA recommended that modes leverage activity and performance information already reported, to the extent possible. This allowed the national strategy to be efficiently updated according to TSA planning officials, which is crucial to TSA’s planning timeline of developing the national strategy every two years. Officials representing TSA surface and aviation, Coast Guard, and DOT confirmed their participation in the data calls and national strategy development. TSA surface officials also stated that they leveraged existing collaboration and coordination mechanisms to provide industry and stakeholder feedback, such as government coordinating councils and sector coordinating councils. Senior leadership then reviewed the information to ensure that it did not conflict with other strategies that agencies use to guide activities, according to TSA and DHS officials. We compared TSA’s work collaborating with other agencies to produce the national strategy with key practices we have identified for collaboration and found that TSA generally aligned the national strategy development with selected key practices. Specifically, selected leading practices call for agencies to collaborate by identifying 1) leadership, 2) clear roles and responsibilities, and 3) participants. TSA’s leadership developing the national strategy, working jointly with DOT, is identified in agency documentation and a DHS memo which delegates this authority. TSA officials provided clear roles and responsibilities to agencies asked to provide data through the data calls that supported the 2018 national strategy development. In addition, they included all relevant participating agencies in the process and provided a clear method of decision-making. TSA officials stated that it was a challenge to get input from agencies that do not consider their main function to be transportation security, such as CBP. Officials from CBP—which is responsible for carrying out multiple activities related to air cargo and intermodal security in the 2018 national strategy—stated that they were not involved with the 2018 national strategy. CBP officials acknowledged that their programs to inspect cargo played a role in transportation security; however, they said they viewed their responsibilities as separate. For example, CBP officials stated that they are responsible for verifying the security of some cargo transported on planes but not the security of the planes themselves. However, TSA officials stated that they involved two individuals from CBP and will continue to reach out to CBP for information and involvement in the development of the 2020 national strategy. TSA officials stated that they are committed to collaborative development of the national strategy, and have taken an extra measure to seek comments from the public to inform the development of the 2020 national strategy using the Federal Register. In addition to agency collaboration, the development of the 2018 national strategy centered on agencies incorporating risks listed in their risk assessments. TSA officials from surface and aviation modes stated that they relied primarily on the Transportation Sector Security Risk Assessment; while Coast Guard officials relied on the National Maritime Strategic Risk Assessment and the National Maritime Terrorist Threat Assessment. TSA officials stated that they did not have documentation of the risks considered for the intermodal information for the 2018 strategy because the TSA official responsible for its development was no longer with the agency. However, officials stated that they are considering risks for the 2020 national strategy that are described in the Transportation Sector Security Risk Assessment and National Risks Estimate and provided documentation of these considerations. We found that, in general, the risk-based priorities highlighted in the national strategy aligned with the risks identified in the assessments. For example, the 2018 national strategy identified the prevention of insider threats as part of a risk-based priority in its base plan and aviation- specific appendix. In addition, the aviation-specific appendix identified an activity, outcome, and performance measure aimed at addressing this threat. This aligns with the identification of insider threats as a key part of risks specified in TSA’s 2017 risk assessment. In addition, TSA and Coast Guard officials stated that they also considered and included emergent threat information—for example, new threats presented by cybersecurity. They decided to include these threats as a result of ongoing development of strategy documents both in TSA and across the interagency community, according to TSA officials. The development of risk information in the 2018 national strategy remained within the context of each mode. TSA’s Transportation Sector Security Risk Assessment does provide information to compare risks across aviation and surface modes; however, that information is not included in the 2018 national strategy. Similar information related to Coast Guard risks is also not included in the 2018 national strategy, though available in Coast Guard risk assessments. The national strategy lays out areas where it could inform decision-making across modes; however, the information about transportation activities’ effectiveness does not currently lend itself to meaningful comparisons. For example, transportation security activities in the 2018 national strategy report outcome and performance measures, but not targets or results. TSA officials stated that they are developing the 2020 national strategy to include performance measures for activities to respond to risks, which will be the second iteration of measures in the national strategy. Corresponding performance results on activities that respond to risk- based priorities will be directly reported to Congress through annual reports on the progress of the national strategy’s implementation. Though this is not the same as providing cross-modal risk information, it would enable decision-makers to hold risk reduction activities accountable for results that they were intending to achieve, according to TSA officials. In accordance with statutory requirements, the National Strategy for Transportation Security is to be the governing document for federal transportation security efforts. However, its unclear position among numerous related strategies has clouded its value in guiding federal efforts. In light of other strategies and governance documents, DHS, in consultation with DOT, can better communicate the applicability of the National Strategy for Transportation Security so that key stakeholders have clear direction on how to rely on the national strategy. As TSA develops future iterations of the national strategy, key stakeholders would be better positioned to use it if the departments communicate how the national strategy aligns with related strategies. In the absence of such communication, transportation security stakeholders may continue to miss opportunities to use the national strategy as part of a whole-of- government approach to preventing terrorist attacks. The Secretary of Homeland Security should, in consultation with the Secretary of Transportation, communicate to key stakeholders how the National Strategy for Transportation Security aligns with related strategies to guide federal efforts as it develops future iterations of the national strategy. (Recommendation 1) We provided a draft of this report to DHS and DOT for review and comment. In written comments, which are included in appendix II and discussed below, DHS concurred with our recommendation and described actions taken to address it. DHS and DOT also provided technical comments, which we have incorporated into the report, as appropriate. DHS stated that the 2020 national strategy will elevate alignment language from the 2018 national strategy modal plans and better explain how the national strategy relates to newly issued strategies, among other things. These updates to the 2020 strategy are a positive step, and DHS should ensure that it further clarifies alignment language in the modal plans and communicates both newly issued and previous strategies alignment with the national strategy. Further communication about related strategies will provide better direction for key stakeholders on how to use the national strategy in relation to other strategies. We are sending copies of this report to the appropriate congressional committees, the acting Secretary of the Department of Homeland Security, and the Secretary of the Department of Transportation. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8777 or RussellW@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in Appendix III. In addition to the contact named above, Kevin Heinz (Assistant Director), Michelle Serfass (Analyst-in-Charge), Chuck Bausell, Benjamin Crossley, Elizabeth Dretsch, Andrew Lobel, Tom Lombardi, Sarah Veale, and Adam Vogt made key contributions to this report.", "summary": "In recent years, the nation's transportation systems facilitated over 5 trillion miles of passenger travel annually while moving billions of tons of cargo. The scale and scope of these systems make them targets for terrorist attacks. Congress directed DHS to work jointly with DOT to develop, revise, and update a biennial National Strategy for Transportation Security that governs federal transportation security efforts. The FAA Reauthorization Act of 2018 includes a provision for GAO to evaluate the extent to which the most recent strategy is reflected in relevant federal transportation security efforts. This report examines the extent to which the 2018 strategy (1) guides relevant federal transportation security efforts, including resource allocation, and (2) incorporates input across transportation modes and risk information, among other things. To conduct this work, GAO reviewed relevant transportation security documentation, interviewed officials within DHS and DOT on the development and use of the strategy, evaluated interagency collaboration during the development of the national strategy, and analyzed the national strategy's incorporation of risk information. The 2018 National Strategy for Transportation Security generally does not guide federal efforts due in part to its unclear alignment with several strategies that also inform federal transportation security efforts. The Department of Homeland Security (DHS)—primarily through the Transportation Security Administration (TSA)—developed the national strategy, consistent with congressional direction, to govern federal transportation security efforts. However, TSA and Department of Transportation (DOT) officials all identified some degree of redundancy or overlap regarding the role of the strategy in light of other transportation security strategies such as the National Strategy for Aviation Security. Agencies reported using the national strategy for reference, context, and general coordination, but not for driving program activities. Agencies instead use separate strategies and plans to guide program and resource decisions. Similarly, agencies in DHS and DOT (key stakeholders of the strategy) use various strategy documents to allocate resources for federal efforts, which the strategy may inform. However, DHS has not communicated how the strategy aligns with related strategies to guide these efforts. By doing so, federal stakeholders would be better positioned use the national strategy as part of a whole-of-government approach to preventing terrorist attacks. TSA effectively incorporated input from stakeholders and considered risk information to develop the 2018 National Strategy for Transportation Security. TSA iteratively updated the biennial strategy by incorporating input across transportation modes and feedback from stakeholders in a manner that generally met GAO's leading practices for collaboration. For example, TSA clearly communicated roles and responsibilities regarding the strategy development process for participating agencies. In addition, the strategy compiles risks identified for each transportation mode in other strategic planning documents. TSA strategy development officials stated that they also included emergent risk information, for example cybersecurity risks. The security risks identified in these risk assessments, in general, aligned with the risk-based priorities highlighted in the strategy. GAO recommends that DHS should, in consultation with DOT, communicate to key stakeholders how the National Strategy for Transportation Security aligns with related strategies to guide federal efforts. DHS concurred with the recommendation.", "document_type": "gao"}
{"report": "The CSBG program is intended to focus on three overall (national) goals: reducing poverty, empowering low-income families and individuals to become self-sufficient, and revitalizing low-income communities. The program is administered by OCS within the Administration for Children and Families (ACF) at HHS. CSBG was an outgrowth of the War on Poverty of the 1960s and 1970s, which established the Community Action program under which the nationwide network of local community action agencies was developed. The federal government had direct oversight of local agencies until 1981, when the CSBG program was established and states were designated as the grant recipients. OCS and states now share responsibility for oversight of CSBG grantees. In fiscal year 2019, states received approximately $700 million of the total $725 million CSBG appropriation. Appendix II provides the funding amounts for each state. OCS distributes CSBG funding to states and they, in turn, distribute funds to over 1,000 local agencies. Most of these local agencies receive funding from a variety of federal, state, and private sources. In fiscal year 2017, the latest data available, local agencies received about $9 billion from all federal sources, including about $700 million from CSBG. Other federal programs providing funding include Head Start, the Low Income Home Energy Assistance Program (LIHEAP), the Community Development Block Grant (CDBG), the Child Care and Development Block Grant, Temporary Assistance for Needy Families, and the Social Services Block Grant (see fig. 1). Programs administered by ACF contributed about $6.6 billion of the funds provided to local agencies. CSBG funding can be used broadly, allowing state and local agencies flexibility to provide services tailored to organizational and community needs. CSBG funds can be used by local agencies to provide services to participants in their programs and fill gaps in the funding provided by other means. For example, local agencies may use CSBG funds to support a position for a staff member who determines the service needs of potential participants and connects them with the appropriate services—a position that would not be an allowable expense under the funding rules of other federal programs, according to a local agency official we interviewed. Local agencies have also used CSBG funding to leverage other public and private resources to support a variety of initiatives, such as Head Start programs, low-income energy assistance programs, and low-income housing. OCS monitors all states receiving grant funds to ensure that they are meeting the standards for federal grant programs set by the Office of Management and Budget (OMB) and the specific expenditure requirements for the program. The CSBG Act requires that states submit plans to OCS describing how they intend to use the funds to address the needs of the local community and annual reports detailing the actual use of funds, including information on state performance results and populations served. OCS is required by the CSBG Act to conduct compliance evaluations of several states each fiscal year to review the states’ use of CSBG funds, report to states on the results of these evaluations, and make recommendations for improvements. However, the CSBG Act does not specify the number of states subjected to an evaluation each year or the timeframe each state must undergo such evaluations. Following a compliance evaluation, states are required to submit a plan of action in response to any OCS recommendations. In addition to conducting compliance evaluations to assess states’ use of CSBG funds, OCS is required to submit an annual report to Congress. This annual report must include a summary of how states and local agencies had planned to use CSBG funds; how funds were actually spent, data on the number and demographics of those served by local agencies, and other information. The CSBG Act requires OCS to provide training and technical assistance to states and to assist them in carrying out corrective action activities and monitoring. OCS must reserve 1.5 percent of annual appropriations (in fiscal year 2019, this percentage totaled about $11 million of the total appropriation) for many activities, including training and technical assistance; planning, evaluation, and performance management; assisting states with carrying out corrective action activities; and oversight including reporting and data collection activities. The CSBG Act also requires that states complete several steps before terminating an underperforming entity. The state agency is required, among other things, to provide training and technical assistance, if appropriate, to help the agency correct identified deficiencies, review the local agency’s quality improvement plan, and provide an opportunity for a hearing. The entity can request a federal review of the state’s decision to reduce or terminate funding, which must be completed within 90 days of OCS’s receipt. During this period, the state is required to continue funding the entity until OCS responds to the request. The CSBG Act requires each state to designate a lead state agency to administer CSBG funds and provide oversight of local agencies that receive funds. States are required to award at least 90 percent of their federal block grant allotments to eligible local agencies, and to determine how CSBG funds are distributed among local agencies. States may use up to $55,000 or 5 percent of their CSBG allotment, whichever is higher, for administrative costs. States may use remaining funds for the provision of training and technical assistance, and other activities. In addition, states and local agencies that expend $750,000 or more in total federal awards are required to undergo an audit annually and submit a report to the Federal Audit Clearinghouse. The CSBG Act requires states to determine if local agencies meet the performance goals, administrative standards, and financial management requirements for the CSBG program. For each local agency, the CSBG Act requires the state to conduct: a full onsite review at least once during each 3-year period; an onsite review of each new local agency following the completion of the first year receiving CSBG funds; followup reviews including prompt return visits to local agencies that fail to meet goals, standards, and requirements established by the state; and other reviews as appropriate, including reviews of local agencies found to have had other grants terminated for cause. For states to receive CSBG funding, they must submit an application and state plan at least biennially describing, among other things, how they will use CSBG funds to accomplish various things such as helping families and individuals to achieve self-sufficiency, find and retain meaningful employment, and obtain adequate housing. Within their state plan, states must attest that (1) funds will be used to address the needs of youth in low-income communities; (2) funds will be used to coordinate with related programs; and (3) local agencies will provide emergency food-related services. States must also complete annual reports that include fiscal, demographic, and performance data. In their state plans, states must provide an assurance that all local agencies will submit a community action plan that includes a community needs assessment for the community served. In addition, local agencies must administer the CSBG program through a three-part board, consisting of one-third elected public officials and at least one-third representatives of the low-income community, with the balance drawn from officials or members of the private sector, labor, religious, law enforcement, education or other groups in the community served. The Government Performance and Results Act of 1993 (GPRA) as enhanced by the GPRA Modernization Act of 2010 (GPRAMA) focuses federal agencies on performance by, among other things, requiring agencies (including HHS) to develop outcome-oriented goals and a balanced set of performance indicators, including output and outcome indicators as appropriate, to assist agencies in measuring or assessing their progress toward goals. OMB provides guidance to federal executive branch agencies on how to prepare their strategic plans in accordance with GPRA requirements. We have reported that strategic planning requirements established under GPRA and GPRAMA can also serve as leading practices for strategic planning at lower levels within federal agencies. Federal standards for internal control help to ensure efficient and effective operations, reliable financial reporting, and compliance with federal laws. Internal controls help government program managers achieve desired results through effective stewardship of public resources. Such interrelated controls comprise the plans, methods, and procedures used to meet missions, goals, and objectives. Internal controls support performance-based management and should provide reasonable assurance that an organization achieve its objectives of (1) effective and efficient operations, (2) reliable reporting, and (3) compliance with applicable laws and regulations. With regard to performance measurement for state and local agencies, the CSBG Act requires OCS, in collaboration with states and local agencies, to facilitate the development of one or more model performance measurement systems which may be used by states and local agencies to measure their performance in fulfilling CSBG requirements. Each state receiving CSBG funds is required to participate in and ensure that all local agencies in the state participate in either a performance measurement system whose development was facilitated by OCS or in an alternative system approved by OCS. OCS developed the Results Oriented Management and Accountability (ROMA) performance management approach that states and local agencies follow when overseeing programs and measuring their performance in achieving their CSBG goals. In 2012, OCS began four initiatives to update how it oversees the performance of the CSBG program, and as of April 30 2019, OCS had implemented all four of the initiatives, which include: an updated ROMA process for program management, 58 organizational management standards for local agencies, new federal and state accountability measures, and an updated annual report format where oversight and performance information from states is collected in an automated online data system. In addition, OCS developed the CSBG Theory of Change which illustrates how the core principles of the CSBG program, the performance management framework, and services and strategies offered with CSBG funds relate. The three national goals established under the CSBG Theory of Change are similar to the three national goals identified in the CSBG Act, but are not identical. The three goals under the CSBG Theory of Change are: 1. individuals and families are stable and achieve economic security, 2. communities where low-income people live are healthy and offer 3. people with low incomes are active in their community. OCS and states are responsible for conducting oversight activities to ensure that CSBG recipients use the funds in accordance with the CSBG Act, which includes ensuring that the funds are used in line with the grant’s three national goals related to addressing the causes and conditions of poverty. Our review of oversight efforts during fiscal years 2016 and 2017 for the select states showed that OCS and states conducted required oversight activities, as well as additional oversight activities, and provided training and technical assistance to help CSBG recipients meet CSBG program requirements. Our review of file documentation for six selected states where OCS conducted compliance evaluations during fiscal years 2016 and 2017, and six selected states where OCS conducted routine oversight, showed that OCS identified primarily administrative issues, but in some instances identified non- compliance and other more serious issues that required corrective actions that states took action to resolve. We largely found similar results in our review of the selected states’ onsite and routine oversight activities for local CSBG funds recipients for the same time period. Beyond findings of an administrative nature, a fiscal year 2017 OCS compliance evaluation found that one state did not conduct required monitoring of its eligible entities during fiscal year 2015. Also, one state identified financial mismanagement, which resulted in termination of a local grantee from the CSBG program. Additionally, we found that OCS and states provided training and technical assistance to help CSBG recipients meet requirements. OCS officials conducted onsite compliance evaluations, in addition to other oversight activities, for 12 states using a risk assessment and prioritization process during fiscal years 2016 and 2017. We reviewed six of these 12 states and found that a majority of errors identified by OCS were administrative. The CSBG Act requires OCS to conduct compliance evaluations for several states each year. Since fiscal year 2009, OCS has conducted onsite compliance evaluations in five to seven selected states each year, in addition to the routine oversight it conducts for all the states. According to OCS officials, the number of states visited each year depends upon available resources. OCS primarily bases its selection of states for onsite compliance evaluations on a risk assessment conducted using a scoring tool. The scoring tool generates a risk score of 1 to 5 for each state using a number of measures, as shown in figure 2. The various factors used in developing the total risk score are weighted to ensure the most significant risk indicators and prioritization factors have the most impact on the selection of states for onsite monitoring. The list of risk factors was developed by OCS in response to a recommendation from our 2006 report in which we found that OCS did not systematically use available information to assess risk to focus its monitoring resources on states with the highest risk. According to OCS officials, OCS rarely visits states that they identify as low risk or states that have very few local agencies as grantees, and they try to not visit the same state within 3 years of their last visit. OCS officials told us that monitoring resources limit their ability to reach all of the states for onsite review. We found that, since fiscal year 2008, eight states have not received an onsite evaluation and 10 had been visited twice. According to agency officials, the risk assessment is part of a larger risk assessment and prioritization process designed to direct monitoring resources over multiple years. After determining risk under the scoring tool, OCS considers several other factors and may place a higher priority on states with lower risk scores when selecting states for onsite compliance evaluations. Agency officials said such factors include: size of the CSBG award, findings from single audits, the rate at which the state spends its CSBG funds, time since the last OCS visit, and feedback from the OCS program manager using information gathered from the quarterly calls with the states. For states selected for onsite compliance evaluations, we found that OCS conducts a comprehensive review of each of the state’s plan and annual reports and examines the state’s supporting documents to determine if that state is meeting the requirements of the CSBG program. Although OCS reviews the plans for all 56 states as part of its routine oversight efforts, during the onsite visit the agency also conducts interviews with staff and examines state statutes or regulations and supportive information, such as financial ledgers and oversight procedural manuals. OCS also reviews the state’s grant funding to determine if the state allocated the funds in accordance with the requirements of the CSBG program. Additionally, OCS reviews each state’s fiscal controls and accounting procedures and associated documents to assess the financial integrity of the state’s process for drawing down federal funds, providing funds to local agencies, and reporting financial information. For example, OCS officials may review the state agency’s bookkeeping system and accounting software. In our review of OCS’s file documentation for the six selected states, we found OCS generally identified administrative errors, but in some instances identified issues of non-compliance and other issues that the states took action to resolve. For example, during its fiscal year 2017 onsite visit to Louisiana, OCS found that Louisiana did not implement procedures to monitor and track prior year single audit findings for corrective action and issue management decisions as required. To address this concern, the state assigned a member of its staff to execute these duties and submitted a copy of the Single Audit Process and audit log to OCS. Additionally, OCS found that Louisiana did not visit any of its 42 local agencies in fiscal year 2015 because of limited capacity such as staffing shortages, among other non-compliance issues. OCS determined that Louisiana addressed this issue by visiting all of the local agencies before the end of fiscal year 2017. Also, in a fiscal year 2016 onsite visit to Indiana, OCS found that the state agency did not submit a required financial report to account for CSBG expenditures within established timeframes in two consecutive fiscal years—2014 and 2015—due to the lack of a process to ensure the timely submission of the report. OCS also found that the financial report for fiscal year 2014 contained incorrect amounts for certain expenditures. The Indiana state agency responded to the issues by developing formal written procedures regarding the preparation and submission of financial reports. In addition, for the six selected states, we found that OCS had assessed state plans and annual reports to ensure that the states were complying with the programmatic, financial, and administrative requirements of the CSBG program, as outlined in the CSBG Act. In our review of the selected states, we found that during fiscal years 2016 and 2017, OCS conducted routine reviews and other oversight activities to assess states’ use of CSBG funds. We selected six states (Alaska, Colorado, Kentucky, Mississippi, North Dakota, and Rhode Island) for our review of file documentation of OCS’s routine reviews. We found that for these six states, the routine reviews consisted of OCS reviewing all state plans and annual reports to determine if the state completed all sections of the plan and provided information about how it would achieve the goals of the program. In our review of file documentation for the six states, we found that OCS requested states to provide additional details about their plans; however, like the issues identified in the onsite compliance evaluations, the issues on which OCS commented were primarily administrative. For example, in fiscal year 2016, OCS reviewed Colorado’s 2016 annual plan and requested that the state provide additional details on plans to modify its organizational standards. Also, in its fiscal year 2017 review, OCS requested that Alaska provide additional information in its annual plan to explain how the state would prioritize providing services to individuals based on their income. We found that the states addressed OCS’s comments. OCS officials told us that they used quarterly calls as a part of their routine oversight. Agency officials told us that they generally use quarterly calls to discuss the state plans and the CSBG program broadly, and review the annual reports. OCS officials also told us that OCS uses these calls to update states on issues that have significant impact or importance on the successful operation of the CSBG grantees. In some cases, OCS program specialists may use the quarterly calls to identify areas where the state may be struggling and to discuss ways to address those issues. In addition, OCS officials stated that OCS program specialists will work with states to assist with developing work plans or reviewing corrective action procedures for high-risk local agencies. All three states we visited (New York, North Dakota, and Texas) conducted onsite visits to local agencies at least once every 3 years as required by the CSBG Act, and conducted routine oversight activities. In response to our June 2006 recommendation, OCS issued guidance clarifying that states must conduct an onsite review of each local agency at least once every 3 years. Besides the triennial onsite reviews, the law requires states to conduct: (1) follow up reviews including prompt return visits to local agencies that fail to meet state goals, standards, and requirements, (2) an onsite review of new local agencies following the completion of the first year receiving CSBG funds, and (3) other reviews as appropriate, including reviews of local agencies found to have had other grants terminated for cause. Each of the states we visited had developed oversight policies and procedures that included information on how often CSBG programs should be reviewed onsite and what program operations should be covered during onsite visits; two states provided sample forms or instructions on what forms to use to record findings. For example, each state’s policies and procedures established the frequency of onsite visits: New York and Texas conduct the visits at least once every 3 years and North Dakota conducts them once every 2 years (see table 2). The selected states’ policies and procedures also specified that state officials assess local agency financial controls, review financial records and client files, and review local agency governance. They also described information about actions state officials were required to take when they identified deficiencies in a local agency’s operations. For example, in all three of the states we visited the policies and procedures required state officials to notify local agencies of deficiencies in writing. Our findings from the two local agencies we visited in each of the three states showed that state officials identified a variety of issues during their reviews, but none that required those local agencies to lose their CSBG funding (see table 3). Generally, we found that the issues identified could be characterized as fiscal, governance, or administrative. Fiscal issues included improper use of funds. For example, state officials in one selected state found that a local agency had improperly used a small amount of CSBG funds to purchase a grill for agency activities. Governance-related findings included issues with both the composition and manner of selecting the local agency’s CSBG Board of Directors members. For example, in Texas, state officials cited one local agency for not complying with the CSBG Act’s requirement regarding the structure of its Board. Also, North Dakota cited a local agency for not having the required representation of low-income individuals on its Board. Administrative issues included recordkeeping of information on participants. For example, Texas cited a local agency for inaccurately reporting a program participant as having transitioned out of poverty. The state agency found that the participant’s file did not contain all of the required documentation needed to show that the participant had maintained a certain income level for a 90-day period. The state agency officials we spoke with told us that their reviews sometimes identified more serious issues that resulted in local agencies being terminated from the program. For example, Texas terminated two local agencies’ CSBG funding due to financial mismanagement that was uncovered during state monitoring of the local agencies. Texas officials noted that the process for terminating local agencies with deficiencies was, for them, a prolonged process, in part because of the steps they took to provide technical assistance and work with agencies in an attempt to resolve issues before terminating them from the program. They told us they found it difficult to establish sufficient grounds for termination and, for one of the terminations, Texas officials continued to work with the agency for two years while also working with OCS. Texas officials told us that they found the guidance on terminations to be unclear. OCS officials acknowledged that the information memorandum they have developed on terminations provides broad guidance that covers a range of issues states might encounter, and may not have detailed guidance covering each situation. However, they noted that they work with states on a case by case basis, as they did with Texas, to provide guidance that is specific to each situation. State officials in the selected states told us that local agencies identified as having deficiencies are notified of those deficiencies and provided information on how to correct them. Further, our review of corrective actions required of selected local agencies by the states we visited showed that the local agencies addressed the concerns raised by the states. For example, Texas required a local agency that it found did not comply with CSBG Board requirements concerning membership to fill the vacancies on the Board and to provide the state a timeline for completing the required corrective actions. In addition to taking corrective actions, local agencies may be required to submit fiscal and programmatic reports more frequently when monitoring uncovers problems. For example, North Dakota’s policies and procedures indicate that monthly reports may be required of local agencies that have been found to have financial recordkeeping problems. We also found that state agency officials in our three selected states conducted onsite reviews more frequently than the once every 3 years requirement, as well as routine offsite reviews. For example, New York conducted quarterly onsite visits to all local agencies, where each quarterly visit involved a targeted review of a specific aspect of a local agency’s CSBG program. For example, during the third quarterly visit of the year, state officials focused on local agency planning efforts for the next funding year, including the community needs assessment, while during the last quarterly visit of the year, state officials focused on grant closeout activities. New York, like North Dakota and Texas, also conducted routine offsite reviews of local agencies’ activities and finances. In our three selected states, these reviews included examining fiscal and program reports periodically submitted by local agencies to state officials, periodic meetings and conference calls between state and local agency staff, and reviewing audit reports. These oversight activities also included fiscal audits conducted by the state auditor or independent auditors when a local agency’s funding met the threshold for such review. Our review of single audits and interviews with each state’s auditor’s office in the three states we visited showed that none of the state audit agencies focused specifically on CSBG funding during the period of our review. Texas last conducted an audit focusing on CSBG in 2014 and North Dakota did so in 2011; neither state reported findings as a result of those audits. Officials from the state auditor offices in North Dakota and Texas said CSBG funding levels are below the federally-established threshold for programs that must be audited. New York state audit officials told us that they had not conducted any audits focused on CSBG. OCS and states provided training and technical assistance through a variety of methods to help CSBG recipients meet program requirements. In fiscal years 2016 and 2017, OCS designated nearly $14 million over the 2-year period for such efforts. OCS officials told us that they determine what training is needed through input from OCS program specialists, information obtained through a data task force, and requests from state and local agencies. OCS officials stated that the OCS’s program specialists use the quarterly calls to identify the types of support that states need. For example, a specialist may notice that the states need additional guidance on using their customer survey results. In response, the specialist may share a guide on how states can use the survey results to set reasonable performance improvement goals. In addition, OCS sponsors a CSBG Data Task Force to recommend strategies for building network capacity for collecting, analyzing, reporting and using performance data as well as identifying on-going training and technical assistance needs. OCS officials told us that they also conducted focus groups in 2016 to gather states’ perspectives on their training and technical assistance needs. From these focus groups, OCS issued guidance stating its technical assistance priorities and strategy for meeting identified needs for training and technical assistance in areas including: performance management, governance, effective state oversight, and results-oriented services and strategies. In 2017, OCS issued guidance laying out the agency’s 3-year training and technical assistance strategy to guide the development and delivery of training and technical assistance for the CSBG network. OCS officials said that once they establish the standards for the training and technical assistance and identify specific training needs, the agency awards cooperative agreements to organizations that focus on developing and providing training to build upon guidance already provided. During the period of our review, we found that each agreement focused on a specific type of training. For example, the National Association for State Community Services Programs (NASCSP) has a cooperative agreement with OCS to provide the orientation and oversight training for new state officials overseeing the CSBG program, and collects and coordinates the analysis of the data provided in the state plans and annual reports. OCS has also worked closely with NASCSP in the transition to the new performance framework. OCS officials told us that they are currently reviewing their training and technical assistance portfolio and may issue additional guidance on its strategy and coordination efforts during fiscal year 2020. In addition, OCS uses various methods to provide guidance to states to help them meet CSBG requirements, but state officials differed in their views on the usefulness of the guidance. OCS provides guidance to states through informational memorandums, letters, webinars, and communications with program specialists. Some of the state agency officials in two of the states we visited said that the guidance that OCS has provided to help states ensure compliance with program requirements is not always clear and up to date. For example, officials in North Dakota said that they did not understand the information requirements for a form used to gather information from applicants for local programs. State agency officials in Texas said that OCS issued guidance on the new information requirements just weeks before the reporting deadline, and that this did not allow states sufficient time to set up their data systems to meet the new requirements. OCS officials acknowledged that they were aware of the issues raised by state agency officials and explained that some states have difficulty with the guidance because it is written at a high level so that it can apply to all states. They also acknowledged the delays in getting new information requirements to states and said that such delays were related to troubleshooting the new smart forms and online database. They said that they do not anticipate such delays in the future. As previously discussed, Texas state officials also said that they found the guidance for terminating a deficient agency’s CSBG funding confusing. However, officials in New York said that they found the guidance to be clear. They said that the informational memorandum on terminating agencies’ CSBG funding is more prescriptive than previously issued CSBG guidance. OCS officials stated that the agency is continuously seeking opportunities to work with its technical assistance centers to identify the best means of delivering guidance to states and to eligible entities. OCS officials also said that they must continue to refresh training efforts when there is turnover among key staff in a state agency and work with new state administrators to transition into their new roles. State agency officials in all three states we visited told us that they used some of their state’s discretionary funding for training and technical assistance to help local agencies meet CSBG requirements. The CSBG Act allows states to use a maximum of 10 percent of their CSBG funds for training and technical assistance and other specified purposes. In the selected states, officials spent from $65,000 to over $400,000 for training and technical assistance for local agencies (see table 4). Across the three selected states, we found that the training provided to local agencies addressed what local agencies need to do to meet a wide variety of CSBG requirements, from planning community needs assessments to implementing performance management requirements. In addition, some funds states provided for training were used by local agencies to send their staff to regional or national conferences for training (see table 5). State officials in two of the three states we visited said that they determine what training they need to offer based on analysis of feedback and specific requests from local agencies. For example, Texas identified training needs for local agencies through a Training and Community Affairs group that gathered information from local agencies about their training needs. Texas officials said they analyzed assessment results, feedback, and requests from local agencies and other sources to determine the training needs of individual state and local agencies. State officials said that they then met with the state association to develop the Joint State Training and Technical Assistance Plan and, ultimately, to provide trainings at the annual state conference, and to identify workshops, webinars, and online resources (guides, tools, best practices, and links to other training resources) that need to be added or changed. Similarly, state officials in North Dakota reported working closely with the state association of community action agencies to plan and conduct training for local agency staff. State and local agency officials also said that they have relied on the OCS-funded national resource centers for assistance. Officials in the states we visited all reported being helped by information provided by the national centers on topics such as the new organizational standards and how to submit data in the new annual report. Local agency officials told us that they send staff to the conferences sponsored by the national resource centers to obtain training when funding is available for that purpose. In addition to training, state officials in the states we visited cited a variety of practices that contribute to effective oversight. Both New York and North Dakota officials emphasized the importance of frequent, ongoing communication with local agencies as crucial to successful oversight. New York also identified frequent visits to local agencies and immediate action in response to problems as additional key factors for effective oversight. OCS uses outcome data from state agencies that collect and aggregate data from local CSBG recipients to provide an indication of CSBG’s progress in meeting the three national program goals. As previously discussed, the three national goals of the CSBG program as established under the CSBG Act are to (1) reduce poverty, (2) empower low-income families and individuals to become self-sufficient, and (3) revitalize low- income communities. State agencies report data from a menu of more than 100 performance measures established by OCS and grouped by service types such as employment, early childhood programs, and education. OCS sets annual targets for the overall performance of the CSBG program and uses the aggregated state data as an indicator of CSBG’s national effectiveness to inform budget decisions consistent with federal requirements for performance management. Until fiscal year 2018, OCS used one performance measure—the number of barriers to economic security that the local agencies receiving CSBG funds eliminated for individuals, families, and communities—to provide an indication of CSBG’s national effectiveness. To do this, OCS combined the outcome data from 10 of the more than 100 performance measures from the state annual reports to derive a cumulative total number of barriers overcome. OCS selected the 10 measures as a way to track outcomes from services that range from emergency services to more comprehensive and coordinated services. The 10 measures included outcomes such as the number of participants who obtained a job, maintained employment, maintained an independent living situation, reached the goals of enrichment programs, or obtained emergency assistance. While this one performance measure of barriers eliminated was intended to provide OCS with an indication of how the program was meeting CSBG national goals, several weaknesses with this measure limited OCS’s ability to do so. First, the measure included duplicative counts. For example, an individual may overcome a number of different barriers to reach the outcome of obtaining a job. As a result, by tracking the number of barriers, an outcome may be counted multiple times when combining data from multiple measures. Second, it is also difficult to know which CSBG funded program or service caused the positive outcome or if one service helped achieve multiple outcomes. Third, OCS officials clarified that when calculating this and other outcome measures, the removal of barriers to economic security is not solely the result of CSBG funds, but of all funding administered to local agencies that received CSBG funds. As such, they said that it is difficult to isolate the effects of CSBG funding. In its agency wide budget justification for fiscal year 2020, HHS reported that in fiscal year 2017 local agencies eliminated 32.2 million barriers to economic security, well above the 27.6 million it set as its goal for the year. In the same year, 16.2 million individuals received support through local agencies receiving CSBG funds. While the performance measure aided OCS in providing some indication of how the CSBG program contributes to the goal of improving self-sufficiency, it still did not provide information on the program’s progress in meeting the other two national program goals. Leading practices in performance management stress that performance measures should be tied to the specific goals of the program. However, no such linkage existed between the performance measure OCS used to report on the progress of the CSBG program and the program’s three national goals. required to annually report, among other things, a summary of certain information the states provide and its findings on state compliance to Congress. While OCS does submit such reports, we found that there has historically been a multi-year lag in OCS providing these reports to Congress. In May of 2019, OCS released its fiscal year 2015 CSBG report to Congress (see sidebar on data reported in the CSBG fiscal year 2015 report to Congress). Over the last decade, this type of reporting lag has been common and OCS has taken an average of more than 3 years from the end of the federal fiscal year until the time the Congress received the final report. OCS officials told us that they submitted the draft annual report for fiscal year 2016 for internal review by HHS in October 2018, but said that they could not project when the final report would be issued to Congress. They said they are currently drafting the fiscal year 2017 report. OCS has taken steps to redesign its performance management approach, but several elements of the new approach do not align with federal performance management and internal control standards. OCS has been redesigning how it oversees and manages the performance of the CSBG program to better align with GPRAMA, according to OCS officials. Since fiscal year 2016, OCS has been implementing new performance management tools for the CSBG program, including updating what data it collects and how it collects it on the services and outcomes, or performance measures, of the CSBG program. OCS officials stated that the changes are necessary to be able to provide more information and analysis on CSBG funded programs and their outcomes. They also noted the importance of these updates given a tightening federal budget. As part of these changes, OCS updated its more than 100 performance measures by revising the language of some and adding new measures that state and local agencies can report on, including measures more focused on outcomes in the communities they serve. State and local agency officials told us that the increased emphasis on outcomes in the new measures was an improvement and increased their own focus on connecting CSBG funds to traceable results. In addition, OCS transitioned to an online data reporting system that allows state agencies to directly report and access CSBG program data. However, OCS is still revising how it will use the data provided by state and local agencies to reflect nationwide results. OCS is using the data collected in state annual reports to develop a new national measure intended to provide a national total count of individuals who achieve at least one positive outcome through programs and services offered by local agencies that receive CSBG funds. Unlike the prior measure on the number of barriers to economic security eliminated by local CSBG recipients that could include duplicative counts, the new measure will be a count of individuals. OCS stopped using the prior measure after fiscal year 2017. Until OCS finalizes the new measure, it does not have a performance measure in place with targets and results that it can report to Congress. As such, it is unclear if OCS will report national performance outcomes for fiscal year 2018 or how useful the new measure will be while it is still in development through fiscal year 2022. While OCS has taken steps to redesign its performance management approach, several elements of the new approach do not align with federal performance management and internal control standards. Specifically, OCS has not established (1) how the new national measure will be used to assess CSBG goals, (2) the relationship between state and local measures and program goals, and (3) how OCS will monitor the reliability of state and local agencies’ program data. How the newly developed national measure will assess CSBG program goals. As discussed, OCS is developing a new national measure intended to provide a total number of individuals who achieved at least one positive outcome from CSBG funded program or services. However, it is unclear which of the three program goals—reducing poverty, empowering low-income families and individuals to become self- sufficient, or revitalizing low-income communities—the new national measure is being used to assess. As noted previously, OCS officials have stated that they are working to establish ways to provide more information and analysis on programs and their outcomes. OCS officials also told us that they are using GPRAMA as a guide for these changes and in our prior work we have reported that these requirements can serve as leading practices for strategic planning at lower levels within federal agencies. GPRAMA requires agencies to establish performance goals and a balanced set of performance indicators, including output and outcome indicators as appropriate, in measuring or assessing progress toward those goals. Additional leading performance management practices state that performance measures should be tied to the specific goals of the program. However, OCS’s new measure which is intended to provide a count of the number of individuals that achieve one or more positive outcomes does not specify which of the three national program goals the new measure will address, nor how the other two national program goals will be addressed. OCS officials told us that the new measure is related to two of the three goals because it is aggregated data from some of the outcome measures focused on individual and family outcomes. However, officials acknowledged that the agency has not yet developed a national measure for revitalizing low-income communities. Officials stated they plan to report on progress toward developing these measures and that it will provide examples of community-level outcomes in upcoming reports to Congress. Without clearly linking the measure to the goals, there is no way to tell if, and to what degree, the services local agencies are providing through CSBG grant funds are having the desired effect on their communities, even if examples are included in the shared results. How state and local performance measures are related to the three program goals. It is unclear how the large number of updated state and local performance measures under OCS’s redesigned approach aligns with CSBG’s three national program goals. OCS still collects data on more than 100 measures but it is unclear which of these measures will be analyzed at a national level. According to OCS officials, these data are most useful to state and local agencies for assessing outcomes against their unique goals and numerous measures are necessary to capture the variety of services and outcomes across the 1,000 local agencies. In our prior work on ways that agencies could improve performance management, we have stated that using a minimal number of critical measures is a leading practice. We have found that organizations that seek to manage an excessive number of performance measures may risk creating confusing, excess data that will obscure rather than clarify performance issues. The large number of measures can also further complicate OCS’s efforts to align the measures with CSBG’s three national program goals. How OCS will assess data reliability long-term. Although OCS is taking steps to assess data collected from state and local agencies for its new national measure, it does not have a written plan for how it will assess the data’s reliability for future years. As previously discussed, OCS is using a new data reporting system to collect the data it will subsequently use for its new national measure and this data will now be received directly by OCS instead of a third party. However, OCS does not have written plans in place for how the agency will determine if the new data collected will be a valid measure of the national program’s effectiveness or if the data will be reported reliably by the states into OCS’s online data system. OCS received its first round of performance data for the new measure for fiscal year 2018 on April 30, 2019, and is working with its cooperative agreement grantees and contactors to compile results and conduct quality assurance tests for the new performance data using a multi-step process that involves: OCS staff comparing data provided in the annual report to information previously provided in the state plans; OCS conducting quality assurance reviews, with assistance from the organizations the office has cooperative agreements with, that include checks for discrepancies and identifying items requiring clarification, and conducting follow-up with the states; and, OCS soliciting feedback from state officials and consulting with performance management experts within HHS about refinements to assist OCS in establishing a baseline that will be used in setting future targets. OCS officials also told us that the next steps will be to make any necessary modifications to the measure, such as adjusting how states calculate positive outcomes, and establishing a baseline to set future targets. On October 2, 2019, OCS announced via a Federal Register Notice that it was requesting a three year extension with minor changes of the CSBG Annual Report. OCS plans to make only minor changes to the current data collection tool for 2 years to allow state and local agencies time to assess current information and intends to begin a longer term planning process starting in fiscal year 2020. OCS officials told us that they plan to implement and maintain a quality assurance process to ensure the accuracy of the data based on data from previous years. While the process OCS has put in place to ensure data reliability for the first round of data collected for the new measure is a step in the right direction, OCS does not have a plan for assessing future years’ data. OCS officials told us that they will use selected cooperative agreements and contracts to develop a written plan for how the agency will monitor state and local agency data reliability going forward, but did not provide a timeframe for when this would be completed. Leading practices established by federal internal control standards state that agencies should use quality information that is appropriate, current, complete, and accurate to make informed decisions and evaluate the entity’s performance in achieving key objectives. OCS officials reported that they and contractors are working with the states to adjust and finalize data for fiscal year 2018 by November 2019. By not aligning its redesigned performance management approach with federal performance management leading practices related to program goals, performance measures, and data reliability, OCS cannot properly assess its progress in meeting CSBG’s three national goals. Poverty erodes the well-being of individuals, families, and communities. The CSBG program is intended to reduce poverty, empower low-income individuals and families to become self-sufficient, and revitalize low- income communities. The CSBG program allows local agencies to use funds in a wide variety of ways to reduce the causes of poverty in the communities they serve. However, the inherent flexibility of the program also makes it difficult to assess the program’s performance. OCS recently redesigned its performance management approach to better understand how well the CSBG program is progressing toward meeting national goals. However, several elements of the redesigned approach do not align with leading practices in federal performance management. Inconsistencies with these practices, such as having an excessive number of performance measures and lacking a plan for assessing the reliability of state and local performance outcome data, limit OCS’s ability to demonstrate the national effectiveness of the CSBG program. As such, OCS cannot assure the Congress and the American public that the funding is meeting its intended purpose to reduce the causes of poverty. The Director of OCS, in developing the new performance management approach for the CSBG program, should ensure that its performance framework includes information on (1) details for how the national measure is linked to and used to assess the three national program goals, (2) descriptions of how the updated state and local performance outcome measures align with national program goals, and (3) a written plan for how OCS will assess the reliability of state performance outcome data. (Recommendation 1) We provided a draft of this report to HHS for review and comment. We received written comments from HHS, which are reprinted in appendix III. HHS concurred with our recommendation, and stated that it plans to take actions to better align its performance measures with the three national performance goals outlined in the new CSBG Theory of Change. While we commend HHS for its plans to address our recommendation, we urge HHS to focus on aligning its performance outcomes with the three national goals of the CSBG program as established by the CBBG Act, which are similar but not identical to the three goals outlined in the new CSBG Theory of Change. HHS also stated that it would implement additional actions to assess the reliability of state performance outcome data. In addition, HHS provided technical comments which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees and the Secretary of HHS. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report is listed in appendix IV. This appendix discusses in detail our methodology for addressing our two research objectives examining (1) the activities that the Department of Health and Human Services (HHS) and states conduct to oversee the state and local agencies that receive Community Services Block Grant (CSBG) funds and (2) the extent to which HHS assesses the outcomes of the CSBG program. We scoped our review of the CSBG program to include the 50 states, American Samoa, the District of Columbia, Guam, Northern Mariana Islands, Puerto Rico, and the United States Virgin Islands, which are defined as states under the CSBG Act. In addition to the methods we discuss below, to address both our research objectives, we reviewed relevant federal laws, federal grants management guidance, and agency documents that describe the federal requirements and responsibilities for overseeing states’ CSBG programs and assessing program outcomes. We interviewed HHS, Office of Community Services (OCS) officials; and reviewed relevant research from OCS and the HHS Office of Inspector General, as well as our prior work on the CSBG and other federal grant programs. Further, we interviewed representatives of the National Association for State Community Service Programs (NASCSP); state officials from state agencies that oversee the CSBG program in New York, North Dakota, and Texas; and six local agencies that receive CSBG funds. We also analyzed CSBG annual reports to Congress and NASCSP data on local agency allocations. To address the federal oversight aspect of our first objective, we reviewed available information on OCS’s policies and procedures, including the risk assessment criteria OCS uses to select states for onsite compliance evaluations and interviewed OCS officials about their oversight efforts. We also selected 12 states for an in-depth review of OCS’s oversight activities. These included six states (Indiana, Louisiana, Michigan, New York, North Carolina, and Texas) for which OCS conducted onsite compliance evaluations during fiscal years 2016 and 2017. We selected the six states where OCS had conducted onsite compliance evaluations based on which of the visited states OCS had prioritized as those in highest need of onsite reviews for fiscal years 2016 and 2017. We also randomly selected five states (Alaska, Colorado, Kentucky, Mississippi, and Rhode Island) where OCS did not conduct such evaluations, but conducted routine reviews. We also selected a sixth state—North Dakota—because OCS had not visited the state in several years. We compared the results to see if there were any notable differences between the two sets. While our findings are non-generalizable, they provide insight into the different levels of review OCS conducts and examples of OCS oversight actions. Our file documentation reviews included a review of: OCS’s comments on each section of the states’ program documents, including the state plan and annual reports; actions the states took to address OCS’s comments; and state’s fiscal controls, financial and program oversight documents. Table 6 provides a summary of the characteristics of the 12 states we selected for review. To address the state and local oversight aspect of objective one, for a more in-depth look at state oversight practices, including promising practices and challenges, we visited three states: two states (New York and Texas) for which OCS conducted onsite compliance evaluations and one (North Dakota) for which OCS conducted a routine review. We selected these states using several criteria, including state grant amounts, number of local agencies, whether the HHS Office of Inspector General findings had reviewed the state’s use of CSBG funds, the time since the state was last visited by OCS for a compliance evaluation visit, and recommendations from experts at NASCSP and at OCS, who based their recommendations, in part, on states that had promising practices for overseeing local agencies (see table 7). Our final state selections comprise a diverse sample based on these criteria. For example, our selected states include a state with a low number of local agencies, one with a large number of local agencies, states with high and medium amounts of funding, and a state with a low amount of funding. During our state site visits, we interviewed and collected information from state and local agency officials about state oversight efforts from fiscal years 2016 through 2017. For each of the three states, we interviewed state program officials and reviewed related documentation including state policies and procedures, state single audits, onsite oversight guides and reports, and reporting forms for local agencies. We also visited two local agencies in each state and interviewed staff to learn more about state oversight efforts, including fiscal and performance reporting, onsite visits, training and technical assistance, and promising practices and challenges to such oversight. We conducted these visits in November and December 2018. In each state we visited, we reviewed program files for the two local agencies we visited, including oversight, financial, and performance reports; and follow up correspondence concerning the findings from state agency visits to those local agencies. Information collected from state and local agency officials during our site visits are not generalizable to all state CSBG programs. In addition, we obtained information on state audit findings related to CSBG and met with state auditors during site visits to learn more about additional state oversight of CSBG and local agencies to learn whether any coordination occurred between the different federally funded programs offered by the local agencies to support state oversight efforts. We reviewed the Single State Audit findings for fiscal years 2016 through 2017 for each of three states and six local agencies we visited. We reviewed these audit reports to determine if there were findings pertaining to CSBG and if so, the nature of those findings. To address our second objective, we reviewed the program performance indicators OCS uses to measure program outcomes in relation to the stated goals of the CSBG program. We also reviewed OCS’s design and implementation plans for a new performance management approach, including revised performance measures for assessing program outcomes. We compared OCS’s previous performance management approach to its new one, including the types of data it collected and its methods of collecting data from state and local agencies. In conducting our work, we also interviewed OCS officials about the goal of, and changes to, the performance management approach and reporting requirements. Additionally, we interviewed state officials on their experience with CSBG program performance. We reviewed leading practices in grant performance management identified in federal guidance and in GAO reports and assessed OCS’s approach against federal performance and internal control standards. We conducted this performance audit from to May 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This table includes all states as defined by the CSBG Act, which was the focus of our review. In addition to the contact named above, Mary Crenshaw (Assistant Director), Melissa Jaynes (Analyst-In-Charge), Sandra Baxter and Stacy Spence made key contributions to this report. Also contributing to this report were James Bennett, Grace Cho, Alex Galuten, Danielle Giese, Corinna Nicolaou, Monica Savoy, and Almeta Spencer.", "summary": "CSBG is one of the key federal programs focused on reducing poverty in the United States. In fiscal year 2019, CSBG provided about $700 million in block grants to states. In turn, states provided grants to more than 1,000 local agencies, which used the funding to provide housing and other services to program participants. HHS is responsible for overseeing states' use of this funding, and states have oversight responsibility for local agencies. GAO was asked to review CSBG program management. This report examines (1) how HHS and selected states conduct their oversight responsibilities and (2) how HHS assesses the effectiveness of the CSBG program. GAO reviewed files for six of the 12 states where HHS conducted onsite compliance evaluations during fiscal years 2016 and 2017, and six states where HHS conducted routine monitoring—five of which were randomly selected. GAO visited three states, selected based on their CSBG funding amount and other factors, to conduct in-depth reviews of their monitoring activities. GAO also reviewed agency documents and interviewed HHS and selected state and local officials. The Department of Health and Human Services (HHS) and the selected states GAO reviewed provided oversight of the Community Services Block Grant (CSBG) program through onsite visits and other oversight activities to assess grant recipients' use of funds against program requirements. Specifically, GAO found: HHS and the selected states conducted required oversight activities. The Community Services Block Grant Act requires HHS to conduct compliance evaluations for several states each year and requires states to conduct onsite visits to local CSBG recipients at least once every 3 years to evaluate whether recipients met various goals. During fiscal years 2016 and 2017, HHS conducted onsite compliance evaluations for 12 states that it deemed most at risk of not meeting CSBG requirements. GAO's visits to three states found that all three had conducted onsite visits to local grantees during the same fiscal years. HHS and the selected states also conducted additional oversight activities. This included routine reviews and quarterly calls. HHS and state monitoring activities primarily identified administrative errors, instances of non-compliance and other issues, which grant recipients took steps to address. For example, a HHS fiscal year 2017 compliance evaluation found that in fiscal year 2015 one state neither implemented procedures to monitor and track findings from a state audit, nor monitored eligible entities as required. HHS uses state outcome data to report on CSBG's national effectiveness, but these data are not aligned with the national program goals to reduce poverty, promote self-sufficiency, and revitalize low-income communities. HHS recently redesigned its' performance management approach to improve its ability to assess whether the CSBG program is meeting these three goals, but several elements of the approach do not align with leading practices in federal performance management. GAO found that HHS's redesigned approach does not demonstrate: How the agency's newly developed national performance measure—intended to provide a count of the number of individuals who achieved at least one positive outcome through CSBG funds—will assess the program in meeting national program goals. How the state outcome data, consisting of more than 100 state and local program measures, relate to CSBG's three national goals. How data collected from state and local agencies will be assessed for accuracy and reliability. Without aligning its redesigned performance management approach with leading practices, OCS cannot properly assess its' progress in meeting CSBG's three national goals. GAO is recommending that HHS's new performance management approach include information on how its performance measure and state outcome measures align with program goals and how it will assess data reliability. HHS agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "Hospice care helps patients who are terminally ill—as well as the families of those patients—maintain their quality of life. Hospice care focuses on the comfort of patients (palliative care), not curing the illness. Patients are eligible for hospice care under Medicare if they have a life expectancy of six months or less. Most patients get hospice care at home, which typically includes use of controlled substances, including opioids such as oxycodone, to provide pain relief. According to CMS, hospice teams are required to include a physician, nurse, social worker, and pastoral or other counselor; and may also include hospice aides, trained volunteers, and speech, physical, and occupational therapists. The patient selects a primary caregiver when first admitted into home hospice, and this person becomes a member of the home hospice team. The primary caregiver, often a family member, provides most of the care for the patient in home hospice, including most of the physical care for the patient, keeping records of symptoms and other problems, and communicating with the hospice team. The Controlled Substances Act regulates the manufacture, distribution, use, and disposal of controlled substances. In general, the Controlled Substances Act was enacted to facilitate the use of controlled substances for legitimate medical, scientific, research, and industrial purposes while preventing them from being diverted for illegal uses. DEA is the primary agency with responsibility for administering and enforcing the law, and DEA provides oversight of all persons or entities required to register with DEA. The Controlled Substances Act has been amended twice to clarify federal requirements for patient disposal of controlled substances. 2010. The Secure and Responsible Drug Disposal Act of 2010 amended the Controlled Substances Act to allow a patient who has lawfully obtained a controlled substance to deliver the controlled substance to another person for the purpose of disposal, without being registered with DEA. Any person lawfully entitled to dispose of a deceased patient’s property may also deliver the patient’s controlled substances to another person for the purpose of disposal. The person receiving the controlled substances must be legally authorized to do so and the disposal has to take place in accordance with DEA regulations, which DEA issued in 2014. Among other things, the DEA rulemaking clarified that home hospice personnel could not dispose of a deceased patient’s controlled substances unless authorized to dispose of the patient’s property by a state or local law. Instead, the rulemaking encouraged home hospice personnel to assist patients and their families in disposing of controlled substances in accordance with the Controlled Substances Act, and partner with authorized collectors to promote or jointly conduct mail-back programs. 2018. The SUPPORT Act amended the Controlled Substances Act to allow employees of qualified hospices, whether or not registered with DEA, to dispose of a patient’s unused controlled substances onsite and in accordance with all applicable laws after the patient’s death or the controlled substance expires. The employee must be a physician, physician assistant, nurse, or other person who is: employed by a qualified hospice; licensed to perform medical or nursing services by the jurisdiction in which the patient is receiving hospice care; acting within the scope of their employment in accordance with applicable state law; and trained on the disposal of controlled substances by the qualified hospice. If the hospice patient no longer requires the controlled substances because of a change in his or her care plan, only the patient’s DEA- registered physician may dispose of the patient’s unused controlled substances. The authority to dispose of unused controlled substances under the SUPPORT Act applies only to qualified hospices. Such hospices must have written policies and procedures for assisting in the disposal of controlled substances after the patient’s death, and must document that they provided and discussed these policies and procedures in an understandable manner with the patient and family. In addition, the hospice must document the type of controlled substance, dosage, route of administration, and quantity disposed, as well as the time, date, and manner in which the disposal occurred. The SUPPORT Act also allows the Attorney General to issue guidance to hospices regarding the disposal of controlled substances in patients’ homes. According to DEA officials, DEA’s oversight of the disposal of controlled substances in home hospices is limited to instances of suspected or actual diversion. This is because the SUPPORT Act allows employees of qualified home hospices to dispose of unused controlled substances in patients’ homes without registering with DEA. CMS regulates Medicare-certified home hospices through the Hospice Conditions of Participation, which are intended to protect the health and safety of individuals under hospice care. Hospices must be in compliance with the Hospice Conditions of Participation to participate in the Medicare program. CMS oversees compliance with the Hospice Conditions of Participation primarily through inspections, which are conducted by state survey agencies contracted by CMS or CMS-approved national private accrediting organizations. Among other things, the Hospice Conditions of Participation require hospices to have written policies and procedures for the management and disposal of controlled substances in the patient’s home, discuss the hospice policies and procedures for managing the safe use and disposal of controlled substances with the patient and family in a manner that they understand, and document that the written policies and procedures for managing controlled substances were provided and discussed. CMS does not oversee the disposal process. According to a national hospice association official, each hospice had a different approach to disposal prior to the DEA rulemaking in 2014. Some hospices asked their employees to dispose of controlled substances to prevent diversion and others did not. After the DEA rulemaking, some states enacted laws granting authority to hospice employees to dispose of patients’ unused controlled substances when the medications were no longer needed, upon death of the patient, or both. Requirements under states’ laws vary (see appendix I). Hospices in some states without laws on the disposal of controlled substances in home hospice began, or resumed, disposing controlled substances in patients’ homes following the enactment of the SUPPORT Act in 2018. Officials from six selected home hospices expressed support for the authority to dispose of controlled substances granted by the SUPPORT Act, and officials we interviewed from two hospices operating in states without disposal laws told us their hospices had resumed disposing of controlled substances in patients’ homes under the authority granted by the SUPPORT Act. In contrast, an official from one hospice told us that their hospice had not begun disposing of these medications with the enactment of the SUPPORT Act because the state department of health directed it not to do so until a state law granting disposal authority to hospices had been enacted. For now, the hospice has continued with its practice of educating patients’ family members on how to dispose of controlled substances themselves. Medicare-certified hospices, including the seven we selected for our review, are required by CMS’s Hospice Conditions of Participation to have written policies and procedures for the safe disposal of controlled substances in a patient’s home. The policies and procedures may include best practices, such as measures for assessing and mitigating the risk of diversion in a patient’s home, and if and how the hospice will conduct controlled substance disposal. According to officials we interviewed from the selected hospices and state hospice associations, hospices utilize various strategies or best practices to attempt to mitigate diversion risks, including, but not limited to, the following: Education on controlled substance use and disposal. Hospice policies may include disposal education for patients and their caregivers. Specifically, officials from five hospices and five state hospice associations said that patient and family member education on controlled substances and their disposal begins or should begin upon the patient’s admission into hospice care or as soon as possible thereafter. According to officials from three hospices, their staff may use written agreements or acknowledgements that must be signed by the patient or their caregiver. An official from one hospice association told us the association made an agreement template available to their hospice members that can be used to ensure patients understand how to properly use prescribed controlled substances, agree to use them properly, and will not give them to anyone else. Prescription drug counts. Officials from four hospices and two state hospice associations told us that, in general, nurses conduct prescription drug counts at every visit to check if the proper amounts of medications remain. Officials from two of these hospices said that drug counts should require the family’s acknowledgement or be witnessed. Officials from three other state hospice associations mentioned that their members use drug counts as well but did not specify if this occurred at every visit. These counts can be used to recognize possible drug misuse or diversion. If there is an indication that diversion may be the cause of an incorrect count, hospices can put additional drug diversion risk reduction practices in place. Lockboxes. If diversion is suspected to be a risk or if there are children present in the patient’s home, a hospice may choose to use a lockbox to store the patient’s medications and limit access to only an alert patient or their caregivers. Officials from five hospices and five state hospice associations mentioned that their employees and members use lockboxes for such purposes. One hospice official explained that lockboxes may also be used as an accountability tool so that those with access cannot accuse others of stealing if drugs are unaccounted for. Pharmacy cooperation. A hospice may choose to have the pharmacy mail a prescribed controlled substance in smaller quantities and with greater frequency. For example, an official from one of the selected hospices explained that the pharmacy they use will deliver medications as often as daily if needed to reduce the risk of controlled substances being diverted. Similarly, an official from a state hospice association explained that some pharmacy managers and benefits managers note when a refill for a prescription is requested sooner than it should have been and alert the hospice. Witnessed disposal or assisted disposal. Pursuant to some state disposal laws and according to officials from five hospices and four state hospice associations, controlled substance disposal and assisted disposal must or should be performed with a witness present. The state disposal laws may specify who the witness must be. For example, according to two state laws, a family member or a second hospice employee may witness disposal. In-home disposal products. Hospices may have varying preferences for how they dispose of controlled substances; officials from four of the selected hospices mentioned using in-home disposal products, and two specifically explained they believed these to be the safest disposal method, even though, according to the officials, it can be costly. Officials from another hospice told us they receive their in- home disposal products through a grant program. Documentation. Officials from four selected hospices told us their employees document the completion of certain tasks, such as diversion risk assessments, drug counts, drug disposal, and the refusal of drug disposal. An official from one of these hospices told us their staff perform and document a diversion risk assessment of the patient’s home. While officials from four hospices told us their employees perform drug counts, only one official specified that employees from their hospice document the drug counts. Another hospice official explained that disposal documentation includes the name, dosage, form, and administration method of the medication. One hospice official told us that if a patient’s family members refuse disposal, they must sign a form stating they declined to allow the nurse to dispose of the patient’s remaining drugs. Officials from selected hospices and state hospice associations in our review described various challenges associated with disposing of controlled substances in patients’ homes. The challenges described by the selected hospices and state hospice associations include but are not limited to the following: Certain disposal methods may be too costly. An official from one state hospice association said that most of its members do not use a drug disposal process, which may include a mail-back program or in- home disposal product, because it is an extra expense, and an official from one hospice said that after pricing an in-home disposal product, their hospice decided it was cost prohibitive. One state hospice association official explained that although most of its in-home hospice members use an in-home disposal product, in instances when the hospice employee is disposing of 40 to 50 vials, the expense of this disposal method can be burdensome. The official told us the product costs approximately $6 each and fits four to five vials of pills in each. Disposal can be time consuming. One hospice official said that disposal can sometimes be a time-consuming and resource-intensive activity. According to two state hospice association officials, sometimes a patient’s family will ask the disposing hospice employee to dispose of all of the patient’s unused prescription drugs that remain in the home, not only controlled substances or drugs prescribed under hospice care. Officials from two of our selected hospices and two state hospice associations told us that it is not atypical for a hospice patient to have bags or boxes full of unused medications, though the officials did not describe this as a disposal challenge for hospices. Lack of a witness. One hospice official told us that it is a challenge when a witness is not available or is unwilling to participate in a drug count or disposal. Another hospice official indicated that the patient’s primary caregiver is not always the family member present at the time of a drug count or disposal. This can create a challenge, as the hospice employee must either wait for the patient’s primary caregiver to arrive, or for that person to agree to witness a count, disposal, or both. Family members and caregivers sometimes refuse to dispose of controlled substances. Officials from two hospices and three state hospice associations indicated that a family’s refusal to dispose of a patient’s remaining medications can be a challenge, though one hospice official said it occurs infrequently. An official from another hospice said that if a family initially refuses disposal, hospice staff return after two weeks to complete the disposal process. Inconsistencies between state laws and federal law. Hospices must comply with applicable federal and state laws governing controlled substances, and to the extent state law is inconsistent with the Controlled Substances Act, hospices must follow federal law. Hospice officials told us that inconsistencies between state laws and federal law can cause challenges. For example, the SUPPORT Act limits disposal to only physicians, physician assistants, nurses, or other hospice employees who are licensed to provide medical or nursing services. An official from one hospice stated that the hospice used the help of social workers and volunteers to dispose of controlled substances. Regulations in this state do not specify which types of hospice employees are permitted to assist with disposal. According to the official, social workers and volunteers helped dispose of patients’ controlled substances when disposal occurred at a later time, rather than immediately following a patient’s death. Since the SUPPORT Act limits disposal to home hospice personnel with specific qualifications, it is unclear whether hospices are able to allow social workers and volunteers to help in that capacity. As another example, under the SUPPORT Act, only a hospice patient’s DEA-registered physician can dispose of the patient’s controlled substances if the plan of care has been modified. However, some state laws allow other types of hospice employees to perform disposal in this circumstance. Officials from two hospices in these states indicated it will be a challenge for disposal to be limited to physicians when a patient’s plan of care is modified. Similarly, officials from two other selected hospices in states without disposal laws also stated that this would be a challenge. For example, one hospice official explained that their hospice does not have many physicians, and it would be unlikely for a physician to be able to visit a patient’s home solely to handle disposal. We provided a draft of this report to the Departments of Justice and Health and Human Services for review. The Departments of Justice and Health and Human Services provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Attorney General of Justice, the Secretary of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at CosgroveJ@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix II. To describe what is known about selected hospices’ experiences disposing of and preventing the diversion of controlled substances in home settings, we selected five states with laws on the disposal of controlled substances in home hospices and six states without such laws. The five states with disposal laws were chosen for this review because they had state hospice associations that were involved in disposal discussions with a national hospice association or they had higher opioid-related death rates than most states. The summaries in Table 1 below reflect our reviews of the five states’ laws. In addition to the contact name above, Martin T. Gahart (Assistant Director), Deborah J. Miller (Analyst in Charge), Samuel G. Amrhein, Kaitlin M. Farquharson, and Christina C. Murphy made key contributions to this report.", "summary": "Misuse of controlled substances continues to be a serious public health problem in the United States. Most commonly misused controlled substances include opioids (such as oxycodone), which are used to treat pain, and central nervous system depressants (such as diazepam), which are used to treat anxiety and sleep disorders. These types of drugs are commonly prescribed for patients in hospice care. The SUPPORT Act included a provision for GAO to examine disposal of controlled substances in home hospice settings. This report describes selected home hospices' controlled substances disposal practices and the challenges they face in disposing of these substances. GAO reviewed the SUPPORT Act and other related statutory and regulatory provisions. GAO also interviewed officials from the Centers for Medicare & Medicaid Services, the Drug Enforcement Administration, three national hospice trade associations, two national nurse trade associations, 11 state hospice associations, and seven hospices. Hospice care helps patients who are terminally ill maintain their quality of life. Most patients get hospice care at home, which typically includes use of controlled substances, including opioids such as oxycodone, to provide pain relief. When hospice patients die at home, they often leave behind unused controlled substances, which can be diverted and misused by anyone with access to them. The Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (SUPPORT Act), enacted in 2018, allows employees of qualified hospice programs to dispose of unused controlled substances by collecting and destroying the drugs in patients' homes. In addition, some states had laws allowing hospice employees to dispose of patients' unused controlled substances prior to 2018. Three of the seven hospices GAO contacted operate in states without such laws. Officials from two of these hospices told us their hospices began disposing of patients' controlled substances in their homes following the enactment of the SUPPORT Act in 2018. However, one hospice had not begun disposing of these medications because the state department of health directed it not to do so until a state law granting disposal authority to hospices had been enacted. An official from that hospice said that it continued the practice of leaving the controlled substances in the home and educating family members about how to dispose of the drugs themselves. Hospice officials we spoke to identified best practices for preventing diversion and disposing of controlled substances. Best practices include prescription drug counts performed by hospice employees to determine if controlled substances are being used properly, use of lock boxes to limit access to controlled substances in situations where diversion is suspected to be a risk, and having a witness for the disposal of unused controlled substances. The officials also identified challenges their hospice employees have faced when disposing of controlled substances in patients' homes. Challenges include the cost of certain disposal methods, a lack of a witness to the disposal process, and inconsistencies between state laws and federal law concerning which hospice employees may dispose of controlled substances. The Departments of Justice and Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "Headquartered in Washington, D.C., the Corps has eight divisions established generally according to watershed boundaries and 38 districts that carry out its Civil Works program. Corps headquarters primarily develops policies and provides agency oversight. The Assistant Secretary of the Army for Civil Works, appointed by the President, sets the strategic direction for the agency and has principal responsibility for the overall supervision of functions relating to the Civil Works program. The Chief of Engineers—a military officer—oversees the Corps’ civil works and military missions. The eight divisions—Great Lakes and Ohio River, Mississippi Valley, North Atlantic, Northwestern, Pacific Ocean, South Atlantic, South Pacific, and Southwestern—coordinate Civil Works projects in the districts within their respective divisions. Corps districts are responsible for planning, engineering, constructing, and managing Civil Works projects. Congress established the Section 219 program in the 1992 WRDA, which authorized the Corps to provide planning and design assistance to nonfederal sponsors in carrying out 18 environmental infrastructure projects, located in certain specified locations around the United States. For example, the 1992 WRDA authorized the Corps to provide assistance for a combined sewer overflow treatment facility for the city of Atlanta, Georgia. In subsequent acts, Congress authorized the Corps to provide construction assistance for Section 219 projects, in addition to planning and design, and significantly expanded the number of authorized projects. From 1992 through 2007, Congress authorized a total of 310 Section 219 projects, with the most recent and largest number of project authorizations occurring in 2007 (see table 1). For Section 219 projects, Congress specifies the geographic location (e.g., city, county), amount of authorized dollars, and purpose or scope of the project (e.g., development of drainage facilities to alleviate flooding problems). In general, Section 219 projects fall into one or more of the following types of projects: Drinking water treatment and distribution. Projects that build water treatment plants, water storage tanks, and water distribution lines. Wastewater treatment. Projects that build sewage treatment plants, wastewater collection systems, and facilities that purify treated wastewater for irrigation and other purposes. Stormwater management. Projects that help improve the management of storm sewers, eliminate or control sewer overflows, and address flooding. According to Corps data, of the 310 originally authorized Section 219 projects, 58 have been deauthorized and were no longer active, as of November 2018. The Corps is required by the 1986 WRDA, as amended, to annually identify all authorized projects that have not received obligations in the preceding 5 full fiscal years and submit that list to Congress. If funds are not obligated for planning, design, or construction of a project on that list during the next fiscal year, the project is deauthorized. The Secretary of the Army publishes a list of deauthorized projects in the Federal Register. Based on this process, the Corps considered deauthorizing 197 additional Section 219 projects in its fiscal year 2017 report to Congress. However, the 2018 WRDA provided that the projects identified for deauthorization in the Corps’ fiscal year 2017 report were generally not to be deauthorized unless they met certain additional requirements. The Corps allocates funding for Section 219 projects and other environmental infrastructure programs from the construction account. That account generally receives no-year appropriations through the Energy and Water Development Appropriations Act—meaning the appropriation remains available for obligation for an indefinite period of time. Prior to fiscal year 2012, the conference reports accompanying the annual Energy and Water Development Appropriations Acts generally listed individual Section 219 projects and specific allocations of funding for each project. However, since fiscal year 2012, Congress has not provided allocation direction for individual projects, but instead generally has designated an amount in reports and joint explanatory statements for environmental infrastructure overall, ranging from about $30 million to $55 million annually. According to Corps data, from fiscal years 1992 through 2017, the Corps expended over $440 million on Section 219 projects. Similar to other Civil Works projects, the Corps generally becomes involved in Section 219 projects when a nonfederal sponsor contacts the Corps for assistance on an authorized project. Corps districts gather additional information on the project from the nonfederal sponsor and determine if it is ready to be initiated. Once the Corps receives an appropriation from Congress, the agency decides whether to allocate funding to the project. If the project is selected to receive funding, it enters the preconstruction engineering and design phase. The purpose of this phase is to complete any additional planning studies and all of the detailed technical studies and designs—such as environmental impact studies—needed to begin construction. During this phase, the Corps also completes an environmental assessment of the proposed project. To initiate construction, the Corps and the nonfederal sponsor sign a project partnership agreement that specifies how the parties will collaborate, their respective roles and responsibilities, and the terms and conditions under which they will execute their responsibilities. The project partnership agreement typically requires the sponsor to provide without cost to the U.S. government all lands, easements, rights-of-way, relocations, and disposal areas necessary for the construction and subsequent maintenance of the project; maintain and operate the project after completion without cost to the provide cash or work-in-kind contributions to make the sponsor’s total contribution equal to 25 percent if the value of the sponsor’s land contribution does not equal or exceed 25 percent of the project cost. The Corps manages the construction phase, contracting out construction work to private engineering and construction contractors. Throughout the construction phase, the Corps oversees the contractors’ work, performing routine inspections to ensure it meets the Corps’ design and engineering specifications. During construction, the Corps, the nonfederal sponsor, and the private contractor typically appoint representatives to a project coordination team that meets regularly until the period of construction ends. Upon notification by the District Engineer that construction is complete, the nonfederal sponsor is responsible for operations and maintenance. Figure 1 shows the major steps in managing a Section 219 project. The Corps expended about $81 million on 29 Section 219 projects from fiscal years 2013 through 2017, which included various types of projects such as drinking water treatment and distribution, wastewater treatment, and stormwater management. Examples of these projects include the following: Drinking Water Treatment and Distribution. The Corps manages a Section 219 project that includes the development of water desalination infrastructure in various sections of the South Perris community, located east of Los Angeles, California. In general, the South Perris area relies on a mixture of groundwater and water imported from different sources, including the Colorado River. According to the Corps’ environmental assessment, various factors, such as drought, caused the community to supplement its drinking water supply through increased use of groundwater; however, the groundwater in the area historically contained high salt content. Since the project’s authorization in fiscal year 2001 through fiscal year 2017, the Corps has helped construct groundwater wells and pipelines, which connect to drinking water treatment facilities that reduce the amount of salt in the water (see fig. 2). According to the nonfederal sponsor for the South Perris project, the overall project has provided benefits such as creating a local potable water source to meet anticipated population growth and reducing the community’s dependence on imported water. Wastewater Treatment. The Corps manages a Section 219 project that includes the rehabilitation of sewer lines within the metropolitan area of St. Louis, Missouri. The city’s wastewater system dates back to the 1800s and lacks the capacity to handle large flows. From the project’s authorization in fiscal year 1999 through fiscal year 2017, the Corps has assisted the community, among other things, in sewer rehabilitation of deep tunnels. According to documentation from the Corps’ St. Louis District, the rehabilitation of sewers is important in protecting the health and safety of the public, given the risk of untreated sewage being discharged into the environment. Stormwater Management. The Corps manages a Section 219 project that involves the development of stormwater infrastructure, among other things, across a five-county region (Calumet region) in northern Indiana. For example, flooding is a widespread problem in the region and it has affected commercial corridors, including within Gary, Indiana. From the project’s authorization in fiscal year 1999 through fiscal year 2017, the Corps has been assisting the region with measures to alleviate flooding, such as constructing stormwater storage areas under the street (see fig. 2). According to a nonfederal sponsor we interviewed, the Corps’ efforts in the Calumet region have offered benefits to local communities by, among other things, improving storm drainage in an area that experienced flooding during heavy rainfall. The 29 Section 219 projects with expenditures from fiscal years 2013 through 2017 were located in different parts of the country and managed by six Corps divisions, although the majority of the projects were under the South Pacific Division (10 of the 29 projects) and Great Lakes and Ohio River Division (eight of the 29 projects). The five states with the largest number of projects during this period were California, with nine Section 219 projects; Virginia, with three Section 219 projects; and Michigan, Pennsylvania, and Mississippi, each with two Section 219 projects. These projects varied in terms of the geographic area covered, such as a city, county, or region (e.g., multiple counties). Based on the project descriptions we reviewed, 10 of the projects focused on the environmental infrastructure needs of cities, nine focused on counties and 10 on regions. Projects that cover a broad geographic area, such as those at the county or regional level, generally consist of different types of subprojects. For example, the Cook County, Illinois Section 219 project included several subprojects, such as the construction of water mains and sewer improvements in different areas across the county. Most of the Section 219 projects (24 of the 29 projects) were authorized in 2000 or earlier and were ongoing as of November 2018. Only one of the 29 projects was completed; the project in St. Croix Falls, Wisconsin, was completed in fiscal year 2014. For the St. Croix Falls project, the Corps assisted with improvements to a wastewater treatment plant, such as installing equipment to screen out large solids that otherwise would be released into the St. Croix River. Of the 28 remaining projects that were ongoing, as of November 2018, 17 were in the construction phase, and 11 were in the preconstruction engineering and design phase. Table 2 summarizes information on the 29 projects with expenditures from fiscal years 2013 through 2017 by division and district. See appendix I for additional information on each project, including a detailed description and the total amount of expenditures from fiscal years 2013 through 2017. As previously noted, the Corps spent about $81 million on these 29 Section 219 projects from fiscal years 2013 through 2017. During that period, expenditures by fiscal year ranged from about $11 million to $22 million. Divisions with the largest percentage of overall expenditures from fiscal years 2013 through 2017 were the South Atlantic Division (36 percent) and Mississippi Valley Division (25 percent). The divisions with the smallest percentage of overall expenditures during the period were the North Atlantic Division (less than 1 percent) and Southwestern Division (4 percent). Table 3 summarizes overall expenditures from fiscal years 2013 through 2017 by division and fiscal year. Of the 29 projects with expenditures from fiscal years 2013 through 2017, 15 projects expended less than $1 million each, representing a total of $2.3 million. The majority of these projects (10 of the 15 projects) were in the preconstruction engineering and design phase. For example, as part of the Cambria, California, project, the Corps expended about $244,000 on preconstruction engineering and design activities, such as evaluating the environmental impacts of constructing a seawater desalination facility. In addition, for the Cumberland County, Tennessee, project, the Corps expended about $261,000 on planning and design for water supply projects. In comparison, 14 of the 29 projects expended more than $1 million each over the same time period, representing a total of $78.2 million. In particular, the Corps spent over half of the funding during this time period on four projects: Calumet Region in Indiana; DeSoto County, Mississippi; Jackson County, Mississippi; and Lakes Marion and Moultrie in South Carolina (see fig. 3). These projects generally consisted of multiple subprojects and covered a wide geographic area. For example, the Calumet Region project has involved over 25 subprojects since its authorization in fiscal year 1999 through August 2018. Through these subprojects, the Corps has managed various activities, including replacing drinking water lines, improving wastewater treatment plants, and installing stormwater infrastructure in a number of cities across Indiana. Additionally, the Lakes Marion and Moultrie project in South Carolina has included a range of subprojects, such as construction of a water treatment plant, construction of a water tower, and installation of water transmission lines across six counties. The Corps generally follows its standard budget process for prioritizing funding for the Section 219 program. This process involves ranking Section 219 projects for funding by all three levels of the Corps’ organization—districts, divisions, and headquarters. District officials identify Section 219 projects, including subprojects, and other environmental infrastructure projects for potential funding; enter a numerical ranking for each project in the Civil Works Integrated Funding Database; and submit the information to the division through the database. Division officials receive the rankings from each of the multiple districts in the division. Division officials then re-rank the Section 219 and other environmental infrastructure projects from all of their districts against one another. Division officials enter the numerical ranking for all projects across all their districts into the Civil Works Integrated Funding Database and submit the information to headquarters through the database. Headquarters officials receive the rankings from each division. They re-rank the projects from all divisions against each other to generate the final nationwide rankings. Based on the final rankings, not all Section 219 and other environmental infrastructure projects that the divisions submitted will receive funding. Headquarters officials then determine a funding amount for each Section 219 project selected to receive funding and publish these decisions in the agency’s annual work plan. After headquarters publishes the annual work plan, headquarters officials begin to allocate funding to Section 219 projects. However, the Corps does not have written criteria to guide the ranking of Section 219 projects, in contrast to other types of projects. Specifically, in our December 2018 report, we found that the Corps uses written criteria—such as the rate of economic return, populations at risk, and economic impact—to prioritize funding for core mission areas, such as flood risk management and navigation projects. While Corps budget guidance indicates the criteria each core mission area should use in the ranking process, it does not specify criteria for Section 219 or other environmental infrastructure projects. In the absence of written criteria, Corps officials use their discretion on how to rank Section 219 projects for funding, according to Corps headquarters officials. When ranking Section 219 projects for funding, officials in each of the districts we interviewed generally consider whether Section 219 projects can be completed within the fiscal year. However, we found that the districts vary in terms of whether other factors are considered and what those factors are. Specifically, One district considers the level of congressional support and the potential public health impacts of the project. Another district considers the level of congressional support and the dollar value of the project. A third district only considers whether the project can be completed within the fiscal year. At the division level, officials we interviewed stated that they consider, among other things, the level of congressional support for the projects; however, to a large extent they rely on the rankings provided by their respective districts. Headquarters officials said that they primarily focus on ensuring that projects are geographically dispersed across the divisions when assigning final rankings for Section 219 projects. In recent years, congressional direction has indicated that the Corps, when allocating funding, is to consider giving priority for environmental infrastructure projects that have certain characteristics. For example, the Joint Explanatory Statement accompanying the Consolidated Appropriations Act in 2017 directed the Corps to consider characteristics such as projects: with the greater economic impact; in rural communities; in communities with significant shoreline and instances of runoff; in or that benefit counties or parishes with high poverty rates; and in financially distressed municipalities. Corps headquarters, division, and district officials we interviewed said that while they are generally aware of this congressional direction, they do not use it to guide the Section 219 ranking process. According to a division official, written criteria would be helpful for ranking projects across multiple districts and would clarify procedures for new staff. Officials we interviewed in the three districts said, in general, written criteria would clarify the ranking process. For example, one Corps district official stated that written criteria would provide standardization to the ranking process, ensuring that each district is focused on the highest priorities of the agency. According to Corps headquarters officials, although they see value in having written criteria to prioritize Section 219 funding, they have not developed such criteria because the agency considers Section 219 projects to be outside the agency’s core mission areas, such as flood control. According to a 2008 Corps report to Congress, “Funds provided to the Corps for wastewater treatment and municipal and industrial water supply projects necessarily reduce the amount of funds that instead could be used for the primary mission areas of the Corps. Thus, provision of Civil Works funding for these environmental infrastructure programs negatively affects the Corps’ ability to meet critical mission needs…such as restoring nationally significant ecosystems.” Headquarters officials confirmed that this report accurately reflects the agency’s current position. Corps officials also stated that developing written criteria has not been a priority because Section 219 projects represent a small percentage of the agency’s overall Civil Works budget. Federal standards for internal control states that agencies should use quality information to achieve their objectives by identifying information requirements. The federal standards also call for agencies to design control activities to achieve objectives and respond to risks, such as by clearly documenting internal control in management directives, administrative policies, or operating manuals. By establishing written criteria, the Corps would have greater assurance that its project selections align with a clear set of priorities, such as the characteristics identified in recent congressional direction for the agency to consider when selecting Section 219 projects for funding. Since the inception of the Section 219 program in 1992, the Corps has spent over $440 million on water infrastructure projects across its divisions and districts. However, the Corps has not developed written criteria for ranking Section 219 projects for funding as it has for other Civil Works programs within the agency’s core mission areas. Consequently, officials at the district, division, and headquarters levels are using their discretion regarding which factors to consider in ranking Section 219 projects for funding. Further, Congress has provided direction to the Corps on which characteristics to consider in prioritizing Section 219 funding; however, Corps officials stated that they do not use it to guide their ranking of Section 219 projects. By establishing written criteria, the Corps would have greater assurance that its project selections align with a clear set of priorities, such as the characteristics identified in recent congressional direction for the agency to consider when selecting Section 219 projects for funding. The Secretary of the Army should direct the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers to develop written criteria for ranking Section 219 projects for funding, taking into account a clear set of priorities, such as those identified by recent congressional direction. We provided a draft of this report to the Department of Defense for review and comment. In its written comments, reprinted in appendix II, the department concurred with our recommendation and described the actions they plan to take. Specifically, the Corps will develop and document a more rigorous set of priorities in line with those identified by recent Congressional direction. The department also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Appendix I: Description of U.S. Army Corps of Engineers Section 219 Projects and Expenditures from Fiscal Years 2013 through 2017 Project description as authorized by statute Water-related environmental infrastructure, Allegheny County, Pennsylvania. A combined sewer overflow treatment facility for the city of Atlanta, Georgia and watershed restoration and development in the regional Atlanta watershed including Big Creek and Rock Creek. Water-related infrastructure for the parishes of East Baton Rouge, Ascension, and Livingston, Louisiana. Water-related infrastructure projects in the counties of Benton, Jasper, Lake, Newton, and Porter, Indiana. Desalination infrastructure, Cambria, California. Water and wastewater infrastructure for the Contra Costa Water District, California. Water-related infrastructure and resource protection and development, Cook County, Illinois. Water supply projects in Cumberland County, Tennessee. Desert Hot Springs, California Resource protection and wastewater infrastructure, Desert Hot Springs, California. Wastewater treatment project in the county of DeSoto, Mississippi. Water supply and wastewater infrastructure projects in the counties of Accomack, Northampton, Lee, Norton, Wise, Scott, Russell, Dickenson, Buchanan, and Tazewell, Virginia. Water-related infrastructure and resource protection, including stormwater management, and development, El Paso County, Texas. Wastewater infrastructure assistance to reduce or eliminate sewer overflows, Genesee County, Michigan. Industrial water reuse project for the Harbor/South Bay area, California. Water infrastructure, Inglewood, California. Provision of an alternative water supply for Jackson County, Mississippi. Wastewater treatment and water supply treatment and distribution projects in the counties of Berkeley, Calhoun, Clarendon, Colleton, Dorchester, and Orangeburg, South Carolina. A project to provide water facilities for the Fox Field Industrial Corridor, Lancaster, California. Alleviation of combined sewer overflows for Lynchburg, Virginia, in accordance with combined sewer overflow control plans adopted by, and currently being implemented by, the non-Federal sponsor. Water-related infrastructure in the counties of Lackawanna, Lycoming, Susquehanna, Wyoming, Pike, Wayne, Sullivan, Bradford, and Monroe, Pennsylvania, including assistance for the Montoursville Regional Sewer Authority, Lycoming County, Pennsylvania. Project description as authorized by statute Water and wastewater infrastructure in Hancock, Ohio, Marshall, Wetzel, Tyler, Pleasants, Wood, Doddridge, Monongalia, Marion, Harrison, Taylor, Barbour, Preston, Tucker, Mineral, Grant, Gilmer, Brooke, and Ritchie Counties, West Virginia. A project to eliminate or control combined sewer overflows in the cities of Berkley, Ferndale, Madison Heights, Royal Oak, Birmingham, Hazel Park, Oak Park, Southfield, Clawson, Huntington Woods, Pleasant Ridge, and Troy, and the village of Beverly Hills, and the Charter Township of Royal Oak, Michigan. Recycled water transmission infrastructure, Eastern Municipal Water District, Perris, California. Alleviation of combined sewer overflows for Richmond, Virginia, in accordance with combined sewer overflow control plans adopted by, and currently being implemented by, the non-federal sponsor. San Ramon Valley, California A project for recycled water for San Ramon Valley, California. Water supply desalination infrastructure, South Perris, California. Wastewater infrastructure, St. Croix Falls, Wisconsin. Projects to eliminate or control combined sewer overflows in the city of St. Louis and St. Louis County, Missouri. Anne-Marie Fennell, (202) 512-3841 or fennella@gao.gov. In addition to the contact named above, Vondalee R. Hunt (Assistant Director), Anthony C. Fernandez (Analyst-In-Charge), Patricia Moye, Gloria Ross, and Sheryl Stein made significant contributions to this report. Important contributions were also made by Patricia Donahue, Tim Guinane, Susan Murphy, Sara Sullivan, Kiki Theodoropoulos, and Walter Vance.", "summary": "Under Section 219 of the 1992 Water Resources Development Act, as amended, Congress authorized the Corps to provide assistance for the design and construction of environmental infrastructure projects, known as Section 219 projects. Such projects include the development of water transmission lines. Congress typically provides a lump sum appropriation for the Corps' construction account, out of which Section 219 and other environmental infrastructure projects are funded. GAO was asked to review projects carried out under the Section 219 program. This report examines (1) the number and type of Section 219 projects and expenditures from fiscal years 2013 through 2017, and (2) how the Corps prioritizes funding for Section 219 projects. GAO reviewed relevant federal laws and agency guidance; analyzed agency data for fiscal years 2013 through 2017, the most recent time period for which data were available; and interviewed agency officials at headquarters, three divisions, and three districts–selected based on geographic distribution and the amount of Section 219 project expenditures. From fiscal years 2013 through 2017, the most recent available data, the U.S. Army Corps of Engineers (Corps) spent approximately $81 million on 29 Section 219 projects to develop drinking water, wastewater, and stormwater infrastructure. For example, through the St. Croix Falls, Wisconsin Section 219 project, the Corps assisted with improvements to a wastewater treatment plant. Of the 29 projects, the Corps spent over half of the funding during this period on four projects: (1) Calumet Region, Indiana; (2) Desoto County, Mississippi; (3) Jackson County, Mississippi; and (4) Lakes Marion and Moultrie, South Carolina. The Corps generally follows its standard budget prioritization process—which involves districts, divisions, and headquarters ranking each project and headquarters making final funding decisions—to prioritize Section 219 funding. However, the Corps has not developed criteria to guide this process. GAO found the Corps varies in the factors it uses to rank Section 219 projects. For example, one district considers whether a project can be completed within the fiscal year, while another considers the level of congressional support and dollar value of the project. Headquarters officials said the agency views Section 219 projects as outside its core mission areas and therefore has not developed written criteria. Congressional direction has indicated that the Corps is to consider characteristics—such as projects with the greater economic impact—in prioritizing Section 219 project funding. While aware of this direction, Corps officials said they do not consider it when ranking projects. Federal standards for internal control states that agencies should use quality information to achieve their objectives. By establishing written criteria, the Corps would have greater assurance that its Section 219 project selections align with a clear set of priorities, such as those identified by recent congressional direction. GAO recommends that the Corps develop written criteria for ranking Section 219 projects for funding, taking into account a clear set of priorities, such as those identified by recent congressional direction. The agency concurred with the recommendation.", "document_type": "gao"}
{"report": "OECA has a range of compliance monitoring, compliance assistance, and enforcement tools available to elicit compliance with laws and regulations from regulated entities, as shown in table 1. Enforcement actions can result in, among other things, the imposition of penalties, requirements to remedy the violation of law or regulation, or both. OECA has developed policies and guidance for EPA staff that describe the agency’s recommended responses to noncompliance based on a number of factors and the escalation of enforcement responses to continuing noncompliance. EPA guidance on informal and formal enforcement actions provides an example related to the Resource Conservation and Recovery Act. In that example, if a regulated entity does not return to compliance or notify the state or EPA that it cannot return to compliance within a certain number of days after an informal enforcement action, the state or EPA may take a formal enforcement action. Generally, according to this same 2010 EPA guidance, informal enforcement actions address small or isolated problems, and formal enforcement actions can address bigger problems. OECA stores and manages a range of compliance monitoring and enforcement data in ICIS. For example, ICIS includes descriptive information about regulated entities, violations, and the outcome of enforcement actions. ECHO, the public access website that integrates data from multiple agency databases, has an internal component for staff and other federal agencies and publicly available components. Staff in EPA’s 10 regional offices, OECA headquarters staff, and states input data into ICIS, which feeds data into ECHO. Regional office staff and OECA headquarters staff also use statute-specific databases to maintain data on compliance with a particular law or office-specific databases built to maintain data, according to the preferences of a particular regional or headquarters office. EPA requires regional offices to collect and enter a range of information on its compliance monitoring and enforcement activities—such as permit, inspection, and violations data—into the agency’s national databases. The agency uses these data to manage its oversight efforts and assess how well the efforts are meeting the agency’s strategic objectives. In addition, EPA is piloting an effort to collect data on coordination with states. However, EPA regional offices do not consistently collect or maintain data on informal enforcement actions. In addition, EPA does not require regional offices to collect and maintain data on their compliance assistance activities; therefore, it has no requirements for regional offices to enter data into the agency’s national databases. EPA requires regional offices to collect information from various data sources and enter it into national databases to monitor regulated entities’ compliance with environmental laws and track the agency’s enforcement actions. The information generally includes permit data on limits on emissions or for discharge of pollutants into waters, inspection or other evaluation data, violations data (e.g., failure to take or submit results for drinking water samples); informal enforcement actions, and formal enforcement actions, as shown in figure 1. OECA uses the data in its databases to manage the overall enforcement and compliance program and assess how well its efforts are meeting the objectives outlined in the agency’s strategic plan, according to EPA officials. For example, officials in one regional office told us that regional managers typically review ICIS data (for example, the number of inspections conducted) to monitor their progress toward meeting strategic objectives at the regional level. These regional officials said that staff in their office conduct monthly reviews of ICIS data to understand how their current efforts on certain indicators compare to prior years. OECA headquarters officials told us that the agency had begun to pilot a mechanism to collect data that can help measure agency progress in coordinating with states, one of the agency’s strategic objectives. Specifically, OECA officials told us that in 2018 the agency began a pilot effort to track instances in which regional office staff provide assistance with state enforcement actions, also characterized as “state assists.” According to agency guidance issued in June 2019, a state assist is defined as any instance in which the state could not or would not take the action without OECA’s help or any instance in which a state explicitly requests that OECA take over a case after OECA has identified a violation. During the pilot effort, state assists are documented as such when a regional office has expended substantial resources to identify a violation, develop the injunctive relief, or help the state take an action to obtain a remedy for the violation. According to OECA guidance, the pilot effort, which OECA officials expect to continue through 2021, will help the agency better track its efforts in this area. As of June 2019, according to our analysis of written responses, officials in eight of the 10 regional offices described having documented a state assist as defined by OECA. For example, officials in one regional office stated in their written response to our questions that one specific case against a company located in three different states would have been handled by the regional office. Instead, the regional office agreed to let two of the states take the lead for the cases in those states, and the regional office handled the case in the third state and documented this as two state assists. OECA collects data on some informal enforcement actions, such as the number of warning letters sent to regulated entities, but EPA regions do not always collect data about these actions, according to EPA headquarters officials. As a result, the data do not tell the full story of OECA’s enforcement efforts, according to OECA’s Assistant Administrator in testimony during a February 26, 2019, congressional hearing. Furthermore, OECA headquarters officials we interviewed said that data on EPA and state informal enforcement actions are incomplete in EPA’s ECHO website in part because EPA policy and related guidance for each of the various programs defines informal enforcement differently and these definitions can differ from the definitions in ECHO. In a 2010 document, EPA explained how the various agency policy guidance and ECHO define formal and informal enforcement actions differently. For example, the document states that policy guidance for the Clean Air Act defines notices of violation as formal enforcement actions, but that policy guidance for the Clean Water Act and the Resource Conservation and Recovery Act defines notices of violation as informal enforcement actions. Similarly, this same 2010 document states that administrative penalty orders of field citations are considered informal enforcement actions in the policy guidance for the Clean Water Act, but formal enforcement actions in the policy guidance for the Clean Air Act and Resource Conservation and Recovery Act. In addition, the document states that ECHO characterizes notices of violations under the Clean Air Act as informal enforcement actions even though the policy guidance defines them as formal enforcement actions. OECA headquarters officials highlighted two issues that affect the agency’s ability to consistently maintain data on informal enforcement actions: (1) using different definitions of informal enforcement actions across programs and (2) maintaining data on such actions inconsistently. OECA headquarters officials said that they were addressing the first issue of not having one clear definition of informal enforcement actions that applies across all of the air, water, and hazardous waste programs. In September 2019, OECA headquarters officials said EPA was finalizing a single definition of informal enforcement actions for the purpose of collecting more consistent information. In January 2020, EPA provided us with a September 30, 2019, memorandum that defines enforcement response tools, including a definition of informal enforcement action across all programs. Regarding maintaining data inconsistently, while most of the regional offices collect data on some informal enforcement actions, they use different mechanisms to maintain these data. According to our analysis of written responses, officials in nine of the 10 regional offices stated that their offices collect data on some informal enforcement actions such as warning letters, notices of noncompliance, notices of violation, and notices of determination. However, the officials described using different mechanisms for maintaining the data they collect on informal enforcement. For example, officials in five of the nine regional offices that collect data on some informal enforcement actions stated that they maintain the data in ICIS. As we described, ICIS data feeds into ECHO, which has components available to the public. In three of the nine regional offices that collect data on some informal enforcement actions, staff collect data on such actions in a database other than ICIS, such as a statute- or office-specific database, according to our analysis of written responses. Finally, one of the nine regional offices that collect data on some informal enforcement actions maintains those data in paper records, according to an official in that office. In our October 2017 report on key considerations for agency enforcement decisions, we reported that transparency and availability of data are important to promoting compliance and achieving regulatory objectives. As described earlier, EPA changed the focus of its national priorities from enforcement to compliance and increased its use of informal enforcement actions to achieve its regulatory objectives. Having complete information about informal enforcement actions is essential because EPA has elevated the role of such activities in its overall enforcement efforts. EPA often works informally with regulated entities to help them comply with environmental laws and regulations, according to its 2018 EPA Enforcement Annual Results report. However, the agency does not have complete information on those actions for evaluating its compliance monitoring and enforcement performance. Moreover, more complete and consistent information about OECA’s informal enforcement actions would provide a fuller picture of EPA’s overall enforcement efforts. This, in turn, would better enable EPA and OECA to assess whether they are achieving the agency’s regulatory objectives and improve the transparency of OECA’s informal enforcement actions for Congress and the public. Guidance can help agencies communicate expectations and ensure consistency with a standard. While EPA has issued guidance on how various agency policies and ECHO define formal and informal enforcement actions, the agency has not provided guidance to regional offices on how they should collect or maintain data on informal enforcement actions. According to federal standards for internal control, management should design control activities to achieve objectives and respond to risks, such as by clearly documenting internal control in management directives, administrative policies, or operating manuals. On September 30, 2019, EPA issued a memorandum that provides definitions for enforcement response tools, including informal enforcement actions, and instructions on how to report such actions. Now that the agency has finalized its definition of informal enforcement actions and specified which mechanisms to use to maintain data on such actions, by clearly documenting in guidance to the regional offices how they should use the definition to collect data on these actions, EPA would have better assurance that the regional offices consistently collect and maintain these data. According to EPA headquarters officials, OECA stopped requiring regional offices to collect data and report on their compliance assistance activities around 2012. Prior to that time, each regional office had a full- time staff member dedicated to coordinating compliance assistance activities, according to these officials. However, the staff member’s activities were the only compliance assistance data that regional offices collected and maintained. EPA officials stated that the regional offices stopped collecting the compliance assistance activities associated with this position when the agency redirected the funding for the full-time staff position to compliance monitoring and other enforcement efforts. As a result, EPA officials told us that the agency does not have consistent data about its compliance assistance activities. EPA officials told us that the agency made a policy decision to stop dedicating funding to compliance assistance but encouraged staff to continue conducting compliance assistance activities as part of the agency’s outreach for other programs. EPA headquarters officials said that as of September 2019, the agency had no plans to require regional offices to collect and report data on compliance assistance. However, according to these officials, although the agency stopped funding the compliance assistance coordinator position, regional staff continue to conduct a range of compliance assistance activities as part of their regular enforcement duties. Figure 2 shows the types of compliance and enforcement data that EPA collects, including that the agency does not require regional offices to collect information about compliance assistance. According to our analysis of written responses, officials in nine of the 10 regional offices reported that they collect some data on the compliance assistance activities their offices conduct. Officials in one office said that they do not collect data on compliance assistance activities because it is not required. The types of data on compliance assistance that the nine regional offices collect and the methods those offices use for maintaining the data differ, according to our analysis of written responses. For example, some regional officials described collecting data on compliance assistance provided over the telephone, and other officials described collecting data on on-site compliance assistance provided during inspections. According to our analysis of written responses, officials in two regional offices described providing on-site compliance assistance for minor issues during inspections and tracking the number of times such assistance was provided. Officials in the nine regional offices that still collect data on some compliance assistance activities described storing the data differently, either in region-specific databases or in paper files. Officials in two of these regional offices said that regional staff decide how to document telephone calls from regulated entities for assistance. Officials in one region stated that they no longer conduct large-scale compliance assistance activities such as conducting workshops or developing informational materials because EPA eliminated the reporting requirement. Having complete information about its compliance assistance activities is essential because EPA has elevated the role of such activities in its overall enforcement efforts. However, EPA does not have complete information on its compliance monitoring and enforcement activities, partly because the agency does not require the collection of data on compliance assistance activities. EPA’s lack of complete information on its compliance assistance activities is inconsistent with its change in policy. In addition, in our October 2017 report on key considerations for agency enforcement decisions, we reported that transparency and availability of data are important to promoting compliance and achieving regulatory objectives. Having complete information about its compliance assistance activities may provide more complete information on those activities for evaluating its compliance monitoring and enforcement performance. As discussed earlier, most of the regional offices continue to collect some information on compliance assistance even though they are not required to do so and use varying mechanisms to maintain the information. Because EPA does not direct the regional offices to collect data on compliance assistance activities, the agency would not have issued guidance instructing regional offices to collect such data and specifying which mechanism to use to maintain them. However, according to federal standards for internal control, management should design control activities to achieve objectives and respond to risks, such as by clearly documenting internal control in management directives, administrative policies, or operating manuals. Without clearly documenting in guidance to the regional offices that they should collect data on compliance assistance activities and specifying which mechanism to use to maintain the data, such as ICIS, EPA will not have the information it needs to track progress toward its strategic objective of increasing the agency’s use of compliance assistance activities to help regulated entities comply with laws and regulations. EPA communicates the results of its compliance monitoring activities and enforcement actions by making data available to the public and Congress through its website and annual reports. EPA’s ECHO website allows the public to view data over time, such as the number of facilities inspected by an authorized state or EPA from fiscal years 2011 to 2019. To help the public understand the data presented on its ECHO and other websites, EPA websites list a number of national and state-specific known data limitations concerning the data collected for its environmental programs. For example, the ECHO website identifies whether certain years of data are not appropriate for analyzing trends, such as its data on penalties under the Clean Water Act prior to 2015. EPA issues annual performance reports that include data on compliance monitoring and enforcement to fulfill requirements under the Government Performance and Results Act and other requirements. These reports describe progress toward the three strategic goals and related objectives in EPA’s Fiscal Year 2018-2022 Strategic Plan. In addition, since 2017, EPA has published a Year in Review report that outlines the agency’s accomplishments, including in the area of enforcement, using data on its compliance and enforcement actions to present the results of its efforts. In addition, at the end of each fiscal year, OECA publishes a Fiscal Year EPA Enforcement and Compliance Annual Results report and companion data graphs that provide enforcement data over a selected time period on such topics as the number of EPA inspections conducted, cases initiated, and value of fines and penalties collected. Environmental groups and media outlets have used EPA’s data to develop analyses, conclusions, and inferences about changes in EPA’s enforcement results. In December 2018, we reported that providing information about a dataset—for example, known limitations of the data in that dataset— allows users to determine whether the database is suitable for their intended purpose and make informed decisions about whether and how to use it. For example, EPA’s 2000 EPA Quality Manual for Environmental Programs states that published reports with environmental data shall be accompanied by a readily identifiable section or appendix that discusses the quality of the data and any limitations on the use of the data with respect to their original intended application. It also states that the agency’s reports should include applicable statements about possible misuse of the data for other purposes. EPA’s Fiscal Year 2018 Annual Performance Report includes a link to companion reports on its website that describe, among other things, the sources of the data used in the report and the known limitations of those data. Specifically, the companion reports include information such as the definition of terms used, units of measurement, data sources, method for analyzing the data, and the known limitations of the data. However, neither of EPA’s other 2018 annual reports we reviewed fully disclosed known limitations to the data the agency included in each report: Year in Review 2018. OECA’s Year in Review 2018 report, the most recent report available at the time of our review, includes a range of data—such as number of actions taken, monetary results, the reduction of emissions in tons, and data over selected time periods— to accompany its statements about the agency’s accomplishments. However, the report does not include any information about data sources or known limitations of the data. Fiscal Year 2018 EPA Enforcement and Compliance Annual Results. EPA’s Fiscal Year 2018 EPA Enforcement and Compliance Annual Results report, also the most recent at the time of our review, includes data sources and some known limitations of the data. For example, the report states that the data on results do not include state and local inspections or enforcement actions. Additionally, the report includes statements about changes in how the agency stores data that may prevent the data from being comparable across years. The report lists the various sources of the data used to create the report’s charts and graphs. EPA has published known limitations of these data on its ECHO website and indicated that broad data issues may affect the completeness, timeliness, or accuracy of the data in its various systems. However, based on our review of the report, it does not include information about known limitations of all of the data in the report. In addition, neither the Year in Review 2018 report nor the Fiscal Year 2018 EPA Enforcement and Compliance Annual Results report includes a readily identifiable section or appendix that discusses the known limitations of the data, as called for by leading practices for transparently reporting government data and as exemplified in EPA’s manual governing environmental data quality. In commenting on our assessment of the annual reports, EPA officials did not provide a reason why the reports do not discuss known data limitations but told us in a prior meeting that the current documentation on the ECHO website includes the current known data limitations. Furthermore, EPA’s Fiscal Year 2018 EPA Enforcement and Compliance Annual Results report does not fully describe how the data in the report should be interpreted given the known data limitations the report contains. For example, the 2018 annual results report provides a partial picture of overall enforcement of environmental laws because the data exclude state enforcement actions. In addition, for the yearly data across years (2008 through 2018 or 2012 through 2018), EPA does not fully provide information on any limitations in how the data should be analyzed; for example, whether the data are appropriate for the purpose of identifying trends or providing a snapshot of an activity for a single year. EPA does, however, include information on the impact of one or two large cases on the data presented for some data in the report such as the volume of contaminated soil and water to be cleaned up or the treatment and disposal of hazardous and nonhazardous waste. In our November 2019 report on data transparency, we concluded that without the transparent disclosure of known data limitations, users may view or analyze data without full knowledge of the extent to which the data are timely, complete, accurate, or comparable over time. Our November 2019 report also concluded that this could lead users to inadvertently draw inaccurate information or conclusions from the data. OECA’s Assistant Administrator has discussed the known limitations of EPA’s data in the annual reports. In a February 26, 2019, testimony before Congress, OECA’s Assistant Administrator stated that the averages for some of the metrics used in EPA’s annual results report cannot be interpreted to represent a statistical trend. OECA’s Assistant Administrator also stated that changes in the number of enforcement actions may be a function of changes in programmatic decisions and may not be reflective of changes in the underlying compliance of regulated entities with environmental statutes. By including the known limitations of data in its annual reports and providing information on the intended use of EPA’s data, as called for by leading practices for transparently reporting government data and as exemplified in existing EPA guidance for environmental data, EPA would have better assurance that Congress and the public are informed about the data presented and how the data should be interpreted. EPA collects a range of information and uses the information to manage its enforcement and compliance program and assess how well its efforts are meeting the objectives outlined in the agency’s strategic plan and other documents. However, while most of the regional offices collect data on some informal enforcement actions, they use different mechanisms to maintain these data, and the agency has not provided guidance to regional offices on how they should collect or maintain the data. Without documenting in guidance to the regional offices how they should collect data on informal enforcement actions and specifying which mechanism to use to maintain the data, EPA lacks assurance that the regional offices will consistently collect and maintain these data. On September 30, 2019, EPA issued a memorandum that provides definitions for enforcement response tools, including informal enforcement actions and instructions on how to report such actions. We view this as a step in the right direction. Now that the agency has finalized its definition of informal enforcement actions and provided instructions on how regional offices should report such actions, by clearly documenting in guidance on how regional offices should use the definition to collect data on these actions, EPA would have better assurance that the regional offices consistently collect and maintain these data. Similarly, EPA does not have complete information on its compliance monitoring and enforcement activities because the agency does not require the collection of data on compliance assistance activities. As a result, the agency has not issued guidance instructing regional offices to collect such data and specifying which mechanism to use to maintain them. Without clearly documenting in guidance to the regional offices that they should collect data on compliance assistance activities and specifying which mechanism to use to maintain the data, such as ICIS, EPA will lack key information. Such information is needed to track progress toward its strategic objective of increasing the agency’s use of compliance assistance activities to help regulated entities comply with laws and regulations. While EPA communicates the results of its compliance monitoring activities and enforcement actions through its website and annual reports, neither of its 2018 annual reports includes a readily identifiable section or appendix that discusses the known limitations of the data. The 2018 annual results report also does not fully describe how the data in the report should be interpreted, given the known data limitations the report contains. By including the known limitations of the data in its annual reports and providing information on the intended use of EPA’s data, EPA would have better assurance that Congress and the public are informed about the data presented and how the data should be interpreted. We are making the following three recommendations to EPA: The Assistant Administrator for EPA’s Office of Enforcement and Compliance Assurance should clearly document in guidance to the regional offices how they should use the definition of informal enforcement actions to collect data on these actions. (Recommendation 1) The Assistant Administrator for EPA’s Office of Enforcement and Compliance Assurance should clearly document in guidance to the regional offices that they should collect data on compliance assistance activities and specify which mechanism to use to maintain the data, such as ICIS. (Recommendation 2) The Assistant Administrator for EPA’s Office of Enforcement and Compliance Assurance should include the known limitations of data in its annual reports and provide information on the intended use of EPA’s data. (Recommendation 3) We provided a draft of this report to EPA for review and comment. In its written comments, reproduced in appendix I, EPA stated that it agreed with all three of our recommendations and many of our findings and conclusions. EPA also provided technical comments, which we incorporated into the report, as appropriate. In response to our first recommendation to clearly document in guidance how regional offices should use the definition of informal enforcement to collect data on these actions and specify a mechanism to maintain the data, EPA said that the agency issued a September 30, 2019, memorandum for headquarters and regional enforcement offices to implement. This memorandum provides guidance on EPA definitions for enforcement response tools, to promote consistency and clarity in the use of enforcement terms, according to EPA. EPA also said that the guidance defines “informal enforcement action.” The guidance includes instructions on how to report such actions. The guidance states that, with two exceptions, headquarters and regional offices are expected to report, in ICIS, all informal enforcement actions across all programs that meet the new definition. In addition, the guidance states that because it is only a definitional document and does not include guidance on appropriate use of the enforcement response policy tools, the agency will work to identify the specific changes in practice needed (i.e., changes in use and reporting). The guidance states that EPA anticipates that informal enforcement actions meeting the new definition will be included in the agency’s certified annual enforcement results beginning in fiscal year 2020. We view EPA’s guidance as a step in the right direction, and the guidance states that EPA will provide training and additional guidance for enforcement staff to ensure consistent implementation across regional offices and headquarters. Additional guidance will provide EPA with an opportunity to specify how regional offices are to use the definition of informal enforcement to collect data on these actions. We modified our recommendation because EPA’s recent guidance specifies mechanisms for EPA employees to maintain data on informal enforcement actions. In response to our second recommendation to clearly document in guidance that regional offices should collect data on compliance assistance activities and specify a mechanism to maintain the data, EPA said that it would collect data on compliance assistance for each of the National Compliance Initiatives and maintain those data in ICIS. In response to our third recommendation to include known data limitations in annual reports and provide information on intended use of its data, EPA stated that it acknowledges the importance of providing information about a dataset to facilitate proper interpretation. For that reason, EPA said that, in time for its fiscal year 2020 report, the agency will create a webpage to describe how best to interpret the data presented in the agency’s Fiscal Year EPA Enforcement and Compliance Annual Results report and include a reference to that webpage in the report itself as well as the Year in Review report. In technical comments related to our third recommendation, EPA stated that several of the limitations we identified in the report do not affect the data included in its Fiscal Year EPA Enforcement and Compliance Annual Results report. In considering EPA’s technical comments, we modified the text of the report concerning examples of the annual report’s data limitations, as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Administrator of EPA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In addition to the contact named above, Chad M. Gorman (Assistant Director); Tahra Nichols (Analyst in Charge); Mark Braza; Courtney Carroux; Tara Congdon; Jazzmin Cooper; Matthew Hunter; Caroline Prado; Dan Royer; Jeanette Soares; Kiki Theodoropoulos, Sonya Vartivarian, and Michelle R. Wong made key contributions to this report.", "summary": "Enforcing environmental laws and regulations, including those governing water, air, and hazardous waste, is a central part of EPA's mission. In partnership with states, EPA oversees compliance with these requirements for about 800,000 regulated entities, such as refineries and sewage treatment plants. OECA carries out much of EPA's compliance and enforcement responsibilities through the agency's 10 regional offices. OECA has a range of compliance assistance, compliance monitoring, and enforcement tools available to elicit compliance with laws and regulations from regulated entities. These tools include conducting on-site inspection, training staff and providing technical assistance, developing cases, and issuing warning letters. GAO was asked to review EPA's enforcement efforts. This report examines, among other objectives, the types of information EPA collects on its compliance assistance, compliance monitoring, and enforcement actions. GAO analyzed written responses to its questions from all 10 regional offices, reviewed agency documents and databases, and interviewed EPA officials in headquarters and regional offices. The Environmental Protection Agency (EPA) collects a range of information on compliance and enforcement such as data on inspections, violations, and enforcement actions. The agency uses these data to manage its efforts and assess progress in meeting the agency's strategic objectives. In an August 2018 memorandum, EPA's Office of Enforcement and Compliance Assurance (OECA) reported a key strategic change to increase compliance assistance activities (e.g., training) and informal enforcement actions (e.g., warning letters). However, the agency does not consistently collect or maintain data on either type of action (see figure). Specifically, OECA has not directed regional offices to collect or report data on compliance assistance activities since 2012 and, consequently, does not have guidance instructing regional offices to collect such data and specifying which mechanism offices should use to maintain these data. Also, the agency did not provide guidance to those offices defining informal enforcement actions or how to maintain data on them until September 30, 2019, but the guidance does not specify how to collect data on such actions. By clearly documenting in guidance how the offices should use the definition to collect data on such actions, EPA could more consistently collect these data. As the figure shows, OECA does not require regional offices to collect data on compliance assistance or complete data on informal enforcement actions. Having complete information about its compliance assistance activities and informal enforcement is essential because EPA has elevated the role of such activities in its overall enforcement efforts. However, because EPA is not consistently collecting these data, the agency cannot be sure it is achieving its strategic objectives. EPA would have better assurance it has the information it needs by clearly documenting in guidance to the regional offices that they should: collect data on compliance assistance activities and informal enforcement actions and specify which mechanism to use to maintain compliance assistance data. By doing so, EPA would have better assurance that the regional offices consistently collect and maintain these data in order to track progress toward the agency's strategic objective of increasing the use of such activities and actions. GAO is making three recommendations to EPA, including that it should clearly document in guidance to its regional offices that they should collect data on compliance assistance activities and informal enforcement actions and specify which mechanism to use to maintain compliance assistance data. EPA agreed with GAO's recommendations and stated that the agency has either begun to or plans to implement them.", "document_type": "gao"}
{"report": "The Goldwater-Nichols Department of Defense Reorganization Act of 1986, in part, was intended to improve joint officer management policies, otherwise enhance the effectiveness of military operations, and improve DOD’s management and administration. With the Goldwater-Nichols Act, Congress also intended to, consistent with the congressional declaration of policy in section 2 of the National Security Act of 1947 and among other things, reorganize DOD and strengthen civilian authority in DOD. The Goldwater-Nichols Act, as amended, also: established various joint officer management policies, including requiring JPME for certain joint assignments and promotion categories; required officers to successfully complete an appropriate program at a JPME school, among other things, to be designated as joint qualified—a prerequisite for promotion to brigadier general or rear admiral lower half rank except under certain circumstances; and required the Secretary of Defense, with the advice and assistance of the Chairman of the Joint Chiefs of Staff, to periodically review and revise the curriculum of JPME schools to enhance the education and training of officers in joint matters. In addition, the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005 required the Secretary of Defense to implement a comprehensive framework for officer JPME. The PME continuum consists of five military educational levels that correspond to the five phases of a military officer’s career: (1) precommissioning, (2) primary, (3) intermediate, (4) senior, and (5) general/flag officer. As figure 1 indicates, intermediate- and senior-level PME and JPME programs—the focus of our review—are designed for officers at pay grades O-4 through O-6. As identified in figure 2 below, the military services’ intermediate- and senior-level PME programs tailor curricula according to their respective services’ needs. For example, the Army, Navy, and Marine Corps PME programs focus on land, maritime, and maneuver warfare, respectively. Further, the Chairman’s instruction concerning officer PME and JPME (hereinafter referred to as the Officer Professional Military Education Policy, or “OPMEP”) requires that JPME be integrated across a diverse array of academic topics, including history and political science, and, where appropriate, be offered in conjunction with PME. Collectively, PME and JPME prepare officers, throughout their careers, to increase their knowledge and develop the necessary skills to operate in joint environments, such as a combatant command. PME and JPME also are offered through distance learning and satellite education programs for non-resident students. The OSD, Chairman, and military services are responsible for overseeing the services’ PME and JPME programs. OSD: Within OSD, the Secretary of Defense has delegated responsibility for, among other things, military readiness, total force management, and military and civilian personnel training to the Under Secretary of Defense for Personnel and Readiness. Under DOD Directive 5124.02 the Under Secretary is responsible for, among other things, developing education policies, plans, and programs for the education of all DOD personnel, including PME and JPME programs. Within OUSD(P&R), the Deputy Assistant Secretary of Defense for Force Education and Training (DASD(FE&T)) was established in 2015. The DASD(FE&T) is responsible for developing policies, plans, programs, budgets, and other activities necessary to develop, guide, measure, implement, assess, and oversee all aspects of education and training for military personnel following basic officer and enlisted training, which includes PME and JPME programs. The USD(Comptroller) is the principal staff assistant and advisor to the Secretary of Defense on budgetary and financial matters. The USD(Comptroller) focuses on budgetary formulation and execution; financial management and oversight; and accounting policy; among other things. The USD(Comptroller), among other things, directs the formulation and presentation of DOD budgets; and establishes and supervises the execution of uniform DOD policies, principles, and procedures, including terminologies and classifications, as necessary for certain budgetary and financial matters. Chairman: With the advice and assistance of the Chairman, the Secretary of Defense periodically reviews and revises the JPME curriculum to enhance the education and training of officers in joint matters. The OPMEP outlines the Chairman’s roles and responsibilities as they relate to PME and JPME. According to the OPMEP, the Chairman formulates polices for coordinating military education and advises and assists the Secretary of Defense through the designation and certification/accreditation of JPME. The Chairman accredits military service programs through periodic Process for the Accreditation of Joint Education (PAJE) reviews. Further, the Joint Staff Directorate for Joint Force Development is responsible for, among other things, reviewing the Chairman’s PME policies, overseeing the Military Education Coordination Council, and coordinating PAJE reviews. Military services: The military services provide PME to develop officers with expertise and knowledge appropriate to their grade, branch, and occupational specialty. Each military service is responsible for funding, developing curriculum for, and administering their respective PME programs. In addition, for programs accredited to award JPME, each military service is responsible for meeting the Chairman’s PAJE accreditation requirements and providing qualified military students and faculty to the other military services’ PME programs in accordance with the OPMEP. Membership on PAJE teams, which accredit military services’ PME programs, will be tailored to provide the appropriate balance of expertise in JPME learning areas, objectives, criteria, and standards. All of the military services’ intermediate- and senior-level PME programs are accredited to award master’s degrees. Each program undergoes a Department of Education-governed civilian accreditation process generally every 10 years, depending on the accreditor and the program. Civilian accreditation for the military services’ PME programs occurs at the institution level and includes multiple programs. For example, the civilian accreditation of Marine Corps University includes the Marine Corps’ intermediate- and senior-level PME programs, as well as other programs such as its School for Advanced Warfighting. According to PME program and civilian accreditation officials, the civilian accreditation process starts with the institution conducting a detailed self-evaluation of its performance, and preparing and providing a self-evaluation report to the accreditation officials. This is followed by a site visit by the accreditation officials and a report describing the institution’s compliance with applicable academic quality standards. The accreditation process concludes with the accreditor’s decision on the institution’s accreditation status. Table 1 shows when each of the military services’ intermediate- and senior-level PME program was last accredited (at the institutional- level) for civilian accreditation. Accreditation bodies assess academic quality by applying and enforcing standards in the following areas required, generally, by the Department of Education: (1) success with respect to student achievement; (2) curricula; (3) faculty; (4) facilities, equipment, and supplies; (5) fiscal and administrative capacity; (6) student support services; (7) recruiting and admissions practices; (8) measures of program length and objectives of the degrees or credentials offered; (9) record of student complaints received by, or available to, the accreditation body; and (10) record of compliance with certain federal student loan program responsibilities. Within these areas, civilian accreditation bodies develop their own accreditation standards, which can vary (see table 2). The military services’ intermediate- and senior-level PME programs are assessed against the applicable accreditation standards to enable the PME programs to award master’s degrees. There is no Chairman or OSD requirement for the military services’ PME programs to have civilian accreditation status, but officials reported several benefits related to civilian accreditation. Specifically, DOD and civilian accreditation officials stated that civilian accreditation provides additional assurance from a recognized external authority that the military services’ PME programs are meeting educational standards required of DOD and non-DOD programs alike. In addition, we previously reported that the U.S. accreditation system’s use of peer review offers the relevant expertise to assess academic quality and provides institutions with feedback for improvement as a key strength of the system. Furthermore, DOD officials said that the ability to award master’s degrees from an accredited program helps the programs attract and retain high- quality faculty. All of the military services’ PME programs have been accredited by the Chairman to award JPME credit. The OPMEP outlines the JPME program accreditation requirements and processes that are to occur at least every 6 years. DOD’s process for accrediting the military services’ JPME programs is through the Chairman’s PAJE. The PAJE is based on accepted civilian accreditation standards and practices. According to the OPMEP, the PAJE serves three purposes: (1) oversight, (2) assessment, and (3) improvement. Once JPME programs are initially accredited, accreditation is reaffirmed through subsequent PAJEs every 6 years. In advance of a PAJE accreditation, the military service PME program submits an OPMEP-required self-assessment, which the PAJE team reviews prior to conducting the on-site accreditation. The PAJE team prepares a report on its findings, and includes a full, conditional, or no accreditation determination. PME programs receiving a conditional accreditation or reaffirmation must demonstrate improvements in particular areas within a specific timeframe in order maintain their accreditation. Any program that fails to achieve accreditation, reaffirmation, or conditional accreditation/reaffirmation is no longer a JPME provider. According to the OPMEP, accreditation or reaffirmation is awarded when programs are judged satisfactory overall and have no significant weaknesses. Table 3 shows the date of the most recent JPME accreditation for each of the military services’ intermediate- and senior-level PME programs. Additionally, the military services’ PME programs have (1) met or partially met all of the required joint learning areas, such as joint command and control; and (2) met or partially met all required common educational standards, such as periodically assessing their JPME programs. First, the OPMEP requires intermediate- and senior-level PME programs to fulfill the appropriate joint learning areas and objectives and common educational standards, and generally have a curriculum that includes the required JPME content prescribed in statute. The PAJE review of the joint learning areas and common educational standards includes a combination of objective and subjective assessment based on peer expertise. Specifically, the OPMEP requires intermediate-level PME programs to fulfill the following six joint learning areas: (1) National military capabilities strategy, (2) Joint doctrine and concepts, (3) Joint and multinational forces at the operational level of war, (4) Joint planning and execution processes, (5) Joint command and control, and (6) Joint operational leadership and the profession of arms. The OPMEP requires senior-level PME programs to fulfill the following five joint learning areas: (1) National strategies; (2) Joint warfare, theater strategy and campaigning for traditional and irregular warfare in a joint, interagency, intergovernmental and multinational environment; (3) National and joint planning systems and processes for the integration of joint, interagency, intergovernmental and multinational capabilities; (4) Command, control and coordination; and (5) Strategic leadership and the profession of arms. According to the most recent Joint Staff PAJE accreditation reports, all of the military services’ intermediate- and senior-level PME programs met all of these mandatory joint learning areas, with the exception of the Marine Corps intermediate-level PME program which received a partially meets in the joint learning area for joint planning and execution processes. Second, the OPMEP also requires intermediate- and senior-level PME programs to meet seven common educational standards that the Chairman considers essential in awarding JPME credit. Table 4 describes these seven common educational standards. The most recent Chairman’s accreditation review found that each of the military services’ PME programs met or partially met all seven OPMEP- required common educational standards, as shown in table 5. According to Joint Staff officials, to be assessed as “met,” the program must meet all of the criteria for that common educational standard. On the other hand, if a program does not meet all of the criteria then it “partially met” the criteria for the accreditation standard. When a PAJE team determines that a program “partially met” a standard, the team suggests corrective actions for the program to consider. Receiving a “partially met” on a particular standard does not exclude a program from being accredited, as accreditation is based on the program being judged satisfactory overall and having no significant weaknesses. We identified the following examples of common educational standards that were met or partially met by the military services’ intermediate- and senior-level PME programs during our analysis of the Chairman’s most recent accreditation reports for those programs. Standard 2: Employ Predominantly Active and Highly Effective Instructional Methods – The PAJE team found that the College of Naval Warfare met this standard during its most recent review in May 2015. This standard states that instructional methods should be appropriate to the subject matter and desired levels of learning, and should employ active student learning whenever feasible. In addition, the standard requires that the goals of the educational offerings be rigorous and challenging, requiring that students engage in critical thinking and active interaction. Specifically, the PAJE team found that the College of Naval Warfare employed a preponderance of active instructional methods to achieve desired learning outcomes. The team found that the effective combination of Socratic discussion, case studies, practical exercises, written assignments, and lectures followed by seminar discussions, engaged students in critical thinking and were appropriate to the desired levels of learning. The PAJE team also found that active student discourse occurred both inside and outside of seminars. Lastly, the team found that the effectiveness of the curriculum in refining critical thinking skills was reflected in both student and alumni surveys. Standard 3: Assess Student Achievement – The PAJE team found that the Marine Corps Command and Staff College met this standard during its most recent review in September 2014. This standard states that each college should aggressively assess its students’ performance, clearly state educational goals and objectives, and measure students’ performance against defined standards using direct and indirect assessment tools to identify whether desired educational outcomes are being achieved. Specifically, the PAJE team found that the Marine Corps Command and Staff College clearly identified program outcomes, student learning outcomes, and lesson educational objectives. The PAJE team also found that student assessments were directly linked to student learning outcomes, joint learning areas, and joint learning objectives. Additionally, the team found that results were carefully tracked and used for educational outcome achievement verification, curriculum improvement, and faculty development feedback. Lastly, the PAJE team found that the College used a variety of student assessments—including research papers, exams, staff papers, oral presentations, exercises, practicums, oral defenses, and seminar participation—to provide feedback and verify learning outcome achievement. Standard 4: Assess Program Effectiveness – The PAJE team found that the Army’s Command and General Staff College partially met this standard during its most recent review in February 2014. This standard states that colleges should survey students, graduates, and their supervisors to determine curricula and educational effectiveness of their academic programs. The standard also states that leadership should periodically assess the intended educational outcomes of programs for currency, relevancy, and completeness, and the results of these analyses should be used to refine or develop curricula that continue to meet evolving mission requirements in the context of an ever-changing world. Specifically, the PAJE team found that there is a robust evaluation and assessment process for the common core courses but that neither the electives nor the Command and General Staff College-level outcomes were assessed. Additionally, the PAJE team found that there did not appear to be a process for evaluating the overall curriculum either directly or indirectly. The PAJE team suggested that the Army’s Command and General Staff College develop a capstone evaluation to assess outcomes of its common core curriculum. Army’s Command and General Staff College officials told us that in 2016 the college developed a capstone evaluation for its common core curriculum, consisting of an online examination and a faculty member oral examination. Standard 5: Conduct Quality Faculty Recruitment: Selection, Assignment, and Performance Assessment Program – The PAJE team found that the Air War College partially met this standard during its last review in October 2014. This standard states that faculty should have the academic credentials, teaching skills, and experience in joint and professional matters necessary to teach in the colleges. This standard also states that faculty roles and responsibilities should be clearly documented, and that colleges should hold faculty accountable to clearly defined and measurable performance criteria and standards. Specifically, the PAJE team found that the Air War College did not meet the OPMEP standard for its student-to-faculty ratio, but acknowledged that the college had a plan to meet this requirement by the spring of 2015. The Air War College met the student-to-faculty ratio in academic year 2015. The review also found that delays in hiring presented challenges in maintaining the requisite number of qualified faculty. The PAJE team suggested that the Air War College continue its efforts to reduce the time to complete civilian hiring actions. Air War College officials stated that as part of a wider Air University effort to streamline the civilian hiring process they were able to ameliorate this challenge by making the process more transparent, predictable, and shorter. Most of the military services’ senior-level PME programs met the OPMEP JPME seminar student mix accreditation requirement, which is part of the develop joint awareness, perspective, and attitude common educational standard (Standard 1) that pertains to joint acculturation. However, not all of the military services’ intermediate-level PME programs met the seminar student mix accreditation requirement. The OPMEP requires that each intermediate- and senior-level JPME seminar contain at least one student from each of the two non-host military departments: the Department of the Army, the Department of the Navy (which includes the Marine Corps), and the Department of the Air Force. DOD defines joint acculturation as the process of understanding and appreciating the separate military service cultures resulting in joint attitudes and perspectives, common beliefs, and trust. All but one of the military services’ senior-level PME programs met the seminar student mix accreditation requirement from academic years 2014 through 2018. During that timeframe there were approximately 300 senior-level seminars, and only one did not meet the requirement. Specifically, during academic year 2017, the Air Force’s senior-level PME program lacked sufficient Navy representation for one seminar. However, not all of the military services’ intermediate-level PME programs met the seminar student mix accreditation requirement. Specifically, the Air Force’s and the Army’s intermediate-level PME programs had less than the required Sea Service representation for 3 years between academic years 2014 and 2018. For academic years 2016 and 2018, the Air Force’s intermediate-level PME program had less than the OPMEP-required Sea Service representation for about 24 percent of its seminars (totaling 288 students), as shown in table 6 below. During the 3- year timeframe, the Army’s intermediate-level PME program had less than the required Sea Service representation for about 22 percent of its seminars (totaling 664 students). On the other hand, the Navy’s and the Marine Corps’ intermediate-level PME programs generally met their respective seminar student mix accreditation requirement for each of the last 5 academic years (2014 – 2018). According to Navy officials and documentation, the Navy stated that it was unable to provide the other military services’ intermediate-level PME programs with the required numbers of officers during academic years 2016 – 2018 because of competing staffing priorities, such as its forward presence mission. However, we found that the Navy provided sufficient officers to its own intermediate-level PME program (College of Naval Command and Staff) during each of these academic years so that it could have instead assigned the required number of officers to the Air Command and Staff College and the Army’s Command and General Staff College to meet their respective Sea Service requirements. For example, the Navy sent 121 Navy officers to the College of Naval Command and Staff in academic year 2018 for 27 seminars when the Air Command and Staff College and the Army’s Command and General Staff College needed a cumulative total of 32 officers to meet their OPMEP seminar student mix requirement. As a result, most of the College of Naval Command and Staff’s seminars would have only been reduced by one Navy Officer. Officials from all of the military service PME programs told us that students interacting with students from other military departments is critical for joint acculturation. Officials from the Joint Staff Directorate for Joint Force Development reinforced the importance of the seminar student mix requirement, stating that satisfying the OPMEP common educational standard of developing joint awareness, perspective, and attitude (Standard 1) is dependent on time and intensity of student interaction with students from other military departments. Military service and Joint Staff officials stated it was difficult for Air Force and Army officers to gain a full appreciation of the Navy’s contribution to joint military operations when there were no Sea Service students in the seminar. In the situations where a seminar did not have Sea Service representation, Joint Staff officials told us that a decision was made to award students JPME credit. Furthermore, officials told us that it was decided to not “punish” military service PME programs for not meeting the OPMEP’s JPME seminar student mix requirement as military services’ programs cannot control the number of in-bound students assigned by the other military services. Officials from the Air Force’s and the Army’s intermediate-level PME programs told us that when they are unable to meet the OPMEP seminar student mix requirement, they take steps to compensate for the lack of Sea Service student representation, such as using faculty to provide Sea Service perspectives. Similarly, a 2010 Congressional report noted the value of in-residence officer PME programs because of the acculturation opportunities that they offer. Other than Joint Staff officials requesting that the Navy meet the OPMEP’s JPME seminar student mix requirement, no other actions have been taken by the Chairman, OSD, or the Navy to resolve the issue concerning Navy participation in the Air Force’s and Army’s intermediate- level PME programs. Specifically, according to DASD(FE&T) officials, as of November 2019, OSD has not been involved in addressing the Navy’s failure to meet the OPMEP’s JPME seminar student mix requirement. Additionally, Joint Staff officials told us that the Chairman cannot direct a Secretary of a military department to comply with provisions of a Chairman’s publication. However, Standards for Internal Control in the Federal Government state that management should identify, analyze, and respond to risks related to achieving defined objectives. Given that joint acculturation is a key component of intermediate-level PME programs, the lack of action to resolve or mitigate the issues at hand has the potential to negatively affect students’ opportunities to increase their knowledge and develop the necessary skills to operate in joint environments. Without DOD taking steps to determine whether the appropriate number of Navy officers can be assigned to intermediate-level PME programs of the Air Force and Army, the officers participating in these programs lack the perspectives of Sea Service participants, which diminishes the quality of the educational experience. Furthermore, neither the Chairman nor OUSD(P&R) has evaluated or approved the mitigation steps, either before or after-the-fact, when a PME program lacks representation to meet the joint acculturation requirement. Although the OPMEP requires that each intermediate- and senior-level JPME seminar contain at least one student from each of the two non-host military departments, the OPMEP does not contain guidance on what PME programs should do when they do not meet this requirement. Developing guidance concerning actions, if any, the military services can take to mitigate JPME seminar student mix shortfalls and still meet the intent of the OPEMP’s joint awareness common educational standard could better position DOD and the military services to ensure that DOD’s JPME programs are meeting their objectives. OSD has had PME and JPME statutory oversight responsibilities for more than 30 years; however, while it has taken some steps to strengthen its oversight, it is not well-positioned to assess the effectiveness of the military services’ PME programs. The Goldwater-Nichols Act, as amended, states that the Secretary of Defense shall, with the advice and assistance of the Chairman of the Joint Chiefs of Staff, periodically review and revise the curriculum of JPME schools, and require that the PME schools periodically review and revise their intermediate- and senior-level PME curriculums to strengthen the focus on joint matters and preparing officers for joint duty assignments. Moreover, DOD Directive 5124.02 requires the Under Secretary of Defense for Personnel and Readiness to develop policies, plans, and programs for educating DOD personnel. According to several DOD officials with whom we spoke, prior to the establishment of DASD (FE&T), OUSD(P&R) unofficially relinquished its responsibilities for PME and JPME to the Chairman, whose office issued the first version of the OPMEP in 1996. As mentioned earlier, the OPMEP outlines the Chairman’s process for meeting statutory responsibilities for overseeing officer JPME, which is a subset of PME. For example, the OPMEP states that JPME is a Chairman approved body of objectives, outcomes, policies, procedures, and standards supporting the educational requirements for joint officer management. As recently as 2017, OUSD(P&R) reported to Congress that it had no formal process for exercising its authority to periodically review and revise the curricula of officer JPME. In the same report, OUSD(P&R) stated that DOD was reviewing JPME and the DOD Joint Officer Management Program. OUSD(P&R) also reported that with the reorganization of its office to include a Deputy Assistant Secretary of Defense for Force Education and Training (DASD(FE&T)) in 2015, OSD was now organized to exercise its statutory authorities with respect to PME and JPME and would do so in line with the Secretary of Defense’s direction in the National Defense Strategy. According to the 2015 implementation plan detailing the reorganization, the Deputy Assistant Secretary’s responsibilities include measuring, assessing, and overseeing all aspects of education and training, which includes PME and JPME. In 2019, DOD issued guidance stating that the Assistant Secretary of Defense for Readiness is the principal advisor to the Under Secretary of Defense for Personnel and Readiness on all matters related to the readiness of the Total Force, including by developing policies and plans, providing advice, and making recommendations for PME to include alignment to the National Defense and National Military Strategies and talent management and utilization. OUSD(P&R) is drafting its first DOD instruction (the draft instruction) that covers PME and JPME, which DASD(FE&T) officials told us it plans to issue in February 2020. According to DASD(FE&T) officials, once issued, the DOD instruction will be the prevailing policy document for PME and JPME at the OSD-level. While we believe these steps will improve OSD’s oversight of the military services’ PME and JPME programs, we identified areas that could continue to impede DOD’s ability to assess the effectiveness of these programs. Specifically: DOD lacks a mission statement and performance measures for its PME and JPME programs. DASD(FE&T) officials stated that prior to the draft policy OUSD(P&R) had not developed a mission statement and performance measures for PME, but told us that the draft instruction would include a mission statement and examples of performance measures. However, we did not identify a mission statement for PME that clearly defines the respective key purposes for this program when we reviewed the draft instruction. According to leading training and development practices, a mission statement is important to an organization’s success because it explains the organization’s purpose and goals and is the basis for goal-directed performance measures. The draft instruction proposes the performance measures the military services should track and assess as part of their required annual program reviews, such as graduate assignments and retention rates. Performance measures are important because they assess an organization’s progress toward achieving results that are aligned with its mission. However, without a department-wide mission statement for PME and JPME, OUSD(P&R) is not well-positioned to propose performance measures for the military services to track and enable OUSD(P&R) to assess the effectiveness of these programs. Further, our review of the draft instruction found no examples of cost- related performance measures. DASD(FE&T) officials confirmed that cost-related performance measures were not included in the draft instruction, but told us that they planned to coordinate with officials from the Joint Staff Directorate for Joint Force Development to refine the performance measures sometime in the future. DOD’s Financial Management Regulation states that performance measurement is a means of evaluating efficiency, effectiveness, and results, and that a balanced performance measurement scorecard includes nonfinancial and financial measures focusing on quality, cycle time, and cost. Moreover, leading training and development practices state that performance measures should include both qualitative and quantitative measures to assess training results, and include the identification and tracking of costs. These same leading practices state that organizations should compare associated costs and monetized benefits of training programs to determine return on investment. DASD(FE&T) officials told us that having cost information on the military services’ PME and JPME programs to determine return on investment would enable their office to compare and make well- informed decisions about these programs. DOD lacks a requirement for the military services to report periodically on PME and JPME programs. OUSD(P&R) has not established a requirement for the military services’ to periodically report information to its office on the military services’ respective PME and JPME programs. For example, the Chairman’s PAJE reports that document accreditation findings and include a full, conditional, or no accreditation determination are not provided to OUSD(P&R). According to the OPMEP, PAJE reports will be forwarded to the Chief of the applicable military service, the Director of the Defense Intelligence Agency, or the President of the National Defense University for appropriate action. A Joint Staff official confirmed that PAJE reports are not provided to OUSD(P&R). Our review of the draft instruction found no requirement for the Chairman to provide PAJE reports to OUSD(P&R), nor is there a requirement for the military services to report information on their PME and JPME programs—such as their annual program reviews—to OUSD(P&R). According to DASD(FE&T) officials, reporting requirements were omitted from the draft instruction because their office lacks the personnel to review and assess the information the military services would be required to collect and report. However, without a requirement for the military services’ to periodically report information on their PME and JPME programs, OUSD(P&R)’s ability to assess the effectiveness of these programs and perform meaningful oversight will continue to be limited. Leading training and development practices state that organizations should collect appropriate performance data during implementation and establish accountability for the results of these efforts. Additionally, Standards for Internal Control in the Federal Government state that management relies on quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. These same standards state that management should receive quality information about the entity’s operational processes to help management achieve the entity’s objectives. Because OUSD(P&R) does not require the military services to periodically report information on their respective PME programs, it does not have information that would help it assess the effectiveness of these programs. We believe that addressing these limitations will enhance the ability of OUSD(P&R) and its subordinate office (i.e., DASD(FE&T)) to oversee and assess the effectiveness of the military services’ PME programs. USD(Comptroller’s) ability to monitor the military services’ PME programs is limited because the military services’ budget request data are incomplete and lack uniformity. DOD’s Financial Management Regulation requires the military services to submit separate budget request data on PME programs in support of DOD’s annual budget request, and this data is included in DOD’s annual congressional budget justification exhibits. While the Financial Management Regulation requires the military services to submit separate annual budget request data exhibits for most of their intermediate- and senior-level PME programs, it does not require the Marine Corps to submit an exhibit for its senior-level PME program, the Marine Corps War College. Based on our review of the Marine Corps’ fiscal years 2014 through 2020 budget request data exhibits and according to the USD(Comptroller) and Marine Corps officials, the Marine Corps did not submit a budget request data exhibit for the Marine Corps War College during this 7-year period. USD(Comptroller) and Marine Corps officials could not explain why the Marine Corps War College was omitted from the DOD Financial Management Regulation, where DOD last updated the chapter requiring this submission in September 2008. In addition, the data the military services include in their annual budget requests varies. DOD Directive 5118.03 outlines USD(Comptroller) responsibilities, requiring the Comptroller to, among other things: (1) direct the formulation and presentation of DOD budgets; and (2) establish and supervise the execution of uniform DOD policies, principles, and procedures, including terminologies and classifications, as necessary, for budget formulation, presentation, and execution, and certain other topics. Additionally, section 2162 of title 10, U.S. Code, requires the Secretary of Defense, with the advice and assistance of the Chairman of the Joint Chiefs of Staff, to promulgate a uniform cost accounting system for use by the Secretaries of the military departments in preparing budget requests for the operation of PME schools. However, the DOD Financial Management Regulation does not specify how the military services should account for the data required for the military services’ budget request data submissions. Consequently, the budget request data reported by the military services varies. For example, in their fiscal year 2020 budget request data submissions the Army and the Air Force combined distance education and in-residence education programs, the Navy reported this data in separate exhibits, and the Marine Corps omitted distance education costs for its intermediate-level PME program. Additionally, according to DOD officials, the extent to which the military services accounted for costs to operate and maintain their PME colleges—such as security, facility maintenance, and information technology support—varies. In 1987, the year following the passage of the Goldwater-Nichols Act, the House Armed Services Committee established a panel on PME led by Representative Ike Skelton (the Skelton Panel). The Skelton Panel undertook a comprehensive congressional review of PME, and published its findings and recommendations in a 1989 report (the Skelton Report). Although the Skelton Panel did not take a comprehensive look at how well PME institutions were funded to accomplish their mission, the panel inquired into cost per student at each school and reported receiving from OSD raw data submitted by each PME institution, which included considerable differences in scope and cost methodology used by the PME institutions. The Skelton Report recommended that DOD establish a uniform cost accounting system for the PME schools, and that the annual report of the Secretary of Defense provide data on PME costs beginning in 1990. A 2010 congressional report focused on PME developments since the Skelton Panel’s review, investigated whether a uniform cost accounting system existed, among other things. The congressional report found that DOD did not have a uniform cost accounting method for PME schools, and that it had not provided cost data to support useful comparisons among PME schools. The report included a recommendation for DOD to report its PME funding to Congress using a standardized accounting method for cost per student at each of the PME institutions, as recommended by the Skelton Panel in 1989. According to DASD(FE&T) and Joint Staff officials, the department has not collected or reported PME program cost information to Congress as the 1989 Skelton Report and the 2010 congressional report both recommended. Without complete and uniform budget request data, USD(Comptroller)’s ability to monitor the military services’ PME programs, identify program trends within the Marine Corps and among the other military services’ PME programs, and formulate meaningful inter-service comparisons is limited. DOD relies on PME to prepare its military personnel for the intellectual demands of complex contingences and major conflicts that typically involve more than a single military service. While all the military services’ intermediate- and senior-level PME programs have met or partially met the accreditation requirements established by civilian accreditation bodies and the Chairman to award master’s degrees and JPME credit, respectively, not all service programs have met the seminar student mix requirement. The Navy, for example, has not provided the requisite representation of officers in Army and Air Force intermediate-level seminars during the 2016 – 2018 academic years. Requiring DOD to determine whether the requisite number of Navy officers can be assigned to the military department’s JPME programs and to develop policy to mitigate student mix shortfalls would address persistent student mix imbalances and align with the joint acculturation goal of JPME. OUSD(P&R)’s draft DOD instruction, expected to be finalized in February 2020, will be the prevailing policy document for PME and could improve OSD’s oversight of the military services’ PME and JPME programs. However, OUSD(P&R)’s ability to assess the effectiveness of the military services’ PME programs is limited by the absence of a department-wide mission statement that explains the purpose and goals of PME that aligns with the proposed performance measures in the draft instruction; the absence of a requirement for the military services to track program costs as a performance measure; and the absence of a requirement for the military services to report data on their PME and JPME programs—such as their annual reviews of PME programs. Addressing these limitations would better position OUSD(P&R) to oversee and assess the effectiveness of the military services’ PME and JPME programs. Finally, USD(Comptroller)’s ability to monitor the military services’ PME programs is limited because the services’ budget request data are incomplete and lack uniformity. Although the military services are required to submit separate budget request data exhibits for most PME institutions, the Financial Management Regulation does not require the Marine Corps to submit an annual budget request data exhibit for its senior-level PME program. Moreover, the data the military services include in their annual budget requests vary because the Financial Management Regulation does not specify how to account for costs. Requiring the Marine Corps to report budget request data on its senior-level PME program annually, and specifying how to account for costs in the exhibits would enhance the USD(Comptroller)’s ability to monitor the military services’ PME programs and also enhance Congress’s ability to identify trends among these programs. We are making a total of seven recommendations to the Secretary of Defense. Specifically: The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Chairman of the Joint Chiefs of Staff and the Secretary of the Navy, determine whether it can assign the required number of Navy officers to the other military departments’ JPME programs, consistent with Chairman of the Joint Chiefs of Staff guidance. (Recommendation 1) The Secretary of Defense should ensure that the Chairman of the Joint Chiefs of Staff, in coordination with the Under Secretary of Defense for Personnel and Readiness and the military services, develop policy concerning actions, if any, the military services can take to mitigate JPME seminar student mix shortfalls and still meet the intent of the OPMEP’s joint acculturation requirement. (Recommendation 2) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Chairman of the Chiefs of Staff, develop and issue a department-wide mission statement for PME that will explain the program’s purpose and goals, and serve as a basis for performance measures. (Recommendation 3) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Chairman of the Joint Chiefs of Staff, issue and implement performance measures—to include the tracking of costs—that align with the department-wide mission statement for PME. (Recommendation 4) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness, in coordination with the Chairman of the Joint Chiefs of Staff, require the military services to periodically report information to its office about the military services’ PME and JPME programs—such as results of program reviews. (Recommendation 5) The Secretary of Defense should ensure that the Under Secretary of Defense(Comptroller) updates the DOD Financial Management Regulation to require the Marine Corps to include a budget request data exhibit for the Marine Corps War College in support of DOD’s annual budget request. (Recommendation 6) The Secretary of Defense should ensure that the Under Secretary of Defense (Comptroller), in coordination with the military services and the Chairman of the Joint Chiefs of Staff, issue guidance to standardize the cost data that the military services should include in their annual PME budget request data submissions. (Recommendation 7) We provided a draft of this product to DOD for comment. In its comments, reproduced in Appendix II, DOD concurred with all of our recommendations and stated that it will be implementing our recommendations by issuing policy, among other actions. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Under Secretary of Defense for Personnel and Readiness, the Chairman of the Joint Chiefs of Staff, and the Secretaries of the Army, Navy, and Air Force. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The Joint Special Operations University (JSOU) was established in September 2000 and is located at MacDill Air Force Base, Florida. The mission of JSOU is to prepare special operations forces to shape the future strategic environment by providing specialized Joint Professional Military Education (JPME); developing applicable undergraduate- and postgraduate-level equivalent curriculum; and fostering special operations research, analysis, and outreach in support of Special Operations Command objectives. JSOU staff and faculty include active duty, active reserve, and temporary duty reserve military personnel; government civilians; civilian contractors; private consultants; and guest lecturers and speakers. JSOU’s active duty military personnel are assigned to the university by Special Operations Command and the military services. JSOU’s professional military education vision is to prepare warfighters to solve ambiguous, complex problems across the spectrum of conflict by providing dynamic and adaptive professional education opportunities. In August 2015, the Accrediting Council for Continuing Education and Training accredited JSOU through December 2019. As of January 2020, officials stated that they are currently undergoing reaccreditation and expect reaffirmation notification by the end of February 2020. While JSOU offers a number of courses, seminars, and programs, officials from JSOU and the Office of the Assistant Secretary of Defense for Special Operations/Low-Intensity Conflict stated the university has no near-term plans to award master’s degrees; therefore, no additional civilian accreditation is necessary. JSOU officials said that they are contemplating offering senior-level JPME in the future, but stated that such an endeavor would take approximately at least 10 years to accomplish. Consistent with its mission of preparing special operations forces to shape the future strategic environment, JSOU laid out the following seven goals in its 2019 academic guidance: 1. Continue to refine target audiences in all courses, assuring the right curricula is provided to the right student at the right time. 2. Implement a title 10, U.S. Code, civilian faculty hiring process that leverages the DOD professional military education community, fully supports the JSOU vision, and retains control to rapidly hire faculty with expertise in required disciplines. 3. Establish and complete a comprehensive building improvement plan that provides a quality learning environment conducive to educational excellence and student success. 4. Establish and complete a comprehensive education technology plan that brings all classrooms and auditoriums up to planned capability inherent in a state-of-the-art learning institution. 5. Facilitate the Technology Review Committee to define and develop the JSOU advanced classroom concept, capable of a wide variety of innovative teaching methodologies. 6. Develop and sustain academic programs in the emerging mission areas of artificial intelligence/machine learning, countering weapons of mass destruction, cyberspace, sensitive activities, and joint unconventional warfare that directly support special operations. 7. Develop highly effective academic instructors and distinguished experts in their individual fields of knowledge. Remain sensitive to individual needs and career development as JSOU embarks on new hiring processes and classroom innovations. According to the JSOU Fact Book for 2018, the newly authorized title 10, U.S. Code, civilian faculty hiring authorities will allow JSOU faculty to attain new heights of excellence with expertise not normally found within the military or civil service communities. The handbook states that the title 10, U.S. Code, faculty hiring authority will have a major impact on shaping JSOU’s curriculum, and will directly add to special operations forces’ readiness and capability. Brenda S. Farrell, (202) 512 -3604 or farrellb@gao.gov. In addition to the contact named above, Marc Schwartz (Assistant Director), Norris “Traye” Smith (Analyst in Charge), Rebecca Guerrero, Edward Malone, Stephanie Moriarty, Patricia Powell, Carter Stevens, and Lillian M. Yob made significant contributions to this report. Higher Education: Expert Views of U.S. Accreditation. GAO-18-5. (Washington, D.C.: December. 22, 2017). Higher Education: Education Should Strengthen Oversight of Schools and Accreditors. GAO-15-59. Washington, D.C.: December 22, 2014. Joint Professional Military Education: Opportunities Exist for Greater Oversight and Coordination of Associated Research Institutions. GAO-14-216. Washington, D.C.: March 10, 2014. Joint Military Education: Actions Needed to Implement DOD Recommendations for Enhancing Leadership Development. GAO-14-29. Washington, D.C.: October 23, 2013.", "summary": "DOD relies on PME and JPME to prepare its military personnel throughout their careers for the intellectual demands of complex contingences and major conflicts that typically involve more than a single military service. However, according to DOD's summary of the 2018 National Defense Strategy, PME “has stagnated, focused more on the accomplishment of mandatory credit at the expense of lethality and ingenuity.” The Conference Report accompanying the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to evaluate DOD PME and JPME institutions. This report examines the extent to which (1) the military services' PME programs have met civilian and JPME accreditation requirements, (2) OSD has assessed the effectiveness of the military services' PME programs, and (3) USD (Comptroller) has monitored the military services' PME program budget data. GAO analyzed applicable laws and policy, analyzed accreditation and budget information, and interviewed officials from the military services' intermediate- and senior-level resident PME programs. All of the military services' intermediate- and senior-level officer Professional Military Education (PME) programs have met civilian and met or partially met Joint PME (JPME) accreditation requirements. However, not all of the military services' PME programs met the JPME seminar student mix requirement of at least one student from the nonhost military department. For example, the Army's intermediate-level PME program did not meet its Sea Service (i.e., Navy, Marine Corps, and, in certain instances, Coast Guard) requirement (see table). GAO's analysis found that the Navy could have assigned officers to Air Force and Army programs while not harming participation in its own seminars. Without taking steps to improve Sea Service participation, students lose opportunities to interact with students from other military departments, which officials have identified as critical to joint acculturation. The Office of the Secretary of Defense (OSD) has taken steps to improve its oversight of the military services' PME programs, but is limited in its ability to assess their effectiveness. Department of Defense (DOD) guidance states that performance measurement is a means of evaluating efficiency, effectiveness, and results and that a balanced performance measurement scorecard includes nonfinancial and financial measures focusing on quality, cycle time, and costs. While OSD is in the process of developing some performance measures, it is not planning to require the military services to track program costs. Implementing its planned measures and establishing costs as a performance measure will better position OSD to assess the effectiveness of PME programs. The Under Secretary of Defense (USD) (Comptroller's) ability to monitor the military services' PME programs is limited by incomplete and inconsistent reporting of service budget request data. DOD guidance does not require the Marine Corps to submit an annual budget request data exhibit for its senior-level PME program and existing guidance for programs that are reported does not specify how to uniformly account for costs. Without complete and uniform budget request data, USD(Comptroller) is challenged in monitoring these programs. GAO is making seven recommendations, including that DOD take steps to determine its ability to assign Navy officers to PME programs of other services, implement performance measures–including tracking of costs, and issue guidance for service reporting of PME budget request data. DOD concurred with all of GAO's recommendations.", "document_type": "gao"}
{"report": "Section 501 of the Internal Revenue Code provides for tax-exempt status of certain corporations, trusts, and other organizations. This status allows qualifying organizations to claim exemption from federal income taxes. Subsection (c) of section 501 recognizes 28 categories of tax- exempt organizations, ranging from cemetery companies to multiemployer pension plan trusts. Section 501(c)(3), the section that recognizes charitable organizations, applied to approximately 1.3 million organizations in fiscal year 2017. These groups represent the largest number of 501(c) organizations. Federal tax law permits individual taxpayers and organizations to reduce their tax liability by deducting contributions to charitable organizations on their income tax returns. Individual taxpayers may deduct the amount of a contribution to charitable organizations from their gross income if they itemize their deductions. Charitable organizations provide many types of assistance, such as services for the aging or food and shelter for those in need. Taxpayers may support these activities by making contributions in the form of financial donations or in-kind gifts to qualified organizations. Federal law allows taxpayers to deduct charitable contributions from their adjusted gross income (AGI). This policy has been in place since 1917. An individual taxpayer may deduct up to 60 percent of his or her AGI for cash contributions, with 20 percent to 30 percent limits applying in some cases. A corporation may claim a limited deduction for charitable contributions made in cash or other property up to 10 percent of its taxable income for the year. An entity seeking tax-exempt status under 501(c)(3) from IRS must submit either a completed Form 1023, Application for Recognition of Exemption Under Section 501(c)(3) of the Internal Revenue Code, along with organizing documents, or a completed Form 1023-EZ. Both Form 1023 and Form 1023-EZ require the entity seeking recognition of its tax- exempt status to provide information regarding its charitable purpose, as well as certain financial data. IRS employees then review the forms to determine the entity’s eligibility for tax-exemption status. Most tax-exempt charitable entities are required to file an annual information return from the Form 990 series. Certain small entities with gross receipts that are normally $50,000 or less may file Form 990-N Electronic Notice providing abbreviated information. Although the entity is filing its information return as a tax-exempt organization, the entity must pay employment taxes and taxes on unrelated business income, if applicable. IRS provides programs and products to help the entity understand specific issues related to its tax responsibilities. IRS personnel can audit an organization’s or individual’s submitted tax returns and financial information to verify that the reported tax is correct. IRS personnel audited 933,785 individual income tax returns in fiscal year 2017, according to IRS data. This was 0.6 percent of individual returns filed in calendar year 2016. From fiscal year 2006 to fiscal year 2017, the largest number of individual returns IRS audited was 1,564,690 in fiscal year 2010. There was a decrease in audits of individual tax returns after fiscal year 2011, which occurred about the same time that IRS’s budget declined by about $2.1 billion (15.7 percent) from fiscal years 2011 through 2018, after adjusting for inflation. Concurrent with IRS’s declining resources were increasing responsibilities, such as implementing aspects of the Foreign Account Tax Compliance Act and the Patient Protection and Affordable Care Act. We reported in 2014 that budget cuts had resulted in a significant staffing decline and uneven performance at IRS. In March 2019, we reported that IRS was in the early stages of defining and addressing its workforce needs, but IRS officials stated that there was room for improvement in implementing its workforce plans, and that it was working on a corrective action plan that would address deficiencies noted in our report. The operating divisions that, along with conducting audits, carry out service and enforcement, and that deal most often with abusive tax schemes or tax-exempt entities are TE/GE, SB/SE, and LB&I. These divisions interact with taxpayers and entities that file tax returns. In particular, each of the three divisions may audit taxpayers or entities to determine whether information filed was reported accurately. IRS has set one of its cross-divisional objectives as identifying “new types of tax transactions or promotions that are either abusive or potentially abusive requiring different levels of coordination and varying strategies.” Another of TE/GE’s audit objectives is to “promote the highest degree of voluntary compliance with the statutes governing qualification of plans and exemption of certain types of organizations from tax and to determine the extent of compliance and the causes of noncompliance with the tax laws by plans and organizations.” TE/GE accomplishes this objective by auditing charitable organizations’ compliance with the tax code through its Exempt Organizations unit. In addition to this function, Exempt Organizations also reviews organizations’ tax-exempt status applications and makes tax-exempt status determinations. It also coordinates with other state and federal agencies. Additionally, it audits entities to identify and address noncompliance, where it may propose tax assessments or changes to the tax-exempt status of the audited entity. TE/GE uses various enforcement processes, such as referrals from the public and other parts of IRS and data-driven approaches, to select tax- exempt organization for possible audits. IRS projects that Exempt Organizations will receive approximately 1.6 million filings from tax- exempt and government entities in fiscal year 2019, primarily Form 990 series information returns. SB/SE mainly oversees small businesses and self-employed taxpayers and all other businesses with assets of less than $10 million. Examples of the types of businesses that SB/SE covers include small-business start-ups, small businesses with or without employees, taxpayers with rental properties, taxpayers with farming businesses, and individuals investing in businesses such as partnerships. Overall, IRS projects that SB/SE will receive approximately 59.4 million tax returns in fiscal year 2019. The Lead Development Center, an office within SB/SE, receives referrals from and facilitates communication between SB/SE and TE/GE on the subject of abusive tax schemes. LB&I oversees tax compliance of large partnerships, S Corporations, and C corporations with assets of $10 million or more, as well as individuals with high wealth (those with tens of millions of dollars in assets or earnings) or international tax issues. IRS projects that LB&I will receive approximately 400,000 corporate tax-return filings in fiscal year 2019. LB&I has developed a compliance strategy to identify potential issues that arise during audits of tax returns. LB&I also oversees the processing of reportable transaction disclosure filings by those involved in reportable transactions. A transaction includes all the factual elements relevant to the expected tax treatment of any investment, entity, plan, or arrangement. It also includes any series of steps carried out as part of a plan. Transactions become “reportable” (meaning a taxpayer must report it to IRS) when they fall under one or more of the following categories: listed transactions, confidential transactions, contractual protection transactions, loss transactions, and transactions of interest. A listed transaction is any transaction that IRS has identified as an abusive tax avoidance transaction and has identified in published guidance as a listed transaction. Taxpayers that have engaged in transactions that have tax consequences or tax strategies described in published IRS guidance are required by law to disclose the transaction to IRS. The fact that a transaction must be reported does not mean IRS will disallow the tax benefit, but IRS uses the reports to assess compliance. Appendix IV discusses reportable transaction types in greater detail. Taxpayers are required to disclose all types of reportable transactions on Form 8886, Reportable Transaction Disclosure Statement. Similarly, advisers helping taxpayers conduct reportable transactions are required to file Form 8918, Material Advisor Disclosure Statement. Tax-exempt entities are required to file Form 8886-T, Disclosure by Tax- Exempt Entity Regarding Prohibited Tax Shelter Transaction, when the entity is a party to a listed, confidential, or contractual protection transaction, and the entity knows the identify of any other party in the transaction. Tax-exempt entities that are party to a listed or confidential transaction may be subject to an excise tax of 100 percent of the income from the transaction. Transactions that require the filing of form 8886-T constitute a different, smaller range of activity than transactions requiring the filing of Form 8886. The Office of Tax Shelter Analysis, a unit within LB&I, supports LB&I’s work by coordinating its tax shelter planning and operations. This office also analyzes information collected from disclosure forms. According to IRS policy, if the Office of Tax Shelter Analysis determines a formal investigation is warranted, it presents the information to the LB&I Technical Tax Shelter Promoter Committee, an office within LB&I that has sole authority to approve any proposed investigations. Taxpayers seeking to reduce their tax liability through charitable donations may participate in legal tax planning strategies that allow them to maximize their deductions while giving to charitable organizations. In contrast to these legal tax planning strategies involving charitable donations, abusive tax schemes occur when taxpayers conduct transactions that are not supported by established law to improperly claim tax benefits, or that have no economic significance or business purpose other than the avoidance of tax, among other factors. IRS has long recognized that some charitable donors and tax-exempt organizations have engaged in abusive tax schemes. One such scheme can consist of a donor grossly overvaluing a charitable contribution to obtain a larger deduction on his or her filed tax returns. Another abusive tax scheme can entail a tax-exempt organization providing benefits to a private shareholder or individual. As we previously have reported, the abusive transactions that comprise abusive tax schemes have been a long-standing, ever-changing, and often hidden problem for IRS. The following three examples illustrate various ways that an entity’s tax- exempt status can be used in transactions that are not supported by law or are inconsistent with the law’s intent, and how otherwise legitimate tax- exempt activity can be exploited improperly. A conservation easement is a legal agreement that grants an organization the right to restrict the development and use of property for conservation purposes with the intent of preserving the land or buildings. If statutory requirements are met, taxpayers may donate an easement to a qualified organization and receive a charitable income tax deduction for the appraised value of the easement. A conservation easement becomes “syndicated” if a person or company promoting the easement (a promoter) offers multiple investors in a partnership or pass-through entity the opportunity to claim charitable deductions based on the value of the easement in return for cash. The Brookings Institution estimated that investments in syndicated conservation easements totaled $623 million in 2016, an increase of 29 percent from $484 million in 2015. It further estimated that because tax deductions from syndicated conservation easement contributions generate a benefit greater than the value of the investments themselves, the tax deductions resulted in federal tax revenue loss between $1 billion and $1.9 billion in 2015 and between $1.3 billion and $2.4 billion in 2016. According to IRS, in a syndicated conservation easement, promoters purchase land and convey ownership to a pass-through entity, such as a partnership. The promoters offer interests in the pass-through entity to prospective investors who are then able to deduct their share of the value of the easement as a charitable contribution. In its guidance, IRS said the conservation easement becomes noncompliant if, for example, the promoters obtain an appraisal that purports to be a qualified appraisal, but that greatly inflates the value of the conservation easement based on unreasonable assumptions about the development potential of the real property. Because the promoters inflate the value of the property, the investors may benefit by claiming a charitable deduction on their tax returns that exceeds their initial investment. Figure 1 shows the steps in the formation of a syndicated conservation easement and the point at which the easement becomes noncompliant when promoters obtain an inflated value for the easement. IRS has indicated its concern about the potential for abuse of conservation easements, whether syndicated or otherwise, when used in ways not supported by the law. In December 2016, the Department of the Treasury (Treasury) and IRS issued Notice 2017-10 designating syndicated conservation easements as listed transactions. This notice provides that certain syndicated conservation easements promoted with a return on investment of at least 250 percent will be identified as listed transactions. It also provided details on how Treasury and IRS view these transactions as forms of abuse. Although promoters who abuse syndicated conservation easements exploit tax-exempt entities, the law does not treat the tax-exempt entity as a participant, meaning that even when a promoter is found to use a syndicated easement in a noncompliant manner, the tax-exempt entity associated with the scheme may still be considered compliant. In addition to the potential for overvaluation of easements, Treasury and IRS considered that syndicated conservation easements may become problematic because of the potential they have to involve transactions that violate the economic substance doctrine. Because of its concerns, IRS has identified taxpayer abuse of conservation easements as a risk area for noncompliance. Syndicated easements also illustrate how noncompliance can cross the areas of responsibility of IRS’s audit divisions. In this case, the beneficiary of the scheme may be a small-business taxpayer (SB/SE’s responsibility) or a corporation (LB&I’s responsibility), even though the scheme hinges on an inflated appraisal and being able to donate to the tax-exempt recipient (TE/GE’s responsibility). A donor-advised fund is a fund or account held by a charity that receives contributions from donors who may advise, but not control, how the organization uses the money. The Pension Protection Act of 2006 defined donor-advised funds in the Internal Revenue Code and subjected the funds to new requirements. Because donor-advised fund accounts are operated by charities, contributions to these funds are deductible at a higher percentage of adjusted gross income (generally 50 percent or 60 percent for cash contributions) than donations to private foundations (generally 30 percent). Some donors may use the donor-advised funds in ways that IRS considers improper. For example, prior to tax-law changes in 2006, IRS said that abusive donor-advised funds are those that appear to be established to generate questionable charitable deductions, and provide impermissible economic benefits to donors and their families (including tax-sheltered investment income for the donors). Figure 2 illustrates how donor-advised fund accounts operate and highlights where in the process the parties involved could abuse the funds or raise policy concerns about how donor advised funds have been used. Donor-advised funds have grown in various measures in recent years, according to data compiled by the National Philanthropic Trust. For example, it reports that from 2013 to 2017, the total grants made by donor-advised funds grew from $9.83 billion to $19.08 billion, and contributions grew from $17.24 billion to $29.23 billion. Total assets held in donor-advised funds increased from $57.1 billion to $110.01 billion as well, according to the organization’s study. In 2017, about 463,000 donor- advised funds existed in the United States, with an estimated $110 billion in assets, according to the National Philanthropic Trust. Some of the largest of these funds in terms of assets are sponsored by financial institutions, religious groups, and community foundations, while others are independent, according to our review of selected donor-advised funds’ sponsoring organizations’ websites and data from the National Philanthropic Trust. Patient assistance programs help patients afflicted with certain medical ailments obtain financial assistance for medical care or free drug products and these programs may qualify for tax-exempt status. Pharmaceutical companies may establish their own patient assistance programs or make monetary donations to independent charities’ patient assistance programs. In addition to financial support, pharmaceutical companies may donate medication (through in-kind product donations) to patient assistance programs. Donations such as these allow pharmaceutical companies to claim a limited tax deduction for charitable contributions. If they claim deductions, the deductions may be up to 10 percent of the corporations’ taxable income when donating to charities. The possibility of donors receiving private benefits in excess of the charitable deduction creates potential risks to participating pharmaceutical companies and compliance challenges for IRS, according federal regulators. For example, because independent charity patient assistance programs may be 501(c)(3) tax-exempt organizations, pharmaceutical manufacturers’ profits generated from sales of their products to individuals receiving help from patient assistance programs that they donate to may raise issues of inurement. Figure 3 summarizes how a hypothetical patient assistance program works and highlights points in the process where potential abuse of the program may occur. The federal government has investigated cases of potential private benefit by pharmaceutical companies and patient assistance programs. For example, IRS filed a court summons in May 2017 in an ongoing investigation of a patient assistance program over concerns that it spent the majority of its donations on copayment support that went to patients who were prescribed medication from companies that had donated money to the patient assistance program. As shown in the tax scheme examples previously discussed, abusive schemes with tax-exempt entities can involve the tax-exempt entity directly or leverage an entity’s tax-exempt status indirectly to reduce taxes. Consequently, the characteristics of audits involving abusive tax schemes, such as which IRS operating division is responsible for the audit, will differ according to the type of scheme. In addition, IRS generally presents information about abusive tax schemes under a category it calls abusive tax avoidance transactions. The abusive tax schemes we have been discussing in this report are a subset of abusive tax avoidance transactions in which the transaction or arrangement involves multiple types of entities. IRS data do not allow us to identify separately the transactions involving multiple entities. The discussion that follows describes trends under the assumption that over time abusive transactions involving multiple entities would closely track total abusive transactions. TE/GE audited 2,294 tax-exempt entities with what IRS identified as abusive tax avoidance transactions in the 10-year period from fiscal year 2008 through 2017. As shown in figure 4, the number of abusive- transaction audits fell from a high of 886 in fiscal year 2009 to 10 or less in fiscal year 2017. This decline represented at least a 98.9 percent decrease in audits performed by TE/GE (see appendix V, table 6). The decline in abusive-transaction audits generally corresponds with the overall decrease in audit activity by IRS over recent years (see appendix V, tables 2, 3, and 4). During the same 10-year period, TE/GE assessed a total tax increase of $107 million based on its audits of tax-exempt entities and the average tax increase per audit was $46,804. The amount assessed for the tax increase declined from 45.3 million in 2008 to 1.2 million in the merged years of 2016 and 2017. The effectiveness and efficiency of the audit process may be reflected in the no-change rate and staff days associated with the audits. The no- change rate—the percentage of audits that results in no tax change—was 13.9-percent (see appendix V, table 11). IRS uses this ratio as an indicator of how effectively IRS identifies noncompliant taxpayers (a lower no-change rate on its audits is consistent with more effective audit selection methods). The lower rate may also reflect higher economic efficiency because less IRS and taxpayer time and other resources are used for auditing compliant returns. On average, TE/GE spent 70 hours per audit of tax-exempt entities from fiscal year 2008 through 2017 (see appendix V, table 9). Audits involving abusive schemes where taxpayers leverage an entity’s tax exempt status—but the tax-exempt entities are not the subject of the audit—are the responsibility of SB/SE and LB&I. To determine the minimum number of audits these divisions conducted on abusive schemes involving tax-exempt entities, we used IRS project codes that IRS agreed were relevant. For these project codes, SB/SE and LB&I conducted 4,207 audits over the 10-year period. The numbers of audits generally decreased over the period except for increases in 2012, 2015, and 2017 for LB&I audits and increases in fiscal year 2015 and 2017 for SB/SE audits. Combined SB/SE and LB&I audits fell from 1,176 in fiscal year 2008 to 99 in fiscal year 2017, a 91.6 percent decrease (see appendix V, table 13). SB/SE and LB&I recommended about $8.3 billion in tax changes over the 10-year period. As shown in figure 5, the average recommended amount was larger for LB&I, but tended to fluctuate more than the SB/SE amounts. The average tax change amount per audit over the 10-year period recommended by SB/SE was $89,399. The average amount recommended by LB&I was $8.6 million. Figure 5 also shows how both divisions had a surge in recommended tax amount changes for 2017 compared to prior years. SB/SE’s recommended changes increased from $270,131 in fiscal year 2016 to $127 million in fiscal year 2017. LB&I recommended changes increased from $299 million in 2016 to $555 million in 2017. IRS officials could not provide an explanation for the surge in 2017 (see appendix V, table 14). Again, the divisions’ resource use may be reflected in staff days and the no-change rate. SB/SE and LB&I combined spent 218 hours, on average, per audit for the audits involving tax-exempt entities identified by project codes (see appendix V, table 15). The no-change rate for SB/SE audits we examined involving tax-exempt entities identified by project code was 10.9 percent. LB&I audits involving tax-exempt entities had a no-change rate of 15.5 percent (see appendix V, table 16). Numbers of audits of all types of abusive transactions showed a pattern of decline similar to audits involving tax exempt entities. SB/SE and LB&I conducted a total of 155,467 audits involving all types of abusive transactions from fiscal year 2008 to fiscal year 2017. As shown in figure 6, the total number of these audits conducted by each of the operating divisions fell in most years. Abusive transaction audits conducted by SB/SE and LB&I fell from 26,519 in fiscal year 2008 to a low of 4,248 in fiscal year 2017, an 84 percent decrease in audits closed during this period (see appendix V, table 5). Audits involving tax-exempt entities resulted in higher average tax changes than audits for the total of all abusive transactions. Combined, SB/SE and LB&I recommended a total of $39 billion in tax changes for the total of all for abusive-transaction audits. As shown in figure 7, SB/SE recommended tax amount changes that averaged $40,834 per audit and LB&I recommended tax amount changes that averaged $3 million per audit. The recommended tax change per abusive-transaction audit was larger for audits involving tax-exempt entities than for the total of all abusive-transaction audits in both operating divisions which were (as described above) $89,399 for SB/SE and $8.6 million for LB&I. The total recommended tax amount change for SB/SE decreased from $1.4 billion to $339 million, a 75 percent decrease over the period. For LB&I, the recommended tax amount change decreased from $7.5 billion to $866 million, an 89 percent decrease (see appendix V, table 7). We estimated audits involving tax-exempt entities identified on the basis of project codes led to SB/SE and LB&I recommending about $8.3 billion in tax changes over the 10-year period. The no-change rate for all SB/SE abusive transaction audits over the period was 8.8 percent. The no-change rate for all LB&I abusive- transaction audits was 14 percent (see appendix V, table 10). Combined, SB/SE and LB&I spent a total of 6.6 million staff hours for the total of all abusive transaction audits from fiscal year 2008 to 2017, spending, on average, 42 hours per audit for all abusive-transaction audits (see appendix V, table 8). As described above, SB/SE and LB&I spent more in resources, 218 hours, on average, per audit of tax-exempt schemes, than the average for the total of all abusive-transaction audits. The majority (88 percent) of taxpayer audits involving tax-exempt entities identified on the basis of project codes for both SB/SE and LB&I had an Adjusted Gross Income (AGI) of more than $50,000, with about 40 percent of the audits involving the taxpayers with AGI falling between $100,000 and $500,000. The SB/SE audits had an average AGI of $1.2 million and median AGI value between $200,000 and $500,000. LB&I audits had an average AGI of $6.2 million and a median AGI value between $1.0 million and $1.5 million. The majority of business taxpayers with abusive-transaction audits involving tax-exempts (about 70 percent) reported zero gross receipts (see appendix V, tables 17 and 18). While the audit data examined above show the noncompliance IRS has found regarding abusive schemes with tax-exempt entities, information about the taxpayers involved in the transactions can also be derived from the IRS disclosure forms. Most of the taxpayers identified partnerships as the entities involved in the listed transactions that they reported. Of the taxpayer disclosures identifying a tax-exempt entity on Form 8886, 97.8 percent identified the type of reportable transaction as a listed transaction and 95.5 percent listed a partnership for type of entity involved in the transaction. Further, 98.1 percent of taxpayers claimed a deduction from their AGI as the benefit generated by the transaction and 5 percent claimed an ordinary loss as the tax benefit. The different disclosure reports that IRS receives from tax-exempt entities, taxpayers, and tax advisors contain data that identify the potential involvement of tax-exempt entities with reportable transactions. However, there are differences in the legal filing requirements, the types of information supplied, and the number of disclosure forms filed. Few tax-exempt entities directly disclose their involvement in prohibited transactions to IRS. Regulations require that certain tax-exempt entities disclose information on a prohibited tax shelter transaction to which the entity is a party. For calendar years 2004 through 2016, IRS received 71 Form 8886-T disclosures from tax-exempt entities that were a party to a prohibited transaction. Moreover, the actual number of filers making disclosures was smaller, only 33, because some submitted multiple forms during the period. Many more tax-exempt entities were identified by taxpayers filing the Form 8886, which requires a different, broader range of transactions to be reported than the Form 8886-T. For calendar years 2000 through 2017, IRS received more than 979,900 Form 8886 disclosure reports from taxpayers. Of that number the taxpayer identified a tax-exempt entity as part of the reportable transaction on 32,847 disclosures or 3.4 percent of all Form 8886 reports. A smaller number was identified by tax advisors on Form 8918. For calendar years 2007 through 2018, out of the 16,477 Form 8918 disclosure statements received from tax advisors, 155 submissions identified a tax-exempt entity as part of a reportable transaction. While detail about the transactions themselves—when they appear in the form narratives—is not readily available from the Form 8886 disclosure databases. IRS’s Research, Applied Analytics and Statistics Division has created an analytic tool for analyzing narrative information that it has tested on the Form 8886. When we performed a test analysis using this tool on the narrative fields on the Form 8886, we identified keywords that may help isolate tax-exempt organization involvement in potentially abusive schemes and ultimately help select returns for more detailed review. This more detailed review is required because transactions reported on the Form 8886 are not necessarily noncompliant. For our test analysis, we selected certain terms related to known abusive tax schemes involving tax-exempt entities such as “conservation easement” or related to the tax-exempt sector such as “charitable organization” and counted the number of times the terms appeared in the narrative field of 26,632 Form 8886 disclosures made in fiscal year 2017. For example, the term “conservation easement” occurred in the narrative field of 6,767 disclosure forms and the term charitable organization occurred on 17 disclosure forms. Through further searching on terms that might relate to charitable organizations, such as “charity,” “sports,” “children,” “animals,” “foundation,” and “scientific,” we identified 211 occurrences. IRS is not undertaking this type of analysis of taxpayer disclosures, which would expand its ability to identify tax-exempt entities and evaluate their potential involvement with reportable transactions, as discussed later in this report. IRS operates various programs to identify abusive tax schemes involving tax-exempt entities. Not all of these programs exclusively address abusive tax schemes with tax-exempt entities but nevertheless can provide relevant information on that issue. For example, the Office of Tax Shelter Analysis processes disclosures of reportable transactions, including those related to tax-exempt entities, and the Lead Development Center may collect information about abusive schemes related to tax- exempt entities as part of its role in dealing with abusive tax transactions in general. As figure 8 illustrates, several of these programs in practice are linked by the Service-wide Compliance Strategy Executive Steering Committee. This committee is responsible for collecting input from the operating divisions (TE/GE, SB/SE, and LB&I), as well as other parts of IRS, about abusive tax schemes that cross divisional responsibilities, including schemes involving tax-exempt entities. The Executive Steering Committee also may make decisions about how to address abusive tax schemes that cross the operating divisions’ responsibility. IRS officials said that the operating divisions are individually responsible for monitoring the committee’s performance. Therefore, the committee’s decisions depend on what information the operating divisions provide. As figure 8 also shows, the operating divisions pass information about abusive schemes among themselves through referrals, making clear communication among the operating divisions critical for IRS in identifying abusive tax schemes. An IRS office that more directly addresses potential abusive schemes with tax-exempt organizations is TE/GE’s Compliance Planning and Classification office (CP&C). This office has several responsibilities relating to identifying abusive tax schemes and communicating with other parts of IRS, as well as coordinating with other operating divisions on potential noncompliance. For example, CP&C is responsible for reviewing emerging abusive tax schemes, conducting research, and reviewing suggestions from a computer portal through which staff can raise potential issues about compliance. The portal also serves as the foundation to TE/GE’s compliance issue identification process. We found that IRS maintains a variety of programs to identify tax schemes involving tax exempt entities agency-wide, and these programs together fully met seven of our 10 criteria. Appendix I contains more information about the criteria we used in our analysis and a table that summarizes the results of our analysis. One criterion that IRS fully met was identifying areas of authority. All of the programs we reviewed had documentation showing the responsibilities the program was to fulfill and the roles it was to perform. IRS’s programs also fully met the criterion for ensuring competency by having documented procedures for training to enhance staff’s responsibilities across the programs we reviewed and met the communication criterion by, for example, having coordination meetings among officials representing the different operating divisions. In addition, IRS met the criterion for conducting monitoring activities by, for example, having inventory reports on TE/GE’s issue submission portal and maintaining a monitoring group over TE/GE’s audit plans. Finally, IRS met all three of our fraud-related criteria with programs or procedures that specifically identify fraud, such as TE/GE’s Fraud Investigation Unit, or that assist auditors in identifying fraud on returns, such as IRS’s Fraud Handbook. Reviewing whether auditors assessed fraud risk is also part of TE/GE’s quality review system. In the following sections, we discuss how IRS did not meet the other three internal control criteria. A relatively low number of tax exempt entities filing Forms 8886-T combined with our analysis of audit data raises questions about whether tax-exempt entities are filing these forms as often as they should. As we discussed above, tax-exempt entities filed only 71 Forms 8886-T over a 12-year period from fiscal year 2004 through 2016, where they listed prohibited transactions. At about the same time, taxpayers in general filed thousands of Forms 8886 annually where they identified tax-exempt entities as part of their reportable transactions. In addition, when we compared Form 8886 filings that identified tax- exempt entities as part of the reportable transaction with SB/SE and LB&I audit data, again for the same time period, we found 432 closed cases with tax changes. Although we did not determine whether the subject of these audits was the abusive scheme involving a tax-exempt entity, the result of 432 closed audit cases suggests that tax-exempt entities may be part of more prohibited transactions than those reported on the 71 Form 8886-T filed during the period. The audit cases identified in SB/SE and LB&I data resulted in about $1.9 billion in tax changes. The average per audit tax change recommended by SB/SE was $65,143 and by LB&I was $19 million. A similar analysis could be conducted comparing audit results with data from Form 8918, which is filed by tax advisors. IRS officials said the disparity between the number of Form 8886 filings and the small number of 8886-T filings has not raised concerns because the legal requirements for tax-exempt entities filing Form 8886-T are narrower than the requirements taxpayers must follow to file Form 8886, as we discussed earlier. However, IRS has not undertaken a risk assessment to test whether this explanation—that the lower number of filings should be expected because the filing requirement is narrower—is valid, which is inconsistent with the internal control standards for risk assessment. The Office of Tax Shelter Analysis sends Form 8886-T filings it receives to TE/GE, and the Compliance Planning and Classification office reviews these filings, but no documented process exists to determine whether all tax-exempt entities that should file Form 8886-T were filing the form as required. In addition, IRS provided us with no studies investigating the causes and consequences of such a small number of filings. While IRS has adopted processes to help ensure proper filing for other disclosures, such as Form 8886, it has not extended these to Form 8886- T. In 2011, we recommended that IRS establish a process to periodically check whether Form 8886 filers met their reporting obligations. In response to that recommendation, IRS implemented a new indicator and matching process to review whether filers met their obligations. IRS officials told us that similar controls do not exist for 8886-T filings. TE/GE officials said one way that they ensure forms are filed is through penalties, yet they said they have never assessed the penalty for nonfiling of Form 8886-T. TE/GE officials also said that another way they ensure proper filing is through education and cited such documentation as IRS Publication 557, Tax-Exempt Status for Your Organization. IRS said it provides other information through its website informing charities of their responsibilities. Despite this education effort, it may still be the case that a lack of knowledge about filing requirements reduces the number of tax-exempt entities that file. An IRS official suggested that charities may not have the financial sophistication to realize that they are involved in a prohibited tax shelter transaction and therefore are required to file a Form 8886-T. Without a better understanding of the reasons behind the low filing, IRS cannot be reasonably certain that tax-exempt entities are following the law on filing Form 8886-T and ensuring tax-exempt entities’ compliance. We were able to use the IRS audit and disclosure data to perform certain analyses on abusive tax schemes with tax-exempt entities for this report, but data deficiencies prevented us from undertaking more complete analysis and hinder management’s use of the data. These deficiencies— which are inconsistent with internal control standards for quality information—weaken divisions’ ability to identify abusive tax schemes involving tax-exempt entities as well as the Executive Steering Committee’s ability to make decisions about how to address abusive tax schemes across divisions and develop compliance strategies. First, the descriptions of project codes in audit data do not always clearly identify abusive tax schemes across operating divisions. For example, one code LB&I uses to identify abusive transactions in audit data is “domestic tax shelters.” TE/GE uses two codes both titled, “Abusive Tax Avoidance Transactions,” and SB/SE uses a code titled, “Tax Shelter List Projects.” IRS officials provided no additional documentation on what these codes mean. The lack of specificity hinders analyses of abusive tax schemes involving tax-exempt entities. IRS officials said that they do not keep an overall list of project codes that cover abusive schemes involving tax-exempt entities. This limits their ability to readily assess and manage audits of abusive tax schemes involving tax-exempt entities. However, they did say such a list, which would be effective in certain circumstances or operating divisions, might be possible to produce. Cross-operating division analysis could enhance the Executive Steering Committee’s objective to assess emerging issues and develop policy responses. Second, we found that there were no project codes consistently identifying abusive schemes involving tax-exempt entities that crossed operating divisions. Instead, IRS officials said each operating division assigned its own project codes that identify abusive tax schemes. Having no uniform way to identify abusive schemes across the operating divisions makes analysis of schemes that overlap with different operating divisions’ responsibilities problematic and inhibits IRS from accomplishing its objectives. The lack of cross-divisional project codes echoes findings from our 2011 report on abusive tax avoidance transaction data, where we found that some abusive tax avoidance transaction data were reported inconsistently across IRS divisions. We said in that report that without comprehensive or consistent information, IRS does not have the best information to decide how to evaluate the results of its audits. Our recommendation to separately track the tax amounts recommended, assessed, and collected between abusive tax avoidance transaction issues and nonabusive transaction issues remains open because IRS said resource and capability constraints preclude it from capturing information in this way. Similarly, IRS officials told us it would be costly and logistically prohibitive to create new project codes identifying abusive schemes involving tax- exempt entities that crossed divisions. However, as we said in our previous report, tracking audit results for abusive and nonabusive transactions would provide IRS management with the data needed to make more informed decisions about program effectiveness and resource allocation. If, as IRS indicated above, it would be possible to make an overall list of codes, such a list could be used to achieve the same results as adjusting the database system. Although IRS does not identify some data that would facilitate analysis of abusive tax schemes involving tax-exempt entities spanning the operating divisions, we found evidence that TE/GE’s Returns Inventory and Classification System (RICS) could at least partially support analysis and monitoring of audit data across the operating divisions. For example, the RICS user manual states that RICS can access a variety of forms outside of TE/GE’s purview, such as Form 1065 and the Form 1120 series tax returns, which typically are handled by SB/SE or LB&I respectively. While TE/GE uses RICS, officials we spoke with at LB&I, for example, were not familiar with RICS’ capabilities. TE/GE officials said IRS would have to study whether using RICS in other divisions would generate productive audits. As we discussed earlier in this report, IRS’s Research, Analysis and Statistics office also has developed the capability to analyze narrative information, which it has tested on the Form 8886. However, this analytical tool is not being used operationally to review the Form 8886 or any other disclosure report. Our analysis shows that the tool has the potential to help IRS better search disclosure reports for additional information about transactions that could help IRS identify potentially abusive schemes involving tax-exempt entities. For example, it can be used to identify keywords in disclosure reports that could help determine whether a tax-exempt entity was a party to a reportable transaction that warrants further investigation for compliance. However, IRS officials told us they have no plans to use this tool but agreed that it may be beneficial. IRS officials also told us that TE/GE does not routinely review Form 8886 filings that show tax-exempt entities as being part of the reported transaction because the data are not clear indicators of noncompliance. However, by not using these data for possible leads, IRS may be missing opportunities to identify known abusive schemes, which is inconsistent with internal controls on using quality information. Again, our analysis of the 8886 filings combined with audit results suggests that there is potential for IRS to use the Form 8886 to identify potential noncompliance. Without conducting such an analysis, IRS may be missing opportunities to identify leads on tax-exempt entities in abusive tax schemes. We previously showed that abusive tax schemes involving tax-exempt entities can involve multiple types of entities that cross IRS’s operating divisions’ areas of responsibility. We also showed that IRS relies on auditors to refer potentially noncompliant entities involved in an abusive scheme to the responsible operating division. Consequently, IRS needs assurance that auditors’ make referrals when appropriate. However, IRS lacks a control to ensure that auditors make referrals correctly. An IRS audit official said that managers are tasked with reviewing auditors’ work and identifying referrals that should have been made during case closings. However, there is no documented guidance specifically directing managers to assess whether auditors correctly identified referrals involving abusive tax schemes, reducing assurance that such auditors will make such identifications correctly and route them appropriately. IRS’s audit quality review systems, which generally measure how well auditors follow procedures from a random sample of audits, also do not assess whether referrals of abusive schemes involving tax-exempt entities are properly identified and routed. The lack of guidance to ensure auditors make referrals across the operating divisions increases risk that the responsible division will not be alerted to potential noncompliance to make further assessments for enforcement action. Absent specific guidance, there also is increased risk that even when one entity in an abusive tax scheme is audited, other entities in the scheme may go unexamined. This is inconsistent with internal controls standards for control activities. Abusive tax schemes involving tax-exempt entities pose enforcement challenges for IRS, as schemes can cross IRS’s operating divisions’ areas of responsibility and evolve over time. While IRS has established programs to help identify new abusive schemes, opportunities exit to better ensure that IRS accomplishes its objectives of identifying existing and emerging schemes. In particular, opportunities exist for IRS to improve the quality of its data and how it is using the data it has in managing its programs. Because IRS uses codes to identify abusive schemes that are not consistent across the operating divisions, its efforts to formulate policy across operating divisions may be made more difficult. Also, IRS may not be making the best use of its data by not using existing tools that may be helpful in analyzing data to identify abusive schemes involving tax-exempt entities. Next, IRS has an opportunity to reduce the risk that tax-exempt entities are noncompliant by assessing the number of Form 8886-T filings. Finally, referrals across divisions play an important role in IRS’s ability to identify schemes with tax-exempt entities, but IRS’s internal control activities over referrals are limited. By taking actions to further strengthen its internal controls, IRS could enhance its efforts to identify and combat abusive tax schemes that involve tax-exempt entities. We are making the following five recommendations to IRS: The Commissioner of Internal Revenue should undertake a risk assessment of tax-exempt entity Form 8886-T filings. Based on the findings of the risk assessment, IRS should then determine whether steps are needed to increase compliance, such as, for example, through increased outreach to tax-exempt entities or assessment of nonfiling penalties. (Recommendation 1) The Commissioner of Internal Revenue should link audit data on abusive tax schemes involving tax-exempt entities across operating divisions and use the linked data to assess emerging issues and develop policy responses. (Recommendation 2) The Commissioner of Internal Revenue should test the ability of the Return Inventory Classification System to facilitate analysis and monitoring of audit data across the operating divisions and to support the IRS’s enforcement objectives. (Recommendation 3) The Commissioner of Internal Revenue should use existing data analytic tools to further mine Form 8886 and Form 8918 data, which could be used to find audit leads on tax-exempt entity involvement in potentially abusive tax schemes. (Recommendation 4) The Commissioner of Internal Revenue should develop guidance to help managers ensure referrals about abusive schemes involving tax-exempt entities are made across operating divisions. This could be accomplished by, for example, adopting specific guidance for audit managers to look for referral accuracy in their reviews of case closings. (Recommendation 5) We provided a draft of this report to the Commissioner of Internal Revenue for review and comment. On August 16, 2019, the IRS Deputy Commissioner for Services and Enforcement provided written comments stating that IRS agreed with GAO’s recommendations. In the letter, which is reproduced in appendix VII, the Deputy Commissioner said that GAO’s recommendations would provide IRS with additional opportunities for improving the identification of tax schemes involving exempt entities. IRS also sent us technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Treasury, the Commissioner of Internal Revenue, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. To describe ways in which taxpayers have abused a tax-exempt entity through abusive tax schemes, we conducted interviews with knowledgeable professionals and researchers. We chose the interview sources by reviewing relevant articles from academic databases and reaching out to professional organizations. We narrowed our list of examples of abusive tax schemes by focusing on those professionals and researchers who: had recent professional experience as an attorney, accountant, or other industry professional with a firm specializing in tax-exempt entities or tax shelters; had recent professional experience in nonprofit management or affiliation with professional associations specializing in nonprofit organization or oversight; had published books, articles, or other research on tax-exempt entities or tax shelters within the last 10 years; were recommended to us by a relevant professional organization, such as the American Bar Association or the American Institute of Certified Public Accountants; work for or previously worked in charity tax enforcement at the state previously worked for the Internal Revenue Service (IRS), specifically in the Tax Exempt and Government Entities Division (TE/GE); or would (in our professional judgment) be able to speak on the topics of abusive tax avoidance schemes or IRS investigations of tax-exempt entities. We conducted literature and court case reviews using academic and legal databases and covered years 2008 through 2018 using search terms such as “tax avoidance,” “tax-exempt,” and “shelter.” We combined the information found in interviews with reviews of relevant literature and court cases. We categorized the observations from our research by the following criteria. Involved multiple entities, at least one of which was tax exempt, and Involved a transaction or scheme already known to IRS, such as a listed transaction or transaction of interest or Involved a transaction mentioned in expert interviews. We then applied the following factors to make the final three choices for the examples: how representative the example was of abusive tax- schemes involving tax-exempt entities; how well-documented we found the example to be in literature reviews; how recent the example had been used by abusers; and how much impact the example had in terms of prevalence and tax revenues. To examine trends in IRS’s compliance and the characteristics of taxpayers audited for using abusive tax schemes involving tax-exempt entities, we collected data from the following IRS business operating divisions that conduct audits on abusive transactions: (1) TE/GE, (2) Small Business/Self-Employed (SB/SE), and (3) Large Business and International (LB&I). We received data extracts from the following computer data systems (1) the Returns Inventory and Classification System data extracts from TE/GE; (2) the Automated Information Management System Centralized Information System (A-CIS), utilized by SB/SE and LB&I; and (3) the Compliance Data Warehouse (CDW) utilized by SB/SE and LB&I. IRS performs a number of quality control steps to verify the internal consistency of the Return Inventory Classification System, A-CIS, and CDW data. Additionally, we reviewed documentation from the operating divisions on the data, discussed the data with IRS officials, and conducted electronic reliability testing. For example, we verified the completeness of analysis variables and the date ranges for our analysis. We excluded 178 records from our analysis of SB/SE data because they were not within our date range. Based on our review, we believe the data are sufficiently complete and accurate for our purposes. We identified audits with potential tax exempt entities by selecting audits based on IRS project codes that IRS agreed were relevant to determine the minimum number of audits conducted on abusive schemes involving tax-exempt entities. We also matched the SB/SE and LB&I data with IRS’s Form 8886, Reportable Transaction Disclosure Statement, data file of the tax-exempt records. We used these data to produce descriptive statistics on audit and taxpayer characteristics and IRS compliance efforts for 2008 through 2017. Tax return information came from Form 1040, U.S. Individual Income Tax Return; Form 1120, U.S. Corporation Income Tax Return; and Form 990, Return of Organization Exempt from Income Tax. Dollars amounts reported for the 10-year period have been adjusted for inflation in 2018 dollars based on a Fiscal Year, Gross Domestic Product Price index. Separately, we compiled descriptive statistics on disclosures of reportable transactions that also involved tax-exempt entities from Form 8886 and Form 8918, Material Advisor Disclosure Statement. IRS’s Office of Tax Shelter Analysis provided the data for Forms 8886 and 8918. We also performed an analysis of the narrative portions of Form 8886 from tax year 2017 to identify more information about the descriptions of the reported transactions. We identified that IRS could conduct Python optical character recognition (OCR) analysis of the text fields on IRS Form 8886. We worked with officials at IRS’s Research, Analysis and Statistics office on using Python computer programming language to conduct the analysis. IRS ran the OCR using keywords associated with 29 different tax-exempt organizations we identified. The keywords we used were based on characteristics of tax-exempt entities, such as “charity” and “foundation”— terms found in 26 U.S.C. Section 501. We received summary tables and copies of PDFs of all Form 8886-T, Disclosure by Tax-Exempt Entity Regarding Prohibited Tax Shelter Transaction, for tax years 2004 through 2016. We checked the reliability of IRS’s summary tables and manually reviewed the PDF submissions to generate descriptions of the Form 8886-T data. We conducted reliability testing for all of the data we used for this objective. For the audit and tax return data, we interviewed relevant IRS officials and compared our statistical runs with publicly available statistics. For the Form 8886 and Form 8918 disclosure data, we interviewed relevant IRS officials. For the 8886-T data, we compared the summary tables IRS provided with the PDFs of the original Form 8886-T submissions. To assess how IRS identifies emerging abusive tax schemes and to identify potential improvements, we reviewed documentation on programs that help IRS identify possible abusive tax schemes involving tax-exempt entities. We identified the programs by reviewing IRS documentation, including the Internal Revenue Manual, in combination with IRS’s determination of relevant programs (see appendix VI for more details about these programs). We then identified criteria appropriate for assessing the programs’ alignment selected principles from Standards for Internal Control in the Federal Government (Green Book) and leading practices from our Fraud Risk Management Framework. To select these criteria, we reviewed the Green Book and Fraud Risk Management Framework to identify principles relevant to specific aspects of IRS’s programs for identifying and initiating enforcement actions against abusive tax schemes involving tax exempt entities. IRS agreed that these criteria were appropriate. The following list shows the criteria we selected through this process. Green Book Principle 3: Establish structure, responsibility, and Green Book Principle 4: Demonstrate a commitment to recruit, develop, and retain competent individuals Green Book Principle 7: Identify, analyze, and respond to risks Green Book Principle 8: Assess fraud risk GAO Fraud Risk Management Framework Overarching Concept 1.2 (structure) GAO Fraud Risk Management Framework Overarching Concept 2.1 (plans exist to assess fraud) Green Book Principle 10: Design control activities Green Book Principle 13: Use quality information Green Book Principle 14: Communicate Internally Green Book Principle 16: Perform Monitoring Activities After establishing appropriate criteria, two analysts independently reviewed appropriate evidence and determined whether the evidence aligned with the criteria for the programs was based on the attributes for the Green Book criteria and Fraud Risk Management Framework guidance. We also considered how the programs met TE/GE’s objective to “promote the highest degree of voluntary compliance with the statutes governing qualification of plans and exemption of certain types of organizations from tax and to determine the extent of compliance and the causes of noncompliance with the tax laws by plans and organizations,” and IRS’s objective to “identify new types of tax transactions or promotions that are either abusive or potentially abusive requiring different levels of coordination and varying strategies.” We determined the criterion was met only if all of the programs under review offered sufficient support. Table 1 shows how we assessed the programs we reviewed on the criteria. The federal tax code provides a variety of tax benefits to organizations often referred to as “tax exempt.” This appendix focuses on organizations or entities qualifying for a tax-exempt status under 26 U.S.C. § 501. We discussed the tax benefits and requirements for different types of tax- exempt organizations in our 2014 report on oversight of charitable organizations. In addition to section 501, there are various other scattered provisions which give a full or partial tax exemption to certain specific types of entities and income. Section 501 distinguishes between charitable organizations, also known as 501(c)(3) organizations (after the subsection in which they are defined) from all other organizations qualifying for an exemption under section 501. Organizations that qualify for an exemption under section 501, but are not charitable organizations have been referred to as mutual benefit organizations or non-charitable nonprofits. Section 509 further divides charitable organizations between those that are private foundations and all other charitable organizations, and private foundations are divided between operating and nonoperating foundations in section 4942. Figure 9 shows the declines in the Internal Revenue Service’s Tax- Exempt and Government Entities Division’s budget since an increase from fiscal years 2009 through 2011. The Internal Revenue Service (IRS) defines a transaction as one that includes all the factual elements relevant to the expected tax treatment of any investment, entity, plan, or arrangement, and it includes any series of steps carried out as part of a plan. Department of the Treasury (Treasury) regulations require that certain transactions be registered and that lists of investors be maintained by parties who organize or sell interests in the transaction. A transaction becomes “reportable” (i.e., a taxpayer must disclose it to IRS on Form 8886) when it falls under one or more of the following categories: listed, confidential, contractual protection, loss transactions, and transactions of interest. Listed transactions: A listed transaction is reportable when it is the same or substantially similar to one of the types of transactions that IRS has determined to be an avoidance transaction. IRS provides a detailed list of the 36 recognized listed transactions on its website. Confidential transactions: A confidential transaction is offered to a taxpayer or a related party under conditions of confidentiality and is a type of transaction for which a taxpayer has paid a minimum advisor fee. A transaction is considered offered under conditions of confidentiality for two reasons: the advisor places a limitation on the taxpayer’s disclosure of the tax treatment or tax structure of the transaction, and the limitation on disclosure protects the confidentiality of the advisor’s tax strategies. The transaction is treated as confidential even if the conditions of confidentiality are not legally binding on the taxpayer. Contractual protection transactions: A contractual protection transaction is a transaction for which a taxpayer or a related party has the right to full or partial refund of fees if all or part of the tax consequences from the transaction are not sustained. It also includes a transaction for which fees are contingent on a taxpayer’s realization of tax benefits from the transaction. Loss transactions: A loss transaction is a transaction that results in a taxpayer claiming a loss. The type of taxpaying individual or entity determines the applicable amount of the loss. The types of loss transactions IRS has described are as follows for: Individuals: at least $2 million in any single tax year or $4 million in any combination of tax years. Corporations (excluding S corporations): at least $10 million in any single tax year or $20 million in any combination of tax years. Partnerships with only corporations (excluding S corporations) as partners: at least $10 million in any single tax year or $20 million in any combination of tax years, whether or not any losses flow through to one or more partners. All other partnerships and S corporations: At least $2 million in any single tax year or $4 million in any combination of tax years, whether or not any losses flow through to one or more partners or stakeholders. Trusts: At least $2 million in any single tax year or $4 million in any combination of tax years, whether or not any losses flow through to one or more beneficiaries. Transactions of interest: A transaction of interest is one that IRS and Treasury believe to have the potential for tax avoidance or evasion, but which lacks enough information for IRS and Treasury to determine whether the transaction should be identified as a tax avoidance transaction. Tables 2 and 3 below show Internal Revenue Service (IRS) data for forms filed and audited, and the audit coverage rate, for individual income tax and corporate tax returns during fiscal years 2006 to 2017. Table 4 shows the number of returns processed and audited, and the audit coverage rate, for tax-exempt organizations during fiscal years 2006 to 2015. All three tables show declines in audit coverage rates: the decline occurred for individual income tax returns after fiscal year 2011 and for corporate income tax returns after fiscal year 2012. The audit coverage rate for tax-exempt organizations’ returns declined from fiscal years 2013 to 2015, the last fiscal year for which we have complete data on tax- exempt organization returns. Table 21 lists 10 programs that the Internal Revenue Service (IRS) operates that may identify or conduct enforcement action on abusive tax schemes that involve a tax-exempt entity. James R. McTigue, Jr. (202) 512-9110 or mctiguej@gao.gov. In addition to the contact named above, Kevin Daly (Assistant Director); Susan Baker; Jehan Chase; Sara Daleski; Steven Flint; Eric Gorman; Gina Hoover; Andrew Howard; Edward Nannenhorn; Kevin Newak; Carolyn Ours; Robert Robinson; Dylan Stagner; and Elwood White made significant contributions to this review. Also contributing to this report were Toni Gillich; Sarah Gilliland; John Hussey; Jessica Lucas-Judy; Cynthia Saunders; Stewart Small; Rebecca Shea; and Janet Temko-Blinder.", "summary": "Abusive tax schemes contribute to the tax gap and threaten the tax system's integrity. When abusive tax schemes involve tax-exempt entities, they also can erode the public's confidence in the charitable sector. GAO was asked to review what is known about abusive transactions involving tax-exempt entities and how IRS addresses them. This report, among other things, (1) describes ways in which taxpayers have abused an entity's tax-exempt status; (2) examines trends in IRS's compliance efforts; and (3) assesses how IRS identifies emerging abusive tax schemes involving tax-exempt entities. GAO reviewed research on tax schemes involving tax-exempt entities, and interviewed relevant professionals and researchers about tax schemes involving tax-exempt entities; compiled statistics from IRS audit and disclosure data; and compared documentation and testimony from IRS officials on IRS programs and guidance from its operating divisions with certain internal control and GAO fraud framework criteria. Taxpayers have used a variety of abusive tax schemes involving tax-exempt entities. In some schemes, the tax-exempt entity is complicit in the scheme, while in others it is not. For example, an abusive tax scheme could involve multiple donors grossly overvaluing charitable contributions, where the tax-exempt entity is not part of the scheme. Conversely, some patient assistance programs—which can help patients obtain medical care or medications—have been used by pharmaceutical manufacturers to make charitable donations that can be viewed as furthering private interests. Internal Revenue Service (IRS) audits of abusive tax schemes are trending downward, as the figure below shows audits by IRS's Large Business and International division. This trend has occurred amid generally declining IRS resources and corresponds with an overall decrease in audit activity by IRS over recent years. IRS has a variety of programs working collectively to identify abusive tax schemes involving tax-exempt entities, but some internal control weaknesses exist in its approach. For example, GAO found three ways that IRS data or programs were inconsistent with internal control standards for using quality information. First, database project codes used for identifying data on abusive tax schemes are not linked across IRS's audit divisions and do not consistently identify whether a tax-exempt entity was involved. Second, IRS has not leveraged a database with cross-divisional information to facilitate its analysis and monitoring of audit data across divisions. Finally, IRS has not used existing analytic tools to mine the narrative fields of tax forms. Doing so could provide audit leads on abusive schemes involving tax-exempt entities. These deficiencies inhibit IRS's ability to identify abusive tax schemes and develop responses to those schemes. GAO is making five recommendations to IRS to strengthen its internal controls, including that it link data across operating divisions, test the ability of a database to facilitate analysis of audit data, and use existing analytic tools to further mine information on tax forms. In commenting on a draft of this report, IRS agreed with all of GAO's recommendations.", "document_type": "gao"}
{"report": "ONDCP was established by the Anti-Drug Abuse Act of 1988 as a component of the Executive Office of the President, and its Director is to assist the President in the establishment of policies, goals, objectives, and priorities for the National Drug Control Program. ONDCP is responsible for (1) leading the national drug control effort, (2) coordinating and overseeing the implementation of national drug control policy, (3) assessing and certifying the adequacy of National Drug Control Programs and the budget for those programs, and (4) evaluating the effectiveness of national drug control policy efforts. About a dozen National Drug Control Program agencies, as identified by ONDCP, have responsibilities for drug prevention, treatment, and law enforcement activities. Among other responsibilities, the Director of ONDCP is required to develop and promulgate the National Drug Control Strategy. The National Drug Control Strategy is to set forth a comprehensive plan to reduce illicit drug use and the consequences of such illicit drug use in the United States by limiting the availability of and reducing the demand for illegal drugs. Many of the SUPPORT Act’s requirements for the National Drug Control Strategy are the same as, or similar to, those that applied under the ONDCP Reauthorization Act of 2006. For example, both laws require the National Drug Control Strategy to include a 5-year projection for the National Drug Control Program and budget priorities. However, there are certain differences, and the SUPPORT Act includes a wide range of detailed new requirements that were not included under the ONDCP Reauthorization Act of 2006. One of these is that the National Drug Control Strategy include a description of how each comprehensive, research-based, long-range quantifiable goal established in the Strategy for reducing illicit drug use and the consequences of illicit drug use in the United States will be achieved. Other examples of new requirements include creating plans to increase data collection and expand treatment of substance use disorders. The SUPPORT Act also requires the Director to release a statement of drug control policy priorities in the calendar year of a presidential inauguration (but not later than April 1). The President is then required to submit to Congress a National Drug Control Strategy not later than the first Monday on February following the year in which the term of the President commences, and every two years thereafter. The Director of ONDCP is also responsible for developing a consolidated National Drug Control Program budget proposal for each fiscal year, which is designed to implement the National Drug Control Strategy and inform Congress and the public about total federal spending on drug control activities. As part of this effort, the Director of ONDCP is required to assess and certify National Drug Control Program agencies’ drug control budgets on an annual basis to determine if they are adequate to meet the goals and objectives of the National Drug Control Strategy. Figure 1 illustrates ONDCP’s budget certification process. ONDCP did not issue a National Drug Control Strategy for 2017 or 2018. Pursuant to the ONDCP Reauthorization Act of 2006, the Director of ONDCP was required to promulgate the National Drug Control Strategy annually and the President was to submit the National Drug Control Strategy to Congress by February 1 of each year. According to ONDCP officials, ONDCP did not issue a National Drug Control Strategy for these years because (1) ONDCP did not have a Senate-confirmed Director during those years; and (2) 2017 was the administration’s inaugural year, and previous administrations also did not issue a Strategy during their first years. By statute, in the absence of a Director, the Deputy Director of ONDCP is to perform the functions and duties of the Director temporarily in an acting capacity. ONDCP had officials serving as Acting Director beginning in January 2017. The current Director of ONDCP was appointed Deputy Director beginning in February 2018 and served as Acting Director from February 2018 until April 2018. As of April 2018, the current Director continued in his role as Deputy Director until he was confirmed by the Senate as Director of ONDCP in January 2019. The previous administration also did not issue a National Drug Control Strategy in its inaugural year—2009—but it did issue a National Drug Control Strategy in its second year, as shown in table 1. On January 31, 2019, ONDCP issued its National Drug Control Strategy for 2019, which we discuss in more detail later in the report. The ONDCP Reauthorization Act of 2006 required the Director of ONDCP to issue drug control funding guidance to the heads of departments and agencies with responsibilities under the National Drug Control Program by July 1 of each year. ONDCP is to issue funding guidance for agency budget proposals for the fiscal year two years in the future. For example, ONDCP was to issue funding guidance to agencies in 2017 for development of the 2019 budget, and issue funding guidance in 2018 for development of the 2020 budget. Such funding guidance was required to address funding priorities developed in the National Drug Control Strategy. National Drug Control Program agencies are to submit their budget requests to ONDCP in the summer of each year (before submission to the Office of Management and Budget) and in the fall of each year (at the same time as submission to the Office of Management and Budget).The Director of ONDCP then determines whether National Drug Control Program agencies’ summer budget requests are adequate to meet the goals of the National Drug Control Strategy and certifies whether fall budget submissions include the funding levels and initiatives identified during the summer budget review. Since ONDCP did not issue a Strategy in 2017 or 2018, ONDCP could not develop and issue funding guidance, nor could it review and certify budget requests and submissions of National Drug Control Program agencies, in accordance with the statutory requirement. ONDCP officials stated that—in lieu of a Strategy—they used other sources to formulate the administration’s priorities, which served as the basis for drug control funding guidance in 2017 and 2018. For example, for the development of the fiscal year 2019 drug control budget in calendar year 2017, ONDCP officials stated that they relied upon the following sources for drug policy guidance: Initial development of the President’s Initiative to Stop Opioid Abuse and Reduce Drug Supply and Demand; Draft recommendations from the President’s Commission on Combating Drug Addiction and the Opioid Crisis; policy statements made by the President as a candidate; and policy priorities identified in the fiscal year 2018 President’s Budget. Additionally, for the development of the fiscal year 2020 funding guidance in calendar year 2018, ONDCP officials stated that they relied upon the following sources for drug policy priorities: the interim and final Report of the President’s Commission on Combating Drug Addiction and the Opioid Crisis; the President’s Initiative to Stop Opioid Abuse and Reduce Drug Supply and Demand; the draft National Security Council Strategic Framework; and a draft 2018 National Drug Control Strategy that ONDCP officials told us they drafted but did not issue. These sources may have provided ONDCP officials with some information about policy priorities and actions. However, ONDCP officials stated they did not consider these documents to be the National Drug Control Strategy, and none of the sources fulfill the statutory requirements under the ONDCP Reauthorization Act of 2006, which require funding guidance to address priorities from the National Drug Control Strategy. ONDCP officials told us that they provided drug control funding guidance to the heads of departments and agencies with responsibilities under the National Drug Control Program in 2017 and 2018. As described by ONDCP officials, drug control funding guidance identifies key program goals and the programs and activities that require agency funding to achieve the objectives of the National Drug Control Strategy. ONDCP has since issued the 2019 National Drug Control Strategy which states that it establishes the administration’s drug control priorities. The Strategy also states that the priorities provide federal drug control departments and agencies strategic guidance for developing their own drug control plans and strategies, and that the Strategy is intended to ensure federal drug control budget dollars are allocated in a manner consistent with the administration’s priorities. ONDCP officials told us that the agency intends to issue the next National Drug Control Strategy in February 2020 in accordance with the SUPPORT Act. The 2019 National Drug Control Strategy and companion documents include information to address some but not all selected requirements under the ONDCP Reauthorization Act of 2006. ONDCP issued multiple documents that together were intended to address the requirements for the National Drug Control Strategy. The first document, the 2019 National Drug Control Strategy, was issued January 31, 2019, with three companion documents issued later in April and May 2019. These companion documents were the 2019 Data Supplement, the 2019 Performance Reporting System, and the 2019 Budget and Performance Summary. In our March 2019 testimony, we reported that the first document—the National Drug Control Strategy, which was the only one of the four documents available at the time of our testimony—did not include certain information required under the ONDCP Reauthorization Act of 2006. These selected requirements included: annual quantifiable and measurable objectives and specific targets; a 5-year projection for program and budget priorities; specific drug trend assessments; and a description of a performance measurement system. Following our March 2019 testimony, we reviewed the three companion documents and found that while they provide some additional information to address these same selected requirements, they do not completely address the requirements. As stated earlier, we based our analysis of the 2019 National Drug Control Strategy and companion documents on the ONDCP Reauthorization Act of 2006, which was the applicable law at the time ONDCP began drafting the Strategy. Current law is reflected in the SUPPORT Act, which includes some of the same requirements from the ONDCP Reauthorization Act of 2006 and some new or different requirements. In the paragraphs below, we identify which selected requirements from the ONDCP Reauthorization Act of 2006 were retained under the SUPPORT Act, and therefore represent current law, and which selected requirements were not retained. For those selected requirements that were not retained, we identify comparable current requirements in the SUPPORT Act. Annual quantifiable and measurable objectives and specific targets. Pursuant to the ONDCP Reauthorization Act of 2006, the National Drug Control Strategy was required to include “annual quantifiable and measurable objectives and specific targets to accomplish long-term quantifiable goals that the Director determines may be achieved during each year beginning on the date on which the National Drug Control Strategy is submitted.” The SUPPORT Act retained this requirement. We testified in March 2019 that while the 2019 National Drug Control Strategy lists seven items it designates as measures of performance or effectiveness, the document did not indicate how these would be quantified or measured. The document also did not include targets to be achieved each year. Our subsequent analysis of the three companion documents showed that one additional document provided more information related to this requirement. The 2019 Performance Reporting System includes 9 goals and 17 quantifiable and measurable objectives with specific targets for certain years. Specifically, the goals and objectives identified in the 2019 Performance Reporting System included educating the public about the dangers of drug use; expanding access to evidence-based treatment; decreasing the over-prescribing of opioid medications; and reducing the availability of illicit drugs in the United States through reduced production, increased seizure trends, and increased prices and reduced drug purity, among other things. The document states that each goal “is accompanied by aggressive, but achievable, objectives with two- and five-year targets from a baseline of 2017.” However, the 2019 Strategy does not meet the statutory requirement because it does not have annual targets that may be achieved each year. Instead, the Performance Reporting System states that 16 of the 17 objectives in the Strategy have 2-year targets to be achieved in 2019, and 14 of the 17 objectives have 5-year targets to be achieved in 2022. The objectives do not include annual targets for the other intervening years— 2018, 2020, and 2021, as required. The Performance Reporting System states that while ONDCP assumes a linear progression from the baseline year—2017, in most cases—to the 2022 target, the trajectory may not actually be linear, “but rather it may occur at varying rates over the 5-year period due to multiple factors which influence the ability to achieve each of the stated goals and objectives.” In contrast, other information ONDCP provided to us stated that annual targets can readily be determined from the linear paths between the 2- and 5-year targets. Without identifying annual targets, the 2019 National Drug Control Strategy and companion documents do not meet the statutory requirement. Further, annual targets would better position ONDCP to monitor progress in intervening years and make any needed changes to achieve its goals and objectives. The SUPPORT Act continues to require ONDCP to establish annual quantifiable and measurable objectives and specific targets in future Strategy iterations. By taking steps to address this requirement ONDCP could further demonstrate whether it is making meaningful progress every year toward the targets it sets. A 5-year projection for program and budget priorities. Pursuant to the ONDCP Reauthorization Act of 2006, the National Drug Control Strategy was required to include “a 5-year projection for program and budget priorities.” The SUPPORT Act retained this requirement. As we testified in March 2019, the 2019 National Drug Control Strategy did not include this information. Our subsequent analysis of the three companion documents showed that one document—the 2019 Performance Reporting System—provided more information about ONDCP’s program priorities but not ONDCP’s budget priorities. Specifically, 14 of the 17 objectives ONDCP included in the 2019 Performance Reporting System contain various 5-year targets, such as to reduce the rates of illicit drug and opioid use among youth by 15 percent. According to ONDCP officials, the objectives and targets in the 2019 Performance Reporting System satisfy the requirement for 5-year program and budget priorities. However, the document does not include how these objectives and targets relate to 5-year budget priorities. The SUPPORT Act continues to require ONDCP to include a 5-year projection of program and budget priorities in future Strategy iterations. By taking steps to address this requirement, ONDCP and National Drug Control Program agencies will be better positioned to plan for the resources needed to achieve the efforts that will have the greatest impact. Specific drug trend assessments. Pursuant to the ONDCP Reauthorization Act of 2006, the National Drug Control Strategy was required to include assessments of the reduction of the consequences of illicit drug use and availability and the reduction of illicit drug availability. We testified in March 2019 that the 2019 National Drug Control Strategy did not include these assessments. Our subsequent analysis of the three companion documents showed that the 2019 Data Supplement provided more information to address the required assessments but did not address all of the requirements. For example, the assessment of the reduction of the consequences of illicit drug use and availability was to include, among other things, the annual national health care cost of illicit drug use. However, the most recent national health care cost data in the 2019 Data Supplement is from 2007, and ONDCP did not indicate in the supplement whether more recent data were available. In another example, the assessment of the reduction of illicit drug availability was to be measured by, among other things, the number of illicit drug manufacturing laboratories seized and destroyed and the number of hectares of marijuana, poppy, and coca cultivated and destroyed domestically and in other countries. The 2019 Data Supplement provided data for marijuana and poppy until 2016 and for the quantity of coca eradicated until 2015. The SUPPORT Act no longer requires these specific assessments. However, the SUPPORT Act does include a new requirement that the National Drug Control Strategy provide “ description of the current prevalence of illicit drug use in the United States, including both the availability of illicit drugs and the prevalence of substance use disorders.” The SUPPORT Act also contains a new requirement—which we describe later in this report—for ONDCP to describe how each comprehensive, research-based, long-range quantifiable goal in the National Drug Control Strategy was determined, including data, research, or other information used to inform the determination. We address ONDCP’s implementation of this new requirement under the SUPPORT Act later in the report. A description of a performance measurement system. Pursuant to the ONDCP Reauthorization Act of 2006, the National Drug Control Strategy was required to include a “description of a national drug control performance measurement system” that: develops 2-year and 5-year performance measures and targets; describes the sources of information and data that will be used for identifies major programs and activities of the National Drug Control Program agencies that support the goals and annual objectives of the National Drug Control Strategy; evaluates the contribution of demand reduction and supply reduction activities implemented by each National Drug Control Program agency in support of the Strategy; monitors consistency between the drug-related goals and objectives of the National Drug Control Program agencies and ensures that each agency’s goals and budgets support and are fully consistent with the National Drug Control Strategy, among others; and coordinates the development and implementation of national drug control data collection and reporting systems to support policy formulation and performance measurement, including certain assessments. We testified in March 2019 that the 2019 National Drug Control Strategy did not include a description of a performance measurement system pursuant to the ONDCP Reauthorization Act of 2006. Our subsequent analysis of the three companion documents showed that the 2019 Performance Reporting System provides information about some of the elements the performance measurement system is required to do. For example, the 2019 Performance Reporting System includes 2-year and 5- year targets for many of its objectives and describes some of the sources of data that will be used to measure each target. However, it does not include a description of the system that will accomplish each of the requirements in the ONDCP Reauthorization Act of 2006. For example, it does not describe a performance measurement system that identifies major programs and activities of the National Drug Control Program agencies that support the goals and annual objectives of the National Drug Control Strategy. Such programs and activities could indicate how ONDCP expects to achieve these objectives, such as how to educate the public about the dangers of drug use, or how to expand access to evidence-based treatment. Additionally, it does not describe how the performance measurement system monitors consistency between the drug-related goals and objectives of the National Drug Control Program agencies and ensures that each agency’s goals and budgets support and are fully consistent with the National Drug Control Strategy. ONDCP officials stated they believe the 2019 Performance Reporting System meets the statutory requirement for a description of a performance measurement system. The SUPPORT Act, as originally enacted in October 2018, no longer required a description of a performance measurement system. However, the ONDCP Technical Corrections Act of 2019, enacted in November 2019, amended the SUPPORT Act to reinstate the requirement for a description of a performance measurement system. Therefore, this requirement will apply to the 2020 National Drug Control Strategy and future Strategy iterations. As of August 2019, ONDCP filled all five coordinator positions described in the SUPPORT Act, two of which are substantively new positions. Specifically, ONDCP officials stated that they have designated officials for the new positions of performance budget coordinator and emerging and continuing threats coordinator. By filling each of these positions, ONDCP is better positioned to fulfill the responsibilities for which each position is accountable, as described in figure 2 below. As of October 2019, ONDCP officials could not provide in writing or otherwise describe key planning elements to ensure ONDCP can meet selected new requirements in the SUPPORT Act related to the development of the 2020 and future National Drug Control Strategy iterations, and related to the development and implementation of the Drug Control Data Dashboard. Figure 3 outlines the selected requirements for the Strategy, which were effective upon enactment of the SUPPORT Act in October 2018. Each of the four selected SUPPORT Act requirements described in Figure 3 requires ONDCP to include specific information in the 2020 and future National Drug Control Strategy iterations. For example, for each comprehensive, research-based, long-range, quantifiable goal, the National Drug Control Strategy must contain (1) a description of how each goal will be achieved; (2) a performance evaluation plan for each goal; and (3) a description for how each goal was determined. The National Drug Control Strategy must also include a plan to expand treatment for substance use disorders. Officials from ONDCP and selected agencies told us that in spring 2019 ONDCP requested that the National Drug Control Program agencies determine how their existing programs and activities align with the 2019 National Drug Control Strategy, including the goals and objectives articulated in the 2019 Performance Reporting System. In October 2019, ONDCP officials told us that the 2020 Strategy would be issued in accordance with the SUPPORT Act, by the first Monday in February (February 3, 2020). ONDCP also provided us with two documents to describe its approach for meeting this deadline. One document includes a table that lists SUPPORT Act requirements along with the ONDCP component(s) responsible for implementation and the deadline. The other document provides a high-level summary of the National Drug Control Strategy development and interagency review process. For example, the plan to monitor progress on the drafting of components’ sections of the Strategy notes that it is to occur through “as- needed (but frequent)” meetings with the deputy chief of staff and the components and their heads. The extensive nature of the new SUPPORT Act requirements, as described above, indicates that significant implementation steps may be necessary, such as, a description of the specific steps necessary to accomplish this overarching task, identification of who will be responsible for each step, and a schedule of interim milestones. However, neither of these documents describes such critical implementation steps. Further, neither specifies what resources or processes, for example, would be needed and by what specific milestone date ONDCP would accomplish any particular step to complete the overall work in a timely manner. For example, the document that includes the table indicates that the deadline for all requirements related to the National Drug Control Strategy is February 2020. However, some requirements associated with the development of the Strategy, such as consultation requirements, would need to be completed before the Strategy’s due date—February 2020. According to Standards for Internal Control in the Federal Government under Internal Control Principle 6, to achieve an entity’s mission, management should define objectives in specific terms so they are understood at all levels of the entity. This involves clearly defining what it is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement—in other words, key planning elements. Standards for project management also state that managing a project involves developing a plan with specific actions and milestone dates. Defining these key planning elements will help provide assurance that ONDCP’s efforts will result in a National Drug Control Strategy—for 2020 and future years—that fully addresses the requirements of the SUPPORT Act. In addition, developing and documenting these planning elements would help ONDCP structure its planning efforts through consideration of resource investments, time frames, and any necessary processes, policies, roles, and responsibilities to address each requirement. Furthermore, implementing these planning elements will help ensure that ONDCP follows a routine planning process going forward, and that future iterations of the National Drug Control Strategy that ONDCP develops are consistent with the law. Additionally, as of December 2019, ONDCP has not documented key planning elements to ensure it will meet the SUPPORT Act’s requirements for the Drug Control Data Dashboard, to make timely information publicly available on the scope and complexity of drug use and drug control activities. The SUPPORT Act includes requirements for what data is to be included in the Drug Control Data Dashboard as well as its functionality, to ensure it is searchable and sortable. Figure 4 outlines the requirements for the Drug Control Data Dashboard, which were effective upon enactment of the SUPPORT Act in October 2018. In August 2019, ONDCP posted a public version of the Drug Control Data Dashboard that included information from the 2019 Data Supplement in spreadsheet format, but did not provide all of the data required by the SUPPORT Act. For example, the Drug Control Data Dashboard does not include required data on the extent of the unmet need for substance use disorder treatment. ONDCP officials shared information regarding potential data sources they may use to fulfill the additional required data elements. In addition, ONDCP officials told us that some data requirements listed in the statute do not exist at this time. For example, ONDCP officials stated that data do not exist regarding the known and estimated flow of substances into the United States for the current calendar year and each of the three previous years. ONDCP officials stated that there was more work necessary to ensure all the required data are incorporated into the Drug Control Data Dashboard. At that time, they also stated that they expected to address all required elements by the end of 2019. However, we found that they do not have key planning elements, such as a specific timeline with interim milestones or documented plans for when and how they would complete this work. ONDCP subsequently posted an updated version of the Drug Control Data Dashboard, which we reviewed in December 2019. While the updated Drug Control Data Dashboard identifies required data elements that are unavailable, ONDCP has not addressed how or when ONDCP planned to provide them, such as by identifying alternative data sources or identifying additional resources that may be necessary for enhanced data collection efforts. The SUPPORT Act also requires the Drug Control Data Dashboard to be machine-readable and searchable by year, agency, drug, and location, to the extent practicable. Officials stated in September 2019 they planned to add this functionality to the Drug Control Data Dashboard in the fall of 2019. In written comments on a draft of this report in December 2019, ONDCP indicated that the data have been posted in a machine-readable, sortable, and searchable format. However, as of December 2019, we found that the Drug Control Data Dashboard is still not fully searchable by year, agency, drug and location. We have previously reported on key practices for agencies to follow when reporting government data. These practices describe, for example, that agencies should ensure their website’s data search functions and overall interface is intuitive to users. While effective implementation of such functions can be a significant undertaking, ONDCP does not have plans to account for timing, content, functionality, or any additional resources required to fully implement this requirement. ONDCP officials stated in September 2019 they may need to consult Congress about additional resources to fulfill all of the requirements related to the Drug Control Data Dashboard, but stated that they do not have specific plans for what resources they may request. Internal control standards call for agencies to define key planning elements, including how a task will be accomplished and associated timeframes. Developing and documenting key planning elements— including resource investments, time frames, and any necessary processes, policies, roles, and responsibilities—will better position ONDCP to fully implement all of the law’s requirements for the Drug Control Data Dashboard. Once implemented, the Drug Control Data Dashboard will help enable ONDCP to capitalize on available data to better understand the scope and nature of the drug crisis. ONDCP is responsible for leading the nation’s fight against a persistent drug epidemic that continues to devastate Americans’ lives. However, the 2019 National Drug Control Strategy does not fully comply with the law, and the agency has not developed key planning elements to help ensure it will meet its significant additional responsibilities under the SUPPORT Act. These responsibilities include issuing the National Drug Control Strategy in accordance with statutory requirements to help prioritize and measure key efforts to address the drug epidemic and creating a Drug Control Data Dashboard that contains timely information about the scope and complexity of the drug epidemic. These responsibilities also extend beyond the upcoming 2020 Strategy, with requirements to complete future Strategy iterations on a regular basis. Developing and documenting key planning elements, such as resource investments, time frames, and any necessary processes, policies, roles, and responsibilities—will help ONDCP structure its ongoing efforts. Implementing this approach will then better position ONDCP to meet statutory requirements for the next Strategy, due in February 2020, and satisfy all requirements related to the Drug Control Data Dashboard. Implementing this approach over time will also help ONDCP ensure it is meeting statutory requirements for future iterations of the National Drug Control Strategy. We are making 4 recommendations to ONDCP. The Director of ONDCP should develop and document key planning elements to help the agency meet the SUPPORT Act requirements for the 2020 National Drug Control Strategy and future Strategy iterations. These planning elements should include descriptions of resource investments, time frames, and any processes, policies, roles, and responsibilities needed to address each requirement. (Recommendation 1) The Director of ONDCP should—after developing and documenting key planning elements to meet the SUPPORT Act requirements—routinely implement an approach, based on these planning elements, to meet the requirements for the 2020 National Drug Control Strategy and future Strategy iterations. (Recommendation 2) The Director of ONDCP should develop and document key planning elements to help the agency meet the SUPPORT Act requirements to establish a Drug Control Data Dashboard that would include descriptions of resource investments, time frames, and any processes, policies, or roles, and responsibilities needed to address this requirement. (Recommendation 3) The Director of ONDCP should—after developing and documenting key planning elements—implement an approach, based on these planning elements, to meet the SUPPORT Act requirements to establish a Drug Control Data Dashboard. (Recommendation 4) We provided a draft of this report for review and comment to ONDCP, DHS, DOJ, and HHS. ONDCP provided written comments, which are summarized below and reproduced in appendix I. ONDCP, DHS, and DOJ also provided technical comments, which we incorporated, as appropriate. In an email, an HHS official stated that HHS did not have any comments on the report. In its written comments, ONDCP stated that it accepted the first two recommendations regarding the need for a robust internal planning process for National Drug Control Strategies. Specifically, the first recommendation is for ONDCP to develop and document key planning elements to help the agency meet the SUPPORT Act requirements for the 2020 National Drug Control Strategy and future Strategy iterations. The second recommendation is for ONDCP to routinely implement an approach to meet these requirements. In particular, ONDCP agreed to implement key planning elements for future Strategies that will include detailed descriptions of planned steps, identifying which ONDCP component will be responsible for each step, resource investments, interim milestones, and overall time frames. If implemented as planned, these actions would address the intent of these recommendations. Regarding the third and fourth recommendations related to the Drug Control Data Dashboard, ONDCP noted that these recommendations have been rendered moot because the agency has already fully complied with posting the Data Dashboard to its website. ONDCP also stated that it has posted to the Data Dashboard all of the drug-related data required by ONDCP’s statute that currently exists. Further, ONDCP stated that the data has been posted in machine-readable, sortable, and searchable format as required and it will be updated on a continuous basis throughout the year as new data become available. While ONDCP has included additional information on the Dashboard, the two recommendations are to develop, document, and implement key planning elements for the Dashboard to fully meet the law’s requirements, which ONDCP has not yet done. For example, ONDCP identifies in the Dashboard which of the required data elements are unavailable, such as required data on the extent of the unmet need for substance use disorder treatment. However, as stated in the report, ONDCP has not documented key planning elements for how it will address these missing data. Such planning elements could include approaches for collecting the missing data, such as articulating a plan to work with Congress to identify alternative data sources or to identify additional resources that may be necessary for enhanced data collection efforts. Furthermore, ONDCP has not developed or implemented key planning elements to ensure the Drug Control Data Dashboard has the search features noted in the statute. In its current format, the Dashboard is not fully searchable by year, agency, drug, and location. While the statute indicates that search features should have been implemented “to the extent practicable,” ONDCP did not explain why it was not practical to implement them. Therefore, we continue to believe that developing, documenting, and implementing key planning elements for the Dashboard to fully meet the law’s requirements will help enable ONDCP to capitalize on available data to better understand the scope and nature of the drug crisis. ONDCP also noted several points related to our specific findings, as discussed below. First, ONDCP noted that it did issue robust drug budget guidance to National Drug Control Program agencies during 2017 and 2018. The report acknowledges that ONDCP provided this guidance. However, as explained in the report, the guidance is statutorily required to address funding priorities developed in the National Drug Control Strategy. Since ONDCP did not issue a Strategy in 2017 or 2018, it could not meet this statutory requirement. In addition, ONDCP stated that it maintains that the 2019 National Drug Control Strategy met all statutory requirements, and therefore does not agree with our analysis of its adherence to those requirements. ONDCP also noted that the four requirements we assessed constitute only a small portion of the many requirements for the 2019 National Drug Control Strategy and that the report gives the misleading impression that ONDCP did not comply with some significant number of requirements. We recognize that there are a number of requirements for the Strategy; however, as stated in the report, our review focused on these four provisions because we determined them to be significant to ONDCP’s role in setting a strategic direction to oversee and coordinate national drug control policy, and because they are critical to ensuring a framework for measuring results. Specifically, the provisions related to including information in the Strategy related to annual quantifiable and measurable objectives and specific targets, a 5-year projection for program and budget priorities, specific drug trend assessments, and a description of a performance measurement system. As detailed in the report, we found that the 2019 Strategy addressed some—but not all—of these four statutory requirements. For example, we found that the Strategy did not include a 5-year projection for budget priorities and included only some information related to specific drug trend assessments. In its written comments, ONDCP provided additional explanation for why it did not agree with our characterization of the requirements. For example, ONDCP stated that it is not able to provide quantitative fiscal year projections for future years because this would go against long-standing Office of Management and Budget policy. Related to drug trend assessments, ONDCP noted that it reports data generated by other government agencies, and that policy research funding for ONDCP has not been appropriated since fiscal year 2011. We made recommendations, which ONDCP agreed to implement, focused on developing and implementing key planning elements such as descriptions of resource investments; timeframes; and processes, policies, and responsibilities needed to address each requirement. Implementing these planning elements could, for example, help ensure that ONDCP addresses any policy considerations or additional resources needed to help ensure that future iterations of the Strategy fully meet all statutory requirements. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of National Drug Control Policy, the Secretary of the Department of Health and Human Services, the Acting Secretary of the Department of Homeland Security, the Attorney General, and other interested parties. In addition, this report is available at no charge on GAO’s website at http://www.gao.gov. If you or your staff has any questions concerning this testimony, please contact Triana McNeil at (202) 512-8777 or McNeilT@gao.gov or Mary Denigan-Macauley at (202) 512-7114 or McNeilT@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contacts named above, Joy Booth (Assistant Director), Will Simerl (Assistant Director), Michelle Loutoo Wilson (Analyst-in- Charge), Billy Commons, Wendy Dye, Jane Eyre, Kaitlin Farquharson, Susan Hsu Michael, Amanda Miller, and Jan Montgomery made key contributions to this report.", "summary": "Almost 70,000 people died from drug overdoses in 2018, according to the latest Centers for Disease Control and Prevention data. The 2018 SUPPORT Act reauthorized ONDCP and imposed new requirements. GAO noted in its March 2019 High Risk report that the federal effort to prevent drug misuse is an emerging issue requiring close attention. Pursuant to 21 U.S.C. § 1708a(b), GAO has periodically assessed ONDCP's programs and operations. This report assesses the extent to which ONDCP (1) met selected statutory requirements related to the National Drug Control Strategy in 2017, 2018, and 2019, and (2) has planned or implemented actions to meet selected new requirements in the SUPPORT Act. GAO assessed the 2019 Strategy and companion documents against four key statutory requirements that were consistent with or similar to ONDCP's ongoing responsibilities under the SUPPORT Act. GAO also assessed ONDCP's progress in addressing seven new SUPPORT Act requirements, and interviewed ONDCP officials. The Office of National Drug Control Policy (ONDCP) is responsible for overseeing and coordinating the development and implementation of U.S. drug control policy across the federal government. However, ONDCP did not issue a National Drug Control Strategy for either 2017 or 2018, as required by statute. ONDCP was also required to assess and certify federal agencies' drug control budgets to determine if they were adequate to meet Strategy goals and objectives. Without a Strategy in 2017 and 2018, ONDCP could not complete this process according to statutory requirements. ONDCP issued a 2019 Strategy and companion documents that addressed some but not all of the selected statutory requirements GAO reviewed. For example, the Strategy and companion documents did not include the required 5-year projection for budget priorities. The October 2018 Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (SUPPORT Act) retained some requirements and introduced new ones for ONDCP. ONDCP met some SUPPORT Act requirements GAO reviewed. For example, ONDCP filled all five coordinator positions described in the SUPPORT Act. However, its approach to meeting other requirements does not incorporate key planning elements. For example, the SUPPORT Act requires that future iterations of the Strategy include a description of how each goal will be achieved, performance evaluation plans, and a plan for expanding treatment of substance use disorders. ONDCP could not provide in writing or otherwise describe its planned steps, interim milestones, resource investments, or overall timeframes—all key planning elements—that would provide assurance it can meet these requirements by the deadline for the next Strategy—February 2020. The SUPPORT Act also required ONDCP to publish an online searchable Data Dashboard of drug control data, with information including quantities of drugs and frequency of their use. While ONDCP published (and later updated) a public version of this resource on its website, as of December 2019, it was not complete (e.g., lacked required data on the unmet need for substance use disorder treatment). Further, ONDCP officials had no information on next steps for fully meeting the requirements. Developing, documenting, and implementing key planning elements to meet these requirements—including resource investments, time frames, and any processes, policies, roles, and responsibilities—would be consistent with key principles for achieving an entity's objective and standards for project management. Importantly, doing so would help ONDCP structure its planning efforts and comply with the law. GAO is making 4 recommendations to ONDCP to develop, document, and implement key planning elements to meet certain requirements in the SUPPORT Act. ONDCP agreed to implement 2 recommendations related to the Strategy, but disagreed with 2 related to the Drug Control Data Dashboard, noting that recent updates satisfy the law. GAO maintains that they do not fully do so, and that implementing key planning elements would help address the law, as discussed in the report.", "document_type": "gao"}
{"report": "Part of the Mariana Islands Archipelago, the CNMI—one of five U.S. territories—consists of 14 islands in the western Pacific Ocean, just north of Guam and about 3,200 miles west of Hawaii. In 2018, the CNMI had an estimated total population of 51,994, according to the U.S. Census Bureau. According to the CNMI’s 2016 Household, Income, and Expenditures Survey, 89 percent of the population lived on the island of Saipan, with an additional 6 percent on the island of Tinian and 5 percent on the island of Rota (see fig. 1). On October 24, 2018, Super Typhoon Yutu made landfall in the CNMI causing widespread damage to the islands. Saipan, Tinian, and Rota experienced heavy rainfall and extremely high winds, which caused damage to homes, businesses, and critical infrastructure. The typhoon severely damaged utility infrastructure on all three islands, including downed power lines, transformers, and poles, which caused power outages across all the islands (see fig. 2). Damage from Yutu also closed the Saipan International Airport, which was unable to restore full flight services until March 2019, according to the Marianas Visitors Authority. The United States captured the Northern Mariana Islands from Japan during the latter part of World War II. After the war, the U.S. Congress approved a trusteeship agreement making the United States responsible to the United Nations for the administration of the islands. In 1976, the District of the Mariana Islands entered into the Covenant with the United States establishing the island territory’s status as a self-governing commonwealth in political union with the United States. This Covenant grants the CNMI the right of self-governance over internal affairs and the United States complete responsibility and authority for matters relating to foreign affairs and defense affecting the CNMI. The Covenant initially made many federal laws applicable to the CNMI, including laws that provide federal services and financial assistance programs. However, the Covenant preserved the CNMI’s exemption from certain federal laws that had previously been inapplicable to the Trust Territory of the Pacific Islands, including certain federal minimum wage provisions and immigration laws, with some limited exceptions. Under the terms of the Covenant, the federal government has the right to apply federal law in these exempted areas without the consent of the CNMI government. In 2008, the CNRA amended the joint resolution approving the U.S.– CNMI covenant to apply federal immigration law to the CNMI, with a transition period for foreign workers that would end on December 31, 2014, unless extended by the U.S. Secretary of Labor. To provide for an orderly transition from the CNMI immigration system to the U.S. federal immigration system under the immigration laws of the United States, DHS, through USCIS, established the CW-1 program in 2011. The transition period was previously extended through December 31, 2019, under the Consolidated and Further Continuing Appropriations Act, 2015. Through the program, employers petition for nonimmigrant CW-1 permits that allow foreign workers who meet certain requirements to work temporarily in the CNMI. Since 2008, Congress has amended the CNRA several times, with provisions that affected the length of the transition period, the number of CW-1 permits allocated, and the distribution of permits. The CNRA, as amended by the Northern Mariana Islands U.S. Workforce Act of 2018, extends the CW-1 program through December 31, 2029, defines the number of permits DHS may issue annually, and reduces that number each year until the end of the transition period. In addition, the Northern Mariana Islands Long-Term Legal Residents Relief Act of June 2019 established a new category of long-term residents in the CNMI, assuming they met certain qualifications (see table 1). Figure 3 shows the numerical limits on CW-1 permits established by DHS and the numerical limits for permits specified in the Northern Mariana Islands U.S. Workforce Act of 2018. The limits shown are the maximum number of permits available for each fiscal year through the end of the transition period and may not reflect the number of permits for which employers would petition and that DHS would approve. The CNMI’s GDP, adjusted for inflation, grew every year from 2012 to 2017, but declined in 2018, according to BEA. GDP, in 2018 inflation- adjusted dollars, grew from $1.022 billion in 2015, to $1.311 billion in 2016, and to $1.646 billion in 2017, before contracting to $1.323 billion in 2018. See figure 4 below for CNMI inflation-adjusted gross domestic product over this time. BEA estimates that the CNMI’s GDP, adjusted for inflation, increased by 28.4 percent in 2016 and by 25.5 percent in 2017 (see fig. 5). BEA attributes this economic growth to exports of services, which reflected continued growth in visitor spending, particularly for casino gambling. In 2018, inflation-adjusted GDP fell by 20 percent, which reflected decreases in exports of services and private fixed investment. According to BEA, exports of services decreased 39 percent, due to a drop in visitor spending, in particular spending on casino gambling where revenues fell over 50 percent in 2018. BEA data on the value added to GDP by individual industries show the change in the composition of the CNMI economy as accommodations and amusement became the largest component of the economy and garment manufacturing declined. In particular: From 2007 to 2017, the contribution to GDP by accommodations and amusement, which partially includes the tourism sector, grew from less than 12 percent to 45 percent. From 2007 to 2017, the contribution to GDP by manufacturing declined from 19 percent to 1 percent, according to BEA. This reflects the decline of the garment manufacturing industry. Between 2007 and 2017, the contribution to GDP by government declined from about 24 percent to 16 percent of GDP. See figure 6 for value added by industry as a percentage of CNMI GDP. Following a period of growth in visitor arrivals—from about 338,000 in fiscal year 2011 to more than 653,000 in fiscal year 2017—visitor arrivals dropped in fiscal year 2018 to about 607,000 and in fiscal year 2019 to less than 425,000 (see fig. 7). According to BEA, the decline in visitors in early fiscal year 2019 was attributable to Super Typhoon Yutu, which devastated the CNMI in October 2018. In November 2018, following Super Typhoon Yutu, visitor arrivals in the CNMI plummeted from the previous month’s total of 32,108 to 5,595. This drop also represented an 88 percent decline from November 2017, when 48,039 visitors arrived in the CNMI. See figure 8 below, which compares monthly visitor arrivals for fiscal years 2018 and 2019, which started on October 1, 2017 and October 1, 2018, respectively. The composition of visitors by country of residence has also significantly shifted since 2005. Data from the Marianas Visitors Authority show that the decline in Japanese arrivals from fiscal years 2005 to 2019 was offset by the increase in arrivals from China and South Korea (see fig. 9). In particular, Japanese arrivals declined from about 376,000 in 2005 (71 percent of total visitors) to about 12,000 in 2019 (3 percent). South Korean arrivals increased from about 65,000 in 2005 (12 percent) to about 192,000 in 2019 (45 percent). Chinese arrivals increased from about 32,000 in 2005 (6 percent) to 186,000 in 2019 (44 percent). While eligible Japanese and South Korean visitors enter the CNMI under a visa waiver program, Chinese visitors are ineligible for the program but can remain temporarily in the CNMI under DHS’s discretionary parole authority, according to DHS officials. DHS exercises parole authority to allow, on a case-by-case basis, eligible nationals of China to enter the CNMI temporarily as tourists when there is significant public benefit, according to DHS. U.S. Customs and Border Protection, a DHS component, recently announced a reduction in the length of stay for Chinese citizens from 45 to 14 days for their entry into the CNMI under discretionary parole. CNMI’s Comprehensive Economic Development Strategy 2019 Update indicates that visa-free access to Chinese visitors serves as the linchpin for the CNMI casino investment. On January 29, 2020, the Governor of the CNMI issued an executive order that declared a state of significant emergency in the Commonwealth related to the spread of the coronavirus from China. Among other measures, the Governor suspended the arrival of travelers from mainland China for a period of 30 days. The Governor also directed the CNMI Secretary of Finance and the CNMI Office of Management and Budget to undertake a cost-impact analysis on the effects the ban will have on the economy. Within the tourism sector, the CNMI government has provided for the licensing of casinos on Tinian and Saipan, but both casinos have faced challenges. Tinian: Tinian Dynasty Hotel and Casino was established in 1998 to boost economic development. In operation for over a decade, the casino was investigated and cited by several federal agencies and closed in 2015. Most recently, following an Internal Revenue Service investigation, the U.S. Department of Justice filed a criminal complaint against the casino operator and two individuals on April 19, 2013, alleging that between September 2009 and April 2013 the casino failed to file reports on currency transactions greater than $10,000, and engaged in a pattern of accommodating gamblers in conducting transactions greater than $10,000. The U.S. Department of Treasury Financial Crimes Enforcement Network reported on June 3, 2015, that it had assessed a $75 million civil money penalty against the casino operator for willful and egregious violations of the Bank Secrecy Act. Saipan: In March 2014, while needing a new revenue source to fund government policies, such as a generous government retirement program, the CNMI government passed a public law that authorized and established an exclusive casino license in Saipan, which was awarded to Imperial Pacific International Holdings of Hong Kong. The operator began construction of a casino and hotel complex originally scheduled for completion no later than 36 months from the date of the casino license, or by August 2017. After facing construction challenges, the CNMI Casino Commission approved delays in the completion schedule. The new casino opened for business on July 6, 2017. As of August 2019, the casino was operating, but hotel construction had not progressed beyond the structural frame and a partial facade. According to a casino representative, labor shortages and Super Typhoon Yutu have delayed construction. Figure 10 shows the casino and hotel tower in August 2019. Several federal agencies have investigated and cited the casino operator and its construction contractors. The casino operator and its contractors have been fined for unfair labor practices: On May 30, 2017, the U.S. Department of Labor’s Occupation Safety and Health Administration reported proposed penalties of $193,750 against three contractors that exposed workers to numerous workplace hazards at the casino site in Saipan. On March 5, 2018, the U.S. Department of Labor announced it had finalized a series of settlements with contractors that would pay $13.9 million in back wages and damages to thousands of Chinese employees who had come to build the Saipan casino and hotel. On April 25, 2019, the U.S. Department of Labor announced it had secured a $3.3 million consent judgment against the casino’s developer for minimum wage, overtime, and recordkeeping violations of the Fair Labor Standards Act. On September 24, 2019, the U.S. Equal Employment Opportunity Commission filed suit against the casino, alleging the casino operator had violated federal law by subjecting female employees to sexual harassment, other sex-based discrimination, and retaliation. Financial reporting from the casino operator in 2019 included warnings about losses in 2018 and 2019. Specifically: On April 29, 2019, the casino operator released its 2018 Annual Report. In this report, independent auditors found that the casino operator had incurred a net loss of almost $3 billion in Hong Kong dollars, or about $379 million in US dollars, and had accumulated current liabilities greater than this amount, for calendar year 2018. The auditors concluded that these conditions, along with others noted in the report, indicate the existence of a material uncertainty, which may cast significant doubt on the operator’s ability to continue in business. On August 9, 2019, the casino operator issued a warning to shareholders and potential investors that it expected to record a loss for the first 6 months of 2019 as compared to a profit for the same period in 2018. On August 30, 2019, the casino operator released its 2019 Interim Report. An independent auditor noted that during the 6-month period ending June 30, 2019, the casino operator incurred a net loss of almost $1.9 billion Hong Kong dollars, or more than $240 million in U.S. dollars. The auditor included the same warning of a material uncertainty reported in the 2018 Annual Report. On November 7, 2019, the casino operator posted an announcement to the Hong Kong Stock Exchange that it had assisted in an investigation at the request of local enforcement authorities, and provided relevant information and documents as required by the enforcement authorities. Between 2014 and 2018, the ratio of United States to foreign workers in the CNMI remained close to 50 percent, according to CNMI Department of Finance tax data that identified the citizenship of workers. In 2018, United States workers constituted 49 percent of the workforce. These workers included U.S. citizens and nationals, and citizens from the Freely Associated States—the Federated States of Micronesia, the Republic of the Marshall Islands, and the Republic of Palau. The size of the CNMI workforce grew every year from 2014 through 2017 before contracting by about 2,000 workers, or 5.6 percent, in 2018, according to CNMI tax data. While the ratio between United States workers and foreign workers has remained steady over the past 5 years, the number and share of foreign workers in the overall CNMI workforce fell significantly from 2001 through 2018. Over this same period, the number of United States workers remained more stable, dropping from about 15,500 workers in 2001, to about 13,700 workers in 2018, or a 12 percent decline in total United States workers. United States workers represented 30 percent of the workforce in 2001 and 49 percent in 2018 (see fig. 11). On 2018 tax forms, the CNMI government started collecting information from employers on workers’ visa type, in response to the Northern Mariana Islands U.S. Workforce Act of 2018. According to a CNMI government report, the new information will help identify workers lawfully admitted for permanent residence. However, about one-third of the 2018 CNMI tax forms collected did not include information on the worker’s visa type. According to the report, the missing data may be attributed to the new reporting procedure for the 2018 tax form. The report indicated that after Super Typhoon Yutu devastated the islands of Saipan and Tinian, there was very little time to adequately inform and prepare employers of the new procedure for the tax form before the end of tax year 2018. Although the CNMI Department of Labor conducted a training presentation in December 2018, not all employers attended and so were unaware of the new procedure. The overall number of approved CW-1 permits fell from a high of 13,581 for fiscal year 2016 to 9,016 for fiscal year 2018. The number of approved permits rose by 23 percent for fiscal year 2019 to 11,093. However, the number of approved CW-1 permits for 2019 was about 2,000 below the updated 2019 cap established in 2018. As figure 12 shows, the number of CW-1 permits approved by USCIS for fiscal years 2012 to 2015 remained well under the annual numerical limits and exceeded or neared those limits for fiscal years 2016 through 2018. According to USCIS data, most individuals with approved CW-1 permits for fiscal year 2019 were born in the Philippines or China. In addition, as table 2 shows, the number of permits approved for workers born in China was four times higher for fiscal years 2016 and 2017 than for fiscal year 2015, although that number fell by more than half for fiscal year 2018. As we reported in 2017, firms involved in building the casino in Saipan have primarily employed Chinese workers. CW-1 permit data for fiscal year 2019 show that the CW-1 permit holders most commonly worked in building service or food service. See table 3 for the top 10 occupations for CW-1 permits for 2015 through 2019 based on 2019’s top 10 occupations. In 2017, Congress amended the CNRA to, among other things, restrict future CW-1 permits for workers in construction and extraction occupations (as defined in the U.S. Department of Labor’s Standard Occupational Classification system) to allow extensions only of those permits first issued before October 1, 2015. This restriction was later modified in 2018 to only allow permits for construction and extraction occupations to be issued for those who qualified as long-term workers, those being workers who were admitted as CW-1 workers during fiscal year 2015 and during every subsequent fiscal year beginning before July 24, 2018. The number of CW-1 permits for construction trades fell from 3,119 for fiscal year 2017 to 347 for fiscal year 2019 (see table 3 above). According to CNMI officials, the islands continue to rebuild following the devastation of Super Typhoon Yutu in late 2018. These officials noted that one of their challenges is the limited number of construction workers. We have previously reported on the limited number of construction workers in the CNMI. In 2017, when Congress restricted the use of CW-1 permits for the construction trade, employers could continue to petition for construction workers using H-2B visas. In January 2019, because of concerns about overstays and human trafficking, DHS removed the Philippines from the list of countries eligible for the H-2B program. CNMI government officials, among others, had previously voiced concerns that the removal of the Philippines from the list would make it more difficult to hire construction workers in the aftermath of Super Typhoon Yutu. On September 24, 2019, a bill, H.R.4479—the Disaster Recovery Workforce Act, was introduced in the House of Representatives that would increase by 3,000 the number of CW-1 permits available for construction and extraction occupations for fiscal years 2020 through 2022, and also included an exception to the restriction on issuing such permits to individuals other than long-term workers for those fiscal years. On December 20, 2019, an amended version of this bill, which retained the 3,000 permit increase and the exception, was signed into law as part of the Further Consolidated Appropriations Act, 2020. As provided in Public Law 115-218, long-term workers may obtain CW-1 permits valid for up to 3 years and may renew their permits for up to 3 years during the transition program. About 23 percent of FY 2019 CW-1 permit holders had maintained continuous employment in the CNMI since 2015. USCIS CW-1 permit data for fiscal years 2015 through 2019 show that, of the 11,093 foreign workers with CW-1 permits approved by USCIS for fiscal year 2019, 2,517 workers (22.7 percent) had maintained continuous employment in the CNMI since fiscal year 2015, as shown in table 4. Public Law 115-218 defines a long-term worker as an alien who was admitted to the CNMI as a CW-1 worker during fiscal year 2015 and every subsequent fiscal year prior to enactment of the law in 2018. We provided a draft of this product to the CNMI government, and the U.S. Departments of Commerce, Homeland Security, and the Interior for comment. The CNMI government and the Department of the Interior told us they had no comments on the draft report. The Departments of Commerce and Homeland Security provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Governor of the CNMI, the Secretary of Commerce, the Secretary of Homeland Security, and the Secretary of the Interior. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you and your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. The Northern Mariana Islands U.S. Workforce Act of 2018 included a provision for GAO to biennially report on the ratio between United States workers and other workers in the Commonwealth of the Northern Mariana Islands (CNMI) workforce during each of the previous 5 calendar years. This report examines (1) economic trends in the CNMI and (2) trends in the composition of the CNMI workforce, including the ratio of United States workers to foreign workers in the CNMI during the previous 5 calendar years. To examine the trends in the CNMI economy, we reviewed prior GAO reports and we obtained and analyzed data from the Department of Commerce’s Bureau of Economic Analysis (BEA) on the Gross Domestic Product (GDP) of the CNMI, including contributions to GDP by select industries, for calendar years 2007 through 2018. We converted the GDP figures from 2009 base year dollars to 2018 base year dollars. We also obtained and analyzed data on visitor arrivals from the Marianas Visitor Authority for fiscal years 2005 through 2019. We compared the data against data we have previously reported. As it relates to visitor arrivals, we discussed with officials from the Mariana Visitors Authority whether Super Typhoon Yutu disrupted the collection of data. All data were deemed reliable for our purposes. To examine the CNMI casinos, we reviewed annual reports from the Saipan casino operator, U.S. and CNMI government documents, press releases and news reports. We also interviewed CNMI government officials from the Departments of Finance and Labor, the Commonwealth Casino Commission, and a casino representative in Saipan, and reviewed documents from U.S. government agencies, to understand potential challenges that could affect the CNMI economy. To examine the trends in the CNMI workforce, we obtained and analyzed data from the CNMI government and the Department of Homeland Security (DHS). Specifically: We obtained summary level tax data from the CNMI government on December 18, 2019, which included information on the number of workers in the CNMI and their citizenship, to examine the ratio between United States and foreign workers in the CNMI workforce. These data were compiled by the CNMI Department of Finance, and were rolled up to provide counts of workers based on the workers’ reported citizenship. The data available for inclusion in this report do not match the definition of United States worker established in the 2018 Act. The Act defines a United States worker as any worker who is: a citizen or national of the United States; an alien who has been lawfully admitted for permanent residence; or a citizen of the Marshall Islands, the Federated States of Micronesia, or the Republic of Palau who has been lawfully admitted to the United States pursuant to their respective compacts of free association. In 2018, the CNMI government began collecting data on worker visa status recorded on employee tax documents filed by the employer. But about one-third of collected tax forms did not include information about the visa type or status of the worker. Therefore, with incomplete data, we could not identify people lawfully admitted for permanent residence who remain foreign citizens. The summary-level citizenship data have been used in prior GAO reports. We reviewed those reports to ensure that the data were being collected using the same procedures as in the past, and we were using the data in the same manner. We also interviewed knowledgeable CNMI officials about the data collection methods and how the data were extracted from CNMI government data systems, and checked available documentation from those prior GAO reports to confirm our use of them. We found the data were sufficiently reliable for our purposes of summarizing the numbers of United States workers and foreign workers. We obtained record-level data (such as worker’s name, worker’s date of birth, and petition receipt number) from DHS’s U.S. Citizenship and Immigration Services (USCIS) for fiscal years 2012 through 2019 to examine CNMI-Only Transitional Worker (CW-1) program information on workers since the program began. We compared the annual number of approved CW-1 permits with the annual numerical limit, or cap, on CW-1 permits that USCIS set for fiscal years 2012 through 2019. Using computerized algorithms, we analyzed the data for key characteristics of workers who were granted CW-1 permits, such as years of continuous employment in the CNMI. To assess the reliability of the USCIS data, we tested the data electronically to identify and resolve inconsistencies in personally identifiable information for permit holders and to ensure accuracy in tracking these individuals over time, and we discussed our results with USCIS officials. We have previously used the same methods for assessing the reliability of this data, and USCIS had agreed with that methodology. We determined that the USCIS data were sufficiently reliable for our purposes of reporting on characteristics of CW-1 permit holders for fiscal year 2019 and for identifying trends over time. We conducted this performance audit from August 2019 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Emil Friberg (Assistant Director), Joshua Akery, Kathryn H. Bernet, Martin de Alteriis, Christopher Hayes (Analyst in Charge), Christopher Keblitis, Andrew Kurtzman, Moon Parks, Aldo Salerno, and Alexander Welsh made key contributions to this report.", "summary": "The Consolidated Natural Resources Act of 2008, which amended the 1976 covenant between the United States and the CNMI, established federal control of CNMI immigration beginning in 2009. Under the act, the Department of Homeland Security began implementing a foreign worker permit program that was specific to the CNMI. The Northern Mariana Islands U.S. Workforce Act of 2018 extended the CNMI-Only Transitional Worker (CW-1) program for 10 additional years, through the end of 2029. The Northern Mariana Islands U.S. Workforce Act of 2018 included a provision for GAO to examine the ratio of United States workers to other workers over the 5 previous calendar years in the CNMI. This report examines (1) recent economic trends in the CNMI through 2018, and (2) recent trends in the composition of the CNMI workforce from 2001 through 2018, including the ratio of United States workers to foreign workers for each of the 5 previous calendar years. GAO analyzed CNMI government and U.S. agency data, prior GAO reports, and interviewed officials from the CNMI government, and the U.S. Departments of Commerce, Homeland Security, the Interior, and Labor. Although the Commonwealth of the Northern Mariana Islands (CNMI) economy grew in 2016 and 2017, it declined in 2018. The U.S. Department of Commerce's Bureau of Economic Analysis (BEA) reports that the CNMI's gross domestic product (GDP) grew 28.4 percent in 2016 and 25.5 percent in 2017, which reflected continued growth in visitor spending, particularly for casino gambling. However, BEA estimates that GDP in the CNMI fell by 20 percent in 2018, with a sharp drop in tourist spending and casino gambling revenues following the severe damage of Super Typhoon Yutu, which made landfall in October 2018. According to BEA, revenue from casino gambling dropped over 50 percent in 2018. In August 2019, the parent company of the casino in the CNMI warned shareholders and potential investors that it expected to record a loss for the first 6 months of 2019 as compared with a profit for the same period in 2018. The company's independent auditor also concluded that the financial information for the first 6 months of 2019 might cast significant doubt on the ability of the company to continue as a going concern. The ratio of United States workers to foreign workers in the CNMI remained close to 50 percent from 2014 through 2018, with United States workers making up 49 percent of the workforce in 2018, according to CNMI tax data. The size of the workforce grew each year from 2014 through 2017, before contracting by almost 2,000 workers in 2018. For 2018, the Department of Homeland Security approved about 9,000 CW-1 foreign worker permits, and approved more than 11,000 permits for 2019.", "document_type": "gao"}
{"report": "Congress and executive branch agencies have made consistent progress in addressing many of the actions we have identified since 2011, as shown in figure 2 and table 4. As of March 2020, Congress and executive branch agencies had fully or partially addressed nearly 80 percent of the actions we identified from 2011 to 2019. See GAO’s online Action Tracker for the status of all actions. As a result of steps Congress and executive branch agencies have taken to address our open actions, we have identified approximately $429 billion in total financial benefits, including $166 billion identified since our last report. About $393 billion of the total benefits accrued between 2010 and 2019, while approximately $36 billion are projected to accrue in 2020 or later, as shown in figure 3. Since our first annual report in 2011, these benefits have contributed to missions across the federal government, as shown in figure 4. Table 5 highlights examples of results achieved in addressing actions we identified over the past 10 years. Our suggested actions, when implemented, often result in benefits such as strengthened program oversight; improvements in major government programs or agencies; more effective and equitable government; and increased international security. The following recent examples illustrate these types of benefits. Housing Assistance (2012-28): The federal government and state and local entities provide both rental assistance and affordable housing through a wide variety of programs. In February 2012, we found instances of fragmentation and overlap among federal rental assistance program. We recommended that the Secretary of the Department of Housing and Urban Development (HUD) work with states and localities to develop an approach for compiling and reporting on the collective performance of federal, state, and local rental assistance programs. In 2019, Executive Order 13878 established the White House Council on Eliminating Regulatory Barriers to Affordable Housing. The establishment of the council and the actions taken by HUD are positive steps for reaching out to states and localities and allowing Congress, decision makers, and stakeholders to evaluate collective performance data and provide mechanisms for setting priorities, allocating resources, and restructuring efforts, as needed, to achieve long-term housing goals. Military and Veterans Health Care (2012-15): The Departments of Defense (DOD) and Veterans Affairs (VA) play key roles in offering support to servicemembers and veterans through various programs and activities. In 2012, we found that the departments needed to improve integration across care coordination and case management programs to reduce duplication and better assist servicemembers, veterans, and their families. We recommended that the Secretaries of Defense and Veterans Affairs develop and implement a plan to strengthen functional integration across all DOD and VA care coordination and case management. The departments took several steps between 2012 and 2019 to address this, including establishing a Care Coordination Business Line within their joint Health Executive Committee. This function is intended to develop mechanisms for making joint policy decisions, involve the appropriate decision makers for timely implementation of policy, and ensure that outcomes and goals are identified and achieved, among other things. By taking these steps, DOD and VA strengthen their oversight and more closely integrate care coordination efforts. Tax Policies and Enforcement (2015-17): Since 1980, partnerships’ and S corporations’ share of business receipts increased greatly. These entities generally do not pay income taxes; instead, income or losses (hundreds of billions of dollars annually) flow through to partners and shareholders on their personal income tax returns. In 2014, we found that the full extent of partnership and S corporation income misreporting is unknown. Electronic filed (e-filed) tax returns provide the Internal Revenue Service (IRS) with digital information to improve enforcement operations and service to taxpayers. We recommended that Congress consider expanding the mandate that partnerships and corporations e-file their tax returns to cover a greater share of filed returns. In 2018, Congress passed and the President signed legislation lowering the e-file threshold for partnership and corporation returns. Requiring greater e-filing of tax return information will help IRS identify which partnership and corporation tax returns would be most productive to examine, and could reduce the number of compliant taxpayers selected for examination. Further, expanded e-filing will reduce IRS’s tax return processing costs. Coordination of Overseas Stabilization Efforts (2019-12): The United States has a national security interest in promoting stability in countries affected by violent conflict. We looked at how three federal agencies and an independent institute support conflict prevention, mitigation, and stabilization efforts, such as removing explosives hidden near homes. In 2019, we found that although these entities have worked together in Iraq, Nigeria, and Syria, they had not documented their agreement on key areas of collaboration, such as clarifying roles and responsibilities for stabilization efforts. We recommended that the Departments of State and Defense and the U.S. Agency for International Development should document their agreement to coordinate U.S. stabilization efforts. In 2019, the agencies took several steps to address this such as publishing a directive with the agreed upon definition of stabilization, description of agency roles and responsibilities, and related policies and guidance. Articulating their agreement in formal documents should help strengthen the agencies’ coordination of U.S. stabilization efforts and mitigate the risks associated with fragmentation, overlap, and duplication. Congress and executive branch agencies have made progress toward addressing the 1,076 actions we have identified since 2011. However, further efforts are needed to fully address the 467 actions that are partially addressed, not addressed, or new. We estimate that at least tens of billions of dollars in additional financial benefits could be realized should Congress and executive branch agencies fully address open actions, and other improvements can be achieved as well. In our 2011 to 2020 annual reports, we directed 110 actions to Congress, including the three new congressional actions we identified in 2020. Of the 110 actions, 58 (about 53 percent) remained open as of March 2020. Appendix V has a full list of all open congressional actions. We also directed 966 actions to executive branch agencies, including 165 new actions identified in 2020. As shown in figure 5, these actions span the government and are directed to dozens of federal agencies. Six of these agencies—DOD, IRS, OMB, VA, and the Departments of Health and Human Services (HHS) and Homeland Security, have more than 20 open actions. Of the 966 actions, 409 (42 percent) remained open as of March 2020. A significant number of open actions are directed to four agencies that made up about 79 percent of federal outlays in fiscal year 2019—HHS, the Social Security Administration, the Department of the Treasury (Treasury), and DOD. Figure 6 highlights agencies with open actions as well as their fiscal year 2019 share of federal outlays. We identified potential financial benefits associated with many open areas with actions directed to Congress and the executive branch. These benefits range from millions of dollars to tens of billions of dollars. For example, DOD could potentially save hundreds of millions of dollars annually by accurately measuring and reducing excess funded, unfinished work at military depots. In another example, IRS should establish a formal collaborative mechanism with the Department of Labor to better manage fragmented efforts and enhance compliance for certain individual retirement accounts that engaged in prohibited transactions, and thereby potentially increase revenues by millions of dollars. Table 6 highlights examples of areas where additional action could potentially result in financial benefits of $1 billion or more. Table 7 shows selected areas where Congress and executive branch agencies can take action to achieve other benefits, such as increased public safety, and more effective delivery of services. This report was prepared under the coordination of Jessica Lucas-Judy, Director, Strategic Issues, who may be reached at (202) 512-9110 or lucasjudyj@gao.gov, and J. Christopher Mihm, Managing Director, Strategic Issues, who may be reached at (202) 512-6806 or mihmj@gao.gov. Specific questions about individual issues may be directed to the area contact listed at the end of each summary. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Section 21 of Public Law 111-139, enacted in February 2010, requires us to conduct routine investigations to identify federal programs, agencies, offices, and initiatives with duplicative goals and activities within departments and government-wide. This provision also requires us to report annually to Congress on our findings, including the cost of such duplication, with recommendations for consolidation and elimination to reduce duplication and specific rescissions (legislation canceling previously enacted budget authority) that Congress may wish to consider. Our objectives in this report are to (1) identify potentially significant areas of fragmentation, overlap, and duplication and opportunities for cost savings and enhanced revenues that exist across the federal government; (2) assess to what extent have Congress and executive branch agencies addressed actions in our 2011 to 2019 annual reports; and (3) highlight examples of open actions directed to Congress or key executive branch agencies. For the purposes of our analysis, we used the term “fragmentation” to refer to circumstances in which more than one federal agency (or more than one organization within an agency) is involved in the same broad area of national need. We used the term “overlap” when multiple agencies or programs have similar goals, engage in similar activities or strategies to achieve them, or target similar beneficiaries. We considered “duplication” to occur when two or more agencies or programs are engaged in the same activities or provide the same services to the same beneficiaries. While fragmentation, overlap, and duplication are associated with a range of potential costs and benefits, we include them in this report only if there may be opportunities to improve how the government delivers these services. This report presents 18 new areas of fragmentation, overlap, or duplication where greater efficiencies or effectiveness in providing government services may be achievable. The report also highlights 11 other new opportunities for potential cost savings or revenue enhancements. In addition to these 29 new areas, we identified 88 new actions related to 10 existing areas presented in our 2011 to 2019 annual reports. To identify what actions, if any, exist to address fragmentation, overlap, and duplication and take advantage of opportunities for cost savings and enhanced revenues, we reviewed and updated our prior work and recommendations to identify what additional actions Congress may wish to consider and agencies may need to take. For example, we used our prior work identifying leading practices that could help agencies address challenges associated with interagency coordination and collaboration and with evaluating performance and results in achieving efficiencies. To identify the potential financial and other benefits that might result from actions addressing fragmentation, overlap, or duplication, or taking advantage of other opportunities for cost savings and enhanced revenues, we collected and analyzed data on costs and potential savings to the extent they were available. Estimating the benefits that could result from addressing these actions was not possible in some cases because information about the extent and impact of fragmentation, overlap, and duplication among certain programs was not available. Further, the financial benefits that can be achieved from addressing fragmentation, overlap, or duplication or taking advantage of other opportunities for cost savings and enhanced revenues were not always quantifiable in advance of congressional and executive branch decision- making. In addition, the needed information was not readily available on, among other things, program performance, the level of funding devoted to duplicative programs, or the implementation costs and time frames that might be associated with program consolidations or terminations. As possible, we used partial data and conservative assumptions to provide rough estimates of potential savings magnitude, when more precise estimates were not possible. Appendix VI provides additional information on the federal programs or other activities related to the new areas of fragmentation, overlap, duplication, and cost savings or revenue enhancement discussed in this report, including budgetary information when available. We assessed the reliability of any computer-processed data that materially affected our findings, including cost savings and revenue enhancement estimates. The steps that we take to assess the reliability of data vary but are chosen to accomplish the auditing requirement that the data be sufficiently reliable given the purposes for which they are used in our products. We review published documentation about the data system and inspector general or other reviews of the data. We may interview agency or outside officials to better understand system controls and to assure ourselves that we understand how the data are produced and any limitations associated with the data. We may also electronically test the data to see whether values in the data conform to agency testimony and documentation regarding valid values, or we may compare data to source documents. In addition to these steps, we often compare data with other sources as a way to corroborate our findings. For each new area in this report, specific information on data reliability is located in the related products. We provided drafts of our new area summaries to the relevant agencies for their review and incorporated these comments as appropriate. To examine the extent to which Congress and executive branch agencies have made progress in implementing the 908 actions in the approximately 325 areas we have reported on in previous annual reports on fragmentation, overlap, and duplication, we reviewed relevant legislation and agency documents such as budgets, policies, strategic and implementation plans, guidance, and other information between April 2019 and March 2020. We also analyzed, to the extent possible, whether financial or other benefits have been attained, and included this information as appropriate (see discussion below on the methodology we used to estimate financial benefits.) In addition, we discussed the implementation status of the actions with officials at the relevant agencies. Throughout this report, we present our counts as of March 2020 because that is when we received our last updates. The progress statements and updates are published on GAO’s Action Tracker. We used the following criteria in assessing the status of actions: In assessing actions suggested for Congress, we applied the following criteria: “addressed” means relevant legislation has been enacted and addresses all aspects of the action needed; “partially addressed” means a relevant bill has passed a committee, the House of Representatives, or the Senate during the current congressional session, or relevant legislation has been enacted but only addressed part of the action needed; and “not addressed” means a bill may have been introduced but did not pass out of a committee, or no relevant legislation has been introduced. Actions suggested for Congress may also move to “addressed” or “partially addressed” with or without relevant legislation if an executive branch agency takes steps that address all or part of the action needed. At the beginning of a new congressional session, we reapply the criteria. As a result, the status of an action may move from partially addressed to not addressed if relevant legislation is not reintroduced from the prior congressional session. In assessing actions suggested for the executive branch, we applied the following criteria: “addressed” means implementation of the action needed has been completed; “partially addressed” means the action needed is in development or started but not yet completed; and “not addressed” means the administration, the agencies, or both have made minimal or no progress toward implementing the action needed. Since 2011, we have categorized 80 actions as “other” and are no longer assessing these actions. We categorized 48 “other” actions as “consolidated or other.” In most cases, “consolidated or other” actions were replaced or subsumed by new actions based on additional audit work or other relevant information. We also categorized 32 of the “other” actions as “closed-not addressed.” Actions are generally “closed-not addressed” when the action is no longer relevant because of changing circumstances. To calculate the total financial benefits resulting from actions already taken (addressed or partially addressed) and potential financial benefits from actions that are not fully addressed, we compiled available estimates for all of the actions from GAO’s Action Tracker, from 2011 through 2019, and from reports identified for inclusion in the 2020 annual report, and linked supporting documentation to those estimates. Each estimate was reviewed by one of our technical specialists to ensure that estimates were based on reasonably sound methodologies. The financial benefits estimates came from a variety of sources, including our analysis, Congressional Budget Office estimates, individual agencies, the Joint Committee on Taxation, and others. Because of differences in time frames, underlying assumptions, quality of data and methodologies among these individual estimates, any attempt to generate a total will be associated with uncertainty that limits the precision of this calculation. As a result, our totals represent a rough estimate of financial benefits, rather than an exact total. For actions that have already been taken, individual estimates of realized financial benefits covered a range of time periods stretching from 2010 through 2029. To calculate the total amount of realized financial benefits that have already accrued and those that are expected to accrue, we separated those that accrued from 2010 through 2019 and those expected to accrue between 2020 and 2029. For individual estimates that span both periods, we assumed that financial benefits were distributed evenly over the period of the estimate. For each category, we summed the individual estimates to generate a total. To account for uncertainty and imprecision resulting from the differences in individual estimates, we present these realized savings to the nearest billion dollars, rounded down. There is a higher level of uncertainty for estimates of potential financial benefits that could accrue from actions not yet taken because these estimates are dependent on whether, how, and when agencies and Congress take our recommended actions, or due to lack of sufficiently detailed data to make reliable forecasts. As a result, many estimates of potential savings are notionally stated using terms like millions, tens of millions, or billions, to demonstrate a rough magnitude without providing a more precise estimate. Further, many of these estimates are not tied to specific time frames for the same reason. To calculate a total for potential savings, with a conservative approach, we used the minimum number associated with each term. To account for the increased uncertainty of potential estimates and the imprecision resulting from differences among individual estimates, we calculated potential financial benefits to the nearest $10 billion, rounded down, and presented our results using a notional term. This report is based upon work we previously conducted in accordance with generally accepted government auditing standards. Generally accepted government auditing standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix presents 18 new areas in which we found evidence of fragmentation, overlap, or duplication among federal government programs. GAO provided a draft of this report section to DOD for review and comment. In its response, DOD officials stated that Army Futures Command is taking the steps necessary to implement GAO’s recommendations, as reflected above. Army Modernization: Army Futures Command Should Take Steps to Improve Small Business Engagement for Research and Development. GAO-19-511. Washington, D.C.: July 17, 2019. GAO provided DOD with a draft of this report section for comment. DOD provided technical comments, which GAO incorporated as appropriate. DOD Utilities Privatization: Improved Data Collection and Lessons Learned Archive Could Help Reduce Time to Award Contracts. GAO-20- 104. Washington, D.C.: April 2, 2020. GAO provided a draft of this report section to SBA for review and comment. SBA stated it plans to continue to explore opportunities for collaboration with USDA and Treasury. SBA also provided technical comments, which GAO incorporated as appropriate. SBA Microloan Program: Opportunities Exist to Strengthen Program Performance Measurement, Collaboration, and Reporting. GAO-20-49. Washington, D.C.: November 19, 2019. GAO provided a draft of this report section to FinCEN for review and comment. In its comments, FinCEN continued to disagree with the recommendations and stated that no futures industry association had applied for BSA advisory group membership and that it advised CFTC staff on the areas that the National Futures Association should include as part of a request for direct BSA data access. GAO maintains that the recommendations are both valid, believes that FinCEN advising CFTC is a good first step, and will continue to monitor the implementation of these recommendations. Bank Secrecy Act: Agencies and Financial Institutions Share Information but Metrics and Feedback Not Regularly Provided. GAO-19-582. Washington, D.C.: August 27, 2019. GAO provided a draft of this report section to OMB for review and comment. OMB did not provide comments on this report section. DATA Act: Quality of Data Submissions Has Improved but Further Action Is Needed to Disclose Known Data Limitations. GAO-20-75. Washington, D.C.: November 8, 2019. DATA Act: Data Standards Established, but More Complete and Timely Guidance Is Needed to Ensure Effective Implementation. GAO-16-261. Washington, D.C.: January 29, 2016. DATA Act: Progress Made in Initial Implementation but Challenges Must be Addressed as Efforts Proceed. GAO-15-752T. Washington, D.C.: July 29, 2015. GAO provided a draft of this report section to the Office of Management and Budget (OMB), CNCS, Education, HHS, DOL, and USAID for review and comment. In its response, HHS provided documentation in February 2020 about the actions it plans to take—as part of its implementation of the Foundations for Evidence-Based Policymaking Act—to address the two recommendations directed to it. GAO will monitor HHS’s actions, which GAO believes would likely address its recommendations, if effectively implemented. CNCS and DOL informed GAO they had no comments on this report section. USAID provided technical comments, which GAO incorporated, as appropriate. OMB and Education did not provide comments. Evidence-Based Policymaking: Selected Agencies Coordinate Activities, but Could Enhance Collaboration. GAO-20-119. Washington, D.C.: December 4, 2019. GAO provided a draft of this report section to IRS and DOL for review and comment. In their March 2020 responses, IRS and DOL stated that they agreed to formalize collaboration on IRA prohibited transactions. The new information sharing process will be documented in forthcoming DOL procedures. In addition, IRS provided technical comments, which GAO incorporated as appropriate. Individual Retirement Accounts: IRS Could Better Inform Taxpayers About and Detect Noncompliance Related to Unconventional Assets, GAO-20-210. Washington, D.C.: January 27, 2020. Individual Retirement Accounts: Formalizing Labor’s and IRS’s Collaborative Efforts Could Strengthen Oversight of Prohibited Transactions, GAO-19-495. Washington, D.C.: June 7, 2019. GAO provided a draft of this report section to IRS for review and comment. IRS did not provide comments on this report section. Taxpayer Information: IRS Needs to Improve Oversight of Third Party Cybersecurity Practices. GAO-19-340. Washington, D.C.: May 9, 2019. GAO provided a draft of this report section to IRS for review and comment. In February 2020, IRS sent GAO a response saying the agency is working to eliminate conditions that inhibit the agency’s ability to identify abusive tax schemes by evaluating existing database project codes to link data across audit divisions and improve the analysis of data monitoring and mining. Tax-Law Enforcement: IRS Could Better Leverage Existing Data to Identify Abusive Schemes Involving Tax-Exempt Entities. GAO-19-491. Washington, D.C.: September 5, 2019. GAO provided a draft of this report section to the Department of Health and Human Services (HHS) for review and comment. HHS commented that ASPR will explore funding opportunities to support an exercise of its federal patient movement framework with its support agencies. In addition, HHS officials stated that ASPR would continue to support interagency liaison officers to provide updates on available resources. While GAO agrees that HHS should continue this practice, the misalignment GAO identified underscores that this was not adequate during the response to Hurricanes Irma and Maria in the U.S. Virgin Islands and Puerto Rico. Moreover, ASPR officials acknowledged that more needs to be done to better understand the resources available. Finally, HHS commented that ASPR has implemented air transportation contracts to begin decreasing its reliance on DOD. GAO will continue to monitor the implementation of these recommendations. Disaster Response: HHS Should Address Deficiencies Highlighted by Recent Hurricanes in the U.S. Virgin Islands and Puerto Rico. GAO-19- 592. Washington, D.C.: September 20, 2019. GAO provided a draft of this report section to VA for review and comment. VA provided technical comments, which GAO incorporated as appropriate. VA Health Care: Veterans’ Use of Long-Term Care Is Increasing, and VA Faces Challenges in Meeting the Demand. GAO-20-284. Washington, D.C.: February. 19, 2020. GAO provided a draft of this report section to Coast Guard, through DHS, for review and comment. The Coast Guard, through DHS, provided technical comments, which GAO incorporated as appropriate. The Coast Guard did not agree with the recommendation in its November 2019 response to GAO’s draft report. At that time, DHS further stated that GAO’s conclusions illustrate a fundamental misunderstanding of the corresponding missions of Specialized Forces units. GAO continues to maintain that overlapping capabilities among units could indicate inefficiencies in how units are used as well as missed opportunities for use in others. In its technical comments provided in March 2020, the Coast Guard indicated that as of February 2020 it had not conducted the analysis necessary to fully identify potential overlap among the units. The Coast Guard stated that it is planning to begin analyzing the units this fiscal year. In line with GAO’s recommendation to analyze potential overlap in capabilities, the Coast Guard should include the cost savings of shutting down a unit from each Specialized Force type and explain the impacts. Coast Guard: Assessing Deployable Specialized Forces’ Workforce Needs Could Improve Efficiency and Reduce Potential Overlap or Gaps in Capabilities. GAO-20-33. Washington, D.C.: November 21, 2019. GAO provided a draft of this report section to DHS for review and comment. DHS provided technical comments, which GAO incorporated as appropriate. Southwest Border: Actions Needed to Address Fragmentation in DHS’s Processes for Apprehended Family Members. GAO-20-274. Washington, D.C.: Feb. 19, 2020. GAO provided a draft of this report section to DHS for review and comment. TSA provided technical comments, which GAO incorporated as appropriate. Transportation Security: DHS Should Communicate the National Strategy’s Alignment with Related Strategies to Guide Federal Efforts. GAO-20-88. Washington, D.C.: November 19, 2019. GAO provided a draft of this report section to DHS for review and comment. DHS officials said DHS has taken initial actions to address GAO’s recommendation, including updating the related Standard Operating Procedure. GAO believes this is a good first step and will continue to monitor the implementation of this recommendation. Surface Transportation: TSA Should Improve Coordination Procedures for Its Security Training Program. GAO-20-185. Washington, D.C.: November 20, 2019. GAO provided a draft of this report section to State for review and comment. In its February 2020 response, State did not comment specifically on whether it agreed with GAO’s revised recommendation. However, it reiterated its disagreement with aspects of the underlying GAO report’s objectives, scope, and methodology. GAO addressed this disagreement in detail in its report and maintains that GAO’s approach provided a reliable and reasonably comprehensive review of the results of U.S. assistance to the Northern Triangle toward achieving key U.S. objectives set forth in the Strategy. U.S. Assistance to Central America: Department of State Should Establish a Comprehensive Plan to Assess Progress toward Prosperity, Governance, and Security. GAO-19-590. Washington, D.C.: September 26, 2019. GAO provided a draft of this report section to Defense, Energy, and the Departments of Commerce (for the National Oceanic and Atmospheric Administration) and Health and Human Services (for the National Institutes of Health), as well as the National Science Foundation and OSTP for review and comment. The National Institutes of Health and the National Science Foundation provided technical comments, which GAO incorporated as appropriate. OSTP said it had no further comments, and the National Oceanic and Atmospheric Administration, Defense, and Energy did not provide comments. Federal Research: Additional Actions Needed to Improve Public Access to Research Results. GAO-20-81. Washington, D.C.: November 21, 2019. GAO provided a draft of this report section to USDA for review and comment. USDA officials took issue with the characterization of their nutrition education efforts as fragmented, stating that coordination must consider the legislative authority each program has to deliver nutrition education to meet the needs of program target populations and audiences. GAO agrees that a consideration of each program’s legislative authority is important. However, GAO believes that USDA could address the fragmentation GAO identified, which refers to the involvement of multiple USDA agencies and programs in administering the department’s nutrition education efforts, consistent with a consideration of program authority. USDA officials continue to agree that the department needs to improve coordination of its nutrition education efforts. USDA officials described initial actions the department has taken to address GAO’s recommendation, including establishing a nutrition education working group that represents agencies across the department and planning an intradepartmental workshop that will include a focus on nutrition education. In addition, USDA issued the USDA Science Blueprint to outline the department’s nutrition science implementation strategies and nutrition and health promotion objectives. GAO will continue to monitor implementation of this recommendation. Further, GAO will monitor the role of the nutrition education working group going forward and consider the extent to which it provides cross- department leadership for USDA’s nutrition education efforts. Nutrition Education: USDA Actions Needed to Assess Effectiveness, Coordinate Programs, and Leverage Expertise. GAO-19-572. Washington, D.C.: July 25, 2019. This appendix summarizes 11 new areas for Congress or executive branch agencies to consider taking action that could either reduce the cost of government operations or enhance revenue collections for the Treasury. This page is intentionally left blank. GAO provided a draft of this report section to DOD for review and comment. DOD commented that the department will continue to work on improving its monitoring and evaluation of its efficiency and reform initiatives. DOD Needs to Address Inefficiencies and Implement Reform across Its Defense Agencies and DOD Field Activities. GAO-18-592. Washington, D.C.: September 6, 2018. GAO provided a draft of this section to the DOD for review and comment. DOD did not provide comments on this report section. Depot Maintenance: DOD Should Adopt a Metric That Provides Quality Information on Funded Unfinished Work. GAO-19-452. Washington, D.C.: July 26, 2019. GAO provided a draft of this report section to Ginnie Mae for review and comment. Ginnie Mae did not have any comments on the draft but noted that it is working diligently on the recommendations. Ginnie Mae: Risk Management and Staffing-Related Challenges Need to Be Addressed. GAO-19-191. Washington, D.C.: April 3, 2019. GAO provided a draft of this report section to IRS for review and comment. IRS’s technical comments were incorporated above. Tax Debt Collection Contracts: IRS Analysis Could Help Improve Program Results and Better Protect Taxpayers. GAO-19-193. Washington, D.C.: March 29, 2019. GAO provided a draft of this report section to IRS for review and comment. In its response, IRS stated that it is working with Treasury on guidance to address third-party reporting on certain taxable transactions involving virtual currency. GAO will review this guidance when it is available. Virtual Currencies: Additional Information Reporting and Clarified Guidance Could Improve Tax Compliance. GAO-20-188. Washington, D.C: February 12, 2020. GAO provided a draft of this report section to CMS for review and comment. In its written comments, CMS provided an update on its actions to address the first recommendation, which GAO incorporated. CMS did not provide information on the second recommendation. GAO will continue to monitor CMS’s implementation of these recommendations. Medicaid Providers: CMS Oversight Should Ensure State Implementation of Screening and Enrollment Requirements. GAO-20-8. Washington, D.C.: October 10, 2019. GAO provided a draft of this report section to VA for review and comment. VA did not provide comments on this report section. Veterans Health Care: VA Needs to Improve Its Allocation and Monitoring of Funding. GAO-19-670. Washington, D.C.: September 23, 2019. GAO provided a draft of this report section to DOD for review and comment. DOD explained that current policy allows and encourages the use of open source software where it meets agency needs. In addition, DOD stated that GAO’s recommendations focus on DOD's role as a producer, rather than as a consumer, of open source software. A DOD official explained that it is not reasonable to conclude that the projected savings will result from the implementation of GAO’s recommendations. However, DOD entities can consume open source software that other DOD entities produce. GAO maintains that this very consumption of open source software developed elsewhere in DOD could reduce development costs and potentially produce overall cost savings. Information Technology: DOD Needs to Fully Implement Program for Piloting Open Source Software. GAO-19-457. Washington, D.C.: September 10, 2019. GAO provided a draft of this report section to DOD for review and comment. DOD did not provide comments on this report section. Defense Logistics Agreement: DOD Should Improve Oversight and Seek Payment from Foreign Partners for Thousands of Orders It Identifies as Overdue. GAO-20-309. Washington, D.C.: March 4, 2020. GAO provided a draft of this report section to CBP for review and comment. CBP provided technical comments, which GAO incorporated, as appropriate. Customs and Border Protection: Risk Management for Tariff Refunds Should Be Improved. GAO-20-182. Washington, D.C.: December 17, 2019. GAO provided a draft of this report section to Education for review and comment. Education provided technical comments, which GAO incorporated. Federal Student Loans: Education Needs to Verify Borrowers’ Information for Income-Driven Repayment Plans. GAO-19-347. Washington, D.C.: June 25, 2019. We are adding 88 new actions based on GAO reports that fall within the scope of 10 existing areas identified in prior annual reports. In March 2020, GAO identified 12 actions for the Navy to improve its acquisition practices and ensure ships can be efficiently sustained, potentially saving billions of dollars. addressed, one action has been partially addressed, and one action has not been addressed. See the Action Tracker for more information. GAO reported in March 2020 on challenges identifying, evaluating, and mitigating ship sustainment risks during the acquisition process for every new warship class—such as aircraft carriers and submarines—that, if fixed, could save billions of dollars. GAO found 150 examples of systemic maintenance problems, such as failed engines and non-functional plumbing. To correct just 30 percent of these problems, GAO found that it would cost the Navy $4.2 billion. Many of these problems could have been prevented with some attention to future maintenance concerns when designing and building the ships. GAO also found that the Navy underestimated the costs to maintain some ships by $130 billion. GAO made 11 recommendations to help the Navy focus on maintenance earlier and one suggestion to Congress to enhance oversight. New Actions: GAO recommended in March 2020 that the Department of Defense (DOD) improve its policy for setting sustainment requirements and the Navy then revisit its requirements to comply with the new policy. GAO also recommended that DOD and the Navy take steps to improve sustainment in the acquisition process. GAO also asked Congress to consider developing an oversight mechanism for evaluating shipbuilding programs sustainment cost estimate growth during the acquisition process. While GAO cannot precisely estimate the financial benefits from these actions, if the Navy could eliminate some of the sustainment problems and even 1 percent of the maintenance cost growth GAO identified, it could amount to billions of dollars in savings. Agency Comments and GAO’s Evaluation: DOD agreed with eight and partially agreed with three recommendations. GAO provided a draft of this report section to DOD for comment. DOD provided technical comments, which GAO incorporated as appropriate. In September 2019, GAO identified two new actions to improve the Department of the Interior’s valuations of offshore oil and gas resources, each of which could increase the amount of revenue collected by tens of millions of dollars annually. partially addressed, and two actions have not been addressed. See the Action Tracker for more information. Production of oil and gas in federal waters generated about $90 billion in revenue from 2006 through 2018 including from industry bids for leasing rights. However, GAO found that the Department of the Interior’s (Interior) Bureau of Ocean Energy Management (BOEM) undervalues federal offshore oil and gas resources, leading it to collect less bid revenue than it otherwise would. Specifically, the bureau (1) forecast unreasonably high levels of depreciation on lease value between lease sales, which lowered bid revenue by about $873 million from March 2000 through June 2018; and (2) adjusted some valuations downward to justify accepting bids, which lowered bid revenue by about $567 million over the same time period. New Actions: The bureau Director should (1) enlist an independent third party to examine the extent to which the bureau's depreciation forecasts assure the receipt of fair market value, and make changes as appropriate; and (2) take steps to ensure that the bureau’s bid valuation process is not biased toward adjusting valuations downward. In its comments on the report, Interior disagreed with the first recommendation and partially agreed with the second, disagreeing with GAO’s characterization of BOEM’s delayed valuations and valuation process, respectively. GAO maintains that taking each of the recommended actions would better ensure a fair return on the sale of offshore oil and gas leases by better ensuring BOEM’s thresholds for accepting bids are sound and unbiased. Agency Comments and GAO’s Evaluation: GAO provided a draft of this report section to Interior for review and comment. In its March 2020 response, Interior indicated that (1) although it disagrees with the first recommendation, it will conduct an in-house review and have it peer-reviewed; and (2) it now agrees with the second recommendation. In April 2019, GAO identified two actions the U.S. Army Corps of Engineers and U.S. Coast Guard can take to improve fragmented interagency coordination of lessons learned following disasters. and two actions have been partially addressed. See the Action Tracker for more information. GAO found that the U.S. Army Corps of Engineers (USACE) and U.S. Coast Guard (USCG) had fragmented approaches to identifying interagency challenges and lessons learned related to disaster contracting, resulting in these findings not being communicated to the Federal Emergency Management Agency’s (FEMA) Emergency Support Function Leadership Group—the group tasked with identifying interagency lessons learned following disasters. FEMA officials stated that it is up to each agency to elevate issues to the group; however, GAO found that neither USACE nor USCG had formal processes for doing so. Identifying and communicating lessons learned would help better manage fragmentation and enhance agencies’ abilities to address weaknesses in disaster response. New Actions: To help address fragmentation and ensure that challenges are communicated across departments, GAO recommended in April 2019 that the Secretary of the Army should direct the Commanding General of USACE to, and that the Commandant of USCG should, establish formal processes to solicit input from officials directly involved in the agencies' response and recovery following a disaster and to share that input with the Emergency Support Function Leadership Group. Agency Comments and GAO’s Evaluation: USACE and USCG concurred with GAO’s recommendations and planned to implement them this year. GAO provided a draft of this report section to USACE and USCG for review and comment. USCG said it is reviewing lessons learned and the after-action reporting process to update its policy. USACE indicated it updated its guidance to incorporate specific steps to communicate lessons learned with FEMA’s Emergency Support Function Leadership Group and that the guidance would be finalized spring 2020. GAO will continue to monitor the implementation of these recommendations. In March 2020, GAO identified a new action to improve the Department of Housing and Urban Development’s working capital fund and better position it to achieve over $1 million in previously identified potential annual savings. Three actions have not been addressed, and one action has been partially addressed. See the Action Tracker for more information. Housing and Urban Development’s (HUD) Working Capital Fund (WCF) provides a mechanism to centralize and fund federal shared services used across offices and agencies within HUD. One of the WCF’s goals is to support the efficient delivery of goods and services. GAO found that HUD does not assess the results of the WCF’s business process analyses, which are used to identify opportunities for efficiencies. For example, these analyses identified actionable ways to reduce high volumes of transactions for certain services, such as calls to help desks to manually reset passwords, which contribute to increased costs. Assessing the results of these analyses would help HUD better understand how the WCF’s efforts contribute to its goal. New Action: GAO recommended that the Secretary of HUD, in conjunction with the Office of the Chief Financial Officer, should ensure that the results of the business process analyses are assessed to better determine how these analyses contribute to its goal of efficient delivery of goods and services. While GAO cannot estimate the potential savings that would result, taking this action could help the WCF achieve over $1 million in potential annual savings already identified by WCF recommendations and to identify additional potential savings. Agency Comments and GAO’s Evaluation: GAO provided a draft of this report section to HUD for review and comment. HUD agreed and said it would address this recommendation in 2020, including adding the results of the business process analyses to its performance measures. In June 2019, GAO identified a new action that could improve oversight of disaster relief funds and long- standing problems of improper payments, which could result in significant cost savings. consolidated, one action has been partially addressed, and two actions have not been addressed. See the Action Tracker for more information. Agencies must distribute disaster relief aid quickly following hurricanes, wildfires, or other natural disasters, but quickly spending billions of dollars can increase the risk of improper payments. In June 2019, GAO reported that one of six selected agencies did not submit required internal control plans to Congress for funds appropriated following the 2017 disasters. Of the five agencies that did submit the required plans, four were not timely and all lacked necessary information, such as how they met Office of Management and Budget (OMB) guidance and federal internal control standards. These issues were caused, in part, because OMB lacked an effective strategy for helping agencies develop internal control plans for overseeing these funds. New Action: GAO recommended in June 2019 that the Director of OMB, after consulting with key stakeholders, should develop a strategy for ensuring that agencies communicate sufficient and timely internal control plans for effective oversight of disaster relief funds. Agency Comments and GAO’s Evaluation: OMB disagreed with this recommendation and stated that it does not believe timeliness and sufficiency of internal control plans present material issues that warranted OMB action; however, GAO continues to believe that future internal control plans could serve as a critical transparency tool for controls over disaster funds. GAO provided a draft of this report section to OMB for review and comment. In its response, OMB continued to disagree that this recommendation is needed. GAO believes this action is needed for oversight of disaster funds. In January 2020, GAO identified three new actions to help the Internal Revenue Service prevent refund fraud associated with identity theft. If implemented, these actions could potentially save millions of dollars. more information. Business identity theft refund fraud (business IDT) occurs when thieves create, use, or try to use a business’ identifying information to claim a tax refund. Between January 2017 and August 2019, the Internal Revenue Service’s (IRS) fraud detection tools helped prevent $384 million from being paid to fraudsters. However, GAO found IRS could do more to combat business IDT. In January 2020, GAO found that, inconsistent with leading practices, IRS had not designated an entity to design and oversee business IDT fraud risk management efforts, conducted a fraud risk assessment, or developed a fraud risk profile to document the results of its risk assessment. Addressing these issues could help IRS identify and implement more effective controls to detect and prevent business IDT. While GAO cannot precisely estimate the financial benefits associated with this action, even a 1 percent increase in fraud prevention could amount to millions in financial benefits. New Actions: In January 2020, GAO recommended that consistent with leading practices, IRS (1) designate a dedicated entity to oversee agency-wide business IDT efforts; (2) develop a fraud risk profile for business IDT; and (3) document and implement a strategy for addressing fraud risks identified in its fraud risk profile. Agency Comments and GAO’s Evaluation: GAO provided a draft of the January 2020 report to IRS for review and comment. IRS generally agreed, but did not provide details on the actions it plans to take to address these recommendations. IRS also did not provide comments on this report section. In January 2020, GAO identified a new action to help the Department of Veterans Affairs assess duplication in its medical supply program. partially addressed. See the Action Tracker for more information. In January 2020, GAO found that the Medical Surgical Prime Vendor program duplicates parts of the Department of Veterans Affairs (VA) Federal Supply Schedule program. VA spends billions of dollars annually on procurement of medical supplies to support care for veterans at its 170 medical centers but has not assessed whether its efforts are duplicative. VA procures medical supplies through both its own Medical Surgical Prime Vendor program and through the Federal Supply Schedule program—a government-wide program, parts of which the General Services Administration has long delegated to VA. However, VA has not assessed whether duplication across these programs is necessary or if efficiencies could be gained. GAO cannot estimate the savings that might be associated with this action because such savings will be dependent on whether, when, and how VA takes action. New Action: GAO recommended that the Secretary of Veterans Affairs should take steps to assess duplication between VA’s Medical- Surgical Prime Vendor and Federal Supply Schedule programs to determine if this duplication is necessary or if efficiencies can be gained. Agency Comments and GAO’s Evaluation: VA agreed with this recommendation. GAO provided a draft of this report section to VA for review and comment. VA provided technical comments which GAO incorporated as appropriate. In November 2019, GAO identified two new actions to help reduce the risk of duplicate funding in emergency relief assistance for transit agencies. addressed, two actions have been partially addressed, and one action has not been addressed. See the Action Tracker for more information. In 2017, Hurricanes Harvey, Irma, and Maria caused hundreds of millions of dollars in damage to U.S. public transit facilities. Both the Federal Transit Administration (FTA) and the Federal Emergency Management Agency (FEMA) have the authority to provide disaster assistance funding to transit agencies, but FTA has primary responsibility if it receives an appropriation from Congress for its Public Transportation Emergency Relief program. FTA did not receive an appropriation until roughly 6 months after the first hurricane’s landfall, thus transit agencies could initially apply to FEMA for assistance. In November 2019, GAO found that although FTA and FEMA coordinated efforts, both agencies still approved about $35,000 to one applicant for the same expenses in 2019. While the amount of funding in question was relatively small, without addressing the challenge of identifying transit expenses in FEMA applications, FTA and FEMA will continue to face the risk that both agencies will approve funding for the same expense in the future. New Actions: GAO recommended in November 2019 that FTA and FEMA identify and develop controls, such as methods to more easily identify transit expenses within applications FEMA receives, to address the risk of duplicate funding. Agency Comments and GAO’s Evaluation: The Department of Transportation (DOT) and the Department of Homeland Security (DHS) agreed with this recommendation and outlined steps they plan to take to address it. GAO provided a draft of this report section to DOT and DHS for review and comment. DOT said it did not have comments on this report section. DHS provided technical comments, which GAO incorporated as appropriate. In April 2019, GAO identified 28 new actions to help agencies save millions of dollars through better planning and implementation of cloud-based computing solutions. Two actions have been addressed. See the Action Tracker for more information including applicable agencies. Beginning in 2012, federal agencies were required to assess all IT investments for cloud computing services, and from 2014 to 2018, agencies reported $291 million in cloud-related savings. For example, agencies reported saving as much as $15 million migrating email systems to cloud services. However, GAO reported that 12 of the 16 agencies reviewed had not completed their assessments and that savings data were unavailable for 84 percent of the 488 cloud investments reviewed. Improving the assessment of investments for cloud services and tracking related savings can help agencies make better decisions regarding cloud acquisitions and potentially save millions of dollars from implementing cloud services. New actions: GAO made 28 recommendations in April 2019 to all 16 agencies, including that (1) 12 agencies should complete an assessment of all of their IT investments for suitability for migration to a cloud computing service, in accordance with OMB guidance; and (2) 16 agencies should ensure that their respective Chief Information Officers establish a consistent and repeatable mechanism to track savings and cost avoidances from the migration and deployment of cloud services. Fourteen agencies agreed with all recommendations, the Department of the Treasury neither agreed nor disagreed, and the Department of Defense agreed with the recommendation on completing assessments, but not with the recommendation on tracking savings. Agency comments and GAO’s evaluation: GAO provided a draft of this report section to the 16 agencies for review and comment. One agency agreed, 13 agencies had no comments, and two neither agreed nor disagreed. Additionally, seven of the 16 agencies are taking actions to address GAO’s recommendations. In April 2019, GAO identified 36 new actions to help federal agencies meet the Office of Management and Budget’s data center consolidation and optimization goals, resulting potentially in hundreds of millions of dollars in savings. original two actions in this area. See the Action Tracker for more information. Federal agencies operate thousands of data centers and, since 2010, have been required to close unneeded facilities and improve the performance of the remaining centers. This effort is currently known as the Data Center Optimization Initiative (DCOI). Since 2010, agencies have closed 6,250 centers and reported $4.2 billion in savings. However, only two of 24 agencies in GAO’s review planned to fully meet the Office of Management and Budget’s (OMB) September 2018 government-wide optimization goals, such as determining how much time data servers sit unused and how effectively data centers use power. New actions: GAO made 36 recommendations in April 2019 to 22 of the 24 agencies in its review, including that (1) 11 agencies should meet DCOI’s data center closure targets; (2) four agencies should meet DCOI’s data center-related cost savings targets and one should identify additional cost savings opportunities; and (3) 20 agencies should meet DCOI’s data center optimization metric targets. While GAO cannot precisely estimate the potential savings of taking these actions, combined estimates from agencies for similar prior actions exceeded $100 million per year, suggesting potential for hundreds of millions of dollars in additional savings over time. In June 2019, OMB significantly revised DCOI’s goals and performance measures and GAO continues to monitor agencies’ progress against these new targets. Agency comments and GAO’s evaluation: GAO provided a draft of this report section to 22 agencies for review and comment. Two agencies agreed, seven neither agreed nor disagreed, and 13 agencies had no comments. Additionally, two agencies have taken action to fully address the recommendations and the remaining 20 agencies are taking actions to address GAO’s recommendations. In our 2011 to 2020 annual reports, we directed 110 actions to Congress, of which 58 remain open. Thirty-five have been addressed and 17 were closed as not addressed or consolidated. Of the 58 open congressional actions, 15 are partially addressed and 43 are not addressed, as of March 2020 (see figure 10). The tables below have more information on the 58 open congressional actions. Our Action Tracker downloadable spreadsheet (available in XLSX or CSV formats) has information on all actions. This appendix provides additional information on the federal programs or other activities related to the new areas of fragmentation, overlap, duplication, cost savings, or revenue enhancement discussed in this report, including budgetary information when available. “Programs” may include grants, initiatives, centers, loans, and other types of assistance or projects. This information can provide useful context for the issues we identified, but limitations should be noted. It is not always possible to report budgetary information at the specific program or activity level because agency budgets are not organized by programs, but rather by appropriations accounts. In those instances, we reported the most reliable and available data for the most recent fiscal year or we did not report budgetary information. Further, because this report discusses various programs or activities, each table may report different types of budgetary information, such as obligations, collections, or outlays. Because of the limitations described above, the budgetary information reported in this appendix should not be totaled and does not represent potential cost savings for all programs.", "summary": "The federal government has made an unprecedented financial response to the COVID-19 pandemic. At the same time, opportunities exist for achieving billions of dollars in financial savings and improving the efficiency and effectiveness of a wide range of federal programs in other areas. Congress included a provision in statute for GAO to identify and report on federal programs, agencies, offices, and initiatives—either within departments or government-wide—that have duplicative goals or activities. GAO also identifies areas that are fragmented or overlapping and additional opportunities to achieve cost savings or enhance revenue collection. This report discusses the new areas identified in GAO’s 2020 annual report—the 10th report in this series; the progress made in addressing actions GAO identified in its 2011 to 2019 reports; and examples of open actions directed to Congress or executive branch agencies. To identify what actions exist to address these issues, GAO reviewed and updated prior work, including matters for congressional consideration and recommendations for executive action. GAO’s 2020 annual report identifies 168 new actions for Congress or executive branch agencies to improve the efficiency and effectiveness of government in 29 new mission areas and 10 existing areas. For example: The Department of Defense could potentially save hundreds of millions of dollars annually by accurately measuring and reducing excess funded, unfinished work at military depots. The Centers for Medicare & Medicaid Services could better ensure that states implement Medicaid provider screening and enrollment requirements, which could potentially save tens of millions of dollars annually . The Government National Mortgage Association could enhance the efficiency and effectiveness of its operations and risk management and reduce costs or enhance federal revenue by tens of millions of dollars annually . The Internal Revenue Service should establish a formal collaborative mechanism with the Department of Labor to better manage fragmented efforts and enhance compliance for certain individual retirement accounts that engaged in prohibited transactions, and thereby potentially increase revenues by millions of dollars . Improved coordination and communication between the Department of Health and Human Services’ Office of the Assistant Secretary for Preparedness and Response and its emergency support agencies—including the Federal Emergency Management Agency and Departments of Defense and Veterans Affairs—could help address fragmentation and ensure the effective provision of public health and medical services during a public health emergency. The Department of Education should analyze data and use it to verify borrowers’ income and family size information on Income-Driven Repayment plans to safeguard the hundreds of billions of dollars in federal investment in student loans and potentially save more than $2 billion . The Internal Revenue Service could increase coordination among its offices to better manage fragmented efforts to ensure the security of taxpayer information held by third-party providers. GAO identified 88 new actions related to 10 existing areas presented in 2011 through 2019 annual reports. For example: The Department of the Navy could achieve billions of dollars in cost savings by improving its acquisition practices and ensuring that ships can be efficiently sustained. The Office of Management and Budget could improve oversight of disaster relief funds and address government-wide improper payments, which could result in significant cost savings. The U.S. Army Corps of Engineers and the U.S. Coast Guard could better identify and communicate lessons learned in contracting following a disaster to improve fragmented interagency coordination. Significant progress has been made in addressing many of the 908 actions that GAO identified from 2011 to 2019 to reduce costs, increase revenues, and improve agencies’ operating effectiveness. As of March 2020, Congress and executive branch agencies have fully or partially addressed 79 percent of all actions (721 of 908 actions)—57 percent (519 actions) fully addressed and 22 percent (202 actions) partially addressed. This has resulted in approximately $429 billion in financial benefits. About $393 billion of these benefits accrued between 2010 and 2019, and $36 billion are projected to accrue in future years. This is an increase of $166 billion from GAO’s 2019 annual report. These are rough estimates based on a variety of sources that considered different time periods and utilized different data sources, assumptions, and methodologies. While Congress and executive branch agencies have made progress toward addressing actions that GAO has identified since 2011, further steps are needed. GAO estimates that tens of billions of additional dollars could be saved should Congress and executive branch agencies fully address the remaining 467 open actions, including the new ones identified in 2020. Addressing the remaining actions could lead to other benefits as well, such as increased public safety, and more effective delivery of services. For example:", "document_type": "gao"}
{"report": "Different types of organizations can serve as representative payees, from residential facilities where beneficiaries live, to organizations that only manage individuals’ Social Security retirement, disability, or other benefits. SSA’s organizational payees include social service agencies, mental institutions (federal, state or local, non-profit, private), non-mental institutions (federal, state or local, non-profit, private), financial organizations, and entities represented by public officials (such as public guardians, officers of the court, and other similar positions). For certain oversight purposes, such as periodic reviews, SSA categorizes organizational payees into several groups, including: (1) fee- for-service organizations, which charge beneficiaries a monthly fee for expenses incurred in providing services; (2) organizations that serve 50 or more beneficiaries and do not charge a fee for their services, referred to in this report as “high-volume”; (3) organizations that serve fewer than 50 beneficiaries and do not charge a fee for their services, referred to in this report as “low-volume”, and (4) state mental institutions participating in the State Onsite review program. SSA data from fiscal year 2018 indicate that the vast majority (86 percent) of organizational payees are low-volume payees, which serve 34 percent of beneficiaries (see fig. 1). Organizational payees decide how to spend beneficiaries’ funds, but must do so for the beneficiary’s use and benefit in a manner the payee determines to be in the beneficiary’s best interest. SSA considers it acceptable if the funds are used for the beneficiary’s current maintenance, which includes the costs of food, shelter, clothing, and medical care. After the representative payee has used the funds consistent with these guidelines, any remaining amounts must be conserved or invested on behalf of the beneficiary. Organizational payees are responsible for keeping records of SSA payments made to them on behalf of each beneficiary and the expenditures for each beneficiary. All organizational payees participate in onsite reviews and—except for state mental institutions participating in State Onsite reviews—are also required to file an annual accounting form to show how benefit payments were used and any amounts that were saved. Organizational payees also are required to notify SSA of certain changes or situations, including: changes that may affect the beneficiary’s eligibility for benefits or the benefit amounts, such as when the beneficiary, or the beneficiary’s spouse, dies; and when the beneficiary moves or is unable to be contacted or located, starts or stops working, or no longer needs a payee; when organizational payees learn that one or more of their employees has stolen a beneficiary’s funds or determines they can no longer serve as the payee for any reason; and when payees establish an account that mingles funds from multiple beneficiaries in one account—referred to as collective accounts— because these accounts must be approved before use. The process for administering the representative payee program is guided largely by requirements in statute and SSA regulations, which SSA communicates through its Program Operations Manual System (POMS). Recent changes to the program—including the new onsite review process—reflect requirements established by the Strengthening Protections for Social Security Beneficiaries Act of 2018. For example, the Commissioner of SSA must now: (1) reassess representative payee selection and replacement policies, (2) award annual grants (totaling at least $25 million nationwide) to each state’s protection and advocacy system to conduct onsite reviews of representative payees, and (3) award annual grants to a national association that can provide state protection and advocacy systems with training, technical assistance, and administrative oversight. In addition, the Act requires SSA to present the results of reviews—including information on representative payees’ misuse of benefits—in an annual report to Congress. SSA administers and manages the representative payee program through three dedicated data systems: The Electronic Representative Payee System (eRPS) is the system used to process payee applications; record poor payee performance; process changes (such as new addresses); and document misuse allegations, significant information about the payee, and why applications were approved or denied. The Electronic Representative Payee Accounting (eRPA) system is used to capture and review annual accounting forms that all organizational payees except state mental institutions participating in SSA’s State Onsite review program, are required to submit for each beneficiary they represent. Field office staff also use this system to track progress in resolving problems identified during reviews of the form, such as representative payees failing to submit complete information. The newly created Representative Payee Monitoring Tool, which is used to track and oversee the updated onsite review process. SSA operates the representative payee program primarily through its network of field offices. Field offices review and approve organizations’ applications to become representative payees, serve as the point of contact when organizations report changes to beneficiary or organization information, and play a role in monitoring and overseeing representative payees. SSA policy describes the required process for designating a representative payee for a beneficiary whom SSA staff have determined to be incapable of managing his or her benefits. First, organizations apply to serve as a payee for specific individuals. Second, SSA staff review applications to assess if the organization is qualified to serve as a payee and is the most suitable payee for the individual beneficiary. Additional qualifications are assessed when organizations apply to collect fees for their payee services. For example, SSA requires that all fee-for- service applicants have already served at least five beneficiaries for a full calendar month or more, and that non-governmental agencies be licensed and bonded. Once approved, organizational payees are subject to ongoing SSA oversight. SSA reviews annual accounting forms from organizational payees on each of the beneficiaries they represent. The accounting forms are used to monitor how the payee spent or saved benefits on behalf of the beneficiary; identify situations where payment to a payee may no longer be appropriate; or determine if the payee is no longer suitable. In addition to reviewing accounting forms annually, every 3 years SSA must review collective accounts established by organizational payees. Whether or not additional oversight in the form of an onsite review is provided, and the frequency of that oversight, generally depends on the organizations’ characteristics (see table 1). Certain types of organizational payees—such as high-volume, fee-for-service, and some state mental institutions—receive onsite reviews every 3 or 4 years. Low- volume organizational payees do not receive periodic reviews; rather SSA selects some of these payees for onsite reviews based on their likelihood of misusing beneficiaries’ funds and may target additional organizational payees because of an event that raises a question about the payee’s performance or suitability or because a protection and advocacy grantee thinks that a review is warranted. SSA’s purpose in conducting onsite reviews is to: (1) ensure organizational payees perform their duties satisfactorily, (2) deter misuse, (3) keep lines of communication open between the organizational payee and the servicing field office, (4) reinforce to the organizational payee their duties and responsibilities, and (5) proactively address the needs of organizational payees. We identified several gaps in SSA’s process for approving organizational payees, including insufficient detail in SSA’s policies, insufficient documentation of suitability decisions, and absence of background or credit checks on most organizational payees—gaps that may increase the risk of approving an unsuitable payee. We also identified challenges that field offices may face when approving replacement representative payees, such as a lack of local organizational payees and difficulty locating some beneficiaries. When an organization applies to serve as a payee, SSA’s policy stipulates that field office staff evaluate whether the organization is suitable. All payee applicants—individuals and organizations—are subject to the same general suitability factors, and organizations are evaluated on an additional set of suitability factors. Organizations are generally evaluated on the same suitability factors, whether they are a first-time applicant, or applying to serve an additional beneficiary. Additional requirements apply to organizations applying to collect fees (see appendix II). Two factors used to determine the suitability of organizations that are applying to be representative payees are straight-forward: (1) whether the payee agrees to receive benefits via direct deposit and (2) whether the payee uses protected accounts for beneficiary funds. However, other suitability factors are more complex, such as whether the applicant: demonstrates sound financial management policies (i.e., has a history of being current in its own financial obligations), demonstrates effective internal communication (i.e., good communication between case management and financial management components), has adequate recordkeeping systems to ensure that the client’s needs are met and benefits are properly administered. We found that SSA’s policies on how to evaluate more complex issues do not provide sufficient detail to ensure staff can fully assess an organization’s suitability. Staff at one of the eight field offices we visited told us the policies can leave room for interpretation, and staff at three field offices use additional guidance developed by field and regional offices that elaborates on how to assess some of the more complex issues in SSA’s policies. For example, SSA’s policy on what constitutes sound financial management states that an organization should have a history of being current in its own financial obligations. However, it generally does not provide direction on how to verify that an organization meets that requirement. Moreover, the policy lacks details on what staff should do to conduct a deeper assessment of an organization’s financial management practices if they think further assessment is warranted. Similarly, SSA policy directs staff to consider whether an organization has effective internal communication, which it defines as good communication between the organization’s case management and financial management components. However, SSA’s policy does not specify what actions constitute effective communication, such as the frequency and method of communication, type of information to be shared, and time frames for transmitting information. According to federal internal control standards, agencies should establish policies to document responsibilities for a process’s objectives and related risks and communicate these policies to personnel so they can fulfill their assigned responsibilities. Although SSA officials were able to point us to sections of agency policy that went into more detail about some of these complex topics, these policies pertain only to the few organizations that are applying to collect fees. In the absence of specific guidance on how to consider factors when assessing the suitability of all organizational payee applicants, SSA staff may be approving some of them without a complete picture of their financial health and ability to be good stewards of vulnerable beneficiaries’ money. According to central office officials, regions are generally given leeway to create their own supplemental guidance documents based on SSA policy to assist with training—documents that may also serve as resources to help staff interpret SSA policy. Officials in field and area offices told us this supplemental guidance is generally made available to staff on internal websites maintained by area or regional offices. Staff in three field offices told us they use supplemental guidance to evaluate organizations. For example, staff in one field office told us they use a supplemental list of questions to interview organizational payee applicants. These supplemental interview questions address some suitability factors in greater detail than SSA policy. For example: SSA policy directs staff to consider whether the organization “has adequate staff and resources to serve its clients.” The supplemental guidance from a regional office includes five questions on the number, type, relationships, and responsibilities of the staff; training and skills of staff dealing with finances; and documentation. SSA policy directs staff to consider whether the organization “has adequate recordkeeping systems to ensure that the client’s needs are met and benefits are properly administered.” The supplemental guidance from a regional office includes nine questions on the systems, records, procedures, and safeguards related to recordkeeping. Staff in another field office told us they created a desk guide on a range of topics related to individual and organizational payees that includes supplemental guidance documents and excerpts from SSA policy. The desk guide is a reference for all employees that work on payee issues and is also used to train new employees. However, SSA lacks a process to ensure that supplemental guidance is reviewed for compliance at the national level and that such guidance is updated by the regional office in a timely manner. Officials told us that because all regions are expected to follow SSA policy, central office staff only review supplemental guidance when the regions request it. Furthermore, SSA central office officials told us that although there is a protocol for communicating policy updates to regional, area, and field office staff, it is up to regions to refresh their own guidance. These officials did not know how long it takes regions to incorporate policy changes into regional guidance documents. As a result, field offices may be using supplemental guidance that has not been updated to reflect policy changes. For example, in a desk guide we reviewed, we identified a policy excerpt that was not the most recent version of that policy. Federal internal control standards stipulate that management should periodically review policies and procedures for continued relevance and effectiveness. Without processes to ensure that supplemental guidance documents are reviewed for compliance or updated in a timely manner when policy changes, decisions to approve organizational payees may be made inconsistently across different regions and field offices. SSA officials told us in May 2019 that they are currently reevaluating the agency’s representative payee approval policies and procedures based on feedback gathered through a forum hosted in September 2018 by the Social Security Advisory Board and in response to a Federal Register notice published in December 2018. However, SSA did not provide additional information on the nature, scope, or timeframes of this effort. SSA policy requires field office staff to document their assessment of an applicant’s suitability as a payee and the rationale for deciding to approve or deny an application. In addition, before approving a payee in eRPS, the system SSA uses to manage representative payee information, field office staff are to enter notes in accordance with the eRPS user guide. Specifically, staff are directed to document their determination regarding the beneficiary’s capability to manage their own finances and the organization’s suitability as a payee for the beneficiary. In certain situations, SSA policy directs staff to enter an additional note to document the relationship between the beneficiary and the payee. However, we found that staff in field offices we visited did not always fully document their decisions before approving organizational payees for the first time. Specifically, of the 21 first-time application files we reviewed, 16 did not contain a note about the organization’s suitability. Of the five files that did contain such notes, three provided limited detail. For example, two of the approved applications contained a note documenting that the beneficiary currently lived in the facility applying to serve as payee. However, notes in these two approved applications did not include any details regarding the prospective payee’s suitability, such as information about the facility or organization itself. Moreover, in two cases where the payee was a creditor for the beneficiary, we found that SSA staff had not documented why they approved these payees even though they were creditors for the beneficiary. Applicants who are creditors for beneficiaries are generally prohibited from serving as payees. Although exceptions are allowed in certain situations—such as when the organization is a care facility licensed or certified by the state, poses no risk to the beneficiary, and whose financial relationship with the beneficiary presents no substantial conflict of interest—staff are required to document why a creditor was selected as the payee. Although being a creditor could affect a payee’s suitability, we found that field office staff had not recorded information about why they selected these two creditors as the beneficiaries’ payees. We found that SSA staff might not fully document their decisions to approve organizational payees in part because eRPS, the system SSA uses to process payee applications, lacks safeguards for certain information entered into the system. As previously noted, staff use eRPS notes to document their assessment of: the beneficiary’s capability, the payee applicant’s suitability, and, in some cases, the beneficiary- payee relationship. However, while eRPS prevents field office staff from approving a payee without first documenting their assessment of a beneficiary’s capability in a note, this automated safeguard does not extend to the other note type. According to federal internal control standards, agencies should clearly document significant events so that that they are available for examination, and design their information systems to obtain and process information that responds to the agency’s objectives and risks. Because eRPS allows SSA staff to approve a payee without fully documenting the decision, SSA staff may not be able to reference that information to inform future decisions about the organizational payee. Specifically, SSA staff will not be as well-prepared to make fully informed decisions about an organizational payee’s continuing eligibility, or whether the organizational payee should be approved to manage benefits for additional vulnerable beneficiaries. This creates a risk that SSA staff may unwittingly approve an inappropriate organizational payee to serve other beneficiaries. SSA uses two types of external screening—background and credit checks—to identify potential concerns regarding the suitability of certain payee applicants. Whether such checks are required depends on the type of applicant, but most organizational payees do not receive either check. Background checks for individual representative payee applicants: According to law and SSA policy, staff should conduct background checks on individual payee applicants to determine if they have a criminal history that would disqualify them from serving as a payee. As part of the background check, policy directs staff to use applicant interviews and tools embedded in eRPS to gather information about the individual payee applicant’s criminal history, including prison time or unsatisfied felony warrants. Unless the payee is exempted by SSA policy, SSA staff will request the payee’s permission to conduct a background check and, if permission is granted, will then obtain a criminal report from eRPS.32, Credit checks for some fee-for-service applicants: According to SSA policy, staff are directed to obtain and review a credit report from Dun & Bradstreet for all non-governmental organizational payees that are applying to collect fees for payee services. These credit reports include information on bankruptcies, pending or completed legal judgments, liens, payment history and risk, credit use, and how the applicant compares to other organizations in its industry. According to POMS GN 00502.113, certain family members with custody of the beneficiary are exempt from the background check. For non-exempt individual representative payee applicants, field office staff must obtain the applicant’s permission before conducting part of the background check. SSA policy provides additional detail about the specific steps staff are directed to take to obtain information on individual representative payee applicants’ past criminal history. If the applicant does not give permission for a background check, their application to serve as payee will be denied. For more information, see POMS GN 00502.113, “Interviewing the Payee Applicant.” potential risk factors that create payee business losses due to fraud, failure, or severe delinquency, and (2) may provide an indication of any risk involved in the organization’s current or future performance as a payee. However, SSA does not assess these risk factors for most organizational applicants because SSA policy generally does not require staff to conduct background checks for organizational payees, and SSA only conducts credit checks for organizational payees that apply to collect fees. According to SSA data, as of July 2018, only 4 percent of organizational payees were authorized to collect fees and, therefore, may have undergone a credit check. Moreover, those credit checks that are conducted for organizations occur after their initial approval—when they are already serving beneficiaries—because organizations can not apply to collect fees until they have regularly served as payee for at least five beneficiaries for 1 calendar month or more. SSA officials told us the agency does not conduct background checks on organizations, in part because the process is more complicated than for individuals. SSA recommends that organizational payees screen employees who deal with beneficiary funds—identifying this as a best practice—but officials told us this is not required. However, in addition to employees who handle beneficiary funds, the criminal history of an organization’s principals (e.g., chief executive and operating officers, director, president, etc.) may also help inform SSA’s assessment of an organizational payee’s suitability, as these individuals may exert great influence over the tone and structure of the organization. Without conducting credit or background checks, SSA risks unknowingly approving questionable organizational applicants, therefore increasing the risk that beneficiary funds may be misused. In May 2019, SSA officials informed us that, while the agency has been focused on implementing criminal background checks on non-exempt individual representative payees, it is also exploring whether to conduct background checks on organizational payees’ employees or require organizational payee applicants to conduct background checks on their employees. In addition, they told us that SSA has also been considering whether to conduct credit checks on additional organizational payees, but has yet to make a decision on this matter. However, SSA did not provide information on the expected timeframes for this decision-making process. Further, SSA lacks a comprehensive plan for evaluating if and how to expand background and credit checks to organizational payees. When an organizational payee closes or is terminated, SSA must ensure that all affected beneficiaries can continue to access their benefits, either by finding a replacement payee or—when a beneficiary is deemed capable of managing their own finances—paying the individual directly. SSA officials told us they strive to avoid temporarily suspending benefits. However, temporarily suspending benefits may be necessary to avoid sending beneficiary funds to a former payee that is no longer able or willing to manage them. SSA’s policies delineate when temporarily suspending benefits may be necessary, such as when a beneficiary’s whereabouts are unknown. In 2017, according to SSA data, 427 organizational payees closed or were terminated by SSA. According to SSA data, SSA suspended benefits for more than 13,000 beneficiaries affected by payee closures and terminations in fiscal year 2017; their benefits were suspended for an average of 2.28 months. SSA policy describes the steps that SSA staff must take when dealing with the closure or termination of an organizational payee serving multiple beneficiaries, but SSA’s level of involvement in finding replacement payees varies depending on the situation. Staff at one field office said that, for the only organizational payee that closed in the last several years, they were involved in finding replacement payees for affected beneficiaries before they terminated the organizational payee. However, staff from two field offices told us that SSA is not always involved in finding new payees. For example, staff at one of these field offices said that when the state closed a nursing home in their jurisdiction, it was state officials and not SSA who found new facilities for affected beneficiaries. When these new facilities applied to serve as payee for their new residents, SSA processed the applications (see sidebar). Staff at another field office told us that before closing, some organizational payees identified prospective payees for affected beneficiaries. In those cases, payee staff submitted proposed payee changes to SSA, and SSA told these prospective payees they must file an application to become the approved payee. Officials in SSA’s central office told us that staff determine if the applicant is the most suitable payee before approving them. According to SSA officials, in 2015, SSA enhanced its policy on what to do when beneficiaries are affected by an organizational payee’s closure or termination. Specifically, national officials told us SSA added new procedures for appointing a new payee in cases of immediate payee termination and emphasized the narrow circumstances when it is appropriate to temporarily suspend benefits. Officials told us these changes were in response to a challenging experience terminating a large organizational payee in 2014 that served nearly 1,000 beneficiaries. Despite this change to agency policy on replacing organizational payees that are terminated or closed, SSA continues to face some challenges in approving replacement payees. Specifically, SSA staff we interviewed cited a number of challenges they had encountered, such as shortages of local organizational payees and difficulties obtaining information from terminated organizational payees. While these challenges may not apply to all field offices, they provide examples of circumstances that can complicate the process of reassigning beneficiaries. Lack of local organizational payees. Officials in some field and regional offices said they lack sufficient organizational payees in their local area. For example, staff in three field offices said many organizational payees in their area only serve certain types of beneficiaries, such as the elderly or individuals with developmental disabilities or specific medical conditions. Staff in two field offices told us they had unsuccessfully tried to recruit additional organizational payees in their jurisdiction. Similarly, a member of an SSA managers association noted that it has been several years since a new organizational payee was approved in her state. Difficulty ensuring community presence for fee-for-service organizational payees. Officials from SSA’s regional, area, and field offices told us that it can be challenging to meet the agency’s requirement that non-governmental fee-for-service organizational payees be community based. For example, staff at an SSA area office told us that finding payees within the community is challenging in sparsely populated and remote areas, such as along Maine’s border with Canada, where beneficiaries may not live near any approved organizational payees. In March 2019, SSA updated the policy on community presence for non-governmental fee-for-service organizational payees to better specify what is required for a payee to establish community presence, but it is not yet clear the extent to which this update resolves field office concerns about remote areas. Difficulty locating beneficiaries. Officials in some field and regional offices noted that they sometimes struggle to locate beneficiaries, which hinders reassignment. Homeless beneficiaries, in particular, can be difficult to find, according to staff in one regional office. Difficulty obtaining information from terminated organizational payees. Officials in some SSA offices told us that they may lack information necessary to complete the transfer of an affected beneficiary to another payee. For example, staff in a regional office said that terminated organizational payees may not always be forthcoming about unspent beneficiary funds. Staff in another field office told us that because a terminated organizational payee had not maintained adequate records of beneficiaries’ guardians, SSA staff had to go to court to identify them before approving replacement payees. SSA staff communicate with organizational payees at various points. According to SSA policy, field offices should communicate with organizational payees when they initially apply, and field office staff may communicate with payees as part of periodic oversight activities—such as through record change reporting requirements or following up on annual accounting forms. During the application process, SSA field office staff should explain the responsibilities and duties of a payee. For example, they should explain that payees must submit an annual accounting form and that payees must keep detailed records of how benefits are used in order to provide an accurate report to SSA when requested. Field office staff also should explain when payees must contact SSA, such as when a payee’s address changes. Monitoring and oversight activities, such as reviews of annual accounting forms, also provide opportunities for SSA field staff to communicate with organizational payees. Similarly, SSA’s ongoing reporting requirements—such as to update certain beneficiary or payee information—provide another opportunity to interact. According to field staff we interviewed, staff frequently communicate with organizational payees regarding changes to a beneficiary’s address. Finally, according to SSA officials, SSA also communicates with organizational payees by providing information online and providing guidance documents when payees are approved. While all field offices communicate with their organizational payees, how field offices communicate with payees can vary. Four of the eight field offices we visited had designated specific staff either to work with each organizational payee or with high-volume payees. In the other four field offices, payees talk to whichever staff member is available. SSA officials told us that the different workforce arrangements stem from varying workflows and staffing resources at individual offices. Similarly, we found variation across field offices regarding whether SSA staff reach out to organizational payees even if changes do not need to be made or problems addressed. For example, staff at four of eight field offices also said that they have held training sessions for groups of organizational payees. Further, staff at three field offices told us that SSA provides training to specific organizational payees at their request, such as when an organization experiences staff turnover. Seven of the eight organizational payees we spoke with expressed frustration either with SSA’s follow-through on communications or with its processes for receiving information from payees. Application status updates. Three payees said that SSA staff did not tell them how long it would take to review their application. They also said SSA staff had not provided updates during the process, which took 2 to 3 months or longer to complete. Follow-up calls. These three payees also said that they were not told how long it would take for SSA staff to return their calls, and two said that sometimes they never received a call back. Wait times. Two payees said that it takes too long to provide information in person at SSA field offices. For example, after signing in at a kiosk, a payee may have to wait for hours until their number is called. This payee said that they often bring beneficiaries to the SSA office and that long wait times can be very difficult for them, particularly those with mental illness. In some cases, beneficiaries have walked out or passed out while waiting in the SSA office, according to the payee. The payee also said that long wait times are sometimes compounded when field office staff require them to return to the queue for each successive case rather than handling all the payee’s cases at once. However, because field offices are allowed to establish their own workflow processes, this issue may not apply to other field offices. Faxing documents versus sending them electronically. Three payees said that having to fax documentation to SSA rather than send this information electronically creates additional work. SSA officials said that the agency has a plan to allow individual payees to securely transmit personally identifiable information electronically, but has not established a timeframe for allowing organizational payees to do so. At the field offices we visited, managers had different expectations regarding time frames for responding to payee requests. Three managers we interviewed said that staff should respond to payees as soon as possible, three managers said that staff should respond within 24-48 hours, and two managers said staff should respond within 7-14 days. SSA officials told us that SSA has not set timeliness standards for field offices because doing so could affect other workloads in unanticipated ways and it is the agency’s goal to provide service and support to all payees on an ongoing basis. SSA may receive feedback from organizational payees through various mechanisms. Officials from SSA’s central office told us that organizational payees can provide feedback either by contacting their local field office or calling SSA’s national customer service number. Some field office staff also said that they provide informal opportunities for payees to offer feedback. For example, one field office manager told us that he spends time building relationships with organizational payees, solicits feedback by asking how things are going, and sometimes visits organizational payees when he is nearby. Another manager emphasized the importance of gathering and responding to organizational payee feedback. This manager said that she established quarterly calls with multiple payees to discuss issues and solicit feedback. Managers of two field offices told us that they provide standardized SSA customer comment cards in their waiting areas, although the cards do not ask respondents to identify whether they are organizational payees. However, SSA does not have a mechanism for payee feedback to be systematically collected, compiled, and analyzed across field offices to determine if programmatic changes are warranted. SSA officials said they do not have or plan to develop a formal mechanism for collecting and analyzing organizational payee feedback because the current process allows field offices to respond to all public contacts in a consistent and timely manner. However, federal internal control standards state that management should establish reporting lines that allow the agency to receive quality information from external stakeholders and specify that quality information, among other things, should be complete, current, and provided on a timely basis. Without a formal mechanism to systematically collect and analyze payees’ feedback and ideas for program improvement, SSA cannot be sure that it is receiving complete or current impressions from organizational payees on how efficient its processes are or how timely it responds to their needs. Being aware of and responding to payees’ concerns might help the agency retain and attract organizations to serve as payees and ensure it is well-positioned to meet future challenges. SSA uses several methods to oversee organizational payees, including conducting onsite reviews, and reviewing annual accounting forms and collective accounts. However, each of these methods has shortcomings in its design and implementation, weakening SSA’s ability to effectively oversee payees and prevent fraud. SSA officials said they plan to conduct an over-arching assessment of fraud risks to the representative payee program in 2019, but the robustness of such a plan is yet to be determined. State protection and advocacy agencies (“state grantees”), the national association grantee (which is currently the National Disability Rights Network, or NDRN), and SSA regional offices play key roles in the new onsite review process for organizational payees. Given the extent to which onsite reviews uncover misuse and other problems, the onsite review is a crucial control for the representative payee program. Under the new process, state grantees generally interview selected payees, beneficiaries, and legal guardians or third parties; review financial records for selected beneficiaries over a 12-month period; transmit findings from their reviews to SSA; and, in some cases, follow up on deficiencies they identify. State grantees also suggest additional payees to review (beyond those targeted by SSA) if they think such a review is warranted. According to SSA, the national association grantee’s responsibilities include: (1) training state grantees; (2) ensuring the quality of onsite reviews; (3) serving as the first point of contact for state grantee communication and questions; and (4) providing state grantees with technical assistance, administrative support, and data collection services. According to SSA, the regional offices are responsible for compiling information to facilitate grantees’ onsite reviews that is not automatically provided through SSA’s system and for clarifying procedural and technical information for the grantees. Regional offices also address and resolve all deficiencies the grantees do not resolve, according to SSA. Lastly, under the new system, state grantees, the national association grantee, and SSA input information from reviews and track progress towards completing their assigned reviews using SSA’s new Representative Payee Monitoring Tool, which is used to manage and control the new onsite review process. According to six NDRN representatives, transitioning to the new onsite review system involved challenges with grantees gaining access to equipment, working through bottlenecks at some regional offices, responding to unanticipated workloads, and receiving timely responses to feedback. Specifically, NDRN representatives said that while the process of clearing grantees to access beneficiaries’ personally identifiable information has been efficient, there have been delays providing grantees with access to SSA laptops, printers, and scanners. As a result of these equipment delays, grantees started to conduct reviews on paper and then input the information later, according to NDRN representatives, thus using less efficient, manual processes. NDRN representatives also said that the new onsite review process involves multiple handoffs between grantee and regional office staff, which has contributed to bottlenecks at some regional offices. Moreover, NDRN representatives noted that, in addition to the reviews SSA originally assigned to the grantees, regional offices have tasked them with conducting quick response checks. Because these reviews have generally involved assessing a large number of financial records and conducting many beneficiary interviews, and were not anticipated in SSA’s initial plan, NDRN representatives believe they may affect the ability of some state grantees to complete the other reviews SSA had initially planned. Lastly, an NDRN representative said that the timeliness of SSA’s responses to grantee feedback and concerns (communicated from state grantees via NDRN) has diminished in recent months. Specifically, the NDRN representative said that the computer program SSA staff developed to enable NDRN to submit questions to the agency was initially working well. However, recently, as the volume of NDRN’s questions has increased, the system is not working as well, and NDRN has asked for clarification on some important issues, to which SSA has not yet responded. As of May 2019, SSA reported to us on progress state grantees had made towards reaching the total number of reviews SSA had planned for the fiscal year. Specifically, as of May 21, 2019, state grantees had conducted 112 of 852 planned high-volume reviews; 45 of 461 planned fee-for-service reviews; and 0 out of 60 planned state mental institution reviews. Although SSA initially assigned 2,800 low-volume reviews in grant year 2019, SSA estimated in July 2019 that it will have initiated around 1600 low-volume reviews by the end of the first grant year—about the same number as completed in fiscal year 2018 (1,691). SSA officials acknowledged these challenges and said they have been addressing them, and will continue to address them and to monitor progress. SSA officials cited significant improvements in issuing laptops since they began the process in September of 2018. Regarding delays in distributing printers and scanners, SSA reported that they are in the final stages of procuring printers but that as of May 2019, they had not identified an acceptable scanner model. SSA officials also said they are developing a policy to govern grantee use of printers. SSA acknowledged that workflow bottlenecks involving regional offices may exist, and said that they will continue to monitor all actions required to be taken by regional office staff. SSA staff also acknowledged having initiated more quick response checks than originally anticipated, and said they are researching options to alleviate the impact of these reviews on NDRN and state grantee resources. Finally, SSA staff said that they will continue to evaluate how SSA collects and responds to state grantees’ feedback, and to hold weekly discussions with NDRN to identify ways to improve the new onsite review process. GAO is not making recommendations in this area because the onsite review process is new and SSA continues to implement it and work to address implementation challenges. Onsite reviews are resource intensive because they involve examining organizational payee financial records and interviewing payee staff and beneficiaries; therefore, SSA uses a risk-based approach to select which organizational payees receive onsite reviews and how frequently such reviews occur. SSA reviews all fee-for-service, high-volume payees, and certain state mental institutions—which together account for around 67 percent of all beneficiaries and about 14 percent of all organizational payees—at regular intervals of every 3 or 4 years, depending on the type of organization. However, for the vast majority of organizations that are low-volume payees (29,082 of around 33,700), SSA selects a subset of payees to receive onsite reviews each year. As shown in figure 2, more than half of the onsite reviews SSA conducted in fiscal year 2018 were for low-volume payees (1,619 of 2,774 reviews). However, because there are so many low-volume payees, only about 6 percent of these payees received an on-site review. In contrast, the lower number of high-volume onsite reviews conducted (767) covered about 25 percent of high-volume payees. Given that only a fraction of low-volume payees are selected for onsite review each year, it is critical that SSA effectively prioritize which payees should receive onsite reviews so SSA can effectively allocate resources. To this end, SSA uses a predictive statistical model it first implemented in 2012 to rank low-volume organizations based on their chance of misusing beneficiary funds and selects for onsite reviews those organizations identified as having the highest risk. SSA staff told us they determine how many reviews to conduct based on available resources. However, we were unable to fully assess SSA’s decisions in developing its model, or the model’s accuracy at predicting misuse compared to alternative targeting methods, because SSA did not fully document or retain documentation that described in sufficient detail important decisions it made when developing it. For example, the available documentation does not explain in sufficient detail how SSA assembled data on the target population; how SSA sampled organizational payees for assessing characteristics; which variables SSA considered using to help predict misuse but ultimately decided not to include; how, if at all, it assessed or assured itself of the reliability of the data the model used; and how it decided to account for multiple beneficiaries with the same payee. An SSA official responsible for using the model said he was not sure whether documentation existed but was not retained, because the individuals who developed the model are no longer with the agency. Office of Management and Budget (OMB) standards for federal censuses and surveys—which contain accepted practices (but not requirements) for federal statistical efforts not officially covered by the standards—call for documentation that “includes those materials necessary to understand how to properly analyze data” and “replicate and evaluate” statistical estimates. Moreover, federal internal control standards state that effective documentation enables agencies to retain organizational knowledge, mitigate the risk of having knowledge limited to a few personnel, and communicate knowledge as needed to external parties, such as external auditors. Due to the absence of key documentation, neither SSA itself nor an external party is able to affirm whether, in comparison to other approaches, SSA’s predictive model is the optimal approach to identify low-volume payees and beneficiaries with the highest risk of misuse. SSA officials told us that they will revise the model at some point in the future—at which point they could improve the documentation—but that they do not have a formal plan to do so. SSA officials said they do not have imminent plans to update the model because the pool of identified misuse cases, which is driven by the number of onsite reviews conducted, is too small. Finally, SSA officials said they are hesitant to re-evaluate the organizational payee predictive model because they believe the current model is working effectively. However, seven years have passed since SSA first developed the model, and SSA cannot be assured that the current model remains as effective as when it was last formally validated and compared to alternative models or targeting methods. Accepted practices for developing predictive statistical models call for periodic re-estimation and re-validation, using data that are current and applicable to the conditions in which the model will be applied. Moreover, federal internal control standards call for agencies to conduct ongoing monitoring of the design and effectiveness of the internal control system including evaluations of control design. SSA reported conducting ongoing assessments of the model’s continued effectiveness, and provided us with aggregate performance data for 2012 to 2016. However, inclusion of older data and absence of more recent misuse data in aggregated results provide limited assurance of the model’s ongoing effectiveness. In addition, a recent report by SSA’s Office of the Inspector General (OIG) suggests that it may be possible to assess the ongoing suitability of nursing home payees by using additional data, although we did not evaluate the validity of the study’s conclusions. The SSA OIG’s report expressly looked at how data from the Centers for Medicare & Medicaid Services (CMS) might be used to evaluate the suitability of nursing homes and found that these data would help SSA more effectively assess the ongoing suitability of existing nursing home payees. Specifically, the OIG used CMS data reflecting penalties and other signs of underperformance to identify poorly-performing nursing homes that might also be poorly executing their duties as payees. For instance, according to SSA policy documents, the form can help SSA identify previously unreported changes to beneficiaries’ addresses; identify unapproved collective accounts; determine if certain beneficiaries’ savings are too high to qualify for benefits; or determine whether the organizational payee is authorized to charge a fee, if the payee reports charging one. outcomes would significantly dilute the model’s ability to detect misuse, which they consider to be the most important goal of the representative payee review process. Developing additional models to predict other types of poor payee performance besides misuse (such as poor recordkeeping or payees’ failing to meet beneficiary needs, which were identified in the OIG study) could reduce SSA’s reliance on a model for which the low number of misuse findings affects the efficacy of ongoing performance assessments and prevents timely updates. Since SSA has only identified 31 misuse cases using the predictive model since 2012, decades may pass before SSA has the approximately 5,300 misuse cases it wants in order to formally evaluate the model, and before SSA and others can be assured that low-volume payees are being optimally targeted for review. Without re-evaluating whether the current model remains predictive, and periodic assessments about whether it predicts high-risk payees better than an alternative model or targeting method, it is unknown whether SSA has maximized its ability to target low-volume payees. The annual accounting form is a key oversight tool because it touches most organizational payees, and reviewing the annual accounting form helps SSA to maintain current beneficiary and payee information and to identify and resolve potential problems. For instance, according to SSA policy documents, the form can help SSA identify previously unreported changes to beneficiaries’ addresses; identify unapproved collective accounts; determine if certain beneficiaries’ savings are too high to qualify for benefits; or determine whether the organizational payee is authorized to charge a fee, if the payee reports charging one. electronic processing indicates a potential problem, field offices sometimes follow up with the payee to resolve the issue. However, SSA has not established time frames within which field offices must initiate this follow-up. For example, SSA guidance states that when organizational payees do not submit the form timely, field offices should contact the payee by phone to find out why the required form was not completed. However, the guidance does not establish time frames within which field offices should initiate the call. Similarly, SSA told us they do not have time frames within which staff should follow up to resolve potential problems flagged during electronic testing. In the absence of national guidance, area offices we interviewed varied in the extent to which they established time frames for the field offices in their purview to follow up with organizational payees that did not submit an annual accounting form or whose form was flagged for potential errors. One area office we talked with expected staff to follow up with payees within 30 days but did not track time frames, another area office had not established time frames, and officials from one field office told us that their area office considered follow-up over 120 days to be untimely. Given the absence of SSA guidance and variation in area office practices related to establishing timeframes, field offices may not ensure that this oversight mechanism is attended to in a timely manner. Officials at one field office we visited told us that they had a backlog of forms needing follow-up because the designated point person had left the agency. Officials from another field office attributed the backlog to multiple factors, including a staff person being out sick and their workload not being reassigned, and the office taking on a special project. While we heard from several field offices that the majority of follow-up on annual accounting forms is for clerical errors or mistakes, staff from one field office said that when staff must follow up with organizational payees to ensure they submit a simple accounting form, it raises concerns about whether those payees are fulfilling their other duties. Federal internal control standards state that managers should use quality information to achieve the entity’s objectives and that they should ensure information is complete and provided on a timely basis. In May 2019, SSA officials told us that they are now exploring approaches to implement a nation-wide time frame to address these forms because a 2018 law— which reduced the volume of annual accounting forms SSA has to process—allows staff to focus on problematic forms more expeditiously. SSA officials said that they had not previously established a time frame because they expected organizational payees to have routine contact with field offices and expected field offices to re-evaluate the payee’s suitability if the payee did not cooperate when conducting SSA business. In addition, SSA expects state grantees to follow up on accounting forms as part of their onsite reviews. At the same time, one of SSA’s stated purposes for using the annual accounting form is to evaluate payee suitability on a regular basis rather than relying on ad hoc interactions between the payee and field office, or relatively infrequent periodic and targeted reviews. Until SSA establishes time frames within which staff must follow up on issues identified during annual accounting reviews, the agency cannot ensure that it is taking timely action to resolve potential problems and maximize this monitoring tool. Although the accounting form is a key oversight tool for SSA, shortcomings exist in the form’s content and design. For example, SSA’s annual accounting form does not ask or remind organizational payees about all collective account requirements, and as a result does not fully support SSA’s oversight efforts. Collective accounts are permitted under SSA policy, but SSA reviews and approves them to ensure that payees comply with SSA’s policies and procedures. While the annual accounting form asks payees whether they put any saved funds into a collective account, the form does not ask whether the payee uses a collective account for day-to-day expenses. Payees should disclose the use of any collective account to SSA independent of the form but may have neglected to, and SSA does not use the form to fully ascertain the use of collective accounts. Consequently, SSA may not have up-to-date information about all of the collective accounts that an organizational payee might be using—information that could help place these risk-prone accounts on SSA’s radar to initiate the approval process and provide ongoing oversight. Federal internal control standards state that agencies should design control activities to achieve objectives and respond to risks. When SSA officials were asked why the annual accounting form does not ask about all collective accounts, the officials said this would be unnecessary because payees are required to notify the field office if they wish to open such accounts. SSA also indicated that its periodic and targeted onsite reviews will uncover collective account issues for the highest risk payees. However, SSA finds many instances of unapproved collective accounts during its onsite reviews, suggesting that organizational payees might not be proactively reporting opening such accounts to SSA as required. For example, in fiscal year 2018, SSA found unapproved collective accounts in nearly 17 percent of the onsite reviews it conducted of organizational payees (in 477 instances out of 2,882 reviews). Staff we interviewed from one field office also said they have identified organizational payees with unapproved collective accounts. Specifically, staff said they have identified at least three payees with unapproved accounts, one of which they identified when reviewing the payee’s annual accounting form. This suggests that some payees may be willing to report they have a collective account, but not remember or understand their responsibility to seek approval from SSA when they open such accounts. Although SSA’s accounting form includes reminders of various payee responsibilities, the form does not include a reminder to all payees that they should notify SSA when they establish collective accounts. Reminding payees of these responsibilities could serve as a regular reminder for payees to notify SSA about the existence of these accounts, and thereby help ensure SSA provides regular oversight of them. Stakeholders have also identified shortcomings in the content and design of the accounting form. For example, SSA currently provides payees’ total benefit amounts in the form, and asks payees to report how they spent those benefits. In a 2007 review of SSA’s representative payee program, the National Academy of Sciences (NAS) reported that because SSA preprints total annual benefit amounts on the annual accounting form, it is easy for payees to report spending that matches the total provided by SSA. Even if the amounts the payee reported were incorrect, SSA’s electronic check would not trigger further review of these responses as long as the numbers added up. NAS further suggested that omitting this information would reinforce payees’ responsibility for keeping and consulting their records. In light of this and other findings, NAS broadly recommended redesigning the form to collect more meaningful data—a recommendation echoed by the Social Security Advisory Board in 2018. When asked why SSA did not adopt NAS’ recommendation, SSA indicated to us that it believed that NAS signaled that other recommendations were more important, and cited NAS’ statement that “no form, by itself, is going to detect program misuse.” At the same time, NAS restated its recommendation to redesign the form twice in its report and in each instance noted how the form could complement other oversight efforts. Research also suggests that agencies can improve the quality of the data they collect via forms by applying behavioral science insights. For example, behavioral science research has shown that requiring a signature at the beginning of an online form helps promote honest self- reporting and can lead to government savings.77, Moreover, the Internal Revenue Service has identified approaches based on behavioral science insights for improving compliance and honest self-reporting, and for encouraging people to make good choices when providing information. Given the importance of the annual accounting forms for oversight of payees, considering and applying, where appropriate, behavioral science insights while redesigning the accounting forms could help SSA achieve more reliable and accurate reporting. Executive Office of the President. National Science and Technology Council. Social and Behavioral Sciences Team Annual Report (September 2015). See ep 31-32. Lisa L. Shu, Nina Mazar, Francesca Gino, Dan Ariely, and Max H. Bazerman, Signing at the beginning makes ethics salient and decreases dishonest self-reports in comparison to signing at the end.” Proceedings of the National Academy of Sciences of the United States of America. (Nov. 18, 2012). In contrast, the signature field in SSA’s accounting forms is located at the end of the form. accounts without oversight. A regional office analyst referred to this as a glitch in the system and told us this issue was recently raised during a meeting with the central office. In response to our inquiry about disappearing alerts and collective account information, SSA staff indicated that removing alerts and collective account information after approval expires is appropriate because field offices should always renew collective accounts before this occurs. SSA further explained that the alerts are not deleted from eRPS, but rather removed from the system’s “Workload Action Center” 30 days after the collective account expiration date. Similarly, SSA reported that collective account information is not deleted from eRPS, but rather no longer displayed as an active account. However, removing information on accounts that were not renewed timely weakens the efficacy of its collective account review process to the extent that accounts are operating without SSA approval and oversight. SSA has taken steps to address risk associated with payee oversight, but to date has not continuously assessed and responded to potential risks. Federal internal control standards state that to manage risk, agencies should identify risks that might prevent the agency from achieving its objective; assess the significance of those risks; and design responses so that analyzed risks are within the agency’s risk tolerance level. In June 2013, SSA formed a task team to conduct a comprehensive review of the representative payee program and develop recommendations. This effort resulted in, for example, a new process of sharing misuse information with the Department of Veterans Affairs. While this was a positive step, the task team disbanded in 2014 because it had generated a set of recommendations and SSA wanted to shift to implementing those recommendations, according to agency staff. However, resulting actions did not include a forum or system for continuously assessing lessons learned from audits and reviews or identifying solutions that might have addressed gaps we identified in this report. For example, we found that SSA discovers many instances of unapproved collective accounts during onsite reviews, but we have not seen documentation that SSA has assessed the risk of unapproved collective accounts existing among low- volume payees that do not receive any regular scrutiny. Having a process for continuously assessing and responding to potential risks could better position the agency to respond to pressure placed on the payee program due to an aging population. As of May 2019, SSA reported it was in the early stages of planning a fraud risk assessment of the representative payee program (for both individual and organizational payees). In January 2019, a staff person within SSA’s Office of Anti-Fraud Programs, which provides centralized accountability and oversight for the agency’s anti-fraud activities, told us they had identified the representative payee program as one that might benefit from a risk assessment, and that they were currently developing a strategy for conducting such risk assessments for a number of programs. At that time, the staff person did not know whether they would be doing a fraud risk assessment of the representative payee program specifically. SSA subsequently reported in May 2019 that the agency has established a schedule and business process for conducting its risk assessments, including one on the representative payee program. According to SSA, the fraud risk assessment will provide a comprehensive and strategic look at the fraud risks facing the representative payee program and the controls SSA has in place to mitigate those risks. SSA also reported it plans to begin the assessment of the representative payee program in October 2019, and update it every 3 years beginning in 2024 to determine whether there have been any changes to the risks and whether additional actions are required. While promising, SSA plans have yet to take shape. Ensuring that its fraud risk assessments periodically examine the results of onsite reviews and audits will be an important element in the design of SSA’s risk assessment efforts. Organizational payees play a critical role in ensuring beneficiaries’ basic needs are met. The beneficiaries these payees serve—individuals who cannot manage their own finances and lack a family member or friend to do so on their behalf—are dependent on their representative payees and thus extremely vulnerable to financial abuse. It is therefore crucial that SSA take steps to shore up a range of gaps in how the agency evaluates, supports, and oversees payees to better ensure beneficiaries are protected. Carefully screening organizations applying to be representative payees is key to proactively avoiding potential abuse. However, in the absence of detailed and centrally-approved policy guidance on how to assess complex suitability factors for approving payees, SSA cannot be sure that field office staff are consistently and appropriately evaluating applicants’ suitability. Also, until SSA updates its electronic system to ensure staff’s rationale for approving or denying payees is captured in accordance with policy, SSA may not have the benefit of information to better monitor payees and inform future suitability decisions. Lastly, without a comprehensive plan, including timeframes, for evaluating if and how to conduct background and credit checks to help staff vet organizational payees—as it does for individual payee applicants—SSA may forgo potentially valuable safeguards for further protecting vulnerable beneficiaries. Once approved, organizational payees rely on SSA for information or action in order to effectively carry out their responsibilities. Absent a formal mechanism whereby feedback from payees on SSA services and processes can be collected, compiled, and analyzed, SSA may not be sufficiently aware of payee needs and frustrations, which in turn could result in lost opportunities to either retain or recruit organizations willing to serve this critical function, or make program improvements. To ensure payees are managing beneficiary funds appropriately, SSA relies on a number of monitoring mechanisms, including onsite reviews. Onsite reviews represent SSA’s most thorough and resource-intensive monitoring tool and must be appropriately targeted. Until SSA develops a plan to periodically review the predictive model’s design, considers inclusion of additional relevant data in the current model or an alternative model that predicts outcomes other than misuse, and documents any subsequent design changes, the model’s efficacy cannot be fully assessed or ultimately improved upon, and SSA may not be effectively targeting high-risk, low-volume payees for review. SSA may detect payee performance problems by reviewing annual accounting forms for all organizational payees; however, without a process to ensure prompt follow-up, SSA cannot be sure staff resolve problems in a timely manner. Moreover, mingling beneficiaries’ funds in collective accounts can mask misuse, and until SSA addresses gaps in the annual accounting form and issues with eRPS, SSA cannot effectively monitor payees’ use of such accounts. Addressing gaps in existing processes could improve the integrity of SSA’s representative payee program and reduce risks to SSA’s most vulnerable beneficiaries, but may not be sufficient in light of challenges posed by the nation’s aging population, which could swell the number of vulnerable beneficiaries that need payees. Carrying through with its plan to develop initial and periodic fraud risk assessments for the representative payee program—and ensuring that the assessments reflect consideration of findings from onsite reviews and audits—could help SSA anticipate potential problems and develop strategies to mitigate their impact. We are making the following nine recommendations to SSA: The Commissioner of the Social Security Administration should ensure that (a) the agency’s policies and guidance are specific enough so field office staff know how to apply complex suitability criteria for assessing payee suitability, such as by providing a minimum set of specific questions; and (b) additional regional guidance that is made available to staff is centrally reviewed for compliance and completeness. (Recommendation 1) The Commissioner of the Social Security Administration should create safeguards in the eRPS system to ensure that field office staff fully document all required information, such as the rationale for their decision, before approving an application. (Recommendation 2) The Commissioner of the Social Security Administration should complete a plan, including timeframes, for comprehensively evaluating if and how to leverage external sources of information on organizations’ suitability, such as by conducting background checks or credit checks on organizations or key staff that handle beneficiaries’ funds or requiring organizations to conduct their own background checks on key staff. (Recommendation 3) The Commissioner of the Social Security Administration should develop and implement mechanisms to systematically obtain and review feedback from organizational payees and communicate findings to SSA management. (Recommendation 4) The Commissioner of the Social Security Administration should (a) establish a plan and time frame for periodically reviewing the predictive model’s design; (b) consider additional data sources that would allow for additional screening or modeling of potentially high-risk organizational payees; and (c) ensure that subsequent design decisions are documented in sufficient detail so the development process can be more fully understood and replicated, either by SSA or a knowledgeable third party, with minimal further explanation. (Recommendation 5) The Commissioner of the Social Security Administration should require field offices to contact payees about missing or problematic annual accounting forms within a specific time frame. (Recommendation 6) The Commissioner of the Social Security Administration should revise the annual accounting form to enhance its effectiveness. Such revisions could include (but not be limited to) more fully ascertaining the use of collective accounts, adopting stakeholders’ recommendations on using the form to collect more meaningful data, and reflecting best practices from behavioral science insights in the design of the form. (Recommendation 7) The Commissioner of the Social Security Administration should enhance the eRPS system to ensure that field offices are (a) alerted when collective accounts are due to be reviewed; and (b) able to take action on expired collective account information and thereby avoid payees’ continued use of these accounts without oversight. (Recommendation 8) The Commissioner of the Social Security Administration should, as it carries through with its plan to develop a risk assessment for the organizational payee program, ensure that that the plan reflects periodic consideration of findings from onsite reviews and audits. (Recommendation 9) We provided a draft of this report to SSA for review and comment. In written comments, reproduced in appendix IV, SSA agreed with all nine of our recommendations and outlined its planned actions to address several of the recommendations. SSA also provided technical comments that we incorporated into the report, as appropriate. SSA provided additional comments on its plans to address four of our recommendations. Specifically, with respect to our second recommendation that SSA create safeguards in its Electronic Representative Payee System (eRPS) to ensure that field office staff fully document decisions to approve organizational payee applications, SSA reported that, as part of implementing the Strengthening Protections for Social Security Beneficiaries Act of 2018, planned changes to eRPS will improve documentation of selection decisions. SSA also reported it will also consider additional enhancements to eRPS in the future. We welcome SSA’s intentions to improve documentation of selection decisions and consider additional enhancements to eRPS. With respect to our third recommendation that SSA complete a plan, including timeframes, for evaluating if and how to leverage external sources of information on organizations’ suitability, such as by conducting background checks or credit checks on organizational payee applicants, SSA officials reiterated that SSA is first focusing on implementing provisions of the Strengthening Protections for Social Security Beneficiaries Act of 2018 related to background checks for certain individual payees. After completing this work, SSA plans to evaluate conducting criminal background checks and credit checks on organizational payees and their staff. While we agree that implementing background screening pursuant to the law should take precedence, SSA should seek opportunities to implement screening for organizational payees at the earliest opportunity. With respect to our fifth recommendation related to SSA reviewing, enhancing and documenting its model for selecting low-volume organizational payees for on-site reviews, SSA reported that it will pursue other data sources to develop additional screening tools and models to identify potentially high-risk organizational payees, but that it is unable to incorporate additional data into the existing model. We recognize that the current model, which focuses on misuse findings and is based on historical data, presents challenges for both updating and including new data sources. Therefore, as SSA considers additional screening tools and models to identify high-risk, low-volume organizational payees, SSA should develop a plan for revising the existing model that allows for more timely updates and results in documentation of related design decisions. With respect to our eighth recommendation that SSA enhance the eRPS system to more effectively address expiring collective accounts, SSA officials reported that they would work with staff to ensure staff know where to find alerts for expiring accounts and enhance how eRPS displays information on collective accounts that have already expired. We agree with SSA’s proposed actions. However, we adjusted our recommendation to clarify that SSA should enhance eRPS in a manner that ensures staff take action on expired accounts and that payees do not continue to use expired accounts without oversight. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Commissioner of the Social Security Administration, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4040 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. The three objectives examined in this report are how the Social Security Administration (SSA): (1) approves organizations to be representative payees, (2) communicates with organizational payees, and (3) oversees these organizations. To address our three objectives, we reviewed relevant federal laws and SSA policies and guidance. We interviewed SSA officials in its central office and staff in four regional offices that we selected to reflect a range in the number of states and organizational payees they collectively oversee and to achieve diversity in geographic location. Within those regions, we visited eight field offices covering seven states, which were selected to include both metropolitan and non-metropolitan areas that maximized the number of files we would have available for our review (see next paragraph). We also interviewed officials in one area office per region—two representing metropolitan area field offices, and two representing non-metropolitan area offices that we visited. These interviews with regional, area, and field office staff are intended to obtain perspectives from SSA officials in different parts of the country and are not intended to be representative of all SSA field offices and staff. We also analyzed program data, including the number and type of organizational payees and the number of beneficiaries they serve. We assessed the reliability of these data by reviewing relevant documentation and interviewing SSA staff knowledgeable about the systems used to collect and maintain the data and determined the data were sufficiently reliable for our use. To determine how organizations are approved to be representative payees, we reviewed SSA’s policies and relevant federal laws and regulations. At each field office we visited, we (1) interviewed managers about their role in the application process and (2) reviewed up to six organizations’ electronic files in the Electronic Representative Payee System (eRPS), the primary data system SSA uses to track representative payees. Specifically, at each field office we reviewed up to two applications that SSA had approved (either initial applications to serve as representative payee or initial applications to collect fees); up to two applications that SSA had denied (initial or to collect fees); and files for up to two organizations that were terminated or closed in the past 5 years. In some cases, field offices we visited did not have the full number of cases available, and we reviewed fewer files in those offices. We selected the most recent approval, denial, and termination files that were available. In all, we reviewed 15 recently approved applications, six recently denied applications, and three recent terminations. We also interviewed cognizant SSA officials at the central office and the four regional and area offices we selected. We conducted background checks on a stratified random sample of 205 current organizational payees. The sample was selected to include fee- for-service organizations with 50 or more beneficiaries, fee-for-service organizations with fewer than 50 beneficiaries, non-fee-for-service organizations with 50 or more beneficiaries, and non-fee-for-service organizations with fewer than 50 beneficiaries. We entered information on selected organizations into a database called CLEAR and reviewed the resulting reports for any indication of criminal history. Many of these reports included the criminal history of individuals who are or may be associated with the organizational payee, and we reviewed these with particular focus on the crimes that bar individuals from serving as individual payees. For those reports that contained an indication of criminal history, we selected reports that indicated there may have been federal crimes or felonies at the state or local level and attempted to obtain court records to provide further insight into the nature of the crimes and the outcome of the cases. However, because we lacked information that would have made it possible for us to definitively link a conviction to staff in an organization—such as Social Security numbers for payee staff that are in leadership or financial management roles—the results of our analysis were not reliable enough to report. SSA collects Social Security numbers for individual payee applicants but not for any principals or staff from organizational payee applicants. Without this information, it is impossible to definitively link criminal convictions to individuals associated with organizational payees. To help understand how SSA communicates with organizational payees, we reviewed program guidance and interviewed representatives of eight organizational payees—one in the local area of each field office we visited, in addition to interviewing officials in each field office. We also interviewed cognizant SSA officials at the central office and the four regional and four area offices we selected. To review SSA’s overall oversight of organizational payees—including onsite reviews and reviews of the annual accounting form and payees’ use of collective accounts—we reviewed relevant federal laws and regulations, program policies, and relevant SSA documents; analyzed data; and interviewed SSA officials at the central office, the four regional and four area offices we selected, and the eight field offices we visited. To further understand SSA’s new onsite review process, we reviewed agency documents that describe the roles and responsibilities of key players in SSA’s new onsite review process. We also interviewed SSA officials and representatives of the National Disability Rights Network (NDRN) about the status of its implementation. To determine the extent to which different types of organizational payees receive onsite reviews, we analyzed SSA program data for fiscal year 2018. We assessed the reliability of these data by reviewing relevant documentation and interviewing knowledgeable agency officials and determined they were sufficiently reliable for our purposes. To learn about the outcomes of onsite reviews, such as how frequently unapproved collective accounts were identified, we reviewed SSA’s annual reports to Congress. We determined SSA data on the number of onsite reviews conducted and SSA data reported to Congress on unapproved collective accounts were sufficiently reliable for our purposes. We did not assess the efficacy of the new onsite review process or the quality of onsite reviews because we determined it was too soon to evaluate recent program changes. Instead, we described the roles and responsibilities of key players in the new process and interviewed SSA and NDRN to provide information on the status of implementation. To assess the predictive model SSA uses to select low-volume organizational payees for onsite reviews, we analyzed available documentation and interviewed SSA officials knowledgeable about the predictive model. This information included: (1) a list of variables; (2) the code SSA uses to execute the model; and (3) a brief description of how SSA developed the model, including a high-level description of its methodology and an analysis of the predictive power of the model compared to random chance. We compared the documentation SSA provided us with accepted practices for maintaining documentation of statistical models. For detailed results on the findings of this analysis, see appendix III. To obtain a range of perspectives on the organizational payee program, we interviewed staff of the Social Security Advisory Board, representatives of an SSA managers’ association, an organizational representative payee association, and NDRN. In addition, we interviewed representatives of advocacy groups for the aged, persons with physical disabilities, and persons with mental illness regarding their constituents’ experiences with SSA’s organizational payee program. Per Social Security Administration (SSA) policy, field office staff should consider certain factors when evaluating organizations’ suitability to serve as payees. Some factors apply to all applicants, including both individuals and organizations, while others apply only to organizational payee applicants (see table 2). In addition, there are some requirements for organizational payees applying to collect fees for their payee services. According to SSA policy, organizational payees that are applying to collect fees must meet the following requirements: Be regularly serving as a payee for at least five beneficiaries for at least 1 calendar month; Generally not be a creditor of the beneficiaries it serves; and Be a state or local agency with a qualified mission, or a non-profit social service agency that is community-based, bonded, and licensed. The Social Security Administration (SSA) uses a predictive statistical model it implemented in 2012 to rank low-volume organizations based on their chance of misusing beneficiary funds and selects for onsite reviews those organizations identified as having the highest risk. The predictive model uses a logistic regression to estimate the chance that each payee will misuse benefits, given the characteristics of the beneficiary and payee, such as the length of time served as a payee and whether the beneficiary received a large lump sum payment from the payee. SSA takes the predictive model output, which is calculated for every payee and beneficiary pair, and uses it to rank payees. SSA assigns organizations for review depending on (a) their rank (organizations that have a higher likelihood of misusing benefits are more likely to be selected); and (b) available resources. To review the predictive model, we interviewed SSA officials knowledgeable about the model and reviewed available documentation. This documentation included: (1) a list of variables; (2) the computer code SSA uses to execute the model; (3) a brief explanation of how SSA periodically assesses the model and related performance statistics; and (4) 2 documents (totaling 5 pages) describing how SSA developed the model. We compared this documentation to accepted practices for maintaining documentation of statistical analysis, such as standards published by the Office of Management and Budget (OMB). The documents describe, at a high level, SSA’s methodology for developing the model. It also includes an analysis of the predictive power of the model compared to random chance. of predictor variables, and ultimately selected a final model using a step- wise selection process. However, available documentation does not include information necessary to evaluate how SSA assessed other candidate models or understand the rationale for SSA’s decision to accept its final model. For example, there is limited documentation to: Reproduce SSA’s Target Population: The documentation does not describe in detail how SSA identified all organizational payees that served from 1993 to 2009 (such as how SSA queried the Representative Payee System), nor does it explain in detail how SSA linked beneficiary and organizational level data, such as to count the number of beneficiaries that each payee served. SSA subsequently explained in its technical comments that it used Social Security numbers to link information among several systems. However, SSA did not describe steps it took to establish the linkages, or steps taken to identify organizational payees that served from 1993 to 2009, in enough detail for an independent analyst to reproduce the work. Moreover, SSA did not provide this written documentation upon our original request, which suggests that SSA did not maintain complete records of the work. Reproduce SSA’s Sample Design: The documentation does not describe in detail how SSA designed the probability sample it used to develop the model or how, if at all, it weighted the sample to account for varying probabilities of selection in the sample. Selecting the appropriate sampling method for a model and applying appropriate weights generally increases its predictive accuracy. Reproduce SSA’s Process for Assembling the Data and Selecting the Final Model: The documentation provides limited information about the input variables and models that SSA tested but ultimately did not use. In addition, the documentation does not show how SSA assessed and addressed potential correlations between the variables it selected. For example, we could expect certain variables, such as receipt of a lump sum payment and receipt of a lump sum payment over $1,000, to be highly correlated. Although highly correlated variables do not necessarily impair the model’s predictive accuracy, they can influence which individual variables test as being predictive during the model’s development. The documentation also does not describe how SSA chose to split continuous variables into categorical variables—a choice which can influence predictive accuracy. Understand How SSA Assessed Data Reliability: Available documentation does not indicate whether SSA assessed the reliability of data used in its model. The reliability of the outcome variable— misuse—is particularly important. Unreliable data regarding whether misuse occurred, either due to incorrect data entry or other errors, would compromise the model’s ability to accurately predict the likelihood of misuse. In contrast, the reliability of variables that could signal risk of misuse—such as whether the beneficiary received a large disbursement of funds—is less critical. Even variables prone to measurement error may still predict misuse accurately. Nevertheless, assessing their reliability remains important, since reducing measurement error can increase the model’s predictive power. Such assessments could range from limited testing of the data—e.g., for outliers, illogical values, and missing data—to broader, independent verification of data reliability. Regardless of the approach used, documenting all data reliability assessments allows internal and external stakeholders to assess, and possibly improve, the model. Explain whether, or how, SSA’s model addressed potential patterns of misuse for beneficiaries served by the same payee: Statistical models typically assume that estimates can be generated independently for each unit of analysis—in this case, unique pairs of beneficiaries and payees. However, in cases where multiple beneficiaries are served by the same payee, this may not be the case. Patterns of misuse might be similar for all beneficiaries served by a given payee, such as if the payee were systematically defrauding all of its beneficiaries. Accurately modeling data with this kind of nested structure—which conflicts with typical statistical assumptions—often requires multi-level modeling methods. However, SSA’s documentation does not specify how or whether it applied these methods, or otherwise assessed or adjusted for the nesting of beneficiaries within payees. Reproduce SSA’s process for ranking organizations: With the current model, which assigns a score for each payee-beneficiary pair, SSA uses the predictive model’s output to then rank payees. However, there are various approaches for ranking payees, ranging in sophistication, and SSA does not have sufficient documentation to determine whether the approach currently being used best predicts risk to beneficiaries. In addition to the contact named above, Michele Grgich (Assistant Director), Isabella P. Anderson, Dan Meyer and Amy E. MacDonald (Analysts-in-Charge), Daniel Bibeault, Ted Burik, Daniel Concepcion, Jennifer Cook, Gus Fernandez, Alex Galuten, Sheila R. McCoy, Arthur Thomas Merriam, Jr., Mimi Nguyen, Ramon J. Rodriguez, Margie K. Shields, Joy Solmonson, Almeta Spencer, Jeff M. Tessin, Walter K. Vance, Kathleen van Gelder, Srinidhi Vijaykumar, and Khristi A. Wilkins made significant contributions to this report. In addition, Seto J. Bagdoyan, Joy Booth, Gabrielle M. Fagan, Robert H. Graves, Rosalind C. Romain, and Helina P. Wong contributed to the report.", "summary": "Nearly a million individuals relied on organizational payees to manage their Social Security benefits in 2018. Due to an aging population more beneficiaries may need organizational payees in the future. These beneficiaries are among the most vulnerable because, in addition to being deemed incapable of managing their own benefits, they lack family or another responsible party to assume this responsibility. SSA reports that misuse of benefits by payees is rare, but its Office of Inspector General has identified cases of misuse that have harmed vulnerable beneficiaries. GAO was asked to review SSA's organizational payee program. This review examines, among other things SSA's process for approving payees and its monitoring efforts. GAO reviewed relevant federal laws, regulations, policies, and guidance; analyzed SSA data from fiscal year 2018; analyzed the predictive statistical model SSA uses to select low-volume payees for on-site reviews; and interviewed SSA central office staff and regional, area, and field office staff in four regions selected for geographic diversity. The Social Security Administration (SSA) approves organizational payees—such as nursing homes or non-profits that manage the Social Security benefits of individuals unable to do so on their own—by assessing a range of suitability factors, such as whether the organizations have adequate staff to manage benefits for multiple individuals. However, GAO found that SSA's policy does not specify how to assess more complex suitability factors, such as whether an organization demonstrates sound financial management. Without clearer guidance, unqualified or ill-prepared organizational payees could be approved to manage benefits. Also, SSA does not currently require background checks for key employees of an organizational payee. In contrast, SSA requires background checks for individual payees—such as a relative or friend of the beneficiary. A comprehensive evaluation could help SSA determine whether and how to expand their use of background checks to organizational payees. To ensure organizational payees are managing funds appropriately, SSA uses several monitoring tools, including resource-intensive onsite reviews. Certain organizational payees, such as those that charge fees for their services or have 50 or more beneficiaries (high-volume), receive onsite reviews every 3 to 4-years. In contrast, payees that serve fewer than 50 beneficiaries (low-volume)—the vast majority—are selected for review based on their estimated likelihood of misusing beneficiary funds, and a relatively low percent of them receive onsite reviews (see figure). SSA uses a predictive statistical model to identify higher risk low-volume payees, but the model's effectiveness cannot be fully assessed by GAO or others due to missing documentation on how it was designed. SSA officials said they will update the model in the future, but do not have a time frame for doing so. Establishing such a time frame and documenting design decisions are key steps toward assessing the model's effectiveness. Another way SSA oversees organizational payees is by reviewing their annual accounting forms, but shortcomings exist in SSA's review of the form and in the form's content and design. For example, SSA lacks timeframes for following up on missing or problematic forms. Also, the accounting form does not capture complete information on whether payees co-mingle beneficiaries' funds in collective accounts, which can limit SSA's ability to monitor those risk-prone accounts. Establishing timeframes and revising the form could enhance the effectiveness of the annual accounting form as an oversight tool. GAO is making nine recommendations in this report, including that SSA: clarify how to assess complex suitability factors; assess requiring background checks for organizational payees; establish a timeframe for reviewing the predictive model and document design decisions resulting from that review; and establish timeframes for, and conduct revisions of the accounting form. SSA agreed with all nine recommendations and provided technical comments that GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "Signed into law on May 9, 2014, the DATA Act expands on previous federal transparency legislation. It requires federal agency expenditures to be disclosed and agency spending information to be linked to federal program activities so that policymakers and the public can more effectively track federal spending. The DATA Act also requires government-wide reporting on a greater variety of data related to federal spending, such as budget and financial information, as well as tracking these data at multiple points in the federal spending life cycle. To accomplish these goals, among others, the act gives OMB and Treasury responsibility for establishing government-wide financial data standards for any federal funds made available to or expended by federal agencies. These standards specify the data to be reported under the DATA Act and define and describe what is to be included in each data element with the aim of ensuring that information reported will be consistent and comparable. As Treasury and OMB implemented the DATA Act’s requirement to create and apply data standards, the overall data standardization effort has been divided into two distinct, but related, components: (1) establishing definitions which describe what is included in each data element with the aim of ensuring that information will be consistent and comparable, and (2) creating a data exchange standard with technical specifications which describe the format, structure, tagging, and transmission of each data element. In the implementation of the DATA Act, OMB took principal responsibility for the definitions, while Treasury took principal responsibility for the technical standards that express these definitions, which federal agencies use to report spending data for publication on USAspending.gov. The act also holds agencies accountable for submitting complete and accurate data to USAspending.gov and requires that agency-reported award and financial information comply with the data standards established by OMB and Treasury. One of the purposes of the DATA Act is to establish government-wide data standards to provide consistent, reliable, and searchable spending data that are displayed accurately for taxpayers and policymakers on USAspending.gov (or a successor website). As we have reported previously, establishing a data governance structure—an institutionalized set of policies and procedures for providing data governance throughout the life cycle of developing and implementing data standards—is critical for ensuring that the integrity of the standards is maintained over time. The need for a data governance structure is underscored by our previous analyses of the quality of the federal spending data available on USAspending.gov and inconsistencies we identified in how agencies report data according to data standards. A data governance structure could be useful for adjudicating revisions, monitoring, and ensuring compliance with the standards over time. As we have noted, such a structure, if properly implemented, would greatly increase the likelihood that the data made available to the public will be accurate. A data governance structure can also provide consistent data management during times of change and transition. We have previously reported that gaps in leadership can occur as administrations change. This can impair the effectiveness and efficiency of complex government- wide efforts, potentially resulting in delays and missed deadlines. Accordingly, in 2015, we recommended that OMB, in collaboration with Treasury, establish a set of clear policies and processes for developing and maintaining data standards that are consistent with leading practices. OMB and Treasury did not comment on our recommendation. We plan to conduct work intended to help inform OMB’s and Treasury’s efforts. This work may include the development of a maturity model that could provide a framework for assessing data governance activities related to federal spending data. This work may also have broader government-wide implications as agencies begin implementing the requirements of the Foundations for Evidence-Based Policymaking Act enacted on January 14, 2019, including designating Chief Data Officers with data governance and implementation responsibilities. In December 2018, OMB staff told us that they are transitioning from the governance structure used for initial DATA Act implementation to a new structure for managing data standards within the broader context of efforts to establish a federal data strategy. According to OMB staff, the initial data governance structure reflected OMB’s and Treasury’s focus on creating the design and build functions required to meet the statutory requirements of the DATA Act. The President’s Management Agenda (PMA), released in March 2018, outlines a long-term vision for modernizing federal operations. To address the issues outlined in the PMA, the administration established a number of cross-agency priority (CAP) goals. These goals, required by the GPRA Modernization Act of 2010, are to address issues in a limited number of policy areas requiring action across multiple agencies, or management improvements that are needed across the government. According to OMB staff, several of the 2018 goals relate to data standardization, and a new governance structure is needed to achieve those goals. OMB staff informed us in July 2018 that the governance structure used for initial implementation efforts, which included the DATA Act Interagency Advisory Committee and Data Standards Committee, had been disbanded, and that the advisory roles of these groups were assumed by the Chief Financial Officers Council’s DATA Act Working Group (CFOC Working Group). According to OMB staff, the working group includes four subgroups, which focus on Policy, Internal Controls and Data Quality, Audit Coordination, and the DATA Act Information Model Schema (DAIMS), respectively. OMB staff also told us that by December 2018 an interagency board and council, both led by the General Services Administration (GSA), had begun to advise OMB on policy matters. According to an action plan that OMB and GSA released along with the March 2018 PMA, the new interagency Shared Solutions Governance Board (SSGB) and Business Standards Council (BSC) are responsible for setting goals and providing advice to promote a government-wide marketplace for shared services. Specifically, they cover mission-support services such as human resources and financial management that a small number of providers offer to many agencies. According to OMB staff, this oversight function involves creating and administering government-wide data standards, including data standards established to support the DATA Act. The SSGB includes executives from across the federal government and is responsible for making recommendations to OMB on shared services policy. The BSC provides expertise on various subject matter areas (e.g., procurement and financial assistance) to promote the development of common business capabilities and data standards. The action plan does not discuss how the functions carried out by the SSGB and BSC apply specifically to the data standards established under the DATA Act. In commenting on a draft of this report, OMB staff told us that the “Governance Ecosystem” page on the website of Unified Shared Services Management (USSM) describes the SSGB and links functions of the SSGB and BSC to the DATA Act. They said it does this by showing that OMB and Treasury have key roles in all three entities. However, this common membership does not, in itself, provide the transparency and clarity of documented policies and procedures for governing DATA Act standards. Treasury officials said that the CFOC Working Group is involved in aligning DATA Act data standards across various functional communities, including procurement and financial assistance. Further, the group is considering making recommendations to OMB regarding changes to data definitions and other policy matters. For example, Treasury officials told us that in fall 2018, the DAIMS Subgroup identified difficulties in aligning different definitions of Period of Performance Start Date used for procurement and in financial assistance awards, and plans to elevate this issue to the Policy Subgroup for review. Specifically, the DAIMS Subgroup found that it is not always clear whether the start date should be reported as the date when a specific transaction occurred or the date when the original underlying award was made. This choice about how to interpret the data element can have substantial consequences for the consistency of the data reported. For example, in some cases, the underlying awards for recent transactions were made in the 1960s or 1970s. According to OMB staff and Treasury officials, at the center of this shifting array of advisory bodies, the DATA Act Executive Steering Committee (ESC) has continued to meet regularly and to serve as the top-level governance body for DATA Act implementation. OMB staff told us that the ESC is chiefly responsible for setting government-wide policy for the data standards based on the recommendations from various advisory bodies. In addition to the ESC, Treasury has continued to maintain and update the DAIMS and DATA Act Broker, following a set of change control procedures that involve consultation with stakeholders and public release of information about updates. Although OMB has taken some steps to address our recommendation, efforts are still needed to establish a clear set of policies and procedures for governing the data standards established under the act. The key practices for data governance that we identified in our previous work are shown in table 1. In the specific context of the DATA Act standards, Treasury and OMB have taken steps to enforce the use of data standards by directing agencies to develop and maintain data quality plans and requiring agencies to submit data through the DATA Act Broker. The broker performs validations to improve data quality and ensure the consistent application of data standards. However, because the approach to governing DATA Act data standards has continued to evolve during the past few years, and because a set of data governance policies and procedures is not documented, we were unable to conduct a comprehensive assessment of OMB’s and Treasury’s data governance efforts against leading practices. While some data governance activities have been undertaken within the specific context of DATA Act data standards, others are part of broader efforts under the PMA. In July 2018, OMB staff told us that governance over the DATA Act data standards would be accomplished within the broader context of the CAP goals established under the PMA. For example, OMB established a governance structure to achieve the objectives of CAP goals related to “Results-Oriented Accountability for Grants.” As part of this broader effort to standardize grants management business processes and data to increase efficiency and reduce reporting burden, OMB, the Department of Health and Human Services, and other federal agencies have published a list of draft grants management data standards for public comment. However, published documents describing this effort do not explain how the process for developing grants management standards under this CAP goal would apply specifically to the data standards established under the DATA Act. Nor do they address if or how these new standards align with those established under the act. Further, none of the documentation on the PMA’s governance structure for grants management mentions the DATA Act. In commenting on a draft of this report, OMB staff told us that the staff members from OMB and Treasury who are responsible for the grants management standards are the same people involved in managing the DATA Act standards. While this connection between the two efforts may provide adequate communication in the short term, staffing is likely to change over time, and there is no assurance that the same people will always be involved. As we have reported previously, having documented policies in place that delineate clear roles and responsibilities for decision-making could help to ensure continuity into the future. As the Comptroller General testified in 2015, in the absence of a clear set of institutionalized policies and processes for developing standards and for adjudicating necessary changes, the ability to sustain progress and maintain the integrity of established data standards may be jeopardized as priorities and data standards shift over time. Managing and controlling changes to data standards is a key activity for data standardization and effective data governance. The DATA Act requires OMB and Treasury, in consultation with the heads of federal agencies, to establish government-wide financial data standards that include common data elements for financial and payment information required to be reported by federal agencies and entities receiving federal funds. Among other requirements, these standards, to the extent reasonable and practicable, must be capable of being continually upgraded as necessary. According to key practices for data governance that we identified in our previous work, organizations should have documented policies and procedures for making decisions about changes to existing data standards. In June 2018, OMB staff changed certain data definitions in the publicly accessible website that serves as the official repository for the data definitions. However, OMB does not have a documented procedure for updating or making changes to these definitions. In commenting on a draft of this report, OMB staff stated that the DATA Act Information Model Schema (DAIMS) change control procedures were the method for updating data standards. However, OMB’s website for data definitions is maintained separately from the DAIMS, and the DAIMS procedures only address changes to the DAIMS, and do not address this separate repository of data definition standards. OMB staff said that the June 2018 revisions were made in response to the findings of our November 2017 report. Specifically, OMB revised the Primary Place of Performance Address definition to no longer include a street address or county. OMB amended the definition of Record Type to clarify that it applies to financial assistance awards only. As shown in figure 1, OMB also amended the explanatory text preceding the definitions to revise and clarify its policy regarding agencies’ use of data definitions. OMB staff described the changes to definitions as minor technical corrections to align with the reporting instructions in the DAIMS. In December 2018, OMB staff informed us that OMB’s procedure for making changes to the data definitions it maintains in the official repository can be found on the “Governance Ecosystem” page of the website of Unified Shared Services Management (USSM). However, our review of that page in January 2019, including the links it provides to other pages, found no evidence that the website provides any documentation related to the DATA Act. In particular, we found no evidence of a documented procedure for making changes to the data definitions in OMB’s official repository. The staff were unable to provide documentation to show that any standard procedure was followed in making the June 2018 changes, or that the DATA Act Executive Steering Committee approved the changes. As discussed earlier in this report, that committee is the top-level governing body for DATA Act implementation and is responsible for approving changes to data standards. The evolution of OMB’s approach to developing a governance structure to maintain the integrity of the DATA Act data standards could in part explain the lack of a documented procedure for updating the definitions. As discussed above, OMB has created and disbanded various advisory bodies for DATA Act data standards and has only recently decided on an approach for formalizing governance over the standards, namely the decision to integrate governance of these standards with the governance processes administered by the SSGB. In 2015, we reported that establishing a formal framework for providing data governance throughout the life cycle of developing and implementing these standards is critical for ensuring that the integrity of the standards is maintained over time. Without established written procedures for making revisions to data definitions, needed changes may not be made in a timely manner, which could impair data quality. For example, if the definitions in the DATA Act official repository and definitions in other sources are not aligned, then agency staff responsible for DATA Act compliance and reporting may make inconsistent choices about which definitions to apply when creating and submitting data. As we have previously reported, the current data governance structure did not prevent inconsistencies between the DAIMS and the official repository for data definitions. Changes to data standards for federal spending data should be transparently communicated to stakeholders, including the public. The DATA Act requires OMB and Treasury to consult with public and private stakeholders in establishing data standards. In addition, according to key practices for data governance that we identified in 2016, organizations should have documented policies and procedures for managing, controlling, monitoring, and enforcing consistent application of data standards and for obtaining input from stakeholders and involving them in key decisions, as appropriate. Standards for internal control in the federal government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. These objectives can include those relating to the release of reliable information in accordance with appropriate standards, applicable laws and regulations, and expectations of stakeholders. In the context of standards for transparently reporting federal spending data, stakeholders include the general public as well as staff at federal agencies. OMB did not transparently communicate the June 2018 revisions. OMB staff said that the changes were communicated in OMB Memorandum M- 18-16, which was issued on June 6, 2018. As shown in figure 2, a footnote in that memorandum contains a link to the official web page for OMB’s Office of Federal Financial Management. That page includes a link, labeled “DATA Act Data Standards,” to the public MAX.gov page that serves as the official repository for the data definition standards. However, neither this footnote nor other text in the memorandum makes reference to changes made to the definitions and policy. As of March 18, 2019, the official repository did not indicate that any changes have been made since the initial creation of the definitions in 2015. OMB did not provide documentation showing that the revisions were communicated to the public or to specific categories of stakeholders, such as users of the data standards within the federal government. As described below, the procedures that Treasury has implemented for managing changes to technical guidance, including publishing revision histories for guidance documents, represent one potentially effective approach to informing stakeholders, including the public, about changes to data standards. OMB staff viewed the revisions made in June 2018 as minor technical corrections that were needed to align the definitions with other OMB policies and with the consensus view of stakeholders at the time the data standards were first established. Consequently, they did not believe it was necessary to communicate these revisions publicly or indicate in the official repository that changes had been made. However, these revisions required significant changes in some federal agencies’ use of data definitions. As we reported in November 2017, some agencies applied DATA Act definitions directly when generating data to be reported to USAspending.gov. The new explanatory text added to the data definition repository instructs agencies not to apply these definitions directly, but instead to apply the more detailed definitions contained in regulations and policies governing the making and management of awards. Without transparent communication of changes to data definition standards, stakeholders—including staff at federal agencies required to report data according to these definitions—may miss important information relating to changes in how, when, and by whom data definitions are to be applied. The staff may then report data that are not consistent and comparable across the federal government. Such inconsistent reporting can undermine the transparency goals of the DATA Act, particularly when it affects key data elements, such as those describing geographical information. For example, we found in November 2017 that inconsistent data were reported about the locations where the federal government spends money, because some agencies used OMB’s DATA Act definition of the Primary Place of Performance data element, while other agencies used definitions from other sources, such as the data dictionary for the Federal Procurement Data System – Next Generation (FPDS-NG). In addition, a revision history showing when clarifications of policy and corrections to data standards were made could assist users of federal spending data, including historical data, in interpreting those data and assessing their reliability and quality. Treasury has established procedures for consulting with and informing stakeholders, including the public, about changes to technical guidance and reporting processes. Treasury’s stakeholder engagement process includes regular review of and revisions to its technical guidance. Before revisions to guidance are put into effect, Treasury staff circulate proposed changes through an email list that any member of the public can subscribe to, discuss these changes at frequent meetings with federal agency staff responsible for DATA Act reporting, and provide opportunities for agencies to test reporting under the new rules and provide feedback from this testing to Treasury. In addition, the guidance documents provide logs of all changes that have been made since the documents were created. According to Treasury staff, the most important tools for ensuring that agencies report consistent and comparable data are the DATA Act Information Model Schema (DAIMS) and the DATA Act Broker. Treasury’s documentation states that the DAIMS is “the data standard of the DATA Act” and contains standardized data elements that are complete and reflect the requirements of the act. The DAIMS includes reporting guidance that provides agencies with a complete listing of data elements they must report as well as a complete listing of data elements that will be extracted from government-wide systems, such as FPDS-NG. The DAIMS also includes a validation rules document that describes the business rules employed by the DATA Act Broker, which is Treasury’s system for collecting and validating agency data. Treasury provides federal agencies with detailed procedures for submitting DATA Act data to the broker. Before making changes to the DAIMS and DATA Act Broker, Treasury provides stakeholders with information about the planned changes and an opportunity to comment on them. For example, in June 2018, Treasury released DAIMS 1.3, an updated version of the DAIMS to be implemented during fiscal year 2019. Before releasing the final version of DAIMS 1.3, on June 29, 2018, Treasury shared its plans for the release with stakeholders through the Chief Financial Officers Council’s DATA Act Working Group (CFOC Working Group) and office hours calls. Treasury also transmitted a notice of proposed changes to federal agencies, collected comments from agencies during a designated comment period, and included responses to these comments in the final version of the release. Before implementing any of the changes in DAIMS 1.3 in the DATA Act Broker, Treasury provided agencies with a testing environment that allowed agency staff to identify any issues with the changes before those changes were applied to data published on USAspending.gov. Treasury’s documentation for the public and for federal agencies includes detailed information about the history of changes to the DAIMS. Each of the DAIMS guidance documents includes a change log that shows revisions made since the document was first created. The detailed information Treasury provides about changes to technical guidance can promote data quality and transparency by ensuring that federal staff are aware of reporting requirements, and that users of the data understand how those data are created and reported. Since 2014, OMB and Treasury have made significant strides to address the DATA Act’s requirements for standardization of federal spending data. As they move forward, appropriately and effectively managing changes to data standards will be critical to ensuring the quality and comparability of the data across the federal government. Treasury has instituted regular procedures for making changes to technical data standards, including procedures for consulting with stakeholders and for recording and communicating changes. OMB has taken responsibility for maintaining an official list of data definition standards separate from the technical data standards maintained by Treasury. However, OMB lacks comparable procedures for maintaining these data definition standards. OMB made changes to some of the definitions and clarified policies about how they are to be applied, but did not communicate those changes to stakeholders, including the public. Definitions of data elements and policies about how those definitions are to be applied are a key component of the management of federal spending data under the DATA Act. Although OMB has completed the task of creating an initial set of definitions, it has not formally and explicitly documented a consistent approach for maintaining the integrity of the data definition standards over time as we previously recommended. Until OMB establishes procedures to ensure that changes are controlled, it will continue to be a challenge to apply and interpret these definitions consistently, presenting risks to data quality. In addition, clearly identifying the changes that have already been made in the official repository could aid agency officials in reporting data and users in understanding the context in which past data have been reported. These actions would be important steps toward improving control over the data standards, creating an effective governance structure, and ultimately improving the consistency and quality of federal spending data. We are making two recommendations to the Office of Management and Budget: The Director of OMB should clarify and document OMB’s procedure for changing official data definition standards for DATA Act reporting, for example, by explicitly describing how change procedures developed for other government-wide initiatives apply to DATA Act definition standards in a public source of guidance or information. (Recommendation 1) The Director of OMB should ensure that the June 2018 policy changes regarding DATA Act data definition standards are clearly identified and explained in the official repository or another authoritative public source of DATA Act standards and guidance, such as by including a revision history along with the current version of the definitions. (Recommendation 2) We provided a draft of this report to OMB and Treasury for review and comment. OMB neither agreed nor disagreed with our recommendations, and OMB staff from the Office of Federal Financial Management provided oral comments, which are summarized below and incorporated as appropriate in the report. Treasury informed us that they had no comments on the draft report. In their oral comments, OMB staff stated that on the whole, the report correctly described the complex ecosystem of governance over data standards for federal spending data. However, OMB staff stated that in certain places the report did not fully capture the extent of OMB’s actions related to data governance for the DATA Act data standards. According to OMB staff, the Shared Solutions Governance Board (SSGB), under OMB’s direction, plays an important role in governing DATA Act data standards. OMB staff said that this relationship exists because the same agencies and staff participate in both the SSGB and the governance of the DATA Act data standards. In addition, OMB staff confirmed that descriptions of the specific roles and responsibilities of the SSGB, CFOC Working Group, and the Treasury office that manages the DAIMS have not been documented. OMB staff said that many of the same agency personnel participate in all of these groups, and therefore work closely together on a regular basis. OMB staff stated that this close involvement results in effective communication and a consistent approach to governance, and ensures an understanding of the procedures for changing data standards even though those procedures are not formally documented. We acknowledge OMB’s assertion that the various groups for creating and administering government-wide data standards (including data standards established to support the DATA Act) share many of the same staff. However, OMB’s approach relies on the continued participation of the same staff in order to maintain continuity rather than relying on documented policies, procedures, roles, and responsibilities for data governance functions. A key benefit of having a robust, institutionalized data governance structure is to provide consistent data management during times of change and transition, such as during staffing transitions or administration changes. It is important for OMB to clearly delineate roles and responsibilities so stakeholders understand how governance of the DATA Act standards is accomplished within the broader context of the PMA and other efforts. OMB staff also said they have communicated all changes to DATA Act data standards that have been made since the standards were created. OMB staff told us that the DAIMS is the official data standard for DATA Act reporting and, as such, includes logs that record all changes to the standards. According to OMB staff, OMB updated its public data standards web page on www.max.gov in June 2018 to fix an error and ensure that the page matched the DAIMS. Staff stated their belief that such a correction did not represent an actual change to a data standard and therefore did not need to be recorded in the DAIMS change log or communicated publicly. However, guidance issued in June 2018, OMB Memorandum M-18-16, identifies the MAX.gov web page as the official repository of the data standards. Specifically, the guidance directs agencies to report data in accordance with the standards maintained by OMB and Treasury pursuant to FFATA, as amended by the DATA Act, and provides a link to the OFFM website’s listing of data standards definitions. If OMB chose to identify the DAIMS—instead of the MAX.gov page—as the official source of data standards, then the issue about changes not being identified on the MAX.gov page would not be important. Although OMB made conforming changes based on our input to align the definition of Primary Place of Performance on the MAX.gov web page, having clearly documented procedures for making changes to the data standards and for ensuring that changes are communicated widely is important for ensuring the consistent and comparable reporting envisioned under the act. Additionally, in June 2018, OMB made an important change to the explanatory text that precedes these official data definitions as posted on the MAX.gov website, clarifying OMB’s policy regarding the use of the DATA Act data definitions. OMB staff acknowledged that that this clarification could have been publicized more effectively, which is why we continue to believe that our second recommendation—to include a revision history along with the current version of the DATA Act data definitions—remains valid. We are sending copies of this report to the Secretary of the Treasury and the Acting Director of OMB, as well as interested congressional committees and other interested parties. This report will be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Michelle Sager at 202-512-6806 or SagerM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of our report. Key contributors to this report are listed in appendix III. Appendix I: Interagency Groups Responsible for DATA Act Governance GitHub is a web-based software repository hosting service. The Federal Spending Transparency website can be found at: http://fedspendingtransparency.github.io/. JIRA is an online software development tool that Treasury uses to provide responses to stakeholder questions and comments related to the development of the broker. In addition to the contact named above, Peter Del Toro, Assistant Director, and Kathleen M. Drennan, Analyst-in-Charge, supervised the development of this report. Theodore Alexander and Sherrice Kerns made major contributions to this report. Also contributing to this report in their areas of expertise were David M. Ballard, Ann Czapiewski, Jenny Chanley, Robert Gebhart, Michael LaForge, Carl Ramirez, Andrew J. Stephens, and James Sweetman, Jr. Open Data: Treasury Could Better Align USAspending.gov with Key Practices and Search Requirements. GAO-19-72. Washington, D.C.: December 13, 2018. DATA Act: Reported Quality of Agencies’ Spending Data Reviewed by OIGs Varied Because of Government-wide and Agency Issues. GAO-18-546. Washington, D.C.: July 23, 2018. DATA Act: OMB, Treasury, and Agencies Need to Improve Completeness and Accuracy of Spending Data and Disclose Limitations. GAO-18-138. Washington, D.C.: November 8, 2017. DATA Act: As Reporting Deadline Nears, Challenges Remain That Will Affect Data Quality. GAO-17-496. Washington, D.C.: April 28, 2017. DATA Act: Office of Inspector General Reports Help Identify Agencies’ Implementation Challenges. GAO-17-460. Washington, D.C.: April 26, 2017. DATA Act: Implementation Progresses but Challenges Remain. GAO-17-282T. Washington, D.C.: December 8, 2016. DATA Act: OMB and Treasury Have Issued Additional Guidance and Have Improved Pilot Design but Implementation Challenges Remain. GAO-17-156. Washington, D.C.: December 8, 2016. DATA Act: Initial Observations on Technical Implementation. GAO-16-824R. Washington, D.C.: August 3, 2016. DATA Act: Improvements Needed in Reviewing Agency Implementation Plans and Monitoring Progress. GAO-16-698. Washington, D.C.: July 29, 2016. DATA Act: Section 5 Pilot Design Issues Need to Be Addressed to Meet Goal of Reducing Recipient Reporting Burden. GAO-16-438. Washington, D.C.: April 19, 2016. DATA Act: Progress Made but Significant Challenges Must Be Addressed to Ensure Full and Effective Implementation. GAO-16-556T. Washington, D.C.: April 19, 2016. DATA Act: Data Standards Established, but More Complete and Timely Guidance Is Needed to Ensure Effective Implementation. GAO-16-261. Washington, D.C.: January 29, 2016. DATA Act: Progress Made in Initial Implementation but Challenges Must Be Addressed as Efforts Proceed. GAO-15-752T. Washington, D.C.: July 29, 2015. Federal Data Transparency: Effective Implementation of the DATA Act Would Help Address Government-wide Management Challenges and Improve Oversight. GAO-15-241T. Washington, D.C.: December 3, 2014. Government Efficiency and Effectiveness: Inconsistent Definitions and Information Limit the Usefulness of Federal Program Inventories. GAO-15-83. Washington, D.C.: October 31, 2014. Data Transparency: Oversight Needed to Address Underreporting and Inconsistencies on Federal Award Website. GAO-14-476. Washington, D.C.: June 30, 2014. Federal Data Transparency: Opportunities Remain to Incorporate Lessons Learned as Availability of Spending Data Increases. GAO-13-758. Washington, D.C.: September 12, 2013. Government Transparency: Efforts to Improve Information on Federal Spending. GAO-12-913T. Washington, D.C.: July 18, 2012. Electronic Government: Implementation of the Federal Funding Accountability and Transparency Act of 2006. GAO-10-365. Washington, D.C.: March 12, 2010.", "summary": "The DATA Act required OMB and Treasury to establish data standards for the reporting of federal government spending and required agencies to report spending data using these standards beginning in May 2017. GAO's prior work examining the quality of the data reported under the act found significant challenges that limit the usefulness of the data for Congress and the public. These data quality challenges underscore the need for OMB and Treasury to make progress on addressing GAO's prior recommendation to establish a set of clear policies and processes for developing and maintaining data standards. The DATA Act includes a provision for GAO to report on the implementation and use of data standards, and on the quality of the data reported using those standards. This report (1) describes the status of OMB's and Treasury's efforts to establish policies and procedures for governing data standards; and (2) evaluates the extent to which procedures for changing established data standards are consistent with key practices for data governance. The Office of Management and Budget (OMB) and the Department of the Treasury (Treasury) have established some procedures for governing the data standards established under the Digital Accountability and Transparency Act of 2014 (DATA Act), but a formal governance structure has yet to be fully developed. Since enactment, OMB has relied on a shifting array of advisory bodies to obtain input on data standards. As of December 2018, some governance procedures are in place, but others continue to evolve. OMB staff told us that the governing bodies involved in initial implementation efforts had been disbanded, and that the functions previously performed by these advisory bodies over governance of DATA Act data standards would be accomplished within the broader context of the cross-agency priority goals established under the 2018 President's Management Agenda (PMA). However, the documentation of the governance structure established for these goals does not make explicit how it would apply to the data standards established under the DATA Act. Clarifying the connection between this governance structure and the DATA Act could help stakeholders understand how governance of the DATA Act standards is accomplished within the broader context of the PMA. With regard to one specific data governance function—making changes to existing standards—GAO found that OMB does not have procedures for managing changes to the web page it identifies in guidance as the authoritative source for data definition standards. The DATA Act requires, to the extent reasonable and practicable, that data standards be capable of being continually upgraded. In addition, key practices for data governance state that organizations should document policies and procedures for making decisions about changes to standards. In June 2018, revisions were made to the Primary Place of Performance Address data element without following a documented process. OMB staff described these revisions as minor technical corrections to align the definitions with the technical guidance agencies were already using to report data. However, without documented procedures for revising the definitions, needed changes may not be made in a timely manner, which could lead to inconsistent reporting. OMB also did not transparently communicate to stakeholders these changes to data definition standards. Along with the corrections to definitions, in June 2018 OMB changed introductory text on the data definitions web page to clarify policy about how agencies should use DATA Act definitions. However, OMB did not publicly announce this clarification or identify on the website that changes had been made. Without transparent communication of changes to data definition standards, stakeholders—including staff at federal agencies required to report data according to these definitions—may miss important information relating to changes in how, when, and by whom data definitions are to be applied. Although OMB lacks procedures governing changes to DATA Act data definitions, Treasury has established a process for changing related technical guidance in consultation with stakeholders. Treasury's procedures contribute to the objectives of data quality and transparency by helping to ensure that agencies are aware of reporting requirements and users understand how those data are created and reported. GAO makes two recommendations to OMB to (1) document its procedure for changing data definition standards for DATA Act reporting, and (2) ensure that changes made in June 2018 to clarify policy regarding data definitions are identified in an authoritative public source of DATA Act standards and guidance. OMB neither agreed nor disagreed with the recommendations, but provided comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "VA provides or pays for nursing home care through three separate programs, one for each of the nursing home settings in which VA provides or pays for care. In general, the three settings provide similar nursing home care, in which veterans receive skilled nursing care, recreational activities, and other services. However, some of the nursing homes may provide care to veterans on a short-term basis, such as rehabilitation after a hospitalization for a period of 90 days or less (“short stay”), or on a long-term basis, which is a period of 91 days or more (“long stay”). Further, officials told us that some of these homes may also provide certain special needs care for a limited number of residents, such as dementia or rehabilitative care, which may require additional specialized equipment or trained staff. Federal oversight of care provided to veterans within the three settings is conducted by VA only or a combination of VA and CMS. See table 1 for key characteristics on the three nursing home settings. Depending on a veteran’s eligibility status, VA pays the full or partial cost of nursing home care in each setting. For example, VA is required by law to provide the full cost of nursing home care for veterans who need nursing home care for a service-connected disability—which is an injury or disease that was incurred or aggravated while on active duty—and for veterans with service-connected disabilities rated at 70 percent or more. For all other veterans, VA provided nursing home care is based on available resources. Veterans and their families are responsible for making decisions about nursing home care that will best meet their needs. At the national level, VA provides information about nursing homes on its Access to Care website; according to VA, the website is intended to help inform veterans and their families’ about the quality of care in nursing homes. According to VA central office officials, the responsibility for helping veterans make decisions about nursing home care is decentralized to local VAMCs. In consultation with veterans and their families, VAMC social workers and clinical care providers can discuss factors such as the veteran’s eligibility for care in each setting, health needs, the type of care provided at different homes, space availability, and the veteran’s geographic preference. VAMC staff may also encourage veterans to take a tour of the prospective home. VA models its oversight of nursing home services provided to veterans on the methods used by CMS. CMS defines the quality standards that approximately 15,600 nursing homes nationwide must meet in order to participate in the Medicare and Medicaid programs. To monitor compliance with these standards, CMS contracts with state survey agencies to conduct inspections of each home not less than once every 15 months. During these inspections the state survey agency might identify deficiencies—or instances in which the nursing home does not meet an applicable quality standard. To address identified deficiencies, CMS generally requires nursing homes to implement corrective action plans. CMS also monitors—by conducting observational assessments of state agencies during inspections or conducting its own comparison inspections on a sample of homes each year—the state agencies that inspect CNHs to ensure that these inspections accurately identify whether the homes meet quality standards. In addition, CMS collects data on various clinical quality measures and calculates nursing home staffing ratios. CMS assigns each nursing home ratings in three components— inspections, quality measures, and staffing ratios—and an overall quality rating. CMS places the greatest weight on inspections in its calculations of each home’s overall quality rating. CMS publicly reports a summary of the information it collects on the quality of nursing homes on its Nursing Home Compare website, which uses a five-star quality rating system. As we previously reported, this website facilitates public comparison of nursing home quality. Within VA central office, the Office of Geriatrics and Extended Care is responsible for overseeing the quality of nursing home care provided to veterans in each of the three settings—CLCs, SVHs, and CNHs. The key mechanism VA uses to assess quality in each of these settings is regular inspections—generally occurring annually—that determine the extent to which homes meet relevant quality standards. VA’s use of inspections and other methods to ensure the quality of care in each of the three nursing home settings differs: CLCs. VA owns, operates, and oversees the quality of CLCs, and conducts regular unannounced inspections to determine the extent to which CLCs meet quality standards. VA central office contracts with the Long Term Care Institute to conduct these inspections, and VA central office reviews the results of all inspections. CLCs receive an initial inspection when they open and then periodic, unannounced inspections thereafter. The frequency of these inspections depends on the number and severity of deficiencies identified during the prior year’s inspection, but they generally occur every 11 to 13 months. CLCs are required to develop and implement corrective action plans for each deficiency identified that detail how it will be addressed. VA central office approves these plans, and the VISN and VA central office monitor the CLC’s actions until each deficiency is addressed. Per VA’s contract, VA monitors the Long Term Care Institute to ensure that inspections are conducted within required timeframes and to conduct quarterly assessments of the contractor’s performance, among other things. In addition, for each CLC, VA also collects information on quality measures and staffing ratios and uses this information, along with the inspection results, to assign a star rating from 1 to 5 stars. In June 2018, VA central office consolidated the ratings for all of the individual CLCs—modeled after CMS’s Nursing Home Compare—into its Access to Care website. SVHs. States own and operate SVHs and, as a result, in most cases SVHs are inspected by state agencies to determine the extent of their compliance with state requirements. About two-thirds of SVHs are inspected by CMS; however, VA is the only entity that conducts annual inspections for all SVHs. Although, VA does not exercise any supervision or control over the administration, personnel, maintenance, or operation of any state home, VA conducts these annual reviews for all SVHs and is prohibited from making payments to SVHs until it determines that they meet applicable quality standards. VA central office contracts with Ascellon to conduct these inspections and reviews the results of the inspections. The inspections first occur when an SVH initially seeks to become eligible for VA payments, and, once the SVH is eligible, unannounced inspections occur on an annual basis to verify that an SVH is eligible to continue to receive VA payments. For these annual inspections, the contractor generally cites deficiencies when SVHs are not in compliance with applicable quality standards. SVHs develop and implement corrective action plans for each deficiency identified, and the VAMC director approves the plan. VA should monitor the contractor’s performance annually, for example, to ensure that inspections are conducted within certain timeframes. VA’s Office of Geriatrics and Extended Care maintains a database of all corrective action plans, and VISN and VAMC staff monitor the SVHs’ actions until each deficiency is addressed. VA also collects VA prescribed quality measure and staffing data from SVHs as part of its survey process. However, VA does not currently assign a quality rating to SVHs. CNHs. CNHs can be publicly or privately owned and operated, and, CMS provides federal oversight for all CNHs that receive Medicare or Medicaid payments. VA requires CNHs under contract to be certified by CMS, and, unlike the other two settings, VA is not required to conduct regular inspections of CNHs. Instead, VA requires VAMC staff to conduct veteran care assessments on a monthly basis and annually review information CMS collects on the homes’ quality, including CMS inspection results, to evaluate whether to initiate or continue a contract with a CNH. The annual reviews use seven criteria established by VA’s Office of Geriatrics and Extended Care, including whether the CNH’s total number of health deficiencies from the most recent CMS inspection is twice the average of the state in which it is located. According to VA officials, CNHs that fail to meet four out of VA’s seven criteria during the annual reviews of CMS data are excluded from participation in its CNH program unless the VAMC seeks a waiver from VA central office to allow the home to participate. If VAMC staff are considering seeking a waiver to allow a CNH to continue participating in the CNH program, or have any other concerns about a home, they have the option of conducting their own onsite reviews of the home to assess care quality. Our analysis of VA data shows that veterans’ utilization of VA nursing home care—across CLCs, SVHs, and CNHs—increased 3 percent from fiscal year 2012 through 2017, from an average daily census of 37,687 to 38,880 veterans. VA projects that nursing home utilization will increase another 16 percent, to an average of 45,279 per day by fiscal year 2022, with varying increases projected for each of the nursing home settings. (See fig. 1.) Moreover, VA projects that overall demand for VA nursing home care will continue to increase through 2034, driven by the aging of the cohort of Vietnam War veterans. VA projects that Vietnam veterans will increasingly rely on VA’s health care system for care and will use more health care services, including nursing home care. As figure 1 shows, SVHs accounted for the largest percentage (53 percent) of the average number of veterans who received nursing home care each day in fiscal year 2017. However, the number of veterans in CNHs has increased and is projected to continue to increase. For example, the average number of veterans receiving nursing home care in CNHs increased 35 percent from fiscal year 2012 to 2017, from an average of 6,875 to 9,251 per day. Over the same period, the number of veterans in CLCs fell 9 percent, and in SVHs it fell 1 percent. VA officials told us that they are prioritizing the use of CLCs for short-term care, and that CNHs have the greatest capacity to meet the future long-term needs of veterans. VA projects that by 2034 the number of veterans receiving nursing care in these homes will exceed 17,000. In addition, VA projects that demand for nursing home care in CLCs and CNHs will decrease after 2034, and VA has not projected care in SVHs beyond 2022. VA officials also said that VA has limited flexibility to expand the number of beds in CLCs and SVHs to accommodate the projected number of veterans needing care. While VA expects to continue placing more of the veterans needing nursing home care into CNHs, officials noted some challenges contracting with these homes. Specifically, VA central office officials said that about 600 CNHs had decided to end their contracts with VA over the last few years for a variety of reasons. For example, officials from four of the VAMCs we interviewed told us about CNH concerns that contract approvals can take 2 years, homes have difficulties meeting VA staff requirements, and VA’s payment rates were very low. Officials said provisions in the VA MISSION Act of 2018 may alleviate some of these difficulties. Specifically, the Act consolidates various VA community care programs into the Veterans Community Care Program and authorizes VA to enter into veterans care agreements with certain providers, including nursing homes. In contrast to contracts, such agreements may not require providers to meet certain wage and benefit requirements. Officials told us that they are in the process of replacing CNH contracts with veterans care agreements, which may alleviate some of those challenges. In addition, VA officials told us that most nursing homes—including homes in each of the three settings—have limited capacity to serve veterans with special needs, such as those needing dementia, ventilator, or behavioral care. For example, they said that homes may not have any of the necessary specialized equipment or trained staff, or may not have as many of these beds as needed, to meet certain veterans’ special care needs. VA officials told us that they are working to expand the availability of special needs care in each of the three settings. Our analysis of VA data also shows that VA nursing home care expenditures have increased in recent years, reflecting increases in the number of veterans receiving such care. Specifically, VA’s nursing home expenditures across all three settings increased 17 percent from fiscal years 2012 through 2017, from $4.9 billion to $5.7 billion. These expenditures are expected to increase to $7.3 billion in fiscal year 2022 as utilization is projected to increase. VA officials told us that expenditures for nursing home care are projected to increase due to the rising costs of care as well as higher utilization of services. (See fig. 2.) Of the three settings, CLCs accounted for the largest share of VA nursing home expenditures; however, this reflects differences in the costs of care and the extent to which VA pays for these costs in each of these settings: For CLCs, VA pays the full cost of care for veterans in these homes and, according to VA officials, VA expenditures for care provided in CLCs are greater compared to the other settings, because CLCs are able to provide acute care that requires higher staffing levels and more specialized equipment. In addition, VA officials indicated that CLC expenditures also include the overhead costs of being associated with VAMC hospitals. For SVHs, 80 percent of veterans receive VA’s partial daily rate that covers only about a quarter of their care costs. For example, in fiscal year 2017, VA’s average SVH per diem was $106 for veterans without eligible service connected disabilities. VA also pays the full cost of care for the remaining 20 percent of veterans with service-connected disabilities. In fiscal year 2017, the full rate for these veterans was $397 per day. For CNHs, VA pays the full cost of care for veterans; however, more of these veterans receive long-term care, at a lower cost per day, than the short-term care that many veterans receive in CLCs, such as for rehabilitation after surgery, at a higher cost per day. As a result of these differences, in fiscal year 2017, VA paid, on average, $1,074 per day per veteran for care in CLCs, $268 for CNHs, and $166 for SVHs. During the contract year completed in 2018, VA’s two contractors conducted the required annual inspections of CLCs and SVHs to determine the extent to which the homes met quality standards. However, VA has opportunities to enhance its oversight of the contractors’ inspections by regularly monitoring both contractors’ performance inspecting CLCs and SVHs through observational assessments and by citing all SVH deficiencies. Although VA’s plans call for quarterly observational assessments, they have not been consistently conducted and documented. Similarly, VA has not provided guidance for the optional onsite reviews of CNHs that VAMCs may perform thus limiting their potential impact. Our review found that during the contract year completed in 2018, VA’s CLC contractor performed the required annual inspections for 126 CLCs. (See table 2.) Through these inspections, VA’s contractor determined the extent to which each CLC met applicable quality standards and issued deficiencies when standards were not met. The most common areas of deficiencies were those in which 1) the facility did not provide quality care for its residents, for example, in its treatment and prevention of pressure ulcers or managing its residents’ pain; 2) the facility did not adequately prevent and control infections, for example, by providing residents influenza and pneumococcal immunizations; and 3) the facility did not provide adequate care and services to sustain the highest possible quality of life for its residents, for example, by providing residents unable to carry out activities of daily living with adequate assistance to maintain good nutrition, grooming, and personal and oral hygiene. (See appendix I for more information on the types of deficiencies identified.) To address deficiencies, VA required CLCs to produce corrective action plans and tracked the CLCs’ progress until the deficiencies were resolved. In addition, for some of the most common deficiencies among CLCs, VA officials said VA took steps such as developing additional VAMC policies to facilitate improvement. For example, to reduce the number of CLC deficiencies related to pain management and improve CLCs’ performance in this area, VA officials said they developed specific guidelines for CLCs to use to assess pain in patients with dementia who were unable to provide numeric pain scores. While VA has monitored and determined that CLC inspections occurred as stipulated in its contract and tracked the results of the inspections, it has an opportunity to enhance its oversight. According to its contract, VA will monitor contractor performance on a quarterly basis, and VA central office officials told us their intention has been to meet this stipulation by observing the contractor as it conducts some inspections—an approach consistent with CMS’s inspection oversight process. However, VA officials told us that they have not been completing these observations quarterly and did not conduct any observations for the April 2017 to April 2018 contract year. VA officials said they had not performed this quarterly observation due to competing demands. For example, the three- person team at VA central office responsible for CLC oversight has overseen a number of recent initiatives, including the rollout of CLC quality ratings in 2018. Officials also told us they conducted one observation for the current contract year in December 2018 (during the course of our review). However, we were not able to confirm the December 2018 observation or any other observations of the CLC inspections because VA has not documented the results. A VA official said that developing an approach for documenting the quarterly observations is something VA needs to work on. VA’s failure to monitor the CLC contractor’s performance through observational assessments is inconsistent with its own goals of assessing the contractor’s performance quarterly and modeling its oversight after CMS’s approach to its own contractors’ inspections. It is also inconsistent with federal internal control standards that state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. By not conducting these quarterly observations for more than a year, VA does not know whether, or to what extent, the contractor is effectively assessing CLC compliance with quality standards and is unable to hold the contractor accountable for its inspections. Without effective monitoring of the contractor’s performance inspecting CLCs, VA risks that quality concerns in some CLCs could go overlooked, placing veterans at risk. Our review found that during the contract year completed in 2018, VA’s SVH contractor performed required annual inspections for all 148 SVHs. (See table 3.) As with CLCs, VA’s SVH contractor determined through these inspections the extent to which each SVH met applicable quality standards and cited deficiencies when they were not met. The most common areas of deficiencies were those in which 1) the facility’s physical environment did not adequately protect the health and safety of its residents, for example, by ensuring their safety from fires; 2) the facility did not provide quality care for its residents, for example, by adequately managing their pain; and 3) the facility did not assess residents’ health sufficiently, for example, within 14 days of residents’ admission and on an annual basis thereafter. (See appendix II for more information on the types of deficiencies identified.) To address deficiencies, VA required SVHs to produce corrective action plans and tracked the SVH’s progress until they were resolved. In addition, VA officials said they took steps to address deficiencies common among SVHs. For example, to reduce SVH deficiencies related to physical environment standards for fire safety and improve SVH performance in this area, VA central office staff told us they held SVH town halls with a fire safety engineer and created reference guides for SVH administrators about regulatory changes in fire safety codes. However, while VA has monitored that its contractor conducted the required SVH inspections and tracked the results of these inspections, VA has not monitored the SVH contractor’s performance of these inspections through regular observational assessments to ensure that contractor staff effectively determine whether SVHs are meeting required standards. Specifically, VA officials told us they intended to observe the SVH contractor’s inspections on a quarterly basis, which would be consistent with VA’s approach to CLCs and its goal of modeling its oversight on CMS’s. VA officials told us that although they have a goal of performing this monitoring on a quarterly basis; they could not recall when VA last observed the SVH contractor’s inspections. When asked, VA officials did not provide specific reasons why they had not performed the observational assessments; in prior discussions, these officials noted that VA’s oversight of SVHs is less involved than its oversight of CLCs because VA does not exercise any supervision or control over the administration, personnel, maintenance, or operation of any state home. However, VA pays for veterans to receive care in SVHs, and states that oversee these homes may or may not conduct their own oversight. Furthermore, as CMS conducts oversight of only those SVHs that receive Medicare or Medicaid payments (about two-thirds of all SVHs), for some SVHs, VA is the only federal agency with oversight over the quality of those homes care. For example, VA is the only entity that conducts regular inspections of SVHs in Missouri and New Hampshire. VA is missing another opportunity to enhance its oversight of SVHs by not requiring the SVH contractor to identify all failures to meet quality standards as deficiencies during its inspections. While CMS requires its inspectors to cite all deficiencies, VA directed its contractor to cite low- level deficiencies—deficiencies considered by the contractor to pose no actual harm but with potential for minimal harm—as “recommendations” rather than deficiencies. For example, during one SVH inspection, the contractor recommended that “to ensure nutritional adequacy, the facility should follow the menus, which are planned in advance.” VA officials told us that unlike deficiencies, they do not track or monitor the nature of the recommendations or whether the recommendations have been implemented. In contrast, state survey agencies under contract with CMS are required to cite all failures to meet quality standards as deficiencies. In addition to not citing recommendations as deficiencies, according to the VA contractor’s 2016-2017 annual summary report, SVHs can fix issues identified by the SVH contractor while the inspectors are still onsite to avoid being cited on the inspection. As a result, these issues are also not documented as deficiencies. Officials at four of the six SVHs we interviewed specifically reported being able to make on-site corrections to avoid being cited for deficiencies—for instance, officials at one SVH told us that the SVH was able to relocate handwashing stations before the end of the inspection in order to avoid being cited for a deficiency by the VA inspectors. According to VA, VA does not require its SVH contractor to identify all failures to meet quality standards as deficiencies in its inspections, VA officials said this practice reflects policy and a negotiated position with SVHs. VA officials reiterated that because SVHs are owned and operated by the states, VA is less involved with their oversight than CLCs. Our review of the VA contractor’s annual summary report showed that almost 50 percent of SVHs inspected between August 2017 and July 2018 (the contract year completed in 2018), zero deficiencies were identified through inspections. VA officials cited VA’s ‘collegial approach’ and willingness to make onsite corrections as factors contributing to the decline in recent years. Furthermore, while VA and CMS subject SVHs to slightly different standards, our review of VA and CMS inspection reports from a sample of five SVH inspection reports shows that VA identified a total of seven deficiencies and made four recommendations from these homes. In contrast, CMS identified a total of 33 deficiencies for these homes for approximately the same time period. By not performing observational assessments of SVH inspections, VA does not know whether, or to what extent, VA’s contractor needs to improve its ability to identify SVHs’ compliance with quality standards, which increases the possibility that quality concerns in some SVHs could go overlooked, potentially placing veterans at risk. Further, by not requiring the contractor to cite all failures to meet quality standards as deficiencies on its inspections, VA does not have complete information on deficiencies identified at SVHs and therefore cannot track this information to help identify trends in quality across these homes. Further, it is inconsistent with federal internal control standards that state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. We found that in 2017 the six selected VAMCs annually reviewed CMS data on the quality of all the CNHs with which they contract, which is a VA requirement. Specifically, the VAMCs reviewed the CMS data to determine whether the CNHs met VA criteria for contract renewal. (See table 4.) The top three criteria from the annual reviews that VAMCs failed to meet were 1) whether total registered nursing staff ratios per resident day fell below the state average, 2) whether total nursing staff ratios per resident day fell below the state average; and 3) whether six or more of selected CMS quality measures fell above the state average. In addition, we found that all six of our selected VAMCs conducted their own onsite CNH reviews—which, according to VA policy, VAMC officials have the option of performing if they have quality concerns about CNHs with which they contract or are determining whether to seek a waiver. The CNH onsite reviews conducted by these VAMCs focused on many of the categories for quality standards, such as food and nutrition services, quality of care, quality of life, and physical environment. While conducting onsite reviews of CNHs is optional under VA policy, officials at many of the VAMCs we interviewed told us that these onsite reviews—which the VAMCs we interviewed referred to as CNH inspections—are valuable in conducting CNH oversight as they provide important information about a home’s quality that VAMC staff would not have known otherwise. For example, officials from one VAMC shared with us results from an onsite review in which they found moldy and expired food in a CNH’s kitchen— food storage had been identified as an issue during a previous state survey for CMS and was purported to have been corrected 5 months prior. Furthermore, some VAMC staff said that they would suspend placement of veterans in certain CNHs and may not renew a CNH contract based on their findings from these onsite reviews. However, VA could strengthen its support for the optional onsite reviews by providing guidance to VAMC staff conducting these reviews. Officials at some VAMCs expressed concerns that VA did not provide the guidance they needed to conduct the optional onsite reviews, and that they would like to have more information from VA’s central office. As one VAMC official said, “without training or guidance from VA , it is difficult for VAMC staff, especially new staff, to know how to conduct these inspections.” VAMC officials at the six selected VAMCs told us that in the absence of guidance from VA, they had each independently developed their own tools and processes. Furthermore, officials at these VAMCs had differing understandings of the steps they can take if they identify quality concerns during onsite reviews. For example, staff at some VAMCs required CNHs to write corrective action plans and monitored the CNHs’ implementation until the deficiencies were addressed; in contrast, staff at other VAMCs did not monitor implementation, because they did not think they had the authority to hold CNHs accountable to correct deficiencies they identified. VA central office officials who oversee the CNH program told us that they do not provide training or guidance because CMS and the states, not VA, are responsible for regulating the quality of care in these nursing homes. However, in the absence of guidance from VA central office on the optional CNH onsite reviews—guidance that could be developed, for example, by collecting and disseminating best practices—VA has missed an opportunity to leverage efficiencies across VA’s network of VAMCs and empower VAMC officials with knowledge about the steps they can take to hold CNHs accountable for correcting problems. Furthermore, it is inconsistent with federal internal control standards that state that management should design control activities to achieve its objectives—in this case, to ensure that VAMCs contract with CNHs that provide high quality care. As part of its efforts to help veterans find placement into a nursing home, VA publicly provides information on care quality for CLCs and CNHs through its Access to Care website, but VA does not provide information on the quality of SVHs. Specifically, the website allows users to enter a location—such as a city and a surrounding distance—to produce a map with a list of CLCs and VA-contracted CNHs in their preferred area (see fig. 3). For each of the homes on the list, VA reports quality information it collects through its own inspections for CLCs and information CMS collects for CNHs. As previously noted, veterans and their families are responsible for making decisions about the nursing home care that will best meet their needs. Their decision-making can be aided by discussions with VAMC staff and information provided on VA’s Access to Care website, among other sources. The ability for veterans and their families to access information on nursing home quality through the Access to Care website—such as the currently available quality information on CLCs and CNHs—is particularly critical as VAMC officials do not always discuss quality information in their consultations with veterans and their families. As figure 3 shows, VA’s Access to Care website does not provide any information to the public about the quality of the 148 SVHs that provide nursing home care. Specifically, VA does not currently provide any information on SVHs on its Access to Care website—including information on the location of SVHs or CMS information on care quality that VA could easily provide on SVHs using information obtained from CMS’s website, Nursing Home Compare, as VA does now for CNHs. VA has explored activities that could provide veterans and their families with information about SVHs. For example, as stated in VA’s SVH strategic plan for fiscal years 2017 to 2022, VA considered an initiative to create a five-star program for SVHs. Additionally, VA has collaborated with SVHs to produce some data on quality measures. For example, during the course of this review, VA provided to us a quality measures report for SVHs by state that they developed in partnership with the National Association of State Veterans Homes. VA is able to develop this information because it has access to information on SVH quality—in fact, as the only entity that conducts regular inspections, it is the only source for quality information on all SVHs. Specifically, VA collects VA prescribed inspection, quality measure, and staffing data as part of its survey process that could be used to develop and distribute quality information for each home. Some of this information is available to the public at the local level, but it is not currently provided by VA. For example, SVHs are required to make the results of the most recent VA inspection of the home available for examination in a place accessible to residents. According to VA officials, there is no requirement to provide information on SVH quality on the Access to Care website, as SVHs are owned and operated by the states. However, the website is an important tool for veterans and their families to help inform their decision making on nursing home placement. VA has stated goals to provide useful and understandable information to veterans. The VA website could be the only readily accessible source of quality care information publicly available to veterans and their families for certain SVHs. As the SVH strategic plan indicates, VA sees the value in developing SVH ratings that could be used to provide quality information to veterans and their families. Furthermore, officials from three of the SVHs we spoke with told us that they supported having quality information available about their homes that would allow comparisons between SVHs or between SVHs and other homes, such as information contained in Nursing Home Compare. Without information about SVHs on VA’s Access to Care website, veterans and their families are limited in their ability to effectively evaluate all of their options when selecting a nursing home. Our prior work has shown that effective transparency tools—such as websites that allow consumers to compare the quality of different providers—provide highly relevant information to consumers. However, the limited information VA provides on its Access to Care website is inconsistent with VA’s articulated commitment to veteran-centric care, a component of which is ensuring that veterans are well informed about their options for care. The website’s limited information is also inconsistent with federal internal control standards, which state that management should externally communicate the necessary quality information to achieve an entity’s objective—in this case, providing important information to veterans on the quality of nursing homes. Action to inform veterans about the quality of SVHs would better enable veterans and their families to compare the quality of their nursing home care options across all three settings. In the coming years, VA projects an increase in the number of veterans receiving nursing home care. This makes it particularly important that VA ensure veterans receive quality care, regardless of the setting—CLC, SVH, or CNH—in which this care is provided. Inspections are a key oversight tool used to ensure veterans receive quality care. VA relies primarily on annual inspections to oversee the quality of nursing home care at CLCs and SVHs, and our review shows that VA’s two contractors conducted these required inspections during the period we reviewed. However, our review also shows that VA has opportunities to enhance this oversight. First, VA has not regularly monitored the contractors’ performance conducting these inspections by conducting observational assessments as intended and therefore does not know whether the contractors need to improve their ability to determine the homes’ compliance with quality standards. Second, VA does not require inspectors of SVHs to identify all failures to meet quality standards as deficiencies, which limits VA’s ability to track all deficiencies identified at SVHs and identify trends in quality across homes. Third, VA has not provided guidance for VAMC staff for instances in which they may conduct onsite reviews of CNHs directly. As a result, VA has missed an opportunity to leverage efficiencies across VA’s network of VAMCs and empower VAMC officials with knowledge about the steps they can take to hold CNHs accountable for correcting problems. By making enhancements to its oversight of inspections across all three settings, VA would have greater assurance that the inspections are effective in ensuring the quality of care within each setting. VA also seeks to ensure that each veteran chooses a nursing home placement that best meets his or her preferences and needs. To enable veterans to evaluate their care options, VA uses its Access to Care website. However, this website provides no information about SVHs, which is where most veterans are currently receiving VA-funded nursing home care. Since VA is the only entity that inspects and collects quality information on all SVHs, VA possesses quality information that is not available elsewhere. However, because VA’s website lacks information on the quality of SVHs, veterans and their families are limited in their ability to compare the quality of the available nursing home care options. We are making the following four recommendations to the Veterans Health Administration: The Under Secretary of Health should develop a strategy to regularly monitor the contractors’ performance in conducting CLC and SVH inspections, ensure performance results are documented and any needed corrective actions are taken. (Recommendation 1) The Under Secretary of Health should require that all failures to meet quality standards are cited as deficiencies on SVH inspections. (Recommendation 2) The Under Secretary of Health should develop guidance for VAMC staff conducting optional onsite CNH reviews. (Recommendation 3) The Under Secretary of Health should provide information on the quality of all SVHs that is comparable to the information provided on the other nursing home settings on its Access to Care website. (Recommendation 4) VA provided written comments on a draft of this report, which are reprinted in appendix III. In its written comments, VA generally concurred with all four recommendations. With respect to our recommendation on regularly monitoring contractor performance in conducting CLC and SVH inspections, VA concurred and stated they would develop a procedure for observational inspections. VA also concurred with our recommendation requiring all failures to meet quality standards to be cited as deficiencies on SVH inspections and that “any regulation assessed to be incompliant at the time of the survey will be rated as either provisional or not met, which requires a corrective action plan from the SVH.” VA concurred in principle with our other two recommendations and described actions it plans to take to address them. Specifically, regarding our recommendation to develop guidance for VAMC staff conducting optional CNH onsite reviews, VA stated that it will issue a memo to clarify and provide guidance related to CNHs. VA also noted that, although we found the VAMC staff we interviewed discussed and considered these onsite reviews “inspections,” VA does not. Based on these technical comments, we adjusted our terminology. Further, we reiterate the value that VAMC officials placed on these reviews for assessing the quality of care veterans receive in the report. Accordingly, we believe that VA has the opportunity when developing the memo to clarify and provide guidance related to these optional CNH onsite reviews. With respect to our recommendation that VA provide information on the quality of all SVHs that is comparable to the information provided on the other nursing home settings, VA stated it plans to evaluate the feasibility of providing SVH data. VA noted challenges with developing their own five star ratings for SVHs since VA does not have all the required data for SVHs that is needed. We acknowledge that developing comparable information will take time and have adjusted some language in our report to reflect that VA had considered developing an SVH five-star program. VA also stated that we inaccurately portrayed VA’s oversight authority, because each state oversees its own SVH and VA does not have the authority to regulate the business or clinical practices of the SVH. Both our draft and final reports stated that “VA does not exercise supervision or control over the administration, personnel, maintenance, or operation of any state home.” However, as stated in the report, federal law prohibits payments to SVHs that do not meet standards the VA prescribes and authorizes VA to inspect any SVH at such times as VA deems necessary to ensure that such facility meets those standards. Further, we reiterate that as VA is the only entity to conduct inspections for all SVHs—it uniquely possesses information that is not available elsewhere. Accordingly, we believe that VA has the opportunity to help veterans and their families by providing quality information for SVHs as it does for the other nursing home settings. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of the Department of Veterans Affairs, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-7114 or silass@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Number of deficiencies (percent) 1 (0) Admission, Transfer, and Discharge Rights 0 (0) 1 (0) 19 (3) 87 (15) 1 (0) 14 (2) 3 (1) 1 (0) 279 (48) 67 (12) 51 (9) Number of deficiencies (percent) 6 (3) 4 (2) 0 (0) 2 (1) 93 (48) 1 (1) 36 (19) 4 (2) 33 (17) Resident Behavior and Facility Practices 10 (5) 3 (2) 0 (0) 192 The total number of deficiencies may include deficiencies from one SVH that VA does not consider a skilled nursing facility. In addition to the contact named above, Karin Wallestad (Assistant Director), Jim Melton (Analyst-in-Charge), Kye Briesath, Krister Friday, and Mandy Pusey made key contributions to this report. Also contributing were Vikki Porter and Jennifer Whitworth.", "summary": "VA provides nursing home care for veterans whose health needs are extensive enough to require skilled nursing and personal care in an institutional setting. VA provides or pays for the cost of nursing home care for eligible veterans. GAO was asked to examine VA nursing home care. In this report, GAO 1) describes utilization of and expenditures for VA-funded nursing home care, 2) examines VA's use of inspections to assess the quality of nursing home care and its oversight of the process, and 3) examines the information VA publicly provides through its website on the quality of nursing home care. To perform this work, GAO reviewed VA policies and information on inspections and interviewed VA officials. GAO also selected six VA medical centers based on factors such as their participation with CLCs, SVHs, and CNHs and location. For each, GAO interviewed medical center officials and officials from corresponding VA regional offices, CLCs, SVHs, and CNHs. According to the Department of Veterans Affairs (VA), veterans' use of nursing home care increased 3 percent, from an average daily census of 37,687 to 38,880 veterans, from fiscal years 2012 to 2017. VA projects that use will increase 16 percent from fiscal years 2017 to 2022 with the aging of Vietnam War veterans. VA's nursing home expenditures increased 17 percent (8 percent adjusted for inflation), from $4.9 billion to $5.7 billion, from fiscal years 2012 to 2017. During the contract year completed in 2018, VA contractors conducted required inspections of community living centers (CLC) (VA-owned and -operated) and state veterans homes (SVH) (state-owned and -operated) to ensure they complied with quality standards. Selected VA medical centers also completed required annual reviews of Centers for Medicare & Medicaid Services data and conducted optional onsite reviews for community nursing homes (CNH), with which VA contracts. However, VA has opportunities to enhance its oversight. For example, VA did not conduct the quarterly monitoring of contractor performance as stipulated in its contract for CLC inspections from April 2017 to April 2018. VA officials also said they intended to regularly observe contractors conducting inspections to ensure they effectively determine compliance with standards, but have not done so due to competing demands. Officials also said they had performed these observational assessments in the past but were unable to provide documentation of them occurring. Conducting and documenting the quarterly observational assessments would allow VA to identify areas for improvements and to take any needed corrective actions. VA's Access to Care website provides publicly available information about the quality of CLCs and CNHs based on inspections. Veterans and their families can use the website to help inform their decisions on nursing home placement. However, the website does not include any SVH information. Although VA has access to SVH quality information, according to VA officials, they are not required to publicly report it. For some SVHs, VA is the only source for quality care information. Some of the quality information is available locally, but the VA website is an important tool for veterans and their families. Providing SVH information on its website could enhance veterans and their families' ability to evaluate all nursing home options. GAO is making four recommendations, including recommendations for VA to enhance its oversight of the quality of care provided to veterans in CLCs, SVHs, and CNHs and include on its website information on the quality of care for SVHs that is comparable to what it provides on CLCs and CNHs. VA concurred with two recommendations and concurred in principle with two recommendations.", "document_type": "gao"}
{"report": "USDA conducts the Census of Agriculture every 5 years, most recently in 2012 and 2017. The census provides a detailed picture of farms and the people who operate them. The census identifies several categories of farmers, including the following: Producers. Producers are individuals involved in farm decision- making. A single farm may have more than one producer. Primary producers. The primary producer is the individual on a farm who is responsible for the most decisions. Each farm has only one primary producer. The 2017 Census questionnaire substantially revised the way it collected certain data in order to better capture the contributions of all persons involved in farm decision-making. For example, the 2017 questionnaire asked for the names and demographic information of up to four producers per farm (compared to three in 2012) and used a series of questions on specific types of farm decisions to determine the primary producer (the 2012 questionnaire did not include these questions). Therefore, comparisons between the two censuses regarding the number and personal characteristics of producers and primary producers should be considered with the 2017 revisions in mind. While some changes may be the result of actual changes in the population of farmers and ranchers, other changes may be the result of changes in census methodology. USDA’s 2017 Census counted about 3.4 million producers across the roughly 2 million farms nationwide, compared to 3.2 million in 2012. This represents an approximately 7 percent increase over 2012 in the number of reported producers, despite a slight drop in the number of farms reported. Many of these additional producers were SDFRs. In 2017, SDFRs accounted for 41 percent (1,390,449) of all producers, compared to 36 percent (1,133,163) in 2012. The number of reported SDFR primary producers also grew between 2012 and 2017. Among SDFR subgroups, women accounted for the largest increase in producers and primary producers. In the 2017 Census, women also made up the largest group of SDFR producers and primary producers (see table 1). Women accounted for 88.3 percent of all SDFR producers and 81.0 percent of SDFR primary producers. Hispanic, Latino, or Spanish-origin producers were the next largest group, accounting for 8.1 percent of all SDFR producers and 11.0 percent of SDFR primary producers. On average, farms for which an SDFR was the primary producer (SDFR farms) were smaller and brought in less revenue than non-SDFR farms in 2017. While representing 30 percent of all farms, SDFR farms operated 21 percent of total farm land and accounted for 13 percent of the market value of agricultural products sold in 2017 (see table 2). About 55 percent of SDFR farms had fewer than 50 acres, and 88 percent had less than $50,000 in total sales and government payments. Additionally, a lower proportion of SDFR-operated farms (21 percent) received government payments compared to non-SDFR farms (36 percent). Agricultural producers generally require financing to acquire, maintain, or expand their farms, ranches, or agribusinesses. Agricultural loans generally fall into two categories: Farm ownership loans. These loans are used to acquire, construct, and develop land and buildings and have terms longer than 10 years. They are secured by real estate and are sometimes referred to as real estate loans. Farm operating loans. These loans are generally short-term or intermediate-term loans that finance costs associated with operating a farm. Short-term loans are used for operating expenses and match the length and anticipated production value of the operating or production cycle. Intermediate-term loans are typically used to finance depreciable assets such as equipment and usually range from 18 months to 10 years. These loans may also be referred to as non- real-estate loans. Several types of lenders provide credit to agricultural producers, including, but not limited to, the following: Farm Credit System. The Farm Credit System is a government- sponsored enterprise, established, in part, to provide sound, adequate, and constructive credit to American farmers and ranchers. The Farm Credit System includes a national network of 73 banks and associations. The Farm Credit System lends money to eligible agricultural producers primarily through its 69 lending associations, which are funded by its four banks. All are cooperatives, meaning that Farm Credit System borrowers have ownership and control over the organizations. The Farm Credit System is regulated by the Farm Credit Administration, an independent federal agency. The Farm Credit System’s statutory objectives include being responsive to the needs of all types of creditworthy agricultural producers having a basis for credit, with additional requirements to serve young, beginning, and small farmers and ranchers. According to the Farm Credit Administration, the Farm Credit System is not statutorily mandated to focus on providing financial opportunities to any other group. Commercial banks. Commercial banks are regulated by the federal depository institution regulators. They vary in size and the type of credit they provide. In a January 2013 report, we found that large banks were more likely to engage in transactional banking, which focuses on highly standardized products that require little human input to manage and are underwritten using statistical information. We also found that small banks were more likely to consider not only data models but information acquired by working with the customer over time. Additionally, we found that by using this banking model, small banks may be able to extend credit to customers who might not receive a loan from a larger bank. The American Bankers Association reported that in 2017, the majority of farm banks—those that made more agricultural loans than the industry average—were small institutions with a median asset size of $125 million. USDA Farm Service Agency. USDA’s Farm Service Agency makes direct loans to farmers and ranchers and guarantees loans made by commercial lenders and Farm Credit System associations. The Farm Service Agency is a lender that focuses on assistance to beginning and underserved farmers and ranchers who are unable to obtain credit elsewhere. For its guaranteed loans, the agency typically guarantees 90 percent of losses the lender might incur in the event that a borrower defaults, although the agency may guarantee up to 95 percent for qualifying loans to certain groups, including SDFRs. Guaranteed loan terms and interest rates are set by the lender, though USDA has established maximum rates and terms. Agricultural loans guaranteed by the Farm Service Agency generally account for about 4–5 percent of outstanding loans made by the Farm Credit System and commercial banks and credit unions. Other lenders. A variety of other businesses and individuals provide agricultural credit to farmers and ranchers, including credit unions, life insurance companies, farm implement dealers, and family members. According to the National Credit Union Administration, agricultural lending represents a small portion (less than several basis points) of credit union lending. Historically, life insurance companies have used agricultural real estate mortgages as part of their investment portfolios. Farm implement dealers sell machinery, parts, and services and offer financing for those products. According to USDA survey data, implement dealers currently provide almost one-third of the agricultural sector’s farm operating debt with terms longer than 1 year and are an increasing source of agricultural credit. According to USDA’s Economic Research Service, in 2017, the Farm Credit System and commercial banks accounted for the bulk of agricultural lending in the United States, comprising about 80 percent of the total outstanding farm debt. The remaining debt was USDA Farm Service Agency direct loans and loans made by other lenders. Information on the types and amount of agricultural credit to SDFRs is limited. Regulation B, which implements the Equal Credit Opportunity Act (ECOA), generally prohibits lenders from collecting data on the personal characteristics (such as sex, race, and national origin) of applicants for loans other than certain mortgages. Therefore, financial institutions and their regulators generally do not have information on the types or amount of agricultural lending to SDFRs. In contrast, USDA collects and maintains personal characteristic data on applicants for the farm loans it makes or guarantees in order to target loans to traditionally underserved populations and fulfill statutorily mandated reporting requirements. The lack of personal characteristic data on a large portion of agricultural loan applications limits the ability of regulators, researchers, and stakeholders to assess potential risks for discrimination. In a July 2009 report, we found that federal enforcement agencies and depository institution regulators faced challenges in consistently, efficiently, and effectively overseeing and enforcing fair lending laws due in part to data limitations. Additionally, we found that such data would enhance transparency by helping researchers and others better assess the potential risk for discrimination. For our current review, some federal depository institution regulators we spoke with said that additional data on nonmortgage lending would allow them to perform additional assessments of financial institutions’ compliance with fair lending laws. Some SDFR advocates we spoke with also expressed concern about the lack of accurate public information on lending to SDFRs, which they said forces them to rely on anecdotal evidence in attempts to monitor potential discrimination. A rulemaking pursuant to Section 1071 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act) would modify the Regulation B prohibition for certain loans, including possibly some agricultural loans. Section 1071 amended ECOA, requiring financial institutions to report information on credit applications made by women- owned, minority-owned, and small businesses. However, in April 2011, CFPB issued a letter stating that the requirements under Section 1071 do not go into effect until CFPB issues implementing regulations. The purpose of Section 1071 is “to facilitate enforcement of fair lending laws and enable communities, governmental entities, and creditors to identify business and community development needs and opportunities of women-owned, minority-owned, and small businesses.” Section 1071 is consistent with our 2009 report on fair lending issues, which said Congress should consider requiring additional data collection and reporting for nonmortgage loans. Section 1071 did not specify a time frame for CFPB to complete its rulemaking. As of June 2019, CFPB had not yet completed a rulemaking implementing Section 1071 of the Dodd-Frank Act. In 2017, CFPB issued a request for information seeking public comment on topics related to the collection of data on small business lending. However, in November 2018, CFPB announced that it was delaying the rulemaking due to resource constraints and other priorities. CFPB reported in the Spring 2019 Unified Agenda of Federal Regulatory and Deregulatory Actions that it plans to resume pre-rulemaking activities later in 2019. USDA’s annual survey of farm producers, the Agricultural Resource Management Survey, provides some insights into agricultural lending to SDFRs but has limitations when used for this purpose. The limitations fall into two main categories, as follows: First, the sample size used in the survey does not allow for capturing potential differences in the credit needs and challenges of specific socially disadvantaged subgroups. The relatively small proportion of SDFRs in the survey’s sample population renders estimates of SDFR farm debt less precise. To increase the precision of its estimates, USDA averaged 3 years of survey data (2015–2017) to increase the sample size of SDFRs available for analysis. Due to the small size of several SDFR subgroups, we analyzed SDFRs as a single combined group. Second, the survey may underrepresent the total outstanding farm debt of socially disadvantaged groups and should be interpreted with caution, according to USDA officials. As previously discussed, the 2017 Census questionnaire included revisions that better captured the role of SDFRs in farm operations, and its results suggest that the 2012 Census and the 2015–2017 surveys (which used similar methodologies) may have underreported the number of SDFRs designated as primary producers, particularly women. Specifically, in the 2015–2017 surveys, SDFRs represented 17 percent of primary producers, whereas in the 2017 Census, SDFRs accounted for 30 percent of primary producers. However, the potential underrepresentation issue should not affect the statistical significance of comparisons between the SDFR and non-SDFR subgroups within the survey. With these caveats in mind, the 2015–2017 survey data suggest that SDFR primary producers had annual average outstanding farm debt of $20.0 billion ($17.5–$22.6 billion at the 90 percent confidence level). This estimate represents debt used specifically for farm purposes. Farm ownership debt was a larger share of SDFR outstanding farm debt than it was for all other farmers and ranchers. Among SDFR primary producers, farm ownership debt was estimated to account for 67 percent of outstanding farm debt, compared to an estimated 59 percent for non-SDFR primary producers (see fig. 1). Farm operating debt accounted for the remaining 33 percent and 41 percent of outstanding SDFR and non-SDFR farm debt, respectively. SDFRs received proportionately fewer loans and less agricultural credit overall than non-SDFRs. Specifically, SDFRs accounted for an estimated 17 percent of primary producers in the survey but only 13 percent of farms with loans and 8 percent of total outstanding farm debt. SDFR debt represented an estimated 9 percent of total farm ownership debt and 7 percent of total farm operating debt (see table 3). Therefore, even though farm ownership debt comprised most outstanding SDFR farm debt (67 percent), SDFR primary producers were still less likely to have outstanding farm ownership debt than all other farmers and ranchers. While the survey data show that SDFRs had proportionately less agricultural credit than non-SDFRs, the survey does not provide information on the reasons why. However, a number of factors may help explain these differences. For example, the 2017 Census shows that SDFRs are more likely than non-SDFRs to operate smaller farms with less market value, and smaller farms may require less credit to operate. In addition, as discussed later in this report, SDFRs may have greater difficulty qualifying for agricultural loans or may be dissuaded from applying for credit. SDFR primary producers generally borrowed from the same type of lenders as non-SDFRs and reported using a range of agricultural credit providers. The distribution of SDFR and non-SDFR farm debt by lender type in the survey was roughly similar, with all differences within the margin of error (at the 90 percent confidence level). According to the survey data, an estimated 51 percent of SDFRs’ outstanding farm debt was lent by commercial banks and savings associations. Lending by Farm Credit System institutions (28 percent), USDA’s Farm Service Agency (6 percent), and other lenders, such as individuals and equipment dealers (15 percent), comprised the remainder. SDFRs received a larger share of their operating credit, compared to ownership credit, from lenders in the “other” category. This was true for non-SDFR operating debt as well. These results should be interpreted cautiously because the information is self-reported and respondents may not have known the specific types of lenders they used. The survey results for all farms appear to overrepresent debt from commercial banks and savings associations when compared with data collected by USDA’s Economic Research Service on farm-sector balance sheets. It is possible some respondents mischaracterized some debt from Farm Credit System institutions as debt from commercial banks. While loans guaranteed by USDA’s Farm Service Agency make up a small percentage of overall agricultural lending, the agency tracks how much of this lending goes to SDFRs and the purpose of the loans (ownership or operating). In fiscal year 2018, the Farm Service Agency guaranteed $3.2 billion in new agricultural loans. About $340 million (10.8 percent) of this amount went to SDFRs (see fig. 2). By dollar volume, farm ownership loans accounted for about 71 percent of the guaranteed loans to SDFRs. Farm operating loans accounted for the remaining 29 percent. Guaranteed farm ownership loans to SDFRs averaged about $519,000, while farm operating loans averaged about $279,000. A 1988 amendment to the Consolidated Farm and Rural Development Act states that USDA should establish annual target participation rates for SDFRs on a county-wide basis for farm ownership loans and, to the greatest extent practicable, reserve funds for certain loans it makes or insures under these targets. However, in August 2007, USDA’s Office of General Counsel provided a legal opinion that stated that the statute could be read to apply only to the direct loan program. As a result, officials at the Farm Service Agency told us it does not set annual target participation rates by county or reserve funds for guaranteed loans. Over the last 5 fiscal years (2014–2018), the Farm Service Agency guaranteed an increasing number of loans to SDFRs each year. The agency guaranteed 489 loans to SDFRs in fiscal year 2014 and 817 loans in fiscal year 2018—a 5-year high. Over that period, the total dollar amount of guaranteed loans to SDFRs increased by 69.6 percent when adjusted for inflation. The increase was similar for farm ownership and farm operating loans (see fig. 3). While the total dollar amount of guaranteed loans to SDFRs increased each year, the percentage of guaranteed loans that went to SDFRs, by dollar volume, decreased from fiscal years 2014 through 2016 (see fig. 4). This percentage started increasing in fiscal year 2017, when SDFRs accounted for 8.7 percent of guaranteed loans by dollar volume. However, guaranteed loans to SDFRs still accounted for a slightly smaller portion of all guaranteed loans in fiscal year 2018 (10.8 percent) than in fiscal year 2014 (11.0 percent). In fiscal year 2018, the dollar amount and percentage of guaranteed loan funds that went to SDFRs differed substantially by state (see table 4). Hawaii and Puerto Rico were the only two states or territories where SDFRs received more than one-half of all guaranteed loans (farm ownership and operating loans combined). However, Hawaii and Puerto Rico received 0.1 percent of all guaranteed loans. For several states where SDFRs received a large dollar amount of guaranteed loans, these loans represented less than 20 percent of the state’s guaranteed loan funds (for example, Arkansas, Missouri, and South Dakota). In contrast, several states with the largest proportions of guaranteed loans to SDFRs had less guaranteed loan funds overall (for example, Florida, Wyoming, and Maryland). The Farm Service Agency did not guarantee any loans to SDFRs in Alaska, Connecticut, New Hampshire, or Rhode Island in fiscal year 2018. According to representatives from some SDFR advocacy groups, federal depository institution regulators, and lending industry associations we interviewed, SDFRs can have difficulty obtaining agricultural credit from private-sector lenders because they operate smaller farms and in some cases do not meet standards for farm revenue, applicant credit history, and collateral. Farm size. As previously discussed, SDFRs are more likely than other farmers and ranchers to operate small farms, which can make it difficult for them to qualify for private credit. According to data from the 2017 Census of Agriculture, SDFRs represented 30 percent of primary producers but operated 39 percent of farms smaller than 50 acres and 16 percent of farms 500 acres or larger. Some SDFR advocates and lending industry association representatives we interviewed said lenders have several incentives to lend to larger farms. First, one advocate noted that operators of smaller farms typically need smaller loans, and making many small loans is more time- and resource-intensive than making fewer, larger loans. Second, one industry association and one SDFR advocate noted that large farms often produce major commodities such as corn, soybeans, and beef cattle, while small farms often produce specialty crops. The SDFR advocate said underwriting loans to large farms that produce major commodities is easier and less risky because more data are available on the market for those products. Third, representatives of one SDFR advocacy group and one industry association noted that programs such as crop insurance are geared toward large, major-commodity farmers. They said these programs mitigate repayment risk and make lenders more likely to approve a loan or provide more favorable terms, such as lower interest rates. In contrast, representatives from the Office of the Comptroller of the Currency noted that the Community Reinvestment Act can provide incentives for banks to lend to smaller farms. Farm revenue. Consistent with their smaller size, SDFR farms also generate less revenue on average than non-SDFR farms. As previously noted, SDFR primary producers accounted for a disproportionally small portion (13 percent) of total agricultural product sales in 2017 relative to their overall representation among primary producers (30 percent). Additionally, according to one SDFR advocate, SDFRs may have more difficulty than other farmers and ranchers in documenting their revenue because they are more likely to sell their products through informal cash transactions. Operating a lower-revenue farm and having limited documentation of revenue can be hurdles to obtaining private credit because these factors may negatively affect a lender’s assessment of the applicant’s repayment ability. Federal depository institution regulators have noted that farm revenue is critical to demonstrating a borrower’s capacity to repay an agricultural loan. For example, in its risk management expectations for agricultural credit, the Board of Governors of the Federal Reserve System says banks should review borrower-prepared cash-flow statements to identify potential repayment-ability problems. Lenders consider farm revenue when calculating an applicant’s debt-to-income ratio (the percentage of income that goes to recurring debt payments), which is a central underwriting criterion. In general, having lower income relative to recurring debt payments indicates weaker repayment ability. Consistent with this principle, Farm Credit Administration regulations require Farm Credit System associations to have written policies and procedures that include underwriting standards that demonstrate an applicant’s repayment capacity when approving a loan. Additionally, representatives of one industry lending association said that revenue is the most important factor that banks consider in underwriting agricultural loans. Credit history. Some SDFRs may have relatively low credit scores or limited credit histories, which can make it difficult to obtain agricultural credit. Some SDFR advocates and lending industry association representatives we interviewed said that some SDFR subgroups are more likely than members of nondisadvantaged groups to have difficulty meeting credit score standards for agricultural loans. Prior research provides some evidence to support this view. For example, the Board of Governors of the Federal Reserve System reported in 2007 that African Americans and Hispanics had lower credit scores on average than non- Hispanic whites and Asians, although the study did not specifically examine farmers and ranchers. While private agricultural lenders are not subject to federal statutory or regulatory credit score requirements for approving agricultural loans, federal depository institution regulators emphasize the importance of evaluating applicants’ creditworthiness in their lending guidelines. For example, the Office of the Comptroller of the Currency’s handbook on agricultural lending states that current credit information is essential to a bank’s ability to evaluate borrowers’ creditworthiness. Lending industry association representatives we interviewed also noted that underwriting for agricultural lending is increasingly standardized and reliant on credit scores. For example, representatives from the Farm Credit Council (the trade association for the Farm Credit System) said approval decisions for about one-half of the loans that Farm Credit System associations make each year are made using credit scorecards. Credit scorecards are algorithms that statistically quantify a borrower’s probability of repayment using inputs such as the borrower’s credit score. Additionally, participation in the secondary market for agricultural loans may require lenders to comply with credit score criteria. For example, the Federal Agricultural Mortgage Corporation (commonly known as Farmer Mac)—a federal government-sponsored enterprise that purchases and securitizes agricultural loans—has minimum credit score standards that range from 660 to 720. Collateral. Some SDFRs face challenges using their agricultural land as collateral. Many long-term agricultural loans require the borrower to pledge land as collateral to secure the transaction. For example, long- term loans (up to 40 years) made by Farm Credit System associations must be secured by a first-position lien on interests in real estate, generally enabling the Farm Credit System to obtain ownership or control of the land in the event of default. Federal regulators, lending industry association representatives, and SDFR advocates we spoke with identified several reasons why SDFRs, especially African Americans and American Indians on tribal lands, have difficulty using agricultural land as loan collateral. Some SDFRs do not have a clear title to their agricultural land because the land was passed down informally from generation to generation without a will. In addition, land passed down in this manner can result in numerous heirs—thousands in some cases—owning the land in common (that is, not physically divided among them). These circumstances can limit use of the land as collateral because of lending requirements or conventions that require formal proof of ownership or that disallow the use of a partial ownership interest as security for a loan. SDFR advocates and officials from the Farm Credit Administration told us these issues have particularly affected African American farmers due to historical factors that limited their access to legal services. In our May 2019 report about lending on tribal lands, we discussed how these issues also have posed problems for American Indian farmers. As we also reported in May 2019, American Indian farmers on tribal lands face additional challenges in using tribal land as collateral for agricultural loans because of statutory restrictions and some lenders’ concerns about their ability to enforce a foreclosure. SDFR advocates we spoke with said that in addition to difficulty meeting loan underwriting standards, SDFRs face challenges related to historical discrimination, ongoing unfair treatment by lenders, and a lack of familiarity with some programs and technologies when trying to obtain private agricultural credit. As the Congressional Research Service reported in 2013, allegations of unlawful discrimination against SDFRs in the management of USDA programs are long-standing and well-documented. For example, in 1965, the U.S. Commission on Civil Rights found evidence of discrimination in the delivery of USDA farm programs, including loan programs. A subsequent report by the commission in 1982 and a report by the USDA Civil Rights Action Team in 1997 found continuing problems with the experience or treatment of SDFRs in USDA programs. USDA has also settled several class action lawsuits that SDFRs filed for, among other things, discrimination in the agency’s farm assistance programs. The allegations in these lawsuits included that USDA systematically denied SDFRs agricultural credit and other program benefits in violation of ECOA and failed to investigate complaints of discrimination, as required by USDA regulations. The settlements made more than $4 billion in awards available to farmers and ranchers whose claims were approved through administrative procedures. Some SDFR advocates told us that historical discrimination in agricultural lending adversely affects SDFRs’ current ability to obtain private credit in several ways. First, they said SDFRs who were unfairly denied USDA loans and other program benefits in the past have not been able to develop their farms in the same ways as farmers and ranchers who did receive loans, thus reducing their ability to obtain private credit today. The advocates elaborated that USDA agricultural credit allows recipients to expand operations and to purchase land and equipment that can later be used as collateral, making it easier to get subsequent and larger loans. Some SDFR advocates also stated that historical exclusion from credit markets and farm programs has limited SDFRs’ familiarity with lending standards and resulted in less formal recordkeeping, which impairs their ability to obtain private-sector credit. Finally, advocates said that historical discrimination has led generations of SDFRs to distrust institutional lenders, making them less likely to apply for credit. Some SDFR advocates we spoke with said that unfair treatment by private lenders is also a barrier to SDFRs obtaining private agricultural credit. One SDFR advocate said some lenders discriminate against SDFRs in loan approval decisions but that they more frequently treat SDFRs unfairly with respect to loan terms and conditions (for example, interest rates, fees, and collateral requirements) and loan servicing (for example, restructuring and foreclosure mitigation actions). Another noted that adverse loan terms and conditions and servicing practices can increase the risk that borrowers will lose their farm, house, and other property by making the loan unaffordable or reducing the chances that borrowers will catch up on payments if they fall behind. For example, this SDFR advocate said they were aware of cases in which (1) lenders required SDFRs to pledge potentially excessive collateral for loans, such as the borrower’s home in addition to the farm land, and (2) loan servicers moved more quickly to foreclose on SDFR borrowers who were behind on loan payments than on other borrowers and did not provide repayment options that may have allowed them to continue their operations. One SDFR advocate also stated that some SDFRs report not feeling welcome at lending institutions based on the perception of having been repeatedly dismissed by lender staff, while another said that in some cases, SDFRs have not been provided timely or helpful information on the loan application process. One SDFR advocate we spoke with said these practices are prevalent in some agricultural credit markets and that they had been or were currently involved in litigation related to these types of practices. However, banking industry association representatives said they did not believe that SDFRs are being treated unfairly and that denying loans to qualified applicants would cause lenders to decrease profits in a competitive market. They noted that lenders face significant competition, which incentivizes them to make loans to all qualified borrowers, and that lending decisions and loan terms are based only on the applicant’s ability to repay a loan and other underwriting criteria. We did not attempt to independently verify claims of unfair treatment of SDFRs by private-sector lenders, in part because data limitations discussed earlier limit the identification and analysis of possible discriminatory practices. Some SDFR advocates also said that some SDFRs may not be obtaining private agricultural credit because they are not aware of all potential credit options and related programs and are not always familiar with the technology needed to access them. For example, one advocate told us some SDFRs may not be aware that they could qualify for private agricultural loans, especially if they are recent immigrants or new to agriculture. This problem may be particularly true for loans from the Farm Credit System associations. Two advocates said SDFRs are not familiar with these lenders, and representatives of the Farm Credit Council told us people who did not grow up in farming tended not to know about the Farm Credit System. SDFR advocates we spoke with said this issue is exacerbated by limited outreach by private lenders to SDFRs, as discussed in more detail later in this report. Advocates also noted that historically disadvantaged groups are less likely to have access to or be familiar with computer technology and the internet, and that credit applications and related financial education programs are now provided online. The Farm Credit System does not have a specific mandate to serve SDFRs, but its associations conduct some outreach to SDFRs in implementing the following statutory requirements and Farm Credit Administration regulations. The Farm Credit Act of 1971 was amended in 1980 to require the Farm Credit System to serve young, beginning, and small farmers. Related Farm Credit Administration regulations require the associations to implement effective outreach programs to these groups. While these requirements do not mandate outreach to SDFRs specifically, Farm Credit Administration officials said that many SDFRs qualify as young, beginning, or small farmers and, therefore, that Farm Credit System outreach efforts reach SDFRs to some extent. In 2012, the Farm Credit Administration amended its regulations on business planning to help ensure the Farm Credit System is responsive to the credit needs of all eligible and creditworthy persons. The regulations, which first applied to 2013 business plans, require Farm Credit System associations to develop marketing plans describing, among other things, (1) the demographic groups in their service areas, (2) ways to market their services to all qualified farmers and ranchers, and (3) specific outreach toward diversity and inclusion in each market segment. The supplementary information included with the publication of the final rule cites the perception of some SDFR advocates that Farm Credit System associations are not accessible to underserved farmers and have not conducted sufficient outreach to those populations about programs and services. The full extent of the Farm Credit System associations’ outreach to SDFRs is unknown. Neither the Farm Credit Administration nor the Farm Credit Council maintains aggregated information on the number or type of completed outreach activities involving SDFR participants. However, our nongeneralizable review of recent marketing plans from six Farm Credit System associations in areas with relatively high proportions of SDFRs identified some examples of outreach to SDFRs. For instance, some associations have partnered with a nonprofit organization to provide educational programs designed to strengthen women’s roles in the modern farm enterprise. Associations have also participated in agricultural conferences at historically black colleges and universities and translated marketing materials for non-English speakers. Despite some outreach, some SDFR advocates we spoke with said that Farm Credit System associations’ outreach has had limited effects on the amount of credit provided to SDFRs and SDFRs’ familiarity with the system. One SDFR advocate we spoke with said that while some Farm Credit System associations engage with socially disadvantaged communities, the outreach has not increased the diversity of the system’s borrowers. Others said that Farm Credit System outreach to SDFR communities has been insufficient and that some SDFRs are still not aware of the Farm Credit System. However, one SDFR advocate noted that the Farm Credit System’s outreach to young, beginning, and small farmers has been beneficial for those populations. The impact of Farm Credit System associations’ outreach to SDFRs is also not known. The marketing plan requirement does not oblige Farm Credit System associations to meet specific lending goals or favor any type or group of agricultural producers in their underwriting. Accordingly, the associations are not expected to quantify the extent to which they are meeting their diversity and inclusion outreach plans in the information they provide to their boards of directors. Moreover, Farm Credit Administration officials said Regulation B, discussed earlier, prevents the associations from collecting data on the race, ethnicity, and sex of loan applicants that would be needed to assess the effects of outreach efforts on lending to socially disadvantaged groups. In contrast, the officials noted that Farm Credit System associations are required to set lending targets for young, beginning, and small farmers; monitor outreach to those groups; and report on performance results of their young, beginning, and small farmer programs. In 2018, the Farm Credit System reported that all direct-lender institutions with young, beginning, and small farmer programs within the system were in compliance with these requirements. While the Farm Credit Administration has not evaluated the impact of outreach by Farm Credit System associations, its reviews of association marketing plans have found that most of the plans comply with requirements for outreach toward diversity and inclusion but that some lack specificity. The Farm Credit Administration told us it examines all of the associations’ marketing plans for regulatory compliance every 3 years. Farm Credit Administration officials reviewed their examinations from 2014 and 2017, the two scheduled examination cycles after the new requirements were implemented in 2012. They found that 85 percent of the 78 Farm Credit System associations examined in 2014 complied with the marketing and outreach requirements, and 94 percent of the 71 associations examined in 2017 complied. In cases where examiners identified deficiencies in marketing plans, the agency said it prescribed corrective actions, including requiring associations to do the following: obtain sufficiently detailed information to analyze and understand develop specific action plans and outreach strategies to market the institution’s products and services to potentially underserved markets; and ensure appropriate reporting on progress in accomplishing marketing plan strategies and actions. Farm Credit Administration officials said they hold periodic discussions with managers of Farm Credit System associations to monitor the status of corrective actions and conduct follow-up examinations to determine the adequacy of the corrective actions and, if applicable, the need for additional enhancements. The results of our review of a nongeneralizable sample of association marketing plans were broadly consistent with the Farm Credit Administration’s findings. We reviewed the most recent available plans of the six Farm Credit System associations noted previously for evidence of demographic information on the institution’s service area and for diversity and inclusion outreach efforts. Among the plans we reviewed, five included demographic information, but one did not. Farm Credit Administration officials said they also had identified that deficiency in their examination of that marketing plan. Additionally, five of the plans had examples of planned outreach efforts to SDFRs, but another one did not. According to representatives of lending industry associations we interviewed, commercial banks generally do not target outreach for agricultural lending to specific demographic groups. Officials from the federal depository institution regulators noted that commercial banks and credit unions are not required to conduct outreach on agricultural lending, and that the extent to which any lender conducts outreach is a private business decision. However, officials from one federal depository institution regulator noted that some lenders have participated in conferences organized by SDFR groups. They also said that in fulfilling responsibilities under the Community Reinvestment Act, lenders engage with community groups in their assessment areas to help identify credit needs. The officials said these efforts would likely engage SDFRs in areas where agriculture was prevalent and where agricultural lending was part of a bank’s business model. Some SDFR advocates we interviewed said that outreach and engagement by commercial banks was insufficient. For example, despite their familiarity with agricultural lending, some noted that they did not know of any specific outreach to SDFRs by private-sector lenders. They also noted that additional outreach is needed because some SDFRs are not familiar with agricultural lending products offered by commercial banks. Federal depository institution regulators do not monitor outreach to SDFRs by the institutions they supervise but have conducted some additional outreach themselves. Officials from the regulatory agencies told us they do not collect data on the amount of, types of, participation in, or impact of outreach conducted by their regulated institutions. However, as part of their efforts to promote the availability of credit and other services, the federal depository institution regulators have engaged in some outreach to SDFRs, as shown in the following examples. The Office of the Comptroller of the Currency has established an Office of Minority and Women Inclusion and an Office of External Outreach and Minority Affairs, which help to address fair credit access issues affecting minority communities and have worked with some national SDFR groups to coordinate, facilitate, and implement conferences, roundtables, and seminars. The Federal Deposit Insurance Corporation’s Community Affairs Branch has engaged bankers, nonprofits, and other stakeholders to provide small business training for SDFRs. This training provides examples of small business lending and has highlighted programs for which participants may qualify. In 2017, the Federal Reserve Bank of St. Louis and the Board of Governors of the Federal Reserve System engaged with federal agencies, businesses, and groups representing SDFRs to develop and publish a guide titled Harvesting Opportunity, which focuses on how credit can provide greater support for local food-related businesses and farmers. USDA facilitates and provides outreach to SDFRs that some SDFR advocates say has been beneficial, but outreach on USDA-guaranteed farm loans is just one component of this broad-based effort. USDA’s Office of Partnerships and Public Engagement implements the Outreach and Technical Assistance for Socially Disadvantaged and Veteran Farmers and Ranchers Program, referred to as the Section 2501 program. The program is designed to enhance coordination of outreach, technical assistance, and education efforts authorized under agricultural programs to improve SDFR and veteran farmer and rancher participation in the full range of USDA programs, including guaranteed farm loans. USDA officials said this program primarily provides grants and technical assistance to community-based organizations and develops materials describing best practices for national, state, and local outreach efforts. Two SDFR advocates we interviewed said outreach programs coordinated through the Section 2501 program have improved SDFRs’ understanding of USDA’s farm lending programs, and that the program’s efforts to engage SDFRs in programs and services are better now than they have been historically. USDA officials said they track these outreach activities but do not maintain data on activities that specifically address guaranteed loans because the outreach is generally intended to connect socially disadvantaged groups with any USDA program that may be appropriate. In addition to department-level outreach activities, USDA’s Farm Service Agency conducts outreach to increase SDFR participation in its programs through activities targeted to underserved populations. Farm Service Agency outreach efforts are conducted by the agency’s field offices and overseen by the Outreach Office. The outreach includes lender trainings and partnerships with community-based and tribal organizations to engage socially disadvantaged communities. Farm Service Agency officials said that they have partnered with private-sector lenders to conduct some outreach events specifically related to the guaranteed farm loan program but that most of the outreach is more general. Farm Service Agency officials told us they use data on guaranteed loans to SDFRs to target outreach to underserved communities. As previously discussed, unlike other providers of agricultural credit, USDA generally collects data on the personal characteristics of guaranteed loan applicants and borrowers. Farm Service Agency officials told us that state executive directors, farm loan chiefs, and outreach coordinators plan their outreach in annual strategy sessions. As part of this planning, state offices review the state’s lending goals for SDFRs, Census of Agriculture data on the state’s farmer population, and data on Farm Service Agency direct and guaranteed loans made to farmers belonging to different socially disadvantaged groups to target outreach to underserved communities. While the outreach is planned by state offices, the Farm Service Agency’s Director of Outreach said the Outreach Office has emphasized the use of lending goals and loan data in targeting outreach efforts. Although it maintains data on guaranteed loans made to SDFRs, USDA generally does not evaluate whether SDFR outreach participants go on to use Farm Service Agency lending programs or otherwise evaluate the impact of its outreach on lending to SDFRs. Farm Service Agency officials said that they track outreach activities at the national level by monitoring the number of activities, the groups engaged, and the number of participants, but that they face challenges evaluating the impact of outreach efforts. The officials said any personal or demographic information on outreach participants must be voluntarily provided by the participants, but that many of them are reluctant to do so. As a result, data on the characteristics of outreach participants are limited. The lack of data, in turn, makes it difficult to assess how effectively the outreach was targeted and whether it could be expected to increase lending to socially disadvantaged groups. Representatives from one SDFR advocacy organization said that while outreach programs may increase SDFRs’ understanding of USDA’s loan programs, it is unclear how much outreach programs help SDFRs obtain credit because USDA does not track participant outcomes. Farm Service Agency officials said that some of their state offices have begun trying to track the progress of individual outreach participants in obtaining loans through Farm Service Agency programs (using voluntarily provided information), but that these efforts were in the early stages. We provided a draft of this report to USDA, the Farm Credit Administration, the Consumer Financial Protection Bureau, the Office of the Comptroller of the Currency, the Federal Deposit Insurance Corporation, the Board of Governors of the Federal Reserve System, and the National Credit Union Administration for their review and comment. The Board of Governors of the Federal Reserve System and the National Credit Union Administration did not provide comments. USDA, the Farm Credit Administration, the Consumer Financial Protection Bureau, the Office of the Comptroller of the Currency, and the Federal Deposit Insurance Corporation provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Agriculture, the Acting Chairman and Chief Executive Officer of the Farm Credit Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or ortiza@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. The objectives of this report were to examine (1) what is known about the amount and types of agricultural credit to socially disadvantaged farmers and ranchers (SDFR), (2) challenges SDFRs reportedly face in obtaining agricultural credit, and (3) outreach efforts to SDFRs regarding agricultural credit and related services. In this report, we use the term SDFR as defined in the Consolidated Farm and Rural Development Act, as amended, and related U.S. Department of Agriculture (USDA) regulations. The act defines a socially disadvantaged group as one whose members have been subject to racial, ethnic, or gender prejudice because of their identity as members of a group without regard to their individual qualities. USDA regulations further define SDFRs as belonging to the following groups: American Indians or Alaskan Natives, Asians, Blacks or African Americans, Native Hawaiians or other Pacific Islanders, Hispanics, and women. Although the act and USDA regulations defined SDFR for purposes of classifying participants in USDA programs, in this report, we use USDA’s definition to identify SDFRs both in USDA programs and in the broader population of agricultural producers, consistent with the statutory provision this report responds to. Additionally, based on the language of the statutory provision, we excluded USDA direct loans from the scope of our review and focused on lending by private entities. The provision defines an agricultural credit provider as a Farm Credit System institution, a commercial bank, the Federal Agricultural Mortgage Corporation, a life insurance company, and any other individual or entity as determined by the Comptroller General of the United States. For the background section of this report, USDA’s National Agricultural Statistics Service provided estimates from the 2012 and 2017 Censuses of Agriculture on the number of farm and ranch operations (which we refer to as farms) whose primary producer—that is, main decision maker—qualified as an SDFR, broken down by different SDFR subgroups. The service also provided estimates on the characteristics of farms whose primary producer was an SDFR, including the total acreage and market value of products sold. We compared the 2017 Census estimates of SDFR primary producers to analogous estimates from the 2012 Census and calculated numerical and percentage differences. We reviewed documentation on the methodologies used by the 2012 and 2017 Censuses to identify the main decision maker on a farm. We also interviewed National Agricultural Statistics Service officials about methodological differences between the two censuses and their likely effects on the number of reported SDFR primary producers. The 2012 Census used the term “principal operator” rather than “primary producer” to identify the main farm decision maker, but for ease of presentation we use the term primary producer in reference to both the 2012 and 2017 Censuses because the terms generally have the same meaning. To examine what is known about the amount and types of agricultural credit to SDFRs, we reviewed requirements in the Equal Credit Opportunity Act and its implementing regulation (Regulation B) governing the collection of data on the personal characteristics of loan applicants. We interviewed officials from the Consumer Financial Protection Bureau (CFPB), which has primary responsibility for issuing Equal Credit Opportunity Act regulations, about these requirements and the status of a related rulemaking pursuant to a provision in the Dodd-Frank Wall Street Reform and Consumer Protection Act. We also interviewed officials from the federal depository institution regulators—the Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, Office of the Comptroller of the Currency, and National Credit Union Administration—about the extent of information available on agricultural lending to SDFRs and about data restrictions stemming from Regulation B. We also drew upon information and analysis from our June 2008 and July 2009 reports on data limitations in nonmortage lending. Additionally, we analyzed data from USDA’s Agricultural Resource Management Survey. The survey is a multiphase series of interviews that uses a multiframe, stratified, probability-weighted sampling design. The survey does not include Hawaii or Alaska. USDA’s Economic Research Service provided us customized summary statistics from the 2015, 2016, and 2017 surveys combined. Specifically, the service averaged survey data for those 3 years to provide a robust sample size of surveyed SDFRs. The service provided estimates and associated confidence intervals on the proportion of primary producers who were and were not SDFRs; the annual average amount of outstanding farm debt each group had over the 3-year period, by type of debt (ownership or operating); and the lending source for this debt (USDA Farm Service Agency, Farm Credit System institution, commercial bank and savings associations, or other). The service adjusted debt information for inflation. Specifically, to create standard errors for the 3-year averages, the service adjusted outstanding debt to 2017 dollars using the chain-type gross domestic product deflator. We compared and contrasted survey statistics for SDFRs and non-SDFRs, focusing on the volume and percentage of total outstanding farm debt, farm ownership and operating debt, and lender type. We interviewed Economic Research Service officials about limitations of the survey data. The limitations include the small size of several SDFR subgroups (which prevented more detailed analysis of different demographic groups), the potential underrepresentation of SDFRs in the survey, and potential overreporting of debt from commercial lenders. With regard to lender type, respondents may not have known the specific types of lenders they used. The survey results for all farms appear to overrepresent debt from commercial banks and savings associations when compared with data collected by the service on farm- sector balance sheets. It is possible some survey respondents mischaracterized some debt from Farm Credit System institutions as debt from commercial banks. These issues and their implications are discussed in the body of this report. To assess the reliability of the survey data, we reviewed methodology and quality review documents and compared results to other publicly available sources, such as farm balance-sheet data and the 2017 Census. We concluded that the data were sufficiently reliable for describing the amount and types of agricultural credit SDFRs received, the sources of this credit, and how SDFRs and non-SDFRs compared along these dimensions. We also analyzed USDA data on farm ownership and farm operating loans guaranteed by the Farm Service Agency in fiscal years 2014 through 2018. We focused on guarantees issued by the Farm Service Agency because it operates the primary federal agricultural credit programs. For the 5-year period, we analyzed the annual amount and percentage of guaranteed loans (by dollar volume and adjusted for inflation) that went to SDFRs. We also separately examined trends in guaranteed farm operating and farm ownership loans to SDFRs. Finally, we analyzed the volume of guaranteed loans to SDFRs by state. We used this analysis to identify the top 10 states (or territories) in terms of (1) the dollar amount of guaranteed loans that went to SDFRs and (2) the proportion of guaranteed lending to the state or territory that went to SDFRs. To assess the reliability of data from USDA, we conducted electronic testing—including checks for missing data and erroneous values—and compared the data to publicly available sources. The loan guarantee data we present are somewhat different than publicly available information on USDA’s website because we used loan closing dates to group loans by fiscal year, while the publicly available data used the dates on which USDA obligated commitment authority for the loans. According to USDA officials, the closing date is a more accurate representation of the actual amount of loans guaranteed in a fiscal year, because some loans for which commitment authority is obligated may close in the following fiscal year or not close at all. We also interviewed USDA officials about interpretations of data fields and robustness of estimated values, among other things, and reviewed USDA internal policies and procedures for data entry. We concluded that the data were sufficiently reliable for describing the amount and proportion of farm lending guaranteed by the Farm Service Agency that went to SDFRs and non-SDFRs nationwide and by state. Finally, we reviewed documents and interviewed officials from the Farm Service Agency on the agency’s performance goals and target participation rates for farm lending to SDFRs. We also reviewed a 2007 USDA Office of General Counsel legal opinion on a statutory provision concerning establishment of target participation rates for SDFRs. However, an evaluation of the legal opinion was outside the scope of our study. To examine challenges SDFRs face in obtaining agricultural credit and outreach efforts to SDFRs regarding agricultural lending, we conducted searches of government and academic literature for research on private agricultural lending to socially disadvantaged groups. We searched the internet and various databases, such as AGRICOLA, EconLit, ProQuest Newsstand Professional, and Social SciSearch. Using broad search terms, we identified articles related to our research objectives that provided useful context and discussion topics for interviews with stakeholders. We did not identify any government or peer-reviewed academic literature that directly addressed private agricultural lending to socially disadvantaged groups, barriers those groups may face when trying to obtain agricultural credit, or outreach to disadvantaged groups by private agricultural lenders. We also solicited expert recommendations for academic literature on agricultural lending to socially disadvantaged groups. Several SDFR advocates identified the Socially Disadvantaged Farmers and Ranchers Policy Research Center as a potential source for academic literature on the subject. We found that the center had conducted some potentially relevant research but that the work had yet to be published in academic journals or government publications. To review efforts by agricultural lenders and their regulators to provide and oversee credit-related services to SDFRs—including marketing, outreach, and education activities—we reviewed data and documents from the Farm Credit System, USDA, and the federal depository institution regulators. We reviewed summary statistics from the Farm Credit Administration’s 2014 and 2017 examinations of Farm Credit System association marketing plans to determine the extent to which the associations had met requirements for outreach for diversity and inclusion. We supplemented this effort by reviewing marketing plans from a sample of six Farm Credit System associations in areas with substantial proportions of SDFRs from each of the socially disadvantaged groups identified in USDA regulations. While we included associations from different geographic regions of the country, the sample was not intended to be representative of all associations. We documented the extent to which the marketing plans we reviewed contained information on the demographic characteristics of the population in the associations’ service areas and planned outreach activities for diversity and inclusion. We also documented examples of outreach to SDFRs that were ongoing or that they had completed. Further, we also reviewed illustrative examples of outreach materials to SDFRs developed by USDA and the federal depository institution regulators, and we interviewed officials from these agencies about their outreach efforts. To gain further insight into challenges faced by and outreach efforts to SDFRs, we interviewed (1) SDFR advocacy and research organizations, (2) industry group representatives, and (3) federal agency officials. We refer collectively to the entities we interviewed as stakeholders. To select SDFR advocacy and research organizations, we used a snowball sampling technique that identified organizations based on referrals obtained during prior GAO studies and referrals from stakeholder interviews during this study. We limited our interviews to organizations that are national in scope and that focus on one or more socially disadvantaged populations and on agricultural credit or finance. Based on the snowball sampling, we identified and interviewed representatives from the following five groups: Socially Disadvantaged Farmers and Ranchers Policy Research Center, National Sustainable Agriculture Coalition, National Black Farmers Association, Rural Coalition, and Rural Advancement Foundation International-USA. The snowball sampling did not identify a national advocacy organization focused on women farmers—the largest SDFR subgroup—but we identified American Agri- Women based on an internet search, and we interviewed representatives from that organization as well. Because the group of organizations we interviewed was a nonprobability sample, the information they provided is not generalizable. We also interviewed representatives from lending industry groups—the American Bankers Association, the Independent Community Bankers of America, and the Farm Credit Council—that we selected to cover the major types of private institutional lenders that make agricultural loans, including large commercial banks, community banks, and the Farm Credit System. Additionally, we contacted industry associations representing insurance companies and community development financial institutions— both of which provide some agricultural credit—but representatives from these associations said they did not have information directly related to our research topic. Finally, we interviewed officials from USDA and its Farm Service Agency, the Farm Credit Administration, CFPB, and the federal depository institution regulators. For our work on credit challenges faced by SDFRs, we also drew upon information and analysis from our May 2019 report on agricultural lending on tribal lands. Among other things, that report describes (1) what is known about the agricultural credit needs of Indian tribes and their members, (2) barriers stakeholders identified to agricultural credit on tribal lands, and (3) Farm Credit System authority and actions to meet those agricultural credit needs. We conducted this performance audit from January 2019 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Steve Westley (Assistant Director); Jeremy Anthony (Analyst in Charge); Katherine Carter; William Chatlos; Tom Cook; Sam Portnow; Jennifer Schwartz; Jena Sinkfield; Tyler Spunaugle; and Farrah Stone made key contributions to this report.", "summary": "In 2017, there were about 2 million farm and ranch operations nationwide. Farmers and ranchers often require loans to buy agricultural real estate, make capital improvements, and purchase supplies and equipment. However, minorities and women comprise a disproportionately small share of agricultural producers, and certain minority groups have alleged discrimination in obtaining agricultural credit. Most agricultural lending is done by either commercial banks or the Farm Credit System, a network of lenders regulated by the Farm Credit Administration. USDA accounts for a small share of agricultural credit, but it makes direct loans and guarantees loans made by private lenders. USDA and Farm Credit System lenders have responsibilities to expand credit access. Congress included a provision in statute for GAO to study agricultural credit services provided to SDFRs. USDA direct loans were outside the scope of GAO's review. This report examines (1) what is known about the amount and types of agricultural credit to SDFRs, (2) challenges SDFRs reportedly face in obtaining agricultural credit, and (3) outreach efforts to SDFRs regarding agricultural credit and related services. GAO analyzed survey, census, and other USDA data; reviewed statutes and regulations governing collection of personal data on borrowers; and reviewed Farm Credit Administration and USDA documentation on outreach to SDFRs. GAO also interviewed SDFR advocacy groups, lending industry groups, and officials from the Farm Credit Administration, USDA, and the federal depository institution regulators. Information on the amount and types of agricultural credit to socially disadvantaged farmers and ranchers (SDFR)—which the U.S. Department of Agriculture (USDA) defines as members of certain racial and ethnic minority groups and women—is limited. Comprehensive data on SDFRs' outstanding agricultural debt are not available because regulations generally prohibit lenders from collecting data on the personal characteristics of applicants for loans other than certain mortgages. A Consumer Financial Protection Bureau rulemaking pursuant to a provision in the Dodd-Frank Wall Street Reform and Consumer Protection Act that requires collection of such data in certain circumstances would modify this prohibition for certain loans, possibly including some agricultural loans. The bureau delayed the rulemaking in 2018 due to stated resource constraints and other priorities, but reported that it plans to resume work on the rule later in 2019. An annual USDA survey of farmers provides some insights into agricultural lending to SDFRs but, according to USDA, may underrepresent SDFRs compared to more inclusive estimates from the 2017 Census of Agriculture. In the 2015–2017 surveys, SDFRs represented an average of 17 percent of primary producers in the survey, but they accounted for 8 percent of outstanding total agricultural debt. Loans to purchase agricultural real estate accounted for most of SDFRs' outstanding debt (67 percent). SDFRs reportedly face a number of challenges that hamper their ability to obtain private agricultural credit. According to SDFR advocacy groups, lending industry representatives, and federal officials, SDFRs are more likely to operate smaller, lower-revenue farms, have weaker credit histories, or lack clear title to their agricultural land, which can make it difficult for them to qualify for loans. SDFR advocacy groups also said some SFDRs face actual or perceived unfair treatment in lending or may be dissuaded from applying for credit because of past instances of alleged discrimination. Additionally, they noted that some SDFRs may not be fully aware of credit options and lending requirements, especially if they are recent immigrants or new to agriculture. Private lenders and federal agencies conduct outreach to SDFRs, but the effectiveness of these efforts in increasing lending is unknown. For example, lenders have sponsored educational events targeted to SDFRs and translated marketing materials for non-English speakers. Farm Credit Administration regulations require Farm Credit System lenders to prepare marketing plans that include specific outreach actions for diversity and inclusion. The Farm Credit Administration examines these plans and indicated that it has prescribed corrective actions in some cases. However, the Farm Credit Administration does not require lenders to meet specific lending goals, and the regulatory data restrictions noted previously constrain the Farm Credit Administration's ability to assess the effect of outreach efforts. USDA conducts outreach to SDFRs and lenders about its loan programs and collects data on the personal characteristics of loan applicants. However, USDA officials said they face challenges evaluating the impact of their outreach efforts, in part because outreach participants are reluctant to provide their demographic information.", "document_type": "gao"}
{"report": "Through its ATON mission, the Coast Guard promotes safe waterways and an efficient Marine Transportation System. The Coast Guard has statutory responsibility to operate and maintain a system of maritime aids to facilitate navigation and to prevent disasters, collisions, and wrecks. To fulfill this mission, the Coast Guard operates and maintains ATON that are placed along coasts and navigable waterways as guides to mark safe water and to assist mariners in determining their position in relation to land and hidden dangers. As mentioned earlier, this report focuses on two categories of ATON: fixed ATON that include lighthouses, towers, and other structures that are directly affixed to the ground or seabed; and floating ATON that include buoys and markers anchored to the sea bed by a concrete or metal sinker connected by a metal chain or mooring. See figures 1 and 2 for examples of fixed and floating ATON. The Coast Guard uses several types of vessels to place and service fixed and floating ATON. These ATON vessels include buoy tenders, construction tenders, and boats. As of October 2019, the Coast Guard had a fleet of 79 ATON cutters and 190 ATON boats—which varied in size from a 240-foot Great Lakes Icebreaker to 16-foot ATON boats. (See appendix I for additional details on the Coast Guard’s fleet of ATON vessels.) The Coast Guard’s ATON program consists of several offices and units that work together to carry out the ATON mission: Office of Navigation Systems: Based at Coast Guard headquarters in Washington, D.C., the primary ATON-related roles and responsibilities of Office of Navigation Systems officials include providing oversight and approval for ATON operations and policy. Specifically, the Aids to Navigation and Positioning, Navigation, and Timing Division within the Office of Navigation Systems is responsible for establishing requirements and policy; providing program level guidance; and coordinating processes, platforms, and personnel necessary to establish, maintain, and operate the U.S. ATON system. Office of Civil Engineering: Based at Coast Guard headquarters in Washington, D.C., the primary ATON-related roles and responsibilities of Office of Civil Engineering officials include providing oversight and approval for ATON engineering and logistics policy, including supervision of the Shore Infrastructure Logistics Center. Shore Infrastructure Logistics Center (SILC): Based in Norfolk, VA, SILC supervises the Civil Engineering Units that execute fixed ATON depot-level maintenance and recapitalization projects; as well as the Waterways Operations Product Line. Waterways Operations Product Line (WOPL): A division of the Coast Guard’s Shore Infrastructure Logistics Center, WOPL was established by the Coast Guard in 2016 with the goal of serving as the focal point for implementing engineering and logistics solutions for ATON in order to enhance the mission while reducing costs. To do this, WOPL is to support the ATON mission by providing centralized guidance and oversight covering such issues as ATON acquisition, ATON configuration management (the proper mix of ATON) across the Coast Guard’s nine districts, ATON production and delivery, and ATON logistics and maintenance for the Coast Guard-wide inventory of ATON equipment and systems. WOPL’s support encompasses the entire lifecycle of ATON equipment and systems, from acquisition through disposal. Coast Guard Districts and Sectors: The Coast Guard has nine districts, which have overall responsibility for administration of the ATON within their district. Each district oversees the coordination of operations at the sectors and individual ATON units, which includes cutters, boats, and Aids to Navigation Teams. Figure 3 shows a map of the Coast Guard’s nine districts and the numbers of fixed and floating ATON in each district as of November 2019. The ATON units are responsible for the servicing and maintenance of ATON by conducting both routine servicing based on the last-service dates of the ATON and non-routine servicing of ATON within their area of responsibility. The non-routine servicing process includes responding to and addressing discrepant ATON, which are aids that are not functioning properly due to, for example, a weather-related event such as a hurricane, or an equipment failure. Timely response to and correction of discrepant ATON is a high-priority task for the Coast Guard. According to internal guidance, the Coast Guard has a tiered approach to address ATON discrepancies that accounts for the importance of the ATON relative to the waterway and the nature of the discrepancy. In particular, according to Coast Guard guidance, the servicing unit response ranges from immediately after notification up to 72 hours or as soon thereafter as weather and resources permit. In some cases, the determining factors do not require responding within 72 hours and the servicing unit is to advise the district of future plans to correct the discrepancy. Coast Guard guidance states that during the routine servicing process for floating ATON (buoys), the primary purpose of the ATON units is to check the buoys’ positions, their condition, and ensure the correct operation of the buoys’ signal hardware. As part of this process, the Coast Guard may extract the buoys from the water and bring them onboard an ATON vessel to check the condition of their mooring chain, hull, and lighting equipment. If necessary, the mooring chains are cleaned and repaired and non-functioning lanterns (lights) are replaced. After the planned repairs are made, the buoys are placed back in their assigned position in the water. See figure 4 for an example of the process used by an ATON unit to service a steel buoy. When ATON units conduct routine or non-routine servicing of fixed and floating ATON, they also collect data on the condition of the ATON. These data provide a “snapshot” of the ATON’s condition at the time of servicing and include the aid’s geographic position; the last date that the ATON was serviced; the next-scheduled service date; and other detailed information about the aid, such as an assessment of the physical integrity of the ATON. If warranted, ATON units can initiate action for repair or replacement of ATON if necessary. The information gathered by ATON units during their servicing activities is entered into a Coast Guard database—the Integrated ATON Information System (I-ATONIS)—that is used to track and monitor fixed and floating ATON. A hardcopy record containing detailed information about each aid is subsequently generated from I-ATONIS and stored in local unit files to track and schedule future fixed and floating ATON servicing dates. According to Coast Guard officials, based on the multi-mission nature of its assets and workforce, the Coast Guard does not budget for, request, or receive funding organized by specific missions or program activities. In addition, Coast Guard financial systems are not structured to collect accounting data by specific missions or program activities, and the Coast Guard does not report expenditures by mission. Rather, the ATON mission receives funding through various sources within the Coast Guard’s annual budget. Specific to repairs and recapitalization of fixed ATON, in fiscal year 2018, $300,000 was allocated from Procurement, Construction, and Improvement funding while $10 million was allocated from the Coast Guard’s Operations and Support funds for depot-level ATON maintenance. We previously reported on the Coast Guard’s management and maintenance of its shore infrastructure, which—in addition to fixed and floating ATON—encompasses over 20,000 shore facilities such as piers, docks, boat stations, air facilities, and housing units at more than 2,700 locations. In July 2018, we found that the Coast Guard had not been able to address many shore infrastructure projects, primarily due to lack of funding, longstanding acquisition management challenges, and that previous Coast Guard leadership prioritized the acquisition of new operational assets to replace aging vessels and aircraft over maintaining and repairing shore infrastructure. We recommended, among other things, that the Coast Guard’s annual Capital Investment Plans reflect acquisition trade-off decisions and their effects. The Coast Guard agreed with this recommendation, and estimated implementing actions by March 2020. In February 2019, we found that almost half of the Coast Guard’s shore infrastructure is beyond its service life, and its current backlogs of maintenance projects, as of 2018, will cost at least $2.6 billion to address. We found that the Coast Guard’s process to manage its shore infrastructure recapitalization and deferred maintenance backlogs did not fully meet 6 of 9 leading practices we previously identified for managing public sector maintenance backlogs. We recommended, among other things, that the Coast Guard establish shore infrastructure performance goals, measures, and baselines to track the effectiveness of maintenance and repair investments and provide feedback on progress made; develop and implement a process to routinely align Coast Guard’s shore infrastructure portfolio with mission needs, including by disposing of all unneeded assets; and employ models for its asset lines for predicting the outcome of investments, analyzing trade-offs, and optimizing decisions among competing investments. The Coast Guard agreed with our recommendations and is taking steps to implement them. The condition of fixed and floating ATON Coast Guard-wide declined slightly from fiscal years 2014 through 2018, as determined by the Coast Guard’s key ATON condition metric. In particular, according to data provided by the Coast Guard, the aid availability rate—the percentage of time ATON are functioning correctly—declined from 98.0 percent in fiscal year 2014 to slightly below the Coast Guard’s performance target percentage of 97.5 percent in fiscal years 2017 (97.4 percent) and 2018 (97.1 percent), as shown in figure 5. While the aid availability rate metric indicates that the condition of fixed and floating ATON Coast Guard-wide declined slightly from fiscal year 2014 through fiscal year 2018, other factors—such as the age of many ATON—have contributed to more significant declines in the condition of ATON for some locations. For example, an internal Coast Guard report states that, as of 2018, nearly a quarter (24 percent) of all floating ATON and over half (59 percent) of all fixed ATON are operating past their designed service lives. On a district level, the conditions of fixed and floating ATON differ from one geographical area to the next, and varying weather conditions often have an impact on the physical condition of ATON. For example, the frigid weather conditions of the Great Lakes in certain months frequently erode the condition of both fixed and floating ATON. Coast Guard officials stated that ATON with large steel hulls many times cannot withstand the pressure and weight of ice that can form on them in the winter months. They also stated that the icy waters delay routine servicing trips for personnel to adequately address ATON, which can contribute to the deterioration of the aids. In District 8’s area of responsibility, which includes much of the Gulf of Mexico, Coast Guard officials said that severe storms and hurricanes can adversely impact the condition of fixed and floating ATON and delay servicing trips for safety reasons. Extended periods of exposure to saltwater is another factor that contributes to the degraded condition of ATON in District 8 and elsewhere, as water salinity often corrodes the hulls of steel buoys. In addition to weather, geographic factors can affect the condition of ATON as well. Coast Guard officials in District 1 (headquartered in Boston) stated that the hard, rocky coast in their district makes it difficult to secure fixed ATON structures to the seabed. As a result, this district requires a higher percentage of floating ATON to mark the location of these hazards and these floating ATON are often damaged by the rocks. See figure 6 for examples of the deteriorating condition of some fixed and floating ATON. Our analysis of Coast Guard data shows that the Coast Guard’s overall repair and recapitalization expenditures for fixed and floating ATON increased during fiscal years 2014 through 2018. Specifically, our analysis of Coast Guard data shows that total ATON repair and recapitalization costs increased from about $12 million in fiscal year 2014 to about $20 million in fiscal year 2018. As shown in figure 7, the majority of the costs for fixed ATON were spent on repairs whereas the majority of the costs for floating ATON were spent on recapitalizations. According to Coast Guard documents, data, and officials, the Coast Guard has faced a variety of challenges in managing its fixed and floating ATON. The reported challenges include the availability of ATON vessels, difficulty in conducting routine ATON servicing in a timely manner, and capacity limits at ATON major repair and refurbishment facilities. Our analyses of Coast Guard data on maintenance required of ATON cutters and boats during fiscal years 2014 through 2018 show that ATON cutter and boat availability varied by type and across classes. As described below, our data analyses showed that 10 of the 12 ATON cutter classes consistently met availability targets, whereas 4 of the 7 classes of ATON boats consistently met availability targets. The Coast Guard determines the condition of its ATON cutters and boats using the following measures—planned and unplanned maintenance days, maintenance hours, and achieved material availability rate. Specifically, Planned maintenance days are the number of days that a vessel is not mission capable due to scheduled maintenance. This measure is applicable to cutters. Unplanned maintenance days are the number of days that a vessel is not mission capable due to unforeseen maintenance issues and associated repair efforts. This measure is applicable to cutters. Maintenance hours are the total number of hours that a vessel spent in maintenance, including both planned and unplanned maintenance. This measure is applicable to boats. Achieved material availability rate is calculated based on a vessel’s availability and performance. For cutters, the target availability rate range is between 53 percent and 65 percent. For boats, the target availability rate target is 80 percent. According to our analysis of Coast Guard data, the number of maintenance days for ATON cutters generally decreased during fiscal years 2014 through 2018, as shown in Figure 8. In addition, our analysis shows that the biggest decrease was with planned maintenance days. The Coast Guard has established a target range for the achieved material availability rate for ATON cutters that includes a minimum rate of 53 percent to a maximum rate of 65 percent. According to our analyses of Coast Guard data, the achieved material availability rate for the ATON cutters varied by cutter class during fiscal years 2016 through 2018, with 10 of the 12 cutter classes having met or exceeded the minimum target material availability rate for all 3 years and the remaining 2 ATON cutter classes having met or exceeded the minimum target material availability rate for 2 of the 3 years analyzed. While most of the ATON cutters met Coast Guard availability rate targets during fiscal years 2016 through 2018, officials in 7 of the 9 districts noted that maintaining some older ATON cutters can take longer to repair because of old and obsolete equipment and the lack of available parts, which decreases their availability to conduct missions. Figure 9 shows the achieved material availability rate for ATON cutters for fiscal years 2016 through 2018. According to our analysis of Coast Guard data, we found that the total number of maintenance hours for ATON boats generally decreased during fiscal years 2014 through 2018, although there was an increase from fiscal year 2017 to 2018. Figure 10 shows the total maintenance hours for ATON boats during fiscal years 2014 through 2018. In comparison to ATON cutters, which have a target range for the achieved material availability rate, ATON boats have a material availability threshold of 80 percent. According to our analyses of Coast Guard data, 4 of the 7 classes of ATON boats consistently achieved the 80 percent availability threshold during fiscal years 2014 through 2018. In particular, we found that the four smaller classes of ATON boats—those 16 to 26 feet in length—consistently achieved the 80 percent availability threshold during fiscal years 2014 through 2018, whereas the three larger classes of ATON boats—those 49-feet in length and longer—failed to consistently meet the 80 percent availability threshold during this 5-year period. In addition to the data on achieved material availability rates, Coast Guard officials from 3 of the 9 districts noted they experienced challenges with the availability of ATON boats. Figure 11 shows the achieved material availability rate for seven classes of ATON boats. The Coast Guard has taken positive steps to manage the ATON program, including issuing strategic plans and directions, creating a unit to provide a Coast Guard-wide perspective in managing ATON, and developing various initiatives to improve management of fixed and floating ATON. However, we found that some ATON-related initiatives to be implemented Coast Guard-wide, such as the foam buoy implementation initiative, do not contain certain elements that can provide better assurance that they will be effectively implemented, such as milestones and completion dates, and desired outcomes to be achieved. The Coast Guard has developed strategic plans and directions that provide guidance for addressing challenges faced in managing fixed and floating ATON. In June 2007, the Coast Guard issued the Maritime Short Range Aids to Navigation Strategic Plan to coordinate and standardize a number of ATON mission activities. According a Coast Guard official, at the time this strategic plan was issued, ATON units within the Coast Guard’s nine districts were operating largely independently in terms of planning and conducting ATON missions and activities. The 2007 plan changed this by developing a strategic approach to ATON management and it identified a number of initiatives to improve ATON program management, including reducing ATON lifecycle costs and maintenance needs, increasing efficiency and service intervals, and improving the performance and reliability of fixed and floating ATON. More recently, the Coast Guard issued the Navigation Systems Strategic Voyage Plan for Fiscal Years 2017-2022, which updates and expands on the 2007 strategic plan by identifying priorities that impact ATON program management broadly and the management of fixed and floating ATON in particular. The plan specifically identifies initiatives, including the use of non-steel floating ATON, development of year-round floating ice ATON, increased use of LED lighting, and the increased use of less expensive fixed ATON alternatives in lieu of lighthouses. In addition to the 2007 and 2017 strategic plans, the Coast Guard also issues annual Strategic Planning Directions. These annual directions outline the Coast Guard’s strategic commitments and are the primary mechanism for apportioning resources and providing guidance to field units on initiatives and actions to improve mission operations, including the ATON mission. For example, the Coast Guard has emphasized continuing to leverage electronic ATON technology where appropriate in an effort to reduce seasonal ATON workload, such as in districts with ATON in waters that are subject to freezing during a part of the year. In addition to developing a strategic approach to management of fixed and floating ATON through its strategic plans, the Coast Guard also created a new unit to provide a Coast Guard-wide, centralized perspective in managing fixed and floating ATON engineering and logistics. In particular, in 2016, the Coast Guard created the Waterways Operations Product Line (WOPL) to centrally manage the distribution, repair, and replacement of fixed and floating ATON and parts; as well as to formulate requests for ATON resources and funding. Since its creation, WOPL has coordinated and helped to implement various Coast Guard- wide initiatives to improve the management of fixed and floating ATON. These initiatives include centralized funding for ATON inspection and major repair services, changes in cost limits for floating ATON refurbishments, and expansion of commercial depot-level maintenance contracts to supplement the Coast Guard’s ATON major repair and refurbishment capacity. WOPL has also analyzed and recommended the transition from steel to foam buoys, where appropriate, to increase life cycle cost savings and reduce servicing times. In addition, WOPL has initiated changes to better manage and sustain the duration of floating ATON, including extending time in the water between major refurbishments from 6 to 9 years for some buoys and increasing the allowance for selected steel buoy hull repair weld hours. The Coast Guard has developed and is implementing a variety of initiatives to address specific ATON management challenges that were discussed earlier in this report. These initiatives include the following: Improving the Availability of ATON Cutters and Boats: The Coast Guard has ongoing initiatives to extend the service lives and to recapitalize certain ATON cutters and boats to improve their availability rates. For example, in fiscal year 2019, the Coast Guard continued the major maintenance availability efforts on the 225-foot Seagoing Buoy Tender fleet. In addition, from 2006 to 2016, a portion of the Coast Guard’s ATON fleet (River Tenders, Buoy Tenders, and Construction Tenders) underwent a limited maintenance program to act as a bridging strategy until replacement assets could be acquired. Our 2018 report on Coast Guard acquisitions noted that the designed service life for each of these tenders is 30 years, but as of the time of the report, their average age was 53 years. In 2018, we reported that the Department of Homeland Security approved the Waterways Commerce Cutter Program to replace aging River Tenders, Buoy Tenders, and Construction Tenders. While the acquisitions have been approved, it will likely be years before the new cutters are built and deployed. The Coast Guard has also had an ongoing initiative since 2007 that has recapitalized the boat fleet by 290 boats. Conducting Routine ATON Servicing in a Timely Manner: The Coast Guard has issued guidance to its districts to look for opportunities to reduce the number of ATON that do not significantly increase navigational risk and explore and leverage new technologies, such as the use of electronic ATON, where feasible. Collectively, these efforts should help to ease the servicing burden. In addition, the Coast Guard has also introduced initiatives focused on improving ATON servicing time. For example, officials in one district told us that they require their ATON units to send in monthly reports on ATON servicing due dates and plans. District officials review this information and may shift ATON servicing work to another unit when the primary servicing vessel or unit is not available to provide the needed service in a timely manner. Another ongoing initiative the Coast Guard is exploring is the use of year-round buoys for ice prone areas to reduce servicing requirements. The Coast Guard has received positive feedback in two of the three districts where such buoys have been in service. Improving Capacity Limits at ATON Major Repair and Refurbishment Facilities: According to a Coast Guard official, the Coast Guard has had commercial contracts in District 9 (the Great Lakes region) and District 13 (the Pacific Northwest) going back decades to provide floating ATON major repair and refurbishment services. Then, in March 2019, WOPL awarded four regional commercial contracts to provide increased capacity for ATON major repairs and refurbishments in an effort to help reduce the Coast Guard’s floating ATON major repair and refurbishment backlog. Specifically, the Coast Guard (1) renewed the contract in District 13; (2) awarded a contract covering California (part of District 11); (3) awarded a contract for a zone covering New England and the Mid-Atlantic (Districts 1 and 5); and (4) awarded a contract covering Guam (part of District 14). According to Coast Guard officials, the addition or renewal of these four regional contracts has resulted in greater capacity and flexibility to reduce the floating ATON major repair and refurbishment backlog. While the Coast Guard has developed various initiatives to improve management of fixed and floating ATON, these initiatives do not contain certain elements, which limit assurance that the initiatives will be effectively implemented. For example, we found that many initiatives we evaluated do not contain milestone and completion dates for Coast Guard-wide implementation, which are elements that can guide decisions on the success of the initiatives. Under the foam buoy implementation initiative, the Coast Guard evaluated the use of foam buoys in lieu of steel buoys (which are more expensive to overhaul) and found that it was feasible to replace steel buoys with foam buoys in some locations but not in others. For example, the Coast Guard’s evaluations showed that foam buoys cannot stand up to ice conditions. On the basis of its evaluations, the Coast Guard plans to continue replacing certain classes of steel buoys with foam buoys where operationally feasible. However, the initiative does not contain milestone dates or desired outcomes for Coast Guard-wide implementation. According to guidance from the Program Management Institute, programs or projects—like the ATON-related initiatives being implemented by the Coast Guard—are to include specific, desired outcomes, along with the appropriate steps and time frames needed to achieve the final outcomes and results to implement the enhanced capabilities across the organization. In addition, our leading practices in capital decision- making state that such initiatives should include milestones and completion dates. According to Coast Guard officials, WOPL is a relatively new unit and is still developing ATON guidance and procedures for ATON-related initiatives and responsibilities to be performed by the districts. By updating its ATON-related initiatives to include the specific outcomes desired and timeframes for completing them, the Coast Guard would have better assurance that its initiatives to address ATON management challenges will be effectively implemented. Available Coast Guard data indicate that despite some slight declines in the condition of fixed and floating ATON, and increasing repair and recapitalization costs for floating ATON, the Coast Guard’s ability to meet its ATON mission did not show a marked decline during fiscal years 2014 through 2018. However, the future of the fixed and floating ATON and the vessels used to service them bears close watching given the challenges the Coast Guard faces in managing its fixed and floating ATON. The fact that many of the ATON have reached, or will soon be reaching, the end of their designed service lives could lead to an increase in the number of ATON requiring major repairs or replacement in the near future. According to Coast Guard data, the Coast Guard’s ability to refurbish or replace its aging ATON is made more challenging by limited capacity for conducting major repairs and refurbishments of floating ATON. The Coast Guard has taken positive steps to develop strategic plans to guide the ATON program, and these plans have led to the development of various initiatives to improve management of fixed and floating ATON, but these initiatives would benefit from the inclusion of certain elements, such as desired outcomes to be achieved and associated milestone dates, to have better assurance that the initiatives will be effectively implemented. The Commandant of the Coast Guard should direct the Assistant Commandant for Engineering and Logistics and Assistant Commandant for Prevention Policy to update the Coast Guard’s ATON-related initiatives to include the specific outcomes to be achieved and associated time frames. (Recommendation 1) We provided a draft of this report to DHS for review and comment. In its comments, reproduced in appendix II, DHS concurred with our recommendation and stated that the Coast Guard plans to review and update ATON-related initiatives to include specific outcomes with associated implementation milestones by December 31, 2020. DHS also provided technical comments that we incorporated into the report, as appropriate. We are sending copies of this report to the appropriate congressional committee, the Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (206) 287-4804 or AndersonN@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Figure 14 provides information on the cutters and boats that comprise the Coast Guard’s fleet of aids to navigation (ATON) vessels. In addition to the contact name above, Christopher Conrad (Assistant Director), Hugh Paquette (Analyst in Charge), Chuck Bausell, Breanne Cave, Benjamin Crossley, Dorian Dunbar, Michele Fejfar, Tracey King, Joshua Lanier, and Adam Vogt made significant contributions to this report.", "summary": "One of the Coast Guard's statutory missions is the care and maintenance of ATON. Much like drivers need signs and universal driving rules, mariners need equivalent nautical “rules of the road.” As of November 2019, the Coast Guard managed 45,664 federal fixed and floating ATON that are designed to assist those operating in the U.S. Marine Transportation System, which includes about 25,000 miles of waterways, 1,000 harbor channels, 300 ports, and 3,700 terminals. According to the Coast Guard, as of July 2018, these ATON had a collective replacement value of about $1.6 billion. The Coast Guard has faced an array of challenges in managing its ATON, such as deteriorating buoys, and questions have been raised regarding the extent to which the Coast Guard is addressing these challenges. This report (1) describes what is known about the condition and costs of maintaining the Coast Guard's ATON, and (2) examines challenges the Coast Guard has experienced in managing its ATON and how it is addressing them. To address these issues, GAO reviewed ATON regulations and guidance, analyzed data on ATON condition and cost measures, collected input from all nine Coast Guard districts on ATON challenges, accompanied ATON units on mission activities, assessed agency initiatives using leading program management practices, and interviewed headquarters and field unit officials. The condition of the Coast Guard's aids to navigation (ATON), both fixed (e.g., lighthouses) and floating (e.g., buoys), have declined slightly while the overall costs for repairing or replacing them increased in recent years. According to Coast Guard data, its key metric for ATON condition—the Aid Availability Rate, or percentage of time that ATON are functioning correctly—declined from 98.0 to 97.1 percent during fiscal years 2014 through 2018, dipping slightly below the 97.5 percent target rate in fiscal years 2017 and 2018. During this time period, the overall costs to repair and replace ATON increased from about $12 million in fiscal year 2014 to about $20 million in fiscal year 2018. According to Coast Guard data, the majority of the costs for fixed ATON were spent on repairs whereas the majority of the costs for floating ATON were spent on replacements. The Coast Guard faces challenges in managing its fixed and floating ATON and has developed plans and initiatives to address them, but it has limited assurance that the plans and initiatives will be effectively implemented. According to Coast Guard officials, the challenges include decreased availability of vessels to service ATON, reduced ability to provide routine ATON servicing in a timely manner due to severe weather, among other factors, and limited capacity at ATON major repair and refurbishment facilities. The Coast Guard has developed plans to guide the ATON program, and these plans have led to the development and implementation of various initiatives at the headquarters and field unit levels to address these challenges. However, GAO found that the initiatives do not contain certain elements that help ensure effective implementation—such as desired outcomes and schedule milestones and completion dates—as recommended by leading program management practices. According to Coast Guard officials, they are still developing guidance and procedures for ATON-related initiatives that are to be implemented by the districts. By updating these initiatives to include certain elements, such as the specific outcomes desired and timeframes for completing them, the Coast Guard would have better assurance that its initiatives to address ATON management challenges will be effectively implemented. GAO recommends that the Coast Guard update its ATON initiatives by including the specific outcomes to be achieved and associated time frames. The Department of Homeland Security concurred with the recommendation.", "document_type": "gao"}
{"report": "GDUFA and GDUFA II both provided supplemental resources to FDA by giving it the authority to collect user fees from the generic drug industry, in addition to its regular appropriations, in order to make improvements to the generic drug application review process. GDUFA was enacted in July 2012, in part, to provide funding for more generic drug application reviewers at FDA in order to handle an increase in the volume of application submissions and speed up reviews. GDUFA II was enacted in August 2017 to reauthorize the generic drug user fee program from fiscal year 2018 through fiscal year 2022. In return, FDA provided Commitment Letters to Congress that detailed its plans to implement program enhancements and meet certain performance measures related to the review of generic drug applications. For example, in its Commitment Letter for GDUFA II, FDA stated that, for applications in the first review cycle, it would review and act on at least 90 percent of them within specified timeframes—8 months for certain priority applications and 10 months for all other applications. FDA stated that it met this performance measure for fiscal year 2018. The Commitment Letter also indicated that one of the goals of GDUFA II is to minimize the number of review cycles for applications to attain approval. FDA’s generic drug application review process includes a number of steps. The process begins when a generic drug application is submitted to FDA for review by the Office of Generic Drugs and the Office of Pharmaceutical Quality within FDA’s Center for Drug Evaluation and Research. The Office of Generic Drugs is responsible for providing regulatory oversight and strategic direction for FDA’s generic drug program to make safe, effective, and high-quality generic drugs available to the public. The Office of Generic Drugs’ Division of Filing Review determines whether the generic drug application is acceptable for review, meaning that the application is sufficiently complete for FDA to review the application, such as information about the amount of active ingredients present in the drug. If the generic drug application is not acceptable for review, FDA issues a Refuse to Receive letter to the applicant explaining what additional information is required before the application can be accepted for review. In response, the applicant can resubmit the generic drug application with additional information and officials within the Division of Filing Review will assess the information and determine if the resubmitted application is acceptable for review. Once the Division of Filing Review determines that a generic drug application is acceptable for review, the first review cycle begins, and FDA officials review the application across the following three review disciplines: Bioequivalence. Officials within the Office of Bioequivalence are responsible for examining whether the generic drug application is bioequivalent to the brand-name drug, meaning that the drug delivers the same amount of active ingredient in the same amount of time as the brand-name drug. Labeling. Officials within the Division of Labeling Review are responsible for ensuring that the proposed labeling language in the generic drug application, including the drug’s prescribing information, matches the language found in the labeling of the corresponding brand-name drug. Pharmaceutical quality. Officials within the Office of Pharmaceutical Quality have responsibility for ensuring the quality of drug products and assessing all drug manufacturing facilities, including both domestic and foreign. Officials within this office assess the risk of toxic substances or bacterial content in the drug, among other things. All generic drug applications are reviewed by primary reviewers and secondary reviewers. Primary reviewers assess the application to ensure that the documentation meets regulatory requirements in their specific disciplines. For example, primary reviewers within the Office of Pharmaceutical Quality evaluate documentation related to the proposed drug manufacturing process to ensure that the process produces quality drugs consistently. Secondary reviewers ensure the quality and consistency of primary reviewers’ assessments and the clarity of communication to applicants. During the first review cycle, FDA communicates with applicants when issues arise during its review that may prevent the agency from approving the generic drug application. This communication is typically made through the issuance of information requests or discipline review letters: Information requests. Information requests are letters sent to applicants to request clarification or additional information that is needed or would be helpful for FDA to complete its review. These letters may be sent by any review discipline and can be sent at any point after the Office of Generic Drugs accepts the generic drug application for review. Discipline review letters. Discipline review letters are letters issued by each review discipline at about the mid-point of the review cycle to identify possible deficiencies. FDA officials said they aim to issue these letters no later than 6 months into the first review cycle. In response to these letters, applicants can submit additional information for FDA to consider before the end of the review cycle. After FDA’s three review disciplines complete their review of an application and any additional information the applicant has submitted in response to information requests and discipline review letters, the agency issues an action letter that informs the applicant of whether the application is approved, marking the end of the first review cycle and the end of FDA’s review if the application is approved. There are three types of action letters: Approval letter. Issued when the agency has concluded its review of a generic drug application and the applicant is authorized to commercially market the drug. Tentative approval letter. Issued when the agency has completed its review of an application and has concluded that the generic drug application is sufficient, but patents or other exclusivities prevent approval. A tentative approval letter does not allow the applicant to market the generic drug. Complete response letter. Issued at the completion of the review of an application where deficiencies remain at the end of the review cycle. The complete response letter describes any deficiencies that must be corrected in order for the application to be approved. For a generic drug application that receives a complete response letter, the applicant can amend the application and seek another full review, which begins the second or subsequent review cycles. During these cycles, FDA officials review changes made to generic drug applications in response to deficiencies that FDA identified. Our analysis of FDA data shows that 12 percent of the 2,030 generic drug applications that FDA reviewed in fiscal years 2015 through 2017 received approval in the first review cycle. See figure 1. We identified several factors, including certain characteristics of generic drug applications, that may have contributed to whether an application received approval in the first review cycle, including the sufficiency of the application, deficiencies in drug quality, the type of drug reviewed, and the application’s priority status. Sufficiency of the application. We found that the sufficiency of the generic drug application, including the completeness of the application and the degree to which the applicants understood and fulfilled application requirements, affected its likelihood of receiving an approval in the first review cycle. According to FDA, one indication of the sufficiency of the generic drug application is whether FDA had previously refused to receive the application for review because it was not substantially complete upon its first submission. Our analysis of FDA data found that applications that had previously been refused were slightly less likely to be approved in the first review cycle compared with applications that had not previously been refused, and rates of approvals decreased for applications with two previously refused attempts. See table 1. According to stakeholders we interviewed, the sufficiency of a generic drug application may partially reflect the level of experience the applicant has in submitting applications, and we found some evidence to support this explanation. FDA managers and reviewers said that, in general, less experienced applicants are more likely to produce lower-quality generic drug applications compared to applicants with relatively more experience. Our analysis of FDA data found that applicants that submitted just one application during fiscal years 2015 through 2017 had a slightly lower rate of approval in the first review cycle (10 percent) compared to the rate across all applicants (12 percent). Additionally, in our review of 35 selected generic drug applications, we identified three applications that were from applicants that had no previously approved generic drug application submissions, an indication that they may have little or no experience with these applications. None of the three applications were approved in the first review cycle. One of these applications elicited reviewer comments that outlined basic application requirements, potentially reflecting the lack of experience of the applicant. Drug quality deficiencies. Our review of documentation from the first review cycle for 35 generic drug applications included 26 that were not approved in that cycle. Among those 26 applications, the most common deficiencies that remained at the end of the first cycle were related to the quality of the drug—356 out of 435 deficiencies. These deficiencies included issues related to the drug manufacturing facilities, which can affect the quality of the drug produced and the stability of the drug over time, among others. Officials from one large applicant told us that most of the comments they received from FDA reviewers are related to the quality of the drug. Three out of five applicants we interviewed also noted that the results from inspections of drug manufacturing facilities—which FDA includes as a component of its review of the quality of the drug—are a factor that may cause an application not to be approved in the first review cycle. Among the 26 applications we reviewed that were not approved, eight had an outstanding deficiency related to the manufacturing facility. Type of drug. We also found that the rate of approval in the first review cycle differed based on certain characteristics of the type of drug reviewed, including the route of administration, which may indicate the complexity of the drug. Complexity can also be influenced by other factors including, for example, the drug’s active ingredient or formulation. FDA officials noted that some complex drugs—including those that combine drug products with drug delivery devices, such as asthma inhalers—are less likely to be approved in the first review cycle. Officials we interviewed from one large applicant—which we identified based on the number of approved generic drug applications it had in fiscal year 2018—reported that their company had never submitted a generic drug application for a complex drug product that received approval in the first review cycle despite having significant experience with producing complex drugs. Officials we interviewed from another applicant said that very few of its dermatological products, which are considered complex, had received approval in the first review cycle. In our review of FDA data, we also found that applications for drugs with certain routes of administration—the method by which the drug is taken, such as oral, topical, or intravenous—had different rates of approval in the first review cycle. In particular, from fiscal years 2015 through 2017, FDA reviewed generic drug applications for 41 ophthalmic and 20 transdermal drugs—types of drugs that FDA considers complex—and none of these applications received approval in the first review cycle. In contrast, generic drug applications for topical drugs, which FDA also identifies as complex, had higher approval rates. Specifically, our analysis found that the rate of approvals in the first review cycle for generic drug applications for topical drugs was 25 percent—more than double the rate for all applications included in our analysis. FDA officials stated that in recent years FDA released several product-specific guidances for topical drugs—technical guidance intended to help applicants identify the most appropriate methodology for developing certain drugs and generating the evidence needed to gain approval. FDA officials told us these guidances may have contributed to the higher rates of approval in the first review cycle for topical drugs. See table 2. Generic drug application priority review designation. In addition, we found that a generic drug application’s priority review status may affect the rate of approval in the first review cycle. FDA may grant priority review status to applications under several circumstances, including for the first generics of brand-name drugs and other designations, such as for drugs that could help address public health emergencies. Our analysis of FDA data found that the rates of approval in the first cycle were lower for applications for first generics than for applications with no priority designation—6 percent and 14 percent, respectively. One potential explanation for the relatively low rate of approval is that for a first generic, applicants have a financial incentive to be the first to submit an application to FDA. Officials from one trade association stated that applications for first generics may be of lower quality because the applicants are rushing to submit their applications. In other cases, priority designations were associated with higher first-cycle approval rates. First-cycle approval rates for applications with other types of priority designations were higher than for applications with no priority designation—18 percent for applications that were marked as priority for other reasons, such as drug shortages or public health emergencies. See table 3. Our review of FDA guidance and regulations found that FDA has taken steps to enhance communication with applicants to increase the rate of generic drug application approvals in the first review cycle. Specifically, since the beginning of fiscal year 2013 in response to GDUFA, FDA increased communication with applicants prior to and during a generic drug application’s first review cycle consistent with its goal of helping applicants prepare approvable applications. These changes have included the following: Additional product-specific guidance. FDA has continued to release new and revised product-specific guidance to support a generic drug application’s approval within the first review cycle. Since GDUFA’s implementation and at the time of our review, FDA told us that it issued 993 new and revised product-specific guidance documents that describe acceptable methodologies for developing generic drugs and generating evidence needed to support a generic drug application’s approval. FDA officials indicated that product- specific guidance helps streamline both application development and review. Additional regulatory guidance. FDA has also issued regulatory guidance to communicate the agency’s expectations for the content and format of generic drug applications, which can facilitate approval in the first review cycle. In addition, in 2018, FDA issued draft guidance that described common application deficiencies and sought to promote approval during the first review cycle by providing recommendations on avoiding these recurring deficiencies. Presentations to industry. In presentations to applicants and others, FDA officials have presented information about generic drug application reviews and deficiencies frequently identified in generic drug applications. FDA has posted some of these presentation materials, including several video recordings, publicly on its website to share the information with industry. Communication during the review cycle. FDA has changed its review process to encourage reviewers to communicate with applicants at about the mid-point of the review cycle. FDA reviewers now aim to issue discipline review letters at about the mid-point of the first review cycle, rather than waiting until the end of the review cycle to communicate deficiencies. According to FDA, these earlier communications are intended to provide applicants with an opportunity to address issues before the end of the first review cycle and facilitate more approvals during that cycle. Assistance with applications for complex drugs. FDA has taken steps to assist applicants developing generics of complex drugs, such as drugs with complex active ingredients, formulations, or routes of administration. Beginning in fiscal year 2018 when GDUFA II was implemented, applicants developing complex drugs may request meetings with FDA prior to submitting a generic drug application and at the mid-point of the review cycle. In addition, FDA officials told us that since fiscal year 2013 when GDUFA was implemented, the agency has released 378 product-specific guidance documents focused on complex drugs. While all five applicants we interviewed generally described FDA’s efforts to increase communication as helpful, they offered opportunities for improvement. For example, four out of the five applicants said that product-specific guidance helps them understand exactly what the requirements are for product development, which can facilitate approval in the first review cycle. However, two of these applicants also said that FDA does not obtain sufficient input from the generic drug industry when developing product-specific guidance documents. To increase transparency, stakeholders said that FDA could solicit industry input to avoid proposing unrealistic guidance and one stakeholder suggested that FDA could create a workgroup to prevent unintended consequences following the implementation of new and revised guidance. However, FDA officials told us that draft guidance documents have a public comment period for stakeholders to provide comments on guidances before they are finalized. In December 2017, we similarly found that stakeholders indicated they would benefit from greater transparency in FDA’s process for developing guidance. We recommended that FDA publicly announce the agency’s plans for issuing new and revised product-specific guidance for nonbiological complex drugs within the next year. FDA agreed with this recommendation and published a website in April 2019 that provides information about upcoming product-specific guidance documents for complex generic drugs. In addition, all five applicants we interviewed said that FDA has improved communication with them, such as by increasing the frequency and timing of communications, and two applicants indicated that discipline review letters add predictability to the review process. (See app. I for more information on FDA’s changes to the generic drug application review process to improve communication with applicants.) While all five applicants we interviewed generally agreed that the increased communications would help increase rates of first-cycle approval, they also suggested that additional flexibility to communicate with FDA informally mid-cycle, such as by phone, could further facilitate the review process by helping applicants respond to questions or get clarity on questions included in the information requests or discipline review letters. FDA officials told us that applicants currently can request teleconferences with FDA, such as after receiving a complete response letter; however, they also noted that applicants generally prefer email communications and such teleconferences are not frequently utilized. FDA has also taken steps to improve consistency among reviewers. These steps could facilitate more approvals in the first review cycle because receiving consistent comments from FDA reviewers typically makes it easier for applicants to respond more quickly, which—according to some stakeholders—can result in approval in the first review cycle. These changes include the following: Creating review templates. Officials from FDA’s review disciplines have developed templates to guide reviewers through the generic drug application review process. According to FDA’s Manual of Policies and Procedures, these templates are intended to increase reviewers’ efficiency and improve assessment consistency. Developing common phrases. FDA also issued internal guidance on common phrases that reviewers may use to communicate generic drug application deficiencies in their comments to applicants during the first review cycle. For example, officials from the Division of Labeling Review said they maintain a database of common phrases and train reviewers on how to explain deficiencies to applicants. Officials explained that the Division of Labeling Review is also working toward pre-populating some parts of the review template to increase efficiency and consistency in the review process. Understanding the generic drug industry. FDA has taken steps to increase reviewers’ and applicants’ common understanding of industry practices and FDA review standards, such as through visits to manufacturing facilities, to improve the quality and consistency of reviewers’ comments in the first review cycle. However, all five applicants we interviewed noticed inconsistency among reviewers. FDA officials and two applicants suggested that this may be because FDA reviewers have different professional backgrounds. One applicant noted that some reviewers benefit from visiting manufacturing facilities if they do not have prior experience in the generic drug industry. Officials from a trade association said that such steps improve applicants’ understanding of what FDA reviewers are looking for in generic drug applications and may enhance their ability to submit applications that are approvable in the first review cycle. While stakeholders stated that the changes FDA made to improve reviewer consistency were positive, they noted that inconsistency among reviewers still remained, and we also found inconsistencies among reviewers. In addition, while stakeholders we interviewed raised concerns that the timing of brand-name labeling changes could affect whether applications were approved in the first review cycle, FDA has not taken steps to assess the validity of these concerns. Inconsistency among FDA reviewers. While FDA has taken steps to improve consistency among generic drug application reviewers, stakeholders noted that inconsistencies persist, and these inconsistencies may influence whether an application is approved during the first review cycle. For example, most stakeholders we interviewed (three out of five trade associations and four out of five applicants) indicated that they were aware of examples when different FDA reviewers within the same review discipline provided substantively different assessments of similar generic drug applications, specifically by requesting additional information from applicants for some applications and not others. For example, one applicant cited an example of two similar topical drugs whose applications relied on the same data set. The reviewer for one application required additional data, while the reviewer for the other application did not. To improve consistency, four applicants we interviewed suggested that FDA improve its reviewer training and one suggested that FDA create a workgroup to examine and address inconsistencies among reviewers. Four of the five applicants we interviewed also reported variation in the consistency of reviewers’ comments, including a lack of clarity in the information required for the applicant to address the comments. For example, one applicant said that they have received comments where reviewers did not specify what further information was required, and added that comments that suggest specific resolutions are extremely helpful, which would be consistent with FDA’s Manual of Policies and Procedures. This manual describes a standard process for FDA reviewers to use when assessing the completeness of generic drug applications, including clearly communicating with applicants about deficiencies that must be corrected for their applications to be approved in order to reduce the number of review cycles. According to the manual, primary reviewers are responsible for assessing whether applications meet the regulatory requirements for approval, while secondary reviewers are responsible for ensuring consistency among assessments and quality of communications to the applicant. Further, the manual advises primary and secondary reviewers to ensure that comments to applicants about deficiencies include similar content. The manual also indicates that comments should include the following four elements: (1) refer to a specific location within the generic drug application; (2) identify the omitted information or explain the problem with the information submitted; (3) explain the actions necessary to resolve the deficiency; and (4) explain why the information or revision is needed. Finally, FDA provides reviewers with plain language writing guidelines and other writing resources to support the development of clear messages for external communications. In our review of documentation from the first review cycle for 35 generic drug applications, we found variation in the clarity and specificity of some reviewer comments that may have influenced the outcome of the first review cycle. For example, some discipline review letters included clear descriptions of potential remedies for some deficiencies, while others did not clearly describe the deficiency or FDA’s expectations for an approvable generic drug application. Of the 35 generic drug applications, we conducted a more detailed review of four applications from fiscal year 2018—two that received approval in the first review cycle and two that did not. In the two applications that were not approved in the first review cycle, we identified 32 instances in which the comments did not fully meet FDA’s criteria. Two of the four applications we reviewed in more detail had similar numbers and types of deficiencies identified in the discipline review letters sent to the applicants mid-way through the first review cycle, such as quality deficiencies related to the drug substance and drug product, but the clarity and content of the comments included in the discipline review letters varied considerably. For one of the applications, the comments were written clearly and, consistent with FDA’s Manual of Policies and Procedures, identified options for addressing the deficiencies. For the other application, the comments were less clear and did not clearly identify ways to address the deficiencies. The applicant of the generic drug application with clearly written comments resolved all of the deficiencies raised in their discipline review letter and the generic drug application was approved in the first review cycle. In contrast, the applicant of the other application did not resolve all deficiencies raised in their discipline review letter and was not approved in the first cycle. See Table 4 for more detail on these two examples. Inconsistency among reviewers could affect the rate of approvals in the first review cycle if comments provided to applicants differ in content or are not clearly communicated. For example, if some reviewers provide unclear comments, it could be more difficult for the applicant to address deficiencies in a timely manner, while applicants that received clear comments could potentially address deficiencies within the first review cycle. This could delay some generic drugs from entering the market if applicants require more time, including potentially additional FDA review cycles, to understand and respond to unclear comments. This has potential impacts on patient access to generic drugs and on applicants’ abilities to effectively manage their expectations for when their generic drug applications will be approved. FDA officials explained that although secondary reviewers are experienced, they do not consistently receive additional training to ensure clarity and consistency among primary reviewers. They noted that FDA offers training in clear writing for FDA employees but it is not required for reviewers. FDA managers noted that some inconsistency among reviewers may persist due to various factors such as tenure with the agency and different professional backgrounds or interpretations of the generic drug application information. They also said that standardizing reviewers’ writing is challenging since each reviewer might have his or her own writing style and scientific expertise. Two applicants and one trade association we interviewed also said that the length of reviewers’ tenure with the agency could impact the substance of their comments in information requests and discipline review letters and the likelihood of the applicant attaining approval in the first review cycle. For example, one trade association we interviewed said that inexperienced reviewers typically request information from applicants that a more experienced reviewer would already know, such as information about drug manufacturing facilities. Unknown effects of labeling changes. Three applicants we interviewed noted that they believe FDA could improve the rate of approvals during the first review cycle if they took steps to mitigate delays that stakeholders said result from brand-name drug labeling changes that occur mid-cycle. Because generic drug labels generally must match brand-name labels, most applicants we interviewed said that changes made by brand-name drug companies to the labeling of drugs during the review process can delay or prevent approval of generic drugs in the first review cycle because the applicant of the generic drug would likely need to update the label before it is approved. In addition, five of the 10 stakeholders we interviewed said they believe such labeling changes negatively impact the rate of first-cycle approvals, and three said they believe that brand-name companies may strategically time updates to a brand-name drug’s labeling to occur right before the approval of a generic competitor in order to delay generic drug approvals. Although our review of 35 selected applications did not identify examples where labeling changes made during the first review cycle were the only factor that prevented approval, we identified two instances where labeling changes were among multiple factors that prevented approval. Specifically, we identified two applications for which the complete response letters noted recent changes in the brand-name drug’s labeling as one of multiple factors that contributed to the generic drug application’s failure to receive approval in the first review cycle. One of these applications had successfully addressed several labeling deficiencies during the first review cycle, but received a complete response letter that included new labeling deficiencies because of recent changes in the brand-name drug’s labeling. Three applicants and one trade association identified labeling changes as a concern during our interviews. Two of these applicants and the trade association suspected updates are strategically timed to delay generic drug approvals. However, FDA does not know whether there is validity to these concerns because it has not conducted analysis that would enable it to assess their validity. FDA officials noted that they were aware of these types of concerns, but thought it would be difficult for brand-name drug companies to successfully time changes in their drugs’ labeling to affect applications under review, and that labeling changes for brand- name drugs must be justified, for example, to note an adverse reaction identified after approval. However, FDA officials also acknowledged that there may be an incentive for brand-name drug companies to change the label on a drug frequently to make it more difficult for a generic drug application to be approved. FDA officials stated that the Office of Generic Drugs does not assess how often brand-name companies change their labeling or track how often such labeling changes occur because such changes are reviewed by the Office of New Drugs. Further, while FDA officials noted that the two offices have coordinated on the review of some labeling changes, they stated that they do not coordinate on the timing of approval of brand- name drug label changes. This is inconsistent with federal internal control standards, which state that agencies should identify risks that affect their defined objectives and use quality information to achieve these objectives, including by identifying the information required to achieve the objectives and address related risks. In addition, FDA can approve a generic drug application even though changes have been made in the brand-name drug labeling that the applicant has not incorporated into its proposed labeling, provided the applicant meets certain criteria; however, FDA officials told us that applications rarely meet the required criteria. Conducting an assessment of the extent to which the timing of such changes affect the approval of generic drugs in the first cycle of review would provide FDA with the necessary information to respond to stakeholder concerns and take action, as appropriate, such as by coordinating with the Office of New Drugs on this issue. To the extent that brand-name companies’ labeling changes are creating unnecessary delays in generic drug approval, such delays may impede generic drug entry into the market, which would be inconsistent with FDA’s stated goals of speeding up generic drug reviews. The timely approval of safe generic drugs in FDA’s first review cycle can provide substantial cost savings to patients and third-party payers. Since the enactment of GDUFA, FDA has taken steps to help applicants submit stronger generic drug applications and correct deficiencies within the first review cycle. However, according to FDA its most recent analysis found that the average generic drug application required three cycles of review before approval. Opportunities exist to enhance FDA’s efforts to increase the rates of approval for generic drugs in the first review cycle, including improving the consistency and clarity of reviewer comments and assessing the effects of the timing of brand-name companies’ changes to labeling. Taking such steps could help FDA meet the agency’s goals of minimizing the number of review cycles necessary for generic drug application approval and increasing the overall rate of approval, including within the first review cycle. Increasing the rate of approval in the first review cycle, while maintaining the efficacy and safety of generic drugs, can expand consumer access to relatively lower cost medications and has the potential to save patients and third-party payers billions of dollars. We are making the following two recommendations to FDA. The Commissioner of FDA should take additional steps to address inconsistency in its written comments to generic drug applicants— including the clarity of writing and the content of comments—among reviewers, such as requiring additional training for reviewers. (Recommendation 1) The Commissioner of FDA should assess the extent to which the timing of brand-name drug companies’ drug labeling changes affect the approval of generic drug applications in the first review cycle, and take steps, as appropriate, to limit the effect of brand-name drug labeling changes on pending generic drug applications. (Recommendation 2) We provided a draft of this report to HHS for review and comment. In its written comments, which are reproduced in appendix II, HHS concurred with our recommendations. HHS stated that it will take steps to improve the clarity and content of primary reviewers’ comments by, for example, providing training on written communication. Additionally, HHS stated that it will take steps to assess examples in which a brand-name drug company labeling change impacted the timeline of a generic drug approval and assess what actions could address this issue. In addition, HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the congressional addresses, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 202-512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The Food and Drug Administration (FDA) made several changes to its review process for generic drug applications in its implementation of the Generic Drug User Fee Amendments of 2017 (GDUFA II) that are intended to improve communications with applicants, such as drug companies, and included the following: Additional communication with applicants. In its GDUFA II Commitment Letter to Congress, 1. FDA committed to notify applicants of potential deficiencies in an application that could prevent approval in the first review cycle through information requests or discipline review letters by about the mid-point of the review cycle; and 2. FDA committed to continue to issue additional information requests or discipline review letters late in the review cycle as needed, and, in certain circumstances, to work beyond the review timeframe to issue an approval. Pre-submission facility correspondence. In its GDUFA II Commitment Letter to Congress, FDA committed to communicating with applicants of priority generic drug applications before the application is submitted. For priority generic drug applications, FDA accepts information about facilities associated with an application, such as manufacturing facilities, at least 2 months before the application is submitted. If FDA finds the pre-submission facility correspondence includes complete and accurate information, the application may receive a review timeline of 8 months, rather than 10. Figure 2 provides an overview of the timeline for the first review cycle for generic drug applications under the Generic Drug User Fee Amendments of 2012 (GDUFA) and the revised review process under GDUFA II. In addition to the contact named above, Gerardine Brennan (Assistant Director), Rebecca Rust Williamson (Analyst-in-Charge), Caroline Hale, and Elizabeth Leibinger made key contributions to this report. Also contributing were Kaitlin Farquharson, Cathy Hamann, Dan Lee, Laurie Pachter, and Vikki Porter.", "summary": "Generic drugs—copies of brand-name drugs—lead to significant cost savings. Before a generic drug can be marketed, FDA must approve the generic drug application. According to FDA, applications go through an average of three cycles of review before being approved, which may take years. The FDA Reauthorization Act of 2017 included a provision for GAO to study issues regarding the approval of generic drug applications in the first review cycle. This report examines 1) the first review cycle approval rate of generic drug applications in recent years and factors that may have contributed to whether applications were approved; and 2) changes FDA has made to increase the first review cycle approval rate. GAO reviewed FDA data on all generic drug applications reviewed from fiscal years 2015 through 2017 and documentation from the first review cycle for a judgmental selection of 35 applications from fiscal years 2017 and 2018. GAO also interviewed a non-generalizable selection of stakeholders. Applications and stakeholders were chosen to ensure variation in experience with the approval process. GAO found that 12 percent of the 2,030 generic drug applications reviewed by the Food and Drug Administration (FDA) from fiscal years 2015 through 2017 were approved in the first review cycle. The first review cycle begins when FDA accepts a generic drug application for review and ends when FDA makes its first decision about whether the drug should be approved for marketing and sale. For applications that were not approved in that first cycle, the application must undergo one or more subsequent review cycles to obtain approval, delaying the generic drug's arrival to market. GAO identified several factors that may have contributed to whether a generic drug was approved during the first review cycle. For example, certain types of complex drugs were less likely to receive approval in the first review cycle, such as eye drops or other drugs administered through the eye. FDA has taken steps to increase the rate of generic drug approvals in the first review cycle. For example, FDA has increased communication with applicants and introduced templates for reviewers to improve the consistency and clarity of their comments. However, GAO's review of a judgmental selection of 35 applications found examples of variation in the clarity and content of FDA's comments to applicants. Such variation may have contributed to whether applicants could adequately address deficiencies within the first cycle, and therefore whether the applications were approved. In addition, stakeholders GAO interviewed expressed concern that changes to the brand-name drug's labeling mid-cycle could delay or prevent generic drugs' approval in the first review cycle, and some stakeholders said they believe that the labeling changes may be strategically timed to delay approvals. Although FDA officials noted that it would be difficult for brand-name companies to time labeling changes in this way, they said that the agency has not conducted analysis that would enable it to assess the validity of these concerns. Therefore, FDA lacks the information needed to respond to these concerns or address problems should they exist. GAO recommends that FDA 1) take additional steps to address inconsistency in its written comments to generic drug application sponsors and 2) assess the extent to which the timing of brand-name drug companies' drug labeling changes affects the approval of generic drugs and take steps, as appropriate, to limit the effect. HHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The Controlled Substances Act (CSA) was enacted in 1970 to regulate and facilitate the use of controlled substances, including certain prescription drugs such as opioid pain relievers, for legitimate medical, scientific, research, and industrial purposes while preventing them from being diverted for illegal uses. According to DEA, the CSA requires DEA to maintain a “closed system” of distribution, which includes limiting the amount of certain controlled substances that are available in the marketplace by setting quotas. Various CSA provisions also require persons who handle controlled substances to register with the DEA. This includes businesses that import, export, manufacture, or distribute controlled substances; certain health care practitioners, such as physicians, licensed to dispense, administer, or prescribe them; and pharmacies authorized to fill prescriptions, referred to as “registrants.” The registration mechanism creates a “closed system” of distribution in which distribution may lawfully occur among the registrants. The closed system of distribution, along with registrant compliance with the CSA’s regulatory requirements, helps to ensure that a particular controlled substance is always accounted for by a DEA-registered entity, from its creation until it is dispensed to a patient or is destroyed. The CSA places controlled substances in one of five schedules based generally on findings related to the substance, including whether the substance has a currently accepted medical use in treatment in the United States, its relative potential for abuse, and the degree of dependence the drug or other substance may cause. For further information on this and other legal requirements, please see appendix II. The prescription drug supply chain is the means through which prescription drugs are ultimately delivered to patients with legitimate medical needs. Although there can be many variations in the flow of prescription drugs through the supply chain, in a common example, prescription drugs are produced by manufacturers; are purchased and stored by distributors, who take orders and deliver them to customers such as pharmacies; and ultimately are dispensed by pharmacies to patients who have a prescription from a practitioner, as shown in figure 1. Although prescription drugs are intended for legitimate medical uses, the prescription drug supply chain may present opportunities for the drugs to be diverted and abused as the drugs move through the various components of the supply chain. For example, an individual may visit multiple practitioners posing as a legitimate patient, referred to as a doctor shopper, to obtain prescriptions for drugs for themselves or others, or criminal enterprises may rob distributors and pharmacies of prescription drugs to sell to others. DEA, through its Diversion Control Division, is responsible for preventing, detecting and investigating the diversion of controlled substances from legitimate sources while ensuring an adequate and uninterrupted supply is available for legitimate medical, commercial, and scientific needs. The division is responsible for enforcing the CSA and its regulations pertaining to pharmaceutical controlled substances and listed chemicals. In doing so, it conducts domestic investigations, among other things, in DEA’s 23 field division offices. By law, generally, manufacturers, distributors, and reverse distributors are required to report to DEA every sale, delivery, or other disposal of any controlled substance. As we previously reported, manufacturers and distributors of schedules I and II drugs and schedule III narcotics must file reports with DEA through ARCOS, a drug reporting system that allows the agency to monitor the flow of DEA controlled substances from their point of manufacture through commercial distribution channels to point of sale or distribution at the dispensing/retail level. In addition, certain schedule III non-narcotics and some schedule IV narcotics are also covered by the ARCOS reporting requirements. DEA implemented the ARCOS database in 1997, and approximately 1,250 distributors, manufacturers, and reverse distributors report more than 72 million transactions into ARCOS each year, according to DEA. Generally, certain registrants must report certain data at least quarterly and they have the option to report voluntarily on a monthly basis. By law, each registrant, such as manufacturers and distributors of controlled substances, is required (1) to design and operate a system that is compliant with applicable federal and state privacy laws to identify suspicious orders of controlled substances, and (2) upon discovering a suspicious order or series of orders, notify the DEA Administrator and the special agent in charge of the appropriate DEA field division office. The SUPPORT Act, which amended the CSA in part, also includes requirements related to preventing drug diversion. The SUPPORT Act provisions require the DEA Administrator to establish a centralized database for collecting suspicious orders reports, which is discussed in more detail below. In addition, the SUPPORT Act requires the Attorney General to make certain data available to registered manufacturers and distributors through ARCOS. The SUPPORT Act also requires the Attorney General to submit to Congress a report that provides information about how the Attorney General is using ARCOS data to identify and stop suspicious activity no later than one year after the date of enactment of the SUPPORT Act. DEA operates and maintains various information systems containing registrant information, transaction data, and suspicious drug orders that support its efforts to prevent, detect, and investigate the diversion of pharmaceutical controlled substances. These include Controlled Substance Ordering System (CSOS). This system is used primarily by manufacturers and distributors, as well as pharmacies and hospitals to place orders for controlled substances in a secure electronic environment, and includes information such as the number of packages, size of packages and name of items ordered, according to DEA. ARCOS. As discussed above, ARCOS monitors the flow of transactions of schedule I, II, III and select schedule IV controlled substances from their point of manufacture to their point of sale or distribution at the dispensing or retail level (such as hospitals, retail pharmacies, practitioners, and teaching institutions). The data in ARCOS are used to, among other things, track regulatory compliance in the pharmaceutical drug industry and to detect abuse of legally manufactured pharmaceuticals that are diverted to illegal markets, according to DEA Diversion Control Division officials. Suspicious Order Reporting System (SORS). DEA developed SORS to receive and store suspicious order reports. To date, DEA has developed three versions of SORS as described below. SORS Online version. In late October 2019, DEA launched the Suspicious Orders Report System (SORS) Online, a centralized database required by the SUPPORT Act, for registrants that distribute controlled substances to report suspicious orders to DEA. Reporting a suspicious order to SORS Online constitutes compliance with the reporting requirement that registrants notify the Administrator of the Drug Enforcement Administration and the Special Agent in Charge of the Division Office of the Drug Enforcement Administration for the area in which the registrant is located or conducts business. SORS online is the third version of DEA’s SORS system that was originally developed in 2008. Unlike earlier SORS versions, SORS Online requires users to provide a reason an order is suspicious. At the time of our study, the use of SORS Online was voluntary. Registrants who are under active MOAs with DEA are reporting to the new SORS Online system, according to DEA. Follow-up version. Suspicious order reports reported by registrants since March 2017 operating under an active memorandum of agreement (MOA) with the DEA that required them to submit their reports electronically to DEA headquarters as opposed to their local DEA field division office using the SORS Follow-up version, according to DEA Diversion Control Division officials. Initial version. The initial version of SORS stores suspicious order reports for registrants with an expired MOA but who elected to voluntarily continue to report suspicious orders in the same way as under the MOA, according to DEA Diversion Control Division officials. The initial version of SORS was established in 2008. Figure 2 provides an overview of the information DEA obtains and uses to support its diversion control efforts. A PDMP is an electronic database that tracks controlled substance prescriptions, managed within and at the state level. State PDMPs can provide health care providers and authorities timely information about prescribing and patient behaviors that may indicate drug abuse or diversion and facilitate a response. Authorized users, such as practitioners and pharmacists, may access information submitted to PDMPs by dispensers. A state’s PDMP is housed by a specified statewide regulatory, administrative or law enforcement agency. The PDMP distributes data from the database to individuals who are authorized under state law to receive the data for purposes of their profession. PDMP data can assist law enforcement and health care providers such as practitioners and pharmacists in identifying patterns of prescribing, dispensing, or receiving controlled substances that may indicate abuse or diversion. PDMPs vary in numerous ways across states, including what data they collect; what drugs they cover; who has access to, or who is required to use, the prescription drug monitoring program; and which state agency oversees and administers the program. DEA may request state PDMP data through submitting requests or subpoenas to the state official operating the PDMP database, for example, to support diversion control investigations. The requirements on requesting and accessing state PDMP vary from state to state according to DEA Diversion Control Division officials. Officials noted that the different state-by-state requirements create difficulties for federal law enforcement during a multi- state or national case as law enforcements’ requests for data have to be addressed at the state level. Data-analytics activities can include a variety of techniques to prevent and detect diversion, including data matching and data mining. Data matching is the large scale comparison of records and files to detect errors or incorrect information. It can be used to verify information provided by recipients or detect unreported changes. Data mining is the use of automated computer algorithms to detect patterns, including those that are otherwise not obvious, correlations, or anomalies within large data sets indicative of potential diversion. Entities may identify many types of analytics techniques that can be used to address improper transactions, such as Rules based – Identify suspicious orders with rules, such as orders that go above a threshold; Anomaly – Detect individual and aggregated abnormal patterns versus peer group, for example, the orders from one pharmacy compared to other pharmacies in the same geographic area; and Predictive – Assess against known diversion. A provider that has characteristics similar to those of known bad actors. DEA uses industry-reported ARCOS data to help generate leads, support enforcement actions, and allocate resources. The agency uses these data in a number of ways, including supporting field diversion control activities and developing analytical products. Field-Based requests for data analysis. DEA’s Diversion Control Division’s ARCOS Unit responds to requests for data analysis from its field division offices in support of diversion control enforcement activities. According to DEA officials, this unit is responsible for the collection, maintenance, and analysis of ARCOS data. For example, DEA said this unit conducts analysis on controlled substances that are bought and sold in a particular timeframe between a seller and a buyer. The ARCOS Unit also obtains information on the quantity, dosage units, grams, and ingredients of the drugs in the sale and conducts analyses in response to specific requests from field-based investigators who send their requests to the unit. For example, DEA officials said that out of the 800 field division office requests for analysis sent to the DEA ARCOS Unit in calendar year 2018, about 60 percent of those were for “enhanced” validations. This process includes a controlled substance report which the unit provides to field investigators for their use during scheduled drug investigations, and contains a summary of, among other things, an ARCOS registrant’s reported sales and purchases compared against what other registrants report was sold to them. This process uses both automatic and manual checks. According to DEA officials, they received approximately 480 requests for enhanced validations from DEA field investigators in 2018. While DEA officials noted that DEA’s enhanced validation procedures are not documented, they acknowledged that the ARCOS Unit is in the process of developing standard operating procedures for ARCOS data quality control, including the enhanced validation process. All requests for validations submitted to the ARCOS Unit are analyzed and compiled, and sent to field-based investigators to support scheduled investigations. Although validations are primarily requested for scheduled investigations, field offices can request these reports pursuant to any scheduled or non-scheduled investigation. DEA Analytic Product - Drug Profiles. Using ARCOS data, DEA creates drug profiles for suspected bad actors at the retail level (such as certain pharmacies), who have irregular transactions–also known as outliers, according to DEA officials–in a specific area or zip code and provides this information to its field division offices. The ARCOS Unit compares this suspected “bad actor” with other area competitors. DEA Analytic Product – Annual Threat Assessments. DEA’s ARCOS Unit also uses ARCOS data to develop threat assessments annually to aid field investigators. The threat assessments use ARCOS data to provide drug-related transaction trends and patterns related to a given DEA field division office area of operations to help establish priorities and allocate resources. DEA officials noted that field division office staff use these assessments to develop work plans identifying which registrants will be subject to the office’s routine regulatory investigation that year. Field Querying of ARCOS Data. – Field division offices may also use ARCOS querying tools to analyze ARCOS data to proactively identify diversion targets, such as reviewing ARCOS data to identify information on top purchasers of controlled substances. In a written response to our questions, DEA officials told us that several ARCOS drug profiles they developed have contributed to state and federal administrative, criminal and regulatory investigations. DEA officials recently informed us that as part of a reorganization, it established the Targeting and Special Projects Section whose goal is to focus on leveraging DEA’s data capabilities. Specifically, this section is composed of two units, including the Reports Analytics Unit and the Targeting and Special Projects Unit, which was established in March 2019 and is responsible for conducting data analytics on ARCOS and other data, according to DEA Diversion Control Division officials. DEA is currently working to determine the types of analysis these units will conduct. We found that while DEA uses ARCOS data to support ongoing investigations and conducts analysis on this data to identify investigative leads for its field division offices, it could conduct more robust analysis using automated computer algorithms to help identify questionable patterns in the data. This analysis in turn could be used to identify registrants that need to be investigated. According to DEA officials, most of the analysis DEA currently conducts on ARCOS data is used by the field division offices. For example, upon receiving information on pharmacies that have a high frequency of reporting stolen or lost-in-transit drugs a field division office may contact DEA’s ARCOS Unit to request ARCOS information. DEA then analyzes the ARCOS data to produce the requested reports to support the field’s ongoing investigations. DEA also conducts routine analysis of ARCOS data to identify high volumes of drugs sold by a distributor to a single purchaser, high volumes of drugs purchased by a single purchaser, and trends in drugs sold or purchased in a given geographic area compared to similar nearby areas. DEA officials also identified one type of analysis it conducts using a computer algorithm. Specifically, DEA uses a computer algorithm when comparing large volumes of drugs purchased in a given geographic area to the area’s population data. According to DEA officials, DEA conducts this analysis quarterly. However, DEA did not report conducting active and recurring monitoring of transactions using algorithms to detect and flag transactions that indicate potential diversion, either on a real-time or near real-time basis. We identified several additional opportunities for DEA to proactively analyze ARCOS data using computer algorithms to identify unusual patterns of drug distribution on a more routine basis. Such analyses could be used to proactively support or generate leads for investigations of potential drug diversion. For example, DEA could Analyze ARCOS data to identify unusual volumes of drugs that were disposed of rather than sold. Conduct analysis of ARCOS data to identify unusual numbers of deleted transactions or deletions of transactions of high volumes of drugs. Analyze ARCOS data by comparing the amount of drugs being acquired by a registrant to the amount of drugs accounted for, through being sold or disposed of, among other things, by each registrant to determine any differences. Analyze ARCOS data to identify trends in distribution or purchases of drugs in a given geographic area. DEA could look for unusual patterns when comparing such activity in an area with that of other nearby areas; or analyze volumes of drugs purchased in a geographic area when adjusted by the area population. In addition to the analysis noted above using ARCOS data, we also identified further analysis that DEA could perform using ARCOS data and additional available data to help identify potentially suspicious purchase or distribution patterns. Specifically, in our review and analysis of ARCOS data and information about PDMP data, we identified an opportunity for DEA to analyze ARCOS and PDMP data together for a more complete picture of drug transactions from distribution to retailers through dispensation to patients. We determined this could help in assessing whether the amount of drugs being prescribed is consistent with the amount of drugs being purchased or distributed in a given geographic area. For example, in areas where the number of prescriptions increases, a subsequent increase in drug orders and distribution to that area could be considered understandable. However, where the number of prescriptions in an area remains the same, or decreases, a significant increase in drug orders and distribution to that area could be considered unusual, especially if this pattern persists over several reporting periods. DEA stated that it occasionally performs such analysis manually, noting however that its access to PDMP data is contingent upon each state’s requirements and willingness to share its PDMP data with federal law enforcement. In July 2019, DEA officials responsible for overseeing the use and analysis of ARCOS data expressed an interest in improving DEA’s ARCOS data analytic capabilities but stated that they needed more staff and resources. Specifically, they noted they would like to hire additional staff, such as data scientists, to conduct analysis on ARCOS data using, for example, additional computer algorithms. DEA also noted that it was considering automation of additional types of analyses, but did not provide a start date or estimate as to when it would move forward on that consideration. While DEA created the new Targeting and Special Projects Section in March 2019 to enhance DEA’s data analytics and set aside some positions for program analysts and subject matter experts, among other positions, as of October 2019, DEA officials did not have any details or documentation about the data analysis efforts the new division plans to undertake. We have previously reported that new approaches to combining and “making sense of” large amounts of varied data—methods referred to as advanced analytics—are helpful to uncover patterns, identify anomalies, and provide insights not suggested by assumed hypotheses. In addition, other federal entities responsible for detecting diversion and abuse of controlled substances utilize computer algorithms as part of their analysis of available data in order to flag and prioritize potential instances of diversion for further investigation. For example, the Centers for Medicare & Medicaid Services and its National Benefit Integrity Medicare Drug Integrity contractor use proactive data analysis to detect aberrant patterns and potential diversion in drug prescribing. As a result, the contractor is able to produce “prescriber risk assessments,” which provide a comparison of controlled substance prescribing patterns across peers. The Centers for Medicare & Medicaid Services also uses proactive data analysis to identify providers with potentially inappropriate prescribing patterns, especially as it concerns opioids. Similarly, some opioid drug distributors use computer algorithms to identify suspicious orders that are the basis for the suspicious order reports they are required to provide to DEA. The establishment of this new section within DEA focused on its data analytics capabilities presents an opportunity for DEA to more proactively use data analytics with regard to its ARCOS and other data. In doing so, DEA could more effectively identify possible diversion activities or unusual activity to aid its ongoing efforts to prevent, detect, and investigate diversion more quickly and assist it in reporting on how it is using ARCOS data to identify suspicious activities. In October 2019, DEA established the Suspicious Orders Report System (SORS) Online, a centralized database for collecting suspicious order reports, which is required by the SUPPORT Act to be established by October 24, 2019. The SORS Online data fields include a requirement for registrants to note their reasons for identifying an order as suspicious, drug quantity, and dosage strength. The successful implementation of the centralized database is important because it could address the fragmented way in which suspicious order reports are currently submitted. However, reporting to the centralized database is currently voluntary. Registrants may notify DEA of a suspicious order using other means, including email, facsimile, or telephone. The systems and reports are not currently integrated, and investigators must query each system or office separately in order to find, for example, information related to a lead they are investigating. Currently, registrants are required upon discovery of a suspicious order or series of orders, to notify the Administrator of the DEA and the Special Agent in Charge of the division office of the DEA for the area in which the registrant is located or conducts business. Prior to DEA establishing the SORS Online centralized database, registrants with an existing or a prior MOA also have reported suspicious orders into one of two SORS databases when reporting to headquarters. The new SORS Online is the only electronic mechanism for reporting suspicious orders now, according to DEA. Registrants who are under active MOAs with DEA are reporting to the new SORS Online system, according to DEA. Registrants that are not under an MOA may also use SORS Online, but are not required to do so. Registrants not under an MOA may also use a paper-based process, among others, when reporting to the field division offices and DEA headquarters. However, no integration exists across headquarters’ and field division offices’ various electronic- and paper-based systems. DEA officials we met with said that some of the suspicious order reports received at the field division office level are stored in hard copy in accordion file folders, instead of being digitized or entered into a searchable database. Reporting to SORS Online satisfies the requirement to report such orders to the Administrator of the DEA and the Special Agent in Charge of the Division Office of the DEA for the area in which the registrant is located or conducts business. Successfully managing the SORS Online database could lead to needed efficiency improvements and more effective use of the suspicious order report data. Although DEA has guidance, policies and procedures regarding the use of some of its information systems, it has not established a formalized data governance structure to manage its collection and use of data used to support the Diversion Control Division’s mission. DEA specifically has not institutionalized and clearly documented policies and procedures that describe division staff’s roles and responsibilities for collecting and analyzing data nor has it provided a structure that describes the agency’s approach to establishing and maintaining such a program. We have identified a number of issues with DEA’s management of data. For example, DEA does not have any documentation on their process for ensuring the quality of data registrants submit to its ARCOS database— the main system that enables DEA to monitor the flow of controlled substances. As a result, it is difficult to understand the controls they have over this important data. A data governance structure is defined as an institutionalized set of policies and procedures for providing data governance throughout the life cycle of developing and implementing data standards. A data governance structure also helps to ensure important data assets are formally managed and fully utilized, and can also provide consistent data management. We previously reported on key practices based on several data governance models, including developing and approving data standards, managing, controlling, monitoring, and enforcing consistent application of data standards, and delineating roles and responsibilities for decision making and accountability. Additionally, in June 2019, the Office of Management and Budget established a Federal Data Strategy (Strategy) as a framework of operational principles and practices to help agencies use and manage data. We found several areas where DEA’s current practices do not reflect select leading data governance practices. Agencies should identify data needs to answer key agency questions: We found that DEA does not have a governance structure to determine and prioritize its data requirements for either suspicious order reports it receives or data reported into its ARCOS systems. For example, DEA has not established standard requirements for the information required in a suspicious order report. As a result, distributors’ suspicious order reports vary and may contain inconsistent and insufficient data for DEA to make investigative decisions. In addition, DEA does not have a governance structure to identify agency and industry stakeholder data needs to help inform its opioid diversion control efforts. Agencies should provide resources explicitly to leverage data assets: Agencies should ensure that sufficient human and financial resources are available to support data driven agency decision- making, and accountability. As mentioned earlier, while DEA created the new Targeting and Special Projects Section in March 2019 to enhance DEA’s data analytics, as of October 2019, DEA officials did not have details or documentation about the data analysis efforts the new division plans to undertake or the resources they plan to provide for those efforts. As a result, DEA is unable to conduct the analysis that would enable it to more effectively use its existing data in making decisions about diversion related efforts. Agencies should prioritize data governance: Agencies should ensure there are sufficient authorities, roles, organizational structures, policies, and resources in place to transparently support the management, maintenance, and use of strategic data assets. Similarly, leading practices for data governance includes delineating roles and responsibilities for decision-making and accountability, including roles and responsibilities for stakeholder input on key decisions. As mentioned earlier, DEA established the Targeting and Special Projects Section in March 2019 whose goal is to focus on leveraging DEA’s data capabilities and conducting data analytics on ARCOS and other data, according to Diversion Control Division officials. While the new section appears to hold promise, DEA has not clearly defined and adopted the new section’s roles and responsibilities for managing and analyzing data across the DEA or how the new section will communicate and collaborate with other Diversion Control Division headquarters and field staff. As a result, the new division may not operate in a predictable, repeatable, and accountable way. Agencies should support non-federal stakeholders: Agencies should engage with industry, academic, and other nonfederal users of data to share expert knowledge of data assets, promote wider use, improve usability and quality, and advance innovation and commercialization. Later in this report, we identify an opportunity for DEA to collaborate with industry stakeholders and seek their input for an initiative that is supposed to assist industry stakeholders in their responsibilities to report suspicious orders to DEA. Although DEA has not incorporated these data governance practices, it is in the early stages of developing a data governance structure. As of September 2019, DEA officials told us that its Office of Information Systems’ Chief Data Officer just recently started to work with DOJ and other components to develop a data strategy in response to the recently released department wide strategy, and therefore does not have any additional documentation or information related to timelines and deliverables for formally implementing a DEA data governance or other data structure for the agency. Without additional details, such as a timeframe for developing the structure or more information about what it would entail, it is unclear how or if these efforts will incorporate leading practices for data governance and if they will be effective. Data governance processes are important for DEA given it works with an extensive and complex network of stakeholders to manage opioid diversion risks and uses industry-reported data to help it identify patterns that might indicate potential diversion. An effective data governance structure could help DEA ensure its important data assets are formally managed and fully utilized, and can also help ensure consistent data management. Industry and technology councils, domestic and international standards-setting organizations, and entities within the federal government endorse the establishment and use of a governance structure to oversee the development, management and implementation of data standards, digital content and other data assets. DEA does not have an existing mechanism or a comprehensive database of orders before they are filled that it can analyze, on a real-time basis, to identify potentially suspicious orders. However, most industry stakeholders we spoke with on the usefulness of real-time data noted that such a mechanism would not add extensive value to diversion detection. DEA’s current data systems either contain historical, not real-time, data or do not contain all drug order data that could be reported. ARCOS. The data in the ARCOS database is historical, rather than real- time, on orders that have been filled. Every registered manufacturer is required, at such time or times and in such form as required by the Attorney General, to make periodic reports to the Attorney General of every sale, delivery or other disposal of any controlled substance. Each distributor is required to make such reports with respect to narcotic controlled substances. For example, as part of the reporting to ARCOS, acquisition and distribution transaction reports are required, by regulation, to be filed every quarter, except that a registrant may be given permission to file more frequently, but not more frequently than monthly, depending on the number of transactions being reported each time by that registrant. In addition, manufacturing transaction reports are required to be filed annually, except that a registrant may be given permission to file more frequently, but not more frequently than quarterly. CSOS. DEA does not require registrants to use CSOS and thus it is not used by all registrants. As previously discussed, CSOS is an electronic ordering system which allows registrants to place orders for controlled substances. Shipments of all ARCOS-reportable controlled substances, ordered through CSOS, are included in registrant’s periodic ARCOS reporting. Suspicious Order Reports. Suspicious order reports are intended to identify orders of unusual size, orders deviating substantially from a normal pattern, and orders of unusual frequency before they are filled. By law, each registrant is required to design and operate a system to identify suspicious orders that it receives. Registrants identify, then report, to DEA using their own systems to determine suspicious orders. As discussed previously in this report, registrants can report these orders into DEA’s newly launched SORS Online database, but reporting into this database is voluntary and registrants have an option to report in other ways, so this database does not capture all suspicious orders and is therefore not comprehensive. Suspicious orders are likely identified in close to a “real-time” basis. Orders that have been identified and reported as suspicious by the registrants, are orders that have not yet been filled. While two individual drug distribution companies we interviewed said they saw some value in real-time reporting, most industry stakeholders we spoke with on the usefulness of real-time data, including a broad cross- section of associations representing pharmacies and drug distribution companies, said that real time dissemination of suspicious orders by DEA would not add extensive value to efforts to detect possible diversion. Instead, some industry stakeholders suggested that a focus on data that provide trends over time might be more useful. As discussed earlier in this report, we provide examples of data analysis DEA currently performs and could perform on its existing data that could potentially help DEA determine or identify possible patterns of aberrant behavior in drug order information. Others we spoke with raised concerns about the varying ways companies determine what is suspicious and that using real-time data reported from DEA on these orders could be like comparing apples to oranges. Most of the associations that represent pharmacies and drug distributors that we met with indicated they did not see much value in either reporting, or receiving reports, of suspicious orders in “real-time.” For example, a representative from an association representing pharmacists told us that rarely would there be a case where a single order was so egregious that stopping it would have a significant impact on public health. This representative also noted that it would be more important to focus on historical trends, given “trends don’t happen in a day.” Other stakeholders we spoke with said that while there may be utility in real-time reporting of suspicious orders, they also had concerns about its feasibility, given current available data. They noted it would be difficult to compare suspicious order data as reported by registrants because companies rely on their own methods to determine a suspicious order. For example, Officials from an association that represents a large number of drug distributors indicated that receiving more real-time data might allow their members to have an additional check on orders that a wholesale distributor receives, but this utility would largely be contingent on the distributors’ ability to compare suspicious order reports across one another. Distributors use different criteria for determining whether an order is suspicious; there is no continuity across them; and they experience varying order volumes and patterns across their customers and over time as patient needs change. Thus, such analyses would be difficult to conduct, if they could be done at all, and would not necessarily result in useful comparisons. A representative from one drug distribution company told us that having knowledge of other distribution companies’ suspicious orders is not helpful because the company would not know how the other distributor made a determination on the suspicious order. Another representative stated that distributors are operating proprietary systems that may or may not vary substantially from each other depending on a large number of varying circumstances, and may be operating “wildly different” systems for identifying suspicious orders and therefore the information would not be valuable. Representatives from two drug distribution companies identified additional challenges to real-time reporting of suspicious orders if the determination of whether an order was suspicious or not was made by DEA. First, they did not believe DEA had sufficient resources or knowledge to identify suspicious orders. One representative said DEA does not know the history and market dynamics in the pharmaceutical industry to help inform decisions it would need to make on an order. Second, identifying an order as suspicious before it is filled would add a tremendous burden on DEA. According to one of the representatives, their company typically ships orders on the same day the order is received, consistent with “just-in-time” inventory management practices. If DEA were expected to make suspicious order determinations without the risk of disrupting patient care needs, it would be imperative for DEA to act quickly to identify suspicious orders. These distribution companies did not believe DEA would be able to identify them rapidly as needed. As noted above, DEA’s current systems are not designed for real-time reporting, and it does not have an existing mechanism or a comprehensive and complete database of orders before they are filled that it can analyze, on a real- time basis, to identify potentially suspicious orders. Officials from the association that represents a large number of drug distributors were careful to point out, however, that systems sometimes differ intentionally due, for example, to varying customer bases, service requirements and patient care needs. Thus, a certain amount of variability in suspicious order systems, criteria and decisions may be warranted, and even desirable. While DEA has developed some performance measures to track and publicly report the progress and results of its efforts in reducing diversion, DEA has not developed objectives, outcome-oriented goals, or measurable performance targets to assess the effectiveness of its opioid diversion control data analysis efforts and the link between DEA’s use of data and progress toward its diversion goals and strategies. DEA does have performance measures including the number of civil penalties and administrative actions it has undertaken, planned or scheduled investigations completed, and community outreach events completed. While these measures are useful, they do not account for outcomes of these actions, such as their potential impact on the volume of opioids being improperly sold or purchased. DEA officials noted that it adheres to goals established through the Office of National Drug Control Policy’s National Drug Control Strategy, such as reducing the prescription opioid rate by one-third within three years, reducing overdose deaths, and within five years, ensuring all health care providers have adopted best practices for opioid prescribing. However, those goals involve a multitude of federal agencies, and are not directly related to DEA’s use of industry-reported data, nor linked specifically to DEA diversion control efforts. DEA also noted that they have a number of goals across strategies such as DEA’s 360 strategy in addition to the goals in DOJ’s strategic plan; a performance measure with a measurable target for its agency-wide objective related to dismantling drug trafficking organizations—maximizing the monetary value of currency, property, and drugs seized; and a measure for curbing opioid and other illicit drug use. GPRAMA directs agencies to develop and document goals, as well as performance measures to assess progress towards their goals. Agencies can use performance measurement to make various types of management decisions to improve programs and results, such as developing strategies and allocating resources, including identifying problems and taking corrective action when appropriate. Additionally, GPRA as amended by GPRAMA states that management should define outcome-oriented objectives in specific and measurable terms. Measurable targets help decision makers conduct assessments of whether program goals were achieved, and linkages between an organization’s goals and performance measures create a line of sight so that everyone understands how program activities contribute to the organization’s goals. DEA officials view their existing performance goals as sufficient overall. However, without defining objectives in specific measurable terms, DEA is likely not able to adequately assess whether its respective investments and efforts are helping it to limit the availability of and better respond to the opioid prescription diversion threat. Until program officials can review the effectiveness of these systems based on quantifiable benefits and measurable performance targets, they are not well-positioned to determine the extent to which suspicious order reports or ARCOS data and systems are enhancing the effectiveness of the agency’s opioid related regulatory and criminal diversion investigations, prosecutions and civil actions. Documenting program goals and developing measurable performance targets and linkage to program goals could provide DEA with the information it needs to assess progress and make informed decisions about current and future operations. DEA developed an ARCOS query option for registrants to use, called the ARCOS Enhanced Lookup Buyer Statistic Tool, in February 2019 to better support registrants’ efforts to identify and report suspicious orders. This tool allows registrants to query certain ARCOS data maintained by DEA. Although this tool was supposed to be an improvement upon a prior iteration of the lookup tool DEA had developed, distributors and an industry association representing distributors identified several limitations with the tool. Specifically: Single query challenges and no bulk downloads. The distributor can only query the tool one pharmacy at a time, even though some distributors supply thousands of pharmacies on a daily basis. Thus, if certain distributors were to query all of its pharmacies for possible suspicious order patterns, the process could be time-consuming or not feasible. DEA noted it was working on this limitation. Limited login credentials. DEA only provides each distributor with one set of login credentials, so only one employee can log in at a time to query the tool. DEA noted it was working on this limitation. Data provided in the tool are not detailed enough. The tool does not provide detailed enough information to be useful to facilitate the identification of suspicious orders. For example, when a distributor queries the tool, the search results will list the total dosage units for a particular opioid for the past six months at the pharmacy. Because some opioid drug dosages are more commonly abused than others, distributors told us that simply having the total number of dosage units is not as helpful as seeing the breakdown of the different dosage units. In another instance, the data provided to distributors does not include critical details about the number of suppliers. One distributor might have multiple warehouses and distribution centers that it uses to package and ship pharmaceutical products. In the ARCOS data that DEA provides to distributors, these individual warehouses are counted as distinct suppliers in the total supplier count data provided to the distributors. Therefore, the number of suppliers may appear inflated to the distributors, even though it is only a single company providing the products. According to DEA, the ARCOS lookup tool is meant to be a pointer and assist distributors in conducting due diligence so they can “know their customer.” Regardless if a distributor is shipping from multiple distribution centers and therefore showing as multiple suppliers in the lookup tool, these are all unique DEA registration numbers and are therefore unique suppliers to the customer. According to DEA, the important part here is that distributors can see quantity and gram totals per registrant (such as, a pharmacy customer) that they query. When evaluating whether an order is suspicious, a distributor uses its own internal transaction data to evaluate a buyer’s ordering patterns. However, purchasers of controlled substances, such as pharmacies and medical practices, may use multiple distributors for their purchases. Distributors have previously raised concerns that they did not have access to additional transaction data, such as whether the purchaser is also buying controlled substances from additional suppliers. They have noted that this additional data would be useful when making decisions about whether an order is suspicious, and specifically, that ARCOS data would be useful in helping them evaluate whether an order was suspicious. For example, in 2018, one distributor testified that, given DEA’s access to the controlled substance transaction data that distributors report, “nly DEA has visibility over the entire landscape and can track and analyze aggregate data on the distribution of controlled substances in particular jurisdictions.” In addition, an industry organization we met with provided comments to DOJ in 2017 that certain data could provide more context for them to identify problematic orders. Specifically, the organization noted that if DEA could provide ARCOS data in aggregate form without identifying individual distributors’ competitors, the distributor could consider a pharmacy’s orders in the context of the pharmacy’s overall ordering from all distributors. An industry association representing distributors, and two of the distributors that we interviewed stated that the Enhanced Lookup Buyer Statistic Tool is a step in the right direction. However, the industry association and four distributors that we interviewed stated that the tool remains limited in helping distributors improve how they identify suspicious orders, as noted above. DEA officials told us that distributors have brought some of these concerns about the ARCOS Enhanced Lookup Buyer Statistic Tool’s usability to their attention. For example, in May 2019, an industry association representing distributors sent a letter to DEA, outlining a consolidated list of industry’s concerns about the tool. In recent discussions in June 2019, DEA officials acknowledged some of these limitations and stated that some industry concerns would be easier to fix than others, but that they had not established a timeframe for when the changes would be implemented. For example, DEA officials noted it might be easier to provide additional login credentials to distributors and make the data available to be downloaded in a more functional way for distributors. For some of the other limitations industry stakeholders identified, such as providing more detailed ARCOS data to the distributors, DEA officials raised concerns. For example, DEA officials noted that distributors could use the additional detailed data as a market research tool in order for distributors to gain unfair market advantages or to learn more about their competitor’s business contracts with pharmacies. In September 2019, DEA officials told us that it was not currently addressing changes to the ARCOS Enhanced Lookup Buyer Statistic Tool, due to competing priorities within DEA. Specifically, DEA officials noted that it is focused on existing priorities related to meeting upcoming requirements mandated in the SUPPORT Act, including establishing a suspicious order centralized database, as discussed previously in this report. While we recognize that agencies need to determine and set priorities, it is important for DEA to continue to work with industry in ensuring that the tool it created to address the SUPPORT Act requirement will help industry in addressing its suspicious order reporting requirement under the CSA, as amended. The SUPPORT Act requires DEA to provide distributors with access to ARCOS data to help the distributors identify, report, and stop suspicious orders of opioids and reduce diversion rates. By identifying solutions – in consultation with industry stakeholders – to address the limitations of the ARCOS Enhanced Lookup Buyer Statistic Tool, DEA could better ensure registrants have more useful information at their disposal when evaluating whether an order is suspicious. DEA officials and DEA field division offices we interviewed identified a number of limitations with suspicious order reports they received, and, due to these limitations, they rarely use suspicious order reports to generate potential investigative leads. The issues DEA identified included: Threshold-based algorithm triggers. Several DEA headquarters and field division officials told us that some distributors used fixed thresholds to identify suspicious orders, which DEA officials stated are not helpful or useful because the information is often not actionable. Lack of documented rationale. During the course of our review, DEA officials told us that many suspicious order reports do not include the rationale for why the registrant decided the order was suspicious, making it difficult to determine which suspicious order reports might contain actionable intelligence. In September 2019, the DOJ Office of the Inspector General reported that the current regulatory language governing industry suspicious order reporting does not require manufacturers and distributors to state why they believe an order is suspicious. In October 2019, DEA launched a new centralized database of suspicious order reports, as required by the SUPPORT Act. DEA’s new reporting format of suspicious order reports includes a required field for “Reason,” for registrants to provide an explanation of why the order is suspicious. However, currently reporting to the new centralized database is voluntary. Differing methodologies. As discussed earlier in this report, the definition of a “suspicious order” may include, but is not limited to, an order of a controlled substance of unusual size, an order of a controlled substance deviating substantially from a normal pattern, and orders of controlled substances of unusual frequency. However, it is up to the individual distributor companies to decide the more specific metrics, according to DEA Diversion Control Division officials. Each distributor must design and operate a system to identify suspicious orders. Therefore, distributors utilize different methods to flag customer orders as suspicious. According to our analysis of DEA data, it has collected at least 1.5 million suspicious order reports since 2014, and these reports may contain data on attempted purchases that were denied, based on indicators of suspicious patterns. These data could help with DEA’s efforts to prevent, detect, and investigate diversion. Officials from six DEA field division offices we interviewed said they refer to suspicious order reports when conducting their routine regulatory investigations of registrants. DEA field division officials also stated that, while suspicious order reports are generally not used as the primary or sole impetus to initiate an investigation, officials will infrequently refer to related suspicious order reports when there is an ongoing criminal investigation that is initiated through other means. However, of the DEA field division offices we interviewed, officials from two offices told us that they had used a suspicious order report as the sole or primary impetus for initiating a criminal investigation in the past year – one stating that it happened once, and another estimating that it happened one to three times. Another field division told us that they had two convictions “in recent memory” that began with a suspicious order report. Three offices told us that they had not used suspicious order reports as the sole or primary impetus for a criminal investigation in the past year, and one told us they did not know if a suspicious order report had been used in that way. DEA field division offices we interviewed also identified reasons why suspicious order reports may not be as useful as they could be in helping to identify investigative leads. For example, one DEA field division office characterized the suspicious order reports they received from one particular registrant as being “spot on” and always warranting a DEA follow-up investigation, given the amount of detail and evidence of the registrant conducting its own on-site investigation into the customer. However, the same DEA office reported that other suspicious order reports were based on industry-developed thresholds that were not useful because the resultant reports did not indicate why the order was suspicious. Of the five DEA field division offices that we asked to characterize the quality of suspicious order reports, three of them reported that suspicious order reports were either “moderately” or “somewhat” useful. Officials from one field division office said that suspicious order reports are “very useful,” while officials from another DEA field division office reported that suspicious order reports are “not at all useful.” We have previously reported on these issues, including DEA communication with registrants, and in June 2015, we found that additional guidance from and additional communication with DEA was needed about registrants’ roles and responsibilities under the CSA, as amended. We recommended that DEA develop additional guidance for distributors for suspicious order monitoring and reporting. DEA did not expressly agree or disagree with our recommendation, but raised concerns about the recommendation, stating that “short of providing arbitrary thresholds to distributors, it cannot provide more specific suspicious orders guidance because the variables that indicate a suspicious order differ among distributors and their customers.” In responding to this recommendation, DEA officials told us that the agency had refocused its efforts on revising draft regulations in line with the SUPPORT Act, and that the revised draft was undergoing internal DEA and DOJ review. The agency noted that it expected the rule to codify existing legal obligations related to due diligence and suspicious order reporting and provide additional guidance regarding the nature and timing of the suspicious order reporting requirement, but also indicated that it was not possible to be certain of the precise nature of the draft rule. The 2015 recommendation remains relevant and important, and while DEA has reported taking some actions to address it, as noted above, DEA has not taken all the necessary steps to address the recommendation. We will continue to monitor DEA’s progress in addressing our recommendation. Given the extensive and complex network of stakeholders DEA works with to manage opioid diversion risks and the agency’s use of a large amount of industry-reported data, DEA could do more to use proactive, automated computer algorithms to analyze its data sources in detecting questionable patterns in industry-reported drug transaction data. It is missing opportunities to more effectively identify questionable ordering patterns and possible diversion activities than through its current analysis methods. Using more automated analyses, similar to other federal entities that use computer algorithms as part of their analysis of available data to help flag instances of diversion, DEA could enhance its ongoing efforts to prevent, detect, and investigate diversion more quickly and assist it in reporting on how it is using ARCOS data to identify suspicious activities. Furthermore, because DEA does not have a documented data governance structure in place to manage its data, it risks challenges related to quality, availability, and integrity of the data it uses to support opioid diversion. Although DEA has started to explore developing a data governance structure, it is important for DEA to document and define its process about what the structure would entail. This would help the agency determine the effectiveness of its structure, an important consideration given the large amounts of varied data DEA receives from industry stakeholders. Also, while DEA does have some performance goals related to opioid diversion, it lacks outcome-oriented goals and measurable performance targets to assess the extent to which the industry-reported data it obtains and uses support the agency’s diversion control activities. Defining these targets could help DEA adequately assess whether its respective investments and efforts are helping it to limit the availability of and better respond to the opioid prescription diversion threat. DEA’s efforts to provide registrants with additional information to facilitate the identification of suspicious orders is promising, but has limitations. Due to these limitations, registrants, such as distributors, might not have complete information when they are identifying suspicious orders. By identifying solutions – in consultation with industry stakeholders – to address the limitations of the ARCOS Enhanced Lookup Buyer Statistic Tool, such as the need for additional login credentials or the ability to bulk download data, DEA could better ensure registrants have more useful information at their disposal when evaluating whether an order is suspicious. Finally, we continue to monitor implementation of our 2015 recommendation that DEA provide additional guidance to distributors related to suspicious orders, and we believe that it remains relevant and important. We are making the following four recommendations: The DEA Administrator should develop and implement additional ways to use algorithms in analyzing ARCOS and other data to more proactively identify problematic drug transaction patterns. (Recommendation 1) The DEA Administrator, in coordination with the department-wide efforts on data strategy, should establish and document a data governance structure to ensure DEA is maximizing its management of industry-reported drug transaction data. (Recommendation 2) The DEA Administrator should establish outcome-oriented goals and associated measurable performance targets related to opioid diversion activities, using data it collects, to assess how the data it obtains and uses supports its diversion control activities. (Recommendation 3) The DEA Administrator, in consultation with industry stakeholders, should identify solutions to address the limitations of the ARCOS Enhanced Lookup Buyer Statistic Tool, to ensure registrants have the most useful information possible to assist them in identifying and reporting suspicious orders to DEA. (Recommendation 4) We provided a draft of this report to DOJ, including DEA, for review and comment. In its comments, reproduced in appendix III, DEA agreed with three of the four recommendations, and neither agreed or disagreed with the fourth. DEA also provided technical comments, which we incorporated as appropriate. In response to our first recommendation that DEA should develop and implement additional ways to use algorithms in analyzing ARCOS and other data to more proactively identify problematic drug transaction patterns, DEA concurred and stated it will continue to examine a variety of technologies to analyze ARCOS and other data and implement additional ways to use algorithms to more proactively identify problematic drug transaction patterns. If these and other actions to expand the agency’s analytic capabilities are effectively implemented, DEA would address the intent of our recommendation. DEA also concurred with our second recommendation that DEA, in coordination with the department-wide efforts on data strategy, should establish and document a data governance structure to ensure DEA is maximizing its management of industry-reported drug transaction data. In its response, DEA stated it is currently implementing this recommendation and will continue to mature its data governance structure. The intent of this recommendation is for DEA to establish a formalized data governance structure to manage its collection and use of data used to support the Diversion Control Division’s mission. By establishing such a structure, DEA could better ensure its important data assets are formally managed and fully utilized, and could also help ensure consistent data management across the Diversion Control Division. DEA neither agreed nor disagreed with our third recommendation that DEA should establish outcome-oriented goals and associated measurable performance targets related to opioid diversion activities, using data it collects, to assess how the data it obtains and uses supports its diversion control activities. In its response, DEA stated it recognizes that measurable performance targets related to opioid diversion activities can serve as leading practices at different organizational levels including the program, project, or activity level. However, DEA stated it needs additional clarification on the specific actions needed to fulfill this recommendation. Our recommendation is intended to ensure that DEA can demonstrate the usefulness of the data it collects and uses to support its opioid diversion control activities. We will continue to work with DEA to address the specific actions needed to assess how the data it obtains and uses support its diversion control activities to fully address the intent of this recommendation. Based on our review of DEA’s existing performance goals and targets for its opioid diversion efforts, as well as our previous work on performance measurement, we believe that further development of related performance goals and targets is warranted and could potentially improve the usefulness of the data DEA collects and uses in support of its diversion control program. DEA also stated in its comments that the limited timeframe did not allow GAO to meet with DEA officials responsible for performance metrics for opioid diversion. However, in our interviews with DEA regarding its performance metrics for opioid diversion, we submitted our questions in advance of meeting with DEA officials to allow time for the questions to be reviewed by relevant officials. DEA stated in its comments that it will ensure that GAO meets with the appropriate officials to address metrics. As stated earlier, we will continue to work with DEA to address the specific actions needed to meet the intent our recommendation. DEA concurred with our fourth recommendation that DEA, in consultation with industry stakeholders, should identify solutions to address the limitations of the ARCOS Enhanced Lookup Buyer Statistic Tool, to ensure registrants have the most useful information possible to assist them in identifying and reporting suspicious orders to DEA. DEA stated it has consulted with industry stakeholders and has identified solutions to address the limitations of the tool. We believe such consultation will be beneficial for DEA to understand its industry stakeholders’ needs and that identifying solutions for addressing these needs would help ensure registrants have the information necessary to help identify and report suspicious opioid orders. We are sending copies of this report to the appropriate congressional committees, the Attorney General, the DEA Administrator and the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6691 or McneilT@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. To understand the extent to which DEA obtains and uses industry- reported data, and the opportunities that exist to improve how that data are obtained and used, including the feasibility of real-time reporting, we reviewed applicable laws, regulations, court cases, and DEA internal documentation. We also conducted interviews with DEA headquarters offices, including the Diversion Control Division and DEA field division offices. To determine DEA registrant legal reporting requirements related to prescription drug orders and the meaning of suspicious orders, we reviewed applicable laws and regulations, including the CSA and its subsequent amendments and related DEA regulations and guidance. In addition, we reviewed the recently enacted SUPPORT Act. To identify policies and guidelines DEA uses to obtain and review registrant-reported data, we reviewed DEA procedures for conducting drug-related investigations, information system manuals for data and information systems used by DEA, and DEA written communications to registrants and DEA forms registrants use to report prescription drug transactions to DEA. As part of our work examining the information systems used to obtain and analyze data reported by registrants, we interviewed officials who oversee the management of DEA information systems, such as Automation of Reports and Consolidated Orders System (ARCOS), Controlled Substances Ordering System (CSOS), Registrant Information Consolidated System, and the Suspicious Orders Reporting System (SORS) systems used to obtain and store suspicious order reports at DEA headquarters. We interviewed DEA officials in headquarters and field division offices to determine how information that industry members report to DEA is obtained and used to detect and identify potential diversion activities. The perspectives we gathered from field division offices cannot be generalizable to the entire population of field division offices, but did provide us with insights into the agency’s diversion efforts and use of industry-reported data. To identify what opportunities exist, if any, for DEA to improve these efforts, such as using computer algorithms or real-time reporting, we also interviewed DEA officials responsible for developing analytical products based on industry-reported data. In addition, we interviewed DEA officials at eight field division offices to learn about how diversion investigators use industry-reported data and what, if any, improvements might be needed. To identify which of the 23 DEA field division offices to interview, we prioritized our selection based on four primary criteria: 1) the controlled prescription drug availability rate in their geographic area, according to a 2017 DEA threat assessment report, indicating whether the field division office had a “high” or “moderate” rate of availability; 2) whether the office was within the location of a DOJ Opioid Fraud and Detection Unit task force location; 3) whether the office was located within top ten state with high controlled prescription drug prescribing rate, as identified by the CDC; and 4) whether the office was located within a state that the CDC identified as having a high ER visit rate for opioid overdoses. We also ensured that the DEA field division offices we interviewed represented different geographic areas within the United States. We also conducted interviews with four pharmaceutical distributors and one trade organization whose membership includes wholesale distributors. We interviewed three organizations representing pharmacies, pharmacists, and drug diversion professionals to gather their perspectives and experiences with efforts to detect and report suspicious opioid orders. We based our initial interview selection of distributors based on DEA- provided ARCOS data of opioid-related transactions, which indicated the three largest distributors for opioids. To identify smaller distributors to gather their perspectives, we contacted an industry association representing distributors to facilitate our efforts to arrange for an interview, resulting in an interview with one additional distributor. In addition, we interviewed officials from a state prescription drug monitoring program (PDMP) that collects real-time data, a Bureau of Justice Assistance grant program that supports PDMPs, and a company that operates 44 of the 53 state PDMPs to gain insights on the data they collect. The views of these organizations cannot be generalized to the entire population, but provided important insights and perspectives about suspicious order detection and reporting. We reviewed the data DEA collects to identify possible types of analyses DEA could conduct using ARCOS data to identify unusual patterns. In addition, we reviewed key data governance practices used by organizations and identified through our past work to determine the extent to which DEA has a governance structure in place to manage how it collects and uses data to support diversion control efforts. Additionally, we reviewed the June 2019 Office of Management and Budget Federal Data Strategy which provides a framework of operational principles and practices to help agencies use and manage data. The key practices we identified to compare DEA’s data governance efforts against were: identify data needs to answer key agency questions; provide resources explicitly to leverage assets; prioritize data governance; and support non-federal stakeholders. We selected these practices because they are important to early development of a data governance structure. We also reviewed the February 2019 Data Strategy, released by DOJ, that is to serve as a roadmap for DOJ components to manage their data assets. To understand the extent to which DEA assesses the results of the data it obtains and uses from its ARCOS system and through suspicious order reporting, we reviewed DEA’s performance measures and applicable laws governing performance reporting in the federal government, including the Government Performance and Results Act of 1993 (GPRA), as updated and expanded by the GPRA Modernization Act of 2010 (GPRAMA). Although GPRA and GPRAMA requirements apply to those goals reported by departments (e.g., DOJ), we have previously reported that they can serve as leading practices at other organizational levels, such as component agencies for performance management. We also reviewed related national, DOJ, and DEA strategy documents that are used to communicate diversion control goals and performance. These documents included the 2018 National Drug Threat Assessment and 2019 National Drug Control Strategy, DOJ’s department-wide strategic plan, DOJ Annual Performance Report, DEA’s 360 strategy guide, and DEA congressional budget justification documents. In addition, we evaluated DEA’s performance measures against criteria in Standards for Internal Control in the Federal Government. Furthermore, we reviewed the extent to which DEA defined objectives and outcome-oriented goals, or established measurable performance targets to evaluate the effectiveness of how it obtains and uses data and compared them to GPRAMA requirements, which may serve as leading practices for DEA. To determine what opportunities exist, if any, for DEA to improve its use and collection of industry-reported data, such as using computer algorithms or real-time reporting, we interviewed DEA officials to determine what analytics, if any, DEA is using to detect and identify potential opioid diversion activities. In our interviews with field division offices, we requested information regarding how investigators received suspicious order reports from registrants and how the investigators requested and used ARCOS and other system analysis to conduct or support their investigative work. We also interviewed officials from other entities with opioid diversion prevention responsibilities, such as state level Prescription Drug Monitoring Programs, the Department of Health and Human Services, including the Centers for Medicare and Medicaid Services, and the Department of Justice (DOJ) U.S. Attorney’s Office Opioid Fraud and Abuse Detection Unit. To obtain perspectives of industry stakeholders on how data, such as suspicious orders may be better reported to DEA, we interviewed four industry associations whose memberships include industry stakeholders. We selected these associations based on their roles in representing various DEA registrant communities, such as pharmacists, pharmacies, and distributors. We also reviewed documentation describing the data available to DEA via its ARCOS database, as well as documentation that described examples of unusual patterns of orders. Based on such information, two GAO specialists identified methods that could be implemented using computer algorithms to analyze ARCOS data to identify patterns that might indicate unusual activity. Additionally, these specialists identified related opportunities that DEA could use to analyze ARCOS data combined with data from other sources, such as prescription rate information, to identify these patterns. To address the extent to which DEA collaborates with industry stakeholders to combat opioid diversion, we examined DEA policies and procedures, and interviewed relevant DEA officials, industry associations, and private sector industry members. Specifically, we examined DEA agency-wide directives and guidance, and component management policies and procedures for providing information to industry stakeholders related to industry’s suspicious order reporting requirements, including written communication DEA sent to industry stakeholders related to suspicious order reporting. In addition, DEA officials provided us with a demonstration of SORS, ARCOS, and the ARCOS Enhanced Lookup Buyer Statistic Tool – available to distributors to help them identify and report suspicious opioid orders. We interviewed DEA officials in eight field division offices who interact with industry stakeholders on, among other things, identifying and reporting suspicious orders. These officials provided their perspectives on the usefulness of suspicious order reports to their investigations as well as other industry self-reported data collected in DEA information systems. We interviewed opioid distributors of varying sizes, as noted above, including some of the largest opioid distributors, based on DEA-provided ARCOS data of opioid-related transactions, for their perspectives on the information and tools DEA provides to them, including the Lookup Buyer Statistics Tool and the ARCOS Enhanced Lookup Buyer Statistic Tool. The views of these distributors are not generalizable to the entire population, but provide insights and information on how industry detects and reports suspicious orders through use of ARCOS data and other tools. We conducted this performance audit from January 2019 through January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Timeline of Selected Events and Legislation Impacting or Related to Industry- Reported Data on Prescription Opioids Pub. L. No. 91-513, 84 Stat. 1242 (Title II of the Comprehensive Drug Abuse Prevention and Control Act of 1970, Pub. L. No. 91-513, 84 Stat. 1236). In addition to the contact above, Tonnye’ Conner-White (Assistant Director), Gary M. Malavenda (Analyst in Charge), David Bruno, Jill Center, Billy Commons, Peter DelToro, Kathleen Drennan, Melissa Hargy, Will Horowitz, Hayden Huang, Eric Hauswirth, Susan Hsu, Nicole Jarvis, Benjamin T. Licht, Amanda Miller, and Jan Montgomery all made key contributions to this report.", "summary": "Since 1999, more than 700,000 people have died of a drug overdose in the United States, with about 48,000 dying of an opioid overdose in 2017 alone. The DEA administers and enforces the Controlled Substances Act as it pertains to ensuring the availability of controlled substances, including certain prescription drugs, for legitimate use while limiting their availability for abuse and diversion. The Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act, enacted in 2018 included a provision for GAO to study the reporting of suspicious opioid orders on a real-time basis nationally using computer algorithms. This report examines, among other things, how DEA obtains and uses industry-reported data to identify and address suspicious opioid orders and opportunities for DEA to improve these efforts, such as using computer algorithms or real-time reporting. GAO analyzed program documentation and DEA data, and interviewed DEA and industry officials as well as officials from national associations representing distributors, investigators, state boards of pharmacy, and other federal and state agencies. The Drug Enforcement Administration (DEA) collects industry-reported data on the sale and purchase of controlled substances and prescription drugs, including opioids. It uses these data to support ongoing investigations into the diversion of such substances into the illegal market place and to identify investigative leads for its field division offices. GAO identified deficiencies associated with DEA's drug diversion efforts, including the following: Limited proactive and robust analysis of industry-reported data. While DEA's current data systems are not designed to conduct real-time analysis, and it conducts some analyses of industry-reported data, such as in response to requests from its field division offices, DEA could conduct more analyses using automated computer algorithms to help identify questionable patterns in the data. For example, DEA could analyze data to identify unusual volumes of deleted transactions or unusual volumes of drugs that were disposed of rather than sold. It could also analyze data to identify trends in distribution or drug purchases in a given geographic area. Other analysis DEA could perform is to look for unusual patterns when comparing drug orders in one geographic area with other nearby areas. These analyses could potentially help DEA proactively identify suspicious activities or registrants that may warrant investigation. No data governance structure to manage all drug transaction data. Although DEA has guidance, policies and procedures for the use of some information systems, it has not established a formal data governance structure to manage all data it collects and maintains, which are integral to its diversion control activities. A data governance structure is defined as an institutionalized set of policies and procedures for providing data governance throughout the life cycle of developing and implementing data standards. Industry and technology councils, domestic and international standards-setting organizations, and federal entities endorse the use of a governance structure to oversee the development, management, and implementation of data standards, digital content, and other data assets. While DEA began efforts to develop a governance structure, it is in the early stages of development and does not have additional details or documentation of its efforts. An effective data governance structure could help DEA ensure its important data assets are consistently and fully utilized. GAO is making four recommendations related to DEA's collection and use of industry-reported data. DEA agreed with three of the four recommendations, and neither agreed nor disagreed with the fourth.", "document_type": "gao"}
{"report": "According to FTA’s National Transit Database, about 1,500 rural transit providers, including tribal transit providers, supply vital mobility and connections to essential services for people living in rural communities. Rural transit providers generally have low budgets, few employees, and small vehicle fleets. Rural transit providers provide a variety of transit services, including: demand-response, which is scheduled in response to calls from passengers; fixed-routes, which are buses operating according to a set schedule; and deviated-fixed routes, which are fixed-routes that allow for minor route deviations in response to passenger calls. Service areas for rural providers may span dozens of square miles in remote areas—with long trips and only a few riders at any given time—or be located in smaller, more developed rural areas surrounding major cities. DOT primarily supports rural transportation through formula grants, some of which require states and rural transit providers to coordinate. Specifically, these rural transportation formula grants are apportioned to state departments of transportation based on various factors, and these state agencies then allocate funding to rural transit providers as sub- grantees. Sub-grantees can be regional or local governments, non-profit organizations, or federally recognized tribes, which provide public transit services in their communities. DOT also awards rural transit program funds directly to federally recognized Indian tribes through the Tribal Transit Program. See table 1 for a description of the DOT’s primary formula-grant programs that support rural transit. Within DOT, FTA and its 10 regional offices administer these programs; their responsibilities include: 1. grant funding, including targeted grants and contracts for coordination-related projects to enhance mobility and access nationwide; 2. oversight of state transportation agencies and tribal-transit program grantees through State Management Reviews and Tribal Transit Assessments; 3. training and technical assistance to states and rural transit providers; 4. policy interpretations and development to enhance mobility and access. DOT and FTA also lead the Coordinating Council, which is charged with improving coordination across federal programs that fund transportation services for transportation-disadvantaged persons. The Coordinating Council consists of 11 federal agency members, namely, the departments of Agriculture, Education, HHS, Housing and Urban Development, Interior, Justice, Labor, Transportation, and Veterans Affairs (VA); the National Council on Disability; and the Social Security Administration. Aside from DOT, transportation is not the primary mission of these federal agencies. However, each member agency has programs that provide funding for transportation to enable program beneficiaries to access the various health and human service programs within the agencies’ primary missions, such as job training, education, or medical care. For example, the HHS’s Medicaid program requires assurance from states that Medicaid beneficiaries have access to necessary medical services; this medical service includes arranging and providing funding for transportation to medical appointments and other health services when beneficiaries cannot transport themselves. In 2012, we found, among other things, that Coordinating Council member agencies were not effectively collaborating and recommended that the Coordinating Council strengthen its coordination efforts across federal programs. In 2014, we again identified the need to strengthen federal coordination efforts and recommended that the Coordinating Council develop both a strategic plan and a cost-sharing policy to promote and enhance federal, state, and local nonemergency medical transportation coordination activities. For a full description of our prior recommendations and their implementation status, see appendix II. State and local stakeholders—including state transportation agencies, regional planning organizations, rural and tribal transit providers—and health and human service providers, coordinate rural transportation services when they share resources and responsibilities and plan activities to achieve common goals and for the overall benefit of the community. Coordination of rural transportation services can occur across geographic jurisdictions, funding sources, and various local, state, and federal programs. Coordination of transportation services has the potential to reduce transportation program costs by clustering passengers, using fewer one-way trips, and sharing the use of personnel, equipment, and facilities; at the same time, people in need of transportation also often benefit from greater and higher quality services when transportation providers coordinate their operations. Various factors affect rural transit coordination, according to stakeholders we interviewed, participants from three discussion groups, and literature we reviewed. Factors that can affect coordination include availability of resources, alignment of different federal program requirements, availability of coordinating mechanisms, and the distances between transit providers. (See fig. 1.) As discussed below, we found that these factors are often interrelated and can serve as both a motivating factor and a barrier to coordination. The availability of resources was the most commonly cited factor affecting rural transit coordination in our literature review and interviews. Almost two-thirds of the stakeholders we spoke with (30 of 43) and participants in three discussion groups told us that it is difficult to coordinate transit services in rural communities with limited resources, such as funding, staff and time, and technology. For example, a rural transit provider told us that while it provides public transit to a neighboring national park for its visitors during the summer season, insufficient funding from the national park combined with very limited access to FTA’s rural transit funds limits the providers’ ability to effectively coordinate services. We also reported in 2014 that smaller budgets and fewer employees can influence rural transit providers’ ability to coordinate. A 2018 survey of state and local transit and health and human services providers conducted by the National Center for Mobility Management also noted that the availability of resources can be a key barrier to transportation coordination both in rural and non-rural areas. Resources specifically affecting rural transit coordination include: Availability of Matching Funds. The availability of matching state and local funds can affect coordination, as rural transit providers tend to rely on a variety of funding sources to provide transit services. Federal programs generally require a share of state or local funding to match federal funds. Approximately one-third of selected stakeholders (13 of 43) and participants in three discussion groups said that they face challenges identifying enough state or local funding to meet FTA’s matching fund requirements. Some rural transit providers (4 of 21) told us they have access to funds from different sources, but others (4 of 21) said that they are challenged with securing state or local matching funds. For example, local, regional, or state taxes provide some funding streams for public transit, including rural transit providers, in California, Georgia, New Mexico, and Washington. Although revenues from state or local taxes may be available as a funding source, rural transit providers still told us that identifying and coordinating state and local funding sources can be challenging. We previously reported that constrained state and local budgets can make securing these funds difficult as rural transit competes for funding with other needs within a community, such as public safety. Technology and Coordination: Greater Columbia Call-Center People For People, a rural transit provider in Yakima, Washington, uses technology to coordinate and operate the Greater Columbia 2-1-1 (GC211) call center. GC211 maintains a statewide database of community resources, including transportation options. It is one of the state’s seven regional 2-1-1 call centers that directs riders to social, health, and transportation resources. Staffing and time. Some stakeholders (12 of 43) said that rural transit providers do not have enough staff and time to pursue or engage in coordination efforts. For example, three rural transit providers told us that staff sometimes take on multiple duties, such as bus driver and dispatcher in addition to grant and program manager, duties that affect their time and ability to coordinate. Representatives from a national transit planning association also told us that staffing constraints are an issue, particularly with rural transit providers because they are usually more understaffed than urban transit agencies. Technology. Access to technology can help coordinate trips and schedules across rural transit services. About half of the rural transit providers (11 of 21) we interviewed stated that they use software and other technology to schedule trips and operate call centers to facilitate coordination efforts. For example, People For People, a rural transit provider in Yakima, Washington, uses technology to coordinate and operate the Greater Columbia call-center. (See sidebar). However, a handful of stakeholders (4 of 43) mentioned that access to broadband, which is needed to enable technology and scheduling software, can be limited in certain areas, especially on tribal lands. For example, an official from EBCI Transit, a tribal transit provider in North Carolina, said EBCI experienced poor cell phone service and other communication limitations, which affected its ability to schedule and coordinate trips. Our recent work on telecommunications found that tribal lands have significantly lower levels of broadband internet access relative to the country as a whole. Formal Coordinating Mechanisms: State- and Regional-Coordinating Bodies As one of the regional coordinating bodies, the Southwest Georgia Regional Commission has played a central role in coordinating rural transit services through much of its region; it currently provides public transit services in 13 counties to the general public as well as to riders with specific needs to access health and human services in 14 counties. The availability of coordinating mechanisms can facilitate information sharing and coordination. About half of the stakeholders (18 of 43) told us that they participate in some statewide, regional, or local coordinating bodies as part of a process to facilitate coordination. For example, the Georgia Department of Transportation works with regional commissions to coordinate rural transit throughout Georgia. (See sidebar). In contrast, officials from the North Carolina Department of Transportation told us that the state disbanded its coordinating council, which may be contributing to challenges in providing nonemergency medical transportation services. We previously reported that state and local transportation agencies and aging network organizations used a variety of different mechanisms, such as state-, regional-, and local-planning bodies to coordinate transportation services for older adults. Half of the states we selected (4 of 8) have statewide-coordinating bodies. For example, participants from one discussion group said that state requirements can facilitate coordination when the state statute requires rural transit providers applying for or receiving federal, state, or local assistance to coordinate with other state agencies, including the state’s health and human services department, for funding and services. Rural transit providers also told us that they participate in regional- and local-coordinating bodies. For example, all transit providers in Montana are required to coordinate through local Transportation Advisory Committees that plan and prioritize local transportation needs. About one-third of the stakeholders (13 of 43) and participants in three discussion groups also mentioned knowledge-sharing forums—such as conferences and training organized by state transportation agencies, transit industry associations, and FTA—as mechanisms to facilitate coordination. For example, officials from Pullman Transit told us that these forums, such as the Washington State Transit Association’s annual conference, presented opportunities to share and learn about various federal transportation programs, coordinating efforts, and information on best practices. We and others have reported that transit providers, as well as health and human service providers, may encounter substantial challenges trying to coordinate services across different programs when program requirements do not align. For our current work, about one-third of stakeholders (13 of 43) and participants in three discussion groups told us that they face a wide array of barriers coordinating across differing federal laws, regulations, and program requirements. The different federal program requirements can affect rural transit providers’ ability to coordinate transit services as some federal programs are dedicated to specific groups of riders (e.g., older adults, people with disabilities, and low-income riders) with specific needs; such specification of groups makes it difficult to coordinate trips for different riders. Three rural transit providers stated that it is sometimes difficult to coordinate transportation to medical appointments for “blended riders” (i.e., senior citizens, veterans, and the general public) in one trip. For example, VA’s Highly Rural Transportation Grants require rural transit providers to serve only veterans, while Medicaid’s nonemergency medical transportation funds require serving only Medicaid beneficiaries. Rural transit providers— which provide service to the general public within their service areas—are sometimes challenged with providing an efficient and coordinated transit service for VA or Medicaid beneficiaries to access their programs. FTA and the Coordinating Council’s 2018 Focus Group Report also identified federal program requirements, including trip purpose restrictions, as a barrier for coordination. As discussed later in the report, the Coordinating Council has been charged with addressing this barrier, among others, and is currently examining whether and how federal program requirements could be better aligned. Coordination in rural areas can be both essential and challenging because rural transit passengers often need to travel long distances (e.g., 30-100 miles) to reach critical services, such as doctor appointments or grocery shopping. About a quarter of stakeholders (11 of 43) and participants in two of the discussion groups said that the long distance between transit providers in remote rural communities sometimes makes it difficult to find entities or other providers interested in or able to coordinate. Two rural transit providers also told us they have no neighboring transit provider to coordinate with due to the extremely remote rural locations. For example, an official from Turtle Mountain Transit in North Dakota said it is challenging to coordinate with other neighboring tribal transit providers due to the long distance to the nearest tribal transit provider in Spirit Lake, which is about 100 miles away. Turtle Mountain Transit, like a number of other tribal transit providers, often serves large and fairly remote areas. We previously reported that tribal lands can vary in size, and range from the smallest at less than one square mile to the largest, the Navajo Nation, which is more than 24,000 square miles or the size of West Virginia, and extends into the states of Utah, Arizona, and New Mexico. Despite encountering some of the factors that can make coordination difficult, all rural transit providers we interviewed told us that they currently coordinate trips or schedules with other local or regional stakeholders. Such coordination efforts include establishing common drop-off points or common schedules (21 of 21), coordinating to provide access to health and human services (14 of 21) and using technologies, such as software, to facilitate coordination of transportation (11 of 21). Rural transit providers told us that they coordinate with others because coordinating may help them meet increasing rural-transit service demand and improve service. They mentioned that the benefits of their coordination efforts include: increased ridership or access, cost efficiency or reduced costs, and enhanced quality of services. Examples of coordination cited by our selected rural transit providers are summarized in table 2 below. All of the rural transit providers we interviewed also told us they coordinated across various funding sources or shared other resources with nearby transit providers. The most commonly cited coordination and resource-sharing activities included pursuing funding from several programs and raising local revenue for transit (18 of 21); participating in opportunities to share knowledge, such as training (11 of 21); sharing vehicles and related resources, such as maintenance capabilities (8 of 21); and sharing staff to achieve a common goal (5 of 21). Four of our selected rural transit providers also stated that full consolidation of their transit services across multiple jurisdictions or providers resulted in cost savings. Specific examples of these activities cited by our selected rural transit providers are summarized in table 3 below. As the lead agency of the Coordinating Council, FTA has taken a number of steps in recent years, including those summarized below, to work with other Coordinating Council member agencies to enhance federal interagency coordination. From January 2017 through June 2019, FTA and the Coordinating Council members were involved in more than 90 interagency- coordinating activities, according to the Coordinating Council’s summary of recent activities posted on its website. Coordinating activities included interagency meetings, trainings, and webinars to share information and coordinate interagency efforts that support rural communities and improve transportation access to health and human services. For example, in September 2018, staff from FTA and the Department of Agriculture held a webinar for federal, state, and local officials on the opioid crisis and increasing transportation in rural areas to improve access to treatment centers, the courts, and other services in rural West Virginia. In 2018, FTA and Coordinating Council members engaged in significant efforts to inform the strategic direction of the Coordinating Council. From March through June 2018, FTA and some Coordinating Council members convened a series of focus groups with state and local stakeholders, including transit and health and human services providers to be informed of the current state of transportation services and identify leading practices and barriers to transportation coordination. FTA also obtained input from state and local transit and health and human services stakeholders via a survey that the National Center for Mobility Management conducted from June through November 2018 to identify promising practices, barriers, and challenges around coordinated transportation. Working group efforts under way are addressing some of the challenges facing rural transit providers. For example, the Coordinating Council’s Program Analysis Work Group, which was convened in November 2018, is currently examining all federal programs with transportation funding available and conducting program analyses to determine whether and how federal program requirements could be better aligned. FTA officials stated that the Coordinating Council plans to submit a report to Congress with some proposed changes and recommendations for improved alignment of federal requirements by September 2020. While these coordinating activities are constructive and encouraging steps, the Coordinating Council’s progress has been slow in other key areas. In 2014, we recommended that the Coordinating Council develop a strategic plan and cost-sharing policy to promote and enhance federal, state, and local nonemergency medical transportation coordination activities. In addition, the 2015 Fixing America’s Surface Transportation Act (FAST Act) required the Council to publish a strategic plan by December 2016 that, among other things, identifies a strategy to strengthen interagency collaboration and that develops a cost-sharing policy in compliance with applicable federal laws. The FAST Act also required the Coordinating Council to submit a final report containing the Council’s final recommendations to Congress for enhancing interagency coordination. However, the Coordinating Council did not issue the required strategic plan until October 2019, about 3 years after the 2016 deadline. We are currently evaluating this plan as part of our follow-up on the implementation status of our 2014 recommendations. Regarding the final report to Congress on interagency coordination, FTA officials told us that they plan to submit the final report to Congress by September 2020. Additionally, we previously reported on the long-standing challenge of the Coordinating Council Executive Committee, which is tasked with providing top management direction for the Council, providing limited leadership and guidance that can have a broad effect on rural transportation. Specifically, we reported that the Council Executive Committee had provided limited leadership, had not met since 2007, and had not issued key guidance documents that could promote coordination. Accordingly, we recommended that the Council meet and issue guidance documents. According to FTA officials, the Executive Committee met for the first time since 2007 in October 2019 and issued the strategic plan noted above. As previously mentioned, we will continue following up on our prior recommendations (see app. II). FTA also facilitates coordination of rural transit services by engaging directly with state and local stakeholders, including transit and health and human services providers. FTA has, for example, taken the following actions: It created a website that provides resources and information on planning and coordinating rural transportation services. This website includes a self-assessment toolkit for state and local transportation agencies on “Building a Coordinated Transportation System” and a link to case studies on coordination of state and regional councils. FTA staff provides ongoing training, resources, and technical support to state transportation agencies and transit and human services providers through its three technical assistance centers—the National Rural Transit Assistance Program, the National Aging and Disability Transportation Center, and the National Center for Mobility Management. FTA and its three centers have been disseminating and sharing some coordination-focused information through their websites, training, and conferences. For example, FTA officials pointed us to the National Aging and Disability Transportation Center’s webpage on “Annual Trends Report and Spotlight Series” that posted best practices information on a non-profit agency that recruits and uses volunteers to transport older adults to social outings and medical appointments. FTA also annually awards competitive grants for innovative, coordinated health and transportation programs. For example, FTA awarded approximately $9.6 million in fiscal year 2019 to 37 projects that were selected as innovative projects for the transportation of disadvantaged populations that are designed to improve the coordination of transportation services and nonemergency medical transportation services. FTA has also bi-annually recognized rural transit providers with an FTA Administrator’s Award for outstanding rural-transit programs, selected in part based on coordination efforts. FTA officials told us that recipients of this award are expected to share their successful practices at the National Rural Transit Assistance Program conference, which is attended by many rural transit providers. Although FTA has a number of efforts under way to facilitate coordination, we identified limitations with FTA’s current communication and information sharing approach. More than a third of the stakeholders we spoke with (16 of 43) stated that communication and information sharing on coordination opportunities from FTA have been limited. FTA officials told us that they disseminate and share some coordination-focused information through its three technical assistance centers, training, conferences, and regular meetings with state transportation agencies as its direct grantees and transportation industry associations. However, about a quarter of the stakeholders (11 of 43) and participants in one discussion group told us that while they have attended FTA trainings and conferences and have used FTA’s technical centers, the focus has been on grant management issues, such as compliance with drug and alcohol policy and procurement, and not on coordination opportunities. Stakeholders stated that they wanted more information on: ways to coordinate with other providers, how providers addressed coordination challenges, technologies that were used to facilitate coordination, and any quantifiable data and results on coordination. Additional information on leading coordination practices that FTA can share with stakeholders include those that we previously identified, such as defining and articulating a common outcome that agencies can engage in to sustain coordination efforts. In December 2014, we recommended that FTA and the Coordinating Council collect data to track and measure progress in achieving results, including the extent of coordination efforts under way. FTA officials told us that the Council’s recent adoption of their strategic plan includes goals and objectives that represents progress toward measuring the extent of coordination efforts at the federal level. FTA officials also told us that the Council’s final report to Congress that will be submitted in September 2020 will report on the implementation status of the objectives in the strategic plan. We have previously reported on the importance of information sharing on coordination across federal, regional, state, and local government entities. Office of Management and Budget guidance on using information as a “strategic resource” notes that making federal information “discoverable, accessible and useable” can fuel innovation. Further, according to Standards for Internal Control in the Federal Government, agencies should communicate necessary and quality information externally so that external parties can achieve their objectives and periodically evaluate methods of communication, so that the agency has the appropriate tools to communicate quality information with external parties on a timely basis. FTA, however, has not clearly communicated and conveyed information on coordination opportunities and leading practices. For example, while FTA officials told us that they rely on their website to share information with stakeholders, more than a third of the stakeholders (17 of 43) told us that information on coordination opportunities and leading coordination practices are not clearly identifiable on FTA’s website or easily accessible. Two stakeholders, for example, said that while locating program requirement information, such as on procurement, was fairly easy, it was difficult to locate coordination-related information. An official from a transit industry association also commented that “stakeholders would benefit if FTA and the technical assistance centers make coordination resources and training more visible on their websites.” This visibility could include “having coordination as a standalone topic and/or creating a page(s) dedicated to coordination on their websites.” We also determined that coordination-related information was fragmented on FTA’s website and found it difficult to navigate FTA’s website to find leading practices information on coordination. For example, FTA officials referred us to its website on FTA’s Access and Mobility Partnership Grant (also known as the Innovative Coordinated Access and Mobility Grant) for information on leading practices for transportation coordination. In our review of this website, we found a description of projects that FTA selected for the grant, the grant amount, and how the funds will be used. We could not identify any information specifically on how these projects identified opportunities to coordinate or exhibited leading coordination practices. We also examined FTA’s website that provides a self- assessment toolkit for building a coordinated transportation system, as we previously mentioned. FTA officials also mentioned that they developed the Coordination Council’s webpage to present information targeted to coordination. FTA does not have a strategy for communicating and sharing information on coordination opportunities and leading coordination practices for its wide audience of rural and tribal providers, state transportation agencies, and other stakeholders. FTA officials told us that they develop individualized communication plans when they undertake any major activities and examine an approach to communicating and sharing information when they develop annual statements of work for their three technical centers and meet with stakeholders. However, FTA could not provide us with a documented strategy that outlines how it communicates and shares coordination-focused information with state and local stakeholders. In light of the multiple means by which FTA and the Coordinating Council are attempting to communicate information about coordinating rural and tribal transit services, a comprehensive plan or strategy that assesses what information state, local, and transit providers would benefit from receiving and how that information can be effectively communicated could help FTA’s information-sharing efforts have their intended effect. Without such a strategy, stakeholders are without valuable information that could aid them in identifying potential coordination opportunities, leading practices, and data to help inform and facilitate their coordination efforts. Coordination is important to help state transportation agencies, rural transit providers, and human health and service providers meet the increasing needs of those who rely on rural transit systems, particularly in light of limited resources. FTA has taken a number of steps to enhance and facilitate coordination, including having interagency meetings, trainings, and webinars to coordinate interagency efforts that support rural communities and improve transportation access to health and human services. Going forward, it will be critical for the Coordinating Council’s Executive Committee to implement our prior recommendations on key coordination issues. In addition, although FTA, along with its three technical centers, has developed resources to facilitate coordination, its communication efforts have fallen short. Without a communication strategy to effectively reach state and local stakeholders, FTA is missing opportunities to enhance communication and information sharing that can improve coordination among state transportation agencies and rural and tribal transit providers. The Administrator of FTA should develop a communication plan that will effectively share information with state transportation agencies and rural and tribal transit providers on coordination opportunities and leading coordination practices in an accessible and informative way. (Recommendation 1) We provided a draft of this report to the Department of Transportation (DOT) and Department of Health and Human Services (HHS) for review and comment. DOT provided written comments, which are reproduced in appendix III and summarized below. DOT and HHS also separately provided technical comments, which we incorporated as appropriate. In written comments, DOT partially concurred with our recommendation. DOT provided examples of its communication efforts with stakeholders on coordination opportunities and practices and highlighted two recent initiatives to further support the coordination of rural transportation services. For example, in October 2019, DOT established the Rural Opportunities to Use Transportation for Economic Success (ROUTES) initiative to enable better coordination among agencies to address underserved rural areas and to collect input from stakeholders on the benefits rural transportation offers for safety and economic outcomes. In partially concurring with our recommendation, DOT wrote that it plans to direct each of its technical assistance centers to reorganize its web pages to centralize coordination information and best practices. We acknowledge FTA’s efforts and highlighted the progress FTA has made in communicating and facilitating coordination in this report. We noted that FTA has provided ongoing training, support, and resources through its technical assistance centers. While DOT’s plans to have its technical assistance centers’ web pages reorganized may help in communicating coordination opportunities with stakeholders, they fall short of a comprehensive communication plan. Such a plan would define a strategy for effectively communicating and sharing information with stakeholders and ensuring that methods of communication are reaching all intended stakeholders. Among other things, FTA’s plans to increase access to coordination information does not include reorganizing and centralizing coordination-related information on FTA’s web pages, a strategy that is different from these technical centers’ web pages and one where many stakeholders can turn to and search for communication and information. We believe that a comprehensive communication plan that includes FTA’s strategy for ongoing communication on coordination opportunities would enable FTA to ensure that coordination information is reaching intended stakeholders to inform them of opportunities to enhance rural transit services. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact at me (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. Appendix I: Rural Transit Stakeholders GAO Interviewed and Discussion Group Participants Industry groups Community Transportation Association of America National Association of Development Organizations National Association of Regional Councils National Center for Mobility Management National Rural Transit Assistance Program Small Urban, Rural and Tribal Center on Mobility Federal Transit Administration (FTA) Regional Office FTA Region IV ^ State transportation agencies Caltrans - California Department of Transportation New Mexico Department of Transportation North Carolina Department of Transportation North Dakota Department of Transportation Washington State Department of Transportation Rural transit providers (including tribes’ names, where appropriate) Carlsbad Municipal Transit System CSKT Transit (Confederated Salish and Kootenai Tribes of the Flathead Reservation) * EBCI Transit (Eastern Band of Cherokee Indians) *^ Missoula Ravalli Transportation Management Association ^ Morongo Transportation Department (Morongo Band of Mission Indians) * North Central Regional Transit District Pueblo of Santa Clara, New Mexico * Rocky Boy’s Transit (Chippewa Cree Indians of the Rocky Boy’s Reservation, Montana)* Southeast Tennessee Human Resource Agency ^ Turtle Mountain Transit (Turtle Mountain Band of Chippewa Indians of North Dakota) * Williston Council for the Aging Legend: * = Recipient of FTA’s Tribal Transit Program funding. ^ = Site visit to interview stakeholder. State transportation agencies Mississippi Department of Transportation VTrans - Vermont Agency of Transportation Rural transit providers (including tribe names, where appropriate) Big Woods Transit (Bois Forte Band (Nett Lake) component of Minnesota Chippewa Tribe, Minnesota) Center for Community the RIDE (Sitka Tribe of Alaska) * Choctaw Tribal Transit (The Choctaw Nation of Oklahoma) * Heart of Iowa Regional Transit Agency Hualapai Transit (Hualapai Indian Tribe of the Hualapai Indian Reservation, Arizona) * Oglala Sioux Transit (Oglala Sioux Tribe) * Salt River Transit (Salt River Pima-Maricopa Indian Community of the Salt River Reservation, Arizona) * Legend: * = Recipient of FTA’s Tribal Transit Program funding. In addition to the individuals named above, Heather MacLeod (Assistant Director); Jennifer Kim (Analyst-in-Charge); Matthew Bond; Delwen Jones; Rosa Leung; Theresa Lo; Anna Maria Ortiz; Cheryl Peterson; Malika Rice; Kelly Rubin; Pamela Snedden; Lisa Van Arsdale; and Sarah Veale made key contributions to this report.", "summary": "Public transportation in rural areas is critical to connecting people to medical services, jobs, education, and shopping. FTA allocated about $2.1 billion in formula grants over the last 3 years to support rural and tribal transit. In 2014, GAO reported that providing transit services in rural areas can be challenging and that coordination of transportation services among federal programs is limited. GAO was asked to examine ongoing efforts and challenges of coordinating rural transit systems. This report addresses (1) factors affecting rural transit coordination and selected rural and tribal transit providers' coordination efforts and (2) the extent to which FTA facilitates coordination of rural transit services. GAO reviewed program documentation and literature on rural transit coordination. GAO also interviewed federal officials from FTA and the Department of Health and Human Services, which also funds transportation services, and rural transit stakeholders, including state transportation agencies, rural and tribal transit providers, and public transit industry groups. GAO selected states and rural and tribal transit providers based on federal-funding levels and geographic representation, among other factors. Coordination of rural transportation services across geographic jurisdictions and federal- and state-funding sources has the potential to reduce costs and improve services. Such coordination by transit agencies in rural areas can lead to efficiencies. A variety of factors, however, adversely affect rural transit coordination, including the availability of resources, according to GAO's literature review and stakeholder interviews. About 70 percent of the selected stakeholders GAO interviewed, including rural and tribal transit providers, explained that it is difficult to coordinate transit services in rural communities with limited resources, such as funding, staff, and technology. For example, three rural transit providers said that program managers sometimes assume multiple duties, such as a driver and dispatcher, a practice that affects their time and ability to coordinate. Other cited factors included the extent to which different requirements of federal programs that fund rural transit are aligned to allow transit providers to coordinate trips for riders with specific needs (e.g., people with disabilities) and the availability of coordinating mechanisms, among other factors (see figure). Nonetheless, selected rural and tribal transit providers said they were engaged in various coordination efforts to improve rural transit services. The most commonly cited efforts under way included coordinating trips—for example, by establishing convenient drop-off points—and sharing resources. The Federal Transit Administration (FTA) has several efforts under way to facilitate coordination, but results are mixed. At the federal level, FTA and the federal interagency Coordinating Council on Access and Mobility issued a strategic plan in October 2019, outlining their strategic goals. However, they have yet to submit to Congress a final report containing recommendations for enhancing interagency coordination. FTA officials told us they plan to submit the report by September 2020. At the state and local level, FTA has provided technical support to stakeholders to faciliate coordination. GAO, however, found limitations with FTA's current information-sharing approach. These limitations make information on coordination-related issues difficult to identify and access. Stakeholders want additional information from FTA on leading coordination practices, such as ways to coordinate with other providers. Improving communication and sharing additional coordination-related information could help rural and tribal transit providers identify additional coordination practices they could pursue to improve rural transportation services. GAO recommends that FTA develop a communication plan that will effectively share information with state and local stakeholders on coordination opportunities in an accessible and informative way. FTA partially concurred with the recommendation. As discussed in the report, GAO continues to believe the recommendation is warranted and should be fully implemented.", "document_type": "gao"}
{"report": "The United States has more than 19,000 airports, which vary substantially in size and the type of aviation services they support. Of these, roughly 3,300 airports are designated by FAA as part of the national airport system and are therefore eligible for federal assistance for airport capital projects. The national airport system consists of two primary types of airports—”commercial service” airports—which are publicly owned, have scheduled service, and board at least 2,500 or more passengers per year—and “general aviation” airports—which have no scheduled service and board fewer than 2,500 passengers. Federal law divides commercial service airports into various categories of airports, based on the number of passenger boardings, ranging from large hub airports to commercial service non-primary airports (see fig. 1). Consistent with our prior work, we have grouped airports into two broader categories: larger airports, which includes large and medium hubs, and smaller airports, which includes small hubs, non-hubs (also referred to as “non-hub primary”), and non-primary commercial service airports as well as reliever airports, general aviation airports, and new airports. The majority of passenger traffic is at larger airports, which accounted for 88 percent of all commercial airport enplanements in 2017. From 2013 to 2017, enplanements have increased at airports of all hub sizes. Specifically, commercial airport enplanements at larger and smaller airports increased by 16 percent and 15 percent, respectively, during this time period. National system airports are eligible to receive federal funding from AIP grants for infrastructure development. AIP funds are first authorized in FAA reauthorization acts, and Congress then appropriates funds for AIP grants from the Airport and Airway Trust Fund, which is supported by a variety of aviation-related taxes, such as taxes on tickets, cargo, general aviation gasoline, and jet fuel. While AIP grants are an important source for airports’ infrastructure funding, the amount of funding authorized for the AIP grant program has not changed since 2012. In 2018, Congress passed the FAA Reauthorization Act of 2018, which authorized annual AIP grant levels at $3.35 billion annually through fiscal year 2023 and authorized additional amounts for supplemental discretionary funding each year from 2019 through 2023, starting at $1.02 billion and increasing each year thereafter. In addition, the Consolidated Appropriations Act of 2018 appropriated $1 billion in supplemental annual funding from the general fund for the AIP discretionary grant program. Subsequently, in February 2019, the Consolidated Appropriations Act of 2019 provided $500 million from the general fund to the AIP discretionary grant program. The distribution of federal AIP grants is complex. It is based on a combination of formula funds—also referred to as entitlement funds—that are available to national system airports, and discretionary funds that FAA awards for selected eligible projects. Entitlement funds are apportioned by formula to airports and may generally be used for any eligible airport improvement or planning project. Discretionary funds are approved by FAA based on FAA selection criteria and a priority system, which FAA uses to rank projects based on the extent to which they reflect FAA’s nationally identified priorities. AIP grants must be used for eligible and justified projects, which are planned and prioritized by airports, included in their capital improvement plans, and reviewed and approved by FAA staff and the Secretary of Transportation. Generally, most types of airfield improvements—such as runways, lighting, navigational aids, and land acquisition—are eligible for AIP funding. AIP-eligible projects for airport areas serving travelers and the general public—called “landside development”—include entrance roadways, pedestrian walkways and movers, and common space within terminal buildings, such as waiting areas. See figures 2 and 3 for more information about the types of projects eligible for AIP funding. For all AIP-funded projects, the airport must provide a share of matching funds. The federal share is from 75 to 95 percent depending on the size of the airport or type of project. Revenue from PFCs is another means of support for airport infrastructure projects. PFCs are federally authorized fees which were established in 1990 to help pay for infrastructure at commercial service airports. Although PFCs are local funds subject to the airport’s control, FAA oversees the PFC program and approves applications by airports to collect PFC revenues. PFCs are currently capped at $4.50 per flight segment with a maximum of two PFCs charged on a one-way trip or four PFCs on a round trip, for a maximum of $18 total. On behalf of the airports, airlines collect the PFC at the time of the ticket purchase and remit the PFC, minus an administrative fee, to the airport. To meet future planned infrastructure costs, airports have sought an increase in the cap on PFCs. However, airlines oppose a PFC increase because they believe airports already receive sufficient PFC revenues and that higher ticket prices could reduce passenger demand and airline revenues. We have previously reported that increasing the PFC cap would significantly increase PFC collections available to airports under three scenarios GAO modeled but could also marginally slow passenger growth and growth in revenues to the Airport and Airway Trust Fund (AATF). Airports have more flexibility in using PFCs to fund infrastructure projects as compared to AIP funding. Airport infrastructure projects eligible for PFC funding must meet one or more of the following: preserve or enhance safety, security, or capacity; reduce noise or mitigate noise impacts; or increase air carrier competition. Airports are able to fund projects with PFC revenues that might not be eligible for AIP funding, such as passenger terminal projects and development at gates, airline ticketing areas, and passenger check-in facilities at hub airports. In addition to being applied to FAA approved eligible projects, PFCs can be used as a match for AIP grants or to finance the debt on approved projects. FAA and ACI-NA each produce reports summarizing 5-year estimates of U.S. airports’ infrastructure project costs. More specifically, FAA is required to publish a 5-year estimate of AIP-eligible development every 2 years. FAA provides this information in its NPIAS report. FAA relies on airports, through their planning processes, to identify individual AIP- eligible projects for funding consideration and inclusion in the NPIAS. The ACI-NA also collects data on all proposed capital development projects at U.S. airports and every 2 years publishes a report of U.S. airports’ 5-year infrastructure cost estimates. From fiscal years 2013 through 2017, national system airports received an annual average of about $15 billion in funding from a variety of sources for infrastructure development projects, including: federal AIP grants (about $3.2 billion annually); airport revenue from passenger charges (about $3.1 billion annually), and airport-generated revenue (about $7.7 billion annually); and capital contributions (about $715 million annually). These figures, however, do not represent the full amount of funding that is available to airports for infrastructure development. For example, some airports also received funding from state grants and bond proceeds through debt financing to fund airport infrastructure investments. In addition, the proportion of funding that larger and smaller airports received from these sources varies. From fiscal years 2013 through 2017, the total amount of AIP grants that national system airports received has generally remained constant. As shown in figure 4 below, the amount of AIP grant funding that airports received ranged from $3.1 billion to $3.3 billion annually for fiscal years 2013 through 2017. Overall, airports received an average of $3.2 billion annually in AIP grants. The total amount of AIP grant funding that FAA allocates to airports may vary slightly year to year for many reasons. For example, according to FAA, each year a small amount of AIP funding is returned from prior-year grants and the FAA is permitted to re-obligate those funds on either existing or new grants. Collectively, smaller airports received more AIP grant funding compared to larger airports during this time period. As shown in figure 4, from fiscal years 2013 through 2017, smaller airports received the largest share of AIP grant funding, approximately 75 percent, (an annual average of $2.4 billion), compared to 25 percent received by larger airports (an annual average of $812 million). Larger airports are generally able to rely on other sources of revenue generated from airport-generated revenue and PFCs due to higher enplanements compared to smaller airports. In addition, the amount of AIP grants’ funding that smaller hub airports received increased by about 10 percent between fiscal years 2013 through 2017, while the amount of AIP’s funding for larger airports decreased by 3 percent in the same time period. However, smaller airports receive less funding per AIP grant compared to larger airports. For example, smaller airports received an average of $897,000 per grant, while larger airports received an average of $5 million per AIP grant. Some airports also received state funding, primarily in the form of grants used as matching funds for federal AIP grants. Data for fiscal years 2013 through 2017 on states’ grant funding are not available. However, in 2015, we conducted a survey of airports, in collaboration with NASAO, for fiscal years 2009 through 2013, and reported that states provide an annual average of $477 million to national system airports. According to NASAO officials we interviewed for our current work, states’ grant-funding levels have remained unchanged. From fiscal years 2013 through 2017, airports collected revenue from a variety of sources, including PFC charges and airport-generated revenue (both aeronautical and non-aeronautical), which have both increased during our 5-year time period. Some airports also received funding from capital contributions, but that amount has decreased from fiscal year 2013 through 2017. Airport revenue is the largest source of funding for larger airports. Specifically, larger airports generated an annual average of $10.4 billion in airport revenue (or 90 percent of all airport revenue) during our 5-year time period. Smaller airports generated less airport revenue, with an annual average of $1.2 billion (or 10 percent of all airport revenue), compared to larger airports. Larger airports’ ability to generate more airport revenue reflects that PFCs and airport-generated revenue could be driven by the higher levels of passenger enplanements and airline activity associated with current economic conditions. According to FAA officials, while total airport revenue has increased over this time frame, it does not necessarily mean that airports have more revenue available for new capital expenditures. For example, airport revenue is also used to pay for existing debt service and operating costs, which according to FAA officials, has also increased during this time period. Overall, from fiscal years 2013 through 2017, U.S. airports collected an annual average of $3.1 billion in PFC revenue. As shown in figure 5, during this period, the annual average for PFC collections for all airports increased by 9 percent from $3 billion to $3.3 billion. Because PFCs are generated by the number of enplaned passengers, this increase was mostly driven by a 16 percent increase in passenger enplanements during this period for both smaller and larger airports. As shown in figure 5, larger airports collected most (89 percent) of the PFC revenues in fiscal years 2013 through 2017. In addition, although both larger airports and smaller airports experienced an increase in passenger enplanements in fiscal years 2013 through 2017, larger airports experienced a 10 percent increase in PFC revenue while smaller airports experienced an overall decrease in PFC revenue during this period of about 3 percent. According to FAA officials, smaller airports may have experienced an overall decrease in PFC revenues because airports’ PFC collections may cease when they have fully collected the approved amount for a project. According to FAA, this cessation is particularly true for smaller airports that do not have multiple projects for which PFC collections have been approved for a long period of time. In addition, if an airport has approved collections but one or more airlines make significant reductions in activity levels, this factor can also slow the rate of collections at airports. Larger airports hold a larger market share of flights, representing 88 percent of enplanements. Ratings agency representatives said that larger airports rely more on PFCs and bonding to fund infrastructure projects. From fiscal years 2013 through 2017, U.S. airports generated an annual average of $7.7 billion in airport-generated revenue. During this period, airport-generated revenue increased 18 percent, from $7.1 billion to $8.4 billion for all airports. Overall, both larger and smaller airports generated more income over this time period, with larger airports generating substantially more revenue compared to smaller airports. Specifically, from fiscal years 2013 through 2017, larger airports generated an annual average of $7.1 billion in revenue, and smaller airports generated an annual average of $567 million in revenue. Airport-generated revenue consists of both “airside” aeronautical revenues derived from the operation and landing of aircraft, passengers, or freight, as well as “landside” non-aeronautical revenues derived from terminal concessions and parking fees. Of the $103 billion in airport- generated revenue over our 5-year time period, 54 percent came from aeronautical revenues and 46 percent came from non-aeronautical revenues (see fig. 6). Commercial service airline rates and charges— which include passenger airline’s landing fees and passenger arrival fees, rents, and utilities—made up 75 percent of the total $55.9 billion in aeronautical revenue. The remainder came from a variety of other fees and taxes paid by airlines, general aviation, the military, and other aeronautical sources. Of the non-aeronautical revenues, parking and ground transportation accounted for the greatest portion (41 percent), followed by rental cars operations revenue (19 percent). Aeronautical revenues increased by 11 percent and non-aeronautical revenues increased by 16 percent over the time period. Capital contributions for airport infrastructure projects make up a small amount of funding in comparison to other sources, such as airport- generated revenue and AIP funding. These contributions—made on an individual project basis—may be provided by an airport’s sponsor (often a state or municipality) or by other sources such as an airline. According to FAA data on commercial airports’ annual financial reports for fiscal years 2013 through 2017, commercial airports received an annual average of $715 million in capital contributions. Of this amount, $471 million, or 66 percent, went to larger airports, and $244 million, or 34 percent, went to smaller airports. The amount of capital contributions varies by year and by hub size. According to FAA officials, the sources of capital contributions funding (i.e., airport sponsor, state, air carriers, or other airport users) vary depending on the type of project and funds available. Airports can also obtain financing for airport infrastructure projects by issuing bonds. Airport bonds entail leveraging future funding to pay for projects. This financing mechanism enables airport authorities to borrow money up front to finance infrastructure projects; this money can then be paid back with interest over a longer time period. U.S. airports may qualify for tax-exempt bonds to support airport projects for federal tax purposes because the airports are owned by states, counties, cities, or public authorities. The tax-exempt status enables airports to issue bonds at lower interest rates than taxable bonds, thus reducing a project’s financing costs. FAA officials said that because airports use some PFCs and airport-generated revenue to pay off debt service, not all revenue generated from these two sources is available for additional infrastructure investment. FAA collects data in its financial reporting database of an airport’s total indebtedness. Based on our analysis of this data, from fiscal years 2013 through 2017, airports had averaged $84.6 billion in total bond debt per year. The total indebtedness measure provides an overall aggregate of the level of long-term bond debt held by airports for the year. FAA’s data do not differentiate indebtedness for each type of bond, nor do its data differentiate between existing, new, or refinanced bonds. As a result, we were not able to analyze how much airports obtained on average for new projects by issuing bonds from fiscal years 2013 through 2017. In addition, we were not able to determine whether U.S. airports borrowed increasing amounts of new bond proceeds from fiscal years 2013 through 2017 to meet infrastructure needs. Moreover, FAA does not collect data on the time frame that airports anticipate to pay back bonds, as FAA officials said that airports have the latitude to determine their own debt- payment schedules. During fiscal years 2013 through 2017, larger airports received the vast majority of bond proceeds, representing 95 percent of the total (see fig. 7). This amount includes debt from all long-term bonds. We previously reported that bond financing has traditionally been an option more commonly exercised by larger rather than smaller airports because they are more likely to have a greater and more certain revenue stream to support debt repayment. We have also reported that when smaller airports issue bonds, they make greater use of general obligation bonds that are backed by tax revenues of the airport sponsor, which is often a state or municipal government. FAA officials added that larger airports tend to issue airport revenue bonds, which are backed solely by airport revenue, while some smaller airports may be able to benefit from bond proceeds issued by the broader county or municipal government and backed by that entity's taxing authority. Based on our analysis, airports’ planned infrastructure costs are projected to average $22 billion annually for fiscal years 2019 through 2023. To arrive at this estimate, we combined FAA’s $7 billion estimate of AIP- eligible planned infrastructure costs and ACI-NA’s $15 billion estimate of planned infrastructure costs for projects that are not eligible for AIP grants. Our $22 billion estimate would represent an increase of 19 percent from FAA’s and ACI-NA’s fiscal years 2017 through 2021 infrastructure cost estimates. This increase is largely driven by an increase in ACI-NA’s estimate of AIP-ineligible planned projects. Specifically, ACI-NA’s annual average of about $15 billion in planned AIP- ineligible costs reflects an increase of $3.3 billion or 28 percent when compared to the annual average estimate of AIP-ineligible projects from ACI-NA’s fiscal year 2017–2021 estimates. Similarly, FAA’s annual average of $7 billion in planned AIP-eligible costs reflects an increase of $289 million or 4 percent from FAA’s fiscal year 2017–2021 estimates. A variety of factors may be contributing to the increase in FAA’s and ACI- NA’s cost estimates, factors that we will discuss later in the report. Overall, larger airports (large and medium hub) accounted for 75 percent of the $22 billion annual cost estimate and make up a greater percentage of the estimated increase in planned development costs when comparing the fiscal years 2017 through 2021 and fiscal years 2019 through 2023 estimates. For example: Among planned AIP-eligible projects, estimated annual planned- development costs increased from $1.4 to $1.7 billion (an 18 percent increase) for large hub airports and from $641 to $735 million (a 15 percent increase) for medium hub airports, according to FAA’s cost estimates. By comparison, estimated planned development costs for small hub and non-hub airports decreased by 3 and 2 percent respectively over the same time period. Among AIP-ineligible projects, ACI-NA estimates show that annual planned development costs increased more significantly for medium hub airports. Specifically, ACI-NA’s report shows that annual planned development costs for AIP-ineligible projects increased by 22 percent for large hub airports, 71 percent for medium hub airports, and 29 percent for small hub airports. ACI-NA representatives stated that the increase in medium hub airport’s planned development (for both AIP-eligible and AIP–ineligible projects) is due to the underinvestment at medium hub airports in prior years. Specifically, ACI-NA representatives stated that in response to the loss of air service immediately following the 2007–2009 recession, some medium hub airports scaled back their capital investments. ACI-NA representatives stated that as passenger traffic has recovered with economic growth, medium hub airports are now investing in previously deferred improvements. According to ACI-NA’s report on airports’ capital development needs for 2019–2023, medium hub airports–such as Austin- Bergstrom International Airport (Austin airport), Norman Y. Mineta San Jose International Airport, and Dallas Love Field Airport–are undertaking major infrastructure improvement programs. According to officials from Austin airport, the airport recently completed a 10-year plan for its capital development program, with an estimated cost of $3.5 billion, for a new terminal, concourse, airfield improvements, runway improvements, and improved landside access. Austin airport officials stated that the airport is 20 years old and nearing the end of its lifecycle, and airport officials are trying to manage aggressive growth while rebuilding the airport. The sources of funding and types of infrastructure projects that smaller and larger airports have planned also differ. For example, smaller airports have more AIP-eligible planned costs compared to larger airports, according to FAA cost estimates. Specifically, smaller airports accounted for about $4.6 billion (or 66 percent) of AIP-eligible project costs for all airports but, according to ACI-NA cost estimates, only $878 million (6 percent) of AIP-ineligible projects. In addition, among AIP-eligible projects, while the top four types of infrastructure projects that larger and smaller airports have planned are similar (see table 1), estimated costs are more concentrated among the top two project-type categories for smaller airports. Specifically, reconstruction projects, which are projects to replace or rehabilitate airport facilities such as runways, and projects to meet FAA standards for airport design represented about 79 percent of smaller airports’ AIP-eligible estimated project costs. ACI-NA’s data do not break out AIP-ineligible project costs by project type. As a result, we were not able to determine what types of projects constitute the largest shares for AIP-ineligible project costs. However, ACI-NA does provide information about project type across all the projects in its cost estimate. According to ACI-NA’s representatives, the types of projects that are generally not funded with AIP grants that airports need to fund include landside projects, such as terminal projects; rental car and parking facility projects; concession redesign projects; and airport access projects. The increase in planned infrastructure costs for fiscal years 2019 through 2023 can be attributed in part to an increase in planned terminal projects during this 5-year time period. Specifically, both FAA’s and ACI-NA’s cost estimates show an increase in planned terminal projects. For example, according to FAA’s estimates of planned projects funded by AIP grants, terminal projects now represent the third largest share of total estimated costs from fiscal years 2019 through 2023 and experienced the greatest percentage increase over the previous 5-year period. As shown in table 2, overall annual average cost estimates for terminal projects increased by 51 percent between the two periods. Environmental projects was the only other project category that had significant increases (about 38 percent), while estimated costs for many other types of projects decreased. According to FAA officials, the increase in environmental projects is due to increases in environmental-related NPIAS costs (such as mitigation of development impacts and costs for environmental studies) at large and medium hub airports and additional noise mitigation at hub airports. Similarly, according to ACI-NA’s analysis, for fiscal years 2019 through 2023, terminal projects represented 53 percent of the total infrastructure- development costs among both AIP-eligible and AIP-ineligible projects. Terminal projects included terminal building projects (37 percent) and projects to provide access to the terminal (16 percent). FAA and ACI-NA representatives stated that terminal projects can be more expensive than other types of projects because of the scale of these improvements. For example, terminal projects may involve complex vertical construction, an array of special systems such as baggage and passenger screening systems, and integration of security and access control systems, all of which can contribute to the overall higher cost of these projects. In contrast, runway and airfield infrastructure generally rely on common design standards and standard construction methods according to ACI- NA representatives. Additionally, officials from most (16 out of 19) of the airports that we spoke to stated that they are planning terminal improvement projects over the next 5 years. Officials from these airports told us they are focused on making terminal improvements because existing terminals are aging and in need of repairs and to accommodate an increase in passenger enplanements due in part to airlines using larger aircraft holding more passengers. Examples of planned terminal projects at selected airports and factors contributing to these investments are below. Large hub airport terminal project. Officials from a large hub airport that we spoke to stated that they have two ongoing major terminal projects. The first project will expand and renovate the airport’s north terminal. The 468,000-square-feet facility will include a new upper- level mezzanine, seismic upgrades, and an upgraded baggage- handling system, among other improvements. According to airport officials, capacity constraints and the age of the terminal were factors for renovating the terminal. Phase 1 of the project began in February 2017 and was completed in mid-2019. As of July 2019, nine gates are operational. The second phase of construction is expected to be completed in mid- 2021. The estimated cost of the project is projected at $658 million. The airport is also developing a new international arrivals facility at its airport. According to airport officials, this facility is intended to significantly enhance the international passenger experience, and improve the arrival process for international passengers without adding new gates. Airport officials stated that the current facility is not able accommodate the city’s growing demand for international travel. The facility is estimated to cost about $968 million and is expected to open in the fall of 2020. Medium hub airport terminal project. According to officials from a medium hub airport, growth in passenger traffic is driving the need for a new terminal at that airport. International traffic at the airport has tripled between 2012 and 2017, with airlines adding three new service destinations to Europe. According to airport officials, the existing terminal will soon reach its capacity to handle international arrivals, and the first phase of the terminal project was substantially completed in 2019 and cost about $350 million. Small hub airport terminal project. Officials from a small hub airport stated that airlines have started replacing existing aircraft with larger aircraft, and this process has placed capacity constraints at their terminal. The terminal was built in 1948, and the passenger waiting area was built in the 1960s when airlines providing service to the airport were using aircraft with 100 seats. Now, however, airlines are using larger aircraft, which can accommodate up to 180 seats. Airport officials stated that they are beginning construction of a new terminal, which will expand passenger capacity at the airport. The overall estimated costs of the terminal project are $513 million, and the project is expected to be completed in 2028, pending additional funding. FAA officials and ACI-NA representatives agreed that the increased focus on terminal projects is due in part to airlines changing their business models and aircraft fleets and an increase in passenger traffic. The officials stated that as part of the industry’s fleet rationalization efforts, airlines are eliminating some smaller aircraft and replacing them with larger aircraft to increase passenger-seating capacity. FAA officials added that passenger growth at large and medium hub airports is also contributing to the increase of AIP-eligible terminal costs, as airports need to expand terminals to add capacity. According to FAA, terminal projects at large and medium hubs are generally funded through PFCs and other funding sources rather than through AIP funding. For its 2019–2023 NPIAS report, however, FAA officials said they asked airports to provide information about AIP-eligible projects regardless of whether they were planning to apply for AIP funding for the projects. According to FAA officials, this factor may also have contributed to the apparent increase in AIP-eligible terminal costs. According to FAA, another factor driving the increase in terminal costs is that seven airports have planned major terminal projects over the next 5 years. The costs of these projects are reflected in FAA’s AIP-eligible cost estimate. In addition to an increased focus on terminal projects, FAA officials, ACI- NA representatives, and selected airports cited other factors that are contributing to an increase in infrastructure costs estimates, such as increased construction costs, an overall healthier economy, increased traffic, airline consolidation, and airlines’ strategic shift to focus on hub operations. For example, according to Nashville International Airport’s officials, a growing economy has resulted in more competition for construction materials and skilled workers, competition that has increased construction costs in the Nashville area and has resulted in higher airport development costs. According to ACI-NA representatives, other larger cities such as Salt Lake City, Los Angeles, and Seattle have also reported cost escalation in their construction markets. Officials from most (18 out of 19) selected airports we interviewed stated that the funding and revenue available to them from existing funding sources—such as AIP grants and PFC revenues—may not be sufficient to cover the costs of future and planned infrastructure projects. For example, 14 airport officials we spoke to stated that the amount of funding that they have received in the past and that they anticipate receiving in the future from AIP formula or discretionary grants will not be sufficient to cover the costs of their future planned AIP-eligible projects. Airports may use a variety of other funding sources to pay for AIP-eligible projects. As such, differences between available AIP funding and AIP-eligible cost estimates do not necessarily reflect a funding shortfall. In addition, the NPIAS estimates represent planned AIP-eligible project costs and do not reflect actual expenditures. Below are some examples of AIP-eligible projects that airport officials stated will be a challenge to complete without additional funding: Airfield safety projects. Officials from a small hub airport stated that they have two major airfield-safety projects planned that are intended to align their airport’s current runway and taxiway to FAA safety standards. According to airport officials, their airport has been on the FAA’s top-10 list of airports with highest “incursions” for 4 consecutive years, and officials stated these airfield improvements would help them mitigate runway incursions at their airport. According to airport officials, these projects are expected to cost about $230 million, which they stated is a significant cost for an airport of their size. Their primary source of funding is AIP funding and PFC revenues; however, their current AIP formula funding and PFC revenues are not sufficient to cover the cost of the projects. Without additional funding, officials said that they will need to complete the project in phases, which could lead to a multi-year project ranging from 4 to 12 years to complete. Airport officials stated that a multi-year project of this length would significantly affect their airport operations and increase overall costs. They also stated that ideally, it would be most efficient to execute the project in fewer phases to reduce costs and to benefit airport users, as construction may negatively affect airport operations. Runway rehabilitation project. Similarly, officials from another small hub airport said their airport receives about $5 million annually in AIP formula funding, which they said is not sufficient to cover the costs of their planned runway pavement rehabilitation and reconstruction project. The total cost of the project is about $20 million. According to airport officials, if they are unable to find alternate sources of funding for the project, they will have to postpone the runway project, and such a postponement would have a significant effect on their airport operations. Runway replacement project. Officials from a medium hub airport are planning to invest in a new runway project that is expected to cost about $350 million. The existing runway is nearing the end of its useful life and needs to be replaced. They anticipate receiving approximately $4.5 million annually in AIP formula funding and plan to apply for discretionary AIP funding as well. They stated that currently, this airport’s PFC revenues have been obligated until 2032 and that therefore, they are not able to use this funding source to pay for the runway. According to airport officials, without these funding sources the airport will be required to use their existing bonding capacity to pay for this critical infrastructure, a move that would reduce their future bonding capacity for future critical infrastructure improvements. Fourteen airport officials also stated that revenue generated from PFCs is also not sufficient to cover the costs of planned infrastructure. For example, officials from one large hub airport stated that they have been successful in being able to keep up with the pace of growth at their airport, but based on their forecasts, they anticipate that they would be unable to meet infrastructure demands without an increase in PFC funding. Officials from six airports stated that because the PFC cap has remained at $4.50 since 2000 and has not been adjusted for inflation, the value of the PFC has decreased. In 2015, we reported that an inflation adjusted PFC cap would be $6.46. Representatives from eight airlines that we spoke to, however, disagree that the PFC cap should be increased citing increases in passenger traffic, increases in PFC revenues, and availability of other adequate sources of funding. According to FAA officials, increases in passenger traffic and other changes have also increased the need for capital facility investments. Officials from about half of the airports (nine out of 19) that we spoke to— including a mix of smaller and larger airports—stated that that the revenue their airport generates from PFCs are already obligated toward current infrastructure projects, which they stated could affect their ability to use debt financing for future infrastructure projects. An additional three airports we spoke to stated that they plan to use PFC revenues to finance planned infrastructure projects and that they anticipate that these revenues will be obligated over a long term period—about 30 years— limiting their ability to use debt financing for other projects. FAA’s financial data show that airports committed a significant share of their PFCs to debt service during fiscal years 2013 through 2017. Specifically, of the $16 billion in PFC revenues (or an annual average of $3.1 billion) collected in fiscal years 2013 through 2017, airports paid a total of $12 billion for debt service (or an annual average of $2.5 billion)— which is about 78 percent of total PFC revenues generated during this time period. The debt service includes payments on new bonds, existing bonds, and refinanced bonds which, as previously noted, are collectively tracked in FAA’s database. As shown in figure 8, over our 5-year time period, larger airports accounted for the vast majority (over 90 percent) of the PFCs dedicated to debt service. According to ACI-NA’s report on airports’ capital development needs for 2019–2023 and some selected airport officials, because airports have already committed a significant portion of their current and future PFCs to servicing debt on current or completed projects, airports will have less PFC funding available for future projects. According to ACI-NA’s report on airports’ capital development needs for 2019–2023, the entire national airport system is carrying a combined debt of $91.6 billion from past projects and may be unable to pay for future needed projects unless the existing cap on PFCs is increased. Officials from three small hub airports stated that they are currently facing challenges obtaining financing for infrastructure projects, because they are already fully leveraged and have pledged their PFCs over the mid- to long-term. For example, officials from a small hub airport said that they obtained $120 million in financing, which will be carried until 2040, to build a parking garage and concourse. They said that because the airport is at capacity for debt issuance, they cannot take on any new debt for additional infrastructure projects. FAA data show that as of August 2019, 117 airports (about 30 percent) have obligated their PFCs past 2030 and that 30 airports (about 8 percent) have obligated their PFCs past 2040. One airport has obligated its PFCs through 2070. While some airports we spoke to raised concerns about being able to use debt financing for future airport-infrastructure projects, representatives from two rating agencies that we spoke to stated that for the airports they rate, the bond market is currently favorable, allowing for easier and economical access to financing. Rating representatives stated that currently, the outlook for domestic airports is either stable or positive due to the fact that airport passenger traffic growth has exceeded the gross domestic product’s growth, and airport ratings have remained consistent. For example, according to one rating agency, since 2012, its airport ratings have remained consistent and the annual airport outlook in those years has been “stable” or “stable to positive.” FAA officials added that while the perspective of rating agencies, bond insurers, and underwriters are important, a favorable credit rating does not mean that an airport should make the decision to take on additional debt. Moreover, according to FAA officials, for airports that need airline approval to issue debt, a favorable credit rating may not be sufficient to persuade the airlines of the need for the additional investment. Officials from 13 airports we spoke to stated that they are taking several actions to address funding challenges. These airport officials stated that they have deferred or delayed infrastructure investments, completed projects in phases in order to be able to fund projects in stages, or are looking for other ways to generate airport revenues from passenger services or leases. For example, officials from one airport we spoke to stated that their airport has developed a strategy of breaking up infrastructure projects into phases so as to utilize available FAA funding. According to these airport officials, this strategy lengthens the construction time and results in higher construction costs, but helps the airport to align its project needs with available FAA funding. Another airport official we spoke with said that the airport is introducing a dynamic- pricing parking program to generate additional parking revenue and that the program is expected to bring in an additional 5 to 15 percent in parking revenue. Officials from about half (11 out of 19) of our selected airports stated that AIP’s eligibility funding criteria are too narrow and do not allow airports to fund the infrastructure projects that they currently need, such as terminal projects. FAA’s AIP handbook provides guidance on the criteria to determine which components of a project are eligible for AIP funding. AIP-eligible projects, outlined in statute, include airport planning, airport development, noise compatibility planning, and noise compatibility projects. Certain airport projects, such as revenue-producing parking facilities, hangars, revenue portions of terminals, off-airport roads, and off-airport transit facilities are not eligible for AIP funding. Some terminal projects, however, are eligible for AIP funding, such as a terminal structure shell’s development and development of public use areas directly related to the movement of passengers and baggage in terminal facilities within an airport. This eligibility includes public use spaces that passengers may need to occupy as part of their air travel or utility support space needed to make the public space operational, including the mechanical and electrical rooms. Four airport officials we spoke to stated that they have infrastructure projects planned that are eligible for AIP discretionary funding, but that due to FAA’s criteria for AIP discretionary funding and FAA’s process for prioritizing projects, it is difficult for airports to receive discretionary funding for these projects. According to FAA officials, the eligibility criteria for AIP projects funded through entitlement and discretionary funding are the same. Discretionary funding, however, has some additional restrictions. For example, large, medium, and small hub airports are not eligible to use discretionary funding for terminal building projects. General aviation airports, however, may use discretionary funding for some airport terminal projects. In addition, unlike with entitlement funding, discretionary funding is not reimbursable and airports cannot apply for discretionary funding for projects that have already begun construction. In addition, unlike entitlement funding, not all airports receive discretionary funding. Airports must compete for the limited amount of discretionary funding available each year based on FAA’s AIP prioritization. According to FAA officials, while discretionary funding criteria do not change year to year, FAA may fund projects with discretionary funding one year, but a similar project may not receive discretionary funding a different year due to the project mix that year. FAA officials also stated that in September 2019, FAA updated its Formulation of the NPIAS and Airports Capital Improvement Plan order, which lays out the criteria and prioritization process for selecting projects for discretionary funding. According to FAA officials, projects with the highest priority include safety- and runway-related projects, such as runway signage or resolving complex geometry causing runway incursions. FAA officials stated that other projects have lower priority and ranking in the AIP discretionary-funding prioritization process. Below are examples from airport officials that stated they have certain projects planned that are eligible for AIP discretionary funding but that they believe will likely not rank high in FAA’s prioritization: Non-airfield projects. According to officials from a large hub airport we interviewed, the airport has made several investments in their airfield in the last few years and does not have any major airfield projects planned. These officials stated that they do have several non- airfield projects planned that are AIP-eligible, such as renovating gate holding areas in the terminal. However, airport officials stated that non-airfield projects do not compete well for AIP discretionary funding based on FAA’s prioritization process. As a result, they do not anticipate that they will receive AIP funding for these projects. Airfield projects. Similarly, airport officials from one medium hub airport explained that some of the airfield projects that they have planned, are eligible for AIP discretionary funding, but are not considered “high priority” projects according to FAA prioritization criteria. For example, they currently have a taxiway and apron upgrade project planned, but this project may not compete well against other projects when considering FAA’s AIP prioritization process. According to this airport official, runways are the highest priority and almost always get AIP funding. The official added, however, that the farther away you get from the runway, the less likely it is that you will be able to get AIP funding for the project. In addition, five airport officials noted that while overall AIP grant-funding levels have remained relatively constant in recent years, demand for discretionary AIP grant funding has increased, thereby increasing competition for this funding. According to FAA officials, the amount of funding that FAA has available for discretionary grants changes year-to- year. For example, the amount of discretionary funding allocated to airports annually can vary based on an airport’s decisions to carry entitlement funding over multiple years, as entitlement funding that is carried over becomes discretionary. According to FAA officials, because a very high percentage of discretionary funding comes from funding that has been carried over, it is difficult for airports to plan for or count on this funding being available in any given year. Between fiscal years 2013 through 2017, the amount of discretionary funding that was awarded averaged $1.6 billion annually. Of this amount, the amount representing “pure” discretionary funding averaged $56 million annually or about 4 percent of total AIP discretionary funding. Pure discretionary funding refers to the amount remaining after discretionary set-asides have been funded. FAA distributes pure discretionary funding to eligible projects at any airport on a competitive basis. As previously discussed, an additional $1 billion in supplemental discretionary AIP funding was appropriated in 2018, and an additional $500 million was appropriated in discretionary AIP funding in 2019. However, according to FAA officials, the number of applications they received for this funding exceeded the amount of funding that was available. Specifically, according to officials, FAA received more than 2,500 funding requests totaling more than $10 billion in 2018 for the $1 billion authorized as supplemental discretionary AIP grant funding. As of May 2019, FAA has awarded or anticipates awarding $985 million in supplemental discretionary AIP grant funding to 164 airports in 50 states, the District of Columbia, and Puerto Rico. The supplemental grants fund projects ranging from runway reconstruction and rehabilitation, to the construction of taxiways, aprons, and terminals. About half (12 out of 19) of the airport officials we spoke to stated that competing airport and airline priorities for capital infrastructure investments can pose challenges to funding infrastructure projects and can delay projects. For example, some of these officials stated that if an airline does not agree that there is a business case or that an infrastructure project is justified, then that lack of agreement can affect the airport’s ability to fund the project or delay the project altogether. The extent to which airlines are involved in the decision-making of airport infrastructure investments varies by airport and depends on the type of “use-and-lease” agreement between the airport and the airline. These agreements set forth the terms and conditions for establishing airline rates and charges and investing in capital improvements. Some agreements have a “majority-in-interest” (MII) provision, which requires airports to obtain airlines’ approval for certain infrastructure investments. One large hub airport stated that they have an MII agreement, requiring airlines’ approval of certain projects and project financing strategies. They further explained that debt financing would affect their airline rates and charges and would therefore require the airport to obtain approval from airlines before using general airport-revenue bonds on a project. While airport officials would like to add more gates to the airport and finance that project with general airport revenue bonds, these officials stated that some airlines may not support unassigned gate additions because it could increase competition. According to FAA officials we spoke with, some airports have been able to move toward shorter-term agreements with greater flexibility to adapt to changing needs; however, many agreements still include some form of MII provisions. According to officials from four smaller airports, airlines are less likely to support infrastructure-related increases in airline rates and charges at smaller airports than at larger airports. For example, a non-hub airport stated that smaller airports have a more difficult time negotiating higher rates and charges with airlines because of competition from other nearby airports. ACI-NA representatives also stated that medium hub airports that are not connecting hubs for the three large U.S. network airlines have less of an opportunity to receive capital investments from network airlines compared to larger airports. Representatives from all eight airlines that we spoke to stated that the types of airport infrastructure projects that they see a need for are demand-driven infrastructure development projects that expand airfield capacity, increase the number of gates at an airport, or address safety. Of these airlines, six also stated that they see a need for infrastructure development at larger airports in particular. For example, representatives from one airline stated that they want to collaborate with airports on capital development projects that are scalable and where passenger enplanements are increasing. In addition, representatives from five airlines that we spoke to said that they would like to have more input on airport infrastructure investment decisions. In addition, representatives from five airlines raised concerns that airlines do not have a role in decisions on how airports can invest PFC revenues. According to our prior work, PFCs provide airports a source of funding for airport development over which they have greater local control and airlines have more limited say in their use as compared to the use of airport terminal rents or landing fees. In addition, representatives from two airlines we spoke to said that FAA exercises limited oversight of infrastructure projects funded by PFCs, and that this limited oversight results in airports’ using PFC funding for projects that airlines do not see a need for. The representatives stated that FAA largely approves most PFC applications for projects and that they believe FAA should do more to ensure that airports are not using PFC revenues for unnecessary capital development not supported by airlines. For example, one airline objected to the use of over $1.5 billion of PFC funds for the multi-phase construction of the Phoenix Sky Train linking light rail, parking, and terminals, as representatives believed that there was not an adequate business case to justify the construction of the Sky Train. According to these airline officials, because the airport used PFC revenues for the project, other necessary terminal improvements have been largely debt funded. According to FAA officials, when reviewing PFC applications, they assess the extent to which the airport has demonstrated a need for the project. FAA officials stated that airports are familiar with FAA criteria and will generally not submit projects that will not meet the criteria and that could be denied. In addition, FAA officials stated that while it is unusual for FAA to deny an application, they have denied individual projects. We provided a draft of this report to the Department of Transportation (DOT) for review and comment. DOT provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, DOT, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Traditionally, airports around the world were primarily owned and managed by national governments, but that has changed over time. Beginning in the 1980s and through the 1990s, governments outside of the United States began shifting toward privatization and deregulation of airports. According to the 2016 Airports Council International - World’s (ACI-World) inventory of privatized airports worldwide, 614 commercial service airports (14 percent) have private sector participation. Although ACI-World estimates that a majority (86 percent) of the 4,300 airports with scheduled traffic around the world are publicly owned by a government or government entity, airports with private sector participation handle over 40 percent of all global air traffic. Today, there is a range of airports’ ownership and operating models. Through a literature review of ACI-World’s, the Airports Council International - EUROPE’s (ACI- EUROPE), the International Civil Aviation Organization’s, and the International Air Transport Association’s reports and other documents, we identified five general types of airport ownership structures outside of the United States: Government owned and operated: The airport is fully owned and operated by a public authority or by a mixture of public authorities at a local, regional, national, or transnational level. Government owned and privately operated: The airport is government owned but the airport operator—considered as the entity that is responsible for the day-to-day operation of airport services and facilities—is a private company. Partially privatized: The airport is partially privatized (e.g., mixed public-private ownership), meaning the airports’ shares are owned by a combination of private investor(s) and public authorities of the country where the airport is located. Fully privatized: The airport is fully owned and operated by a commercial company wholly owned by private individuals or enterprises. Not-for-profit, private corporation: The airport has been transferred to or leased by a not-for-profit corporation. The not-for-profit corporation is expected to be financially self-sufficient and fully responsible for funding all operating and infrastructure costs. While U.S. airports are predominantly publicly owned and operated, private participation, like private ownership or private operation contracts, is more common at airports in other countries. Airport Ownership in the United States In the United States, nearly all of the 3,330 commercial-service or general-aviation airports, designated as part of the national airport system, are publicly owned by local and state governments, regional airport authorities, or port authorities. Airport ownership in the United States has evolved under a public model since the 1920s as a way to promote the development of the U.S. aviation industry. In 1996, the Federal Aviation Reauthorization Act of 1996 established the Airport Privatization Pilot Program, which reduced some of the barriers to privatizing airports, and allowed for commercial service airports to be leased and for general aviation airports to be sold or leased. However, as we have previously reported, 18 years following the program’s inception, two airports have privatized, with one of these airports reverting to public control. While participation in the Airport Privatization Pilot Program has been very limited, some airports have entered into public-private partnerships with private entities through management contracts for terminals, which may be leased or outsourced to airlines or other contractors, or for food, rental car, and other concession agreements. For example, the Paine Field Snohomish County Airport in Washington, previously a general aviation airport, entered into a ground-lease agreement with a private airport developer—Propeller Airports—to build and operate a small passenger terminal for commercial service. The terminal was open for commercial service in March 2019, and is depicted in figure 9. Propeller Airports is responsible for the landside infrastructure investments and terminal maintenance. Snohomish County is responsible for maintaining and operating the airside infrastructure, which includes the runways and taxiways, but leases the aprons and the terminal land to Propeller Airports. Airport Ownership in Other Countries Privatized airports are more prevalent in foreign countries. According to a 2016 report by ACI-EUROPE, which examined ownership structures of airports across Europe, about 41 percent of European airports are fully privately owned or partially privatized. According to ACI-World, 75 percent of airports with passenger traffic in Europe have private sector involvement through fully privatized airports or public-private partnerships. Latin America-Caribbean airports (60 percent) and Asian airports (45 percent) have the second and third highest private sector involvement. Industry stakeholders we interviewed said that in some Asian countries, such as Japan and Singapore, airports that were previously government owned have already privatized or are transitioning to privatization. In addition, while ownership models can vary by country, they can also vary within a country. For example, according to ACI-EUROPE’s 2016 report, the United Kingdom’s airports are 53 percent fully private, 26 percent partially privatized, and 21 percent fully public. As we have previously reported, different airport ownership structures, motivations, and financing have driven airport privatization in other countries. For example, in several countries, the national government built, owned, and operated the country’s airports prior to privatization. We previously reported that national ownership enables a central government to direct the sale of its airports and can make for a more streamlined privatization transaction, reducing transaction costs for both the public- sector owner and private-sector bidders. Foreign governments may also be more motivated to privatize their airports than U.S. public-sector airport owners. According to the International Civil Aviation Organization, foreign governments’ reasons for privatizing their airports vary, including an identified need for private-sector capital investments in existing or new airports and a national move toward privatization of public assets or companies. We have previously reported that airports in other countries often have less access to public funds or tax-exempt bonds than publicly owned and operated U.S. airports, making them more reliant on private financing for airport improvements. Our prior work found that a key factor that can hinder U.S. airport privatization is the loss of some federal AIP funds and the loss of easy access to tax-exempt financing. Most of the five foreign airports we selected for our review do not receive government funding. We selected and reviewed five airports in other countries that represent each type of ownership structure previously discussed. Representatives from our five selected foreign airports all said that they rely on aeronautical revenue, which includes revenue from passenger charges and airline rates and charges as the primary source for capital development. Representatives from four of our selected foreign airports said that they rely on debt financing for infrastructure funding as well. Representatives from only one selected airport, Changi Airport in Singapore, said that they have received government funding for infrastructure projects. Table 3 below summarizes the main sources of infrastructure funding available to these selected airports. Representatives from the selected airports we interviewed said that they generate infrastructure funding from various sources of aeronautical revenue, including airline rates and charges. Some foreign airport representatives told us that revenue from airline rates and charges are not required to be used for aeronautical-related costs or infrastructure, or within the airport. Some airports, such as Helsinki Airport, may operate within a consortium network, where revenue is shared among all airports in the network to cover costs. Additionally, some airports have regulations for setting airline rates and charges. For example, the Civil Aviation Authority in the United Kingdom regulates Heathrow Airport’s airline rates and charges. Selected airport representatives we spoke with said that they consult airlines when adjusting airline rates and charges. For example, the Helsinki Airport official said that the airport updates its airline charges once a year and that airlines have an opportunity for the airlines to appeal the change. Representatives from the International Air Transport Association and the Steer Group Inc. said that some foreign airports may have higher airline rates and charges compared to some airports in the United States due to several factors, including the need to generate returns for private financing and flexibility in setting rates and charges, as outlined below. Generating returns for private financing. Foreign airports with private investment or financing may have higher rates because they need to generate returns to pay back private financing. Privately owned airports may also be under pressure to generate returns for investors and therefore need to further divert revenue from funding infrastructure. Flexibility in setting rates and charges. Foreign airports generally have greater flexibility to set airline charges to meet airport needs, a flexibility that may result in higher rates and charges. For example, Canadian airports are generally able to set and adjust airline and passenger charges as needed, and charges vary by airport. In Singapore, Changi Airport has a passenger charge and a pre-funding levy for its new terminal project. Airports in the United Kingdom, including Heathrow Airport, have a regulator that sets the airline and passenger charge cap, and adjusts it every 2 years. In addition, foreign airports have limited airline input on determining airport capital investments and fees charged to airlines. For example, according to ACI-WORLD, airports consult airlines on airport charges and on capital developments, but airport proposals can usually be implemented even if airlines do not support them, as long as a due and proper consultation process is held. An international airline stakeholder said that the extent of airline input on airport capital investment and fees charged to airlines is dependent on the country’s specific regulatory model and the willingness of the airport operator to consult with airlines, but that in some countries, airline consultation is limited. Representatives from our selected foreign airports said they generally keep airlines informed. For example, the Toronto Pearson International Airport has a consultative committee approach with airlines on larger projects costing over $50 million. If the airlines do not approve a project through the consultative committee, the project must be put on hold for one year before it can proceed. Other sources of aeronautical revenue include passenger charges. As of October 2019, for the foreign airports we reviewed, passenger charges ranged from the U.S. dollar equivalent of $9.65 to $58.58 per local traffic passenger (see table 4). Industry stakeholders and international airport association stakeholders said that U.S. airports have a unique ownership and funding model compared to foreign airports. U.S. airports have an element of public control of funding through the federal Airport Improvement Program (AIP) grants and passenger facility charges (PFC), as projects funded through these sources must receive approval from the Federal Aviation Administration. According to these stakeholders, U.S. airports are subject to different regulations related to setting passenger charges. As a result, we have determined that the comparability of these charges is limited. In addition, differences in ownership models, private investment, and funding between U.S. and foreign airports also limited the comparability of these charges. Table 4 provides an overview of passenger charges and levies at selected airports in other countries. Selected foreign airports adjust passengers’ charges based on the airport’s building and infrastructure needs and the cost imposed by passengers on the airport system. How and when these airports make adjustments varies. For example, one of our selected airports has a government entity that regulates passenger charges. More specifically, the Civil Aviation Authority in the United Kingdom regulates Heathrow Airport’s passenger charges. Every 5 years, the Civil Aviation Authority determines the maximum amount that the airport can charge based on the costs incurred by the airport. Other selected airports consider adjustments on an “as needed” basis, including the Toronto Pearson International Airport. Representatives from the Toronto Pearson International Airport said that they set and adjust passenger charges as needed to fund infrastructure investments. The airport assesses charges annually and only adjusts the passenger charges if there is a material imbalance between required cost recoveries against charges. Airport officials also stated the airport increases airline rates and passenger charges only when needed to generate sufficient revenue to cover the costs of planned infrastructure. Similar to airline rates and charges, selected foreign airport representatives told us that there generally are no restrictions on how the airports use revenue from passenger charges for infrastructure or operational costs. Industry stakeholders said that some airports, such as Heathrow Airport, do not have revenue diversion limitations, so revenue generated from passenger charges at the airport is not required to be reinvested back into the airport. Comparatively in the United States, airport revenue is regulated and generally speaking, revenue generated by the airport must go toward certain costs at the airport. Most of our selected foreign airport representatives (4 out of 5) also said that they rely on debt financing, through private bonds or commercial loans. Industry stakeholders said that airport debt financing internationally is similar to that in the United States, but foreign airports generally do not have access to the municipal bond market. Airports’ bonds are generally tax exempt in the United States. Representatives of our selected foreign airports said that they use various types of debt financing, including commercial loans from financial institutions; equity or debt financing, such as bonds in commercial capital markets; or loans from private investors. Most of our selected foreign airports (3 out of 5) do not receive government funding. International airport associations said that the extent to which an airport receives government funding may depend on whether the government owns the airport or has a role in operating the airport. For example, Changi Airport officials said that the Singaporean government is providing Changi’s government-owned, privately operated airport an unspecified amount of government funding for their new Terminal 5 project. In another example, Toronto Pearson International Airport does not receive government funding; however, in Canada, small or rural airports can receive some funding from the Canadian Airports Capital Assistance Program. Similarly, Finavia officials said that although the Helsinki Airport is publicly owned and operated, it does not receive any government funding. To provide information about how each of the five, selected foreign airports fund and finance infrastructure projects, we developed the following case studies. These airports were selected based on selection criteria of ownership models and passenger traffic. The case studies provide information on main sources of funding and financing for the airports’ infrastructure developments, factors considered when setting airline and passenger charges, coordination with airlines on capital development, and recent and planned infrastructure investments for each selected foreign airport. The majority of airports in Finland are owned and operated by the government-owned company Finavia Corporation (Finavia), a limited liability company wholly owned by the Finnish government. Specifically, Finavia operates a network of 21 Finnish airports, of which 19 offer commercial service and two are military airports. Of the remaining three airports in Finland, two are owned by local municipalities, and one is privately held. Background Helsinki Airport is owned and operated by a government-owned company, Finavia. Of Finavia’s airports, according to the Finavia representative, Helsinki Airport has the most connecting international flights and passenger boardings. For example, Helsinki Airport provides direct service to 162 international destinations, including 22 direct flights to Asia. Helsinki Airport has experienced strong passenger growth in recent years. In 2018, Helsinki Airport had 21-million passenger boardings, an increase from the prior year of about 10 percent. Most of this increase was attributable to international traffic. The Finavia representative said that Finavia anticipates passenger traffic to slow in 2020, due to an anticipated slowdown in Europe’s economic growth. Main Sources of Funding and Financing for Airport Infrastructure Investments According to the Finavia representative, Helsinki Airport’s main sources of funding for infrastructure improvements are (1) airline rates and charges, (2) passenger charges, (3) other airport-generated revenue, and (4) debt financing. Helsinki Airport collects aeronautical revenue from airline rates and charges and passenger charges directly from the airlines. Helsinki Airport does not receive any public or government funding, despite being government owned, and the airport does not have any public-private partnerships. In 2010, Finavia began operating as a limited liability company, rather than a government agency. The Finnish government corporatized Finavia to align with the European Union (EU) principles on EU services, movement of services, and competition. The Finavia representative said that the change in corporate structure helps ensure that the government is not subsidizing or promoting unfair competition practices. Airline rates and charges: Helsinki Airport generates revenue from air carrier and other aircraft operator rates and charges such as landing, aircraft parking, and electricity charges. In 2019, Finavia raised airline charges by 2.1 percent from 2018 levels, prompted by higher service costs resulting from airport investments. The Finavia representative said that airline rates and charges make up approximately 40 percent of the airport’s total aeronautical revenue. Under the airport network approach, Finavia can offset losses at one airport with revenue from a more successful airport. The Finavia representative said that some airports in the network are self- sustaining and generate sufficient revenue to cover the costs of airport operations; other network airports do not. According to the Finavia representative, Finavia applies uniform airport charges within the airport network to recover operational and infrastructure costs Passenger charges: Helsinki Airport collects a passenger charge from airlines in order to fund infrastructure used for servicing the passengers. As of January 2019, Helsinki Airport has a euro (€) 8.60 (U.S. dollar (USD) $9.65) fee per departing passenger and a across the airport network and to comply with EU directives on airport charges. €4.10 (USD $4.60) fee per transferring passenger. The Finavia representative said that passenger fees make up approximately 60 percent of the airport’s total aeronautical revenue, which include both airline and passenger fees. According to the Finavia representative, Helsinki Airport does not designate revenue from airline and passenger charges for a specific use. Revenue from airline and passenger charges has been used to cover costs from providing services and operations within the Finavia network. According to the Finavia representative, aeronautical charges, including airline rates and charges and passenger charges, are evaluated and updated once a year and Finavia sets the same charges for all airports in the Finavia airport network. Other airport-generated revenue: Helsinki Airport also generates non-aeronautical revenues from sources such as concessions, commercial services at terminals, parking services, security control, and rental income from real estate. Debt financing: Helsinki Airport uses debt financing from a variety sources, including private banks, financial institutions, and public sector sources such as the European Investment Bank, a financing institution financed by the European Union, and the Nordic Investment Bank. The financing that Helsinki Airport has obtained is similar to traditional debt financing. According to the Finavia representative, Helsinki Airport does not have any restrictions or legal requirements on the types of loans that the airport can take on, nor does Finavia pledge revenue from any specific source towards the repayment of loans. However, the Finavia representative stated that Finavia does not issue bonds. The representative said that generally, the airport has relied on traditional lending because it is easier to obtain and repay a bank loan as compared to other types of debt. Factors Considered when Setting Airline and Passenger Charges The representative said Finavia considers several factors when setting airline and passenger charges. The Finnish Act on the Airport and Network and Airport Charges requires that the pricing of airport charges within the airport network are uniform, common, and transparent, based on the service level offered, and are applied on non-discriminatory and equal grounds. Finavia therefore considers the Finavia airport network revenue; the cost of providing aeronautical services (including operational and electricity costs); and the costs of capital for infrastructure investment when setting the airport’s airline rates and charges. According to the Finavia representative, Helsinki Airport also considers the airport market to ensure that its airline and passenger fees are competitive with similar airports in other European countries. When Finavia makes changes to its airline or passenger charges, the Finavia representative said that airlines have an opportunity to appeal the change. The Finnish Transport and Communications Agency acts as an independent supervisory authority to process disagreements on airport charges. Coordination with Airlines on Capital Development As part of the capital development process, Finavia must consult with airlines to seek input on planned capital investments at the airport before the airport carries out any major new infrastructure projects. Finavia organizes these discussions to assist with negotiations, but the Finavia representative said these discussions are specific to the individual airport rather than the overall Finavia network. In addition, according to the Finavia representative, when setting airline and passenger charges, Finavia consults with airlines and provides information about how airport charges relate to the facilities and services at the airport. According to the Finavia representative, the Helsinki Airport development program, initiated in 2014 with a 2030 anticipated completion date, is the largest expansion project in the airport’s history. It will expand Helsinki Airport’s capacity and increase the number of gates. For example, the airport has planned a terminal building project that will expand the terminal by 45 percent and double the number of gates for wide-body aircraft from eight to 16 gates. In 2016, as seen in figure 10, Helsinki Airport opened one of the passenger terminal expansions, which added 12 new departure gates to the airport. On the airside, the airport will also renovate the apron area to accommodate large aircraft. Additionally, Helsinki Airport is working on a project to improve luggage and baggage handling capabilities to accommodate the anticipated increase in baggage volume expected from airlines’ use of larger aircraft. According to the Finavia representative, Helsinki Airport planned these capital improvements in response to expected passenger traffic growth. The representative anticipates that between 2025 and 2030, annual passenger boardings at Helsinki Airport will reach 30 million. A rendering of the entrance to Helsinki Airport’s completed terminal expansion is shown in figure 11, below. Finavia will use airport cash flows from passenger fees, aeronautical revenue, and non-aeronautical revenue to fund the infrastructure projects. Finavia estimates that the total cost of the Helsinki Airport infrastructure expansion will be €1 billion (USD $1.1 billion). Singapore has two airports that provide commercial service—Changi International Airport (Changi Airport) and Seletar Airport, which is a smaller airport that provides commercial and general aviation service. Background Changi Airport is the primary commercial airport in Singapore, located off the eastern coast of the country. Changi Airport was built in 1981, and according to ACI-World, was the world’s 19th busiest airport in terms of passenger boardings in 2018. While Changi Airport is government owned, the airport is operated by the Changi Airport Group—a private limited company. The Changi Airport Group is responsible for the airport’s operations and management, air hub development, commercial activities, and airport emergency services. It is also responsible for maintaining and investing in airport infrastructure and ensuring the airport is financially self-sustaining. Both airports are owned by the Singapore Ministry of Finance and operated by the Changi Airport Group. The Singapore Ministry of Finance does not have a role in the daily operations and management of the airports but reviews the types of planned airport infrastructure investments. The Changi Airport Group’s board of directors is made up of two representatives from the Singapore Ministry of Finance and other board members from the private sector. The board has discretion to design, budget, and build infrastructure projects. Changi Airport is a major hub for the region, and according to the Changi Airport Group representative, passenger boardings have been increasing steadily. For example, from 2005 to 2018, boardings increased by 30 percent. In 2018, the airport had 66.6-million boardings, an increase of about 5.5 percent from the prior year. The Changi Airport representative said that the airport is currently operating at 85 percent capacity for passenger boardings, but anticipates reaching 100 percent capacity by approximately 2026–2027. The airport has made significant investments to enhance the passenger experience at the airport. For example, the airport has enhanced terminal features for passengers, including a butterfly garden, indoor waterfalls, a four-story slide, 19 airport lounges, and luxury shopping (see fig. 12). The 2019 World Airport Awards named Changi Airport the World's Best Airport for the seventh consecutive year. From 1984 until 2009, Singapore’s airports were owned by the Singaporean government, and operated by the Civil Aviation Authority of Singapore, under the Ministry of Transport. In 2009, the airports were corporatized, and the Changi Airport Group took over airport operations and management. Through two companies, Temasek Holdings and GIC Private Limited, the Ministry of Transport owns and invests in companies that serve strategic national interests, such as infrastructure. For example, according to the Changi Airport representative, Temasek has a 50 percent stake in much of Singapore’s major infrastructure, including a 54 percent stake in Singapore Airlines, the country’s national carrier. The Civil Aviation Authority of Singapore continues to economically regulate the Changi Airport, promote the growth of the air hub and aviation industry in Singapore, oversee and promote aviation safety, and provide air navigation services. Frankfurt Airport’s Case Study Passenger traffic: 222 million Number of airports: 36 commercial airports which includes 16 international airports and 20 regional airports with scheduled passenger service. Background Frankfurt Airport began operations in 1936. According to Fraport AG’s 2018 annual report, in fiscal year 2018, Frankfurt Airport was the largest commercial service airport in Germany and the fourth largest commercial service airport in Europe. The airport is partially privatized and is owned and operated by Fraport AG. Frankfurt Airport was previously jointly owned by the federal government, the State of Hesse, and the City of Frankfurt. In June 2001, Frankfurt Airport was partially privatized, with private entities acquiring a minority ownership stake in the airport. Currently, the State of Hesse and City of Frankfurt own about 51 percent of the airport, with the remaining, about 49 percent, held by private entities. Until the 1980s, airports in Germany were traditionally owned and operated by the government. Following the 1982 creation of a federal program to privatize airports, several airports were partially privatized. According to an Airports Council International-EUROPE survey conducted in 2015, there are now two different airport ownership structures in Germany. Passenger traffic at Frankfurt Airport has increased over the last few years. According to Fraport AG’s 2018 annual report, Frankfurt Airport reached 69.5 million passengers in 2018—an increase of 5 million passenger or about 8 percent over the prior year. Partially privatized: about 47 percent of airports in Germany are partially owned by local, regional, or federal governments. Main Sources of Funding and Financing for Airport Infrastructure Investments Frankfurt Airport’s main source of funding for capital improvements are (1) airline rates and charges, (2) passenger charges, (3) other airport- generated revenue, and (4) debt financing. Airline rates and charges: Frankfurt Airport collects revenue from Fully government owned: about 53 percent of airports in Germany are owned by a public authority, or by a mixture of public authorities, at a local, regional, national, or transnational level. airline rates and charges paid by airlines servicing Frankfurt Airport. These charges include airline takeoff and landing, noise, parking, and other charges. Under German law, airports must obtain approval for certain airline rates and charges from the regional aviation authority, including airline takeoff and landing charges, noise charges, aircraft movement area charges, and parking charges. The only airport charges not subject to approval are charges for central ground-service infrastructure facilities and ground service charges. The regional aviation authority responsible for Frankfurt Airport is the Ministry of Economics, Energy, Transport and Regional Development, State of Hesse. In addition, the Airports Council International (ACI)- EUROPE’s representatives said that the majority of airports in Europe with commercial service, including Frankfurt airport, offer discount incentives to airlines in exchange for delivering higher volumes of passengers. Passenger charges: Frankfurt Airport has passenger charges that vary depending on the destination of the passenger’s flight. As with airline rates and charges, airports must also obtain approval for passenger charges from the regional aviation authority. For example, as of January 1, 2019, these charges range from euro (€)12,93 (U.S. dollar (USD) $14.51) for transfer flights to all destinations to €25,16 (USD $28.23) for international flights initiating from Frankfurt Airport. Other airport-generated revenue: Frankfurt Airport also generates revenue from airport concessions, real estate leases, parking, and other sources. Debt financing: Frankfurt Airport also relies on debt financing to fund infrastructure projects. However, we were unable to receive data from Fraport AG on how much debt financing Frankfurt airport used for capital development projects in 2018. We were not able to confirm financial information with Fraport AG about how much total revenue Frankfurt Airport generated from each of the individual sources described above. Therefore, we are not able to provide information on the total revenue generated by Frankfort Airport in 2018. However, information is available on the total revenue for all airports in the Fraport AG network. Specifically, according to Fraport AG’s 2018 annual report, the total revenue generated from approved airline rates and charges, passenger charges, and passenger services combined for the full Fraport AG group was €1,006 million (USD $1.2 million). In addition, the total revenue generated from other airport-generated revenue for the full Fraport AG group was €507 million (USD $599 million) in 2018. Fraport AG is in the process of building a new terminal—Terminal 3—at Frankfurt Airport to provide sufficient capacity and accommodate growing air traffic at Frankfurt airport. Construction for the project began in 2015 and is estimated to be completed in 2023. The first phase of the project involves construction of the main terminal building, which will include the arrival and departure levels, lounges, concession area, and a baggage handling system. This phase of the project is expected to provide capacity for about 14-million passengers a year. The second phase of the project will expand the airport facility and is expected to increase passenger capacity by up to 5-million additional passengers when completed in 2021. According to Fraport AG’s current plans, the new terminal is expected to increase capacity by up to 21 million more passengers. Fraport Ausbau Süd GmbH, a wholly owned subsidiary of Fraport AG, is responsible for managing, supervising, and monitoring the construction project. The project is being privately financed, and the estimated budget of the project is about €3.5 billion to €4 billion (USD $4.1 billion to $4.7 billion). According to Fraport AG, this project is Fraport’s largest single investment at Frankfurt Airport. We were unable to confirm information with Fraport AG representatives about factors they consider when setting airline and passenger fees or how they coordinate with airlines on the airport’s infrastructure development. Background Heathrow Airport is Europe’s busiest airport with the highest passenger boardings, and is the United Kingdom’s hub airport. Heathrow Airport has undergone transformation from a government-owned airport to a privately-owned airport. Heathrow Airport was privatized in 1987 as part of the privatization of the British Airports Authority. Currently, Heathrow Airport Holdings Limited owns and operates Heathrow Airport. In 1965, the Airports Authority Act established the British Airports Authority, an independent government agency, which assumed ownership and management of airports in the United Kingdom. Between 1966 and1987, the British Airports Authority acquired ownership and operation of seven of the 22 government airports— Heathrow, Stansted, Prestwick, Gatwick, Edinburgh, Aberdeen, and Glasgow airports. Although Heathrow is privatized, any airline and passenger charges the airport collects are subject to economic regulation by the U.K.’s Civil Aviation Authority. The Civil Aviation Authority—a government agency— regulates airport charges for U.K. airports with more than 5-million annual passengers. Airports Council International (ACI)-EUROPE representatives said that the Civil Aviation Authority regulates Heathrow on the basis that Heathrow is likely to possess significant market power for aeronautical services. In 1987, the United Kingdom privatized the British Airports Authority due to limited government funding and a need for significant capital development at large airports, according to Heathrow Airport representatives and industry stakeholders. All seven airports owned by the authority were privatized. The authority was subsequently acquired in 2006 by an international consortium led by Ferrovial Aeropuertos S.A. of Spain (Ferrovial S.A.) and named BAA Ltd. This entity was later renamed Heathrow Airport Holdings Limited. The United Kingdom became the first country to privatize its major airports. According to an Airports Council International-EUROPE survey conducted in 2015, airports in the United Kingdom have one of the following three ownership structures: Government owned: about 21 percent of airports in the United Kingdom are owned by local, regional, or national governments; experienced increased passenger numbers as a result of airlines’ use of larger aircraft that have more seats per aircraft. Main Sources of Funding and Financing for Airport Infrastructure Investments Heathrow Airport’s main sources of funding for capital improvements are (1) airline rates and charges, (2) passenger charges, (3) other airport- generated revenue, and (4) debt financing. Airline rates and charges: Heathrow Airport collects revenue from Fully privatized: about 53 percent of airports in the United Kingdom are owned by private entities. charges that it imposes on airlines that fly to and from Heathrow Airport. These charges include landing, parking, and emissions charges. Under the authority of the Civil Aviation Act of 2012, the Civil Aviation Authority establishes a pricing formula known as the “maximum revenue yield,” which sets limits on the airline and passenger charges on a per-passenger basis. In 2018, Heathrow Airport generated pounds (£) 549 million (U.S. dollar (USD) $734 million) in landing and parking charges, according to Heathrow Airport’s 2018 financial statements. Passenger charges: Heathrow Airport has several categories of passenger charges, which vary in rates depending upon the time of year of travel; whether the passenger is on a departing, transfer, or transit flight; or whether the flight destination is inside or outside of the European Union. For example, under the 2019 charges for Heathrow Airport, the passenger service charge would range from £19.84 to £46.02 (USD $25.25 to USD $58.58). In 2018, Heathrow Airport generated £1.2 billion (USD $1.6 billion) in revenue from passenger charges, according to Heathrow Airport’s 2018 financial statements. Other airport-generated revenue: Heathrow Airport also generates other revenue from retail airport concessions, parking, and other sources. Heathrow Airport generated £656 million (USD $876 million) from these sources in 2018, according to Heathrow Airport representatives. Debt financing: Heathrow airport also relies on debt financing to fund infrastructure projects. In 2018, Heathrow (SP) Limited raised approximately £2.3 billion (USD $3.1 billion) of debt financing to fund infrastructure projects. According to Heathrow Airport representatives, as of 2018, the airport has a total debt of £12 billion (USD $16 billion), which includes shareholders’ indebted equity. According to Heathrow Airport representatives, Heathrow Airport’s largest source of funding is from airline rates and charges and passenger charges, and in 2018 the airport generated £1.7 billion (USD $2.3 billion) from airline and passenger charges combined. Factors Considered when Setting Airline and Passenger Charges As previously discussed, the Civil Aviation Authority is responsible for economic regulation of Heathrow and other airports in the United Kingdom. Specifically, it regulates airline and passenger charges and determines the maximum amount in fees that Heathrow Airport can charge airlines and passengers on a 5-year basis, with adjustments every 2 years as needed. The level of airport charges that Heathrow levies each year is in accordance with the aviation authority’s pricing formula. Each year, Heathrow Airport publishes Conditions of Use that describes its airport charges. According to Heathrow Airport representatives, they have flexibility in how they categorize charges, but the charges must align with the European Union’s and United Kingdom’s non-discrimination principle standards and with the Civil Aviation Authority’s regulations. According to Heathrow Airport representatives, they consider several factors, such as the infrastructure needs at the airport and the real cost of providing services, when setting airport charges. They also set charges to influence and incentivize airline behavior. For example, to incentivize airlines to replace aircraft with newer, less polluting models, the airport charges airlines a higher fee per landing when they use older aircraft. In addition, Heathrow’s passenger fees vary depending on the passenger’s anticipated airport use and with the costs imposed on the airport system. For example, passengers on domestic flights have lower charges than passengers traveling on international flights. This differential is because domestic passengers do not use the same facilities or the same baggage facilities as an international passenger and the costs of those facilities are higher than for facilities serving domestic passengers. Coordination with Airlines on Capital Development Heathrow Airport coordinates with airlines on capital development. For example, the airport organized an Airport Consultative Committee structure to obtain input on its most recent capital development plan from the 93 airlines operating at the airport. According to representatives from the International Air Transport Association, which is an association that represents airlines, the airport used this committee to reach agreement with these airlines on a capital expenditure plan related to development at multiple terminals at the airport. Recent and Planned Infrastructure Investments at Heathrow Airport According to Heathrow Airport representatives, within the last 15 years, Heathrow Airport has completed two large capital-development projects, and the airport is currently in a planning phase. In 2008, Heathrow Airport opened Terminal 5, which had a total project cost of £4.3 billion (USD $8 billion). Subsequently, in 2014, Heathrow Airport renovated its passenger terminal—Terminal 2—which cost approximately £2.5 billion (USD $4.1 billion) to complete. Planning and design is now under way for the construction of a third lateral runway and an associated new terminal facility at Heathrow Airport, according to Heathrow Airport representatives (see fig. 13). The new runway is intended to alleviate constraints on the number of available slots for landing and takeoff. According to Heathrow Airport representatives, the new runway is expected to add capacity for at least an additional 260,000 flights per year, and the overall project will expand the airport’s surface space by 50 percent. Representatives said that according to current plans, construction of the runway and associated terminal is expected to begin in 2022 and operations are expected to start in 2027. The runway project is estimated to cost £14 billion (USD $18 billon) and will be funded through cash flows from operations, equity, and debt, according to Heathrow Airport representatives. Background The Greater Toronto Airports Authority manages and operates the Toronto Pearson International Airport (Toronto Pearson). According to Statistics Canada passenger traffic data, Toronto Pearson is Canada’s busiest airport in terms of total passenger traffic. In addition, it is North America’s second busiest airport in terms of international traffic, according to Toronto Pearson’s 2018 annual report. The Greater Toronto Airports Authority is a not-for-profit corporation without share capital, meaning it does not have any shareholders and any profits earned are invested back into the airport. Until the early 1990s, the Canadian federal government owned, operated, and maintained most airports and air navigation facilities in Canada. In 1994, the Canadian federal government issued the National Airports Policy, which created different ownership structures for NAS and non-NAS airports. The Greater Toronto Airports Authority assumed operations and management of Toronto Pearson in 1996 through a lease arrangement with the federal government. According to representatives from the airports authority, because Toronto Pearson generates the most revenues among Canadian airports, the authority pays the highest ground lease rate for Toronto Pearson among Canadian airports. For every Canadian dollar (CAD) $1 (U.S. dollar (USD) $0.75) that the airport authority earns in revenue over CAD $250 million (USD $188 million), it pays CAD $0.12 cents (USD $.09) for the ground lease. For NAS airports, the National Airports Policy devolved responsibility for the operations, management and expenditures of NAS airports from the federal government to Canadian Airport Authorities, which were set up as not-for-profit and non-share corporations. The Canadian government, however, still owns these airports. Under the law, Canadian Airport Authorities pay lease payments to the government under 60-year leases that include an option to renew for 20 years. These airport authorities are required to invest airport-generated revenues in airport operation and capital development. Passenger traffic at Toronto Pearson has increased in recent years and representatives from the Greater Toronto Airports Authority stated that according to their projections, passenger traffic is expected to continue to increase. In 2018, about 48-million passengers traveled through Toronto Pearson—an increase of 2.4 million, or 5 percent, over the prior year. According to these representatives, about 70 percent of this traffic is from origin and destination passengers and 30 percent from connecting passengers. According to the airports authority’s forecasts, passenger traffic at Toronto Pearson is expected to increase to 85 million in 2037. By contrast, for non-NAS airports, the National Airports Policy transferred ownership of these airports from the federal government to regional or local entities, such as local municipalities. The government continues to support remote and Arctic non-NAS airports that service isolated communities. Main Sources of Funding and Financing for Airport Infrastructure Investments Toronto Pearson’s main sources of funding for capital improvements are (1) airline rates and charges, (2) passenger charges, (3) other airport- generated revenues, and (4) debt financing. Toronto Pearson does not receive any government funding, although some limited government funding is available to smaller airports through Canada’s Airports Capital Assistance Program. Airline rates and charges: Toronto Pearson collects revenue from airline rates and charges, which include landing fees, terminal fees for general use of the terminal space, apron fees, deicing facility fees, and other airline charges. According to representatives from the Greater Toronto Airports Authority, airline rates and charges at Toronto Pearson have not been increased since 2012. Toronto Pearson generated about CAD $510 million (USD $393 million) in airline rates and charges in 2018 according to Toronto Pearson’s 2018 annual report. Passenger charges: Passenger charges, called Airport Improvement Fees, are fees charged at every major Canadian airport and currently range from CAD $5 to CAD $40 (USD $3.76 to USD $30.12) per passenger. Each airport authority sets its own passenger fees, and there is no cap on how much each airport can charge. According to an international industry stakeholder, airport authorities, such as the Greater Toronto Airports Authority, set their respective fees based on their analysis of what the market can bear. Toronto Pearson’s passenger fee is CAD $25 (USD $18.82) for departing passengers and CAD $4 (USD $3.01) for passengers connecting through the airport as of January 1, 2019. The airport can only use this revenue for aeronautical-related expenses, such as capital development. The Greater Toronto Airports Authority has an agreement with each air carrier that takes off from and lands at Toronto Pearson whereby air carriers agree to collect passenger fees from each of their enplaned passengers on behalf of the authority. The airports authority commits in these agreements to use passenger-fee revenues for capital programs, including associated debt service. According to representatives from the Greater Toronto Airports Authority, the airport has not increased its passenger fees since 2012, as the increased volume of passengers has generated sufficient revenue for the airport. In 2018, Toronto Pearson generated CAD $460 million (USD $355 million) from passenger fees, in the form of Airport Improvement Fees, according to Toronto Pearson’s 2018 annual report. Other airport-generated revenues: Toronto Pearson also generates revenue from other sources such as airport concessions, rental properties, car rentals, parking, and advertising. The Greater Toronto Airports Authority has more flexibility in how it can use this category of revenue, including for operating costs and for capital needs. According to the Greater Toronto Airports Authority’s 2018 annual report, the long-term objective is to increase the proportion of total revenues generated through commercial streams at the airport—from non-aeronautical sources such as parking, retail, and dining concessions—to over 40 percent. In recent years, commercial revenues have been the fastest growing component of the airport authority’s revenues. In 2018, Toronto Pearson generated about CAD $502 million (USD $387 million) in other airport-generated revenue, according to Toronto Pearson’s 2018 annual report. Debt financing: Canadian airports can generally use equity or raise debt in capital markets. In 2018, Toronto Pearson obtained CAD $500 million (USD $386 million) in bond financing. According to representatives from the Greater Toronto Airports Authority, the authority issues bonds to fund existing bond maturities and capital programs that exceed cash from operations. Revenue from passenger fees, in the form of Airport Improvement Fees, are used to service debt for infrastructure projects. Projects that cost less than CAD $400 million (USD $301 million) are funded with passenger-fee revenues, airline rates and charges, and other airport-generated revenues, according to these representatives. Factors Considered when Setting Airline and Passenger Charges Representatives from the Greater Toronto Airports Authority stated that the structure that Toronto Pearson has in place allows the airport to increase airline rates and passenger charges only when needed to generate sufficient revenue to cover the costs of planned infrastructure. According to these representatives, charges are assessed annually, but only change if there is a material imbalance between required cost recoveries against charges. To establish airline rates and charges and passenger fees, the Toronto Pearson Airport uses the “dual till” model whereby airline and passenger charges are set to recover aeronautical costs only. This contrasts with the “single till” model where all airport activities (including aeronautical and non-aeronautical) are taken into consideration when determining the level of airport charges. Representatives from the Greater Toronto Airports Authority stated that Toronto Pearson is unique among Canadian airports in doing so. Coordination with Airlines on Capital Development As part of Toronto Pearson’s passenger-fee agreements with airlines, the Greater Toronto Airports Authority must consult with airlines and obtain approval for certain capital projects in excess of CAD $50 million (USD $38 million). Approval is sought through an airline consultation committee that the airport authority established to include representatives from airlines that provide service at Toronto Pearson. If the consultative committee does not approve a project, the airport must put the project on hold for 1 year. After the 1-year hold, the project may be initiated. According to representatives from the Greater Toronto Airports Authority, if the airport has a major capital project planned, the authority keeps the airline community informed. In particular, the airport communicates regularly with the two major Canadian airlines, which make up 70 percent of the airport’s service volume, to keep them informed of planned infrastructure improvements. Recent and Planned Infrastructure Investments at Toronto Pearson Airport In 2018, the Greater Toronto Airports Authority completed several infrastructure improvements at Toronto Pearson, according to Toronto Pearson’s 2018 annual report (see fig. 14). Some of these improvements relate to ongoing projects that the airport initiated in prior years. For example, the airports authority is upgrading and expanding its capacity at Terminal 1 to accommodate narrow-body aircraft operations in response to increased passenger traffic. During 2018, the authority expended CAD $16 million (USD $12 million) for this project. In addition, the airport expended about CAD $13 million (USD $10 million) in 2018 to make improvements at Terminal 3, which is intended to enhance passenger experience and improve passenger flow. The Greater Toronto Airports Authority also expended about CAD $23 million (USD $18 million) on Phase 1 of its baggage-handling improvement project, which will add baggage-handling capacity and is intended to improve system reliability. According to representatives from the Greater Toronto Airports Authority, the authority has developed a 5-year capital plan that includes several projects intended to increase capacity and improve passenger flow at the airport. For example, the airports authority has begun the design phase for construction of a new concourse at Terminal 1 and an expansion project at that terminal. The airports authority is also in the design phase for constructing an integrated Regional Transit and Passenger Centre, and replacement of the baggage systems. The airport also plans to add more retail space and provide U.S. Customs and Border Protection space in the terminal to reduce international passengers’ connecting time by improving passenger flow. According to representatives from the Greater Toronto Airports Authority, the estimated cost of its 5-year capital plan is CAD $3.46 billion (USD $2.61 billion), which will allow the airport authority to handle 65 million passengers. This report discusses (1) levels of federal and other funding that U.S. airports received from fiscal years 2013 through 2017 for infrastructure investments, (2) projected costs of planned infrastructure investments at U.S. airports from fiscal years 2019 through 2023, and (3) any challenges selected airports face in obtaining airports’ infrastructure funding and financing. We also examined how selected airports in other countries fund and finance airport infrastructure investments. This information is presented in appendix I. To obtain information for all objectives, we reviewed relevant literature, including academic and industry literature on airport funding and financing in the United States and in other countries. We also reviewed laws, regulations, agency guidance, and prior GAO reports related to this topic. To determine what federal and other funding U.S. airports received from fiscal years 2013 through 2017 for infrastructure investments, we obtained and analyzed information on the main sources of airport funding which included: funding from federal Airport Improvement Program (AIP) grants and state grants, revenue from passenger facility charges (PFC), airport-generated revenue, capital contributions, and amounts of financing airports received from bond proceeds and other debt financing. Because comprehensive data on airport capital spending is not available, we framed our research objective to examine funding received rather than how much airports expended on infrastructure projects. We selected fiscal years 2013 through 2017 because it was the most recent 5-year period where complete data were available. For each funding source, we determined average annual-funding amounts for fiscal years 2013 through 2017 for all U.S. national system airports, as well as separately for larger airports and smaller airports. We defined larger airports to include large and medium hubs, and smaller airports to include small hubs, non-hubs, non-primary commercial service, reliever, and general aviation airports. We also analyzed how the amounts of funding received have changed from fiscal years 2013 through 2017. We presented all funding amounts in 2017 dollars. We obtained funding data from various sources, as follows: AIP funding: To determine how much funding airports received from federal AIP grants, we obtained and analyzed data from the Federal Aviation Administration’s (FAA) System of Airports Reporting (SOAR) database on AIP grants awarded by FAA during our study period. This database includes detailed information about AIP grants and PFC applications, approvals, and collections. We analyzed the AIP grant data to determine total annual funding by airport type for fiscal years 2013 through 2017, as well as average annual funding by airport type and project type over the same time period. State grants: Data on state funding for fiscal years 2013 through 2017 are available but are not complete, and we were not able to obtain additional information to verify the data’s reliability. As part of our 2015 review of airports’ infrastructure funding, we conducted a survey in 2014 with the assistance of the National Association of State Aviation Officials (NASAO), to determine how much funding airports received from state grants for fiscal years 2009 through 2013. Results from this survey were reported in our 2015 report and in NASAO’s August 2015 report, NASAO State Aviation Funding and Organizational Data Report. For this review, we interviewed NASAO officials and they confirmed that the level of state funding has largely remained unchanged since the 2015 study. Therefore, we incorporated information from the 2015 survey into our current report. PFCs: To determine how much funding airports received from PFCs, we obtained and analyzed data from the SOAR database on PFC collection amounts at all airports that collected PFCs during fiscal years 2013 through 2017. Because we were unable to obtain data on airports’ expenditures of PFC revenues by project type from fiscal years 2013 through 2017, we instead obtained data on airports’ FAA- approved applications from 1992 through February 2019 showing the types of projects on which airports intended to spend their PFC revenue. Airport-generated revenue: For airport-generated revenue, which we defined as revenue available for capital development, we obtained and analyzed airport financial data from FAA’s Certification Activity Tracking System (CATS). Examples of airport-generated revenue include aeronautical revenue (including revenue earned from leases with airlines and landing fees) and non-aeronautical revenue (such as earnings from airport terminal concessions and vehicle parking fees). We analyzed the financial data to determine the amount of airport- generated revenue that airports had available for infrastructure investments, as well as amounts by airport type, for each fiscal year 2013 through 2017. We calculated airport-generated revenue by using data for the total operating revenue of an airport, subtracted by the subtotal of operating expenses, prior to subtracting depreciation, which yields operating income plus interest income. For data precision, we used a different methodology to calculate airport- generated revenue than that of our 2015 report on airport finance by not subtracting an estimated amount of PFCs used to pay for interest expense. As a result, airport-generated revenue reported here is not comparable to airport-generated revenue in our 2015 report. Airport capital contributions: To determine how much funding airports received from capital contributions, we analyzed the same set of airport financial data from CATS that we used for airport-generated revenue, discussed above. We used the line item for capital contributions (8.5 Capital Contributions) in CATS for our analysis. Airport bonds: In addition to the sources of airport funding listed above, this report also separately discusses information on airport bonding—a common financing mechanism for some airports. We analyzed FAA financial data from the CATS database on the amounts of financing that airports received from bond proceeds (line item 14.1). We also interviewed representatives at two ratings agencies—Fitch Ratings and Moody’s Investors Service—and a representative from Piper Sandler (formerly Piper Jaffray) to obtain their perspectives on the availability of airport bond financing. We assessed the reliability of FAA’s CATS data on airport financial information and SOAR data by reviewing documentation about the data and the systems that produced these data. We also interviewed FAA officials knowledgeable about the collection, maintenance, and security of these data. We also reviewed documentation that also relied on the FAA’s CATS and SOAR data and that was collected for our prior review of airport infrastructure funding and financing for a similar purpose. We determined that these data were sufficiently reliable to report funding and financing that airports received from AIP, PFCs, airport-generated revenue, capital contributions, and bond revenue for fiscal years 2013 through 2017. To determine the projected cost of airports’ planned capital development from fiscal years 2019 through 2023, we combined (1) FAA’s most recent estimate for AIP-eligible development from its Report to Congress National Plan of Integrated Airport Systems (NPIAS) 2019-2023, released in September 2018, and (2) Airports Council International – North America’s (ACI-NA) most recent estimate for AIP-ineligible development for the same time period, as reported in its February 2019 report, Terminally Challenged: Addressing the Infrastructure Funding Shortfall of America’s Airports. We developed estimates of infrastructure development costs for all national system airports, as well as by airport type. We also presented estimates of AIP-eligible development costs by project type; these estimates were based on estimates in the NPIAS report. We did not, however, present estimates of AIP-ineligible data by project type because ACI-NA’s data do not readily support such a presentation. We presented all dollar amounts in 2017 dollars. To identify changes in airports’ project costs of planned infrastructure investments, we also reviewed FAA’s NPIAS report for fiscal years 2017– 2021 and ACI-NA’s report on airports’ capital development needs for fiscal years 2017–2021, and we compared the estimates in those reports to the fiscal years 2019–2023 estimates. ACI-NA’s estimates of U.S. airports’ infrastructure project costs differ from those of FAA’s due to scope, methodology, and other reasons. For example, the ACI-NA cost estimate includes estimates for AIP-eligible and AIP-ineligible projects, while FAA only includes AIP-eligible projects as required by statute. ACI-NA’s estimate also includes projects that have already identified funding sources as well as those that have not. By comparison, FAA only includes projects without identified funding. The methodology that FAA and ACI-NA use to develop their estimates also differs. For example, FAA developed its estimates for the fiscal year 2019 through 2023 time period by reviewing information from airport plans that were available through 2017. According to ACI-NA’s report on airports’ capital development needs for 2019–2023, its cost estimates for fiscal years 2019–2023 are based on a survey of 86 airports completed in 2018. This number represents the airports with 90 percent of all enplanements in 2017. ACI-NA survey respondents were asked to report all infrastructure costs, including interest, construction and management costs, architectural and engineering costs, and contingency costs. FAA’s estimate does not include interest and contingency costs. We reviewed FAA documentation describing the methodology for producing the NPIAS cost estimate from airport-planning documents, and interviewed FAA officials. We determined FAA’s estimate of AIP-eligible planned infrastructure costs to be reliable for the purposes of our report. Similarly, we reviewed ACI-NA’s methodology for developing its report on airports’ capital development needs for 2019–2023 and interviewed ACI-NA representatives about their methodology for developing this estimate. We determined that ACI-NA’s response rates, shares of enplanements represented by the airports that responded, and ACI-NA’s estimation methodology were sufficiently reliable for the purposes of presenting an estimate of planned infrastructure costs for AIP-ineligible projects. To obtain information about any challenges airports face in obtaining airport funding and financing, we reviewed documents from and conducted interviews with representatives from ACI-NA and airport officials from 19 selected U.S. airports. We also interviewed representatives from the American Association of Airport Executives. Through our document review and interviews, we obtained information about the sources of funding and financing that airports currently receive, planned infrastructure projects, and challenges to obtaining funding and financing for these projects. We selected airports representing different hub sizes, airports with the highest planned development costs as reported in FAA’s NPIAS fiscal years 2019–2023 report, airports with increasing and decreasing enplanements in calendar years 2013 through 2017, airports that were mentioned in our literature review and that were recommended by FAA and other stakeholders whom we interviewed, and we considered the geographic location of the airport. We also visited three locations from our selected airports to discuss and view examples of airports’ planned infrastructure projects. The airports we visited included Seattle-Tacoma International Airport, Spokane International Airport, and Paine Field Airport. See table 4 for a list of all the airports where we conducted interviews. We also interviewed representatives from Airlines for America (A4A)—the U.S. airline association—and representatives from eight selected U.S. airlines to obtain their views on airport infrastructure funding and financing issues. We selected airlines with the highest passenger traffic, as measured by revenue passenger miles. In addition, we selected airlines representing legacy and low cost carriers, and airlines that provide service outside the United States. Selected airlines that we interviewed were: Alaska Airlines, American Airlines, Delta Air Lines, Frontier Airlines, JetBlue Airways, Southwest Airlines, Spirit Airlines, and United Airlines. Collectively, the selected airlines transported about 90 percent of total U.S. passenger traffic in 2018. Because we used a nonprobability sample of airport and airlines to interview, our interviews are not generalizable. Last, to obtain information about how foreign airports fund and finance infrastructure development, we reviewed documents from and conducted interviews with international airport associations, international aviation- industry stakeholders, and representatives from four of the five foreign airports that we selected as case studies. These airports included: Toronto Pearson International Airport (Canada); Frankfurt Airport (Germany); Heathrow Airport (United Kingdom); Helsinki Airport (Finland); and Changi Airport (Singapore). Representatives from Frankfurt Airport provided us with written responses and documents for our review. See table 5 for a list of international organizations and foreign airports where we conducted interviews. For each of the five selected foreign airports, we collected information about airport infrastructure funding at the airports, including the sources of funding and financing the airports use, types of projects the airport has planned, and factors they consider when setting airport charges, among other topics. In addition, for each of our case studies, we presented financial information in the appropriate foreign currency as well as in U.S. Dollars (USD) in parentheses. We converted foreign currency information to U.S. Dollars using Federal Reserve data on foreign exchange rates. For 2018 data, we used the Federal Reserve 2018 annual rate. For 2019 data, we calculated a Federal Reserve 2019 annual rate. The primary criterion that we used to select foreign airports as case studies was the ownership model of the airport. To ensure our selection included a mix of ownership models, we selected airports that fit each of the following ownership models: Government owned and operated Government owned and privately operated Partially privatized Not-for-profit, private corporation As secondary criteria, we selected foreign airports with the highest passenger traffic among international airports, airports which had service by U.S. carriers, and airports located in regions where it would be feasible to obtain information and interview officials. Because we used a nonprobability sample of foreign airports to interview, our interviews are not generalizable. While our case studies of foreign airports and their experiences with funding and financing airport infrastructure are not generalizable to all foreign airports, they provide a range of examples of how foreign airports fund and finance airport infrastructure. We conducted this performance audit from September 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jean Cook and Susan Zimmerman (Assistant Directors); Maria Mercado (Analyst-in-Charge); Pin-En Annie Chou; Jessica Du; Sharon Dyer; David Hooper; Delwen Jones; Grant Mallie; Josh Ormond; Pam Snedden; Kelly Rubin; and Rebecca Rygg made key contributions to this report.", "summary": "U.S. airports are important contributors to the U.S. economy, providing mobility for people and goods, both domestically and internationally. About 3,300 airports in the United States are part of the national airport system and eligible to receive federal AIP grants to fund infrastructure projects. To help fund these projects, certain categories of airports are also authorized by federal law to collect PFCs, which passengers pay when buying tickets. GAO was asked to examine airport- funding sources and planned infrastructure projects. This report examines, among other issues: (1) levels of federal and other funding that U.S. airports received from fiscal years 2013 through 2017 for infrastructure projects, (2) projected costs of planned infrastructure investments at U.S. airports from fiscal years 2019 through 2023, and (3) any challenges selected airports identified in obtaining projects' funding and financing. GAO analyzed airport-funding data for AIP grants, PFCs, airport-generated revenue, and other sources for fiscal years 2013–2017—the most recent years for which data were available—and FAA's and Airports Council – North America's cost estimates of airports' planned infrastructure projects for fiscal years 2019–2023. GAO also interviewed FAA officials; representatives from airline and airport associations, and bond-rating agencies; officials from 19 selected airports representing airports of different sizes and with the highest planned development costs, among other things; and representatives from eight selected airlines, selected based on factors such as passenger traffic. From fiscal years 2013 through 2017, U.S. airports received an average of over $14 billion annually for infrastructure projects. The three largest funding sources are below: Funding from federal Airport Improvement Program (AIP) grants has remained relatively constant, at an annual average of $3.2 billion. Smaller airports (small hub, non-hub, and general aviation) collectively received more AIP funding compared to larger airports (large and medium hub). Revenue from federally authorized passenger-facility charges (PFC), a per-passenger fee charged at the ticket's point of purchase, increased by 9 percent, with an annual average of $3.1 billion. Increases in passengers and PFC revenue at larger airports contributed to this increase. Airport-generated revenue (e.g., concessions and airline landing fees) increased by 18 percent, with an annual average of $7.7 billion. While both larger and smaller airports experienced increases in these revenues, the larger airports made up 92 percent ($7.1 billion) of these revenues. In addition to these sources, some airports obtained financing by issuing bonds, secured by airport revenue or PFCs. According to Federal Aviation Administration (FAA) data, larger airports were able to generate more bond proceeds than smaller airports in part because larger airports are more likely to have a greater, more certain revenue stream to repay debt. Airports' planned infrastructure costs for fiscal years 2019 through 2023 are estimated to average $22 billion annually (in 2017 dollars)—a 19 percent increase over prior estimates for fiscal years 2017 through 2021. These costs are expected to increase in part because airports are planning to invest in more terminal projects. For example, cost estimates for AIP-eligible terminal projects increased about 51 percent when compared to FAA's prior 5-year estimate. FAA and airport association representatives stated that terminal projects can be more expensive than other projects because of the scale of the improvements, which can include renovating terminals to repair aging facilities and accommodate larger aircraft and growth in passengers. Officials from GAO's 19 selected airports cited several challenges to funding infrastructure projects. For example, officials stated that the funding and revenue they receive from combined sources may not be sufficient to cover the costs of planned infrastructure projects. The officials also raised concerns about being able to finance future airport-infrastructure projects because they have already obligated their current and future PFCs to service debt on completed and ongoing infrastructure projects. According to FAA data, in fiscal years 2013 through 2017, airports paid a total of $12 billion—or 78 percent of total PFC revenues collected—for debt service. Bond-rating agencies, however, continue to give airports high or stable ratings, and rating agencies' representatives stated that airports' access to capital markets continues to remain favorable. Some airport officials stated that to address funding challenges, they have deferred some needed infrastructure investments or completed projects in phases, steps that increased construction times and costs.", "document_type": "gao"}
{"report": "DOD space systems support and provide a wide range of capabilities to a large number of users, including the military services, the intelligence community, civil agencies, and others. These capabilities include positioning, navigation, and timing; meteorology; missile warning; and secure communications, among others. Space systems can take a long time to develop and involve multiple segments, including space, ground control stations, terminals, user equipment, and launch, as figure 1 below shows. DOD satellite systems are also expensive to acquire. Unit costs for current DOD satellites can range from $500 million to over $3 billion. The associated ground systems can cost over $6 billion to develop and maintain and the cost to launch a satellite can climb to well over $100 million. Table 1 provides highlights of the current status of DOD’s major space programs. As the table shows, DOD is also in the beginning phases of acquiring several constellations of new satellites and ground processing capabilities—including for missile warning, protected communications, space-based environmental monitoring, and space command and control. We have work underway to assess the Air Force’s space command and control development efforts and examine DOD’s analysis of alternatives for wideband communication services. For a more complete description of these major space programs, see appendix I. In addition, DOD is exploring alternatives for acquiring wideband satellite communications as well as funding development of new launch vehicles as it pursues a new acquisition strategy for procuring launch services. Our prior work has shown that many major DOD space programs have experienced significant cost increases and schedule delays. For instance, the total program cost for the Advanced Extremely High Frequency (AEHF) satellite program, a protected satellite communications system, has grown 117 percent since the program’s original cost estimate and its first satellite was launched more than 3.5 years late. For the Space Based Infrared System (SBIRS), a missile warning satellite program, the program cost grew 265 percent from its original estimate and the launch of the first satellite was delayed roughly 9 years. Both programs moved to the production phase where fewer problems tend to surface, and where there is typically less risk of significant cost and schedule growth. A more recent major satellite program, Global Positioning System (GPS) III, has seen an almost 4-year delay due to technical issues and program cost growth of about 32 percent. Cost and schedule growth has also been a challenge for satellite ground systems and user equipment. Ground system delays have been so lengthy, that satellites sometimes spend years in orbit before key capabilities can be fully exploited. For example, The command and control system for GPS III satellites, known as the Next Generation Operational Control System, or OCX, is approximately 5 years behind schedule. As a result, the Air Force has had to start two separate back-up efforts to modify the current ground system to ensure the continuity of GPS capabilities and to make anti- jamming capabilities available via Military Code, or M-code, until OCX is delivered. Our ongoing review of GPS includes an assessment of OCX schedule risk and potential impacts on OCX delivery, acceptance, and operation. We expect to issue our report on GPS in spring 2019. Development of GPS user equipment that can utilize the M-Code signal has lagged behind the fielding of GPS M-code satellites for more than a decade, due to prolonged development challenges. In December 2017, we found that while DOD had made some progress on initial testing of the receiver cards needed to utilize the M-code signal, additional development was necessary to make M-code work with the over 700 weapon systems that require it. We also found that DOD had begun initial planning to transition some weapon systems to use M-code receivers, but significantly more work remained to understand the cost and schedule of transitioning to M-code receivers across DOD. Further, in December 2017, we found that multiple entities were separately maturing their own receiver cards. We recommended that DOD assign responsibility to a single organization to collect test data, lessons learned, and design solutions so that common design solutions are employed and DOD could avoid duplication of efforts. DOD concurred with the recommendation, but has not yet taken action on it. We have previously reported that over 90 percent of the capabilities to be provided by Mobile User Objective System communications satellites—currently, five satellites are in orbit, the first of which launched in 2012—are being underutilized because of difficulties with integrating the space, ground, and terminal segments and delays in fielding compatible user terminals. Largely because of technical and management challenges, the Joint Space Operations Center Mission System (JMS) Increment 2 program—intended to replace and improve upon an aging space situational awareness and command and control system—was almost 3 years behind schedule and 42 percent over budget before the Air Force stopped development work last year. Last month, we reported that operational testing in 2018 found that JMS Increment 2 was not operationally effective or suitable due, in part, to missing software requirements, urgent deficiencies that affected system performance, and negative user feedback. Cost and schedule growth in DOD’s space programs is sometimes driven by the inherent risks associated with developing complex space technology; however, over the past 10 years we have identified a number of other management and oversight problems that have worsened the situation. These include making overly optimistic cost and schedule estimates, pushing programs forward without sufficient knowledge about technology and design, and experiencing problems in overseeing and managing contractors, among others. We have also noted that some of DOD’s programs with operational satellites, such as SBIRS, were also exceedingly ambitious, which in turn increased technology, design, and engineering risks. While SBIRS and other satellite programs provide users with important and useful capabilities, their cost growth has significantly limited the department’s buying power at a time when more resources may be needed to protect space systems and recapitalize the space portfolio. DOD faces significant challenges as it replenishes its satellite constellations. First, DOD is confronted with growing threats in space, which may require very different satellite architectures and acquisition strategies. Second, DOD is in the midst of planning major changes to its leadership for space. While these changes are designed to streamline decision-making and bring together a dispersed space workforce, they could cause some disruption to space system acquisition programs. Third, in fiscal year 2016, Congress required DOD to establish guidance to speed up acquisition timeframes by streamlining acquisition processes and oversight for certain acquisitions. GAO is examining DOD’s application of streamlining to its weapons programs. For space, challenges with past streamlining efforts may offer some lessons learned. And fourth, DOD may face resource and capacity challenges in taking on multiple space acquisitions at one time. For example, our work and other reports point to potential gaps in the space acquisition workforce and ongoing difficulties managing software development. According to Air Force Space Command and others, U.S. space systems face intentional and unintentional threats that have increased rapidly over the past 20 years. These include radio frequency interference (including jamming), laser attacks, kinetic intercept vehicles, and ground system attacks. Additionally, the hazards of the already-harsh space environment (e.g., extreme temperature fluctuations and radiation) have increased, including numbers of active and inactive satellites, spent rocket bodies, and other fragments and debris. According to a February 2019 Defense Intelligence Agency report, China and Russia in particular are developing a variety of means to exploit perceived U.S. reliance on space-based systems and challenge the U.S. position in space. The report also states that Iran and North Korea have demonstrated some counterspace capabilities that could pose a threat to militaries using space-based services. In response, recent governmentwide and DOD strategic and policy guidance have stressed the need for U.S. space systems to be survivable or resilient against such threats and DOD has taken steps to be more resilient in some of its new programs. As we found in October 2014, one way to do this is to build more disaggregated systems, including dispersing sensors onto separate satellites; using multiple domains, including space, air, and ground to provide full mission capabilities; hosting payloads on other government or commercial spacecraft; or some combination of these. With capabilities distributed across multiple platforms, rather than centralized onto just a few satellites, it may be more difficult for an adversary to target all assets to attack full system capabilities, and if an attack does take place, the loss of one smaller satellite or payload could result in less capability loss than damage to, or loss of, a large multifunctional satellite. In addition to disaggregation, DOD could make satellites more maneuverable and build in defense capabilities to protect themselves as a means to increase survivability. We also found in October 2014 that some of these options could have beneficial impacts on acquisition. For example, acquiring smaller, less complex satellites may require less time and effort to develop and produce. This may be in part due to improved requirements discipline, as more frequent production rates may allow program managers to delay new requirements to the next production cycle instead of incorporating them into ongoing timelines midstream. Building more, less-complex satellites might also provide DOD the opportunity to use commercial products and systems that have already been tested in the market. At the same time, however, addressing the need to make satellites more resilient could introduce complications. For example, DOD may need to acquire higher quantities of satellites, which may make it more difficult to manage acquisition schedules. In addition, potentially more development and production contracts may result in more complexity for program offices to manage, requiring increased oversight of contractors. Adding more satellites and new technologies may also complicate efforts to synchronize satellite, terminal, and ground system schedules, limiting delivery of capabilities to end users. Our work has also found potential barriers to making satellites more resilient. For example, in October 2014, we found that disaggregation could require DOD to make significant cultural and process changes in how it acquires space systems—for instance, by relying on new contractors, relinquishing control to providers who host government payloads on commercial satellites, using different contracting methods, and executing smaller but more numerous and faster-paced acquisition programs. It will likely require DOD to be more flexible and agile when it comes to satellite acquisitions, especially with regard to coordinating satellite delivery with interdependent systems, such as user equipment. Yet, as we have previously found, DOD’s culture has generally been resistant to changes in space acquisition approaches, and fragmented responsibilities have made it very difficult to coordinate and deliver interdependent systems. Senior leaders have recognized the need to change the space acquisition culture, and as discussed below, changes are being made to space leadership and acquisition approaches. More recently, in July 2018, we found that two factors have contributed to DOD’s limited use of commercially hosted payloads. First, DOD officials identified logistical challenges to matching government payloads with any given commercial host satellite. For example, most of the offices we spoke with cited size, weight, and power constraints, among others, as barriers to using hosted payloads. Second, while individual DOD offices have realized cost and schedule benefits from using hosted payloads, DOD as a whole has limited information on costs and benefits of hosted payloads. Further, the knowledge DOD obtained is fragmented across the agency—with multiple offices collecting piecemeal information on the use of hosted payloads. The limited knowledge and data on hosted payloads that is fragmented across the agency has contributed to resistance among space acquisition officials to adopting this approach. We recommended, and DOD concurred, that the department bolster and centralize collection and analysis of cost, technical, and lessons learned data on its use of hosted payloads. Lastly, in October 2018, we found that DOD faced mounting challenges in protecting its weapon systems—satellites and their ground systems included—from increasingly sophisticated cyber threats. We reported that this was due to the computerized nature of weapon systems, DOD’s late start in prioritizing weapon system cybersecurity, and DOD’s nascent understanding of how to develop more secure weapon systems. In operational testing, DOD routinely found mission-critical cyber vulnerabilities in systems that were under development, yet program officials GAO met with believed their systems were secure and even discounted some test results as unrealistic. Using relatively simple tools and techniques, testers were able to take control of systems and operate largely undetected, due in part to basic issues such as poor password management and unencrypted communications. DOD has recently taken several steps to improve weapon system cybersecurity, including issuing and revising policies and guidance to better incorporate cybersecurity considerations. Further, in response to congressional direction, DOD has also begun initiatives to better understand and address cyber vulnerabilities. We and others have reported for over two decades that fragmentation and overlap in DOD space acquisition management and oversight have contributed to program delays and cancellations, cost increases, and inefficient operations. For example, in February 2012 we found that fragmented leadership contributed to a 10-year gap between the delivery of GPS satellites and associated user equipment. The cancellations of several large programs over the past 2 decades were in part because of disagreements and conflicts among stakeholders. In July 2016, in response to a provision of a Senate Report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2016, we issued a report that reviewed space leadership in more depth and concluded that DOD space leadership was fragmented. We identified approximately 60 stakeholder organizations across DOD, the Executive Office of the President, the Intelligence Community, and civilian agencies. Of these, eight organizations had space acquisition management responsibilities; eleven had oversight responsibilities; and six were involved in setting requirements for defense space programs. At the same time, many experts stated that no one seemed to be in charge of space acquisitions. Our report highlighted the pros and cons of various options to reorganize space functions recommended in prior congressionally-chartered studies. The issue has taken on more importance in recent years, as DOD has realized satellites are highly vulnerable to attacks and needs to make dramatic changes in space system architectures and operations. We have found that leadership has not been focused enough to overcome interagency rivalries and resistance to change, and it has not been able to get concurrence on future architectures. The President’s Administration and DOD have taken significant steps to change space leadership. Most recent is the President’s Space Policy Directive-4, issued on February 19, 2019, and DOD’s subsequent legislative proposal submitted on March 1, 2019, to establish a United States Space Force as a sixth branch of the United States Armed Forces within the Department of the Air Force. The Policy Directive states that this is an important step toward a future military department for space and that the Space Force will (1) consolidate existing forces and authorities for military space activities, as appropriate, to minimize duplication of effort and eliminate bureaucratic inefficiencies; and (2) not include the National Aeronautics and Space Administration, the National Oceanic and Atmospheric Administration, the National Reconnaissance Office, or other non-military space organizations or missions of the United States Government. According to the Policy Directive, the Space Force would include the uniformed and civilian personnel conducting and directly supporting space operations from all DOD Armed Forces, assume responsibilities for all major military space acquisition programs, and create the appropriate career tracks for military and civilian space personnel across all relevant specialties. Pertaining to organization and leadership, the Policy Directive states that there should be a civilian Under Secretary of the Air Force for Space, to be known as the Under Secretary for Space, appointed by the President, and establishes a Chief of Staff of the Space Force, who would serve as a member of the Joint Chiefs of Staff. Furthermore, the Policy Directive states that as the Space Force matures, and as national security requires, it will become necessary to create a separate military department, to be known as the Department of the Space Force. This department would take over some or all responsibilities for the Space Force from the Department of the Air Force. The Policy Directive requires the Secretary of Defense to conduct periodic reviews to determine when to recommend that the President seek legislation to establish such a department. Our past work has identified fragmentation in space leadership, but because implementation has not yet occurred, it remains to be seen whether this policy directive and proposed legislation would resolve these issues. In implementing these changes there are many complexities to consider. For example, because space capabilities are acquired and used across the military services and defense agencies, it will be important to address many details on how to implement a Space Force among these equities. Our past work suggests that without close attention to the consequences of the compromises that will inevitably have to be made to carve out a new force structure from existing space functions, there is risk of exacerbating the fragmentation and ineffective management and oversight the Space Force is intended to address. For instance, in March 2019, DOD established the Space Development Agency to unify and integrate efforts across DOD to define, develop, and field innovative solutions. But it is unclear how this new organization will mesh with the Air Force Space and Missile Systems Center, which acquires satellites, the Defense Advanced Research Projects Agency, which creates breakthrough technologies and capabilities, and similar organizations. Moreover, even if changes are implemented effectively, they are only a first step toward addressing space acquisition problems. As we discuss below, programs will still need to embrace acquisition best practices, such as using demonstrable knowledge to make decisions. Our prior work has found that they will also need to be open to flexible and innovative approaches, and work effectively with a very wide range of stakeholders, including those that will not be part of the Space Force, such as the intelligence agencies, civilian space agencies, the current military services, as well as entities within the Office of the Secretary of Defense who help oversee and manage acquisitions. Senior leaders have acknowledged that additional changes are needed and have taken steps to help bring them about, such as the restructuring of the Air Force’s Space and Missile Systems Center, which is designed to break down stovepipes and streamline acquisition processes. DOD is managing a number of new space acquisition programs using a new authority, established under Section 804 of the National Defense Authorization Act for Fiscal Year 2016, which is to provide a streamlined alternative to the traditional DOD acquisition process. Specifically, the programs—which include follow-on missile warning and protected communications satellites, among others—will be exempted from the acquisition and requirements processes defined by DOD Directive 5000.01 and the Joint Capabilities Integration and Development System. Instead, program managers are encouraged to use a tailored approach to documentation and oversight to enable them to demonstrate new technologies or field new or updated systems within 2 to 5 years. We have ongoing work looking across the military departments at how middle-tier acquisition authority is being implemented, including for the Air Force’s space acquisition programs, and plan to issue a report later this spring. GAO and others have highlighted lessons learned from past efforts to streamline, specifically with an approach adopted for space systems in the 1990s known as Total System Performance Responsibility (TSPR). TSPR was intended to facilitate acquisition reform and enable DOD to streamline its acquisition process and leverage innovation and management expertise from the private sector. Specifically, TSPR gave a contractor total responsibility for the integration of an entire weapon system and for meeting DOD’s requirements. We found in May 2009 that because this reform made the contractor responsible for day-to-day program management, DOD did not require formal deliverable documents—such as earned value management reports—to assess the status and performance of the contractor. As a result, DOD’s capability to lead and manage the space acquisition process diminished, which magnified problems related to unstable requirements and poor contractor performance. Further, the reduction in DOD oversight and involvement led to major reductions in various government capabilities, including cost- estimating and systems-engineering staff. This, in turn, led to a lack of technical data needed to develop sound cost estimates. Best practices that we identified in the aftermath of TSPR include retaining strong oversight and insight into programs; using quantifiable data and demonstrable knowledge to make decisions to proceed, not allowing development to proceed until certain thresholds are met, empowering program managers to make decisions on the direction of the program but also holding them accountable for their choices, and canceling unsuccessful programs. Similarly, in its study of TSPR programs, the Defense Science Board/Air Force Scientific Advisory Board Joint Task Force emphasized the importance of managing requirements, sufficiently funding programs, participating in trade-off studies, and assuring that proven engineering practices characterize program implementation, among other actions. See appendix II for a more complete list of the best practices we have identified for developing complex systems. DOD is simultaneously undertaking new major acquisition efforts to replenish its missile warning, protected communications, GPS, and weather satellites. At the same time, it is boosting efforts to increase space situational awareness and protect space assets. It is also helping to fund the development of new launch vehicles, and it is considering additional significant acquisitions in wideband satellite communications and in support of missile defense activities. While there is increased attention within DOD on funding for space and building the Space Force, such widespread acquisition activities could still pose resource challenges. For example: Funding requests for space system modernization have in the past 10 years represented a small percentage (3.9 to 5 percent) of total weapon system modernization funding DOD requested. Space is competing with ships, aircraft, and the nuclear triad, among other programs for funding. This can be challenging, because over the past 2 years, DOD has begun over 9 new space acquisition programs to recapitalize current space capabilities and enhance system resiliency. In the past, we have found that it has been difficult for DOD to fund multiple new space programs at one time, particularly when it was concurrently struggling with cost overruns and schedule delays from its legacy programs. For example, OCX system development challenges have resulted in a $2.5 billion cost increase and approximate 5-year delay to the system becoming operational— using more resources for a longer time—at a cost to other programs. It is unclear whether DOD has a sufficient workforce to manage multiple new space programs. We issued a report last month that found DOD did not routinely monitor the size, mix, and location of its space acquisition workforce. We collected and aggregated data from multiple DOD space acquisition organizations and found that at least 8,000 personnel in multiple locations nationwide were working on space acquisition activities at the end of 2017. Echoing concerns raised in our prior work, we also found that DOD had difficulty attracting and retaining candidates with the requisite technical expertise. Officials from the Air Force’s Space and Missile Systems Center were concerned that there are not enough experienced mid- level acquisition personnel and also expressed concern that the bulk of military personnel assigned to program management positions were more junior in rank than the Center was authorized to obtain. We recommended that DOD (1) identify the universe of its space acquisition programs and the organizations that support them, and (2) collect and maintain data on the workforce supporting these programs. DOD concurred with our first recommendation but not the second. Software is an increasingly important enabler of DOD space systems. However, DOD has struggled to deliver software-intensive space programs that meet operational requirements within expected time frames. Although user involvement is critical to the success of any software development effort, we found in our report issued last month on DOD software-intensive space programs that the programs we reviewed that experienced cost or schedule breaches often did not effectively engage users to understand requirements and obtain feedback. Program efforts to involve users and incorporate feedback frequently did not match plans. The lack of user engagement has contributed to systems that were later found to be operationally unsuitable. The programs we reviewed also faced challenges in delivering software in shorter time frames, and in using commercial software, applying outdated tools and metrics, as well as having limited knowledge and training in newer software development techniques. DOD acknowledged these challenges and is taking steps to address them, including identifying useful software development metrics and ways to include them in new contracts. We recommended, and DOD concurred, that the department ensure its guidance addressing software development provides specific, required direction on the timing, frequency, and documentation of user involvement and feedback. Moreover, it should be noted that software development has been a struggle for other non-space weapons programs as well. The Defense Innovation Board recently reported that the department’s current approach to software development is broken and is a leading source of risk to DOD—it takes too long, is too expensive, and exposes warfighters to unacceptable risk by delaying their access to the tools they need to assure mission success. Chairman Cooper, Ranking Member Turner, and Members of the Subcommittee, this concludes my statement. I am happy to answer any questions that you have. If you or your staff have any questions about this statement, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contacts for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this statement include Rich Horiuchi, Assistant Director; Erin Cohen (Analyst in Charge); Emily Bond; Claire Buck; Maricela Cherveny; Susan Ditto; Burns C. Eckert; Laura Hook; and Anne Louise Taylor. Key contributors for the previous work on which this statement is based are listed in the products cited. Our previous work on weapons acquisitions in general, and space programs in particular, identified best practices for developing complex systems. We summarize these best practices in table 3, below. DOD Space Acquisitions: Including Users Early and Often in Software Development Could Benefit Programs. GAO-19-136. Washington, D.C.: March 18, 2019. Defense Space Systems: DOD Should Collect and Maintain Data on Its Space Acquisition Workforce. GAO-19-240. Washington, D.C.: March 14, 2019. Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilitie. GAO-19-128. Washington, D.C.: October 9, 2018. Military Space Systems: DOD’s Use of Commercial Satellites to Host Defense Payloads Would Benefit from Centralizing Data. GAO-18-493. Washington, D.C.: July 30, 2018. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: April 25, 2018. Global Positioning System: Better Planning and Coordination Needed to Improve Prospects for Fielding Modernized Capability. GAO-18-74. Washington, D.C.: December 12, 2017. Space Launch: Coordination Mechanisms Facilitate Interagency Information Sharing on Acquisitions GAO-17-646R. Washington D.C.: August 9, 2017 Satellite Acquisitions: Agencies May Recover a Limited Portion of Contract Value When Satellites Fail. GAO-17-490. Washington, D.C.: June 9, 2017 Space Acquisitions: DOD Continues to Face Challenges of Delayed Delivery of Critical Space Capabilities and Fragmented Leadership. GAO-17-619T. Washington, D.C.: May 17, 2017. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: March 30, 2017. Global Positioning System: Observations on Quarterly Reports from the Air Force. GAO-17-162R. Washington, D.C.: October 17, 2016. Defense Space Acquisitions: Too Early to Determine if Recent Changes Will Resolve Persistent Fragmentation in Management and Oversight. GAO-16-592R. Washington, D.C.: July 27, 2016. Evolved Expendable Launch Vehicle: DOD Is Assessing Data on Worldwide Launch Market to Inform New Acquisition Strategy. GAO-16-661R. Washington, D.C.: July 22, 2016 Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs. GAO-16-769T, Washington, D.C.: July 7, 2016. Defense Weather Satellites: Analysis of Alternatives is Useful for Certain Capabilities, but Ineffective Coordination Limited Assessment of Two Critical Capabilities. GAO-16-252R. Washington, D.C.: March 10, 2016. Space Acquisitions: Challenges Facing DOD as it Changes Approaches to Space Acquisitions. GAO-16-471T. Washington, D.C.: March 9, 2016. Space Acquisitions: GAO Assessment of DOD Responsive Launch Report. GAO-16-156R. Washington, D.C.: October 29, 2015. Space Situational Awareness: Status of Efforts and Planned Budgets. GAO-16-6R. Washington, D.C.: October 8, 2015. GPS: Actions Needed to Address Ground System Development Problems and User Equipment Production Readiness. GAO-15-657. Washington, D.C.: September 9, 2015. Evolved Expendable Launch Vehicle: The Air Force Needs to Adopt an Incremental Approach to Future Acquisition Planning to Enable Incorporation of Lessons Learned. GAO-15-623. Washington, D.C.: August 11, 2015. Defense Satellite Communications: DOD Needs Additional Information to Improve Procurements. GAO-15-459. Washington, D.C.: July 17, 2015. Space Acquisitions: Some Programs Have Overcome Past Problems, but Challenges and Uncertainty Remain for the Future. GAO-15-492T. Washington, D.C.: April 29, 2015. Space Acquisitions: Space Based Infrared System Could Benefit from Technology Insertion Planning. GAO-15-366. Washington, D.C.: April 2, 2015. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-15-342SP. Washington, D.C.: March 12, 2015. Defense Major Automated Information Systems: Cost and Schedule Commitments Need to Be Established Earlier. GAO-15-282. Washington, D.C.: February 26, 2015. DOD Space Systems: Additional Knowledge Would Better Support Decisions about Disaggregating Large Satellites. GAO-15-7. Washington, D.C.: October 30, 2014. U.S. Launch Enterprise: Acquisition Best Practices Can Benefit Future Efforts. GAO-14-776T. Washington, D.C.: July 16, 2014. 2014 Annual Report: Additional Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve Other Financial Benefits. GAO-14-343SP. Washington, D.C.: April 8, 2014. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-14-340SP. Washington, D.C.: March 31, 2014. Space Acquisitions: Acquisition Management Continues to Improve but Challenges Persist for Current and Future Programs. GAO-14-382T. Washington, D.C.: March 12, 2014. Evolved Expendable Launch Vehicle: Introducing Competition into National Security Space Launch Acquisitions. GAO-14-259T. Washington, D.C.: March 5, 2014. The Air Force’s Evolved Expendable Launch Vehicle Competitive Procurement. GAO-14-377R. Washington, D.C.: March 4, 2014. Space Acquisitions: Assessment of Overhead Persistent Infrared Technology Report. GAO-14-287R. Washington, D.C.: January 13, 2014. Space: Defense and Civilian Agencies Request Significant Funding for Launch-Related Activities. GAO-13-802R. Washington, D.C.: September 9, 2013. Global Positioning System: A Comprehensive Assessment of Potential Options and Related Costs is Needed. GAO-13-729, Washington, D.C.: September 9, 2013. Space Acquisitions: DOD Is Overcoming Long-Standing Problems, but Faces Challenges to Ensuring Its Investments are Optimized. GAO-13-508T. Washington, D.C.: April 24, 2013. Satellite Control: Long-Term Planning and Adoption of Commercial Practices Could Improve DOD’s Operations. GAO-13-315. Washington, D.C.: April 18, 2013. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-13-294SP. Washington, D.C.: March 28, 2013. Launch Services New Entrant Certification Guide. GAO-13-317R. Washington, D.C.: February 7, 2013. Evolved Expendable Launch Vehicle: DOD Is Addressing Knowledge Gaps in Its New Acquisition Strategy. GAO-12-822. Washington, D.C.: July 26, 2012. Space Acquisitions: DOD Faces Challenges in Fully Realizing Benefits of Satellite Acquisition Improvements. GAO-12-563T. Washington, D.C.: March 21, 2012. Space and Missile Defense Acquisitions: Periodic Assessment Needed to Correct Parts Quality Problems in Major Programs. GAO-11-404. Washington, D.C.: June 24, 2011. Space Acquisitions: Development and Oversight Challenges in Delivering Improved Space Situational Awareness Capabilities. GAO-11-545. Washington, D.C.: May 27, 2011. Space Acquisitions: DOD Delivering New Generations of Satellites, but Space System Acquisition Challenges Remain. GAO-11-590T. Washington, D.C.: May 11, 2011. Global Positioning System: Challenges in Sustaining and Upgrading Capabilities Persis., GAO-10-636. Washington, D.C.: September 15, 2010. Defense Acquisitions: Challenges in Aligning Space System Components. GAO-10-55. Washington D.C.: October 29, 2009. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "DOD space systems provide critical capabilities that support military and other government operations. They can also be expensive to acquire and field, costing billions of dollars each year. As DOD seeks to replenish its satellite constellations, it faces a number of challenges to ensuring funds are used effectively. Because space-based capabilities are fundamental to U.S. national security and civilian activities, it is essential that DOD manage its space system acquisitions carefully and avoid repeating past problems. This statement provides an update on DOD's space acquisitions, focusing on challenges facing acquisitions of new space systems. This statement is based on GAO reports issued over the past 10 years on DOD space programs. In addition it draws on recent work performed in support of GAO's 2019 annual reports on the progress of major defense acquisition programs as well as duplication, overlap, and fragmentation across the federal government, among other sources. DOD is simultaneously undertaking new major acquisitions to replenish its missile warning, protected communications, navigation, and weather satellites. At the same time, it is boosting efforts to increase space situational awareness and protect space assets. Such widespread acquisition acitivites could face a wide range of resource and management challenges that GAO has reported on, including: Growing threats to satellites. Threats to satellites from both adversaries—such as jamming and cyber attacks—and space debris are increasing. DOD is making changes to how it designs its space systems to increase the resilience and survivability of space capabilities. But it has been challenged in adopting new approaches, such as using commercial satellites to host payloads, and in prioritizing cybersecurity for all of its weapon systems. For hosted payloads, GAO recommended, and DOD concurred, that the department bolster and centralize collection and analysis of cost, technical, and lessons learned data. Implementing leadership changes . DOD is planning major changes to leadership for space. It recently proposed legislation to establish a United States Space Force—initially to be housed within the Department of the Air Force—that would, according to the President's Space Policy Directive, consolidate existing military space activities and minimize duplicative efforts across DOD. GAO found in July 2016 that changes are needed to reduce fragmentation that has negatively affected space programs for many years. But open questions remain about governance as new programs get underway and whether the changes themselves may result in further fragmentation. For example, it is unclear at this time how the new Space Development Agency will mesh with organizations currently involved in testing and acquiring new space technologies. Having the right resources and know-how. While there is increased attention on funding for space and building the Space Force, new programs can still face resource challenges. DOD has begun over 9 new space programs at a time when it is also seeking increased investments in ships, aircraft, and the nuclear triad, among other programs. Moreover, it is unclear whether DOD has a sufficient workforce to manage its new programs. GAO issued a report last month that found DOD does not routinely monitor the size, mix, and location of its space acquisition workforce. Further, DOD has difficulty attracting and retaining candidates with the requisite technical expertise. GAO recommended that DOD collect and maintain data on its space acquisition workforce. DOD did not concur, but GAO maintains that DOD should have better information on such personnel, especially in light of its proposal for establishing the Space Force. GAO also found in March 2019 that selected software-intensive space programs often did not effectively engage users to understand requirements and obtain feedback. GAO recommended, and DOD concurred, that the department ensure its guidance addressing software development provides specific, required direction on the timing, frequency, and documentation of user involvement and feedback. Past GAO reports have recommended that DOD adopt acquisition best practices to help ensure cost and schedule goals are met. DOD has generally agreed and taken some actions to address these recommendations.", "document_type": "gao"}
{"report": "Medicaid is a joint federal-state health care program that provides health care coverage to low-income and medically needy individuals. At the federal level, the Centers for Medicare & Medicaid Services (CMS), within HHS, is responsible for overseeing Medicaid, while states administer their respective Medicaid programs’ day-to-day operations. Each state’s Medicaid program, by law, must cover certain categories of individuals and provide a broad array of benefits. Within these requirements, however, states have significant flexibility to design and implement their programs, resulting in more than 50 distinct state-based programs. The federal government requires coverage for certain mandatory services under Medicaid, but states may decide to include other optional services as well. Some of the largest and most commonly included services include prescription drugs, nursing facilities, home and community-based care, and hospital inpatient care. Although pharmacy coverage is an optional service under Medicaid, all 50 states and the District of Columbia provide coverage for prescription drugs. State Medicaid programs that opt to cover prescription drugs are generally required to cover all of the outpatient drugs of any drug manufacturer participating in the Medicaid Drug Rebate Program, including all of the drugs’ formats. State Medicaid programs do not directly purchase prescription drugs, but instead reimburse pharmacies for covered prescription drugs dispensed to Medicaid beneficiaries. Providers (including physicians, nurse practitioners, and physician assistants) and pharmacies provide health care services, seek payment, and are reimbursed for services by state Medicaid agencies. States may directly pay health care providers for services rendered using a fee-for- service system or may delegate these responsibilities to MCOs. Under managed care, the state contracts with MCOs to provide comprehensive health care services through its network of providers. Buprenorphine, buprenorphine-naloxone, and naltrexone may be prescribed, administered, or dispensed for use in MAT. These medications come in a variety of formats, including oral, implantable, and injectable. Buprenorphine. Buprenorphine is a partial opioid agonist, meaning it binds to opioid receptors and activates them. It reduces or eliminates opioid withdrawal symptoms, including drug cravings, and blunts the euphoria or dangerous side effects of other opioids, such as heroin. It can be used for detoxification treatment and maintenance therapy. Buprenorphine is available as a MAT medication in two oral formats—(1) tablets for sublingual (under the tongue) administration, and (2) film for sublingual or buccal (inside the cheek) administration; as a subdermal (under the skin) implant; and in an injectable format. Oral formats are often used for beneficiaries that are in the beginning stages of treatment. The implantable format is generally used for beneficiaries who are already stable on a low or moderate dosage of oral buprenorphine. The oral formats are taken daily, while the injectable format is administered monthly, and the implantable format is administered every 6 months. The medication carries a risk of abuse, particularly in oral formats where it can be used inappropriately or illegally re-sold. The injectable and implantable formats of buprenorphine are intended to minimize this risk and to increase beneficiary compliance, because the medication is administered by a provider. Buprenorphine-naloxone. Naloxone is a medication added to some oral formats of buprenorphine to reduce the chances of misuse or abuse. Buprenorphine-naloxone is available in an oral format as either a film or a tablet. It discourages people from inappropriately injecting a crushed and dissolved tablet of buprenorphine by inducing symptoms of opioid withdrawal when injected by individuals physically dependent on opioids. Naltrexone. Naltrexone is an opioid antagonist, meaning it binds to opioid receptors, but does not activate them, thereby blocking the euphoria the user would normally feel from opioids. It also may result in withdrawal symptoms if recent opioid use has occurred. Therefore, it is used for relapse prevention following complete detoxification from opioids. It can be taken daily in an oral format or as a once-monthly injection; though due to low patient compliance, SAMHSA does not recommend using oral naltrexone for OUD treatment. Naltrexone carries no known risk of abuse. For the injectable format of naltrexone, beneficiaries have to be free from opioids for at least a week before they can begin the medication. Subject to certain requirements, state Medicaid agencies may use different strategies, such as prior authorization and preferred drug lists (PDL), to manage the cost of prescription medications and ensure that patients are taking medications that are clinically appropriate. Prior authorization requires that certain conditions are met before services can be provided to patients, in part, to control utilization and prevent improper payments. PDLs reflect state Medicaid agencies’ determinations on whether medications, including those used for MAT, will be covered and whether these medications will be categorized as preferred or non- preferred. A PDL indicates the first-choice or preferred medication for a beneficiary’s particular medical condition. PDLs are utilized by state Medicaid agencies to incentivize providers to prescribe certain types of medications. In addition, the preferred or non-preferred categorization of medication can vary between fee-for-service and managed care plans within a state. If a medication is not listed on a PDL, prior authorization may be required. However, medications listed on a PDL may still have prior authorization requirements, such as requirements to ensure patient safety. There are three distribution methods by which beneficiaries can obtain MAT medications. (See fig. 1.) 1. Retail pharmacy. After receiving a prescription from a health care provider, pharmacists at a retail pharmacy, such as CVS or Walgreens, prepare and dispense (or deliver) the medication directly to a beneficiary. The pharmacist is reimbursed for the cost of the medication by a payer, such as Medicaid or private insurance, and by any co-payment from the beneficiary. 2. External delivery from a specialty pharmacy. After receiving a prescription from a physician or other health care provider, a specialty pharmacy delivers the medication directly to the provider so the medication can be administered (injected or implanted by the provider) to the beneficiary for whom it was prescribed. The specialty pharmacy ensures that any specific requirements for a medication are maintained; for example, injectable naltrexone requires the use of refrigerated warehouses, insulated shipping containers, and temperature monitoring equipment. The specialty pharmacy is reimbursed by Medicaid or another payer. 3. Buy-and-bill. A health care provider purchases the medication from a manufacturer or distributor and stores the medication until it is dispensed or administered to the appropriate patient. After the medication is dispensed or administered, the provider bills Medicaid or another payer for the cost of the medication. Each of the distribution methods used for MAT medications has characteristics with implications for beneficiaries, providers, pharmacies, and payers. (See table 1.) Medications containing buprenorphine, including buprenorphine- naloxone, are considered controlled substances, which are governed at the federal level by the Controlled Substances Act (CSA), and may be subject to state laws as well. The CSA assigns controlled substances— including narcotics, stimulants, depressants, hallucinogens, and anabolic steroids—to one of five schedules based on the substance’s medical use, potential for abuse, and risk of dependence. In addition to the laws and regulations that apply to controlled substances generally, buprenorphine—when used in the treatment of OUD—is subject to additional requirements under the CSA and implementing regulations issued by the Drug Enforcement Administration (DEA) and SAMHSA. Buprenorphine can be administered or dispensed in a SAMHSA-certified and DEA-registered opioid treatment program when used for OUD treatment. In addition, eligible providers may obtain a Drug Addiction Treatment Act of 2000 (DATA 2000) waiver from SAMHSA in order to dispense or prescribe buprenorphine, including buprenorphine- naloxone, to a limited number of patients for OUD treatment in an office- based setting, such as a doctor’s office. Until 2016, only physicians were eligible to receive a DATA 2000 waiver. However, the Comprehensive Addiction and Recovery Act of 2016 amended the CSA to allow nurse practitioners and physician assistants to receive a DATA 2000 waiver through October 1, 2021. In 2018, the SUPPORT Act eliminated the time limit, thereby permanently allowing nurse practitioners and physician assistants to obtain DATA 2000 waivers. To qualify for a waiver, providers must be appropriately licensed under state law and meet applicable certification, training, or experience requirements. Providers who prescribe, dispense, or administer buprenorphine under a DATA 2000 waiver are also subject to the CSA’s inventory and recordkeeping requirement. The waiver requirements include the following: Physicians must complete an 8-hour training course or have certain certifications or experiences, while nurse practitioners and physician assistants must complete a 24-hour training course. Physicians that receive a DATA 2000 waiver can generally treat 30 patients in their first year and may apply to increase to 100 patients after a year. Physicians that meet certain criteria can treat 100 patients in the first year and up to 275 patients after one year of prescribing at the 100- patient limit. Nurse practitioners and physician assistants may treat 30 patients in their first year with the waiver and 100 patients thereafter. State Medicaid programs have policies related to the coverage and distribution of prescription drugs that can restrict beneficiary access to MAT medications. CMS has undertaken various coordination efforts aimed generally at addressing OUD. Federal requirements and state laws can also restrict beneficiaries’ access to the treatment medications. Our review of research and interviews with stakeholders found that several state Medicaid program policies related to prescription drug coverage and distribution can restrict beneficiaries’ access to MAT medications. These are policies governing coverage of MAT medications, prior authorization requirements, preferred drug lists, and limits placed on distribution methods. While some of these policies are generally used to manage utilization and costs related to a wide range of medications, the research we reviewed and stakeholders we interviewed said that these policies can also restrict beneficiaries’ access to the medications used in MAT. In what follows, we describe these policies, including selected states’ and CMS efforts to address the potential access barriers related to these policies. Recent research suggests that several state Medicaid programs may not cover all MAT medications in all formats. Specifically, in 2018, SAMHSA reported that while all 50 states’ and the District of Columbia’s Medicaid programs covered oral formats of MAT medications and extended-release injectable naltrexone, it found no indication that 21 states (41 percent) covered either implantable buprenorphine, extended-release injectable buprenorphine, or both. CMS officials said that evidence of coverage may be difficult to find if the medications are billed as part of a medical procedure rather than separately as a medication. However, according to the study’s methodology, SAMHSA took steps to check whether the MAT medications were covered as a medical procedure, and did not find any evidence of such coverage. According to CMS officials, all the manufacturers of MAT medications in our review participate in the Medicaid Drug Rebate Program, and as a result, state Medicaid programs are required to cover these medications and all their formats. CMS officials stated that the agency generally investigates complaints about lack of drug coverage, but had not received any complaints regarding MAT medications. In addition, the officials said they were unaware of the SAMHSA report and had not taken action based on the report’s findings. Therefore, CMS lacks the information to confirm whether or to what extent gaps may exist in state Medicaid programs’ coverage of MAT medications in all formats, as SAMHSA’s report indicates. As such, Medicaid beneficiaries undergoing medication-assisted treatment may not have access to the medications they need for treatment and that are required by law to be covered. In addition, the SUPPORT Act includes a new requirement for state Medicaid programs to cover medication-assisted treatment, including all Food and Drug Administration-approved MAT medications, from October 2020 through September 2025. CMS officials stated that the agency is drafting guidance related to this requirement and plans to communicate the guidance to state Medicaid programs through a State Medicaid Director Letter prior to October 2020. The officials told us that they have not determined when the guidance will be issued. When state Medicaid agencies cover a MAT medication, they may impose certain constraints, including requiring prior authorization from the MCO or the state Medicaid agency, before a beneficiary can receive the medication. However, these requirements can have unintended consequences, such as preventing timely access to MAT. According to SAMHSA’s 2018 report, several states use prior authorizations to ensure that patients receive behavioral therapy in addition to their MAT medications or to ensure that patients have abstained from opioids for a certain period of time, which is necessary before receiving a naltrexone injection. Further, when a patient switches from one medication to another (or another format of the same medication), prior authorization may be required for a variety of reasons, such as to ensure patient safety. Officials from a stakeholder organization representing providers and officials from a manufacturer said that prior authorization for injectable buprenorphine was particularly burdensome and that decisions on whether the state Medicaid agency will allow a prescription to be dispensed can take up to 14 days. Providers in our selected states and literature we reviewed noted that these delays could be life threatening, because patients may return to drug use and possibly overdose before receiving their medication. We were also told by officials from one manufacturer that small providers may not have the office staff to promptly process the prior authorization paperwork, creating additional delays. Potential Consequences of OUD Patients Missing Treatment A health care provider told us that patients receiving treatment for opioid use disorder (OUD) need consistent access to medication- assisted treatment (MAT) medications, just as diabetic patients need consistent access to insulin. According to a survey of providers, patients with OUD who experience delays in their MAT medications could lose motivation for their treatment, which could be life threatening. Literature we reviewed and stakeholders we interviewed described other ways that prior authorization requirements can delay access to MAT medications for Medicaid beneficiaries and other patients. The examples described include the following: Talking to patients before authorizing medications. According to literature we reviewed and officials we spoke with from a manufacturer and an organization representing providers, some insurance companies require that their staff or the pharmacist talk to the patient before approving a MAT medication when using external delivery from a specialty pharmacy. This is to affirm that the patient wants the medication and agrees that the pharmacy can bill the state Medicaid program. However, speaking directly to patients can be particularly challenging for this population. Officials representing a manufacturer of a MAT medication and officials representing a health care provider organization noted that patients undergoing residential treatment may not have access to a phone, and patients in outpatient treatment are often encouraged to change their phone numbers to reduce contact with people involved in their past drug use. Also, patients may not answer phone calls from unrecognized numbers. Medication reauthorization. Providers from the District of Columbia told us that they need to reauthorize MAT medication prescriptions every 6 months, but patients may not realize the authorization is about to expire so they run out of the medication, causing them to wait hours or days to get the new prescription filled. Transportation. Prior authorization requirements for MAT medications can result in multiple trips to the pharmacy, which is problematic for patients and beneficiaries without adequate transportation. Providers from the District of Columbia noted that sometimes prescriptions for MAT medications are not ready for patients when they arrive at the pharmacy, and repeated trips to the pharmacy can be problematic for those who lack adequate transportation. Nevertheless, the patient may need multiple trips to go back to the provider and then the pharmacy again, which can be especially challenging. Fail-first requirements. Literature we reviewed, officials we interviewed representing a provider organization, and state Medicaid officials and providers noted that some prior authorizations require that a provider cannot begin treatment with certain MAT medications until treatment with other MAT medications has failed. This literature indicated that this treatment failure can increase the risk of drug use, overdose, and death. Some states have taken steps to reduce these access barriers by removing prior authorizations through changes in state policies or laws. Officials from a nonprofit organization specializing in addressing addiction told us that, as of September 1, 2019, at least 12 states had laws that prohibited prior authorizations for substance use disorder medications, including MAT medications. States may also address prior authorizations through other means, such as policies or guidance. Among our selected states, all four have taken steps to remove prior authorization requirements. The District of Columbia began to generally allow providers to prescribe and dispense MAT medications without prior authorization in April 2019. Minnesota Medicaid officials told us that in August 2018 they removed prior authorization requirements for all MAT medications on their PDL. North Carolina Medicaid officials told us that in November 2017 they eliminated their prior authorization requirement for providers to submit a treatment plan before treating patients with any MAT medication. After the requirement was removed, the officials observed an increase in beneficiaries receiving MAT medications and an increase in the number of providers writing prescriptions for buprenorphine. The officials said North Carolina has never required prior authorization for injectable buprenorphine, but that the state does have some prior authorization requirements for certain forms of oral buprenorphine or buprenorphine-naloxone. Specifically, in order to prescribe an alternative oral medication, the provider needs to demonstrate the patient tried and failed with or is medically unable to use the buprenorphine-naloxone film. Ohio Medicaid officials told us they have no prior authorization requirements for injectable naltrexone, and they removed prior authorization requirements for oral buprenorphine in January 2019. According to the officials, the state has prior authorization requirements for implantable and injectable buprenorphine to ensure patients are initially stable on oral buprenorphine before beginning these other formats. According to stakeholders we interviewed, having multiple PDLs within a state or changing PDLs can create confusion for health care providers, because they need to keep track of and follow different requirements for the same MAT medication. Such confusion can result in reduced beneficiary access to MAT medications. For example, in the District of Columbia, four MCOs and the fee-for-service program have separate PDLs. Health care providers in the District of Columbia told us that the four MCOs have different dosage restrictions for the same MAT medications. A stakeholder group representing pharmacies told us that having a uniform PDL for the state makes it easier for pharmacists to comply with the relevant restrictions and minimize delays in accessing MAT medications. In addition, a PDL may change multiple times within a short time frame, which can create further problems for patients who had become comfortable with the medication they had been taking, according to officials from a provider organization. To address any possible confusion due to the use of multiple PDLs, some states have a uniform PDL for their Medicaid programs, which means that all PDLs used in the state cover the same MAT medications in the same way. Uniform PDLs can simplify the process for prescribers and eliminate some confusion for beneficiaries when they switch health plans. For example, Minnesota implemented a uniform PDL in July 2019 to ensure more consistent access for Medicaid beneficiaries and minimize disruptions if a beneficiary changes health plans. In addition, North Carolina plans to institute a uniform PDL when its Medicaid program moves to a managed care model in November 2019. Ohio also plans to institute a uniform PDL across the state in January 2020. Ohio Medicaid officials told us the uniform PDL will have both brand name and generic oral buprenorphine as preferred medications. According to stakeholders we interviewed, the characteristics of each distribution method, as well as states’ policies on distribution methods, have implications for beneficiary access to MAT medications. The following describe the different ways in which the distribution methods may restrict beneficiaries’ access to MAT medications. Retail pharmacies generally offer access to oral formulations of medications. However, retail pharmacies do not typically administer injectable or implantable buprenorphine, and some retail pharmacies may choose not to offer any MAT medications. One survey of physicians found that some pharmacies may either treat individuals prescribed buprenorphine poorly or refuse to carry the MAT medications. External delivery from specialty pharmacies is often used by providers for the injectable or implantable MAT medications, because the specialty pharmacy deals with the administrative responsibilities of the prescription; however, processing delays can impede access to MAT medications through this method, according to literature we reviewed and stakeholders we interviewed. These specialty pharmacies handle the administrative responsibilities of acquiring the medication, including purchasing the medication and sending it to the provider for administration, and receiving reimbursement from the payer, such as Medicaid. Health care providers who administer these medications may still encounter logistical challenges in their acquisition and storage. Other challenges identified by literature and stakeholders include the following: The patient must return to the provider for a follow-up appointment to receive the medication, because the medication is delivered to the provider. However, if the patient does not return, stakeholders—including those representing specialty pharmacies—told us that the unused medication must be disposed of. Providers may face challenges ensuring staff are available to receive medication deliveries—particularly in rural locations or in small practices with multiple office locations that are not always staffed, according to stakeholders representing specialty pharmacies and providers. Prescriptions are not always filled by the specialty pharmacy until they have confirmed that they will be reimbursed by the payer, according to officials from one manufacturer we interviewed. The officials stated that when the claim is processed manually, it can take over 20 days to fill the prescription. In contrast, the officials said that if a claim can be processed electronically, payment and delivery of the medication can be almost immediate. Buy-and-bill distribution allows patients to have immediate access to MAT medications, because their provider has the medications in stock; however, some providers prefer not to use this method, because it places them at financial risk. In particular, smaller health care practices may not have the infrastructure or resources to deal with the administrative responsibilities associated with buy-and-bill, and they may not have the financial ability to pay for medications up front and then wait for reimbursement, according to stakeholders we interviewed. For example, one stakeholder we interviewed said that the cost for just 2 to 3 doses of injectable medication obtained through buy-and-bill could take up a significant portion of the profit margin for a smaller medical practice. Furthermore, if patients do not use these medications before they expire or if the reimbursement from the payer does not equal the cost of the medication, the provider may face a financial loss. According to providers we interviewed in our four selected states, the high cost of some medications—as much as $1,200 per dose for injectable medications—makes the financial risk of buy-and-bill too high. Providers also told us that some providers choose not to store buprenorphine, because they are concerned that they could be subject to a DEA inspection. Surveys of health care providers have found provider concerns related to these inspections. And as with specialty pharmacies, the provider must have someone available to receive deliveries, which can be difficult for smaller practices, according to providers in our selected states. How Access Barriers Can Affect Opioid Use Disorder Treatment A health care provider we interviewed described how access barriers affected a Medicaid beneficiary’s opioid use disorder treatment. This beneficiary was initially prescribed oral buprenorphine, but the medication was repeatedly stolen by the patient’s partner. The provider and beneficiary agreed that injectable buprenorphine would allow treatment to continue without the risk of theft. Initially, the provider was not able to find a specialty pharmacy with an electronic prescription system compatible with the provider’s system, which was necessary to receive the prescriptions. The provider told us that after a compatible specialty pharmacy was identified and the order was completed, the delivery was further delayed, because two staff members—as required—were not available to sign for the delivery when it arrived. Three months after the decision was made to switch medications, the delivery was completed and the provider administered the medication. Furthermore, state Medicaid policies that require or prevent the use of certain distribution methods for MAT medications can restrict providers from using methods that may be best suited for their patients or practice, which may in turn affect beneficiaries’ access to the medications, according to stakeholders. Medicaid officials and providers we interviewed told us that some states require the use of certain distribution methods when a provider prescribes a MAT medication. For example, Minnesota’s fee-for-service plan (which covers about 25 percent of the state’s Medicaid population) requires that health care providers use buy- and-bill for all physician administered medications, including those that are injected or implanted. Minnesota providers we interviewed told us that they are reluctant to prescribe either the injectable or implantable versions of MAT medications, due to payment delays or other problems they experienced when they attempted to use buy-and-bill. Stakeholders told us that access to MAT medications would be maximized if providers and beneficiaries are not restricted when choosing among the three distribution methods—and some states have removed such restrictions. Officials from one manufacturer told us that since 2016, nine states that required use of buy-and-bill for their medication have eliminated those requirements. Medicaid officials in North Carolina told us that because smaller medical practices do not want the inventory costs associated with buy-and-bill, the state has moved to allow providers to obtain the injectable buprenorphine through either buy-and-bill or a specialty pharmacy. According to the officials, this has resulted in the increased use of the medication. Similarly, Medicaid officials in the District of Columbia told us that prior to 2017, injectable MAT medications were only available through buy-and-bill—despite Medicaid reimbursements being lower than providers’ costs. In 2017, these medications became available from specialty pharmacies. CMS has undertaken various coordination efforts aimed generally at addressing OUD. These efforts include the following: Opioid Steering Committee—composed of CMS senior leadership and staff, according to agency officials—helps coordinate opioid policy across the agency. CMS officials told us that the bi-weekly committee meetings have included discussions about reducing barriers related to prior authorization, other utilization management practices, and implementation of the SUPPORT Act, among other opioid related topics. Action Plan to Prevent Opioid Addiction and Enhance Access to MAT—an effort by an interagency task force—is intended to address OUD barriers in Medicaid, among other things, as required by the SUPPORT Act. In September 2019, CMS held a public meeting and requested public input to develop this action plan, which it plans to issue by January 2020, as mandated by the act. State Opioid Workshop, organized by CMS, brought together state officials to share innovative practices and discuss efforts to decrease barriers to accessing treatment for OUD, according to CMS officials. The second of such workshops was held in September 2018, and CMS documentation shows that the workshop included sessions focused on MAT, including a session on states’ approaches to improving the availability and use of MAT through benefit, payment, and system design. Informational bulletins have been used by CMS to communicate information states need to manage their Medicaid programs, including recommended actions. For example, in July 2014, CMS issued a bulletin to states providing background information on MAT, examples of state-based initiatives to increase access to MAT, and resources to help ensure proper delivery of MAT services. In January 2016, CMS issued another bulletin that focused on best practices for addressing prescription opioid overdoses, misuse, and addiction, and urged states to take action to reduce the potentially dangerous usage of opioids used for pain. While this bulletin was not focused on MAT, it suggested generally that states consider reviewing benefits coverage and service utilization to ensure beneficiaries have sufficient access to MAT services, and indicated that some benefit requirements, such as prior authorizations, can reduce the use of and access to MAT. Drug Utilization Review Survey, conducted annually by CMS, contains information that the agency publishes on states’ activities related to all prescription drugs in the Medicaid program, including some limited information about MAT medications. Other CMS efforts also addressed Medicaid beneficiaries’ access to MAT. In November 2017, CMS announced a new policy to increase flexibility for states seeking a section 1115 demonstration to improve access to and quality of OUD treatment for Medicaid beneficiaries. CMS has approved section 1115 demonstrations that included OUD- related provisions for 26 states and the District of Columbia between August 2015 and November 2019. States implementing these demonstrations are expected to take action to ensure access to MAT for Medicaid beneficiaries, including by establishing a requirement that inpatient and residential settings provide access to MAT. CMS has also examined access to OUD treatment through its Innovation Accelerator Program, which provides resources to states to introduce delivery system and payment reforms in a variety of areas, including OUD. Our review of literature and interviews with stakeholders show that in addition to Medicaid policies, other federal and state policies can limit Medicaid beneficiaries’ access to MAT medications. According to stakeholders we interviewed and literature we reviewed, requirements associated with DATA 2000 waivers may limit the number of providers willing to prescribe or administer buprenorphine for MAT. Stakeholders and the literature note that providers may be reluctant to obtain the DATA 2000 waiver, due to the hours of training associated with the waiver and the cost of registering with the DEA after obtaining the waiver, among other things. According to officials from a stakeholder organization representing providers and providers in one of our selected states, the requirements to obtain a DATA 2000 waiver, including the associated hours of required training—ranging from 8 hours for physicians to 24 hours for nurse practitioners and physician assistants—contributes to perceptions that prescribing buprenorphine for the treatment of OUD is dangerous, particularly since waivers are not required to prescribe buprenorphine for pain management. A 2019 National Academy of Sciences report also notes that treatment with buprenorphine is less risky than many other OUD treatments that do not require special training. Another study suggested that other opioids not used in the treatment of OUD—and not requiring special training—are more commonly misused, diverted, or responsible for overdoses, compared with buprenorphine. All providers who prescribe controlled substances are required to register with DEA. For providers with a DATA waiver who wish to administer injectable or implantable buprenorphine in multiple office locations, the requirement that each office location be registered with DEA may be an additional burden, as these fees are $731 for 3 years, according to DEA. DEA requires that the provider pay the registration fee for each location where controlled substances are stored, administered, or dispensed, which might not be recouped if only a small number of patients are treated at the various locations. Stakeholders we interviewed and literature we reviewed also noted a concern among some health care providers that having a waiver would subject them to increased oversight from DEA and other law enforcement agencies. Specifically, officials from an organization representing addiction providers and providers in our selected states told us that the possibility of interaction with law enforcement can intimidate some providers and can be anxiety-provoking and disruptive. Literature we reviewed reported that this can lead to providers not pursuing a waiver or ceasing to prescribe buprenorphine. Surveys of health care providers have found similar concerns. These factors can create a potential treatment barrier for patients and beneficiaries by limiting the number of available providers, according to officials from an organization representing addiction providers we interviewed and literature we reviewed. The waivers also limit how many patients, including Medicaid beneficiaries, providers may treat with MAT medications. These limits may create an additional barrier to OUD treatment, particularly for providers who specialize in addiction medicine. Studies have consistently found that providers who have waivers treat fewer OUD patients than their waiver allows—and some may not accept new patients. For example: A 2016 study of rural physicians found that more than half of providers with waivers were not accepting new patients; those with a 30-patient waiver limit were treating an average of fewer than nine patients; and more than half of the providers with waivers were not treating any patients. Providers with a 100-patient waiver limit treated an average of 57 patients, although more than one-quarter were at or approaching their patient limit. A survey of physicians, nurse practitioners, and physician assistants who obtained a waiver or increased their patient waiver limit in 2017 found that these providers were treating about one-third of their patient limit. Literature we reviewed noted that providers might not treat the maximum number of patients allowed by their waiver limit, because they are not specialists in addiction medicine, or they do not want to treat a larger number of patients with OUD. These providers may have obtained a waiver to respond to the needs of their existing patients who have OUD, rather than to add new patients. In contrast, one of these studies and officials from one organization representing health care providers in addiction medicine we interviewed noted that there are providers who are addiction medicine specialists that cannot work a full-time schedule if they are only allowed to treat 275 patients, which is the maximum allowed under the waiver rules. The study projected that a capacity range of 378 to 524 patients would be necessary for providers to practice addiction medicine full time. CMS officials told us they have taken some steps to increase the number of providers with DATA 2000 waivers through funding new planning grants in 15 states, as authorized by the SUPPORT Act. According to CMS officials, the grants cover training expenses to help providers obtain the waiver, among other things. Federal laws allow certain non-physicians—such as nurse practitioners and physician assistants—to obtain a DATA 2000 waiver to prescribe and administer buprenorphine to treat OUD; however, some states’ laws may restrict their ability to do so. These laws determine the type of health care services that can be provided by different types of providers. According to literature we reviewed and stakeholders we interviewed representing physician assistants and nurse practitioners, some state laws do not allow non-physicians to write prescriptions for any controlled substances and some specifically limit their ability to write prescriptions for buprenorphine for the treatment of OUD, while others may impose no restrictions for non-physicians beyond the federal training and patient limit requirement associated with the DATA 2000 waiver. For example, officials from an organization representing providers reported that physician assistants in some states, such as Kentucky and Tennessee, cannot prescribe buprenorphine for the treatment of OUD. Further, according to officials from another organization representing providers, most states require nurse practitioners to be supervised by or have a collaborative agreement with a physician. Thus, to prescribe buprenorphine for MAT, the nurse practitioners in these states must obtain a DATA 2000 waiver and have supervision from or a collaborative agreement with a physician. North Carolina Medicaid officials told us that physician assistants and nurse practitioners in the state that have a DATA 2000 waiver must consult with a physician, but do not need to have direct affiliation with a supervising physician. The supervision requirements can affect patients’ access to MAT, including for Medicaid beneficiaries, according to stakeholders. For example, officials from an organization representing providers told us that some nurse practitioners may find it difficult to identify a qualified physician with whom they can have a collaborative agreement. In the states where nurse practitioners are not required to collaborate with a physician, these officials also told us that they see higher percentages of nurse practitioners prescribing MAT medications. HHS has identified expanding access to medication-assisted treatment as a key component of its efforts to reduce opioid use disorder and opioid overdoses. Through our work, we identified state Medicaid policies and federal and state laws that may create barriers to treatment for Medicaid beneficiaries and other patients with OUD by restricting access to MAT medications. We also identified efforts by states and CMS to address these barriers. Under federal law, state Medicaid programs are required to cover all formats of MAT medications reviewed in our study, because all manufacturers of those medications participate in the Medicaid Drug Rebate Program. In addition, the SUPPORT Act will mandate broader coverage of MAT beginning in October 2020. However, a study by SAMHSA found that nearly half of all state Medicaid programs do not cover all formats of MAT medications in our review. Yet, CMS has not taken steps to determine whether state Medicaid programs do cover all of these MAT medications and their formats, as required. Until CMS determines the extent to which state Medicaid programs cover all MAT medications, as required—and address coverage gaps when found— Medicaid beneficiaries may not be able to obtain the most effective medications to treat their opioid use disorder. We are making the following recommendation to CMS: The Administrator of CMS should determine the extent to which state Medicaid programs are in compliance with federal requirements to cover MAT medications in all formats and take actions to ensure compliance, as appropriate. (Recommendation 1) We provided a draft of this report to HHS for review. HHS provided written comments which are reprinted in appendix I. HHS also provided technical comments, which we incorporated as appropriate. In its written comments, HHS concurred with our recommendation. Specifically, HHS stated that it will examine the extent to which state Medicaid programs are in compliance with the requirements of the Medicaid Drug Rebate Program as it relates to the coverage of MAT medications and take actions to ensure compliance, as appropriate. HHS also reiterated its plans to develop guidance for states on the SUPPORT Act’s new requirement for states to cover MAT medications. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Will Simerl (Assistant Director), Carolyn Feis Korman (Analyst-in-Charge), Rebecca Hendrickson, Shirin Hormozi, Virginia Lefever, Drew Long, Leslie McNamara, and Carla Miller made key contributions to this report. Also contributing were Leia Dickerson, Carolyn Garvey, Ethiene Salgado-Rodriguez, and Emily Wilson Schwark.", "summary": "Almost 70,000 people died from drug overdoses in 2018, an estimated 69 percent of which involved opioids. Medicaid, a joint federal-state health care program for low-income and medically needy individuals, is one of the largest sources of coverage for individuals undergoing treatment for opioid use disorder. Congress included a provision in statute for GAO to review access barriers to MAT medications, including the distribution methods. This report describes policies that can restrict Medicaid beneficiaries' access to MAT medications, including any related to the distribution methods. To do this work, GAO reviewed relevant laws, policies, and documents, as well as studies describing access barriers and the benefits and challenges of the distribution methods. GAO also interviewed federal officials; stakeholders representing state Medicaid directors, health care providers, patients, and pharmacies; and state officials and health care providers from Minnesota, North Carolina, and Ohio, as well as the District of Columbia. GAO selected these three states and the District of Columbia based on their Medicaid programs' coverage of the MAT medications, their programs' spending for the treatment of opioid use disorder, and other criteria. Medication-assisted treatment (MAT)—which combines behavioral therapy and the use of certain medications, such as buprenorphine—has been shown to be effective at reducing the misuse of or addiction to opioids and increasing treatment retention. The federal government has identified expanding access to MAT as important for reducing opioid use disorders and overdoses, and has taken action to increase access. However, GAO found that some state and federal policies can restrict Medicaid beneficiaries' access to MAT medications. Some of these policies, and three selected states' and the District of Columbia's efforts to address potential access barriers, include the following: MAT medication coverage. A 2018 study found that about 40 percent of states may not provide Medicaid coverage for some formats of MAT medications, such as injectable and implantable formats, as required by federal law; however, the Centers for Medicare & Medicaid Services (CMS), which oversees Medicaid, has not determined the extent to which states are in compliance with the federal requirements to cover MAT medications. Prior authorization requirements. Some MAT medications and formats are subject to prior authorization, which requires these medications to be pre-approved before being covered by Medicaid. While these requirements are generally used to reduce expenditures, unnecessary utilization, and improper payments, stakeholders told GAO the requirements may cause life-threatening delays in the case of MAT medications. Some states, including three states and the District of Columbia that GAO reviewed, have taken steps to remove prior authorization requirements for MAT medications. Distribution methods. States may mandate the ways MAT medications can be distributed. For example, Minnesota's fee-for-service plan requires the use of the buy-and-bill distribution method for all injectable and implantable medications. This method requires providers, such as physicians, to purchase and store these medications until administered to the patient, allowing immediate access to the MAT medication for Medicaid beneficiaries. However, for expensive injectable medications, which can cost $1,200 per treatment, this method places providers at financial risk if the medication is not used or the reimbursement is less than the providers' costs, requiring resources some providers may lack, according to providers in the selected states and District of Columbia. As a result, some states have removed such restrictions to maximize beneficiary access. Federal waiver for prescribing buprenorphine. According to stakeholders GAO interviewed, some providers are unwilling to obtain the federal waiver necessary to prescribe or administer buprenorphine for opioid use disorder—due to reasons such as the hours of training associated with the waiver—which can restrict beneficiary access to this MAT medication. In addition, while nurse practitioners and physician assistants are eligible for these waivers, some state laws require them to be supervised by a physician. Stakeholders told GAO that some nurse practitioners may find it difficult to identify a qualified physician, which may affect patient access to MAT. GAO recommends that CMS determine the extent to which states are in compliance with federal requirements to cover MAT medications, and take action as appropriate. HHS concurred with this recommendation.", "document_type": "gao"}
{"report": "Our previous work on board diversity describes some of the different roles and responsibilities of corporate and FHLBank boards and their directors. Generally, a public company’s board of directors is responsible for managing the business and affairs of the corporation, including representing shareholders and protecting their interests. Corporate boards vary in size. According to a 2018 report that includes board characteristics of large public companies, the average board has about 11 directors. Corporate boards are responsible for overseeing management performance and selecting and overseeing the company’s CEO, among other duties. Directors are compensated for their work. The board generally establishes committees to enhance the effectiveness of its oversight and focus on matters of particular concern, such as an audit committee and a nominating committee to recommend potential directors to the full board. Our previous reports on board diversity include a recent report on the FHLBank System. Each of its 11 federally chartered banks has a board of directors and is cooperatively owned by its member institutions, including commercial and community banks, thrifts, credit unions, and insurance companies. Each bank’s board of directors is made up of directors from member institutions and independent directors (who cannot be affiliated with the bank’s member institutions or recipients of loans). As of October 2018, each FHLBank board had 14-24 directors, for a total of 194 directors. The Federal Home Loan Bank Act, as amended by the Housing and Economic Recovery Act of 2008, and its regulations set forth a number of requirements for FHLBank directors, including skills, term length, and the percentage who are member and independent directors. Research we reviewed for our prior work cited several benefits associated with board diversity. For example, academic and business research has shown that the broader range of perspectives represented in diverse groups requires individuals to work harder to come to a consensus, which can lead to better decisions. In addition, research has shown that diverse boards make good business sense because they may better reflect a company’s employee and customer base, and can tap into the skills of a broader talent pool. Some research has found that diverse boards that include women may have a positive impact on a company’s financial performance, but other research has not. These mixed results depend, in part, on differences in how financial performance was defined and what methodologies were used. Our prior work found the number of women on corporate boards and the number of women and minorities on FHLBank boards had increased, but their representation generally continued to lag behind men and whites, respectively. While the data sources, methodologies, and time frames for our analyses were different for each report, the trends were fairly consistent. In our 2015 report, we analyzed companies in the S&P 1500 and found that women’s representation on corporate boards increased steadily from about 8 percent in 1997 to about 16 percent in 2014. However, despite the increase in women’s representation on boards, we estimated that it could still take decades for women to achieve balance with men. When we projected the representation of women on boards into the future assuming that women join boards in equal proportion to men—a proportion more than twice what we had observed—we estimated it could take about 10 years from 2014 for women to comprise 30 percent of board directors and more than 40 years for the number of women directors to match the number of men directors (see fig. 1). Similarly, in our 2019 report on FHLBank board diversity, we found that the share of women board directors increased from 2015 to October 2018 but that women still comprised less than 25 percent of FHLBank board directors as of 2018 (see fig. 2). Our 2019 FHLBank board report also showed an increase in FHLBank directors from 2015 to 2017 for some minority groups, including African- American, Hispanic, and Asian, but they still reflected a small portion of these boards. Further, the size of the increases in minority directors on FHLBank boards was less clear than for women directors due to incomplete data on directors’ race and ethnicity (see fig. 3). In 2015 and 2019, we identified similar factors that contributed to lower numbers of women and minorities on corporate and FHLBank boards. Notably, stakeholders, board members, and others we interviewed said three key factors generally limited greater board diversity: (1) not prioritizing diversity in recruitment efforts, (2) limitations of the traditional board candidate pipeline, and (3) low turnover of board seats. In our reports on corporate and FHLBank board diversity, we found that not prioritizing diversity in recruiting efforts was contributing to a lack of women and minority candidates represented on these boards. For example, stakeholders told us board directors frequently relied on their personal networks to identify potential board candidates. Some stakeholders said that given most current board members are men, and peoples’ professional networks often resemble themselves, relying on their own networks is not likely to identify as many women board candidates. In our 2019 report on FHLBank board diversity, stakeholders we interviewed raised similar challenges to prioritizing diversity in recruitment efforts. Some FHLBank representatives said that member institutions—which nominate and/or vote on director candidates—may prioritize other considerations over diversity, such as a candidate’s name recognition. Stakeholders we interviewed for our 2015 report suggested other recruitment challenges that may hinder women’s representation on corporate boards. For example, stakeholders said that boards need to prioritize diversity during the recruiting process because unconscious biases—attitudes and stereotypes that affect our actions and decisions in an unconscious manner—can limit diversity. One stakeholder observed that board directors may have a tendency to seek out individuals who look or sound like they do, further limiting board diversity. In addition, our 2015 report found some indication that board appointments of women slow down once one or two women are on a board. A few stakeholders expressed some concern over boards that might add a woman to appear as though they are interested in board diversity without really making diversity a priority, sometimes referred to as “tokenism.” Our reports on corporate and FHLBank board diversity also identified challenges related to relying on traditional career pipelines to identify potential board candidates—pipelines in which women and minorities are also underrepresented. Our 2015 report found that boards often appoint current or former CEOs to board positions, and that women held less than 5 percent of CEO positions in the S&P 1500 in 2014. One CEO we interviewed said that as long as boards limit their searches for directors to women executives in the traditional pipeline, boards will have a difficult time finding women. Expanding board searches beyond the traditional sources, such as CEOs, could increase qualified candidates to include those in other senior level positions such as chief financial officers, or chief human resources officers. In 2019 we reported that FHLBank board members said they also experienced challenges identifying diverse board candidates within the traditional CEO talent pipeline. Stakeholders we interviewed cited overall low levels of diversity in the financial services sector, for example, as a challenge to improving board diversity. Some bank representatives said the pipeline of eligible women and minority board candidates is small. Several FHLBank directors said the requirements to identify candidates from within corresponding geographic areas may exacerbate challenges to finding diverse, qualified board candidates in certain areas of the country. By statute, candidates for a given FHLBank board must come from member institutions in the geographic area represented by the vacant board seat. Similarly, in 2011 we reported on Federal Reserve Bank directors and found they tended to be senior executives, a subset of management that is also less diverse. Our report also found that diversity varied among Federal Reserve districts, and candidates for specific board vacancies must reside in specific districts. Recruiting board candidates from within specific professional backgrounds or geographic regions is further compounded by competition for talented women and minority board candidates, according to some stakeholders. In 2019, board directors from several FHLBanks described this kind of competition. For example, a director from one bank said his board encouraged a woman to run for a director seat, but the candidate felt she could not because of her existing responsibilities on the boards of two publicly traded companies. We heard of similar competition among Federal Reserve Bank officials in 2011, where organizations were looking to diversify their boards but were competing with private corporations for the same small pipeline of qualified individuals. The relatively small number of board seats that become available each year also contributes to the slow increase in women’s and minorities’ representation on boards. Several stakeholders we interviewed for our 2015 report on corporate boards cited low board turnover, in large part due to the long tenure of most board directors, as a barrier to increasing women’s representation. In addition, with respect to FHLBank board diversity, Federal Housing Finance Agency staff acknowledged that low turnover and term lengths were challenges. Several stakeholders we interviewed for our 2019 report on FHLBank boards said balancing the need for board diversity with retaining institutional knowledge creates some challenges to increasing diversity. One director said new board directors face a steep learning curve, so it can take some time for board members to be most effective. As a result, the directors at some banks will recruit new directors only after allowing incumbent directors to reach their maximum terms, which can be several years. Just as our 2015 and 2019 reports found similar challenges to increasing the number of women and minorities on corporate and FHLBank boards, they also describe similar strategies to increase board diversity. While the stakeholders, researchers, and officials from organizations knowledgeable about corporate governance and FHLBank board diversity we interviewed generally agreed on the importance of diverse boards and many of the strategies to achieve diversity, many noted that there is no one-size-fits-all solution to increasing diversity on boards, and in some cases highlighted advantages and disadvantages of various strategies. Based on the themes identified in our prior work, strategies for increasing board diversity generally fall into three main categories—making diversity a priority; enlarging the pipeline of potential candidates; and addressing the low rate of turnover (see fig. 4). Setting voluntary targets. Several strategies we identified in our 2015 report encouraged or incentivized boards to prioritize diversity. These strategies include setting voluntary targets for the number or proportion of women or minorities to have on the board. Many stakeholders we interviewed for our prior work supported boards setting voluntary targets for a specific number or percentage of women and minority candidates rather than externally imposed targets or quotas. Requiring a diverse slate of candidates. Many stakeholders we interviewed supported a requirement by corporate boards that a slate of candidates be diverse. A couple stakeholders specifically suggested that boards should aim for slates that are half women and half men; two other stakeholders said boards should include more than one woman on a slate of candidates so as to avoid tokenism. Tokenism was also a concern for a few of the stakeholders who were not supportive of defining the composition of slates. Filling interim board seats with women or minority candidates. Our 2019 report included strategies for making diversity a priority for FHLBank boards. For example, some FHLBank directors and Federal Housing Finance Agency staff said filling interim board seats with women and minority candidates could increase diversity. By regulation, when a FHLBank director leaves the board mid-term, the directors may elect a replacement for the remainder of his or her term. One director we interviewed said that when a woman or minority director fills an interim term, the likelihood increases that he or she will be elected by the member institutions for a subsequent full term. Emphasizing the importance of diversity and diverse candidates. Our 2015 report found that emphasizing the importance of diversity and diverse candidates was important for promoting board diversity. Almost all of the stakeholders we interviewed indicated that CEOs or investors and shareholders play an important role in promoting diversity on corporate boards. For example, one stakeholder said CEOs can “set the tone at the top” by encouraging boards to prioritize diversity efforts and acknowledging the benefits of diversity. As we reported in 2019, FHLBanks have taken several steps to emphasize the importance of board diversity. For example, all 11 FHLBanks included statements in their 2017 election announcements that encouraged voting member institutions to consider diversity during the board election process. Six of the 11 banks expressly addressed gender, racial, and ethnic diversity in their announcements. In addition, we found that FHLBanks had developed and implemented strategies that target board diversity in general and member directors specifically. For example, the banks created a task force to develop recommendations for advancing board diversity and to enhance collaboration and information sharing across FHLBank boards. Each bank is represented on the task force. Directors we interviewed from all 11 FHLBanks said their banks conducted or planned to conduct diversity training for board directors, which included topics such as unconscious bias. Mentoring women and minority board candidates. In addition, several stakeholders we interviewed about corporate and FHLBank boards noted the importance of CEOs serving as mentors for women and minority candidates and sponsoring them for board seats. For example, conducting mentoring and outreach was included as a strategy in our 2019 report for increasing diversity on FHLBank boards, including current directors pledging to identify and encourage potential women and minority candidates to run for the board. One director we interviewed said he personally contacted qualified diverse candidates and asked them to run. Another director emphasized the importance of outreach by member directors to member institutions to increase diversity on FHLBank boards. Member directors have the most interaction with the leadership of member institutions and can engage and educate them on the importance of nominating and electing diverse directors to FHLBank boards. Improving information on board diversity. As we reported in 2015, several large investors and many stakeholders we interviewed supported improving federal disclosure requirements on board diversity. In addition to increasing transparency, some organization officials and researchers we interviewed said disclosing information on board diversity could cause companies to think about diversity more. While the SEC aims to ensure that companies provide material information to investors that they need to make informed investment and voting decisions, we found information companies disclose on board diversity is not always useful to investors who value this information. SEC leaves it up to companies to define diversity. As a result, there is variation in how much and the type of information companies provide publicly. Some companies choose to define diversity as including characteristics such as relevant knowledge, skills, and experience. Others define diversity as including demographic characteristics such as gender, race, or ethnicity. (See fig. 5) In February 2019, SEC issued new guidance on its diversity disclosure requirements, which aims to clarify the agency’s expectations for what information companies include in their disclosures. Nearly all of the stakeholders we interviewed for our 2015 report said investors also play an important role in promoting diversity on corporate boards. For example, almost all of the board directors and CEOs we interviewed said investors or shareholders can influence board diversity by exerting pressure on the companies they invest in to prioritize diversity when recruiting new directors. One board director we interviewed said boards listen to investors more than anyone else. For example, there have been recent news reports of investor groups voting against all candidates for board positions when the slate of candidates is not diverse. In addition, in 2019 we recommended that the Federal Housing Finance Agency, which has regulatory authority over FHLBanks, review FHLBanks’ data collection processes for demographic information on their boards. By obtaining a better understanding of the different processes FHLBanks use to collect board demographic data, the Federal Housing Finance Agency and the banks could better determine which processes or practices contribute to more complete data. More complete data could ultimately help increase transparency on board diversity and would allow them to effectively analyze data trends over time and demonstrate the banks’ efforts to maintain or increase board diversity. The Federal Housing Finance Agency agreed with this recommendation and said it intends to engage with FHLBanks’ leadership to discuss board data collection issues. The agency also stated that it plans to request that the FHLBank Board Diversity Task Force explore the feasibility and practicability for FHLBanks to adopt processes that can lead to more complete data on board director demographics. Expanding board searches beyond CEOs. Expanding searches for potential board members is yet another strategy for increasing board diversity, as we reported in 2015 and 2019. Almost all the stakeholders we interviewed supported expanding board searches beyond the traditional pipeline of CEO candidates to increase representation of women. Several stakeholders suggested that boards recruit high performing women in other senior-level positions or look to candidates in academia or the nonprofit and government sectors. Our 2015 analysis found that if boards expanded their director searches beyond CEOs to include senior-level managers, more women might be included in the candidate pool. Our 2019 report on FHLBank board diversity also included looking beyond CEOs as a strategy for increasing diversity. For example, we reported that FHLBanks can search for women and minority candidates by looking beyond member bank CEOs. By regulation, member directors can be any officer or director of a member institution, but there is a tendency to favor CEOs for board positions, according to board directors, representatives of corporate governance organizations, and academic researchers we interviewed for the report. Similar to the findings from our 2015 report, the 2019 report found that the likelihood of identifying a woman or minority candidate increases when member institutions look beyond CEOs to other officers, such as chief human resources officers. Several directors of FHLBanks also reported hiring a search firm or consultant to help them identify women and minority candidates, which is a strategy that can be used to enlarge the typical pool of applicants. Adopting term limits or age limits. Several stakeholders discussed adopting term or age limits to address low turnover of board members. Most stakeholders we interviewed for our 2015 report were not in favor of adopting term limits or age limits, and several pointed out trade-offs. For example, one CEO we interviewed said directors with longer tenure often possess invaluable knowledge about a company that newer board directors do not have. Many of the stakeholders who opposed these strategies noted that term and age limits seem arbitrary and could result in the loss of high-performing directors. Expanding board size. Several stakeholders we interviewed supported expanding board size either permanently or temporarily so as to include more women. Some stakeholders noted that expanding board size might make sense when a board is smaller, but expressed concern about challenges associated with managing large boards. Evaluating board performance. Another strategy we identified in our 2015 report to potentially help address low board turnover and in turn increase board diversity was conducting board evaluations. Many stakeholders we interviewed generally agreed it is good practice to conduct evaluations of the full board or of individual directors, or to use a skills matrix to identify skills gaps. However, a few thought evaluation processes could be more robust. Others said that board dynamics and culture can make it difficult to use evaluations as a tool to increase turnover by removing under-performing directors from boards. Several stakeholders we interviewed discussed how it is important for boards to identify skills gaps and strategically address them when a board vacancy occurs, and one stakeholder said identifying such gaps could help boards think more proactively about finding diverse candidates. The National Association of Corporate Directors has encouraged boards to use evaluations not only as a tool for assessing board director performance, but also as a means to assess board composition and gaps in skill sets. Chairwoman Waters, Ranking Member McHenry, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Chelsa Gurkin, Acting Director of Education, Workforce, and Income Security, at (202) 512-7215 or GurkinC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Betty Ward-Zukerman (Assistant Director), Meredith Moore (Analyst-in-Charge), Ellie Klein, and Chris Woika. In addition, key support was provided by Susan Aschoff, James Bennett, Ben Bolitzer, Ted Burik, Michael Erb, Daniel Garcia-Diaz, Monika Gomez, Kay Kuhlman, Sheila McCoy, Anna Maria Ortiz, James Rebbe, Karen Tremba, and Walter Vance. Financial Services Industry: Representation of Minorities and Women in Management and Practices to Promote Diversity, 2007-2015. GAO-19-398T. Washington, D.C.: February 27, 2019. Federal Home Loan Banks: Steps Have Been Taken to Promote Board Diversity, but Challenges Remain. GAO-19-252. Washington, D.C.: February 14, 2019. Diversity in the Technology Sector: Federal Agencies Could Improve Oversight of Equal Employment Opportunity Requirements. GAO-18-69. Washington, D.C.: November 16, 2017. Financial Services Industry: Trends in Management Representation of Minorities and Women and Diversity Practices, 2007–2015. GAO-18-64. Washington, D.C.: November 8, 2017. Corporate Boards: Strategies to Address Representation of Women Include Federal Disclosure Requirements. GAO-16-30. Washington, D.C.: December 3, 2015. Federal Home Loan Banks: Information on Governance Changes, Board Diversity, and Community Lending. GAO-15-435. Washington, D.C.: May 12, 2015. Diversity Management: Trends and Practices in the Financial Services Industry and Agencies after the Recent Financial Crisis. GAO-13-238. Washington, D.C.: April 16, 2013. Federal Reserve Bank Governance: Opportunities Exist to Broaden Director Recruitment Efforts and Increase Transparency. GAO-12-18. Washington, D.C.: October 19, 2011. Women in Management: Female Managers’ Representation, Characteristics, and Pay. GAO-10-1064T. Washington, D.C.: September 28, 2010. Financial Services Industry: Overall Trends in Management-Level Diversity and Diversity Initiatives, 1993–2008. GAO-10-736T. Washington, D.C.: May 12, 2010. Financial Services Industry: Overall Trends in Management-Level Diversity and Diversity Initiatives, 1993–2004. GAO-06-617. Washington, D.C.: June 1, 2006. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Corporate boards take actions and make decisions that not only affect the lives of millions of employees and consumers, but also influence the policies and practices of the global marketplace. Many organizations and businesses have recognized the importance of recruiting and retaining women and minorities for key positions to improve performance and better meet the needs of a diverse customer base. Academic researchers and others have highlighted how diversity among board directors increases the range of perspectives for better decision making, among other benefits. Prior GAO reports have found challenges to increasing diversity on boards and underscored the need to identify strategies that can improve or accelerate efforts to boost representation of women and minorities. These include reports examining the diversity of publicly-traded company boards and the boards of federally chartered banks, such as the FHLBanks. This statement is based on two GAO reports, issued in December 2015 and February 2019, on the representation of women on corporate boards and the representation of women and minorities on the boards of FHLBanks, respectively. Information about the scope and methodologies used can be found in the original reports. This statement focuses on (1) the extent of diversity on such boards (2) factors that hinder diversity on these boards, and (3) strategies to promote board diversity on corporate and FHLBank boards. Prior GAO reports found limited diversity on both publicly-traded company boards (corporate boards) of directors and Federal Home Loan Bank (FHLBank) boards. For example, GAO's 2019 report on FHLBank boards found women's board representation was at 23 percent in 2018; in 2015 it had been 18 percent. In a 2015 report on corporate boards, GAO projected the representation of women into the future—assuming that women join boards in equal proportion to men—and estimated it could take more than 40 years for the number of women directors to match the number of men directors. GAO's report on FHLBank boards also showed an increase in FHLBank directors from some minority groups, including African-American, Hispanic, and Asian since 2015, but they still reflected a small portion of these boards. The size of the increases in minority directors on FHLBank boards was less clear than for women directors due to incomplete board member demographic data. Similar factors may limit corporate and FHLBank boards' efforts to increase diversity, according to stakeholders, board members, and others GAO interviewed. These factors include not prioritizing diversity in board recruitment efforts, limitations of the traditional board candidate pipeline, and low turnover of board seats. GAO identified a number of strategies for increasing the representation of women and minorities on corporate and FHLBank boards based on a review of relevant literature and discussions with researchers and corporate and government officials (see figure).", "document_type": "gao"}
{"report": "The INA provides for the Secretary of Homeland Security, after consultation with other agencies, to designate a foreign country for TPS if the conditions in that country fall into one or more of three statutory categories. These categories are generally described as consisting of (1) ongoing armed conflict, (2) environmental disaster, and (3) extraordinary and temporary conditions. The Secretary may designate a country for a period of at least 6 months but no more than 18 months. At least 60 days before the end of the designation period, the Secretary is required, after consulting with other appropriate agencies, to undertake a review of the conditions in the foreign country for which a designation is in effect and to determine whether the conditions for such designation continue to be met. The Secretary must subsequently take one of the following actions: Extend the country’s TPS designation for a period of 6, 12, or 18 months, if the Secretary determines that country conditions warrant an extension of TPS. This provides TPS beneficiaries with an extended period of protection from removal. Terminate the country’s TPS designation, if the Secretary determines that the country no longer meets the statutory criteria. This results in an expiration of the period of protection for foreign nationals who were granted TPS under a country’s designation. In addition, the Secretary may exercise his or her discretion, on the basis of this review, to redesignate the country for TPS. With a redesignation, the Secretary allows eligible nationals from the designated foreign country who have arrived in the United States since the initial designation, or another date established by the Secretary, to apply for TPS. TPS provides temporary humanitarian protection to eligible foreign nationals in the United States who, for various reasons, may not have otherwise lawful status and therefore, in the absence of TPS, would be subject to enforcement and removal under the INA. Foreign nationals may be present in the United States without valid status and potentially removable for various reasons, such as having entered without inspection and admission at a port of entry or having remained in the country beyond the expiration of previous temporary status (e.g., tourist, foreign student). Eligible foreign nationals may also seek TPS when they currently have another lawful status, according to USCIS officials. USCIS officials noted that this may occur, for example, when a foreign national has a temporary nonimmigrant status nearing its end date when TPS is designated for his or her country and applies for TPS before the existing status expires. Under the INA, applicants for TPS must apply during the registration period established by the Secretary of Homeland Security for a particular country designation. To be eligible for TPS, an applicant from a designated country must have been physically present in the United States continuously since the most recent designation’s effective date and must have resided in the United States continuously since the date established by the Secretary of Homeland Security. The INA also specifies that an individual is ineligible for TPS if he or she has been convicted of any felony or of two or more misdemeanors committed in the United States; if any of the statutory bars to asylum apply, such as involvement in persecution of others; or if he or she is reasonably regarded as a danger to the security of the United States, among other bases. In addition to protecting beneficiaries from removal, TPS authorizes them to work in the United States for the designation period. To receive evidence of work authorization, TPS beneficiaries generally apply to USCIS for an employment authorization document, Form I-766. USCIS provides this document as a plastic card that shows proof of the individual’s authorization to work in the United States and includes a photograph of the individual. Although USCIS does not require beneficiaries to apply for an employment authorization document, according to USCIS officials, beneficiaries typically apply to obtain these cards as evidence of their authorization to work in the United States. Figure 1 shows an example of an employment authorization document issued by USCIS. Several key DHS and State components may be involved in the TPS decision process, as table 1 shows. Additionally, other DHS offices and components, as well as agencies such as the Department of Defense or U.S. Agency for International Development, may provide information about country conditions to help inform the Secretary of Homeland Security’s decisions. Since TPS was established in 1990, foreign nationals in the United States from 22 countries have been granted TPS. Our review of Federal Register notices published in fiscal years 1990 through 2019 found varying bases for the 22 countries’ TPS designations. We also found that designations for 20 of these countries were subsequently extended or the countries were redesignated one or more times. Somalia, first designated for TPS in September 1991, had the longest overall designation period since TPS was established. As of the end of fiscal year 2019, Somalia’s designation had been extended 21 times and the country had been redesignated twice; its most recent extension was set to expire in March 2020. Designations for only two countries were terminated without any extensions or redesignations—Kuwait, designated in 1991, and Guinea-Bissau, designated in 1999. Figure 2 shows all effective dates of TPS designations and subsequent decisions, including extensions, terminations, and redesignations, as well as the bases for the designations for each of the 22 countries in fiscal years 1990 through 2019. As figure 2 shows, 26 TPS designations occurred in fiscal years 1990 through 2019, and 22 designations were extended at least once. As of September 30, 2019, the designations for all but four countries had been terminated and the termination of six countries’ designations since fiscal year 2018 had been temporarily halted because of ongoing litigation. Redesignations occurred 20 times. Designations. Of the 26 TPS designations, three were for one country, Liberia, and four were for two countries, El Salvador and Sierra Leone, that were each designated twice. Extensions. The majority of TPS designations (17 of 26 designations) were extended up to eight times. Designations for five countries—El Salvador, Honduras, Nicaragua, Somalia, and Sudan—were extended more than 10 times each. Three of the 22 countries’ designations were not extended before termination. Terminations. The TPS designations for all countries except Somalia, South Sudan, Syria, and Yemen had been terminated as of September 30, 2019. The termination of six countries’ designations since fiscal year 2018 had been temporarily halted because of ongoing litigation. Several lawsuits had been filed regarding the Secretary of Homeland Security’s decisions to terminate TPS for El Salvador, Haiti, Honduras, Nepal, Nicaragua, and Sudan. In October 2018, a U.S. district judge in California issued a preliminary injunction for one of the lawsuits, temporarily blocking DHS from enforcing the Secretary’s TPS termination decisions for El Salvador, Haiti, Nicaragua, and Sudan. The U.S. government filed an appeal in response to the preliminary injunction. According to USCIS officials, DHS has regularly published notices of its continued compliance with the court’s injunction and has stated that it will continue to publish such notices pending resolution of the case In April 2019, a district court judge in New York issued a second preliminary injunction covering Haiti, which the U.S. government appealed in June 2019. Additionally, under an agreement to stay the proceedings in response to a lawsuit filed in California in February 2019, the government stipulated that it would temporarily halt terminations for Honduras and Nepal until the appeal of the October 2018 injunction had been resolved. Redesignations. Of the 20 TPS redesignations, six were for countries that were redesignated once, two were for one country that was redesignated twice, and twelve were for four countries that each were redesignated thrice—the largest number of TPS redesignations. USCIS data show that applications for TPS were approved for a total of 431,848 foreign nationals in fiscal years 2000 through 2018 and that the number of TPS beneficiaries each year grew from about 70,000 in fiscal year 2000 to about 420,000 in fiscal year 2018. The number of TPS beneficiaries increased most rapidly in fiscal years 2000 through 2005, particularly after the designation of Honduras in 1999 and El Salvador in 2001. According to USCIS officials, because adjudicating all TPS applications can take years, depending on the number of applicants from a country, the number of TPS beneficiaries for a designated country may continue rising after the established registration period for the specific designation. For example, although Honduras was initially designated for TPS in 1999, with an applicant registration period that ended on July 5, 1999, USCIS data show that the number of beneficiaries from Honduras who were granted TPS peaked in 2007 at 85,759 foreign nationals. See appendix II for additional information on the numbers of TPS beneficiaries in fiscal years 2000 through 2018, by country. Data on the number of TPS beneficiaries for fiscal year 2018—the most recent available—show that the majority of TPS beneficiaries were from three countries (El Salvador, Honduras, and Haiti), as figure 3 shows. About 98 percent of beneficiaries from six countries (Sudan, Honduras, Nicaragua, El Salvador, Haiti, and Nepal) in fiscal year 2018—408,773 foreign nationals—held TPS because the termination of their country’s TPS designation was temporarily halted because of ongoing litigation. In addition, about 2 percent of beneficiaries from four countries (Somalia, South Sudan, Syria, and Yemen) in fiscal year 2018—9,019 foreign nationals—held TPS because their country’s designation was extended. See appendix II for additional information about beneficiary characteristics in fiscal year 2018, including age, gender, and location. Our review of documentation for selected TPS decisions in fiscal years 2014 through 2018 and our interviews with DHS, USCIS, and State officials indicated that DHS’s approach for initial or subsequent reviews of countries for TPS consists of three primary steps: 1. The Secretary of Homeland Security initiates a review of a country for TPS. For an initial TPS designation, the Secretary may initiate consideration of a country in response to various triggering factors. Such factors may include, for example, a request from a U.S. government entity or a foreign government for a TPS designation based on the statutory conditions for TPS (i.e., armed conflict, environmental disaster, or extraordinary and temporary conditions). For an existing designation approaching its end date, a statutory deadline requires the Secretary to undertake a review. 2. DHS collects information on country conditions and recommendations from USCIS and State and provides this information to the Secretary of Homeland Security to inform his or her decision regarding an initial or existing TPS designation. Other DHS components and non-DHS entities, including other agencies and nongovernmental organizations, may also provide information to the Secretary or USCIS. 3. The Secretary of Homeland Security receives the information and recommendations and makes a decision about TPS for the country. The Secretary exercises discretion in determining whether to initially designate a country for TPS. For an existing designation, under the INA, the Secretary is required to determine whether country conditions warrant an extension of TPS or whether the country no longer meets the statutory criteria and TPS must be terminated. Also, the Secretary exercises discretion in determining whether to redesignate a country that was previously designated for TPS. Figure 4 illustrates these three steps. Various factors may trigger consideration of a country for an initial TPS designation, according to USCIS officials. Officials stated that the Secretary of Homeland Security’s consideration of a country for an initial designation is discretionary. However, subsequent reviews of existing designations are required by statute. See figure 5. USCIS and State officials stated that for initial TPS designations, a request from DHS, State, the White House, members of Congress, or foreign governments may trigger consideration of whether to designate a country on the basis of one or more of the three statutory categories (i.e., armed conflict, environmental disaster, or extraordinary and temporary conditions). USCIS officials added that, under the INA, the Secretary of Homeland Security has the sole authority to determine whether and when to consider a country for an initial TPS designation. Further, they noted that a request does not automatically result in a formal review of a country for TPS even if the country has experienced country conditions specified in one or more of the statutory categories, such as an armed conflict or environmental disaster. For subsequent reviews of existing TPS designations, at least 60 days before the end of the designation period, the Secretary is required, after consulting with other appropriate agencies, to undertake a review of the conditions in the foreign country for which a designation is in effect. DHS collects similar information for each review of a country for TPS, according to DHS officials and our review of selected decisions. DHS officials identified four primary sources of information that the department collects to inform the Secretary of Homeland Security’s TPS decisions: country conditions reports compiled by USCIS and State and recommendations from USCIS and State leadership. According to DHS and State officials, DHS generally consults with State on TPS decisions, although it is not specifically required to do so under the statute. Our review of 26 TPS decisions for the eight selected countries found that DHS collected the following documents to inform each decision: 1. a country conditions report compiled by USCIS, 2. a memo with a recommendation from the USCIS Director to the Secretary of Homeland Security, 3. a country conditions report compiled by State, and 4. a letter with a recommendation from the Secretary of State to the Secretary of Homeland Security. USCIS manages and coordinates the TPS information-gathering process for the Secretary of Homeland Security. While State formally provides its input through the Secretary of State’s letter and recommendation to the Secretary of Homeland Security, USCIS officials said that USCIS generally incorporates the input from State into USCIS’s country conditions report and recommendation on TPS. DHS officials noted that other internal DHS components, government agencies, and other entities may also provide information about country conditions or other factors to inform the Secretary of Homeland Security’s decisions. Figure 6 shows the information collected to support the Secretary of Homeland Security’s TPS reviews. USCIS officials indicated that the time frames for conducting TPS reviews may vary. They noted that a review for an initial designation may have a shorter time frame than a review for an existing designation, depending on the situation. In addition, the officials noted that USCIS generally starts the review process for an existing TPS designation about 6 months to a year before the end date of the country’s current designation. They added that they generally start the review process within this timeframe, given the INA requirement that the Secretary of Homeland Security either undertake a review and make a determination regarding country conditions at least 60 days in advance of the prior designation’s end date or automatically extend the designation for 6 months. According to USCIS officials, at the start of a review for an initial or existing designation, USCIS’s Office of Policy & Strategy generally reaches out to USCIS’s Refugee, Asylum and International Operations Directorate (RAIO) to request input on country conditions. USCIS officials also said that the office coordinates with State’s Bureau of Population, Refugees, and Migration regarding the target time frame for receiving State’s input. In general, once USCIS receives the input from RAIO and State, USCIS finalizes its country conditions report and recommendation memo for the Secretary of Homeland Security. Our review of documentation for the eight countries in our nongeneralizable sample of 26 TPS decisions found variation in the time frames for USCIS’s recommendation memos and for State’s recommendation letters. For the 24 reviews of existing TPS designations, USCIS provided recommendation memos to the Secretary of Homeland Security about 2 to 7 months before the end date of the prior designations. Most of State’s 26 recommendation letters were dated about 2 days to 6 months before the USCIS recommendation memos. RAIO officials noted that they use an internal template as informal guidance for the draft country conditions reports that they compile for USCIS’s Office of Policy & Strategy for reviews for initial or existing TPS designations. We reviewed the RAIO template and found, for example, that for reporting on a country being considered for a TPS designation on the basis of an environmental disaster, the template includes sections (e.g., several paragraphs) about the population harmed, damage to infrastructure, disruption in services, and status of disaster response and reconstruction. Officials added that country conditions reports may deviate from the template, because its use is not required; instead, it serves as general, informal guidance. RAIO officials also noted that information in the country conditions reports they compile is generally based on publicly available information or data related to country conditions. According to the officials, sources for such information may include U.S. agencies, foreign governments, international organizations, nongovernmental organizations, and news articles. According to State officials, after State initiates its internal process for compiling information for the Secretary of Homeland Security’s TPS review, the Bureau of Population, Refugees, and Migration generally requests input internally from the relevant regional bureau and post before compiling information for the Secretary of State’s consideration. See the text box for more details of State’s internal process for developing country conditions reports and recommendation letters to inform the Secretary of Homeland Security’s TPS reviews. State Department’s Internal Process for Compiling Information for the Secretary of Homeland Security’s Temporary Protected Status Reviews The Department of State’s (State) internal process for developing input for the Secretary of Homeland Security’s Temporary Protected Status (TPS) reviews generally includes compiling information on country conditions as well as proposed recommendations from the relevant regional bureau and overseas post, according to documentation for selected TPS decisions in fiscal years 2014 through 2018 and our interviews with DHS, USCIS, and State officials. State’s Bureau of Population, Refugees and Migration (PRM) facilitates and coordinates State’s internal process for developing this input, according to informal guidance, which State officials said the bureau has used at the working level since 2012, as well as our interviews with State officials. After DHS initiates a TPS review, PRM generally directs the relevant regional bureau to reach out to overseas posts for information about country conditions, according to State officials. State officials noted that in some cases, the regional bureau’s country desk officer takes the lead in drafting the country conditions report, depending on the country context. Officials stated that the regional bureau generally uses a questionnaire on country conditions to request information from the post for a TPS review and that the post generally also provides a recommendation, in addition to the questionnaire responses, via cable or email to the regional bureau. For example, for a country that had an existing TPS designation based on ongoing armed conflict in the country, a country conditions cable provided, among other things, information about the status of the armed conflict, an assessment of whether the return of foreign nationals would pose a serious threat to their personal safety and whether the country was unable to handle the return of nationals, and information about the impact of the conflict on economic and humanitarian conditions. State and U.S. Agency for International Development (USAID) officials noted that other agencies represented at the overseas posts, such as USAID, may provide information for a post’s input on country conditions, including information gathered “on the ground” as well as from publicly available sources. Once the regional bureau receives any input from post, the bureau desk officer prepares a draft country conditions report and recommendation, and the regional bureau works with PRM to compile a joint action memo. PRM generally provides the joint action memo, which includes a country conditions report, to the Secretary of State, according to State officials. The memo may include a joint recommendation or varying recommendations (e.g., from PRM and the regional bureau) for the Secretary’s consideration. After the Secretary determines what the department will recommend, State provides a final country conditions report and recommendation letter to the Secretary of Homeland Security as well as to U.S. Citizenship and Immigration Services’ Office of Policy & Strategy. We found that the USCIS and State country conditions reports and recommendation memos or letters that DHS and State provided for our nongeneralizable sample of 26 TPS decisions included information such as background on the cause (or reason for consideration) of the initial TPS designation and a summary of the country’s recovery from, or the status of, the situation to date. In addition, documentation provided to us for some of the TPS decisions included other information, such as certain economic indicators or broader country context. Specifically: Cause and recovery or status. USCIS and State documentation for each of the 26 TPS decisions in our review generally included (1) information related to the cause (or reason for consideration) of the initial TPS designation and (2) a summary of the country’s recovery from, or the status of, the situation to date. For example, documentation for a country designated on the basis of armed conflict described the status of the conflict and ceasefire agreements; provided information about violence against civilians and recruitment of child soldiers; provided an update on civilian casualties since the prior review; and described humanitarian challenges stemming from the conflict, such as the risk of famine. For a country designated on the basis of environmental disaster, documentation described the status of investments in recovery and efforts to rebuild after the disaster, including the number of houses and schools that had been rebuilt or repaired. This documentation also included assessments of disruption in living conditions and the extent to which economic activity and basic services had been restored. Economic indicators. USCIS documentation for 16 TPS decisions and State documentation for 12 TPS decisions in our review included information about economic indicators. Examples of such information included an estimate of damages from an environmental disaster as a percentage of a country’s gross domestic product, a summary of growth in a country’s gross domestic product in recent years, and data on the increase in food prices as a result of armed conflict in a country. Broader country context. USCIS documentation for 23 TPS decisions in our review and State documentation for 20 TPS decisions provided information about broader country context. For example, documentation for a country designated on the basis of armed conflict included broader context regarding topics such as recent natural disasters and the country’s geography. As another example, documentation for a country designated on the basis of environmental disaster provided information about subsequent natural disasters as well as violence, criminal activity, and corruption in the country. In addition to USCIS and State, other DHS offices and components and non-DHS entities may provide information to inform the Secretary’s decision. DHS officials noted that such information varies, may be solicited or unsolicited, and may be provided directly to the Secretary of Homeland Security or to USCIS. We reviewed examples of such information for several of the TPS decisions in our nongeneralizable sample. This information included items such as immigration data or intelligence analyses from other DHS offices and components—for example, the Office of Immigration Statistics, U.S. Customs and Border Protection, and U.S. Immigration and Customs Enforcement; updates from the Department of Defense on the security situation in a technical input from the Centers for Disease Control and Prevention regarding the status of an epidemic; and input from other entities, including letters from members of Congress, foreign government officials, and nongovernmental organizations. In addition, DHS officials stated that the Secretary of Homeland Security may hold briefings or meetings on TPS reviews both internally and with external entities, such as White House officials, foreign government officials, and nongovernmental organizations or advocacy groups. According to DHS officials, after USCIS and State compile their country conditions reports and recommendations for the Secretary of Homeland Security’s consideration, other DHS components—including the Office of Strategy, Policy, and Plans; the Office of the General Counsel; and the Management Directorate—review the documents as part of the standard departmental clearance process before providing them to the Secretary. Officials from these DHS components noted that the purpose of their review is generally to provide relevant technical comments and ensure that complete information has been gathered for the Secretary’s review. According to USCIS officials, after receiving the information and recommendations from USCIS and State, as well as information from any other sources, the Secretary of Homeland Security makes a decision regarding a country’s initial or existing TPS designation. USCIS officials indicated that the Secretary’s decisions may not always follow the recommendations of the USCIS Director or the Secretary of State. For example, among the 26 TPS decisions from 2014 through 2018 that we reviewed, the Secretary of Homeland Security’s decision was the same as State’s recommendation in 21 cases and differed from State’s recommendation in five cases. Initial designation. USCIS officials stated that if the Secretary of Homeland Security determines a country meets the statutory criteria for designation, the Secretary may then exercise discretion in deciding whether to initially designate the country for TPS. Existing designation. According to USCIS officials, the Secretary of Homeland Security exercises discretion in determining whether the conditions in a country satisfy statutory conditions for retaining an existing designation. However, the officials indicated that if the Secretary determines that the conditions for TPS designation continue to be met, the Secretary is required under the INA to extend the designation. Additionally, USCIS officials stated that if the Secretary determines a country no longer meets conditions for TPS designation, the Secretary is required under the INA to terminate the designation. Finally, USCIS officials stated that the Secretary may exercise discretion in deciding to redesignate a country with an existing designation and that factors such as a significant deterioration in country conditions may weigh in favor of a redesignation. Once the Secretary of Homeland Security decides whether to designate a country or to extend or terminate TPS, the decision may be documented through a signed memorandum or communicated orally to USCIS, according to USCIS officials. DHS provided memorandums or notices documenting the Secretary’s TPS decisions for all 26 decisions in our nongeneralizable sample. After the Secretary makes a TPS decision, DHS typically communicates the decision to State before announcing it to the general public. Either DHS or State then communicates the decision to the foreign embassy in Washington, D.C., and State may communicate it to the foreign government overseas. Finally, under INA provisions related to TPS, the Secretary’s decision is published in the Federal Register (see fig. 7). Since 1990, all TPS decisions have been communicated to the public through statutorily required notices in the Federal Register. DHS has also used other mechanisms, including press releases and its website, to help disseminate TPS-related information to the public. We found that a Federal Register notice was published for all TPS decisions, as required under the INA, from November 1990 to September 2019. In addition, DHS frequently used Federal Register notices as a mechanism for communicating other related information, such as effective dates for TPS designation periods, applicant registration periods, TPS beneficiary eligibility requirements, and information about employment authorization for beneficiaries. For example, the Federal Register notice extending the TPS designation of El Salvador, published on July 8, 2016, included the following: summary information about the extension, such as the period of extension and the start and end date of the extension; procedures and eligibility information for beneficiaries to register or reregister for TPS and to apply for renewal of employment authorization documents, including required forms and fees to register or reregister; directions for obtaining additional information and help with questions by accessing the USCIS website or by contacting an identified USCIS official or a USCIS customer contact center; and general information about TPS as well as information about El Salvador’s initial TPS designation and about the Secretary’s authority and reason for extending TPS for El Salvador. For a Federal Register notice of a TPS decision, according to USCIS officials, USCIS generally takes about 2 weeks to draft the notice. DHS then completes an internal review before submitting the notice to the Office of Management and Budget (OMB) for interagency review, according to officials. OMB’s Office of Information and Regulatory Affairs coordinates the notice review process, including gathering comments or proposed revisions from relevant executive branch agencies. For example, we reviewed examples of technical comments from the Centers for Disease Control and Prevention regarding draft notices of TPS decisions for the Ebola-affected countries that included information and data on the status of the epidemic and an assessment of health care infrastructure. According to USCIS officials, OMB comments are returned to DHS without identifying the agency that made each comment, and additional interagency review and comment may occur before DHS publishes the notice in the Federal Register. USCIS officials also noted that, under regulation, OMB can take up to 90 days to complete the interagency review, although the officials added that OMB aims to complete the process in a timely manner for TPS notices and generally takes about a month. According to USCIS officials, to help raise awareness of TPS decisions, USCIS has generally also issued press releases announcing all TPS decisions and published them on its website in addition to publishing Federal Register notices. Table 2 summarizes information from DHS’s publication of a press release and Federal Register notice for a 2016 TPS decision. USCIS has also taken other steps to communicate TPS decisions and related information to the public. USCIS has updated its TPS country- specific webpages with alerts about the latest TPS decisions and registration periods, among other information. Further, according to USCIS officials, the Office of Public Affairs hosted periodic national TPS teleconferences for stakeholders and conducted outreach meetings to respond to questions and discuss TPS information in communities where there might be a large number of TPS beneficiaries. For example, a teleconference invitation from USCIS to stakeholders to discuss the extension of Haiti’s TPS designation in May 2017 indicated that USCIS officials would share information about the TPS reregistration period and procedures for eligible Haitian nationals and would respond to stakeholder questions. Officials from USCIS’s Office of Public Affairs also stated that the office has drafted guidance for communicating most TPS decisions. We reviewed examples of the guidance, which included planned time lines for publishing the press releases and information to USCIS’s website as well as for conducting outreach to Congress, stakeholder groups, and TPS beneficiaries. USCIS officials noted that once the Secretary of Homeland Security makes a TPS decision, time frames for publishing the Federal Register notice may vary. USCIS officials stated that, in an effort to ensure public awareness of the decisions as soon as possible, USCIS has in some cases published a press release before the Federal Register notice of a decision was finalized and published. In reviewing TPS decisions for existing designations (i.e., extensions, terminations, and redesignations) in fiscal years 1990 through 2019, we found the following: About two-thirds of Federal Register notices announcing TPS decisions for these existing designations were published at least 30 days before the end date of the previous designation period (100 of 158 total notices). In fiscal years 1990 through 2005, 21 Federal Register notices announcing TPS decisions for existing designations were published after the end of the previous designation period. In fiscal years 2006 through 2019, all 71 Federal Register notices announcing TPS decisions for existing designations were published 4 to 159 days before the end date of the previous designation period. See figure 8 for more details. Since 1990, two mechanisms—Federal Register notices and individually mailed notifications, which TPS beneficiaries may use as evidence of their eligibility for employment—have been used to communicate automatic extensions of employment authorization documents. However, USCIS’s published guidance has not consistently identified each of these as official mechanisms to verify eligibility, resulting in confusion among employers about TPS beneficiaries’ employment eligibility. The INA states that DHS shall provide TPS beneficiaries with “an ‘employment authorized’ endorsement or other appropriate work permit” but does not specify the mechanisms that DHS should use to communicate TPS employment authorization. To receive documentation of work authorization, TPS beneficiaries generally apply for an employment authorization document after an initial TPS designation and also after any subsequent extensions or redesignations of TPS. See the text box for a description of the process that TPS beneficiaries and employers must follow to verify beneficiaries’ employment eligibility. According to USCIS officials, USCIS aims to adjudicate both initial employment authorization applications and renewal applications within 90 days after receiving an application. When it is unable to process the adjudications in this time frame, USCIS issues automatic extensions of expiring employment authorization documents for TPS beneficiaries from a specific country, to allow time for USCIS to process the volume of applications associated with a TPS reregistration period. In some instances, USCIS may issue additional automatic extensions of employment authorization documents for specific countries if it has been unable to process all pending applications within the initial automatic extension period, according to USCIS officials. When employment authorization documents are automatically extended for eligible TPS beneficiaries, the documents may appear to have expired even though they remain valid. According to USCIS officials, DHS has used the Federal Register notices announcing TPS decisions to communicate most automatic extensions of TPS employment authorization documents. For example, on January 17, 2017, DHS published a Federal Register notice extending the TPS designation of Somalia for 18 months and, in the same notice, automatically extended for 6 months the validity of employment authorization documents issued under Somalia’s TPS designation. DHS has also communicated automatic extensions of TPS employment authorization documents through Federal Register notices independent of a TPS decision. Generally, Federal Register notices announcing automatic extensions of TPS employment authorization documents include instructions for employers for completing the Form I-9, among other things. Additionally, some notices state that, to reduce employer confusion regarding automatic extensions of TPS employment authorization documents, beneficiaries should explain the extension to their employer and may also provide their employer with a copy of the relevant Federal Register notice. In five cases, beginning in fiscal year 2018, USCIS mailed notifications of automatic extensions of employment authorization documents to thousands of TPS beneficiaries from Haiti, El Salvador, Syria, and Honduras as an alternative or a supplement to posting the information in Federal Register notices. USCIS officials told us that in these cases, they mailed individual notifications of the automatic extensions to ensure that the beneficiaries would not experience any gaps in employment authorization. According to the officials, they began this practice because of the large number of affected beneficiaries. Our examination of USCIS documents found that in four of these five cases, USCIS mailed individual notifications to the TPS beneficiaries without also posting a Federal Register notice communicating the automatic extension. In all five cases, USCIS published guidance on its website to inform TPS beneficiaries and employers about the use of individually mailed notifications to communicate employment authorization document extensions. USCIS’s website states that TPS beneficiaries may present the Federal Register notice or individually mailed notification to their employer along with their expired employment authorization documents to show proof of continued employment authorization. The individual notifications also state that beneficiaries may show the notifications, along with the expired employment authorization document, to any U.S. employer as proof of continued employment authorization. However, a USCIS handbook for employers and related guidance do not specifically identify the individually mailed notifications as an official means of communicating these extensions. USCIS’s Handbook for Employers: Guidance for Completing Form I-9 (M-274) provides guidance for employers on how to properly complete Form I-9, which helps employers verify that individuals are authorized to work in the United States. The handbook contains a section about automatic employment authorization document extensions for TPS beneficiaries that references USCIS’s use of Federal Register notices to inform the public of these extensions. However, the handbook for employers does not mention USCIS’s use of individually mailed notifications to communicate the automatic extensions. USCIS’s Instructions for Form I-9, Employment Eligibility Verification notes that certain employees, including TPS beneficiaries, may present an expired employment authorization document, which may be considered unexpired if the document has been extended by USCIS. The guidance also notes that employees should enter the expiration date of an automatic extension on Form I-9. However, the instructions for Form I-9 do not detail USCIS’s mechanisms for communicating these extensions, including its use of individually mailed notifications. Some employers have reportedly refused to accept expired employment authorization documents as proof of work authorization when the documents had been automatically extended. For example, the Department of Justice’s Civil Rights Division telephone interventions website indicates that on approximately 50 occasions from September 2017 through May 2019, the Immigrant and Employee Rights Section intervened to deter employers or medical licensing boards from rejecting valid work authorization documents and, in some cases, from terminating employment for TPS beneficiaries whose employment authorization documents had been automatically extended. Also, a letter to USCIS signed by 70 law professors and scholars states that some legal service providers have reported instances of employers’ terminating TPS beneficiaries’ employment because the employer did not understand or accept the individually mailed notifications. Further, USCIS has received feedback from certain stakeholders concerned that beneficiaries might not be receiving the individual notifications in time to avoid any potential gaps in work authorization, according to USCIS officials. USCIS officials told us that the Federal Register process may be beneficial for communicating employment authorization in some cases but that they may also continue to use the individually mailed notifications as a mechanism to communicate future extensions, depending on the circumstances. USCIS has acknowledged the potential benefits of updating external guidance regarding automatic extensions of TPS employment authorization documents. However, as of December 2019, USCIS had not taken action to do so. Replying to a letter of concern from an advocacy group, USCIS stated that it could consider updating the handbook for employers to add additional guidance regarding individually mailed notifications. Effective information and communication are vital for an entity to achieve its objectives. According to Standards for Internal Control in the Federal Government, management should document policies in the appropriate level of detail and externally communicate the necessary quality information to achieve an entity’s objectives. Updating external guidance, such as the employer handbook, to clearly identify each of the official mechanisms that USCIS may use to communicate automatic extensions of TPS employment authorization documents could help USCIS ensure that employers understand and accept each of its official mechanisms for communicating these automatic extensions. This, in turn, would help to reduce the risk of employers’ terminating beneficiaries from their jobs as a result of confusion caused by unclear or inconsistent guidance. The Secretary of Homeland Security has granted TPS, providing work authorization and protection from removal, to foreign nationals from 22 countries since TPS was established in 1990. DHS has generally communicated information about employment authorization for TPS beneficiaries in a Federal Register notice, although in some cases USCIS used individually mailed notifications to communicate automatic extensions of employment authorization documents. However, USCIS’s published guidance has not consistently identified individually mailed notifications as a mechanism that may be used, leading to confusion about beneficiaries’ employment eligibility and reportedly resulting in termination of some beneficiaries’ employment. Consistent published guidance that clearly identifies each of the mechanisms used to communicate automatic extensions of TPS employment authorization documents could help USCIS ensure that employers understand and accept the evidence USCIS provides for employment authorization, reducing the risk of erroneous termination of beneficiaries’ employment. The Director of USCIS should update published guidance, such as Handbook for Employers: Guidance for Completing Form I-9 (M-274), to consistently identify each of the official mechanisms that USCIS may use to communicate automatic extensions of TPS employment authorization documents. (Recommendation 1) We provided a draft of this report to DHS, State, the Department of Defense, the Department of Health and Human Services, and the U.S. Agency for International Development for review and comment. In its written comments, reproduced in appendix III, DHS agreed with our recommendation and noted planned actions to implement it, including updating guidance in DHS’s M-274 handbook. DHS’s planned actions will address the intent of our recommendation if they include updating guidance regarding each of the official mechanisms that USCIS may use to communicate automatic extensions of TPS employment authorization documents, including the use of individually mailed notifications. The U.S. Agency for International Development also provided written comments, which are reproduced in appendix IV. In addition, DHS and State provided technical comments that we incorporated as appropriate. The Department of Defense and the Department of Health and Human Services did not provide comments. We are sending copies of this report to the appropriate congressional committees, and the Acting Secretary of Homeland Security and Secretary of State, as well as the Secretary of Defense, the Secretary of Health and Human Services, the Director of the Centers for Disease Control and Prevention, and the Administrator of the U.S. Agency for International Development. If you or your staff have any questions about this report, please contact Chelsa Gurkin at (202) 512-2964 or GurkinC@gao.gov, or Rebecca Gambler at (202) 512-6912 or GamblerR@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this reports are listed in appendix V. Our objectives were to (1) describe Temporary Protected Status (TPS) determinations and numbers of beneficiaries since TPS was established in 1990; (2) describe the approach that the Department of Homeland Security (DHS), in consultation with the Department of State (State) and other relevant agencies, takes to inform the Secretary of Homeland Security’s TPS reviews; and (3) examine DHS’s public communication regarding TPS decisions and related information, including work authorization. To describe TPS determinations since TPS was established in 1990, we reviewed information and data in Federal Register notices for all TPS designations in fiscal years 1990 through 2019. Specifically, we reviewed the designation time frames and bases (i.e., ongoing armed conflict, environmental disaster, or extraordinary and temporary conditions) for each designation since TPS was established. We also analyzed U.S. Citizenship and Immigration Services (USCIS) data on numbers of TPS beneficiaries for fiscal years 1990 through 2018. In addition, we analyzed USCIS data on TPS beneficiaries’ characteristics, such as numbers, location, age, and gender of foreign nationals granted TPS, for fiscal year 2018. To assess the reliability of USCIS data on TPS beneficiaries, we reviewed documentation and interviewed USCIS officials to identify and rectify any missing or erroneous data. According to USCIS officials, USCIS removes from its data on TPS beneficiaries any who become U.S. citizens or whose status is withdrawn, either because they no longer meet eligibility requirements or because they requested that USCIS withdraw their status. However, according to officials, the data may include foreign nationals who have since died, moved out of the country, or have an additional immigration status. Additionally, because the data comprise information provided by TPS applicants, the data may include a small number of applicant errors, according to officials. We determined that the data for fiscal years 2000 through 2018 were sufficiently reliable to provide general information about the size and characteristics of TPS beneficiaries. USCIS was not able to provide reliable data on numbers of TPS beneficiaries before fiscal year 2000 because, according to USCIS officials, these data were not consistently entered electronically in USCIS information systems. To describe the approach that DHS, in consultation with State and other relevant agencies, takes to inform the Secretary of Homeland Security’s TPS reviews, we reviewed provisions in the Immigration and Nationality Act (INA) related to TPS as well as DHS and State documentation, such as informal guidance documents used since fiscal year 2014 or earlier regarding steps taken for a TPS review. We also conducted interviews with DHS and State officials related to the processes they have used to collect information for TPS reviews since fiscal year 2014. Specifically, we interviewed DHS officials from U.S. Customs and Border Protection; the U.S. Coast Guard; U.S. Immigration and Customs Enforcement; the Management Directorate; the Office of the Executive Secretary; the Office of Intelligence and Analysis; the Office of Legislative Affairs; the Office of Partnership and Engagement; the Office of Public Affairs; the Office of Strategy, Policy, and Plans, including the Office of Immigration Statistics; and USCIS—in particular, USCIS’s Office of Policy and Strategy and USCIS’s Refugees, Asylum, and International Operations Directorate. We interviewed State officials from the Bureau of Population, Refugees, and Migration and several regional bureaus, including desk officers from the Bureaus of African Affairs, Near Eastern Affairs, South and Central Asian Affairs, and Western Hemisphere Affairs. We also interviewed State officials from overseas posts for countries that we selected for our review, including El Salvador, Haiti, Honduras, Nepal, Sudan, and Yemen. We reviewed documentation that DHS and State provided for a judgmental, nongeneralizable sample of eight countries for which DHS rendered TPS decisions in fiscal years 2014 through 2018 (El Salvador, Haiti, Honduras, Nepal, Nicaragua, Sudan, Syria, and Yemen); the TPS decisions for these eight countries represented 26 of a total of 42 TPS decisions for 13 countries in that period. We selected this sample to represent a range of decision types and designation reasons, among other factors. While this sample cannot be generalized to the countries or decisions we did not review, it provided valuable information about the approach that DHS uses for TPS reviews. The primary documents that we reviewed for each decision included information about country conditions that USCIS and State had compiled and recommendations that USCIS and State leadership had provided to the Secretary of Homeland Security. Some of the documents that we received had been redacted because of ongoing litigation related to TPS. Table 3 provides additional details of the decisions in our judgmental sample. In addition, we reviewed examples of other information that may be provided for a TPS review, including examples of input from other DHS components, other U.S. agencies, the White House, members of Congress, foreign governments, and nongovernmental organizations. Specifically, we received examples of this type of information for each of the eight countries in our judgmental, nongeneralizable sample, representing 15 of the 26 TPS decisions. For example, this information included immigration data and internal intelligence analyses compiled by DHS’s Office of Immigration Statistics, U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, and Office of Intelligence and Analysis. We also reviewed examples of updates provided by senior Department of Defense officials for the Secretary of Homeland Security regarding the security situation in a country; technical input from the Department of Health and Human Services Centers for Disease Control and Prevention about the status of an epidemic in a country; and information from the U.S. Agency for International Development about country conditions on the ground. In addition, we interviewed officials from these three agencies regarding the types of information that they may provide for TPS reviews. Further, we reviewed examples of letters from members of Congress, foreign government officials, and nongovernmental organizations related to TPS reviews. Moreover, we reviewed examples of briefing or meeting agendas and related materials for internal and external briefings, including external briefings with White House officials, foreign government officials, and nongovernmental organizations. To examine DHS’s public communication regarding TPS decisions and related information, including work authorization, we reviewed DHS’s public communications related to TPS, including Federal Register notices, press releases, and USCIS’s website, among other information. We analyzed information in Federal Register notices published from November 29, 1990, through October 1, 2019 (the most recent available at the time of our review), to determine the timing of notices for TPS decisions and the types of information included in the notices. We reviewed examples of USCIS’s Office of Public Affairs guidance for public communication of TPS decisions. We also interviewed USCIS officials regarding the mechanisms that DHS used to communicate TPS decisions and related information, including DHS’s process for drafting and publishing Federal Register notices. Further, we examined DHS’s guidance and procedures as of fiscal year 2019 for communicating TPS employment authorization, including automatic extensions of employment authorization. We reviewed USCIS’s public communications related to automatic extensions of TPS employment authorization for both beneficiaries and employers in Federal Register notices, individually mailed notifications, an employer handbook, and information published on USCIS’s website. We interviewed USCIS officials regarding USCIS’s approach to communicating TPS employment authorization, including automatic extensions. We also reviewed information from the Department of Justice Civil Rights Division’s website related to confusion over automatic extensions of employment authorization documents for TPS beneficiaries. Additionally, we reviewed a letter to USCIS signed by 70 law professors and scholars related to instances of employers terminating TPS beneficiaries. Finally, we compared DHS’s guidance and procedures with federal internal control standards related to documenting policies and externally communicating information. We conducted this performance audit from September 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 4 lists the numbers of TPS beneficiaries, by country of citizenship, in fiscal years 2000 through 2018. During this period, the country with the largest number of TPS beneficiaries in any given fiscal year was El Salvador, with 262,262 in fiscal year 2010; followed by Honduras, with 85,759 in fiscal year 2007; and Haiti, with 58,294 in fiscal year 2014. In contrast, during the same period, Montserrat had the smallest maximum number of TPS beneficiaries in any given fiscal year, with a maximum of 21 in fiscal year 2004; followed by Angola, with a maximum of 47 in fiscal year 2002; and Burundi, with a maximum of 50 in fiscal year 2007. In addition to the contacts named above, Miriam Carroll Fenton and Taylor Matheson (Assistant Directors), Elisabeth Helmer, Cristina Norland, Ben DeYoung, Martin De Alteriis, Neil Doherty, Jenny Grover, Reid Lowe, Mary Moutsos, Jan Montgomery, Jon Najmi, Nicole Willems, and Bailey Wong made key contributions to this report. Alana Miller and Danielle Rudstein provided technical assistance.", "summary": "The INA includes provisions for eligible foreign nationals residing in the United States to obtain temporary humanitarian protection from removal, as well as work authorization, when their country of origin is designated for TPS. Since 1990, nationals of 22 countries have received TPS. The Secretary of Homeland Security may designate a country for TPS after consulting with other agencies and determining that the country meets statutory criteria related to armed conflict, environmental disaster, or extraordinary or temporary conditions that prevent its nationals from returning in safety. The Secretary may designate a country for TPS for periods of 6 to 18 months and can extend a TPS designation if deemed appropriate. GAO was asked to review the TPS decision process. This report, among other things, (1) describes the approach DHS takes to inform the Secretary of Homeland Security's TPS reviews and (2) examines DHS's communication to the public regarding TPS decisions and related information, including employment authorization. GAO reviewed documentation and data related to TPS decisions, including a nongeneralizable sample of 26 decisions for eight countries in fiscal years 2014 through 2018. GAO selected the countries to reflect various types of TPS decisions, among other factors. GAO also interviewed agency officials. The Department of Homeland Security's (DHS) reviews of countries for Temporary Protected Status (TPS) include three main steps, according to DHS and other agencies' documents and officials. First, the Secretary of Homeland Security may initiate a review of a country for TPS designation in response to various triggering factors, such as a request from a foreign government, on the basis of one or more statutory conditions. The Immigration and Nationality Act (INA) requires subsequent reviews after an initial designation. Second, U.S. Citizenship and Immigration Services (USCIS)—which manages and coordinates the TPS review process for DHS—and the Department of State (State) compile country conditions reports and recommendations to inform the Secretary's decision. Although the INA does not prescribe the other agencies that must be consulted for a TPS review,State generally has a role in providing input for the Secretary of Homeland Security's consideration. GAO found DHS collected country conditions reports and recommendations from USCIS and State for all eight of the countries GAO selected for its review. Other DHS components and non-DHS entities may also provide information. Third, under the INA,the Secretary of Homeland Security exercises discretion in deciding whether to initially designate a country for TPS. For an existing designation, the Secretary determines whether country conditions warrant an extension or termination of TPS. DHS provides official notice of decisions in the Federal Register. DHS has communicated TPS decisions to the public through required Federal Register notices as well as other mechanisms. However, DHS has not provided consistent guidance regarding mechanisms it uses to communicate automatic extensions of TPS employment authorization documents. USCIS officials stated that the agency has typically communicated these extensions of documents for TPS beneficiaries through Federal Register notices. However, for five recent automatic extensions, USCIS instead mailed individual notifications to thousands of beneficiaries. USCIS guidance on its website identifies the individual notifications as a mechanism for communicating automatic extensions, but an employers' handbook and related guidance do not. As a result, some employers reportedly terminated TPS beneficiaries' employment because the employers did not understand or accept the notifications as proof of employment authorization. Consistent guidance about the mechanisms USCIS uses could help reduce the risk that TPS beneficiaries will lose their jobs because of confusion about their authorization to work in the United States. GAO recommends USCIS consistently identify in published guidance the mechanisms used to communicate automatic extensions of TPS employment authorization documents. DHS concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "FinCEN oversees the administration of the Bank Secrecy Act and related AML regulations, and has authority to enforce BSA, including through civil money penalties. FinCEN issues regulations and interpretive guidance, provides outreach to regulated industries, conducts examinations, supports select examinations performed by federal and state agencies, and pursues civil enforcement actions when warranted. FinCEN’s other responsibilities include collecting, analyzing, and disseminating information received from covered institutions, and identifying and communicating financial crime trends and methods. See figure 1 for federal supervisory agencies involved in the BSA/AML framework. FinCEN primarily relies on supervisory agencies and other entities to conduct examinations of U.S. financial institutions to determine compliance with BSA/AML requirements (see table 1). FinCEN delegated BSA/AML examination authority to these supervisory agencies, including the banking regulators, SEC, CFTC, and IRS. IRS has been delegated authority to examine certain financial institutions (such as money services businesses) not examined by the federal functional regulators for BSA compliance. The SROs that SEC and CFTC oversee—such as FINRA and NFA respectively—have BSA/AML compliance responsibilities for the activities of their members. Apart from their delegated examination authority under the BSA, the federal functional regulators and SROs have their own regulatory authority to examine institutions they supervise for compliance with BSA. FinCEN, the banking regulators, and SEC may assess civil money penalties for BSA violations and take enforcement actions for noncompliance. The SROs have established BSA-related rules or requirements for their members based on federal requirements and may take disciplinary actions against them for violations of these rules. IRS issues letters of noncompliance to institutions it oversees and generally relies on FinCEN for formal civil enforcement action, but IRS-CI has the authority to investigate criminal violations. Other law enforcement agencies (for example, DOJ Criminal Division, FBI, and ICE- HSI) also can conduct criminal investigations of BSA violations. More generally, law enforcement agencies and prosecutors may review and start investigations into a variety of criminal matters based on BSA reporting filed in their areas of jurisdiction. According to FinCEN, BSA recordkeeping and reporting requirements establish a financial trail for law enforcement investigators to follow as they track criminals, their activities, and their assets. Finally, DOJ prosecutes financial institutions and individuals for violations of federal criminal money laundering statutes. U.S. financial institutions can assist government agencies in the detection and prevention of money laundering and terrorist financing by complying with BSA/AML requirements such as maintaining effective internal controls and reporting suspicious financial activities. BSA regulations include recordkeeping and reporting requirements, such as to keep records of cash purchases of negotiable instruments, file CTRs on cash transactions exceeding $10,000, and file SARs when institutions suspect money laundering, tax evasion, or other criminal activities. Law enforcement agencies and prosecutors (through FinCEN) may utilize the 314(a) program to locate accounts and transaction information from U.S. financial institutions when terrorism or money laundering activity is reasonably suspected based on credible evidence. Most financial institutions must develop, administer, and maintain effective AML programs. At a minimum, those financial institutions must establish a system of internal controls to ensure ongoing compliance with the BSA and its implementing regulations; provide AML compliance training for appropriate personnel; provide for independent testing; and designate a person or persons responsible for coordinating and monitoring day-to-day compliance. In addition to these requirements, FinCEN issued a final rule in 2016 requiring banks, brokers or dealers in securities, mutual funds, futures commission merchants, and introducing brokers in commodities to establish risk-based procedures for conducting customer due diligence. More specifically, covered financial institutions are to establish and maintain written policies and procedures designed to (1) identify and verify the identity of customers; (2) identify and verify the identity of the beneficial owners of legal entity customers opening accounts; (3) understand the nature and purpose of customer relationships to develop customer risk profiles; and (4) conduct ongoing monitoring to identify and report suspicious transactions and, on a risk basis, maintain and update customer information. For example, covered financial institutions must collect from the customer the name, birthdate, address, and Social Security number or equivalent of any beneficial owners. The financial institutions covered by this rule—which do not include money services businesses, casinos, or insurance companies—had until May 11, 2018, to comply. Supervisory agencies and SROs oversee financial institutions’ compliance with BSA/AML requirements primarily through compliance examinations, which, for banking regulators, can be components of regularly scheduled safety and soundness examinations. All supervisory agencies and SROs we interviewed that examine financial institutions for BSA/AML compliance have established BSA/AML examination manuals or procedures. For example, to ensure consistency in the application of BSA requirements, in 2008 FinCEN issued a BSA examination manual for use in reviewing money services businesses, including for IRS and state regulators. According to FinCEN officials, FinCEN has been updating the entire manual and completed a draft of the update in the fourth quarter of fiscal year 2018, with the goal of finalizing the updated manual by the end of fiscal year 2019. Similarly, in 2005 the federal banking regulators collaborated with FinCEN on a BSA/AML examination manual issued by the Federal Financial Institutions Examination Council (FFIEC). The entire FFIEC manual has been revised several times since its release (most recently in 2014). In May 2018, FFIEC also issued new examination procedures to address the implementation of the 2016 customer due diligence and beneficial ownership rule, discussed earlier. These updated customer due diligence examination procedures replaced the existing chapter in the FFIEC BSA/AML examination manual and added a new section “Beneficial Ownership Requirements for Legal Entity Customers—Overview and Examination Procedures.” In addition, the FFIEC has been working on an update of the entire FFIEC manual, which is expected to be complete by the end of the calendar year 2019 or early 2020. SEC and FINRA, as well as CFTC’s respective SROs, have nonpublic procedures for conducting examinations of the institutions they oversee. SEC, FINRA, and NFA officials all stated that they have updated procedures to address the new customer due diligence regulations that were applicable beginning in May 2018. We discuss examination activities of the supervisory agencies in more detail later in this report. FinCEN and supervisory agencies consider risk when planning BSA/AML examinations and all utilized BSA data to some extent to scope and plan examinations (see table 2). As we reported in prior work, BSA/AML examinations are risk-based—examiners have the flexibility to apply the appropriate level of scrutiny to business lines that pose a higher level of risk to the institution. Covered financial institutions are expected to complete a BSA/AML risk assessment to identify specific products, services, and customers, which supervisory agencies can use to evaluate the compliance programs of financial institutions and scope their examinations. Most officials from supervisory agencies and SROs said they also consider asset size, among other factors, to determine examination frequency and scope. For example, the federal banking regulators implemented less frequent examination cycles for smaller, well-capitalized financial institutions. FinCEN is the administrator of BSA and delegated BSA/AML examination authority to the supervisory agencies. FinCEN officials told us they have been considering how regulators of financial institutions of different size and risk assess BSA/AML compliance and continue to work with federal regulators to identify better ways to supervise examinations. For example, in a February 2019 speech, the Director of FinCEN stated that one of FinCEN’s current regulatory reform initiatives was reviewing the risk- based approach to the examination process. Although supervisory agencies with delegated authority conducted the vast majority of BSA/AML compliance examinations, FinCEN has conducted a few of its own examinations in areas it considers a high priority. FinCEN officials told us it mostly considers risk (not size) when conducting its own examinations because even small institutions could pose money laundering risk. FinCEN states that it uses an intelligence- driven approach to target examinations in high-risk areas. For example, FinCEN officials told us they have conducted BSA/AML compliance examinations of financial institutions on issues such as virtual currencies and data breaches in domestic branches of foreign banks. In an August 2018 speech, the Director of FinCEN noted that FinCEN, working closely with BSA examiners at IRS, had examined more than 30 percent of identified registered virtual currency exchangers and administrators since 2014—totaling about 30 examinations, according to FinCEN officials. FinCEN officials said they conducted a total of five BSA/AML examinations with IRS in fiscal years 2017 and 2018. In addition, FinCEN conducted a BSA/AML examination in fiscal year 2018 of a branch of a foreign bank that had been previously examined by its banking regulator to review the effectiveness of the bank’s BSA compliance department. All of the banking regulators with which we spoke stated they considered risk and, to some extent, asset size to determine examination frequency and scope. The FFIEC BSA/AML examination manual establishes a risk- based approach for bank examinations, including incorporating a review of BSA/AML risk assessments of a financial institution in the scoping and planning of an examination. In considering asset size to determine the frequency of examinations, all of the banking regulators adopted rules to reduce the frequency of examinations for small, well-capitalized financial institutions—as seen in table 2. In addition, in their annual reports to FinCEN the banking regulators provide a description of the criteria used for determining the timing and scope of BSA/AML examinations, such as risk and asset size. For instance, FDIC and the Federal Reserve noted in their annual reports to FinCEN that the timing and scope of their BSA/AML examinations are primarily determined by an institution’s BSA/AML risk profile and factors such as its condition, overall rating, and asset size. OCC, in its annual report, said that examination scope included consideration of the bank’s BSA/AML risk assessment, quality of validated independent testing (internal and external audit), previous examination reports, BSA reports, and other relevant factors, including data from the OCC’s Money Laundering Risk System. OCC officials said the system identifies potential indicators of BSA/AML risk by measuring the extent to which various types of products, services, customers, and geographies are offered or served by supervised banks. For banks that report into that system, OCC officials said they factor information from the system into developing an examination strategy that helps determine resource allocation and expertise needs. According to NCUA, each credit union must receive a BSA examination each examination cycle—although the frequency and scope of these examinations may vary based on the credit union’s size and other risk factors. For example, small credit unions with assets under $50 million may be subject to a defined-scope examination (which includes a BSA examination) where the risk areas have already been identified and the scope is pre-determined. NCUA also provides a BSA questionnaire that is publicly accessible to assist its examiners in implementing BSA examinations (for example, to help examiners assess the BSA risk of the credit union and scope the examination). Factors considered in the questionnaire include prior violations, correspondence from law enforcement related to BSA compliance, whether or not the credit union conducted a risk-assessment, and high-risk accounts. While the FFIEC BSA/AML examination manual and other federal banking documentation discuss considering BSA/AML risk when determining the scope and frequency of examinations, officials from all four banking associations with whom we spoke said, in practice, examiners do not always use a risk-based approach when assessing BSA compliance. Nearly all said examiners may take a zero-tolerance approach when conducting examinations. For example, representatives from two industry associations said that although failure to file a single SAR or unintentional errors should be treated differently than egregious, intentional noncompliance, or a pattern of negligence (in terms of level of noncompliance), that sometimes has not been the case. Federal Reserve officials noted that each examination is specific to the facts and circumstances of that examination and that systemic deficiencies in a bank’s BSA/AML compliance program are generally treated differently than nonsystemic deficiencies. As discussed earlier, FFIEC has been working on updating its entire FFIEC BSA/AML examination manual, including updates to more clearly state the agencies’ approach to risk-based supervision, according to OCC officials. Representatives from two of the four banking associations with which we spoke with stated they were involved in providing input on recent updates to FFIEC’s examination manual and all four had provided input to the effort to implement the customer due diligence and beneficial ownership rule. For example, OCC officials said that the risk-based approach is most clearly discussed in the opening pages of the current FFIEC manual and could be more directly incorporated throughout the manual to provide enhanced guidance to examiners. These officials stated that the agencies have been drafting proposed edits for drafting group consideration. More generally, FFIEC undertook its Examination Modernization Project as a follow-up to reviews required under the Economic Growth and Regulatory Paperwork Reduction Act. One of the project’s efforts seeks feedback from selected supervised institutions and examiners on ways to improve the examination process. For example, the FFIEC examination modernization project reviewed, compared, and identified common principles and processes for risk-focusing examinations of community financial institutions. FFIEC members also committed to issue reinforcing and clarifying examiner guidance on these risk-focused examination principles. In addition, Treasury, FinCEN, and the banking regulators established a working group to identify ways to improve the efficiency and effectiveness of BSA/AML regulations and supervision. In October 2018, the working group issued a joint statement to address instances in which banks with less complex operations and lower-risk BSA/AML profiles may decide to enter into collaborative arrangements with other banks to share resources to manage their BSA/AML obligations in order to increase efficiency and reduce burden. In December 2018, the working group issued another joint statement that recognized that banks may use existing tools in new ways or adopt new technologies to more effectively and efficiently meet their BSA/AML obligations. SEC shares responsibility for broker-dealer examinations with SROs, but has sole responsibility for examinations of mutual fund companies and maintains supervisory authority over SROs. SEC’s Office of Compliance Inspections and Examinations conducts risk-based examinations of regulated entities including mutual funds (under the Investment Adviser/Investment Company Examination Program) and broker-dealers (under the Broker-Dealer Exchange Examination Program). According to SEC documentation, the scope of examinations is based on a risk assessment of various factors such as the type of business a firm engages in and its customer base. This includes consideration of whether the firm engages in high-risk activities. The Office of Compliance Inspections and Examinations assesses the risks from information sources such as tips, complaints and referrals, FinCEN BSA data, pre- examination due diligence, and previous examination history. During the period we reviewed, BSA/AML examinations of mutual funds accounted for less than 1 percent of all securities BSA/AML examinations and no mutual funds were cited for violations of BSA. SEC staff said investors primarily purchase shares of mutual funds through a distributor (such as a broker-dealer) and, in these cases, mutual funds do not know, and are not required to know, the identities of individual investors. In these cases, the broker-dealer distributor has more information about the individual investors and may be examined for BSA compliance as part of FINRA and SEC BSA examinations. FINRA conducts the majority of examinations of broker-dealer firms and imposes anti-money laundering rules on its members. FINRA officials told us that they use a risk-based approach for AML examinations, which considers the size, complexity, customer types, and risks posed by business activities in assessing potential BSA/AML risk. These risk factors affect the timing of their reviews (for example, if a broker-dealer is deemed to be higher-risk, it will be examined in the same year it was assessed). According to FINRA officials they have different expectations for firms’ AML programs, based on size (larger firms typically are expected to have more complex AML programs than smaller firms). FINRA publishes a template for small firms to help them fulfill their responsibilities to establish an AML compliance program. The template provides text examples, instructions, relevant rules, websites, and other resources useful for plan development. However, representatives from a securities industry association told us that BSA/AML rulemaking and examinations sometimes do not take into account the varying levels of risk of different types of business models and activities among firms. Furthermore, these representatives stated that sometimes compliance expectations are communicated through enforcement actions rather than through rulemaking or guidance. As noted previously, one of FinCEN’s has been reviewing the risk-based approach to the examination process. According to a February 2019 speech by the Director of FinCEN, FinCEN’s initiatives also included reviewing agencies’ approach to supervision and enforcement and identifying better ways to communicate priorities. Representatives from this securities industry association also identified certain training and tools on BSA/AML compliance and implementation that FINRA and SEC staff provide as helpful to the securities industry in identifying priorities and compliance deficiencies. For example, SEC’s Office of Compliance Inspections and Examinations and FINRA publish annual examination priorities, which identified both customer due diligence and suspicious activity monitoring as key areas for 2019. According to SEC staff, SEC and FINRA examination priorities have identified suspicious activity monitoring as a key area for the past several years and have identified customer due diligence as a priority since the implementation of the customer due diligence rule in 2018. FINRA published examination findings for the first time in 2017 and again in 2018, including selected findings related to BSA/AML compliance, which representatives from the industry association said have been very useful because they describe specific BSA/AML compliance deficiencies identified by FINRA across the industry and can assist firms in improving their compliance programs. Additionally, FINRA and SEC included an AML-topic in their 2017 National Compliance Outreach Program for broker-dealers. SEC also occasionally publishes risk alerts on its website and participates in industry outreach efforts. The SROs that conduct the majority of examinations of futures firms use a risk-based approach. CFTC has authority to examine futures commission merchants and futures and commodities introducing brokers, but does not routinely conduct examinations of the firms it supervises. Instead, CFTC oversees the examinations conducted by its SROs. CFTC delegated examination authority to two SROs—NFA and the CME Group. NFA conducts the majority of BSA examinations and is the only SRO that examines independent introducing brokers. During the period we reviewed, NFA was assigned the majority of futures firms and conducted a majority of AML examinations. NFA and CME Group stated in CFTC’s annual reports to FinCEN that they utilize a risk-based approach for AML examinations. CME Group reported that it determined both the frequency and the scope of examinations through an overall assessment of the financial and operational risks posed by a futures commission merchant. NFA is required to examine futures commission merchants annually, but reported that the timing and frequency of introducing broker examinations were based predominately on the risks present with a firm. NFA’s risk models measure the riskiness of each firm, and firms are prioritized for examination based on the output from the risk model. In an interpretative notice, NFA recognized that financial institutions vary in size and complexity, and that firms should consider size, among other factors (such as the nature of business and its risks to money laundering) in designing a program to implement requirements such as customer verification and suspicious activity reporting. Representatives from a futures industry association told us that there is a one-size-fits-all approach to BSA/AML compliance in that the rules are broadly applied to varying types of financial institutions. They noted that BSA/AML guidance tends to focus on banks and treat other types of financial institutions (money service business, casinos, and others) as one group, despite their diversity. In relation to the futures industry, the representatives stated that this makes it difficult for futures commission merchants to implement requirements because the rules or guidance do not necessarily take into consideration their unique business structure. CFTC staff told us that BSA requirements could be applied differently to different types of firms and were supportive of tailoring or reducing requirements where the obligations were duplicative, overly burdensome, and BSA-related risks were low. For example, CFTC staff recommended that FinCEN relieve (1) certain introducing brokers known as voice brokers and (2) futures commission merchants that are initial clearing firms from customer identification program requirements because they have limited interaction with the customer and do not have access to customer information that would allow them to perform customer due diligence. CFTC staff told us they have been working with FinCEN on implementing these recommendations. In July 2019, FinCEN issued additional guidance on the application of the customer identification program rule and the beneficial ownership rule to certain introducing brokers, which stated that an introducing broker that has neither customers nor accounts as defined under the customer identification program rule has no obligations under that rule or the beneficial ownership rule. IRS examination staff use a risk-based approach to examine for BSA/AML compliance. In 2008, FinCEN and IRS issued a manual for use by IRS (and state regulator) examiners who perform risk-based examinations of money services businesses, which are a category of nonbank financial institutions. The BSA/AML manual for money services businesses states that examiners should determine the appropriate depth and scope of the examination procedures based on their assessment of the risks of the businesses. Specifically, the manual also states examiners should scope their examinations based on their assessment of the risks, which they can assess by analyzing information including the business’ BSA/AML risk assessment and AML compliance program, and then conduct selective transaction testing to determine if the AML program is effective. The amount of transaction testing will vary based on the assessed level of risk—the amount of testing would be reduced if the examiner determined the risks were minimal. IRS officials said that IRS examiners do not perform scheduled examinations of all money services businesses every year; rather, they review a percentage of businesses each year based on risk-related factors such as a history of noncompliance, high-risk geographic areas, and financial institutions identified by referrals. Thus, there may be some money services businesses that are not examined for years and some that are examined much more frequently. As discussed earlier, FinCEN has been updating the BSA/AML Manual for money services businesses. According to the manual, IRS examiners should consider size, among other things, as a factor in their examination approach. IRS officials with whom we spoke said that smaller money transmitters may not have the resources or understand monitoring methods necessary to implementing BSA/AML compliance programs such as suspicious activity monitoring and reporting. IRS procedures state that it is the responsibility of BSA examiners to ensure the financial institution is informed of reporting, registration, recordkeeping, and compliance program requirements of the BSA. IRS officials further explained that they share methods of detecting suspicious activity with small money transmitters to help them meet their requirements. FinCEN enforcement actions can be based on sources that include referrals from examining authorities, information from financial institutions, interviews, and leads from law enforcement. Supervisory agencies, including the federal banking regulators, SEC, CFTC, and their respective SROs are to promptly notify FinCEN of any significant potential BSA violations. IRS also makes referrals to FinCEN for violations it identifies in its BSA examinations, such as willful violations of AML program requirements and recordkeeping and reporting regulations and structuring. Additionally, financial institutions can self-report violations, DOJ or other law enforcement agencies may provide leads, and FinCEN personnel can refer potential violations to FinCEN’s Enforcement Division to be investigated. According to FinCEN officials, after receiving a referral FinCEN’s Enforcement Division opens a case in the Financial Intelligence Repository System, and Enforcement Division staff and management evaluate the circumstances of the alleged violation and provide a written recommendation for action. FinCEN generally resolves its referrals through one of three ways: (1) closing the case without contacting the subject of the referral, (2) issuing a letter of warning or caution to the subject institution or individual, or (3) assessing a civil monetary penalty. According to FinCEN officials, management in the Enforcement Division approve which action will be taken to close the referral, and if the recommendation is to pursue some type of civil enforcement action—the Director of FinCEN and the Office of Chief Counsel would be involved in that determination. FinCEN officials said that factors the Enforcement Division considers when determining which action to recommend or take include: any impact or harm to FinCEN’s mission by identified violations; pervasiveness of the violations; the gravity and duration of the violations; the institution’s history of violations; continuation of the activity; possible obstruction or concealment; any remedial actions taken by institution; and whether the institution received financial gain or benefit from violation. According to FinCEN officials, the Enforcement Division maintains an administrative record for all cases that result in an enforcement action, and when the action is complete, the Financial Intelligence Repository System is updated to reflect that the referral is closed. From January 1, 2015, to September 25, 2018, FinCEN received 419 referrals directly from supervisory agencies (see table 3). Two reports have noted some issues associated with referrals to FinCEN, including delays in reporting by an agency and inconsistent status updates from FinCEN to agencies. A 2018 report by the Treasury Inspector General for Tax Administration found FinCEN had long delays in processing IRS referrals and assessed penalties on a small proportion of referrals. For example, 49 of 80 cases referred by IRS during fiscal years 2014–2016 remained open as of December 31, 2017, and FinCEN assessed penalties in six of the 80 referrals. In response, FinCEN management said the primary reason for not processing referrals was the “age” of the violations when the referral was made to FinCEN, which according to FinCEN officials impedes a thorough investigation of the violations due to an imminent expiration of the applicable statute of limitations. The report recommended that IRS consider having its FinCEN referral process reviewed by process experts to make it more efficient because delays in submitting cases to FinCEN could lead to FinCEN taking longer to process referrals or not considering cases for further civil penalty. In response to the recommendation, IRS stated that it completed a process improvement review of its FinCEN referral process, and had since updated its internal guidelines (in February 2019) to reflect the improved procedures. The Office of Inspector General of Treasury reported in 2016, among other findings, that several federal and state regulators told it that FinCEN did not routinely inform them of the status of their referred cases. The Office of Inspector General recommended that FinCEN implement a process to periodically notify federal and state regulators of the status of and actions taken on referred cases. In its response, FinCEN agreed with the recommendation, and stated that it follows its standard operating procedures for case processing. FinCEN’s response stated that its case processing procedures provide that in all FinCEN enforcement actions taken in coordination with other government partners (including other regulators), FinCEN’s Enforcement Division will provide regulators with a copy of FinCEN’s consent order that details the violations, factual findings, and proposed settlement terms. FinCEN also noted that its Enforcement Division holds standing and ad hoc meetings with each of its federal regulatory partners to discuss, among other matters, the status of top priority referrals. Treasury’s Office of Inspector General closed the recommendation based on FinCEN’s response and its review of FinCEN’s standard operating procedures—which it said included procedures to provide regulators with a copy of FinCEN’s approved consent order and proposed settlement terms in the case of formal enforcement actions. FinCEN officials also told us that FinCEN has been working to update and finalize its policies and procedures to further address the recommendation from Treasury’s Office of Inspector General, but did not have a time frame for completion. When FinCEN assesses a penalty for BSA violations, it may do so independently or concurrently with supervisory agencies. In a concurrent action, FinCEN will assess a penalty with the other regulator and has sometimes deemed the penalty (or a portion of its penalty) satisfied by a payment to the regulator. FinCEN took 26 enforcement actions over the period we reviewed (from fiscal year 2015 through the second quarter of fiscal year 2018), five of which were concurrent with supervisory agencies. Casinos, depository institutions, and money services businesses each had eight enforcement actions and a precious metals firm and a securities/futures firm had one each. In December 2018, FinCEN assessed a $14.5 million civil monetary penalty against UBS Financial Services, $5 million of which was paid to Treasury and the remainder satisfied by payment of penalties for similar or related conduct imposed by SEC and FINRA. Federal banking regulators identify and cite violations of BSA/AML requirements as part of the supervision process, including the examination process. The regulators employ progressive enforcement regimes to address supervisory concerns that arise during the examination cycle or through other supervisory activities. If the institution does not respond to the concern in a timely manner, the regulators may take informal or formal enforcement action, depending on the severity of the circumstances. Informal enforcement actions include obtaining an institution’s commitment to implement corrective measures under a memorandum of understanding. Formal enforcement actions include issuance of a cease-and-desist order or assessment of a monetary penalty, among others. Some factors that the banking regulators reported considering when determining whether to raise an informal enforcement action to a formal enforcement action include the severity of the weakness and the bank’s commitment to correct the identified deficiencies. See appendix II for recent data on enforcement actions taken by the banking regulators. All SEC enforcement actions and all SRO disciplinary actions are public. SEC has authority to enforce compliance with BSA for mutual funds and broker-dealers. If SEC examiners find significant deficiencies with a firm’s BSA program, the examiners may refer the finding to SEC’s Division of Enforcement or an SRO for enforcement. In addition, SEC’s BSA Review Group in the Division of Enforcement’s Office of Market Intelligence may refer matters identified through the review of BSA reports to staff in SEC’s Division of Enforcement and in the Office of Compliance Inspections and Examinations for further consideration and potential follow-up. SEC’s Division of Enforcement will assess whether to proceed with an investigation, determine whether a violation has occurred, and if so, whether an enforcement action should be recommended against the firm or any individuals. In certain cases, SEC’s Division of Enforcement may undertake an investigation where there has been a widespread or systemic failure to file SARs or systemic omission of material information from SARs. When making this assessment, SEC staff said SEC considers a number of factors including: the egregiousness of the conduct, the length of time over which the violations occurred, number of SARs that were not filed or that omitted material information, the disciplinary history of the firm, and adherence to any internal policies and procedures. FINRA has enforcement authority that includes the ability to fine, suspend, or bar brokers and firms from the industry and has two separate procedures (settlement and formal complaint) through which it applies enforcement actions. Through a settlement, a firm or broker in violation can offer to settle with FINRA through a Letter of Acceptance, Waiver, and Consent. A formal complaint is filed with and heard before FINRA’s Office of Hearing Officers. See appendix II for recent data on enforcement actions taken by SEC and FINRA. Although CFTC delegated examination authority to NFA and the CME Group, it retained authority to pursue enforcement actions against futures firms. While CFTC does not typically conduct BSA/AML examinations, it does have a BSA review team that reviews SARs to identify potential violations of futures laws, and CFTC has taken enforcement actions based on leads developed from SARs reviewed. SROs generally conduct BSA examinations of futures firms, and at the conclusion of an examination, the SROs will issue a report to the futures firm to notify the firm of any deficiencies in its AML program. If the deficiencies are not significant, NFA officials stated NFA will cite the deficiency in the examination report and close the examination with no disciplinary action but require corrective action before closing it. If examination findings are significant, then NFA may issue a warning letter or recommend that its Business Conduct Committee issue a formal complaint charging the firm with violating NFA’s AML requirements (which is an enforcement action). NFA officials told us it resolves most enforcement actions related to violations of NFA’s BSA/AML rules through settlement agreements that assess a fine. NFA may take other types of actions for violations of their rules, such as suspension of membership or expulsion. See appendix II for recent data on informal and formal actions SROs took. Although FinCEN has delegated authority to IRS to conduct civil BSA/AML examinations for a variety of nonbank financial institutions and individuals, IRS does not have authority to enforce most civil BSA violations identified. If IRS Small Business/Self-Employed Division examiners find BSA violations when examining an institution, the division can send a letter of noncompliance—a letter 1112—with a summary of examination findings and recommendations to the institution, which also includes an acceptance statement for the institution to sign. Additionally, if IRS Small Business/Self-Employed Division examiners identify significant civil violations during a BSA/AML examination, such as willful violations of BSA reporting and record-keeping requirements, they may refer civil violations to FinCEN or refer certain violations of potential criminal activity to IRS-CI. See appendix II for recent data, including the number of institutions issued a letter 1112. In recent years, Treasury and FinCEN have led efforts to identify BSA goals and priorities such as issuing a national strategy and risk assessments for combating illicit financing crimes. They also established key mechanisms for BSA/AML collaboration, such as interagency working groups, information-sharing agreements, and liaison positions that encompass multiple federal, state, and local agencies and private-sector participants. However, these key mechanisms have been less inclusive of the futures industry than other financial sectors. Treasury and FinCEN led collaborative efforts to identify BSA goals and priorities, including the following: National Strategy. In December 2018, Treasury issued the National Strategy for Combating Terrorist and Other Illicit Financing as required by 2017 legislation. The national strategy discussed various agencies’ BSA-related goals and objectives, including those of the supervisory agencies and law enforcement groups with which we spoke for our review. It also laid out key priorities, such as protecting the United States from terrorist attacks, simplifying the BSA regulatory framework to work more effectively and efficiently, and ensuring the stability of domestic and global markets by reducing fraud, money laundering, and other economic crimes. The strategy also discussed interagency coordination and information-sharing mechanisms (including public-private information sharing). For example, the national strategy states that FBI provided a classified briefing twice a year to selected personnel from the 20 largest financial institutions in the United States to share information on terrorist financing trends. In addition, the national strategy provided data on prosecutions related to money laundering. For example, in fiscal years 2015–2017, DOJ annually charged on average 2,257 defendants with money laundering. Risk assessments. Congress also directed Treasury and relevant agencies to evaluate the effectiveness of existing efforts that address the highest level of risks associated with illicit finance. In December 2018, Treasury issued three risk assessments that identified money laundering, terrorist financing, and proliferation financing risks and describe Treasury’s and relevant agencies’ efforts to address these risks. The three risk assessments underpin the 2018 National Strategy. Treasury involved multiple agencies in the development of the risk assessments, including supervisory agencies, SROs, and several law enforcement agencies. The terrorist financing and money laundering risk assessments built on previous Treasury-led risk assessments issued in 2015, but the 2018 proliferation financing risk assessment was the first ever issued. Treasury’s Strategic Plan (2018–2022) and other guidance. Prior to the publication of the National Strategy, Treasury issued a strategic plan in February 2018 that identified strategies, goals, measures, and indicators of success to meet its strategic goal for preventing terrorists and other illicit actors from using the U.S. and international financial systems. FinCEN also issued advisories or guidance that identify BSA and law enforcement priorities. For example, in February 2014 FinCEN issued guidance that clarified how financial institutions should align their BSA reports to meet federal and state law enforcement priorities if the institutions provide services to marijuana-related businesses. The related federal and state law enforcement priorities included preventing the proceeds of marijuana sales from going to criminal enterprises, gangs, and cartels. Two industry associations (with which we spoke before the issuance of the December 2018 national strategy and risk assessments) noted the importance of establishing BSA priorities to better inform industry. For example officials from one industry association said that Treasury’s risk assessments identified priorities and suggested that it produce these types of reports more frequently (for example annually). This may be addressed, in part, by Congress’ requirement that the national strategy— including a discussion on goals, objectives, and priorities—be updated in 2020 and 2022. In addition, Treasury has been conducting a broad review of BSA/AML laws, regulations, and supervision—focusing on how effectively current requirements and related activities achieve the underlying goals of the BSA. Interagency working groups, interagency memorandums of understanding, and liaison positions, as shown in table 4, are key BSA/AML collaborative mechanisms that were identified through our interviews with officials from FinCEN, supervisory agencies and law enforcement agencies and in agency documents. Bank Secrecy Act Advisory Group (BSAAG). Congress directed Treasury to create BSAAG in 1992. The group, led by FinCEN, is the primary and longest-established BSA/AML collaboration mechanism and is used to share information and receive feedback on BSA administration. The advisory group meets twice a year and includes working groups on BSA/AML-related issues that may meet more frequently. BSAAG recently has been focusing on improving the effectiveness and efficiency of the regulatory and supervisory regime. SEC and Federal Reserve officials told us that BSAAG is a helpful and effective collaborative mechanism to discuss BSA/AML issues. However, as we discuss later, representatives from CFTC, the primary futures SRO, and a futures industry association expressed concerns that the futures industry was not as well represented on BSAAG as other industries. FinCEN invites the public to nominate financial institutions and trade groups for 3-year membership terms on BSAAG. In making selections, the Director of FinCEN retains discretion on all membership decisions and seeks to complement current BSAAG members in terms of affiliations, industry, and geographic representation. Memorandums of understanding (MOU). FinCEN established interagency agreements—information-sharing and data-access MOUs— relating to BSA data. For example, FinCEN entered into an information- sharing MOU with the federal banking regulators in 2004 and has since established similar MOUs with other supervisory agencies, including many state supervisory agencies. FinCEN consolidates the data from the four federal banking regulators and told us that it shares the consolidated reports with banking regulators. In addition, FinCEN officials told us they use data from the information-sharing agreements to help in certain initiatives and training. For example, FinCEN officials told us that a recently funded initiative focused on nonbank financial institutions will use information from the MOUs to proactively identify risks and better inform related compliance efforts. All the supervisory agencies told us they informally update and monitor their information-sharing MOUs through frequent meetings and regular communication with FinCEN. For example, FinCEN officials told us they have been working to update how they collect information on violations related to the customer due diligence and beneficial ownership rule. In addition, FinCEN contracts an annual MOU satisfaction survey that FinCEN officials said helps them monitor the effectiveness of the MOUs. In the survey, respondents were asked about their satisfaction with their MOU and scored their satisfaction around 80 out of 100 in 2017. FinCEN also has more than 400 data-access MOUs with federal, state, and local law enforcement agencies as well as with federal and state regulatory agencies. FinCEN has data-access MOUs, or provides direct data access, with or to all the federal supervisory agencies and with FINRA, a securities SRO—but not with NFA, a futures SRO. As discussed previously, supervisory agencies use these data primarily to help scope and conduct their BSA/AML compliance examinations. In a later section, we discuss access issues in relation to supervision of the futures industry. Law enforcement agencies use BSA data to assist in ongoing investigations and when initiating new investigations. Liaison positions. FinCEN has used on-site liaison positions for more than a decade to help avoid overlap and duplication of efforts. According to FinCEN officials, as of April 2019, FinCEN had 18 law enforcement liaisons from 10 law enforcement agencies. Some law enforcement officials with which we spoke said the liaison position allowed feedback and information exchange between law enforcement and FinCEN. Supervisory agencies generally told us that the liaison program was for law enforcement agencies and that they did not participate. FinCEN officials said that while FinCEN does not have on-site liaisons from supervisory agencies that are comparable in scope to the law enforcement liaisons, they work closely with the supervisory agencies. For example, FinCEN currently has a part-time detailee from FDIC who collaborates on-site at FinCEN with FinCEN analysts. FinCEN officials said they hosted a temporary on-site detailee from NCUA in 2017. NCUA officials told us that they also expressed an interest to FinCEN to implement routine detailing of staff. SEC staff told us that in the past they had a FinCEN detailee onsite working with SEC’s Division of Enforcement, which allowed SEC to better understand FinCEN’s methodology and approaches, and assess their own approaches to BSA enforcement. SEC staff expressed interest in hosting another FinCEN detailee, and the agency has been considering a FinCEN request to send an SEC liaison to FinCEN. There are also other BSA/AML collaborative mechanisms among regulatory or law enforcement agencies, such as the FFIEC BSA/AML working group, SAR review teams, and geographic targeting orders (see table 4). We also obtained perspectives on collaboration from FinCEN and relevant key law enforcement and regulatory agencies on three selected BSA criminal cases, which are discussed in appendix III. The futures industry has been less represented in key mechanisms for BSA/AML collaboration (those related to BSAAG and data-access agreements) than other industries. Representatives from CFTC, the primary futures industry SRO, and a futures industry association expressed concerns that the futures industry was not as well represented on BSAAG as other industries. CFTC, as the delegated supervisory agency, always has been a member of BSAAG. However, the primary futures industry SRO—which has developed rules to implement AML requirements for its members and conducts a majority of AML examinations of futures firms—and futures industry associations have had less consistent participation. Officials from the primary futures SRO expressed concern that they were not a regular member of BSAAG. They noted that they were a BSAAG member in the mid-2000s but then not selected as a member of BSAAG for almost 5 years (from 2014) until they were invited to be a member again in March 2018, at which point, the futures industry association’s BSAAG membership was not renewed when its term expired. Representatives from all key federal supervisory agencies have been regular members of BSAAG. In particular, the securities industry, which also uses SROs to monitor BSA compliance, has had its primary SRO as a member of BSAAG since 2008. Representatives from the primary securities SRO said that their participation in BSAAG allowed them to coordinate BSA/AML efforts. Representatives from the primary futures SRO said that their role regarding oversight of the futures industry was similar to the primary securities SRO. These representatives stated that they adopted AML rules; were the only SRO with jurisdiction over all futures entities subject to AML requirements; and conducted a majority of AML examinations. Accordingly, representatives said that they were in the unique position of seeing first-hand how AML requirements are implemented in the futures industry and identifying issues, as well as potential gaps in implementation. CFTC staff said that all significant representative groups for the futures industry should participate in BSAAG—in particular, the primary futures SRO because it supervises all types of registered firms in the futures industry and the leading industry association for the futures, options, and centrally cleared derivatives markets. In addition, representatives from industry associations we spoke with from other industries have been regular members of BSAAG including banking associations and the primary securities industry association. The primary securities industry association has been a member since 2008, concurrent with the primary securities SRO (also a member since 2008). Representatives from this association said that BSAAG is a mechanism that FinCEN uses to solicit feedback from the industry. Officials from the futures industry association that had previously participated in BSAAG, told us that their current lack of participation may prevent FinCEN from obtaining an in-depth understanding of futures industry issues and may prevent the futures industry from obtaining information on BSA/AML goals and priorities and other key communications. CFTC staff said that in addition to the primary futures SRO, BSAAG also should include a primary industry association. FinCEN officials told us that there is a limit on the number of BSAAG representatives allowed and that they have had a futures representative that was not always an active participant. In addition, FinCEN officials said that when selecting BSAAG members they need to consider the top money laundering risk areas as well as the appropriate number of members to have productive discussions. They added that because membership rotates, additional futures representatives could be added based on needs and topic areas. Furthermore, FinCEN officials told us that although the most recent BSAAG (October 2018) did not include a futures industry association, it did include the primary futures industry SRO and six large diversified financial firms that are listed as members of the key futures industry association. However, these firms represent a small percentage of the association’s membership and are not smaller firms or clearing organizations, exchanges, and global and regional executing brokers. As noted in Treasury’s 2018 national strategy, BSAAG is the main AML information conduit and policy coordination mechanism among regulators, law enforcement, and industry and has been focusing on improving the effectiveness and efficiency of the regulatory and supervisory regime. Without regular participation by the primary futures SRO that has developed AML rules and conducts the majority of BSA examinations for the futures industry, FinCEN may be missing opportunities to better understand compliance in the futures industry and the SRO may not be fully up to date on BSA/AML compliance issues and related initiatives that may affect the AML rules it develops. Furthermore, without representation on BSAAG by the key futures industry association, the diverse array of futures industry participants may not be fully represented, informed, or updated on key BSA/AML information. Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objective. In addition, the statutory purpose of BSAAG includes informing private-sector representatives of how BSA reports have been used and receiving advice on how reporting requirements should be modified. Additional futures industry representation on BSAAG could enhance both regulator and industry awareness of BSA/AML compliance issues and potential money laundering risks. In addition, NFA, the SRO conducting the majority of BSA examinations for the futures’ industry, does not have direct access to BSA data—unlike all key supervisory agencies and FINRA. In our 2009 report, we recommended that FinCEN expand data-access MOUs to SROs conducting BSA examinations that did not already have direct access to BSA data. In 2014, FinCEN completed a data access MOU with FINRA. But it did not pursue an MOU with NFA because, at that time, CFTC did not ask FinCEN to arrange an MOU with NFA. However, CFTC staff, as of April 2019, told us that access to BSA data would enhance the tools that NFA has to perform its functions, including its ability to scope and perform BSA/AML examinations, and to use BSA data more extensively and more frequently. Currently, when conducting its examinations, NFA must obtain SAR information from CFTC, as well as reviewing SARs provided by a firm while conducting an on-site examination. FinCEN officials told us that NFA has not requested direct access to BSA data. However, NFA representatives told us they welcomed a discussion with CFTC and FinCEN on the benefits and drawbacks of having direct access to BSA data. FinCEN officials said they would need to better understand any negative impacts of NFA not having direct access and NFA would need to meet the required criteria to obtain direct access. Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Supervisory agencies with direct data access all have utilized BSA data to some extent to scope and plan examinations. Direct access to BSA data would enhance NFA’s ability to scope BSA examinations and generally conduct its oversight responsibilities for BSA in the futures industry. FinCEN and two law enforcement agencies with which we spoke generated metrics on the usefulness of BSA reporting—such as the number of BSA reports that led to new investigations. But FinCEN, whose role it is to collect and disseminate BSA data, has not consistently communicated these metrics—instead only communicating some available metrics on an ad-hoc basis through methods such as published speeches or congressional testimonies. FinCEN and nearly all the law enforcement agencies with which we spoke provided some feedback to financial institutions on how to make BSA reports more useful through formal mechanisms (such as conferences and training sessions) and informal relationships. However, institution-specific feedback, which all industry groups said their members preferred, has not been widely provided. Two of the six law enforcement agencies (IRS-CI and FBI) we interviewed produced metrics on the usefulness of BSA reporting (for example, percentage of investigations utilizing BSA data). However, FinCEN (which has statutory responsibilities for the central collection, analysis, and dissemination of BSA data) did not consistently communicate this information, but rather communicated on an ad hoc basis through published speeches or congressional testimony. IRS-CI annually publishes a report with data on investigations, including those generated by BSA reports. For example, in fiscal year 2018, IRS-CI reported that 515 BSA investigations were initiated (see table 5). FinCEN’s website generally did not refer to IRS-CI metrics, but in a November 2018 congressional testimony, the Director of FinCEN included information on the percentage of IRS-CI investigations that began with a BSA source— 24 percent in fiscal year 2017. In addition, IRS-CI also tracks the work of SAR review teams and has created some metrics on the usefulness of BSA reporting, including: the number of investigations initiated, indictments, convictions, sentenced, and total dollars seized based on the work of the SAR review teams (see table 6). While this information is not routinely reported publicly, IRS officials said they have shared information about results from SAR review teams’ during presentations to the public, law enforcement, and financial industries. FBI analyzes BSA filings to support existing cases and initiate new investigations, and FBI and FinCEN have reported related metrics to the public, but not routinely. FBI created a BSA Alert System that searches subjects’ names, dates of birth, Social Security numbers, telephone numbers, email addresses, and other identifying information across BSA filings, and automatically emails the results to agents. In a November 2018 congressional testimony, the FBI section chief of its Criminal Investigative Division stated that these searches produce an average of 2,000 alerts per month and provided statistics on the results of the agency’s use of BSA data. From January 2017 to June 2018, BSA reporting was directly linked to the main subject of approximately 25 percent of pending FBI investigations (up from 8.9 percent in 2012). The November 2018 FBI testimony also described FBI’s use of SARs data analysis to identify new cases. For example, FBI analysts run a series of search terms and criteria related to money laundering, terrorist financing, human trafficking, fraud, corruption, transnational organized crime, and other schemes against SAR filings. The persons identified through the searches are automatically searched against FBI case files and watchlist data, and the results incorporated into reports to appropriate field offices. FinCEN also communicated some of the FBI metrics in an August 2018 speech by the FinCEN director. For example, the director said more than 20 percent of FBI investigations utilized BSA data and for some types of crime, like organized crime, nearly 60 percent of FBI investigations used BSA data. The other four law enforcement agencies with which we spoke did not generate metrics on the usefulness of BSA reporting due to confidentiality or data reliability concerns, among other reasons, but some tracked other BSA-related efforts. DHS officials said that while they do not have any metrics on the usefulness of BSA reports, the agency provided data on the usefulness of ICE-HSI’s Cornerstone outreach program—in which ICE-HSI provided training to financial institutions on issues such as trends in how criminals earn, move, and store illicit proceeds. ICE-HSI reported that in fiscal year 2017, based on the Cornerstone outreach program, special agents initiated more than 72 financial investigations, made 55 criminal arrests, and seized almost $2 million in illicit proceeds. Secret Service officials said that they have been trying to develop an internal tracking system for their use of BSA reports, but were not tracking any metrics as of April 2019. They told us that they use BSA data for investigative purposes only and they do not discuss or report it, because they consider it confidential information—thus making it difficult for them to gather metrics on the use of BSA reports. An official from DOJ’s Criminal Division said that the division has not established any performance measures or collected any statistics that measure the effectiveness of BSA record-keeping and reporting requirements (for example, because the success of investigations depending on multiple factors not just BSA reporting, and other challenges described later in this report). However, the official said that the division recognizes the usefulness of BSA data in criminal investigations because the data help them with prosecutions of crimes. Officials from DOJ Executive Office for United States Attorneys said that they track the number of cases with statutory provisions relating to BSA in which the U.S. Attorney’s Offices prosecuted or enforced BSA violations. However, the officials said their case management system does not track if BSA filings were used to initiate or assist the case. Supervisory agencies we interviewed generally said FinCEN and law enforcement are better positioned to compile metrics on the usefulness of BSA reporting because FinCEN and law enforcement agencies are the primary users of BSA reports. However, two of the seven supervisory agencies in our review that also have law enforcement functions—SEC and CFTC—have their own BSA review teams, which analyze SARs to identify potential violations of federal laws, including BSA violations, and refer matters for further examination or investigation as appropriate. For example, on average, from fiscal years 2016 to 2018, SEC’s BSA review team reviewed about 27,000 SARs each year that related to current or potential investigative matters, or entities regulated by SEC. CFTC staff told us they review an estimated 7,500–8,000 SARs annually. On average, in about 100 instances a year, CFTC’s BSA review team refers SARs to investigative teams in support of new or existing investigations. As of December 2018, CFTC staff said they had taken 33 enforcement actions based on leads developed from SARs, with two of the actions related to BSA/AML violations. FinCEN collected some metrics on the usefulness of BSA data through annual surveys and other initiatives; however, the survey results are not public and other metrics are not regularly published. FinCEN contracts an annual survey that includes questions to BSA data users (such as federal and state law enforcement and regulators) about the usefulness of BSA data to, among other things, provide new information or supplement known information or identify new leads or investigations. BSA data users are asked to score the value and impact of BSA data and scored it at about 80 out of 100 for both 2016 and 2017. FinCEN contracts another survey that solicits feedback on the 314(a) program. The 2017 survey found the respondents that utilized the 314(a) program gave it high scores for its usefulness—close to 90 out of 100 for 2016, and 2017. The results from both surveys are not publicly available. In addition, FinCEN periodically publishes a 314(a) Fact Sheet that contains some data on the usefulness of the 314(a) program—such as the number of 314(a) requests and the percentage of requests that contributed to arrests or indictments. Based on information FinCEN collected from law enforcement, approximately 95 percent of 314(a) requests contributed to arrests or indictments. In addition, FinCEN reported the number of cases submitted and related subjects of interest identified in 314(a) requests for each 2-week period from January 5, 2016, to January 29, 2019. For example, for the 2-week period starting on January 29, 2019, 16 requests resulted in 162 subjects of interest. FinCEN contracted a study on the value of BSA reporting—which began in January 2019 and is to be completed by the end of 2019—with the goal of identifying common attributes of BSA value among stakeholders; assessing how to use available data to establish metrics for evaluating and calculating the value of BSA; identifying gaps in data and other information needed to measure the value of BSA reporting; and proposing actions to improve FinCEN’s ability to identify, track , and measure the value of BSA reporting. However, the performance work statement for FinCEN’s BSA value study, which outlines the objectives for the study, does not include actions related to communicating such metrics. As discussed above, FinCEN has not consistently communicated available metrics. FinCEN officials told us their current approach was to communicate metrics through mechanisms such as speeches and congressional testimonies. FinCEN officials told us that it has an ongoing initiative to create a new communication strategy incorporating the results of the BSA value study—but had no time frame for its completion. Our prior work found that agencies can implement a number of practices that can enhance or facilitate the use of performance information— including communicating performance information frequently and routinely. In addition, Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Officials from some supervisory agencies and most industry associations also told us they would like FinCEN to provide them with more aggregated data on the usefulness of SARs filed by financial institutions. By consistently communicating currently available metrics on the usefulness of BSA reporting to industry, and any metrics later identified by FinCEN’s BSA value study, financial institutions may be able to more fully understand the importance and outcomes of their efforts. FinCEN and nearly all of the law enforcement agencies with which we spoke provided some feedback to financial institutions on how to make BSA reports more useful through formal mechanisms (such as conferences and training sessions) and informal relationships. However, institution-specific feedback, which all industry groups said their members preferred, has not been provided on a regular basis and only on a small scale. FinCEN’s feedback mechanisms include a new information exchange program, advisories, and BSAAG. For example: FinCEN Exchange. On December 4, 2017, FinCEN publicly launched the FinCEN Exchange, a public-private program that brings together law enforcement, FinCEN, and different types of financial institutions to share information to help identify vulnerabilities and disrupt money laundering, terrorist financing, and other financial crimes. As of December 2018, FinCEN convened more than a dozen briefings with law enforcement agencies across the country, involving more than 40 financial institutions. According to Treasury’s 2018 national strategy, the information provided by financial institutions through SARs after the briefings helped FinCEN map and target weapons proliferators, sophisticated global money laundering operations, human trafficking and smuggling rings, and corruption and trade-based money laundering networks, among others. FinCEN officials told us that these exchanges provide a forum in which law enforcement can request specific information and provide information on typologies to financial institutions that allows financial institutions to improve their BSA monitoring and reporting. FinCEN advisories. FinCEN issues public and nonpublic advisories to financial institutions to help financial institutions better detect and report suspicious activity related to a particular risk and related typology. For example, in October 2018 FinCEN posted an advisory on its website to alert U.S. financial institutions of the increasing risk that proceeds of political corruption from Nicaragua might enter the U.S. financial system. It also posted an advisory on the Iranian regime’s illicit activities and attempts to exploit the financial system. These advisories included specific instructions on how to file SARs related to this type of suspicious activity. Some of the industry associations with which we spoke had positive feedback on FinCEN advisories and said they would like to see more red flags and specific guidance to help improve their BSA monitoring programs. BSAAG. Among its functions, the advisory group serves as a forum for industry, supervisory agencies, and law enforcement to communicate about how law enforcement uses SARs and other BSA data. For example, sometimes law enforcement agencies present specific cases using BSA data or information on money laundering and terrorist financing threats. Many of the industry associations and supervisory agencies with which we spoke cited BSAAG as a useful feedback mechanism. As discussed previously, the advisory group is only open to those invited and not a public forum, so not all financial institutions receive or can provide feedback at these meetings. Law enforcement awards. FinCEN officials said that annual law enforcement awards ceremonies are one of the mechanisms they use to provide financial institutions with feedback on the usefulness or effectiveness of BSA/AML information. The award ceremonies highlight successful cases utilizing BSA data. FinCEN officials told us that FinCEN also sends thank you letters to the selected financial institutions that provided the underlying financial data used in the awarded cases, publishes overviews of the cases for which law enforcement agencies received awards, and documents nominated cases. FinCEN issues press releases about the winning cases as another way to share information with financial institutions. Outreach events. FinCEN representatives regularly have participated in outreach events about BSA/AML issues, such as by sharing information at BSA/AML conferences. According to FinCEN officials, the conferences allow FinCEN representatives to both formally (speeches, presentations) and informally (personal interactions) solicit and offer feedback on how financial institutions can improve BSA reporting. Additionally, Treasury reported that its Office of Terrorism and Financial Intelligence regularly engages public and private-sector practitioners and leaders, both domestic and international, on money laundering and terrorist financing issues. For example, the office convenes multilateral and bilateral public-private sector dialogues with key jurisdictions and regions to discuss mutual anti-money laundering and counter-terrorist financing issues of concern. Representatives from nearly all of the federal law enforcement agencies we interviewed said that they conducted outreach events and developed relationships with financial institutions to solicit and provide feedback on their BSA reports including providing feedback on ways to improve BSA reporting and to enhance BSA compliance by financial institutions. Conferences. Law enforcement agencies have presented at conferences on BSA/AML topics and host conferences for financial institutions. For example, for more than a decade ICE-HSI, FBI, Secret Service, IRS-CI, and the Drug Enforcement Administration jointly have hosted an annual conference that includes speakers from law enforcement, supervisory agencies, FinCEN, and financial institutions. According to an ICE-HSI official, the intent of the conference is to educate the private financial sector. FBI officials also said they conduct outreach, such as hosting and participating in conferences, and said that this type of outreach reached more than 6,000 people in the last year (as of August 2018). Briefings and financial institution-specific training. Some law enforcement agencies have their own outreach programs on BSA topics for financial institutions. For example, ICE-HSI has the Cornerstone Outreach Program that began to work with the private sector in 2003 to identify money laundering vulnerabilities in the financial system. The program is to encourage partnerships with the private sector by sharing distinguishing traits or forms of criminal behavior (either crime-centered or person-centered) and methods, and providing training to financial institutions. ICE-HSI officials said they conducted about 300 Cornerstone Outreach presentations in fiscal year 2018. FBI officials also told us they host a couple of meetings annually for financial institutions and sometimes conduct institution-specific training upon request, such as on SAR usefulness. FBI officials told us that for the institution-specific SAR trainings, they change the information on the SARs for training purposes and highlight how institutions can improve SAR filings. They also provide some summary-level statistics and work with the financial institution’s SAR teams to train them on trends. They estimated they conduct from about eight to 10 such sessions annually (as of April 2019). Informal relationships with financial institutions. Officials from nearly all the law enforcement agencies with whom we spoke said they have informal relationships with financial institutions to solicit and provide feedback on their BSA reports. Most supervisory agencies we interviewed said that they did not provide feedback to financial institutions on the usefulness of their BSA reporting due to factors such as law enforcement being better positioned to provide feedback and SAR confidentiality restrictions. However, CFTC staff noted that their BSA review team communicates the general usefulness of SARs filed by their institutions at conferences and through telephone contacts with the filer after the relevant case is filed. SEC staff told us they do not reach out directly to provide financial institutions specific feedback on the usefulness of SARs, but provide training on what makes a good or bad SAR through routine interaction with the primary securities industry association and presentations at BSAAG. As discussed earlier, some supervisory agencies regard FinCEN and law enforcement as the primary end users of BSA reports, and thus, in a better position to provide feedback to financial institutions on BSA reporting. Additionally, many supervisory agencies told us that it would be helpful if FinCEN and law enforcement could provide more frequent or systematic feedback on financial institutions’ SAR reporting. Some supervisory agencies, industry associations, and law enforcement agencies with which we spoke identified limitations with some of FinCEN’s feedback mechanisms, including FinCEN Exchange and law enforcement awards. Representatives from all the industry associations we spoke with indicated that financial institutions would like to see more institution-specific feedback on their SARs to improve their monitoring systems and reporting. FinCEN Exchange. Some industry associations appreciated FinCEN’s outreach, but noted that the new FinCEN Exchange program was on a small-scale and industry associations had not been invited to participate or provide feedback. An official from one industry association said that the association could help identify banks, such as community banks, that could be a good fit for the program. Supervisory agencies also generally said they were not involved in the FinCEN Exchange program. Officials from OCC said that they would like to be involved because they are the primary regulator for many of the financial institutions in the program and thought their participation would add value. Some law enforcement agencies had some concerns about the FinCEN Exchange program, such as private-sector representatives not being properly vetted or the risk of talking about ongoing investigations. For example, officials from ICE-HSI and FBI told us their institution-specific training included only vetted or trusted financial institutions. FinCEN officials said that they collaborated with regulators on the FinCEN Exchange and solicited feedback on the program from certain industry associations. In addition, FinCEN posts frequently asked questions about the FinCEN Exchange program on its website and encourages feedback from financial institutions on how they can support FinCEN priorities such as information sharing. FinCEN officials said that the FinCEN Exchange is an invitation-based program and that FinCEN vets information received from financial institutions and consults with law enforcement, as appropriate, to convene a briefing. Furthermore, FinCEN’s frequently asked questions about the program note that financial institutions that voluntarily participate in a FinCEN Exchange briefing must adhere to the terms noted in FinCEN’s invitation, including any requirement of confidentiality given the sensitivity of information provided. Awards. Representatives from CFTC, FBI, and three industry associations with whom we spoke made suggestions for expanding FinCEN’s law enforcement awards and related thank you letter initiatives. For example, CFTC suggested that FinCEN expand the awards program to include civil cases as well as criminal cases. FinCEN officials also told us in April 2019 that they were considering awards for civil cases. Industry associations generally said their member financial institutions appreciated receiving thank you letters, but some noted that there were limitations with these letters. For example, a representative from one industry association said that only a small percentage of financial institutions receive the awards, and representatives from another industry association said that the letters should provide more specific feedback. Two other industry associations said that the confidential nature of SARs makes it difficult to share the success of the financial institution that submitted the reporting. Many law enforcement agencies with which we spoke said that the law enforcement awards were a good idea, and FBI officials recommended creating awards for the financial institutions as well. FinCEN officials stated that due to SAR confidentiality rules, it cannot publicize awards to financial institutions. Institution-specific feedback. Representatives from all the industry associations with whom we spoke told us, or have publically stated that financial institutions would like to see more institution-specific feedback on their SARs to improve their monitoring systems and reporting. SAR reporting is labor-intensive for financial institutions because it requires researching and drafting narratives for a SAR filing and justifying cases where a SAR is not filed, according to many industry association representatives. However, many representatives said that financial institutions get little institution-specific feedback on their SAR reporting. We found that while law enforcement conducts some small group briefings that industry associations said were useful, these briefings cover a small number of financial institutions in relation to the size of the U.S. financial industry. ICE-HSI stated that it conducted 302 institution-specific trainings and briefings in fiscal year 2018, and FBI, as discussed previously, estimated it has conducted from about eight to 10 institution- specific SAR reporting trainings annually in relation to the more than 10,000 depository institutions, more than 26,000 money services businesses registered with FinCEN, and almost 4,000 active broker- dealers registered (as of January 2019). The American Bankers Association, Independent Community Bankers of America, and The Clearing House all have issued papers—recommending more institution- specific feedback on financial institution SAR reporting. Some industry associations and other stakeholders pointed to international efforts that provided feedback through public-private partnerships. For example, the United Kingdom’s Joint Money Laundering Intelligence Taskforce (joint task force), formally established in May 2016, includes regulators, law enforcement, and more than 40 major United Kingdom and international banks conducting a large proportion of financial activity in the United Kingdom (89 percent of the volume of personal accounts in the United Kingdom). The joint task force has a system in place to routinely convene these partners, included vetted banking representatives, to set AML priorities and share intelligence. According to the intergovernmental Financial Action Task Force’s (FATF) mutual evaluation report of the United Kingdom, financial institutions involved in the joint task force are required to file SARs for suspicious activity identified through the program, and these SARs are considered to be of high value. FATF’s report also noted that the joint task force is considered to be best practice in public-private information sharing. According to Treasury’s 2018 national strategy, FinCEN collaborated with the United Kingdom’s joint task force in implementing the FinCEN Exchange program. In prior work, we reported that FinCEN recognized that financial institutions do not generally see the beneficial impacts of their BSA/AML efforts. FinCEN, law enforcement, and some industry associations with which we spoke identified challenges in providing institution-specific feedback to financial institutions on the usefulness of their BSA reporting. In addition to the large number of financial institutions in the United States, officials from FinCEN and law enforcement agencies told us that law enforcement cases may be sensitive and time-consuming, and the unauthorized disclosure of SARs or sharing of certain information with financial institutions might compromise ongoing investigations. Two industry associations also identified the confidential nature of SARs as a challenge for FinCEN and law enforcement to provide institution-specific feedback to financial institutions. As we have discussed, FinCEN has been undertaking a study to better understand the value and effectiveness of BSA. In addition, FinCEN and some law enforcement agencies have made efforts to provide some institution-specific feedback through various methods on BSA reporting, but the feedback has been periodic, sometimes only at the request of financial institutions, and provided on a small scale. FATF standards on information sharing state that anti-money laundering authorities should provide feedback to financial institutions to assist them in complying with anti-money laundering requirements—these mechanisms can include feedback loops, whereby more consistent and more fully explained feedback is provided to the private sector on suspicious transaction reports. FinCEN’s statutory duties also include information sharing with financial institutions in the interest of detection, prevention, and prosecution of terrorism, organized crime, money laundering, and other financial crimes. As discussed, other countries have put in place mechanisms (such as the United Kingdom’s joint task force) to provide regular feedback on AML reporting (including SAR-like instruments) to financial institutions representing a large portion of the country’s financial activity. Additional and more regular institution-specific feedback, designed to cover different types of financial institutions and those with significant financial activity, may enhance the U.S. financial industry’s ability to effectively target its efforts to identify suspicious activity and provide quality BSA reporting. FinCEN, numerous supervisory agencies (covering various financial sectors), and law enforcement agencies are responsible for enforcing the BSA/AML regulatory framework with the end goal of detecting and preventing money laundering and other financial crimes. While these agencies have processes and mechanisms in place to collaborate on key BSA/AML issues, such collaboration and information sharing could be enhanced by additional and more regular involvement of representatives of the futures industry—a complex and unique financial markets sector. Unlike the other key federal supervisory agencies and securities SRO involved in BSA compliance, the primary futures SRO was not consistently included in BSAAG. Thus, FinCEN may be missing opportunities to better understand compliance in the futures industry and the SRO may not be updated on related BSAAG initiatives. The key futures industry association also has had less consistent participation in BSAAG, and although it has been a member of BSAAG in the past, it was not a member concurrently with the futures SRO—thereby, potentially missing opportunities to engage FinCEN and other agencies on BSA issues in futures markets. In addition, by providing NFA with direct access to BSA data (similar to the access the key securities SRO already has) FinCEN could facilitate NFA oversight and enable it to scope examinations proactively to address BSA risks. Some federal agencies have taken steps to provide metrics and institution-specific feedback on the usefulness of BSA reporting to industry; however, metrics were not provided regularly and feedback efforts were provided on a small scale. Additionally, challenges to expanding and enhancing metrics and feedback remain (such as those related to measuring the usefulness of BSA reporting, providing feedback to thousands of individual institutions, and the sensitive nature of ongoing law enforcement investigations). FinCEN has an ongoing effort to identify additional measures of the value and usefulness of BSA reporting, which is expected to be completed at the end of 2019. But opportunities exist to enhance feedback and reporting before that date and in general. For example, in the interim FinCEN routinely could communicate currently available metrics on usefulness to help financial institutions more fully understand the importance and value of their efforts to report BSA-related information. Furthermore, with today’s rapidly changing financial markets and potential changes to money laundering risks, it is important that FinCEN and federal agencies take steps to provide institution-specific feedback—while keeping in mind any confidentiality concerns—to cover different types of financial institutions and those with significant financial activity. Increasing the feedback on BSA reporting could help make the BSA reporting of financial institutions more targeted and effective and enhance collaboration among key stakeholders in U.S efforts to combat illicit financial crime. We are making the following four recommendations to FinCEN: The Director of FinCEN, after consulting with CFTC, should consider prioritizing the inclusion of the primary SRO conducting BSA examinations in the futures industry in the Bank Secrecy Act Advisory Group (BSAAG) on a more consistent basis and also making the primary futures industry association a concurrent member. (Recommendation 1) The Director of FinCEN, after consulting with CFTC, should take steps to explore providing direct BSA data access to NFA. (Recommendation 2) The Director of FinCEN should review options for FinCEN to more consistently and publicly provide summary data on the usefulness of BSA reporting. This review could either be concurrent with FinCEN’s BSA value study or through another method. (Recommendation 3) The Director of FinCEN should review options for establishing a mechanism through which law enforcement agencies may provide regular and institution-specific feedback on BSA reporting. Options should take into consideration providing such feedback to cover different types of financial institutions and those with significant financial activity. This review could either be part of FinCEN’s BSA value study or through another method. (Recommendation 4) We provided a draft of this report to Treasury/FinCEN, CFTC, NCUA, DHS, DOJ, the Federal Reserve, FDIC, IRS, OCC, and SEC for their review and comment. FinCEN, CFTC, and NCUA provided written comments, which are reproduced in appendixes IV, V, and VI. FinCEN, DHS, the Federal Reserve, FDIC, OCC, and SEC provided technical comments on the draft report, which we incorporated as appropriate. In emails, DOJ and IRS audit liaisons stated that the agencies did not have any formal or technical comments. In its written response, FinCEN concurred with one recommendation, disagreed with two, and agreed with the spirit of one recommendation but noted some concerns. Specifically, FinCEN concurred with the recommendation that FinCEN more consistently and publicly provide summary data on the usefulness of BSA reporting (Recommendation 3). FinCEN disagreed with the draft report’s recommendation that FinCEN, after consulting with CFTC, should ensure that the primary SRO conducting BSA examinations in the futures industry is a regular member of BSAAG and also should consider making the primary futures industry association a concurrent member (Recommendation 1). FinCEN’s written response stated that while the primary futures SRO presently is a BSAAG member, only federal agencies are considered permanent members, and FinCEN will not make future membership commitments to any specific SRO or any other nonfederal organization. As such, we modified the recommendation to give FinCEN more flexibility to address the issues that prompted our recommendation. We continue to believe that prioritizing futures representation in BSAAG to be consistent with securities industry representation would help FinCEN better understand BSA compliance in the futures industry and keep the futures industry updated on related BSAAG initiatives. As noted in the report, the primary securities SRO has been a member of BSAAG since 2008 and a key securities industry association has been a concurrent member. FinCEN disagreed with the recommendation that FinCEN, after consulting with CFTC, explore providing direct BSA data access to NFA (Recommendation 2) because FinCEN said it has not received a request from CFTC or NFA to engage on this matter. FinCEN also said it would review any future request for direct access in accordance with established procedures, stating it must ensure that proper controls are in place and that direct access to the BSA database is limited to those who truly need it. As discussed in our report, CFTC stated that NFA’s direct access to BSA data would enhance NFA’s ability to scope and perform BSA/AML examinations, and to use BSA data more extensively and more frequently to perform its functions, including conducting the majority of BSA examinations for the futures industry. NFA representatives also told us they welcomed a discussion with CFTC and FinCEN on the benefits and drawbacks of having direct access to BSA data. We continue to believe the recommendation is valid as it provides FinCEN flexibility to explore providing NFA data access and would not preclude FinCEN from ensuring that NFA had proper controls in place. In its written responses, FinCEN neither agreed nor disagreed with the recommendation that FinCEN review options for establishing a mechanism through which law enforcement agencies may provide regular and institution-specific feedback on BSA reporting (Recommendation 4). FinCEN said it agreed with the spirit of this recommendation—that law enforcement feedback on the value and usefulness of BSA information is important—and stated that FinCEN regularly takes necessary steps to review options for establishing additional mechanisms through which law enforcement agencies can provide regular feedback. FinCEN also stated that it provides a consolidated view of law enforcement feedback as well as feedback on the value and usefulness of institution-specific BSA information. However, as discussed in the report, we found that the current institution-specific feedback mechanisms were not occurring on a regular basis or were on a relatively small scale. In its response, FinCEN also noted that unless mandated by Congress, law enforcement feedback will be voluntary and that FinCEN cannot compel law enforcement compliance with feedback initiatives. We continue to believe the recommendation is valid as it allows FinCEN flexibility in reviewing options for establishing a mechanism through which law enforcement may choose to provide regular feedback to reach a larger number of financial institutions from diverse industries, without requiring FinCEN to compel law enforcement agencies to participate. In its written responses, CFTC agreed with all our recommendations. In particular, CFTC agreed that the primary futures SRO should be a regular member of BSAAG (Recommendation 1). CFTC added that FinCEN should consider making another futures SRO a concurrent member. In a later discussion, a CFTC Assistant General Counsel said that, in general, CFTC would like to see more futures participation in BSAAG, including SROs and industry associations. CFTC also agreed with our recommendation that the Director of FinCEN, after consulting with CFTC, explore providing NFA direct access to BSA data (Recommendation 2). In its written response, NCUA also agreed with all of our recommendations, which it stated would enhance coordination and collaboration and increase visibility about the value of BSA reporting requirements. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Attorney General, the Acting Secretary of Homeland Security, the Commissioner of IRS, the Chairman of CFTC, the Chairman of FDIC, the Chairman of the Federal Reserve, the Chairman of NCUA, the Comptroller of the Currency, the Chairman of SEC, and other interested parties. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or ClementsM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. The objectives of this report were to:(1) describe how the Financial Crimes Enforcement Network (FinCEN) and supervisory agencies supervise, examine for, and enforce Bank Secrecy Act and related anti- money laundering requirements (collectively, BSA/AML) compliance; (2) discuss how FinCEN, supervisory agencies, and law enforcement collaborated on implementing and enforcing BSA/AML requirements; and (3) examine the extent to which FinCEN, supervisory agencies, and law enforcement established metrics and provided feedback to financial institutions on the usefulness of their BSA reporting. For this report, we identified the key agencies and entities, including FinCEN, a bureau in the Department of the Treasury (Treasury), which is responsible for the administration of BSA, and the supervisory agencies that oversee BSA compliance. The supervisory agencies include the federal banking regulators—Federal Deposit Insurance Corporation (FDIC), Board of Governors of the Federal Reserve System (Federal Reserve), National Credit Union Administration (NCUA), Office of the Comptroller of the Currency (OCC)—as well as the Internal Revenue Service (IRS), Commodity Futures Trading Commission (CFTC), and Securities and Exchange Commission (SEC). Self-regulatory organizations (SRO) for the securities and futures industries—including the Financial Industry Regulatory Authority (FINRA) and National Futures Association (NFA)—also have BSA/AML responsibilities and conduct BSA examinations of their members. The Department of Justice may pursue investigations and prosecutions of financial institutions and individuals for both civil and criminal violations of BSA/AML regulations. To address the first objective, we reviewed relevant laws—including the Bank Secrecy Act, its related statutes, and key provisions of the USA PATRIOT Act—regulations, and agency documentation. To better understand how supervisory agencies conduct their examinations, we reviewed the following BSA/AML examination manuals: the 2014 BSA/AML Examination Manual, developed by the Federal Financial Institutions Examination Council (FFIEC); the Bank Secrecy Act/Anti- Money Laundering Examination Manual for Money Services Business (developed by FinCEN and IRS); and SEC’s nonpublic manual and futures SROs nonpublic examination procedures. We reviewed and analyzed data from FinCEN summary reports on the examination and enforcement activities of supervisory agencies for fiscal years 2015 through 2018 (second quarter), which were the most recent data available at the time of our analysis. We also reviewed FinCEN’s enforcement actions for this time period as provided on its website, to identify the number and types of financial institutions, and the number of concurrent actions FinCEN brought jointly with a regulator. We also reviewed and analyzed FinCEN referral data from January 1, 2015, to September 25, 2018. Referrals are potential BSA violations or deficiencies referred by supervisory agencies, the Department of Justice, or state regulators. We assessed the reliability of the FinCEN summary report data and referral data by reviewing documentation related to these datasets, interviewing knowledgeable officials, and conducting manual data testing for missing data, outliers, and obvious errors. We determined the data to be sufficiently reliable for reporting on supervisory agency, SRO, and FinCEN BSA/AML compliance and enforcement activities. For this and our other objectives, we interviewed officials at Treasury’s Office of Terrorism and Financial Intelligence and FinCEN, the other supervisory agencies, and two SROs—FINRA and NFA. To address the second objective, we judgmentally selected six law enforcement agencies based on their (1) focus on financial crimes, (2) role in investigating or prosecuting recent large criminal cases we selected involving financial institutions with BSA violations, (3) participation in FinCEN’s liaison program, and (4) identification by FinCEN as a key user of BSA data. We selected the following law enforcement agencies: the Criminal Division (Money Laundering and Asset Recovery Section), the U.S. Attorney’s Offices (through the Executive Office for United States Attorneys), and the Federal Bureau of Investigation in the Department of Justice; IRS Criminal Investigation in the Department of Treasury; and U.S. Immigration and Customs Enforcement-Homeland Security Investigations and the U.S. Secret Service in the Department of Homeland Security. The views of selected law enforcement agencies are not generalizable. To identify key collaborative mechanisms used to implement BSA/AML responsibilities, we reviewed agency documentation (such as strategic plans, national strategies, and risk assessments) and prior GAO reports that contained discussions of collaborative mechanisms, and we interviewed agency officials from FinCEN, supervisory agencies, SROs, and selected law enforcement agencies. We obtained agency documentation and data related to the identified collaboration mechanisms and interviewed officials from FinCEN, supervisory agencies, and selected law enforcement agencies for their perspectives on these efforts. We compared agencies’ collaboration efforts to criteria in federal internal control standards on management communication. To gain further insight into the collaboration process, we also reviewed documentation on three criminal cases involving BSA/AML violations by financial institutions to illustrate how law enforcement investigates and prosecutes BSA violations and coordinates with FinCEN and other supervisory agencies. We selected the cases on the basis of recent occurrence (calendar year 2017 or 2018) and on their having involved criminal violations of BSA by financial institutions, required coordination on penalties among multiple supervisory agencies and law enforcement, and resulted in a large monetary penalty. While not generalizable, the cases helped provide additional context for our review. To obtain additional perspectives on the effectiveness of BSA/AML collaboration processes, we interviewed representatives of seven selected industry associations based on their published work and relevant experience and for coverage of key financial industries (banking, securities, futures, and the money services business). While not generalizable, these interviews helped provide context for how industry views the effectiveness of BSA/AML collaboration efforts. For the third objective, we reviewed agency documentation and data on metrics related to BSA reporting and feedback mechanisms that FinCEN, the supervisory agencies, or the six selected law enforcement agencies had established. Key documents we reviewed included Treasury’s most recent strategic plan, national strategy for combating illicit financing, and related risk assessments. For all agencies we interviewed, we requested any available metrics. We reviewed agency websites, annual reports, and recently published speeches and testimonies on BSA/AML-related topics to identify any metrics. We also requested and reviewed contract documentation from FinCEN, such as the performance work statement for a study that FinCEN commissioned on how to establish metrics for and identify the value of BSA data. We compared metrics on the usefulness of BSA and how they were communicated against key criteria for enhancing or facilitating the use of performance metrics that GAO previously identified and federal internal control standards on management communication. For feedback mechanisms, we obtained documentation on any steps FinCEN, supervisory agencies, or the selected law enforcement agencies took to provide feedback on BSA reporting to financial institutions and we interviewed agency representatives on these efforts. The documents we reviewed included those identified above related to metrics, as well as agency advisories, guidance, and rulemaking. We compared the feedback efforts against Treasury’s information-sharing statutory duties and strategic plan, and international anti-money laundering standards and guidance. To gain industry perspectives on the usefulness of BSA reporting and on feedback received from FinCEN, supervisory agencies, and law enforcement, we conducted seven interviews with the selected industry associations. While not generalizable, the interviews helped provide context for financial industry perspectives on BSA/AML reporting and feedback. We conducted this performance audit from February 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. As part of its oversight of supervisory agencies, the Financial Crimes Enforcement Network (FinCEN) routinely collects data from supervisory agencies as established in information-sharing memorandums of understanding (MOU). The MOUs establish that supervisory agencies should provide FinCEN with examination data such as the number of Bank Secrecy Act /anti-money laundering (BSA/AML) violations, informal actions, and formal enforcement actions (on a quarterly basis). Finally, the Internal Revenue Service (IRS) told us it has MOUs with some state regulators to obtain state examinations, which IRS officials said help to identify issues among and plan examinations of money services businesses and determine if the businesses had addressed prior deficiencies. The following sections provide more information on each supervisory agency’s (1) examinations, (2) violations, and (3) enforcement actions. Also see appendix I for more information on the types of data we collected for each agency and any data limitations. From fiscal year 2015 to the second quarter of fiscal year 2018, the most common BSA violations cited by the federal banking regulators were violations of requirements to report suspicious activities, 314(a) information-sharing requirements, rules for filing of reports, BSA training, and a system of internal controls. For example, regulators could cite a violation if a financial institution failed to file a required suspicious activity report (SAR), failed to file a SAR in a timely manner, or failed to maintain confidentiality of SARs. Violations of internal controls include a financial institution failing to establish a system of internal controls to ensure ongoing compliance, including staff adherence to the financial institution’s BSA/AML policies. From fiscal year 2015 to 2018 (second quarter), the federal banking regulators cited thousands of violations (11,752) and brought 116 formal enforcement actions (see table 7). The number of informal enforcement actions compared to the number of formal enforcement actions varied by banking regulator. For example, in fiscal year 2017 the National Credit Union Administration (NCUA) brought 1,077 informal enforcement actions and no formal enforcement actions. In the same period, the Office of the Comptroller of the Currency (OCC) brought two informal enforcement actions and six formal enforcement actions. SEC and its SROs took 71 formal enforcement actions against broker- dealers from fiscal year 2015 through the second quarter of fiscal year 2018 (see table 8). FINRA took the majority of enforcement actions against broker-dealers. From fiscal year 2015 to the second quarter of fiscal year 2018, SEC and the SROs for broker-dealers most frequently cited violations of FINRA AML program rules. They included violations of policies and procedures relating to reporting suspicious activity, internal controls, and annual independent testing, as well as BSA violations of AML program requirements for brokers or dealers and customer identification programs for brokers or dealers. From fiscal year 2015 to the second quarter of fiscal year 2018, the National Futures Association (NFA) cited all BSA/AML violations, and took all informal and formal enforcement actions for BSA/AML deficiencies for the futures industry (see table 9). The violations NFA most commonly cited were against introducing brokers and fell under its AML program rules that related to policies and procedures for internal controls, training, and annual independent testing, and BSA requirements for AML programs and customer identification programs. The CME Group did not cite any futures commission merchants for violations during this period. In response to violations, NFA brought almost 200 informal enforcement actions and a few (10) formal enforcement actions over the period of our review. For example, in 2017 NFA took 64 informal and four formal enforcement actions. IRS referred more than 100 cases to FinCEN from fiscal year 2015 through the second quarter of 2018 and issued letter 1112s to thousands of institutions, which contain a summary of examination findings and recommendations to the institution for corrective action (see table 10). From fiscal year 2015 to the second quarter of fiscal year 2018, the most common violations cited by IRS fell under general AML program requirements for money services businesses, which require such businesses to develop, implement, and maintain an effective AML program (one designed to prevent a business from being used to facilitate money laundering and the financing of terrorist activities). AML program requirements have several subcomponent violations. Among the most commonly cited subcomponent violations were those related to overall program deficiencies; policies, procedures, and internal controls; training of appropriate personnel to identify suspicious transactions; and providing for independent testing of the AML program. The Financial Crimes Enforcement Network (FinCEN) and supervisory agencies may be asked to provide information as part of law enforcement investigations and can take parallel, but separate, enforcement actions against the same institutions to address Bank Secrecy Act/anti-money laundering (BSA/AML) concerns. FinCEN and supervisory agencies may refer potential violations of a criminal nature an appropriate federal law enforcement agency or to the Department of Justice (DOJ)—and within DOJ, the U.S. Attorney’s Office—and may be asked to assist law enforcement investigations. For example, supervisory agencies may be asked to interpret financial institution documents or serve as expert witnesses and records custodians in a trial. FinCEN, supervisory agencies, and law enforcement agencies have conducted parallel civil and criminal investigations. Federal law enforcement and supervisory agency officials have told us that such investigations should remain separate and independent. We selected three recent cases in which FinCEN, supervisory agencies, and law enforcement collaborated to conduct parallel investigations and took concurrent but separate civil and criminal BSA enforcement actions. Officials with whom we spoke from agencies that were involved in these cases said the agencies coordinated with each other (for example, by establishing liaison positions, scheduling regular conference calls, and coordinating on global settlements). Rabobank National Association (Rabobank). On February 7, 2018, DOJ and the Office of the Comptroller of the Currency (OCC) both announced actions against Rabobank for deficiencies in its BSA/AML compliance program and obstruction of the primary regulator (OCC). DOJ announced that Rabobank pleaded guilty to a felony conspiracy charge for impairing, impeding, and obstructing its primary regulator OCC by concealing deficiencies in its AML program and for obstructing OCC’s examination of Rabobank. The bank agreed to forfeit $368,701,259 for allowing illicit funds to be processed through the bank without adequate BSA/AML review and OCC issued a $50 million civil money penalty against Rabobank for deficiencies in its BSA/AML compliance program. DOJ’s Money Laundering and Asset Recovery Section Bank Integrity Unit, the U.S. Attorney’s Office of the Southern District of California, U.S. Immigration and Customs Enforcement-Homeland Security Investigations (ICE-HSI) within the Department of Homeland Security, Internal Revenue Service Criminal Investigation (IRS-CI), and the Financial Investigations and Border Crimes Task Force conducted the criminal investigation. The investigation occurred in parallel with OCC’s regulatory investigation and the investigation by FinCEN’s Enforcement Division. OCC officials told us they collaborated extensively with other agencies over a 4-year period, participated in numerous calls and meetings, and provided law enforcement with examination information and access to OCC examiners for interviews. Officials from the U.S. Attorney’s Office of the Southern District of California said that a practice they found helpful in this case was establishing a liaison with the agencies involved. The liaisons allowed the different parties to share information effectively, provided access to data as needed, and responded to questions in a timely manner. U.S. Bancorp. On February 15, 2018, DOJ, OCC, and FinCEN announced actions against U.S Bancorp and its subsidiary U.S. Bank, N.A., for violations of several provisions of BSA, including an inadequate BSA/AML program and failure to file suspicious activity reports (SAR) and currency transaction reports (CTR). Under a deferred prosecution agreement with the U.S. Attorney’s Office of the Southern District of New York, U.S Bancorp and its subsidiary agreed to pay $528 million for BSA violations and agreed to continue to reform its AML program. Of the $528 million, $75 million was satisfied by a penalty paid to the Department of the Treasury as part of OCC’s civil money penalty assessment, which cited the bank in a 2015 consent order for failure to adopt and implement a program that covered required BSA/AML program elements. FinCEN also reached an agreement with U.S. Bank to resolve related regulatory actions, which required U.S. Bank to pay an additional $70 million for civil violations of the BSA. On the same day as the FinCEN agreement, the Board of Governors of the Federal Reserve System (Federal Reserve) imposed a $15 million penalty against U.S. Bancorp for deficiencies (including BSA violations) related to the bank under its supervision. According to officials from the U.S. Attorney’s Office of the Southern District of New York, their office, OCC, FinCEN and the Federal Reserve coordinated the terms of their respective resolutions to avoid the unnecessary imposition of duplicative penalties. OCC officials told us that the U.S. Attorney’s Office of the Southern District of New York contacted them to obtain additional information about its examination conclusions that supported OCC’s 2015 cease and desist order. OCC provided examination documents and information to the U.S. Attorney’s Office of the Southern District of New York for 2 years, including making OCC examiners available for interviews with the U.S. Attorney’s Office personnel and to answer follow-up inquiries. Federal Reserve officials said they coordinated in the U.S. Bancorp case through a global resolution with the firm. Banamex. In May 2017, Banamex admitted to criminal violations and entered into a non-prosecution agreement, which included an agreement to forfeit $97.44 million. The bank also admitted that it should have improved its monitoring of money services businesses’ remittances, but failed to do so. The investigation was conducted by the Bank Integrity Unit of DOJ’s Money Laundering and Asset Recovery Section, U.S. Attorney’s Office of the District of Massachusetts, IRS-CI, Drug Enforcement Administration, and the Federal Deposit Insurance Corporation’s (FDIC) Office of Inspector General. The agencies consulted on a general level, but the agencies’ investigations were at all times kept separate from the criminal investigation. In July 2015, FDIC and the California Department of Business Oversight assessed civil money penalties against Banamex requiring a total payment of $140 million to resolve separate BSA regulatory investigations. In February 2017, FDIC also announced enforcement actions against four former senior bank executives relating to BSA violations. IRS-CI officials stated that involvement by the Bank Integrity Unit of DOJ’s Money Laundering and Asset Recovery Section in financial institution investigations is extremely helpful as the unit bring a wealth of knowledge and resources. DOJ officials told us there was close collaboration between all agencies involved. DOJ officials said that all agencies had meetings frequently and created a liaison position to encourage interagency collaboration as the case progressed. In May 2018, DOJ issued a new policy to encourage coordination among DOJ and supervisory agencies during corporate investigations. In a May 2018 speech, the DOJ Deputy Attorney General identified the Securities and Exchange Commission, Commodity Futures Trading Commission, Federal Reserve, FDIC, OCC, and the Department of the Treasury’s Office of Foreign Assets Control as agencies with which DOJ works to be better able to detect sophisticated financial fraud schemes and deploy adequate penalties and remedies to ensure market integrity. He noted that many federal, state, local, and foreign authorities that work with DOJ were interested in further coordination with DOJ. DOJ’s new policy encourages coordination and consideration of the amount of fines, penalties, or forfeiture paid among DOJ components and other law enforcement or other federal, state, local, or foreign enforcement authorities seeking to resolve a case with a company for the same misconduct. Similarly, in June 2018, the Federal Reserve, FDIC, and OCC issued a joint statement on coordination among federal banking agencies during formal enforcement actions. In addition to the contact named above, Allison Abrams (Assistant Director), Verginie Tarpinian (Analyst in Charge), Peter Beck, Joseph Cruz, Brian James, Moira Lenox, Benjamin Licht, Robert Lowthian, Marc Molino, Ifunanya Nwokedi, Barbara Roesmann, Tyler Spunaugle, Farrah Stone, and Sarah Veale made key contributions to this report.", "summary": "Illicit finance activity, such as terrorist financing and money laundering, can pose threats to national security and the integrity of the U.S. financial system. FinCEN is responsible for administering BSA and has delegated examination responsibility to supervisory agencies. FinCEN also is to collect and disseminate BSA data. BSA requires that financial institutions submit reports, which may be used to assist law enforcement investigations. Industry perspectives on BSA reporting have included questions about its usefulness. This report examines, among other objectives, how FinCEN and supervisory and law enforcement agencies (1) collaborate and (2) provide metrics and feedback on the usefulness of BSA reporting. GAO reviewed related laws and regulations; agency documentation; examination and enforcement action data; and interviewed FinCEN, supervisory agencies, and a nongeneralizable selection of six law enforcement agencies and seven industry associations. The Financial Crimes Enforcement Network (FinCEN)—within the Department of Treasury—supervisory agencies (such as banking, securities, and futures regulators), and law enforcement agencies collaborate on implementing Bank Secrecy Act/anti-money laundering (BSA/AML) regulations, primarily through cross-agency working groups, data-sharing agreements, and liaison positions. FinCEN and law enforcement agencies provided some metrics and institution-specific feedback on the usefulness of BSA reporting (such as suspicious activity reports) to the financial industry but not regularly or broadly. FinCEN and some agencies have metrics on the usefulness of BSA reports. One law enforcement agency annually publishes aggregate metrics on BSA reports that led to investigations and indictments. But FinCEN did not consistently communicate available metrics; it generally did so on an ad-hoc basis such as through published speeches. In 2019, FinCEN began a study to identify measures on the value and usefulness of BSA reporting—to be completed by the end of 2019. By consistently communicating currently available metrics (summary data), and any later identified by the study, FinCEN may assist financial institutions in more fully understanding the importance of their efforts. Industry associations GAO interviewed noted financial institutions would like to receive more institution-specific feedback on the usefulness of their BSA reporting; they also identified suspicious activity reports as labor-intensive. In 2017, FinCEN began providing such feedback and some law enforcement agencies have ongoing efforts to provide institution-specific briefings. But these efforts have not been regularly made and involved relatively few institutions. Additional and more regular feedback, designed to cover different types of financial institutions and those with significant financial activity, may enhance the ability of the U.S. financial industry to effectively target efforts to identify suspicious activity and provide quality BSA reporting. GAO makes four recommendations, including that FinCEN review options to consistently communicate summary data and regularly provide institution-specific feedback on its BSA reporting. FinCEN concurred with the recommendation on summary data and agreed with the spirit of the recommendation on feedback. FinCEN raised concerns with the need for the two other recommendations. GAO continues to believe the recommendations have merit, as discussed in the report.", "document_type": "gao"}
{"report": "The issues VA experienced during the height of the COVID-19 pandemic were a result of global supply chain challenges, but longstanding problems that our work has previously identified posed additional challenges to VA’s response. In November 2017, we reported weaknesses in VA’s implementation of its MSPV-NG program—VA’s primary means for purchasing medical supplies. These included the lack of an effective medical supply procurement strategy, clinician involvement, and reliable data systems. We also found that several of VA’s medical supply management practices were not in line with those employed by private sector leading hospital networks. We recommended, among other things, that VA develop, document, and communicate to stakeholders an overarching strategy for the program. This strategy, originally planned for completion by December 2017, was delayed to March 2019, and then further delayed due to VA’s implementation of its new MSPV 2.0 program, which is also delayed. We also found that VA’s initial formulary consisted of around 6,000 items at launch, and, according to senior VA contracting officials, many items on the formulary were not those needed by medical centers. These factors resulted in an initial formulary that did not meet the needs of VA’s medical centers (VAMC). The MSPV-NG program office subsequently took steps to expand the formulary, growing it to over 22,000 items, and is developing the next iteration of the program, called MSPV 2.0. MSPV 2.0 is intended to address some of the shortfalls we previously identified in MSPV-NG, including more than doubling the number of items on the formulary, to a planned 49,000. VA’s MSPV 2.0 prime vendor procurement has been subject to multiple bid protests. After three protests challenged the terms of the solicitation, VA responded by voluntarily taking corrective action and revising the solicitation. The terms of the revised solicitation were challenged in a subsequent protest that was sustained, resulting in VA further revising the solicitation to address the matter. Because of these events, agency officials told us that VA has altered its MSPV 2.0 procurement plans several times and there has been significant delay in program implementation from the originally planned March 2020 date to as late as February 2021. Based on preliminary observations of our ongoing work, some of the current MSPV-NG challenges persist and may not be remedied by MSPV 2.0. Specifically, medical center staff we interviewed from May 2019 through October 2019 cited continued problems with consistently receiving the supplies they order through MSPV-NG, such as backorders on frequently ordered items. For example, preceding the COVID-19 pandemic, supply chain problems with one of VA’s prime vendors created supply shortages for infection control gowns, and staff at one VAMC we visited in June 2019 had to obtain gowns from its emergency cache as a temporary measure. Further, VA’s plans for MSPV 2.0 give no indication that they will update their practice of manually maintaining the formulary using spreadsheets, which, based on our discussions with several VAMC logistics officers, can lead to errors such as inadvertent omission of items from the formulary. We plan to issue a report on our review of the MSPV 2.0 program in fall 2020. According to senior VA procurement and logistics officials interviewed during our ongoing review of VA’s COVID-19 procurement for critical medical supplies, VA experienced difficulty obtaining several types of supplies needed to protect its front-line workforce during the COVID-19 response, ranging from N95 masks to isolation gowns. According to senior VA acquisition and logistics officials, beginning in late February to early March 2020, VA requested that medical centers provide daily updates via spreadsheets to try to obtain the most real time information possible on the levels of PPE on hand, usage, and gaps. These spreadsheets, which were reported manually on a daily basis from each of the VAMCs, were the primary means by which Veterans Health Administration (VHA) leadership obtained detailed information on the stock of critical supplies at its VAMCs in real-time. The insight provided by these spreadsheets was not something that VHA leadership had in any type of ongoing or systematic way, prior to the COVID-19 pandemic. In April 2020, VA developed an automated tool to manage this reporting process, but, according to officials, the information must still be gathered and manually reported by each of the 170 VAMCs on a daily basis. In May 2019, the VA Inspector General found that proper inventory monitoring and management was lacking at many VAMCs, noting that inventory management practices ranged from inaccurate to nonexistent. In 2013, we also reported on weaknesses in VA’s inventory management systems and made recommendations to VA to evaluate its efforts to improve in this area. However, our preliminary observations from our ongoing review of VA’s MSPV program indicate that VA will likely rely on its antiquated system for the foreseeable future. Specifically, VA plans to transition to the Defense Logistics Agency’s (DLA) inventory management system, called Defense Medical Logistics Standard Support (DMLSS). DMLSS serves as DLA’s primary MSPV ordering system and supports DLA’s inventory management, among other things. According to DLA officials, DMLSS produces data that VAMCs could use to analyze their order history and find recommendations for future purchases. VA’s implementation schedule shows that it will take seven years to roll out DMLSS and its successor at all VAMCs. In the near-term, VA had planned to implement DMLSS at three medical centers in mid-to-late 2019. However, due to technology integration issues between VA’s financial system and the DMLSS system, implementation at these three VAMCs is delayed. According to the Chief Supply Chain Officer at one of these VAMCs, the original DMLSS implementation date has changed several times from an initial start date of August 2019, which may be delayed to at least October 2020. VA uses a “just in time” inventory supply model—a practice employed by many hospital networks where only limited stock is maintained on-site. However, for this model to succeed, VA needs both visibility into current stock and consistent deliveries from the MSPV-NG program. Based on our preliminary observations, VA faces challenges with both visibility and delivery. VA acquisition leadership has recognized the shortcomings in its medical supply chain management, and has identified supply chain modernization as a priority. As part of our ongoing review of VA’s MSPV program, we reviewed VHA’s Modernization Campaign Plan, dated March 2019, and VHA’s Modernization Plan briefing slides, dated February 2020, which describe several modernization initiatives including MSPV 2.0 and DMLSS. VHA’s February 2020 update on its modernization effort identified both its DMLSS deployment and MSPV 2.0 program at critical risk of not meeting system modernization milestones. Based on our preliminary observations from our ongoing review of VA’s procurement of critical medical supplies, in response to COVID-19, VA is using various existing and new contracting organizations and mechanisms to try to meet its PPE needs. These include using national and regional contracting offices to procure supplies and services, and using existing contract vehicles and new sources. In response to the pandemic, VA’s Office of Acquisition and Logistics also issued a memorandum on March 15, 2020, to implement emergency flexibilities available under the Federal Acquisition Regulation, such as increasing the micro-purchase threshold to $20,000. Our analysis of contracting activity in the Federal Procurement Data System-Next Generation (FPDS-NG) indicates that VHA’s Network Contracting Offices—which support the various regions of VA’s hospital network—increased their supply purchases, mostly by entering into new contracts. Department-wide contracting organizations that would normally not make individual supply purchases—such as VHA’s Program Contracting Activity Central and VA’s Strategic Acquisition Center—also played a substantial role. In addition, logistics staff at VAMCs continued to use the MSPV-NG program to order supplies. VA had existing clauses in MSPV-NG contracts that established terms for the suppliers to maintain support to VA in the event of a catastrophe. But, according to senior VA acquisition officials, because those suppliers faced the same shortages in the broader market, they were not able to provide enough supplies to meet VA’s surging demand. Figure 1 shows the COVID-19-related contract obligations, from March 13, 2020 through June 3, 2020, made by the various VA contracting offices. These obligations include both supplies, such as PPE, and services, such as information technology systems to support telemedicine. Our analysis of preliminary data on orders placed directly by VAMC staff for COVID-19-related items found that, in April 2020, the value of VA’s reported COVID-19-related purchases through the MSPV-NG program began to decrease relative to the values reported in prior months. According to senior VA acquisition and logistics officials, in part, because MSPV-NG and other existing VA supply contracts and agreements did not meet VA’s needs, its acquisition workforce had to make purchases through other contracting mechanisms, such as micro-purchases using government purchase cards, to fill the gap. Between March 13, 2020 and June 3, 2020 VA obligated more than 51 percent ($687 million) of the $1.3 billion it spent on products and services for the COVID-19 response through purchases made outside the MSPV-NG program and other established VA contracting mechanisms. About 27 percent of this $1.3 billion ($364 million) was for veteran-owned small business set-aside purchases, under VA’s Veterans First program. On April 17, 2020, VA placed its first supply requests through the Federal Emergency Management Administration’s (FEMA) Strategic National Stockpile program, according to VA senior acquisition and logistics officials. As of June 5, 2020, according to information provided by the VA, it had received shipments of several different types of supplies through FEMA from these requests, as shown in Table 1. According to VA senior procurement and logistics officials, VA’s Emergency Management Center has an existing relationship with FEMA. However, these senior procurement and logistics officials noted that VA support services officials—who had primary responsibility for requesting medical items through FEMA—did not have an existing relationship with FEMA or a process in place prior to the COVID-19 pandemic for placing medical supply requests through FEMA. Officials said that this led to a brief, initial delay in processing VA’s first request. In summary, VA experienced many of the same challenges obtaining medical supplies as most private sector hospitals and other entities in responding to this devastating pandemic. This situation put stress on an already overburdened acquisition and logistics workforce—resulting in staff initially scrambling to address supply chain shortfalls while simultaneously working with VA’s antiquated inventory system, through manual, daily reports on PPE levels to VA leadership. While VA has made progress in addressing some of the issues that have led us to identify VA acquisition management as high risk, it will take many years for VA to put in place a modern supply chain management system that would position it to provide the most efficient and effective service to our nations veterans. Chairman Moran, Ranking Member Tester, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Shelby S. Oakley at 202-512-4841 or OakleyS@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Lisa Gardner, Assistant Director; Teague Lyons, Assistant Director; Daniel Singleton, Analyst-in-Charge; Jeff Hartnett, Nicolaus Heun, Kelsey M. Carpenter, Sara Younes, Matthew T. Crosby; Suellen Foth, Lorraine Ettaro, Rose Brister, Susan Ditto, Roxanna Sun, Carrie Rogers, and Helena Johnson. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VA spends hundreds of millions of dollars annually to meet the health care needs of about 9 million veterans. In March 2019, GAO added VA Acquisition Management to its High Risk list due to longstanding problems such as ineffective purchasing of medical supplies and lack of reliable data systems. This statement summarizes findings from GAO's 2017 MSPV-NG report and 2019 High Risk report and preliminary observations from two ongoing GAO performance audits to discuss VA's progress in building a more resilient supply chain. For the ongoing work, GAO reviewed VA documentation and interviewed VA officials, and VA medical center staff. Finally, GAO met with senior VA officials on June 5, 2020, to obtain agency views on the new observations GAO discusses in this statement. The Department of Veterans Affairs (VA) has taken some steps in recent years to modernize its processes to acquire hundreds of millions of dollars-worth of medical supplies annually. However, implementation delays for key initiatives, including a new, enterprise-wide inventory management system, limit VA's ability to have an agile, responsive supply chain. Prior to the Coronavirus Disease 2019 (COVID-19) pandemic, in November 2017 and in GAO's High-Risk report in March 2019, GAO reported on weaknesses in VA's acquisition management. For example, GAO reported that VA's implementation of its Medical-Surgical Prime Vendor-Next Generation (MSPV-NG) program—VA's primary means for purchasing medical supplies—lacked an effective medical supply procurement strategy, clinician involvement, and reliable data systems. GAO also found that several of VA's medical supply management practices were not in line with those employed by private sector leading hospital networks. VA is developing another iteration of its MSPV program, called MSPV 2.0, which GAO's preliminary observations show is intended to address some of the shortfalls GAO has identified in its past and ongoing program reviews. In November 2017, GAO recommended that VA develop, document and communicate an overarching MSPV-NG strategy—to include how the program office will prioritize categories of supplies and increase clinician involvement in this process. Preliminary observations from GAO's ongoing work indicate that VA has taken some steps, as it implements MSPV 2.0, to address this priority recommendation. However, GAO's preliminary observations also indicate that the MSPV 2.0 program implementation is delayed and some of these existing program challenges may not be remedied. Based on preliminary observations from GAO's ongoing work, VA's implementation of a new supply and inventory management system is delayed. As a result, VA had to rely on an antiquated inventory management system, and initial, manual spreadsheets to oversee the stock of critical medical supplies at its medical centers. This limited the ability of VA management to have real-time information on its pandemic response supplies, ranging from N95 face masks to isolation gowns, to make key decisions. As of April 2020, VA has an automated tool to manage its reporting process, but the information must be gathered and manually reported by each of VA's 170 medical centers on a daily basis. GAO's preliminary observations also show that in response to COVID-19, VA is using various contracting organizations and mechanisms to meet its critical medical supply needs. These include using national and regional contracting offices to obtain supplies from existing contract vehicles, new contracts and agreements, and the Federal Emergency Management Administration's Strategic National Stockpile to respond to the pandemic. GAO has made 40 recommendations since 2015 to improve acquisition management at the VA. VA agreed with those recommendations and has implemented 22 of them. Further actions are needed to implement the remaining recommendations, such as GAO's recommendation that VA implement an overarching MSPV strategy, and demonstrate progress toward removing this area from GAO's High-Risk list.", "document_type": "gao"}
{"report": "DOD is up to 21 months late in fully addressing five remaining requirements of section 911 related to DOD’s organizational strategy and cross-functional teams, as shown in figure 1 and discussed below. Specifically, DOD has not fully addressed the following statutory requirements: 1. Issue an organizational strategy: DOD has not issued its organizational strategy, which as of June 2019 is 21 months past the statutorily required issuance date of September 1, 2017. In January 2019, we reported that OCMO officials had revised the draft organizational strategy, incorporating, among other things, the criteria that distinguish cross-functional teams established under section 911 from other types of cross-functional working groups, committees, integrated product teams, and task forces, as required by section 918(b) of the John S. McCain NDAA for Fiscal Year 2019. The revised draft of the organizational strategy also includes steps DOD plans to take to advance a collaborative culture. As we reported in our June 2018 report, these steps, as outlined in the draft strategy, align with our leading practices for mergers and organizational transformations, which we recommended that DOD incorporate into its strategy. Based on our review of OCMO’s current draft of the organizational strategy, we found that it addresses all required elements laid out in section 911 of the NDAA for Fiscal Year 2017. That January 2019 draft strategy, according to an official from OCMO’s Administration and Organizational Policy Directorate, was provided to OCMO leadership for review as early as August 2018, but has not been approved. A senior OCMO official stated that approval of the draft was delayed to ensure it aligned with the National Defense Strategy, issued in January 2018, and the National Defense Business Operations Plan, issued in May 2018, and to incorporate additional requirements of the John S. McCain NDAA for Fiscal Year 2019, which was enacted in August 2018. In addition, according to senior OCMO and Office of the Deputy Secretary of Defense officials, the Acting CMO and the Deputy Secretary of Defense informally discussed the draft organizational strategy, but those conversations did not lead to the Acting CMO formally approving the draft for department-wide coordination. In May 2019, a senior OCMO official told us that the Acting CMO was fully committed to completing department-wide coordination of the draft strategy in June 2019 and advancing it for issuance by the Secretary of Defense in July 2019. After providing a draft of this report to the department for comment, we learned that the organizational strategy was circulated for department-wide coordination on July 12, 2019, with components expected to provide input by August 5, 2019. 2. Issue guidance for cross-functional teams: DOD has not issued guidance for cross-functional teams, which, as of June 2019, is 20 months past the required date of September 30, 2017. In June 2018, we reported that OCMO officials had revised the draft guidance to fully address all section 911 requirements and incorporate leading practices for effective cross-functional teams in the guidance, consistent with our February 2018 recommendation. Based on our review of this draft, we found that it addresses all required elements from section 911 of the NDAA for Fiscal Year 2017, as well as all of the leading practices for effective cross-functional teams. That draft guidance, according to an official from OCMO’s Administration and Organizational Policy Directorate, was provided to OCMO leadership for review as early as August 2018, but has not been approved by the CMO. 3. Provide training to cross-functional team members and their supervisors: OCMO officials have provided some of the required training to members and leaders of a recently established cross- functional team described later in this report. The training included several required elements, including information on the characteristics of successful cross-functional teams, conflict resolution, and how to appropriately represent the views and expertise of functional components. However, OCMO officials have not provided training to supervisors in team members’ functional organizations as required. We reported in February 2018 that DOD had developed a draft curriculum for this training that addressed the section 911 requirements. An OCMO official told us it has not altered the curriculum since then, but that the department has still not provided the training to team members’ supervisors because the curriculum has not been approved by the Acting CMO or the Secretary of Defense. Such approval, though not required by statute, would demonstrate senior leadership support for cross-functional teams, a leading practice we have identified. Further, according to an OCMO official, department-wide coordination and approval would serve to strengthen the effectiveness of the training. However, the need for this training is evident. For example, when we observed one of the training sessions, a member of a cross-functional team stated that he did not believe his supervisors knew what cross-functional teams were. 4. Provide training to presidential appointees: OCMO has not provided the required training to individuals filling presidentially appointed, Senate-confirmed positions in the Office of the Secretary of Defense. Section 911 requires these individuals to complete the training within 3 months of their appointment or DOD to request waivers. As of June 2019, 24 of 36 such officials had been appointed and in their positions for more than 3 months, and, according to an OCMO official, none had received their training or been granted a training waiver. An OCMO official told us in October 2018 he had revised the draft training curriculum following our February 2018 report to include all the required elements in section 911. However, as of May 2019, OCMO officials had not provided a copy of the revised curriculum for our review. After the curriculum is approved, the officials stated that they plan to recommend to the Secretary of Defense that all presidential appointees in the Office of the Secretary of Defense receive the training, rather than request waivers. 5. Report on successes and failures of cross-functional teams: OCMO has not completed an analysis of the successes and failures of DOD’s cross-functional teams, which, as of June 2019, is 3 months past its required completion date. Section 911 requires that an analysis of the success and failures of the teams and how to apply lessons learned from that analysis is completed 18 months after the establishment of the first cross-functional team. With the establishment of the first cross-functional team on personnel vetting in August 2017, the required completion date for the report was February 25, 2019. An OCMO official stated that OCMO planned to conduct an analysis on the personnel vetting team, but had not yet begun and had not set a time frame for doing so. DOD has not addressed most of these remaining requirements of section 911 because, according to an OCMO official, the Acting CMO has not approved the draft documents prepared by OCMO staff to satisfy the requirements. Moreover, the Acting CMO has not coordinated most of the documents department-wide and provided them to the Secretary of Defense for review and issuance. Specifically, according to an OCMO official, the Acting CMO has not reviewed or approved the guidance on cross-functional teams or curricula for cross-functional team members, their supervisors, and presidential appointees. These delays occurred in part because the department has not established and communicated internal deadlines for reviewing, coordinating, and approving these documents. According to OCMO officials, the primary reason they have not met these other outstanding requirements, including the guidance and training for cross-functional teams, is that they would like to have the organizational strategy approved and issued first, so that it can be reflected in the accompanying materials. However, while the OCMO has set an internal time frame for the organizational strategy, it has not set similar time frames for completing the remaining requirements. Standards for Internal Control in the Federal Government emphasize the need to establish time frames to implement actions effectively. In addition, as we reported in June 2018, establishing time frames with key milestones and deliverables to track implementation progress are important for agency reform efforts. By not setting and following clear internal deadlines for meeting the outstanding section 911 requirements, DOD has continued to fall short in meeting statutory requirements and missed opportunities to effectively implement its cross-functional teams and advance a collaborative culture that could bolster broader efforts within the department, such as reforming its business operations. Sections 918 and 1053(c) of the John S. McCain NDAA for Fiscal Year 2019 required the Secretary of Defense to establish a cross-functional team pursuant to section 911 of the NDAA for Fiscal Year 2017 on electronic warfare to identify gaps in electronic warfare and joint electromagnetic spectrum operations, capabilities, and capacities within the department across personnel, procedural, and equipment areas. In addition, section 1053(d) of the act required the electronic warfare cross- functional team to, among other things, (1) update the department’s Electronic Warfare Strategy in coordination with the Electronic Warfare Executive Committee by February 9, 2019, and (2) provide assessments of the electronic warfare capabilities of the Russian Federation and the People’s Republic of China in consultation with the Director of the Defense Intelligence Agency by May 10, 2019. Section 918 of the John S. McCain NDAA for Fiscal Year 2019 required the team’s establishment by November 11, 2018; however, DOD did not establish an electromagnetic spectrum operations cross-functional team until February 2019, and the team did not begin its work until April 2019. An official from the team told us that the standup of the team was delayed due to the extensive department-wide review of the February 2019 memorandum that established the team. Because of the delayed establishment of the team, DOD officials estimated that the required update to DOD’s Electronic Warfare Strategy would be completed by the end of September 2019—7 months after the statutory deadline—and that the required assessments would be provided by fall 2019. According to the team’s establishment memorandum, the team will continue its work until at least fiscal year 2022. In addition to the requirements discussed above, section 911 of the NDAA for Fiscal Year 2017 includes specific requirements for cross- functional teams established under that section, including that each team’s objectives be clearly established in writing and that the team should establish a strategy to achieve those objectives. We found that DOD and the electromagnetic spectrum operations cross-functional team have addressed 10 of 11 of those requirements for cross-functional teams. We also found that the team demonstrates several of the leading practices for cross-functional teams. For example, we found that the team has a well-defined team structure and well-defined team goals. However, as previously discussed, DOD has not fully addressed the section 911 requirement for training for cross-functional team members’ supervisors. We were also told by team officials that DOD was delayed in providing administrative support and funding to support the team’s operations. According to the memorandum establishing the electromagnetic spectrum operations team, the CMO is responsible for providing administrative support to the new team, to include providing the team with office space, information technology equipment, contracting, human resources, security, cross-functional team training, and other services, as appropriate. The memorandum also requires the team to work with the CMO to develop resource requirements for team operations for fiscal years 2019 and 2020 to ensure adequate resources are immediately available. However, according to a team official, funding was not provided to the team until late May 2019—over 3 months after the team was established and over 1 month after most of the team members were provided by their home units to work on the team full time. According to a team official, this funding was to be used for several team requirements, including dedicated office space, computer systems, travel funds, and contractor support. This funding was delayed in part because of disagreements over responsibility for funding the team under the terms of the memorandum establishing the team. Specifically, according to a team official, OCMO officials believed that funding should be provided by another organization, such as the Joint Staff. Team and Joint Staff officials told us that they believed the OCMO was responsible for this funding based on the memorandum establishing the team. A team official further stated that funding was provided only when the Deputy Secretary of Defense directed that funding be provided to the team. OCMO officials told us that because the team was not a budgeted activity for fiscal year 2019, the team was added to DOD’s unfunded requirements list. The Under Secretary of Defense (Comptroller) identified funds for the team via the unfunded requirements process at the end of April 2019. However, a team official told us funding for the team for future fiscal years has not been identified and responsibility for providing that funding is still unclear. OCMO officials told us that the team will continue to rely on the unfunded requirements process for funding, since the team is not a budgeted activity for fiscal year 2020, and would need to compete for funding through DOD’s program budget review process for fiscal year 2021 and later fiscal years. Those officials also told us that the team has not yet signed a memorandum of agreement that is required to execute transfer of the funds to the team. A team official told us the team had not yet signed the memorandum because it believed the memorandum would transfer responsibility for funding the team from OCMO to the team. As noted previously, team officials believe the OCMO is responsible for this funding based on the memorandum establishing the team. According to a team official, this delay in funding hampered the team’s ability to achieve full operating capability. For example, until late May the team was working from the Pentagon Conference Center and OCMO conference rooms with only one secure laptop. A team official told us in June 2019 that though the team has moved into its own office space, that space does not have the level of security required for the team to work on a third of its initiatives. As a result, the team was also delayed in conducting mission analysis, work plan development, organizational design, and production of executive-level briefings. A team official told us the team expects to be at full operating capability in late July 2019. Leading practices for implementing effective cross-functional teams highlight the importance of senior management providing teams with access to resources. In addition, Standards for Internal Control in the Federal Government state that agencies’ management should assign responsibility to achieve the entity’s objectives. If DOD does not clarify roles and responsibilities for providing funding for the new cross- functional team, the Acting CMO and the electromagnetic spectrum operations team may continue to have delays in funding and those delays may negatively affect the team’s ability to conduct its work and to meet its objectives. Section 911 of the NDAA for Fiscal Year 2017 called for organizational and management reforms to assist DOD in addressing challenges that have hindered collaboration and integration across the department. The department has taken some steps to implement the section 911 requirements, but still has not met statutory time frames for implementing key requirements intended to support its cross-functional teams and to advance a more collaborative culture within the department. Setting specific internal deadlines would help ensure action on these outstanding statutory requirements. Moreover, DOD has established a new electromagnetic spectrum operations cross-functional team under section 911—one of the only requirements for which the department has made progress since our last report—but has not ensured that the team will have the funding it needs beyond fiscal year 2019 to maintain full operational capability and accomplish its assigned objectives. Senior leadership commitment to fully supporting this team and fulfilling all section 911 requirements could help the department make important advances in the type of collaboration necessary for the department to accomplish some of its most ambitious goals. We are making the following six recommendations to DOD: The Secretary of Defense should ensure that the CMO meets DOD’s August 2019 deadline for final submission of the organizational strategy to the Secretary of Defense for review and issuance. (Recommendation 1) The Secretary of Defense should ensure that the CMO meets DOD’s September 2019 deadline for review and approval of DOD’s guidance on cross-functional teams and final submission to the Secretary for review and issuance. (Recommendation 2) The Secretary of Defense should ensure that the CMO meets DOD’s September 2019 deadline for review and approval of DOD’s training curriculum for cross-functional team members and their supervisors. (Recommendation 3) The Secretary of Defense should ensure that the CMO meets DOD’s September 2019 deadline for review and approval of DOD’s training curriculum for presidential appointees. (Recommendation 4) The Secretary of Defense should ensure that the CMO meets DOD’s November 2019 deadline for drafting, review, and approval of DOD’s report on the success and failures of cross-functional teams and final submission to the Secretary for review and approval. (Recommendation 5) The Secretary of Defense should ensure that the CMO and the electromagnetic spectrum operations cross-functional team clarify roles and responsibilities for providing administrative support and funding for the team beyond fiscal year 2019 in accordance with the memorandum establishing the team. (Recommendation 6) We provided a draft of this report to DOD for review and comment. In written comments that are reproduced in appendix IV, DOD concurred with our recommendations. DOD officials provided separate oral technical comments, which we incorporated as appropriate. In its response, DOD provided new information on a timeline for completing the outstanding section 911 requirements. Specifically, DOD updated its internal deadline for submission of the organizational strategy to the Secretary of Defense from July 2019 to August 2019. DOD also stated that it plans to issue the guidance on cross-functional teams and training for cross-functional team members, their supervisors, and presidential appointees by September 2019 and complete its report on the successes and failures of cross-functional teams by November 2019. We updated our first five recommendations to reflect this information. Establishing these timelines is an important step forward in meeting the statutory requirements under section 911 as well as addressing our recommendations. As part of our next and final audit of DOD’s implementation of section 911 requirements, we will assess the extent to which the department has met these new internal deadlines and fully addressed our recommendations in this report. Fully addressing these outstanding requirements will strengthen DOD’s ability to effectively implement its cross-functional teams and advance a collaborative culture within the department. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and DOD’s Deputy Chief Management Officer. In addition, the report is available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Section 911 of the NDAA for Fiscal Year 2017 included a provision for us—every 6 months after the date of enactment on December 23, 2016, through December 31, 2019—to submit to the congressional defense committees a report. Each report is to set forth a comprehensive assessment of the actions that DOD has taken pursuant to section 911 during each 6-month period and cumulatively since the NDAA’s enactment. Table 1 identifies our four prior reports on DOD’s implementation of section 911 and the status of the five recommendations from those reports. Section 911 of the National Defense Authorization Act for Fiscal Year 2017 requires the Secretary of Defense to take several actions. Table 2 summarizes these requirements, the due date, and the date completed, if applicable, as of June 2019. In February 2018, we reported on eight leading practices for implementing effective cross-functional teams. Table 3 identifies these leading practices and their related key characteristics. In addition to the contact named above, Margaret Best (Assistant Director), Tracy Barnes, Arkelga Braxton, Sierra Hicks, Michael Holland, Matthew Kienzle, Amie Lesser, Ned Malone, Judy McCloskey, Sheila Miller, Richard Powelson, Daniel Ramsey, Ron Schwenn, and Sarah Veale made key contributions to this report.", "summary": "DOD continues to confront organizational challenges that hinder collaboration. To address these challenges, section 911 of the NDAA for Fiscal Year 2017 directed the Secretary of Defense to, among other things, issue an organizational strategy that identifies critical objectives that span multiple functional boundaries; establish cross-functional teams to support this strategy; and provide related guidance and training. The NDAA for Fiscal Year 2017 also included a provision for GAO to assess DOD's actions in response to section 911. This report assesses the extent to which DOD has made progress in implementing the requirements of section 911, including establishing a new cross-functional team on electromagnetic spectrum operations. GAO reviewed documentation, interviewed cross-functional team members and other DOD officials, and compared DOD's actions to section 911 requirements and leading practices for cross-functional teams. The Department of Defense (DOD) is up to 21 months late in fully addressing five of seven requirements of section 911 of the National Defense Authorization Act (NDAA) for Fiscal Year 2017. These remaining five requirements are designed to strengthen collaboration within the department to foster effective and efficient achievement of objectives and outputs (see figure). DOD has not addressed most of these remaining requirements of section 911 largely because the Chief Management Officer (CMO) has not approved the documents drafted to meet the requirements or coordinated department-wide review of the documents and provided them for Secretary of Defense issuance. According to Office of the CMO (OCMO) officials, some of the draft documents were provided to the CMO for review and approval as early as August 2018. After providing a draft of this report to the department for comment, GAO learned that the organizational strategy was circulated for department coordination in July 2019, with components expected to provide input by August 2019. However, while the OCMO has set an internal time frame for the organizational strategy, it has not set similar time frames for completing the other four remaining requirements, such as delivering guidance and training on cross-functional teams. GAO previously reported that establishing internal deadlines with key milestones and deliverables is important for tracking progress and implementing actions effectively. DOD established a cross-functional team pursuant to section 911 on electromagnetic-spectrum operations (EMSO), but according to a team official, funding for the team was delayed. EMSO refers to those activities consisting of electronic warfare and joint electromagnetic-spectrum management operations used to exploit, attack, protect, and manage the electromagnetic operational environment to achieve the commander's objectives. According to the memorandum establishing the team, the CMO is required to provide administrative support to and coordinate with the team to ensure adequate resources are immediately available. However, team officials stated that this funding was delayed in part because of disagreements over responsibility for funding the team under the terms of this memorandum. Moreover, according to a team official, plans for funding in future fiscal years have not been developed. If DOD does not clarify roles and responsibilities for funding the team, the CMO and the EMSO team may face additional delays securing funding, which could negatively affect the team's ability to conduct its work and meet its objectives. GAO is making six recommendations, including that DOD set and ensure that it meets specific internal deadlines for review and approval of outstanding requirements of section 911, and that DOD clarify roles and responsibilities for providing funding for the EMSO cross-functional team. DOD concurred with GAO's recommendations and set deadlines for addressing the remaining requirements.", "document_type": "gao"}
{"report": "The DATA Act was enacted May 9, 2014, for purposes that include expanding on previous federal transparency legislation by requiring the disclosure of federal agency expenditures and linking agency spending data to federal program activities, so that both policymakers and the public can more effectively track federal spending. The act also holds agencies accountable for submitting complete and accurate data to Treasury and requires that agency-reported award and financial data comply with OMB and Treasury data standards. The DATA Act requires OMB and Treasury to establish government-wide data standards that to the extent reasonable and practicable provide consistent, reliable, and searchable spending data for any federal funds made available to or expended by federal agencies. These standards specify the data elements to be reported under the DATA Act and define and describe what is to be included in each data element, with the aim of ensuring that data will be consistent and comparable. The DATA Act requires OMB and Treasury to ensure that the standards are applied to the data made available on USAspending.gov and also requires agencies’ OIGs and GAO to review these data and report on their completeness, timeliness, accuracy, and quality. USAspending.gov has many sources of data, including data that agencies submitted to Treasury through their financial management systems and other data extracted from government-wide award systems that collect data from federal agencies and external award recipients. Treasury’s DATA Act Broker (Broker) is a key component of the data collection and reporting framework. The Broker enables agencies to upload, validate, and certify financial data and create linkages between the financial and award data for publication on the USAspending.gov website. Agencies are expected to submit three data files with specific details and data elements to the Broker from their financial management systems in accordance with Treasury guidance documents. File A: Appropriations account includes summary data such as the fiscal year cumulative federal appropriations account balances and includes data elements such as the agency identifier, main account code, budget authority appropriated amount, gross outlay amount, and unobligated balance. File B: Object class and program activity includes summary data such as the names of specific activities or projects as listed in the program and financing schedules of the annual budget of the U.S. government. File C: Award financial includes award transaction data such as the obligation amounts for each federal financial award made or modified during the reporting quarter (e.g., January 1, 2017, through March 31, 2017). The Broker also extracts data from four government-wide award reporting systems: the Federal Procurement Data System–Next Generation (FPDS-NG), System for Award Management (SAM), Financial Assistance Broker Submission (FABS), and the FFATA Subaward Reporting System (FSRS). These systems supply award and sub-award data (e.g., federal grants, loans, and contracts) to USAspending.gov. The systems compile data that agencies and external federal award recipients submit to report procurement and financial assistance award data required under the Federal Funding Accountability and Transparency Act of 2006 (FFATA). The four files produced with data that the Broker extracts from the four systems are as follows: File D1: Procurement includes data on the attributes of the award and the awardee and the recipient of the award (extracted from FPDS-NG on a daily basis) for procurement awards (contracts), if any, and contains elements such as the total dollars obligated, current total value of award, potential total value of award, period of performance start date, and other data to identify the procurement award. File D2: Financial assistance includes award and awardee attribute data (extracted from FABS nightly) on financial assistance awards (grants and loans) and contains data elements such as the federal award identification number, the total funding amount, the amount of principal to be repaid for the direct loan or loan guarantee, the funding agency name, and other data to identify the financial assistance award. File E: Additional awardee attributes includes additional data (extracted from SAM) on the award recipients and contains elements such as the awardee or recipient unique identifier; the awardee or recipient legal entity name; and data on the award recipient’s five most highly compensated officers, managing partners, or other employees in management positions. File F: Subaward attributes includes data (extracted from FSRS) on awards made to subrecipients under a prime award, if any, and contains elements such as the subaward number, the subcontract award amount, total funding amount, the award description, and other data to facilitate the tracking of subawards. According to Treasury guidance, after agencies submit Files A, B, and C, the Broker runs a series of validations and produces warnings and error reports for agencies to review. After passing validations for these three files, the Broker generates Files D1 and D2 containing details on procurement and assistance awards and performs a cross-file validation of linkages between File C and Files D1 and D2, which generates error and warning reports, as appropriate. The Broker also generates Files E and F containing data on highly compensated officers and subawards associated with the prime awards. There are no field-level or cross-file validations for Files E and F. With their quarterly submission, agency senior accountable officials (SAO) are required to certify the data submissions and to provide assurance over the alignment of Files A through F and that the data are valid and reliable in accordance with OMB guidance. According to Treasury officials, once the certification is submitted, a sequence of computer program instructions or scripts is issued to transfer the data from the Broker to tables set up in a database used as a source for the data on the website. Data are then displayed on USAspending.gov along with certain historical data from other sources, including Monthly Treasury Statements. OMB and Treasury implementation guidance called for customer agencies to consider how best to leverage their SSPs to capture data for their submissions, engage with their SSPs throughout the implementation process, and document the SSP role in agency DATA Act submissions. According to the SSPs, 60 non–Chief Financial Officers Act of 1990 (CFO Act) agencies use a federal SSP for all or part of the data submissions out of the 82 reporting data under the DATA Act as of the fourth quarter in fiscal year 2018. In 2014, Treasury designated four federal financial management SSPs to provide financial management services to other federal agencies. Although the four Treasury-designated federal financial management SSPs have changed over the years, the four federal financial management SSPs, which performed DATA Act services for external customers as of December 2018, are as follows: The Administrative Resource Center (ARC) is a Treasury SSP that provided financial management services to 42 customer agencies external to Treasury. According to ARC, 21 of those agencies received DATA Act services from ARC. The Enterprise Services Center (ESC) is a Department of Transportation financial management SSP that provided services to seven external customer agencies. According to ESC, six of those customer agencies received DATA Act services from ESC. Pegasys Financial Services (PFS) is a Department of Agriculture financial management SSP that provided services to 37 external customer agencies. According to PFS, 24 of those customer agencies received DATA Act services from PFS. The Interior Business Center (IBC) is a Department of the Interior financial management SSP that provided services to 18 external customer agencies. According to IBC, nine of those customer agencies received DATA Act services from IBC. The DATA Act requires agencies’ OIGs to issue reports assessing the quality of the agencies’ spending data submissions and compliance with the DATA Act. In the OIGs’ reports covering their agencies’ second quarter fiscal year 2017 submissions, nine OIGs reported issues with their agencies’ use of an SSP for DATA Act submissions. Five of the nine OIGs issued recommendations related to these issues, and four agencies concurred with the recommendations. For example, one OIG recommended that its agency work closely with its SSP to address timing and coding errors that the SSP caused for future DATA Act submissions. Another OIG recommended that its agency work with its SSP to identify OMB requirements that the SSP is to perform and insert them into the service-level agreement, in order to address errors caused by confusion as to whether the SSP or the agency should submit certain types of data. Although our prior reports on the DATA Act included recommendations, our recommendations were not related to SSPs’ implementation of the DATA Act. The DATA Act requires OIGs and GAO to issue their second reports on data quality in November 2019. The 27 customer agencies that responded to our survey reported that the four federal financial management SSPs provide a variety of services (see fig. 1). All 27 agencies reported using their federal financial management SSPs for DATA Act services, and almost all of the agencies used their SSPs for several other financial management services, such as general ledger accounting, financial reporting, and hosting the customer agencies’ financial systems. As such, the SSPs play a key role in helping to ensure that these customer agencies successfully carry out the requirements of the DATA Act and submit Files A, B, and C from their financial management systems. In addition, 17 agencies reported using their SSPs for payroll or budget execution services, while fewer reported using their SSPs for other financial management services, such as grant or loan processing. DATA Act services. All 27 customer agencies responding to our survey reported using an SSP for DATA Act services. As discussed in more detail below, these DATA Act services may include activities such as preparing DATA Act files from financial systems, consolidating DATA Act files from multiple agency component entities, reconciling DATA Act files to other source data, and uploading DATA Act files to the Broker for validation. General ledger accounting. Twenty-six agencies reported using SSPs for general ledger accounting, which may include activities such as general ledger setup and maintenance, posting transactions to the general ledger, accrual and liability processing, and period-end general ledger closing. Financial reporting. Twenty-six agencies also reported using SSPs for financial reporting, which may include activities such as Treasury reporting, financial statement preparation, cash forecasting and reporting, and financial performance and operational reporting. Financial system hosting. Twenty-five agencies reported using SSPs for financial system hosting, which may include services such as systems management and monitoring, disaster recovery, help desk administration, network security compliance and controls, and continuity of operations plans and testing. Invoice processing. Twenty-four agencies reported using SSPs for invoice processing, which may include services such as recording receiving and acceptance reports, recording invoices, matching invoices to receiving and acceptance reports, and routing invoices to obtain approval for payment. Budget execution. Seventeen agencies reported using their SSPs for financial management services related to budget execution, which may include activities such as budget setup and maintenance, fund allocation and control, and budgetary reporting. Payroll. Seventeen agencies reported using SSPs for payroll. SSP payroll services may include recording payroll and benefit payments; reconciling payroll service data with financial management data; and recording credits, payment adjustments, and employee receivable offsets. Procurements/contracts. Thirteen agencies reported using SSPs for procurement and contract services. SSP procurement and contract services may include recording credits and payment adjustments; auditing payments; processing payments for incurred expenses and payments in advance; and capturing award identifier data, such as the Procurement Instrument Identifier (PIID) and agency Unique Record Identifier (URI) to support DATA Act reporting. Grants processing. Seven agencies reported using SSPs for grants processing, which may include recording requests for grant payments, matching grant payment requests to obligating documents, routing grant payment requests for approval, and generating payment transactions. These processes also include payments for expenses and payments in advance as well as capturing award identifier data, such as Federal Award Identification Numbers (FAIN) and Catalog of Federal Domestic Assistance (CFDA) codes to support DATA Act reporting. Loans processing. Three agencies reported using SSPs for loan processing. Loan processing services may include recording requests for loan payments, matching loan payment requests to obligating documents, generating payment transactions, resolving payment issues, and recording credits and payment adjustments. All 27 agencies responding to our survey reported that their federal SSPs perform a variety of DATA Act services or activities, as shown in figure 2. Preparing data files A, B, or C and uploading them to the Broker are the most prevalent DATA Act services or activities that the federal SSPs perform, whereas fewer than half of the SSPs certify and publish the files for the agency after receiving agency approval. All 27 agencies reported that their SSPs prepare at least one of the Files A, B, or C using data from either SSP or customer agency financial systems. In addition, 15 of the 27 agencies reported that their SSPs consolidate DATA Act files from multiple agency components. Seventeen agencies reported that their SSPs reconcile Files A, B, or C to other source data. For example, a reconciliation of general ledger and subledgers may include verifying that (1) general ledger account balances can be traced to aggregated or discrete agency transactions and (2) aggregated or discrete agency transactions can be traced to the point of origination and source documents. Twenty-five of the 27 agencies reported that their SSPs upload Files A, B, or C to the Broker for validation. In turn, the Broker runs a series of data validations and produces warnings and error reports for agencies to review after the files are submitted. Twenty-one agencies reported that their SSPs address these warnings and errors on their behalf. After warnings have been reviewed and all errors have been addressed, Files A, B, and C have been uploaded and Files D1, D2, E, and F have been generated, the agency’s SAO is required to certify the validity and reliability of the data submissions in accordance with OMB guidance. Twenty-four agencies reported that their SSPs provide final Files A, B, or C for the customer agency to review and certify in the Broker, and 11 agencies reported that their SSPs finalize the files in the Broker and click the Certify and Publish button after receiving agency approval to certify. We asked customer agencies in our survey to specify the challenges associated with using an SSP that they experienced since their initial DATA Act submission; the SSP’s role in these challenges; and whether the challenges affected the timeliness, completeness, or accuracy of their submissions. Sixteen of the 27 customer agencies that responded to our survey identified one or more challenges associated with using an SSP (see fig. 3), many of which affected the timeliness, completeness, and accuracy of agency submissions. The survey questions and summarized results are shown in appendix II. In addition, officials from all four federal SSPs described various challenges they experienced in helping their agency customers with DATA Act submissions. The challenges reported by these 16 customer agencies and the federal SSPs are summarized below. Depending on the effectiveness of agencies’ and SSPs’ actions to address them (as discussed further below), these challenges may increase the risk that agencies will be unable to submit quality data in accordance with the DATA Act. Dependencies. Ten agencies reported that they have experienced challenges related to agency submission activities that depend on relationships with, or actions being taken by, the SSP before the agency can proceed. One agency reported that it must rely on its SSP to prepare, validate, and finalize all DATA Act files prior to agency certification and the files are often submitted close to the due date. Another agency reported that its SSP provided DATA Act submission files to the agency the day before or near the certification deadline. Relying on SSPs to prepare DATA Act files in a timely manner increases the risk that agencies may be unable to certify and publish their DATA Act submissions on time. Resources. Seven agencies said that they have experienced resource challenges related to a lack of funding or human resources at the customer agency or its SSP. One agency noted that its SSP has only a small group of people that assist with all of its SSP’s services, making it challenging in particularly busy seasons (such as the close of the fiscal year) for the SSP to meet internal deadlines and resolve data discrepancies affecting the timeliness, completeness, and accuracy of data submissions. Another agency reported challenges with funding resources, noting that the agency has been unable to use its SSP’s integrated financial and procurement system because of the costs associated with implementation, operation, and maintenance. The shortage of resources to bring on more staff or improve systems increases the risk that agencies may be unable to submit quality data and fully carry out DATA Act requirements. Competing priorities. Five agencies said that they have experienced challenges related to statutory, regulatory, policy, or other matters that have competing priorities or conflicting requirements that may affect an agency or its SSP’s DATA Act submission process. One agency reported that the fourth quarter DATA Act reporting deadline falls within fiscal year- end reporting time frames, requiring the agency to prioritize fiscal year- end reporting over some of the DATA Act reporting tasks. Similarly, officials from an SSP told us that they also experienced challenges with the short turnaround times required to incorporate system updates for DATA Act submissions. Data quality. Four agencies reported that they have experienced challenges related to meeting DATA Act requirements for data quality because they use an SSP, including completeness and accuracy of agency data to be reported as well as SAO certification and reporting of nonfinancial data elements. One agency reported that its SSP included extraneous transactions in its File C that were not required for DATA Act reporting. This created a high volume of warning messages when the Broker compared the data with file D2 during the validation process. Another agency reported that its SSP provided incomplete files for agency certification and that the data in the files did not reflect the data in the agency’s financial reports. These challenges not only increase the risk of lower-quality agency data submissions but may also require SSPs and customer agencies to expend additional resources to address warning messages that the Broker generated. Guidance. Four agencies reported experiencing challenges involving incomplete, unclear, missing, and evolving OMB and Treasury guidance related to SSP implementing requirements and Broker changes, including data elements, the technical schema, and other key policies. One agency noted that guidance on performing quarterly certifications is not readily available. Two agencies reported challenges involving a lack of guidance on how to communicate error corrections and desired changes to their SSPs. Lack of guidance could result in misunderstandings or miscommunications between the SSP and its customer agency, increasing the risk of delays or errors in the agency’s data submissions. Technology. Four agencies reported that they have experienced technology challenges with developing and submitting required files. These challenges include SSP infrastructure issues, such as integrating multiple existing and disparate management systems or their SSPs needing to modify existing systems to implement the DATA Act. Agencies reported that some systems are unable to include the required data elements for all reported transactions. Similarly, an SSP official told us prior to our survey of customer agencies that the SSP also experienced technical challenges with systems and data that have since been resolved. Another SSP experienced challenges with its financial systems not capturing award identification data elements, such as the PIID. Such limitations in customer agency and SSP technology may require the use of limited resources for error corrections and manual work-arounds, increasing the risk of reporting errors, and may hamper customer agencies’ and SSPs’ ability to submit quality data in accordance with the DATA Act. Project management. Two agencies reported that they have experienced challenges related to their SSPs’ project management, such as the lack of a designated project manager and inadequate documentation of progress made or key decisions. Specifically, both customer agencies said that their SSPs did not provide data in a timely manner for their review prior to submission. One agency reported that although this did not affect the timeliness of its submission, it affected data quality because the agency did not have sufficient time to test and implement sufficient internal controls and validation procedures prior to data being published on USAspending.gov. Additionally, the same agency reported that there is no senior project manager at the SSP who oversees the processes used to provide financial management services to the agency. This challenge may affect agencies’ ability to resolve errors, increasing the risk that they submit incorrect data. However, none of the four federal SSPs described any project management challenges when we asked them prior to our survey what challenges they faced in carrying out their roles and responsibilities for assisting their customer agencies with implementing the DATA Act. We asked customer agencies in our survey to describe the steps they and their SSP have taken to address reported challenges and help mitigate risks associated with them. Of the 16 agencies that identified challenges, 12 agencies reported that they had already taken steps to address them and five agencies said they were aware of steps their SSPs had taken. As discussed in more detail below, communication and coordination between the SSP and Treasury, as well as customer agency technological improvements and manual work-arounds were the steps most often reported by agencies to address identified challenges. Communication and coordination. Eight of the 12 agencies described communication efforts with their SSPs or Treasury to facilitate coordination and seek information needed to address their challenges associated with using an SSP. These efforts include requesting information from the SSP, Treasury, and other government resources to obtain additional knowledge regarding the DATA Act and to prepare internal guidance and procedures. One agency reported implementing a weekly meeting with its SSP on DATA Act reporting. Another agency reported that its SSP has been very proactive in sharing information (bulletins, updates, etc.) and assisting with submitting DATA Act information. According to the eight customer agencies, increased communication and coordination has helped to address several technology, dependency, and resource challenges. Technology improvements. To address technology challenges, four agencies discussed making improvements in technology at both the agency and the SSP. The improvements include implementing an integrated financial and procurement system platform and working with the software vendor to obtain access to FPDS-NG for anticipated 2019 procurement activity reporting. Another agency is currently implementing a technological solution to aid in consolidating and reconciling files. In addition to technological solutions, two agencies reported using manual work-arounds, such as developing and implementing internal manual processes to reconcile and correct data files. Some agencies also discussed actions their SSPs had taken to address technology issues, including two SSPs that are working with the developers to address software issues. One agency reported that in addition to addressing technology challenges, these improvements also provided substantial cost savings. We also asked the 27 customer agency survey respondents to specify the internal control processes and activities they use to assure the quality of data submitted to the Broker. Twenty-four of 27 agencies reported that they use various processes and activities to provide such assurance. Specifically, these 24 agencies reported that they reconcile data files to other agency data and sources (e.g., the Governmentwide Treasury Account Symbol Adjusted Trial Balance System). These reconciliations can help identify errors in data files and ensure that they are consistent with other agency data. In addition, 18 agencies reported that they review their SSPs’ Service Organization Control (SOC) reports to identify any internal control deficiencies, and nine agencies reported that they implemented controls to address control deficiencies identified in their SSPs’ SOC reports. Twenty agencies reported that they review or verify agency data displayed on USAspending.gov. By reviewing these data, agencies can confirm that the data that they uploaded to the Broker are presented accurately on the website. Nineteen agencies reported that they incorporate the results of OMB Circular No. A-123 reviews that affect their DATA Act submissions. OMB Circular No. A-123 provides a methodology for agency management’s reporting on internal controls over reporting, and it also establishes an assessment process based on our Standards for Internal Control in the Federal Government that management must implement in order to properly assess and improve internal controls over operations, reporting, and compliance. Twenty of the 27 agencies that responded to our survey described useful practices in working with an SSP on DATA Act submissions. These agencies reported most often that discussing issues with the SSP and performing data reconciliations or comparisons were helpful. For example, 12 agencies reported that working and communicating with the SSP was useful. They also reported that having a readily available point of contact for better communication and communicating early about the need to complete the DATA Act submission helps to resolve any concerns prior to the due date. One agency reported that it conducts weekly meetings with its SSP to discuss key topics, including implementation, data quality, and reporting processes and procedures. Eleven agencies reported that conducting data reconciliations or comparisons, and creating a standard operating procedure to ensure that their data are consistently reviewed, reconciled, corrected, and certified, was also useful. One agency noted that in addition to the quarterly files that require certification, the SSP also provides monthly files that the agency can review to provide additional time to correct any identified errors. These 20 agencies also suggested other practices for successfully working with an SSP on DATA Act submissions, such as automating reconciliations and other internal control processes to increase efficiency, implementing continuous training and monitoring, assigning an accountant as an agency contact, and conducting an analysis of agency risk as recommended in the Data Quality Playbook. One agency reported that it performs extensive comparisons of agency-generated data reports to SSP-prepared data files, and that it partially automated this process to help increase efficiency. Nine of the 16 agencies that identified challenges associated with using an SSP reported that their agencies need to take additional steps to address their identified challenges. Some of these agencies reported that they still need to address issues such as correcting data and improving communication with their SSPs. These agencies also reported the need to negotiate annual service-level agreements with their SSPs to address resource and competing priority concerns. One of these agencies reported that it continues to work with its SSP to understand what is lacking in the process of correcting PIID information for obligations. A few agencies reported the need to develop internal guidance on topics such as data quality plans per OMB guidance and a reconciliation process to address their data quality challenges. Finally, one agency reported that it is in the process of hiring additional personnel to address its challenges with competing priorities. While customer agencies are primarily responsible for the quality of their DATA Act submissions, six of the 16 agencies that reported challenges reported that their SSPs also need to take certain steps to address identified challenges, such as communicating with the customer agency and making technology improvements. For example, one agency reported that its SSP does not provide the customer agency with updated data submission files after the agency has requested changes. The customer agency suggested that the SSP provide updated files more often to help the agency ensure that the changes are included in the final file it submits to the Broker. Another agency reported that its SSP has been experimenting with different methods to eliminate cross-file warnings and errors in File C that need to be addressed. Five of the 27 customer agencies we surveyed reported that additional tools or guidance from OMB, Treasury, or other entities (such as the SSP) could assist agencies with using an SSP for DATA Act submission. Specifically, three agencies reported that they would like to have guidance, including standard operating procedures, for communicating and working with their SSPs. One agency suggested additional OMB or Treasury training on compliance with the DATA Act, and one agency suggested improvements by Treasury to prevent Broker errors that result from normal business scenarios and require manual work-arounds to the agencies’ system-generated files. OMB staff told us that they are involved with the DATA Act Executive Steering Committee, working closely with Treasury to oversee all aspects of both policies and implementation related to federal spending transparency efforts. According to OMB staff, neither the SSPs nor their customer agencies have reported any current challenges with DATA Act submissions to OMB. OMB staff stated that effective implementation of OMB Memorandum M-18-16 guidance to agencies and SSPs, which discusses establishing entity-level controls related to using SSPs, would help to ensure that the SSPs provide quality services. In April 2019, OMB issued Memorandum M-19-16 on shared services, which among other things described the process and desired outcomes for shared services and established a governance and accountability model for achieving them. For example, as it relates to the DATA Act, the memorandum calls for the Shared Services Governance Board to leverage the DATA Act Executive Steering Committee’s work on DATA Act standards. Treasury officials told us prior to our survey that they held two workshops for SSPs in the early stages of implementation to address specific concerns and questions on DATA Act implementation. Treasury officials stated that the only challenge reported by SSPs to the department related to linking and certifying award data using the Broker when the awarding agency and the file C reporting agency were different. To address this concern, Treasury added clarification in guidance on files A, B, and C submissions and a new Broker feature allowing agencies to specify whether the award data submitted in Files D1 and D2 comes from the funding agency or the awarding agency. We provided a draft of this report to OMB; Treasury, including ARC; ESC; PFS; and IBC for comment. OMB, ESC, and IBC told us that they had no comments on the draft report. Treasury and PFS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Director of the Office of Management and Budget, the Secretary of the Treasury, the four federal financial management shared service providers, and interested congressional committees and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-9816 or rasconap@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. The Digital Accountability and Transparency Act of 2014 (DATA Act) requires us to review Office of Inspector General (OIG) reports and issue reports of our own assessing and comparing the completeness, timeliness, accuracy, and quality of the data that federal agencies submit under the act and the implementation and use of data standards. We issued our first report on data quality in November 2017, as required. In July 2018, we issued a report on our review of OIG reports on agencies’ first DATA Act submissions and in the course of our review found that some OIGs reported challenges involving the use of federal shared service providers (SSP) that helped agencies implement the DATA Act. For this report, our objectives were to describe (1) the types and variations of services that the federal SSPs provide to their financial management customer agencies to assist them in implementing the DATA Act and meeting the act’s requirements and (2) any challenges that federal SSPs and their financial management customer agencies have encountered in their efforts to ensure the quality of data submissions consistent with the standards established under the DATA Act and the steps they have taken to address those challenges. To address our first objective, we interviewed four federal SSPs and surveyed their financial management customer agencies to identify the types and variations of services the SSPs provide related to DATA Act implementation and meeting the act’s requirements. We also obtained and reviewed selected service-level agreements executed between the four SSPs and their financial management customer agencies to determine the types and variations of DATA Act services that the SSPs provided to them. In December 2018, we emailed a survey questionnaire to 67 customer agencies that the four federal SSPs told us were external customers for DATA Act or other financial management services and that also submitted data under the DATA Act as of December 2018. During the survey, we determined that 60 of those 67 agencies actually received DATA Act services from a federal SSP and were eligible members of our study population. We received survey responses from 31 agencies by our January 2019 deadline and, based on our review, determined that 27 were eligible and sufficiently complete for our purposes. After excluding ineligible agencies from our population, the response rate was 45 percent. In developing, administering, and analyzing the survey, we took steps to minimize the five types of potential errors, described below, that may affect survey results. Because we surveyed all agencies in our population, there was no sampling error. To minimize the effects of coverage error—the exclusion of some eligible members of the population, or inclusion of ineligible members—we identified as ineligible and removed seven initially identified agencies because we determined that they did not use a federal SSP to provide DATA Act services. Measurement error may result from differences in how a question is interpreted and the sources of information available to respondents. To help prevent measurement error, we conducted pretests of the draft questionnaire with four customer agencies, each using a different SSP, and made revisions to improve the validity and minimize the burden of responding to our questions. Nonresponse error may result when a survey fails to capture information from all agencies selected in the survey, and it may introduce bias if those agencies that did not respond would have given materially different answers than those that did. To maximize survey response, we sent multiple email reminders to the surveyed agencies and extended the submission deadline. While we do not have evidence of material bias from those not responding, we limit our survey results in this report as representing only those 27 agencies responding. Finally, to limit the possibility of processing error, survey responses were checked for invalid or illogical answer patterns, and data edits were made as necessary to facilitate processing and analysis of the results. This analysis was verified by a separate data analyst. Table 1 lists the 27 customer agencies (by shared service provider) for which we obtained, reviewed, and included customer agency survey responses. The survey questions and summarized results are shown in appendix II. To meet our second objective, we interviewed the officials of the four federal SSPs prior to our survey to obtain information on the challenges the SSPs and their customer agencies encountered and steps taken to address them. We reviewed and analyzed the 27 customer agency survey responses to identify challenges responding agencies reported since their initial DATA Act submissions because they are working with an SSP and any steps SSPs and their financial management customers took to address challenges and to help ensure the quality of data submissions. We did not corroborate the customer agencies’ survey responses with the four federal SSPs, Office of Management and Budget (OMB), or Department of the Treasury (Treasury). To identify steps taken to address challenges, we also obtained and reviewed any reports related to DATA Act implementation that the SSPs or their respective OIGs produced. In addition, we interviewed OMB staff and Treasury officials about any guidance they have provided or actions they have taken to assist the four SSPs and their financial management customers with any challenges related to DATA Act compliance. We conducted this performance audit from July 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. United States Government Accountability Office Survey of Customer Agencies’ Use of Shared Service Providers for Digital Accountability and Transparency Act (DATA Act) Submissions This questionnaire asks about your agency’s use of and relationship with your federal shared service provider (SSP). It should be completed by officials knowledgeable about the DATA Act services your federal SSP provides. Please submit only one survey response per agency, but consult with other officials as needed; when answering, please consider any agency component activity and experiences together, and answer at the agency level to the best of your ability. If your agency uses more than one federal SSP, please be sure to include information about both SSPs in your answers. This is a fillable PDF form. You can click buttons and type into highlighted boxes throughout the form; the boxes will accommodate more text than is immediately visible. Save this file to a drive now, and save your answers periodically as you go. When completed, save this file and email it to DATAActImplementation@gao.gov. If a “Submit” button appears in the upper right corner of your screen, you may also use that to automatically email your completed questionnaire (some viewers will not see this button depending on your system’s Javascript settings). If you have any questions, or feel this questionnaire was sent to your office in error, please contact 1. What is the name of the person completing this questionnaire, title, agency name, and contact information? (Please submit only one survey response per agency) 2. What is the name and title of the individual who reviews and certifies your agency’s DATA Act submission in the Treasury broker as ready for publishing? a. Is this person also your agency’s DATA Act Senior Accountable Official (SAO)? 3. Which federal SSP(s) (if any) does your agency currently use for the financial management services listed below? (Select all that apply) 4. Which specific DATA Act services/activities does the federal SSP(s) identified in question 3 perform for your agency (in whole or in part)? (Select all that apply) Finalize the files in the Treasury broker by clicking the “Certify and Publish” button after receiving agency certification Other SSP services or activities (specify in the box below) 5. Which, if any, of the following activities does the federal SSP(s) you identified above initiate for your agency (in whole or in part) for the broker to perform? (Select one answer in each row) 6. What are the steps taken by your agency to certify the final DATA Act files before they are published (e.g., by whom and how are the data validated, reviewed, and comments (if any) provided on the files)? Summary included in report 7. Since your agency’s initial DATA Act submission, has your agency experienced any challenges in the following areas because it is working with an SSP, and did the challenge(s) in working with the SSP have an impact on the timeliness, completeness, and accuracy of any of your agency’s submissions? (Select all the area(s) with challenges and any impacts that apply) Technology issues Including challenges with developing and submitting required files, and SSP infrastructure issues such as integrating multiple existing and disparate financial and management systems, or the SSP needing to install new systems or modify existing systems to implement the DATA Act. Dependencies Agency submission activities depend on relationships with or actions being taken by the SSP before the agency can proceed. Guidance Incomplete, unclear, missing, and evolving guidance related to the SSP implementing requirements and broker changes, including data elements, the technical schema, and other key policies issued by OMB and Treasury. Resources Lack of funding or human resources by your agency or SSP. Project management Challenges related to the SSP’s project or program management, such as lack of a designated project manager and inadequate documentation of progress made or key decisions. Data quality Issues related to meeting DATA Act requirements for data quality because of the use of an SSP, including completeness and accuracy of agency data to be reported, as well as Senior Accountable Official certification and reporting of nonfinancial data elements. Competing priorities Statutory, regulatory, policy or other matters that have competing priorities or conflicting requirements that may affect an agency or their SSP’s DATA Act submission process. Challenge? Contract Management Challenges related to the management of the Service Level Agreement (SLA) and/or tasks and services that the SSP provides for the customer agency or the SSP should be providing but are not in the SLA. Other challenges (specify in box below) 8. What were the specific challenge(s) with your agency’s DATA Act submissions identified in question 7, and how did your SSP play a role? If your agency used multiple SSPs, please specify to which provider the challenge(s) was related. a. What steps, if any, has your agency taken to address these challenge(s)? b. What steps, if any, remain to be taken by your agency to address these challenge(s)? c. What steps, if any, are you aware of that your SSP has taken to address these challenge(s)? d. What steps, if any, remain to be taken by your SSP to address these challenge(s)? Summary included in report 9. What management or oversight practices has your agency found to be useful in working with your SSP on DATA Act submissions? 10. What internal control processes and activities does your agency use to provide assurance over the quality of data submitted to the Treasury broker and displayed on USAspending.gov? Internal control processes and activities: Reconcile data files to other agency data and sources (e.g., SF 133, GTAS) Review SSP’s Statement on Standards for Attestation Engagements No. 18/Service and Organization Controls (SOC) reports to identify any internal control deficiencies. (Describe internal control deficiencies related to DATA Act submissions, if any, in box below) Implement complementary controls to address SSP control deficiencies identified in the SOC report. (Describe controls implemented, if any, in box below) Review/verify agency data displayed on USAspending.gov Incorporate the results of A-123 reviews that have an impact on DATA Act Other internal control processes or activities (specify in box below) 11. What additional tools or guidance, if any, are needed from OMB, Treasury, or others to assist with your agency’s use of the SSP or DATA Act submission? 12. Please provide any additional comments or explanations not already discussed above. Please save and e-mail your responses to DATAActImplementation@gao.gov. Thank you for completing our questionnaire! In addition to the contact named above, Michael LaForge (Assistant Director), Laura Pacheco (Auditor in Charge), Umesh Basnet, Thomas Hackney, Roy Kilgore, and Diane Morris made major contributions to this report. Other key contributors include Dave Ballard, Jenny Chanley, Peter Del Toro, Patrick Frey, Ricky Harrison, Maxine Hattery, Jason Kelly, James Kernen, Christina Quattrociocchi, Carl Ramirez, Michelle Sager, and James Sweetman. DATA Act: OMB Needs to Formalize Data Governance for Reporting Federal Spending. GAO-19-284. Washington, D.C.: March 22, 2019. Streamlining Government: OMB and GSA Could Strengthen Their Approach to Implementing a New Shared Services Plan. GAO-19-94. Washington, D.C.: March 7, 2019. Open Data: Treasury Could Better Align USAspending.gov with Key Practices and Search Requirements. GAO-19-72. Washington, D.C.: December 13, 2018. DATA Act: Reported Quality of Agencies’ Spending Data Reviewed by OIGs Varied Because of Government-wide and Agency Issues. GAO-18-546. Washington, D.C.: July 23, 2018. DATA Act: OMB, Treasury, and Agencies Need to Improve Completeness and Accuracy of Spending Data and Disclose Limitations. GAO-18-138. Washington, D.C.: November 8, 2017. DATA Act: As Reporting Deadline Nears, Challenges Remain That Will Affect Data Quality. GAO-17-496. Washington, D.C.: April 28, 2017. DATA Act: Office of Inspector General Reports Help Identify Agencies’ Implementation Challenges. GAO-17-460. Washington, D.C.: April 26, 2017. DATA Act: Implementation Progresses but Challenges Remain. GAO-17-282T. Washington, D.C.: December 8, 2016. DATA Act: OMB and Treasury Have Issued Additional Guidance and Have Improved Pilot Design but Implementation Challenges Remain. GAO-17-156. Washington, D.C.: December 8, 2016. DATA Act: Initial Observations on Technical Implementation. GAO-16-824R. Washington, D.C.: August 3, 2016. DATA Act: Improvements Needed in Reviewing Agency Implementation Plans and Monitoring Progress. GAO-16-698. Washington, D.C.: July 29, 2016. DATA Act: Progress Made but Significant Challenges Must Be Addressed to Ensure Full and Effective Implementation. GAO-16-556T. Washington, D.C.: April 19, 2016. DATA Act: Data Standards Established, but More Complete and Timely Guidance Is Needed to Ensure Effective Implementation. GAO-16-261. Washington, D.C.: January 29, 2016. DATA Act: Progress Made in Initial Implementation but Challenges Must be Addressed as Efforts Proceed. GAO-15-752T. Washington, D.C.: July 29, 2015.", "summary": "Over the past 2 decades, the federal government has undertaken efforts to save money and increase efficiencies by encouraging agencies to use administrative and operational services and processes that other federal and external parties provide, commonly referred to as shared services. The DATA Act was enacted to increase accountability and transparency and, among other things, establish government-wide data standards. Certain agencies have used shared services of federal SSPs to implement the act. The act also requires a series of oversight reports by agencies' Offices of Inspector General (OIG) and GAO. OIGs for five agencies have made recommendations related to agencies' use of SSPs for DATA Act services, and four agencies concurred with the recommendations. The objectives of this report are to describe (1) the types and variations of services that federal SSPs provide to their financial management customer agencies to assist them with implementing the DATA Act and meeting the act's requirements and (2) the challenges federal SSPs and their financial management customer agencies have encountered in their efforts to ensure the quality of data submissions consistent with DATA Act standards and steps they have taken to address those challenges. To address these objectives, GAO interviewed staff at four federal SSPs, OMB, and Treasury; reviewed selected agreements between the SSPs and their customer agencies; conducted a survey of customer agencies from December 2018 to January 2019; and analyzed the survey responses. GAO found that the 27 agencies that responded to its survey use federal shared service providers (SSP) for a variety of services, including financial system hosting, general ledger accounting, financial reporting, and various Digital Accountability and Transparency Act of 2014 (DATA Act) services. Sixteen of the 27 SSP customer agencies reported that they experienced challenges associated with using an SSP, many of which affected the timeliness, completeness, or accuracy of agency DATA Act submissions. Ten of these agencies experienced challenges with depending on an SSP to take actions before the agency could proceed. Agencies responding to GAO's survey also reported other challenges, such as a lack of guidance from the Office of Management and Budget (OMB) and the Department of the Treasury (Treasury), limited customer agency and SSP resources, SSP errors affecting data quality, and inadequate SSP project management activities. Twelve of these 16 agencies stated that they are taking steps to address these challenges—such as increasing communication with their SSPs, making technology improvements, and performing manual work-arounds to reconcile and correct data files. Nine agencies reported remaining additional steps, for example, correcting data errors and developing a reconciliation process and internal guidance on topics such as data quality plans. While agencies are primarily responsible for the quality of DATA Act submissions, five agencies also reported that their SSPs had taken similar steps to address identified challenges. Twenty of the 27 agencies described useful practices for working with SSPs on DATA Act submissions, including the agency discussing issues with the SSP and obtaining data files from the SSP each month to provide additional time to correct any identified errors. Treasury officials stated prior to GAO's survey that they held workshops for SSPs in the early stages of DATA Act implementation and clarified guidance issued in June 2018 to specifically address their concerns and questions. After GAO's survey, in April 2019, OMB issued a memorandum on shared services that among other things described the process and desired outcomes for shared services and established a governance and accountability model for achieving them.", "document_type": "gao"}
{"report": "Alaska’s location makes the United States an Arctic nation. Alaska has over 6,000 miles of coastline, and is bordered by the Beaufort, Chukchi, and Bering Seas; the Arctic Ocean; and the Bering Strait, whose jurisdiction is divided between the United States and Russia (see fig. 1). According to the 2010 Census, the U.S. Arctic coastal regions are home to about 26,000 people, including the cities of Nome, located near the Bering Strait, and Utqiagvik (formerly Barrow), the northernmost city in the United States. The U.S. Arctic coastal region is sparsely populated even by the standards of Alaska, which has the lowest population density of any state in the nation. Specifically, this region accounted for about 4 percent of Alaska’s total population of approximately 710,000 according to the 2010 Census. Alaska is also the largest state in the nation, and— given its size, terrain, environment, and population distribution—its transportation system is unique. Much of Alaska’s rail and highway infrastructure is located in the south central part of the state, and many U.S. Arctic cities and villages are accessible only by air or water. As Arctic waterways become more accessible due to declining sea ice, opportunities have increased to use maritime transportation to bring natural resources to market. The U.S. Arctic remains a frontier economy; many of its products and much of the value of commercial activities derive from natural resources. According to an assessment of undiscovered but technically recoverable oil and gas resources by the Bureau of Ocean Energy Management, the outer continental shelf regions of the U.S. Arctic’s Chukchi and Beaufort Seas contain about 24 billion barrels of oil and about 105 trillion cubic feet of natural gas. The U.S. Arctic also contains $1 trillion worth of minerals, such as zinc, nickel, and lead. The extraction of these natural resources presents technical challenges and requires large financial investments given the Arctic environment. Although warming over the past decades has made trans-Arctic maritime routes more accessible, Arctic sea ice extent remains seasonal, with most shipping occurring during a narrow window extending from summer to early fall. Arctic sea ice typically reaches its maximum extent in March and its minimum in September each year; as a result, the shipping season is typically from June through October. The minimum sea ice extent in September 2019 was tied with 2007 and 2016 as the second lowest on record since satellite observations began in 1979; the 13 lowest extents in the satellite record have all occurred in the last 13 years. As shown in figure 2, the September (minimum) sea ice extent in 2019 had a much smaller coverage area than the median September extent from 1981 to 2010. This contraction of sea ice over time has increased accessibility to the two key trans-Arctic maritime routes: the Northwest Passage (NWP) through the Canadian archipelago, and the Northern Sea Route (NSR) along the northern border of Russia. These two routes enable shipments between non-Arctic destinations, such as between Asia and Europe. However, most traffic in the U.S. Arctic is destinational, meaning it transports goods to and from the U.S. Arctic. Such traffic includes transporting natural resources extracted from the U.S. Arctic to the global marketplace and shipping supplies to U.S. Arctic communities. Maritime shipping in the U.S. Arctic involves challenges, given that the region lacks many of the typical elements of a maritime transportation system. See table 1 for examples of the types of maritime infrastructure gaps that CMTS and federal agencies have reported in the U.S. Arctic. Many federal agencies are involved with, and have a role in, U.S. Arctic maritime shipping and infrastructure (see table 2). Although these agencies’ missions are not specifically tied to the U.S. Arctic, they extend to the U.S. Arctic like any other geographic region of the country. Other state, local, and international organizations also play a role. For example, the state of Alaska’s Department of Environmental Conservation is involved with oil spill response. In addition, the North Slope Borough, a municipal government that encompasses an area of nearly 95,000 square miles along Alaska’s northern coast, has a search and rescue department that provides airborne emergency response. Alaska Native organizations represent communities that have inhabited the Arctic region for thousands of years and have cultures that are particularly sensitive to environmental changes, since they rely on hunting animals such as whales, seals, and walruses. To represent local concerns, the Arctic Waterways Safety Committee, which is comprised of subsistence hunters and others, was created in October 2014 to develop best practices for safe and efficient use of Arctic waterways. Alaska Native Corporations are private entities that manage land and assets on behalf of Alaska Natives. Lastly, international forums such as the Arctic Council and international organizations such as the IMO also have a role in establishing Arctic maritime policies and regulations. For nearly 50 years the U.S. government has articulated its interest in the Arctic through a series of strategies. For example, in 1971 a then- classified memo from National Security Council (NSC) under the Nixon Administration called for the sound and rational development of the Arctic, guided by the principles of minimizing adverse environmental effects, promoting international cooperation, and protecting security interests, including the preservation of the freedom of the seas. These same priorities, along with promoting scientific research, were underscored by the Reagan Administration in 1983. In January 2009, the George W. Bush Administration issued an Arctic Region Policy, which outlined priorities for maritime transportation in the Arctic including to facilitate safe, secure, and reliable navigation and protect maritime commerce and the environment. More recently, the Obama Administration issued a National Strategy for the Arctic Region (National Strategy) in May 2013, which identified three goals for the region: to advance U.S. security interests, pursue responsible stewardship, and strengthen international cooperation. Subsequent implementation plans for the National Strategy indicated maritime shipping and infrastructure fell under all three of these stated goals. For example, “preparing for increased activity in the maritime domain” fell under advancing U.S. security interests, “charting the Arctic region” fell under pursuing responsible stewardship, and “promoting waterways management” fell under strengthening international cooperation. As federal strategies related to the Arctic region have evolved over the years, so have the interagency groups to implement and guide these efforts. Interagency activity in the U.S. Arctic has historically been coordinated through the NSC, including the 1971 and 1983 strategies. In 1984, legislation established the U.S. Arctic Research Commission as well as the Interagency Arctic Research Policy Committee (IARPC). More recently, to enhance coordination of national efforts in the Arctic, particularly those related to the 2013 National Strategy, a 2015 Executive Order established the interagency Arctic Executive Steering Committee (AESC). AESC is chaired by the Director of the Office of Science and Technology Policy (OSTP), which is an office within the White House that leads interagency science and technology policy coordination efforts. AESC also includes NSC as a member, along with 20 other federal departments and entities. The 2016 National Strategy Implementation Framework assigned portions of the strategy’s areas of focus to interagency groups; specifically, NSC was assigned responsibility for advancing national security interests, OSTP for pursuing responsible stewardship, and the Department of State for strengthening international cooperation. The U.S. Committee on the Marine Transportation System (CMTS), which was required in 2010 to coordinate the establishment of domestic transportation policies in the Arctic to ensure safe and secure maritime shipping, has issued several relevant reports, including a 10-year projection of maritime activity in 2015, and a 10-year prioritization of infrastructure needs in the U.S. Arctic in 2016—both of which were directed by the 2014 National Strategy implementation plan. More recently, CMTS issued a 2018 report revisiting its 2016 near-term recommendations for prioritizing infrastructure needs in the U.S. Arctic and a 2019 update to its projections of Arctic maritime shipping activity from 2020 to 2030. These and other reports addressing maritime infrastructure in the U.S. Arctic are listed in appendix I. U.S. Coast Guard data indicate the number of vessels in the U.S. Arctic increased from 2009 through 2019 (see fig. 3). The types of vessels the U.S. Coast Guard tracks in the U.S. Arctic includes vessels conducting marine scientific research; tugs that provide communities with supplies; and adventurer vessels such as private yachts. U.S. Coast Guard data also include bulk cargo vessels from the Red Dog mine, one of the largest zinc mines in the world. The mine trucks its zinc ore to a facility on the Chukchi Sea, where it is stored for maritime transport during the shipping season. The U.S. Coast Guard District responsible for the U.S. Arctic counts more types of vessels in its area of interest—such as research, tug, and adventurer—than are typically counted for the purposes of tracking commercial shipping. Even at its peak, maritime shipping in the U.S. Arctic remained limited compared to global commercial shipping, although CMTS recently reported that the number of flag states, or countries where vessels are registered, has increased. Specifically, the 307 vessels in the U.S. Arctic in 2019 represented a small portion of the total number of shipping vessels operating globally. For comparison, according to the United Nations Conference on Trade and Development, in 2015 the world fleet of commercial shipping vessels was approximately 89,000. However, in its 2019 traffic projections report, CMTS analyzed U.S. Coast Guard data and other data sources and found that between January 2015 and December 2017, the number of flag states in the U.S. Arctic increased. CMTS noted this indicates a shift away from regionally focused operators toward a more diverse and international set of operators. CMTS found that the majority of vessels were flagged to the United States (about 41 percent) or Russia (about 24 percent) over this time period, with the remaining 35 percent from 35 other flag states, each with a considerably smaller percentage than the United States or Russia. Given that a single vessel can make multiple trips per shipping season, U.S. Coast Guard also measures maritime activity by the number of transits that vessels make per year through the Bering Strait, a key convergence point for trans-Arctic routes that connects the NWP and NSR to the Pacific Ocean. According to U.S. Coast Guard data, the number of transits through the Bering Strait has ranged from as few as 280 in 2009, to as many as 514 in 2015 (see fig. 4). There were far fewer transits through the Bering Strait than through some other convergence points for established major maritime transportation routes that have more developed maritime infrastructure. For example, the number of transits through the Panama Canal, which like the NWP connects the Atlantic and Pacific Oceans, was almost 14,000 in 2018 and the number of vessels that transited the Suez Canal, which like the NSR enables shipping between Asia and Europe, was over 18,000. Stakeholders told us that along with factors such as demand that shape shipping trends worldwide, factors unique to the Arctic also play a role, such as potential cost savings due to shorter routes; additional operating costs incurred by Arctic-capable ships; environmental hazards like unpredictable weather and sea ice; and a lack of maritime infrastructure typically found along shipping routes. The 20 stakeholders we interviewed representing the shipping industry, research institutions, and state, local, and Alaska Native groups among others, described the following factors that affect U.S. Arctic maritime shipping. As mentioned earlier, diminished sea ice has presented opportunities for maritime shipping of natural resources extracted from the Arctic, such as oil, gas, and minerals. However, such activities decreased domestically after Royal Dutch Shell, PLC (Shell) discontinued its offshore oil and gas exploration of the Burger prospect in Alaska’s Chukchi Sea in 2015. As shown in figure 4, the number of transits in the Bering Strait steadily declined from 514 in 2015 to 369 in 2018. Specifically, CMTS reported that Shell demobilized its drill ship, anchor handling vessels, and anti- pollution ships from the study area prior to the start of the 2016 shipping season. One stakeholder said there was a reduction in the number of seasonal transits after Shell suspended exploration activities, since Shell had previously accounted for more than a hundred transits through the Bering Strait. Other traffic related to domestic natural resource extraction stayed at consistent levels. Specifically, representatives from the Red Dog zinc mine reported that from 1999 to 2019 they consistently shipped between 21 and 26 cargo vessels per year, averaging 24 vessels per year over the 20-year period. Meanwhile, several stakeholders said international activities related to natural resource development, particularly in the Russian Arctic, have recently increased, and that Russia has been investing heavily in Arctic infrastructure. The U.S. Coast Guard attributed increased cargo traffic levels in 2016 to construction projects in the Russian Arctic, particularly a liquefied natural gas (LNG) facility on the Yamal peninsula (see fig. 3 above). In 2017, a Russian LNG tanker, the Christophe de Margerie, became the first ship to transit the NSR without being accompanied by an icebreaker. Demand for tourism cruises in the U.S. Arctic has increased slightly recently. A representative from an Arctic cruise industry association told us that the overall cruise industry worldwide grows 5 to 10 percent a year and that there is growing demand for expedition cruises to farther-flung areas like the Arctic. In both 2016 and 2017, the cruise ship Crystal Serenity transited the NWP with over a thousand passengers on board. Stakeholders noted that cruise ship voyages in the U.S. Arctic, such as the Crystal Serenity voyages, raised concerns for passenger safety given the lack of infrastructure, particularly for search and rescue. However, according to an Arctic cruise industry association representative, the number of smaller ships purpose-built for Arctic conditions is growing; the association estimates 25 to 30 such vessels are under construction. Domestic and foreign research vessels have also increased in number in the U.S. Arctic due to greater interest in the region’s changing environment. For example, according to National Science Foundation officials, their polar-capable vessel Sikuliaq entered service in 2016. Internationally, China has increased its activity in the Arctic since gaining observer status on the Arctic Council in 2013 and now operates two icebreaking research vessels. One stakeholder said that such investments by countries such as China may be the first step towards achieving longer-term economic goals for those countries. Trans-Arctic routes can reduce travel time between certain destinations compared to traditional routes and may therefore reduce fuel and labor costs. For example, the route from Shanghai, China, to Northwestern Europe via the NSR is 27 percent shorter than via the Suez Canal. The operators of the Russian LNG tanker that transited the NSR in 2017, the Christophe de Margerie, reported they completed the journey in 19 days, 30 percent faster than the Suez Canal. For reasons such as these, according to news reports, Russia has announced plans to develop the NSR and ship 80 million tons of goods through the route by 2024. Similarly, an official from a Canadian ship owner and operator told us that, depending on the vessel’s origin and destination, using the NWP can be 10-15 days faster than using the Panama Canal, resulting in a cost savings of $100,000 to $150,000. Although trans-Arctic routes have the potential for cost savings due to shorter distances, they require additional investments not necessary for traditional routes that may offset those savings. For example, representatives of one carrier said Arctic-capable ships cost three to four times more than ordinary ships because they require more steel and higher power output to withstand ice conditions. The additional steel also limits the amount of cargo the vessel can carry; representatives from another carrier noted every ton of steel used to construct the ship is a ton of cargo that the ship cannot carry in order to recoup expenses. The size of vessels that can safely operate in the region is also constrained by draft limitations that specify the maximum weight and size at which ships can navigate the shallow waters of the Arctic. By contrast, the trend among ocean carriers over the past decades, which have capitalized on advances in fuel-efficient engine technology, is toward constructing increasingly larger vessels to capture economies of scale. In addition, stakeholders told us that shippers operating in the Arctic must invest in special onboard equipment and prepare for contingencies due to the lack of maritime infrastructure usually found in traditional routes, such as deep-draft ports, harbors of refuge, reliable communications, and search and rescue infrastructure. Stakeholders noted Arctic voyages also require additional training for crew members on navigating in ice conditions. Shippers must determine whether the cost savings obtained from shorter trans-Arctic routes outweigh the additional operating expenses. For example, although Maersk, one of the largest shipping companies in the world, successfully completed a trial passage of a container ship through the NSR in September 2018, the company emphasized at the time that the transit was a “one-off trial designed to gain operational experience in a new area and to test vessel systems” and that it did not view the route as a commercially viable alternative to existing routes. In a press release, Maersk noted that the NSR was only feasible for around 3 months a year and required the use of more costly ice-classed vessels. Despite this, news reports in June 2019 indicate Maersk is exploring sending more goods through the NSR in cooperation with a Russian icebreaker company in response to demand for the transport of goods from Asia to West Russia. Although diminished sea ice has prolonged the shipping season and opened up shipping routes, environmental changes have also resulted in less predictable conditions, such as more volatile weather and sea ice. One stakeholder involved with Arctic research noted that the conditions that have led to open waters can also lead to harsher conditions such as strong low pressure systems, gale force winds, and storms. Such conditions pose challenges for shipping—one shipper representative said that it is difficult to load barges in shallow waters and that typically loading and unloading activities have to be suspended with swells above 3 feet. In addition, stakeholders told us variation in ice conditions from year to year makes planning Arctic voyages difficult to do with reasonable accuracy. For example, while warming trends might suggest that overall sea ice diminishes further each year, one carrier representative noted its vessel encountered severe ice conditions in June 2018. This representative noted that diminished overall ice coverage can lead to localized conditions with more mobile and older ice migrating into shipping lanes. The unpredictable and harsh weather and ice conditions, combined with the vast distances and lack of maritime infrastructure, pose safety risks. For example, according to stakeholders, the “tyranny of distance” in the Arctic stretches the limited search and rescue capabilities, resulting in slow incidence response. Furthermore, a lack of a designated harbor of refuge means vessels do not have a place to moor safely in case of emergency. As a result, a representative from the International Union of Marine Insurance noted that in the Arctic even a minor incident, such as a small engine failure, can result in substantial damages and even loss of life. Some stakeholders we interviewed expressed concerns about impacts of shipping on wildlife, including the species that Alaska Natives rely on for food. One stakeholder noted that awareness has grown in the past 10 years of the environmental impact of shipping. Such impacts include emissions containing sulphur oxide and black carbon from ships’ engines that could damage the fragile Arctic ecosystem. As a result of such environmental concerns, the IMO is currently considering a ban on heavy fuel oil in the Arctic. In addition, in 2019 several major carriers, including CMA CGM, Hapag-Lloyd, and Mediterranean Shipping Company, announced they would not pursue trans-Arctic shipping. Furthermore, in 2019 Nike and Ocean Conservancy launched the Arctic Corporate Shipping Pledge, a voluntary commitment by consumer goods and shipping logistics companies to not send ships through the Arctic. The pledge also supports precautionary Arctic shipping practices to enhance the environment and human safety, which may include a heavy fuel oil ban and an evaluation of low impact shipping corridors that protect important ecological and cultural areas. A representative of one carrier we spoke with said a heavy fuel oil ban in the Arctic could increase the cost of transporting cargo and, as a result, severely impact shipping in the region. While agencies have taken actions to address maritime infrastructure gaps, federal efforts lack (1) a government-wide assessment of risks posed by gaps in maritime infrastructure, (2) a current government-wide strategy for addressing maritime infrastructure that includes goals, performance measures, and appropriate responses to prioritized risks, and (3) an interagency mechanism and consistent leadership to guide agency actions related to maritime infrastructure. Without these elements, federal agencies may lack information on which to base decisions and prioritize actions, assurance that their investments are directed to prioritized risks, and the ability to demonstrate progress in addressing maritime infrastructure. Furthermore, agencies may miss opportunities to work together and leverage resources towards achieving broader outcomes. Agencies have taken some actions since 2013, when CMTS first reported on gaps in U.S. Arctic infrastructure. For example, U.S. Coast Guard reported that it has taken a flexible approach to addressing infrastructure gaps by establishing seasonal, forward operating bases in the U.S. Arctic as needed to provide search and rescue support in areas where major shipping activity is occurring. See table 3 for selected examples of agency actions. Although federal agencies have taken some steps to address gaps in U.S. Arctic infrastructure, those efforts are not based on a government- wide assessment of the economic, environmental, and safety risks posed by maritime infrastructure gaps to inform investment decisions in the U.S. Arctic. Rather, agency officials said that they currently base Arctic infrastructure decisions on their agency-specific missions, strategies, and collaborative efforts. Specifically, agency officials said that securing the resources to address U.S. Arctic infrastructure is challenging because such projects must compete with other established agency mission areas. For example, officials told us that infrastructure investments may not compete as well against other agency-established priorities in other parts of the country, in part, because the Arctic is an emerging region and because of the considerable costs of developing infrastructure in the harsh Arctic environment. Leading management practices we reviewed note the importance of assessing risks in order to select and prioritize countermeasures to prevent or mitigate risks. A 2016 Office of Management and Budget (OMB) circular emphasized the importance of risk assessment and called for agencies to use a structured and systematic approach to identify risks and assess the causes, sources, probability of the risk occurring, and potential outcomes, and then prioritize the results of the analysis. Such an approach can be used by decision makers to evaluate the effectiveness of, and to prioritize, countermeasures relative to the associated costs. Risk management is a widely endorsed strategy for helping policymakers make decisions about allocating finite resources and taking actions in conditions of uncertainty. Such a framework is especially applicable to the U.S. Arctic given the uncertain conditions in the region and safety and environmental risks described above. Without a risk assessment, agencies lack assurance that their investments are addressing the highest-priority risks. In particular, we found that agencies’ actions to address maritime infrastructure gaps were not fully consistent with the areas that the stakeholders we interviewed identified as the most critical (see fig. 5). For example, 11 of the 20 stakeholders we interviewed identified charting Arctic waters as the highest priority to address, and in May 2019 NOAA reported that it had acquired nearly 1,500 square nautical miles of hydrographic survey data in the Arctic over the prior 3 years. This is, however, less than 1 percent of the over 200,000 square nautical miles of waters NOAA has identified as significant to navigation in the U.S. Arctic. In addition, nine stakeholders identified addressing gaps in communications in the U.S. Arctic as a key priority. However, CMTS reports indicate no change in the status of communications capabilities in the U.S. Arctic between 2013 and 2018. CMTS has in the past noted the importance of conducting a risk assessment to inform Arctic decision-making. Specifically, CMTS’s 2013 report noted that greater access to the U.S. Arctic and increased activity presents additional risks for people, vessels, and the environment in the fragile region and that managing that risk requires an in-depth understanding of the issues and trade-offs associated with key decisions. Although CMTS reported that developing an assessment tool that provides a quantifiable level of risk and that accounts for the unique risk elements in the Arctic was a challenge for the nation, it proposed a model for determining risk that considered the likelihood of adverse events actually occurring, vulnerability to damage, and potential consequences. CMTS further stated that, given the rate at which other nations are progressing with Arctic shipping and development, the United States should decide the acceptable degree of risk for Arctic operations. Although CMTS has provided useful information on maritime infrastructure gaps to decision makers and described possible risks to the U.S. Arctic, it has not systematically assessed the risks posed by these gaps. For example, in 2016, CMTS made near-, mid-, and long-term recommendations for addressing maritime infrastructure needs, but noted this ordering was not intended to create a hierarchy of infrastructure needs from most to least important. CMTS officials told us that they have not systematically assessed risks posed by maritime infrastructure gaps in the U.S. Arctic because CMTS’s priorities are established by its member agencies, and that CMTS has not been directed to conduct such an assessment by its members. However, CMTS is required by statute to, among other things, coordinate the establishment of domestic transportation policies in the Arctic to ensure safe and secure maritime shipping and make recommendations with regard to federal policies that impact the marine transportation system. Furthermore, according to CMTS officials, there is nothing in CMTS’s authority that would prevent it from doing a risk assessment. Given its previous reports and work in the U.S. Arctic and its coordinating role with its member agencies, CMTS is well suited to conduct a government-wide assessment of the risks posed by gaps in maritime infrastructure in the U.S. Arctic. For example, CMTS published a traffic projections report in September 2019 that aimed to provide decision makers with a wide-ranging portrait of potential changes in vessel activity in the U.S. Arctic over the next decade. To inform its risk assessment, CMTS can draw on the expertise of its member agencies, such as U.S. Coast Guard and NOAA. For example, U.S. Coast Guard officials told us that they have responded to the unpredictable economic changes in the U.S Arctic—including fluctuations in the level and type of maritime activity in the region—by investing in icebreakers and seasonal forward operating bases, rather than developing permanent infrastructure. In addition, CMTS can also draw on numerous reports discussing maritime infrastructure in the U.S. Arctic that have been published since 2013, as detailed in appendix I. For example, in 2019 the University of Alaska’s Arctic Domain Awareness Center held a series of workshops on the factors that impact the ability of the U.S. Coast Guard and other stakeholders to conduct safe, secure, and effective operations in the Arctic environment. A government-wide risk assessment could better enable agencies to evaluate potential U.S. Arctic infrastructure expenditures and assess the extent to which these expenditures will mitigate identified risks. For example, a report on the U.S. Coast Guard’s Arctic capabilities suggested that a systematic analysis of needs and risks in the U.S. Arctic could help the agency generate momentum for closing Arctic capability gaps. By conducting such a risk assessment, agencies would have better information on which to base decisions for agency expenditures in the U.S. Arctic and prioritize appropriate actions in response to risks. We found that the federal interagency efforts to address U.S. Arctic maritime infrastructure lack a current strategy and consistent interagency leadership to guide agencies’ actions. Although several agencies have developed strategies to guide their own agencies’ efforts, these do not provide government-wide direction or establish current government-wide goals, objectives, and performance measures as leading management practices call for. Moreover, the federal agencies lack clarity on which interagency entity is responsible for guiding federal efforts and providing consistent leadership to ensure government-wide objectives are met. The federal government lacks a current government-wide strategy for addressing U.S. Arctic maritime infrastructure gaps that includes key characteristics, such as goals, objectives, and performance measures, and appropriate responses to risks. Agency officials and stakeholders said the 2013 National Strategy is outdated because conditions in the U.S. Arctic have changed since 2013. In particular, agency officials said national security is a growing concern in the Arctic. OSTP officials agreed that conditions had changed in the Arctic, but could not state whether the 2013 National Strategy was still current. Our past work on interagency collaboration found that written agreements documenting how participating agencies collaborate, such as strategies, are most effective when they are regularly updated and monitored. The changing conditions in the Arctic described above make a current government-wide strategy for maritime infrastructure in the U.S. Arctic particularly important. In our past work, we have reported that complex interagency efforts— such as those to address maritime infrastructure in the U.S. Arctic—can benefit from developing a national strategy. Our prior work has identified key characteristics of national strategies, which we refer to in this report as a government-wide strategy, including: (1) problem definition and risk assessment which addresses the threats the strategy is directed towards; and (2) goals, objectives, and performance measures to gauge and monitor results. Furthermore, our prior enterprise risk management work has noted that risk assessment should include a ranking of risks based on priorities in relation to strategic objectives, and that senior leaders should determine if a risk requires treatment or not based on risk tolerance or appetite. Leaders then review the prioritized list of risks and select the most appropriate response to address the risk. These key characteristics help managers determine the extent of investment needed and facilitate effective targeting of federal resources; this is especially important when multiple agencies are involved, as is the case with maritime infrastructure in the U.S. Arctic. Although several federal agencies have recently updated their Arctic strategies, these agency-specific Arctic strategies are not linked to a current government-wide strategy for the Arctic region and are not specifically focused on addressing Arctic maritime infrastructure gaps. Specifically: U.S. Coast Guard. In April 2019, U.S. Coast Guard published its Arctic Strategic Outlook, which supersedes its 2013 Arctic Strategy. The updated strategy established three lines of effort: (1) enhance capability to operate effectively in a dynamic Arctic domain, (2) strengthen the rules-based order, and (3) innovate and adapt to promote resilience and prosperity. We recommended in 2016 that the U.S. Coast Guard develop measures for assessing how its actions have helped to mitigate Arctic capability gaps and design and implement a process to systematically assess its progress. However, as of February 2020, the U.S. Coast Guard has not implemented these recommendations. U.S. Coast Guard officials state that they are currently developing an implementation plan and Strategic Metrics Framework for the Arctic Strategic Outlook. U.S. Navy. In January 2019, the U.S. Navy published its Arctic strategy, which updated its previous strategy from 2014. The updated strategy included the following strategic objectives: defend U.S. sovereignty and the homeland from attack; ensure the Arctic remains a stable, conflict-free region; preserve freedom of the seas; and promote partnerships to achieve the above objectives. Department of Defense. In June 2019, Department of Defense updated its 2016 Arctic strategy which included the following as part of its approach: (1) building Arctic awareness, (2) enhancing Arctic operations, and (3) strengthening the rules-based order in the Arctic. NOAA. NOAA officials originally told us that they were working to complete an update to NOAA’s strategic plan for the Arctic in 2019. However, as of February 2020, officials told us that this update is currently on hold pending the completion of a new government-wide National Strategy. As mentioned previously, OSTP staff said they could not state whether the 2013 National Strategy was still current, and OSTP provided no additional information as to whether a new strategy was in development. NOAA officials told us that the agency’s current three priorities in the Arctic are (1) weather and water (including weather and water research, observations, and Arctic contributions to global weather monitoring); (2) blue economy (including ocean mapping, seafood competitiveness, tourism, and coastal resilience); and (3) innovative partnerships in Alaska and the Arctic. CMTS has taken some steps to monitor agencies’ progress in addressing maritime infrastructure, but the current lack of performance measures makes it difficult to monitor agencies’ progress over time. We reported in 2014 that CMTS was developing a process to monitor such progress and noted that such monitoring would help agencies develop a shared understanding of current priorities and actions needed. However, while CMTS did issue reports that described the status of maritime infrastructure in the U.S. Arctic in 2016 and 2018, the reports did not include goals or performance measures to assess agencies’ progress. According to officials, CMTS did not develop or include performance measures to monitor agencies’ progress because it does not have the authority to designate agencies’ priorities, and that agencies are best situated to identify priorities in pursuit of their individual missions. Priorities in the U.S. Arctic are currently based on each agency’s mission, which makes it difficult to take a government-wide approach to responding to risks. To improve unity of effort, the U.S. Coast Guard has expressed support for a national approach to Arctic planning in both its 2013 and 2019 Arctic strategies. Without a current government-wide strategy that includes goals and objectives, agencies lack assurance that their investments are directed to prioritized risks. Furthermore, without performance measures, agencies are not able to demonstrate, and decision makers are unable to monitor, the extent to which agency actions have addressed maritime infrastructure gaps. We have previously reported that federal agencies use a variety of mechanisms, including interagency groups, to implement interagency collaborative efforts and that such mechanisms benefit from key features such as sustained leadership and inclusion of all relevant participants, such as stakeholders. We also reported that leadership should be sustained over time to provide continuity for long-term efforts and that having top-level commitment from the President, Congress, or other high- level officials can strengthen the effectiveness of interagency collaborative groups. We also found that lack of continuity is a frequent issue with interagency mechanisms that are tied to the Executive Office of the President, particularly when administrations change, and that transitions and inconsistent leadership can weaken a collaborative mechanism’s effectiveness. In addition, our prior work has noted the importance of ensuring that all relevant participants are included in the collaborative effort, such as participants with the appropriate knowledge, skills, and abilities to contribute. There are many interagency groups involved in the U.S. Arctic, including: AESC was established by Executive Order in 2015 to shape national priorities and set strategic direction in the Arctic. NSC Arctic Policy Coordinating Committee (PCC) is the current interagency forum for executive-level Arctic collaboration, according to agency officials. CMTS is the main forum for collaboration regarding maritime infrastructure according to agency officials. These interagency groups vary in the extent to which they meet the key features noted above. Specifically: Sustained leadership: Both the NSC, which, as mentioned previously, has traditionally played a role in Arctic collaboration dating back to 1971, and the AESC, which was chaired by the OSTP within the White House, would have top-level commitment given their proximity to the White House. However, according to agency officials, the AESC has not met in the past 2 years and is now dormant. OSTP staff told us that they are not aware of any current AESC activities. Meanwhile, although CMTS has been active in the area of U.S. Arctic maritime infrastructure for the past decade, CMTS officials said CMTS does not sit within the Executive Office of the President. As a result, CMTS officials note their role is to facilitate an interagency partnership, share information among member agencies, and provide information to decision-makers to support agencies’ efforts. CMTS’s statutory authority addresses, among other things, the coordination of federal policies that impact the maritime transportation system, including in the U.S. Arctic, rather than the development and execution of government-wide policies. Inclusion of relevant stakeholders: The AESC, when it was active, included a wide range of over 20 federal departments and entities, including those less associated with maritime infrastructure such as the Department of Agriculture. For the NSC Arctic PCC, we were unable to verify the participants, so it is unclear whether relevant stakeholders are involved. However, agency officials noted the PCC’s focus is on national security rather than on maritime infrastructure, which may indicate not all maritime infrastructure stakeholders are included. Lastly, CMTS includes stakeholders involved directly with maritime transportation. For example, officials from the U.S. Army Corps of Engineers noted that they actively participate in CMTS, including its Arctic Integrated Action Team, but do not participate in other interagency groups, where they are often represented by higher- level Department of Defense officials. The Executive Office of the President has not designated an interagency group as responsible for developing or executing the administration’s strategy for maritime infrastructure in the U.S. Arctic. We have previously reported that interagency efforts can benefit from the leadership of a single entity to provide assurance that federal programs are well coordinated and based upon a coherent strategy. Agency officials said priorities in the U.S. Arctic have shifted to national security under the current administration, which may have led executive-level interagency collaboration efforts to move from AESC to the NSC Arctic PCC. However, it is unclear whether the NSC Arctic PCC includes the relevant stakeholders. Moreover, the shift in Arctic priorities to security issues does not diminish the importance of Arctic maritime infrastructure. As indicated in the 2013 National Strategy, maritime shipping and infrastructure are a key component of overarching goals in the region like advancing U.S. security interests, pursuing responsible stewardship, and strengthening international cooperation. Without an interagency mechanism with sustained leadership and inclusion of relevant stakeholders to direct federal efforts related to U.S. Arctic maritime infrastructure, agencies may miss opportunities to leverage resources toward achieving a broader outcome. For example, as noted earlier, stakeholders we spoke to identified communications as a key infrastructure gap. According to U.S. Coast Guard officials, communications is a whole-of-government effort, requiring partnerships across agencies including the Department of Defense. Without an interagency collaboration mechanism designated to lead these efforts, it is unclear who has responsibility for such whole-of-government efforts to address maritime infrastructure in the U.S. Arctic. The U.S. Arctic, including the Bering Strait, is an essential part of the increasingly navigable Arctic and a key convergence point for maritime transportation routes connecting the Pacific and Atlantic oceans. The risks inherent to Arctic shipping—including vast distances, extreme ice conditions, and unpredictable weather—are exacerbated by gaps in maritime infrastructure in the U.S. Arctic. While agencies have taken some actions to address these gaps, without a government-wide assessment of risks posed by maritime infrastructure gaps in the U.S. Arctic and a current strategy to address those risks, agencies lack assurance that their actions are effectively targeting priority areas. Without a strategy that includes goals, objectives, and performance measures, agencies cannot demonstrate the results of their efforts, and decision makers cannot gauge the extent of progress in addressing maritime infrastructure gaps. In addition, without a designated interagency group to provide sustained leadership, agencies lack the ability to leverage resources to address maritime infrastructure and achieve government-wide priorities in the complex and changing U.S. Arctic. The U.S. Committee on the Marine Transportation System should: Complete a government-wide assessment of the economic, environmental, and safety risks posed by gaps in maritime infrastructure in the U.S. Arctic to inform investment priorities and decisions. (Recommendation 1) The appropriate entities within the Executive Office of the President, including the Office of Science and Technology Policy should: Develop and publish a strategy for addressing U.S. Arctic maritime infrastructure that identifies goals and objectives, performance measures to monitor agencies’ progress over time, and the appropriate responses to address risks. (Recommendation 2) Designate the interagency group responsible for leading and coordinating federal efforts to address maritime infrastructure in the U.S. Arctic that includes all relevant stakeholders. (Recommendation 3) We provided a draft of this report to the Executive Office of the President’s Office of Science and Technology Policy (OSTP); the U.S. Committee on the Marine Transportation System (CMTS); and the Departments of Homeland Security, Commerce, Defense, Interior, State, and Transportation for comment. With the exception of the Department of Defense, all of these entities provided technical comments, which we incorporated as appropriate. Only CMTS provided written comments, which were transmitted via letter from the Department of Transportation, and are reprinted in appendix II. In its technical comments, the Department of Homeland Security’s U.S. Coast Guard provided Arctic traffic data for the 2019 shipping season. As stated in our report, we originally selected the decade of 2009 through 2018 for our analysis when designing our review, as 2018 was the most recent year for which data were available at that time. In response to the U.S. Coast Guard’s comments submitted in April 2020, we revised our report to include data from the 2019 shipping season on (1) the number of vessels in the U.S. Coast Guard District 17 Arctic area of interest and (2) the number of transits in the Bering Strait, to ensure the report contained the most current information available. In its written comments, CMTS partially concurred with our recommendation that CMTS complete a government-wide assessment of the economic, environmental, and safety risks posed by gaps in maritime infrastructure in the U.S. Arctic to inform investment priorities and decisions. However, CMTS also noted several areas of disagreement with our conclusions, which we address here: First, CMTS noted that GAO’s draft report contained dated information and that the 2019 data contradicts GAO statements that suggest a decrease in vessel activity since 2015. CMTS noted that the 2019 data shows that vessel traffic has increased steadily over the last decade, and that although growth slowed between 2015 and 2017, “it did not stall.” However, we dispute this characterization. The 2019 shipping data included in this report emphasizes the finding from our draft report that maritime shipping activity generally increased over the time period of our review. However, this trend does not reflect a steady increase throughout the entire timeframe or “slowed growth” between 2015 and 2017 as CMTS indicates. Specifically, the data show year-to-year decreases in the number of vessels from 2015 to 2017 in the U.S. Coast Guard District 17 Arctic area of interest (see fig. 3) and in the number of transits in the Bering Strait from 2015 to 2018 (see fig. 4). CMTS’s own 2019 report indicated that the number of vessels had decreased from a peak in 2015, after Shell’s decision in 2015 to not pursue further exploratory drilling efforts. As such, we stand by our description of the overall growth in maritime activity in the U.S. Arctic since 2009, as well as the pattern of declining traffic within that period from 2015 through 2018. Second, CMTS also noted in its written comments that our use of data from 2009 to 2018 in the draft report do not lead to the conclusions and recommendation to assess infrastructure risks and prioritize future investment in the Arctic. We dispute this characterization. Our decision to include the 2019 data further emphasizes the finding in our draft report of a general increase in maritime activity in the U.S. Arctic and the need for an assessment of risks posed by gaps in maritime infrastructure. As we note in the report, CMTS has reported that the U.S. Arctic does not have the typical elements of a maritime infrastructure system such as a deep- draft port or robust communications infrastructure. These infrastructure gaps exacerbate the inherent challenges of maritime activity in the Arctic—vast distances, dangerous weather, and extreme ice conditions— that can pose safety risks to mariners and environmental risks to the fragile Arctic ecosystem. While agencies have taken some steps to address infrastructure gaps, without a risk assessment, agencies lack assurance that their investments are addressing the highest-priority risks. As such, we stand by our conclusion and recommendation that increasing maritime traffic poses risks, and a government-wide assessment of those risks would inform federal decisions on investments to appropriately address risks. Third, CMTS disagreed with GAO’s statement that a government-wide risk assessment could better enable agencies to evaluate potential U.S. Arctic infrastructure expenditures. Although CMTS agreed that understanding infrastructure gaps is critical to improving the Arctic marine transportation system, CMTS contends that such risk assessments are the responsibility of each agency as directed by the Office of Management and Budget (OMB). As we note in the report, many agencies have a role in U.S. Arctic maritime shipping and infrastructure and although agencies and others have conducted many reviews of maritime infrastructure in the U.S. Arctic (see appendix I), agency-by- agency assessments do not reflect or analyze risks from a government- wide perspective. CMTS itself has previously noted the importance of evaluating risks on a government-wide basis. Specifically, in 2013 CMTS noted that increased activity in the U.S. Arctic presents additional risks for the people, vessels, and the environment and that managing that risk requires an in-depth understanding of the issues and trade-offs associated with key decisions, such as how to prioritize investments. As our report states, CMTS stated that developing a tool to assess the unique risk elements in the Arctic was a challenge for the nation, and it proposed a model for determining risk that considered the likelihood of adverse events actually occurring, vulnerability to damage, and potential consequences. This model is similar to the 2016 OMB circular, which called for agencies to, among other things, assess the causes, sources, probability of the risk occurring, and potential outcomes. As stated in our report, given its previous work in the U.S. Arctic and its coordinating role with its member agencies, CMTS is well suited to conduct a government-wide assessment of the risks posed by gaps in maritime infrastructure in the U.S. Arctic. As such, we stand by our recommendation. Based on these items, CMTS did not agree to perform and lead a government-wide risk assessment. Instead, as an “alternate action” to address GAO’s recommendation, CMTS noted it plans to update a table of information published in its past reports on infrastructure gaps in the U.S. Arctic and provide an inventory of existing risk assessments and their criteria, which agencies can then use to improve their own assessments to inform decisions. In our view, the proposed action described by CMTS would not provide the same level of information proposed by CMTS itself in 2013 and by OMB’s 2016 circular, which calls for, among other things, assessing the causes, sources, probability of the risk occurring, and potential outcomes. As stated in our report, CMTS is uniquely positioned as a federal interagency coordinating committee focused on the maritime transportation system to draw on the expertise of its member agencies, such as U.S. Coast Guard and the National Oceanic and Atmospheric Administration, to complete this risk assessment. Moreover, CMTS is required by statue to coordinate the establishment of domestic transportation policies in the Arctic to ensure safe and secure maritime shipping and make recommendations with regard to federal policies that impact the marine transportation system. Furthermore, according to CMTS officials, there is nothing in CMTS’s authority that would prevent it from doing a risk assessment. As such, we stand by our recommendation as written and do not believe CMTS’s alternate action is sufficient to address the recommendation. In comments provided via email, OSTP neither agreed nor disagreed with the report’s recommendations. OSTP acknowledged the Arctic is of critical national importance and noted interagency coordination can be implemented through the entities of the National Science and Technology Council, which is located within OSTP. OSTP noted the need for, and role of additional federal coordination, such as the Arctic Executive Steering Committee, is under consideration by OSTP. We continue to believe that the appropriate entities within the Executive Office of the President, including OSTP, should designate the interagency group responsible for leading and coordinating federal efforts to address maritime infrastructure in the U.S. Arctic that includes all relevant stakeholders. As we note in our report, without an interagency collaboration mechanism designated to lead these efforts, it is unclear who has responsibility for whole-of- government efforts to address U.S. Arctic maritime infrastructure. In addition, we stand by our other recommendation to OSTP and other entities within the Executive Office of the President to develop and publish a strategy for addressing U.S. Arctic maritime infrastructure that identifies goals and objectives, performance measures to monitor agencies’ progress over time, and the appropriate responses to address risks. As we note in the report, without such a strategy agencies lack assurance that their actions are effectively targeting priority areas and decision makers cannot gauge the extent of progress in addressing maritime infrastructure gaps. We are sending copies of this report to the appropriate congressional committees; the Executive Office of the President; the U.S. Committee on the Marine Transportation System; the Secretaries of Homeland Security, Commerce, Defense, Interior, State, and Transportation; and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. National Ocean Council. National Ocean Policy Implementation Plan. Washington, D.C.: April 2013. White House. National Strategy for the Arctic Region. Washington, D.C.: May 10, 2013. U.S. Coast Guard. United States Coast Guard Arctic Strategy. Washington, D.C.: May 2013. U.S. Committee on the Marine Transportation System. U.S. Arctic Marine Transportation System: Overview and Priorities for Action. Washington, D.C.: 2013. The White House. Implementation Plan for the National Strategy for the Arctic Region. Washington, D.C.: January 30, 2014. U.S. Navy. The United States Navy Arctic Roadmap for 2014 to 2030. Washington, D.C.: February 2014. GAO. Maritime Infrastructure: Key Issues Related to Commercial Activity in the U.S. Arctic over the Next Decade. GAO-14-299. Washington, D.C.: March 19, 2014. U.S. Department of Commerce. National Oceanic and Atmospheric Administration. NOAA’s Arctic Action Plan: Supporting the National Strategy for the Arctic Region. Silver Spring, M.D: April 2014. GAO. Arctic Issues: Better Direction and Management of Voluntary Recommendations Could Enhance U.S. Arctic Council Participation. GAO-14-435. Washington, D.C.: May 16, 2014. Brigham, L. W. Alaska and the New Maritime Arctic Executive Summary: Executive Summary of a Project Report to the State of Alaska Department of Commerce, Community and Economic Development. Fairbanks, A.K.: February 1, 2015. The International Council on Clean Transportation. A 10-Year Projection of Maritime Activity in the U.S. Arctic Region. Washington, D.C.: January 2015. This report was contracted and coordinated under the U.S. Committee on the Marine Transportation System. Executive Order No. 13689. Enhancing Coordination of National Efforts in the Arctic. 80 Fed. Reg. 4191. January 26, 2015. The White House. Arctic Executive Steering Committee. National Strategy for the Arctic Region Implementation Report. Washington, D.C.: January 30, 2015. Alaska Arctic Policy Commission. Final Report of the Alaska Arctic Policy Commission. Anchorage and Bethel, A.K.: January 30, 2015. U.S. Army Corps of Engineers. Alaska District. Alaska Deep-Draft Arctic Port System Study: Draft Integrated Feasibility Report, Draft Environmental Assessment (EA), and Draft Finding of No Significant Impact (FONSI). Nome, AK: February 2015. GAO. Arctic Planning: DOD Expects to Play a Supporting Role to Other Federal Agencies and Has Efforts Under Way to Address Capability Needs and Update Plans. GAO-15-566. Washington, D.C.: June 19, 2015. Arctic. Status on Implementation of the AMSA 2009 Report Recommendations. Tromsø, Norway: April 2015. World Economic Forum. Global Agenda Council on the Arctic. Arctic Investment Protocol: Guidelines for Responsible Investment in the Arctic. Geneva, Switzerland: November 2015. U.S. Coast Guard. Arctic Strategy Implementation Plan. Washington, D.C.: December 2015. Arctic Economic Council, Telecommunications Infrastructure Working Group. Arctic Broadband: Recommendations for an Interconnected Arctic. Tromsø, Norway: Winter 2016. Copenhagen Business School and Arctic Institute. Arctic Shipping: Commercial Opportunities and Challenges. CBS Maritime, January 2016. The White House. Arctic Executive Steering Committee. 2015 Year in Review: Progress Report on the Implementation of the National Strategy for the Arctic Region. Washington, D.C.: March 2016. The White House. Arctic Executive Steering Committee. 2015 Year in Review: Progress Report on the Implementation of the National Strategy for the Arctic Region; Appendix A, Implementation Framework for the National Strategy for the Arctic Region. Washington, D.C.: March 2016. U.S. Committee on the Marine Transportation System. Arctic Marine Transportation Integrated Action Team. A Ten-Year Prioritization of Infrastructure Needs in the U.S. Arctic. Washington, D.C.: April 15, 2016. GAO. Coast Guard: Arctic Strategy is Underway but Agency Could Better Assess How Its Actions Mitigate Known Arctic Capability Gaps. GAO-16-453. Washington, D.C.: June 15, 2016. Department of Defense. Report To Congress On Strategy To Protect United States National Security Interests In The Arctic Region. Washington, D.C.: December 2016. RAND Corporation. Maintaining Arctic Cooperation with Russia: Planning for Regional Change in the Far North. RR-1731-RC. Santa Monica, CA: 2017. U.S. Committee on the Marine Transportation System. Recommendations and Criteria for Using Federal Public-Private Partnerships to Support Critical U.S. Arctic Maritime Infrastructure. Washington, D.C.: January 2017. Arctic Council, Emergency Prevention, Preparedness and Response. Circumpolar Oil Spill Response Viability Analysis: Technical Report. March 7, 2017. Council of Foreign Relations. Arctic Imperatives: Reinforcing U.S. Strategy of America’s Fourth Coast, New York, N.Y.: March 2017. Ocean Conservancy. Navigating the North: An Assessment of the Environmental Risks of Arctic Vessel Traffic. Anchorage, A.K.: June 28, 2017. Center for Strategic and International Studies, Maritime Futures: The Arctic and the Bering Strait Region. Washington, D.C.: November 2017. RAND Corporation. Identifying Potential Gaps in US Coast Guard Arctic Capabilities.RR-2310-DHS. Santa Monica, CA: 2018. U.S. Committee on the Marine Transportation System. Revisiting Near- Term Recommendations to Prioritize Infrastructure Needs in the U.S. Arctic. Washington, D.C.: 2018. Department of Defense. Report to Congress on Assessment of Requirement for a Strategic Arctic Port. Washington, D.C.: January 2018. Department of Homeland Security, Office of the Chief Financial Officer. Arctic Search and Rescue: Fiscal Year 2017 Report to Congress. Washington, D.C.: March 13, 2018. International Union of Marine Insurance. IUMI Position Paper: Arctic Sailings. Hamburg, Germany: August 2018. U.S. Coast Guard Acquisition Directorate, Research & Development Center. Alaska AIS Transmit Prototype Test, Evaluation, and Transition Summary Report for the Near Shore Arctic Navigational Safety Information System (ANSIS). New London, C.T.: October 2018. GAO. Arctic Planning: Navy Report to Congress Aligns with Current Assessments of Arctic Threat Levels and Capabilities Required to Execute DOD’s Strategy. GAO-19-42. Washington, D.C.: November 8, 2018. Alaska Federation of Natives. Indigenous Engagement with Their Countries’ Military and Civilian Services/ Government on Maritime Arctic Issues. Anchorage, A.K.: December 2018. RAND Europe. The Future of Arctic Cooperation in a Changing Strategic Environment, PE-268-RC. Cambridge, United Kingdom: 2018. U.S. Navy. Strategic Outlook for the Arctic. January 2019. U.S. Coast Guard. Arctic Strategic Outlook. April 2019. Department of Defense. Office of the Secretary of Defense. Annual Report to Congress on Military and Security Developments Involving the People’s Republic of China 2019. Washington, D.C.: May 2, 2019. Pompeo, Michael, R. Secretary of State. U. S. Department of State. Looking North: Sharpening America’s Arctic Focus. Remarks. Rovaniemi, Finland, May 6, 2019. Pompeo, Michael R. Secretary of State. U.S. Department of State. Remarks. Arctic Council Ministerial Meeting. Rovaniemi, Finland, May 7, 2019. Department of Defense. Office of the Under Secretary of Defense for Policy. Report to Congress on Department of Defense Arctic Strategy. Washington, D.C.: June 2019. U.S. Committee on the Marine Transportation System. A Ten-Year Projection of Maritime Activity in the U.S. Arctic Region. 2020-2030: Washington, D.C.: September 2019. Congressional Research Service. Changes in the Arctic: Background and Issues for Congress. Washington, D.C.: November 27, 2019. U.S. Army Corps of Engineers, Alaska District. Port of Nome Modification Feasibility Study: Draft Integrated Feasibility Report and Supplemental Environmental Assessment. Nome, A.K.: December 2019. Congressional Research Service. Changes in the Arctic: Background and Issues for Congress. Washington, D.C.: January 23 2020. In addition to the contact named above, Susan Fleming, Director; Matt Barranca, Assistant Director; Emily Larson, Analyst in Charge; Chuck Bausell; Geoff Hamilton; Georgeann Higgins; Ned Malone; John Mingus; Jan Montgomery; Kaleb Mount; Fatima Sharif; Curtia Taylor; Sarah Veale; and Laurel Voloder made key contributions to this report.", "summary": "Arctic sea ice has diminished, lengthening the navigation season and increasing opportunities for maritime shipping. However, the U.S. Arctic lacks maritime infrastructure—such as a deep-draft port and comprehensive nautical charting—to support increased traffic. The lack of infrastructure exacerbates risks inherent to shipping in the Arctic such as vast distances and dangerous weather. This report examines (1) how U.S. Arctic shipping trends have changed since 2009 and factors that have shaped shipping in the region, and (2) the extent to which U.S. agencies' efforts to address Arctic maritime infrastructure gaps have aligned with leading management practices. GAO collected U.S. Coast Guard traffic data from 2009 through 2019 and interviewed 20 stakeholders selected to represent a range of views. GAO also analyzed Arctic strategies, interviewed selected agencies involved with maritime infrastructure, and compared efforts to leading management practices. Maritime shipping activity, as indicated by the number of vessels in the U.S. Arctic, generally increased from 2009 through 2019. Domestic maritime activity declined after the discontinuation of offshore oil and gas exploration activities in Alaska's Chukchi Sea in 2015. However, since 2015, international activities related to natural gas development, particularly in the Russian Arctic, have increased, according to stakeholders. Factors affecting decisions of ship operators about whether to operate in the U.S. Arctic include increased operating costs of Arctic-capable ships, environmental changes that have caused more volatile weather and ice conditions, and concerns over environmental impacts. Agencies have taken some steps to address Arctic maritime infrastructure gaps identified by federal agencies, such as a lack of nautical charting, but federal efforts lack a current strategy and interagency leadership. Examples of agency actions include the U.S. Coast Guard developing recommended shipping routes and the National Oceanic and Atmospheric Administration continuing to chart Arctic waters. To guide federal efforts, the White House developed a National Strategy for the Arctic Region in 2013 and established an interagency Arctic Executive Steering Committee (AESC) in 2015. However, agency officials and stakeholders noted the strategy is now outdated due to changing conditions in the Arctic. As a result, federal efforts lack a current government-wide strategy that aligns with key management practices such as identifying goals, objectives, and establishing performance measures. Moreover, U.S. Arctic interagency groups do not reflect leading collaboration practices, such as sustained leadership and inclusion of all relevant stakeholders, and the White House has not designated which entity is to lead U.S. Arctic maritime infrastructure efforts. For example, the AESC is now dormant according to agency officials and staff at the White House Office of Science and Technology Policy (OSTP), which chairs the AESC. Without a current strategy and a designated interagency entity with these collaboration practices in place, agencies may miss opportunities to leverage resources and target infrastructure improvements in areas that would best mitigate risks. GAO is making three recommendations, including that OSTP and other appropriate entities within the Executive Office of the President: develop and publish a strategy to address gaps and designate the interagency mechanism responsible for leading federal efforts. OSTP neither agreed nor disagreed but noted it is considering the need for and role of additional federal coordination. GAO stands by its recommendations.", "document_type": "gao"}
{"report": "The DRC is a vast, mineral-rich nation with an estimated population of more than 85 million people and an area that is roughly one-quarter the size of the United States, according to the UN. Since gaining its independence from Belgium in 1960, the DRC has undergone political upheaval and armed conflict. From 1998 to 2003, the DRC and eight other African countries were involved in what has become known as “Africa’s World War,” which resulted in a death toll of an estimated 5 million people in the DRC, according to State. During that period, in 1999, the UN deployed a peacekeeping mission to the DRC, and since then the United States and the international community have sought to improve security in the DRC. However, eastern DRC continues to be plagued by violence—including numerous cases of sexual violence reported by the UN—often perpetrated against civilians by nonstate armed groups and some members of the Congolese national military. More recently, presidential elections were originally scheduled for 2016, when the president’s final term in office expired, but the government delayed elections until December 2018. During this time, the UN reported an increase in human rights violations. In 2018 and 2019, the UN reported that serious violations of human rights remain widespread in the DRC, including continued acts of sexual violence by government security forces as well as nonstate armed groups. In addition, the UN noted that criminal networks and armed groups, including members of the Congolese national military and police, continued to derive illegal revenues from smuggling and illicit taxation of minerals from eastern Congolese mines. Various industries, particularly manufacturing industries, use the four conflict minerals—tin, tungsten, tantalum, and gold—in a wide variety of products. For example, tin is used to solder metal pieces and is also found in food packaging, steel coatings on automobile parts, and some plastics. Tungsten is used in automobile manufacturing, drill bits, and cutting tools, and other industrial manufacturing tools and is the primary component of filaments in light bulbs. Most tantalum is used to manufacture capacitors that enable energy storage in electronic products, such as cell phones and computers, or to produce alloy additives used in turbines in jet engines. Gold is used as reserves and in jewelry and is also used by the electronics industry, including, for example, in cell phones and laptops. In August 2012, SEC adopted its conflict minerals disclosure rule in response to Section 1502(b) of the Dodd-Frank Act. In the summary section of the adopting release for the rule, SEC noted that to accomplish the goal of helping to end the human rights abuses in the DRC caused by the conflict, Congress chose to use the Dodd-Frank Act’s disclosure requirements to bring greater public awareness of the sources of companies’ conflict minerals and to promote the exercise of due diligence on conflict mineral supply chains. The map in figure 1 shows the countries covered by the SEC disclosure rule, including the DRC and its 26 provinces. The SEC disclosure rule addresses the four conflict minerals named in the Dodd-Frank Act originating from the covered countries. The rule outlines a process for companies to follow, as applicable, to comply with the rule. (See app. II.) The process broadly requires a company to 1. determine whether it manufactures, or contracts to be manufactured, products with “necessary” conflict minerals; 2. conduct a reasonable country-of-origin inquiry concerning the origin of those conflict minerals; and 3. exercise due diligence, if appropriate, to determine the source and chain of custody of those conflict minerals, adhering to a nationally or internationally recognized due diligence framework, if such a framework is available for these necessary conflict minerals. If companies choose to disclose that their products are “DRC conflict free” in a conflict minerals report, the SEC disclosure rule requires companies to obtain an independent private-sector audit. Following an appellate court decision that a portion of the disclosure required by the SEC disclosure rule violated the First Amendment, SEC staff issued guidance on April 29, 2014, indicating that, pending further action by the SEC or a court, companies required to file a conflict minerals report would not have to identify their products as “DRC conflict undeterminable,” “not found to be ‘DRC conflict free,’” or “DRC conflict free.” In April 2017, following the entry of the final judgment in the case, the SEC’s Division of Corporation Finance issued revised guidance, indicating that, in light of the uncertainty regarding how the commission would resolve those issues and related issues raised by commenters, the Division of Corporation Finance had determined that it would not recommend enforcement action to the commission if companies did not report on specified due diligence disclosure requirements. However, the SEC staff told us that the guidance is not binding on the commission and that the commission could still initiate enforcement action if companies did not report on their due diligence in accordance with the rule. According to SEC staff, the 2017 guidance, while temporary, is still in effect, pending review of the rule by the commission. As of June 2019, the rule was on the SEC’s long-term regulatory agenda, which means— according to SEC staff—that any action would likely not take place until after March 2020. In 2018, 1,117 companies filed conflict minerals disclosures—slightly fewer than the number of companies that filed in 2017 and 2016 (1,165 and 1,230, respectively). Our analysis of a generalizable sample of the 1,117 filings found that an estimated 85 percent of the companies filed as domestic, while the remaining 15 percent filed as foreign. This domestic- to-foreign ratio is similar to the ratio in 2017 and 2016. Overall, when reporting on the conflict minerals used in their products, an estimated 62 percent reported using tantalum; 63 percent, tungsten; and 66 percent, gold—percentages similar to those reported in 2017 and 2016. An estimated 76 percent reported using tin, which was similar to the 69 percent reported in 2017 and significantly higher than the 61 percent in 2016. An estimated 24 percent did not specify the minerals they used. Our analysis of our generalizable sample found that, as in 2017 and 2016, almost all companies that filed conflict minerals disclosures indicated that they had conducted country-of-origin inquiries. Specifically, an estimated 100 percent of companies that filed reported that they had conducted such an inquiry, similar to the percentages that reported doing so in the prior 2 years. As a result of the inquiries they conducted, an estimated 56 percent of companies that filed reported whether the conflict minerals in their products came from covered countries—similar to the estimated 53 percent in 2017 and 49 percent in 2016. The percentage of companies able to make such a determination significantly increased between 2014 and 2015, and has since leveled off. (See figure 2.) As in past years, our review of our generalizable sample of filings found that some of the companies in our generalizable sample reported taking the same actions to improve supply chain data collection that they had taken in past years, including using standardized tools and conducting surveys. Those companies that conducted surveys reported doing further investigation into the source of minerals, for example, by following up with suppliers to improve the specificity and completeness of their survey responses. Other actions companies reported taking to improve supply chain data collection included educating suppliers about conflict-free sourcing and creating and publicizing conflict minerals policies. In interviews, representatives of selected companies and other industry participants also noted, as they had in prior years, that awareness among suppliers about the use of conflict minerals continued to increase. However, many companies reported difficulties in determining the country of origin of conflict minerals, in part as a result of lack of access to suppliers and complex supply chains involving many suppliers and processing facilities. Specifically, some companies reported that some suppliers did not respond to requests for information, or that supplier and smelter information was incomplete or contained errors. Some companies also reported, among other factors, confusion among suppliers about the requirements of the SEC disclosure rule, and gaps in supplier education and knowledge. Our review of our generalizable sample found that 94 percent of the companies that were required to conduct due diligence, as a result of their country-of-origin inquiries, reported conducting it. This percentage is similar to those in prior years: 96 percent in both 2017 and 2016. An estimated 89 percent of the companies that were required to conduct due diligence reported using a due diligence framework prescribed by the Organisation for Economic Co-operation and Development (OECD) guidance to conduct due diligence on the source and chain of custody of the conflict minerals in their products. This percentage is comparable to the 87 percent in 2017 and 92 percent in 2016. The remainder of the companies reported using non-OECD guidance or did not specify the guidance they used, if any. Of all the companies that conducted due diligence (a subset of the companies that conducted country-of-origin inquiries shown in figure 2 above), an estimated 35 percent reported that they were able to determine that their conflict minerals came from covered countries or from scrap or recycled sources, compared with 37 percent in 2017 and 39 percent in 2016. However, an estimated 61 percent of the companies reported in 2018 that they could not definitively confirm the source of the conflict minerals in their products, compared with 47 percent in 2017 and 55 percent in 2016. As in prior years, almost all of the companies that conducted due diligence reported that they could not determine whether the conflict minerals in their products had financed or benefited armed groups. Three companies in our generalizable sample determined that the minerals in at least some of their products had not financed or benefited armed groups in covered countries. None of these three companies declared their products “DRC conflict free,” which would trigger the requirement to file an independent private-sector audit report. However, one of the three companies did include one such audit report. Overall, SEC officials approximated that a total of 14 companies filed independent private-sector audit reports in 2018, compared with 16 in 2017 and 19 in 2016. Some companies and industry representatives told us—as they did last year—that even though the revised guidance and other statements made by SEC staff had raised some uncertainty about the filing process, companies generally planned to continue to report conflict minerals disclosure information. As noted earlier, the SEC’s Division of Corporation Finance issued revised guidance in April 2017 indicating that it would not recommend enforcement action to the commission if companies did not report on specified due diligence disclosure requirements. Some companies and industry participants told us that the SEC staff’s revised guidance had caused confusion among some suppliers and stakeholders about reporting requirements, sometimes leading suppliers to be reluctant or slow to share information required by companies for their due diligence reporting. In addition, some companies had changed their approach to filing as a result of the guidance. Specifically, one company in our generalizable sample of SEC filings for 2018 cited the SEC staff’s revised guidance recommending no enforcement action as the reason for its decision not to report on due diligence efforts, despite noting it had determined there was reason to believe that minerals in its products may have come from covered countries. Another company we interviewed cited the same SEC staff guidance as one of the reasons the company chose not to file an independent private-sector audit. However, representatives of other companies we interviewed told us that, generally, their companies planned to continue to report conflict minerals disclosure information, including information from their due diligence efforts. In addition, as noted above, our review of a generalizable sample of SEC filings from 2018 found that the filings were similar in number and content to those filed in 2017. Some companies told us that they would continue to file, and even expand their due diligence, in response to the conflict minerals disclosure rule and other incentives for filing—such as consumer pressure and European Union reporting requirements scheduled to take effect in 2021. Furthermore, State reported they had begun to take actions related to the revised guidance. Specifically, State officials told us that they had conducted public outreach, such as attending industry events to remind stakeholders that the conflict minerals disclosure rule was still in effect, provide an overview of the rules and requirements, and answer questions. In addition, as of June 2019, the SEC’s long-term regulatory agenda included an item indicating that the SEC Division of Corporation Finance is considering recommendations for the commission to address the effect of litigation over the conflict minerals rule. According to SEC staff, these recommendations may affect the 2017 guidance pertaining to the conflict minerals rule. We did not identify any new information on the rate of sexual violence in eastern DRC, Burundi, Rwanda, or Uganda since we last reported in June 2018; we did identify new case-file information and other information from UN reports for the DRC and Burundi. Since 2011, we have reported annually on rates of sexual violence derived from population-based surveys, as well as on case-file data as applicable, for eastern DRC (which consists of the provinces of Ituri, Maniema, North Kivu, and South Kivu) and three countries that adjoin that region: Burundi, Rwanda, and Uganda. See appendix III for population-based surveys containing sexual violence rates published since 2007. As explained in the sidebar, case-file information is unsuitable for estimating rates of sexual violence. international entities, law enforcement agencies, or medical service providers on sexual violence victims Data from population-based surveys provide a more appropriate basis for deriving a rate of sexual violence because such surveys are conducted using random sampling techniques and their results are generalizable to the target population from which a representative sample was surveyed. As we have previously reported, several factors make case-file information unsuitable for estimating rates of sexual violence. For example: Case-file data are not based on a random sample of a population, and therefore the results of analyzing these data are not generalizable. Case-file data are not aggregated across However, case-file data can provide indicators that sexual assaults are occurring in certain locations and can help service providers respond to the needs of victims. We did not identify any new population-based surveys providing rates of sexual violence in eastern DRC, Burundi, Rwanda, or Uganda published since our June 2018 report. The most recent information for eastern DRC and Rwanda dates from 2016, and for Burundi and Uganda, from 2018. UN entities, State, USAID, and a USAID-funded program have produced additional case-file information reported in 2018 and 2019 about instances of sexual violence in the DRC and Burundi that occurred in 2017 and 2018. While State’s annual country report on human rights practices for Uganda noted that rape remained a common problem in the country in 2018, we did not identify new case-file information for the country, nor did we find new case-file information regarding Rwanda. Periodic Reporting of Case-File Information on Sexual Violence in the DRC and Adjoining Countries United Nations (UN) entities and the U.S. Department of State (State) report periodically on case-file information, while the U.S. Agency for International Development (USAID) periodically receives such information from an implementing partner, as follows: Rights Office in the Democratic Republic of the Congo reports annually on human rights violations in the Democratic Republic of the Congo (DRC), including sexual violence. Representative of the Secretary- General on Sexual Violence in Conflict reports annually on cases of conflict- related sexual violence in several countries, including the DRC, using information from the United Nations Stabilization Mission in the Democratic Republic of the Congo and the United Nations Population Fund, among others. reports containing case-file information from a 5-year program that began in 2017 to counter gender-based violence in parts of eastern DRC’s North and South Kivu provinces. UN entities, State, USAID, and a USAID-funded 5-year program located in North and South Kivu provinces have produced new case-file information pertaining to sexual violence in the DRC. UN entities reported the following case-file information pertaining to sexual violence in the DRC for calendar year 2018: United Nations Joint Human Rights Office in the Democratic Republic of the Congo (UNJHRO) confirmed and documented at least 939 sexual violence victims (657 women, 279 children, and three men). According to UNJHRO, this sexual violence was perpetrated by DRC armed forces and police in many instances. Specifically, Armed Forces of the Democratic Republic of the Congo (FARDC) soldiers were responsible for 218 of these victims, 195 of whom were located in conflict-affected provinces of the DRC. Members of the Congolese National Police were responsible for 100 victims of sexual violence, 60 of whom were in conflict-affected provinces of the DRC. United Nations Stabilization Mission in the Democratic Republic of the Congo (MONUSCO) documented and verified 1,049 cases of conflict-related sexual violence against 605 women, 436 girls, four men, and four boys. According to MONUSCO, 741 of those cases were perpetrated by combatants of nonstate armed groups and armed militiamen, with the remaining 308 perpetrated by FARDC soldiers and Congolese National Police. United Nations Population Fund (UNFPA) reported 32,342 incidents of sexual violence in conflict-affected provinces between January 2018 and September 2018. UN agencies also reported in 2018 that they had provided medical assistance to over 5,200 survivors of sexual violence, and MONUSCO reported that it had supported legal clinics that provided counseling and referrals to 2,243 civilian survivors of sexual violence for calendar year 2017. State noted two instances of armed groups in eastern DRC perpetrating sexual violence reported by UN entities in calendar years 2017 and 2018. Specifically, the Bana Mura, an armed group with ties to local government, kidnapped 66 people (64 of them children) in Kasai province and used them as sexual slaves, and members of Raia Mutomboki, a rebel armed group, perpetrated sexual violence, including gang rape, against at least 66 women and girls in South Kivu province. In 2018, USAID reported that it had provided medical, legal, and other services to 7,755 survivors of sexual and gender-based violence, and had also worked with local organizations to strengthen their ability to respond to and prevent such violence, during calendar year 2017. USAID also reported that it had collaborated with the Ministry of Education to develop a curriculum focused on preventing such violence, and had worked with gender-based violence monitoring committees in 618 schools. One of USAID’s implementing partners addresses sexual and gender-based violence as part of a 5-year program. This implementing partner reported reaching 3,135 victims of gender-based violence (including 2,559 adults and 576 children) in North and South Kivu provinces, providing those victims with health, legal, and psychosocial support services during fiscal year 2018. The implementing partner also reported providing services to 1,150 victims (including 953 adults and 197 children) during the first quarter of fiscal year 2019. State’s annual human rights report for 2018, as well as UNFPA, provided some case-file information on sexual violence in Burundi. State’s annual human rights report for 2018 noted that the government-operated Humura Center had recorded 627 cases of sexual and gender-based violence in Burundi, including domestic violence, from January 2018 to early September 2018. This organization provides survivors of sexual and domestic violence with legal, medical, and psychosocial services. UNFPA reported in 2018 that it had recorded 10,592 cases of gender- based violence in 2017 and noted that the Burundian government had decided to close the local UN Office of the High Commissioner for Human Rights in December 2018, reducing the access of survivors of sexual violence to legal services. UN entities noted that the government of the DRC had taken steps to address sexual violence in the DRC since 2013, but identified an increase in the number of incidents reported beginning in 2017. The reports also noted continued difficulties providing services to victims of sexual violence and combating a climate in which perpetrators act with impunity. According to the 2018 annual UN report on conflict-related sexual violence and UN officials we interviewed in 2019, the government of the DRC has continued to take steps to address sexual violence by, for example, holding awareness-raising campaigns and establishing a nationwide victim helpline. The UN Special Representative of the Secretary-General on Sexual Violence in Conflict cited other examples, including the prosecution of military and police officials, as well as leaders of nonstate armed groups, for conflict-related sexual violence. Specifically, the UN reported in 2018 that 59 members of the Congolese National Police and the FARDC were convicted of rape in 2017. Among those convicted was a FARDC colonel sentenced for failing to prevent subordinates from committing rape. The UN also noted that the DRC had successfully prosecuted a commander of the armed group Democratic Forces for the Liberation of Rwanda for sexual violence as a war crime, and a South Kivu provincial lawmaker and his militia for crimes against humanity for the abduction and rape of 39 children. In 2019, an armed group leader—and former FARDC colonel—was convicted of war crimes, including rape. As mentioned earlier, armed conflict and political upheaval within the DRC and particularly in eastern DRC have long created an environment of persistent human rights abuses, including sexual violence, according to UN reports. The UN reported this environment worsened during the lead- up to the presidential elections between 2016 and 2018. Case-file information the UN collected on sexual violence for 2017 and 2018 indicated an upward trend in incidents in the DRC, according to UN reports. A UN report cited an increase in documented cases of sexual violence, linking it to two factors: (1) nonstate armed groups’ use of sexual violence to enforce control over illicit exploitation of natural resources, such as gold, and (2) FARDC military operations responding to the activities of these nonstate armed groups. In addition to these recent developments, UN officials we interviewed cited longstanding difficulties such as a significant shortage of response services in the DRC; common instances of retaliation against survivors who reported abuse; and, as mentioned above, a climate in which perpetrators act with impunity. The UN Commission of Inquiry on Burundi did not identify any steps taken by the government of Burundi to address the country’s human rights issues, including sexual violence, in 2017 or 2018. The Commission of Inquiry—which, according to State, was denied access to the country by the government of Burundi but conducted interviews with more than 400 witnesses living in exile—reported that serious human rights violations, including acts of sexual violence, persisted in 2017 and 2018. For example, the commission reported that the National Intelligence Service, police, and the youth wing of the ruling political party used sexual violence to target supporters of the political opposition or their relatives. The commission also recommended that the government of Burundi establish investigative bodies to look into human rights violations and take measures to ensure that victims of sexual violence have access to appropriate care, including sexual health services and psychological support. We provided a draft of this report to the SEC, State, and USAID for comment. USAID provided written comments describing some of their related activities in the DRC, which we have reprinted in appendix IV. All three agencies provided technical comments, which we have incorporated as appropriate. We are sending copies of this report to appropriate congressional committees and to the Chairman of the Securities and Exchange Commission, the Secretary of State, and the Administrator of the U.S. Agency for International Development. The report is also available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. In this report, we (1) examine how companies responded to the U.S. Securities and Exchange Commission (SEC) conflict minerals disclosure rule when filing in 2018 and (2) provide recent information on the rate of sexual violence in eastern Democratic Republic of the Congo (DRC) and adjoining countries that was published in 2018 and early 2019. To address our first objective, we downloaded the specialized disclosure reports (Form SD) from the SEC’s publically available Electronic Data Gathering, Analysis, and Retrieval (EDGAR) database in September 2018. We downloaded 1,117 Form SD filings and any associated conflict minerals reports included in EDGAR. Companies filed these Forms SD, along with related conflict minerals reports in some instances, to provide information in response to the SEC disclosure rule. To review the completeness and accuracy of the EDGAR database, we reviewed relevant documentation, interviewed knowledgeable SEC officials, and reviewed our prior reports on internal controls related to the SEC’s financial systems. We determined that the EDGAR database was sufficiently reliable for identifying the universe of Form SD filings. We reviewed the conflict minerals section of the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act) and the requirements of the SEC disclosure rule to develop a data collection instrument that guided our analysis of a generalizable sample of Forms SD and conflict minerals reports. Our data collection instrument was not a compliance review of the Forms SD and conflict minerals reports. The questions were written in both yes–no and multiple-choice formats. An analyst reviewed the Forms SD and conflict minerals reports and recorded responses to the data collection instrument for all of the companies in the sample. A second analyst also reviewed the Forms SD and conflict minerals reports and verified the responses recorded by the first analyst. Analysts met to discuss and resolve any discrepancies. We randomly sampled 100 Forms SD from a population of 1,117 to create estimates generalizable to the population of all companies that filed. We selected this sample size to achieve a margin of error of no more than plus or minus 10 percentage points or less at the 95-percent confidence level, which applies to all our estimates except where noted. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have generated different estimates, we express our confidence in the precision of our particular sample’s results as a 95-percent confidence interval. This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. After using the data collection instrument to analyze the sample of filings submitted in 2018, we compared the resulting estimates with our estimates regarding filings submitted in prior years to determine whether there had been any statistically significant changes. We also attended an industry conference on conflict minerals and spoke with company representatives and industry representatives to gain additional context and perspectives. To address our second objective, we identified and assessed any information on sexual violence in eastern DRC and the three adjoining countries—Burundi, Rwanda, and Uganda—that had been published or otherwise had become available in 2018 and early 2019 and therefore would not have been included in our most recent report on the topic. We discussed the collection of sexual violence–related data in the DRC and adjoining countries, including population-based survey data and case-file data, with Department of State and U.S. Agency for International Development officials and with representatives of nongovernmental organizations and researchers. We also interviewed officials from the United Nations (UN) Children’s Fund, the UN Special Representative of the Secretary-General on Sexual Violence in Conflict, and the UN Statistics Division, and we obtained information from the UN Population Fund and UN Organization Stabilization Mission in the Democratic Republic of the Congo. In addition, we searched research databases, including MEDLINE and Scopus, to identify new academic articles containing any additional information on sexual violence published in 2018 and early 2019. Through these searches, we identified an initial list of 164 articles, which we then narrowed down to a priority list of studies by considering a variety of factors pertaining to the studies’ relevance to our second objective. These factors included (1) whether the study included rates, particularly related to the nation-wide rate of sexual violence in the DRC and region-wide rate in eastern DRC; (2) whether the study included case-file information; (3) whether the study contained data from 2011 or later; (4) whether the study focused on a subset of a broader population; (5) the geographic scope of the study; and (6) whether the study included original research. We reviewed the priority list of 16 articles and determined that none of them met our criteria for inclusion. We conducted this performance audit from September 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The U.S. Securities and Exchange Commission (SEC) conflict minerals disclosure rule requires certain companies to file a specialized disclosure report (Form SD), if the company manufactures, or contracts to have manufactured, a product or products containing conflict minerals that are necessary to the functionality or the production of those products. The rule also requires each company, as applicable, to conduct a Reasonable County of Origin Inquiry to determine whether it knows, or has reason to believe, that its conflict minerals may have originated in the covered countries or that the conflict minerals may not be from scrap or recycled sources. If the company’s inquiry shows both conditions to be true of its conflict minerals, the company must exercise due diligence and provide a description of the measures it took to exercise due diligence in determining the source and chain of custody of the conflict minerals, the facilities used to process the conflict minerals, their country of origin, and of the efforts it made to determine the mine or location of origin with the greatest possible specificity. The Form SD provides general instructions for filing conflict minerals disclosures and specifies the information that companies must provide. Companies were required to file under the rule for the first time by June 2, 2014, and annually thereafter on May 31. Figure 3 shows the flowchart included in the SEC’s adopting release for the rule, which summarized the conflict minerals disclosure rule at the time it was adopted. Since 2011, we have reported on population-based surveys containing sexual violence rates in eastern Democratic Republic of the Congo (DRC) and three adjoining countries: Burundi, Rwanda, and Uganda. Figure 4 shows the publication dates for these surveys, starting with surveys published in 2007. In addition to the individual named above, Godwin Agbara (Assistant Director), Katherine Forsyth (Analyst-in-Charge), Debbie Chung, Justin Fisher, Jieun Chang, Christopher Keblitis, Grace Lui, Nisha Rai, John Villecco, and Timothy Young made key contributions to this report. Diana Blumenfeld, Julia Jebo Grant, Farahnaaz Khakoo-Mausel, and Michael McAtee provided additional assistance. Conflict Minerals: Company Reports on Mineral Sources in 2017 Are Similar to Prior Years and New Data on Sexual Violence Are Available. GAO-18-457. Washington, D.C.: June 28, 2018. Conflict Minerals: Information on Artisanal Mined Gold and Efforts to Encourage Responsible Sourcing in the Democratic Republic of the Congo. GAO-17-733. Washington, D.C.: August 23, 2017. SEC Conflict Minerals Rule: 2017 Review of Company Disclosures in Response to the U.S. Securities and Exchange Commission Rule. GAO-17-517R. Washington, D.C.: April 26, 2017. Conflict Minerals: Insights from Company Disclosures and Agency Actions. GAO-17-544T. Washington, D.C.: April 5, 2017. SEC Conflict Minerals Rule: Companies Face Continuing Challenges in Determining Whether Their Conflict Minerals Benefit Armed Groups. GAO-16-805. Washington, D.C.: August 25, 2016. SEC Conflict Minerals Rule: Insights from Companies’ Initial Disclosures and State and USAID Actions in the Democratic Republic of the Congo Region. GAO-16-200T. Washington, D.C.: November 17, 2015. SEC Conflict Minerals Rule: Initial Disclosures Indicate Most Companies Were Unable to Determine the Source of Their Conflict Minerals. GAO-15-561. Washington, D.C.: August 18, 2015. Conflict Minerals: Stakeholder Options for Responsible Sourcing Are Expanding, but More Information on Smelters Is Needed. GAO-14-575. Washington, D.C.: June 26, 2014. SEC Conflict Minerals Rule: Information on Responsible Sourcing and Companies Affected. GAO-13-689. Washington D.C.: July 18, 2013. Conflict Minerals Disclosure Rule: SEC’s Actions and Stakeholder- Developed Initiatives. GAO-12-763. Washington, D.C.: July 16, 2012. The Democratic Republic of the Congo: Information on the Rate of Sexual Violence in War-Torn Eastern DRC and Adjoining Countries. GAO-11-702. Washington, D.C.: July 13, 2011. The Democratic Republic of the Congo: U.S. Agencies Should Take Further Actions to Contribute to the Effective Regulation and Control of the Minerals Trade in Eastern Democratic Republic of the Congo. GAO-10-1030. Washington, D.C.: September 30, 2010.", "summary": "Since the UN first deployed a peacekeeping mission to the DRC 2 decades ago, the United States and the international community have sought to improve security in the country. In eastern DRC, armed groups have committed severe human rights abuses, including sexual violence, and reportedly profit from the exploitation of “conflict minerals”—in particular, tin, tungsten, tantalum, and gold—according to the UN. Congress included a provision in the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act that, among other things, required the SEC to promulgate regulations regarding the use of conflict minerals from the DRC and adjoining countries. The SEC adopted these regulations in 2012. The act also included a provision for GAO to annually assess the SEC regulations' effectiveness in promoting peace and security and to report on the rate of sexual violence in the DRC and adjoining countries. In this report, GAO (1) examines how companies responded to the SEC conflict minerals disclosure rule when filing in 2018 and (2) provides recent information on the rate of sexual violence in eastern DRC and adjoining countries. GAO analyzed a generalizable random sample of SEC filings and interviewed relevant officials. GAO also reviewed U.S. government, UN, and international organization reports; interviewed DRC officials and other stakeholders; and conducted fieldwork in California at an industry conference. Companies' conflict minerals disclosures filed with the U.S. Securities and Exchange Commission (SEC) in 2018 were, in general, similar in number and content to disclosures filed in the prior 2 years. In 2018, 1,117 companies filed conflict minerals disclosures—about the same number as in 2017 and 2016. The percentage of companies that reported on their efforts to determine the source of minerals in their products through supply chain data collection (country-of-origin inquiries) was also similar to percentages in those 2 prior years. As a result of the inquiries they conducted, an estimated 56 percent of the companies reported whether the conflict minerals in their products came from the Democratic Republic of the Congo (DRC) or any of the countries adjoining it—similar to the estimated 53 and 49 percent in the prior 2 years. The percentage of companies able to make such a determination significantly increased between 2014 and 2015, and has since leveled off, as shown below. In their 2018 disclosures, some companies reported taking the same actions to improve supply chain data collection that they had taken in past years, and many noted difficulties in determining conflict minerals' country of origin. A subset of the companies in the figure had not determined their minerals' origin or had reason to believe their minerals were from covered countries (and not from scrap or recycled sources) and were, as a result of the inquiry, required to conduct additional research (due diligence). Of those that conducted due diligence, an estimated 61 percent reported they were unable to confirm the source of minerals in their products. An estimated 35 percent reported using conflict minerals from covered countries or from scrap or recycled sources. Although some companies noted that guidance the SEC staff revised in 2017 had caused uncertainty about the filing process, most filings were similar to those submitted in prior years. GAO found no new population-based surveys on the rate of sexual violence in eastern DRC and three countries adjoining that region—Burundi, Uganda, and Rwanda—but found other types of information on sexual violence.", "document_type": "gao"}
{"report": "Since the early 1990s, our high-risk program has focused attention on government operations with greater vulnerabilities to fraud, waste, abuse, and mismanagement, or that are in need of transformation to address economy, efficiency, or effectiveness challenges. To determine which federal government programs and functions should be designated high risk, we use our guidance document, Determining Performance and Accountability Challenges and High Risks. We consider qualitative factors, such as whether the risk (1) involves public health or safety, service delivery, national security, national defense, economic growth, or privacy or citizens’ rights; or (2) could result in significantly impaired service, program failure, injury or loss of life, or significantly reduced economy, efficiency, or effectiveness. We also consider the exposure to loss in monetary or other quantitative terms. At a minimum, $1 billion must be at risk, in areas such as the value of major assets being impaired; revenue sources not being realized; major agency assets being lost, stolen, damaged, wasted, or underutilized; potential for, or evidence of improper payments; and presence of contingencies or potential liabilities. Before making a high-risk designation, we also consider corrective measures that are planned or under way to resolve a material control weakness and the status and effectiveness of these actions. We release a High-Risk Series report every two years at the start of each new Congress. Our biennial reports detail progress made on previously designated high-risk issues. We designate any new issue areas we identify as high risk, based on the above criteria, in these reports or in separate products outside of the two-year cycle. We make out-of-cycle designations—as has been the case for seven other high-risk designations we have made—to highlight urgent issues, help ensure focused attention, and maximize the opportunity for the federal government to take action. The Office of National Drug Control Policy (ONDCP) was established by the Anti-Drug Abuse Act of 1988 as a component of the Executive Office of the President, and its Director is to assist the President in the establishment of the policies, goals, objectives, and priorities for the National Drug Control Program. In October 2018, the SUPPORT Act, among other things, reauthorized ONDCP and amended its authorities. ONDCP is responsible for (1) leading the national drug control effort, (2) coordinating and overseeing the implementation of national drug control policy, (3) assessing and certifying the adequacy of National Drug Control Programs and the budget for those programs, and (4) evaluating the effectiveness of national drug control policy efforts. As part of these efforts, ONDCP is to coordinate with more than a dozen federal agencies—known as National Drug Control Program agencies— that have responsibilities for activities including education and prevention, treatment, and law enforcement and drug interdiction (see fig. 1). Within these agencies, there may be components or offices that handle specific aspects of drug control. Some examples include SAMHSA and CDC within HHS, and the Drug Enforcement Administration (DEA) within the Department of Justice. Rates of drug misuse and drug overdose deaths have generally increased in the United States. Nationally representative data show that this increase in the estimated rate of drug misuse has occurred across several demographic categories such as sex and education levels. Nationally, the rate of drug overdose deaths decreased in 2018 after increasing almost every year since 2002. Drug overdose death rates vary by region and by different types of drugs. Drug misuse—the use of illicit drugs and the misuse of prescription drugs—has generally increased in the United States since 2002. According to SAMHSA, estimates of self-reported drug misuse among people aged 12 or older increased from 14.9 percent in 2002 to 16.7 percent in 2014, and then further increased from 17.8 percent in 2015 to 19.4 percent in 2018 (see fig. 2). The increase in estimated drug misuse from 2015 to 2018 by people aged 12 or older is evident in people across a broad range of demographic groups, including sex, race or ethnicity, military veterans, income and education levels, employment status, and geographic categories, with few exceptions (see figures 3 through 5). Additionally, the estimated percentage of drug misuse within certain demographic groups increased for some years and decreased for others, in every year more than 10 percent of the people in every demographic group reported misusing drugs. The rate of drug overdose deaths in the United States increased between 2002 and 2018 (see fig. 6). For context, in 2002, there were 23,518 drug overdose deaths, and in 2018, there were 67,367 drug overdose deaths, according to CDC data. Furthermore, the rate of drug overdose deaths increased more rapidly in recent years; the rate increased on average by 2 percent per year from 2006 through 2013, and by 14 percent per year from 2013 through 2016; however, the rate decreased by 4.6 percent between 2017 and 2018. Rates of drug overdose deaths varied in counties across the nation in 2003 and 2017, the most recent year that county-level data were available (see fig. 7). In 2017, there were some areas of the country with high rates of drug overdose deaths. For example, in 2017, 1,354 counties (43.2 percent of counties) had estimates of more than 20 drug overdose deaths per 100,000 people, including 448 counties with rates that were significantly higher than this amount. The rate of overdose deaths for different types of drugs increased between 2002 and 2018. Rates of drug overdose deaths involving synthetic opioids, natural and semi-synthetic opioids, methadone, heroin, cocaine, benzodiazepines, psychostimulants, and antidepressants generally increased between 2002 and 2018 (see fig. 8). It is important to note that drug overdose deaths may involve more than one drug, and the drugs most frequently involved in overdose deaths were often found in combination with each other. The most common drugs involved in overdose deaths vary in different parts of the United States, according to data for each of the 10 HHS public health regions (see fig. 9). Generally, in eastern regions, fentanyl was the most common drug involved in overdose deaths in 2017, the most recent year that data were available, whereas methamphetamine was the most common drug involved in overdose deaths in western regions. As previously discussed, many drug overdose deaths involve more than one drug. Past GAO work, as well as other selected government and academic studies, have found that drug misuse results in high costs for society and the economy. Such costs vary and include health care costs, criminal justice costs, workplace productivity costs, education costs, human services costs, and mortality costs. Figure 10 below includes examples of costs and other effects of drug misuse in these areas. These costs are born by federal, state, and local governments; private businesses and nonprofit organizations; employers; families, and individuals who misuse drugs. While selected studies we reviewed provided estimates for some of the costs of drug misuse, one study also indicated it is difficult to precisely quantify these costs. For example, concepts such as the quality of life or the pain and suffering of family members are difficult to fully capture or quantify. Our recent work on the topic of drug misuse and its effects has highlighted challenges the federal government faces that impede national efforts to address the drug crisis. We categorized these challenges as related to sustained leadership and strengthened coordination; capacity to address the crisis; and measurement, evaluation, and demonstration of progress. In the course of our work on the topic of drug misuse, we have identified many actions that if taken could help to address challenges in each of these areas, and have made specific recommendations to federal agencies about these actions. While over 25 of these recommendations have been implemented by National Drug Control Program agencies since fiscal year 2015, over 60 of our recommendations to at least 10 federal agencies—including recommendations that have received our highest priority designation— have not yet been implemented as of February 2020. The information below describes our findings and how agencies’ inaction on our recommendations has contributed to the federal government’s lack of progress in addressing the drug crisis. Sustained leadership and strengthened coordination. Making progress in high-risk areas requires demonstrated, strong, and sustained commitment and coordination, which we have found to be a challenge facing the federal government’s drug control efforts. Our work has identified the need for ONDCP to improve its efforts to lead and coordinate the national effort to address drug misuse and for agency leaders to engage in more effective coordination across the government and with stakeholders. ONDCP has a responsibility to coordinate and oversee the implementation of the national drug control policy across the federal government, and the National Drug Control Program agencies also have important roles and responsibilities that involve reducing drug misuse and mitigating its effects. ONDCP’s responsibility to develop the National Drug Control Strategy offers the office an important opportunity to help prioritize, coordinate, and measure key efforts to address the drug crisis. Our work has shown that ONDCP can improve its efforts to develop a National Drug Control Strategy that meets statutory requirements and effectively coordinates national efforts to address drug misuse. In 2017 and 2018, ONDCP lacked a statutorily required National Drug Control Strategy, and we recently reported that the 2019 National Drug Control Strategy did not fully comply with the law. In December 2019, we recommended that ONDCP develop and document key planning elements to help ONDCP structure its ongoing efforts and to better position the agency to meet these requirements for future iterations of the National Drug Control Strategy. ONDCP subsequently issued the 2020 National Drug Control Strategy on February 3, 2020. We reviewed this Strategy and found that it made progress in addressing several statutory requirements. For example: The 2020 National Drug Control Strategy includes 17 annual quantifiable and measurable objectives and specific targets, such as reducing overdose deaths by 15 percent by 2022, whereas we found that the 2019 National Drug Control Strategy did not contain such annual targets. The 2020 Strategy also includes a description of how each of the Strategy’s long-range goals was determined, including required consultations and data used to inform the determination, and a list of anticipated challenges to achieving the Strategy’s goals, such as limitations in existing data systems that provide little insight into emerging patterns of drug misuse, and planned actions to address them. However, the 2020 Strategy fell short in meeting other requirements. For example, the 2020 Strategy does not include a list of each National Drug Control Program agencies’ activities and the role of each activity in achieving the Strategy’s long-range goals, as required by law. The federal government invests billions of dollars each year in programs spanning over a dozen agencies, and therefore the development and implementation of a comprehensive Strategy is critical to guiding and ensuring the effectiveness of federal activities to address drug misuse. In December 2019, we recommended that ONDCP routinely implement an approach to meet the requirements for future Strategy iterations, and ONDCP agreed. ONDCP is uniquely situated to promote coordination across federal agencies. For example, the National Drug Control Strategy is required to include a description of how each of the Strategy’s long-range goals will be achieved, including a list of each existing or new coordinating mechanism to achieve each goal and a description of ONDCP’s role in facilitating achievement of each goal. The 2020 Strategy partially addressed these required elements. By including these descriptions in future iterations of the Strategy and effectively implementing them, ONDCP has the potential to strengthen coordination and provide sustained leadership. ONDCP has previously used its unique position to help implement some of our recommendations aimed at improving coordination across federal agencies in their efforts to prevent and respond to drug misuse. For example, ONDCP implemented our recommendation to assess the extent of overlap and potential for duplication across federal programs engaged in drug abuse prevention and treatment activities and to identify opportunities for increased coordination as well as developed performance metrics and reporting data regarding field-based coordination to prevent drug trafficking. We have also reported on the lack of available treatment programs for pregnant women and newborns with neonatal abstinence syndrome as well as gaps in research related to the treatment of prenatal opioid use. As of February 2020, ONDCP implemented our recommendation to document the process the agency uses to identify gaps and action items to track federal activities related to prenatal opioid use and neonatal abstinence syndrome. Sustaining and building on these coordination efforts will help maximize opportunities, leverage resources, and better position ONDCP to identify opportunities for increased efficiencies in preventing and treating drug misuse. National Drug Control Program agencies also have a responsibility to coordinate their efforts, and we have reported that gaps in agency coordination have hindered national drug control efforts. For example, the Department of Homeland Security (DHS), the U.S. Postal Service (USPS), and U.S. Customs and Border Protection (CBP) each have important roles in enforcing certain data-sharing and enforcement requirements of the Synthetics Trafficking and Overdose Prevention Act of 2018 (STOP Act). The STOP Act requires DHS to promulgate regulations detailing additional USPS responsibilities—beyond those included in the Act—related to sharing advance electronic data with CBP that can be used to identify shipments at high risk of transporting illegal drugs by October 24, 2019. However, as of November 2019, DHS had not drafted these regulations, and therefore USPS’s and CBP’s responsibilities for sharing advance electronic data—a key tool that could help stop the flow of illicit drugs into the United States—remain unclear. As we reported in December 2019, DHS does not have a plan for drafting these regulations, and therefore we recommended that DHS develop a timeline to do so; DHS agreed with this recommendation. It is also important for the federal government to coordinate among different levels of government and across issue areas, including with state, local, and tribal agencies, as well as with community groups and organizations in the private sector working to address the drug crisis. Our prior work has also found ways in which coordination between federal efforts to address drug misuse and those of local governments and other stakeholders could be more effective. In January 2018, we reported that states cited the need for additional guidance, training, and technical assistance from HHS to address the needs of infants born with prenatal drug exposure. HHS disagreed with our recommendation to provide such guidance regarding the safe care for substance-affected infants, and has not implemented the recommendation. HHS stated that it had already clarified guidance in this area and believed that states needed flexibility to meet the program requirements in the context of each state’s program. We found that states continued to report issues with the guidance, and that the clarifications did not address an ongoing challenge regarding the program requirements. We continue to believe our recommendation is warranted. As of February 2020, HHS continues to disagree with us and with the states. Without adequate supports and services to ensure their safety, these vulnerable infants may be at risk for child abuse and neglect. We have also recently recommended in January 2020 that DEA should, in consultation with industry stakeholders—such as drug distributors— identify solutions to address the limitations of the ARCOS Enhanced Lookup Buyer Statistic Tool, to ensure industry stakeholders have the most useful information possible to assist them in identifying and reporting suspicious opioid orders to DEA. DEA agreed with our recommendation, and is starting to assess how to address this recommendation. These limitations, including a lack of appropriately detailed data, may limit the usefulness of the tool in assisting distributors in determining whether an order is suspicious. In addition, we have previously reported in 2019 that coordination across private health plans, health-care prescribers, pharmacists, and at-risk beneficiaries could contribute to the success of Medicare drug monitoring programs, which are designed to identify beneficiaries at risk of opioid misuse. We also have ongoing work on how federal departments and agencies coordinate their drug prevention efforts in schools as well as on how effectively federal agencies coordinated their counter-drug activities with Mexico. Capacity to address the crisis. We have identified ongoing challenges related to the nation’s capacity to address the drug crisis. Sufficient capacity and efficient use of that capacity are key components for making progress in high-risk areas; they are necessary for federal, state, and local agencies to achieve strategic goals in addressing drug misuse, such as implementing the National Drug Control Strategy. In our work designating high-risk government programs and functions, we define capacity as having the people and resources sufficient to address the risk. Our prior work has found that the nation faces insufficient capacity to successfully address persistent, troubling trends in drug misuse, including the lack of treatment options. In addition, the nation’s existing capacity may be plagued by inefficiencies and gaps in information about what resources are most effective in addressing drug misuse. These capacity challenges permeate every level of government and affect the nation’s key social services and health care programs. As a result, effectively addressing the drug crisis requires harnessing capacity across agencies within the federal government as well as coordinating with state and local governments and community-based nongovernment organizations. The availability of treatment for substance use disorders has not kept pace with needs, and the federal government has faced barriers to increasing treatment capacity. For example, we have reported on barriers to increasing access to evidence-based treatment for opioid use disorder, and federal efforts to address these barriers. Such barriers to treatment include a lack of Medicaid coverage for treatment medications in some states, delays that can be caused by the need for prior authorizations for some treatment medications, and the unwillingness of some health care providers to obtain the federal waiver required to prescribe some treatment medications. We have also reported that, according to officials at the Veterans Health Administration (VHA), many veterans lack access to residential substance use treatment programs because of high demand relative to capacity. Developing and maintaining sufficient capacity to address the drug crisis also requires that federal agencies use existing resources—such as data—effectively. For example, we have recently reported in January 2020 that DEA should be more proactive in using the data it already collects from DEA registrants to identify problematic drug transaction patterns. According to DEA officials, one analysis that they conduct on a quarterly basis involves using a computer algorithm when comparing large volumes of drugs purchased in a given geographic area to the area’s population data. However, DEA did not report conducting active and recurring monitoring of transactions using algorithms to detect and flag transactions that indicate potential diversion, either on a real-time or near real-time basis, to help identify questionable patterns in the data or unusual patterns of drug distribution on a more routine basis. Such analyses could be used to proactively support or generate leads for investigations of potential drug diversion. Registrants already report data on controlled-substance transactions to the DEA. DEA could use these data to identify trends in distribution or purchases of drugs in a given geographic area. DEA could also look for and compare unusual patterns in drug order activity in different locations to identify potential issues that warrant further investigation. Further, DEA has not established a way to manage all of the data it collects and maintains. DEA agreed with three of our four recommendations to better manage and use the data it collects. DEA neither agreed nor disagreed with the fourth recommendation. However, DEA has not yet implemented any of the recommendations. By implementing these recommendations, DEA could ensure that important data assets are formally managed and fully utilized to inform investigations and prevent diversion of prescription opioids to be sold illegally. Overall, federal efforts to address the drug crisis could make better use of available data to assist in identifying emerging patterns of misuse, allowing the government to respond more quickly to evolving trends. Beyond specific capacity challenges that we have identified, in December 2019 we reported on challenges federal agencies face in assessing the resources they will need to achieve the goals of the National Drug Control Strategy. ONDCP is required to issue drug control funding guidance to the heads of departments and agencies with responsibilities under the National Drug Control Program by July 1 of each year, and such funding guidance must address funding priorities developed in the National Drug Control Strategy. Since ONDCP did not issue a Strategy in 2017 or 2018, ONDCP could neither provide funding guidance to National Drug Control Program agencies based on the Strategy, nor could it review and certify budget requests of these agencies to determine if they are adequate to meet the goals of the Strategy, in accordance with and as required by law. Without a National Drug Control Strategy in 2017 or 2018, ONDCP used other sources—such as policy priorities identified in the President’s Budget from fiscal year 2018—to identify drug policy priorities and develop funding guidance. ONDCP issued a National Drug Control Strategy in 2019 and 2020, but neither Strategy included a 5-year projection for program and budget priorities, as required by law. In December 2019, we recommended that ONDCP develop and document key planning elements to help ONDCP structure its ongoing efforts and to better position the agency to meet these requirements for future iterations of the National Drug Control Strategy. We also found that the 2020 National Drug Control Strategy does not include estimates of federal funding or other resources needed to achieve each of ONDCP’s long-range goals. The 2020 Strategy includes a plan to expand treatment of substance use disorders that identifies unmet needs for substance use disorder treatment and a strategy for closing the gap between available and needed treatment. The plan also describes the roles and responsibilities of relevant National Drug Control Program agencies for implementing the plan. However, the plan does not identify resources required to enable National Drug Control Program agencies to implement the plan or resources required to eliminate the treatment gap, as required by law. The National Drug Control Strategy is important for assessing the nation’s capacity to address drug misuse through both the development of federal funding estimates and the certification of agency budget requests that aim to meet the goals of the Strategy. Additionally, we have ongoing work on the federal government’s capacity to address the drug crisis. For example, we are studying gaps in the capacity of the health care system to treat substance use disorders, and examining how grantees use funding from selected SAMHSA grant programs to increase access to substance use disorder treatment. We are also studying school-based drug prevention programs and the effects of drug misuse on the workforce. This work will examine challenges that states and local educational entities face in serving the needs of communities affected by the drug crisis. We also have planned work examining the effectiveness of federal funding to combat the ongoing opioid crisis. Measurement, evaluation, and demonstration of progress. The federal government faces challenges related to measuring, evaluating, and demonstrating progress towards addressing the crisis. We have reported that key data needed to measure and evaluate progress towards strategic goals are not reliable or are not collected and reported. We have also found that some agencies lack plans or metrics to measure the effectiveness of specific programs to address the drug crisis and to demonstrate that these programs are making progress towards stated national goals, including reducing drug overdose deaths and expanding access to addiction treatment. Successfully addressing drug misuse requires ongoing measurement and evaluation of efforts towards stated goals and the ability to share and use performance information to make midcourse changes and corrections where needed. Regarding challenges related to data, we have identified gaps in the availability and reliability of data for measuring progress. ONDCP and other federal, state, and local government officials have identified challenges with the timeliness, accuracy, and accessibility of data from law enforcement and public health sources related to both fatal and non- fatal overdose cases. In March 2018, we recommended that ONDCP lead a review on ways to improve overdose data; ONDCP did not indicate whether it agreed with our recommendation. Additionally, in December 2019, we found that ONDCP’s Drug Control Data Dashboard did not include all of the data required by the SUPPORT Act, such as data sufficient to show the extent of the unmet need for substance use disorder treatment. We recommended that ONDCP establish the planning elements to ensure that these data were included in the Data Dashboard, and ONDCP disagreed with our recommendation. Having accessible and reliable data, including data on drug overdoses will help ONDCP and other agencies better measure the scope and nature of the drug crisis. We also found in 2019 that the State Department cannot ensure the reliability of its program monitoring data for its Caribbean Basin Security Initiative, which seeks to reduce illicit drug trafficking. The State Department agreed with the recommendation to ensure the development and implementation of a data management system for centrally collecting reliable program monitoring data for all Caribbean Basin Security Initiative activities, but has not yet implemented it. Without this action, there may be discrepancies in how Caribbean Basin Security Initiative program performance data is defined and collected, and the State Department cannot report comprehensively or accurately on the Initiative’s activities to reduce illicit drug trafficking or track data trends across countries. While ONDCP is responsible for evaluating the effectiveness of national drug control policy efforts across the government, we found that ONDCP has not developed performance evaluation plans for the goals in the 2020 National Drug Control Strategy. Some of the long-range goals listed in the 2020 Strategy include expanding access to evidence-based treatment, reducing the availability of illicit drugs in the United States, and decreasing the over-prescribing of opioid medications. However, the 2020 National Drug Control Strategy does not include performance evaluation plans to measure progress against each of the Strategy’s long-range goals, as required by law. These performance evaluation plans are required by statute to include (1) specific performance measures for each National Drug Control Program agency, (2) annual and—to the extent practicable—quarterly objectives and targets for each measure, and (3) an estimate of federal funding and other resources necessary to achieve each performance objective and target. Without effective long-term plans that clearly articulate goals and objectives and without specific measures to track performance, federal agencies cannot fully assess whether taxpayer dollars are invested in ways that will achieve desired outcomes such as reducing access to illicit drugs and expanding treatment for substance use disorders. Additionally, National Drug Control Program agencies are responsible for evaluating their progress toward achieving the goals of the National Drug Control Strategy, and in some cases have improved how to measure this progress. For example, although the federal government continues to face barriers to increasing access to treatment for substance use disorders, HHS has recently implemented our recommendation to establish performance measures with targets to expand access to medication-assisted treatment (MAT) for opioid use disorders. As of March 2020, HHS has established such performance measures with targets to increase the number of prescriptions for MAT medications and to increase treatment capacity, as measured by the number of providers authorized to treat patients using MAT. Monitoring progress against these targets will help HHS determine whether its efforts to expand treatment are successful or whether new approaches are needed. We have also identified challenges regarding how federal agencies demonstrate the progress of specific programs toward addressing the drug crisis. We reported in 2018 on DEA’s 360 Strategy—which aims to coordinate DEA enforcement, diversion control, and demand reduction efforts—as well as on ONDCP’s Heroin Response Strategy under its High Intensity Drug Trafficking Areas program. We found that neither DEA’s 360 Strategy nor ONDCP’s Heroin Response Strategy included outcome- oriented performance measures for its activities and goals, respectively. DEA disagreed with and has not yet implemented our recommendation to establish these types of performance measures for its activities. ONDCP neither agreed nor disagreed with our recommendation to establish outcome-oriented performance measures for the goals of the Heroin Response Strategy, and has not yet implemented the recommendation. Without these measures, it is unclear the extent to which DEA or ONDCP can accurately and fully gauge their efforts and their overall effectiveness in combatting heroin and opioid use and reducing overdose deaths. Additionally, we have found that DEA does not have outcome-oriented goals and performance targets for its use of data in opioid diversion activities, making DEA likely not able to adequately assess whether its investments and efforts are helping to limit the availability of and better respond to the opioid prescription diversion threat. DEA neither agreed nor disagreed with our recommendation to establish these outcome- oriented goals and related performance targets for its opioid diversion activities, and has not implemented this recommendation. We have also reported that the Department of State has not established performance indicators for its Caribbean Basin Security Initiative to facilitate performance evaluation across agencies, countries, and activities, inhibiting the assessment of the program’s progress to reduce illicit drug trafficking. The State Department agreed with our recommendation to develop and implement a data management system for centrally collecting reliable program monitoring data. The State Department has not yet implemented this recommendation. Without robust assessments of how specific programs help to achieve the goals of the National Drug Control Strategy, federal agencies may be unable to demonstrate progress in addressing the drug crisis, and may be unable to make any needed adjustments to their strategies. Illicit drug use and misuse of prescription drugs is a long-standing national problem that will continue to evolve. The terrible effects of drug misuse on families and communities have persisted over decades, despite ongoing federal, state, and local efforts. Federal agencies and Congress can and must work to ensure that available resources are coordinated effectively to mitigate and respond to the drug misuse crisis. Maintaining sustained attention on preventing, responding to, and recovering from drug misuse will be challenging in the coming months as many of the federal agencies responsible for addressing drug misuse are currently focused on addressing the COVID-19 pandemic. However, the severe public health and economic effects of the pandemic could fuel some of the contributing factors of drug misuse, such as unemployment— highlighting the need to sustain drug misuse prevention, response, and recovery efforts. Addressing these challenges will require sustained leadership and strengthened coordination; the necessary capacity to address the crisis; and the systems to measure, evaluate, and demonstrate progress. The more than 60 related GAO recommendations that have yet to be implemented are an indication of how federal agencies may begin addressing these challenges. For example: ONDCP should ensure future iterations of the National Drug Control Strategy include all statutorily required elements. Examples of statutorily required elements include a 5-year projection for the National Drug Control Program and budget priorities; a description of how each of the Strategy’s long-range goals will be achieved, including a list of each National Drug Control Program agency’s activities, and the role of each activity in achieving these goals, and estimates of federal funding or other resources needed to achieve these goals; performance evaluation plans for each year covered by the Strategy for each long-range goal for each National Drug Control Program agency; and resources required to enable National Drug Control Program agencies to implement the plan to expand treatment of substance use disorders and eliminate the treatment gap; ONDCP should take steps to ensure effective, sustained implementation of the 2020 National Drug Control Strategy and future strategies; HHS should provide guidance to states for the safe care for infants born with prenatal drug exposure, who may be at risk for child abuse and neglect; DEA should take steps to better analyze and use drug transaction data to identify suspicious opioid orders and prevent diversion of prescription opioids to be sold illegally; and the State Department should develop and implement a data management system for all Caribbean Basin Security Initiative activities to reduce illicit drug trafficking or track data trends across countries. Through our ongoing and planned work, we will continue to review the effects of drug misuse, the federal response, and opportunities for improvement. We provided draft report excerpts regarding our analysis of the 2020 National Drug Control Strategy to the Office of National Drug Control Policy for review and comment. ONDCP officials stated that they plan to address the statutory requirements that we identified as missing in additional documents, including the Fiscal Year 2021 Budget and Performance Summary. We will review and assess any additional materials that ONDCP publishes in response to the requirements for the 2020 National Drug Control Strategy. Findings regarding other programs and activities are drawn from past GAO work and our follow-up work on our recommendations; the related content was previously provided to the respective agencies for review as part of the original work. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of National Drug Control Policy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Triana McNeil at (202) 512-8777 or McNeilT@gao.gov, Mary Denigan- Macauley at (202) 512-7114 or DeniganMacauleyM@gao.gov, or Jacqueline M. Nowicki at (617) 788-0580 or NowickiJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. International Mail: Stakeholders' Views on Possible Changes to Inbound Mail Regarding Customs Fees and Opioid Detection Efforts. GAO-20- 340R. Washington, D.C.: February 27, 2020. Medicaid: States' Changes to Payment Rates for Substance Use Disorder Services. GAO-20-260. Washington, D.C.: January 30, 2020. Drug Control: Actions Needed to Ensure Usefulness of Data on Suspicious Opioid Orders. GAO-20-118. Washington, D.C.: January 29, 2020. Opioid Use Disorder: Barriers to Medicaid Beneficiaries’ Access to Treatment Medications. GAO-20-233. Washington, D.C.: January 24, 2020. Social Security Disability: Action Needed to Help Agency Staff Understand and Follow Policies Related to Prescription Opioid Misuse. GAO-20-120. Washington, D.C.: January 9, 2020. Countering Illicit Finance and Trade: U.S. Efforts to Combat Trade-Based Money Laundering. GAO-20-314R. Washington, D.C.: December 30, 2019. Drug Control: The Office of National Drug Control Policy Should Develop Key Planning Elements to Meet Statutory Requirements. GAO-20-124. Washington, D.C.: December 18, 2019. International Mail: Progress Made in Using Electronic Data to Detect Illegal Opioid Shipments, but Additional Steps Remain. GAO-20-229R. Washington, D.C.: December 18, 2019. Counternarcotics: Treasury Reports Some Results from Designating Drug Kingpins, but Should Improve Information on Agencies’ Expenditures. GAO-20-112. Washington, D.C.: December 16, 2019. Mental Health and Substance Use: State and Federal Oversight of Compliance with Parity Requirements Varies. GAO-20-150. Washington, D.C.: December 13, 2019. Veterans Health Care: Services for Substance Use Disorders, and Efforts to Address Access Issues in Rural Areas. GAO-20-35. Washington, D.C.: December 2, 2019. Coast Guard: Assessing Deployable Specialized Forces' Workforce Needs Could Improve Efficiency and Reduce Potential Overlap or Gaps in Capabilities. GAO-20-33. Washington, D.C.: November 21, 2019. Substance Use Disorder: Prevalence of Recovery Homes, and Selected States’ Investigations and Oversight. GAO-20-214T. Washington, D.C.: October 24, 2019. Medicaid: Opioid Use Disorder Services for Pregnant and Postpartum Women, and Children. GAO-20-40. Washington, D.C.: October 24, 2019. U.S. Assistance to Central America: Department of State Should Establish a Comprehensive Plan to Assess Progress Toward Prosperity, Governance, and Security. GAO-19-590. Washington, D.C.: September 26, 2019. Science & Tech Spotlight: Opioid Vaccines. GAO-19-706SP. Washington, D.C.: September 16, 2019. U.S. Assistance to Mexico: State and USAID Allocated over $700 Million to Support Criminal Justice, Border Security, and Related Efforts from Fiscal Year 2014 through 2018. GAO-19-647. Washington, D.C.: September 10, 2019. Prescription Opioids: Patient Options for Safe and Effective Disposal of Unused Opioids. GAO-19-650. Washington, D.C.: September 3, 2019. Land Ports of Entry: CBP Should Update Policies and Enhance Analysis of Inspections. GAO-19-658. Washington, D.C.: August 6, 2019. Drug Control: Certain DOD and DHS Joint Task Forces Should Enhance Their Performance Measures to Better Assess Counterdrug Activities. GAO-19-441. Washington, D.C.: July 9, 2019. VA Mental Health: VHA Improved Certain Prescribing Practices, but Needs to Strengthen Treatment Plan Oversight. GAO-19-465. Washington, D.C.: June 17, 2019. Health Centers: Trends in Revenue and Grants Supported by the Community Health Center Fund. GAO-19-496. Washington, D.C.: May 30, 2019. Prescription Opioids: Voluntary Medicare Drug Management Programs to Control Misuse. GAO-19-446. Washington, D.C.: May 20, 2019. Drug Policy: Assessing Treatment Expansion Efforts and Drug Control Strategies and Programs. GAO-19-535T. Washington, D.C.: May 9, 2019. Drug Policy: Preliminary Observations on the 2019 National Drug Control Strategy. GAO-19-370T. Washington, D.C.: March 7, 2019. Behavioral Health: Research on Health Care Costs of Untreated Conditions is Limited. GAO-19-274. Washington, D.C.: February 28, 2019. Security Assistance: U.S. Agencies Should Establish a Mechanism to Assess Caribbean Basin Security Initiative Progress. GAO-19-201. Washington, D.C.: February 27, 2019. Drug Control: DOD Should Improve Its Oversight of the National Guard Counterdrug Program.GAO-19-27. Washington, D.C.: January 17, 2019. Colombia: U.S. Counternarcotics Assistance Achieved Some Positive Results but State Needs to Review the Overall U.S. Approach. GAO-19-106. Washington, D.C.: December 12, 2018. Illegal Marijuana: Opportunities Exist to Improve Oversight of State and Local Eradication Efforts. GAO-19-9. Washington, D.C.: November 14, 2018. Opioid Crisis: Status of Public Health Emergency Authorities. GAO-18-685R. Washington, D.C.: September 26, 2018. Adolescent and Young Adult Substance Use: Federal Grants for Prevention, Treatment, and Recovery Services and for Research. GAO-18-606. Washington, D.C.: September 4, 2018. Foster Care: Additional Actions Could Help HHS Better Support States’ Use of Private Providers to Recruit and Retain Foster Families. GAO-18-376. Washington, D.C.: May 30, 2018. VA Health Care: Progress Made Towards Improving Opioid Safety, but Further Efforts to Assess Progress and Reduce Risk Are Needed. GAO-18-380. Washington, D.C.: May 29, 2018. Prescription Opioids: Medicare Needs Better Information to Reduce the Risk of Harm to Beneficiaries. GAO-18-585T. Washington, D.C.: May 29, 2018. Illicit Opioids: Office of National Drug Control Policy and Other Agencies Need to Better Assess Strategic Efforts. GAO-18-569T. Washington, D.C.: May 17, 2018. Substance Use Disorder: Information on Recovery Housing Prevalence, Selected States’ Oversight, and Funding. GAO-18-315. Washington, D.C.: March 22, 2018. Illicit Opioids: While Greater Attention Given to Combating Synthetic Opioids, Agencies Need to Better Assess their Efforts. GAO-18-205. Washington, D.C.: March 29, 2018. Substance-Affected Infants: Additional Guidance Would Help States Better Implement Protections for Children. GAO-18-196. Washington, D.C.: January 19, 2018. Prescription Opioids: Medicare Should Expand Oversight Efforts to Reduce the Risk of Harm. GAO-18-336T. Washington, D.C.: January 17, 2018. Preventing Drug Abuse: Low Participation by Pharmacies and Other Entities as Voluntary Collectors of Unused Prescription Drugs. GAO-18-25. Washington, D.C.: October 12, 2017. Border Patrol: Issues Related to Agent Deployment Strategy and Immigration Checkpoints. GAO-18-50. Washington, D.C.: November 8, 2017. Prescription Opioids: Medicare Needs to Expand Oversight Efforts to Reduce the Risk of Harm. GAO-18-15. Washington, D.C.: October 6, 2017. Opioid Use Disorders: HHS Needs Measures to Assess the Effectiveness of Efforts to Expand Access to Medication-Assisted Treatment. GAO-18-44. Washington, D.C.: October 31, 2017. Counternarcotics: Overview of U.S. Efforts in the Western Hemisphere. GAO-18-10. Washington, D.C.: October 13, 2017. Newborn Health: Federal Action Needed to Address Neonatal Abstinence Syndrome. GAO-18-32. Washington, D.C.: October 4, 2017. Anti-Money Laundering: U.S. Efforts to Combat Narcotics-Related Money Laundering in the Western Hemisphere. GAO-17-684. Washington, D.C.: August 22, 2017. Nonviolent Drug Convictions: Stakeholders’ Views on Potential Actions to Address Collateral Consequences. GAO-17-691. Washington, D.C.: September 7, 2017. Medicaid: States Fund Services for Adults in Institutions for Mental Disease Using a Variety of Strategies. GAO-17-652. Washington, D.C.: August 9, 2017. International Mail Security: Costs and Benefits of Using Electronic Data to Screen Mail Need to Be Assessed. GAO-17-606. Washington, D.C.: August 2, 2017. Drug Control Policy: Information on Status of Federal Efforts and Key Issues for Preventing Illicit Drug Use. GAO-17-766T. Washington, D.C.: July 26, 2017. Medicaid Expansion: Behavioral Health Treatment Use in Selected States in 2014. GAO-17-529. Washington, D.C.: June 22, 2017. Border Security: Additional Actions Could Strengthen DHS Efforts to Address Subterranean, Aerial, and Maritime Smuggling. GAO-17-474. Washington, D.C.: May 1, 2017. VA Health Care: Actions Needed to Ensure Medical Facilities’ Controlled Substance Programs Meet Requirements. GAO-17-442T. Washington, D.C.: February 27, 2017. VA Health Care: Actions Needed to Ensure Medical Facility Controlled Substance Inspection Programs Meet Agency Requirements. GAO-17-242. Washington, D.C.: February 15, 2017. Drug Free Communities Support Program: Agencies Have Strengthened Collaboration but Could Enhance Grantee Compliance and Performance Monitoring. GAO-17-120. Washington, D.C.: February 7, 2017. Highlights of a Forum: Preventing Illicit Drug Use. GAO-17-146SP. Washington, D.C.: November 14, 2016. Opioid Addiction: Laws, Regulations, and Other Factors Can Affect Medication-Assisted Treatment Access. GAO-16-833. Washington, D.C.: September 27, 2016. Drug Enforcement Administration: Additional Actions Needed to Address Prior GAO Recommendations. GAO-16-737T. Washington, D.C.: June 22, 2016. Controlled Substances: DEA Should Take Additional Actions to Reduce Risks in Monitoring the Continued Eligibility of Its Registrants. GAO-16-310. Washington, D.C.: May 26, 2016. Office of National Drug Control Policy: Progress toward Some National Drug Control Strategy Goals, but None Have Been Fully Achieved. GAO-16-660T. Washington, D.C.: May 17, 2016. Veterans Justice Outreach Program: VA Could Improve Management by Establishing Performance Measures and Fully Assessing Risks. GAO-16-393. Washington, D.C.: April 28, 2016. State Marijuana Legalization: DOJ Should Document Its Approach to Monitoring the Effects of Legalization. GAO-16-419T. Washington, D.C.: April 5, 2016. DOD and VA Health Care: Actions Needed to Help Ensure Appropriate Medication Continuation and Prescribing Practices. GAO-16-158. Washington, D.C.: January 5, 2016. State Marijuana Legalization: DOJ Should Document Its Approach to Monitoring the Effects of Legalization. GAO-16-1. Washington, D.C.: December 30, 2015. Office of National Drug Control Policy: Lack of Progress on Achieving National Strategy Goals. GAO-16-257T. Washington, D.C.: December 2, 2015. Drug Control: Additional Performance Information Is Needed to Oversee the National Guard’s State Counterdrug Program. GAO-16-133. Washington, D.C.: October 21, 2015. Medicaid: Additional Reporting May Help CMS Oversee Prescription-Drug Fraud Controls. GAO-15-390. Washington, D.C.: July 8, 2015. Prescription Drugs: More DEA Information about Registrants’ Controlled Substances Roles Could Improve Their Understanding and Help Ensure Access. GAO-15-471. Washington, D.C.: June 25, 2015. Behavioral Health: Options for Low-Income Adults to Receive Treatment in Selected States. GAO-15-449. Washington, D.C.: June 19, 2015. Drug-Impaired Driving: Additional Support Needed for Public Awareness Initiatives. GAO-15-293. Washington, D.C.: February 24, 2015. Prenatal Drug Use and Newborn Health: Federal Efforts Need Better Planning and Coordination. GAO-15-203. Washington, D.C.: February 10, 2015. Medicare Program Integrity: CMS Pursues Many Practices to Address Prescription Drug Fraud, Waste, and Abuse. GAO-15-66. Washington, D.C.: October 24, 2014. Office of National Drug Control Policy: Office Could Better Identify Opportunities to Increase Program Coordination. GAO-13-333. Washington, D.C.: March 26, 2013. Drug Control: Initial Review of the National Strategy and Drug Abuse Prevention and Treatment Programs. GAO-12-744R. Washington, D.C.: July 6, 2012. Prescription Pain Reliever Abuse: Agencies Have Begun Coordinating Education Efforts, but Need to Assess Effectiveness. GAO-12-115. Washington, D.C.: December 22, 2011. Adult Drug Courts: Studies Show Courts Reduce Recidivism, but DOJ Could Enhance Future Performance Measure Revision Efforts. GAO-12-53. Washington, D.C.: December 9, 2011. Drug Control: U.S. Assistance Has Helped Mexican Counternarcotics Efforts, but Tons of Illicit Drugs Continue to Flow into the United States. GAO-07-1018. Washington, D.C.: August 17, 2007. Adult Drug Courts: Evidence Indicates Recidivism Reductions and Mixed Results for Other Outcomes. GAO-05-219. Washington, D.C.: February 28, 2005. Prescription Drugs: OxyContin Abuse and Diversion and Efforts to Address the Problem. GAO-04-110. Washington, D.C.: December 19, 2003. Drug Courts: Better DOJ Data Collection and Evaluation Efforts Needed to Measure Impact of Drug Court Programs. GAO-02-434. Washington, D.C.: April 18, 2002. Drug Abuse: Efforts under Way to Determine Treatment Outcomes. T-HEHS-00-60. Washington, D.C.: February 17, 2000. Emerging Drug Problems: Despite Changes in Detection and Response Capability, Concerns Remain. HEHS-98-130. Washington, D.C.: July 20, 1998. Drug Courts: Overview of Growth, Characteristics, and Results. GGD-97- 106. Washington, D.C.: July 31, 1997. Drug Control: Reauthorization of the Office of National Drug Control Policy. T-GGD-97-97. Washington, D.C.: May 1, 1997. Confronting the Drug Problem: Debate Persists on Enforcement and Alternative Approaches. GGD-93-82. Washington, D.C.: July 1, 1993. War on Drugs: Federal Assistance to State and Local Drug Enforcement. GGD-93-86. Washington, D.C.: April 29, 1993. Drug Control: Coordination of Intelligence Activities.GGD-93-83BR. Washington, D.C.: April 2, 1993. Drug Abuse Prevention: Federal Efforts to Identify Exemplary Programs Need Stronger Design. PEMD-91-15. Washington, D.C.: August 22, 1991. VA Health Care: Inadequate Controls over Addictive Drugs. HRD-91-101. Washington, D.C.: June 6, 1991. The War on Drugs: Arrests Burdening Local Criminal Justice Systems. GGD-91-40. Washington, D.C.: April 3, 1991. Drug Treatment: Targeting Aid to States Using Urban Population as Indicator of Drug Use. HRD-91-17. Washington, D.C.: November 27, 1990. Controlling Drug Abuse: A Status Report. GGD-88-39. Washington, D.C.: March 1, 1988. Drug Abuse Prevention: Further Efforts Needed To Identify Programs That Work. HRD-88-26. Washington, D.C.: December 4, 1987. Comprehensive Approach Needed To Help Control Prescription Drug Abuse. GGD-83-2. Washington, D.C.: October 29, 1982. Action Needed To Improve Management and Effectiveness of Drug Abuse Treatment. HRD-80-32 Washington, D.C.: April 14, 1980. Identifying and Eliminating Sources of Dangerous Drugs: Efforts Being Made, but Not Enough. B-175425. Washington, D.C.: Jun 7, 1974. United States Efforts to Increase International Cooperation in Controlling Narcotics Trafficking. B-176625. Washington, D.C.: October 4, 1972. Efforts to Prevent Dangerous Drugs from Illicitly Reaching the Public. B- 175425. Washington, D.C.: April 17, 1972. Triana McNeil at (202) 512-8777 or McNeilT@gao.gov; Mary Denigan- Macauley at (202) 512-7114 or DeniganMacauleyM@gao.gov; or Jacqueline M. Nowicki at (617) 788-0580 or NowickiJ@gao.gov. In addition to the contacts named above, Alana Finley (Assistant Director), Bill Keller (Assistant Director), Will Simerl (Assistant Director), Meghan Squires (Analyst-in-Charge), James Bennett, Ben Bolitzer, Breanne Cave, Billy Commons, Holly Dye, Wendy Dye, Brian Egger, Kaitlin Farquharson, Sally Gilley, Sarah Gilliland, Mara McMillen, Amanda Miller, Sean Miskell, Jan Montgomery, Dae Park, Bill Reinsberg, Emily Wilson Schwark, Herbie Tinsley, and Sirin Yaemsiri made key contributions to this report. Key contributors to the prior work discussed in this report are listed in each respective product.", "summary": "Drug misuse—the use of illicit drugs and the misuse of prescription drugs—has been a persistent and long-standing public health issue in the United States. Ongoing drug control efforts seek to address drug misuse through education and prevention, addiction treatment, and law enforcement and drug interdiction, as well as programs that serve populations affected by drug misuse. These efforts involve federal, state, local, and tribal governments as well as community groups and the private sector. In recent years, the federal government has spent billions of dollars and has enlisted more than a dozen agencies to address drug misuse and its effects. This report provides information on (1) trends in drug misuse (2) costs and other effects of drug misuse on society and the economy, and (3) challenges the nation faces in addressing the drug crisis. GAO analyzed nationally representative federal data on drug misuse and deaths from overdoses for 2002–2018 (the most recent available); reviewed selected empirical studies published from 2014–2019; and compared GAO's High-Risk list criteria to findings and recommendations in over 75 GAO reports issued from fiscal year 2015 through March 2020. Nationally, since 2002, rates of drug misuse have increased, according to GAO's analysis of federal data. In 2018, the Substance Abuse and Mental Health Services Administration reported that an estimated 19 percent of the U.S. population (over 53 million people) misused or abused drugs, an increase from an estimated 14.7 percent in 2003. People across a broad range of demographic groups—including sex, race or ethnicity, education levels, employment status, and geographic categories—reported misusing drugs (see figure below). The rates of drug overdose deaths have also generally increased nationally since the early 2000s. Over 716,000 people have died of a drug overdose since 2002, and in 2018 alone, over 67,000 people died as a result of a drug overdose, according to the Centers for Disease Control and Prevention. Although the number of drug overdose deaths in 2018 decreased compared to 2017, drug misuse in the United States continued to rise. Rates of drug overdose deaths varied in counties across the nation in 2003 and 2017, the most recent year that county-level data were available (see figure below). In 2017, 43.2 percent of counties had estimates of more than 20 drug overdose deaths per 100,000 people, including 448 counties with rates that were significantly higher than this amount. Note: CDC's National Center for Health Statistics used a statistical model to estimate rates of drug overdose deaths to account for counties where data were sparse because of small population size. GAO work and other government and academic studies have found that the negative health and societal effects of drug misuse are widespread and costly—for example, the increased need for health care, human services, and special education; increased crime, childhood trauma, reduced workforce productivity; and loss of life. The federal government is making progress in some areas, but a strategic, coordinated, and effective national response—with key sustained leadership from federal agencies—is needed. This report identifies opportunities to strengthen the federal government's efforts to address this persistent and increasing problem. These opportunities include addressing challenges in providing sustained leadership and strengthened coordination; the necessary capacity to address the crisis; and systems to measure, evaluate, and demonstrate progress. For example: the Office of National Drug Control Policy should ensure future iterations of the National Drug Control Strategy include all statutorily required elements. Examples of statutorily required elements include a 5-year projection for the National Drug Control Program and budget priorities; a description of how each of the Strategy's long-range goals will be achieved, including estimates of needed federal resources; and performance evaluation plans for these goals, among other requirements; the Office of National Drug Control Policy should ensure effective, sustained implementation of the 2020 Strategy and future strategies; the Department of Health and Human Services should provide guidance to states for the safe care for infants born with prenatal drug exposure, who may be at risk for child abuse and neglect; the Drug Enforcement Administration should take steps to better analyze and use drug transaction data to prevent diversion of prescription opioids to be sold illegally; and the State Department should develop and implement a data management system for all Caribbean Basin Security Initiative activities to reduce illicit drug trafficking or track data trends across countries. In GAO's March 2019 High-Risk report, GAO named drug misuse as an emerging issue requiring close attention. Based on 25 GAO products issued since that time and this update, GAO has determined that this issue is high risk. Moreover, the severe public health and economic effects of the Coronavirus Disease 2019 (COVID-19) pandemic could fuel some of the contributing factors of drug misuse, such as unemployment—highlighting the need to sustain and build upon ongoing efforts. However, maintaining sustained attention on preventing, responding to, and recovering from drug misuse will be challenging in the coming months, as many of the federal agencies responsible for addressing drug misuse are focused on addressing the pandemic. Therefore, GAO will include this issue in the 2021 High-Risk Series update and make the high-risk designation effective at that time. Since fiscal year 2015, GAO has made over 80 recommendations to multiple agencies responsible for addressing the drug crisis; over 60 of these recommendations have yet to be implemented.", "document_type": "gao"}
{"report": "The primary purpose of accreditation is to help ensure that schools provide a quality education to students. Accrediting agencies, also known as accreditors, are generally nongovernmental, nonprofit entities that work with Education and states as part of the “triad” that oversees postsecondary schools participating in federal student aid programs. The Higher Education Act and Education’s regulations require accreditors to meet certain criteria and have certain operating procedures in place to be “recognized” by Education as reliable authorities on assessing academic quality (see fig. 1). Accreditors must have their recognition renewed by Education at least every 5 years. To recognize an accrediting agency, Education officials and the National Advisory Committee on Institutional Quality and Integrity (NACIQI), which advises the Secretary of Education on accreditation issues, review among other things whether the accreditor applies its own standards, policies, and procedures when they accredit schools. While Education is required to determine whether accrediting agencies have standards for schools in certain areas, such as student achievement and curricula, before recognizing them, the accrediting agencies are responsible for evaluating member schools to determine if they meet the accreditors’ standards. The specific standards that accreditors develop in these areas can differ, and accreditors may also establish additional standards in areas not required by law. When schools do not meet accreditor standards, accrediting agencies may impose sanctions, such as placing a school on probation or terminating the school’s accreditation. Education conducts annual reviews of the financial condition of all schools participating in federal student aid programs to determine if they are financially responsible, based on criteria and processes established in federal law and regulations. The specific financial responsibility standards that apply to each school depend on the school’s ownership type, and the bulk of Education’s financial oversight efforts focus on private nonprofit and for-profit schools. One key financial responsibility standard that Education uses to assess nonprofit and for-profit schools is a financial composite score that is calculated for each school based on items drawn from the school’s audited financial statements. The composite score—a metric for evaluating a school’s financial condition—uses a formula based on three financial ratios. A passing score is 1.5 to 3.0; a “zone” score is from 1.0 to 1.4, and a failing score is from -1.0 to 0.9. (See fig. 2) Schools that receive a zone or failing composite score, or do not meet one or more of the other financial responsibility standards, may continue to participate in federal student aid programs if they agree to additional oversight. Education may place these schools under heightened cash monitoring (increasing schools’ reporting requirements and postponing the timing for receiving federal student aid payments), or require schools to post a letter of credit (a financial commitment from a bank to protect Education against potential liabilities should the school close), or a combination of the two. Education may rescind a school’s ability to participate in federal student aid programs if a significant percentage of its borrowers—generally, 30 percent or more of borrowers for 3 consecutive years or more than 40 percent in 1 year—default on their federal student loans within the first 3 years of repayment. This calculation is called the cohort default rate. To compute a school’s cohort default rate, Education divides the number of student loan borrowers in a cohort—those entering repayment in the same fiscal year—who have defaulted on their loans in the initial 3 years of repayment by the total number of a school’s student loan borrowers in that cohort (see fig. 3). The cohort default rate does not hold schools accountable for borrowers who default after the initial 3 years. Borrowers in deferment and forbearance—options that allow borrowers to temporarily postpone monthly payments— are considered to be “in repayment” and current on their loans for the purpose of calculating a school’s cohort default rate, even though borrowers in these loan statuses are not expected to make any monthly payments. We have previously reported on a number of challenges with the accreditation system’s oversight of academic quality. Although Education is prohibited from specifying the specific content of accreditor standards, the agency is responsible for assessing whether accreditors are effectively overseeing schools’ academic quality as part of their criteria for recognizing accreditors. Our 2014 analysis found that schools with weaker student outcomes were, on average, no more likely to be sanctioned by accreditors than schools with stronger student outcomes, and that the proportion of their member schools that accreditors sanctioned varied. For example, our analysis of Education’s sanction data from October 2009 through March 2014 found that two accreditors sanctioned less than 2 percent of their member schools during this time frame, compared to 41 percent sanctioned by another accreditor. Our 2017 report also discussed challenges with the accreditation system’s oversight of academic quality. For example, some experts and literature stated that accreditors may be hesitant to terminate schools’ accreditation when they identify issues because such action would adversely affect schools’ eligibility for federal student aid programs. Despite inconsistencies in accreditors’ use of sanctions, our 2014 report found that Education did not systematically examine data on accreditor sanctions that could have helped it identify insufficient accreditor oversight and thereby reduce potential risk to students and federal funds. Accreditors provide Education with records of terminations and probations. However, Education officials told us that they had not used this sanction information for oversight of accreditors because Education’s regulations did not have specific criteria that require them to do so. While Education is not required to use sanction data or analyze accreditor sanctions as part of the accreditor recognition process, we found that it could be useful for Education to consider these data when evaluating whether accreditors meet prescribed criteria, such as whether they consistently apply and enforce standards. Federal internal control standards call for federal agencies to track data to help them make decisions, as well as conduct ongoing, consistent monitoring to identify weaknesses. Since accreditors are gatekeepers for tens of billions of dollars in federal student aid from Education, as well as the key oversight bodies for ensuring academic quality at schools, we found that failure on the part of Education to spot weaknesses in accreditors’ processes could result in poor quality schools gaining access to federal funds. To strengthen Education’s oversight of accreditors, we recommended in 2014 that Education draw upon accreditor data to determine whether accreditors are consistently applying and enforcing their standards to ensure that the education offered by schools is of sufficient quality. For example, Education could systematically use available information related to the frequency of accreditor sanctions or could do additional analyses, such as comparing accreditor sanction data with Education’s information on student outcomes, to inform its recognition reviews. Education agreed with this recommendation and initially started to track the number of accreditor sanctions issued by each accrediting agency. However, Education has since questioned the usefulness of this information and has not yet used this sanction data to inform its discussions of accreditor recognition and oversight. We continue to believe that implementing the recommendation could help inform Education’s reviews of accreditors and ultimately reduce potential risk to students and federal funds. For example, analyses of accreditor sanction data could help reveal patterns in individual accreditor behavior and the extent to which they are consistently enforcing standards. This recommendation remains open and we will continue to monitor Education’s efforts in this area. Holding schools accountable for their financial condition can help protect taxpayers and students against the risk of school closure, but the limitations of Education’s financial composite score hamper its effectiveness at identifying at-risk schools. Although a relatively small number of schools close each year, these closures can affect tens of thousands of students and result in hundreds of millions of dollars in financial losses for the federal government and taxpayers from unrepaid student loans. However, we reported in 2017 that Education’s composite score has been an imprecise predictor of school closures. Half the colleges that closed in school years 2010-11 through 2015-16 received passing financial composite scores on their last assessment before they closed. For example, 58 of the 96 schools that closed in school year 2015-16 had recently received passing scores. Closures can be difficult to predict in part because each school faces its own unique challenges, both financial and nonfinancial, that can eventually push it into financial trouble. Education’s composite score is not designed to account for nonfinancial risks; however, it is a primary means of securing financial protections in the form of a letter of credit from schools at risk of closure. The composite score’s inconsistent performance in identifying at-risk schools is due in part to limitations of the underlying formula and the fact that it has remained unchanged for more than 20 years. The composite score is based on common financial ratios that Education selected in 1997 after consulting with an accounting firm, school officials, and other experts. However, the composite score formula has not been updated since then and several experts and school officials we interviewed identified three key weaknesses: Accounting changes: The composite score has not kept pace with changes since 1997 in accounting practices and standards, creating ambiguity and making it more difficult to apply the formula in a uniform manner. Accounting practices and standards are periodically updated, for example, to improve the comparability and usefulness of financial reporting. When these updates diverge from the components and definitions in Education’s composite score, certain components of the composite score are no longer directly linked to items on schools’ audited financial statements. These accounting changes can also cause large shifts in schools’ composite scores. For example, administrators at one school we talked to said changes to state laws have affected how some schools categorize their endowment holdings in financial audits, and that this had the effect of reducing the school’s composite score from passing to not passing. However, Education has not updated the composite score formula to ensure the score is a reliable measure of financial health. Outdated financial measures: The composite score does not incorporate new financial metrics that would provide a broader indication of schools’ financial health. For more than 20 years, the composite score formula has remained unchanged as the field of financial analysis has continued to evolve with new measures becoming important as economic conditions change. For example, liquidity (i.e., access to cash) has become an important financial measure since the 2007-09 economic downturn, when some schools had trouble meeting payroll and fulfilling contractual obligations. More sophisticated methodologies used by credit rating agencies have sometimes resulted in assessments of a school’s financial condition that are strikingly different from the school’s composite score. For example, in 2016, two credit rating agencies assigned non-investment grade (i.e., junk bond) ratings to 30 schools that received passing composite scores from Education. Vulnerability to manipulation: We previously reported that the composite score can be manipulated by some schools that take on long-term debt (e.g., loans with terms in excess of 12 months) because these debts can increase a school’s composite score and help it avoid requirements to post a letter of credit. Long-term debt usually represents a long-term investment in a school’s campus and buildings, and the composite score formula treats this type of debt in a positive manner. An accountant for multiple schools told us that some schools have taken advantage of this provision and taken on a million dollars in debt in order to obtain a passing composite score. Corinthian Colleges, which closed in 2015, also exploited this vulnerability to boost its composite score and avoid having to post a letter of credit that could have been used by Education to cover some of the hundreds of millions in student loan discharges resulting from the school’s closure, according to company documents and Education documents and officials. These three weaknesses with the financial composite score hamper Education’s ability to effectively fulfill its statutory responsibility to determine whether schools participating in federal student aid programs are financially responsible. Identifying and responding to risks is a key component of federal internal control standards, but Education’s financial composite score formula has remained unchanged for over 20 years despite significant changes in the financial landscape of higher education. To address these limitations, we recommended in our 2017 report that Education update the composite score formula to better measure schools’ financial conditions and capture financial risks. Education generally disagreed with this recommendation and stated that the issues identified in our report did not necessarily mean that the composite score was an unreliable measure of schools’ financial strength. Since our report was issued, new regulations have gone into effect specifying that certain financially risky events, such as those related to litigation and certain accreditor actions, will generally trigger a recalculation of a school’s composite score. In addition, Education has also published proposed regulations that would update some of the definitions of terms used to calculate a school’s composite score to conform with changes in accounting standards and also make an adjustment to how the formula treats long-term debt, which according to Education would be intended to make the formula less susceptible to manipulation. However, Education has not finalized these regulations and has not released a timeline for when it plans to do so, nor has it indicated that it has any broader plans to update the composite score, as we recommended. Since the existing composite score calculation remains unchanged, we are leaving this recommendation open and will continue to monitor Education’s efforts in this area. The cohort default rate, which is specified in federal law, is a key measure for holding schools accountable for borrower outcomes and for protecting borrowers and the federal government from the costs associated with default. However, in 2018 we reported that this rate has limitations as an accountability tool. Some schools managed their 3- year cohort default rate by hiring consultants that encouraged borrowers with past-due payments to put their loans in forbearance, an option that allows borrowers to temporarily postpone payments and bring past-due loans current. At five of the nine default management consultants we selected (that served about 800 schools), we identified examples when forbearance was encouraged over other potentially more beneficial options for helping borrowers avoid default, such as repayment plans that base monthly payment amounts on income. Four of these consultants also provided inaccurate or incomplete information to borrowers about their repayment options in some instances. Although Education officials and student loan experts said that forbearance is intended to be a short-term option, our analysis of Education data found that 20 percent of borrowers who began repaying their loans in 2013 had loans in forbearance for 18 months or more during the 3-year cohort default rate period. Spending this much time in forbearance reduces the potential for borrowers to default within the 3- year period, thus helping improve a school’s cohort default rate. However, postponing loan payments through forbearance can increase borrowers’ loan costs in the long term. For example, a typical borrower with $30,000 in loans who spends the first 3 years of repayment in forbearance would pay an additional $6,742 in interest, a 17 percent increase, over the life of the loan. In addition, borrowers in forbearance for 18 months or longer defaulted more often in the fourth year of repayment, when schools are not accountable for defaults, than they did during the 3-year period. While forbearance can help borrowers avoid default in the short term, this finding suggests that forbearance may have delayed—not prevented— default, potentially resulting in increased costs to the federal government. Reducing the number of borrowers in long-term forbearance and directing them toward other options for avoiding default, such as repayment plans that base monthly payment amounts on income, could help reduce the number of borrowers that later default and may eventually save the federal government money. Specifically, for William D. Ford Federal Direct Loans issued in fiscal year 2018, Education estimates that it will not recover over 20 percent of defaulted loans. These unrecovered defaulted loan amounts total an estimated $4 billion, according to our analysis of Education’s budget data. Schools are seldom held accountable for their students’ defaults, in part because of the high rate of borrowers in long-term forbearance. To examine the impact of long-term forbearance on schools’ 3-year default rates, we recalculated schools’ cohort default rates by excluding borrowers who were in forbearance for 18 months or more and who did not default during the 3-year period. We found that over 260 additional schools—receiving a combined $2.7 billion in Direct Loans and Pell Grants in academic year 2016-2017—would potentially have had a default rate high enough to put them at risk of losing access to federal student aid programs. The reduced effectiveness of cohort default rates as a tool for holding schools accountable creates risks to the federal government and taxpayers, who are responsible for the costs associated with high rates of default. Since the way the cohort default rate is calculated is specified in federal law, any changes to its calculation would require legislation to be enacted amending the law. Our 2018 report suggested that Congress consider strengthening schools’ accountability for student loan defaults, for example, by revising the cohort default rate calculation or using other accountability measures to complement or replace the cohort default rate. In the 115th Congress, proposals were introduced to revise, supplement, or replace the cohort default rate, though none of the legislation was enacted. This matter for congressional consideration remains open. We continue to believe that strengthening the accountability measure for loan defaults could further protect borrowers and the billions of dollars of federal student aid the government distributes each year. In conclusion, the large federal investment in higher education makes it essential that the federal government maintain a robust system of accountability to protect students and taxpayers. My statement has highlighted three actions Education and Congress could take to strengthen the existing accountability tools for educational quality, financial sustainability, and student loan defaults. Students deserve to go to schools that provide a quality education and are financially stable. Taxpayers deserve an accountability system that protects federal student aid funds from going to schools that are financially irresponsible or push borrowers into forbearance for long periods in order to reduce the school’s cohort default rate. We believe that fully implementing the two recommendations and matter for congressional consideration discussed in this testimony would improve federal accountability, help students, and potentially lead to financial savings for taxpayers. Chairwoman Davis, Ranking Member Smucker, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Melissa Emrey-Arras, Director of Education, Workforce, and Income Security, at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Debra Prescott (Assistant Director), Will Colvin (Analyst-in-Charge), and Brian Schwartz. In addition, key support was provided by Susan Aschoff, James Bennett, Deborah Bland, Marcia Carlsen, Alex Galuten, Sheila McCoy, Jessica Rider, and Walter Vance. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In fiscal year 2018, nearly 13 million students and their families received over $122 billion in federal assistance to help them pursue higher education through programs authorized under Title IV of the Higher Education Act of 1965, as amended. Education administers these programs, and is responsible, along with accreditors and states, for maintaining accountability and protecting the federal investment in student aid for higher education. This testimony summarizes the findings and recommendations from GAO's prior reports, issued between 2014 and 2018, examining Education's role in: (1) recognizing accrediting agencies, (2) overseeing the financial condition of schools, and (3) overseeing schools' student loan default rates. This statement also updates the status of selected recommendations and a matter for congressional consideration. GAO has identified opportunities to strengthen federal higher education accountability in three areas: educational quality, financial stability, and federal student loan defaults. Educational quality. Accreditors—independent agencies responsible for ensuring that schools provide a quality education—must be recognized by the Department of Education (Education) as reliable authorities on educational quality. The accreditors can issue sanctions, including terminations and probations, to schools that do not meet accreditor standards. However, GAO previously found that schools with weaker student outcomes were, on average, no more likely to be sanctioned by accreditors than schools with stronger student outcomes, and Education does not make consistent use of sanction data that could help it identify insufficient accreditor oversight. In 2014, GAO recommended that Education use accreditor data in its recognition review process to determine whether accreditors are consistently applying and enforcing their standards to ensure schools provide a quality education. Education agreed with the recommendation, but has yet to use this data in this manner. Financial stability. Education uses a financial composite score to measure the financial health of schools participating in federal student aid programs, and increases its oversight of schools when it identifies concerns to protect against the risk of school closures. School closures, although rare, can result in hundreds of millions of dollars in unrepaid federal student loans and displacement of thousands of students. However, the composite score has been an imprecise risk measure, predicting only half of closures from school years 2010-11 through 2015-16. This is due in part to the fact that the composite score does not reflect changes in accounting practices and standards, relies on outdated financial measures, and is vulnerable to manipulation. Despite these limitations, Education has not updated the composite score since it was first established more than 20 years ago. In 2017, GAO recommended that Education update its financial composite score. Education has proposed some revisions, but changes have not yet been implemented to protect students and taxpayers against financial risks. Student loan defaults. According to federal law, schools may lose their ability to participate in federal student aid programs if a significant percentage of their borrowers default on their student loans within the first 3 years of repayment. However, GAO previously found that some schools managed these default rates by hiring consultants that encouraged borrowers with past-due payments to put their loans in forbearance, an option that allows borrowers to temporarily postpone payments and bring past due loans current. Although Education officials and student loan experts said forbearance is intended to be a short-term option, GAO's analysis of Education data found that 20 percent of borrowers who began repaying their loans in 2013 had loans in forbearance for 18 months or more. These borrowers defaulted more often in the fourth year of repayment, when schools are not accountable for defaults, suggesting long term forbearance may have delayed—not prevented—default. In 2018, GAO suggested that Congress consider statutory changes to strengthen schools' accountability for student loan defaults. Legislation has not yet been enacted.", "document_type": "gao"}
{"report": "Black lung benefit payments include both cash assistance and medical care. Maximum cash assistance payments ranged from about $670 to $1,340 per month in 2019, depending on a beneficiary’s number of dependents. Miners receiving cash assistance are also eligible for medical treatment of their black lung-related conditions, which may include hospital and nursing care, rehabilitation services, and reimbursement for drug and equipment expenses, according to DOL documentation. DOL estimates that the average annual cost for medical care in fiscal year 2019 was approximately $8,225 per miner. During fiscal year 2019, about 25,700 beneficiaries received black lung benefits (see fig. 1). The number of beneficiaries has decreased from about 174,000 in 1982 as a result of declining coal mining employment and an aging beneficiary population, according to DOL. Black lung beneficiaries could increase in the near term due to the rise in the occurrence of the disease in its most severe form, progressive massive fibrosis, particularly among Appalachian coal miners, according to the National Institute for Occupational Safety and Health (NIOSH). NIOSH reported that coal miners in central Appalachia are disproportionately affected; as many as 1 in 5 show evidence of black lung, which is the highest level recorded in 25 years. NIOSH has attributed the rise in occurrence of black lung to multiple factors, including increased exposure to silica. Black lung claims are processed by the Office of Workers’ Compensation Programs within DOL. Contested claims are adjudicated by DOL’s Office of Administrative Law Judges, which issues decisions that can be appealed to DOL’s Benefits Review Board. Claimants and mine operators may further appeal these DOL decisions to the federal courts. If an award is contested, claimants can receive interim benefits until their case is resolved, which are generally paid from the Trust Fund, according to DOL. In fiscal year 2019, about 33 percent of black lung claims were approved, according to DOL data. Final awards are either funded by mine operators—who are identified as the responsible employers of claimants—or the Trust Fund, when responsible employers cannot be identified or do not pay. Of the approximately 25,700 beneficiaries receiving black lung benefits in 2019, 13,335 were paid from the Trust Fund; 7,985 were paid by responsible mine operators; and 4,380 were receiving interim benefits, according to DOL data. DOL officials told us that the more common reasons that beneficiary claims are paid from the Trust Fund include operator insolvency and unclear employment history of miners, among other reasons (see fig. 2). The operator responsible for the payment of benefits is generally the operator that most recently employed the miner. Federal law generally requires coal mine operators to secure their black lung benefit liability. A self-insured coal mine operator assumes the financial responsibility for providing black lung benefits to its eligible employees by paying claims as they are incurred. Operators are allowed to self-insure if they meet certain DOL conditions. For instance, operators applying to self-insure must obtain collateral in the form of an indemnity bond, deposit or trust, or letter of credit in an amount deemed necessary and sufficient by DOL to secure their liability. Operators that do not self-insure are generally required to purchase coverage from commercial insurance companies, state workers’ compensation insurance funds, or other entities authorized under state law to insure workers’ compensation. DOL regulations require commercial insurers to report each policy and federal black lung endorsement issued, canceled, or renewed in a form determined by DOL. DOL accepts electronic reporting of this information from insurers via their respective rating bureaus. DOL retains this information— insured company name, address, federal employer identification number, and policy and endorsement data—so that DOL staff can later research claims to determine which operator and insurer may be liable. As we have noted in prior reports, insurance companies are regulated primarily by the states with state law providing state regulators with the authority and funding to regulate insurance. State insurance regulation is designed to, among other things, help insurers remain solvent and able to pay claims when due. Effective insurer underwriting and risk management practices—such as reinsurance–serve a similar function. While insurer insolvency occurs infrequently, when it does state insurance commissioners are typically appointed as receiver and supervise the rehabilitation or liquidation of these insurers, and state guaranty funds may assume liability for paying covered claims of insolvent insurers that have liquidated. Of the eight coal mine operator bankruptcies we identified, three resulted in a transfer of estimated benefit liability from the coal operator to the Trust Fund and five did not, according to DOL. Using Bloomberg data, we identified coal mine operators that filed for bankruptcy from 2014 through 2016. Figure 3 shows how many operators were self-insured or commercially-insured at the time of bankruptcy, and if responsibility for benefits was shifted from the bankrupt operator to the Trust Fund. Three self-insured coal mine operator bankruptcies affected the Trust Fund. Specifically, the bankruptcies of Alpha Natural Resources (Alpha), James River Coal (James River), and Patriot Coal (Patriot) resulted in a transfer of benefit liability to the Trust Fund of an estimated $865 million, according to DOL. DOL officials said that the amount of collateral they required from these three operators to self-insure was inadequate to fully cover their estimated benefit liability. When this occurs, benefit liability in excess of the collateral can be transferred to the Trust Fund. For example, the collateral DOL required from Alpha was about $12 million and approximately $494 million of estimated benefit liability transferred to the Trust Fund, according to DOL’s estimate (see table 1). DOL estimates for how these three operator bankruptcies will affect the Trust Fund have more than doubled from what DOL had previously reported. In June 2019, we reported that DOL estimated that between $313 million to $325 million in benefit liabilities would transfer to the Trust Fund as a result of these bankruptcies. In January 2020, however, DOL provided updated estimates stating that $865 million in benefit liabilities would transfer to the Trust Fund as a result of these bankruptcies. According to DOL, their estimates increased to account for higher black lung benefit award rates that occurred from fiscal years 2016 through 2019; higher medical treatment cost inflation in recent years; and different discount rate assumptions. Additionally, DOL’s prior estimate for the Patriot bankruptcy did not account for future claims and the effect of those claims on the Trust Fund. The three other self-insured coal mine operator bankruptcies we identified did not affect the Trust Fund. Specifically, Arch Coal, Peabody Energy, and Walter Energy were also self-insured operators, but DOL officials said that their federal black lung benefit liabilities were assumed by a reorganized company or by a purchaser, and therefore did not transfer to the Trust Fund. DOL officials said that they take three key actions, as appropriate, to protect the financial interests of the Trust Fund during self-insured operator bankruptcies. 1. DOL officials said that they file a claim in every case with the bankruptcy court for the reimbursement of an operator’s full estimated federal black lung benefit liability. 2. If an operator plans to reorganize or if it is acquired by a purchaser, DOL officials said that they negotiate with the company or the purchaser, as appropriate, to help ensure benefit responsibility will be “passed through” to a reorganized operator or purchaser, rather than be discharged and become the responsibility of the Trust Fund. 3. If benefit liabilities are not “passed-through” to an operator, DOL officials said that they seek settlement agreements, whereby the Trust Fund receives an allowed general unsecured claim in an amount based on an operator’s estimated benefit liability. DOL officials said that during the bankruptcy of James River they negotiated a settlement agreement providing DOL with a general unsecured claim in an amount commensurate with its estimate of the operator’s benefit liability at the time of bankruptcy. However, these officials said that given the low priority under bankruptcy law for their general unsecured claim, the payout they received was only about $400,000, which was just a small portion of the estimated benefit liability that transferred to the Trust Fund. DOL officials said that during the bankruptcy of Alpha they negotiated both a “pass through” and a settlement agreement in which certain liabilities would be transferred to the Trust Fund, while other liabilities would be retained by Alpha. DOL officials said that they received a payout from Alpha of $7.4 million, although $494 million in estimated benefit liability transferred to the Trust Fund. Further, as a condition of the agreement, DOL officials said that they agreed to let Alpha self-insure after it emerged from bankruptcy. Since 2016, several other self-insured operators have also filed for bankruptcy, according to DOL officials, including Cambrian Coal, Cloud Peak Energy, Murray Energy, and Westmoreland Coal. DOL officials said that $17.4 million in estimated black lung benefit liability will transfer to the Trust Fund as a result of Westmoreland Coal’s bankruptcy. Given the uncertainty of the bankruptcy process in terms of whether liabilities will or will not transfer to the Trust Fund, however, DOL officials said that they could not speculate on how the other bankruptcies may affect the Trust Fund. Insurance contracts or policies to secure operators’ benefit liabilities are required by law to include a provision that insolvency or bankruptcy of an operator does not release the insurer from the obligation to make benefit payments. As previously discussed, state insurance regulation, insurer underwriting and risk management practices, and state guaranty funds also help to protect the Trust Fund from having to assume responsibility for paying black lung benefits on behalf of bankrupt coal operators. Thus, by being commercially insured, the two operator bankruptcies we identified that filed for bankruptcy between 2014 and 2016—Energy Future Holdings and Xinergy Ltd—did not affect the Trust Fund, according to DOL (see fig 3). State insurance commissioners monitor the financial health of insurers, including performing periodic examination of insurer financial statements. Further, rating agencies, such as Standard & Poor’s, Moody’s, and AM Best, issue insurer financial strength ratings, which represent the agencies’ opinions on insurers’ financial strength and ability to pay policy and contract obligations. Eight of the nine insurers that issued approximately 90 percent of the workers’ compensation policies with federal black lung coverage from 2016 through 2018, according to our review of DOL data, had at least an “A-” financial strength rating from AM Best (with the one remaining being a state insurer that was not rated). In deciding whether to provide federal black lung coverage, insurers we interviewed said they consider an operator’s historical black lung claim losses, financial condition, and mine location among other factors. However, insurance company officials identified various challenges in writing and pricing black lung coverage that produces an appropriate amount of premiums to cover expected losses. The challenges cited by these officials included the long latency period of black lung disease; changes in law regarding benefit eligibility and how the disease is defined; the ability of miners to refile claims indefinitely; and the inability of insurers and operators to settle claims. One official noted that there is much risk and little profit in black lung coverage. Insurance companies can use reinsurance to protect themselves from catastrophic losses that could threaten their solvency and ability to pay claims, and to reduce wide fluctuations in their annual losses. For example, workers’ compensation claims can take years to fully develop after premiums have been set, which in turn can adversely affect an insurer’s financial position if premiums have underestimated actual claims. Insurance company officials said that they reinsure their workers’ compensation coverage, but some said that their reinsurance policies either explicitly excluded occupational disease claims, including black lung, or cover black lung but have conditions and loss thresholds that would generally result in the exclusion of such claims. However, reinsurance, even if it does not explicitly cover federal black lung claims, can help manage the risk of workers’ compensation losses and losses in other lines of insurance that an insurer writes, thereby indirectly helping to ensure that the insurer can pay all types of claims, including federal black lung. If an insurer becomes insolvent, state guaranty funds reduce the potential for the Trust Fund to assume responsibility for paying claims. States have different rules for guaranty fund benefit coverage and limits. In the states we reviewed, state guaranty funds generally pay federal black lung benefits, although there may be certain limitations on the claims they will pay. For example, in West Virginia, there is no maximum claim limit that the state guaranty fund will pay on standard workers’ compensation claims; but in Kentucky, a state guaranty fund official told us that, in the guaranty fund’s opinion, state law limits federal black lung claims to $300,000. Also, a guaranty fund could reject a federal black lung claim, which could result in the Trust Fund having to assume responsibility for paying the claim. An official from one state guaranty fund that maintained data on rejected black lung claims said that the most common reason for rejection is that claims are filed after the date set by the bankruptcy court for receiving claims. DOL officials said it is very uncommon for the Trust Fund to assume responsibility for federal black lung claims of insolvent insurers. However, DOL does not maintain data to readily determine the extent to which this actually occurs, as discussed later in this report. In overseeing coal mine operator self-insurance in the past, DOL did not estimate future benefit liability when setting collateral; regularly review operators to monitor their changing financial conditions; or always use enforcement tools available to protect the financial interests of the Trust Fund, such as by revoking an operator’s ability to self-insure, if warranted. In July 2019, DOL began implementing a new self-insurance process that, if implemented effectively, should help to address some of these past deficiencies. Specifically, DOL plans to consider an operator’s future benefit liability when setting collateral and to review self-insured operators more frequently. However, the new process still lacks procedures for self- insurance renewals and coal operator appeals, which could hinder DOL from taking enforcement actions to protect the Trust Fund as needed. Additionally, DOL does not monitor whether operators that do not self- insure maintain adequate and continuous commercial insurance coverage as required by law. Agency regulations require DOL to obtain collateral from coal mine operators applying to self-insure in an amount deemed by DOL to be necessary and sufficient to secure the payment of the operators’ liability. To determine collateral amounts under the former process, agency procedures stated that DOL first assess an operator’s net worth by reviewing, among other factors, the operator’s audited financial statement and black lung claims information. DOL then determined the amount of collateral equal to 3, 5, or 10 years of the operator’s annual black lung benefit payments made at the time of the operator’s self-insurance application, depending on its net worth. Specifically, if net worth was $1 billion or greater, agency procedures stated that DOL set collateral equal to 3 years of benefit payments. If net worth ranged from $500 million to $1 billion, DOL set collateral equal to 5 years of benefit payments. If net worth ranged from $10 million to $500 million, DOL set collateral equal to 10 years of benefit payments. Agency procedures did not permit operators with net worth less than $10 million to self-insure. DOL’s former process for determining collateral did not routinely consider potential future claims for which an operator could be responsible. DOL had periodically reauthorized coal operators to self-insure, by reviewing an operator’s most recent audited financial statement and claims information, among other things. DOL prepared memos documenting these reviews and communicated with coal operators about whether their financial circumstances warranted increasing or decreasing their collateral. Estimating future costs based on sound actuarial practice is essential to the integrity of the insurance and the risk financing system and is key to fulfilling the promises embodied in insurance contracts, according to Actuarial Standards Board standards. Additionally, in three of the four states we contacted, state insurance officials said that they used actuarial methods to assess an operator’s future estimated benefit liability when considering how much collateral should be required to self- insure. The remaining state, Wyoming, did not allow coal mine operators to self-insure. Table 2 provides information on the 22 operators that were self-insured under DOL’s former process, including the date of each operator’s last DOL reauthorization; the amount of DOL-required collateral; and the operator’s estimated black lung benefit liability, if available. Agency regulations state that DOL may adjust the amount of collateral required from self-insured operators when experience or changed conditions so warrant, but DOL did not regularly monitor these operators to reauthorize their ability to self-insure. In reviewing DOL’s most recent reauthorization memos for each of the 22 self-insured operators, we found that while some of these operators had been reauthorized more recently, others had not been reauthorized by DOL in decades. One operator in particular had not been reauthorized by DOL since 1988. DOL officials stated that from 2009 to 2012, six employees handled coal operator reauthorizations and associated work actions. Due to attrition, however, this number dropped at times to three employees, according to DOL officials. Additionally, DOL had no written procedures that specified how often reauthorizations should occur after an operator’s initial 18- month reauthorization. In contrast, in two of the four states we contacted, state insurance officials were required to review self-insured employers at least annually. Revoking an operator’s ability to self-insure, fining mine operators for operating without insurance, and placing liens on operator assets are tools DOL has available to mitigate financial losses to the Trust Fund. Based on our review of DOL documentation, however, we found instances when DOL did not use these tools to protect the Trust Fund, or was hindered from doing so because of an operator’s ongoing appeal or bankruptcy. In September 2001, DOL required $5 million in additional collateral from James River, which would have increased its collateral from $0.4 million to $5.4 million. Although DOL did not receive the additional collateral, it did not revoke the operator’s authority to self-insure, which is a potential option under agency regulations. Further, DOL had not reauthorized James River at any point from August 2001 until it filed for bankruptcy in April 2014. If DOL had revoked James River’s ability to self-insure, it could have potentially prevented the Trust Fund from being responsible for claims based on a miner’s employment from 2001 through 2016, when James River liquidated. Additionally, if the operator had been unable to obtain commercial insurance, DOL could have potentially fined the operator for each day it operated without insurance. Instead, DOL took no action during these years and estimated benefit liability of $141 million was shifted to the Trust Fund, according to DOL. DOL officials stated that they do not have records explaining why James River did not provide the additional collateral or why they did not revoke its authority to self-insure. In August 2014, DOL required $65 million in collateral from Patriot, increasing its collateral from $15 million to $80 million. Patriot appealed this decision and, in the 8 months that followed before Patriot filed for bankruptcy in May 2015, DOL did not obtain additional collateral, or revoke Patriot’s ability to self-insure because the appeal was still pending. DOL officials said they would not typically revoke an operator’s authority to self-insure during an ongoing appeal. As a result, DOL was hindered from using this enforcement tool. Liens on operator assets can be an effective tool to protect the Trust Fund if an operator defaults on its benefit liabilities, but DOL officials said that they are hindered from using this tool if an operator files for bankruptcy. DOL can place a lien on a coal operator’s assets under federal law if they refuse the demand to pay the black lung benefit payments for which they are liable. In the event of bankruptcy or insolvency, federal law states that the lien imposed shall be treated in the same manner as a lien for taxes due and owing to the United States under certain laws. However, DOL officials said that operators rarely stop paying benefits until after they file for bankruptcy. Once a bankruptcy occurs, DOL officials said that they are generally prevented by the court from placing a lien and taking an operator’s assets in lieu of payment of current and future benefit liabilities. Under bankruptcy law, DOL officials said that they have no special status over other creditors with outstanding financial claims. Instead, DOL officials said that obtaining sufficient collateral is a better way to protect the Trust Fund. In July 2019, DOL began implementing a new process for coal mine operator self-insurance that should help to address some past deficiencies if implemented effectively. Specifically, DOL is to consider an operator’s future benefit liability when setting collateral and plans to more frequently review self-insured operators (see text boxes). Under the new process, DOL officials plan to assess the risk of operator bankruptcy using various financial metrics related to profitability and solvency. As a result, DOL officials said that the amount of collateral they will require from operators to self-insure going forward will be based on both an estimate of an operator’s current and future black lung liability and the risk of default due to insolvency. As of October 2019, DOL officials said that most self-insured operators had submitted their application and supporting documentation and that they were reviewing this information to decide whether these operators should continue to be self-insured. DOL’s New Self-Insurance Process Will Include Estimates of Future Benefit Liability Coal mine operators applying to DOL to self-insure will be required to submit: a completed application; a certified consolidated financial statement for each of the 3 years prior to its application; recent black lung claims information; and a certified actuarial report on the operator’s existing and future black lung benefit liabilities. DOL plans to use the information submitted by coal mine operators to assess the insolvency risk of each operator using various financial metrics related to profitability and solvency. Depending on the results of their analysis, DOL plans to categorize the risk-level of each applicant as low, medium, or high. DOL will then set the amount of collateral required to self-insure by linking the operator’s risk category to a corresponding percentage of the operator’s actuarial estimated benefit liability. DOL policies state that they would require a high-risk operator to secure with collateral 90 percent of estimated benefit liability, a medium-risk operator to secure 45 percent, and a low-risk operator to secure 15 percent. However, in February 2020, DOL officials said they plan to revise these percentages to 100 percent, 85 percent, and 70 percent for high-risk, medium-risk, and low-risk operators, respectively. DOL’s New Self-Insurance Process Will Require More Frequent Coal Mine Operator Reviews Coal mine operators that are already authorized to self-insure will be required to submit: DOL plans to use the information self-insured operators submit to update their insolvency risk analysis. If an operator’s risk category changes (e.g., from low-to medium-risk), DOL plans to send a form to the operator requiring an additional amount or type of collateral. Upon receiving the completed form, and proof that the collateral has been obtained, DOL stated that they will notify the operator that its a self-insurance renewal application (annually); a financial summary (quarterly); a certified consolidated financial statement (annually); black lung claims information (annually); and actuarial estimate of benefit liability (to be submitted every three years). authority to self-insure has been reauthorized. DOL’s new self-insurance process made important changes, but overlooked other key internal control improvements that are needed to protect the financial interests of the Trust Fund. DOL’s new requirements for setting collateral and for the annual and quarterly review of self- insured operators are key components of internal controls, which call for agency management to implement control activities through policy. However, DOL’s new self-insurance process lacks procedures that could help to prevent past oversight deficiencies from reoccurring. Among other things, DOL’s procedures do not specify (1) the duration of an operator’s self-insurance authority, (2) the time frames for submitting renewal applications and supporting documentation, and (3) the conditions under which an operator’s self-insurance authority would not be renewed. Without such procedures, DOL has no basis to take enforcement action should an operator not submit its self-insurance renewal application and supporting documentation. DOL staff are also hindered from taking enforcement action during an operator’s ongoing appeal, as previously mentioned. DOL policies state that an operator may request reconsideration if its self-insurance application has been denied or if it believes the collateral required by DOL is too high to secure its benefit liabilities. However, DOL lacks procedures that specify, among other things, the length of time that operators have to submit supporting information. Further, DOL does not specify a goal for how much time DOL appeals decisions should take. For example, in October 2015, DOL recommended revoking Murray Energy’s (Murray) authority to self-insure due to deteriorating financial conditions. Murray appealed this decision, and DOL officials said they postponed responding to the appeal until their new self-insurance process was implemented so that they could evaluate Murray under its new process along with the other self-insured operators. However, Murray filed for bankruptcy in October 2019 and DOL had not revoked its authority to self-insure or requested additional collateral because Murray’s appeal was still pending and DOL was still evaluating how much collateral it would require from the operator under its new self-insurance process. DOL does not monitor coal mine operators that do not self-insure and, thus, must commercially insure their federal black lung liabilities to make certain they maintain adequate and continuous coverage as required by law. DOL previously monitored operators' compliance with the program's insurance requirements by annually sending letters to a selection of operators seeking confirmation that they had maintained adequate coverage, but discontinued the process once the agency began receiving NCCI policy data. In order to use the policy data for the purpose of identifying operators that have not maintained coverage, DOL would, as a starting point, have to maintain a record of all employers that operate a coal mine. However, DOL officials explained that they do not currently maintain such a record. In the absence of effective DOL monitoring of operator compliance, we evaluated the potential risk that uninsured operators could pose to the Trust Fund. Specifically, in examining the 13 largest coal operators that were not approved to self-insure their federal black lung liabilities and, therefore, had to obtain commercial coverage, we found that some insurers erred in reporting endorsements and in one instance an operator did not have adequate coverage. We found six operators (parent or subsidiary) that were not insured for the entire 3 year period from 2016 through 2018, according to our review of DOL data. When we discussed our findings with DOL, agency officials had to research each operator individually and in some cases contact the operator or their insurer to find out whether or not they had been covered. DOL concluded that these entities were insured. However, the insurers had not properly reported the federal black lung endorsement on new policies or subsequent renewals, in addition to other reporting issues. One of these six operators also had, inadvertently, not maintained adequate commercial coverage for its mining operations in Texas, and had not self-insured those operations. In this instance, the operator obtained an excess loss policy that only pays claims once they exceed a high threshold and, therefore, is not sufficient by itself to secure the payment of the operator’s benefit liabilities. DOL data does not include information on excess loss policies and, while the data NCCI provides on standard workers’ compensation policies with federal black lung endorsements lists operators’ addresses, they do not provide the specific states for which endorsements apply. Designing processes to achieve agency objectives and respond to risks is a principle of effective internal controls. Without a process to monitor operator compliance with program insurance requirements, DOL risks not identifying a lapse or cancellation of operator coverage. This could result in the Trust Fund having to assume responsibility for paying benefits that would otherwise have been paid by an insurer. DOL officials said the Trust Fund infrequently pays claims on behalf of uninsured operators due to the civil penalties that it can impose on operators and certain company officers. These officials also said that operators that do not maintain insurance coverage typically employ few miners and are out of business by the time a claim is filed and, thus, cannot be held liable for benefit claims. However, DOL officials acknowledged that they do not track how often claims are paid by the Trust Fund on behalf of uninsured operators that should have been insured. We attempted to examine the extent to which claims were paid by the Trust Fund in fiscal year 2018 on behalf of uninsured operators that should have been insured. We found that DOL’s black lung claimant and payment system does not identify whether potentially responsible operators should have had commercial insurance coverage. The data on responsible operators and insurers, as well as the basis on which an operator was determined to be responsible, were not consistently recorded. DOL officials said that the data fields that identify responsible operators and their insurers should reflect the information collected from DOL’s initial determination. DOL officials said that in some cases, after an adjudication decision determined the Trust Fund was responsible for paying benefits, claim examiners may have deleted the previously recorded responsible operator and insurer data, creating potential inconsistencies in the data. DOL officials acknowledged that its processes and guidance for recording information on responsible operators and the basis for those decisions resulted in inconsistent and potentially inaccurate recording of claim and benefit data. As a result, DOL issued preliminary guidance in February 2019 to field supervisors and claims examiners. However, the revised guidance does not include how to identify potentially responsible operators that should have had commercial coverage but did not. Monitoring agency internal control systems and evaluating the results of those activities is a principle of effective internal control. Without complete and consistently recorded information on potentially responsible operators and insurers, and the basis for determination decisions, DOL is not able to effectively evaluate the financial impact claims paid on behalf of uninsured operators have on the Trust Fund. Determining the financial impact of these claims would be important to DOL’s evaluation of the effectiveness of a process for monitoring operator compliance with black lung program insurance requirements. The Black Lung Disability Trust Fund faces financial challenges, and DOL’s limited oversight of coal mine operator insurance has further strained Trust Fund finances by allowing operator liabilities to transfer to the federal government. DOL’s new self-insurance process may help to address past deficiencies in setting collateral and reviewing self-insured operators if implemented effectively. However, DOL still lacks procedures on self-insurance renewals and coal operator appeals that could help to ensure that DOL staff will take enforcement actions when needed. Establishing clear self-insurance renewal procedures could better position DOL to take action to protect the Trust Fund should an operator not submit its renewal application and supporting documentation, or comply with DOL’s collateral requirements. Procedures that identify time lines for self-insured operators to submit documentation supporting their appeals, and that identify a goal for how much time DOL should take to make appeals decisions could help to ensure that DOL is able to revoke an operator’s ability to self-insure, when warranted. Commercially-insured federal black lung liabilities can limit the Trust Fund’s exposure to financial risk, but only if operators maintain adequate and continuous coverage as required. Currently, DOL does not identify lapses or cancellations in coverage among commercially-insured operators until after a claim is filed. Establishing a process to identify lapses and cancellations in coverage before claims get filed could help prevent the Trust Fund from becoming responsible for these claims. We are making the following three recommendations to the Department of Labor: The Director of the Office of Workers’ Compensation Programs should develop and implement procedures for coal mine operator self- insurance renewal that clarifies how long an operator is authorized to self-insure; when an operator must submit its renewal application and supporting documentation; and the conditions under which an operator’s self-insurance authority would not be renewed. (Recommendation 1) The Director of the Office of Workers’ Compensation Programs should develop and implement procedures for self-insured coal mine operator appeals that identify time lines for self-insured operators to submit documentation supporting their appeals and that identify a goal for how much time DOL should take to make appeals decisions. (Recommendation 2) The Director of the Office of Workers’ Compensation Programs should develop and implement a process to monitor operator compliance with commercial insurance requirements and periodically evaluate the effectiveness of this process. This process should be designed to detect errors and omissions in reporting insurance coverage using complete, accurate, and consistently recorded data. (Recommendation 3) We provided a draft of this report to the Department of Labor (DOL) for review and comment. Their written comments are reproduced in appendix I. DOL also provided technical comments and clarifications, which we have incorporated, as appropriate. DOL agreed with our three recommendations and said it is acting to implement them to achieve further improvements in ensuring the effective oversight of coal mine operator insurance. DOL acknowledged the importance of improving oversight of coal mine operator insurance and commented that it made major oversight improvements in recent years. DOL commented that it began developing a new coal mine operator self-insurance process in 2015, before GAO began its review, and DOL formally approved this process in 2017. In July 2019, DOL stated that its new process was finalized when the Office of Management and Budget (OMB) approved the forms to collect financial and other information from coal mine operators. DOL stated that it is now reviewing information obtained from coal mine operators, and expects to set the amount of collateral required to self-insure under its new process in the first half of 2020. We commend DOL’s efforts to address the deficiencies of its past self-insurance process. However, we remain concerned about continuing coal operator bankruptcies and the looming unsecured black lung benefit liabilities that still threaten the Trust Fund. DOL commented that adopting GAO’s recommendations would further improve its oversight of coal mine operator insurance going forward. Specifically, DOL reported that it will (1) ensure letters granting or renewing self-insurance authority will inform operators that their authorization expires in one year and that they must submit renewal information three months in advance of the expiration date, (2) ensure letters denying self-insurance will inform operators that they have a 30- day appeal period (limited to one extension) and that DOL has set a goal of resolving all appeals within 90 days of the denial letter, and (3) modify existing computer systems to identify lapses or cancellations of commercial insurance coverage, and require operators identified as having lapsed or cancelled coverage to obtain or provide proof of coverage within 30 days. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Labor, and other interested parties. In addition, the report will be available at no charge on GAO’s web site at http://www.gao.gov. If you or your staffs should have any questions about this report, please contact Cindy Brown Barnes at (202) 512-7215 or brownbarnesc@gao.gov, or Alicia Puente Cackley at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contacts named above, Blake Ainsworth (Assistant Director), Patrick Ward (Assistant Director), Justin Dunleavy (Analyst-in- Charge), Monika Gomez, Courtney LaFountain, Rosemary Torres Lerma, and Scott McNulty made key contributions to this report. Also contributing to this report were James Bennett, Nancy Cosentino, Caitlin Cusati, John Forrester, Alex Galuten, Ellie Klein, Emei Li, Corinna Nicolaou, Almeta Spencer, Curtia Taylor, and Shana Wallace.", "summary": "In May 2018, GAO reported that the Trust Fund, which pays benefits to certain coal miners, faced financial challenges. The Trust Fund has borrowed from the U.S. Treasury's general fund almost every year since 1979 to make needed expenditures. GAO's June 2019 testimony included preliminary observations that coal operator bankruptcies were further straining Trust Fund finances because, in some cases, benefit responsibility was transferred to the Trust Fund. This report examines (1) how coal mine operator bankruptcies have affected the Trust Fund, and (2) how DOL managed coal mine operator insurance to limit financial risk to the Trust Fund. GAO identified coal operators that filed for bankruptcy from 2014 through 2016 using Bloomberg data. GAO selected these years, in part, because bankruptcies were more likely to be resolved so that their effects on the Trust Fund could be assessed. GAO analyzed information on commercially-insured and self-insured coal operators, and examined workers' compensation insurance practices in four of the nation's top five coal producing states. GAO also interviewed DOL officials, coal mine operators, and insurance company representatives, among others. Coal mine operator bankruptcies have led to the transfer of about $865 million in estimated benefit responsibility to the federal government's Black Lung Disability Trust Fund (Trust Fund), according to DOL estimates. The Trust Fund pays benefits when no responsible operator is identified, or when the liable operator does not pay. GAO previously testified in June 2019 that it had identified three bankrupt, self-insured operators for which benefit responsibility was transferred to the Trust Fund. Since that time, DOL's estimate of the transferred benefit responsibility has grown—from a prior range of $313 million to $325 million to the more recent $865 million estimate provided to GAO in January 2020. According to DOL, this escalation was due, in part, to recent increases in black lung benefit award rates and higher medical treatment costs, and to an underestimate of Patriot Coal's future benefit claims. DOL's limited oversight of coal mine operator insurance has exposed the Trust Fund to financial risk, though recent changes, if implemented effectively, can help address these risks. In overseeing self-insurance in the past, DOL did not estimate future benefit liability when setting the amount of collateral required to self-insure; regularly review operators to assess whether the required amount of collateral should change; or always take action to protect the Trust Fund by revoking an operator's ability to self-insure as appropriate. In July 2019, DOL began implementing a new self-insurance process that could help address past deficiencies in estimating collateral and regularly reviewing self-insured operators. However, DOL's new process still lacks procedures for its planned annual renewal of self-insured operators and for resolving coal operator appeals should operators dispute DOL collateral requirements. This could hinder DOL from revoking an operator's ability to self-insure should they not comply with DOL requirements. Further, for those operators that do not self-insure, DOL does not monitor them to ensure they maintain adequate and continuous commercial coverage as appropriate. As a result, the Trust Fund may in some instances assume responsibility for paying benefits that otherwise would have been paid by an insurer. GAO is making three recommendations to DOL to establish procedures for self-insurance renewals and coal operator appeals, and to develop a process to monitor whether commercially-insured operators maintain adequate and continuous coverage. DOL agreed with our recommendations.", "document_type": "gao"}
{"report": "Throughout the course of a construction project, small and large contract changes can be expected after the contract is awarded. These changes are made through modifications to a contract. There are two types of contract changes discussed in this report: bilateral and unilateral. Bilateral change. A bilateral change (also called a supplemental agreement) is a contract modification that is signed by the contractor and the contracting officer. In these cases, the contractor and contracting officer come to an agreement on the price of a contract change prior to the execution of work. Unilateral change. The contracting officer may direct a unilateral change, executed through a change order, without the contractor’s agreement on the terms and conditions of the change. A unilateral contract modification is signed only by the contracting officer. The contractor is generally required to perform the related work. When change orders do not include an agreed-upon price for the work, they may also be referred to as an unpriced change. If a contract change causes an increase or decrease to the cost of performing the work or the scheduled time for performing the work, the contractor will communicate these price and schedule changes to the contracting officer. For there to be an adjustment to the contract’s price, the contractor must submit a specific request or proposal seeking reimbursement for the change. If the contract change has been ordered unilaterally by the government, the contractor may submit a request for equitable adjustment (REA) that reflects these cost and schedule changes and requests reimbursement. In other circumstances, the contractor may submit a proposal in response to a request by the agency that similarly reflects the contractor’s estimate for that increased or decreased cost and the schedule changes. Bilateral and unilateral contract changes typically begin with a similar set of activities, but then the processes diverge once the bilateral or unilateral determination is made. Initial process steps include: identifying the need for a change; determining that the change is within the scope of the existing receiving a cost estimate; and verifying that funds are available for the change. It is generally after this point that the contracting officer determines the type of change—unilateral or bilateral—required. See figure 1 for a notional representation of a change process. Individual contract changes may involve circumstances and process steps that are not outlined below. Agency regulations and policies provide additional direction for managing the construction contract change process (see table 1). In prior work at the Department of Veterans Affairs (VA), we identified challenges and made several recommendations related to the time required for the construction contract modification process. In 2013, we found that VA had not developed guidance to ensure that change orders were approved in a prompt manner, and recommended that officials implement guidance on streamlining the change-order process. VA agreed with our recommendations and has implemented them. In 2017, we found that VA did not collect sufficient information to determine if new guidelines intended to ensure the timely processing of change orders were being followed. We also found that it did not have a mechanism in place to evaluate data on time frames to process change orders. Without such a mechanism, VA could not determine how processing time frames and design changes affect costs and schedules, and thus was at risk for unexpected cost increases and schedule delays. We recommended that VA establish a mechanism to monitor the extent that major facilities projects were following guidelines on change orders’ time frames and design changes. VA has also addressed this recommendation. In 2018, we found that the Veterans Health Administration, a component of the VA, had not established time frames for processing contract changes, and did not have a way to monitor the length of time or the reason contract changes occur. We recommended that officials collect information on contract modifications, establish target time frames that trigger a higher-level review of contract modifications, and centrally establish a mechanism to monitor and review certain contract modifications that were taking longer than the established target time frame. To date, the Veterans Health Administration has not yet fully implemented the recommendations. At a May 2017 congressional hearing before two subcommittees of the House Committee on Small Business, witnesses from the construction industry identified the contract change process as a challenge. They stated that the change process negatively affects cash flows, increases administrative and legal costs, and creates a risk of not receiving reimbursement for completed work. Industry representatives we spoke with reiterated these concerns. Industry representatives also explained that while contract changes were a challenge for businesses of all sizes, small business were likely to be more susceptible to challenges due to their having fewer financial and administrative resources. One resource for small businesses is an agency’s Office of Small and Disadvantaged Business Utilization or Office of Small Business Programs. These offices are responsible for working with agency officials to facilitate participation of small businesses in procurement. However, the small business advocates at GSA and USACE told us that their offices had a limited role in the construction contract change process. According to small business advocates at GSA, for example, their office may get involved in a limited manner when a small business contractor is having difficulty receiving payment by providing guidance on how to make a claim. Congress recently took action that will prompt agencies to gather information on the time it takes to make certain contract changes. Section 855 of the Fiscal Year 2019 National Defense Authorization Act includes a provision that requires agencies to make available information about the agency’s past performance in finalizing, or “definitizing,” REAs with certain construction solicitations. The provision also requires agencies to provide information about its policies and practices associated with how the agencies comply with Federal Acquisition Regulation requirements to definitize REAs in a timely manner. Agencies must start including this information no later than August 13, 2019. A variety of factors affect how long it takes to process a contract change. The factors include the time needed for making a change determination, creating a cost estimate, identifying funds, negotiating with the contractor, completing reviews, and processing the change. According to agency officials, some of these steps play a role in protecting the government’s best interests. For example, creating robust cost estimates helps provide the government with information to inform negotiations with the contractor. Unauthorized work—resulting from unauthorized direction or miscommunication—is another factor that can affect the change process timelines. When the contractor performs unauthorized work, the agency must then take additional steps, such as reviewing the work to determine if it should be reimbursed. Data we reviewed from USACE indicate that a majority of contract changes made from January 2013 through August 2018 were finalized in fewer than 60 days, and a little more than 3 percent took more than 1 year. Contractors and the government sometimes have different perceptions about when the contract change process begins—and therefore how long it takes—based on when the change begins to impact the work. The construction contract change process includes a number of steps that can factor into the time frames for finalizing a contract change, depending on the facts and circumstances surrounding an individual change. For example, USACE officials stated that obtaining a complete proposal from the contractor—with sufficient information on cost and schedule changes to begin negotiations—is a significant factor affecting contract change time frames. Figure 2 illustrates where these factors fall in a notional change process and describes how they may affect time frames. Agency contracting officials at both PBS and USACE note that some of these procedural steps are necessary to protect the government’s interests—which includes negotiating a fair and reasonable price for the work related to the change. According to USACE and PBS contracting officials, any unauthorized work undertaken by the contractor is another factor that can extend contract change process timelines. When unauthorized work is done, the government must take steps such as determining (1) if the work was required; (2) if the work constituted a change to the existing contract; and (3) if so, a fair and reasonable price for the work. Unauthorized work may occur, for example, when the contractor receives direction from a person who is not authorized to direct work, like a project manager. An authorized individual, such as the contracting officer, must provide such direction. Agency officials explained that unauthorized work can be the result of miscommunication between a government project official and the contractor. The contractor may interpret instructions from the unauthorized official as a formal direction to proceed with a change. In other cases, the contractor may begin work in anticipation of a contract change, before receiving any direction at all. One contractor representative told us that, at times, contractors feel pressured to start work without authorized direction to avoid disruption to the overall project that may result in negative performance reviews from the agency. According to USACE contracting officials, the agency compiles and reviews data on construction contract changes on an ad hoc basis to gain insight into time frames for the contract change process within that agency. The data and analysis show that the majority of changes from 2013 through 2018 at that agency were finalized within 60 days; however, a smaller percentage took substantially longer. Approximately 45 percent of the completed contract changes took more than 60 days to finalize, and a little more than 3 percent took more than 1 year. See figure 3 for information on USACE contract changes by the number of days taken to finalize the change. Contracting officials at USACE, as well as industry representatives, told us that government officials and contractors often have different perspectives on when the contract change process begins and, therefore, the time needed to complete it. For example, one industry representative said that the process begins for some contractors when the need for a contract change is identified. The representative explained that this is the point that the project work can change and the contractor begins to experience an impact on cost and schedule. Another industry representative said that some businesses think that the process begins when they submit their request for equitable adjustment, but that the government may not start measuring the process until a government official actively begins to address the request. Meanwhile, USACE contracting officials stated that process time should be measured from when they receive a complete proposal from the contractor, with no missing information. USACE officials told us that the data collected in its contract information system do not always reflect this metric, however. USACE contracting officials told us that, when recording the proposal receipt date that it uses as the start date for the contract change process, some contracting officers enter the date that the initial proposal was received, and others enter the date that a complete proposal was received. USACE contracting officials stated that they plan to address this issue in the future as part of a larger system upgrade. An industry representative explained that these varying viewpoints between government contracting officials and contractors are exacerbated by the contractors’ lack of understanding about the contract change process. The representative also stated that contractors find that the process is not transparent and implementation of the process varies by agency and even by district within the same agency, increasing confusion. While the amount of information on contract changes varies between USACE and PBS, neither agency regularly monitors contract change time frames. In addition to agency guidance that establishes time frames for certain contract change order actions, federal standards for internal control state that an organization should obtain quality information to achieve management objectives and establish monitoring activities. Neither GSA nor USACE has fully established such controls over the contract change process at the headquarters level, limiting management’s ability to identify and respond to problems. USACE information systems have data on contract changes for its more than 40 districts that are sufficient to calculate time frames for finalizing contract changes, but the agency does not regularly aggregate or monitor the information. Officials explained that this was in part due to the manual process required to compile the data centrally and perform calculations. A user must pull data for each USACE district from its contract information system and then manually manipulate the data to determine the time frames. As a result, the data are not reviewed by officials at headquarters on a routine basis. The contracting officials we spoke with said that contract change time frames are reviewed at the local level, specifically by project teams, typically on a weekly basis. Contracting officials also stated that contract change time frames are a factor in performance reviews for contracting personnel. There is currently no agency guidance or documentation for how often contract changes should be reviewed at either the project or district levels, the officials said. USACE contracting officials noted that they are in the early stages of planning for a system upgrade that they hope will automate the process of compiling and analyzing construction contract change data. However, these plans are preliminary. USACE has not yet determined which systems will be involved, nor has it documented these planning efforts to date. PBS contracting officials cannot track time frames for contract changes. While GSA’s contract information system does track and centrally compile data on all contract modifications, PBS contracting officials said there was no efficient way to separate the types of contract changes that we included in our review from other modifications, such as administrative changes or the exercise of options, preventing the calculation of time frames for contract changes. Our review of the GSA data confirmed that the data cannot be used to distinguish between the various types of contract changes. According to PBS contracting officials, to identify a contract change type, a reviewer would have to seek information at the local level by going into the individual contract file and reviewing the modification. Given these limitations, USACE and PBS cannot centrally identify emerging problems with contract change time frames or monitor compliance with existing Department of Defense (DOD) and GSA requirements. As noted above, DOD and GSA have established time frames for certain contract changes. USACE contracting officials said that they would likely establish additional, broad goals for finalizing contract changes in future policy revisions because more targeted goals were often not practical due to the unique circumstances that may affect process times. PBS contracting officials said that compliance with those time frames should be monitored by local staff, such as the contracting officer assigned to the project; however, there is no regular monitoring of that data or systematic way for contracting officers to track this information at the local level. There is currently no effort under way to develop a strategy to address data limitations at the local and headquarters level via information technology system upgrades, according to GSA officials. Further, USACE and GSA anticipate, and our analysis of available data confirms, that system limitations at both agencies are likely to make implementing section 855 of the Fiscal Year 2019 National Defense Authorization Act more difficult. This provision generally requires agencies to include information on recent time frames for definitizing REAs with any construction solicitations anticipated to be awarded to small businesses no later than August 2019. For example, GSA officials stated that to implement this provision would require substantial changes to their contract information system, which they must plan for 2 years in advance. USACE officials said that staff level discussions were ongoing on potential ways to comply with the requirement. They added, however, that in the absence of a system change making the data readily available, they would likely compile data manually, similar to what was provided to us, as an ad hoc substitute. In addition, both agencies said that they had questions about what information they would include in solicitations. Specifically, while section 855 refers to REAs, a USACE contracting official stated that REA could be interpreted differently by the government and industry. Similarly, GSA contracting officials said that the statutory language potentially covers a broad category of information, making it difficult to decide what data to capture and report. USACE officials stated that they will wait for DOD and the Department of the Army to provide direction before changing their system. GSA officials stated that they were not going to take action until further information is provided. One potential source of additional direction is Federal Acquisition Regulation (FAR) case 2018-020, which is developing a proposed FAR rule to implement section 855. The proposed rule is anticipated to be released in the first quarter of fiscal year 2020. Routine, central data collection on the construction contract change process can help agencies understand the scope of any problems encountered. While USACE can compile and review construction contract change information on an ad hoc basis, the agency does not conduct regular monitoring at the headquarters level and must manually manipulate data to review this information. GSA lacks information on the contract change process and its time frames at the headquarters, regional, and local levels. Without regular collection and review of information on the contract change process, contracting officials may be unable to spot potential problems—such as long process times that may affect project schedules—as they occur and respond accordingly. In addition to needing data for management purposes, agencies must also implement new legislative requirements when issuing certain construction solicitations starting in August 2019. While the proposed FAR rule, when issued, should provide agencies with more information on how to implement the new requirements, GSA and USACE could immediately begin to develop strategies to support routine collection and monitoring of time frames. Pursuing preliminary strategies on basic issues—such as what systems may need to be updated and what groups or individuals should be involved—would help these agencies better position themselves to comply with the requirement in a timely manner, and more quickly expand the data available for management purposes. We are making the following two recommendations: The Administrator of General Services should ensure that the Commissioner of the Public Buildings Service develops a strategy that outlines the steps needed to routinely collect information on and monitor the time frames for finalizing construction contract changes at the headquarters level. The strategy could address issues such as the types of construction contract changes that should be included, when the measurement of the contract change process should begin, and the information systems that will be affected. (Recommendation 1) The Secretary of the Army should direct the Chief of Engineers and Commanding General of the U.S. Army Corps of Engineers to develop a strategy to expand on existing data and systems to routinely collect information on and monitor the time frames for finalizing construction contract changes at the headquarters level. (Recommendation 2) We provided a draft of this product to DOD, GSA, and OMB for comment. DOD and GSA provided written comments, reproduced in appendixes II and III, respectively. DOD concurred with our recommendation and provided a technical comment, which we incorporated as appropriate. GSA also concurred with our recommendation, and noted that the agency is developing a plan to address it. OMB provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Acting Secretary of Defense, and the Administrator of General Services. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or woodsw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report were Tatiana Winger (Assistant Director); Betsy Gregory-Hosler (Analyst-in-Charge); Michael Dworman; Gail-Lynn Michel; Peter Anderson; George Depaoli; Lorraine Ettaro; Lori Fields; Gina Hoover; Sam Portnow; Bill Shear; and Anne Louise Taylor. This report (1) identifies factors that affect the time it takes to finalize contract changes at selected agencies, and (2) assesses the extent to which selected agencies monitor time frames for finalizing contract changes. In this report we examined the process for managing unilateral and bilateral contract changes, but exclude certain types of contract modifications to focus on the issues of payments and cash flow challenges. Specifically, we excluded (1) administrative modifications because they do not entail changes to contract costs or time frames; (2) contract changes that go beyond the scope of the existing contract, referred to as cardinal changes; (3) contract options because exercising an existing priced option does not entail the same type of negotiations that unilateral and bilateral changes require; (4) contract disputes and claims because they follow a separate and distinct process; (5) the payment process after a contract change has been finalized because that process is directed by the Prompt Payment Act; and (6) any processes taking place between a prime contractor and its subcontractors because that is outside the focus of this review. To identify agencies for our review, we analyzed Federal Procurement Data System – Next Generation (FPDS-NG) data on construction contract obligations for fiscal year 2017, the most recent data available at the time. This allowed us to identify defense and civilian agencies that had large amounts of construction contract obligations and a relatively significant portion of those obligations going to small business. The data that we used assigned the contract obligations to the agency that managed the construction project rather than the funding agency. We found that the Department of the Army’s U.S. Army Corps of Engineers (USACE) obligated approximately $10.5 billion for construction contracts, with approximately $3.9 billion going to small business concerns. This obligated amount is more than any other federal agency or service within the Department of Defense. We found that the General Services Administration’s (GSA) Public Buildings Service (PBS) obligated approximately $1.9 billion for construction contracts, with approximately $870 million going to small business concerns. To assess the reliability of the FPDS-NG data we used, we (1) performed electronic testing of selected data elements, and (2) reviewed existing information about the FPDS-NG system and the data it produces. Specifically, we reviewed the data dictionary, data validation rules, and other documentation. Based on these steps, we determined the data were sufficiently reliable for the purposes of this report. To identify federal construction industry representatives for this engagement, we collected information on potential associations from various sources including previous congressional testimony and our prior work. From this list of options, we sought organizations that were focused on federal construction contracting, included a small business focus, represented a large number of contractors, and had performed previous advocacy work on the issues of under review in this engagement. Based on these criteria, we selected two organizations to interview: the Associated General Contractors of America and the National Association of Small Business Contractors. The Associated General Contractors of America, which sent a representative to a congressional hearing on the contract change process, represents 26,000 member firms and includes a division dedicated to federal construction as well as a small business committee. The National Association of Small Business Contractors specializes in small business contractors working with the federal government, and is affiliated with the American Small Business Chamber of Commerce. We interviewed representatives from these associations to confirm background information about how the change process impacts industry and further discuss the factors that affect process time frames. To identify the factors which affect the time it takes to finalize contract changes at selected agencies, we reviewed relevant legislation such as the John S. McCain National Defense Authorization Act for Fiscal Year 2019, regulations including the Federal Acquisition Regulation (FAR), the Defense Federal Acquisition Regulation Supplement, GSA Acquisition Regulation, and the GSA Acquisition Manual and relevant agency policies and guidance. We interviewed staff from the Office of Management and Budget’s Office of Federal Procurement Policy—the Administrator of which serves as the Chair of the FAR Council—and contracting officials from the PBS and USACE. In addition, we interviewed officials from GSA’s Office of Small Business Utilization and USACE’s Office of Small Business Programs to discuss their role in the change process and their perspective on possible impacts to small business concerns. To assess the extent to which selected agencies monitor time frames for finalizing contract changes, we collected and reviewed available GSA data on contract modifications. We also collected available data and analysis from USACE on construction contract changes from January 1, 2013 to August 17, 2018—representing more than 62,000 changes from the more than 40 USACE districts and one office that execute construction contracts—obtained from the USACE’s Resident Management System. We reviewed USACE analysis of those data that calculated time frames for the contract changes by measuring the time elapsed from the date a proposal is received to when the contract change is finalized by the signature of Standard Form 30, which officially modifies the contract. We also reviewed system documentation on the requirements for users to enter data into the systems. We interviewed PBS and USACE officials at the headquarters level to discuss the time frames for contract changes, including on how long officials believe the process takes, what data are available, and who reviews any data collected on the contract change process. We discussed the provided USACE data with knowledgeable USACE officials who performed the calculations to understand their process, assumptions, and methodology. We determined the data were sufficiently reliable for the purposes of describing what is known about the time frames for finalizing construction contract changes. We also interviewed an official in GSA’s Office of Government-wide policy, to discuss any GSA-wide plans for system changes. We conducted this performance audit from August 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings based on our audit objectives.", "summary": "In fiscal year 2018, federal agencies spent more than $36 billion on construction contracts, with more than 45 percent going to small business. Typically, construction projects involve some degree of change as the project progresses. Some federal construction contractors have raised concerns that delays in processing contract changes and making payments creates challenges, particularly for small businesses. Section 855 of the National Defense Authorization Act for Fiscal Year 2019 requires agencies to report information related to how quickly they finalize contract changes. GAO was asked to review federal construction contract change processes and timeframes. GAO (1) identified factors that affect the time it takes to finalize contract changes, and (2) assessed the extent to which selected agencies monitor time frames for finalizing contract changes. GAO reviewed relevant regulations and agency policies, analyzed available data, and interviewed officials from GSA's Public Buildings Service and USACE—two agencies with large amounts of obligations on construction—and two industry associations. Multiple factors affect the time it takes to finalize a construction contract change. For example, preparing cost estimates can be time consuming, particularly for complex changes. Yet the time may be used to help ensure the government has adequate cost data to inform negotiations. In addition, according to agency officials, miscommunication during the contract change process—which can lead to problems such as unauthorized work undertaken by the contractor—can result in additional reviews and longer time frames. According to U.S. Army Corps of Engineers (USACE) data, most of its construction contract changes are finalized within 60 days. Some take much longer, however (see figure). Agency officials and industry representatives agreed that perceptions differ about the length of the contract change process. For example, because a change can impact the contractor's cost and schedule immediately, the contractor typically perceives that the process starts earlier—and lasts longer—than the government does. Neither GSA nor USACE regularly monitors how long it takes to finalize construction contract changes, limiting management's ability to identify and respond to problems. Internal controls require agencies to collect and use quality data for management purposes such as monitoring agency activities. GSA systems do not collect data that permit analysis of contract change timeframes at the headquarters level. USACE systems produce contract change data for its districts, but data consolidation and calculations must be done manually and are not done regularly. Neither agency has a strategy in place to address these issues. Without regular review of these timeframes, USACE and GSA contracting officials may be unaware of any existing or potential problems, such as long process times that may affect project schedules. In addition, these data system limitations are likely to create difficulties for agencies when providing the information required by new legislation. GAO is making two recommendations: that GSA's Public Buildings Service and USACE each develop a strategy to routinely collect information on and monitor time frames for construction contract changes at the headquarters level. Both agencies concurred with our recommendation.", "document_type": "gao"}
{"report": "The federal government’s civilian real-property holdings include thousands of leased office buildings and warehouses across the country that cost billions of dollars annually to rent, operate, and maintain. GSA’s Public Building Service acquires space on behalf of the federal government through new construction and leasing and acts as a caretaker for federal properties across the country. The type and amount of space for each lease varies based on a particular agency’s need, and GSA categorizes leases by value depending on factors such as square- footage and location. As of fiscal year 2018, the Public Building Service held or leased space in 8,681 buildings or other assets and maintained an inventory of more than 370-million square feet of workspace for 1.1 million federal employees, plus support contractors. The federal-leasing process contains several stages, and brokers can be involved in many parts of this process (see fig. 1) as a way to supplement the work of GSA’s leasing staff. For example, in the “requirements development” phase, GSA can task brokers with drafting project milestones and working with federal agencies that are seeking building space to provide a complete requirements package. In the “lease acquisition” phase, brokers can conduct market research on rental rates, negotiate rates and terms of the lease, and prepare final contract forms. For such work, brokers can earn a commission based on a percentage of the aggregate lease value. However, pursuant to the Federal Acquisition Regulation, brokers are not allowed to complete some activities, as contractors cannot be used for the performance of inherently government functions. Brokers are not allowed to complete all required leasing tasks to execute a federal government lease. For example, according to GSA officials, a broker cannot sign a lease contract on behalf of the federal government with a property owner since that action is considered an inherently governmental function. The broker may prepare the final lease contract, but GSA’s contracting officials are responsible for signing the lease. Even when a broker is involved in the leasing process, GSA officials oversee and approve the broker activities. Prior to 2015, GSA had implemented various changes to how it used brokers to assist with its leasing program. Before 1997, GSA’s in-house staff completed all leasing acquisition work, but starting in the late 1990s, downsizing initiatives at GSA reduced the number of staff and therefore its in-house capacity to acquire leases. In 1997, GSA began to increase its use of brokers by signing regional contracts for broker services and paying brokers by using appropriated funds. By 2003, brokers were completing approximately 20 percent of GSA’s leasing work. In 2003, GSA analyzed the advantages, disadvantages, and costs of different types of contracting options for using the brokers, including having them negotiate leases on a nationwide basis, as compared to designated geographic zones or local areas. Based on that analysis, GSA concluded that contracting for brokers to negotiate leases nationally represented the best option available and formalized the program as the National Broker Contract program. In 2004, under this program, GSA awarded nationwide contracts to four commercial real- estate brokerage firms, moving from a regional to a national approach. In 2010, GSA established the second iteration of the broker program (called the National Broker Contract 2), which maintained a similar nationwide structure with four national contracts to brokers. We have previously found that GSA has been unable to demonstrate cost savings with its broker program. For example, in 2007, we found that GSA was unable to quantify savings from the program and recommended that GSA develop processes for doing so. In response to our recommendation, GSA conducted a comparative analysis of prior agency contracts and broker contracts; this analysis demonstrated program cost savings. However, GSA’s subsequent efforts to demonstrate continued cost savings were less conclusive. For example, in 2012, when GSA attempted to compare rental rates negotiated by brokers with those negotiated by in-house staff, the agency found little difference between the two and noted that the data were insufficient to conduct a meaningful comparison. In 2013, we found that GSA had not linked its goals and metrics for evaluating the broker program to the anticipated cost savings in rental rates. As a result, GSA had no means of evaluating and reporting on this aspect of the program, and the value of the broker program in terms of cost savings continued to be unclear. We recommended that GSA link program goals to anticipated cost savings and develop and implement a means of evaluating and reporting program results. In response, GSA developed a metric for measuring the efficacy of utilizing brokers to assist with lease workloads and a performance report that included information on financial savings and productivity, among other things. We found limitations; however, with these efforts, as discussed in the second section of this report. GSA has made changes to the broker program to allow more brokers to participate and to increase GSA’s flexibility in its use of brokers. In 2015, GSA changed the program’s name to the GSA Leasing Support Services program (GLS). Under this version of the program, GSA moved from using four brokers on a nationwide basis to designating brokers within four geographical zones. GSA awarded contracts to two or three brokers for each zone (see table 1). Thus, each GLS contract covers a zone rather than the entire country, as was previously done under the National Broker Contract. Currently, there are six GLS brokers, and each broker can serve up to two zones. Of the six GLS brokers, five participated in the National Broker Contract programs. According to GSA officials, modifying the program to operate by zone provided a greater opportunity to involve more brokers, increase competition and local market specialization, and strengthen relations among brokers and GSA regional offices. In addition, awarding contracts by zones rather than the entire country has allowed small businesses to participate as brokers, and GSA selected two small-business brokers as prime contractors: Carpenter Robbins Commercial Real Estate, Inc., and Public Properties LLC. Multiple GSA regional offices oversee and monitor brokers within each zone, except for the National Capital region, which is its own zone. In early 2020, GSA plans to announce the brokers that will be involved in the fourth iteration of the program. In this iteration, called GLS Plus, the zones and number of brokers within each zone will remain the same. In addition to establishing the zones, GSA has also allowed its regional staff to have more flexibility in deciding how to use brokers. During the past two iterations of the National Broker Contract, brokers had to be involved during the entire leasing process. In the GLS program, regional GSA officials choose broker services for specific parts of the leasing process based on the needs of the region. For example, several regional officials said they could now request brokers to perform market research or negotiate a lease, while GSA staff performs other tasks to complete a lease. Officials in three of the six regional offices we interviewed said this change provided additional flexibility in how GSA involves the brokers in the leasing process and helped balance the workload of GSA staff. In GLS Plus, GSA will request that brokers provide additional post-award services such as evaluating pricing for proposed renovations and monitoring on-site construction progress for the leased facility. In the GLS program, about 64 percent of the brokers’ workload were high- value leases. GSA officials told us they typically task brokers to negotiate these high-to-moderate value leases because brokers are paid through commissions as a percentage of the lease’s value. Since they earn more money with high value leases, they have a greater incentive to participate in the program. Consistent with what GSA officials said, the agency’s leasing data showed that leases involving brokers tended to have large square-footage and higher rents than the rents for leases that did not involve brokers, as shown in table 2. According to GSA’s leasing data from October 2005 to July 2019, the agency used brokers in about 37 percent of all leases. Available data did not clearly demonstrate the extent to which brokers negotiated lower lease rates than GSA’s in-house staff for similar types of properties. Although there are differences in rental rates and other outcomes of leases involving brokers compared to those that do not, it is difficult to determine whether these differences are due to having brokers involved in the process as opposed to the characteristics of the leases themselves. Various factors affect rental rates in federal leases, such as local market areas, type of facility, square footage, and unique requirements, among other issues. According to the Public Buildings Service’s Commissioner, brokers are more successful at negotiating lower lease rates relative to the market than GSA in-house staff and using brokers provides savings to the government. GSA officials said they believe this result is in part because brokers negotiate what are called “commission credits”—a percentage of the total commission that goes back to the federal tenant agency in the form of a reduction in rent— which can result in lower costs for federal tenant agencies. In contrast, several lessors (property owners) said that when GSA uses brokers to negotiate leases, broker commissions have to be paid by the lessor and that this cost is ultimately passed on to GSA’s federal-agency-tenant clients. Furthermore, three real estate economists we interviewed indicated that real-estate sale prices and rental rates are driven primarily by competitive market forces and thus would not be heavily influenced by broker negotiation. These economists were not aware of any research indicating that brokers could affect commercial real estate rental rates. As previously noted, GSA typically tasks brokers to negotiate high-to- moderate value leases. A broker-negotiated GSA lease includes a total commission negotiated between the lessor and the broker that represents a percentage of the aggregate lease value. This total commission is comprised of the standard commission paid to the broker and commission credits given back to the federal tenant agency. In the GLS program, the total commission sometimes includes a “best value” commission that a broker may earn on top of the standard commission. This total commission includes the following three components: Standard Commissions. The standard commission a broker earns is normally a percentage of the total lease value. Our analysis showed that brokers earned about $390 million in standard commissions since fiscal year 2006 (see table 3). For the GLS program, brokers had earned just over $35 million as of July 2019. At the time of our review, the program was ongoing, and brokers were still completing leases. Best Value Commission. Under the GLS, in addition to the standard commission that a broker always earns, the broker can be paid an additional commission, called the “best value commission,” by negotiating a lease rate below an established market rate target and earning high evaluation ratings from GSA. Specifically, the best value commission was expected to incentivize brokers to negotiate lower rental rates. This best value commission is paid out of the commission credit the tenant agency would otherwise receive and does not increase the total cost of the commission. As of July 2019, brokers had collected about $3.5 million in best value commissions during the GLS program. GSA plans to eliminate the best value commission in the new iteration of its broker program, GLS Plus. Officials said determining whether brokers met the best value criteria was burdensome for regional officials and that brokers prefer a steady volume of future government leases as an incentive. Similarly, two real estate economists we interviewed said that the best value commission was unnecessary to incentivize brokers to seek the best rates for their GSA client, and that the prospect of additional future business negotiating government leases was a sufficient incentive. Commission credits. The commission credit is a percentage of the total commission that goes back to the federal tenant agency in the form of a reduction in rent. As part of the total commission, brokers have negotiated over $340 million in commission credits. GSA estimates that its future GLS Plus program will generate $129 million in commission credits throughout the duration of the program. Lessors and real estate economists we interviewed highlighted various issues about GSA’s commission structure, including commissions paid to the broker and commission credits paid back to the tenant agency. The interviewees had different perspectives on whether GSA’s broker program and the current commission structure are beneficial to the federal government. Some questioned whether the use of brokers saves the federal government money. As previously noted, according to GSA officials, lessors, through the commission, pay the brokers, which is customary in commercial real estate. Although GSA does incur some costs from appropriated funds because GSA officials oversee the work of brokers, GSA officials noted that GSA does not currently use its own appropriated funds to compensate brokers for services performed as a part of the broker program. However, four lessors that we interviewed said that broker commission costs are passed through to federal tenants in their leases. These lessors questioned the benefits of using brokers for federal leases. In contrast, two real estate economists we interviewed said that GSA could potentially be missing cost-saving opportunities when brokers are not used because rental rates are generally set by competitive market forces, also GSA’s in-house staff may not negotiate commission credits. GSA officials, however, disagreed with this statement, saying in-house staff generally seek to receive credit or concessions for leases they negotiate since there is no commission to be paid to a broker. Another real estate economist we interviewed indicated that paying brokers based on a fixed price basis, versus a commission basis, could result in lower costs to the government because this type of payment structure could involve GSA brokers’ bidding for lease acquisition assignments in fixed-price terms only. This real estate economist also said that this approach could potentially address past concerns involving GSA’s commission structure. Over the years and with different iterations of the program, GSA has established various goals for the broker program; most of these goals pertain to cost savings. During our review, GSA officials also said that the main purpose of the program is to serve as a workforce multiplier for the regional offices—providing needed personnel to complete leases that GSA does not have enough staff to complete on its own. Our review of GSA documents and interviews with GSA staff identified various program goals as shown in table 4. For GLS Plus, the fourth iteration of the broker program, which GSA plans to start in mid-2020, the proposed goals include achieving taxpayer savings, improving the customer experience, and leveraging broker expertise. GSA officials also said that maximized productivity would be a goal of the program. As previously discussed, one of the main goals of the broker program is to avoid costs and save the taxpayer money. In November 2019, GSA headquarters officials said that they demonstrate cost savings of the broker program through its Lease Cost Avoidance Plan, which aggregates cost-savings from several efforts, including negotiating leases below market rates, reducing rented square footage, and leasing vacant space. A metric within the Lease Cost Avoidance Plan that seeks to show whether leases are negotiated below market rates is called Lease Cost Relative to Market, which is a comparison of the negotiated rental rate to the target market rate. According to this metric, as reported by GSA, over the last 3 years, brokers have negotiated 303 leasing deals, 60 percent of which were below the market rate (17.8 percent below the market rate, on average), which helped GSA avoid $676 million in costs. In addition, GSA found that brokers negotiated better rental rates than GSA in-house staff, on average. For example, GSA reported that in fiscal year 2018, 56 percent of leases negotiated by brokers were below the market rate compared to 38 percent of leases negotiated by GSA in-house staff. As discussed previously, however, there are various factors, including the type of lease that may account for these differences. This metric is calculated primarily using market lease rates that GSA determines using a tool it developed called the “Bullseye” report. To develop the report, GSA gathers available market data from commercial real estate databases and compiles these data to identify local information, analysis, and insight regarding the local real estate submarket. According to GSA guidance, the success of the GLS program is dependent on the brokers’ negotiating competitive lease rates through full utilization of the Bullseye report and standardized negotiation objectives. The guidance further states that the Bullseye report should be utilized by GSA regional offices as a tool to make informed leasing decisions on behalf of the U.S. government and can provide the necessary backup documentation to aid leasing personnel in their negotiation with an offeror. While GSA headquarters officials noted that this tool is adequate for this use, other GSA officials and brokers had concerns about whether the Bullseye report accurately reflects market rates and conditions. GSA regional officials we interviewed had mixed views on the accuracy of the Bullseye report. For example, several officials questioned the accuracy or noted limitations to the Bullseye report. In addition, four of the six brokers found the Bullseye report to be rarely or only sometimes accurate. As a result, brokers told us that they found it difficult to negotiate a rental rate at or below the target Bullseye rate. In addition, two lessors we interviewed agreed that the gap between the Bullseye report and local market rates potentially affected negotiations with GSA. Furthermore, brokers publicly questioned the accuracy of Bullseye reports in written responses to GSA’s draft solicitation for the 2020 GLS Plus program. They also suggested that the new broker program should include an adjudication process for revisiting Bullseye target rates. Selected GSA regional officials and brokers in our review identified several factors that may affect the accuracy of the Bullseye reports: Geography. According to GSA officials, the Bullseye report includes market rates from over 85 major markets in the U.S. However, GSA regional officials and brokers we interviewed said that the Bullseye report provides limited submarket rental rates for specific areas or neighborhoods within large metropolitan areas. This can be problematic because there can be significant rental differences among different areas within a given market. For example, in response to GSA’s draft solicitation for the new broker program, brokers stated that they found the Bullseye target rates to be an obstacle in the rapidly moving West Coast urban markets, and there can be significant discrepancies between Bullseye rates and actual market rates. One selected GSA regional office in our review provided examples of the Bullseye target rate being below the market rate in several instances. For example, the average asking rent for office space in San Diego, CA, was 36 percent higher than the Bullseye rate. Federal requirements. According to GSA regional officials and to brokers, the Bullseye report does not take into account the unique building requirements for federal leases. For example, GSA officials and brokers reported that the Bullseye report develops a target rental rate based on certain classes of buildings (A, B, and C). Although the government generally accepts A and B class buildings, C buildings are generally unacceptable for federal leases. Brokers we interviewed said including these C building rates could lower the market rates identified by the Bullseye market report for certain areas. GSA officials said they are not able to remove the C building rates from the Bullseye report because the data are purchased from a private-sector data source that includes various building rates from a local area. In addition, brokers said the Bullseye report does not take into account the unique requirements of federal buildings. For example, federal law enforcement agencies require certain security measures, such as special entrances. Brokers reported that landlords may increase their pricing to account for these factors. Brokers also identified these issues in the draft solicitation for the new broker contract, noting that the Bullseye does not use comparable buildings that take into account the uniqueness of a specific space requirement. Lag time. Several brokers and GSA officials told us that federal leases generally take significantly longer than commercial leases due to the federal leasing acquisition process. As a result, GSA officials and brokers found that by the time a lease was awarded, which could be years later, the initial target market rate provided by the Bullseye report was outdated. GSA headquarters officials told us if the Bullseye report is over a year old, then an updated report should be requested, although it’s not mentioned by the 2016 Bullseye guidance memo. Officials from selected GSA regional offices varied on whether those updates occurred or not. Furthermore, several brokers in our review told us that they found that the Bullseye report is not always updated after a year. One broker told us that there have been several instances when a lease is about to be awarded—which can be 1 to 2 years after the initial Bullseye report was generated—and the tenant agency is not willing to accept the rental rates negotiated in the lease. Or GSA’s leasing staff is hesitant to execute the lease due to differences between the Bullseye rate and the actual lease contract rate. This can cause significant delays or result in the project being canceled all together. Concerns about the reliability of the Bullseye report call into question whether the Lease Cost Relative to Market metric can accurately demonstrate how brokers’ efforts lead to cost savings, either through achieving rental rates below market or better rates than GSA in-house staff. Even though GSA provided us cost-savings data in November 2019 based on this metric, at other times during our review, GSA officials described limitations and questioned the efficacy of using this metric. Specifically, in April 2019, GSA headquarters officials told us that GSA had stopped using this metric because GSA found it unreliable. For example, GSA found the comparison was not indicative of broker effectiveness or ability to negotiate low rental rates. At that time, GSA officials cautioned against using the Lease Cost Relative to Market data for comparative purposes, such as comparing broker performance to in- house GSA staff performance. The officials said it is impossible to assess the financial information of a lease transaction and evaluate a specific procurement method—using brokers or not—without talking directly to the GSA in-house staff responsible for overseeing the procurement. Furthermore, GSA officials told us in April 2019, that leases negotiated by brokers were not comparable to leases negotiated by in-house staff because they work on different types of leases. In December 2019, however, GSA officials told us that GSA does still track this metric, uses it for GSA’s Lease Cost Avoidance Plan, and that the agency believes brokers can achieve better deals for the government than in-house staff. Nonetheless, GSA officials told us that they have not assessed the reliability of or made any changes to how they calculate the Bullseye report. According to Standards for Internal Control in the Federal Government, management should use quality information to achieve the entity’s objectives and to inform decision-making. Until GSA assesses the reliability of the information used to calculate reported cost savings for the broker program, it is hindered in its ability to fully assess the effectiveness of the program. As noted above, throughout the various iterations of the program, GSA has identified various goals for the broker program. During this review, a key goal consistently stated by GSA officials we interviewed was the use of the broker program as a workforce multiplier—providing additional people that enable GSA to complete leasing work it would otherwise be unable to complete. The effectiveness of the broker as a workforce multiplier is significant to GSA because leasing staff has decreased by over 50 percent since the late 1990s, from over 800 personnel to less than 400 in 2019. Consequently, GSA staff rely on brokers to deliver leased space to federal agencies. GSA officials told us that a broker may not accomplish a lease faster or cheaper than GSA staff but that the agency does not currently have the personnel to complete its leasing work. GSA’s Strategic Plan 2018-2022 also states that GSA will use brokers where appropriate to improve efficiency in awarding leases. Although GSA has set target goals for utilizing brokers and tracks the number of leases regional officials assign to brokers, we found that GSA had limited ability to track how using brokers to augment the GSA’s leasing workforce achieves results for GSA’s leasing efforts. For example, GSA has increased its broker utilization targets in recent years, as described in figure 2, requiring regional offices to award more lease projects to brokers. Moreover, GSA tracks performance relative to these targets, and regional officials in our review told us that they are evaluated based on the number of leases they task to brokers. Additionally, in April 2019, GSA developed a model to project, on average, the number of hours a broker saves the GSA’s lease-contracting officer and project manager. The project estimated the broker saved roughly 175 to 125 hours, respectively, per project over a 3-year period. GSA then multiplied the hourly salary of GSA leasing personnel by the potential number of hours saved to generate their reported personnel savings of $3 million per year. However, tracking these outputs alone does not provide GSA with a means to measure the effectiveness of the broker program as a workforce multiplier. An output measure tracks the direct product or activity delivered by a program, while an outcome measure tracks the progress the program is making toward achieving its goal. Tracking the number of hours a broker saves for GSA officials provides limited information to help GSA understand the overall benefits of the broker program as a workforce multiplier. For example, this goal does not demonstrate if brokers are more productive than in-house staff or if they are completing leases more efficiently, such as brokers completing an additional number of leases on an annual basis. According to GSA officials, the principal way they measure broker program outcomes is through its Lease Cost Avoidance Plan, which, as we previously discussed, aggregates cost savings from a number of GSA leasing efforts, including the broker program. The plan identifies realized cost avoidance through various metrics such as leases negotiated below market costs and reductions in rental square footage and vacant space. However, aside from the negotiated rental rates, GSA does not currently have specific metrics that allow it to distinguish the particular role brokers play in achieving those results. For example, GSA officials said that the more leases that can be replaced by using brokers, the more GSA can tackle its expiring lease inventory and right size leases with rental square foot reductions. Specifically, GSA officials said that brokers contributed to a 2.5 percentage square footage reduction in fiscal years 2018 and 2019. However, since this metric applies to the leasing program in general and is not specific to the brokers, GSA is unable to demonstrate the extent to which such reduction is attributable to the use of brokers. GSA officials also told us that using brokers allows GSA to replace more leases on time and thus avoid extending leases, which is more costly and can lead to agencies renting space under less favorable terms. GSA measures this through its lease replacement rate, which tracks the percentage of expiring leases that are replaced in a timely manner. For example, GSA reported that in fiscal year 2019, it replaced 61 percent of its lease inventory, which represented $481 million of its $791 million lease inventory. However, while GSA tracks the number of lease extensions brokers have worked on, GSA is unable to demonstrate the extent to which the use of brokers helps GSA avoid lease extensions and holdovers. Furthermore, similar to the Lease Cost Avoidance Plan, this metric applies to the leasing program in general and is not specific to the brokers. As a result, GSA has limited information on the extent to which brokers contributed to leasing program outcomes. GPRA, as amended, creates a framework for articulating unified goals and outcome measures that can provide federal agencies with a clear direction for successful implementation of program activities and improve the efficiency and accountability of agencies’ efforts. We have previously reported that the GPRA framework can serve as a leading practice at other organizational levels, such as component agencies, offices, programs, and projects. GPRA calls for outcome-based metrics that are linked to goals, which allow a program to track the progress an organization is making toward achieving its intended outcome. Because GSA lacks outcome-based metrics that demonstrate the broker’s role in achieving the program’s goal for being a workforce multiplier, GSA is hindered in its ability to distinguish the role brokers played in its reported program results. Furthermore, having such a metric could help GSA make better decisions about the balance of brokers versus in-house leasing staff since GSA received $34 million dollars for fiscal year 2020 to hire an additional 34 GSA lease-contracting officers and specialists. GSA officials said they plan to complete this hiring in 2020. GSA has developed a program that allows the agency to utilize expertise and personnel from leading commercial real-estate brokers to help it complete thousands of federal leases. GSA has stated cost savings and workforce goals for the broker program but lacks the information necessary to assess if the program is achieving its intended results. If GSA envisions that the use of brokers is to save money, then having quality, reliable data and information is critical to demonstrating this result. If using brokers to augment GSA’s workforce were also a goal, then having outcome-based metrics would allow GSA to show whether it is achieving that goal. This information is especially critical as the program has changed over time and could provide GSA insight on what has been successful in the past. This information would also inform GSA’s decision-making as it launches another version of its broker program and uses millions of dollars in appropriated funds to increase the agency’s leasing personnel. We are making the following two recommendations to the Administrator of GSA: GSA should assess and address the reliability of the information used to calculate reported cost savings for the broker program. (Recommendation 1) GSA should develop outcome-based metrics to evaluate the effectiveness of using brokers to supplement the GSA’s leasing workforce. (Recommendation 2) We provided a draft of this product to GSA for review and comment. GSA provided written comments, which are summarized below and reproduced in appendix I. GSA said it did not agree with our main conclusions and findings because it believed our report did not acknowledge brokers’ demonstrated benefits. We noted throughout the report that brokers play an important role in helping GSA achieve various leasing-related goals. Our position is that the lack of quality data and outcome-based metrics inhibit GSA’s ability to demonstrate the brokers’ specific effect in achieving GSA’s goals as compared to other factors. With regard to the first recommendation about data used to calculate reported cost savings from the broker program, GSA said it concurred with the recommendation and is making changes to its data systems that it believes will improve its data on brokers. GSA said it did not agree with the second recommendation as it was originally worded about having outcome-based measures to evaluate the effectiveness of using brokers. In providing technical comments on our report, GSA officials raised concerns that this recommendation gave the impression that GSA had no metrics to assess the brokers. The agency said that it has several outcome-based metrics in place that it believes can be correlated with the value of the brokers, including achieving cost savings, replacing leases on time, and reducing the need to hire more GSA staff. In GSA’s letter, it referenced these statistics, several of which we had included in our report as well. For example, our report discusses GSA’s Lease Cost Relative to Market measure, which is a comparison of the negotiated rental rate to a target market rate. We also noted, however, that this metric is calculated primarily using data, that GSA staff and other stakeholders we interviewed expressed concerns about as unreliable. These concerns resulted in our first recommendation. Further, other metrics, such as reducing square footage and replacing leases, that GSA pointed to relate to GSA’s leasing efforts in general and are not designed in a way to distinguish the brokers’ contributions specifically. Specifically, GSA officials said that brokers contributed to a 2.5 percentage square footage reduction in fiscal years 2018 and 2019. This metric, however, applies to the overall leasing program, and GSA is unable to demonstrate the extent to which such reduction is attributable to the use of brokers. In addition, GSA does not have a means to measure the effectiveness of the broker program in supplementing its workforce to achieve these goals, a result that GSA staff in headquarters and regional offices consistently told us was the primary reason GSA uses brokers. Tracking the number of hours a broker saves for GSA officials provides limited information to help GSA understand the overall benefits of the broker program. Such information does not demonstrate if brokers are more productive or efficient than in-house staff, such as whether brokers are completing an additional number of leases on an annual basis, for example. Additional metrics focused on evaluating the outcomes of GSA’s use of brokers would benefit the agency because it has lost over 50 percent of its leasing personnel since the 1990s. Furthermore, GSA received $34 million to hire additional agency lease-contracting officers and specialists in 2020. Consequently, it is imperative that it has information and data that could inform the right mix of brokers and GSA leasing personnel as the agency moves forward with its leasing work. In response to GSA’s concerns and to make our recommendation more specific, we clarified the recommendation. Specifically, we focused it more narrowly on the need to evaluate the effectiveness of using brokers to supplement the GSA leasing workforce. We also made some additional changes to the draft to include more information about the metrics GSA uses and that it believes can be correlated to the use of brokers. We are sending copies of this report to the appropriate congressional committees, the Administrator of the General Services Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or RectanusL@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Lori Rectanus, (202) 512-2834 or RectanusL@gao.gov. In addition to the individual named above, other key contributors to this report were: Andrew Huddleston (Assistant Director), Nelsie Alcoser, (Analyst-in-Charge), Caitlin Cusati, Josh Ormond, Colleen Taylor, Jack Wang, Michelle Weathers, Crystal Wesco, and William Woods.", "summary": "As the leasing agent for the federal government, GSA acquires space for federal agencies and currently manages over 8,000 leases. To help negotiate leases, GSA contracts with commercial real-estate brokerage firms. In previous reviews, GAO reported that GSA was unable to demonstrate cost savings and results from its use of brokers, and GAO made related recommendations. A statute included a provision for GAO to review GSA's broker program. This report examines: (1) how GSA's broker program has changed over time and (2) GSA's goals for the broker program and how GSA measures the program's results. GAO reviewed documentation from GSA's broker program and GSA's available data on leases assigned to brokers from October 2005 to July 2019. GAO interviewed officials from GSA headquarters, selected GSA regional offices that work with brokers, as well as other stakeholders, including representatives from the six brokers currently participating in the program. The General Services Administration (GSA) contracts with commercial real estate brokers to perform a variety of services needed to acquire and complete leases. GSA uses brokers to negotiate leases meeting certain thresholds in urban areas (see figure). GSA has made several changes to its broker program since 2015, including: changing how brokers can be assigned to leases, i.e., using brokers for specific geographical zones rather than on a nationwide basis; allowing greater flexibility in when and how brokers can be used during the leasing process; and changing the name from the National Broker Contract program to the GSA Leasing Support Services program. Statistics for General Services Administration's (GSA) Leases That Involve Brokers Compared For the broker program, GSA's goals include saving money and supplementing its leasing workforce; however, potentially inaccurate data and limited outcome-based metrics could affect GSA's ability to assess whether it is meeting these goals. According to GSA, in the last 3 years, brokers have negotiated 303 leases, 60 percent of which were below the market rate (17.8 percent below the market rate, on average), an outcome that, GSA says helped it avoid $676 million in costs. However, selected GSA regional officials and brokers expressed concerns about the accuracy of the market reports used to calculate these cost savings. Additionally, while GSA has identified various outcome-based metrics related to its leasing program, these metrics do not indicate whether using brokers to supplement its leasing workforce has enabled GSA to complete leasing work it would have otherwise been unable to complete. For example, GSA sets targets for and tracks the number of leases assigned to brokers each year, but this measure is not an indicator of the effectiveness of using brokers. Quality information, along with additional reliable outcome-based measures, is important for GSA to define success for its 2020 broker program which creates new contracts and expands services performed by brokers. GAO is making two recommendations that GSA should: (1) assess and address the reliability of the information used to calculate reported cost savings and (2) develop outcome-based metrics to evaluate the effectiveness of using brokers to supplement the GSA leasing workforce. GSA concurred with the first recommendation but did not concur with the second. GAO continues to believe that GSA needs metrics to assess the brokers' role as a workforce supplement.", "document_type": "gao"}
{"report": "The Coast Guard is a multimission, maritime military service that is responsible for maritime safety and security, environmental protection, and national security, among other missions. Given the Arctic region’s expansive maritime domain, the Coast Guard plays a significant role in Arctic policy implementation and enforcement. Therefore, as we have reported, as more navigable ocean water has emerged in the Arctic and human activity increases, the Coast Guard has faced, and will continue to face, expanding responsibilities in the region. In June 2016, we found that the Coast Guard assessed its capability to perform its missions in the Arctic in fiscal year 2012 and identified various capability gaps, including the following: Communications: including the lack of communications architecture. Harsh weather conditions, high latitude disturbances, and geomagnetic storms combine to make communications in the Arctic difficult. Arctic maritime domain awareness: including limited nautical charting, inadequate navigation systems, and insufficient surveillance. Extremely limited operational assets and support infrastructure in the Arctic, as well as the harsh operating environment, make achieving maritime domain awareness a challenge. Infrastructure: including limited aircraft infrastructure on the North Slope in northern Alaska and limited logistical support. Facilities located below the Arctic Circle, and even those within Alaska, provide limited capability to support Arctic missions due to the long transits to the Arctic region. No deepwater ports currently exist on the North Slope or near the Bering Strait that are capable of refueling and re- provisioning polar capable cutters. This forces the Coast Guard’s polar capable cutters to expend significant time transiting long distances to and from replenishment ports. Development of infrastructure to support operations is challenging, in part, due to the high cost of transporting materials to the Arctic and short construction seasons. Training and exercise opportunities: including a limited pool of Arctic-trained and experienced Coast Guard personnel, and limited training, exercise, and educational opportunities to enhance Arctic skills among staff. According to Coast Guard officials, few opportunities exist to train in the Arctic, in part, because of limited Coast Guard icebreaking capacity. Icebreaking: including limited icebreaking capacity given the Coast Guard’s existing active inventory of one medium and one heavy polar icebreaker, as discussed later in this testimony. At the time of our June 2016 review, Coast Guard officials stated that the capability gaps were not the sole responsibility of the Coast Guard to mitigate and did not completely impair or eliminate their ability to perform operations. For example, while communications can be a challenge in remote regions, the risk of lost communications can be mitigated by using multiple assets working together to mitigate risk if lost communications is anticipated. Coast Guard officials also stated that given its activity levels at the time, the mobile and seasonal nature of its Arctic presence, and its ability to leverage partners’ resources, the Coast Guard has had sufficient resources to fulfill its Arctic responsibilities. However, Coast Guard officials stated they would reassess their approach as Arctic activity and resulting mission requirements change over time. As we reported in June 2016, if Arctic activity continues to increase, as anticipated, the Coast Guard may have insufficient resources to meet expanded Arctic requirements. In June 2016, we also found that the Coast Guard worked with its Arctic partners—such as other federal agencies—to carry out actions to help mitigate Arctic capability gaps. For example, the Coast Guard took steps to enhance Arctic maritime domain awareness by testing communications equipment belonging to DOD during a 2015 annual operation in the Arctic, extending communications capabilities further north than previously possible. However, we found that the Coast Guard did not systematically assess how its actions helped to mitigate these gaps. Such an assessment—which includes developing measures for gauging its progress, when feasible—is critical to the Coast Guard’s understanding of its progress towards addressing these gaps. By systematically assessing and measuring how its actions have helped to mitigate capability gaps, the Coast Guard will be better positioned to effectively plan its Arctic operations, including its allocation of resources and prioritization of activities to target the gaps. As a result, we recommended in June 2016 that the Coast Guard (1) develop measures for assessing how its actions have helped to mitigate Arctic capability gaps and (2) design and implement a process to systematically assess its progress on this. DHS concurred with our recommendations. As of January 2020, the Coast Guard had not yet taken action to implement these two recommendations, in part because the Coast Guard issued its Arctic strategic outlook in April 2019 and is currently updating its corresponding implementation plan for this strategy. The plan is expected to provide the foundation for systematically assessing efforts to address Arctic capability gaps. Coast Guard officials stated that they are also developing a strategic metrics framework for measuring progress in addressing the capability gaps. Coast Guard officials did not identify when they plan to complete the plan and framework, stating that these are longer-term efforts. The Coast Guard highlighted the Arctic capability gaps in its 2013 Arctic Strategy and again in its 2019 Arctic strategic outlook. The 2019 strategy highlighted the need to elevate the Arctic region’s prominence as a strategically competitive space due to (1) the resurgence of nation-state competition from the United States’ two nearest-peer powers, Russia and China, and (2) reduced ice conditions in the Arctic which have led to increased human and economic activity in the region. In addition, the 2019 Arctic strategy highlighted three overarching goals: enhance capability to operate effectively in a dynamic Arctic domain, strengthen the rules-based order, and innovate and adapt to promote resilience and prosperity. Further, the 2019 Arctic strategy noted that the Coast Guard is the sole provider and operator of the U.S. polar icebreaking fleet—a critical component in achieving the Coast Guard’s overarching goals in the strategy—but currently does not have the capability or capacity to ensure access in the Arctic region. The Coast Guard’s polar icebreaking fleet comprises two operational polar icebreakers—the Polar Star and Healy— of which only the Healy is currently active and operating in the Arctic. The Healy is a medium icebreaker that primarily supports Arctic research, and while it is capable of carrying out a wide range of activities, it cannot ensure timely access to some Arctic areas in the winter given that it does not have the icebreaking capabilities of a heavy polar icebreaker. See figure 1 for photographs of the Coast Guard’s active icebreakers. In November 2018, the Coast Guard Assistant Commandant for Acquisition testified that the Coast Guard’s current polar icebreaking fleet provides minimal capacity to carry out current icebreaking missions and that the nation must take swift action to rebuild and enhance this critical national capability. To this end, DHS approved the Coast Guard’s Polar Security Cutter acquisition program’s cost, schedule, and performance baselines in February 2018. In September 2018, we found that the Coast Guard did not have a sound business case when it established the acquisition baselines for the Polar Security Cutter program in March 2018 due to risks in four key areas: technology, design, cost, and schedule. Our prior work has found that successful acquisition programs start with solid, executable business cases before setting program baselines and committing resources. A sound business case requires balance between the concept selected to satisfy operator requirements and the resources—design knowledge, technologies, funding, and time—needed to transform the concept into a product, which in this case is a ship with polar icebreaking capabilities. Without a sound business case, acquisition programs are at risk of breaching the cost, schedule, and performance baselines set when the program was initiated—in other words, experiencing cost growth, schedule delays, and reduced capabilities. To address the key risks we identified and help establish a sound business case for the Polar Security Cutter program, we made six recommendations to DHS, Coast Guard, and the Navy in our September 2018 report. The agencies concurred with all six recommendations and have taken steps to address some of the risks, as noted below. Technology. The Coast Guard planned to use proven technologies for the program, but did not conduct a technology readiness assessment to determine the maturity of key technologies prior to setting baselines. As a result, the Coast Guard did not have full insight into whether these technologies were mature and was potentially underrepresenting the technical risk of the program. We recommended that the program conduct a technology readiness assessment, which DHS completed in June 2019. DHS determined that two of the three key technologies were mature and the remaining technology was approaching maturity. The Coast Guard now has plans in place to use testing results to increase the maturity and reduce risks for the remaining technology—the hull form. Design. The Coast Guard set program baselines before conducting a preliminary design review. This review is a systems engineering event intended to verify that the contractor’s design meets the requirement of the ship specifications and is producible. By not conducting this review before establishing program baselines, the program is at risk of having an unstable design, thereby increasing the program’s cost and schedule risks. We recommended that the program update its baselines prior to authorizing lead ship construction and after completion of the preliminary design review. DHS and the Coast Guard agreed and plan to take these steps by fiscal year 2022. Cost. The cost estimate that informed the program’s $9.8 billion cost baseline—which includes life cycle costs for the acquisition, operations, and maintenance of three polar icebreakers—substantially met our best practices for being comprehensive, well-documented, and accurate. But the estimate only partially met best practices for being credible. The cost estimate did not quantify the range of possible costs over the entire life of the program, such as the period of operations and support. As a result, the cost estimate was not fully reliable and may underestimate the total funding needed for the program. We recommended that the program update its cost estimate to include risk and uncertainty analysis on all phases of the program life cycle, among other things. Subsequently, in December 2019, we found that while the Coast Guard updated the cost estimate in June 2019 to inform the budget process, the estimate did not reflect cost changes resulting from the contract award two months prior. Coast Guard officials acknowledged these cost risks and plan to address them as part of the next update to the program’s cost estimate. Coast Guard officials told us that they plan to update the cost estimate by the end of February 2020. Schedule. The Coast Guard’s initial planned delivery dates of 2023, 2025, and 2026 for the three ships were not informed by a realistic assessment of shipbuilding activities. Rather, these dates were primarily driven by the potential gap in icebreaking capabilities once the Coast Guard’s only operating heavy polar icebreaker—the Polar Star—reaches the end of its service life. In addition, our analysis of selected lead ships for other Coast Guard and Navy shipbuilding programs found the icebreaker program’s estimated construction time of 3 years to be optimistic. An unrealistic schedule puts the Coast Guard at risk of not delivering the icebreakers when promised. As a result, the potential gap in icebreaking capabilities could widen. We recommended that the program develop a realistic schedule, including delivery dates, and determine schedule risks during the construction phase of the program. In response, the Coast Guard is now tracking additional schedule risks for the program and is in the process of updating its program schedule. Further, in December 2019, we found that the contract delivery date for the lead ship, May 2024, is 2 months after the delivery date in the program’s schedule baseline. Coast Guard officials said they plan to address this risk when they update the program’s schedule by the end of March 2020. In summary, the Arctic region has increased in strategic importance in recent years, and with the increase comes more responsibility for the Coast Guard. The Coast Guard has emphasized that as the Arctic continues to open and strategic competition drives more actors to look to the Arctic for economic and geopolitical advantages, the demand for Coast Guard leadership and presence will continue to grow. As the Coast Guard embarks on the acquisition of its new polar icebreakers, it faces a number of key acquisition risks. The Coast Guard has begun to take steps to address these risks and must remain committed to executing a sound business case for the program to mitigate capability gaps in the Arctic. To this end, we will continue to monitor the Coast Guard’s progress in addressing our recommendations. Chairman Correa, Ranking Member Lesko, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this statement, please contact Marie A. Mak, (202) 512-4841 or makm@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony include Rick Cederholm, Assistant Director; Claire Li, Analyst-in-Charge; Peter Anderson; Jay Berman; Tracey Cross; Laurier Fish; Miranda Riemer, and Roxanna Sun. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Coast Guard—a component of the Department of Homeland Security (DHS)—is a multimission, maritime military service that is responsible for maritime safety and national security, among other missions. Given the Arctic region's expansive maritime domain, the Coast Guard plays a significant role in Arctic policy implementation and enforcement. The Coast Guard is also the sole provider and operator of the U.S. polar icebreaking fleet—a critical component in ensuring year-round access to the Arctic. The Coast Guard is developing the first of three heavy polar icebreakers—the Polar Security Cutter—it has acquired in over 40 years. This statement addresses (1) the Coast Guard's assessment of capability gaps in the region, and (2) key risks facing the Polar Security Cutter acquisition. This statement is primarily based on GAO's June 2016 report examining capability gaps in the Arctic and its September 2018 report examining the Coast Guard's polar icebreaker acquisition. In fiscal year 2012, the Coast Guard—the primary federal maritime agency in the Arctic—assessed its capability to perform its missions in the region and identified a number of capability gaps. These gaps, which still exist today, include communications, infrastructure, maritime domain awareness, and icebreaking. The Coast Guard has worked to mitigate these gaps with its Arctic partners, such as other federal agencies. For example, during a 2015 annual operation in the Arctic, the Coast Guard took steps to enhance maritime domain awareness by testing the Department of Defense's communications equipment, extending communications capabilities further north than previously possible. However, in June 2016, GAO found that the Coast Guard did not systematically assess the extent to which its actions helped to mitigate these gaps. In response to GAO's recommendation, the Coast Guard is currently developing an implementation plan and corresponding metrics for its April 2019 Arctic Strategy. In September 2018, GAO found that the Coast Guard faced four key risks when it established the Polar Security Cutter program in March 2018: technology, design, cost, and schedule. For example, the Coast Guard's initial planned delivery dates of 2023, 2025, and 2026 for the three ships were not informed by a realistic assessment of shipbuilding activities. The schedule was driven, instead, by the potential gap in icebreaking capabilities once the Coast Guard's only operating heavy polar icebreaker—the Polar Star —reaches the end of its service life (see figure). GAO recommended in September 2018 that the program develop a realistic schedule and determine schedule risks for the program. In response, the Coast Guard is now tracking additional schedule risks for the program and is in the process of updating its program schedule. GAO will continue to monitor the Coast Guard's progress in addressing this recommendation and other recommendations GAO made to address key risks, such as design and cost, facing the Polar Security Cutter program. In June 2016, GAO recommended, among other things, that Coast Guard develop measures for assessing how its actions have helped to mitigate Arctic capability gaps. In September 2018, GAO recommended that the Polar Security Cutter program develop a program schedule according to best practices. DHS concurred with all of the recommendations, and the Coast Guard is in the process of addressing them.", "document_type": "gao"}
{"report": "DLA’s primary purpose is to meet the logistics requirements of the armed forces for food, clothing, fuel, spare parts, and other items. DLA’s major responsibilities are to buy and distribute about 5 million distinct consumable, expendable, and reparable items. In order to fulfill the logistics requirement of the armed forces, DLA provides more than $35 billion in goods and services annually. As part of its responsibility to provide spare parts, DLA officials stated that three of DLA’s major subordinate commands conduct reverse engineering—Aviation, Land and Maritime, and Troop Support. These commands are directly responsible for meeting the following military services’ needs. Specifically: Aviation provides aviation weapons systems spare parts, flight safety equipment, maps, environmental products, and industrial plant equipment. Land and Maritime provides for ground-based and maritime weapons systems spare parts, small arms parts, and fluid handling systems. Troop Support handles food, textiles, construction material, industrial hardware, and medical supplies and equipment, including pharmaceuticals. Reverse engineering is the process of replicating a design by physically examining and measuring an existing item to develop the technical data necessary to reproduce the item functionally and dimensionally. In other words, it is the process of extracting information about an item from the item itself. According to DLA’s procedure, the intent of reverse engineering is either to develop an approved technical data package—the details needed to duplicate the item such as drawings or specifications, among other things—or approve a new supplier. The technical data package could be used for future competitive procurements when the item is needed for sustainment purposes. DLA uses reverse engineering for several reasons, such as identifying potential new sources for obsolete parts or those supplied by only one source, increasing competition, and achieving savings. Parts are identified for reverse engineering generally because the government does not have necessary legal rights to the drawings or lacks data needed to facilitate competitive procurements. However, reverse engineering is generally considered the least attractive alternative for replenishing parts because it is expensive and time-consuming. Therefore, according to DLA guidance, before starting reverse engineering DLA personnel should try to buy data from the original equipment manufacturer, previous manufacturing sources, or other data rights holder. DLA personnel also need to consider the costs of acquiring the data rights before initiating reverse engineering. DLA guidance for its reverse engineering processes is the same regardless of the size of the businesses involved. In order to start a reverse engineering project, DLA has established criteria, such as documenting a business case and showing that the part meets certain yearly purchase thresholds. Specifically, according to DLA guidance, procurements of the part over the past 2 years generally should exceed $10,000 in each year. Additionally, the engineering support activity at a military department (Army, Air Force, or Navy) responsible for the part generally approves a project before reverse engineering can begin. Once reverse engineering is completed, the technical data package must be approved by the appropriate engineering support activity. Figure 1 shows the general process from identifying a part as a potential candidate for reverse engineering to approving a technical data package or a new source of supply, and indicates whether DLA or a contractor is responsible at each step. DLA has two reverse engineering programs—the Replenishment Parts Purchase or Borrow program, funded by contractors, and the DLA internally funded efforts. Through the Replenishment Parts Purchase or Borrow program, contractors reverse engineer a part at their own expense. DLA’s goals for this program are to increase competition and achieve savings. After successful reverse engineering and military approval of a technical data package, the contractor becomes a new source of supply for the part. Contractors may identify parts for reverse engineering—mostly small hardware items and electrical components, such as antennas and cables—from a candidate list on a DLA website or through their own research. To conduct reverse engineering, contractors may purchase or borrow parts under agreement with the government subject to certain conditions, such as the part is not classified or considered a critical part— one that is crucial enough that a failure of that part would result in serious injury or impact the success of a mission—among other things. The government incurs minimum cost, if any, in this program. The goal of DLA-funded reverse engineering is to develop a technical data package that will be used in future competitive procurements. Typically, DLA funds efforts for parts that are available from only one source, are obsolete, or have limited data rights. These efforts occur in several ways: DLA engineers conduct the reverse engineering. DLA funds the efforts through partnerships with other DOD entities. DLA awards contracts to companies to create drawings of parts that the government can then use in competitive procurements. The government obtains full use of these drawings. Intellectual property derives from the work of the mind or intellect and is an application, right, or registration relating to property—such as an idea, invention, or process. It includes patents and proprietary information: Patents—grants an inventor the right to exclude others from making, using, or selling an invention in the United States, typically for a period of 20 years. The holder of a valid patent is the only authorized supplier of the patented item unless another supplier has acquired a license to manufacture and sell the item. Proprietary information—includes technical data which represents trade secrets usually developed at private expense, such as design, material composition, or manufacturing processes. The owner of a specific item does not make the information available to others without obligations concerning its confidentiality. This confidentiality of proprietary information does not protect it from discovery by reverse engineering. In order to share technical data, for example, to issue a solicitation for competitive procurement of an item, DLA needs to have sufficient data rights. Data rights are the government’s contractual license rights for technical data—recorded physical and material characteristics, such as item specifications, engineering drawings, or operating and maintenance manuals. If the government is entitled to and acquires unlimited data rights, it is allowed to use, reproduce, or disclose that technical data. When the government acquires limited rights the government may only use the data internally, such as for the operation of equipment, but may not disclose technical data for the purpose of procuring an item from another contractor. DLA procedures indicate the government should consider the cost of acquiring the data rights before initiating reverse engineering. DLA’s Aviation, Land and Maritime, and Troop Support major subordinate commands initiated over 1,600 reverse engineering projects during fiscal years 2015 through 2018, according to DLA data. Table 1 describes the number of projects initiated in each fiscal year by DLA’s Aviation, Land and Maritime, and Troop Support for both the contractor- and DLA-funded efforts. Nearly two-thirds of all reverse engineer projects involved parts in the following five categories. 1. Hardware and abrasives. For example, screws, nuts, washers, and keys. 2. Vehicular equipment components. For example, floor mats, vehicle door hinges, and tailgates. 3. Electrical and electronic equipment components. For example, pressure switches, electrical assemblies, and antennae. 4. Electric wire, and power and distribution equipment. For example, batteries, wiring harnesses, and special purpose cable assemblies. 5. Aerospace craft components and accessories. For example, insulation blankets, filters, and door handles. Figure 2 shows examples of items in these categories. Some of DLA’s projects resulted in lower prices for the reverse engineered parts in subsequent procurements. According to DLA data, the agency saved at least $22 million from reverse engineering projects initiated from fiscal years 2015 through 2018 as a result of lower prices paid. For example, in one project we reviewed, a small business successfully reverse engineered a retaining ring, which assists in securing parts in an aircraft engine, purchased by Troop Support and became a new approved source of supply. A subsequent purchase of this part resulted in a unit price that was almost $70 lower per unit compared to the most recent purchase before reverse engineering. We found that Troop Support saved over $11,000 through this project. We found that 141—or less than 10 percent—of all projects initiated from fiscal years 2015 through 2018 were successfully completed. Table 2 describes the number of projects that were completed, in-process, and canceled as of December 2018, according to DLA. DLA officials told us that less than 10 percent of projects have been completed for several reasons. DLA officials stated that the engineering support activities at the military services sometimes take a long time to respond to requests for approval, which adds time to reverse engineering projects. For contractor-funded projects under the Replenishment Parts Purchase or Borrow program, reasons include the following: DLA officials explained that contractors sometimes decide not to complete reverse engineering because the contractors determine the effort would be more labor intensive than originally anticipated or their priorities shift. DLA officials also stated that DLA does not necessarily hear back from a contractor after it purchases a part to begin the reverse engineering process. Representatives from contractors we spoke with told us that they experience delays in obtaining responses from DLA and military service engineers regarding approvals for their projects. In addition, DLA officials explained that the completion rate for DLA- funded projects is low for the following reasons: More urgent priorities arise after a project begins. Personnel who work on reverse engineering typically have other duties in addition to these efforts and if more urgent priorities emerge after a reverse engineering project has started, the effort may need to be postponed or abandoned to attend to the more pressing priority. The need no longer exists for some parts that were identified as reverse engineering candidates. We found that DLA’s reverse engineering programs created opportunities for contractors—particularly small businesses—to become new suppliers. According to DLA data, 124 contractors participated—or had the opportunity to become new sources of supply for parts—in the contractor- funded reverse engineering program from fiscal years 2015 through 2018. Of these, we determined that 103 were small businesses. In addition, while DLA performed reverse engineering work for most of the DLA- funded projects, DLA awarded contracts to 6 companies to conduct reverse engineering, all of which were small businesses. Roughly one-third of the 124 contractors worked on only one spare part during the time frame we reviewed, while the others initiated reverse engineering for multiple parts. For example, one small business requested to reverse engineer more than 50 parts during fiscal years 2015 through 2018. A representative for this contractor told us they use a business analytics system that queries publicly available information in order to identify opportunities for reverse engineering. While most companies conducting reverse engineering were small businesses, almost half the contractors that supplied parts prior to reverse engineering were not small businesses. Specifically, for fiscal years 2015 through 2018, DLA identified 74 contractors whose parts had been successfully reverse engineered, of which we determined that 34 were not small businesses and 26 were. In general, representatives at the small businesses we spoke with stated that the reverse engineering programs help small businesses. For example, representatives of one contractor that requested to reverse engineer a part told us that DLA’s reverse engineering program as a whole benefits small businesses because most of the parts being reverse engineered are originally from other than small businesses, and the program is a path that allows small businesses to become approved suppliers. In addition, representatives from one contractor that reverse engineered multiple projects stated that working with DLA has allowed their business to establish past performance ratings, which will help in future government procurements. Officials from DLA competition advocate and small business offices stated that reverse engineering is generally beneficial for small businesses. They stated that small businesses have not registered complaints about DLA’s reverse engineering program. Rather, small businesses seek opportunities for additional business with DLA, which reverse engineering can help provide. In addition, industry associations we spoke with stated that reverse engineering is a way to involve small business. They stated that reverse engineering projects provide small businesses opportunities to become qualified suppliers and compete for future DLA contracts. We found that DLA has processes to protect intellectual property, such as patented designs and proprietary information during reverse engineering. Of the 10 small businesses we spoke with that were involved with our 19 selected projects, none of the representatives identified concerns with DLA’s practices for protecting intellectual property. Although DLA’s standard operating procedure applies to both DLA-funded efforts and contractor-funded efforts, the provisions that safeguard against patent infringement are specific to the contractor-funded program. According to these provisions, patented materials should not be approved or shared for reverse engineering. Aviation and Land and Maritime officials stated that they physically review parts for patent marks before reverse engineering can take place for contractor-funded efforts under the Replenishment Parts Purchase or Borrow program. However, Troop Support officials said they do not check for patents under this program because they are supplying parts for legacy systems—systems that are typically 20 years or older—which means any potential patents would have expired. They also stated that they conducted reverse engineering to a limited extent through the Replenishment Parts Purchase or Borrow program. We found Troop Support initiated 30 of the 617 Replenishment Parts Purchase or Borrow efforts from fiscal years 2015 through 2018. For DLA-funded efforts, Aviation and Land and Maritime officials stated that they physically review parts for patents, and the project is stopped if one is found. For example, officials from Land and Maritime canceled a project for an eye guard because officials found drawings marked with a patent number. The officials could not determine if the patent had expired so they canceled the project. Aviation officials also stated that they rarely encounter patent markings; they have seen four or five in the last 2 years. Troop Support officials stated they do not check for patent markings and they rely on the engineering support activities to check for patents. Figure 3 shows an example of a patent marking. DLA’s guidance for reverse engineering also does not allow the release of limited rights data for the contractor-funded projects under the Replenishment Parts Purchase or Borrow program. DLA officials at all three major subordinate commands told us that they do not release drawings that have limited data rights to contractors conducting reverse engineering under this program. DLA guidance does not cover whether data can be used under DLA-funded efforts. Officials at Aviation, Land and Maritime, and Troop Support all stated that proprietary or limited release drawings or technical data related to the part cannot be used by engineers who work on reverse engineering efforts. Aviation officials noted that the tracking system records those who have seen propriety drawings, and this information is used to ensure that these individuals do not work on reverse engineering projects related to those drawings. Land and Maritime officials stated that the tracking system used for reverse engineering projects also identifies drawings marked as proprietary and controls who has access to drawings. In general, the small businesses we met with did not express any concerns about how DLA handles intellectual property. We spoke with four small businesses that supplied parts that had been reverse engineered by other businesses. Representatives of these four small businesses confirmed that they did not hold patents on the parts that were reverse engineered. Further, the small businesses that conducted reverse engineering stated that DLA adequately protected intellectual property. In one case, a representative from a small business that participates in the Replenishment Parts Purchase or Borrow program stated that DLA has never released a part that had controlled data to them and DLA takes protection of proprietary data seriously. Another contractor who performs DLA funded reverse engineering efforts stated drawings are not released and sometimes the function of the part is not even shared with contractors. DLA command officials stated they had not heard of any concerns from small businesses about their intellectual property being used inappropriately. In addition, officials from the DLA small business office stated they had not heard concerns from any small businesses. Further, one official from the small business office noted that the parts DLA purchases are not new innovations and so do not necessarily have protected intellectual property. Competition advocates stated they received no complaints from small businesses. The industry associations we met with asked their small business membership if there were any specific concerns regarding DLA’s protection of intellectual property. Officials from the Aerospace Industries Association, the National Defense Industrial Association, and the National Association of Manufacturers stated there were no complaints from the small businesses represented by their groups about the businesses’ experiences working with DLA. We provided a draft of this report to DOD for review. DOD had no comments. We are sending copies of this report to the Secretary of Defense; the Director, Defense Logistics Agency; appropriate congressional committees; and other interested parties. This report will also be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by e-mail at makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In addition to the contact named above, Penny Berrier, Assistant Director; Brandon Booth, Alexandra Dew Silva, Stephanie Gustafson, Victoria Klepacz, Jean McSween, Ralph Roffo, Roxanna Sun, Anne Louise Taylor, and Alyssa Weir made key contributions to this report.", "summary": "The Department of Defense spends tens of billions of dollars annually to sustain military assets including aircraft, ships, and missiles. In support of this effort, DLA strives to maintain a competitive supplier base through reverse engineering—the process of examining an item, such as a spare part, with the intent of replicating its design. Contractors consider intellectual property, such as their technical data and patented material, essential to their success. DLA also takes steps to safeguard contractors' intellectual property during reverse engineering. The Senate Armed Services Committee report accompanying a bill for the fiscal year 2018 National Defense Authorization Act included a provision for GAO to review DLA's reverse engineering efforts, including the protection of small businesses' intellectual property. This report describes (1) DLA's reverse engineering programs and the extent to which small businesses participated in these programs from fiscal years 2015 through 2018; and (2) how DLA safeguards certain intellectual property within its reverse engineering efforts. GAO analyzed data from three DLA commands—Aviation, Land and Maritime, and Troop Support, those that conduct reverse engineering—from fiscal years 2015 through 2018. GAO reviewed a nongeneralizable sample of 19 reverse engineering projects involving 13 parts, selected to include a variety of characteristics, such as the size of the contractors involved. GAO reviewed DLA's guidance and interviewed DLA officials and representatives from small businesses about safeguarding intellectual property as part of reverse engineering. The Defense Logistics Agency (DLA) is responsible for providing logistics support to the warfighter, including spare parts for military assets. From fiscal years 2015 through 2018, DLA initiated over 1,600 reverse engineering projects for spare parts at three of its commands—Aviation, Land and Maritime, and Troop Support. DLA uses reverse engineering to identify potential new sources for spare parts that are available from only one source and to achieve savings. DLA funded about 1,000 of the reverse engineering projects, while contractors funded the remaining 600 projects. Nearly two-thirds of all reverse engineering projects involved parts in five categories, with examples of the three largest categories illustrated in the figure. GAO found that the majority of contractors conducting reverse engineering for DLA were small businesses. Specifically, DLA identified 124 contractors that conducted reverse engineering projects from fiscal year 2015 through 2018, 103 of which GAO determined were small businesses. According to small business representatives and DLA officials, reverse engineering is beneficial for small businesses and can help provide opportunities for additional business with DLA. GAO found that the three DLA commands had processes to safeguard certain intellectual property in their reverse engineering efforts. Specifically: Officials from all three commands stated they do not release drawings with limited data rights to contractors interested in reverse engineering parts. Aviation and Land and Maritime officials stated that they check for patent markings on parts to ensure patented parts are not reverse engineered. Troop Support officials stated they do not check for patent marks because the parts they supply are often too old to have valid patents. The small businesses GAO met with did not identify concerns with how DLA handles intellectual property. Further, DLA officials stated that they had not received any complaints from small businesses about their intellectual property being used inappropriately.", "document_type": "gao"}
{"report": "In passing the NVRA in 1993, Congress found that unfair registration laws and procedures can have a direct and damaging effect on voter participation in federal elections. The NVRA was intended, in part, to establish procedures to increase the number of eligible citizens who register to vote in federal elections, as well as to protect the integrity of the electoral process and ensure accurate and current voter registration rolls. As such, the NVRA includes provisions focusing on both increasing opportunities for voter registration and improving voter registration list maintenance. Table 1 below includes a summary of these provisions. The Help America Vote Act of 2002 (HAVA), which amended the NVRA, requires states to implement an interactive computerized statewide voter registration list and perform regular list maintenance. HAVA requires states to perform regular list maintenance by comparing their voter registration lists against state records on felons and deaths. HAVA also established the Election Assistance Commission to assist the states regarding HAVA compliance and to serve as a national clearinghouse of election administration information, among other purposes. In the United States, the authority to regulate elections is shared by federal, state, and local officials. DOJ is responsible for (1) civil investigations and enforcement under federal voting rights laws, such as the NVRA, and (2) criminal investigations and prosecutions under federal election crime statutes, such as those prohibiting double voting or voting by noncitizens. With regard to enforcement of NVRA provisions: the Civil Rights Division’s Voting Section (Voting Section), within DOJ, enforces the civil provisions of federal laws that protect the right to vote, including provisions of the NVRA, as well as HAVA, the Voting Rights Act of 1965, and the Uniformed and Overseas Citizens Absentee Voting Act, among others. In addition to DOJ’s role in enforcing the NVRA, the law also allows a private party (a person or organization) who is aggrieved by a violation of the NVRA to bring a civil action against the state or local agency responsible for voter registration. With regard to enforcement of federal election crime statutes: the Criminal Division’s Public Integrity Section supervises DOJ’s nationwide response to election crimes, such as voter fraud and campaign finance offenses, and reviews all major investigations and criminal charges proposed by U.S. Attorneys’ Offices relating to election crime. Public Integrity Section attorneys investigate and prosecute selected cases involving alleged corruption (including election crimes) by federal, state, or local government officials. U.S. Attorneys’ Offices investigate and prosecute a wide range of criminal activities, including federal election fraud, within their respective federal judicial districts. Each U.S. Attorney exercises wide discretion in the use of his or her resources to further the priorities of the local jurisdictions and needs of their communities. DOJ’s civil and criminal enforcement actions are recorded in case management systems which differentiate between matters and cases. A matter is defined as an activity, such as an investigation of an allegation, that has not yet resulted in the filing of a complaint, indictment, or information in court. A matter may eventually become a case, or may be closed without further action. A case is defined as an activity that has resulted in the filing of a complaint, indictment, or information in court. Cases typically start as matters. The process for initiating matters and filing cases varies across the three DOJ components we reviewed. For example, within the Criminal Division, staff are to open a matter when they have worked on an investigation for a minimum of 30 minutes. States are responsible for the administration of state and federal elections, and states regulate various aspects of elections including, for example, registration procedures, absentee and early voting requirements, and Election Day procedures. Within each state, responsibility for managing, planning, and conducting elections is largely a local process, residing with about 10,500 local election jurisdictions nationwide. Under the NVRA and HAVA, states are required to have a voter registration list maintenance program, and state and local election jurisdictions are responsible for ensuring that the registration lists are accurate, and that ineligible voters are lawfully removed. The NVRA specifies certain categories under which jurisdictions may remove registrants from voter registration lists, including: if a registrant has moved outside of a jurisdiction and either (1) confirmed the move in writing or (2) failed to respond to address confirmation mailings and failed to vote in two consecutive federal general elections subsequent to the mailing; death of the registrant; criminal conviction of the registrant, as provided for in state law; and mental incapacity of the registrant, as provided for in state law. State and local election officials can only remove registrants from the voter registration list after meeting certain requirements outlined in the act. Specifically, the NVRA stipulates that list maintenance activities must be uniform, non-discriminatory, and in compliance with the Voting Rights Act; and that programs to systematically remove ineligible voters must not be undertaken within 90 days of a federal election, except under certain circumstances. As noted above, election officials may remove a registrant from the voter registration list for change of residence if the registrant confirms the move in writing, or fails to respond to an address confirmation notice and fails to vote in two subsequent federal general elections following the mailing of the address confirmation notice. While state procedures differ, states generally designate registrants who are sent an address confirmation notice or fail to respond to the address confirmation notice in a timely manner as “inactive.” The “inactive” status generally indicates that the election officials may need to receive information from the registrant or other sources to confirm the registrant’s address. See figure 1 for an illustration of the NVRA confirmation and removal process for registrants who may have moved outside of the jurisdiction. States and local jurisdictions use different data sources and different processes and procedures to obtain information under the NVRA removal categories and to maintain accurate voter registration lists. For example, election offices in some states collaborate with their state’s motor vehicles agencies—such as a Department of Motor Vehicles—to acquire information on changes to registrants’ addresses or other identifying information. Some states also participate in interstate exchanges—such as the Electronic Registration Information Center (ERIC) and Crosscheck—to compare information from their voter registration lists and other state and local sources. States may also use national databases— such as the U.S. Postal Service’s NCOA database or the Social Security Administration’s public DMF—to identify registrants who have moved to another jurisdiction or state, or who have died. Multiple factors such as state laws, costs, the security of voter registration information, and related privacy considerations play a role in election officials’ list maintenance activities and procedures. In some states, the state maintains the responsibility for matching some data sources (such as data on deaths and moves) against the voter registration list and removing certain ineligible voters; whereas in other states, local jurisdictions have a larger role in the list maintenance process. Within DOJ, the Voting Section has the authority to initiate a matter or pursue a case under the NVRA, among the other voting laws for which it is responsible. According to Section officials, the Section identifies potential NVRA violations through several means, including reviewing publically available federal elections and other data, reviewing publically available federal and third party reports, receiving complaints, and conducting compliance investigations that may include visits to state and local offices. Officials stated that after initiating and conducting an investigation (or matter), the Section makes a recommendation to the head of the Civil Rights Division who then decides which action to take, such as pursuing litigation by filing a case against a state or local election jurisdiction. The Voting Section categorizes its NVRA-related matters and cases as related to providing registration opportunities for voters (registration opportunities), or related to the rules regarding maintenance of voter registration lists under specified conditions, which includes both wrongful removals of eligible voters and failure to remove ineligible voters (list maintenance). In addition to enforcing the NVRA through initiating matters and filing cases, the Voting Section participated in NVRA cases as an amicus curiae or “friend of the court,” entered into settlement agreements with states to address issues related to NVRA provisions, and engaged in other efforts to assess compliance with NVRA requirements. According to Civil Rights Division data we analyzed, the Voting Section initiated 1,295 matters from fiscal years 2001 through 2017 to investigate issues related to provisions of statutes such as the NVRA, HAVA, and the Voting Rights Act. Of these 1,295 matters, 99 involved allegations under the NVRA. As shown in figure 2, the Section initiated the largest number of NVRA matters during this period in fiscal years 2008 (15) and 2011 (25). In initiating matters under the NVRA, the Voting Section investigated issues related to state and local jurisdiction efforts to provide registration opportunities for voters and issues related to list maintenance. Specifically, of the 99 NVRA matters the Voting Section initiated, 58 matters involved registration opportunity issues, 17 involved list maintenance issues, and 5 involved both registration opportunity and list maintenance issues. As shown in figure 3, the Section initiated registration opportunity matters in each year except fiscal year 2007. The Section initiated the most registration opportunity matters in fiscal years 2008 (13), 2011 (10), and 2013 (7). The Section did not initiate any list maintenance matters in some years, and initiated between one and four in other years. From fiscal years 2001 through 2017, the Voting Section participated in 234 cases, including those with claims brought under statutes such as the NVRA, HAVA, and the Voting Rights Act. Of the 234 total cases, 23 involved claims brought under the NVRA. Figure 4 shows the total number of cases, and the number of NVRA related cases, in which the Section participated, by fiscal year. In contrast to matters, the Voting Section filed more cases related to list maintenance allegations under the NVRA than cases related to registration opportunities. Of the 23 cases where the Section took action to enforce the NVRA, the Section was the plaintiff or plaintiff intervenor in 14 cases. As shown in figure 5, eight of the 14 NVRA cases the Section filed as the plaintiff or plaintiff intervenor involved allegations under the law’s list maintenance provisions, and two involved allegations under both the list maintenance and registration opportunity provisions. The remaining four cases involved allegations under the law’s registration opportunity provisions. Of the 10 total cases involving list maintenance allegations, eight were filed between fiscal years 2002 and 2007. See appendix II for a summary of each NVRA related case the Section filed from fiscal years 2001 through 2017. With regard to list maintenance cases, as shown in figure 5, the Voting Section filed 10 such cases from fiscal years 2001 through 2017. NVRA list maintenance cases may involve two types of allegations: (1) in conducting a required program to remove ineligible voters from the voter registration list, a state or local jurisdiction did not incorporate certain safeguards, thus unlawfully removing eligible voters; and (2) a state or local jurisdiction did not have an adequate program to remove ineligible voters from the voter registration list. We reviewed the allegations in each of the 10 cases involving NVRA list maintenance claims and found that: Four of the 10 cases (filed in fiscal years 2002, 2007, 2012, and 2017) involved claims that the state or local jurisdiction unlawfully removed voters from registration lists. For example, in one case the Section alleged that the state systematically removed voters from its voter registration rolls within 90 days of a federal election, in violation of the NVRA, among other claims. Four of the 10 cases (filed in fiscal years 2006 and 2007) involved claims that the state or local jurisdiction did not have an adequate program to remove ineligible voters from registration lists. For example, in one case the Section alleged that a state failed to conduct a program that makes a reasonable effort to identify and remove ineligible voters from the state’s registration list, and that, as a result, the state had counties with excessively high registration totals compared to the voting age population. Two of the 10 cases (filed in fiscal years 2004 and 2006) involved both types of claims. For example, in one case the Section alleged that a number of local jurisdictions in one state did not regularly remove persons who died from their voter registration lists, resulting in ineligible voters remaining on the lists. The Section further alleged that local jurisdictions in the state did not always follow NVRA notice and timing requirements with respect to voters who may have moved, resulting in the unlawful removal of voters from voter registration lists. With regard to registration opportunities, the Voting Section filed six cases involving allegations under the NVRA’s registration opportunities provisions from fiscal years 2001 through 2017. We reviewed the allegations in each of these six cases and found that: Three of the six cases involved claims that the state failed to offer voter registration opportunities in public assistance offices and offices that provide state-funded programs primarily serving persons with disabilities. For example, in one case the Section alleged that employees in state offices that provide public assistance, and employees in state-funded programs serving persons with disabilities, failed to distribute voter registration applications. The Section also alleged that such offices failed to train and monitor their employees to ensure that they distribute voter registration applications to clients and transmit completed applications to the state and local election offices. One of the six cases involved claims that the state failed to offer voter registration opportunities in both motor vehicle and public assistance offices. Specifically, the Section alleged that the state did not provide a voter registration form with the state’s driver’s license application form. The Section further alleged that employees in state offices that provide public assistance, and employees in state-funded programs serving persons with disabilities, failed to distribute voter registration applications, among other claims. Two of the six cases involved claims that local election jurisdictions failed to process and register voter registration applicants. For example, in one case the Section alleged that a local election office did not process voter registration applications submitted by applicants at least 30 days before an election in a timely manner, which resulted in eligible applicants not being able to vote in their appropriate precincts in that election. DOJ officials have provided various perspectives on the department’s NVRA enforcement efforts. For example, in October 2009, we reported that the Assistant Attorney General for the Civil Rights Division prioritized NVRA list maintenance cases from fiscal years 2001 through 2007. Specifically, we reported that, according to Voting Section officials, the department focused during this period on both ensuring states had a list maintenance program and ensuring that such programs incorporated required safeguards. In a 2013 report, the DOJ Office of Inspector General reported that Civil Rights Division leadership initiated an effort to enforce the NVRA’s list maintenance provisions in late 2004. The report further noted that Civil Rights Division leadership placed a higher priority on the enforcement of the NVRA’s ballot access, or registration, provisions between 2009 and 2012. Section officials we interviewed for this review did not identify any overall Section-wide priorities between fiscal year 2010 and fiscal year 2017 that focused specifically on either list maintenance or registration. These officials explained that the Section cycles through the various NVRA provisions over time, but provided limited details and did not directly attribute any increase in matters or cases over time to Section initiatives or priorities. Officials further noted that the Section pursued fewer NVRA related cases after 2010 in part due to resource limitations and other priorities within the Section. For example, officials stated that the Section handled a number of Voting Rights Act cases during this time, which required a significant amount of staff time and resources. In addition to initiating matters, and filing NVRA cases as a plaintiff, the Voting Section engaged in efforts to enforce the NVRA’s registration opportunity and list maintenance provisions by participating as an amicus curiae or “friend of the court” in eight NVRA cases from fiscal year 2001 through fiscal year 2017. The Section participated in seven of these eight cases between fiscal years 2012 and 2017. Four of the eight cases involved registration opportunity complaints and four involved list maintenance complaints. According to Voting Section officials, amicus participation increased in these years in part because it was a way for the Section to participate in cases in a manner which did not require a significant amount of resources. Specifically, officials stated that filing an amicus brief takes considerably less time and fewer staff resources than litigating a case. The Voting Section entered into five out-of-court settlement agreements with states (in lieu of filing a case) to address allegations of NVRA non- compliance between fiscal years 2008 and 2017. All five of the agreements were related to the law’s registration opportunity provisions. For example, in one settlement agreement, a state agreed to make modifications to its internet site and the forms, procedures, and electronic system used at its motor vehicle offices in order to meet the requirements of section 5 of the NVRA, which stipulates that states offer voter registration opportunities at state motor vehicle agencies. The state further agreed to produce a compliance plan to meet these goals and to develop and implement a mandatory NVRA training program, among other things. The agreement included monitoring procedures, such as requiring the state to provide DOJ with quarterly reports of the number of in-person driver’s license applications received and completed voter registration forms accepted and transmitted to county boards of elections. According to Voting Section officials, the determination of the appropriate type of enforcement action in a matter, such as a settlement agreement or court order, can depend on a range of factors. For example, officials stated that relevant factors can include the nature, scope, and length of the violation, the level of cooperation by relevant actors regarding remedies, and the authority of relevant officials under state law to take remedial actions. The NVRA settlement agreements we reviewed are all multi-year agreements and Section officials noted that they try to collaborate with the state or jurisdiction regarding the appropriate steps (e.g., generating monthly, quarterly or biannual reports) for measuring and monitoring compliance during the period of the agreement. Section attorneys monitor settlement agreements by reviewing each required report and conferring with managers about progress towards compliance. According to Voting Section officials, the Section engaged in various efforts to assess state and local jurisdiction compliance with NVRA registration opportunity and list maintenance requirements, including conducting reviews of federal election administration and other data, and compliance investigations. Specifically, Section officials said that they conduct periodic reviews of the U S. Election Assistance Commission’s biennial Election Administration and Voting Survey (EAVS) to assess compliance with different NVRA provisions. For example, officials noted they may review EAVS data summarizing states’ motor vehicle agency driver license and voter registration transactions to help determine whether states are following NVRA section 5. In addition to using EAVS data, officials said they review publically available third party reports, which often include state specific registration data and other qualitative information about state processes. Section officials said this information can help them identify states that are potentially not in compliance with the NVRA. Officials also said that Section investigators have conducted observations at motor vehicle agencies and social services agencies as part of their efforts to assess and enforce NVRA compliance. Section officials noted that these efforts are not conducted on a regular schedule; rather, they are conducted periodically, on an intermittent, rolling basis. These officials said such efforts may lead them to request additional information from states, conduct compliance investigations, and initiate enforcement actions if necessary. For example: The DOJ Office of Inspector General reported that, in 2004, the Voting Section reviewed census and voter registration data for all 50 states to determine which states had more people registered to vote than the voting-age population. The Inspector General further reported that, based on the results of the research, the Section sent letters to 12 states requesting information on their efforts to remove ineligible voters from their registration lists, and ultimately filed two cases as a result of this enforcement initiative. In June 2017, the Voting Section sent letters to the 44 states subject to the NVRA requesting information related to states’ compliance with the law’s list maintenance provisions. Section officials stated that, as of March 2019, two actions have resulted from this effort: (1) the Section became a plaintiff-intervenor in a June 2018 case against Kentucky for having an inadequate list maintenance program; and (2) the Section entered into a February 2019 memorandum of understanding with the state of Connecticut regarding its efforts to identify registered voters who have died. Officials noted that the effort begun in 2017 does not have any specific time frames, goals, or objectives but that the Section is reviewing the data states provided and focusing detailed reviews on states whose data suggest possible non-compliance. Section officials said that in general, assessing compliance with NVRA section 8 (list maintenance) is more challenging than for the other sections, such as section 5 (voter registration opportunities at motor vehicles agencies). For registration opportunity provisions, they can send an investigator to the agency to observe whether the agency is offering people the opportunity to register as part of their standard transactions. However, officials noted there is no observation they can conduct to determine if list maintenance is occurring as required. As such, officials stated that DOJ is uniquely dependent on information and data from the states and local jurisdictions to indicate whether list maintenance efforts are taking place and what type. Officials further noted that they may have reduced time to analyze data or otherwise pursue more general enforcement efforts in time periods where the Section is overseeing a high number of defensive cases (ones in which the U.S. government is the defendant). Federal, state, and local authorities share responsibility for addressing allegations of election fraud. Within the federal government, DOJ has jurisdiction over election fraud investigations and prosecutions in elections where a federal candidate is on the ballot. In the absence of a federal candidate on the ballot, DOJ may have jurisdiction where facts exist to support the application of federal criminal laws that potentially apply to both federal and non-federal elections. According to DOJ officials, federal authorities would ordinarily defer to state and local authorities in deciding who would pursue an election fraud investigation or case because of states’ primary authority over the election process. DOJ’s Federal Prosecution of Election Offenses states that election fraud usually involves the corruption of one of three processes: the obtaining and marking of ballots, the counting and certification of election results, or the registration of voters. Within DOJ, the Public Integrity Section and U.S. Attorneys’ Offices maintain certain data on the election fraud matters and cases they initiate and prosecute. Within their respective databases, DOJ attorneys select a program category for each matter and case, which helps define the type of criminal act being investigated or prosecuted, for example, election fraud or health care fraud. U.S. Attorneys’ Offices use the program category “election fraud” for all election related charges; attorneys in the Public Integrity Section use either “election fraud” or “election crime other.” According to DOJ officials, categorization of matters and cases as election fraud (or any other category) is at the discretion of the investigating or prosecuting attorney based upon an examination of the facts. We refer to matters and cases that were either categorized as election fraud or election crime other, or included individual charges we identified as “election fraud related.” Election fraud related matters and cases in the DOJ databases we reviewed included charges brought under a wide variety of statutes, including those related to providing false information in registering or voting and vote buying (52 U.S.C. § 10307(c)) and voting by noncitizens (18 U.S.C. § 611), as well as more general charges such as the general federal conspiracy charge (18 U.S.C. § 371). From fiscal years 2001 through 2017, the Public Integrity Section initiated 1,408 matters, of which 33 were election fraud related, or about two percent of its overall matters. As shown in figure 6, the Section initiated 10 of the 33 election fraud related matters in fiscal year 2011, six in fiscal year 2013, four in fiscal year 2003, and four in fiscal year 2012. From fiscal years 2001 through 2017, the Public Integrity Section filed 695 cases; of which 19 were election fraud related, or about three percent of its overall caseload. As shown in figure 7, the Section filed election fraud related cases in five of those fiscal years, with seven of the 19 cases filed in fiscal year 2003 and five filed in fiscal year 2014. Public Integrity Section officials stated that the Section’s involvement in election fraud related matters and cases may vary over time depending on a variety of factors, including the number of complaints received and staffing levels within the Section. Officials stated that the Section allocates attorneys to work on election related matters and cases as needed, if resources allow. U.S. Attorneys’ Offices are required to consult with the Public Integrity Section with regard to all federal criminal matters that focus on corruption of the election process, in addition to federal patronage and campaign finance-related crimes. The Section reviews this information and consults with U.S. Attorneys’ Offices on their elections related work. U.S. Attorneys’ Offices may also request assistance with a case if they lack sufficient resources to prosecute a complex case, or if the office needs to recuse itself. If the Section does not have sufficient staff available, officials stated that they may not have the ability to offer assistance in investigating matters and prosecuting cases. In these circumstances, officials said that the U.S. Attorney’s Office would likely proceed with the case without the Section’s assistance, except in recusal cases. The Public Integrity Section initiated at least one election fraud related matter in 11 of 12 regional federal circuits as shown in figure 8. The Section initiated the most matters in the Sixth Circuit (10 of 33) and the Fifth Circuit (seven of 33). The Public Integrity Section filed election fraud related cases in four of the 94 federal judicial districts nationwide. These four districts are located in three states: Kentucky, Texas, and Massachusetts. Specifically, the Section filed 11 of its 19 cases in the Eastern District of Kentucky; five cases in the Southern District of Texas; two cases in the Western District of Kentucky; and one case in the District of Massachusetts. The Public Integrity Section prosecuted election fraud related cases with charges under six statutes. As shown in table 2, the Section most frequently brought charges under 52 U.S.C. § 10307(c) which was charged in 17 of the 19 cases the Section filed. This statutory provision prohibits giving false information for purposes of registering or voting, vote buying, and conspiring to vote illegally. Public Integrity Section officials stated the Section did not focus its efforts on particular types of election fraud, but vote buying (generally charged under 52 U.S.C. § 10307(c)) was the most frequent type of election fraud related crime the Section prosecuted during the period of our review. Officials said vote buying is the most common type of election fraud related crime that has come to their attention in recent decades and noted that it tends to occur in communities that are more insular and isolated and have higher levels of poverty. For example, officials observed that in rural communities with high levels of poverty, some residents may be more vulnerable to vote-buying efforts due to their difficult circumstances or the power of local officials who seek to buy votes to provide or cut off needed services. Officials stated that matters and cases tend to be geographically concentrated because, while the Section does not have any formal initiatives in particular circuits or districts, they are in close contact with U.S. Attorney’s Offices nationwide and can offer additional assistance in those areas that may be more vulnerable to recurring or frequent election fraud. Example of Public Integrity Section Election Fraud Prosecutions Seven cases filed in the Eastern District of Kentucky in fiscal year 2003, in which 10 defendants were charged, concerned the 1998 primary election for multiple Knott County government positions and candidates, including county judge executive (the county executive) and county clerk. The 1998 primary election also included a contest for federal office (U.S. Senator). The presence of a candidate for federal office on a ballot is sufficient to establish federal jurisdiction under most election fraud related statutes as the federal candidate’s election could be, or could appear to be, tainted by the fraud. From fiscal years 2001 through 2017, U.S. Attorneys’ Offices initiated more than 2.2 million criminal matters (i.e., investigations), of which 525 were election fraud related, or 0.02 percent of their overall matters. As shown in figure 9, U.S. Attorney’s Offices initiated between 11 and 65 election fraud related matters each year during this time period. U.S. Attorneys’ Offices initiated the most election fraud related matters in fiscal years 2003 (44), 2004 (53), 2005 (65), and 2011 (46). The percentage of election fraud related matters of all matters initiated ranged from 0.01 percent to 0.06 percent. From fiscal years 2001 through 2017, U.S. Attorneys’ Offices filed just over 1 million criminal cases. Of these, 185 cases were election fraud related, or 0.02 percent of their overall caseload. According to officials from EOUSA, which provides guidance, direction, and oversight to the U.S. Attorneys’ Offices, election fraud was one of the least frequent crimes addressed by U.S. Attorneys’ Offices. In fiscal year 2017, the most frequent felony cases filed by U.S. Attorneys’ Offices were for immigration, drugs, and violent crime offenses. Officials further noted that election fraud related cases were taken seriously and thoroughly investigated when facts supporting such charges were uncovered. As shown in figure 10, U.S. Attorneys’ Offices filed the most election fraud related cases in fiscal years 2003 through 2005, and in fiscal years 2007 and 2017, with 15 or more cases filed each fiscal year. U.S. Attorneys’ Offices filed fewer than five election fraud related cases during fiscal years 2001, 2002, and 2015. The percentage of election fraud related cases of all cases filed ranged from less than 0.01 percent to 0.03 percent. From fiscal years 2001 through 2017 U.S. Attorneys’ Offices initiated at least one election fraud related matter in 85 of the 94 federal judicial districts. As shown in figure 11, three districts cumulatively accounted for 145 out of 525 matters, or approximately 28 percent of all election fraud related matters initiated. Of these three, two judicial districts, the Southern District of Florida and the Eastern District of Kentucky accounted for nearly one quarter of all election fraud related matters U.S. Attorneys’ Offices initiated. About half of the 185 election fraud related cases filed by U.S. Attorneys’ Offices occurred in three of the 94 federal judicial districts. As shown in figure 12, the Southern District of Florida filed 42 cases (23 percent), the Eastern District of Kentucky filed 36 cases (19 percent), and the Eastern District of Wisconsin filed 15 cases (eight percent). U.S. Attorneys’ Offices filed the remaining cases (92 cases, or 50 percent) in 42 federal judicial districts; of these, 20 districts had only one election fraud related case during the time period. EOUSA officials said that there could be a number of reasons why cases occurred more frequently in some districts than others. These officials noted that individual U.S. Attorneys utilizing their prosecutorial discretion may have taken an interest in election fraud or encountered evidence of a series of election fraud related crimes that generated a number of matters or cases. For example, according to the respective U.S. Attorneys’ Offices: In the Southern District of Florida, a 2004 case involving allegations of noncitizen voting resulted in the U.S. Citizenship and Immigration Services referring a series of additional similar investigations to the U.S. Attorney’s Office; In the Eastern District of Kentucky, a drug investigation in 2003 revealed evidence of vote buying that led to a series of vote buying cases; and In the Eastern District of Wisconsin, 14 of the 15 cases filed were uncovered in a joint investigation regarding the results of the 2004 presidential election, which showed a discrepancy between the number of ballots counted and individuals voting in one Wisconsin county. That investigation ultimately determined the discrepancy was caused by clerical error, but also uncovered 10 individuals who voted despite being ineligible due to their felon status and four who voted more than once. U.S. Attorneys’ Offices utilized approximately 100 different statutes in bringing charges in election fraud related cases. Table 3 shows the statutes charged in 15 or more election fraud related cases filed by U.S. Attorneys’ Offices. The most frequently charged statute was 52 U.S.C. § 10307 (prohibited voting acts), charged in 52 cases, with subsection (c) (false information in registering or voting and vote buying) charged in 38 of those cases. The next three statutes of 18 U.S.C. § 371 (conspiracy), 18 U.S.C. § 1001 (false statements), and 18 U.S.C. § 611 (voting by noncitizens) were each charged in 38 or more cases. EOUSA officials explained that U.S. Attorneys’ Offices select charges based on the specific facts and circumstances of a case. These officials noted that the offices may use some statutes, such as 18 U.S.C. § 371 and 18 U.S.C. § 1001, more frequently in cases due to their generality, which makes them widely applicable to different types of criminal conduct. Each of the selected data sources we reviewed is one tool election officials may use to maintain their voter registration lists. These selected data sources are used to identify (1) registrants who move—U.S. Postal Service National Change of Address (NCOA), Interstate Voter Registration Crosscheck Program (Crosscheck), and returned mail; (2) deceased registrants—the public version of the Social Security Administration Death Master File (DMF) and state vital records; and (3) registrants with disqualifying felony convictions—U.S. Attorneys’ records on felony convictions. State and local election officials may use a variety of other databases or lists (data sources) to identify ineligible registrants who should be removed from voter registration lists, and state policies and procedures for using various data sources to identify and remove registrants from voter lists vary. Despite variations, election officials with whom we spoke stated that list maintenance—including the use of the selected data sources—provides benefits such as cost savings, smoother Election Day processes, reductions in administrative burden, and fewer opportunities for election fraud. Moreover, election officials told us that each of the selected data sources helps improve voter registration list accuracy, despite some limitations. For example, officials identified benefits from using these data sources, such as helping reduce the number of address errors on voter registration lists and helping identify and remove registrants who have moved outside of the election jurisdiction, are deceased, or have a disqualifying criminal conviction from voter registration lists. Officials also identified limitations with using these selected sources. In particular, three of the six selected data sources consist of administrative records collected for purposes other than voter registration, which can present some challenges when election officials use these sources to maintain their voter registration lists. For example, election officials noted that such data sources may inaccurately indicate that registrants moved unless election officials conduct additional work to verify the information. In addition, these data sources may not include the records for some registrants who are deceased and should be removed from the voter registration lists. Appendix III includes a description of a range of data sources states may use to maintain their voter registration lists. With regard to possible election fraud, state officials from all five selected states we visited noted that list maintenance activities in general help to identify or prevent election fraud because accurate and complete voter registration lists make it more difficult for individuals to commit fraud. Specifically, duplicate registrations—more than one registration for the same person across election jurisdictions—and ineligible registrations, such as those for deceased individuals, if present in voter registration lists, may provide opportunities for a person to vote more than once or vote using someone else’s identity. Thus, registration lists that contain one registration for each eligible registrant with accurate and current identifying information help to prevent election fraud from occurring. The majority of election officials we interviewed did not specify any one data source used to identify election fraud; however, state officials from Michigan and Oregon noted that the limited instances of election fraud in their states, in their view, is in part the result of their strong voter registration list maintenance efforts which have helped to reduce opportunities for fraud. In using data sources as a tool for maintaining voter registration lists, state and local election offices utilize data-matching procedures by which attributes of one registration record are compared to attributes of another record from another database or list to identify registrants who should be removed from voter registration lists under the NVRA’s removal categories. States are required to have computerized statewide voter registration lists, which allow election officials to conduct electronic data matching of their voter registration list to other databases or lists. These other databases or lists may include federal or state administrative records, interstate databases, and local lists or other information. Information on Data Matching Procedures Procedures for determining that a voter registration record is a “match” to another record may vary across states, local election offices, and interstate data matching programs. In general, a “match” should accurately identify the same individual across the two data sources being matched. However, data matching may result in improper indications of a match when a non-match should be indicated (false positives). False positive matches pose risks that election officials may improperly remove registrants from voter registration lists. Data matching can also result in improper indications of a non-match when a match should be indicated (false negatives), posing risks that election officials may fail to remove ineligible registrants from voter registration lists. According to a National Academy of Sciences report, the quality of the underlying data (from either the voter registration list or other data sources used for matching) may contribute to false positive or false negative matches. National Academy of Sciences, Improving State Voter Registration Databases, The National Academies Press, 2010. Further, matching procedures may differ with regards to how data in specific data fields are compared across databases to determine a match. For example, some procedures may require that the name from the voter registration list exactly match the name from the other data source (e.g. each letter, hyphen, space, or apostrophe must match). An exact match requirement would not accept as a match the name entries “Mary Jones-Smith” and “Mary Jones Smith”, even if all other data fields match across data sources and the entries represent the same individual, thus resulting in a false negative match. Below we discuss in detail the selected data sources and their benefits and challenges, as identified by literature we reviewed and election officials with whom we spoke. According to reports we reviewed, registrants who move from one election jurisdiction to another jurisdiction within the state or to another state account for the majority of ineligible registrants and duplicate registrations on voter registration lists. When individuals register to vote, their voter registrations are linked to their residential address. This connection between a voter’s registration and residence is intended to ensure reliable and accurate voter registration lists, and to ensure that voters only vote for races and ballot questions that affect the communities in which they live. According to the 2016 Election Administration and Voting Survey (EAVS), the most common reason for a registrant’s removal from the rolls was cross-jurisdiction change of address (31.1 percent of removals), followed by registrants failing to respond to a confirmation notice sent as part of the NVRA process and subsequently not voting in the following two federal elections (26.1 percent of removals). As previously discussed, under the NVRA, data that indicate a registrant’s change of address and a potential move can be used to start the address confirmation notice process, but cannot, on their own, result in the automatic removal of registrants from voter registration lists. The NCOA database comprises change-of-address records with the names and addresses of individuals, families, and businesses who filed a change of address with the U.S. Postal Service. Election officials can access the NCOA data by obtaining a license to directly receive the data from the U.S. Postal Service or having their voter registration list processed by a licensed third-party service provider. Election officials in the five states we visited compare selected records or the entire voter registration list against the NCOA database at the state or local level and at varying frequency to identify registrants who have potentially moved and to start the address confirmation and registrant removal process. For example Nebraska, Oregon, and Virginia state election officials said that they compare their statewide voter registration lists to NCOA on a bi-annual, monthly, and annual basis, respectively, to identify registrants who have potentially moved. In contrast, Florida and Michigan officials said they do not use NCOA data at the state level, though state laws provide local election officials the option of comparing their local jurisdiction’s voter registration list to NCOA when they conduct list maintenance activities related to changes in address. Although initial data comparisons of NCOA with the voter registration lists can be conducted at either the state or local level, in all of the states we visited when the results of the NCOA data-matching indicated a potential move, local election officials managed the results of the confirmation notices that were sent to registrants to confirm their address. Local election officials subsequently updated addresses on the voter registration lists with responses they received from the confirmation notices, or flagged registrants for potential removal if the registrants did not respond to the confirmation notice or the notice was returned undeliverable. State election officials from Nebraska, Oregon, and Virginia, and local officials from five of the jurisdictions we visited, reported that the primary benefit to using NCOA data is that it helps them to maintain accurate voter registration lists by (1) providing current and accurate addresses for their registrants, and (2) identifying registrants who have potentially moved and no longer reside in the voting jurisdiction. For example, local officials in one jurisdiction reported that they mailed approximately 60 percent fewer confirmation notices in 2017 compared to 2010 due to improvements in the accuracy of address information in their voter registration lists after using NCOA data during this period. Local officials in another jurisdiction reported they used the NCOA data as part of a one- time list maintenance effort, which generated over 100,000 confirmation mailings and resulted in the removal of a number of ineligible voters who no longer resided in the jurisdiction. Election officials also noted that using NCOA data to update voter registration lists may result in administrative efficiencies such as a more efficient election administration process and cost savings. For example, state officials from Oregon, a vote-by-mail state, said that NCOA data help them to maintain clean voter registration lists by providing current and accurate addresses for their registrants, which reduces mailing costs incurred from sending ballots to individuals who have moved out of the state. Further, local officials from one jurisdiction said that using NCOA data helped to reduce the number of address errors in the poll books and, as a result, decrease the number of registrants voting by provisional ballots on Election Day. A report we reviewed and election officials we interviewed cited a number of limitations to using NCOA data for voter registration list maintenance purposes. Specifically, in 2015 the U.S. Postal Service Office of the Inspector General reported that the NCOA data do not capture all change of address information because people do not always notify the U.S. Postal Service when they move. As a result, election officials may not be able to identify registrants who do not report changes of address to the U.S. Postal Service. Another limitation election officials cited is that an indication of a change in address in NCOA data does not necessarily reflect a change in residence, which is what determines the eligibility of a registrant to vote in a given election jurisdiction. According to U.S. Postal Service officials, the main purpose of the NCOA database is to maintain current and updated addresses for mail delivery and a change of address form may reflect a change in mailing address rather than a permanent change in residence. Nebraska, Oregon, and Virginia state officials and officials from three local jurisdictions reported that they have difficulty determining whether a registrant’s change in address as indicated in the NCOA data is a permanent change in residence or a change in mailing address due to a temporary move or other mailing needs. For example, military personnel may prefer to maintain their voter registration at their home of record. Upon assignment to another duty location they may file a change of address with postal authorities for mailing purposes, even if it is not a change of residence for voting purposes. Officials from two local jurisdictions reported similar issues for individuals who retain residency in the jurisdiction while attending college outside the jurisdiction. Further, registrants who had vacation homes outside the jurisdiction in the summer or winter months could be identified as registrants who potentially changed residences on a permanent basis using the NCOA data, according to Nebraska election officials. As a result of the potential difference between mailing and residential addresses, Virginia state election officials and election officials from two local jurisdictions reported that registrants may be inaccurately flagged for confirmation mailings. They told us that registrants would not be automatically removed after being flagged for confirmation mailings; however, they would be required to respond to the mailing or vote in one of the next two federal elections, as prescribed by the NVRA, to stay on the voter registration list. Officials also told us that they may have to take additional steps to use NCOA data to identify registrants who potentially moved and to update voter registration lists. For example, officials from one local jurisdiction that matches its county voter registration list to NCOA data noted that it can take a significant amount of time and resources to standardize their voter registration data to the NCOA format and to calibrate their data matching procedures to avoid false positive matches. Such false positive matches would inaccurately indicate an address change. These local officials said that they take steps to ensure that they do not get an indication of a change in address based on the standardization of an address (e.g. a “Street” to “ST” difference in address between the two data sources). Oregon state election officials and officials from one local jurisdiction further noted that they may have to do additional work to determine the appropriate election jurisdiction to which the address in the NCOA data should be assigned. Officials explained that some street addresses or buildings, like apartment complexes, cross election jurisdiction boundaries, which makes it difficult to determine within which election jurisdiction an address or a specific unit of an apartment complex falls. Oregon state officials said that local tax assessor data may help election officials reconcile these jurisdictional boundary issues. Crosscheck is an interstate data sharing program that compares participating states’ voter registration lists against one another to identify registrants who are registered in more than one state, which may indicate a move, and to identify individuals who may have voted in more than one state. The Crosscheck program began in 2005 with four participating states—Kansas, Iowa, Missouri, and Nebraska—and had grown to include 31 participating states by 2016. To participate in the Crosscheck program, each state signs a memorandum of understanding upon joining the program. Then, in January of each year, member states provide information such as full name, date of birth, and address for registered voters, as well as turnout data for the previous calendar year to Crosscheck program administrators—the Kansas Secretary of State’s office—in a prescribed format. Using the information provided by member states, Crosscheck program administrators return to each participating state a list of registrations in that state that share the same first name, last name, and date of birth, with a registration in another participating state. Crosscheck results also include other identifying information that varies depending on whether the member states provided the data. There are no membership or annual fees associated with joining or participating in Crosscheck. Of the states we visited, Michigan, Nebraska, and Virginia participated in the Crosscheck program for multiple years, while Oregon and Florida each participated once in 2012 and 2013, respectively. Oregon and Florida state officials explained that they did not use the Crosscheck data they received to conduct any voter registration list maintenance activities. Michigan, Nebraska, and Virginia state officials said that they received and processed Crosscheck data at the state level before sending a subset of results to the local jurisdictions to conduct additional verification and list maintenance activities. According to some state and local election officials we interviewed, Crosscheck data can be beneficial as one of the data sources used to identify registrants who may have moved out of state or whose moves are not captured by other data sources. Specifically, officials from four local jurisdictions told us that using Crosscheck data in conjunction with other data sources, such as the NCOA, helps keep voter registration lists accurate. Further, state election officials from Virginia and election officials from one jurisdiction reported that the fact that neighboring states participate in the Crosscheck program is particularly beneficial to them because their residents are more likely to move to neighboring states and the Crosscheck data may capture the change in residence if these residents also registered to vote in the neighboring states. Nebraska state officials also noted that Crosscheck data complement the NCOA change of address data. In particular, Crosscheck data can provide information on registrants who did not record change of address information under NCOA, who had not responded to a notice sent as a result of NCOA data and had moved a second time, or whose moves were not recent and may not be captured in the most recent change of address information provided by NCOA. Nebraska state officials noted that the Crosscheck data were particularly helpful in this manner the first year that Nebraska participated in Crosscheck and whenever a new state joined the program. In addition, election officials from Nebraska and state officials from Michigan identified Crosscheck data on possible instances of double voting as a source which could potentially help determine whether an individual might have voted in two or more states. For example, officials from two local jurisdictions said that they identified a few potential instances of double voting using Crosscheck data. They referred these instances of potential double voting to their Secretary of State. According to reports we reviewed and state officials we interviewed in all five states we visited, Crosscheck data contain numerous matches when a non-match should be indicated (false-positive matches) because the program uses matching criteria that rely on data elements, such as names and birth dates, that may be shared by more than one person. Specifically, the Crosscheck program matches participating states’ voter registration information by comparing registrants’ first name, last name, and date of birth. However, according to reports we reviewed, the odds are sufficiently high that two registrants could have the same name and birth date in groups as large as statewide (or multistate) voter registration lists. Nebraska state officials noted that when there were four participating Crosscheck states in 2005, a match indicating a duplicate registration was more likely to be a valid match (rather than a false positive); however as the number of participating states increased, the quality of the matched results has dropped substantially. Oregon state officials told us that they submitted data to the Crosscheck program in 2012 and that many of the resulting 20,000 potential duplicate registration matches were false-positive matches. Florida state officials also expressed concern about the reliability and quality of the matching criteria, in addition to the number of false positive matches in the data they received. In addition, a study on double voting found that Crosscheck data may not provide enough information for election officials to determine whether a match indicating potential duplicate registrations or double voting is valid. As previously discussed, Crosscheck results for potential duplicate registrations are based on a match of the first name, last name, and date of birth. Crosscheck results provided to participating states may also include additional information—such as registrants’ middle name, suffixes, registration address, and the last four digits of a registrant’s Social Security number, if available—which election officials can use to help determine whether a match is a valid indication of a duplicate registration. In particular, the last four digits of the Social Security number can help distinguish between two distinct individuals who happen to share the same first name, last name, and date of birth. Using Crosscheck data returned to Iowa in 2012 and 2014, the study found that two-thirds of potential duplicate registrations identified by Crosscheck data did not include the last four digits of the Social Security number associated with at least one of the registration records in the match. Thus, the study concluded that more often than not, an election administrator would not have enough information to distinguish which matches are valid indications of duplicate registrations. Further, Nebraska state officials noted that the reliability of the data provided by participating states can affect the reliability of Crosscheck information on double voting. For example, Nebraska state officials reported that one state incorrectly sent Crosscheck its 2014 voting history data the year participating states were to provide their 2016 data to the Crosscheck program. These officials noted that the incorrect voter history data made it appear as though many people had double voted. Nebraska officials said that once they identified this issue, they omitted any matched results involving the state that had provided the 2014 data from their review of registrants who potentially double voted. According to the Crosscheck 2014 Participation Guide, processing the duplicate registrations and researching possible double votes require a commitment of time from state and local officials. State election officials from Michigan, Nebraska, Oregon, and Virginia and officials from two local jurisdictions told us that they have spent a significant amount of time and staff resources to review the Crosscheck data and determine which matched records represent valid matches. State officials from the three states that participated in Crosscheck for multiple years (Michigan, Nebraska, and Virginia) said they implemented additional criteria to refine the Crosscheck data they received in order to identify valid matches of potentially duplicate registrations and send confirmation notices, according to the NVRA requirements. For example, Michigan state officials said that they further filter the Crosscheck results they receive to determine valid potential matches of duplicate registrations. Specifically, they filter Crosscheck results to include duplicate registrations where the registrants’ first names, middle initials, last names, dates of birth, and last four digits of Social Security numbers are an exact match. In addition, state election officials review the registration dates provided in the Crosscheck results to confirm that the registrant’s most recent voter registration activity occurred outside of Michigan before providing a refined list of valid potential matches to responsible local officials who conduct the address confirmation process. In its June 2017 Annual List Maintenance Report, Virginia state officials reported that they also review whether the last four digits of the Social Security number on Crosscheck results they receive match, to determine valid potential matches of duplicate registrations. While election officials from two jurisdictions we visited identified Crosscheck as a source which helped them identify potential instances of election fraud, such as instances of double voting, Nebraska state officials also noted the data were not generally reliable for these purposes without additional investigation. According to one study we reviewed, Crosscheck data on both double voting and duplicate registrations yield a high number of false-positive matches. Additionally, in another report, the New Hampshire Department of State found that of approximately 90,000 match records of duplicate registrations New Hampshire received from Crosscheck in 2017, only a small portion of the records were considered potential instances of double voting. Election officials can use the returned mail from targeted list maintenance mailing efforts and returned “undeliverable” mail from other mailings to registrants to send address confirmation notices to registrants who have potentially moved outside the election jurisdiction. These confirmation notices are subsequently used to update addresses on the voter registration lists with results of the confirmation mailing or flag registrants for potential removal. Specifically, targeted list maintenance mailing efforts may include sending a notice to all or a group of registrants in order to determine whether the registrant may have moved from the address on record. For example, Florida law states that local election officials can send notices to registrants who have not voted in the last 2 years and who have not made a written request that their registration be updated during the two year period. Targeted list maintenance mailing efforts may result in either a response from the registrants or returned undeliverable mail. Returned undeliverable mail occurs when the U.S. Postal Service cannot deliver mail to the address specified on the label, indicating a potential change in the registrant’s address and therefore residence. In addition to targeted list maintenance mailings, election offices may send other notices—such as sample ballots, or information about changes in polling locations—which may also generate returned undeliverable mail. See figure 13 for an example of other voter registration notices (not part of a targeted list maintenance effort) that may be returned to election officials as undeliverable and therefore indicate a potential move. Election officials from all five states we visited use returned mail from targeted list maintenance mailing efforts, or from other mailings to voters, to update registrants’ addresses or to send a notice to the registrants to confirm their address. According to Nebraska state election officials, returned undeliverable mail is a valuable tool for identifying registrants who may have moved. Local election officials we spoke with also said that returned undeliverable mail can provide them with a timely indication that a registrant has potentially moved. Furthermore, election officials told us that because mailings can be conducted on a periodic basis, processing returned mail at the time of receipt can help election officials distribute the list maintenance workload throughout the year. Specifically, election officials from four local jurisdictions said that returned undeliverable mail from voter notices sent to registrants periodically throughout the year is usually a more recent indicator of registrants’ changes in address compared to largescale list maintenance activities such as an annual mailing based on NCOA data. Further, officials from one local jurisdiction also noted that staying on top of returned undeliverable mail throughout the year helps reduce the workload during the state’s annual NCOA confirmation mailing, which would otherwise be too big to manage if the jurisdiction only processed address changes once a year. According to reports we reviewed as well as officials we interviewed, returned undeliverable mail may not be a reliable indicator that a person has moved, which can result in an inflation of the number of registrants who are flagged as inactive. For example, in 2015, the U.S. Postal Service Office of the Inspector General reported that approximately 60 percent of returned undeliverable mail is a result of the mail not getting delivered by postal service employees or insufficient address information on the mail, as opposed to the registrant having moved without notifying the U.S. Postal Service. Further, according to one report we reviewed, a registrant may not have received the mailing, or the mailing may be returned undeliverable for a number of reasons, including that the registrant may be temporarily away from his/her permanent residence; may not be listed on the mailbox of the residential address such as when the registrant shares an address with roommates or family members; or may live in a non-traditional residence such as homeless shelter or government building that will not accept mail for residents. In addition, Virginia state officials noted that using returned undeliverable mail can inflate the number of registrants who are flagged as inactive and can also result in additional costs. Specifically, these state election officials told us that they usually have a low response rate from registrants for mailings, including targeted mailings for list maintenance purposes or confirmation mailings. Registrants who are sent a confirmation notice or do not respond to confirmation mailings are then generally flagged as inactive. Nebraska state officials said that having inactive registrants on the registration lists has resulted in costs to local jurisdictions in the past because local officials were formerly required to mail a ballot to all registered voters, including those that were on the inactive list, when a special election was conducted by mail. Further, local election officials in one state said that inflated numbers of inactive registrants on voter registrations lists may result in fewer than needed voting precincts, to the extent that election officials determine the number of precincts based only on the number of active registrants on the lists. The NVRA provides for states to remove deceased registrants from registration lists by reason of death. This may be carried out by the state’s department of elections, local election jurisdictions, or a combination of the two, as provided by state law. According to the 2016 EAVS, states removed over 4 million registrants due to death from November 2014 through November 2016, which accounted for 24.6 percent of the total number or registrants removed from voter registration lists. According to a National Association of Secretaries of State 2017 report, in most states, information on deceased registrants is provided by a state office of vital statistics, the state department of health, or a similar state-level entity. Additionally, the report notes that a number of states permit election officials to remove a deceased registrant using information from sources such as obituary notices, copies of death certificates, and notification from close relatives. The public version of the DMF contains nearly 101 million records of deaths reported to the Social Security Administration from 1936 through March 1, 2019. It is a subset of the Social Security Administration’s full death file; it does not include state-reported death data, but includes other death data reported by family members, funeral directors, post offices, financial institutions, and other federal agencies such as the Department of Veterans Affairs and Centers for Medicare & Medicaid Services. The public DMF accounts for about 19 percent fewer death records than the full death file. The Social Security Act limits the sharing of the full death file to federal benefit-paying agencies, and other specifically enumerated purposes. Generally, DMF records include the Social Security number, full name, date of birth, and date of death of deceased individuals. Agencies or other entities, including election administrators, having a legitimate business purpose for the information can purchase the DMF from the National Technical Information Service of the U.S. Department of Commerce, which is authorized to distribute the DMF. Subscribers to the DMF are required to purchase monthly or weekly updates to the DMF to ensure that the records are up-to-date. Of the five states we visited, Florida, Michigan, Oregon, and Virginia compare their statewide voter registration list against DMF data on a regular basis, and Nebraska used the data once in 2014, to identify and remove registrants who had died. Specifically, Florida and Michigan directly receive the DMF data and conduct data-matching with their state’s voter registration list to identify deceased registrants on a weekly basis. Oregon and Virginia use DMF data through their participation in the Electronic Registration Information Center (ERIC) program. On a monthly basis, ERIC provides Oregon and Virginia state election officials a report on their deceased registrants based on matches of DMF data with these states’ voter registration lists. States’ procedures for removing deceased registrants from the voter registration list vary, depending on requirements outlined in state law. For example, Virginia state law provides that local election officials have the authority to determine the qualification of an applicant for registration. Further, the Virginia law requires election officials to send a cancellation notice once a voter registration record is cancelled due to death. As a result, Virginia state officials forward all valid matches of potentially deceased registrants to the responsible local official who reviews the match, marks the registrant as deceased in the voter registration database, cancels the registration, and sends a cancellation notice. In contrast, Michigan law allows either state or local officials to cancel a voter registration upon receipt of reliable information that the registrant is deceased. In addition, according to Michigan state election officials we met with, there is no legal requirement for officials to send notices of cancellation due to death. Michigan state election officials told us that they cancel voter registrations based on data-matching with DMF data at the state level. State election officials from all five selected states and officials from one local jurisdiction reported that they have found DMF data to be useful for identifying registrants who have died. Further, state election officials from four selected states stated that the DMF data are accurate and reliable. For example, officials said that they have experienced very few instances where they have had to reverse cancelled registrations because a registrant was incorrectly identified as deceased based on DMF data. Nebraska and Oregon state officials also noted that DMF data are particularly useful for identifying registrants who died out of state. Officials said that out-of-state death information would not be captured by other data sources they use, such as state vital records data. In addition, Michigan state officials noted that historically they would receive notification of a person’s death closer to the date of death when using DMF data than when using death data from the state vital records office. We previously reported that state-reported deaths, which the DMF does not include, are expected to account for a larger proportion of all Social Security Administration death records over time. As a result, we reported that agencies that purchase the DMF, including election offices, will likely continue to access fewer records over time as compared with those government agencies that obtain the Social Security Administration’s full death file. We also reported that because the deaths reported by states are generally more accurate than other death information reported to the Social Security Administration by post offices, financial institutions, and other government agencies, it is likely that agencies using the DMF could encounter more errors than agencies using the Social Security Administration’s full death file. According to Social Security Administration officials, Social Security death data are accurate when used to administer the Social Security Administration benefit programs, which includes removing deceased individuals from the beneficiary rolls and informing surviving spouses and children of their eligibility for benefits. Virginia state officials further noted that DMF death information can be less timely in identifying an individual as deceased when compared to state death records because state records are collected during the death certification process while the Social Security Administration relies on the transmission of information after the death certification from other entities, such as other government agencies, to identify an individual as deceased. Election officials can also use state vital records to identify and remove registrants who are deceased from their voter registration lists. Due to the federal requirement for state election officials to coordinate with the designated state agency responsible for compiling records of deaths, most states receive state level information on deceased registrants from their state office of vital statistics. State death records are collected electronically by most states, and maintained in each state’s Electronic Death Registration System. As of December 2018, 46 states, the District of Columbia, and Puerto Rico used an Electronic Death Registration System to collect and maintain death data within their jurisdiction. All five states we visited receive data on deceased individuals at varying intervals from their state vital records office and match these records to the statewide voter registration list to identify and remove deceased registrants. For example, on a daily basis, Florida state election officials receive state death data electronically from the Florida Bureau of Vital Statistics. They use the information to identify potentially deceased registrants and provide a list of these individuals to local election officials. Nebraska state election officials receive state death data from their state department of health on a weekly basis, Oregon and Virginia receive death information from their respective state departments of health on a monthly basis, and Michigan officials said they receive the information periodically, on either a weekly or bi-weekly basis. According to state election officials from Florida, Nebraska, Oregon, and Virginia and local election officials from four of the jurisdictions we visited, state vital records on deceased individuals are generally accurate and reliable, in part because state vital records data are reviewed and validated. Specifically, state vital records data on deceased individuals are linked to information on the death certificate which is validated by authorized persons, such as physicians and funeral directors, during the death certification process. Virginia state officials said that in comparison, other sources such as the Social Security DMF data may include reported deaths that are not directly linked to the death certification, from entities such as post offices and financial institutions. Additionally, officials from one jurisdiction told us that state death records are helpful in identifying people who died in another jurisdiction in the state. Further, officials from this jurisdiction noted that in the past they reviewed obituaries to identify deceased registrants, but that they have seen a decline in the use of obituaries to announce deaths and state death records help fill the information gap previously provided by obituaries. Nebraska state officials also noted that state death records can help prevent fraudulent registrations because state officials are able to check new registrations against death records received from the state health department. Nebraska state officials and officials from two local jurisdictions said that one limitation of state death records is that they generally only include information on deaths that have occurred in the state, and as a result election officials lack death records for residents who died out of state. From our interviews with the state vital records officials in the states we visited and information we reviewed on national death sources, we learned that, in some states, state death records may include information on deaths that occurred out of state, through the state’s participation in interstate data exchanges. Additionally, while some state officials found state death records timely for updating voter registration lists, Michigan state officials said their state death records were not as timely as DMF data. Specifically, Michigan state election officials said they used to receive notification approximately six months after a person’s death when using state death records, compared to within two weeks of death using DMF data. Officials explained that the lag in the death notification when using the state death records was due to low participation rates in the state’s Electronic Death Registration System when the system was first implemented. Michigan state election officials noted that state death records have improved and are timelier as the participation rate in the state Electronic Death Registration System has increased in recent years. Oregon state officials also noted that state death records may be less timely than the data counties receive from their local health departments, and thus local election officials may have received notice of an individual’s death from the county health department prior to receiving the state vital records data. State laws regarding the voting eligibility of individuals with a felony conviction vary. In some states, individuals who were previously convicted of a felony are not permitted to vote unless they are pardoned, or their voting rights are specifically restored by the government; in other states, the right to vote is reinstated automatically at the end of the individual’s sentence or after a designated period of time following the end of the sentence. Additionally, in some states, individuals with felony convictions may vote if they are on probation or have been granted parole; and, in two states, felons are allowed to vote even while incarcerated. Election officials are generally required to remove registrants with a felony conviction from voter registration lists, in accordance with state law. U.S. Attorneys are required by law to notify the states’ chief election officials of felony convictions in federal court. The notices must contain a person’s name, age, residence address, date of entry of the judgment, a description of the offenses of which the individual was convicted, and the sentence imposed by the court. Election officials from all five states we visited said that they receive records from U.S. Attorneys on residents who are convicted of a federal felony. Florida, Nebraska, and Virginia use this information to remove registrants from their voter registration lists given the nature of their state laws, which restrict voting eligibility after a felony conviction until rights are restored or for a period after completion of the sentence. Michigan and Oregon prohibit individuals from voting while serving their sentences after conviction, but voting rights are automatically reinstated once a person is released from prison. As such, state officials from Michigan told us that they do not use U.S. Attorneys’ records to remove voters from their voter registration lists. Oregon officials noted they use U.S. Attorneys’ records on federal felony convictions to change a registrant’s status to “inactive.” Election officials from three states in our review that use U.S. Attorneys’ felony conviction records to remove registrants from voter registration lists said that this information was valuable, as they would not be able to acquire information about federal convictions from state sources. While federal conviction information can be helpful to election officials, an official from one local jurisdiction said that it can be difficult to determine whether the individual identified by a U.S. Attorney’s Office as having a federal conviction is the same person as the registrant. This is because criminals may have used aliases or provided incorrect Social Security numbers when registering to vote, which results in a less confident match. In addition, the information state and local officials receive on federal convictions is not required to include an individual’s projected date of release or date of sentence completion, which state and local officials from Florida and Nebraska said could help them determine whether the registrant is ineligible to vote and thus should be removed from voter registration lists. This makes it difficult for election officials to determine if the registrant’s sentence was already completed by the time they receive the information. In Nebraska, where voting rights are reinstated two years after a sentence is completed, election officials said it is initially difficult to know whether the individual’s voter registration is valid without the date of release or sentence completion. To mitigate limitations related to the lack of a projected release date or sentence completion date, Florida election officials said that they review case judgments which provide the details of the case, including date of sentence completion, to determine if the registrant’s sentence was completed and then check if the registrant’s rights were restored. Nebraska state election officials said they review court records and also noted that they would contact the local U.S. Attorney’s Office to obtain the federal release date for a particular registrant. We provided a draft of this report to DOJ, the U.S. Postal Service, the Social Security Administration, the Election Assistance Commission, the Crosscheck program, and election offices in the five states and ten local jurisdictions we visited. DOJ, the U.S. Postal Service, the Election Assistance Commission, and the Crosscheck program did not provide written comments. The Social Security Administration submitted a letter noting that it did not have any substantive comments, which is reproduced in appendix IV. We incorporated technical comments from DOJ, the U.S. Postal Service, the Social Security Administration, Crosscheck, and state and local officials as appropriate. We are sending copies of this report to the Attorney General, the Postmaster General, the Social Security Administration, the Election Assistance Commission, election offices in the five selected states and ten local jurisdictions that participated in our research, appropriate congressional committees and members, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix V. In addition to the Department of Justice’s (DOJ) role in enforcing the National Voter Registration Act of 1993 (NVRA), the law allows a private party (a person or organization) who is aggrieved by a violation of NVRA provisions to bring a civil action against a state or local agency responsible for voter registration. In some cases, DOJ may participate in these private party cases by intervening on behalf of the plaintiff (as a plaintiff intervenor) or defendant, or by filing an amicus brief. The NVRA includes provisions that focus on both increasing opportunities for voter registration and improving voter registration list maintenance. Table 4 includes a summary of these provisions. To identify cases filed by private parties that included a claim under the NVRA, we searched an online legal database (Lexis Advance) for U.S. Circuit Courts of Appeals decisions from fiscal years 2008 through 2018 that contained the term “National Voter Registration Act.” We reviewed the decisions and also obtained and reviewed related case documents, including district court decisions, dockets, and complaints, to determine whether a claim had been filed under the NVRA and the nature of the claim, among other case information. We focused on cases that reached the federal appellate level because decisions issued by the U.S. Circuit Courts of Appeals create binding precedent for all of the districts in that circuit, among other considerations. We identified 19 cases that were filed by private parties with claims under the NVRA that reached the U.S. Circuit Courts of Appeals (federal appellate level) from fiscal years 2008 through 2018. Eleven of the 19 cases included claims that were related to NVRA provisions that require states to provide registration opportunities. Six cases included claims related to the NVRA requirement to remove voters from registration lists under specified conditions (list maintenance). Private parties filed 11 cases involving claims under the NVRA’s registration opportunity provisions that reached the U.S. Circuit Courts of Appeals. We reviewed the claims in each of the 11 cases and found that: five of the 11 cases involved a claim under section 5 related to voter registration opportunities at motor vehicle offices; four of the 11 cases involved a claim under section 7 related to registration opportunities at public assistance offices; two of the 11 cases involved a claim under section 6 related to mail-in registration application forms; and one of the 11 cases involved claims under section 8 related to the requirement that states register voters whose applications are received at least 30 days before an election. Private parties filed six cases involving list maintenance claims under the NVRA that reached the U.S. Circuit Courts of Appeals. NVRA list maintenance cases may involve two types of allegations under section 8: (1) in conducting a required program to remove ineligible voters from the voter registration list, a state or local jurisdiction did not incorporate certain safeguards, with the potential effect of unlawfully removing eligible voters; and (2) a state or local jurisdiction did not have an adequate program to remove ineligible voters from the voter registration list. Five of the six cases included a claim under section 8 related to the potential unlawful removal of voters from voter registration lists. The sixth case included a claim under section 8 related to the inadequate removal of ineligible voters from voter registration lists. DOJ submitted an amicus brief or statement of interest in nine of the 19 NVRA cases filed by private parties that reached the U.S. Circuit Courts of Appeals between fiscal years 2008 through 2018. Five of the nine cases in which DOJ participated involved issues related to registration opportunities: DOJ participated in all four of the cases that included a claim under section 7 related to registration issues involving public assistance offices. For example, in one case, plaintiffs alleged that the state of New Mexico failed to provide voter registration forms to applicants for public assistance who did not decline, in writing, to register to vote. DOJ submitted a brief in support of the plaintiffs. DOJ participated in one case that included a claim under section 6 related to mail-in voter registration application forms. DOJ also participated in one case under section 8 that related to the public disclosure of records concerning voter registration list maintenance activities. The remaining three cases involved issues related to list maintenance, specifically allegations that an election jurisdiction’s list maintenance program did not have appropriate safeguards to protect against the unlawful removal of eligible voters. For example, in one case, plaintiffs alleged that the state of Ohio violated the NVRA by using failure to vote as the sole trigger to start the confirmation process for removing voters from registration rolls based on a change of residence. In 2016, DOJ filed an amicus brief in support of the plaintiffs. In 2017, the case was appealed to the U.S. Supreme Court and the department reversed its original position and filed a brief supporting the state’s list maintenance practices. In June 2018, the Supreme Court upheld Ohio’s process for removing voters on change-of-residence grounds and ruled that failure to vote could serve as evidence that a registrant had moved. Within the Department of Justice (DOJ), the Civil Rights Division’s Voting Section enforces the civil provisions of federal laws that protect the right to vote, including the National Voter Registration Act of 1993 (NVRA), the Help America Vote Act, the Voting Rights Act of 1965, and the Uniformed and Overseas Citizens Absentee Voting Act, among others. From fiscal years 2001 through 2017, the Voting Section participated in 234 cases, including 14 cases involving NVRA claims in which the Section was the plaintiff or the plaintiff intervenor. Cases with NVRA claims included allegations related to providing registration opportunities for voters, and allegations related to the requirement to remove voters from registration lists under specified conditions (list maintenance). Table 5 below provides a brief summary of the allegations in each case. To address how selected data sources are used at the state and local level and to obtain perspectives on how these sources help maintain voter registration lists, we selected and reviewed six commonly received data sources that may be used to remove ineligible voters who have moved, died, or committed a disqualifying criminal conviction. We also selected state and local election offices in five states and conducted interviews with election officials to obtain information on policies and procedures for using selected data sources, and perspectives on their benefits and limitations. This appendix describes our data source and site selection methodologies, and additional information on the data sources and sites we selected. To determine which data sources to include in our review, in June 2018 we sent a structured questionnaire to state election directors for each of the 49 states and the District of Columbia with voter registration requirements to identify commonly received data sources which states can potentially use to conduct voter registration list maintenance. The National Voter Registration Act of 1993 (NVRA) specifies certain categories under which election officials may remove registrants from voter registration lists including: 1. if a registrant has moved outside of a jurisdiction and either (a) confirmed the move in writing or (b) failed to respond to an address confirmation mailing and failed to vote in two consecutive federal general elections subsequent to the mailing; 2. death of the registrant; 3. criminal conviction of the registrant, as provided for in state law; and 4. mental incapacity of the registrant, as provided for in state law. We asked state election directors to identify the sources from which data were received at either the state or local level at any point between January 2017 and May 2018. We summarized responses from election directors in 35 states and the District of Columbia to identify commonly received data sources. Table 6 provides a summary of responses to the structured questionnaire, with the data sources organized according to the NVRA categories that may be used to remove registrants from voter lists. From the list of commonly received sources above, we then selected six data sources that can be used to address the following NVRA categories for removing registrants—move outside election jurisdiction, death, and, disqualifying criminal conviction. These categories each account for more than 1 percent of total removals from voter registration lists nationwide, based on the most recent data reported to the U.S. Election Assistance Commission. We did not select any data source that addresses the “disqualifying mental incapacity” NVRA removal category since it accounted for less than 1 percent of total removals nationwide for this time period. Specifically, we selected three sources that address moves, two sources that address deceased registrants, and one source that addresses disqualifying criminal convictions, to generally reflect recent data reported on the distribution of registrant removals, by removal category, from voter registration lists nationwide. We also selected (a) at least one nationwide source that captures data from all states; (b) at least one source that only includes data specific to the particular state or local jurisdiction that receives data from the source; and (c) one interstate data exchange that involves the sharing of data between multiple states. We selected sources from each of these categories in order to identify potential issues that may arise when election officials match their voter registration data with various other types of data sources. Table 7 presents the data sources we selected for further review. To obtain information on policies and procedures for using selected data sources for voter registration list maintenance, and election officials’ perceptions on the benefits and limitations of using them, we selected five states that indicated in their responses to our questionnaire that they have received data from at least five of the six selected data sources between January 2017 and May 2018. We also considered variation in states’ population size, when possible, and geographic diversity in order to capture possible regional differences in election administration practices. See table 8 for a list of the states we selected and a summary of the selected data sources received by each state. For each of the five selected states, we selected two local election jurisdictions (counties or cities/towns)–one with a larger population and one with a smaller population–based on the recommendation of the state election officials, population size, and other factors. See table 9 for demographic information on the states and local jurisdictions we visited. In addition to the contact named above, Tom Jessor (Assistant Director), David Alexander, Justine Augeri, Colleen Candrl, Jamarla Edwards, Jonathan Ferguson, Alana Finley, Eric Hauswirth, Richard Hung, Amanda Miller, Heidi Nielson, Kevin Reeves, Christine San, Janet Temko-Blinder, Jeff Tessin, and Sarah Turpin made key contributions to this report.", "summary": "The NVRA was intended to increase the number of eligible citizens who register to vote in federal elections, protect the integrity of the electoral process, and ensure that accurate and current voter registration rolls are maintained. GAO was asked to examine issues related to the NVRA's voter registration and voter registration list maintenance requirements, as well as issues related to election fraud. This report addresses (1) DOJ's efforts to ensure states and localities comply with NVRA requirements to offer registration opportunities and administer voter registration list maintenance programs, and address potential instances of election fraud; and (2) how selected data sources are used at the state and local level to help maintain voter registration lists, and perspectives on how these data sources help ensure list accuracy and address potential voter eligibility and fraud issues. GAO analyzed data on DOJ's efforts to ensure NVRA compliance and address election fraud–as measured by matters initiated and cases filed--for fiscal years 2001 through 2017 (the last full year of data available when requested from DOJ). This period covered eight federal elections. GAO also interviewed DOJ officials. GAO selected six commonly received data sources that may be used in list maintenance efforts. GAO reviewed literature and interviewed state and local election officials in five states for perspectives on how the data sources are used and any benefits and limitations. These states used at least five of the data sources and provided geographic diversity. The results from these five states are not generalizable, but provide insight into state and local perspectives on list maintenance. From fiscal years 2001 through 2017, the Department of Justice's (DOJ) Voting Section (which enforces the civil provisions of voting rights laws) initiated matters (e.g., investigations), filed cases against state or local governments in federal court, and engaged in other efforts to enforce provisions of the National Voter Registration Act of 1993 (NVRA). Specifically, the Voting Section: initiated 99 matters involving allegations of NVRA violations related to voter registration opportunities and list maintenance; filed 14 cases involving allegations of NVRA violations; eight included list maintenance allegations; four included registration opportunities allegations; and two included both types of allegations; and DOJ's Public Integrity Section (which supervises nationwide election law enforcement and prosecutes selected cases involving alleged corruption by government officials), and U.S. Attorneys' Offices (which enforce criminal laws within their districts) engaged in efforts to address election fraud from fiscal years 2001 through 2017, including filing cases against individuals in federal court. For example: The Section initiated 33 matters and filed 19 cases related to election fraud, accounting for about three percent of its overall caseload. Of these cases,17 involved vote buying and false information charges. U.S. Attorneys' Offices initiated 525 matters and filed 185 cases related to election fraud, accounting for about .02 percent of their overall caseload. Of these cases, 52 involved charges such as vote buying and voting more than once, and 49 involved conspiracy. GAO reviewed six data sources election officials may use to maintain voter registration lists and remove voters who become ineligible due to a move, death, or disqualifying criminal conviction: (1) the U.S. Postal Service's National Change of Address (NCOA), (2) the Interstate Voter Registration Crosscheck Program, (3) returned mail, (4) the public version of the Social Security Administration's Death Master File, (5) state vital records, and (6) U.S. Attorneys' records on felony convictions. Election officials GAO interviewed and literature reviewed reported benefits and limitations associated with each source. According to officials, each source helps improve list accuracy, despite some limitations, and list maintenance efforts in general help reduce opportunities for election fraud. For example, officials said that NCOA data helped them maintain accurate lists by identifying registrants who moved outside the election jurisdiction; however, they also noted that NCOA data may not capture all address changes because people do not always notify the U.S. Postal Service when they move. GAO incorporated technical comments provided by federal agencies and state and local election officials as appropriate.", "document_type": "gao"}
{"report": "As of November 2018, 43 states operated at least part of their Medicaid programs under demonstrations. State demonstrations can vary in size and scope, and many demonstrations are comprehensive in nature, affecting multiple aspects of states’ Medicaid programs. In fiscal year 2017, federal spending on demonstrations accounted for more than one- third of total federal Medicaid spending and in eight states accounted for 75 percent or more of Medicaid expenditures. CMS typically approves demonstrations for an initial 5-year period that can be extended in 3- to 5-year increments with CMS approval. Some states have operated portions of their Medicaid programs under a demonstration for decades. Each demonstration is governed by special terms and conditions, which reflect the agreement reached between CMS and the state, and describe the authorities granted to the state. For example, the special terms and conditions may define what demonstration funds can be spent on—including which populations and services—as well as specify reporting requirements, such as monitoring or evaluation reports states must submit to CMS. In January 2018, CMS announced a new policy to support states interested in using demonstrations to make participation in work or community engagement a requirement to maintain Medicaid eligibility or coverage. CMS’s guidance indicates that states have flexibility in designing demonstrations that test work requirements, but it also describes parameters around the populations that could be subject to work requirements and other expectations. CMS guidance addresses several areas, including the following: Populations. Work requirements should apply to working-age, non- pregnant adult beneficiaries who qualify for Medicaid on a basis other than a disability. Exemptions and qualifying activities. States must create exemptions for individuals who are medically frail or have acute medical conditions. States must also take steps to ensure eligible individuals with opioid addiction and other substance use disorders have access to coverage and treatment services and provide reasonable modifications for them, such as counting time spent in medical treatment toward work requirements. The guidance indicates that states can allow a range of qualifying activities that satisfy work requirements, such as job training, education programs, and community service. The guidance also encourages states to consider aligning Medicaid work requirements with work requirements in other federal assistance programs operating in their states. Beneficiary supports. States are expected to describe their strategies to assist beneficiaries in meeting work requirements and to link them to additional resources for job training, child care assistance, transportation, or other work supports. However, CMS’s guidance specifies that states are not authorized to use Medicaid funds to finance these beneficiary supports. About one-third of states have either received CMS approval or submitted applications to CMS to test work requirements in their demonstrations. Nine states have had work requirements approved as part of new demonstrations or extensions of or amendments to existing demonstrations as of May 2019. Also as of May 2019, seven more states had submitted demonstration applications with work requirements, which were pending CMS approval. (See fig. 1.) States with approved work requirements were in various stages of implementation as of August 2019, and three states faced legal challenges to implementation. The requirements were in effect in Arkansas for 9 months before a federal district court vacated the approval in March 2019. Work requirements became effective in Indiana in January 2019 and will be enforced beginning in January 2020. CMS’s approval of work requirements in Kentucky was vacated in March 2019— several days before the work requirements were set to become effective on April 1, 2019. As of August 2019, CMS was appealing the court decisions vacating demonstration approvals in Arkansas and Kentucky. Other states’ requirements are approved to take effect in fiscal years 2020 and 2021. (See fig. 2.) Implementing work requirements, as with other types of beneficiary requirements, can involve an array of administrative activities by states, including developing or adapting eligibility and enrollment systems, educating beneficiaries, and training staff. In general, CMS provides federal funds for 50 percent (referred to as a 50 percent matching rate) of state Medicaid administrative costs. These funds are for activities considered necessary for the proper and efficient administration of a state’s Medicaid program, including those parts operated under demonstrations. CMS provides higher matching rates for certain administrative costs, including those related to IT systems. For example, expenditures to design, develop, and install Medicaid eligibility and enrollment systems are matched at 90 percent, and maintenance and operations of these systems are matched at 75 percent. States may also receive federal funds for administrative activities delegated to MCOs. The amount of federal Medicaid funds states receive for payments to MCOs that bear financial risk for Medicaid expenditures is determined annually by a statutory formula based on the state’s per capita income, known as the Federal Medical Assistance Percentage (FMAP). The FMAP sets a specific federal matching rate for each state that, for fiscal year 2019, ranges from 50 percent to 76 percent. There are exceptions to this rate for certain populations, providers, and services. For example, states that chose to expand Medicaid under the Patient Protection and Affordable Care Act (PPACA) receive a higher FMAP for newly eligible adults, equal to 93 percent in 2019. (See fig. 3.) CMS has several different related processes under which the agency oversees Medicaid administrative costs, including those for demonstrations. Demonstration approval, monitoring, and evaluation. States seeking demonstration approvals must meet transparency requirements established by CMS. For example, states must include certain information about the expected changes in expenditures under the demonstration in public notices seeking comment at the state level and in the application to CMS, which is posted for public comment at the federal level. In addition, CMS policy requires that demonstrations be budget neutral—that is, that the federal government should spend no more under a demonstration than it would have without the demonstration. Prior to approval, states are required to submit an analysis of their projected costs with and without the demonstration. CMS uses this information to determine budget neutrality and set spending limits for demonstrations. During the demonstration, CMS is responsible for monitoring the state’s compliance with the terms and conditions of the demonstration, including those related to how Medicaid funds can be spent and the demonstration spending limit. States must also evaluate their demonstrations to assess the effects of the policies being tested, which could include impacts on cost. Review and approval of federal matching funds for IT projects. To request higher federal matching rates for changes to Medicaid IT systems, including eligibility and enrollment systems, states must submit planning documents to CMS for review and approval. States’ plans must include sufficient information to evaluate the state’s goals, procurement approach, and cost allocations within a specified budget. States may request funds for system development related to a proposed demonstration before the demonstration is approved. Funding can be approved and expended under the approved plan while the demonstration application is being reviewed. States submit updates to planning documents annually for CMS review, which can include requested changes to the approved budget. Quarterly expenditure reviews. In order to receive federal matching funds, states report their Medicaid expenditures quarterly to CMS, including those made under demonstrations. Expenditures associated with demonstrations, including administrative expenditures, are reported separately from other expenditures. CMS is responsible for ensuring that expenditures reported by states are supported and allowable, meaning that the state actually made and recorded the expenditure and that the expenditure is consistent with Medicaid requirements. With regard to consistency, this includes comparing reported expenditures to various approval documents. For example, CMS is responsible for comparing reported demonstration expenditures against the special terms and conditions that authorize payment for specified services or populations and establish spending limits. CMS is also responsible for reviewing states’ reported expenditures against budgets in states’ planning documents to ensure that states do not exceed approved amounts. A list of GAO reports related to these CMS oversight processes is included at the end of this report. States took different approaches to designing work requirements under their Medicaid demonstrations. These requirements varied in terms of the beneficiary groups subject to the requirements; the required activities, such as frequency of required reporting; and the consequences beneficiaries face if they do not meet requirements. In the nine states with approved work requirements as of May 2019, we found differences in the age and eligibility groups subject to work requirements, and, to a lesser extent, the number of hours of work required and frequency of required reporting to the state. For example: Age and eligibility groups subject to work requirements. Four of these states received approval to apply the requirements to adults under the age of 50, similar to how certain work requirements are applied under the Supplemental Nutrition Assistance Program (SNAP). Among the other five states, approved work requirements apply to adults up to the age of 59 (Indiana and Utah), 62 (Michigan), and 64 (Kentucky and New Hampshire). States generally planned to apply the requirements to adults newly eligible under PPACA or a previous coverage expansion, but some states received approval to apply the requirements to additional eligibility groups, such as parents and caretakers of dependents. Number of hours of work required and frequency of required reporting. Under approved demonstrations in seven states, Medicaid beneficiaries must complete 80 hours of work or other qualifying activities per month to comply with work requirements. Five states’ approved demonstrations require beneficiaries to report each month on their hours of work or other qualifying activities, using methods approved by the state, such as online or over the phone. (See table 1.) We saw similar variation under the seven state applications that were pending as of May 2019. All nine states with approved work requirements as of May 2019 exempted several categories of beneficiaries and counted a variety of activities as meeting the work requirements. For example, all nine states exempted from the work requirements people with disabilities, pregnant women, and those with certain health conditions, such as a serious mental illness. In addition, depending on the state, other groups were also exempted, such as beneficiaries who are homeless, survivors of domestic violence, and those enrolled in substance use treatment programs. States also counted activities other than work as meeting the work requirements, such as job training, volunteering, and caregiving for non-dependents. In addition to work requirements, eight of the nine states received approval under their demonstrations to implement other beneficiary requirements, such as requiring beneficiaries to have expenditure accounts. (See app. I for more information on these other beneficiary requirements.) The consequences Medicaid beneficiaries faced for non-compliance and the timing of the consequences varied across the nine states with approved work requirements. The consequences for non-compliance included coverage suspension and termination. For example, Arizona received approval to suspend beneficiaries’ coverage after 1 month of non-compliance. In contrast, Wisconsin will not take action until a beneficiary has been out of compliance for 4 years, at which time coverage will be terminated. Three states (Arkansas, Michigan, and Wisconsin) imposed or planned to impose a non-eligibility period after terminating a beneficiary’s enrollment. For example, under Arkansas’ demonstration, after 3 months of non-compliance, the beneficiary was not eligible to re-enroll until the next plan year, which began in January of each year. Thus, beneficiaries could be locked out of coverage for up to 9 months. (See table 2.) For states with pending applications, suspension or termination of coverage takes effect after 2 or 3 months of non- compliance. For states that suspend coverage for beneficiaries, there are different conditions for coming into compliance and lifting the suspension. For example: Arizona received approval to automatically reactivate an individual’s eligibility at the end of each 2-month suspension period. In other states, such as Indiana, beneficiaries must notify the state that they have completed 80 hours of work or other qualifying activities in a calendar month, after which the state will reactivate eligibility beginning the following month. (See text box.) Indiana’s Suspension Process for Non-Compliance with Medicaid Work Requirements At the end of each year, the state reviews beneficiaries’ activities related to work requirements. Beneficiaries must meet the required monthly hours 8 out of 12 months of the year to avoid a suspension of Medicaid coverage. If coverage is suspended for not meeting work requirements, the suspension will start January 1 and could last up to 12 months. During a suspension, beneficiaries will not be able to access Medicaid coverage to receive health care. Beneficiaries with suspended Medicaid coverage can reactivate coverage if they become medically frail; or employed, enrolled in school, or engaged in volunteering. Beneficiaries must contact the state to reactivate coverage. To prevent suspension from taking effect, two states (Kentucky and New Hampshire) require beneficiaries to make up required work hours that were not completed in order to maintain compliance with work requirements. For example, in Kentucky, if the beneficiary worked 60 hours in October (20 hours less than the required 80), the beneficiary must work 100 hours in November to avoid suspension of coverage in December. Available estimates of the costs to implement Medicaid work requirements varied considerably among the five selected states, and these estimates did not account for all costs. These states estimated that federal funding would cover the majority of these costs, particularly costs to modify IT systems. Selected states (Arkansas, Indiana, Kentucky, New Hampshire, and Wisconsin) reported estimates of the costs to implement work requirements that ranged from under $10 million in New Hampshire to over $250 million in Kentucky. These estimates—compiled by states and reported to us—did not include all planned costs. The estimates were based on information the states had readily available, such as the costs of contracted activities for IT systems and beneficiary outreach, and primarily reflect up-front costs. Four selected states (Arkansas, Indiana, Kentucky, and New Hampshire) had begun implementing work requirements and making expenditures by the end of 2018. Together, these states reported to us having spent more than $129 million in total for implementation activities from the time the states submitted their demonstration applications through the end of 2018. (See table 3.) Several factors may have contributed to the variation in the selected states’ estimated costs of administering work requirements, including planned IT system changes and the number of Medicaid beneficiaries subject to the work requirements. IT system changes. Selected states planned distinct approaches to modify their IT systems in order to administer work requirements. For example: Indiana, which implemented work requirements by expanding on an existing work referral program, planned to leverage existing IT systems, making modifications expected to result in IT costs of $14.4 million over 4 years. In contrast, Kentucky planned to develop new IT system capabilities to communicate, track, and verify information related to work requirements. Kentucky received approval to spend $220.9 million in fiscal years 2019 and 2020 to do that and make changes needed to implement other beneficiary requirements in its demonstration. Number of beneficiaries subject to requirements. The estimated cost of some activities to administer work requirements depended on the number of Medicaid beneficiaries subject to work requirements, which varied across selected states. For example: Kentucky estimated 620,000 beneficiaries would be subject to work requirements—including those who may qualify for exemptions—and estimated costs of $15 million for fiscal years 2019 and 2020 to conduct beneficiary education, outreach, and customer service. In contrast, Arkansas had fewer beneficiaries subject to work requirements (about 115,000 in February 2019, with about 100,000 of those eligible for exemptions) and estimated fewer outreach costs. The state estimated $2.9 million in costs from July 2018 through June 2019 to conduct education and outreach. As noted earlier, states’ available estimates did not include all expected Medicaid costs. For example, four of the five selected states planned to use MCOs or other health plans to help administer work requirements, but two of these four did not have estimates of the associated costs. Indiana and Kentucky estimated additional payments to MCOs—$20.7 million in Indiana to administer work requirements in 2019 and $50.7 million in Kentucky to administer its demonstration from July 2018 through June 2020. In contrast, officials in New Hampshire told us that no estimates were available. In Arkansas, where beneficiaries receive premium support to purchase coverage from qualified health plans on the state’s health insurance exchange, plans were instructed to include the costs of administering work requirements in the premiums, according to Arkansas officials. State officials and representatives from a qualified health plan we spoke with could not provide the amount that the state’s premium assistance costs increased as a result. States’ estimates also did not include all ongoing costs that they expect to incur after the up-front costs and initial expenditures related to implementation of the work requirements. States had limited information about ongoing costs, but we collected some examples. For instance, New Hampshire provided estimated costs of $1.6 million to design and implement the evaluation of its demonstration, which all states are required to perform. In addition, officials or documents in each selected state acknowledged new staffing costs that may be ongoing, such as Indiana’s costs for five full-time employees to assist beneficiaries with suspended coverage to meet requirements or obtain exemptions. Finally, states reported that administering Medicaid work requirements will increase certain non-Medicaid costs—costs that are not funded by federal Medicaid, but are borne by other federal and state agencies, stakeholders, or individuals. For instance, New Hampshire officials planned to use approximately $200,000 to $300,000 in non-Medicaid funds for six positions performing case management for workforce development. Similarly, in July 2017, Indiana estimated that providing beneficiaries with job skills training, job search assistance, and other services would cost $90 per month per beneficiary, although state officials said these costs were uncertain after learning they were not eligible for federal Medicaid funds. In addition, beneficiaries and entities other than states, such as community organizations, may incur costs related to the administration of work requirements that are not included in states’ estimates. All five selected states expected to receive federal funds for the majority of estimated costs and expenditures (described previously) for implementing work requirements. For example, the four selected states that provided data on expenditures to administer work requirements through 2018 (Arkansas, Indiana, Kentucky, and New Hampshire) expected the portion of those expenditures paid by the federal government to range from 82 percent in Indiana to 90 percent in New Hampshire and Kentucky. These effective matching rates exceed the 50 percent matching rate for general administrative costs, largely due to higher matching rates of 75 and 90 percent of applicable IT costs. For example, Kentucky received approval to spend $192.6 million in federal funds for its $220.9 million in expected IT costs over 2 years to implement work requirements and other beneficiary requirements, an effective match rate of 87 percent. In addition to higher federal matching rates for IT costs, the selected states receive federal funds for the majority of MCO capitation payments, which the states planned to increase to pay MCOs’ costs to administer work requirements. Each of the three states that planned to use MCOs to administer work requirements planned to increase capitation payments in order to do so. For example, Indiana planned to increase capitation payments to MCOs by approximately 1 percent (or $20.7 million in 2019) to pay for a variety of ongoing activities to administer work requirements, including requiring MCOs to help beneficiaries report compliance, reporting beneficiaries who qualify for exemptions, and helping the state verify the accuracy of beneficiary reporting, according to state officials. The federal government pays at least 90 percent of capitation payments to MCOs to provide covered services to beneficiaries who are newly eligible under PPACA, the primary population subject to work requirements among the five selected states. Indiana and Kentucky also received approval to apply work requirements to other populations, and capitation payments for these other populations receive federal matching rates of 66 percent in Indiana and 72 percent in Kentucky in fiscal year 2019. States’ approaches to implementing work requirements can affect the federal matching funds they receive. For example, Arkansas officials told us that the state decided to collect information on beneficiary compliance through an on-line portal—the initial cost of which received an effective federal matching rate of 87 percent, according to Arkansas. Officials told us that the state avoided having beneficiaries report compliance to staff— costs of which receive a 75 percent matching rate. However, after approximately 17,000 beneficiaries lost coverage due to non-compliance with work requirements, Arkansas revised its procedures to allow beneficiaries to report compliance to state staff over the phone. Three of the five selected states sought to leverage other programs funded by the federal government to help implement work requirements or provide beneficiary supports, such as employment services. Kentucky officials reported piloting elements of Medicaid work requirements using its SNAP Employment and Training program. Similarly, Arkansas officials sought a waiver to be able to use TANF funds to provide employment services to individuals without children in order to serve Medicaid beneficiaries subject to work requirements. New Hampshire also used TANF funds to provide employment services to Medicaid beneficiaries who were also enrolled in TANF. CMS does not consider administrative costs when approving any demonstrations—including those with work requirements—though these costs can be significant. The agency has recently taken steps to obtain more information about demonstration administrative costs. However, we identified various weaknesses in CMS’s oversight of administrative costs that could result in states receiving federal funds for costs to administer work requirements that are not allowable. CMS’s demonstration approval process does not take into account the extent to which demonstrations, including those establishing work requirements, will increase a state’s administrative costs. CMS policy does not require states to provide projections of administrative costs in their demonstration applications or include administrative costs in their demonstration cost projections used by CMS to assess budget neutrality. CMS officials explained that in the past demonstrations had generally not led to increases in administrative costs, and as such, the agency had not seen a need to separately consider these costs. However, the officials told us and have acknowledged in approval letters for demonstrations with work requirements, that demonstrations may increase administrative costs. Kentucky provides an example of this, reporting to us estimated administrative costs of approximately $270 million—including about $200 million in federal funds—to implement the demonstration over 2 years. However, neither Kentucky nor the other four selected states provided estimates of their administrative costs in their applications to CMS, and CMS officials confirmed that no additional information on administrative costs was provided by the states while their demonstration applications were being reviewed. By not considering administrative costs in its demonstration approval process, CMS’s actions are counter to two key objectives of the demonstration approval process: transparency and budget neutrality. Transparency. CMS’s transparency requirements are aimed at ensuring that demonstration proposals provide sufficient information to ensure meaningful public input. However, CMS officials told us that they do not require the information states provide on the expected changes in demonstration expenditures in their applications to account for administrative costs. This information would likely have been of interest in our selected states, because public commenters in each state expressed concerns about the potential administrative costs of these demonstrations. In prior work, we reported on weaknesses in CMS’s policies for ensuring transparency in demonstration approvals. Budget neutrality. The aim of CMS’s budget neutrality policy is to limit federal fiscal liability resulting from demonstrations, and CMS is responsible for determining that a demonstration will not increase federal Medicaid expenditures above what they would have been without the demonstration. However, CMS does not consider administrative costs when assessing budget neutrality. For three of our five selected states, the demonstration special terms and conditions specify that administrative costs will not be counted against the budget neutrality limit. Even though demonstrations’ administrative costs can be significant, CMS officials said the agency has no plans to revise its approval process—either to (1) require states to provide information on expected administrative costs to CMS or the public, or to (2) account for these costs when the agency assesses whether a demonstration is budget neutral. CMS officials explained that the agency needs more experience with policies that require administrative changes under a demonstration before making any revisions to its processes. Without requiring states to submit projections of administrative costs in their demonstration applications, and by not considering the implications of these costs for federal spending, CMS puts its goals of transparency and budget neutrality at risk. This is inconsistent with federal internal control standards that call for agencies to identify, analyze, and respond to risks related to achieving program objectives. CMS recently implemented procedures that may provide additional information on demonstrations’ administrative costs. These included implementing new procedures to identify costs specific to demonstrations when approving federal matching funds for states’ planned IT costs and issuing guidance on monitoring and evaluating demonstrations. However, it is unclear whether these efforts will result in data that improve CMS’s oversight. (See table 4.) In addition to these new initiatives, states’ quarterly expenditure reports provide CMS with some information on their demonstration administrative costs, but this information also has limitations. States are required to separately track and report administrative expenditures attributable to their demonstrations in their quarterly expenditure reports. However, CMS officials told us that states typically use the same resources, such as staff, to administer their demonstrations and their regular Medicaid program, which can affect the demonstration costs states report. We found that about a quarter of states with demonstration expenditures in fiscal year 2017 reported no administrative expenditures related to their demonstrations. CMS officials acknowledged that the data states submit in their quarterly expenditure reports may not provide a meaningful measure of states’ demonstration-related administrative costs. CMS’s recently implemented procedures may provide more information on the amounts states are spending on demonstration administrative costs, but they do not address weaknesses we found in CMS’s oversight of administrative costs. In four of the five selected states, we identified examples of states requesting federal matching funds for costs to administer work requirements that do not appear to be allowable, or at higher matching rates than appropriate under CMS guidance. In some cases, states received CMS approval for planned administrative costs while in others it was unclear whether CMS would have identified the issues through their oversight procedures. Areas of risk included funds for planned IT costs, funds for beneficiary supports, and funds provided under managed care contracts. Federal funds for planned IT costs that may not be allowable or eligible for higher matching rates. Three of our five selected states requested and received funding approval for planned IT costs to implement their demonstrations that did not appear to be allowable or at higher matching rates than appropriate under CMS guidance. Kentucky and Indiana requested and received funding approval for planned IT costs that do not appear to be allowable under CMS guidance. Kentucky requested and received CMS approval for funds (at the 90 percent federal matching rate) for a contract that included activities to assist Medicaid beneficiaries obtain employment. (See text box.) However, CMS’s 2018 guidance states that Medicaid funding is not available to finance beneficiary supports, such as job training or other employment services. CMS officials said that the agency did not review the contract and approved the request based on Kentucky’s assertion that these costs were specific to technology. Indiana received approval to receive IT funds to develop a website that provides beneficiaries access to information and tools to seek, acquire, and retain employment, costs that also appear related to beneficiary supports. Kentucky Received Approval of Information Technology Funding for Activities Aimed at Helping Beneficiaries Obtain Employment In 2018, in an update to its information technology budget request, Kentucky included costs for a contract with the state’s Department of Workforce Services to assist Medicaid beneficiaries in developing skills needed to obtain and retain employment. The contracted services included activities such as assessing beneficiaries’ eligibility for non-Medicaid programs, providing services to beneficiaries at career assistance centers, and making referrals to other agencies and programs. Kentucky budgeted $21 million for this contract at a 90 percent federal matching rate ($18.9 million in federal funds) for fiscal year 2019 and another $21 million at a 75 percent matching rate ($15.8 million in federal funds) for fiscal year 2020. CMS approved Kentucky’s budget request without reviewing the contract. Medicaid Services. | GAO-20-149. Indiana and New Hampshire received funding approval for federal IT funds at the 90 percent matching rate for costs that do not appear eligible for that rate. In 2018, CMS approved Indiana’s request for a 90 percent match rate to pay $500,000 in consulting fees to develop work requirement policies, despite CMS guidance indicating that policy research and development activities should be matched at 50 percent. New Hampshire requested and received CMS approval in 2018 for federal funds at a 90 percent matching rate for $180,000 in costs to educate beneficiaries about work requirements, including costs to place outreach calls through an existing contracted call center. CMS guidance indicates that these costs should receive funding at a lower matching rate. Federal funds for beneficiary supports that are not allowable. Wisconsin requested and planned to seek federal funds for beneficiary support costs that are not allowable until our work identified the issue for CMS. Wisconsin officials told us that it was their understanding during the planning phase of the demonstration that administrative costs incurred by state programs providing such services were eligible for federal matching funds. State officials said that CMS officials told them on multiple occasions that the state could receive a 50 percent federal match for these costs. Based on this, the state requested budget authority from its legislature for $51.2 million for employment and training services, of which it anticipated $23.1 million would come from federal Medicaid funds. CMS officials told us that such costs are not eligible for federal matching funds and maintained that the agency’s guidance—which indicates that beneficiary support costs are not eligible for federal matching funds—was clear. In response to our inquiries, the agency contacted the state in April 2019 and clarified this with officials. Federal funds for costs to administer work requirements provided through managed care contracts, which may not be allowable. As noted earlier, three of the five selected states (Indiana, Kentucky, and New Hampshire) required or planned to require MCOs to perform a number of activities to implement work requirements. These activities included, for example, providing information on options to satisfy work requirements, assisting beneficiaries with reporting compliance with work requirements, and providing referrals to state work requirement resources. To fund these activities, officials in these states said that they plan to increase their capitation payments. States will receive at least a 90 percent federal matching rate for most of these payments, because the payments are largely for beneficiaries who are newly eligible under PPACA. It is unclear, however, whether including these activities in capitation payments is allowable. CMS regulations provide that states may only include administrative costs that are related to the provision of covered health care services in their MCO capitation payments. In addition, CMS guidance notes that implementing work requirements will not change the types of expenditures that are allowable. We provided CMS with specific examples of activities states delegated or planned to delegate to MCOs and asked if these types of activities met CMS’s criteria to be included under capitation payments. CMS officials told us that federal review of the related managed care contracts in Indiana and New Hampshire had not been completed as of June 2019 and could not make a definitive statement. While CMS guidance requires states to carry out a range of activities to implement work requirements—some of which are not eligible for federal Medicaid funds—agency officials told us that CMS has not updated any procedures for the various reviewers of these costs. Further, CMS has not completed a risk assessment to determine whether current procedures for overseeing administrative costs are sufficient, and agency officials told us that there were no plans to do so. According to federal internal control standards, agencies should identify, analyze, and respond to risks related to achieving program objectives (in this case, ensuring that administrative expenditures under demonstrations are allowable and matched at the correct rate). Without identifying, assessing, and addressing the risks posed by demonstrations that may increase administrative costs, CMS may be providing federal funds for costs that are not allowed or at inappropriately high matching rates. A third of states have sought approval to implement work requirements in their Medicaid programs. CMS has acknowledged that demonstrations, including those with work requirements, may increase Medicaid administrative costs—and therefore overall Medicaid spending. Yet, CMS is not factoring these costs into its approval decisions, which is counter to the agency’s goals of transparency and budget neutrality. Further, the agency has not taken steps to assess and respond to risks of federal funds being spent for administrative costs that are not allowable or matched at rates higher than what is appropriate, risks we found in four of the five demonstrations we reviewed. While administrative costs are a relatively small portion of states’ Medicaid spending, the weaknesses in CMS’s oversight of these costs could take on increased importance as more states seek and receive approval to implement work requirements. We are making the following three recommendations to CMS: The Administrator of CMS should require states to submit and make public projections of administrative costs when seeking approval of demonstrations, including those with work requirements and all other demonstrations. (Recommendation 1) The Administrator of CMS should account for the administrative costs of demonstrations, including those with work requirements and all other demonstrations, when assessing whether demonstrations are budget neutral. (Recommendation 2) The Administrator of CMS should assess the risks of providing federal funds for costs to administer work requirements that are not allowable and should respond to risks by improving oversight procedures, as warranted. This assessment should consider risks related to costs for information systems, beneficiary supports, and managed care. (Recommendation 3) We provided a draft of this report to HHS for comments and its comments are reproduced in appendix II. HHS also provided us with technical comments, which we incorporated in the report as appropriate. HHS did not concur with our recommendations. In general, HHS commented that it expects administrative costs to represent a relatively small proportion of total Medicaid spending and that its current approach to overseeing administrative costs—including those incurred under Medicaid demonstrations—is appropriate given the level of financial risk. HHS commented that administrative costs were approximately 5 percent of Medicaid expenditures. While these cost may represent a relatively small share of total spending, CMS projected them to be $18 billion in federal funds in fiscal year 2019—and this does not include all administrative spending. In particular, it does not include amounts paid to MCOs for administrative costs, which are likely considerable given that managed care payments now represent about half of all Medicaid spending. Further, demonstrations may represent a heightened financial risk given our finding that they can result in additional administrative costs that would not otherwise occur. Regarding our first recommendation to require states to submit and make public projections of administrative costs, HHS commented that its experience suggests that demonstration administrative costs will be a relatively small portion of total costs and therefore HHS believes making information about these costs available would provide stakeholders little to no value. As noted, Medicaid is a significant component of federal and state budgets. In each of the five states we reviewed, public commenters expressed concerns about the potential administrative costs of Medicaid demonstrations with work requirements, suggesting stakeholders would value information about these costs. We maintain that requiring states to make public information about administrative costs would help to ensure that demonstration proposals provide sufficient information to ensure meaningful public input. Regarding our second recommendation to account for administrative costs when assessing whether demonstrations are budget neutral, HHS again commented that its experience suggests that demonstration administrative costs will be a relatively small portion of total costs and that it believed that its current approach is appropriate for the level of financial risk. However, we found that demonstration administrative costs could be significant and HHS’s current policy of not considering these costs in its assessments of budget neutrality could increase federal fiscal liability. For example, in Kentucky, we found estimated administrative costs for implementing the demonstration exceeded $270 million over about 2 years. We maintain that including administrative costs in its assessments will help HHS ensure that demonstrations are budget neutral. Regarding our third recommendation to assess and respond to risks of providing federal funds for costs to administer work requirements that are not allowable, HHS commented that (1) all states’ requests for federal Medicaid funding are subject to the same federal regulations and requirements; (2) the expenditures reported by states to GAO had not been reviewed against federal requirements or certified by states to be accurate and permissible; and (3) HHS believes its existing approach is appropriate for the low level of risk that administrative expenditures represent. Our findings indicate that CMS’s oversight procedures—which are designed to prevent state spending on costs that do not meet federal requirements—have vulnerabilities, particularly given the types of administrative activities associated with work requirements. Four of the five states we reviewed were planning to seek federal funds for costs (1) that did not appear allowable, or (2) at higher matching rates than appear appropriate, and three states succeeded in gaining CMS approval to do so. We agree with HHS that CMS may also identify inappropriate expenditures during its reviews of state-reported expenditures. However, our past work has identified weaknesses in that review process. In 2018, we reported that CMS officials indicated that resource constraints have limited the agency’s ability to target risk during such reviews, potentially allowing errors to go undetected. Finally, the basis for HHS’s conclusion that its current approach is appropriate for the risks posed by these administrative expenditures is unclear. As we note in our report, CMS officials told us that they had not assessed whether current procedures sufficiently address risks posed by administrative costs for work requirements and had no plans to do so. We maintain that assessing these risks of providing federal funds for costs that are not allowable and improving oversight, as warranted, would help HHS to ensure the integrity of the Medicaid program. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services, the appropriate congressional committees, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7144 or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix III. Eight of the nine states that received approval for work requirements, as of May 2019, also received approval under their demonstrations for other beneficiary requirements, such as requiring beneficiaries to have expenditure accounts. Some of these beneficiary requirements preceded work requirements, while others were newly introduced with the work requirements. For example, Kentucky was developing and implementing work requirements at the same time as other beneficiary requirements, such as the requirement for beneficiaries to have two expenditure accounts and make premium payments. (See table 5.) In addition to the contact named above, Susan Barnidge (Assistant Director), Russell Voth (Analyst in Charge), Linda McIver, and Matt Nattinger made key contributions to this report. Also contributing were Giselle Hicks, Drew Long, Ethiene Salgado-Rodriguez, and Emily Wilson Schwark. Medicaid Demonstrations: Approvals of Major Changes Need Increased Transparency. GAO-19-315. Washington, D.C.: April 17, 2019. Medicaid: CMS Needs to Better Target Risks to Improve Oversight of Expenditures. GAO-18-564. Washington, D.C.: August 6, 2018. Medicaid Demonstrations: Evaluations Yielded Limited Results, Underscoring Need for Changes to Federal Policies and Procedures. GAO-18-220. Washington, D.C.: January 19, 2018. Medicaid Demonstrations: Federal Action Needed to Improve Oversight of Spending. GAO-17-312. Washington, D.C.: April 3, 2017. Medicaid: Federal Funds Aid Eligibility IT System Changes, but Implementation Challenges Persist. GAO-15-169. Washington, D.C.: December 12, 2014. Medicaid Demonstration Waivers: Approval Process Raises Cost Concerns and Lacks Transparency. GAO-13-384. Washington, D.C.: June 25, 2013. Medicaid Demonstration Waivers: Recent HHS Approvals Continue to Raise Cost and Oversight Concerns. GAO-08-87. Washington, D.C.: January 31, 2008.", "summary": "Section 1115 demonstrations are a significant component of Medicaid spending and affect the care of millions of low-income and medically needy individuals. In 2018, CMS announced a new policy allowing states to test work requirements under demonstrations and soon after began approving such demonstrations. Implementing work requirements can involve various administrative activities, not all of which are eligible for federal funds. GAO was asked to examine the administrative costs of demonstrations with work requirements. Among other things, this report examines (1) states' estimates of costs of administering work requirements in selected states, and (2) CMS's oversight of these costs. GAO examined the costs of administering work requirements in the first five states with approved demonstrations. GAO also reviewed documentation for these states' demonstrations, and interviewed state and federal Medicaid officials. Additionally, GAO assessed CMS's policies and procedures against federal internal control standards. Medicaid demonstrations enable states to test new approaches to provide Medicaid coverage and services. Since January 2018, the Centers for Medicare & Medicaid Services (CMS) has approved nine states' demonstrations that require beneficiaries to work or participate in other activities, such as training, in order to maintain Medicaid eligibility. The first five states that received CMS approval for work requirements reported a range of administrative activities to implement these requirements. These five states provided GAO with estimates of their demonstrations' administrative costs, which varied, ranging from under $10 million to over $250 million. Factors such as differences in changes to information technology systems and numbers of beneficiaries subject to the requirements may have contributed to the variation. The estimates do not include all costs, such as ongoing costs states expect to incur throughout the demonstration. GAO found weaknesses in CMS's oversight of the administrative costs of demonstrations with work requirements. No consideration of administrative costs during approval. GAO found that CMS does not require states to provide projections of administrative costs when requesting demonstration approval. Thus, the cost of administering demonstrations, including those with work requirements, is not transparent to the public or included in CMS's assessments of whether a demonstration is budget neutral—that is, that federal spending will be no higher under the demonstration than it would have been without it. Current procedures may be insufficient to ensure that costs are allowable and matched at the correct rate. GAO found that three of the five states received CMS approval for federal funds—in one case, tens of millions of dollars—for administrative costs that did not appear allowable or at higher matching rates than appeared appropriate per CMS guidance. The agency has not assessed the sufficiency of its procedures for overseeing administrative costs since it began approving demonstrations with work requirements. GAO makes three recommendations, including that CMS (1) require states to submit projections of administrative costs with demonstration proposals, and (2) assess risks of providing federal funds that are not allowable to administer work requirements and improve oversight procedures, as warranted. CMS did not concur with the recommendations and stated that its procedures are sufficient given the level of risk. GAO maintains that the recommendations are warranted as discussed in this report.", "document_type": "gao"}
{"report": "We previously reported that the Army began its modernization efforts— defined as efforts to enhance its capabilities and upgrade its weapon systems—in the fall of 2017. As a part of this effort, the Army identified six modernization priorities. 1. Long-Range Precision Fires— focused on improving the targeting, range, and lethality of, among other things, artillery and rockets. 2. Next Generation Combat Vehicle—focused on developing manned and unmanned combat vehicles with updated firepower, protection, mobility, and power generation. 3. Future Vertical Lift— focused on developing manned and unmanned aircraft capable of attack, lift, and reconnaissance missions. 4. Army Network— focused on developing a mobile system of hardware, software, and infrastructure for reliable and secure communications. 5. Air and Missile Defense—focused on improving capabilities for protection against modern and advanced air and missile threats. 6. Soldier Lethality—focused on improving capabilities, equipment, and training for all fundamentals of combat including shooting, moving, communicating, protecting, and sustaining combat operations. We also reported that, to fund these priorities, in 2017 the Army realigned over $1 billion in science and technology funding away from efforts that it determined did not align with these priorities. The Army subsequently announced plans to spend an additional $7.5 billion on these priorities over the next 5 years. Army Futures Command was formed less than a year ago and has not finalized its structure. The Army established the Army Futures Command in June 2018 to consolidate its modernization efforts under one entity and it began initial operations in July 2018. Army Futures Command selected Austin, Texas, as its headquarters location and began to integrate and align resources and personnel. The new command headquarters includes a number of administrative and functional offices that report directly to it, not all of which are co-located with the command in Austin. Specifically: Administrative offices are responsible for providing contracting support, legal support, and small business engagement support to headquarters. These offices are located in Austin, Texas. Army Applications Laboratory is responsible for coordinating outreach to businesses, including small businesses, for headquarters. The Army Applications Laboratory is located in Austin, Texas. Cross-functional teams are the eight teams responsible for identifying capability needs and developing requirements associated with the Army’s six priorities. The teams are located in different parts of the country in areas relevant to their capability focus. Medical Research and Development Command is responsible for seeking and developing new medical technologies for use by the Army. This command is in the process of transferring from Army Medical Research and Materiel Command and is located at Fort Detrick, Maryland. In addition to these organizations, the command has three major subordinate components, comprised of several existing requirements and technology development organizations. Specifically: Futures and Concepts Center is responsible for identifying and prioritizing capability and development needs and opportunities. This organization subsumed the Army Capabilities Integration Center— formerly part of Army Training and Doctrine Command—on December 7, 2018 and is located at Fort Eustis, Virginia. Combat Capabilities Development Command is responsible for conceptualizing and developing solutions for identified needs and opportunities. This organization subsumed the Research, Development, and Engineering Command—formerly a part of Army Materiel Command—on February 3, 2019 and is located at Aberdeen, Maryland. Combat Systems Directorate is responsible for refining, engineering, and producing new capabilities. The directorate is to communicate with the program executive offices and program management offices reporting to the Assistant Secretary of the Army for Acquisition, Logistics, and Technology. The command is in the process of establishing Combat Systems Directorate in Austin, Texas. Army Futures Command is expected to become fully operational in July 2019, when its headquarters and its subordinate components are fully staffed. Locations for components of the new command are shown in figure 1. According to Army Futures Command officials, as part of their modernization efforts, they plan to coordinate with other existing Army organizations. These include the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology—the civilian authority responsible for the overall supervision of acquisition and contracting for the Army. They also plan to coordinate with Army Contracting Command, which is the principle buying agent and provider of contracting support for the Army and operates within Army Materiel Command. As we previously stated, others have reported that small businesses are a vital part of the defense industrial base and engaging with them can produce innovative capabilities and emerging technologies to support the warfighter. For the purposes of this report, engagement with small business is defined as a range of activities including: initial outreach to small businesses to identify companies that may have useful information or ideas, information sharing on the Army’s capability needs, and formal engagement including processes to enter into business relationships, including contracts and other arrangements. The Small Business Act requires federal agencies to establish annual goals that provide small businesses with contracting opportunities to the maximum extent practicable. Pursuant to the Act, the Small Business Administration negotiates annual small business goals with federal agencies, including the Department of Defense. A portion of the overall goals for the Department of Defense is assigned to the various military components— including the Army—that have contracting authority. The Army Office of Small Business Programs, responsible for enhancing Army contracting opportunities for small businesses, then assigns portions of the Army’s goal to its four major commands with contracting authority: Army Materiel Command, Army Medical Command, Army Corps of Engineers, and the National Guard Bureau. Army Materiel Command is the primary command responsible for the execution and oversight of contracts for Army Futures Command. Historically, the Army has engaged with small businesses in a variety of ways, including awarding contracts for various goods and services that support the warfighter. Federal contracts, including those awarded by the Army, are tracked in the Federal Procurement Data System-Next Generation database. Using data provided by the Army from this database, we identified over 4,500 contracts awarded to small businesses for research and development efforts in the 5 years prior to the establishment of Army Futures Command—fiscal years 2013 through 2017. The number of contracts awarded during this time period is summarized in table 1. We identified almost $2.3 billion in obligations to small businesses for research and development from fiscal years 2013 through 2017, or about half of the total amount the Army obligated for all research and development contracts. The obligations for these Army contracts awarded to small businesses for research and development are summarized in table 2. These contract obligations for research and development went to 1,815 small businesses throughout the United States from fiscal years 2013 through 2017. Figure 2 shows this information for each state as well as the District of Columbia and Puerto Rico. About half of the Army contract awards and obligations to small businesses for research and development from fiscal years 2013 through 2017 supported two organizations—Research, Development, and Engineering Command and Medical Research and Materiel Command— which have transitioned, or are in the process of transitioning, to Army Futures Command. To support research and development efforts for these two organizations, the Army awarded 2,948 out of a total 4,514 small business contracts, and obligated about $1.3 billion out of $2.3 billion from fiscal years 2013 through 2017. In addition to the contracts discussed above, the Army can use other arrangements to engage with small businesses. These other arrangements include: agreements using other transaction authority for research and development activities and developing prototypes; financial assistance mechanisms including grants—which are used when the principal purpose of the relationship is to transfer a thing of value to the recipient to carry out a public purpose authorized by law, and substantial involvement by the agency is not expected—and cooperative agreements—which are also used to transfer a thing of value to carry out a public purpose, but where substantial involvement by the agency is expected; and cooperative research and development agreements under which the government and nonfederal partners may share resources and increase the commercialization of federally developed technology. Unlike contracts, the Federal Procurement Data System-Next Generation database cannot be used to quantify engagement with small businesses using these other arrangements. For example, the financial assistance mechanisms, as well as cooperative research and development agreements, are not generally tracked in the Federal Procurement Data System-Next Generation database. In addition, while it is the Department of Defense’s policy to report the use of other transaction authority for prototype projects in the Federal Procurement Data System- Next Generation, the data for this reporting does not distinguish business size. As a result, it cannot be used to quantify the Army’s engagement with small businesses under this arrangement. The Army conducted several analyses related to its modernization efforts, including those directly focused on the creation of Army Futures Command. We identified the following key analyses the Army used to support its modernization efforts: In October 2017, Army reviewed its science and technology portfolio and determined which investments contributed to the Army’s modernization priorities and which might be curtailed or eliminated to realign funding. According to Army officials, this review was focused on identifying solutions to known capability needs, not on how small businesses would be affected by the realignment of funds. In early 2018, Army analyzed several options for the roles, responsibilities, staffing, and organizational structure for the proposed Army Futures Command. This analysis did not include an assessment of how small business would be affected by its establishment. In April 2018, Army completed a report on its modernization strategy as mandated by the Congress. The report focused on warfighting challenges, risks, costs, and acquisition timelines for fielding future capabilities. It also included analyses of near-peer competitors, operational requirements, strategic portfolio analyses, and capability gaps. It did not include information on what role, if any, small businesses would have in developing or supplying the means to close capability gaps. Multiple Army officials explained that they did not specifically analyze the effect of modernization on small business as they anticipated continuing their current level of engagement with these entities and perhaps increasing it. Further, senior Army Futures Command officials stated that they consider engagement with small businesses to be critical to their modernization efforts as well as a key aspect of their mission. They also noted that the command’s headquarters location in Austin, Texas was chosen, in part, because of its close proximity to science, technology, and engineering talent and small business start-ups that can provide innovative solutions. Senior Army Futures Command officials told us they intend to continue the small business engagement efforts undertaken by components being integrated into the new command. Command officials stated that organizations transitioning to Army Futures Command will continue engaging with small businesses as they have in the past. For example, organizations transitioning to Army Futures Command awarded about $1.3 billion to hundreds of small businesses from fiscal years 2013 through 2017. In addition, prior to transitioning to the new command, the Combat Capabilities Development Command Army Research Laboratory and the Medical Research and Materiel Command participated in outreach events, such as industry days and conferences focused on small businesses, to network with and identify small businesses for potential future awards. According to officials from these commands, these efforts have historically led to business relationships using a variety of arrangements, including contracts, agreements using other transaction authority, grants, cooperative agreements, and cooperative research and development agreements. Officials from Army Futures Command stated that the past efforts of its components aimed at small business engagement would continue. The command also plans to continue utilizing the Small Business Innovation Research and Small Business Technology Transfer programs to award contracts, grants, and cooperative agreements to small businesses. Army Futures Command also intends to use their cross-functional teams to enhance small business engagement. These teams identify capability needs and requirements derived from the Army’s six modernization priorities. Officials told us that these cross-functional team efforts can serve as a way to focus small business engagement. For example, the cross-functional teams develop problem statements that describe the capabilities currently needed by the warfighter for a specific activity, such as a need for better communications and networking equipment. These problem statements can then be shared with small businesses as part of outreach efforts—such as challenge competitions or industry days—and lead to discussions about potential solutions. In addition, Army Futures Command officials told us the command intends to enhance its small business engagement through several initiatives—some of which are underway and some of which are in development. Officials told us they were not certain how many of these initiatives have led to specific contracts or awards, but noted that they had in some cases. Command officials told us that they have undertaken four initiatives to engage with small businesses for research and development: Army Research Laboratory Open Campus 2.0 is based on an existing Army Research Laboratory program to transition scientific research from universities to Army technology concepts. It will work with the research communities within universities to develop these concepts and potentially commercialize them. This program is currently directed by the office of the Deputy Commanding General, which is located at the command’s headquarters in Austin, Texas. Army Capability Accelerator is a new initiative that engages small businesses in developing and maturing concepts into prototypes and validating early-stage technologies. The accelerator is managed by the Army Applications Laboratory, which is located with the command’s headquarters in Austin, Texas. It also provides the support and infrastructure needed to accelerate small businesses’ concepts into solutions for warfighter capability gaps. Army Capability Accelerator has offices in Austin, Texas, and New York City, New York, and Army Futures Command intends to establish additional offices across the country. Army Capability Accelerator has hosted or co-hosted events allowing small businesses to demonstrate their capabilities and engage with the command. For example, the Austin office hosted a challenge competition in September 2018 to develop a solution for countering a drone threat. Similarly, according to officials, the New York City office hosted a challenge competition in December 2018 where the command funded awards to small businesses for positioning, navigation, and timing capabilities. Army Strategic Capital is a proposed restructuring of a prior initiative intended to leverage venture capital to offset Army development costs through co-investment with existing Army Small Business Innovation Research and Small Business Technology Transfer programs. According to Army Futures Command officials, this initiative will be managed by the office of the Deputy Commanding General in Austin, Texas, but is in the planning stages and could involve legislative or policy changes to clarify or augment the authorities of the command. Halo is a new initiative intended to accelerate the adaptation and transition of commercial and startup-derived products to Army applications and programs. This initiative involves more mature technologies and focuses on the acceleration and integration of prototypes. Army officials stated that Army Applications Laboratory will manage this initiative and that it is under development. These four initiatives are described further in Figure 3 below: Army officials noted that many of their new initiatives address concerns raised by small businesses in working with the government, including the Army, on research and development activities. According to a representative involved with the capability accelerator office in Austin— which involves a private company that works with small businesses to facilitate opportunities both across the private sector and, now, with the Army—small businesses have expressed concerns about working with the government. Specifically, these representatives identified concerns related to barriers to entry, length of time to reach an award, and the complexity of the government contracting process, among others. Similarly, representatives from the capability accelerator office in New York City stated that the Army needs a way to increase its visibility to small businesses in order to attract the interest of these companies. Army Futures Command officials acknowledged these concerns and said that they are developing efforts to alleviate or overcome them. For example, as part of its Halo initiative, the Army created a program intended to guide small businesses through the government contracting processes. In addition, Halo also plans to use business arrangements designed to decrease the time between initial contact with small businesses and the award of contracts or other agreements. In its initial efforts to enhance engagement with small businesses, Army Futures Command did not fully leverage the expertise of other Army organizations that previously facilitated small business engagement. Various Army officials have identified several early instances in which the command took steps to engage with small businesses without consulting other Army offices with relevant expertise. For example: Army Office of Small Business Programs—According to Army Office of Small Business Programs officials, the command did not consult with them (1) before engaging with small businesses in Texas for research and development efforts; (2) when establishing its small business office, which is still ongoing; and (3) before announcing hiring positions for that office. Army Office of Small Business Programs is positioned to provide direct support to various commands on small business activities. In particular, we previously reported that small business offices are responsible for assisting agencies in increasing small business participation and provide advice on acquisition strategies and market research. Subordinate Commands—According to Army officials, Army Futures Command has not fully engaged the organizations that transitioned, or are transitioning to, the command in terms of small business research and development efforts. Combat Capabilities Development Command and its subordinate command Army Research Laboratory, these organizations have years of experience working with small businesses on research and development efforts. Army Research Laboratory is the Army lead for the Small Business Technology Transfer program, and participates in the Small Business Innovation Research program along with other Combat Capabilities Development Command organizations; both of which are designed to stimulate technological innovation. Combat Capabilities Development Command officials stated they have had limited involvement with Army Futures Command headquarters on small business research and development issues. In addition, Medical Research and Development Command officials stated that Army Futures Command headquarters has not interacted with them on small business engagement beyond planning for the organization’s transfer to Army Futures Command. Historically, Medical Research and Materiel Command participated in the Small Business Technology Transfer and the Small Business Innovation Research programs and conducted outreach to small businesses through various events, such as industry days and conferences focused on small businesses. Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology—We reported in January 2019 that it was not yet clear how Army Futures Command will coordinate its responsibilities with the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology. The office conducts outreach to small businesses, sponsors challenge competitions, and promotes small business participation in Army acquisitions. More recently, according to Army officials, the command is seeking to improve and formalize coordination roles and responsibilities related to research and development within and outside the command. For example, Although a formalized agreement between the command and Army Office of Small Business Programs does not yet exist, the command is now actively consulting with this office. According to Army small business officials, the command has been familiarizing small business staff with their office and its small business research and development efforts. The command has also been establishing its small business office with support from Army Office of Small Business Programs. In addition, Army small business officials stated that the office is assessing the command’s small business needs to determine how to allocate workforce resources. However, the effort has not been finalized. The command is also working to formalize small business relationships within and among its components. As part of this, the command established a Directorate of Operations at headquarters to facilitate integration of command activities across components, which would include those related to small business research and development. However, the command has not yet assigned a permanent director for the new directorate. According to Army Futures Command officials, as well as Army documents, the command will continue to develop coordination procedures related to research and development with the Assistant Secretary of the Army for Acquisition, Logistics, and Technology. The command is also working with the Assistant Secretary’s office on a challenge competition that aims to facilitate small business engagement with the Army and spur innovative technology. Army Futures Command does not have its own procurement authority, so the Army Contracting Command will provide it with contracting support. This support includes making awards to small businesses on behalf of Army Futures Command. Army Contracting Command officials told us they are also supporting the establishment of an Army Futures Command contracting office that would advise on contracting needs. For example, they sent temporary support staff to the headquarters of the new command and are helping with recruitment efforts for permanent personnel. Army Futures Command officials told us they had not prioritized coordinating with other Army organizations that have small business expertise because the command and its officials had other, more pressing priorities, such as establishing the command and engaging directly with small businesses as quickly as possible. Federal internal control standards state that during the establishment of an organizational structure management should consider how organizations across and outside of it interact in order to fulfill their overall responsibilities. This includes establishing reporting lines and roles and responsibilities within and outside the organization as they relate to small business engagement. With those coordination roles and responsibilities established, organizations are better able to communicate the quality information necessary to fulfill their overall small business engagement responsibilities. By taking actions to formally coordinate with and leverage other Army organizations’ expertise, such as coordinating outreach events, Army Futures Command could improve its opportunities to engage with small businesses and obtain access to the innovative research and development they could provide. Further, if the command does not formalize coordination roles and responsibilities, it risks potentially duplicating small business-related work and creating overlap and fragmentation. As previously noted, Army Futures Command stated it is continuing the efforts of its subordinate commands to engage with small businesses and is taking additional steps to enhance engagement. However, command officials told us they do not systematically track the number and timing of outreach events, the number of participants at these events, and the extent to which these outreach efforts result in business arrangements such as contracts. As a result, Army Futures Command officials were uncertain of how often the command—across all of its components—was engaging with small businesses for research and development efforts. For example, Army Applications Laboratory officials were not able to identify the number and timing of challenge competitions the command has hosted or is planning to host in the future. Some organizations that have transitioned to Army Futures Command, such as Combat Capabilities Development Command, continue to track small business engagement activities for their component. However, Combat Capabilities Development Command officials told us that they were unsure if this data will be tracked at Army Futures Command headquarters. According to Army Futures Command officials, the command has not prioritized tracking small business activities because it focused instead on establishing the command and engaging with small businesses as quickly as possible to identify innovative solutions. Officials did not provide a specific plan for tracking such engagement. According to Federal Internal Control Standards, management should establish monitoring activities for its internal control system and evaluate the results to remediate any identified challenge on a timely basis. Further, management should use quality information from reliable sources in a timely manner to achieve the objectives of the command. By tracking its small business engagement activities, Army Futures Command would have a more comprehensive understanding of the various efforts underway across the command. This would provide opportunities to examine its overall small business engagement efforts. Tracking such information would also allow the command to make adjustments to those efforts to ensure it obtains the innovative input from small businesses the command has stated it needs to achieve its modernization goals. Tracking small business engagement across the command components could also help reduce inefficiencies including overlap, fragmentation, and duplication of its small business engagement efforts. While Army Futures Command officials told us they consider small businesses to be critical to their success and they have taken steps to engage with small businesses, the command has not yet established measures for evaluating the effectiveness of that engagement across the command nor has it developed a plan to systematically assess these efforts. Command officials told us that they are in the process of considering various measures to do so, but they have not yet determined which specific measures, if any, they will use. There is also no time frame to establish these measures. According to Army Futures Command officials, they would consider small business engagement successful if, for example, a Small Business Innovation Research award resulted in an innovation or a technology that was later transitioned to a weapon systems program or a product that would further support an Army weapon systems program. Command officials told us they have not formalized and implemented these measures because the command and its officials have prioritized focusing on establishing the new command. Components subsumed by Army Futures Command have historically used performance measures to assess their small business engagement. For example, officials from Combat Capabilities Development Command told us that they previously used several outcome-based measures, including the number of Small Business Innovation Research products incorporated into fielded Army acquisition programs, contracts awarded to small businesses, and total dollars obligated to small businesses for research and development. This previously collected information was then provided to management in various small business offices in semiannual reports. Officials told us they have continued to monitor this information since the transition to Army Futures Command. Officials from Medical Research and Development Command also reported that they have performance measures and that they use these measures to assess the success of their small business engagement. For example, they said that they develop summary reports after outreach events with small businesses. These reports describe the event, outcomes, and how participation at the event enhanced utilization of small businesses for research and development efforts. The reports are also used internally as market research for future opportunities. Internal control standards call for management to use quality information to make informed decisions and to define objectives in specific and measurable terms so that performance toward achieving those objectives can be assessed. Management should also determine whether performance measures for the objectives are appropriate for evaluating performance. Once performance measures are defined, management should then establish and operate monitoring activities that allow them to evaluate the effectiveness of the internal control system. Establishing performance measures and developing a plan to capture and monitor information on its small business engagement would help ensure Army Futures Command is not missing opportunities to make informed management and investment decisions for its research and development efforts. Establishing these measures and a plan to monitor how the command assesses small business engagement would also help it to evaluate the overall effectiveness of its small business engagement in providing support to the warfighter and identifying which small business efforts have been most effective. The establishment of Army Futures Command represents a considerable change to how the Army develops new weapon systems and prepares for the future. While Army Futures Command is still finalizing how it will operate, it is already engaging with small businesses in various ways. However, the command could better manage these efforts. In particular, formalizing coordination roles and responsibilities with Army organizations that already have small business experience, such as the Army Office of Small Business Programs, would allow the command to leverage additional expertise as it pertains to small business engagement for research and development. In addition, Army Futures Command does not systematically track engagement across the command. By tracking this activity, the command could more effectively oversee and manage overall small business engagement. Finally, while Army Futures Command officials consider engaging with small businesses critical to the success of modernization, it has not yet developed performance measures to assess the effectiveness of its small business engagement nor has it developed a plan for systematically assessing its efforts. Establishing performance measures, and using them to assess small business engagement, would provide the command with information to evaluate, and potentially enhance, its engagement with small businesses to help accomplish its research and development efforts. We are making three recommendations to the Secretary of the Army. The Secretary of the Army should direct the Commanding General of Army Futures Command to formalize coordination roles and responsibilities for small business engagement in support of research and development with relevant Army entities. (Recommendation 1) The Secretary of the Army should direct the Commanding General of Army Futures Command to systematically track its small business engagement in support of research and development across its subordinate organizations. (Recommendation 2) The Secretary of the Army should direct the Commanding General of Army Futures Command, in coordination with relevant Army entities, to establish command-wide performance measures and develop a plan to use these measures to systematically assess the effectiveness of small business engagement in support of research and development. (Recommendation 3) We provided a draft of this report to the Army for review and comment. In its written comments, reproduced in appendix II, the Army concurred with all three of our recommendations. The Army also provided technical comments which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Acting Secretary of Defense; and the Acting Secretary of the Army. In addition, the report is available at no charge on the GAO Website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or LudwigsonJ@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. You asked us to examine how small businesses that support research and development efforts could be affected by the establishment of Army Futures Command. This report (1) describes what analyses, if any, the Army conducted to determine the effect of its modernization initiatives on small businesses; (2) describes how Army Futures Command is engaging with small businesses to support research and development efforts and assesses how it is coordinating with other relevant Army organizations; and (3) assesses how Army Futures Command plans to track and measure the performance of its engagement with small businesses to support research and development efforts. We analyzed research and development contract awards and obligations made during fiscal years 2013 through 2017 for the Army. The data are presented in the background as it is prior to the establishment of Army Futures Command in 2018. For the number of contracts, we used the number of new base contract awards for research and development. For the obligations, we analyzed both newly awarded base contracts and associated orders under indefinite-delivery contracts since funds would be obligated at the order level. The obligations in this analysis include only those made during the fiscal year the contract was awarded. To identify and analyze contracts awarded during that time period, we requested data in the Federal Procurement Data System-Next Generation database from the Army. The Army used the product and service codes for research and development to extract the relevant data for fiscal years 2013 through 2017. The data also included contracts awarded through the Small Business Innovation Research and Small Business Technology Transfer programs for that time period and business size and registered location. We excluded foreign military sales obligations. We did not include subcontractor data. We obtained the funding codes for organizations that are transitioning to Army Futures Command, which includes the former Army Research, Development, and Engineering Command and the Army Medical Research and Materiel Command, portions of which are transitioning to the new command. To determine the proportion of contracts and associated obligations that supported these organizations, we used their funding codes to identify the number of contracts and associated obligations during our selected time period. To assess the reliability of the Federal Procurement Data System-Next Generation data, we electronically tested for missing data, outliers, and inconsistent coding. Based on these steps, we determined the data were sufficiently reliable for identifying and analyzing Army contracts awarded from fiscal years 2013 through 2017 for research and development efforts and their obligations. We obtained data on grants, cooperative agreements, and other types of agreements using the Defense Assistance Awards Data System. We conducted initial analysis on the data and discussed reliability and validity of the data with agency officials. As a result, we determined that the data were not sufficiently reliable for the purpose of this engagement and we excluded them from our review. To describe analyses the Army conducted on the potential effect modernization efforts could have on small businesses, we collected and reviewed available studies and analyses the Army conducted. We reviewed the Army’s science and technology portfolio analysis, studies related to the establishment and future organizational structure of Army Futures Command, and the Army’s modernization strategy to determine if the Army analyzed how small businesses could be affected. To describe how Army Futures Command is engaging with small businesses to support research and development efforts, we reviewed policies, procedures, and guidance from the Department of Defense, Department of the Army, Army Futures Command, and other relevant Army organizations on small business engagement. We also reviewed relevant sections of the Federal Acquisition Regulation, as well as Defense and Army supplements to the Federal Acquisition Regulation, to understand the framework for small business participation in support of research and development efforts. We also reviewed relevant statutes, regulations, and policies regarding research and development and small business programs. We collected and analyzed documentation on how Army Futures Command engages with small businesses, including its roles and responsibilities, outreach efforts, and award documentation as well as those of its subordinate components. To assess how Army Futures Command coordinates with other Army organizations, we reviewed policy documentation, such as a memorandum of understanding on coordinating contract support and for small business engagement, in addition to operational orders outlining roles and responsibilities. We assessed the information we collected against Federal Standards for Internal Control related to organizational structure, reporting lines, roles and responsibilities, and using quality information. To assess how Army Futures Command plans to track and measure its engagement with small businesses, we reviewed policies from the Department of Defense and Army on engagement with small businesses. To understand how Army Futures Command plans to track its small business engagement, we reviewed policy documentation from the command, operational orders, briefs and memoranda. We also reviewed documentation on how organizations tracked this data prior to transitioning to Army Futures Command. In order to assess any performance measures Army Futures Command plans to use to evaluate its small business engagement, we reviewed available documentation on the establishment of the command. We also reviewed documentation from organizations transitioning to Army Futures Command to determine how these organizations previously monitored and evaluated their small business engagement. In addition, we assessed the information we collected against Federal Standards for Internal Control related to establishing monitoring activities, using quality information, defining objectives, and evaluating results. To more completely understand the small business engagement efforts of the new command, we interviewed officials from various Army offices, including the Office of the Under Secretary of the Army, Army Futures Command, organizations transitioning to the new command, Army Office of Small Business Programs, members of the Office of the Assistant Secretary of the Army for Acquisition, Logistics, and Technology, and Army Contracting Command. We also met with two private sector entities the Army has coordinated with for outreach to small businesses. These entities have experience in engaging small businesses both in the private sector and for government programs and discussed with us the concerns and challenges small businesses have in working with the government. These views are not generalizable but provide perspective on matters relevant to the Army’s efforts to engage with small businesses. We conducted this performance audit from September 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Jon Ludwigson at (202) 512-4841 or LudwigsonJ@gao.gov. In addition to the contact named above, J. Kristopher Keener (Assistant Director), Andrea C. Evans (Analyst-in-Charge), Hilary Benedict, Emily Bond, Frederick K. Childers, Matthew T. Crosby, Lori A. Fields, Julia Kennon, Jean McSween, Monique Nasrallah, Anh Nguyen, Kevin O’Neill, William Shear, and Anne Stevens made contributions to this report.", "summary": "The Army is modernizing its weapon systems to improve its ability to face near-peer adversaries. To consolidate and oversee these efforts, the Army established Army Futures Command. The command plans to work with small businesses to develop innovative capabilities through research and development activities. GAO was asked how the establishment of Army Futures Command could affect small businesses that support research and development efforts. This report examines, among other objectives, how the command (1) engages with small businesses and coordinates with other Army organizations and (2) plans to track and measure the effectiveness of that engagement. GAO reviewed the Army's internal analyses of its own modernization efforts; reviewed and analyzed policies and procedures on the command's small business engagement; and interviewed Army officials engaged in modernization efforts as well as two private companies selected because they facilitate Army's work with small businesses. Army Futures Command, established in June 2018 by combining several existing Army organizations and expected to be fully operational in July 2019, is engaging with small businesses. The command considers small business engagement critical to its success and officials reported it intends to continue the engagement activities of the organizations that are moving into it such as conducting outreach and awarding contracts. The Army recognizes the importance of small businesses and has awarded $2.3 billion to hundreds of small businesses from fiscal year 2013 through 2017. The command is also taking initial steps to enhance small business engagement (see figure). Army officials noted that these new efforts are intended to address concerns raised by small businesses in working with the government, such as delays between initial outreach and entering into contracts. However, the command has not fully leveraged other Army organizations that work with small businesses, such as the Army Office of Small Business Programs. According to command officials, they prioritized setting up the command structure and engaging with small businesses quickly, instead of focusing on coordination. The command has recently been working to improve coordination, but has not formally coordinated such as by establishing agreements with other Army organizations that have small business expertise. Doing so would help Army Futures Command leverage this past experience and avoid missing opportunities to engage with these companies and access innovative research and development. The command does not track how frequently or in what ways it engages with small businesses for research and development across all command components. Similarly, command officials stated they have considered performance measures to assess the effectiveness of their engagement efforts, but have not yet developed command-wide measures or a plan to assess effectiveness. Tracking and measuring engagement would help ensure the command obtains quality information that may help the Army evaluate, and potentially enhance, its small business engagement GAO is making three recommendations including that the Army Futures Command coordinate with relevant Army organizations on small business engagement efforts for research and development; systematically track its small business engagement; and develop command-wide performance measures and a plan to use them to assess the effectiveness of its small business engagement. The Army concurred with all three recommendations.", "document_type": "gao"}
{"report": "The national pipeline system consists of more than 2.7 million miles of networked pipelines transporting natural gas, oil, and other hazardous liquids. Natural gas and hazardous liquid pipelines—primarily buried underground in the continental United States—run under remote and open terrain, as well as densely-populated areas. There are three main types of pipelines based on the types of materials transported: Hazardous liquid: About 216,000 miles of hazardous liquid pipeline transport crude oil, diesel fuel, gasoline, jet fuel, anhydrous ammonia, and carbon dioxide. Natural gas transmission and storage: About 319,000 miles of pipeline—mostly interstate—transport natural gas from sources to communities. Natural gas distribution: About 2.2 million miles of pipeline—mostly intrastate—transport natural gas from transmission sites to consumers. Figure 1 depicts the network of hazardous liquid and natural gas transmission pipelines in the United States. More than 3,000 pipeline companies operate the nation’s pipeline systems, which can traverse multiple states and the U.S. borders with Canada and Mexico. Many pipeline systems are comprised of the pipelines themselves, as well as a variety of facilities, such as storage tanks, compressor stations, and control centers. Most pipeline systems are monitored through automated industrial control systems or Supervisory Control and Data Acquisition (SCADA) systems using remote sensors, signals, and preprogramed parameters to activate and deactivate valves and pumps to maintain flows within established tolerance levels. Pipeline accidents can occur from a variety of causes, including third- party excavation, corrosion, mechanical failure, control system failure, and operator error. Natural forces, such as floods and earthquakes, can also damage pipelines. Although pipeline releases have caused relatively few fatalities, a single pipeline accident can be catastrophic in terms of public safety and environmental damage. Figure 2 shows notable pipeline accidents since September 2010. According to TSA, pipelines are also vulnerable to physical attacks by crude or unsophisticated tactics, such as rudimentary explosives, arson, or equipment sabotage—largely due to their stationary nature, the volatility of transported products, and the dispersed nature of pipeline networks spanning urban and outlying areas. Threats to the nation’s pipeline systems include sabotage by activists, physical attack by terrorists, and cyber attack or intrusion by nations. In October 2016, environmental activists forced the shutdown of five crude oil pipelines in four states: Minnesota, North Dakota, Montana, and Washington State. Further, in January 2019, the Director of National Intelligence stated that China has the ability to launch cyber attacks that have caused localized, temporary disruptive effects on critical infrastructure—such as disruption of a natural gas pipeline for days to weeks—in the United States. Federal policy and public-private plans establish the roles and responsibilities for the protection of critical infrastructure, including pipelines. These policies and public private plans include Presidential Policy Directive /PPD-21 (PPD-21) and the National Infrastructure Protection Plan (NIPP). PPD-21, issued in February 2013, was developed to advance a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure, which includes pipelines. PPD-21 reflects an all-hazards approach to protecting critical infrastructure, by accounting for the protection of critical infrastructure from natural or manmade threats or incidents. Examples of threats or incidents include natural disasters, cyber incidents, industrial accidents, pandemics, acts of terrorism, sabotage, and destructive criminal activity targeting critical infrastructure. PPD-21 also identifies the 16 critical infrastructure sectors and assigns roles and responsibilities for each sector among nine designated federal sector-specific agencies as shown in Figure 3. While PPD-21 identifies the critical infrastructure sectors and assigns responsibility for each sector’s sector-specific agency, the NIPP outlines critical infrastructure stakeholder roles and responsibilities regarding critical security and resilience. The NIPP describes a voluntary partnership model as the primary means of coordinating government and private sector efforts to protect critical infrastructure. As part of the partnership structure, the designated sector-specific agencies serve as the lead coordinators for security programs of their respective sector. For example, DHS and DOT are designated as co-sector-specific agencies for the transportation systems sector, which includes pipelines. Each sector also has a government coordinating council, consisting of representatives from various levels of government, and many have a sector coordinating council (SCC) consisting of owner-operators of these critical assets or members of their respective trade associations. For example, the Transportation Government Coordinating Council has been established, and the Pipeline Modal SCC has also been established to represent pipeline operators. Protecting the nation’s pipeline systems is a responsibility shared by both the federal government and private industry. As a result, several federal departments, agencies, and the private sector have significant roles in pipeline safety and security. The entities primarily responsible for pipeline safety and security are included below. Transportation Security Administration (TSA). TSA has primary oversight responsibility for the physical security and cybersecurity of transmission and distribution pipeline systems. Within TSA, the Policy, Plans, and Engagement’s Pipeline Security Branch is charged with overseeing its pipeline security program. Pursuant to the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/11 Commission Act), TSA’s Pipeline Security Branch issued voluntary Pipeline Security Guidelines in 2011, and released revised guidelines in March 2018. Further, in accordance with the 9/11 Commission Act, TSA’s Pipeline Security Branch also identifies the top 100 critical pipeline systems in the nation. TSA also ranks the relative risk among these top 100 systems. Additionally, the Pipeline Security Branch is responsible for conducting voluntary security reviews, which assess the extent to which these 100 pipeline systems are following the intent of TSA’s Pipeline Security Guidelines. Pipeline and Hazardous Materials Safety Administration (PHMSA). PHMSA, within DOT, is responsible for regulating the safety of hazardous materials transportation and the safety of pipeline systems, some aspects of which may relate to pipeline security. PHMSA develops regulations for domestic interstate and intrastate natural gas and hazardous liquid pipelines. Its regulatory programs are focused on ensuring safety in the design, construction, operation, and maintenance of pipelines. Under PHMSA’s pipeline safety program, pipeline operators have primary responsibility for ensuring the integrity of their pipelines. PHMSA and some state pipeline safety offices are responsible for conducting inspections to oversee operators’ compliance with federal pipeline safety regulations and other federal requirements. Inspectors from PHMSA’s five regional offices and states are responsible for inspecting nearly 3,000 companies that operate 2.7 million miles of pipelines. Private sector. Although TSA has primary federal responsibility for overseeing interstate pipeline security, private sector and publicly-owned pipeline operators are responsible for implementing asset-specific protective security measures. As we previously reported, since the September 11th terrorists attacks, operators have increased their attention on security by incorporating security practices and programs into their overall business operations. Pipeline operators’ interests and concerns are primarily represented by five major trade associations—the Interstate Natural Gas Association of America, American Gas Association, American Public Gas Association, American Petroleum Institute (API), and Association of Oil Pipe Lines. According to TSA officials, pipeline operators, and association representatives, these associations have worked closely with the federal government on a variety of pipeline security-related issues, including collaborating on TSA’s voluntary standards and information sharing. The MOU Annex delineates TSA and PHMSA mutually agreed-upon pipeline security roles and responsibilities, consistent with their respective missions, and acknowledges that both agencies benefit by sharing each other’s expertise, among other things. Specifically, the MOU Annex identifies 11 program areas, where TSA and PHMSA agreed to coordinate their respective roles and responsibilities. The first program area for example, calls for both agencies to coordinate efforts to identify critical infrastructure, and to share relevant data and observations found during respective safety inspections and security assessments. Another program area addresses coordination in developing transportation security standards, regulations, guidelines, or directives. The MOU Annex further provides that TSA and PHMSA are to seek early and frequent coordination in developing such standards, regulations, guidelines, or directives. They are also to review the adequacy of existing standards in the private and public sector, and identify any gaps that should be addressed through rulemaking, guidelines, or directives, among other items. For a complete listing of the MOU Annex’s 11 program areas, including TSA and PHMSA roles and responsibilities and agreed-upon actions, see appendix I. TSA and PHMSA have both noted various developments that have occurred since 2006 that may affect their roles and responsibilities related to pipeline security. However, the MOU Annex has not been updated since its inception in 2006 to consider incorporating these changes which includes subsequently issued presidential directives, the establishment of the Cybersecurity Infrastructure and Security Agency (CISA), and distinctions between current TSA and PHMSA current inspection operations. As a result, the Annex is not current and may not fully reflect the agencies’ pipeline safety and security-related activities. For example, Homeland Security Presidential Directive/HSPD-7 (HSPD-7), which is cited as an underlying authority in both the 2004 MOU and 2006 MOU Annex was revoked and replaced by PPD-21 in 2013. According to PPD-21, the directive advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure by, among other things, refining and clarifying critical infrastructure-related functions, roles, and responsibilities across the federal government. PPD- 21 further provides, however, that plans developed pursuant to HSPD-7 shall remain in effect until specifically revoked or superseded. According to TSA and PHMSA officials, statements of Executive Branch policy including presidential directives such as PPD-21 include changes that could impact their pipeline security and safety roles and should be considered in any future revisions to the MOU Annex. Further, PHMSA officials also told us that TSA and PHMSA’s roles and responsibilities in identifying critical infrastructure should be reviewed given the establishment of the CISA in November 2018. CISA, formerly the DHS National Protection and Programs Directorate, is responsible for, among other things, coordinating a national effort to secure and protect against critical infrastructure risks. These responsibilities include coordinating with sector-specific agencies to carry out its cybersecurity and critical infrastructure activities. TSA and PHMSA officials stated that they have closely coordinated in identifying critical infrastructure when responding to past national emergencies. For example, TSA identified and provided PHMSA with information on the pipelines that supplied fuel to specific airports during the hurricane seasons in 2017 and 2018. However, PHMSA officials stated that both TSA and PHMSA should consider reviewing how these types of efforts may need to be coordinated with CISA in the future and whether any adjustments to respective roles and responsibilities in the MOU Annex are needed. In addition, representatives from all of the industry associations that we interviewed stated that the agreement should be revised to consider how the establishment of CISA may impact current TSA and PHMSA pipeline security roles and responsibilities. TSA officials stated that they do not believe that the establishment of CISA impacts TSA’s roles and responsibilities for identifying pipeline critical infrastructure. While CISA may or may not have impacts on TSA and PHMSA’s pipeline security roles, reviewing the MOU Annex in light of new developments, such as the CISA, would allow the TSA and PHMSA to determine whether updates are necessary. TSA and PHMSA officials stated that distinctions in current inspections and enforcement operations necessitate a revision to the MOU Annex. The MOU Annex states that agencies are to explore opportunities for collaboration in inspection and enforcement activities. According to TSA and PHMSA officials, they have since explored the possibility for conducting joint activities and found that distinctions in their respective operating environments and roles and responsibilities do not allow for joint inspection and enforcement activities. For example, PHMSA conducts physical inspections of facilities to assess pipeline operators’ compliance with pipeline safety regulatory requirements and relies on a range of enforcement activities, such as civil penalties to ensure that pipeline operators correct safety violations and prevent safety problems. TSA, however, conducts voluntary security assessments of pipeline’s corporate security programs and critical facilities and relies on pipeline operators’ willingness to participate and implement recommended changes to improve pipeline security. As a result, TSA and PHMSA officials stated that pipeline operators are reluctant to participate in a voluntary assessment that might include PHMSA inspectors because they represent a regulatory agency. TSA, PHMSA and industry association representatives we interviewed agreed that the annex should be updated to accurately reflect current distinctions in the agencies’ roles and responsibilities and their respective operating environments. PHMSA officials stated that they had planned to review the MOU Annex in 2018 to assess current roles and responsibilities and determine whether any updates to the MOU Annex were needed, but efforts were delayed because of competing priorities such as addressing the aftermath of major hurricanes in 2017 and 2018. Specifically, TSA and PHMSA had agreed to an initial list of timeframes for reviewing the MOU Annex and these timeframes called for the agencies to complete the MOU Annex revision in 2018. However, as of March 2019, TSA and PHMSA have yet to complete the review and although both agencies stated that the review is ongoing, neither agency could provide updated timeframes for completion. Furthermore, while the Annex recognizes that TSA and PHMSA may propose agreed-upon amendments or modifications to the agreement, it does not call for regular or periodic reviews to identify whether any updates or revisions are needed and, as appropriate, implemented. TSA and PHMSA officials, as well as the industry association representatives we interviewed all reported that the MOU Annex helped to coordinate pipeline security and safety efforts because: (1) it is a signed written agreement that can be readily consulted; (2) it memorialized respective TSA and PHMSA roles and responsibilities for government leaders and staff at the time; and (3) it can be modified or amended as needed. Standards for Internal Control in the Federal Government states that periodic review of policies, procedures, and related control activities should occur to determine their continued relevance and effectiveness in achieving identified objectives or addressing related risks. In addition, documentation of any changes made as a result of such reviews, such as changes to an entity’s roles and responsibilities or in technology, should occur to ensure that such controls are clear over time as staff change within an organization. Standards for project management state that managing a project involves, among other things, developing a timeline with milestone dates to identify points throughout the project to reassess efforts under way to determine whether project changes are necessary. By developing and implementing mutually agreed upon time frames for reviewing the annex and updating it, as appropriate, TSA and PHMSA could better ensure that the roles and responsibilities for TSA and PHMSA remain current. Additionally, including a provision in the annex for periodically reviewing for needed updates would help ensure the agreement consistently reflects relevant and updated information on TSA and PHMSA’s roles and responsibilities. TSA and PHMSA have communicated their respective pipeline safety and security roles and responsibilities by issuing pipeline security guidance and safety regulations, issuing a joint advisory bulletin, and maintaining informal contacts with pipeline stakeholders when conducting outreach activities, pipeline security assessments, or safety inspections. TSA security guidelines. TSA’s Pipeline Security Branch first issued its voluntary Pipeline Security Guidelines in 2011, and revised them in March 2018. The guidelines include TSA’s recommendations for pipeline industry security practices, such as establishing a corporate security program, conducting security vulnerability assessments, and identifying critical facilities. The guidelines also recommend facility security and cybersecurity measures, which serve as the basis for the pipeline security assessments conducted by TSA’s Pipeline Security Branch. PHMSA regulations. PHMSA’s Office of Pipeline Safety issues and enforces intrastate and interstate regulations covering aspects of pipeline safety, including the design, construction, operation and maintenance, and spill response for hazardous liquid and gas pipeline facilities, including liquefied natural gas facilities. Advisory bulletins. PHMSA also issues advisory bulletins to communicate safety-related conditions to pipeline operators, and can issue advisory bulletins in coordination with TSA to notify pipeline operators of a security incident. Such bulletins may include identifying the affected operators, describing the threat, and providing information on federal resources for assistance. For example, in response to physical intrusions on pipelines and a coordinated campaign by domestic saboteurs, and to remind pipeline operators of the importance of safeguarding and securing their pipelines from physical and cyber intrusion or attack, PHMSA, in coordination with TSA, issued an advisory bulletin in 2016. The bulletin also included a brief discussion of TSA’s and PHMSA’s roles on pipeline safety and security. Forums and routine interactions with operators. TSA and PHMSA officials also reported that they communicate their agencies’ respective roles and responsibilities for pipeline safety and security to stakeholders when conducting general outreach, information sharing efforts, or inspections or assessments. TSA and PHMSA officials noted that these activities provide opportunities for agency officials and pipeline stakeholders to clarify their roles and responsibilities should pipeline operators have questions. Examples of such community outreach activities include attending meetings of the Oil and Natural Gas subsector SCC or the Pipeline Modal SCC, and TSA’s annual International Pipeline Security Forum. TSA officials also said that TSA’s monthly and quarterly unclassified threat briefings provided TSA officials and pipeline stakeholders the opportunity to discuss and clarify their roles and responsibilities. Additionally, TSA produces classified and unclassified threat assessments on physical and cyber threats to pipelines, which according to agency officials can help to clarify TSA’s security role. Finally, TSA and PHMSA officials said that pipeline security assessments and safety inspections and other enforcement activities that the agencies regularly conduct are also opportunities to communicate their roles and responsibilities. For example, TSA officials reported that should an operator ask for assistance regarding a safety issue while TSA staff was conducting a security review, TSA staff would be able to refer the operator to PHMSA to address the issue. Similarly, PHMSA officials stated that inspectors would refer an operator to TSA or its pipeline security guidelines should the operator have questions regarding, for example, what security measures to implement. The representatives of the four pipeline associations we interviewed reported that TSA and PHMSA had clearly communicated their respective roles and responsibilities to pipeline stakeholders. Specifically, all of the association representatives said that their membership understood that TSA is responsible for pipeline security matters and PHMSA is responsible for pipeline safety matters. For example, one industry association representative stated that they had contacted their members to determine whether they were unclear regarding TSA’s and PHMSA’s respective roles and responsibilities and that members reported the roles were clear to them. Further, another association representative reported that the initial security reviews and outreach efforts that TSA conducted after the pipeline security program was created helped pipeline operators to understand that its role was to oversee pipeline security. In addition, all of the association representatives we interviewed stated that the MOU Annex helped ensure that TSA and PHMSA understood and respected each other’s roles and responsibilities. As a result, according to the association representatives, their pipeline operator membership had not experienced challenges associated with overlapping or duplicative efforts on the part of TSA and PHMSA pipeline safety or security programs. In accordance with the 9/11 Commission Act, TSA issued its Pipeline Security and Incident Recovery Protocol Plan in March 2010. The plan’s stated intent is to establish a comprehensive interagency approach to counter risks, coordinate federal agencies’ actions, and minimize the consequences of incidents involving pipeline infrastructure as well as recovery time from them. The plan also defines the roles and responsibilities of federal agencies; tribal, state, and local governments; and the private sector during a pipeline incident. It also defines the measures they may take related to pipeline infrastructure security incidents. According to the plan TSA, PHMSA, the Department of Energy (DOE), and the Federal Bureau of Investigation (FBI) have principal roles in pipeline incident response, while other agencies such as the U.S. Coast Guard, the Federal Emergency Management Agency (FEMA), and the National Transportation Safety Board (NTSB) have supporting roles. The following are examples of agencies’ roles and responsibilities in each of the plan’s three response phases. Prevention/protection. TSA is responsible for monitoring pipeline owner and operators’ implementation of its pipeline security guidelines, and PHMSA is responsible for enforcing its pipeline safety regulations. TSA, in addition to the FBI, is responsible for assessing the credibility of any physical or cyber threat information it receives and sharing any intelligence related to pipeline security with pipeline owners and operators. Response. TSA is responsible for coordinating information sharing between federal agencies and pipeline stakeholders, and PHMSA is responsible for coordinating federal agency activities with the affected pipeline operator and state pipeline safety agency. The plan also states that the FBI is responsible for investigating attempted or successful attacks on pipeline infrastructure including those that are believed to have a nexus to terrorism. Recovery. PHMSA is primarily responsible for working with the pipeline operator, along with other supporting federal agencies, to facilitate service restoration. DOE is responsible for monitoring flows of throughput in the affected pipeline system or systems, assessing regional, national, and global impacts of an incident on energy infrastructure throughout all three phases. Appendix I provides more details on key federal agencies’ and pipeline operators’ roles and responsibilities, as well as the actions they may take in response to an incident as detailed in the plan. TSA’s plan states that it will be updated periodically to address changes in pipeline security threats, technology, and federal laws and policies. Further, Standards for Internal Control in the Federal Government states that periodic review of policies, procedures, and related control activities should occur to determine their continued relevance and effectiveness in achieving identified objectives or addressing related risks. In addition, internal control standards also states that changes in an entity’s programs or activities, organizational structure, personnel, or technology can affect the operating environment and management can respond by revising internal controls on a timely basis to ensure effectiveness. However, TSA has not reviewed or revised its 2010 plan to ensure it addresses changes in at least three key areas: cybersecurity-related laws and policies, incident management policies, and DHS’s terrorism alert system as described below. TSA’s 2010 plan includes some discussion of cyber threats and refers operators to guidance they may use to better secure their SCADA and control systems. However, the plan does not identify the cybersecurity roles and responsibilities of federal agencies that are identified in the plan, such as DOE, Federal Energy Regulatory Commission (FERC), or the FBI, or discuss the measures these agencies should take to prevent, respond to, or support pipeline operators following a cyber incident involving pipelines. TSA’s 2010 plan also has not been updated to reflect current cybersecurity incident response guidance. In December 2016, DHS issued its National Cyber Incident Response Plan (NCIRP). The NCIRP is to be the primary framework for stakeholders, including pipeline operators, to understand how federal departments and agencies provide resources to support response operations for a significant cyber incident. NCIRP identifies the FBI and the National Cyber Investigative Joint Task Force as responsible for investigating reported cyber incidents. NCIRP also identifies the National Cybersecurity and Communications Integration Center (NCCIC), an agency within DHS, as responsible for providing technical assistance to affected entities, such as pipelines, to mitigate vulnerabilities and reduce impacts of cyber incidents. NCCIC is also to share information across the public and private sectors to protect against similar incidents in the future. In addition, NCIRP provides guidance detailing when and to which federal agencies or entities the public should report a cyber incident. These include the FBI, the National Cyber Investigative Joint Task Force, U.S. Secret Service, and NCCIC. For example, NCIRP states that any cybercrime—including computer intrusions or attacks, theft of trade secrets, criminal hacking, terrorist activity, espionage, sabotage, or other foreign intelligence activity—is to be reported to FBI field offices’ cyber task forces. However, TSA’s plan does not include this information or describe what measures, if any, the agencies with pipeline-related roles and responsibilities listed in NCIRP are to take in response to a pipeline cyber incident. Moreover, the 2010 plan does not account for other agencies whose roles and responsibilities are related to critical infrastructure, such as pipelines and cybersecurity. Specifically, the plan does not account for the role of NCCIC, which was established in 2009. In addition, TSA’s 2010 plan does not account for CISA’s role in cyber threat response activities or how it may affect other agencies’ roles and responsibilities for pipeline incident response. TSA officials acknowledged that reviewing and, as appropriate, revising the plan would be beneficial to ensuring the plan addresses current pipeline security threats, technology, and federal laws and policies. They stated TSA had not updated the plan to include cybersecurity response protocols because an overarching cybersecurity response protocol for all critical infrastructure sectors—not just pipelines—should first be developed. According to TSA officials, developing a pipeline cybersecurity response protocol would require a whole-of-government approach, as well as coordination with private sector and input from many sectors because of the challenges and complexity of critical infrastructure cybersecurity in general. However, through NCIRP, DHS provided a cybersecurity response protocol across all critical infrastructure sectors in December 2016. Further, NCIRP states that public and private sector entities should consider creating an operational cyber incident response plan to further organize and coordinate their efforts in response to cyber incidents. Therefore, TSA could potentially provide such an operational cyber incident response plan for the pipeline sector in its plan. TSA could also better ensure that pipeline operators understand how federal agencies may provide support in response to a cyber incident by periodically reviewing and, as appropriate, revising the plan to include its cyber incident response plan. Representatives of the four pipeline associations we interviewed told us that their membership more clearly understood federal agencies’ roles and responsibilities related to physical incidents than to cybersecurity. For example, for physical incidents the representatives stated that their members clearly understood that they are to first notify local first responders (often through the emergency 911 system) and appropriate state or federal regulators, and are to contact either the National Response Center or TSA’s Transportation Security Operations Center (TSOC), depending on the nature of the incident. However, they stated that they did not believe all of their members clearly understand that they are to report any actual or suspected cyber incidents that could impact pipeline industrial control systems or other information technology-based systems to the NCCIC. All of the association representatives told us that the process for reporting a cyber incident is less clear because, in part, of the large number of federal agencies with a cybersecurity-related role. One of the representatives also attributed the lack of clarity to the reorganization of NCCIC, and the establishment of CISA. Further, all of the representatives we interviewed indicated that clarifying the cybersecurity roles and responsibilities of DOE, Federal Energy Regulatory Commission (FERC), and TSA would, among other things, improve operators’ ability to appropriately report and respond to a cyber incident. TSA also has not updated the plan to address changes in federal incident management and response policies that have occurred since the plan was developed in 2010. The plan states that it is to be consistent with the National Response Framework (NRF) and the National Incident Management System (NIMS) incident command system procedures. The NRF was first issued in 2008 and described the roles, responsibilities and coordinating structures for delivering core capabilities during incident response. According to FEMA, it revised the NRF in 2013 and 2016 to reflect lessons learned from real world events and other experiences since the framework was first developed. Likewise, NIMS was developed in 2004 as a comprehensive, national approach to incident management that was to be applicable at all jurisdictional levels and across functional disciplines, such as law enforcement, public health, or public works. According to FEMA, it revised NIMS in 2017 to reflect and incorporate policy updates and lessons learned from exercises and real-world incidents. The revision was also intended to clarify that NIMS applies to all stakeholders with incident management roles, and to enhance guidance on information management processes, data collection plans, social media integration, and the use of geographic information systems. TSA officials acknowledged the benefit of periodically reviewing, and if necessary, revising the plan to reflect FEMA’s revisions to NIMS or the NRF, but had not done so because of competing priorities. TSA has also not updated the plan to address changes DHS made to its terrorist alert system in 2011. Consistent with the 9/11 Commission Act, the plan describes actions that federal agencies can take at each color- coded level of the Homeland Security Advisory System to ensure the increased security of pipeline infrastructure. For example, under the protect/prevent phase, the plan states that when there is a high risk of a terrorist attack (i.e., red: severe condition) and threat is general and not specific to pipelines, TSA and PHMSA are to coordinate to identify the potential for any related or cascading events that may impact the pipeline sector. However, if there is a specific threat to pipelines, TSA, in collaboration with pipeline operators, is to identify any immediate protective measures that pipeline operators are to implement. TSA is also to ensure pipeline operators have the information necessary to implement these measures, and, if necessary, to issue security directives. In 2011, DHS replaced the four color-coded alert system of the Homeland Security Advisory System with the National Terrorism Advisory System, which has only two alert levels (elevated threat and imminent threat). TSA issued revised protective measures that pipeline operators are to take under either threat condition in April 2011 and March 2018. However, TSA has not updated the plan to communicate the actions federal agencies can take at either level of the National Terrorism Advisory System to ensure the increased security of pipeline infrastructure. TSA officials acknowledged that periodically reviewing and, as appropriate, revising the plan would help to clarify federal agencies’ roles and responsibilities for addressing pipeline security. TSA officials reported that they have not updated the plan since 2010 because they faced competing priorities. However, as described earlier, TSA’s incident response plan was developed to provide a comprehensive interagency approach to important activities such as countering risks, coordinating federal agencies’ actions and minimizing the consequences of incidents involving pipeline infrastructure. Further, the plan itself states that it will be updated periodically to address changes in pipeline security threats, technology, and federal laws and policies. By periodically reviewing and, as appropriate, revising its Pipeline Security and Incident Recovery Protocol Plan, TSA could better ensure that the plan addresses all possible and relevant threats to pipeline systems, such as cybersecurity, and fully incorporates relevant changes, such as those related to incident management and DHS’s terrorism alert system. By doing so, TSA could also provide greater assurance that federal agencies understand the actions they are to take to prevent, respond to, or recover from a physical or cyber incident. TSA and PHMSA share responsibility for safeguarding the nation’s pipeline systems from catastrophic events. While the 2006 MOU Annex delineates TSA’s and PHMSA’s mutually agreed-upon pipeline security roles and responsibilities, it has not been reviewed since its inception to consider pipeline security developments. By developing and implementing a mutually agreed upon timeline with timeframes for reviewing the annex and as appropriate, updating it, TSA and PHMSA could better ensure that their roles and responsibilities are properly documented and updated in a timely manner to remain current. Furthermore, by revising the MOU Annex to include a provision for periodically reviewing the annex for needed updates, TSA and PHMSA could better ensure the agreement consistently reflects relevant and updated information on their roles and responsibilities. Similarly, TSA’s Pipeline Security and Incident Recovery Protocol Plan— which defines the roles and responsibilities of federal agencies; tribal, state, and local governments; and the private sector for responding to a pipeline incident—also has not been updated to reflect changes in federal laws or policies since the plan was issued in 2010. By periodically reviewing and, when appropriate, updating its Pipeline Security and Incident Recovery Protocol Plan, TSA could better ensure that the plan addresses and fully incorporates changes relevant to cybersecurity, incident management and DHS’s terrorism alert system, among others. By doing so, TSA could also better ensure that federal agencies’ actions are well coordinated in response to a pipeline-related physical or cyber incident, and that pipeline stakeholders understand federal agencies’ roles and responsibilities in preparing for, responding to, or supporting pipeline operators to restore service after a pipeline-related physical or cyber incident. We are making a total of five recommendations including three to TSA and two to PHMSA: The TSA Administrator should work with the PHMSA Administrator to develop and implement a timeline with milestone dates for reviewing and, as appropriate, updating the 2006 MOU Annex. (Recommendation 1) The PHMSA Administrator should work with the TSA Administrator to develop and implement a timeline with milestone dates for reviewing and, as appropriate, updating, the 2006 MOU Annex. (Recommendation 2) The TSA Administrator, in consultation with the PHMSA Administrator should revise the 2006 MOU Annex to include a provision requiring periodic reviews of, and as appropriate, corresponding updates to the Annex.(Recommendation 3) The PHMSA Administrator, in consultation with the TSA Administrator should revise the 2006 MOU Annex to include a provision requiring periodic reviews of, and as appropriate, corresponding updates to the Annex.(Recommendation 4) The TSA Administrator should periodically review, and as appropriate, update the 2010 Pipeline Security and Incident Recovery Protocol Plan to ensure the plan reflects relevant changes in pipeline security threats, technology, federal law and policy, and any other factors relevant to the security of the nation’s pipeline systems. (Recommendation 5) We provided a draft of this report to DHS and DOT. DHS and DOT provided written comments which are reproduced in appendices III and IV respectively. We also provided draft excerpts of this product to the American Petroleum Institute (API), the American Gas Association, the Interstate Natural Gas Association of America, and the American Public Gas Association. For those who provided technical comments, we incorporated them as appropriate. With regard to our first recommendation, that TSA work with the PHMSA to develop and implement a timeline with milestone dates for reviewing and, as appropriate, updating the 2006 MOU Annex, DHS stated that TSA will work with PHMSA to develop and implement a timeline with milestone dates for reviewing and updating, as appropriate, the 2006 MOU Annex. DHS estimated that this effort would be completed by August 31, 2019. This action, if fully implemented, should address the intent of this recommendation. With regard to our second recommendation, that PHMSA work with TSA to develop and implement a timeline with milestone dates for reviewing and, as appropriate, updating the 2006 MOU Annex, DOT concurred and stated it would provide a detailed response within 180 days of the issuance of this report. With regard to our third recommendation, that TSA, in consultation with PHMSA, revise the 2006 MOU Annex to include a provision requiring periodic reviews of, and as appropriate, corresponding updates to the Annex, DHS stated that TSA will, in consultation with PHMSA, revise the 2006 MOU Annex to include a provision requiring periodic reviews of, and as appropriate, corresponding updates to the Annex. DHS estimated that this effort would be completed by March 31, 2020. This action, if fully implemented, should address the intent of this recommendation. With regard to our fourth recommendation, that PHMSA, in consultation with TSA, revise the 2006 MOU Annex to include a provision requiring periodic reviews of, and as appropriate, corresponding updates to the Annex, DOT concurred and stated it would provide a detailed response within 180 days of the issuance of this report. With regard to our fifth recommendation, that TSA periodically review, and as appropriate, update the 2010 Pipeline Security and Incident Recovery Protocol Plan to ensure the plan reflects relevant changes to pipeline security threats, technology, federal law and policy, and any other factors relevant to the security of the nation’s pipeline systems, DHS concurred and estimated that TSA will complete its first review by December 31, 2019. DHS further stated that it will establish a timeline for updating the plan should the review determine that an update is necessary. This action, if fully implemented, should address the intent of this recommendation. We are sending copies of this report to the appropriate congressional committees; the Secretary of Homeland Security, Secretary of Transportation; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact William Russell at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix V. The Transportation Security Administration (TSA) and Pipeline and Hazardous Materials Safety Administration (PHMSA),”the parties”, recognize that the following program areas are important to the development and deployment of an enhanced security strategy for the transportation of hazardous materials by all modes, including pipeline. This appendix summarizes the roles and responsibilities of key federal agencies as well as the actions that they may take in response to an incident as detailed in Transportation Security Administration’s (TSA) 2010 Pipeline Security and Incident Recovery Protocol Plan. A summary of pipeline stakeholder’s roles, responsibilities, and examples of actions that may be taken during each incident response phase is presented below. Prevention/Protection. During the prevention/protection phase, pipeline operators are to use TSA’s pipeline security guidance and the Pipeline and Hazardous Materials Safety Administration’s (PHMSA) safety regulations as the framework to prepare and prevent against an incident. TSA is responsible for monitoring pipeline owners and operators’ implementation its security guidelines, and PHMSA is responsible for enforcing its safety regulations. The plan also states that during this phase TSA is to assume a primary role for ensuring federal agencies’ actions are coordinated through protective security advisors (PSAs). In addition, the Federal Bureau of Investigation (FBI) is responsible for assessing the credibility of a known threat, preparing and implementing a preliminary investigative plan, and, if necessary, disseminating public safety notifications. The Department of Energy (DOE) is responsible for assessing and monitoring pipeline systems for supply shortages. The prevention/protection section of the plan also describes how agencies are to share and assess threat information. For example, the plan states that TSA, PHMSA, or any federal agency that receives threat information regardless of the source, must immediately notify the FBI. It also states that if the FBI receives intelligence about a pipeline threat, it is to share this information with TSA. TSA is then to notify the pipeline operator and, if necessary, provide recommendations for additional protective measures. Finally, the prevention/protection section of the plan defines actions various agencies can implement during a heightened security threat level to increase protection from a potential attack. For example, when there is a high risk of a terrorist attack (i.e., red: severe condition) and threat is general and not specific to pipelines, TSA and PHMSA are to coordinate to identify the potential for any related or cascading events that may impact the pipeline sector. If there is a specific threat to pipelines, TSA is, in collaboration with pipeline operators, to identify any immediate protective measures that ought to be taken by pipeline operators, and ensure pipeline operators have the information necessary to implement them, and, if necessary issue security directives. Response. According to the plan, pipeline owners or operators are to notify local first responders and state regulators through the emergency 911 system. After the pipeline operator has notified local government, they are to contact the National Response Center (NRC) if the incident results in an unintentional release or causes significant damage. As we previously reported, pipeline operators are also requested to report any physical security incident that is indicative of a deliberate attempt to disrupt pipeline operations or activities that could be considered precursors to such an attempt to TSA’s Transportation Security Operations Center (TSOC). Once TSA has been notified of an incident by a pipeline operator, its Pipeline Security Branch is to monitor the incident, notify relevant federal agencies, and, if deemed appropriate, activate the Interagency Threat Coordination Committee (ITCC). PHMSA may also deploy on-scene pipeline inspectors and investigators which are to among other things, coordinate federal agencies’ activities with the affected pipeline operator and state pipeline safety agency, provide subject matter expertise to the incident command, and direct safe restoration of pipeline facilities and services. The plan also states that, during the response phase, responsibility for investigating the incident falls to NTSB or the FBI depending on whether the incident is determined to be the result of criminal activity. The FBI is solely responsible for investigating any pipeline security incident that appears to be an intentional criminal act. For example, if the incident were suspected to be the result of terrorist attack, the National Joint-Terrorism Task Force would conduct an investigation of the attack, and if appropriate, with assistance from other FBI assets. If, however, the incident resulted in fatalities, substantial property damage, or significant injury to the environment, NTSB would have responsibility for investigating the incident, and may issue safety recommendations to help prevent future accidents. Recovery. When response activities are complete, PHMSA is to have primary responsibility for overseeing pipeline operators’ safe restoration of service with TSA and other federal agencies serving primarily in support roles. PHMSA, for example, is to work with the owner/operator to facilitate restoration of service by, among other things, providing technical oversight, advice, and guidance to owner/operators; coordinating recovery activities with state pipeline safety agency, and evaluate whether to a special permit is necessary to facilitate an expedited restoration of services. Meanwhile, DOE is to continue to assess the impacts of an incident on energy infrastructure, and advise federal, state, tribal, and local authorities on priorities for energy restoration, assistance, and supply. In addition to the contact named above, Ben Atwater, Assistant Director and Michael C. Lenington, Analyst-in-Charge, managed this assignment. Nanette Barton, Eric Hauswirth, Susan Hsu, and Thomas Lombardi also made significant contributions to this report.", "summary": "More than 2.7 million miles of pipeline transport natural gas, oil, and other hazardous liquids needed to operate vehicles and heat homes, among other things, in the United States. Responsibility for safeguarding these pipelines is shared by TSA, within the Department of Homeland Security (DHS); PHMSA, within the Department of Transportation (DOT); and pipeline operators. TSA oversees the security of all transportation modes, including pipelines. PHMSA oversees pipeline safety. DHS and DOT signed a MOU on their roles across all transportation modes in 2004. In 2006, TSA and PHMSA signed an annex to the MOU (MOU Annex) to further delineate their pipeline security-related responsibilities. The TSA Modernization Act includes a provision for GAO to review DHS and DOT roles and responsibilities for pipeline security. This report addresses, among other things: (1) the extent the MOU Annex delineates TSA's and PHMSA's pipeline security roles and responsibilities; and (2) the extent TSA has communicated federal incident response procedures for pipeline breaches to stakeholders. GAO reviewed the MOU annex and related documents and TSA's Pipeline Security and Incident Recovery Protocol Plan, and interviewed officials from PHMSA, TSA, and four pipeline associations. The memorandum of understanding (MOU) Annex signed by the Transportation Security Administration (TSA) and Pipeline and Hazardous Materials Safety Administration (PHMSA) in 2006 delineates their mutually agreed-upon roles and responsibilities for pipeline security, but has not been reviewed to consider pipeline security developments since its inception. As a result, the annex may not fully reflect the agencies' pipeline security and safety-related activities. Efforts to update the annex were delayed by other priorities. As of June 2019, there are no timeframes for completion. By developing and implementing timeframes for reviewing the MOU Annex and updating it, as appropriate, TSA and PHMSA could better ensure any future changes to their respective roles and responsibilities are clearly delineated and updated on a regular basis. TSA's Pipeline Security and Incident Recovery Protocol Plan, issued in March 2010, defines the roles and responsibilities of federal agencies and the private sector, among others, related to pipeline security incidents. For example, in response to a pipeline incident, TSA coordinates information sharing between federal and pipeline stakeholders and PHMSA coordinates federal activities with an affected pipeline operator to restore service. However, TSA has not revised the plan to reflect changes in at least three key areas: pipeline security threats, such as those related to cybersecurity, incident management policies, and DHS's terrorism alert system. By periodically reviewing and, as appropriate, updating its plan, TSA could better ensure it addresses changes in pipeline security threats and federal law and policy related to cybersecurity, incident management and DHS's terrorism alert system, among other things. TSA could also provide greater assurance that pipeline stakeholders understand federal roles and responsibilities related to pipeline incidents, including cyber incidents, and that response efforts to such incidents are well-coordinated. GAO is making five recommendations, including that: (1) TSA and PHMSA develop and implement a timeline for reviewing and, as appropriate, updating the 2006 MOU Annex; and (2) TSA periodically review, and as appropriate, update its 2010 pipeline incident recovery plan. DHS and DOT concurred with these recommendations.", "document_type": "gao"}
{"report": "VHA began using the SAIL system in 2012 to measure, evaluate, and benchmark the quality, efficiency, and productivity of medical centers, and to highlight successful strategies of high-performing medical centers. SAIL includes 29 performance measures (27 quality measures and two measures of overall efficiency and capacity) in areas such as acute-care mortality, access to care, and employee satisfaction. (See appendix I for the full list of SAIL measures.) SAIL is a diagnostic tool that allows VHA to assess medical centers’ performance relative to their peers, and determine how much absolute improvement they have made in the past year based on relevant clinical data. VHA publishes SAIL results quarterly to provide information to network and medical center officials regarding improvement opportunities at each medical center. SAIL data are also available on VHA’s intranet site. VHA staff can view a wide range of detailed information about their medical center, compare performance to other medical centers, and (for those staff with medical-record-level access) view information on patients with a particular medical condition. VHA conducts annual performance appraisals for all network and medical center officials. The appraisal process begins when officials from VHA’s office of Workforce Management and Consulting transmit a performance plan template to the network directors. The template identifies performance priorities and expectations for the upcoming appraisal period and criteria to be used to measure performance outcomes and ratings for each performance element. Network directors use the template to develop performance plans that include targets and time frames—the schedule of when performance targets are to be achieved during the year—with each of the medical center directors in their network. According to VA policy, performance plans resulting from the template should be finalized within 30 days of the start of the appraisal period. After expectations have been set for a medical center director, the director, in turn, sets performance expectations for the department heads within the medical center. VHA officials told us they primarily use the SAIL system to assess the performance of medical centers. Specifically, VHA uses SAIL data to calculate and assign each medical center an annual star rating of 1 (lowest) to 5 (highest) stars as an assessment of overall quality. SAIL documentation states that the goal of the star ratings is for low-performing medical centers to learn from the best practices of high-performing ones, although all medical centers have the opportunity to improve. VHA applies a weighting and calculation methodology to each of SAIL’s 27 quality measures to determine a single composite score for each medical center. The scores are then ranked and grouped by percentile and the associated medical centers are assigned initial star ratings based on their relative ranking. For example, the lowest performing 10 percent of medical centers as determined by SAIL’s 27 quality measures are assigned a 1-star rating, and the next lowest performing 20 percent of medical centers are assigned a 2-star rating. (See fig. 1.) After the initial star rating is determined by SAIL measures each year, VHA officials can make changes to the rating if a medical center meets certain conditions. For example, SAIL documentation states that a medical center that initially received a 5-star rating will be reduced to a 4- star rating if it has a high mortality rate. In addition, VHA officials told us they can decide to increase a 1-star medical center’s rating to a 2-star rating if the medical center outperforms the bottom 10 percent of U.S. hospitals in certain criteria as measured by external systems such as the Centers for Medicare & Medicaid Services’ Hospital Compare website. We found that the percentage of medical centers that received a final 1- star rating ranged from 4 percent to 10 percent from fiscal years 2013 through 2018. VHA officials publish the final annual star ratings for each medical center both internally and externally. See figure 2 for the number of medical centers that received each final star rating for fiscal years 2013 through 2018. Although the specific medical centers within each star-rating category could change from year to year, we found that the fiscal year 2018 star ratings for 110 of the 127 medical centers (87 percent) that received star ratings in fiscal year 2013 did not differ by more than 1 star from their fiscal year 2013 star rating. For example, eight of the 10 1-star medical centers in fiscal year 2013 received either a 1- or 2-star rating in fiscal year 2018. (See fig. 3.) In addition, 44 of the 127 medical centers had the same rating in fiscal year 2018 as they did in fiscal year 2013. At the end of the 6-year period of our review, only one medical center differed by more than 2 stars from its fiscal year 2013 star rating, decreasing from 5 stars to 2. VHA officials told us they use SAIL tools on VHA’s intranet when conducting site visits to medical centers and for other performance management efforts. The SAIL system includes several performance management tools that present data in greater detail than SAIL’s quarterly data release and enable officials to identify areas for improvement. VHA, network, and medical center officials we interviewed mentioned three in particular: Opportunity matrix – This matrix shows how a medical center ranks compared to others on all SAIL performance measures based on quarterly data. Each performance measure is labeled by quintile, with the first quintile comprising the top 20 percent of medical centers and the fifth quintile comprising the bottom 20 percent. Officials told us they use this tool to focus improvement efforts by examining specific measures for which a medical center needs improvement. Geometric control charts – These charts, referred to as G-Charts, allow officials to monitor on a daily basis what VHA considers to be rare occurrences. For example, one G-Chart allows VHA to monitor patient safety indicators that contain information on occurrences of specific medical conditions, such as cardiac arrest, pneumonia, and sepsis. Medical center officials can use these charts to examine the occurrence of events over time, analyze patient-level data, and quickly detect changes in the frequency of these events. Other events that the charts allow VHA to monitor include inpatient complications and deaths. Symphony action triggers – Symphony is an online tool that tracks over 100 performance measures daily, related to medical center access, outcomes, and productivity, and includes an early warning system to notify network and medical center officials of results that require attention. Officials can use Symphony to view patient-level information to understand the details of particular events and determine solutions. VHA officials also told us that they use these tools to manage medical center performance as part of their ongoing support of lower performing medical centers. Specifically, officials who oversee SAIL identify lower performing medical centers using SAIL and conduct site visits as part of VHA’s Strategic Action for Transformation initiative. This initiative utilizes a four-tiered, escalating approach based on the severity of concern at a medical center. In order of increasing severity, the four levels are watch, high-risk, critical, and VA receivership. One-star medical centers are automatically placed on the high-risk list, along with some 2-star medical centers with decreasing performance. If performance continues to decrease, medical centers are considered critical, and can be escalated to VA “receivership,” at which point VHA officials may step in to correct ongoing problems and replace network or medical center leadership officials. As of January 2019, VHA officials told us no medical center had entered VA receivership since the initiative began. VHA officials told us that they may also conduct site visits or hold calls with medical center leadership by request, although their focus is on lower performing medical centers. In addition to the SAIL tools, which report data on performance measures across the entire medical center, VHA officials told us that they may also use other data sources as part of medical center performance management. For example, several program offices—such as primary care, mental health, and surgery—have dashboards that track performance and quality of care specific to those offices. In addition, VA’s Inpatient Evaluation Center focuses on mortality data, including estimates of expected patient mortality. We found that VHA relies heavily on medical center performance information to assess the performance of its network and medical center directors. VA’s Senior Executive Service Part V. Performance Appraisal System handbook states that directors are assessed using five appraisal elements established by the Office of Personnel Management: (1) Results Driven, (2) Leading People, (3) Leading Change, (4) Business Acumen, and (5) Building Coalitions. The five elements are included in VHA’s performance plan template, which forms the basis for network and medical center directors’ performance plans. The handbook designates a relative weight for each element used to calculate a director’s rating. (See fig. 4.) The handbook states that a director is rated in each element on a scale of level 1 to level 5, with 5 being the highest level. Each rating is then multiplied by the weight for its corresponding element, and the results are added to generate a summary score. According to the handbook, the summary score is used to identify potential recipients of pay increases and monetary awards. The most heavily weighted appraisal element in the handbook, Results Driven, represents 40 percent of a director’s overall performance and is based entirely on medical center performance information. Specifically, for fiscal year 2018, SAIL results comprised 25 percent of the overall rating and included measures such as patient mortality, length of stay, and readmissions. Other medical center performance information comprised the remaining 15 percent of the overall rating. (See fig. 5.) Medical center performance information is also used when assessing directors’ performance across other appraisal elements. For example, in VHA’s fiscal year 2018 performance plan template, the Leading Change appraisal element included the implementation of suicide prevention initiatives, using medical center performance in the SAIL mental health domain as criteria. In addition, the Leading People element included performance information from VA’s All Employees’ Survey, which included medical center staff. Although medical center performance information plays a prominent role in the performance assessment process, VHA officials told us that there are other considerations that may result in medical center directors receiving a rating that is higher than that indicated by the star rating of the medical center. For example, VHA officials told us that when calculating a medical center director’s rating for the Results Driven element, they consider whether the medical center’s overall performance improved or deteriorated compared to the previous year’s performance. These officials also stated that they take into consideration the length of a director’s tenure, such as cases where a director started at a low- performing medical center partway through the rating year and would not have had sufficient time to improve the medical center’s performance from the previous year. In our review, we also found that the release of VHA’s performance plan template is often delayed, which can limit its effectiveness as a means of assessing directors’ performance. Specifically, in fiscal years 2016, 2017, and 2018, VHA released the performance plan template to network directors in November or December, close to the end of the first quarter of the performance appraisal period. Directors at two of the medical centers in our review expressed frustration with the delay and not having a full year to meet performance expectations, but directors at the two other medical centers stated that they find the process clear and are able to anticipate performance expectations. Officials from VHA’s office of Workforce Management and Consulting, which sends out the template, told us that they have been working in recent years to shorten the template’s development and review process within VHA; however, the delays may continue because of late changes from VA or the Office of Personnel Management. In our December 2016 review of human resource management practices at VHA, we also reported on delays in the release of VHA’s performance plan template. We reported that the delay limited medical center officials’ ability to use the template as a tool to align expectations and performance, which is inconsistent with leading practices on employee performance management. We recommended that VHA accelerate its efforts to develop a modern, credible, and effective performance management system, including the timely release of the performance plan template. VA partially concurred with our recommendation and has made limited progress in implementing it. As of December 2018, this recommendation remains open and we reiterate the need for VHA to implement it. Although SAIL is used in the assessment of both medical centers’ and directors’ performance, VHA officials have not assessed and implemented as appropriate the recommendations from previous evaluations of the SAIL system to ensure its effectiveness. This is inconsistent with federal standards for internal control, which state that management should remediate identified internal control deficiencies on a timely basis. This remediation may include assessing the results of reviews to determine appropriate actions, and, once decisions are made, completing and documenting corrective actions on a timely basis. VHA officials told us that since it was established in 2012, there have been two evaluations of SAIL: The first evaluation was an internal review, which VHA officials told us was completed in February 2014 and submitted to the director of VHA’s Office of Analytics and Business Intelligence and reviewed by the then Under Secretary for Health and Principle Deputy Under Secretary for Health. The internal review, which had 22 recommendations, found issues related to the validity and reliability of SAIL as a tool for measuring performance and fostering accountability. For example, it included a recommendation that VHA no longer use aggregate star ratings for accountability, or for presenting medical center quality and efficiency information to stakeholders. Rather, the recommendation called for VHA to work to identify valid and reliable approaches for presenting this information. The second evaluation was an external review, which VHA officials told us was submitted to the Office of the Principal Deputy Under Secretary for Health in April 2015. The external review included 19 recommendations for short- and long-term improvements to SAIL, such as a recommendation to examine the potential for misclassifying medical centers—i.e., assigning star ratings that do not reflect medical centers’ pattern of performance on the underlying measures. The review noted two ways such misclassification could occur: (1) two medical centers with summary scores that are close together could receive different star ratings, or (2) two medical centers with widely different summary scores could receive the same star rating. The findings of the previous SAIL evaluations are similar to concerns that officials from the four networks and four medical centers in our review expressed about SAIL’s effectiveness, including whether the star ratings were an accurate reflection of medical center performance. For example, officials from one medical center told us that, because the mortality measure has a higher weight relative to other SAIL measures, it can amplify the importance of a small difference between medical centers. As a result, a 1-star medical center may appear to be performing much more poorly on this measure than it is in practice; and officials from two medical centers told us that the length-of-stay measure may not be an accurate reflection of quality of care, as there are valid clinical reasons why some veterans need a longer length of stay that may not be reflected in the diagnostic and procedure codes for that stay. Therefore, the difference in performance on the length of stay measure between two medical centers may be the result of how data were entered into the medical record and coded, rather than actual differences in quality of care. In addition, VHA officials also expressed concerns about SAIL and how it is currently being used to assess medical center performance. For example, VHA officials who oversee SAIL told us it was designed to be an internal performance improvement tool, but is now also being used as a performance accountability tool. The external review included a recommendation that VHA consider whether the primary purpose of SAIL is improvement or accountability, as SAIL would need to be redesigned to do both. One VHA official told us that SAIL is being used in punitive ways through the Strategic Action for Transformation initiative. For example, at one medical center, officials told us that they received a letter from VHA’s Executive in Charge about the medical center’s low performance only a few months after its star level increased from 1 to 2 stars. Officials said the letter warned them that medical center leadership could be removed if performance does not improve. Medical center officials described this as counterproductive for their improvement efforts, as it was demoralizing while not identifying any specific areas for improvement. VHA officials confirmed that, other than their routine reviews to determine the need for annual adjustments to SAIL measures and other minor adjustments to the system, they have not assessed or implemented as appropriate the recommendations from the internal and external SAIL evaluations. In addition, although the Under Secretary for Health received a response to the internal review’s recommendations from an individual program office, VHA officials told us no action was taken on the response or to formally assess the recommendations from the internal review. Officials noted that two reasons for the lack of action taken to assess recommendations for implementation were leadership turnover and attention diverted to other issues, such as concerns about extended wait times for medical appointments at VHA medical facilities. In addition, officials stated that the evaluations were not widely distributed within VHA. As a result, officials we spoke with from several VHA offices were unaware that SAIL had ever been evaluated. To address the federal internal control standard for timely remediation of identified deficiencies, federal agencies assign responsibility and authority for carrying out and documenting corrective actions. VHA officials told us they did not formally assign responsibility to an office to assess recommendations from previous evaluations of SAIL. As a result, when the officials who received both evaluations left VHA, there were no other individuals or offices responsible for ensuring that recommendations were acted on. VHA officials who oversee SAIL told us that they are planning to use the 2015 external review as part of their plans to make changes to SAIL and its measures. However, there is no documentation available describing the planned changes to SAIL or how those planned changes will incorporate the results of the external review. If changes made to SAIL run counter to the evidence, it could potentially diminish the integrity of the system to effectively evaluate performance. VHA primarily uses the SAIL system to assess and compare the performance of medical centers. Veterans can also view SAIL data to compare medical center performance when making health care decisions. Officials from the networks and medical centers in our review expressed concerns about how SAIL is being used and whether star ratings are an accurate reflection of medical center quality. SAIL has been evaluated twice, and both evaluations have found similar concerns with SAIL. However, VHA has yet to use the results of those evaluations to address identified concerns and make evidence-based improvements to the SAIL system. Specifically, VHA has not taken action to ensure that officials assess the recommendations from SAIL evaluations, document their decisions, and implement recommendations as appropriate. If changes to SAIL are implemented without this assessment of existing evaluations, VHA may make changes that run counter to the evidence, potentially diminishing the integrity of the system to effectively evaluate performance. We are making the following two recommendations to VA: The Under Secretary for Health should assess recommendations from two previous evaluations of SAIL. This assessment should include the documentation of decisions about which recommendations to implement and assignment of officials or offices as responsible for implementing them. (Recommendation 1) The Under Secretary for Health should implement, as appropriate, recommendations resulting from the assessment of the two previous SAIL evaluations. (Recommendation 2) We provided VA with a draft of this report for review and comment. VA provided written comments, which are reprinted in appendix II. In its written comments, VA concurred with both of the report’s recommendations, and identified actions it is taking to implement them. We are sending copies of this report to the appropriate congressional committees, the Secretary of Veterans Affairs, the Under Secretary for Health, and other interested parties. In addition, the report is available at no charge on the GAO web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at draperd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. 2 Risk adjusted complication Index In‐Hospital risk adjusted mortality (SMR) Measure 30‐day risk adjusted mortality (SMR30) Desired Direction of Measure Lower 3 Severity adjusted average length of stay (ALOS) %Acute admission reviews met InterQual criteria %Acute continued stay reviews met InterQual criteria Inpatient core measures mean percentage (ORYX) HEDIS outpatient core measure mean percentage (chart abstract) HEDIS outpatient core measure mean percentage (population based) 5 HCAHPS score (patient rating of hospital) Rating of primary care provider Rating of specialty care provider Care Transition (inpatient) Stress discussed (PCMH) 2 Best Places to Work score Hospital-wide all conditions 30-day readmission rate 5 Timely Appointment, Care and Information – PCMH Timely Appointment, Care and Information – SC Same Day Appointment When Needed – PCMH Call center speed in picking up calls 3 Mental health population coverage Mental health continuity of care Mental health experience of care 2 Stochastic frontier analysis (= 1/SFA) The acronyms VHA used in the table are as follows: SMR=standard mortality ratio; HEDIS=Healthcare Effectiveness Data and Information Set; HCAHPS= Hospital Consumer Assessment of Healthcare Providers and Systems; PCMH=patient-centered medical home; ACSC=ambulatory care sensitive conditions; SC=specialty care. Debra A. Draper, (202) 512-7114 or draperd@gao.gov. In addition to the contact named above, Janina Austin, Assistant Director; Sarah Harvey and Malissa G. Winograd, Analysts-in-Charge; Jennie F. Apter; Frederick Caison; and Alexander Cattran made key contributions to this report. Also contributing were Vikki Porter and Jennifer Whitworth. VA Health Care: Actions Needed to Improve Oversight of Community- Based Outpatient Clinics. GAO-18-375. Washington, D.C.: Apr. 12, 2018. Veterans Health Care: Additional Actions Could Further Improve Policy Management. GAO-17-748. Washington, D.C.: Sept. 22, 2017. Veterans Affairs: Improved Management Processes Are Necessary for IT Systems That Better Support Health Care. GAO-17-384. Washington, D.C.: June 21, 2017. VA Health Care: Improvements Needed in Data and Monitoring of Clinical Productivity and Efficiency. GAO-17-480. Washington, D.C.: May 24, 2017. Veterans Health Administration: Management Attention Is Needed to Address Systemic, Long-standing Human Capital Challenges. GAO-17-30. Washington D.C.: Dec. 23, 2016. Veterans Health Care: Improvements Needed in Operationalizing Strategic Goals and Objectives. GAO-17-50. Washington D.C.: Oct. 21, 2016. VA Health Care: Processes to Evaluate, Implement, and Monitor Organizational Structure Changes Needed. GAO-16-803. Washington D.C.: Sept. 27, 2016.", "summary": "VHA anticipates that it will provide care to more than 7 million veterans in fiscal year 2019. The majority of veterans using VHA health care services receive care in one or more of the 172 medical centers or at associated outpatient facilities. VHA collects an extensive amount of data that can be used to assess and manage the performance of medical centers. Many measures are publicly reported on VA web pages, allowing veterans the ability to compare medical centers' quality of care. GAO was asked to assess VHA's management of medical center performance. This report examines (1) the tools VHA uses to assess medical center performance; (2) VHA's use of medical center performance information to assess medical center directors; and (3) the extent to which VHA has evaluated the effectiveness of the SAIL system. GAO reviewed VHA policies, guidance, and performance information for medical centers and their associated directors. GAO also interviewed officials from VHA as well as from four VA medical centers, selected for variation in performance and geographic location. Department of Veterans Affairs' (VA) Veterans Health Administration (VHA) officials told GAO they primarily use the Strategic Analytics for Improvement and Learning (SAIL) system to assess VA medical center performance. SAIL includes 27 quality measures in areas such as acute care mortality and access to care. VHA officials use SAIL to calculate and assign each medical center an annual star rating of 1 (lowest) to 5 (highest) stars as an assessment of overall quality. For the 146 medical centers that received star ratings in fiscal year 2018, the distribution of star ratings was as follows: 6 percent, 1 star; 24 percent, 2 stars; 38 percent, 3 stars; 19 percent, 4 stars; and 12 percent, 5 stars. Although the specific medical centers within each star-rating category could change from year to year, GAO found that the fiscal year 2018 star ratings for 110 of the 127 medical centers (87 percent) that received star ratings in fiscal year 2013 did not differ by more than 1 star from their fiscal year 2013 rating. Changes in VHA Strategic Analytics for Improvement and Learning Star Ratings, Fiscal Year 2013 Compared to Fiscal Year 2018 GAO found that VHA's appraisal process for assessing medical center director performance relies heavily on medical center performance information, including SAIL. For example, the most heavily weighted appraisal element (40 percent of the overall rating) is made up entirely of medical center performance information. SAIL was evaluated in 2014 and 2015, but VHA has not assessed the recommendations from those evaluations, or taken action on them. The evaluations, which found issues related to the validity and reliability of SAIL and its star ratings for measuring performance and fostering accountability, together included more than 40 recommendations for improving SAIL. The findings are similar to concerns expressed by officials GAO interviewed from VHA, networks, and medical centers about SAIL's effectiveness and how it is currently being used to assess medical center performance. VHA officials told GAO the findings and recommendations of the previous SAIL evaluations were not assessed because the evaluation reports were not widely distributed within VHA due to leadership turnover, as well as attention that was diverted to other concerns such as extensive wait times for medical appointments. Without ensuring that the recommendations resulting from these previous evaluations are assessed and implemented as appropriate, the identified deficiencies may not be adequately resolved, and VHA's ability to hold officials accountable for taking the necessary actions may be diminished. GAO recommends that the Under Secretary for Health: (1) assess recommendations from previous evaluations of SAIL for implementation; and (2) implement, as appropriate, recommendations resulting from the assessment. VA concurred with GAO's recommendations and identified actions it is taking to implement them.", "document_type": "gao"}
{"report": "According to OMB guidance, evidence can consist of quantitative or qualitative information and may be derived from a variety of sources. Those sources include foundational fact-finding (e.g., aggregate indicators, exploratory studies, descriptive statistics, and other research), performance measurement, policy analysis, and program evaluation. OMB recommends that agencies build a portfolio of high-quality, credible sources of evidence—rather than a single source—to support decision- making. Further, since different sources of evidence have varying degrees of credibility, the use of evidence in decision-making requires an understanding of what conclusions can—and cannot—be drawn from the information. Evidence-building can be viewed as a cycle of activities that can help decision makers obtain the evidence they need to address policy questions or identify the questions they should address. As illustrated in figure 1, the following four activities comprise the evidence-building cycle: assessing existing evidence to determine its sufficiency and if additional evidence is needed to further understand results and inform decision-making; prioritizing among the identified needs which new evidence to generate, when, and how; generating new evidence, by collecting, analyzing, and synthesizing sources of data and research results; and using that evidence to support learning and decision-making processes. Our prior work highlights long-standing challenges agencies continue to face in generating some sources of evidence—developing performance measures for federal programs and conducting evaluations of their programs. Our work also identified variations in the use of evidence for decision-making by agency leaders and managers. Fragmentation refers to those circumstances in which more than one federal agency (or organization within an agency) is involved in the same activity and opportunities exist to improve implementation of that activity. The Commission on Evidence-Based Policymaking found that evidence- building activities are fragmented in the federal government. For example, it found that within agencies, many organizations have evidence-building responsibilities, including statistical agencies and programs, evaluation and policy research offices, performance management offices, policy analysis offices, and program administrators. In addition, the commission highlighted challenges the federal government faces in fully addressing cross-cutting research and policy questions when evidence-building activities span multiple agencies. The commission’s final report noted that this fragmentation (see sidebar) can lead to duplication of effort or missed opportunities for collaboration. The commission’s report stated that when activities are fragmented within an agency or across the federal government, they should be coordinated to improve the capacity to fully address a specific research or policy question. Similarly, our past work highlights the importance of coordination and collaboration to reduce or better manage fragmentation, overlap, and duplication. We found that uncoordinated or poorly coordinated efforts can waste scarce funds and limit their effectiveness. Even when efforts are coordinated, enhancements to those efforts can lead to improvements in effectiveness. As noted earlier, our work also identified leading practices that can help agencies enhance and sustain their implementation of collaborative efforts. Congress and OMB have taken actions to strengthen federal evidence- building activities and improve coordination of those activities during the last decade. Figure 2 provides a timeline of selected actions. Appendix II provides additional detail regarding the selected actions. Tiered evidence grants seek to incorporate evidence of effectiveness into grant making. Federal agencies establish tiers of grant funding based on the level of evidence grantees provide on their approaches to deliver social, educational, health, or other services. Grantees generally are required to evaluate their service models as a condition for the receipt of grant funds. spent on home visiting models with sufficient evidence of their effectiveness. To support this requirement, the program incorporated activities across each element of the evidence-building cycle. For example, through its Home Visiting Evidence of Effectiveness review, HHS annually assesses existing evidence about the effectiveness of new and existing home visiting models to identify those that meet criteria for inclusion in the program. The most recent review, in October 2018, identified 20 models that met HHS’s criteria for an evidence-based early childhood home visiting model. Of those, HHS determined that 18 models were eligible for MIECHV grantees to select for implementation. In addition, based on statutory requirements, officials prioritized the generation of new evidence to assess the program’s results in certain areas, including child health and development, and child maltreatment. The program generated this evidence through program evaluations assessing both program implementation and results. For example, an impact evaluation of four home visiting models published in January 2019 found that these models may reduce household aggression. Because child abuse has been shown to be associated with negative long-term outcomes, reducing household aggression could benefit children as they grow older. In another example of the use of tiered evidence, the Department of Labor’s (DOL) Workforce Innovation Fund, established in 2011, intends to generate long-term improvements in the performance of the public workforce system. The fund established and funded projects in three different tiers: 1. those that proposed new and untested approaches, with little or no evidence of effectiveness; 2. those with promising approaches that were tested and existing evidence suggested could be effective; and 3. those that adapted proven approaches, supported by ample and robust evidence. To further build DOL’s base of evidence on the effectiveness of evidence- based approaches, it required grantees to plan for third-party evaluations of their programs. During the first grant round in 2012, the Workforce Innovation Fund awarded 26 grants, including one for approximately $1.4 million in tier one funding to the Pasco-Hernando Workforce Board in Florida. This grant supported making one-stop services, such as employment workshops and workforce program orientations, more accessible to job seekers by providing online access. In addition, the grant supported offering virtual case management and business services through a call-in Employment Support Center to individuals who found it difficult to access these services in person. According to a 2016 case study of this project conducted by DOL, users of the online one-stop accessed services nearly twice as much during this 3-year grant period when compared to the prior 3-year period. In addition, the case study found there was a 53 percent increase in job placements during this 3-year grant period. The selected agencies’ evidence-building activities also aligned with implementation actions outlined by OMB for selected cross-agency priority (CAP) goals. As required by the GPRA Modernization Act of 2010, at least every 4 years, OMB is to coordinate with other agencies to develop and implement CAP goals. Two current CAP goals, established in March 2018 in the President’s Management Agenda, place a particular focus on evidence-building activities. Leveraging data as a strategic asset. OMB and agency efforts to implement this goal included developing a long-term, enterprise-wide federal data strategy to better govern and leverage the federal government’s data. Published in June 2019, this strategy established 10 principles and 40 practices intended to leverage the value of federal data assets while protecting security, privacy, and confidentiality. Officials at each of the five selected agencies described actions taken by their agencies that aligned with the federal data strategy’s principles and practices. Federal Evidence Clearinghouses According to the Office of Management and Budget (OMB), evidence or “what works\" clearinghouses are repositories that synthesize evaluation findings in ways that make research more useful to decision makers, researchers, and service organizations. These repositories provide tools for understanding what service models are ready for replication or expansion and disseminating results. grade. Officials told us in September 2018 that preliminary evidence suggested the model could help close the literacy gap for the target population. In addition, officials told us they intended to disseminate the final results to stakeholders to help inform their decision-making about the approach. To do so, Education officials developed a communication plan to share this evidence via the OELA website, its Facebook account, the National Clearinghouse for English Language Acquisition (see sidebar), and a listserv of more than 10,000 recipients, among other means. As of September 2019, this study had not been completed. Therefore Education has not implemented its communication plan. Results-oriented accountability for grants. One of the four strategies for this CAP goal focuses on the achievement of grant program goals and objectives. In October 2019, OMB staff told us that the strategy aims to hold grant recipients accountable for promising performance practices that support the achievement of those goals and objectives while streamlining compliance requirements for those grant programs that demonstrate results. According to the September 2019 quarterly update for this goal, initial efforts for this strategy involved developing performance management processes to help grant-making entities improve their ability to monitor, and ultimately improve, the performance of grantees. The update stated that OMB and the Chief Financial Officers Council completed efforts in fiscal year 2019 that included soliciting information from agencies on their current grants performance management practices and identifying emerging and innovative performance practices. Subsequent efforts for this goal involved hosting monthly grants practitioner sessions (called Innovation Exchange Sessions) to share new ideas and approaches to grants management, which began in May 2019. The September 2019 session focused on data- driven decision-making for grants. We identified actions that each of the selected agencies took, aligned with the intent of this CAP goal, to better assess the performance of their grant programs. Officials at each agency told us that they took steps to further incorporate evidence-building requirements into their grant programs. They told us they did this based in part on their experiences in implementing the evidence-based approaches, such as the tiered evidence grants described earlier in this report. For example, officials at the Corporation for National and Community Service (CNCS) described their incorporation of evidence-building requirements into the agency’s AmeriCorps State and National program. Agency officials told us that grantees have been required to evaluate their programs since 2005. In recent years, CNCS embedded the evidence generated by these evaluations into their grant-making activities. For instance, its grant announcement for 2019 stated that AmeriCorps State and National applications would be scored, in part, based on the reported empirical evidence supporting the applicants’ proposed projects. In addition, the announcement required applicants proposing projects in the education focus area to choose one of 13 models that had previously demonstrated effectiveness. According to CNCS officials, this was based on evidence generated in previous projects supported by AmeriCorps State and National grants or CNCS’s Social Innovation Fund. Although the Evidence Act’s requirements apply to the agency-wide level, OMB’s guidance strongly encourages lower-level organizations within agencies to develop and implement their own learning agendas (see side bar). We found instances where officials developed learning agendas at lower organizational levels within several of the selected agencies prior to the issuance of the June 2019 OMB guidance. These learning agendas covered individual component agencies, bureaus, offices, and programs. Learning Agendas According to Office of Management and Budget (OMB) guidance for implementing the Evidence Act, a learning agenda is to define and prioritize relevant questions and identify strategies for building evidence to answer them. In developing a learning agenda, an agency should involve key leaders and stakeholders, to help (1) meet their evidence needs for decision-making and (2) coordinate evidence-building activities across the agency. For example, from September 2016 to June 2017, the U.S. Agency for International Development (USAID) conducted a landscape analysis of learning agendas, in which officials identified 15 documented, office-, bureau-, or initiative-wide learning agenda processes at different stages of development within USAID. This included an office-wide learning agenda developed by the Center of Excellence on Democracy, Human Rights, and Governance (DRG). According to USAID, DRG seeks to elevate and integrate democracy, human rights, and governance issues within USAID’s overall development portfolio. According to DRG’s 2017 learning agenda, its development was informed by ongoing DRG research and evaluation efforts, and consultations with a range of internal stakeholders, including USAID staff from other bureaus and missions. The learning agenda included a set of 11 questions across five thematic areas, as illustrated in figure 3. DRG outlined steps it planned to take throughout 2017 to address each question, such as assessing existing evidence, identifying any gaps, and conducting new research and evaluation activities to fill those gaps. For example, DRG commissioned a study to help answer a question about the effects of human rights awareness campaigns. The study, published in September 2017, synthesized the results of a literature review to identify (1) characteristics of effective campaigns, and (2) typical causes of unintended negative consequences of human rights awareness campaigns and ways to avoid them. We found that evidence-building activities are fragmented within each of the five selected agencies and occur at multiple levels and entities within and across the agencies. As illustrated in figure 4, this fragmented approach to evidence-building includes separate component agencies or offices with responsibilities for building specific sources of evidence, such as performance information, evaluations, and statistical data. For example, at the Department of Labor (DOL), different organizations at the department level are responsible for certain evidence-building activities. This includes the Bureau of Labor Statistics (collecting statistical data), Office of the Chief Evaluation Officer (conducting program evaluations) and Performance Management Center (developing performance information). In addition, some evidence-building activities are dispersed throughout agencies and occur at multiple organizational levels (see figure 5). For example, at the Department of Health and Human Services (HHS), evidence-building activities are generally managed at the component agency level (referred to as divisions). The divisions manage their own offices and programs, which include evidence-building responsibilities. For instance, within the Administration for Children and Families (ACF), an operating division within HHS—the Office of Planning, Research, and Evaluation—is responsible for ACF-related evidence-building activities. These activities include program evaluations, research syntheses, descriptive and exploratory studies, data analyses, and performance management activities. Officials at the selected agencies said that evidence-building activities are fragmented and occur at lower levels for a variety of reasons. First, this approach helps ensure that decision makers at different levels within the organization have the evidence they need to inform decisions. Second, officials stated that many times these evidence-building activities have been undertaken in response to direction from Congress—for example, through provisions in laws or related committee reports directed at a component agency or program. Third, agency officials said they have undertaken these activities based on OMB direction, such as memorandums or budget guidance. This has encouraged agencies to take actions at different organizational levels. However, each of the selected agencies had established processes for coordinating their evidence-building activities. For example, officials at each agency established one or more processes intended to regularly coordinate the assessment and prioritization of evidence needs across the agency, as described later in this report. Agency officials also described other efforts to coordinate evidence- building activities, but these efforts were either ad hoc (i.e., they did not occur regularly) or not comprehensive in nature (i.e., they did not focus broadly across different sources of evidence or did not cover the entire agency). For example, in August 2017, the Corporation for National and Community Service (CNCS) published the results of an assessment of existing evidence—results from research and evaluation activities conducted between fiscal years 2015 and 2016—in its State of the Evidence report. However, CNCS has not conducted a similar analysis or issued a similar report since that time. Moreover, the assessment did not cover all of the agency’s activities. While the report included evidence related to its programs, CNCS did not assess evidence related to other activities, such as internal management functions including information technology or human capital management. We identified instances in which effective coordination helped selected agencies better manage their fragmented evidence-building activities. For example, the U.S. Agency for International Development (USAID) developed an agency-wide Private Sector Engagement learning agenda, published in May 2019. This learning agenda is intended to guide and coordinate crosscutting efforts to develop evidence of effective approaches for engaging the private sector to help partner countries meet development goals and ultimately move beyond the need for foreign assistance. This learning agenda includes establishing performance measures to monitor progress on engagement with the private sector, and further evaluate the results of its activities. The coordinated evidence- building approach established by this learning agenda can help USAID better focus limited resources on building new evidence in this crosscutting area for use across the agency, thereby reducing any unwarranted overlap or duplication of effort. Effectively-coordinated processes can help agencies ensure they are comprehensively and systematically looking across their organizations to leverage their existing evidence and focus limited resources on building new evidence. They can also help agencies manage their fragmented evidence-building activities to improve effectiveness and reduce the potential for any unwarranted overlapping or duplicative efforts. Such processes can help ensure agencies are well positioned to meet forthcoming Evidence Act requirements related to assessing and prioritizing evidence across the entire agency. Each of the five selected agencies established a similar approach for assessing existing evidence and identifying gaps or other evidence needs across the agency. Agency officials said that these approaches responded to OMB guidance for agencies to conduct annual strategic reviews. Specifically, in its guidance for implementing the GPRA Modernization Act of 2010, OMB established an annual process in which each agency is to review progress in achieving strategic objectives— goals that reflect the outcome or impact the agency is seeking to achieve—established in its strategic plan. According to OMB’s guidance, as a part of those reviews, the assessment of existing evidence should inform agency decisions about where to focus limited available resources to build new evidence to fulfill any identified needs. OMB’s guidance encourages agencies to leverage existing decision- making processes, such as the budget development process, to implement these reviews. Each of the five selected agencies conducts strategic reviews and associated evidence assessments in similar ways, through a variety of existing decision-making processes: CNCS and HHS use their budget formulation processes; Education incorporates strategic objective reviews into existing quarterly reviews of progress in meeting goals; DOL uses a stand-alone strategic review process; and USAID leverages an existing review process conducted at lower levels (i.e., its missions). Officials at selected agencies identified instances in which they used their agency strategic reviews to (1) assess a variety of existing sources of evidence—a portfolio of evidence—to determine progress toward a strategic objective, and (2) identify the need for additional evidence, as illustrated by the following examples. Assessing a portfolio of evidence. DOL’s guidance for its strategic review process directs its component agencies to assess a variety of evidence sources to determine results and risks or challenges that may affect future outcomes. This includes performance information, program evaluations, risk assessments, and findings from reports by us and the department’s Office of Inspector General (OIG), among other sources. In its fiscal year 2018 Annual Performance Report, DOL identified different sources of evidence to demonstrate the effectiveness of some of its programs, and challenges related to others, for its strategic objective to create customer-focused workforce solutions for American workers. For example, it cited statistics and performance data to provide context and some quantitative results related to this objective. It also shared the results from several program evaluations, including a 2017 impact evaluation that suggested DOL’s Adult and Dislocated Worker programs were effective at increasing participants’ earnings and employment. DOL’s performance report also highlighted that its OIG identified aspects of several programs that support this objective as Top Management and Performance Challenges for Fiscal Year 2018. One of those challenges related to maintaining the integrity of Foreign Labor Certification Programs. DOL’s performance report stated that balancing the quality review of applications with employers’ needs for timely processing has been a challenge for years. Based on the totality of evidence, DOL identified this strategic objective as a focus area for improvement for fiscal year 2018. Identifying evidence needs. In its Strategic Plan for Fiscal Years 2018-22, Education established a strategic objective to increase high- quality education options and empower students and parents to choose an option that meets their needs. To implement this strategic objective, the strategic plan states that the department will encourage state and local education agencies to expand school choice by administering programs that increase education options, such as the Charter Schools Program (CSP). One of the performance measures Education uses to assess the program and progress on this strategic objective is the aggregate number of charter schools that are open, operating, and supported by CSP. Education officials told us that they identified limitations with this measure through the department’s strategic review process, and the need for additional evidence. As an aggregate count, the measure did not allow the department to accurately identify underlying changes in individual charter schools served by the program or the results and activities of CSP. For example, Education officials set a goal to increase the number of CSP-supported charter schools by 150 for the 2017-2018 school year. However, Education reported a decrease of four charter schools for this time period. To better understand CSP’s performance, Education officials told us they needed additional evidence to assess other aspects of the program’s performance. Education officials identified additional sources of evidence within the department that they could use to understand the program’s performance. These included statistics from Education’s National Center for Education Statistics (NCES) on the total number of charter schools that opened and closed over the same time period, and annual performance reports from grantees. According to information on Performance.gov, these additional sources of information showed that, in the 2017-2018 school year, 134 new charter schools supported by CSP opened, and 101 charter schools expanded under a CSP grant. These actions illustrate an instance of effective coordination of evidence- building activities to manage fragmentation and reduce the risk of duplication. Education officials looked across the agency and leveraged existing evidence generated by different organizational units—CSP and NCES—to better understand program performance. Had this not occurred, CSP might have collected data that duplicated what was already generated by NCES. Agencies’ assessments of the sufficiency of their existing evidence— conducted via processes for their strategic reviews—reflect the four leading collaboration practices. Although OMB’s guidance provides flexibility in how the reviews are conducted, it also sets specific expectations for who should lead the process, who should participate in the process, and the types of roles and responsibilities for these individuals. Table 1 provides illustrative examples of the selected agencies’ evidence assessment processes that reflect leading practices for collaboration. Unlike the similar processes they use for assessing existing evidence and identifying needs, the five selected agencies use a variety of processes to prioritize new evidence to generate. Agency officials told us that much of this prioritization takes place at lower organizational levels. For example, at HHS, the department’s component agencies—11 operating divisions and 14 staff divisions—generally lead their own evidence-building processes, through which they prioritize which evidence to generate. Officials from HHS’s Office of the Assistant Secretary for Planning and Evaluation told us that this decentralized model is due to the size and complexity of the department, and that it respects the unique needs of the divisions. According to these officials, a 2017 review by this office found variation in the processes that the components use for this purpose. HHS officials said that most components prioritize their evidence needs through their budget formulation processes. Officials at each of the selected agencies identified one or more processes intended to coordinate the prioritization of evidence needs across the entire organization. Table 2 describes these processes. We identified instances in which officials used these processes to more effectively focus limited resources to build new evidence through coordination across the agency. For example, CNCS officials described an instance in which agency leadership used the agency’s budget formulation process to prioritize evidence-building activities to address knowledge gaps about the AmeriCorps National Civilian Community Corps (NCCC) program. According to CNCS officials, through the agency’s evidence assessment processes, they found that the agency did not have evidence to fully assess the impact of NCCC programs on members and communities. Moreover, existing evidence showed that NCCC had experienced a decline in the number of qualified applicants and the retention of its members since 2014. To better understand the performance and results of this program, CNCS officials told us that agency leadership approved funding in fiscal years 2018 and 2019 for NCCC to undertake a multi-year impact evaluation. This evaluation, which is being conducted in conjunction with CNCS’s Office of Research and Evaluation and an independent contractor, is expected to examine the member retention, leadership development, and community impact of NCCC programming. Officials at each of the selected agencies told us that they were considering how best to meet Evidence Act requirements to take a systematic and coordinated approach to prioritizing evidence-building activities, such as through learning agendas. For example, as described in table 3, Education created a new body in March 2019—the Evidence Leadership Group—to coordinate its evidence-building activities. Education officials told us that in establishing this new group, they took into consideration our leading practices for collaboration. As described in table 3, all five selected agencies identified one or more leadership models for their evidence prioritization processes. We found that all five of the selected agencies involved at least some relevant participants in their evidence prioritization processes, as summarized in table 4. Our past work related to evidence-building activities identified a wide range of relevant participants to involve. Within agencies, these participants include agency leadership, program staff, and those with functional management responsibilities including budget, human capital, and information technology. External stakeholders include Congress, other federal agencies, state and local governments, grant recipients, and regulated entities. The five selected agencies include a range of relevant internal participants, although the evidence prioritization process at CNCS does not always include key internal stakeholders. CNCS’s budget hearings involve discussions about prioritizing evidence, but primarily focus on budget formulation decisions. Therefore, agency leaders and budget officials are consistently involved in the hearings, but others, such as the Director of the Office of Research and Evaluation, are not. Involving all key internal stakeholders helps ensure that those involved in a collaborative effort can commit resources, make decisions, and share their knowledge, skills, and abilities. This can also help ensure that the evidence that will be subsequently generated will be useful to decision makers across the organization. Education and USAID established expectations to seek input from external stakeholders in their evidence prioritization processes. Education’s charter for its recently-established Evidence Leadership Group states that the group is to engage a wide array of external stakeholders in its work. Similarly, for the evidence prioritization activities that occur through USAID’s program cycle and learning agendas, related guidance sets expectations to involve or obtain the perspectives of external stakeholders. As USAID developed its Self-Reliance learning agenda, it sought input from external stakeholders including officials from other federal agencies, organizations that implement USAID programs, and experts in international development, among others. Three of the selected agencies, however, do not always have mechanisms in place to involve, or consider the evidence needs of, a range of external stakeholders in their evidence prioritization processes. Officials at CNCS, HHS, and DOL told us that, because they consider their prioritization processes to cover internal management purposes and decisions, including external stakeholders is not appropriate. Officials at these three agencies described ways in which they sought input on evidence needs from some stakeholders, such as from interactions with grant recipients and external researchers. However, these agencies have not developed an approach to collect and consider input on evidence needs from all relevant stakeholders to inform their prioritization processes. Our past work highlights the importance of engaging key external stakeholders, especially Congress, to better understand and meet their evidence needs. Engaging external stakeholders can also create a shared understanding of competing demands facing the agency and ensure that their efforts and resources are targeted at the highest priorities across the agency. Moreover, through this engagement, agencies may find that external stakeholders have, or are aware of, existing evidence that helps the agency meet its needs or provide a fuller picture of performance. Involving a full range of relevant stakeholders in the process for prioritizing new evidence to generate would help each of the selected agencies ensure it is meeting the evidence needs of decision makers within and external to the agency. Four of the selected agencies—Education, HHS, DOL, and USAID—fully define roles and responsibilities for those involved in their evidence prioritization processes, while the process at CNCS partially reflects this practice, as described in table 5. CNCS officials said that the primary focus of the agency’s process is budget formulation. Therefore, roles and responsibilities are generally related to that purpose instead of the evidence prioritization activities that also take place during that process. Clearly defining roles and responsibilities can ensure all participants are aware of and agree upon (1) who will have what responsibilities, (2) how they will organize their joint and individual evidence-building efforts, and (3) how they will make decisions. As described in table 6, Education and USAID’s processes reflect this practice, while those at CNCS, DOL, and HHS reflect it in part. Officials at CNCS, HHS, and DOL gave different reasons for why their written guidance and agreements related to evidence prioritization processes do not fully reflect this leading practice. CNCS’s and HHS’s written guidance primarily focuses on their budget formulation processes, since this is where their evidence prioritization activities take place. Thus, these guidance documents contain information on leadership, participants, and roles and responsibilities related to budget formulation activities, but not all relevant details related to evidence prioritization. Officials at DOL stated that they do not want to take a “one-size-fits- all” approach to developing learning agendas within the department. They told us they had not developed specific written guidance for that process to provide flexibility to component agencies to develop processes that work best for them in developing their learning agendas. As we have previously found, documenting a clear and compelling rationale to work together—and how that work will be done and by whom—is a key factor in successful collaboration. By incorporating this leading practice into their existing guidance, CNCS, HHS, and DOL would have greater assurance that they are effectively collaborating to prioritize evidence needs. Decision makers need evidence to help them address pressing governance challenges faced by the federal government. Agencies undertake a range of efforts at different organizational levels to build evidence to meet their own decision-making needs, as well as those of others, such as Congress. However, these evidence-building activities are fragmented within agencies. Through a more comprehensive and coordinated framework, Evidence Act implementation provides opportunities to improve the effectiveness of federal evidence-building activities. The five selected agencies have taken steps to improve the coordination of evidence-building activities across their organizations, with Education’s and USAID’s evidence-building activities reflecting the leading practices for collaboration. CNCS, DOL, and HHS would have greater assurance that they are comprehensively considering evidence needs across their individual organizations by fully incorporating leading collaboration practices into their agency-wide efforts to prioritize new evidence to generate. These actions could also help ensure these agencies are better managing fragmented evidence-building activities and more effectively focusing their limited resources to generate evidence to meet decision makers’ needs. In addition, improved coordination could reduce the potential for any unwarranted overlap and duplication in their efforts, and better position the agencies to meet the Evidence Act’s requirements and related implementation actions outlined in OMB’s guidance. We are making a total of seven recommendations, including three to CNCS, two to HHS, and two to DOL. Specifically: The Chief Executive Officer of CNCS should develop an approach to ensure that all relevant participants are involved in the agency-wide process for prioritizing evidence needs. (Recommendation 1) The Chief Executive Officer of CNCS should define roles and responsibilities for all relevant participants involved in the agency-wide process for prioritizing evidence needs. (Recommendation 2) The Chief Executive Officer of CNCS should revise written guidance for the agency-wide process for prioritizing evidence needs to ensure it identifies all relevant participants and their respective roles and responsibilities. (Recommendation 3) The Secretary of Health and Human Services should develop an approach to ensure that all relevant participants are involved in the department-wide process for prioritizing evidence needs. (Recommendation 4) The Secretary of Health and Human Services should revise written guidance for the department-wide process for prioritizing evidence needs to ensure it identifies all relevant participants and their respective roles and responsibilities. (Recommendation 5) The Secretary of Labor should develop an approach to ensure that all relevant participants are involved in the department-wide process for prioritizing evidence needs. (Recommendation 6) The Secretary of Labor should revise written guidance for the department-wide process for prioritizing evidence needs to ensure it identifies all relevant participants and their respective roles and responsibilities. (Recommendation 7) We provided a draft of this product for comment to OMB and the five selected agencies—CNCS, Education, HHS, DOL, and USAID. CNCS, Education, HHS, DOL and USAID provided written comments, which are summarized below and reproduced in appendixes V, VI, VII, VIII, and IX, respectively. In addition, CNCS, Education, HHS, USAID, and OMB provided technical comments, which we incorporated as appropriate. In its written comments, CNCS neither agreed nor disagreed with the three recommendations we directed to it. The agency stated that it believes the planned actions included in its Strategic Evidence Plan, published in September 2019, address those recommendations. The plan includes a goal to strengthen how the agency prioritizes and uses evidence, and outlines various actions intended to achieve that goal. The plan does not include sufficient details to enable us to assess the extent to which its implementation would fully address the issues identified in our review and covered by our recommendations. Education stated in its written comments that the department is committed to maximizing the performance of its programs, and it views building, using, and disseminating evidence as critical to those efforts. Education also outlined planned and proposed actions that it believes would further its evidence-building activities. In its written comments, HHS did not concur with the two recommendations we directed to it. In response to both recommendations, HHS stated that the department had developed an approach for including all relevant participants in its process for prioritizing evidence needs. However, according to an HHS official in November 2019, HHS had not yet finalized the approach, and therefore was unable to provide any additional information about it. Thus we could not assess the extent to which HHS’s stated actions would address our recommendations. DOL agreed with the two recommendations we directed to it, and in its written comments described an action it plans to take to address them. We will monitor DOL’s action, which we believe would likely address our recommendations, if effectively implemented. USAID, in its written comments, reiterated the agency’s commitment to a comprehensive and integrated approach for its evidence-building activities. In the draft of this report we sent to USAID for its review in October 2019, we included a recommendation to USAID that it ensure that all relevant participants are involved in agency-wide processes for prioritizing evidence needs. USAID subsequently provided documentation that it had not provided previously that showed the agency had taken various steps to seek the input of a range of external stakeholders. We determined that these actions addressed our draft recommendation. Thus, we removed the draft recommendation from our report. We are sending copies of this report to the appropriate congressional committees, the Director of the Office of Management and Budget, the Chief Executive Officer of the Corporation for National and Community Service, the Secretary of the Department of Education, the Secretary of the Department of Health and Human Services, the Secretary of the Department of Labor, the Administrator of the U.S. Agency for International Development, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or sagerm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix X. This report responds to a request that we review the coordination of federal evidence-building activities. This report (1) describes activities selected agencies have taken that align with congressional and Office of Management and Budget (OMB) direction to strengthen evidence- building, and (2) examines the extent to which selected agencies’ processes for assessing and prioritizing evidence needs reflect leading practices for collaboration. To address both objectives, we analyzed agency documents about federal evidence-building activities and interviewed relevant staff at OMB and officials at five selected agencies: the Departments of Education, Health and Human Services, and Labor; the Corporation for National and Community Service; and the U.S. Agency for International Development. We selected these five agencies based on their experiences incorporating evidence-building activities into program design and implementation. These experiences include evidence-based approaches such as pay for success projects, performance partnerships, and tiered evidence grants. At the time we made our selection, these five agencies had designed or implemented evidence-based approaches to a greater extent than other agencies we identified. The agencies we selected vary in size—as measured by budget authority and employees—and organizational structure (see table 7). For the first objective, we reviewed information from the five selected agencies and identified examples of evidence-building activities within each agency since 2010. We then determined if these examples illustrated actions that aligned with evidence-building statutory requirements and directions from OMB including guidance, memorandums, and activities outlined in the President’s Management Agenda. To do so, we reviewed relevant laws and OMB guidance. For the second objective, we evaluated processes each selected agency had established to take a coordinated approach to assessing and prioritizing evidence needs across the agency. We compared these processes to four selected leading practices for collaboration identified in our prior work (see table 8). We selected these four collaboration practices because our past work on evidence-building activities, such as analysis of performance information and program evaluations, has similarly identified them as key approaches related to evidence-building. Table 9 illustrates this alignment for selected past reports. We conducted this performance audit from April 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Office of Management and Budget (OMB) has issued several memorandums and other key policy documents that encourage agencies to take actions to strengthen their capacity to build evidence. For example, in a July 2013 memorandum, OMB encouraged agencies to identify proposals for building evidence in their budget requests. Such proposals could be used to improve existing programs or inform decisions about new programs. The OMB guidance highlighted several evidence- based approaches for agencies to consider, including pay for success, performance partnerships, and tiered evidence grants, described further in the text box below. Examples of Evidence-Based Program Approaches Identified in Office of Management and Budget (OMB) Guidance Pay for success. Pay for success is a contracting mechanism under which final payment is contingent upon achieving specific outcomes. The government specifies performance outcomes in pay for success contracts and generally includes a requirement that contractors assess program outcomes or impacts through an independent evaluation. The evaluators may also generate and analyze performance data to inform program management and improvement during implementation. Performance partnerships. Performance partnerships allow federal agencies to provide grant recipients flexibility in how they use funding across two or more programs along with additional flexibilities. In exchange, the recipient commits to improve and assess progress toward agreed-upon outcomes by developing and using evidence. Tiered evidence grants. Tiered evidence grants seek to incorporate evidence of effectiveness into grant making. Federal agencies establish tiers of grant funding based on the level of evidence grantees provide on their approaches to deliver social, educational, health, or other services. The grant generally requires grantees to evaluate their service models as a condition for the receipt of grant funds. In addition, Congress passed laws aimed at strengthening and better coordinating evidence-building activities, which OMB reinforced through related guidance to implement those laws. GPRA Modernization Act (GPRAMA). GPRAMA established a framework aimed at taking a more crosscutting and integrated approach to improve government performance. Requirements included in that framework, such as cross-agency priority (CAP) goals and strategic reviews, were intended to strengthen evidence-building activities and improve coordination. CAP goals. At least every 4 years, OMB is to coordinate with other agencies to develop and implement CAP goals. These goals are to address issues in a limited number of policy areas requiring action across multiple agencies, or management improvements that are needed across the government. The President’s Management Agenda, released in March 2018, established the third set of CAP goals since GPRAMA was enacted. Implementation of each CAP goal can involve evidence-building activities; however, two goals in particular are to focus on them, as described further in the text box. Cross-Agency Priority (CAP) Goals Focused on Evidence-Building Leveraging data as a strategic asset. The President’s Management Agenda highlights several root causes for the challenges the federal government faces. One root cause is that agencies do not consistently apply data-driven decision-making practices. This agenda states that agencies need to make smarter use of data and evidence to orient decisions and accountability around service and results. The administration established this CAP goal to improve the use of data in decision- making to increase the federal government’s effectiveness. Results-oriented accountability for grants. According to the June 2019 update for this goal, the federal government uses grants to invest approximately $700 billion each year in mission-critical needs. However, the report states that grant managers report spending 40 percent of their time using antiquated processes to monitor compliance instead of analyzing data to improve results. The administration established this CAP goal to maximize the value of grant funding by applying a risk- based, data-driven framework that balances compliance requirements with demonstrating successful results. A strategic objective is a type of goal that reflects the outcome or impact the agency is seeking to achieve. The agency is to identify the strategies—the portfolio of organizations, regulations, tax expenditures, programs, policies, and other activities—within and external to the agency that contribute to each strategic objective. As a set, the agency’s strategic objectives are to encompass all of its activities. Strategic reviews. In its guidance for implementing GPRAMA, OMB established an annual process in which each agency is to review progress in achieving the strategic objectives established in its strategic plans (see sidebar). To do so, OMB’s guidance directs agencies to assess existing sources of evidence to understand the progress made toward each strategic objective and identify where additional evidence is needed to determine effectiveness. In addition, OMB’s guidance states that another purpose of strategic reviews is to strengthen collaboration. It notes that the reviews can do so by identifying and addressing crosscutting challenges and fragmentation. The Foreign Aid Transparency and Accountability Act of 2016 (FATAA). Among other things, FATAA requires the President to establish guidelines for establishing measurable goals, performance metrics, and monitoring and evaluation plans for federal foreign assistance. In January 2018, OMB issued guidelines for federal agencies that administer foreign assistance—which includes the Departments of Labor and Health and Human Services, and the U.S. Agency for International Development. Among other things, the guidelines provide direction on strengthening evidence-building activities, such as establishing annual monitoring and evaluation plans, and disseminating findings and lessons learned. Agencies were directed to align their monitoring and evaluation policies with the guidelines by January 2019. The Foundations for Evidence-Based Policymaking Act of 2018 (Evidence Act). In June and July 2019, OMB released its initial guidance on implementing the Evidence Act. Among other things, this guidance provides direction to agencies on developing evidence-building plans, also known as learning agendas (see text box below). According to OMB, these plans will serve as the driving force for other evidence- building activities required by the Evidence Act. Prior to the enactment of the Foundations for Evidence-Based Policymaking Act (Evidence Act), both the Office of Management and Budget (OMB) and the Commission on Evidence-Based Policymaking highlighted and recommended the use of learning agendas by federal agencies to strengthen and coordinate their evidence- building activities. According to OMB’s guidance for implementing the Evidence Act, a learning agenda is to define and prioritize relevant questions and identify strategies for building evidence to answer them. A federal agency developing a learning agenda should involve key leaders and stakeholders to help (1) meet their evidence needs for decision-making, and (2) coordinate evidence-building activities across an agency. OMB’s guidance stated that the Evidence Act emphasizes the need for collaboration and coordination of agency staff and activities to achieve successful implementation. The guidance provides time frames for a phased approach to implement several Evidence Act requirements. For example, although learning agendas are not required to be published until February 2022, OMB’s guidance includes several interim milestones and deliverables to build toward the final published version. 5 U.S.C. §§ 306, 312. OMB embedded portions of Evidence Act implementation guidance in its 2019 update to Cir. No. A-11. In it, OMB noted that many of the Evidence Act’s provisions support the Federal Performance Framework for Improving Program and Service Delivery (Part 6 of the Circular), which provides guidance for implementing GPRAMA and other related laws and policies. OMB Cir. No. A-11, at § 200.2 (2019). We identified 20 examples of the five selected agencies’ incorporating evidence-based approaches in their program design and implementation. Table 10 describes each of these examples. OMB’s July 2013 memorandum stated that agencies’ use of evidence- based approaches could help strengthen agencies’ abilities to improve program performance by using experimentation and innovation to test new approaches for service delivery. In addition, it noted that these approaches can be used to (1) generate new knowledge, and (2) apply existing evidence about approaches found to be effective. Generate new knowledge. OMB guidance notes that new knowledge can be used to improve existing programs or inform decisions about new ones. For example, Education designed the First in the World program to generate evidence about effective strategies for improving college completion rates for underrepresented, underprepared, or low-income students. Program officials told us that, prior to the issuance of the 2014 grant solicitation for the program’s first year, Education had limited evidence of effective approaches. As noted in the solicitation, Education sought to expand its evidence base about effective approaches through the first round of grant awards. Using a tiered evidence approach, the program awarded grants to institutions of higher education to implement and evaluate the effectiveness of approaches, such as coaching or advisement services, intended to increase the number of these students who complete postsecondary education. The first round awarded grant funds to projects in a single evidence tier to test and evaluate the effectiveness of approaches. Education officials told us that after the program’s first year, they conducted a literature review to identify approaches that were supported by some evidence of their effectiveness. Using this evidence, Education created a second tier for the 2015 grant awards, for which grantees could receive increased funding by implementing one of the program designs identified in the literature review. Officials told us they intend to publish the final results of First in the World grant recipient evaluations in Education’s What Works Clearinghouse. Evaluation results will not be available until after the completion of the grant periods, the first of which ended in September 2019. However, Education officials told us that the evidence they have generated to date has improved their understanding of services that could potentially help at-risk students complete post-secondary education. Apply effective approaches. To meet increased demand for services in a constrained resource environment, OMB’s guidance encourages agencies to allocate resources to programs and approaches backed by strong evidence of effectiveness. In addition, OMB’s guidance encourages agencies to “scale up” effective program approaches by expanding them to a larger or different group of recipients. For example, USAID created the Development Innovation Ventures program in 2010 as a tiered evidence grant competition to create a portfolio of innovative approaches to reducing global poverty. This program provides funding in three tiers, with greater funding provided to those approaches with greater evidence of effectiveness. These three tiers (which USAID referred to as stages) were as follows: 1. Proof of concept. The program provided smaller grants to test the viability of an innovative approach; 2. Testing and positioning for scale. Grantees determined, through rigorous assessments, whether their approach could achieve greater results and also be implemented successfully at a larger scale; and 3. Scaling. The program funded the expanded implementation of an effective approach within one country or replicated that approach in another country. For example, from 2013 to 2015, the Development Innovation Ventures program awarded stage two funding to a nonprofit organization in India. The organization designed a methodology to help primary school students improve reading skills by grouping students according to skill level, instead of age or grade and tailoring lessons to their learning level. Evidence generated through randomized control trials showed that the approach was effective. Based on that evidence, in 2017, the program awarded stage three funding to replicate the approach in Zambia. Earlier in this report, we discussed agency-wide evidence assessment and prioritization processes established by the five selected agencies. In addition to those processes, officials described other actions they have taken to coordinate fragmented evidence-building activities across organizational levels (see table 11). Some of these actions were ad hoc (i.e., they did not occur regularly) or not comprehensive in nature (i.e., they did not focus broadly across different sources of evidence or did not cover the entire agency). In addition to the above contact, Benjamin T. Licht (Assistant Director), Daniel Webb (Analyst-in-Charge), Amanda Prichard, Kelly Turner, and Brian Wanlass made significant contributions to this report. Valerie Caracelli, Jacqueline Chapin, Ann Czapiewski, Steven Putansu, and Andrew J. Stephens also made key contributions.", "summary": "Congress and OMB have taken steps intended to strengthen federal evidence-building activities. In September 2017, a federal commission found that agencies had uneven capacity to support, or did not fully coordinate, a full range of evidence-building activities. GAO was asked to examine the coordination of federal evidence-building activities. This report (1) describes selected agencies' actions that align with direction from Congress and OMB to strengthen evidence-building activities and (2) examines the extent to which selected agencies' processes for coordinating those activities reflect leading practices for collaboration. To address these objectives, GAO reviewed documents and interviewed officials about federal evidence-building activities at five selected agencies. GAO selected these agencies based on the greater number of experiences they had in comparison to other agencies incorporating these activities into the design and implementation of certain programs. GAO assessed their coordination of these activities against four leading practices for collaboration identified in GAO's past work. Federal decision makers need evidence about whether federal programs and activities achieve intended results as they set priorities and consider how to make progress toward national objectives. The five agencies GAO reviewed took actions that align with direction from Congress and the Office of Management and Budget (OMB) to strengthen their evidence-building activities. The five agencies are: the Departments of Education, Health and Human Services (HHS), and Labor (DOL); the Corporation for National and Community Service (CNCS); and the U.S. Agency for International Development. For example, based on a statutory requirement, a majority of grant funding for HHS's Maternal, Infant, and Early Childhood Home Visiting program is to be used for home visiting models with sufficient evidence of their effectiveness. Consistent with this requirement, HHS annually assesses evidence, such as the results of program evaluations, to identify effective home visiting models that grantees can implement. Evidence-building can involve assessing existing evidence, identifying any new evidence needs, and prioritizing when to fulfill those needs. These efforts are fragmented within each of the five agencies—that is, each has multiple organizational units with responsibilities for evidence-building. For example, DOL has established separate units responsible for different sources of evidence—evaluations, performance information, and statistics. Effective collaboration can help agencies manage this fragmentation, and lead to improved results. ; (3) clarifying roles and responsibilities ; and (4) documenting that information in written guidance . However, agencies' processes for determining which new evidence to generate, when, and how (i.e., prioritizing new evidence) did not always reflect the leading practices (see figure). GAO is making a total of seven recommendations to DOL, CNCS, and HHS to better reflect leading collaboration practices in their evidence prioritization processes. DOL concurred, CNCS neither agreed nor disagreed, and HHS did not concur with the recommendations. CNCS and HHS stated, but did not provide information to support, that each had already taken relevant actions. GAO continues to believe the recommendations are valid, as discussed in the report.", "document_type": "gao"}
{"report": "Federal agencies’ fleets consist of many types of vehicles that support a variety of purposes. For example, federal vehicles may be used to carry staff and gear to remote, off-road locations to perform maintenance or other tasks; to transport and provide healthcare to veterans; or to support daily operations on military installations. Congress and several administrations have required federal agencies to take various steps to reduce federal fleets’ petroleum use and greenhouse gas emissions. During fiscal year 2017, agencies were: to meet requirements to acquire alternative fuel vehicles and low greenhouse-gas-emitting vehicles; to increase use of alternative fuel; and to decrease use of petroleum and per-mile greenhouse gas emissions (see table 1). According to DOE guidance for the 2015 Executive Order, acquiring such vehicles and increasing the use of alternative fuels can facilitate the goals of reducing both petroleum use and greenhouse gas emissions. For fiscal year 2017, in addition to meeting the above requirements, federal agencies were to meet other requirements related to overall fleet management. Federal regulations require agencies to complete a fleet management plan annually and conduct an assessment of their fleet at least every 5 years. In addition, an Executive Order issued by the prior administration in 2015 directed agencies to determine and plan for their optimum fleet inventory with emphasis placed on eliminating unnecessary or non-essential vehicles. Certain federal fleet energy directives in place in fiscal year 2017 were revoked by an Executive Order issued in May 2018. Specifically, directives related to acquiring zero emission (electric) vehicles and reducing per-mile greenhouse gas emissions, as well as the additional fleet management expectations, were revoked. The Trump administration issued a new Executive Order requiring that the Secretary of Energy, in collaboration with other federal agencies, review existing federal vehicle fleet requirements and report to the Council on Environmental Quality (CEQ) and the Office of Management and Budget (OMB) regarding opportunities to optimize federal fleet performance, reduce associated costs, and streamline reporting and compliance requirements. According to DOE officials, DOE submitted a report to CEQ and OMB as required. In April 2019, CEQ and OMB issued implementing instructions for the Executive Order. The implementing instructions emphasized that agencies should focus on the statutory requirements while increasing efficiency, optimizing performance, and reducing waste and costs. The guidance particularly emphasized agencies’ focus on reducing petroleum use and increasing alternative fuel consumption. The guidance did not mention the extent to which agencies should continue to acquire any specific type of alternative fuel vehicle. Annually, federal agencies are responsible for reporting vehicle inventory (including acquisitions and disposals), fuel consumption, mileage, and cost to the FAST database. Additionally, federal agencies are required to annually report on their fleets’ inventories, operating costs, and other fleet data. Costs submitted to the FAST database include acquisition costs, maintenance, fuel costs, indirect costs, commercial lease, GSA lease, and disposal proceeds. Prior to fiscal year 2017, agencies submitted this data at an aggregate, rather than the vehicular level, so that costs or other performance could not be analyzed at the vehicular level. For fiscal year 2017, as required by GSA and DOE, agencies began submitting vehicular level data to the FAST database, providing more detail about agency’s vehicles. The FAST database specifically tracks data to assess agencies’ performance relative to fleet energy requirements in federal statute and executive orders. A range of vehicles qualify as alternative fuel vehicles (see fig. 1). This range includes vehicles that run entirely on alternative fuel, such as electricity, and dual-fueled vehicles that can run on an alternative fuel as well as on gasoline, such as flex-fuel vehicles, which can run on gasoline or ethanol fuel blends (E85). In 2008, the definition of alternative fuel vehicles was amended to include hybrid electric vehicles, which run on gasoline with help from an electric battery, and, in certain circumstances, other vehicles that would achieve a significant reduction in petroleum consumption, such as highly fuel efficient gasoline vehicles that are also low greenhouse gas-emitting vehicles. Alternative fuel vehicles, including electric vehicles, can offer environmental benefits compared to similarly-sized conventional petroleum-fueled vehicles but also carry their own environmental costs. For example, flex-fuel vehicles, if fueled by E85, reduce petroleum use because E85 consists of up to about 85 percent ethanol, and according to DOE, using ethanol as a vehicle fuel reduces greenhouse gas emissions, along with emission of other harmful toxics. However, using ethanol increases other harmful emissions deemed carcinogenic and may also contribute to ozone formation. Furthermore, as we reported in May 2019, the production of biofuels, such as ethanol, just like the production of gasoline, results in greenhouse gas emissions throughout its life- cycle—including growing the corn feedstock, transporting it, converting it to ethanol, distributing the ethanol, and burning it in an engine. Other emissions are released indirectly through broad economic changes associated with increased biofuel use, including increased ethanol use, such as when changes in land use to grow corn cause the conversion of previously nonagricultural lands into agricultural lands. Nonetheless, recent studies have found the life-cycle emissions of corn ethanol to be lower than those of gasoline. Similarly, battery-electric, plug-in hybrid electric, and hybrid-electric vehicles rely on batteries for all or some of their power, reducing or eliminating petroleum use and associated tailpipe greenhouse gas emissions, but charging, producing, and disposing of these batteries can result in environmental effects. With respect to charging, the production of electricity to power these vehicles results in emissions, the amount of which is dependent on the source of the electricity, a factor we discuss in greater detail later in this report. With respect to production, GAO previously reported that extracting lithium and other minerals from locations where it is abundant, such as in South America, can pose environmental challenges that would damage the ecosystems in these areas. With respect to disposal, according to DOE’s alternative-fuels data center, the disposal of batteries used in electric and hybrid-electric vehicles can result in hazardous materials entering the waste stream— but work is under way to develop battery recycling processes that minimize the life-cycle effects of such batteries. According to DOE, as electric-drive vehicles become increasingly common, the battery-recycling market may expand. In addition, the climate in which battery-electric and plug-in electric vehicles are used can affect the life of the battery. However, federal agencies do not collect the data that would allow analysis of these effects specific to the use of vehicles in federal agencies’ fleets. Furthermore, emissions related to fuel production or battery production or disposability are not incorporated into the requirements placed on federal agencies with respect to their fleets. As we discuss in more detail later, the various types of alternative fuel vehicles vary in the extent to which they can help agencies meet existing requirements to reduce petroleum use and the subsequently revoked requirement in place for fiscal year 2017 to reduce tailpipe greenhouse gas emissions. According to DOE officials, DOE is responsible for overseeing energy goals and requirements and assists agencies in meeting these federal energy requirements. DOE tracks whether federal agencies are meeting the fleet energy requirements by analyzing the fleet inventory, fuel consumption, and fuel use data uploaded to the FAST database. DOE also oversees the Fleet Sustainability Dashboard (FleetDASH) database. FleetDASH tracks agencies’ fuel consumption through data produced when employees use fuel cards. This tool can track where vehicles are filling up and if there was an alternative fuel station nearby that could have been used. FleetDASH can also provide agency fleet managers with reports on alternative fuel use and when drivers missed opportunities to fuel with alternative fuels. DOE also issues guidance and conducts research into vehicle technologies that can support energy requirements, including electric vehicles. In prior work, we recommended that DOE develop guidance for agencies that specifies the elements that agencies should include in their plans for acquiring a mix of vehicles to meet federal requirements and goals. In June 2010, DOE issued the Comprehensive Federal Fleet Management Handbook, implementing this recommendation. DOE’s Fleet Management Handbook recommends to agencies how to develop greenhouse gas and petroleum reduction strategies and acquire vehicles in support of these strategies, among other issues. DOE also has developed online tools to help provide guidance to agencies and consumers on the fuel efficiency and environmental effects of vehicles. GSA is responsible for providing vehicles for federal agencies to purchase or lease. GSA is a mandatory source for purchase of new vehicles for executive agencies and other eligible users. Federal agencies can also use GSA to acquire leased vehicles. Under this arrangement, an agency informs GSA what kind of vehicle is necessary for its mission. Every year, GSA publishes an annual guide on vehicles available for purchase or lease that includes the vehicles’ fuel type, purchase and lease prices, size, and other specifications. In setting the lease prices, GSA is required by law to recover all costs it incurs in providing vehicles and services to federal customers. Agencies that lease vehicles from GSA generally pay a monthly rate and a mileage rate. These charges are designed to cover fixed costs such as: (1) the vehicle’s acquisition cost; (2) administrative costs (including staff and facilities); and (3) depreciation—as well as the variable costs of fueling (except electricity used) and vehicles’ maintenance. In the case of alternative fuel vehicles, if the cost of the vehicle is greater than that of an equivalent conventional vehicle, agencies must cover these higher costs. Pursuant to law, GSA distributes these higher costs for alternative fuel vehicles across the agency’s entire leased fleet via a flat per-vehicle monthly surcharge in the year the vehicle was acquired. Surcharges are set at the agency headquarters’ level. According to a GSA fact sheet, this approach allows GSA to offer a greater variety of alternative fuel vehicles without affecting lease rates of non-alternative fuel vehicles and spread the additional cost across all agencies. At times, GSA has conducted special pilot programs that have waived higher costs of alternative fuel vehicles in order to test new technology. For example, in 2011 and 2014, GSA ran two pilot programs that added over 300 electric vehicles and charging stations to the fleet. According to GSA officials, these pilots were designed to help GSA Fleet understand more about the performance, costs, and maintenance needs of electric vehicles to help them prepare for the potential increase in electric vehicles in the fleets in order to better advise other agencies on these vehicles’ use and operation. In these programs, GSA spent over $5.9 million covering the additional costs for the electric vehicles and spent another $1.2 million on purchasing electric-vehicle-charging stations. The majority of agencies subject to federal-fleet energy requirements reported meeting most requirements for fiscal year 2017 by changing the mix of vehicles acquired and improving fleet management. Specifically, agencies credited acquiring low greenhouse-gas-emitting and alternative fuel vehicles for helping to reduce petroleum use and per-mile greenhouse gas emissions. Agencies also described improving their fleet management in other ways, such as removing unnecessary vehicles and reducing miles traveled in order to reduce petroleum use and greenhouse gas emissions. Agencies’ fleets reflected increasing numbers of alternative fuel vehicles over the past 10 years, predominantly flex-fuel vehicles. DOE and other agency officials we spoke with from agencies that met the reduction targets for petroleum use and per-mile greenhouse gas emissions generally attributed their ability to meet these requirements to efforts in two areas: 1. acquiring low greenhouse-gas-emitting vehicles whenever they could (even if they did not meet the related requirement) as well as alternative fuel vehicles, and 2. improving fleet management in other ways, such as by eliminating unnecessary vehicles or driving fewer miles, in line with GSA’s fleet management guidance. In line with these efforts, a majority of agencies reported meeting most fleet energy requirements for fiscal year 2017 (see table 2). Fleet managers at two of the case study agencies said that acquiring low greenhouse-gas-emitting vehicles was key to their ability to meet the fiscal year 2017 targets for reducing petroleum use or greenhouse gas emissions. For example, although VA reported not meeting the low greenhouse-gas-emitting acquisitions requirement for fiscal year 2017, VA officials said that they did acquire low greenhouse gas vehicles when they could, and that to the extent they acquired such vehicles, it was the primary reason they were able to reduce their per-mile greenhouse gas emissions by 24 percent from fiscal year 2014 to fiscal year 2017. This reported reduction far exceeded the requirement for a 4 percent reduction in per-mile greenhouse gas emissions during this time frame. According to VA officials, VA’s acquisition process requires them to consider low greenhouse-gas-emitting vehicles for each acquisition and to select one whenever one is available that will meet the purpose for the vehicle. According to VA officials, the reason VA reported not meeting the low greenhouse-gas-emitting acquisitions requirement for fiscal year 2017 was that the agency did not consistently self-certify for exceptions to the requirement in cases where there was no low greenhouse-gas-emitting vehicle available that met their mission needs, an issue we also heard from GSA officials. (As shown in table 2, above, this was the one fleet- energy requirement that was reported as being met by less than a majority of the 29 agencies, with 8 reporting meeting this requirement for fiscal year 2017). Fleet managers at all of our case study agencies emphasized that they sought to acquire low greenhouse-gas-emitting vehicles whenever one was available that would serve their needs. GSA officials told us agencies are acquiring significant numbers of low greenhouse gas vehicles. By their count, of the sedans agencies acquired in fiscal year 2018, 92 percent were low greenhouse-gas-emitting vehicles; of the light-duty sport-utility vehicles and trucks agencies acquired, 45 percent were low greenhouse-gas-emitting vehicles. GSA officials stated that according to their analysis, it is likely that the low number of low greenhouse gas vehicles being reported is a result of how the vehicles are identified and reported, and that the number reported is lower than the number acquired. Vehicles considered to be low greenhouse-gas-emitting vehicles include selected makes and models of conventionally fueled vehicles that were identified by EPA as highly efficient, as well as different types of alternative fuel vehicles, such as selected makes and models of flex fuel vehicles, plug-in hybrid electric vehicles, and hybrid electric vehicles, and all battery electric vehicles. Thus, the costs of vehicles considered to be low greenhouse-gas-emitting vary widely. We discuss later in the report the costs of different types of alternative fuel vehicles. Along with the acquisition of low greenhouse- gas-emitting vehicles generally, fleet managers at some case study agencies stated that their acquisition and use of alternative fuel vehicles also helped them to meet the fiscal year 2017 targets for reducing petroleum and per-mile greenhouse gas emissions. Fleet managers at two agencies we spoke with stated or reported that their acquisitions of hybrid vehicles and, to a lesser extent, small numbers of plug-in hybrid and battery electric vehicles also helped managers to meet petroleum and greenhouse gas emissions reduction targets. According to Interior’s fiscal year 2015 Strategic Sustainability Performance Plan, over 1,300 hybrids helped the agency reduce petroleum consumption, increase fuel efficiency, and reduce greenhouse gas emissions. Within Interior, officials at the National Park Service told us that they replaced older, inefficient gas vehicles with more fuel efficient hybrids. EPA officials stated that acquiring hybrid vehicles and plug-in hybrid electric vehicles helped them exceed their per-mile greenhouse gas emission reduction target for fiscal year 2017 by just over 9 percent. Furthermore, of the 29 agencies we surveyed, 20 identified that a key benefit to acquiring battery-electric or plug-in hybrid electric vehicles was environmental, particularly in reducing greenhouse gas emissions. In addition, some fleet managers emphasized the role that flex-fuel vehicles fueled with E85 had played in their efforts to meet these targets. Some agencies told us that they acquired flex-fuel vehicles to meet alternative fuel vehicle acquisition requirements, and that using E85 in these vehicles contributed to reducing petroleum use and per-mile greenhouse gas emissions. For example, DOT’s fleet manager stated that DOT’s acquisition of flex-fuel vehicles and focus on using E85 to fuel those vehicles when available helped DOT to meet these targets for fiscal year 2017. Similarly, in the 2016 Strategic Sustainability Performance Plan, EPA emphasized that using alternative fuel in flex-fuel vehicles helped the agency reduce petroleum use. According to DOE officials, for agencies that met the fiscal year 2017 petroleum reduction target, about 11 percent of their petroleum reduction was due to using alternative fuel. According to DOE officials, the balance of petroleum reduction for these agencies was achieved through fuel efficiency improvements and behavioral changes, including reduction in vehicle miles traveled. In spite of the emphasis some agencies put on alternative fuel use as part of their strategy to reduce petroleum use and greenhouse gas emissions, alternative fuel use in federal fleets overall has dropped in recent years. According to data reported in FAST, while alternative fuel use increased from 4.9-million gasoline gallon equivalents in fiscal year 2005 to 16.2- million gasoline gallon equivalents in fiscal year 2013, since fiscal year 2013 it declined to 12.1-million gasoline gallon equivalents in fiscal year 2017 (see fig.2). The fleet energy requirement to increase use of alternative fuel by 10 percent is based on a fiscal year 2005 baseline, and most agencies reported continuing to meet this requirement. In fact, as a whole, the federal government could continue to decrease its alternative fuel use by as much as 6.7 million gasoline gallon equivalents and still meet the targeted 10 percent increase above the fiscal year 2005 baseline. While E85 was the primary alternative fuel used, according to DOE data, alternative fuel use per dual-fueled vehicle is also at comparatively low levels—decreasing between fiscal years 2012 and 2016 from 123 to 90 gasoline gallon equivalents. This decrease was despite DOE’s reporting that the number of dual-fueled alternative fuel vehicles with access to alternative fuel increased from about 80,000 vehicles to about 112,000 over the same period. DOE officials said agencies could be using more alternative fuel, but suggested the recent decline could be due to a general lack of available E85 stations, among other reasons. Fleet managers from all five case study agencies reported that their efforts to improve fleet management—even beyond those specifically related to acquiring alternative fuel vehicles—also helped them to reduce petroleum use and greenhouse gas emissions. Officials at several agencies reported in their Strategic Sustainability Performance Plans or told us that carrying out required fleet reviews helped them reduce the number of vehicles and change to more fuel-efficient vehicles, which directly helped them meet energy requirements. For example, EPA officials told us that through reviewing their vehicle usage, they identified which vehicles to either eliminate or replace with more efficient ones, moves that resulted in reducing petroleum use. Furthermore, in its 2017 Strategic Sustainability Performance Plan, EPA cited that it has reduced its fleet by 170 vehicles in the past 5 years and that its last study showed the potential to discontinue use of 80 to 100 vehicles in the next 5 years. Similarly, DOD reported in its fiscal year 2016 Strategic Sustainability Performance Plan that Army’s strategy to meet the requirement to reduce petroleum use was to reduce its fleet size and find the right mix of vehicles to meet its mission needs—in addition to acquiring fuel-efficient and alternative fuel vehicles. In this plan, Army reported that between fiscal year 2011 and fiscal year 2015, it reduced its fleet’s size by 16,400 vehicles. According to GSA officials, at times, an agency may reduce its petroleum use and greenhouse gas emissions more by replacing large, inefficient vehicles (such as older, large trucks) with more efficient vehicles (such as new small trucks or sedans) even if both are fueled by gasoline—than by replacing an already highly efficient conventionally fueled small sedan with an alternative fuel vehicle of the same size. Our review of FAST data suggests that agencies were more successful in reducing the number and size of their sedans and size of their sport utility vehicles than in reducing the number or size of their larger vehicles, such as vans and trucks (see fig. 3). For example, overall, the number of sedans in federal fleets fell by 4 percent from fiscal year 2013 to fiscal year 2017, with the number of larger sedans falling by 15 percent and the number of subcompact sedans increasing by 37 percent, suggesting that agencies moved to smaller, more efficient sedans. On the other hand, among passenger vans, there was an increase in heavier, medium-duty passenger vans, and an overall increase in trucks was fueled by an increase in medium- duty trucks, while the number of light-duty trucks fell. In addition to reviewing and changing fleets, fleet managers also reported that encouraging certain driver behavior helped them to meet energy goals. According to VA’s, Interior’s, and EPA’s fleet managers, agencies also reduced greenhouse gas emissions through educating or encouraging drivers to make behavioral changes such as reducing vehicle idling and overall miles traveled. For example, according to EPA fleet managers, certain regional offices have systems in place that facilitate their combining of motor pools and sharing trips to reduce petroleum use. As previously indicated, according to DOE officials, 11 percent of the reduction in petroleum use for agencies that met the petroleum reduction target was due to an increase in alternative fuel use. According to DOE officials, the balance of petroleum reduction for these agencies was achieved through fuel efficiency improvements and behavioral changes, including reduction in vehicle miles traveled. As a result of agencies’ efforts to meet federal fleet energy requirements, the number of alternative fuel vehicles in federal fleets has grown steadily over the past 10 years, largely due to an increase in flex-fuel vehicles. The number of alternative fuel vehicles in federal fleets increased by 65 percent from fiscal year 2008 through fiscal year 2017, according to FAST data (see fig. 4). During that same time, the number of conventional petroleum-fueled vehicles decreased by 19 percent. As a result, as of fiscal year 2017, alternative fuel vehicles made up about 38 percent of approximately 604,000 total domestic vehicles in the fleet. Most of the alternative fuel vehicles in the federal fleets—about 87 percent in fiscal year 2017—are flex-fuel vehicles. As previously mentioned, while flex-fuel vehicles can contribute to reducing petroleum consumption when E85 is used, data show that the usage of E85 continues to fall (see fig. 2), thus reducing the potential environmental benefits of acquiring these vehicles. While the majority of flex-fuel vehicles offered to federal agencies by GSA in fiscal year 2017 did not cost more for agencies to acquire than equivalent petroleum-fueled vehicles, some flex fuel vehicles did cost more for agencies to acquire, with, for example, a few sport-utility flex-fuel vehicles costing between $4,000 and $7,000 more than comparable vehicles. Within the past decade, the number of hybrid vehicles in federal fleets also increased significantly, from almost 1,800 in fiscal year 2008 to over 25,000 in fiscal year 2017. Hybrids accounted for about 11 percent of all alternative fuel vehicles in fiscal year 2017. Finally, while agencies have acquired some electric vehicles, the number of electric vehicles in federal fleets has remained very small—consisting of just over 1,000 plug-in hybrid electric and battery electric vehicles in fiscal year 2017. In spite of federal agencies’ reported general success in meeting fleet energy requirements, several challenges may hinder agencies’ further progress towards the goals of reducing federal fleets’ petroleum use and greenhouse gas emissions. First, although acquiring electric and hybrid vehicles could help agencies meet the current fleet energy goals to reduce petroleum use and per-mile greenhouse gas emissions in federal fleets, depending on where and how the vehicles are used, costs can be prohibitive. The costs of these vehicles and charging infrastructure make it challenging for agencies to acquire them on a large scale. Second, a lack of fuel and infrastructure availability limits agencies use of alternative fuel, specifically E85. Third, agency officials we interviewed stated that a continuing need for larger vehicles to perform certain tasks limits the number of low greenhouse gas vehicles agencies can acquire—and thus the potential to reduce petroleum use and greenhouse gas emissions. Acquiring electric and hybrid vehicles could help agencies meet fleet energy goals, but higher costs pose challenges. As described previously, prior to May 2018, federal agencies were under a directive to acquire zero-emission (electric) and plug-in hybrid electric vehicles for 20 percent of all new agency passenger vehicle acquisitions by December 31, 2020, and for 50 percent by December 31, 2025. Some of the discussions we had with agency officials about challenges related to acquiring electric vehicles took place while this directive was in effect. In part because guidance on the new Executive Order had not been issued at the time we spoke with them (although it was subsequently issued in April 2019), agency officials we spoke with after this directive was revoked said they were uncertain of the effect of the new Executive Order and would continue to try and meet fleet energy goals until new guidance was issued. Compared to other alternative fuel vehicles available from GSA, battery electric, plug-in hybrid electric, and hybrid electric vehicles can offer potential to further general federal goals to reduce petroleum use and tailpipe greenhouse gas emissions. Specifically, battery electric vehicles consume no petroleum and produce zero tailpipe greenhouse gas emissions, while plug-in hybrid electric vehicles have the potential to consume very little gasoline, with a correspondingly small amount of tailpipe greenhouse gas emissions from the gasoline used, and hybrid electric vehicles offer higher fuel economy than many other vehicles. According to DOE’s Fleet Management Handbook, replacing a petroleum- fueled vehicle with a battery electric vehicle provides a 100 percent reduction in that vehicle’s use of petroleum. In addition, according to DOE officials, for purposes of tracking agencies’ compliance with the now- revoked Executive Order’s fleet requirements, battery electric vehicles were considered emissions free, and plug-in hybrids were considered emissions free when run on electricity. The now-revoked fleet requirements did not consider emissions generated during the production of fuel or the manufacturing process. The Council on Environmental Quality guidance states that emissions generated from the production of electricity are not counted toward agencies’ fleet emissions because those emissions are assumed to be captured in each agency’s facility electricity reporting and their annual greenhouse gas data report. Counting them as fleet emissions would result in double counting. Nevertheless, to fully consider the potential environmental benefits of alternative fuel vehicles, these emissions would need to be considered and compared to the emissions generated by the production of fuel and manufacturing process of conventionally fueled vehicles. From a full life-cycle perspective, greenhouse gases emitted during the manufacturing of a vehicle affect a vehicle’s overall emissions. Accurately determining the amount of greenhouse gas emitted during the manufacturing of different types of vehicles is complicated, and we found no federal source that publishes this information. However, a study by the International Energy Agency found that manufacturing battery electric vehicles results in higher greenhouse gas emissions than manufacturing conventional internal combustion engine gasoline-fueled vehicles—but that over the typical life of an electric vehicle, the elimination of tailpipe emissions results in these vehicles having lower greenhouse gas emissions overall than conventional gasoline-fueled vehicles, with the amount of emissions savings depending on the carbon intensity of power generation used to charge the vehicles. Another study, by Argonne National Laboratory, considered mid-size light-duty vehicles. According to this study, on a life-cycle basis—including emissions related to the manufacture and disposal of the vehicles, the production of the fuel, and the use of fuel to operate the vehicle—hybrid electric vehicles produced about 25 percent fewer greenhouse gas emissions per mile than conventionally fueled gasoline vehicles, plug-in hybrid electric vehicles produced about 26 to 29 percent fewer greenhouse gas emissions per mile than conventionally fueled gasoline vehicles, and battery electric vehicles produced about 26 to 34 percent fewer greenhouse gas emissions per mile. The study also considered the life-cycle greenhouse gas emissions for flex fuel vehicles run on E85, finding them to produce about 20 percent fewer greenhouse gas emissions per mile than a conventionally fueled gasoline vehicle. This study also considered the costs of alternative fuel vehicles in light of their potential to reduce greenhouse gas emissions. It estimated that in 2013 dollars and, based on high volume production, a 15-year vehicle life-cycle, and a 5 percent discount rate, the greenhouse gas emissions avoided by using hybrid-electric vehicles compared to a conventional gasoline fueled vehicle cost $240 per metric ton. For plug-in hybrid electric vehicles, the cost is between $390 and $860 per metric ton of greenhouse gas emissions avoided, and for battery electric vehicles the cost is from $1,090 to $2,600 per metric ton of greenhouse gas emissions avoided. For flex fuel vehicles, the cost was estimated to be $170 per metric ton of greenhouse gas emissions saved. Based on these findings, when an agency replaces a petroleum fueled vehicle with a battery electric vehicle, a plug-in hybrid electric vehicle, or a hybrid electric vehicle, it can reduce its petroleum use and greenhouse gas emissions, though the extent of its reduction depends on the type of vehicle the agency acquires, and the type of vehicle it replaces, as well as many other factors. However, it may currently be paying more for such vehicles from a life-cycle perspective. In the time since this study was published, according to DOE, battery costs have continued to fall, and these vehicles may be cost competitive in the near future. For battery-electric vehicles and plug-in hybrid electric vehicles, which must be regularly charged from the electrical grid, one consideration included in the Argonne National Lab study’s analysis of how much greenhouse gasses are emitted through the vehicle’s operation is the level of greenhouse gas emissions associated with electricity generation. Such emissions affect the extent to which using electricity instead of gasoline to fuel vehicles reduces the amount of greenhouse gas emissions generated into the atmosphere—and this varies by location. While the Argonne National lab study described above based its analysis on the average mix of electrical generation in the U.S., the amount of greenhouse gas emissions associated with electricity generation in the U.S. actually varies widely depending on the sources used to generate the electricity. These sources vary depending on the region of the country where the electricity is produced. For example, the production of electricity from burning coal causes relatively high greenhouse gas emissions, while the production of electricity from solar or wind causes little to no greenhouse gas emissions. As a result, a battery electric vehicle charged in a region with low coal electricity generation, such as the Northeast—whose electricity generation mix includes about 2.6 percent coal—will result in greater greenhouse gas emissions reductions than those charged in regions where most electricity generation comes from coal, such as the upper Midwest, which uses about 62.3 percent coal (see fig. 5). These figures are meant to illustrate the differences in electricity generation, and they do not account for other factors that may affect vehicles’ efficiency and thus the extent to which they lead to reductions in emissions. For example, in extreme weather conditions, the range of battery-electric vehicles can be reduced, resulting in more frequent charging, and thus more electricity use. Further, the use of air conditioning or other components in the vehicle can also impact their fuel efficiency. We analyzed emissions data on vehicles operating in different parts of the country and found that when considering both tailpipe and fuel-production greenhouse gas emissions, electric and plug-in hybrid electric vehicles produce less greenhouse gas emissions than an equivalent gasoline-only vehicle in both higher-coal and lower-coal electricity generation regions. In higher-coal electricity generation regions, however, electric vehicles can offer less or about an equivalent reduction in greenhouse gas emissions to comparably-sized hybrid electric vehicles, whereas in lower- coal electricity generation regions, electric vehicles offer the opportunity to reduce greenhouse gas emissions by a greater extent than comparably-sized hybrid electric vehicles. In 2009, we recommended that DOE develop guidance to help agencies plan to acquire the right mix of vehicles that can meet requirements while also taking into account the energy sources used to generate the electricity used to fuel electric vehicles. In response, DOE issued guidance that recommended agencies consider, among other things, whether coal-based electricity is used in an area in order to evaluate the location and emissions-reduction potential of using such vehicles. However, of the five case study agencies we spoke to, no agency officials said that they specifically worked to locate electric vehicles where the production of electricity was likely to produce fewer greenhouse gases. Since greenhouse gas emissions due to the production of electricity were not considered in the now-revoked executive order’s requirements and, according to the case study agency officials, was not stressed by GSA in discussions about increasing electric vehicles, they stated that this had not been a focus of their efforts. Instead, they stated that they focused on locating electric vehicles where they were able to install electric charging stations and had a mission need that fit with the use of electric vehicles. According to some agency officials, the higher acquisition costs associated with electric vehicles and the costs of installing charging infrastructure have hindered the extent of their integration into federal fleets. (See app. III for a more detailed discussion of life-cycle costs of electric vehicles.) As part of an effort to further the overall goal of reducing greenhouse gas emissions, the now-revoked 2015 Executive Order called for agencies to increase their acquisition of zero-emission vehicles (battery-electric vehicles) or plug-in hybrid electric vehicles by 2020. While all five case study agencies had acquired small numbers of electric vehicles and associated charging infrastructure, two fleet managers said that the cost challenges would have made it difficult to acquire sufficient numbers of vehicles to meet the Executive Order’s requirements by 2020, had the Executive Order not been revoked. To meet the revoked electric-vehicle acquisition requirements, federal agencies would have had to acquire close to 3,000 battery electric or plug-in hybrid electric vehicles per year starting in 2020, according to GSA officials. According to data provided by GSA, in fiscal year 2017, agencies purchased 373 battery electric or plug-in hybrid electric vehicles. Just over half of these vehicles were plug-in hybrid electric minivans, with the rest being sedans. The purchase of these 373 battery electric or plug in hybrid electric vehicles, plus an additional 4,584 hybrid electric sedans, made up about 31 percent of the just over 16,000 sedans and minivans acquired that year—and increased the total amount agencies spent purchasing sedans and minivans by about $10.5 million (see table 3)—or about 3 percent of the total of approximately $314 million spent purchasing sedans and minivans overall. Among the hybrid electric, battery electric, and plug-in hybrid electric sedans and minivans, federal agencies purchased the largest numbers of hybrid- electric sedans, which had the smallest additional average per-vehicle costs as compared to comparably sized gasoline or flex-fueled vehicles. As a result, agencies spent an average amount of about $2,000 more per battery electric, plug-in hybrid electric, and hybrid electric vehicle acquired, although the average amount per vehicle varied widely by size and type of vehicle acquired. As described below, some of the higher acquisitions costs of these alternative fuel vehicles will be recovered due to lower maintenance and fuel costs of the vehicles over time. However, we were unable to get data on federal agencies’ actual lifecycle costs of these vehicles because, according to agency officials, agencies had not tracked these data consistently. Of the 29 agencies we surveyed, 11 identified acquisition costs as a challenge to acquiring and using electric vehicles. In addition, 20 of the 29 agencies identified charging infrastructure as a key challenge to acquiring electric vehicles, citing the costs of installation among other challenges. In discussions with case study agencies, federal officials did not cite the acquisition costs of flex-fuel vehicles as a challenge to acquiring these vehicles. Some officials stated that these vehicles’ relatively low costs compared to other alternative fuel vehicle options was one reason that agencies have largely met the alternative fuel vehicle acquisitions requirement through the acquisition of flex fuel vehicles. GSA’s purchasing data did not provide sufficient detail for us to analyze the extent to which agencies paid more to purchase flex fuel vehicles. According to GSA’s leasing data on GSA-leased vehicles, for fiscal year 2017, agencies acquired over 20,600 alternative fuel vehicles, of which over 14,700 were flex fuel vehicles leased at no additional cost. However, agencies also acquired 1,268 flex fuel vehicles that, on average, had an additional cost of about $2,300, with the result that agencies spent a total of about $2.9 million more to acquire these vehicles to lease than if they had acquired equivalent gasoline-fueled vehicles. When agencies choose to lease an alternative-fuel vehicle that is more expensive than a comparable conventionally fueled vehicle, under law, GSA must spread that difference in cost—sometimes referred to as the incremental cost—across the agency’s entire fleet during the year the alternative fuel vehicle is acquired. According to GSA officials, this requirement makes it easier for agencies to incorporate higher-priced alternative fuel vehicles, such as battery-electric or plug-in hybrid electric vehicles, into their fleets. The difference in cost between acquiring a plug- in hybrid electric or battery-electric vehicle compared to an equivalently sized conventionally fueled vehicle can vary depending on the amount GSA has negotiated with the dealer to pay for a particular vehicle. For example, GSA’s lease offerings showed that for fiscal year 2019, agencies would have to pay anywhere from about $5,300 to $19,400 more to acquire a plug-in hybrid electric vehicle than to acquire an equivalently sized conventionally fueled vehicle, and approximately $16,100 to $18,800 more to acquire a battery electric vehicle that is an equivalently sized conventionally-fueled vehicle. Officials from two case study agencies told us that because GSA spreads the additional costs over an agency’s entire leased fleet, the costs may not affect the agency’s budget much as long as the agency acquires only a small number of vehicles. For example, according to a local DOT official, the acquisition of two battery-electric Ford Focuses added an additional $15 per vehicle to each of its vehicles in its fleet. While electric vehicles have higher acquisition costs, they generally have lower fuel and maintenance costs than conventionally fueled vehicles, and as a result, GSA officials charge agencies lower mileage rates for these vehicles. GSA also charges agencies lower mileage rates for hybrid vehicles, based on their higher fuel efficiency. Of the agencies we surveyed, 14 of the 29 identified lower fuel and maintenance costs as a key benefit to acquiring battery electric or plug-in hybrid electric vehicles. Because of these lower mileage rates, the more miles an agency drives a leased electric vehicle, the more the overall cost difference to the agency between an electric vehicle and a conventionally fueled vehicle will shrink. However, our analysis of GSA’s leasing rates showed that over 5 years— the typical life of a lease of an electric vehicle—and with average mileage—these lower mileage costs would not make up for the higher acquisition costs of these vehicles (see fig. 6). GSA officials and several fleet managers also told us that in their experiences with leasing electric vehicles, lower utilization coupled with the lower mileage costs charged by GSA to agencies had not made up for the significantly higher acquisition cost over the life of the leases. The GSA lease costs consider the lifetime costs of the vehicles, including fueling and maintenance and eventual disposal of the vehicle through auction. The five case study agencies we spoke with did not use a life-cycle analysis to compare costs across various vehicle types when making vehicle procurement decisions. However, all five case study agencies told us they analyze life-cycle costs to inform their lease versus purchase decisions. See appendix III for more discussion on life-cycle costs. Fleet managers at three of the case study agencies we spoke with before the Executive Order was revoked told us that they had worked to increase the number of electric vehicles in their fleets, in spite of the higher costs. Officials at a few agencies stated that when the budget allowed, they would try to acquire electric vehicles. For example, VA officials told us that VA budgets for electric vehicles on the local level, and that local staff decide how much of their budget will go towards funding of electric vehicles. VA and Interior officials said their acquisitions of electric vehicles had thus far not greatly affected their budgets, but within Interior, the fleet managers for Fish and Wildlife Services and the Bureau of Indian Affairs said cost could become an issue if more electric vehicles were to be acquired. GSA Office of Governmentwide Policy officials told us that agencies could fit the higher costs of acquiring electric vehicles into their budget by reducing their fleet size and acquiring a few of these more expensive vehicles. Further, GSA has introduced several initiatives to help agencies finance alternative fuel vehicle acquisitions, including specific electric vehicle initiatives. For example, in fiscal year 2016, according to an Army fleet manager, Army acquired electric vehicles through GSA at a price GSA had negotiated that was equal to the price for comparably sized petroleum fueled vehicles. However, this pricing was only offered in 2016 as part of a one-time deal that GSA negotiated with the vehicle manufacturer. In addition to the costs of purchasing or leasing electric vehicles, agencies described challenges balancing the costs of purchasing and installing charging stations with other competing priorities. Agency officials told us they generally prefer charging stations, such as Level 2 stations, that can charge a vehicle in a few hours to allow vehicles to be used multiple times a day. These types of Level 2 charging stations can cost anywhere from about $400 to $8,000 depending on the model and its features and do not include installation costs. Generally, the less expensive models may not include features such as energy monitoring that tracks electricity use or communication capabilities that enables data communication that some fleet managers said they view as necessary to manage and track the performance and costs of electric vehicles. We were unable to determine the total amount that agencies had spent to acquire existing charging stations to date because data were not available at a sufficient level of detail. Installation costs also varied widely, depending, among other things, on the complexity of the installation, such as the need for trenching or upgrading the electrical service. For example, officials from VA told us that sometimes in order to install charging stations, they have had to trench an entire parking lot to ensure the units have the necessary power to charge its vehicles—which can be expensive. DOE estimates that to install a charging station it costs about $100 per foot to trench through concrete, lay conduit, and refill. As a result, it could cost up to $10,000 to trench 100 feet. Further, the Veterans Health Administration indicated that funding for purchasing and installing charging stations at their facilities had to compete with other priorities. Specifically, the costs for charging stations came out of the facilities’ capital-planning budget, which also includes funding for veterans’ care. Similar to determining what agencies have spent on charging stations, we were also unable to determine what total installation costs have been to date because of data limitations. Although many federal facilities are not equipped with fast charging infrastructure and the number of public charging stations remains limited, federal agencies had begun taking steps to install more charging stations. Prior to the 2015 Executive Order being revoked, agencies had recently begun to install more of these stations as part of their efforts to prepare for the requirement that 20 percent of light-duty vehicle acquisitions be zero emission (electric) vehicles or plug-in hybrid vehicles by 2020. We found 12 out of the 29 agencies we surveyed had installed more than 20 charging stations, while 14 others had installed at least one charging station, and only 3 agencies had not installed any charging stations. According to past Strategic Sustainability Performance Plans, agencies had started to implement strategies to increase their electric- vehicle infrastructure. For example, according to EPA’s fiscal year 2016 plan, it planned to conduct a survey of its parking facilities to develop a charging infrastructure policy and plan, including identifying potential locations for charging stations. Similarly, Army officials described taking additional steps, including sending specialized teams to several of its bases to determine the optimal and least costly placement of its charging stations. However, fleet managers also told us they were having difficulties installing electric vehicle infrastructure, in particular at leased facilities. Specifically, several agencies’ fleet managers told us that it was difficult or impossible to install charging stations at leased properties unless their installation was negotiated into the lease from the beginning. In part because guidance on the new Executive Order had not been issued at the time we last spoke with agency officials on this issue, the extent to which the revoking of the directive related to acquiring electric vehicles would affect agencies’ efforts to install charging infrastructure was unclear. Fleet managers told us that another challenge that may limit progress toward energy goals was a lack of fuel availability—in particular the availability of E85—which made it difficult to fuel flex-fuel vehicles with alternative fuel. Of the 29 agencies, 20 identified the availability of E85 as a challenge to using alternative fuel in flex-fuel vehicles. While some agencies still largely rely on flex-fuel vehicles to meet alternative fuel vehicle acquisition requirements, E85 can only be found at about 2 percent of all refueling stations, according to GSA. To help agencies locate alternative fuel stations, such as those with E85, DOE developed an Alternative Fuel Station Locator tool that maps nearby refueling stations. VA and Interior officials said they routinely use the tool to check for accessible alternative fuel stations prior to acquiring an alternative fuel vehicle. However, outside the rural Midwest and Texas, E85 may be difficult to find. In addition, when E85 is available, agency officials from two case study agencies said these locations may be mislabeled, out of service, or too far from the vehicle’s operating location. We reported similar concerns in 2011; specifically, that while agencies acquired primarily flex-fuel vehicles, the low availability of E85 resulted in a majority of flex-fuel vehicles receiving a waiver from the requirement to use alternative fuel, and as a result, agencies refueled their flex-fuel vehicles with petroleum. Another difficulty fleet managers face with regard to increasing the use of E85 is that, even when E85 is available and conveniently accessible, drivers still may refuel with gasoline—even though federal agencies have undertaken a number of efforts to encourage its use. As we mentioned previously, to help agencies track their fleet fuel purchases, DOE developed the FLEETDASH system that can identify opportunities where drivers could have refueled with E85 within 5 miles of their location but, instead, chose not to because they were unaware or unwilling. Some agency officials described using this system to try to increase alternative fuel use. For example, VA officials told us they use FLEETDASH to track and identify opportunities to increase their alternative fuel use. In another example, EPA officials told us that to increase their use of alternative fuels, drivers at one location started to print out maps that identified alternative fuel refueling locations near their routes. DOE recently estimated that if federal agencies refueled flex-fuel vehicles with E85 every time they refueled within 5 miles of an E85 station, the use of E85 would quadruple, and agencies could decrease their use of petroleum by 10 percent and reduce greenhouse gas emissions by a further 9 percent. Another challenge that may limit further progress towards energy goals is that agencies continue to need larger, less efficient vehicles for many of their mission needs, according to many agency officials. According to FAST data, about 85 percent of agencies’ fleets in fiscal year 2018 was comprised of sport-utility vehicles, passenger vans, and trucks (as illustrated previously in fig. 3). In response to our survey, 26 of 29 agencies indicated that mission or intended use was a very important factor when selecting a vehicle, and officials at some case study agencies told us that they had a significant need for larger vehicles to meet certain missions. For example, Interior operates on large rural Indian reservations where they need pick-up trucks or sport-utility vehicles to navigate the often rugged terrain. In another example, DOT officials stated that to support their national airspace facilities, their vehicles must drive off-road carrying bulky or sensitive tools to go to remote air strips. For these purposes, they look to acquire larger vehicles such as cargo vans and enclosed pickup trucks with 4-wheel drive capabilities or 2- wheel-drive sport-utility vehicles that have the ground clearance to meet their needs. GSA and agency officials told us that the vehicles designated as low greenhouse-gas-emitting vehicles are typically smaller vehicles and in some cases are not suitable for these mission needs. For example, GSA offered one 4x2 hybrid-electric sport-utility vehicle and one 4x4 plug-in hybrid-electric sport-utility vehicle in fiscal years 2017 and 2018. In fiscal year 2019, additional vehicles have been added. While these options are considered low greenhouse-gas-emitting vehicles, an agency official told us that they have a variety of other characteristics that may make them less desirable for certain missions—for example, they may cost significantly more than other options to acquire, or, in the case of the plug-in, rely on charging infrastructure that the agency may not have in the location where the vehicle is needed. According to VA staff, there are not enough low greenhouse gas vehicle options to ensure fleet managers can meet mission goals and low greenhouse-gas-emitting vehicle acquisition requirements. For example, VA relies on minivans to transport patients and deliver health care services; however, no gasoline or E85- fueled minivans offered by GSA in fiscal year 2017 were designated as low greenhouse-gas-emitting vehicles. Furthermore, in some cases, when an agency has determined it needs a larger vehicle, fleet managers told us they are likely to choose a flex-fuel vehicle because these vehicles are offered in larger, more rugged models. These vehicles are often not designated as low greenhouse-gas-emitting vehicles but count towards the alternative fuel vehicle acquisition requirements. In contrast, officials representing four case study agencies stated that when the mission need is suitable for a sedan, the agency seeks to acquire low greenhouse-gas-emitting vehicles. GSA offers a number of alternative fuel vehicle options for sedans, including hybrid, battery electric, and plug-in electric hybrid vehicles. Further, many GSA offered gasoline-fueled sedans are also designated as low greenhouse-gas- emitting vehicles. Officials at one agency told us, when possible, the agency acquires alternative fuel sedans such as flex-fuel vehicles, hybrid vehicles, or, in a few cases, electric vehicles. Furthermore, officials at this agency stated that when they are acquiring a vehicle where alternative fuel is not readily available, they will sometimes acquire a low greenhouse-gas-emitting vehicle that runs only on gasoline. We provided a draft of this report to Army, DOE, DOT, EPA, GSA, Interior, and the VA for their review and comment. In response, Army, DOE, EPA, GSA, Interior, and VA provided technical comments which were incorporated as appropriate. Army and DOT reviewed the report but did not provide any comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretaries of the Departments of Defense, Energy, Interior, and Veterans Affairs, and the Administrators of GSA and EPA. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report, please contact me at 202-512-2834 or vonaha@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made major contributions to this report are listed in appendix IV. In April 2018, we initiated a survey of 29 federal agencies’ fleet managers. The questions we asked and the aggregate results of the responses to the closed-ended questions are shown below. Our survey was comprised of closed- and open-ended questions. We do not provide results for the open-ended questions. We received 29 completed survey responses—a response rate of 100 percent. 1. What is the process your agency follows when acquiring a new vehicle to replace a vehicle? Please list (in numerical order) the sequence of events from deciding to acquire a vehicle to actually acquiring it. To the extent that the process is different when adding an additional vehicle, please describe that as well. (Written responses not included) 2. At what point in the above process, does your agency consider whether to acquire an alternative fuel vehicle or a petroleum fuel vehicle when replacing a vehicle? To the extent that the process is different when adding an additional a vehicle, please describe that as well. 3. (Written responses not included)In the process to replace a vehicle described above, does your agency consider vehicle life-cycle cost information as part of a lease versus purchase analysis? 3a. If yes, does your agency consider the following factors in their vehicle life-cycle cost analysis? Please check one answer for each row. 4. In the process to add an additional vehicle, does your agency consider vehicle life-cycle cost information as part of a lease versus purchase analysis? 4a. If yes, please describe how, if at all, the above lease versus purchase analysis differs in the case of adding an additional vehicle, and in particular any differences in the type of life-cycle cost information considered in the case of adding a vehicle. (Written responses not included) 5. Excluding the lease versus purchase analysis, does your agency conduct any other vehicle life-cycle cost analysis at any other point in the vehicle replacement process described in Question 1? 5a. Does your agency compare the life-cycle costs of multiple vehicle types prior to selecting a type of vehicle to acquire? 5b. Does your agency perform a cost analysis comparing life-cycle costs of acquiring a non-electric vehicle to costs of acquiring an electric vehicle? 5c. If no, please describe how your agency considers the results of this life-cycle cost analysis—excluding the lease versus purchase analysis. (Written responses not included) 5d. What factors below does your agency consider in this life-cycle cost analysis? Please check one answer for each row. Useful life (number of years it is expected to be used) 6. In the process to add an additional vehicle, does your agency consider vehicle life-cycle cost information at any point outside the lease versus purchase analysis? 6a. If yes, please describe how, if at all, any life-cycle cost analysis described in question 5 differs in the case of adding an additional vehicle, and in particular any differences in the type of life-cycle cost information considered in the case of adding a vehicle. (Written responses not included) 7. Has your agency ever determined that an electric vehicle is the most appropriate vehicle to meet the agency’s needs? 7a. If yes, please provide some examples of those situations and how your agency determined the type of electric vehicle (i.e. electric vehicle, plug-in electric hybrid vehicle, hybrid electric, etc.). (Written responses not included) 8. How important are the following factors when determining whether the vehicles your agency acquires will be alternative fuel vehicles or petroleum fuel vehicles? Mission (The expected function or purpose of the vehicle) Availability of alternative fuel vehicles Other (specify in box below) For agencies that indicated there were other factor(s), we provided an open-ended question that requested a description of the factor(s) and 3 agencies provided descriptions of other factors not shown here. 9. What are the benefits, if any, (including any related to costs, maintenance, environment, safety, federal requirements, etc.) of acquiring and using each of the following types of alternative fuel vehicles relative to petroleum fuel vehicles? 9a. Electric vehicles (EVs) and plug-in hybrid electric vehicles (PHEVs) that use battery power (Written responses not included) 9b. Hybrid electric vehicles (HEVs) powered by an internal combustion engine (Written responses not included) 9c. Flex Fuel Vehicles (FFVs) designed to run on E85 (Written responses not included) 9d. Other alternative fuel vehicles (Written responses not included) 10. What are the challenges, if any, (including any related to costs, maintenance, environment, safety, federal requirements, etc.) of acquiring and using each of the following types of alternative fuel vehicles relative to petroleum fuel vehicles? 10a. Electric vehicles (EVs) and plug-in hybrid electric vehicles (PHEVs) that use battery power (Written responses not included) 10b. Hybrid electric vehicles (HEVs) powered by an internal combustion engine (Written responses not included) 10c. Flex Fuel Vehicles (FFVs) designed to run on E85 (Written responses not included) 10d. Other alternative fuel vehicles (Written responses not included) 11. How many electric charging stations has your agency installed? 12. Has your agency encountered any challenges while trying to site and install electric charging stations? 12a. If yes, what were those challenges and how, if at all, have you been able to overcome them? (Written responses not included) 13. Has your agency encountered any challenges related to acquiring and using alternative fuel vehicles and alternative fuel while trying to meet federal fleet energy requirements, including Executive Order 13693? 13a. If yes, what were those challenges and how, if at all, have you been able to overcome them? (Written responses not included) 14. Has your agency taken steps to prepare for Executive Order 13693’s requirement that 20 percent of all new passenger vehicles be zero emission vehicles or plug-in hybrids by 2020? 14a. If yes, please provide some examples of the steps you have taken. (Written responses not included). 15. Has the availability of alternative fuel vehicles from GSA’s inventory ever prevented your agency from acquiring an alternative fuel vehicle? 15a. If yes, please describe what vehicle you were interested in and why it was not available. (Written responses not included) You asked us to review the costs and challenges related to federal agencies’ meeting the different federal energy requirements for vehicle fleets. This report addresses: (1) how agencies meet fleet energy requirements and how their efforts changed agencies’ fleets and (2) challenges federal agencies faced related to furthering fleet energy goals. The report also includes information on the extent agencies consider life- cycle costs when selecting vehicles. To determine the extent to which federal agencies reported meeting fleet energy requirements and the composition of federal agencies’ fleets, we analyzed data from the Federal Automotive Statistical Tool’s (FAST) database on the composition and fuel use of federal agencies’ fleets from fiscal years 2008 through 2017, the most current data available at the time of our review. Annually federal agencies must submit data on all of their non-tactical vehicles to this database, which the General Services Administration (GSA) and the Department of Energy (DOE) established in 2000 and is used to satisfy statutory and regulatory reporting requirements. We reviewed the data relative to selected statutory requirements and directives that were in effect for fiscal year 2017. Specifically, we analyzed these data to identify the total numbers of alternative fuel vehicles by fuel type and vehicle size in federal fleets and the changes in alternative fuel use during this time period. DOE provided us fleet performance data on the extent to which each of the agencies subject to these federal requirements met requirements or directives to acquire alternative fuel vehicles, use alternative fuel, and reduce petroleum use and per-mile greenhouse gas emissions for fiscal year 2017. In addition, the Environmental Protection Agency (EPA) reported on the extent to which agencies were meeting the requirement to acquire low greenhouse-gas-emitting vehicles for fiscal year 2017, based on the same database. To assess the reliability of these data, we interviewed DOE officials on how the data were checked for accuracy and collected written responses from them on how the data were collected, maintained, analyzed and presented. This assessment included how DOE flags suspicious data, reviews the data, and validates final entries. Based on the information collected, we found the data sufficiently reliable for our purposes of identifying the number of vehicles by type of vehicle and size, and fuel consumed by federal fleets in order to describe how vehicle fleets changed over the past decade. In May 2018, a new Executive Order was issued that revoked a previous Executive Order. The previous Executive Order contained two directives, to acquire zero emission (electric) vehicles and reduce per-mile greenhouse gas emissions by specific targets and specific years. Thus, while the above statutory requirements for fiscal year 2017 remained in effect for fiscal year 2018, the directives related to acquisition of zero emission (electric) vehicles and per-mile greenhouse gas emissions reductions were no longer in effect after May 2018. To understand the different federal energy requirements for vehicles fleets and guidance for agencies to implement them, we reviewed federal statutes, agency rules, and executive orders, and examined DOE and GSA guidance on the various statutory and regulatory requirements and executive orders. For example, we reviewed DOE’s federal fleet management handbook intended for agencies to select and implement strategies to reduce fleet greenhouse gas emissions and use of petroleum, and EPA guidance on how to meet the requirement to acquire low greenhouse-gas-emitting vehicles, among other documents. In April 2019, CEQ and OMB issued implementing instructions for the Executive Order. The implementing instructions emphasized that agencies should follow the statutory requirements that are still in place and annually identify targets for petroleum reduction and increases in alternative fuel use as part of agencies’ Strategic Sustainability Plans. To broaden our understanding of agencies efforts to meet requirements, we also identified five case study agencies—Department of the Interior (Interior), Department of Veterans Affairs (VA), Department of Transportation (DOT), the Army, and the EPA. We selected these case study agencies based on data from the FAST database and their planning documents to represent different sized fleets, a mix of alternative fuel vehicle types, including electric vehicles, and missions with varying vehicle needs. Interior, VA, and Army represented larger fleets, whereas DOT represented medium and EPA small sized fleets. In part, we also chose DOT and EPA to learn about their unique vehicle acquisition processes and plans for acquiring electric vehicles, based on their responses to the survey we conducted, which is described below. From these case study agencies and their sub-agencies, we interviewed agency officials, including fleet managers, to learn their efforts to meet requirements, how they acquired vehicles, and how they managed their fleets. We spoke with these agencies before and after the Executive Order was revoked in May 2018. We also reviewed documents reporting on the extent to which these agencies met fleet energy requirements. The results from the case studies cannot be generalized to make inferences about all agencies. However, we determined that our selection methodology was appropriate for our design and objectives and that this methodology would generate valid and reliable evidence to support our work. To determine any challenges agencies face related to further meeting fleet energy goals, we surveyed 29 federal agencies, and asked them to describe their vehicle acquisition processes, the type of cost analysis done when acquiring an alternative fuel vehicle, and the benefits and challenges of using alternative fuel vehicles. We identified and surveyed agencies that were required to comply with fleet energy requirements and conducted the survey beginning in April 2018. Overall, 31 federal agencies were subject to these requirements in fiscal year 2017; however, as part of our review of Department of Defense (DOD) documentation, we found that its various military departments operate independently and decided to survey Air Force, Army, Marine Corps, and Navy separately. We also excluded the Court Services and Offender Supervision Agency because of the decentralized nature of its fleet and the Defense Agencies within DOD because it was small relative to other DOD agencies. To increase the validity and reliability of our survey, we conducted pretests of the survey with fleet management officials from three federal agencies: VA, Interior, and the Government Accountability Office. We received a 100 percent response rate to our survey. (See app. I for survey results.) To further learn about the challenges of alternative fuel vehicles as well as strategies agencies were using to acquire these vehicles, we interviewed agency officials, including fleet managers, from our five case study agencies, GSA and DOE. In addition, to understand agencies’ efforts to further fleet energy goals and the challenges they faced, we reviewed the Fleet Management Plans and Strategic Sustainability Performance Plans of each agency we surveyed. The strategic sustainability plan is to prioritize agency actions to support the reduction of greenhouse gas emission and other agency wide targets. The fleet management plan is to specifically address how an agency’s fleet will meet its greenhouse gas reduction targets, petroleum reduction targets, and other relevant fleet requirements. We also focused our analysis only on selected types of alternative fuel vehicles. Specifically, we included flex-fuel vehicles, hybrid-electric vehicles, plug-in hybrid electric vehicles, and battery electric vehicles because these represent the most numerous in federal fleets or those with specific acquisition requirements. We obtained vehicle cost information from GSA’s Alternative Fuel Vehicle Guide that lists the costs and specifications of each alternative fuel vehicle GSA offers, and analyzed cost differences based on fuel type. For the purposes of our analysis, we focused on lease costs, not the costs of purchasing a vehicle from GSA, because in fiscal year 2017, 70 percent of agencies battery electric and plug-in hybrid electric vehicles were leased. To analyze and compare petroleum consumption and greenhouse gas emissions, we judgmentally selected a sample of vehicles from GSA’s Alternative Fuel Vehicle Guide and first estimated their annual fuel using DOE’s Vehicle Cost Calculator. We then entered their estimated fuel use into Argonne National Laboratory’s Alternative Fuel Life-Cycle Environmental and Economic Transportation (AFLEET) tool to estimate well to wheel greenhouse gas emissions. To assess the reliability of these tools, we interviewed and collected written responses from DOE officials regarding the source of the data and the values and assumptions used in its calculations. Based on the information collected, we found that they were sufficiently reliable to estimate petroleum consumption and greenhouse gas emissions. We conducted this performance audit from November 2017 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Until May 2018—during the time when the previous administration’s Executive Order was in effect—our case study agencies acquired limited numbers of battery electric and plug-in hybrid electric vehicles with a general understanding that, when the mission need was compatible, acquiring such vehicles was supported by the Executive Order’s requirements in spite of their higher costs compared to a conventional vehicle. As of February 2019, the last time we spoke with agency officials on this issue, agency officials stated that they were uncertain of the effect of the new executive order and would continue to try and meet fleet energy goals until new guidance was issued. This guidance was subsequently issued in April 2019, and emphasized that agencies should focus on the statutory requirements while increasing efficiency, optimizing performance, and reducing waste and costs. Until May 2018, when the previous Executive Order was revoked, agencies were expected to increase their acquisition of battery electric or plug-in hybrid electric vehicles. Specifically, agencies were to acquire “zero-emission” or plug-in hybrid electric vehicles for 20 percent of all new agency passenger vehicle acquisitions by December 31, 2020—and for 50 percent of all new agency passenger vehicle acquisitions by December 31, 2025—in addition to meeting the other various federal fleet requirements. According to Department of Energy guidance on this Executive Order, the targets phased in over time to account for the expected future market availability and cost competitiveness of these vehicles. However, as of fiscal year 2017, GSA officials and several fleet managers also told us that in their experiences leasing electric vehicles, the lower mileage costs of these vehicles had not made up for the significantly higher acquisition cost over the life of the leases, a situation that they described as a challenge to significantly increasing the numbers of such vehicles in their fleets. Three case study agencies described acquiring battery electric and plug-in hybrid electric vehicles—despite the higher costs—largely because of the Executive Order’s requirement. Similarly, 10 of the 29 agencies we surveyed identified “meeting federal requirements” as a key benefit to acquiring electric vehicles. All five case study agencies had acquired small numbers of electric vehicles in light of the Executive Order’s requirements. Agency officials described acquiring these vehicles when their mission and budgets allowed for it. For example, a case study agency with a larger fleet told us that mission needs drove its vehicle acquisitions, and there were limited instances in which an electric sedan would have met the agency’s mission needs. However, when the agency acquired a vehicle for a mission that could be met with an electric vehicle— such as to ferry officials to and from different offices in an area where charging stations were easily accessible—it would have been likely to select an electric vehicle, in part, to help the agency take steps towards meeting the Executive Order’s acquisition goals. Agency officials at four of the five case study agencies said once they had identified an opportunity to acquire an electric vehicle—generally at a location where the mission aligned with the capabilities of an electric vehicle, recharging infrastructure was available, and there were sufficient funds in the budget—they would conduct a lease versus purchase analysis to determine whether leasing or purchasing the vehicle would be most the cost effective option, a key aspect of a life-cycle cost analysis. We have previously reported that a life-cycle cost analysis, which considers vehicle costs from the beginning to the end of vehicle ownership, can help agencies make cost-effective decisions. Officials at the fifth case study agency, Army, stated that the agency had conducted an agency-wide analysis that had determined that leasing was always a better option than purchasing for non-tactical vehicles, and so it no longer conducted this analysis on a vehicle-by-vehicle basis. Officials at our case study agencies stated they did not conduct life- cycle cost analysis to compare and contrast different types of vehicles during the acquisitions process because they considered mission and federal fleet energy requirements to be the key drivers of which type of vehicle to select. However, about half of the agencies that responded to our survey stated that they did do so. Specifically, 14 of 29 agencies indicated they conduct a life-cycle costs analysis outside of a lease-versus-buy analysis when replacing a vehicle, and 13 of these agencies responded that they did such an analysis to compare the costs of an electric vehicle to a non-electric vehicle. Almost all of these agencies responded that they considered initial acquisition cost, fuel cost, electricity consumption, useful life, maintenance costs, and annual miles, with fewer agencies checking that they considered other costs, such as depreciation and disposal costs. As of February 2019, the last time we spoke with agency officials on this issue, agency officials stated that they were unsure of how the revoking of the previous Executive Order and implementation of the new Executive Order would affect the extent to which they acquired electric vehicles in the future. Officials at one case agency stated that with the uncertainty surrounding the requirement to acquire more of these vehicles in the future, it was likely that they would not acquire electric vehicles due to their higher costs. Another case study agency said that although the Executive Order had been revoked, the agency may continue to acquire a limited number of these vehicles in locations where it had already invested funds for electric vehicle infrastructure. In addition to the individual named above, Alwynne Wilbur (Assistant Director); Eric Hudson (Analyst-in-Charge); Ross Gauthier; Bonnie Ho; Malika Rice; Amy Rosewarne; Kelly Rubin; Andrew Stavisky; and Crystal Wesco made key contributions to this report.", "summary": "Since 1988, a series of laws have been enacted and executive orders issued related to federal goals of reducing federal fleets' petroleum use and greenhouse gas emissions. For fiscal year 2017, federal agencies were required to: (1) to acquire certain types of vehicles, (2) to use more alternative fuel, and (3) to meet targets for reducing petroleum and per-mile greenhouse gas emissions. Federal agencies were also under a directive to increase acquisitions of zero emission (electric) vehicles. GAO was asked to review federal agencies' efforts related to these fiscal year 2017 requirements. This report addresses: (1) how agencies reported meeting fleet energy requirements and how agencies efforts changed their fleets and (2) challenges agencies face related to further meeting fleet energy goals. To conduct this review, GAO surveyed 29 federal agencies subject to fleet energy requirements and selected 5 agencies—of a variety of sizes and missions—for case studies. The case studies results are not generalizable to all agencies. GAO also: (1) reported on DOE's and GSA's data on federal fleets for fiscal years 2008 through 2017, including GSA's acquisition and cost data for fiscal year 2017, the most current data available; (2) reviewed DOE's and EPA's information on agencies' performance related to fiscal year 2017 requirements; and (3) interviewed federal officials. The directives to reduce per-mile greenhouse gas emissions and increase acquisitions of electric vehicles were revoked by an Executive Order issued in May 2018. In responding to fleet management requirements over the past 10 years, agencies have incorporated an increasing number of alternative fuel vehicles into their fleets. These have been predominantly flex-fuel vehicles, as hybrid and battery electric vehicles continue to make up a small percentage of agencies' fleets (see figure). The Department of Energy (DOE) is responsible for overseeing agencies' compliance by analyzing fleet data. Most agencies reported meeting the fiscal year 2017 requirements to reduce petroleum use and per-mile greenhouse gas emissions. DOE and other agency officials attributed agencies' success in meeting these requirements to (1) acquiring low greenhouse-gas-emitting and alternative fuel vehicles, and (2) improving general fleet management such as by reducing miles traveled. According to agency officials, three challenges have continued to hinder agencies' efforts to further the goals of reducing federal fleets' petroleum use and greenhouse gas emissions. First, while hybrid and electric vehicles can offer reductions in petroleum use and greenhouse gas emissions, the costs of these vehicles and their charging infrastructure make it challenging for agencies to acquire them on a large scale. According to GSA data, agencies purchased 373 electric vehicles (sedans and minivans) in fiscal year 2017—along with about 4,500 hybrid electric sedans—out of a total of over 16,000 sedans and minivans acquired. In total, agencies spent about $10.5 million more to purchase hybrid or electric vehicles than they would have to purchase comparably sized conventionally fueled vehicles. However, agencies did not consistently track the life-cycle costs of these vehicles. Second, agencies also stated that a lack of fuel and infrastructure availability limits agencies' use of alternative fuel. Third, agency officials stated that a continuing need for larger vehicles limits the number of low greenhouse-gas-emitting vehicles agencies can acquire.", "document_type": "gao"}
{"report": "Confucius Institutes are entities that seek to promote Chinese language and culture in foreign countries. Their establishment is guided by Hanban, which is headquartered in Beijing, China, and, according to various sources, is affiliated with the Chinese government’s Ministry of Education. The first Confucius Institute in the United States was established in 2004, and there were approximately 525 institutes worldwide as of September 2018, according to Hanban’s website. Most Confucius Institutes in the United States are based at colleges and universities. We identified 96 Confucius Institutes in operation at U.S. colleges and universities in 44 states and the District of Columbia as of January 2019. See our February 2019 report on Confucius Institutes for a full list of the schools and their locations. Figure 1 shows U.S. states with one or more Confucius Institute on college or university campuses. Additionally, in recent years, some U.S. universities have partnered with Chinese universities to establish degree-granting institutions in China approved by the country’s government. The Chinese government requires that U.S. universities seeking to establish such an education arrangement in China partner with a Chinese university, and establish written agreements with the Chinese university defining the academics, governance, operations, finances, and other aspects of the arrangement. At the time of our review in August 2016, the 12 institutions we reviewed ranged from fewer than 40 to more than 3,000 students. More than 90 percent of the students across the 12 institutions were Chinese, and less than 6 percent were U.S. citizens. In February 2019, we reported that Confucius Institutes in the United States that we reviewed were established as a partnership between a U.S. school and a Chinese college or university, funded and arranged in part by Hanban. Management of the institutes varies by school. Some Confucius Institutes at U.S. schools are part of an academic department or an administrative office, while others report directly to the school president or other school leadership. Confucius Institute personnel generally consist of a Confucius Institute director or directors, Confucius Institute teachers, and a board of directors. At the 10 case study schools that were part of our review, the Confucius Institute director was a U.S. school employee—either a school administrator, faculty member, or professional hired to manage the Confucius Institute. In addition, several case study schools had a Chinese assistant director, who reported to the Confucius Institute director from the United States, and often was an employee at the Chinese partner university. In February 2019, we reported that officials we interviewed from case study schools stated that Confucius Institutes’ benefits include opportunities for schools to forge international connections and receive funding and other resources for China-related programs. These officials noted that because Hanban pays the salaries of Confucius Institute teachers who teach language and assist with Chinese programs at schools, sparing the schools these costs, these schools could offer Chinese language courses even when enrollment was low. Case study school officials also stated that Confucius Institutes provide valuable resources and opportunities to increase knowledge of and exposure to China and Chinese culture within the school and in the broader community. Case study school officials, researchers, and others we interviewed also offered various perspectives on whether having Confucius Institutes on campuses could bring about undue Chinese influence. These parties discussed the potential for or absence of Chinese interference in events and activities at the institute and on campus. They also expressed views on Confucius Institute teacher hiring, and quality of those teachers. Several school officials, researchers, and others we interviewed expressed concerns that hosting a Confucius Institute could limit events or activities critical of China—including events at the institute and elsewhere on campus. Two officials who expressed these concerns were faculty members at one case study school who have not applied for Confucius Institute funding for a research project because they believed Hanban would not approve of the topic. In contrast, officials at multiple case study schools noted that U.S. school faculty members make all decisions regarding conference themes, guest speakers, and topics for events at their institute. Officials at some schools offered examples of events and activities their Confucius Institute had sponsored that addressed topics that could be considered critical of China. Specifically, they reported hosting a conference discussing intellectual property in relation to China and events on Tibet, territorial disputes in the South China Sea, and religion in China. In addition, multiple researchers and others we spoke with expressed concerns with the Confucius Institute teacher selection process whereby Hanban or the Chinese partner school accepts initial applications from potential Confucius Institute teachers and proposes candidates to the U.S. school. These individuals noted that the Chinese entities could use such a process to effectively screen out candidates based on inappropriate criteria, such as political or religious affiliation. Officials we interviewed at multiple case study schools that had Confucius Institute teachers, however, expressed no concerns about the process for hiring teachers. School officials stated that they believed their school generally controlled the hiring process and were thus satisfied with it. Most officials emphasized that while institute teachers often come from the Chinese partner university, and are referred by the partner or Hanban, the U.S. school makes the final hiring selection. Case study school officials, researchers, and others also suggested ways to improve the institutes, including changing the language in agreements governing Confucius Institutes and policies for sharing these agreements. These parties stated that schools should remove the confidentiality section of their agreements and make the agreements publicly available online. Several researchers and others also emphasized that making the agreements publicly available would dispel questions and concerns over their contents. Several representatives of higher education institutions told us that they believed the confidentiality language in agreements was unnecessary and schools should consider removing it from their agreements. A few case study school officials, researchers, and others we interviewed stated that schools should include stronger language in the agreements to make it clearer that the U.S. school has executive decision-making authority. School officials and others we interviewed suggested other steps that schools could take to ensure they protect against undue Chinese influence. Several school officials stated that the schools should clearly delineate between the Confucius Institutes’ programs and their own Chinese language programs, such as by locating the institute apart from these departments within the school’s organizational structure. A few school officials and others noted that Confucius Institute teachers should not teach credit-bearing courses, even if those courses use curriculum developed by the school’s language department. One school administrator, who stated that his school’s Confucius Institute would never have a Chinese assistant director because the position suggests an excessive degree of Chinese influence, recommended that other schools remove the Chinese assistant director position from their institutes. Officials from two case study schools and others we interviewed stated that schools should organize events through the institute specifically intended to address what some might perceive as a topic sensitive to Chinese interests to demonstrate the school and institute were not subject to undue Chinese influence. In August 2016, we reported that the 12 U.S. universities we reviewed generally reported receiving support for their institutions in China from their Chinese partner universities and from Chinese government entities, with limited funding from U.S. government agencies and private donors. Most universities reported being granted land, resources for construction of buildings, and the use of the Chinese university’s campus facilities. The amount of support reported by the universities varied widely and was in some cases substantial. For example, one university reported receiving nearly 500 acres of land and a commitment from the Chinese provincial and local governments to spend about $240 million for construction and development of facilities. Five of the 12 universities reported receiving federal funding, which in most cases consisted of federal financial aid to U.S. students. At the time of our review, most universities we reviewed included language in their written agreements or other policies that either embodied a protection of academic freedom or indicated that the institution in China will adhere to academic standards commensurate with those at their U.S. campus. Six universities in our review included language in either their written agreements or other university policies that indicated a protection of academic freedom, such as permitting students to pursue research in relevant topics and allowing students to freely ask questions in the classroom. For example, one university’s agreement stated that all members of and visitors to the institution in China will have unlimited freedoms of expression and inquiry and will not be restricted in the selection of research, lecture, or presentation topics. Another three universities’ written agreements included language indicating that the institution in China will adhere to academic standards commensurate with either the U.S. campus or the university’s accrediting agency or other authoritative bodies. Fewer agreements addressed other types of protections at the time of our review. About half of the universities GAO reviewed addressed access to information, such as providing faculty and students with access to physical or online libraries, though a few universities’ agreements and policies include language protecting internet access. Written agreements and policies for about half of the universities we reviewed included language that suggested a protection of at least one of the freedoms of speech, assembly, and religion or worship, though the number of universities addressing each freedom varies. For example, regarding freedom of speech, student and faculty handbooks at a few of these universities contained language indicating that students have the ability to discuss sensitive topics. Regarding freedom of religion or worship, several of the universities included language in their policy documents indicating that religious practices will be protected. The more than 130 faculty and students we interviewed from universities’ institutions in China during our 2016 review generally reported that academic freedom had not been restricted. Faculty told us they did not face academic restrictions and could teach or study whatever they chose. For example, several faculty members asserted that neither they nor their colleagues would tolerate any academic restrictions, and one faculty member told us he and his colleagues intentionally introduced class discussions on politically sensitive topics to test whether this would trigger any complaints or attempted censorship. Students also generally indicated that they experienced academic freedom and could study or discuss any topic. Some students who had also studied or knew others who studied at Chinese universities contrasted their experiences at a U.S. institution in China, noting that they could have interactive dialogue with faculty, discuss sensitive topics, and freely access information at the U.S. institution but not at a Chinese university. Through interviews and responses to our questionnaire, university administrators reported that academic freedom was integral to their institutions in China. Administrators at several universities told us that academic freedom was nonnegotiable, while others noted that the same curriculum used in the United States also applied to their institution in China. However, fewer than half of the universities we reviewed had uncensored internet access at the time of our review. We visited universities with and without uncensored internet access, and observed university members accessing search engines, newspapers, and social media sites that have been blocked in China—such as the New York Times, Google, and Facebook—at some universities but not others. At several universities that lacked uncensored internet access, students and faculty told us that, as a result, they sometimes faced challenges teaching, conducting research, and completing coursework. For example, one faculty member told us that she sometimes asked others outside of mainland China to conduct internet research for her because they can access information she could not. Several students at another university told us their ability to conduct academic research was constrained by the internet limitations. We also reported in August 2016 that additional factors that could create obstacles to learning at U.S. universities in China, including self- censorship and constraints specific to Chinese students. Administrators, faculty, and students representing more than half of the universities we reviewed gave examples of self-censorship, including some cases where individuals were advised by teachers or others in positions of authority to avoid certain topics. For example, an administrator at one university noted that he believed it was advisable, as a guest of China, to refrain from insulting China, while an administrator at another university noted that the university advised teachers to avoid discussing sensitive subjects in class. In addition, we found that some conditions specific to Chinese students may constrain their academic experience. For example, some noted that Chinese students may know or suspect that their Chinese classmates are government or Communist Party monitors and will report on whatever the students say. An administrator at one university told us that he assumed there were Chinese students and faculty in the institution who reported to the government or the Communist Party about the activities of other Chinese students. Faculty members at several universities told us that they understood there were Chinese students in class who intended to report on the speech of faculty or Chinese students. Finally, we also observed that three of the 12 universities we reviewed that were approved by the Chinese Ministry of Education as having independent legal status shared characteristics that may be correlated with greater academic and other freedoms on campus. We found that these three universities had campuses built specifically for the joint institution that were located relatively far away from their Chinese university partner’s campus, generally controlled their own day-to-day operations, had uncensored internet access, and offered extensive campus and student life programs. In contrast, the other nine universities we reviewed did not consistently share these characteristics at the time of our review. Chairman Portman, Ranking Member Carper, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Jason Bair, Acting Director, International Affairs and Trade at (202) 512-6881 or bairj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Joseph Carney (Assistant Director), Caitlin Mitchell (Analyst in Charge), Joyce Kang, Neil Doherty, Melissa Emrey-Arras, Meeta Engle, Elizabeth Repko, Aldo Salerno, Michael Silver, and Nicole Willems. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Numerous U.S. universities and colleges have partnered with Chinese entities to establish (1) Confucius Institutes in the United States and (2) degree-granting institutions in China. Confucius Institutes are partnerships between Chinese entities and schools in other countries, arranged and funded in part by Hanban, which seek to promote Chinese language and culture. There were 96 institutes located at colleges and universities in the United States as of January 2019. U.S. universities have also partnered with Chinese universities to establish degree-granting institutions in China approved by the Chinese government. School officials have noted these types of partnerships provide valuable educational, cultural, and other benefits. Some researchers, government officials, and others, however, have raised concerns about them, including about the contents of written agreements and the role of the Chinese government, which, according to the Department of State, has made efforts to restrict academic freedom and impose censorship at Chinese universities and other institutions. Some have expressed concern that U.S. universities partnering with the Chinese government may face similar restrictions. This testimony discusses funding, agreements, and operations of (1) Confucius Institutes in the United States and (2) U.S. universities in China. This testimony is based on GAO's February 2019 report on Confucius Institutes in the United States and GAO's August 2016 report on U.S. universities in China. GAO reviewed 90 agreements establishing Confucius Institutes and spoke to officials about benefits and concerns related to the institutes. Agreements between Hanban—an affiliate of the Chinese Ministry of Education—and U.S. colleges and universities generally describe similar activities, funding, and management, though institute operations vary in practice. Confucius Institutes receive funding from Hanban and U.S. schools, and do not receive direct federal funding. While 42 of 90 agreements contained language about the document being confidential, some were available online or upon request, and one-third of the 90 agreements explicitly addressed how U.S. school policies apply to the institutes. Officials GAO interviewed at 10 case study schools noted U.S. school policies apply to institutes at their schools. GAO also interviewed some researchers and others who expressed concern that the presence of Confucius Institutes could constrain campus activities and classroom content. For example, several suggested schools with institutes might avoid hosting events on topics that could include criticism of China, such as Taiwan or Tibet, so as to not offend Chinese partners. School officials offered examples to illustrate that these concerns did not apply to their institute, noting institutes had sponsored events on such topics. Nonetheless, school officials and others suggested ways schools could improve institute management, such as renegotiating agreements to clarify U.S. schools' authority and making agreements publicly available. In August 2016, GAO reported that U.S. universities that have partnered with Chinese universities to establish degree-granting institutions in China emphasize academic freedom, but face internet censorship and other challenges. The 12 U.S. universities GAO reviewed generally reported receiving support for their institutions in China from Chinese government entities and universities, and 5 reported receiving U.S. government funding, mostly federal financial aid to U.S. students. Universities' agreements with Chinese partners or other policies GAO reviewed generally included language protecting academic freedom or indicating their institution in China would adhere to U.S. standards. University members generally indicated that they experienced academic freedom, but also stated that internet censorship, self-censorship, and other factors presented constraints. At several universities that lacked uncensored internet access, faculty and students noted that, as a result, they faced challenges teaching, conducting research, and completing coursework at that time.", "document_type": "gao"}
{"report": "There were 445 State/INL and USAID Mérida Initiative projects active from fiscal year 2014 through fiscal year 2018, which includes some projects that started before this period and some that continued after this period. State/INL funded 388 of the projects, and USAID funded 57. USAID’s projects tended to be larger with higher funding amounts than State/INL projects. State/INL projects generally focused on providing training and assistance to Mexican officials from the justice sector, border security, military, and law enforcement, as well as equipment, including for forensic laboratories, drug detection, and border surveillance. USAID projects were intended to engage with Mexican government institutions, civil society organizations, and the private sector to address corruption, promote trust in government, or prevent crime and violence, such as through skill building for youth, efforts to advance human rights, or technical support for judicial system development. State/INL allocated about $542 million and USAID allocated about $182 million for assistance to Mexico under the Mérida Initiative from fiscal year 2014 through fiscal year 2018. State/INL and USAID are the lead U.S. agencies for developing the Mérida Initiative’s programming. In these roles, State/INL and USAID work with Government of Mexico officials to outline plans, goals, and objectives for Mérida Initiative projects. State/INL and USAID both manage and fund the Mérida Initiative with the support of a wide range of project implementers, including DOJ, DHS, and DOD, as well as private contractors, nongovernmental organizations, and international organizations. State/INL and USAID implement Mérida Initiative projects primarily through contracts, grants, and agreements with international organizations. State/INL also implements some Mérida Initiative projects through interagency agreements with other U.S. agencies (e.g., DOJ, DHS, and DOD). State/INL and USAID contracting, grant, and agreement officers, are responsible for administering and overseeing contracts, grants, and other agreements that the agencies award, including for Mérida Initiative projects. They delegate the day-to-day monitoring responsibilities to agency officials located in Mexico City, particularly State/INL and USAID Contracting Officer Representatives (COR) for contracts, State/INL Grant Officer Representatives (GOR) for grants, State/INL Agreement Officer Representatives (AOR) for interagency agreements or letters of agreement with international organizations, and USAID AORs for grants and cooperative agreements, according to agency officials. Key monitoring responsibilities of the CORs, GORs, and AORs typically include reviewing quarterly, annual, and other progress reports submitted by project implementers; ensuring other required documents are submitted; communicating with the implementers on the status of assistance activities; and conducting site visits, among other things. In 2019, we reported on 14 leading practices for monitoring foreign assistance that agencies should incorporate in their monitoring policies to help ensure that they effectively manage foreign assistance, address impediments, and meet their assistance goals. From these leading practices we derived eight key practices that can help agencies monitor the implementation and performance at the project level. To facilitate discussing these key monitoring practices, we grouped them into three areas: (1) assigning monitoring duties to qualified staff, (2) planning monitoring approach, and (3) monitoring project implementation. (See table 1.) These practices are generally consistent with the Office of Management and Budget’s guidelines for Federal departments and agencies that administer United States foreign assistance and related guidance, as well as State’s and USAID’s monitoring policies. We reviewed 15 of State/INL’s high–dollar value Mérida Initiative projects to assess the extent to which State/INL followed key practices for monitoring foreign assistance projects in the areas of assigning monitoring duties to qualified staff, planning a monitoring approach, and monitoring project implementation. For these projects, the agency generally followed the key practices about half of the time, as shown in figure 1, and for a subset of four selected projects, it did not consistently track performance data or compare them to established performance measures. State/INL does not have procedures in place for monitoring staff to consistently follow all the key practices. Instead, officials said they focused on tracking implementation of the projects’ activities. Consistently following key monitoring practices would allow State/INL to stay well informed of projects performance, take corrective action when necessary, and help ensure that projects achieve their intended results. State/INL generally followed key practices for assigning monitoring duties to qualified staff almost always. Assigning staff with the appropriate certification helps ensure that they have the necessary knowledge and skills to perform those duties. Establishing roles and responsibilities helps ensure that the assigned monitoring staff are aware of their monitoring duties. State/INL requires that staff responsible for monitoring Mérida Initiative projects be certified as a COR, GOR, or AOR. State/INL also assigns roles and responsibilities to monitoring staff through a designation letter in which a contract or grant officer designates a COR, GOR, or AOR to oversee each project. However, of the 15 projects we reviewed, one had a gap in the documentation for staff certifications, and four had gaps in the documentation of designation letters. For example, in one case State/INL could not provide documentation to demonstrate that the official responsible for monitoring a project on police training had been officially designated or that the official had a valid certification during the full implementation period of the project. According to State/INL staff, the monitoring staff roles and responsibilities are also outlined in other documents such as the State Department’s Foreign Affairs Manual and the AOR Handbook, of which staff are expected to be aware. Figure 2 illustrates the extent to which State/INL followed each related key practice for assigning monitoring duties. State/INL generally followed key practices for planning a monitoring approach a third of the time. Two projects—one for helicopter pilot training and the other for aviation maintenance training—did not have monitoring plans and thus did not meet any of the three key practices for planning a monitoring approach. According to a State/INL manager, State/INL is no longer working with this implementer due to long-standing difficulties in obtaining documentation needed to monitor the projects. Most of the other 13 projects partially met the key practices for planning a monitoring approach. For example, goals and objectives were included in planning documents other than the monitoring plan. Furthermore, while only three of the projects had a monitoring plan that addressed risk, we determined that 10 of the projects partially addressed this key practice, because risks were assessed or considered, but the identified risks were not addressed in the monitoring plan. In addition, almost all of the projects had relevant project-level performance measures. Developing a monitoring plan that identifies project objectives helps focus monitoring efforts on assessing projects outcomes. In addition, identifying and addressing risks in that plan helps focus monitoring efforts on those aspects of project implementation that are most likely to threaten the success of the project in meeting its goals. We did not see evidence that State/INL had procedures in place to ensure that monitoring officials consistently follow key practices in the area of planning monitoring approach. Figure 3 illustrates the extent to which State/INL followed each related key practice to planning a monitoring approach. State/INL provided documentation to demonstrate that monitoring managers generally followed key practices for monitoring project implementation about half of the time. Monitoring project implementation helps ensure that projects are meeting their objectives, so that any necessary adjustments or corrective actions can be taken in a timely manner. We found that State/INL did not generally collect all expected progress reports from implementers for seven projects, and of those seven, it did not collect any reports for three projects. Furthermore, State/INL did not provide documentation for eight projects demonstrating that monitoring staff had generally assessed and approved implementers’ periodic progress reports. We also found that for seven projects, State/INL did not provide documentation demonstrating that monitoring staff had generally conducted site or field monitoring visits or taken other steps to validate the partner’s performance implementing the project. For example, for one project that provided training to Mexican immigration officers on the southern border, State/INL only provided one quarterly progress report of the four we requested for the period of our review. For this project, State/INL also did not provide documentation that monitoring staff had taken steps to review and approve the report or that they had conducted any monitoring site visits. A State/INL official explained that they requested the quarterly reports, but at times implementers did not submit them. Without implementing procedures to consistently collect, assess, and approve performance reports from implementers, monitoring staff may not have sufficient information to assess implementers’ performance and determine whether corrective actions are needed. We did not see evidence that State/INL had procedures in place to ensure that monitoring officials consistently follow key practices in the area of monitoring project implementation. Figure 4 illustrates the extent to which State/INL followed each related key practice for monitoring project implementation. State/INL monitoring officials did not consistently track performance data against established measures for four Mérida Initiative projects we reviewed; these four projects were a subset of the 15 State/INL projects discussed above. Tracking performance data—a key practice for monitoring project implementation—can provide meaningful information on projects’ progress in achieving intended results. The four projects we reviewed included two grants focused on police professionalization; one interagency agreement focused on assistance to forensic laboratories; and one agreement with an international organization focused on conducting a survey on police standards, training, and professionalization. We reviewed how State/INL tracked performance data for these selected projects as part of its efforts to assess and approve implementing partners’ periodic performance reports and data as outlined in the key monitoring practices. Specifically, we analyzed the extent to which State/INL tracked data contained in quarterly progress reports and compared these data to established performance measures. State/INL and the project implementers outlined these performance measures in monitoring documents that these implementers developed and State/INL approved. Some of these projects’ monitoring documents also included data sources, data collection frequency, and performance targets. State/INL did not track performance data for two of the four selected projects and tracked such data inconsistently for the other two selected projects. As a result, State/INL cannot ensure that it has accurate and reliable performance data for its Mérida Initiative projects. Such data could help State/INL determine whether projects are achieving intended results and take necessary corrective actions to improve project performance over time. For the two police professionalization projects we reviewed, State/INL did not track performance data against established performance measures outlined in the project narrative at the start of the projects. Some of these projects’ performance measures reflected outputs—such as the number of participants completing at least 25 hours of police training and the number of citizen surveys conducted on public trust of law enforcement. Other performance measures reflected outcomes—such as the percentage of law enforcement officials who feel ready for promotion after completing training and results of citizen surveys on perceived security where law enforcement trainings were conducted. (See examples in table 2.) However, State/INL did not clearly track or reference such performance measures in these two projects’ quarterly progress reports. Instead, State/INL provided details in these reports on project activities and training that did not clearly link to the projects’ performance measures. For example, State/INL noted the number of participants who took a specific training course on a certain date, but did not provide the total number of participants’ training hours to compare them to the performance measure on the total number of participants who completed at least 25 hours of training. State/INL monitoring officials said they had not systematically tracked data on the performance measures of these projects over time, but instead focused on ensuring the trainings were conducted and the number of training participants were tracked. These officials acknowledged the need to improve their tracking of these projects’ progress against their performance measures. We also identified information in quarterly progress reports for two projects suggesting that the reports did not accurately reflect project activities in those quarters. For example, for one project, State/INL included identical information in two separate quarterly reports even though the implementer conducted different project activities in those two quarters. Thus, at a minimum, the information in one of the quarterly reports did not accurately reflect the project’s activities conducted in that quarter. We found the same issue with another project’s reports. State/INL officials said they were not aware that the project information in these reports were identical. For the two other State/INL projects we reviewed (one forensics laboratory accreditation project and one police survey project), State/INL tracked some performance data but did so inconsistently. These projects’ performance measures reflected outputs, such as the number of survey pollsters hired and trained and the number of accredited forensic laboratories that maintain their accreditation. Other performance measures reflected outcomes, such as the percentage of forensic laboratories trainees reporting improved knowledge of subject matter and satisfaction rates for training courses for the forensics laboratory project. (See examples in table 3.) In one of these two projects’ quarterly reports, the project implementers inconsistently described and numbered some of the performance measures, and they did not explain the discrepancies. Also, the implementers mentioned different performance measures in different quarterly progress reports—with some measures dropping off in some quarters and new measures appearing in others—without providing a rationale in the reports. As a result, State/INL could not consistently track progress of some of the performance measures over time. State/INL officials stated that these two implementers only included activities in the quarterly reports that they conducted in that quarter, which would result in different and inconsistent performance measures in each report. In addition, some of the reported project activities did not consistently and clearly align with the performance measures to allow State/INL to track the project’s progress against these measures. For example, some performance measures reflected percentages (e.g., 90 percent of authorities responsible for forensic laboratories routinely attend regional and national conferences), but the report listed the names of conference participants, dates, and locations in a table next to that performance measure. When asked about these discrepancies, State/ INL officials said that they did not ensure that implementers provided complete information to clearly track the project’s progress against performance measures. However, they said that they also conduct monitoring through informal methods not documented in the progress reports, such as through communication via phone calls and emails with the implementers. Such informal methods do not provide State/INL with the necessary data to assess a project’s performance against its goals. For the four State/INL projects we reviewed, State/INL monitoring managers did not establish procedures to collect and review project performance data, such as the number of people who completed a targeted number of hours of training, or the results of training surveys. These managers said they did not prioritize establishing performance tracking procedures and instead focused on the implementation of the projects’ activities, such as counting the number of participants who attended one training course for a particular month. For example, while some monitoring staff sent monthly emails to their managers describing project activities, State/INL monitoring managers did not establish procedures—such as holding regular meetings with or requiring reporting from monitoring staff—that focused on tracking the projects’ progress against established performance measures. State/INL receives activity data from project implementers that it considers useful in helping the agency monitor the projects’ implementation and activities. State/INL officials told us that project activity data in the quarterly progress reports—such as when trainings were conducted and how many people attended—help keep them informed of and monitor the projects’ implementation. In addition, since 2015, State/INL Mexico has collected detailed data and information in tracking databases on (1) training events and related surveys on that training, and (2) forensic laboratory accreditations and correctional facility accreditations. The training tracking database contains data on over 6,000 training events, 100,000 trainee records, and over 20,000 survey responses from training event participants. This database can generate numerous reports covering the number of people who completed a specific trained course, which training courses a specific person completed, training survey results, and which implementer conducted the training, among other information. State/INL databases also collect information on the status of forensics laboratories and correctional facilities across Mexico that are being accredited through Mérida Initiative projects. The forensics database includes pages for each laboratory with detailed information about the level of accreditation received, and types of trainings conducted, among other things. The correctional facilities database is structured similarly to the laboratories database with pages for each facility with detailed information on accreditation status and timeline, among other things. According to State/INL officials, like the training tracking system, the forensics and correctional facilities databases can generate reports, such as monthly progress reports. Finally, State/INL Mexico is implementing a new cloud-based monitoring database—called DevResults—that will consolidate and track data on activity, output, and outcome indicators for all Mérida Initiative projects. According to State/INL officials, they implemented DevResults so that State/INL could track a project’s progress and trends in real time against its performance goals. According to State/INL officials, DevResults included data for 84 projects as of February 2020. They also noted that agency officials and implementers have completed training on DevResults, and additional training will be provided as needed. State/INL officials said they plan to continue adding data for past and present Mérida Initiative projects in 2020. We reviewed five of USAID’s Mérida Initiative projects to assess the extent to which USAID followed key monitoring practices in the areas of assigning monitoring duties to qualified staff, planning a monitoring approach, and monitoring project implementation. For these projects, USAID almost always followed key practices—as shown in figure 5—and for a subset of two selected projects, it consistently tracked project performance. According to USAID officials, USAID management conducted periodic portfolio reviews to ensure that monitoring staff adequately monitored Mérida Initiative projects and followed key practices. However, for all five USAID projects we reviewed, monitoring plans did not address identified risks, which could help the agency allocate monitoring resources to those aspects of the projects that warrant closer scrutiny. USAID generally established roles and responsibilities for technical staff responsible for monitoring projects, but for two of the five projects we reviewed it did not maintain documentation showing that it assigned staff with appropriate certifications. Like State/INL, USAID requires that staff responsible for monitoring Mérida Initiative projects be certified as CORs or AORs, which typically includes periodic training in monitoring projects. USAID assigns roles and responsibilities to these staff through a designation letter in which a contract or agreement officer designates a COR or AOR, respectively, to conduct technical oversight of each project. For the five projects we reviewed, USAID properly designated monitoring roles and responsibilities to technical staff, however there were gaps in staff certification documentation for technical staff for two projects. For example, we found that the person responsible for monitoring a project promoting justice reform and rule of law in Mexico did not have a valid certificate for 9 months of the project’s 4-year period of performance. Maintaining complete documentation of monitoring-related activities helps USAID management ensure adequate, continuous monitoring of projects. According to USAID, the gaps in documentation were caused by staff turnover and trouble accessing the government-wide system for recording the certification of staff, which was difficult to access or down from December 2017 to March 2018. Officials said that once the system to record certificates was brought back online, they were able to track certifications. Figure 6 illustrates the extent to which USAID followed each related key practice for assigning monitoring duties. USAID generally developed monitoring plans that included program goals and objectives and project-level performance measures, but the monitoring plans did not address project risks. All five projects generally had a monitoring plan that identified project goals and objectives, and relevant project-level performance measures. However, none of the monitoring plans generally addressed identified risks related to achieving project objectives. While USAID provided documentation showing that the agency had conducted various assessments considering risk for each project, the results of these assessments were not addressed in the projects’ monitoring plans. For example, for a project to promote justice and rule of law in Mexico, USAID assessed risks relating to terrorism, environmental effects, sustainability, and gender equity in carrying out the project. However, the project’s monitoring plan did not address identified risk levels and related monitoring actions designed to mitigate risks identified in these assessments. USAID explained that they address ongoing monitoring of risk through several other processes, such as project design, procurement actions, financial management, award management and administration, semi-annual project portfolio reviews, and annual risk-based assessments of the USAID’s portfolio in Mexico, among others. However, identifying and addressing risks in the monitoring plan can help ensure that monitoring staff are aware of potential impediments to project success about which they need to be vigilant or take steps to mitigate as they monitor the projects. Additionally, determining which activities warrant greater oversight can also help agencies manage monitoring resources cost effectively. Figure 7 illustrates the extent to which USAID followed each related key practice for planning a monitoring approach. USAID generally followed key practices for monitoring project implementation about two-thirds of the time. We found that USAID collected all progress reports for four of the five projects we reviewed. For two projects, USAID did not provide documentation demonstrating that monitoring staff had generally assessed and approved implementers’ periodic progress reports. For all five projects, USAID provided documentation demonstrating that monitoring staff had generally validated implementing partners’ performance through site visits. Figure 8 illustrates the extent to which USAID followed each related key practice for monitoring project implementation. USAID monitoring officials consistently tracked performance data and compared them to established performance measures for the two projects we reviewed; these two projects were a subset of the five USAID projects discussed above. To review the extent to which USAID assessed and approved implementing partners’ periodic reports and data—one of the eight key monitoring practices—we determined whether USAID tracked performance data contained in quarterly or annual progress reports. USAID funds one of the two projects through a cooperative agreement focused on strengthening human rights, and the other project through a contract focused on improving the criminal justice sector. USAID and project implementers outlined these projects’ performance measures in project-specific monitoring plans that both parties developed at the start of the project or revised after the project was in place. Project implementers developed these plans, and USAID approved them. The plans included details related to the performance measures, such as data sources, data collection frequency, and targets. In accordance with these plans, USAID and project implementers tracked performance measures in annual progress reports, while they primarily tracked detailed project activity in quarterly progress reports. The two USAID projects’ progress reports included tables that tracked project performance. Some of the projects’ performance measures reflected outcomes, such as prosecution rates of Mexican government prosecution units that received technical support and the number of improved measures to address serious human rights violations. Some performance measures reflected outputs, such as the number of Mexican officials trained in human rights advocacy areas. See table 4 for examples of performance measures and information in the progress reports we reviewed. When the implementer and USAID changed performance measures, they also revised project-specific monitoring plans to document these changes. For example, for one project we reviewed, the established measures were no longer effective in measuring progress toward the project’s objectives, according to USAID officials. As a result, the implementer and USAID modified the project’s monitoring plan at least twice, revising the performance measures to better align with the project’s objectives. The subsequent progress reports we reviewed for these projects included data on the revised performance measures. USAID has procedures to help ensure that monitoring staff track performance data. According to USAID officials, USAID began sending out a standard spreadsheet to all Mérida Initiative implementing partners in 2018 that requires them to report performance data on a quarterly or annual basis. USAID uses these spreadsheets to track Mérida Initiative project performance data. Since May 2017, USAID has also conducted 6- month portfolio reviews in which monitoring managers and their staff review project activities and performance data collected for their projects and discuss project successes and challenges. USAID managers told us that they implemented these reviews to help ensure that their staff monitor project performance. According to State/INL, the Government of Mexico provides data to State/INL that help the agency monitor its Mérida Initiative assistance efforts and provides insights into the implementation of the initiative overall. State/INL also noted that, in 2014, the agency hired a contractor to work with both the U.S. and Mexican governments to develop a comprehensive set of indicators to evaluate the progress and results of the Mérida Initiative. In 2015, Mexico agreed that it would provide data to State/INL on this set of indicators to demonstrate the effects of the Mérida Initiative, according to State/INL officials. These officials told us that they try to obtain the data on an annual basis. They also noted that the purpose of collecting the data from Mexico was to establish a mechanism to share information on the Mérida Initiative’s effects and to improve U.S.- Mexico cooperation on the initiative. According to State/INL officials, various Mexican agencies collect the data, such as the Army, Air Force, Navy, Tax Administration Service/Customs, Attorney General’s Office, and National Institute of Statistics and Geography. The Mexico data comprise about 170 indicators (data points) related to the overall goals and program areas of the Mérida Initiative: Counternarcotics/Special Investigations, Criminal Prosecutions, Border Security and Ports of Entry, and Security and Law Enforcement. Some data are closely linked to Mérida Initiative–funded projects, such as the accreditation status of Mexican correctional facilities. Other data provide broader context, such as Mexican civil society’s perception of Mexican agencies. In addition, data, such as the number of accredited forensic laboratories and correctional facilities, may reflect progress in institution building. Other data, such as the number of accounts blocked by the Mexican Financial Intelligence Unit, may reflect operational capacity development. See table 5 below for examples of the indicators, as reported by Mexico to State/INL. State/INL officials said they use the indicator data in discussions with Mexican officials to help monitor the implementation and activities of the Mérida Initiative, including which best practices can be replicated across Mexico. State/INL officials said the data also inform the agency’s internal decision making on which Mérida Initiative programs are effective and which programs it should modify. For example, according to State/INL officials, the indicator data help track the use of equipment donated to Mexico through the Mérida Initiative. If the data show extensive use of equipment, State/INL can use the data to justify a request for additional equipment or to approve maintenance of the equipment, according to agency officials. For over a decade, the Mérida Initiative has funded programs intended to address serious challenges to security and the rule of law. As the United States continues to support hundreds of Mérida Initiative projects in Mexico, it is important that State/INL monitor these projects carefully and stay well informed of the projects’ performance to ensure that they are as effective as possible. USAID has established procedures that help ensure that it follows most key monitoring practices, including those related to assigning monitoring duties to qualified staff and monitoring project implementation. State/INL management has not established such procedures for the projects we reviewed, limiting its ability to stay well informed of project performance and make course corrections to improve performance when necessary. While State/INL and USAID often conducted assessments to identify risks that may affect the achievement of project objectives, they generally did not address the results of the risk assessments in projects’ monitoring plans. Developing monitoring plans to address risks would help establish the appropriate level of oversight needed for each project, which in turn could lead to more cost-effective management of these projects. We are making the following two recommendations, one to State and one to USAID: The Secretary of State should ensure that State/INL establishes procedures that verify that monitoring officials for Mérida Initiative projects follow the key practices. (Recommendation 1) The USAID Administrator should establish procedures to ensure that monitoring officials for Mérida Initiative projects develop monitoring plans that address risks. (Recommendation 2) We provided a draft of this report to State, DOD, DHS, DOJ, and USAID for review and comment. Some of the agencies provided technical comments, which we incorporated as appropriate. State and USAID also provided formal comments, which are reproduced in appendixes III and IV. State agreed with our recommendation to establish procedures for staff monitoring Mérida Initiative projects to follow key practices. State indicated that it is working to create new monitoring and evaluation guidance consolidated across State/INL, based in part on GAO’s leading practices. According to State, the new guidance will address the areas highlighted in this report related to monitoring Mérida Initiative projects. State/INL plans to institute annual program reviews in which monitoring staff will assess project performance, effects, and alignment with current and planned priorities. State indicated that annually reviewing State/INL programming will help identify underperforming projects, give relevant staff a forum to discuss any issues or challenges to implementation and monitoring, and ensure the bureau follows the key monitoring practices outlined in this report. USAID also agreed with our recommendation to establish procedures to ensure that staff monitoring Merida Initiative projects develop monitoring plans that address risk. USAID indicated that USAID/Mexico is revising its Project and Activity Design Mission Order to incorporate recently issued USAID guidance and address our recommendation. According to USAID, the mission order will provide a framework and guidance to ensure that USAID/Mexico systematically addresses project risks and incorporates them into the respective monitoring plan. We are sending copies of this report to the appropriate congressional committees, the Secretary of State, and the USAID Administrator. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2964 or GurkinC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix V. This report (1) examines the extent to which the Department of State (State), Bureau of International Narcotics and Law Enforcement Affairs (State/INL), follows key practices in monitoring Mérida Initiative projects and tracks project performance data against established measures; (2) examines the extent to which the United States Agency for International Development (USAID) follows key practices in monitoring Mérida Initiative projects and tracks project performance data against established measures; and (3) describes how State/INL uses data from the Government of Mexico to help monitor the implementation of Mérida Initiative projects. To address these objectives, we reviewed relevant State and USAID agency documents and interviewed agency officials from the Departments of State (State), Homeland Security (DHS), Defense (DOD), and Justice (DOD), and USAID in Washington, D.C., and officials from State and USAID in Mexico City. In 2019, we reported on 14 leading practices for monitoring foreign assistance that agencies should incorporate in their monitoring policies to help ensure that they effectively manage foreign assistance, address impediments, and meet their assistance goals. From these leading practices, which are focused on a high-level assessment of agency monitoring policies, we derived eight key practices that can help agencies monitor the implementation and performance at the project level, such as those implemented under the Mérida Initiative. These eight key practices include those that in our judgment directly relate to monitoring project- level performance activities. We did not address monitoring of financial activities, because our review focused on performance monitoring. We made minor modifications to the key practices selected to reflect the focus of our review. We also grouped the selected key monitoring practices into three areas: (1) assigning monitoring duties to qualified staff, (2) planning a monitoring approach, and (3) monitoring project implementation. To determine the extent to which State/INL and USAID followed key practices in monitoring Mérida Initiative projects, we selected a nongeneralizable sample of 15 high–dollar value State/INL projects and five high–dollar value USAID projects that started between January 1, 2014, and December 31, 2016. (See app. II for details on these 20 projects). Some of these projects were ongoing after fiscal year 2019. We selected the projects from a list provided by State/INL and USAID. State’s list included 388 projects, and USAID’s list included 57 projects for a total of 445 projects under the Mérida Initiative. We selected projects implemented through a variety of mechanisms. For State/INL, we selected two letters of agreement with international organizations, four grants, three contracts, and two interagency agreements implemented by DOD, two interagency agreements implemented by DHS, and two interagency agreements implemented by DOJ. For USAID, we selected two contracts and three grants. The value of the 15 State projects in our sample is about $88 million, and the value of the five USAID projects in our sample is about $107 million. These 15 State/INL projects represent about 25 percent of the total value of the State/INL projects that started during this period. These five USAID projects were the highest value contracts and grants cooperative agreements and represent about 70 percent of the total value of USAID projects that started during this period. Because State/INL implements about 90 percent of all Mérida Initiative projects, we chose a larger State/INL sample than USAID sample. We assessed the agencies’ monitoring of the 20 selected Mérida Initiative projects against eight key monitoring practices largely derived from GAO’s Leading Practices for Monitoring Foreign Assistance. We reviewed documents to determine the extent to which State/INL and USAID followed the eight key monitoring practices for each of the selected Mérida Initiative projects. Specifically, for each selected project, we requested monitoring plans; work plans; risk assessments; Contract, Grant, or Agreement Officer Representative Certificates; Contract, Grant, or Agreement Officers Representatives Designation Letters; implementer progress reports for the latest year of activity of each project (at the time of our review); samples of field or site visit reports; and samples of monitoring emails between monitoring staff and the implementers. We reviewed available documents as they related to each key practice to determine the extent to which the agency had taken steps to follow and document the key practice for each project. On the basis of our review, we assessed whether the key practices were “generally followed,” “partially followed,” or “not followed.” We rated the extent to which the agency followed each key practice as “generally followed” if we received evidence that all critical elements of the key practice were conducted and documented to a large or full extent, “partially followed” if we received evidence that some but not all critical elements of the key practice were conducted and documented, and “not followed” if we did not receive evidence that any of the critical elements of the key practice were conducted and documented. To perform these analyses, two analysts reviewed the documents to rate the extent to which each key practice was met. The analysts worked iteratively, comparing notes and reconciling differences at each stage of the analysis. In addition, GAO staff independent of the two analysts reviewed the final analysis, and modified it as appropriate. To determine the extent State/INL and USAID track project performance, we chose a nongeneralizable subset of the 20 projects listed above. Specifically, we chose six projects—four State/INL projects and two USAID projects—primarily based on their high–dollar values. (See app. II for details on these six projects.) We chose a small subset of State/INL and USAID projects to conduct a detailed analysis of data in the projects’ annual and quarterly reports. Specifically, for the four State/INL projects, we chose high–dollar value projects for each of the following implementing mechanisms: grants, interagency agreements, and agreements with international organizations. We excluded contracts from the State/INL subset sample, because the high–dollar value contracts generally did not have the project-level performance measures needed to assess State’s tracking of performance data. We included a second grant in our sample in place of a contract, because more Mérida Initiative State/INL projects are grants than interagency agreements or agreements with international organizations. As a result, our State/INL sample consisted of two grants, one interagency agreement, and one agreement with an international organization. For the USAID sample, we chose one grant or cooperative agreement and one contract. We did not choose other types of implementing agreements because grants/cooperative agreements and contracts comprise over 98 percent of USAID projects for the timeframe of our review. For both the State/INL and USAID selected projects, we reviewed project monitoring documents—such as project narratives, workplans, and monitoring plans—and identified the performance measures outlined in these documents for each project. We then reviewed these projects’ latest year of implementer quarterly and annual progress reports (at the time of our review), and assessed the extent to which State/INL and USAID assessed and approved implementing partners’ periodic performance reports and data in accordance with the key monitoring practice of assessing and approving performance information. We also met with State/INL and USAID monitoring officials in Washington, D.C., and Mexico to understand the process for how these officials track the performance of these selected projects, including in the projects’ quarterly and annual reports. We also reviewed the reports to identify any discrepancies or errors. To describe the type of Government of Mexico data that State/INL uses to monitor Mérida Initiative implementation, we reviewed data from fiscal years 2015-2018 related to Mérida Initiative projects collected by the Government of Mexico and shared with State/INL. We also met with State/INL officials in Washington, D.C., and Mexico City to discuss the data, including how it is used and its reliability. After our discussions with State/INL officials, State/INL selected some unclassified examples of the indicators, which we included in our report. The purpose of this component of our review was to describe the nature and use of the Mexico data. We conducted this performance audit from November 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides a list of the 15 Department of State (State), Bureau of International Narcotics and Law Enforcement Affairs (State/INL) Mérida Initiative projects, and five United States Agency for International Development (USAID) Mérida Initiative projects selected for our review. We assessed State/INL and USAID monitoring of these projects against key monitoring practices as described in appendix I. The subset of these projects (four State/INL and two USAID) selected for our analysis of the agencies’ tracking of performance data is noted below. State/INL provided the details in table 6, and USAID provided the details in table 7. In addition to the contact named above, James Michels (Assistant Director), Francisco Enriquez (Analyst-in-Charge), Terry Allen, Ashley Alley, Lilia Chaidez, Martin De Alteriis, Neil Doherty, Teresa Heger, John Hussey, and Andrew Kincare made key contributions to this report.", "summary": "The Mérida Initiative is a bilateral U.S.-Mexico partnership to address crime and violence and enhance the rule of law in Mexico. Through this initiative, managed by State/INL and USAID, the United States has provided a wide range of assistance, including training and equipment. Since fiscal year 2008, U.S. funding for the Mérida Initiative has totaled about $3 billion. GAO has identified key practices for monitoring foreign assistance programs that agencies should implement to address impediments, effectively manage foreign assistance, and meet assistance goals. These practices are generally consistent with policies of State, USAID, and the Office of Management and Budget. GAO was asked to review issues related to Mérida Initiative implementation and objectives. This report examines the extent to which State/INL and USAID follow key practices in monitoring Mérida Initiative projects and track project performance against established measures. GAO reviewed State and USAID documents and data for a nongeneralizable sample of 20 high-dollar value projects, and interviewed officials from State; USAID; and other U.S. agencies in Washington, D.C., and Mexico City. For the 15 Department of State (State) Bureau of International Narcotics and Law Enforcement Affairs (State/INL) projects GAO reviewed, State/INL generally followed key monitoring practices about half of the time. (See figure.) For example, State/INL almost always assigned staff with appropriate qualifications to monitor Mérida Initiative projects. However, for most projects, State/INL did not generally follow the key practices for developing monitoring plans that identify project goals and objectives and address risks to achieving them. Furthermore, State/INL did not consistently track project performance data. By establishing procedures for following key monitoring practices, State/INL would be better positioned to stay well informed of its projects' performance, take corrective action when necessary, and help ensure that projects achieve intended results. For the five United States Agency for International Development (USAID) projects GAO reviewed, USAID almost always followed key monitoring practices and tracked performance data. USAID established procedures, such as periodic portfolio reviews, to ensure its staff consistently monitored projects. While USAID identified risks to implementing projects, it did not address those risks in its monitoring plans. (See figure.) Developing monitoring plans to address risks could help USAID determine the appropriate level of oversight for each Mérida Initiative project and manage monitoring resources more cost effectively. GAO is making two recommendations, including that State establish procedures to verify monitoring staff follow key practices, and that USAID ensure that monitoring plans address risks. State and USAID concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The United States has maintained a cooperative relationship with North Macedonia across a broad range of political, economic, cultural, military, and social issues since North Macedonia gained its independence from Yugoslavia in 1991. The United States formally recognized North Macedonia in 1994, and the countries established full diplomatic relations in 1995. Following a civil conflict between the country’s ethnic Albanian minority and the Macedonian majority in 2001, the United States and the EU mediated a resolution and supported efforts to agree to a peaceful, political solution to the crisis, known as the Ohrid Framework Agreement. Figure 1 shows Macedonia’s location in southeastern Europe. corridor from Western and Central Europe to the Aegean Sea 2,118,945 (146th largest in the world, 2018 $31.03 billion gross domestic product in 2017 22.4 percent unemployment rate (2017 est.) Macedonian, 64.2 percent; Albanian, 25.2 percent; Turkish, 3.9 percent; Romani, 2.7 percent; Serb, 1.8 percent; other, 2.2 percent (2002 est.) In 2011, USAID and State assessed that North Macedonia’s conservative party, the Internal Macedonian Revolutionary Organization–Democratic Party for Macedonian National Unity (known as VMRO-DPMNE, or VMRO) was consolidating political power when it became the ruling party in 2006. USAID and State found that government control over North Macedonia’s judiciary, Parliament, media, civil society, and local government was increasing. In December 2012, security personnel ejected members of the Social Democratic Union of Macedonia (SDSM), the main opposition party, from the Parliament building, along with journalists who had been observing the session, after SDSM members protested VMRO’s proposed budget. SDSM boycotted Parliament for approximately 2 months after this incident but returned in March 2013, when the parties reached an agreement. In May 2014, SDSM boycotted Parliament again, accusing VMRO of having violated the country’s electoral code in April 2014 elections, in which VMRO retained its parliamentary majority. In December 2014, USAID concluded that inadequate mechanisms for competition and political accountability represented the primary democracy and governance problems in North Macedonia. USAID noted, among other things, that the ruling party had deployed public resources and control of the media to limit competition; captured executive, legislative, and judicial institutions; and put pressure on, and excluded, civil society. In February 2015, the leader of SDSM began releasing phone conversations allegedly recorded by the government’s counterintelligence service that revealed widespread corruption and state capture by the ruling party, VMRO, triggering a political crisis. (See fig. 2 for a timeline of the crisis.) Street protests followed these leaks. The four main political parties invited the United States and EU to facilitate negotiations to broker a peaceful resolution to the crisis, known as the Przino Agreement, in June 2015. The parties agreed to, among other things, hold free and fair elections by the end of April 2016. After two failed attempts to hold elections in early 2016, the United States and EU convened North Macedonia’s political parties for another round of negotiations in the summer of 2016. The parties reached agreement on a number of key reforms and set the conditions for parliamentary elections by the end of 2016. These elections took place on December 11, 2016, without a clear majority winner. Although SDSM leader Zoran Zaev formed a majority coalition in February 2017, then-President Ivanov refused to give Zaev the mandate to form a new government until May 2017, following a violent storming of Parliament by hundreds of protesters in April. In May 2017, President Ivanov authorized SDSM to form a government with a coalition of ethnic Albanian parties. The new coalition government expressed support for North Macedonia’s accession to the EU and membership in the North Atlantic Treaty Organization (NATO). On February 12, 2019, the Republic of Macedonia formally changed its name to the Republic of North Macedonia, ending a longstanding dispute over its name with Greece, which had for years exercised its veto power in NATO to block North Macedonia’s membership (see the text box for details of North Macedonia’s NATO aspirations and name dispute with Greece). On February 6, 2019, NATO members signed an accession protocol with North Macedonia, paving the way for North Macedonia to become the 30th member of NATO. The EU states also opened the path to potential EU accession negotiations with North Macedonia in June 2019, contingent on the country’s full implementation of its agreement with Greece and its demonstrated progress in implementing EU-recommended reforms. However, the EU postponed the decision until no later than October 2019. On February 15, 2019, the U.S. government recognized North Macedonia’s name change. North Macedonia’s NATO Aspirations and Name Dispute with Greece In 2008, having determined that North Macedonia met North Atlantic Treaty Organization (NATO) membership criteria, NATO allies decided that North Macedonia would be invited to join NATO as soon as North Macedonia and Greece, a NATO member, resolved a dispute regarding North Macedonia’s name. A brief timeline of this dispute follows. 1991: The “Republic of Macedonia” declared its independence from the former Yugoslavia. Greece objected to this name, viewing “Macedonia” as representing territorial claims against Greece, which has a northern province by the same name. Because Greece has veto power in NATO, it was able to prevent the Republic of Macedonia from joining the organization. 1995: Greece and the Republic of Macedonia reached an interim accord in which Greece agreed not to block applications by the Republic of Macedonia to international organizations if made under the name “Former Yugoslav Republic of Macedonia.” 2008: At a NATO Summit in Bucharest, Greece blocked the Republic of Macedonia’s bid to join NATO. Dec. 2011: The International Court of Justice ruled that Greece had been wrong to block the Republic of Macedonia’s bid to enter NATO in 2008, but the decision did not affect NATO’s consensus-based decision-making process. June 12, 2018: The foreign ministers of Greece and the Republic of Macedonia signed the Prespa agreement, whereby the Republic of Macedonia would change its name to the Republic of North Macedonia, Greece would no longer object to North Macedonia’s Euro- Atlantic integration, and both countries would promise to respect existing borders. Sept. 30, 2018: The Republic of Macedonia held a referendum on changing its name to the Republic of North Macedonia, with nearly 92 percent of votes in favor of the change. Overall turnout for the referendum was about 37 percent, as opponents of the name change boycotted the referendum. Oct. 19, 2018: A two-thirds majority in North Macedonia’s Parliament voted in favor of the name change. Jan. 11, 2019: North Macedonia’s Parliament approved a constitutional amendment that renamed the country to the Republic of North Macedonia. Jan. 25, 2019: The Greek Parliament voted to approve the deal outlined in the Prespa agreement. Feb. 6, 2019: NATO’s 29 members signed an accession protocol with North Macedonia, paving the way for the country to become the 30th member of the alliance. Feb. 8, 2019: Greece became the first NATO member to ratify the accession protocol. Feb. 12, 2019: The Republic of Macedonia formally changed its name to the Republic of North Macedonia. Feb. 15, 2019: The U.S. government recognized the Prespa Agreement’s entry into force and North Macedonia’s name change. According to State, democracy assistance seeks to advance freedom and dignity by assisting governments and citizens to establish, consolidate, and protect democratic institutions, processes, and values. These components include participatory and accountable governance, rule of law, authentic political competition, civil society, human rights, and the free flow of information. Democracy assistance falls into six program areas—Rule of Law, Good Governance, Political Competition and Consensus-Building, Civil Society, Independent Media and Free Flow of Information, and Human Rights—each with different program elements. See appendix V for descriptions of democracy program areas and program elements. The U.S. government provides democracy assistance through multiple bureaus and offices in USAID, State, and NED. For a list of these agencies’ roles and responsibilities related to democracy assistance overseas, see table 1. Federal laws governing agencies’ use of contracts and grants seek to promote discipline in the selection and use of procurement contracts, grant agreements, and cooperative agreements; maximize competition in making procurement contracts; and encourage competition in making grants and cooperative agreements. USAID’s operational policy, the Automated Directives System, incorporates these requirements into agency guidance. Thus, in selecting recipients of democracy assistance, agency staff are required to guarantee the integrity of the competitive award process by ensuring overall fairness and considering all eligible applications for an award. Since North Macedonia’s separation from Yugoslavia in 1991, the United States has provided democracy assistance to support North Macedonia’s Euro-Atlantic integration and the development of prosperous and democratic institutions. This assistance has focused on promoting rule of law, political processes, citizen engagement, and free media. In light of North Macedonia’s 2015 political crisis, as well as democratic backsliding observed in the years before the crisis, USAID narrowed its assistance goals for the country to focus on more inclusive citizen engagement in civic life, political processes, and the free flow of information to support better functioning checks on executive authority. The USAID mission in North Macedonia’s strategic plan for 2011 through 2015 identified three primary objectives of U.S. democracy assistance in North Macedonia: Promote greater checks and balances in democratic processes by empowering local governments, promoting greater equilibrium among the branches of government at the national level, and promoting political accountability. Develop a basic education system that prepares youth for a modern economy and stable democracy by improving students’ basic skills, expanding workforce skills, and enhancing ethnic integration in the education sector. Increase job-creating private-sector growth in targeted sectors by improving the country’s business environment in critical areas and strengthening key private-sector capacities. Additionally, USAID and State relied on a broader strategic framework, the integrated country strategy, when developing democracy projects in North Macedonia. This interagency, multiyear, overarching strategy outlines U.S. policy priorities and objectives for North Macedonia. Its objectives include improving North Macedonia’s democratic and civil society environment to improve the country’s prospects for joining NATO and for completing accession negotiations with the EU. U.S. government agencies obligated more than $45 million in democracy assistance funding for North Macedonia in fiscal years 2012 through 2017, according to agency award documents and data (see table 2). This assistance was provided to support U.S. strategic objectives for North Macedonia, including promoting the rule of law, political processes, citizen engagement, and free media. USAID obligated approximately $38 million, and NED obligated approximately $4.2 million. Additionally, the Public Affairs Section of the U.S. Embassy in Skopje provided about $3.7 million in assistance. However, we are unable to report total State obligations for democracy assistance for North Macedonia because of uncertainty about the reliability of award data from State’s Bureau of International Narcotics and Law Enforcement Affairs (INL). In addition, State’s Bureau of Democracy, Human Rights, and Labor (DRL) provided democracy assistance in North Macedonia solely through regional grants and did not specify which obligated funds were provided for democracy assistance in North Macedonia. See appendixes II through IV for a full list of USAID, NED, and State awards for democracy assistance in North Macedonia in fiscal years 2012 through 2017. USAID provided about $38 million in democracy assistance for North Macedonia in fiscal years 2012 through 2017. As table 3 shows, the majority of USAID funding—approximately $17 million—supported projects in the civil society program area, while more than $7 million supported political competition and consensus building. Several USAID bureaus and offices provided democracy assistance in North Macedonia during that period. The Bureau for Democracy, Conflict, and Humanitarian Assistance and the Bureau for Europe and Eurasia provided such assistance through contracts, grants, and cooperative agreements. According to agency documents, USAID supported U.S. foreign policy in North Macedonia by promoting democracy and respect for the rule of law and human rights, through activities such as supporting civil society organizations and developing the capacity of independent media outlets in the country. USAID also promoted political competition and accountability by working with political parties and state institutions to enable an environment for free and fair elections. In addition, USAID’s Office of Transition Initiatives (OTI) provided short- term assistance to groups in the country. OTI established an office in North Macedonia in September 2015 to support reform processes outlined in the Przino Agreement. According to OTI documents, OTI supports U.S. foreign policy objectives by promoting stability, peace, and democracy through fast, flexible, short-term assistance targeted to key political transition and stabilization needs. The office works with civil society organizations, media groups, and government institutions to increase access to reliable information, promote free and open civic discourse, and support democratic reforms. In North Macedonia, OTI funded initiatives such as a televised debate series that presented civil dialogue and diverse viewpoints on issues affecting citizens of North Macedonia. OTI grants have also supported digital media initiatives and civic engagement projects. USAID assistance supported initiatives in a range of democracy program areas. Table 4 shows examples of USAID projects across different program areas, some of which are related to democracy assistance. NED awarded 72 grants totaling nearly $4.2 million in North Macedonia in fiscal years 2012 through 2017. Of these, six grants, totaling almost $1.7 million, were awarded to two of NED’s core institutes—the National Democratic Institute and the Center for International Private Enterprise— while 66 grants, totaling about $2.6 million, were awarded to other organizations. In addition, NED awarded 61 grants totaling more than $17.1 million for regional programs that included North Macedonia. NED does not disaggregate cost data by individual country due to the nature of the Balkan regional programs NED supports. Thus, we are unable to report the amounts NED provided in North Macedonia through regional programs during the period of our review. After the onset of the political crisis in 2015, NED focused its democracy assistance in North Macedonia on three program areas: promoting good governance, supporting independent media, and fostering positive interethnic relations. NED grants supported a range of initiatives, including projects to improve investigative reporting on democratic reforms and rule-of-law matters, and to encourage youth leadership and activism. NED’s funding to the National Democratic Institute and the Center for International Private Enterprise supported a range of activities in North Macedonia. The institute worked with the country’s Parliament to improve its management and organization of the legislative process by, among other things, assisting Parliament in reviewing its legislative and oversight procedures. Other National Democratic Institute initiatives included encouraging participation by various groups in the democratic process, including the Roma population, women, and civil society organizations. The Center for International Private Enterprise received funding for one grant devoted to developing youth leadership. Several State offices—U.S. Embassy Skopje, INL, and DRL—provided funding for democracy assistance in North Macedonia, but only the funding provided by the embassy can be reliably reported. The embassy’s Public Affairs Section provided at least $3.7 million in democracy assistance in North Macedonia in fiscal years 2012 through 2017. INL was unable to provide reliable data on obligations on its awards in North Macedonia. DRL obligated more than $2 million to support democracy assistance activities at the regional level but due to the regional nature of its projects, was unable to provide country-level breakdowns of obligations. In fiscal years 2012 through 2017, Embassy Skopje’s Public Affairs Section obligated approximately $3.7 million in democracy assistance grants to organizations in North Macedonia. According to State officials, the embassy works with the Coordinator of U.S. Assistance for Europe and Eurasia to allocate democracy assistance and helps align assistance activities with the U.S. strategic goals for North Macedonia. The embassy’s Public Affairs Section also provides democracy assistance through other means, including media training programs, youth engagement projects, speaker programs, and the Democracy Commission Small Grants Program. The embassy granted $1.8 million for 91 grants through the Democracy Commission Small Grants Program in fiscal years 2012 through 2017. According to the embassy, grants through this program, which cannot exceed $24,000, support nongovernmental organizations’ efforts to promote the rule of law, independent media, interethnic community building, the empowerment of women and youth, human rights, and the institutionalization of open and pluralistic democratic political processes. Examples of awards for Democracy Commission grant–funded activities include the following: Women’s Rights Center ($22,900). This award funded a program to strengthen the capacities of organizations that are working with women victims of domestic violence. Civil Lyceum Project ($17,830). This project aimed to mobilize youth in Skopje to become more involved in the civil society sector and to help create young leaders who understand the value of civic engagement and advance democratic values. Way Out ($7,858). This award funded the maintenance and development of the online version of a student magazine. The remainder of the embassy’s Public Affairs Section awards for assistance in North Macedonia supported activities such as youth engagement projects, speakers, and media training programs, which included short-term trips for journalists from North Macedonia to receive training in the United States. INL provided democracy assistance to organizations in North Macedonia in fiscal years 2012 through 2017. INL was unable to provide reliable data on project-level obligations; however, it reported bulk obligations for democracy assistance projects that supported efforts to reform North Macedonia’s criminal justice system to meet rule-of-law benchmarks for Euro-Atlantic integration. INL’s assistance in North Macedonia focused on three primary areas: developing the country’s criminal justice system, developing legal professionals’ skills, and professionalizing the police. According to agency officials, this assistance is intended to strengthen North Macedonia’s justice sector and independent institutions. Specific INL activities included assisting with revisions to the criminal procedure code to promote a more adversarial justice system, providing technical advisors and equipment to the Special Prosecutor’s Office, and promoting accountable policing efforts by providing training to local police on crime scene management. In December 2017, we reported that INL funding data for democracy assistance projects were unreliable and we recommended that State identify and address factors that affect the reliability of its democracy assistance data. State concurred with this recommendation. As of July 2019, INL reported continued efforts to improve data quality and reliability, including ensuring that current and future transactions would maintain coding integrity. However, officials stated that, because of missing codes or miscoded items, they were unable to provide reliable data on obligations for INL awards for democracy assistance projects in North Macedonia for fiscal years 2012 through 2017. Although we determined that data for specific INL democracy awards were unreliable, INL reported providing bilateral assistance of approximately $14.2 million in North Macedonia in fiscal years 2012 through 2017, including $6.9 million for democracy assistance. However, we did not independently verify that INL provided this amount of bilateral assistance. DRL funded four awards that benefited North Macedonia in fiscal years 2012 through 2017. However, DRL awarded this assistance at the regional level and does not track country-level obligations for North Macedonia. One regional award with obligations of roughly $300,000 supported a project focusing on Roma populations in Bulgaria, North Macedonia, Romania, and Serbia. A second regional award provided more than $2 million for a project promoting the rule of law in the Balkans. The two remaining DRL awards provided $25,000 to organizations supporting local civil society organizations working to promote human rights. Our review of 13 USAID grants and cooperative agreements for democracy assistance—representing roughly half of USAID obligations in North Macedonia in fiscal years 2012 through 2017—found that in selecting recipients, the agency generally followed operational policies intended to ensure a fair and transparent selection process. (See table 5 for a list of the awards in our sample.) We found that staff at the USAID mission in North Macedonia generally evaluated applicants against the merit review criteria stated in public notices. We also found that USAID considered and recorded the strengths and weaknesses of applicants in selection committee memorandums for 10 of the 13 awards in our sample. For three awards originating from the same public notice, we were unable to determine, on the basis of available documentation, whether USAID considered the strengths and weaknesses of all applicants. Finally, we found that USAID documented the review procedures it used to assess applicants in selection committee memorandums. USAID’s selection committee considered merit review criteria that were consistent with those included in the agency’s public notices for 10 of the 13 awards for democracy assistance in North Macedonia that we reviewed. USAID’s process for selecting recipients of assistance for competitive awards requires announcing opportunities, reviewing applications, and making award decisions on the basis of published merit review criteria. USAID announces a grant opportunity by developing a notice of funding opportunity. Merit review criteria are developed by the USAID staff and reflect the agency’s strategic priorities for democracy assistance. After interested parties have submitted applications, a selection committee, also known as a technical evaluation committee, is appointed to review applications. All 13 awards in our sample included merit review criteria in public notices during the concept paper phase of awards, while 10 of the awards included merit review criteria for the full application phase. Many of the awards required selection committees to consider some of the same merit review criteria in assessing applicants. Examples of commonly applied criteria include the following: Technical approach. Reviewers are to assess the extent to which an applicant’s proposed activity is clear, logical, and technically sound and meets the objectives of the funding outlined in the public notice. Management plan and key personnel. Reviewers are to assess the extent to which an applicant considered staffing, roles and responsibilities, and other management issues for their proposed activity. Organizational capacity and past performance. Reviewers are to assess the extent to which the applicant demonstrated the technical and managerial resources and expertise to achieve their program objectives. Reviewers are also to assess the extent to which the applicant demonstrated technical and managerial resources and expertise in past programs and performed satisfactorily in similar programs executed in recent years. We found that in reviewing the 13 awards in our sample, USAID generally applied the criteria published for each award. Six of the 13 awards in our sample were two-phased awards, for which the mission required potential applicants to first submit an executive summary or concept paper for their proposed activity. For these awards, the mission published separate merit review criteria for concept papers and full applications, and selection committees assessed each type of submission against the relevant set of criteria. The selection committee memorandums for three awards showed that these merit review criteria were consistent with the criteria outlined in the public notices for each award. Specifically, in the first phase of the award process, staff at the USAID mission in North Macedonia applied the published criteria for concept papers in reviewing the submitted papers and selected those that best met the criteria. In the second phase for three awards, USAID solicited applications from the selected applicants and applied the published criteria for full applications in reviewing the submitted applications. In the case of three awards that originated from the same public notice, the notice lacked merit review criteria for the full application phase. The public notice for these three awards did not include the merit review criteria the selection committee would use to evaluate full applications. For the remaining seven one-phased awards in our sample, the selection committee memorandums showed that USAID applied the criteria published in the award solicitations in reviewing the applications that were submitted, consistent with USAID’s operational policies. We found that USAID officials generally assessed applicants’ strengths and weaknesses when reviewing applications for awards for democracy assistance in North Macedonia. USAID operational policy requires selection committees to evaluate the strengths and weaknesses of each applicant for an award relative to the merit review criteria. The committee then prepares a written selection memorandum recording its assessments, which is then sent to the agreement officer. For the 13 awards in our sample, selection committee memorandums show that officials generally considered and recorded their assessments of applicants’ strengths and weaknesses against the criteria outlined in the public notices. For example, in considering the applicants for one award in our sample, the selection committee assessed the strengths and weaknesses of applicants’ technical approaches by looking at the logical connection between their activities and stated objectives, their plans for community outreach, and their awareness of potential problems that might arise over the course of their projects. The committee also assessed applicants’ strengths and weaknesses with regard to management plans and key personnel by considering, among other things, applicants’ plans to train staff, their knowledge of the stakeholders they planned to engage, and the relevant experience of the organizations’ leaders. In addition, the committee assessed applicants’ strengths and weaknesses with regard to organizational capacity and past performance, primarily by examining whether applicants had successfully managed projects of similar magnitude, scope, and sensitivity in recent years. For this award, the selection committee provided an overall score for each criterion based on the numerical scoring outlined in the award’s public notice and ultimately recommended the top-scoring applicant to the agreement officer. For three of the six two-phased awards we reviewed, selection committee officials considered and recorded their assessments of applicants’ concept papers as well as the full applications they received. For three two-phased awards that originated from the same public notice, we could not determine, on the basis of available documentation, whether the selection committee assessed the strengths and weaknesses of applicants relative to the merit review criteria. We found that USAID documented its review procedures, consistent with USAID policy. USAID operational policy requires that the selection committee include in its review documentation a discussion of its procedures for reviewing awards. For all 13 awards, the selection committee memorandums included a discussion of the review procedures that the committee used to assess applicants. These review procedures included actions such as the following: The establishment of the selection committee, including its purpose and composition A requirement for selection committee members to sign a certificate regarding nondisclosure, conflict of interest, or rules of conduct Individual reviews of the applications by each selection committee member A review of the rating system the committee used to assess A joint meeting to discuss individual reviews and ratings of applications, resulting in consensus among selection committee members about the strengths and weaknesses of each application For the two-phased awards in our sample, the selection committee memorandums include documentation of review procedures for both the concept paper and full application phases of awards. The selection committee memorandum for the full application phase of these awards included other actions that the selection committee took, such as the following: A summary of the committee’s procedures and results in the concept An evaluation of the proposals from applicants who were invited to A discussion of the programmatic weaknesses that USAID asked applicants to address before submitting their full applications We are sending copies of this report to the USAID Administrator, the Secretary of State, and the President of NED. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Our objectives were to examine (1) U.S. funding for democracy assistance in North Macedonia in fiscal years 2012 through 2017 and (2) the extent to which the U.S. Agency for International Development (USAID) adhered to relevant operational policies in selecting recipients of democracy assistance in North Macedonia. To identify the United States’ strategic objectives and goals for providing democracy assistance in North Macedonia, we reviewed USAID and Department of State (State) strategic documents and interviewed cognizant USAID and State officials in Washington, D.C. To examine U.S. funding for democracy assistance in North Macedonia, we analyzed award data from USAID, State, and the National Endowment for Democracy (NED) for fiscal years 2012 through 2017, the most recent 5-year period for which these data were available. To determine the data’s reliability, we interviewed agency officials and reviewed relevant documentation. We determined that USAID’s and NED’s data were sufficiently reliable for the purposes of our reporting objectives. We further determined that State’s data on the U.S. Embassy in Skopje’s Public Affairs Section awards were reliable for these purposes. However, on the basis of interviews with State officials, our review of their data, and our prior work, we determined that the data maintained by State’s Bureau of International Narcotics and Law Enforcement Affairs (INL) could not be reliably reported. We determined that data provided by State’s Bureau of Democracy, Human Rights, and Labor Affairs (DRL) were reliable; however, we could not determine what portion of DRL funding went only to North Macedonia, because DRL made regional awards during this period that benefited several Balkan countries. Therefore, we report State obligations as approximations for awards for which we had more reliable data. To identify the recipients of democracy assistance in North Macedonia and describe the process through which the U.S. government grants such assistance, we reviewed award data, relevant award documents, and bilateral agreements and other communications between the United States and North Macedonia regarding this assistance. We interviewed USAID, State, and NED officials in Washington, D.C., who oversee democracy assistance in North Macedonia regarding U.S. funding for such assistance. We also interviewed representatives of organizations that implement this assistance that have offices in Washington, D.C. In addition, during audit work in Skopje, North Macedonia, we interviewed USAID and State officials who manage democracy assistance. We also met with officials from the government of North Macedonia, including the Minister of Defense and members of Parliament, the State Election Commission, and the Agency for Audio and Audiovisual Services, to determine the types of activities the U.S. government supported during the period of our review. In addition, we conducted individual and group interviews with representatives of 41 implementing partners of USAID, State, and NED in Skopje who received funding during the period of our review. To assess the extent to which USAID officials followed operational policies in selecting recipients of democracy assistance, we analyzed award data and documentation for a sample of awards made between fiscal years 2012 through 2017. We excluded from our sample any contracts and other awards for which no public notice was issued, because these awards were not openly competed. We further excluded grants under contract arrangements that USAID entered into with local partners in North Macedonia, because these awards also were not openly competed. Such awards include those made by USAID’s Office of Transition Initiatives and under the Consortium for Elections and Political Process Strengthening process. Our sample comprised the 13 largest- value grants and cooperative agreements that USAID made for North Macedonia in fiscal years 2012 through 2017, constituting 46 percent of all USAID obligations in North Macedonia during this period. We analyzed USAID operational policies contained in the Automated Directives System (ADS) and other USAID policy documents outlining the agency’s strategic plan and assistance priorities for North Macedonia. We analyzed relevant documents for the awards in our sample, including the notices of funding opportunity and selection committee memorandums, and we assessed the extent to which these documents showed that USAID had met the requirements of its operational policy outlined in the ADS. In particular, for each award, we examined the extent to which the merit review criteria published in the notice of funding opportunity matched the criteria the selection committee used, the selection committee assessed the strengths and weaknesses of the submitted applications and recorded these assessments, and the selection committee included a discussion of its review procedures in its review documentation. Finally, we interviewed USAID officials in Washington and Skopje regarding USAID’s operational policies in fiscal years 2012 through 2017 as well as its process for selecting recipients of democracy assistance. We conducted this performance audit from May 2017 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 6 lists the U.S. Agency for International Development’s (USAID) awards for democracy assistance in North Macedonia in fiscal years 2012 through 2017. Table 7 lists the National Endowment for Democracy’s (NED) democracy assistance awards in North Macedonia in fiscal years 2012 through 2017. Tables 8 and 9 list the Department of State’s (State) awards for democracy assistance to North Macedonia in fiscal years 2012 through 2017. These awards were provided by U.S. Embassy Skopje through its Public Affairs Section. Table 8 shows the grants that the embassy’s Public Affairs Section awarded through the Democracy Commission Small Grants Program, and table 9 shows other, non–Democracy Commission grants awarded by the Public Affairs Section. Table 10 provides an overview of the program areas and program elements that fall into democracy, human rights, and governance assistance according to the Department of State (State). U.S. foreign assistance is categorized through a system called the Standardized Program Structure and Definitions, which comprises broadly agreed-on definitions for foreign assistance programs and provides a common language to describe programs. According to this system, democracy assistance includes the following six program areas. In addition to the contact named above, Rob Ball (Assistant Director), Cheryl Goodman (Assistant Director), Rachel Dunsmoor (Analyst-in- Charge), Parul Aggarwal, R. Gifford Howland, Ashley Alley, Justin Fisher, Christopher Keblitis, and Reid Lowe made key contributions to this report.", "summary": "Since fiscal year 1991, the United States has provided over a billion dollars in assistance to North Macedonia. In recent years, USAID and State have expressed concern about an erosion of democracy in the country. These concerns were heightened by the onset of a political crisis in February 2015, when the then-opposition party released phone conversations revealing alleged corruption in the ruling party. This crisis prompted the four major political parties to invite the United States and the European Union to help broker an agreement. The parties later agreed to hold early parliamentary elections in December 2016. Though the opposition party formed a majority coalition, the President refused to give the opposition leader a mandate to form a new government until May 2017, after protesters violently attacked North Macedonia's Parliament. This report examines (1) U.S. government funding for democracy assistance in North Macedonia and (2) the extent to which USAID adhered to relevant policies in selecting recipients of democracy assistance in North Macedonia. GAO analyzed U.S. government data and documents and interviewed U.S. officials in Washington, D.C., and in Skopje, North Macedonia. The U.S. government provided more than $45 million for democracy assistance in North Macedonia through the U.S. Agency for International Development (USAID), National Endowment for Democracy (NED), and U.S. Department of State (State) in fiscal years 2012 through 2017. During this 5 year period—the most recent for which funding data were available—USAID obligated about $38 million to support rule of law and human rights, governance, political competition and consensus building, civil society, and an independent media and free flow of information. NED—a nongovernmental organization funded largely through appropriated funds—provided $4.2 million for activities such as training in investigative reporting and rule of law. The U.S. embassy in Skopje obligated at least $3.7 million for rule of law and human rights, governance, and civil society. State's Bureau of International Narcotics and Law Enforcement Affairs (INL) and Bureau of Democracy, Human Rights, and Labor (DRL) also provided funding for democracy initiatives. However, GAO is unable to report State's total obligations, because INL's data were unreliable and because DRL, due to the regional nature of its projects, does not track country-level obligations for North Macedonia. Legend: USAID = U.S. Agency for International Development, NED = National Endowment for Democracy, State = U.S. Department of State. Note: Only obligations from the Public Affairs Section of the U.S. Embassy in Skopje are shown for State. State's other funding data were either unreliable or not tracked at the country level. GAO's review of 13 USAID democracy assistance awards, representing roughly half of USAID obligations in fiscal years 2012 through 2017, found that the agency generally complied with operational policy intended to ensure a fair and transparent selection process. USAID policy requires officials to consider merit review criteria specified in public notices and to assess applicants against these criteria. GAO found that the merit review criteria USAID included in public notices were generally consistent with the criteria that selection committees used to evaluate applicants. GAO also found that selection committees generally discussed the relative strengths and weaknesses of award applications and recorded these discussions in selection memorandums, consistent with USAID policy. In prior work, GAO recommended that State identify and address factors affecting the reliability of INL's democracy assistance data. State concurred and, in July 2019, reported that INL was continuing efforts to improve data reliability. GAO will continue to monitor State's efforts to ensure this recommendation is fully implemented.", "document_type": "gao"}
{"report": "Opioids—such as hydrocodone, oxycodone, morphine, and methadone— can be prescribed to treat both acute and chronic pain. Many opioids have a high potential for abuse and may lead to severe psychological or physical dependence. OUD, which is a type of substance use disorder, is generally characterized by a loss of control of opioid use, risky opioid use, impaired social functioning, tolerance, and withdrawal. According to SAMHSA and the National Institute on Drug Abuse, OUD is a chronic, treatable illness. SAMHSA states that treatment for OUD should be individualized and can include a range of treatment options that include medication and behavioral health services. Specifically, services related to the treatment of OUD include the following: Screening can identify individuals who have OUD, are at risk for developing OUD, or have medical problems related to opioid use. Screening, brief intervention, and referral to treatment (SBIRT) is a specific type of screening that involves a health care provider educating individuals with a positive screen for opioid use and referring them to specialized treatment, as needed. Outpatient counseling and therapy includes counseling and treatment services individually or in a group. Inpatient hospital services include those that occur in a hospital, such as services for detoxification. Inpatient residential services include care in a 24-hour residential setting. Inpatient residential providers offer medical care in combination with housing, typically lasting from a week to several weeks or more. Medication-assisted treatment (MAT) combines the use of certain prescription medications (such as methadone, buprenorphine, and naltrexone) and behavioral therapy. Methadone and buprenorphine suppress withdrawal symptoms and control the craving for opioids, while naltrexone suppresses the euphoric effects of opioids. Research has shown that MAT for OUD reduces opioid use and increases the chance that patients will continue OUD treatment compared to abstinence-based treatment (where patients are treated without medication). Case management services include providing coordination and management of care across multiple health care providers. Crisis intervention includes immediate care intended to prevent harm. Peer recovery coaching includes recovery support through a certified peer specialist with experience of recovery from addiction. States administer their Medicaid programs within broad federal requirements and according to a state plan approved by CMS. The Medicaid program allows states to design and implement their programs within certain federal parameters, resulting in more than 50 distinct programs. A state’s approved Medicaid plan outlines the services provided and the groups of individuals covered. States also have the option of using waivers to expand services under the Medicaid program. As such, the types of services covered by Medicaid can vary across states. Historically, Medicaid eligibility has been limited to certain categories of low-income individuals, such as children, parents, pregnant women, persons with disabilities, and individuals aged 65 and older. The Patient Protection and Affordable Care Act (PPACA), enacted in 2010, allowed states to expand Medicaid coverage to nearly all individuals with incomes up to 138 percent of the FPL, regardless of eligibility category. As of October 2019, 33 states and the District of Columbia expanded Medicaid eligibility, and 17 states had not. Under federal law, state Medicaid programs must provide coverage for health care services for certain pregnant women, including low-income pregnant women with incomes at or below 138 percent FPL. Most states opt to extend coverage to pregnant women with incomes above this threshold. By statute, states are permitted to limit the services covered for certain pregnant women, including low-income pregnant women, to services related to the pregnancy. Such coverage is referred to as “pregnancy-related coverage.” CMS defines pregnancy-related services as those services necessary for the health of the pregnant woman and fetus, or that have become necessary as a result of the woman having been pregnant, which includes prenatal, delivery, postpartum, and family planning services, as well as services for other conditions that may complicate the pregnancy. In contrast, states are required by statute to provide pregnant women who qualify for Medicaid on another basis, such as a disability, full Medicaid benefits. At a minimum, states must provide Medicaid coverage for pregnant enrollees through 60 days postpartum, though states may extend coverage further. Some women may qualify for continued Medicaid coverage after the 60-day postpartum period if they meet the requirements for another eligibility pathway, such as for parents, while others may transition to other programs or become uninsured. Medicaid’s Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) benefit is the primary mechanism to help ensure the provision of appropriate health care services to children under Medicaid. Under the EPSDT benefit, states are required to cover comprehensive health screenings and preventive health services, such as those related to vision and oral health, and all other Medicaid coverable services that are necessary to correct or ameliorate any conditions discovered through screenings. States are required to follow a schedule of screenings, known as a periodicity schedule, that are recommended for children at specific ages and frequencies. States can develop their own schedule within federal parameters or follow an established schedule, such as from the American Academy of Pediatrics (AAP). States are required to report annually on the provision of certain EPSDT services to CMS. States must report information on the number of children provided health screening services, the total number of health screenings services provided, the number of children referred for corrective treatment, the number of children receiving dental services, and the state’s results in attaining EPSDT participation goals. States may also voluntarily report annually on the quality of health care services provided under EPSDT using a set of quality measures known as the Child Core Set. CMS plans to increasingly use the Child Core Set in the future and state reporting will be mandatory beginning with the state reports for fiscal year 2024. States also have flexibility in determining where EPSDT services can be delivered. As a means of improving access—particularly in underserved communities, such as rural areas—Medicaid programs may cover certain services delivered by health care providers in schools. There were approximately 130,000 schools across the United States as of 2016, according to data from the Department of Education. Some of these schools have health clinics. Additionally, there were approximately 2,600 school-based health centers as of 2017, some of which served children in underserved communities, according to the School-Based Health Alliance. Some state Medicaid programs allow for services to be delivered via telehealth, including in schools. Telehealth can be used to provide clinical care remotely, such as for screening, counseling, and therapy. Health care providers offer care to patients through remote technology, such as a live, two-way video call. Such services could be provided, for example, via a video conference on a desktop computer or laptop that connects a student in school with a provider in another location. States have flexibility to choose whether to cover services delivered via telehealth. Because the federal Medicaid statute does not recognize telehealth as a distinct service, CMS views telehealth as a service delivery mechanism. According to CMS, services delivered via telehealth are subject to the same Medicaid requirements as those services provided in person. The Medicaid programs in our six selected states provided coverage of most OUD services during pregnancy and the first 60 days postpartum, as of January 1, 2019. Specifically, the selected states’ Medicaid manuals indicate these states provide coverage for at least seven of the eight OUD services we identified in our review, such as screenings, inpatient and outpatient services, and MAT. (See fig. 1.) In the six states we reviewed, we did not identify differences between the types of covered OUD services for pregnant women in expansion and non-expansion states. For example, the three expansion states— Arkansas, Colorado, and Massachusetts—and the three non-expansion states—Alabama, South Dakota, and Texas—each covered at least seven of the eight OUD services for pregnant women. Similarly, we did not identify differences in Medicaid coverage for OUD services between the selected states that limited coverage to pregnancy- related services and those that provided full benefits. Arkansas and South Dakota—the two states providing only pregnancy-related coverage— covered seven of the eight OUD services for pregnant women. According to Medicaid officials in these two states, the programs cover these OUD services because they are considered medically necessary. In contrast, neither state generally provides Medicaid coverage for peer recovery coaching for beneficiaries, including pregnant women. Three of the selected states—Alabama, Colorado, and Texas—covered certain OUD services for pregnant women that they do not cover for other beneficiaries under Medicaid. For example, in Alabama, screening services and inpatient residential services were covered only for pregnant women, but not other eligible, low-income women. In Colorado, pregnant women were the only group in the state for whom residential OUD services were covered under Medicaid. In Texas, pregnant women were the only group in the state for whom case management is a covered service under Medicaid. In all six selected states, once Medicaid coverage furnished on the basis of pregnancy ends after 60 days postpartum, women can continue to receive most OUD services under Medicaid if they qualify for Medicaid on another basis. For example, these women could qualify if their income is equal to or lower than the maximum allowable income for parents. However, in the six selected states, the maximum allowable income for eligible parents was generally lower than that for pregnant women, as of January 2019. (See fig. 2.) Women in the six selected states who are eligible to maintain Medicaid coverage after 60 days postpartum can continue most of the same OUD services that were covered during pregnancy. However, officials in two states said that the OUD services covered specifically for pregnant women under Medicaid would generally not be covered after the postpartum period ends. Four of the selected states provided estimates of the number of women who maintain Medicaid eligibility after the postpartum period ends. For example, officials in Massachusetts, an expansion state, estimated that in 2017 and 2018, approximately 99 percent of women with Medicaid coverage while pregnant maintained Medicaid coverage after the postpartum period ended. State officials in Colorado, also an expansion state, estimated that in 2015, 75 percent of women maintained coverage after the postpartum period ended. Additionally, in Arkansas, another expansion state, officials estimated that about 60 percent of women in 2017 and 2018 maintained Medicaid coverage after the postpartum period ended. Officials in Alabama, a non-expansion state, estimated that in 2017, about 43 percent of women maintained Medicaid coverage after the postpartum period ended. States may also obtain approval from CMS, such as under a waiver, to extend Medicaid coverage for women with OUD beyond 60 days postpartum, according to CMS officials. However, CMS officials were not aware of the number of states that have done so. In our review, we found that one of the six selected states, Colorado, used a section 1915(b) waiver to extend Medicaid eligibility for substance use services, including OUD services, for women beyond 60 days postpartum. Under the state’s “Special Connections” program, which was approved under the waiver, women who are eligible for Medicaid during their pregnancy can continue Medicaid coverage for OUD services for up to 12 months postpartum, including inpatient residential services, which would not otherwise be covered under Medicaid. A state official told us that the program began in 1991 to provide substance use disorder services to pregnant women and up to 60 days postpartum. In 2006, the state extended coverage under the program to provide substance use disorder services up to 12 months postpartum. The program aids in early identification and intervention for pregnant women with substance use disorders who are at risk of delivering low birth weight babies with health complications. Officials said the goal of the program is to improve the likelihood that the mother remains free from substance abuse. According to Colorado officials, 227 women participated in the program in 2018. We also found that the six selected states use other funding sources to provide coverage of OUD services for women with incomes that exceed the state’s Medicaid eligibility thresholds. Officials from the six selected states reported that they received SAMHSA grants so each state could provide OUD services for pregnant and postpartum women that extend beyond 60 days. According to the SAMHSA officials we interviewed, grants have been used to increase access to MAT, expand recovery support for pregnant women, and provide enhanced services for women to access OUD treatment. Furthermore, SAMHSA officials said that pregnant and postpartum women are specifically identified as target populations for grants, such as the agency’s State Targeted Response to the Opioid Crisis grant and its State Opioid Response grant. For example, officials in Arkansas told us that by using SAMHSA grants, they are able to allow uninsured or underinsured women who are seeking treatment for OUD to continue MAT treatment after 60 days postpartum. In addition, officials in the six selected states told us that women beyond 60 days postpartum generally would not experience gaps in treatment for OUD when transitioning from Medicaid to SAMHSA grant-funded programs, as women can generally continue receiving the same services and seeing the same providers. For example, state officials in Alabama, South Dakota, and Texas told us the state Medicaid agency contracts with providers that agree to participate in both the state’s Medicaid program and SAMHSA’s grant programs to allow for continuity of eligible services. Officials in Texas also told us they used state funds to implement a program to provide OUD services for up to 18 months postpartum. State officials told us that in this program—called the Neonatal Abstinence Syndrome-Opioid Treatment Services program—when a woman’s Medicaid coverage ends, she transitions to state-funded treatment to continue the same OUD services with the same provider. According to state officials, this program, funded since 2015, expands treatment services to postpartum women who would typically lose Medicaid coverage and become unable to pay for MAT services, which officials say help reduce relapse, overdose, and maternal mortality risk. State officials added that there is flexibility to extend services for postpartum women participating in the program for up to 2 years, if needed. State officials told us that since 2016, 296 women have participated in the program. In addition to the efforts in the selected states, the federal government has planned efforts to help states combat the opioid crisis, specifically for pregnant and postpartum women with OUD. For example, CMS plans to offer up to 12 cooperative agreements to states under the Maternal Opioid Misuse model as a way to improve access to services under Medicaid to pregnant and postpartum women with OUD. The model will have a 5-year performance period, 2020 through 2024, to allow states to implement strategies to improve the quality of care for pregnant and postpartum women with OUD. According to CMS officials, the model does not require that states extend coverage beyond 60 days postpartum, but states could choose to do so. CMS published the funding opportunity for the model in February 2019, and plans to select states to participate by the fall of 2019. In July 2019, CMS issued guidance to states regarding Medicaid coverage of services such as counseling for postpartum women while their infant is receiving treatment for Neonatal Abstinence Syndrome. The Centers for Disease Control and Prevention also issued a publication in September 2019 summarizing an initiative on state strategies to address OUD among pregnant and postpartum women and infants prenatally exposed to substances. The initiative identified five focus areas, including access to and coordination of quality services, provider awareness and training, and financing and coverage. In addition, the SUPPORT Act includes a provision for HHS to issue guidance to improve care for postpartum women with substance use disorder by the fall of 2019. The six selected states provide Medicaid coverage for annual screenings of eligible children for substance use, including opioids, as well as any medically necessary treatment for conditions identified through these screenings, as of 2019. This coverage is provided through the Medicaid EPSDT benefit. Based on our review of Medicaid state plans and EPSDT policies and periodicity schedules, we found that the six selected states established the following screening schedules at the time of our review: Arkansas’ Medicaid state plan and Colorado’s and South Dakota’s EPSDT policies specify that these states follow AAP’s screening schedule. AAP recommends annual substance use screening for all children beginning at age 11 until they reach the age of 21. Alabama’s EPSDT policy requires annual screening for all children ages 6 to 13. Massachusetts’ EPSDT policy requires providers to conduct an annual assessment of every child’s risk for substance use as part of a health history assessment during a child’s annual visit. This assessment can be conducted at any age. Texas’ EPSDT periodicity schedule recommends annual screening for all children ages 12 to 18. Additionally, Massachusetts and Texas Medicaid programs require behavioral health screening for all eligible children. The Medicaid programs in these states provide separate payment for behavioral health screening if the screening is conducted using an approved screening tool, some of which also screen for substance use, such as opioids. Texas officials reported that substance use screenings are considered part of the required overall mental health screening component of annual checkups. Similarly, Arkansas officials said that as part of a new EPSDT policy they are drafting, the state Medicaid program will require behavioral health screening for all children, which can include substance use screening if determined medically necessary by the provider. The six selected state Medicaid programs report data on the total number of screenings provided under EPSDT for children’s health care needs. However, officials from five of the selected states said that it is difficult or impossible to separate and thus track the number of the substance use screenings as distinct from other types of EPSDT screenings or visits that are recorded in Medicaid data. States are required to track and report the total number of EPSDT screenings provided, but not the number of substance use disorder screenings. Officials from all six selected states said that they conduct outreach and education to providers and parents to ensure awareness of the EPSDT benefits, as required. We found that the extent of information the states provide on these services varied among the six states. For example, outreach materials from three of the six selected states included information about the availability of substance use screening, and one of these three states, Alabama, also included information about services for opioid use. For all six selected states, officials emphasized that Medicaid’s EPSDT benefit requires states to cover any medically necessary treatment or service to address health conditions for a child, including opioid use. Officials from the six selected states also described a variety of initiatives to increase access to substance use disorder, including OUD, services for children. For example: Officials from Alabama said they recently began a program that offers more substance use disorder services in schools in a face-to-face capacity to help increase convenience and reduce stigma around these services for both the children and the parents. They explained that the Alabama Department of Mental Health added modifiers to ensure that their systems can capture data appropriately and analyze trends in providing school-based services, which are currently offered in over 40 individual schools. Officials added that Medicaid pays for covered services that are provided to Medicaid-eligible children in schools under this program. Officials from two states—Arkansas and Massachusetts—said they recently expanded the types of substance use disorder services covered for all Medicaid beneficiaries. Officials from Arkansas added that they are working to expand the number of providers who can offer substance use disorder treatment under Medicaid. Officials from two states—Massachusetts and Texas—said they had recently developed programs specifically aimed at serving children with substance use disorder, including OUD, using federal authority. Massachusetts received approval from CMS to conduct a Medicaid demonstration to establish OUD programs for children. Texas is using SAMHSA grant funding to support eight youth recovery centers that are intended to improve services and recovery supports for youth with substance use disorder, including OUD. We conducted outreach to Medicaid officials from all 50 states and the District of Columbia between February and July 2019 to inquire about whether the state provided Medicaid coverage of OUD services delivered via telehealth in schools as a means of increasing access to these services for children. Officials from 31 states and the District of Columbia reported that they provide Medicaid coverage of OUD services delivered in schools via telehealth. Medicaid officials from some states reported that their Medicaid policies explicitly allow for coverage of OUD services provided in schools via telehealth, while others reported that they allow for Medicaid coverage of these services, but their policies do not explicitly address the issue. (See app. I for the state responses regarding Medicaid coverage of OUD services provided in schools via telehealth.) Officials from the remaining 18 states reported that their Medicaid policies do not allow for payment for OUD services delivered in schools via telehealth. Some of these state officials reported that they did not allow schools to serve as a location for patient services during a telehealth visit for Medicaid payment purposes. Other state officials reported that they allowed Medicaid payment for certain services provided in schools via telehealth, but OUD services were not among them. For example, officials from Texas said the state established a school-based telehealth program for behavioral health services. However, this program does not include services for the treatment of substance use disorder, including OUD. Officials added that the state has a requirement that substance use disorder services can only be delivered in certain approved facilities. While Medicaid officials from 31 states and the District of Columbia reported that they provide Medicaid coverage of OUD services in schools via telehealth, they also said they were not aware of any instances of these services being utilized. Medicaid officials from the 31 states and the District of Columbia reported that either these services were not being provided based on data or other information they had, or they were unaware if the services were being provided. Officials from seven states responded that they either reviewed Medicaid utilization data or asked school-based staff and determined that there was no utilization of these services. For example, officials from one state—Ohio—conducted a data query and found that in 2018 there had been two instances of substance use disorder services billed to Medicaid that were delivered via telehealth in a school. However, officials noted that these instances involved treatment for substances other than opioids. While not for OUD, these two instances were the only instances of Medicaid payment for substance use disorder services delivered via telehealth in schools that we identified in our review. As part of our outreach to states and background research, we did find that some states or localities have taken steps to facilitate the use of telehealth for delivery of substance use disorder services, including OUD, in schools. For example: Officials from one county in Maryland said they recently began using a telehealth smart device application to screen students in schools for substance use disorder, including OUD, and refer them to treatment. However, county officials said that the program was locally funded, and they had not considered seeking Medicaid payment. A South Dakota tribal reservation recently implemented a new school- based telehealth program for behavioral health. According to officials, this program could include OUD services delivered via telehealth in schools, and these services could be billed to Medicaid if the provider was already licensed to bill Medicaid; however, officials said that none of these services had been provided to date. Massachusetts recently expanded its Medicaid telehealth policy to allow for the payment of mental health and substance use disorder services provided in many locations, including schools. However, officials said the state was still building the telehealth infrastructure, and services had not yet been provided at the time of our review. Officials were unsure whether OUD services would be delivered via telehealth in schools under the new policy once implementation began. State officials and subject matter experts that we spoke with also reported a range of potential benefits and challenges associated with providing substance use disorder services, including OUD services, in schools via telehealth. (See table 1.) There have also been federal efforts to emphasize the use of telehealth to improve access to OUD services for children. For example, these efforts include the following: In June 2018, CMS issued guidance emphasizing the use of telehealth as a means of improving access to OUD services and noted that states need not necessarily submit a change to their state plan to begin delivering covered Medicaid services through telehealth. Similar to what we heard from experts, this guidance suggests that leveraging technology to provide such services might help with addressing provider shortages, particularly in rural areas. In July 2019, CMS and SAMHSA jointly issued guidance on addressing mental health and substance issues in schools. The guidance states that telehealth for mental health services in schools has been found to be effective. This guidance also emphasizes that telehealth can be helpful for ensuring that Medicaid services are provided to Medicaid beneficiaries who are in rural areas or in areas where qualified practitioners are scarce. HRSA officials we spoke with also described several different HRSA programs from which funds could be used to facilitate or deliver substance use disorder services via telehealth, including in some school-based health centers; however, the officials were not able to determine whether telehealth is being utilized to deliver OUD services in school-based health centers, specifically. The SUPPORT Act also includes a provision for HHS to issue guidance to states on Medicaid coverage of substance use disorder services delivered via telehealth, including in school-based health centers, by fall of 2019. We provided a draft of this report to HHS for review. HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Health and Human Services, the Administrator of the Centers for Medicare & Medicaid Services, the Health Research and Services Administration, the Substance Abuse and Mental Health Services Administration, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Jessica Farb at (202) 512-7114 or farbj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix II. In addition to the contact named above, Rashmi Agarwal (Assistant Director), Kaitlin McConnell (Analyst-in-Charge), Arushi Kumar, Kimberly Lloyd Perrault, Jennifer Rudisill, and Emily J. Weisenberger made key contributions to this report. Also contributing were Drew Long and Ethiene Salgado-Rodriguez. Medicaid: Additional CMS Data and Oversight Needed to Help Ensure Children Receive Recommended Screenings. GAO-19-481. Washington, D.C.: August 16, 2019. Opioid Crisis: Status of Public Health Emergency Authorities. GAO-18- 685R. Washington, D.C.: September 28, 2018. Adolescent and Young Adult Substance Use: Federal Grants for Prevention, Treatment, and Recovery Services and for Research. GAO- 18-606. Washington, D.C.: September 4, 2018. Newborn Health: Federal Action Needed to Address Neonatal Abstinence Syndrome. GAO-18-32. Washington, D.C.: October 4, 2017. Drug Control Policy: Information on Status of Federal Efforts and Key Issues for Preventing Illicit Drug Use. GAO-17-766T. Washington, D.C.: July 26, 2017. Medicaid Expansion: Behavioral Health Treatment Use in Selected States in 2014. GAO-17-529. Washington, D.C.: June 22, 2017. Health Care: Telehealth and Remote Patient Monitoring Use in Medicare and Selected Federal Programs. GAO-17-365. Washington, D.C.: April 14, 2017. School Based Health Centers: Available Information on Federal Funding. GAO-11-18R. Washington, D.C.: October 8, 2010.", "summary": "The misuse of prescription opioid pain relievers and illicit opioids, such as heroin, has contributed to increases in OUD and overdose deaths. Pregnant women with OUD have an increased risk of overdose during the postpartum period. Opioids also caused over half of drug overdose deaths among youth in 2017. Medicaid plays a key role in covering services to treat OUD for low-income women and children. The SUPPORT Act includes a provision for GAO to study Medicaid coverage for pregnant and postpartum women with a substance use disorder, including OUD. The act also includes a provision for GAO to examine children's access to these services, such as through telehealth. This report describes Medicaid coverage of OUD services for (1) pregnant and postpartum women in selected states; (2) children in selected states; and (3) children delivered via telehealth in schools across all states, and utilization of these services. GAO reviewed documentation and interviewed officials from federal agencies within HHS to understand Medicaid coverage of OUD services for pregnant and postpartum women, as well as children. GAO also interviewed officials and reviewed documentation from six states selected for variation in opioid use rates, status of Medicaid expansion, and geographic variation, among other things. GAO also conducted outreach and received responses from 49 of 50 states and the District of Columbia about Medicaid coverage and use of OUD services delivered via telehealth in schools. HHS provided technical comments, which were incorporated as appropriate. All state Medicaid programs are required to provide coverage of health care services to pregnant women with incomes at or below 138 percent of the federal poverty level through 60 days postpartum. With regard to opioid use disorder (OUD), GAO found that six selected state Medicaid programs provide coverage of a range of services for eligible pregnant women with OUD. Specifically, the six states—Alabama, Arkansas, Colorado, Massachusetts, South Dakota, and Texas—covered OUD services, such as screening for opioid use, counseling, and medication-assisted treatment, which combines the use of medications with counseling. In the six selected states, women who are eligible for Medicaid coverage after 60 days postpartum can receive most of the same OUD services that were covered during pregnancy. Furthermore, GAO found that the six selected states also use other sources of funding, such as federal grants, to provide coverage of OUD services for postpartum women who are not eligible for Medicaid. GAO did not review how frequently the OUD services were actually provided to pregnant and postpartum women. GAO found that the state Medicaid programs in all six selected states cover annual screenings for substance use, which includes opioid use, for eligible children. This coverage is provided as part of Medicaid's Early and Periodic Screening, Diagnostic, and Treatment benefit, under which all states are required to cover certain screenings for eligible children under age 21. GAO also found that Medicaid programs in 31 states and the District of Columbia covered OUD services, including screenings, delivered through telehealth in schools. However, state Medicaid officials said they were not aware of any instances of these services being utilized through telehealth in schools. Telehealth can be used to provide clinical care remotely, such as for screening, counseling, and therapy. Such services could be provided, for example, via a video conference on a desktop computer or laptop that connects a student in school with a provider in another location. State officials and experts cited both benefits and challenges with providing OUD services through telehealth in schools. For example, benefits included addressing provider shortages, particularly in rural areas, as well as reducing the amount of time students spend outside of the classroom accessing services. Challenges included lack of needed infrastructure and provider discomfort with using telehealth. Agencies within the Department of Health and Human Services (HHS) have recently issued guidance emphasizing the use of telehealth for OUD services, particularly in schools.", "document_type": "gao"}
{"report": "BOP is a component of DOJ and is responsible for housing male and female federal inmates in a controlled, safe, and humane prison environment while also providing a safe workplace for employees. BOP operates 122 prisons across the United States. These prisons are characterized by five security levels: high, medium, low, minimum, and administrative. Table 1 below provides a description of each of these security levels and the number of prisons at each. According to BOP data, in fiscal year 2019, BOP housed 149,701 inmates in its prisons. During this same time, the BOP employed 32,525 employees, of which 15,664 were correctional officers with responsibility for the day-to-day supervision of the inmates. According to a July 2012 BOP memorandum, BOP was approved to conduct a pilot study on pepper spray. The goals of the pilot were to increase the safety of staff and inmates when responding to incidents involving violence and to prevent injury to staff and inmates due to an assault or serious resistance to staff control. BOP began issuing pepper spray at high security prisons in August 2012 as part of its pilot study. In February 2015, BOP issued a program memorandum requiring employees in high, medium, and administrative security prisons to carry pepper spray. Further, in September 2018, BOP issued a program statement that expanded pepper spray to employees in low security prisons. Figure 1 provides a more detailed time line of events on the use of pepper spray in BOP prisons, including requirements under the Eric Williams Correctional Officer Protection Act of 2015. Pepper spray is a natural inflammatory agent that can cause coughing, tearing, and discharge of excessive mucous when deployed in the facial region. According to BOP training guidance and policy, pepper spray is to be used in incidents that require an immediate use of force (for example, an unplanned use of force because of an attack on staff or an inmate) or a calculated use of force in which employees have time to coordinate their response (for example, when an inmate refuses to vacate his or her cell). For calculated uses of force, employees are to consult medical personnel to determine if an inmate has a medical condition that will exempt the inmate from being pepper sprayed. BOP policy states that employees should receive initial training on pepper spray and annual refresher training. In training, employees are taught effective tactical communication for using pepper spray; use of force policy; how to use pepper spray; and the decontamination process, among other topics. According to BOP’s Use of Force and Application of Restraints policy, a prison’s warden may authorize the use of chemical agents, such as pepper spray, only under the following situations: (1) the inmate is armed or barricaded; or, (2) the inmate cannot be approached without danger to self or others; and (3) it is determined that a delay in bringing the situation under control would constitute a serious hazard to the inmate or others or would result in a major disturbance or serious property damage. Pepper spray, moreover, should only be used when all other reasonable efforts to resolve a situation have failed. This policy further states that staff shall appropriately document incidents involving the use of pepper spray using BOP’s Form 583—Use of Force Report. Form 583 contains fields to enter the date and time of the incident; inmates and staff involved; injuries; medical reports; a description of the incident; and other information, such as the existence of video of the incident. The form is to be completed by the lieutenant on duty at the time of the incident and sequentially forwarded to the captain, assistant warden, warden, and regional office for review. After a Form 583 is completed, the warden, associate warden, health services administrator, and captain at the prison, collectively, conduct an after-action review of the incident to determine if the pepper spray was used in accordance with policy. Results of the after-action review are documented on BOP’s Form 586—After Action Report. According to BOP headquarters officials, in addition to documenting the results of the after- action review, a completed Form 586 often includes recommendations on how to improve the response to such incidents in the future. Incident data captured on Forms 583 and 586 are maintained in BOP’s TRUINTEL database. To enhance BOP employee safety, BOP provides its employees with a variety of protective equipment. BOP generally requires employees working within the secure prison perimeter to carry a radio, body alarm, pepper spray (as appropriate), and keys while on duty. These items are usually checked out from the control center using a chit—a small, brass, circular token inscribed with the BOP employee’s first initial and last name. As of March 2020, some employees also wear stab-resistant vests to help enhance their safety. Although BOP employees are furnished with protective equipment, their first line of defense to protect themselves against an inmate is expected to be their verbal communication with the inmate. BOP policy, training documents, and officials state that effective communication with inmates is essential to officer safety. Figure 2 depicts some of the protective equipment worn by BOP employees operating within the secure prison perimeter of prisons. BOP conducted a pilot study on the issuance of pepper spray from August 2012 through December 2013 at selected high-security prisons. To conduct its study, BOP compared injury sustained by staff and inmates data from immediate use of force incidents in which pepper spray was used to similar incidents in which pepper spray was not used. BOP found that pepper spray was effective in helping to reduce containment time—the amount of time it takes to bring an incident under control—and injury rates. Specifically, containment time of incidents decreased from an average of 4.3 minutes when pepper spray was not used to 2.7 minutes when it was used. This is a reduction of 1.6 minutes in containment time; pepper spray was used mostly in incidents involving two or more inmates, such as fights and assaults. When pepper spray was used, the rate at which staff received no injury increased by 9 percent compared to when pepper spray was not used. Further, the rate at which staff received minor and moderate injury declined by 60 and 76 percent, respectively, compared to when pepper spray was not used; and the inmate injury rate rose slightly, by 2.6 percent, primarily in minor injuries when pepper spray was used; however, BOP concluded this change was not statistically significant. All 90 of the BOP employees we spoke with from United States Penitentiary Atlanta, Federal Correctional Complex Coleman, and Federal Medical Center Devens indicated that pepper spray has been effective in enhancing safety as well as deterring incidents. Generally, these employees noted that pepper spray (1) reduces staff injuries because staff do not have to physically engage with inmates as often to break up incidents, (2) strongly deters incidents from occurring, and (3) allows employees to break up incidents more quickly than if they did not have pepper spray. Pepper spray is not as effective for a small percentage of inmates, such as those with mental illness or those who are under the influence of drugs or alcohol, according to some BOP employees. According to BOP data, in 2018, pepper spray was used in 1,680 incidents as follows: 993 incidents in high security prisons; 557 incidents in medium security prisons; 22 incidents in low security prisons; and 108 incidents in administrative security prisons. Officials from BOP’s Office for Internal Affairs stated that 179 allegations of inappropriate use of force incidents that involved pepper spray were reported from August 2012 through September 2018. Among these cases, BOP’s Office for Internal Affairs has investigated and closed 86. Among these 86 closed cases, investigators found that 21 involved an inappropriate use of pepper spray and were adjudicated in various ways (see table 2). The remaining 93 allegations were still being investigated as of January 2020. According to BOP data, the total cost for pepper spray–specifically the cost to purchase pepper spray canisters and train employees in its use— was approximately $300,000 in fiscal year 2018, which was relatively small compared to BOP’s overall budget. BOP headquarters officials told us that because pepper spray cost information is maintained at the prison level, it would be overly burdensome for them to independently validate the data. Nonetheless, the cost information we received provides a general sense on the extent of costs. Canisters. Officials estimated that a canister of pepper spray costs $7 to $14. Canisters of pepper spray have a shelf-life of approximately 5 years and, according to a BOP headquarters official, are purchased in bulk. As a result, pepper spray does not necessarily need to be purchased on an annual basis. According to BOP officials, each BOP prison contracts with its own supplier rather than using a national contract across all of BOP. BOP headquarters officials told us that pepper spray costs vary across vendors and locations, among other factors. Each BOP prison is responsible for recording and tracking its own budget data on the cost of procuring, training, and issuing BOP employees pepper spray. According to BOP officials, this approach is intended to lower the costs of pepper spray, based on the premise that each prison is able to secure the best market price for pepper spray for its location and for the volume of canisters needed from the vendor. Training. Prison officials told us that pepper spray refresher training is combined with other employee training, making it difficult for them to provide us with specific cost for pepper spray training. All BOP staff are required to take initial and annual refresher training on the use of pepper spray. The initial training lasts about 4 hours, while the annual refresher training lasts about 2 hours. BOP issued a program statement in September 2018, which states that pepper spray is not to be issued to employees working at minimum security prisons. However, the senior BOP officials we interviewed—none of whom said they were involved directly in the policy decision—told us they do not believe the explanatory documentation of the decision to not issue pepper spray to minimum security prisons exists. Officials stated that the decision was likely made for several reasons: inmates at minimum security prisons are usually nonviolent offenders, incidents at minimum security prisons are usually very minor and do not require the use of pepper spray, the concern that public perception of using pepper spray on inmates at minimum security prisons would not be positive, and canisters of pepper spray would expire before they would be used at minimum security prisons. BOP officials we spoke with also stated that inmates at minimum security prisons are less likely than inmates at other security level prisons to become involved in incidents because they do not want to be reassigned to a higher security prison. We found, nonetheless, that BOP’s TRUINTEL database shows that incidents do occur at these prisons— some of which have led to assaults, minor injuries and death. Based on our analysis of BOP incident data from TRUINTEL, we found that in 2018 there were 47 reported incidents in the seven BOP minimum security prisons. These incidents included assaults on staff and other inmates; sexual harassment; and fighting, among others. Five of the incidents resulted in minor injuries to 10 BOP employees, and 18 incidents resulted in minor injuries to inmates. Further, one incident led to an inmate fatality. Additionally, during our site visits, 56 out of 73 officials across various security levels stated that deployment of pepper spray should be expanded to minimum security prisons because it would give employees an additional tool to protect their safety. BOP headquarters officials told us they believe the agency’s decision to not issue pepper spray to minimum security prisons remains appropriate. Regarding the 47 incidents that occurred at minimum security prisons in 2018, officials stated that many of the confrontational incidents occurring at these prisons can be handled using verbal commands. While a decision to not issue pepper spray at minimum security prisons may be justified based on an analysis of relevant information, BOP officials could not provide documentation of such analysis to support its decision. This analysis could include assessing available incident data at minimum security prisons and determining whether any of the incidents could have been prevented or handled more effectively if the officer on duty was carrying pepper spray. Additionally, BOP employee perspectives on issuing pepper spray at minimum security prisons is another possible source of relevant information that could be included in an analysis to inform BOP’s decision. BOP issued policies in 2015 and 2018 that stated that while the preferred method of resolving issues with inmates is through a verbal intervention, there are instances where other means will be required to restore order. In addition, the policies state that the safety of staff, inmate(s), or others in any dangerous encounter is paramount and that the use of force— including use of pepper spray—may be needed to ensure safety. According to Standards for Internal Control in the Federal Government, management should use quality information to make informed decisions and to evaluate the entity’s performance in achieving key objectives and addressing risks—in this case, the possible safety risks to BOP employees and inmates. By conducting an analysis on available BOP data on incidents that have occurred at minimum security prisons, employee perspectives on the value of having pepper spray at such prisons, and other relevant data, such as cost data, as appropriate, BOP would have useful data with which to inform its decision on whether or not to authorize pepper spray for employees at minimum security prisons. Four BOP headquarters officials, 18 wardens and their executive staff, and 10 union officials rated the potential impact of 15 selected factors (see app. I) on the safety of BOP employees in prisons. BOP officials rated the following five factors as having the most significant impact on BOP employee safety in prisons: (1) corrections officer understaffing, (2) disruptive inmate behavior due to illegal drugs, (3) inmate use of unauthorized communication devices, (4) inmate gangs, and (5) insufficient corrections training. See figure 3 for a diagram of the top five factors identified across the different groups of BOP officials who responded to the structured questions. Across all three groups, corrections officer understaffing was rated among the top five factors. No other factor was equally represented. For at least two groups, inmate use of unauthorized communication devices, disruptive inmate behavior due to illegal drugs, and insufficient information-sharing among managers and staff were rated among the top five factors. When asked to identify any additional challenges beyond the selected factors we included, BOP officials we interviewed stated they were not aware of other challenges. BOP officials told us that they are taking steps to mitigate some of the challenges officials we interviewed indicated are impacting employee safety in prisons. Officials identified the following: Corrections officer understaffing. Corrections officer understaffing refers to the staffing level—usually measured by the inmate-to-staff ratio—being too low to adequately prevent violence and maintain a safe prison. Among the BOP headquarters officials, wardens and their executive staff, and union officials we interviewed, two underlying reasons generally cited for understaffing conditions were hiring freezes and difficulty recruiting new correctional officers due to low starting salaries. According to the BOP Director’s testimony before the Senate Judiciary Committee in November 2019, building adequate staffing at BOP prisons is one of her highest priorities. The Director stated that BOP established 10-percent recruitment, relocation, and retention incentives for hard-to-fill positions; established a higher entry pay scale for experienced new correctional established a 5-percent nationwide retention incentive for retirement- used 3,000 temporary positions to help ensure seamless succession planning by avoiding the lag to hire someone to fill a position. We issued a report in December 2017 on BOP’s use of retention incentives. At that time, we found that BOP had taken steps to determine workforce needs and how to fill those needs but had not strategically planned for and evaluated its use of retention incentives. We recommended that BOP include in its strategic human capital operating plan (1) human capital goals; and (2) strategies on how human capital flexibilities, including retention incentives, will be used to achieve these goals. We also recommended that BOP evaluate the effectiveness of its use of retention incentives to determine whether the incentives have helped achieve BOP’s human capital goals or if adjustments in retention incentives are needed. DOJ concurred, and BOP implemented our first recommendation by drafting a human capital plan with goals and strategies for how retention incentives could be used to meet those goals. To implement our second recommendation, BOP conducted an analysis of its use of retention incentives and their effect on retaining BOP employees. Disruptive inmate behavior due to illegal drugs. According to BOP officials, some inmates obtain illegal synthetic drugs by mail. These drugs are sprayed onto inmate mail and other documents before being sent to the inmate in prison. Inmates burn the mail to get high off of the synthetic drug. In addition to the threat to the inmate population posed by inmates who are behaving under the influence of the drugs, entry of these drugs can expose staff—including those handling the mail—-to hazardous chemicals. In an effort to stop illegal drugs from entering prisons by this method, according to BOP officials we spoke with and the BOP Director in her November 2019 testimony, some prisons are photocopying mail before it is delivered to inmates. For example, officials at one prison we visited told us they photocopy inmates’ mail. Further, a BOP headquarters official stated that BOP is piloting various mail-scanning technologies aimed at reducing the number of drugs entering prisons. Inmates’ use of unauthorized communication devices. According to BOP officials and the BOP Director’s testimony, inmates’ possession of cell phones is a major problem. BOP officials stated that, in an effort to stop the unauthorized use of cell phones, some prison officials are using specialized equipment to detect cell phone usage and are exploring options to use cell phone jammers. We reported in September 2011 that BOP and selected state officials told us that cell phones were a major security concern because they allow inmates to hold unmonitored conversations, for example, to sell drugs or harass individuals. We recommended that BOP’s Director formulate evaluation plans for cell phone detection technology to aid decision-making, require BOP staff to use these plans, and enhance regional collaboration with states. DOJ concurred with our recommendations, and BOP addressed them by developing policy and testing procedures to improve their ability to evaluate new technology. BOP also established plans to enhance collaborative information-sharing with state and local agencies on combating cell phone smuggling and use. Working in a federal prison presents inherent risks. Since 2018, BOP has authorized the use of pepper spray at all prison security levels with the exception of minimum security prisons. BOP’s issuance of pepper spray was supported by evidentiary information—that is, its pilot study indicated that pepper spray was an effective tool for enhancing staff safety. Notably, BOP’s current policy on pepper spray allowance does not extend to minimum security prisons. While BOP was not able to provide us with a documented analysis behind the nonissuance to minimum security prisons, the officials we interviewed made several arguments in support of the decision. While their arguments may hold merit, we found evidence based on our limited analysis that appears to question their underlying decision. To the extent that officials are operating under assumptions not fully examined, BOP is missing a potential opportunity to enhance the safety of its correctional officers. We believe that our concerns are amplified by our finding that a majority of BOP frontline employees want pepper spray expanded to minimum security prisons. Similar to the decision to issue pepper spray to other levels was based on pilot information, BOP has an opportunity to bring—either for or against issuance—a better case forward. Analyzing available data on incidents that have occurred at minimum security prisons, such as determining whether any of them could have been prevented or handled more effectively with pepper spray, and considering BOP employees’ perspectives, BOP could inform its decision whether to authorize pepper spray for employees at these prisons. We are making the following recommendation to BOP: The Director of BOP should conduct an analysis, using available incident and cost data, and other information as appropriate, to determine if the current decision to not issue pepper spray to minimum security prisons should remain in effect. (Recommendation 1) We provided a draft of this product to DOJ, including BOP, for review and comment. DOJ concurred with our recommendation and told us they had no comments on the draft report. DOJ did provide technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Attorney General, the BOP Director, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or goodwing@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Throughout our audit work, we asked Bureau of Prisons (BOP) officials with whom we interviewed at the headquarters and selected prisons about factors that impact the safety of BOP employees, as well as efforts, if any, they had made to mitigate those factors. We specifically targeted three groups of BOP personnel—BOP headquarters, wardens and their executive staff, and union officials—to rate the impact of 15 selected factors on employee safety at the groups and by prison security level. We then analyzed their responses and identified the top five factors that these BOP officials identified as having an impact on employee safety. We received responses from four BOP headquarters officials, 18 wardens and their executive staff, and 10 union officials. Officials were provided the structured questions (see below) in advance of the site visit, and the team recorded their responses during the interview. We held one interview with four Bureau of Prisons (BOP) headquarters officials, nine interviews with 18 wardens and their executive staff, and seven interviews with 10 union officials about 15 selected factors that impact the safety of BOP employees, using a structured questions set (see app. I). These officials’ responses, which are broken down by group and security level, are presented in the figures below. In addition to the contact named above, Brett Fallavollita (Assistant Director), Sonja S. Ware (Analyst-in-Charge), Anthony DeFrank, and Emily Martin made key contributions to this report. Willie Commons III, Elizabeth Dretsch, Eric Hauswirth, and Susan Hsu also contributed to this work.", "summary": "Within the Department of Justice, BOP is responsible for housing male and female federal inmates at 122 prisons in a safe environment for staff and inmates. Pepper spray is one of the methods BOP employees use to enhance their safety. The Eric Williams Correctional Officer Protection Act of 2015 includes a provision for GAO to examine certain matters related to the issuance of pepper spray to officers and employees in BOP prisons. This report addresses (1) what is known about the effectiveness and cost of issuing pepper spray in BOP's high, medium, low, and administrative security prisons; (2) BOP's position on expanding the issuance of pepper spray to minimum security prisons and the support used to make this decision; and (3) the challenges, if any, BOP officials identified as affecting the safety of BOP employees and the steps, if any, BOP has taken to address them. To address these objectives, GAO reviewed BOP policies, guidance, incident reports, and cost data on pepper spray use and interviewed knowledgeable officials at BOP headquarters and nine prisons at three locations, selected to represent varying security levels and other characteristics. Pepper spray is an effective tool for reducing the time needed to control incidents involving inmates and for reducing any related injury to Bureau of Prisons (BOP) employees, according to a 2012 BOP pilot study and BOP officials interviewed by GAO. BOP first issued pepper spray to employees in high security prisons in August 2012 and to medium, low, and administrative security prisons in subsequent years. Officials estimated that a canister of pepper spray costs $7 to $14. However, the total cost to purchase pepper spray and train employees on its use is not readily available because purchases are tracked at the prison level, and pepper spray training costs are commingled with other training costs. BOP determined that it would not issue pepper spray to minimum security prisons. BOP headquarters officials stated that this decision was made because inmates at such prisons are usually nonviolent offenders, among other reasons. However, GAO's analysis of BOP data found 47 reported incidents that included assaults on staff and other inmates across BOP's seven minimum security prisons in 2018. In addition, 56 of 73 officials GAO interviewed said pepper spray should be expanded to minimum security prisons. BOP officials stated they were not aware of an analysis of incident data or other information to support its decision but said that the decision remains appropriate. However, by analyzing available data on incidents that have occurred at minimum security prisons, BOP could better inform its decision on whether to issue pepper spray to employees at minimum security prisons. BOP officials rated the following factors as having the most significant impact on BOP employee safety, as shown in the figure below. BOP officials stated that they are taking steps to mitigate factors impacting safety. GAO recommends that BOP conduct an analysis to determine if its decision to not issue pepper spray to minimum security prisons should remain in effect. The Department of Justice concurred with the recommendation.", "document_type": "gao"}
{"report": "Navy shipbuilding is a costly and complex endeavor that requires billions of dollars to develop, design, and construct ships. However, the acquisition phase of a ship’s life cycle only accounts for approximately 30 percent of a ship program’s total life-cycle cost. Notionally, the remaining 70 percent of the life-cycle cost of a ship program is incurred after the Navy delivers new ships to the fleet during the phase known as O&S. DOD guidance states that these long-term sustainment costs are determined in large part by decisions made early in the acquisition process. Approximately 80 percent of a program’s O&S costs fixed at the time the shipbuilding program’s requirements are set and the ship is designed. Additionally, we have found that once these decisions are made, it can be very difficult and costly to make changes if sustainment improvements are needed. According to DOD, operational support is a function of several related factors—reliability, availability, maintainability, and cost—that are determined in large part by decisions made before the start of construction. Reliability is the probability that an item, such as a system, can perform a required function under stated conditions for a specified period of time. Availability is a measure of the degree to which an item is in an operable state and can be called upon to work at the start of a mission and at an unknown (random) point in time. In other words, the degree to which a system is operable and available for mission tasking when needed. Maintainability is the ability of an item, such as a system, to be retained in or restored to a specified condition when maintenance is performed by skilled personnel using prescribed procedures and resources, at each prescribed level of maintenance and repair. Cost refers to the O&S costs associated with sustaining the ship. When planning for and executing ship sustainment, DOD guidance states that the program manager’s goal is generally to find a solution that maximizes reliability, availability, and maintainability within cost constraints. As the Navy acquires its ships, it makes a series of decisions that have implications for how a ship class can be affordably sustained, including decisions about engineering, ship design, equipment selection, and planned maintenance approaches. As such, DOD guidance advises acquisition programs, including Navy shipbuilding programs, to plan for and design reliability, availability, and maintainability into the weapon system early in the acquisition effort. For the purposes of this review, we define early in the acquisition process as the time period between the beginning of the program and the start of construction on the lead ship. Giving attention to these sustainment issues early in the acquisition process is intended to help programs ensure that their ships will be sustainable and affordable over their entire life cycle. Conversely, if reliability, availability, and maintainability are not adequately designed into the ship, there is a risk the ship will cost more to own and operate than expected and will not be available for use when needed by the fleet. Since Navy ships are comprised of numerous systems that need to work together, planning for sustainment and designing reliability, availability, and maintainability into a ship is a complicated task. Most Navy ships can accomplish several different missions, and accomplishing these missions usually requires a set of mechanical, electrical, combat, information technology, and other systems to work together. Each of these systems individually needs to be reliable, available, and maintainable in order for the ship as a whole to be sustainable. As such, addressing sustainment during the acquisition process is an effort that requires coordination and input from a variety of officials associated with the program, including the program manager, requirements officials, ship design managers, engineers, PSMs, and others. DOD acquires new weapons, including ships, for its warfighters through a process described in two key acquisition policies: Department of Defense Directive 5000.01, which establishes the overarching framework for the Defense Acquisition System, and Department of Defense Instruction 5000.02, which implements the Defense Acquisition System. These policies provide management principles and detailed procedures, respectively, for the execution and management of defense acquisition programs. Specifically, these policies establish the phases of the acquisition process, key milestone decision points, required acquisition documentation, and roles and responsibilities for acquisition officials, among other things. Under this framework, shipbuilding programs move through several acquisition phases, including requirements setting, material solution analysis, technology development, ship design, ship construction, deployment, and sustainment. In order to proceed through the acquisition process, shipbuilding programs must be reviewed periodically at key decision points, called milestones, at which a Milestone Decision Authority assesses the program’s progress in achieving its goals. These milestones typically coincide with significant increases in the resources devoted to the program. To ensure senior leadership is well- informed at these decision points, shipbuilding programs are generally required to create or update key acquisition documents for milestone reviews that contain information on the program’s requirements, costs, and schedule, among other things. The Navy has also established its own acquisition policy and processes to supplement the DOD-wide acquisition policies and to oversee acquisitions managed internally to the Navy. The Navy’s acquisition policy, Secretary of the Navy Instruction 5000.2, provides instructions for implementing the Defense Acquisition System within the Navy, as well as additional Navy-specific acquisition procedures. In particular, Navy acquisition policy establishes a series of seven Navy decision points throughout the acquisition process, called Gate reviews, which complement the DOD milestones. These Gate reviews are split into two phases that the Navy calls passes: the first is led by the CNO and focuses on requirements setting and the second is led by the Assistant Secretary of the Navy for Research, Development, and Acquisition (ASN (RD&A)) and focuses on acquisition. As programs move through the acquisition process, Navy leadership—comprised of officials from the acquisition, requirements, resources, and warfighting communities— convenes Gate reviews to conduct oversight and ensure programs are on track to achieve their acquisition and sustainment goals. Each Gate review has a different objective and list of topics that need to be included in the Gate briefing. Lastly, DOD and Navy policy both allow for the Milestone Decision Authority to tailor the acquisition process outlined in these policies. Figure 1 depicts the acquisition process for Navy shipbuilding programs, as established by DOD and Navy acquisition policies. The Navy’s acquisition policy also details the acquisition responsibilities of key Navy officials, including the ASN (RD&A), the CNO, and program managers. The CNO and the ASN (RD&A) are key Navy leaders who chair the Gate review process and approve acquisition documents. For most shipbuilding programs, the ASN (RD&A) also serves as the decision authority to approve the advancement of these programs through the acquisition process at the appropriate milestones. Further, the policy enclosures delineate various elements of acquisition programs, such as systems engineering, testing, and sustainment planning. DOD and Navy acquisition policies both include requirements for shipbuilding programs to consider sustainment throughout the acquisition process. For instance, prior to Milestone A, DOD policy states that sustainment planning and considerations should inform the development of program requirements and early ship design decisions. As programs move into the design and construction phases, programs are to develop a comprehensive product support package and evaluate it through engineering reviews and other tests to ensure it is sufficient to meet sustainment requirements and affordability targets. The planning documents that comprise these support packages, such as life-cycle sustainment plans (LCSPs), are intended to set the foundation for how the fleet will sustain a class of ships. In addition to the requirements set in DOD and Navy policies, Congress has passed laws related to increasing DOD and Navy attention on sustainment throughout the acquisition process. Chief among these is the creation of the role of the PSM. A PSM should develop and implement a comprehensive product support strategy for weapon systems, among other things. More recently, Congress has directed organizational changes related to DOD and Navy acquisition leaderships’ attention to sustainment. In response, the Navy has added a sustainment function to the ASN (RD&A)’s portfolio. The Navy implemented this direction in fiscal year 2020 with the appointment of a Deputy Assistant Secretary for Sustainment that reports to the ASN (RD&A). Congress has also established several requirements related to DOD and Navy management of acquisition programs’ O&S costs, sustainment planning, and sustainment reporting. For example, statute requires weapon system programs to consider, where appropriate, sustainment in key acquisition documents, such as acquisition strategies, designs, contracting, and cost estimates. Additionally, statute requires DOD to provide Congress with annual Selected Acquisition Reports that have sustainment and life-cycle cost information. Shipbuilding programs are required to develop a suite of acquisition documents that provide information about the goals of the program and how the program office is developing and executing to these goals, pursuant to DOD and Navy acquisition policies. Many of these key acquisition documents contain information about the program’s sustainment requirements and plans, as discussed below. The Capability Development Document should define the program’s operational requirements, including the program’s key performance parameters. Key performance parameters are the most critical requirements a system must demonstrate to deliver an effective military capability. In 2007, DOD updated its requirements setting policy, called the Joint Capabilities Integration and Development System, to require all programs to establish key performance parameters for sustainment in response to concerns that acquisition programs were not adequately planning for sustainment. This requirement helps ensure that acquisition programs provide a weapon system to the warfighter with optimal availability and reliability at an affordable price. The sustainment key performance parameter is comprised of two measures—operational availability and materiel availability—which addresses the availability of the ship while in operations and under maintenance, respectively: Operational availability measures the probability that a system will be ready for use when expected. This requirement helps programs determine how reliable, maintainable, and supportable a system needs to be. Operational availability is also understood as the percentage of time a ship can perform its primary mission. Materiel availability measures the percentage of the total inventory of a system that is operationally capable based on materiel condition, which for ship platforms, is the percentage of a ship class available for deployment. This metric helps programs determine how many ships to buy in order to meet planned deployment schedules. This requirement should inform decisions that could increase or decrease planned maintenance time for a shipbuilding program. According to DOD guidance, the operational and materiel availability requirements should be considered in tandem to produce ships that work as expected and are available when needed, as shown in figure 2 below. During the acquisition process, the operational availability requirement should inform decisions about how to best increase reliability for systems needed to meet the key performance parameter. To do this, engineers can, among other things: (1) design systems that require less frequent maintenance, (2) add redundancy to key systems, or (3) ensure that systems can be fixed quickly and cheaply. At the same time, the materiel availability requirement should inform how many ships are purchased based on the quantity needed to accomplish missions at any one time. It also informs acquisition decisions that could affect the length of maintenance availabilities, such as maintenance time needed to repair or replace key components. The Life-Cycle Cost Estimate should provide information on the total estimated cost to develop, build, deploy, sustain, and dispose of a ship class over its life cycle, regardless of funding source. The life- cycle cost estimate is based on program objectives and operational requirements for the ship class. It should reflect a realistic appraisal of the program’s risks and the level of cost most likely to be realized. The life-cycle cost estimate includes O&S costs, which provide information on the estimated costs for crewing, operations, maintenance, sustaining support, continuing system improvements, and indirect support. The Acquisition Program Baseline (APB) is an overarching acquisition document that describes the shipbuilding program and presents the program’s approved cost, schedule, and performance goals. The APB is a formal, binding agreement between the Milestone Decision Authority, Program Manager, and their acquisition chain of command to be used for tracking and reporting on the program. The Life-Cycle Sustainment Plan (LCSP) should document the program’s product support strategy and governs planning for sustainment during the acquisition process, as well as the execution of sustainment activities after ships are delivered to the fleet. The LCSP describes the efforts necessary to develop and integrate sustainment requirements into the ship’s development, design, procurement, testing, fielding, and operation. It also lists the activities necessary for the shipbuilding program to develop, implement, and deliver a product support package that maintains affordable operational effectiveness over the ship’s life cycle. For example, the LCSP should contain information on sustainment engineering, O&S cost estimates and affordability constraints, reliability analysis, and sustainment contracts, among other things. The Independent Logistics Assessment (ILA) should be an impartial analysis of a program’s sustainment planning and execution to determine its ability to meet established performance and sustainment requirements. The ILA is intended to assess the adequacy of the program’s product support strategy, product support risks that are likely to drive future O&S costs, changes to system design that could reduce O&S costs, and effective strategies for managing O&S costs. According to DOD guidance, programs should use the results of the ILA to improve sustainment outcomes. There are a large number of Navy stakeholders involved in the effort to design, build, and support a ship class over its life cycle. In general, the acquisition community is led by the ASN (RD&A), while the operations and sustainment community is led by the CNO. Naval Sea Systems Command (NAVSEA) provides support to both the acquisition and sustainment communities and is comprised of experts across multiple disciplines. Figure 3 provides more information on the various acquisition and sustainment stakeholders that support the Navy’s ship classes. The ASN (RD&A) acts as the Navy Service Acquisition Executive and oversees the Navy’s shipbuilding program offices. Program Executive Offices are responsible for the life cycle management of their assigned programs. The program executive office is led by a program executive officer who, according to DOD’s updated acquition policy, should balance the risk, cost, schedule, performance, interoperability, sustainability, and affordability of a portfolio of acquisition programs and deliver an integrated suite of mission capability to users. For ships, there is a shipbuilding program office that is responsible for acquiring ships and an in-service program office that supports ships in sustainment. In some cases, these program offices are located within the same program executive office while, in other cases, these offices are split between different Navy organizations (typically the program executive office and NAVSEA). As such, the Navy’s shipbuilding programs and some program executive offices do not have responsibility for ship programs throughout their life cycle. The shipbuilding program offices manage their assigned shipbuilding programs through program initiation, technology development, ship design, construction, testing, and delivery. Acquisition program managers lead shipbuilding program offices and are responsible for the management of a program. Acquisition policies delineate a number of sustainment-related responsibilities for acquisition program managers, such as: developing and implementing an LCSP to inform acquisition and sustainment phases of the program; developing strategies for managing intellectual property; using systems engineering to identify tradeoffs between life-cycle costs and performance requirements during design and construction; implementing a comprehensive reliability and maintainability engineering program; developing an obsolescence management plan; monitoring the program’s performance against its sustainment requirements and developing strategies to improve operational availability, O&S affordability, maintainability, and reliability, as necessary; and working with a PSM, among other things. Product Support Managers (PSMs) generally work with the acquisition program manager and are tasked with developing and implementing a comprehensive product support strategy for their assigned programs. PSMs are supposed to ensure that a comprehensive product support strategy is developed and implemented. The CNO is the senior military officer of the Department of the Navy, overseeing the Navy’s fleet and NAVSEA, among other organizations. The CNO also has acquisition responsibilities, such as approving a shipbuilding program’s requirements and determining whether to accept delivery of ships from the shipbuilders. The Office of the Chief of Naval Operations (OPNAV) is a collection of offices under the purview of the CNO responsible for various functions necessary for the operation of the Navy. For example, there are divisions within OPNAV that manage the Navy’s budget, logistics, and requirements setting process, among other things. The operational fleet forces (fleet) of the Navy, including operational units and type commands, assume full financial responsibility for operating and maintaining ships. Naval Supply Systems Command provides supply and services support to the Navy by managing supply chains and inventory for Navy aircraft, surface ships, submarines, associated weapons systems, and non-nuclear ordinance stockpiles. NAVSEA is responsible for providing expertise in designing, engineering, building, buying, and maintaining ships, submarines, and combat systems to meet the fleet’s operational requirements. NAVSEA is comprised of directorates and warfare centers that specialize in these areas of expertise. NAVSEA reports to the CNO, but also supports the shipbuilding program offices, and is organized by the following specialties, among others: Naval Sea Systems Command Engineering Directorate (NAVSEA 05) is an engineering command that is comprised of cost estimators, ship designers, systems engineers, and other technical experts. Among other things, this office is responsible for the development of life-cycle cost estimates and systems engineering for ships. Naval Sea Systems Command Acquisition and Commonality Directorate (NAVSEA 06) is a command that brings together personnel dedicated to bridging communication gaps between government and industry, in order to enable cost reductions and commonality throughout the acquisition life cycle. Among other things, this office leads the Navy’s ILA process. Naval Warfare Centers are a group of centers that offer services on a fee-for-service basis, including: obsolescence mitigation, in-service engineering, and data analysis, among many other tasks. Shipbuilding program officials did not identify or mitigate sustainment risks during the acquisition process that subsequently resulted in significant and costly problems for the fleet. During the course of our review, the fleet identified 150 problems that affected multiple ships in a class. These problems resulted in more effort and cost for the fleet in sustainment than expected. In particular, we estimated that the Navy’s fleet has spent or is planning to spend at least $4.2 billion to mitigate and correct approximately 30 percent of these problems beyond what was planned for during the acquisition process. We could not quantify the cost impact of the remaining 70 percent of problems because the Navy was unable to provide data on the cost to correct them. Examples from the SSN 774, LPD 17 Flight I, and LHD 8/LHA 6 ship classes illustrate how shipbuilding program officials did not identify and mitigate sustainment risk during the acquisition process, which resulted in significant and costly maintenance paid for by the fleet once realized. The fleet identified 150 sustainment problems affecting multiple ships in a class that required more sustainment effort than planned for during acquisition, which we verified through Navy data and documentation. Officials in the fleet, such as operators, maintainers, and engineers, reported these problems to us as major class-wide problems requiring more sustainment effort than planned. These problems manifested after ships were delivered and most of these problems have yet to be resolved. Where data were available on the cost to correct the problems, we estimated that the fleet paid at least $4.2 billion and had to perform more onerous maintenance than planned. These problems stemmed from shipbuilding program officials not identifying or mitigating sustainment risks in sustainment planning during the acquisition process, before ships were delivered to the fleet. Figure 4 summarizes the number of problems among multiple ships in the same class that required more sustainment effort than the shipbuilding programs’ had planned. It also reflects the costs associated with fixing these problems for the 30 percent of the problems where we could identify these costs based on available data. According to fleet leadership, these problems contribute to the fleet’s inability to maintain ships at planned cost and schedule, which we have previously found is a significant Navy-wide issue. In part to accommodate this extra effort, the Navy has experienced maintenance delays and has had to defer planned maintenance for ships in operations that the fleet determined was not as urgent as other maintenance needs. For instance these problems have contributed to: nearly 5,300 total days of delays to planned maintenance availabilities since 2012 on ships built during the last 10 years, new ships deferring planned maintenance, and insufficient funding to meet maintenance needs. To generate the list of 150 problems, we interviewed operators and maintainers for the shipbuilding programs in our review and asked them to discuss problems that occurred across multiple ships in the same class. We then verified these problems with available Navy data on system reliability and equipment failures. The list of problems only includes those that stemmed from risks that were not identified, evaluated, or mitigated by the shipbuilding program offices in their sustainment planning during the acquisition process. The list does not include problems that can be attributed to normal wear and tear or problems caused by sailor error. The estimate of $4.2 billion in additional costs to address these problems includes the fleet’s cost to correct or mitigate problems, but excludes costs associated with day-to-day maintenance that the fleet must perform. If the Navy’s fleet chooses to correct a problem, it typically requires the Navy to replace systems on ships that have already been delivered to the fleet or are under contract, which can be a costly undertaking. According to fleet maintenance officials, if a permanent correction is not implemented, the Navy’s operators and maintainers typically have to incorporate a more onerous maintenance approach than expected. The effects of more onerous day-to-day maintenance costs are hard to quantify using available Navy data. For example, the Navy used a brand new toilet and sewage system on the CVN 77 and 78, similar to what is on a commercial aircraft, but increased in scale for a crew of over 4,000 people. To address unexpected and frequent clogging of the system, the Navy has determined that it needs to acid flush the CVN 77 and 78’s sewage system on a regular basis, which is an unplanned maintenance action for the entire service life of the ship. According to fleet maintenance officials, while each acid flush costs about $400,000, the Navy has yet to determine how often and for how many ships this action will need to be repeated, making the full cost impact difficult to quantify. We generally did not include these types of ongoing costs in our calculation. In our cost calculation, we also excluded costs associated with adding sailors to ships to address maintenance gaps because sailors have been added for many reasons, making it difficult to isolate the money spent on sailors to address equipment problems. For instance, we omitted the $225 million that the fleet plans to spend to add sailors to LCS class ships, even though the Navy is taking this action in part, to ensure that the ship’s crew can perform necessary maintenance. We determined that the 150 problems identified by the fleet generally fall into three categories: (1) problems maintaining commercial equipment on ships, (2) ship design that did not effectively consider maintainability, and (3) untested sustainment assumptions that turned out to be incorrect after ships were delivered to the fleet. We found that nearly all Navy shipbuilding programs we reviewed experienced problems in each of these three categories, as shown in figure 5. The following examples illustrate each of the three categories of problems: Problems maintaining commercial equipment on ships. Dozens of primarily commercial systems on multiple SSN 774 class submarines are experiencing unexpected failures. During the acquisition process, the Navy based sustainment planning decisions on the assumption that these parts would last for the life of the submarine without the need for any maintenance. According to officials, the Navy did not verify these assumptions and now at least 16 of these systems require scheduled maintenance and several more systems need periodic updates that were not previously planned. As a result, as we have previously found, operators and maintainers have had difficulty obtaining the spare parts, accomplishing this planned maintenance within resource constraints. Ship designs that did not effectively consider maintainability. The Navy used a new design for CVN 77’s stores elevators, which are used to move provisions between decks. However, among other issues, the elevators are too small to fit a standard sized pallet jack. Thus, provisions cannot be loaded or unloaded with a pallet jack or a forklift and must be manually unpacked and stacked by hand on to the elevator. Unloading is further complicated, according to the ship’s crew, because the elevator doors are so small that the average sailor cannot stand up as they enter and exit the elevator. The fleet has mitigated a few of these problems, but a redesign of the elevator would be necessary to fit standard pallets and fully resolve the other problems. Untested sustainment assumptions that turned out to be incorrect after ships were delivered to the fleet. The Navy had originally planned to use a contractor to conduct the majority of LCS maintenance. However, the fleet determined that a heavy reliance on contracted support is inefficient for maintaining and sustaining the LCS and is in the process of establishing maintenance teams comprised of Navy personnel. Since it planned to use contractor support, the LCS shipbuilding program officials stated that they did not purchase the technical documentation necessary to maintain the commercial equipment used on the ship. As a result, fleet engineers told us that they are now attempting to buy and develop the necessary maintenance data, which adds cost and complexity to the maintenance process. The following section highlights four of the 150 problems identified by the fleet. Other examples from among these 150 issues are discussed throughout the report when appropriate to illustrate how the acquisition process contributed to sustainment problems. A full listing of the 150 problems is in a version of this report that is for official use only. In an effort to improve sustainment of the LPD 17 class ships, the Navy decided to install titanium piping to carry seawater for firefighting and to cool machinery instead of copper-nickel piping because of its lighter weight and increased durability. However, instead of saving effort in sustainment, these pipes required more maintenance effort than planned and, in many cases, eventually had to be replaced. Early in the acquisition process, the Navy studied this decision and discovered that unlike copper-nickel piping, titanium piping carrying seawater is susceptible to “biofouling”—meaning sea life such as shellfish grow inside the pipes—as shown in figure 6. To prevent biofouling, Navy engineers determined that a chlorination system—which adds chlorine to seawater entering the ship in order to kill biological material in the water—and a dechlorination system—which removes the chlorine before the seawater is dumped from the ship— would be needed and included specifications for the shipbuilder to install these systems. Then, according to shipbuilding program officials, after the ship was on contract, the shipbuilder reported to the Navy that it could not find suitable chlorination and dechlorination systems. The program office decided to proceed with ship construction absent these systems and evaluate the extent of the biofouling problem after ship delivery. We reviewed the LPD 17 program’s sustainment planning documents and found that a discussion of this sustainment risk was not included in any of the maintenance planning documents, and, according to the fleet, this risk was not communicated to the Navy’s maintenance organizations. In July 2009, about one year after the lead ship was provided to the fleet, Navy operators and maintainers began to notice biofouling in the piping system. Biofouling degraded the functionality of a number of other systems on the ship that depend on the water delivered by the piping system, resulting in overheating of main and ship service engines and loss of electric power generation, among other problems. To address these and related issues across the LPD 17 class, the Navy’s fleet spent at least $250 million to: (1) buy and install new copper-nickel piping that is now costlier, heavier, and not as durable as titanium; (2) install chlorination systems that were later found to be unreliable, requiring significant maintenance; and (3) conduct unplanned maintenance and replace systems that broke due to shellfish contamination, among other interventions. The Navy’s attack submarines utilize a special covering on the hull. However, as shown in figure 7, portions of the hull-covering have de- bonded from the hull resulting in additional maintenance requirements during scheduled availabilities. Shipbuilding program officials told us that, during the acquisition process, they did not analyze how long the special hull treatment would last even though it is a critical technology. According to the program office, they now have identified the root cause and have continuously conducted engineering analysis to monitor and improve the material and construction processes. Due to the 5 to 6 year process of building a submarine, the time from identification to proven success can be 8 to 10 years, which is a long time to wait to know if a potential solution works in operations. However, in the meantime, the shipbuilding program has continued to deliver submarines to the fleet without knowing how long the special hull treatment will adhere to the vessel. As a result, maintainers cannot effectively plan for special hull treatment replacements in advance and, instead, are replacing material as needed. Performing timely and necessary maintenance is further complicated because it takes up to two years to receive this material after the Navy orders it from the manufacturer. Currently, Navy maintainers are budgeting $735 million to address the missing hull treatment on 11 of the 14 submarines constructed prior to implementing the potential solution. To enable reduced crew sizes and sustainment costs, the Navy chose to use an automated machinery control system on LHD 8 and LHA 6. Sailors describe the machinery control system as a vital software-based system that controls the operation of 92 percent of shipboard systems. The Navy initially sought to purchase a highly-automated commercial system that would perform tasks previously completed by the ship’s crew. However, according to the shipbuilding program, during the acquisition process, it verified reliability testing conducted by the manufacturer of the system. At the end of the shipbuilding process, the Navy discovered that this system required more maintenance and sustainment effort than planned. Specifically, the Navy’s Board of Inspection and Survey—the organization that inspects ships prior to delivery—discovered problems with this system on LHD 8 in March 2009. The Board of Inspection and Survey identified false alarms and a lack of technical documentation as a serious defect. Specifically, the test report found that the system’s spurious and numerous alarms created an environment whereby the ship’s sailors would be conditioned to ignore alarms and that more sailors would be needed to monitor the ship’s systems. Nevertheless, the CNO decided to take delivery of the ship and the shipbuilding program did not correct these problems prior to providing the ship to the fleet. Additional problems emerged on LHD 8’s first deployment, such as overheating that led to failure of the electrical distribution system resulting in loss of power on multiple occasions. However, the technical data provided by the manufacturer, according to Navy engineers, was insufficient for the sailors to operate, troubleshoot, and repair the system. Further, according to ship engineers and the shipbuilding program, 9 of 28 critical components within the machinery control system hardware were obsolete when LHA 6 was delivered to the Navy. As a result, fleet officials told us that it has been difficult to obtain replacement parts. The Navy has spent over $90 million to repair the software and replace key components of the system on LHD 8, LHA 6, and LHA 7. The LPD 17 Flight I knuckleboom crane carries boats and cargo (such as ammunition) from the ship to the water and back again, and is pictured below in figure 8. However, according to Navy reliability data, this system only works 30 percent of the time it is supposed to and has been difficult for sailors to use and maintain since the lead ship was delivered in 2005, nearly 15 years ago. There are a number of challenges in sustaining this crane that the Navy did not identify or sufficiently mitigate during the acquisition process. For example, the fleet does not have the necessary technical data to operate and fix the system, spare parts can be difficult to find or take many months to obtain, and pieces of the system are obsolete. According to fleet officials who use the data, the shipbuilding program office did not acquire sufficient technical data nor conduct sustainment planning for this large and complicated crane primarily because they planned to contract for the maintenance of the entire ship, including this system. The Navy subsequently discovered that contracting for the maintenance of the whole ship was cost prohibitive and maintenance responsibility was transferred back to the Navy. However, because there had not been adequate sustainment planning, the fleet did not have necessary resources, such as technical data, to effectively maintain the system. Additionally, as the fleet has been developing the capacity to maintain this crane, the shipbuilding program office continues to accept cranes with unmitigated risks leading to unplanned fleet effort. For example, across the eleven LPD 17 Flight I ships that have been delivered, there are four different versions of the crane, which further complicates maintainability because it increases the types of spare parts needed and the knowledge required of the sailors to fix the system. Specifically, officials stated that sailors who learned to maintain a crane on one ship cannot transfer all of their knowledge to other ships in the class. Due to the numerous sustainment challenges the fleet has experienced with this crane on LPD 17 Flight I, LPD 17 program officials told us that the Navy has since revised its new construction crane requirements for LPD 17 Flight II. According to the shipbuilding program office, these requirements allow the shipbuilder to use a more standard crane, which will be easier to sustain. While we could not calculate the added costs of maintaining this crane, we found that the Navy has spent over $10 million on the following actions: (1) contracting with the original equipment manufacturer for repairs, (2) replacing key components of the system, and (3) making changes to improve the system. DOD policy that the Navy uses to set sustainment requirements does not capture factors that affect whether ships are reliable and maintainable. This results in shipbuilding programs having ineffective sustainment requirements that do not support sound acquisition decisions. When sustainment requirements are used to inform acquisition decisions, they can help ensure that shipbuilding programs design and build reliable ships that can be effectively sustained within planned costs. The effectiveness of a shipbuilding program’s sustainment requirements depends on how the requirements are set, used, and reported. Setting the sustainment requirements. We found that weaknesses with specific portions of DOD’s requirements policy resulted in the Navy setting sustainment requirements that are poorly defined and not representative of the availability of the ship during operations and sustainment. Using the sustainment requirements. To achieve the requirements, shipbuilding programs need to incorporate the requirements into decisions made throughout the acquisition process, such as developing the ship design. Due to problems setting the requirements, shipbuilding programs cannot incorporate the sustainment requirements into acquisition decisions. Reporting on the sustainment requirements. Statute requires that programs report on the status of these requirements on a regular basis. However, the Navy’s reporting on these requirements is misleading because it is based on the Navy’s deficient sustainment requirements and it does not reflect the fleet’s experience. The Navy sets sustainment requirements based on definitions for ships established by DOD policy, called the Joint Capabilities Integration and Development System, but the shipbuilding programs’ requirements are not robust even when they follow DOD policy. This is because the definitions for ship sustainment requirements in DOD requirements setting policy do not capture all factors that reduce the ability of ships to achieve their missions. For example, the definitions of operational and materiel availability in this policy exclude key factors and failures that reduce ship availability, such as catastrophic failures of mission-critical systems and unplanned maintenance. DOD policy states that the purpose of sustainment requirements is to ensure ships work when expected and are available when needed. But because the definitions of these requirements for ships do not capture all factors that can influence operational or materiel availability, the specific definitions for setting sustainment requirements for ships do not support the achievement of this goal. DOD’s requirements setting policy has designated these metrics to be key performance requirements since 2007, which means that they are one of a small number of mandated critical requirements that a weapon system must demonstrate. Without a definition for ship sustainment requirements in DOD policy that accounts for all factors that make Navy ships unavailable for operations, Navy shipbuilding programs cannot reasonably ensure that they are setting sustainment requirements that will result in reliable, maintainable, and available ships. In 2015, DOD added guidance to its policy that instructed shipbuilding programs to establish operational and materiel availability requirements based on the extent to which ships are expected to experience major failures, referred to as category 4 casualty reports. The fleet writes casualty reports when there are significant equipment failures that contribute to the ship’s inability to perform its missions. There are three categories of casualty reports (2, 3, and 4), with category 4 being the most severe. According to Navy guidance, category 3 and 4 casualty reports indicate degradation to critical mission capability that needs immediate repair, while category 2 reports contain failures that are important to the fleet but do not affect the ship’s core missions. In particular, DOD policy was updated to define operational and materiel availability for ships as follows: Operational availability (work when expected) is the percentage of time an operationally deployed ship is not in a category 4 casualty report state over a given operating period. The Navy typically sets this requirement at approximately 80 percent for shipbuilding programs. Materiel availability (ready when needed) is the portion of a ship class available for tasking. Ships are typically not available for tasking when in a planned maintenance availability or have an open category 4 casualty report. The Navy followed DOD requirements setting policy by establishing these key performance parameters for the four shipbuilding programs we reviewed that established requirements since fiscal year 2015—SSBN 826, FFG(X), DDG 51 Flight III, and LPD 17 Flight II. Prior to 2015, there were no ship-specific definitions in DOD requirements setting policy. Shipbuilding programs that set requirements prior to 2015 have generally adapted the definitions in JCIDS for calculating and reporting operational and materiel availability, which is why we include examples from these programs as appropriate The following two sections discuss shortfalls with DOD’s policy for setting sustainment requirements for Navy shipbuilding programs. DOD’s definition of operational availability for ships in its policy is problematic because it defines operational availability: (1) using category 4 casualty reports and (2) for the entire ship with a single metric. As a result, the operational availability requirement does not capture all critical failures that reduce a ship’s ability to perform mission-critical tasks. Category 4 casualty reports. DOD’s operational availability definition for ships counts only the most severe casualty reports—category 4. The definition excludes category 3 casualty reports, which also represent a severe degradation to the Navy’s primary missions. According to several fleet officials, category 4 casualty reports are typically used only in rare instances when the entire ship is out of commission. Fleet officials added that category 3 casualty reports can also represent severe mission-critical casualties that affect the ability of the ship to perform primary missions. In addition, the Navy’s categorization of casualty reports tends to be subjective or based on other factors than the severity of the defect, such as, according to maintenance officials, communicating a maintenance priority. In other words, there are additional deficiencies that could be mission-critical that may not be captured by category 3 or 4 casualty reports. Of the 11 ship classes in our review, six have delivered ships and have casualty report data available. We reviewed Navy casualty report data for 18 ships from these six ship classes and found that all of these ships had near-perfect operational availability when using only category 4 casualty reports. However, when we calculated operational availability using category 3 casualty reports, we found that 14 of these 18 ships fell short of their operational availability targets. Table 2 summarizes the category 3 and 4 casualty reports during two LCS missions as an example of how major failures are captured as category 3, and not category 4, equipment casualties. Therefore, by using category 4 casualty reports to define operational availability, the Navy is developing a requirement that does not accurately account for all ship failures that affect whether or not a ship works as expected. Setting operational availability at a whole ship level. DOD requirements setting policy specifies that shipbuilding programs should establish a single metric for the entire ship. However, when set at the ship level, the operational availability requirement is not effective at capturing the probability of whether or not a ship and its systems will work as expected. This is because ships are comprised of hundreds of systems that are of varying importance to achieving missions. For example, a ship may have an air-defense mission that requires a select group of systems—such as an air-search radar and a missile system—to work together to achieve the mission. However, a ship-level requirement is set using a single metric for the entire ship, which does not account for the fact that some systems are critical to achieving a ship’s primary missions while some systems are not as critical. Further, a ship level requirement is difficult to calculate. According to a Naval Sea Systems Command operational availability manual, it is improbable that the operational availability of hundreds of complex systems within a ship can be accurately calculated and represented in a ship level requirement. Figure 9 below illustrates how setting requirements pursuant to DOD requirements setting policy resulted in an operational availability requirement for the FFG(X) program that the fleet considers unacceptable. According to Navy handbooks and manuals on using operational availability during ship design, the operational availability requirement is a more effective input for acquisition decisions when it is set at the mission level. Since ships have multiple missions, this would result in multiple operational availability requirements instead of a single ship-level requirement. The Navy’s operational availability handbooks and manuals endorse this approach because a mission-level requirement is focused on a smaller group of systems that support the mission and, therefore, allows the Navy to prioritize availability for these key systems. Setting operational availability requirements by mission area would provide shipbuilding programs with information about how to identify and prioritize key systems for additional reliability analysis or sustainment planning to ensure that they will be sufficiently available to meet mission needs. Also, even though this would likely result in several operational availability requirements for each ship class, it would simplify the calculation of these requirements, which could make them more helpful inputs for acquisition decisions. We found that DOD’s definition of materiel availability for Navy ship classes in its requirements setting policy does not ensure that ships will be ready when needed—the purpose of the materiel availability requirement. This is because DOD requirements setting policy for ships does not specifically account for other factors that affect materiel availability—such as unplanned maintenance, unplanned losses, and training—during which times ships may not be available for operations. Unplanned maintenance. Unplanned maintenance can occur when planned ship maintenance lasts longer than expected or a mission- critical failure occurs during deployment that needs immediate attention. As our prior work has found, Navy ships experience significant levels of unplanned maintenance. For example, from fiscal year 2012 through fiscal year 2018, the Navy has reported over 3,900 days of unplanned maintenance across the ships we reviewed. Unplanned losses. Unplanned losses are instances when a ship is out of commission for an extended length of time due to severe damage or when a vessel was not prioritized for maintenance. For example, we have previously reported that due to heavy shipyard workload, some submarines are waiting significantly longer than planned—in some cases several months or years—to enter maintenance periods. Training. The Navy also conducts several training periods, and the DOD requirements setting policy does not address whether or not a ship is considered available or unavailable during these training periods. Six of the 11 shipbuilding programs we reviewed developed their program requirements since DOD made sustainment requirements mandatory in 2007. One of these six programs—LHA 6—did not established a materiel availability requirement as required by DOD requirements setting policy. LHA program officials told us that materiel availability does not apply to ships, which is not reflected in DOD requirements setting policy. Four shipbuilding programs—DDG 51 Flight III, LPD 17 Flight II, FFG(X), and LCS—developed materiel availability requirements that generally align with DOD’s requirements setting policy and, as such, do not specifically account for unplanned maintenance, unplanned losses, and training. The remaining shipbuilding program—SSBN 826—went above and beyond DOD requirements setting policy by incorporating these additional areas that could affect materiel availability. Program officials stated that sustainment requirements are more critical to achieving the SSBN 826’s missions than other shipbuilding programs. However, DOD and Navy guidance clearly state that materiel availability is a mandatory critical requirement for all programs. Since DOD’s definition for materiel availability does not include all factors that could result in a ship being unavailable for operations, shipbuilding programs cannot ensure that ships will be ready when needed. Because of how DOD policy defines sustainment requirements for ships, these requirements do not provide the information needed to support acquisition decisions. In particular, the Navy’s sustainment requirements developed according to DOD policy rarely provide adequate information about how reliable, available, and maintainable ships need to be, which is necessary to support well-informed decisions pertaining to ship concept development, design, and construction. For example, during the acquisition process, shipbuilding program offices make decisions that transform top-level requirements—like operational and materiel availability—into detailed, low-level requirements that can be achieved with available resources. We found that ongoing and new shipbuilding programs continue to make acquisition decisions that influence sustainment without the information that could be provided by better- defined sustainment requirements. Since shipbuilding programs cannot use these requirements to inform acquisition decisions, they cannot ensure that ships will be sufficiently reliable and available. The following two sections discuss the Navy’s issues with using sustainment requirements when making acquisition decisions for its shipbuilding programs. The Navy’s operational availability requirements for ships—which follow the DOD policy discussed above—do not provide adequate information to support acquisition decisions that affect whether or not ships are reliable enough to meet their missions. For example, in January 2020, we found that engineers can use a variety of activities when designing weapon systems to increase reliability to meet requirements, such as conducting failure analysis and adding redundant systems. In order for these engineering decisions to be successful, the requirements that inform the process must be firm, well-defined, feasible, and affordable. However, when the operational availability requirements do not adequately describe the needed reliability and maintainability for key systems—as is the case for most of the shipbuilding programs we reviewed—Navy engineers cannot ensure that the ship’s design supports the program’s top-level operational availability requirement. Further, they cannot identify aspects of the design that could put the requirement at risk. Instead of using the operational availability requirement to inform decisions across all key ship systems, Navy ship engineers told us that they interpret the requirement to only apply to catastrophic failures that put the entire ship out of commission. Therefore, in practice, shipbuilding program officials told us that they only apply this requirement to systems that the ship needs to get underway, such as the main engines and propellers. As such, shipbuilding programs are making engineering decisions during the acquisition process for many mission-critical systems, such as radars, weapons, and systems necessary for launching and recovering aircraft, without understanding how often these systems need to work to achieve key missions. This means the operational availability requirement only applies to the bare minimum of ship systems needed to get underway rather than the full complement of systems needed to meet the ship’s missions. For instance, LPD 17 Flight I ships can often sail away and are considered operationally available even as key systems—such as the knuckleboom crane, davit, air conditioning, and potable water systems among others—work less than 75 percent of the time the ship is at sea, according to fleet databases that track system failures. By interpreting the requirement to only focus on systems needed to move the ship and not accounting for other mission critical systems, shipbuilding programs cannot ensure that all critical systems needed to meet missions will work as expected. In addition, since shipbuilding programs have a ship-level operational availability requirement and interpret this requirement to focus on systems needed to get ships underway, they have not consistently leveraged available data on various ship systems when making engineering and ship design decisions. Navy sustainment experts told us that shipbuilding programs rarely use data on the actual availability of ship systems. If the requirement was set at the mission-level and focused on key systems, the data could show whether or not planned systems, already operating in the fleet, are available enough to meet requirements. Then, if the data shows that these systems are not sufficiently available, shipbuilding programs could make investments in improving the availability, such as improving supply support, making the system more reliable, or adding redundancy. Since shipbuilding programs cannot use operational availability requirements to make informed acquisition decisions, they are at risk of continuing to deliver ships to the fleet that are not as reliable and sustainable as needed. Of the five shipbuilding programs we reviewed that had established materiel availability requirements, we found that only one program has a requirement that provides adequate information for acquisition decisions. In particular, the SSBN 826 program’s materiel availability requirement has been a key input in establishing the submarine class’ planned maintenance schedules and procedures. Shipbuilding program officials told us they are using the maintenance period length determined by the materiel availability requirement to inform acquisition decisions—such as adjusting the submarine’s design to facilitate timely maintenance. For instance, the SSBN 826 shipbuilding program assessed the potential effect of new technology on the amount of maintenance that the submarine is planned to undergo. In doing so, the shipbuilding program officials believe that, if the new technology works as planned, the SSBN 826 class will meet the same presence requirement as its antecedent class with two fewer submarines. While this concept is a good example of how materiel availability can be used during the acquisition process, it is too early to know if the Navy’s plan will work for this class of submarines and fleet officials told us that they have doubts that the Navy can achieve this goal as planned. Officials from other shipbuilding program offices told us that they are not using the materiel availability requirement to inform maintenance decisions. Further, according to these shipbuilding program offices, the materiel availability requirements do not connect with the ship class’ planned maintenance schedules and, therefore, they do not make decisions to ensure that planned maintenance can be achieved within specific time frames. Program officials from several of these programs stated that the materiel availability requirement is not critical to performance goals, and, as such, it is not a priority to achieve this requirement. Without improving how the Navy defines and uses materiel availability requirements, shipbuilding programs are missing opportunities to make informed acquisition decisions about how ships are maintained and, therefore, cannot ensure that ships are available for operations when needed. The Navy’s reports to Congress are misleading because they do not reflect all of the failures and factors that reduce ship operational and materiel availability once ships are in the fleet. Shipbuilding programs report all key requirements in their Selected Acquisition Reports to Congress, including operational and materiel availability. According to DOD guidance for executing Selected Acquisition Reports, DOD program offices should provide accurate information to Congress to aid in determining if the program is meeting its key requirements. We reviewed the December 2018 Selected Acquisition Reports for the five shipbuilding programs that reported one or both of these sustainment requirements to Congress. We found that the Navy reported that these shipbuilding programs were meeting or surpassing their sustainment requirements. However, based on our analysis of data on mission-critical failures after ships were delivered, we found failures that would prevent these ships from conducting critical missions. Hence, the Navy’s reports to Congress do not reflect the actual availability of ships in the fleet. As a result, Congress does not have full insight into whether shipbuilding programs are on track to meet their operational and materiel availability requirements. The following two sections further discuss the Navy’s issues with reporting sustainment requirements for its shipbuilding programs. We found three out of seven shipbuilding programs report on operational availability in their Selected Acquisition Reports. These three programs all stated that they were meeting or exceeding their requirements, but these reports often did not match the fleet’s experience. For example: For one vessel class, the Navy reported that it was exceeding its operational availability goal by over 10 percent. At the same time, however, several mission critical systems are unreliable. Officials from the fleet stated that critical ship equipment is consistently failing. The Navy is reporting that another ship class—that has yet to finish construction —is exceeding its operational availability target by 5 percent. This ship class has already experienced several catastrophic failures that limit its ability to conduct primary missions during its limited at-sea periods. These examples demonstrate how reporting based on a ship-level operational availability requirement does not provide insight into reliability and maintainability problems that the fleet is experiencing and that prevent ships from meeting missions. Consequently, Congress is not receiving accurate information on the results of its investments and the sustainment problems the fleet is experiencing. We found that two of the Navy’s shipbuilding programs we reviewed currently report materiel availability in Selected Acquisition Reports to Congress. One other shipbuilding program that has materiel availability as a key requirement in its approved baseline does not report this requirement, contrary to DOD guidance. For example, the LCS shipbuilding program indicates that it is meeting the requirement despite evidence of issues with materiel availability. The Navy’s Selected Acquisition Report for the LCS states that the program is meeting its materiel availability requirement even though internal DOD reports state that the LCS’ materiel availability is significantly below its requirement. Further, fleet officials stated they are worried the maintenance workload required for the LCS class ships may result in additional unplanned maintenance delays that further reduce materiel availability. The Navy has also chosen to take steps that will reduce the materiel availability of the ship class throughout the ship class’ service life, such as assigning the first four ships as test ships, making one of every four LCS a training ship on a rotating basis, and increasing planned maintenance days, among other things. Since several of the Navy’s shipbuilding programs do not report information to Congress on this critical requirement, Congress does not have insight into whether or not ships are as available as intended. The shipbuilding programs included in our review did not consistently conduct effective sustainment planning when developing three key acquisition documents: life-cycle cost estimates, life-cycle sustainment plans (LCSPs), and independent logistics assessments (ILAs). According to DOD and Navy acquisition policy, these documents, along with other documents, help programs ensure the ships they are acquiring can be sustained affordably and adequately over their life cycle. However, for the shipbuilding programs in our review, we found that these documents did not provide a thorough assessment of the sustainment implications and risks for many of the programs’ acquisition decisions. Specifically, we found that: 1) O&S costs in shipbuilding programs’ life-cycle cost estimates did not account for major sustainment risks and grew significantly; 2) LCSPs rarely included information needed to demonstrate ships could reliably meet sustainment requirements at an affordable cost; and 3) ILAs did not consistently identify major sustainment risks that were subsequently realized by the fleet. Because shipbuilding programs are not effectively using these acquisition documents to plan for sustainment, they are passing unmitigated sustainment risks on to the fleet. We found that shipbuilding programs’ current estimates of O&S cost are significantly higher than initial estimates. This is largely because the Navy cost estimators based their initial estimates for the shipbuilding programs in our review on unproven sustainment assumptions without assessing the potential cost risk of the assumptions. According to shipbuilding program officials, O&S cost estimates grew after shipbuilding programs revised their sustainment assumptions, such as by increasing the number of crew required to operate and maintain the ships or by changing the level of maintenance needed for various ship systems. We compared programs’ initial life-cycle cost estimates for the six shipbuilding programs in our scope that had available estimates to current cost estimates that were updated after programs delivered ships to the fleet. As shown in table 3, we found that the shipbuilding programs’ estimates of O&S costs increased by over $130 billion from the initial estimate to the most recent estimate. Navy cost estimators stated that up to 20 percent, $26 billion, of the cost estimate growth could be accounted for by process changes that resulted in including more indirect costs, such as health and child care for sailors, into O&S estimates. Further, we adjusted our analysis to account for any program quantity changes over time. Even accounting for these changes, the Navy still experienced over $100 billion in O&S cost growth. The O&S cost growth for these six shipbuilding programs is likely higher than the $130 billion that we calculated in table 3. This is because the Navy has not updated these estimates to reflect actual O&S costs for several of the ship classes. For example, the LCS program, in its initial O&S cost estimate, projected $7.1 million (in fiscal year 2019 dollars) per year per hull for maintenance. However, thus far, the average LCS seaframe currently costs $21 million (in fiscal year 2019 dollars) per hull per year to maintain—an increase of over $13 billion if these higher than planned maintenance costs continue over the life of the ship class. We found that the shipbuilding programs we reviewed underestimated initial O&S costs, largely because cost estimators used unproven O&S assumptions without assessing the sensitivity of those assumptions on potential cost growth, as discussed below. The O&S costs estimates we reviewed had grown primarily because initial unproven assumptions turned out to be optimistic. O&S cost estimates for four of the six shipbuilding programs we reviewed were based on a Navy-wide effort that began in the early 2000s to reduce crew sizes on Navy ships and lower O&S costs by, among other things, replacing some sailors with automated systems. We found that cost estimators used the shipbuilding program offices’ unverified assumptions regarding crew size to develop the initial O&S estimate for four of these six programs. Over time, the Navy found that the automated systems were not as reliable as planned and, therefore, reduced crewing levels were not realistic. To address this and other issues, the Navy added sailors back on to ships—resulting in increases in O&S cost estimates. For example, cost estimators for the CVN 78 class initially estimated a 15 to 23 percent decrease in crewing levels compared to the previous class of carriers in order to create O&S savings. However, the Navy is now in the process of adding crew back on to the ship, even before its initial deployment, thereby contributing to increased O&S cost estimates, as shown in Table 4. Similarly, DDG 1000, LCS, and LPD 17 program officials also reported that increasing crew sizes was a major contributor to higher sustainment costs for these programs. Further, the shipbuilding programs we reviewed made assumptions based on unproven initiatives, in conjunction with reducing crew sizes that ended up having a greater effect on the cost of maintaining ships than initially estimated. For example, for four ship classes—SSN 774, DDG 1000, LPD 17 Flight I, and LCS—the Navy originally planned to use a maintenance initiative called performance-based logistics, which called for the use of contractors to conduct maintenance instead of sailors on board the ships. In 2001, DOD policy recommended that all weapon systems use performance-based logistics and Navy shipbuilding programs subsequently anticipated that this strategy would reduce maintenance costs. Based on our review of shipbuilding program cost estimates, we found that Navy cost estimators included cost savings from these new and unproven approaches—assuming that they would work as expected. Shipbuilding program officials stated that the Navy has now largely abandoned this approach after attempting to contract for performance-based logistics and discovering that it was much more costly than planned. Another initiative that began in the early 2000s involved the Navy using more shipbuilder-provided commercially-bought systems on ships rather than systems the Navy developed and provided to the ship. However, maintaining commercial systems has been more expensive than anticipated for a variety of reasons, such as systems becoming obsolete and challenges acquiring manufacturer support. For example, the SSN 774 shipbuilding program made an effort to use commercial equipment that it assumed would never need repair or replacement—meaning that these parts would last the life of the submarine—without evaluating whether these parts actually had no repair needs. Further, SSN 774 program officials told us that the program office did not plan for the Navy to support many of the submarine’s commercial components because they initially planned to contract for logistics support. In all, the SSN 774 program asserted that over 4,000 parts on the submarine class would not need maintenance for the duration of the submarine’s life. However, since the submarines have been operating, many of these parts are failing, which has created unanticipated expenses. For example, Navy maintenance officials stated that they are planning to pay $360 million over the next 12 years to maintain a part of the propulsion system that it wrongly assumed would not need any maintenance at the time O&S costs were established. A key reason that shipbuilding programs underestimated O&S costs is that the Navy’s cost estimators did not test the sensitivity of key O&S cost assumptions to quantify risks. According to DOD and Navy guidance and GAO-identified cost estimating best practices, cost estimates should include risk and sensitivity analyses to understand how changing program assumptions can affect cost—including O&S costs. However, for the six cost estimates that we reviewed, the Navy did not conduct risk and sensitivity analysis on key sustainment assumptions, such as unproven crewing and maintenance assumptions. The Navy’s cost estimators told us that they typically only conduct sensitivity analysis on the acquisition portion of a life-cycle cost estimate and not the O&S portion of the estimate. Instead, cost estimators told us that they use shipbuilding program office assumptions about the crew and how the ship class will operate as defined requirements that will not change. However, as discussed throughout this report, we found numerous instances in which incorrect maintenance assumptions resulted in billions of dollars of O&S cost growth. As a result, Navy’s cost estimators had reduced estimated O&S costs to reflect the programs’ presumed sustainment efficiencies without accounting for and quantifying the corresponding risk inherent in these assumptions. As such, in several cases, shipbuilding programs had optimistic estimates of O&S cost that later grew when unproven assumptions did not pan out as anticipated. According to shipbuilding program officials, their programs experienced significant O&S cost growth because the initial cost estimate did not sufficiently account for the risk of major changes to the program, such as revisions to the shipbuilding program’s assumptions about sustainment, that were realized once ships were provided to the fleet. For example, on the shipbuilding programs that adopted reduced crewing initiatives, Navy cost estimators reduced O&S costs due to fewer planned sailors on board, but did not determine how the O&S costs would be affected if automation did not achieve its intended efficiencies and the Navy had to add additional sailors to the crew. If the Navy’s cost estimators had conducted risk and sensitivity analyses of the O&S costs early in the acquisition process, shipbuilding programs could have had better insight into how much their O&S costs might increase if the key sustainment assumptions were not correct. Such insight into the potential sustainment cost impact could help shipbuilding programs identify the assumptions most likely to drive O&S cost growth. In turn, this information could help shipbuilding programs justify allocating additional resources during the acquisition process to ensure these sustainment assumptions are achieved, such as investing in additional testing to ensure the reliability of automated systems needed to reduce crewing levels. See figure 10 for an example of how unproven assumptions that were not evaluated using risk and sensitivity analyses led to optimistic O&S cost estimates for the DDG 1000 program. Navy officials told us that they are considering several pilot programs to improve cost estimators’ ability to conduct sensitivity analyses of maintenance costs, but have yet to provide details on these programs or the time frame for implementing them. While it is not possible for shipbuilding programs to predict future O&S costs with complete certainty, risk and sensitivity analyses could help shipbuilding programs’ better identify potential drivers of cost growth. In the absence of this cost analysis, shipbuilding programs will lack a clear assessment of the range of O&S costs their ships may require after they are delivered to the fleet. Additionally, without this O&S cost information, shipbuilding programs cannot provide Navy leadership with full insight into the range of resources that will potentially be required to sustain new ship classes over their lifetime or support recommendations for additional resources during acquisition to achieve sustainment assumptions. Five of the eleven shipbuilding programs we reviewed do not have LCSPs, and we found that the six programs that have LCPS do not use them to inform acquisition decisions that could help ensure ships are sustainable at an affordable cost. As of a September 2011 policy memorandum, DOD guidance requires every acquisition program we reviewed to have a LCSP. Shipbuilding programs, according to DOD acquisition policy, should develop and maintain LCSPs beginning at Milestone A, which is early in the acquisition process. According to DOD guidance, these plans should be the basis for all of the programs’ sustainment efforts. In particular, shipbuilding programs’ LCSPs should include information that demonstrates how a ship class can be affordably operated and maintained while meeting its sustainment requirements. To do so, DOD guidance describes that shipbuilding programs should use LCSPs to establish connections between life-cycle costs, reliability requirements, and crew size estimates, and identify and address sustainment issues, among other things. With nearly half of its shipbuilding programs not having completed LCSPs, the Navy is making acquisitions decisions without the context of a comprehensive sustainment planning document to help identify and mitigate the sustainment effect of its decisions. Figure 11 provides an example of a sustainment issue with the CVN 78 advanced arresting gear, which was identified during testing but not addressed in a LCSP. Officials from two of the five shipbuilding programs that do not have LCSPs stated that they had drafts of the plan, in some cases for several years, which leadership has yet to approve. In another case, shipbuilding program officials stated that they were not required to complete an LCSP even though DOD’s 2011 guidance directed them to create these plans immediately. For the six shipbuilding programs that had LCSPs, we found several challenges with how the programs develop and use these documents. Specifically, we found that the LCSPs: (1) rarely included a business case analysis, as required, that analyzed the relationship between life-cycle costs, reliability requirements, and crew size estimates; and (2) rarely identified and addressed sustainment issues in line with guidance. We found that none of the six LCSPs we reviewed contained business case analyses as required by DOD acquisition policy and guidance. According to DOD’s acquisition policy, an acquisition program’s LCSP should include a business case analysis annex, which should contain relevant assumptions, constraints, and analyses used to develop the product support strategy to the LCSP. According to DOD’s guidance for PSMs, who are responsible for developing and maintaining LCSPs, acquisition programs should use a product support business case analysis to help establish a product support package that balances sustainment costs against required sustainment outcomes. As such, the LCSP’s business case analysis is a tool to help programs assess the costs, benefits, and risks of key acquisition decisions from a sustainment perspective. Additionally, the LCSP should contain information on the activities needed to achieve the sustainment key performance parameters and a discussion of how much funding is required for those efforts. For example, Navy leadership approved the LCSP for FFG(X) in March 2019 even though the plan lacked the required sustainment business case analysis. Instead, the FFG(X) LCSP contains ship-level sustainment requirements and O&S cost information from the program’s life-cycle cost estimate, but no accompanying business case analysis demonstrating how the desired sustainment requirements (operational and materiel availability) can be achieved within these costs. As another example, several ship classes were designed with highly automated systems to enable reduced crew sizes and lower O&S costs, such as the LHD 8/LHA 6 machinery control system discussed earlier in this report. However, the LCSPs for these programs did not analyze the extent to which meeting O&S estimates and sustainment requirements were reliant on the reliability of these automated systems and the risks associated with using automation. Without connecting life-cycle costs to key sustainment factors such as reliability and crew size estimates, the Navy will not know if its sustainment planning is achievable within cost constraints until ships are provided to the fleet and have been operated for a significant period of time. We have previously found that it is often too expensive or time- consuming to make meaningful changes to the ship at this point in the shipbuilding process. LCSPs we reviewed rarely identified and proposed a plan to address programs’ sustainment issues, as described by guidance. According to DOD’s LCSP guidance, acquisition programs should assess their progress, challenges, and corrective actions when developing a plan to sustain a ship class. Two shipbuilding programs identified some sustainment risks and only one of the six LCSPs included plans for mitigating or correcting these risks. In the absence of proactively identifying and mitigating sustainment risks in the LCSP during the acquisition process, as described by guidance, we found that the Navy discovered and mitigated many of its sustainment challenges only after ships were delivered to the fleet. Without creating LCSPs that identify sustainment risks and proposing a plan to mitigate these risks, the Navy cannot ensure that it is making acquisition decisions that support ship sustainment. Two examples of significant sustainment risks that were experienced by nearly all of the programs we reviewed, but not identified or mitigated in LCSPs are: (1) insufficient technical data and (2) the use of performance- based logistics. Technical data. The LCSPs we reviewed that included an intellectual property strategy, as required by DOD acquisition policy during the operations and support phase, did not consistently address the full spectrum of potential intellectual property related issues, such as attaining intellectual property needed to repair and replace ship systems. According to DOD’s acquisition policy, shipbuilding programs should document the intellectual property strategy initially in the acquisition strategy and later in the LCSP to assess technical data needs and determine what intellectual property deliverables and license rights the program needs to acquire from contractors. Nearly all of the LCSPs we reviewed stated, in general terms, that the Navy would obtain the technical data to which it had rights. However, in these LCSPs, the Navy did not address how this strategy met the Navy’s needs for competitive and affordable acquisition and sustainment over the life cycle of a ship class, such as to ensure maintenance could be carried out as planned by a ship’s crew. Without ship programs fully planning for acquiring needed intellectual property to maintain ship systems in the LCSP, we found that the fleet was often not aware that certain ship systems were considered proprietary and only discovered what intellectual property was unavailable after ship systems were broken and Navy maintainers could not repair them. At this point, fleet maintainers stated that it is often too late to implement proactive strategies, such as working on an agreement with the manufacturer. Instead, after ships are delivered, fleet maintainers told us that they have several options, all of which are expensive and time- consuming. Fleet maintainers can (1) purchase these data on an expensive sole-source basis from the original equipment manufacturer; (2) spend significant time and effort reverse-engineering the system to be able to repair it; or (3) pay the manufacturer to conduct maintenance. Performance-based logistics. For three shipbuilding programs that planned to use performance-based logistics, the shipbuilding programs assumed it would work as expected and did not identify the risks associated with this maintenance approach or develop any mitigation plans. For example, as stated earlier in figure 10, the DDG 1000 program adopted a performance-based logistics approach during the acquisition process in an attempt to reduce sustainment costs. As such, the program’s LCSP stated that a contractor would be responsible for maintaining the ships in the class, including a number of new and unique systems installed on the ships. However, the LCSP also noted that the DDG 1000 program had not been able to determine how much the performance-based logistics approach was likely to cost or what sustainment outcomes the Navy could expect from this approach, in large part due to the number of new systems installed on the ships. After the shipbuilding program delivered the first ship in the class from the shipyard, DDG 1000 program officials determined that the fleet and other Navy maintenance organizations would instead be responsible for the maintenance that the shipbuilding program previously planned to execute by hiring a contractor. According to fleet officials, since taking over maintenance responsibility, the Navy has also determined that these systems are difficult to sustain, citing lack of commonality, missing technical data, and other challenges. In some cases, the fleet is now replacing DDG 1000’s unique systems after delivery with systems common to other Navy ships in an effort to mitigate sustainment cost growth and readiness effects. Despite these critical changes in the sustainment approach, the DDG 1000 program has not updated its LCSP since 2009. While the Navy has conducted an ILA on nearly every shipbuilding program we reviewed, we found that many of these assessments did not identify key sustainment issues or make recommendations to mitigate them. ILAs are conducted by assessment teams comprised of officials from across the Navy. The Navy ILA teams often validated program office sustainment assumptions contained in the LCSPs and other sustainment planning documents without evaluating those assumptions and identifying key areas of risk—even when programs introduced new sustainment concepts. DOD acquisition policy establishes that ILAs should provide an independent assessment of the shipbuilding program’s sustainment planning, including the identification and evaluation of issues that are likely to drive future O&S costs, design changes that could reduce O&S costs, and the adequacy of the product support strategy, among other things. ILAs are also supposed to make recommendations for mitigating the issues identified in the report, according to DOD and Navy guidance. Statutory requirements similarly emphasize the role of ILAs in identifying and mitigating sustainment risks that could increase O&S costs, and require DOD to establish guidance that requires the Navy to conduct ILAs prior to key acquisition decision points, including milestone decision events. ILAs for the shipbuilding programs included in our review did not sufficiently identify and evaluate the program offices’ sustainment assumptions and risks during the acquisition process. This was the case even when Navy testers had identified sustainment risks in early assessments conducted prior to the development of the LCSPs and ILAs. The following examples discuss instances in which Navy testers or maintainers identified sustainment risk before the ILA was conducted that have since caused sustainment challenges for the fleet, but the ILA team did not identify or make recommendations to address these problems. The SSN 774 shipbuilding program. As early as 2014, supply officials identified delays in over 1,000 supply orders for spare parts—many of these orders were in excess of 5 months old. However, in 2016, the ILA team rated this area as low risk and found that the supply support planning and execution was “outstanding.” Since supply support was rated as “low risk,” the ILA team did not make any recommendations to improve this planning. Subsequently, the SSN 774 class has experienced significant supply support issues. For example, the Navy’s maintainers routinely cannibalize hundreds of parts in 2017 and 2018 from SSN 774 class submarines to prepare other submarines for deployment, at an estimated rework cost of $2-3 million per year. The CVN 78 shipbuilding program. In 2013, testers stated that the number of berthing spaces on CVN 78 class carriers may not be sufficient to accommodate the planned crew size, particularly for the life of the carrier. When conducting its ILA in 2016, the ILA team rated crewing as low risk and the assessment noted extensive analysis had been conducted to validate the platform crewing profile. However, the ILA team did not document validation of the assumptions underpinning this analysis, such as whether or not automated systems needed to reduce crew levels would work as intended. The crewing concerns identified in 2013, but for which the ILA team did not make recommendations, are now a problem for the Navy’s fleet. For example, the Navy has already increased the size of the planned crew to the maximum allowed by the ship’s design. Nonetheless, additional crewing concerns persist for key systems—including the weapons elevators, advanced arresting gears, the machinery control system, among others—that are not yet well understood and may require additional sailor support to operate and maintain. The LCS shipbuilding program. In 2005 and 2006, Navy testers expressed significant concerns about the validity of the assumptions necessary to execute the program’s logistics support plan, specifically that the design of the new logistics system failed to include needed features to enable this logistics approach. In 2012, the Navy ILA team rated this area as low risk, specifically noting that the LCS program had developed a wide-range of well-written, informative, and comprehensive logistics planning documents. However, in part, since the ILA team did not recognize that the underlying issues previously identified by the testers had not been mitigated, the program provided ships to the fleet that had logistics issues. Specifically, the CNO conducted a study in 2016 that found the shipbuilding program’s logistics approach to be unstable and overly complex. As a result, the Navy is undertaking an overhaul of the LCS logistics approach, by taking actions such as creating Navy-led maintenance teams. The DDG 1000 shipbuilding program. The Navy requires significant volumes of technical data to manage the systems on the DDG 1000. In 2005, Navy testers noted that there were many details absent from the technical data management plan, including multiple sections that were left blank. In 2011, the Navy’s ILA team found that technical data management was low risk and stated that the requirements for technical data were well-written and clearly identified. According to fleet engineers and maintainers, as of September 2019—more than 3 years after lead ship delivery—all of the manuals remain in draft and are accurate enough for the sailors to acquaint themselves with systems, but not sufficient for supporting these systems. For example, fleet maintenance officials stated that several key documents for operating and maintaining critical ship systems, which were identified in the ILA as sufficiently complete, are not suitable for crew use. Several Navy officials across NAVSEA and shipbuilding program offices told us that ILAs are largely a document compliance check and vary significantly depending on the competency of the lead assessor. Therefore, in practice, according to Navy officials responsible for conducting these assessments, ILAs are not a thorough assessment of a ship classes’ logistics planning. This falls short of the purpose of ILAs, stated in Navy guidance, which is to provide acquisition programs with an effective measure of the program’s product support planning and execution. Officials from the NAVSEA organization responsible for ILA guidance also told us that they are in the process of improving how the Navy conducts ILAs for ships, such as by developing a new handbook and refocusing ILAs to better assess the quality of the sustainment planning. Specifically, these officials discussed the following five improvements: 1) starting ILAs as early as preliminary design; 2) tying the ILAs more closely to programs’ systems engineering efforts; 3) increasing focus on analytics, modeling, and simulation; 4) giving the Navy’s fleet and maintainers approval authority over the assessment; and 5) making investments to ensure that assessments are always led by officials with appropriate skills and expertise. If the Navy makes changes such as these or others, it would be a positive step toward making ILAs a more thorough and effective assessment of shipbuilding programs’ sustainment planning early in the acquisition process. However, these officials also stated that there is pushback from Navy program offices regarding these improvements because a more robust ILA requires more time and money from shipbuilding programs. Navy officials also noted that implementing the planned improvements is predicated on finding evaluators to conduct ILAs with appropriate skill sets, which has been a challenge. Until the Navy evaluates and implements proposed changes or other changes to improve the ILA process, the Navy will continue to be at risk of not identifying and resolving shipbuilding programs’ sustainment challenges during the acquisition process, before ships are provided to the fleet. We found that the senior leaders responsible for shipbuilding program oversight—the ASN (RD&A) and the CNO—have generally prioritized acquisition outcomes during Gate reviews, without considering how acquisition decisions affect sustainment outcomes. Navy acquisition policy states, however, that programs should be managed from a life- cycle perspective, with attention to both acquisition and sustainment outcomes. In an effort to increase senior leaders’ and shipbuilding programs’ attention on sustainment outcomes and to be responsive to Congressional efforts to improve weapon system sustainment, the Navy recently began pursuing two new initiatives—a Gate 7 for sustainment and the sustainment program baseline. These are promising steps that could help increase leadership insight into shipbuilding programs’ sustainment outcomes once ships are delivered to the fleet. However, we found that some of these efforts will likely not address the underlying need for Navy leadership to improve its consideration of shipbuilding programs’ sustainment goals early in the acquisition process as programs are making the decisions that have a long-term effect on ship sustainment. In addition, Congressional decision makers do not have full insight into sustainment cost growth. Navy leadership has not consistently reviewed shipbuilding programs’ sustainment planning at acquisition Gate reviews. According to senior Navy policy officials, in an effort to increase leadership attention on program sustainment, the Navy recently updated its acquisition policy to add a Gate for sustainment, called Gate 7. However, this recent change will not address the need for leadership to more consistently assess sustainment during earlier Gates. In addition, the Navy established a Deputy Assistant Secretary for Sustainment within the ASN (RD&A)’s office who will be responsible for managing the Navy’s sustainment funding and life-cycle management policies. However, it is too soon to assess the role that this official may have in the acquisition process. The Navy’s acquisition policy states that participants in Gate reviews should review program health and discuss and resolve areas of concern. Additionally, shipbuilding programs should be overseen and executed from a life-cycle perspective—in other words, with attention paid to balancing near-term acquisition outcomes and long-term sustainability. In support of this goal, the policy establishes required sustainment-related briefing content or actions for each Gate. While Gate 7 will function as the dedicated Gate for sustainment, all of the earlier Gates have sustainment- related requirements as well, as shown in Table 5 below. These Gate reviews offer Navy leadership opportunities to conduct oversight of shipbuilding programs’ sustainment planning during early phases of the acquisition process when key program decisions about requirements, design, and contracts are being made. Navy acquisition policy establishes that leadership should be briefed on a number of sustainment factors at Gate reviews, with a program’s life- cycle sustainment strategy/plan and O&S cost drivers being the minimum amount of sustainment information required for nearly all Gate reviews, as presented in table 5. We analyzed briefings and meeting minutes prepared for the 22 Gate reviews held for the shipbuilding program in our review between fiscal year 2014 and 2018. We found that Navy leadership had not assessed shipbuilding programs’ life-cycle sustainment strategies/plans in approximately 86 percent of Gate reviews and had not assessed O&S cost drivers in approximately 64 percent of Gate reviews, as shown in figure 12. According to Navy acquisition policy, this sustainment information should have been evaluated during all 22 of the Gate reviews held between fiscal year 2014 and 2018 for the shipbuilding programs included in our review. Instead, we found that the Gate reviews most often discussed acquisition updates. While a focus on acquisition updates during Gate reviews is appropriate, by infrequently devoting attention to how acquisition decisions affect sustainment, Navy leadership is missing an opportunity to assess the comprehensiveness and validity of shipbuilding programs’ sustainment plans and cost estimates, among other sustainment factors. As we previously discussed, shipbuilding programs’ LCSPs and O&S cost estimates were incomplete or insufficient, and, therefore, did not provide a thorough assessment of the programs’ sustainment risks. Additionally, Navy leadership is not consistently using Gate reviews to communicate to shipbuilding programs that achieving sustainment goals is a high priority. For pre-construction Gate reviews (Gates 1-5), Navy leadership evaluated three of the programs included in our report—SSBN 826, FFG(X), and DDG 51—in the 5-year period between fiscal year 2014 and 2018. These Gate review briefings included some discussion of program sustainment but did not meet all of the objectives and goals described by Navy acquisition policy for sustainment briefing content, as presented in table 5. As such, the Gate reviews did not provide a complete assessment of whether the programs’ acquisition decisions about sustainment would support the delivery of ships that could meet sustainment requirements at an affordable cost. Officials from the majority of programs included in our review told us that these early phases of the program are critical because it is at this point in the program where decisions are made that can have a long-term effect on ship sustainment, and it is difficult to make significant changes to sustainment outcomes after these key decisions are made. For example, when Navy leadership reviewed the SSBN 826 program at a Gate 4 review in November 2015 and a Gate 5 review in September 2016, the briefing discussed the SSBN 826 program’s sustainment costs in detail, including O&S cost goals, cost drivers, and contract incentives for O&S affordability. However, among other things, the Gate 4 briefing did not include a review of the program’s life-cycle sustainment strategy, and the Gate 5 briefing did not verify that all critical technical data and intellectual property issues had been addressed, which fleet and engineering officials stated are known sustainment issues for the Virginia class of submarines. Officials from the SSBN 826 program stated that some sustainment information that was not discussed in the Gate reviews was addressed in other forums. For example, leadership approved the program’s LCSP in August 2016, between the Gate 4 and Gate 5 reviews. In another example, when Navy leadership reviewed Flight III of the DDG 51 program at a combined Gates 4 and 5 review in March 2014, none of the required sustainment topics were included in the briefing. By not thoroughly assessing and resolving the sustainment effect of early acquisition decisions during its Gate reviews, Navy leadership is missing opportunities to ensure that shipbuilding programs are adequately considering sustainment goals and is at risk of allowing programs to proceed through the acquisition process without verifying that there is adequate planning for sustainment. For Gate 6 reviews held between fiscal year 2014 and 2018, we similarly found that Navy leadership did not consistently discuss sustainment, even as programs began ship construction and delivering ships to the fleet. Our analysis of Gate 6 documentation showed that the primary focus of most Gate 6 briefings and meeting minutes was acquisition outcomes, such as construction progress or follow-on ship contract awards. In particular, we found that 16 of the 18 Gate 6 reviews we assessed for eight shipbuilding programs did not include information about both the program’s life-cycle sustainment plan and O&S cost drivers, which are part of the required briefing content for every Gate 6 review. Officials from most of the programs in our review confirmed that leadership placed greater emphasis on acquisition updates than sustainment during Gate 6 reviews. For example, the SSN 774 program is pursuing a reduction in total ownership costs initiative for its Block IV submarines, but the program’s recent Gate 6 briefings included only limited details on design changes that the program was pursuing to improve sustainment and no information on the anticipated O&S cost savings from the effort. Officials from this program confirmed that leadership has historically focused only on acquisition issues during the Gate 6 reviews. Additionally, we found that Navy leadership issued sustainment-related action items to only three of the eight programs in the Gate 6 reviews we assessed, even though all of these programs had ongoing sustainment challenges, as discussed earlier in this report. Although nearly 90 percent of the Gate 6 reviews we assessed did not include briefing content on the program’s life-cycle sustainment plan and O&S costs, as required, nearly all of the Gate 6 reviews included a discussion of at least one ongoing sustainment challenge affecting the ship class. In these cases, the discussion centered on mitigating realized sustainment issues already being experienced by the fleet after ship delivery. For example, all of the LPD 17 Gate 6 reviews over the past 5 years included updates on the activities of the LPD 17 Strike Team and its progress in resolving class-wide design and construction issues that negatively affected the ships’ operational availability and reliability after they began fleet operations. While Gate 6 can be used as a venue to discuss sustainment issues that are already being experienced by the fleet, until Navy leadership more consistently reviews programs’ sustainment planning and expected outcomes during earlier Gates, programs will continue to be at risk of delivering ships to the fleet that have unmitigated sustainment risks or are unaffordable. The Navy recently updated its acquisition policy to expand the scope of its Gate process and add a new Gate 7 for sustainment. Effective March 2019, the Gate 7 reviews will begin 5 years after shipbuilding programs achieve initial operational capability and recur every 5 years thereafter. As such, Navy officials told us that the scope of the Gate 7 review will be oversight of programs that are well into production and delivering ships to the fleet. According to the Navy’s acquisition policy, Gate 7 will evaluate the effectiveness of a program’s product support strategy, compare actual sustainment costs to estimates, discuss fleet-identified sustainment issues, and assess sustainment risks and mitigation measures, among other things. Senior officials told us that the Navy developed a Gate 7 for sustainment for two reasons. First, similar to our findings, officials stated that the Navy recognized sustainment was generally not being discussed during existing Gate reviews, particularly during Gate 6 reviews as ships were starting to be delivered to the fleet, even though this was required briefing content for Gate 6 in the Navy’s acquisition policy. Second, in the National Defense Authorization Act for Fiscal Year 2017, Congress directed the military services to conduct sustainment reviews on major weapons systems—such as the shipbuilding programs included in our review—within 5 years of the weapon system achieving initial operational capability and then periodically throughout their life cycles. Such sustainment reviews are to assess the weapon system’s product support strategy, performance, and O&S costs. Based on our analysis of the Navy’s revised acquisition policy, the new Gate 7 appears responsive to the Congressional requirement for sustainment reviews and, if implemented as planned, will provide an oversight forum for addressing realized sustainment challenges. However, we found that adding a new Gate to the end of the acquisition process is too late to drive meaningful improvements to sustainment outcomes and is not sufficient to address current shortfalls in how the Navy’s acquisition process addresses sustainment concerns. Senior Navy officials we spoke to who had knowledge of this change expressed doubt that a Gate 7 for sustainment would be an effective means of holding programs accountable for addressing acquisition-related sustainment issues, since it occurs late in the acquisition process. Whereas the Gate 7 for sustainment will occur at the end of the acquisition process, the decisions that influence sustainment outcomes, such as decisions about ship design and the planned sustainment strategy, are made much earlier in the process, normally between Gates 1 and 5. Thus, while Gate 7 will provide leadership with insight into the execution of ship sustainment and any challenges being experienced by the fleet, it does not address the need for Navy leadership to evaluate shipbuilding programs’ efforts to design and plan for sustainable ships during earlier Gates, when key long-term decisions are being made. According to a senior Naval Sea Systems Command official, Gate 7 is timed well for being able to “sit back and admire the problem” as opposed to preventing the issue. Until Navy leadership brings attention to sustainment during earlier Gate reviews, it will continue to miss opportunities to proactively ensure shipbuilding programs are acquiring sustainable ships before they are provided to the fleet. We found that acquisition program baselines (APB)—which are intended to be binding agreements between leadership and the program manager and document the program’s goals—currently include limited information about sustainment. While the Navy is developing a new initiative to create a dedicated baseline for sustainment, it does not have a mechanism for holding shipbuilding programs accountable for sustainment goals during the acquisition process. Like all major weapon systems, shipbuilding programs have APBs that summarize the programs’ cost, schedule, and performance goals and set the baseline from which programs must, as appropriate, obtain approval from agency leadership to deviate and must report certain changes to Congressional defense committees. Statute requires that baselines will contain information on the program’s cost estimate, schedule, performance, and supportability, among other factors. In practice, for shipbuilding programs in our review, we found that the program goals established in the APB are largely focused on acquisition cost, acquisition schedule, and performance requirements, with limited information provided on sustainment. In particular, the sustainment information provided is generally limited to a high-level O&S cost estimate and the sustainment key performance parameters, if the program has them. A Congressionally established panel, called the Section 809 panel, charged with making recommendations to improve the efficiency and effectiveness of DOD’s acquisition process, among other things, recently studied challenges with the sustainment of major weapon systems. It similarly found that the APB does not provide sufficient governance of the sustainment phase of an acquisition program since it is focused on acquisition cost, schedule, and performance goals. The panel further noted that program success has been measured against the achievement of the APB’s acquisition goals, so program managers have generally prioritized the achievement of acquisition outcomes and deemphasized sustainment. As a result, the panel recommended the creation of an additional program baseline, called the sustainment program baseline (SPB), to help ensure programs are held accountable for sustainment- related outcomes and establish balance between acquisition and sustainment priorities. In March 2019, the Navy initiated an effort to begin developing an SPB framework. Senior officials stated that the Navy intends to pilot the SPB with a few aviation programs in fiscal year 2020 before expanding the initiative to ship classes that are already in sustainment, and then finally to programs that are still in the acquisition process. According to Navy officials involved with this initiative, the SPB is intended to complement the APB, and Navy leadership will use the two program baselines to review and approve the acquisition and sustainment aspects of a program throughout the acquisition process. The shipbuilding program should draft the initial SPB early in the acquisition process to support Milestone A and update it as the program matures. Officials in the office of the ASN (RD&A) told us that the Navy plans for the SPB to be grounded in a program’s sustainment key performance parameters for operational and materiel availability and include targets for various other sustainment metrics, such as sparing, equipment failure rates, mission capable time, and logistics time, among others. The SPB should also provide detailed information about all of the costs and funding sources that will support sustainment. Navy officials identified a number of potential improvements the SPB could offer for how shipbuilding programs consider sustainment, such as devoting additional time and resources to the development of sustainment metrics early in a shipbuilding program, assessing the sustainment effect of acquisition decisions, creating a common understanding of a program’s sustainment goals across disparate stakeholders, and providing a more accurate accounting of sustainment funding. If the Navy implements the SPB as described, it will likely be a positive step toward ensuring shipbuilding programs are increasing their focus on sustainment planning during the acquisition process. While the SPB could potentially provide increased attention on program sustainment, we found that developing this new baseline may not fully address the underlying challenge of shipbuilding programs managing to the APB’s acquisition goals and the lack of consideration of sustainment in acquisition decision-making. This is because, according to current proposals, programs will continue to be measured against the APB during the acquisition process, with the SPB not serving as the governing baseline until later in the program life cycle during the sustainment phase. Instead, during the acquisition process, the Navy’s efforts related to the SPB will be limited to initially developing the SPB and updating it as the program matures. While updates to the SPB during the acquisition process could provide more transparency into the sustainment effect of various acquisition decisions within the program and to leadership, this approach primarily documents the sustainment effect of a decision. Because the APB will remain the governing baseline during the acquisition process and the program will not be measured against the SPB until the sustainment phase, shipbuilding programs will continue to have an incentive to prioritize acquisition outcomes over sustainment when making acquisition decisions. DOD does not provide Congress with detailed information on the extent and causes of shipbuilding programs’ O&S cost growth during the acquisition process. For example, a mechanism for Congressional oversight of major defense acquisition programs’ unit cost growth, called the Nunn-McCurdy statute, is focused on acquisition costs and not sustainment cost estimates. A Nunn-McCurdy breach is triggered by increases in a program’s unit cost estimates against the acquisition unit cost goals established in the program’s APB. The Nunn-McCurdy statute provides Congress greater visibility into major defense acquisition programs’ estimated acquisition cost growth and encourages DOD to manage costs by requiring programs in a breach to include acquisition cost estimates in Selected Acquisition Reports and notify Congress of a breach. While the APB also includes O&S cost estimates, the Nunn- McCurdy statute does not require reporting of O&S cost growth to Congress. The Nunn-McCurdy statute also requires DOD to take a series of actions whenever a program experiences critical acquisition cost growth, which is growth in the program acquisition unit cost estimate of at least 25 percent over the current baseline estimate documented in the APB or of at least 50 percent over the initial baseline estimate. Among other things, these actions include (1) conducting a root cause analysis of the cost growth, (2) reassessing program costs, and (3) terminating the program or taking other steps that include restructuring the program. If DOD decides not to terminate a program that has critical cost growth, the Secretary of Defense must restructure the program in a manner that addresses the root cause of the cost growth, rescind the program’s most recent Milestone decision, and review the program regularly, among other tasks. As stated earlier, we found that leadership oversight during Gate reviews and program execution is primarily focused on acquisition outcomes. Additionally, as the Section 809 panel noted, the Nunn-McCurdy breach provided a strong incentive for major defense acquisition programs to control acquisition cost, but that there was not an equivalent incentive for controlling sustainment costs. As such, the shipbuilding programs’ acquisition decisions and Congress’ oversight mechanisms have focused on acquisition cost outcomes, without a comparable focus on sustainment cost outcomes during the acquisition process. For example, when the DDG 1000 program experienced a critical acquisition cost growth breach, the Nunn-McCurdy statute required DOD to reassess and certify to Congress the need for the program at the increased cost levels. DOD was also required to identify and address the cause of the acquisition cost growth when reassessing the program and conduct additional program oversight, among other things. According to DDG 1000 program officials, DOD and the Navy recognized that the acquisition decisions leading up to and following the breach would have a sustainment effect. For example, the decision to reduce the number of ships in the class to manage acquisition cost growth has contributed to higher per ship O&S costs, as the investment needed to sustain this new class is now spread across fewer ships than initially planned. However, the focus of their restructuring efforts was on addressing the acquisition cost growth. By contrast, there was not a similar effort to manage growth in the program’s O&S cost estimates, which have increased by more than 50 percent on a per ship per year basis. For the six shipbuilding programs with O&S cost estimates we were able to assess, we found that four experienced cost growth greater than 50 percent for their average annual O&S per hull cost, as compared to the programs’ original estimates. Table 6 shows the extent of these shipbuilding programs’ O&S cost estimate growth over time. This level of cost growth for acquisition costs would have constituted a Nunn-McCurdy breach. While the Selected Acquisition Reports for these programs include some information on shipbuilding programs’ O&S costs, this reporting does not provide Congress with detailed information about the causes of the cost growth and potential program changes to address it and, therefore, does not facilitate the same level of oversight as is given to acquisition unit cost growth. In particular, DOD was not required to notify Congress that the programs had experienced high levels of O&S cost growth above a certain threshold, and DOD was not required to identify the root cause of the O&S cost growth and restructure the programs to address the cost growth. As a case in point, for the programs we reviewed, Navy leadership only directed one of the programs—LPD 17—to identify opportunities to reduce O&S costs following a Gate 6 review. For other programs that had extensive O&S cost growth, the programs were not required to take additional steps during the shipbuilding process to manage these costs and mitigate the long-term sustainment effect of their acquisition decisions. The LCS program, for example, has seen the highest rate of per ship O&S cost growth among the shipbuilding programs included in our O&S cost analysis, but Congress and agency leadership have not required the shipbuilding program to take action to address these issues. Instead, the shipbuilding program continues to deliver ships to the fleet that are significantly more expensive to maintain than initially planned and which have significant maintenance and logistics challenges, according to sustainment officials. The fleet is now undertaking its own efforts to improve sustainment outcomes for LCS, such as changing its crewing and maintenance approaches, which are further adding to the O&S cost growth for the program. According to DOD and Navy acquisition policy, program managers should be the single point of accountability for the full life cycle of ship programs. However, without a mechanism to provide Congress with more detailed information about shipbuilding programs’ O&S cost growth and the drivers of such cost growth, Congress cannot know if shipbuilding programs are accounting for the full life-cycle implications of their acquisition decisions. In particular, without such a mechanism, Congress will continue to lack full insight into the extent to which shipbuilding programs’ O&S cost estimates have grown over time and what steps DOD and the Navy could take to better control O&S cost growth during the acquisition process. Congress directed DOD to establish PSMs as key sustainment managers for weapons systems, such as shipbuilding programs. However, we found that PSMs in the shipbuilding program offices have limited influence on decisions made during the acquisition process that affect ship sustainment. In 2009, Congress passed legislation that required DOD to appoint PSMs to support each major weapon system. According to DOD guidance, PSMs are senior sustainment officials in program offices who are tasked with ensuring that DOD weapon systems, including Navy ships, are reliable and can be maintained effectively at an affordable cost. The guidance states that PSMs should be involved in the acquisition decision-making process to ensure the weapon system—in this case a ship—can be supported throughout its life cycle. All but one of the shipbuilding programs included in our review have a dedicated PSM. However, we found that these sustainment experts have generally had limited involvement in key acquisition decisions, such as developing sustainment requirements and estimating O&S costs, because: (1) Navy acquisition policy does not ensure that PSMs are involved early in the acquisition process when key decisions that affect sustainment are made, and (2) their responsibilities to support sustainment outcomes during the acquisition process are often at odds with the program office’s overarching focus on acquisition cost and schedule outcomes. Navy acquisition policy does not ensure that PSMs are appointed early enough to inform key acquisition documentation and initiate sustainment planning early in the acquisition process. Until recently, Navy acquisition policy did not specify when PSMs should be involved in the acquisition process. However, a March 2019 update to the Navy’s acquisition policy established that Navy leadership should assign PSMs by initiation (normally Milestone B). We found that this timing is too late in the acquisition process, as critical acquisition decisions that have significant repercussions for sustainment are made before Milestone B, such as developing the program’s requirements and initial sustainment strategy. For example, according to DOD’s PSM guidance, PSMs need to be involved prior to initiation of the program. Among other things, the PSM should provide a sustainment perspective into key decisions such as developing the acquisition strategy and setting requirements. This guidance also states that the PSM is responsible for authoring or providing input on key program documents, such as the LCSP, which are required by Milestone A. The Navy policy, therefore, does not facilitate the early contributions of PSMs to key documents as described by DOD guidance, and it does not help ensure PSMs are appointed to shipbuilding program offices early enough to influence key decisions about the program’s sustainment. For its two most recent shipbuilding programs, which began after the enactment of the PSM legislation in 2009, Navy acquisition policy has not ensured that PSMs are involved early enough in the acquisition process to influence decisions that affect sustainment. As a result, the programs have appointed PSMs at different points in the acquisition process and their ability to influence key decisions has varied, with the PSM appointed earlier able to affect more decisions related to sustainment. For example, the SSBN 826 program’s PSM was appointed before the program reached Milestone A. This is in line with DOD guidance but before Navy acquisition policy requires the PSM to be appointed. As a result, the SSBN 826 PSM stated that he was involved in the setting of the program’s sustainment requirements and has subsequently used those requirements to ensure sustainment is being considered in the acquisition process, including during the development of the submarine’s design. By contrast, the FFG(X) program, which began in 2017, does not yet have a dedicated PSM as the program approaches the Milestone B review. While this is permitted by the Navy’s acquisition policy, the program has now made critical sustainment decisions, such as developing the sustainment strategy, the maintenance and training schedule, and the sustainment key performance parameters, without a PSM. For the nine shipbuilding programs in our review that started prior to 2009, key acquisition decisions were made without the input of a senior sustainment official who has the responsibility and authority of a PSM. Nearly all of the PSMs for these nine programs stated they that they were not involved in or did not have insight into key acquisition decisions that took place early in the acquisition process, such as ship design. Instead, PSMs told us that their job has been to implement decisions that were already made. For example, one PSM said that “the die has been cast” once major decisions about automation, crew size, and service life are made, and after that all the PSM can do is “try to undo the sustainment harm that has been caused.” Given these results, officials from nearly all of the shipbuilding programs we spoke with stated that shipbuilding programs should assign PSMs at the very beginning of the program when key decisions are being made about how and what to acquire. In particular, program officials stated that the PSM should be appointed at the start of the program to ensure early decisions consider sustainment. Such decisions include establishing the sustainment requirements, developing the acquisition strategy, and designing the ship. We previously found that Navy PSMs considered early appointment of the PSM critical to ensuring they can influence their programs’ sustainment considerations. If shipbuilding programs do not appoint PSMs early in the acquisition process, the programs will continue to make critical decisions that affect sustainment without the input of the programs’ senior sustainment official. Without revising its acquisition policy to establish that PSMs should be appointed to shipbuilding programs at the beginning of the acquisition process, the Navy cannot ensure PSMs are involved early enough to influence key decisions that affect sustainment, such as requirements setting and the drafting of the LCSP. Since PSMs focus on sustainment and the shipbuilding programs focus on managing acquisition outcomes, the PSMs’ roles and responsibilities are at times at odds with the goals and priorities of the program office in which they work. A Navy working group recently found that the effectiveness of PSMs is limited because the PSM’s goals do not always align with the shipbuilding program’s acquisition cost and schedule goals. The Navy issued a strategic plan for fiscal years 2018 to 2023 that was focused on strengthening the life-cycle logistics workforce that supports acquisition programs, including PSMs. The strategic plan established a working group on product support authority, which found that program manager and PSM roles and responsibilities are often in conflict and misaligned, reducing the authority and effectiveness of PSMs. As a result, the working group is assessing possible changes to improve the effectiveness of PSMs, such as revising Navy policy to better reflect the PSMs’ statutory authority or increasing PSMs’ independence by creating an additional reporting chain of command outside of their acquisition program. We similarly found that the ability of PSMs to influence key acquisition decisions may be limited because their focus on improving sustainment outcomes can be at odds with the shipbuilding programs’ emphasis on achieving acquisition goals, such as acquisition cost and schedule. As discussed above, Navy leadership has generally only focused on shipbuilding programs’ acquisition outcomes during the Gate process, without considering how acquisition decisions affect sustainment. In turn, program officials from all of the shipbuilding programs we reviewed reported that Navy leadership had directed them to prioritize the achievement of acquisition outcomes, such as acquisition cost goals, during the execution of their programs, and none had been directed to devote additional attention to sustainment. Additionally, officials in many of the shipbuilding programs we reviewed told us that a key ASN (RD&A) memorandum on managing acquisition costs framed their decision- making, including decisions about program changes to improve sustainment. This focus on managing acquisition costs can run counter to PSMs’ efforts to improve sustainment outcomes, such as increasing system reliability or providing adequate technical documentation, as these efforts frequently require investment of additional shipbuilding funds. Rather than investing acquisition funds to improve sustainment outcomes, we found that shipbuilding programs instead have an incentive to delay sustainment improvements until after ships are delivered to the fleet and funding sources other than those managed by the shipbuilding program can be used for these purposes. According to officials from 16 different acquisition, engineering, and sustainment offices, because shipbuilding programs are only responsible for ships until they are provided to the fleet, the Navy’s shipbuilding programs have an incentive to delay sustainment improvements until after ships are delivered to the fleet, when other parts of the Navy take over responsibility for funding them. As one fleet official explained, shipbuilding programs are not incentivized to address sustainment issues because the shipbuilding programs are held responsible only for the achievement of acquisition cost goals and not for sustainment cost goals. Some Navy officials characterized this dynamic as throwing sustainment concerns “over the fence” once ships are provided to the fleet. Further, we found that Navy leadership made decisions, in some cases, even though PSMs expressed concerns about the feasibility of implementing the decision from a sustainment perspective. Figure 13 provides an example of when LCS sustainment officials in the shipbuilding program expressed concern about the feasibility of the LCS crew size. While it is important for shipbuilding programs to manage acquisition cost and schedule, focusing only on these acquisition outcomes reduces the effectiveness of the PSM and increases the risk that ships will have long- term sustainment challenges. The quantity and breadth of issues identified in this report—resulting in billions of dollars in unexpected costs, maintenance delays, and unreliable ships—suggest that existing policies and guidance have not ensured that new ships are reliable and can be sustained as planned. Recently, due to some of these problems, DOD and the Navy have recognized the importance of considering the requirements and costs of sustainment during the acquisition process, and Congress has passed legislation related to sustainment planning. This report, along with other DOD initiatives discussed in this review, demonstrate that the Navy needs to take many steps to infuse its acquisition decision-making with a greater focus on sustainment outcomes. Systemic changes are needed to improve shipbuilding programs’ sustainment outcomes, including: setting clear sustainment requirements that are useful for acquisition decision-making and reporting the results to Congress, improving O&S cost estimates, sustainment planning, and logistics assessments, and involving the PSM early in the acquisition process. However, these changes will only be successful if Navy leadership commits more time, attention, and resources to ensuring that sustainment is thoroughly considered throughout the acquisition process. Until the Navy resolves these issues, its shipbuilding programs will continue to pass costly sustainment risk to the fleet that results in ships and submarines that experience major sustainment problems. Congress should consider developing an oversight mechanism for evaluating shipbuilding programs’ sustainment cost estimate growth during the acquisition process, with requirements for the Navy to: (1) report sustainment cost estimate growth information to Congress and (2) reassess shipbuilding programs that are experiencing a high level of sustainment cost estimate growth. We are making the following 11 recommendations to DOD: The Secretary of Defense should change its definition for setting operational availability for ships in its Joint Capabilities Integration and Development System policy by adding information that defines the operational availability requirement by mission area in addition to the ship level and includes all equipment failures that affect the ability of a ship to perform primary missions. (Recommendation 1) The Secretary of Defense should change its definition for setting materiel availability for ships in its Joint Capabilities Integration and Development System requirements policy to include all factors that could result in a ship being unavailable for operations, such as unplanned maintenance, unplanned losses, and training. (Recommendation 2) The Secretary of the Navy should direct the ASN (RD&A) and the CNO, once DOD requirements setting policy is revised, to update existing operational availability requirements for ongoing shipbuilding programs. When revising these requirements, the Navy should set operational availability requirements that: (1) are based on failures that affect the ability of a ship to perform primary missions and (2) are set at the mission level instead of ship level. (Recommendation 3) The Secretary of the Navy should direct the ASN (RD&A) and the CNO, once DOD requirements setting policy is revised, to update the materiel availability requirements for ongoing shipbuilding programs. When developing or revising these requirements, the Navy should set materiel availability requirements that fully capture all factors that could preclude a ship from being ready when needed. (Recommendation 4) The Secretary of the Navy should direct the ASN (RD&A) and the CNO, once the Navy revises its sustainment requirements, to ensure that shipbuilding programs report operational availability and materiel availability requirements in Selected Acquisition Reports, and alternatives to the Selected Acquisition Reports, for Congress. (Recommendation 5) The Secretary of the Navy should direct the Commander of Naval Sea Systems Command to ensure that cost estimators follow current guidance and GAO-identified best practices and conduct sensitivity analyses and other analyses to improve their assessment of cost risk in the O&S costs in shipbuilding programs’ life-cycle cost estimates. (Recommendation 6) The Secretary of the Navy should direct the ASN (RD&A) to ensure all shipbuilding programs develop and update LCSPs, in accordance with DOD policy, that demonstrate how a ship class can be affordably operated and maintained while meeting sustainment requirements, including associated business case analyses and identifying sustainment risk. (Recommendation 7) The Secretary of the Navy should direct the Commander of Naval Sea Systems Command to evaluate and implement changes to the ILA in order to position the ILA to effectively identify key sustainment risks and make recommendations for risk mitigation, which may include existing Navy proposals to change the ILA process. (Recommendation 8) The Secretary of the Navy should direct the ASN (RD&A) and the CNO to ensure sustainment-related briefing topics prescribed by the Navy’s acquisition policy are consistently discussed at Gate reviews. (Recommendation 9) The Secretary of the Navy should direct the ASN (RD&A) and the CNO to implement the sustainment program baseline initiative for shipbuilding programs and, in so doing, develop a mechanism that ensures that sustainment outcomes are a factor in shipbuilding programs’ decision- making during the acquisition process. (Recommendation 10) The Secretary of the Navy should revise SECNAVINST 5000.2 and other associated guidance to ensure PSMs are assigned to shipbuilding program offices in time to inform early acquisition decisions, including development of the program’s sustainment requirements and LCSPs. (Recommendation 11) We provided a draft of our report to DOD for comment. DOD’s written comments are reprinted in appendix III of this report. DOD concurred with 8 recommendations and partially concurred with 3 recommendations. However, for at least 5 of the recommendations in which DOD partially concurred and concurred, DOD did not describe the specific actions it is planning to take to address our recommendations. These are discussed below. In response to our first and second recommendations on operational and materiel availability requirements, DOD stated that the Navy and Joint Staff would revisit requirements definitions for shipbuilding programs to better ensure that they are traceable to a ship’s mission and can be used across ship development and fielding. DOD also agreed that it will align the sustainment definitions with how the Navy defines critical failures for ship programs. While these are important steps, they do not fully address our recommendations. Specifically, DOD officials told us that the department plans to continue defining operational availability with a single metric for an entire ship or ship class. While this approach is appropriate for materiel availability, as we state in the report, it is misaligned with Navy guidance for operational availability, which states that such an approach is not mathematically feasible for ships. Until DOD ensures that its sustainment requirements for ships are well-defined and usable during acquisition and sustainment, shipbuilding programs will continue to implement requirements that do not result in reliable and available ships. In response to our third and fourth recommendations, DOD agreed to incorporate changes to its requirements-setting policy into new shipbuilding programs. However, DOD and the Navy may miss key opportunities to improve the Navy’s sustainment requirements for existing programs, including at least four ship classes that have plans for a new flight, block, and/or major modification. This approach also excludes existing programs that have established requirements but have yet to start design or construction. Changing these requirements, in line with our recommendation, would help ensure that more rigorous sustainment requirements inform Navy ship designs. For example, as we discuss in the report, the current FFG(X) operational availability requirement would allow the ships to be out of service for extraordinary lengths of time. Until the FFG(X) requirement and those for other existing ships (such as DDG 51 Flight III) are remedied, the sustainment requirements will continue to be poorly defined and unable to influence design decisions in a manner that results in more reliable ships. In response to our fifth recommendation, DOD concurred with the recommendation because it stated that it already reports the status of both sustainment requirements in its Selected Acquisition Reports. However, as we state in our report, implementing this recommendation is dependent on the Navy changing the definition of its sustainment requirements to improve the accuracy of its reporting to Congress. Since DOD only agreed to modify material availability requirements for existing ship programs as it deemed appropriate, its Selected Acquisition Reports could continue to be misleading for many of its ship programs because they may not reflect all of the failures and factors that reduce operational and materiel availability once ships are in the fleet. In addition to DOD’s response, the Navy’s ASN (RD&A) also submitted a letter stating that he generally agreed with the recommendations and indicated that his office has already started making some changes over the last 10 years to improve consideration of sustainment while acquiring ships. The Navy also sought to add context to some of our report findings. We respond to the ASN RD&A’s letter in appendix III. DOD and the Navy also provided technical comments that we incorporated as appropriate. We are sending copies of this report to the Secretary of Defense, Secretary of the Navy, interested congressional committees, and other interested parties. This report will also be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or by e-mail at oakleys@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. This review assesses the extent to which: (1) the Navy’s shipbuilding programs deliver ships to the fleet that can be sustained as planned; (2) the Navy develops and uses effective key sustainment requirements during the acquisition process; (3) shipbuilding programs effectively identify and evaluate sustainment costs and risks in key acquisition planning documents; (4) Navy and Congressional leadership have insight into and effectively consider programs’ sustainment planning and outcomes; and (5) the shipbuilding programs leverage Product Support Managers (PSMs) during the acquisition process. The scope of our review included all shipbuilding programs for warships that had ships under construction or in development in the last 10 years, from fiscal years 2009 through 2019. We defined a shipbuilding program as under construction if any ship in the class was under construction in the last 10 years. We defined a shipbuilding program as in development if the Navy had awarded a development or design contract for the class in the last 10 years. We excluded military sealift command vessels and other Navy vessels with logistics missions from this review to help ensure that our resources matched the scope of our review. We assessed LHD 8 and CVN 77 as their own classes for the purposes of our review because the Navy considers them to be transitional designs between antecedent classes. These parameters resulted in 11 ship classes for inclusion in our review. We also selected several ships within these classes to serve as case studies for additional analysis. To select these ship-specific case studies, we reviewed all warships delivered from fiscal years 2007-2018 and selected up to four of the most recent hulls within this time frame from each class as case studies. We selected these ships for additional analysis because they are still relatively new, but the fleet has had experience maintaining them and could discuss sustainment challenges for those ships, if any. All ship classes and case study hulls in scope are listed in table 7. Over the course of this audit, we interviewed officials from over 100 Navy organizations involved in designing, building, inspecting, testing, sustaining, and operating Navy ships to gain an understanding of the extent to which they are involved in the acquisition process and how they consider and manage sustainment risk during the acquisition process. These interviews also provided information on the nature and magnitude of sustainment issues being experienced by the fleet on recently delivered ships. These included approximately 30 interviews with organizations reporting to the ASN (RD&A), 31 interviews with organizations reporting to the Chief of Naval Operations, 29 interviews with organizations within Naval Sea Systems Command (NAVSEA), interviews with shipbuilders that have been awarded multiple Navy shipbuilding contracts, and three interviews with other Department of Defense (DOD) entities. We conducted these interviews in several locations throughout the United States, including Washington, D.C.; San Diego, CA; Norfolk, VA; Philadelphia, PA; and Mechanicsburg, PA. During visits to naval bases, we toured DDG 111, DDG 1000, LHD 8, LPD 22, LCS 3, LCS 4, CVN 77, and CVN 78. To identify the extent to which ships can be sustained as planned, we interviewed shipbuilding program officials, in-service program officials, engineers, and fleet organizations, as well as analyzed ship and system performance data from many Navy organizations. Through this assessment, we identified and analyzed 150 significant class-wide issues across the shipbuilding programs in our scope that required more sustainment resources than planned. Such issues include systems or parts that exhibited poor design, construction, reliability, or planning; systems that were obsolete before or soon after ship delivery; and systems that could not be maintained by the fleet due to vendor or manufacturer proprietary information. We counted only issues that were class-wide, meaning they were related to ship design, equipment used across the class, or construction procedures, rather than hull-specific issues that could be caused by a unique accident or sailor error. We also did not assess issues related to fleet preference. For example, one ship’s crew told us they did not prefer the location in which consoles for operating a certain system were installed, as they are typically installed in a different location on other ship classes. However, because the consoles were installed in the location specified in the design, we eliminated this issue from our analysis. We also eliminated issues if maintenance and other work on the affected system were accounted for during the acquisition process in the program’s initial Operating and Support (O&S) cost estimate, rather than being an unexpected expense. For example, program offices can address expected obsolescence by budgeting for future system modernizations or purchasing quantities of spare parts that will last for the ship’s entire life cycle. To identify the costs associated with fixing problems that are the result of not being able to sustain ships as planned, we reviewed documentation from Navy organizations, budget justifications, and estimates provided by Navy officials. We were able to collect cost information for 30 percent of the problems reported to us by the fleet. To assess the extent to which maintenance schedules are executed as planned, we analyzed Navy data on regularly scheduled, depot-level maintenance periods for surface ships—including those maintained at overseas homeports and in the United States. NAVSEA collects and manages data on these maintenance periods—known as Chief of Naval Operations maintenance availabilities—for surface ships, submarines, and aircraft carriers. We obtained the data on surface ship depot-level maintenance periods used by NAVSEA’s Surface Maintenance Engineering Planning Program and the Commander, Navy Regional Maintenance Center. We reviewed the data we obtained for inconsistency errors and, when possible, obtained multiple documents that discussed the same problem for validation. We then discussed these problems with multiple officials across the Navy, including officials involved in ship maintenance and operation. From these efforts, we determined that these data are sufficiently reliable for the purposes of this report. To assess the extent to which shipbuilding programs develop and use effective sustainment requirements during the acquisition process, we reviewed DOD requirements setting policy and determined the extent to which shipbuilding programs set requirements in accordance with this policy. In doing so, we assessed the extent to which DOD policy aligned with fleet experience and captured all factors that influence ship availability and analyzed any discrepancies. We then assessed the extent to which the Navy set sustainment requirements that contributed to well- informed decision-making throughout the acquisition process and in accordance with DOD policy and Navy guidance. To assess how accurately the Navy measures operational availability and materiel availability outcomes, we reviewed the Navy’s operational availability measurements as reported in Selected Acquisition Reports to Congress, and compared these values to fleet reliability data and casualty reports, as well as information about the ships’ performance obtained in interviews with Chief of Naval Operations and NAVSEA officials. To assess the extent to which shipbuilding programs effectively identify and evaluate sustainment costs and risks in key acquisition planning documents, we evaluated the Navy’s development and use of life-cycle cost estimates, Life-Cycle Sustainment Plans and Independent Logistics Assessments. To evaluate the Navy’s development of O&S cost estimates, we reviewed the life-cycle cost estimates created when programs were in development and compared them to updated estimates of O&S costs reported in Selected Acquisitions Reports and Navy provided data. We adjusted program estimates for quantity to more accurately capture cost growth between initial and current O&S estimates. Further, we adjusted the estimates for inflation to compare the O&S estimates as accurately as possible. For programs that experienced O&S cost growth, we interviewed program officials and Navy cost estimators to determine the process that the Navy’s cost estimators used to build O&S cost estimates for shipbuilding programs and to discuss the reasons for cost growth. We also reviewed DOD cost estimation guidance to determine whether the cost estimators and programs complied with its requirements. While we have previously found issues with the reliability of the Navy’s cost estimates, we believe that the cost estimates we reviewed are sufficiently reliable for the purposes of this report. To evaluate the Navy’s use of key sustainment planning documents, we reviewed LCSPs and ILAs for programs in our scope. We interviewed program, NAVSEA, fleet, and maintenance officials to determine the extent to which the LCSPs and ILAs for those programs were used to plan for sustainment, including whether these documents identified and mitigated sustainment risks. We compared the results of the ILAs to realized ship sustainment problems that we identified through interviews shipbuilding program officials, in-service program officials, engineers, and fleet organizations, as well as to analyses of ship and system performance data from many Navy organizations. To evaluate the extent to which Navy and Congressional leadership has insight into and considers sustainment planning and outcomes, we examined the Navy’s Gate review process and Congress’ Nunn-McCurdy breach process. To assess the Navy’s use of the Gate review process, we reviewed Navy acquisition policy governing the reviews, as well as the briefings and meeting minutes from reviews for programs in our scope from fiscal years 2014 through 2018. We compared the content of the briefings and meeting minutes to the acquisition policy to determine the extent to which required sustainment topics were briefed and discussed at each review and identified other mentions of sustainment issues that were outside the scope of the policy requirements. We also reviewed a recent revision to Navy acquisition policy that creates a Gate 7 review for sustainment and interviewed senior Navy officials to obtain their perspectives on how Gate 7 will affect ship sustainment. To assess Navy leadership’s effectiveness in holding shipbuilding programs’ accountable for achieving sustainment outcomes using Acquisition Program Baselines (APB), we reviewed statute that established the APB as well as the findings of the Section 809 Panel, which recommended the creation of the SPB to supplement the APB. We also interviewed Navy officials involved in developing the SPB framework in accordance with the Panel’s recommendations to obtain information on their work. To determine what information Navy shipbuilding programs are required to provide to Congress about sustainment cost issues during the acquisition process, we reviewed the statutory requirements found in Nunn-McCurdy, a key Congressional oversight tool requiring information about baselines and cost estimate growth. We also assessed how the Nunn-McCurdy breach influenced programs’ management of acquisition and sustainment costs by interviewing Navy officials in the shipbuilding program offices, Office of the Chief of Naval Operations, and ASN (RD&A) offices, among others. Additionally, we reviewed O&S cost growth for programs in our scope and compared the percent increase to the 50 percent cost growth threshold used for Nunn-McCurdy acquisition cost breaches to determine if the sustainment cost growth was of a magnitude the Congress considers critical for acquisition costs. To assess how shipbuilding programs leverage PSMs during the acquisition process, we reviewed DOD and Navy acquisition guidance governing the roles and responsibilities of program offices, program managers, and PSMs. We interviewed officials from shipbuilding programs in our scope about their priorities and responsibilities throughout the life cycle of a ship class. Further, we reviewed legislation creating the PSM role, DOD and Navy acquisition guidance regarding PSMs, prior GAO reporting on PSMs, and interviewed PSMs from programs in our scope. We compared the key acquisition activities that legislation requires PSMs to participate in with the activities the PSMs reported they had participated in. We also compared DOD and Navy guidance on assigning PSMs to a program office to when program officials told us the PSMs needed to be assigned to be effective. We also reviewed findings that NAVSEA logistics officials reached about the authority and effectiveness of PSMs. We conducted this performance audit from April 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to responding to our recommendations, the Assistant Secretary of the Navy for Research, Development, and Acquisition (ASN (RD&A)) provided observations on a number of issues related to the findings in our report. In his letter, the ASN (RD&A) agreed with our recommendations but sought to add context to our report’s conclusion that the Navy can save billions by improving its consideration of sustainment throughout the acquisition process. Our response to the ASN (RD&A)’s letter is as follows. In his letter, the ASN (RD&A) highlighted a number of changes that the Navy has instituted over the last 10 years to improve sustainment planning, including policies pertaining to life cycle sustainment plans and independent logistics assessments, strengthening the role of the Product Support Managers, and establishing a new Gate 7 review focused on sustainment. We agree that the Navy’s framework for including sustainment planning in the acquisition process offers promise and we discuss these policies and processes in depth in this report. However, we found considerable weaknesses in the Navy’s application of its own policies. Specifically, we found that the Navy did not provid a thorough assessment of the sustainment implications and risks in its LCSPs and ILAs and Product Support Managers aften are not assigned until well into a shipbuilding program thereby limiting their influence on early acquisition decisions. While adding a Gate 7 offers benefits, it is not a substitute for discussions about sustainment concepts during earlier Gates, when key long-term decisions are being made. Our findings and recommendations demonstrate that DOD and the Navy should better use the policies and processes it currently has, including the Gate reviews, as well as Product Support Managers, LCSPs and ILAs, to improve their understanding of how their acquisition decisions will affect sustainment. In his letter, the ASN (RD&A) stated that many of the Navy’s ship programs were designed with sustainment initiatives early in the acquisition process and, further, acknowledged that these initiatives did not achieve efficiencies as initially planned. We agree with both of these points, as we discuss in depth in this report. Whereas the ASN (RD&A) indicated in his letter that leadership, philosophical, and technology changes can lead to outcomes that were not originally envisioned, we found that these initiatives largely failed because, early in the acquisition process, the Navy did not sufficiently assess the costs or evaluate the risks associated with pursuing these initiatives. Absent such analysis, the Navy did not mitigate the risks that threatened their success. The ASN (RD&A) highlighted several examples of sustainment initiatives considered early in the acquisition process for several ships. We believe that these examples (many of which we discuss in our report) serve to further highlight our findings. For example: The ASN (RD&A) discussed the use of a “full service contractor,” meaning performance-based logistics for LPD 17 class ships. According to the ASN (RD&A), while this approach had been successfully used for aircraft, the Navy had never applied it to ships. As we state in our report, in attempting to use performance-based logistics for several shipbuilding programs including LPD 17 class ships, the Navy did not consider the challenges in implementing this radical departure from traditional ship maintenance and did not consult the fleet on this change until after ships were delivered. The Navy’s life-cycle sustainment plans and cost estimates for several shipbuilding programs did not articulate how much the performance-based logistics approach was likely to cost or what sustainment outcomes the Navy expected. For instance, for three out of the four programs that pursued performance-based logistics, the Navy learned that this approach was cost-prohibitive once it began seeking contractors to sustain its ships. The ASN (RD&A) stated that the Navy’s focus on Ford class sustainment has reduced sustainment costs and labor by an estimated $4 billion across the Ford class carriers compared to the previous class of carriers. However, it is too early to tell how much the Navy will save compared to the cost of its previous class of carriers because the Navy’s fleet has yet to operate the new carrier. Further, while the O&S estimated for the Ford class may currently be lower than the previous carrier class, our report notes that the O&S costs for the Ford class carrier program are nearly $46 billion more than initially estimated. Finally, in his letter, the ASN (RD&A) stated that the Navy plans to correct the vast majority of CVN 78 sustainment problems (including those we identified in this report) with ship construction funding—and these cost will not be passed on to the fleet. The $4.2 billion to address the 150 problems that we identified in this report already excludes all ship construction funding and also excludes corrections on CVN 78. Our calculation of $4.2 billion only includes the costs to correct the problems that are not funded using ship construction funding. We agree with the ASN (RD&A)’s assertion that external factors can take place over the lengthy time needed to design and build a new ship that can lead to changes that were not initially envisioned. While the Navy cannot prepare for all of the unknowns, it can critically evaluate sustainment assumptions that form the basis of its shipbuilding programs early in the acquisition process. Such analysis could significantly improve the Navy’s ability to response to changes over time and increase the likelihood of success. Further, critical analysis could also help decision makers determine when an initiative is too risky before implementing it on an entire shipbuilding program. In its letter, the ASN (RD&A) also states that a careful reading of the early program documentation demonstrates that sustainment stakeholders were involved in the acquisition process. We reviewed available acquisition documents for 11 shipbuilding programs in the last 20 years and found that sustainment leadership, specifically the CNO and other in OPNAV, attended meetings and approved sustainment planning documents. However, we found that sustainment was rarely discussed during early acquisition meetings—even when the planned shipbuilding programs sought new sustainment initiatives. Further, we reviewed thousands of Navy documents and met with over 100 Navy organizations and found that sustainment organizations across the Navy that are responsible for ship sustainment have a limited role in the acquisition process, even when having such a role could have likely prevented many of the problems we discuss in the report. As we state in our report, the quantity and breadth of the 150 problems we found— resulting in billions of dollars in unexpected costs, maintenance delays, and unreliable ships—suggest that existing policies and guidance have not ensured that new ships are reliable and can be sustained as planned. We are concerned that the ASN (RD&A)’s letter is an indication that the Navy’s shipbuilding program offices will not take the necessary action to improve sustainment planning during the acquisition process. The ASN (RD&A)’s letter did not mention the recent establishment of a new Deputy Assistant Secretary for Sustainment that we discuss in our report. We believe that this office has the opportunity to contribute to improved outcomes byp providing leadership to ensure that sustainment considerations are critically evaluated during the acquisition process. Absent such leadership, the Navy is at risk of continuing to provide ships to the fleet that are incomplete, unreliable, and cost more than expected to maintain. In addition the contact name above, the following staff members made key contributions to this report: Diana Moldafsky, Assistant Director; Laurier Fish, Analyst-in-Charge; Jillian Schofield; Sarah Evans; Lori Fields; Ann Halbert-Brooks; Joshua Garties; Laura Greifner; Tara Kumar; Shivarthn Maniam; Alexis Olson; Kya Palomaki; Anne Louise Taylor; and Tonya Woodbury. Carl Barden; Brian Bothwell; Anna Irvine; and Jean McSween also made contributions to this report. Defense Acquisitions: Senior Leaders Should Emphasize Key Practices to Improve Weapon System Reliability. GAO-20-151. Washington, D.C.: January 14, 2020. Guided Missile Frigate: Navy Has Taken Steps to Reduce Acquisition Risk, but Opportunities Exist to Improve Knowledge for Decision Makers. GAO-19-512. Washington, D.C.: August 9, 2019. DOD Acquisition Reform: Leadership Attention Needed to Effectively Implement Changes to Acquisition Oversight. GAO-19-439. Washington, D.C.: June 5, 2019. Columbia Class Submarine: Overly Optimistic Cost Estimate Will Likely Lead to Budget Increases. GAO-19-497. Washington, D.C.: April 8, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Affecting the Attack Submarine Fleet. GAO-19-192C. Washington, D.C.: October 31, 2018. Navy Shipbuilding: Past Performance Provides Valuable Lessons for Future Investments. GAO-18-238SP. Washington, D.C.: June 6, 2018. Columbia Class Submarine: Immature Technologies Present Risks to Achieving Cost, Schedule, and Performance Goals. GAO-18-158. Washington, D.C.: December 21, 2017. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Affecting the Fleet. GAO-17-809T. Washington, D.C.: September 19, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions That Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Weapon Systems Management: Product Support Managers’ Perspectives on Factors Critical to Influencing Sustainment-Related Decisions. GAO-17-744R. Washington, D.C.: September 12, 2017. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Facing the Fleet. GAO-17-798T. Washington, D.C.: September 7, 2017. Navy Shipbuilding: Policy Changes Needed to Improve the Post-Delivery Process and Ship Quality. GAO-17-418. Washington, D.C.: July 13, 2017. Navy Force Structure: Actions Needed to Ensure Proper Size and Composition of Ship Crews. GAO-17-413. Washington, D.C.: May 18, 2017. Navy Ship Maintenance: Action Needed to Maximize New Contracting Strategy’s Potential Benefits. GAO-17-54. Washington, D.C.: November 21, 2016. Littoral Combat Ship: Need to Address Fundamental Weaknesses in LCS and Frigate Acquisition Strategies. GAO-16-356. Washington, D.C.: June 9, 2016. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations. GAO-16-450. Washington, D.C.: June 9, 2016. Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Navy and Coast Guard Shipbuilding: Navy Should Reconsider Approach to Warranties for Correcting Construction Defects. GAO-16-71. Washington, D.C.: March 3, 2016. Acquisition Reform: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies. GAO-15-192. Washington, D.C.: February 24, 2015. Ford-Class Aircraft Carrier: Congress Should Consider Revising Cost Cap Legislation to Include All Construction Costs. GAO-15-22. Washington, D.C.: November 20, 2014. Weapon Systems Management: DOD Has Taken Steps to Implement Product Support Managers but Needs to Evaluate Their Effects. GAO-14-326. Washington, D.C.: April 29, 2014. Navy Shipbuilding: Opportunities Exist to Improve Practices Affecting Quality. GAO-14-122. Washington, D.C.: November 19, 2013. Trends in Nunn-McCurdy Cost Breaches for Major Defense Acquisition Programs. GAO-11-295R. Washington, D.C.: March 9, 2011. Defense Management: DOD Needs Better Information and Guidance to More Effectively Manage and Reduce Operating and Support Costs of Major Weapons Systems. GAO-10-717. Washington, D.C.: July 20, 2010. Best Practices: High Levels of Knowledge at Key Points Differentiate Commercial Shipbuilding from Navy Shipbuilding. GAO-09-322. Washington, D.C.: May 13, 2009. Defense Logistics: Improved Analysis and Cost Data Needed to Evaluate the Cost-effectiveness of Performance Based Logistics. GAO-09-41. Washington, D.C.: December 19, 2008. Defense Acquisitions: Cost to Deliver Zumwalt-Class Destroyers Likely to Exceed Budget. GAO-08-804. Washington, D.C.: July 31, 2008. Defense Acquisitions: Realistic Business Cases Needed to Execute Navy Shipbuilding Programs. GAO-07-943T. Washington, D.C.: July 24, 2007.", "summary": "The U.S. Navy requested over $40 billion each of the last 3 years to build, operate, and sustain its fleet. Acquisition decisions made as ships are developed and built can have a long-term effect on sustainment costs and ship quality. GAO was asked to assess the extent to which DOD considers and plans for sustainment when acquiring weapons. Among other objectives, this report assesses the extent to which: (1) Navy ship programs deliver ships to the fleet that can be sustained as planned; (2) the Navy develops and uses effective sustainment requirements during acquisition; (3) ship programs are effectively identifying and evaluating sustainment risks in planning documents; and (4) leadership considers programs' sustainment planning and outcomes. GAO reviewed DOD and Navy acquisition policy and guidance, evaluated acquisition plans, collected sustainment metrics, and conducted interviews with more than 100 organizations, including program office and fleet units. GAO assessed 11 classes of shipbuilding programs (all nine that delivered warships during the last 10 years, as well as two newer classes of ships). The Navy has delivered warships—such as aircraft carriers, destroyers, and submarines—to its fleet over the past 10 years that require more effort to sustain than initially planned. In assessing how these classes of ships are sustained, GAO found 150 examples of class-wide problems, such as unreliable ship systems. These problems stemmed from shipbuilding programs not identifying, evaluating, or mitigating sustainment risks during the acquisition process. GAO found that it would cost the Navy $4.2 billion to correct just the 30 percent of these problems for which the Navy had data on estimated repair costs. GAO found that shipbuilding programs' requirements for sustainment reflect weaknesses with how Department of Defense (DOD) policy defines these requirements for ships. Sustainment requirements should influence acquisition decisions that determine the sustainability of a ship class, such as the ship's design. However, the Navy's sustainment requirements do not provide key information on how reliable and maintainable mission-critical systems should be and, therefore, cannot adequately inform acquisition decisions. GAO also found that shipbuilding programs did not consistently address sustainment risks in acquisition planning documents. For example, the operating and support costs included in cost estimates did not capture all sustainment risks that could affect costs or evaluate sensitivity to changing sustainment assumptions, contrary to DOD and Navy cost estimating guidance. As a result, for six shipbuilding programs whose costs GAO could assess, the Navy had underestimated sustainment costs by $130 billion, as shown below. The Navy has begun making some changes to its acquisition oversight process, such as developing sustainment program baselines and adding a sustainment oversight review. While positive, these changes focus on considering sustainment after key decisions are made early in the acquisition process. GAO also found that DOD is not required to provide detailed information about shipbuilding programs' sustainment cost growth to Congress. As such, Congress does not have full insight into the extent of shipbuilding programs' cost growth and why such growth occurred. GAO is making one matter for Congressional consideration to enhance oversight and 11 recommendations to help DOD and Navy improve ship sustainment. DOD concurred with 8 and partially concurred with 3 recommendations but did not describe specific actions, which GAO believes are necessary to improve sustainment outcomes.", "document_type": "gao"}
{"report": "In September 2017, Hurricane Irma struck the islands of St. Thomas and St. John, and two weeks later, Hurricane Maria struck the island of St. Croix in the USVI, causing catastrophic damage across the entire territory and neighboring Caribbean islands (see fig. 2). The storms severely damaged the USVI’s critical infrastructure, leaving many of the territory’s 107,000 residents without electricity, phone service, food, or running water. According to a September 2018 report from the USVI Hurricane Recovery and Resilience Task Force (USVI Task Force Report), the hurricanes devastated the territory’s electricity grid and telecommunications systems, shutting down both for months. Further, the storms damaged more than half of the territory’s housing units, as well as its hospitals, government buildings, schools, water and wastewater facilities, and more (see figs. 3 and 4). Overall, the report estimated that the hurricanes caused approximately $10.7 billion in total damages across the USVI. In response to the request of the Governor of the USVI, the President declared a major disaster the day after each hurricane struck the territory. Major disaster declarations can trigger a variety of federal response and recovery programs for government and nongovernmental entities and households and individuals, including assistance through the Public Assistance program and Hazard Mitigation Grant Program. Under the National Response Framework and National Disaster Recovery Framework, DHS is the federal department with primary responsibility for coordinating disaster response and recovery, and within DHS, FEMA has lead responsibility. The Administrator of FEMA serves as the principal adviser to the President and the Secretary of Homeland Security regarding emergency management. Once the President has declared a major disaster, FEMA, the state or territorial government (the recipient), and local or territorial entities (the subrecipient) work together to, among other things, identify and develop projects through the Public Assistance program and Hazard Mitigation Grant Program. After a project has completed FEMA’s review process and is approved, FEMA obligates funding for the project by placing money into an account where the recipient has the authority to draw down—or expend—funding to pay for eligible work upon completion. Further, when a project has been completed, FEMA conducts a close-out process to certify that all eligible work has been completed and reconciles the actual cost incurred. If the actual cost of the completed work is less than the amount of money FEMA obligated for the project, FEMA will deobligate funding. However, if the actual cost of the completed work is greater than the amount of money FEMA obligated for the project, FEMA may reimburse the subrecipient for these additional costs. A state or territorial governor may designate a governor’s authorized representative to oversee all aspects of disaster assistance—including Public Assistance program and Hazard Mitigation Grant Program funding—to ensure the USVI’s compliance with federal regulations and FEMA requirements. Among other responsibilities, the governor’s authorized representative is to confirm that subrecipients submit complete documentation demonstrating that all eligible work completed is in accordance with program requirements. FEMA’s Public Assistance program provides grant funding to state, territorial, local, and tribal governments, as well as certain types of private nonprofit organizations, to assist with the repair or replacement of disaster-damaged public infrastructure. To develop projects under the Public Assistance program, FEMA and USVI officials collaborate to identify and document the damage caused by a disaster to a particular system or facility. These officials then use this damage assessment to formulate the scope of work—or activities required to fix the identified damage—as well as the estimated cost of these activities. As shown in figure 5, Public Assistance grant funds are organized broadly as “emergency work” or “permanent work.” Within these areas are separate categories of work. In addition to emergency work and permanent work, the program includes category Z, which represents indirect costs, direct administrative costs, and any other administrative expenses associated with a specific project. Under the Public Assistance program’s permanent work categories, FEMA also provides grant funding for cost-effective hazard mitigation measures to reduce or eliminate the long-term risk to people and property from future natural and man-made disasters and their effects. FEMA provides this funding in conjunction with the repair of disaster-damaged facilities to enhance their resilience during future disasters. For example, this funding could be used to replace damaged wooden utility poles with composite fiberglass ones to increase the resilience of an electricity distribution system and mitigate the potential for future damage from hurricane-force winds. FEMA’s Hazard Mitigation Grant Program provides grant funding for long- term mitigation solutions to reduce the risk of loss of life and property from future disasters. Unlike mitigation measures funded through the Public Assistance program to further protect disaster-damaged infrastructure, the Hazard Mitigation Grant Program may fund measures for systems, facilities, or properties that were not damaged in the disaster. For example, program funding can be used to construct floodwater control measures—such as berms and rock linings—that did not exist prior to the disaster, or to update existing hazard mitigation plans to accurately reflect current mitigation goals. In July 2018, FEMA approved the use of the Public Assistance alternative procedures pilot program for permanent work projects in the territory. Unlike the standard Public Assistance program wherein FEMA will fund the actual cost of a project, the alternative procedures require awards for permanent work projects to be made on the basis of fixed-cost estimates. As a result, the recipient or subrecipient is ultimately responsible for any project costs that exceed the agreed-upon fixed-cost estimate at the time of the close-out process. However, the alternative procedures program also provides the USVI with financial incentives for the timely and cost-effective completion of work and additional flexibilities that are not available through the standard Public Assistance program. For example, the USVI may use excess grant funding for cost-effective hazard mitigation measures and, in certain circumstances, consolidate permanent work projects approved under the alternative procedures and share obligated funding across these projects. Further, section 20601 of the Bipartisan Budget Act of 2018 authorizes FEMA, when using the alternative procedures, to provide assistance to fund the replacement or restoration of disaster-damaged infrastructure that provide critical services without regard to pre-disaster condition (see fig. 6). For example, through the Act, FEMA may fund the restoration of a disaster-damaged school building—which provides a critical service—to accepted industry standards applicable to the construction of education facilities. Therefore, according to FEMA policy, if components of the school building were not up to industry standards or in poor condition prior to the 2017 hurricanes, the Act allows FEMA to fund the restoration of this building to a better condition than it was in prior to the storms. The Sheltering and Temporary Essential Power (STEP) pilot program is an emergency sheltering program implemented under FEMA’s emergency work authority and funded through the Public Assistance program’s category B emergency work. The program—which was created following Hurricane Sandy in 2012—allows FEMA to fund emergency, temporary repairs to make damaged homes habitable by, for example, restoring electricity to a private home and applying temporary patches to roofs and windows to protect the interior. In funding these types of repairs, FEMA’s goal is to quickly make damaged homes habitable in the short term until the homeowner could complete more permanent repairs independently through other FEMA programs or private insurance payments. Since 2012, FEMA has implemented the program as a tool in addressing the unique circumstances and challenges associated with providing safe sheltering options for disaster survivors. As of June 30, 2019, FEMA obligated more than $1.9 billion in grant funding for 640 projects through the (1) Public Assistance program and (2) Hazard Mitigation Grant Program in the USVI. First, FEMA obligated more than $1.8 billion in Public Assistance grant funding for 618 projects across the USVI (see fig. 7). Specifically, FEMA obligated more than $1.1 billion for emergency work projects (categories A and B), about $588.5 million for permanent work projects (categories C through G), and about $141.2 million for management costs (category Z). Of the approximately $1.8 billion FEMA obligated in Public Assistance grant funding as of June 30, 2019, the USVI had expended nearly $1.1 billion (59 percent) to reimburse subrecipients for completed work. Appendix I provides more detailed information on the status of Public Assistance grant funding in the USVI. Second, FEMA obligated about $60.6 million for 22 Hazard Mitigation Grant Program projects in the territory as of June 30, 2019. These projects are designed to fund mitigation measures to increase the longer- term resilience of the USVI’s infrastructure during future disasters. Of the $60.6 million FEMA obligated as of June 30, 2019, the USVI expended about $1.7 million (3 percent) across 5 projects. Appendix II provides more detailed information on the status of Hazard Mitigation Grant Program funding in the USVI. While these data represent the status of grant funding as of June 30, 2019, the amount of FEMA obligations and USVI expenditures for both programs will likely increase over time as additional projects are finalized and approved. FEMA, USVI officials, and contractor personnel identified challenges across three areas that affected the implementation of the Public Assistance program and the Hazard Mitigation Grant Program in the USVI. Specifically, they cited: (1) the limited availability of local staff in the USVI to implement and oversee recovery programs, (2) the inability of local construction crews to undertake the large number of recovery projects, and (3) the impact of the USVI’s difficult fiscal situation on recovery efforts. Limited availability of local staff. USVI and FEMA officials cited the limited number of local USVI personnel with the knowledge and expertise necessary to staff recovery-related positions in key USVI agencies as a significant challenge following the 2017 hurricanes. For example, USVI officials told us that the Virgin Islands Territorial Emergency Management Agency—the agency initially responsible for overseeing all aspects of both the Public Assistance program and Hazard Mitigation Grant Program in the territory—did not have enough employees on staff to effectively implement and manage these programs. Further, a senior FEMA official noted that after the storms, the USVI had only one individual responsible for managing all aspects of the Hazard Mitigation Grant Program across the territory. In addition, the limited availability of local staff in the USVI was exacerbated by the departure of qualified individuals following the hurricanes as well as competition among recovery agencies to hire qualified staff that remained in the territory, according to USVI officials. To address these challenges, the USVI hired two contractors to augment the territory’s capacity in the shorter term and established a new Office of Disaster Recovery to oversee recovery efforts in the longer term. First, in December 2017, the USVI hired two contractors to assist the territory in planning, developing, implementing, and overseeing recovery projects, among other responsibilities. Second, in February 2019, the USVI established the Office of Disaster Recovery as the primary territorial agency responsible for coordinating and overseeing all disaster recovery efforts in the USVI, including the Public Assistance program and Hazard Mitigation Grant Program. The office’s Director told us that while contractor personnel had been valuable in augmenting the USVI’s capacity, the territory was prioritizing the hiring and training of qualified local hires to replace these contractors for the longer term. Shortage of local construction crews. Due to the territory’s relatively small population, FEMA and USVI officials stated there were not enough local construction crews to address the large amount of construction work required to repair and rebuild damaged infrastructure following the 2017 hurricanes. These officials told us this construction crew shortage affected the USVI’s ability to keep Public Assistance program and Hazard Mitigation Grant Program projects proceeding on time. FEMA and contractor personnel stated that unlike in the contiguous United States, the USVI does not have neighboring states that can easily send construction crews to affected areas to augment local crews. In addition, historically, the USVI relied on Puerto Rico to supplement the territory’s capacity, but this was not an option as Puerto Rico was undergoing its own massive recovery effort as a result of Hurricane Maria. The USVI’s fiscal situation. USVI officials and contractor personnel stated that the challenging fiscal situation in the territory directly affected its ability to effectively implement recovery programs. Specifically, USVI officials told us that the territory’s financial condition made it difficult to provide initial funding to reimburse subrecipients for completed work prior to drawing down funding from the account holding FEMA-obligated money. These officials stated this process was problematic because instead of funding all eligible projects as quickly as possible to move the recovery forward, the USVI had to prioritize certain recovery projects over others based on the availability of funding. Further, USVI contractor personnel told us that the territory often does not have the cash on hand necessary to provide these reimbursements to subrecipients, which can result in delays in paying subrecipients and contractors. According to USVI officials, pursuing projects under the Public Assistance alternative procedures program may help to address these issues by providing more flexibility regarding when and how projects are funded. The Public Assistance alternative procedures program provides the USVI with financial incentives and new flexibilities in implementing recovery projects that are not available through the standard Public Assistance program. However, FEMA and USVI officials stated that implementing the alternative procedures program in the USVI presented challenges that affected recovery efforts and delayed the obligation of funding for permanent work projects. Specifically, they cited challenges in (1) developing accurate fixed-cost estimates for program projects and (2) implementing the new flexibilities authorized by section 20601 of the Bipartisan Budget Act of 2018. Senior USVI officials told us that due to these challenges and the financial risk associated with the use of fixed- cost estimates, the USVI is planning to take a cautious approach in pursuing alternative procedures projects. As established in FEMA guidance, USVI officials have a deadline of March 2020 to finalize the fixed-cost estimates for such projects for inclusion in the alternative procedures program. Fixed-cost estimates. As the USVI is financially responsible for any actual costs that exceed the fixed-cost estimate for any given alternative procedures project, ensuring the accuracy of these estimates is critical due to the USVI’s already difficult fiscal situation. However, USVI officials told us that developing fixed-cost estimates that accurately forecast the future costs of completing large, complex permanent work projects in the remote island territory is difficult given the unique circumstances that influence construction costs in the USVI, such as the limited availability of local resources and the need to import construction materials and labor. To address this challenge, in October 2018, FEMA asked an independent contractor to analyze whether a USVI-specific “cost factor” should be incorporated into FEMA’s process for developing fixed-cost estimates to ensure the actual costs of implementing permanent work projects in the territory were captured. According to FEMA officials, the independent contractor determined that a cost factor was appropriate for use in the USVI and the contractor proposed several options. However, territorial officials contended that these proposals did not sufficiently or accurately capture the unique circumstances that influence construction costs in the territory. Further, USVI officials stated that ensuring the accuracy of the cost factor was critical given the significant financial risk using fixed-cost estimates posed to the USVI. Since incorporating a cost factor into the process for developing fixed- cost estimates increases the base cost for any given permanent work project—and therefore the amount of funding FEMA obligates—FEMA officials explained the USVI had an incentive to delay the obligation of projects until FEMA finalized this factor. As a result, FEMA officials told us in May 2019 that obligations for permanent work projects had been mostly on hold since October 2018 while the contractor worked to develop the USVI-specific cost factor. As the USVI is reliant on federal recovery funding to reimburse subrecipients for completed work, this delay in obligations directly affected the USVI’s ability to move recovery projects forward. In May 2019, the contractor proposed a new cost factor, which FEMA approved on an interim basis pending further analysis. In July 2019, FEMA officials told us that while additional analyses are required to ensure its final process for developing fixed-cost estimates in the USVI accurately captures construction costs, using this interim cost factor in the meantime allows FEMA and USVI officials to move forward with the development and final approval of alternative procedures projects. In August 2019, a senior USVI official told us the territory plans to begin using the interim cost factor, where appropriate, to keep projects progressing forward. However, she stated that the USVI questioned whether the interim cost factor did, in fact, sufficiently capture the actual costs of construction in the USVI. Given the uncertainty around these fixed-cost estimates, USVI officials told us the territory will need to balance the potential flexibilities provided by the alternative procedures program with the financial risk posed by cost overruns when deciding whether to use the alternative procedures or the standard Public Assistance program for any given permanent work project. We are currently assessing FEMA’s process for developing cost estimates for projects under both the standard and alternative procedures programs, and plan to report our results in early 2020. The Bipartisan Budget Act of 2018. While FEMA and USVI officials told us that section 20601 of the Bipartisan Budget Act presented a valuable opportunity to advance the USVI’s recovery, they also reported challenges with implementing the new flexibilities authorized by the Act, which made developing eligible permanent work projects difficult. For example, USVI officials stated that, at times, they were unclear about the implementation process for key components of the Act and thus ensuring subrecipients understood the process was difficult. Further, FEMA officials in the USVI told us that initially, they had difficulty obtaining clarification from FEMA headquarters regarding how to implement key provisions of the Act, such as the process for identifying and incorporating relevant industry standards for specific alternative procedures projects. As a result, permanent work projects that were eligible to use the flexibilities provided by the Act remained on hold until FEMA could clarify the process for implementing the Act and pertinent industry standards could be approved. In addition, the Bipartisan Budget Act was signed into law in February 2018 and applies exclusively to federal disaster assistance to the USVI and Puerto Rico. As a result, FEMA officials faced the challenge of interpreting the Act’s language and appropriately implementing its provisions for the first time. For example, the Act allows for a new process for determining whether a disaster-damaged facility is eligible to receive funding to (1) repair the existing facility or (2) replace the facility with a new structure. Under the standard Public Assistance program, this determination is calculated using the “50 percent rule”—if the cost of repairing the disaster-related damage sustained by the facility exceeds 50 percent of the cost of replacing it, FEMA may fund the replacement of the facility. In contrast, the Act does not provide a similar cost estimating process for use in developing fixed-cost estimates through the alternative procedures program. In September 2018, FEMA issued guidance for implementing section 20601 of the Bipartisan Budget Act through the Public Assistance alternative procedures program, which provides that critical services infrastructure—such as medical and educational facilities—is eligible for replacement “if repair is feasible, but replacement is more prudent.” FEMA officials in the USVI told us that since the agency did not have further guidance or criteria on the appropriate process for evaluating repair or replacement under this new standard, they were responsible for developing the agency’s first justification to support the replacement of a hospital in St. Croix based on their interpretation of the new standard. These officials also stated that since their rationale justifying the facility’s eligibility for replacement was the first of its kind and would set a precedent for future projects, they submitted it to FEMA headquarters for review. In May 2019, FEMA officially approved the replacement of this hospital through the alternative procedures program. For more information on how the Public Assistance program and the Bipartisan Budget Act are affecting recovery efforts at this facility, see appendix III. The Additional Supplemental Appropriations for Disaster Relief Act of 2019, which was signed into law in June 2019, provides additional direction to FEMA regarding the implementation of section 20601 of the Act. Among other things, this legislation includes a provision directing FEMA to change its process for determining whether a disaster-damaged facility is eligible for repair or replacement. FEMA evaluated this and other provisions of the Act and, in September 2019, issued an updated policy to provide clear guidance moving forward, according to agency officials. The USVI Governor and senior territorial officials stated that due to the challenges outlined above and the financial risk posed by exceeding fixed-cost estimates, the USVI plans to take a cautious approach in implementing the Public Assistance alternative procedures program. Specifically, the Governor told us the territory will most likely pursue alternative procedures projects that are simple, have clear scopes of work, and do not include high levels of uncertainty to reduce the financial risk of potential cost overruns. USVI officials added that if they are not comfortable with the fixed-cost estimate for any given alternative procedures project, the territory has the option to pursue the project under the standard Public Assistance program. Under the standard program, the USVI cannot take advantage of the flexibilities and financial incentives provided by the alternative procedures and the Bipartisan Budget Act, but FEMA would reimburse the USVI for the actual cost—including any cost overruns—of all work completed in accordance with a project’s approved scope of work, thereby mitigating the territory’s financial risk. The USVI is ultimately responsible for deciding whether the benefits provided through the alternative procedures program and the Bipartisan Budget Act outweigh the financial risk associated with agreeing to fixed-cost estimates for permanent work projects. Since the territory has until March 2020 to finalize these fixed-cost estimates, it remains too early to determine the extent to which the alternative procedures program will play a role in the USVI’s long-term recovery strategy. In October 2017, FEMA authorized the STEP pilot program in the USVI in response to the widespread damage to homes that displaced residents and overwhelmed sheltering and temporary housing resources in the territory. Through the program, FEMA funded minimal, temporary protective repairs (or “Phase I” repairs) to private homes to allow residents a safe place to shelter. For example, Phase I emergency repairs included applying temporary patches to roofs and windows to protect the interior from outside weather conditions and ensuring a functional kitchen and bathroom and safe sleeping area. According to FEMA documentation, the intent of these minimal temporary repairs was to quickly make damaged homes habitable in the short term until homeowners could complete more permanent repairs independently through other FEMA programs or using private insurance payments. In August 2018, FEMA expanded the STEP pilot program to include the “permanent” repair or replacement of damaged roofs (or “Phase II” work)—the first time in its history that FEMA authorized such work through this pilot program. Phase II work funded more permanent work on USVI residents’ damaged roofs—either by repairing damages to the existing roof or replacing it with a new one. In addition, Phase II work included incorporating roof hardening measures, such as installing hurricane clips to the roof berms, to increase the resiliency of the roofs against hurricane-force winds. Figure 8 provides two examples of USVI homes that participated in Phase II of the STEP pilot program. FEMA expanded the STEP pilot program to address the USVI’s unique, longer-term sheltering needs. Specifically, as the 2018 hurricane season arrived, FEMA was faced with the challenge of ensuring adequate sheltering options were available to USVI residents in the event that another hurricane struck the territory. The following factors contributed to FEMA’s decision to expand the STEP pilot program: Infeasibility of other sheltering programs. Alternate sheltering options were not viable in the USVI due to the unique circumstances in the territory. For example, the Transitional Sheltering Assistance program—where FEMA funds non-congregate sheltering (typically in hotels or motels) for displaced residents who cannot safely return to their homes—was not a feasible option as there was only one operating hotel in the USVI capable of sheltering disaster survivors. Further, FEMA officials told us that temporary housing units—such as manufactured housing units or recreational vehicles—could not be deployed to supplement the territory’s available housing stock due to logistical challenges, including the prohibitive costs of shipping these units to the remote territory and the limited availability of space to install them. Operation Blue Roof caused additional damage to homes. According to FEMA officials, FEMA’s decision to allow homes that had received temporary blue tarps as an emergency roofing measure through Operation Blue Roof to be eligible for the STEP pilot program led to expanding the scope of allowable work funded by the program. FEMA and USVI officials told us this change was implemented to address several issues with the blue tarps installed on homes, including the temporary nature of the tarps—which had a post-installation lifespan of only 30 days—and the need to fix the damage caused by installing the blue tarps on undamaged sections of roofs. FEMA officials stated that expanding the STEP pilot program to conduct more permanent roof repairs on these homes helped to ensure homeowners were able to safely shelter in the event of another hurricane. Shortage of construction crews. As previously discussed, FEMA and USVI officials cited the limited number of construction crews available to implement recovery work as a challenge, including for the STEP pilot program. Specifically, this challenge made it difficult for private homeowners to independently hire qualified contractors to conduct permanent repairs to their homes, according to FEMA officials. Therefore, these officials explained that using Phase II of the STEP pilot program to manage contractors in an official capacity made it more likely that necessary permanent repairs would be completed in a timely manner. Evacuation was not an option. When requested, FEMA is responsible for providing safe sheltering options following a disaster and, in the absence of feasible local sheltering options, FEMA is responsible for evacuating residents to a safe location outside the potentially affected area. However, according to FEMA documentation, developing and executing a plan to evacuate the USVI’s more than 100,000 residents in the event of another hurricane was impractical. Given these factors and the risk of another hurricane, FEMA officials determined that authorizing Phase II roof repairs or replacements of a permanent nature represented an appropriate solution to ensure eligible program participants could safely shelter in their homes. The STEP pilot program in the USVI officially ended on April 15, 2019. FEMA reported that 7,381 homes ultimately received repairs through the program. Specifically, 6,372 homes received Phase I temporary repairs and 1,631 homes received Phase II roof repairs or replacements of a permanent nature. In addition, 622 homes received both Phase I and Phase II repairs. According to FEMA officials, the agency is now conducting the close-out process for the STEP pilot program in the USVI, which includes reviewing the paperwork for each participating home to ensure all work was completed in accordance with both the home’s approved scope of work and overall programmatic requirements. In May 2019, FEMA’s Chief Counsel stated that FEMA had decided to discontinue the STEP pilot program due to significant challenges and lessons learned from prior experiences implementing the program. Specifically, FEMA stated that while FEMA had implemented the STEP pilot program within its authority pursuant to Section 403 of the Stafford Act, the agency was no longer “comfortable from a legal, policy, or pragmatic perspective” with implementing the STEP pilot program following future disasters. FEMA cited two main challenges in implementing the program in the USVI and elsewhere: (1) limiting the program’s scope to provide only minimal, emergency repairs, as intended, and (2) completing these emergency repairs in a timely manner. First, FEMA stated that in multiple iterations of the STEP pilot program—including in the USVI—FEMA officials had “succumbed to the pressure” from state and territorial leaders to expand the scope of allowable repairs under the program to conduct more extensive repairs. For example, in the USVI specifically, although expanding the program to authorize permanent roof repairs was legally supportable and represented an earnest effort to meet the territory’s needs, the expansion did “push the boundaries of appropriateness” and increased FEMA’s risk of interfering with the agency’s authority to provide assistance through other FEMA programs. Second, FEMA stated that the lengthy process for delivering the STEP pilot program—including in the USVI—undercut the program’s stated intent of providing emergency sheltering within 3 to 4 months following a disaster. For example, while FEMA authorized the program in the USVI in October 2017, initial repairs did not begin until March 2018 and eligible work was not completed until April 2019—18 months after the program’s authorization. According to FEMA, completing STEP pilot program repairs took longer than intended across most instances of the program’s implementation due to the amount of time required to develop disaster- specific program guidance, hire a large number of construction crews to undertake the repair work, obtain the necessary permissions from homeowners, and ultimately complete the repairs. Given the STEP pilot program’s protracted period of implementation, FEMA stated the agency had not been successful in ensuring that program repairs provided disaster survivors with emergency shelter in a timely manner. FEMA’s decision to discontinue the STEP pilot program following future disasters raises questions about how the agency plans to address the emergency sheltering needs of disaster survivors in the future—especially in communities that face challenges and circumstances similar to those the program was specifically designed to address. Since implementing it in 2012, FEMA used the STEP pilot program to supplement other FEMA sheltering programs and provide necessary additional capacity to help address the emergency sheltering needs of disaster-affected communities, as described below. In certain cases, the program provided assistance to more disaster survivors than other relevant FEMA programs, including the Transitional Sheltering Assistance program and the provision of temporary housing units. FEMA implemented the STEP pilot program in the following locations: Louisiana: FEMA authorized the STEP pilot program to supplement other federal programs implemented in Louisiana following severe storms and flooding in 2016. Specifically, the Transitional Sheltering Assistance program was not a viable option for most survivors, partially due to the limited availability of hotels and motels in the affected area, and FEMA ultimately used this program for approximately 4,300 households. In addition, FEMA deployed temporary housing units for approximately 4,600 households. FEMA also funded repairs through the STEP pilot program for nearly 11,000 homes. Texas: FEMA authorized the STEP pilot program to supplement other federal programs in Texas following Hurricane Harvey in 2017. Specifically, FEMA determined that implementing the STEP pilot program provided a useful option since the number of displaced survivors significantly exceeded the available capacity for sheltering survivors in local hotels and motels. FEMA used the Transitional Sheltering Assistance program for approximately 55,000 households and deployed temporary housing units for more than 3,500 households. FEMA supplemented these programs by funding repairs through the STEP pilot program for approximately 15,700 homes. Puerto Rico: FEMA authorized the STEP pilot program to address the unique emergency sheltering needs in Puerto Rico following Hurricanes Irma and Maria in 2017. Specifically, FEMA determined that approximately 80 percent of the island did not have power and would not have it restored for an extended period of time. As a result, FEMA implemented the STEP pilot program to, among other repairs, reconnect homes to a functioning electricity grid or, as necessary, fund the installation of generators if the grid could not be restored in a timely manner. Further, similar to what occurred in the USVI, FEMA authorized the STEP pilot program to repair homes that participated in Operation Blue Roof to address the roof damage caused by the installation of the blue tarps. FEMA funded repairs through the STEP pilot program for nearly 108,500 homes in Puerto Rico. In addition, due to the lack of available hotels and motels in Puerto Rico, participation in FEMA’s Transitional Sheltering Assistance program was limited to approximately 7,000 households, most of which were relocated to hotels and motels in the contiguous United States. Further, as detailed below, FEMA implemented its new Voluntary Agencies Leading and Organizing Repair program for the first time in Puerto Rico to conduct repairs to approximately 4,600 homes. North Carolina: FEMA authorized the STEP pilot program to address the particular emergency sheltering needs in North Carolina following Hurricane Florence in 2018. FEMA amended the STEP pilot program to allow both contracted construction crews and voluntary organizations to conduct the repairs, and ultimately funded repairs through the program for approximately 2,200 homes. In addition, FEMA used the Transitional Sheltering Assistance program for more than 870 households and deployed temporary housing units for approximately 650 households. Overall, FEMA authorized the STEP pilot program following 8 declared disasters since 2012 and obligated approximately $2.6 billion to fund repairs to more than 167,000 disaster survivors’ homes, according to FEMA documentation. While the program may not have provided repairs as rapidly as FEMA intended, these repairs nonetheless played a significant role in ensuring these disaster survivors could safely shelter in their homes. Since discontinuing the program, FEMA has not evaluated its options for addressing the emergency sheltering needs of disaster survivors. FEMA stated that it continues to support the use of congregate sheltering and will consider authorizing the Transitional Sheltering Assistance program, among other options, to address disaster survivors’ needs following future disasters. However, as detailed above, FEMA used the STEP pilot program for the specific purpose of providing necessary additional capacity to supplement these and other federal programs. Further, in certain cases, the STEP pilot program was used when implementing these other programs was unfeasible, such as in the USVI and New York where the particular circumstances on the ground made using the Transitional Sheltering Assistance program or deploying temporary housing units impractical. FEMA officials also told us the agency could utilize voluntary organizations to a greater extent than in the past to conduct the same types of repairs provided through the STEP pilot program. Specifically, FEMA officials stated that the Voluntary Agencies Leading and Organizing Repair program—which was implemented in Puerto Rico in response to the 2017 hurricanes and used to repair about 4,600 homes— could be used for this purpose following future disasters. However, given the program’s limited implementation, it is too early to determine the extent to which it represents a feasible solution for addressing emergency sheltering needs, or is capable of providing assistance on as large a scale as other federal programs, such as the STEP pilot program that funded repairs on more than 100,000 homes in Puerto Rico alone. Further, in North Carolina—where FEMA amended the STEP pilot program to allow both hired construction crews and voluntary organizations to conduct the repairs—the number of homes repaired by the construction crews—about 2,000—far exceeded the number of homes repaired by voluntary organizations—about 150—which raises questions about the ability of voluntary organizations to undertake the large volume of repairs necessary following disasters. Standards for Internal Control in the Federal Government states that management should identify, on a timely basis, significant changes to internal conditions that have already occurred, including changes to the entity’s programs or activities. Further, management should identify, analyze, and respond to risks related to achieving the entity’s defined objectives. FEMA has not assessed how its decision to discontinue the STEP pilot program will affect its ability to provide emergency sheltering assistance following future disasters. While FEMA officials told us they plan to use other sheltering programs when the next disaster strikes, these programs may not be sufficient in addressing the emergency sheltering needs of disaster survivors, especially in communities where implementing such programs is not feasible. FEMA officials also stated that given the agency’s decision to discontinue the STEP pilot program, conducting a broad evaluation of FEMA’s emergency sheltering programs and the agency’s options for addressing emergency sheltering needs would be useful to ensure that FEMA is prepared to respond effectively to future disasters. Conducting such an evaluation would help FEMA understand its ability to provide sheltering options and to properly plan for the provision of effective emergency sheltering assistance to disaster- affected communities. USVI. As the recipient of federal disaster funding, the USVI is responsible for providing oversight over the Public Assistance program and Hazard Mitigation Grant Program to ensure they are implemented in compliance with applicable laws and regulations, as well as FEMA policies and guidance. Following the 2017 hurricanes, the USVI took steps to address its responsibilities for receiving grant funding through these programs, including by: (1) developing administrative plans, (2) designating two territorial entities to manage the administration of disaster recovery funding, and (3) establishing the new Office of Disaster Recovery. First, as required by FEMA, the USVI developed administrative plans for the Public Assistance program and Hazard Mitigation Grant Program to ensure that subrecipients are in compliance with the conditions of these grant programs. These plans outline programmatic and project monitoring activities as well as the financial and administrative procedures for both programs. The plans require, among other things, the USVI to submit quarterly progress and financial reports on the status of projects to FEMA and describe the USVI’s specific roles and responsibilities for implementing and overseeing these two programs. Second, the Governor of the USVI designated two territorial entities to manage and oversee the implementation of recovery programs—the Virgin Islands Territorial Emergency Management Agency as the programmatic manager and the governor’s authorized representative as the grant administrator for all federal recovery funding in the USVI. Among other responsibilities, these entities are responsible for ensuring that Public Assistance program and Hazard Mitigation Grant Program participants are in compliance with all programmatic and administrative requirements. For example, the Virgin Islands Territorial Emergency Management Agency is responsible for, among other things, preparing and submitting quarterly progress and financial reports to FEMA for certain Public Assistance program projects and for all Hazard Mitigation Grant Program projects. In addition, the governor’s authorized representative is responsible for ensuring the territory’s compliance with all requirements outlined in the FEMA-approved administrative plans. Third, in February 2019, the USVI’s new Office of Disaster Recovery assumed responsibility for overseeing the Public Assistance program and Hazard Mitigation Grant Program, including tracking and reporting on the progress of individual projects and overseeing the submission of reimbursement requests for completed work. The office is also responsible for monitoring and publicly reporting the status of federal recovery funding at http://www.usviodr.com/. In addition, according to the office’s Director, her team also meets with FEMA officials on a bi- weekly basis to discuss recovery activities more generally and raise any potential issues for discussion, such as challenges with submitting quarterly progress and financial reports to FEMA in a timely manner. FEMA. FEMA officials at the USVI, regional, and headquarters level are responsible for overseeing the USVI’s implementation of federal recovery programs. Specifically, once FEMA obligates grant funding for a project, FEMA officials on the ground in the USVI are responsible for the day-to- day monitoring of individual projects using a variety of tools. For example, FEMA officials stated they use the information included in quarterly progress and financial reports to help ensure that subrecipients are in compliance with applicable federal requirements and that potential problems are identified and addressed in a timely manner. Further, FEMA officials are to conduct quarterly meetings with USVI officials to ensure regular communication and coordination and to discuss program implementation, raise potential challenges, and identify solutions. In addition to monitoring ongoing projects, FEMA officials in the USVI are responsible for managing the process for closing out Public Assistance program and Hazard Mitigation Grant Program projects that have been completed. To facilitate this close-out process, the USVI is to compile all required documentation for an individual project and submit this paperwork to FEMA. FEMA is to review the documentation to ensure that all work has been completed in accordance with the project’s scope of work as well as relevant laws, federal regulations, and program requirements. FEMA Region II officials and FEMA officials in the Grant Programs Directorate in headquarters also provide higher-level oversight of Public Assistance program and Hazard Mitigation Grant Program implementation. For example, FEMA Region II officials stated they analyze the USVI’s quarterly financial reports to identify patterns that may indicate financial challenges, such as irregularities in the amount of funding the USVI has drawn down for projects or an excess or lack of reimbursements to subrecipients for completed work. At FEMA headquarters, officials in the Grant Programs Directorate stated they assess the financial condition of projects annually to identify potential challenges in administering grant funding and may enhance monitoring efforts as needed. These officials stated they also review the timeliness, completeness, and accuracy of information submitted in quarterly reports to help monitor project milestones and identify potential challenges that require FEMA’s attention. FEMA has issued numerous documents that provide useful information and guidance for implementing and monitoring the Public Assistance program and the Hazard Mitigation Grant Program, such as program and policy documents, fact sheets, job aids, and operational manuals. For example, one document for monitoring the Public Assistance program is the Public Assistance Program Management and Grant Closeout Standard Operating Procedure. This standard operating procedures document provides FEMA officials across all disasters nationwide with a common understanding of the expectations and requirements for managing projects. It also clearly and concisely outlines the roles and responsibilities, requirements, key tasks and milestones, and performance measures associated with monitoring and closing out Public Assistance program projects. However, FEMA has not developed a similar consolidated standard operating procedures document to provide a clear and concise roadmap for monitoring and closing out projects under the Hazard Mitigation Grant Program. In July 2019, FEMA officials in headquarters and FEMA Region II told us that guidance on key policies and procedures for managing FEMA’s varied hazard mitigation efforts can be found across multiple sources. However, these officials stated that FEMA has not consolidated this guidance into a single document for FEMA-wide use that focuses on the oversight of Hazard Mitigation Grant Program projects specifically. Further, FEMA’s existing guidance documents do not provide a concise roadmap that outlines roles and responsibilities, key tasks and milestones, and performance measures for FEMA officials to use when monitoring and closing out individual program projects for any given disaster. For instance, the Hazard Mitigation Assistance Guidance includes information on many topics, such as program eligibility requirements; roles and responsibilities for recipient and subrecipient personnel; and oversight requirements spanning three separate FEMA mitigation programs. Likewise, FEMA’s 250-page Hazard Mitigation Field Operations Guide includes operating procedures, descriptions of major tasks for mitigation positions, and job aids, including samples and templates of tools to help hazard mitigation staff implement defined tasks. While these and other FEMA documentation collectively provide important information regarding the agency’s broader hazard mitigation efforts, they are not focused specifically on the Hazard Mitigation Grant Program, or the detailed processes FEMA officials on the ground should use to conduct the day-to-day monitoring of individual projects. Further, these documents do not detail the use of performance measures in effectively monitoring Hazard Mitigation Grant Program projects— information that is included in FEMA’s standard operating procedures document for the Public Assistance program. When we asked FEMA officials responsible for implementing the program in the USVI why the agency had not developed a consolidated standard operating procedures document specific to the Hazard Mitigation Grant Program, they stated that developing this document had not been a priority for the agency—which could be due to the relatively small size of this program compared to larger and more complex recovery programs, such as the Public Assistance program. Although FEMA obligates more funding through the Public Assistance program, the Hazard Mitigation Grant Program nonetheless plays a critical role in ensuring that disaster- affected communities can undertake mitigation measures specifically designed to enhance the resilience of their infrastructure during future disasters. Standards for Internal Control in the Federal Government states that management should document in policies and procedures each unit’s responsibility for an operational process’s objectives in the appropriate level of detail to allow management to effectively monitor the control activity. In addition, these standards state that management should define objectives in specific and measurable terms so they are understood at all levels of the organization. This includes clearly defining what is to be achieved, who is to achieve it, how it will be achieved, and the timeframes for achievement. Further, leading practices identified in the Program Management Institute’s Standard for Program Management call for agencies to develop a program roadmap outlining information on the program’s intended direction and providing a set of documented success criteria for each key milestone and decision point. This roadmap can be a valuable tool for managing the execution of the program and for assessing the program’s progress toward achieving its goals. FEMA’s consolidated standard operating procedures document for the Public Assistance program provides such a roadmap, stating that FEMA’s main goal is to provide effective assistance and excellent customer service necessary to assist disaster-affected communities to recover while also ensuring the responsible stewardship of public funds. FEMA does have guidance on key policies and procedures for managing its hazard mitigation efforts, including through the Hazard Mitigation Grant Program. However, FEMA could further strengthen its existing guidance by consolidating this information into a single document for FEMA-wide use, similar to the one FEMA uses for the Public Assistance program. FEMA officials told us that having a detailed standard operating procedures document for the Hazard Mitigation Grant Program that clearly and concisely outlined roles and responsibilities, key objectives and tasks, and milestones for conducting monitoring and close-out activities would be helpful in effectively overseeing program projects. In addition to FEMA officials, the governor’s authorized representative in the USVI also told us that such a document would help to ensure that both FEMA and USVI officials are following the necessary procedures and guidance when conducting program management and close-out activities. Assessing the need for such a consolidated standard operating procedures document for the Hazard Mitigation Grant Program would help FEMA determine whether existing guidance should be strengthened to ensure that agency officials across all disasters are using a consistent approach in carrying out their responsibilities under the program. As of June 30, 2019, FEMA had obligated more than $1.9 billion in grant funding through the Public Assistance program and Hazard Mitigation Grant Program to help the USVI recover from the catastrophic 2017 hurricane season. As part of the Public Assistance program, FEMA authorized the STEP pilot program in the USVI—and in other locations— to supplement other FEMA programs and provide necessary additional capacity to help address the emergency sheltering needs of disaster survivors. While FEMA decided to discontinue the STEP pilot program, the agency has not evaluated how this decision will affect its ability to provide emergency sheltering assistance in the future. FEMA has a responsibility to provide assistance, when requested, to address the emergency sheltering needs of disaster survivors. Given that FEMA will no longer use the STEP pilot program, taking steps to evaluate its options for addressing these needs will help FEMA to assess its capacity for providing effective emergency sheltering assistance in the future and to properly plan for when the next disaster inevitably strikes. In addition, FEMA has issued numerous policy documents, guides, and other useful documents to assist FEMA officials to effectively monitor and oversee Hazard Mitigation Grant Program projects. However, FEMA has not developed a consolidated standard operating procedures document specific to the Hazard Mitigation Grant Program that provides a clear and concise roadmap for FEMA officials’ use in monitoring individual projects. Assessing the need for a consolidated roadmap for agency-wide use would help FEMA determine whether existing guidance for effectively monitoring Hazard Mitigation Grant Program projects should be strengthened. We are making the following two recommendations to FEMA: The FEMA Administrator should evaluate the agency’s options for providing future emergency sheltering assistance. (Recommendation 1) The FEMA Administrator should assess the need for an agency-wide consolidated standard operating procedures document for the Hazard Mitigation Grant Program that provides detailed information on the roles and responsibilities, requirements, and key tasks and milestones for monitoring and closing out program projects. (Recommendation 2) We provided a draft of this product to DHS and the USVI government for review and comment. DHS provided written comments, which are reprinted in appendix IV and summarized below. DHS and the USVI government provided technical comments, which we incorporated as appropriate. DHS concurred with both our recommendations and described the actions it plans to take in response. With regard to our first recommendation, DHS stated that it will evaluate FEMA’s options for providing emergency sheltering assistance through its Individual Assistance Division and provide any recommendations for action, as appropriate, to FEMA’s Assistant Administrator for Recovery. DHS anticipates completing this evaluation by February 2020. This action, if fully implemented, should address the intent of the recommendation. With regard to our second recommendation, DHS stated that FEMA will assess the need for an agency-wide consolidated standard operating procedures document for the Hazard Mitigation Grant Program and, if deemed necessary, FEMA will develop this document. DHS anticipates this effort will be completed by August 2020. This action, if fully implemented, should address the intent of the recommendation. In the meantime, DHS noted that FEMA will consider updating its website to include a single portal providing access to all existing guidance documents relevant to monitoring and overseeing Hazard Mitigation Grant Program projects. We will monitor DHS’s and FEMA’s efforts to address these two recommendations. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the FEMA Administrator, the USVI government, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you and your staff have any questions, please contact me at (202) 512- 8777 or curriec@gao.gov. GAO staff who made key contributions to this report are listed in appendix V. The Federal Emergency Management Agency (FEMA) obligated more than $1.8 billion in Public Assistance grant funding for 618 projects across the U.S. Virgin Islands (USVI) as of June 30, 2019. Specifically, FEMA obligated more than $1.1 billion for emergency work projects (categories A and B), about $588.5 million for permanent work projects (categories C through G), and about $141.2 million for management costs (category Z). As of that date, the USVI expended nearly $1.1 billion—about 59 percent of total Public Assistance obligations to the USVI—to reimburse subrecipients for completed work. Of this nearly $1.1 billion, the USVI expended about $857.5 million (78 percent) for emergency work projects, $211.3 million (19 percent) for permanent work projects, and $29.9 million (3 percent) for management costs. The majority of FEMA’s obligations and the funding the USVI expended as of June 30, 2019, are for emergency work because these projects began soon after the disasters struck and focused on debris removal and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer-term repair and restoration of public infrastructure. While the data below represent the status of Public Assistance funding as of June 30, 2019, the amount of grant funding FEMA obligates and the USVI expends will likely increase over time as additional projects are finalized and approved. Emergency work. Of the more than $1.8 billion FEMA obligated as of June 30, 2019, more than 1.1 billion (61 percent) was obligated for 410 emergency work projects in Public Assistance program categories A and B. Category A: Debris removal. FEMA obligated about $139.9 million for 88 projects focused on debris removal activities across the territory. For example, FEMA obligated $81.8 million to the USVI Water and Power Authority for territory-wide debris removal efforts (see fig. 9). Of the $139.9 million FEMA obligated for debris removal, the USVI expended about $76.9 million (55 percent) as of June 30, 2019. Category B: Emergency protective measures. FEMA obligated about $985.6 million for 322 projects focused on emergency measures. For example, FEMA obligated about $278.2 million for the Sheltering and Temporary Essential Power (STEP) pilot program as of June 30, 2019, to fund certain types of temporary repairs to private homes. In addition, FEMA obligated approximately $111.9 million for the purchase and installation of modular units to be used as temporary classrooms and other facilities while permanent school buildings are repaired or replaced (see fig. 10). Of the $985.6 million FEMA obligated for emergency protective measures, the USVI expended about $780.7 million (79 percent) as of June 30, 2019. Permanent work. Of the more than $1.8 billion in Public Assistance grant funding FEMA obligated as of June 30, 2019, about $588.5 million (32 percent) was obligated for 200 permanent work projects across categories C through G. These permanent work projects included more than $383.1 million for cost-effective hazard mitigation measures to reduce the future risk of disaster damage to infrastructure. Category C: Roads and bridges. FEMA obligated about $5.9 million for 40 projects focused on repairing roads and bridges in the territory, 9 of which included hazard mitigation measures totaling about $1.6 million. For example, FEMA obligated about $233,000 for one project to repair a road on St. Croix damaged by floodwaters. This project included approximately $61,000 for hazard mitigation measures to reduce the likelihood of erosion during future flooding events. Of the $5.9 million FEMA obligated for category C, the USVI expended about $86,000 (1.5 percent) as of June 30, 2019. Category D: Water control facilities. As of June 30, 2019, FEMA did not have any projects in this category. According to FEMA officials, the USVI does not have water control infrastructure—such as berms or levees—that would fall under category D. Category E: Buildings and equipment. FEMA obligated about $68.3 million for 101 projects focused on repairing damaged structures in the territory, 49 of which included hazard mitigation measures totaling about $3.1 million. For example, FEMA obligated about $59.7 million for one project to replace 5 heavily damaged buildings in a public housing facility in St. Thomas (see fig. 11). While FEMA obligated this project through the standard Public Assistance program, FEMA and the USVI plan to work to develop a fixed-cost estimate with the intention of transitioning this project to the alternative procedures program, according to FEMA documentation. Further, this documentation states that hazard mitigation measures will be incorporated into the new structures by implementing internationally adopted building codes and standards for wall and window replacements. Of the $68.3 million FEMA obligated for Category E, the USVI expended about $533,000 (0.8 percent) as of June 30, 2019. Category F: Utilities. Of the $588.5 million FEMA obligated for permanent work projects, $505.6 million (86 percent) was obligated for 23 projects focused on repairing utilities, 13 of which included hazard mitigation measures totaling about $378.2 million. Specifically, FEMA obligated $481.8 million—or 95 percent of the $505.6 million—through the standard Public Assistance program for projects focused on territory-wide permanent electrical distribution system repairs. This includes replacing damaged wooden utility poles with more resilient composite fiberglass poles that can withstand 200 mile per hour winds as well as power transmission lines and transformers (see fig. 12). Of the $505.6 million FEMA obligated for category F, the USVI expended about $210.4 million (42 percent) as of June 30, 2019. Category G: Parks, recreational, and other facilities. As of June 30, 2019, FEMA obligated about $8.8 million for 36 projects focused on repairing parks, playgrounds, and other facilities, 5 of which included hazard mitigation measures totaling about $214,000. For example, FEMA obligated about $1.5 million in March 2019 for two projects to repair the USVI’s Tsunami Early Warning System, which comprises a network of warning stations that alert residents of a potential tsunami event (see fig. 13). As of September 2019, these were the only projects FEMA had obligated under the Public Assistance alternative procedures program in the territory, according to FEMA officials. These projects included about $185,000 for hazard mitigation measures to replace wooden poles with higher-rated steel poles that are able to withstand high winds and impacts from flying debris during a storm. Of the $8.8 million FEMA obligated for category G, the USVI expended about $246,000 (3 percent) as of June 30, 2019. As of June 30, 2019, the Federal Emergency Management Agency (FEMA) obligated about $60.6 million for 22 Hazard Mitigation Grant Program projects in the U.S. Virgin Islands (USVI) and the USVI expended about $1.7 million (3 percent) across 5 projects. Unlike Public Assistance program projects that, in many cases, are focused on rapidly providing emergency services or repairing critical disaster-damaged infrastructure and systems, Hazard Mitigation Grant Program projects are designed to fund a variety of measures to increase the longer-term resilience of the USVI’s infrastructure during future disasters. Information on selected Hazard Mitigation Grant Program projects in the USVI that received obligations as of June 30, 2019, is detailed below. Virgin Islands Territorial Emergency Management Agency and Bureau of Information Technology Emergency Operations Center and Safe Room Retrofit. FEMA obligated about $22.5 million to fund the retrofit of the USVI Territorial Emergency Management Agency’s Emergency Operations Center. The new facility will serve as the headquarters for both the USVI Territorial Emergency Management Agency and the USVI Bureau of Information Technology and house a 911 Emergency Call Center. According to FEMA documentation, the facility will include a safe room to allow emergency personnel to shelter in place during disasters and will contain sufficient space to house FEMA and other federal personnel, as necessary. Further, the facility will include a hardened communications system to ensure emergency responders are able to effectively communicate during emergency events, among other improvements. The Comprehensive Territorial Hazard Mitigation and Resilience Plan Project. FEMA obligated nearly $5.0 million to fund the development of an in-depth, comprehensive hazard mitigation and resilience plan for territory-wide use. FEMA officials stated that unlike in the contiguous United States, the USVI does not have any entities responsible for formally developing similar plans to guide operations and mitigation activities across various sectors, such as protecting the potable water supply and assessing economically feasible options for development. As a result, FEMA officials told us that this project represents an important effort to develop a holistic, territory-wide hazard mitigation plan that would cover all relevant sectors. The Spring Gut Watershed Green Space Acquisition and Stormwater Management Project. FEMA obligated nearly $1.0 million to fund the first phase of a $2.0 million project to purchase 50 acres of undeveloped land and develop storm water retention measures—such as berms and rock linings—to reduce downstream flooding and the associated damages to roads, homes, and infrastructure (see fig. 14). FEMA officials told us that the first phase of the project included an environmental and historical preservation review of the target locations to confirm program eligibility before actual construction activities can begin. Fortuna/Bordeaux Fire Station Retrofit. FEMA obligated more than $470,000 to fund the first phase of a nearly $5.0 million project to retrofit a fire station in St. Thomas. Specifically, the project will upgrade the facility’s structure to applicable codes and standards to mitigate the risks posed by hurricane-force winds, including the dangers posed by flying debris. Further, the retrofit will include the installation of a steel-reinforced concrete safe room and a back-up emergency power generator to ensure the safety and protection of emergency personnel and the continuity of emergency response activities during a disaster, according to FEMA documentation. The Governor Juan F. Luis Hospital and Medical Center (JFL hospital) in St. Croix provides an illustrative example of the processes and challenges associated with developing and implementing Public Assistance program projects in the U.S. Virgin Islands (USVI). In September 2017, Hurricane Maria’s strong winds and torrential rains caused severe damage to the facility’s roof; heating, ventilation, and air conditioning system; and electrical, water, and sewage systems, according to Federal Emergency Management Agency (FEMA) documentation. Further, the infusion of water—both during and after the storm—saturated the interior of the hospital, destroyed medical equipment and hospital furnishings, and facilitated the growth of hazardous mold. Figure 15 details selected hurricane damage to the facility. Due to the extensive damage, the JFL hospital has been operating at reduced capacity since the hurricane and certain functions have been relocated to undamaged areas, according to FEMA documentation. This documentation states that while the hospital continues to provide limited medical services to St. Croix residents, it is no longer capable of providing critical care services. Since alternate options were either limited or unavailable on the island following the storms, St. Croix residents in need of life sustaining medical treatments such as chemotherapy infusions or who are experiencing life-threatening health events such as cardiac failure or trauma must be transported out of the territory to receive life- saving care, according to FEMA documentation. Following Hurricane Maria, FEMA obligated grant funding for several Public Assistance emergency work projects to help keep the JFL hospital functioning and capable of providing limited medical services to St. Croix residents. For example, in August 2018, FEMA obligated $119,000 in grant funding to reimburse the JFL hospital for the use of an emergency backup generator through Public Assistance program category B, which provides funding for emergency protective measures. According to JFL personnel, this funding covered the cost of using the backup generator until the facility’s primary electrical system could be restored. In another example, FEMA obligated about $2.4 million in August 2018—also through Public Assistance program category B—to fund the rental of mobile dialysis trailers (see fig. 16). According to JFL personnel, these trailers were acquired to replace all 14 of the facility’s dialysis units that were destroyed during the storm. In addition to Public Assistance projects focused on maintaining the existing facility, FEMA obligated $43.2 million in January 2018 to fund the purchase and installation of modular units to serve as a temporary medical facility through category B emergency work. According to FEMA documentation, this temporary facility is intended to provide critical medical services to St. Croix residents—including an emergency room, pediatric care, a labor and delivery ward, and an intensive care unit, among other services—until a permanent facility is completed (see fig. 17). JFL personnel told us that completing this project is a key priority as it will enable them to transition all medical services from the main facility, which continues to deteriorate over time. However, they stated that implementing this project has been challenging. For example, JFL personnel told us that when former JFL administrators were developing the project, they incorporated the cost of procuring and installing the modular units, but omitted the costs associated with acquiring, installing, and certifying new medical equipment for use in the interim facility. These personnel stated that these costs should have been incorporated into the original project paperwork and clarified that the acquisition and certification of new equipment was critical in ensuring the hospital’s provision of medical services would not be disrupted. Specifically, they explained that relocating the facility’s existing medical equipment was not a feasible option as it would result in an unacceptable lapse in medical services during the time-consuming process of deconstructing, transferring, reinstalling, and recertifying this equipment in the modular facility. JFL personnel stated they worked closely with FEMA officials and contractor personnel to update the project’s paperwork and request additional program funding for this new medical equipment. In August 2019, FEMA approved the updated paperwork and obligated additional funding for this project, according to FEMA documentation. JFL personnel also stated they have limited capacity to effectively manage and oversee the construction of the temporary facility due to competing responsibilities. In addition to managing this project, they stated they were occupied with the continuous maintenance challenges associated with keeping the deteriorating main facility functioning while also working to develop options for a permanent facility through the Public Assistance alternative procedures program, as discussed below. They told us FEMA officials and contractor personnel had been helpful in providing assistance, but stated they would benefit from a larger hospital management team that could focus specifically on planning and implementing the facility’s numerous recovery efforts. As of July 2019, JFL personnel stated their aim is to officially open the temporary facility in the spring of 2020. In conjunction with the temporary facility’s construction, FEMA officials and JFL personnel are working to develop a permanent work project under the Public Assistance alternative procedures program to replace the damaged hospital. Further, in providing a critical service, the JFL hospital is eligible to use the new flexibilities provided by the Bipartisan Budget Act of 2018. This Act allows FEMA—when using the alternative procedures—to fund the repair or full replacement of the hospital to accepted industry standards regardless of any pre-disaster damage or wear and tear the facility may have sustained prior to the 2017 hurricanes. FEMA officials and JFL personnel stated the Act therefore provides a valuable opportunity to restore the facility to a better condition than it was in prior to the storms. However, JFL personnel told us that pursuing this permanent work project included challenges. For example, JFL personnel told us that maintaining the damaged facility while FEMA determined whether the hospital was eligible for repairs to the existing structure or a complete replacement under the Bipartisan Budget Act was challenging. Specifically, they explained that while FEMA worked to finalize this determination, management was in the difficult position of deciding where and how to invest its finite resources to keep the constantly deteriorating facility functioning. For example, these personnel explained that if FEMA determined that the facility is ineligible for replacement under the Act, they would immediately invest money into the existing facility to address critical components that require urgent attention, such as the water and wastewater systems. In contrast, if FEMA determined that the facility is indeed eligible for replacement, management would strategically invest the minimum amount of resources required to keep the facility functioning with the full knowledge that it would eventually be demolished. Figure 18 details selected examples of temporary fixes JFL personnel implemented to keep the facility functioning. In May 2019, FEMA officially determined that the JFL hospital was eligible under the Bipartisan Budget Act of 2018 for a complete replacement through the Public Assistance alternative procedures program. JFL personnel told us they are working with FEMA officials and medical industry experts to ensure that they take advantage of the flexibilities provided by the Bipartisan Budget Act when developing the project. As of July 2019, these personnel explained they are in the early stages of working with FEMA officials and territorial stakeholders to assess options for the replacement facility and are designing a strategy to ensure the future hospital is able to sufficiently address the healthcare needs of USVI residents. Chris Currie, (202) 512-8777 or curriec@gao.gov. In addition to the contact named above, Joel Aldape (Assistant Director), Bryan Bourgault (Analyst in Charge), Aaron Gluck, Eric Hauswirth, Brian Lipman, Amanda Miller, Heidi Nielson, and Kevin Reeves made key contributions to this report.", "summary": "In September 2017, two major hurricanes—Irma and Maria—struck the USVI, causing billions of dollars in damage. FEMA is the lead federal agency responsible for assisting the USVI to recover from natural disasters. FEMA administers the Public Assistance program and Hazard Mitigation Grant Program in partnership with the USVI government, providing grant funding for response and recovery activities, including life-saving emergency protective measures, the repair or replacement of public infrastructure, and measures to increase the territory's resilience during future disasters. GAO was asked to review the federal government's response and recovery efforts in the USVI. This report examines (1) the status of Public Assistance program and Hazard Mitigation Grant Program funding and challenges, if any, with implementation, (2) the STEP pilot program, and (3) the oversight of these programs. GAO reviewed documentation and data on the Public Assistance program and Hazard Mitigation Grant Program in the USVI as of June 30, 2019. GAO interviewed FEMA and USVI officials regarding the status of recovery efforts and associated challenges, and conducted site visits to the USVI islands of St. Croix, St. Thomas, and St. John. As of June 30, 2019, FEMA obligated more than $1.9 billion in grant funding for 640 projects in the U.S. Virgin Islands (USVI) through the Public Assistance program and Hazard Mitigation Grant Program in response to the 2017 hurricanes. However, the limited availability of local USVI personnel to staff key recovery positions and the territory's difficult fiscal situation presented challenges in implementing these programs. Further, FEMA and USVI officials stated they faced challenges with implementing the Public Assistance alternative procedures program, which provides the USVI with flexibility in determining when and how to fund projects. Specifically, these officials stated that developing accurate fixed-cost estimates and using new flexibilities authorized by law delayed longer-term recovery projects. USVI officials told GAO they plan to take a cautious approach when deciding whether to pursue projects using the alternative procedures. FEMA expanded its Sheltering and Temporary Essential Power (STEP) pilot program in the USVI to address the lack of other sheltering options for survivors, such as hotels. The program aimed to provide minimal, temporary repairs to damaged homes to quickly make them habitable. In May 2019, FEMA decided it would not use the STEP pilot program in the future since it did not provide assistance as rapidly as intended. Historically, the program was used to address survivors' emergency sheltering needs. However, since ending it, FEMA has not evaluated options for providing future emergency sheltering assistance. Doing so could help FEMA plan for when the next disaster inevitably strikes. The USVI and FEMA established structures for overseeing recovery efforts. For example, the USVI established a new office to oversee federal recovery programs and FEMA has processes in place to oversee recovery projects at the local, regional, and headquarters levels. However, GAO found that FEMA does not have a consolidated standard operating procedures document for monitoring Hazard Mitigation Grant Program projects. Assessing the need for a consolidated document would help FEMA determine whether its existing guidance should be strengthened. GAO recommends that FEMA (1) evaluate its options for providing emergency sheltering and (2) assess the need for a consolidated standard operating procedures document for the Hazard Mitigation Grant Program. The Department of Homeland Security concurred with these recommendations.", "document_type": "gao"}
{"report": "This section describes (1) U.S. climate risks and related impacts, (2) enhancing climate resilience using a risk management strategy, (3) GAO’s Disaster Resilience Framework, and (4) benefits and costs of climate resilience projects. Climate change poses risks to many U.S. environmental and economic systems, according to USGCRP’s Fourth National Climate Assessment. For example, high temperature extremes, heavy precipitation events, high-tide flooding events along the U.S. coastline, ocean acidification and warming, and forest fires in the western United States and Alaska have been observed and are all projected to continue to increase. In contrast, land and sea ice cover, snowpack, and surface soil moisture have been declining and are expected to continue to decline in the coming decades. Climate change is also altering the characteristics of many extreme weather and climate-related events, according to the Fourth National Climate Assessment. Some of these events have already become more frequent, intense, widespread, or of longer duration, and many are expected to continue to increase or worsen. Furthermore, according to the assessment, many places are subject to more than one climate-related impact. Examples include extreme rainfall combined with coastal flooding, or drought coupled with extreme heat. The compounding effects of these impacts result in increased risks to people, infrastructure, and interconnected economic sectors. According to the Fourth National Climate Assessment, without significant reductions in global greenhouse gas emissions and regional efforts to pursue climate resilience, climate change is expected to cause substantial losses to infrastructure and property and impede the rate of economic growth over this century. The potential for losses in some economic sectors could reach hundreds of billions of dollars per year by the end of this century, according to the assessment. Future climate risks are subject to several sources of uncertainty, as identified by USGCRP’s Fourth National Climate Assessment. According to the assessment, climate scientists find varying ranges of uncertainty in many areas, including observations of climate variables, the analysis and interpretation of those measurements, the development of new observational instruments, and the use of computer-based models of the processes governing Earth’s climate system. According to the assessment, the largest uncertainty in projecting future climate risks is the level of greenhouse gas emissions going forward, because the level of emissions depends on economic, political, and demographic factors that can be difficult to predict with confidence far into the future. According to the Fourth National Climate Assessment, enhancing climate resilience entails a continuing risk management process through which individuals and organizations become aware of and assess risks and vulnerabilities from climate and other drivers of change, take actions to reduce those risks, and learn over time. In December 2016, we reported on a risk management strategy that may help guide federal climate resilience efforts. Enterprise risk management can help federal agencies identify, assess, and manage risks, such as preparing for and responding to natural disasters. In our report, we identified six essential elements of enterprise risk management: (1) aligning the enterprise risk management process to goals and objectives, (2) identifying risks, (3) assessing risk, (4) selecting a risk response based on risk appetite, (5) monitoring risks to see if responses are successful, and (6) communicating and reporting on risks. For example, we reported that assessing risks involves considering both the likelihood of the risk and the impact of the risk on the mission to help prioritize risk response. We also reported that selecting a risk treatment response involves leaders reviewing the prioritized list of risks and selecting the most appropriate treatment strategy to manage the risk. In October 2019, we issued the Disaster Resilience Framework to serve as a guide for analysis of federal action to facilitate and promote resilience to natural disasters. The principles in this framework can help identify opportunities to enhance federal efforts to promote disaster resilience, including building resilience to climate change. According to the framework, strategic resilience goals integrated across relevant national strategies can help decision makers work toward a common vision and help ensure focus on a wide variety of opportunities to reduce disaster risk. Federal efforts can focus attention on disaster risk reduction by creating resilience goals in all relevant national strategies and linking those goals to an overarching strategic vision. Federal efforts can also facilitate coordination and promote governance approaches that mitigate fragmentation by requiring or funding mechanisms to enhance the continuity of different efforts across jurisdictions. In addition, because much of the nation’s infrastructure is not owned and operated by the federal government, many resilience-related decisions ultimately are made by nonfederal actors, such as the states, and those decision makers face competing priorities. Incentives—in the form of federal regulatory requirements or as conditions of federal grant programs and cooperative agreements—can help promote investment in disaster risk reduction. As shown in figure 1, the framework is organized around three broad overlapping principles and a series of questions to guide analysis that can help users consider opportunities to enhance federal efforts to promote disaster resilience. Each of the principles includes more specific sets of actions that those who oversee or manage federal efforts can consider when analyzing opportunities to enhance national disaster resilience. For example, according to the framework, bringing together disparate agency missions and resources that support disaster risk reduction can help to build a national culture of resilience. Accordingly, federal efforts can (1) facilitate coordination across programs, (2) facilitate the combination of federal funding streams, and (3) leverage the expertise of nonfederal partners. Information on the benefits and costs of climate resilience projects suggests that such projects can convey benefits, such as protecting life and property from climate hazards, according to the Fourth National Climate Assessment and other reports we reviewed. According to the Fourth National Climate Assessment, information on benefits is lacking in many sectors, though some information exists on the benefits and costs of resilience efforts in certain sectors, such as resilience efforts in coastal areas, resilience efforts designed to protect against riverine flooding (i.e., flooding that occurs when river flows exceed the capacity of the river channel), and resilience efforts related to agriculture at the farm level. According to this assessment, some of the actions in these sectors, at least in some locations, appear to have large benefit-cost ratios—both in addressing current variability and in preparing for future change. However, benefits may not exceed costs in some instances. According to the Fourth National Climate Assessment, more research is needed to comprehensively assess the benefits of specific strategies that individuals and organizations are considering. Similarly, several other reports we reviewed also suggest that projects can convey benefits such as protecting life and property from climate hazards. For example, a 2018 interim report by the National Institute of Building Sciences estimated that benefits to society (i.e., homeowners and communities) would exceed costs for several types of resilience projects by protecting lives and property and preventing other losses, though precise benefits are uncertain. Specifically, this interim report examined a sample of hazard mitigation grants awarded by FEMA, the Economic Development Administration, and the Department of Housing and Urban Development (HUD) from 1993 through 2016 to address various hazards. These hazards included fires in the wildland-urban interface (i.e., fires in areas where homes are built near or among lands prone to wildland fire), hurricane- and tornado-force winds, and riverine floods. According to the interim report, for every grant dollar the federal government spent across the projects examined in the report, over time, society is estimated to accrue benefits amounting to the following: About $3 on average from projects addressing the effects of fire in the wildland-urban interface, with most benefits (approximately 70 percent) coming from the protection of property (i.e., avoiding property losses). About $5 on average from projects to address hurricane- and tornado- force winds, with most benefits (approximately 90 percent) coming from the protection of lives. This includes avoiding deaths, nonfatal injuries, and cases of post-traumatic stress. About $7 on average from projects that buy out buildings prone to riverine flooding, with most benefits (approximately 65 percent) coming from the protection of property. The interim report also projected that society could accrue benefits amounting to about $11 on average for every dollar invested in designing new buildings to meet the 2018 International Building Code and the 2018 International Residential Code—the model building codes developed by the International Code Council—with most benefits (about 45 percent) coming from the protection of property. The interim report has been cited by the Congressional Budget Office, in congressional hearings, and in other arenas to describe the benefits of investing in resilience. However, the benefit-cost ratios provided in the interim report are based on a relatively narrow set of disaster-loss data, and the report is not comprehensive. In addition to conveying climate resilience benefits, such as protecting lives and property, climate resilience projects can also convey co- benefits—benefits beyond the primary protective function of resilience projects—according to the Fourth National Climate Assessment and several reports we reviewed. For example, according to a report by the National Academies, restoring coastal wetlands—a type of nature-based resilience project—may reduce an area’s vulnerability to coastal storms but could also provide co-benefits such as increasing biodiversity by creating new breeding grounds for fish and improving recreation and tourism amenities, thereby expanding the total potential benefits of a project. USGCRP officials we interviewed also told us that projects can convey a broad range of other co-benefits, including improvements in economic opportunity, human health, equity, and national security. However, according to the Fourth National Climate Assessment, quantifying these co-benefits can be difficult because different people value benefits differently. Several factors can influence the likelihood that the benefits from resilience projects exceed the cost of implementing and maintaining the projects. For example, benefits from climate resilience projects implemented in high-risk locations, such as areas more exposed to hurricanes, are likely to be higher and therefore exceed project costs than projects implemented in other, lower-risk areas, according to one report we reviewed. Similarly, projects that protect high-value assets may also be more likely to have benefits that exceed costs, according to this report. Several factors that affect the extent to which project benefits exceed costs remain uncertain, according to several reports. For example, according to the Fourth National Climate Assessment, benefit–cost ratios can have large uncertainties associated with estimates of costs, the projection of benefits, and the economic valuation of benefits. Furthermore, according to the assessment, the benefits and costs of resilience projects are larger in scenarios with high emissions, but the level of future emissions remains uncertain. Individual federal agencies have provided ad hoc funding for projects that may convey some climate resilience benefits, but our past work demonstrates an absence of government-wide strategic planning for climate change, and the federal government has not implemented key recommendations to improve strategic planning for climate resilience. In addition, the federal government does not have a strategic federal approach for investing in the highest priority climate resilience projects that includes periodically identifying and prioritizing projects as supported by enterprise risk management practices and our Disaster Resilience Framework. Federal Mainstreaming Efforts Some agencies have made efforts to manage climate change risk within existing programs and operations—a concept known as mainstreaming—and these efforts may convey climate resilience benefits. For example, an agency planning to build a seawall to protect a coastal facility might build it higher to account for rising sea level projections. Alternatively, the U.S. military may consider climate change as part of existing construction plans on coastal installations by, for example, raising a building to include a “sacrificial” first floor and protecting critical assets—such as computer servers—from potential flooding by locating them on the building’s higher floors. The agency may use the sacrificial floor for parking. According to the U.S. Global Change Research Program’s Fourth National Climate Assessment, a significant portion of climate risk can be addressed by mainstreaming, which can provide many climate resilience benefits. However, according to the assessment, the practice may prove insufficient to address the full range of climate risks. Additional, strategic federal investments in large-scale projects—such as those discussed in our report—may also be needed to manage some of the nation’s most significant climate risks, since climate change cuts across agency missions and poses fiscal exposures larger than any one agency can manage. aim to reduce flooding and storm damage. These and other projects have the potential to convey climate resilience benefits by protecting communities from damage from flooding, storms, and other extreme weather events that may be exacerbated by climate change. The Corps of Engineers’ policy is to integrate climate change preparedness and resilience in all activities—a concept known as mainstreaming. However, the Corps’ civil works program balances several diverse missions related to navigation, ecosystems management, and flood control, among others. As a result, while projects may individually incorporate consideration of climate change risk and resilience, they may not be prioritized to address the most severe expected future climate change risks. Even with ad hoc agency efforts, federal investment in projects specifically designed to enhance climate resilience to date has been limited. As stated in our Disaster Resilience Framework, most of the federal government’s efforts to reduce disaster risk are reactive, and many revolve around disaster recovery. To a lesser extent, the federal government also invests in activities to reduce risks not associated with a specific, recent disaster. As we reported in April 2018, since 1993 OMB has reported more than $154 billion spread across the government for federal activities to understand and address climate change. However, over that time frame, OMB reported only minimal funding directed specifically at climate resilience projects. We have issued multiple reports that review the federal government’s approach to addressing climate change, and these reports demonstrate an absence of government-wide strategic planning for climate change. Specifically, our past work identifies limitations related to strategic planning for climate change that include a lack of coordination, prioritization, and consolidation of strategic priorities. For example, we reported in October 2009 that the federal government’s emerging climate resilience activities were carried out in an ad hoc manner and were not well coordinated across federal agencies. In May 2011, we reported that federal officials did not have a shared understanding of strategic government-wide priorities related to climate change. In the same report, we found that there was not a consolidated set of strategic priorities integrating climate change programs and activities across the federal government. In our March 2019 high-risk update, we reported that one area of government-wide action needed to reduce federal fiscal exposure is in the federal government’s role as the leader of a strategic plan that coordinates federal efforts and informs state, local, and private-sector action. For this 2019 high-risk update, we assessed the federal government’s progress since 2017 related to climate change strategic planning against five criteria and found that the federal government had not met any of the criteria for removal from the high-risk list. Specifically, since GAO’s 2017 high-risk update, four ratings regressed to “not met” and one remained unchanged as “not met.” (See fig. 2). We have made 62 recommendations related to the climate change high-risk area, 17 of which address improving federal climate change strategic planning. As of August 2019, no action had been taken toward 14 of those 17 recommendations—one dating back to 2003. Executive Order 13783, Promoting Energy Independence and Economic Growth (Mar. 28, 2017). Executive Order 13653, Preparing the United States for the Impacts of Climate Change (revoked) (Nov. 6, 2013). Executive Order 13834, Efficient Federal Operations (May 17, 2018). Executive Order 13693, Planning for Federal Sustainability in the Next Decade (revoked) (Mar. 19, 2015). The Mitigation Framework Leadership Group, an intergovernmental coordinating body, finalized the National Mitigation Investment Strategy in August 2019. However, as noted, our review of the strategy indicates that it does not include a detailed strategic approach to prioritize investments for disaster risk reduction that explicitly accounts for future climate change risks. According to FEMA officials, the strategy sets goals and recommendations that set the stage for developing approaches to address changing conditions. GAO, Climate Change: Improvements Needed to Clarify National Priorities and Better Align Them with Federal Funding Decisions, GAO-11-317 (Washington, D.C.: May 20, 2011); Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure, GAO-17-720 (Washington, D.C.: Sept. 28, 2017); and Climate Change: Analysis of Reported Federal Funding, GAO-18-223 (Washington, D.C.: Apr. 30, 2018). GAO, High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas, GAO-19-157SP (Washington, D.C.: Mar. 6, 2019). The federal government does not have a strategic approach for investing in climate resilience projects—that is, an intentional, cross-cutting approach in which the federal government identifies and prioritizes projects for the purpose of enhancing climate resilience. Federal agencies may take actions to invest in projects with potential climate resilience benefits related to their own mission areas using funds from federal programs designed for other purposes. In addition, the National Climate Assessment provides high-level information on what is known about observed and projected climate risks in the United States. However, no federal entity looks holistically at the federal government’s investments to strategically prioritize projects to ensure they address the nation’s most significant climate risks and provide the highest net benefits relative to other potential projects. Several stakeholders told us that the federal government’s emphasis has been on funding post-disaster efforts instead of funding resilience projects before a disaster occurs. This is consistent with findings from our July 2015 report that most federal funding for hazard mitigation is only available after a disaster. In addition, according to FEMA officials, some of the agency’s hazard mitigation programs are designed to empower state and local governments to determine their mitigation funding priorities, and these state and local priorities may or may not align with the federal interest. Although we did not identify a government-wide strategic approach specifically for investing in climate resilience projects, the National Mitigation Investment Strategy—a national effort under way to plan for pre-disaster resilience investments—represents a potential cross-agency vehicle for climate resilience planning. However, the strategy does not specifically address climate change or identify and prioritize specific climate resilience projects. In July 2015, we recommended that the Mitigation Framework Leadership Group—a multi-agency group led by FEMA to promote coordination of hazard mitigation efforts across the federal government—establish an investment strategy to identify, prioritize, and guide federal investments in disaster resilience and hazard mitigation-related activities and make recommendations to the President and Congress on how the nation should prioritize future disaster resilience investments. In response, in August 2019, the Mitigation Framework Leadership Group released a national strategy for advancing mitigation investment in the United States and increasing the nation’s resilience to natural hazards. The strategy acknowledges our 2015 recommendation and articulates several high-level recommendations that relate generally to climate resilience, including aligning program requirements and incentives. Specifically, the strategy states that successful risk mitigation requires shared priorities, consistent approaches, aligned funding, expanded incentives, and coordination between the federal government and nonfederal partners (i.e., state, local, tribal, and territorial governments and nonfederal organizations). However, the strategy does not explicitly address future climate change risks or include a strategic approach to identify and prioritize specific climate resilience projects for federal investment. According to FEMA officials, the strategy provides an overarching framework that can accommodate strategic investment related to changing conditions that impact disaster resilience. FEMA officials also told us that specific implementation strategies will be addressed in a later phase of the high- level strategy. While current federal climate resilience investments are ad hoc and not aligned with the nation’s most significant climate risks, our past work and other sources show that an iterative and strategic risk-informed approach for identifying and prioritizing climate resilience projects could better target federal investment. In particular, in December 2016, we reported that enterprise risk management—which involves identifying and assessing risks, as well as preparing appropriate risk responses—can help federal agencies manage risks, such as preparing for and responding to natural disasters. Elements of enterprise risk management call for reviewing a prioritized list of risks and selecting the most appropriate strategy to manage those risks. Furthermore, according to our 2019 Disaster Resilience Framework, the integration of strategic resilience goals across relevant national strategies can help decision makers work toward a common vision and help ensure focus on a wide variety of opportunities to reduce disaster risk. For example, our framework states that in some cases federal efforts have been hindered by multiple agencies pursuing individual efforts without overarching strategies. In addition, the National Academies highlights the importance of an iterative approach to prioritizing climate resilience actions. According to the National Academies, many current and future climate change impacts require immediate actions to improve the nation’s ability to adapt, and possible options need to be prioritized based on where and when urgent action is needed. In addition, because knowledge about future impacts and effectiveness of response options will evolve, policy decisions to manage climate change risks can be improved if they are made in an iterative fashion, according to the National Academies. However, no federal entity has been established to implement a strategic investment approach for climate resilience that includes identifying and prioritizing projects for federal investment in an iterative fashion. According to FEMA officials, without Congressional direction, no federal entity will identify and prioritize climate resilience projects for federal investment because existing federal programs are not designed to serve this purpose. Furthermore, investments by federal agencies are made according to their missions and operations within the federal investment guidelines put forth by OMB, according to officials from the Mitigation Framework Leadership Group. These officials explained that by law, agencies cannot make other investments, which hinders a more formalized climate resilience investment strategy at the agency level. Several stakeholders told us that a strategic approach would allow for a more purposeful, coordinated, and comprehensive federal response to climate risks. Such an approach could help target federal resources toward high-priority projects—namely, those that address the nation’s most significant climate risks and provide the greatest expected net benefits relative to other potential projects—that are not already addressed through existing federal programs. In particular, a strategic and iterative risk-informed approach for identifying and prioritizing climate resilience projects for federal investment could supplement the agency- specific approaches to climate resilience investment currently carried out by individual agencies with different statutes, goals, constituencies, and funding streams. Such an approach presents an opportunity to enhance the nation’s resilience to climate change and reduce federal fiscal exposure. Six key steps provide an opportunity for the federal government to strategically identify and prioritize climate resilience projects, based on our review of reports (including a National Academies report and the Fourth National Climate Assessment) that discuss adaptation as a risk management process, international standards, our past work (including our enterprise risk management criteria), and interviews with stakeholders. The six key steps are (1) defining the strategic goals of the climate resilience investment effort and how the effort will be carried out, (2) identifying and assessing high-risk areas for targeted resilience investment, (3) identifying potential project ideas, (4) prioritizing projects, (5) implementing high-priority projects, and (6) monitoring projects and climate risks. See Figure 3. We use domestic and international examples—the Louisiana coastal master planning effort and the Canadian Disaster Mitigation and Adaptation Fund (DMAF), respectively—and the aforementioned sources to illustrate the six key steps for identifying and prioritizing climate resilience projects (see text box). Domestic and International Examples of Approaches for Identifying and Prioritizing Climate Resilience Projects Two efforts—the Louisiana coastal master planning effort and the Canadian Disaster Mitigation and Adaptation Fund—illustrate approaches for identifying and prioritizing resilience projects. The scale and purpose of each of these approaches is distinct, but both seek to identify projects that help enhance community resilience to several emerging risks, including risks associated with climate change. Louisiana coastal master planning process: In 2005, the state of Louisiana consolidated coastal planning efforts previously carried out by multiple state and local entities into a single effort carried out by the Coastal Protection and Restoration Authority (CPRA). In this effort, CPRA periodically identifies high-priority coastal resilience projects designed to reduce flood risk and coastal land loss. With involvement from stakeholders from private industry and local communities, CPRA has published three coastal master plans in which it identified and evaluated potential projects. In Louisiana’s 2017 Comprehensive Master Plan for a Sustainable Coast, CPRA identified $50 billion in high-priority projects to be implemented as funding becomes available. Canadian Disaster Mitigation and Adaptation Fund: In 2018, the federal government of Canada launched the Disaster Mitigation and Adaptation Fund (DMAF), which seeks to enhance resilience by addressing the potential impacts of climate change in Canada. Canada’s DMAF is a financial assistance program that provides funds to other entities (e.g., Canadian provinces and territories, not-for-profit and for-profit organizations, local governments, and indigenous communities) for implementation. This US$1.5 billion fund will provide contributions over 10 years for large-scale, nationally significant projects that address a myriad of risks triggered by natural hazards such as floods, wildfires, and droughts. The DMAF also encourages partnerships between eligible recipients, according to a DMAF official. Canada’s DMAF effort is under way. Reports, our past work, stakeholders, and our examples from Louisiana and Canada illustrate the importance of several steps to define the climate resilience investment effort, including defining the efforts’ strategic goals, designating an entity and providing authority for it to lead the effort, identifying participants and defining responsibilities, and determining how the effort will be funded. Clear strategic goals can yield more effective decisions about which projects to prioritize and increase the likelihood that projects are strategically aligned around a common purpose. In October 2011, we reported that strategic goals explain the purpose of agency programs and the results that they intend to achieve. Our domestic and international examples also demonstrate the importance of having defined strategic goals. Specifically, Louisiana’s Coastal Protection and Restoration Authority (CPRA) defined five goals to guide its coastal master planning effort: reducing economic losses to homes and business from storm surge-based flooding, promoting sustainable coastal ecosystems, providing habitats for a variety of commercial and recreational activities across the coast, sustaining coastal Louisiana’s cultural heritage, and maintaining a viable working coast to support businesses and industry. The goal of Canada’s DMAF is to strengthen the resilience of Canadian communities through investments in large-scale infrastructure projects of national importance—including natural infrastructure projects—enabling these communities to better manage the risk associated with current and future natural hazards such as floods, wildfires, and droughts. This includes natural hazards that may be exacerbated by climate change. Several stakeholders we interviewed identified potential strategic goals for a federal climate resilience investment effort, including increasing the resilience of communities to climate hazards and reducing federal fiscal exposure to climate change. Furthermore, several stakeholders explained that a goal of federal resilience investment should include helping communities that do not have the capacity to implement climate resilience projects on their own for various reasons such as limited funds to plan and implement such projects. According to one stakeholder we interviewed, because the federal role in investing in climate resilience projects could be broad, it will be necessary to precisely define the nature and scope of the funding effort in a way that is manageable, potentially restricting funding to resilience projects that would not occur without federal intervention. For example, federal resilience investment could focus on large-scale, long-term climate resilience projects that are otherwise too big, expensive, or cross-jurisdictional for local, state, or private-sector actors to address, according to several stakeholders. Based on our review of several reports and past GAO work and discussions with several stakeholders, various types of entities could lead a federal climate resilience investment effort. This could include various organizational arrangements such as a federal entity or interagency collaborative effort—task forces, special councils, interagency offices, or interagency working groups led by agency and department heads or program-level staff. According to one stakeholder we interviewed, a federal climate resilience investment effort would need a high level of political support to be effective. Several other stakeholders explained that clear authority for the entity to conduct its work would be important to provide legitimacy for the effort and create buy-in among participants and the public. Authority for conducting a resilience effort could be provided via a legislative mandate or executive order. For example, in the case of Louisiana, the state legislature passed a law establishing CPRA, a state agency, in 2005 and providing it with a mandate to develop, implement, and enforce a comprehensive coastal protection and restoration master plan. Identifying participants and defining responsibilities could involve identifying an interdisciplinary team of experts to help evaluate climate risk, generate project ideas, and evaluate projects. According to several stakeholders, experts should have a breadth of expertise in disciplines such as climate science, resilience, social sciences (e.g., economics), engineering, finance, urban planning, infrastructure, and knowledge of affected systems (e.g., transportation systems, public health, and ecosystems). Several reports and several stakeholders also identified the importance of involving representatives from the communities and groups impacted by potential projects, explaining that doing so can increase support for the process and help ensure projects meet communities’ needs. For example, a CPRA official told us that building trust and communicating projects’ necessity with external stakeholders is extremely important when prioritizing projects because some stakeholders will be directly impacted by certain projects. For this reason, according to CPRA officials, CPRA conducted extensive outreach with community groups and other stakeholders to understand their perspectives on projects under consideration and their potential impacts. In addition, past GAO work identifies agreement on roles and responsibilities as one of several practices to enhance and sustain collaborative efforts. According to our September 2012 report, this includes considering clarity of roles and responsibilities and articulating and agreeing to a process for making and enforcing decisions. Determining how the effort will be funded includes identifying potential funding options (discussed later in this report) and establishing a budget for investments in resilience projects. Based on the domestic and international examples we reviewed, there are different ways to identify a budget for resilience projects. The budget for Canada’s DMAF—the equivalent of about US$1.5 billion over 10 years—was established through the Canadian budget process. In contrast, Louisiana’s CPRA used economic analysis to identify the optimal budget for the coastal master planning effort—$50 billion—with funds for specific projects to be solicited from various federal and nonfederal sources. High-risk areas for targeted resilience investment could include regions of the country at high risk for climate hazards, economic sectors at high risk (e.g., agriculture, health, or energy), or severe or costly expected climate hazards (e.g., sea level rise), based on our review of several reports, illustrative examples, and interviews with several stakeholders. According to the National Academies and several stakeholders we interviewed, climate resilience actions should address climate hazards that are acute (e.g., the risk of more frequent or intense extreme weather) and chronic (e.g., sea level rise). In Louisiana, CPRA identified two climate risks—flooding risk and loss of coastal land—for targeted resilience investment. The U.S. Climate Resilience Toolkit, a website designed to help people find and use tools, information, and subject matter expertise to build climate resilience, and several reports we reviewed identified several factors that influence a community’s level of climate risk. This information can help decision makers identify high-risk areas for targeted resilience investment. First, a community’s exposure is influenced by the population or assets exposed to a potential climate hazard (e.g., sea level rise, wildfire). For example, according to the Fourth National Climate Assessment, the expansion of human activity into forests and other wildland areas has been observed over the past few decades and is expected to further increase the exposure of people and property to fire risk. Second, the level of expected impact a community faces from a given climate hazard is influenced by the probability of a given climate hazard and its expected magnitude. Third, a community’s vulnerability to these hazards is influenced by its sensitivity to a given climate risk and its adaptive capacity—the ability to cope with stress or adjust to new situations. An area with high exposure but low sensitivity to a given climate hazard may have lower overall risk than an area with lower exposure to the same hazard but higher sensitivity. The degree of adaptive capacity can also serve to increase or decrease risks. For example, according to the Fourth National Climate Assessment, tribal nations are especially vulnerable to climate change because of their reliance on threatened natural resources for their cultural, subsistence, and economic needs. We reported in September 2017 that while estimates of the economic effects of climate change are imprecise due to modeling and information limitations, they can convey useful insight into broad themes about potential damages in different U.S. sectors or regions. This information could help decision makers identify significant climate risks as an initial step toward managing them and provide insight into high-risk areas for targeted investment. For example, we reported in September 2017 that the two national-scale studies available at the time that examined the economic effects of climate change across U.S. sectors suggested that the potential economic effects of climate change could be significant and unevenly distributed across sectors and regions. According to one of the studies, the Southeast, Midwest, and Great Plains regions likely will experience greater combined economic effects than other regions, largely because of coastal property damage in the Southeast and changes in crop yields in the Midwest and Great Plains. (See fig. 4). In addition, several stakeholders told us that USGCRP’s National Climate Assessment, which describes potential climate change risks to the United States, could help inform decisions about which regions of the country or climate risks to target for resilience investment. In addition, the Notre Dame Global Adaptation Initiative has developed an interactive database that provides information on the level of climate risk U.S. cities face and these cities’ readiness to enhance resilience. Nevertheless, one official from the Mitigation Framework Leadership Group noted that identifying climate risks is challenging, in part, because opinions about which risks are most urgent will vary according to the perspective of the observer. According to the National Academies, even though there are still uncertainties about the nature, timing, and magnitude of climate change impacts, mobilizing now to increase the nation’s resilience can be viewed as an insurance policy against climate change risks. Identifying potential project ideas that align with high-risk areas for targeted resilience investment is the third step in the process for identifying and prioritizing climate resilience projects for federal investment. Potential projects may differ in purpose and location and could include constructing hard infrastructure (e.g., flood defenses such as seawalls) and natural infrastructure (e.g., wetlands in coastal areas) to protect against climate hazards, relocating a community out of harm’s way, or developing a suite of projects designed to collectively address a climate hazard (e.g., wildfire risk or drought) in a particular region of the country, according to several stakeholders we interviewed and based on our review of several reports. From our interviews with several stakeholders and our review of our examples from Canada and Louisiana, we noted two methods for identifying ideas for resilience projects—”bottom up” and “top down”—that can be used individually or in combination. Several stakeholders told us that project ideas could come from a “bottom-up” method in which the federal government seeks proposals from tribal, state, and local governments; regional groups; or other stakeholders for projects. For example, Infrastructure Canada, the federal department that administers the DMAF, sought project ideas from provinces, territories, municipal and regional governments, indigenous groups, and others. Under the DMAF, these entities applied directly to Infrastructure Canada for funding. Likewise, in Louisiana, CPRA also used a “bottom-up” method to identify projects by allowing citizens, state agencies, nongovernmental organizations, academics, and others to submit project ideas. Where necessary, staff at CPRA developed the more detailed plans needed to evaluate and operationalize the projects. CPRA officials said that involving the communities where climate resilience projects will be located in the project identification process helped create support for these projects. Two stakeholders explained that the process for identifying potential project ideas must be sensitive to the fact that some communities do not have the administrative capacity to develop proposals. Otherwise, project ideas will primarily come from communities with ample institutional capacity, and locations with less administrative capacity—and the climate risks associated with these locations—will be missed. According to a 2014 report by the President’s State, Local, and Tribal Leaders Task Force on Climate Preparedness and Resilience, the federal government can drive more resilient community choices by, among other things, providing technical assistance to states, territories, tribes, and communities that lack capacity to adapt to climate change. In 2014, HUD launched the National Disaster Resilience Competition to fund disaster recovery and long-term community resilience in parts of the country that had recently been affected by major disasters. During the first phase of the competition, eligible states and communities impacted by a disaster from 2011 through 2013 could obtain technical assistance through resilience workshops. According to HUD, these workshops provided information and expertise to help communities understand resilience and identify various threats, hazards, economic stresses, and other potential shocks that could impact each community. The workshops also offered eligible applicants tools and concepts to better identify and assess their risk, engage with their communities, choose resilience- building opportunities, and develop strong applications. Several stakeholders told us that projects could be identified through a “top-down” method, in which potential projects would be identified by an interdisciplinary group of federal officials and other experts. According to one stakeholder, a “top-down” method could facilitate consideration of cross-cutting projects that address multiple climate risks and regions of the country. In addition, according to two stakeholders, such a top-down method could help identify projects unlikely to be suggested by local stakeholders for various reasons, such as the local communities not having the administrative capacity to develop and submit such proposals or a local community’s interest being at odds with the national interest (e.g., relocation of a high-risk community when relocation would result in the loss of local tax revenue). However, officials from the Mitigation Framework Leadership Group explained that without the involvement of communities and prioritization of local needs, a top-down approach could be viewed as disconnected from community needs. In Louisiana, CPRA supplemented its “bottom-up” method with “top-down” identification of additional potential projects by, among other things, reconsidering past project proposals that were not selected and working with stakeholders to design potential projects. Prioritizing projects is the fourth key step in the process for identifying high-priority projects for federal investment. Based on our review of several reports and interviews with several stakeholders, prioritizing projects for federal investment should involve evaluating individual projects using scientific and data-based processes. For example, according to a 2010 report by the National Academies, managing risk in the context of enhancing resilience to climate change involves using the best available social and physical science to understand the likelihood of climate impacts and their associated consequences and then selecting and implementing the response options that seem most effective. Stakeholders we interviewed, the Louisiana example, and our past work indicate the need to solicit feedback from communities on the potential impacts of proposed projects. Furthermore, according to several stakeholders we interviewed, projects should be prioritized by an independent, interdisciplinary group of experts capable of assessing projects against measurable criteria. For example, according to Canadian officials, Infrastructure Canada seeks considerations on potential projects from two committees of experts: the first one is comprised of a panel of experts from other federal departments, and the other is comprised of nonfederal experts, including urban planners, sustainability professionals, and individuals with various regional expertise. We identified several potential criteria and tools that could be used to evaluate projects and identify those that are high priority, as described below. We identified various potential criteria for evaluating projects and assigning priority for federal investment, based on our review of reports, interviews with stakeholders, and the Louisiana and Canadian examples. Potential criteria fell into three general categories: goal-oriented criteria (i.e., criteria that measure the extent to which a project enhances resilience and meets other goals), efficiency criteria (i.e., criteria that measure a project’s ability to maximize efficiency, including by maximizing benefits and minimizing costs), and administrative criteria (i.e., other criteria that program administrators may want to consider). See table 1 for more details. The federal government can select a limited number of criteria for evaluation that align with the overall strategic goals of the climate resilience investment effort, based on our discussions with stakeholders. Goal-oriented criteria. We identified several goal-oriented criteria— criteria that measure the extent to which a project enhances resilience to climate change and meets other goals—that decision makers may want to consider when evaluating which projects to prioritize, based on several reports we reviewed and stakeholders we interviewed. Several reports and several stakeholders suggested prioritizing projects that, among other things, focus on severe or costly climate hazards as well as climate hazards about which there is the most scientific certainty. Several stakeholders we interviewed explained that when prioritizing projects for implementation, it is important to consider a project’s potential to enhance resilience by protecting human lives, health, and safety, and assets that are critical, high- value, or culturally significant. In addition, several stakeholders told us that decision makers should not place too much emphasis on the monetary value of avoided property losses from a project because doing so can overemphasize projects that protect high-value assets and leave socially vulnerable populations with limited economic resources less protected. According to one report, the loss of assets is more difficult for a poor household to absorb than a wealthy household that has more assets to begin with and more access to insurance and credit. Similarly, the Fourth National Climate Assessment notes that poor or marginalized populations often face a higher risk from climate change because they live in areas with higher exposure, are more sensitive to climate impacts, or lack the capacity to respond to climate hazards. Several stakeholders told us that to account for a lack of social equity, it is important to prioritize projects in communities that have limited capacity to enhance resilience without federal financial assistance, including communities with limited financial means. In addition to these factors, several reports and several stakeholders discussed the importance of considering a project’s impacts on the environment, including its ability to protect unique or sensitive environmental habitats or species. Finally, several reports discussed the importance of considering the potential system-wide impacts of a project, including a project’s potential to provide benefits as well as the potential that risk may be transferred to neighboring communities. The DMAF applicant’s guide provides an example of potential risk transfer, explaining that the construction of new dikes along a river to protect a segment of the floodplain may confine the river, raising water levels upstream and increasing the velocity of the river downstream. This may reduce the hazard in the segment of river immediately adjacent to the structure but will transfer risk to upstream and downstream communities. Efficiency criteria. We identified several efficiency criteria—criteria that measure a project’s ability to maximize net benefits—that decision makers may want to consider when evaluating which projects to prioritize. Several reports we reviewed identified the importance of considering how a project’s expected benefits compare to its costs to help ensure a project represents an efficient use of federal dollars. With respect to costs, one stakeholder identified the importance of considering the current costs of implementing a project as well as how costs might change in the future if a project’s implementation is delayed to a later date. With respect to benefits, several stakeholders indicated that while it can be difficult to estimate the monetary value of some benefits, it is important to consider all expected benefits— including co-benefits—as fully as possible to draw accurate conclusions about how a project’s benefits compare to its costs. For example, several stakeholders discussed the need to account for future benefits because much of the value of a climate resilience project may be realized far in the future as climate risks become more pronounced. In addition, several reports identified ways to account for uncertainty about the specific nature of future climate risks when making decisions about which projects to prioritize. This includes, for example, prioritizing projects that provide benefits under a wide range of future climate scenarios or prioritizing projects that can be modified if future climate conditions are different than expected. In addition to these considerations, several stakeholders also suggested considering the long-term viability of communities being helped by a project. These stakeholders explained that some communities may face climate risks that are so severe over the long term that they preclude cost-effective investments in resilience. They explained that rather than make costly resilience investments in these communities, a more efficient use of federal funds might involve making investments in projects that help transition a community to a safer location. Similarly, according to a 2015 study by the U.S. Army Corps of Engineers, given current and projected sea level and climate change trends, some of the built environment will become unsustainable for communities presently located there, which may mean that communities may have to relocate in a responsible manner to sustain their economic viability and social resilience. Another stakeholder suggested prioritizing resilience projects that are unlikely to be funded without federal investment, such as projects for the public good that do not generate revenue and likely would not attract private investors. Administrative criteria. We identified several additional criteria that federal decision makers investing in climate resilience projects may want to consider when evaluating which projects to prioritize, including whether the project is feasible and timely. One stakeholder identified the importance of using federal dollars to invest in projects with novel resilience techniques since these projects otherwise might be unlikely to receive investment from other sources. For example, the Canadian DMAF awards merit to projects that offer effective solutions through unique innovative ideas. One stakeholder suggested that the federal government may want to consider the overall distribution of projects across hazards and regions to ensure that all hazards and regions of the country are getting at least some investment in resilience. Based on our review of several reports and illustrative examples, various tools used individually or in combination could help decision makers evaluate projects in order to identify high-priority ones and visualize project trade-offs. For example, using multi-criteria analysis involves decision makers identifying potential criteria, assigning weights to the criteria, ranking proposed projects against the weighted criteria, and using the results to compare projects and inform decisions about which projects to implement. In Canada, officials with the DMAF use multi-criteria analysis to rank potential resilience projects against multiple criteria including the extent to which projects strengthen community resilience and reduce the impacts of natural disasters. Quantitative modeling is another tool that can help decision makers visualize the potential benefits and costs of proposed projects under multiple future climate change scenarios, and thus facilitate identification of high-priority projects. For example, in Louisiana, CPRA used computer modeling tools to evaluate how projects could reduce future land loss and flooding risk, among other effects. To account for uncertainty about future climate and economic conditions, the modeling tools estimated project outcomes under multiple future scenarios representing varied climate conditions (e.g., sea level rise and the frequency and intensity of storms), economic growth conditions, and other factors. According to the Comprehensive Master Plan for a Sustainable Coast, information from the modeling tools helped support deliberations between CPRA and coastal stakeholders that helped identify high-priority projects for implementation. High-priority resilience projects can be implemented as funds become available, while decision makers consider the optimal timing of project implementation. For example, in Louisiana’s coastal master planning effort, CPRA identified $50 billion in projects to be implemented as various federal and nonfederal funding sources become available. CPRA sequences project implementation based on project effectiveness and benefits in the near term or the long term. See figure 5 for completed, ongoing, and planned projects. Project implementation may be influenced by the presence of “windows of opportunity”—periods of time when outside factors make it advantageous or cheaper to implement a project, based on our review of several reports. For example, according to the Fourth National Climate Assessment, many jurisdictions and businesses have significant stocks of aging transportation, water, energy, housing, and other infrastructure, and new infrastructure investments and capital stock turnover provides one particularly favorable opportunity for low-cost, proactive climate resilience investment. In addition to the availability of funding and windows of opportunity, projects may also need final approval from a decision-making entity—the Minister of Infrastructure, in the case of Canada’s DMAF— before implementation. In the case of Louisiana, the state legislature must approve the overall master plan, although, according to a CPRA official, the legislature does not approve the inclusion of individual projects or project concepts. Monitoring the projects being implemented and the state of climate risks can provide information to inform future decisions about high-priority climate resilience projects for federal investment. According to the 2010 report by the National Academies, policy decisions to manage risk can be improved if they incorporate the concept of “adaptive management”— monitoring progress in real time and changing management practices based on learning about and recognizing changing conditions. As an example, Louisiana’s CPRA monitors the performance of projects and the condition of the Louisiana coast using the results from these activities to adjust project management actions and inform future coastal master planning efforts. We identified two options for focusing federal funding on high-priority climate resilience projects—coordinating funding provided through multiple existing federal programs with various purposes and creating a new federal funding source specifically for high-priority climate resilience projects—and these options have strengths and limitations. In addition, our analysis of these sources identified opportunities to increase the climate resilience impact of these two funding options. Options for focusing federal funding on high-priority climate resilience projects—coordinating funding provided through multiple existing federal programs with varied purposes and creating a new federal funding source specifically for high-priority climate resilience projects—have strengths and limitations, based on our review of our prior work, relevant reports, and the Louisiana and Canadian examples, as well as interviews with stakeholders. See table 2. One option for focusing funding on high-priority climate resilience projects involves coordinating funds from multiple existing federal programs with varied purposes that were not designed specifically for climate resilience but whose purpose may be compatible with these projects. For example, the state of Louisiana’s coastal master planning effort uses multi-program coordination to fund projects. Specifically, funding for high-priority resilience projects identified in the master plan is provided via several federal and nonfederal programs designed for wetlands restoration, hurricane risk reduction, oil spill recovery, and community development, among other purposes, when the program’s purpose aligns with the project’s purpose. For example, the National Fish and Wildlife Foundation Gulf Environmental Benefit Fund—established in early 2013 as an outcome of plea agreements for the Deepwater Horizon explosion and oil spill—has been used to fund some projects consistent with the master plan that restore barrier islands and implement river diversions. Administrators of these federal and nonfederal funding programs, rather than CPRA, make decisions about how funds are to be spent, but they coordinate with CPRA to ensure decisions are consistent with the master plan. As with the Louisiana example, high-priority climate resilience projects could be funded via one or more federal programs compatible with the project’s purpose. We identified federal programs related to flood control and hazard mitigation that could be used to fund individual projects that may convey climate resilience benefits, including FEMA’s hazard mitigation assistance programs (i.e., Building Resilient Infrastructure and Communities, Pre-Disaster Mitigation, Flood Mitigation Assistance, and Hazard Mitigation Grant programs), HUD’s Community Development Block Grant Disaster Recovery program, and the U.S. Army Corps of Engineers’ civil works program. These programs are managed individually within their agencies and operate under different statutory authorities. However, no federal entity oversees funding for high-priority climate resilience projects, for example, by identifying which existing federal programs could be used to fund particular high-priority projects and coordinating the use of these programs to fund particular projects. Based on our review of the Louisiana example, interviews with stakeholders, and a report we reviewed, we identified several strengths of coordinating multiple existing federal programs with varied purposes to fund high-priority climate resilience projects: Leveraging existing programs. This option leverages an existing architecture of related federal programs and could encourage consideration of climate change in routine agency decisions, based on our interviews with several stakeholders and review of a related report. The federal government already has programs that address natural resources (e.g., coastlines, water resources, and forests) and human systems (e.g., public health, housing, and infrastructure) that will be affected by climate change, according to a 2010 report we reviewed and two stakeholders we interviewed. According to this report and stakeholders, rather than create an additional program to address climate change, it would be better to incorporate consideration of climate change into existing federal decision-making processes. Providing funding for high-priority climate resilience projects via existing federal programs could encourage agencies to think more intentionally about climate change on a regular basis when implementing their programs, according to several stakeholders we interviewed. Providing access to specialists and expertise. Federal officials who have specialized, sector-specific knowledge (e.g., infrastructure, agriculture, or ecosystems) that can be useful when evaluating which projects to fund may have a greater opportunity to provide input if funding decisions are made within existing federal programs, according to several stakeholders. According to one stakeholder, specialized knowledge that resides within federal agencies is necessary when evaluating the trade-offs of potential projects that address diverse systems and assets. This stakeholder explained that, for example, evaluating a project to strengthen a shipping port against hurricanes requires different expertise than evaluating a project to protect the surrounding community against these hurricanes, and agency officials’ specialized knowledge would be useful in evaluating the value of such distinct projects. Providing access to multiple funding sources. Using multiple existing federal programs means that multiple potential funding streams are available for projects. For example, one stakeholder whose community previously used federal funding to implement large- scale resilience projects said that when funding from one program is not available—for example, because the project does not match that program’s purpose or because of insufficient funds—having multiple existing programs from which to seek funding is advantageous. Similarly, Louisiana makes use of multiple federal and nonfederal funding sources to implement projects identified through its master planning effort. On the basis of our review of the Louisiana example, relevant reports, and interviews with stakeholders, as well as our past work—including the Disaster Resilience Framework—we identified several limitations of using existing programs to fund high-priority climate resilience projects: Administratively challenging to coordinate. Several stakeholders and a 2016 report we reviewed identified potential administrative challenges associated with using multiple existing programs with varied purposes to fund high-priority projects. For example, CPRA officials told us that the process of coordinating funding from multiple programs for coastal projects is complicated and requires dedicated staff to identify programs, assess whether projects meet program funding criteria, apply for funds, and ensure that program requirements are met. Several stakeholders told us that the budgets of existing programs may be too limited to fund large-scale climate resilience projects and that acquiring funding for a single project through multiple federal programs can be difficult. For example, FEMA officials told us that a potentially relevant FEMA program—the Pre- Disaster Mitigation Grant Program—has limited overall funding and restricts the financial size of a project, making it challenging to fund large-scale projects such as community relocation. Furthermore, according to a 2016 report about lessons learned from the HUD Rebuild by Design competition, grantees faced challenges combining funds from multiple programs to support comprehensive rebuilding visions because each program had its own procedural and administrative requirements, including different timelines for how and when the funds were made available. Similarly, according to our Disaster Resilience Framework, when multiple programs and activities and multiple funding streams are involved, there is a risk that the array of requirements will increase administrative complexity. As we reported in July 2015, jurisdictional officials engaged in disaster recovery have encountered complex review processes, conflicting federal guidance, and competing federal priorities that diminished the desire of localities to participate in resilience programs. Programs may be siloed. Existing federal programs may be “siloed,” according to several stakeholders and two reports we reviewed, meaning that agencies may have limited visibility over how their projects affect other agencies’ mission areas or a limited ability to consider those effects. The two reports we reviewed identified challenges with siloed agency programs, including that they can discourage more holistic resilience projects with benefits in multiple sectors. For example, according to the 2016 report about lessons learned from the HUD Rebuild by Design competition, program rules may restrict the use of federal funds to certain activities (e.g., flood control), which can make it difficult to justify the additional cost of a more holistic resilience project with benefits in other sectors (e.g., a larger-scale flood control project with water quality co-benefits). According to the National Academies, climate resilience activities have the potential to be redundant or to work at cross purposes if they are not coordinated across sectors, actors, scale, and time frames. For example, the National Academies identified potential tradeoffs between resilience activities in the agricultural, water, and ecosystem sectors, such as increased irrigation in response to drought competing with natural ecosystem flows and domestic water needs. Climate resilience is not the primary focus. Though it may be possible to use some existing federal programs to fund high-priority climate resilience projects, the primary purpose of these programs is not enhancing resilience to climate change, and they are not coordinated toward a common climate resilience goal, according to our work for this report. As a result, relying on existing programs for funding could result in inadvertent, ad hoc funding rather than intentional, coordinated, and strategic funding of high-priority projects, based on our past work and interviews with several stakeholders. In particular, according to FEMA officials, statutory and regulatory limitations could make it challenging to incorporate consideration of climate resilience into existing programs. Furthermore, according to several stakeholders, program funding criteria may not relate directly to climate resilience—this can lower the chance that climate resilience projects will receive funding. In our May 2014 report about DOD’s consideration of climate change in infrastructure planning, we reported that military installation officials rarely proposed climate resilience projects because the services’ criteria for ranking and funding potential military construction projects did not include climate change adaptation. In addition, a 2018 report about federal resilience policy we reviewed and several stakeholders we interviewed identified challenges with how cost-benefit formulas account for future climate risk when evaluating the costs and benefits of a project under consideration. Two stakeholders we interviewed told us that the discount rate—the interest rate used to convert benefits and costs occurring in different time periods to a common present value—used in federal cost benefit formulas may too heavily discount future benefits. They explained that when benefits accrue over long time horizons, this can result in future climate benefits appearing small relative to the current cost of project implementation and thus result in some climate resilience projects not being funded. Existing programs may be reactive, not proactive. Some existing programs—for example, HUD’s Community Development Block Grant Disaster Recovery program and FEMA’s Hazard Mitigation Grant Program—are limited to funding resilience projects after a disaster occurs, which may result in reactive instead of proactive funding, based on our review of our past work and discussions with several stakeholders. We concluded in July 2015 that funding hazard mitigation efforts in a post-disaster environment can create a reactive and fragmented approach in which disasters determine when and for what purpose the federal government invests in disaster resilience. Furthermore, tying climate resilience funding to a disaster can result in projects going unfunded in communities where there has not yet been a disaster but where there are legitimate risks from future climate change impacts—including chronic climate hazards such as sea level rise—according to several stakeholders we interviewed. For example, our past work and several stakeholders identified challenges in accessing funding from existing federal programs to relocate communities threatened by climate hazards, such as Alaskan native villages threatened by flooding and erosion caused by sea level rise. According to our June 2009 report, since many Alaskan native villages facing gradual erosion problems had not received a declared disaster designation, they did not qualify for some FEMA disaster recovery and hazard mitigation programs. In addition, according to a 2016 report we reviewed, disaster recovery programs tend to be reactive and backward looking, focusing on areas immediately affected by a disaster. This can limit the ability of grantees to fund projects that could more holistically reduce the full suite of future risks that a region or community face. Another option for focusing federal funding on high-priority climate resilience projects involves creating a new funding source specifically for such projects. We identified two main ways a new funding source could be designed in the United States: (1) a federal financial assistance program that could provide grants, loans, or loan guarantees to nonfederal entities implementing high-priority climate resilience projects, or (2) a climate resilience infrastructure bank that could combine federal funds with funds from other sources to provide funding to nonfederal entities for implementing high-priority climate resilience projects. The government of Canada employs both of these methods. Specifically, Canada created the DMAF as a one-time, centralized fund of about US$1.5 billion dollars for climate resilience projects over a 10-year period. Applications not eligible for or not selected to receive DMAF funding could be eligible under other infrastructure programs. Projects that could generate revenue are shared with Canada’s Infrastructure Bank for consideration. Based on our review of the DMAF and interviews with stakeholders, we identified several strengths of creating a new funding source for high- priority climate resilience projects: Administrative simplicity. Several stakeholders said that a new funding source avoids the administrative challenge of coordinating multiple funding sources to implement a large project or portfolio of projects. According to two stakeholders, such an option would avoid the challenge of having to utilize multiple programs with varying program rules, solicitation periods, and funding terms. Another stakeholder suggested that a single source would make it easier to track spending on climate resilience projects. Focusing on high-priority climate resilience projects. Several stakeholders said that an advantage of a new funding source is that it would provide dedicated funding for projects undertaken for the explicit purpose of climate resilience. For example, Canadian officials said that with the DMAF, climate resilience projects do not have to compete with other infrastructure projects for funding as they do within other programs administered in Canada that include multiple eligible project categories (e.g., water, wastewater, public transit). Canadian officials told us that this increases the likelihood that large-scale, nationally significant climate resilience projects will be funded. According to another stakeholder, a new funding source for high- priority climate resilience projects would allow for a proactive focus on the most pressing climate resilience needs instead of reactive project funding through post-disaster spending. In addition, another stakeholder told us this option could encourage communities to think “intentionally” about developing resilience, rather than climate resilience being an afterthought. Furthermore, several stakeholders said that such a funding source could be used for projects that otherwise would not receive funding through existing programs. For example, some projects may not receive funding because they are not compatible with current programs or because current programs have limited funding. Encouraging cross-sector projects. Several stakeholders told us that a new funding source for high-priority climate resilience projects could encourage cross-sector projects designed to achieve benefits in multiple sectors. According to one of these stakeholders, a dedicated fund for climate resilience could allow experts from multiple sectors— such as infrastructure, housing, transportation, and health—to collaborate on projects, leading to more creative, comprehensive approaches to enhance community resilience than would occur when funding projects through individual, existing federal programs. According to the Fourth National Climate Assessment, exploring the climate resilience nexus between sectors can identify co-benefits of resilience solutions and inform cost-effective resilience strategies. For example, the assessment describes co-benefits that resilience actions related to water consumption can have on the electricity sector. According to the assessment, California’s mandate to reduce urban water consumption to address drought conditions in 2015 resulted in significant reductions in both water use and use of electricity to treat and convey water and wastewater. Based on interviews with stakeholders, we identified some limitations of creating a new funding source for high-priority climate resilience projects: Practical challenges. Several stakeholders identified practical challenges with a funding source specifically for high-priority climate resilience projects. For example, such a funding source in the United States does not exist and would have to be created, which would require Congressional authorization. Furthermore, several stakeholders identified decisions that would have to be made about how to design such a funding source, including which agencies would be responsible for administering the fund. Two stakeholders identified additional challenges to success, such as designing effective programmatic rules and eliminating duplication with existing programs. For instance, if the funding source had overly restrictive or poorly designed rules, it might be challenging to use and provide only limited benefits relative to existing programs, according to one of these stakeholders. Discouraging mainstreaming in existing federal programs. Several stakeholders raised concerns that a new funding source for high-priority climate resilience projects could discourage mainstreaming climate change considerations into existing federal programs or lead to the elimination of other sources of funding for climate resilience projects. Several stakeholders explained that mainstreaming is a fundamental way the federal government will enhance resilience to climate risks. In particular, several stakeholders raised concerns that if federal agencies viewed a single funding source specifically for climate resilience projects as sufficient for addressing climate resilience, federal agencies might be less likely to consider climate change impacts when making routine agency decisions or place a lower value on climate resilience project attributes when making funding decisions. Opportunities exist to increase the climate resilience impact of options for focusing federal funding on high-priority climate resilience projects, based on our review of our past work, related reports, an international standard, and the Louisiana and Canadian examples, as well as interviews with stakeholders: Using both existing and new funding options. Several stakeholders told us that using both funding options—multiple, existing federal programs with varied purposes and a new funding source for high-priority climate resilience projects—in a strategic, coordinated way could help increase the impact of federal investment. Several stakeholders told us that directing both funding options at high-priority projects could result in a more effective approach that makes it less likely that high-priority projects fall through the cracks and more likely that these projects will help agencies work toward a common strategic goal. Two stakeholders told us that in practice, multiple, existing federal funding sources that are not specific to climate resilience could be coordinated to fund projects when their purposes and rules align and adequate funding is available. A funding source specifically for climate resilience could be used to fund proposed projects when no related program exists or when existing programs do not have sufficient funding available, according to these and other stakeholders. Helping ensure adequate and consistent funding. Several stakeholders we interviewed identified the need for adequate and consistent funding to implement high-priority climate resilience projects. For example, according to one stakeholder we interviewed, inconsistent, inadequate funding makes it difficult to complete large- scale projects and can lead to additional costs if significant delays occur during which existing work deteriorates. In addition, according to some international officials we interviewed for a May 2016 report, long-term consistency in budgeting provides predictable, reliable resources for climate resilience projects. According to USGCRP’s Fourth National Climate Assessment, adequate funding is a factor that contributes to the successful adoption and implementation of climate resilience by public-sector organizations. Furthermore, an industry standard identified the need to ensure that resources—including financial, human, and technical resources—needed for climate resilience actions are available. In addition to adequate and consistent funding, funding options should be designed to accommodate long-term projects since high-priority climate resilience projects can take multiple years to design and implement, according to two stakeholders we interviewed. Encouraging nonfederal investment. Several stakeholders we interviewed told us that the federal government could use a federal climate resilience investment effort to encourage nonfederal investment in high-priority climate resilience projects, thereby increasing the impact of federal investment. For example, several stakeholders identified the importance of a cost-share component so that funding recipients are invested in a project’s success. Canada’s DMAF encourages nonfederal investment by partially funding projects of national significance and requiring different levels of cost-share from funding recipients, ranging from 25 percent for Indigenous recipients to 75 percent for private-sector and other for-profit recipients. Several stakeholders also identified potential funding mechanisms—for example, public-private partnerships and loan guarantees—that could leverage federal dollars to encourage additional investment in climate resilience projects by nonfederal entities, including the private sector. According to the 2014 President’s State, Local, and Tribal Leaders Task Force report, one way the federal government can drive more resilient community choices is by encouraging innovative approaches that leverage private capital. Encouraging complementary resilience activities. To increase the impact of federal investment, a federal resilience investment effort presents an opportunity to encourage complementary resilience activities by nonfederal actors such as states, localities, and private- sector partners, based on interviews with several stakeholders, the Canadian example, and reports we reviewed. Several stakeholders suggested establishing conditions that funding recipients must meet in exchange for receiving federal funding. Alternatively, according to the 2014 President’s State, Local, and Tribal Leaders Task Force report and two stakeholders we interviewed, the federal government could use incentives (e.g., providing greater federal cost-share or giving additional preference in the project prioritization process) to encourage complementary resilience activities by nonfederal actors. Furthermore, our Disaster Resilience Framework states that incentives can make long-term, forward-looking risk reduction investments more viable and attractive among competing priorities. Specifically, incentives can lower the costs or increase the benefits of risk-reduction measures, which can help stimulate investment by state and local governments, individuals, and the private sector. The federal government could use a federal resilience investment effort to encourage several types of complementary resilience activities by nonfederal actors. For example, the federal government could encourage the use and enforcement of building codes that require stronger risk-reduction measures, according to two reports we reviewed and several stakeholders we interviewed. In the case of the DMAF, to be eligible for federal funding, all projects under the DMAF must meet or exceed building code requirements for their jurisdiction. In addition, several stakeholders suggested using a federal investment effort to encourage communities to limit or prohibit development in high-risk areas to minimize risks to people and assets exposed to future climate hazards. One example of this would be through zoning regulations. Another stakeholder suggested that communities receiving federal funding for resilience projects should be adequately insured against future climate risks so they have a potential source of funding for rebuilding in the event of a disaster. Allowing funds to be used at various stages of project development. Several stakeholders suggested that federal funds be allowed for use at multiple stages of project development—such as project design, implementation, or monitoring—to increase the impact of federal funds. For example, two stakeholders we interviewed told us that resilience projects can require significant amounts of design work to develop an implementable and effective project concept and that making funds available for project design could improve the quality of project proposals, thereby maximizing the impact of federal funds. Similarly, a CPRA official explained that many project proposals for Louisiana’s Comprehensive Master Plan for a Sustainable Coast are in the “concept stage” when they are received so funds are needed to refine the concept and craft an implementable project design. In addition to providing federal funds for project design, one stakeholder suggested making federal funding available to measure project outcomes (e.g., how effectively projects increased resilience) to improve future decisions by both the federal government and others making resilience investments. Individual federal agencies have provided ad hoc funding for projects that may convey some climate resilience benefits using existing federal programs. However, the federal government does not have a strategic approach for investing in climate resilience projects that targets federal resources toward projects that address the nation’s most significant climate risks. USGCRP projects that disaster costs will likely increase as certain extreme weather events become more frequent and intense due to climate change. The rising number of natural disasters and increasing reliance on the federal government for assistance is a key source of federal fiscal exposure. Investment in climate resilience projects can help prepare the country for the effects of climate change. We found that to strategically identify and prioritize climate resilience projects for federal investment, the federal government could take six key steps, based on reports we reviewed, past GAO work, international standards, and stakeholders we interviewed. In addition, opportunities exist to increase the climate resilience impact of funding options, such as by encouraging the use of climate-resilient building codes. However, no federal agency, government-wide coordinating body, or other organizational arrangement has been established to periodically identify and prioritize climate resilience projects for federal investment. Our past work and other sources highlight the importance of a strategic and iterative risk-informed approach to climate change and the need to reduce the federal government’s fiscal exposure. However, the federal government has made little measurable progress since 2017 to reduce its fiscal exposure to climate change. Although we have made 17 recommendations that address improving federal climate change strategic planning, as of August 2019, no action had been taken toward implementing 14 of those recommendations—one dating back to 2003. A strategic and iterative risk-informed approach for identifying and prioritizing climate resilience projects for federal investment, with an appropriate organizational arrangement, could help target federal resources toward climate resilience projects that have the greatest expected net benefit and that address the nation’s most significant climate risks. Congress should consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. Such an arrangement could be designed for success by considering the six key steps for prioritizing climate resilience investments and the opportunities to increase the climate resilience impact of federal funding options identified in our report. (Matter for Consideration 1) We provided a draft of this report to the U.S. Global Change Research Program, the Federal Emergency Management Agency, and the Mitigation Framework Leadership Group for review and comment. These entities provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Executive Director of the U.S. Global Change Research Program, the Acting Secretary of the Department of Homeland Security, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In this report, we examine (1) the extent to which the federal government has a strategic approach for investing in climate resilience projects; (2) key steps that provide an opportunity for the federal government to strategically prioritize climate resilience projects for federal investment; and (3) strengths and limitations of options for focusing federal funding on high-priority climate resilience projects. To address all three audit objectives, we conducted semi-structured interviews with 35 stakeholders with relevant expertise, including federal officials, researchers, and consultants. We used a snowball approach to identify stakeholders with expertise on the topics addressed by our report. This involved identifying an initial list of stakeholders with expertise in climate resilience and hazard mitigation by reviewing related reports and based on stakeholder involvement in related present or past federal efforts—for example, work conducted by the U.S. Global Change Research Program (USGCRP)—the federal program responsible for coordinating climate change research and preparing the Fourth National Climate Assessment. We identified additional stakeholders with expertise in these and other relevant areas through interviews with this initial group of stakeholders and review of additional reports. We considered several factors when selecting stakeholders: the relevance of their expertise, the number of times they were recommended to us by other stakeholders as having relevant expertise, and their current or previous federal experience. We sought a balanced set of stakeholders with expertise in a variety of fields that could inform climate resilience decisions: climate resilience, decision sciences, hazard mitigation, economics and finance, insurance, engineering and project design, economic and community development, potentially related federal programs (e.g., Federal Emergency Management Agency hazard mitigation programs), and several affected resources (e.g., coasts, infrastructure, water resources, and ecosystems). We use the term “several” to represent three or more stakeholders or reports expressing a particular viewpoint. In other cases, we provide the exact number of stakeholders expressing a particular viewpoint. Because this is a nonprobability sample, our findings cannot be generalized to other stakeholders we did not interview. Rather, these interviews provided us with illustrative examples of (1) the extent to which the federal government has a strategic approach for investing in climate resilience projects, (2) key steps that provide an opportunity for the federal government to strategically prioritize climate resilience projects for federal investment, and (3) strengths and limitations of options for focusing federal funding on high-priority climate resilience projects. In addition, the specific areas of expertise varied among the stakeholders we interviewed, so not all of the stakeholders commented on all of the interview questions we asked. To determine the extent to which the federal government has a strategic approach for investing in climate resilience projects, we reviewed past GAO work on federal efforts related to climate resilience and climate change funding as well as reports from the Congressional Research Service, Congressional Budget Office, the Council on Climate Preparedness and Resilience, USGCRP, and other sources. We also reviewed federal documents, including the National Mitigation Investment Strategy—a national strategy for mitigating natural hazards. We interviewed officials from USGCRP and FEMA, the federal agency responsible for leading the Mitigation Framework Leadership Group, the interagency group that developed the National Mitigation Investment Strategy under Presidential Policy Directive 8. We also interviewed several other stakeholders on the extent to which the federal government has a strategic approach for investing in climate resilience projects and the nature and scope of the Mitigation Framework Leadership Group’s activities. We reviewed federal documents and websites to identify examples of instances in which federal programs and funding sources designed for other purposes, such as disaster funding, have been used to invest in climate resilience projects. To identify key steps that provide an opportunity for the federal government to strategically prioritize climate resilience projects for federal investment, we reviewed our prior work related to risk management, climate change, climate resilience, and hazard mitigation, including our Disaster Resilience Framework and enterprise risk management report. We also reviewed approximately 50 reports and other sources to identify steps that provide an opportunity for the federal government to strategically identify high-priority climate resilience projects, several of which contained examples of potential criteria the federal government could consider when prioritizing these projects. We identified these reports and other sources through our review of other reports and related news, discussions with stakeholders, and searches of databases such as Scopus and ProQuest. The reports we reviewed included climate resilience planning guidebooks that outline steps communities can follow to design a resilience plan to address climate risks. We also interviewed stakeholders with relevant expertise to gather information on key steps the federal government could take and criteria it could consider to strategically prioritize climate resilience projects for federal investment. During the course of this work, we identified domestic and international examples of governments that invest in climate resilience and related projects. We selected two of these examples for more in-depth review and presentation in the report: the state of Louisiana’s coastal master planning effort and the country of Canada’s Disaster Mitigation and Adaptation Fund. These examples represent distinct approaches for investing in high-priority projects that help communities adapt to emerging risks such as those associated with climate change. We selected these examples for further review because they focus on projects that are large in scale; are of national or statewide significance; address multiple risks; represent well-defined, current processes for identifying and prioritizing projects; and had sufficient information available to understand their approach. To examine the strengths and limitations of options for focusing federal funding on high-priority climate resilience projects, we identified relevant examples of the strengths and limitations of federal funding options in several of the reports we mentioned above. Where appropriate, we supplemented this review with a review of additional reports that discussed specific financial mechanisms that the federal government could use to fund large-scale climate resilience projects. We also interviewed stakeholders to discuss the strengths and limitations of options the federal government could use to fund climate resilience projects. When available, we gathered their views on specific funding sources that the federal government could use to fund large-scale climate resilience projects and additional steps that the federal government could take to enable more targeted federal resilience investment. We conducted this performance audit from January 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individual named above, Joe Thompson (Assistant Director), Paige Gilbreath (Analyst in Charge), Taiyshawna Battle and Celia Rosario Mendive made key contributions to this report. Also contributing to this report were Colleen M. Candrl, Alicia P. Cackley, Kendall Childers, Steven Cohen, Christopher Curry, Cindy Gilbert, Kathryn Godfrey, Holly Halifax, Carol Henn, Susan Irving, Richard Johnson, Gwendolyn Kirby, Caroline N. Prado, Joseph Maher, Gregory Marchand, Diana Maurer, Kirk Menard, Tim Persons, William Reinsberg, Oliver Richard, Danny Royer, Jeanette Soares, Kiki Theodoropoulos, Sarah Veale, Patrick Ward, Jarrod West, Kristy Williams, Eugene Wisnoski, and Melissa Wolf.", "summary": "Federal funding for disaster assistance since 2005 has totaled at least $450 billion, including a 2019 supplemental appropriation of $19.1 billion for recent disasters. In 2018 alone, 14 separate billion-dollar weather and climate disaster events occurred across the United States, with total costs of at least $91 billion including the loss of public and private property, according to the National Oceanic and Atmospheric Administration. Disaster costs will likely increase as certain extreme weather events become more frequent and intense due to climate change, according to the U.S. Global Change Research Program, a global change research coordinating body that spans 13 federal agencies. In 2013, GAO included “Limiting the Federal Government's Fiscal Exposure by Better Managing Climate Change Risks” on its list of federal program areas at high risk of fraud, waste, abuse, mismanagement, or most in need of transformation. The cost of recent weather disasters has illustrated the need to plan for climate change risks and invest in climate resilience. Investing in climate resilience can reduce the need for far more costly steps in the decades to come. The Disaster Recovery Reform Act of 2018 provides one potential source of funding for climate resilience projects. In particular, it allows the President to set aside up to 6 percent of the estimated aggregate amount of grants from certain programs under a major disaster declaration to implement pre-disaster hazard mitigation activities. Officials estimate funds for the related program will average $300 million to $500 million annually. GAO was asked to review the federal approach to prioritizing and funding climate resilience projects that address the nation's most significant climate risks. This report examines (1) the extent to which the federal government has a strategic approach for investing in climate resilience projects; (2) key steps that provide an opportunity to strategically prioritize projects for investment; and (3) the strengths and limitations of options for focusing federal funding on these projects. GAO reviewed relevant reports and interviewed 35 stakeholders with relevant expertise, including federal officials, researchers, and consultants. In addition, during the course of this work, GAO identified domestic and international examples of governments that invest in climate resilience and related projects. GAO selected two of these examples for in-depth review and presentation in the report: the state of Louisiana's coastal master planning effort and Canada's Disaster Mitigation and Adaptation Fund. The federal government has invested in projects that may enhance climate resilience, but it does not have a strategic approach to guide its investments in high-priority climate resilience projects. Enhancing climate resilience means taking actions to reduce potential future losses by planning and preparing for potential climate hazards such as extreme rainfall, sea level rise, and drought. Some federal agencies have made efforts to manage climate change risk within existing programs and operations, and these efforts may convey climate resilience benefits. For example, the U.S. Army Corps of Engineers' civil works program constructs flood control projects, such as sea walls, that may enhance climate resilience. However, additional strategic federal investments may be needed to manage some of the nation's most significant climate risks because climate change cuts across agency missions and presents fiscal exposures larger than any one agency can manage. GAO's analysis shows the federal government does not strategically identify and prioritize projects to ensure they address the nation's most significant climate risks. Likewise, GAO's past work shows an absence of government-wide climate change strategic planning. As of August 2019, no action had been taken to implement 14 of GAO's 17 recommendations to improve federal strategic planning for climate resilience. GAO's enterprise risk management framework calls for reviewing risks and selecting the most appropriate strategy to manage them. However, no federal agency, interagency collaborative effort, or other organizational arrangement has been established to implement a strategic approach to climate resilience investment that includes periodically identifying and prioritizing projects. Such an approach could supplement individual agency climate resilience efforts and help target federal resources toward high-priority projects. Six key steps provide an opportunity for the federal government to strategically identify and prioritize climate resilience projects for investment, as GAO found based on its review of prior GAO work, relevant reports, and stakeholder interviews (see figure). GAO identified one domestic and one international example to illustrate these key steps: Louisiana's Coastal Protection and Restoration Authority (CPRA) coastal master planning effort and Canada's Disaster Mitigation and Adaptation Fund (DMAF). In the domestic example, in 2005 the Louisiana legislature consolidated coastal planning efforts previously carried out by multiple state entities into a single effort led by CPRA to address the lack of strategic coordination. CPRA periodically identifies high-priority coastal resilience projects designed to address two primary risks: flooding and coastal land loss. To identify potential projects, CPRA sought project proposals from citizens, nongovernmental organizations, and others. To prioritize projects, CPRA used quantitative modeling to estimate project outcomes under multiple future scenarios of varied climate and other conditions and coordinated with stakeholders to understand potential project impacts. In 2017, CPRA identified $50 billion in high-priority projects to be implemented as funds become available. In the international example, in 2018, the Canadian government launched the DMAF, a financial assistance program to provide US$1.5 billion over 10 years for large-scale, nationally significant projects to manage natural hazard risks, including those triggered by climate change. Infrastructure Canada, the entity responsible for administering the DMAF, seeks project ideas from provinces and territories, municipal and regional governments, indigenous groups, and others. These entities apply directly to Infrastructure Canada for funding. According to Canadian officials, two committees of experts—one composed of experts from other federal departments and the other composed of nonfederal experts (e.g., urban planners and individuals with regional expertise)—provide feedback on potential projects. These projects are prioritized based on multiple criteria such as the extent to which they reduce the impacts of natural disasters. On the basis of GAO's review of relevant reports and past GAO work, interviews with stakeholders, and illustrative examples, GAO identified two options—each with strengths and limitations—for focusing federal funding on high-priority climate resilience projects. The options are (1) coordinating funding provided through multiple existing programs with varied purposes and (2) creating a new federal funding source specifically for investment in climate resilience. A strength of coordinating funding from existing sources is access to multiple funding sources for a project. For example, one stakeholder GAO interviewed—whose community used federal funding to implement large-scale resilience projects—said that having multiple programs is advantageous because when funding from one program is not available—such as when the project does not match that program's purpose or when there are insufficient funds—funds could be sought from another program. A limitation of that option, according to CPRA officials, is that coordinating funding from multiple sources could be administratively challenging and could require dedicated staff to identify programs, assess whether projects meet program funding criteria, apply for funds, and ensure program requirements are met. Alternatively, one strength of a new federal funding source is that it could encourage cross-sector projects designed to achieve benefits in multiple sectors. For example, according to one stakeholder, such a funding source could allow experts from multiple sectors—such as infrastructure, housing, transportation, and health—to collaborate on projects, leading to more creative, comprehensive approaches to enhance community resilience. However, such a new funding source would have to be created, which would require Congressional authorization. In addition, GAO identified opportunities to increase the climate resilience impact of federal funding options. For example, a federal resilience investment effort presents an opportunity to encourage several types of complementary resilience activities by nonfederal actors such as states, localities, and private-sector partners. In this example, the federal government could require or provide incentives for communities to use and enforce climate-resilient building codes or limit development in high-risk areas through zoning regulations. Congress should consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. Such an arrangement could be designed using the six key steps for prioritizing climate resilience investments and the opportunities to increase the climate resilience impact of federal funding options that are identified in this report. The Federal Emergency Management Agency and two federal coordinating bodies reviewed a draft of this report and provided technical comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "The F-35 Lighting II program is a joint, multinational acquisition program intended to develop and field a family of next-generation strike fighter aircraft for the U.S. Air Force, Navy, and Marine Corps (hereinafter referred to as the services), eight international partners, and foreign military sales customers (collectively hereinafter referred to as program participants). There are three F-35 variants, and each will be a multi-role, stealthy strike aircraft replacement for or complement to the services’ legacy fighter aircraft. DOD initiated the F-35 program in October 2001, and began operational testing of the aircraft in December 2018. DOD has also, concurrently, been fielding and operating a growing fleet of aircraft as part of low-rate initial production. As of February 2019, more than 350 aircraft had been fielded and were operating from 16 bases worldwide. By 2023, the global F-35 fleet is expected to expand to more than 1,100 aircraft across 43 operational sites. In total, the program participants plan to purchase more than 3,300 F-35 aircraft, with the U.S. services planning to purchase nearly 2,500 of those aircraft. See figure 1 for a timeline of anticipated worldwide fleet growth and site activations in the F-35 program. Sustainment for the growing fleet of F-35 aircraft is a large and complex undertaking with several key stakeholders. The F-35 Joint Program Office, through its Product Support Manager, is responsible for managing and overseeing the support functions required to field and maintain the readiness and operational capability of the F-35 aircraft across the enterprise. As such, it establishes sustainment requirements, manages funding, develops contracts, and provides direction for and oversees the execution of F-35 sustainment strategy and policy. Additionally, in 2016, DOD established a Hybrid Product Support Integrator organization within the Joint Program Office, and it expects to fully implement this organization by the end of 2019. Once fully implemented, DOD intends for the Hybrid Product Support Integrator to bring together all government and commercial capabilities necessary to execute the F-35 sustainment strategy. The organization is led by a general officer, who is responsible for providing government oversight of all support providers to ensure that they deliver the required levels of performance. In particular, the F-35 program relies heavily on contractors to provide support for its F-35 aircraft. DOD has two primary contractors for the F-35 program: Lockheed Martin for the overall aircraft system and Pratt & Whitney for the engine. As the prime contractor for the overall aircraft system, Lockheed Martin (hereinafter referred to as the prime contractor) is responsible for managing the F-35 supply chain, depot maintenance, and pilot and maintainer training, as well as for providing engineering and technical support. Currently, DOD is contracting for this support with the prime contractor largely through annual contracts, and it plans to transition to multiple-year, fixed-price, performance-based sustainment contracts when the program achieves certain condition- based criteria, including the establishment of critical sustainment capabilities and the government’s ability to collect and more fully assess performance and cost data. In addition, the U.S. Air Force, Navy, and Marine Corps have each established an F-35 integration office or similar construct focused on how the services will operate and afford the F-35, among other things. Figure 2 below depicts how these key stakeholders provide support to the F-35 program participants across the three aircraft variants. DOD is planning to meet the sustainment requirements of its F-35 customers by providing a common, global support solution. As part of this common solution, participants share most sources of support, such as spare parts, depot maintenance, and training. At the core of the F-35 global support solution is the F-35 supply chain. At maturity, the F-35 supply chain is intended to be a network of manufacturers, commercial and government part repair depots, and base and regional part warehouses that will be located around the world to provide parts to support the operational and training requirements of all F-35 program participants. As a part of the F-35 supply chain, all F-35 program participants— including the U.S. military services, international partners, and foreign military sales customers—share a global pool of F-35 spare parts (formally called the Joint Spares Pool), which we refer to in this report as the F-35 global spares pool. These pooled assets comprise only parts used for F-35 aircraft, such as consumable and repairable spare parts for the airframe, engine system, support equipment, pilot flight equipment, and training devices. The F-35 global spares pool consists of four different packages of parts—the base spares package, the global spares package, the deployment spares package, and the afloat spares package—as described below and in figure 3. Base spares package: A base spares package is a retail-level supply of parts inventory that is positioned at each F-35 main operating base to support the F-35 aircraft operating from that location. Each base spares package is intended to have a sufficient amount of parts to support the number of aircraft and planned flying hours at the base. While inventory within each base spares package is sized to meet the projected needs of the aircraft at that particular location, parts within the base spare packages are intended to be available for sharing among all global participants, as needed. Global spares package: A global spares package is a wholesale- level supply of parts inventory that is positioned at regional warehouses, original equipment manufacturers, and depot repair facilities. The prime contractor manages this inventory to replenish the stocks of parts in base spares packages and the other packages below, and to meet participants’ requirements for parts that are not in their base inventories. If a part is needed for the repair of an aircraft, and the unit does not have the part in its base inventory, the prime contractor sends a part from the global spares package to meet the unit’s requirement. Parts within the global spares package are intended to be available for sharing among all global participants. Deployment spares package: A deployment spares package is a retail-level supply of parts inventory that is purchased by a program participant to support its wartime or contingency operations. This package is intended to have a sufficient amount of parts to support a program participant’s contracted operational requirements for a defined period of time, until the F-35 supply chain is able to ship replenishment parts to the participant’s deployed location. For example, a deployment spares package could be sized to provide parts for 12 aircraft to fly a specified number of flight hours over a 20- day period and be fully mission capable 70 percent of the time. The parts in this package are generally reserved for use only by the participant who purchased the package. Afloat spares package: An afloat spares package is a retail-level supply of parts inventory that is purchased by a program participant to support its F-35 operations aboard a naval vessel. This package is intended to have a sufficient amount of parts to support a program participant’s contracted operational requirements for a defined period of time until the F-35 supply chain is able to ship replenishment parts to the participant aboard the ship. For example, an afloat spares package could be sized to provide parts for six aircraft stationed on a ship to fly a specified number of flight hours over a 20-day period, and be fully mission capable 70 percent of the time. The parts in this package are generally reserved for use only by the participant who purchased the package. All of the parts within the global spares pool are owned by the U.S. government when not installed on a participant’s aircraft. The U.S. military services and international participants do not purchase parts directly, but rather purchase access to parts in the shared pool based on how many F- 35 aircraft they own and the number of flight hours they plan to fly, among other factors. Accordingly, the F-35 program has developed a series of business rules that are intended to govern how parts within the F-35 global spares pool will be managed and shared, and how the costs of the parts will be allocated across participants. The prime contractor manages the F-35 supply chain and is responsible for allocating parts to F-35 sites and participants based on contracted requirements, such as numbers of aircraft and planned flying hours, and program business rules. The effective management of the F-35 supply chain requires significant technical data about the F-35 aircraft and parts, such as engineering data, maintenance instructions, and information related to how often the aircraft experiences failures and how much time it takes to repair those failures. Technical data constitute an important part of a weapon system program, such as the F-35. We have previously reported that identifying technical data needs, costs, and ownership are essential for DOD to effectively consider and maximize competition for future product support of F-35 sustainment, including supply chain management. F-35 aircraft performance is not meeting warfighter requirements. While DOD is taking various actions to improve F-35 spare parts availability so that aircraft can fly and perform their missions, it will likely continue to struggle to meet warfighter requirements—due to how it is planning for and allocating spare parts. The performance of the F-35 fleet is hindered by lower-than-required aircraft availability and capability rates. Air vehicle availability, or the percentage of total time during which the aircraft can fly and perform at least one mission, was 45.8 percent across the F-35 fleet from May through November 2018, as compared with the warfighter minimum target of 65 percent. Full mission capability, or the percentage of time during which the aircraft can perform all of its tasked missions, was 26.8 percent from May through November 2018, as compared with the warfighter minimum target of 60 percent. However, parts availability and aircraft performance varied by aircraft variant and the age of the aircraft. For instance, fleet-wide rates of full mission capability for the F-35A aircraft were higher than those for the F-35B. Figure 4 below shows aircraft performance data by variant across key program metrics relative to stated U.S. warfighter requirements, referred to within the F-35 program as objective and minimum performance targets. From May through November 2018, fleet-wide F-35 aircraft performance did not meet any of the U.S. warfighter’s requirements. Lower-than-required F-35 aircraft performance is attributable in part to spare parts shortages. Specifically, the F-35 supply chain does not have enough spare parts available to keep aircraft flying enough of the time necessary to meet warfighter requirements. According to prime contractor data, from May through November 2018, F-35 aircraft across the fleet were unable to fly 29.7 percent of the time due to spare parts shortages (this metric is hereinafter referred to as the S-rate). Figure 5 below shows the percentage of aircraft that were unable to fly from May through November 2018 due to shortages of parts relative to the program’s target. According to prime contractor data, to keep aircraft flying despite parts shortages, from May through November 2018 F-35 squadrons cannibalized (that is, took) parts from other aircraft at rates that were more than six times greater than the services’ objective. These high rates of cannibalization mask even greater parts shortages, because personnel at F-35 squadrons are pulling parts off of other aircraft that are already unable to fly instead of waiting for new parts to be delivered through the supply chain. The F-35 program is taking a number of actions to try to increase the availability of spare parts, including steps to increase the capacity of suppliers to produce parts to meet sustainment requirements, improve the timing of spare parts deliveries, and address the reliability of certain parts that are failing more frequently than expected. DOD has identified specific parts shortages that are causing the greatest aircraft capability degradation, and it is developing short-term and long-term mitigation strategies to increase the quantity and reliability of these parts. For instance, DOD found that the special coating on the F-35 canopy that enables the aircraft to maintain its stealth failed more frequently than expected, and that the manufacturer could not produce enough canopies to meet demands. To address these challenges, the program is looking for additional manufacturing sources for the canopy and is considering design changes. A key contributor to spare parts shortages is the F-35 program’s limited capacity to repair broken parts. The average time to repair an F-35 part was more than 6 months, or about 188 days for repairs completed between September and November 2018—more than twice that of the program’s objective of 60—90 days. Also, there was a backlog of about 4,300 spare parts awaiting repair at depots or manufacturers (see figure 6). This backlog of parts awaiting repair is largely attributable to delays in the establishment of part repair capabilities at the military depots. The capabilities to repair all parts at the military depots were originally intended to be in place by 2016, but the F-35 program’s current plan now projects that the military depots will not have the capability to repair all parts at the expected repair demand rates until 2024. According to program officials and documentation, the plan includes the required material and technical instructions to repair parts, and DOD has allocated funding for these efforts in its budget planning. However, as of February 2019, funding decisions had not been finalized. In the meantime, to address the gap in part repair capabilities at the military depots, the prime contractor has begun incentivizing manufacturers to increase their capacity to repair spare parts by establishing performance-based repair agreements. As of October 2018, according to program documentation, the prime contractor had established seven such agreements, with six more planned by May 2019. In October 2017, we reported that DOD was experiencing supply chain challenges, largely as the result of sustainment plans that did not fully include key requirements or aligned funding. DOD concurred with our recommendation that it revise its sustainment plans to ensure that they include the key requirements and funding needed to fully implement its sustainment strategy. In January 2019, DOD issued an updated Life- Cycle Sustainment Plan for the F-35. The plan includes eight elements that DOD has identified as critical to enabling the program to achieve its aircraft capability and affordability targets by fiscal year 2024, including accelerating supply chain and depot repair capabilities. The F-35 program is a highly concurrent program wherein aircraft, spare parts, and mission software continue to be developed and redesigned while fielded aircraft must be sustained. As a result, there are at least 39 different part combinations across the fleet. Additionally, DOD’s training and operational squadrons are flying F-35 aircraft with three different blocks of mission software—2B, 3i, and 3F—with Block 3F software having the full warfighting capability. According to the program office, DOD spent more than $15 billion to purchase F-35 aircraft from the earliest lots of production, specifically lots 2 through 5 (hereinafter referred to as “early production aircraft”), but it faces challenges in providing enough spare parts for these aircraft. Early production F-35 aircraft have parts configurations and software that differ from those of later production aircraft, and they have faced more parts reliability issues and parts shortages than later-production aircraft. Figure 7 shows the differences in aircraft performance between early production aircraft and aircraft produced in production lot 6 or later (hereinafter referred to as “later production aircraft”). According to program documentation, DOD plans to upgrade all of its early production aircraft to Block 3F software capability. These upgrades were initially scheduled to be completed by the end of 2021, but DOD is taking actions to accelerate these modifications with the plan to complete the upgrades in September 2020. That upgrade is expected to address some of the reliability challenges the older aircraft have experienced. However, program and contractor officials said that these upgrades are not a comprehensive solution, as there will still be many parts that are used on these early production aircraft that are not reliable and are in short supply. Accordingly, DOD is taking action to retrofit some other parts that are not addressed by the modifications. These challenges disproportionately affect the U.S. services’ training fleets, as the majority of U.S. early production aircraft are currently being used for that mission. For example, the training units at Eglin Air Force Base were unable to fly due to parts shortages about 56 percent of the time from May 2018 through November 2018. The Autonomic Logistics Information System is an information technology system that is central to the F-35 sustainment strategy. It is intended to provide the necessary logistics tools to F-35 program participants as they operate and sustain the F-35 aircraft. ALIS consists of multiple software applications designed to support different squadron activities, including supply chain management, maintenance, training management, and mission planning. Specifically, for supply chain management, ALIS was intended to automate a range of supply functions—including updating the status of parts, generating supply work orders, and communicating critical data about parts. However, these capabilities are immature, resulting in numerous challenges and the need for maintainers and supply personnel at military installations to perform time-consuming, manual workarounds in order to manage and track parts. One Air Force unit estimated that it is spending the equivalent of more than 45,000 hours per year performing additional tasks and manual workarounds, including for supply-related functions, because ALIS is not functioning as intended. Supply and maintenance personnel we spoke with at various military installations cited challenges associated with ALIS, including the following: missing or corrupted electronic spare parts data that are required to install a part on an aircraft, necessitating extensive research and troubleshooting to resolve; maintenance and supply systems within ALIS not communicating with each other, resulting in difficulty in electronically tracking aircraft parts as they are physically moved between maintenance and supply locations at the same base; and limited automated capabilities, requiring manual and sometimes duplicative steps for receiving, tracking, and managing parts. We have previously reported on challenges related to ALIS. In April 2016, we reported that DOD did not have a plan to ensure that ALIS was fully functional as key program milestones approached. In October 2017, we reported that DOD faced delays in the development of required ALIS sustainment capabilities and uncertain funding for this development. We are currently conducting a separate review of ALIS, assessing how DOD is managing current and future issues related to the system. We plan to complete this review by the end of 2019. In September 2018, the Secretary of Defense directed the services to achieve and maintain 80 percent mission capability for the F-35 fleet by the end of fiscal year 2019, which program and Office of the Secretary of Defense officials have told us will be difficult to accomplish, given the supply and maintenance challenges facing the fleet. DOD is pursuing a phased approach to achieving this requirement for the F-35 aircraft. DOD’s first priority is to increase the capability of its operational fleet to achieve the 80 percent mission capability target by the end of fiscal year 2019, with the intent to increase the capabilities of its entire F-35 fleet to achieve the target by the end of fiscal year 2020. While DOD has ongoing efforts to increase the availability of spare parts as described above, it is likely to face additional challenges in meeting this requirement as well as the other warfighter aircraft performance requirements, because of the ways in which the program is planning for and allocating parts. The F-35 program is not planning for the quantity of parts necessary in its spare parts projections to meet warfighter performance requirements. The program’s S-rate requirement is used along with a number of other factors in an analytical model to determine the quantity of spare parts to be purchased. Based on this model, DOD is planning to purchase the quantity of parts necessary to achieve a fleet-wide S-rate of 20 percent— meaning the program is buying only enough parts to enable about 80 percent of its aircraft to be mission-capable based on the availability of parts. According to program documentation, the maximum fleet-wide mission capability rates that can be consistently expected when modeling for a 20 percent S-rate is about 70 percent—far lower than the warfighter’s requirements. This is the case because the time during which aircraft are unable to fly due to maintenance is also a factor, which the program projects will be about 10 percent. Figure 8 shows the difficulty that DOD will face in meeting the Secretary of Defense’s 80 percent mission capability target when planning for an S-rate of 20 percent given the time that is also required for maintenance. According to program and prime contractor documentation, DOD would need to model and fund the spare parts pool to achieve an S-rate of no higher than 10 percent in order to achieve requirements for aircraft performance, such as the mission capability target set by the Secretary of Defense and the services’ goals for air vehicle availability. Doing so would significantly increase the costs for spare parts. According to the prime contractor, in order to achieve a fleet-wide S-rate of 10 percent, the U.S. government would need to initially pay hundreds of millions of dollars to buy more parts for already-fielded aircraft. Costs would also increase on an annual basis—above the nearly $1 billion the U.S. services collectively paid in fiscal year 2018—to buy more parts each year. The current projected costs of F-35 sustainment are not affordable for the services. In 2018, DOD established constraints based on the military services’ future budget projections that indicate that DOD needs to reduce F-35 sustainment costs per aircraft per year by 43 percent for the F-35A, 24 percent for the F-35B, and 5 percent for the F-35C in order for the aircraft to be affordable for the services. DOD will be challenged to support this increase in annual costs for spare parts given its need to make significant cost reductions. Furthermore, as part of DOD’s fiscal year 2020 program budget review, DOD conducted modeling and analysis to project how various courses of action—such as increasing purchases of spare parts to compensate for how long it actually takes to repair parts or reducing aircraft production– would affect F-35 fleet performance. DOD’s analysis projected that if no additional actions were taken beyond what the U.S. services had already planned for and funded, F-35 aircraft performance would increase for a period of time. However, it would then worsen significantly with the growth of the fleet. Officials from the Office of the Secretary of Defense said that, as a result of this analysis, DOD is considering some additional investments to increase the availability of parts that would result in increased funding requirements for the U.S. services, but that as of January 2019, decisions were not finalized. They further said that their recent modeling and analysis efforts for the fiscal year 2020 program budget review did not formally consider additional investments to lower the planned S-rate to 10 percent as a course of action, but that this misalignment between the quantity of parts that DOD is planning to purchase and what is needed will hinder DOD’s ability to meet warfighter performance requirements. Supporting Recent F-35 Shipboard Deployments The F-35 program was not able to fill the Marine Corps’ afloat spares packages (packages of spare parts designed for aircraft stationed on ships) for the first F-35 deployments aboard the U.S.S. Essex and U.S.S. Wasp in 2018 in time to support those deployments. As a result, the F-35 program pulled spare parts from inventories at Marine Corps Stations Yuma, Arizona, and Iwakuni, Japan. Marine Corps officials stated that these actions reduced F-35 readiness in Iwakuni. Moreover, DOD may have limited options to increase spare parts availability for its operational fleet because of the way in which the program is currently structured to allocate parts. Within the F-35 program, the U.S. services do not have control over how F-35 parts are allocated, but rather share access to the parts along with the rest of the global fleet. The prime contractor is responsible for allocating parts to meet the requirements of all participants who share in the global spares pool. In response to parts shortages to date, Air Force and Marine Corps officials have said that the program has generally supported big events, such as the 2018 operational deployments of the U.S. services, by shifting parts to those units from the broader global spares pool (see sidebar). According to service officials, decisions to shift parts to different locations to support operational priorities could potentially be made by either a military service that owns those parts or DOD leadership within a legacy program. However, Office of the Secretary of Defense and program officials said that there is no mechanism within the current construct of the F-35’s global support strategy for program participants to optimize readiness for certain units by increasing the allocation of parts to those locations, short of deviating from existing program rules or contractual arrangements. As the size of the fleet and number of operational squadrons grow, the F-35 program will face increasing demands on its supply chain and competing operational priorities across participants that will likely make it more difficult for the program and the U.S. services to mitigate fleet-wide shortages of F-35 parts. GAO’s Standards for Internal Control in the Federal Government states that agencies should define objectives clearly to identify risk, including considering external requirements and internal expectations, and to design and implement activities to respond to those risks. DOD guidance on performance-based arrangements also states that performance-based logistics arrangements should be structured to deliver outcomes that are tied to warfighter requirements. Taken together, the current supply chain challenges and the issues related to how the program is planning for and allocating parts expose a significant gap between the F-35 aircraft performance targets the U.S. services need to achieve and what the F-35 supply chain is positioned to deliver within affordability constraints. DOD’s updated F-35 Life-Cycle Sustainment Plan identifies a number of actions needed to improve aircraft performance, such as those related to spare parts availability and repair capability. While the identification of such actions is a positive step, the plan also states that those actions do not take into account policy, program structure, or resource constraints, which could make them difficult to implement. Furthermore, DOD’s recent modeling efforts have already identified the need for some initial additional investments that could further strain the services’ budgets. Without a comprehensive review to determine what additional actions are needed to close the gap between warfighter requirements for aircraft performance and what the F- 35 supply chain is capable of delivering, taking into account also the need to reduce the sustainment costs of the F-35, DOD risks that its F-35 fleet may fall short of the capability needed to support its critical national defense missions in the future. DOD’s F-35 supply chain has provided spare parts to support the few F- 35 deployments that have occurred to date, including the following: U.S. Air Force deployment of 12 F-35A aircraft to Japan, November U.S. Marine Corps deployment of six F-35B aircraft aboard the U.S.S. Wasp, March—April 2018 (see figure 9); and U.S. Marine Corps deployment of six F-35B aircraft aboard the U.S.S. Essex, July 2018—February 2019. These units deployed with packages of parts to support the first 20 days of their deployment (that is, deployment and afloat spares packages), and then received replenishment parts from the broader global spares pool once their packages of parts were depleted. DOD officials generally characterized these deployments as operational successes and significant milestones for the F-35 program. In addition to these early deployments, the F-35 supply chain is also providing parts to activated U.S. and international F-35 bases in six different countries outside of the United States. DOD faces challenges in managing and moving parts to support a deploying and expanding global F-35 fleet. While the initial operational deployments have been successful and the program has established overseas F-35 bases in six different countries, these events have also highlighted several key risks that could hinder future F-35 fleet readiness. These risks are related to (1) the make-up of the afloat and deployment F-35 parts packages, (2) the prioritization process for distributing scarce parts among global F-35 participants, and (3) the F-35 program’s global networks for moving parts. DOD faces challenges in ensuring that the parts in its purchased afloat and deployment spares packages match the needs of deploying operational aircraft. According to Air Force and Marine Corps officials, ensuring that these parts packages are appropriately configured is of significant operational concern because units may be completely reliant on them while deployed to locations that the F-35 supply chain cannot yet readily support. The afloat and deployment spare parts packages are purchased according to a list of parts planned and paid for by an F-35 program participant at least 2 to 3 years in advance, aligning with the aircraft being purchased at that time and the best projections of what the demand for the parts will be. However, given the immaturity of the F-35 program, continued modifications to parts and aircraft can make such packages out-of-date by the time F-35 units are preparing to deploy. For example, Air Force officials told us that the spare parts packages for its November 2017—May 2018 operational F-35 deployment in Japan included parts that were not compatible with the aircraft with which they intended to deploy. Thus, the Air Force had to change its plans and deploy with older aircraft with less advanced capabilities that matched the parts in the package instead of the aircraft that best met their operational requirements. The Marine Corps faced similar challenges with its first shipboard deployments in 2018. Table 1 shows the number of parts and examples of parts in the Marine Corps’ afloat spares packages for the U.S.S. Wasp and U.S.S. Essex deployments that were not initially configured to be compatible with the Marine Corps’ deploying aircraft. Air Force and Marine Corps officials also said the quantity of parts within their parts packages were not fully reflective of the actual demands for certain parts, based on updated information about the reliability of certain parts and how frequently they needed to be replaced. In other words, the initially built packages did not have enough of the right parts to meet mission requirements. For example, Marine Corps officials said they were able to identify more than a dozen different parts in one of their afloat spares packages prior to deploying that were not provided in sufficient quantities because the program did not account for the actual fleet demand for these parts in its modeling for the afloat spares package. Air Force officials expressed similar concerns and said that they have had difficulty in getting information from the program that would enable the Air Force to assess whether there are enough of the right parts in its deployment spares packages relative to the actual demands for these parts. This is a concern for the Air Force as it prepares for its next F-35 deployment, because officials said that they cannot be sure that the package of parts with which they will deploy will have sufficient parts to support the deployment. The F-35 program does not have a process in place for changing out the parts within the afloat and deployment spares packages that are put on contract years before a deployment. Such a process is needed to ensure that the packages reflect the actual configurations of the deploying aircraft or updated demand projections for parts. Service and program officials said that such a process would need to include a review of the parts within the packages to ensure that they match deploying aircraft and aligning the funds to pay for any necessary updates or modifications to the parts, which could potentially cost tens of millions of dollars. F-35 program policy recognizes that the program may need to adjust the configurations or quantity of parts in the packages based on updated information, noting that such actions may necessitate contractual changes, but it does not specify the process for these adjustments. In our discussions with the prime contractor, program office, and military services, officials have lacked clarity regarding who is responsible for reviewing the parts in the package to ensure that they are appropriately configured and for determining whether additional contract actions or funding are needed to update the packages. In lieu of an established process to refresh these parts, service and contractor officials described an ad hoc and manual effort to review the packages prior to deployment. To address non-matching parts, contractor officials said that the program had to pull parts from the global and base spares packages to make exchanges. Officials said that this cuts into the parts that are available for the other F-35 units that rely on those packages, because the global and base packages are not stocked with the parts to support the deployments. For example, the program used 187 parts from the inventory at Marine Corps Air Station Iwakuni to backfill parts for the U.S.S. Wasp. The Marine Corps’ squadron in Iwakuni stated that this had a measurable effect on the squadron’s readiness to support its operational requirements, as reflected by lower availability of parts within their inventory to support broken aircraft. Specifically, during the time of the U.S.S. Wasp deployment, only about 46 percent of the critical parts (that is, parts needed to fix aircraft that cannot fly) that the squadron at Iwakuni needed were available in its inventory, and the squadron had to wait an average of about 12 days to receive these parts from off-base. As the F-35 fleet continues to expand and the number of operational deployments increases, military service officials said that these manual workarounds and the singular focus on ensuring that one unit has the appropriate parts to deploy will not be tenable. Program officials said that they have started a working group to look at options for addressing this issue, but they could not provide a timeframe or details about this effort. DOD guidance for risk management in acquisition programs states that defense programs must anticipate and address risks on a continuing basis, and suggests that programs implement processes that include risk identification, analysis, mitigation, monitoring, and planning. Further, the services have recognized that, to meet operational readiness objectives in a deployed environment, it is critical to have mechanisms ensuring that spare parts packages with which units plan to deploy are built to support the configurations and expected missions of the deploying aircraft, and have established guidance and processes to that effect. DOD also has a separate, ongoing initiative to determine whether using risk-based assumptions can produce a more efficient and effective mix of parts within deployment parts packages across a range of weapon systems, including the F-35. While this effort is nascent, it could potentially offer insights for the F-35 program to consider when reviewing the make-up of the F-35 deployment and afloat spares packages. Without a process for DOD to modify the F-35 afloat and deployment spares packages, to include reviewing the parts within the packages to ensure that they match deploying aircraft and accounting for updated parts demand, and without aligning any necessary funding for needed updates, the military services face risk that the parts that they have specifically purchased to meet their operational requirements will not be sufficient to do so. Uncertainty exists about how the program will prioritize scarce F-35 spare parts among global participants. The program has developed a set of business rules to govern the prioritization of scarce F-35 parts. The business rules are to differentiate between the relative significance of competing needs and create a structure to be responsive to customer requirements during both peacetime and war. These rules are critical to ensuring fair and transparent allocation of parts to all program participants, particularly given the significant shortages of spare parts throughout the F-35 program. Under these rules, F-35 units are assigned numerical designations based on the importance of their mission (that is, force activity designators), and their part requests are similarly assigned designations based on how important the part is to aircraft functionality (that is, urgency of need). Under these rules, the force activity designators of each unit and the urgency of need for each part request are combined to create an analysis that is applied to requests for scarce parts to determine which unit should receive the part. For example, according to such an analysis, a deployed F-35 unit that orders a part for an aircraft that cannot fly without that part would have priority over all other units. Conversely, an F-35 training unit that needs a part to replenish the inventory of parts on its shelves would have very low priority for the part relative to that of other units. See figure 10 for a general depiction of the prioritization scheme for F-35 parts. According to program and contractor officials, the prime contractor has been allocating parts according to these business rules, but these rules are not comprehensive. Officials from the Joint Staff, Office of the Secretary of Defense, program office, and military services cited a number of areas where the rules lack clarity and detail. For example, there is a lack of clarity around how force activity designations will be assigned and by whom. The business rules state that each unit’s force activity designation will be assigned by the participant’s national command authority, but they do not specify the process for doing so; provide for a clear role for the U.S. combatant commanders in the process; or specify the level of U.S. and international leadership required in order to make changes to this designation. In addition, stakeholders with whom we spoke said that the existing force activity designations do not provide for enough differentiation between types of activities or account for the unit’s unique mission requirements when determining how important a part is to aircraft functionality. For example, military units that are engaged in combat operations are assigned the same force activity designations as units that are forward-based to react to potential threats. These officials expressed concern that as the global fleet expands and more units are engaged in operations, this practice could lead to a situation in which too many units are a “priority” at any one time. Stakeholders have also raised questions about whether and how F-35 participants should be charged for increases in their force activity designations, as this matter is not addressed within the current business rules. Furthermore, the F-35 Product Support Manager has at times waived these business rules to support deployments and other activities, such as aircraft operational tests. For example, the Air Force unit that deployed to Japan in 2017 experienced significant readiness challenges because the business rules had established the replenishment of its spare parts package as a low priority relative to other competing demands for scarce parts. Air Force officials said that this contributed to its aircraft being unable to fly due to shortages of parts more than 30 percent of the time (cumulative over a month). According to Air Force and contractor officials, Air Force leadership then made a number of calls to the program office to request that its replenishment requirements be given higher priority. Subsequently, the F-35 Product Support Manager directed that the contractor deviate from the business rules to place a higher priority on the replenishment of the deployed unit’s parts package so that it could get parts faster. Service and program officials said that such deviations may be necessary to meet operational requirements, and that program leadership needs some flexibility in the business rules to make those decisions. According to program officials, the F-35 Product Support Manager has the authority to issue waivers to the business rules, but the business rules do not clearly grant this waiver authority to the Product Support Manager, or address how and when such waivers should occur. Stakeholders have been raising some of these concerns for several years. For example, the Office of the Secretary Defense and the Joint Staff developed related position papers that identified gaps in the business rules. Officials from these offices said that the papers were sent to the program office in 2014 and early 2017, respectively. In response, the F-35 program established a working group in May 2018 to begin revising the business rules. As of January 2019, program officials said that the revised business rules were undergoing internal review, but the date for completion was not yet determined due to potentially lengthy timeframes associated with obtaining formal approval through the F-35 governance process. This ongoing effort is promising, but the specific action items that the working group was tasked with incorporating into the business rules do not clearly address some of the areas of concern raised by stakeholders. For example, these action items do not include the issue of deviations from the business rules. DOD directs its components to comply with DOD’s established materiel management guidance, which outlines DOD policy, assigns responsibilities and specifically provides procedures for how parts and materiel should be prioritized for responding to customer supply chain demands for all DOD components, including outlining the application of force activity designators and the role of the combatant commanders. The F-35 program’s existing business rules incorporate many aspects of this standard DOD prioritization guidance, but they are not fully aligned with this guidance. For example, DOD’s standard process outlines the use of five potential force activity designators, while the F-35 program provides for only three different designations. Additionally, Standards for Internal Control in the Federal Government states that agencies should design control activities to achieve objectives and respond to risks, including implementing control activities through policies. U.S. service and international officials said that, as the fleet and competition for spare parts increases, they are concerned that participants may try to manipulate the system due to the lack of clarity within the existing rules. Without ensuring that the revisions to its business rules for the prioritization of scarce F-35 parts across all program participants define stakeholder roles and responsibilities, the process for assigning and arbitrating force activity designations, and the manner in which deviations from the business rules will be conducted, the F-35 program may face challenges allocating parts to support competing U.S. and international warfighter requirements. Further, F-35 program participants may lack confidence in the equity of decisions regarding scarce parts that affect their operational requirements. DOD is now moving F-35 parts around the world, but its global networks for doing so are immature and there is risk that they will not be fully capable to support an expanding fleet. The F-35 program has a growing number of U.S. and international participant bases outside of the United States and is providing supply support from its global spares pool for an increasing number of operational deployments. For its supply chain construct to work as intended, F-35 parts must be able to move freely and efficiently among U.S. and international program participants, suppliers, and repair facilities, regardless of the country or company of origin. The program has projected that F-35 parts could potentially be moved on 132 different paths between participating countries (for example, Italy to United Kingdom, Italy to Norway) and 2,162 paths between F-35 sites (for example, a warehouse in the Netherlands to a base in Norway). This will require the program to establish strategically located warehouses, synchronize global distribution networks, and navigate a complex web of import and export activities and international weapon control laws. However, the envisioned global network is not yet in place. For instance, regional warehouses planned for the Netherlands and Australia are not expected to reach initial operational capability until, at the earliest, late 2019 and 2020, respectively. Furthermore, the program is still working to establish functional shipping networks and locations at which to receive parts. It also does not have mechanisms in place to support the range of required import and export activities. Spare parts are instead being moved under a less efficient system, with the parts originating from and returning to the United States before being delivered to an international program participant. Figure 11 compares a depiction of the program’s intent for the future global network for moving F-35 parts with the existing “hub-and-spoke” network. The immaturity of the global network has contributed to long wait times for parts for the U.S. and international F-35 squadrons that are deployed or permanently based overseas. The 2018 F-35 sustainment contract establishes minimum and objective targets for customer wait times across the F-35 fleet. The targets are the same regardless of whether the aircraft are located inside or outside of the United States, thus reflecting the intended global nature of the network. However, customer wait times for parts for units located outside of the continental United States have been significantly higher than those for units located inside of the continental United States, as shown in figure 12. Unless otherwise noted, the data are inclusive of customer wait times for both U.S. and international participants. Officials from Marine Corps, Air Force, and international F-35 squadrons that were based or deployed overseas in Japan and the United Kingdom described long wait times of up to 17 days—well outside of the 6-and 10- day customer wait-time metric ranges for critical parts—to receive available parts overseas that have degraded their readiness. They cited several reasons for these delays, such as export and import licenses not being in place, delays in customs, inefficient routing or processing of parts, and ineffective commercial freight forwarders. For example, Air Force and contractor officials said that it was initially taking parts up to 14 to 16 days to reach the deployed Air Force unit in Japan using a commercial shipper, which was hurting the unit’s readiness. According to DOD and contractor officials, these concerns drove the prime contractor to start shipping parts via military air, which subsequently decreased customer wait times significantly. However, these officials said that the program did not have the appropriate contracting and funding mechanisms in place to utilize military air and had to return to using a different commercial shipper. The F-35 program’s plan for full establishment of the global networks for moving parts is not complete. Program officials and contractor officials told us that planning for this network is 3 to 4 years behind the need because the program was more focused on producing the aircraft than on sustainment. Prime contractor officials also said that they did not realize the complexity of setting up the network, which will require them to establish export and import authorizations in every country and to work through the Department of State to establish export licenses. In addition, the construct necessitates that each of the international participants takes actions within its own government to ensure that the appropriate arrangements are in place, such as obtaining waivers for taxes, tariffs, and duties, or pursuing any necessary changes to its own government’s laws. The F-35 program initiated its focused planning for this network in 2018, with the establishment of a working group tasked to develop plans for implementing the network. In January 2019, the F-35 program issued a high-level strategy that provided some limited information on the program’s objective and key principles for the network. It also indicated that a forthcoming F-35 program instruction would provide a framework for executing the strategy, but it did not have a timeline or details for the completion of this instruction. Also in January 2019, DOD selected the U.S. Transportation Command and the Defense Logistics Agency as the entities responsible for the global transportation and distribution networks for F-35 parts—a transition that is expected to occur over the next 12 to 24 months. According to Department of Defense documentation, existing U.S. Transportation Command and Defense Logistics Agency networks are already in place to support much of the required F-35 global parts movements, particularly for U.S. units and foreign military sales customers. However, these organizations will still be reliant on the F-35 program to establish the necessary licenses and legal frameworks for the movement of parts between partner countries. The program has established a target date of September 1, 2021 for full operational capability of the network, at which point spare parts are intended to be able to be moved freely throughout the F-35 enterprise. However, the program does not yet have a detailed plan with clear requirements and milestones or an integrated schedule to move the network from initial operational capability to full operational capability. Program officials stated that they believe this date is achievable, due to the increased emphasis on developing the network among all program participants. However, there are risks to the program’s planning effort. Beyond the complexity of the network, the F-35 program office and contractors do not control all elements needed to support the successful implementation of the network. Specifically, each international partner is responsible for establishing the necessary legal framework in its own country to support the network, which can be a lengthy process. Program officials further noted that other international participants have national laws or have made decisions that are not conducive to the free flow of parts throughout the global network. F-35 program policy provides some provisions to address non-conformance by partners—for example, stating that partners will be responsible for any taxes or tariffs charged to the program by their own countries. However, program officials said that the mechanisms to manage any such deviations will be complex to implement and are still being developed. Our prior work on acquisition management has identified a number of key program management practices that can improve program outcomes if implemented, such as clearly establishing well-defined requirements and developing realistic schedules that include risk analysis. DOD guidance related to managing risk in acquisition programs also states the importance of program managers taking actions to identify, manage, and mitigate programmatic risk, which can either be intrinsic to the program or arise from inadequate planning. The F-35 program’s recent focused efforts in this area are positive steps, but its planning efforts still lack detail about how the network will be fully implemented. Furthermore, the schedule, planning, and risks associated with this delayed global network are not addressed in DOD’s recently updated F-35 Life Cycle Sustainment Plan. Without completing a detailed plan for the establishment of the F-35 program’s global network for moving parts that outlines clear requirements and milestones to get the network to full operational capability, and includes mechanisms to identify and mitigate risks of delays or gaps in the global network, the program cannot ensure that its supply chain will support U.S. and international program participants as intended. Furthermore, delays or gaps in in the establishment of the envisioned global network will likely result in increased costs associated with additional travel segments and delays to the warfighter in receiving spare parts that could hurt the operational readiness of the global F-35 fleet. DOD cannot fully account for F-35 spare parts within the supply chain and their associated costs. Specifically, the department does not have records indicating how many F-35 spare parts it has purchased, or where they are all located. In addition, DOD does not have comprehensive cost information for individual F-35 spare parts, and the military services cannot track the funds that they have spent on F-35 spare parts to the actual parts purchased by the program office on their financial statements and supporting documentation. Accountability of government property, such as F-35 spare parts, facilitates financial audits by providing the necessary documentation to ensure the accuracy of transactions for government property and contracted services. Congress required the Secretary of Defense to ensure that an external audit be performed on DOD’s financial statements for fiscal year 2018, and to submit such audit to Congress no later than March 31, 2019. Congress directed this audit, in part, to help improve the accuracy and reliability of management information on DOD’s mission- critical assets—such as F-35 spare parts—and services for which they contract. Subsequently, DOD completed its first consolidated, department-wide, full financial statement audit in November 2018. The DOD Office of the Inspector General reviewed the department-wide financial statements and identified 20 material weaknesses—that is, serious problems with DOD’s internal processes that hamper its ability to reasonably assure that its financial reporting is reliable—including processes related to accountability for government property in the possession of contractors and the accuracy and completeness of financial statements. DOD cannot fully account for its spare parts within the F-35 supply chain, including the quantity of all the spare parts it owns and where they are located. The prime contractor manages the F-35 supply chain and the movement of all F-35 parts across the F-35 enterprise to meet warfighter needs. DOD initially did not intend to own the F-35 parts, but in 2012 the F-35 program’s executive steering board issued a decision memorandum declaring the F-35 parts in the global spares pool to be titled to the U.S. government when they are not installed on an aircraft. However, program officials told us that DOD did not develop a corresponding plan to maintain accountability over the parts that it already owned or would purchase in the future. According to program officials, this is due in part to property accountability not being a priority for the program in its effort to field aircraft. This is evidenced by the number of staff within the program office dedicated to this mission; program officials said that until recently there was only one government official at the program office overseeing property accountability for the F-35 system. In order to maintain accountability for government property, such as the spare parts within the F-35 supply chain, DOD guidance requires that DOD components establish and maintain a physical inventory control program for assets within the DOD supply chain to serve as a key internal control for providing information to inform inventory financial statements. Defense Contract Management Agency officials also told us that in order to improve F-35 readiness and decrease costs, DOD must have an understanding of the F-35 spare parts it owns, where those parts are located, and how those parts are being used to support the weapon system. However, the F-35 program has not consistently followed DOD guidance for property accountability. For example: As of December 2018, the program office had not populated an accountable property system of record with data for its F-35 parts. DOD components are required to establish and maintain accountable property systems of record for property that DOD components own and manage. An accountable property system of record is required to contain information such as cost, location, and custodial ownership data for property, including individual parts, that meet certain criteria, and to provide a comprehensive log of transactions that can be audited. Such a system would allow the F-35 program office to have asset visibility for spare parts within the F-35 supply chain. The program office has identified a database to use as its accountable property system of record, but DOD officials stated that the program office does not have the data necessary to populate it. According to program officials, the prime contractor keeps some of the required data in proprietary databases to which the program office does not have access. In addition, DOD officials told us that the program office is working through some limitations that need to be addressed with the system the program office has chosen to be its accountable property system of record in order to properly maintain data records. The program office has not fully identified which spare parts the prime contractor is required to enter into DOD’s Item Unique Identification registry (hereinafter referred to as DOD’s central registry for government property). In addition to component-specific accountable property systems of record, DOD’s central registry for government property is DOD’s primary data source for government furnished property, and it is intended to provide department-wide asset visibility for all government property and links with financial and accountability systems in order to maintain accountability over the assets DOD owns. DOD guidance states that agencies are to require contractors to report government furnished property in DOD’s central registry for government property. DOD guidance also states that DOD agencies are to identify which assets require unique item-level traceability. However, the program office has not clearly defined for the prime contractor all F-35 spare parts that should be entered into DOD’s central registry. As a result, DOD officials said the prime contractor is not entering in information about all required parts. Moreover, a property accountability official said that the prime contractor is not consistently entering F-35 parts into DOD’s central registry when the parts are delivered, because the prime contractor may delay entering information into DOD’s central registry until all items associated with a specific contract line item have been delivered to DOD. This official also said that there are some contract line items dating back to the first production lot, which delivered aircraft in 2011, that remain open, and thus there are potentially thousands of F-35 parts that are being used within the global spares pool that have not been entered into the registry, thereby impeding DOD’s visibility over these parts. DOD has not established a program policy that explicitly defines how it will maintain accountability of F-35 spare parts in accordance with DOD guidance. According to program officials, DOD has made some recent progress to address accountability issues, such as taking steps to bring contracts into compliance with property accountability regulations and increasing the number of staff focused on property accountability within the F-35 program office. However, DOD faces continued challenges in accounting for F-35 assets. In the absence of a program policy, the program lacks clarity on how to categorize assets and which property data the contractor is required to provide for those assets, how to implement policies and regulations, and how to define prime contractor roles and responsibilities. For example, F-35 contracts contain Federal Acquisition Regulation clauses that convey requirements for the prime contractor related to the accountability of government furnished property, including specifying the data that the contractor must maintain and provide to DOD. However, DOD officials said that the F-35 program office has not contractually established which items—including spare parts—are government furnished property, which has made it difficult for the program office to hold the contractor accountable for those required functions. As a result, the contractor has disputed which items should be considered as government furnished property, which has implications for how the prime contractor maintains accountability and provides data for F-35 spare parts it manages. Property accountability officials at the F-35 program office have developed a draft directive that seeks to address the factors currently impeding the program from being compliant with property accountability guidance by clarifying roles and responsibilities within the program office for maintaining accountability of all government furnished property and pooled assets, including the F-35 spare parts in the supply chain, and defining prime contractor responsibilities for managing these items and providing data to the program office for them. Officials told us, however, that the draft directive is undergoing internal review, and that its timeline for approval and implementation has not been established. Program officials said they are also in the process of developing a program instruction that may provide general procedures for implementing the policies that will be established in the directive. Furthermore, while the draft program directive defines property accountability goals for the F-35 program, it does not detail the actions the program office will take to achieve these goals. The program office will face challenges that may impede its ability to achieve the goals of the draft directive, both retroactively and prospectively, for the billions of dollars in F-35 spare parts for which it currently cannot fully account. For example, DOD officials said that the costs for the prime contractor to obtain the data required to meet DOD’s requirements for property accountability will likely be high, as the prime contractor does not centrally maintain all the data, nor do they maintain the data in a readily usable format for property accountability purposes. The contractor has estimated that more than 450,000 hours of labor could be necessary to provide the data. Program officials also acknowledged that the successful implementation of the draft directive is dependent upon support from program office leadership to ensure that its guidance is followed by both program officials and the prime contractor. However, according to these officials, the program has not historically prioritized property accountability in negotiations with the prime contractor because the program office has been focused on the production and fielding of aircraft and developing contracts to which the prime contractor will agree. Standards for Internal Control in the Federal Government states that agencies should define objectives to identify risk, and to design and implement control activities to respond to those risks. These standards also state that without a strong tone at the top to support an internal control system, the entity’s risk identification may be incomplete, risk responses may be inappropriate, control activities may not be appropriately designed or implemented, information and communication may falter, and results of monitoring may not be understood or acted upon to remediate deficiencies. DOD’s recent efforts related to property accountability are positive, but DOD stakeholders have raised concerns about issues related to property accountability within the F-35 program dating back to 2012 that have not been resolved, such as the program’s lack of a populated property system of record. As the fleet expands and the number of spare parts in the supply chain continues to grow, the program office will only continue to face increasing difficulty in obtaining accountability over its F-35 assets if it does not address these challenges. To address the scope of these challenges, DOD will need to establish a unified approach that provides clarity on how to categorize these assets, implement policies and regulations, and define prime contractor roles and responsibilities. Without developing a policy that clearly resolves these issues and defines how the F-35 program will maintain accountability for spare parts within the supply chain that is consistent with DOD guidance—and identifying the steps that it will take to implement it retrospectively and prospectively, such as how the program will obtain the necessary data from the contractor— DOD cannot ensure that it will be able to obtain and maintain comprehensive accountability and visibility over spare parts within the F- 35 supply chain. Moreover, without an understanding of the assets it owns and how those assets are being managed by the prime contractor, DOD cannot ensure that the prime contractor is providing sufficient readiness for its most expensive weapon system at a reasonable cost. DOD cannot identify individual costs for each F-35 spare part, nor can the military services track the funds that they have spent for the use of F-35 spare parts to the actual parts purchased on their financial statements and related documentation. According to contract administration officials, the ability to track costs and assets is also critical to understanding and improving F-35 fleet performance. DOD does not have comprehensive cost information for individual F-35 spare parts. DOD purchases a high volume of spare parts across several contracts each year. According to program documentation, DOD was appropriated more than $960 million for F-35 spare parts in fiscal year 2018 alone (see sidebar). DOD does not have a consistent, methodical process to identify and track the costs of individual F-35 spare parts, which would typically be done through the purchase contracts for the parts. However, the F-35 contracts do not identify the individual parts or their costs. Instead, these costs are aggregated under broad contract line items, such that individual pricing for spare parts cannot be determined. For example, the annual sustainment contract for fiscal year 2018 aggregates the costs to repair and replace spare parts for F-35A aircraft under one contract line item totaling $276 million. The contracts and related documentation do not specify how the money will be distributed among costs for repair or replacement, nor do they specify how many spare parts the contractor will purchase and at what cost. Program officials said that their system for contract management has limitations that make it difficult to separate individual F-35 parts into their own line items. Since those costs are not being specifically provided in the contracts, program officials said that DOD has relied upon several ad hoc, manual workarounds in an attempt to obtain such data for the thousands of F-35 spare parts it owns, but these efforts are not comprehensive. For example, a program official said that they are obtaining cost information from the inspection and receiving forms accompanying deliveries of F-35 spare parts and then manually entering these cost data into attachments to the sustainment contracts. However, DOD officials said that the inspection and receiving forms for deliveries of F-35 spare parts are often not being entered into the registry until years after the parts are delivered, because such forms are not required until the delivery of all parts purchased under the same contract line item are complete. Furthermore, DOD officials said that this process is not an effective long-term solution for maintaining cost data of the billions of dollars in F-35 spare parts that DOD owns, because data entered in the program’s contract management system through manual workarounds do not automatically link to the program office’s other data systems. Program officials said that such linkages are necessary to maintain proper accounting of F-35 spare parts, as cost data constitute one of the required data elements for an accountable property system of record. Similar to the challenges that DOD faces with property accountability, program officials said that DOD faces significant hurdles in obtaining cost data from the prime contractor for individual F-35 spare parts because the contracts have not been written to require those data from the outset of the program. According to program officials, the program office has attempted to negotiate for cost data for F-35 spare parts, but the attempts have not been successful because of the high price the prime contractor would have charged the government for these data. DOD guidance states that understanding program costs, such as those for F-35 spare parts, is critical to both achieving desired performance and supporting financial audits. Specifically, DOD guidance states that the government should clearly understand program costs in order to have effective performance-based arrangements. Along these lines, we have previously reported that DOD’s limited understanding of the actual sustainment costs of the F-35 system will hinder its ability to accurately determine how much fleet performance should cost under performance- based contracts, thus putting DOD at risk of overpaying the prime contractor while not receiving the expected level of sustainment support. Additionally, DOD guidance requires that DOD agencies assign dollar values for spare parts in financial accounting systems. Without a methodical process for consistently obtaining comprehensive cost information from the prime contractor for individual F-35 spare parts, the program office will not be able to maintain financial or property accountability over these parts in accordance with DOD guidance. Furthermore, DOD will continue to face challenges in developing a complete understanding of the costs for the F-35 system, which will impede its ability to effectively negotiate with the prime contractor for sustainment support and to improve readiness of the expanding F-35 fleet. The military services cannot track the funds that they have spent for the purchase of F-35 spare parts to the actual parts on their financial statements and related documentation due to the lack of an established accounting methodology for the parts within the global spares pool. Under this global spares pool construct, the military services and international partners each pay for access to the common pool of spare parts instead of owning the physical parts themselves. However, there is no established accounting methodology for defining how to track funding to the spare parts such that the military services can properly report assets on financial statements. DOD’s Financial Management Regulation requires that DOD agencies—such as the military services—account for all spare parts they purchase for accountability and financial reporting purposes. According to DOD officials, the F-35 program and the DOD Comptroller have been working to develop a policy that provides such guidance since 2015, but it has not yet been finalized and the timeline for completion is unclear. Specifically, program officials said that they are waiting for the DOD Comptroller to finalize a memorandum that would identify the DOD component responsible for maintaining financial accountability of the F-35 spare parts in the global spares pool. According to DOD officials, the memorandum would include an attachment that defines a methodology for tracking funding contributed by the military services and international partners to F-35 spare parts. A draft of this memorandum has laid out a possible methodology to maintain financial accountability for the spare parts within the global spares pool that includes identifying the program office as the DOD component responsible for financial reporting for F-35 parts, but a program official said that the DOD Comptroller has not yet completed this memorandum because the DOD Comptroller is reconsidering the proposed approach. DOD Comptroller officials said that they are reconsidering the proposed approach based on input received from independent public accountants who performed the services’ financial statement audits, to consider having the Department of the Navy or the Air Force, rather than the program office, be the reporting entity for F-35 parts. Without a DOD Comptroller-approved methodology for the services to account for the funds they have spent on F-35 parts within the global spares pool on their financial statements, DOD will be hindered in its efforts to comply with financial improvement and audit readiness requirements, provide supporting details for its financial statement transactions, and render accurate cost information for DOD management, Congress, and others stakeholders to use in assessing and managing program costs and other financial activities associated with the F-35 program. We previously reported that F-35 sustainment costs are not fully transparent to the military services and recommended that DOD should take steps to improve communication with the military services about how the F-35 sustainment costs they are being charged relate to the capabilities received. Furthermore, discrete cost information and an ability to account for funds spent would help DOD in its efforts to decrease costs and make one of its most expensive weapon systems more affordable. Challenges related to readiness and costs—including those we have discussed in this report—are driving the Office of the Secretary of Defense and the services to take actions that diverge from the established F-35 sustainment strategy. These actions indicate a potential shift in DOD’s intent for F-35 supply chain management and a growing desire for more direct involvement by the military services and access to program information from the prime contractor. reliant on the program office for information about system performance and costs. Furthermore, according to Office of the Secretary of Defense and service officials, many of the military services’ sustainment organizations that provide supply and maintenance support to other platforms have had almost no role in the planning for and establishment of sustainment capabilities or ongoing sustainment support for the F-35. Of these common items, more than 6,000 100,000 demands for these common items, 435 of which had impacts on fleet readiness. In April 2018, in a departure from the strategy and structure of the program and at the direction of the Assistant Secretary of Defense (Logistics and Materiel Readiness), the Defense Logistics Agency and the military services’ supply and sustainment organizations initiated planning efforts to develop an option for organic—that is, DOD-managed—supply chain management support that would include increased roles for the services’ supply organizations and the Defense Logistics Agency in assuming responsibility for F-35 supply chain management. In support of this effort, these organizations have begun to develop notional plans to provision an organic supply chain for F-35 aircraft, which includes determining how many parts are required to support the system and how they can be procured. In addition, the Defense Logistics Agency has begun to catalogue a limited portion of F-35 consumable parts from production lots 6 and 7 into DOD’s supply system (see sidebar). However, officials from the Office of the Secretary of Defense and the Defense Logistics Agency said that this initial cataloguing effort only includes the level of detail necessary to support disposal of the parts, and that more comprehensive cataloguing would require DOD to have access to significantly more technical data than are currently available. Prior to this effort, parts used on F-35 aircraft were not tracked by DOD in its logistics information systems. Officials from the Office of the Secretary of Defense said that there are multiple reasons behind DOD’s recent effort to develop an option for DOD-led, organic supply chain management, including DOD’s need to significantly reduce sustainment costs and improve readiness. For example, according to DOD officials, DOD’s early cataloguing efforts have identified more than 7,300 F-35 consumable items that are common to other DOD platforms. Defense Logistics Agency officials said that they are actively working with the program office and prime contractor to identify opportunities for the program to leverage the parts that are already on DOD’s shelves. In the longer term, identifying common parts could potentially allow DOD to directly procure them at a lower cost rather than through the prime contractor, and thereby provide economies of scale across other aviation platforms. Furthermore, the prime contractor and F-35 Joint Program Office have not been able to deliver the supply chain performance that the services need under the current sustainment strategy and structure, as discussed earlier in this report. According to an official from the Office of the Secretary of Defense, DOD is supposed to have a viable back-up plan for contractor logistics support under performance-based logistics contracts, in case the contractor cannot meet the government’s performance requirements. Prior to the ongoing effort, DOD did not have such a plan. Similarly, DOD guidance on performance-based agreements states that robust performance-based logistics solutions include appropriate criteria to cease the arrangement if necessary in order to manage risk. DOD officials involved in the cataloguing and provisioning efforts described a long-term (5 to 10 years) and phased approach to the potential development of DOD-led supply chain management capabilities for the F-35 that would require major changes to the F-35 program structure and contracts. It would also require DOD to obtain significant amounts of technical data on F-35 parts from the manufacturers of those parts (see sidebar). DOD has submitted a request to the prime contractor for a proposal regarding supplying the data necessary to provision an organic supply chain and to catalogue all F-35 parts into DOD’s supply inventory, but as of October 2018, DOD officials said that the prime contractor had not yet provided the costs of these data. Officials from the Office of the Secretary of Defense told us that DOD had initially planned to negotiate for these data as part of the annual sustainment contract for fiscal year 2019, but that the prime contractor had cautioned that this could delay the awarding of the sustainment contract because of the complexity around the data negotiations. Officials said that there were also questions about the type of funds that should be used for the acquisition of these data (that is, procurement or operations and maintenance), and whether some data would need to be directly procured by DOD from the original equipment manufacturers. The lack of data from the contractor to support competition in the F-35 supply chain and DOD’s understanding of the costs and performance of the system has long been a challenge, as we have previously reported. In September 2014, we recommended that DOD develop an Intellectual Property Strategy, to include identification of all critical technical data needs and associated costs. Further, in October 2017, we recommended that prior to entering into multi-year, fixed-price, performance-based contracts, DOD should ensure that it has sufficient knowledge of the actual costs of sustainment and technical characteristics of the aircraft after baseline development is complete and the system reaches maturity. DOD concurred with both recommendations but has not yet implemented them. In addition, ongoing dialogue among stakeholders within the Department of Defense demonstrates a growing desire for more direct military service influence and access to information within the F-35 program. In 2018, the Secretary of Defense directed the U.S. military service chiefs to correct the F-35 parts shortages and to be agents of change in pursuing 80 percent mission capability for the F-35 aircraft. In a September 2018 memorandum responding to the Secretary of Defense’s direction to address F-35 parts shortages, the Air Force Chief of Staff, the Chief of Naval Operations, and the Commandant of the Marine Corps raised concerns about the program’s inadequate supply chain and repair networks and reported on the funding that the services, as customers, provided to the Joint Program office to improve delivery of spare parts and accelerate depot maintenance capability. Furthermore, officials whom we interviewed from each of the military service headquarters expressed frustration with the current sustainment construct of the F-35 program in which they pay large sums of money for less-than-required readiness outcomes but have minimal influence on actions being taken to improve readiness and limited visibility into supply chain modeling and data to support their operational decisions. DOD has not yet determined the actions and investments needed to support the F-35 supply chain in the future, because the department has not charted a clear strategy for F-35 supply chain management. There is a tension between two distinct sustainment concepts—the official contractor logistics support construct and DOD’s current effort to have greater involvement in supply chain management—and F-35 program officials said that the program is caught between the two. In October 2018 DOD issued an updated F-35 Acquisition Strategy, but it did not clearly outline a shift in supply chain management. The new strategy includes references to the potential for increased organic support of the supply chain in the future—but does not provide details about the actions or timelines necessary to support this—while also reaffirming the current sustainment strategy of contractor logistics support for supply chain management. In addition, while the new strategy states the intent to support supply chain cataloguing and provisioning efforts, it does not provide detailed information regarding the investments in technical data necessary to support these efforts. In January 2019, DOD issued an updated F-35 Life-Cycle Sustainment Plan, which highlighted the absence of the technical data to support provisioning and cataloguing as a gap. The plan stated the intent to have all cataloguing and provisioning data available to the services by the end of fiscal year 2024. However, the plan did not provide details regarding how the data were to be procured or address DOD’s future strategy for supply chain management. According to F-35 program, Office of the Secretary of Defense, and Air Force officials, DOD has to provide clear and consistent direction regarding its intent for F-35 supply chain management in order to guide investments in technical data, negotiations with industry, and program actions. In particular, F-35 program officials said that DOD’s mixed messages about supply chain management have led to inefficiency as the F-35 program tries to support both the formal, current strategy and initiatives driven by the informal shift toward more DOD involvement in F- 35 supply chain management. According to program officials, the Product Support Manager organization at the F-35 Joint Program Office was structured for management of a program in which the primary contractors would be providing comprehensive contractor logistics support for the life of the program, and it has not grown in size as the fleet has grown. Furthermore, many of the positions at the program office that are critical to establishing and managing sustainment and supply chain capabilities are unfilled, even as the program office is taking on new responsibilities as Hybrid Product Support Integrator. For example, as of September 2018, Of the 16 positions on the product support maintenance team, which includes depot planning, three were vacant. Of the seven positions on the product support supply chain management team, two were vacant. As of January 2019 program officials said that the number of vacancies had grown to four of seven positions. Of the 42 positions in the directorate of sustainment strategy, 11 were vacant, including the lead roles for strategic planning and risk management and scheduling for the global support solution. In other cases, the numbers of staff dedicated to complex planning efforts are limited or have experienced frequent turnover. For example, officials said that there are only two officials within the program office dedicated to planning for the establishment of the program’s delayed global networks for moving parts, and the lead role had changed four times in a year. Moreover, program officials said that they are inundated with requests for data and information from the Office of the Secretary of Defense and the U.S. military services, which they partially attributed to the informal shift in the program’s strategic intent for sustainment, and to scrutiny related to sustainment performance failures. Officials said that the time spent in responding to requests for data is hindering their ability to focus on long- term actions to improve sustainment performance. The lack of clarity about the future F-35 sustainment strategy could also increase the risk perceived by industry, thus driving up tensions and potential costs in contract negotiations. Program officials said that the increasing technical data requests sent to the prime contractors to support DOD’s provisioning and cataloguing efforts signal to industry a potential change from the acquisition strategy of contractor logistics support for supply chain management. According to Hybrid Product Support Integrator officials, mixed messages about the F-35 program’s future supply chain strategy could make manufacturers reluctant to invest in increasing their capacity to produce new parts and to repair parts, if they do not have confidence in the scope of future business to warrant such investments. Many options for F-35 supply chain management are available to DOD on a spectrum ranging from full contractor logistics support to DOD-led supply chain management or a blend thereof, depending on the aircraft system or subsystem. DOD guidance for program managers states that a sound program strategy requires understanding and clarity of the program’s desired outcomes, and the plans and resources necessary to achieve those outcomes. Furthermore, federal internal control standards demonstrate the necessity of programs defining a clear strategy in order to support program actions. Specifically, the standards state that management should define objectives clearly so that they are understood at all levels of the organization, to include defining what is to be achieved, who is to achieve it, how it will be achieved, and timeframes for achievement. Without clearly defining its strategy for how it will manage the F-35 supply chain in the future and updating key strategy documents accordingly, DOD will continue to face uncertainty about how F-35 sustainment support will be provided over the system’s life cycle and the actions and investments needed to ensure that support. Such uncertainty could further hinder the program’s efforts to improve supply chain performance and reduce costs. The F-35 aircraft, with its advanced warfighting capabilities, is a critical component of the National Defense Strategy. However, DOD will need to overcome substantial supply chain challenges for the aircraft to perform its expected role. Current F-35 performance continues to fall short of warfighter requirements, largely due to spare parts shortages and delays in the development of key repair capabilities. Simply purchasing more F- 35 parts without other trade-offs may not be a viable long-term solution for DOD, given the steep reductions in sustainment costs that the military services have recognized are needed to make the aircraft affordable. These complex problems necessitate a comprehensive review by DOD to determine what actions should be taken to close the gap between warfighter requirements and the capabilities that the F-35 supply chain can deliver. Absent such actions, DOD risks that the F-35 will not be able to conduct the full range of intended missions. The military services are integrating the F-35 into their operations with recent deployments and the establishment of F-35 bases overseas, but these events have also highlighted key risks for DOD in how it is managing and moving aircraft parts around the world. If not addressed, these risks could hinder the readiness of the global fleet. To date, DOD has been able to mitigate some of these risks by placing singular focus on ensuring the success of early F-35 deployments, but this will not be possible with the rapid expansion of the fleet in the next few years. Specifically, without a process and funding to make changes to the spare parts within their afloat and deployment spares packages to ensure that these match their needs, the military services risk not meeting operational requirements during future deployments. Fleet-wide spare parts shortages are also putting the F-35 program’s process for prioritizing scarce F-35 parts to the test. Absent comprehensive business rules, the F-35 program could face challenges in transparently allocating parts to support competing U.S. and international requirements. Further, because the F-35 program did not fully recognize the complexity of establishing a global network for moving F-35 parts, this network is now several years behind schedule. Without a detailed plan that includes clear requirements and milestones to fully establish the network, as well as mechanisms to identify and mitigate the risk posed by any gaps or delays, DOD cannot ensure that it will be able to take the network from concept to reality so that F-35 participants do not experience long wait-times for parts in order to fly their aircraft. Moreover, in its rush to field aircraft and its heavy reliance on the prime contractor, DOD has not focused on property and financial accountability of F-35 spare parts. Simply put, DOD does not have records of all the F- 35 spare parts it has purchased; where those parts are located; and how much the military services paid for them. Until DOD establishes a policy that clearly defines how the F-35 program will maintain accountability for spare parts within the supply chain and lays out the steps that it will take to implement that policy, DOD will continue to lack critical visibility of F-35 assets, which is necessary to hold the prime contractor accountable for providing sufficient readiness at a reasonable cost. Additionally, without a process to consistently obtain comprehensive cost information from the prime contractor for F-35 spare parts, DOD will not have a full picture of F-35 costs, which could impede its ability to effectively negotiate with the prime contractor for sustainment support and to improve readiness of the expanding F-35 fleet. Further, absent a DOD Comptroller-approved methodology for the military services to record on their financial statements the funds spent on F-35 parts, DOD will be hindered in its efforts to comply with financial improvement and audit readiness requirements. As a result, DOD will not be able to assure the taxpayer that it fully understands how funds have been spent on this costly weapon system. Finally, from the start of the F-35 program, the U.S. military services have been largely reliant on the prime contractor to manage the F-35 supply chain and to support their operations, with oversight from the program office. However, the Office of the Secretary of Defense and the services have grown dissatisfied with the program’s inability to meet their readiness requirements and reduce costs, and they have begun to take actions that indicate the potential for a significant shift in DOD’s F-35 sustainment strategy that would have far-reaching implications for the program. This shift, if fully implemented, would give more control of the supply chain to the federal government, but it also would run counter to the way in which agreements with industry and international participants have been constructed. Until DOD clearly defines its strategy for managing the F-35 supply chain in the future—to include any additional actions and investments necessary to support that strategy—the F-35 program will lack the certainty and unity of effort necessary to meaningfully improve supply chain performance and reduce costs. We are making the following eight recommendations to DOD. The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, the Secretaries of the Air Force and Navy, and the Commandant of the Marine Corps, conducts a comprehensive review of the F-35 supply chain to determine what additional actions are needed to close the gap between warfighter requirements for aircraft performance and the capabilities that the F-35 supply chain can deliver, in light of the U.S. services’ affordability constraints. Potential actions could include adjustments to the quantities of parts DOD is planning to procure, or developing a mechanism for providing increased availability of parts to operational units, as a means to mitigate fleet-wide shortages. (Recommendation 1) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, the Secretaries of the Air Force and Navy, and the Commandant of the Marine Corps, develops a process to modify the afloat and deployment spares packages, to include reviewing the parts within the packages to ensure that they match deploying aircraft and account for updated parts demand, and aligning any necessary funding needed for the parts updates. (Recommendation 2) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, the Secretaries of the Air Force and Navy, and the Commandant of the Marine Corps, revises the business rules for the prioritization of scarce F-35 parts across all program participants so as to clearly define the roles and responsibilities of all stakeholders, the process for assigning force activity designations, and the way in which deviations from the business rules will be conducted. (Recommendation 3) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, completes a detailed plan for the establishment of the global network for moving F-35 parts that outlines clear requirements and milestones to reach full operational capability, and that includes mechanisms to identify and mitigate risks to the F-35 global spares pool. (Recommendation 4) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, issues a policy consistent with DOD guidance that clearly establishes how DOD will maintain accountability for F-35 parts within the supply chain, and identify the steps needed to implement the policy retrospectively and prospectively—for example, how DOD will obtain the necessary data from the contractor. This policy should provide clarity on how F-35 parts will be categorized, specify how the program will implement DOD regulations, and define prime contractor roles and responsibilities. (Recommendation 5) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, develops a methodical approach to consistently obtain comprehensive cost information from the prime contractor for F-35 spare parts within the supply chain. (Recommendation 6) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the Department of Defense Comptroller, the Secretaries of the Air Force and Navy, and the F-35 Program Executive Officer, completes and formalizes a methodology for the U.S. services to use in recording on their financial statements the funds spent on F-35 parts within the global spares pool. (Recommendation 7) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment, together with the F-35 Program Executive Officer, the Secretaries of the Air Force and Navy, and the Commandant of the Marine Corps, clearly defines the strategy by which DOD will manage the F-35 supply chain in the future and update key strategy documents accordingly, to include any additional actions and investments necessary to support that strategy. (Recommendation 8) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix II, DOD concurred with our recommendations and identified actions that it was taking or planned in response. We are providing copies of this report to appropriate congressional defense committees; the Acting Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; the F-35 Program Executive Officer; the Secretaries of the Air Force and Navy; and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9627 or maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Staff members making key contributions to this report are listed in appendix III. For each of our objectives, we reviewed relevant F-35 sustainment and supply chain plans, program briefs, guidance, and other documentation and collected information by interviewing officials from the Office of the Secretary of Defense for Acquisition and Sustainment, the F-35 Joint Program Office, the U.S. Air Force, the U.S. Navy, the U.S. Marine Corps, and the prime contractor, Lockheed Martin. To interview officials and observe F-35 supply and maintenance operations, we conducted site visits to two F-35 operational locations—Hill Air Force Base, Utah, and Marine Corps Air Station Yuma, Arizona; and one training location—Luke Air Force Base, Arizona. We selected these locations to obtain perspectives from both operational and training units from multiple U.S. military services using different variants of the aircraft, and to gather insights of international partners co-located at these bases, among other factors. Additionally, we interviewed officials from the only overseas- based U.S. F-35 operational squadron at Marine Corps Air Station Iwakuni, Japan, by phone. A complete listing of organizations we contacted for this review is provided later in this appendix. In support of our objectives, we gathered various data related to the F-35 supply chain, such as parts availability, repair, aircraft performance, and customer wait time data. We gathered data for fiscal year 2018 (October 2017 – September 2018) and available data from the F-35 program’s 2018 sustainment contract period (May – November 2018) in order to provide the most recent information for F-35 fleet performance and overall supply chain management available during our audit timeframes. To determine the reliability of these data, we collected information on how the data were collected, managed, and used through a questionnaire and interviews with relevant DOD officials and the prime contractor. Although we identified some limitations in the way that certain data are being collected and reported— such as data related to aircraft performance, aircraft that are not mission capable due to a lack of parts, and parts cannibalization that could potentially result in inaccuracies—we determined that they are sufficiently reliable for the way in which we reported them and our purposes of providing information on the progress and challenges within the program. Specifically, the parts cannibalization rates that we discuss are sufficiently reliable to discuss generally in comparison to program objectives. All other supply chain and performance data presented in our report are sufficiently reliable to present as specific data points. To assess the extent to which F-35 performance is meeting warfighter requirements and any challenges with spare parts availability, we reviewed DOD and contractor sustainment and supply chain plans, briefings, and reports, and interviewed Office of the Secretary of Defense, U.S. service, program office, and prime contractor officials to determine the degree to which the supply chain is currently able to provide parts to meet the U.S. services’ requirements. In addition, we obtained data related to F-35 parts availability and aircraft performance data for May through November 2018 and compared these to the program’s target and the U.S. services’ requirements for these metrics to identify any gaps between requirements and actual performance. We also obtained data related to 3-month average part repair times and part repair backlogs as of November 2018—the most currently available data at the time of our review. In order to assess the extent to which the supply chain is positioned to meet future warfighter requirements, we examined program plans, briefs, and other related documentation, and we interviewed Office of the Secretary of Defense, U.S. service, program office, and prime contractor officials to identify the actions that DOD is taking to increase the availability of F-35 spare parts, DOD’s projections for when these actions will result in improvements in F-35 aircraft performance, and ongoing areas of challenge that could create risk for the program in meeting future warfighter requirements. Finally, we used principles from the Standards for Internal Control in the Federal Government and DOD guidance for performance-based arrangements related to how programs should be structured to meet requirements and respond to risk as a basis to determine whether DOD needs to take further actions to ensure that the F-35 supply chain is positioned to meet future warfighter requirements. To assess the extent to which DOD can effectively manage and move F- 35 parts to support aircraft around the world, we reviewed military service and program briefings and data related to DOD’s fiscal year 2018 F-35 operational deployments, and we interviewed service, program office, and contractor officials about how the F-35 supply chain and its global spares pool were able to support these deployments, including the extent to which the packages of parts that the military services purchased to support these deployments were built to meet their requirements. We reviewed DOD guidance related to managing risk in acquisition programs and the Navy’s process and guidance for ensuring that the packages of parts for legacy aircraft are built to meet the requirements of deploying aircraft, and we assessed the F-35 program’s processes for identifying and addressing risks related to the sufficiency of its deployment parts packages against these criteria. We also reviewed the F-35 program’s business rules for allocating and prioritizing scarce F-35 assets and related documentation, and we interviewed officials from the Joint Staff, Office of the Secretary of Defense, the services, the program office, and the prime contractor to understand how the business rules are being applied and to identify any related F-35 program participant perspectives about or gaps in the rules. We also reviewed DOD guidance related to prioritizing materiel and parts to identify standard DOD policies for legacy aircraft, and Standards for Internal Control in the Federal Government, and we used these as a basis to assess whether the F-35 program’s business rules for allocating scarce F-35 parts are sufficiently clear and comprehensive. In addition, we reviewed available plans, briefs, and other documentation to understand the F-35 program’s envisioned global network for moving F-35 parts, the current state of the network, and the program’s projections for full implementation of the network. Further, we obtained data from December 2017 through November 2018 related to customer wait times for parts to determine whether program participants located outside of the continental United States are waiting longer for parts than those located inside of the continental United States. We also interviewed officials from the program office, prime contractor, Office of the Secretary of Defense, the services, and U.S. Transportation Command to discuss the progress being made and challenges the program faces in developing the global network to move F-35 spare parts. Finally, we assessed DOD’s plans for establishing its global network for moving parts against key acquisition program management practices that can improve program outcomes if implemented and DOD guidance related to managing risk in acquisition programs. To assess the extent to which DOD can account for F-35 spare parts within the supply chain and their associated costs, we reviewed program briefs, DOD guidance and the Federal Acquisition Regulation, and sustainment contracts and related documentation, and we interviewed program and contractor officials to determine how the program office is maintaining accountability for F-35 spare parts, to include roles and responsibilities for property accountability and any associated challenges. In addition, we reviewed draft guidance and program briefs and documentation, as well as interviewed officials from the program office, to identify the actions the program is taking to improve its ability to maintain accountability of parts in the F-35 program. We compared these efforts against criteria in DOD guidance for property accountability and Standards for Internal Control in the Federal Government to assess whether the program’s current efforts to obtain and maintain accountability for F-35 spare parts are sufficient to bring the program into alignment with DOD guidance, and whether any additional actions are needed. To assess the extent to which DOD is maintaining accountability over costs associated with F-35 spare parts, we reviewed program plans and documentation related to the construct of the global spares pool. We also reviewed sustainment contracts and supplemental contract documentation, and we interviewed officials from the program office, Office of the Secretary of Defense, and Defense Contract Management Agency to determine what information DOD has been able to obtain about the quantity and cost of F-35 spare parts and the approaches that DOD uses to collect such information. Additionally, we identified criteria within DOD guidance for performance-based arrangements and the DOD Financial Management Regulation to serve as a basis to assess whether the program office’s approach for obtaining cost information is sufficient to support program and financial management requirements. We also reviewed DOD and program office documentation and spoke with officials from the program office and the Office of the Under Secretary of Defense (Comptroller) to determine the extent to which the program office has developed a methodology to track the funds paid by the U.S. military services for F-35 parts to the actual parts within the global spares pool. Finally, we used the DOD Financial Management Regulation as a basis to assess whether the program has the ability to adequately track funds paid by the U.S. military services for F-35 spare parts to the actual parts within the global pool to support financial audits. To assess the extent to which actions DOD is taking to address supply chain challenges are consistent with the established F-35 program sustainment strategy, we reviewed key F-35 program strategy, planning, and structure documents—such as the 2016 and 2018 F-35 Acquisition Strategies, the Life-Cycle Sustainment Plan, and program office organizational structures—and F-35 sustainment contracts to determine the program’s formal strategy and structure for F-35 supply chain management. We also reviewed documentation related to DOD’s efforts to develop an option for DOD-management of the F-35 supply chain, such as data requests and a memorandum, and we interviewed officials from the Office of the Secretary of Defense for Acquisition and Sustainment, Defense Logistics Agency, military service sustainment commands, the program office, and the prime contractor to understand the extent to which DOD is pursuing a DOD-managed F-35 supply chain, whether these efforts are aligned with the established F-35 program strategy, and the effects of such actions on the program office’s ability to execute F-35 sustainment with the prime contractor, Lockheed Martin. In addition, we assessed DOD’s efforts to establish a DOD-managed option for supply chain management against principles from DOD planning guidance and Standards for Internal Control in the Federal Government for defining objectives and clearly aligning actions and resources to meet those objectives. In support of our work, we interviewed officials from the following DOD organizations and other organizations during our review. We selected these organizations based on their oversight, planning, and execution roles related to F-35 sustainment, supply chain management, and operations. United Kingdom Ministry of Defence We conducted this performance audit from January 2018 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Alissa Czyz (Assistant Director), Vincent Buquicchio, Kasea Hamar, Amie Lesser, Sean Manzano, Michael Silver, Tristan T. To, and Cheryl Weissman made key contributions to this report. F-35 Joint Strike Fighter: Development Is Nearly Complete, but Deficiencies Found in Testing Need to Be Resolved. GAO-18-321. Washington, D.C.: June 5, 2018. Warfighter Support: DOD Needs to Share F-35 Operational Lessons Across the Military Services. GAO-18-464R. Washington, D.C.: April 25, 2018. Military Aircraft: F-35 Brings Increased Capabilities, but the Marine Corps Needs to Assess Challenges Associated with Operating in the Pacific. GAO-18-79C. Washington, D.C.: March 28, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. F-35 Joint Strike Fighter: DOD’s Proposed Follow-on Modernization Acquisition Strategy Reflects an Incremental Approach Although Plans Are Not Yet Finalized. GAO-17-690R. Washington, D.C.: August 8, 2017. F-35 Joint Strike Fighter: DOD Needs to Complete Developmental Testing Before Making Significant New Investments. GAO-17-351. Washington, D.C.: April 24, 2017. F-35 Joint Strike Fighter: Continued Oversight Needed as Program Plans to Begin Development of New Capabilities. GAO-16-390. Washington, D.C.: April 14, 2016. F-35 Sustainment: DOD Needs a Plan to Address Risks Related to Its Central Logistics System. GAO-16-439. Washington, D.C.: April 14, 2016. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress. GAO-16-489T. Washington, D.C.: March 23, 2016. F-35 Joint Strike Fighter: Assessment Needed to Address Affordability Challenges. GAO-15-364. Washington, D.C.: April 14, 2015. F-35 Sustainment: Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates. GAO-14-778. Washington, D.C.: September 23, 2014. F-35 Joint Strike Fighter: Slower Than Expected Progress in Software Testing May Limit Initial Warfighting Capabilities. GAO-14-468T. Washington, D.C.: March 26, 2014. F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities. GAO-14-322. Washington, D.C.: March 24, 2014. F-35 Joint Strike Fighter: Restructuring Has Improved the Program, but Affordability Challenges and Other Risks Remain. GAO-13-690T. Washington, D.C.: June 19, 2013. F-35 Joint Strike Fighter: Program Has Improved in Some Areas, but Affordability Challenges and Other Risks Remain. GAO-13-500T. Washington, D.C.: April 17, 2013. F-35 Joint Strike Fighter: Current Outlook Is Improved, but Long-Term Affordability Is a Major Concern. GAO-13-309. Washington, D.C.: March 11, 2013. Joint Strike Fighter: DOD Actions Needed to Further Enhance Restructuring and Address Affordability Risks. GAO-12-437. Washington, D.C.: June 14, 2012. Joint Strike Fighter: Restructuring Added Resources and Reduced Risk, but Concurrency Is Still a Major Concern. GAO-12-525T. Washington, D.C.: March 20, 2012. Joint Strike Fighter: Implications of Program Restructuring and Other Recent Developments on Key Aspects of DOD’s Prior Alternate Engine Analyses. GAO-11-903R. Washington, D.C.: September 14, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Is Still Lagging. GAO-11-677T. Washington, D.C.: May 19, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Still Lags. GAO-11-325. Washington, D.C.: April 7, 2011. Joint Strike Fighter: Restructuring Should Improve Outcomes, but Progress Is Still Lagging Overall. GAO-11-450T. Washington, D.C.: March 15, 2011.", "summary": "DOD's F-35 fighter jet provides key aviation capabilities to support the U.S. National Defense Strategy. The F-35 is also DOD's most costly weapon system, with sustainment costs estimated at more than $1 trillion over a 60-year life cycle. The F-35's supply chain has a unique design. Rather than owning the spare parts for their aircraft, the Air Force, Navy, and Marine Corps—along with eight international partners and other foreign military sales customers—share a common, global pool of F-35 parts that are managed by the prime contractor. You asked us to review the F-35 supply chain. This report assesses, among other things, the extent to which (1) F-35 performance is meeting warfighter requirements and any challenges related to the availability of spare parts; (2) DOD can effectively manage and move F-35 spare parts to support aircraft around the world; and (3) DOD can account for F-35 spare parts and their costs within the supply chain. GAO reviewed DOD and contractor documentation, analyzed performance data, and interviewed relevant officials. F-35 aircraft performance is falling short of warfighter requirements—that is, aircraft cannot perform as many missions or fly as often as required. Figure: F-35 Fleet Aircraft Performance, May 2018 — November 2018 This lower-than-desired aircraft performance is due largely to F-35 spare parts shortages and difficulty in managing and moving parts around the world: Spare parts shortages and limited repair capabilities. F-35 aircraft were unable to fly nearly 30 percent of the May—November 2018 time period due to spare parts shortages. Also, the Department of Defense (DOD) had a repair backlog of about 4,300 F-35 parts. DOD is taking steps to fix these issues, such as improving the reliability of parts. However, it has not fully determined actions needed to close the gap between warfighter requirements and the performance the F-35 supply chain can deliver. Mismatched parts for deploying aircraft. DOD purchases certain sets of F-35 parts years ahead of time to support aircraft on deployments, including on ships. But the parts do not fully match the military services' needs because F-35 aircraft have been modified over time. For example, 44 percent of purchased parts were incompatible with aircraft the Marine Corps took on a recent deployment. Without a process to modify the sets of parts for deployments, DOD may be unable to meet the services' operational needs. An immature global network to move F-35 parts. DOD's networks for moving F-35 parts around the world are immature, and overseas F-35 customers have experienced long wait times for parts needed to repair aircraft. Without a detailed plan for the network, DOD may not be ready to support an expanding fleet. In addressing these challenges, DOD must grapple with affordability. The Air Force and Marine Corps recently identified the need to reduce their sustainment costs per aircraft per year by 43 and 24 percent, respectively. DOD has spent billions of dollars on F-35 spare parts but does not have records for all the parts it has purchased, where they are, or how much they cost. For example, DOD is not maintaining a database with information on F-35 parts the U.S. owns, and it lacks the necessary data to be able to do so. Without a policy that clearly defines how it will keep track of purchased F-35 parts, DOD will continue to operate with a limited understanding of the F-35 spare parts it owns and how they are being managed. If left unaddressed, these accountability issues will impede DOD's ability to obtain sufficient readiness within affordability constraints. GAO is making eight recommendations, including that DOD determine actions to close the gap between warfighter requirements and F-35 supply chain performance; and address challenges with deployments, global parts movement, and spare parts accountability. DOD concurred with all of GAO's recommendations.", "document_type": "gao"}
{"report": "The Cannon Building, completed in 1908, is the oldest congressional office building and occupied by Members and their staffs. (See fig. 1.) The Cannon Building houses 142 office suites, five conference rooms, four hearing rooms, and the Caucus Room, which can accommodate large meetings. The building also includes a library, food servery, and a health unit. AOC began developing the scope for the Cannon project in approximately 2004 when its consultant conducted a facility condition assessment that identified the building’s deficiencies. This condition assessment identified, for example, that the hot water heating and air-handling systems had components dating back to the 1930s that are in need of replacement. In addition, the assessment identified deficiencies such as an outdated fire alarm system for which repair parts were difficult to obtain, worn and damaged marble tile in corridors, and original windows that were damaged and often nonfunctional. AOC continued its planning and design work through 2014 to establish the final scope of the Cannon project, which entailed correcting most of the identified deficiencies and addressing current requirements such as for energy conservation, physical security, hazardous materials abatement, and historic preservation. Key components of the project, among other things, include: substantial reconfiguration of member suites and the reconstruction of the building’s top floor to convert storage space into new suites, refurbishment of windows and installation of a new roof, preservation of the building’s stone exterior, replacement of all plumbing, heating and cooling, fire protection, electrical, and alarm systems, and refurbishment of restrooms to make them more accessible to people with disabilities. As part of the development process for the Cannon project, AOC established a budget of approximately $753 million. Key components of the budget include costs for the construction contract; architect and engineering (A/E) design services; construction management support; security; furniture and fixtures; swing space design and construction; contractor incentive bonuses; and contingency. AOC is using the Construction Manager as Constructor (CMc) delivery method to implement the Cannon project. Under this approach, AOC: contracted with a construction contractor that consulted on the project’s design, and negotiated with the construction contractor to set a “guaranteed maximum price” for the construction work based on the completed design. AOC also contracted with an A/E firm, which produced the design for the project and is providing consultation during construction, and with a Construction Manager as Agent (CMa), that provides administrative and technical support to AOC in managing the construction work. AOC scheduled the Cannon project’s construction in five sequential phases with an initial phase (Phase 0) for utility work and four subsequent phases (Phases 1 through 4) to renovate the north-, south-, east-, and west-facing sides of the building. Each phase is scheduled around a 2- year congressional session. As the project progresses, tenants displaced during construction (Phases 1 through 4) are to move to temporary offices while other occupants are to remain in the building sections not affected by construction. Currently, AOC has substantially completed Phase 0 and Phase 1 of the five phases planned for the Cannon project and is progressing with work on Phase 2, which it expects to complete in November 2020. (See fig. 2.) AOC completed Phase 0, as planned and under its budget estimate, from January 2015 through December 2016. This work primarily included the construction contractor’s replacement of the utility infrastructure and distribution systems in the basement, garage, and courtyard. During this time, AOC also managed the work of its Construction Division to build 31 additional Member Suites to offset the suites that would be inaccessible when sections of the building were under construction. From January 2017 through December 2018, AOC managed the renovation of the first of four building sections, consisting of the building’s west side (facing New Jersey Avenue) and Rotunda (Phase 1). AOC substantially completed Phase 1 to enable occupancy of the building section, as planned, on January 3, 2019, at the start of the 116th Congress. However, it is continuing to address “punch-list” items of incomplete or corrective work from Phase 1. AOC expects to complete the punch-list items by December 2019. Further, AOC encountered several issues during the Phase 1 renovation that have prevented it from settling the costs for this phase and that will affect the cost of the project’s later phases. According to AOC’s most current (July 2019) Executive Summary, unforeseen conditions, design issues, and scope changes have increased both the estimated cost for Phase 1 and the project’s three remaining phases. For example, AOC found that more extensive exterior stone restoration was needed than planned and encountered some unforeseen asbestos-containing materials in the roof that it needed to mitigate. Further, AOC needed to provide additional security features to address U.S. Capitol Police requests. Collectively, these issues are creating cost pressures that have caused AOC to reassess the cost to complete the project. We discuss the project’s costs in greater detail later in this testimony. AOC is currently progressing, as planned, in renovating the north side of the building (facing Independence Avenue), which is the second of the four building sections to be renovated (Phase 2). Because the work in this phase and the Cannon project’s remaining phases is similar to work completed in Phase 1, AOC expects to benefit from its application of lessons learned. For example, AOC reported that its construction contractor experienced challenges installing the temporary roof enclosure that it used in Phase 1. Based on this experience, AOC officials told us that the contractor developed a new design for the temporary roof enclosure that the contractor expects to install more rapidly in the project’s remaining phases than in Phase 1. Further, because the materials in Phases 2 through 4 are the same as in Phase 1, AOC officials expect that the process of approving the construction contractor’s use of these materials should proceed faster in these later phases and enable construction to progress more efficiently. In 2009, we reported that AOC expected to request approximately $753 million for the Cannon project. At the time, AOC expected the project to be in five phases over 5 years. Because the project was in an early development stage at that time, we said: that AOC’s estimate should not be considered sufficiently accurate for funding purposes, that the cost and scope were likely to change, and that it would be important for AOC to continue to refine the project’s scope and cost estimate to provide Congress with the information it needed to make decisions about the project. When we next reported on the Cannon project in 2014, AOC had completed most of the planning and design and was preparing to award the contract for construction, which was to begin in January 2015. As part of our 2014 review of AOC’s cost estimating policies and guidance, we compared AOC’s cost estimate for the Cannon project—still $753 million—to our leading practices for developing high-quality, reliable cost estimates. We found the AOC’s cost estimate reflected several, but not all, of our leading practices. In particular, we found that AOC’s estimate included ground rules and assumptions; provided a reasonable explanation of the basic estimation methodologies; and integrated separately produced estimates from AOC’s architect, construction manager, and construction contractor to enable a reasonably accurate assessment of estimated costs. Further, we found AOC had conducted a cost risk and uncertainty analysis in accordance with a key leading practice. This analysis concluded that based on AOC’s inputs and assumptions, there was a high probability (over 90 percent) that actual costs would be equal to or less than AOC’s $753 million estimate. This estimate included contingency factors to account for risks and uncertainties. However, our review of AOC’s guidance for developing cost estimates found that the guidance did not provide documented reasons explaining how the actual contingency amounts were developed. In addition, we found that the method AOC used to model the project’s risks in its cost risk and uncertainty analysis (1) resulted in an unusually narrow range of estimated costs and (2) provided managers limited ability to understand the effects of individual risks. We recommended that AOC improve its cost-estimating process, such as by incorporating leading practices we identified as lacking for cost estimating into its cost- estimating guidance and policies. AOC has since implemented our recommendations. In January 2018, while Phase 1 of the Cannon project was in progress, AOC updated its analysis of risks by undertaking a study (termed an integrated cost-schedule risk analysis) to determine the potential effects of these risks on the project’s cost and schedule. Updating risk analyses and their effect on project cost estimates is consistent with leading practices for developing both a high-quality, reliable cost estimate and schedule. AOC’s 2018 analysis arrived at the same conclusion as its 2014 analysis—that the estimated $753 million total project cost was adequate and that there was a high probability (over 80 percent) that actual costs would be equal to or less than the $753 million estimate. However, this analysis was qualified on the assumption that AOC and project stakeholders are able to adequately mitigate risks identified through the analysis. Additionally, the analysis indicated that inaccurate estimates of costs for risk mitigations, currently unknown risks, and optimistic assumptions about the impact of risk mitigations on the project’s cost and schedule could affect the project’s total cost. As noted previously, the project is experiencing cost pressures from the greater-than-anticipated risks and ineffective mitigations stemming from unforeseen conditions, design issues, and scope changes. In June 2019, AOC reported that it expects that the cost to complete the Cannon project will increase by 10 to 15 percent over its initial estimate of $753 million, resulting in a final cost between approximately $828 million and $866 million. AOC reported that the following key factors affect the project’s cost: Phase 1 completion costs. While Phase 1 work has been substantially completed, AOC has yet to settle all outstanding change proposals. AOC reported that the cost to complete Phase 1 is greater than it initially planned and that it will not know the final cost for this phase until it completes negotiations of the cost of unsettled change proposals. Phase 2 modifications. While Phase 2 work has begun, AOC is awaiting the contractor’s proposal on the costs to address the requirements outlined in four “design bulletins” issued by AOC that, in part, describe changes to the project’s scope based on lessons learned in Phase 1. AOC estimates that the contract modifications described by the design bulletins will increase the cost of Phase 2. Phase 3 and 4 modifications. AOC expects that it will award these future phases of the project at higher amounts than it initially planned based, in part, on the estimated cost of incorporating the additional work described in the design bulletins. In August 2019, AOC began updating its integrated cost-schedule risk analysis, with the aim of more accurately determining the extent to which the project’s costs are increasing and its estimated cost at completion. By updating the analysis, AOC should be better able to make informed decisions as construction progresses. Further, updating the analysis should enable AOC to more precisely estimate the Cannon project’s cost at completion and better position AOC to make a more accurate budget request to Congress for remaining costs. Chairperson Lofgren, Ranking Member Davis, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff has any questions concerning this testimony, please contact Terrell Dorn at (202) 512-6923 or dornt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contacts named above: Michael Armes (Assistant Director); George Depaoli (Analyst-in-Charge); Geoffrey Hamilton; Malika Rice; Kelly Rubin; Steve Schluth; and Amelia Michelle Weathers made key contributions to the testimony. Other staff who made contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Cannon project intends to preserve the historic character while improving the functionality of the 111 year-old Cannon Building—the oldest congressional office building—as well as address deterioration to the building and its components. The project—nearing the mid-point of its planned 10-year duration—is being implemented in five sequential phases with an initial phase (Phase 0) for utility work and four subsequent phases (Phases 1 through 4) to renovate the north-, south-, east-, and west-facing sides of the building. Each phase is scheduled around a 2-year congressional session. This statement describes: (1) the status of the Cannon project and (2) changes to the project's estimated cost at completion. This statement is based on GAO's prior reports in 2009 and 2014 and ongoing monitoring of the project. To monitor the project, GAO has been observing the ongoing construction, attending project meetings, and analyzing AOC documents. The Architect of the Capitol (AOC) has substantially completed two of five planned phases to renovate the Cannon House Office Building (Cannon project). AOC completed Phase 0 utility work; has almost finished the Phase 1 work to renovate the building's west side, as planned; and is progressing with Phase 2 work to renovate the building's north side. From 2009 to 2018, AOC consistently estimated the project cost at $753 million, but AOC reported in June 2019 that it expects costs to increase by 10 to 15 percent, resulting in a total cost of approximately $828 million to $866 million. In 2014, GAO found that AOC's cost estimate of $753 million reflected several, but not all, of GAO's leading practices for high-quality, reliable cost estimates, including that AOC had conducted a risk and uncertainty analysis. In January 2018, AOC updated its analysis of risks by undertaking an integrated cost-schedule risk analysis. AOC's 2018 analysis arrived at the same conclusion as its earlier analysis—that the project's estimated $753 million total cost was adequate to complete the project. However, AOC's 2018 analysis indicated that inaccurate estimates of costs for risk mitigations, unknown risks, and optimistic assumptions about the effect of risk mitigations on the project's cost and schedule could affect its total cost. In June 2019, AOC reported that greater-than-expected risks, such as from unforeseen conditions that led to more extensive exterior stone restoration than anticipated and the unplanned mitigation of asbestos in roof materials, would increase the project's cost. AOC is currently determining the effect of these and other changes on Phase 1, where work has been substantially completed, but costs have not been settled. AOC is also determining how the costs of the project's remaining phases will be affected by scope changes stemming from lessons learned in Phase 1. Toward this end, in August 2019, AOC began updating its integrated cost-schedule risk analysis, with the aim of more accurately determining the extent to which the project's costs are increasing and its estimated cost at completion. In 2014, GAO made recommendations pertaining to AOC's cost-estimating guidance and policies. AOC has implemented these recommendations.", "document_type": "gao"}
{"report": "The purpose of federal banking supervision is to help ensure that depository institutions throughout the financial system operate in a safe and sound manner and comply with federal laws and regulations for the provision of banking services. In addition, federal banking supervision looks beyond the safety and soundness of individual institutions to promote the stability of the financial system as a whole. Each depository institution in the United States is primarily supervised by one of the following three federal banking regulators: The Federal Reserve supervises state-chartered banks that are members of the Federal Reserve System, bank and savings and loan holding companies, Edge Act and agreement corporations, and the U.S. operations of foreign banks. FDIC supervises insured state-chartered banks that are not members of the Federal Reserve System, state-chartered savings associations, and insured state-chartered branches of foreign banks. OCC supervises federally-chartered national banks and savings associations and federally-chartered branches and agencies of foreign banks. These federal banking regulators have broad authority to examine depository institutions subject to their jurisdiction. Federal banking regulators carry out a number of supervisory activities in overseeing management of large depository institutions (see table 1 for a summary of supervision programs for large depository institutions). The supervisory activities are conducted both off- and on-site. Generally, federal banking regulators use off-site systems to monitor the financial condition of an individual bank; groups of banks with common product, portfolio, or risk characteristics; and the banking system as a whole between on-site examinations. Federal banking regulators generally conduct on-site supervision by stationing examiners at specific institutions. This practice allows examiners to continuously analyze information provided by the financial institution, such as board meeting minutes, institution risk reports or management information system reports. This type of supervision is intended to allow for timely adjustments to the supervisory strategy of the examiners as conditions change within the institutions. FDIC, the Federal Reserve, and OCC are required to conduct a full- scope, on-site examination of each insured depository institution they supervise at least once during each 12-month period. The regulators may extend the examination interval to 18 months, generally for institutions that have less than $3 billion in total assets and that meet certain conditions, based on ratings, capitalization, and status of formal enforcement actions, among others. For large institutions, federal banking regulators do not conduct an annual point-in-time examination of the institution. Rather, they conduct ongoing examination activities that are generally intended to evaluate an institution’s operating condition, management practices and policies, and compliance with applicable laws and regulations. In particular, examiners review an institution’s condition using the Uniform Financial Institutions Rating System, also known as CAMELS (capital adequacy, asset quality, management, earnings, liquidity, and sensitivity to market risk). Evaluations of CAMELS components consider an institution’s size and sophistication, the nature and complexity of its activities, and its risk profile. Throughout the examination cycle, each target examination will result in a letter that is transmitted to the institution (where applicable). At the end of the supervisory cycle, a report of examination is issued to the institution. The target examination letter and report of examination may include supervisory concerns that examiners found and that an institution is expected to address within specific time frames. The regulators also issue supervisory guidance, which they describe as including interagency statements, advisories, bulletins, policy statements, questions and answers, and frequently asked questions issued to their respective supervised institutions. Supervisory guidance outlines the regulators’ supervisory expectations or priorities and articulates general views regarding appropriate practices for a given subject area. The guidance often provides examples of practices that the regulators generally consider consistent with safety and soundness standards or other applicable laws and regulations. According to the regulators, supervisory guidance is not legally binding. For instance, FDIC financial institution letters generally announce matters of interest to those responsible for operating an institution. Federal Reserve supervision and regulation letters address significant policy and procedural matters. OCC bulletins generally accomplish the same goals as FDIC and Federal Reserve letters. The letters and bulletins are published on each regulator’s website. Often, the contents of these documents are incorporated into broader examination manuals. Moreover, the federal banking regulators have developed internal control functions within the supervision programs for large depository institutions, which consist of several layers of review following examinations. Each regulator has a review process at the conclusion of examinations, and examiners prepare written products documenting their findings and meet with regional and headquarters officials to finalize decisions. Also, each regulator maintains an internal review function to ensure that examiners properly applied examination guidance. We and others previously found that regulators identified underlying risks at depository institutions that failed during the 2007–2009 financial crisis well before their failure, but did not always take timely supervisory action. As stated by the regulators, the strength or weakness of bank management can reflect an institution’s underlying risk. For example, according to FDIC, the quality of management, including the board of directors and executives, is probably the single most important element in the successful operation of an institution. The Federal Reserve noted that the culture, expectations, and incentives established by the highest levels of corporate leadership set the tone for the entire organization and are essential determinants of whether an organization is capable of maintaining fully effective risk-management and internal control processes. Also, according to OCC, an effective corporate and risk governance framework is essential to ensuring the safe and sound operation of the institution and helping to promote public confidence in the financial system. In our past work, regulators told us they recognized bank supervision needed to be more forward-looking and had incorporated more forward- looking elements into examinations. Forward-looking supervision seeks to mitigate emerging risks before they affect the financial condition of an institution. Regulators can respond to emerging risks in the banking sector with a variety of supervisory tools. These include micro-prudential tools, which traditionally have focused on the safety and soundness of individual financial institutions, and macro-prudential tools, which can be used to address vulnerabilities across the banking system and broader financial system. Supervisory concerns are an important micro-prudential tool to support forward-looking supervision by ensuring that a depository institution takes early action to correct deficiencies. Also, trends in examination data and enforcement activity can provide information on regulators’ identification of and response to concerns of institution safety and soundness and emerging risks. Since 2009, federal banking regulators have revised policies and procedures to address management weaknesses at large depository institutions, including by differentiating levels of severity for supervisory concerns and specifying when to communicate them to management at the institutions. Based on our review of selected examination documents, the regulators’ policies and procedures often took different approaches for overseeing management of large depository institutions but each generally addressed leading risk-management practices. Since 2009, federal banking regulators have revised policies and procedures to better address management weaknesses at large depository institutions identified in the aftermath of the financial crisis. Regulatory staff with whom we spoke noted that most important risk- management concepts had been included in their policies for some time. The post-crisis updates were intended to provide better definitions of certain risk categories and enable examiners to consider individual risks within the context of all risks facing the institution. For instance, in June 2009, FDIC re-emphasized the forward-looking approach, which FDIC states encourages examiners to consider the likelihood that identified weaknesses will cause material problems in the future, and consider the severity of damage to an institution if conditions deteriorate. FDIC further noted that this assessment reflects both the board of directors’ and management’s ability to identify, measure, monitor, and control the risks of the institution’s activities, ensure its safe and sound operations, and ensure compliance with applicable laws and regulations. FDIC policy provides that an assessment of management is not solely dependent on the current financial condition of the institution. Also, in 2015 FDIC updated policies and procedures for identifying and assessing the influence of dominant bank officials or policymakers on an institution, and stated the policy was intended to limit the influence of dominant officials when internal controls are inadequate and ensure independence of the risk-management function. In 2012, the Federal Reserve updated procedures for supervision of large financial institutions, which were intended to strengthen traditional firm- level supervision while also incorporating systemic considerations to reduce potential threats to the stability of the financial system and provide insights into financial market trends. In 2013, the Federal Reserve updated expectations for the assessment of an institution’s internal audit function and provided guidance about the degree to which examiners may rely on the work of an institution’s internal audit function. In 2015, OCC updated its Risk Assessment System to help examiners draw conclusions about the quantity of risk, quality of risk management, aggregate risk, and direction of risk for institutions under eight different risk categories. Also, in 2016, OCC published the Corporate and Risk Governance booklet of the Comptroller’s Handbook to incorporate heightened standards requirements for depository institutions with average total consolidated assets of $50 billion or more. The booklet provides guidance to examiners on board and management responsibilities, risk management assessment factors, and measurement and assessment of risk consistent with the heightened standards. Regulators also took steps to enhance their ability to resolve supervisory concerns in a timely manner through improvements to policies and procedures on identifying and communicating concerns. The regulators employ progressive enforcement regimes to address supervisory concerns that arise during the examination cycle (see table 2). If the institution does not respond to the concern in a timely manner, the regulators may take informal or formal enforcement action, depending on the severity of the circumstances. Informal enforcement actions include obtaining an institution’s commitment to implement corrective measures under a memorandum of understanding. Formal enforcement actions include issuance of a cease-and-desist order or assessment of a monetary penalty, among others. The regulators have continued to update these regimes to clarify the distinction between each level of concern and to improve communication of concerns to the boards of directors of depository institutions. For instance, in 2016, the board of directors of FDIC issued a statement setting forth basic principles to guide the identification and communication of supervisory recommendations. The board stated that a supervisory recommendation refers to FDIC communications with a depository institution that are intended to inform it of FDIC’s views about changes needed to its practices, operations, or financial condition. FDIC’s updated policies and procedures state that supervisory recommendations must be presented in writing and most are generally correctable in the normal course of business. When developing and communicating these recommendations, FDIC examiners are required to (1) address meaningful concerns, (2) communicate concerns clearly and in writing, and (3) discuss corrective action. Supervisory recommendations involving an issue or risk of significant importance and that typically would require more effort to address than those correctable in the normal course, would need to be brought to the attention of the board and senior management through matters requiring board attention (MRBA) comments. The Federal Reserve updated its policies and procedures on identification and communication of supervisory concerns in 2013. The supervision and regulation letter defined matters requiring immediate attention (MRIA) to include (1) matters that have the potential to pose significant risk to the safety and soundness of the banking organization; (2) matters that represent significant noncompliance with applicable laws or regulations; (3) repeat criticisms that have escalated in importance due to insufficient attention or inaction by the banking organization; and (4) in the case of consumer compliance examinations, matters that have the potential to cause significant consumer harm. The letter defines matters requiring attention (MRA) as deficiencies that are important and should be addressed over a reasonable period of time, but where the institution’s response need not be immediate. Therefore, the distinction between MRIAs and MRAs is the nature of and severity of the matter and the timing by which the institution must respond. No matter how serious the concern, it is addressed to the institution’s board of directors. According to the Federal Reserve’s policies and procedures, the communication of supervisory findings must be (1) written in clear and concise language, (2) prioritized based upon degree of importance, and (3) focused on any significant matters that require attention. The Federal Reserve proposed new supervisory concern policies and procedures in 2017, which provided that examiners and supervisory staff should direct most MRIAs and MRAs to senior management of institutions for corrective action. MRIAs or MRAs only would be directed to the board for corrective action when the board needed to address its corporate governance responsibilities or when senior management failed to take appropriate remedial action. The proposed policies would not change the definitions of MRAs and MRIAs or the content of communications to institutions. As of April 2019, the proposed policies and procedures had not been finalized. OCC updated its policies and procedures for examiners to identify and communicate MRAs in 2014 and further enhanced them in 2017. OCC’s policy states that MRAs describe practices that an institution must implement or correct, ideally before those deficient practices affect the bank’s condition. Specifically, MRAs describe practices that (1) deviate from sound governance, internal control, or risk-management principles, and have the potential to adversely affect the bank’s condition, including its financial performance or risk profile, if not addressed; or (2) result in substantive noncompliance with laws or regulations, enforcement actions, or conditions imposed in writing in connection with the approval of any application or other request by the bank. OCC refers to such practices as deficient practices. Such practices also may be unsafe or unsound— generally, any action, or lack of action that is contrary to generally accepted standards of prudent operation and the possible consequences of which, if continued, would be abnormal risk or loss or damage to an institution, its shareholders, or the Deposit Insurance Fund. OCC supervisory concerns are to be communicated in writing to the institution’s management and board of directors to ensure timely and effective correction. Written communications must incorporate the “five c’s” format: Describe the concern. Identify the root cause(s) of the deficient practice and contributing factors. Describe potential consequence(s) or effects on the bank from inaction. Describe supervisory expectations for corrective action(s). Document management’s commitment(s) to corrective action and include the time frame(s) and the person(s) responsible for corrective action. If the root cause of the deficient practice is not apparent, OCC’s procedures instruct examiners to direct management to perform a root- cause analysis as part of the corrective action. The regulators’ revised policies and procedures that relate to oversight of risk management at large depository institutions and to supervisory concerns generally were consistent with leading risk-management practices. We reviewed leading standards and practices (such as federal internal control standards) and then developed criteria with which to assess the regulators’ policies and procedures. Criteria we used included that guidance be clear and actionable and that examiners review risk- management and control functions, identify existing and emerging risks, and review compliance with laws and regulations. (See table 3 for the specific criteria we applied, appendix I for more information on our methodology, and appendix II for the list of policy and procedure documents we reviewed). While individual policies or procedures may not have satisfied all of our criteria, when viewed collectively the policies and procedures generally addressed leading risk-management practices. For example, the policies and procedures almost always provided examiners with clear and actionable objectives for risk-management governance; enabled examiners to identify whether an institution had established a clear governance framework; assisted examiners in identifying, reporting, and recommending changes to address existing and emerging risks; and required review of institutions’ compliance with applicable laws and regulations. More specifically, we found FDIC risk-management policies and procedures for examining large insured depository institutions generally provide clear, actionable risk-management objectives with a few exceptions that did not materially affect our overall assessment. For instance, we identified that a policy document contains clear parameters for examiners to assess identified risks, which is consistent with our criteria, but the parameters did not include instructions for when examiners should consider changing a bank’s rating based on identified risk levels. However, related guidance for examiners in considering the impact of risk on the institution can be found in the definitions and descriptions of CAMELS ratings. We also found that FDIC developed adequate policies and procedures to evaluate corporate governance. In particular, consistent with leading practices, the guidance requires separation of board and management; identification and response to dominant officials; and encourages detailed review of the control environment. FDIC also has processes on risk assessment, and tracking and monitoring risk to address existing and emerging risks. For example, examiners are required to review updates to the institution’s risk- management processes for new lines of business. Similarly, we found that Federal Reserve policies and procedures for large depository institutions generally identify clear, actionable risk- management objectives and explain activities that might be riskier at some institutions compared to others, but a few policies and procedures were not fully consistent with our criteria. For instance, while corporate governance policies and procedures provide detailed materials for examiners to use during examination, and there is extensive guidance on risk identification, assessment, and communication, we noted relatively limited written procedures regarding escalation of concerns to enforcement actions. We discuss this issue in more detail later in this report. We also found that the Federal Reserve included forward-looking risk assessment procedures within risk-identification processes, including preliminary risk assessment to address existing and emerging risks. Finally, we found that OCC policies and procedures for large depository institutions generally provide clear requirements for examiner evaluation of the supervised institution’s quantity of risk, quality of risk management, and direction of risk. But the methods of measurement and specific tolerances for risk in these policies and procedures are not as clear as suggested by the leading practices. However, guidance to evaluate the potential impact of risk is separately available to examiners in OCC’s MRA and enforcement action policies and procedures. We found that consistent with our criteria, policies and procedures are detailed to provide examiners a clear framework to review banks’ corporate governance and risk-management systems. In particular, appropriate attention is paid to board oversight and effective management practice, including clear outlines for board and management responsibilities and independence. To address existing and emerging risks, OCC requires examiners to assess a specific set of risks within its risk-based supervision approach using the Risk Assessment System. OCC uses the Risk Assessment System in conjunction with CAMELS and other regulatory ratings during the supervisory process to evaluate an institution’s financial condition and resilience. Our review of examination documents of nine depository institutions found that examiners from the three banking regulators generally applied their policies and procedures and identified and communicated management weaknesses to those institutions. Practices for communicating concerns varied among regulators and some practices led to communications that often lacked complete information that would help institutions’ boards of directors ensure that senior management respond to emerging risks in a timely manner. Lastly, examiners generally followed up on prior supervisory concerns consistent with their policies and procedures. For the examinations we reviewed, we found that examiners generally applied policies and procedures to assess management oversight of risk at large depository institutions, including those relating to corporate governance, internal controls, and internal audit. We compared selected elements of examiner policies and procedures (focusing on the management component of CAMELS) with selected 2014–2016 examination documents to determine how examiners applied policies and procedures. (See appendix III for the questions we used to make these determinations). Our non-generalizable review of examination documents of nine institutions found that examiners reviewed areas relating to corporate governance, internal controls, and internal audit, which are key components of risk-management frameworks for institutional management and governance. For instance, to assess the adequacy of an institution’s overall corporate governance, FDIC, Federal Reserve, and OCC examiners of the selected institutions generally conducted reviews of areas such as board and management oversight and internal audit. For example: In examination documents for one of the institutions, we found that FDIC examiners examined materials regarding independence and qualifications of directors and policies and procedures related to risk assessments. We noted for another institution that Federal Reserve examiners reviewed materials regarding directors’ fulfillment of duties and responsibilities and policies and procedures relating to corporate compliance. Also, we observed that for one institution, in describing the leadership of the board and management, OCC examiners described aspects of the control environment, risk assessment, control activities, accounting, information, and communication as well as self- assessment and monitoring. At eight of the nine institutions we reviewed, we also found that regulators took steps that were designed to communicate deficiencies they identified before the weaknesses affected an institution’s financial condition. More specifically, examiners identified concerns related to board oversight; risk monitoring; policies, procedures, and limits; and internal controls. Also, for at least four of the nine institutions we reviewed, examiners reported they downgraded the management component rating based on weaknesses identified in management of risks independent of the institutions’ financial condition. For example, at one institution, we observed examiners reporting that weaknesses in an institution’s risk management contributed to a less-than-satisfactory or “3” rating for the management component. Additionally, examiners downgraded the management component rating for two institutions with satisfactorily-rated financial positions because of significant weaknesses in the risk- management program. In another instance, we observed examiners reporting that management’s need to complete remediation of previously identified weaknesses contributed to a “fair” or “3” rating for the management component of CAMELS. As previously discussed, in the past regulators did not always take timely supervisory action on the management weaknesses they identified. In all the reports of examinations we reviewed, examiners generally explained the basis for the rating they assigned to the management component of CAMELS, such as management’s responsiveness to addressing weaknesses and compliance with laws and regulations. Practices for communicating supervisory concerns to institutions varied among regulators and some communications do not provide complete information that could help boards of directors monitor whether deficiencies are fully addressed by management. As discussed previously, the regulators require staff to communicate supervisory concerns to institutions through formal written communications. The written communications are generally directed to senior management and boards of directors, which have oversight responsibilities over senior management. According to the Federal Reserve, boards are inherently disadvantaged given their dependence on senior management for the quality and availability of information. One industry representative told us that supervisory concerns were not always clearly communicated, noting that communications of supervisory concerns sometimes can be difficult to interpret and correct. An official from one of the regulators stated that former examiners working as industry consultants sometimes may be hired to help interpret supervisory letters and assist depository institutions in responding to supervisory concerns. Federal internal control standards state that management should communicate quality information externally to help the entity achieve its objectives and address related risks. Quality information is defined as appropriate, current, complete, accurate, accessible, and provided on a timely basis. Other authoritative internal control sources, including Circular A-123 and the framework of the Committee of Sponsoring Organizations of the Treadway Commission (COSO) require cause analysis—that is, an identification of the cause of the deficiencies that have been found. Generally accepted government auditing standards require that auditors plan and perform procedures to develop all four elements of a finding (criteria, condition, cause, and effect) necessary to address audit objectives. Although these authoritative sources do not apply to federal banking regulators, the standards identify principles consistent with the goal of FDIC, Federal Reserve, and OCC guidance in ensuring clear and complete communication of supervisory recommendations. OCC. For two of the three OCC-supervised institutions whose examination documents we reviewed, OCC examiners generally communicated to boards of directors the information they would need to monitor to determine whether deficiencies were fully addressed by management. OCC’s policies and procedures on MRAs require examiners to identify and communicate in writing to depository institutions the concern, cause, consequences of inaction, required corrective action, and management’s commitment for corrective action. If the cause of the deficient condition is not apparent, examiners must direct the institution’s management to perform a root-cause analysis as part of the corrective action. According to OCC staff, they implemented the MRA requirements agency-wide in 2014 after having a positive experience applying them at the community bank level. OCC staff told us that it is necessary for examiners and institutions to understand the cause of a deficiency for examiners to make appropriate recommendations and institutions to address the concern and help ensure the deficiency does not reoccur. Failure of examiners to identify and communicate the root causes of inappropriate practices was among the key findings of an internal OCC review of supervision of sales practices at Wells Fargo. In September 2016, OCC took enforcement action against Wells Fargo for improper sales practices. In April 2017, OCC’s Office of Enterprise Governance and the Ombudsman published an independent review of OCC’s supervisory record for Wells Fargo, which identified gaps in OCC’s supervision and lessons learned. Review findings included that the OCC team responsible for supervising Wells Fargo did not ensure that examiners evaluated root causes of the improper sales practices. In addition, they found that the first MRA that identified the sales practices issue in 2010 did not list the issue as an unsafe or unsound practice and did not identify a root cause or responsible parties. Among the lessons learned was ensuring analysis of root causes and compliance with OCC MRA guidance. In our review, we also observed how OCC’s written communications of concerns changed as its requirements were implemented. For example, in documents from 2014 for two institutions, OCC examiners generally only communicated the concern or the required corrective action and management’s commitment to corrective actions. By 2016, examiners documented each of the required elements for MRAs in their written communication (for two institutions). FDIC. For the three FDIC-supervised institutions whose examination documents we reviewed, FDIC examiners did not communicate to boards of directors the information they would need to monitor whether deficiencies were fully addressed by management. For these three institutions, FDIC examiners stated the concern (deficiency) and required corrective action in their internal communications of supervisory recommendations and also externally with depository institutions. They sometimes stated the potential effect of the deficient condition on the safety and soundness of the institution. These practices were consistent with FDIC policies and procedures in place at the time. For example, in the written communication to one FDIC institution selected for our review, examiners conveyed specific information about the supervisory concerns, the effect of the deficiencies on the institution, and the required corrective action for the MRBAs related to an examination. In another instance, the communication of the supervisory concerns appeared less specific. In that case, examiners reported that the institution management’s actions did not fully address a deficient condition identified in the prior examination. We found that the prior written communication of concerns to the institution did not identify the cause of the deficient condition or propose specific action to be taken. FDIC staff told us they believed that updates to their policies and procedures in 2016 already require examiners to identify the cause for the deficient condition and communicate it to the depository institutions. Specifically, FDIC requires examiners to “describe the deficient practices, operations, or financial condition and how it deviates from sound governance, internal controls, or risk management or consumer protection principles, or legal requirements.” This requirement is similar to OCC’s requirement to “describe the concern.” Specifically, OCC examiners are required to “describe the deficient practice and how it deviates from sound governance, internal control or risk management principles.” FDIC’s policies and procedures do not require examiners to identify the factor(s) responsible for the deficient condition (the “why”) or communicate it to the institutions. Based on the examination documents we reviewed, we did not observe that FDIC examiners communicated the cause of the deficiency. Including the cause facilitates a better understanding of why an institution’s condition is not consistent with law or regulations and, ultimately, can help an institution determine how it could remedy the condition. Federal Reserve. In our review of examination documents for three institutions, Federal Reserve examiners did not include information that boards of directors would need to monitor whether deficiencies were fully addressed by management. Reserve Bank examiners stated the condition and required corrective action in their internal and external communications of supervisory recommendations to depository institutions, consistent with Federal Reserve policies and procedures. Furthermore, the condition and required corrective action were generally closely linked to the criteria examiners applied during the examination, which often consisted of Federal Reserve supervisory guidance. We found that the written communications to depository institutions did not always provide information that would convey the reason the deficient condition occurred (cause) or the potential consequences of the deficient condition (effect). As a result, the information conveyed in the written communications of supervisory concerns was limited. The Federal Reserve Board has broad criteria for Federal Reserve Bank examiners requiring them to communicate only the condition and required corrective action. Federal Reserve Board staff told us that they do not require examiners to identify the cause of a deficient practice or condition. Instead, they leave that responsibility to institutions. Staff stated that they believe the institution is in the best position to identify the cause. They noted that this also could reduce the amount of time examiners otherwise would spend searching for the cause. However, we noted that at least one Reserve Bank builds on the Board’s criteria for communicating supervisory concerns and developed policies and procedures that require examiners to identify condition, criteria, cause, and effect to support supervisory findings in review sessions with Reserve Bank management. As discussed previously, authoritative internal control sources require cause analysis. As an example applicable to banking regulators, OCC requires its staff to identify and communicate the cause of the deficiency that led to the supervisory concern, or, if the root cause is not apparent, to instruct institution management to identify root cause as part of its corrective action. OCC staff noted that identifying root cause in examinations does not require additional resources. Also, if the root cause is not apparent, examiners instruct the institution to identify root cause as part of the corrective action, per OCC’s MRA policy. Furthermore, a September 2018 interagency statement clarifying the role of supervisory guidance instructed examiners to not criticize institutions for a “violation” of supervisory guidance. Identification and communication of the potential effect of a deficiency could enable the Federal Reserve to move away from its practice of closely linking supervisory concerns to failure to comply with guidance and better explain why an institution’s condition is not consistent with law or regulations. FDIC and the Federal Reserve are missing an opportunity to communicate complete information, in writing, to the boards of institutions regarding the cause of the identified deficiency that led to the supervisory concern, which would facilitate a better understanding of why the institution’s condition deviates from safety and soundness standards. Additionally, without communicating the potential effect of a deficiency, the Federal Reserve is missing an opportunity to convey to boards of directors how the concern could undermine the institution’s safety and soundness. In the examination documents of nine institutions we reviewed, federal banking regulators generally followed up on supervisory concerns to determine an institution’s progress in correcting previously identified weaknesses. The regulators require that examiners follow up on corrective actions taken by depository institutions in response to supervisory concerns. Examiners used various methods to follow up on supervisory concerns, such as by conducting limited-scope targeted reviews of one or more issues or incorporating follow-up as part of their regularly scheduled examination of a functional area. In addition, we observed that at four institutions examiners performed follow-up as part of their ongoing supervisory activities. While there are time frame targets for completion of corrective action, concerns can remain open until examiners are satisfied with the effectiveness of the remedial actions taken to address the supervisory concern. For instance, at three institutions we found that examiners closed concerns in targeted follow-up examinations once they validated the completion of remedial action by reviewing documents and activities that verified the implemented action was effective. We also observed instances for at least three institutions in which examiners refrained from closing supervisory concerns because they determined that the institutions’ management had not yet adequately addressed the concerns and further attention was warranted to ensure the corrective action was sustainable. In performing regularly scheduled target examinations of specific functions or risk areas examined during a previous examination cycle, examiners assessed management’s progress in addressing prior supervisory concerns at eight of the nine institutions we selected for examination documentation review. They examined documents, and reviewed processes and other related actions taken by management to address weaknesses in the institution’s management of risk. Lastly, at four institutions, examiners reviewed management’s progress and reported updated information on the institutions’ actions to address supervisory concerns that were escalated to enforcement actions. For example, at one institution OCC examiners documented substantive discussion on the work they performed in conducting follow-up on a consent order, which included reviewing revised documents and reports as well as validation efforts by a third-party consultant. Federal banking regulators collect and analyze supervisory concern data but do so to different degrees, and FDIC collects supervisory concern data in a manner that challenges management’s ability to fully monitor its supervision activities. We reviewed supervisory concern data for all institutions supervised by FDIC, OCC, and the Federal Reserve. The data we reviewed indicate that management weaknesses have been a consistent concern since 2012. In general, the amount of time supervisory concerns remain open generally has been reduced. The Federal Reserve and OCC track escalation of supervisory concerns to enforcement actions, but the Federal Reserve lacks specific, measurable guidelines for examiners to consider when supervisory concerns are not addressed in a timely manner. Federal banking regulators analyze supervisory concern data to inform examination strategy and forward-looking supervision to varying degrees. FDIC staff uses the data to track the duration of open MRBAs. FDIC’s Risk Management Supervision Division has staff responsible for categorizing and analyzing MRBA summary comments quarterly and providing an analysis memorandum to the division’s management to assist with forward-looking risk identification. FDIC staff stated that these analyses supplement other data used to conduct supervisory follow-up. Federal Reserve Board staff told us that they use the data to track MRA and MRIA information over time within portfolios of depository institutions of different sizes. Staff noted that the data are used to inform supervisory strategy development for upcoming examination cycles. According to staff with whom we spoke, the data are useful for conducting horizontal reviews across a single portfolio and determining issues that crop up across institutions in that portfolio. Staff said that the data can be used to identify common issues as they relate to Board guidance. Staff said that the data also are used to determine whether MRAs and MRIAs are closed in a timely manner, both across portfolios and at a granular level—tracking the progress of individual firms. The data are aggregated across all supervision portfolios. OCC staff told us that they use MRA data to track the number of MRA concerns issued, amount of time open, the types of supervisory concerns for which an MRA was issued, and other information useful to OCC supervisory offices and the National Risk Committee. OCC conducts analysis of supervisory concern data in aggregate. Quarterly reports aggregate trends (including number of concerns, whether concerns are increasing or decreasing, and the number of banks with these concerns). For example, OCC analyzes the data by lines of business, examination areas, categories, and primary risk, which helps track existing risks and growing risks and whether MRA concerns have been escalated to enforcement actions. OCC staff said that data regarding aging of MRAs, which can raise visibility of longstanding concerns, are of particular interest to the National Risk Committee, which we observed in internal reports summarizing supervisory concern data. The regulators have internal tracking systems and policies and procedures to record and track examination data but FDIC does not collect certain data in a manner that provides management with comprehensive information to fully monitor the effectiveness of supervision activities. The Federal Reserve System has two systems for recording and tracking supervised institution data: the “C-SCAPE” platform for institutions with assets greater than $50 billion and all foreign banks, and the “INSite” platform for smaller community banks. Each Reserve Bank has issued guidance on recording MRAs and MRIAs specific to the examiners at those Reserve Banks. The MRA and MRIA data are recorded under a broad area of supervisory focus (for C-SCAPE) or MRA and MRIA category (for INSite), with subcategories for the name and description of the issue for greater detail. OCC’s supervisory information system is Examiner View, in which examiners record, update, and view MRAs. The baseline for the required fields is documented in OCC’s policy and procedures manuals on MRAs and Examiner View, as well as in a supplemental memorandum for large bank supervision. Since March 2017, the data have been recorded in a four-level concern framework (examination area, category, concern type, and topic), as determined by a cross- agency working group under OCC’s National Risk Committee. FDIC supervisory data are collected and retained in various systems. Supervisory recommendations are maintained (by institution) in text format in a separate system that is not readily searchable. FDIC maintains information on MRBAs that are not included in an enforcement action in the Supervisory Tracking and Reporting module of the ViSION system. Supervisory recommendations and MRBAs issued to large institutions supervised by FDIC are also tracked in spreadsheets by examination teams. Supervisory recommendations contained in an enforcement action are collected and tracked in the Formal and Informal Actions Tracking system. In 2017, FDIC updated its MRBA policies and procedures to require that examiners enter summary information into ViSION about individual MRBA events, rather than an overall summary of all MRBA events during an examination. But the summary approach means that MRBA data are not categorized at different levels (from a broad level such as examination area to more specific levels, including risk or concern type). Federal internal control standards state that management should use quality information to achieve objectives. Quality information is defined as appropriate, current, complete, accurate, accessible, and provided on a timely basis. Federal internal control standards also stress the importance of management conducting ongoing monitoring of the internal control system, which includes regular management and supervisory activities, comparisons, reconciliations, and other routine actions. As noted above, FDIC policies and procedures do not require examiners to record MRBAs under different categories in the MRBA reporting and tracking system. Instead, FDIC Risk Management Supervision staff is responsible for analyzing summary MRBA data entered by examiners and then categorizing the data for FDIC management reports. These categories are based on staff expertise rather than the experience of examiners in the field who developed the MRBAs. A structure that examiners could use to record more granular details about MRBAs directly after examinations would help ensure that reports prepared for FDIC management are not missing important details about FDIC MRBAs. Currently, FDIC management lacks complete information to better monitor the effectiveness of supervision activities in remediating emerging risks in a timely manner. Our analysis of supervisory concern data and federal banking regulators’ internal reporting based on the data indicate that management weaknesses at depository institutions of all sizes continued to exist through 2017. The number of supervisory concerns issued for all concern categories decreased each year during 2012–2016. All the regulators frequently cited management as a primary risk area in the supervisory concerns issued during the period. For instance, management and board and loan and credit administration were the largest of 14 categories of MRBAs issued by FDIC in 2012–2016, each constituting about 22 percent of all MRBAs. Corporate governance was the largest of 26 categories of MRAs issued by the Federal Reserve in that period, constituting approximately 19 percent of all MRAs. The next largest category of MRAs issued was credit risk management at 13 percent. Enterprise governance and operations was the third-largest of 16 examination areas of MRA concerns issued and closed by OCC in 2012–2016, constituting about 11 percent of all MRA concerns. The largest examination area of MRA concerns issued was credit at about 37 percent, followed by bank information technology at 13 percent. Similarly, internal reports from the regulators for late 2016 through 2017 indicated that supervisory concerns about management’s ability to control and mitigate risk at depository institutions continued. Our review of the reports showed that corporate governance issues were among the most common categories for issued supervisory concerns. In addition, the Federal Reserve reported in November 2018 that governance and controls issues constituted about 70 percent of outstanding supervisory concerns for the Large and Foreign Banking Organizations portfolio. Our review of supervisory concern data from the Federal Reserve and OCC from 2012 through 2016 generally showed that the amount of time concerns remained open was reduced (for example, see figure 2 for data on the supervisory concerns issued most frequently by the Federal Reserve and OCC during the period). Federal banking regulators told us that they have made efforts in recent years to have institutions remediate the deficiencies that cause supervisory concerns. FDIC data regarding MRBAs were limited and we were not able to determine how long MRBAs remained open by type of concern. Federal Reserve data indicated that the average amount of time needed to close corporate governance MRAs changed from 568 days in 2012 to 155 days in 2016. The time to closure for corporate governance MRAs ranged from 3 to 1,605 days for 2012-2016. Time to closure for credit risk-management concerns, the second-largest MRA category for the Federal Reserve, saw a similar decrease (from 431 days on average in 2012 to 246 days on average in 2016). For OCC, the average time to closure for enterprise governance and operations MRAs decreased from 517 days in 2012 to 245 days in 2016. The time to closure for enterprise governance and operations MRA concerns ranged from 7 to 1,724 days in 2012-2016. Time to closure for OCC’s largest MRA examination area (credit concerns) decreased from 445 days on average in 2012 to 241 days on average in 2016. Federal banking regulators vary in the nature and extent of data they collect on escalation of supervisory concerns to enforcement actions. As noted above, under their progressive enforcement regimes, the regulators may take informal or formal enforcement action against an institution if it does not respond to a supervisory concern in a timely manner. OCC collects data on escalation of supervisory concerns to enforcement actions. These data show that about 2,300 MRA concerns, or about 10 percent of all MRA concerns, were escalated to enforcement actions from 2012 through 2016. Of this amount, 18 percent related to enterprise governance and operations concerns, the second-largest number of escalated MRA concerns behind credit concerns at 41 percent. Federal Reserve data for escalation of MRAs to MRIAs and enforcement actions were collected in a manner that made it difficult for us to reliably determine the extent to which escalation occurred. Therefore, we did not use the Federal Reserve’s escalation data. FDIC does not track escalation of supervisory concerns in a manner that allowed us to determine the extent to which escalation occurred. FDIC and OCC have relatively detailed policies and procedures for escalation of supervisory concerns to enforcement actions, while the Federal Reserve has broad guidelines. Although the Federal Reserve tracks escalation of supervisory concerns, as noted above, Federal Reserve policies and procedures do not delineate specific factors for examiners to follow in deciding whether to identify a concern as warranting possible enforcement action. Instead, the Federal Reserve provides broad guidelines; for instance, stating only that informal enforcement actions are tools used when circumstances warrant a less severe form of action than formal enforcement actions. Federal Reserve staff told us that in practice the facts and circumstances of the case dictate when escalation is appropriate. They said that they take into account the institution’s response to prior safety and soundness actions against the institution and determine whether the institution’s conduct meets enforcement action standards. However, the Federal Reserve has not defined specific and measurable guidelines for when a supervisory concern would require escalation to a more formal regulatory action (such as an enforcement action). In contrast, FDIC and OCC have relatively detailed guidelines for escalating concerns. For example, FDIC guidelines published in 2016 instruct examiners to consider several factors, including management’s attitude towards complying with laws and regulations and correcting undesirable or objectionable practices; management’s history of instituting timely remedial or corrective actions; and whether management established procedures to prevent future deficiencies or violations. Similarly, OCC guidelines published in 2017 instruct examiners to consider several factors, including the board and management’s ability and willingness to correct deficiencies within an appropriate time frame; the nature, extent, and severity of previously identified but uncorrected deficiencies; and the bank’s progress in achieving compliance with any existing enforcement actions. Federal internal control standards provide that management conducts risk assessment to develop appropriate risk responses. Key attributes of effective risk assessment are definitions of objectives and risk tolerances, and management defines risk tolerances in specific and measurable terms so they are clearly stated and can be measured. In assessing risks that might necessitate an enforcement action, the Federal Reserve’s guidelines do not provide its examiners with guidance as to the acceptable level of variation in an institution’s performance relative to the achievement of supervision objectives. Without formalized, specific, and measurable guidelines for escalation of supervisory concerns, the Federal Reserve relies on the experience and judgment of examiners, Reserve Bank management, and Federal Reserve staff to determine when escalation is appropriate. Reliance on a single mechanism or tool can be risky. For instance, institutional knowledge can disappear in times of turnover, such as occurred after the 2007–2009 financial crisis. In addition, reliance on judgement alone can produce inconsistent escalation practices across Reserve Banks and supervision teams. Federal banking regulators have strengthened their approach to oversight of management at large depository institutions since 2009. This stronger approach is important as management weaknesses can reflect an institution’s underlying risk. However, we identified areas where written communication of supervisory concerns to institutions and monitoring of supervisory data at FDIC and the Federal Reserve could be strengthened. The communications of supervisory concerns from FDIC and the Federal Reserve did not fully convey why a practice at a depository institution was deficient and, for the Federal Reserve, the effect of the deficient practice on safety and soundness. Complete information about deficiencies is essential to ensuring timely corrective action by senior bank management before the deficiencies negatively affect safety and soundness at the institution. Furthermore, we identified data gaps in FDIC’s recording of MRBAs that resulted in incomplete information for FDIC management on supervisory concerns. Complete supervisory concern information would allow FDIC management to fully monitor the effectiveness of supervision activities (that is, to remediate risks in a timely manner). Finally, the Federal Reserve lacks specific, measurable guidelines for escalating supervisory concerns. Although escalation of a supervisory concern can depend on the facts and circumstances of the case, a lack of formalized, specific, and measurable guidelines for escalation of supervisory concerns could result in inconsistent escalation practices across Reserve Banks and examination teams. We are making a total of four recommendations: two to FDIC and two to the Federal Reserve. The Director of the Division of Risk Management Supervision of FDIC should update policies and procedures on communications of supervisory recommendations to institutions to provide more complete information about the recommendation, such as the likely cause of the problem or deficient condition, when practicable. (Recommendation 1) The Director of the Division of Supervision and Regulation of the Board of Governors of the Federal Reserve System should update policies and procedures on communications of supervisory concerns to institutions to provide more complete information about the concerns, such as the likely cause (when practicable) and potential effect of the problem or deficient condition. (Recommendation 2) The Director of the Division of Risk Management Supervision of FDIC should take steps to improve the completeness of MRBA data in its tracking system, in particular, by developing a structure that allows examiners to record MRBAs at progressively more granular levels (from a broad level such as examination area to more specific levels, including risk or concern type). (Recommendation 3) The Director of the Division of Supervision and Regulation of the Board of Governors of the Federal Reserve System should update policies and procedures to incorporate specific factors for escalating supervisory concerns. (Recommendation 4) We provided a draft of this report to FDIC, the Federal Reserve, and OCC for review and comment. During their review of the draft report, FDIC and the Federal Reserve provided oral comments about Recommendations 1 and 2 (to update policies and procedures for communication of supervisory concerns to provide more complete information, such as the likely cause and, for the Federal Reserve, potential effect). We modified the respective recommendations to address technical issues raised by their comments. FDIC provided written comments that are summarized below and reprinted in appendix IV. FDIC disagreed with Recommendation 1 and agreed with Recommendation 3. More specifically, FDIC stated that its current instructions to examiners meet the intent of Recommendation 1 (to update policies and procedures for communicating supervisory recommendations to provide more complete information). In particular, FDIC cited its policies and procedures on drafting supervisory recommendations in the report of examination, which include a section entitled, “Explain the Basis for any Supervisory Recommendations or Concerns.” FDIC stated this instruction requires examiners to communicate why there is a concern within the supervisory recommendation. Furthermore, FDIC issued an internal memorandum in October 2018 that reminds examiners to take prompt action to address root causes of deficiencies in complex and changing situations. FDIC stated that it began training in 2018 on developing strong enforcement action provisions to address root causes of deficiencies at problem banks, which continues in 2019. We describe FDIC’s policies and procedures in our report and agree that examiners are instructed to communicate why they are concerned about a deficient condition. However, examiners are not instructed to communicate what they believe to be the root cause of the deficient condition. We are encouraged that FDIC agrees it is important to identify root causes when addressing deficiencies in problem bank corrective actions. Nevertheless, the emphasis on identifying root cause is not found in examination policies and procedures. If, as FDIC indicated, examiners already identify the root causes of deficiencies during bank examinations, then FDIC can address our recommendation by formalizing that process in its policies and procedures. For Recommendation 3 (to improve MRBA data in its supervisory recommendations tracking system, by developing a structure that allows recording of MRBAs at more granular levels), FDIC agreed that a structure should be enhanced to allow staff to further categorize MRBAs at the point of entry into the system. FDIC further agreed that input of more granular information about MRBAs directly after examinations should provide the functionality to track an MRBA from a broad level such as examination to more specific levels, including concern type. The Federal Reserve provided written comments summarized below and reprinted in appendix V. The Federal Reserve did not state whether it agreed or disagreed with Recommendations 2 and 4 but responded that it would take our recommendations into consideration. For Recommendation 2 (to update policies and procedures for communicating supervisory concerns to provide more complete information, such as likely cause (when practicable) and potential effect), the Federal Reserve stated it recognizes that more effectively communicating supervisory concerns may achieve faster resolution of identified deficiencies and ultimately promote a more resilient banking system. The Federal Reserve noted it issued proposed guidance in August 2017 (which we discuss in the report) that would, in part, clarify expectations for communications of supervisory concerns, and that it continues to evaluate commenters’ suggestions. The Federal Reserve stated that it will consider ways to update its policies and procedures consistent with our recommendation. For Recommendation 4 (to update policies and procedures to incorporate specific factors for escalating supervisory concerns), the Federal Reserve stated it appreciated our recognition that the decision to escalate a supervisory concern ordinarily depends on the particular facts and circumstances of each case. The Federal Reserve stated that it will consider whether there are specific factors that staff should consider when escalating supervisory concerns. The Federal Reserve and OCC also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and the Chairman of the Board of Governors of the Federal Reserve System, the Chairman of the Board of Directors of FDIC, and the Comptroller of the Currency. This report will also be available at no charge on our website at http://www.gao.gov. Should you or your staff have questions concerning this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VI. This report examines (1) the extent to which federal banking regulators’— the Federal Deposit Insurance (FDIC), Board of Governors of the Federal Reserve System (Federal Reserve), and Office of the Comptroller of the Currency (OCC)—revised policies and procedures for supervision of management at large depository institutions were consistent with leading risk-management practices; (2) how examiners applied agency policies and procedures for supervision of management at large depository institutions they oversee; and (3) trends in regulators’ supervisory concern data for all depository institutions since 2012 and how regulators tracked and used such data. To address all our objectives, we focused on risk-management issues, such as those related to corporate governance, internal controls, and internal audit because management weaknesses in these areas could threaten the safe and sound operation of a depository institution. We selected this approach because recent GAO reports have addressed risk- management issues related to financial conditions such as capital and liquidity requirements, stress testing, and commercial real estate risk. We reviewed relevant federal laws and regulations, including sections of the Federal Deposit Insurance Act, Federal Reserve Act, National Bank Act, and interagency regulations on safety and soundness. We reviewed prior GAO reports, including reports on quantitative risk-management issues as they relate to financial condition, supervision of compliance with laws and regulations, and regulatory capture in bank supervision. We reviewed reports from the Offices of Inspector General for the federal banking regulators. We also drew on prior and on-going work related to regulatory capture in bank supervision. In addition, we reviewed the 2013 OCC-commissioned assessment of OCC’s supervision of large and mid-size institutions. We interviewed staff at FDIC, Federal Reserve, and OCC about examination policies and procedures for large depository institutions, processes related to supervision of management at such large institutions, and use of supervisory concerns to address weaknesses they identified. We interviewed staff in the Office of the Inspector General at each banking regulator. We also interviewed three industry representatives with prior experience in bank supervision to obtain their perspectives on bank examinations and supervisory concerns. For this objective, we took steps to identify relevant changes to examination approaches and processes (focusing on oversight of qualitative risk-management activities and communication of supervisory concerns). First we obtained confirmation from the regulators of the list of policies and procedures and other guidance documents we identified for review and solicited suggestions for additional documents to review. We then reviewed and analyzed guidance the agencies issued to examiners and depository institutions, relevant to (1) assessment of board and senior management’s management of risks, (2) metrics used to measure risk, and (3) assessment of depository institutions’ internal controls and audit procedures. Specifically, we reviewed and described regulators’ policy and procedural manuals, supervisory statements, and other supervisory guidance issued since 2009 to identify changes to the agency’s approach and process subsequent to the financial crisis. We focused primarily on changes to address oversight of risk management. We then reviewed documents from several standard-setting organizations to identify criteria for assessing risks and risk management. More specifically, we reviewed federal internal control standards; Internal Control - Integrated Framework of the Committee of Sponsoring Organizations of the Treadway Commission (COSO); safety and soundness standards developed by the federal banking regulators; Core Principles for Effective Banking Supervision of the Basel Committee on Banking Supervision; Federal Reserve’s enhanced prudential standards regulation, which applies to bank holding companies with assets greater than $10 billion and thus applies to the bank holding companies that own the depository institutions within the scope of our review; and GAO reports developing risk-management frameworks for government entities. Based on these documents, we selected a list of criteria to use in assessing the regulators’ risk-management guidance for examining large depository institutions (see table 3). We made connections between the principles listed in each of the documents to highlight the key elements of risk assessment, risk measurement, corporate governance, internal controls, and internal audit requirements. Additionally, we factored in regulators’ consideration of compliance with laws and regulations in their evaluation of the management component of CAMELS (capital adequacy, asset quality, management, earnings, liquidity, and sensitivity to market risk). Specifically for the first three criteria, we considered principles from GAO Standards for Internal Control, COSO’s Integrated Framework, the federal banking regulators’ safety and soundness standards, and the Federal Reserve’s risk management regulation. Additionally, for the second criterion we considered the Basel Committee on Banking Supervision Core Principles for Effective Banking Supervision. For the fourth criterion we considered the regulators’ safety and soundness standards. We also identified sub-criteria to help determine the extent to which the regulators’ guidance to address past supervisory weaknesses aligned with the criteria. Our baseline for the sub-criteria related to the first criterion was that the guidance communicates the need for clear lines of authority and responsibility for monitoring internal controls. The baseline for the sub-criteria related to the second criterion was that the guidance require independence of the risk management function. For the sub- criteria related to the third criterion, the baseline was that the guidance provide for identification of and timely action to address existing and emerging risks. Finally, for the sub-criteria related to the fourth criterion we looked for guidance to require compliance with laws and regulations, which regulators considered in the evaluation of management performance. For this objective, we undertook a multistep process to select institutions from which to obtain examination documents for review. First, we obtained the lists of institutions subject to examination by the regulators’ large bank examination programs in recent years. For FDIC, these were institutions with total assets of $10 billion or more; for the Federal Reserve and OCC, generally, these were institutions with assets greater than $50 billion. More specifically, we obtained a listing of all FDIC-supervised institutions in its Large Insured Depository Institution program that were subject to examination from June 2013 through March 2017, all Federal Reserve member banks in its Large Banking Organization portfolio as of December 2016, and all OCC-supervised institutions in its Large Bank Supervision portfolio from 2012 to 2016. Next, we selected a non-generalizable sample of three depository institutions from each of the regulators (nine in total) for which to request 2014-2016 examination documents for review. To assemble the sample, we determined the asset size of each institution supervised by the regulators’ large bank examination program as of December 2016, and selected institutions with a range of asset amounts. If these institutions were from the same geographic area (supervised by the same regional office or Reserve Bank), we selected other institutions with comparable asset amounts in order to have geographic dispersion in our sample. The purpose of this selection approach was to assess whether material differences existed in examinations conducted by the different regional offices in our sample. Also, if the selected institutions were headquartered in a foreign country, we selected other institutions with comparable asset amounts. The purpose of this selection approach was to omit institutions with only a branch office in the United States, which would allow the regulator to only examine a portion of the institution’s operations. In addition, if the selected institutions were not primarily engaged in traditional banking activities, we selected other institutions with comparable asset amounts. To make this determination, we conducted a separate analysis to determine if (1) the institutions engaged in traditional banking activities (accepting deposits and making consumer loans), (2) traditional banking activities made up a majority of the bank’s activities as recorded on the balance sheet, and (3) the bank’s loan activities were primarily domestic. The purpose of this selection approach was to omit companies that primarily conduct “non-traditional” banking activities such as investment banking and credit cards but have a regulated depository institution to support those activities. We conducted a separate analysis of OCC-supervised institutions in its Large Bank Supervision portfolio because a number of entities were nationally chartered banks under a foreign holding company or were not primarily depository institutions. In our analysis, we first determined if (1) an institution engaged in traditional banking activities, (2) traditional banking activities made up a majority of its activities as recorded on the balance sheet, and (3) the institution’s loan activities were primarily domestic. We included three federal savings banks in our universe of OCC-supervised institutions because we determined they were subject to many of the same supervision policies and procedures as national banks. We then determined that the geographic location of the examiners-in- charge for the institutions in the Large Bank Supervision portfolio determined the regional office to which the examiner-in-charge reported. To obtain geographic dispersion, we based our selection on the location of the examiners-in-charge to ensure that each examiner was associated with a different regional office. Using these criteria and considerations, we selected small, moderate, and large OCC-supervised institutions. To determine how regulators applied agency policies and procedures for supervision of management during examinations of large depository institutions, we requested selected examination documents from the regulators for the nine institutions we selected. For FDIC, initially we requested 2016 examination documents for the three selected large institutions subject to the Large Insured Depository Institution program. For the Federal Reserve, we initially requested 2016 examination documents for the three selected large institutions subject to the Large Banking Organization program. For OCC, we initially requested 2016 examination documents for the three selected large national banks subject to the Large Bank Supervision program. We reviewed these examination documents to learn how examiners reviewed qualitative risk-management issues, such as those relating to the management component of CAMELS. Based on our initial review, we submitted another document request to the regulators. FDIC. Through our initial review of FDIC documents, we identified the risk categories for which FDIC examined corporate-wide risk-management functions. We then requested relevant examination documents for each of the three FDIC-supervised institutions, such as scope, summary, and conclusion memorandums and supervisory letters related to corporate-wide risk-management functions and the Bank Secrecy Act; examination documentation for supervisory recommendation (remediation) follow-up reviews that were reviewed during the 2014, 2015, and 2016 supervisory cycles; summary examination documents related to ongoing monitoring work; explanation of planned target review areas that appeared to cover review of corporate-wide risk-management functions for the same supervisory cycles that had not been completed; and supervisory plans and reports of examination for 2014 and 2015 examination cycles. In total, we reviewed 94 FDIC examination documents. We took as criteria the examination procedures from the examination documentation modules referenced in FDIC’s Basic Examination Concepts and Guidelines and the Management portion of the agency’s examination policy manual. We also incorporated elements of other FDIC policies and procedures, such as those relating to internal routine and controls, dominant officials, and incentive compensation. Our criteria also included FDIC memorandums to assess communication and follow- up on supervisory recommendations, including matters requiring board attention (MRBA). Finally, we used information on enforcement policies and procedures in the agency’s Report of Examination Instructions manual. Federal Reserve. Based on our initial review, we requested conclusion memorandums and supervisory letters (letters of findings) pertaining to several targeted and enhanced continuous monitoring examinations the Federal Reserve conducted during the 2014, 2015, and 2016 supervisory cycles at the three institutions we selected. In total, we reviewed 83 Federal Reserve examination documents. To assess how examiners applied agency policies and procedures, we used examination procedures contained in the Commercial Bank Examination Manual for most of our criteria. In particular, the Commercial Bank Examination Manual includes a section on “Assessment of the Bank” with detailed examination procedures for review of boards of directors, management, internal controls, and audit. In addition, we used guidance from supervision and regulation letters to the extent the information was not incorporated in the manuals. OCC. Based on our initial review, we requested examination documents for targeted and ongoing examination work related to enterprise risk management, operational risk, and other safety and soundness (management) for the 2014, 2015, and 2016 examinations cycles. Specifically, we requested ongoing supervision memorandums, conclusion memorandums, supervisory letters, and risk assessments. We also requested the supervisory strategy and report of examination for the 2014 and 2015 examination cycles. In total, we reviewed 268 OCC examination documents. As criteria, we applied examination procedures from the Large Bank Supervision booklet for certain risk elements related to bank governance and management. We also applied examination procedures for internal control and audit as criteria. In addition, we included agency guidance on follow-up for matters requiring attention (MRA) and enforcement action. We then developed questions to assess the examination documents based on the criteria we selected. See appendix III for our list of questions. Using a data collection instrument populated with the selected questions, we assessed each of the regulators’ examination documents. To demonstrate how examiners applied each criterion, we either took language from the examination document or included explanatory language of what the examiner did during the examination to assess risk management. We also tracked the examiner’s findings on each individual risk area we reviewed to the annual report of examination to ensure that the risk was considered in the context of the entire institution. The results of our review of depository institution examination reports and examination documents are not generalizable to all of the regulators’ examination reports and documents. Each individual review serves as an independent assessment of the examiners’ application of relevant agency guidance. To evaluate the extent to which the federal banking regulators ensured that large depository institutions addressed risk management-related supervisory concerns, such as MRA, and addressed supervisory concerns since 2012, we (1) analyzed the regulators’ policies and procedures for escalating supervisory concerns to enforcement actions, and (2) analyzed aggregate supervisory concern data from 2012 to 2016 for all institutions supervised by FDIC, the Federal Reserve, and OCC. We did not collect data on all the different types of supervisory concerns issued. In particular, we did not collect data on supervisory recommendations by FDIC and matters requiring immediate attention (MRIA) by the Federal Reserve. Therefore, our analysis of the data does not provide a complete representation of the status of supervisory concerns issued by the regulators. To examine trends, we requested that each regulator provide the data by risk category so that we could analyze whether certain risk areas generated more timely resolution of risk management-related supervisory concerns and whether supervisory concerns were elevated to enforcement actions. FDIC. Because of the current structure of FDIC’s data collection and storage systems, FDIC could not provide data on MRBA in a format that would have been easily analyzable for our purposes. Specifically, FDIC examiners enter summary information about MRBAs into the system with no categorization by examination or risk area. FDIC provided us two data sets—raw data downloaded from its ViSION system; and a data set sorted by topics, which was prepared by the FDIC Emerging Risks section and used for publication in FDIC’s Supervisory Insights newsletter. For large institutions, FDIC informed us that the data were not complete because MRBAs reflected in ViSION were those that remained open at the end of the year when the annual report of examination was issued and that MRBAs opened and closed during the examination cycle were not recorded in the system. Due to the limitations with the data and the inability to combine the data sets, some analyses were completed with the raw data set and others with the data set divided by topics. As a result, the analysis provides a general understanding of trends in FDIC supervisory concerns, rather than a rigorous trend analysis. Federal Reserve. We obtained data on MRAs issued to all Federal Reserve-supervised institutions from 2012 through 2016. The Federal Reserve has two systems for recording and tracking supervised institution data: the “C-SCAPE” platform for institutions with assets greater than $50 billion and all foreign banks, and the “INSite” platform for smaller community banks. Some of the MRA data were not categorized by supervisory concern and were assigned a “null” value. According to Federal Reserve staff, in 2012 the Federal Reserve migrated from a legacy tracking system to the current C-SCAPE platform. The MRA data contain both broad MRA categories and sub-categories for greater detail. For ease of explanation and analysis, the data under the sub-categories were consolidated under their larger categories. The number of MRAs uncategorized by supervisory concern did not present a significant obstacle to our analysis. The data on escalation of MRAs to MRIAs and enforcement actions were collected in a manner that made it difficult for us to determine the extent of escalation. Specifically, the glossary that was provided with the data stated that issues closed through the “transformation process” are marked “closed,” and are distinguished from other closed issues by indicating how they were closed (for example, transformed to MRA, transformed to MRIA, or transformed to provision). We determined that any results we produced regarding escalation would be unreliable given the lack of clarity around data collection methods. OCC. We obtained MRA data from OCC that included records opened from January 2012 through December 2016. OCC’s supervisory information system is Examiner View, in which examiners record, update, and view MRAs (among other things). For our purposes, OCC staff stated that we could use the data to count the number of concerns; however, analyzing the concerns by categories could have been problematic because of changes to the classification method that occurred in October 2014 and March 2017. As a result of the 2017 changes, OCC supervisory concern data are recorded in a four-level framework (examination area, category of concern, type, and topic) that allows for tracking of supervisory concerns at the MRA level and at the “concern” level. Before 2017, the information was classified differently. The newer data allow for enhanced trend analysis and risk identification. We were able to analyze OCC data to show the MRAs issued in 2012– 2016 by exam area. We also could show trends in risk management- specific exam areas, as well as the average time it took to close risk- management specific concerns. Furthermore, we obtained and analyzed data on MRAs that were escalated to enforcement actions. For all the regulators, we assessed the reliability of the data. First, we interviewed staff at each of the regulators who were knowledgeable about the data. We asked for the source of the data, how frequently it was updated, and about the controls in place to ensure the data were accurate and complete. Additionally, in assessing the reliability of the data, we reviewed internal reports and other documents prepared by the regulators. Specifically, for FDIC we reviewed management reports for each quarter of fiscal year 2017. For the Federal Reserve, we analyzed draft 2017 annual assessment letters, feedback from the Operating Committee of the Large Institution Supervision Coordinating Committee to dedicated supervisory teams, and other organizing documents. For OCC, we analyzed management reports to different oversight committees for calendar year 2017. While the data did not allow all of the analysis we had planned to complete, overall, we determined that the FDIC, Federal Reserve, and OCC data were reliable for purposes of showing general trends in the number of supervisory concerns, the time frames for closing supervisory concerns, and—additionally for OCC—the number of supervisory concerns escalated to enforcement actions. We conducted this performance audit from March 2017 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix lists the federal banking regulators’ policy and procedure documents included in our review. Division of Risk Management Supervision Manual of Examination Policies – Basic Examination Concepts and Guidelines section (section 1.1), including relevant Financial Institution Letters and internal memorandums. Provides overview of the Federal Deposit Insurance Corporation (FDIC) bank examination process, including rationale for examinations; the Uniform Financial Institutions Rating System, also known as CAMELS (capital adequacy, asset quality, management, earnings, liquidity, and sensitivity to market risk); examination types; scheduling guidelines; and communication with management. Division of Supervision and Consumer Protection Risk Management Manual of Examination Policies – Management section (section 4.1), including relevant internal memorandums. Focuses on the management component of CAMELS ratings, with the main emphasis on the powers, responsibilities, and duties vested in bank directors. It also includes policies and procedures for identifying and assessing the influence of dominant bank officials. Division of Risk Management Supervision Manual of Examination Policies – Internal and Routine Controls section (section 4.2), including relevant internal memorandums. Discusses internal controls, internal control programs, management’s responsibilities, internal control and fraud review examination instructions, and includes a reference tool for examiners. Division of Risk Management Supervision Manual of Examination Policies – Informal Actions section (section 13.1) Identifies procedures for memorandums of understanding to address weak operating practices, deteriorating financial conditions, apparent violations of laws or regulations, or weak risk-management practices. Division of Risk Management Supervision Manual of Examination Policies – Formal Administrative Actions section (section 15.1) Identifies the statute and regulations that authorize the use of formal enforcement actions when necessary to reduce risks and address deficiencies, particularly when an insured state nonmember bank is rated 4 or 5 and evidence of unsafe or unsound practices is present. Division of Risk Management Supervision Manual of Examination Policies – Report of Examination Instructions section (section 16.1), including relevant Financial Institution Letters. Includes procedures for examiners to communicate supervisory recommendations (including matters requiring board attention and deviations from safety and soundness principles underlying policy statements) and identifies schedules for inclusion in reports of examination. Large Bank Supervision Procedures (internal manual), including relevant internal memorandum Describes procedures and processes (in three broad categories: planning, examination activities, and communication) for conducting continuous examination programs at state nonmember banks with total assets exceeding $10 billion. Supervisory Recommendations, Including Matters Requiring Board Attention (internal memorandum) Describes policies and procedures for scheduling supervisory recommendations (including matters requiring board attention) in reports of examination and for tracking bank management’s actions in response to these items after examinations. Pocket Guide for Directors and Statement Concerning the Responsibilities of Bank Directors and Officers The pocket guide describes FDIC’s expectations for boards of directors of institutions to carry out their duties. A second document, the statement, responds to concerns expressed by representatives of the banking industry and others regarding civil damage litigation risks to directors and officers of federally insured banks. Consolidated Supervision Framework for Large Financial Institutions (SR 12-17) Framework for consolidated supervision of large financial institutions with more than $10 billion in total assets. Bank Holding Company Supervision Manual Provides guidance to examiners as they conduct on-site inspections of bank holding companies and their nonbank subsidiaries. Provides guidance to examiners as they assess risk-management practices of state member banks, bank holding companies, and savings and loan holding companies (including insurance and commercial savings and loan holding companies) with less than $50 billion in total consolidated assets, and foreign banking organizations. Supervisory Considerations for the Communication of Supervisory Findings (SR 13-13/CA 13-10) Discusses the standard language the Federal Reserve uses to enhance focus on matters requiring attention and highlights supervisory expectations for corrective actions, Reserve Bank follow-up, and other supervisory considerations. Also defines matters requiring attention and matters requiring immediate attention and outlines procedures that safety- and-soundness and consumer compliance examiners will follow in presenting and communicating their supervisory findings. Framework for Risk-Focused Supervision of Large Complex Institutions, including relevant supervision and regulation letter (SR 97-24) Describes aspects of the Federal Reserve’s program to enhance the effectiveness of its supervisory processes for state member banks, bank holding companies, and the U.S. operations of foreign banking organizations. Rating the Adequacy of Risk Management Processes and Internal Controls at State Member Banks and Bank Holding Companies (SR 95-51) Directs examiners to assign separate rating for risk management to state member banks and bank holding companies with $50 billion or more in total assets, and highlights the importance of risk management as a facet of the supervisory process. Comptroller’s Handbook – Bank Supervision Process Includes explicatory materials on types of banks, supervision responsibilities, regulatory ratings, supervisory process, functional regulation, rating systems, and disclosure. Comptroller’s Handbook – Large Bank Supervision Outlines the supervisory process for large banks: the core assessment, risk assessment system, evaluation of bank internal control, and audits. Comptroller’s Handbook – Corporate and Risk Governance Focuses on management of a variety of risks and the roles and responsibilities of the board of directors and senior management, and provides relevant examination procedures. Comptroller’s Handbook – Internal and External Audits Addresses risks inherent in the audit function (which compromises both internal and external audit functions) and the audit function’s role in managing risks. Also addresses internal and external audit functions’ effect on risk-management supervisory expectations and the regulatory requirements for prudent risk management. Includes guidance and examination procedures to assist examiners in completing bank core assessments affected by audit functions. Comptroller’s Handbook – Internal Controls Discusses the characteristics of effective controls to assist examiners and bankers to assess the quality and effectiveness of internal control. Describes OCC’s supervisory process for internal control reviews and the roles and responsibilities of boards of directors and management. Enforcement Action Policy (Policies and Procedures Manual 5310-3), internal memorandum Describes policy for taking appropriate enforcement action in response to violations of law, rules, regulations, final agency orders, and unsafe or unsound practices and conditions. Violations of Laws and Regulations (Bulletin 2017-18) Describes updated policies and procedures on violations of laws and regulations and provides the agency with consistent terminology for communication, format, follow-up, analysis, documentation, and reporting of violations. Articulates the level and type of risk the agency will accept while conducting its mission. Matters Requiring Attention (Policies and Procedures Manual 5400- 11), internal memorandum Describes procedures for examiners to identify and aggregate supervisory concerns into matters requiring attention including criteria, communication, and follow-up of concerns. Also describes the relationship between matters requiring attention and interagency ratings, OCC’s risk-assessment system and enforcement actions. Includes examiner tools in the appendixes. Risk Management of New, Expanded, or Modified Bank Products and Services (Bulletin 2004-20, replaced by Bulletin 2017-43) Outlines the expectations for national banks’ management and boards to implement an effective risk-management process to manage risks associated with new, expanded, or modified bank products and services. Guidance on Sound Incentive Compensation Policies 75 Fed. Reg. 36395 (June 25, 2010) Interagency statement on sound incentive compensation practices to banking organizations supervised by FDIC, the Board of Governors of the Federal Reserve System (Federal Reserve), and the Office of the Comptroller of the Currency (OCC). It is intended to assist banking organizations in designing and implementing incentive compensation arrangements and related policies and procedures that effectively consider potential risks and risk outcomes. This appendix lists the questions we used to determine how federal bank examiners applied their policies and procedures to assess management oversight of risk at large depository institutions. We found that each federal banking regulator has slight variation in its policies and procedures for oversight of management at large depository institutions. Therefore, we did not apply generally applicable criteria in our assessment; instead, we applied the specific policies and procedures used by each federal banking regulator. Federal Deposit Insurance Corporation: 1. To what extent did examiners assess board and management oversight? 2. To what extent did examiners assess the bank’s control environment, including whether management takes appropriate and timely action to address recommendations by auditors and regulatory authorities? 3. To what extent did examiners assess the bank’s risk assessment? 4. To what extent did examiners assess the bank’s control activities, to include determining if policies, procedures, and practices were adequate for the size, complexity, and risk profile of the bank and if management took appropriate steps to comply with laws and regulations? 5. To what extent did examiners assess the bank’s information and communication, to include adequacy of information systems to identify, capture, and report relevant internal and external information? 6. To what extent did examiners assess the bank’s systems in place to monitor risk arising from all major activities the bank is engaged in with respect to b. legal risk, and c. reputation risk? 7. In identifying matters requiring attention, did examiners consistently explain the rationale for the concern (whether the matter deviates from sound governance or internal controls and how it could adversely impact the condition of the institution)? 8. In communicating matters requiring attention, did examiners a. write in clear and concise language b. describe the deficient practices, operations, or financial condition, c. recommend actions the board should take to address the deficiency? 9. What steps did examiners take to follow up on matters requiring attention and verify completion? 10. To what extent did the examiner comment on how the bank accomplished compliance with enforcement actions or the reason why the bank is not in compliance with enforcement actions? Conclusions: To what extent did examiners follow agency risk- management guidance for this examination? To what extent do the conclusion memorandums link to the supervisory letter and report of examination? Board of Governors of the Federal Reserve System: 1. Within the context of the consolidated financial entity, to what extent did examiners assess the bank’s implementation of its corporate governance framework? 2. Within the context of the consolidated financial entity, to what extent did examiners assess management of the bank’s core business lines? 3. To what extent did the examiners assess the bank’s board and management for active oversight of the bank, to include the extent to which examiners a. assessed the adequacy of the bank directors’ fulfillment of their duties and responsibilities; and b. assessed bank management’s fulfillment of their duties and responsibilities? 4. To what extent did examiners assess the adequacy of the bank’s policies, procedures, and limits? 5. To what extent did examiners assess the adequacy of the bank’s risk monitoring and management information systems? 6. To what extent did examiners assess the adequacy of the bank’s internal controls? 7. To what extent did examiners assess the adequacy of the bank’s audit function, to include a. internal audit staff, c. internal audit function adequacy and effectiveness, d. external audit staff, and e. regulatory examinations? 8. How did examiners assess the Management rating for CAMELS? 9. In identifying matters requiring attention, did examiners consistently explain the rationale for the concern? 10. In communicating matters requiring attention, did examiners a. write in clear and concise language, b. prioritize based upon degree of importance, and c. focus on any significant matters that require attention? 11. To what extent did examiners follow-up on matters requiring attention and verify completion? 12. To what extent did the examiner comment on how the bank accomplished compliance with enforcement actions or the reason why the bank was not in compliance with enforcement actions? Conclusions: To what extent did examiners follow agency risk- management guidance for this examination? To what extent do the conclusion memorandums link to the supervisory letter and report of examination? Office of the Comptroller of the Currency: 1. To what extent did the examiners assess the quantity and quality of b. reputation risk, c. operational risk, and d. compliance risk? 2. To what extent did the examiners assess the bank’s internal controls, d. accounting information, communication, and e. self-assessment and monitoring? 3. To what extent did the examiners assess the bank’s audit function, b. audit management and processes, c. audit reporting, and d. internal audit staff? 4. How did examiners assess the Management rating for CAMELS? 5. In identifying matters requiring attention, did examiners consistently a. deviates from sound governance, internal control, or risk management principles, and has the potential to adversely affect the bank’s condition, including its financial performance or risk profile, if not addressed; b. results in substantive noncompliance with laws and regulations, enforcement actions, supervisory guidance, or conditions imposed in writing in connection with the approval of any application or other request by the bank; or c. describes an unsafe or unsound practice. An unsafe or unsound practice is generally any action, or lack of action, which is contrary to generally accepted standards of prudent operation, the possible consequences of which, if continued, would be abnormal risk or loss or damage to an institution, its shareholders, or the Deposit Insurance Fund? 6. In communicating matters requiring attention, did examiners a. describe the concern(s); b. identify the root cause(s) of the concern and contributing factors; c. describe potential consequence(s) or effects on the bank from d. describe supervisory expectations for corrective action(s); and e. document management’s commitment(s) to corrective action and include the time frame(s) and the person(s) responsible for corrective action? 7. In follow-up on matters requiring attention, did examiners consistently a. monitor the board and management’s progress implementing b. verify and validate the effectiveness of the board and management’s corrective actions; c. perform timely verification after receipt of the documentation or communication from the bank that the documentation is ready for review; d. meet, as necessary, with the bank’s board or management to discuss progress assessments and verification results; and e. deliver written interim communications to the board summarizing the findings of validation activity? 8. To what extent did examiners verify and validate bank actions to comply with enforcement actions? Conclusions: To what extent did examiners follow agency risk- management guidance for this examination? To what extent do the conclusion memorandums link to the supervisory letter and report of examination? In addition to the contact named above, Karen Tremba (Assistant Director), Philip Curtin (Analyst in Charge), Enyinnaya David Aja, Bethany Benitez, Rachel DeMarcus, M’Baye Diagne, Risto Laboski, Yola Lewis, Christine McGinty, Kirsten Noethen, David Payne, Amanda Prichard, Barbara Roesmann, Jena Sinkfield, and Farrah Stone, made key contributions to the report.", "summary": "Weaknesses identified after the 2007–2009 financial crisis included management weaknesses at large depository institutions and the need for federal regulators (FDIC, Federal Reserve, and OCC) to address the deficiencies in a timely manner. Concerns remain that positive economic results of recent years could mask underlying risk-management deficiencies. This report examined (1) how consistent regulators' revised policies and procedures are with leading risk-management practices, (2) how they applied examination policies and procedures, and (3) trends in supervisory concern data since 2012 and how regulators tracked such data. GAO compared regulators' policies and procedures for oversight against leading practices; compared documents from selected bank examinations for 2014–2016 against regulator's risk-management examination procedures; reviewed aggregate supervisory concern data for 2012–2016; and interviewed regulators and industry representatives. Since 2009, federal banking regulators have revised policies and procedures for use by examiners in supervising depository institutions' management activities (such as those related to corporate governance and internal controls) and for identifying and communicating supervisory concerns. For example, regulators differentiated levels of severity for supervisory concerns and specified when to communicate them to boards of directors at the depository institutions. GAO found that the updated policies and procedures generally were consistent with leading risk-management practices, including federal internal control standards. Examination documents that GAO reviewed showed that examiners generally applied the regulators' updated policies and procedures to assess management oversight at large depository institutions. In particular, for the institutions GAO reviewed, the regulators communicated deficiencies before an institution's financial condition was affected, and followed up on supervisory concerns to determine progress in correcting weaknesses. However, practices for communicating supervisory concerns to institutions varied among regulators and some communications do not provide complete information that could help boards of directors monitor whether deficiencies are fully addressed by management. Written communications of supervisory concerns from the Federal Deposit Insurance Corporation (FDIC) and the Board of Governors of the Federal Reserve System (Federal Reserve) that GAO reviewed often lacked complete information about the cause of the concern and, for the Federal Reserve, also lacked information on the potential consequences of the concern, which in one instance led to an incomplete response by an institution. Communicating more complete information to boards of directors of institutions, such as the reason for a deficient activity or practice and its potential effect on the safety and soundness of operations, could help ensure more timely corrective actions. While supervisory concern data indicated continuing management weaknesses, regulators vary in how they track and use the data. Data on supervisory concerns, and regulators' internal reports based on the data, indicated that regulators frequently cited concerns about the ability of depository institution management to control and mitigate risk. However, FDIC examiners only record summary information about certain supervisory concerns and not detailed characteristics of concerns that would allow for more complete information. With more detailed information, FDIC management could better monitor whether emerging risks are resolved in a timely manner. In addition, the regulators vary in the nature and extent of data they collect on the escalation of supervisory concerns to enforcement actions. FDIC and the Office of the Comptroller of the Currency (OCC) have relatively detailed policies and procedures for escalation of supervisory concerns to enforcement actions, but the Federal Reserve does not. According to Federal Reserve staff, in practice they consider factors such as the institution's response to prior safety and soundness actions. But the Federal Reserve lacks specific and measurable guidelines for escalation of supervisory concerns, relying solely on the judgment or experience of examiners, their management, and Federal Reserve staff, which can result in inconsistent escalation practices. GAO recommends that FDIC and the Federal Reserve improve information in written communication of supervisory concerns; FDIC improve recording of supervisory concern data; and the Federal Reserve update guidelines for escalating supervisory concerns. FDIC disagreed with the first recommendation, stating its policies address the issue, but GAO found clarification is needed. FDIC agreed with the second recommendation. The Federal Reserve neither agreed nor disagreed with the recommendations.", "document_type": "gao"}
{"report": "The overall objective of the Army Facilities Standardization Program is to achieve savings and benefits in the programing, design, and construction of Army facilities of excellence. To meet AFSP’s objectives in a timely, efficient, and cost-effective manner, the Army established the nine Centers in 2006 to support the AFSP, as shown in figure 1. The AFSP operates under the direction of the Army Facilities Standardization Committee (Committee). As shown in figure 2 below, the Committee is chaired by the Assistant Chief of Staff for Installation Management (ACSIM) and composed of members from USACE and the U.S. Army Installation Management Command (IMCOM). Each of these offices has representatives who are either full-fledged or advisory members of the Centers of Standardization Management Board (the Board). The Board members directly oversee the activities of the Centers and are responsible for developing performance measures and reporting them to the Committee. The Centers have primary responsibility for developing and managing Army standard design packages for designated facility types. The Centers, among other things, ensure that these standard designs and construction of projects comply with two other sets of facility guidelines: DOD’s Unified Facilities Criteria (Facilities Criteria) and general Army standards. As we previously reported, the Facilities Criteria are overarching, DOD-wide technical manuals and standards used for planning, design, construction, restoration, and maintenance of DOD facility projects. These criteria must be used to the greatest extent possible by all DOD components. They are developed through the joint efforts of the U.S. Army Corps of Engineers, the Naval Facilities Engineering Command, and the Air Force Civil Engineer Center, and they are approved by the Engineer Senior Executive Panel of the Unified Facilities Criteria Program. According to Army Regulation 420-1, Army standards are the immutable, unchanging, required facility elements and criteria that define the fundamental purpose and function of a facility’s design and construction. These Army standards are authorized by the Committee. Army standard designs define the facility key components, features, and characteristics that must be included in the design and construction or major renovation of all facilities of the same type regardless of location, available funding, command preferences, or installation mission. Essentially, Army standard designs may consist of architectural and engineering drawings as well as written design specifications that a construction team can easily adapt or modify for site-specific requirements. Figure 3 below compares Army standard designs with Facilities Criteria and general Army standards. In addition to developing and managing Army standard design packages, the Centers’ staff function principally as engineering and architectural consultants within larger project teams as they monitor and oversee the appropriate use of Army standard designs (as well as any incorporated Army standards or Facilities Criteria). According to Centers officials, 12 full-time and 21 part-time staff are currently dedicated to the Centers. Staff are located in USACE headquarters in Washington, D.C., as well as in eight USACE districts and one Engineering and Support Center. Each Center specializes in and is responsible for specific facility types and their designs. While the Centers support the Army’s overall efforts for standardization, not every Army facility is built according to a standard design. Appropriate Centers staff are required to review every proposed Army construction project at its outset and, if an installation has requested a waiver from an existing Army standard or standard design, all voting members of the Committee may authorize waivers in accordance with certain procedures. According to Centers officials, Army standard designs have been developed for about 70 regularly constructed facility types out of the Army’s nearly 900 facility types. For example, the Army has standard designs for fire stations, chapels, dining facilities, and weapons storage. (See appendix II for a listing of the 70 facility types that currently have standard designs or for which standard designs are under development.) According to Centers officials, the Centers’ 70 facility types account for approximately 60 percent of Army Military Construction (MILCON) projects and represent an estimated 55 percent to 70 percent of the overall Army MILCON budget for any given year. (See appendix III for information on overall DOD standardization program, including the Navy and Air Force standard design programs.) In fiscal year 2019, the Centers reported a combined annual budget of about $6.2 million for their operations and personnel. The Centers identified and engaged in a number of activities designed to support the key objectives found in their charter and these activities are consistent with key principles and concepts in OMB guidance for a disciplined capital programming process. The Centers’ charter includes the following three objectives: (1) developing and refining Centers’ policies and processes; (2) assuring consistent application of standards of the Centers program; and (3) monitoring the Centers’ execution to meet the overarching objectives and priorities of the AFSP and standardization process. To meet the three objectives, the Centers engage in different activities throughout the military construction process. Figure 4 below shows the various points at which the Centers are involved in the life- cycle of a military construction project and examples of the activities in which the Centers engage. For example, Engineer Regulation 1110-3- 113 states that during the design phase of projects, the Centers maintain a lead role and will be the technical lead for coordination, review, and acceptance of design deliverables, including providing field technical assistance, identifying and advising when a waiver is required and coordinating with appropriate authorities in this matter, and reviewing and editing requests for proposal documents—activities that according to our analysis support the Centers’ second objective. Based on our review of supporting documentation from five projects that used standard designs, we found that the Centers were undertaking the activities mentioned above. In addition, activities in which the Centers engaged during the design, construction, and post-construction phases of these projects were consistent with key principles and concepts in OMB guidance. Specifically, we found evidence that, for these five projects, Centers’ staff participated as integrated members of the project delivery teams in planning meetings, design reviews, assessments of the need for standard design waivers, value engineering studies, and life-cycle cost analyses during the projects’ design and construction phases. These activities were consistent with key principles and concepts in OMB guidance for a disciplined capital planning process, including that agencies should use integrated project teams, as appropriate, to manage the various capital programming phases or major acquisition programs within the agency. In addition, we found that other Centers’ activities—performing post- occupancy evaluations (POE) and updating standard designs when applicable—were also consistent with key principles and concepts in OMB guidance for a disciplined capital planning process. For instance, we found that a POE was completed for one project, a post-occupancy questionnaire was completed for another project, a POE was planned during fiscal year 2020 for a third project, and a fourth project was still under construction. According to OMB capital programming guidance, POEs are tools to evaluate the overall effectiveness of an agency’s capital acquisition process. The primary objectives of a POE include (1) identifying how accurately a project meets its objectives, expected benefits, and strategic goals of the agency and (2) ensuring the continual improvement of an agency’s capital-programming process based on lessons learned. The guidance identifies factors to be considered for evaluation in conducting a POE, such as standards and compliance, customer/user satisfaction, and cost savings. The guidance also notes that a POE should generally be conducted 12 months after the project has been occupied, to allow time for the tenant to evaluate the building’s performance and relevant aspects of project delivery. However, the guidance allows agencies some flexibility in the timing of a POE to meet their unique needs if 12 months is not the optimal timing to conduct the evaluation. Our review of Centers guidance and project documents also found that the Centers’ activities supported the Centers’ objectives as well as AFSP objectives and priorities. In addition, Centers officials emphasized that the Centers participate in all Army standard design construction projects to ensure that the facility designs support the objectives of the AFSP, specifically improving the programing, design, and construction processes for Army facilities. As shown in table 1 and further outlined below, we assessed whether the Centers’ activities undertaken on standard design construction projects were applicable to the Centers’ objectives. Then, for those that were applicable, we determined whether those activities supported the Centers’ objectives. (See appendix IV for a detailed analysis of how the Centers activities support the program’s objectives.) Centers use POEs to evaluate standard designs: We found, for example, that the POEs led by the Centers are designed to evaluate whether the project met fundamental Army functional and mission requirements, whether the project implemented Army standard design, and whether improvements to the design could be made. These reviews support Centers objectives 1, 2, and 3— developing and refining Centers’ policies and processes, consistently applying Army standard designs, and supporting AFSP objectives and priorities—by identifying areas of the design needing improvement, evaluating whether a facility was constructed in accordance with the approved project design, and eliciting customer feedback concerning whether the finished facility meets mission requirements. Centers review standard design waivers: The Centers review an installation’s waiver request and advise whether a waiver to Army standards or standard designs is required for that specific project. This process supports Centers objectives 1, 2, and 3—developing and refining Centers’ policies and processes, consistently applying Army standard designs, and supporting AFSP objectives and priorities. Specifically, part of the waiver review and approval process is the Centers’ assessing whether a waiver request represents a unique need of a specific end user or a possible permanent change to the Army standard design or Unified Facilities Criteria. In addition, if the Centers waive the use of or approve deviations from standard design prior to the beginning of the construction phase, it may reduce the number of change orders that occur during construction. The Army, through its Centers of Standardization Management Board, is responsible for oversight of the Centers and has performance measures to track their progress in achieving one of their three key objectives. However, the Army does not have performance measures for assessing progress for their other two objectives. The Board provides oversight to the Centers in support of the AFSP. The Board members are responsible for developing, implementing, and reporting on program metrics. The Centers’ Charter of 2006 broadly identifies the mission and objectives of the Board, while more recent program guidance and regulations describe its functions in more detail. The Charter states that the mission of the Board is to provide corporate oversight and consistent Centers execution in support of the AFSP. In overseeing the Centers, it is key that the Board has performance measures that provide it with evaluative information to help make decisions about the program—information that tells them whether, and why, a program is working well or not. Performance measurement is the ongoing monitoring and reporting of program accomplishments, particularly progress toward pre-established goals. It is typically conducted by program or agency management and is critical for providing information concerning whether a program is working well or not. Performance measures may address the type or level of program activities conducted (processes), the direct products and services delivered by a program (outputs), or the results of those products and services (outcomes). The Army has a performance measure to support its first key objective. Each fiscal year, the nine Centers develop budget execution plans that outline how they will support the design standards for the specific facility types for which they have responsibility. In these plans, the Centers establish goals for updating specific existing standard designs and developing new standard designs (that is, the output from the Centers’ efforts). The Board’s primary oversight process consists of monitoring program execution of the nine Centers. According to Center officials, the Board reviews these execution plans at the semi-annual board meetings to determine whether the Centers are executing as planned, that is have the Centers met their goals for updating and developing standard designs. We found that this oversight process enables the Board to assess the progress each of the Centers has made toward achieving its goals for updating existing standard designs and developing new ones. For example, in fiscal year 2017 the Fort Worth Center completed all four of its planned standard design updates, and the Honolulu Center completed three of its four planned updates. We also found that the Board does not evaluate progress toward ensuring that the Centers consistently apply standard designs across the Centers of Standardization program (second objective of the Centers). Specifically, as shown in table 1 above, the Centers engage in a number of activities that support the consistent application of Centers standards on a project-by-project basis. However, the Board does not maintain, consolidate, or analyze information about how frequently the Centers engage in such activities, or how the Centers’ activities affect the program. That is because, according to Army and Centers officials, neither the Board nor the Centers have developed and implemented performance measures to assess the progress the Centers are making in ensuring that standard designs are consistently used. Absent such measures, the Army lacks assurance that standard designs are being applied, when appropriate, and that standard designs are being applied consistently across the service. In fact, to provide the project-specific documentation that we reviewed, the Centers needed to request documents from the USACE district office responsible for the projects. According to Centers officials, this was necessary because the Centers currently do not have a document management system in which project documentation is stored. Instead, as the USACE organization responsible for specific projects, each district maintains its own project records. The officials stated that USACE recently moved to a cloud-based system for storing project documents and is exploring whether this system could provide a more central document storage system. We note that having access to such information, along with creating appropriate performance measures, could enable the Board to measure whether progress has been made in ensuring that standard designs are applied consistently. In addition, we found that the Board does not evaluate whether the Centers are making progress in supporting the objectives and priorities of the AFSP (third objective of the Centers). One of the objectives of the AFSP is to reduce design costs and time, construction costs and time, and the number of change orders issued during construction. Although Army and Centers officials told us that the use of standard designs reduces project costs, time, and change orders, they could not provide supporting data. That is because, according to Army and Centers officials, neither the Board nor the Centers have developed and implemented performance measures to assess the effects of the use of standard designs. Creating such measures could enable the Army to assess the extent to which the Centers are reducing design costs and time, construction costs and time, and the number of change orders issued. DOD’s Fiscal Year 2020 Annual Performance Plan and Fiscal Year 2018 Annual Performance Report established a goal of simplifying, delivering faster, and reducing costs of product and service procurement. One of the performance measures associated with this goal was to reduce cost overruns and schedule delays by up to 50 percent for military construction projects. Developing and implementing performance measures related to reducing design costs and time, construction costs and time, and the number of change orders issued would enable the Centers to demonstrate the extent to which they are supporting DOD’s annual performance goals. We found that the use of the standard design does not introduce increased liability for the Centers if issues arise during a construction project. Centers officials stated that a contractor could file a claim against the government if the contractor felt there was a flaw in the Army’s standard design or that using the standard design resulted in unanticipated costs during the design or construction phase. However, Centers officials stated that there have been no instances in which any of the Centers was a party to legal action related to the use of a standard design. According to Centers officials, the design for a facility project is typically developed by one of the USACE district offices or an architect-engineer contractor. Further, these officials stated that while the pertinent Army standard design guides the development of Army project designs, the final project design, certified by the USACE district office or an architecture/engineering contractor, represents the plan for a specific project. In addition, according to the Federal Acquisition Regulation (FAR), the architect-engineer contractor is responsible for the professional quality, technical accuracy, and coordination of all designs, drawings, specifications, and other services furnished by the contractor under its contract. Furthermore, the FAR states that the contractor shall, without additional compensation, correct or revise any errors or deficiencies in its designs, drawings, specifications, and other services. The FAR also stipulates that the contractor may be liable for government costs resulting from errors or deficiencies in designs furnished under the contract. Consequently, according to USACE officials, because the Centers are not responsible for the design of a specific project, they would not have increased liability in the event that changes were required during construction. The Centers of Standardization develop and update Army standards and Army standard designs within the Army Facilities Standardization Program. In addition, the Centers are responsible for ensuring that the design and construction of Army military construction projects comply with approved Army standards and Unified Facilities Criteria. While the Army tracks the Centers’ program execution related to the Centers’ efforts to develop new and update existing standard designs (first objective of the Centers), it does not have performance measures for assessing progress toward the Centers’ other two objectives. Specifically, the Army does not have performance measures in place to assess the progress the Centers have made toward assuring consistent application of standards from the Centers’ program (second objective of the Centers) or monitoring the Centers’ execution to meet the overarching objectives and priorities of the AFSP and standardization process (third objective of the Centers) including, among other things, reducing design costs and time, construction costs and time, and change orders during construction. This hinders the Centers’ ability to determine how well they are supporting the objectives of both the Army Facility Standardization Program and DOD’s annual performance plans, as well as the Centers’ ability to demonstrate the extent to which they are achieving their objectives. We are making two recommendations to the Secretary of the Army. The Secretary of the Army should ensure that the Assistant Chief of Staff for Installation Management, in conjunction with the Centers of Standardization and the U.S. Army Corps of Engineers, establish and implement performance measures to assess the progress the Centers are making in ensuring that standard designs are used consistently. (Recommendation 1) The Secretary of the Army should ensure that the Assistant Chief of Staff for Installation Management, in conjunction with the Centers of Standardization and the U.S. Army Corps of Engineers, establish and implement performance measures to assess the effects of the use of standard designs, specifically the progress the Centers are making in reducing design costs and time, construction costs and time, and change orders. (Recommendation 2) We provided a draft of this report to the Department of the Army for review and comment. In its written comments, the Army concurred with both of our recommendations, and stated it would take actions to implement them. The Army’s comments are printed in their entirety in appendix V. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense and the Secretaries of the Army, Navy, and Air Force. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact Diana Maurer at (202) 512-9627 or maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VI. According to Centers officials, a total of 12 full-time and 21 part-time staff are assigned to the Centers of Standardization. Each Center specializes in and is responsible for specific facility types and their designs. Table 3 below lists the current staffing levels and the facility types supported by each of the Centers. The Department of Defense’s (DOD) department-wide standardization program has the goals of improving military operational readiness, reducing total ownership costs, and reducing cycle time. Overseen by the Office of the Under Secretary of Defense for Research and Engineering (OUSD(R&E)), the Department of Defense Standardization Program is described in DOD Manual 4120.24, which outlines its governing council, definitions, and procedures that apply to all components within the department. Under the Defense Standardization Program, DOD component heads ensure that materiel standardization, including information technology and facilities, is addressed throughout the acquisition process. The three overarching goals of the Defense Standardization Program are to (1) improve military operational readiness, (2) reduce total ownership costs of the department, and (3) reduce cycle times. The manual also defines the following terms: Standard. A document that establishes uniform engineering or technical criteria, methods, processes, and practices. Standardization. The process of developing and agreeing on (by consensus or decision) uniform engineering criteria for products, processes, practices, and methods for achieving compatibility, interoperability, interchangeability, or commonality of materiel. Defense standard. A document that establishes uniform engineering and technical requirements for military-unique or substantially modified commercial processes, procedures, practices, and methods. There are five types of defense standards: interface standards, design criteria standards, manufacturing process standards, standard practices, and test method standards. DOD’s Unified Facilities Criteria (Facilities Criteria) and Unified Facilities Guide Specifications (UFGS) provide facility planning, design, construction, operation and maintenance, sustainment, restoration, and modernization criteria for facility owned by the DOD. The Facilities Criteria contain technical guidance; introduce new and innovative technology; or provide mandatory requirements to implement laws, regulations, executive orders, and policies prescribed by higher authority documents. The Facilities Criteria also define performance and quality requirements for facilities to support their mission throughout their life cycle. According to DOD guidance, the Facilities Criteria provide the most current operationally effective, cost-efficient, and safe criteria at the time of publication. Both the Facilities Criteria and UFGS are developed through the joint efforts of the U.S. Army Corps of Engineers, the Naval Facilities Engineering Command, and the Air Force Civil Engineer Center, and are approved by the Engineer Senior Executive Panel of the Unified Facilities Criteria Program. The Facilities Criteria and UFGS systems were designed not only to establish uniformity among defense facilities, but to standardize and streamline the process for developing, maintaining, and disseminating construction criteria. The procedures for the development and maintenance of the Unified Criteria and Unified Specifications are outlined in Military Standard 3007G, which is updated by the Engineering Senior Executive Panel. Each military department (Army, Navy, and Air Force) has its own facilities standardization program that implements the Unified Criteria and Unified Specifications as well as service-specific facilities criteria, standards, and guides. The Army’s program, known as the Army Facilities Standardization Program (AFSP), is the oldest among the three departments, having been initiated in 1993. Due largely to the unique construction needs of the Army, the AFSP is the most complex and comprehensive of the facility standardization programs. It utilizes two levels of guidance for standardized facility types: a broad standard, called “Army Standards,” and a specific standard, called “Standard Design.” The Department of the Navy program began in 2014 and provides policy and standards for the design development, and revision of Navy project documents in Navy and Marine Corps Design and Facilities Criteria, while the Air Force program was started in 2016 and provides criteria in an Air Force Instruction for design and construction of Air Force facilities. The Centers of Standardization (Centers) undertake a number of activities designed to support the key objectives found in their charter, which includes supporting the objectives of the Army Facilities Standardization Program (AFSP). Table 4 identifies each of these activities along with the specific objectives that we determined the activities support. developing and refining Centers of Standardization policies and processes, assuring consistent application of standards of the Centers’ program, and monitoring the Centers’ execution to meet the overarching objectives of the AFSP and standardization process. increased credibility with the Congress through more consistent construction program development, increased consistency in facility types with equal treatment among Army Commands, installations, and users, improved master planning and site development activities, improved design quality, and the promotion of design excellence, simplified design and construction project management, reduced design costs and times, reduced construction costs and time, and reduced change orders during construction, and increased customer satisfaction through improved responsiveness to users’ functional and operational requirements.", "summary": "In 2006, the U.S. Army Corps of Engineers began its Centers of Standardization program to develop design standards for facility types that the Army constructs on a regular basis. The Centers support broader Army efforts under the AFSP to standardize facility types with objectives such as improving design quality, reducing design and construction costs and time, and reducing change orders. Senate Report 115-262 accompanying the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to evaluate the Centers' effectiveness. This report assesses, among other things, the extent to which (1) the Centers have identified activities that support their objectives, and (2) the Army tracks the Centers' progress toward their objectives. GAO reviewed and analyzed applicable regulations and program and project documentation; compared Center activities to program objectives; and interviewed cognizant agency officials to gain an understanding of the Centers' operations and potential financial liabilities. The nine Centers of Standardization (Centers) within the U.S. Army Corps of Engineers undertake a number of activities designed to support each of their program objectives. Their charter includes three objectives: (1) developing and refining Centers' policies and processes; (2) assuring consistent application of the Centers' standards; and (3) monitoring execution to meet the overarching objectives and priorities of the Army Facilities Standardization Program (AFSP) and standardization process. We found that the Centers' various activitiessuch as conducting value engineering and life-cycle cost studies to identify possible cost savings and analyze long-term costs of new facilitiesare consistent with key principles and concepts in Office of Management and Budget guidance for a disciplined capital planning process. Additionally, the post-occupancy evaluations led by the Centers are designed to evaluate whether the Army functional requirements have been met, Army standard design has been implemented, and there are any areas where the design could be improved. These evaluations support all three of the Centers' objectives by evaluating whether a design needs improvement, a facility was constructed in accordance with the approved project design, and customer needs were met. The Army has limited performance measures to track the Centers' progress in achieving program objectives. Semi-annual meetings of the Army's Centers of Standardization Management Board (Board) enable the Army to track the Centers' progress toward their goal of developing and updating Center policies and processes (first objective of the Centers). However, GAO found that the Army lacks performance measures to assess the Centers' progress in ensuring the consistent application of Army standard designs (second objective of the Centers) and in monitoring how well the Centers meet the objectives and priorities of the AFSP and standardization process (third objective of the Centers). Specifically, the Board does not maintain, consolidate, or analyze information about how frequently the Centers participate in construction projects, or how this activity affects the program and supports AFSP objectives, such as reducing project costs, times, and change orders. Taking steps to develop and implement appropriate performance measures would enhance the Army's efforts to ensure that the Centers are meeting their program objectives. GAO is recommending that the Army establish performance measures to assess the Centers' progress to (1) ensure the consistent use of standard designs and (2) reduce construction costs and time and reduce the occurrence of change orders. The Army concurred with our recommendations.", "document_type": "gao"}
{"report": "With top leadership support and commitment, DHS has made important progress in strengthening its management functions, but considerable work remains. As shown in figure 1, as of March 2019, DHS had met three out of five criteria for removal from our High Risk List—leadership commitment, action planning, and monitoring progress. DHS has partially met the remaining two criteria: capacity (i.e., people and other resources) and demonstrated, sustained progress. To address the criteria for capacity, DHS needs to make additional progress in identifying and allocating resources in certain areas—namely, acquisition, information technology, and financial management—to fully demonstrate its capacity. For the criteria for demonstrated, sustained progress, we reported in March 2019 that DHS had fully addressed 17 out of the 30 outcomes that are the basis for gauging DHS’s progress across management areas, as shown in table 1. To fully meet the criteria for demonstrated, sustained progress, DHS needs to continue implementing its Integrated Strategy for High-Risk Management and maintain engagement with us to show measurable, sustainable progress in implementing corrective actions and achieving outcomes. DHS can accomplish this by, among other things, maintaining a high level of top leadership support and sustained commitment to ensure continued progress in executing its corrective actions through completion, and increasing employee engagement and morale. Examples of important programs and remaining work in the key management functions include: In the key management function of human capital management, DHS leadership is needed to address skills gaps that have had a significant role in the DHS management high-risk area. For example, we have found that DHS lacks guidance on how to identify critical cybersecurity and acquisition skills needed to support its new information technology delivery model. We have also found that DHS has insufficient technical skills to support its biometric identification services program. Addressing these skill gaps could help DHS fully demonstrate its capacity to strengthen and integrate its management functions. Additionally, within human capital management, DHS has struggled with low employee morale scores since it began operations in 2003. DHS’s 2018 score ranked 20th among 20 large and very large federal agencies. Increasing employee engagement and morale is critical to strengthening DHS’s mission and management functions. DHS has continued to strengthen its employee engagement efforts by implementing our 2012 recommendation to establish metrics of success within components’ action plans for addressing its employee satisfaction problems. Further, DHS has conducted audits to better ensure components are basing hiring decisions and promotions on human capital competencies. In addition, OPM’s 2018 Federal Employee Viewpoint Survey data showed that in the past 2 years, DHS’s score on the Employee Engagement Index (EEI) increased by 4 points—from 56 in 2016 to 60 in 2018—which was 1 point more than the government-wide increase over the same period. While this improvement is notable, DHS’s current EEI score is 1 point below its EEI baseline score in 2010, suggesting that DHS is still working to regain lost ground after an 8 point drop between 2010 and 2015. In the key management function of financial management, DHS officials have faced challenges modernizing DHS components’ financial management systems and business processes that affect the department’s ability to have ready access to timely and reliable information for informed decision-making. Effectively modernizing financial management systems for the Coast Guard, FEMA, and ICE would help improve the reliability of their financial reporting. As we have reported, perhaps the single most important element of successful management improvement and transformation initiatives is the demonstrated commitment of top leaders, as shown by their personal involvement in reform efforts. With regard to leadership commitment, DHS’s top leadership, including leaders at the Secretary and Deputy Secretary level, has demonstrated exemplary commitment and support for addressing the department’s management challenges. They have also taken actions to institutionalize this commitment to help ensure the long- term success of the department’s efforts. One such effort is the Under Secretary for Management’s Integrated Priorities initiative to strengthen the integration of DHS’s business operations across the department. During monthly leadership meetings with the Under Secretary for Management, the department’s Chief Executive Officers have been providing status updates on their respective actions to address this high- risk designation. Furthermore, top DHS leaders, such as the Under Secretary for Management and the department’s Chief Executive Officers, routinely meet with our management to discuss progress on high-risk areas. In April 2019, we sent a letter to the Acting Secretary of Homeland Security detailing 26 open recommendations that we deem highest priority for implementation. Priority recommendations are those that we believe warrant priority personal attention from heads of key departments or agencies. These 26 recommendations fall into six major areas— emergency preparedness and response, border security, transportation security, infrastructure and management, cybersecurity, and chemical and nuclear security. Many of these recommendations cut across DHS’s mission areas that are critical for national security. Given that these recommendations are often the most complex and difficult to implement, top DHS leadership will play a critical role in addressing them. Fourteen of the 26 priority open recommendations we identified in the April 2019 letter are directed to acting officials serving in vacant positions. We have issued 12 recommendations to the Secretary of Homeland Security who is currently an acting official. We have also issued two recommendations to FEMA which is currently operating under acting leadership. Committed and consistent leadership at the department and component levels will be critical for addressing our priority recommendations. For example: In September 2014, we recommended that the Secretary of Homeland Security work jointly with the Administrator of the General Services Administration to strengthen management of the ongoing acquisition project to develop the multi-billion dollar headquarters facilities at the St. Elizabeth’s campus in Washington, D.C. Leadership is critical in this effort, given the magnitude of the project and the impact of headquarters consolidation on DHS operations. In October 2008, we recommended actions that FEMA should take to improve its administration of the National Flood Insurance Program high-risk area. We also recommended in September 2012 that FEMA develop a methodology to better assess a jurisdiction's capability to respond to and recover from a disaster without federal assistance. In July 2015, we further recommended that the Mitigation Framework Leadership Group establish an investment strategy to identify, prioritize, and guide federal investments in disaster resilience. Implementing these actions could limit the federal government’s fiscal exposure and increase the nation’s resilience to extreme weather events as the costs and impacts of weather disasters resulting from floods, drought, and other events are expected to increase in significance as previously “rare” events become more common and intense. In July 2018, we recommended that U.S. Customs and Border Protection (CBP) analyze the costs associated with future barrier segments along the southwest border and include cost as a factor in the Impedance and Denial Prioritization Strategy. Obtaining this key information could help CBP evaluate designs and prioritize locations for future border barrier segments to deter cross-border illegal activity. In February 2017, we recommended that DHS establish metrics and methods by which to evaluate the performance of DHS’s National Cybersecurity and Communications Integration Center in relation to its statutorily-required cybersecurity functions. Until it develops metrics and methods to evaluate its performance, the center cannot ensure that it is effectively meeting its statutory requirements, while cyber- based intrusions and attacks on federal systems and systems supporting our nation’s critical infrastructure are becoming more numerous, damaging, and disruptive. We also recommended in February 2018 that DHS take steps to better manage and assess its cybersecurity workforce gaps and areas of critical need. Given its important role in the nation’s cybersecurity, taking steps to address these issues will be critical. We will continue to monitor DHS’s progress in strengthening management functions and addressing priority recommendations. We also plan to continue to meet quarterly with DHS management to gauge leadership commitment, discuss progress, and review DHS’s goals and corrective action plans in its Integrated Strategy for High-Risk Management, which DHS issues twice per year. Thank you, Chairman Thompson, Ranking Member Rogers, and Members of the Committee. This concludes my testimony. I would be pleased to answer any questions. For further information on this testimony, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals making key contributions to this work include Alana Finley, Assistant Director; Luis E. Rodriguez, Analyst-in-Charge; Karin Fangman; Andrew Howard; and Thomas Lombardi. Key contributors for the previous work that this is based on are listed in each product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In 2003, GAO designated Implementing and Transforming DHS as a high-risk area to the federal government. DHS has made considerable progress in transforming its original component agencies into a single cabinet-level department, and as a result, in 2013, GAO narrowed the scope of the high-risk area to focus on Strengthening DHS Management Functions . In addition, DHS leadership is responsible for implementing numerous recommendations that GAO has made to the department and its component agencies. Current vacancies in top leadership positions could pose a challenge to addressing high-risk areas and priority recommendations that span DHS's diverse missions, which include preventing terrorism and enhancing security, managing our borders, administering immigration laws, securing cyberspace, and responding to disasters. This testimony discusses the need for DHS leadership commitment to strengthen its management functions and address GAO's priority recommendations. This testimony is based on GAO's 2019 high-risk update and other reports issued from March 2006 through April 2019. With the support and commitment of top leadership, the Department of Homeland Security (DHS) has made important progress in strengthening its management functions; however, considerable work remains. As of March 2019, DHS had fully addressed 17 of the 30 outcomes related to its management functions (see table). DHS needs to continue to show sustained leadership commitment in implementing its Integrated Strategy for High-Risk Management to achieve the remaining outcomes. Leadership commitment is also pivotal in addressing other GAO high-risk areas where DHS has a role, such as ensuring the cybersecurity of the nation, the National Flood Insurance Program, and limiting the federal government's fiscal exposure by better managing climate change risks. Currently, DHS has acting officials serving in eight positions requiring Senate confirmation, including positions with responsibilities for implementing high-risk outcomes, such as the Secretary, Deputy Secretary, and Under Secretary for Management. a “Mostly addressed”: Progress is significant and a small amount of work remains. b “Partially addressed”: Progress is measurable, but significant work remains. c “Initiated”: Activities have been initiated to address the outcome, but it is too early to report progress. In April 2019, GAO sent a letter to the Acting Secretary of Homeland Security detailing 26 open recommendations that GAO believes warrant the highest priority personal attention from the department and its components. These 26 recommendations fall into six major areas—emergency preparedness and response, border security, transportation security, infrastructure and management, cybersecurity, and chemical and nuclear security. For example, GAO has recommended that DHS take steps to strengthen human capital management, such as better managing and assessing its cybersecurity workforce gaps and areas of critical need. Fourteen of the 26 recommendations have been issued to acting officials serving in vacant positions, including 12 to the Secretary of Homeland Security, and two to the Federal Emergency Management Agency which is currently operating under acting leadership. Since the creation of DHS, GAO has made approximately 2,800 recommendations to the department, and DHS has implemented more than 75 percent of them, strengthening program management and performance measurement, among other things. GAO will continue to monitor DHS's progress in strengthening management functions and addressing priority recommendations.", "document_type": "gao"}
{"report": "GSA serves as the federal government’s primary civilian real property agent. When GSA does not have available federally owned space that can meet the needs of federal agency tenants, it leases space for these agencies in privately owned buildings. The Administrator of GSA delegates leasing authority to GSA regional commissioners, who further delegate authority to lease contracting officers. For leases that GSA procures for tenant agencies, GSA serves as the lessee and pays rent to the building owner, who serves as the lessor. The tenant agency pays monthly rent to GSA, which includes a fee for GSA’s services, and uses the leased space subject to the terms of an occupancy agreement with GSA. This agreement typically specifies not only the rent fee but also the amount the tenant agency must reimburse the lessor for improvements to the leased space—such as changes to walls, electrical outlets, telephone lines, and secure rooms—these are known as “tenant Improvements.” GSA leasing process. GSA uses different processes to carry out the leasing process depending on the size, cost, and type of the lease. For all of these processes, the leasing-planning process begins when GSA receives a request for space from a tenant agency and determines that fulfilling the request will require leasing space. According to the typical process outlined in the GSA Public Buildings Service (PBS) PBS Desk Leasing Guide, officials work with the tenant agency to define the requirements for the leased space, including the geographic area in which GSA will search for available properties. After this initial stage, GSA takes additional steps to acquire a new lease, see figure 1. For certain office space leases larger than 500 square feet, which represent more than 90 percent of GSA’s leases as of the end of fiscal year 2019, GSA can deviate from its typical leasing process and instead use what it calls the Automated Advanced Acquisition Program (AAAP). GSA began using a predecessor to this program in 1991 in the National Capital Region only and rolled out the current version to all national markets in 2015. In this program, instead of GSA’s first proposing requirements to potential lessors, the lessors first submit offers to GSA for pre-existing available space, including the space’s size, location, and features, and the rent amounts the lessor is offering for different lease durations. Once GSA develops a set of requirements with a tenant agency, it evaluates these standing offers to eliminate those that would not meet the space requirements, ranks the bids by present value, and selects the lowest cost option, see figure 2. GSA is required to take further steps for high value leases with a net annual rent above the statutory “prospectus” threshold—adjusted by GSA to $3.1 million in fiscal year 2019. For these leases, GSA must submit a prospectus, or proposal, to the House and Senate authorizing committees for their review and approval. As of the end of fiscal year 2019, GSA managed 8,045 leases, of which 291, or about 4 percent, had current annual rents above the 2019 prospectus level. These leases, however, accounted for about 41 percent of GSA’s total annual rent obligations. GSA leases. GSA leases differ substantially from typical commercial leases. For example, in a GSA lease, GSA—as the lessee—proposes the lease requirements. In a typical commercial office space lease, however, the lessor drafts the lease requirements and proposes them to the prospective tenant. For additional examples of the differences between GSA and typical commercial leases, see table 1. GSA’s lease reform efforts. In 2011, GSA issued a lease-reform implementation plan in response to comments from lessors and tenant agencies. In this plan GSA recommended changes including developing new lease models to better tailor its lease requirements to specific circumstances, and improving elements of its leasing process. As part of this and other initiatives since then, GSA developed leasing products and tools that it can use in various situations. These include: Simplified lease model: GSA developed this lease model for lower value leases with a facility security level of I or II, and a net annual rent—total rent minus operating expenses—of up to $150,000. GSA designed this model as a faster and more efficient method of processing lower value leases. As compared to GSA’s standard and global lease models—which can be used on leases of any size—this model contains fewer requirements and may not have certain more complex elements such as annual operating-cost adjustments, real estate tax adjustments, or an allowance for tenant substitution. In addition, the model requires GSA and the tenant agency to finalize the complete set of space requirements prior to GSA’s advertising the lease, a requirement that eliminates negotiations on the tenant improvements after GSA awards the lease. Net-of-utilities leases: As discussed in table 1, in most GSA leases the lessor is responsible for paying the utilities, and must estimate future utility costs as part of its bid for the lease. In a net-of-utilities lease, the tenant pays the utility costs for tenant space directly. A 2016 GSA study indicated that GSA could achieve savings through net-of-utilities leases for a small number of leases with certain characteristics including: the lease being over 50,000 square feet, a single tenant agency occupying the entire space, the tenant agency consuming large amounts of energy, and several other factors. GSA estimates that around 360 of its more than 8,000 leases meet these criteria. Succeeding and superseding leases: In most cases, GSA is required to conduct a full and open competition for leases. However, in certain circumstances GSA instead pursues succeeding or superseding leases. In circumstances where relocating to a new leased property would result in substantial relocation or duplication costs that GSA could not reasonably expect to recover through competition, GSA is allowed to pursue a succeeding lease, and when market conditions warrant renegotiation of an existing lease or when the tenant agency needs to make substantial modifications to a space before the expiration of a lease, GSA is allowed to pursue superseding leases. The GSA leasing stakeholders we spoke with identified some aspects of GSA leasing that are attractive to potential lessors such as the government’s good credit and GSA’s long average occupancy. They also identified a number of aspects of these leases that they said can affect their costs and the number of lessors who are willing and able to bid on a GSA lease. These areas were: Structure: overall characteristics of a lease including the volume and complexity of requirements, and how GSA structures rent payments, reimbursements for tenant improvements, and provision of services; Requirements: specific provisions in the lease such as early termination, janitorial and maintenance, tenant substitution, and real estate taxes; and Process: the steps lessors must follow to complete a GSA lease, such as the length of time and GSA’s ability to remain in a space after the end of the lease. The stakeholders we spoke with identified a number of benefits of GSA leasing that are attractive to potential lessors, including the government’s credit worthiness, long average tenancy in a space, and positive relationships with GSA and tenant agencies. Eighteen of the 20 lessors we spoke with identified the government’s credit worthiness as a benefit. This credit, lessors said, is better than many private sector tenants and presents lower risks, and some of the more experienced lessors said that GSA leases are an important part of their overall lease portfolios. For example lessors said that GSA leases represent a reliable revenue stream and that they are confident they will be paid on time for the full term of the lease, while for commercial leases—even for large companies—there is an increased risk of a rent default. Eight of the 20 lessors said that GSA and tenant agencies are relatively easy tenants to work with once the lease is in place. For example, lessors said the tenant agencies are very professional, and some of them said that they generally do not receive many requests for service from the occupying staff. In addition, seven lessors mentioned GSA’s long average tenancy in a space, which they said helps with a lessor’s long-term financial stability. One lessor said that commercial tenants stay on average three to five years, while their GSA tenants have lease lengths of 10 or 15 years. According to GSA, agencies occupy spaces leased through GSA for an average of around 22 years. Lessor Perspective on GSA Leases “The government is a Grade A tenant.” The lessors and real estate brokers we spoke with told us that the way GSA structures aspects of its leases can affect cost and competition. These aspects include the volume and complexity of requirements in the leases, the way GSA structures rent payments, how GSA defines and reimburses costs for tenant improvements, and the full service nature of GSA leases. Many lessors told us that they increase their bid prices in response to these aspects of GSA leases. GSA officials said that each of these aspects reflects GSA’s contracting policy, and it is not required to structure its leases this way by law, regulation, or executive order; however, they use these requirements to provide additional flexibility in managing their lease portfolio and reduce risk to the government. About three-fourths of lessors we interviewed said the volume and complexity of GSA lease requirements make these leases less attractive to potential bidders and can result in fewer bidders competing for a lease. These lessors further stated that GSA’s leases, in contrast to many private sector leases, can be quite lengthy—up to 85 pages—and contain many references to other documents that are not included in the lease text such as a seismic certification, a small business subcontracting plan, a Department of Labor wage determination, and a foreign ownership and financing certification. Lessor Perspective on GSA Leases “GSA’s lease is three-fourths of an inch thick, has many cross- references, takes weeks to read, and requires an attorney to understand.” Lessors must look up these other documents to fully understand the lease requirements, and some of the lessors we spoke to said that it can be difficult for them to quickly find the most important information. Lessors also noted that—in response to the volume and complexity of requirements—they may increase their bid prices. To account for risks inherent in these complex contracts lessors may also use the services of legal counsel or other experts, which could also increase costs. GSA officials told us that in the past several years they have made efforts to streamline their leases, including by eliminating duplicative or unnecessary provisions. One lessor told us that GSA has improved its leases by making them more intuitive and easier to read, a development that could be helpful for new potential lessors. About half of the stakeholders we spoke with, including 10 of the 12 more experienced lessors, said the way GSA structures its rent payments makes it difficult for these lessors to predict what actual operating costs will be in the future. Lessors said that because the shell rent (i.e. the building structure and systems) portion is typically flat over the firm term of a lease, and the operating expenses only increase at the consumer price index’s rate, the rental payments they receive are generally not sufficient to cover their actual increases in expenses. In addition, these lessors said that in a GSA lease, the lessor is typically responsible for providing utility services and that lessors pass these costs through to GSA as part of the operating cost portion of the rent. In a private sector lease, these costs are typically the tenant’s responsibility. To account for these issues, 11 lessors told us that they increase their bid prices to ensure that they will cover their costs, and two lessors told us that they would not bid on another GSA lease unless there were additional cost increases built into the lease. GSA officials told us that structuring rent payments this way provides GSA with a standardized method for addressing inflation and budgeting for future rental costs. Lessor Perspective on GSA Leases “The way GSA accounts for base rent and operating expenses is different than in a private sector lease. In our leases, the base rent is frozen throughout the term of the lease and only the operating expenses are allowed to increase based on inflation. Because of this, when preparing a bid we have to estimate operating expenses years into the future, which can be difficult, and if we guess too low we can end up losing money on the lease.” About one-third of the stakeholders we spoke with said the way GSA structures reimbursement for tenant improvements is a challenge, and three lessors said GSA’s requirements for construction standards and space designs can be difficult to meet. Stakeholders said that GSA’s requirement that lessors fund construction costs for tenant improvements upfront can put financial stress on lessors. For example, stakeholders said that lessors often must take on substantial debt in order to finance the construction of the tenant improvements. GSA reimburses lessors for tenant improvement costs over the firm term of the lease, but lessors told us that these payments do not begin until after the space is occupied, which can be delayed by the tenant agency’s changing its requirements. In prior work we found that this process of paying tenant improvements over the firm term of a lease increases the overall cost to the federal government of leasing space, primarily due to interest costs passed through by the lessors. In addition, half of the lessors we spoke with identified challenges with the process of developing and finalizing agency requirements for leased space, including frequent changes to space requirements and the need to develop detailed construction information before bidding on a lease. Lessor Perspective on GSA Leases “At the beginning I had to agree to a certain dollar amount for the tenant improvements, even though I did not know when the construction would happen, or how I would get paid back. You can get paid back in a lump sum, or the tenant improvements can be amortized over the lease term, but you do not know which it will be at the start of the process. This makes financing difficult.” Six lessors told us that they increase the cost of their bids in part due to GSA often over-estimating the cost of tenant improvements. This situation can require a lessor to take out a larger loan than necessary, which adds financing costs to the project. Lessors said that this situation can also prevent some potential lessors from bidding if they cannot obtain the amount of financing GSA requires. Additionally, lessors cited some tenant agencies’ space requirements which can call for expensive materials or difficult to construct items. For example, they described leases where they had to construct multiple restrooms or heating and cooling systems for small offices that typically house fewer than five employees. GSA officials told us that they structure the tenant improvements requirements in this way in order to establish expectations for the lessor. They said that they rely on tenant agencies to develop initial requirements for leased spaces, and they work with those agencies on the final designs and construction standards. We examined space requirements of the five federal agencies we reviewed that lease large amounts of space through GSA, and each of these agencies uses standardized guidance such as a handbook or design guide. These documents included information on developing specific requirements for leased space such as identifying the size of space needed, the types of workspaces used, and sample layouts for different types of facilities. Officials from these agencies told us that they use these handbooks as their primary reference when setting requirements for leased spaces and approving the final designs, and to develop these handbooks they use agency mission needs, government- wide security standards, and requirements from laws, regulations, and executive orders. They said that they generally rely on GSA to provide them with local market information such as the availability of suitable existing buildings, market rents, and other factors. About one-third of stakeholders we spoke with identified the full service nature of GSA’s leases as difficult, time consuming, and expensive— requiring them to estimate highly variable costs far into the future. For example, one lessor spoke of being required to provide all services— janitorial, maintenance and utilities—which can include simple things like replacing light bulbs. Further, the lessor has to work around the tenant agency’s operating hours to provide these services. Five lessors told us that they raise their bid prices to cover the costs of full service leases because they are cost and labor intensive. One lessor said that lessors estimate on the high end of the range to make sure they make a profit. Lessor Perspective on GSA Leases “The biggest issue for a potential lessor to consider is how hands-on they want to be—GSA leases are full service leases requiring lots of attention.” GSA officials told us that they structure leases this way because full service leases are generally less expensive to the government—avoiding the administrative burden of having to establish and maintain a contract for each service and avoiding the risk of higher than expected utility costs. In 2017, GSA issued guidance to its lease contracting officers on using net-of-utilities leases—those structured so that the tenant agency pays the utilities. GSA officials and stakeholders we spoke with told us that having a tenant agency pay utilities directly gives agencies an incentive to cut down on energy use and could result in lower costs. According to GSA, structuring leases as net-of-utilities leases requires substantial resources to manage and monitor. Therefore, GSA’s current policy is to use this structure for only certain large, energy-intensive leases. GSA officials told us they plan to continue using net-of-utilities leases but do not have plans to expand the program further. Stakeholders identified a number of specific GSA lease requirements that they said can affect cost and competition. These requirements include early termination options, GSA’s unilateral ability to substitute the tenant agency, provisions for reimbursing real estate taxes, and ongoing janitorial and maintenance requirements. Most of these requirements are GSA contracting policy, but the janitorial and tenant substitution requirements have some elements that GSA says it uses in response to either a law, a regulation, an executive order, or a combination of these and other sources. About two-thirds of stakeholders, including all 12 more experienced lessors, identified GSA’s including early termination options in leases as affecting the cost of the leases. GSA leases typically have a date after which GSA can terminate the lease with as little as 90 days’ notice, and since many GSA leases require significant initial capital for construction of the tenant improvements, some lessors told us they need to take out a loan using GSA’s future rent payments as the source of repayment. However, stakeholders and other experts told us that many loan underwriters will not consider any payments after GSA’s termination right date due to the risk that the GSA will leave the space, a factor that they said makes the loans more expensive and difficult to obtain. Nine of the lessors and two of the other experts we spoke with also said that it was unlikely GSA would ever exercise its termination options. Four lessors told us that they increase their bid prices to reflect the increased risk and expense that the early termination clauses provide, and four lessors and one broker told us that lessors may not bid on a lease at all if GSA includes an early termination option. Lessor Perspective on GSA Leases “The market, and lenders, look at the firm term as the length of the lease, and don’t take the soft term into account as GSA does… soft terms are the biggest structural obstacle in GSA lease requirements. If GSA included soft terms in leases just for emergencies, rather than as a matter of practice, the soft terms would not be as much of a problem.” GSA officials told us that these options allow them to maintain flexibility and use space efficiently despite changing tenant agency missions and space needs. In response to data GSA has collected from AAAP bids showing that GSA receives lower bids for longer firm-term leases, GSA has begun lengthening the firm term of its new leases. Specifically, GSA’s analysis of AAAP bids data showed that for lease offers in fiscal years 2017 and 2018, lessors bid a lower rent amount for a 10-year firm term as opposed to a 5-year term 96 percent of the time with an average savings of around 10 percent. GSA officials told us that they have been using more 10- and 15-year firm terms as opposed to the previous standard practice of five years. For example, according to GSA, in fiscal year 2014, 19 percent of GSA’s leased inventory had a firm term of 10 years or more, and in fiscal year 2017, this figure had risen to 26 percent. In addition, GSA has implemented a lease-term-setting tool, which officials said will help them lengthen the firm terms of leases where appropriate. About one-third of the stakeholders we spoke with identified janitorial and maintenance services as a challenge, and two lessors said that costs for janitorial and maintenance services can be difficult to estimate. For example, one lessor told us that it is difficult to estimate these costs two years into the future, let alone for the 10 or more years of a GSA lease, because of changes to local job market conditions and labor laws. In addition, stakeholders said that GSA leases require more frequent or comprehensive janitorial and maintenance services than do private sector leases. For example, lessors said that some cleaning and paint and carpet replacement intervals were more frequent than the industry standard. Four lessors told us that they include the additional costs for these services into the cost of their bids, and some lessors told us that they include up to 125 percent of their estimated true costs in their bids. According to GSA, it developed some of these requirements, particularly those related to specific cleaning products that lessors must use, in response to a combination of several laws, executive orders, and agency initiatives or recommendations. Some of the other requirements, such as the intervals for carpet and paint replacement, are GSA’s contracting policy, and officials told us that they have remained relatively static since the 1990’s. Lessor Perspective on GSA Leases “In one lease, we found that janitorial services for GSA cost approximately twice as much as normal cost for a non-GSA lease.” About one-third of the stakeholders we spoke with said that lessors— particularly lessors with multi-tenant buildings—are concerned about GSA’s ability to substitute one tenant agency for another, a requirement that can affect competition for leases. One concern cited was the possibility of substituting a law enforcement agency (e.g., ICE or FBI) that may have armed officers into a building previously occupied by an administrative tenant agency. Another was that increased traffic may result from substituting a busy public-facing agency (e.g., SSA or IRS) into a formerly quiet building environment. Stakeholders and other experts we spoke with said that scenarios like these can affect other tenants’ willingness to renew leases in a building; however, as we found in 2016, they also told us that GSA rarely exercises this option. Two stakeholders and another expert told us that lessors take specific actions in response to this requirement, including negotiating with GSA over modifying this clause, which one said they have been successful in doing. Federal regulation requires GSA to include this clause in leases with annual rents above the simplified acquisition threshold unless the lease contracting officer determines that it would not be appropriate. This regulation, however, stems from a general GSA statutory authority regarding federal property. GSA’s leasing regulations do not require GSA to use this requirement in leases with net annual rents under the simplified lease acquisition threshold, but GSA officials told us that as a matter of practice they also include it in these smaller leases. GSA officials told us that GSA, as the lessee, is ultimately responsible for a lease’s financial obligation, and the ability to substitute tenant agencies helps GSA mitigate the costs of vacant leased space in the event a tenant agency chooses to leave a leased property. Lessor Perspective on GSA Leases “The substitution of tenant requirement is especially an issue in multi- tenant buildings, and lenders can have trouble with it as well, but GSA almost never uses it. Our organization tries to get GSA to modify these clauses, and we are successful about 50 percent of the time, but this varies by GSA region.” About one-third of the stakeholders we spoke with said GSA’s requirements for real estate tax reimbursement may lead lessors to increase their bid prices to account for real estate tax uncertainty. GSA reimburses lessors for increases in real estate taxes above a base year— the first full year after GSA certifies the leased space as fit for occupancy. Lessors told us that since the date of occupancy is dependent on the completion of the design and construction process, the duration of which is difficult to estimate, when setting bids they have to estimate taxes without knowing the base year. Two lessors told us that when bidding on a lease they estimate on the high side to make sure they cover their costs, and another other lessor said that their organization might not bid on a GSA lease because of issues with the real estate tax requirements. GSA officials told us that they use these requirements because they allow GSA to establish the real estate tax base and the portion that GSA will reimburse. Officials also told us that lessors have told them that their current approach to tax adjustment places a risk on lessors that may ultimately get passed on to GSA in the form of higher rent, and at a May 2018 GSA industry event, lessors discussed difficulties with setting the base year. GSA officials told us that they are developing new requirements for lease construction that would allow for real estate taxes to be directly passed through by the lessor to GSA. Lessor Perspective on GSA Leases “The base year is often not clearly stated in the lease and is sometimes mentioned informally (e.g., in emails)…the lessor has no recourse to negotiate over the tax base year with GSA. It poses one of the biggest risks and has caused us to walk away from some bids after not being able to get a clear lease amendment specifying the tax base year.” The lessors and real estate brokers we spoke with also identified a number of general areas of GSA’s leasing process that they said can increase costs or reduce the number of bidders. These areas included the length of time it can take to finalize a GSA lease, GSA’s ability to occupy a space after lease expiration generally without penalty or the payment of damages beyond continuing rent payments—referred to as a “holdover”— and GSA’s propensity for entering into short-term extensions for current leases while negotiating new leases. About two-thirds of the lessors we spoke with mentioned frustration with the length of time it takes to finalize a GSA lease. Lessors told us that after GSA awards a lease, it can take more than a year of additional negotiations with the lessor, GSA, and the federal tenant agency to finalize the design requirements and construct the space. In 2016 we reported that the total length of GSA’s leasing process could be up to six to eight years. Because GSA does not generally begin to pay rent until after the space is fit for occupancy, lessors said that the length of time it takes to complete the lease award, design and construction processes can create financial stress on a lessor. For example, one lessor said that GSA’s overall leasing process was challenging, and the largest issue, rather than any particular requirement, was agreeing on the design after lease award. This length of time was because the tenant agency was slow to make decisions about the space design, and while GSA tried to coordinate by setting up weekly meetings about this design among GSA, the tenant agency and the lessor, there were also several layers of time- consuming GSA review. About one-third of the lessors we spoke with also identified challenges communicating with GSA and the tenant agency during the lease negotiation process, including challenges identifying points of contact and resolving disputes. Three lessors said that they or other lessors might not bid on additional GSA leases specifically because of the lengthy and complex process to finalize a lease. GSA officials told us that they rely on space requirements from the tenant agency and that the faster they receive those requirements, the faster the bid award can be completed and design process finalized. Lessor Perspective on GSA Leases “If it were up to me, I wouldn’t bid on any more GSA leases because they are too time intensive not only for management at our organization, but also for our accounting, engineering, construction and property management teams.” GSA officials told us that they have been using a number of initiatives to speed up their leasing process. For example, they said that in response to these time pressures they have begun requesting requirements as much as 48 months in advance of when a new lease will be needed. Officials from three of the five tenant agencies we spoke with told us that it can be difficult to estimate their space needs so far in advance because their missions and space needs can change. In addition, since 2015 GSA has been using the AAAP—in which potential lessors submit standing bids for vacant space that GSA then matches to requirements for new and continuing leases—in all of its national real estate markets. Four of the more experienced lessors we spoke with told us that they had noticed positive changes as a result of the AAAP. These changes included faster lease processing times and an overall simpler leasing process with less negotiating. One lessor told us that they only bid on new GSA leases that are part of this program. One-quarter of the lessors we spoke with identified drawbacks associated with GSA lease holdovers and short-term extensions, and at least three of the lessors we spoke with had experienced a holdover for one of their leases. Lessors said that the possibility of GSA’s holding over in a space or signing a short-term extension can affect their ability to finance a building and their time frame for finding a new tenant if GSA exits a property. Lessors also noted communications difficulties with GSA, for example some said that they had reached out to GSA to negotiate a lease well in advance of an incumbent lease’s going into holdover, but this action did not help them get a new lease on time. Lessors told us that they bid much higher rates for short-term extensions than they do for leases awarded through the normal process. In 2015 we reported that a significant number of GSA leases experience a holdover or short-term extension and that these can cause uncertainty for tenant agencies and lessors, increase GSA’s workload, and delay the completion of building maintenance and other tenant improvements. Lessor Perspective on GSA Leases “Holdovers and short-term extensions diminish lessors’ opinions of GSA.” Reducing holdovers and short-term extensions is one of the key tenets of GSA’s 2018–2023 Lease Cost Avoidance Plan. One method GSA uses to more quickly process leases for tenant agencies remaining in their current space is the superseding and/or succeeding lease. In 2018 GSA developed a revised tool to help its officials more quickly estimate whether GSA would likely achieve lower costs using a succeeding lease as opposed to performing a full and open competition for a new lease. Lease contracting officers can use this tool to identify leases that would be likely candidates for a succeeding or superseding lease earlier in the process. We analyzed the leases GSA entered into during fiscal years 2016 through 2018 and found about 29 percent of them were succeeding or superseding leases. GSA officials told us that they have tried to increase awareness of the new tool and appropriate use of succeeding and superseding leases through training programs. GSA began reform efforts in 2011 by conducting outreach, introducing new lease models, and adjusting some leasing provisions in response to stakeholder concerns. While GSA has continued its industry outreach, its more recent outreach efforts have not gathered information from a representative group of lessors. Further, GSA has not analyzed the information it does collect and therefore does not know if its reform efforts are adequately addressing stakeholder concerns. Also, GSA has not assessed whether one of its reform efforts—the simplified lease model— is achieving its intended benefits or how it could affect risk. Since fiscal year 2018, GSA has conducted informal industry outreach to certain lessors and other stakeholders about the leasing process. These efforts have included attending and making presentations at industry conferences, facilitating industry meetings with regional commissioners, and hosting feedback sessions. For example, in May 2019 GSA gave a presentation to a large industry organization on the current status of its efforts to reduce lease costs, and in May 2018 staff participated in a training event organized by GSA’s Office of Government-wide Policy where officials from industry shared their experiences with the leasing process. GSA officials told us that they gather information primarily from two industry groups, both of which have reached out to GSA, have a large number of members that are GSA lessors, and have a significant amount of knowledge of the GSA leasing process. GSA officials told us that they have used information mainly from these two groups to inform reform efforts, including creating net-of-utilities leases and longer firm-term leases. However, these two groups are focused primarily on organizations such as real estate brokers and investment trusts that are experts in the GSA leasing process. These organizations are not representative of GSA’s total population of lessors, which also includes many smaller organizations that have less experience with the GSA leasing process. By focusing its efforts on these larger groups, GSA is missing the perspective of smaller lessors, whose representatives may not attend industry meetings. These smaller lessors may have different types of concerns that GSA is not capturing. For example, in our sample of 20 lessors we identified areas where the perspectives of organizations with varying levels of experience with GSA leases differed. More than half of the less experienced organizations identified experiencing communication challenges with GSA and the tenant agency, while only two of the more experienced organizations identified this concern. Concerns about early termination clauses in GSA leases were cited by less than half of the less experienced organizations, but all of the more experienced organizations mentioned this clause as affecting their willingness to do business with GSA. Also, one of the brokers we spoke with said that smaller lessors tend to have different concerns about leasing requirements than larger lessors, but also have less ability to react to those concerns by, for example, raising their bid prices. In addition to limiting outreach to two groups that do not represent all types of GSA lessors, GSA has not maintained official records of the information it receives from these efforts. Further, it has not analyzed the information that it collects from lessors and other stakeholders for use in revising the leasing process. These omissions hinder GSA’s ability to identify the full range of lessor concerns. GSA’s recent approach to outreach differs from earlier approaches where GSA conducted more formal outreach to lessors. For example, in 2011 GSA performed formal outreach in order to inform decisions about significant changes to its leasing process. Officials told us that they selected a wide variety of lessors and held formal outreach sessions where GSA took minutes and maintained a record of all of the comments. GSA then analyzed the comments and used the results of its analysis to inform the initiatives it was conducting at that time, including the development of the simplified lease model. In addition, in 2017 GSA established the Office of Leasing Industry Outreach Program, which was a formal program to allow industry representatives to discuss various leasing issues with GSA officials through conference calls, webinars, and in-person sessions. GSA conducted nine monthly sessions with this program in 2017 and kept a formal record of only the first four sessions. Officials told us that they have since shifted their approach to conduct outreach more like that conducted by the Office of Government-wide Policy discussed above. Federal internal control standards call for agencies to communicate with, and obtain quality information from, external parties such as stakeholders that can help the agency achieve its objectives. While GSA has in the past collected and analyzed information from a wide variety of stakeholders to the leasing process, the real estate market is constantly changing. By obtaining current information from a broad spectrum of stakeholders and documenting and analyzing the information collected, GSA would be better positioned to know whether its lease reforms are addressing stakeholder concerns and how its lease requirements affect cost and competition. As previously noted, GSA developed its simplified lease model in 2011 to simplify the acquisition of smaller value leases with the intent of making the leasing process more efficient and cost-effective. GSA officials told us that using this model is also intended to help them achieve other lease reform goals including reducing holdovers and short-term extensions by speeding up the leasing process and making GSA leases more attractive to a wider spectrum of potential lessors. In addition, officials said that they believe greater use of the simplified lease model would increase competition for leases, particularly in real estate markets with high demand for office space. Since initial implementation, GSA has undertaken initiatives to increase the use of this model, including by raising the eligibility threshold from $150,000 to $250,000, and GSA officials told us that they have proposed raising the threshold to $500,000, a move that would cover more than 70 percent of GSA’s leases. However, GSA has not performed any analysis on the number of leases that were eligible for, but did not use, this model. Using available data, we analyzed the leases GSA entered into during fiscal years 2016 through 2018 that were potentially eligible for the simplified lease model and compared those that used the model to those that used GSA’s global and standard lease models. We found that the group of leases where GSA had used the simplified lease model had achieved lower rents both overall and per square foot than the group of potentially eligible leases where GSA had used its standard or global models (see table 2). These leases had lower average costs even though they had shorter average total terms and firm terms. This finding is notable because, according to GSA, longer leases typically have lower costs than shorter ones. However, our analysis of available data also found that GSA only used the simplified lease model on 124 of the 406 leases that were potentially eligible, or about 31 percent (see table 2). GSA officials told us that they face two primary challenges in increasing adoption of the simplified lease model. First, lease contracting officers must choose to use the simplified model as opposed to GSA’s standard lease model. While GSA’s leasing policy states that lease contracting officers should use the simplified lease model to the maximum practical extent, the lease contracting officers generally have wide discretion in selecting the type of lease to use for a particular acquisition. GSA officials told us that they believe some lease contracting officers may be hesitant to use the model because it is less familiar to them. GSA officials also told us that they have provided training for lease contracting officers on the appropriate use of the simplified lease model and have encouraged them to use it. Second, in order for GSA to use the simplified lease model, tenant agencies must provide a complete set of space requirements that GSA can use in a lease solicitation—what GSA calls biddable requirements— prior to GSA’s advertising the lease. According to GSA officials, tenant agencies do not always provide these requirements on time. By having biddable requirements in place before receiving bids, GSA can avoid negotiating these requirements after the lease is awarded. GSA officials and lessors told us that not having these requirements in place is a major source of project delays. GSA tracks both when it receives initial requirements from the tenant agencies and when the more fully developed requirements that GSA uses in its standard lease model solicitations are in place. In order to use the simplified lease model, GSA and the tenant agency then develop biddable requirements that need additional detail. An Example of challenges agencies face in providing lease requirements to the General Services Administration (GSA): Officials from three of the five tenant agencies we spoke with told us that it can be difficult for them to provide GSA with requirements two or more years in advance because agency missions and space needs change. For example, Internal Revenue Service officials told us that providing requirements 36 months in advance of a lease’s expiring is difficult for them because they may not know what their agency budget and personnel will be that far in advance. Officials from the Federal Bureau of Investigation said that lead times greater than three years are challenging because their agency missions change frequently, which leads to changing space needs. GSA has taken some steps to increase use of the simplified lease model. For example, several GSA regions have begun to work with SSA on a pilot program to reduce the time it takes for GSA to complete leases with that agency, including by increasing the availability of the simplified lease model. This program is in the early stages and, according to the charter, developed in August 2019, its objectives are to reduce the total time it takes to complete leases, increase up-front knowledge of project costs, and minimize the number of changes needed to leases all while maintaining or reducing the average costs for these projects. GSA and SSA plan to accomplish these objectives by identifying the areas of the leasing process most prone to delays, developing strategies for more quickly finalizing the complete requirements needed to use the simplified lease model, and testing the improvements in both large and small real estate markets. GSA plans to begin testing the changes developed by this program during the first half of 2020. SSA officials told us that they typically begin planning approximately 42 months prior to lease expiration with the goal of providing initial requirements to GSA by 36 months prior. GSA lacks comprehensive information on the benefits and challenges of using the simplified lease model because it has not evaluated the results it has obtained from using it. For example, officials told us that they have not analyzed the lease processing times or rental rates they have achieved using the model. Officials also said that they already collect the data they would need to study the model and they have used this data to analyze related issues such as lease holdovers and short-term extensions. Officials also told us that they do not consider use of the simplified lease model to pose any financial risks provided that lease contracting officers follow GSA’s existing policies. However, they told us that GSA has not reviewed financial and other risks that may arise from using the model. These factors include risks due to the model’s not containing certain provisions that may protect GSA, such as tenant substitution. We have reported that agencies can use information about the performance of programs to identify problems or weaknesses, to try to identify factors causing the problems, and to modify programs to address them. Program assessment helps to establish a program’s effectiveness. Without conducting such an assessment, GSA does not have the information needed to determine whether the simplified lease model is achieving intended results, whether to make improvements, or how to mitigate any risks. The federal government spends nearly $6 billion annually on leasing space from private entities, and GSA has taken steps to encourage private sector competition for government leases. GSA’s efforts to address stakeholder concerns with lease requirements have had some success. Specifically, GSA’s 2011 formal stakeholder outreach and subsequent development of new lease models and other process changes have given GSA some options to reduce leases’ complexity and better tailor leases to the needs of individual projects. However, because GSA’s recent outreach has not included a representative group of its lessors, and it has not documented and analyzed the information collected from this outreach, GSA may not have the information it needs to fully address lessors’ concerns. Further, the simplified lease model—which GSA developed to address some of these stakeholder concerns and more effectively use its resources—has been in use for several years. Given that GSA has proposed further expanding the use of the model to higher value leases, it is important to know the results GSA has obtained from using the model, such as the characteristics of leases for which it achieves the greatest savings in costs and time, and the extent to which it bears financial or other risks from its use. Such information would help inform GSA’s future decision-making on the use of the simplified lease model. We are making the following three recommendations to GSA: The Administrator of the General Services Administration should expand its outreach as appropriate to obtain feedback from lessors that are representative of its entire lease portfolio. (Recommendation 1) The Administrator of the General Services Administration should, for future outreach efforts, document and assess lessors’ feedback about the leasing process. (Recommendation 2) The Administrator of the General Services Administration should evaluate whether the simplified lease model is achieving its intended results. (Recommendation 3) We provided a draft of this report for review to the General Services Administration, the Social Security Administration, and the Departments of Homeland Security, the Interior, Justice, and the Treasury. The General Services Administration concurred with our recommendations in its written comments, which are reproduced in appendix II. The General Services Administration and the Department of the Interior provided technical comments, which we incorporated as appropriate. The Departments of Homeland Security, Justice, and the Treasury, and the Social Security Administration had no comments on the draft report. As agreed with your offices, unless you publically announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees; the Administrator of the General Services Administration; the Secretaries of the Departments of Homeland Security, the Interior, and the Treasury; the Commissioner of the Social Security Administration; the Attorney General; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) lease requirements selected stakeholders identified as affecting cost and competition and steps GSA has taken to address their concerns, and (2) how GSA has identified stakeholder concerns and evaluated its simplified lease model. To obtain information for both objectives, we reviewed laws, regulations, and executive orders covering GSA leases and GSA’s leasing process. We also obtained data from GSA on each of the 1,618 leases it entered into between the beginning of fiscal year 2016 and the end of fiscal year 2018, the most recent data available. This data included fields for the current annual rent, the size of the lease in rentable square feet, the lease model GSA used, the facility security level, the occupying agency, and the lease’s effective and expiration dates, among others. We assessed the reliability of this data by reviewing documentation; interviewing GSA officials; electronically testing the data by, for example, examining missing values and outliers; and verifying the accuracy of potentially erroneous data with GSA officials. We concluded that the data were reliable for the purposes of selecting a sample of GSA lessors and reporting on GSA’s portfolio of leases and the general characteristics of the groups of leases that used different lease models. In addition, to address both objectives, we collected information from and interviewed a non-generalizable sample of 20 GSA lessors to obtain their perspectives on GSA leases and GSA’s leasing process. To select these lessors, we used the fiscal year 2016–2018 lease data that GSA provided and selected leases using the annual rent amount as the primary selection criteria. We excluded leases that used models designed for specific lease products, such as leases for parking structures or leases on airport properties, and we also excluded leases that were successions or supersessions of leases that had already been established under different models. To make the selections, we first split the data into three groups based on annual rent, the first group of leases with annual rents under $150,000; the second group with annual rents between $150,000 and below $500,000; and the last group with annual rents above $500,000. We then randomly ordered the leases within each of the three groups, and selected 53 total leases in that order from the three groups. We checked this grouping to ensure that the selected leases had similar characteristics to GSA’s general population in other important lease characteristics such as lease model used and GSA region. We then randomly ordered the selected leases and contacted the lessors for those leases in that order. We interviewed the first 20 lessors from our selected leases who agreed to be interviewed. When contacting the lessors we found that in most cases the lessor named in GSA’s data was a subsidiary to another organization. In those cases, we interviewed the organization that self- identified as being responsible for the selected lease, or their representative. We conducted these interviews between March 2019 and June 2019 and used a semi-structured interview format with open-ended questions for those interviews. During these interviews, we asked for lessors views on the requirements in GSA’s leases that can affect their willingness to bid on GSA leases and the prices they can offer, actions they take in response to those requirements, other areas of GSA’s leasing process that can be difficult for them, the benefits to leasing to GSA, and their perspectives on GSA’s recent lease reform efforts. To obtain a broader perspective on GSA’s leasing process, we also conducted semi-structured interviews on the same topics with six real estate brokers who are participating in the GSA Leasing Support Services contract. We asked the brokers to provide their experiences on which areas of GSA leases result in the greatest number of cost and competition issues from lessors, and what the lessors do about those areas. We also interviewed four other experts on GSA leasing including professional organizations and attorneys who represent building owners, and former GSA officials. Although the results of these stakeholder interviews are not generalizable to the entire population of GSA lessors, they provide illustrative examples of lessors’ experiences with GSA leases and the leasing process. After conducting these semi-structured interviews with lessors and brokers, we conducted a content analysis of the interview data. To conduct this analysis, we organized the responses by topic area, and then one GAO analyst reviewed all of the interview responses and identified recurring themes. Using the identified themes, the analyst then developed categories for coding the interview responses and independently coded the responses for each question. To ensure accuracy, a second GAO analyst reviewed the first analyst’s coding of the interview responses, and then the two analysts reconciled any discrepancies. To identify the lease requirements that stakeholders we spoke with identified as affecting cost and competition, we synthesized information from our content analysis of interview responses to identify the most commonly mentioned requirements. We selected the eight most commonly mentioned requirements by summing the total number of responses from both the lessors and the brokers. As part of this analysis we also selected the four areas stakeholders most often mentioned as challenges that were related to GSA’s leasing process, as opposed to a specific requirement, but that stakeholders nonetheless identified as having effects on cost and competition. To assess how the responses from lessors may have differed based on how much experience a lessor has with GSA, we grouped the lessors we spoke with into two categories. The first category was those lessors who had told us that they had experience with three or more GSA leases, we referred to these lessors as “more experienced,” and the second category was those lessors who had experience with one or two GSA leases, we referred to those lessors as “less experienced.” To identify the source of the GSA requirements stakeholders identified, we reviewed GSA documents and interviewed officials to learn about each of the requirements. In addition, we reviewed laws, regulations and executive orders that governed GSA’s use of these requirements. To determine how GSA and tenant agencies develop requirements for leased space—one of the requirements stakeholders identified—we selected five bureau-level and independent agencies to review how they develop initial requirements for leased space and how they work with GSA and the lessor to finalize those requirements. We selected these agencies by the number of GSA leases they had entered into during fiscal years 2016-2018, using the lease data for that time period provided by GSA. We selected the agencies that had entered into the greatest number of leases, and in order to ensure that we had a diversity of experiences from across the federal government, and we limited our selection to executive branch independent agencies and one-bureau-level entity from each cabinet department. Based on these factors, we selected (1) Department of the Interior Fish and Wildlife Service (FWS); (2) Department of the Treasury Internal Revenue Service (IRS); (3) Department of Justice Federal Bureau of Investigation (FBI); (4) Social Security Administration (SSA); and (5) Department of Homeland Security Immigration and Customs Enforcement (ICE). While the views of these agencies are not representative of all executive branch agencies, they provide a range of examples and experiences with leasing space through GSA. We reviewed documents and interviewed officials from each of these five agencies to learn about how they develop requirements for leased space, how they work with GSA to identify feasible properties, how they participate in the development of the final space design and construction, and how they plan for their future leased space needs. To identify the steps GSA has taken to identify stakeholder concerns and evaluate its simplified lease model, we reviewed pertinent GSA documents and interviewed GSA officials on recent lease reform efforts, including how GSA has defined them, what information GSA used to develop them, how GSA has implemented them, and how GSA has assessed their performance. In addition, we obtained information from our interviews with lessors and real estate brokers about their impressions of GSA’s lease reform efforts, including whether they were aware of the efforts, and what effects they had observed. We compared GSA’s efforts to identify and address stakeholder concerns to Federal Standards for Internal Control related to external communication. To identify how often GSA has used its simplified lease model and the characteristics of the leases for which GSA used the model, we used the GSA fiscal year 2016–2018 lease data described previously. We analyzed the data to obtain information about the number of leases that had used each of GSA’s lease models, and the average rent amounts, size, and terms. Even though the facility security level is an additional eligibility requirement for the model, we could not include it in this analysis because GSA does not have security level information for many of the leases in this dataset. However, we determined that omitting this data field did not substantially change the results of this analysis because only a small number of leases with costs below $150,000 also had a facility security level of III or above. We were not able to assess the extent to which the lower rental costs might be attributable to the use of the simplified lease model because there are other factors that that contribute to its use that are not included in GSA’s data. For example, in order for GSA to use the simplified lease model, tenant agencies must provide fully developments prior to GSA advertising the lease. The data do not include the date GSA received these requirements. We compared GSA’s efforts to evaluate its simplified lease model to criteria from our prior work on the use of performance information for decision-making. We conducted this performance audit from October 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Amelia Bates Shachoy, Assistant Director; Alex Fedell, Analyst-in-Charge; James Duke; Cynthia Grant; Geoffrey Hamilton; Gina Hoover; Terence Lam; Malika Rice; Kelly Rubin; Jim Russell; Patrick Tierney; and Amelia Michelle Weathers made key contributions to this report.", "summary": "As the federal government's landlord, GSA works with lessors and real estate brokers to identify space for other federal agencies to use. As part of this process, GSA uses leases that include requirements not commonly used in the private sector. These requirements and GSA's lengthy and complex leasing process can affect federal leasing costs and competition for leases. GAO was asked to review issues related to cost and competition for GSA leases with private sector lessors. This report examines: (1) lease requirements selected stakeholders identified as affecting cost and competition and steps GSA has taken to address stakeholders' concerns, and (2) how GSA has identified stakeholders' concerns and evaluated its simplified lease model. GAO reviewed pertinent federal statutes and regulations and GSA's contracting policy and leasing data from fiscal years 2016–2018. GAO conducted interviews with 20 GSA lessors selected from GSA's data to represent a range of location, and cost of the leases and the six real estate brokers that work with GSA. Stakeholders, including 20 lessors (e.g., building owners) and the six real-estate brokers that negotiate federal government leases, identified several aspects of the General Services Administration's (GSA) leases that can affect cost and competition. For example, specific lease requirements such as early termination (see table) can lead lessors to increase their rent rates or decide not to bid on a lease—thereby increasing federal leasing costs or decreasing competition. According to GSA officials, many of these lease aspects reflect contracting policy rather than being required by law, regulation, or executive order. GSA has made some changes, such as lengthening the term of some leases, to address stakeholder concerns. Stakeholders also identified the time it takes to complete a lease and GSA's propensity for staying in a space beyond the term of a lease as increasing costs and making GSA leases less attractive to potential bidders. Source: GAO analysis of stakeholder information. | GAO-20-181 GSA has undertaken initiatives to identify stakeholders' concerns to inform its reform efforts, but it lacks complete information to address concerns or evaluate its efforts. Specifically, GSA has not gathered information from a representative group of lessors because its recent outreach has involved two industry groups that focus primarily on organizations such as real estate brokers and investment trusts that are experts in GSA leasing. These organizations may not have the same concerns as smaller, less experienced, organizations. By obtaining information from a broad spectrum of stakeholders, GSA would be better positioned to know whether its leasing reforms are addressing stakeholders' concerns. Additionally, to expedite processing of lower-value leases, GSA developed a simplified lease model that excludes some requirements that stakeholders identified as challenging but may protect GSA, such as tenant substitution. GAO found that for fiscal years 2016 to 2018, GSA used the model for only about one-third of potentially eligible leases. GSA has proposed increasing use of the model, but it does not know whether the model as currently used is achieving the anticipated benefits, including reduced lease processing times, or the impact of financial or other risks from this model because GSA has not evaluated its use. Without such an assessment, GSA does not have the information needed to determine whether the simplified lease model is achieving its intended results, whether to make improvements, or how to mitigate any risks. GAO is making three recommendations, including that GSA: (1) expand its outreach as appropriate to obtain feedback from lessors that are representative of its entire lease portfolio, and (2) evaluate whether the simplified lease model is achieving its intended results. GSA agreed with the recommendations and said it believes there are additional opportunities to expand its outreach efforts and evaluate the simplified lease model.", "document_type": "gao"}
{"report": "The NASA Authorization Act of 2010 directed NASA to develop a SLS, to continue development of a crew vehicle, and to prepare infrastructure at Kennedy Space Center to enable processing and launch of the launch system. To fulfill this direction, NASA formally established the SLS launch vehicle program in 2011. Then, in 2012, NASA aligned the requirements for the Orion program with those of the newly created SLS vehicle and the associated ground systems programs. The Exploration Systems Development (ESD) organization reports to NASA’s Associate Administrator for Human Exploration and Operations Mission Directorate and is responsible for managing and integrating the human space exploration programs. Figure 1 provides details about each SLS hardware element and its source as well as identifies the major portions of the Orion spacecraft. NASA established the EGS program to modernize the Kennedy Space Center to prepare for integrating hardware, as well as processing and launching SLS and Orion, and recovery of the Orion crew capsule. The EGS program consists of a number of components and processing centers including the Vehicle Assembly Building, Mobile Launcher, and Crawler-Transporter. The Mobile Launcher consists of (1) a two-story base that is the platform for the rocket and (2) a tower equipped with a number of connection lines, called umbilicals, and launch accessories that will provide SLS and Orion with power, communications, coolant, fuel, and stabilization prior to launch. During preparations for launch, the Crawler-Transporter will pick up and move the Mobile Launcher into the Vehicle Assembly Building. Inside the Vehicle Assembly Building, NASA will stack the SLS and Orion vehicle on the Mobile Launcher and complete integration for launch. Before launch, the Crawler-Transporter will carry the Mobile Launcher with SLS and Orion to the launch pad where engineers will lower the Mobile Launcher on to the pad and remove the Crawler-Transporter. During launch, each umbilical and launch accessory will release from its connection point, allowing the rocket and spacecraft to lift off from the launch pad. Figure 2 is a picture of the Mobile Launcher positioned on top of the Crawler-Transporter outside of the Vehicle Assembly Building. During Exploration Mission 1 (EM-1), the SLS vehicle is to launch an uncrewed Orion to a distant orbit some 70,000 kilometers beyond the Moon. All three programs—SLS, Orion, and EGS—must be ready on or before the EM-1 launch readiness date to support this integrated test flight. Exploration Mission 2 (EM-2) will be a 10- to 14-day crewed flight with up to four astronauts that will orbit the moon and return to Earth to demonstrate the baseline Orion vehicle capability. NASA establishes an agency baseline commitment—the cost and schedule baselines against which the program may be measured—for all projects that have a total life cycle cost of $250 million or more. A rebaseline is a process initiated if the NASA Administrator determines the development cost growth is more than 30 percent of the estimate provided in the baseline of the report, or if other events make a rebaseline appropriate. A replan is a process generally driven by changes in program or project cost parameters, such as if development cost growth is 15 percent or more of the estimate in the baseline report or a major milestone is delayed by 6 months or more from the baseline date. A replan does not require a new project baseline to be established. When the NASA Administrator determines that development cost growth is likely to exceed the development cost estimate by 15 percent or more, or a program milestone is likely to be delayed from the baseline’s date by 6 months or more, NASA must submit a report to the Committee on Science, Space, and Technology of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate. Should a program exceed its development cost baseline by more than 30 percent, the program must be reauthorized by the Congress and rebaselined in order for the contractor to continue work beyond a specified time frame. NASA tied the SLS and EGS program cost and schedule baselines to the uncrewed EM-1 mission and the Orion program’s cost and schedule baselines to EM-2. Over the past 5 years, we have issued several reports assessing the progress of NASA’s human space exploration programs relative to their agency baseline commitments. In April 2017, we found that given the combined effects of ongoing technical challenges in conjunction with limited cost and schedule reserves, it was unlikely that these programs would achieve the committed November 2018 launch readiness date. We recommended that NASA confirm whether this launch readiness date was achievable and, if warranted, propose a new, more realistic EM-1 date and report to Congress on the results of its schedule analysis. NASA agreed with both recommendations and stated that it was no longer in its best interest to pursue the November 2018 launch readiness date. Subsequently, NASA approved a new EM-1 schedule of December 2019, with 6 months of schedule reserve available to extend the date to June 2020, and revised costs (see table 1). Because NASA delayed the EM-1 schedule by up to 19 months, the SLS and EGS programs—that are both baselined to EM-1—reported a replan to the Congress. The EGS program also reported its development costs increased by about 23 percent over the baseline. At the same time, NASA reported that the SLS program development costs would only increase by about 2 percent. Under the Federal Acquisition Regulation (FAR), a variety of contract types are available including those that incentivize a contractor in areas that may include performance, cost, or delivery. The type of contract used for any given acquisition inherently determines how risk is allocated between the government and the contractor. According to the FAR, since the contract type and the contract price are interrelated, the government must consider them together. The government can choose a contract type and negotiate price (or estimated cost and fee) that will result in reasonable contractor risk and provide the contractor with the greatest incentive for efficient and economical performance. For example, under firm-fixed-price contracts, the contractor assumes full responsibility for performance costs. Under cost-reimbursement contracts, the government provides for the payment of allowable incurred costs, to the extent prescribed in the contract. The government uses cost-reimbursement contracts when, for example, there are uncertainties involved in contract performance. Incentive contracts can be either fixed-price or cost-reimbursement type contracts. The contractor’s responsibility for the performance costs and the profit or fee incentives in incentive contracts are tailored to the uncertainties involved in contract performance. Incentive contracts— including award fee and predetermined, formula-type incentive fee contracts—are designed to attain specific acquisition objectives by, in part, including appropriate incentive arrangements that (1) motivate contractor efforts that might not otherwise be emphasized, and (2) discourage contractor inefficiency and waste. Award fees generally emphasize multiple aspects of contractor performance in areas that the government assesses more subjectively. In contrast, predetermined formula-type incentives are generally associated with a cost incentive, but can also emphasize performance in areas that the government assesses more objectively. The FAR indicates that award fee contracts are suitable when it is neither feasible nor effective to devise predetermined objective incentive targets, the likelihood of meeting acquisition objectives will be enhanced by using a contract that provides the government with the flexibility to evaluate both actual performance and the conditions under which it was achieved, and the administrative effort and cost are justified. Table 2 provides an overview of cost-plus-incentive-fee and cost-plus- award-fee contracts because these are the type used in the Orion and SLS programs. Multiple-incentive contracts contain more than one incentive. For example, these contracts may include both subjective award fee criteria and predetermined, formula-type incentives. Agencies can use incentive contracts to promote certain acquisition outcomes, such as keeping costs low, delivering a product on time, and achieving technical performance of the product. NASA awarded incentive contracts to both Boeing and Lockheed Martin—a cost-plus-incentive-fee/award-fee contract to Boeing for the SLS stages effort and a cost-plus-award-fee contract to Lockheed Martin for the Orion crew spacecraft effort. For the SLS stages incentive contract with Boeing, the contract includes both incentive and award fees, broken into these three components: Milestone-incentive fees. These fees are paid for successful completion of each program milestone event. Cost-incentive fees. These fees are initially negotiated and later adjusted by a formula and are paid based on the relationship of total allowable costs to total target costs. Award fees. These fees are determined through subjective evaluations relative to factors in the contract’s award fee plan. For the Orion crew spacecraft incentive contract with Lockheed Martin, the contract includes fee broken into three components. The government typically uses award fees when it is not feasible or effective to use predetermined objective criteria. Therefore, as noted above, award fees are typically determined against subjective criteria. However, this contract includes award fee with both subjective and objective criteria: Milestone award fees. These fees are paid for completing critical criteria and dates associated with each milestone. Performance incentive fee. These fees are paid for completing criteria and dates associated with each performance incentive. Period of performance award fee. These fees are determined through subjective evaluations relative to factors in the contract’s award fee plan. For purposes of discussion within this report, we group each of the fees for each contract into one of four categories—milestone fee, performance incentive fee, cost incentive fee, and award fee. When award fees are used that require a subjective assessment by the government, NASA generally defines award fee periods of at least 6 months for the duration of the contract and establishes performance evaluation boards to assess the contractor’s performance relative to the performance evaluation plan. For the contracts we reviewed, NASA evaluates contractor performance based on weighted evaluation factors to determine the award fee. Table 3 includes a description of the evaluation factors and the weighted percentages for each factor assigned to the SLS stages and Orion crew vehicle contracts. When developing a contractor’s evaluation for a period of performance, the members of the performance evaluation boards for each contract use descriptive ratings in their evaluations. Performance monitors for different areas within the programs compile a list of the contractor’s strengths and weaknesses relative to specific criteria and defined activities for each of the evaluation factors. The performance monitors then consider other factors, such as government-directed changes and obstacles that arose that may have affected the contractor’s performance, and prepare performance reports. Members of the performance evaluation boards consider the performance monitor’s reports and assign the scores and descriptive ratings for the specific evaluation period. Table 4 below outlines award fee adjectival ratings, award fee pool available to be earned, and descriptions of the award fee adjectival ratings from the Federal Acquisition Regulation. In November 2018—within 1 year of announcing a delay for the first mission—senior NASA officials acknowledged that the revised EM-1 launch date of December 2019 is unachievable and the June 2020 launch date (which takes into account schedule reserves) is unlikely. These officials estimate that there are 6 to 12 months of schedule risk associated with this later date, which means the first launch may occur as late as June 2021 if all risks are realized. This would be a 31-month delay from the schedule originally established in the programs’ baselines. Officials attribute the additional schedule delay to continued production challenges with the SLS core stage and the Orion crew and service modules. NASA officials also stated that the 6 to 12 months of risk to the launch date accounts for the possibilities that SLS and Orion testing and final cross-program integration and testing at Kennedy Space Center may result in further delays. These 6 to 12 months of schedule risk do not include the effects, if any, of the federal government shutdown that occurred in December 2018 and January 2019. In addition, NASA’s reporting of cost data for the SLS and Orion programs is not fully transparent. NASA’s estimates for the SLS program indicate 14.7 percent cost growth as of fourth quarter fiscal year 2018, but our analysis shows that number increases to 29.0 percent when accounting for costs that NASA shifted to future missions. Further, in summer 2018, NASA reported a 5.6 percent cost growth for the Orion program. However, this reported cost growth is associated with a program target launch date that is 7 months earlier than its agency baseline commitment launch date. If the Orion program executes to the launch date established in its agency baseline commitment, costs will increase further. The SLS program will not meet the June 2020 launch date for the first mission due, in part, to ongoing development issues with the core stage. For this mission, the SLS launch vehicle includes solid rocket boosters, an upper stage, and a core stage—which includes four main engines and the software necessary to command and control the vehicle. As of fall 2018, the program reported that the boosters, engines, and upper stage all had schedule reserves—time allocated to specific activities to address delays or unforeseen risks— to support a June 2020 launch. The core stage, however, did not have schedule reserves remaining as the program continues to work through development issues. According to the SLS program schedule, core stage development culminates with “green run” testing. For this test, NASA will fuel the completed core stage with liquid hydrogen and liquid oxygen and fire the integrated four main engines for about 500 seconds. The green run test carries risks because it is the first time that several things are being done beyond just this initial fueling. For example, it is also the first time NASA will fire the four main engines together, test the integrated engine and core stage auxiliary power units in flight-like conditions, and use the SLS software in an integrated flight vehicle. In addition, NASA will conduct the test on the EM-1 flight vehicle hardware, which means the program would have to repair any damage from the test before flight. The program has no schedule margin between the end of core stage production and the start of the green run test, and is tracking risks that may delay the test schedule. For example, as the NASA Office of Inspector General (OIG) found in its October 2018 report, the Stage Controller—the core stage’s command and control hardware and software needed to conduct the green run test—is 18 months behind schedule and may slip further. Any additional delays with the development of the core stage and stage controller will further delay the start of the green run test. In addition, the SLS program has no schedule margin between the green run test and delivery of the core stage to Kennedy Space Center for integration to address any issues that may arise during testing. In November 2018, senior NASA officials stated that they have accounted for the potential of continued core stage development delays—along with risks to the Orion and EGS programs—and stated that there are an additional 6 to 12 months of risk to the EM-1 launch date. We found that a delay of this length would push the launch date for EM-1 out as far as June 2021 should all of the risks be realized. This would represent a 31- month delay from the original schedule baseline. Further, these 6 to 12 months of schedule risk do not include the effects, if any, of the federal government shutdown that occurred in December 2018 and January 2019. Figure 3 below compares schedules of key events for the core stage shortly after NASA established the program baseline in August 2014, the December 2017 replan, and the program’s schedule as of November 2018. Officials from the SLS program and Boeing, the contractor responsible for building the core stage, indicated that an issue driving core stage delays was underestimation of the complexity of manufacturing and assembling the core stage engine section—where the four RS-25 engines are mated to the core stage—and those activities have taken far longer than expected. For example, around the time of the December 2017 replan, the SLS program schedule indicated that it would take 4 months to complete the remaining work. By late 2018, the estimate for the same work had increased to 11 months. Part of that delay included time required to resolve residue and debris discovered in the fuel lines, which was present because Boeing had not verified the processes that its vendors were using to clean the fuel lines. Further, installation of the fuel lines overlapped with other work in the engine section, making work in the limited space more difficult and complex than it otherwise would have been. NASA officials indicated that there have been additional issues behind core stage delays, including the following: Boeing underestimated the staffing levels required to build the core stage in the time available. According to a NASA official, as core stage production began, Boeing was focused on minimizing the number of technicians, in part to keep costs low, and hired about 100 technicians. The official stated that Boeing now has about 250 technicians on staff in order to address ongoing delays, however, because a number of the additional staff came from non-spaceflight projects, some time was lost getting those staff up to speed on SLS. In addition, the official noted that technicians were spending time performing work away from the vehicle, such as collecting tools and parts for the work they were completing. According to the official, Boeing has since hired additional support staff to perform off-vehicle tasks such as pre-packaging tools in order to allow technicians to spend their time working on the vehicle. The build plans for the core stage were not adequately mature when the contractor began work on the hardware itself, which led to additional delays. For example, according to NASA officials, they expected the work instructions—detailed directions on how the vehicle should be built—to be largely complete by the program’s critical design review, which precedes the production decision. In this case, however, the build plans were not complete by the start of production. Officials stated that the lack of build plans slowed progress, as technicians can only perform work that they have instructions to carry out. In addition, the time to perform some work activities needed to build the designed vehicle was not included in the schedule. For example, more than 900 engine section brackets that were in the design were not on the schedule and, according to NASA officials, Boeing had to install the brackets later, adding complexity to the work schedule. Boeing officials provided three additional perspectives regarding the delays. Boeing officials explained that they did not anticipate any changes from NASA for the loads—impacts and stresses of mass, pressure, temperature, and vibration that the vehicle will experience—following the program’s critical design review, but instead NASA provided three significant updates to those loads. In some cases, the changes were significant enough that they invalidated legacy systems Boeing had planned to use, which required rework. However, SLS program officials stated that they continued to update loads data as the environments anticipated during launch became clearer. Boeing officials also stated that they alerted NASA in September 2014 that a decision to decrease funding in fiscal year 2015 would require the contractor to delay the core stage delivery date. In October 2018, however, the NASA OIG reported that while Boeing anticipated receiving $150 million less than planned in fiscal year 2015, the company received only $53 million less; that a funding increase was received in fiscal year 2016; and that the value of Boeing’s contract increased by nearly $1 billion in May 2016. Finally, Boeing officials stated that it has been challenging to execute NASA’s development approach that called for the first set of hardware built to be used for the initial launch. Boeing officials stated that they are more used to an approach in which they use the first hardware built to qualify the design and that hardware is never flown. The challenge with the current approach, according to Boeing officials, is that all the learning associated with a first build is occurring on the flight unit, which requires extra scrutiny and slows down the process. SLS program officials stated that this approach has been part of the development plan since the initial contract with Boeing was signed. One area in which the program has benefited from the core stage delay is that development of SLS test and flight software, which has been a schedule concern for the program, now has additional time to complete development. Delays to date have been due to late hardware model deliveries and requirements changes according to program officials. The SLS program completed the qualification test—a verification that the software meets documented requirements—for the green run software in March 2018. Program officials stated that the verified test software release will be complete by April 2019, and the EM-1 flight software release will be complete by October 2019. The earlier they are able to complete the software before launch, the more time they will have to complete testing, fix any defects they find, and work with EGS to integrate with the ground software. Measuring to a June 2020 launch date, flight software development has about 6 months of additional time to address issues should they arise. However, the program has a number of test cycles remaining and the program continues to assess a risk regarding the potential impact that late requirements changes could have on software completion. The SLS program has been underreporting its development cost growth since the December 2017 replan because of a decision to shift some costs to future missions while not adjusting the baseline downward to reflect this shift. The SLS development cost baseline established in August 2014 for EM-1 includes cost estimates for the main vehicle elements—stages, liquid engines, boosters—and other areas. According to program officials, because of the December 2017 replan process, NASA decided that costs included as part of the SLS EM-1 baseline cost estimate would be more appropriately accounted for as costs for future flights. Thus, NASA decided not to include those costs, approximately $782 million, as part of the revised SLS EM-1 cost estimate. However, NASA did not lower the $7 billion SLS development cost baseline to account for this significant change in assumptions and shifting of costs to future flights, and NASA officials told us that they were not sure what the benefit to NASA would be in adjusting the baseline. This decision presents challenges in accurately reporting SLS cost growth over time. NASA’s decision not to adjust the cost baseline downward to reflect the reduced mission scope obscures cost growth for EM-1. NASA’s cost estimate as of fourth quarter fiscal year 2018 for the SLS program indicated development cost growth had increased by $1 billion, or 14.7 percent. However, our analysis shows that development cost growth actually increased by $1.8 billion or 29.0 percent, when the development baseline is lowered to account for the reduced mission scope. Essentially, NASA is holding the baseline costs steady, while reducing the scope of work included in current cost estimates (see figure 4). NASA’s current approach for reporting cost growth misrepresents the cost performance of the program and thus undermines the usefulness of a baseline as an oversight tool. NASA’s space flight program and project management requirements state that the agency baseline commitment for a program is the basis for the agency’s commitment to the Office of Management and Budget (OMB) and the Congress based on program requirements, cost, schedule, technical content, and an agreed-to joint cost and schedule confidence level. Removing effort that amounts to more than a tenth of a program’s development cost baseline is a change in the commitment to OMB and the Congress and results in a baseline that does not reflect actual effort. Further, the baseline is a key tool against which to measure the cost and schedule performance of a program. A program must be rebaselined and reauthorized by the Congress if the Administrator determines that development costs will increase by more than 30 percent. Accounting for shifted costs, our analysis indicates that NASA has reached 29.0 percent development cost growth for the SLS program. In addition, as we previously reported in May 2014, NASA does not have a cost and schedule baseline for SLS beyond the first flight. As a result, NASA cannot monitor or track costs shifted beyond EM-1 against a baseline. We recommended that NASA establish cost and schedule baselines that address the life cycle of each SLS increment, as well as for any evolved Orion or ground systems capability. NASA partially concurred with the recommendation, but has not taken any action to date. By not adjusting the SLS baseline to account for the reduced scope, NASA will continue to report costs against an inflated baseline, hence underreporting the extent of cost growth. NASA’s Associate Administrator and Chief Financial Officer stated that they understood our rationale for removing these costs from the EM-1 baseline and agreed that not doing so could result in underreporting of cost growth. Further, the Associate Administrator told us that the agency will be relooking at the SLS program’s schedule, baseline, and calculation of cost growth. The Orion program is not on schedule to meet the June 2020 launch date for the first mission due to delays with the European Service Module and ongoing component issues with the avionics systems for the crew module, including issues discovered during testing. European Service Module (ESM). Through a barter agreement, the European Space Agency developed and produced the ESM, which provides propulsion, air, water, and power to the crew module while in space. The European Space Agency delivered the ESM to NASA in November 2018, following several delays with its development. According to program officials, the most recent set of delays prior to delivery were due to issues and failures during ESM propulsion system testing as well as the need to redesign power system components. Orion and EGS officials explained that a total of 20 months is required from receipt of the ESM to prepare it for launch. This time frame includes 14 months for the Orion program to finalize testing of each module and complete program-level integration and testing and 6 months for the EGS program to complete integrated test and checkout with SLS and EGS. As a result, the earliest the Orion program could be ready to support a first mission based on the service module schedule alone is July 2020, 20 months after NASA accepted delivery in November 2018. ESD officials told us that the 6 to 12 months of risk that could push EM-1 to June 2021 includes ESM-related delays. These 6 to 12 months of schedule risk do not include the effects, if any, of the federal government shutdown that occurred in December 2018 and January 2019. Figure 5 compares schedules of key events for the Orion program, including delays with the ESM, from shortly after NASA established the program’s baseline in September 2015, the December 2017 replan, and as of November 2018. Crew Module. While the ESM remains the critical path—the path of longest duration through the sequence of activities that determines the earliest completion date—for the Orion program, the crew module is nearly the critical path due in part to component failures within the avionics systems during testing. Figure 6 is a picture of a crew module test article. In May 2018, we reported that the Orion program was addressing component issues in its avionics systems after they failed during vibration testing. For example, components throughout the crew and service module relied on computer cards used to regulate power. When those cards cracked during testing, the program needed to redesign the cards, retest them, and reinstall them for system tests. Since then, additional avionics failures have surfaced. In one instance, one of the vehicle’s global positioning system receivers failed to power up. In another, a part failed on one of the inertial measurement units, which provide navigation information like vehicle rotation and acceleration. In March 2019, program officials told us that they have addressed these issues in the avionics systems and all flight hardware is installed. Testing. The ability for Orion, SLS, and EGS to complete testing in the integrated test laboratory facility—where software and hardware or hardware simulators are tested together—remains an ongoing risk for both the first mission and then the timing of the second mission. The lab has limited time and test resources to complete the testing necessary for EM-1, and NASA officials indicated that at times it has more demand than it can support. In addition, some testing is taking longer than planned, delaying later tests. The risk associated with these delays is that the later the program discovers an issue, the less time there is to address the issue prior to launch. At the same time that the Orion program is completing EM-1 work in the integrated test lab, the program will also need to modify the lab’s configuration in order to support EM-2 efforts because of hardware and software differences between missions. The schedule currently includes periods of time during EM-1 testing where EM-1 efforts will be shut down in order to work on lab modifications for EM-2. Although program officials indicated that test lab delays for EM-1 will not adversely affect lab efforts for EM-2, resources directed to EM-2 will mean less resources will be available during those times to support EM-1. The Orion program has reported development cost growth but is not measuring that growth using a complete cost estimate. In summer 2018, the Orion program reported development cost growth of $379 million, or 5.6 percent above its $6.768 billion development cost estimate. The program explained that the major drivers of this cost growth were the slip of the EM-1 launch date, which reflected delays in the delivery of the service module; Orion contractor underperformance; and NASA-directed scope increase. However, during our review, Orion program officials stated that this cost estimate assumes an EM-2 launch date of September 2022, which is 7 months earlier than the program’s agency baseline commitment date of April 2023 that forms the basis for commitments between NASA, the Congress, and OMB. As a result, NASA’s current cost estimate for the Orion program is not complete because it does not account for costs that NASA would incur between September 2022 and April 2023. Subsequently, program officials told us that its cost projections fund one of those seven months. See figure 7. NASA officials originally told us that they do not have an Orion cost estimate through the EM-2 agency baseline commitment launch date of April 2023 because they plan to launch by September 2022, if not earlier. According to scheduling best practices, performance is measured against the program’s baseline even if a program is working to an earlier date. By not estimating costs through its baseline launch date, the Orion program is limiting the NASA Associate Administrator’s insight into how the program is performing against the baseline. According to federal law, the Administrator must be immediately notified any time that a designated official has reasonable cause to believe that either the program’s development cost is likely to exceed the estimate in the agency baseline commitment by 15 percent or more or a program milestone will slip 6 months or more beyond its schedule agency baseline commitment date. If the Administrator confirms the cost growth or schedule delay exceeds the given threshold, the Administrator must submit a report to the Committee on Science and Technology of the House of Representatives and the Committee on Commerce, Science, and Transportation of the Senate. Given that the program is already reporting cost growth to a date earlier than its baseline schedule, updating the cost estimate relative to the EM-2 baseline schedule would provide NASA management and Congress with more complete cost data and increased awareness of whether additional oversight is merited. Since the December 2017 replan, the EGS program has had to address several technical challenges that consumed schedule reserves. Nevertheless, officials expect to have EGS facilities and software ready by June 2020, the planned launch date. The program has completed many of its projects, including the renovation of the Vehicle Assembly Building and the launch pad. Since the replan, however, the project has had to address technical challenges with the Mobile Launcher. Figure 8 below compares the EGS schedule—including timeframes for the Mobile Launcher and software completion—shortly after NASA established the program’s baseline in September 2014, the December 2017 replan, and as of November 2018. It also shows the potential launch window reflecting the 6-12 months of risk NASA is tracking that could push EM-1 to June 2021. Mobile Launcher. The Mobile Launcher schedule deteriorated since the December 2017 replan due to problems with finalizing construction work prior to moving it to the Vehicle Assembly Building. Moving the Mobile Launcher into the Vehicle Assembly Building was intended to allow the program to begin multi-element verification and validation, a process that checks that the various launch and processing systems at Kennedy Space Center meet requirements and specifications and can operate together to fulfill their intended purpose. Challenges the program experienced with the Mobile Launcher included having to add structural supports after determining that the design was not adequate to carry the load of the SLS vehicle and fuel. In addition, program officials stated that construction work overall did not progress to the point desired to move the Mobile Launcher to the Vehicle Assembly Building. As a result, the program did not move the Mobile Launcher into the Vehicle Assembly Building until September 2018, 5 months later than in the schedule established after the December 2017 replan. Moving forward, the program has to complete the multi-element verification and validation process for the Mobile Launcher and Vehicle Assembly Building. We have reported on a number of issues related to the EGS program’s management of the Mobile Launcher, as well as the now-completed Vehicle Assembly Building project. For example, in 2016, we found that the program did not mature requirements and designs for the Mobile Launcher before beginning construction. In addition, the EGS program completed all major structural changes to the Mobile Launcher prior to completing the design and installation of the ground support equipment and the nine umbilicals that connect the Mobile Launcher directly to the SLS and Orion. There have also been ground support equipment and umbilical design changes both during and after the Mobile Launcher’s design phase because of vehicle requirement changes from SLS and Orion. Officials indicated this approach was problematic because the concurrency increased program risk. Further, according to officials, the decision to have separate contracts for design and construction exacerbated these challenges. Officials indicated that this contracting strategy meant that design changes required multiple levels of review and approval from NASA and each of the program’s contractors, which in turn led to numerous contract modifications. According to EGS officials, the program plans to incorporate lessons learned from developing the first Mobile Launcher into the acquisition approach for a second Mobile Launcher that NASA is building to allow for future configurations of the SLS vehicle. Specific lessons officials plan to carry forward to the second Mobile Launcher include: implementing an integrated design process, including establishing a process to better handle requirement changes during design and construction; developing and maintaining a three-dimensional (3D) model to facilitate integrated design; and enabling builder involvement during the design process to avoid pitfalls during construction. However, these lessons learned do not address metrics to assess design stability before starting construction. Our work on acquisition best practices show that good processes that mature designs early in development and ensure that the design meets requirements can position a program for future success and lead to more predictable cost and schedule outcomes. Traditionally, we have used the number of releasable engineering drawings as a metric to assess design stability. Specifically, our work has found that achieving design stability at the product critical design review, usually held midway through product development, is a best practice. Completion of at least 90 percent of engineering drawings at this point provides tangible evidence that the product’s design is stable. We have also found that the U.S. Navy and the commercial shipbuilding industry use 3D product models as tools to document design stability. We found that there are aspects of shipbuilding that are analogous to building a Mobile Launcher in that both involve designing and building a large metal structure and installing multiple complex integrated systems to support complex functions such as launching spacecraft, or in the case of the Navy, launching aircraft and/or missile systems. NASA officials agreed that developing a Mobile Launcher is analogous to shipbuilding. Best practices for commercial shipbuilding indicate that 3D product models documenting 100 percent of the system’s basic and functional designs should be complete before construction begins. Basic design includes fixing the ship steel structure; routing all major distributive systems, including electricity, water, and other utilities; and ensuring the ship will meet the performance specifications. Functional design includes providing further iteration of the basic design, providing information on the exact position of piping and other outfitting in each block, and completing a 3D product model. The combined basic and functional designs in conjunction with the 3D product model provide the shipbuilder a clear understanding of the ship structure as well as how every system is set up and routed throughout the ship. This detailed knowledge allows commercial shipbuilders to design, build, and deliver complex ships such as floating production storage and offloading vessels, which are able to collect, process, and store oil from undersea oil fields, within schedule estimates. The improved design processes the EGS program is pursuing in the development of the second Mobile Launcher, including the development of a 3D model to facilitate integrated design, have the potential to improve program outcomes. Further, achieving design stability before beginning construction would also improve this potential. Software. The program’s two software development efforts represent the EGS critical path, and program officials stated that recent changes have begun to address previous challenges with the software development. For example, officials explained that the program has implemented iterative integration testing and has identified lead engineers for each software development area. The iterative integration testing involves conducting tests on smaller segments of software throughout the development process instead of waiting to conduct testing when a software release is fully complete. According to officials, these efforts allow the program to identify and correct errors prior to completing a full software drop. These changes have also resulted in lower numbers of issues found in some software releases. Further, the 6-month delay to the SLS and Orion programs has provided additional flexibility to EGS’s software development schedule. Finally, with respect to EGS’s performance against its cost baseline, EGS updated its cost estimate as part of the December 2017 replan. The EGS program continues to operate within costs established for the June 2020 launch date, $3.2 billion, but any delays beyond June 2020 will result in additional cost growth. NASA’s award fee plans for the SLS stages and Orion crew spacecraft contracts provide for hundreds of millions of dollars to incentivize contractor performance, but the programs continue to fall behind schedule and incur cost overruns. Our past work shows that when incentive contracts are properly structured, the contractor has profit motive to keep costs low, deliver a product on time, and make decisions that help ensure the quality of the product. Our prior work also shows, however, that incentives are not always effective tools for achieving desired acquisition outcomes. We have found that, in some cases, there are significant disconnects between contractor performance for which the contractor was awarded the majority of award fees possible without achieving desired program results. Additionally, we have found that some agencies did not have methods to evaluate the effectiveness of award fees. The incentive strategies for both the SLS stages and the Orion crew spacecraft contracts include multiple incentives—milestone fees, performance incentive fees, cost incentive fees, and award fees—aimed at incentivizing different aspects of contractor performance. These contracts’ milestone fees, performance incentive fees, and cost incentive fees are generally determined against objective criteria, such as meeting a date and application of predetermined formulas. For example, NASA will pay a milestone fee to Boeing under the SLS contract when it meets a specific program milestone such as transferring the core stage to the government for the green run test. Under this contract, Boeing receives additional milestone fee when it beats a milestone date and reduced fee when it misses a milestone date. Likewise, pre-determined formula-type incentives—such as these contracts’ performance incentive fees and cost incentive fees—are typically determined based on objective criteria, such as meeting technical metrics or predetermined cost targets. Award fees on these types of contracts are generally determined at 6 to 12-month periodic evaluations of the contractor’s performance against criteria outlined in the award fee plan. For example, according to officials, NASA may evaluate the contractor against technical performance and criteria, such as the ability to avoid and predict cost overruns, manage risk, or accomplish small business goals. Upon the completion of a formal review, performance evaluation board officials make recommendations to the fee determination official on the amount of fee to be paid. Figures 9 and 10 provide overviews of the total incentive fee available on the current contracts for the SLS stages contract and the Orion crew spacecraft contract, by type and percentage. Under the terms of the current contracts, Boeing has earned about $271 million in award fee and Lockheed Martin has earned about $294 million in award fee. Since each program held its confirmation review, the point in time when a program established its cost and schedule baselines, NASA has paid the majority of available award fee to both contractors. Specifically, NASA has paid Boeing about 81 percent of available award fee—or about $146 million—and Lockheed Martin about 93 percent—or about $88 million—since their respective program confirmation reviews. During the annual award fee periods, the descriptive ratings both contractors received ranged from good to excellent. In the subjective appraisals supporting these ratings, NASA identified both strengths that indicate areas of good contractor performance and weaknesses that indicate areas of poor contractor performance. Table 5 includes the results of award fee determinations since the respective program confirmations. The numerical score for each evaluation period represents the percentage of fee paid to the contractor from the available fee pool. Examples of strengths and weaknesses NASA identified in the award fee letters include the following: For the Boeing award fee period ending February 2015, NASA identified several strengths, including effective and timely communication, but stated that its subcontractor management for the vertical assembly center was inadequate. In particular, the program discovered during this time that the as-built design of the vertical assembly center tool was not capable of serving its purpose, which is to build core stage hardware. The design issue resulted in several months of schedule delays. NASA also raised concerns about Boeing’s ability to manage to the baseline schedule in a subsequent award period. For the Lockheed Martin award fee period ending April 2017, NASA identified several strengths, including addressing top program development risks such as establishing a robust mitigation plan to address risks related to the heatshield block architecture. At the same time, NASA noted that Lockheed Martin was not able to maintain its schedule for the crew service module and that the contractor’s schedule performance had decreased significantly over the previous year. While both the SLS and Orion contractors have received the majority of available award fee in each award fee period, the programs have not always achieved overall desired outcomes. For example, in its December 2018 award fee letter to Boeing—representing the good assessment for the September 2017 through October 2018 period of performance—the fee determination official noted that the significant schedule delays on this contract have caused NASA to restructure the flight manifest for SLS. As previously discussed, within 1 year of announcing a delay for the first mission, senior NASA officials acknowledged that the SLS and Orion programs will not meet the new EM-1 schedule of December 2019, and the 6 months of schedule reserve available to extend the date to at least June 2020 has been consumed. In addition, the officials identified 6 to12 months of risk to that date, which could increase the delay up to 31 months. These 6 to 12 months of schedule risk do not include the effects, if any, of the federal government shutdown that occurred in December 2018 and January 2019 due to a lapse in appropriations for fiscal year 2019. Both the contractors and government bear responsibilities for these delays. We have previously found that NASA has made programmatic decisions—including establishing low cost and schedule reserves, managing to aggressive schedules, and not following best practices for earned value management—that have compounded technical challenges that are expected for inherently complex and difficult large-scale acquisitions. Further, we previously reported that NASA did not follow best practices for establishing cost and schedule baselines for these programs nor update cost and schedule analyses to reflect new risks. As a result, NASA overpromised what it could deliver from a cost and schedule perspective. At the same time, both contractors have had challenges that contributed to past delays. For example, in 2015, Boeing was unable to manufacture an intertank panel—which resides between the liquid oxygen and liquid hydrogen tanks—without significant cracking. At the time, NASA estimated that resolving this issue could result in a 6-month slip to the production schedule. Further, as previously discussed, NASA discovered during installation that fuel lines used in the engine section were contaminated with residue and other debris. According to a program official, Boeing had not verified the processes that its vendors were using to clean the fuel lines, resulting in about 2 months’ delay to resolve residue and debris issues. SLS officials indicated that the engine section has a very complex design with many parts in a relatively small, cramped area, so any time problems are found with parts that have already been installed, removing, repairing or replacing them often requires that other parts be removed. Furthermore, as some of the tubing sections had already been installed, resolving this issue, including inspecting, shipping, and cleaning the tubing, affected the overall program schedule. In addition, NASA determined in 2017 that Lockheed Martin would not meet the delivery date for the crew module—even if the European Service Module were on schedule—when numerous problems including design issues, damage during testing, and manufacturing process changes resulted in major schedule impacts to the program. Lockheed Martin also had a number of issues with subcontractor-supplied avionics system components failing during testing that have required time to address. NASA has highlighted concerns over Lockheed Martin’s ability to manage subcontractors in award fee evaluation periods from 2016 to 2018, and the resulting significant cost, schedule, and technical risk impacts to the program. In an attempt to resolve these issues and to improve subcontractor oversight moving forward, Lockheed Martin officials told us that they have placed staff in the subcontractor facilities. Because of these cost increases and delays, the agency plans to renegotiate the Boeing contract for SLS. NASA officials stated that Boeing expects its costs to exceed the cost-reimbursement contract’s not- to-exceed estimated total cost, which will lead to contract renegotiation. Consequently, the contractor has been executing work under an undefinitized contract action since September 2018. Contract actions such as these authorize contractors to begin work before reaching a final agreement with the government on contract terms and conditions. Orion program officials stated that NASA is modifying the cost and period of performance aspects of its contract with Lockheed Martin for Orion development and negotiating a new contract with Lockheed Martin for Orion operations and production. Officials told us the following: NASA is modifying the Orion development contract with Lockheed Martin because the contractor will exceed the cost reimbursement contract’s not-to-exceed estimated total cost. Orion program officials indicated that poor performance on the part of the contractor resulted in the contractor exceeding the costs allowed under the contract without completing the full scope of work. Consequently, NASA is modifying the contract to allow increased costs. Orion officials indicated that since the cost growth is contractor caused, the contractor will not have the ability to earn any fees on this increased cost. NASA is also modifying the Orion development contract to extend the contract period of performance. The current contract’s period of performance ends in December 2020, which is earlier than NASA’s planned EM-2 launch date of June 2022. Orion program officials stated that this extension is largely driven by delays in receipt of the European Service Module. According to officials, NASA is negotiating the terms of the Orion production and operations contract with Lockheed Martin. This contract is expected to support future production of the Orion spacecraft from Exploration Mission-3 potentially through 2029. In addition to production, this effort will include sustaining engineering and flight operations support, with limited development to allow mission kits to be built to specifications as mission objective are defined. Orion program officials indicated that NASA plans to eventually transition the contract to a fixed-price type contract for production, but that the development of mission kits will remain under a cost-reimbursement type contract with some type of incentive fee. In November 2018, senior leaders within the ESD organization told us that it was not clear whether NASA would renegotiate how incentive fees are distributed among milestone incentive fee, or cost incentive fee, and award fee as part of the upcoming Boeing contract renegotiations. NASA, however, has made these types of changes in the past. For instance, the Orion program redistributed fees in 2014 to include an incentive fee component when the contract transitioned from the Constellation program to the Orion program. The Federal Acquisition Regulation and NASA contracting guidance indicate that award fee is appropriate when the work to be performed is such that it is neither feasible nor effective to devise predetermined objective incentive targets applicable to cost, schedule, and technical performance. However, now that the SLS and Orion programs are further into the acquisition life cycle, the programs are at the point in development wherein it may be possible to determine more objective targets for cost, schedule, and technical performance, especially for the first mission. Further, a principle of federal internal controls is that management should design control activities to achieve objectives and respond to risks. This includes management conducting reviews to compare actual performance to planned or expected results, and taking corrective actions to achieve objectives. Without reevaluating its strategy for incentivizing contractors, NASA will miss an opportunity to consider whether changes to the incentive structure could better achieve expected results, such as motivating the contractor to meet upcoming milestone events within cost and schedule targets. NASA’s SLS, Orion, and EGS programs are a multi-billion dollar effort to transport humans beyond low-Earth orbit, but the agency has been unable to achieve agreed-to cost and schedule performance. NASA acknowledges that future delays to the June 2020 launch date are likely, but the agency’s approach in estimating cost growth for the SLS and Orion programs is misleading. And it does not provide decision makers, including the Administrator, complete cost data with which to assess whether Congress needs to be notified of a cost increase, pursuant to law. By not using a similar set of assumptions regarding what costs are included in the SLS baseline and updated SLS cost estimates, NASA is underreporting the magnitude of the program’s cost growth. Similarly, NASA is underreporting the Orion program’s cost performance by measuring cost growth to an earlier-than-agreed-to schedule date. As a result, Congress and the public continue to accept further delays to the launch of the first mission without a clear understanding of the costs associated with those delays. Further, NASA is now turning its attention to new projects to support future missions, including building a second Mobile Launcher. Ensuring design stability before construction start would better position NASA to improve its acquisition outcomes for this next Mobile Launcher. Finally, contractor performance to date has not produced desirable program cost and schedule outcomes. Ongoing and planned contract negotiations present an opportunity to restructure the government’s approach to incentives. Such steps may better position the agency to obtain better outcomes going forward. We are making the following 4 recommendations to NASA: We recommend the NASA Administrator ensure that the NASA Associate Administrator for Human Exploration and Operations direct the SLS program to calculate its development cost growth using a baseline that is appropriately adjusted for scope and costs NASA has determined are not associated with the first flight, and determine if the development cost growth has increased by 30 percent or more. (Recommendation 1) We recommend the NASA Administrator ensure that the NASA Associate Administrator for Human Exploration and Operations direct the Orion program to update its cost estimate to reflect its committed EM-2 baseline date of April 2023. (Recommendation 2) We recommend the NASA Administrator ensure that the NASA Associate Administrator for Human Exploration and Operations direct the EGS program to demonstrate design maturity by completing 3D product modeling of the basic and functional design of the second Mobile Launcher prior to construction start. (Recommendation 3) We recommend the NASA Administrator ensure that the NASA Associate Administrator for Human Exploration and Operations direct the SLS and Orion programs to reevaluate their strategies for incentivizing contractors and determine whether they could more effectively incentivize contractors to achieve the outcomes intended as part of ongoing and planned contract negotiations. (Recommendation 4) NASA provided written comments on a draft of this report. These comments, and our assessment of them, are included in appendix II. NASA also provided technical comments, which were incorporated as appropriate. In responding to a draft of this report, NASA concurred with three recommendations and partially concurred with a fourth recommendation, and identified actions that they plan to take. NASA partially concurred with our recommendation to direct the Orion program to update its cost estimate to reflect its committed EM-2 baseline date of April 2023. In its response, NASA stated providing the estimate to the forecasted launch date—September 2022—rather than to the committed baseline date of April 2023 is the most appropriate approach. Further, NASA stated that any additional slips to the program involve considerable uncertainty associated with “unknown-unknowns” which are, by their very definition, impossible to predict or forecast and that attempting to forecast these at this point is neither practical nor useful to help manage the program. If the schedule projections go beyond September 2022, NASA stated that the Orion program will follow standard Agency processes and update its cost estimate to reflect the updated schedule projections. NASA established Orion’s EM-2 launch date of April 2023 as part of the agency’s program confirmation process in 2015. According to federal law, NASA is required to track and report progress relative to the cost and schedule baselines established at the program’s confirmation review. While programs often pursue goals trying to beat these dates and/or cost estimates, the primary purpose of a cost and schedule baseline is to provide a consistent basis for measuring program progress over time. By developing cost estimates only to the program’s goals and not relative to the established baseline, the Orion program is not providing the Agency or the Congress the means of measuring progress relative to the baseline. We agree that it is difficult to forecast the potential impacts of unexpected problems. NASA guidance, however, provides instructions to programs on the percentage/relative level of cost reserves that should be maintained to deal with potential unknown-unknowns that are likely to come up late in development. We continue to believe that NASA should fully implement this recommendation. We are sending copies of this report to the NASA Administrator and interested congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. To assess the performance of the human space exploration programs, including any technical challenges, relative to their cost and schedule commitments, we obtained and analyzed cost and schedule estimates for the Space Launch System (SLS), Orion Multi-Purpose Crew Vehicle (Orion), and Exploration Ground Systems (EGS) programs through November 2018. We then compared these estimates against program baselines to determine cost growth and schedule delays. We also interviewed SLS program officials and reviewed cost data to determine how the program phases costs for future flights outside the current baseline. We then analyzed the SLS program’s current cost estimate to determine how the scope of the current estimate had changed relative to the scope of the SLS baseline cost estimate. Moreover, we obtained and reviewed quarterly reports and the programs’ risk registers, which list the top program risks and their potential cost and schedule impacts, including mitigation efforts to-date. We then discussed risks with program officials. We also compared program schedules across three points in time— schedules from when NASA first established baselines for each program, schedules established for each program following the replan in December 2017, and schedules as of November 2018—to assess whether program components and software were progressing as expected Furthermore, for the EGS program, we reviewed program-level lessons learned regarding the acquisition of the Mobile Launcher against acquisition best practices to determine the extent to which the program plans to incorporate these best practices as part of its acquisition planning for the second Mobile Launcher. To determine the extent to which NASA’s use of contract award fees are achieving desired outcomes, we analyzed contract modifications, award fee plans, and fee determination records for the Orion crew spacecraft and SLS stages—or stages—contracts. We selected these contracts because they represent the largest development efforts for each program. We analyzed contract documentation to determine the amount of award fee available on these contracts compared to other incentives, such as milestone incentives, and calculated fees paid to date. Specifically, for award fee on both contracts, we reviewed fee determination records for evaluation periods after the SLS program’s confirmation review in 2014 and the Orion program’s confirmation review in 2015 to determine fees paid, numeric and descriptive ratings awarded for each period and contractor strengths and weaknesses identified by the program. Moreover, we reviewed award fee documentation to identify broader program challenges and compared fee determination results to overall program outcomes since program confirmation. For the Orion contract, the scope of our incentive fee analysis included the full scope of incentive fees available for developing and manufacturing the Orion spacecraft from the beginning of the contract. For the SLS contract the scope of our incentive fee analysis included the incentive fees available for 1) contract line item number 9 of the contract which includes the full scope of stages work supporting SLS’s EM-1 effort, and 2) contract line item number 12 indefinite-delivery, indefinite-quantity support task activities for contract line item number 9. We performed our work at Johnson Space Center in Houston, Texas; the Boeing Company in Huntsville, Alabama; Marshall Space Flight Center in Huntsville, Alabama; Kennedy Space Center in Kennedy Space Center, Florida; Lockheed Martin Space Systems Company in Houston, Texas; and NASA headquarters in Washington, DC. We based our assessment on data collected prior to the federal government shutdown that occurred in December 2018 and January 2019 due to a lapse in appropriations for fiscal year 2019. This assessment does not reflect the effect, if any, of the shutdown on the programs’ costs and schedules or a March 2019 announcement that NASA is studying how to accelerate the SLS schedule. We assessed the reliability of program data we used to support this engagement using GAO reliability standards as appropriate, including reviewing related documentation, interviewing knowledgeable agency officials, and performing selected testing of data. We determined the data was sufficiently reliable for the purposes of this engagement. We conducted this performance audit from March 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. 1. This report acknowledges the complexity of NASA’s deep space exploration systems. The introduction section of this report acknowledges that NASA is developing systems planned to transport humans beyond low-Earth orbit, including the Moon and eventually Mars, and that each of these programs represents a large, complex technical and programmatic endeavor. The introduction also notes that these programs are in the integration and test phase of development, which our prior work has shown often reveals unforeseen challenges leading to cost growth and schedule delays. 2. Senior NASA officials told us that the revised EM-1 launch date of December 2019 is unachievable and the June 2020 launch date (which takes into account schedule reserves) is unlikely. These officials then estimated that there are 6 to 12 months of schedule risk associated with the June 2020 date. It would be misleading for us to continue to report the June 2020 launch date when we were told there was substantive risk to that date. Without a new approved schedule, Figure 3, Figure 5, and Figure 8 all present a notional launch window including the acknowledged schedule risks. We then used the information NASA provided us to report that the first launch may occur as late as June 2021, if all risks are realized. Further, this substantial delay to the first mission was acknowledged by senior officials less than one year after NASA announced up to a 19 month delay. We maintain that continued underperformance contributed to these additional schedule delays and associated cost increases. For example, for SLS, NASA discovered during installation that fuel lines used in the engine section were contaminated with residue and other debris. According to a program official, Boeing had not verified the processes that its vendors were using to clean the fuel lines, resulting in about 2 months’ delay to resolve residue and debris issues. For the Orion program, NASA determined in 2017 that Lockheed Martin would not meet the delivery date for the crew module—even if the European Service Module were on schedule—when numerous problems including design issues, damage during testing, and manufacturing process changes resulted in major schedule impacts to the program. As a result, we also maintain that these delays and cost growth reinforce concerns over the management of the programs. In addition to the underperformance, NASA’s management decisions on how to report cost growth is not fully transparent and, in particular, obscures the difficulties the SLS program has faced controlling costs. 3. We agree that that these are long-term, “multi-decadal” programs and that content is subject to change. As a result, we maintain that arbitrarily focusing on a single mission and not looking at long- term costs may have negative impacts to this human spaceflight system. We previously reported in May 2014, that NASA does not have a cost and schedule baseline for SLS beyond the first flight. As a result, NASA cannot monitor or track costs shifted beyond EM-1 against a baseline. We recommended that NASA establish cost and schedule baselines that address the life cycle of each SLS increment, as well as for any evolved Orion or ground systems capability. NASA partially concurred with the recommendation, but has not taken any action to date. Until action is taken to do so, as noted above, NASA’s decision to shift some SLS costs to future missions while not adjusting the baseline downward not only underestimates cost growth for the first mission, but also results in there being no mechanism to track these costs that NASA shifted to future missions. 4. Through the course of this review, NASA was transparent in its discussions with us of how it calculated costs for each of the programs. The findings of this report are not meant to convey that NASA is withholding information, but rather, that decisions NASA has made about how to calculate costs do not provide sufficient transparency into cost growth or cost estimates. Further, we have previously reported that without transparency into costs for future flights, NASA does not have the data to assess long-term affordability and Congress cannot make informed budgetary decisions. Cristina T. Chaplain, (202) 512-4841 or chaplainc@gao.gov. In addition to the contact named above, Molly Traci, Assistant Director; Andrea Bivens; Sylvia Schatz; Ryan Stott; Tanya Waller; John Warren; Alyssa Weir; and Robin Wilson made significant contributions to this report.", "summary": "NASA is undertaking a trio of closely related programs to continue human space exploration beyond low-Earth orbit. All three programs (SLS, Orion, and supporting ground systems) are working toward a launch readiness date of June 2020 for the first mission. The House Committee on Appropriations included a provision in its 2017 report for GAO to continue to review NASA's human space exploration programs. This is the latest in a series of reports addressing the mandate. This report assesses (1) how NASA's human space exploration programs are performing relative to cost and schedule commitments, and (2) the extent to which NASA's use of contract award fees is achieving desired program outcomes. To do this work, GAO examined program cost and schedule reports and contractor data, and interviewed officials. This report does not assess the effect, if any, of the government shutdown that ended in January 2019. Due to continued production and testing challenges, the National Aeronautics and Space Administration's (NASA) three related human spaceflight programs have encountered additional launch delays and cost growth. In November 2018, within one year of announcing an up to 19-month delay for the three programs—the Space Launch System (SLS) vehicle, the Orion spacecraft, and supporting ground systems—NASA senior leaders acknowledged the revised date of June 2020 is unlikely. Any issues uncovered during planned integration and testing may push the launch date as late as June 2021. Moreover, while NASA acknowledges about $1 billion in cost growth for the SLS program, it is understated. This is because NASA shifted some planned SLS scope to future missions but did not reduce the program's cost baseline accordingly. When GAO reduced the baseline to account for the reduced scope, the cost growth is about $1.8 billion. In addition, NASA's updated cost estimate for the Orion program reflects 5.6 percent cost growth. The estimate is not complete, however, as it assumes a launch date that is 7 months earlier than Orion's baseline launch date. If the program does not meet the earlier launch date, costs will increase further. Updating baselines to reflect current mission scope and providing complete cost estimates would provide NASA management and Congress with a more transparent assessment of where NASA is having difficulty controlling costs. NASA paid over $200 million in award fees from 2014-2018 related to contractor performance on the SLS stages and Orion spacecraft contracts. But the programs continue to fall behind schedule and overrun costs. Ongoing contract renegotiations with Boeing for the SLS and Lockheed Martin for the Orion program provide NASA an opportunity to reevaluate its strategy to incentivize contractors to obtain better outcomes. GAO is making four recommendations to NASA, including that the SLS program should calculate cost growth based on costs that are currently included in the first mission and the Orion program should update its cost estimate to reflect the schedule agreed to in its baseline. In addition, the SLS and Orion programs should reevaluate their strategy for incentivizing contractors. NASA concurred with three recommendations, and partially concurred with the recommendation related to the Orion program's cost estimate. GAO believes the recommendation remains valid, as discussed in the report.", "document_type": "gao"}
{"report": "In 2017, nearly one in three Medicare Part D beneficiaries received an opioid prescription, and Medicare spending for prescription opioids was almost $3.4 billion. Medicare data for 2017 showed that the beneficiaries potentially at risk for opioid misuse and abuse were more likely to be under 65 years of age, female, and dually eligible for Medicare and Medicaid. For years, to limit Medicaid at-risk beneficiaries’ access to controlled substances, state Medicaid programs have used lock-in programs, which restrict certain beneficiaries’ access to a single prescriber (such as a physician or other health-care provider), a single pharmacy, or both. States have broad discretion in how and whether to implement lock-ins, including how to identify at-risk beneficiaries. Medicaid lock-in programs have been associated with advantages including declines in inappropriate prescribing, decreases in abuse of controlled substances, and increased treatment options for beneficiaries. Research has identified an unintended consequence of the Medicaid lock-in programs; some individuals increased the amount of out-of-pocket payments they made for controlled substances, thus avoiding lock-in programs as data on these purchases are not collected by Medicaid. State Prescription Drug Monitoring Programs (PDMP) are state-run electronic databases that track the prescribing, dispensing, and purchasing of controlled substances by individuals, whether purchased out-of-pocket, through private insurance, or under insurance programs such as Medicare and Medicaid. Data are available to individuals or organizations as authorized under state law. For example, health-care prescribers can check PDMPs for a specific individual prior to prescribing controlled substances. State PDMPs have documentation of controlled substances obtained by individuals. As of February 2018, all 50 states, the District of Columbia, Guam, and Puerto Rico had operational PDMPs within their borders. Medicare DMPs perform case management to identify at-risk beneficiaries and attempt to mitigate risk by increasing communication and coordination across plan sponsors, health-care prescribers, pharmacists, and at-risk beneficiaries. CMS established a framework for plan sponsors that volunteer to establish Medicare DMPs. CMS’s framework includes two steps for identifying at-risk beneficiaries: 1) CMS identifies potentially at-risk beneficiaries based on key clinical factors and 2) plan sponsors use case management to identify the subset of potentially at-risk beneficiaries who are actually at risk. Step One: Identifying potentially at-risk beneficiaries. CMS identifies potentially at-risk beneficiaries based on the minimum Overutilization Monitoring System’s criteria and develops a quarterly list of these beneficiaries, which it sends to plan sponsors. The Overutilization Monitoring System was originally designed and implemented by CMS in July 2013 to oversee plan sponsors’ compliance with CMS’s opioid overutilization policy and is based on beneficiary claims data. It was enhanced in 2019 to support the implementation of DMPs. The system encompasses a medication safety approach with the goal of reducing beneficiary overutilization of opioids while maintaining beneficiary access to needed medication. The Overutilization Monitoring System creates and sends a list of beneficiaries meeting minimum criteria quarterly to plan sponsors with DMPs. These patients are considered potentially at- risk beneficiaries. Additional supplemental criteria can also be used by plan sponsors to identify other potential at-risk beneficiaries, such as those who use seven or more pharmacies for opioid prescriptions. Use of higher numbers of prescribers and pharmacies may put the beneficiary at more risk. (See table 1.) Step Two: Using case management to identify actually at-risk beneficiaries and mitigate risk of misuse or abuse. After identification of potentially at-risk beneficiaries by CMS, the second step in the framework is for plan sponsors to coordinate the provision of care, referred to as case management. Plan sponsors use case management to determine which potentially at-risk beneficiaries are deemed to be actually at risk. Plan sponsors’ clinicians must begin case management for each potentially at-risk beneficiary with the beneficiary’s prescribers of frequently abused drugs, with the purpose of determining if current treatment is appropriate, examining specifically if the beneficiary is being appropriately treated with frequently abused drugs. This step allows for health-care providers to bring the beneficiary’s clinical information into the discussion. Two groups of beneficiaries identified as potentially at risk are excluded from Medicare DMPs during the case management process: First, CMS will automatically exempt from Medicare DMP consideration any beneficiary who (a) has elected to receive hospice, palliative, or end-of- life care; (b) is a resident of a long-term-care facility or of another facility for which frequently abused drugs are dispensed for residents through a contract with a single pharmacy; or (c) has active cancer-related pain. Second, through a discussion of beneficiary-level clinical information as part of case management, beneficiaries found to be receiving appropriate treatment, or who have had cases resolved with adjustments to their treatment will also be excluded from Medicare DMP consideration. CMS officials told us that the beneficiaries’ health-care providers often adjust their prescribing after talking with the health plans’ clinicians and learning information about other health-care providers also treating the beneficiary. After eliminating the excluded beneficiaries, the plan sponsor sends an initial notification letter to the remaining beneficiaries who continue to be identified as potentially at risk, and thus, may require limiting the coverage of a prescription drug in some manner (coverage limitation). The notification letter notifies each beneficiary that he or she has been identified as potentially at risk; details which coverage limitations the sponsor intends to implement and for how long; explains how the beneficiary can submit preferences for the selected frequently abused drugs prescriber(s) and the selected dispensing pharmacy or pharmacies for frequently abused drugs in case a lock-in tool is used; provides information about resources and plan benefits that address prescription abuse; explains how additional information can be provided to the plan sponsor; and informs the beneficiary of the right to appeal, among other things. Medicare plan sponsors have three coverage limitation tools that can be used either concurrently or sequentially: Frequently abused drugs prescriber lock-in. The at-risk beneficiary will receive prescriptions from only one or more selected prescriber. Prescribers in a group practice will count as a single prescriber. Frequently abused drugs-dispensing pharmacy lock-in. The at- risk beneficiary will receive all prescriptions from one or more selected dispensing pharmacy. The pharmacy must be in their plan sponsor’s network. When a pharmacy has different locations that share real-time electronic data, such as chain pharmacies, all locations of the pharmacy will be treated as one pharmacy. Beneficiary specific point-of-sale claim edit. The at-risk beneficiary will be restricted to certain frequently abused drugs and amounts through the point-of-sale claim edit. This means that a plan sponsor must not cover a prescription for the frequently abused drug for an at- risk beneficiary that is in excess of the limit in the edit. Pharmacists will receive a message when a beneficiary attempts to fill a prescription if the prescription exceeds the limit in place for that beneficiary. After a 30-day period from the date of the initial notification letter, there are two possible outcomes: either the plan sponsor will determine that the beneficiary is at risk for misuse or abuse of frequently abused drugs and will proceed with the coverage limitation under its DMP, or the sponsor will determine that the beneficiary is not at risk. If the potentially at-risk beneficiary is found to be at risk, a second notification letter is sent to the beneficiary as soon as possible after the 30-day period but no later than 60 days from the date of the initial notification letter. The second letter includes the beneficiary’s identification as at risk for misuse or abuse of frequently abused drugs, the right to appeal the decision, coverage limitations to be employed, and the expiration date of the coverage limitations, among other things. The second notification letter also explains how the beneficiary can submit preferences for the selected frequently abused drugs prescriber(s) and the selected dispensing pharmacy or pharmacies for frequently abused drugs in case a lock-in tool is used. The selected frequently abused drugs prescriber(s) must agree to serve as the beneficiary’s only frequently abused drugs prescriber(s) and must be determined by the plan sponsor as not contributing to the beneficiary’s opioid misuse. The at-risk beneficiary generally has 60 days from the date of the second notification letter to request an appeal of an at-risk determination. A new at-risk determination is made by the plan sponsor as a result of continued case management (that is, continued coordination of care and clinical discussions) within a standard time frame of 7 days for redetermination, or an expedited time frame of 72 hours for redetermination. Alternatively, if it is determined that the potentially at-risk beneficiary is being treated appropriately for their medical condition and is therefore not at risk, an alternate second notification letter is sent to the beneficiary stating that the beneficiary was deemed not to be at risk and that access to frequently abused drugs will not be limited under a DMP. This alternate second notification letter must be sent no later than 60 days after the date on the initial notification letter. If a beneficiary switches to a different plan sponsor after being identified as potentially at risk or actually at risk, the determination does not automatically transfer to the new plan sponsor. The new plan sponsor will be able to see the previous plan sponsor’s determination, but the new plan sponsor may have to make its own determination through case management unless the prior plan’s case management information is up to date. According to CMS’s framework, the termination date of an at-risk determination is the earlier of two possible dates: 12 months from the effective date of the coverage limitation, unless the limitation is extended, or when the beneficiary demonstrates that he or she is no longer likely to be at risk before the end of the 12 months. At the end of the 12-month period, a clinical assessment of the at-risk beneficiary will determine if the DMP should continue for another year or be ended. The maximum coverage limitation period in a DMP is 24 months. After 24 months, the coverage limitation is halted, but according to the framework, CMS continues to monitor the beneficiary quarterly through the Overutilization Monitoring System and can re-identify the beneficiary as potentially at risk again if he or she meets the minimum Overutilization Monitoring System criteria. Reporting requirements for Medicare DMPs. Although the Medicare DMPs are currently voluntary, the framework places reporting requirements on plan sponsors that choose to establish DMPs. Medicare DMPs are integrated with the Opioid Drug Utilization Review Policy and Overutilization Monitoring System to improve medication safety. Plan sponsors must report to CMS, through the Overutilization Monitoring System, the results of case management for each potential at-risk beneficiary identified. For each beneficiary deemed to be at risk, the coverage limitation tools – frequently abused drugs prescriber lock-in, frequently abused drugs-dispensing pharmacy lock-in, and beneficiary specific point-of-sale claims edit – that will be used to limit the beneficiary’s access to frequently abused drugs must also be reported. Other required information to be reported to CMS includes dates of the initial and second notification letters, and the date that the plan sponsor decides to terminate a potential at-risk or at-risk status. This data allows CMS to track beneficiary-level data for those beneficiaries placed in DMPs. Input about Medicare DMP framework from plan sponsors and experts. Although the at-risk determination is the responsibility of the plan sponsor, four of the five plan sponsors we interviewed stated they would rely on results from case management, including the beneficiary’s primary health-care provider’s input, to make the determination. One plan sponsor told us it has a panel of physicians and pharmacists that makes the at-risk determination for beneficiaries. The panel takes into consideration the input of the beneficiary’s prescribers of frequently abused drugs, but the panel makes the final decision. None of the five plan sponsors we interviewed expressed concerns about beneficiaries not receiving clinically appropriate doses of opioids under the Medicare DMPs, given that the case management process includes clinician input, including the beneficiary’s primary health-care provider and plan sponsors’ clinicians. According to one medical expert, case management is beneficial because it allows for input from the beneficiary’s prescriber rather than relying solely on the Overutilization Monitoring System metric criteria to determine who is at risk. Three of the five plan sponsors we interviewed expressed prior positive experiences with lock-ins. All plan sponsors had experience with the lock- in tools from their experience participating in Medicaid programs or offering private insurance plans. Three of the five plan sponsors reported better coordinated oversight and management of patients and their conditions in those experiences. One sponsor stated that lock-in programs are perceived as an additional safety mechanism for at-risk beneficiaries by helping with the coordination of the beneficiaries’ care because the plan sponsor’s clinicians, prescribers, and pharmacies are aware of the lock-in programs. Officials with five plan sponsors and six stakeholder organizations representing physicians, pharmacy benefit managers, and patients we interviewed told us that several factors beyond the clinical input incorporated in the case management process could contribute to the success of DMPs. These factors include communication, collaboration, and flexibility for plan sponsors to manage and incorporate best practices. Communication among plan sponsors, opioid prescribers, and pharmacies dispensing opioids could reduce any potential resistance to DMPs by stakeholders, and contribute to DMP success, officials told us. Specifically, several officials with plan sponsors and stakeholders noted that sponsors should communicate with, and educate stakeholders to ensure that DMPs, especially their coverage limitation tools, are not viewed as punitive tools by beneficiaries, but rather as tools for keeping them safe. Some of these officials stated that through education and other means, plan sponsors should also encourage health-care providers and their enrollees to view opioid addiction by at-risk beneficiaries as a disease rather than a choice. Effective collaboration among prescribers and patients in making individualized treatment decisions for pain management is another key to successful DMPs, according to some stakeholders we interviewed. Specifically, some plan sponsors and a stakeholder noted that during and after case management plan sponsors should support collaboration between prescribers and patients to ensure access to the clinically appropriate level of opioids for each beneficiary. Flexibility to incorporate best practices from DMPs and flexibility in varying coverage limitation features to fit regional differences are other keys to success, some plan sponsors and a stakeholder told us, due to regional and other differences in population groups. Data from CDC show that there is some variation in death rates from opioids in the overall population by state, and a CDC study also shows that opioid prescribing patterns also vary by location—the average per capita prescribed amounts varied widely by county, and demographic and other factors are sometimes associated with higher prescribing patterns. In addition, some officials with plan sponsors and stakeholders stated that the criteria for DMPs such as how at-risk beneficiaries are identified, and other parameters of the DMP (such as which drugs are designated as frequently abused drugs) should be periodically reassessed by CMS with feedback by plan sponsors and adjusted, where appropriate, to incorporate evidence from the outcomes of the DMP. Officials with plan sponsors and stakeholders we interviewed also discussed several factors that could limit the success of the DMPs: An official with a plan sponsor and a stakeholder told us that purchases of opioids made by beneficiaries using cash are not captured in the available prescription drug claims data maintained by plan sponsors. These officials suggested therefore that sponsors should encourage the selected prescribers to review this information by using state PDMPs, which track controlled substance prescriptions in a state and include cash sales of opioids. One plan sponsor commented that coverage limitations could have a negative effect on beneficiary health satisfaction survey scores and therefore could affect how a physician prescribes opioids. Beneficiaries who are placed in a DMP or subject to one of the DMP tools may report decreased satisfaction in the “Consumer Assessment of Healthcare Providers and Systems” surveys. Under Medicare Advantage, patient experience about the ease of receiving care is one measure of quality and is a factor in plan sponsor reimbursement. Finally, some officials with plan sponsors and stakeholders told us that in localities where prescribers feel a stigma associated with dispensing opioids, the coverage limitation feature could have the unintended consequence of creating a disincentive for prescribers to take care of patients who require opioid treatment. According to an official, to combat the opioid crisis, some states send letters to the top opioid prescribers in their state as a way to create awareness about trends in opioid prescribing. Officials with a plan sponsor and a stakeholder said that providers who want to avoid being on the list of top prescribers refer patients to pain specialists for management of pain. Officials told us that the demand for these pain specialists is increasing and there are long waiting lists to access care by these pain specialists. CMS is taking several steps to assess the DMPs and gather information to make periodic changes to the program. For example, CMS officials told us they plan to monitor and analyze beneficiary complaints, appeals, prescription drug event data, and other data submitted by plan sponsors related to DMPs. According to CMS officials, the agency also will obtain feedback from plan sponsors about how the DMPs are working, and this feedback will be the basis for making periodic changes to the DMPs. CMS is also updating its Medicare Part C and D audit protocol so it can audit DMP related beneficiary notices. Finally, CMS tracks the utilization of opioids by Medicare Part D enrollees using Part D data and the Overutilization Monitoring System. For example in the 2020 Medicare Advantage and Part D draft call letter, CMS reported that between 2012 and 2017, there was a 33 percent decrease in the number of Part D enrollees meeting or exceeding 90 MME for at least one day, with the largest decrease (14 percent) in 2017. We provided a draft of this report to HHS for review. HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, the Administrator of CMS, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at CosgroveJ@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix I. In addition to the contact named above, Martin T. Gahart (Assistant Director), N. Rotimi Adebonojo (Analyst in Charge), Jennie Apter, Deborah J. Miller, Emily Wilson, Rick Lipinski, Todd Anderson, and Vikki Porter made key contributions to this report.", "summary": "Misuse and abuse of prescription opioids can lead to overdose and death. According to the Centers for Disease Control and Prevention (CDC), 47,600 overdose deaths in the United States in 2017 involved an opioid. GAO and other federal entities have raised concerns about opioid misuse and abuse in Medicare. The Comprehensive Addiction and Recovery Act of 2016 (CARA) authorized CMS and Medicare plan sponsors to establish voluntary DMPs that may limit access to frequently abused prescription drugs, such as opioids, for Medicare beneficiaries who are identified as being at risk for prescription drug abuse. DMPs will become mandatory in Medicare starting in January 2022. CARA included a provision for GAO to review DMPs under Medicare. This report: 1) describes how Medicare identifies beneficiaries at risk of opioid misuse and abuse and how it attempts to mitigate that risk; and 2) identifies the factors likely to affect the success of Medicare DMPs. GAO reviewed CDC's Guideline for Prescribing Opioids for Chronic Pain , CMS regulations, and other relevant CMS guidance. GAO also interviewed officials from CMS, the five largest Medicare Part D prescription drug plan sponsors, and officials from six other stakeholder organizations representing Medicare plan sponsors, physicians (including pain specialists), pharmacy benefit managers, state Medicaid programs, and patients. Medicare's drug management programs (DMP) identify beneficiaries at risk of opioid misuse or abuse, and attempt to mitigate that risk through the use of case management and coverage limitations. DMPs are overseen by the Centers for Medicare & Medicaid Services (CMS) and voluntarily implemented by Medicare Part D prescription drug plan sponsors (private health plans). CMS established a two-step framework for identifying at-risk beneficiaries under DMPs. First, CMS identifies potentially at-risk beneficiaries based on key factors, such as beneficiaries' daily dosage of opioids and the number of prescribers and pharmacies from which they receive opioids, with higher numbers possibly putting the beneficiary at more risk. Second, Medicare Part D prescription drug plan sponsors' clinicians coordinate the provision of care among prescribers and pharmacists (referred to as case management) to determine if those potentially at-risk beneficiaries are actually at risk. If a patient is deemed to be at risk, coverage limitation tools—such as limiting a beneficiary to a selected prescriber or pharmacy, and implementing point-of-sale restrictions on certain drugs or amounts—can be used to limit the at-risk beneficiary's access to opioids. Beneficiaries have an opportunity to appeal an at-risk designation. None of the five plan sponsors GAO interviewed expressed concerns about beneficiaries not receiving clinically appropriate doses of opioids under the Medicare DMPs. Medicare Part D prescription drug plan sponsors and other stakeholders GAO interviewed reported several factors beyond the case management process that could contribute to the success of DMPs. These factors included communication among sponsors, opioid prescribers, and pharmacies dispensing opioids to reduce potential resistance to participating in DMPs by opioid prescribers or beneficiaries. According to plan sponsors and stakeholders, plan sponsors could communicate with stakeholders to ensure that DMPs are not viewed as a punitive tool by beneficiaries, but rather as tools for keeping them safe. Plan sponsors and stakeholders noted that it is important for plan sponsors to have flexibility in varying coverage limitation features to fit regional and other differences in population groups. They noted that CMS should periodically reassess and adjust the elements of the DMP program where appropriate, to incorporate evidence from the outcomes of the DMP—such as how at-risk beneficiaries are identified, or which drugs are selected as frequently abused drugs. Finally, CMS officials told GAO that they are taking steps to assess the DMPs and gather the information required to make periodic changes to the DMP program. For example, CMS officials plan to analyze data for at-risk beneficiaries that DMPs are required to report to CMS, update their Medicare Part D audit protocol, and obtain feedback from plan sponsors about how the DMPs are working. The Department of Health and Human Services provided technical comments on a draft of this report, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "The Air Force has identified ABMS as its solution to support broad Department of Defense (DOD) efforts to develop Joint All-Domain Command and Control (JADC2) capabilities. These capabilities will eventually allow U.S. forces from all of the military services, as well as allies, to conduct military operations across all warfighting domains. Command and control is the collection and sharing of information to enable military commanders to make timely, strategic decisions; take tactical actions to meet mission goals; and counter threats to U.S. assets. Figure 1 shows the concept of DOD operations within a joint all-domain environment. When the Air Force began planning for ABMS in 2017, officials stated the intent was to replace and modernize the capabilities of the Airborne Warning and Control System (AWACS), which provides the warfighter with the capability to detect, identify, and track airborne threats, among other capabilities. According to officials, the Air Force currently plans to operate AWACS aircraft through 2035. In July 2018, the DOD Joint Requirements Oversight Council approved an ABMS Initial Capabilities Document that describes which capabilities would need to be developed and which associated gaps in current capabilities the Air Force would need to address. According to Air Force officials, after the Initial Capabilities Document was approved, the Air Force determined that its planned approach to ABMS was no longer compatible with the most recent National Defense Strategy, released in January 2018. The 2018 National Defense Strategy outlines DOD’s strategy for maintaining the defense of the United States based on new and reemerging threats from competitors, such as Russia and China. It also defines expectations for how DOD and its military departments should be prepared to engage those threats during future conflicts: forces would be expected to strike a diverse range of targets inside adversarial air and missile defense networks; forces would need capabilities to enhance close combat lethality; and DOD would prioritize investments that enabled ground, air, sea, and space forces to deploy, operate, and survive in all domains while under attack. Air Force officials stated that these expectations led the department to reassess requirements for ABMS and assess new options for developing more robust and survivable systems that could operate within contested environments. For example, the Air Force officially canceled a recapitalization program for the Joint Surveillance Target Attack Radar System (JSTARS)—an aircraft that provides surveillance and information on moving ground targets—in December 2018. The cancellation was linked to the 2018 National Defense Strategy, which calls for a more survivable and networked solution, among other things. A June 2018 Air Force report to Congress identified concerns regarding the survivability of the JSTARS aircraft in a contested environment and stated that the Air Force was instead planning for ABMS to eventually provide JSTARS’s capabilities. The Air Force determined that it could continue using some of its JSTARS aircraft into the 2030s. Officials stated the Air Force subsequently changed the scope and intent of ABMS to align with the 2018 National Defense Strategy and broader requirements for JADC2. According to senior Air Force officials, they concluded that, to align with the new defense strategy, ABMS needed to do far more than replace AWACS and JSTARS. They also concluded that no single platform, such as an aircraft, would be the right solution to providing command and control capabilities across multiple domains. In an April 2019 congressional testimony, the Air Force announced a new vision for ABMS as a multidomain command and control family of systems enabling operations in air, land, sea, space, and cyber domains. In that testimony, Air Force leadership explained the need to move away from a platform-centric approach (such as JSTARS) to a network-centric approach, one that connects every sensor to every shooter. The Air Force, however, did not formally document its decision to change the scope of ABMS. In November 2019, according to Air Force officials, ABMS was determined to be the Air Force solution for JADC2 in response to a July 2019 Joint Requirements Oversight Council memo outlining DOD requirements for command and control systems requirements across all domains. In May 2019, we reported that Air Force leadership determined that it would not designate ABMS as a major defense acquisition program because it would be a family of systems. The Air Force also determined that ABMS would be directed by a Chief Architect working across PEOs, rather than a traditional acquisition program manager. According to Air Force officials, the Chief Architect role will be instrumental in integrating the various programs and technologies into an overall system and is the first of its kind within the Air Force. Additionally, Air Force officials stated that they intend to use a flexible acquisition approach to develop ABMS, one that is outside of traditional pathways such as a major defense acquisition program or middle tier acquisition. According to the Chief Architect, this approach will allow ABMS to develop and rapidly field capabilities. Specifically, the Air Force intends to break up technology development into many short-term efforts, generally lasting 4 to 6 months each. The Chief Architect stated that the goal of breaking up development into smaller increments is to increase innovation by requiring multiple contractors—including those that may not usually engage with DOD—to compete for contracts more frequently. These short-term efforts will include prototyping and demonstrations to prove that the capabilities work. Those that are proven will be delivered to the warfighter. By using this approach, the Air Force intends to field capabilities sequentially and more quickly than if all were developed and delivered at one time as is typically done for traditional acquisitions. Additionally, Air Force officials indicated that this approach will not lock the Air Force into long-term development efforts with just one contractor and will allow the Air Force to more easily move on from unsuccessful development efforts. The Air Force has not established a plan or business case for ABMS that identifies its requirements, a plan to attain mature technologies when needed, a cost estimate, and an affordability analysis. As a result of recent ABMS management and scope changes, the Air Force remains early in the planning process and has not yet determined how to meet the capabilities or identify systems that will comprise ABMS. In December 2019, Air Force officials stated an overall plan for ABMS did not exist and would be difficult for the Air Force to develop in the near term due to the unclear scope of ABMS requirements. To date, the Air Force has not identified a development schedule for ABMS, and it has not formally documented requirements. As previously stated, ABMS will be managed as a family of systems and not as a traditional acquisition program typically governed by DOD Instruction 5000.02, nor as a middle tier acquisition. As a result, Air Force officials initially told us that they did not intend to develop most of the typical acquisition documentation, such as a cost estimate, that is generally required of major defense acquisition programs before entering the development phase. In March 2020, after we sent a copy of this report to DOD for comment, the Air Force provided us a draft tailored acquisition plan for ABMS in lieu of an acquisition strategy. Based on our initial review, this document includes some elements of a traditional acquisition strategy, such as contract and test strategies. However, this tailored acquisition plan does not include key information such as the overall planned capabilities and estimated cost and schedule for ABMS. We will continue to monitor the Air Force’s planning efforts as the program progresses. The Air Force also began preparing an analysis of alternatives in January 2019 to assess options for delivering capabilities such as surveilling moving targets and battle management command and control. The Air Force expects to complete the analysis in 2020, but Air Force officials expect it will inform only some aspects of ABMS planning. The Air Force has not defined what additional planning documentation it will develop to help it establish a business case for ABMS. For example, major defense acquisition programs are generally required to develop acquisition planning documents, such as a cost estimate. We have previously reported on the importance of establishing a solid, executable business case before committing resources to a new development effort. A business case demonstrates that (1) the warfighter’s needs are valid and that they can best be met with the chosen concept and (2) the chosen concept can be developed and produced within existing resources. In addition to an acquisition strategy, other basic elements of a sound acquisition business case include firm requirements, a plan for attaining mature technologies, and a reliable cost estimate and affordability analysis, further described below. 1. Firm requirements are the requisite technological, software, engineering, and production capabilities needed by the user. Acquisition leading practices state that requirements should be clearly defined, affordable, and informed. Deciding how best to address requirements involves a process of assessing trade-offs before making decisions. Unstable or ill-defined requirements can lead to cost, schedule, and performance shortfalls. 2. A plan to attain mature technologies when needed is critical in establishing that technologies can work as intended before integration into a weapon system. The principle is not to avoid technical risk but rather address risk early and resolve it ahead of the start of product development. Identifying technologies and defining a plan to ensure mature technologies can be attained when needed help guide development activities and enable organizations to track development and inform decisions on next steps. 3. A reliable cost estimate and affordability analysis are critical to the successful acquisition of weapon systems. GAO’s Cost Estimating and Assessment Guide states that a reliable cost estimate is comprehensive, well-documented, accurate, and credible. Leading practices have shown that realistic cost estimates allow program management to obtain the knowledge needed to make investment decisions and match requirements with resources. A cost estimate is the basis of an affordability analysis, which validates whether a program’s budget is adequate for the planned acquisition strategy. The process of developing and documenting a business case builds knowledge needed to match customer needs with available resources, including technologies, timing, and funding. The fact that the Air Force does not plan to establish such a business case for ABMS increases the risk of cost and schedule overruns and may impact Congress’s ability to exercise its oversight responsibilities. The status of key elements for the ABMS business case follows: Status of requirements. The Air Force has not established well-defined, firm requirements for ABMS, but Congress required that the Air Force start defining requirements for the networked data architecture necessary for ABMS to provide multidomain command and control and battle management capabilities by June 2020. The Air Force has not defined the changes in ABMS’s requirements, such as the need to provide multidomain command and control capabilities in support of joint operations. As a result, the only existing documentation of ABMS’s requirements resides in the ABMS Initial Capabilities Document from 2018, which generally focuses on the capabilities needed to replace AWACS. That document does not address the expanded JADC2 requirements and capabilities ABMS is expected to eventually fulfill. Air Force officials stated that ABMS requirements and the family of systems, or programs, that compose ABMS will be defined over time as they gain more knowledge. Given the lack of specificity regarding ABMS, Congress has kept a close eye on the effort and has implemented several reporting requirements. Since 2018, the Air Force has been required to provide quarterly updates to the defense committees on the status of ABMS development and associated technologies. In addition, the National Defense Authorization Act for Fiscal Year 2020 required the Air Force to provide ABMS-related documentation that describes certain requirements, a development schedule, and the current programs that will support ABMS, among other things, by June 2020. While the Air Force has not established firm requirements for ABMS to date, it has informally identified some broad requirements. For example, the Air Force anticipates that ABMS will provide interoperability between systems, present real-time information to military decision makers, and fully utilize the range of sensor data and capabilities across DOD to create a common battlespace operational picture. In addition, Air Force officials stated that ABMS would be developed as a government-owned open architecture family of systems, which would allow any system to be integrated into ABMS. The Air Force has identified seven different development categories that it plans to simultaneously address to meet its broad ABMS requirements. According to the Air Force, the categories are not intended to be comprehensive and may change as development progresses. These development categories include: Apps Although the Air Force has not defined these seven development categories, it has identified 28 development areas that fit within the categories. For example, one of these development areas, which falls under the “secure processing” category, is called cloudONE. It is intended to store and process data using a cloud infrastructure for multiple levels of classified and unclassified data. These development areas will eventually compose the architecture and technologies that make up ABMS. In January 2020, the Air Force provided us with a draft version of high-level descriptions of the 28 development areas; however, the document did not fully define the requirements or capabilities for the development areas nor identify which organizations would lead each effort. For example, the cloudONE description does not indicate specific technical requirements that must be met, such as amount of storage, the number of users, or data transmission rate. Although ABMS requirements are not fully defined, the Air Force awarded several short-term development contracts for ABMS. According to Air Force officials, these efforts are intended to show that its nontraditional development approach is feasible rather than to develop specific capabilities that will be integrated into ABMS. For example, the Air Force awarded several development contracts totaling approximately $8 million for gatewayONE, one of the 28 development areas that is intended to enable communication between platforms. As part of this effort, the Air Force conducted a demonstration in a joint military exercise in December 2019. While the exercise demonstrated some data transfer capability, it did not directly address the intent of gatewayONE to enable communication between multiple platforms using government-owned systems. According to Air Force officials, ongoing and future efforts will allow the Air Force to better define ABMS requirements and determine what existing and emerging technologies can fulfill those capabilities. The Air Force has not determined what development efforts will follow these early demonstration efforts, in part because it has not fully defined its requirements. Status of plan to attain mature technologies when needed. The Air Force has started development activities without first identifying what technologies are needed for the 28 development areas for ABMS. According to Air Force officials, they do not plan to identify all technologies needed while pursuing development activities. Therefore, the Air Force cannot assess whether technologies required for ABMS are mature or determine the necessary steps to ensure those technologies are mature when needed. Air Force officials stated that as ABMS development progresses, they plan to select commercially available or other mature technologies for integration. However, without first identifying the technologies it needs, the Air Force cannot develop a plan, or technology roadmap, with detailed actions to ensure those technologies will be mature when needed. For example, the Air Force plans for ABMS to assume the capabilities of AWACS and JSTARS aircraft, which are set to retire in the 2030s. However, the Air Force has not defined the technologies ABMS will need or established a roadmap to ensure those technologies are mature before the retirement of legacy aircraft. This increases the risk that the requisite technologies will not be mature before the Air Force must integrate them into ABMS, which increases the likelihood that those capabilities will not be developed when needed. The Chief Architect and other Air Force senior leaders stated that the ABMS development effort is an ambitious undertaking for the Air Force. Our prior work has found that some DOD programs related to ABMS development have posed challenges in the past, in part because technologies were not sufficiently mature when needed, as shown in table 1. Additionally, the Office of Cost Assessment and Program Evaluation assessed previous DOD programs that were similar to ABMS development and noted that the scope of ABMS will be larger than any of those individual programs. Officials from that office concluded that ABMS is a high-risk effort and the Air Force has not provided sufficient programmatic detail. As a result, they could not conclude that the Air Force would be able to overcome the cost, schedule, and performance challenges of these past programs. Air Force officials stated that the Air Force’s approach to ABMS development will avoid these past challenges because only mature technologies will be integrated into ABMS and the Air Force is expected to frequently evaluate development progress. However, since the Air Force has not identified what the technology needs for ABMS are, it cannot yet determine if those technologies are mature or will be mature when needed. We have previously found that starting development without first identifying and assessing the maturity of technologies increases the likelihood that those technologies are not mature when needed, which often results in cost overruns and schedule delays. Status of cost estimate and affordability. The Air Force has not developed a cost estimate for ABMS or an affordability analysis. According to the GAO Cost Estimating and Assessment Guide, even in cases where limited information is available, cost estimates should still be developed to inform budget requests. To date, the Air Force has requested nearly $500 million for ABMS efforts through fiscal year 2021. The Air Force, however, currently has no plans to develop a life-cycle cost estimate, which would provide a comprehensive account of ABMS costs, or an independent cost estimate, which would confirm the credibility of estimated costs. Officials stated that the Air Force has not developed a cost estimate because the capabilities, technologies, and systems that will compose ABMS are still to be determined and will change over time. Officials stated they intend to develop cost estimates for each of the 28 development areas in the future but did not identify a timeline. The GAO Cost Estimating and Assessment Guide acknowledges that cost estimating is more difficult when requirements—and the technologies and capabilities to meet them—are changing and the final product design is not known while the system is being built. In these cases, leading practices call for developing cost estimates that should be updated more frequently to reflect changes in requirements. Without a realistic and current cost estimate for ABMS efforts, the Air Force will be unable to effectively allocate resources and conduct informed long-range investment planning. The Air Force has also not determined if it can afford ABMS. Affordability is the degree to which the funding requirements for an acquisition effort fit within the service’s overall portfolio plan. Whether an acquisition effort is affordable depends a great deal on the quality of its cost estimate and other planned outlays. To conduct an affordability analysis, the budget requirements for the entire portfolio are identified for future years. This can help determine whether the funding needs are relatively stable or if the portfolio will require a funding increase in the future. The GAO Cost Estimating and Assessment Guide states that, as part of the cost estimating process, management should review and approve an affordability analysis to identify any funding shortfalls. Air Force officials stated that the Air Force does not plan to conduct a comprehensive affordability analysis for ABMS because it is managing it as a family of systems. They stated that any costs to the Air Force will be determined in the future by the various organizations that manage the systems that will eventually support ABMS. However, without an affordability analysis, the Air Force will be unable to determine whether it can commit sufficient resources for ABMS in future years. While the Air Force has taken some steps to establish an ABMS management structure, the authorities of Air Force offices to plan and execute ABMS efforts are unclear. Internal controls, which provide standards on effective management of programs, state that management should establish the organizational structure and authority necessary to enable the entity to plan, execute, control, and assess the organization in achieving its objectives. The Air Force, however, has not fully defined or communicated ABMS decision-making authorities to Air Force offices, and documentation to date regarding ABMS management has been limited. Several Air Force offices are involved in ABMS management, as shown in figure 2. Air Force Acquisition. This office is headed by the Assistant Secretary of the Air Force for Acquisition, Technology and Logistics, who is generally responsible for all acquisition functions within the Air Force. In an October 2018 memorandum, Air Force Acquisition established the position of the Chief Architect and stated that any unresolved ABMS issues between the Chief Architect and PEOs are to be brought to Air Force Acquisition for resolution. Chief Architect. The Air Force established this position in October 2018 to execute the overarching vision and strategy for ABMS. According to the Air Force, the Chief Architect will determine the overall design of ABMS, coordinate with the service-level commands and the acquisition programs involved to ensure their efforts are aligned with the overall design and development of ABMS, and identify the enabling technologies that will compose the ABMS family of systems. An October 2018 memorandum stated that individual PEOs and program managers that oversee programs supporting ABMS will retain all authority and responsibility for executing their respective programs. In November 2019, Air Force Acquisition issued additional ABMS management guidance that stated that the Chief Architect would select and fund ABMS development projects for PEOs to execute. However, the guidance did not address whether the Chief Architect has authority to direct the execution of efforts initiated and originally funded by the PEOs, which may support ABMS. Specifically, there is no documentation to clarify whether the Chief Architect would have the authority to realign PEO priorities or funding for ABMS projects. For example, the PEO for Space is currently executing a data integration project, which aligns with the cloudONE development area. Although some ABMS funds have been obligated for this project, there is no documentation to support that the Chief Architect will be able to direct the PEO to change the project objectives or timeline to align with ABMS requirements once they are defined. Air Force Warfighting Integration Capability (AFWIC). In October 2017, the Air Force established AFWIC. According to Air Force officials, AFWIC will ensure forces are operationally ready to perform JADC2 missions using ABMS technologies. According to an AFWIC senior official, in April 2019 AFWIC began leading multidomain command and control efforts for the Air Force. An October 2018 memorandum directed the Chief Architect to coordinate with AFWIC regarding the development of ABMS. Other documentation on ABMS execution indicates that AFWIC will also coordinate with major commands on Air Force doctrine and operations in support of ABMS. However, the documentation did not further define this coordination or indicate whether AFWIC would have any authority in directing ABMS activities. Chief Architect Integration Office. In December 2019, the Air Force established the Chief Architect Integration Office at Wright-Patterson Air Force Base to coordinate and integrate ABMS development efforts across PEOs and other organizations. Air Force officials stated that this office is in the process of being staffed and the roles and responsibilities still need to be formalized. However, as currently envisioned, this office would lead technology development risk reduction efforts by working with the PEOs and other organizations, such as federally funded research and development centers, to conduct ABMS demonstrations and prototypes. Air Force officials told us the Chief Architect Integration Office is expected to resolve issues across Air Force organizations, such as sharing of resources and personnel. An Air Force Life Cycle Management Center- led task force is currently developing an overall strategy for the office, to include resource and organizational requirements. Air Force officials stated that a proposed strategy will be completed in March 2020. Until the Chief Architect Integration Office has been fully established, it is unclear whether the office will have the required authorities to execute the mission of integrating ABMS development efforts across the Air Force. Air Force officials stated that the decision-making authorities across these offices will be developed over time. According to officials, details on these authorities have not been developed or communicated to the offices supporting ABMS and the Air Force has not established a timeline for doing so. The Air Force expects that multiple organizations within the Air Force will be responsible for executing ABMS development efforts. Internal controls, which provides standards for effective management of programs, states that organizational structure and authority is necessary to plan, execute, and assess progress. The absence of fully defined and documented decision-making authorities, which are communicated to all those involved, increases the risk to the Air Force’s ability to successfully plan, execute, and assess ABMS development efforts. The Air Force started ABMS development activities without a business case that defines ABMS requirements, a plan to ensure technologies are mature when needed, a cost estimate, and an affordability analysis. Developing these key elements of a business case helps to build a solid foundation for any successful technology and product development effort, even one using a nontraditional acquisition approach. Congress has already required the Air Force to define and report on certain ABMS requirements, among other aspects of ABMS planning, by June 2020. However, the Air Force does not intend to develop the other elements of a business case, even though it is requesting over $300 million for ABMS development activities in fiscal year 2021. Given the criticality of the battle management command and control mission and the planned retirement of legacy programs, the lack of an ABMS business case introduces uncertainty regarding whether the needed capabilities will be developed within required time frames. For example, without a plan to mature technologies needed to field ABMS capabilities, the Air Force cannot be certain those technologies will be ready when needed. While it may be difficult for the Air Force to formulate a complete ABMS business case at this time, due to the recent changes in ABMS’s scope, the Air Force is not precluded from beginning the process of defining and formalizing a business case. As ABMS continues to evolve, so too can the Air Force’s business case. For example, the Air Force does not yet know the total life cycle costs of ABMS, but it could provide Congress with a cost estimate based on its knowledge today and update the cost estimate over time. This would allow the Air Force to assess whether ABMS is affordable. Furthermore, the Air Force is already required to provide quarterly briefs to congressional defense committees on the status of ABMS, which affords the Air Force the opportunity to present Congress with information on its ABMS business case and explain any changes over time. Specifically, including updates on the scope of the Air Force’s plans to ensure ABMS will have mature technologies when needed, an overall cost estimate, and an affordability assessment would provide important information to Congress. Finally, the Air Force has started to execute ABMS development efforts without clearly defined decision-making authorities that have been communicated to the offices supporting those efforts. The absence of these defined authorities may hinder management’s ability to execute and assess ABMS development across multiple organizations within the Air Force. We are making the following four recommendations to the Secretary of the Air Force to direct the Assistant Secretary of the Air Force for Acquisition, Technology and Logistics: The Assistant Secretary of the Air Force for Acquisition, Technology and Logistics should direct the Chief Architect to develop a plan to attain mature technologies when needed for each ABMS development area, which includes an initial list of technologies and an assessment of their maturity that is updated to reflect changes, and update Congress quarterly. (Recommendation 1) The Assistant Secretary of the Air Force for Acquisition, Technology and Logistics should direct the Chief Architect to prepare a cost estimate that is developed in accordance with cost estimating leading practices, to include regularly updating the estimate to reflect ABMS changes and actual costs, and update Congress quarterly. (Recommendation 2) The Assistant Secretary of the Air Force for Acquisition, Technology and Logistics should direct the Chief Architect to prepare an affordability analysis that should be regularly updated, and update Congress quarterly. (Recommendation 3) The Assistant Secretary of the Air Force for Acquisition, Technology and Logistics should formalize and document acquisition authority and decision-making responsibilities of the Air Force offices involved in the planning and execution of ABMS, to include the Chief Architect. This document should be included as part of the submission to Congress in June 2020 and communicated to the Air Force offices that support ABMS. (Recommendation 4) We provided a draft of this product to the Department of Defense for comment. In its comments, reproduced in appendix I, the Department of Defense concurred with our recommendations. We will continue to monitor the Air Force’s actions to respond to these recommendations. We are sending copies of this report to the appropriate congressional committees. We are also sending a copy to the Secretary of Defense, the Secretary of the Air Force, and other interested parties. In addition, this report is available at no charge on GAO’s website at http://www.gao.gov. Should you or your staff have questions, please contact me at (202) 512- 4841 or MakM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact above, the following staff members made key contributions to this report: Justin Jaynes, Assistant Director; Jessica Karnis, Analyst-in-Charge; and Lauren Wright. Other contributions were made by Brian Bothwell, Rose Brister, Brian Fersch, Miranda Riemer, Megan Setser, Hai Tran, and Robin Wilson.", "summary": "The Air Force's ABMS is a family of systems intended to replace the command and control capabilities of aging legacy programs and develop a network of intelligence, surveillance, and reconnaissance sensors. Air Force officials stated ABMS has received $172 million in funding through fiscal year 2020 for efforts related to ABMS. The Air Force is not designating ABMS as a major defense acquisition program or a middle tier acquisition program. Congress included a provision in statute for GAO to review the status of ABMS. This report examines the extent to which the Air Force has (1) established a plan for ABMS development and (2) defined management and decision-making authorities for ABMS efforts. To conduct this assessment, GAO reviewed ABMS program documentation and interviewed Air Force officials. The Air Force's Advanced Battle Management System (ABMS) is intended to establish a network to connect sensors on aircraft, drones, ships, and other weapon systems to provide a real-time operational picture on threats across all domains, as depicted below. According to Air Force officials, the department will take a nontraditional approach to develop ABMS through short-term efforts that will enable it to rapidly field capabilities. As a result of this approach, ABMS requirements will change over time as development progresses. The Air Force started ABMS development without key elements of a business case, including: firm requirements to inform the technological, software, engineering, and production capabilities needed; a plan to attain mature technologies when needed to track development and ensure that technologies work as intended; a cost estimate to inform budget requests and determine whether development efforts are cost effective; and an affordability analysis to ensure sufficient funding is available. GAO's previous work has shown that weapon systems without a sound business case are at greater risk for schedule delays, cost growth, and integration issues. Congress has kept a close eye on the effort and required quarterly briefings on its status, as well as a list of certain ABMS requirements by June 2020. However, given the lack of specificity that remains regarding the Air Force's ABMS plans, Congress would benefit from future briefings that address the missing business case elements. While the Air Force has taken some steps to establish an ABMS management structure, the authorities of Air Force offices to plan and execute ABMS efforts are not fully defined. Unless addressed, the unclear decision-making authorities will hinder the Air Force's ability to effectively execute and assess ABMS development across multiple organizations. GAO is making four recommendations, including that the Air Force should develop and brief the Congress quarterly on a plan to mature technologies, a cost estimate, and an affordability analysis. In addition, the Air Force should formalize the ABMS management structure and decision-making authorities. The Air Force concurred with the four recommendations. GAO will continue to monitor the Air Force's actions to address these recommendations.", "document_type": "gao"}
{"report": "Education administers federal student aid programs, including the William D. Ford Federal Direct Loan (Direct Loan) program, through the Office of Federal Student Aid. Only Direct Loans are eligible for the PSLF program and the temporary expanded process. Under the Direct Loan program, Education issues and oversees federal loans provided to students, and contractors service these loans. Education currently contracts with nine loan servicers that each handle the billing and other services for a share of the over $1 trillion in outstanding student loans provided through the Direct Loan program. Borrowers interested in pursuing loan forgiveness under PSLF, or the temporary expanded process, must have their loans eventually transferred to Education’s sole PSLF loan servicer in order to proceed. This designated PSLF servicer handles day-to-day activities associated with the PSLF program and the temporary expanded process, which include responding to borrower inquiries, making preliminary determinations about whether borrowers’ employment and loans qualify for loan forgiveness, and processing loan forgiveness applications. The PSLF program and the temporary expanded process provide eligible borrowers with forgiveness on the remaining balance of their Direct Loans after they have met all program requirements. To receive forgiveness for a loan, borrowers are required to be employed in a qualifying public service job for 10 years when making 120 qualifying payments. Borrowers must also be employed in a qualifying public service job at the time they apply for forgiveness, and at the time they receive forgiveness for their loans. Although there are some differences in the eligibility requirements for PSLF and the temporary expanded process, borrowers are generally required to: Work full-time for at least 10 years at a public service organization, a government organization, agency, or entity at any level (federal, state, local, or Tribal); a nonprofit, tax exempt organization (under section 501(c)(3) of the Internal Revenue Code); or another private nonprofit organization that provides certain public services. Not be in default on their loans. Make 120 on-time monthly loan payments for the full amount due on their bill. These monthly payments do not need to be consecutive. Repay their loans through a qualifying repayment plan. The PSLF program generally requires borrowers to repay their loans through one of the eligible income-driven repayment plans or the Standard repayment plan. The temporary expanded process allows borrowers to qualify for loan forgiveness if they are participating in several additional types of repayment plans, including the Graduated repayment plan, Extended repayment plan, Consolidated Standard repayment plan, and Consolidated Graduated repayment plan. In addition, for the temporary expanded process, the following two payments generally must be at least as much as the borrower would have paid under an income-driven repayment plan: (1) the payment made immediately prior to applying for the temporary expanded process, and (2) the payment made 12 months prior to applying for the temporary expanded process. There are key differences in the processes for applying for loan forgiveness under the PSLF program versus the temporary expanded process (see table 1). Despite broad borrower interest in the PSLF program and the temporary expanded process, very few borrowers have been granted loan forgiveness. A large number of borrowers are pursuing the PSLF program, but our 2018 analysis found that Education had denied about 99 percent of borrowers that applied for loan forgiveness through the PSLF program during the first 8 months that Education was accepting applications (September 2017 through April 2018), according to data from the PSLF servicer. According to Education’s most recent publically released PSLF program data through March 2019, PSLF program denial rates have continued to hover around 99 percent since our 2018 review. Of the 76,002 loan forgiveness applications that had been processed, the PSLF servicer had denied 75,138 (99 percent), as of March 2019. According to data as of March 2019, close to one-half of the PSLF program loan forgiveness applications the PSLF servicer had processed were denied because the borrower had not yet made 120 qualifying payments. The other most common reasons PSLF program applications were denied were because of missing information on the application or because the borrower did not have qualifying federal loans. For borrowers that have been approved, Education had forgiven almost $31 million in outstanding student loans, an average of more than $59,000 per approved borrower. Denial rates are also very high for the temporary expanded process. We recently reported that from May 2018 through May 2019, Education had denied 99 percent of the completed requests from about 40,000 borrowers (see fig. 1). The majority of requests borrowers submitted for the temporary expanded process were ineligible for consideration and were therefore denied because the borrower had not previously submitted an application for the PSLF program, according to data from the loan servicer. For the 1 percent of applications that were approved from May 2018 through May 2019, Education had granted almost $27 million in loan forgiveness under the temporary expanded process, totaling about 4 percent of the $700 million appropriated funds, according to our 2019 report. Borrowers received an average of about $41,000 in loan forgiveness. The high denial rates for the PSLF program and temporary expanded process suggest that many borrowers are confused by the requirements. In our 2018 report, we noted that officials from the PSLF servicer said that borrowers were frequently confused by the PSLF program requirements related to qualifying loans, employment, repayment plans, and payments. PSLF servicer officials also said that borrowers were sometimes unaware that they were not on a PSLF-qualifying repayment plan or that forbearance, deferment, and loan consolidation would affect their qualifying payments. For example, the Consumer Financial Protection Bureau has reported that borrowers have complained of spending years making payments, believing they were making progress towards PSLF loan forgiveness, and then learning that they were not eligible. Similarly, in our 2019 report on the temporary expanded process, we noted that officials from Education, the PSLF loan servicer, and representatives from selected organizations representing student borrowers all said that the requirement to submit an application for the PSLF program to be eligible for the temporary expanded process can confuse borrowers. We have previously reported on how shortcomings in the information Education provides to the PSLF servicer has resulted in uncertainty about PSLF program requirements and increased the risk of potential errors in borrower eligibility determinations. To address these issues, we have made three recommendations to Education to provide the servicer with comprehensive guidance and instructions, additional information on qualifying employers, and standardized prior payment information (see table 2). Education agreed with these recommendations and has taken some actions, but has not yet fully implemented them. In our 2018 report, we found that Education does not have a comprehensive document or manual to provide the PSLF servicer with guidance and instructions. This made it difficult to effectively administer the PSLF program and provide consistent service to borrowers, according to PSLF servicer officials. We reported that Education’s guidance and instructions to the PSLF servicer are dispersed in a piecemeal manner across multiple documents, including Education’s original contract with the servicer, multiple updates to the contract, and hundreds of emails. As a result, PSLF servicer officials said that their staff were sometimes unaware of relevant PSLF program guidance and instructions in emails provided by Education, which creates a risk that some policy updates will be overlooked and not consistently implemented. The absence of a central, authoritative source of PSLF guidance and instructions creates a risk of differing interpretations and inconsistent implementation. It also makes it difficult to maintain program continuity in the event of staff turnover or if Education decides to contract with a new servicer to administer the PSLF program. Federal internal control standards state that agencies should communicate information to those who need it, in a form that enables them to carry out their responsibilities. Around the time our 2018 report was issued, Education officials told us they planned to develop a comprehensive PSLF servicing manual, but they did not have a timeline for completing it. In response, we recommended that Education develop a timeline for issuing a comprehensive guidance and instructions document for PSLF servicing. Education agreed with this recommendation and reported in September 2019 that it was continuing its efforts to improve and streamline guidance for the PSLF servicer. While Education said it is working on developing its comprehensive PSLF servicing manual, it does not yet have a timeline for how it will complete this manual and has pushed back the estimated implementation date for this recommendation to 2020. To help ensure that program requirements are applied consistently by the PSLF servicer, we continue to believe that Education should fully implement this recommendation. In 2018, we reported that Education had not provided the PSLF servicer with a definitive source of information for determining which employers qualify a borrower for PSLF loan forgiveness. Instead, Education had identified some data sources the PSLF servicer can use to determine whether borrowers are working for qualifying employers. However, we found that these sources were not comprehensive, and that PSLF servicer officials said they sometimes had to consult other sources that have significant limitations. For example, PSLF servicer officials told us they used an online directory of nursing home facilities to help determine if certain nursing homes were nonprofit employers. However, this website explicitly stated that it did not guarantee that the information it provided was accurate or current. Federal internal control standards state that agencies should communicate the necessary quality information to those who need it, and PSLF servicer officials said that having additional information would help them assess employers more quickly and minimize the risk of inaccurate decisions. Borrowers would also benefit from additional information about qualifying employers, according to PSLF servicer officials, in part because it would help them make better informed employment decisions. Our 2018 report recommended that Education provide additional information to the PSLF servicer and borrowers to enhance their ability to determine which employers qualify for PSLF. Education agreed with this recommendation, and said it planned to incorporate qualifying employer information into an online PSLF Help Tool. As of September 2019, Education reported that it had incorporated a feature into its online PSLF Help Tool to help borrowers determine if their employer fits within general eligibility criteria. However, Education said more specific information to help the PSLF servicer make employer eligibility determinations and an employer database will not be available until 2020. We believe that if Education fully implements this recommendation to provide the servicer with more definitive employer information, it would help reduce the risk of errors in assessing employer eligibility for PSLF. In our 2018 report, we found that Education does not ensure that the agency’s other loan servicers provide the PSLF servicer consistent information on borrowers’ prior loan payments, which could increase the risk of qualifying payments being miscounted for the PSLF program. PSLF servicer officials said inconsistencies in the information provided by other loan servicers make it challenging to determine whether borrowers are on qualifying repayment plans or making qualifying payments. Officials with Education and the PSLF servicer said that these inconsistencies increase the risk of miscounting qualifying payments. This is contrary to federal internal control standards, which state that agencies should use quality information. Our 2018 report recommended that Education standardize the payment information that the PSLF servicer receives from other loan servicers to ensure the PSLF servicer obtains more consistent and accurate payment information. Education agreed with this recommendation and stated that efforts were underway to improve the consistency of payment information exchanged between servicers. As of September 2019, Education reported that it is planning to standardize this loan payment data by spring 2020. If Education implements this recommendation, we believe it would reduce the potential risk of qualifying PSLF payment count errors moving forward. We have previously reported on how unclear processes and a lack of information about the PSLF program and the temporary expanded process could contribute to borrower confusion and high denial rates. We have also reported that borrowers can face challenges detecting any errors in payment counts for the PSLF program and with contesting eligibility determinations for the temporary expanded process. To address these issues, we have made five recommendations to Education to improve service to borrowers by expanding outreach, streamlining processes, and providing information to help borrowers catch and resolve errors (see table 3). Education agreed with these recommendations, but has not yet taken sufficient actions to fully implement them. Education uses several methods to inform borrowers about the PSLF program and temporary expanded process requirements, including through its website and webinars. Congress also appropriated $4.6 million in 2018 for Education to conduct outreach to borrowers about PSLF, including the temporary expanded process. However, our recent work has found several areas in which the agency’s outreach activities related to the temporary expanded process are limited. While Education and PSLF loan servicer officials told us that they primarily direct borrowers to online sources to inform them about requirements for the temporary expanded process, we found that the agency does not include information about the temporary expanded process in key online sources. For example, according to agency officials, one of Education’s primary PSLF outreach mechanisms—the online PSLF Help Tool, which the agency launched in December 2018—does not include any information about the temporary expanded process. Officials from Education and the PSLF servicer stated that integrating information about the temporary expanded process into the online PSLF Help Tool would be beneficial for borrowers and would reduce confusion about the temporary expanded process. In addition, our 2019 report found that while all nine of Education’s loan servicers’ websites contain some information on the PSLF program, none of them (other than the PSLF loan servicer) included information about the temporary expanded process on their websites or provided a link to Education’s website specific to the temporary expanded process. Education officials told us that only the PSLF servicer is required to have information about the temporary expanded process on its website; however, other loan servicers may also serve borrowers who are potentially eligible but may be unaware of the temporary expanded process. This limited outreach to borrowers about the temporary expanded process reduces the likelihood that borrowers are able to take advantage of this opportunity. Further, federal internal control standards state that management should externally communicate the necessary quality information to achieve the entity’s objectives. To improve Education’s borrower outreach about the temporary expanded process, our September 2019 report recommended that Education include information about the temporary expanded process in its online PSLF Help Tool and that Education require all loan servicers to provide information about the temporary expanded process on their websites. Education agreed with both of these recommendations, and stated that it would take steps to address them. If Education implements these two recommendations, we believe it would help the department provide better service to borrowers by raising awareness of the temporary expanded process and requirements. In September 2019, we reported that Education’s process for requesting loan forgiveness through the temporary expanded process is not clear to borrowers and may contribute to high denial rates. In particular, the requirement that borrowers must have already submitted a separate PSLF application in order to be eligible for loan forgiveness through the temporary expanded process can confuse borrowers. Borrowers currently must submit a separate PSLF application, even if they know it will be denied, before Education will consider their request for forgiveness through the temporary expanded process. Education officials acknowledged that the majority of requests for the temporary expanded process come from borrowers who have not first submitted a PSLF application. Similarly, our September 2019 report found that 71 percent of the denied requests were denied because the borrower had not submitted a PSLF application. Officials from the PSLF loan servicer said that borrowers who called were frequently confused when they received a denial for the temporary expanded process based on the fact that they had not first submitted an application for the PSLF program. This lack of a borrower-friendly process complicates the path towards loan forgiveness and does not align with Education’s strategic plan objective to improve the quality of service to customers. To address this issue, our 2019 report recommended that Education streamline the process for borrowers to request loan forgiveness through the temporary expanded process by integrating the request for temporary expanded process consideration into the PSLF application, eliminating the need for borrowers to submit a separate PSLF application prior to consideration. Education agreed with this recommendation and stated that it will integrate requests for the temporary expanded process into the PSLF application as part of its ongoing initiative to overhaul its online portal for student loan borrowers. Implementation of this recommendation would improve service to borrowers by making the process easier and less confusing. In 2018, we reported that although Education and PSLF servicer officials acknowledged the risk of miscounting qualifying payments, the PSLF servicer did not provide borrowers with sufficient information to easily identify PSLF program errors. Officials with the PSLF servicer said they rely on borrowers to catch any payment counting errors resulting from issues with information provided by other loan servicers. As we reported, the PSLF servicer provided borrowers with aggregate counts of qualifying payments, which are useful for helping borrowers track their progress, but did not provide borrowers with enough detail to check the servicer’s counts and identify prior payments that the servicer may have missed. This is also contrary to federal internal control standards which call for communicating necessary information to external parties. Our 2018 report recommended that Education ensure that borrowers receive sufficiently detailed payment information from the PSLF servicer to be able to identify any errors in the servicer’s counts of qualifying payments. Education agreed with this recommendation and stated that efforts were underway to standardize the payment count information that is provided to borrowers. As of September 2019, Education reported that it is reviewing communications from the PSLF servicer to ensure that borrowers receive sufficiently detailed information regarding payment counts and payment history and that this review will be completed by September of 2020. To help borrowers detect potential payment counting errors that could ultimately affect their eligibility for the PSLF program, we believe Education should implement this recommendation and provide borrowers with more detailed qualifying payment information. Further, our 2019 report on the temporary expanded process found that Education does not provide complete information to borrowers about options they have to contest payment counts or other aspects of the eligibility determination process. An Education official told us that while there is no formal process for borrowers who are dissatisfied with their temporary expanded process determinations to contest the determination, borrowers do have additional options for addressing concerns, such as an additional review by the PSLF servicer, or a complaint to Education’s Federal Student Aid Feedback System or Ombudsman. Education officials told us that the agency does not provide information about these options in its denial letters or on its website for the temporary expanded process, noting that borrowers could find this information at the bottom of Education’s Federal Student Aid main website. However, borrowers may not know where to find this information should they choose to contest their temporary expanded process determination, because this information is not effectively communicated to them in accordance with federal internal control standards. To address this, our 2019 report recommended that Education provide borrowers with more information on the website for the temporary expanded process and in the servicer’s denial letters about options available to borrowers should they wish to contest the servicer’s decision. Education agreed with this recommendation and stated that it would add information about the options borrowers have to contest temporary expanded process decisions to relevant websites and denial letters. Implementing this recommendation will increase the likelihood that borrowers with valid concerns about the temporary expanded process will have them appropriately resolved. In conclusion, my statement has highlighted several actions Education could take to strengthen the PSLF program and the temporary expanded process to deliver on the promise the federal government has made to borrowers pursuing careers in public service. Education is responsible for establishing an administrative structure for the loan servicer, but more than 10 years after the PSLF program was first established, Education has not provided the loan servicer with a comprehensive source of guidance and instructions on how to operate the PSLF program, and could provide additional information to help ensure that eligibility determinations are being made correctly. Education is responsible for ensuring that borrowers are aware of and understand programmatic requirements. However, the high denial rates for the PSLF program and its temporary expanded process suggest that borrowers are still confused. It is also important for Education to maintain borrower confidence, but the department has not provided critical information to borrowers to help them remedy potential errors. Large numbers of borrowers have pursued careers in public service, sometimes at lower pay than in the private sector, with the hope of one day achieving loan forgiveness through the PSLF program. They have often had to navigate the PSLF program requirements with a lack of sufficient information from Education only to be denied 10 years later when they applied for loan forgiveness because their prior years of employment or loan payments did not qualify. In addition, some borrowers who were denied may not be aware that they might be eligible for loan forgiveness through the temporary expanded process, potentially missing out on this temporary opportunity. Education needs to take action to better serve these borrowers and help smooth their long road towards loan forgiveness. Education has not yet taken action to fully implement the eight recommendations discussed in this testimony. We continue to believe that implementing these eight recommendations would strengthen program administration, improve service to borrowers, and help to fulfill the original goal of encouraging individuals to enter and continue in public service employment. We will continue to monitor Education’s efforts in these areas. Chairwoman Davis, Senior Republican Smucker, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Melissa Emrey-Arras, Director of Education, Workforce, and Income Security, at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include William Colvin (Assistant Director), Nora Boretti (Analyst-in-Charge), Linda Collins, and Aaron Karty. Additional support was provided by James Bennett, Deborah Bland, Alex Galuten, Lara Laufer, Sheila R. McCoy, and Jessica Orr. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The PSLF program was established in 2007 and forgives borrowers' remaining federal student loan balances after they have made at least 10 years of qualifying loan payments while working in public service. Starting in September 2017, the first borrowers potentially became eligible for the PSLF program and began applying to have their loans forgiven. In 2018, Congress appropriated $700 million to temporarily expand the PSLF program for certain borrowers who initially did not qualify for the program. This statement—based on GAO's reports issued in September 2018 ( GAO-18-547 ) and September 2019 (GAO-19-595 )—discusses (1) the extent to which borrowers' requests for loan forgiveness through PSLF and the temporary expanded process have been approved or denied, (2) the extent to which Education provides the PSLF servicer with sufficient information to administer the program, and (3) opportunities for improving service to borrowers. A large number of borrowers are pursuing the Public Service Loan Forgiveness (PSLF) program, but the Department of Education (Education) has denied about 99 percent of loan forgiveness applications as of March 2019. Close to one-half of these applications were denied because the borrowers had not yet made the required 120 qualifying monthly loan payments. As of May 2019, Education has also denied 99 percent of loan forgiveness requests made through the temporary expanded process, which is intended for borrowers who did not initially qualify for the PSLF program. In its 2018 report, GAO found that shortcomings in the information Education provided to the loan servicer that administers the PSLF program increased the risk of administrative errors. For example, Education had not provided the PSLF servicer with a definitive source of information for determining which employers qualify. GAO made three recommendations to Education to address these issues (see table below). Education agreed with these recommendations and has taken some actions, but has not yet fully implemented them. In its 2018 and 2019 reports, GAO found that Education can provide better service to borrowers by expanding outreach, streamlining processes, and sharing critical information with borrowers. For example, GAO found that Education does not include information for borrowers about the temporary expanded process in key online sources. GAO made five recommendations to Education to address these issues with the PSLF program and the temporary expanded process (see table below). Education agreed with these recommendations, but has not yet fully implemented them. GAO has made eight recommendations to Education to improve its implementation of the PSLF program and its temporary expanded process. Education agreed with GAO's recommendations. As of September 2019, GAO continues to believe that actions are necessary to fully implement all of the recommendations discussed in this statement.", "document_type": "gao"}
{"report": "At VA, and indeed at all federal agencies, strategic human capital management plays a critical role in maximizing the government’s performance and assuring its accountability to Congress and the nation as a whole. As we have long reported, there is a direct link between the effectiveness of an agency’s personnel management efforts and its ability to carry out its mission. Addressing challenges in areas such as disaster response, homeland security, economic stability, and numerous other complex and evolving issues requires a skilled federal workforce able to work seamlessly with other agencies, levels of government, and nongovernmental entities. In our March 2019 report, we identified key trends in agency operations and attitudes toward work that are affecting how federal work is done and, consequently the skills and competencies that workers will need to accomplish agency missions. Agencies will need to apply appropriate talent management strategies that are adapted to these trends to recruit, develop, and retain a high-performing workforce and better meet their missions (see fig. 1). Over the past two decades, we and others have expressed concern about certain human capital practices at VA and its components. For example, in November 2018, VA’s Office of Inspector General identified leadership and workforce investment as a major management challenge. The Inspector General noted that the root cause for many of the issues it identified at VA was poor and unstable leadership as well as staffing shortages. Similarly, in May 2019, we reported that leadership turnover impeded VA’s ability to address a number of management challenges we identified such as managing acquisitions, managing risk, and improving veterans’ health care. At VHA, we found that serious human capital shortfalls are undermining its ability to meet the health care needs of veterans. Key examples from our prior work include the following: In March 2019, we reported that VHA’s 172 medical centers have large staffing shortages, including physicians, registered nurses, physician assistants, psychologists, and physical therapists, as well as HR specialists and assistants. As of December 2018, VA reported an overall vacancy rate of 11 percent at VHA medical facilities, including vacancies of over 24,000 medical and dental positions and around 900 HR positions. In July 2016, we found that losses in VHA’s five clinical occupations with the largest staffing shortages, including physicians, registered nurses, and psychologists, increased from about 5,900 employees in fiscal year 2011 to about 7,700 in fiscal year 2015. Voluntary resignations and retirements were the primary drivers. VHA’s exit survey indicated that advancement issues or dissatisfaction with certain aspects of the work, such as concerns about management and obstacles to getting the work done, were commonly cited as the primary reasons people left. In December 2016, we found that several problems combined to impede VHA’s ability to improve delivery of health care services to veterans. These problems include high attrition (often involving transfers to other federal agencies), increased workload, and burnout among VHA’s HR staff. Another issue is a lack of effective internal control practices to support HR operations such as information systems that meet operational needs (see fig. 2). In our preliminary findings in a forthcoming report on the extent to which succession planning policies and procedures at VA and its components are consistent with key leading practices, we have identified several concerns. For example, according to VA officials, the agency has not produced a department-wide succession plan since 2009 due to leadership turnover. Department-wide, around 30 percent of VA employees on board as of September 30, 2017, will become eligible to retire in the next 5 years. Effective succession planning can help VA ensure it has a pipeline of talent to meet current and future mission requirements. In our prior work, we noted that effective succession planning is more than filling existing vacancies with people that have the same occupational skills and competencies. Rather, succession planning focuses on current and future needs and develops pools of high-potential staff to meet the organization’s mission over the long term. We have designated 40 of our prior recommendations to VA as priority recommendations because, upon implementation, they may have an especially significant impact on VA’s operations. Twelve of these priority recommendations are aimed at strengthening VA’s human capital management efforts and will help address VA’s challenges in such areas as recruiting and retaining doctors and nurses, performance management, and employee misconduct. To date, VA has implemented six of these priority recommendations, but needs to take additional action on the other six. While VA agreed or partially agreed with and is taking steps to implement five of these remaining priority recommendations, it disagreed with one related to developing a process to accurately count all physicians at each VA medical center because it does not believe this affects its ability to assess workload. Nevertheless, we continue to believe that VHA needs a systematic process to identify all physicians working at VA medical centers as part of the agency’s efforts to monitor and assess workload. The six unimplemented priority recommendations are for VA to 1. develop a process to accurately count all physicians providing care at each VA medical center (recommended in 2017), 2. develop a modern and effective performance management system in which VA managers make meaningful distinctions in employees’ performance ratings (recommended in 2016), 3. ensure that ratings-based performance awards are administered in a manner that is consistent with leading practices (recommended in 2016), 4. develop a plan to implement a modern information technology system to support employee performance management processes (recommended in 2016), 5. collect complete and reliable misconduct and associated disciplinary action data (recommended in 2018), and 6. ensure that employees who report wrongdoing are treated fairly and protected against retaliation (recommended in 2018). We will continue to monitor VA’s progress in implementing these and our other open recommendations. Beyond these specific recommendations, VA and other agencies can use talent management strategies to better compete for critical positions in a tight labor market and to help meet agency missions. In our prior work we noted that while these strategies are not an exhaustive list, collectively they suggest basic steps that agencies can take within existing authorities to address the demographic and technological trends affecting work that are discussed earlier in this statement. These strategies include: Align human capital strategy with current and future mission requirements. With shifting attitudes toward work, technological advances, and increased reliance on nonfederal partners, agencies need to identify the knowledge and skills necessary to respond to current and future demands. Key practices include identifying and assessing existing skills, competencies, and skills gaps. Acquire and assign talent. To ensure agencies have the talent capacity to address evolving mission requirements and negative perceptions of federal work (e.g., that it is too bureaucratic), agencies can cultivate a diverse talent pipeline, highlight their respective missions, recruit early in the school year, support rotations, and assign talent where needed. Incentivize and compensate employees. While federal agencies may struggle to offer competitive pay in certain labor markets, they can leverage existing incentives that appeal to workers’ desire for schedules and locations that provide work-life balance. Engage employees. Engaged employees are more productive and less likely to leave. Agencies can better ensure their workforces are engaged by managing employee performance, involving employees in decisions, and developing employees. A number of the staffing challenges facing VA are actually part of a broader set of human capital issues affecting government as a whole. As we noted in our March 2019 update of government high-risk areas, the federal government faces long-standing challenges in strategically managing its workforce. We first added strategic human capital management to our list of high-risk government programs and operations in 2001. Although Congress, OPM, and individual agencies have made improvements since then, strategic human capital management remains a high-risk area because mission-critical skills gaps within the federal workforce pose a high risk to the nation. Of the 34 other high-risk areas on our 2019 High-Risk List, skills gaps played a significant role in 16 of the areas, including information technology management and acquisitions, strengthening management functions at the Department of Homeland Security, and, as noted above, veterans’ health care at VA. While causes for these skills gaps related to high-risk areas vary, they often occur because of a shortfall in talent management activities such as robust workforce planning or training. Additionally, the changing nature of federal work and the high percentage of employees eligible for retirement have the potential to produce gaps in leadership and institutional knowledge and could threaten to aggravate the problems created from existing skills gaps. For example, 31.6 percent of permanent federal employees who were on board as of September 30, 2017 will be eligible to retire in the next 5 years, with some agencies having particularly high levels of employees eligible to retire. High-performing organizations have found that the full life cycle of human capital management activities needs to be fully aligned and focused on the cost-effective achievement of an organization’s mission. These activities include workforce planning, recruitment, on-boarding, compensation, engagement, succession planning, and retirement programs. Further, adding to agencies’ staffing challenges is the fact that much has changed since the Civil Service Reform Act of 1978 and the Classification Act of 1949 laid the foundation of much of today’s federal personnel system. Agencies’ missions have evolved and employees’ expectations of work and the workplace are changing. As a result, the extent to which the current and future workforce finds the government’s employment policies and practices relevant is an open question. We and others have identified several structural challenges within the federal human capital system that impede the ability of agencies to recruit, retain, and develop workers, both today and in the future. For example: Classification system. The General Schedule classification system—which defines and organizes federal positions primarily to assign rates of pay—has not kept pace with the government’s evolving requirements. Recruiting and hiring. Federal agencies need a hiring process that is applicant friendly and flexible while also meeting policy requirements. Pay system. Employees are compensated through an outmoded system that (1) rewards length of service rather than individual performance and contributions, and (2) automatically provides across- the-board annual pay increases, even for poor performance. Performance management. Federal agencies have faced long- standing challenges developing modern, credible, and effective employee performance management systems and dealing with poor performers. Going forward, to help agencies effectively carry out their missions, OPM and federal agencies must take some important steps to address ongoing human capital problems. These actions include continuing to develop the capacity to measure and address existing mission-critical skills gaps and using workforce analytics to predict and mitigate future gaps. Chairman Takano, Ranking Member Roe, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Robert Goldenkoff, Director, Strategic Issues, at (202) 512-2757 or GoldenkoffR@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Shirley Hwang (Assistant Director), Alexander Ray (Analyst-In-Charge), Sarah Green, Allison Gunn, and Shelby Kain. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VA operates one of the largest health care delivery systems in the nation and provides billions of dollars in benefits and services to veterans and their families. However, VA faces serious and long-standing problems with management challenges and veterans' access to health care and disability benefits. These issues contributed to GAO's decision to list several areas involving VA on GAO's High-Risk List, including managing acquisitions, managing risk and improving veterans' health care, and improving and modernizing VA's disability programs. This testimony discusses (1) human capital challenges facing VA and its components, (2) GAO recommendations addressing some of those challenges, and (3) how those challenges are related to a broader set of government-wide human capital problems. This testimony is based on GAO's work on VA issued since 2017, as well as GAO's work on government-wide strategic human capital management issued since July 2014. To conduct these studies, GAO reviewed key agency documents and government-wide employment data and interviewed knowledgeable agency officials and managers, as well as subject matter specialists. Serious human capital shortfalls are undermining the Department of Veterans Affairs' (VA) ability to provide veterans with quality and timely services. Over the past two decades, GAO has identified major challenges with VA human capital practices. For example, in March 2019, GAO found large staffing shortages, including physicians and registered nurses, at the Veterans Health Administration's (VHA) 172 medical centers. In December 2016, GAO found that high attrition, increased workload, and burnout among VHA's human resources (HR) staff, along with ineffective internal controls to support its HR operations, have impeded VHA's ability to serve the nation's veterans (see figure). Continued leadership attention to addressing GAO's recommendations could help VA better execute its mission. GAO has made numerous recommendations to VA, 40 of which were designated as priorities because they could significantly improve VA's operations. Twelve of the 40 were aimed at strengthening VA's human capital management efforts. Of these, six have been addressed. However, VA still needs to take additional actions on the other six, such as developing a modern and effective performance management system. Beyond these priority recommendations, VA can use key talent management strategies that GAO has identified for acquiring, incentivizing, and engaging employees and thus be more competitive for a high-performing workforce in a tight labor market. Some of the challenges facing VA are part of a larger set of human capital issues affecting government as a whole. Although Congress, the Office of Personnel Management, and individual agencies have made improvements in recent years, human capital management in general remains a high-risk area because of mission-critical skills gaps within the federal workforce. Structural issues impede the ability of agencies to recruit, retain, and develop workers, including outmoded position classification and pay systems, ineffective recruiting and hiring processes, and challenges in dealing with poor performers. GAO has designated 40 of its prior recommendations to VA as priorities for implementation. Twelve of these priority recommendations are aimed at strengthening VA's human capital management efforts. To date, VA has implemented six of these priority recommendations, but needs to take additional action on the other six. GAO will continue to monitor VA's progress in implementing these recommendations.", "document_type": "gao"}
{"report": "DOD started the F-35 program in 2001 to develop a fifth-generation fighter aircraft intended to replace a range of aging aircraft in the U.S. military services’ inventories and to provide enhanced capabilities to warfighters that capitalized on technological innovations. Among other capabilities, the program designed the F-35 aircraft to be difficult to observe using radar and include sensors that can provide insights into potential targets and other warfighting information. The program is producing and delivering three variants of the F-35 aircraft: the F-35A conventional takeoff and landing variant for the Air Force, the F-35B short takeoff and vertical landing variant for the Marine Corps, and the F-35C carrier-suitable variant for the Marine Corps and the Navy. The characteristics of the services’ variants are similar, but each variant also has unique operating requirements. For example, the Marine Corps requires that the F-35B be capable of operating from aircraft carriers, amphibious ships, and main and austere operating bases alike, requiring the capability to conduct short takeoffs and vertical landings. Figure 1 shows an F-35B exercising this capability. While DOD plans to purchase 2,470 aircraft for the U.S. services, the F- 35 program is acquiring more than just aircraft. The complete F-35 air system has eight elements, including training and maintenance systems. Figure 2 shows the eight elements that make up the entire F-35 Air System and how they each support the aircraft. For example, the program intends for the Automated Logistics Information System (ALIS) to provide the necessary logistics tools to F-35 program participants as they operate and sustain the F-35 aircraft. To do this, ALIS consists of multiple software applications designed to support different squadron activities, such as supply chain management, maintenance, training management, and mission planning. For the F-35 aircraft to have full capability, each element of the air system has to be developed and fielded in sync with the aircraft. However, we found in March 2020 that problems with ALIS still pose significant challenges to day-to-day F-35 operations. According to DOD, it plans to replace ALIS with a new system named the Operational Data Integrated Network (ODIN). Furthermore, DOD reports that it is currently developing a strategy for ODIN, which will include key tasks, milestones and schedule, risks and opportunities, governance structure, and cost estimates. We concluded that, as DOD proceeds with replacing ALIS with ODIN, it will be important for the department to carefully consider and assess the key technical and programmatic uncertainties that we reported in March 2020. These include how much of ALIS will be incorporated in ODIN and the extent to which DOD has access to the data it needs to play a more active role in the management of the system. These issues are complex, and will require significant direction and leadership to resolve. Further, we reported in March 2020 that the F-35 program office was not able to provide us with historic costs showing how much the department had spent on ALIS over the years. Also, because DOD had not answered key questions about the future of the system, such as the extent to which the re-design will incorporate current ALIS software, DOD has not been able to develop accurate cost estimates for the ALIS re-design. We recommended that DOD develop and implement a strategy for the re- design of ALIS. The strategy should be detailed enough to clearly identify and assess the goals, key risks or uncertainties, and costs of re- designing the system. DOD concurred with the recommendation. DOD began development of the F-35 aircraft in 2001 without adequate knowledge of its critical technologies or a solid design, as we reported in March 2005. DOD’s acquisition strategy also called for high levels of concurrency between development and production—building aircraft while continuing to refine the designs of key components—which runs counter to GAO’s leading practices for major defense acquisition programs. In our prior work, we identified the F-35 program’s lack of adequate knowledge and high levels of concurrency as the major drivers of the program’s eventual significant cost and schedule growth, among other performance shortfalls. Since 2001, the program has been rebaselined with new cost and schedule estimates three times. DOD initiated the most recent restructuring in 2010 when the program’s cost estimates for each aircraft exceeded critical thresholds established by statute—a condition known as a Nunn-McCurdy breach. DOD then established a new acquisition program baseline that increased the program’s cost estimates by $162.7 billion and extended delivery schedules 5-6 years into the future. This last revision is the current program baseline, reflecting the cost and schedule estimates to deliver the aircraft and systems and to meet the original program requirements. From 2018 to 2019, the total cost estimate of the F-35 acquisition program increased by $22 billion, from $406 billion to over $428 billion. This increase was partially due to the addition of the estimated Block 4 modernization costs. Block 4 includes efforts to enhance and add capabilities—beyond the F-35 baseline program—through hardware and software upgrades. In April 2019, the F-35 program estimated that Block 4 development and procurement costs would add $13.9 billion to the program’s total baseline cost. Beyond this Block 4 increase, the F-35 program baseline costs also increased by $8 billion over the program’s 2018 estimate. Table 1 outlines the program’s baseline costs, the Block 4 modernization costs, and the sum total of the baseline and Block 4 cost estimates since 2001. In addition to the acquisition costs above, the program estimates that the sustainment costs to operate and maintain the F-35 fleet for its planned 66-year life cycle are $1.2 trillion, bringing the total cost of the F-35 program to over $1.6 trillion. The F-35 program office, in coordination with the Director of Operational Test and Evaluation (DOT&E), received approval to conduct some preliminary operational testing in January 2018. This included weapons, cybersecurity, and cold weather testing, among other things. The program’s formal operational testing (conducted by DOT&E) started in December 2018 and was ongoing in 2019. The purpose of operational testing is to assess the effectiveness, suitability, survivability, lethality, and mission capability of the F-35, including the information systems and the air vehicle, in an operationally representative environment. Operational testing includes cybersecurity assessments, some of which the program has conducted. The program plans for the remaining testing to take place through at least September 2020, while the program continues to produce and deliver aircraft. Through 2019, F-35 program test officials had identified over 3,200 deficiencies. Deficiencies represent specific instances where the weapon system either does not meet requirements or where the safety, suitability, or effectiveness of the weapon system could be affected. The test officials categorize deficiencies according to their potential impact on the aircraft’s performance. Category 1 deficiencies are critical and could jeopardize safety, security, or another requirement. Category 2 deficiencies are those that could impede or constrain successful mission accomplishment. In June 2018, we recommended that the program resolve all critical deficiencies before making a full-rate production decision, in part, to reduce the potential for additional concurrency costs stemming from continuing to produce aircraft while testing was ongoing. DOD concurred with our recommendation and stated that it would resolve critical deficiencies before full-rate production, currently planned to occur between September 2020 and March 2021. Production of the aircraft began one year after testing started in 2007, while development was in its early stages. Due to the concurrency of testing and production, according to an F-35 program official, as many as 550 aircraft delivered through 2020 will need retrofits to fix deficiencies and design issues found during testing. The program refers to the cost of these fixes as its concurrency cost, which the program estimates at $1.4 billion; this estimate did not change with the program’s last update in 2019. Until operational testing is complete, there is a risk that the program may identify additional deficiencies. As a result, as we have previously reported, the concurrency costs of retrofitting delivered aircraft could increase. In our June 2018 report, we found that the program was not on track to meet its reliability and maintainability (R&M) performance targets. R&M targets indicate how much time the aircraft will be in maintenance rather than operations. We concluded that the program was missing a prime opportunity to infuse affordability into the aircraft’s future with better R&M performance. As a result, we recommended that the F-35 program office identify what steps it needed to take to ensure the F-35 meets R&M requirements and update the R&M Improvement Program with these steps. DOD concurred with the recommendations, noting that the F-35 program office would update the R&M Improvement Program with the steps needed to ensure continued progress towards its goals. In April 2019, we found that F-35 R&M performance had shown some small improvements but that the program could take more actions to meet the R&M targets. We made additional recommendations to the Secretary of Defense, with which DOD concurred and has taken some actions to implement. Currently, the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD (A&S)) is the acquisition decision authority for the F-35 program, and would direct the F-35 program office to take any further actions. In 2019, the program’s R&M performance generally remained unchanged. However, measurable improvements in R&M can take time to manifest. For example, fielded aircraft must be modified and flown for many hours before the program can measure improvements. For details about the R&M performance, see appendix IV. As we have previously reported, even though operational testing of the baseline program remains ongoing, the F-35 program office has turned its attention to Block 4 modernization activities using a different development approach. DOD refers to this approach as Continuous Capability Development and Delivery (C2D2). This method is loosely based on the Agile software development process. With this approach, the program plans to deliver capabilities to the warfighter faster than it did during the baseline development program. For example, rather than take years to develop and deliver all the required capabilities to the warfighter, the program intends to incrementally develop, test, and deliver small groups of capabilities every 6 months. In January 2018, to transition from the baseline development program to its Block 4 activities, the F-35 program started using the C2D2 approach to develop and test software updates to address deficiencies identified during testing. The planned $13.9 billion Block 4 effort exceeds the statutory and regulatory thresholds for what constitutes a major defense acquisition program, and Block 4 is more expensive than many of the other major weapon acquisitions already in DOD’s portfolio. To provide better oversight into Block 4 activities, in 2016, we recommended that the Secretary of Defense hold a milestone B review—a critical point in an acquisition program leading to the engineering and manufacturing development phase—and manage it as a separate major defense acquisition program. DOD did not concur with our recommendation, and it continues to manage Block 4 within the larger F-35 program. We maintain that DOD should manage the Block 4 activities as a separate program. In 2019, the F-35 program conducted a majority of its planned operational testing but added 9 months to the schedule to complete the remaining tests. Specifically, as of February 2020, according to test officials, the program completed 156 flight tests. The program must still conduct four open-air flight tests, the remaining cybersecurity tests of the air vehicle and mission systems, and 64 simulated flight tests. The 9-month delay needed to complete testing, however, also provides additional time for the program to address our June 2018 recommendation that it resolve critical deficiencies before making its full-rate production decision, currently planned to occur between September 2020 and March 2021. Figure 3 shows the test schedule as of 2019, the delay to the schedule into 2020, and the remaining tests events planned. The completion of operational testing hinges on three main tasks: (1) the final four open-air flight tests; (2) cybersecurity testing; and (3) the final development, integration, verification and validation of its simulator and 64 simulated flight tests. First, the program expects to complete the four remaining open-air tests between March and April 2020. To conduct these tests, the program must finish moving the Radar Signal Emulators—test assets that simulate long- range threat radars—from the Nevada Test and Training Range to the Point Mugu Sea Range in California. According to test officials, there is some risk with this move, such as damage to the sensitive test equipment. The test facilities will have to integrate the equipment into the testing infrastructure at Point Mugu. Second, while the program has conducted cybersecurity testing on several aspects of the F-35 aircraft and support systems, three air vehicle subsystems tests and two enterprise-level ALIS tests remain. The program expects to complete these by August 2020.The tests completed to date have identified multiple cybersecurity vulnerabilities. The F-35 program office has taken steps to address some identified vulnerabilities and is working to address the remainder. Test officials stated that some of the delays to cybersecurity testing of the aircraft are due to safety concerns and the risk of losing the use of a test aircraft before testing is complete. According to DOD policy, cybersecurity testing should be conducted as early in the operational test cycle as possible. Leaving this critical testing to the end of operational testing adds risk to the program because the program will not know the extent to which the aircraft may have cybersecurity vulnerabilities until near the expected decision to proceed to full-rate production. If the program cannot finish these tests by September 2020, officials stated that DOT&E could require that the cybersecurity testing be completed in follow-on testing and not hold up the full-rate production decision. Any additional cybersecurity vulnerabilities may require more time to develop and implement plans to address vulnerabilities in aircraft that have already been produced and those slated for production. Lastly, the program has not been able to complete the F-35 Joint Simulation Environment, which we refer to as the aircraft simulator, on time. The simulator runs the F-35’s mission systems software along with other software models (such as other weapons and modern threat systems) to provide complex test scenarios that the program cannot replicate in a real-world environment. We reported in April 2019 that the simulator’s development was behind schedule and was a risk to operational testing. Since then, the program has struggled to develop the complex software and functionality needed to complete the simulator. The difficulties stem, in part, from the program office’s original plan to have the contractor, Lockheed Martin, develop the simulator. However, in August 2017, program office officials decided that the contractor’s proposal was considered to be too expensive. To mitigate concerns over the cost of the proposal, the program decided to have the Navy complete the work. The program originally expected the Navy’s simulator to be ready for testing in 2017, but it is now 3 years behind schedule. According to program office officials, the simulator’s development effort has taken longer than expected to integrate F-35 aircraft and sensor data, in part because the contractor claimed the data as its own intellectual property. These issues were resolved by 2019 when the contractor provided the necessary data. Because of these delays, the program now expects that the simulator will be ready by August 2020, with the planned simulator testing expected to take about 3 weeks. According to test officials, there is increased risk that the completion of the simulator may face additional delays to correct deficiencies and add needed capabilities, but also stated that they can complete the tests by August 2020. Due to these delays to completing operational testing, the program has delayed its full-rate production decision by at least an additional 9 months. Though the program is working toward September 2020, the program has acknowledged this decision could be made as late as March 2021. Any additional delays due to challenges with moving the emulators, completing the simulator, or cybersecurity testing could further delay the end of operational testing and the program’s decision to enter into full-rate production. This delay, however, gives the program more time to complete two key steps consistent with statute and DOD policy. Complete operational testing, which is intended to demonstrate that the aircraft are operationally suitable. Resolve all deficiencies, which should be done prior to full-rate production, and is discussed below. Even with these delays, the program plans to have produced and delivered over 550 aircraft before operational testing is complete, adding to the risk of finding more deficiencies that will require retrofits—at additional cost—for the delivered aircraft. Statute and DOD policy states that the preliminary low-rate production quantities will be set at the development request for proposal decision point. If, at that time, low-rate initial production quantities are determined to be above 10 percent of the total quantity planned, the Secretary of Defense must explain the reasons for the increase in a report to Congress. When a program reaches the planned low-rate initial production quantity, and requires to exceed the quantity, the program may seek approval to produce quantities above that amount. The F-35 program will have delivered more than 10 percent of the total planned production quantities—due to the necessity to prevent a break in production—before operational testing and the full-rate production decision are complete. As noted above, this approach has contributed to the $1.4 billion in concurrency costs already incurred by the program. The program reports that none of the category 1 deficiencies is a safety of flight concern and all of them have operational workarounds. In 2019, the program split the category 1 deficiencies into two groups. Group A are deficiencies that may cause death, severe injury, severe occupational illness, or major loss or damage to equipment and has no workaround. The program has none of these deficiencies currently. Group B are deficiencies that may critically restrict the combat readiness capabilities or may result in adequate performance but not be able to accomplish the primary or alternate missions. All of the 9 category 1 deficiencies are in group B. In 2019, the F-35 program resolved nearly 300 of the deficiencies it had identified in developmental and operational testing, but discovered even more over the same period. Specifically, 331 new deficiencies were identified in operational testing during 2019. As of December 2019, the F- 35 program had 870 open deficiencies. Of the 870 open deficiencies, the program characterizes nine as category 1 and 861 as category 2. The program reports that none of the category 1 deficiencies is a safety of flight concern and all of them have operational workarounds. In 2019, the program split the category 1 deficiencies into two groups. Group A are deficiencies that may cause death, severe injury, severe occupational illness, or major loss or damage to equipment and has no workaround. The program has none of these deficiencies currently. Group B are deficiencies that may critically restrict the combat readiness capabilities or may result in adequate performance but not be able to accomplish the primary or alternate missions. All of the 9 category 1 deficiencies are in group B. Of the 9 open category 1 deficiencies, the program reports all have operational workarounds—procedures that avoid encountering the deficiency. This represents four fewer open category 1 deficiencies than we reported in April 2019, reflecting the resolution of previously identified deficiencies and the addition of new ones, some of which were resolved. For example, the program fielded a software fix to a category 1 deficiency, which showed that the F-35’s cockpit display could falsely indicate its AIM-9X weapon—an air-to-air missile—selection status as “selected” though the weapon’s status is not selected. Figure 5 shows the F-35 firing an AIM-9X missile. The program office plans to continue to address the open deficiencies, but officials report that some will not be fully resolved for several years. Further, some deficiencies may not be resolved ever and some may be resolved well after the program has completed testing, and after it expects to have made a full-rate production decision. According to DOT&E, there are many significant deficiencies the program should address to ensure the F-35 baseline aircraft configuration is stable prior to adding all of the new capabilities planned in Block 4. As of December 2019, the program office and the contractor have resolved over 2,300 deficiencies and program office officials stated that they have a process in place to address the high priority ones. In 2019, the program reported continuing to negotiate lower unit prices across all F-35 aircraft variants and delivered more aircraft on time. However, officials also reported that the airframe and engine contractors demonstrated some declines in production performance, such as the number of labor hours to produce each aircraft, as production rates increased. We also identified other risk indicators that could affect the contractors’ future production performance. Specifically, the airframe contractor’s manufacturing processes do not meet all manufacturing leading practices that programs should meet before full-rate production. Additionally, parts shortages increased significantly in 2019 and Turkey’s suspension from the program will likely further complicate existing supply chain challenges. According to the program office, the negotiated prices for all F-35 variants have generally been decreasing with each production lot and as more aircraft are being procured in each lot. In April 2019, we reported that the program set a goal of reducing the negotiated unit price of an F-35A to less than $80 million by lot 13. According to a program official, in October 2019, the program finalized the contract action for lots 12-14 that met this goal. Specifically, with the most recent contract, the program agreed to purchase 351 F-35As, with unit costs declining to $73 million in lot 14. Figure 6 shows how the negotiated price for an F-35A has decreased since production began, as reported by the program office. According to the program office, it negotiated lower unit prices by working with the airframe contractor to leverage economic order quantity purchases and invest in cost reduction initiatives. Economic order quantities involve the contractor making large purchases of components that it will use across multiple procurement lots of aircraft to reduce production costs by achieving economies of scale. The program office estimates that the economic order quantity purchases for lots 12-14 will save the program about $225.5 million. In addition, the program office and prime contractors have continued to invest in various initiatives to lower production costs. Specifically, the program office spent $320 million in efforts to improve manufacturing processes that it estimates could result in up to $10.5 billion in savings over the life of the program. The airframe contractor told us that it has invested $170 million as of January 2019 to further lower its production costs. The engine contractor also told us that it spent $33 million to potentially realize over $4 billion of cost savings. The airframe contractor—Lockheed Martin—delivered 43 more aircraft in 2019 than in 2018, and as of October 2019, there were 229 aircraft in various stages of assembly worldwide. The contractor also delivered more aircraft on time in 2019. According to contractor officials, the improved rates of on-time delivery are partially a result of the contractor’s efforts to obtain a performance incentive fee that was added to the lot 11 production contract. The program intended the incentive fee to focus the contractor on improving its performance in the final assembly phase of production, which was expected to improve its on-time deliveries. To earn the incentive fee, contractor representatives told us they took several steps to improve production rates. For example, because the F-35Cs were taking longer to produce and all variants had to move through the same final assembly area, the contractor made a separate final assembly line for the F-35Cs so work could proceed without delaying the other variants. This step, according to program office officials, allowed the contractor to improve on-time deliveries for F-35As and F-35Bs. Figure 7 highlights progress in the contractor’s aircraft deliveries since 2016. Other production metrics associated with the airframe, however, demonstrated varied performance over the last two years as production increased. For example, the average number of hours needed to build an aircraft decreased slightly for the F-35A but increased for the B and C variants. Defense Contract Management Agency officials told us the increase was partly attributable to new personnel. In particular, since January 2017, the contractor has hired and trained nearly 1,700 new personnel to accommodate increased production rates—nearly doubling its workforce. New personnel take time to train and gain experience on the production line. According to contractor representatives, as these new employees become more experienced and produce more aircraft, they expect the metric to improve. The contractor’s amount of rework needed was also mixed. During the course of production, the contractor may identify issues with a part or a process, which, in turn, may lead to scrap, rework, and repair to replace or fix the issue. Between 2016 and 2017, most F-35 variants realized improvements in the amount of scrap, rework, and repair needed. In 2018 and 2019, however, only the F-35A continued to show improvements. Figure 8 shows the average total hours for scrap, rework, and repair for each variant since 2016. According to the program office, the increased production rate posed a challenge, and because the contractor has not built as many F-35Cs, this has added to the increase in scrap, rework and repair. To improve performance in this regard, the contractor put teams in place to focus on addressing the main drivers of scrap, rework, and repair. Similarly, the engine contractor—Pratt & Whitney—increased its production rate by roughly 51 percent in 2019. However, engine on-time delivery performance has continued to decline which officials attribute to production quality issues and parts delays. Specifically, in 2019, 91 percent of engines delivered were late. In 2019, the airframe contractor was able to work around the late engine deliveries to deliver the entire aircraft on time. Figure 9 shows the engine contractor’s on-time and late deliveries since 2016. In addition, the average number of quality notifications per engine— production defects indicating a quality issue—has increased by 16 percent in 2019. Figure 10 highlights the engine contractor’s quality notifications per engine over the last 4 years. According to the Defense Contract Management Agency’s performance reports, engine test failures, among other quality issues, have affected engine deliveries. According to an official from this agency, there have been 18 engine test failures in 2019, which is eight more than in 2018, each requiring disassembly and rework. The engine contractor stopped deliveries due to the test failures, which has slowed engine acceptance and reduced on-time deliveries. These issues are affecting engines built at the engine contractor’s production facility in West Palm Beach, Florida, which opened in 2014. To address this issue, the engine contractor has developed new tooling for the assembly line and has established a team to identify characteristics leading to the test failures. Plans are also in place for additional training for employees. While F-35 aircraft have been in production since 2007 and have reached a high level of manufacturing readiness per DOD guidance, the program is not meeting two of eight manufacturing leading practices GAO has identified as indicators of a program’s readiness for full-rate production, or milestone C review. To date, the program is meeting or plans to meet six leading practices for this milestone: Demonstrating processes on a pilot production line. Building and testing production-representative prototypes to demonstrate product in intended environment. Collecting statistical process control data. Conducting an independent cost estimate. Conducting an independent program assessment. Conducting major milestone decision review to begin production. However, we also found that the production processes are not in control according to the Process Capability Index. This index is a tool to measure how closely the production steps result in a part or subsystem that meets predefined standards. According to the leading practices, meeting these standards provides greater confidence that the contractor can produce a high quality product consistently, to minimize variation which results in fewer defects or the need for rework. Additionally, the F- 35 aircraft have not achieved their reliability goals through testing of production representative prototypes. These two leading practices focus on gathering sufficient knowledge to determine the relative ease of manufacturing and whether the product is of high quality and sufficiently mature to move forward into full-rate production. Our analysis of contractor data shows that the airframe contractor’s production processes are in flux. The contractor continues to change some of its production processes, and in other cases, is not following its own established processes well, which has led to several quality issues over the years. For example, in 2018, we reported that the contractor had halted deliveries of aircraft after the Air Force identified corrosion between the aircraft’s surface panels and the airframe because the contractor did not apply a primer when it attached the panels. We reported in 2019 that the program office, the contractor, and the F-35 Program Executive Officer reached a mutual agreement on the cost to resolve this issue, the details of which they did not disclose publicly. In November 2019, a mechanic identified titanium fasteners installed in an area of the aircraft where the design calls for a fastener stronger than titanium. According to the program office, the incorrect fasteners were installed on most already- fielded F-35 aircraft. That same month, the contractor started implementing its corrective action plan. As of March 2020, the F-35 program office had reviewed and approved the contractors’ analysis as well as its durability and damage reports on the use of these fasteners. We describe other key F-35 technical risks in appendix V. Over the years, the airframe contractor has continued to change and refine production processes, aiming to improve efficiency amidst concurrent development and production. For example, the airframe contractor identified a particular process that installs wiring harnesses into the aircraft wings as a driver of one of its production quality issues. To address this issue, the prime contractor developed a new tool that helps the installer route the wires more consistently. While process changes like these can improve the quality of the product, they also indicate that the overall production process are not in control less than a year before the program’s planned full-rate production decision, or milestone C review. In 2019, according to our analysis, the total number of key F-35 manufacturing processes identified in the final assembly phase increased 70 percent, to a total of over 10,000 critical processes. Furthermore, of these critical processes, only 30 percent are currently able to produce a product within predefined design standards. According to manufacturing leading practices, critical processes should be repeatable, sustainable, and consistent in producing parts within quality standards. Meeting these practices provides confidence that the contractor can produce the product within cost, schedule, and quality targets. Without processes in control, the program could face continued quality issues that will add to the overall cost of the program. Figure 11 shows the F-35 aircraft in the final assembly phase of production where some of these processes take place. Another leading practice that should be met before making a full-rate production, or milestone C decision, is to demonstrate that a production representative prototype can meet the program’s R&M goals. The R&M goals lay out specific quantitative goals aimed at ensuring that an aircraft will be available for operations as opposed to out of service for maintenance. We reported in April 2019 that the F-35 aircraft in service around the world were still not meeting all of their R&M goals and recommended the program take actions to ensure that the aircraft would meet those goals. Despite some improvement in 2019, the program is not meeting half of its R&M goals. Until the program does so, the warfighter will continue to accept aircraft for delivery that are less reliable and more costly to maintain than originally planned. For details on the F- 35’s R&M performance, see appendix IV. The program has not met these two leading manufacturing practices, in part, due to the changes the airframe contractor made and continues to make to the production line and the program’s concurrent approach to acquisition. We have repeatedly found that DOD programs that moved into full-rate production carrying manufacturing risks experienced billions of dollars in cost growth in production, and nearly two-thirds reported increases in average procurement unit costs. With the risks the F-35 program still faces, it may realize additional cost and schedule growth if these production risks are not evaluated. Despite these risks, the program has continued to push forward with increased production rates and has not taken actions to determine the potential impact of not meeting these leading practices may have on future production and overall life-cycle costs. Furthermore, according to a program official, the F-35 program has not completed a comprehensive assessment of production risks and does not plan to ahead of its full-rate production decision. However, according to DOD officials, the F-35 program office and prime contractor convene a monthly Joint Risk Management Board, which identifies and manages overall program risk, and has completed an independent technical risk assessment to support the full-rate production decision, which identified production risks. Title 10 section 2366c of the U.S. Code requires the milestone decision authority for a major defense acquisition program to provide Congress with a report that includes, among other things, a summary of any manufacturing risks associated with the program; however, this summary is not required until 15 days after the authority grants approval for the program to enter the production and deployment phase. The program currently plans to obtain this approval between September 2020 and March 2021. In this case, however, the F-35 program has not met all of the manufacturing leading practices that should be met before the full-rate production decision. Furthermore, the underlying risks, such as not meeting R&M goals, have persisted for years and the program has yet to take steps to fully address these risks. If an evaluation of these risks is not provided ahead of the full-rate production decision, Congress will not be fully aware of the risks the program is taking by committing to increased production rates. According to program officials, some suppliers for the F-35 struggled to meet increased production demands in 2019 and, as a result, the program witnessed increased rates of late deliveries or parts shortages. In particular, the number of parts delivered late to the airframe contractor, as well as parts shortages, have grown steadily over the past 2 years. According to the Defense Contract Management Agency: Between August 2017 and July 2019, the number of parts delivered late increased from under 2,000 to more than 10,000. Between July 2018 and July 2019, the parts shortages per month increased from 875 to over 8,000. According to contractor representatives, roughly 60 percent of parts shortages are attributable to 20 suppliers. To mitigate late deliveries and parts shortages—and deliver more aircraft on time—the airframe contractor has utilized methods such as reconfiguring the assembly line and moving planned work between different stations along the assembly line. According to the program office, such steps can cause production to be less efficient, which, in turn, can increase the number of labor hours necessary to build each aircraft. Airframe contractor representatives and a program office official cited measures they are taking to improve supplier performance in light of the upcoming full-rate production decision. For example, the contractor instituted action plans to help problematic suppliers, sent task teams to struggling suppliers to help resolve issues, and, in some cases, is seeking alternative sources. Additionally, the program office has established joint meetings with the prime contractor to monitor progress on a weekly basis and holds a semiannual review to achieve executive-level coordination. While prime contractor representatives told us that they have been actively managing underperforming suppliers for several years, some of their efforts are new and will need time before results materialize. These supply chain risks may compound as the program continues to produce, deliver, operate, and maintain more aircraft each year. For example, in April 2019, we found that fielded, operational F-35 aircraft were not meeting warfighter requirements, largely due to spare parts shortages and difficulty in managing and moving parts around the world. We recommended that the program assess what actions it should take to meet warfighter requirements, which could include adjusting the amount of spare parts acquired. DOD concurred and is working toward addressing the recommendation to identify warfighter gaps with regard to the supply chain. However, with the aircraft in production also facing significant shortages, this problem could get worse as the program prepares to further increase the production rate from 141 aircraft in 2019 to 169 in 2022. We found that Turkey’s recent suspension from the F-35 program is likely to compound these existing supply chain issues. In July 2019, Turkey was suspended from the F-35 program. In particular, the Under Secretary of Defense for Acquisition and Sustainment directed that the F-35 program establish alternative sources and to stop placing orders from Turkish suppliers after March 2020. According to an official with that office, Turkish suppliers will provide parts through the end of lot 14 deliveries (scheduled to take place through 2022), in part, to avoid disruptions to aircraft deliveries and additional cost growth from standing up new suppliers. The F-35 program office identified that Turkish companies supplied 1,005 parts for the F-35 airframe and engine and some of these parts have been provided by only one supplier. As of December 2019, the program has identified new suppliers for all of these parts, but it still needs to bring roughly 15 parts currently produced in Turkey up to the current production rate. During our review, the program reported that production through lot 14 should not be adversely affected if it continues to accept parts from Turkey until lot 14 aircraft are delivered, but risk remains with the transition to alternate sources. However, lots 12-14 still face some risk receiving parts from Turkey. According to program officials, some of these new parts suppliers will not be producing at the rate required until next year, as roughly 10 percent are new to the F-35 program. Airframe contractor representatives stated it would take over a year to stand up these new suppliers, with lead times dependent on several factors, such as part complexity, quantity, and the supplier’s production maturity. In addition, these new suppliers are required to go through qualification and testing to ensure the design integrity for their parts. According to an official with the Under Secretary of Defense for Acquisition and Sustainment, by accepting parts from Turkish suppliers through lot 14, the program will have additional time to ensure new suppliers can meet demands for parts. Additionally, the program reported that it intends to utilize alternative sources for parts currently made in Turkey for aircraft delivered under lots 13 and 14 contracts. Furthermore, according to a program office official, it is also not clear how the prices for parts that will be obtained from new suppliers after Lot 14 will compare with the prices under the contracts with the suppliers from Turkey, but the official noted that alternative sources could be more costly. In its May 2019 report to Congress, DOD outlined its plans for Block 4 with a development cost estimate of $10.6 billion for activities through fiscal year 2024. Since the 2019 report, we found the program office has increased its estimate by about 14 percent, to $12.1 billion, primarily due to schedule delays. The program now expects to extend the delivery of Block 4 capabilities by 2 additional years, through 2026. In the meantime, DOD’s Block 4 annual reporting requirement to Congress is scheduled to end in 2023, 3 years before development is complete. Additionally, most of the capabilities the F-35 program planned to deliver in 2019 were delayed. Furthermore, we found that the program’s cost estimate used to support its report to Congress does not fully meet cost estimating leading practices. The Block 4 development cost and schedule have grown considerably since DOD’s last report to Congress. In 2016, GAO recommended that DOD manage Block 4 as a major defense acquisition program with its own reporting requirements, separate from the original F-35 development program. DOD did not concur with our recommendation, citing the F-35 as DOD’s most closely managed system and its existing F-35 program oversight. The NDAA for Fiscal Year 2017 required DOD to report annually on elements of a Block 4 baseline, such as development and retrofit cost estimates, beginning no later than one year after the award of the development contract for follow on modernization, until March 31, 2023. At that time, we reported that DOD had requested funding for the development and delivery of Block 4 through the end of 2022. However, over the last year, the program has revised its Block 4 schedule and now expects to field Block 4 capabilities into fiscal year 2026. As a result, there is no requirement for DOD to report on Block 4 progress for at least 3 years even though those efforts will be ongoing. In its May 2019 Block 4 report to Congress, DOD reported that the total cost to develop 66 Block 4 capabilities—both hardware and software— would be $10.6 billion for activities planned from fiscal years 2018 to 2024. The report also included the F-35 program office estimate of an additional $6.4 billion in fiscal year 2018 through 2024 funding to retrofit aircraft from the baseline F-35 configuration to a full Block 4 configuration. The F-35 program based the costs in this report on its Block 4 development cost estimate from July 2018. However, we found that reported Block 4 costs did not include all Block 4 costs. In particular, the report did not include Block 4 costs the program incurred prior to 2018 or costs that the effort will incur after 2024. Because the F-35 program office is not managing the Block 4 effort as a separate program, it has chosen to exclude the past and future costs in the Block 4 cost estimate it reported to Congress. Instead, the program reported on Block 4 costs for the future years defense program—which is DOD’s projected spending for the current budget year and the next four years. By excluding any costs prior to 2018 and those that would be incurred after 2024, the program did not report on the total costs of Block 4. In May 2019, the program also updated its Block 4 development cost estimate, increasing both the time and cost to complete the work, but this updated estimate was not included in its May 2019 report to Congress. The updated cost estimate reflects that the program office will be fielding Block 4 capabilities into fiscal year 2026. This new schedule adds 2 years to the costs DOD reported to Congress in May 2019. Additionally, our analysis of DOD’s updated cost estimate indicates the total cost of Block 4 development grew by $1.5 billion to a total of $12.1 billion for activities in fiscal years 2018 through 2026. Furthermore, in addition to the Block 4 development costs, the program also estimates it will need another $2.9 billion to develop other capabilities, such as upgrades to ALIS. Program officials attributed this schedule and cost growth to having better insight into the scope of work to develop and test Block 4 capabilities and noted that they would continue to refine and update these costs annually as modernization efforts progress further into development. Once the existing statutory reporting requirement expires in 2023, DOD will no longer be required to provide Congress key information that would be useful in making informed decisions regarding the Block 4 effort— which now extends until 2026. Furthermore, without a complete cost estimate for Block 4, inclusive of costs already incurred and those not yet incurred but estimated through completion, Congress is left without a complete picture of what DOD intends to spend on the total Block 4 effort. Without a complete picture of these costs, the Congress’s ability to assess the program’s cost and schedule performance in the future will be hindered. The airframe contractor did not deliver the Block 4 capabilities it planned to deliver in 2019. Specifically, according to the plan outlined in its May 2019 report to Congress, the F-35 program was going to deliver eight Block 4 capabilities in 2019. However, the program delivered only one—a software capability called the auto ground-collision avoidance system. This capability enables the aircraft to perform an automatic recovery when it predicts that the aircraft will strike the ground. This was ahead of schedule as the program had originally planned to deliver this capability after 2019. According to program officials, the development of the other capabilities is taking longer than planned and, as a result, the program pushed their delivery schedule into 2020. Development and delivery of the capabilities within the Block 4 effort are complex, and the program does not consider development complete until the products for all elements of the F-35 air system are ready. In particular, full capability delivery occurs when the contractor delivers all of the software and hardware needed for all of the F-35 air system elements to support the planned capability. Program officials stated they are still working to put the processes in place to synchronize the delivery of the late capabilities for all of the F-35 air system elements. For example, the airframe contractor had planned to deliver a capability called the interim full motion video for the Marine Corps in 2019. The contractor developed the software needed, but it is late in developing the hardware needed for the software to operate and, as a result, the contractor did not deliver the capability in 2019 as planned. DOD test officials we met with at Edwards Air Force Base stated that in 2019, using the C2D2 approach, the contractor delivered other, partial Block 4 capabilities to be tested. However, test officials told us those capabilities were delivered later than expected. Since the program could not fully test those capabilities on the aircraft, the program office deferred them to the next incremental update scheduled for 2020. Changes such as these have contributed to the Block 4 cost and schedule growth. The program is also discovering issues during Block 4 testing, causing the testing to take longer than anticipated. According to a DOT&E official, Block 4 software changes caused issues with functionality of F-35 baseline aircraft capabilities that worked before the program installed new Block 4 software onto the aircraft. The program discovered issues with each new software version during flight testing and has been working to fix these issues in subsequent software updates. Testing and DOD officials stated that the contractor had not performed adequate testing of the software before delivering it to the test fleet as the reason for these issues. Contractor representatives acknowledged these issues and stated that they will conduct additional lab testing for future software releases to avoid such problems going forward. We found that the F-35 program office’s Block 4 cost estimate did not fully meet the four key characteristics of GAO’s cost estimating leading practices when projecting Block 4 development costs. Table 2 presents key points from our assessment, and appendix II provides additional detail on our rationale. As reflected in table 2, our assessment of the F-35 Block 4 development cost estimate identified a number of missing elements. Specifically, the estimate does not rely on a product-oriented work breakdown structure (WBS), it does not address cost risk and uncertainty, it does not take into account risk related to technology maturity, and it does not have an independent cost estimate, as leading practices reflect. While the program office updates its cost estimate regularly, officials told us that they do not intend to address some of these missing elements in future updates. Work breakdown structure. According to cost estimating leading practices, the program should base its cost estimate on a program- level, product-oriented WBS that allows a program to track cost and schedule by defined deliverables, such as hardware or software components. The WBS ensures that the program does not leave out any portions of the work and makes it easier to compare it to similar systems and programs. According to program officials, the Block 4 cost estimate does not rely on a single WBS; rather, multiple, contractor-derived WBSs exist for the program. Without its own, program-office-level WBS, the program lacks a framework to develop a schedule and cost plan that it can use to track progress and accomplishments. Risk and uncertainty analyses. The program did not perform cost risk and uncertainty analyses. Program officials said they do not plan to conduct a formal risk analysis. The program office works jointly with the contractor to identify and manage risks for the F-35 program. For example, there are monthly Joint Risk Management Boards attended by both program office and contractor leadership. However, overall program risk management is different from quantitative cost risk and uncertainty analyses in that program risk management is not specific to costs and it is not used to assess the cost variance of the cost estimate itself. When planning for funding decisions for a program of this scale, analyzing program-level risks alone is inadequate. Without a risk analysis, the cost estimate will not be fully accurate or credible because it will not account for the effects of potential schedule slips or other risks that the program could realize. Technology maturity. A program office official stated that in developing the cost estimate they did not consider that technologies would not be mature, but rather assumed that most technologies needed to deliver each Block 4 capability would be mature before the program begins development for that capability. The official stated that the complexity of design, development, and testing based on the baseline program experience was reflected in the estimate, but the cost estimate did not identify if there were specific costs associated with maturing these technologies. The official further noted that Block 4 costs would increase if a capability takes longer than planned to design, integrate, and test due to its immaturity. In 2019, we recommended that the Secretary of Defense ensure that the F-35 program office completes an independent technology readiness assessment, as part of its business case for the initial Block 4 capabilities, before initiating additional development work. DOD did not concur with our recommendation. According to a program official, as of December 2019, the program office had not completed any technology readiness assessments even though the contractor has started development of over half of the capabilities within Block 4. Going forward, the program is considering holding incremental technology readiness assessments as it plans for and develops a new set of capabilities, in accordance with the C2D2 schedule. Program officials told us that, going forward, as they update the Block 4 cost estimate, they will consider the results of future technology readiness assessments. Until the program office does so, management cannot determine a reasonable level of additional resources that might be necessary to cover increased costs resulting from unexpected design complexity, incomplete requirements, technology uncertainty, and other uncertainties. Independent cost estimate. In 2019, we also recommended the F- 35 program office include an independent cost estimate as part of its business case for Block 4. As noted in table 2, the Block 4 effort still lacks an independent cost estimate. The program is planning for the Office of the Secretary of Defense, Cost Assessment and Program Evaluation to have a draft independent cost estimate for an interim program review scheduled for March 2020 and to have a complete independent cost estimate in June 2020. This estimate will evaluate the entire F-35 program, including Block 4. With these pieces currently missing, the Block 4 development cost estimate does not present a full picture of Block 4’s cost. Ultimately, without a complete understanding of Block 4 costs, the program could face additional cost growth, which will be hard to track without a complete cost baseline. The lack of a complete cost baseline hinders insight and oversight into the program’s costs, plans, and progress to date and going forward. Moreover, if a cost estimate does not fully or substantially meet all four characteristics of cost estimating leading practices, it cannot be considered reliable. DOD plans for the F-35 to be central to the warfighter prevailing in future conflicts. However, the program has been behind schedule and over cost almost since its inception. DOD is slated to move into full-rate production despite several key challenges in the production of aircraft. We acknowledge that the current F-35 program’s production rates are more commonly associated with programs already in full-rate production. However, the F-35 aircraft in the field have not met standards for reliability and maintainability, indicating that the program is not delivering aircraft at the level of quality expected. Additionally, the program’s concurrent approach and the contractor’s continual changes to the production line indicate that the production line processes are not in control. Leading practices indicate that mature production lines—production lines ready for full-rate production—should meet metrics for consistency. Furthermore, to minimize production risk and potential cost growth, suppliers should routinely meet quality and delivery schedules, although this is not yet true of the F-35 program. Not meeting these leading practices poses risks that DOD and the international partners will not routinely receive the F-35’s they specified and need. The long-standing challenges with receiving parts on time and efforts underway to replace Turkish suppliers of parts for the F-35 compound these production challenges and may raise additional risks. Unless the program office assesses and reports on these manufacturing risks ahead of the milestone C review, Congress may not have key insights into the risks that remain with the program and to the overall effort to deliver F-35s to the warfighter. Since the F-35 program is not managing the Block 4 effort as a separate program with traditional oversight tools, we are particularly concerned as Block 4 efforts proceed through development and testing. Specifically, because of the delays to the program, after 2023, DOD will not be required to provide Congress information on Block 4’s development efforts as the current reporting requirements will end. Furthermore, the program’s cost estimate, as presented in its report to Congress, does not fully present all incurred and future costs for Block 4. Without this information, Congress may not have the insight it needs to assess Block 4 cost and schedule progress as well as to make informed oversight and budgeting decisions. In addition, the Block 4 development cost estimate does not fully meet leading practices, lacking a full reflection of all costs. Specifically, the cost estimate does not have a program office level work breakdown structure, a risk and uncertainty analysis, and consideration of technology readiness. Without a comprehensive and credible cost estimate, DOD and Congress lack a sound basis for informed investment decision making, realistic budget formulation, meaningful progress measurement, proactive course correction when warranted, and program and contractor accountability for results. Congress should consider revising Section 224(d) of the National Defense Authorization Act for Fiscal Year 2017, Pub. L. No. 114-328, to extend DOD’s Block 4 reporting requirement until all Block 4 capabilities are fielded to ensure that Congress is aware of cost and schedule growth beyond 2023. (Matter for Consideration 1) We are making the following five recommendations to the Secretary of Defense to direct the Undersecretary of Defense for Acquisition and Sustainment (OUSD (A&S)). The OUSD (A&S) should direct the F-35 program office to provide information that is similar to that which is statutorily required after the milestone C review to Congress ahead of the milestone C review (full-rate production decision). This submission should include an evaluation of the production risks associated with critical production processes that are not in control, reliability and maintainability (R&M) targets that are not met, and supplier readiness—particularly for those replacing Turkish suppliers, along with the steps it is taking to address those risks. (Recommendation 1) The OUSD (A&S) should direct the F-35 program office to establish a Block 4 cost estimate baseline that includes all Block 4 costs, including incurred costs and future costs in its reports to Congress as required by the NDAA for Fiscal Year 2017, so that Congress has a complete understanding of all Block 4 costs and can compare this baseline to future cost estimates and performance. (Recommendation 2) The OUSD (A&S) should direct the F-35 program office to complete a program office level, product-oriented work breakdown structure for the next update to its Block 4 cost estimate to ensure that the estimate meets the comprehensive leading practices. (Recommendation 3) The OUSD (A&S) should direct the F-35 program office to conduct risk and uncertainty analyses for the next update to its Block 4 cost estimate to ensure that the estimate meets the credible leading practices. (Recommendation 4) The OUSD (A&S) should direct the F-35 program office to consider the results of its future technology readiness assessment of all Block 4 technologies and incorporate the cost and schedule risks of developing those technologies in the next update to its Block 4 cost estimate to ensure that the estimate meets the comprehensive leading practices. (Recommendation 5) We provided a draft of this report to DOD for review and comment. DOD provided written comments, which we have reproduced in appendix VI. DOD concurred with three of the recommendations related to the Block 4 modernization effort (recommendations 2, 4, and 5 above). While DOD did not concur with the other two recommendations, it outlined planned actions that we believe, if implemented, would meet the intent of our recommendations. DOD also provided technical comments, which we incorporated as appropriate. We will continue to monitor the program and evaluate implementation of these recommendations. DOD officials did not concur with the first recommendation, which, in the draft report, was to evaluate production risks and provide a statutorily required report to Congress ahead of the program’s full-rate production decision. While DOD did not concur with the draft recommendation, it agreed to keep the Congress apprised of these matters in its quarterly briefings to the defense committees. To clarify the actions we intended DOD to take to address our findings, we revised the recommendation to indicate that DOD should provide information to Congress on the production risks we identified in our report, ahead of the milestone C review. If the DOD provides a substantive assessment highlighting these production risks, as well as the steps it will take to mitigate them, during its quarterly briefing to Congress ahead of the milestone C review, it would address the intent of our recommendation. DOD also did not concur with our third recommendation for the F-35 program office to complete a program-level, product-oriented work breakdown structure (WBS) for the next update to its Block 4 cost estimate. DOD noted that its next scheduled update was due in April 2020, after we provided our report for comment. While DOD noted it would be unable to complete a program-level WBS by the April 2020 update, it agreed to evaluate moving to a program-level, product-oriented WBS in 2021. If the F-35 program office utilizes a program-level, product- oriented WBS for this cost estimate update, it would meet the intent of our recommendation. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; and the Under Secretary of Defense for Acquisition and Sustainment, the Secretary of the Air Force, the Acting Secretary of the Navy, and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or ludwigsonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. To assess the reliability of the F-35 Block 4 development cost estimate, we obtained and reviewed cost estimate documentation such as the Joint Program Office briefing on its May 2019 estimate, the Air System Procurement Playbook—a planning document for Block 4—and its cost estimate models. Additionally, we met with relevant staff in the F-35 program office and the Department of Defense’s Office of Cost Assessment and Program Evaluation. We analyzed this information and determined the extent to which the program office’s practices for developing the F-35 Block 4 development cost estimate were consistent with the leading practices identified in the GAO Cost Estimating and Assessment Guide. These practices have been found to be the basis for reliable cost estimates. We assessed each practice as being one of the following: Met—the agency provided data and documentation that satisfies the entire leading practice criterion. Substantially met—the agency provided data and documentation that satisfies a large portion of the leading practice criterion. Partially met—the agency provided data and documentation that satisfies about half of the leading practice criterion. Minimally met—the agency provided data and documentation that satisfies a small portion of the leading practice criterion. Not met—the agency provided data and documentation that does not satisfy any portion of the leading practice criterion. For our reporting needs, we collapsed GAO’s 18 leading practices into four general characteristics: comprehensive, well-documented, accurate, and credible. The assessment of each characteristic was based on an average of the F-35 program office’s scores for the leading practices included in that category. A second analyst verified the assessment and management reviewed the results. We determined the overall assessment rating by assigning each individual rating a number: Not met = 1, Minimally met = 2, Partially met = 3, Substantially met = 4, and Met = 5. Then, we took the average of the individual assessment ratings to determine the overall rating for each of the four characteristics. The resulting average becomes the Overall Assessment as follows: Not met = 1.0 to 1.4, Minimally met = 1.5 to 2.4, Partially met = 2.5 to 3.4, Substantially met = 3.5 to 4.4, and Met = 4.5 to 5.0. A cost estimate is considered reliable if the overall assessment ratings for each of the four characteristics are substantially or fully met. If any of the characteristics are not met, minimally met, or partially met, then the cost estimate does not fully reflect the characteristics of a high-quality estimate and cannot be considered reliable. See table 4 for a high level summary of each leading practice and the reasons for the overall scoring. This report fulfills two mandates. First, the National Defense Authorization Act for fiscal year 2015 included a provision for GAO to review the F-35 acquisition program annually until the program reaches full-rate production. This is the fifth report under that provision. Second, the National Defense Authorization Act for Fiscal Year 2020 includes a provision for GAO to review the program’s production and Block 4 progress annually through 2025. In this report, we (1) provide information on the program’s progress toward completing operational testing and resolving deficiencies found in testing; (2) assess the program’s production performance and manufacturing efficiency initiatives; and (3) assess the program’s modernization cost estimate and progress with Block 4 development efforts. To provide information on the program’s progress in operational testing and the resolution of deficiencies, we first reviewed the baseline program’s costs, schedule, and performance plans and compared the actual progress in each area with the goals established in its 2012 baseline to identify any significant trends. We reviewed progress on test events completed versus those that remain, test schedules, program briefings, and DOD briefings. We traveled to Edwards Air Force base to interview DOD test authorities and met with officials from the program office, DOD test authorities, and the contractor Lockheed Martin (the prime aircraft contractor), to discuss key aspects of F-35 development progress, including flight testing, future test plans, and recent findings from test events. Specifically, we obtained updates on key events that are required to complete testing according to the program office’s current schedule. We also interviewed the Director, Operational Test and Evaluation office and F-35 program developmental and operational test pilots. To provide information on the program’s progress resolving deficiencies, we interviewed the same officials mentioned above and discussed how the number of open and closed deficiencies changed in 2019. We reviewed program and contractor information on deficiency reports, mitigations, resolutions, and the deficiency resolution process. To assess the program’s production performance and manufacturing efficiency initiatives, we obtained and analyzed the production metrics from Lockheed Martin and Pratt & Whitney (the prime engine contractor) and their aircraft and engine delivery rates from 2012 through 2019. We reviewed metrics and briefings provided by the program office, Lockheed Martin, Pratt & Whitney, and the Defense Contract Management Agency to identify progress in improving manufacturing processes. We analyzed delivery dates for lot 11 aircraft delivered in 2019. We traveled to the production facility in Fort Worth, Texas to discuss reasons for any delivery delays and plans for improvements with officials from Lockheed Martin. We obtained cost investment and savings estimates and discussed cost and manufacturing efficiency initiatives, such as the economic order quantity purchases, with the contractors and program office officials to understand potential cost savings and plans. We collected and analyzed the extent to which the program has met leading practices identified by GAO for full-rate production. We also obtained and analyzed metrics on parts and aircraft quality through December 2019 and discussed steps taken to improve quality and deliveries with Lockheed Martin and Pratt & Whitney officials. We interviewed officials from Lockheed Martin, Pratt & Whitney, and Northrop Grumman (a key subcontractor) regarding the administration’s decision to suspend Turkey from the program and the implications of the suspension for the contractors. We determined that the contractors’ production metrics and delivery dates were sufficiently reliable for our purposes of determining production efficiency and deliveries. We collected and analyzed production and supply chain performance data from the program office, Lockheed Martin, and Pratt & Whitney. To assess the reliability of the May 2019 Block 4 development cost estimate, we evaluated documentation supporting the estimate, such as the cost estimating models, the F-35’s Air System Procurement Playbook, its updated acquisition strategy, the Decision Memorandum requirements document, and briefings provided to the DOD decision authority. We assessed the cost estimating methodologies, assumptions, and results against leading practices for developing a comprehensive, accurate, well- documented, and credible cost estimate, identified in GAO’s Cost Estimating and Assessment Guide. We also interviewed program officials responsible for developing and reviewing the cost estimate to understand their methodology, data, and approach for developing the estimate. We found that the cost estimate was not reliable. To assess progress with Block 4 development efforts, we interviewed DOD and program office officials, and contractor representatives regarding the program’s Block 4 planning, development, testing, and production activities to date. We reviewed other program documentation, such as the F-35’s fiscal year 2020 budget request, to identify costs associated with the Block 4 effort. We compared the program’s accomplishments in 2019 to its plans and identified what capabilities the program office delivered to the fleet. We reviewed the program office’s plans to develop and deliver additional Block 4 capabilities from 2020 through 2025. We conducted this performance audit from June 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Joint Strike Fighter Operational Requirements Document, which outlines the requirements Department of Defense and the military services agreed the F-35 should meet, defines all eight reliability and maintainability (R&M) metrics. Table 5 shows each F-35 variants’ performance against these metrics’ targets, as of August 2019. F-35B Thrust Cutback: An F-35B aircraft can experience an unanticipated cutback in thrust during vertical landings (hover). The contractor put hover weight restrictions in place to mitigate the effect and has identified the root cause. The contractor is developing software and hardware fixes. F-35C Nose Landing Gear: During shipboard landings, the F-35C can experience bending stress, which causes cracking of the coating on a part in the nose landing gear. In the short term, this part will be inspected for damage every 400 flying hours. The contractor is also redesigning the part that is cracking and expects to test it between early 2020 to June 2021. F-35B Three Bearing Swivel Module: The module is mounted at the back of the aircraft and allows the thrust from the engine to be vectored from straight aft for conventional flight to straight down for short takeoff and vertical landing operations. In June 2019, an F-35B experienced a warning indicator in its short takeoff mode due to a hardware component. However, according to the contractor, this component should not cause a warning indicator or loss of functionality for the aircraft. The contractor has identified the root cause of the hardware issue and a gap in the software’s logic that led to the warning. As a result, the contractor is making manufacturing changes to the hardware and implementing software changes to address the issue. Canopy Coating Delaminations: The F-35 fleet has experienced over 50 incidents of the canopy transparencies delaminating after less than 100 flight hours since August 2017. This is over 30 more than we reported in 2019. The contractor tested solutions for the delaminations in 2019 and implemented a solution of adding a vent to the canopy’s frame. Since October 2019, the contractor has added a vent to 146 canopies with one subsequent delamination. Helmet Mounted Display: During low-light flights, the Helmet Mounted Display’s technology cannot display pure black images, instead presenting a green glow on the screen, which makes it difficult to see the full resolution of the night vision video feed. The contractor developed a new display to avoid this effect. According to F-35 program officials, they placed an initial order of 62 displays with 35 delivered by December 2019 to support U.S. Marine Corps and Navy F-35C fleet operations. Three F- 35C pilots completed initial day and night testing using the new display in July 2019 on a carrier. The contractor expects to have a fully qualified redesign by August 2021 and will incorporate it into the production of lot 12 aircraft. In addition to the contact named above, the following staff members made key contributions to this report: Justin Jaynes and Alissa Czyz (Assistant Directors); Diana Maurer, Desirée E. Cunningham (Analyst-in- Charge), Jillena Roberts, Tim Moss, Rose Brister, Juaná Collymore, Emile Ettedgui, Jennifer Leotta, and Jeff Hubbard, Other staff who contributed include Leslie Ashton, Priyanka Sethi Bansal, Vinayak Balasubramanian, Julia DiPonio, Christine Pecora, Ralph Roffo, Roxanna Sun, Jessica Waselkow, and Alyssa Weir. Weapon System Sustainment: DOD Needs a Strategy for Re-Designing the F-35’s Central Logistics System. GAO-20-316. Washington, D.C.: March 6, 2020. F-35 Aircraft Sustainment: DOD Faces Challenges in Sustaining a Growing Fleet. GAO-20-234T. Washington, D.C.: November 13, 2019. Defense Acquisitions: Observations on the F-35 and Air Force’s Advanced Battle Management System. GAO-19-456T: Washington, D.C.: May 2, 2019. F-35 Joint Strike Fighter: Action Needed to Improve Reliability and Prepare for Modernization Efforts. GAO-19-341. Washington, D.C.: April 29, 2019. F-35 Aircraft Sustainment: DOD Needs to Address Substantial Supply Chain Challenges. GAO-19-321. Washington, D.C.: April 25, 2019. F-35 Joint Strike Fighter: Development is Nearly Complete, but Deficiencies Found in Testing Need to Be Resolved. GAO-18-321. Washington, D.C.: June 5, 2018. Warfighter Support: DOD Needs to Share F-35 Operational Lessons Across the Military Services. GAO-18-464R. Washington, D.C.: April 25, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. F-35 Joint Strike Fighter: DOD’s Proposed Follow-on Modernization Acquisition Strategy Reflects an Incremental Approach Although Plans Are Not Yet Finalized. GAO-17-690R. Washington, D.C.: August 8, 2017. F-35 Joint Strike Fighter: DOD Needs to Complete Developmental Testing Before Making Significant New Investments. GAO-17-351. Washington, D.C.: April 24, 2017. F-35 Joint Strike Fighter: Continued Oversight Needed as Program Plans to Begin Development of New Capabilities. GAO-16-390. Washington, D.C.: April 14, 2016. F-35 Sustainment: DOD Needs a Plan to Address Risks Related to Its Central Logistics System. GAO-16-439. Washington, D.C.: April 14, 2016. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress. GAO-16-489T. Washington, D.C.: March 23, 2016. F-35 Joint Strike Fighter: Assessment Needed to Address Affordability Challenges. GAO-15-364. Washington, D.C.: April 14, 2015. F-35 Sustainment: Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates. GAO-14-778. Washington, D.C.: September 23, 2014. F-35 Joint Strike Fighter: Slower Than Expected Progress in Software Testing May Limit Initial Warfighting Capabilities. GAO-14-468T. Washington, D.C.: March 26, 2014. F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities. GAO-14-322. Washington, D.C.: March 24, 2014. F-35 Joint Strike Fighter: Restructuring Has Improved the Program, but Affordability Challenges and Other Risks Remain. GAO-13-690T. Washington, D.C.: June 19, 2013. F-35 Joint Strike Fighter: Current Outlook Is Improved, but Long-Term Affordability Is a Major Concern. GAO-13-309. Washington, D.C.: March 11, 2013. Fighter Aircraft: Better Cost Estimates Needed for Extending the Service Life of Selected F-16s and F/A-18s. GAO-13-51. Washington, D.C.: November 15, 2012.", "summary": "The acquisition cost for the F-35 program increased substantially in 2019, partially due to the program's addition of estimated costs for modernization of hardware and software systems, referred to as its Block 4 efforts. This is the fifth report under the provision that Congress included in statute for GAO to review the F-35 program annually until the program reaches full-rate production. This is also the first report under another provision in statute to review the program's production and Block 4 progress annually through 2024. Among other objectives, this report assesses (1) the program's production performance and (2) the program's modernization cost estimate and development progress. GAO reviewed Department of Defense (DOD) and contractor documentation and interviewed DOD officials and contractor representatives. The F-35 program is at risk of missing its test schedule and not meeting manufacturing leading practices. In 2019, the F-35 program conducted much of its planned operational testing but extended the schedule by 9 months, which delays the program's full-rate production decision to between September 2020 and March 2021. Over that time, the program will continue to deliver aircraft. In addition, while the F-35 program has increased the production rate and negotiated lower aircraft prices, it is not meeting manufacturing leading practices identified by GAO. Specifically, only about 3,000 of the over 10,000 airframe contractor's manufacturing key processes meet predefined design standards for ensuring product quality. Also, the fielded aircraft, over 500 so far, do not meet the program's reliability and maintainability goals. Although the contractor is changing manufacturing processes to address problems and improve efficiency, more remains to be done. Unless the program office evaluates the risks of not meeting these leading practices, the military services and international partners are at risk of not receiving the quality aircraft they purchased. In addition, the July 2019 suspension of Turkey from the F-35 program—due to security concerns after its acquisition of Russian defense equipment—is likely to compound production risks. The program has identified new sources for 1,005 parts produced by Turkish suppliers, but the program is assessing the effect of 15 key parts not currently being produced at the needed production rate. In 2019, estimated development costs to modernize the F-35's hardware and software systems—known as Block 4—increased by over $1.5 billion. The cost increase puts estimated Block 4 development costs at $12.1 billion. However, the cost estimate did not fully adhere to leading practices, such as including all life cycle costs. In addition, while development will continue through 2026, reports on Block 4 that the program submits to Congress are slated to end in 2023. Without continued Block 4 reporting through the development phase, Congress will lack important oversight information. Congress should consider extending DOD's reporting requirement for Block 4 modernization beyond 2023. GAO is also making five recommendations to DOD. While DOD did not concur with two of these recommendations—including to evaluate production risks and update its Block 4 cost estimate with a program-level plan, it identified actions that, if implemented, will meet the intent of these recommendations. DOD concurred with GAO's three other recommendations.", "document_type": "gao"}
{"report": "The Secret Service pursues two areas of responsibility simultaneously— protection and criminal investigations. The Secret Service’s Office of Protective Operations oversees the agency’s protective divisions, including the Presidential Protective, Vice Presidential Protective, and Uniformed Divisions. These divisions carry out permanent protective details and other protection-related assignments. Permanent protectees, such as the President and Vice President, have special agents permanently assigned to them from the Presidential Protective Division or Vice Presidential Protective Division. The Secret Service provides protection for the President, Vice President, and their families at all times. In fiscal year 2017, the Presidential and Vice Presidential Protective Divisions provided protection for 30 presidential and vice- presidential foreign trips in addition to providing protection for members of the President’s and Vice President’s families. The Uniformed Division protects certain facilities, including the White House and the Treasury Building, among others. Figure 1 illustrates an organizational chart of offices within the Secret Service. The Office of Investigations oversees the agency’s field activities, including investigations into crimes targeting the nation’s financial systems; surveys of locations a protectee may visit; investigations of threats to protected persons and facilities; and temporary support for protection. Figure 2 provides information about the components in the Office of Investigations. The Office of Investigations oversees the agency’s 21 international field offices and 141 domestic offices, consisting of 42 field offices, 60 resident offices, 13 resident agencies, and 26 domiciles. Special agents in these offices conduct investigations to identify, locate, and apprehend criminal organizations and individuals targeting the nation’s critical financial infrastructure and payment systems. Figure 3 shows the locations of Secret Service’s domestic field offices, resident offices, and resident agencies. Although the Secret Service was originally founded to investigate the counterfeiting of U.S. currency, the agency’s investigations now span a number of financial and computer-based crimes. Pursuant to 18 U.S.C. § 3056(b)(2), under the direction of the Secretary of Homeland Security, the Secret Service is authorized to detect and arrest any person who violates any of the laws of the United States relating to coins, obligations, and securities of the United States, including the investigation of the counterfeiting of U.S. currency. In addition, the Secret Service is authorized to identify, locate, and apprehend criminal organizations and individuals that target the nation’s critical financial infrastructure and payment systems. Secret Service special agents investigate financial crimes such as access device fraud (including credit and debit-card fraud); identity crimes and theft; business email compromise; bank fraud; and illicit financing operations. In addition, the agency investigates cybercrimes, including network intrusions, ransomware, and cryptocurrency, among other criminal offenses. The Secret Service also provides forensic and investigative assistance in support of investigations involving missing and exploited children. Finally, Secret Service special agents may investigate and make arrests for any offense against the United States committed in their presence, or any felony cognizable under the laws of the United States if they have reasonable grounds to believe that the person to be arrested has committed or is committing such felony. For more information on the evolution of the Secret Service’s statutory authorities, see appendix III. The Secret Service has established three phases for a special agent’s career, in which the special agent contributes to both investigative and protective operations—Phase 1: Career Entry/Field Office Assignment; Phase 2: Protective Assignment; and Phase 3: Post-Protective Field, Protection, or Headquarters Assignment. During Phase 1, after being hired and receiving 7 months of training, the special agent is assigned to a field office for at least 3 years, where the special agent performs investigations and participates in temporary protective assignments locally and away from the special agent’s home office. In Phase 2, the special agent is assigned for up to 8 years to a permanent protective detail or to one of the Secret Service’s specialty divisions, such as the Office of Strategic Intelligence and Information. In Phase 3, the special agent may return to a field office, serve in headquarters-based specialized roles, or continue permanent protection duty. Figure 4 illustrates the Secret Service’s special agent career progression model. Secret Service special agents are paid in accordance with the Office of Personnel Management’s general schedule, which determines the pay structure for the majority of civilian white-collar Federal employees. In addition to standard pay under the general schedule, special agents are eligible for law enforcement availability pay (LEAP). The Law Enforcement Availability Pay Act of 1994, as amended, established a uniform compensation system for federal criminal investigators who, by the nature of their duties, are often required to work excessive and unusual hours. The purpose of LEAP is to provide premium pay to criminal investigators to ensure their availability for unscheduled work in excess of a 40-hour workweek based on the needs of the employing agency. The LEAP Act authorized a 25 percent increase in base salary (LEAP premium pay) as long as specific requirements of the LEAP Act are met. Among these requirements is a condition that criminal investigators maintain an annual average of 2 or more unscheduled duty hours per workday. Federal employees under the general schedule are subject to caps on pay equal to the highest pay level in the general schedule. In recent years, legislation has been enacted to raise this pay cap for Secret Service special agents who, due to the high number of hours they worked, were not otherwise compensated for all hours worked. In 2016, the Overtime Pay for Protective Services Act of 2016 authorized any officer, employee, or agent employed by the Secret Service who performs protective services for an individual or event protected by the Secret Service during 2016 to receive an exception to the limitation on certain premium pay within certain limits. The Secret Service Recruitment and Retention Act of 2018 extended the Secret Service-specific waiver of the pay cap for basic and premium overtime pay through 2018 and included agents within the Secret Service Uniformed Division. Subsequently, the Secret Service Overtime Pay Extension Act extended the Secret Service- specific waiver through 2020. The Secret Service’s Office of Investigations supports protective operations in a variety of ways. According to our analysis of Secret Service data, special agents assigned to the Office of Investigations expended 11.2 million hours supporting protective operations during fiscal years 2014 through 2018. These 11.2 million hours accounted for 41 percent of all protection hours recorded by Secret Service law enforcement personnel during that period. Figure 5 shows the number of hours Secret Service law enforcement personnel expended on protection, including the percentage expended by special agents in the Office of Investigations. The Office of Investigations conducts numerous tasks in support of protective operations, including temporary protective assignments, protective intelligence investigations, and critical systems protection. Temporary protective assignments. When a Secret Service protectee travels, special agents in the Office of Investigations carry out numerous tasks, on a temporary basis, to assist the agency’s protective operations. These special agents facilitate preparations for a protectee visit and safeguard locations. For example, special agents may review the vulnerabilities of a site, conduct motorcade route planning, and coordinate with special agents on the permanent protective detail and with state and local law enforcement. In addition, these special agents provide physical protection when the protectee arrives. Special agents assigned to the Office of Investigations also travel to provide temporary protection and assist during presidential campaigns and National Special Security Events. During presidential campaigns, these special agents may accompany certain presidential candidates and their family members to provide 24/7 protection, and may also work on advance teams that provide site security for campaign events. Protective intelligence investigations. The Office of Investigations assists with the agency’s protective intelligence efforts by investigating threats against protected persons, including the President, and protected facilities, such as protectee residences. According to a Senior Secret Service official, special agents in the Office of Investigations locate, interview, and monitor individuals that make threats to a protectee. In fiscal year 2018, the Secret Service opened 2,011 protective intelligence investigations. Critical systems protection. The Critical Systems Protection program identifies, assesses, and mitigates risk posed by information systems to persons and facilities protected by the Secret Service. The program is coordinated by special agents in the Office of Investigations, and according to a Senior Secret Service official, the program draws on the investigative experience that special agents have developed in the Office of Investigations. For example, the official told us that, through the Critical Systems Protection program, the agency may monitor electronic systems that could be compromised in a hotel where a protectee is staying. The Office of Investigations can provide other benefits to protective operations, such as providing support during periods of increased protection demand and, according to special agents we interviewed, developing relationships with local law enforcement that assist with protective operations. Below are examples of these potential benefits. Support during periods of increased protection demand. The Office of Investigations can shift the focus of its special agents from investigations to protection during periods of increased protection demand. For example, according to Secret Service officials, in fiscal year 2016, the Office of Investigations shifted special agents from criminal investigations to help meet the additional protection demands of the 2016 Presidential Campaign. As shown in figure 6, in fiscal year 2014 special agents assigned to the Office of Investigations spent 52 percent of their time on investigations and 39 percent on protection. These percentages shifted to 31 percent on investigations and 58 percent on protection in fiscal year 2016. Secret Service officials told us that the percentage of hours that special agents spent on protection remained elevated after fiscal year 2016 due to protection demands associated with the President and his family. Pre-established state and local relationships. Resources and support from local law enforcement are needed for the Secret Service to carry out its protective operations, according to senior Secret Service officials. In our interviews with 40 current and former special agents, 38 reported that Secret Service personnel develop relationships with state and local law enforcement while conducting investigations, and that these relationships can benefit protective operations. Twenty-two special agents noted that contacts with state and local law enforcement are pre-established as a result of the agency’s investigative operations. Twenty special agents reported that assets or resources are more readily provided by their state and local partners because of the relationships they have built. In addition, special agents said that relationships developed with state and local law enforcement are either necessary for (11 special agents) or improves (8 special agents) the Secret Service’s protective activities. This is consistent with our prior reporting on the topic. Specifically, in our February 2016 review of Secret Service field offices, we reported that special agents in each of the 12 domestic offices we interviewed emphasized that it would not be possible to protect visiting dignitaries without extensive assistance from state and local law enforcement partners. For example, state and local law enforcement partners may provide equipment such as helicopters, vehicles, and communication equipment during dignitary visits. Supports employee retention and work-life balance. Secret Service officials told us that special agents generally cannot work protective assignments for their entire career, and that investigations help support a more reasonable work-life balance for special agents. A senior Secret Service official described that protective assignments require a high level of readiness and threat consciousness, which can lead to significant psychological stress that cannot be sustained for a 25-year career. Another Secret Service official told us that some special agents can spend 100 or 200 nights away from home per year on protective assignments, and that some special agents do not want to work on protection full-time. Seventy-five percent (30 of 40) of the special agents we interviewed reported that their work-life balance is better while working on an investigation versus a protective assignment. For example, eighteen special agents reported that investigative operations have more normal working hours than protective operations. Special agents also reported that working protective operations requires that they spend more time away from home than investigations (12 special agents) and requires a work schedule dictated by someone else’s (i.e., the protectee’s) schedule (14 special agents). Most special agents we interviewed did not report any instances where they were unable to fulfill a protective assignment due to investigative demands. Of the 40 special agents we interviewed, 35 said there had never been an instance in which they were unable to fully execute a protection-related assignment as a result of their investigative responsibilities. The five special agents who said there were instances in which they could not personally serve in an assignment reported an issue related to staffing. For example, a special agent would have been assigned to a temporary protective activity, but they already had an investigative commitment (e.g., serving as a trial witness). According to Secret Service officials, in these instances special agents are replaced before the protective assignment begins, and thus, there is no negative effect on protective operations. During the course of our interviews, 23 special agents said that during the last two years they frequently or sometimes were required to work on investigations while they were assigned to temporary protective operations. Examples provided by these special agents included working on investigations during protective shifts, before and after protective shifts, and during breaks to pursue investigative leads and respond to U.S. Attorneys. Additional examples associated with this topic are sensitive and have been omitted from this report. These statements are consistent with those expressed in an August 2016 report assessing quality-of-life issues at the Secret Service. Senior Secret Service officials told us that investigations can help prepare Phase 1 special agents for the protective responsibilities required in Phase 2 of their career, which includes an assignment to a permanent protective detail or a specialty division (e.g., counter-assault team). However, the agency has not identified which types of investigations and related activities best prepare special agents for Phase 2, or established a framework to help ensure Phase 1 special agents work on such cases and activities to the extent possible. As described earlier, special agents typically start their careers as Phase 1 special agents in a field office, and work on criminal investigations. Twenty-six of the 40 current and former special agents we interviewed reported that investigations are important in developing the skills necessary for protective assignments. Special agents we interviewed offered examples of skills developed, such as communication, interviewing, and operational planning skills; greater attention to detail; and experience working with law enforcement partners. Special agents further stated that certain types of investigations can offer more skill development opportunities than other types of investigations. For example, 18 special agents we interviewed reported that working on protective intelligence cases can help prepare special agents for protective operations. A senior official in the Office of Protective Operations agreed, and told us that experience with protective intelligence investigations allows special agents to gain insight into both the protectees and the threats against them. In addition, six special agents identified cyber investigations as helping prepare special agents for protective operations. However, 15 special agents reported a type of Secret Service investigation that does not help them develop protection skills. For example, nine special agents said financial crime investigations (e.g., credit card fraud) are not helpful in preparing special agents for protection. As one special agent described, the skills developed from financial investigations do not translate to protection. Similarly, five special agents said that investigations into counterfeiting are not helpful in preparing special agents for protection. The Secret Service’s December 2017 Office of Investigations Priorities and Roadmap states that the office must continually look to identify areas where the expertise it has developed for investigative purposes can be leveraged to advance the Secret Service’s ability to perform its protective responsibilities. In addition, consistent with Standards for Internal Control in the Federal Government, effective management of the Secret Service’s workforce is essential to achieving results, as is continually assessing knowledge, skill, and ability needs of the organization, and establishing training aimed at developing and retaining employee knowledge, skills, and abilities to meet changing organizational needs. Further, according to leading management practices related to training and development efforts, adequate planning allows agencies to establish priorities and determine the best ways to leverage investments to improve performance. However, Secret Service officials told us the agency has not identified which of its current types of criminal investigations and related activities best prepare special agents for protective responsibilities, nor has it established a framework to help ensure that Phase 1 special agents gain experience in those areas to the extent possible. According to Secret Service officials, a list of investigative experiences beneficial to protective assignments existed in the past; however, the list is no longer used in practice and a copy of the list no longer exists. Special agents we interviewed reported that certain types of investigations (e.g., protective intelligence investigations) are more helpful than others in preparing them for protective assignments. Secret Service officials agreed that identifying the types of investigations and activities that best prepare special agents for protective responsibilities, as well as developing a framework to help ensure Phase 1 special agents have the opportunity to work on such cases to the extent possible, could help better prepare their special agents for the protective responsibilities required in Phase 2 of their careers. In addition, a framework could better support the Secret Service’s protective operations by focusing Phase 1 training on building skills needed for successfully executing protective responsibilities. It could also help make Phase 1 special agents more readily available to assist the agency when faced with a surge in protective responsibilities. Types of financial crimes most often prosecuted by U.S. Attorneys based on Secret Service referrals during fiscal years 2014 through 2018 were similarly investigated by four additional federal law enforcement agencies, including the FBI, Homeland Security Investigation, IRS Criminal Investigation, and the U.S. Postal Inspections Service. As shown in figure 7 below, the selected agencies served as lead investigators in a total of 14,669 prosecuted cases across six financial crimes offense types during fiscal years 2014 through 2018, with Secret Service serving as the lead on 31 percent (4,620) of the cases. The Secret Service served as the lead investigating agency on more counterfeiting and forgery, identity theft, and aggravated identity theft cases prosecuted by U.S. Attorneys than any of the other selected law enforcement agencies during fiscal years 2014 through 2018. For example, the Secret Service served as the lead investigative agency on 1,368 counterfeiting and forgery cases that were prosecuted during this time period, while the FBI led 66 cases and IRS Criminal Investigations led six cases that were prosecuted (see figure 7). Although Secret Service was the lead investigative agency on the vast majority of counterfeiting and forgery prosecutions compared to the selected agencies, some types of cases were more evenly divided among the selected agencies. For example, between 2014 and 2018, U.S. Attorney’s Offices prosecuted 608 aggravated identity theft cases for which the Secret Service was the lead investigating agency, while the FBI led 484 prosecuted cases, U.S. Postal Inspections Service led 454 prosecuted cases, and IRS Criminal Investigations led 383 prosecuted cases. All 12 of the federal prosecutors we interviewed told us that the benefits of the Secret Service and selected agencies investigating similar crimes outweigh the drawbacks. These prosecutors highlighted the following three benefits: (1) additional staff resources; (2) agency-specific expertise; and (3) value added by having agencies work together on cases. For instance, three federal prosecutors we interviewed said that the occurrence of financial and cybercrimes in their district was pervasive, and that the number of criminal complaints they received far exceeded the number of federal agents available to investigate. With regard to agency-specific expertise, one federal prosecutor noted that although multiple agencies may conduct counterfeiting investigations, the Secret Service has expertise in this area that is appreciated by local businesses, such as casinos. Finally, agency collaboration can benefit criminal investigations, as in a June 2018 case in which the Department of Justice announced a coordinated effort to disrupt schemes designed to intercept and hijack wire transfers from businesses and individuals. The effort included an investigation by Secret Service and the FBI in which 23 individuals were charged in the Southern District of Florida with laundering at least $10 million. In addition, although the Secret Service and selected federal agencies can investigate similar crimes, federal prosecutors told us that federal agencies prioritize different types of crimes or cases. For example, eleven federal prosecutors told us that the Secret Service was the only agency that referred counterfeiting cases to their district, and 6 federal prosecutors said the Secret Service was the only agency that referred protective intelligence or threat cases. Further, according to senior FBI officials, they generally investigate large-scale financial crimes. On the other hand, the Secret Service may be willing to investigate financial crimes with smaller losses than the FBI, according to senior FBI officials and two federal prosecutors we spoke with. Table 1 below includes the mission and investigative priorities of the Secret Service and selected federal agencies. Although nine of 12 federal prosecutors we interviewed stated that there are no drawbacks to the Secret Service investigating crimes similar to those investigated by selected federal agencies, two of 12 federal prosecutors and one federal agency official identified drawbacks related to deconfliction and case assignment. Specifically, one prosecutor told us that, in the past, there was a greater need for deconfliction between the Secret Service and the FBI, but that deconfliction had not been an issue in the last 18 months. In addition, FBI officials in one field office told us that although the Secret Service and the FBI generally coordinated and worked well together, sometimes there were instances in which they could have deconflicted earlier in an investigation. Another federal prosecutor told us that it may be difficult to know what federal law enforcement agency would be best to assign an investigation since in the early stages of an investigation, the federal prosecutor’s office may lack adequate case information to know what law enforcement agency would be best positioned to conduct an investigation. In December 2017, the Secret Service released the Office of Investigations Priorities and Roadmap (Roadmap). The Roadmap states that fiscal constraints require that the agency prioritize its efforts and take steps to ensure that resources are aligned with its criminal investigative priorities. It further states that the Secret Service will align enterprise-wide investigative activities from independent or uncoordinated cases into a systematic, well-prioritized, and targeted operation to counter the networks of transnational criminals that present risks to financial and payment systems. Towards this effort, the Roadmap states that the Office of Investigations will “counter the most significant criminal threats to the financial and payment systems of the United States through criminal investigations,” and that these investigations will focus on three priority criminal threats: Criminal activity with significant economic and financial impacts to the United States. Criminal activity, such as cybersecurity threats, that operate at scale and present emergent or systemic risks to financial and payments systems. Transnational criminal activity involving corruption, illicit finance, fraud, money laundering, and other financial crimes. To implement the Roadmap, the Office of Investigations was to identify investigative targets, such as specific criminal networks or activities, and develop campaign plans for each investigative target. As described in the Roadmap, the campaign plans were to synchronize the efforts of the Secret Service to counter the targets. They were also to identify government and non-government partners for countering investigative targets. In addition, the campaign plans to counter the most significant criminal threats to the financial and payment systems of the United States were to be reviewed, updated, discontinued, or newly developed on an annual basis. The Secret Service has not, however, employed the practices as identified in the Roadmap because, according to Office of Investigations officials, the approach outlined in the Roadmap is not beneficial given the dynamic nature of the crimes they investigate. Instead, rather than identifying investigative targets based on the most significant threats on a yearly basis and developing campaign plans for each target as originally planned, Secret Service officials report that their Global Investigations Operations Center helps identify individual cases with national significance and coordinate resources necessary to investigate these cases throughout the year. In addition, every two weeks Office of Investigations leadership meets with field office management to discuss their significant cases, including discussions about resource demands for these cases. However, available documentation of efforts taken does not consistently demonstrate synchronized efforts across the agency to counter investigative targets, as envisioned in the Roadmap. This is in part because the process for identifying cases with national significance and coordinating related resources is not documented. The Office of Investigations provided us with campaign plans it developed since the Roadmap was released, and based on our review, there were inconsistencies in the type of information provided. For example, one campaign plan identified gas station pumps that may have been compromised by skimming devices—that is, devices that steal credit card related information. The plan also identified field offices responsible for executing investigations of the gas pumps, timeframes for the investigations, and potential partners. A different campaign plan was an informational alert regarding business email compromises, including details about how the attacks are executed and examples of information the attacker is attempting to steal. However, this plan did not identify offices responsible for combatting the attacks, timeframes, or potential partners. The plan also does not specify what resources would be necessary to combat the identified threat. The Roadmap states that fiscal constraints require the Secret Service to prioritize its efforts and take steps to ensure that resources are aligned with its priorities. This is consistent with the recommendation of an independent panel established by the Secretary of Homeland Security to assess the Secret Service’s operations, which in 2014 recommended that the Secret Service “clearly communicate agency priorities, give effect to those priorities through its actions, and align its operations with its priorities.” Further, Standards for Internal Control in the Federal Government require that management should implement control activities through policies and define objectives clearly. This involves clearly defining what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for realizing the achievement. Documenting a process to ensure the Office of Investigations dedicates resources to priority criminal threats can assist the Secret Service in combatting these threats and ensuring that resources align with its priorities. In addition, the documented process can help ensure that plans for addressing priority criminal threats consistently include key information, such as offices responsible for combatting specific priority criminal threats, timeframes for actions to be taken, potential partners, and resources necessary to combat the identified threat. The Roadmap identifies three priority criminal threats to the U.S. financial and payment systems. However, according to Secret Service officials, the agency does not have a process for identifying cases that address priority criminal threats. In addition, the agency does not collect data on the related expended resources, according to Secret Service officials. Secret Service officials told us they maintain a significant case database, which holds information about individual cases that field office management determine to be significant. However, Secret Service officials told us the significant case database does not currently have the capability to identify whether a case addresses one of the three priority criminal threats, and acknowledged that the criteria of a significant case differ from the criteria of a priority threat outlined in the Roadmap. For example, as stated in the significant case database guidance, “significant cases are those that represent a significant economic or community impact, as well as those that involve multi-jurisdictional districts or schemes that employ emerging technologies.” However, as described earlier in this report, the Roadmap identifies three priority criminal threats, one of which is described as “criminal activity, such as cybersecurity threats, that operate at scale and present emergent or systemic risks to financial and payments systems.” Standards for Internal Control in the Federal Government states that relevant, reliable, and timely information is needed throughout an agency in order to achieve its objectives. However, the Secret Service does not have a systematic process for identifying cases that address priority criminal threats or the related expended resources, according to agency officials. As a result, Office of Investigations management and senior Secret Service officials lack complete information on the number of criminal investigations and amount of resources expended agencywide to investigate the agency’s priority criminal threats. Until the agency identifies investigations that address each priority criminal threat and the related resources, Office of Investigations management and senior-level Secret Service officials will not know the extent to which its operations are aligned with the stated priorities. Capturing and analyzing this data could help inform future decisions on how to allocate resources for addressing priority criminal threats. Since 2017, the Office of Investigations has employed a staffing model to determine how many special agents are necessary to sustain protective and investigative operations in its field offices. The staffing model takes into account the number of hours special agents are expected to work under LEAP and standard overtime, but does not consider annual caps on federal employee salaries. According to the Secret Service’s Human Capital Strategic Plan for Fiscal Years 2018 through 2025, the special agent staffing model is used to analyze the protective workload of the field offices. In addition, the plan stated that the model is used to determine the appropriate levels of investigative and intelligence output while keeping travel and overtime at “tolerable levels.” To fulfill the requirements to qualify for LEAP, Secret Service special agents regularly work a 10-hour day, inclusive of 2 hours of LEAP premium pay, for an annual total of 520 hours beyond the standard work year of 2,080 hours. The Office of Investigations staffing model also assumes special agents will work an estimated standard overtime of 200 hours, among other hours. As a result, the staffing model assumes that each special agent will work an estimated 2,600 hours per year. See Figure 8. However, if certain special agents work the hours projected under the staffing model, they may not be compensated for all of their work time because they may exceed the annual caps on federal employee salaries. For example, in calendar year 2018, using the Secret Service’s pay scale for the Washington, D.C. metro area, the standard pay cap was $164,200. Special agents at pay grade GS 13 Step 9 would have lost compensation if, in addition to their regular hours, they worked 520 hours of LEAP and 200 hours of standard overtime (see table 2). Special agents at pay grade GS 14 Step 6 would have lost compensation if, in addition to their regular hours, they worked 520 hours of LEAP alone. Although legislation was enacted in recent years to address compensation for Secret Service special agents by temporarily raising the pay cap, special agents at higher pay levels may still exceed the temporary pay cap under the current staffing model. For instance, under the temporary cap implemented for fiscal years 2017 and 2018, special agents at the GS 15 Step 5 pay grade would have been uncompensated for some hours if they worked the hours projected under the staffing model. See table 2 for additional details. According to data received from the Secret Service, some special agents did work time that was uncompensated despite the pay cap waivers. In calendar years 2016 through 2018, between 8 and 80 special agents assigned to the Office of Investigations worked some hours without being compensated for their time each year. This resulted in more than $1 million in lost wages (see table 4). Without the pay cap waiver, between 426 and 819 special agents would have worked some hours without being compensated for their time, which would have resulted in a total of $15.4 million in lost wages. See Table 3 for more details. Due to the limits on special agent compensation, the Office of Investigation’s special agent staffing model currently plans for individuals to work hours for which they cannot be compensated. Without adjusting its staffing model to ensure compensation limits are accounted for when estimating staffing needs, certain Secret Service special agents will continue to be under-compensated for their work. Additionally, the Secret Service-specific waiver does not apply after 2020, at which point special agents in the Office of Investigations may further exceed the pay caps and work some hours without compensation. Standards for Internal Control in the Federal Government states that management should design control activities to achieve objectives and respond to risks, such as those related to the management of human capital and the entity’s workforce. Internal control standards also call for the consideration of excessive pressures, noting that excessive pressure can result in personnel “cutting corners” to meet the established goals, and that management can adjust excessive pressures using tools such as rebalancing workloads. The standards further state that management should recruit, develop, and retain competent personnel to achieve the entity’s objectives. Retention can be pursued by, among other things, providing incentives to motivate and reinforce expected levels of performance and desired conduct among staff. Working long hours without being fully compensated may cause special agents to be less focused when providing protection or to seek employment elsewhere. Because the Secret Service’s staffing model does not consider maximum pay cap allowances, the Secret Service will continue to overestimate the number of hours each special agent should work and underestimate the number of staff needed to meet its workload demands. In addition, maximum pay cap allowances are subject to change if legislation does not continue to increase them on an annual basis. As a result, absent developing an updated staffing model that accounts for compensation limits and using that model to estimate staffing needs, the Secret Service risks special agents continuing to work some hours without compensation, and continuing to underestimate staffing needs. The Secret Service plays a critical role in safeguarding both the leadership of the United States and its financial resources. The Secret Service’s Office of Investigations provides valuable support to its protective operations, such as by conducting protective intelligence investigations, building special agents’ protection skills, and allowing the agency the flexibility to shift special agents from investigations to protection in campaign years and other protection-heavy periods. However, the Secret Service could better leverage its investigative responsibilities for supporting protective operations by identifying the types of investigative activities that best prepare special agents for protection, and developing a framework to help ensure special agents participate in those activities to the extent possible. In addition, selected federal prosecutors reported that the Secret Service’s financial investigations are helpful to the law enforcement community as a whole, bringing specialized expertise to investigations and complementing investigations performed by other federal law enforcement agencies. However, although the Secret Service has identified priority criminal threats in its Roadmap, it has not employed the actions identified in its Roadmap to pursue these threats. Rather, the agency relies on its Global Investigations Operations Center to identify individual cases with national significance and coordinate resources because, according to current Office of Investigations officials, the approach outlined in the Roadmap is not beneficial given the dynamic nature of the crimes they investigate. Documenting the process of identifying priority criminal threats and developing campaign plans would help the agency better direct investigative resources towards priority criminal threats. In addition, until the Secret Service identifies cases that address priority criminal threats and captures data on resources used, agency management will not be able to determine the extent to which resources and operations are aligned with priority criminal threats. Finally, special agents can work long hours in carrying out their investigative and protective duties. Unless the Secret Service updates its staffing model to account for compensation limits, the agency risks continuing to underestimate staffing needs and having special agents work some hours without compensation. This could affect retention, potentially weakening the agency’s ability to provide the highest level of quality protection. We are making the following six recommendations to the Secret Service: The Director of the Secret Service should identify which types of investigations and activities best prepare special agents for protective responsibilities. (Recommendation 1) The Director of the Secret Service should develop a framework to help ensure special agents have an opportunity to work, to the extent possible, investigations and activities that best prepare them for protection. (Recommendation 2) The Director of the Secret Service should establish a documented process to ensure that Office of Investigations resources are aligned with priority criminal threats. The process should outline key information to be included in plans for addressing priority threats. (Recommendation 3) The Director of the Secret Service should identify investigations that address priority criminal threats agencywide and collect data on the resources expended to investigate the threats. (Recommendation 4) The Director of the Secret Service should revise its special agent staffing model to ensure compensation limits are accounted for when estimating staffing needs. (Recommendation 5) The Director of the Secret Service should, after revising the special agent staffing model, use the revised model to recalculate and estimate staffing needs. (Recommendation 6) We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reprinted in appendix IV, and technical comments, which we incorporated as appropriate. In its comments, Secret Service, through DHS, concurred with the six recommendations. In addition, in its written comments the Secret Service outlined steps to address the recommendations. With regard to identifying which types of investigations and activities best prepare special agents for protective responsibilities and establishing a framework to help ensure they have an opportunity to work on them, the Secret Service has established a pilot program to revise guidance on preparing special agents for protection. Upon completion of the pilot program in March 2020, the agency plans to revise a directive to give field office supervisors a framework for identifying key training and experiences to prepare special agents for protection. The agency anticipates the new directive being implemented by June 2020. The stated actions are an appropriate response to our recommendation that the Secret Service develop and implement a framework for preparing special agents for protective responsibilities. These actions, if implemented effectively, should address the intent of our first two recommendations. Regarding the establishment of a documented process to ensure that Office of Investigations resources are aligned with priority criminal threats, the Secret Service plans to replace its current guidance, the INV Priorities and Roadmap, with a new strategic document with the goal of better aligning resources to address priority threats by March 2020. Developing an effective strategic plan that sets goals and objectives and outlines effective and efficient operations necessary to fulfill those objectives is consistent with best practices. Likewise, making clear what information should be included in investigative plans for addressing these priority criminal threats will help the Secret Service ensure that its resources use will be aligned with the criminal threats the agency has identified as priorities. We will continue to monitor the Secret Service’s efforts in this area. To identify investigations that address priority criminal threats across the agency, the Office of Investigations intends to revise its internal policy to further define the role of the Global Investigative Operations Center (GIOC), including how the GIOC will identify and track investigations into priority criminal threats. The agency anticipates that these revisions will be published by March 2020. To collect data on the resources expended to address priority criminal threats, the Office of Investigations plans to consider new and additional data collection methodologies. The agency intends to have developed an analysis of the validity of its revised data aggregation methodology by September 2020. Finally, the Office of Investigations plans to address our recommendations related to its staffing model by working with the Office of Strategic Planning and Policy and the Office of Human Resources to revise the staffing model to ensure compensation limits are accounted for when estimating staffing needs. The Office of Investigations then intends to work with these offices and the Chief Financial Officer to use the revised model to recalculate staffing needs. As the Secret Service notes, this recalculation is likely to result in an increase to the number of special agents required for the agency to maintain its current level of investigative engagement. The agency intends to complete the revision of the staffing model by March 2020 and update staffing estimates by June 2020. We also provided the report to the Department of Justice (DOJ). The Executive Office of U.S. Attorneys (EOUSA), a component of the Department of Justice, provided written comments, which are reprinted in appendix IV. In its response, EOUSA, noted that it agreed with our statements that Secret Service is a valuable law enforcement partner in criminal investigations, particularly those related to counterfeit currency, cyber fraud, and identity theft. EOUSA further emphasized that Secret Service’s investigative mission is intrinsically valuable to federal law enforcement efforts. DOJ also provided technical comments, which we incorporated as appropriate. Finally, we provided the report to the Internal Revenue Service, which did not provide comments on the report. The U.S. Postal Service declined to review the public version of the report. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the Attorney General of the United States, the Postmaster General of the United States, and the Commissioner of the Internal Revenue Service, as well as other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or GoodwinG@gao.gov. GAO staff who made key contributions to this report are listed in appendix V. This report addresses the following objectives: (1) how, if at all, do the U.S. Secret Service’s (Secret Service) investigative operations support or negatively affect its protective operations; (2) to what extent do the Secret Service and selected federal entities investigate similar financial crimes, and to what extent do selected federal prosecutors find this to be beneficial; (3) to what extent has the Secret Service developed a plan to combat its priority criminal threats; and (4) to what extent does the Office of Investigations’ staffing model ensures compensation limits are accounted for when estimating staffing needs. This is a public version of a sensitive GAO report that we issued in September 2019. Secret Service deemed some of the information in our September report as sensitive, which must be protected from public disclosure. Therefore, this report omits sensitive information on whether Secret Service’s investigative operations negatively affect its protective operations. Although the information provided in this report is more limited, the report addresses the same objectives as the sensitive report and uses the same methodology. To determine how the Secret Service’s investigative operations potentially support or negatively affect protective operations, we reviewed Secret Service policies and guidance, including those related to Office of Investigations roles and responsibilities, time and attendance, and training. For example, we reviewed the Secret Service’s December 2017 Office of Investigations Priorities and Roadmap (Roadmap) to assess whether the agency is leveraging the expertise it has developed for investigative purposes to advance special agents’ ability to perform protective responsibilities. We also analyzed Secret Service data for fiscal years 2014 through 2018. For example, we analyzed Secret Service time and attendance data to determine the number of hours special agents spent on investigation and protection activities. We focused on special agents in the Office of Investigations, as these personnel are responsible for conducting criminal investigations and temporary protective assignments. Further, the data we analyzed focused on special agents in a field location (e.g., field office or resident office), and thus did not include special agents at headquarters. We focused on field staff because that is how the agency captures and reports the hour-related data in its annual reporting. In addition, we analyzed data on the number of investigative cases opened and closed. We focused on fiscal years 2014 through 2018 as it was the most recent data available at the time of our review; included a fiscal year in which the Secret Service experienced the operational tempo of a presidential campaign (i.e., fiscal year 2016); and included data from two administrations. To assess the reliability of the data, we discussed with Secret Service officials how the data are entered and maintained in their Manhours Reporting System, which tracks special agent workload and tasks, and their Field Investigative Reporting System, which maintains data on field office staffing and investigations. In addition, we compared the data to recent Secret Service annual reports and congressional budget justifications, and inquired about any differences. We also reviewed the data for any obvious errors and anomalies. Based on our review of the data and related controls, we determined that the data were sufficiently reliable for the purposes of reporting the number of hours that special agents in the Office of Investigations expended on different activities and the number of cases opened and closed during fiscal years 2014 through 2018. We also interviewed Secret Service officials at headquarters and selected field offices. We selected office locations using the following criteria: highest number of criminal investigation and protection hours, diversity in types of offices, geographic diversity, and presence of other federal law enforcement agencies. In addition, we conducted semi-structured interviews with 40 current and former Secret Service special agents. Specifically, we randomly selected and interviewed 10 special agents from each of the Secret Service’s three career phases (30 special agents in total). We also interviewed 10 former special agents, including those that retired from the Secret Service and others that left the agency for other reasons. To select these 10 special agents, we asked special agents that we interviewed to recommend former special agents to participate in our study (i.e., snowball sampling) and contacted an association for former Secret Service personnel to help identify recently retired special agents. The information obtained from our interviews cannot be generalized across all current and former special agents; however, the information provided examples and perspectives on how investigative operations can support and negatively affect protective operations. To determine the extent to which the Secret Service and selected federal agencies conduct similar investigations, we analyzed federal prosecutor data from the Legal Information Office Network System (LIONS)—a system maintained by the Department of Justice’s Executive Office for United States Attorneys. We analyzed the data to determine the number and types of cases referred by the Secret Service during fiscal years 2013 through 2017, the latest years for which data was available when making the determination. Specifically, based on our data analyses, we identified the six LIONS categories wherein Secret Service (1) was identified as the lead investigative agency by the US Attorney’s Office and (2) referred the highest number of financial crime cases to federal prosecutors during fiscal years 2013 through 2017. The categories were counterfeiting and forgery, other white collar crime/fraud, financial institution fraud, identity theft, aggravated identity theft, and other fraud against businesses. Next, we identified federal law enforcement agencies that referred the highest number of cases in these categories. Based on our data analyses, we selected the following four law enforcement agencies: the Federal Bureau of Investigation (FBI), the U.S. Postal Inspection Service (USPIS), Homeland Security Investigations (HSI), and Internal Revenue Service – Criminal Investigation (IRS-CI). In the course of our investigation, data from fiscal year 2018 became available, and we analyzed data from fiscal years 2014 through 2018 to determine the extent to which our selected federal law enforcement agencies referred similar types of cases to U.S. Attorney’s Offices as those referred by Secret Service. The information obtained from selected federal agencies cannot be generalized across all federal agencies. However, the information provides examples of how federal law enforcement agencies can conduct similar types of investigations. In addition, the data may not account for all financial crimes cases each agency contributed investigative resources to. This is because the data only includes cases referred by each investigative agency wherein the agency was identified as the lead investigative agency as determined by the U.S. Attorneys who entered the data into LIONS. To assess the reliability of the LIONS data, we discussed with Department of Justice officials how the data are entered and maintained in the system. We also reviewed the data for any obvious errors and anomalies. Based on our reviews and discussions, we determined that the data were sufficiently reliable for the purposes of describing the extent that selected federal law enforcement agencies referred financial crimes cases to federal prosecutors similar to those referred by the Secret Service during fiscal years 2014 through 2018. To help identify potential benefits and drawbacks of the Secret Service and selected federal agencies conducting similar types of investigations, we conducted interviews with officials from the selected federal agencies. Specifically, we interviewed officials at the headquarters and the Miami and New York field office locations for each selected agency in conjunction with site visits to Secret Service field offices in those areas. In addition, we conducted semi-structured interviews with one representative with a high-level understanding of the office’s activities (e.g., criminal chief) at 12 U.S. Attorney Offices (USAO). To select U.S. attorney districts, we established the following criteria to help ensure that we gathered a range of perspectives and interviewed USAOs that were likely to have experience working with Secret Service: highest number of ongoing cases of the types Secret Service investigates the most during fiscal years 2013 through 2017, size of USAO district (as designated by the Department of Justice), geographic diversity, and USAOs located in a state with a Secret Service field office. The information obtained from selected USAOs cannot be generalized across all federal prosecutors; however, the information provided examples of the benefits and drawbacks of selected federal agencies and the Secret Service conducting similar types of investigations. To determine the extent to which the Secret Service has developed a plan to combat its priority criminal threats, we reviewed Office of Investigations policies and guidance. For example, we reviewed the December 2017 Roadmap and guidance related to the Secret Service’s Significant Case Database. In addition, as discussed earlier, we interviewed officials from the Office of Investigations at Secret Service’s headquarters and selected field offices. We held discussions with agency officials to better understand whether the agency had a plan to address priority criminal threats and whether it maintained data on the number of cases that addressed priority criminal threats in fiscal years 2014 through 2018. We also reviewed Standards for Internal Control in the Federal Government to assess whether the Secret Service has the necessary control activities and information to combat its priority criminal threats and carry out its responsibilities. Finally, to understand how the Office of Investigations develops and uses its staffing model, we reviewed agency guidance documents including guidance governing personnel utilization; the Secret Service human resources manual; and the fiscal years 2018-2025 human capital strategic plan. We also received a briefing on the development and use of the Office of Investigations staffing model and the assumptions and statistical methods used in the staffing model from officials in the Office of Investigations. To describe the ways in which federal law affects special agent pay, we reviewed federal laws, such as the Law Enforcement Availability Pay Act of 1994, the Overtime Pay for Protective Services Act of 2016, and the Secret Service Recruitment and Retention Act of 2018. Finally, we reviewed data provided by the Office of Human Resources to determine the number of special agents assigned to the Office of Investigations in calendar years 2016 through 2018 that were not compensated for all the time worked in each calendar year and the total sum unpaid. We determined the data were reliable for the purposes of this report through interviews with officials and evaluations of the system from which the data was pulled. We also reviewed Standards for Internal Controls and previous GAO products to assess the potential effects of some special agents working without compensation. We conducted this performance audit from November 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with Secret Service from October 2019 to January 2020 to prepare this version of the original sensitive report for public release. This public version was also prepared in accordance with these standards. From fiscal years 2014 through 2018, the U.S. Secret Service (Secret Service) expended $9.2 billion, with an average of $1.8 billion per fiscal year. Secret Service officials told us that in fiscal years 2017 and 2018, the Secret Service changed the way it collected and reported expenditure data. Specifically, Department of Homeland Security management directed all agency components to use the Common Appropriations Structure (CAS). As a result, the Secret Service implemented CAS in fiscal year 2017. In addition, the officials told us the Secret Service updated its accounting software in fiscal year 2018, resulting in additional changes to the accounting structure. Secret Service officials told us that because of these changes, it is not possible to accurately compare expenditure data across fiscal years 2014 through 2018. However, Secret Service officials noted that in the future they will be able compare year- over-year fiscal data starting with fiscal year 2018 and beyond using a tool within the new accounting system. A description of the expenditure data for fiscal years 2014 through 2018 is provided below. Secret Service officials told us that in fiscal years 2014 through 2016, expenditure data was collected and reported according to the task being performed. For example, a special agent’s salary was reported under the investigation category if the special agent was performing investigation- related tasks, and it was reported under the protection category if the special agent was performing protection-related tasks. See table 4. According to Secret Service officials, in fiscal year 2017, the agency implemented CAS and began to collect and report expenditure data according to location. For example, a special agent’s salary was reported under the investigation category if the special agent was assigned to an Office of Investigations field office even if the special agent was performing a protection-related task. See table 5. In fiscal year 2018, Secret Service transferred its financial reporting to the Oracle R12 system, which tracks data according to both location and task. In addition, officials noted that other accounting structure changes were made in 2018, such as changes to what activities were classified as protection. As a result, expenditures data from fiscal year 2018 is not comparable to fiscal years 2014 through 2017. See table 6. In 1865, the Secret Service was established by the Secretary of the Treasury for the purpose of investigating the counterfeiting of U.S. currency. Over the course of the next 50 years, the Secret Service’s role within the department continued to evolve as additional duties, such as Presidential protection, were assigned to it. During this time, the authorities exercised by the Secret Service were those delegated to it within the Department of the Treasury and, on occasion, authorities enacted through annual appropriations, which expired at the end of the applicable fiscal year. In 1916, the Secret Service received its first grant of authority enacted by permanent legislation— the Federal Farm Loan Act—which authorized the Secret Service to investigate counterfeiting, embezzlement, fraud, and certain other offenses in the federal farm loan system. Ten years later, the Secret Service received another grant of authority to investigate the counterfeiting of government requests for transportation by common carrier. Later, the Banking Act of 1933 and its 1935 amendments charged the Secret Service with investigating offenses similar to those under the Federal Farm Loan Act, but as applied to the Federal Deposit Insurance Corporation (FDIC). In 1948, the Secret Service’s investigative authorities under the above statutes were consolidated into a single provision of law, 18 U.S.C. § 3056 (“the Secret Service Statute”). However, the 1948 codification effort did not account for the investigative or protective activities that the Secret Service was authorized to perform under a delegation of authority or annual appropriations acts. The authorizing legislation for these activities came three year later, with the 1951 revision of the Secret Service Statute. As originally enacted, the Secret Service’s protective duties extended to the President and his immediate family, the President- elect, and, upon request, the Vice President. On the investigative side, the 1951 statute authorized the Secret Service to investigate any federal offense related to U.S. or foreign coins, obligations and securities, thereby expanding its jurisdiction beyond the enumerated offenses enacted in 1948. Over the next three decades, a series of amendments to the Secret Service Statute added new investigative and protective duties. In 1984, a revised version of the Secret Service Statute was enacted, which incorporated all prior amendments while adding a new investigative responsibility. Although there has not been another wholesale revision of the Secret Service Statute since 1984, subsequent amendments have further increased the Secret Service’s protective and investigative responsibilities. Under the current codification of its primary protective authorities, 18 U.S.C. § 3056(a), the Secret Service protects the President, the Vice President, the President-elect, and the Vice President-elect. The Secret Service may also provide protection, unless declined, to the immediate families of the President, the Vice President, the President-elect, and the Vice President-elect; former Presidents and their spouses for their lifetimes (unless the spouse remarries); children of a former President who are under 16 years of age; visiting heads of foreign states or foreign governments; other distinguished foreign visitors to the United States and official representatives of the United States performing special missions abroad when the President directs that such protection be provided; major Presidential and Vice Presidential candidates and, within 120 days of the general Presidential election, the spouses of such candidates; and, finally, former Vice Presidents, their spouses, and their children who are under 16 years of age, for a period of not more than six months after the date the former Vice President leaves office. Under the current codification of its primary investigative authorities, 18 U.S.C. § 3056(b), the Secret Service conducts criminal investigations in areas such as financial crimes, identity theft, counterfeiting of U.S. currency, computer fraud, computer-based attacks on banking, financial, and telecommunications infrastructure, and a wide range of financial and cybercrimes. In addition to investigating financial and electronic crimes, special agents conduct protective intelligence—investigating threats against protected persons, including the President, and protected facilities, such as protected residences. Table 7 provides a chronology of key statutes enacting protective and investigative authorities under the Secret Service Statute, 18 U.S.C. § 3056. Table 8 provides a cross-reference to enumerated offenses within the Secret Service’s investigative jurisdiction under 18 U.S.C. § 3056(b)(1) of the Secret Service Statute. “the Secret Service is authorized to detect and arrest any person who violates . . . section 508, 509, 510, 871, or 879 of this title or, with respect to the Federal Deposit Insurance Corporation, Federal land banks, and Federal land bank associations, section 213, 216, 433, 493, 657, 709, 1006, 1007, 1011, 1013, 1014, 1907, or 1909 of this title.” The enumerated offenses generally involve fraud, counterfeiting, embezzlement, and certain other misconduct in connection with government transportation requests, federal farm loans, and the Federal Deposit Insurance Corporation. Table 8 provides a brief description of each of the cited offenses. In addition to the contact named above, Joseph P. Cruz (Assistant Director), Jeffrey Fiore, Miriam Hill, Lerone Reid, and Leslie Stubbs made key contributions to this report. Also contributing to this report were Willie Commons III, Christine Davis, Eric Hauswirth, Susan Hsu, Grant Mallie, Claire Peachey, Farrah Stone, Eric Warren, and Sonya Vartivarian.", "summary": "Commonly known for protecting the President, the Secret Service also investigates financial and electronic crimes (e.g., counterfeit currency and identity theft). In recent years, Congress and a panel of experts established by the Secretary of Homeland Security have raised concerns that the Secret Service's investigative operations may negatively affect its protective operations. GAO was asked to review the Secret Service's investigative operations. This report examines, among other things, the extent to which the Secret Service's (1) investigative operations support or negatively affect its protective operations; (2) Office of Investigations has developed a plan to combat its priority criminal threats; and (3) staffing model accounts for federal employee compensation limits. GAO analyzed Secret Service data related to investigation and protection activities from 2014 through 2018; conducted semi-structured interviews with current and former special agents and federal prosecutors; and reviewed Secret Service policies and guidance. This is a public version of a sensitive report that GAO issued in September 2019. Information that the Secret Service deemed sensitive has been omitted. The operations of the U.S. Secret Service (Secret Service) Office of Investigations, which conducts criminal investigations into financial and electronic crimes, generally support Secret Service protective operations in a variety of ways. For example, special agents in the Office of Investigations perform temporary protective assignments, such as during presidential campaigns or augment protective operations by securing a site in advance of a visit by a protectee. GAO found that personnel in the Office of Investigations spent 11.2 million hours supporting protective operations from fiscal years 2014 through 2018. Most of the 40 current and former special agents GAO interviewed said that their investigative duties did not negatively affect protection. However, over half identified that they were frequently or sometimes required to work on investigations while assigned to temporary protective operations. Details associated with this topic are sensitive and have been omitted from this report. In December 2017, the Secret Service developed a plan to align its resources to combat what it identified as priority criminal threats (e.g., criminal activity with significant economic and financial impacts). However, available documentation of efforts taken does not consistently demonstrate synchronized efforts across the agency to counter the priority criminal threats, as envisioned in the plan. Further, the Secret Service does not have a systematic approach for identifying cases that address priority criminal threats. Absent a documented process for aligning resources and identifying cases, Secret Service will continue to lack assurance that its resources are aligned to combat its priority threats. The Office of Investigations employs a staffing model to determine how many special agents are needed in its field offices. The staffing model takes into account the number of law enforcement premium pay and standard overtime hours special agents are expected to work. However, it does not consider annual caps on federal employee salaries. As a result, the agency may be underestimating the number of staff needed to meet its workload demands. GAO is making six recommendations, including that the Secret Service establish a documented process to ensure that resources are dedicated to priority criminal threats, identify investigations that address these threats, and ensure compensation limits are accounted for when estimating staffing needs. The Department of Homeland Security concurred with each of GAO's recommendations.", "document_type": "gao"}
{"report": "Generally, agencies dispose of their excess property through GSA’s government-wide property disposal process. See figure 1. Disposal is facilitated by GSA’s disposal system, known as GSAXcess. Once an agency has determined that it no longer has an internal agency need for its property during agency internal screening, it generally declares and reports the property as excess. Subsequently, the agency places information on the property in GSAXcess and then other federal agencies can screen, request, and, if approved by GSA, obtain the excess property for their own use or can then provide it to an authorized non-federal recipient free of charge, minus transportation costs. If no federal agency (for its own use or use by its eligible non-federal recipient) requests the excess property from GSAXcess, it then becomes surplus to the federal government, and a State Agency for Surplus Property can request it and provide it to eligible non-federal entities in their state, such as local governments and non-profits. Property not claimed by a State Agency for Surplus Property can then be sold to the general public typically through a GSA auction or an approved sales center. Finally, unsold property may be abandoned and destroyed by the reporting agency. Agencies can provide property to non-federal recipients in various ways. Some agencies, such as USDA and DOE, have been granted their own independent authorities that allow them to provide their unneeded or excess property to eligible non-federal recipients, such as public entities and colleges or universities. Eligible recipients are determined by program requirements. Other agencies, such as DOL, predominately provide excess property to non-federal recipients through a grant, contract, or cooperative agreement. For our three selected agencies, we focused on how USDA and DOE provided property to non-federal recipients using their independent authorities and how DOL provided property to non-federal recipients through contracts. Table 1 describes these agencies’ programs that provide property to eligible non-federal recipients. More detail on the independent authorities used by USDA and DOE can be found in appendix II. Additional information about excess property previously provided by DOL through cooperative agreements to apprenticeship programs can be found in appendix III. Agencies with independent authorities and programs differ in when they are able to provide property to non-federal recipients. Such agencies can allow eligible non-federal recipients, as determined by their agency’s independent authority, to screen for and request unneeded property during agency internal screening; in other words, before the property is declared excess and available to other agencies and entities. For example, USDA is authorized to provide certain equipment to its contractors or recipients when doing so would further agricultural research or teaching objectives. Currently, USDA allows eligible non- federal recipients to screen for all USDA unneeded property through an USDA internal module in GSAXcess at the same time as its sub- agencies, and before the property is made available to federal agencies in GSAXcess. If there is no demand for the property by an eligible non- federal recipient during internal screening, it is then made available in GSAXcess, where other agencies screen for and request property for their own use or for use by associated non-federal recipients. Regardless of how agencies provide property to non-federal recipients, they are required to annually report to GSA on property they provided. GSA provides agencies with guidance to assist with their reporting responsibilities, including: GSA Bulletin Federal Management Regulation B-27: defines terms and provides agencies guidance on using GSA’s Personal Property reporting tool. GSA Personal Property Reporting Tool (reporting tool): a template used by federal agencies to report excess property provided to non-federal recipients. The reporting tool has pre-determined drop- down menu items for agencies to select from when reporting property provided to non-federal recipients, such as the authority used. Technical Assistance and Guidance: GSA officials told us that they provide training, technical assistance, and guidance through webinars, email, and phone when agencies seek additional information on reporting requirements. GSA publishes the information reported by agencies in its annual Non- Federal Recipient Report, which includes information such as the agency, non-federal recipient, authority used, and the original acquisition cost of the property. USDA, DOE, and DOL established agency regulations or guidance for managing the disposition of property during the internal-screening process and once it has been declared excess, including providing property to non-federal recipients, as described below. USDA has three separate Federal Excess Personal Property Program handbooks specific to each sub-agency within USDA that manages property provided to non-federal recipients under the Federal Agriculture Improvement and Reform (FAIR) Act, the Forest Service, and the National Institute of Food and Agriculture‘s (NIFA) Federal Excess Personal Property Programs. These handbooks describe the process through which eligible non-federal recipients can screen (i.e., search for and select) for unneeded and excess property. Specifically, USDA makes property available to non-federal recipients for each of these programs during internal screening at the same time that other USDA sub-agencies can screen the property. DOE officials and guidance explained how its offices should dispose of federal excess personal property, including when eligible non- federal recipients can screen for unneeded and excess property. DOE makes property available to non-federal recipients after internal agency screening once it is determined the property is not needed within DOE. For DOE’s Economic Development Property Program, DOE makes property available to the eligible Community Reuse Organization by word of mouth or through a DOE excess email listing. For the Math and Science Equipment Gift Program, the recipient is made aware of property by word of mouth or as a result of a subcontract that has ended with a university. For the Laboratory Equipment Donation Program, DOE extracts energy-related property from within the Energy Asset Disposal System and allows eligible non-federal recipients to screen for that property on an external website. During this screening period by non-federal recipients, if property is requested and the request is approved by DOE, DOE then transfers the property directly to the non-federal recipient. DOL policy explains how Job Corps contractors may directly access GSAXcess to obtain excess property. Specifically, it explains how contractors can screen and obtain excess property when it is made available to all federal agencies and other eligible non-federal recipients, generally on a first-come, first-served basis. Additionally, for USDA and DOE, if there is no demand for unneeded property among eligible non-federal recipients, the property is then declared as excess property and reported to GSA and becomes available in GSAXcess where it is made available to all other federal agencies and eligible non-federal entities. Through the various programs at our selected agencies, officials reported to us that they provided property with an original acquisition value of between $0.4 and $33 million to non-federal recipients through their agency-specific programs in fiscal year 2017, most of it through the Forest Service’s Federal Excess Personal Property Program. (See table 2). The three agencies we reviewed assigned various offices the responsibility for monitoring property provided to non-federal recipients. The program officials in charge of monitoring are to ensure, among other things, that non-federal recipients use the property within a reasonable period of time and for the purpose it was intended, according to agency regulations and program requirements. See figure 2. Once property is provided to a non-federal recipient some agencies retain title, or ownership, of the property, while others pass ownership to the recipient. For agencies disposing of property using the GSA-regulated disposal process, GSA regulations require agencies to, among other things: (1) ensure the use of excess personal property acquired for use by the non- federal recipient is authorized and complies with applicable federal regulations and agency guidelines, (2) review and approve transfer documents once property is requested by the non-federal recipient, and (3) ensure the non-federal recipient does not place the property into storage (i.e., stockpile) property and uses the property within a reasonable time frame. Requirements in the authorizing legislation govern USDA and DOE disposal when these agencies use their independent authorities. While monitoring responsibilities were assigned, these selected agencies reported and we found that property provided to non-federal recipients was sometimes disposed of prematurely, not used at all, or not used within the required time frames. For example: According to Office of Property and Fleet Management officials responsible for property provided under the FAIR Act, they conducted an unscheduled property compliance check at a non-federal recipient location that revealed that a non-federal recipient (i.e., a school) improperly sold property before USDA’s 1-year requirement to use the property was met. As a result, the school was put on probation and was required to send inventory reports to USDA on a regular basis. An official from a state forestry department we spoke to reported having obtained a large vehicle that was not used. Furthermore, this official told us that due to a lack of indoor storage space the vehicle was stored outside exposed to the elements and its condition deteriorated over time. According to Agricultural Research Service officials responsible for property provided under the NIFA Federal Excess Personal Property Program, they revoked the participation of a non-federal recipient (i.e., a college) that was unable to provide information on how or whether property was being used. Several Laboratory Equipment Donation Program recipients reported instances where they did not report required information at the end of the first year of use, according to program requirements. One recipient told us that it never used several pieces of equipment it received because they were in poor condition and put them in storage, rather than disposing of the property. Whether these instances are widespread or uncommon is unknown, due to a lack of consistent monitoring at USDA, DOE, and DOL to determine how and whether the property provided to non-federal recipients was used. USDA’s guidance from the Federal Excess Personal Property Program handbook for the FAIR Act specifies that regular audits and reviews of participating institutions are required to ensure property is being used in support of research, educational, technical, and scientific activities for related programs. Specifically, USDA requires property that is obtained by an institution to be placed into use for the purpose it was acquired within 1-year of receipt and to be used for 1- year thereafter. However, USDA Office of Property and Fleet Management officials told us that due to a limited travel budget and staff to conduct monitoring they relied on informal “spot checks” to monitor property provided to non-federal recipients under the FAIR Act. DOE’s Office of Asset Management said it had discontinued monitoring any excess property provided by the Economic Development Property program to non-federal recipients. According to DOE Office of Asset Management officials, they mistakenly believed the Economic Development Property authority had expired, and thus believed they were relieved of their monitoring responsibilities of the property provided to non-federal recipients. According to officials, they determined during the course of our review that the authority had not expired, but stated DOE regulations currently do not reference Economic Development Property. Officials stated that they did not know when they had last monitored the program and were not informed of its activities, even though between fiscal years 2013 and 2017, DOE reported to GSA’s Non-Federal Recipient Report that the program provided over $154 million in property to non-federal recipients. According to DOE Office of Asset Management officials, they were unaware of the DOE sites that reported this data to GSA. In addition, DOE has previously acknowledged monitoring concerns with the program. Office of Asset Management officials told us they are determining how use of this authority will continue in the future. As of December 2019, DOE’s Office of Asset Management had not issued any new guidance or clarifications on the program, or a time frame for when such guidance or clarification might be issued. DOE’s Office of Science told us it had not consistently monitored property provided to Laboratory Equipment Donation Program recipients to ensure that required information was reported at the end of the first year, which is a requirement of the program. According to three Laboratory Donation Equipment Program recipients we spoke with, they had never provided information to DOE, and DOE had not requested information on property they received. According to Office of Science officials, they had not regularly contacted Laboratory Donation Equipment Program recipients because the process for doing so had been manual, and therefore was unsustainable and led to poor record-keeping. In March 2019, Office of Science officials established a new platform that will generate automatic email notifications to non-federal recipients of Laboratory Equipment Donation Program property within 11 months of receipt. DOE officials told us that the new system started receiving applications in June 2019, and thus DOE will begin the automated notifications no later than May 2020. Within DOL, the National Property Officer for DOL’s Job Corps Program retired in December 2018 and the position has not been officially filled. In September 2019, DOL officials told us that the National Property Officer’s responsibilities—which include periodically reviewing policies, procedures, and excess property provided to Job Corps centers—are temporarily being filled by another employee, in addition to that employee’s other responsibilities. They do not expect to hire a full-time National Property Officer before the end of calendar year 2019. It is unclear to what extent monitoring activities have been conducted within the National Office in the absence of a full-time National Property Officer. We identified discrepancies between the data provided to us by Job Corps Program officials on the excess property provided to Job Corps centers, and the data maintained by the Job Corps centers we visited. For example, we identified items that had been provided to Job Corps centers that were not tracked in DOL’s internal property-management system. According to DOL officials, property under a certain dollar threshold is not tracked internally, a practice that might account for the discrepancies. However, we identified several items that were obtained by Job Corps centers that were over the dollar threshold set by DOL. For example, one Job Corps center we visited obtained two walk-through metal detectors that exceeded the dollar threshold but are missing from DOL’s Job Corps Program data. Offices within our selected agencies also did not fully carry out their oversight responsibilities. According to federal standards for internal control, management should evaluate performance and hold individuals accountable for their internal control responsibilities as well as internally communicate the necessary quality information to achieve the entity’s objectives. Specifically, effective oversight and communication with key stakeholders are essential in ensuring that management is held accountable for carrying out their internal control responsibilities and meeting agency objectives. However, we found that the selected agencies did not take steps, such as communicating information, to ensure that the non-federal recipient programs were carried out in accordance with the agency’s property management regulations or program requirements, for various reasons: At USDA, Office of Property and Fleet Management officials acknowledged they have not consistently provided oversight of personal property across USDA because it was not considered a priority within the agency to do so. For example, until USDA established an inventory-compliance metric, sub-agencies did not regularly conduct required property inventories, and Office of Property and Fleet Management officials lacked the ability to require them to do so. As another example, officials said they requested that an office within USDA reconcile its non-federal recipient reporting data and make changes to the report to be provided to GSA. However, the office did not respond to their request, and the Office of Property and Fleet Management did not have the ability to enforce any corrective actions not taken. These experiences signaled to the Office of Property and Fleet Management that this area was not an agency priority and limited the ability to conduct oversight. However, USDA’s Office of Property and Fleet Management officials conceded that more consistent and robust agency-wide oversight of property provided to non-federal recipients would provide them with a better understanding of the effectiveness of their property-management controls. At DOE, communication problems have interfered with oversight. The Office of Asset Management is responsible for communicating information and providing guidance on the agency’s property management regulations to ensure that program offices are carrying out their property programs in accordance with those regulations. However, according to Office of Science officials, they were unaware that the Laboratory Equipment Donation Program was included in DOE’s property management regulations, though they had seen manuals about the program referenced in other DOE guidance. In addition, according to Office of Science officials, in the absence of information about the Economic Development Program in DOE regulations, they were using DOE guidance that reflected DOE policy to provide property to non-federal recipients. However, the guidance used by Office of Science was discontinued in 2011 and, as mentioned above, is currently under review, according to Office of Asset Management officials. Office of Asset Management officials stated that not having official guidance that can be communicated to the sites about the use of this program is problematic and said they recognized the need for improved guidance and communication between the offices going forward. In addition to these issues, we have reported in the past that managing property in general has been a low priority for federal agencies. Consistent with this report, officials from our three selected agencies stated that it was not always cost-effective to prioritize the monitoring and oversight of property programs for various reasons. Some also reported that, given limited resources, they prioritized high-risk or high-dollar value property that was still in the federal government’s possession rather than low-risk or low-dollar valued property within or divested from federal agency possession. We recognize that higher value property still being used may require more robust monitoring. However, as described above, there are good reasons to pay attention to whether the property provided to non-federal recipients, such as schools and state foresters, is being used according to regulations and guidance—not the least of which, it collectively represents millions of dollars in federal resources. As we described above, our three selected agencies alone provided about $76 million in property to non-federal recipients in fiscal year 2017. Furthermore, agencies may consider the property low value, because they are no longer using it, but if that property, for example an old fire truck, keeps a federal or non-federal entity from purchasing expensive new parts, then it is not as clear that the value of the property is actually low. Finally, no matter the value of the property, agencies without effective oversight of the authorities and programs they are responsible for cannot be assured that they are adhering to federal regulations and meeting program requirements, including whether property is being used as intended or to its fullest extent. Officials’ at the three agencies we reviewed told us that providing unneeded or excess property to non-federal recipients was cost-effective for them or the federal government. For example, DOE officials reported that being able to dispose of property during internal screening helped them dispose of property more quickly than they would be able to do through GSAXcess and also reduced warehousing costs. USDA officials told us that being able to provide property to non-federal recipients potentially saves USDA on warehouse costs, but there are also likely additional savings since many of their non-federal recipients also obtain excess property from other federal agencies. DOL officials told us they save on contracting costs, as the Job Corps centers are able to obtain federal property for free, versus having to purchase similar property, whose costs could be built into contracts with federal agencies and paid for with federal funds. Officials at our selected agencies told us that distributing unneeded and excess property to non-federal recipients also enhances their mission. For example, a USDA official told us a goal of the Federal Excess Property Program under NIFA—as managed by the Agricultural Research Service—was to provide property to non-federal recipients to establish relationships between USDA and state agricultural schools and programs. The official told us there is also increased value to USDA from the partnerships in the program, including an increase in agricultural experimental work and cooperative educational programs that assist USDA. DOE Office of Science officials told us that providing the scientific equipment through the Laboratory Equipment Donation Program encourages colleges and universities to develop energy-related programs. In addition, officials told us the program encourages future scientists to potentially work for DOE in the future. DOL officials told us that providing property to Job Corps center contractors helps DOL provide job training for at-risk youth. All 17 non-federal recipients we spoke with told us that federal property received from the selected agencies was beneficial for their program or department as well. For example, one DOE Laboratory Equipment Donation Program recipient told us that the equipment received was used to furnish a teaching laboratory, which the recipient would not have otherwise been able to purchase due to a limited budget. A state forester told us that property received from the Forest Service’s Federal Excess Property Program (such as fire trucks, gloves, and electronics) has had a real positive effect on rural fire departments because they would otherwise have been unable to purchase these items due to limited budgets. Officials from a DOL Job Corps center told us that the property they obtained as excess from GSAXcess is a lifeline for their operations, as they were able to obtain a lot of dorm and kitchen equipment to assist with their operations. See figure 3 below for examples of equipment obtained by non-federal recipients. While the selected agencies and non-federal recipients report benefits, the agency-specific disposal programs and agreements used at our selected agencies and other agencies may not benefit all federal agencies or even non-federal recipients. As we describe in more detail later in this report, GSA does not have reliable data on the scope of property provided to non-federal recipients across the federal government. However, based on our discussions with GSA officials and other stakeholders, as well as our review of 2003 property utilization and donation study, when agencies use their independent authority, in some instances, other stakeholders may not be eligible to acquire the property. First, non-federal recipients can obtain property at multiple points in the disposal process, a factor that could mean potential recipients get several chances to obtain property. For example, when agencies, such as USDA and DOE, provide unneeded property to non-federal recipients, the property does not enter GSAXcess. Additionally, other federal agencies and State Agencies for Surplus Property may not be eligible recipients to obtain unneeded property. According to the GSA property utilization and donation study, the increase in laws providing agencies with independent authority to give property to non-federal recipients has reduced the remaining pool of assets that would have otherwise entered the government-wide property disposal cycle. Additionally, when property does enter GSAXcess, an agency may obtain the property and provide it to a non-federal recipient. While GSA officials said they prioritize giving the property to the federal agency that plans to use it for its own needs over a federal agency that plans to provide it to a non-federal recipient, GSA officials said they are not always aware of how federal agencies plan to use the property. In this respect, a federal agency may acquire the excess property for use by a non-federal recipient instead of a federal agency acquiring the property for its own use. GSA officials also told us that they did not have data on the amount of property that is provided to non-federal recipients at the various points of the disposal process. Thus, it is unknown how often non-federal recipients obtain excess property from a federal agency, and whether or how often other recipients that may want excess and surplus property are missing out on property. Figure 4 illustrates the reduction in property that can occur when non- federal recipients obtain property at various points in the disposal cycle. Second, because of the decentralized nature of disposal, some non- federal recipients could benefit more than others. For example, a rural fire department eligible to receive property under the USDA Forest Service’s Federal Excess Property Program could potentially obtain property: (1) during USDA internal screening, (2) from USDA as excess, or (3) through their State Agency for Surplus Property once the property is deemed surplus to federal government. Officials from four out of five State Agencies for Surplus Property told us that they have some recipients that are eligible to receive property through multiple points in the disposal process. In contrast, other non-federal entities, such as non-profit groups, may only be able to obtain property through their State Agency for Surplus Property because they are not eligible to receive property under a federal agency-specific program. As a result, these non-federal entities may have less property available to them and would have to pay a fee to the State Agency for Surplus Property to obtain the property. In addition, DOE and USDA officials said they do not advertise their agency- specific property programs, so a smaller pool of eligible recipients may be competing for and benefiting from the property over those that are unaware of those programs. For example, one Laboratory Equipment Donation Program recipient told us he became aware of the program through a previous mentor and would have not otherwise known about the program because it is not advertised. GSA’s reporting tool and accompanying bulletin are unclear, a lack of clarity that resulted in inconsistent data on the number of non-federal recipients obtaining property. As the reporting tool and bulletin serve as the primary means for ensuring consistent information is collected on non-federal recipients that are provided property, it is important that they accurately convey the information agencies should report. However, we found the following three issues made the data unreliable for reporting the amount of property provided to non-federal recipients through authorities and agency specific programs. We found that agencies incorrectly reported the authorities and programs used to provide excess property to non-federal recipients, making it difficult to understand how many agencies are providing property to non- federal recipients or what authority they are using to do it. Our analysis of the non-federal recipient reports found that during fiscal years 2013 to 2017, 16 agencies reported providing property to a non-federal recipient through various types of authorities, including agency-specific authorities. However, one of our selected agencies reported using another agency’s independent authority or program to provide excess property to a non-federal recipient. Specifically, in fiscal year 2016, we found five instances where DOL reported using a DOD independent authority. DOL and GSA officials told us these instances were likely the result of data entry errors. We also found that agencies reported information incorrectly under their own programs. The full extent of such errors in unclear due to the inconsistency and incompleteness of the data; however, we found clear examples of reporting errors that agency officials confirmed. As previously discussed, DOE reported providing $154 million in unneeded property to non-federal recipients through the Economic Development Property program, but DOE officials stated that they do not know if the data were accurate or complete, in part, because the officials were not aware the Economic Development Program existed and thus were not conducting any oversight at the time. DOE officials told us that they are taking steps to clarify when the Economic Development Property program should be used in reporting, and anticipate that the correct reporting will take place in fiscal year 2020 once clarification is complete. These errors occur because GSA’s reporting tool is limited. Specifically, the tool allows those who are inputting the information to select authorities and programs that are not specific to their agencies, rather than limiting options to the drop down menu of selections that actually are appropriate. GSA Office of Government-wide Policy officials told us that they provide a definition sheet, and offer training to each agency on how to enter data, but they are not sure if agencies are using their guidance. Even if those inputting data did refer to the sheet, GSA officials told us that since these are agency-specific programs, they are not aware of all the ways in which agencies are able to provide property to non-federal recipients and that the reporting tool may not reflect all the current authorities and programs used. A DOE official told us that the categories are not mutually exclusive, a situation that is confusing and can lead to inconsistent reporting even among offices within DOE. Because of this data input issue, it makes it difficult to understand how many agencies are providing property to non-federal recipients under these independent authorities. We found that agencies inconsistently reported loaned property provided to non-federal recipients, resulting in inaccurate government-wide data on the amount of loaned property. Our analysis of the data found that only DOE, among all reporting agencies, reported providing loaned property ($104 million) to non-federal recipients between fiscal year 2013 and 2017 to GSA’s Non-Federal Recipient Report. According to DOE’s property guidance, all excess property, including loaned property furnished to non-federal recipients should be reported. Conversely, USDA and DOL officials told us that they did not believe loaned property had to be reported, because title or government ownership of that property remained with the federal government. It is unclear based on GSA’s guidance and interviews with GSA officials whether loaned property should be reported by agencies. GSA’s guidance states that excess property furnished in any manner whatsoever, including loaned property, should be reported. The reporting tool seems to support the guidance, as it included loaned property in the drop-down menu from which agencies could select the mechanism used to provide property. However, GSA’s guidance does not specify the circumstances in which loaned property should be reported and how it may differ from property loaned under an agency-specific program. For example, we found that USDA reported providing property to non-federal recipients under its agency-specific Federal Excess Property Programs when the title or ownership remained with the federal government, but did not report providing any loaned property outside of its agency-specific programs. GSA officials stated that there might be confusion among some agencies about whether excess property loaned to non-federal recipients needs to be reported when ownership remains with the federal government. Because only one agency reported loaned property outside of agency-specific programs, GSA guidance may not clearly specify whether and how loaned property should be reported. We found inconsistencies in how property obtained by agencies in GSAXcess on behalf of non-federal recipients was reported, leading to underreporting of property provided to non-federal recipients. For example, we found that DOL was not reporting property obtained in GSAXcess for its Job Corps centers, because it believed that since this property was obtained from GSAXcess, GSA should be reporting these transactions. GSA officials told us DOL is responsible for reporting this information. According to GSA’s bulletin, agencies are required to report all of their transactions involving excess property provided to non-federal recipients, but do not need to report items sold, transferred, or donated by GSA on their behalf as part of the disposal process. Thus, there may be confusion among agencies on whether property obtained in GSAXcess should be reported by the agency or GSA. As a result, there could be undercounting of property provided to non-federal recipients, as neither DOL nor GSA is reporting the property. GSA Office of Government-wide Policy officials told us that they realize data reporting can be improved but do not have concrete plans in place to do so. For example, GSA officials told us they have identified changes to the reporting tool to make it more user-friendly and to address some of the features that lead to reporting errors. GSA officials provided us with documentation listing some changes they would like to make to the reporting tool, including incorporating a range of data checks that will trigger caution or error messages for inappropriate data entries, and to generate agency system reminders to ensure data are turned in by each agency. GSA officials told us they made some of these changes to the fiscal year 2019 reporting tool. These changes represent a potential step in the right direction. However, GSA has not established a plan with time frames to implement further changes. Moreover, based on the documentation provided to us, it is unclear whether the proposed changes will address some of the limitations we identified including (1) agencies’ reporting property under another agency’s program in the reporting tool, (2) whether loaned property should be reported by agencies, and (3) clarifying what property GSA is reporting on behalf of agencies. According to federal standards for internal control, it is important for management to periodically review policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or related risks. As we have shown, each of these limitations obscure data that would be helpful in understanding whether and to what extent property provided to non-federal recipients is done so at a cost to the federal government. Without addressing the limitations of the reporting tool and bulletin, it is not clear that the non-federal recipients’ report data will be consistent moving forward. Moreover, due to limited data, the implications of providing property to non-federal recipients ahead of other recipients, such as federal agencies and State Agencies for Surplus Property are unknown. Without taking action to update the reporting tool and bulletin to identify issues we found, it is unclear the extent to which GSA will be able to improve the data collected in the Non-Federal Recipient Report. By using GSA’s government-wide disposal process as well as independent agency authorities, agencies have an opportunity to be good stewards of government property by allowing others to reuse federal property in lieu of purchasing new property. While there are benefits to allowing agencies to provide property to non-federal recipients before others receive it, there are also potential implications. In the past, we have observed there is a government-wide lack of attention to management of property other than real property, and we continue to find that lack in this review. A full assessment of whether these efforts are achieving the intended effects are impeded due to a lack of oversight, monitoring, and accurate data about what types and amounts of property are provided to non-federal recipients. Until USDA, DOE, and DOL direct their offices to fulfill their oversight responsibilities, there may be an ongoing lack of accountability for managing such programs. Furthermore, lack of effective monitoring will continue to undermine any assurances to agencies and Congress that this property is being used in a timely manner, as intended, or to its fullest extent. Finally, given the large amount of property managed and disposed of by the federal government each year, the lack of reliable data makes it difficult to understand the overall scope of property provided to non-federal recipients and the implications for the government-wide disposal process. We are making seven recommendations: two recommendations to USDA, two recommendations to DOE, one recommendation to DOL, and two recommendations to GSA. The Secretary of Agriculture should direct the Office of Property and Fleet Management to consistently monitor property provided to non-federal recipients within 1 year of receipt, and to ensure property is being used for its intended purpose 1 year after initial monitoring. (Recommendation 1) The Secretary of Energy should direct the Office of Asset Management to resume monitoring the Economic Development Property program, including property provided to non-federal recipients. (Recommendation 2) The Secretary of Labor should direct the Employment and Training Administration to take steps, such as reconciling data between Job Corps centers and the Job Corps National Office, to ensure that the entities responsible for overseeing and monitoring the Job Corps Program have accurate data on the excess property provided to non-federal recipients. (Recommendation 3) The Secretary of Agriculture should direct the Office of Property and Fleet Management to establish clear processes to oversee property programs, including excess property provided to non-federal recipients across the agency. (Recommendation 4) The Secretary of Energy should direct the Office of Asset Management to update its regulations and guidance on programs that provide property to non-federal recipients to ensure regulations are current and establish a process to regularly communicate information about non-federal recipient programs to DOE program offices. (Recommendation 5) The GSA Administrator should direct the Office of Government-wide Policy to revise the Personal Property Reporting Tool by updating the authorities agencies can select. (Recommendation 6) The GSA Administrator should direct the Office of Government-wide Policy to document in what circumstances excess property loaned to non- federal recipients should be reported and what property GSA is reporting on behalf of agencies, for example, by updating GSA guidance. (Recommendation 7) We provided a draft of this report to USDA, DOE, DOL, and GSA for comment. Three agencies provided comments, which are reprinted in appendixes IV through VI and summarized below. USDA informed us by email that it had no comments and concurred with the recommendations. DOE also provided technical comments, which we incorporated, as appropriate. In its written comments, DOE agreed with our recommendations and stated that the Office of Asset Management will update the annual property reporting requirements for Economic Development Property and will also update DOE’s internal policies and provide property information on DOE’s internal informational website. In its written comments, DOL’s Employment and Training Administration agreed with our recommendation and stated that it will take steps to improve the accuracy of data on excess property provided to Job Corps contractors and has recently taken actions to improve the monitoring and oversight of Job Corps property. For example, the Employment and Training Administration stated it is working closely with DOL’s Office of the Assistant Secretary for Administration and Management to develop a new process for GSAXcess review and will formalize property reporting requirements, processes, and roles and responsibilities in the next update to its property management guidance. In its written comments, GSA agreed with our recommendations and stated that it already added relevant authorities to the Personal Property Reporting Tool in July 2019. In addition, GSA stated it will continue to contact agencies to ensure that all relevant authorities are included in the reporting tool and will evaluate technical updates to the reporting tool to ensure that agencies select an appropriate authority when reporting. Also, GSA stated it will communicate with agencies to clarify any confusion regarding reporting requirements for loaned property and is committed to reviewing and updating relevant regulations and guidance, particularly in terms of reporting property that agencies obtain via GSAXcess. We are sending copies of this report to the appropriate congressional committees, the GSA Administrator, Secretary of Agriculture, Secretary of Energy, Secretary of Labor, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions regarding this report, please contact Lori Rectanus at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix VII. Our review focused on how federal agencies provide, manage, and report on property provided to non-federal recipients. Our objectives were to examine (1) how selected agencies manage unneeded and excess property provided to non-federal recipients, and (2) what is known about the benefits, effects, and reported data of providing property to non- federal recipients. To address both objectives, we reviewed applicable federal statutes and regulations pertaining to property disposal, including General Services Administration (GSA) property management regulations, and agencies’ independent authorities for providing property to non-federal recipients. We also reviewed GSA bulletins, briefings, and a 2003 GSA property utilization and donation study to understand the effects and requirements for providing and reporting property to non- federal recipients. To assess how selected agencies manage unneeded and excess property provided to non-federal recipients, we selected three agencies and reviewed documentation and interviewed officials from the three agencies—the United States Department of Agriculture (USDA), the Department of Energy (DOE), and the Department of Labor (DOL). We selected these agencies using information from GSA’s government-wide Non-Federal Recipient Report that provides data on excess property provided to non-federal recipients by agency, and reports from GSA’s centralized property database (GSAXcess) on overall property disposed of and obtained by federal agencies from fiscal year 2013 to 2017. After reviewing those reports, we selected agencies based on: (1) the amount of property provided to non-federal recipients in terms of original acquisition cost, (2) the amount of property obtained through GSAXcess in terms of original acquisition cost, (3) the number of independent authorities reported being used by the agency to provide property to a non-federal recipient, and (4) the amount of property provided to non- federal recipients through a grant, contract, or cooperative agreement. We selected these agencies based on these factors because we were looking for agencies that provided a large amount of property to non- federal recipients through their independent authorities and programs, as well as an agency that provided less property through the independent authorities and programs, and more through grants, contracts, or cooperative agreements. We reviewed each selected agency’s policies and program guidance describing disposal processes, including processes for providing unneeded and excess property to non-federal recipients, and compared the processes to relevant federal internal control standards on oversight and monitoring. We interviewed agency property management officials as well as agency program officials responsible for managing property provided to non-federal recipients through agency programs, including DOE’s Laboratory Equipment Donation Program, Economic Development Property program, and Math and Science Equipment Gift Program and three USDA Federal Excess Personal Property programs, including the Federal Agriculture Improvement and Reform (FAIR) Act program, the Forest Service Federal Excess Property Program, and the National Institute of Food and Agriculture Federal Excess Property Program to gain a high-level understanding of the impetus of the agency-specific disposal programs, and how those programs were managed. For DOL, officials told us that they currently provided property to non- federal recipients through contracts with DOL Job Corps centers and had previously provided property through cooperative agreements and memorandums of understanding with apprenticeship programs, but these agreements were canceled in 2016. Thus, we interviewed agency officials knowledgeable about excess property obtained through GSAXcess and provided through contracts to Job Corps Centers to understand how DOL provided property to non-federal recipients. More detail on the independent authorities used by agencies can be found in appendix II and additional information about excess property DOL previously provided to apprenticeship programs can be found in appendix III. To assess what is known about the benefits, effects, and reported data on providing property to non-federal recipients, we interviewed officials from State Agencies for Surplus Property in Arizona, California, Georgia, Illinois, and Texas to obtain their views on the GSA property disposal process. We selected these states because their State Agency for Surplus Property was a top 20 recipient of surplus property in terms of original acquisition value during a given year from fiscal year 2014 to fiscal year 2017, according to data provided by GSA on surplus property donation. We also interviewed and obtained documentation from 17 non- federal recipients in those five states to understand how they used unneeded and excess property provided by the USDA’s Forest Service Federal Excess Property Program, the DOE’s Laboratory Equipment Donation Program, and DOL’s Job Corps Program and how monitoring of federal property occurred. We selected these non-federal recipients because they obtained property from these three agencies through their independent authorities or agency programs. Information we obtained from these non-federal recipients is not generalizable to all non-federal recipients of excess property. In addition, we interviewed knowledgeable officials from GSA’s Office of Government-Wide Policy and Office of Personal Property Management. See table 1 for a list of federal agencies, non-federal recipients, and other stakeholders interviewed. We also analyzed and summarized Non-Federal Recipient Report data from fiscal year 2013 to 2017 to understand the scope of excess property that agencies provided to non-federal recipients through various programs and agreements. We used these years because this was the most current data available to us at the time we started our review. To assess the reliability of the Non-Federal Recipient Report data, we (1) performed electronic testing for obvious errors in accuracy and completeness; (2) reviewed GSA’s agency guidance on reporting requirements; and (3) interviewed officials at our selected agencies to discuss identified data errors. We found that information in the database was not sufficiently reliable for reporting the amount of property provided to non-federal recipients through independent authorities and programs. As discussed in the report, we used some of the data to provide illustrative examples of reporting errors and to develop recommendations for improving or establishing management controls to help ensure data quality. We conducted this performance audit from June 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings, and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. For several decades, the U.S. Department of Labor’s (DOL) Employment and Training Administration (ETA) has provided excess property to support apprenticeship training programs, according to DOL officials. For about 15 years, the Office of Apprenticeship within ETA had agreements with two apprenticeship programs—the International Union of Operating Engineers (IUOE) and the International Training Institute for the Sheet Metal Workers and Air Conditioning Industry (ITI) to support the training of apprentices in the fields of heavy equipment operation and maintenance and sheet metal fabrication and installation, respectively. According to the most recent agreements, DOL’s objective was to increase the number of women and minorities in apprenticeships. According to IUOE staff, these agreements supported equipment needs and hands-on training hours at 63 of 64 apprenticeship programs that provide training for construction-industry jobs, and according to ITI staff, property was obtained by its 150 training centers. Under GSA regulations, federal agencies, including DOL, can provide excess property to their grantees, contractors, and cooperatives. DOL executed cooperative agreements and memorandums of understanding with IUOE and ITI to provide excess property to support their apprenticeship training programs. According to DOL officials, the cooperative agreements and memorandums of understanding served as the legal instrument that laid out the relationship between ETA and the apprenticeship programs and the terms and conditions for obtaining excess property. The most recent memorandums of understanding between ETA and the apprenticeship programs were signed in August 2015 and were set to expire on December 31, 2020. IUOE and ITI representatives were provided access to view and request federal excess property in GSAXcess, the General Services Administration’s (GSA) government-wide, web-based system for facilitating the disposal of excess property. As authorized by DOL, IUOE and ITI representatives could screen property at the same time as other federal agencies. Once property was requested, the request would be reviewed and approved by DOL officials, certifying that the property fulfilled a mission-need for the particular site requesting the property. If GSA allocated the property to DOL, the federal agency disposing of the property would transfer the property directly to the training program or school that requested it; the particular training program or school was required to pay any associated transportation costs. Once the property was transferred, the training program or school was responsible for maintaining the property, which remained under the ownership of DOL, and IUOE and ITI were responsible for annually inventorying and certifying the property in their possession. When the property was no longer needed, it could be transferred to another site that needed the equipment or was disposed of by DOL’s listing the property in GSAXcess. There are no available data on the types or number of property that has been historically provided for apprenticeship program use. There are, however, data on what property is currently held by IUOE and ITI. According to DOL, as of September 2019, IUOE had over 2500 pieces of construction equipment and vehicles they obtained from GSAXcess between 1979 and 2017, while ITI had over 2000 pieces of property acquired from GSAXcess between 1999 and 2013. According to IUOE and ITI staff, this property was useful to the sites that received it because it provided training hours to apprentices and lead to cost savings, but challenges were cited in disposing of property when it was no longer needed. Training hours: according to IUOE staff, the equipment they obtained, while often dated, provided invaluable opportunities for apprentices to receive training hours on equipment they might not otherwise obtain. For example, according to IUOE staff, a training center in Michigan obtained a used crane that could cost $1 million to purchase new, and uses it at a dedicated area onsite to support various types of disaster response training activities. According to ITI staff, the property obtained by their schools included hand saws, drills, computers, and furniture. Cost savings: DOL officials and apprenticeship program staff said that the ability to obtain equipment in this fashion lead to cost savings. For example, according to IUOE staff, the property that was obtained through GSAXcess was a key element to fulfilling equipment needs for their programs, particularly for smaller programs that did not have as many resources. However, these sites have other options to obtain equipment, such as from the original equipment manufacturer or on the market. In addition, according to IUOE staff at the Casa Grande Training Center in Arizona, equipment obtained by the site was primarily heavy equipment and rolling stock used to train apprentices and saved the center money because they did not have to purchase new equipment. See figure 5 for an example of excess equipment obtained. ITI staff stated that the property they obtained to support the training of apprentices in their schools allowed the schools to spend funds on other program areas, rather than equipment. Out-of-date equipment: Many IUOE sites continue to use the equipment they obtained, but it is not all in working condition. For example, Casa Grande has some equipment that is no longer in working order and the site does not want to invest money to repair the equipment, if it can no longer use it. According to ITI staff, they have not obtained excess property from GSAXcess since 2013 and have been unable to dispose of property received under prior agreements with DOL that is no longer needed. For example, staff estimated that about 90 percent of the equipment they obtained is now obsolete (over 2,000 items) and they would like to dispose of it. At a school in Miami, Florida, ITI had to purchase additional storage to store obsolete property and classrooms were filled with obsolete computers. ITI schools currently fulfill their equipment needs through loans from ITI headquarters or through purchasing their own equipment. In 2016, DOL made the determination that it would no longer provide equipment to apprenticeship programs due to legal and policy concerns, and according to DOL officials, they dissolved the agreements with IUOE and ITI in October 2016. In August 2017, DOL sent letters to IUOE and ITI stating that DOL would no longer continue to furnish excess property to non-federal entities. In cancelling these agreements, the department said it no longer wanted to retain ownership of the equipment, nor did it have a mechanism to allow IUOE and ITI to retain the property. However, recently DOL has received independent authority to provide property to the apprenticeship programs. Specifically, in its fiscal year 2018 appropriations, DOL received independent statutory authority to provide up to $2 million in excess property to apprenticeship programs for purposes of training apprentices in those programs through grants, cooperative agreements, contracts, or other arrangements. DOL did not provide excess property to these programs during fiscal year 2018. In its fiscal year 2019 appropriations, DOL was again authorized to provide up to $2 million in excess property. According to DOL officials, they planned to use the authority to transfer ownership of property already in IUOE’s and ITI’s possession that the programs would like to keep in support of its apprenticeship training programs. In April and May 2019, DOL officials sent letters to IUOE and ITI requesting that the apprenticeship programs take steps to verify property currently in their possession. In addition, IUOE and ITI were required to identify property for which they would like to obtain ownership from DOL and provided instructions for applying the fair market value to this property. In September 2019, DOL approved the transfer of ownership of 96 items at a fair market value of about $1.7 million IUOE wished to retain and 75 items with a fair market value of about $216,000 ITI wished to retain, for a total of $1.9 million in the aggregate. For property that IUOE and ITI did not want to keep, including obsolete items discussed above, DOL is in the process of disposing of it using GSAXcess, according to DOL officials. DOL officials told us that DOL does not plan to transfer any additional property to apprenticeship training programs in the future because the authority provided in the fiscal year 2019 appropriations expired at the end of the fiscal year. In addition to the contact above, the following staff made key contributions in this report: Aisha Cabrer; Lacey Coppage; Nancy Lueke (Assistant Director); Joshua Ormond; Nitin Rao (Analyst-in-Charge); Amy Rosewarne; Kelly Rubin; Atiya Siddiqi; and Crystal Wesco.", "summary": "The federal government owns and manages over a trillion of dollars of property that is not real property, such as vehicles, computers, and office furniture. Federal agencies generally get rid of excess property through GSA's disposal process, which then allows entities such as other federal agencies, to obtain that property if they want. Some agencies have independent authorities that allow them to provide property to non-federal recipients, such as universities, before or during the GSA disposal process. GAO was asked to review how federal agencies provide property to non-federal recipients. This report examines (1) how selected agencies manage unneeded and excess property provided to non-federal recipients and (2) what is known about benefits, effects, and data on property provided to these recipients. GAO analyzed GSA non-federal recipients' reports from fiscal years 2013 to 2017, the most current available at the start of our review, and selected three agencies—USDA, DOE, and DOL—to obtain variety on the methods used to provide property to non-federal recipients. GAO reviewed relevant processes and interviewed officials from GSA, selected agencies, and non-federal recipients. GAO found the U.S. Department of Agriculture (USDA), Department of Energy (DOE), and Department of Labor (DOL) established a process for providing property to non-federal recipients but had limited insight into how these recipients used this property. Officials told GAO that some of the property was disposed of prematurely or not used at all. Such outcomes are inconsistent with agency policy. Whether these instances are widespread or uncommon is unknown due to a lack of consistent monitoring and oversight. For example, DOE officials said they were not monitoring property provided by one of their programs, because they thought the authorization had expired. Without consistent monitoring or oversight, agencies cannot be assured that property is being used as required or achieving intended objectives. Selected agencies identified benefits of providing unneeded and excess property to non-federal recipients, but the larger effect of these efforts is unclear due to a lack of reported reliable data. Agency officials said providing property to these recipients saves costs and enhances their mission. However, other sources, including a General Services Administration (GSA) study, reported that using these authorities has reduced the amount of property that would otherwise be available to federal agencies or other recipients. While data on property provided to non-federal recipients are key to understanding the effects of the program, GAO found the government-wide data on property provided to non-federal recipients were unreliable. For example, GAO found that agencies reported incorrect authorities for transactions and underreported excess property provided to such recipients. GSA's current reporting tool and guidance are unclear on how agencies should report these items, and GSA does not have definite plans on what changes it will make to address these government-wide data issues. Until these changes are made, it will be hard to understand the scope of property provided to non-federal recipients and assess the effects on the federal government's disposal process, such as whether federal agencies and other recipients may be missing opportunities to obtain property. GAO is making seven recommendations, including one to DOL and two apiece to USDA, DOE, and GSA concerning improving oversight, monitoring, and data quality for property provided to non-federal recipients. All four agencies agreed with the recommendations.", "document_type": "gao"}
{"report": "We reported in June 2018 that CBP increased its emphasis on recruitment by establishing a central recruitment office and increasing its participation in recruitment events. Specifically, CBP’s recruitment budget allocated by the centralized recruting office almost doubled, from approximately $6.4 million in fiscal year 2015 to more than $12.7 million in fiscal year 2017. CBP also more than tripled the total number of recruitment events it participated in, from 905 events in fiscal year 2015 to roughly 3,000 in both fiscal years 2016 and 2017. In addition, we reported that CBP had increased its use of recruitment incentives for OFO specifically from fiscal years 2015 through 2017 to help staff hard-to-fill locations. A recruitment incentive may be paid to a newly-appointed employee if an agency determines that a position is likely to be difficult to fill in the absence of such an incentive. From fiscal years 2015 through 2017, OFO increased the number of recruitment incentives it paid to CBP officers from nine incentives in two locations at a total cost of about $77,600 to 446 incentives across 18 locations at a cost of approximately $4.3 million. AMO and Border Patrol did not use recruitment incentives from fiscal years 2015 through 2017. As a result of its efforts, CBP also experienced an increase in the number of applications it received for law enforcement officer positions across all three operational components from fiscal years 2013 through 2017. For example, with the exception of fiscal year 2014, applications for Border Patrol agent positions increased every year, from roughly 27,000 applications in fiscal year 2013 to more than 91,000 applications in fiscal year 2017. Further, during the same period, applications for CBP officer positions increased from approximately 22,500 to more than 85,000, and applications for AMO’s law enforcement officer positions increased from about 2,000 to more than 5,800. As we reported in June 2018, CBP’s law enforcement applicants undergo a lengthy and rigorous hiring process that includes nearly a dozen steps, including a background investigation, medical examination, physical fitness test, and polygraph examination. Several of these steps can be done concurrently—for example, CBP can begin the background investigation while the candidate completes the physical fitness test and medical examination process steps. Figure 1 depicts the hiring process for Border Patrol agent and CBP officer positions. From fiscal years 2015 through 2017, CBP generally improved its performance in two key metrics to assess the efficiency and effectiveness of its hiring process for law enforcement officer positions. Specifically, CBP reduced its time-to-hire (the average number of days that elapsed between the closing date of a job announcement and an applicant’s entry- on-duty date) and increased the percentage of applicants that are hired. With regard to the time-to-hire metric, as shown in table 1, CBP’s time-to- hire decreased from fiscal years 2015 through 2017. With regard to the percentage of applicants that are hired, CBP’s overall applicant pass rate metric calculates the estimated percentage of applicants who successfully complete the hiring process and enter on duty. CBP data indicate that overall applicant pass rates more than doubled for CBP officer and Border Patrol agent positions from fiscal years 2016 through 2017. CBP officials told us that higher overall applicant pass rates paired with recent increases in the number of applications received by the agency are starting to result in an increase in the number of law enforcement officers hired, as applicants complete CBP’s hiring process and officially enter on duty. As we reported in June 2018, CBP data indicated that more law enforcement officers entered on duty in the first half of fiscal year 2018 than entered on duty in the first half of fiscal year 2017. Specifically, the total number of CBP officers and Border Patrol agents that entered on duty in the first half of fiscal year 2018 increased by roughly 50 percent and 83 percent, respectively, when compared to the same period of the prior fiscal year. Further, the total number of AMO law enforcement officers that entered on duty in the first half of fiscal year 2018 more than doubled from the same period of fiscal year 2017. As we reported in June 2018, CBP has made efforts to improve its hiring process by revising certain aspects of the process, among other things. According to agency officials, these efforts to streamline and improve CBP’s overall hiring process have collectively resulted in the decreased time-to-hire and increased overall applicant pass rates discussed above. For example, in March 2017, CBP was granted the authority to waive the polygraph examination for veterans who meet certain criteria, including those who hold a current, active Top-Secret/Sensitive-Compartmented- Information clearance. Also, in April 2017, CBP received approval from the Office of Personnel Management to use direct-hire authority for law enforcement positions, which allows CBP to expedite the typical hiring process by eliminating competitive rating and ranking procedures and veterans’ preference. As of March 31, 2018, 77 CBP officers and 107 Border Patrol agents had entered on duty through this authority. CBP has also made revisions to specific steps in its hiring process, including the application, entrance examination, and polygraph examination, among others. For example, in fiscal year 2016, CBP reordered its hiring process to place the entrance examination as the first step directly after an applicant submitted an application. Prior to this change, CBP conducted qualification reviews on applicants to ensure they met position requirements before inviting them to take the entrance exam. According to CBP officials, this updated process provided applicants with the opportunity to obtain a realistic preview of the job they were applying for earlier in the hiring process. These officials explained that this helps to ensure that only those applicants who are committed to completing the hiring process and entering on duty at CBP continue through the hiring pipeline, which may help to address high applicant discontinue rates (e.g., roughly half of all eligible applicants in fiscal year 2015 did not take the exam). According to CBP officials, this revision also created efficiencies as the agency no longer has to spend time and resources on completing qualification reviews for applicants who either did not show up to take the exam or failed the exam itself. CBP has also made several changes to its polygraph examination process step, which has consistently had the lowest pass rate of any step in its hiring process. For example, among other things, CBP has increased the number of polygraph examiners available to administer the test, according to agency officials, and was piloting a new type of polygraph exam. According to CBP officials, the new examination focuses on identifying serious crimes and is sufficiently rigorous to ensure that only qualified applicants are able to pass. Preliminary data from CBP’s pilot show that this new exam has demonstrated higher pass rates when compared with CBP’s traditional polygraph exam while also taking less time, on average, per test to complete. At the time of our review, it was too early to tell if these efforts will result in improvements to the polygraph examination step. Available CBP data indicate mixed results. Specifically, while the average duration to complete this step decreased for all law enforcement officer positions from fiscal years 2015 through 2017, pass rates also declined slightly over this same period. For example, for Border Patrol agents, the pass rate declined from 28 to 26 percent, while for CBP officers, it declined from 32 to 25 percent. While CBP had reduced its time-to-hire and made efforts to improve its hiring process for law enforcement officers, CBP officials noted that the hiring process remained lengthy, which directly affected the agency’s ability to recruit and hire for law enforcement positions. CBP officials also stated that their ability to further improve CBP’s time-to-hire and increase law enforcement hires was affected by hiring process steps that can be challenging and time-consuming for applicants to complete, as well as CBP’s reliance on applicants to promptly complete certain aspects of the process. In fiscal year 2017, it took an average of 274 days for Border Patrol agent applicants and 318 days for CBP officer applicants to complete all hiring steps and enter on duty. According to a leading practice in hiring we identified for such positions, agencies should ensure that the hiring process is not protracted or onerous for applicants. According to CBP officials, the agency’s multi-step hiring process for its law enforcement officer positions was intentionally rigorous and involves extensive applicant screening to ensure that only qualified candidates meet the technical, physical, and suitability requirements for employment at CBP. Even so, CBP officials across several components told us that the agency’s time-to-hire was too long and directly affected the component’s ability to recruit and hire for law enforcement positions. For example, OFO officials told us that the longer the hiring process takes to complete, the more likely it was that an applicant will drop out. Further, qualified applicants may also decide to apply for employment at a competing law enforcement agency that may have a less rigorous process than CBP’s, according to CBP officials. One factor that affects CBP’s ability to efficiently process and onboard law enforcement officers are specific hiring process steps that are time- consuming and challenging for candidates to complete. For example, CBP officials cited the polygraph examination as a significant bottleneck within CBP’s hiring process. In addition to having the lowest pass rate of any step in CBP’s process, the polygraph examination also took CBP officer and Border Patrol agent applicants, on average, the longest amount of time to complete in fiscal year 2017—74 days and 94 days, respectively. Further, CBP officials told us that these already lengthy time frames may increase further because of the growing number of applicants for CBP’s law enforcement positions. In addition, on average, it took CBP law enforcement officer applicants across all three components 55 days or more to complete the medical examination and more than 60 days to complete the background investigation. In November 2017, CBP hired a contractor—Accenture Federal Services, LLC—to help the agency recruit and hire the 5,000 Border Patrol agents called for in Executive Order 13767, as well as an additional 2,000 CBP officers and 500 AMO personnel. Specifically, at the time of our June 2018 report, the contract had a total potential period of 5 years at a not- to-exceed value of $297 million. The contract included a base year and four 1-year option periods, which CBP may exercise at its discretion for a total potential period of 5 years. Under this performance-based contract, Accenture is responsible for enhancing CBP’s recruitment efforts and managing the hiring process for those applicants it recruits. We reported that the Accenture contract is intended to enhance CBP’s recruitment efforts by improving its marketing strategy and utilizing new ways to capture and analyze data to better inform recruitment efforts, according to CBP officials. To meet target staffing levels, CBP expected that the contractor would augment CBP’s current hiring infrastructure while pursuing new and innovative hiring initiatives. Specifically, the contractor is responsible for implementing the same hiring process steps and ensuring that all applicants recruited by Accenture meet CBP’s standards. CBP officials also told us that Accenture has the flexibility to pursue novel hiring tactics and pilot initiatives that CBP may not have considered or been able to undertake. For example, Accenture plans to pilot innovative ways to reduce the time-to-hire, including by streamlining steps in the hiring process, which could help to improve CBP’s overall process and generate increased hires for law enforcement positions. At the time of our June 2018 report, some key issues were still being negotiated between CBP and the contractor. For example, while CBP officials told us that the main metric used to assess Accenture’s effectiveness will be the total number of hires the contractor produces, they were still working to finalize other key metrics for evaluating the contractor’s effectiveness as well as an oversight plan to ensure the contractor operates according to agency requirements. As a result, we reported that it was too early to determine whether these initiatives would help increase the number and quality of applicants for CBP’s law enforcement officer positions. We also reported that it was too early to evaluate whether the contractor would be able to efficiently and effectively provide the surge hiring capacity CBP needs to achieve its staffing goals. In June 2018, we reported that CBP’s annual rates of attrition were relatively low, but CBP faced challenges retaining law enforcement officers in hard-to-fill locations. From fiscal years 2013 through 2017, OFO’s annual attrition rates for the CBP officer position were consistent at about 3 percent, while rates for Border Patrol agent and AMO’s Marine Interdiction Agent positions were below 5 percent in 4 out of the 5 fiscal years we reviewed. When we compared CBP’s annual attrition rates for these positions to those of other selected law enforcement agencies, we found that CBP’s attrition rates were similar to U.S. Immigration and Customs Enforcement’s (ICE) annual attrition rates for its law enforcement positions and generally lower than those of the Secret Service and the Federal Bureau of Prisons. Annual attrition rates for AMO’s aviation positions were higher, ranging from 5.0 percent to 9.2 percent for the Air Interdiction Agent position and 7.8 percent to 11.1 percent for the Aviation Enforcement Agent position. Even so, fiscal years 2015 through 2017, attrition rates for these positions have generally remained lower than those of the Secret Service and the Bureau of Prisons. In addition, from fiscal years 2013 through 2017, CBP’s ability to hire more law enforcement officers than it lost varied across positions. Specifically, CBP consistently hired more CBP officers and Aviation Enforcement Agents than it lost. Further, while CBP generally maintained its staffing levels for Marine Interdiction Agents, the agency consistently lost more Border Patrol agents and Air Interdiction Agents than it hired. Even so, onboard staffing levels for all five of CBP’s law enforcement officer positions have consistently remained below authorized staffing levels. CBP has acknowledged that improving its retention of qualified law enforcement personnel is critical in addressing staffing shortfalls, but CBP officials identified difficulties in retaining key law enforcement staff as a result of geographically-remote and hard-to-fill duty locations. CBP officials across all three operational components cited location—and specifically employees’ inability to relocate to posts in more desirable locations—as a primary challenge facing the agency in retaining qualified personnel. Border Patrol officials explained that duty stations in certain remote locations present retention challenges due to quality-of-life factors. For example, the officials told us that agents may not want to live with their families in an area without a hospital, with low-performing schools, or with relatively long commutes from their homes to their duty station. Border Patrol’s difficulty in retaining law enforcement staff in such locations is exacerbated by competition with other federal, state, and local law enforcement organizations for qualified personnel. According to Border Patrol officials, other agencies are often able to offer more desirable duty locations—such as major cities—and, in some cases, higher compensation. CBP data indicate that Border Patrol agents consistently leave the component for employment with other law enforcement agencies, including OFO as well as other DHS components such as ICE. For example, while retirements accounted for more than half of annual CBP officer losses from fiscal years 2013 through 2017, they accounted for less than a quarter of annual Border Patrol agent losses, indicating that the majority of these agents are not retiring but are generally leaving to pursue other employment. Further, according to CBP data, the number of Border Patrol agents departing for employment at other federal agencies increased steadily, from 75 agents in fiscal year 2013 to 348 agents in fiscal year 2017—or nearly 40 percent of all Border Patrol agent losses in that fiscal year. Border Patrol officials told us, for example, that working a standard day shift at ICE in a controlled indoor environment located in a major metropolitan area for similar or even lower salaries presents an attractive career alternative for Border Patrol agents who often work night shifts in extreme weather in geographically remote locations. The President of the National Border Patrol Council also cited this challenge, stating that unless Border Patrol agents have a strong incentive to remain in remote, undesirable locations—such as higher compensation when compared with other law enforcement agencies—they are likely to leave the agency for similar positions located in more desirable locations. While OFO officials told us the component did not face an across-the- board challenge in retaining CBP officers, they have had difficulty retaining officers in certain hard-to-fill locations that may be geographically remote or unattractive for families, such as Nogales, Arizona, and San Ysidro, California. As a result, CBP officer staffing levels in these locations have consistently remained below authorized targets. AMO has also had difficulty retaining its law enforcement personnel—and particularly its Air Interdiction Agent staff—in hard-to-fill locations, such as Aguadilla, Puerto Rico, and Laredo, Texas. However, given the unique qualifications and competencies required for the Air Interdiction Agent position, AMO does not compete with other law enforcement organizations. Instead, AMO officials told us they compete with the commercial airline industry for qualified pilots. Specifically, they stated that this competition is exacerbated by a nationwide shortage of pilots. In addition, AMO officials explained that there is a perception among applicants that commercial airlines are able to offer pilots more desirable locations and higher compensation. However, they told us that AMO generally provided pilots with higher starting salaries than many regional airlines as well as most career options available to helicopter pilots. All three CBP operational components have taken steps to retain qualified law enforcement personnel by offering opportunities for employees to relocate to more desirable locations and pursuing the use of financial incentives, special salary rates, and other payments and allowances. Relocation opportunities. Border Patrol, OFO, and AMO have formal programs that provide law enforcement officers with opportunities to relocate. For example, in fiscal year 2017, Border Patrol implemented its Operational Mobility Program and received initial funding to relocate about 500 Border Patrol agents to new locations based on the component’s staffing needs. According to Border Patrol officials, retaining current employees is a top focus for leadership at the component and this program provides Border Patrol agents with opportunities for a paid relocation to a more desirable location at a lower cost to CBP than an official permanent change of station transfer. As of April 2018, Border Patrol officials told us that 322 Border Patrol agents had accepted reassignment opportunities through the program and the component hoped to continue receiving funding to provide these opportunities. Financial Incentives and Other Payments and Allowances. CBP’s three operational components have also taken steps to supplement employees’ salaries through the use of human capital flexibilities—such as retention and relocation incentives and special salary rates—as well as other payments and allowances. CBP’s goal in pursuing these human capital flexibilities is to retain current employees—especially in remote or hard-to-fill locations—who are likely to internally relocate within CBP to more desirable duty locations or depart the agency for similar positions at other law enforcement organizations or commercial airlines. However, we found that from fiscal years 2013 through 2017, CBP’s use of such financial incentives and other payments was limited, as the agency paid a total of four retention incentives and 13 relocation incentives, and implemented one special salary rate for all positions during this 5-year period. From fiscal years 2013 through 2017, Border Patrol did not offer retention incentives to agents and paid two relocation incentives to transfer Border Patrol agents to Artesia, New Mexico, and Washington, D.C., at a cost of roughly $78,000. However, in fiscal year 2018, Border Patrol increased its use of relocation incentives to facilitate the transfer of agents to duty stations along the southwest border that are less desirable due to the remoteness of the location and lack of basic amenities and infrastructure. Specifically, as of April 2018, 67 Border Patrol agents had received such incentives to relocate to duty stations in Ajo, Arizona; Calexico, California; and Big Bend, Texas; among others. While Border Patrol did not offer retention incentives during our review period, it submitted a formal request to CBP leadership in February 2018 for a 10 percent across-the-board retention incentive for all Border Patrol agents at the GS-13 level and below, which represents the majority of the component’s frontline workforce. According to Border Patrol documentation, these incentives, if implemented, could help reduce Border Patrol’s attrition rate—which has consistently outpaced its hiring rate—by helping retain agents who may have otherwise left Border Patrol for similar positions in OFO, ICE, or other law enforcement agencies. According to CBP officials, as of April 2018, CBP leadership was evaluating Border Patrol’s group retention incentive request, including the costs associated with implementing this 10 percent across-the-board incentive. In addition, as the incentive would benefit Border Patrol agents in all of the component’s duty locations, the extent to which this effort would be effective in targeting agent attrition in the remote locations that represent CBP’s largest staffing challenges remains to be seen. Border Patrol approved the 10 percent retention incentive and is awaiting funding for implementation, according to officials. From fiscal years 2013 through 2017, OFO paid a total of four retention incentives at a cost of $149,000 to retain CBP officers in Tucson, Arizona; Detroit, Michigan; Carbury, North Dakota; and Laredo, Texas. Further, OFO paid seven relocation incentives at a cost of approximately $160,000 to relocate personnel to the hard-to-fill ports of Alcan and Nome, Alaska; Coburn Grove, Maine; and Detroit, Michigan. One OFO official told us OFO did not regularly use these incentives because its relatively low annual attrition rates make it difficult to propose a persuasive business case to CBP leadership that such incentives are necessary. Further, another OFO official explained that OFO’s strategy is focused on using recruitment incentives to staff hard-to-fill locations with new employees. From fiscal years 2013 through 2017, AMO did not offer retention incentives to law enforcement personnel and paid a total of four relocation incentives to transfer three Air Interdiction Agents and one Marine Interdiction Agent to Puerto Rico at a cost of approximately $84,000. However, AMO has taken steps to pursue additional human capital flexibilities to address its difficulty in retaining Air Interdiction Agents, including a group retention incentive and a special salary rate. In June 2018, we reported that CBP does not have a systematic process for capturing and analyzing information on law enforcement officers who are leaving, such as an exit interview or survey. As a result, the agency does not have important information it could use to help inform future retention efforts. Standards for Internal Control in the Federal Government states that management should obtain relevant data from reliable sources and process these data into quality information to make informed decisions in achieving key objectives. Taking steps to ensure that the agency’s operational components are systematically collecting and analyzing complete and accurate information on all departing law enforcement officers—including the factors that influenced their decision to separate—would better position CBP to understand its retention challenges and take appropriate action to address them. We recommended that CBP should ensure that its operational components systematically collect and analyze data on departing law enforcement officers and use this information to inform retention efforts. CBP agreed with the recommendation. CBP officials reported in February 2019 that they developed and implemented a CBP-wide exit survey in August 2018 and have taken steps to promote the survey and encourage exiting CBP employees to fill it out. The officials also noted that they plan to analyze the survey results on a quarterly basis starting in April 2019. These actions, if fully implemented, should address the intent of our recommendation. Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this completes my prepared statement. I would be happy to respond to any questions you or the members of the committee may have. If you or your staff have any questions about this statement, please contact Rebecca Gambler at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Adam Hoffman (Assistant Director), Bryan Bourgault, Sasan J. “Jon” Najmi, and Michelle Serfass. This is a w ork of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety w ithout further permission from GAO. How ever, because this w ork may contain copyrighted images or other material, permission from the copyright holder may be necessary if you w ish to reproduce this material separately.", "summary": "CBP is responsible for securing U.S. borders and employs nearly 45,000 law enforcement officers across its three operational components at and between U.S. ports of entry, in the air and maritime environment, and at certain overseas locations. In recent years, CBP has not attained target staffing levels for its law enforcement positions, citing high attrition rates in some locations, a protracted hiring process, and competition from other law enforcement agencies. This statement addresses CBP's efforts to (1) recruit and more efficiently hire law enforcement applicants, and (2) retain law enforcement officers. This statement is based on a GAO report issued in June 2018 on CBP's recruiting, hiring, and retention efforts along with updates as of February 2019 on actions CBP has taken to address GAO's prior recommendation. For the previous report, GAO analyzed CBP data on recruitment efforts, hiring process steps, and retention rates; examined strategies related to these activities; and interviewed CBP officials and union groups. GAO also reviewed information on CBP actions to implement GAO's prior recommendation. In June 2018, GAO reported that U.S. Customs and Border Protection (CBP) increased its emphasis on recruitment by establishing a central recruitment office in 2016 and increasing its participation in recruitment events, among other things. As a result, the number of applications it received for law enforcement positions across its operational components—the Office of Field Operations, U.S. Border Patrol, and Air and Marine Operations—more than tripled from fiscal years (FY) 2013 through 2017. Also, in November 2017, CBP hired a contractor to more effectively target potential applicants and better utilize data to enhance CBP's recruitment and hiring efforts. However, at the time of GAO's June 2018 report, it was too early to gauge whether the contractor would be effective in helping CBP to achieve its goal to recruit and hire more law enforcement officers. CBP improved its hiring process as demonstrated by two key metrics—reducing its time-to-hire and increasing the percentage of applicants that are hired. As shown in the table, CBP's time-to-hire decreased from FY 2015 through 2017. CBP officials stated that these improvements, paired with increases in applications, have resulted in more hires. However, the hiring process remains lengthy. For example, in FY 2017, CBP officer applications took more than 300 days, on average, to process. Certain factors contributed to the lengthy time-to-hire, including process steps that can be challenging and time-consuming for applicants to complete—such as the polygraph exam—as well as CBP's reliance on applicants to promptly complete certain aspects of the process—such as submitting their background investigation form. CBP enhanced its efforts to address retention challenges. However, staffing levels for law enforcement positions consistently remained below target levels. For example, CBP ended FY 2017 more than 1,100 CBP officers below its target staffing level. CBP officials cited employees' inability to relocate to more desirable locations as the primary retention challenge. CBP offered some relocation opportunities to law enforcement personnel and has pursued the use of financial incentives and other payments to supplement salaries, especially for those staffed to remote or hard-to-fill locations. However, retaining law enforcement officers in hard-to-fill locations continues to be challenging for CBP. GAO reported that CBP could be better positioned to understand its retention challenges and take appropriate action to address them by implementing a formal process for capturing information on all departing employees. In response, CBP officials reported taking steps to implement a CBP-wide exit survey and plan to analyze the results of the survey quarterly, beginning April 2019. GAO recommended in its June 2018 report that CBP systematically collect and analyze data on departing law enforcement officers and use this information to inform retention efforts. DHS concurred, and CBP has actions planned or underway to address this recommendation.", "document_type": "gao"}
{"report": "For many veterans, long-term care is provided directly or purchased by VA. VA provides or pays for long-term care for eligible veterans enrolled in VA’s health care through a variety of programs, including institutional- based care like nursing homes and noninstitutional programs like home health care, which provides care to veterans in their own homes. VA provides or pays for long-term care—ranging from assistance with dressing and bathing to clinical care for spinal injuries or dementia— through a range of three institutional and 11 noninstitutional programs. Institutional programs, such as nursing homes, typically provide more acute skilled nursing care in a residential facility; noninstitutional programs, such as the Home-Based Primary Care program, provide care to veterans in their homes or communities. (See fig. 1 for a list of VA’s institutional and noninstitutional long-term care programs and app. I for brief descriptions of these programs.) Institutional Programs. VA provides or pays for eligible veterans to receive long-term care in three institutional programs that primarily provide skilled nursing care, such as for rehabilitation after surgery or for health issues or disabilities that require 24-hour care in a residential facility. These three programs include: VA Community Living Centers (VA-owned and -operated), Community Nursing Homes (publicly or privately owned and under contract with VA), and State Veterans Homes (state-owned and -operated homes approved and supported by VA). Noninstitutional Programs. VA provides or pays for eligible veterans to receive noninstitutional long-term care through 11 home or community- based programs, where most veterans receive long-term care. Several of VA’s noninstitutional programs provide personal care assistance to help veterans with activities of daily living—e.g., dressing, eating, bathing— that enable veterans to remain living at home, including the Homemaker Home Health Aide, Community Adult Day Health Care, and Respite Care programs. VAMCs evaluate veterans to determine the extent to which they can perform activities of daily living and to identify the available programs that would best meet their needs. In addition, VA’s noninstitutional programs include the Community Residential Care program where caregivers—in settings such as Medical Foster Homes where no more than three residents receive care—provide 24 hour care for veterans who cannot live alone because of medical or mental health conditions. Several of VA’s long-term care programs serve veterans with special needs. For example, some of these programs, such as certain Community Nursing Homes, Adult Day Health Care, and Hospice and Respite Care programs, have specially trained staff to serve veterans with dementia. The Spinal Cord Injury and Disability Home Care program and certain VA Community Living Centers are equipped to serve veterans needing ventilator care. In addition, some programs offer specific services for younger veterans, such as certain Adult Day Health Care programs. All veterans enrolled in the VA health care system are eligible for VA’s basic medical benefits package, which includes certain institutional and noninstitutional long-term care services. A veteran’s eligibility for fully or partially covered nursing home care is determined by the veteran’s priority for care, which is generally based on the veteran’s service- connected disability status. Specifically, VA must cover the full cost of nursing home care for veterans who need this care for a service- connected disability and for veterans with service-connected disabilities rated at 70 percent or more. To the extent resources allow, VA may cover this nursing home care for certain other veterans, such as former prisoners of war and those awarded the Purple Heart. For all other veterans, VA may generally cover nursing home care to the extent resources and capacity allow and with the veteran’s agreement to share certain costs. Veterans’ placement in any particular institutional or noninstitutional long- term care program may depend on their clinical needs, disability ratings, preferences, and the availability of VA programs. When funds are limited, the agency may prioritize program placement based on veterans’ service- connected disability ratings. Decisions about which long-term care programs may be the best fit are made at the VAMC level between VA providers, veterans, and their families. VA providers may discuss a range of factors when making decisions about this care, such as health needs, the type of care provided in different programs, space availability, eligibility, and the veteran’s geographic preference. For facility-based programs, VAMC staff may also encourage veterans to take a tour of the prospective home. VA’s stated goal is to honor veterans’ preferences for care, including finding ways for veterans to age in their homes and communities instead of nursing homes. A diverse set of veterans receive care in VA’s long-term care programs. According to VA data for fiscal year 2018, 70 percent (370,821) of the veterans who received VA long-term care during the fiscal year were aged 65 or older. (See fig. 2.) In addition, 91 percent (480,299) of those who received this care had served in the military prior to September 11, 2001. Lastly, according to VA data for fiscal year 2018, 55 percent (291,197) of veterans receiving long-term care had some level of service- connected disabilities. VA’s planning for veterans’ long-term care is informed by broader strategic planning by VA and the VHA and then operationalized by GEC at the program level. Veterans Integrated Service Networks (VISN) then implement GEC strategies for their regions and VAMCs implement and manage the various programs. VA, through the Assistant Secretary for Enterprise Integration’s office, sets a strategic plan that identifies agency-wide goals. For example, VA’s fiscal year 2018 through 2024 strategic plan identifies a goal that veterans “choose VA for easy access, greater choices, and clear information to make informed decisions,” and the plan notes that VA should “understand veterans’ needs throughout their lives to enhance their choices and improve customer experiences.” VA develops its agency-wide strategic plan every four years. VHA, through its Office of Policy and Planning, identifies strategies within VA’s health care system to address VA’s agency-wide goals. For example, VHA’s fiscal year 2018 through 2019 strategy, operationalizing VA’s goal for veteran choice, is to “honor veterans’ preferences by offering home and community based care to prevent unwanted nursing home care.” VHA strategic planning occurs every two years according to VA officials. VHA’s Office of Enrollment and Forecasting uses the EHCPM to project the utilization of and cost for care across most of VA’s health care programs 20 years into the future, including most long-term care programs. GEC’s strategic planning operationalizes VA and VHA goals and strategies for long-term care at the program level. For example, to achieve VA’s goal of veteran choice and VHA’s strategy of honoring veteran preferences, GEC developed a model to identify veterans at the highest risk of needing nursing home care. According to GEC officials, the GEC strategic planning process generally occurs annually. VISNs are responsible for managing and overseeing VAMCs within their regions where long-term care is delivered, with a GEC point of contact at each VISN who can address GEC issues as they arise, according to VA officials. VAMCs within each VISN are, according to VA officials, responsible for the management of individual long-term care programs, including oversight of long-term care programs’ quality of care. As previously noted, VAMCs also have a role in guiding decisions about individual veterans’ long-term care placement. Other health care systems nationwide are also planning to meet the growing demand for long-term care and have developed strategies to address future long-term care challenges. For example, some state agencies, which provide long-term care through Medicaid, have developed strategies to help aging citizens live in their communities by enhancing community-based services and developing the workforce to provide care. VA has a federal Geriatrics and Gerontology Advisory Group to share knowledge with other long-term care providers and to advise the Secretary and Under Secretary for Health on all matters related to geriatrics and gerontology for the care of veterans. Our analysis of VA data shows that the number of veterans receiving care in one or more of the VA long-term care programs increased 14 percent from fiscal years 2014 through 2018, from 464,071 to 530,327 veterans. The data also show that utilization increased more for noninstitutional programs than for institutional programs. Specifically by program type, VA data show that the number of veterans receiving institutional long-term care increased 8 percent during these years, from 97,124 to 105,151, while the number receiving noninstitutional care increased 16 percent, from 395,736 to 459,783. VA officials told us that the agency is continuing to expand veterans’ access to noninstitutional care programs because institutional care is more costly than home- or community-based care, and because veterans prefer to delay or reduce the amount of nursing home care they receive. Our analysis showed that utilization of long-term care—in terms of various VA workload units—also generally increased from fiscal years 2014 through 2018. The average daily census increased for two of VA’s three institutional programs—Community Nursing Homes increased by 26 percent from 7,771 to 9,808 and State Veterans Homes increased by 1 percent from 23,176 to 23,423. Five of the 11 noninstitutional programs experienced increases in their workload over this period, ranging from 8 percent to 48 percent. For example, the number of VA clinic stops (one type of VA workload unit) in the Homemaker Home Health Aid program—which served approximately 23 percent of the veterans receiving noninstitutional long-term care in fiscal year 2018—increased 48 percent from 8.3 million to 12.3 million clinic stops. (See app. II for more information on veterans’ utilization of institutional and noninstitutional long-term care by program.) According to VA, veterans’ use of VA long-term care programs increased during fiscal years 2014 through 2018 for several reasons, including that a large number of Vietnam veterans are aging and that more veterans are receiving higher service-connected disability ratings. We found the number of veterans who served on or after 9/11 and received VA long- term care to have increased at a faster rate than the overall number of veterans who received this care, from fiscal year 2014 through 2018. Our analysis of VA data shows that VA’s spending for long-term care— which VA reports as obligations—increased 33 percent, from $6.8 billion in fiscal year 2014 to $9.1 billion in fiscal year 2018. Furthermore, over this time period institutional program obligations declined as a proportion of total obligations, from 74 percent to 67 percent, while the proportion of noninstitutional program obligations rose from 26 percent to 33 percent. (See fig. 3.) Looking at VA’s three institutional programs, our analysis shows VA’s obligations for these programs increased 21 percent from fiscal years 2014 through 2018, from $5.0 billion to $6.1 billion. The highest share of obligations for institutional care over this time period was for the VA Community Living Centers program, which increased 11 percent, from $3.3 billion to $3.7 billion. This percentage increase was less than the increases for the Community Nursing Homes program (49 percent) and the State Veterans Homes program (33 percent); however, costs for these last two programs are significantly lower than for the other institutional program. VA obligations for its 11 noninstitutional long-term care programs increased 66 percent, from $1.8 to $2.9 billion, between fiscal years 2014 and 2018. Noninstitutional programs with the highest share of obligations during that period included the Homemaker Home Health Aide, Home-Based Primary Care, Purchased Skilled Home Care, and Home Telehealth programs. Noninstitutional programs with the highest obligation increases included the Homemaker Home Health Aide (109 percent) and Purchased Skilled Home Care (164 percent) programs. However, two noninstitutional programs saw obligations decline during these years, including the State Home Adult Day Health Care program with a 59 percent decrease, and the Community Residential Care program with a 10 percent decrease. (See app. II for more information on VA’s obligations for institutional and noninstitutional long-term care by program.) VA projects utilization of long-term care will increase for most of the programs included in VA’s EHCPM from fiscal years 2017 through 2037. For the two institutional programs included in the EHCPM, VA projects that utilization based on workload units (average daily census) will increase by 80 percent for the Community Nursing Homes program but will decrease by 10 percent for the Community Living Centers program. For the 10 noninstitutional programs included in the EHCPM, VA projects that utilization based on workload units (which differ by program) will increase for nine of the 10 programs—with increases ranging from 1 percent to 95 percent. For example, the number of VA clinic stops for the Homemaker Home Health Aide program is projected to increase 84 percent. (See app. III for more information on projected utilization for institutional and noninstitutional long-term care by program.) VA reports that these projections are based on expected increases in the number of veterans who will rely on VA for their long-term care needs through fiscal year 2037. According to VA officials, these projected increases are due to a variety of factors, including that VA plans to continue expanding the availability of home- and community- based care, and plans to provide care to an increasing number of aging veterans and veterans rated in the highest service-connected disability groups. For example, VA data show that the proportion of long-term care provided to veterans with service-connected disabilities is projected to increase from 60 percent to 78 percent of utilization from fiscal year 2017 to 2037, and the proportion of this care provided to post-9/11 deployed combat veterans is projected to increase from 1 percent to 6 percent of all long- term care utilization during these years. Further, VA officials told us that the agency has planned to expand veterans’ access to noninstitutional care when appropriate, and they have integrated these assumptions into the EHCPM. VA projects that increases in overall demand for long-term care for veterans will result in future expenditure increases for the programs included in VA’s EHCPM. Specifically, VA’s model projects expenditures will more than double from fiscal years 2017 through 2037, increasing from $6.9 billion to $14.3 billion (107 percent). VA projects that its expenditures for its institutional programs will be higher than for its noninstitutional programs, reaching $7.5 billion and $6.8 billion, respectively, by fiscal year 2037. However, VA also projects that the proportion of expenditures for institutional long-term care will decrease from 63 percent to 53 percent, as the share for noninstitutional programs increases. (See fig. 4.) While VA expenditures are projected to increase for all long-term care programs included in the EHCPM from fiscal years 2017 through 2037, the size of these projected increases vary by program. For example, VA projects its expenditures for institutional programs to increase 71 percent overall over this time period, with the VA Community Living Centers program projected to increase 50 percent and the Community Nursing Homes program to increase 149 percent. VA projects that its expenditures for noninstitutional programs will increase 168 percent over this time, with the largest projected increases including the Community Adult Day Health Care (240 percent), Home Respite Care (231 percent), and the Homemaker Home Health Aide (212 percent) programs. (See app. III for more information on projected expenditures for institutional and noninstitutional long-term care by program.) The projected expenditures for care provided to veterans with service- connected disabilities are projected to represent a growing percent of VA’s long-term care expenditures, increasing from 64 percent to 79 percent of expenditures for this care from fiscal years 2017 through 2037. VA projects that its expenditures for care provided to veterans with service-connected disabilities will increase 156 percent during this period, from $4.4 billion to $11.3 billion, while expenditures for care provided to veterans without service-connected disabilities will increase only 19 percent, from $2.5 billion to $3.0 billion. In addition, VA projects that the proportion of spending for long-term care provided to post-9/11 deployed combat veterans will rise from 1 percent to 7 percent during these years, from $89 million to $981 million, as that cohort of veterans ages. As VA works to meet veterans’ growing demand for long-term care, it faces a number of key challenges: workforce shortages, geographic alignment of care, and difficulty meeting veterans’ needs for specialty care. (See table 1.) These challenges, which VA has identified, are similar to challenges faced by other health care systems. However, while VA’s GEC—the office that manages VA long-term care programs—is aware of these challenges, as of November 2019 GEC’s strategic planning has not identified measurable goals for addressing them. Addressing workforce shortages. According to VA, the agency faces challenges hiring the staff needed to meet veterans’ demand for long-term care, a challenge that is likely to grow as demand for care is projected to increase in coming years. We have previously reported on workforce shortages in key positions—such as nursing assistants and home health aides—that are critical for supporting long-term care programs and affect health care systems beyond VA. Within VA, the Healthcare Analysis and Information Group (HAIG) report found that 80 percent of VA community living centers had, at the time of the report, current vacancies for nursing assistant or health technician positions. These workforce challenges have led to waitlists for some long-term care programs. For example, VA officials told us staffing challenges were the key factor creating a waitlist of 1,780 veterans for the Home-Based Primary Care program. (The HAIG report found 65 percent of VA facilities cited staffing as a barrier to expanding Home- Based Primary Care.) GEC officials recognize these workforce challenges and told us they have developed some workforce strategies such as offering geriatrics training to rural primary care providers through GEC’s Geriatric Scholars Program. Aligning care geographically. According to VA, the agency faces challenges aligning its provided or purchased long-term care with where veterans live. VA data show that 2.8 million VA-enrolled veterans lived in rural areas as of 2018, and that veteran populations have shifted to different geographic regions. Providing long-term care in rural areas is a challenge experienced by other health care systems; for example, a report from the Rural Policy Research Institute identified challenges with providing long-term care in rural areas, including “more limited access to services and support” and the “absence of an adequate workforce and infrastructure.” VA officials also told us that veterans moving from one region to another presents demand and capacity challenges. For example, officials told us that veterans have moved away from the Northeast and to the South, and that VA now has too many long-term care beds in the Northeast and too few in the South. VA officials acknowledged the challenge of aligning care with where veterans live and pointed to telehealth, where veterans can receive care remotely, and to Veteran Directed Care program, which provides veterans with a budget to manage their own care, as approaches that could provide care to veterans in rural areas with limited access to VA provided or purchased care. GEC officials have also identified potential strategies to address the issue; for example, GEC’s strategic planning includes a proposal to expand telehealth geriatrics services to reach more veterans, although officials told us this effort is currently unfunded. Further, VA officials from the Office of Policy and Planning said an ongoing market assessment project will provide information that will help VA align its provided and purchased care with where veterans live to better meet veteran needs. Meeting needs for specialty care. According to VA, the agency faces challenges meeting some specialty care needs for veterans in long-term care. Specifically, it can be difficult to find appropriate long- term care settings for veterans with dementia, behavioral issues, and for veterans requiring a ventilator. Meeting specialty care needs is also a challenge for other health care systems; for example, a 2017 study from the RAND Corporation found that the U.S. health system does not have sufficient capacity to care for a growing number of people with Alzheimer’s disease. Challenges in providing this type of care are not new for VA. For example, in 2013 we reported that VA officials told us that while “in certain geographic areas [community living centers] provide certain services that are not available in the community, such as dementia care, behavioral health services, and care for ventilator-dependent residents,” in other areas “these specialized services might not be available in a [community living center] and instead might be available at a community nursing home.” As previously mentioned, VA has developed some programs to provide specialty care (e.g. VA’s Spinal Cord Injury and Disability Care program and the agency’s efforts to educate home caregivers on how to better serve veterans with dementia). While GEC recognizes and has taken some steps to address the challenges it faces in meeting the demand for long-term care, our review of GEC’s most recently approved strategic planning document from March 2019 shows that GEC has not established measurable goals for its efforts to address these three key challenges. GEC has not established measurable goals for its efforts to address workforce shortages, such as specific staffing targets necessary to address the waitlist for the Home-Based Primary Care program, or defining the number of rural providers it expects to train through the Geriatrics Scholar program. GEC has not established measurable goals for its efforts to address the geographic alignment of care, such as specific targets for providing long-term care within the Home Telehealth and Veteran Directed Care programs. GEC has not established measurable goals for its efforts to address difficulties meeting veterans’ needs for specialty care, such as specific targets for the number of available ventilators or the number of caregivers educated to help veterans with dementia. According to GAO’s body of work on effectively managing performance under the Government Performance and Results Act of 1993 (GPRA), as enhanced by the GPRA Modernization Act of 2010, federal agencies should clarify and clearly define measurable outcomes for each strategic objective and assess progress towards those goals. VA officials told us that competing priorities, including implementation of the VA MISSION Act of 2018, have affected GEC’s ability to effectively address challenges to meeting veterans’ long-term care needs. Without measurable goals, however, VA is limited in its ability to better plan for and understand progress towards addressing the challenges it faces meeting veterans’ long-term care needs. As VA works to address these challenges, it does so along with other health care systems, and VA has opportunities for leveraging outside experience through VA’s Geriatrics and Gerontology Advisory Group. For example, the Advisory Group recently acknowledged workforce challenges and recommended that VA “devise strategies to create incentives and identify and remove barriers” for the recruiting and retaining the health care workforce needed to care for VA’s growing geriatric veteran population. In addition to the key challenges that VA and many other health care systems face, VA has identified, but has not planned to take steps to fully address, challenges at the VAMC level that affect its ability to meet veterans’ long-term care needs. Specifically, VA has identified issues with inconsistency in the management of the 14 long-term care programs at the VAMC level that could lead to inefficient and inequitable decisions about long-term care across VA. While VA has identified the steps it can take to address these issues, it has not implemented these steps. First, VA identified that VAMCs do not have a consistent approach to managing VA’s 14 long-term care programs. GEC officials told us that fragmentation of the long-term care programs within the VAMCs—that is, where programs could be run by one or more departments within the VAMC, for example the Nursing department or the Social Work department at VAMCs where there are not GEC staff—hinders standardization and the ability to get veterans the right care. Similarly, the HAIG report found that VAMCs organize their long-term care programs differently and recommended that to “efficiently, reliably, and equitably serve veterans” VA align GEC programs “at all VISNs and eventually VAMCs nationwide.” GEC strategic planning documents outline a goal of alignment within the VISNs, and officials said alignment has been established within the VISNs. However, VA officials told us that, as of October 2019, they had not taken action to pursue VAMC-level alignment with a GEC point of contact at each VAMC that could provide consistency across long-term care programs at the VAMC level. Second, GEC has developed a tool to improve the consistency with which VAMCs determine the amount of services needed for veterans based on their specific health issues. However, as of October 2019, VA has not required the tool be used in all VAMCs. VA has identified that VAMCs do not have a consistent approach to determining the amount of noninstitutional long-term care services veterans need. VA officials told us that, as of October 2019, VAMCs used different methods to assess the amount of noninstitutional long-term care services veterans need—for example, how many hours of in-home care veterans need. As a result, decisions about the amount of services veterans receive may vary by VAMC. The HAIG report recommended that VA use a standardized approach to ensure the “balance of noninstitutional care programs, program reliability, and equity of resource distribution.” GEC officials said the tool they developed is currently being used by some VAMCs, and they expect VA will require the tool to be used by all VAMCs sometime in the next year. However, VA has not set time frames for this requirement. One of VA’s performance goals is to provide highly reliable and integrated care and support and excellent customer service. Furthermore, federal internal controls dictate that federal agencies should exercise oversight responsibility, for example by overseeing the remediation of deficiencies as appropriate and providing direction to management on appropriate time frames for correcting these deficiencies. Although VA has identified steps it can take to improve consistency in long-term care programs, according to officials, it has not prioritized their implementation. Without a reliably consistent approach to administering long-term care programs across its VAMCs, VA may not consistently and equitably meet veteran preferences and needs. VA currently faces difficult challenges meeting the demand for long-term care. These challenges—such as addressing workforce shortages, aligning care geographically, and meeting specialty care needs—are likely to intensify as veterans’ demand for long-term care grows. However, a lack of measurable goals in the strategic planning efforts of VA’s GEC, which has the lead responsibility for managing VA’s 14 long- term care programs, affects VA’s ability to appropriately plan for and understand its progress towards addressing long-term care challenges. In addition to these key challenges, VA has identified, but not yet fully addressed, inconsistencies in the management of the 14 long-term care programs at the VAMC level. These inconsistencies in determining both the best program for veterans and the amount of noninstitutional care veterans need can lead to inefficient and inequitable experiences with VA’s long-term care programs. We are making the following three recommendations to VA: The Secretary of VA should direct GEC leadership to develop measurable goals for its efforts to address key long-term care challenges: workforce shortages, geographic alignment of care, and difficulty meeting veterans’ needs for specialty care. (Recommendation 1) The Secretary of VA should direct GEC leadership to set time frames for and implement a consistent GEC structure at the VAMC level. (Recommendation 2) The Secretary of VA should direct GEC leadership to set time frames for and implement a VAMC-wide standardization of the tool for assessing the noninstitutional program needs of veterans. (Recommendation 3) We provided a draft of this report to VA for review and comment. In its comments, reproduced in appendix IV, VA concurred with our three recommendations and identified actions it is taking to implement them. Specifically, VA said that it will: (1) take steps to incorporate measurable goals and defined timelines into its strategies to meet the long-term care challenges; (2) work to establish a time frame for the execution of a uniform GEC structure at the VAMC level; and (3) work to establish a time frame for the execution of a VAMC-wide standardized tool for evaluating non-institutional care needs for veterans. VA also provided technical comments that we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Veterans Affairs, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at silass@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. VA provides or pays for long-term services and supports, or long-term care, for eligible veterans through a range of three institutional and 11 noninstitutional programs. VA covers the full or partial cost of nursing home care for eligible veterans who require skilled nursing home care in an institutional program. Specifically, VA covers the full cost of nursing home care for veterans who need this care for a service-connected disability—which is an injury or disease that was incurred or aggravated while on active duty—and for veterans with service-connected disabilities rated at 70 percent or more. To the extent resources allow, VA may cover this care for certain other veterans, such as former prisoners of war and those awarded the Purple Heart. For all other veterans, VA may cover nursing home care to the extent resources and capacity allow and with the veteran’s agreement to share certain costs. (See table 2 for more information about these programs.) In addition, all veterans enrolled in the health care system are eligible for VA’s basic medical benefits package, which covers, among other things, a comprehensive array of medically necessary home- and community- based health services. While a veteran’s priority for care generally determines whether these services are provided at full or partial cost, the VA may not charge a copay for home hospice care and may waive copays for home telehealth services. (See table 3 for more information about these programs.) A veteran’s placement in a particular program may depend on their clinical needs, preferences, and the availability of VA funding and programs. payment for a Home Hospice Care program visit from a community provider. The units for each program may differ. VA officials told us that these data do not include non-veterans and may differ from data included in VA’s congressional budget justification for a variety of reasons, including the timing of when they looked at the data, the inclusion of additional data, and that VA used a standard definition of services for all years. In addition to these programs, VA may provide stipends or other services to caregivers for veterans who were seriously injured in the line of duty through the Caregiver Support program. Disabled veterans may also be eligible for increased compensation benefits from the Veterans Benefits Administration. Appendix III: Projected Utilization and Expenditures for Department of Veterans Affairs’ (VA) Long-Term Care Programs, Fiscal Years 2017 through 2037 these data do not include non-veterans and may differ from data included in VA’s budget request for a variety of reasons, including the timing of when they looked at the data, the inclusion of additional data, and that VA used a standard definition of services for all years. Sharon M. Silas, (202) 512-7114 or silass@gao.gov In addition to the contact named above, Karin Wallestad (Assistant Director), Luke Baron (Analyst-In-Charge), Kye Briesath and Corinne Quinones made key contributions to this report. Also contributing were Laurie Pachter, Vikki Porter, Jennifer Rudisill, and Selah Myers. Veterans Affairs: Sustained Leadership Attention Needed to Address Long-Standing Workforce Problems, GAO-19-720T (Washington, D.C.: Sept. 18, 2019). Veterans Health Care: VA Needs to Improve Its Allocation and Monitoring of Funding, GAO-19-670 (Washington, D.C.: Sept. 23, 2019). VA Health Care: Actions Needed to Improve Family Caregiver Program, GAO-19-618 (Washington, D.C.: Sept. 16, 2019). Veterans Health Care: Opportunities Remain to Improve Appointment Scheduling within VA and through Community Care, GAO-19-687T (Washington, D.C.: July 24, 2019). VA Health Care: Estimating Resources Needed to Provide Community Care, GAO-19-478 (Washington, D.C.: June 12, 2019). VA Real Property: Improvements in Facility Planning Needed to Ensure VA Meets Changes in Veterans’ Needs and Expectations, GAO-19-440 (Washington, D.C.: June 13, 2019). VA Nursing Home Care: VA Has Opportunities to Enhance Its Oversight and Provide More Comprehensive Information on Its Website, GAO-19-428 (Washington, D.C.: July 3, 2019). Long-Term Care Workforce: Better Information Needed on Nursing Assistants, Home Health Aides, and Other Direct Care Workers, GAO-16-718 (Washington, D.C.: Aug. 16, 2016). VA Mental Health: Clearer Guidance on Access Policies and Wait-Time Data Needed, GAO-16-24 (Washington, D.C.: Oct. 28, 2015). VA Nursing Homes: Reporting More Complete Data on Workload and Expenditures Could Enhance Oversight, GAO-14-89 (Washington, D.C.: Dec. 20, 2013). Older Americans: Continuing Care Retirement Communities Can Provide Benefits, but Not Without Some Risk, GAO-10-611 (Washington, D.C.: June 21, 2010). VA Health Care: Long-term Care Strategic Planning and Budgeting Need Improvement, GAO-09-145 (Washington, D.C.: Jan. 23, 2009).", "summary": "Veterans rely on long-term care to address a broad spectrum of needs, from providing occasional help around the house to daily assistance with eating or bathing to round-the-clock clinical care. Veterans' eligibility for this care is primarily based on their service-connected disability status, among other factors. Congress included a provision in statute for GAO to review VA's long-term care programs. This report (1) describes the use of and spending for VA long-term care and (2) discusses the challenges VA faces in meeting veterans' demand for long-term care and examines VA's plans to address those challenges. GAO reviewed VA documents, such as strategic planning documents for long-term care programs and analyzed VA utilization and expenditure data for fiscal years 2014 through 2018 (the latest available at the time of the review) and projected data through 2037. GAO also interviewed officials from VA, including officials from VA's GEC, which is responsible for overseeing long-term care programs; and from Veterans Service Organizations. The Department of Veterans Affairs (VA) provides or purchases long-term care for eligible veterans through 14 long-term care programs in institutional settings like nursing homes and noninstitutional settings like veterans' homes. From fiscal years 2014 through 2018, VA data show that the number of veterans receiving long-term care in these programs increased 14 percent (from 464,071 to 530,327 veterans), and obligations for the programs increased 33 percent (from $6.8 to $9.1 billion). VA projects demand for long-term care will continue to increase, driven in part by growing numbers of aging veterans and veterans with service-connected disabilities. Expenditures for long-term care are projected to double by 2037, as shown below. According to VA officials, VA plans to expand veterans' access to noninstitutional programs, when appropriate, to prevent or delay nursing home care and to reduce costs. VA currently faces three key challenges meeting the growing demand for long-term care: workforce shortages, geographic alignment of care (particularly for veterans in rural areas), and difficulty meeting veterans' needs for specialty care. VA's Geriatrics and Extended Care office (GEC) recognizes these challenges and has developed some plans to address them. However, GEC has not established measurable goals for these efforts, such as specific staffing targets for programs with waitlists or specific targets for providing telehealth to veterans in rural areas. Without measurable goals, VA is limited in its ability to address the challenges it faces meeting veterans' long-term care needs. GAO is making three recommendations, including that VA develop measurable goals for its efforts to address key challenges in meeting the demand for long-term care. VA concurred with GAO's recommendations and identified actions it will take to implement them.", "document_type": "gao"}
{"report": "Collectively, the ongoing GPS acquisition efforts aim to (1) modernize and sustain the existing GPS capability and (2) enhance the current GPS system by adding a more cybersecure ground system that enables M- code. M-code is a stronger, encrypted, military-specific GPS signal designed to meet military positioning, navigation, and timing needs. It will help military users overcome GPS signal jamming by using a more powerful signal and protect against false GPS signals, known as spoofing, by encrypting the signal. Figure 1 below shows how GPS satellites, ground control, and user equipment—in the form of receiver cards embedded in systems—function together as an operational system. The Air Force’s OCX program is primarily a software development effort to replace the current ground system, the operational control system (OCS), with a modernized and more cybersecure system. OCS lacks modern cybersecurity protections and cannot currently control—or enable—modernized features of the three latest generations of GPS satellites now in orbit, including M-code and three new civilian signals. Because existing military receivers were not designed to work with the new M-code signal, military users will have to make investments in new receiver development and procurement timed to when the new signal will be available before they can use it. Raytheon is the prime contractor working to deliver OCX in a series of blocks that enable additional capabilities. Block 0, which is a subset of block 1 broken out after development started, was delivered in September 2017. It helped to successfully enable the launch and initial testing of the first GPS III satellite, which was launched in December 2018, and will continue to support subsequent GPS III satellite launches. Blocks 1 and 2, originally planned as separate deliveries, have been combined into a single delivery and are currently in development. This combined delivery enables OCX to command and control each satellite and begin using the full M-code signal, as well as control new civilian signals, among other capabilities. Because of significant delays to OCX, the Air Force initiated two additional programs to modify OCS to deliver some of the planned capabilities before OCX is operational. The first program is Contingency Operations (COps)—which will enable the control of GPS III satellites to operate with the same capabilities as current GPS satellites without the additional military and civilian signals. The second program is M-code Early Use (MCEU)—which will permit some functions of M-code to be used before OCX is delivered. Neither COps nor MCEU will enable the additional civilian signals or the full M-code functionality that is expected with OCX. DOD is required by statute to establish and approve cost and schedule baselines for major defense acquisition programs before those programs enter system development, also known as the engineering and manufacturing development phase. As part of program planning, including for major defense acquisition programs, DOD policy requires program managers to establish program goals for cost, schedule, and performance parameters. Approved program baseline parameters are reported in the program’s acquisition program baseline as objective and threshold values. The objective values represent goals in terms of what the user—in the case of GPS, the Air Force—desires and expects. The threshold values represent the limit of what is acceptable—meaning cost or schedule growth above threshold values are outside of the approved cost or schedule limits. For OCX, the cost and schedule objective and threshold dates in the baseline are tied to an event called “ready to transition to operations,” which will be the completion of the OCX acquisition program schedule. For the OCX program, this is a decision within the Air Force to switch control of the GPS constellation from the current GPS ground system, OCS—at this future point with COps and MCEU modifications already added—to OCX. The delivery date of the system by Raytheon and acceptance date by the Air Force will both come before the ready to transition to operations decision. These two dates are important because their timing may influence when OCX operates. What is a critical Nunn-McCurdy unit cost breach? For major defense acquisition programs, a critical Nunn-McCurdy unit cost breach of a unit cost threshold is triggered by cost increases of at least 25 percent or more of a program’s current cost baseline or at least 50 percent or more of a program’s original cost baseline. As an acquisition program works to achieve its objective and threshold values, the original baseline goals may become unachievable. When this occurs, a revised baseline, or rebaseline, is created so the program’s cost and schedule goals are updated to more realistically reflect the program’s current status. If the increase from the cost baseline meets certain thresholds, DOD is required to notify Congress in writing. This is known as a Nunn-McCurdy breach. This notification assists Congress with monitoring program progress, especially on troubled programs. A critical Nunn-McCurdy unit cost breach is the most serious type of breach and requires a program to be terminated unless the Secretary of Defense submits a written certification to Congress that certain criteria have been met, including that the new estimate of the program’s cost has been determined to be reasonable by the Director of DOD’s Office of Cost Assessment and Program Evaluation, and takes other actions, including restructuring the program. As we have previously reported, the Air Force has had significant difficulties developing OCX. The program’s cost and schedule baselines have been unstable and unexecutable since the first baseline was established in 2012. In total, there have been three OCX program baselines: 1. November 2012 original baseline at development start, 2. October 2015 rebaseline due to a schedule breach, and 3. September 2018 rebaseline prompted by a critical Nunn-McCurdy unit cost breach. Since 2012, reflecting the newest baseline and additional cost and schedule growth since the Nunn-McCurdy breach, the schedule has more than doubled and the costs have grown by approximately 68 percent. Figure 2 shows the three OCX baselines with their schedule and cost growth since the start of development. The National Defense Authorization Act for Fiscal Year 2017 required an independent assessment of OCX. The Act required an assessment of the Air Force’s ability to complete blocks 0 through 2 on a schedule necessary to transition OCX to full operation and an estimate of the cost, among other issues. The MITRE Corporation conducted the study and DOD provided it to congressional defense committees in December 2017. As a result of the 2016 Nunn-McCurdy unit cost breach, the program repeated the milestone associated with system development start and established new cost and schedule objectives and thresholds, conducted a baseline review of the schedule to verify the work necessary to complete the program, and received approval of the acquisition program baseline by the milestone decision authority—the Under Secretary of Defense for Acquisition and Sustainment. To support certification of OCX’s new baseline, in May 2017 the Air Force produced an $8.7 billion OCX service cost position for development, sustainment, and disposal. The Air Force service cost position was subsequently reaffirmed in 2018 by the Air Force and supported by an additional independent cost estimate from DOD’s Office of Cost Assessment and Program Evaluation in June 2018, which was approximately 3 percent higher in cost for the development portion. The Under Secretary of Defense for Acquisition and Sustainment selected the Air Force service cost position for the OCX baseline. In 2014, the Air Force identified root causes for OCX cost and schedule growth and concluded that the problems were driven by (1) incomplete systems engineering, (2) inadequate process discipline, and (3) difficulties implementing cybersecurity due to its complexity. We reported in 2015 that the program office paused development in late 2013 to fix what it believed were the root causes of development issues, and significantly increased the program’s cost and schedule estimates. Despite the pause to address root causes, problems persisted and in the same report we questioned whether all root causes—such as a persistently high software development defect rate—had been adequately identified, let alone addressed, and whether realistic cost and schedule estimates had been developed. We also found that the program was not following various acquisition best practices, such as the completion of a preliminary design review prior to development start. In 2015, we recommended that DOD assemble a task force to assess the OCX program and provide concrete guidance for addressing program problems, to determine root causes for OCX defects, and to establish a high confidence schedule and cost estimate, among other recommendations. DOD concurred with our four OCX-related recommendations and has taken some steps to implement some of them. However, to date, none have been fully implemented and they remain open. In 2016, DOD’s Director of Performance Assessments and Root Cause Analyses concluded that the root causes for OCX’s Nunn-McCurdy unit cost breach were (1) an unrealistic schedule driven by the need to sustain the GPS constellation, (2) an underestimation of the cost to fully implement information assurance, or cybersecurity, and (3) poor performance by both the government, caused by a lack of requisite software expertise, and Raytheon, caused by poor systems engineering that led to significant rework. We found and DOD’s 2016 root cause analysis has shown a significant and recurring cause of delays on the OCX program has been a lack of mutual understanding of the work between the Air Force and Raytheon. In December 2017, we found risks to the latest proposed (but not yet then approved) OCX schedule, noting that the schedule to which the program was working at that time (1) was built on certain unproven assumptions regarding planned coding and testing improvements, (2) had not yet undergone a baseline review to verify that the schedule incorporated all of the work required for program completion, and (3) did not yet include a number of changes that the Air Force needed to incorporate into the contract with Raytheon as modifications, which may lead to additional schedule slips. In 2017, we did not make additional recommendations for OCX because the Air Force had undertaken the COps and MCEU programs to provide interim capabilities to mitigate OCX delays. In 2016, Defense Digital Service—a DOD office established by the Secretary of Defense—engaged with the OCX program to suggest improvements to Raytheon’s software development practices. The office recommended that Raytheon change its software development approach to use an incremental development approach. This approach uses a continuous integration and testing process, where the software code is frequently integrated and tested so that defects are detected and addressed sooner. This is done through automation of the software development process, version control tools, and coordination between different teams building software. Traditional software development methods entail a more linear approach whereby each process is completed before proceeding to the next process in the sequence. By such an approach, the software development processes are completed prior to the testing of a full product before the product’s release to the end user. In 2016, DOD told the Air Force and Raytheon to utilize the new approach, which Raytheon began implementing in a series of seven phases. The first phase began in late 2016 and the last phase is scheduled to be in place by the end of 2019. According to the Air Force and Raytheon, through this new approach, the program aims to introduce efficiencies building software in several ways: 1. discovering defects in software code earlier; 2. reducing the number of defects; 3. reducing the amount of time it takes to repair defects; and 4. reducing the overall time to code, integrate, and test OCX software through automation for some aspects of the software development. OCX delivery, acceptance, and the ready to transition to operations decision will likely be delayed, potentially exceeding the April 2023 threshold date for completing the program. Actual development progress has been mixed, with some improvement to the pace of software development. However, the majority of the schedule reserve has been consumed and defect repairs are taking longer than assumed with significant work remaining. In addition, a number of new cost and schedule risks to OCX delivery have arisen since the program schedule was established. GAO’s schedule and cost estimating best practices recommend that the schedule assessment be periodically updated to reflect actual progress and new risks. To mitigate program optimism, GAO’s cost estimating best practices also state it is important to have an independent view of cost estimates and schedules. While the Air Force and the contractor periodically update their schedule estimates, no plans currently exist for further independent analysis of the full program schedule within DOD, and there is no requirement to do so. The OCX program has significant work remaining before OCX is operational, including years of integration and testing. Achieving the full program schedule requires two interrelated steps. First, in order to meet the program schedule there must be timely delivery by Raytheon and acceptance of the system by the Air Force. Second, there must be timely completion of government-run post-acceptance developmental testing. Once the Air Force determines that the developmental testing is completed, OCX will be ready to transition to operations, which ends the full program schedule. GPS operations will then be transferred from OCS to OCX. Figure 3 shows the major activities until the ready to transition to operations decision. OCX development is expected to continue for approximately 2 more years, after which Raytheon will submit a Material Inspection and Receiving Report (Form DD 250) at delivery. The Air Force will then evaluate OCX for acceptance. Air Force acceptance will be informed by numerous contractor-run developmental tests conducted to help the Air Force understand the maturity of the system. Air Force officials will use information from these contractor tests to inform their approval and complete acceptance. For example, the Air Force will review data and demonstrated system capabilities from the tests to determine whether OCX is ready for integration into the overall GPS. These tests have formal entrance criteria to demonstrate the system is ready for testing and exit criteria to ensure tests are successful before proceeding to the next activity. At the conclusion of contractor testing and delivery to the Air Force, the Air Force will inspect OCX over approximately 2 months before OCX is officially accepted. The Air Force will indicate acceptance by signing the Form DD 250. Currently, the period of performance under the contract ends June 30, 2021. Consequently, acceptance of the delivered OCX would need to occur prior to that date. After acceptance, Air Force program officials said OCX will go through government-run developmental testing—currently scheduled to last 7 months—that includes operator transition exercises and rehearsals of the system. According to OCX program officials, Raytheon will provide interim contractor support to address any defects or incomplete work as well as address any additional issues found during the planned 7 month post- acceptance developmental testing. According to program officials, the ground control operators—who have already been working and providing feedback—and training and readiness oversight personnel will continue to work with the new ground system to assess the system’s readiness through hands-on engagement with the installed system. At the end of this 7 month period, the Air Force will determine whether the system is ready to transition to operations. To make the ready to transition to operations decision, Air Force officials said the system must receive approval from different groups, including senior leadership within the Air Force. Once the decision has been made, the Air Force will transition ground control of the GPS satellite constellation from OCS to OCX. Additionally, after this transition, which completes the program schedule, OCX will undergo an operational test and evaluation period, which will support the Air Force’s separate operational acceptance decision for OCX. The OCX contractor’s delivery date is optimistic and much earlier than Air Force and independent projections. All government and independent analyses project OCX delivery will exceed June 2021 by at least 6 months, but still deliver in time to support the April 2023 threshold (latest acceptable) date for the full program schedule. However, meeting the ready to transition to operations threshold date depends on acceptance of OCX by September 2022, at the latest. This will allow for a planned 7 months of government-run developmental testing that must occur before April 2023. Numerous OCX schedule estimates were produced between December 2017 and January 2019. Table 1 indicates the estimator, date of the estimate, and the reason the estimate was completed. Figure 4 shows the results of the varying estimates for the start of OCX operations in months as measured from the beginning of calendar year 2019. The most recent independent OCX assessment of the delivery date is from the Defense Contract Management Agency in January 2019. That assessment estimates that Raytheon’s projected delivery and the cost at completion are both unrealistic based on staffing profiles, task movement, completion rates, baseline execution, and schedule performance metrics. The Defense Contract Management Agency projects that there are not enough cost and schedule reserves left to cover its own estimate to complete the work plus all of the identified risks. In fact, the Defense Contract Management Agency estimates Raytheon will need over $400 million more in cost reserves and that OCX will likely be delivered 11 months after June 2021. Actual development progress has been mixed. While the pace of software development has improved, implementing the new software development approach has been slower than expected. As a result, Raytheon has used the majority of its schedule reserve and delayed planned staff reductions, indicating that work is not being completed as quickly as planned. In addition, the schedule assumes improvements to software defect discovery have not all come to fruition and repair rates have not been achieved. Under its new software development approach, Raytheon is building and testing OCX software more quickly than under its previous approach. In 2018, the software development rate to build and test software was reduced in duration from 4 weeks or more to less than 7 hours on average—better than planned. Defense Contract Management Agency officials said that software development has improved compared to block 0 by having a better software development process in place. These officials cited in particular the improvement that has occurred with the introduction of software testing automation in some areas. The pace of software development is one area of many that is necessary to improve overall performance and achieve the delivery schedule. OCX program officials told us that the full implementation of the new software approach is foundational to the success of the program; failure to successfully implement the new approach on time would lead to cost growth and schedule delays. However, implementation of the new software approach has taken longer than planned, using a majority of the available schedule reserve. Defense Contract Management Agency officials found that since the current baseline was established, Raytheon consistently takes 5 months to perform 4 months of planned work. This has not yet delayed the delivery schedule because the program has been able to use cost and schedule reserves to cover the delays. Between April 2017, when the current schedule baseline was established, and January 2019, Raytheon used 4 of the 6 months of total schedule reserve. As of April 2019, Raytheon had approximately 26 months of work remaining until June 2021, but only 2 months of schedule reserve. As a result, there will not be enough time to complete OCX development and have it accepted by June 2021 unless the contractor significantly reduces its use of schedule reserve. Raytheon started using the new software approach on April 1, 2018 to improve software development, but implementation took longer than planned for six of the seven initial adoption phases, with two completing more than a year late. Some of the subsequent expansion phases are also experiencing delays. For example, phase 3 expansion was completed more than a year behind the planned schedule. Three other expansion phases are still in progress and scheduled to complete in mid- to late-2019. Raytheon’s divergence from the baseline staffing plan indicates that work is not being completed as quickly as planned, and more staff have been needed to prevent additional delivery delays. Raytheon had planned to reduce the number of staff working on the program from approximately 1,000 to 700 between the autumn of 2017 and the end of 2018. However, to maintain schedule, Raytheon delayed those reduction plans and increased staff by approximately 10 percent from January to August 2018. Figure 5 shows the difference between the staffing baseline and actuals for OCX between January 2018 and December 2018. Our analysis shows a gap between the January 2018 baseline planned staffing reduction and actual contractor staffing levels in each month from January to December 2018, collectively indicating an increase of approximately 29 percent above the plan. According to DOD’s Office of Cost Assessment and Program Evaluation officials, this increase is likely to continue through mid-2019. These officials estimated in their June 2018 independent cost estimate that contractor staffing levels will be higher than planned through May 2019 so that Raytheon can complete key software coding events. OCX program officials told us that the program has been able to afford the additional contractor staff as there are cost risks to support higher than anticipated staffing levels. They said that continued increases too far into 2019, however, will result in a breach of the cost threshold. Further, they said the increased contractor staffing is consistent with their priority on achieving the delivery schedule. The new software approach implementation will remain a cost and schedule risk until at least late 2019. At this time, the final expansion phase for the new software development approach is planned to be completed in order to support final testing of the entire system. Progress finding software defects sooner in development is also mixed. Raytheon officials told us that cost reductions are possible if they are able to find defects earlier, as this approach would lead to earlier defect resolution and reduce any backlog of defects. Further, they said there is efficiency in having the same developers repair software code that they created instead of different developers repairing the code later. In March 2018, Raytheon reported increasing the percentage of defects found in the phase of development where the defect was created from 27 percent in block 0 to 66 percent in blocks 1 and 2. However, an independent DOD assessment contradicted this improvement. DOD’s Office of Cost Assessment and Program Evaluation analyzed Raytheon’s defect discovery progress a few months into 2018 and found that after showing some initial improvement, the defect discovery rate dropped from approximately 53 percent to 24 percent. In addition, assessing progress discovering defects is now more difficult to compare with earlier development since Raytheon changed how it tracks and counts defects in 2018. According to OCX program officials, Raytheon now only counts a defect if it is repaired in a later phase. Therefore, if a defect is found and repaired in the same phase, it is not counted. As of November 2018, Raytheon officials said the predictive measure they are now using estimates the total number of defects expected while measuring the actual defects discovered. From this data, Raytheon found fewer total defects than it predicted, which Raytheon officials said will result in fewer defects likely to be discovered later in subsequent phases. Further, the defect repair-rate—or how many hours it takes to find and repair a defect—is currently projected to be higher than planned, placing additional pressure on the delivery schedule. According to Defense Contract Management Agency officials, the delivery schedule included defect repair assumptions that were unrealistic. That schedule assumed 30 hours to repair each defect. However, as of November 2018, Raytheon projects it will need 52 hours to repair each defect on average. For example, in one area of the program, defects required 61 hours to repair on average as of December 2018. Defense Contract Management Agency officials told us that they had concerns that the complexity of the defects was driving the time needed to repair them. They said that the more mature software created under the new software approach may be creating much more complex defects to repair than originally planned. This may lead to additional schedule delays as the time to repair these more complex defects may continue to be significantly higher than the delivery schedule assumed. More complete data on defects and defect repair rates will likely be available by the end of 2019, when the final expansion phases of the new software approach and more software development are completed. How do programs track risk as progress is made and risks evolve? A risk is an uncertain event that could Programs track risks to help manage and mitigate their effect on cost and schedule. completion requires knowing potential risks and identifying ways to respond to them before they happen—using risk management to identify, mitigate, and assign resources to manage risks so that their effects can be minimized. Raytheon’s estimate that OCX will be accepted by the end of June 2021 is further challenged because of significant identified risks that remain in the schedule and changeover in those risks in 2018. As of January 2019, Raytheon was tracking 48 risks it has identified with cost effects—26 with a moderate likelihood of occurring. For example, a moderate risk includes the possibility of finding more defects than planned, which could have both cost and schedule consequences. Other moderate risks include the possibility of software development taking longer to complete or needing to create more software code than planned. If realized, both of these risks have cost effects to pay for additional work and schedule effects to allow additional time to complete work. As of January 2019, Raytheon has no high risks that it tracks. There was also a significant amount of change in the risks themselves in 2018, as Raytheon added 27 new risks while closing 30. The majority of the risks that are currently tracked will not be realized or retired until late 2019, with at least one key risk of concern to the Air Force not realized or retired until 2020. As the program progresses, risks can (1) According to OCX program officials, approval to transition OCX to operations assumes a 7-month developmental test schedule after acceptance. As currently formulated, this period will be used to prepare for the transition from OCS to OCX via (1) transition exercises to train operators, (2) transition rehearsals to practice the actual handover from OCS to OCX, and (3) a 156-day integrated system test to verify OCX’s requirements, operational suitability, and readiness to enter operational testing. However, that 7-month duration may not be sufficient to conduct all of the activities that are necessary to verify OCX is ready to transition to operations. First, the head of the GPS Directorate’s Lead Development Test Organization, which plans and executes the 7-month developmental testing, said that there is some schedule risk because of concurrent activities that need to be accomplished, including crew rehearsals and other test events. Second, the content of the test period has not yet been finalized. The planned testing events will be reviewed and refined about 6 months before beginning the test as it becomes clearer what can be tested and what data will be available from the system. The test director and the OCX program manager are considering combining some test events and, if possible, starting some testing prior to acceptance. Third, the test director and the OCX program manager described a number of risks that could delay completion of developmental testing including (1) the late identification of issues requiring significant new software coding and retesting and (2) identification of new requirements that are not in the scope of the current effort. In addition, OCX program officials stated that neither they nor senior Air Force leadership would transition OCX to operations if the operators are not ready or requirements have not been verified. They also stated that there are numerous levels of review within the Air Force, and any of these decision makers can refuse to approve the transition of OCX to operations. As a result, according to OCX program officials it could take 5 to 7 months longer than planned, or potentially 14 months total, to complete developmental testing. In addition, experience with prior upgrades to the current GPS ground system indicates that the completion of developmental testing may require more time than the 7 months assumed in the schedule. Air Force Cost Analysis Agency officials provided us with data for two upgrades that were made to OCS, the existing operational ground system. Those upgrades took 11 and 8 months, respectively. The 11-month upgrade to OCS from 2006 to 2007 was for an effort that was significantly smaller in software size in comparison to the size of OCX, but similarly brought new capabilities to OCS related to the command and control of satellites. The 8-month upgrade to OCS from 2009 to 2010 also provided command and control of a new type of GPS satellite and enhanced security for the current GPS receiver cards. Figure 6 shows the different forecasts with 7- and 14-month developmental test periods as measured from the beginning of calendar year 2019. If the time doubles for the completion of post-acceptance government-run developmental testing, most OCX schedule estimates would exceed the program schedule threshold. GAO’s Cost Estimating and Assessment Guide (Cost Guide) and Schedule Assessment Guide (Schedule Guide) identify best practices for managing a program’s cost and schedule. According to these best practices, a well-planned schedule is a fundamental management tool that can help government programs use public funds effectively by specifying when work will be performed and measuring program performance against an approved plan. Typically, schedule delays are followed by cost growth. When this occurs management tends to respond to schedule delays by adding more resources or authorizing overtime. Therefore, a reliable schedule can contribute to an understanding of the cost effect if the program does not finish on time. Moreover, an integrated and reliable schedule can show when major events are expected, as well as the completion dates for all activities leading up to them, which can help determine whether a program’s parameters are realistic and achievable. Further, the Cost Guide states that, too often, programs overrun costs and schedule because estimates fail to account for the full technical definition, unexpected changes, and risks. The Cost Guide states that one of many challenges program managers face is too much optimism in the original estimate. The Cost Guide also states that because optimism is often prevalent, organizations will encourage goals that are unattainable by accentuating the positive. Because over-optimism potentially affects both cost estimates and schedules, an independent view and analysis is important to properly overcome this bias. An independent view also allows decision makers to react sooner and take steps to minimize any identified risks, like schedule delays. The following best practices recommend that the schedule estimate should be periodically updated to reflect (1) actual progress and (2) newly identified risks. Periodic Updates and Actual Progress: GAO’s Schedule Guide states that updating a schedule to reflect actual progress is important when assessing the realism of the initial schedule duration assumptions. Programs should make adjustments, if necessary, to the forecast of the remaining effort. Periodic Updates and Risk: GAO’s Schedule Guide states that prudent organizations recognize that uncertainties and risks can become better defined as the program advances and should conduct periodic reevaluations of risks. GAO’s Cost Guide states that program managers often do not sufficiently account for risks because they tend to be optimistic and because they believe in the original estimates for the plan without allowing for additional changes in scope, schedule delays, or other elements of risk. Since the current schedule was approved in September 2018, Raytheon has updated its delivery schedule estimate quarterly or as needed to reflect changes, and modifies the delivery and acceptance dates accordingly. Raytheon does not update the full program schedule because the government-run developmental testing is not included in its schedule estimate. OCX program officials said they are currently updating their program schedule estimate by incorporating Raytheon’s data through the end of 2018. No plans currently exist to conduct another OCX independent cost estimate—which would include a full, independent program schedule assessment—at the DOD-level, and currently there is no requirement to do so. An independent assessment of the schedule would normally be produced in conjunction with the statutory requirement to conduct another independent cost estimate at the next major program milestone. However, in September 2018 the milestone decision authority waived the requirement to hold the next major program milestone. DOD’s Office of Cost Assessment and Program Evaluation conducts independent cost estimates which account for a full program schedule when statutorily required. In addition, according to an official in that office, they also conduct only schedule assessments, without completing a full independent cost estimate, when requested by a program’s milestone decision authority. In June 2018, the Office of Cost Assessment and Program Evaluation provided the last full, independent cost estimate with a schedule assessment to the Under Secretary of Defense for Acquisition and Sustainment, the milestone decision authority, to support the decision to approve the OCX baseline. Officials from the Office of Cost Assessment and Program Evaluation said that they have not been asked by the OCX milestone decision authority to conduct another independent assessment. Without an independent schedule assessment, decision makers may lack updated information when determining whether to take new steps to avoid or mitigate additional delays. It is still unknown when OCX will be ready to support the command and control of the next generation of GPS satellites. While Raytheon has improved the pace of building and testing software, the majority of schedule reserve has already been consumed and work is not being completed as quickly and efficiently as the delivery schedule predicted. Once software development is complete, it must go through developmental testing. The schedule for this phase may also be optimistic as risks associated with competing activities have the potential to double the amount of time needed for testing. DOD will be in a better position to assess OCX’s progress and the potential for additional delays when the majority of its changes to its software development approach are completed at the end of 2019. At this time, however, while the program plans to continue assessing schedule progress, there are no plans in place for an independent schedule assessment. The program’s history has consistently shown program and contractor estimates to be optimistic and that independent assessments have provided useful insights about risks as well as past experience with similar activities. Our best practice guidance also emphasize that independent assessments are a necessary step to counter balance schedule optimism. Decision makers in DOD and Congress could use realistic knowledge about the schedule to either request or provide additional funds to complete the acquisition of OCX or develop contingency plans for delays. We are making the following recommendation to DOD: The Secretary of Defense should direct the Director, Office of Cost Assessment and Program Evaluation to conduct an independent schedule assessment of the full program schedule for the Global Positioning System’s next generation operational control system based on progress made through the end of calendar year 2019. (Recommendation 1) We provided a draft of this report to DOD for review and comment. In its written comments (reproduced in appendix II), DOD did not concur with our recommendation to conduct an independent assessment of the full OCX program schedule based on progress made through the end of calendar year 2019. DOD said that the Office of Cost Assessment and Program Evaluation conducted an independent cost and schedule estimate supporting the OCX program’s September 2018 system development milestone and that DOD subsequently funded OCX consistent with that estimate. Further, DOD said that the Office of Cost Assessment and Program Evaluation as well as the Defense Contract Management Agency continually assess the program’s ability to meet cost, schedule, and performance objectives. DOD also said the OCX forecast is currently holding to the government schedule, which is ahead of the Office of Cost Assessment and Program Evaluation’s independent cost estimate. Finally, DOD said senior executive reviews continue on a bi-annual basis to monitor the program’s progress. We continue to believe the recommendation is necessary. As stated in our report, DOD has not conducted an assessment of the full schedule since June 2018, since which time program risks have evolved. In addition, the other potential sources for schedule oversight suggested by DOD are limited in scope. The Defense Contract Management Agency does not look at the full OCX program schedule, as it examines the schedule only until contractor delivery. Officials from the Office of Cost Assessment and Program Evaluation said they do some programmatic monitoring of OCX, including on selected metrics, to inform DOD’s annual program and budget submission. But those metrics do not examine the full schedule that includes the developmental test period after delivery. The Office of Cost Assessment and Program Evaluation is in a position to independently assess the full OCX program schedule, as it has previously done, but only if DOD requests that it do so. We maintain that for complex programs, such as OCX, best practices state an independent view is necessary and that a periodic schedule assessment should be performed as progress is made and risks change. Given the mixed progress developing software, the number of new contractor risks discovered in 2018, the limited remaining schedule reserve held by the contractor (with at least two years of significant work remaining), and the potential for doubling the time frame for the planned 7-month post-acceptance government-run developmental testing period, we determined that the recommendation remains a prudent step. Such an assessment would help inform congressional and DOD decision makers as they consider what steps may be taken to address delays to the start of OCX operations and ensure the investments in needed new receivers are properly aligned. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, the Secretary of the Air Force, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions concerns this report, please contact me at (202) 512-4841 or by email at chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. To determine the extent to which schedule risks may delay the delivery, acceptance, and approval for the operation of the Global Positioning System (GPS) next generation operational control system (OCX), we reviewed information relevant to OCX from Air Force GPS quarterly reports, senior management reviews, the program acquisition baseline, software development plans, monthly program management reviews that included schedule risks and progress updates, Air Force monthly acquisition reports, Air Force service cost position documentation, independent cost estimate documentation and analysis, earned value management data, Defense Contract Management Agency performance assessment reports, and slides and information provided by Raytheon Company (Raytheon), the prime contractor, on topics of our request. We reviewed the Air Force’s 2018 integrated baseline review results of the period until government acceptance and assessed the full program schedule—which includes the contractor’s schedule, government acceptance, and post-acceptance government-run developmental testing—until OCX is ready to transition to operations. We reviewed GAO’s best practice guides for cost estimating and assessment and schedule assessment to identify best practices for assessing a program’s cost and schedule and applied selected best practices. We also reviewed relevant reports and assessments focused on OCX completed by the government or required by Congress. We interviewed officials from the OCX program office and GPS Directorate, Defense Contract Management Agency, DOD’s Office of Cost Assessment and Program Evaluation, Air Force Cost Analysis Agency, the Lead Development Test Organization for the GPS Directorate, Defense Digital Services, Office of the Director, Operational Test and Evaluation, the MITRE Corporation, and Raytheon. We conducted this performance audit from November 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, the following staff members made key contributions to this report: David Best (Assistant Director), Patrick Breiding (Analyst-in-Charge), Marie P. Ahearn, Pete Anderson, Brian Bothwell, Jonathan Mulcare, Andrew Redd, Karen Richey, Roxanna Sun, and Robin Wilson.", "summary": "The U.S. military and the public depend daily on GPS data. OCX, the ground system that will command and control next generation GPS satellites, is one of several interdependent systems the Air Force is developing to modernize GPS. OCX has been hampered by delays and $2.5 billion in cost growth since the program started in 2012. The Air Force set a new baseline for cost and schedule in 2018 after OCX breached its cost threshold in 2016. The National Defense Authorization Act for Fiscal Year 2016 contained a provision that the Air Force provide quarterly reports to GAO on the next generation GPS acquisition programs, and a provision that GAO brief the defense committees as needed. GAO provided numerous briefings from 2016 through 2018 and issued reports in 2016 and 2017. Continuing this body of work, this report focuses on the extent to which schedule risks may affect OCX delivery, acceptance, and approval for operation. GAO reviewed the Air Force's baseline review results, schedule risks, and progress, and applied selected best practices for cost and schedule management. GAO also reviewed OCX monthly management briefings and quarterly assessments, and interviewed officials from the OCX program office and Raytheon (the prime contractor), among others. The Global Positioning System's (GPS) next generation operational control system's (OCX) program schedule continues to be optimistic and, with significant development remaining, more delays are likely for delivery, acceptance, and operation. See the figure below for previous delays, cost growth, and the current baseline. Completing the full OCX program schedule requires (1) timely delivery by the contractor and acceptance by the Air Force and (2) an efficient completion of a planned 7-month government-run post-acceptance developmental testing. GAO found that there is potential for significant delays on both fronts. While there has been some improvement to the pace of software development, the rollout of the new development methodology has been delayed to a point where most of the contractor's schedule reserve has been used. Assumed improvements in how long it takes to repair software defects has not occurred as planned, placing additional pressure on the contractor's delivery date. Additionally, Air Force officials have acknowledged that the government developmental test period after acceptance could double in duration and delay operations further because of concurrency, test plan uncertainty, and risks of late discovery of problems. With approximately 2 years of work remaining before delivery, there is no plan to have the full schedule independently assessed. For complex programs, such as OCX, best practices state an independent view is necessary and that a periodic schedule assessment should be performed as progress is made and risks change. Such an assessment would help inform congressional and DOD decision makers as they consider what steps may be taken to address delays to the start of OCX operations and ensure the investments in needed new receivers are properly aligned. GAO recommends that DOD conduct an independent schedule assessment of the full program schedule at the end of 2019. DOD did not concur with the recommendation. GAO believes the recommendation remains valid.", "document_type": "gao"}
{"report": "Signed into law on May 9, 2014, the DATA Act required OMB, or an agency it designated, to establish a pilot program to facilitate the development of recommendations for (1) standardized reporting elements across the federal government, (2) elimination of unnecessary duplication in financial reporting, and (3) reduction of compliance costs for recipients of federal awards. To meet these requirements, OMB established a pilot program with two components—one that focused on federal grants and another on federal contracts (procurement). OMB designated HHS as the executing agency of the grants portion of the Section 5 Pilot with oversight from OFFM. OFPP was responsible for designing and leading the procurement portion of the pilot focusing on reporting of Federal Acquisition Regulation (FAR) procurement requirements. OFPP collaborated with the Chief Acquisitions Officers’ Council and GSA on specific aspects of implementation including the development of the Central Reporting Portal, a reporting tool which is intended to centralize FAR reporting. See figure 1 for a timeline of the activities undertaken by the grants and procurement portions of the pilot as well as deadlines required by the act. As part of our ongoing oversight of the DATA Act’s implementation, we have monitored OMB’s efforts to meet its statutory requirements related to the Section 5 Pilot. In April 2016, we reported on the design plans for the Section 5 Pilot. We found that HHS’s design for the grants portion of the pilot was generally on track to meet statutory requirements and partially adhered to leading pilot design practices. However, we also reported that the procurement portion was not on track to meet requirements, and that its plans did not follow leading pilot design practices. In response to a recommendation in our report, OMB revised its plan for the procurement portion to better reflect leading practices for pilot design identified in our April 2016 report. These changes included more fully documenting its data collection plans and including a sampling plan to meet diversity requirements for pilot participants. According to OMB staff, the ongoing work and related grants guidance resulting from the Section 5 Pilot reflects a broader strategy for reducing federal recipient reporting burden that is outlined in the President’s Management Agenda (PMA). Released in March of 2018, and led by the Executive Office of the President and the President’s Management Council, PMA is a strategy to modernize how federal agencies deliver mission outcomes and provide services in three key areas: (1) modern information technology; (2) data, accountability, and transparency; and (3) the workforce for the 21st Century. Several Cross-Agency Priority (CAP) goals include PMA’s milestones and activities. These CAP goals identify opportunities for multiple agencies to collaborate on government-wide efforts and report on goal progress quarterly. Two of these, CAP Goals 5 and 8, include strategies for reducing federal award recipient reporting burden. OMB staff told us that some of the findings from the Section 5 Pilot and recommendations from their subsequent report to Congress informed the focus of these CAP goals. For example, according to OMB staff, the grants portion of the Section 5 Pilot focused on identifying how changes in grants data collection and grant management may reduce federal recipient reporting burden. PMA CAP Goal 8 is described as building on these efforts by shifting the focus toward the life cycle of grants management and standardizing grants management activities using agile technology. We determined that the Section 5 Pilot fully met three of the DATA Act’s statutory requirements, substantively met one, and partially met two others. The Section 5 Pilot fully met the following statutory requirements: (1) that pilot data collection cover a 12-month reporting cycle; (2) timely issuance of OMB’s report to Congress in August of 2017 to select congressional committees; and (3) that the report to Congress contain a discussion of any needed legislative actions as well as recommendations related to automating and streamlining aspects of federal financial reporting to reduce the reporting burden of federal award recipients. We found that the pilot also substantively met the requirement that the pilot program include a combination of federal award recipients and an aggregate value of awards of not less than $1 billion but not more than $2 billion. Although the $122 billion in grants included in the pilot greatly exceeded the upper bound, this was principally a result of the decisions by OFFM and HHS to pilot different test models for reducing reporting burden, and to include a wide range of different types of grants. The total value of grant awards exceeded the amount envisioned by the act. OMB’s August 2017 report stated that the decision to go beyond the minimum requirement of testing one approach was made in the interest of achieving the DATA Act’s objective to identify ways to reduce reporting burden as well as the effect this decision would have on the aggregate value of grants sampled. We believe that the pilot substantively met this requirement and did not identify any negative effects related to the larger aggregate value of grants, contracts, and subawards included in the grants portion of the pilot. We found that the approach followed by OMB and HHS furthered the broader objective identified by this section of the act. In addition, we determined that the pilot partially met two of the act’s requirements. The first of these requirements concerns the act’s requirement that OMB’s report to Congress include a description of the data collected, the usefulness of the data provided, and the cost to collect pilot data from participants. The report that OMB issued to Congress in August 2017 included information on the first two of these but only partly addressed the third. Specifically, it contained cost information for only the grants portion of the pilot, stating that the cost associated with executing this portion during fiscal years 2015 through 2017 was more than $5.5 million. The report did not contain any cost information on the procurement portion of the pilot. The DATA Act also required that OMB issue guidance to agencies for reducing reporting burden for federal award recipients—including both grantees and contractors—but the guidance subsequently issued only pertained to the grants community. We determined that OMB only partially met this requirement. On September 5, 2018, OMB issued M-18- 24: Strategies to Reduce Grant Recipient Reporting Burden. Among other things, this memorandum contained guidance to federal agencies making the SF-424B form optional based on findings from the grants portion of the pilot. Form SF-424B is used by grantees to document assurances regarding their compliance with a wide range of rules and regulations. Figure 2 summarizes our assessment. As the agency designated by OMB to execute the grants portion of the Section 5 Pilot, HHS developed and analyzed six “test models” to determine if adopting the proposed changes would contribute to the pilot program’s objectives of reducing reporting burden and duplication. These test models examined a variety of grant reporting issues that HHS had identified as presenting challenges. All but one of the test models, the Common Data Element Repository (CDER) Library 2, based their findings on data collected from grantees. The text box below provides high-level summaries of each of the six models. Additional details on the approach followed for each model, as well as reported results, can be found in appendix II. OMB’s August 2017 report to Congress on the findings of the Section 5 Pilot contained three broad recommendations and stated that OMB plans to take action on these recommendations. These recommendations covered (1) standardizing core data elements, (2) eliminating duplication through auto-population of data, and (3) leveraging information technology open data standards to develop new tools across the federal government. We found that evidence from the grant test models supported all three recommendations for streamlining federal reporting discussed in the report. For example, OMB recommended that its staff standardize core data elements used for managing federal financial assistance awards based on reductions in administrative burden experienced in the CDER Library 1 test model. In another example, four test models supported OMB’s recommendation for increased use of data auto-population from existing federal data sources as a way to reduce duplication in reporting. Findings from the grants portion of the Section 5 Pilot also provided support for government-wide efforts to streamline reporting and reduce recipient reporting burden. These include OMB’s memorandum M-18-24: Strategies to Reduce Grant Recipient Reporting Burden, which discusses efforts to automate and centralize grant management processes. Among other things, M-18-24 requires that federal agencies evaluate the systems and methods currently used to collect information from grant recipients to eliminate duplicative data requests. OMB staff confirmed that M-18-24 incorporates findings from some of the test models of the grants portion of the pilot such as the Single Audit test model, which examined reducing duplicative reporting of grant recipients’ data. The efforts to reduce duplicative reporting in M-18-24 also align with OMB’s recommendation in its August 2017 report to Congress to eliminate unnecessary duplication in reporting by leveraging information technology that can auto-populate from existing data sources. In addition, OMB staff told us that findings from the grants portion of the pilot contributed to broader, government-wide initiatives related to federal reporting. For example, according to OMB staff, the three recommendations from the August 2017 report to Congress are reflected in CAP Goal 8 of the President’s Management Agenda, which focuses on results-oriented accountability for grants. These OMB staff also told us that findings from the grants portion of the pilot informed two CAP Goal 8 strategies. For example, the CAP Goal 8 grants management strategy focuses on standardizing grants management business processes and data. OMB developed a comprehensive taxonomy for core grants management data standards that is currently available for public comment. In addition, a second strategy focuses on incorporating a risk- based performance management approach to metrics in grant award operations to determine low-risk and high-value federal awards. CAP Goal 8 also states plans to streamline the 2019 Single Audit Compliance Supplement to focus on requirements that inform grant award performance. Unlike the grants portion of the pilot, the procurement portion did not result in data collection that could be used for an evidence-based assessment of ways to reduce reporting burden. OMB’s Office of Federal Procurement Policy (OFPP) sought to assess five test models that, according to the report to Congress, were essential to centralized procurement reporting. However, the pilot did not fully test any of the hypotheses associated with those test models. The reasons for not testing the hypotheses included a lack of contractor participation and a lack of iterative and ongoing stakeholder participation and engagement throughout the course of the pilot. See appendix III for additional information regarding the various procurement test models, associated hypotheses, and additional details regarding our assessment. The procurement portion of the pilot focused entirely on the development and testing of a central reporting portal to consolidate FAR reporting requirements. According to OFPP staff, the pilot intended to eventually identify ways to centralize a wide range of reporting requirements that contractors currently meet through decentralized methods. Contractors must report many types of information depending on the contract. Toward that end, OFPP, with the assistance of GSA, created a procurement reporting website called the Central Reporting Portal. To test the efficacy of this portal for reducing burden, OFPP initially decided to examine how well it handled a specific FAR reporting requirement—the reporting of payroll data in accordance with the Davis-Bacon Act. According to pilot plans, Davis-Bacon reporting requirements were selected because they were identified by contractors as “pain points” during initial stakeholder outreach conducted in 2014 and 2015. OFPP planned to collect and analyze 1 year of weekly Davis-Bacon wage reporting data from at least 180 contractors through the Central Reporting Portal to identify how centralized reporting might reduce contractor reporting burden. However, during the 12-month procurement data collection period, no contractors agreed to submit their Davis-Bacon data as part of the pilot. Consequently, OFPP did not collect any wage data. Despite OFPP stating in its plans and reiterating to us as late as September 2017 that it expected to be able to secure at least 180 pilot participants, only one contractor expressed interest in reporting its Davis-Bacon information using the portal. This contractor withdrew from the pilot before submitting any data through the Central Reporting Portal. OFPP staff told us they were aware of the potential for low pilot participation for Davis- Bacon reporting when pilot testing began in February 2017 because contractors already had established processes for fulfilling the highly complex Davis-Bacon reporting requirements, and pilot participation was optional. According to GSA contracting staff, the one contractor who initially expressed interest ultimately decided not to participate because the format in which the contractor tracked and reported payroll data was incompatible with that used by the pilot portal, resulting in additional burden. However, it was not until August 2017—approximately 7 months into its year-long data collection period—that specific steps were taken to address the fact that the procurement portion of the pilot had not collected any data from Davis Bacon contractors. During this period OFPP did not conduct pilot outreach activities with the contractors, who were key to successful implementation of the pilot. OFPP staff told us that at the time of the pilot launch they learned that contractors were interested in having the Central Reporting Portal be able to communicate with third-party payroll reporting systems to automate reporting. OFPP staff said that although they are exploring this possibility, it was not a capability that was included as part of the pilot. Had this type of feedback on stakeholder needs been obtained sooner, OMB could have explored the feasibility of adding this capability to the portal or engaged in communication with stakeholders to develop alternate approaches that might have persuaded more contractors to participate. The usefulness of iterative and ongoing communication is recognized by the Standards for Internal Control in the Federal Government. Those standards state that management should use quality information to achieve its objectives, and that management should collect quality information by engaging with stakeholders through iterative and ongoing processes and in a timely manner. In this case, key stakeholders include relevant agencies, contracting officials, and contractors using the system. OFPP’s plan for the procurement portion of the pilot recognized the importance of stakeholder engagement stating that, to include a diverse group of recipients in the pilot, they should identify eligible participants for the pilot, conduct outreach to identify participants, and repeat this process as necessary until they achieved the sample necessary to test the Central Reporting Portal. However, as previously stated, no contractors agreed to submit their Davis-Bacon data as part of the pilot. Therefore, OFPP did not repeat this process until the pilot obtained the necessary sample size. Such interactions could have provided important information on contractors’ needs and concerns that OFPP could have used to inform their decisions regarding the pilot’s implementation. In November 2017, OFPP expanded the type of data accepted by the pilot to include hydrofluorocarbon (HFC) reporting, a new FAR reporting requirement. However, this choice had limitations in its suitability for providing useful data for testing the hypotheses of the five procurement test models. Unlike Davis-Bacon reporting, where contractors submit weekly reports, HFC is an annual reporting requirement for contractors that emit HFC gases over a certain threshold. The Central Reporting Portal is the only location where contractors can submit HFC reporting. For the purposes of the pilot, the Central Reporting Portal accepted HFC submissions from November 2017 through February 2018. During the pilot, 11 HFC annual reports were submitted to the portal (see figure 3). As a result of the small number of reports collected, OMB collected much less data than it had initially expected to receive to test the capabilities of the Central Reporting Portal. If the procurement portion of the pilot had been executed as planned, it could have theoretically resulted in 9,360 Davis-Bacon submissions for analysis. A larger data set of contractors’ experiences using the Central Reporting Portal could have informed OMB’s decision-making process through analysis of more, and potentially more varied data. In addition to the small number of submitted HFC annual reports, the decision to switch to using HFC data had another limitation. These data could not be used to examine changes in reporting burden as a result of using the Central Reporting Portal. This is because HFC reporting was a new reporting requirement, and as such, it did not have an established reporting process to use as a point of comparison to assess changes in reporting burden. The objective of the procurement pilot was to assess how centralized reporting can reduce reporting burden. This objective could not be achieved without data on the existing reporting burden. Evidence from the procurement portion of the pilot did not support OMB’s government-wide recommendations for reducing reporting burden in its August 2017 report to Congress. As previously stated, OMB’s report to Congress included three recommendations that focused on (1) standardizing core data elements, (2) eliminating duplication by using data auto-population, and (3) leveraging information technology open standards to develop new tools. As support for the first recommendation, the report stated that results from the procurement pilot test models demonstrated that standard data elements—coupled with uniform data adoption—and the ability to centrally collect and share information reduces administrative burden. Since the procurement portion of the pilot did not gather or analyze any pilot data from the Davis-Bacon participants, OMB did not assess the extent to which the ability to centrally collect data actually reduces burden. Recommendation two stated that support from the procurement test model demonstrated that recipient burden is reduced when identical data can be entered once in one place and reused. However, the HFC data collection process did not reuse data when capturing information and did not have the ability to auto-populate data. HFC data collection was the only part of the procurement portion of the pilot that collected information that could have been used to inform this recommendation. According to OFPP staff, the Davis-Bacon portion of the portal had the capability to auto-populate data. However, no Davis-Bacon data were collected that would have allowed quantification of the effects of reusing data on reporting burden. OMB stated that support for the third recommendation included data and information collected from the pilot. Although there was some consultation with stakeholders during initial planning and design of the procurement portion of the pilot and the early development of the portal, the pilot did not actually collect any data from either Davis-Bacon contractors or through the HFC portion of the pilot in the data gathering and analysis portion of the pilot related to this recommendation. In August 2018, OMB announced plans to expand the use of the Central Reporting Portal for FAR reporting, stating that the portal allows contractors to report data to one central location. OFPP staff told us that they are considering centralizing a third FAR requirement using the portal in the future but have not yet determined what that will be. As discussed above, the procurement portion of the pilot did not collect sufficient data to test the effect of the portal on reporting burden. In addition, the plan for the procurement portion states that OFPP intended to analyze feedback on pilot data collection and, depending on that feedback, decide whether to expand the pilot to other FAR reporting requirements. However, the pilot did not collect any such feedback to inform its determination to expand the Central Reporting Portal in the future. As a result, OFPP has limited information regarding issues that could affect expanded use of the Centralized Reporting Portal. In the absence of such information, it is difficult for OFPP to determine whether continued or expanded use of the Central Reporting Portal will reduce reporting burden, and which additional FAR requirements, if any, to include. To reduce the burden and cost of reporting for recipients of federal funds, Congress included specific provisions in the DATA Act to encourage OMB to take a deliberate and evidence-based approach toward developing guidance for federal agencies in this area. The Section 5 Pilot offered OMB a valuable opportunity—namely, to test a variety of methods and techniques at a small scale before applying them more widely. Such a process may enhance the quality, credibility, and usefulness of evaluations in addition to helping to ensure that time and resources are used more effectively. Similar to what we found when we analyzed the design of the Section 5 Pilot in 2016, our review of its implementation and the results it produced found differences between the grant and procurement portions. OMB and HHS designed and executed a robust grants portion of the pilot that tested several different approaches for reducing the reporting burden experienced by federal grant recipients. The resulting findings were used to develop OMB’s government-wide recommendations, and to inform two subsequent goals in the 2018 President’s Management Agenda related to reducing recipient reporting burden. In contrast, OMB did not fully implement the procurement portion of the pilot consistent with its plans. The procurement portion did not collect data to test the hypotheses associated with any of its five test models, and therefore could not provide empirical support for either OMB’s government-wide recommendations or guidance related to reducing reporting burden. Among the factors responsible for this were the lack of Davis-Bacon contractor participation and OMB’s inability to find a suitable alternative. OMB has announced its intention to expand centralized reporting for FAR requirements across government. In the absence of timely information regarding the needs and concerns of stakeholders, OMB faces the risk of experiencing implementation challenges similar to those it experienced during the pilot. Although the use of a centralized reporting portal could ultimately prove useful for reducing burden, the lack of information from stakeholders—including the contractors who would use it—raises concerns about the future success of plans for expanding the Central Reporting Portal. The Director of OMB should ensure that information is collected regarding how centralized reporting of procurement requirements might reduce recipient reporting burden—including input from stakeholders such as contractors through an iterative and ongoing process—to inform OMB’s planned expansion of the Central Reporting Portal. We provided a draft of this report to OMB, HHS, and GSA for review and comment. HHS and GSA informed us that they had no comments. OMB provided technical comments, which we incorporated as appropriate. OMB neither agreed nor disagreed with our recommendation. We are sending copies of this report to the appropriate congressional committees, The Secretary of Health and Human Services, The Acting Director of OMB, the Administrator of GSA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 202-512-6806 or sagerm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of our report. GAO staff who made key contributions to this report are listed in appendix IV. This report assesses the extent to which (1) the Section 5 Pilot met the statutory requirements of the act, (2) the grants portion of the Section 5 Pilot demonstrated changes in federal award recipients’ reporting burden, and (3) the procurement portion of the Section 5 Pilot demonstrated changes in federal award recipients’ reporting burden. To assess the extent to which the pilot met statutory requirements we reviewed section 5 of the Federal Funding Accountability and Transparency Act of 2006, as amended by the Digital Accountability and Transparency Act of 2014, to determine the legal requirements set forth in the act pertaining to establishing, designing, and executing the Section 5 Pilot. We compared these requirements to documents from the Office of Management and Budget (OMB) and designated agencies. These documents included pilot plans for the grants and procurement portions of the pilot, OMB’s August 2017 report to Congress, M-18-23: Shifting from Low-Value to High-Value Work and M-18-24: Strategies to Reduce Grant Recipient Reporting Burden. We also interviewed staff from agencies involved in administering and executing the pilot on how they carried out their responsibilities. These agencies included the Department of Health and Human Services (HHS), OMB’s Offices of Federal Financial Management (OFFM) and Federal Procurement Policy (OFPP), and the General Services Administration (GSA). To assess the extent to which the grants portion of the Section 5 Pilot demonstrated changes in federal award recipients’ reporting burden, we reviewed HHS’ plans. We analyzed the plans compared to information collected from the various test models throughout the pilot. The data we assessed included survey data and analyses. We also assessed whether statements on changes in grantees’ reporting burden made in OMB’s August 2017 report to Congress were supported by documentation. We did this by verifying the statements against supporting information. We determined that the pilot data we reviewed were reliable for the purposes of our work by reviewing the data, tracing them back to underlying agency source documents, and interviewing relevant agency staff. We also interviewed OFFM staff and HHS officials on how the grants portion of the pilot was executed. To assess the extent to which the procurement portion of the pilot demonstrated changes in reporting burden, we reviewed OMB’s plans and compared them to actions OMB took to execute the pilot. We compared OMB’s actions to execute the procurement portion of the pilot against criteria identified in Standards for Internal Control in the Federal Government. We viewed a demonstration of the Central Reporting Portal tool for reporting Davis-Bacon and hydrofluorocarbon (HFC) submissions. GSA developed the portal and OFPP provided oversight for the portal’s development. We also reviewed documentation including HFC reporting submissions made through the portal. In addition, we interviewed OFPP staff, GSA officials responsible for administering the portal, and three contracting officials from GSA who were assigned to participate in the Davis-Bacon component of the procurement portion of the pilot regarding their actions related to implementing the procurement portion of the pilot. We conducted this performance audit from November 2017 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides detailed information regarding the test models from the grants portion of the Section 5 Pilot. The Common Data Element Repository (CDER) Library is an online repository for federal grants-related data standards, definitions, and context. The library is intended to be an authorized source for data elements and definitions for use by the federal government and for recipients reporting grant information. Hypothesis: If grant recipients are provided with definitions of data elements through the CDER Library, then they will be able to accurately complete forms in a timely manner. Methodology: The Department of Health and Human Services (HHS) divided test model participants into two groups to read a scenario based on the grants lifecycle and complete a data collection tool. The first group used the CDER Library to complete the data collection tool while the second group used all other available sources to complete the data collection tool. After completion of the data collection tool, test model participants filled out a survey about their experiences using the CDER Library. Test Model Metrics: Accuracy and completeness of captured data within a period of time and survey results. Example of Test Model Results: On average, test model participants that completed a data collection tool using the CDER Library scored 11 percent higher in the accuracy of information requested and, on average, spent 6 fewer minutes when completing the tool. Number of Test Model Participants: Fifty-nine. The CDER Library 2 Test Model focused on identifying duplication in grant forms and data elements across the federal government based on the data standards, definitions, and context within the CDER Library 1. Hypothesis: If duplication across forms can be identified using the CDER Library, then agencies can update or reduce forms to reduce grant recipient burden. Methodology: HHS conducted an internal analysis of SF-424 form families, using the CDER Library, to identify duplication in data elements to determine which forms could be consolidated. Test Model Metrics: Number of duplicative fields within form families and across forms for selected federal entities Example of Test Model Results: The internal analysis conducted by HHS identified 371 instances of data element duplication across 10 agency grant funding applications when using standardized data elements from the CDER Library 1. Number of Test Model Participants: Not Applicable; the CDER 2 Library Test model did not collect information from test model participants because the test model was an internal document review. The CDER Library 2 test model tested the utility of the data element definitions within the CDER Library 1. The Consolidated Federal Financial Report Test Model focused on examining the potential early validation of consolidated CFFR data and potential future streamlining of the close-out process by allowing the submission of Federal Financial Report (FFR) data in one system, rather than in multiple entry systems. Hypothesis: If grant recipients can enter complete FFR information systematically through one entry point instead of multiple different avenues and that information could be shared electronically from that point forward, then grant recipient burden will be reduced and data accuracy will be improved. Methodology: HHS surveyed Administration for Children and Families grant recipients on their experience submitting a consolidated FFR via HHS’s Payment Management System, and grantees on their perceptions of the process for using a consolidated FFR through facilitated discussions. Test Model Metrics: Survey results. Example of Test Model Results: Sixty-four percent of the CFFR test model participants reported that submitting their FFR through a single system would result in reduced reporting time. In addition, 65 percent of the CFFR test model participants believed using the payment management system for submitting FFR data would improve the accuracy of the information they submitted. Number of Test Model Participants: One-hundred fifteen tested the pilot environment and 30 participated in the facilitated discussions. The Single Audit Test Model consisted of (1) an audit and opinions on the fair presentation of the financial statements and the Schedule of Expenditures of Federal Awards; (2) gaining an understanding of and testing internal control over financial reporting and the entity’s compliance with laws, regulations, and contract or grant provisions that have a direct and material effect on certain federal programs (i.e., the program requirements); and (3) an audit and an opinion on compliance with applicable program requirements for certain federal programs. The Single Audit Test Model focused on reducing reporting of data on duplicative forms. Hypothesis: If grant recipients do not have to report the same information on duplicative forms—for example, the SEFA compared to the Single Audit Report Package and Data Collection Form—then grant recipients’ burden will be reduced. Methodology: HHS collaborated with the Office of Management and Budget’s Office of Federal Financial Management and the Department of Commerce Federal Audit Clearinghouse (FAC) to create a pilot environment for test model participants to submit key portions of a modified Standard Form—Single Audit Collection. HHS conducted two focus groups with test model participants subject to the Single Audit. The first focus group discussed and completed a survey on the new form. The second group, a sample of test model participants who are subject to perform a Single Audit submitted the existing form in the FAC pilot environment, completed a separate data collection form similar to the new form, and completed a survey on the effectiveness and burden of the new form. Test Model Metrics: Focus group feedback and survey results. Example of Test Model Results: All test model participants with access to the Single Audit’s pilot environment believed the upload feature for reporting requirements could decrease duplication in required grant reporting. Number of Test Model Participants: Thirteen tested the pilot environment and 123 participated in facilitated discussions. This model focused on the feasibility of developing a standardized Notice of Award (NOA) to reduce reporting burden and facilitate access to standardized data needed to populate Single Audit information collection. Hypothesis: If grant recipients have a standardized NOA for federal awards, then grant-reporting burden may be reduced for recipients by standardizing access to data needed to populate information collections. Methodology: HHS divided test model participants into two groups and completed a data collection tool. The first group completed the data collection tool using three standardized NOAs, while the second group completed the data collection tool using three non-standardized NOAs. After completion of the data collection tool, test model participants self-reported their respective times to complete the data collection tool. They also filled out a survey about the standardized NOA’s impact on reporting burden and provided input on elements to include in a standardized NOA. Test Model Metrics: Self-reported form completion time, accuracy, and survey results. Example of Test Model Results: Test model participants with access to the standardized NOA coversheets spent an average of 3 minutes less when completing the test model’s data collection tool. Number of Test Model Participants: One-hundred four. The Learn Grants Test Model is a website on Grants.gov that summarizes and provides links to new and important grants information such as policies, processes, funding, and other information needed throughout the grants life cycle. The website intended to make it easier for stakeholders to find, learn about, and apply for federal grants and promote the standardization of grants terminology and data. Hypothesis: If grant recipients are supplied with grants life cycle information in one website, then they will have increased access to grants resources and knowledge of the grants life cycle process. Methodology: HHS developed a grants knowledge quiz from information on the Learn Grants website. HHS administered the knowledge quiz to test model participants in two phases. First, test model participants completed the knowledge quiz using existing knowledge and without the Learn Grants website. Next, test model participants completed the knowledge quiz with access to the Learn Grants website. HHS compared the results from both knowledge quizzes. After completion of the knowledge quiz, test model participants completed a survey on the usefulness of the Learn Grants website and its impact on increasing knowledge quiz scores. Test Model Metrics: Knowledge quiz accuracy and survey results on the usefulness of Learn Grants website. Example of Test Model Results: Test model participants experienced an average 10 percent (one quiz point) increase in their grant knowledge quiz scores when using the Learn Grants website. New grantees who participated in the test model also reported that the Learn Grants website provided useful grants information. Number of Test Model Participants: Fifty-seven. Appendix III: Assessment of Test Models in the Procurement Portion of the Section 5 Pilot Hypothesis not tested. Hypothesis: Verification of FAR standards for post award reporting will confirm the value of existing data standards and reduce variations that will, in turn, reduce contractor burden and cost. Original plan (Davis-Bacon): OFPP planned to execute this test model through focus groups. According to OFPP, no focus groups were conducted. Revised Strategy (HFC): This hypothesis could not be tested through HFC reporting because it was a reporting requirement without an existing reporting method through which to compare reporting burden. Hypothesis not tested. Original Strategy (Davis-Bacon): OFPP planned to test this hypothesis by gathering data on the time it takes to submit reporting data through the Central Reporting Portal and outside of the portal, with self-reported data from contractors. According to OFPP, data were not collected due to a lack of participation in the Davis-Bacon portion of pilot. Revised Strategy (HFC): This hypothesis could not be tested through HFC reporting because it was a reporting requirement without an existing reporting method through which to compare reporting burden. access (proof of concept) Hypothesis: If contractors can enter FAR-required reporting data systematically through one entry point instead of multiple different avenues, and that information can be shared electronically with appropriate individuals, then contractor burden will be reduced and data access improved. Assessment Rationale Original plan (Davis-Bacon): OFPP planned to test this hypothesis by gathering data on the time it takes to submit reporting data through the Central Reporting Portal and outside of the portal, with self-reported data from contractors. OMB also planned to conduct guided discussions. According to OFPP, data were not collected due to a lack of participation in the Davis-Bacon portion of pilot. Revised Strategy (HFC): This hypothesis could not be tested through HFC reporting because it was a reporting requirement without an existing reporting method with which to compare reporting burden. Hypothesis not tested, but metric associated with test model was met. Hypothesis: If interfaces can be built to support access to other reporting systems, contractor burden will be reduced. Original plan (Davis-Bacon): According to OFPP staff, the Davis-Bacon part of the Central Reporting Portal was able to provide prepopulating of data by interfacing with other reporting systems or drop down menus for all reporting fields. However, it could not demonstrate that such prepopulation resulted in a reduction of contractor burden. Revised Strategy (HFC): This is not applicable for HFC reporting which is reported through open fields. Although OFPP did not actually test the hypothesis associated with this test model, it did meet the metric that it had associated with the test model in its pilot plan. That metric is to develop prepopulating capabilities in the Central Reporting Portal by interfacing with other reporting systems. In addition to the contact named above, Peter Del Toro, Assistant Director; Silvia Porres-Hernandez, Analyst-in-Charge; Jazzmin Cooper; and Jimmy Nunnally made major contributions to this report. Also contributing to this report in their areas of expertise were Michael Bechetti, Jenny Chanley, Mike LaForge, Carl Ramirez, Stewart Small, Andrew J. Stephens, James Sweetman Jr., and Tatiana Winger.", "summary": "The DATA Act required OMB or a designated federal agency to establish a pilot program to develop recommendations for reducing recipient reporting burden for federal grantees and contractors. The grants portion of the pilot tested six ways to reduce recipient reporting burden while the procurement portion focused on testing a centralized reporting portal for submitting reporting requirements. This report follows a 2016 GAO review on the design of the pilot. This report assesses the extent to which (1) the pilot met the statutory requirements set out in the DATA Act, (2) the grants portion of the pilot demonstrated changes in reporting burden, and (3) the procurement portion demonstrated changes in reporting burden. GAO reviewed statutory requirements, pilot plans, agency data and reports and interviewed OMB staff and officials from HHS and GSA. In response to requirements of the Digital Accountability and Transparency Act of 2014 (DATA Act), the Office of Management and Budget (OMB) led implementation of a pilot program, known as the Section 5 Pilot, aimed at developing recommendations for reducing recipient reporting burden for federal grantees and contractors. The pilot program met many, but not all, of its statutory requirements. For example, the act required OMB to issue guidance to agencies for reducing reporting burden for federal award recipients (including both grantees and contractors) based on the pilot's findings. OMB partially met this requirement because the guidance it issued only applied to grants. The pilot program consisted of two parts, which differed considerably in both design and results: The grants portion, administered by the Department of Health and Human Services (HHS), examined six approaches for reducing grantee reporting burden and found positive results related to reductions in reporting time as well as reduced duplication. HHS incorporated ongoing stakeholder input during the pilot, and its findings contributed to government-wide initiatives related to federal reporting and reducing grantee-reporting burden. The procurement (contracts) portion of the pilot, led by OMB with assistance from the General Services Administration (GSA), did not collect sufficient evidence to determine whether centralizing procurement reporting through a single web-based portal would reduce contractor reporting burden—a key objective of the pilot. The pilot planned to test the portal by collecting weekly Davis-Bacon wage data from a minimum of 180 contractors, potentially resulting in thousands of submissions over a year. However, in the end, the pilot did not result in any Davis-Bacon data due to lack of contractor participation and the absence of iterative and ongoing stakeholder engagement. Subsequently, OMB expanded the pilot to include hydrofluorocarbon (HFC) reporting but received only 11 HFC submissions. (See figure.) In addition, HFC reporting was not suited for assessing changes in reporting burden because it was a new requirement and thus no comparative data existed. OMB plans to expand its use of the portal for additional procurement reporting requirements but still does not have information from stakeholders that could help inform the expansion. GAO recommends that the Director of OMB ensure that information is collected regarding how centralized reporting of procurement requirements might reduce recipient reporting burden—including input from stakeholders such as contractors through an iterative and ongoing process—to inform OMB's planned expansion of the Central Reporting Portal. OMB neither agreed nor disagreed with the recommendation but provided technical comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "In our April 2019 report, we found that all nine of the selected agencies have policies that are generally consistent with OSTP’s guidance for the principles of scientific integrity that we reviewed: foundations of scientific integrity in government and professional development of government scientists and engineers. OSTP’s guidance describes several components for each of these principles, which the selected agencies addressed either (1) through their scientific integrity policies, (2) in related policies, or (3) through related actions. For example, when addressing the components of foundations of scientific integrity in government, NOAA’s scientific integrity policy states that the agency will ensure the free flow of scientific information online and in other formats, consistent with privacy and classification standards, and in keeping with other Commerce and NOAA policies. In another example, NASA’s scientific integrity policy states that NASA facilitates the free flow of scientific and technological information among scientists and engineers, between NASA staff and the scientific and technical community, and between NASA employees and the public. The policy goes on to cite additional NASA policies on dissemination of information and public access to data. Similarly, we found that all nine selected agencies addressed all of the components of the principle professional development of government scientists and engineers. For example, EPA’s policy states that the agency encourages publication and presentation of research findings in peer-reviewed, professional, or scholarly journals and at professional meetings. NIST’s scientific integrity policy states that the agency supports scientists’ full participation in professional or scholarly societies, committees, task forces, and other specialized bodies of professional societies, with proper legal review and approval. The policy goes on to cite separate NIST guidance for staff on how to seek approval for memberships and participation in professional organizations. We found in our April 2019 report that the nine selected agencies have taken some actions to help achieve the objectives of their scientific integrity policies in the three areas we reviewed—communicating information to staff, providing oversight, and monitoring and evaluating performance. First, according to our analysis, seven of the nine selected agencies have taken some actions to educate and communicate to staff about their scientific integrity policies, and two have not. Specifically, FE and NIST have not provided scientific integrity training for staff, according to officials, or taken other actions to promote their scientific integrity policies with staff. Under the 2007 America COMPETES Act, civilian agencies that conduct scientific research are, among other things, required to widely communicate and readily make accessible to all employees their scientific integrity policies and procedures. According to FE and NIST officials, the agencies made their policies available to staff on their websites and believed no additional actions were needed. By taking action to educate and communicate their scientific integrity policies to staff through, for example, regular training, these agencies would have better assurance that employees have the information, skills, and competencies they need to help achieve agency scientific integrity objectives. We recommended the Secretary of Energy and Director of NIST take action to educate and communicate the agencies’ polices to staff through, for example, regular training. In DOE’s written comments on a draft of our report, reproduced in our final report, the department explained that it will designate a scientific integrity official to be responsible for leading and coordinating with other offices across DOE to develop measures to educate and communicate to staff about scientific integrity policies. In Commerce’s written comments, reproduced in in our final report, NIST identified ways it plans to provide training to its staff. Second, we found that eight of the nine selected agencies have designated scientific integrity officials, or the equivalent, who are responsible for overseeing the agencies’ implementation of their scientific integrity policies. FE, which follows DOE’s policy, does not have a scientific integrity official or the equivalent. DOE’s scientific integrity policy states that the Secretary of Energy will designate a scientific integrity official for the department. DOE officials explained that the scientific integrity official has not been designated because the scientific integrity policy was implemented in January 2017, as the administration was changing, and that the current Secretary has not yet designated a scientific integrity official. We recommended the Secretary of Energy should establish steps and a time frame for designating a scientific integrity official to oversee the department’s scientific integrity activities. In DOE’s written comments on a draft of our report, reproduced in our final report, the department concurred with our recommendation and estimated that it would address the recommendation by the end of 2019. Third, we found in our April 2019 report that four of the nine selected agencies—ARS, EPA, NASA, and NIH—monitor and evaluate the performance of their activities under their scientific integrity policies, or have plans to do so. The remaining five agencies—FAA, FE, NIST, NOAA, and USGS—have, for different reasons, not done so. Standards for Internal Control in the Federal Government states that management should design control activities to achieve objectives and respond to risks, which may include establishing activities to monitor performance measures and indicators. By establishing mechanisms to effectively monitor the implementation of their scientific integrity policies, agencies may be better positioned to evaluate and measure whether their scientific integrity policies are achieving their objectives and, where necessary, improve their implementation. We recommended in our April 2019 report that the five agencies develop mechanisms to regularly monitor and evaluate implementation of their scientific integrity policies, including mechanisms to remediate identified deficiencies and make improvements where necessary. All five agencies agreed with our recommendation and responded as follows: In a May 2019 letter from DOT, the department identified several mechanisms it plans to implement by the end of March 2020. In DOE’s written comments on a draft of our report, the department said that its scientific integrity official will have the responsibility to lead in developing procedures to monitor and evaluate implementation of DOE’s policy. In Commerce’s written comments, NIST stated that, beginning in fiscal year 2019, the agency will review implementation of its policy at least annually and make recommendations to the Director of NIST as to whether any improvements are needed. In Commerce’s written comments, NOAA stated that it will identify additional metrics for monitoring and evaluating its policy. The Department of the Interior’s written comments stated that the department plans to implement a biennial scientific integrity survey of USGS employees, beginning in 2020, to gauge scientific integrity policy awareness and effectiveness at USGS, among other things. Seven of the nine selected agencies—ARS, EPA, FAA, NIH, NIST, NOAA, and USGS—have specific, documented procedures for identifying and addressing alleged violations of their scientific integrity policies. Although the details of agencies’ procedures may vary, the procedures generally include five basic steps: (1) report allegation, (2) screen allegation, (3) investigate allegation, (4) respond to violation, and (5) appeal decision (see fig. 1). In contrast, two of the nine selected agencies—FE and NASA—do not have specific, documented procedures for identifying and addressing alleged violations of their scientific integrity policies. In March 2009, the President issued a memorandum on scientific integrity that states that each agency should have in place procedures to identify and address instances in which the scientific process or the integrity of scientific and technological information may be compromised. FE, which follows DOE’s scientific integrity policy, does not have specific procedures because DOE has not established any. DOE and FE officials said staff can report allegations to a supervisor, the whistleblower ombudsperson, or the U.S. Office of Special Counsel (OSC). Similarly, NASA officials said employees can report allegations through their chain of command, such as to a supervisor, for investigation on a case-by-case basis. However, without documented procedures for identifying and addressing alleged violations of their scientific integrity policies, DOE and NASA do not have assurance that all staff have a clear understanding of how to report allegations and that investigations will be conducted consistently. We recommended the Secretary of Energy and Administrator of NASA develop documented procedures for identifying and addressing alleged violations of their scientific integrity policies. In DOE’s written comments on a draft of our report, the department stated that it will be the responsibility of the scientific integrity official to lead, and coordinate with other elements of the department, in developing procedures for identifying and addressing alleged violations of its scientific integrity policy and estimated completing actions in June 2020. In written comments from NASA, the agency stated that it will develop documented procedures for identifying and addressing alleged violations of its policy and estimated completion by October 2020. Chairwoman Stevens and Chairwoman Sherrill, Ranking Member Baird and Ranking Member Norman, and Members of the Subcommittees, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this statement, please contact John Neumann, Managing Director, Science, Technology Assessment, and Analytics, at (202) 512-6888 or neumannj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Rob Marek (Assistant Director), Wyatt R. Hundrup (Analyst in Charge), Cheryl Harris, and Douglas G. Hunker. Also contributing to this testimony were Eric Charles and Ben Shouse. Additional staff who made contributions to our April 2019 report are identified in that report. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "This testimony summarizes the information contained in GAO's April 2019 report, entitled Scientific Integrity Policies: Additional Actions Could Strengthen Integrity of Federal Research ( GAO-19-265 ). The nine selected agencies GAO reviewed have taken various actions to help achieve the objectives of their scientific integrity policies in three areas: Educating staff. Seven of the nine agencies have taken some actions to educate and communicate to staff about their policies, consistent with the 2007 America COMPETES Act. However, the Office of Fossil Energy (FE), which follows the Department of Energy's (DOE) policy, and the National Institute of Standards and Technology (NIST) have not taken action. Providing oversight. Eight of the nine agencies have a designated official, or the equivalent, to oversee implementation of their scientific integrity policies. However, FE does not have such an official because DOE has not appointed one and currently has no plans or timeframe to do so, although DOE policy states that DOE will appoint an official for oversight. Monitoring and evaluating implementation. Four of the nine agencies have monitored and evaluated implementation of their scientific integrity policies, consistent with federal standards that call for such control activities. However, FE, the Federal Aviation Administration (FAA), NIST, the National Oceanic and Atmospheric Administration (NOAA), and the U.S. Geological Survey (USGS) have not undertaken such activities. Seven of the nine agencies have specific, documented procedures for identifying and addressing alleged violations of their scientific integrity policies. Although the details of agencies' procedures vary, they generally include the steps shown below. However, two agencies—FE, following DOE's policy, and the National Aeronautics and Space Administration (NASA)—do not have documented procedures for identifying and addressing alleged violations. A 2009 presidential memo on scientific integrity states that agencies should have procedures to identify and address instances in which the scientific process or the integrity of scientific and technological information may be compromised. Without procedures, FE and NASA do not have assurance that their staff understand how to report allegations and that investigations are conducted consistently.", "document_type": "gao"}
{"report": "In response to Executive Order 13781, USAID established the Transformation Task Team (T3) in June 2017 to plan and lead the agency’s reform efforts. As noted in a previous GAO report, USAID launched several internal reform efforts and participated in a joint State- USAID redesign process during mid-2017, which resulted in a joint reform plan. USAID also developed a supplemental reform plan that focused on issues internal to USAID. State and USAID submitted these plans to OMB in September 2017. In January 2018, USAID suspended its participation in the joint State–USAID redesign process and continued to plan and implement its own internal reforms. According to USAID, its reform efforts are intended to support its bilateral partners to become more self-reliant and capable of leading their own development, with the ultimate goal of ending the need for foreign assistance. To achieve this goal, USAID identified five objectives, referred to as “desired outcomes,” as the basis for its reform efforts. The five objectives are: (1) establish metrics and approaches to help host country recipients of assistance become more self-reliant; (2) restructure bureaus and offices to strengthen the organization’s core capabilities; (3) advance national security interests; (4) improve human capital processes; and (5) maximize taxpayer investments in foreign assistance. According to USAID officials, OMB generally approved the USAID reform plans and associated projects by March 2018. Figure 1 shows the key events in the initial phases of USAID’s reform efforts up to the point OMB provided this approval. In developing our June 2018 report to assist Congress, OMB, and agencies in assessing agency reform plans, we reviewed our prior work on key practices for organizational transformations; collaboration; government streamlining and efficiency; fragmentation, overlap, and duplication; and high risk and other long-standing agency management challenges. The resulting report includes 58 key questions to aid in assessing reform efforts. (See app. II for a complete list of the 58 key questions.) The questions are organized into four broad categories and 12 subcategories, as shown in table 1. These subcategories encompass the key practices that we used to assess USAID’s reform efforts. For the purposes of this report, we determined that the subcategory of Workforce Reduction Strategies was not applicable to our assessment because USAID is not undertaking workforce reductions as part of its reform effort. USAID’s reform efforts consist of a total of 32 reform projects—31 projects being implemented by USAID’s Transformation Task Team (T3) and an additional Human Resources Transformation project that predates USAID’s other reform efforts. As shown in table 2, as of July 2019, USAID has completed 19 projects and is implementing 12 others, all of which USAID intends to complete by 2021. The task team also has one project still in the planning phase. In order to develop and implement the 32 reform projects, USAID has identified approximately $33 million in estimated costs associated with its reforms up through April 2019. According to USAID, this total includes about $3 million to develop the T3 reform efforts in fiscal year 2018 and approximately $6 million to implement its reform efforts over a period of 2 years, which USAID assumes will cover fiscal years 2019 and 2020. In addition, USAID estimated that, as of April 2019, it has expended about $24 million in fiscal year 2017–2019 funds for human resource efforts that are associated with its ongoing Human Resources Transformation project. As shown in table 3, USAID’s reform efforts generally addressed nine of the key practices that we previously identified as critical to the success of agency reforms, and its reform efforts partially addressed two others. USAID determined the appropriate role of the federal government by considering the private sector and governments’ ability to manage responsibility for and invest their own resources into foreign development and humanitarian assistance programs. Our prior work shows it is important for agencies engaged in reforms to reexamine the role of the federal government in carrying out specific missions and programs, policies, and activities by reviewing their continued relevance and determining whether the federal government is best suited to provide that service or if it can be provided by some other level of government or sector more efficiently or effectively. In line with the USAID Administrator’s vision of ending the need for foreign assistance, USAID has developed several projects under its “Journey to Self-Reliance” objective to increase bilateral partner countries’ ability to plan, finance, and implement solutions to solve their own development challenges. Beginning in mid-2017, USAID launched a process to identify a set of third-party metrics for assessing a country’s level of self-reliance. In June 2018, USAID announced the identification of 17 metrics to capture a country’s overall commitment and capacity for self-reliance. The publicly available metrics cover areas such as open and accountable governance; inclusive development; economic policy; and the relative capacities of the government. Starting in fiscal year 2019, USAID produced 136 “country roadmaps,” or tools for measuring each low- and middle-income country’s overall level of self-reliance through its performance on the 17 metrics. USAID is using the country roadmaps as a tool to inform strategic decision-making and resource allocation processes, better focus USAID’s investments, and indicate when a recipient country should be considered for a “strategic transition” to a new partnership model with the U.S. government. For example, USAID identified Albania as a country to pilot this concept, which envisions a new partnership model for a country exhibiting an advanced level of self-reliance and the development of a strategy and plan for how to shift to this new model over time. In addition, USAID’s “Journey to Self-Reliance” efforts include a project to expand its engagement with the private sector. According to a USAID document, donor agencies are unable to fulfill their goals for sustainable development on their own; in contrast, the private sector has the scale and resources to address the complexity of challenges that developing countries face in becoming self-reliant. In December 2018, USAID released a new “Private Sector Engagement Policy” intended to increase and deepen the collaboration of USAID staff and its partners with the private sector across all areas of the agency’s work. USAID involved its employees and key stakeholders in its internal reform efforts. Our prior work has shown that it is important for agencies to directly and continuously involve not only their employees but also key stakeholders in the development of major reforms. USAID has involved its employees in its reform efforts through a variety of means. For example, since 2017, USAID reform leaders have conducted town-hall style meetings with employees in Washington, D.C., and in the field. USAID reform leaders have also briefed senior management, bureau- and office-level leadership, and mission directors about reform efforts. In addition, they have communicated reform updates in the agency’s internal newsletter and have informed employees of reform projects through multiple venues, such as web-based seminars and agency notices. USAID has also involved key stakeholders, including Congress and State, in its reform efforts. The Administrator has testified before Congress, and USAID officials have briefed Congress about the status of the reform efforts. USAID also submitted reorganization proposals to congressional committees for review and approval. Moreover, USAID engaged with State officials at the senior and working levels on several of its reform projects, including its self-reliance metrics, strategic transitions, and workforce flexibility and mobility projects. However, T3 officials noted that its engagement with State has been hindered by leadership challenges at State, including the lack of a single official or entity at State with responsibility for coordinating with USAID on reform efforts. In our prior work, we found a lapse in State’s leadership focus on reform efforts, and we recommended that State establish a dedicated team to manage the implementation of all reform projects that the Secretary of State decides to pursue. USAID’s T3 used various sources of evidence and data to design its reform plans, including recommendations made by external organizations and employee feedback. Our prior work has shown that agencies are better equipped to address management and performance challenges when managers effectively use data and evidence, such as from program evaluations and performance data that provide information on how well a program or agency is achieving its goals. USAID developed its reform projects based on research and recommendations from various sources, including GAO, the USAID Office of Inspector General, USAID’s Advisory Committee on Voluntary Foreign Aid, think tanks, and coalitions of organizations focused on international development. For example, USAID’s reform proposal to merge and restructure its Offices of U.S. Foreign Disaster Assistance and Food for Peace into the Bureau for Humanitarian Assistance stems, in part, from the results of an in-depth, external study that USAID commissioned in 2016, which entailed significant consultations with internal and external stakeholders as well as data analysis. As another example, USAID’s “Explore Delivery of Human Resources Operations” project was based, in part, on two GAO reports recommending steps to improve the collection of contract data. In May 2017, State launched a “listening tour” intended to gather ideas and feedback from State and USAID employees on the joint State-USAID redesign process. As a key component of this outreach effort, State hired a contractor to design and administer a confidential, online listening survey, which was sent to State and USAID employees. The listening survey identified pain points, recommendations, and themes that informed USAID’s reform plans. For example, USAID’s projects aimed at reorganizing its structure address a listening tour theme regarding the need to better align its bureau and office functions with USAID’s core mission. In another example, some of USAID’s human resource reform projects address another listening tour theme related to the need to support USAID employees in focusing more of their attention on achieving strategic priorities and less time on inefficient and burdensome administrative tasks. According to USAID, it sought to reduce or better manage fragmentation, overlap, and duplication through multiple reform efforts, including its restructuring projects, its consolidated framework for private sector engagement, and efforts aimed at redefining and rationalizing roles and responsibilities in areas such as countering violent extremism and civilian- military coordination. In our prior work, we have identified actions that agencies could take to achieve greater efficiency or effectiveness by reducing or better managing programmatic fragmentation, overlap, and duplication. In July and August 2018, USAID sent to various congressional committees for approval a series of initiatives to restructure its bureaus and offices to streamline operations and gain efficiencies. USAID included a proposal to restructure the Office of the Administrator by adding two associate administrators. According to a USAID document, this change would allow the administrator to more effectively manage the complexity of USAID’s work and reduce the number of entities directly reporting to the administrator from 27 to 11. One of the new associate administrators would manage USAID’s relief, response and resilience functions, and the other would manage the agency’s strategy, management, and operations. The congressional committees had not approved all of these proposals as of June 2019, according to USAID. As of June 2019, according to USAID, the congressional committees had approved five of the seven reorganized bureaus proposed by USAID: the Bureau for Humanitarian Assistance; the Bureau for Resilience and Food Security; the Bureau for Conflict Prevention and Stabilization; the Bureau for Development, Democracy, and Innovation; and the Bureau for Asia. Two other proposed bureaus had not yet received approval from all of the committees: the Bureau for Management and the Bureau for Policy, Resources, and Performance. Figure 2 shows USAID’s proposed changes to its headquarters organizational structure. According to USAID documents, reorganizing these bureaus is in part intended to reduce fragmentation, overlap, and duplication, as well as to make the agency more functionally aligned and field-focused. For example, USAID states that the Bureau for Humanitarian Assistance will reduce duplication and fragmentation by unifying humanitarian assistance and eliminating the distinction between food and non-food emergency response, eliminating confusion in the field, and providing beneficiaries and partners with one cohesive USAID platform and voice on humanitarian assistance. As another example, USAID states that the Bureau for Policy, Resources, and Performance would consolidate USAID’s policy, budget, and performance functions, which are currently divided among five bureaus and offices. USAID’s reform efforts address several high risk and long-standing management challenges, including a project to specifically address external audit findings and implement auditors’ recommendations. Our prior work noted that reforms improving the effectiveness and responsiveness of the federal government often require addressing long- standing weaknesses in how some federal programs and agencies operate. For example, agency reforms provide an opportunity to address the high risk areas and government-wide challenges that we have called attention to and that are vulnerable to fraud, waste, abuse, and mismanagement, or are in need of transformation. USAID has undertaken multiple projects to address high risk areas and long-standing challenges. USAID T3’s “Addressing the Audit Backlog” project was specifically designed to review, enhance, and revise USAID’s management of audit engagements and recommendations by eliminating the agency’s backlog of unresolved audit recommendations, developing and implementing practices that would strengthen current programs, and reducing the potential for a future backlog. In this way, USAID intends to save taxpayer dollars by preventing and responding to fraud, mismanagement, wasteful practices, and other challenges identified in the audits. USAID reported that it had eliminated the backlog of unresolved audit recommendations as of May 2018. As of early April 2019, USAID had implemented 75 of GAO’s 86 recommendations from fiscal years 2015 through 2018. In addition, several other reform projects address high risk areas and long-standing management challenges identified by the USAID Office of Inspector General (OIG). For example, USAID’s “Working in Non- Permissive Environments” project addresses challenges USAID faces working in insecure, inaccessible, or unstable environments. USAID OIG identified developing strategies to work effectively in non-permissive and contingency environments, as one of the five top management challenges for USAID in fiscal year 2017. USAID’s leadership has demonstrated focus on and attention to the planning and conduct of USAID’s reform efforts. Our prior work shows that a dedicated team of high-performing leaders within the agency should lead organizational transformations, such as agency reforms. USAID has demonstrated leadership at various levels to manage and guide the agency’s reform efforts. For example, USAID’s Administrator first outlined his vision of USAID’s mission as being focused on ending the need for foreign assistance in August 2017, and USAID’s reform efforts are aimed at operationalizing the Administrator’s vision to end the need for foreign assistance. USAID’s Administrator has had visible and continuous involvement in USAID’s reform efforts, including through informing various congressional committees, on multiple occasions, of ongoing developments with USAID’s reform process. USAID has designated leaders who are responsible for the day-to-day management of USAID’s reform efforts. In June 2017, USAID’s Acting Administrator established the Transformation Task Team (T3) to lead the agency’s response to Executive Order 13781 and the subsequent guidance from OMB. T3 is led by a Coordinator who concurrently serves as the Assistant to the Administrator in USAID’s Bureau for Policy, Planning, and Learning. The Coordinator told us that he meets with the USAID Administrator on a regular basis to report the status of USAID’s projects. T3 also includes seven deputy coordinators who are accountable for the progress of all of the projects within a desired outcome as well as 24 project managers who lead project implementation. The T3 Coordinator indicated that the size of his team will decrease over time as it hands over management of USAID’s reform projects to bureau-level leaders. USAID also assigned Senior Leader Champions to each of its reform projects. The champions provide strategic guidance and act as the representational “face and voice” of the project to Congress and the agency. Further, USAID also established a Transformation Advisory Council made up of senior leaders of USAID who have provided strategic guidance to USAID’s reform efforts since October 2017. The council is chaired by the T3 Coordinator and made up of Senior Leader Champions, mission director liaisons, T3 leadership, and other standing members. The Transformation Advisory Council meets to discuss the progress of reform projects, ensure cross-project coordination, and to resolve any duplication or dependencies. USAID has developed and maintained a system for managing and monitoring its reform process. We have previously reported that organizational transformations must be carefully and closely managed by developing an implementation plan with key milestones and deliverables to track and communicate implementation progress, among other actions. In May 2018, USAID T3 issued a task order for a contractor to help ensure that USAID has the capacity to manage the planning and implementation of USAID’s reform efforts. The contractor is responsible for providing project and performance management support. Such support included tracking USAID’s reform projects, providing summaries and executive reports on the progress of USAID reform projects, and also knowledge management, including the retention of key documents and information related to project and performance management. The contractor established a data tracking system that contains project end dates and deliverables to track the progress of reform implementation. The system notes which projects are on schedule, delayed, or complete. The contractor has also generated periodic executive reports that outline next steps for implementation reform and provide updates organized by USAID’s five reform objectives. USAID T3 has developed guidance for transferring responsibility for project implementation to the appropriate bureaus and offices. The guidance details who in the bureau will be responsible and accountable for the project, resources that will be needed to initiate and complete handover of the project, and the future end state of the projects, among other items. As of July 2019, USAID had completed bureau handover plans for 24 T3 reform projects. USAID has demonstrated transparency over its reform efforts through publicizing reform-related information on its website, including fact sheets on its projects. USAID has also publicly released several of its reform deliverables. For example, USAID made its “Journey to Self-Reliance” portal available on its external website. Through the portal, viewers have access to USAID’s Fiscal Year 2019 Country Roadmaps and can download a wide range of supporting resources on the “Journey to Self- Reliance” effort and the methodology that underpins this effort. USAID’s reform efforts generally addressed two interrelated subcategories of strategic workforce planning by instituting policies to manage employee engagement and to improve employee performance management. These policy initiatives were part of USAID’s broader effort to create a human resource services system that, according to USAID documents, will support a modern workforce in carrying out USAID’s mission. Our prior work has found that increased levels of employee engagement—generally defined as the sense of purpose and commitment employees feel toward their employer and its mission—can lead to better organizational performance and can sustain or increase levels of employee engagement and morale, even as employees weather reorganizations and other difficult external circumstances. Our prior work also found that performance management systems—which are used to plan work and set individual employee performance expectations, monitor performance, develop capacities to perform and to rate and incentivize individual performance—can help the organization manage employees on a daily basis and provide supervisors and employees with the tools they need to improve performance. USAID developed and began implementing its Human Resources Transformation project prior to the start of the current reform effort led by T3. This project includes objectives and initiatives to both promote employee engagement issues and establish a performance management system during the 5-year transformation. USAID created a project management office to plan and carry out between three and five initiatives associated with each of the Human Resources Transformation project’s objectives and a performance monitoring plan to track the progress of each initiative. As noted in figure 3, the three Human Resources Transformation objectives and the associated intermediate results called for by the project address both employee engagement and employee performance management issues. For example, Transformation Objective 3, “Agency Culture and Workplace Enhanced,” promotes employee engagement by calling for an agency workplace enhanced by a stronger focus on the culture of accountability with a workforce reflecting the diversity of America’s population. The project is also using Federal Employee Viewpoint Survey (FEVS) data to periodically gauge employees’ feedback and level of engagement on the reform efforts. Moreover, USAID noted in its April 2019 Human Resources Transformation performance monitoring plan that USAID intends to measure the effectiveness of its efforts to improve employee engagement by assessing the extent to which those efforts increase employees’ positive response rates to human resources service- and delivery-related questions over the generally low baseline rates set by the FEVS 2016 survey response (ranging from 10 percent to 26 percent positive response rates). The monitoring plan noted that USAID expects to increase the positive response rates to these questions on the FEVS to upwards of 74 percent by 2021. Furthermore, one of the intermediate results associated with Transformation Objective 2, “Agency Workforce Prepared for Today and the Future,” includes an effort to establish and uphold a performance management system in areas such as provision of feedback, professional development, and career advancement. T3 also initiated six projects associated with its “Empower People to Lead” objective that incorporate some of the Human Resources Transformation project efforts to improve employee engagement and implement a performance management system. For example, T3’s project on “Managing Human Capital Talent” is developing new automated tools to transition the paper-based Foreign Service and Civil Service performance management and evaluation processes into online evaluation systems administered electronically. As of July 2019, these tools include an automated Foreign Service assignment tool and a Civil Service performance management system and automated tool. However, USAID delayed its expected completion date for these Foreign Service and Civil Service tools from the end of December 2018 to March 2019 and August 2019, respectively. Further, T3’s “Leveraging Foreign Service National Talent” project expects changes in job satisfaction- related survey scores, over time, will help USAID measure the success of a reform project aimed at empowering the agency’s Foreign Service Nationals workforce. Our prior work indicates that agency reforms should clearly identify what an agency is trying to achieve by establishing outcome-oriented performance measures that enable the agency to assess the extent to which projects are achieving progress toward reform goals. Moreover, T3 guidance states that, as responsibilities for project implementation are transferred to bureau- and office-level units, project-level managers should develop performance indicators to measure progress. While USAID has established high-level goals associated with its reform efforts, such as ending the need for foreign assistance, it has established outcome-oriented performance measures for only four of its reform efforts. Table 4 below provides examples of outcome-oriented performance measures for those four reform projects. USAID has not established outcome-oriented performance measures that would enable it to gauge the effectiveness of the remaining reform efforts. For example, USAID’s five reform objectives—(1) Journey to Self-Reliance, (2) Strengthen Core Capabilities, (3) Advance National Security, (4) Empower People to Lead, and (5) Respect Taxpayer Investments—are not tied to outcome-oriented performance measures. In explaining why they had not developed outcome-oriented performance measures for all projects, USAID T3 officials indicated that thus far they have focused their efforts on establishing outputs (e.g., products and services) for the reform projects. Establishing outcome-oriented performance measures for its reform projects would enhance USAID’s ability to assess the effectiveness of its reform efforts. USAID documents and officials demonstrate that the agency is developing an agency-wide strategic workforce plan in support of its ongoing reform efforts, but the plan and its associated workforce planning tools were not ready to implement as of July 2019. Strategic workforce planning is an essential activity that an agency needs to conduct to ensure that its human capital program aligns with its current and emerging mission and programmatic goals, and that the agency is able to meet its future needs. Our prior work also indicates the importance of preceding any staff realignments or downsizing with strategic workforce planning so that changed staff levels do not inadvertently result in skills gaps or other adverse effects that could increase use of overtime and contracting. USAID has taken a number of steps since 2017 to develop an agency- wide strategic workforce plan both prior to and during the current reform effort, including developing staff realignment plans as part of its process for standing up the proposed new bureau structures. However, USAID has not yet developed or implemented the data collection and measurement tools that it has identified as necessary to gauge current workforce capabilities, assess staffing needs arising from the proposed reorganization, and identify ways to close gaps arising from changes in workforce requirements. USAID documents note that such tools could allow USAID to achieve its goal of hiring the right talent, at the right time, for the right duration. USAID is using both the Human Resource Transformation project and two of T3’s projects to develop a strategic workforce plan and associated tools: USAID developed and began implementing the Human Resources Transformation project prior to the start of the current reform effort with the expectation that by 2020 the agency would have the organizational structure and workforce characteristics that support achievement of USAID’s mission. This new structure would include an optimally sized workforce with an effective mix of all USAID employee types created through the use of a new workforce planning model. Project documents note, however, that developing this planning model in turn would require developing a Workforce Planning Tool to define workforce baselines and existing assets, identify future workforce needs, assess gaps, and build capacity where needed. In June 2016, USAID’s 2016–2021 Human Resource Transformation Strategy and Action Plan stated that developing this model would be difficult but nevertheless estimated that implementing this effort would require no more than 2 years. However, USAID officials noted that the Human Resources Transformation efforts did not “fully begin” until 2018. T3 is implementing two projects associated with its objective titled “Empower People to Lead.” First, T3’s Manage Human Capital Talent project instituted an Employee Portal to provide all direct-hire employees access to their human resources data in one centralized online location. According to USAID documents, this project is also developing for management an automated assignment, performance management, and workforce planning tools, including separate automated planning, performance, and assignment tools for its Civil Service and Foreign Service personnel. The agency originally intended to implement these tools by the end of calendar year 2018. USAID’s April 2019 performance monitoring plan indicates that the tools—particularly the workforce planning model that USAID describes as a human-capital data analytics system to automate various standardized and ad hoc reports and access previously unconnected personnel data sources—will not be available before the end of fiscal year 2019. Second, T3’s “Workforce Flexibility and Mobility” project is focused on implementing a demonstration project, the “Adaptive Personnel Project,” to replace non-career, program- funded positions with an excepted-service management system. The “Adaptive Personnel Project” is to be launched as a pilot project in two USAID bureaus in fiscal year 2020. As of April 2019, USAID documents and USAID and employee union officials noted that the strategic workforce plan has not yet been completed. Moreover, the April 2019 Human Resources Performance Monitoring Plan notes that the workforce planning tool needed to gauge current capabilities and close gaps is not yet deployed and in use due to competing programmatic and budgetary priorities. In addition, USAID’s T3 project data tracking system indicates that the agency has delayed the implementation of the projects needed to establish baselines and create pilot projects until late 2019 or later in order to focus on broader strategic workforce planning objectives, such as the Strategic Workforce plan and “Adaptive Personnel Project.” The lack of a strategic workforce plan may limit USAID’s efforts to estimate how its proposed reorganization will affect future staffing needs. For example, USAID officials indicated in 2018 that the proposed reorganization of its headquarters bureaus was intended to be “staff neutral.” Its congressional notification pertaining to this reorganization projected no net increase in its total combined headquarters workforce level of 3,262 employees. Nevertheless, in its Fiscal Year 2020 Congressional Budget Justification, USAID identified a need for 40 additional Civil Service positions to “refocus Washington bureaus and offices toward being effective service providers to the field consistent with the vision of ending the need of foreign assistance.” USAID requested $7.2 million to fund those positions in the restructured bureaus. Without a strategic workforce plan, USAID cannot determine whether its current or planned workforce requirements align with its reform and reorganization objectives. USAID is entrusted with managing billions of dollars in foreign assistance funding, and USAID leadership recognizes that reforming its internal operations and programming is integral to achieving its mission. In developing and implementing its reform efforts, USAID addressed many key practices that are critical to ensuring a successful agency reform or reorganization, such as using data and evidence and providing leadership focus and attention. Specifically, USAID’s reform efforts generally addressed nine of the 11 key practices we assessed. However, taking additional steps in two areas could further improve its reform efforts. First, while it established goals and desired outcomes for its reform efforts, it has not yet generally established outcome-oriented performance measures necessary to assess the effectiveness and success of these efforts. Second, while USAID has been developing a strategic workforce plan since 2017, it has yet to complete this plan, which includes developing the associated workforce planning tools to identify the staff needed to meet existing and emergent program demands associated with its transformation goals. Addressing these gaps could help USAID better position itself to make long-term and sustainable improvements in its efficiency and effectiveness. We are making the following two recommendations to USAID: The Administrator of USAID should establish outcome-oriented performance measures to assess the effectiveness of USAID’s reform projects. (Recommendation 1) The Administrator of USAID should ensure that the agency completes a strategic workforce plan necessary to support its reform efforts. (Recommendation 2) We provided a draft of this report to USAID, State, and OMB for review and comment. We received comments from USAID, which are reprinted in appendix IV. USAID concurred with our recommendations. We also received technical comments from USAID and State, which we incorporated in our report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Administrator of USAID, the Secretary of State, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or BairJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. We performed our work under the authority of the Comptroller General to conduct work to assist Congress with its oversight responsibilities. This report (1) examines the status of the U.S. Agency for International Development’s (USAID) reform efforts and (2) assesses the extent to which USAID has addressed key practices and considerations critical to the successful planning and implementation of agency reform efforts. The scope of our review was limited to USAID’s internal reform efforts and did not include government-wide or interagency reform proposals, such as those referenced in the Office of Management and Budget’s Delivering Government Solutions in the 21st Century report. For both objectives, we reviewed USAID’s reform plans, proposals, and related documents and interviewed officials involved in USAID’s reform efforts. We interviewed USAID officials on the USAID Transformation Task Team, including the task team Coordinator and Deputy Coordinators. We also interviewed USAID representatives from two USAID employee unions: the American Federation of Government Employees and the American Foreign Service Association. In addition, we interviewed officials from the Department of State and the Office of Management and Budget. To determine the status of USAID’s reform efforts, we also reviewed USAID reform plans, reports, briefings, and project factsheets. We also interviewed USAID officials responsible for the planning and implementation of the agency’s reform projects. To determine the total number of USAID reform projects, we included all USAID reform projects identified by USAID as of July 2019. To provide the estimated costs associated with USAID’s reform efforts for contextual purposes, we obtained data from USAID on the costs of: 1) developing T3 reform efforts, including T3’s operational costs, 2) implementing T3 reform efforts, and 3) its Human Resource Transformation project contract data. We reviewed supporting documentation, and interviewed cognizant USAID officials about the completeness and accuracy of the data. We did not independently assess the data used to estimate the costs associated with its reform efforts. We determined it was beyond the scope of this review to perform a full cost-benefit analysis to assess the potential financial impact of USAID’s reform efforts using the cost estimates provided by USAID. To determine the extent to which USAID has addressed key practices for planning and implementing its reform efforts, we assessed USAID’s reform efforts against key practices identified in our June 2018 report, which are organized by 12 subcategories of change management practices. The subcategories are based on 58 key questions for consideration in assessing reform efforts. We did not apply criteria from the “Workforce Reduction Strategies” subcategory of our June 2018 report. We deemed those criteria not applicable to USAID’s reform efforts because USAID officials stated their proposals regarding workforce reductions were overtaken by events when congressional appropriations for fiscal years 2018 and 2019 maintained USAID staffing at the levels associated with its workforce as of December 2017. For the other 11 subcategories included in our assessment, we determined which key questions of each subcategory were most relevant USAID’s reform efforts and applied those key questions to our assessment. We categorized USAID reform-related actions into two separate categories: (1) those that generally addressed the subcategory and (2) actions that partially addressed the subcategory. We determined that USAID’s reform efforts had generally addressed a practice if we did not identify significant gaps in its coverage of the actions associated with this subcategory. We determined that USAID’s reform efforts had partially addressed a practice if we identified significant gaps in its coverage of the actions associated with this subcategory. We would have determined that USAID had not addressed a practice if it had not substantively addressed any of the key elements in the subcategory. However, we found that USAID at least partially addressed all of the practices. We defined “significant gaps” as the areas we identified, based on our analysis of the key questions of each subcategory, that were both relevant to USAID as an agency and important for the success of the reform efforts. Each of two analysts made an independent qualitative judgment as to whether or not USAID had generally, partially, or had not addressed those criteria. The two analysts then reviewed and reconciled any differences in the data used to reach each determination, and their results were subject to supervisory review. The analysts’ determinations were then reviewed by other GAO stakeholders with experience in this topic, and any concerns raised were resolved through discussion to reach the final determinations. We conducted this performance audit from February 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We developed key questions based on our prior work on key practices that can help assess agency reform efforts. The 58 questions are organized into four broad categories and 12 subcategories, as shown in table 5. As of June 2019, the U.S. Agency for International Development (USAID) headquarters was organized as shown in figure 4. In addition to the contact named above, Thomas Costa (Assistant Director), B. Patrick Hickey (Analyst in Charge), Joshua Akery, Peter Beck, David Dayton, Martin de Alteriis, Emily Gupta, Christopher Keblitis, Steven Putansu, Sarah Veale, and Alexander Welsh made key contributions to this report.", "summary": "In March 2017, the President issued an executive order to federal agencies intended to improve the efficiency, effectiveness, and accountability of the executive branch. The order required the Director of the Office of Management and Budget (OMB) to develop a plan to reorganize and streamline the government. In April 2017, OMB issued additional guidance to agencies on implementing the order. In response, USAID launched several efforts to reform its organizational structure, workforce, programs, and processes with the ultimate goal of ending the need for foreign assistance by helping partner countries become more self-reliant. GAO's prior work has shown that successful agency reforms depend on following key practices for organizational transformation, such as establishing goals and outcomes and involving key stakeholders. This report examines (1) the status of USAID's reform efforts and (2) the extent to which USAID has addressed key practices in planning and implementing those efforts. GAO reviewed USAID reform plans, proposals, and related documents and met with officials involved in its reform efforts. GAO also assessed USAID's planning and implementation of its reform efforts against 11 key practices identified in GAO's June 2018 report, Government Reorganization: Key Questions to Assess Agency Reform Efforts (GAO-18-427). The reform efforts of the U.S. Agency for International Development (USAID) consist of a total of 32 reform projects—31 projects being implemented by USAID's Transformation Task Team and an additional Human Resources Transformation project that predates the 31 projects. As of July 2019, USAID has completed 19 reform projects and is implementing 12 additional projects, which it intends to complete by mid-2021. The task team has one additional project in the planning phase. In planning and implementing these efforts, USAID has generally addressed nine of 11 key practices for organizational transformation and partially addressed two. For example, USAID generally addressed the key practice of involving employees and key stakeholders such as the Department of State and Congress through a variety of mechanisms, such as briefings and town halls. USAID also used data and evidence to guide its reform efforts by integrating employee and external input into its reform plans. Morever, USAID addressed fragmentation, overlap, and duplication by planning a restructuring effort to streamline operations and achieve efficiencies. Further, it generally addressed leadership focus and attention by designating a reform coordinator and establishing a dedicated team responsible for managing and planning USAID's reform efforts. However, while USAID established goals for its reform efforts, it established outcome-oriented performance measures for only four of its 32 projects. Establishing such measures would improve its ability to assess the results of the changes it is making. In addition, while USAID is developing a strategic workforce plan, it has yet to develop the tools needed to identify and meet staffing needs arising from the reforms in order to fully assess its workforce. Completing a strategic workforce plan with these tools could help USAID ensure it has the workforce needed to meet existing and emergent program demands. Addressing these gaps could help USAID make long-term improvements in its efficiency and effectiveness. USAID should (1) establish outcome-oriented performance measures to assess the effectiveness of its reform efforts and (2) complete a strategic workforce plan necessary to support its reform efforts. USAID concurred with the recommendations.", "document_type": "gao"}
{"report": "On September 6, 2017, the eye of Hurricane Irma traveled about 50 nautical miles to the north of the northern shore of Puerto Rico as a category 5 hurricane. Less than two weeks later, Hurricane Maria made landfall as a category 4 hurricane on the main island of Puerto Rico on the morning of September 20, 2017 with wind speeds up to 155 miles per hour. The center of the hurricane moved through southeastern Puerto Rico to the northwest part of the island, as shown in figure 1 below. In response to the request of the Governor of Puerto Rico, the President declared a major disaster the day after each hurricane impacted Puerto Rico. Major disaster declarations can trigger a variety of federal response and recovery programs for government and nongovernmental entities, households, and individuals, including assistance through the Public Assistance program. Under the National Response Framework, DHS is the federal department with primary responsibility for coordinating disaster response, and within DHS, FEMA has lead responsibility. The Administrator of FEMA serves as the principal adviser to the President and the Secretary of Homeland Security regarding emergency management. FEMA’s Public Assistance program provides funding to state, territorial, local, and tribal governments to assist them in responding to and recovering from major disasters or emergencies. As shown in figure 2, Public Assistance program funds are categorized broadly as either “emergency work” or “permanent work.” Within those two broad categories are separate sub-categories. In addition to the emergency work and permanent work categories, FEMA’s Public Assistance program includes category Z, which represents indirect costs, administrative expenses, and other expenses a recipient or subrecipient incurs in administering and managing projects. Puerto Rico’s agencies, such as the Department of Housing; public corporations, such the Puerto Rico Electric Power Authority and the Puerto Rico Aqueduct and Sewer Authority; and Puerto Rico’s 78 municipalities are eligible to apply for the Public Assistance program. FEMA’s Public Assistance program also provides funding for cost- effective hazard mitigation measures to reduce or eliminate the long-term risk to people and property from future natural and man-made disasters and their effects. Specifically, FEMA provides funding for hazard mitigation measures in conjunction with the repair of disaster-damaged facilities to enhance their resilience during future disasters. For example, a community that had a fire station damaged by a disaster could use Public Assistance funding to repair the facility and incorporate additional measures such as installing hurricane shutters over the windows to mitigate the potential for future damage. In Puerto Rico, the Public Assistance program is administered through a partnership between FEMA and the recipient (Puerto Rico), which provides funding to eligible subrecipients (local or territory-level entities). Under the standard Public Assistance program process, once the President has declared a disaster, Public Assistance staff work with the recipient or subrecipients to help them document damages, identify eligible costs and work, and prepare requests for Public Assistance grant funds by developing project proposals. Officials then review and obtain approval of projects prior to FEMA obligating funds to reimburse recipients or subrecipients for eligible work. The Sandy Recovery Improvement Act of 2013 authorized the use of alternative procedures in administering the Public Assistance program, thereby providing new flexibilities to FEMA, states, territories, and local governments for debris removal, infrastructure repair, and rebuilding projects using funds from this program. The stated goals of the alternative procedures are to reduce the costs to the federal government, increase flexibility in the administration of the Public Assistance program, expedite the provision of assistance under the program, and provide financial incentives for recipients of the program for the timely and cost- effective completion of projects. Unlike the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures allow awards for permanent work projects to be made on the basis of fixed cost estimates to provide financial incentives for the timely and cost- effective completion of work. Under these procedures, if the actual cost of the project exceeds the fixed cost estimate agreed upon by FEMA and the recipient, the recipient or subrecipient is responsible for the additional costs. However, if the actual cost of completing eligible work for a project is below the estimate, the recipient or subrecipient may use the remaining funds for other eligible purposes, such as for additional cost-effective hazard mitigation measures to increase the resiliency of public infrastructure. These funds may also be used for activities that improve the recipient’s or subrecipient’s future Public Assistance operations or planning. Although FEMA had approved alternative procedure grants in 30 states as of April, 2018, in these cases, alternative procedures were used on a project-by-project basis. Puerto Rico’s recovery from the 2017 hurricanes is the first recovery to use alternative procedures for all large permanent work projects. On October 30, 2017, Puerto Rico requested to use the alternative procedures process for all large-project funding for Public Assistance permanent work, categories C through G. According to FEMA guidance, as part of the alternative procedures process in Puerto Rico, FEMA and Puerto Rico must agree on a group of personnel with cost estimation expertise who will serve as part of a center of excellence. This center of excellence will assist FEMA and Puerto Rico in developing cost estimating methodologies to be used for determining fixed cost estimates for Public Assistance permanent work projects. FEMA officials stated that they are in the process of conducting inspections for Public Assistance projects for permanent work and, as of August 2018, had a total list of 10,000 site inspections to complete. FEMA officials stated that October 2019 is their target date for completing all alternative procedures fixed cost estimates for Public Assistance permanent work. However, pursuant to 428 guidance published in April 2018, this time frame may be adjusted on a project-by-project basis, based on extenuating circumstances. Amendment 5 to the President’s disaster declaration imposed a number of grant conditions, including that Puerto Rico establish an oversight authority supported by third-party experts. This authority is to act as the grant recipient for all Public Assistance and hazard mitigation funding to ensure sound project management and enhanced, centralized oversight over FEMA grant distributions. In October 2017, the Governor of Puerto Rico established COR3, a Puerto Rico government office, to plan, guide, and oversee recovery efforts, including administering and overseeing the Public Assistance program. According to FEMA and COR3 officials, COR3 will fulfill the oversight requirements outlined in Amendment 5. According to COR 3 officials, COR3 was also established to ensure coordination with FEMA. The Executive Director of COR3 will act as the Governor’s Authorized Representative, which is the designated individual responsible for administering federal disaster assistance programs on behalf of Puerto Rico. Among other things, COR3 will: Identify, procure, and administer all federal, territorial, and private resources available to Puerto Rico related to recovery; Provide oversight of subrecipients using risk-based monitoring; and Provide technical assistance and advise Puerto Rico’s governmental agencies and municipalities regarding any matter related to recovery. According to COR3 officials, they will also implement internal controls, policies, and procedures to appropriately manage recovery funds. COR3 has also launched an online transparency portal intended to provide a breakdown of FEMA Public Assistance and other federal funding made available for disaster recovery in Puerto Rico. The Bipartisan Budget Act of 2018 (Bipartisan Budget Act) required that Puerto Rico submit an economic and disaster recovery plan to Congress by August 9, 2018, that defines the priorities, goals, and expected outcomes of Puerto Rico’s recovery related to a number of sectors, including, among other things, infrastructure, housing, electric power systems and grid restoration. The Bipartisan Budget Act also directs the Governor of Puerto Rico to develop the disaster recovery plan in coordination with FEMA, with support and contributions from other federal agencies having designated responsibilities in the National Disaster Recovery Framework. As of June 2015, Puerto Rico had roughly $66.9 billion in outstanding debt. According to the recovery plan, economic contraction in the years prior to the hurricanes contributed to a severe fiscal crisis and Puerto Rico’s credit rating dropped below investment grade in early 2014, followed by a series of defaults on debt payments. In response to Puerto Rico’s financial crisis, Congress passed and the President signed the Puerto Rico Oversight, Management, and Economic Stability Act in June 2016, which established the FOMB with broad budgetary and financial control over Puerto Rico. The Bipartisan Budget Act also permits the FOMB to review any federal funds over $10 million that are designated for Puerto Rico’s response to or recovery from Hurricanes Irma or Maria. FEMA obligated nearly $4 billion in Public Assistance funds for Puerto Rico’s emergency work projects, as well as the repair and restoration of its public infrastructure, among other things. In order to provide financial oversight of these funds, Puerto Rico is developing an internal controls plan as well as management policies and procedures that will, in part, help provide financial monitoring. In the interim, FEMA has instituted a manual reimbursement process to mitigate risk and ensure fiscal accountability. As shown in figure 3, FEMA has obligated $3.63 billion (93 percent) for emergency work (categories A and B), and $151 million (4 percent) for permanent work (categories C through G) in Puerto Rico as of September 30, 2018. An additional $136 million (3 percent) was obligated for management and administrative costs. As of the end of fiscal year 2018, Puerto Rico expended about $1.7 billion (about 43 percent) of the almost $4 billion Public Assistance funds obligated by FEMA. Ninety-eight percent of this amount went toward emergency work projects in categories A and B. For example, the Puerto Rico Aqueduct and Sewer Authority expended almost $91 million to cover the costs of generator usage. Aside from generators, one category B project by the Puerto Rico Emergency Management Agency repaired the emergency warning system for about $9.4 million. A third project put a temporary roof on a Puerto Rico Institute of Culture facility in Vieques for $4,000. As shown in table 1, the majority of FEMA’s obligations in Puerto Rico as of September 30, 2018, have been for emergency work categories because these projects began soon after the disasters struck and focused on removing debris and providing assistance to address immediate threats to life and property. In contrast, permanent work projects take time to identify, develop, and ultimately complete as they represent the longer-term repair and restoration of public infrastructure. Funds expended by Puerto Rico for permanent work have been mostly limited to roads and bridges (category C) because impassable roads like the one shown in figure 4 below impede the provision of critical services to citizens. They can also get in the way of other disaster recovery efforts. Expenditures for roads and bridges (category C) amount to approximately $32 million, while expenditures for other permanent work categories (D- G) total approximately $1 million. According to FEMA officials, Public Assistance projects in categories D-G are still pending prioritization and formulation. For example, figure 5 below shows a recreational public space along the edge of a river in Maricao. The dashed line indicates where the iron railing and concrete paving used to continue, overlooking the river, before Hurricane Maria. As of September 2018, the municipality was awaiting FEMA assistance to begin restoration FEMA categorizes Puerto Rico’s subrecipients as commonwealth public corporations, commonwealth agencies, municipalities, and all other entities. As shown in table 2 below, 89 percent of obligations, as of the end of September 2018, for Puerto Rico were awarded to commonwealth public corporations and commonwealth agencies, with 47 percent awarded to the Puerto Rico Electric Power Authority. Overall, about 43 percent of obligated funds have been expended. As previously discussed, Puerto Rico designated COR3 to administer and manage the Public Assistance program in coordination with FEMA. As part of COR3’s recovery oversight role, COR3 officials stated that they are developing an internal controls plan and recovery management policies and procedures with FEMA. According to COR3, these oversight documents will provide detailed guidance on grant application, procurement, payment and cash management, and financial monitoring and reporting, among other things. According to COR3 officials, they have held numerous meetings to coordinate with FEMA and have submitted drafts of the internal controls plan as well as management policies and procedures for FEMA’s consideration. In addition, according to COR3 officials, COR3 plans to provide direct technical assistance related to federal grants management to Puerto Rico’s cabinet-level agencies, public corporations, municipalities and other eligible subrecipients. As part of COR3’s advisory role, COR3 is expected to help Puerto Rico’s agencies, public corporations, municipalities, and some nonprofit entities formulate projects, draft cost estimates, and make funding requests, among other things. Federal grant award regulations allow FEMA to impose additional specific grant award conditions in specific circumstances, such as to mitigate risk and ensure fiscal accountability of the recipient or subrecipient. According to FEMA, once FEMA obligates funds, the recipient is able to expend funds as necessary. However, in November 2017, according to FEMA officials, the agency instituted a manual reimbursement process for subrecipients in Puerto Rico for federal funds, including Public Assistance funds, to mitigate fiduciary risk and decrease the risk of misuse of funds. Specifically, FEMA officials stated that they decided to institute this process because the government of Puerto Rico had expended funds prior to submitting complete documentation of work performed. According to FEMA officials, they also decided to institute the manual reimbursement process due to Puerto Rico’s financial situation, weaknesses in internal controls, and the large amount of recovery funds, among other things. This manual reimbursement process requires that COR3 fill out the Office of Management and Budget’s Standard Form 270 and submit supporting documentation before obligated funds can be withdrawn by Puerto Rico through COR3 and reimbursed to subrecipients. Subsequently, FEMA must review the submitted Standard Form 270 and all project documentation for completeness, compliance, and accuracy before disbursing funds to the recipient. In cases where FEMA requires additional documentation to process a Standard Form 270 request, FEMA will submit requests for information asking COR3 to supply the information needed for FEMA to complete the review. FEMA officials said that they aim to complete the entire process described above within ten calendar days, or 15-20 calendar days if FEMA needs to request additional information from COR3. Additionally, FEMA officials stated that the manual reimbursement process is intended as a temporary measure. They will cease the process once FEMA has reviewed the operational effectiveness of COR3’s internal controls and approved the final internal controls plan, which are under review. FEMA, COR3, and Puerto Rico municipal government officials from ten municipalities we interviewed reported initial challenges with the recovery process, including with Public Assistance alternative procedures. These concerns included (1) workforce capacity constraints, (2) a need for additional guidance, (3) delays related to choosing cost estimators, and (4) reimbursement for emergency work. Workforce capacity constraints. FEMA and municipality officials cited concerns about FEMA staff turnover and lack of knowledge about how the Public Assistance alternative procedures are to be applied in Puerto Rico. While several municipal officials we spoke to remarked positively on consistent communication with FEMA officials, municipal officials in six municipalities we visited cited high levels of turnover among FEMA staff as a challenge. For example, officials in three municipalities said that discontinuity in FEMA personnel has caused them to have duplicative conversations with FEMA. An official from one municipality described the disruption that had been caused by repeated changes in FEMA personnel, especially when their point of contact at FEMA changed at least six times since the hurricanes. FEMA officials acknowledged that more personnel with expertise in the alternative procedures process are needed to administer the Public Assistance program and assist subrecipients. According to FEMA officials, FEMA has leveraged existing expertise from personnel in the Federal Coordinating Officer Advisory Group to train new employees to increase workforce capacity. FEMA personnel from this group are rotating experts assigned to recovery issues to increase institutional understanding of alternative procedures and train local hires. According to FEMA officials, these local hires can serve as FEMA staff for up to one year before they become reservists. In addition, FEMA officials stated that they have identified contractors with previous experience regarding alternative procedures to provide additional assistance to subrecipients. Need for additional guidance. Municipal officials cited concerns about a lack of comprehensive guidance for the alternative procedures process. Specifically, officials in eight municipalities we interviewed cited problems with missing, incomplete, or conflicting guidance from FEMA. In addition, officials in four municipalities stated that they are waiting on additional written instructions to establish more clear and consistent guidance. Officials from one municipality told us that the lack of written guidance has meant that the municipality has had to re-submit documents to FEMA multiple times to respond to changing guidance that they have received verbally. Additionally, four municipalities cited missing, incomplete, or conflicting guidance from COR3 as a challenge. However, one municipality noted that the quality of communication with COR3 has improved over time as COR3 has become more established. According to FEMA officials, they are drafting supplemental guidance for the alternative procedures process with the goal of incorporating lessons learned from prior iterations of the alternative procedures. Similarly, according to COR3 officials, COR3 is currently developing additional guidance and standard operating procedures to help subrecipients, including municipalities and Puerto Rico government agencies, better understand FEMA Public Assistance grant requirements. Delays related to choosing cost estimators for Puerto Rico. As mentioned previously, FEMA’s guidance for alternative procedures requires that FEMA and Puerto Rico, through COR3, choose personnel with expertise in cost estimation to serve as a center of excellence, which will develop a cost estimating methodology. FEMA has chosen personnel to staff the center of excellence. However, in August 2018, FEMA officials told us that COR3 had not yet finalized their choice of personnel, which had delayed the cost estimation process. Subsequently, COR3 officials told us that personnel have been identified to serve on the center of excellence and the final contracting process for these personnel is now in progress. Reimbursement for emergency work. Officials in nine municipalities we spoke to said that they had not been fully reimbursed for emergency work they completed. Further, officials in five municipalities we interviewed stated that the lack of full reimbursement has caused financial hardships. For example, officials in three municipalities said that the lack of full reimbursement has meant that the municipalities have had to pause or delay recovery work due to lack of financial resources. A mayor in one municipality stated that they have scaled back some essential services, such as the frequency of garbage pick-up, while waiting for full reimbursement. According to FEMA officials, delays in providing reimbursement were due to several factors including a loss in FEMA personnel to process reimbursement requests and a significant increase in the volume of reimbursement requests submitted by COR3 to FEMA. FEMA officials also stated an increasing need to make requests for information to COR3 due to a lack of documentation submitted at the time of the reimbursement request. In response to these factors, FEMA officials told us that they have undertaken new procedures with COR3. For example, according to FEMA officials, COR3 adopted procedures to review the completeness of documentation prior to submitting a reimbursement request to FEMA. FEMA officials stated that the agency is also holding weekly meetings with COR3 to increase coordination, and that FEMA increased the number of personnel devoted to reimbursement reviews. According to officials from FEMA and COR3, these steps have contributed to reduced delays. In response to the Bipartisan Budget Act, Puerto Rico submitted an economic and disaster recovery plan (recovery plan) to Congress on August 8, 2018. The recovery plan defines the priorities, goals, and expected outcomes of Puerto Rico’s recovery related to building government capacity for the recovery and strengthening of Puerto Rico’s infrastructure, among other things. The recovery plan estimates infrastructure repair and recovery costs of $132 billion and total recovery costs of $139 billion for a time period starting in 2018 and ending in 2028. According to the recovery plan, COR3 will guide recovery investment and policy in the months and years ahead and is intended to serve as a focal point for strategic thought and management of Puerto Rico’s recovery. The recovery plan is generally responsive to the directives outlined in the Bipartisan Budget Act. For example, Puerto Rico submitted the plan to Congress within 180 days of enactment of the Bipartisan Budget Act. The recovery plan defines priorities, goals, and expected outcomes for Puerto Rico’s recovery effort based on damage assessments conducted by sector. As mentioned earlier, Puerto Rico developed the recovery plan in coordination with FEMA and with support of the U.S. Department of Energy, the U.S. Department of Health and Human Services, and other federal agencies with responsibilities outlined in the National Disaster Recovery Framework. Additionally, the FOMB of Puerto Rico certified the recovery plan on August 28, 2018, as directed in the Bipartisan Budget Act, but provided two caveats to its certification. First, FOMB expressed concern that the recovery plan lacks sufficient detail of funding sources and estimates a much greater amount of federal funding than the certified fiscal plan for Puerto Rico projects. The recovery plan states that at the time of its release, Puerto Rico had not undergone eligibility reviews in various federal funding programs, and therefore the ability to identify accurate funding sources was limited. COR3 officials confirmed that full recovery funding needs will not be known until all damage assessments are complete, and they will continue to identify and leverage all funding resources as they are made available. Second, FOMB indicated that the recovery plan does not address oversight of federal funds and the recovery process. While the Bipartisan Budget Act does not require specific mechanisms for oversight of federal funding as part of the recovery plan, according to COR3 officials, they plan to implement internal controls, policies, and procedures to provide oversight. Puerto Rico’s recovery plan outlines 276 “courses of action” (actions)— defined by the plan as “a collection of potential activities, policies, and other actions that could contribute to recovery”—selected by Puerto Rico to align with its future recovery vision. As shown in table 3 below, the actions reflect Puerto Rico’s short-term and long-term recovery vision, organized into three areas. First, the recovery plan proposes “precursor” actions—those that serve as a foundation for all future actions—that will be prioritized for implementation. For example, the recovery plan includes actions to build capacity of municipalities to secure and manage recovery funds, and to improve the quality and volume of public data available to decision makers. Second, the recovery plan proposes a set of actions that aim to build the infrastructure and systems that support Puerto Rico’s economy, society, and disaster resiliency, such as addressing vulnerabilities in Puerto Rico’s electric grid. Finally, the recovery plan proposes a set of actions that address Puerto Rico’s long-term recovery goals, such as developing and enhancing Puerto Rico’s visitor economy. Most individual actions in the recovery plan include initial and recurring cost estimates for the time period from 2018 through 2028. The recovery plan describes all cost estimates as preliminary, and says that more specific cost estimates require completion of damage assessments and more details about the implementation of actions. To develop Puerto Rico’s disaster recovery plan, FEMA assisted COR3 in retaining the Homeland Security Operational Analysis Center (HSOAC), a federally-funded research and development center operated by the RAND Corporation under contract with DHS. According to FEMA officials, FEMA provided funding and technical assistance, through contractor support, for Puerto Rico to develop the recovery plan, but COR3 and Puerto Rico will be responsible for its implementation. These officials also stated that Puerto Rico received input and technical assistance from other federal departments, such as those in the Recovery Support Function Leadership Group led by FEMA. HSOAC developed the recovery plan in consultation with Puerto Rico by developing a preliminary sector-by-sector assessment of damages and needs caused by Hurricanes Irma and Maria across Puerto Rico. In conjunction with Puerto Rico’s stated vision for the recovery process, HSOAC’s damage assessment report provided the baseline needed to define, compare, and prioritize actions. HSOAC worked in teams of sector-specific experts to develop and refine the actions by reviewing reports, proposals, best practices, and other literature. For example, in June 2018, the U.S. Department of Energy released a report on energy resilience for Puerto Rico’s electric grid, containing recommendations for Puerto Rico to consider when developing the Recovery Plan. HSOAC sought feedback from various subject matter experts and stakeholders while developing the recovery plan. According to FEMA officials, FEMA’s joint recovery office delivered interim drafts of the recovery plan to federal agency partners and Puerto Rico for feedback. HSOAC also sought input from local-level stakeholders, including Puerto Rico’s municipal governments. For example, HSOAC commissioned a survey of officials from municipalities to gauge the challenges they faced in the aftermath of the 2017 hurricanes. According to FEMA and HSOAC officials, the survey, along with other input provided by mayors led to the development of actions focused on building the capacity of municipal governments to support recovery efforts. HSOAC officials noted that while the final recovery plan was submitted to Congress, they will continue to produce products that will assist Puerto Rico and their stakeholders in recovery implementation. HSOAC intends to release updated versions of the recovery plan, including updated damage and needs assessments. Other expected products include detailed descriptions and cost estimates for each action and a lessons learned report. The Bipartisan Budget Act also directs Puerto Rico to develop a public report on the progress made in achieving the recovery plan’s goals every 180 days after submission. FEMA officials explained that the recovery plan serves as a strategic, direction-setting plan for recovery, and does not provide step-by-step or site-by-site guidance on the recovery process. FEMA officials also acknowledged that there may be some overlap between some of the actions in the recovery plan and some of the permanent work funded through FEMA’s Public Assistance program, but that it is COR3’s responsibility to merge and coordinate such recovery efforts. We provided a draft of this report to DHS and the government of Puerto Rico for review and comment. In its comments, reproduced in appendix I, DHS summarized the amount of Public Assistance funding provided to Puerto Rico through fiscal year 2018. DHS also described FEMA’s temporary manual reimbursement process instituted to mitigate risk and ensure fiscal accountability of taxpayer dollars, and stated that FEMA is committed to supporting Puerto Rico as it finalizes internal controls, management policies and procedures to oversee disaster recovery funds. DHS also provided technical comments, which we incorporated as appropriate. The government of Puerto Rico provided comments that we reproduced in appendix II. In its comments, the government of Puerto Rico stated that in addition to what was discussed in this report, COR3 achieved progress and faced additional challenges. This report is a part of an ongoing review of disaster recovery efforts in Puerto Rico. The remainder of our ongoing work will continue to examine Puerto Rico’s recovery process, including implementation of the Public Assistance alternative procedures process and efforts by FEMA and Puerto Rico to oversee disaster recovery funds, including the manual reimbursement process. If you and your staff have any questions, please contact me at (404) 679- 1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Chris Currie, (404) 679-1875 or CurrieC@gao.gov. In addition to the contact named above, Joel Aldape (Assistant Director), Pedro Almoguera, Aditi Archer, Michelle Bacon, Sylvia Bascope, Lilia Chaidez, Taylor Hadfield, Danielle Pakdaman, Lorraine Ettaro, Eric Hauswirth, Heidi Nielson, and Kevin Reeves made key contributions to this report.", "summary": "In 2017 two major hurricanes – Irma and Maria – caused extensive damage throughout Puerto Rico. Hurricane Maria, a Category 4 hurricane, was the most intense hurricane to make landfall in Puerto Rico since 1928, destroying roads, buildings, and cutting power and communication lines, among other things. Puerto Rico estimates that $132 billion will be needed to repair and reconstruct infrastructure and services. FEMA—a component of the Department of Homeland Security (DHS)—is the lead federal agency responsible for assisting Puerto Rico as it recovers. FEMA administers the Public Assistance program in partnership with Puerto Rico to provide funds to rebuild damaged infrastructure and restore critically-needed services. GAO was asked to review the federal government's recovery efforts related to the 2017 hurricanes. This report, among other objectives, describes (1) FEMA's Public Assistance spending in Puerto Rico and oversight efforts of federal recovery funds, and (2) initial challenges with the recovery process. GAO reviewed Public Assistance program documents; analyzed grant funding data; and interviewed officials from Puerto Rico and DHS about the Public Assistance program and recovery efforts, as well as officials from ten municipalities selected on the basis of population and Public Assistance spending. GAO is not making recommendations at this time, but will continue monitoring the recovery as part of its ongoing work. The Federal Emergency Management Agency (FEMA) obligated almost $4 billion in Public Assistance grant funding to Puerto Rico as of September 30, 2018 in response to the 2017 hurricanes. FEMA obligated about $3.63 billion for emergency work—emergency measures such as debris removal and generators—and about $151 million for permanent work to repair and replace public infrastructure such as roads (see figure). Puerto Rico established a central recovery office to oversee federal recovery funds and is developing an internal controls plan to help ensure better management and accountability of the funds. In the interim, FEMA instituted a manual reimbursement process—requiring FEMA to review each reimbursement request before providing Public Assistance funds—to mitigate risk and help ensure financial accountability. FEMA officials stated that they will remove this manual process once the agency approves Puerto Rico's internal controls plan. Officials from FEMA and Puerto Rico's central recovery office and municipalities that GAO interviewed reported initial challenges with the recovery process, including with Public Assistance alternative procedures. Unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures allow awards for permanent work projects to be made on the basis of fixed cost estimates to provide financial incentives for the timely and cost-effective completion of work. Challenges identified included concerns about lack of experience and knowledge of the alternative procedures being applied in Puerto Rico; concerns about missing, incomplete, or conflicting guidance on the alternative procedures; and concerns that municipalities have not been fully reimbursed for work already completed in the immediate aftermath of the hurricanes, causing financial hardships in some municipalities. FEMA officials stated that the agency is taking actions to address reported recovery challenges, such as leveraging existing expertise to train personnel and developing supplemental guidance on alternative procedures and reducing delays in reimbursements. GAO will continue to monitor these issues and plans to report additional findings and recommendations as appropriate later this year.", "document_type": "gao"}
{"report": "The National Defense Strategy is DOD’s primary strategy document, providing a foundation for all other strategic guidance in the department. The National Defense Authorization Act for Fiscal Year 2017 required DOD to develop a national defense strategy and update it at least once every 4 years and, during the years without an update, to assess the implementation of the strategy and whether any revision is necessary. The National Defense Strategy replaces the Quadrennial Defense Review, which the Armed Services Committees concluded had become too slow and ineffective to provide relevant strategic direction to the department. For each new strategy, DOD is required to identify, among other things: DOD’s strategic priority missions; the force structure, readiness, posture, and capabilities needed to support the strategy; and major investments required by the strategy. A separate provision in the act also established a Commission to assess the 2018 National Defense Strategy. The provision required the Commission to review the assumptions, missions, force posture and structure, and risks associated with the strategy. Congress expressed continued interest in DOD’s strategy implementation and assessment in the John S. McCain National Defense Authorization Act for Fiscal Year 2019, which included several provisions related to these matters. The National Defense Strategy falls under the President’s National Security Strategy, which outlines the overarching security strategy for the federal government. The National Defense Strategy is above the National Military Strategy, which provides more detailed military direction. Figure 1 provides the hierarchy and description of key U.S. strategic guidance documents. Organizations across DOD play a role in providing analytic support to senior leaders as they make force structure decisions to support the National Defense Strategy. Table 1 provides a summary of the organizations with key roles and responsibilities for providing analytic support to senior leaders making force structure decisions. DOD established its approach, Support for Strategic Analysis (SSA), in 2002 to provide analytic support to DOD senior leaders as they deliberate strategy and budget matters and to support evaluations of force structure needs across the joint force. SSA is structured to do this by providing a common set of assumptions for various military threats that form the basis for further analysis across the department. DOD guidance states that SSA is intended to provide a common starting point for the exploration of various approaches to address the threats. DOD guidance further states that analyses should provide senior leaders with insights on the relative risks of various operational approaches and force structures. Senior leaders would then have a basis to weigh options, examine tradeoffs across the joint force, and drive any force structure changes necessary to meet the strategy. For more information on the origin of SSA, see the sidebar below. Origin of Support for Strategic Analysis DOD officials told us that the department developed what became SSA because then Secretary of Defense Donald Rumsfeld was frustrated by the lack of objective measures to compare competing force structure proposals. During the 1990s, each service developed its own analytic process and assumptions for assessing force structure needs to develop requirements for budget submissions. Each service’s analytic process tended to favor its preferred force structure and operational approach. DOD officials stated that the lack of a common analytic starting point for all of the services also meant that senior leaders had difficulty getting beyond debates about the services’ respective assumptions during discussions on force structure priorities. As a result, the Secretary of Defense had no objective basis by which to decide whether, for example, a Navy proposal to buy more ships or an Air Force proposal to buy more fighter aircraft was the best way for the department to use its limited resources to support strategic priorities. SSA is led by OUSD (Policy), the Joint Staff, and CAPE—collectively referred to as the Tri-Chairs. DOD guidance assigns each Tri-Chair responsibility for creating one of three increasingly detailed products for a variety of military threats that, taken together, comprise the common starting point for additional analysis of that threat. The resultant SSA product library is then available to the services and other DOD organizations for further analysis. DOD guidance notes that the threats SSA products address are examples of the types of threats U.S. joint forces are expected to be able to address with acceptable risk. However, the guidance states that the forces described in the products are not intended to constitute DOD’s force structure requirements. Instead, analysis using these products is intended to help senior leaders establish force structure requirements that balance risk across a range of threats, within fiscal constraints. Table 2 identifies the three SSA products that are intended to form the common starting point for analysis for a given plausible threat, along with the lead Tri-Chair for each product type. According to DOD guidance, the military services are to support the Tri- Chairs in developing the SSA products and, according to DOD officials, are the primary users of these products. The guidance requires that the services use SSA products as common starting points for studies evaluating their force structure needs for implementing the defense strategy and supporting their budget development, among other things. Although the starting points are common across the department, each service uses its own analytic process to evaluate its specific force structure needs for implementing the strategy and supporting its budget development (see app. I for further details on each service’s analytic process). The services may examine any plausible threat in the SSA library that they believe may help them understand their force structure needs. However, the 2018 National Defense Strategy identifies several key threats and the principal priorities for the department that the services must prioritize when developing their force structures. Specifically, the unclassified summary of the strategy calls for the department to increase and sustain investments towards the long-term strategic competitions with China and Russia, and to concurrently sustain its efforts to deter and counter rogue regimes such as North Korea and Iran, defeat terrorist threats to the United States, and consolidate gains in Iraq and Afghanistan with a more resource-sustainable approach. Further, budget guidance—in particular the Defense Planning Guidance—directs each service on which threats it must focus as part of its budget development process. Figure 2 provides a generalized overview of how the SSA process was designed to operate. SSA has not provided senior leaders with the analytic support they need to evaluate and make fully informed decisions regarding the force structure needed to implement the National Defense Strategy. DOD has recognized this and attempted to reform SSA for several years, including exploring alternative options for providing senior leaders with better decision-making support. However, DOD has not fully developed these approaches and it is unclear whether they will provide the analytic support needed. To date, SSA has not provided the analytic support senior leaders need to evaluate and determine the force structure required to implement the defense strategy. DOD senior leaders have documented concerns with SSA in relevant guidance. For example, DOD’s 2016 Defense Analytic Guidance stated explicitly that there were cracks in the department’s analytic foundation, many of which originate within SSA. Further, CAPE and the Joint Staff had disengaged from the SSA process by this time but, as of September 2018, the services were still using SSA products for their force structure analyses and budget development. Based on our analysis, we believe that SSA has not yielded the analytic support that it was intended to provide owing to three interrelated and persistent challenges: (1) cumbersome and inflexible products, (2) limited analysis that tends not to deviate from the services’ programmed force structures and has not tested key assumptions, and (3) an absence of joint analysis evaluating competing force structure options and cross- service tradeoffs. DOD has not kept the SSA products complete and up to date because they are cumbersome and inflexible. DOD guidance states that SSA products are to be common starting points for analyses, including key threats identified in strategic guidance. DOD guidance also states that SSA products should retain consistency with DOD strategy and current intelligence and should incorporate operational approaches effective at mitigating future threats. Credible independent analysis of an issue requires a detailed, well-understood, up-to-date common basis for that analysis. As of September 2018, DOD’s library of products was incomplete and outdated. Specifically, the Detailed View was not available for any of the threats, and Joint Staff officials told us they stopped producing joint CONOPS through SSA in 2015. Moreover, the Joint Staff retired all of the existing SSA CONOPS in March 2018 because they were outdated and/or not aligned with the 2018 National Defense Strategy—though they were still available for the department to access. Service officials also told us that many of the approved Defense Planning Scenarios and CONOPS for the key threats identified in the 2018 National Defense Strategy do not reflect up-to-date military objectives and adversary capabilities. Additionally, the 2018 National Defense Strategy outlines a new force posture and employment model that could have major implications for future CONOPS. However, DOD is still developing these concepts and, as such, they are not yet reflected in any SSA products. Specific details on the status of key SSA products were omitted because the information is classified. One of the key reasons DOD did not keep the products complete and up to date was that developing and approving highly detailed and complex SSA products was cumbersome, taking a significant level of effort and time. Tri-Chair officials told us that developing the CONOPS and Detailed View, in particular, was difficult because there was a desire to gain consensus with all of the stakeholders and because the services wanted these products to have high fidelity detail in order to run their campaign models. For example, CAPE and Joint Staff officials told us that it took between 1 and 2 years to build and approve the Detailed View for one threat scenario. The officials added that the level of detail included made the product inflexible and difficult to vary. CAPE and Joint Staff officials agreed that this product became far too detailed and time-consuming and used a substantial amount of the department’s analytic capacity. As a result, the officials told us that CAPE abandoned building additional Detailed Views in 2012. The lack of agreed-upon details about the forces required has had other effects. For example, OUSD (Policy) and Joint Staff officials told us that the services still wanted the comprehensive information that the Detailed View was supposed to provide for use in their campaign models. Without CAPE producing Detailed Views, the officials noted that some of the detailed information migrated into the higher level CONOPS, making developing and analyzing that product more difficult and time-consuming as well. However, all four military services told us that they need and continue to use the SSA products—specifically, the Defense Planning Scenarios and CONOPS—to support program and budget formulation. Service officials also told us they have adapted CONOPS, as individual services or with other services, to better reflect the operational environment (e.g., updating intelligence estimates on adversary capabilities). However, CAPE and OUSD (Policy) officials told us that this results in the services’ analyses no longer being common and comparable across the department. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 reiterates that OUSD (Policy) must, in coordination with the other Tri-Chairs, develop planning scenarios by which to assess joint force capabilities, among other things. Until the Tri-Chairs determine the analytic products needed and the level of detail that is sufficient to serve as a common starting point but also flexible enough to allow for variation of analysis, and ensure these products are updated, the military services will likely continue to generate budget requests based on analysis that is not comparable. As DOD’s 2016 Defense Analytic Guidance noted about the fiscal year 2017 budget review, the lack of a common basis for their analysis hampers the department’s ability to understand the relationship between future warfighting risks identified in analysis and the services’ programmatic decisions. Although DOD’s guidance stated that SSA will facilitate a broad range of analysis exploring innovative force structure approaches for mitigating future threats identified in the strategy, SSA has not done so. Innovative force structure approaches could include, for example, alternative CONOPS and deviations from programmed forces. The 2018 National Defense Strategy stated that DOD’s operational approach largely dates from the immediate post-Cold War era when U.S. military advantage was unchallenged and the threats were rogue regimes, which is no longer the case. OUSD (Policy) officials told us that SSA CONOPS also reflect this outdated approach that depends on overwhelming force for success, which is unrealistic against advanced adversaries. Similarly, DOD’s 2016 Defense Analytic Guidance called for SSA to emphasize analyzing and assessing risk against key threats rather than on defending predetermined force levels or capabilities. Rather, the 2018 strategy stated that the department must relentlessly pursue innovative solutions and devise insurmountable dilemmas for future adversaries and that incrementalism or evolutionary progress is inadequate. However, Tri-Chair and service officials told us the services have been reluctant to conduct or share these types of boundary-pushing analyses through SSA for fear that they will jeopardize their forces or limit their options. Tri-Chair officials also told us that the services have leveraged their participation in developing SSA products to ensure their favored major force structure elements are included in the common starting point. Joint Staff officials noted that they were able to do this because SSA did not constrain what force structure the services could use for their analysis. That is, if the force structure was programmed, they could use it because the goal was to overwhelm the adversary. However, by not significantly deviating from the starting points, the services were able to ensure that their analytic outcomes support the need for the already- programmed force. Additionally, several questionable assumptions underpin the analysis. Sensitivity analysis examines the effects that changes to key assumptions have on the analytic outcome and are helpful to understand risk. It can therefore provide insight to decision makers of how risk levels would change if conditions did not match the assumptions. However, Tri-Chair officials told us that the services, using SSA products as a starting point, generally have not conducted sensitivity analyses on key operational assumptions or on factors that may not be static (or at least have some uncertainty) and, if varied, may raise or lower the risk of completing assigned tasks or missions. According to these officials, as well as our past work, certain questionable assumptions have not been analyzed through sensitivity analysis as part of SSA. For example, all four services tend to assume that their readiness for a conflict will be high, consistent with the level directed in guidance. However, we reported in 2018 that at the individual service level, the military services continue to report readiness challenges and readiness rebuilding is anticipated to take 4 years or more. Specific details of service-specific assumptions that are problematic were omitted because the information is classified. The services have been reluctant to independently examine a broad range of innovative force structure options and conduct sensitivity analysis on key operational assumptions through SSA because, according to service officials, due to competing priorities they believe they can generally only affect marginal changes in their budgets from year to year and have limited analytic capacity. Service officials noted how the majority of their service’s budget each year is constrained by must pay bills, including personnel costs, supporting existing force structure, established contracts, sustaining the industrial base, and statutory mandates. As such, unless directed to by senior leaders, service officials told us that they typically do not use their limited analytic resources to conduct sensitivity analysis or explore alternative approaches. The sensitivity analyses they have been directed to conduct have generally been focused on smaller force structure changes, but have provided useful insights. For example, the Air Force conducted an analysis for its fiscal year 2019 budget request of how risk would be affected with various F-35 buy-rates and investments in munitions and base defense. The Air Force found that it could reduce risk by keeping its F-35 buy-rate steady instead of increasing it and could use the resulting savings to bolster its munitions stocks. DOD stated in its 2016 Defense Analytic Guidance that SSA is not adequately exploring innovative approaches to meet future challenges, and called for OUSD (Policy) to identify key operational assumptions for the services to use to conduct sensitivity analyses. However, the direction provided by the department has thus far been limited and has generally not provided specific guidance requiring the services to explore a range of innovative force structure approaches or identified key assumptions on which the services must conduct sensitivity analyses. For example, the three Defense Planning Scenarios updated in 2018 for the purposes of analysis in support of the fiscal years 2020 and 2021 budget requests included a number of parameters for further analytic exploration. However, the guidance encourages, but does not require, the services to conduct these analyses. As previously discussed, officials said the services are reluctant to conduct or share this analysis and are unlikely to do so without specific direction. As a result, SSA analysis largely reflects the services’ programmed force structures and has not driven any significant changes to force structure or resource allocation within DOD and lacks credibility with senior leaders, as documented in DOD guidance. Until DOD provides specific guidance requiring the services to explore a range of innovative force structure approaches relevant to the threats identified in the 2018 National Defense Strategy, including identifying key assumptions for sensitivity analyses, DOD senior leaders may not have full visibility into the risks in the joint force’s ability to execute the missions set out in the National Defense Strategy. A key stated goal of SSA was to create a common analytic foundation so that the services’ force structures could be evaluated as a joint force—as it would fight. However, SSA has not resulted in this type of joint analysis. Specifically, DOD guidance states that SSA is intended to facilitate the comparison and evaluation of competing force structure options and cross-service tradeoffs. DOD guidance also states that assessments of the aggregate capacity of the joint force can provide an analytic foundation to identify risk and understand tradeoffs across competing demands for the force. According to the services, SSA products provide a valuable resource and are critical to informing programmatic decisions. However, DOD’s 2016 Defense Analytic Guidance noted that there was a dearth of joint analysis at the operational and strategic levels; the department lacks a body or process to conduct or review joint force analysis; and the department’s SSA efforts were focused on developing, versus analyzing, the common starting points. Accordingly, it reiterated the need for SSA to free up time and resources to conduct joint analysis and review competing analyses. Tri-Chair officials told us that DOD currently compares and makes decisions on force structure options primarily through the budget process; however, such budget reviews are typically limited to specific areas of interest. The officials added that program and budget review is not the best place to evaluate joint force structure tradeoffs because the kinds of issues examined in the budget process are more limited in scope and generally do not include comprehensive cross-service comparisons. Lacking joint analytic capability to assess force structure needs could be problematic as the department moves forward to implement the 2018 National Defense Strategy. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 directed OUSD (Policy), in coordination with the other Tri-Chairs, to conduct assessments of the capabilities of the joint force to achieve required objectives. However, Tri-Chair officials also told us that, as of 2018, there was not a mechanism in place for DOD to routinely assess joint force needs and force structure tradeoffs across the military services. As previously discussed, in 2016 this was identified as an issue, and limited progress has been made since then to ensure adequate joint analysis to support senior leader decision-making. Further, OUSD (Policy) officials told us that SSA has not been responsive to senior leaders because it has not provided timely and comprehensive answers to important questions that only joint analysis can provide, such as the extent to which the joint force can successfully meet a campaign’s overall objectives (e.g., win the war) or the extent to which cross-service tradeoffs would affect a specific campaign. As a result, force structure decisions in the department based on SSA have remained largely relegated to marginal changes through program and budget review, according to DOD. The department’s gap in a joint analytic capability is particularly problematic in light of the National Defense Strategy’s call for urgent change at a significant scale and recent proposals by the services to greatly expand their force structure—including the Navy’s plan to grow the fleet by as much as 25 percent and the Air Force’s plan to grow squadrons by 24 percent. Based on our discussions with officials and our analysis, there are a number of different options the department has for conducting such joint analyses, including establishing a separate body with these capabilities or specifying the organizational responsibilities and processes for conducting these comparisons and analyses. Until the department has an approach for conducting joint analyses or comparing competing analyses, DOD senior leaders will not have a robust joint analytic foundation to rely on to evaluate competing force structure options and cross-service tradeoffs. The department has recognized that SSA has shortcomings and made repeated efforts to address them, including specific intervention and supplemental guidance promulgated in 2014 and 2016. However, Tri- Chair officials told us that these prior efforts fell short, and the department’s struggles with SSA led to two of the three Tri-Chairs disengaging from the process—CAPE in 2012 and the Joint Staff in 2015. The Tri-Chairs agree that DOD continues to need a process and products that are current, more responsive to senior leader needs, and able to provide insights on alternative approaches and force structures that span the joint force. In addition, Joint Staff officials noted that SSA was too focused on force sizing, which is not consistent with the 2018 National Defense Strategy’s focus on innovation, modernization, and readiness. In order to address this, the Joint Staff is pursuing an alternative approach to SSA that would largely eliminate a separate formal analytic process. Instead, the Joint Staff believes that the Tri-Chairs and the services can address senior leader needs more efficiently by continuing to execute their existing statutory roles and responsibilities within their own individual organizations in lieu of SSA. Since 2016, the Joint Staff has reinvigorated its own analytic capability to support the Chairman of the Joint Chiefs of Staff and other senior DOD leaders, according to Joint Staff officials. Although officials from other DOD organizations have supported the Joint Staff’s reinvigoration of its analytic support, they told us that this approach is focused on the Chairman’s responsibility rather than on wider departmental needs and does not address key shortfalls in providing analytic support to senior leaders, including the need for a common, flexible starting point. Further, the Joint Staff’s alternative approach would rely on CAPE’s analysis in the budget process as the culminating point for final DOD force structure decisions. CAPE officials told us that the program review can assist DOD leadership in optimizing relatively limited changes to DOD’s force structure by evaluating service budget submissions and identifying alternatives for consideration. However, budget cycle time constraints mean that little analysis occurs within program review and, as a result, program review relies on the foundational analysis SSA was intended to provide. As such, CAPE’s annual program review is inadequate for comprehensively examining needs and making major tradeoffs across the joint force, according to the officials. Finally, the department originally created SSA as a separate analytic process to address a shortfall not addressed by key DOD entities pursuing their statutory responsibilities. The Tri-Chairs have also undertaken an effort to identify an alternative approach to SSA. Specifically, shortly after the new strategy was released in 2018, CAPE initiated a Tri-Chair “blank slate” review of DOD’s analytic process in order to thoroughly review—without preconceived solutions— how to best provide analytic support to senior leaders. According to Tri- Chair officials, this effort is in the early stages of development and has not yet identified solutions to the challenges that hampered SSA or documented any aspects of a new approach. While the department’s recognition of the challenges confronting SSA is promising, the two efforts underway to identify alternatives to SSA are not complete and it is unclear the degree to which these efforts will address the challenges that have been long-standing with SSA. Addressing these challenges is critical to being able to provide needed information for senior leaders to make decisions on how best to implement and execute the National Defense Strategy. The 2018 National Defense Strategy calls for the department to make difficult choices to prioritize what is most important to field a lethal, resilient, and rapidly adapting joint force needed to address the growing threats to U.S. security. It also emphasizes that this environment demands analysis that accepts uncertainty and complexity and can drive innovation among rapidly changing threats. To prepare the joint force for the threats identified in the strategy, the department’s leadership needs to be supported by timely and comprehensive analyses. However, SSA—DOD’s current approach for providing such analytic support—has not provided the timely and comprehensive analyses that senior leaders need to make informed decisions about the joint force structure needed to implement the National Defense Strategy. Senior leaders have documented in relevant DOD guidance that there are cracks in the department’s analytic foundation, many of which originate with SSA. This is due in part to highly detailed and complex products that are difficult to produce and lack flexibility to analyze, insufficient guidance to overcome the interests of the services to protect their force structure equities, and the lack of a joint analytic capability. Congress, in the John S. McCain National Defense Authorization Act for Fiscal Year 2019, required OUSD (Policy), in coordination with the other Tri-Chairs, to develop joint force objectives and conduct assessments of the joint force’s capability to meet those objectives. The department has demonstrated a desire to fix SSA’s deficiencies but has thus far been unable to overcome these challenges. Without determining the analytic products needed and updating them, issuing specific guidance requiring alternatives and key assumptions to be fully analyzed, and developing an approach for conducting joint analysis, DOD may not be providing its leaders with the analytic support they need to prioritize force structure investments that would best manage risk and address the threats outlined in the National Defense Strategy. We are making three recommendations to DOD as it reevaluates its analytic approach. The Secretary of Defense should ensure that OUSD (Policy), the Joint Staff, and CAPE—in consultation with the services—determine the analytic products needed and the level of detail that is sufficient to serve as a common starting point but flexible to allow for variation of analysis to support senior leader decisions, and update these products to reflect current strategy and intelligence estimates, as well as the anticipated operational approaches needed to address future threats. (Recommendation 1) The Secretary of Defense should ensure that OUSD (Policy) provide specific guidance requiring the services to explore a range of innovative force structure approaches relevant to the key threats identified in the National Defense Strategy, including identifying key assumptions on which the services must conduct sensitivity analyses. (Recommendation 2) The Secretary of Defense should establish an approach for comparing competing analyses and conducting joint analyses for force structure to support senior leaders as they seek to implement the National Defense Strategy. This could include establishing a separate body with these capabilities and/or specifying the organizational responsibilities and processes for conducting these comparisons and analyses. (Recommendation 3) We provided a draft of the classified version of this report for review and comment to DOD. That draft contained the same recommendations as this unclassified version. In its written comments (reproduced in app. II), DOD concurred with our three recommendations and noted that the department has begun to address the recommendations with its new Defense Planning and Analysis Community initiative. We also received technical comments from DOD, which we incorporated as appropriate. DOD provided comments on its concurrence with the three recommendations. In its comments on the first recommendation, DOD suggested that we revise the recommendation to include that the Tri- Chairs consult with the services as they implement the recommendation. Throughout our report, we identified the important role the services play in providing analytic support to senior leaders, including supporting the development and use of the analytic products that provide the foundation of analysis in the department. As such, we agree with DOD’s proposed revision and have incorporated it to further clarify the services’ important role. In its comments on the second and third recommendations, DOD advised that we replace the term “force structure” with “force planning” to ensure that different audiences understand that we are referring to force sizing, shaping, capability, and concept development. DOD correctly stated that we were using the term “force structure” in a broad sense. However, the term force planning is not interchangeable with force structure because force planning is the act of analyzing and determining force structure needs. In order to provide further clarification, we added a note in the body of the report stating that when we refer to force structure analysis, it includes the force planning elements identified by DOD (i.e., force sizing, shaping, capability, and concept development). The department also provided some general comments on our report. Specifically, DOD noted that it has reservations about some of the report’s content because at times it seems to reflect statements based on particular organizational perspectives. DOD therefore requested that we acknowledge that Support for Strategic Analysis (SSA) suffered from poor implementation rather than being fundamentally unsound. However, DOD also stated that our report outlined that SSA failed due to overall suboptimal management and unwieldy stakeholder execution, and that the resulting failure to present analysis in a timely and responsive fashion impeded the flow of quality information to senior leaders. We believe that the three interrelated challenges we identified in our report adequately reflect that SSA faced significant challenges in being implemented as intended. Further, we identified that there are a broad range of views within the department on what the challenges have been and how to best address them. We continue to believe that it is important that these views be presented in the report and have attributed them as appropriate. DOD also commented that we reference a desire within the department to gain “consensus” amongst SSA stakeholders, but thought that “coordinated” was a more appropriate word than consensus, since consensus was not required to produce SSA products. In the report, we did not state that consensus was required, but noted that DOD officials told us that the desire for consensus amongst SSA stakeholders was a contributing factor in making SSA products cumbersome and inflexible. Further, DOD’s 2016 Defense Analytic Guidance similarly identifies the “degree of consensus” as an area requiring SSA process reform. DOD’s final comment noted that the military services used SSA products and routinely conducted sensitivity analysis for their internal use. We recognize in the report that the services conduct a variety of analyses, including some sensitivity analyses. However, we also identify important assumptions that remain untested. As we reported, service officials told us that they have limited analytic capacity and so tend not to do sensitivity analyses on topics unless specifically directed to do so. Further, we noted that the services have been reluctant to conduct or share boundary- pushing analyses through SSA for fear that they will jeopardize their forces or limit their options. As a result of this and the other challenges we identified in this report, the quality of SSA products and analysis and the information provided to senior leaders to inform decision-making has been limited. As DOD moves forward with implementing our recommendations, it will be important that it take the necessary steps to ensure that any future analytic processes thoroughly examine and test key assumptions and look across the joint force. Doing so would help ensure any new process can overcome the constraints that limited the effectiveness of SSA. We are sending copies of this report to congressional committees; the Acting Secretary of Defense; the Acting Under Secretary of Defense for Personnel and Readiness; the Under Secretary of Defense for Policy; the Chairman of the Joint Chiefs of Staff; the Director, Cost Assessment and Program Evaluation; the Secretaries of the Army, the Navy, and the Air Force; and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3489 or pendletonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in app. III. Each military service has its own process for determining its force structure requirements using national strategies, defense planning guidance, and Support for Strategic Analysis (SSA) products. Below is a description of each service’s process as of September 2018. Army. The process the Army uses for identifying its force structure needs has two phases: (1) “Capability Demand Analysis” where the Army uses SSA-approved Defense Planning Scenarios to determine how large a force is needed to support the National Defense Strategy and with what mix of units and (2) “Resourcing and Approval” where senior Army leaders assess each capability within the Army to determine where reductions and growth need to occur given available resources. The Secretary of the Army approves changes to force structure through the end of the Future Years Defense Program in a decision memorandum, and these decisions are documented in an Army Structure Memorandum. Navy. The process the Navy uses for identifying its force structure needs begins with the identification of the Navy’s steady-state, peacetime operations requirements. The Navy then conducts campaign and warfighting risk analyses to determine the force’s ability to fight and win SSA-approved Defense Planning Scenarios. Specifically, the Navy tests each force element against the most stressing Defense Planning Scenario, which provides the Navy with its battle force warfighting—to include surge—requirements. These warfighting requirements are compared with steady-state requirements and the more stressing forms the basis of the Force Structure Assessment, which establishes the long-term force structure goals of the Navy’s 30-year shipbuilding plan and aviation plan, and informs the programming and budget processes, among other things. Air Force. The Air Force has a largely decentralized process for identifying its force structure needs that is part of the Air Force’s annual budget development process. The Air Force manages its activities and budgets primarily across 12 Core Functions—the broad capabilities the Air Force provides to the combatant commanders. Much of the force structure analysis that informs budget decisions is also conducted at the Core Function level. The Air Force also conducts occasional leadership-directed studies on future capability needs in certain mission areas (e.g., air superiority needs beyond 2030) as well as a unified risk analysis of its entire force structure that is intended to inform senior leader budget decisions. The Air Force is currently revising its approach to better integrate its capability development and analysis earlier in the process. Marine Corps. The Marine Corps conducts service-level reviews of its force structure at the discretion of the Marine Corps Commandant. A Force Structure Review is typically directed as a result of major service-level issues, such as end strength or capability changes. Marine Corps Force 2025 is the most recent comprehensive assessment of the Marine Corps’ force structure and organization. This was a three-phased effort that relied on one Defense Planning Scenario to develop alternative force structures and evaluate them against a near-peer adversary. The Commandant directed this review to emphasize growing information warfare capabilities. The Marine Corps also conducts Force Optimization Reviews, which are biennial reviews designed to optimize the current and planned future force, taking into consideration new and emerging requirements. Table 3 shows some of the comparable elements of the individual service force structure development processes. In addition to the contact name above, Patricia Lentini, Assistant Director; Nicolaas Cornelisse; Martin De Alteriis; Carly Gerbig; Mae Jones; Amie Lesser; Shahrzad Nikoo; Carol Petersen; and Alex Winograd made key contributions to this report.", "summary": "DOD's 2018 National Defense Strategy continues the department's shift toward focusing on the challenges posed by major powers—China and Russia. The strategy concludes that DOD must pursue urgent change at a significant scale and starkly warns that failure to properly implement the strategy will rapidly result in a force that is irrelevant to the threats it will face. To implement the change DOD envisions, senior leaders must have quality information. Senate Report 115-125 includes a provision for GAO to review DOD's analytic approach for informing force structure decisions to implement the National Defense Strategy. This report assesses, among other things, whether DOD's analytic approach has provided senior leaders with the support needed. GAO reviewed DOD guidance, assessed whether DOD was meeting the objectives identified in its guidance, and interviewed agency officials. This is an unclassified version of a classified report issued in February 2019. Information that DOD deemed classified has been omitted. The Department of Defense's (DOD) analytic approach has not provided senior leaders with the support they need to evaluate and determine the force structure necessary to implement the National Defense Strategy. DOD's analytic approach—Support for Strategic Analysis (SSA)—is used by the services to evaluate their force structure needs and develop their budgets. However, GAO found that SSA has been hindered by three interrelated challenges: Products are cumbersome and inflexible. Although DOD guidance states that SSA products are to be common starting points for analysis on plausible threats, including threats identified in strategic guidance, DOD has not kept the products complete and up to date in part because they were highly detailed and complex and therefore cumbersome to develop and analyze. Analysis does not significantly deviate from services' programmed force structures or test key assumptions. Although DOD's guidance states that SSA should facilitate a broad range of analysis exploring innovative approaches to mitigate threats identified in the strategy, the services generally have not conducted this type of analysis because guidance has not specifically required the services to do so. DOD lacks joint analytic capabilities to assess force structure. Although DOD guidance states that SSA is intended to facilitate the comparison and evaluation of competing force structure options and cross-service tradeoffs, the department has not conducted this type of analysis because it lacks a body or process to do so. DOD efforts to revise its analytic approach are in the early stages and have not yet identified solutions to these challenges. Moreover, DOD has attempted reforms in the past without success. Without a functioning analytic process that addresses the above challenges, senior leaders do not have the analytic support they need to prioritize force structure investments that would best manage risk and address the threats outlined in the National Defense Strategy. GAO recommends that DOD (1) determine the analytic products needed and update them, (2) provide specific guidance requiring the services to explore a range of alternative approaches and force structures, and (3) establish an approach for conducting joint force structure analysis across the department. DOD concurred with the recommendations and noted the department has begun addressing them.", "document_type": "gao"}
{"report": "In the U.S. commercial airline industry, passengers travel on network, low-cost, and regional airlines. With thousands of employees and hundreds of aircraft, network airlines support large, complex hub-and- spoke operations, which provide service at various fare levels to many destinations. Low-cost airlines generally operate under a low-cost business model, which typically includes providing point-to-point service using fewer types of aircraft. Regional airlines typically operate small aircraft—turboprops or regional jets with up to 100 seats—and generally provide service to smaller communities on behalf of network airlines. Airlines rely on a wide variety of IT systems to schedule and transport passengers; some of these IT systems interface with networks operated by travel-booking sites, other airlines, and the FAA. These IT systems touch all phases of a passenger’s travel experience, including booking, check-in, boarding, and baggage, as well as airline operations behind the scene, including flight planning, crew scheduling, and flight dispatch, according to FAA. In addition, aviation stakeholders explained that airline IT systems operate in a dynamic, data-intensive environment that demands around-the-clock availability and real-time information. In recent years, the introduction of new mobile applications and telecommunications infrastructure has added to the myriad systems and network connections now critical to an airline’s operations. Airlines face challenges in maintaining or enhancing their IT systems. For example, some airlines operate a web of IT systems that were developed over many years as manual systems transitioned to electronic and computer-processed functions. Replacing software and upgrading these older systems, such as reservations and crew scheduling, can be complicated undertakings as airlines serve millions of travelers and need to keep data flowing across their networks. For example, in its financial filings, Southwest pointed to the significant challenges and costs involved in introducing new IT capabilities while managing existing systems. Increasingly dependent on the use of IT systems to run its ongoing operations, the company recently completed a multi-year initiative to transition to a new third-party reservation system through Amadeus, among other investments. In addition, a wave of industry consolidation stemming from airline bankruptcies in the late 2000s has affected airline IT systems, requiring significant sustained focus among airlines on merging different IT infrastructures necessary to support worldwide flight operations without interruption. For instance, we previously found that United struggled to integrate computer and reservation systems following its merger with Continental in 2010, although the airline has subsequently completed this transition, according to airline representatives. Likewise, in 2015 American pointed to its reliance on technology when discussing principal risks posed by the integration of its computer, communications, and other technology systems with those of US Airways following the merger of the two airlines. Additionally, some airlines rely on regional partners or third-party IT providers to help manage certain IT systems, such as reservations, crew scheduling, and flight dispatch, further adding to the variety of systems that airlines depend on to run their operations. Moreover, the airline industry is going through a transformation as it shifts to digital merchandizing and retailing to better serve consumers, a process which requires access to real-time information, according to an industry stakeholder. Finally, the speed of technology evolution has accelerated, making it a constant and iterative process to keep systems refreshed and operating in sync, a situation that poses additional challenges, according to a stakeholder. Passengers may be affected by an airline IT outage in different ways depending, in part, on the type and severity of the outage—for example, whether the outage stems from a software glitch or a hardware failure— and the system affected. (See fig. 1.) Effects can range from standing in line to be checked in by a ticket agent instead of using a mobile application to delayed and canceled flights if a hardware failure forces the airline to ground all of its flights until the system is back online. System failures may have cascading effects across other airline IT systems or operations, as well. For example, an outage in a flight dispatch system could cause hours-long delays for subsequent flights. Likewise, aviation stakeholders noted that crew positioning can hinder recovery from an outage as delayed flight crews “time out,” further extending the effects of an outage. In addition to these effects, passengers and airlines can also face higher costs from delayed or canceled travel, including increased operational expenses facing airlines as crews and aircraft sit idle, as well as indirect costs, such as those faced by travelers as their itineraries are delayed or canceled. FAA plays a key, but limited, operational role in responding to airline IT outages. As previously noted, FAA is responsible for ensuring the safe, efficient operation of the NAS. Agency officials we interviewed emphasized that airline IT outages have a limited effect on FAA’s management of the NAS because such outages tend to affect the demand for airspace, not its capacity. As a result, FAA officials explained that if flights are delayed or canceled because of an airline IT outage, the NAS is often less congested for those that remain flying. However, in managing the air-traffic control system, FAA is responsible for initiating and administering traffic management initiatives (such as a ground stop) if requested by an airline experiencing an IT outage. For example, an airline might request that FAA initiate a ground stop if the airline is unable to report flight dispatch information to the FAA, such as the weight and balance of aircraft. FAA works with airlines to accommodate flights back into the NAS when the outage is over. Once an airline recovers from an outage, FAA may also need to initiate traffic management initiatives if demand exceeds capacity in the system— potentially causing delays both for the airline that experienced the outage, as well as others. FAA does not routinely collect data about airline IT outages—which fall outside of its management of the NAS, according to agency officials— although it does collect data on NAS operations, which could include some information about these events. Specifically: The National Traffic Management Log (NTML)—the real-time narrative log of NAS traffic management initiatives kept by air traffic controllers—includes information about ground stops or other initiatives such as time the stop was put in place, affected airports, and when the initiative was lifted. Log entries may also include additional information about the outage, if such information is provided to air traffic control by the airline experiencing it. The Operations Network (OPSNET) system, among others, collects operational data, including air traffic operations and delay data to analyze the performance of the FAA’s air traffic control facilities. However, according to agency officials, data on the effects of airline IT outages (including delay and cancellation data related to airline IT outages) are discarded because information about airline-caused flight disruptions do not provide instructive information to FAA about whether the agency is efficiently operating the NAS. FAA does not directly oversee airline IT systems related to reservations, check-in, baggage, and boarding or their use, according to agency officials. These systems are managed by the airlines themselves. For airline IT systems that interface with FAA’s operational systems, such as automated systems used in air traffic control, FAA works with airlines to ensure that any output (i.e., data feeds) interfaces correctly with the agency’s systems. FAA may provide observations to the airline if its IT systems are not providing accurate information, such as if crews are not being correctly scheduled and tracked, fuel plans are not accurate, or flight plans are not correctly calculated and observable. DOT’s Office of the Assistant General Counsel for Aviation Enforcement and Proceedings and its Aviation Consumer Protection Division are responsible for helping ensure airlines’ compliance with passenger protection requirements and educating passengers on their rights. Airline IT outages are not specifically addressed by any of DOT’s consumer protection regulations. Rather, when these outages occur, they may trigger broader consumer protections afforded passengers. For example, airlines are required by DOT’s interpretation of the statutory prohibition on unfair and deceptive practices to provide refunds for flights that are canceled or significantly delayed if a passenger declines any rerouting that the airline may offer. In the case of delay, however, what amounts to a significant delay is not defined in this policy, and as discussed below, individual airlines may or may not set their own thresholds. According to agency officials, DOT is currently conducting a review of air carriers’ handling of involuntary changes to passengers’ travel itineraries. DOT also regulates compliance through its tarmac delay rule, which requires airlines to mitigate or avoid consumer harm in the event of a lengthy tarmac delay. In addition to these consumer protection regulations and policies, DOT oversees airlines’ compliance with obligations included in airline contracts of carriage or customer service plans. These contracts and plans must be publicly posted by airlines on their websites. As we have previously reported, DOT helps ensure airlines’ compliance with its passenger protection requirements by educating airlines on new regulations or clarifying existing regulations, responding to airlines’ questions, and reviewing airlines’ consumer service policies. According to DOT officials, the agency encourages proactive reporting of incidents by airlines, such as airline IT outages, including a brief description of the incident and any steps taken by the airline to provide accommodation to affected consumers. DOT also receives and investigates complaints from passengers and uses complaint data to identify which airlines to inspect and whether to begin investigations that may result in fines or enforcement actions. According to agency officials, DOT received 126 complaints that explicitly mentioned a domestic airline IT outage from 2015 through 2017. These complaints involved five such outages. For comparison, in all, the agency received between 17,000 and 21,000 complaints per calendar year during that timeframe, according to DOT’s Air Travel Consumer Report. According to DOT officials, complaints that explicitly mentioned an airline IT outage largely mirror in substance those received for other causes of flight disruptions. (These complaints are discussed in more detail below.) According to DOT officials, no investigations have been carried out focusing solely on airline IT outages, but DOT investigations have included airline IT outages that contributed to violations of DOT’s consumer protection regulations. For example, DOT found that an IT outage affecting Delta’s operational systems, including gate management and flight dispatch systems, caused significant surface congestion and resulted in a violation of tarmac delay regulations. This violation was among those included in enforcement proceedings resulting in a civil penalty and consent order to the airline. Finally, to monitor airline on-time performance and baggage handling and to provide information to consumers, DOT requires certain airlines to report data to BTS monthly, including the causes of flight delays and cancellations. However, the causes are grouped into broad categories and do not specify IT outages as a cause. BTS, which is an independent statistical agency within DOT, publishes summary data from reporting air carriers on the number of domestic on-time, delayed, canceled, and diverted flights on its website. DOT’s Office of Aviation Enforcement and Proceedings also publishes a monthly Air Travel Consumer Report with this information. We discuss these data in greater detail below. Using a variety of information sources, we identified 34 airline IT outages from 2015 through 2017 affecting 11 of the 12 airlines in our review. No government data, academic literature, or other information source could be used to determine a comprehensive count of airline IT outages, and information is also limited regarding the types, causes, and effects of these incidents. Additionally, airlines do not regularly share detailed data about their IT outages publicly, such as the number of flights or passengers affected or the technical cause of the outage, although general information about these incidents is sometimes provided on their websites and social media accounts or to the press. To identify airline IT outages in the absence of other sources of information, we validated a preliminary list of outages developed through a review of open source information, including media coverage. This preliminary list was validated through a combination of interviews with the airlines and third-party IT providers and a review of publicly available airline information, FAA NTML log entries, and DOT consumer complaints. Through our validation process, airline representatives and others identified additional airline IT outages that had not been reported or acknowledged publicly by airlines or third-party IT providers, reflecting the variation in quantity or quality of information available regarding these events. For example, we found more information about IT outages that had nationwide or multi-day consumer or operational effects because these incidents garnered more coverage—and often an official airline response—as compared to those that were of shorter duration or affected a regional carrier or smaller number of flights, passengers, or airports. Additionally, we found less or incomplete information on outages at third- party IT providers and regional carriers because their effects were dispersed across multiple airlines. We found that the number and severity of flight disruptions associated with the airline IT outages we identified varied widely. About 85 percent (29 of 34) of our identified outages resulted in some flight disruptions, including 5 outages we identified that caused over 800 delays or cancellations. However, we were unable to verify the exact number of disrupted flights caused by each outage. At least 14 outages resulted in a ground stop, some of which lasted for several hours, according to a review of FAA’s NTML logs. We identified seven outages that had no associated flight disruptions, although they inconvenienced customers in other ways. For example, during these incidents customers experienced problems buying tickets online, checking into flights on an airline’s website, or using frequent flier benefits. Because no comprehensive data are available on airline IT outages and their related effects, we could not compare these incidents with the effects on flights caused by other disruptive events, such as severe weather like hurricanes or snowstorms. However, FAA analysis of two of the IT outages that caused over 800 flight disruptions found that the number of delays or cancellations resulting from these outages was on par with or worse than those caused by severe weather in the same months the outages occurred. Likewise, representatives from one airline stated that operational effects from airline IT outages are comparable to severe weather events, although outages occur much less frequently. An aviation industry representative noted that these events are typically unexpected, hindering the ability of airlines to react and recover. By contrast, disruptions from weather may be forecast ahead of time, allowing airlines to prepare for predicted disruptions, including accommodating customers, adjusting flight crews and schedules, and pre-positioning aircraft, according to the same representative. The airline IT outages we identified were caused by a range of IT and infrastructure issues, according to airline representatives we interviewed and official press statements. These issues included hardware failures, software outages or slowdowns, power or telecommunications failures, and network connectivity issues, among others. In several instances, an IT issue in one airline system had cascading effects across other systems not affected by the initial outage. For example, a large volume of online traffic shut down an airline’s website and subsequently disrupted the airline’s reservations and check-in systems. Representatives from six airlines, an IT expert, and four other aviation industry stakeholders pointed to a variety of factors that could contribute to an outage or magnify the effect of an IT disruption. These factors ranged from underinvestment in IT systems after years of poor airline profitability, increasing requirements on aging systems or systems not designed to work together, and the introduction of new customer-oriented platforms and services. Representatives from airlines we interviewed also described some of their IT system investments and risk mitigation efforts undertaken in response to an outage or to address potential disruptions, such as investing in new backup systems or technologies. For example, five airlines have sought to reduce vulnerability by expanding IT operations beyond a single data center or moving them to the cloud, which allows for the delivery of computing services through the Internet. Likewise, two airlines described efforts to ensure connectivity and reduce the effects of IT disruptions by using multiple telecommunications network providers. Several airline representatives and an IT expert said that these airline IT investments are aimed at enhancing overall system functionality as well as revenue. However, the IT risk expert we spoke with noted that carrying out major upgrades to their IT systems can be challenging because these systems are always in use. Additionally, according to stakeholders we interviewed, airlines employ a variety of contingency planning and recovery strategies to respond to unforeseen technical issues, including IT outages. For example, one airline described incorporating routine system testing, artificial intelligence, and outage drills into planning for system disruptions to avoid outages or speed recovery. Airline efforts to increase the resiliency of their IT systems, such as those described above, could prevent or lessen the impact of such outages. BTS data capture the causes of flight delays and cancellations in several broad categories, which do not isolate flight disruptions resulting from airline IT outages and do not reflect the root cause of flight disruptions. As previously mentioned, BTS collects on-time performance data from the airlines, including the causes of flight delays and cancellations. On a monthly basis, certain airlines are required to report at least one cause of delay (in minutes) for each flight delayed 15 minutes or more from the following five categories: air carrier, extreme weather, NAS, security, and late arriving aircraft. Similarly, for each flight that was canceled, airlines are required to report the cause from one of four categories: air carrier, extreme weather, NAS, and security. BTS guidance instructs airlines to report flight delays that are within the control of the airlines in the air- carrier category. Also included in the air-carrier category, according to the guidance, are more than 40 other potential causes of delays or cancellations, such as aircraft maintenance, baggage, terminal operations, and crew matters. As a result, flight disruptions from IT outages are indistinguishable from other airline-caused issues within this category. Additionally, delays caused by airline IT outages may be captured in a category other than air carrier because of how airlines can report the causes of flight delays based on BTS guidance. For example: Multiple causes for a delay. Airlines have the option to report either just the main cause or all the causes for a flight delay as long as the airline consistently applies the same method in its monthly report to BTS. Also, if there is more than one cause for a flight delay that starts at the same time, airlines are required to report the cause that lasted the longest. As a result, delays caused by an airline IT outage may be attributed to other categories if they happen at the same time as other issues affecting an airline’s operations, such as poor weather or airport conditions. Late arriving aircraft delays. Airlines can report a flight delay in the late arriving aircraft category if the previous flight arrived late and caused the next flight (on the same aircraft) to depart late. Airlines are not required to provide additional information on the cause of the delay for the previous flight (air carrier, NAS, security, or extreme weather). As a result, delays from incidents that can cause ripple effects on an airline’s operations, such as an IT outage or severe thunderstorms, may be attributed to the late arriving aircraft category. NAS delays. Airlines can report delays in the control of the FAA, airport operators, or state and local officials in the NAS category, which includes ground stops, flight volume delays, and air traffic control issues, among others. However, BTS guidance does not specify how airlines should report delays caused by ground stops requested by the airlines, including after an IT outage. As a result, these delays may be captured in the NAS category. BTS data are collected to provide general information on the quality of airline performance to consumers and to improve airline scheduling, rather than detailed information about specific flights or events. Consequently, these data provide limited insight into the effects of individual events, including airline IT outages, both because flight disruptions may be captured in more than one category and because the data do not allow for the isolation of effects for affected flights. We reviewed BTS data for most of the airline IT outages we identified and found, for example, that for 3 outages, airlines reported the largest total number of flight delays in the NAS causal category on the day that the airline requested a ground stop because of the outage—rather than in the air-carrier category. In addition, we reviewed BTS data for the 5 outages we identified where the airline involved delayed or canceled at least 800 total flights and found that airlines spread the causes of flight delays and cancellations across several categories, primarily air carrier, late arriving aircraft, and NAS for the first day of these outages. For example, we found that airlines attributed 44 percent of all reported flight delays to late arriving aircraft for these days. (See fig. 4). DOT officials did not see a need for additional reporting requirements on flight delays and cancellations caused by airline IT outages given the effects of such events are not unique when compared to other causes of flight delay and because these incidents involve a small portion of consumer complaints received by DOT. Aviation stakeholders we spoke to told us that airlines track flight disruptions for internal purposes such as managing operations and scheduling. For example, representatives from one airline said that the airline tracks delays and cancellations associated with IT outages and other issues internally to identify patterns and reoccurring issues that need improvement, such as scheduling, staffing, and maintenance. DOT officials noted that obtaining more detailed information on the causes of flight delays and cancellations would require a cost and benefit analysis to determine whether the benefit from collecting the data would exceed the airlines’ cost to report the data. Officials also noted that the agency has undertaken efforts to provide additional information to consumers. Notably, to provide more insight into the underlying causes of delay attributed to late arriving aircraft, BTS began calculating the original causes of delays in the late arriving aircraft category and providing these data on its website in response to a recommendation made by the DOT Inspector General in 2013. No data are publicly available to quantify with any degree of precision the number of passengers affected by airline IT outages, and only one airline provided this type of information to us. Airline contracts of carriage set the minimum accommodations passengers are entitled to when their flights are delayed or canceled, which could include refunds, rebooking, or other amenities, such as food or meals. However, there is no comprehensive information about the accommodations that were actually received by passengers, and available information is largely anecdotal. Even with respect to the same IT outage, different people may be affected differently. For example, passengers may be affected by the complexity of the NAS and their individual circumstances. According to an airline representative we spoke with, an airline may be able to quickly rebook affected passengers on a different airline for one destination, for example, but may have difficulty rebooking passengers for another destination if other flights are full. Further, while network airlines have hub-and-spoke networks that include a number of route options or frequent service between cities, others—particularly point-to-point or low- cost carriers—may have more limited service, further constraining the ability to rebook individual passengers. Finally, passengers travel for different reasons and their tolerance for disruption can differ, as well, according to DOT officials. Thus, someone flying to visit a friend may have a different tolerance for delay than someone traveling for a job interview, they noted. Airlines are required by DOT to provide refunds for canceled—and significantly delayed—flights if a passenger chooses to cancel his or her trip. Beyond these requirements, however, airlines are not obligated to provide accommodations for flight disruptions such as cancellations and delays unless specified in an airline’s contract of carriage, according to DOT. These contracts govern what, if anything, a passenger is entitled to, although airlines may offer additional accommodations to inconvenienced passengers. Generally accommodations received by inconvenienced passengers could include rebooking on the same airline or alternate travel; refunds or compensation in the form of money or other benefits (e.g., credit for later travel); and amenities such as hotel stays and food, according to their contracts of carriage. Airlines can—and in some cases do—go above and beyond the obligations set forth in their contracts of carriage, as illustrated by some examples below. To better understand the accommodations that passengers may have received as the result of airline IT outages, we reviewed airlines’ contracts of carriage for the airlines in our scope with applicable contracts. None of these contracts addressed IT outages directly, but flight disruptions caused by outages would be covered under the broader contract terms addressing cancellations and delays. We found that the contracts vary in terms of what accommodations are provided for, as well as the extent to which airlines have discretion in providing them. For example, while several airline contracts include provisions to provide hotel vouchers, transportation to the hotel, or meals, other airlines—notably several low- cost carriers—do not. Likewise, some airlines establish set time thresholds for when they are obligated to provide a certain accommodation (e.g., after a delay of at least 4 hours), while others do not. Specific accommodations we identified in our review of airline contracts of carriage are discussed below, and table 1 further details some of the variation that we found. Alternate transportation. All nine airlines in our analysis provide for rebooking on their own airline in the event of a flight delay or cancellation such as might be caused by an airline IT outage, although Frontier includes certain airports near a passenger’s original destination as acceptable alternatives in its contract of carriage. Under this exception, for example, Frontier could rebook a passenger on a flight to Tampa if he or she had originally planned to travel to Orlando, or vice versa, in the event of a flight disruption. Three of the airline contracts of carriage we reviewed provide for travel on a different airline—or the use of alternate ground transportation— typically at their discretion, and a fourth airline provides for alternate transportation if a passenger’s flight has been diverted to a different airport. Airline representatives with two low-cost carriers described their unsuccessful efforts to develop agreements with network airlines to facilitate the rebooking of passengers on another airline. Refunds for cancellations. If a flight is canceled and no alternative is available—or if available flights are not acceptable to the passenger— all nine airlines in our analysis provide for refunds, although three airlines may instead reroute passengers to nearby cities. Under their contracts of carriage, airlines typically provide refunds for the unused portion of a ticket in the event of flight disruptions. If, for example, passengers have already completed the outbound portion of a roundtrip ticket, they would receive a partial refund for the unused, return portion, rather than the entire ticket. Finally, three airlines (Hawaiian, Southwest, and United) offer passengers the option of travel credits in lieu of a refund in their contracts of carriage. Refunds for delays. The majority of airlines in our review provides refunds or flight credit for flight delays, although refunds in some cases could be contingent on the absence of an acceptable alternative, such as being rebooked on a subsequent flight or to an alternate airport. As mentioned above, DOT requires airlines to provide refunds for flights that are “significantly delayed” but does not define how long such a delay is and instead relies on a case-by-case determination. Four of the contracts we reviewed establish a specific timeframe for the delay after which a passenger is entitled to a refund, while the others do not establish such a threshold. For example, a passenger flying on Alaska Airlines could request and receive a refund for a flight disruption lasting at least 2 hours, and passengers on Delta are entitled to a refund, if requested, after a 90 minute delay. By contrast, airlines without a defined threshold for a delayed flight have discretion for when passengers would be eligible for refunds, particularly with regard to nonrefundable tickets. Hotel stay. The majority of airlines in our review provide for hotel stays in their contracts of carriage (and ground transportation to the hotel), to varying degrees, although two low-cost carriers (Frontier and Southwest) do not. The contracts of carriage for seven airlines include a hotel stay for passengers inconvenienced by flight disruptions, and of these four stipulate that passengers have to be away from home or from their points of origin or destination; five require that the flight disruption span certain hours (e.g., 10pm to 6am); and one includes credit for a long-distance phone call. Four of the contracts we reviewed include additional provisions for hotel stays (or other accommodations) to passengers with disabilities or other needs. For example, under its contract of carriage, American will provide amenities to maintain the safety and welfare of certain passengers if they are delayed (e.g., customers with disabilities, unaccompanied children, the elderly, or others with special needs or circumstances). Food. Three airlines in our review provide for meals for passengers inconvenienced by flight disruptions in their contracts of carriage. For example, JetBlue’s contract of carriage provides for meal vouchers or pizza for flight delays of 6 or more hours. In addition, airlines may deliver meals or offer other amenities to passengers waiting for delayed or canceled flights, even in the absence of the promise of food in the contract of carriage. In these cases, additional accommodations may be publicly announced on airline websites, by social media accounts, or through statements to the press, or they may be provided directly to individual flights or passengers at the airport. For example, in response to severe thunderstorms in 2017, Delta had pizza delivered to passengers waiting in airports across the Southeast. Monetary compensation or travel credit. Inconvenienced passengers are not entitled to monetary compensation in the case of a flight delay or cancellation in the United States, and none of the airlines in our review includes such compensation in their contracts of carriage. Nevertheless, two airline contracts of carriage include provisions for travel credit—above and beyond a refund—for flight disruptions. JetBlue’s contract of carriage provides for travel credit for canceled or delayed flights with several tiers, depending on the timing of the cancellation or length of the delay. For example, passengers delayed over 6 hours are entitled to $250 credit for future travel on JetBlue. Likewise, Alaska’s contract provides for a discount code for future travel (and a letter of apology) for passengers delayed longer than 2 hours. Although not included in Delta’s contract of carriage, the airline provided $200 in travel vouchers to all customers with flight disruptions lasting at least 3 hours for two of the IT outages we identified, according to airline representatives. As mentioned above, collecting and analyzing passenger complaints is one way DOT helps ensure that an airline fulfills its obligations included in its contract of carriage and customer service plan, as well as any additional accommodations that may be publicly offered. Our review of passenger complaints filed with DOT stemming from airline IT outages found that they included complaints related to the lack of monetary compensation for delayed or canceled flights and refusals to refund other expenses, such as rental cars or missed hotel or cruise reservations, among other concerns. For example, complaints related to a Southwest outage in 2016 included several related to lack of compensation or other amenities, such as food or hotel stays offered by the airline. As noted above, Southwest’s contract of carriage does not provide for compensation, food, or hotel stays in the event of a delay or cancellation. Complaints filed after the Delta outage of 2016 acknowledged receipt of a $200 travel voucher in compensation or a hotel voucher, but pointed to other non-refunded expenses incurred or difficulties in redeeming these vouchers. The three consumer or passenger advocacy groups with whom we spoke raised several concerns with regard to passengers inconvenienced by airline IT outages. Stakeholders we spoke with responded to these concerns and addressed how airlines respond to IT outages. Passengers may not receive the same accommodations. In the absence of requirements for accommodations or compensation, passengers are dependent on whether or not the affected airline chooses to be generous, according to the consumer advocates we interviewed. They also noted that mileage plan or first class passengers may receive more accommodations than others, even when passengers are affected by the same underlying outage, as may be true in other circumstances, as well. Representatives from one airline told us that they attempt to promptly address the needs of all of their passengers but acknowledged that accommodations may vary depending on passenger circumstances, including passenger status (e.g., frequent-flyer program members or VIP travelers). Airline obligations toward affected passengers may be confusing for passengers. According to consumer advocates we spoke with, even if a passenger understands that an airline’s contract of carriage lays out its obligations to passengers affected by an IT outage, these contracts are often lengthy and difficult to understand. As noted above, our review of DOT complaints stemming from airline IT outages found that many passengers expected to receive compensation or other accommodations in response to these events, although such accommodations were not included in contracts of carriage. We reported in 2017 that airlines committed to reviewing their contracts of carriage to see if they could be simplified. Contracts of carriage may not clearly exclude IT outages from force majeure events, according to consumer advocates. Flight disruptions caused by extreme weather, terrorism, and other events that are seen as being beyond the control of the airline are typically treated as special situations in airline contracts of carriage, and as a result, inconvenienced passengers may not receive accommodations that they otherwise might. Consumer advocates voiced concerns that airline IT outages might be treated as events outside the airline’s control (i.e., Acts of God or force majeure events) given ambiguity in how these exceptions are defined. We found that IT outages were not explicitly included among the force majeure events identified in the contracts of carriage we reviewed. In interviews and written statements, representatives with four of the airlines in our review varied in the extent to which they characterized airline IT outages as incidents in the control of the airline, but generally indicated that passengers would be accommodated as if the outages were. We provided the Department of Transportation (DOT) with a draft of this report for review and comment. DOT responded by email and provided technical clarifications, which we incorporated into the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or KrauseH@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Our objectives for this report were to: identify (1) the Department of Transportation’s (DOT) and Federal Aviation Administration’s (FAA) roles, if any, in relation to airline IT outages and their effects and (2) what is known about these outages, including the number of flights and passengers affected. The scope of this report focuses on those airline IT systems that affect passenger experiences, including systems related to reservations and check-in, as well as those used by airlines for flight planning and dispatch. Our scope excluded IT systems involved in avionics (such as aircraft navigation systems); in-flight operations (such as passenger WiFi networks); and internal operations (such as company email systems). Our analysis included the 12 airlines that were required to report on-time performance information to DOT’s Bureau of Transportation Statistics (BTS) from 2015 through 2017, including network carriers (Alaska, American, Delta, and United); low-cost carriers (Frontier, JetBlue, Spirit, Southwest, and Virgin America); regional carriers that provide service for partner airlines (ExpressJet and SkyWest); and Hawaiian, which provides a niche service. Given the role of third-party IT providers, we also included Amadeus and Sabre in our scope. To identify relevant DOT and FAA authorities and responsibilities vis-à-vis airline IT outages in several areas, including operations, oversight, and data-collection, we reviewed relevant laws, regulations, policies, and guidance, as well as prior GAO work addressing agency roles. We interviewed DOT officials with BTS, which collects data on airline on-time performance, and the Office of the Assistant General Counsel for Aviation Enforcement and Proceedings and its Aviation Consumer Protection Division, which oversee consumer protections and receive consumer complaints. We also interviewed FAA officials with the Office of the Chief Information Security Officer, which advises the agency on matters relating to IT management and security. Within FAA’s Air Traffic Organization, we interviewed officials with Systems Operations Services, which administers traffic management initiatives including ground stops, and its National Airspace System (NAS) Operations and Office of Performance Analysis. These two offices are responsible for programs related to air traffic control systems and assessing the performance of the NAS, respectively. Through our review of relevant plans and an interview with officials in DOT’s Office of the Secretary, we determined that airline IT systems are not included in federal plans for critical infrastructure protection. According to DOT officials, outages in these systems do not have the potential to reach established thresholds for potential casualties or damages. By contrast, air traffic control systems and airports are included in sector-specific plans addressing critical infrastructure protection in the case of a terrorist attack or other natural or manmade disaster. To determine what is known about airline IT outages, we reviewed DOT data sources, including BTS and FAA performance and operations data, as well as passenger complaints received by DOT in response to airline IT outages from 2015 through August 2018. We also conducted interviews with or received written responses from 11 (of 12) airlines in our scope, and interviewed other stakeholders, including third-party IT system providers Amadeus and Sabre; an IT risk expert (Robert Charette); industry associations, including Airlines for American (A4A), the Regional Airline Association (RAA), and Airports Council International (ACI); and employee union representatives with the Air Line Pilots Association (ALPA). We determined that DOT and FAA data were not designed, and could not be used, to comprehensively identify airline IT outages. To identify airline IT outages in the absence of detailed DOT or FAA data, academic literature, or internal (proprietary) airline data on these incidents, we validated a preliminary list of such outages developed using open source material that included media coverage and publicly available airline sources for outages from 2015 through 2017. Specifically, we searched GAO subscription databases (e.g., ProQuest, Nexis, and EBSCO) to create a preliminary list of 37 airline IT outages from media coverage; performed additional searches of articles and official airline websites to collect more information on and corroborate incidents identified; provided our list of identified IT outages to the 12 airlines in our scope and two third-party IT providers (Amadeus and Sabre) for confirmation; and corroborated 20 of the identified IT outages with FAA’s National Traffic Management Log’s (NTML) log entries and DOT’s consumer complaint data. Through this process, we were able to corroborate 34 airline IT outages from 2015 through 2017, and we are confident that our list of outages includes all of the outages large enough to garner national-level, multi- day media coverage and an official response from an airline executive. While accurate, our list is not comprehensive because three airlines and a third-party IT provider identified additional outages that we did not find in our preliminary search, including one airline that shared information on more than 20 additional outages. We did not include these additional outages in our count to ensure that our methodology was consistent. To account for outages that may have occurred subsequent to our review, we identified an online listing of airline IT outages and validated 9 of 11 of the outages included from 2018 through January 2019 using publicly available airline or airport information or coverage in at least 3 media sources. This list and our validation process provides evidence that airline IT outages continued to occur during this timeframe, but does not match the rigor applied to the identification of outages we identified from 2015 through 2017. As a result, we are not confident that this list identified all of the outages large enough to garner national-level, multi- day media coverage and an official response from an airline executive. Once we had identified airline IT outages through other sources and could look at data for specific dates, we were able to use DOT and FAA data to provide additional insight into flight disruptions (i.e., flight delays or cancellations) and ground stops caused by outages. For example, we requested that FAA conduct analysis on 3 of the 34 outages we had identified to determine what FAA operational data could reveal about the effects of these outages. We selected these 3 outages to reflect a range of flight disruptions for comparative analysis, including variations in size and cause of the outage. We also assessed the extent to which the effects on passengers could be seen in the BTS on-time performance data reported by airlines. For these data, we sought to determine the cause and magnitude of delays and cancellations for each outage. We also reviewed NTML log entries for the dates of known outages to further identify potential information, including incidents of ground stops. Finally, to obtain more information about the potential effects on passengers resulting from these events, we reviewed consumer complaints to DOT stemming from airline IT outages. These complaints were provided to us by DOT’s Aviation Consumer Protection Division and include reference to the associated outage. To understand how airlines accommodate inconvenienced passengers, we reviewed airline contracts of carriage for 9 of the 12 the airlines in our scope. These contracts are the legally binding contracts between carriers and passengers and may include specific provisions such as refund procedures and responsibility for delayed flights, among other things. We excluded two regional airlines (ExpressJet and SkyWest) that operate under the contracts of carriage of their mainline partners and Virgin America, which merged with Alaska in 2018 and no longer has a separate contract of carriage. In addition to the stakeholders mentioned above, we also interviewed consumer or passenger advocacy groups, including representatives with the Consumers Union, the National Consumers League, and Travelers United to identify any concerns regarding consumers affected by airline IT outages. We conducted this performance audit from February 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Heather Krause, (202) 512-2834 or KrauseH@gao.gov. In addition to the individual named above, other key contributors to this report were Jonathan Carver, Assistant Director; Molly Laster, Analyst-in- Charge; Neha Bhatt; David Hooper; Rich Hung; Delwen Jones; SaraAnn Moessbauer; Emily Mussey; Josh Ormond; Corinne Quinones; Pamela Snedden; James Sweetman, Jr.; and Elizabeth Wood.", "summary": "In recent years, the airline industry experienced several well-publicized IT system outages to reservation, check-in, flight planning, and other systems. Such outages can result in widespread disruption to air travel, inconveniencing passengers, who may be delayed or face out-of-pocket costs, and can also affect airlines' revenue and operations. Airlines are responsible for operating and maintaining their IT systems. GAO was asked to review airline IT outages. GAO examined: (1) DOT's and FAA's roles related to airline IT outages and (2) what is known about these outages and their effects on passengers. GAO identified relevant federal laws and responsibilities and interviewed DOT and FAA officials. In the absence of DOT and FAA data to identify airline IT outages, GAO identified outages using open source documents for the 12 airlines reporting to BTS from 2015 through 2017 and validated these outages using a multi-step process with publicly available airline information, interviews with airline representatives, and FAA and DOT data. GAO also reviewed airlines' contracts of carriage, which are legally binding contracts between airlines and passengers, to understand how airlines accommodate passengers inconvenienced by IT outages, as well as 140 consumer complaints related to airline IT outages received by DOT from 2015 through June 2018. The Department of Transportation (DOT) and, within it, the Federal Aviation Administration (FAA) have limited roles overseeing or addressing the effects of outages from information technology (IT) systems that airlines rely on to schedule and transport passengers (e.g., reservation or flight planning systems). FAA's operations and oversight. At an airline's request, FAA may halt the operation of all or part of that airline's flights during an outage and work with the airline to reintegrate flights upon recovery. FAA does not directly oversee airline IT systems but works with airlines to ensure that airline data interfaces correctly with FAA's operational systems. DOT's consumer protection. Airline IT outages are not specifically addressed in DOT's consumer protections for passengers, although other protections may apply, such as restrictions on tarmac delays if a passenger is held on a flight during an outage. DOT oversees airlines' adherence to their contracts with passengers. These may include specific provisions such as refund procedures and responsibility for delayed flights, among other things. DOT also receives consumer complaints and uses complaint data to initiate investigations that may result in fines or enforcement actions. DOT's data collection. DOT requires large airlines to report information about on-time performance to the Bureau of Transportation Statistics (BTS), including the causes of flight delays and cancellations in several broad categories (e.g., airline caused, weather, and late-arriving aircraft). Using multiple sources, GAO identified 34 IT outages from 2015 through 2017, affecting 11 of 12 selected airlines. No government data were available to identify IT outages or determine how many flights or passengers were affected by such outages. BTS data provide information to consumers about airline performance broadly but are not designed to identify the effects of individual events, such as the number of flight delays and cancellations resulting from IT outages. According to GAO's validation of multiple sources, however, about 85 percent of the identified outages resulted in some flight delays or cancellations. Because of limited data, information about how passengers have been inconvenienced from outages is largely anecdotal (see figure for examples of inconveniences). Further, airlines vary in what they provide to these passengers (e.g., food, hotel, or rebooking on another airline) when IT outages occur. Consumer complaints stemming from IT outages accounted for less than one percent of all complaints received by DOT from 2015 through June 2018, and according to agency officials, these complaints raised concerns similar to complaints resulting from other causes of flight disruption. Complaints reviewed by GAO included the lack of food, a hotel, or compensation, among other things.", "document_type": "gao"}
{"report": "Federal trust funds are an accounting mechanism used to link dedicated collections with their expenditure for a specific purpose or program (see textbox). Earmarked or Dedicated Collections Our budget glossary (GAO-05-734SP) includes two definitions of earmarking: 1. Dedicating collections by law for a specific amount for particular purposes by means of legislative language. Our 2001 report on trust funds (GAO-01-199SP) used the term “earmarked receipts” in accordance with the first definition. We use the term “dedicated collections” instead to avoid confusion between the two definitions. One of the earliest trust funds established was the Civil Service Retirement and Disability Fund, set up in 1920. In the federal budget, the meaning of the term “trust fund” differs significantly from its private sector usage. In the case of federal trust funds, the federal government owns the assets of federal trust funds, does not have a fiduciary responsibility to trust beneficiaries, and can raise or lower future trust fund collections and payments or change the purposes for which the collections are used by changing existing laws. Designation as a trust fund does not in and of itself impose a greater commitment on the government to carry out program activities than it has to carry out other government activities. It can, however, indicate the government’s intent to restrict the use of those funds to the specified purpose and—especially for a program funded in whole or in part by its beneficiaries—may influence debates about program changes. OMB and Treasury determine budgetary designation as a trust fund when a law both dedicates collections to a program and identifies the account as a “trust fund.” Trust funds, however, are not the only way dedicated collections are accounted for in the federal budget. Special funds and public enterprise funds also link dedicated collections with their expenditure for a specific purpose or program and are analogous to non- revolving and revolving trust funds, respectively (see figure 1). For the purpose of this report, we examine budget accounts designated as “trust funds” by OMB and Treasury and those that link dedicated collections with their expenditure. There are two other fund types in the federal budget that we did not include: general fund accounts, which hold all federal money not allocated by law to any other fund account, and intragovernmental fund accounts, which facilitate financing transactions primarily within and between federal agencies. The four fund types included in our definition of trust funds and other dedicated funds are: Non-revolving Trust Fund. An account designated as a “trust fund” by law that is credited with dedicated collections, which can often, but not always, be used without further appropriation action. For example, the Federal Hospital Insurance (HI) Trust Fund, also known as Part A of Medicare, is financed primarily through payroll taxes levied on workers and their employers and finances health care services related to stays in hospitals, skilled nursing facilities, and hospices for eligible beneficiaries. Special Fund. Analogous to a non-revolving trust fund but not classified as a trust fund in name. For example, the Universal Service Fund subsidizes telecommunication carriers that provide telecommunications services to all consumers, including low-income consumers, schools and libraries, and those who live in rural or high- cost areas. Revolving Trust Fund. An account designated as a “trust fund” by law that is credited with collections that are generally available for obligation without further appropriation action to carry out a cycle of businesslike operations in accordance with statute. For example, the Employees Health Benefits Fund collects health insurance premiums from federal employees, annuitants, and their employing agencies and disburses payments to private insurers who participate in the Federal Employees Health Benefits program. Public Enterprise Fund. Analogous to a revolving trust fund but not classified as a trust fund in name. A public enterprise fund is a type of revolving fund that carries out a cycle of businesslike operations, mainly with the public, in which it charges for the sale of products or services and uses the proceeds to finance its spending, usually without requirement for annual appropriations. The Postal Service Fund of the United States Postal Service is an example of this type of fund. Trust funds and dedicated funds have their own dedicated collections and the ability to retain accumulated balances. From the perspective of the trust fund or other dedicated fund, the accumulated balances represent the value of past taxes, fees, and the other income received by the fund in excess of past spending by the fund. The accumulated balances are not cash. Most money collected and disbursed by the federal government is held in the General Fund of the U.S. Government (General Fund). The dedicated taxes and fees collected from the public are deposited in the General Fund and the General Fund disburses the fund’s benefit and other payments to the public. When the General Fund receives the cash, the trust fund or other dedicated fund records an asset for these collections and the General Fund records a liability to the fund, which essentially means the trust fund has “lent” money to the General Fund. As cash is disbursed, these asset and liability accounts are reduced. From the government-wide perspective, the trust fund or dedicated fund asset and General Fund liability accounts eliminate with each other in consolidation. Some trust funds and other dedicated funds have the legal authority to invest their balances, most of which are held in U.S. Treasury securities. The value of the securities held is recorded as “debt held by government accounts” and represents debt owed by one part of the government to another (i.e., intragovernmental debt). In many ways, the special U.S. Treasury securities held by government accounts are indistinguishable from the marketable government debt sold to the public. A maturity date is set, interest is accrued at established market rates, and the securities count as part of the total federal debt. Generally, these securities are not traded in the financial markets and are able to be redeemed on demand by the government account. The interest they earn is credited to the fund accounts in the form of additional Treasury securities or is used to pay current expenses or benefits. Interest earned by government accounts on their Treasury securities is an internal transaction, made between two accounts within the federal government, and constitutes an expense for Treasury. Treasury must pay back the debt held by government accounts when these accounts need to redeem their securities to be able to make their expenditures. When this happens, Treasury must obtain cash to finance the government’s spending either through increasing taxes, cutting spending, or increasing borrowing from the public. Entitlement authority is another way to classify budget authority, but OMB’s budget data do not include that classification. Discretionary spending refers to budget authority that is provided in and controlled by appropriations acts. Mandatory spending, also known as direct spending, refers to budget authority provided in laws other than appropriations acts and the outlays that result from such budget authority. Entitlement authority is the authority to make payments to any person or government if, under the provisions of the law, the U.S. government is legally required to make the payments to persons or governments that meet the requirements. Generally, entitlement authority is a type of mandatory spending. The classification of the budget authority within a trust fund or other dedicated fund as mandatory or discretionary determines how budget control mechanisms apply. By itself, designation as a trust fund does not determine whether spending is controlled through the annual appropriations process or what limitations apply. Trust funds and dedicated funds are subject to various enforcement mechanisms intended to control revenues, spending, and deficits. The Balanced Budget and Emergency Deficit Control Act of 1985 (BBEDCA) first established sequestration, which is the cancellation of budgetary resources under a presidential order. The act set deficit reduction targets for the federal government and established sequestration procedures to enforce those targets. The Budget Control Act of 2011 amended BBEDCA and revived this budgetary enforcement mechanism by reinstating budget limits (also known as “caps”) to encourage agreement on deficit reduction legislation or, in the event that such agreement was not reached, to automatically reduce spending so that an equivalent budgetary goal would be achieved. Appropriations from trust funds and other dedicated funds designated as discretionary count toward these limits. The Statutory Pay-As-You-Go Act of 2010 (PAYGO) specifies a second type of sequestration triggered under certain conditions. The act establishes a permanent budget enforcement mechanism intended to prevent enactment of mandatory spending and revenue legislation that would increase the federal deficit. The act requires OMB to track costs and savings associated with enacted legislation and to determine at the end of each congressional session if net total costs exceed net total savings. If the costs exceed the savings, a separate sequestration will be triggered. Consequently, the same mandatory accounts that are subject to sequestration under BBEDCA could incur further reductions if a secondary PAYGO sequestration is triggered. PAYGO does not control the growth in spending that results from previously enacted laws, nor does it control discretionary spending. Hundreds of programs across the federal government are supported in whole or in part by a trust fund or other dedicated fund. Our analysis of OMB’s budget data shows 398 active federal trust funds and other dedicated funds in fiscal year 2018. Non-revolving trust funds and special funds make up the greatest number of these types of accounts and also hold the greatest total balances. See table 2. Our analysis of another government-wide source, Treasury’s Combined Statement, records 647 trust and other dedicated fund accounts in fiscal year 2018. This count is higher because Treasury includes accounts with smaller balances and does not combine groups of related accounts. Of the accounts in Treasury’s Combined Statement, 150 have balances that are below $500,000 and would fall below OMB’s rounding threshold of $1 million. The trust funds and other dedicated funds in Treasury’s Combined Statement are spread across all 29 major departments that are reported separately in the statement (see figure 2). Each department has at least two such accounts. The distribution of the number of trust fund or other dedicated fund accounts across federal agencies does not correspond with the balances held by these accounts. For example, the Social Security Administration has only four such accounts, but those four funds together held $2.9 trillion—more than double the balances of any other agency at the end of fiscal year 2018 (see figure 3). In contrast, the Department of the Interior had the greatest number of trust funds and other dedicated funds, but these 118 funds together held $14.9 billion, which is less than 1 percent of the total balances held in these types of accounts at the end of fiscal year 2018. The total balance in federal trust funds and other dedicated funds grew about 13 percent in nominal terms from fiscal year 2014 to fiscal year 2018. The five accounts that contributed the most to this overall growth are listed in table 3. Fund balances are affected by complex interactions of various economic, demographic, and programmatic factors, but these changes are reflective of some overarching trends. For example, the balances of civilian and military pension and benefit programs increased, in part reflecting agency and employee contributions to fund the ongoing accrual of benefits by civilian and military personnel. Treasury has also contributed to these accounts to help fund some of the benefits accrued in the past. Some of the other increases were a result of economic changes experienced during this time period such as declines in the unemployment rate, among other things. For example, both Social Security’s Federal Old-Age and Survivors Insurance Trust Fund (OASI) and the Unemployment Trust Fund are funded primarily by payroll taxes, which tend to gather more revenue during periods when employment goes up and wage growth increases. While the net change in total trust fund and other dedicated fund balances was positive from fiscal year 2014 to 2018, not all trust fund and other dedicated fund balances grew over the time period. The five accounts that experienced the largest balance decreases are listed in table 4. From fiscal year 2014 to 2018, the average trust fund and other dedicated fund balance decrease was less than the average balance increase, and a greater number of accounts increased than decreased over the period. About 28 percent of the 398 accounts in our scope had individual balances that changed less than $5 million over the time period (see table 5). The higher total balance in trust funds and other dedicated funds indicates an overall surplus—income exceeding outgo—from fiscal year 2014 to 2018, which could suggest that the federal government intends to dedicate more resources to these specified purposes. Neither the increased total balance nor an individual fund’s balance increase is a signal that any individual fund is on sound financial footing. Similarly, a decreasing balance does not necessarily signal that any individual fund is not on sound financial footing. Assessing the future outlook for some of these funds and programs requires actuarial or other projections and can be subject to various degrees of inherent uncertainty. Of our 13 case study accounts, 11 received income from general revenues in addition to their dedicated collections, either through a permanent appropriation or in an annual appropriation. The form, size, and purpose of income from general revenues that our case study accounts received varied greatly based on the design of the program. These accounts fall in to three basic types: those that received regular income from general revenues as a part of their program design, those that received intermittent general revenue income, and those that received income solely from their own dedicated collections. See appendix II for more detailed information about the income, outgo, investments, and current issues for each of these accounts. Eight of the case study accounts we examined regularly receive income from general revenues in addition to their dedicated collections. These general revenues are often for specific purposes that have been deemed public goods and are provided annually as a part of the program’s design. The Medicare Supplementary Medical Insurance trust fund sets medical insurance premium rates for Medicare Part B to cover 25 percent of expected costs for the year. The roughly 75 percent remaining expected program cost is funded through general revenue. The Medicare HI Trust Fund also regularly receives general revenues to reimburse the fund for the cost for certain uninsured beneficiaries, program management activities, and other miscellaneous activities. In fiscal year 2018, $1.6 billion in general revenue was transferred into the trust fund. Both the Civil Service Retirement and Disability Fund (CSRDF) program and the Federal Employees Health Benefits Fund receive contributions from both current employees and their employing agencies as their primary sources of income, but these accounts also receive some general revenue in addition to these dedicated collections. Treasury is required by law to transfer an amount annually to the CSRDF from the General Fund to subsidize in part the under- funding of the Civil Service Retirement System. The Civil Service Retirement System is closed to new participants but covers most federal employees who first entered a covered position prior to 1984. According to OPM officials, the Federal Employees Health Benefits program is funded about 30 percent by contributions from participants and about 70 percent by contributions from their employing agencies. OPM contributes the employer share of the premiums for most annuitants via an appropriation from general revenues. The U.S. Postal Service (USPS) receives annual appropriations from general revenues to fund mail for the blind and overseas absentee voting. These appropriations account for less than 0.1 percent of the total cash outlays of the Postal Service Fund. USPS received $58 million in appropriations for these activities in fiscal year 2018, when total outlays were $69 billion. The Social Security Trust Funds, both OASI and DI, receive reimbursements from general revenue for several distinct purposes, such as employee union expenses and the payroll tax holiday, among other things. The total appropriations for these two activities were about $23 million in fiscal year 2018. While the Airport and Airway Trust Fund primarily receives dedicated collections, it has received some appropriations from general revenue in recent years, and some of the programs it funds also receive regular appropriations from general revenue. The most prominent example is the operations and management account within the Federal Aviation Administration. While this account is funded mostly by transfers from the Airport and Airway Trust Fund, it also typically receives an annual appropriation from general revenues. In fiscal year 2018, the appropriation to the operations account was $1.36 billion, which was about 13 percent of the total budget authority in the account. Three of the case study accounts we examined were supported in part by general revenue income on an intermittent basis in recent years. These general revenues helped temporarily restore solvency to programs that were not designed to be fiscally sustainable. The Highway Trust Fund has received appropriations from general revenues as a part of its reauthorization process in recent years. The most recent reauthorization, provided $70 billion in general revenue to the Highway Trust Fund from fiscal year 2016 through fiscal year 2020. The appropriations have allowed outlays to exceed dedicated collections in most years without exhausting assets in the fund. The National Flood Insurance Fund had $16 billion of its debt canceled by the Additional Supplemental Appropriations for Disaster Relief Requirements Act, 2017. This cancellation converted a $16 billion liability of the fund to a cost borne by general revenues. However, the National Flood Insurance Program (NFIP) still owes $20.5 billion to Treasury. As we recently reported, NFIP likely will not generate sufficient revenues to cover its expenses and repay its outstanding debt because its premium rates do not reflect the full risk of loss. The Flood Insurance Reserve Fund did not directly benefit from the debt cancellation, but it did receive an indirect benefit since it was established as a reserve fund to help meet expected future obligations and repay debt. Two of our case study accounts did not receive income from general revenue in recent years. For both of these accounts, the agencies have some authority to adjust their dedicated collections to cover their projected costs. The flexibility to adjust income levels based on projections can help contribute to the sustainability of the funds. Although the Tennessee Valley Authority (TVA) was originally funded primarily by appropriations from Congress when it was established in 1933, TVA fulfilled its requirement to repay this investment in 2014 and currently collects enough revenue to cover its operating expenses. The TVA Board has the authority to determine rates for its electric power and the Tennessee Valley Authority Act of 1933 mandates that TVA keep rates as low as feasible while still collecting sufficient revenue. The Universal Service Fund (USF) does not receive income from general revenue. The Federal Communications Commission (FCC) has some flexibility to set the contribution factor, which determines the payments telecommunications carriers are required to make into the fund. FCC officials told us that they must set the rates at levels so that they collect enough in dedicated collections to cover the projected demand for the programs they have adopted. FCC sets the contribution factor quarterly to cover the projected cost of the USF programs for the upcoming quarter, up to the authorized level of spending for each program. Even funds that rely primarily on their dedicated collections may not be fiscally sustainable. For example, the Social Security OASI and DI, and Medicare HI trust funds do not receive income from general revenues to support benefit payments. However, projections show that their dedicated collections are expected to be insufficient to fully cover scheduled outlays in the next 7 to 33 years. Conversely, some accounts supported by the Airport and Airway Trust Fund received appropriations from general revenue in recent years. However, the Airport and Airway Trust Fund has received more in dedicated collections than are made available to outlay through appropriations. As such, the fund carries a balance that is unavailable without further appropriations action. At the end of fiscal year 2018, the total cash balance in the Airport and Airway Trust Fund was about $17 billion. CBO projects this balance to grow more than threefold over the next 10 years. Although overall federal trust and other dedicated fund balances grew over the past 5 fiscal years, this trend is not projected to continue. In CBO’s most recent trust fund projections, overall federal trust fund and special fund balances are projected to start declining in fiscal year 2022. CBO does not estimate projected balances for public enterprise funds. As shown in figure 4, the projected decline is largely explained by declines in the Social Security and Medicare fund balances. We have previously reported that demographic factors, such as an aging population and slower labor force growth, are contributing to a gap between Social Security program costs and revenues. According to the most recent Social Security Trustees Report, Social Security’s costs, on a combined OASI and DI basis, have exceeded its non-interest income since 2010 and are projected to exceed total income, including interest, starting in 2020. The Medicare and Social Security Trustees and CBO projections show that several major trust funds will deplete their assets in the next 3 to 33 years (see figure 5). If no action is taken, these trust funds are projected to be unable to fully support paying their projected obligations. Projected trust fund balances can provide a vital signaling function for policymakers about underlying fiscal imbalances in covered programs. However, program sustainability is ultimately determined by whether the government as a whole has the economic capacity to finance the claims on the trust funds at the cost of other competing priorities. The economic flexibility of the federal government may be limited as debt held by the public grows as a percentage of gross domestic product (GDP). Debt held by the public was $15.8 trillion—or 78 percent of GDP—at the end of fiscal year 2018. It is projected to surpass its historical high of 106 percent of GDP within 13 to 20 years, and climb to between about 250 to 500 percent by 2092. Further, neither the long-term projections of federal debt nor CBO’s trust fund balance projections include certain fiscal risks that could affect the federal government’s financial condition in the future. Fiscal risks, or fiscal exposures, are responsibilities, programs, and activities that may legally commit or create expectations for future federal spending. Many of the largest trust funds and other dedicated funds face fiscal risks that are highlighted in our High-Risk List due to the financial uncertainty they face. For example, USPS—USPS financial viability continues to be high-risk because USPS cannot fund its current level of services and financial obligations from its revenues. Pension Benefit Guaranty Corporation (PBGC)—PBGC’s liabilities exceeded its assets by about $51 billion as of the end of fiscal year 2018. PBGC’s financial future remains uncertain, due in part to a long- term decline in the number of traditional defined benefit plans and the collective financial risk of the many underfunded pension plans PBGC insures. NFIP—Emphasizing affordability has led to premium rates that in many cases do not reflect the full risk of loss and produce insufficient premiums to pay for claims. Highway Trust Fund (HTF)—The nation’s surface transportation system is under growing strain and the cost to repair and upgrade the system to meet current and future demand is estimated in the hundreds of billions of dollars. A sustainable solution would balance revenues to and spending from the HTF. Ultimately, major changes in transportation spending or in revenues, or in both, will be needed to bring the two into balance. The Medicare Program—Medicare continues to challenge the federal government because of its outsized impact on the federal budget and the health care sector as a whole, the large number of beneficiaries it serves, and the complexity of its administration. Federal spending for Medicare programs is expected to significantly increase in the coming years. As overall trust and special fund balances are projected to decrease, our projections and those from the Fiscal Year 2018 Financial Report of the United States Government, and CBO show that the federal government will have to borrow more from the public to offset the decrease in intragovernmental debt. We have reported that existing federal debt held by the public is already large by historical norms, and CBO has noted that large and growing amounts of federal debt held by the public would have negative long-term consequences for the economy and constrain future budget policy. To change the long-term fiscal path, policymakers will likely need to consider policy changes to the entire range of federal activities, both revenue and spending. During fiscal year 2018, almost 98 percent of outgo (i.e., outlays and transfers to another government account) from trust funds and other dedicated funds was mandatory budget authority. This is greater than the proportion of total federal spending that is mandatory. According to OMB, during fiscal year 2018, mandatory spending made up 69.3 percent of all federal outlays while discretionary spending accounted for the remaining 30.7 percent. Seventy-six percent of trust funds and other dedicated funds had some mandatory budget authority (see table 6). Some funds have a mix of mandatory and discretionary budget authority. In general, the collections and balances of accounts with mandatory spending authority are available for obligation. Mandatory authority provides some flexibility for agencies because they do not have to await congressional action to incur obligations and make payments. For example, the Social Security Trust Funds have mandatory budget authority, which authorizes the program to continue to make payments to beneficiaries during lapses in appropriations. Although programs with mandatory authority need not go through the annual appropriations process, they are still subject to congressional oversight. In some cases Congress has set obligation limits in annual appropriations acts. For example, although the Crime Victims Fund has mandatory budget authority to obligate funds from its available balances, limits in annual appropriations acts have often capped the amount that may be obligated in each fiscal year. As a result, annual income has exceeded outgo and the balance of the fund had grown to $16.6 billion at the end of fiscal year 2018. Designation as mandatory or discretionary budget authority determines how budget control mechanisms are applied to the funds. Sequestration applies annually to mandatory spending, but certain budget authority is exempt or subject to special rules. Of the 13 case studies we reviewed, nine are exempt from cancellation under budget enforcement sequestration procedures and four—Medicare Supplementary Medical Insurance, Medicare Hospital Insurance, the HTF, and the Airport and Airway Trust Fund—are partially sequestrable (i.e., certain budgetary resources specified by law within the accounts are not subject to cancellation under budget enforcement sequestration procedures). For example, Social Security, Medicaid, and veterans’ compensation are completely exempt, and Medicare reductions are limited to 2 percent. Exemptions and special rules lead sequestration to affect some areas of the federal government more than others. For example, programs without exempt status, such as the Commodity Credit Corporation Fund, bear a greater reduction than they would if cuts were applied evenly to all programs. Outgo from those trust funds and other dedicated funds that do not have mandatory budget authority are controlled in the annual appropriations process and count toward the annual discretionary spending limits laid out in the Budget Control Act of 2011 (BCA). For example, outlays from the Airport and Airway Trust Fund are discretionary. This means that the outlays for capital improvements and operations of the nation’s airport and airway system, except for airport grants, count toward government- wide discretionary spending limits. Some trust funds and other dedicated funds have a combination of budget authorities, which can affect balances. For example, the Harbor Maintenance Trust Fund (HMTF), which is supported through collections of the harbor maintenance fee, has mandatory income and discretionary outlays. Historically, HMTF income has exceeded outgo and by the end of fiscal year 2018, the balance in the fund had grown to $9.3 billion. Any proposed legislation to lower the fee revenues would require an offset so as not to increase the deficit. Conversely, since the spending is subject to the discretionary caps, any increase in spending to align with program revenues would count toward the discretionary spending limits. Most spending from trust funds and other dedicated funds is mandatory and not controlled by the annual appropriations process. We have previously reported that the increase in mandatory spending has long- term implications for the nation’s fiscal outlook overall, including the growing federal debt. The federal government has previously enacted fiscal rules in the form of laws that constrain fiscal policy decisions, including BCA and PAYGO. These fiscal rules apply the same way regardless of status as a trust fund or other dedicated fund. However, in practice, fiscal rules that apply to mandatory budget authority are more relevant to these types of accounts, because mandatory budget authority is more concentrated in trust funds and other dedicated funds than it is in the federal budget as a whole. Of the 23 largest trust funds and other dedicated funds we reviewed, 13 have entitlement authority, which legally requires payments to individuals or governments that meet the requirements of the programs (see table 7). For example, OASI beneficiaries are legally entitled to benefits based on a formula that takes into account the time they spent working and their earnings, among other factors. Some trust funds have mandatory budget authority, but not entitlement authority. For example, the USF, the National Flood Insurance Reserve Fund, and the Tennessee Valley Authority Fund all have mandatory budget authority, but have no entitlement authority. These programs have the most flexibility because their income is available without further appropriations action and their outgo is not driven by legal requirements to individuals or governments. For example, Federal Communication Commission officials told us that they manage the size of each program funded by the USF, to stay within an approved budget. Although entitlements represent a current legal commitment and trust funds and other dedicated funds demonstrate the government’s intent to restrict the use of those funds to a specific purpose, the government can change the terms of entitlement programs, including those financed through trust funds or other dedicated funds, by changing the substantive law. Congress and the President can raise or lower future trust fund collections or payments or change the purposes for which the collections can be used. For example, in 1983 a number of changes were made to the Social Security program, including an increase in the full retirement age and a new tax on a portion of Social Security benefits, which increased collections and lowered future outgo. We provided a draft of this report and the online dataset to the Director of OMB and the Secretary of the Treasury for review and comment. We also provided a draft of this report and the online dataset to our case study agencies: the Centers for Medicare & Medicaid Services, the Federal Communications Commission, the Federal Emergency Management Agency, the Department of Transportation (for the Federal Aviation Administration and the Federal Highway Administration), the Office of Personnel Management, the Social Security Administration, the Tennessee Valley Authority, and the U.S. Postal Service for review and comment. The Social Security Administration and the U.S. Postal Service provided written responses thanking us for providing the opportunity to review the report, which are published in appendixes III and IV. The Centers for Medicare & Medicaid Services, the Federal Communications Commission, the Department of Transportation, the Office of Personnel Management, the Tennessee Valley Authority, and the U.S. Postal Service provided technical comments, which we incorporated as appropriate. OMB, Treasury, and the Federal Emergency Management Agency reviewed our draft report and had no comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 7 days from the report date. At that time, we will send copies to interested congressional committees, the Director of the Office of Management and Budget, the secretaries and agency heads of the departments and agencies in our review, and other interested parties. In addition, the report is available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Tranchau (Kris) T. Nguyen at (202) 512-6806 or nguyentt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report examines: (1) how the size and scope of federal trust funds and other dedicated funds in the federal budget have changed over time, (2) the extent to which federal trust funds and other dedicated funds are supported by their dedicated collections, and (3) the extent to which federal trust funds and other dedicated funds support mandatory programs, including major entitlement programs. To examine trends in the size and scope of federal trust funds and other dedicated funds, we used Office of Management and Budget (OMB) budget data to identify the income, outgo (i.e., outlays and transfers to another government account), and end of year balances for all revolving trust funds, special funds, non-revolving trust funds, and public enterprise funds reported in OMB’s budget database, OMB MAX, for fiscal years 2014 to 2018 in nominal terms. We excluded financing and credit accounts because they are non-budgetary. For the majority of these data we used the amounts reported in OMB MAX schedule J, which is used to produce the Status of Funds tables in the President’s Budget Appendix. While the list of accounts that report Status of Funds tables publicly in the budget is limited to 21 accounts, a schedule J is created in OMB MAX for all non-revolving trust funds and special funds and, for the years in our review, for all revolving trust funds. Schedule J data are not available for public enterprise funds, so we used guidance from OMB Circular No. A- 11 to approximate similar income, outgo, and balance data using data fields that are reported in the Program and Financing table. The public enterprise fund data are slightly different than the other fund types because borrowing authority as it is reported in OMB MAX only includes information on repayable advances and excludes information on outstanding debt and borrowing. We asked OMB staff to review our methodology to calculate these numbers and they agreed our approach was methodologically sound. To assess the reliability of OMB MAX data related to the income, outgo, and balances of trust fund and other dedicated fund accounts, we reviewed related documentation, interviewed knowledgeable OMB staff, and conducted electronic data testing. We found these data reliable for our purposes. OMB budget data are rounded to the nearest million and do not show funds with amounts less than $500,000. Accordingly, OMB instructs agencies to consolidate small trust fund accounts with larger general fund accounts so the total government-wide amounts will be complete. In addition, OMB sometimes reports trust fund groups under a single account rather than each individual trust fund account. Groups may include two or more trust funds with similar purposes. The Department of the Treasury (Treasury), on the other hand, tracks monies for each discrete account to the penny in order to fulfill its government wide accounting and cash management responsibilities. As such, we used data from the Treasury Fiscal Year 2018 Combined Statement of Receipts, Outlays, and Balances of the United States Government to provide a complete count of these funds, including accounts with small balances and accounts that are a part of groups. We interviewed Treasury officials, reviewed relevant documentation, and conducted electronic and manual testing to ensure the data were reliable for our purposes and concluded that they were. To examine the extent to which federal trust funds and other dedicated funds are supported by their dedicated collections, in addition to the data described above, we examined thirteen case study accounts in nine agencies. We selected a set of accounts to include the largest of each of the four types of trust funds and other dedicated funds and a variety of program designs (see table 8). We used gross outlays from fiscal year 2017 to identify the largest accounts, since that was the most recently available data at the time of the account selection. Overall, our selected accounts covered 88 percent of the total gross outlays among these types of accounts in fiscal year 2017. We also ensured that our set of case study accounts included: at least one account from each of the four fund types in our scope, a range of programs from different goals (e.g., infrastructure, insurance, federal employee benefits), and budget authority with different characteristics. The budget authority included in our case study selection represented examples of both mandatory and discretionary budget authority. We also ensured that budget authority from appropriations, borrowing authority, contract authority, and offsetting collections were represented in at least one case study. While the case studies were selected to capture the largest funds and a diversity of programs and funding characteristics, findings from the case studies cannot be generalized to all trust funds and other dedicated funds. We also reviewed agency financial, budget, and performance reports, Congressional Budget Office trust fund projections, the 2019 Annual Report of the Board of Trustees of the Federal Old-Age and Survivors Insurance and Federal Disability Insurance Trust Funds (Social Security Trustees), the 2019 Annual Report of the Board of Trustees of the Federal Hospital Insurance and Federal Supplementary Medical Insurance Trust Funds (Medicare Trustees), and our prior reports, and interviewed officials from each of the case study agencies. To examine the extent to which federal trust funds and other dedicated funds support mandatory programs, including major entitlement programs, we used OMB budget data to calculate the prevalence of discretionary budget authority, which is controlled through appropriations acts, and mandatory budget authority, which generally refers to budget authority provided through laws other than appropriations acts, in federal trust funds and other dedicated funds. OMB budget data do not systematically identify entitlement authority. To determine which of the largest trust funds and other dedicated funds have entitlement authority, we analyzed the authorizing statutes for our case study accounts and 10 additional accounts with the next largest gross outlays. While the entitlement analysis was designed to cover nearly all of the total outlays from these types of accounts, the findings from this analysis are not representative of all trust funds and other dedicated funds and cannot be generalized to the other 375 accounts in our scope. We also reviewed budget enforcement mechanisms, such as sequestration, that apply to these types of budget authority through review of relevant laws, our prior work, and OMB documents. We conducted this performance audit from October 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To illustrate the variety of federal trust funds and other dedicated funds, and examine the extent to which they are supported by their dedicated collections, we examined 13 case study accounts in nine agencies. We selected accounts listed in table 9 to include the largest of each of the four types of trust funds and other dedicated funds and a variety of program designs. Each case study profile in this appendix includes income, outgo, investments, and current issues related to the account, as well as the following account information: Fund types. OMB and Treasury designate budget accounts as “trust funds” and other fund types that link dedicated collections with their expenditure based on legislation. The fund types in this appendix include: Non-revolving trust fund. An account designated as a “trust fund” by law that is credited with dedicated collections, which can often, but not always, be used without further appropriation action. Special fund. Analogous to a non-revolving trust fund but not classified as a trust fund in name. Revolving trust fund. An account designated as a “trust fund” by law that is credited with collections that are generally available for obligation without further appropriation action, to carry out a cycle of businesslike operations in accordance with statute. Public enterprise fund. Analogous to a revolving trust fund but not classified as a trust fund in name. A public enterprise fund is a type of revolving fund that carries out a cycle of businesslike operations, mainly with the public, in which it charges for the sale of products or services and uses the proceeds to finance its spending, usually without requirement for annual appropriations. Entitlement authority. Whether or not outgo from the fund is controlled by an entitlement authority, which is the authority to make payments to any person or government if the U.S. government is legally required to make the payments to persons or governments that meet the requirements established by law. The Budget Enforcement Act category. OMB’s designation as to whether the funds in the account are classified as discretionary or mandatory depending on the nature of the substantive legislation creating the fund. Discretionary. Budget authority provided in and controlled through appropriations acts. Mandatory. Budget authority provided through laws other than appropriations acts, and the outlays that result from such budget authority. Sequestration status. OMB’s designation of the authority for purposes of sequestration, which is the cancellation of budgetary resources under a presidential order. We defined the status categories as follows: Exempt. Accounts for which budgetary resources are exempt from cancellation under budget enforcement sequestration procedures. Sequestrable. Accounts for which budgetary resources are subject to cancellation under budget enforcement sequestration procedures. Partially Sequestrable. Accounts for which certain budgetary resources specified by law within the account are not subject to cancellation under budget enforcement sequestration procedures. In addition to the contact named above, Susan E. Murphy (Assistant Director), Katherine D. Morris (Analyst in Charge), Alicia Cackley, Janice Ceperich, Jacqueline Chapin, Steven Cohen, Michael Collins, James Cosgrove, Robert Dacey, Karin Fangman, Paul Foderaro, Carol Henn, James A. Howard, Susan J. Irving, Charles Jeszeck, Kenneth John, Heather Krause, Natalie Logan, Scott McNulty, John Mingus, Sally Moino, Tracie Sanchez, Lori Rectanus, Frank Rusco, Dawn Simpson, Frank Todisco, Peter Verchinski, and Alicia White made key contributions to this report.", "summary": "Some of the largest federal programs, including Medicare, Social Security, and postal services, are funded through trust funds and other dedicated funds, which link collections that have been dedicated to a specific purpose with the expenditures of those collections. While these funds have the ability to retain accumulated balances, these collections do not necessarily fund the full current or future cost of the government's commitments to the designated beneficiaries. GAO was asked to review issues related to federal trust funds and other dedicated funds. This report examines (1) how the size and scope of federal trust funds and other dedicated funds in the federal budget have changed over time, (2) the extent to which these funds are supported by their dedicated collections, and (3) the extent to which these funds support mandatory programs, including major entitlement programs. GAO analyzed OMB data on trust funds and other dedicated funds for fiscal year 2014 through 2018 and the Department of the Treasury's (Treasury) Fiscal Year 2018 Combined Statement of Receipts, Outlays, and Balances . GAO also examined 13 case study accounts in nine agencies, selected to include the largest of each type of these funds and a variety of program designs. GAO reviewed agency reports, CBO trust fund estimates for 2018 and projections for 2019 to 2029, and prior GAO reports, and interviewed OMB staff and officials from Treasury and each of the case study agencies. GAO also is providing an online dataset of these funds at https://www.gao.gov/products/GAO-20-156 . Every major federal department has at least two trust funds or other dedicated funds. According to GAO analysis of Office of Management and Budget (OMB) data, balances in these funds, which can be used to support covered programs, grew 13 percent in nominal terms from fiscal year 2014 through 2018. Fund balances are affected by complex interactions of factors, but the total increase was driven largely by military and civilian retirement fund balances. The Congressional Budget Office (CBO) projects the total balance to start declining in fiscal year 2022 as decreases in Medicare and Social Security will exceed increases in military and civilian retirement balances. To offset the overall decrease, the federal government is projected to borrow more from the public. GAO found that 11 of 13 case studies recently received general revenue—collections that are not dedicated by law for a specific purpose. For example, medical insurance premiums for Medicare Part B are set to cover 25 percent of expected costs; the remaining 75 percent are covered by general revenues. Even funds that rely primarily on their dedicated collections may not be fiscally sustainable. For example, the Social Security Old-Age and Survivors Insurance Trust Fund only uses dedicated collections for benefit payments, but its balances are projected to be depleted by 2034. Nearly 98 percent of outlays and transfers from trust funds and other dedicated funds was through mandatory authority, which allows agencies to make payments without further congressional action. Most of the 23 largest funds also have entitlement authority, which generally requires payments to eligible parties based on legal requirements. Status as a trust fund, mandatory program, or entitlement does not prevent Congress and the President from changing related laws to alter future collections or payments.", "document_type": "gao"}
{"report": "In our December 2018 report, we found that TSA provides pipeline operators with voluntary security guidelines that operators can implement to enhance the security of their pipeline facilities. TSA also evaluates the vulnerability of pipeline systems through security assessments. Pipeline operators and industry association representatives who we interviewed also reported exchanging risk-related security information and coordinating with federal and nonfederal entities, including TSA. However, we also identified weaknesses in several areas of TSA’s pipeline security program management, including: (1) updating and clarifying pipeline security guidelines; (2) planning for workforce needs; (3) assessing pipeline risks; and (4) monitoring program performance. We found in our December 2018 report that all of the pipeline operators and industry association representatives that we interviewed reported receiving security information from federal and nonfederal entities. For example, DHS components including TSA’s Intelligence and Analysis and NCCIC share security-related information on physical and cyber threats and incidents. Nonfederal entities included Information Sharing and Analysis Centers, fusion centers, industry associations, and subsector coordinating councils. Pipeline operators also reported that they share security-related information with TSA and the NCCIC. For example, TSA’s Pipeline Security Guidelines requests that pipeline operators report physical security incidents to the Transportation Security Operations Center (TSOC) and any actual or suspected cyberattacks to the NCCIC. According to TSA officials, TSOC staff analyzes incident information for national trends and common threats, and then shares their observations with pipeline operators during monthly and quarterly conference calls. In our December 2018 report, we found that the pipeline operators we interviewed reported using a range of guidelines and standards to address their physical and cybersecurity risks. For example, all 10 of the pipeline operators we interviewed stated they had implemented the voluntary 2011 TSA Pipeline Security Guidelines that the operators determined to be applicable to their operations. Five of the 10 pipeline operators characterized the guidelines as generally or somewhat effective in helping to secure their operations, 1 was neutral on their effectiveness, and 4 did not provide an assessment of the guidelines’ effectiveness. Pipeline operators and industry association representatives reported that their members also use the Interstate Natural Gas Association of America’s Control Systems Cyber Security Guidelines for the Natural Gas Pipeline Industry, the American Petroleum Institute’s Pipeline SCADA Security standard, and the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as sources of cybersecurity standards, guidelines, and practices that may be scaled and applied to address a pipeline operator’s cybersecurity risks. We found that TSA’s Pipeline Security Branch had issued revised Pipeline Security Guidelines in March 2018, but TSA had not established a documented process to ensure that revisions occur and fully capture updates to supporting standards and guidance. The guidelines were revised to, among other things, reflect the dynamic threat environment and to incorporate cybersecurity principles and practices from the NIST Cybersecurity Framework, which was initially issued in February 2014. However, because NIST released version 1.1 of the Cybersecurity Framework in April 2018, the guidelines that TSA released in March 2018 did not incorporate cybersecurity elements that NIST added to the latest Cybersecurity Framework, such as the Supply Chain Risk Management category. Without a documented process defining how frequently TSA is to review and, if deemed necessary, revise its guidelines, TSA cannot ensure that the guidelines reflect the latest known standards and best practices of physical security and cybersecurity. We recommended that TSA implement a documented process for reviewing, and if deemed necessary, revising TSA’s Pipeline Security Guidelines at regular defined intervals. DHS agreed and estimated that this effort would be completed by April 30, 2019. In April 2019, TSA provided us with documentation outlining procedures for reviewing these guidelines. We are currently assessing this information to determine if it sufficiently addresses this recommendation. We also found that TSA’s Pipeline Security Guidelines lacked clarity in the definition of key terms used to determine critical facilities. TSA initially identifies the 100 highest risk pipeline systems based on the amount of material transported through the system. Subsequently, pipeline operators are to use criteria in the Guidelines to self-identify the critical facilities within those higher risk systems and report them to TSA. TSA’s Pipeline Security Branch then conducts CFSRs at the critical facilities identified by pipeline operators. However, our analysis of TSA’s data found that at least 34 of the top 100 critical pipeline systems TSA deemed highest risk indicated that they had no critical facilities. Three of the 10 operators we interviewed stated that some companies that reported to TSA that they had no critical facilities may possibly be taking advantage of the guidelines’ lack of clarity. For example, one of TSA’s criteria for determining pipeline facility criticality states that if a facility or combination of facilities were damaged or destroyed, it would have the potential to “cause mass casualties or significant health effects.” Two operators told us that individual operators may interpret TSA’s criterion, “cause mass casualties or significant health effect,” differently. For example, one of the operators that we interviewed stated that this criterion could be interpreted either as a specific number of people affected or a sufficient volume to overwhelm a local health department, which could vary depending on the locality. Without clearly defined criteria for determining pipeline facilities’ criticality, TSA cannot ensure that pipeline operators are applying guidance uniformly, that all of the critical facilities across the pipeline sector have been identified, or that their vulnerabilities have been identified and addressed. We recommended that TSA’s Security Policy and Industry Engagement’s Surface Division clarify TSA’s Pipeline Security Guidelines by defining key terms within its criteria for determining critical facilities. DHS agreed and estimated that this effort would be completed by June 30, 2019. TSA conducts pipeline security reviews—CSRs and CFSRs—to assess pipeline vulnerabilities and industry implementation of TSA’s Pipeline Security Guidelines. However, the number of reviews conducted has varied widely from fiscal years 2014 through 2018. These reviews are intended to develop TSA’s knowledge of security planning and execution at critical pipeline systems and lead to recommendations for pipeline operators to help them enhance pipeline security. For an overview of the CSR and CFSR processes, see Figure 1 below. We found that the number of CSRs and CFSRs completed by TSA has varied during the last five fiscal years, ranging from zero CSRs conducted in fiscal year 2014 to 23 CSRs conducted in fiscal year 2018, as of July 31, 2018 (see Figure 2 below). TSA officials reported that staffing limitations had prevented TSA from conducting more reviews. TSA Pipeline Security Branch staffing levels (excluding contractor support) also varied significantly over the past 9 years ranging from 14 full-time equivalents in fiscal years 2012 and 2013 to one in fiscal year 2014 (see Table 1 below). TSA officials stated that, while contractor support has assisted with conducting CFSRs, there were no contractor personnel providing CSR support from fiscal years 2010 through 2017, but that contractors increased to two personnel in fiscal year 2018. TSA officials stated that they expected to complete 20 CSRs and 60 CFSRs per fiscal year with Pipeline Security Branch employees and contract support, and had completed 23 CSRs through July 2018 for fiscal year 2018. In addition, pipeline operators that we interviewed emphasized the importance of cybersecurity skills among TSA staff. Specifically, 6 of the 10 pipeline operators and 3 of the 5 industry representatives we interviewed reported that the level of cybersecurity expertise among TSA staff and contractors may challenge the Pipeline Security Branch’s ability to fully assess the cybersecurity portions of its security reviews. We found that TSA had not established a workforce plan for its Security Policy and Industry Engagement or its Pipeline Security Branch that identified staffing needs and skill sets such as the required level of cybersecurity expertise among TSA staff and contractors. We therefore recommended that TSA develop a strategic workforce plan for its Security Policy and Industry Engagement Surface Division, which could include determining the number of personnel necessary to meet the goals set for its Pipeline Security Branch, as well as the knowledge, skills, and abilities, including cybersecurity, that are needed to effectively conduct CSRs and CFSRs. DHS agreed and estimated that this effort would be completed by July 31, 2019. The Pipeline Security Branch has developed a risk assessment model that combines all three elements of risk—threat, vulnerability, and consequence—to generate a risk score for pipeline systems. The Pipeline Security Branch developed the Pipeline Relative Risk Ranking Tool in 2007 for use in assessing various security risks to the top 100 critical pipeline systems based on volume of material transported through the system (throughput). The risk ranking tool calculates threat, vulnerability, and consequence for each pipeline system on variables such as the amount of throughput in the pipeline system and the number of critical facilities using data collected from pipeline operators, as well as other federal agencies such as the Departments of Transportation and Defense. The ranking tool then generates a risk score for each of the 100 most critical pipeline systems and ranks them according to risk, which was information used by TSA to prioritize pipeline security assessments. However, in our December 2018 report we found that the last time the Pipeline Security Branch calculated relative risk among the top 100 critical pipeline systems using the ranking tool was in 2014. Since the risk assessment had not changed since 2014, information on threat may be outdated and may limit the usefulness of the ranking tool in allowing the Pipeline Security Branch to effectively prioritize reviews of pipeline systems. We recommended that the Security Policy and Industry Engagement’s Surface Division update the Pipeline Relative Risk Ranking Tool to include up-to-date data to ensure it reflects industry conditions, including throughput and threat data. DHS agreed and in March 2019 TSA officials reported taking steps to update the data in the Pipeline Risk Ranking Tool to reflect current pipeline industry data. We are currently reviewing those actions to determine if they sufficiently address our recommendation. We also found that some of the sources of data and vulnerability assessment inputs to the ranking tool were not fully documented. For example, threats to cybersecurity were not specifically accounted for in the description of the risk assessment methodology, making it unclear if cybersecurity threats were part of the assessment’s threat factor. We recommended that the Security Policy and Industry Engagement’s Surface Division fully document the data sources, underlying assumptions, and judgments that form the basis of the Pipeline Relative Risk Ranking Tool, including sources of uncertainty and any implications for interpreting the results from the assessment. In March 2019, TSA officials stated that they had taken steps to document this information. We are currently reviewing those steps to determine if they sufficiently address our recommendation. In our December 2018 report, we also found that TSA developed three databases to track CSR and CFSR recommendations and their implementation status by pipeline facility, system, operator, and product type. TSA officials stated that the primary means for assessing the effectiveness of the agency’s efforts to reduce pipeline security risks was through conducting pipeline security reviews—CSRs and CFSRs. However, while TSA does track CFSR recommendations, we found that TSA had not tracked the status of CSR recommendations for security improvements in over 5 years—information necessary for TSA to effectively monitor pipeline operators’ progress in improving their security posture. We recommended that TSA take steps to enter information on CSR recommendations and monitor and record their status. DHS agreed and estimated that this effort would be completed by November 30, 2019. Chairman Rush, Ranking Member Upton, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals making key contributions to this work include Ben Atwater, Assistant Director; Steve Komadina, Analyst-in-Charge; Nick Marinos, Michael Gilmore, Tom Lombardi, Chuck Bausell and Susan Hsu. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "More than 2.7 million miles of pipeline transport and distribute natural gas, oil, and other hazardous products throughout the United States. Interstate pipelines run through remote areas and highly populated urban areas, and are vulnerable to accidents, operating errors, and malicious physical and cyber-based attack or intrusion. Pipeline system disruptions could result in commodity price increases or widespread energy shortages. Several federal and private entities have roles in pipeline security. TSA is primarily responsible for the federal oversight of pipeline physical security and cybersecurity. This statement summarizes previous GAO findings related to TSA's management of its pipeline security program. It is based on a prior GAO product issued in December 2018, along with updates as of April 2019 on actions TSA has taken to address GAO's recommendations from the report. To conduct the prior work, GAO analyzed TSA documents, such as its Pipeline Security Guidelines ; evaluated TSA pipeline risk assessment efforts; and interviewed TSA officials, 10 U.S. pipeline operators—a non-generalizable sample selected based on volume, geography, and material transported—and representatives from five pipeline industry associations. GAO also reviewed information on TSA's actions to implement its prior recommendations. The Department of Homeland Security's (DHS) Transportation Security Administration (TSA) has developed and provided pipeline operators with voluntary security guidelines, and also evaluates the vulnerability of pipeline systems through security assessments. However, GAO's prior work, reported in December 2018, identified some weaknesses and made recommendations to strengthen TSA's management of key aspects of its pipeline security program. Pipeline security guidelines . GAO reported that TSA revised its voluntary pipeline security guidelines in March 2018 to reflect changes in the threat environment and incorporate most of the principles and practices from the National Institute of Standards and Technology's (NIST) Framework for Improving Critical Infrastructure Cybersecurity. However, TSA's revisions do not include all elements of the current NIST framework and TSA does not have a documented process for reviewing and revising its guidelines on a regular basis. GAO recommended that TSA implement a documented process for reviewing and revising TSA's Pipeline Security Guidelines at defined intervals. TSA has since outlined procedures for reviewing its guidelines, which GAO is reviewing to determine if they sufficiently address the recommendation. Workforce planning . GAO reported that the number of TSA security reviews of pipeline systems has varied considerably over time. TSA officials stated that staffing limitations within its Pipeline Security Branch have prevented TSA from conducting more reviews. Staffing levels for the branch have varied significantly, ranging from 1 full-time equivalent in 2014 to 6 from fiscal years 2015 through 2018. Further, TSA does not have a strategic workforce plan to help ensure it identifies the skills and competencies—such as the required level of cybersecurity expertise—necessary to carry out its pipeline security responsibilities. GAO recommended that TSA develop a strategic workforce plan, which TSA plans to complete by July 2019. Pipeline risk assessments . GAO identified factors that likely limit the usefulness of TSA's risk assessment methodology for prioritizing pipeline security reviews. For example, TSA has not updated its risk assessment methodology since 2014 to reflect current threats to the pipeline industry. Further, its sources of data and underlying assumptions and judgments regarding certain threat and vulnerability inputs are not fully documented. GAO recommended that TSA update its risk ranking tool to include up-to-date data to ensure it reflects industry conditions and fully document the data sources, assumptions and judgments that form the basis of the tool. As of April 2019, TSA reported taking steps to address these recommendations. GAO is reviewing documentation of these steps to determine if they sufficiently address the recommendations. Monitoring performance . GAO reported that conducting security reviews was the primary means for TSA to assess the effectiveness of its efforts to reduce pipeline security risks. However, TSA has not tracked the status of key security review recommendations for the past 5 years. GAO recommended that TSA take steps to update information on security review recommendations and monitor and record their status, which TSA plans to address by November 2019 GAO made 10 recommendations in its December 2018 report to strengthen TSA's management of its pipeline security program. DHS agreed and has described planned actions or timeframes for addressing these recommendations.", "document_type": "gao"}
{"report": "HUD’s WCF was established in 2016 to provide a mechanism for the department to centralize and fund federal shared services used across HUD offices and agencies. According to its Committee Charter, the three goals of the WCF are to: align incentives for efficient enterprise operations through users paying for goods and services; establish accurate and timely cost estimates for goods and services; improve planning, increase visibility and transparency, and support the efficient and effective delivery of goods and services. To begin WCF operations in fiscal year 2016, HUD transferred approximately $44 million in funding from the salaries and expenses accounts of OCFO and OCHCO to the newly established WCF. In fiscal year 2017, the WCF began to bill its customers—17 HUD offices that purchase services financed through the fund—directly for their estimated use of services. HUD’s WCF is different from other intragovernmental revolving funds that we have previously reviewed in that it does not fund internally provided services at this time. The WCF is currently used as a centralized funding method to pay for the costs of four established shared services agreements—or interagency agreements—between HUD and three external shared service providers: USDA’s National Finance Center (NFC) and Treasury’s Administrative Resource Center (ARC) and Shared Services Programs. See table 1 for more information about the agencies providing shared services to HUD. According to WCF Division officials, HUD plans to expand the WCF in the future to finance both internal and additional external goods and services. For example, the WCF’s fiscal years 2019 and 2020 budget justifications requested funding to centralize and support activities such as a Data Management Initiative and the Real Estate Assessment Center’s (REAC) physical and financial assessment services, respectively. However to date, HUD did not receive budgetary authority to proceed with including either activity in the WCF. Several offices within HUD share responsibility for the management and operations of the WCF, including the WCF Division and business line offices. See figure 1 for information on the WCF’s financial operations and entities involved. HUD defines most of the roles and responsibilities for management and oversight of the WCF. According to HUD policy and guidance documents: The WCF Committee provides financial and operational oversight of the WCF, including advising and supporting the WCF’s strategic direction and providing annual approval of the WCF financial plan and budget, among other responsibilities. The Committee includes representation from OCFO leadership and all customer offices. The WCF Division within OCFO oversees the financial management of the fund, including managing day-to-day operations and establishing cost accounting for all shared services and customers that use the fund. In addition, the WCF Division supports customers with WCF-specific services, such as billing and service usage reports. OCFO and OCHCO manage the provision of the services financed through the WCF to customer offices. As the designated business line offices, OCFO and OCHCO oversee the quality and timely delivery of services, including monitoring service provider performance and serving as the liaisons between HUD customer offices and service providers concerning any issues with service quality. WCF Customers place orders with the WCF Division to receive services from the external service providers. In addition, customers reimburse the WCF for their estimated use of those services. However, HUD also performs additional actions to support the efficient and effective delivery of goods and services consistent with the goals of the WCF. Specifically, the WCF Division conducts business process analyses to identify opportunities for efficiencies across the department. Yet, there is no mention in guidance of the roles and responsibilities of the WCF Division, business line offices, or other stakeholders in identifying, monitoring, and implementing the actions recommended because of these analyses. In support of the WCF’s goal to support efficient and effective delivery of goods and services, the WCF Division provides quarterly usage reports to customers and business line offices and assists them with monitoring their consumption and associated costs of shared services. WCF Division officials told us they conduct a more detailed review of the data when they find anomalies, such as unusually high volumes of transactions. WCF Division officials told us that they will collaborate with the responsible business line office to conduct a business process analysis, which is used to identify actionable ways to address the cause of the high service volume and costs in specific circumstances. A business process analysis is generally conducted when there is an availability of resources, support from the business line office, and potential for cost savings or operational efficiencies. For example, in 2018, in response to an increase in the volume of two service areas overseen by OCFO—help desk calls and commercial purchase order accruals—the WCF Division examined data and determined that HUD could reduce its service volume and costs. See text box below. Working Capital Fund (WCF) Business Process Analysis Help desk calls: The WCF Division found that an unnecessarily high number of customer calls to help desks for password resets were contributing to higher costs to the department. For example, more than 20 percent of customer calls to Treasury ARC’s financial management help desk were from customers requesting password resets, which can be manually resolved without calling the help desk and incurring a transaction fee. In fiscal year 2019, the cost to HUD per financial management help desk call was about $128. According to the WCF Division Director, the WCF Division presented its findings to OCFO leadership and the WCF Committee, including five recommendations targeted at reducing system password reset call volume and future costs to the department. Commercial purchase order transactions: Commercial purchase order accruals are more costly because they are manually processed. Among other findings, the WCF Division’s analysis determined that changing OCFO’s current business process for obligations below a certain threshold could reduce the volume of transactions processed. The OCFO official told us that OCFO plans to implement one of the recommendations with a new process for recording those accruals in the first quarter of fiscal year 2020 to reduce the volume of transactions. According to the WCF Division’s analyses, the implementation of this recommendation could achieve potential annual costs savings of nearly $600,000. However, OCFO has not taken actions to address seven remaining recommendations, which the WCF Division found could produce additional benefits, including potential cost savings of more than $400,000 annually. The OCFO official told us that OCFO plans to examine HUD’s fiscal year 2019 service usage to determine the effectiveness of the actions it has already taken to reduce the help desk call and commercial purchase order transaction volume. The estimated help desk call volume and associated cost to HUD for a given year, as agreed upon in HUD’s agreement with Treasury ARC, is generally based on the average of the previous 2 years’ call volume. As such, changes in usage in 1 year will not necessarily result in lower service costs in the next year, but HUD may realize cost savings over time if usage is consistently lower. While they have a process for identifying opportunities for efficiencies through the business process analyses, WCF Division officials acknowledged that they have not defined and documented the WCF Division’s own roles and responsibilities with regard to the analyses. WCF Division officials told us they are focused on other priorities, such as new business line proposals. However, they told us that they are open to defining these roles in the future. There are additional reasons why the WCF Division has not defined and documented roles and responsibilities for these activities. For example, Division officials told us that the Division faces organizational challenges which may limit its own ability to monitor and implement actions. First, as previously discussed, the business line offices are responsible for managing and overseeing the service lines. According to WCF Division officials, the business line offices are primarily responsible for identifying opportunities to achieve efficiencies with service usage, such as through conducting business process analyses. As such, WCF Division officials told us that they can support those offices by monitoring their usage and helping to identify actions to reduce high service volume and costs, but it is ultimately the business line offices’ responsibility to implement any changes to their own processes to improve service usage. In addition, given its location within OCFO, Division officials stated that the WCF Division has more leverage with OCFO to work with those officials to identify business process improvements. WCF Division officials told us that they have not collaborated with OCHCO or made recommendations for actions OCHCO could take to promote efficient and effective usage of the service lines it oversees. While the Division hopes to work with OCHCO to perform the same types of analyses, the WCF Division Director told us that making recommendations to OCHCO would be viewed as outside of its area of authority. According to Division officials, it is the role of the WCF Committee to provide oversight over the business line offices and ensure that such actions are implemented. However, officials acknowledged that these roles and responsibilities related to the business process analyses should be more clearly delineated in the WCF Handbook. Key operating principles for effective management of WCFs state that agencies should clearly delineate roles and responsibilities by defining key areas of authority and responsibility. In addition, federal standards for internal control state that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the agency’s objectives. As part of this, management should develop an organizational structure with an understanding of the overall responsibilities and assign those responsibilities to discrete units to enable the organization to operate in an efficient and effective manner. Without clearly defining and documenting these roles and responsibilities, it is unclear who is responsible for identifying, monitoring, and implementing actions through the business process analyses to address inefficiencies with service usage across HUD. As a result, opportunities to more efficiently and effectively deliver goods and services may not be fully and consistently implemented across the department. HUD established eight total performance metrics which, according to WCF Division officials, are intended to align with one or more of the WCF’s three goals (see table 2). In fiscal year 2018, the WCF Division developed a draft performance scorecard to measure and track WCF performance in areas such as data and analysis, financial management, and stakeholder engagement. Division officials told us that they use 2019 data as their performance baseline for the scorecard and will continue to review and further develop the fund’s metrics and targets. Part of one of the WCF’s goals is to support the efficient delivery of goods and services. Some of the WCF’s metrics, such as those targeting timeliness, will help the WCF Division improve its efficiency with respect to managing the fund. For example, usage report timeliness measures the number of weeks it takes for the WCF Division to share usage reports with customers. As previously discussed, the WCF Division conducts other activities, such as its business process analyses, that are also intended to support efficient service delivery. However, HUD does not assess the results of the WCF Division’s business process analyses to better understand how they contribute to the WCF’s goal. We previously reported that high- performing agencies continuously assess their efforts to improve performance. As part of this, agencies use fact-based understandings of how their activities contribute to accomplishing the mission and broader results. The WCF Division Director told us they have considered metrics to assess broader results of WCF Division activities such as efficiencies, but noted that it is difficult to quantify cost savings attributable to the WCF. This is due, in part, to the fact that HUD’s service agreements are firm- fixed price contracts, meaning that a change in the volume of services HUD consumes in a given year will not result in direct cost savings that same year. However, HUD could assess the results of the WCF Division’s business process analyses, which identified measurable operational and cost efficiencies that HUD could achieve through implementing the division’s recommendations. For example, as previously discussed, in its analysis of help desk calls, the WCF Division identified potential efficiencies that it could track that would contribute to cost savings over time. While some of the recommendations may not directly result in cost savings, the Division identified other efficiencies such as process improvements that could improve the quality of services that it is capable of tracking. For example, the WCF Division determined that changes to HUD’s processes could improve the accuracy of purchase order accrual estimates. Assessing the results of the WCF Division’s business process analyses would help HUD better understand how the Division’s efforts contribute to its goal of supporting the efficient delivery of goods and services. Without doing so, HUD risks not fully realizing more than $1 million in total potential annual savings identified by the WCF Division’s analyses and freeing up resources that could be realigned for other departmental priorities. In addition to tracking progress towards its own goal, assessing these results would allow HUD to demonstrate how the WCF Division contributes to a 2018 cross-agency priority goal of improving the use, quality, and availability of administrative shared services, as well as the department’s related strategic objective to organize and deliver services more efficiently. In response to our review, HUD updated the WCF Handbook—the primary reference guide for customers and stakeholders on WCF operations—to include more current and complete information on WCF policies and procedures. For example, prior to February 2020, we found that the Handbook was not reconciled with more recently developed draft WCF procedures for contract and budget execution, and invoicing and payments. The WCF Handbook now includes these procedures, which contain detailed information about administrative and funds control responsibilities. For example, the procedures describe the WCF Division Director’s cash management responsibilities and designation as the WCF’s Funds Control Officer, as well as roles of WCF customer program and budget officers. In addition, during the course of our review, the WCF Division updated its Handbook to include current information on other policies and procedures. For example, the Handbook now reflects the WCF’s performance metrics, which we previously discussed were initially developed by the WCF Division in 2018, and changes to other key policies, such as the implementation of the WCF’s full cost recovery model in 2019. HUD now has reasonable assurance that its primary reference guide, the WCF Handbook, provides a current and complete understanding of existing WCF policies, consistent with federal standards for internal controls. The WCF’s price and cost allocation methodology is designed to equitably and transparently recover HUD’s annual costs for externally provided shared services financed through the fund. According to HUD officials, the WCF has roughly recovered its costs of financing HUD’s annual shared service agreements since its establishment in 2016. To recover its costs, the WCF Division has a process to divide HUD’s total cost of shared services among the 17 customer offices based on their estimated service usage. For fiscal years 2016 through 2018, the WCF reported a negative accumulated operating result of $400,372, meaning that it reported it recovered nearly all of its costs since its inception. During this time period, the WCF reported years of positive and negative net operating results. Revolving funds such as the HUD WCF are designed to break even over the long term; therefore, year-to-year fluctuations are to be expected. Table 3 provides a detailed breakdown of HUD’s reported cost recovery. According to WCF Division officials, its shared service providers set annual prices for each service line at the outset of the fiscal year using their own pricing methodologies. The service providers then bill HUD in aggregate for an agreed-upon price under annual interagency agreements at firm-fixed prices. As illustrated in figure 2, the WCF Division determines how much each customer office will pay into the WCF for its respective share of HUD’s total shared service costs using internally developed cost drivers and customers’ expected service usage. The cost drivers were selected by the WCF Committee, and are subject to annual review. According to WCF Division officials, the cost drivers are generally similar to those established by the external providers to maintain a clear connection between customer usage and provider charges. In some cases, however, the provider uses a nonunit based cost driver, such as “level of effort.” In those instances the WCF Division uses cost drivers which vary from the providers. According to HUD documentation, “employee count” is a common alternative driver used to fairly and equitably distribute costs among customers. In addition to the direct costs of HUD’s shared services, HUD officials told us that the WCF received authority to collect reimbursement from HUD customers for the WCF Division’s overhead costs in fiscal year 2019. The WCF’s overhead covers operational expenses, including: WCF Division staff salaries and benefits, travel, support contracts, supplies and materials, and training. Customers are billed for a percentage of the overhead based on their share of HUD’s total shared service costs. This charge is included as an individual line item in customers’ WCF billing statements. The WCF Division shares information on pricing and its cost allocation process with customers in several ways. The WCF Handbook includes the billing process, which describes the method for allocating costs among customers. The WCF Division provides customer offices with a billing model which illustrates how costs are allocated across customers by service line. Customer invoices are broken out to show how customers are charged for each service. In addition, the WCF Division provides quarterly usage reports to customers to help them understand their service consumption. According to WCF Division officials, the WCF Division holds meetings and meets with customer offices one-on-one to explain the information provided. Participants in two of our three focus groups said that the WCF cost allocation model increases accountability and is a more equitable and fair distribution of service costs. Participants in all three focus groups said the WCF improved transparency over the old service model because they can see and consider the costs of their shared service usage. For example, one participant told us that, before the WCF, customers did not directly pay for their shared services and, as a result, did not think about costs. The WCF Division has processes to estimate and manage the WCF’s unexpended balance, including establishing an operating reserve requirement. Properly managing unexpended balances is essential for ensuring self-sufficiency of the fund. Part of the unobligated balance includes an operating reserve which, according to WCF Division officials, is needed to finance ongoing revolving activities, facilitate payments, cover discrepancies between actual and projected shared service costs, and ensure continuity in case of funding disruptions. Evaluating Unexpended Balances: A Framework for Understanding In 2013, we identified the following questions for agencies and decision makers to consider when evaluating unexpended balances in federal budget accounts. Findings based on these questions can provide managers with important information about financial challenges and opportunities which may exist; in turn, this information may help guide more effective account and program management. In fiscal year 2017, the size of the WCF’s unexpended balance increased by 60 percent from $10 million to $16 million, and it was relatively stable from fiscal years 2017 to 2018, as shown in table 4. While the WCF Division does not actually provide the shared services that it finances, nor manage dispute resolution between customers and service providers, it does communicate with customers on fund-related issues—such as shared service billing and usage reports. Key operating principles for effective management of working capital funds state that to be flexible to customer input and needs, agencies should communicate with customers regularly and in a timely manner, and develop a process to assess whether customer demands are met. The WCF Division communicates and interacts directly with customers through a variety of channels. For example, WCF Division officials told us that they: organize quarterly WCF Committee meetings, hold meetings to provide information and answer questions about interpreting usage reports, and use an email inbox for communication between Division staff and customers. The WCF Division will also contact customers directly when issues, such as anomalies in shared service usage, are identified. Customers in all three focus groups reported that they turn to the WCF Division when issues or questions about WCF-related issues arise, and are generally satisfied with the Division’s communication and responsiveness. HUD’s business line offices—those offices that oversee HUD’s agreements for externally provided shared services—have mechanisms to communicate with customers and obtain feedback on shared service quality. For example, an official from OCFO—the office that oversees financial management, procurement, and travel services—told us that OCFO has an email inbox dedicated to questions and concerns regarding services. Officials from OCHCO—which oversees human resource (HR)- related services—told us that OCHCO holds recurring meetings with customer offices and reviews feedback from government-wide employee surveys. That feedback is then used to inform HUD’s annual negotiations for HR-related shared services and improve service delivery. According to the WCF Division Director, the WCF Committee quarterly meetings provide an additional opportunity for customer offices to provide feedback to business line offices on shared services. Business line office officials also told us they monitor data on service provider performance and go directly to the provider when discrepancies between the provider’s actual performance and agreed-upon performance metrics are identified. However, while participants in all three of our focus groups acknowledged that OCFO and OCHCO are the designated points of contact for day-to- day issues, participants in two of our three focus groups mentioned that they have not been given opportunities to provide feedback on overall shared service quality. In addition, all three customer focus groups expressed some level of dissatisfaction with the quality of HR services, particularly with hiring. For example, participants in at least one of our focus groups identified the following issues with HR services: complications and excessive time consumption associated with resolving inquiries; HR service providers operating without specialized skills and knowledge relevant to HUD offices and programs; and inadequate adaption to spikes in service demand. The WCF Division Director told us that the WCF Committee has not conducted periodic reviews of WCF business lines since HUD transitioned to shared services. According to the WCF Committee Charter, the WCF Committee is responsible for conducting and overseeing periodic reviews of WCF business lines, as appropriate, to ensure effective management, strong performance, and customer satisfaction. In addition, federal standards for internal control call for periodic reviews of policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. According to the WCF Division Director, at this time the committee does not have plans to conduct such reviews. OCHCO officials told us that they are aware of customer complaints with the quality of HR services. According to officials, HUD has a new Chief Human Capital Officer as of May of 2019 who is taking action to obtain feedback on services by engaging directly with HUD customers through listening sessions. OCHCO officials told us they will introduce action plans in fiscal year 2020 to address recurring issues and customer complaints. In addition to these plans and the feedback OCHCO already obtains, OCHCO officials acknowledged that periodic reviews of the service line, as called for in the committee charter, would be valuable. Without conducting periodic reviews of shared services, HUD may not have a comprehensive understanding of whether customer needs are being met and could be missing out on opportunities to identify potential areas for improvement with the performance and management of services for which it is paying. Given the concerns customers in our focus groups told us about HR service lines, HUD should consider making it the first service line that is subject to a review. WCFs provide agencies with an opportunity to operate more efficiently by consolidating services and creating incentives for customers to exercise cost control. HUD could maximize the potential of these opportunities by ensuring that it has a solid framework in place for managing the WCF before it expands to include additional shared services. During the course of our review, HUD took important steps to ensure that the WCF Handbook—the primary reference guide for WCF operations— includes up-to-date and complete information on WCF policies and procedures. Providing access to current and complete information on the management of the WCF promotes an understanding of who should be held accountable, and helps ensure that funds are effectively managed. HUD also took steps to fully document its processes to effectively manage the operating reserves. This will be particularly important as HUD continues to consider expanding the services provided through the WCF. By documenting its existing operating reserve policies, HUD is better positioned to address potential risk and to identify opportunities to achieve budgetary savings or redirect resources to other priorities. However, there are additional opportunities for improvement. Defining roles and responsibilities promotes a clear understanding of who will be held accountable for specific tasks or duties. Most of HUD’s WCF roles and responsibilities are defined in guidance. However, while the WCF Division performs important business process analyses that identity opportunities to improve the efficiency of services, consistent with the goals of the WCF, HUD has not defined roles and responsibilities for the business process analyses, including who is responsible for identifying, monitoring, and implementing actions to achieve the efficiencies. This makes it difficult to hold offices accountable. By clearly defining the responsibilities of the WCF Division, business line offices, and other stakeholders, such as the WCF Committee, HUD could better ensure the business process improvements are being implemented fully and consistently across the department. Moreover, assessing the results of the WCF Division’s business process analyses would help HUD better understand how the Division’s efforts contribute to its goal of supporting the efficient delivery of goods and services. This would better position HUD to achieve the more than $1 million in potential annual savings identified by the WCF Division’s analyses. Finally, opportunities for customers to provide input about services in a timely manner enables agencies to regularly assess whether customer needs are being met. WCF customers have several ways that they can communicate day-to-day concerns about shared services to the business line offices. However, they raised larger concerns during our focus groups, particularly about the quality of the externally provided human resource related services that deserve attention. Periodic assessments of WCF business lines would provide a more comprehensive understanding of customers’ overall satisfaction and would help HUD identify potential areas for improvement with the services for which they pay. We are making a total of three recommendations to HUD. The Secretary of HUD should define and document roles and responsibilities for identifying opportunities to promote more efficient shared service usage through business process analyses, including defining roles for monitoring and implementing actions recommended because of these analyses. (Recommendation 1) The Secretary of HUD, in conjunction with OCFO, should ensure that the results of the WCF Division’s business process analyses are assessed to better understand how these analyses contribute to the WCF’s established goal to support the efficient delivery of enterprise goods and services. (Recommendation 2) The Secretary of HUD should ensure that the WCF Committee conducts periodic reviews of WCF business lines, as authorized in the WCF Committee Charter, to ensure effective management, strong performance, and customer satisfaction. (Recommendation 3) We provided a draft of this report for comment to the Departments of Agriculture (USDA), Housing and Urban Development (HUD), and the Treasury. In our draft report, we made five recommendations to HUD. HUD provided written comments, which are reproduced in appendix II. HUD officials agreed with four of the recommendations and described some steps they have taken or plan to take to address them. HUD sought additional clarification on one of the recommendations. One draft recommendation was that HUD ensure that existing WCF policies and procedures are current and complete, consolidated in the WCF Handbook, and made easily accessible to customers and stakeholders. HUD officials agreed with this recommendation, and during their review of the draft report, they provided documentation to show that they had updated the WCF Handbook in line with our draft recommendation. Another draft recommendation was that HUD fully document all existing processes related to the management of the WCF’s unexpended balances and operating reserve. HUD officials also agreed with this recommendation, and provided documentation to show that they had established written processes in line with our draft recommendation. As such, we revised our final report to include both actions taken by HUD in February 2020 and to remove these two recommendations. In its written comments, HUD sought clarification on recommendation 1. On February 26, 2020, we spoke with HUD officials and clarified that the recommendation is more specifically targeted to the roles and responsibilities for identifying, monitoring, and implementing actions related to the business process analysis and efficiency efforts than the general guidance that HUD identified in its written comments. We added additional clarification to the report where appropriate. In addition to the written comments we received, USDA, HUD, and Treasury provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of USDA, HUD, and Treasury; and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staffs have questions about this report, please contact Tranchau (Kris) T. Nguyen at (202) 512-6806 or nguyentt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In addition to the above contact, Thomas J. McCabe (Assistant Director), Mackenzie D. Verniero (Analyst-in-Charge), Michael Alleyne, Jacqueline Chapin, Andrew J. Howard, Jason Marshall, Steven Putansu, and Alicia White made major contributions to this report. Ronald La Due Lake also contributed to this report.", "summary": "Moving to shared services is one way agencies can operate more efficiently. WCFs provide a way to centralize and simplify the funding of shared services. HUD's WCF was established in 2016 to provide HUD offices services on a cost-reimbursable basis. The fund currently finances services from external federal shared service providers—the Departments of the Treasury (Treasury) and Agriculture (USDA). Congress included a provision for GAO to evaluate HUD's WCF. This report examines the extent to which HUD (1) delineated WCF roles and responsibilities and established performance measures, (2) established a transparent and equitable process to recover WCF costs, and (3) developed processes to obtain WCF customer feedback. GAO analyzed agency documentation of WCF management and financial and budget data, using its work on effective WCF management and unexpended balances as criteria. GAO interviewed HUD, Treasury, and USDA officials and conducted three focus groups with WCF customer offices. The Department of Housing and Urban Development's (HUD) Working Capital Fund (WCF) is a self-sustaining fund that collects fees from HUD customers to pay for services needed across the department. HUD's WCF finances human resource (HR) and financial management related services provided by external federal shared service providers. HUD defines most roles and responsibilities in its WCF handbook—the primary reference guide for WCF operations—and has established performance metrics. In addition, in response to GAO's review, HUD updated its handbook in February 2020 to include more current and complete information on existing WCF policies and procedures. However: HUD has not defined who is responsible for identifying and implementing opportunities for achieving efficiencies with service usage, including roles for the business process analyses it periodically conducts. HUD has not assessed the results of the business process analyses, or how those results could contribute to supporting efficient service delivery. Clearly defining WCF roles and assessing the results of its analyses can help HUD better manage the WCF and improve its ability to identify, monitor, and potentially realize cost savings and other efficiencies. GAO found that HUD has a process designed to equitably and transparently recover the WCF's costs for externally provided federal shared services. Prior to February 2020, it had not fully documented existing policies for managing the WCF's unexpended balances and operating reserves. However, HUD has since established its operating reserve policy that reflects all of the ways that the operating reserve can be used, such as to provide pricing stability to customers and ensure continuity of WCF activities in case of funding disruptions. Written documentation of such policies is essential to ensure that funds are managed appropriately and consistently over time. Finally, the WCF Committee has not conducted periodic reviews of shared services to help ensure effective management, strong performance, and customer satisfaction. Officials from both business line offices—the Office of the Chief Human Capital Officer (OCHCO) and Office of the Chief Financial Officer —stated that they use a variety of mechanisms to obtain customer feedback on services. However, WCF customers in two of three focus groups GAO held said that they have not been given opportunities to provide feedback on the overall quality of services they receive, and some participants shared specific concerns with HR services. Officials from OCHCO—the office that oversees HR services—told GAO they are aware of customer concerns, plan to take additional actions to obtain customer feedback, and acknowledged the need for periodic reviews called for in the WCF Committee Charter. Until such reviews are conducted to regularly assess customer satisfaction, HUD will likely lack a comprehensive understanding of the extent to which customer needs are being met and could be missing out on opportunities to improve the performance and management of services for which it pays. GAO is making three recommendations to HUD on its WCF: define roles for achieving efficiencies; assess results of its analyses; and conduct periodic reviews of business lines. HUD agreed with two and sought additional clarification on one. GAO clarified the recommendation based on further discussion with HUD.", "document_type": "gao"}
{"report": "About 2 million of the more than 6 million veterans who received VHA services in fiscal year 2018 had at least one diagnosed mental health condition, with MDD being the most prevalent diagnosis. About half of these approximate 2 million veterans had a single mental health condition while the remaining half had multiple mental health conditions (see fig. 1). In fiscal year 2018, the three most prevalent mental health conditions among veterans using VHA services were MDD (15 percent), PTSD (12 percent), and GAD (3 percent): MDD. This condition is the most prevalent and disabling form of depression. In addition to the immediate depression symptoms (such as persistently feeling sad or anxious, loss of interest in activities, and difficulty sleeping or oversleeping), MDD can result in poor quality of life overall and decreased productivity, and increased risk of suicide. PTSD. Those with PTSD have experienced symptoms that have persisted for more than 1 month after exposure to a traumatic event, although the onset of symptoms may be delayed for much longer, and cause significant distress or impairment in social, occupational, or other important areas of functioning. Symptoms may include recurrent, involuntary memories of the traumatic event and flashbacks in which the veteran feels or acts as if the traumatic event were recurring. PTSD is strongly associated with reduced quality of life and adverse physical health outcomes. GAD. Those with GAD feel continually worried or anxious about a range of events or activities in their daily lives and have difficulty controlling or stopping this worry. Along with feeling worried, those with GAD experience symptoms of tension such as restlessness, feeling on edge, being easily tired, difficulty concentrating, and sleep difficulties. Veterans with mental health conditions may be offered a variety of treatment options. Of the approximate 2 million veterans with at least one diagnosed mental health condition in fiscal year 2018, 45 percent received non-pharmacologic therapy, 27 percent received a combination of non-pharmacologic therapy and psychotropic medication, and 10 percent received psychotropic medication only. Non-pharmacologic therapy. Non-pharmacologic therapy, or psychotherapy, involves treating mental health conditions using psychological rather than medical means. There are many different types of therapy options, although not all may be available at every VAMC. Examples of non-pharmacologic therapies include cognitive behavioral therapy and prolonged exposure therapy. Some therapy options may be provided to individual veterans, while others are offered to groups of veterans. Psychotropic medications. Psychotropic medications are used to affect one’s mood, thought, or behaviors. Veterans can be prescribed one or more psychotropic medications, from one or more classes, to treat their diagnosed mental health conditions. For example, sertraline—a psychotropic medication commonly known by its brand name Zoloft®—is used by VHA providers to treat both depression and anxiety. Combining treatment. Providers may decide to offer both psychotropic medications and non-pharmacologic therapy, rather than prescribing or offering either option alone. Decisions to offer any of these treatment options are made by providers in various VAMC outpatient care settings. Primary care setting. In addition to addressing other health care needs, PCPs may order non-pharmacologic treatment, prescribe psychotropic medications, or combine both treatment options to address a veteran’s mental health conditions. Through the primary care-mental health integration (PC-MHI) model, which VAMCs began implementing in 2007, PCPs may also collaborate with mental health providers (e.g., psychologists, social workers, nurses) who are collocated within the primary care clinic before making treatment decisions. These collocated mental health providers can also offer non-pharmacologic therapy to veterans without requiring a separate visit outside of primary care. Specialty care setting. Mental health providers in a specialty care setting, such as psychiatrists, decide whether to provide any type of treatment for veterans who have been referred to them by providers in primary care for services specific to their mental health conditions. Veterans may also seek services from a mental health provider in specialty care without first obtaining a referral from primary care. VHA has established certain requirements for providers’ documentation of specialty mental health care treatment plans, and the Joint Commission periodically reviews the documentation of such plans to ensure that they align with the Commission’s standards. VHA. To ensure that providers develop appropriate approaches to treating veterans with mental health conditions and reevaluate such treatment approaches over time, VHA has established certain policies to govern the documentation of mental health treatment decisions by mental health providers in specialty care. For example, in 2008, VHA issued its mental health services handbook to define minimum clinical requirements for mental health services at VAMCs, requiring that providers in specialty care document mental health treatment plans in veterans’ electronic medical records. The mental health services handbook specifies that plans should include certain components such as documentation that different evidence-based treatment options were considered by mental health providers and that approaches to monitor the outcomes of care were developed. The Joint Commission. The Joint Commission is an independent, not-for-profit organization responsible for accrediting and certifying health care organizations and programs in the United States (including VAMCs) at least once every 3 years, and it has developed standards to use as the basis of its evaluative process. These standards focus on specific patient and organization functions that are essential to providing safe and high-quality care, including plans for treatment provided in mental health care settings. VAMC officials we interviewed reported various factors as contributing to providers’ decisions to prescribe psychotropic medications and offer non- pharmacologic therapy to veterans. Specifically, officials from multiple VAMCs cited each of the following factors as contributing to treatment decisions: VAMC resources, complexity of veterans’ mental health conditions, comfort level of providers with treating conditions or prescribing medications, veterans’ preferences, and logistics of receiving mental health treatment. See table 2 for the factors and supporting examples offered by VAMC officials during our site visits. In our review of documentation VAMC providers may use when making treatment decisions, we identified some additional factors. For example, providers’ use of clinical practice guidelines (CPG) established by VA and the Department of Defense may contribute to providers’ treatment decisions. Specifically, the CPG for mental health conditions that are highly prevalent among veterans, including MDD and PTSD, are a resource that all VAMC providers may use when making treatment decisions. For example, the CPG for the management of MDD recommends that providers offer either psychotropic medications or non- pharmacologic therapies (such as behavioral therapy) for the primary treatment of uncomplicated MDD. In contrast, the CPG for the management of PTSD recommends initial treatment for this condition to be a specific type of non-pharmacologic therapy (individual trauma- focused therapy), and when this therapy is not readily available or preferred, then treatments include prescribing psychotropic medications or offering another form of non-pharmacologic therapy. Though it is not mandatory for providers to follow the recommendations of the CPGs, which are based on the strength of evidence and also the potential benefits and harms of treatment options, every provider is responsible for evaluating the appropriateness of applying CPG recommendations in any particular clinical situation. Another factor we identified in our review of documentation was service agreements that VAMCs have in place to help coordinate mental health services across outpatient settings. All five of the VAMCs in our review have formal agreements to help coordinate mental health services across outpatient settings to help manage VAMC resources. These agreements indicate that, for example, providers in primary care can provide treatment for certain mental health conditions, such as uncomplicated depression, without referring veterans to mental health providers in specialty care (see text box). Service Agreements between Primary and Specialty Care for the Treatment of Mental Health Conditions in Selected VA Medical Centers (VAMC) All five of the VAMCs in our review have formal service agreements to help coordinate treatment across primary and specialty care settings for certain mental health conditions, such as uncomplicated depression: All service agreements from the VAMCs in our review indicated that providers in primary care can treat uncomplicated depression without referring veterans to a mental health provider in a specialty care setting. All service agreements indicated at what point mental health providers in specialty care should be involved to help treat veterans with uncomplicated depression—for example, if veterans failed to respond to treatment after trying two different psychotropic medications, or if symptoms worsen over time. In addition to uncomplicated depression, other mental health conditions (including anxiety, PTSD, schizophrenia, and bipolar disorder) were addressed in four of the five service agreements we reviewed. For example, the four service agreements indicated that veterans with bipolar disorder should be treated by mental health providers in specialty care. In light of these factors, providers we interviewed reported on the extent to which each of the most prevalent mental health conditions resulted in PCPs prescribing medication to veterans prior to or without being referred to specialty care. Specifically, more providers reported that psychotropic medications are commonly prescribed to veterans with MDD, PTSD, or GAD prior to referring them to specialty care compared to providers who reported that it is common to prescribe without referring veterans to specialty care at all. See figure 2 for the percentages of providers reporting that psychotropic medications are commonly prescribed to veterans with these three conditions prior to referring them to specialty care. Providers also reported on the extent to which it was common for any provider to offer non-pharmacologic therapy to veterans with these three conditions in lieu of, or in addition to, prescribing psychotropic medications. More providers reported that non-pharmacologic therapy is commonly offered in addition to psychotropic medications compared to providers who reported that it is common to offer therapy instead of medication. See figure 3 for the percentages of providers reporting that non-pharmacologic therapy is commonly offered in addition to psychotropic medications. See appendix I for additional information about mental health treatment practices, including the prescribing of psychotropic medications and offering non-pharmacologic therapy to veterans in a random, nongeneralizable selection of medical records from the VAMCs in our review. See appendix II for information on the use of psychotropic medications or non-pharmacologic therapy by VHA providers to treat veterans with certain mental health conditions, nationally, in fiscal year 2018. VHA has not developed and disseminated guidance that specifies its expectation that mental health providers in specialty care document treatment plans in an easily identifiable way within veterans’ medical records. According to VHA officials responsible for overseeing mental health services, mental health providers should be documenting treatment plans in notes that are easily identifiable and separate from other health information, rather than embedding the plans in progress notes where they may combined with other information related to veterans’ medical histories and current health conditions. In our nongeneralizable review of 80 medical records for veterans who were seen by providers in specialty care and prescribed a psychotropic medication, we found that a majority (50) had a mental health treatment plan recorded in a progress note. We viewed several examples where the treatment plan was not the only information recorded within the progress note, making it difficult to readily identify the mental health treatment plan itself. A VHA official responsible for overseeing mental health services told us it is important for a mental health provider in specialty care to document each veteran’s treatment plan in such a manner so that the provider, or any other providers who may become involved in the veteran’s treatment, can readily refer to the plan as they evaluate progress. This may be particularly important during transitions between inpatient and outpatient care settings, or when adding providers to a veteran’s care team. Providers need to be able to readily access veterans’ mental health treatment plans to ensure that treatment is being provided as ordered, understand why certain treatments were decided against, and assess whether treatment changes are needed. The same VHA official told us that he encourages this practice to support VAMC compliance with the Joint Commission’s standards for mental health treatment plans. However, relevant VHA guidance documents for mental health providers do not specify this expectation: VHA mental health services handbook. The VHA mental health services handbook, published in 2008, requires that mental health providers in specialty care document treatment plans that include certain components. However, it does not specify where providers should document such plans within veterans’ medical records. VHA memo. A 2012 VHA memo promotes the use of a software program by mental health providers in specialty care that, according to VHA officials, facilitates the documentation of treatment plans in notes that are easily identifiable and separate from other information. However, the memo did not specifically state that documenting treatment plans in easily identifiable and separate locations from other information is the goal of using the software program, nor does the memo require providers to use the software. VHA health records handbook. This handbook, published in 2015, provides basic health information procedures for managing veterans’ health records and specifies that all outpatient providers must include treatment plans in progress notes. It does not explicitly reflect VHA’s expectation for mental health providers in specialty care to document mental health treatment plans in an easily identifiable way. Further, the health records handbook specifies that progress notes must also include other types of information, including the history of the veteran’s medical problem, the provider’s assessment of the problem, any tests or consults ordered, and instructions given to the veteran. VHA officials did not provide a rationale as to why they have not developed guidance that clearly directs mental health providers in specialty care to document treatment plans in an easily identifiable way within veterans’ medical records. They noted that VHA has relied upon the VAMCs to develop local processes for documenting specialty mental health treatment plans in an easily identifiable way when providers decide not to use the software program that VHA promoted in its 2012 memo. According to VHA officials, VHA is developing a new memo to communicate its expectation that mental health providers in specialty care document treatment plans in an easily identifiable way within veterans’ medical records. However, as of March 2019, VHA officials had not finalized this memo or indicated when the memo will be disseminated. Standards for internal control in the federal government require that agencies document responsibilities through policies and define objectives in terms that are understood at all levels. These standards also require that agencies communicate necessary information throughout all agency reporting lines to achieve the agencies’ objectives. Absent VHA guidance that clearly identifies its expectation for documenting specialty mental health treatment plans, providers may incorrectly record treatment plans in veteran’s electronic medical records such that they are not easily identifiable. As a result, there is a risk that a provider may be unable to readily access important information about a veteran’s mental health treatment, including the use of psychotropic medication or non- pharmacologic therapy, during changes in a veteran’s care. VHA may learn of the extent of this risk through efforts to collect information resulting from the Joint Commission’s accreditation survey process. Specifically, VHA uses various conference calls to discuss the Joint Commission accreditation survey process and results: According to a VHA official, VHA has weekly and quarterly conference calls with VISNs to, in part, help them prepare their VAMCs for future surveys and, as a result, VHA may learn about different types of citations that apply to multiple VAMCs. This, in turn, may allow VHA to identify concerns that may need to be addressed system-wide, including those related to mental health treatment planning. The Joint Commission provides VHA with an annual summary of data on common citations issued to VAMCs. According to the Joint Commission officials, the Commission provides VHA with this information through a conference call, which may also include a discussion of the underlying causes for any trends in system-wide citations. VHA officials may be able to use this information to address any systemic problems related to the documentation of specialty mental health treatment plans in an easily identifiable way within veterans’ medical records. According to a VHA official, VHA has not identified the documentation of specialty mental health treatment plans as an area for improvement across VAMCs. This issue was not included in the November and December 2018 conference calls with the VISNs, nor was it included in the 2018 annual summary of data that the Joint Commission provided to VHA. VHA has not developed or implemented an approach for monitoring whether mental health providers in specialty care are documenting their consideration of different evidence-based treatment options in mental health treatment plans as required by VHA’s mental health services handbook. In our review of a nongeneralizable sample of 80 medical records for veterans who were seen by such providers and prescribed a psychotropic medication, we found that none of the veterans had treatment plans that documented consideration of different evidence- based treatment options for the veterans’ mental health conditions. VHA relies on the Joint Commission to assess mental health treatment plans as part of the organization’s accreditation process for each VAMC, according to VHA officials. However, VHA does not obtain information resulting from the Joint Commission’s accreditation process that specifically relates to whether mental health providers are documenting consideration of different treatment options in their mental health treatment plans as required. The Joint Commission’s accreditation standards related to mental health treatment plans align with some, but not all, of VHA’s mental health services handbook’s required treatment plan components. For example, the standards align with VHA’s requirement that mental health providers in specialty care must document how they plan to track outcomes and re-evaluate treatment when needed. However, they do not call for the Joint Commission’s accreditation survey to assess whether specialty mental health treatment plans include providers’ consideration of different treatment options, and, according to organization officials, this is not something they look for when conducting their reviews. VHA’s mental health services handbook calls for monitoring through the use of metrics to ensure implementation of the handbook’s requirements, including those related to the documentation of the mental health treatment plan components by mental health providers in specialty care. Additionally, standards for internal control in the federal government require that agencies establish appropriate performance measures for defined objectives, perform ongoing monitoring activities, and remediate identified deficiencies on a timely basis. VHA’s lack of monitoring may contribute to inadequate documentation of the treatment options considered by mental health providers in specialty care in accordance with the mental health services handbook’s requirements. As a result, VHA cannot ensure that mental health providers in specialty care are appropriately considering all available evidence-based treatment options to provide the best care for veterans. This monitoring may be accomplished, for example, by establishing metrics and monitoring performance against such metrics, as called for by VHA’s mental health services handbook. Without metrics or other approaches to monitoring, VHA officials may not be identifying and addressing any systemic problems related to consideration of different evidence-based treatment options. VHA has reported improvement in the safe and effective prescribing of certain psychotropic medications used to treat veterans with mental health conditions since the 2013 start of its Psychotropic Drug Safety Initiative (PDSI). To date, PDSI has consisted of three phases, with each phase focusing on different classes or types of psychotropic medications, age groups, or mental health conditions and substance use disorders. PDSI is currently in phase 3 and VHA is in the process of planning for a new phase 4, scheduled to begin in July 2019. For each phase, VHA developed a set of performance metrics from which each VAMC was required to select a designated number as a focus for implementing prescribing-related quality improvement efforts (referred to as the VAMC’s priority metrics). See table 3. VHA reported improvements in the majority of the performance metrics from the past PDSI phases. Specifically, VHA reported nationwide improvements in 16 of the 20 metrics that it developed for phase 1, and all 14 of the metrics that it developed for phase 2. For example, upon the completion of phase 1, VHA found that there was a nationwide 5.4 percentage point decrease (indicating improvement on this metric) in the percentage of veterans with PTSD who received one or more outpatient prescriptions for a benzodiazepine (a type of antianxiety medication). VHA reported that the change in benzodiazepine prescribing, among other improvements in treating veterans with PTSD, was particularly noteworthy given that the number of veterans diagnosed with this mental health condition increased over the duration of phase 1. Further, upon the completion of phase 2, VHA found that there was a nationwide 1.7 percentage point decrease (indicating improvement on this metric) in the percentage of veterans 75 or older with an outpatient prescription for a benzodiazepine or sedative hypnotic medication. During each PDSI phase, VHA works with VISNs and VAMCs to support their quality improvement efforts related to their priority metrics. For example, VHA provides feedback and technical assistance to VISNs and VAMCs for developing and implementing quality improvement strategies for their priority metrics, which must be updated and submitted to VHA semiannually; convenes a bi-monthly PDSI conference call for VISN and VAMC staff and providers involved in PDSI, which serves as a forum for providing training to participants, discussing best practices, and facilitating collaboration among VAMCs that may have chosen the same priority metrics; develops a semi-annual feedback report for each VISN that includes, among other content, the most recent quarterly score on the priority performance metrics for each VAMC within the network, according to a VHA official; and provides VISNs and VAMCs access to a PDSI clinical management dashboard to use to identify veterans who may benefit from changes to their psychotropic medication prescriptions. These lists can be filtered by the care setting in which the patient is seen, such as the primary or specialty care settings. Although VISNs and VAMCs are not always required (but are encouraged) to continue quality improvement efforts related to VAMCs’ priority metrics from past PDSI phases, VHA continues to monitor VAMC performance on all metrics from each PDSI phase. Specifically, a VHA official told us that VHA monitors performance by calculating quarterly VAMC scores on all performance metrics, which are published on the PDSI clinical management dashboard. VHA also disseminates these scores to the VISNs in the semiannual feedback reports. In these feedback reports, VHA highlights any metric—from the current or a past phase—for which a VAMC within that VISN has regressed. A VHA official stated that if a VAMC regresses significantly in any area, VHA would work with that medical center to determine the cause and take action to reverse the trend as needed. See appendix III for information on PDSI’s planned focus on reducing the co-prescribing of benzodiazepines and opioids as well as the initiative’s collaboration with VHA’s Academic Detailing program, which has developed its own campaign related to stimulant prescribing. Since 2012, VHA has included psychotropic medications in multiple efforts to examine suicide risk among veterans, including two programs and three research studies. These efforts include: Recovery Engagement and Coordination for Health – Veterans Enhanced Treatment (REACH VET) Program. VHA includes psychotropic medications as part of its effort to examine veterans who may be at risk of suicide through its REACH VET program. Specifically, REACH VET uses prior research findings to conduct predictive modeling on data collected from VHA’s electronic medical records to identify veterans who are within the top tier (0.1 percent) of predicted suicide risk. These veterans may also be at increased risk of other adverse outcomes, such as overdoses, violence, and mental health hospitalization. Of note, five of the 61 variables used in REACH VET’s predictive model relate to the prescription of specific psychotropic medications (e.g., alprazolam), and three relate to the prescription of specific psychotropic classes (e.g., antidepressants). Other variables used in the model include demographic characteristics, past suicide attempts, measures of VHA care utilization, and certain diagnoses such as substance use disorder, MDD, and chronic pain. REACH VET coordinators staffed at VAMCs are responsible for notifying the appropriate mental health provider or PCP that a veteran has been identified as being at high risk for suicide, based on a high-risk list of veterans generated monthly by REACH VET’s predictive model. As shown in Figure 4, veterans identified as being at high risk for suicide may then receive targeted outreach from their mental health providers or PCPs if those providers conclude that outreach is warranted based on their review of the veterans’ medical records, according to VHA officials. This outreach may result in changes to the veteran’s treatment as agreed upon by the provider and veteran. VHA reported that within the first year of nationwide implementation, February 2017 through February 2018, the program identified close to 30,000 veterans at high risk for suicide. Behavioral Health Autopsy Program. VHA also includes psychotropic medications in its Behavioral Health Autopsy Program. This program examines information about veteran deaths by suicide that are reported to VAMC providers and suicide prevention coordinators. When informed that a veteran has died by suicide, suicide prevention coordinators are to electronically report, among other things, whether the veteran had (1) been prescribed psychotropic and other medications, for the treatment of a mental health condition within the previous year, and (2) adhered to the medications. Other sources of information collected through the program may include coroners’ and medical examiners’ reports, death certificates, and information provided by family members and significant others. Data are reported to and analyzed by VHA’s VISN 2 Center of Excellence for Suicide Prevention. One recommendation in the program’s 2017 annual report called for more efforts to study issues related to medication management, such as veterans’ medication adherence, overmedication, and frequent and abrupt medication changes. In the past, recommendations from the program have been used to inform VHA suicide prevention policies, programs, and educational efforts, according to VHA officials. For example, officials shared that the program informed the development of a tool kit for providers to use to help address veterans’ sleep issues after analyses found that sleep patterns were often altered for veterans prior to their death by suicide. Lithium for Suicidal Behaviors in Mood Disorders study. As of March 2019, VHA is in the process of conducting a randomized clinical trial that examines the effect of a specific psychotropic medication (lithium) on reducing suicide risk for veterans with MDD or bipolar disorder who either survived a recent suicide attempt or were hospitalized to prevent one. VHA plans to enroll 1,600 veterans in the study from 28 VAMCs and provide them with the appropriate treatment options as determined by their respective providers, as well as provide some additional care coordination. Additionally, half of the participants will receive lithium, and half of the participants will receive a placebo. The study’s investigators told us that, to their knowledge, this study is the first effort to test lithium’s efficacy for reducing suicide risk in a randomized clinical trial setting. Investigators also told us that, because all participants will receive medications already proven safe and effective for the treatment of their conditions, it is not considered unethical to withhold lithium, a yet untested medication for treating suicide risk, from half of participants. VHA investigators told us they hope to use the results of this clinical trial to inform future treatment options for patients with MDD or bipolar disorder and who are at risk of suicide. Drugs and Suicide Risk study. Between January 2017 and October 2018, VHA officials and collaborators at the University of Chicago and Columbia University analyzed 513 medications, which included psychotropic medications, prescribed between 2003 and 2014 for association with increased or decreased risk of suicidal events in VHA patients. According to the study’s investigators, they expect to be able to identify specific psychotropic medications that are found to be associated with the largest increases and decreases in suicide risk. VHA officials told us that as of March 2019, the research manuscript was under review for publication in a peer-reviewed journal. Using Big Data and Precision Medicine to Assess and Manage Suicide Risk in U.S. Veterans study. As of March 2019, VHA officials, in collaboration with the Department of Energy, were in the process of developing a new model to predict suicidal behavior among veterans by combining data on genetic and non-genetic risk factors, such as demographics, medical conditions, and stressful life events; psychotropic medications are also included as a risk factor, according to VHA officials. The researchers are expected to combine data from VHA electronic medical records with data from a VHA Office of Research and Development program that collects genetic information from veterans to develop the new algorithm. VHA officials we interviewed noted some broad challenges not exclusive to VHA that may affect efforts for any researcher in examining suicide risk and the use of psychotropic medications: Multiple risk factors. All VHA officials that we spoke with discussed the need for efforts examining psychotropic medications and suicide risk to account for other suicide risk factors beyond the use of these types of medication. Such factors may include having a substance use disorder or other mental health diagnoses; homelessness; chronic (non-mental health) medical conditions; age; and psychosocial factors, such as recent loss of a significant other or a history of abuse or violence. Methodological considerations. Most VHA officials that we spoke with mentioned some methodological considerations that must be considered when designing a research study to examine this relationship. For example, an official told us that measuring veterans’ medication adherence is important to track, but is difficult to do as VHA generally only has data on whether medications were dispensed to veterans, not whether medications were actually taken. Ethics. Some VHA officials that we spoke with noted that certain ethical considerations may limit the methodological options available to researchers, such as randomized clinical trials. For example, it would be unethical to withhold medications that have been proven as safe and effective from veterans who may clinically benefit from receiving such treatments, such as from veterans in a control group. In the face of these challenges, VHA officials also noted some advantages VHA researchers, in particular, may experience in examining the use of psychotropic medications and suicide risk: a large patient population with more than 2 million veterans who have at least one mental health condition, and a corresponding electronic medical records database, providing sufficient data and sample sizes needed to test hypotheses; internal funding streams dedicated to research activities examining issues related to suicide prevention, such as funds available through three of VA’s Office of Research and Development’s four central research services; and research centers with researchers who have specific expertise about issues related to suicide prevention and the treatment of serious mental health conditions. Veterans diagnosed with mental health conditions rely on providers in VAMCs across the country to make treatment decisions that are safe and effective, including whether to treat highly prevalent and serious conditions such as MDD and PTSD with psychotropic medications, non- pharmacologic therapy, or a combination of both. In recent years, VHA has taken steps aimed at improving the safety and effectiveness of prescribing decisions for certain psychotropic medications and noted important improvements resulting from these efforts. However, VHA’s oversight related to treatment planning needs improvement. VHA has yet to disseminate guidance that clearly reflects its expectation that mental health providers in specialty care document mental health treatment plans in a readily identifiable manner in veterans’ medical records. Additionally, VHA does not monitor whether mental health providers are considering evidence-based treatment options in treatment plans, as VHA requires in its mental health services handbook. As a result, VHA cannot ensure that providers are considering and documenting all appropriate treatment options, adequately evaluating patient care, and making treatment modifications as necessary, among other issues. Furthermore, the lack of monitoring may impede VHA’s ability to identify important factors that contribute to providers’ treatment decisions, which could in turn allow VHA to identify more systemic barriers to safe and effective treatment, such as needed training. In addition, being able to readily identify how veterans are being treated for mental health conditions may allow VHA to enhance its research efforts related to suicide risk. VHA has noted several advantages it has in conducting research involving the role of psychotropic medications in suicide risk among veterans, including that VHA researchers have access to a large patient population with at least one mental health condition. Monitoring veterans’ use of psychotropic medications and non- pharmacologic therapies and related outcomes may further enhance this capacity for research on suicide risk. We are making the following two recommendations to VA: The Veterans Health Administration should disseminate guidance for VISNs and VAMCs that more clearly reflects its expectation that mental health providers in specialty care should record mental health treatment plans within veterans’ medical records in an easily identifiable way. (Recommendation 1) The Veterans Health Administration should develop and implement an approach for monitoring treatment plans for veterans with mental health conditions to ensure that such plans include documentation that different evidence-based treatment options were considered. (Recommendation 2) We provided a draft of this report to VA for review and comment. In its written comments, which are reproduced in Appendix IV, VA concurred with our recommendations. VA agreed that the recommendations would promote adherence to mental health treatment planning requirements. VA stated that it is developing guidance to help ensure that mental health providers in specialty care record mental health treatment plans in separate, easily identifiable documents within veterans’ medical records. VA also stated that it will develop and implement a process for monitoring whether such plans include documentation that providers considered different evidence-based treatment options. We will monitor VA’s efforts to address our recommendations. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committee and the Secretary of Veterans Affairs. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at DraperD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. We reviewed a nongeneralizable, randomly selected sample of 75 veterans’ medical records from five Department of Veterans Affairs (VA) medical centers (VAMC)—25 for each of the three most prevalent conditions diagnosed among veterans—who had at least one primary care visit in fiscal year 2017 and were prescribed a new psychotropic medication. About half (37) of the 75 medical records we reviewed indicated the veteran was prescribed a new psychotropic medication prior to or without being referred to a mental health provider in specialty care. See table 4. We reviewed a separate, nongeneralizable, randomly selected sample of an additional 75 veterans’ medical records from the five VAMCs—25 for each of the three most prevalent conditions diagnosed among veterans— who were newly diagnosed within that year. Over half (44) of the 75 medical records we reviewed indicated whether the veteran was offered non-pharmacologic therapy in lieu of or in addition to being prescribed a psychotropic medication. See table 5. We analyzed national data obtained from VHA on the types of treatments received by veterans with a diagnosis of a single mental health condition who had encounters with VHA providers for that diagnosis in fiscal year 2018, including the three most prevalent mental health conditions diagnosed among veterans. See Figure 5 for the percentages of veterans with these three conditions or another mental health condition who received (1) non-pharmacologic therapy (psychotherapy), (2) at least one medication from a psychotropic medication class, (3) a combination of the two, or (4) neither psychotropic medication nor non-pharmacologic therapy in fiscal year 2018. We also analyzed national encounter data obtained from VHA for veterans with one of the three most prevalent mental health conditions and who received psychotropic medications in a VA medical center (VAMC) in fiscal year 2018. We found that for all three conditions, the largest percentage of veterans who received at least one psychotropic medication from one class were seen in the primary care setting only. The percentages of veterans with medications from two or three classes— typically veterans who had more complex mental health conditions, according to a VHA official—were larger for veterans seen by specialty care providers, compared to the percentages of veterans with medications from multiple classes seen in primary care only. See Figure 6. The Veterans Health Administration (VHA) has taken steps to improve the safe and effective prescribing of certain psychotropic medications used to treat veterans with mental health conditions through the Psychotropic Drug Safety Initiative (PDSI). PDSI has consisted of three phases since 2013, when the initiative began. Each phase has focused on making improvements related to the prescribing of different classes or types of psychotropic medications, or treating different age groups or mental health conditions and substance use disorders. PDSI is currently in phase 3, and VHA is in the process of planning for phase 4. According to a VHA official, PDSI phase 4 (expected to begin in July 2019) will, in part, increase the role of mental health providers in the monitoring and management of the co-prescribing of benzodiazepines (a type of antianxiety medication) and opioids. This includes tapering the use of these medications among this high-risk veteran population to a reduced dose or discontinuation entirely when the harms associated with their concurrent use outweigh the benefits. The same official told us that, to date, VHA has primarily focused on monitoring the concurrent use of these medications—which the Department of Veterans Affairs’ and the Department of Defense’s clinical practice guideline (CPG) for opioid therapy strongly recommends against—through the Opioid Safety Initiative and in the primary care setting (see text box). Veterans Health Administration’s (VHA) Efforts to Taper Veterans Co-Prescribed Benzodiazepines and Opioids Efforts focused on the establishment of safe and effective tapering programs in the primary care setting: VHA launched the Opioid Safety Initiative in 2013 to ensure that veterans are prescribed and use opioid pain medications in a safe and effective manner. This initiative seeks to establish safe and effective tapering programs for veterans who are co-prescribed opioids and benzodiazepines, among other goals. A VHA official told us that the initiative primarily focuses on monitoring and managing the concurrent use of these medications in the primary care setting. Efforts conducted on an individualized, gradual basis: The Department of Veterans Affairs’ and Department of Defense’s clinical practice guideline (CPG) for opioid therapy strongly recommends that tapering of opioids be done on an individualized basis, weighing the benefits and risks to each veteran as well as the veteran’s characteristics and needs. The CPG also notes that the sudden stopping of benzodiazepines should be avoided, since doing so can lead to seizures or death. Department of Veterans Affairs and Department of Defense, Clinical Practice Guideline for Opioid Therapy. To help achieve PDSI’s goal of improving the prescribing of certain psychotropic medications, VHA officials leading PDSI collaborate with VHA’s Academic Detailing program. Academic detailers, who are Veterans Integrated Service Networks (VISN) or Department of Veterans Affairs (VA) medical center (VAMC) clinical pharmacy specialists, disseminate resources and provide one-on-one educational outreach to providers to help them improve their psychotropic medication prescribing practices. Pharmacy staff, including staff involved in academic detailing, from four VISNs told us that they provide education related to PDSI. The Academic Detailing program has also implemented a campaign to improve the appropriate prescribing and monitoring of stimulants (see text box). Veterans Health Administration’s (VHA) Academic Detailing Program Prescription Stimulants Campaign According to a VHA official, in February 2018, the Academic Detailing program implemented a campaign to improve the treatment of patients receiving prescription stimulant therapy for adult attention-deficit / hyperactivity disorder. A VHA official told us that Veterans Integrated Service Networks (VISNs) or Department of Veterans Affairs (VA) medical centers (VAMCs) may choose, but are not required, to participate in this campaign. The stimulant campaign dashboard includes VAMC scores on 13 quality indicators related to (1) prescribing stimulants for off-label use, (2) assessing co-morbidities, (3) monitoring patients, and (4) managing medication. For example One quality indicator measures the percentage of veterans co-prescribed a stimulant and a benzodiazepine, and Another quality indicator measures the percentage of veterans co-prescribed a stimulant and an opioid. Academic detailers (VISN or VAMC clinical pharmacy specialists) may use the dashboard to identify providers who may benefit from changes to their stimulant prescribing practices. A VHA official reported that between February 2018 and the end of fiscal year 2018, academic detailers made 37 staff interactions with providers related to the national academic detailing program’s stimulant campaign. As of October 2018 (the most recent data available), 37,223 veterans with at least one diagnosed mental health condition had an active prescription for at least one stimulant, according to a VHA official. Among these veterans, 2,360 had a co-occurring cardiac condition.Sudden death, stroke, or other cardiac events have been reported with stimulants. The U.S. Food and Drug Administration has stated that stimulants should generally not be used in patients with serious heart problems or for whom an increase in blood pressure or heart rate would be problematic. See U.S. Food and Drug Administration, FDA Drug Safety Review Communication: Safety Review Update of Medications Used to Treat Attention-Deficit / Hyperactivity Disorder (ADHD) in Adults, accessed March 1, 2019, https://www.fda.gov/Drugs/DrugSafety/ucm279858.htm. In addition to the contact named above, Hernán Bozzolo (Assistant Director), Kaitlin Asaly (Analyst-in-Charge), Jennie F. Apter, Karen Belli, Topher Hoffmann, and Rebecca Rust Williamson made key contributions to this report. Also contributing were Rich Lipinski, Diona Martyn, Vikki Porter, and Jennifer Whitworth.", "summary": "In fiscal year 2018, of the roughly 6 million veterans who received services from VHA, approximately 2 million had a diagnosis for at least one mental health condition. Treatments for such mental health conditions can include psychotropic medications or non-pharmacologic therapies, which can be prescribed or offered by VA providers in outpatient settings including primary and specialty care. GAO was asked to review how mental health treatment decisions are made by providers in VAMCs and monitored by VHA. This report examines, among other things, (1) factors that contribute to providers' treatment decisions for veterans with mental health conditions, (2) VHA's guidance for documenting mental health treatment plans, (3) VHA's monitoring of whether providers document their consideration of different treatment options, and (4) VHA's efforts to improve the treatment of veterans prescribed psychotropic medications. GAO reviewed VHA documents and a nongeneralizable sample of veterans' medical records from five VAMCs (selected for variety in facility complexity and location); analyzed data on psychotropic medication prescribing; and interviewed VHA and VAMC officials. Officials from the five selected Department of Veterans Affairs (VA) medical centers (VAMC) GAO spoke with reported various factors that contribute to providers' mental health treatment decisions, including decisions regarding the prescribing of psychotropic medications and the offering of non-pharmacologic therapy. Examples of reported factors include: VAMC resources, such as the availability of appointments with mental health providers in specialty care, and the complexity of veterans' mental health conditions, such as the veterans' diagnoses and treatment history. Officials with VA's Veterans Health Administration (VHA) told GAO that specialty mental health care providers are expected to document mental health treatment plans in an easily identifiable way in veterans' medical records, but VHA has not developed guidance explicitly addressing this expectation. For example, VHA's mental health services handbook requires that treatment plans include certain components, but does not specify where to document the plan within a veteran's medical record. As a result, there is a risk that a provider may be unable to readily access information about a veteran's mental health treatment, including the use of medication or therapy, during changes in a veteran's care. VHA has not monitored whether mental health providers in specialty care document the required consideration of different treatment options—such as psychotropic medications or non-pharmacologic therapy—within mental health treatment plans. VHA officials told GAO that VHA relies on the Joint Commission (an independent, not-for-profit organization that accredits and certifies health care organizations) to assess specialty mental health treatment plans as part of the organization's accreditation process for each VAMC. However, the Joint Commission's standards do not specifically assess whether providers consider different treatment options. As a result, VHA cannot ensure that providers are considering all available treatment options and providing the most appropriate treatments to each veteran. VHA has taken steps to improve veterans' mental health treatment through the Psychotropic Drug Safety Initiative (PDSI)—an initiative focused on the safe and effective prescribing of certain psychotropic medications. For example, the first phase included a performance metric aimed at decreasing the percentage of veterans with post-traumatic stress disorder receiving one or more outpatient prescriptions for a benzodiazepine (a medication used to treat anxiety) because of risks associated with the medication. VHA reported a nationwide 5.4 percentage point decrease in the prescribing of this medication for these patients, as well as improvements in the majority of the initiative's other performance metrics. VHA should (1) disseminate guidance reflecting its expectation that providers document mental health treatment plans in an easily identifiable way, and (2) implement an approach for monitoring whether these treatment plans include consideration of treatment options. VHA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The FMS program is intended to strengthen the security of the United States and partner countries. To accomplish this mission, DOD sells a variety of types of items and services to foreign partners. These sales can range from fighter jets and integrated air and missile defense systems to combat helmets and training on the use of items. (See figure 1.) According to DOD and State officials, FMS provides multiple benefits to foreign governments and the U.S. government. Foreign governments that choose to use FMS rather than direct commercial sales receive greater assurances of a reliable product, benefit from DOD’s economies of scale, improve interoperability with the U.S. military, and build a stronger relationship with the U.S. government. From the U.S. perspective, FMS expands the market for U.S. businesses and contributes to foreign policy and national security objectives. While State reviews and approves FMS purchases, DOD is responsible for program implementation. The responsibilities of DOD components vary: DSCA: DSCA is responsible for administering the FMS program for DOD, including overseeing the FMS transportation accounts’ operations and balances. DSCA also sets policies for the FMS process, including for how FMS-purchased items can be transported and how DOD will calculate the fees purchasers will pay to reimburse DOD for any costs of transporting the items. DFAS: DFAS provides DSCA’s accounting services for FMS and is responsible for accounting, billing, disbursing, and collecting funds for the FMS program. Military departments: The Departments of the Air Force, Army, and Navy are the primary DOD agencies that coordinate with purchasers to prepare and execute FMS agreements, including planning transportation, if necessary. U.S. Transportation Command (TRANSCOM): TRANSCOM supports transportation planned by the military departments to be conducted through the Defense Transportation System (DTS), which consists of military and commercial resources. Although FMS shipments may receive transportation support through TRANSCOM headquarters, the primary TRANSCOM components providing FMS transportation are the Military Surface Deployment and Distribution Command, which provides defense transportation by sea, rail, or highway, and the Air Mobility Command, which provides defense transportation by air. Contracts between TRANSCOM and private transportation service companies can provide additional commercial resources through DTS. DFAS processes bills to reimburse the TRANSCOM components and private transportation service companies for the costs of performing these transportation services. Foreign partners who purchase items and services through the FMS program may use their own funds or, if provided, U.S. funds, such as grants or loans provided through Foreign Military Financing. In addition, some FMS purchases are made using funds appropriated to DOD, State, or other U.S. government agencies for Building Partner Capacity (BPC) programs. These programs purchase items or services for foreign partners through FMS. Foreign partners and BPC programs have different options available to them for transporting items they purchase through FMS. With the exception of certain hazardous or sensitive items that must be transported via DTS, foreign partners have the option to arrange for their own transportation of FMS items they purchase, such as using a freight forwarder, for all or part of the transportation needed to reach the final destination. On the other hand, BPC programs use DTS to move all their FMS purchases. There are two ways DOD calculates the fees it charges FMS purchasers to use DTS that lead to collections into the FMS transportation accounts. Percentage of price. DOD most commonly calculates the FMS transportation fee using a percentage rate that is applied to the price of the item. The percentage rate varies depending on the extent of the U.S. government’s responsibility for transporting the items purchased, such as whether the U.S. government will transport the items to their final destination or to an intermediate destination. As seen in table 1, since fiscal year 2007, DSCA changed the rates in fiscal years 2009 and 2018. Over the full period, the transportation fee has been as high as 22.25 percent of purchase price, or as low as 2.75 percent, depending on where purchasers want to take custody of their items. Price per item. DOD may instead charge the FMS purchaser an estimated transportation price per item for certain types of items, such as those containing sensitive or hazardous materials. Eight transportation accounts within the FMS trust fund are used to hold transportation fees collected from FMS purchasers and to pay FMS transportation bills. In aggregate, we refer to these as the combined FMS transportation accounts: Main account. One main account holds transportation funds for all foreign partner purchasers and smaller BPC programs. BPC accounts. Seven segregated accounts hold transportation funds for certain larger BPC programs, such as the Afghan Security Forces Fund and the Iraq Security Forces Fund. DSCA created the first four BPC accounts in fiscal year 2012, one in fiscal year 2015, and two more in fiscal year 2018. Individual shipments trigger collections into and expenditures from the FMS transportation accounts. As shown in figure 2, after DOD ships an item and DFAS is notified of that shipment, DFAS moves the amount of the related transportation fee from the country account or BPC program account into the related transportation account and records the amount as a collection. Once DFAS collects funds into a FMS transportation account, funds are generally no longer segregated or tracked by their originating country or BPC program account. DFAS receives monthly bills from TRANSCOM that include the costs for FMS transportation, which DFAS pays out of the main transportation account, recording the amount paid as an expenditure. For FMS shipments associated with the seven larger BPC programs, the main account is then reimbursed from the appropriate BPC transportation account. Although aggregate FMS transportation fees are expected to approximate costs over time, we found that the combined FMS transportation account balance grew by over 1,300 percent from fiscal years 2007 to 2018. The ending balance for fiscal year 2018 was $680 million. Collections and expenditures for the account fluctuated from year to year, but collections have outpaced expenditures since 2014, particularly for the main transportation account, which has grown more quickly than the combined seven BPC accounts. The combined balance of the eight FMS transportation accounts grew substantially from the beginning of fiscal year 2007 through the end of fiscal year 2018—from $46 million to $680 million, or by 1,378 percent. As shown in figure 3, much of that growth occurred from the end of fiscal year 2011 through fiscal year 2018, during which time the account grew by approximately $630 million. This substantial recent balance growth was in contrast to balance activity from fiscal years 2007 to 2011, when the collections into the account more closely approximated the expenditures from the account. In fact, the FMS transportation account was at risk of insolvency starting in fiscal year 2009. In response, DSCA redistributed $80 million in fiscal year 2009 and $50 million in fiscal year 2011 from the FMS administrative fee account to the main FMS transportation account to ensure it contained sufficient funding to pay transportation bills. If not for the redistributions between accounts, the transportation account may have been unable to disburse payments from the account, for at least some parts of fiscal years 2009, 2010, and 2011. Collections and expenditures both fluctuated from year to year, as shown in figure 4. Year-to-year changes in collections ranged from decreases of 54 percent to increases of 121 percent, while year-to-year changes in expenditures ranged from decreases of 52 percent to increases of 133 percent. According to DSCA officials, demand for transportation of FMS purchases through DTS is unpredictable, and the accounts’ balances may experience volatile swings due to inconsistencies involved in billing the accounts. For example, delays in billing or reporting a particular shipment can result in DOD collecting the fee into the transportation accounts and reimbursing the transportation cost from the accounts at different times. Further, the fees collected and the costs expended for an individual shipment may differ because DOD uses different factors to calculate the transportation fee to charge the purchaser (e.g., the item’s value) than it uses to calculate the cost to bill the FMS transportation accounts (e.g., the shipment’s origin, destination, and weight, among other factors). Despite this volatility over time, from fiscal years 2014 to 2018, collections consistently exceeded expenditures, which drove the substantial balance growth. In figure 4, we show this relationship in a collections-to- expenditures ratio, for which a value of 1.0 would indicate collections equaled expenditures for the fiscal year. A ratio greater than 1.0 indicates an increasing account balance that fiscal year. The average collections- to-expenditures ratio for fiscal years 2007 to 2018 was 1.26; from fiscal year 2014 to 2018, this ratio ranged from 1.46 to 4.97. At the end of each fiscal year, any collections that exceed expenditures remain in the account and are carried over to the next fiscal year’s beginning balance, which contributes to balance growth from year to year. Much of the recent combined balance growth has been driven by growth in the main account’s balance, as shown in figure 5. The main account grew more quickly than the combined balance of the BPC accounts from fiscal year 2013–the first full year of operation for the BPC accounts–to fiscal year 2018. The main account grew by 316 percent, from $140 million at the beginning of fiscal year 2013 to $582 million at the end of fiscal year 2018, while the combined BPC accounts grew by 88 percent, from $52 million to $98 million, during the same time period. As seen in figure 6, our analysis shows that, for fiscal years 2013 to 2018, collections exceeded expenditures more frequently and by a greater extent in the main account than in the BPC accounts, which has driven balance growth. On average during this period, collections exceeded expenditures for the main account by $74 million per year, as compared to $7 million per year for the BPC accounts. DSCA officials speculated that BPC programs may use more air transportation for shipments to areas without regular TRANSCOM shipment routes, which may result in higher expenditures. DSCA officials could not provide any further explanation for why the main account’s balance has grown more quickly than the balances of the BPC accounts. DSCA has limited management oversight guidance for the FMS transportation accounts, which has contributed to their substantial balance growth. DSCA has established internal guidance for its two main management oversight processes to monitor for significant changes in the FMS transportation account balance—a daily review and annual review— but this guidance is unclear and lacks key details. As a result, DSCA’s implementation of these processes lacks rigor and DSCA’s reporting to its management has not included complete information about the causes for recent balance growth. In addition, DSCA has no internal guidance to ensure that funds remaining in BPC-specific transportation accounts after the related programs close are transferred to the miscellaneous receipts of the Treasury, which risks these funds not being transferred as DOD officials told us DOD intends to do. In fiscal year 2016, DSCA established a Managers’ Internal Control Program (MICP) for overseeing the FMS transportation accounts, according to DSCA officials. These procedures formalized two management oversight processes for the FMS transportation accounts that DSCA officials had performed previously: daily and annual reviews. These reviews both serve the purpose of ensuring the accounts have sufficient funds to pay expenses. MICP documentation to help guide these processes includes flow charts that explain certain steps that should be included in each of these reviews, a risk assessment that explains how each of the MICP processes mitigates risks for the FMS transportation accounts, and test procedures that lay out expectations for how each MICP process should be conducted so that DSCA can periodically test to ensure the processes were carried out as intended. Daily review. MICP procedures indicate that DSCA staff should review a report from DFAS daily that includes the previous day’s balances for each of the transportation accounts to ensure that the FMS transportation accounts do not drop below a “healthy level.” If DSCA staff identify a large decrease or “significant” level of change in the accounts, the procedures direct them to ask DFAS to explain what caused the change and to take corrective action, such as to ask for billing corrections, if necessary. According to the MICP risk assessment, the FMS transportation accounts experience volatile swings due to inconsistencies involved in billing the account, and reviewing the account balances on a daily basis helps to address this risk. The MICP procedures state that, if DSCA allows the FMS transportation accounts to drop below this “healthy level,” the accounts could become insolvent and be delinquent in disbursing transportation expenses. Annual review. MICP procedures indicate that DSCA should annually assess the financial health of the transportation accounts, which DSCA staff have stated they implement by preparing an annual report for DSCA leadership. To test whether the annual review has occurred, certain DSCA staff are to examine the annual report to confirm that DSCA assessed the FMS transportation account with the purpose of ensuring that the overall financial health of the accounts is strong and collections are sufficient to pay expenditures. DSCA has inconsistently implemented its daily reviews due to unclear internal guidance on these reviews. Specifically, the guidance does not specify the level of change that warrants further examination or what DSCA staff should consider as a healthy level, or target range, for the accounts. DSCA’s daily review procedures are meant to monitor for significant changes in the FMS transportation accounts so that such changes can be further examined and, if needed, corrected; however, MICP internal guidance does not establish criteria for determining what constitutes a significant change in these accounts’ balances. According to federal internal control standards, management should define the acceptable level of variation in performance, or risk tolerance, in specific and measurable terms. However, the MICP procedures use different and undefined terms when referencing the types of balance changes DSCA should look for in their daily review procedure. These terms include: “change,” “significant change,” and “significant reduction.” Although some of these terms could be interpreted as DSCA needing to monitor for any significant changes—whether increases or decreases in the accounts— DSCA staff have chosen to focus these reviews on decreases. As a result of DSCA’s unclear internal guidance, DSCA staff have inconsistently determined which changes warrant examination and should trigger them to contact DFAS to examine the reasons for the change. This makes it less likely that DSCA will be alerted to and take corrective action to address significant changes in the account balances. From fiscal year 2018, DFAS was able to provide one documented instance of DSCA staff contacting DFAS as a result of the daily review. The contact was regarding an 11 percent balance decrease of approximately $6 million in the Afghan Security Forces Fund’s transportation account that occurred on July 5, 2018. However, we identified a total of 30 instances of balance changes greater than 11 percent (12 decreases and 18 increases) in fiscal year 2018 across the eight FMS transportation accounts. For example, figure 7 shows the fiscal year 2018 daily balance changes for the Afghan Security Forces Fund. This figure includes the July 2018 balance decrease that resulted in DSCA contacting DFAS to examine the change, as well as nine other instances of balance changes greater than 11 percent that did not result in any documented contact between DSCA and DFAS. By inconsistently conducting daily reviews, DSCA weakens the effectiveness of this oversight mechanism to identify potential errors, which risks allowing either insufficient or excessive funds in the accounts. In particular, in recent years, the lack of clarity on what these reviews should monitor for has weakened DSCA’s oversight and contributed to the substantial balance growth. DSCA has not defined what it considers an acceptable target range for these accounts despite the unpredictability of transportation account balances and the MICP daily review procedures requiring DSCA officials to monitor account balances to ensure they remain at or above a “healthy level.” According to DSCA officials, DSCA has not determined an acceptable target range for the transportation accounts because future collections and expenditures are difficult to predict, making it difficult to know how much money DSCA needs in the accounts. However, this unpredictability makes it all the more important for DSCA officials to establish a target range for what is “healthy” account activity to enhance their oversight of the accounts. As we previously reported, to ensure the accountability of fee-funded programs and the ability to manage a program with sufficient reserves, federal agencies are advised to use a risk-based strategy to establish desired upper and lower bounds for account balances. DSCA has already established upper and lower bounds for two other FMS overhead fee accounts, the FMS administrative fee and contract administration services fee accounts. DSCA calculates these bounds based on the amounts of planned expenses from the accounts, which automatically adjusts the bounds over time to reflect the size and needs of the FMS program. DSCA’s internal guidance states that setting upper and lower bounds of acceptable levels provides the agency with a “control box” to alert it to a dramatic change in the FMS operating environment that may require an agency response such as a fee rate review. Similarly, establishing a target range, with an upper and lower bound, for the FMS transportation account balances could strengthen DSCA’s ability to use its daily reviews to manage the accounts’ volatility by identifying when the account balances are growing excessively high or falling excessively low. Such an upper bound could better inform DSCA leadership and help prevent excessive growth in the transportation accounts while a lower bound could help to ensure that the accounts have sufficient funds to pay for transportation bills. DSCA has no internal guidance for its staff to follow when preparing annual reports on the health of the FMS transportation accounts, which has led the reports DSCA produced for fiscal years 2015 to 2018 to contain incomplete information on the underlying causes for the trends in the accounts and for the reports to lack key details about the source of some of the funds in the main FMS transportation account. For fiscal years 2015 to 2018, DSCA produced annual reports assessing the financial health of FMS transportation accounts that contained incomplete information because DSCA did not use rigorous methods to determine the underlying causes for trends in the accounts. As a result, DSCA had a limited ability to make informed decisions about the accounts at a time when the balances were experiencing substantial growth. According to the DSCA staff who produce the annual reports, they distribute the reports within DSCA up to the agency’s Director to provide information about the health of the FMS transportation accounts. DSCA’s annual reports on the FMS transportation accounts for fiscal years 2015 to 2018 followed a consistent format. These reports contained information on the net change in balances for each of the transportation accounts during the fiscal year. The reports also included a summary of any major activity in each of the accounts. For example, the fiscal year 2018 assessment stated that the main FMS transportation account grew by $77.8 million during that fiscal year due to several large collections significantly greater than billings. All of the reports end with a conclusion regarding the health of the accounts, which for fiscal years 2015 to 2018, was that the accounts were healthy and should remain financially solvent. All of these annual reports also include statements regarding the underlying causes of account trends, which we found to be incomplete and unsupported by rigorous data analysis. When discussing reasons for year-to-year account balance increases, DSCA’s reports stated they were mainly due to a decline in oil prices and a legal change that DOD implemented in July 2014 that allowed TRANSCOM to charge lower DOD rates for FMS air shipments, both of which could likely affect expenditures from the account. However, DSCA officials said that they conducted no specific analysis to support the extent to which these two factors affected the account balance increases. As seen in figure 8, our analysis shows that these reasons could not fully explain the account balance increases in each of the annual reports from fiscal year 2015 to 2018. In particular, while FMS transportation expenditures began to decrease in fiscal year 2012, the price of oil did not begin to significantly decline and the legal change did not come into effect until 2014. Further, the annual reports did not discuss underlying reasons for trends in collection activity, which also affect the account balance. DSCA’s analysis for its annual reports is limited by the lack of internal guidance for completing these reports. Specifically, the MICP guidance for the annual review process does not specify how to prepare the annual report. Without such guidance, according to DSCA officials, DSCA’s analysis for the annual reports has involved re-reviewing the documentation related to the daily reviews as well as monthly reviews that DSCA performs for financial oversight purposes. DSCA officials completed no additional analysis to inform the annual reports, such as any quantitative analysis to understand annual changes or trends over time. Federal internal control standards state that effective internal guidance communicates the who, what, when, where, and why of what needs to be accomplished, and that management should obtain relevant data from reliable sources and process that data into quality information to aid decision making. Without clear internal guidance, the annual account reviews lack the rigor necessary to ensure DSCA management is provided reliable information for decision making. According to DSCA officials, DSCA’s annual review process should also involve an assessment of whether funds should be redistributed between the FMS overhead fee accounts; however, DSCA does not have specific internal guidance on when and how to perform such assessments or on what to include about this portion of the annual review in its resulting annual reports. This lack of guidance has led DSCA to produce annual reports without information related to redistributed funds and to not conduct assessments related to redistributed funds. According to DOD’s financial management regulations, DSCA and DFAS should periodically review activity in the FMS overhead fee accounts to serve as a basis for decisions by DSCA management to, among other purposes, redistribute account balances between these accounts. According to DSCA officials, if they were to perform these periodic assessments, they would perform them as part of their annual account reviews. However, the MICP guidance for the annual reviews does not describe how to assess whether or how much to redistribute funds between the fee accounts, or how or when to assess returning previously redistributed funds. The annual FMS transportation account and administrative account assessments for fiscal years 2015 to 2018 do not report that $130 million in the main FMS transportation account came from funds redistributed from the FMS administrative account between fiscal years 2009 and 2011 that have not been returned. According to DSCA officials, they only report redistributions in the year that they occur. In addition to not including this information in its annual reports, DSCA has not assessed the need for other redistributions of funds between the FMS fee accounts since it last redistributed funds from the FMS administrative account to the main FMS transportation account in fiscal year 2011. DSCA officials indicated they intend to return the funds to the administrative account but have not done so because they have no urgency, given that the FMS administrative account balance has been consistently above its lower bound in recent years. As of the end of fiscal year 2018, the FMS administrative account balance was approximately $4.7 billion, which was approximately $3.1 billion more than the account’s lower bound that DSCA determined was necessary to support FMS operations. The lack of specific internal guidance on how to assess and report redistributions has resulted in incomplete reports to DSCA management, which inhibits DSCA management’s ability to make informed decisions in overseeing the FMS fees. In particular, without reports that clearly state the amount of redistributed funds and their source(s), and assess their continued need, DSCA management is less informed when determining whether and when to redistribute funds, including whether to return previously redistributed funds. According to our User Fee Design Guide, assigning costs to identifiable users can promote equity and more informed rate-setting; however, redistributing fees from the FMS administrative account to the main FMS transportation account has intermingled funds that have different sources. DOD charges the FMS administrative fee to all FMS purchasers while DOD charges the FMS transportation fee to only certain purchasers for the portion of the transportation of their FMS items that uses DTS. Distributing funds from the FMS administrative account to the main FMS transportation account intermingled these fees, which has two main effects. First, not returning redistributed funds if the transportation account no longer needs them raises concerns regarding the fees’ equity in ensuring only the beneficiaries of a service pay for the cost of providing it. Second, the appropriateness of DSCA management’s rate-setting decisions for both fees is limited by incomplete information about the full expected balance of the fee accounts from which future expenditures could be paid. DSCA has no internal guidance to ensure proper disposition of any funds remaining in the BPC-specific transportation accounts after the related programs close and those remaining funds are no longer needed. In fiscal year 2020, DSCA expects the first BPC-specific transportation account to close, which had a balance of approximately $42 million at the end of fiscal year 2018. DSCA officials have said that funds remaining in the BPC-specific transportation accounts after the related programs close should be transferred to the miscellaneous receipts of the U.S. Treasury. According to DSCA officials, this process was agreed to with DOD’s Office of the Under Secretary of Defense (Comptroller) in November 2011 when DSCA met with that office to discuss how DSCA would handle creating the BPC-specific transportation accounts. DSCA officials also said that following this process would be in line with a requirement in DOD’s financial management regulations for any collections that are authorized or required to be credited to an account after that account’s closure to be deposited in the Treasury as miscellaneous receipts. However, DOD officials could not provide a documented agreement from the November 2011 meeting, and we do not consider the referenced regulation specific enough to this circumstance to alone serve as internal guidance that would ensure the funds are transferred. In particular, this regulation applies broadly to DOD collections received after an account’s closure, and does not specifically address the disposition of funds that had already been collected into an account upon the closure of that account . Officials from relevant DOD components have different understandings of how this process should occur, which could risk the process not being completed as intended without related specific internal guidance. According to DSCA officials, DFAS will be responsible for moving any remaining funds in these transportation accounts to the miscellaneous receipts of the Treasury, but the pertinent DFAS officials have stated they are unaware of what should be done in such circumstances. According to DSCA officials, they intend to write a memo to DFAS related to each instance of a BPC-specific transportation account closure instead of providing DFAS written guidance to follow in any such instance because DSCA officials prefer providing specific directions to DFAS regarding moving such funds. DSCA officials said they do not need specific internal guidance to ensure they direct DFAS to complete such fund transfers because DOD’s Office of the Under Secretary of Defense (Comptroller) would ensure that DSCA does so when that office reviews all DOD accounts. However, Comptroller’s Office officials stated that, as part of DSCA’s program oversight responsibilities for FMS, DSCA is responsible for ensuring any funds are identified and transferred to the miscellaneous receipts of the Treasury. Without clear internal guidance, DOD may not have accurate information on or sufficient oversight of its budgetary resources and account balances, and funds that could be put to other uses may remain in the BPC transportation accounts. Federal internal control standards state that effective internal guidance communicates the who, what, when, where, and why of what needs to be accomplished, thereby providing a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. According to DSCA officials, the first BPC-specific transportation account likely to close is dedicated to the Iraq Security Forces Fund, which had a balance of approximately $42 million at the end of fiscal year 2018. According to DSCA records, this program’s appropriations were canceled at the end of fiscal year 2017 and, according to DSCA officials, by sometime in fiscal year 2020, the program’s FMS cases should go through their final reconciliation process. Through this process, DOD may pay outstanding bills or correct accounting errors and the related cases will close. According to DSCA officials, the BPC-specific transportation account would then be ready for closure. DSCA’s processes for setting the FMS transportation fee do not ensure that aggregate fees DOD collects approximate aggregate transportation costs over time, thus contributing to recent growth in the FMS transportation account balances. DSCA’s ability to set appropriate transportation fee rates is undermined by DSCA’s unclear guidance to the military departments on what data they should provide DSCA to analyze in its transportation fee rate reviews, leading DSCA to review data that is not timely or systematically sampled. Further, the lack of clarity in its internal guidance for these reviews has led DSCA to complete these reviews infrequently, perform limited analysis, and burden the military departments with compiling data DSCA did not use. In addition, our analysis raises concerns about negative effects of the current transportation fee rate structure, including that the structure makes it more difficult for DSCA to determine appropriate transportation fee rates. Finally, DSCA’s internal guidance to the military departments for estimating transportation prices, instead of rates, for certain items lacks key specific details. As a result, the military departments follow varying procedures for estimating these prices, and are unsure of the prices’ accuracy. DSCA’s ability to set appropriate transportation fee rates is undermined by unclear guidance for its reviews of these rates. The lack of clear guidance has led the military departments to provide DSCA data that is not suitable for rate-setting decisions because, while the individual data points DSCA analyzed were accurate, they may not accurately predict future rates because they were not timely or systematically sampled. Unclear guidance also led DSCA to perform infrequent and limited analysis of these data. DSCA’s ability to determine the appropriate FMS transportation fee rates is limited by the data analyzed in its rate reviews that are not timely or systematically sampled. According to its MICP documentation, DSCA is to review its FMS transportation fee rates to ensure the resulting transportation fees collected from FMS purchasers in aggregate cover the amount needed to pay for transportation expenses. DSCA requests the military departments provide historical data on transportation fees charged and transportation costs paid so that DSCA can analyze these data to determine appropriate fee rates. However, DSCA’s data requests to the military departments are unclear in multiple key respects, which leads the military departments to provide data to DSCA that—though it contains accurate cost and fee data—are unsuitable to use for DSCA’s resulting rate-setting decisions because it is not timely or systematically sampled. The combined effects of these deficiencies could skew DSCA’s rate review process. When DSCA requests data from the military departments for the rate reviews, DSCA does not specify key elements about which data to provide or which information sources to use to obtain each data element. As a result, the departments have followed different processes and provided data that was not timely. As shown in table 2, the data submitted by the military departments varied significantly. Because DSCA’s data requests did not specify where the data should be sourced, the military departments have had difficulty responding to these requests and the amount of data they have produced has been limited. Military department officials explained difficulties finding the necessary data in other DOD agencies’ systems, understanding those data’s reliability, and accurately matching the data across multiple systems. In particular, transportation cost data is stored in multiple TRANSCOM billing systems, which military department officials responsible for responding to DSCA’s data requests said they do not regularly access. In addition, DFAS has copies of transportation cost data in the monthly bills that it pays from the FMS transportation accounts. The bills include the individual costs of each shipment made during that month, but are stored in individual documents and are not accessible to the military departments. Transportation fee data is available in a DFAS system used to process the FMS transportation fee, but, according to DFAS documents and officials, this system is not built to easily extract such data and therefore neither DFAS nor the military departments can reliably pull fee data from this system specific to particular shipments or cases. According to DSCA officials, ultimately DSCA only used Army data for setting rates in 2018 because Navy and Air Force provided relatively small samples. Navy. Navy officials reported having particular difficulty finding data on transportation costs for the most recent rate review. After unsuccessfully requesting more specific guidance or assistance from DSCA and DFAS, according to Navy officials, Navy found a spreadsheet DSCA had provided Navy for an unrelated purpose that contained the costs for Navy FMS shipments moved by TRANSCOM’s Air Mobility Command. According to Navy officials, because researching the individual transportation fees for each FMS shipment was time-consuming and they lacked clear guidance about how much data DSCA needed for its rate review, they decided to provide related fee data on 103, or 3 percent, of the 3,536 air shipments for which Navy had cost data. Air Force. The U.S. Air Force Security Assistance and Cooperation Directorate has developed a detailed process, described in a 280- page internal guidance document, to respond to DSCA’s requests, but following this process does not yield much data. For the most recent review, Air Force provided DSCA with data for 639, or 2 percent, of 28,886 shipment orders for which they reviewed data because of the difficulty of finding relevant matching cost and fee data across the different systems used, as shown in table 3. Not only were the data DSCA reviewed not indicative of all FMS shipments since they included no Navy or Air Force data, the data were also not indicative of Army’s shipments and included older data because the DSCA data requests were unclear. In particular, DSCA’s data requests stated that each military department should provide at least 20 cost and fee comparisons for each fee rate for each of the FMS transportation accounts, and requested that these data include as many different foreign partners or FMS cases as possible. As a result, according to Army officials, the data Army provided to DSCA included a mix of different partners and cases of different dollar values; however, no systematic sampling methods were used that would have ensured that the resulting data were indicative of overall Army shipments during the time period covered. Also, DSCA’s request did not specify a time period the data should cover. Army provided data for cases that likely were at least 5 to 7 years old. According to DSCA officials, if the rate review is to analyze case-level data, such as Army provided, it is necessary to analyze data on cases for which the FMS agreements were signed multiple years prior, because shipments may not take place until multiple years into cases. However, the Army officials we spoke to about the data Army provided were unaware how long ago the shipments occurred for the related cases, and stated that some may have occurred years before. TRANSCOM pricing changes annually, so cost information that is multiple years old and not adjusted to reflect such changes would be unlikely to predict future costs. As a result, DSCA set rates to cover future costs based on a sample of cases that was not systematically sampled and may have included shipments over the past 5 or more years. DSCA officials stated that their data requests are not more specific because they thought the military departments had direct access to these data and that more specificity would hinder the military departments’ ability to respond to the requests. However, related data are available in TRANSCOM and DFAS, instead of military departments’, systems. Further, the current processes produce data that are not timely or systematically sampled, making it unsuitable to use to determine future costs and rates. In setting user fees, agencies should analyze timely and reliable data, consistent with applicable accounting standards, to avoid the risk of making skewed fee-setting decisions. DSCA’s use of data that are not timely or systematically sampled for its rate reviews could skew its rate-setting decisions, ultimately affecting transportation account balances. DSCA’s internal guidance for its rate reviews is unclear regarding the timing of the reviews and lacks key details, which has limited DSCA’s ability to use the rate review to set appropriate rates. Timing. DSCA’s internal guidance for overseeing the FMS transportation accounts is unclear. In one part the guidance indicates that DSCA should conduct a rate review every 5 years, which is in line with the expectations explained by DSCA officials who oversee these accounts. However, other parts of DSCA’s internal guidance indicate that DSCA should conduct such a review annually. How reviews should be conducted. DSCA’s internal guidance states that the rate reviews should allow DSCA to determine whether current transportation fee rates are sufficient, based on predetermined criteria, to cover the related costs. However, this internal guidance does not specify how these criteria should be determined or contain any procedures regarding how DSCA should analyze the data collected for its rate review. DSCA has not completed its transportation fee rate reviews in a timely manner, which allowed the FMS transportation account balances to grow over recent years as collections consistently exceeded expenditures but fee rates remained constant. Since fiscal year 2007, DSCA has completed two reviews more than 9 years apart: in March 2009 and May 2018. For these reviews, DSCA officials did not predetermine criteria for the level of alignment between cost and fee that each review should achieve and DSCA’s analysis considered few factors and involved a limited analysis of only Army data, which hindered DSCA’s ability to set appropriate fee rates. In particular: Fiscal year 2009: For this review, DSCA compared the transportation cost to the transportation fee charged across seven transportation fee rates for 144 of the thousands of Army’s FMS cases. In this sample, the transportation costs exceeded the fees paid by 19 percent overall. When briefing DSCA management on the review, DSCA officials reported a concentration of undercharges in two of the rates. As a result, DSCA decided to increase these two rates such that, if the new rates had applied to the full sample DSCA analyzed, fees on the cases in the full sample would have exceeded costs by 14 percent. Our analysis of the sample showed that while these two rates had the largest difference in value between the costs and fees, other rates also had large differences within this sample. Specifically, one other rate had a larger percentage of undercharges and three of the other rates had percentages of overcharges exceeding 1,000 percent. However, DSCA made no changes to these other rates. Fiscal year 2018: For this review, DSCA compared the transportation cost to the transportation fee charged across the seven transportation fee rates for a sample that contained data on 993 Army cases. For this sample, on average transportation fees charged to purchasers exceeded transportation costs by 158 percent, with all rates except one overcharging on average. However, when briefing DSCA management on the review, DSCA officials reported incorrect data to serve as the basis for decision making. In particular, according to the DSCA official responsible for the analysis, likely due to an oversight, DSCA included data on only 878 of these cases in the briefing to DSCA management. Total fees for this portion of the sample were 90 percent higher than the related total costs. Based on this limited data, DSCA decided to decrease all of its transportation fee rates such that, if the new rates had applied to the full sample DSCA analyzed, fees would still have exceeded costs by 77 percent, with five of the seven fee rates still exceeding the cost by more than 100 percent for that sample. DSCA officials stated that their intent in this rate review was to lower the rates modestly to see their effect on the account balances; however, their ability to accurately meet this goal is reduced by its lack of specificity and the limited analysis DSCA performed. Given that the data DSCA analyzed for both these reviews was not generalizable to all shipments, the above percentages do not indicate that the rates overall would have affected fees in these exact ways. Instead, DSCA’s decision making may have been further skewed by its method of analysis. In addition to completing these two reviews, DSCA also initiated rate reviews by sending requests to the military departments three additional times for data DSCA did not use, thereby placing an unnecessary burden on the military departments. Specifically, DSCA requested data from the military departments in November 2011, September 2013, and November 2014. After obtaining the data from the military departments, DSCA officials said that management decided DSCA would not analyze the data due to competing priorities, and DSCA did not use these data for any other purpose. Air Force officials said that the months of work put into responding to each of DSCA’s rate review requests seemed like a waste of resources because their data has consistently shown that the transportation fees collected were drastically higher than the related costs and yet the fee remained unchanged for years. To respond to DSCA’s request for data for the fiscal year 2018 rate review, each military department spent between 2 to 4 months of staff time to collect and prepare the data, according to military department officials. Asking for and then not using such data put an unnecessary burden on the military departments and wasted DOD staff resources. Without clearer internal guidance for its rate reviews regarding their timing and the analysis needed, it will be difficult for DSCA management to make appropriate fee-setting decisions based on future rate reviews. Federal internal control standards state that effective internal guidance communicates the who, what, when, where, and why of what needs to be accomplished. According to DSCA officials, DSCA is considering conducting its next transportation fee rate review in fiscal year 2020, with a goal of lowering the FMS transportation account balances. DSCA officials’ ability to meet this goal could be hindered without more clarity about the timing of the reviews and more rigorous analysis that involves explicit goals, such as for the level of alignment between cost and fee or of the account balances. The structure of the FMS transportation fee rate further hinders DSCA’s ability to set appropriate rates. According to DSCA officials, the current rate structure was developed to use data that are easily available, which limits DOD’s administrative burden in calculating the fee. However, our analysis raises concerns about the extent to which the current rate structure may have negative implications for the transportation fee’s equity, efficiency, and revenue adequacy. We have previously reported that fee design should balance ways to encourage greater efficiency, equity, and revenue adequacy while reducing administrative burden on the agency and payers of the fees, as shown in Table 4. These factors interact and often conflict with each other so that tradeoffs among these factors should be considered when designing a fee’s structure. The current transportation fee rate structure limits DSCA’s administrative burden because it relies on only a few factors, which involve easily accessible data, but these factors vary considerably from those TRANSCOM uses to price its transportation. The FMS transportation fee amount charged to purchasers is generally based on three factors, which should be identified in FMS agreements: (1) the price of the item; (2) the foreign destination rate area; and (3) the extent of U.S. government responsibility for transporting the item (e.g., to an inland destination in the continental United States or to a foreign inland or port destination). At the time of the FMS agreement, DSCA and the military departments lack information about other factors that would make it easier for DOD to set fee rates such that fees would approximate the actual cost of the transportation. For example: Mode. DOD may not know how it will move the items at the time of the FMS agreement, and costs vary depending on the mode of transportation, such as by air or a surface vessel. Route. Although DOD should be aware of the final destination for items, DOD may be unaware of where the shipment will originate or the specific route the items will take, and transportation costs can vary depending on the specific route. For example, to transport goods in a 20-foot container on a surface vessel door-to-door from a location on the East Coast of the United States to Afghanistan in fiscal year 2018, TRANSCOM rates ranged from $548.85 to $1,077.03 per measurement ton shipped, depending on the specific route, whereas DSCA’s fee rates would be constant and applied to the price of the items. Also, even if DOD knew the exact mode and route, approximating the exact cost for each shipment would be difficult because TRANSCOM updates its rates annually, and shipments often occur years after signing the FMS agreement. The distinct factors used to determine the fee and cost for FMS transportation make it difficult for the cost and fee to align, which has potential implications for the fee’s equity. Although the data DSCA obtained from the military departments for its fiscal year 2018 rate review was unsuitable for that purpose because it was not timely or statistically sampled, we performed extensive data reliability procedures to determine that the individual cost and fee data points are reliable and as a result analyzed these data to obtain insights into the extent to which the cost and fee were aligned within that sample. As shown in figure 9, we found extreme differences between the transportation cost billed to the FMS transportation accounts and the fee the purchaser paid. Within this nongeneralizable sample, costs and fees were within 10 percent of each other for only 30 of the 1,152 cases or shipments (3 percent), whereas the difference was more than 1,000 percent higher or lower for 492 of the cases or shipments (43 percent). In addition, we identified five instances of the difference between the cost and the fee exceeding 1,000,000 percent. Although these data were not systematically sampled to ensure they would be indicative of the full population of shipments, the high incidence of such large differences is concerning. Within this sample, we also found that certain countries were either always over-charged or always under-charged. Since the rate review data are not generalizable, this pattern may or may not be consistent across FMS shipments. However, such a pattern could plausibly occur due to the differences between TRANSCOM’s and DSCA’s rate areas. Potential concerns about the fee structure’s efficiency and revenue adequacy also stem from the difficulty in aligning the current fee structure with related costs. Efficiency. The large disparities between cost and fee in the current FMS transportation fee rate structure may be leading some FMS purchasers to choose not to use DTS. According to Army officials, some FMS purchasers choose to use their own freight forwarders instead of DTS because of a perception that the FMS transportation fee is too high. These decisions could have broader effects on DTS. According to TRANSCOM, the additional demand from FMS purchasers allows TRANSCOM to better leverage DTS, such as by filling excess capacity with paying cargo and supporting training needs to maintain combat readiness. Revenue adequacy and stability. The potentially large differences between the transportation cost and fee resulting from the current FMS transportation fee rate structure has led to large fluctuations in collections and expenditures over time. For example, in fiscal years 2009 and 2011, DSCA had to redistribute a combined $130 million into the main FMS transportation account from the FMS administrative fee account to cover costs and avoid insolvency. Around the time of the fiscal year 2009 rate review, DSCA began reviewing the fee rate’s structure as part of an overall attempt to address issues related to the transportation account nearing insolvency. As part of that review, DSCA worked with the military departments and TRANSCOM to assess factors such as administrative burden, data availability, and ability to more accurately charge transportation costs to FMS purchasers, which would have enhanced the fee’s equity and efficiency. Specifically, they considered the benefits and costs of six alternative rate structures: Three of the six options would have involved replacing the rate-based fee for some or all shipments, by charging actual transportation costs or estimating likely actual costs per type of item. According to documentation from this review, the DOD agencies said these three options would have placed high administrative burdens on the military departments and required changes to military department or TRANSCOM information systems. The other three options the DOD agencies considered would have modified the structure of the current rate-based fee to take into account additional factors, such as transportation method (e.g., air) and item weight, or creating additional rate areas to target specific locations where costs of transportation were higher. The agencies determined that some of these options would have a lower administrative burden than the first three options. However, DSCA decided to maintain its current fee rate structure and address the potential insolvency through other approaches such as by redistributing funds from the FMS administrative fee account to the transportation account. According to DSCA officials, DSCA made this decision because it could not obtain agreement with the military departments and TRANSCOM on any of the other options. DSCA has not since reviewed the rate structure. DSCA provides internal guidance to the military departments on how to estimate the transportation prices to be charged for certain items, but the internal guidance does not specify key details about how to calculate the estimates. As a result, the military departments follow different procedures for estimating these prices, and individual military department procedures may differ over time depending on staff turnover. Federal internal control standards state that management should use quality financial information that is complete and reasonably free from error, and that effective internal guidance informs users of the who, what, when, where, and why of what needs to be accomplished, thereby helping to retain organizational knowledge. Estimated Transportation Prices for Certain Items For certain items that need to be shipped via the Defense Transportation System, such as goods with sensitive or hazardous materials, and for which charging the transportation fee rate would significantly differ from transportation costs, DOD may instead charge a set transportation price per item. The fees collected from these estimated prices and the costs to transport these items are paid in and out of the FMS transportation accounts. These prices are not location-specific because DOD charges each purchaser of this item the same estimated price. According to DOD officials, such items are often low- weight, high-cost items, such as missiles, for which the usual transportation fee rate could greatly overcharge the FMS purchaser. DSCA’s internal guidance for how to estimate these transportation prices includes limited information and does not take into account key information for accurately estimating transportation costs. Specifically, the guidance lists certain types of transportation cost elements to include and not to include in these price estimates. For example, estimated port handling costs should be included while security costs should be charged to the FMS purchaser separately. The guidance also indicates the estimates should be on a per-item basis with two potential prices to transport each item, one for any transportation within the United States and one for transportation to any foreign destination. Other key factors in transportation costs, such as the transportation mode or specific origin or destination, are not considered. Also, DOD charges these prices per item, although economies of scale can be gained by transporting batches of the same item together. The lack of specificity in DSCA’s internal guidance has led the military departments to adopt inconsistent estimation processes that may not lead prices to approximate actual costs. These inconsistent processes could lead DOD to charge FMS purchasers more or less than DSCA intends and ultimately affect account balances. For example: Origin and destination. The three military departments take different approaches to compensate for having to estimate the cost of transporting an item without knowing its specific origin and destination. Although all military departments follow the same general process of estimating potential transportation costs for commonly used origin and destination ports and averaging these to attempt to estimate these prices, they all use different locations to create their estimates, which leads to different pricing. For example, one command within Army uses a central location within the United States as the origin for its estimates to simulate an average of potential costs for transportation from any continental United States location. However, according to Army officials, another command within Army attempts to ensure that the transportation price estimated will cover costs by simulating a “worst case scenario” by basing its estimates on locations distant from each other. Batch shipments. The military departments also vary in terms of how they estimate per item costs for items that could often be transported in batches. Air Force and Navy calculate how many of an item can fit in a container, and then divide the average price estimated to transport such a container by this batch size to determine final pricing, but Army does not. When Air Force and Navy estimate prices this way, they do not require shipments to be transported in a container of this size or for purchasers to buy or receive these items only in batches of this size, which could lead the price charged to vary greatly from the actual costs. For example, for one type of missile, Air Force determined that 20 of them could fit in a container and therefore divided the average price it had estimated to transport a container by 20 before submitting the price to DSCA. Therefore, if only one of the item were purchased, instead of the 20 built into the estimate, the transportation cost could be about 20 times the fee. The lack of specificity of DSCA’s guidance has also led to large changes in one of the military departments’ estimated prices after staff turnover. According to the Air Force official who prepared Air Force’s 2018 updates to these prices, that was the first year that official estimated these prices after another Air Force official had done so through 2015. The new Air Force official said that Air Force had not updated its prices during the previous 3 years because it lacked rates to estimate the costs of transporting explosive materials by ocean vessel. After receiving guidance from DSCA to exclude these rates from their estimates, the new Air Force official updated the prices for 2018. When doing so, this Air Force official found that some of the updated price estimates were much higher than the prior prices due to increased port handling rates, whereas the prices to transport items to foreign destinations were at times lower due to lower air rates used in the estimates. For example, the price to transport a certain item within the continental U.S. had been set at $278.00 per item for 2015 through 2017, and the 2018 price estimate was $8,447.00. DSCA initially accepted the updated prices, but Air Force later rescinded them after foreign partner countries voiced concerns about the increased prices affecting existing contracts and Air Force was unable to prove that the new estimates better approximated actual costs without the ability to compare actual bills with the price estimates. According to the responsible Air Force official, the calculation process from 2015 was used to recalculate the 2018 prices and was again used for 2019, albeit with current fiscal year rate information, due to continued uncertainty regarding this process. Since late 2016, the military departments have voiced concerns to DSCA regarding the difficulty of following DSCA’s internal guidance to estimate these transportation prices. In particular, in late 2016, Army officials developed a white paper for DSCA that described challenges developing these estimated prices posed by updates to how TRANSCOM calculates its transportation pricing. In September 2018, Air Force officials also raised various concerns regarding the accuracy of the prices, such as concerns about how the batch size of a shipment affects per item costs and the lack of key details affecting transportation costs. Military department officials said they would prefer more specific guidance from DSCA that could help them to more uniformly calculate these prices. In January 2019, DSCA officials stated they were at an early stage of exploring possible changes to the information required to calculate these types of transportation prices. In May 2019, DSCA officials stated that they were still working to define the problem and how it could be addressed. Further research into the military departments’ difficulties in establishing these price estimates and the costs and benefits of the methodologies they use would better inform DSCA on what pricing process could most accurately reflect costs moving forward. FMS is one of the primary ways the U.S. government engages in security cooperation with its foreign partners, by annually selling them billions of dollars in defense items and services. When transporting FMS items on their behalf, DOD charges purchasers a transportation fee such that, according to DOD, it should involve “no profit, no loss”–foreign partners should not be charged excessive fees and fee revenue should cover the program’s operating costs. However, from fiscal year 2007 to 2018, the FMS transportation accounts experienced substantial balance growth of over 1300 percent. To address risks such as the historical unpredictability of collections and expenditures prior to recent dramatic account growth, DSCA implemented processes to conduct daily and annual management oversight of the accounts. However, the effectiveness of these processes is limited by a lack of specific internal guidance. In particular, although the daily reviews are meant to keep DSCA aware of significant changes in the accounts and ensure that they maintain healthy balances, DSCA has not specified what should be considered as significant changes or how to calculate healthy target levels for the accounts. Lack of rigorous annual review processes has also led the annual reports provided to DSCA management to be missing key details. In particular, they have contained incomplete information on the causes for account trends and have omitted information on the source of $130 million that had been redistributed into this fee account from the FMS administrative fee account in fiscal years 2009 to 2011 to address a danger of insolvency that the FMS transportation accounts no longer face. The resulting reports inhibit DSCA management’s ability to oversee the accounts at a time when they have grown so quickly. In addition, a lack of clear internal guidance explaining how to assess when redistributions are needed and when to return unused BPC-specific transportation funds may lead to a surplus of funds in the FMS transportation accounts that could be used for other purposes. Similarly, DSCA has established a process to review FMS transportation fee rates but this process has several weaknesses that may skew DSCA’s rate setting decisions. DSCA’s rate review process involves analysis of historical cost and fee data provided by the military departments, but due to unclear requests to the military departments, the process is burdensome and leads to data that are untimely and unsystematically sampled. Although DSCA requested such data from the military departments five times between fiscal years 2007 to 2018, DSCA only conducted rate reviews using these data twice because DSCA did not prioritize use of its resources for the other reviews. In addition, for the two reviews it did conduct, DSCA never used Air Force or Navy data because unclear guidance from DSCA and difficulties finding sufficient data across disparate DOD information systems limited the data Air Force and Navy could provide. Further, DSCA based their reviews on minimal internal guidance and used limited analysis and unclear criteria upon which to set new rates. The current rate review process and the overall fee rate structure reduce DSCA’s administrative burden, but raise various concerns regarding the fee’s equity, efficiency, and revenue stability. DSCA also has similarly unclear internal guidance for the military departments for situations when the FMS purchaser is charged a set transportation price per item instead of a transportation fee rate. By strengthening these rate setting processes, DSCA would enhance its ability to manage account balances and to make timely decisions to ensure the FMS transportation fee rate is set to cover related transportation costs but not overcharge FMS purchasers. We are making the following 10 recommendations to DOD: The Secretary of Defense should ensure that the Director of DSCA clarify internal guidance for daily account reviews by specifying criteria for the level (such as percentage or dollar amount) of change in transportation account balances that would require DSCA to contact DFAS for further examination. (Recommendation 1) The Secretary of Defense should ensure that the Director of DSCA establish a methodology to calculate a target range, with desired upper and lower bounds, for FMS transportation account balances that could be used to better inform DSCA’s account reviews. (Recommendation 2) The Secretary of Defense should ensure that the Director of DSCA modify the internal guidance for the annual review process to include the specific steps DSCA officials should take in preparing the annual report, including ensuring that they incorporate rigorous analysis into the annual reports. (Recommendation 3) The Secretary of Defense should ensure that the Director of DSCA develop internal guidance related to the redistribution of funds between the FMS trust fund fee accounts. Such internal guidance could include criteria for when to consider redistributing funds between accounts and for when to return those funds, how to analyze the amount of any redistributions needed, and how to clearly report any redistributions to DSCA management. (Recommendation 4) The Secretary of Defense should ensure that the Director of DSCA assess whether funds redistributed from the administrative account to the transportation account should be moved back to the FMS administrative account and document this decision. If the Director of DSCA determines that the funds should be moved back to the FMS administrative account, the Director should ensure the movement of funds in accordance with this decision. (Recommendation 5) The Secretary of Defense should ensure that the Director of DSCA develop internal guidance for the steps that DSCA, in combination with DFAS, should undertake when a BPC-specific transportation account closes to help ensure that any remaining unused funds are transferred to the miscellaneous receipts of the U.S. Treasury in accordance with DOD officials’ stated intention to do so. (Recommendation 6) The Secretary of Defense should ensure that the Director of DSCA create specific internal guidance for how and from where data should be obtained to be used for its transportation fee rate reviews and the timeframes the data should cover to ensure DSCA has a systematic sample upon which to base its rate setting decisions. This updated internal guidance should be based on consultations with the military departments, DFAS, and TRANSCOM on which sources of transportation cost and fee data are the most reliable and comparable for use in its FMS transportation fee rate reviews. (Recommendation 7) The Secretary of Defense should ensure that the Director of DSCA develop specific internal guidance to follow when performing transportation fee rate reviews. Such internal guidance could specify when these reviews should occur; a process to obtain management commitment to complete a review before DSCA requests that the military departments compile data for it; and a process for performing the reviews that includes developing clear, documented goals and an appropriate level of analysis to best ensure that DSCA’s analysis meets those goals. (Recommendation 8) The Secretary of Defense should ensure that the Director of DSCA conduct a review of the current structure of the FMS transportation fee rate, in consultation with other relevant DOD agencies, to determine if other rate structures could better balance considerations related to administrative burden, equity, efficiency, and revenue adequacy. (Recommendation 9) The Secretary of Defense should ensure that the Director of DSCA clarify internal guidance for the military departments on how to calculate the estimated actual transportation prices to charge FMS purchasers for certain items, such as by specifying a calculation methodology. This updated internal guidance should be based on consultations with the military departments, TRANSCOM, and any other relevant DOD components on which sources of data and which calculation methodologies would be most accurate. (Recommendation 10) We provided a draft of this report to DOD and State for review and comment. DSCA provided written comments on behalf of DOD, which are reprinted in appendix II. DSCA concurred with all of our recommendations, and identified actions it plans to take to address them and initial steps it has begun to take toward addressing some of them. We also received technical comments from DOD, which we incorporated in our report as appropriate. State did not provide any written or technical comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of State, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or BairJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) the balances maintained in the Foreign Military Sales (FMS) transportation accounts for fiscal years 2007 through 2018, (2) the extent to which the Defense Security Cooperation Agency (DSCA) established and implemented policies and procedures to help ensure management oversight of the transportation accounts, and (3) the extent to which DSCA processes for setting transportation fee rates ensure that these rates are set appropriately. To examine the balances of the FMS transportation accounts, we analyzed fiscal year 2007 to 2018 overall collections, expenditures, and balance data for each of the individual FMS transportation accounts maintained by the Defense Finance and Accounting Service (DFAS) in the Defense Integrated Financial System (DIFS). We chose to review data from these fiscal years based on data availability. To determine the reliability of these data, we reviewed the data for internal consistency by reviewing for duplicate entries, gaps, and obvious errors, and we compared the data to similar data obtained for a prior review of two other FMS fees. We also reviewed relevant documentation, including annual account assessments conducted by DSCA and the internal control procedures for conducting such reviews. Lastly, we interviewed DFAS and DSCA officials to clarify questions about how to interpret the data. We did not conduct any independent testing of the data obtained from DFAS to determine whether the amounts reflected correct payments made toward accurate billings. As such, when presenting collections and expenditures, we note that they reflect the amount of funds in the aggregate moved into and out of the FMS transportation accounts. We determined the collections, expenditures, and balance data to be reliable for the purpose of showing the movement of funds in and out of the FMS transportation accounts and the accounts’ balances over time. To analyze trends in collections into and expenditures from the FMS transportation accounts, such as in figures 4 and 6, we adjusted the data to remove the effects of two redistributions from the FMS administrative fee account that took place in fiscal years 2009 and 2011, as well as amounts that were moved into certain new Building Partner Capacity (BPC) transportation accounts to initially fund them in fiscal years 2012 and 2015. We reviewed documentation related to the two redistributions of funds from the FMS administrative fee account to the transportation account and the initial funding amounts allocated to new BPC transportation accounts, and interviewed DFAS and DSCA officials to understand how they accounted for these fund movements. To assess the extent to which DSCA established and implemented policies and procedures to help ensure management oversight of the FMS transportation accounts, we reviewed DSCA internal guidance included in DSCA’s Managers’ Internal Control Program (MICP) procedures for daily and annual FMS transportation account reviews, federal internal control standards, our prior report on federal user fees, and documentation showing how DSCA officials implemented those procedures. We also interviewed DSCA officials responsible for these reviews. Daily reviews. We reviewed a DSCA spreadsheet in which DSCA officials documented the daily reviews they conducted in fiscal year 2018. We chose to review this one fiscal year of data because it was the most recent complete fiscal year and would thereby be most relevant to current implementation. We also analyzed these data against the related MICP procedures, interviewed relevant DSCA and DFAS officials, and requested documentation of related correspondence to determine the extent to which DSCA consistently took any actions in response to these reviews. Because the data in these daily reviews is sourced from the same balance data in DIFS as we analyzed for our first objective, we compared the data between the two sources to ensure its consistency, and interviewed DFAS and DSCA officials about how these data were pulled for the daily reports. Based on these steps, we determined these data to be sufficiently reliable for assessing DSCA’s implementation of the daily review process. Annual reviews. We reviewed the annual reports DSCA created for fiscal years 2015 to 2018—all of the years for which DSCA created such reports—and interviewed DSCA officials about their process for creating these reports and other aspects of the MICP procedures for the annual review. To determine the extent to which the annual reports accurately convey information about the causes of trends in the accounts, we compared account expenditures data to oil price data for fiscal years 2007 to 2018. We performed this analysis because DSCA’s annual reports cite declining oil prices as a factor contributing to the increasing account balances in the FMS transportation accounts. For data on oil prices, we analyzed data from the U.S. Energy Information Agency on Cushing, Oklahoma, West Texas Intermediate oil prices by month, which is an established source for these data that is used commonly as a global benchmark for oil prices. As such, we determined these data to be reliable to use for this purpose. We also reviewed legislation that changed the rates the Department of Defense (DOD) can charge for FMS air shipments, and interviewed DSCA and U.S. Transportation Command officials about the effect and timing of this legislative change. We also reviewed the fiscal year 2015 to 2018 annual reports for the FMS transportation and administrative accounts to determine whether the redistributions that had been made from the FMS administrative account to the FMS transportation accounts were clearly reported, and reviewed related internal guidance in DOD’s Financial Management Regulations. For BPC-specific transportation accounts, we reviewed DOD’s Financial Management Regulations and related DSCA documentation against federal internal control standards regarding the clarity of internal control guidance. We also interviewed DSCA officials and received written responses to questions from DOD’s Office of the Under Secretary of Defense (Comptroller) regarding the process DSCA should follow when any of the BPC-specific transportation accounts close. To review the extent to which DSCA processes ensure that transportation fee rates are set appropriately, we reviewed DSCA guidance and interviewed DSCA and military department officials about the different processes DSCA uses to set transportation fees. For the transportation fee rate review, we reviewed DSCA’s MICP procedures and the requests DSCA sent to the military departments for data to analyze in its rate reviews against the Statement of Federal Financial Accounting Standards No. 4, our prior report on federal user fees, and federal internal control standards. To understand the reliability of the data the military departments submitted to DSCA and what these data showed in terms of the alignment between transportation costs and fees, we reviewed the data, including by performing internal consistency checks on the data, such as by reviewing it for duplicate entries, gaps, or obvious errors. We also reviewed any military department procedures for compiling these data and interviewed or received written responses from military department officials responsible for compiling the data. Based on these steps, we determined that these data were reliable for our purposes of making some comparisons between costs and fees for the sample provided. However, as noted earlier in this report, the departments could only provide partial data, which they did not select using systematic sampling techniques to ensure the data were indicative of the full population of shipments. Therefore, we determined that these data were unsuitable for DSCA’s purpose of making fee-setting decisions. We also reviewed DSCA documentation of the analysis it performed for its 2009 and 2018 transportation fee rate reviews, including analysis spreadsheets and briefings to DSCA management on the reviews’ results. Regarding instances when DOD charges FMS purchasers estimated transportation prices instead of a transportation fee rate, we reviewed DSCA guidance on this process in the Security Assistance Management Manual against related federal internal control standards. We also reviewed any internal guidance the military departments have developed to further guide these estimation processes, examples of the military department estimation processes, and other documents that showed concerns regarding these processes that the military departments had previously raised to DSCA. We interviewed and sent questions for written responses to DSCA and military department officials regarding these processes and the military departments’ concerns. We conducted this performance audit from May 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Cheryl Goodman (Assistant Director), Heather Latta (analyst in charge), Adam Peterson, Benjamin L. Sponholtz, John (Ryan) Bolt, Ming Chen, John Hussey, and Brandon Voss made key contributions to this report. Martin de Alteriis, Christopher Keblitis, Grace Lui, Susan E. Murphy, Laurel Plume, Heather Rasmussen, and Chanetta Reed also contributed to this report.", "summary": "The FMS program is one of the primary ways the U.S. government supports its foreign partners, by annually selling them billions of dollars of items and services. According to DOD, the FMS program is intended to operate on a “no profit, no loss” basis, with purchasers not charged excessive fees and fee revenue covering operating costs. Foreign partners can arrange for their own transportation of FMS items or pay DOD a transportation fee to cover the costs of DOD transporting them. The fees are collected into transportation accounts in the FMS Trust Fund. House Report 114-537 and Senate Report 114-255 included provisions that GAO review DSCA's management of FMS fees. This report examines (1) the balances of the FMS transportation accounts for fiscal years 2007 through 2018, (2) DSCA's management oversight of the accounts, and (3) DSCA's processes for setting transportation fees. GAO analyzed DOD data and documents, and interviewed DOD officials. Fees charged by the Department of Defense (DOD) for the transportation of defense items sold through the Foreign Military Sales (FMS) program are intended to approximate DOD's transportation costs over time. However, GAO found that the FMS transportation accounts accrued a combined balance of $680 million by the end of fiscal year 2018. Much of the growth occurred from the end of fiscal year 2011 through fiscal year 2018, when the account grew by approximately $630 million. The Defense Security Cooperation Agency (DSCA) has developed limited management oversight guidance for the FMS transportation accounts, which has contributed to the substantial balance growth. DSCA internal guidance requires daily and annual reviews of the accounts to monitor for significant changes in account balances and to ensure the accounts maintain a “healthy” level. However, internal guidance does not define a significant change or “healthy” level, such as a target range for the account balances. This has led to inconsistent reviews and limited oversight of the recent balance growth. DSCA also has no internal guidance on how to perform certain aspects of its annual reviews or what information to include in the resulting reports. As a result, DSCA officials have produced reports with incomplete information, such as on the causes for trends in the account balances, undermining DSCA management's ability to make informed decisions about the accounts. DSCA's processes for setting the FMS transportation fee do not ensure that aggregate fees approximate aggregate costs. For its transportation fee rate reviews, DSCA sends requests to the military departments for historical cost and fee data that lack specificity, such as on timeframes, sampling methodology, and data sources. As a result, DSCA has analyzed data that are not timely or systematically sampled. In addition, military department officials reported difficulty providing the requested data in part because DSCA's guidance did not specify data sources. Consequently, for the most recent review, Air Force and Navy were unable to find sufficient matching cost and fee data for DSCA to consider them usable. Further, DSCA has established no goals for rate reviews and has no written procedures to follow in performing them. These factors together contributed to recent growth in the FMS transportation account balances and will continue to hinder DSCA's ability to make appropriate rate-setting decisions moving forward. GAO is making 10 recommendations to DOD, including six recommendations to strengthen DSCA's oversight of the transportation accounts—such as by clarifying internal guidance—and four recommendations to improve its transportation fee setting processes. DOD concurred with all of the recommendations and identified actions it plans to take to address them.", "document_type": "gao"}
{"report": "Executive Order 13548 committed the federal government to similar goals stated in an executive order issued a decade earlier and required federal agencies to take additional actions. Specifically, the prior Executive Order 13163 called for an increase in the hiring of individuals with disabilities across the federal government and for agencies to develop plans for increasing employment opportunities for individuals with disabilities. The additional actions stated in Executive Order 13548 specified that federal agencies were to implement strategies for retaining federal workers with disabilities in federal employment, to make increased use of Schedule A excepted hiring authority for persons with disabilities, and to designate a senior-level official to be accountable for meeting the goals of the order and developing and implementing the agency’s plan. In January 2017, EEOC issued a final rule amending the regulations requiring federal agencies to engage in affirmative action for individuals with disabilities. The rule codified many of the requirements placed on agencies by management directives and past executive orders, among other things. Agencies were to begin following the rule in January 2018. The revised regulation requires that agencies take specific steps until they meet specific employment goals set by EEOC for individuals with disabilities and targeted disabilities, provide personal assistance services to certain employees who need them because of a targeted disability, and meet a number of other requirements designed to improve employment opportunities for individuals with disabilities in the federal workforce. OPM, EEOC, and Labor each have roles in advancing the hiring and retention of persons with disabilities in the federal government. OPM is responsible for executing, administering, and enforcing the civil service laws, rules, and regulations. This includes ensuring compliance with merit system principles that prohibit discrimination—including on the basis of disability—in all aspects of personnel management, among other things. Additionally, OPM is responsible for monitoring federal agencies’ implementation of affirmative action programs for disabled veterans, including providing technical assistance and reporting on progress made by agencies. EEOC, in the federal sector, is responsible for enforcing the employment discrimination prohibitions of anti-discrimination laws, including the Rehabilitation Act, which prohibits discrimination on the basis of disability. EEOC is responsible for the annual review and approval of agencies’ affirmative action program plans for the hiring, placement, and advancement of individuals with disabilities. It is also responsible for establishing procedures for handling federal employees’ allegations of discrimination and for providing for the adjudication of complaints and hearing of appeals. Labor’s Office of Disability Employment Policy (ODEP) is to provide national leadership in developing policy to eliminate barriers to the employment of individuals with disabilities in the public and private sectors. ODEP works in collaboration with federal, state, and local agencies, private sector employers, and employer associations to develop and disseminate evidence-based policy strategies and effective practices. The office also assists agencies and employers with adopting such policies and practices. Additionally, Labor administers the Federal Employees’ Compensation Act, which provides workers’ compensation coverage to federal employees for employment-related injuries and occupational diseases. Under Executive Order 13548, each of these agencies were assigned roles and responsibilities often in consultation with each other. For example, OPM, in consultation with Labor and EEOC, was tasked to identify and assist agencies in implementing strategies for retaining federal employees with disabilities. Additionally, OPM was also to consult with Labor, EEOC, and OMB in designing model recruitment and hiring strategies for agencies and developing mandatory training on employment of the disabled. Labor was to consult with OPM in pursuing innovative re-employment strategies and develop policies that foster improved return-to-work of employees who were injured on the job. OMB’s initial role was to convene federal agencies and assist their start- up efforts to implement the Executive Order, according to staff in OMB’s Office of Performance and Personnel Management. OMB staff told us the agency helped to establish a framework for coordination and collaboration among the key leadership agencies focused on making the federal government a model employer for persons with disabilities and to provide support for regulatory and policy initiatives related to disability employment. In 2015, in furtherance of an executive order focused on improving diversity and inclusion in the federal workforce, OMB joined OPM and EEOC and issued a memorandum to all heads of executive departments and agencies announcing the establishment of the Diversity and Inclusion in Government Council. The council initially operated under the direction of OPM, OMB, and EEOC and was formed to provide a forum for improving senior leadership engagement and collaboration on strategic and operational diversity and inclusion priorities. OMB’s role has since diminished as it delegated much of the leadership responsibilities to the other key leadership agencies. For reporting purposes, the federal government distinguishes between two major categories of disabilities: targeted and other disabilities. Targeted disabilities, generally considered to be more severe, include traumatic brain injuries, deafness, blindness, partial or complete paralysis, significant mobility impairments, and psychiatric disabilities, among others. Other disabilities include such conditions as gastrointestinal disorders, cardiovascular or heart disease, autoimmune disorders, pulmonary or respiratory conditions, and learning disabilities. Federal statutes and regulations provide special hiring authorities for people with disabilities. These include Schedule A excepted service hiring authority—which permits the noncompetitive appointment of qualified individuals with intellectual, severe physical, or psychiatric disabilities and appointments and noncompetitive conversion for veterans who are 30 percent or more disabled. To qualify for a Schedule A appointment, an applicant must generally provide proof of disability. Proof of disability can come from a number of sources, including a licensed medical professional, or a state agency that issues or provides disability benefits. The federal government gathers data on the number of individuals with disabilities in the workforce through OPM’s Standard Form 256, Self- Identification of Disability (SF-256). Federal employees voluntarily complete this form to disclose their disability status, as defined by the Rehabilitation Act. Our past work highlighted concerns about the accuracy of data captured in the SF-256. For example, we reported that agency officials and advocates for people with disabilities believe there is an undercount of employees with disabilities because some individuals may not disclose their disability status out of concern they will be discriminated against or precluded from advancement. In addition, employees may develop a disability during federal employment and may not know how to or why they should update their status. Disability status information is confidential and cannot be used to affect an employee in any way. Given our previously reported concerns, we recommended that OPM assess the extent to which the SF-256 accurately measures progress toward the goal of Executive Order 13548 and to explore options for improving the accuracy of SF-256 reporting. To address our recommendation, OPM updated its 2012 Employee Feedback Survey to allow federal employees to confidentially self-disclose a disability and serve as a source of comparison through which OPM could assess the accuracy of the SF-256. Federal agencies exceeded the government-wide goal to hire an additional 100,000 persons with disabilities in the federal government by 2015, according to our analysis of OPM’s EHRI data across the 24 CFO Act agencies. During fiscal years 2011 through 2015, a total of approximately 143,600 persons with disabilities were hired across all positions, which includes full-time permanent positions and part-time or temporary positions. Of those hires, approximately 87,000—61 percent— were hired into full-time permanent positions. Similar hiring continued to increase in 2016 and 2017 as the federal government hired approximately an additional 79,600 persons with disabilities during those 2 years across all positions, of which approximately 49,200—62 percent—were full-time permanent positions. Figures 1 and 2 show the total government-wide number of persons with disabilities and targeted disabilities hired in fiscal years 2011 through 2017. Our determinations of the number of new hires each year were consistently lower than the numbers OPM included in its executive branch reporting. The discrepancy between our numbers and OPM’s reported counts is largely attributed to our exclusion of agency-to-agency transfers in our analysis. For the purpose of our analysis of government-wide hiring, we excluded transfers because we did not consider those to be new hires since those individuals remained employed in the federal government. Figure 3 shows the total government-wide number of persons without disabilities hired during the same time period. According to our analysis, a total of approximately 903,000 persons without disabilities were hired across all positions between 2011 through 2015. Of those hires, approximately 403,900—45 percent—were hired into full-time permanent positions. Hiring continued to increase with an additional 377,150 in 2016 and 2017 combined across all positions, of which approximately 189,200—50 percent—were full-time permanent positions. The data shown in figures 1 and 3, and summarized in Table 1, show that from 2011 through 2017, the percent of hires with disabilities steadily increased from 11 percent to almost 20 percent. Our analysis at the agency level shown in table 2 shows that all agencies increased the percentage of persons with disabilities hired from 2011 through 2017 and almost all agencies increased the percentage of persons with targeted disabilities hired over the same period. Table 2 shows this information by agency for fiscal years 2011, 2015, and 2017. We chose to present these years of data to mark the first and last years of the 5-year period specified in Executive Order 13548 and to also show the most recent data available at the time of our review. As part of our analyses of individuals hired during the 2011 through 2017 time period, we analyzed employee retention in terms of the number of years an individual hired during that time period remained employed. Across the federal government, of the more than 223,000 persons with disabilities hired during the 2011 through 2017 time period, approximately 39 percent of them stayed in the federal government for less than 1 year and approximately 60 percent stayed for less than 2 years, as shown in figure 4. These percentages are slightly better than the percentages of employees without disabilities who left within the same amount of time as shown in figure 5. Across the federal government, of the more than 1.28 million persons without disabilities hired during the 2011 through 2017 time period, approximately 43 percent of them stayed in the federal government for less than 1 year and approximately 60 percent of them stayed for less than 2 years. The data shown in figures 4 and 5 taken in context together provide an aggregate overview of government-wide hiring and retention trends of individuals with disabilities in comparison to hiring and retention trends of individuals without disabilities. We found the trends to be generally consistent between the employee groups during this time period, with the largest percentage of hires staying less than 1 year. These departures may be explained, in part, by the proportion of employees hired into temporary positions who therefore were not necessarily expected to stay on the job for a longer duration, or by employees who did not meet performance standards. To pinpoint the root causes behind these departure rates and to determine where appropriate improvements and potential solutions may be warranted, targeted data collection, tracking, and analysis is needed. Moreover, the loss of such a substantial percentage of new hires within their first 2 years of employment provides an opportunity for the federal government to examine why this occurs, identify any lessons learned, and better target its retention efforts as appropriate to potentially reduce such early departures. Further, these retention trends have implications related to agencies’ ability to meet and sustain progress toward the federal goals of ensuring that at least 12 percent of their workforce is comprised of employees with disabilities including 2 percent comprised of employees with targeted disabilities. In addition, we analyzed the number of persons with disabilities hired into each occupational category as identified in OPM’s EHRI database for fiscal years 2011 through 2015. The categories are administrative, blue collar, clerical, professional, technical, and other. Within each category, we identified the number of employees who remained in those positions for at least 2 years. Our analysis summarized in table 3 shows the highest retention rates for employees with disabilities and employees with targeted disabilities occurred in three categories: administrative, blue collar, and professional. For example, in the professional occupational category, the retention rates were approximately 48 and 43 percent for employees with disabilities and targeted disabilities, respectively—which were the highest levels of retention for persons with disabilities and targeted disabilities in any occupational category. However, the number of persons with disabilities hired into this category is considerably lower than that of non- disabled hires into the same category. Specifically, approximately 13 percent of persons with disabilities and approximately 11 percent of persons with targeted disabilities were hired into the professional occupational category. In contrast, as shown in table 3, 23 percent of persons with no disability were hired into this same occupational category and retained at a similar rate. Our analysis by GS level in table 4 shows that retention rates increase with GS level, regardless of disability, with retention rates being slighlty higher for persons without disabilities for the top three GS levels. Moreover, persons with disabilities and targeted disabilities were more likely to be hired at the lowest three GS levels, with one exception. Persons with disabilities fared equally or relatively well in GS-11 and above categories compared to persons without disabilities or with targeted disabilities. OPM does not routinely track or report retention data on employees with disabilities, which could help inform both agency-specific and government-wide assessments of how the federal government is performing with retaining the employees it hires. OPM officials said OPM has the ability to track the retention of all employees in the federal government and can do so for any specific category of employees on an as needed basis or upon request. For example, in 2015, OPM started reporting new hire retention data on employees who are veterans by including this information in its annual report on the employment of veterans in the federal government. This report also includes hiring data on disabled veterans. However, there is no similar OPM tracking or reporting of retention data for all individuals with disabilities including targeted disabilities. The federal regulations, executive order and management directive discussed earlier in this report all include statements about the importance of retaining individuals with disabilities in the federal government. For example, Executive Order 13548 stated that agencies must improve their efforts to employ workers with disabilities through increased recruitment, hiring, and retention of these individuals. Further, it stated that OPM, in consultation with Labor and EEOC, shall identify and assist agencies in implementing strategies for retaining federal workers with disabilities in federal employment. Federal regulations state that agencies shall give full consideration to the retention of qualified individuals with disabilities in the federal workforce. EEOC’s MD 715 requires agencies to conduct an internal review and analysis of the effects of their current and proposed policies, practices, procedures and conditions that relate to the employment—including retention—of individuals with disabilities. Making use of the agency-specific data OPM already gathers in its EHRI database complemented with the retention information agencies report in their annual MD 715 submissions would help to facilitate more comprehensive analyses of the retention of employees with disabilities across the federal government. Such analyses could provide a fuller picture of how the federal government is performing with retaining the employees it hires, help identify common agency experiences—both successes and challenges—and assist in pinpointing the root causes that contribute to retention rates of employees with disabilities in the federal workforce. Making retention data available to federal agencies for such use is also consistent with a federal internal control standard that states that management is to obtain relevant data from reliable internal and external sources in a timely manner so that they can be used for effective monitoring. Without routinely tracking and analyzing data on how long employees with disabilities remain employed in their agencies, federal managers are limited in their ability to assess the performance and effectiveness of the hiring and retention efforts put in place at their agencies. In addition, agencies are missing opportunities to leverage such information to help inform their own internal reviews and analysis of progress in meeting the goals included in federal regulations that at least 12 percent of their workforce be comprised of employees with disabilities including 2 percent comprised of employees with targeted disabilities. The three agencies we selected as case illustrations generally experienced increases in the percentage of employees hired with disabilities and targeted disabilities. Table 5 shows the percentage of employees hired by each agency in fiscal years 2011, 2015, and 2017. We chose to present these years of data to mark the first and last years of the 5-year period specified in Executive Order 13548 and to also show the most recent data available at the time of our review. For our analysis of individual agency-level hiring data, we included transfers in cases where employees transferred into an agency because we considered that to be a new hire at the individual agency level. Similar to the government-wide retention analysis described earlier, we also examined retention data at DOJ, SBA, and SSA. Of the employees with disabilities hired at DOJ and SSA from 2011 through 2017, approximately 31 percent and 33 percent, respectively, stayed in the federal government for less than 1 year. Approximately 53 percent and 51 percent, respectively, stayed for less than 2 years. These retention rates were slightly better than government-wide rates. In contrast, approximately 65 percent of employees with disabilities hired at SBA during that time period stayed for less than 1 year and approximately an additional 9 percent stayed for less than 2 years of employment. These departures may be explained, in part, by the proportion of employees hired into temporary positions who therefore were not necessarily expected to stay on the job for a longer duration. For example, SBA staff said that, on average, 45 percent of SBA’s workforce is comprised of temporary employees hired by the agency’s Office of Disaster Assistance during a disaster. As such, SBA expects turnover among those hires, including employees with disabilities. Similar to our analysis of government-wide retention rates by GS level and by occupational category, we identified the number of individuals hired at each of the three selected agencies during fiscal years 2011 through 2015 who stayed for at least 2 years. We found that generally across the three agencies, employees with disabilities were retained longer at the higher GS levels. As the GS levels increased, individuals without disabilities retained their jobs at a slightly higher rate than individuals with disabilities. Our analysis of occupational categories found that, in general, the three agencies each retained people with disabilities at lower rates than people without disabilities. More detailed hiring and retention data for each of the three agencies are included in appendix I. To aid recruitment and employment opportunities for individuals with disabilities, the three agencies we interviewed reported using (1) collaboration with other federal agencies for knowledge and information sharing and (2) coordination with employee resource and advisory groups. The following examples are illustrations of practices that selected agencies implemented. We did not assess the effectiveness or attempt to quantify the costs or benefits of the practices. Two agencies provided examples of their collaboration with other federal agencies for knowledge and information sharing. For example, DOJ officials told us that staff from their agency’s Criminal Division participated in an OPM effort using a “Resume Mining” feature in the USAJOBS Agency Talent Portal, in which the division’s human resources specialists searched through active resumes and filtered the searches based upon candidates who were eligible to be hired non-competitively under the Schedule A hiring authority. According to SBA officials, they used the Workforce Recruitment Program—a resource managed through Labor to help federal hiring managers connect with qualified candidates with disabilities for all jobs. SBA also retains a repository of resumes for individuals with disabilities to share with hiring managers. In 2015, to assist hearing impaired candidates and in a joint effort with the Federal Communications Commission, SBA hired staff fluent in American Sign Language (ASL) to provide video relay services directly to the deaf and hard-of-hearing communities. As a result, SBA officials told us SBA’s ASL customer support staff is able to communicate with and assist hearing-impaired job candidates. SBA also developed a National Strategic Recruitment Plan, which highlights Labor’s Workforce Recruitment Program for College Students with Disabilities. SBA officials said this plan has served as a successful tool for recruitment and hiring managers within their agency. Two of the three selected agencies we reviewed, DOJ and SSA, have disability employee resource or advisory groups made up of employees and management. These groups are generally made up of a variety of representatives from across the agency, including human resources professionals, hiring managers, recruitment coordinators, and employees with disabilities. The purpose of these groups includes helping to identify policies and procedures that support a positive work environment for people with disabilities. For example, DOJ’s Attorney General’s Advisory Committee for People with Disabilities (AGCPD) meets quarterly and works with DOJ management on disability employment issues. AGCPD advisory members told us one of their most significant contributions has been assisting with developing an agency-wide policy to help increase the use of the Schedule A hiring authority between 2010 and 2012. As a result, the number of individuals with disabilities hired at DOJ increased, according to AGCPD members. However, they said the agency has been unable to sustain those numbers in recent years. DOJ staff said this may also be attributed, in part, to a hiring freeze across DOJ at the time that affected all hires. AGCPD members also told us they routinely review DOJ’s disability hiring and retention percentages to monitor agency progress on this issue. According to SSA officials, SSA’s employee advisory group, the National Advisory Council of Employees with Disabilities (NACED), advises the agency regarding reasonable accommodations, recruiting, and creating pathways for promotions and retention of employees with disabilities. SSA’s management was involved in establishing guidelines for the advisory group to operate within the agency. NACED has a senior executive service member who serves as the council’s liaison with SSA senior management. NACED assisted in the creation of mandatory agency training for managers and employees at SSA on disability awareness and sensitivity. The group also assisted the agency in producing a video that features SSA employees with disabilities and is available on SSA’s intranet website. In addition, the advisory group assisted the agency to ensure SSA’s systems are compliant with assistive technology. In addition, according to SSA officials, the agency has placed designated Selective Placement Program Coordinator (SPPC) points of contact in each of its regional offices to support disability recruitment and hiring efforts. SSA officials told us the role of their SPPC has been instrumental in building coalitions and networks with their internal and external stakeholders, including connecting SSA’s human resources, equal employment opportunity (EEO), and employee affinity groups. SSA officials said these essential connections enable their agency to acquire the information needed to make informed disability employment and general EEO program and policy decisions. As noted earlier, federal statutes and regulations provide special hiring authorities for people with disabilities, which includes Schedule A hiring authority. Agencies are not required to use Schedule A authority and can choose to use the traditional competitive process to fill job vacancies. However, Executive Order 13548 called for increased utilization of the federal government’s Schedule A excepted service hiring authority for persons with disabilities, as appropriate. Consistent with federal emphasis on the use of Schedule A, all three selected agencies reported to us that they provide training on Schedule A hiring authority to their hiring managers and human resources professionals. For example: According to SBA officials, the agency provides supervisory training to all hiring managers and supervisors to emphasize Schedule A hiring authority, among other hiring flexibilities. SSA officials told us their agency holds annual mandatory training for managers and human resource specialists on special hiring authorities that apply to individuals with disabilities, including Schedule A, and reasonable accommodations. SSA also provides a manual to its managers focused specifically on recruitment, interviewing, and hiring related to Schedule A authority. DOJ officials told us their agency participated in ongoing training and other initiatives designed to increase the use and understanding of Schedule A. Nevertheless, the agencies we spoke with reported that some hiring managers and human resources staff are unfamiliar with or unsure of how to use the Schedule A hiring authority. Consequently, the agencies have found that there is a continual need to increase hiring managers’ awareness of Schedule A and to educate both managers and human resource personnel on the use of the hiring authority. For example: SBA officials said their managers often have questions about what Schedule A is and how to use it in the hiring process. SSA officials said they continue to receive questions about the hiring authority from their newer managers, which they address on a case- by-case basis. Similarly, the key leadership agencies underscored this as an issue they have seen government-wide in their experience. For example, EEOC staff said because hiring managers change frequently, information and the use of the Schedule A hiring authority may be a topic that was not part of their previous work experiences or portfolios. EEOC officials said that all managers could benefit from more training to understand how and when it is permissible to use the special authority to hire individuals with disabilities. To help address issues around the use of Schedule A, officials from the key leadership agencies emphasized the importance of federal agencies having designated staff familiar with disability issues, such as an SPPC, in which a part of his or her job responsibilities is to help educate and train the workplace on disability issues such as the use and benefits of the Schedule A hiring authority. Consistent with this guidance, two of the three agencies use SPPCs to provide guidance and, in one case, provide training. For example: SBA’s SPPCs frequently provide guidance on the option to utilize the Schedule A hiring authority prior to opening a competitive job announcement on USAJOBS. SSA has designated SPPCs in each of its regional offices. The SPPCs provided guidance and training to managers on the appointment of individuals with disabilities using the Schedule A appointment authority. As a result, in fiscal year 2019, SSA officials said these efforts contributed to their agency filling more than 250 positions using the Schedule A hiring authority. Additional opportunities exist to further address issues around the use of Schedule A. We have previously reported that training at all staff levels, in particular training on hiring, reasonable accommodations, and diversity awareness can help disseminate leading practices throughout an agency and communicate expectations for implementation of policies and procedures related to improving employment of people with disabilities. In addition, our past work has underscored the importance of assessing and measuring the real impact of training to determine how it contributes to the accomplishment of agency goals and objectives. Moreover, a leading training investment practice is to evaluate the benefits achieved through training, such as having a formal process for evaluating improvement in performance and tracking the impact of training on the agency’s performance goals. While assessing training is important, the three selected agencies said they do not assess the impact of their training related to Schedule A. For example, according to SBA officials, their training covers a range of hiring flexibilities beyond Schedule A. As such, SBA officials said they are unable to evaluate the effect of the training to specifically measure an increased level of hiring managers’ and human resources professionals’ understanding of how and when to use Schedule A authority. SSA officials told us that while their agency does not evaluate their training, the agency is currently developing an evaluation module to allow employees and managers to provide feedback on the effectiveness of their Schedule A training. However, SSA did not provide a committed timeframe for completion of such a module. DOJ staff said training is provided by its various component agencies and is updated when appropriate. However, DOJ did not provide any further details to explain the frequency, content, or results of such evaluations. Without evaluating the impacts of training to ensure that hiring managers understand how and when to use the Schedule A hiring authority, agencies may be missing opportunities to enhance awareness of and sensitivity to disability issues and opportunities to increase the number of employees with disabilities across the federal workforce. Federal agencies are required to provide reasonable accommodation to qualified employees or applicants with disabilities, unless to do so would cause undue hardship. In general, a reasonable accommodation is a change in the work environment or in the way things are customarily done that would enable an individual with a disability to apply for a job, perform the duties of a job, or enjoy the benefits and privileges of employment. Officials from the three selected agencies indicated that many reasonable accommodation provisions are low- to no cost to their agencies, often involving minor changes to an employee’s workspace or work schedule, or modifications to work-related technologies. For example, the most common reasonable accommodation requests cited by each of the agencies included: providing ergonomic adjustments or modifications to the layout of workspaces; adjusting work schedules to allow employees with chronic medical conditions to attend medical appointments and complete their work at alternate times or locations; providing sign language interpreters or closed captioning at meetings making materials available in braille or large print. In addition, according to information posted on the Office of Disability Employment Policy website within Labor, examples of other job accommodations that are low cost and often involve minor changes to a person’s work environment include: physical changes, such as installing a ramp or restroom modifications; accessible and assistive technologies such as providing screen reader software or using videophones to communicate with employees who have impaired hearing; and policy enhancements, such as allowing service animals in the workplace. Federal agencies are required to post on their websites, and make available to all applicants and employees in written and accessible formats, procedures for reasonable accommodation. Agencies are also required to collect specific information about each reasonable accommodation, including whether the accommodation was granted and the basis for any denial. All three of the selected agencies indicated in their 2018 MD 715 reports to EEOC that their agencies have these established procedures in place and are in compliance with EEOC regulations and guidance. While the three selected agencies reported they have processes in place for receiving reasonable accommodations requests, only SSA has procedures for obtaining employee feedback from employees after an accommodation is provided. According to agency officials, the agency offers employees who have requested job accommodations various opportunities to provide feedback to agency management about their reasonable accommodation experience. For example, SSA officials said their agency uses a dedicated email inbox and telephone number to receive inquiries and feedback from reasonable accommodations customers and stakeholders. Both of these are monitored daily by the agency’s Center for Accommodations and Disability Services (CADS) to ensure emails and calls are logged and tracked. Additionally, according to agency officials, if an employee prefers to contact the reasonable accommodations office anonymously, employees can complete the anonymous Process Improvement Comments Survey to submit concerns, comments, or recommendations for reasonable accommodations process improvement. To address issues and concerns received through any of these means, CADS staff reach out to the relevant managers, as appropriate, and only share information on a need-to-know basis, or as otherwise required by applicable law. According to SSA officials, SSA’s policy also requires that managers or CADS staff confirm with the employee that a job accommodation was received and is effective prior to closing the request in the agency database. Finally, SSA’s policy requires supervisors to continually engage in this interactive process to ensure the continued effectiveness of job accommodations. In contrast, DOJ and SBA officials reported that their agencies do not have any specific procedures in place to solicit ongoing employee feedback from employees who request reasonable accommodations. Staff from both agencies said that communication between the supervisor and individual needing a reasonable accommodation is encouraged. In general, if an afforded accommodation is ineffective or needs modification, the employee and supervisor are responsible for contacting the appropriate disability employment program manager to address the issue. Federal agencies are not explicitly required to obtain feedback from employees about the effectiveness of their job accommodations experience. However, EEOC policy guidance states that agencies should keep cumulative records for at least 3 years to track their performance with regard to providing reasonable accommodations to employees. Tracking performance over a 3-year period is critical to an agency’s ability to assess whether it has adequately processed and provided reasonable accommodations, according to EEOC guidance. Agencies are encouraged to use this tracking information to evaluate whether and where they need to improve their handling of reasonable accommodation requests. In addition, this type of monitoring is consistent with federal internal control standards. Specifically, the standard calls for ongoing monitoring to be built into the entity’s operations, performed continually, and responsive to change. Without periodically soliciting, obtaining, and documenting employee feedback on agencies’ reasonable accommodations efforts, management is missing opportunities to evaluate the effectiveness of their programs, identify potential risks, and identify any improvements that may be warranted. For example, such information could provide valuable insights about the timeliness of processing and fulfilling employees’ requests and the ongoing effectiveness of an accommodation. In some cases, an accommodation may no longer be effective for an employee for various reasons such as if the employee’s limitations change, workplace equipment changes, job responsibilities change, or the accommodation involves equipment or software that requires maintenance or updates. EEOC, OPM, and Labor took various actions during the course of the 5- year period specified under the executive order for meeting the government-wide hiring goal and have continued their efforts. For example, the agencies began to meet quarterly immediately after the executive order was signed to establish collaborative actions they could take to increase disability hiring and retention measures and to discuss best practices focused on hiring and retaining individuals with disabilities. Officials from OPM, EEOC, and Labor continue to meet quarterly as participants in an interagency working group called the Federal Exchange on Employment and Disability (FEED). FEED meetings cover a broad range of federal disability topics, including sharing best practices and establishing collaborative partnerships designed to make the federal government a model employer of people with disabilities. For example, at one FEED meeting, OPM announced a new resource to help address some common questions OPM receives about Schedule A. At another FEED meeting, OPM and EEOC officials discussed possible strategies agencies can consider when they are planning to re-survey their agencies through the Standard Form 256, Self-Identification of Disability (SF-256), such as initiating the re-survey campaign during Disability Awareness Month when there is increased attention on disability issues. OPM assisted agencies with disability hiring plans and authorities and compiled government-wide data. Under EO 13548, OPM was required to implement a system for reporting regularly to the President, heads of agencies, and the public on agencies’ progress in implementing their disability hiring plans and meeting the objectives of the executive order. In May 2012, we reported on OPM’s progress in reviewing agencies’ hiring plans and found that many plans had deficiencies that needed to be addressed. For example, not all plans identified a senior- level official responsible for development and implementation of the plan. We recommended that OPM incorporate information about such deficiencies in its external reporting. OPM did so, and also worked with agencies to correct any plan deficiencies by November 2012. In 2016, OPM issued its capping report announcing the success of the government’s effort, which included a summary of the initiatives taken to improve agency coordination, education, and training accompanied by a series of tables showing the composition of disability hires across the federal workforce. OPM also continues to collect government-wide disability data, which is available to agencies through the MAX.gov web portal, and provides assistance to agencies upon request. In October 2018, the Director of OPM issued a joint memorandum with the Chair of EEOC to the Chief Human Capital Officers Council regarding updates to the SF-256 to reflect changes to terms used to describe targeted disabilities, serious health conditions, and other disabilities. As discussed in an earlier section of this report, individuals use this form to voluntarily self- identify a disability, and OPM uses the information provided through this form for data collection purposes only. The revised form includes simplified condition descriptions and provides respondents with the option of identifying if they have a targeted disability, disability, or serious condition without specifying a diagnosis. SF-256 continues to be the primary tool for measuring the workforce participation of persons with disabilities in the federal government. The joint memorandum reminded agencies that OPM and EEOC are available to assist agencies in their efforts to help employees self-identify as people with disabilities and people with targeted disabilities, as appropriate. EEOC collects information through MD 715, issued regulations, and provides technical assistance. EEOC’s ongoing data and information collection efforts under MD 715 require agencies to report annually on the status of their equal employment opportunity programs. This includes agency-specific self-assessments of the extent to which they are meeting their responsibilities to provide employment opportunities for qualified applicants and employees with disabilities and targeted disabilities. If agencies identify any barriers to the equal employment of persons with disabilities, they must work to eliminate the barrier. EEOC’s MD 715 annual reporting requirement included under Part J captures agencies’ descriptions of how their affirmative action efforts improve the recruitment, hiring, advancement, and retention of applicants and employees with disabilities. According to EEOC’s guidance to agencies, Part J is to assist agencies in meeting the requirements for an affirmative action plan. Specifically, Part J requires agencies to examine employment trends and participation rates of persons with reported and targeted disabilities in agency programs. In 2017, Part J was revised and now solicits agency information about voluntary and involuntary separations of employees with disabilities. For example, agencies are to confirm whether voluntary and involuntary separations occurred at a rate exceeding that of employees without disabilities. Agencies are required to complete Part J and, for transparency purposes, post their affirmative action plans on their external websites. The importance of this type of information is underscored by the analysis summarized in an earlier section of this report showing that approximately 60 percent of persons with disabilities hired into the federal government during 2011 through 2017 stayed for less than 2 years of service. Also as noted earlier, opportunities exist to enhance collection and analysis of retention data and learn about what factors contribute to retention rates of employees with disabilities in the federal government. EEOC provides various types of support to agencies to help them implement requirements of the revised regulations on affirmative action for individuals with disabilities. For example, EEOC officials said they visited all agencies to provide guidance and technical assistance with their hiring plans. EEOC continues to provide ongoing feedback to agencies, both formally and informally, and visits agencies on a 3-year rotation cycle. As part of EEOC’s outreach, agency representatives provide presentations to, and participate in meetings with, federal employees and employers. The agency’s website also includes a list of outreach coordinator contacts for each of its field offices. EEOC’s Training Institute provides a variety of training programs specialized for the federal sector, including courses on disability issues and MD 715 barrier analysis, as well as customized training throughout the year to meet particular agencies’ needs. EEOC’s federal training courses can be delivered on site or virtually. Labor provides tools, resources, education, and training to agency managers. Labor has implemented and supported a number of initiatives aimed at enhancing the federal sector’s performance on disability employment. For example, Labor’s Office of Disability Employment Policy supports the Employer Assistance and Resource Network on Disability Inclusion (EARN), which is a federal resource that provides education, training, tools, and resources for managers on the hiring, retention, and advancement of persons with disabilities. In 2018, EARN issued a federal framework—in partnership with EEOC and OPM—which outlined various employment strategies and practices for agencies to consider and incorporate into their own efforts related to disability inclusion in the workforce. In addition, Labor leads an interagency working group known as the Federal Exchange on Employment and Disability, which is comprised of federal staff across government with roles in developing, implementing and managing disability employment programs to foster cross-agency collaboration and share best practices. The agency also developed a toolkit for Federal Agencies on Hiring People with Disabilities outlining a five-step process and related resources to assist federal agencies in their efforts to increase the employment of people with disabilities. Another effort supported by Labor provides more targeted technical assistance and free consulting services on workplace accommodations through the Job Accommodations Network. To increase the recruitment of persons with disabilities, Labor also plays a lead role in the Workforce Recruitment Program for College Students with Disabilities, which is a recruitment, and referral program that connects federal and private sector employers nationwide with college students and recent graduates with disabilities for summer or permanent employment. Labor has also developed and provided assistance on various trainings for federal hiring managers and human resources professionals, including an OPM course titled, “A Roadmap to Success: Hiring, Retaining and Including People with Disabilities.” In its effort to become a model employer, the federal government increased employment opportunities for persons with disabilities; provided specific direction and guidance to agencies through various executive orders, management directives, and regulations; and exceeded its goal to hire an additional 100,000 individuals with disabilities. However, OPM does not routinely track or report retention data, which could help pinpoint the root causes behind disabled employee departure rates. Making use of the agency-specific data OPM already gathers in its EHRI database complemented with the retention information agencies report to EEOC would allow for more comprehensive retention analyses of employees with disabilities across the federal government. Such analyses would provide a fuller picture of how the federal government is performing with retaining the employees it hires and help to identify common agency experiences, both success and challenges. Without comprehensive analyses of retention data, the federal government is limited in its ability to assess the performance and results of the hiring and retention efforts for this segment of the workforce. Selected agencies implemented a number of practices that helped bolster their recruitment and hiring of persons with disabilities, including collaborating with other federal agencies for knowledge and information sharing, coordinating efforts with employee resource or advisory groups, and providing additional training for hiring managers and human resources staff on using Schedule A hiring authority—one of the commonly used hiring flexibilities available to agencies to onboard qualified individuals with disabilities. However, the selected agencies do not assess or measure the impact of their Schedule A training to determine how it contributes to the accomplishment of federal goals to increase the number of employees with disabilities across the federal workforce. In addition, opportunities exist to enhance the effectiveness of selected agencies’ reasonable accommodations programs by obtaining employee feedback from employees about their job accommodations experience. OPM, EEOC, and Labor have worked collaboratively to assist agencies with enhancing their recruitment and hiring efforts. They compiled government-wide data, issued guidance and regulations to clarify agencies’ responsibilities and obligations to strengthening employment opportunities for disabled persons, and provided various resources, education, and training. We are making the following recommendation to OPM: The Director of OPM should routinely track and report retention data for employees with disabilities and make such data available to federal agencies, including EEOC, through a centralized web portal—such as MAX.gov. For example, OPM could track and report such data by General Schedule level pay groupings, which could help pinpoint root causes that contribute to retention rates, inform assessments of government-wide progress on employee retention, and identify needed improvements. (Recommendation 1) We are making the following recommendations to DOJ: The Attorney General of the United States should develop and implement policies and procedures for assessing the impact of training provided to agency hiring managers and human resources staff on Schedule A hiring authority. This includes assessing the impact of its training on agency performance goals related to increased hiring of individuals with disabilities and targeted disabilities. (Recommendation 2) The Attorney General of the United States should develop and implement policies and procedures for obtaining employee feedback about the agency’s reasonable accommodations efforts and use such information to evaluate the ongoing effectiveness of the program. This may include identifying any effects on employee retention, identifying potential risks, and determining any improvements that may be warranted. (Recommendation 3) We are making the following recommendations to SBA: The Administrator of SBA should develop and implement policies and procedures for assessing and tracking the impact of training provided to agency hiring managers and human resources staff on Schedule A hiring authority. This includes assessing the impact of its training on agency performance goals related to increased hiring of individuals with disabilities and targeted disabilities. (Recommendation 4) The Administrator of SBA should develop and implement policies and procedures for obtaining employee feedback about the agency’s reasonable accommodations efforts and use such information to evaluate the ongoing effectiveness of the program. This may include identifying any effects on employee retention, identifying potential risks, and determining any improvements that may be warranted. (Recommendation 5) We are making the following recommendation to SSA: The Commissioner of SSA should develop and implement policies and procedures for assessing and tracking the impact of training provided to agency hiring managers and human resources staff on Schedule A hiring authority. This includes assessing the impact of its training on agency performance goals related to increased hiring of individuals with disabilities and targeted disabilities. (Recommendation 6) We provided a draft of the report to OPM, EEOC, Labor, OMB, DOJ, SBA, and SSA for review and comment. We received written comments from 3 agencies—OPM, SBA, and SSA—that are reprinted in appendices II through IV and summarized below. EEOC informed us that they had no comments. Labor and DOJ provided technical comments, which we incorporated as appropriate. OMB did not provide comments on the draft. OPM concurred with our recommendation to routinely track and report retention data for employees with disabilities and make such data available to federal agencies. OPM stated that it already routinely tracks retention data for persons with disabilities by agency. In addition, OPM responded that retention data for employees with disabilities by agency and GS level pay groupings for fiscal years 2017 and 2018 can be obtained by federal agencies through the MAX.gov website. However, OPM did not provide any supporting documentary evidence or further details to explain its tracking efforts or which data are available to federal agencies. SBA disagreed with the retention data we present in figure 8, showing that approximately 65 percent of employees with disabilities hired at SBA between 2011 through 2017 stayed less than one year. In its written comments, SBA stated that under hiring authorities it uses in responding to disasters, appointments are generally not to exceed one year. As indicated in our report, we acknowledge that each of our retention analyses include full-time permanent hires and part-time or temporary hires. We also include a specific statement regarding temporary hires at SBA’s Office of Disaster Assistance. SBA concurred with our recommendation to assess and track the impact of training provided to agency hiring managers and human resources staff on Schedule A hiring authority. SBA responded that it will formally evaluate the impact of training to ensure hiring managers understand the use of Schedule A hiring authority and assess hiring trends and retention. SBA partially concurred with our recommendation to obtain employee feedback about its reasonable accommodation efforts. SBA stated that its procedures require supervisors to contact the Disability Employment Program Manager with concerns about the effectiveness of a provided accommodation and work together to make any necessary adjustment. SBA further stated that the procedures have been revised and will include a requirement for completing a feedback survey aimed to determine the effectiveness of the reasonable accommodation program and make any adjustments required. SBA stated that it also established an internal mailbox for reasonable accommodation communications that is monitored daily. Effective implementation of SBA’s plans, including administering a survey, would meet the intent of the recommendation. SSA concurred with our recommendation to assess and track the impact of training provided to agency hiring managers and human resources staff on Schedule A hiring authority. SSA stated that it is revising its framework to include outcome-based evaluations for training related to the employment and support of individuals with disabilities, including Schedule A hiring. DOJ did not agree or disagree with the recommendations. We are sending copies of this report to the appropriate congressional committees, the Director of OPM, the Chair of EEOC, the Secretary of Labor, the Director of OMB, the Attorney General of DOJ, the Administrator of SBA, and the Commissioner of SSA. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or JonesY@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. As part of our review, we selected three agencies as case illustrations to examine practices they have adopted to increase hiring and retention of individuals with disabilities. The three selected agencies are the Department of Justice (DOJ), the Social Security Administration (SSA), and the Small Business Administration (SBA). Our selection was based on various factors including the agency’s size in terms of total full-time employees and average percentage of total employees with reported disabilities or targeted disabilities during 2011 through 2017. For each of the three agencies, we analyzed personnel data captured in the Office of Personnel Management’s (OPM) Enterprise Human Resources Integration (EHRI) database including the General Schedule (GS) levels in which individuals with disabilities were placed and their position classifications. The following figures and tables summarize our analyses of hiring and retention rates of individuals with and without disabilities in the three selected agencies during fiscal years 2011 through 2017. These analyses provide an aggregate overview of hiring and retention trends of individuals with disabilities at the three selected agencies as compared to hiring and retention trends of individuals without disabilities at these agencies. We found the trends to be generally consistent between the employee groups. During the 2011 through 2017 time period we examined, 31 percent of the total number of persons with disabilities hired at DOJ during that time stayed in the federal government for less than 1 year and nearly 54 percent of them stayed for less than 2 years, as shown in figure 6. During that same time period, approximately 24 percent of the total number of persons without disabilities who were hired stayed for less than 1 year of service while approximately 46 percent of hires stayed for less than 2 years of service, as shown in figure 7. The data shown in figures 6 and 7 taken in context together indicate that retention at DOJ during this time period was generally consistent for persons both with and without disabilities. These departures may be explained, in part, by the proportion of employees hired into temporary positions who therefore were not necessarily expected to stay on the job for a longer duration, or by employees who did not meet performance standards. Tables 6 and 7 show the results of our analysis of employee retention at DOJ by occupational category and GS level for individuals hired in fiscal years 2011 through 2015 and stayed for at least 2 years. During the 2011 through 2017 time period we examined, approximately 65 percent of the total number of persons with disabilities hired at SBA during that time stayed in the federal government for less than 1 year, as shown in figure 8. During that same time period, approximately 55 percent of the total number of persons without disabilities that were hired at SBA stayed for less than 1 year of service, as shown in figure 9. The data shown in Figures 8 and 9 taken in context together indicate that retention at SBA during this time period was generally consistent for persons both with and without disabilities. These departures may be explained, in part, by the proportion of employees hired into temporary positions who therefore were not necessarily expected to stay on the job for a longer duration, or by employees who did not meet performance standards. For example, SBA staff said that on average, 45 percent of SBA’s workforce is comprised of temporary employees hired by the agency’s Office of Disaster Assistance during a disaster. As such, SBA expects turnover among those hires, including employees with disabilities. Tables 8 and 9 show the results of our analysis of employee retention at SBA by occupational category and GS level for individuals hired in fiscal years 2011 through 2015 and stayed for at least 2 years. During the 2011 through 2017 time period we examined, approximately 33 percent of the total number of persons with disabilities hired at SSA during that time stayed in the federal government for less than 1 year, as shown in figure 10. During that same time period, approximately 25 percent of the total number of persons without disabilities that were hired at SSA stayed for less than 1 year of service, as shown in figure 11. The data shown in figures 10 and 11 taken in context together indicate that retention at SSA during this time period was generally consistent for persons both with and without disabilities. These departures may be explained, in part, by the proportion of employees hired into temporary positions who therefore were not necessarily expected to stay on the job for a longer duration, or by employees who did not meet performance standards. Tables 10 and 11 show the results of our analysis of employee retention at SSA by occupational category and GS level for individuals hired in fiscal years 2011 through 2015 and stayed for at least 2 years. Yvonne D. Jones at (202) 512-6806 or JonesY@gao.gov. In addition to the contact named above, Leah Querimit Nash (Assistant Director), Arpita Chattopadhyay, Anthony Patterson, and Erik Shive made key contributions to this report. In addition, Michael Bechetti, Elizabeth Curda, Karin Fangman, Rob Gebhart, Michele Grgich, Amalia Konstas, Serena Lo, Art Merriam, and Sharon Miller made contributions to this report.", "summary": "Federal agencies are required to provide equal opportunity to qualified individuals with disabilities in all aspects of federal employment. GAO was asked to examine agencies' efforts to increase the employment of individuals with disabilities. Among other objectives, this report examines: (1) the extent to which agencies met the 2010 federal goal to hire an additional 100,000 individuals with disabilities by 2015, and the retention rates of those employees between 2011 and 2017; and (2) practices selected agencies used to increase hiring and retention of individuals with disabilities. GAO analyzed data and documents from OPM and interviewed agency officials. GAO interviewed officials from DOJ, SBA, and SSA about their efforts to enhance employment opportunities for disabled persons. GAO selected these three agencies because they represent a range of agency size and relatively high or low percentages of total employees with disabilities. Approximately 143,600 persons with disabilities were hired during 2011 through 2015—plus an additional 79,600 hires in 2016 and 2017—across the 24 Chief Financial Officers Act agencies, exceeding the stated goal of 100,000 by 2015. About 39 percent of individuals with disabilities hired during 2011 through 2017 stayed less than 1 year and approximately 60 percent stayed less than 2 years. Of the total individuals without disabilities hired during that same time period, approximately 43 percent stayed less than 1 year and approximately 60 percent stayed less than 2 years. Although targeted data tracking and analyses could help pinpoint root causes contributing to departure rates, the Office of Personnel Management (OPM) does not track or report retention data on disabled employees. Doing so, and making such data available to agencies would facilitate more comprehensive analyses of the retention of employees with disabilities and identify needed improvements. Officials at three agencies GAO examined—Department of Justice (DOJ), Small Business Administration (SBA), and Social Security Administration (SSA)—used various practices to increase hiring, such as training staff on Schedule A—a commonly used hiring authority to employ individuals with disabilities. However, the agencies neither assess the impact of training nor how it relates to contributing to performance goals of increasing the number of disabled hires. Agencies are expected to track performance related to providing reasonable accommodations. The selected agencies reported having processes in place for receiving reasonable accommodations requests, but only SSA has procedures for obtaining feedback from employees after an accommodation is provided. Without such feedback, DOJ and SBA are limited in their ability to assess the continued effectiveness of reasonable accommodations provided to employees. GAO is making 6 recommendations: OPM should track and report retention data; DOJ, SBA, and SSA should assess training impacts; and DOJ and SBA should obtain employee feedback on reasonable accommodations. OPM and SSA concurred with GAO's recommendations; SBA concurred with one and partially concurred with one recommendation; DOJ did not agree or disagree with the recommendations. GAO continues to believe all recommendations are warranted.", "document_type": "gao"}
{"report": "Oil and gas exploration and production involves disturbing lands in several ways. For example, when operators drill oil and gas wells, they typically remove topsoil and construct a well pad, where the drilling rig will be located. Other equipment on-site can include generators and fuel tanks. In addition, reserve pits are often constructed to store or dispose of water, mud, and other materials that are generated during drilling and production, and roads and access ways are often built to move equipment to and from the wells. Once wells cease production, which may occur many decades after they are drilled, they can become inactive. Inactive wells have the potential to create physical and environmental hazards if operators do not properly reclaim them, a process that may involve plugging the well, removing structures, and reshaping and revegetating the land around the wells. For example, inactive wells that are not properly plugged can leak methane into the air or contaminate surface water and groundwater. Well sites that are not properly reclaimed can contribute to habitat fragmentation and soil erosion, and equipment left on-site can interfere with agricultural land use and diminish wildlife habitat. Costs for well reclamation vary widely and are affected by factors such as the depth of the well. Although BLM does not estimate reclamation costs for all wells, it has estimated reclamation costs for thousands of wells whose operators have filed for bankruptcy. Based on our analysis of these estimates, we identified two cost scenarios: low-cost wells typically cost about $20,000 to reclaim, and high-cost wells typically cost about $145,000 to reclaim. As shown in figure 1, BLM regulations or policies outline how BLM is to initially collect bonds from operators, review bonds, and ultimately return the bond to the operator or use it to cover costs of reclamation. Bonds collected from operator. BLM regulations require operators to submit a bond to ensure compliance with all of the terms and conditions of the lease, including, but not limited to, paying royalties and reclaiming wells. BLM regulations generally require operators to have one of the following types of bond coverage: individual lease bonds, which cover all of an operator’s wells under one lease; statewide bonds, which cover all of an operator’s leases and operations in one state; or nationwide bonds, which cover all of an operator’s leases and operations nationwide. (See figure 2.) BLM can accept two types of bonds: surety bonds and personal bonds. A surety bond is a third-party guarantee that an operator purchases from a private insurance company approved by the Department of the Treasury. The operator pays a premium to the surety company that can vary depending on various factors, including the amount of the bond and the assets and financial resources of the operator. If operators fail to reclaim their wells, the surety company is responsible for paying BLM up to the amount of the bond to help offset reclamation costs. A personal bond must be accompanied by one of the following financial instruments: certificates of deposit issued by a financial institution whose deposits are federally insured, granting the Secretary of the Interior full authority to redeem it in case of default in the performance of the terms and conditions of the lease; cashier’s checks; negotiable Treasury securities, including U.S. Treasury notes or bonds, with conveyance to the Secretary of the Interior of full authority to sell the security in case of default in the performance of the lease’s terms and conditions; or irrevocable letters of credit that are issued for a specific term by a financial institution whose deposits are federally insured and meet certain conditions and that identify the Secretary of the Interior as sole payee with full authority to demand immediate payment in case of default in the performance of the lease’s terms and conditions. BLM bond reviews. BLM regulations provide flexibility to increase bonds above minimums and require increases above minimum amounts if operators meet certain criteria. Specifically, BLM regulations require BLM to increase the bond amount when an operator who applies for a new drilling permit had previously failed to reclaim a well in a timely manner. For such an operator, BLM must require a bond in an amount equal to its cost estimate for reclaiming the new well if BLM’s cost estimate is higher than the regulatory minimum amount. BLM regulations also authorize increases in the bond amount—not to exceed the estimated cost of reclamation and any royalties or penalties owed—whenever the authorized officer determines that the operator poses a risk due to factors such as that the expected reclamation costs exceed the present bond. In response to our previous recommendation in 2011 that BLM develop a comprehensive strategy to revise its bond adequacy review policy to more clearly define terms and conditions that warrant a bond increase, BLM issued a bond adequacy review policy in July 2013, Instruction Memorandum 2013-151. The policy contained directives for conducting reviews when bonds meet certain criteria. Specifically, the 2013 bond adequacy review policy called for field offices to, among other things, review each bond at least every 5 years to determine whether the bond value appropriately reflected the level of potential risk posed by the operator. If it did not, authorized officers were to propose an increase (or decrease) in the bond value. In November 2018, BLM issued a revised bond adequacy review policy, Instruction Memorandum 2019-014, which supersedes the 2013 policy. The 2018 policy continues to call for field offices to review each bond at least every 5 years, but it revised the point system worksheet that field offices are to use when determining whether a bond increase (or decrease) is warranted. Also, in response to our 2018 recommendation that BLM ensure that the reviews of nationwide and statewide bonds reflect the overall risk presented by operators, the 2018 policy calls for additional coordination between BLM headquarters, state offices, and field offices when reviewing nationwide and statewide bonds. BLM returns or uses bond. If operators reclaim their wells, BLM returns the bond to the operator. Many decades may pass between when BLM collects a bond and when it is returned. If operators do not reclaim their wells, BLM may redeem the certificate of deposit, cash the check, sell the security, or make a demand on the letter of credit to pay the reclamation costs. Liability for reclaiming a well on onshore federal lands can fall to either the lease holder or the operator, and BLM may also hold past owners or operators liable. The liability for past owners or operators extends only to reclamation obligations that accrued before BLM approved the transfer of their lease to a subsequent lessee. They are not liable for reclamation and lease obligations incurred after that transfer is approved. Based on our review of BLM data, the value of bonds held by BLM for oil and gas operations on a per-well basis were slightly lower in 2018 as compared to 2008. Although the total value of bonds held by BLM for oil and gas operations was higher in 2018 than in 2008 (about $204 million compared to about $188 million, in 2018 dollars), the average bond value per well was slightly lower because the number of wells on federal land was also higher in 2018 than in 2008 (96,199 wells compared to 85,330). Specifically, in 2008, BLM held bonds worth an average of $2,207 per well in 2018 dollars.23, BLM held bonds worth an average of $2,122 per well in 2018, a decrease of 3.9 percent as compared to 2008 (see table 1). BLM bonds do not typically cover an individual well; however, we calculated the average bond value on a per-well basis (bond amount divided by the number of wells covered by the bond) to compare the value over time adjusted for the increased number of wells. When reporting on all wells, we calculated the average bond value per well as the aggregate value of all BLM bonds divided by the total number of producible well bores. Appendix I provides additional information on our scope and methodology. category for bonds that were linked to wells in the data. We found that, on average, as of 2018 an individual lease bond covered about 10 wells, a statewide bond covered about 49 wells, and a nationwide bond covered 374 wells. However, some bonds cover more than the typical number of wells and some fewer. As of 2018, individual lease bonds had the highest average bond value per well at $2,691, and nationwide bonds had the lowest average bond per well value at $890. Statewide bonds had an average bond value per well of $1,592. The share of the total value of bonds held by BLM that are individual lease, statewide, or nationwide bonds differed in 2018 from 2008 (see Figure 3). The share of individual lease bonds was slightly higher in 2018 as compared to 2008 (about 8 percent in 2008 and about 9 percent in 2018). In 2008, statewide bonds represented about 80 percent (approximately $130 million) of the total value of bonds. In 2018, statewide bonds represented about 59 percent of total bond value (approximately $120 million), but this category still represented the largest share of total bond value. In contrast, nationwide bonds were a lower share of total bond value in 2008 (about 6 percent, approximately $10.2 million) than in 2018 (30 percent, approximately $61.8 million). BLM officials told us that changes in the composition of the oil and gas industry may have contributed to these changes in the composition of bonds. In particular, officials said some larger companies may have expanded their operations in recent years, sometimes acquiring smaller companies. Large companies with expansive operations are more likely than small companies to have nationwide bonds because such bonds can cover operations in multiple states, which statewide and individual lease bonds do not. Therefore, an industry shift to larger companies would tend to increase the share of nationwide bonds. Bonds do not provide sufficient financial assurance to prevent orphaned wells for several reasons. First, BLM has identified new orphaned wells— wells whose bonds were not sufficient to pay for needed reclamation when operators or other parties failed to reclaim them. As we reported in May 2018, BLM does not track the number of orphaned wells over time and so cannot identify how many wells became orphaned over specific time frames. However, our analyses of BLM’s orphaned well lists from different years have shown that BLM has continued to identify new orphaned wells since 2009. We reported in January 2010 that BLM identified 144 orphaned wells in 2009. Then, in May 2018, we reported that BLM identified 219 orphaned wells in July 2017—an increase of 75 orphaned wells. In April 2019, BLM provided a list of 296 orphaned wells that included 89 new wells that were not identified on the July 2017 list. Bonds are not sufficient to prevent orphaned wells in part because they do not reflect full reclamation costs for the wells they cover. Bonds that are high enough to cover all reclamation costs provide complete financial assurance to prevent orphaned wells because, in the event that an operator does not reclaim its wells, BLM can use the bond to pay for reclamation. On the other hand, bonds that are less than reclamation costs may not create an incentive for operators to promptly reclaim wells after operations cease because it costs more to reclaim the wells than the operator could collect from its bond. We analyzed bonds that are linked to wells in BLM’s data, and found that most of these bonds would not cover reclamation costs for their wells. Specifically, we compared the average bond coverage available for these wells to the two cost scenarios we described above. About 84 percent of these bonds—covering 99.5 percent of these wells—would not fully cover reclamation costs under a low-cost scenario (these bonds have an average value per well of less than $20,000). Less than 1 percent of bonds—covering less than 0.01 percent of these wells—would be sufficient to reclaim all the wells they cover if they were high cost (these bonds have an average value per well of $145,000 or more). The remaining bonds—about 16 percent—have average bond values per well of between $20,000 and less than $145,000. The majority of bond values do not reflect reclamation costs in large part because most bonds—82 percent—remain at their regulatory minimum values. These regulatory minimums are not reflective of reclamation costs for a number of reasons: Regulatory bond minimums have not been adjusted since the 1950s and 1960s to account for inflation. As shown in figure 4, when adjusted to 2018 dollars, the $10,000 individual lease bond minimum would be about $66,000, the $25,000 statewide bond minimum would be about $198,000, and the $150,000 nationwide bond minimum would be about $1,187,000. Bond minimums are based on the bond category and do not adjust with the number of wells they cover, which can vary greatly. According to BLM’s data, in 2018 the number of wells covered by a single bond ranged from one well to 6,654 wells. On average, a single bond covered about 68 wells. As wells are added to a bond, the total associated reclamation cost increases even if the bond value does not. A bond that increases with each additional well it covers and then decreases as wells are reclaimed could increase the financial incentive for operators to reclaim their wells in a timely manner. This is because operators would have to contribute additional bond value or would recover some bond value when they add or reclaim a well, respectively. Currently, bond minimums do not automatically adjust in this manner and therefore provide limited financial incentives for an operator to reclaim wells in a timely manner. Bond minimums do not reflect characteristics of individual wells such as depth or location, but such characteristics can affect reclamation costs, according to BLM officials. Wells are being drilled deeper than in the past; in 1950, well depth averaged about 3,700 feet, and in 2008, it averaged about 6,000 feet. Newer wells may be drilled 10,000 feet vertically. Officials from one BLM field office told us they assume a cost of $10 per foot of well depth to plug a well, so as wells are drilled deeper, plugging costs typically increase proportionally. Additionally, the location of some wells makes them more expensive to reclaim. For example, BLM officials told us about several wells that may cost three times more to reclaim than other nearby wells because they are located in the middle of a river, making them hard to reach. In addition to BLM having identified orphaned wells over the last decade, we identified inactive wells at increased risk of becoming orphaned and found their bonds are often not sufficient to reclaim the wells. Our analysis of BLM bond value data and Office of Natural Resources Revenue production data showed a significant number of inactive wells remain unplugged and could be at increased risk of becoming orphaned. Specifically, we identified 2,294 wells that may be at increased risk of becoming orphaned because they have not produced since June 2008 and have not been reclaimed. Further, for a majority of these at-risk wells, their bonds are too low to cover typical reclamation costs for just these at-risk wells. Our analysis of oil and gas production data showed these wells have not produced oil or gas or been used in other ways, such as serving as injection wells, since at least June 2008, when oil and gas prices were at or near record highs. Given that the Energy Information Administration projects oil and natural gas prices will remain at levels significantly below the 2008 highs through 2050, it is unlikely price will motivate operators to reopen these wells. Some of these wells have been inactive for far longer. Since these at-risk wells are unlikely to produce again, an operator bankruptcy could lead to orphaned wells unless bonds are adequate to reclaim them. If the number of at-risk wells is multiplied by our low-cost reclamation scenario of $20,000, it implies a cost of about $46 million to reclaim these wells. If the number of these wells is multiplied by our high-cost reclamation scenario of $145,000, it implies a cost of about $333 million. When we further analyzed the available bonds for these at-risk wells, we found that most of these wells (about 77 percent) had bonds that would be too low to fully reclaim the at- risk wells under our low-cost scenario. More than 97 percent of these at- risk wells have bonds that would not fully reclaim the wells under our high-cost scenario. BLM has a policy for reviewing the adequacy of bonds but has not been able to consistently secure bond increases when needed, and this policy has not resulted in bonds that would be adequate to reclaim most wells. BLM’s bond adequacy review policy calls for field office staff to review oil and gas bonds at least every 5 years to determine whether the bond amount appropriately reflects the level of potential risk posed by the operator. However, according to BLM documentation, its offices did not secure about 84 percent of the proposed bond increases in fiscal years 2016 and 2017. BLM officials at one field office and one state office noted it is difficult to secure increases from bond reviews when firms are already in difficult financial situations. In November 2018, BLM updated its bond adequacy review policy and called for the agency to focus on securing bond increases from operators that show the highest risk factors. BLM’s updated policy more explicitly lays out steps to secure bond increases, including that BLM should not approve new applications to drill from an operator while waiting for a bond increase. The new policy also gives BLM officials discretion to not pursue a bond increase after considering other priorities demanding staff time and workload. It is unclear whether the update will improve BLM’s ability to secure bond increases, as it may not address the underlying challenge of attempting to increase bonds from operators who are already in a difficult financial position. While BLM’s federal oil and gas bond minimums do not sufficiently reflect the costs of well reclamation, requirements for bond amounts for other federal mining and energy development activities account for potential reclamation costs to some extent. For example, for bonds for surface coal mining and hardrock mining on federal lands, the Department of the Interior requires bond amounts based on the full estimated cost of reclamation. For grants of federal rights-of-way for wind and solar energy development in designated leasing areas, BLM requires bonds based on a minimum amount per wind turbine or per acre of solar. For such grants in all other areas, the bonds are based on the estimated cost of reclamation but cannot be less than the per-turbine or per-acre amounts previously mentioned. Additionally, some states have minimum bond requirements for oil and gas wells on lands in the state that, unlike federal bond minimums, adjust with the number of wells they cover or the characteristics of the wells, or both. For example, Texas and Louisiana offer operators with wells on lands in those states the choice of a bond based on total well depth or based on the number of wells. Specifically, the Texas Railroad Commission lets operators choose bonds based on either the total depth of all wells on lands in the state multiplied by $2 per foot, or minimums based on the number of wells covered. If operators choose the latter, the bond for 0 to 10 wells is $25,000; the bond for 11 to 99 wells is $50,000; and the bond for 100 or more wells is $250,000. In Louisiana, the Office of Conservation offers operators with wells on lands in the state the choice of a bond based on total well depth or based on the number of wells. Louisiana further specifies a multiplier that varies depending on the total depth of the well. For example, the bond calculation is $2 per foot for wells less than 3,000 feet deep, $5 per foot for wells from 3,001 to 10,000 feet deep, and $4 per foot for wells 10,001 feet deep or deeper. Operators in Louisiana can alternatively choose to follow a system based on number of wells, with a minimum bond for 10 or fewer wells set at $50,000, a minimum bond for 11 to 99 wells set at $250,000, and a minimum bond for 100 or more wells set at $500,000. Pennsylvania’s Department of Environmental Protection requires bonds for unconventional wells that vary based on the number of wells and well bore length. The Mineral Leasing Act of 1920, as amended, requires federal regulations to ensure that an adequate bond is established before operators begin surface-disturbing activities on any lease, to ensure complete and timely reclamation of the lease tract as well as land and surface waters adversely affected by lease operations. The Mineral Leasing Act of 1920 does not require that BLM set bonds at full reclamation costs. However, the gap between expected reclamation costs and minimum bond amounts has grown over time because the minimums have not been adjusted since they were established in the 1950s and 1960s, whereas reclamation costs have increased due to inflation and the changing characteristics of wells being drilled. In the absence of bond levels that more closely reflect expected reclamation costs, such as by increasing regulatory minimums and incorporating consideration of the number of wells on each bond and their characteristics, BLM will continue to face risks that its bonds will not provide sufficient financial assurance to prevent orphaned wells. In particular, adjusting bond minimums so that bonds more closely reflect expected reclamation costs up front could help decrease the need for bond increases later when companies are potentially in financial distress. In addition to fulfilling its responsibility to prevent new orphaned wells, it falls to BLM to reclaim wells that are currently orphaned, and BLM has encountered challenges in doing so. We reported in May 2018 that 13 BLM field offices identified about $46.2 million in estimated potential reclamation costs associated with orphaned wells and with inactive wells that officials deemed to be at risk of becoming orphaned. There is also a risk more wells will become orphaned in coming years, as we described above. Based on the most recent orphaned well lists we received from BLM, 51 wells that BLM identified in 2009 as orphaned had not been reclaimed as of April 2019. The Energy Policy Act of 2005 (EPAct 2005) directs Interior to establish a program that, among other things, provides for the identification and recovery of reclamation costs from persons or other entities currently providing a bond or other financial assurance for an oil or gas well that is orphaned, abandoned, or idled. One way in which BLM may be able to accomplish this is through the imposition of user fees. In 2008, we found that well-designed user fees can reduce the burden on taxpayers to finance those portions of activities that provide benefits to identifiable users. Further, according to Office of Management and Budget guidance, it may be appropriate for an agency to request authority to retain the fee revenue if the user fees offset the expenses of a service that is intended to be self-sustaining. The volume of drilling applications and inactive wells provide an opportunity to fund reclamation costs. According to BLM data, the agency processes more than 3,500 applications to drill each year, on average, and has over 14,000 inactive wells. Based on our calculations, a separate fee of about $1,300 charged at the time a drilling application is submitted (in addition to the current drilling application filing fee, which is $10,050), or an annual fee of less than $350 for inactive wells could generate enough revenue to cover, in a little over a decade, the entire $46 million potential reclamation costs field offices identified to us. In commenting on a draft of this report, BLM stated that it does not have the authority to seek or collect fees from lease operators to reclaim orphaned wells. Developing a mechanism to obtain funds from operators to cover the costs of reclamation, consistent with EPAct 2005, could help ensure that BLM can completely and timely reclaim wells without using taxpayer dollars. Other federal programs, including other BLM programs, collect fees from users to fund reclamation activities. For example, the federal government collects fees from mining companies to reclaim abandoned mines. Specifically, the federal abandoned mine reclamation program is funded in part by fees on coal production. We reported in March 2018 that the program had spent about $3.9 billion to reclaim abandoned mine lands since the program’s creation in 1977. Additionally, some states with oil and gas development have dedicated funds for reclaiming orphaned wells. In Wyoming, the state’s Oil and Gas Conservation Commission’s Orphan Well Program reclaims orphaned wells on state or private lands for which bonds and operator liability are unavailable or insufficient to fund reclamation. The program is funded through a conservation tax assessed on the sale of oil and natural gas produced in Wyoming. Through this program, the Wyoming Oil and Gas Conservation Commission has reclaimed approximately 2,215 wells since 2014, according to a Commission official. Similarly, in Arkansas, operators make annual payments to its abandoned well plugging fund based on the number of wells and permits they have, on a sliding scale. For example, at the low end, operators with one to five wells or permits pay $100 per well, and at the high end, operators with over 300 wells or permits pay $4,000 per operator. The Arkansas fund was used to reclaim 136 wells in fiscal years 2016 through 2018, according to an official with the state’s Oil and Gas Commission. Virginia’s Orphaned Well Fund is funded through a $200 surcharge on each permit application. The fund is administered by the Virginia Division of Gas and Oil, which prioritizes wells to reclaim according to their condition and potential threat to public safety and the environment. BLM oversees private entities operating thousands of oil and gas wells on leased federal lands and has taken steps over the years to strengthen its management of the potential liability that oil and gas operations represent should operators not fully reclaim wells and return lands to their original condition when production ceases. For example, the agency’s 2013 bond adequacy review policy outlined how bonds were to be reviewed every 5 years and bond amounts adjusted depending on risks presented by operators. However, we found average bond values were slightly lower in 2018 as compared to 2008 and BLM has not obtained bond increases for the majority of instances in which its reviews identify that increases are needed. Instead, most bonds are at their regulatory minimum values, which are not sufficient to cover reclamation costs incurred by BLM. Without adjusting bond levels to more closely reflect expected reclamation costs—such as by considering the effects of inflation, the number of wells covered by a single bond, and the characteristics of those wells—BLM faces ongoing risks that not all wells will be completely and timely reclaimed, resulting in additional orphaned wells. Further, BLM faces a backlog of orphaned wells to reclaim—with 51 dating back at least 10 years. Unlike some other federal and state programs that obtain funds from industry through fees or dedicated funds, BLM does not do so for reclaiming orphaned wells. According to BLM, it does not have the authority to seek or collect fees from lease operators to reclaim orphaned wells. Authorizing and requiring the implementation of a mechanism to obtain funds from oil and gas operators to cover the costs of reclamation could help ensure BLM can completely and timely reclaim wells. Congress should consider giving BLM the authority to obtain funds from operators to reclaim orphaned wells, and requiring BLM to implement a mechanism to obtain sufficient funds from operators for reclaiming orphaned wells. (Matter for Consideration 1) The Director of BLM should take steps to adjust bond levels to more closely reflect expected reclamation costs, such as by increasing regulatory minimums to reflect inflation and incorporating consideration of the number of wells on each bond and their characteristics. (Recommendation 1) We provided a draft of this product to BLM for comment. In its written comments, reproduced in appendix II, BLM concurred with the recommendation. BLM stated that it is committed to ensuring that its field offices continue to review oil and gas bonds at least every 5 years, or earlier when warranted, and noted its November 2018 Instruction Memorandum 2019-014 updated its bond review policy. BLM further stated that, while the adjustment of bond values may not reflect the inflation index, the policy is intended to increase bond amounts while fostering an environment conducive to BLM’s leasing operations. As we point out in this report, BLM has historically had difficulties securing bond increases through bond reviews, and so additional steps may be needed to adjust bond levels to more closely reflect expected reclamation costs. In the draft we provided to BLM for comment, we included a recommendation that the Director of BLM should take steps to obtain funds from operators for reclaiming orphaned wells. BLM did not concur with this recommendation, saying it does not have the authority to seek or collect fees from lease operators to reclaim orphaned wells. We continue to believe a mechanism for BLM to obtain funds from oil and gas operators to cover the costs of reclamation for orphaned wells could help ensure BLM can completely and timely reclaim these wells, some of which have been orphaned for at least 10 years. We have therefore instead made a matter for Congressional consideration. BLM also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Interior, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report (1) describes the value of bonds for oil and gas wells in 2018 compared to 2008, and (2) examines the extent to which the Bureau of Land Management’s (BLM) bonds ensure complete and timely reclamation and thus prevent orphaned wells. To describe the value of bonds for oil and gas wells in 2018 compared to 2008, we analyzed oil and gas well data from BLM’s Automated Fluid Minerals Support System (AFMSS) as of May 2018 and data from BLM’s Legacy Rehost 2000 (LR2000) system on bonds as of May 2018. Bond data we reviewed included the bond category (e.g., individual lease or nationwide) and bond value. We compared these data to data obtained from the same systems for 2008 and reported by GAO in 2010. We matched the May 2018 data from the two systems based on the bond number—a variable in both systems—to identify how many wells were covered by each bond and to determine the average bond value per well for each bond category. To assess the reliability of AFMSS and LR2000 data elements, we reviewed agency documents, met with relevant agency officials, and performed electronic testing. We found these data to be sufficiently reliable for our purposes. We also interviewed BLM headquarters officials to understand why bond composition may have changed over time. To report on the number of bonded wells held by BLM, we used a published BLM value for producible well bores—wells capable of production—which should represent a lower bound on the number of bonded wells in September 2018 because some wells may be plugged or temporarily incapable of production but would still require a bond if the surrounding site had not been fully reclaimed. To determine the average value of bonds per well in 2018, we divided the total value of all bonds held by BLM by the total number of producible well bores. To examine the extent to which BLM’s bonds ensure complete and timely reclamation and prevent orphaned wells, we conducted the following analyses: Reclamation cost scenarios: To determine whether bonds are sufficient to cover potential reclamation costs for the wells they cover, we identified typical high- and low-cost scenarios for well reclamation (including plugging the well and reclaiming the surrounding well site) and compared those scenarios to the average bond value available per well. To determine high- and low-cost reclamation scenarios, we analyzed BLM’s well reclamation cost estimates on proofs of claim submitted to the Department of Justice from calendar year 2016 through May 2018. These 59 proofs of claim listed estimated reclamation costs for 8,664 well sites. We calculated the average reclamation cost per well for each individual proof of claim by dividing the total dollar value claimed for reclamation liability (actual liability plus potential liability) by the total number of wells listed in each proof of claim document. We found the average reclamation cost estimates for each proof of claim have a bimodal distribution, meaning that data are clustered around two distinct cost levels, rather than clustered around a single average cost. As a result, we determined that using two separate measures that indicate typical values for separate groups of low-cost and high-cost wells would provide more meaningful statistics about cost. We therefore selected reclamation costs of $20,000 for the low-cost reclamation scenario and $145,000 for the high-cost scenario based on the 25th and 75th percentiles of the distribution of average estimated reclamation cost per proof of claim, weighted by the number of wells on each proof of claim. Bond value per well: To determine the average bond value available per well, we analyzed bonds listed in LR2000 that were tied to wells listed in AFMSS using the bond number—a variable in both systems. We found that 1,547 out of the 3,357 unique bond numbers in LR2000 had wells tied to them in AFMSS. These 1,547 bonds covered about 80 percent of the wells in AFMSS. The other 20 percent of wells in AFMSS either did not list a bond number, or the bond number listed was not in LR2000. For each bond in LR2000 covering wells in AFMSS, we calculated the bond available per well as the bond value divided by the number of wells it covers. We then compared the bond values per well against both high ($145,000 per well) and low ($20,000 per well) reclamation cost scenarios to identify which bonds would be adequate to reclaim all the wells they covered under different cost scenarios. If AFMSS bond information was incomplete, it is possible that there are more wells covered by bonds than we were able to identify—and therefore the bond value per well would be lower than we found. At-risk wells: To identify wells that may be at greater risk of becoming orphaned and determine whether their bonds are sufficient to cover potential reclamation costs, we used well production data from the Office of Natural Resources Revenue’s Oil and Gas Operations Report (OGOR) as of June 2017 and bond values from LR2000. First, we defined wells as “at risk of becoming orphaned” if they met several criteria. Specifically, we identified wells that (1) had recent OGOR reports (on or after March 2017); (2) had not been used productively from at least June 2008 through the most recent record (meaning the well did not report producing any volume of oil or gas during this timeframe, nor were any volume of water or materials injected into the well during this timeframe); (3) were not being used as a monitoring well in the most recent record, which we considered a productive use; and (4) had not been plugged and abandoned. We selected June 2008 as the cutoff date for productivity because in June and July of 2008, oil and gas prices hit peaks that have not since been reached again, and which the Energy Information Administration does not expect prices to reach again through at least 2050. We believe our analysis is a conservative estimate of wells at greater risk, in part because we did not include wells that produced when prices were at their peaks and stopped producing soon afterward and may be unlikely to produce in the future unless prices reach the same peaks again. In addition, our lower-bound estimate does not include some coalbed methane wells that have been inactive for less than 9 years but are unlikely to produce at current prices because of the relatively higher cost of coalbed methane production. We also excluded wells that reported any volume of oil or gas production or water injection since June 2008, although some very low-producing wells may also be at risk of becoming orphaned. Bond value for at-risk wells: To calculate the average bond value per at-risk well, we identified bonds listed in LR2000 that were tied to at- risk wells in AFMSS to determine the value of bonds available to reclaim these at-risk wells if needed. We identified 2,041 of the 2,294 at-risk wells were linked to bonds. For each bond, we divided the bond value by the number of at-risk wells it covered to determine the bond amount per at-risk well. In cases in which an at-risk well was linked to more than one bond, we additionally calculated the average of the bond value per at-risk well for each bond linked to the well. To determine the sufficiency of bonds for at-risk wells, we identified the number of wells with an average bond value per at-risk well equal to or greater than $20,000 (low cost reclamation scenario) or $145,000 (high cost reclamation scenario). Orphaned wells: We compared three lists of orphaned wells based on data provided by BLM in 2009, July 2017, and April 2019. The 2009 data are from our January 2010 report, which used Orphaned Well Scoring Checklists that list information such as the well’s name and location. The July 2017 data are from our May 2018 report, which used an orphaned well list generated through a query of AFMSS by BLM. The April 2019 list was generated through a query of an updated version of AFMSS known as AFMSS 2. We compared the lists to identify how many wells that were on the 2009 list remained on the 2019 list, and how many wells that were on the 2017 list were on the 2019 list. To assess the reliability of the AFMSS, LR2000, and OGOR data elements we used, we reviewed agency documents, met with relevant agency officials, and performed electronic testing. We found these data elements to be sufficiently reliable for our purposes. Similarly, to assess the reliability of the 2019 orphaned well list, we reviewed agency documents and met with relevant agency officials. Though we identified shortcomings with data on orphaned wells, we nevertheless found these data to be sufficiently reliable for the purpose of describing the orphaned wells BLM has identified. To assess the reasonableness of proofs of claim data, we interviewed relevant agency officials and reviewed agency documents. To understand how BLM manages bonds, we reviewed BLM’s policies and interviewed officials from four BLM state offices and four BLM field offices. We selected these state and field offices because, according to AFMSS data, they were responsible for managing the largest numbers of wells on federal land. These BLM state offices were California, New Mexico, Utah, and Wyoming. These BLM field offices were Bakersfield, Buffalo, Carlsbad, and Farmington. We also interviewed officials from BLM’s headquarters office in Washington, D.C. Findings from the selected BLM offices cannot be generalized to officials we did not interview but provide a range of views. To understand how some states with oil and gas development on state lands set minimum bonds and fund orphaned well reclamation, we contacted officials from oil and gas oversight agencies in Arkansas, Louisiana, Pennsylvania, Texas, Virginia, and Wyoming. We conducted this performance audit from January 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Quindi Franco (Assistant Director), Marietta Mayfield Revesz (Analyst-in-Charge), Marie Bancroft, William Gerard, Cindy Gilbert, Gwen Kirby, Joe Maher, Shaundra Patterson, Dan Royer, and Jerry Sandau made key contributions to this report.", "summary": "The oil and natural gas produced from wells on federal lands are important to the U.S. energy supply and bring in billions in federal revenue each year. However, when wells are not properly managed, the federal government may end up paying to clean up the wells when they stop producing. Specifically, wells on federal lands that an operator does not reclaim and for which there are no other liable parties fall to BLM to reclaim (restore lands to as close to their original natural states as possible). These wells become orphaned if the operator's bond held by BLM is not sufficient to cover reclamation costs. BLM regulations set minimum bond values at $10,000 for all of an operator's wells on an individual lease, $25,000 for all of an operator's wells in a state, and $150,000 for all of an operator's wells nationwide. GAO was asked to review the status of oil and gas bonding for federal lands. This report (1) describes the value of bonds for oil and gas wells in 2018 compared to 2008, and (2) examines the extent to which BLM's bonds ensure complete and timely reclamation and thus prevent orphaned wells. GAO analyzed agency data on bonds and wells and interviewed BLM officials. The average value of bonds held by the Bureau of Land Management (BLM) for oil and gas wells was slightly lower on a per-well basis in 2018 ($2,122) as compared to 2008 ($2,207), according to GAO's analysis of BLM data. The total value of bonds held by BLM for oil and gas operations increased between these years, as did the number of wells on federal land. Bonds held by BLM have not provided sufficient financial assurance to prevent orphaned oil and gas wells (wells that are not reclaimed by their operators and, among other things, whose bonds were not sufficient to cover remaining reclamation costs, leaving BLM to pay for reclamation). Specifically, BLM identified 89 new orphaned wells between July 2017 and April 2019, and BLM offices identified to GAO about $46 million in estimated potential reclamation costs associated with orphaned wells and with inactive wells that officials deemed to be at risk of becoming orphaned in 2018. In part, bonds have not prevented orphaned wells because bond values may not be high enough to cover the potential reclamation costs for all wells under a bond, as may be needed if they become orphaned. GAO's analysis indicates that most bonds (84 percent) that are linked to wells in BLM data are likely too low to reclaim all the wells they cover. Bonds generally do not reflect reclamation costs because most bonds are set at their regulatory minimum values, and these minimums have not been adjusted since the 1950s and 1960s to account for inflation (see figure). Additionally, these minimums do not account for variables such as number of wells they cover or other characteristics that affect reclamation costs, such as well depth. Without taking steps to adjust bond levels to more closely reflect expected reclamation costs, BLM faces ongoing risks that not all wells will be completely and timely reclaimed, as required by law. It falls to BLM to reclaim orphaned wells, but the bureau does not assess user fees to cover reclamation costs, in part because it believes it does not have authority to do so. Providing such authority and developing a mechanism to obtain funds from operators for such costs could help ensure that BLM can completely and timely reclaim wells. Congress should consider giving BLM the authority to obtain funds from operators to reclaim orphaned wells, and requiring BLM to implement a mechanism to do so. GAO also recommends that BLM take steps to adjust bond levels to more closely reflect expected reclamation costs. BLM concurred. BLM did not concur with a proposed recommendation to develop a mechanism to obtain funds, citing lack of authority. GAO changed it to a matter for Congressional consideration.", "document_type": "gao"}
{"report": "HUD created REAC in 1997 to obtain consistent information on, among other things, the physical condition of its public and multifamily properties. REAC generally inspects properties every 1 to 3 years, using a risk-based schedule (discussed in detail below). REAC developed a standardized protocol to inspect properties, referred to as the Uniform Physical Condition Standards. As part of the protocol, REAC also inspects properties to identify health and safety deficiencies, including exigent health and safety deficiencies, which are life-threatening and require immediate action or remedy (such as exposed electrical wires or blocked access to windows or doors in case of a fire). REAC’s data system automatically generates an overall inspection score for the property from 0 to 100 based on the information an inspector records. At the end of each day of an inspection, an inspector is required to inform a property manager or other representative if the inspection identified exigent health and safety issues. Before releasing the inspection score, REAC reviews the inspection through a quality assurance process to ensure it is accurate. Following verification of the inspection score, REAC releases an inspection report to the property owner or PHA and the relevant HUD program office. The inspection report contains the overall inspection score, as well as more detailed information on physical deficiencies identified during the inspection. REAC primarily uses contractors—who are trained and certified in REAC’s Uniform Physical Condition Standards protocol—to conduct inspections of multifamily and public housing properties. In addition to these contract inspectors, REAC uses quality assurance inspectors, who are HUD employees, to oversee and monitor contract inspectors, as well as to ensure that REAC provides accurate and reliable inspections. Both contract and quality assurance inspectors complete several phases of training on the inspection protocol, including online, classroom, and field- based training. To procure inspections of HUD-assisted properties, REAC primarily uses an auction process to award contracts either to eligible contract inspectors or to companies that employ contract inspectors. This process, called a reverse auction program, occurs at least once a quarter. Contract inspectors or companies bid to inspect properties across the United States and its territories in a web-based auction. At the close of the auction, REAC awards the inspection to whoever bids the lowest price and is eligible to conduct inspections. The contract inspector then schedules and performs the property inspections in accordance with Uniform Physical Condition Standards protocol. According to REAC officials, this process is designed to increase cost savings and small business participation. REAC is situated within PIH. Several departments within REAC are involved in facilitating the physical inspection process: Physical Assessment Subsystem (PASS): PASS has three primary divisions that are responsible for different aspects of the inspection process. The PASS Physical Inspection Operations division coordinates the procurement of inspections. The PASS Quality Assurance division evaluates and monitors REAC’s inspection program to ensure reliable, replicable, and reasonable inspections; trains contract and quality assurance inspectors; and provides technical assistance to HUD-assisted properties and other relevant stakeholders. The PASS Inspector Administration division monitors the performance of inspectors and takes administrative actions, such as decertifying inspectors who do not meet REAC’s standards for inspectors. Research and Development: REAC’s Research and Development division produces data analysis and statistical reports on REAC’s information products (e.g., physical inspection reports and Public Housing Assessment System scores) and assesses these products to ensure they are accurate and valid. REAC is also responsible for evaluating additional conditions, beyond physical conditions, of multifamily and public housing properties. Specifically, REAC evaluates the financial conditions of multifamily properties and assesses the financial and management performance of public housing properties. This performance assessment is conducted through the Public Housing Assessment System. REAC uses several data systems to collect, score, and report on the financial and management conditions of public housing properties, along with evaluating the utilization of property modernization and development funds (capital funds). We describe this process in more detail later in the report. HUD’s PIH, Multifamily Housing, and Departmental Enforcement Center are responsible for ensuring that the owners of REAC-inspected properties (including PHAs) correct the identified physical deficiencies. PIH: This office helps low-income families by providing rental assistance through three programs; our review focuses on physical inspections of the public housing program. In 2018, HUD’s public housing program provided low-rent housing units to over 1 million eligible households. Public housing consists of reduced-rent developments owned and operated by local PHAs and subsidized by the federal government. About 3,300 PHAs own and manage public housing properties. These properties can include high-rise and low-rise buildings and scattered single-family properties, or they can be part of mixed-income housing developments, and they can range in size from fewer than 100 units to more than 30,000 units. PHAs typically have an executive director to manage their operations, as well as a governing board—called a Board of Commissioners—to approve policy, clarify goals, and ensure compliance with federal regulations. PHAs have contracts, called Annual Contributions Contracts, with the federal government. Under the terms of their contracts, PHAs agree to administer their properties according to federal regulations, in exchange for federal funding in the form of operating and capital grants. PIH is organized into six geographic networks, each with several field offices. Multifamily Housing: This office manages HUD’s portfolio of multifamily properties and provides rental assistance through several programs, including Section 8 project-based rental assistance, in which HUD contracts with private property owners to rent housing units to eligible low-income tenants for an income-based rent. Multifamily Housing also oversees the Federal Housing Administration’s multifamily mortgage insurance on loan originations and administers supportive housing for the elderly and programs for persons with disabilities. Collectively, the properties that Multifamily Housing oversees provided affordable rental housing to more than 1.2 million low-income households in 2017. Property owners or management agents of multifamily properties sign business agreements with HUD. Under these agreements, owners or agents agree to administer their properties according to federal rules and regulations, and in exchange, among other benefits, they receive federal assistance through mortgage insurance or housing assistance payments. Multifamily Housing has 12 field offices across five geographic regions. Departmental Enforcement Center: The Departmental Enforcement Center is located within HUD’s Office of General Counsel and works with several of HUD’s program offices, including PIH and Multifamily Housing, to ensure that program funds are used according to federal regulations. These program offices make referrals for the Departmental Enforcement Center to review the financial and other conditions of properties receiving rental assistance from HUD. Based on these reviews, the Departmental Enforcement Center can take various enforcement actions, such as imposing administrative sanctions to bar individuals from participating in HUD programs or civil money penalties for violations. REAC conducts inspections on multifamily and public housing properties using a risk-based schedule defined in federal regulations. According to our analysis of REAC inspection data, REAC conducted 44,486 inspections of multifamily properties and 15,156 inspections of public housing developments from fiscal years 2013 through 2017. For multifamily properties, REAC inspects properties every 1 to 3 years. Generally, properties that receive an inspection score below 80 are inspected within 1 year of the previous inspection; between 80 to 89 within 2 years; and 90 to 100 every 3 years. The inspection frequency for public housing developments varies depending on the overall size of the PHA (that is, the number of units and properties that they manage), an individual housing development’s inspection score, and the PHA’s overall performance on the Public Housing Assessment System. For PHAs with 250 housing units or more, REAC inspects developments every 1 to 3 years, using the same risk- based thresholds as Multifamily Housing. For small PHAs with fewer than 250 units, their score on the Public Housing Assessment System determines the inspection frequency, with higher scores associated with less frequent inspections. However, all developments—regardless of the number of units—that receive an overall performance assessment score (as part of the Public Housing Assessment System) of less than 60 out of 100 are designated to have a physical inspection every year. REAC’s Uniform Physical Condition Standards inspection protocol is designed to help provide assurance that physical deficiencies will be identified at HUD-assisted properties. Under the protocol, contract inspectors inspect five areas of a property using a handheld data collection device to help identify and record deficiencies (see fig. 1). The devices have embedded software that provides step-by-step instructions on conducting the inspection. The software helps to ensure consistency between inspectors and consistency with the protocol, according to REAC staff. The software includes a decision-tree model to guide the inspectors on recording and classifying the severity of deficiencies they identify. For example, if an inspector identifies a deficiency with a door in a dwelling unit, the software will ask the inspector to identify which door has the deficiency and the nature of the deficiency (e.g., door lock does not work). The software then assigns a severity level to the deficiency and, if it is severe enough, requires the inspector to take a photo (see fig. 2). REAC has a number of quality assurance processes intended to ensure that contract inspectors identify deficiencies and conduct quality inspections: Collaborative quality assurance (CQA) review. In CQA reviews, REAC quality assurance inspectors observe contract inspectors to help ensure their inspections are accurate and consistent with protocol. REAC uses CQA reviews to coach contract inspectors to help improve their performance. Post-inspection review process. Completed inspections receive two levels of review by REAC quality assurance staff, who use software that compares certain aspects of the current and previous inspections—such as inspection scores, property profiles (for example, number of units), site measurements, and time taken to complete the inspection—and highlights large variances. Quality control inspection (QCI). If REAC reviewers find large variances in current and previous inspection scores and other aspects, they may reject the inspection and schedule a QCI. The QCI is a review of a previously inspected property to evaluate an inspector’s performance and identify potential weaknesses in the quality of the inspection. This review process requires a REAC quality assurance inspector to conduct a second inspection of the same property, including selecting the same sample of buildings and units of the original inspection. Once the QCI is completed, REAC’s reviewers, in collaboration with REAC’s Research and Development division, identify any deficiencies missed and determine whether the contract inspector was complying with REAC’s physical inspection standards. Property owners may appeal deficiencies REAC has identified during the physical inspection. For example, an owner might appeal a deficiency resulting from a window air conditioner blocking egress by providing evidence that this is permitted by local building code. If the appeal is successful, REAC removes the deficiency and the inspection software updates the score. Contract inspectors, REAC quality assurance inspectors, and representatives of property owner associations with whom we spoke had mixed views on REAC’s inspection process. Participants in three of the five discussion groups we held with contract and quality assurance inspectors said that the inspection process provides a comprehensive review of a property and that the inspection software helps promote consistency in inspections. Likewise, representatives from one property owner association we met with said that the inspection process was more standardized and less subjective than in the past. Representatives from another association said that the inspection process effectively identified deficiencies. However, participants in three of the same five discussion groups with contract and quality assurance inspectors noted inconsistent application of protocols and standards, noting that some cases were unclear and required judgment in identifying deficiencies. REAC’s inspection process has features similar to those of home inspection organizations such as the American Society of Home Inspectors (ASHI) and the International Association of Certified Home Inspectors (InterNACHI). For example, ASHI and InterNACHI have developed standards of practice that guide their inspectors on conducting inspections, similar to the role of REAC’s Uniform Physical Condition Standards inspection protocol. In addition, ASHI and InterNACHI require their inspectors to inspect the same five areas of a property that REAC does. Finally, ASHI and InterNACHI have codes of conduct that specify what constitutes ethical conduct for their inspectors; similarly, REAC has developed business rules that define ethical conduct for contract inspectors. REAC has made two major changes to the inspection process over the past 6 years. First, in 2012, REAC updated its inspection software to include the decision-tree model previously discussed and established a point-loss cap to limit the amount by which a single deficiency in an inspectable area could reduce the overall property score. For example, if an inspector found numerous tripping hazards within the same inspectable area, the inspector would record all instances of this hazard, but the software would only deduct from the inspection score once rather than multiple times, according to REAC staff. Second, in 2017, REAC updated its compilation bulletin to address concerns that property owners were making cheap, non-industry-standard repairs to disguise deficiencies during a REAC physical inspection. REAC now requires its inspectors to determine if deficiencies have been corrected consistent with industry standards. For example, property owners cannot use materials such as asphalt, caulking, spray foam, or screws to cover or fill a crack or opening in an electrical panel because that repair would not be consistent with industry standards (see fig. 3). As shown in table 1, from fiscal years 2013 through 2017, the median inspection scores for multifamily and public housing properties were in the mid- to high-80s, with scores trending downward toward the end of that time frame. (See apps. II and III for additional data on REAC scores.) However, a small percentage of multifamily properties scored below 60, which for multifamily properties is defined as a failure and triggers enforcement actions that Multifamily Housing or the Departmental Enforcement Center can take to require the correction of physical deficiencies. Of 27,486 multifamily properties that were inspected during fiscal years 2013 through 2017, 1,760 properties (6 percent) failed at least one inspection, and 272 properties (1 percent of the total) failed two or more inspections. Staff in Multifamily Housing field offices said multiple failed inspections are a sign of serious owner noncompliance, such as an owner who plans to sell and thus lacks motivation to make needed repairs. Multifamily Housing staff said that they take enforcement action in these cases. A higher percentage of public housing properties scored below 60 during this same period. Of the 7,699 public housing properties that were inspected during this period, 887 (11 percent) scored below 60 for at least one inspection, and 291 (4 percent) scored below 60 for two or more inspections. REAC has not conducted a comprehensive review of its inspection process since 2001, even though new risks to its process have emerged since then. A concern of REAC staff is that some property owners have taken advantage of the scoring system and others have misrepresented the conditions of their properties. Specifically, because more points are deducted for deficiencies on the property site than for deficiencies in a dwelling unit, some property owners prioritize site repairs over unit repairs. Additionally, some property owners attempt to cover up, rather than address, deficiencies—such as by using mulch on a building exterior to hide erosion. REAC staff have also raised concerns about property owners employing current or former REAC contract inspectors to help prepare for an inspection, sometimes by guiding owners to repair just enough to pass inspection rather than comprehensively addressing deficiencies. REAC also continues to find that some contract inspectors are conducting inspections that do not meet REAC’s quality standards (discussed later in the report). Property owner associations we met with also raised concerns about the fairness of the inspection process. Specifically, representatives of two property owner associations said that REAC’s inspection process penalizes properties for items that do not affect the livability of a unit (e.g., property receives severe deficiency for chips on exterior bricks even though the dwelling units are in good condition). Representatives from one property owner association said that some properties’ scores have fluctuated even though the condition of the property has not changed. HUD’s Office of Inspector General (OIG) also identified some weaknesses in the inspection process. Specifically, the OIG found that REAC did not verify the accuracy of sampled units for public housing agencies. Further, REAC fundamentally changed the entities that conduct inspections. In 1998, REAC employed a few large inspection companies to conduct the inspections. However, in 2005, REAC introduced the reverse auction program and opened up the inspection process to a larger number of small businesses, which resulted in a change in the composition of inspectors conducting the inspections. One of the subgoals of REAC’s strategic plan for 2011–2015 was for REAC to produce inspections of HUD-assisted properties that are reliable, replicable, and reasonable. To meet this subgoal, the plan states that REAC should assess its inspection process and apply lessons learned over the last 10 years in order to improve the process. The plan also states that REAC should conduct independent, internal audits and reviews of the inspection process to identify strengths and weaknesses and develop recommendations for improvement. Further, federal internal control standards state that management should implement control activities through policies, such as by periodically reviewing policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. REAC officials stated that they understand the importance of conducting a comprehensive review of the inspection process similar to what they did in 2001 but that they have focused their staff and resources on other priorities—for example, upgrading their technology and quality assurance processes, hiring and training quality assurance inspectors, and conducting targeted assessments of their inspection process in reaction to specific events or risks. For example, REAC staff worked on an intra- agency team to develop recommendations to address weaknesses in the inspection process that were identified as part of the assessment of Eureka Gardens. (We describe this effort later in the report.) REAC staff also said that they updated the compilation bulletin in reaction to property owners who were making cheap, non-industry-standard repairs to disguise deficiencies during a REAC physical inspection. In addition, REAC staff noted that they meet biweekly to address certain parts of the inspection process, such as the appeals and quality assurance processes. However, these efforts help identify weaknesses in the inspection process related to specific risks and were not comprehensive enough to identify and address broader risks. For example, REAC has not assessed how changes to one part of its inspection process (for example, changing how many points are deducted for a particular inspectable area) can affect other parts of the process or result in unintended consequences. Without a comprehensive review to assess its inspection process, REAC cannot determine if it is meeting the goal of producing inspections that are reliable, replicable, and reasonable. REAC may not be identifying all properties that need more frequent inspections or enforcement actions because it does not consider sampling errors of the inspection scores. REAC’s inspection process does not require the inspection of all units and buildings within large properties due to REAC’s limited inspection resources. For these properties, the inspection process provides for inspecting statistical samples of units and buildings. The results for the sample are then used to estimate a score that represents the condition of the entire property. Sampling introduces a degree of uncertainty, called sampling error, which statisticians commonly express as a range associated with numerical results. For example, for a property that scored 62 on its physical inspection, REAC would consider this a passing score that requires an annual inspection and no enforcement action. However, due to sampling error, the range associated with this score could be between 56 on the lower bound and 68 on the upper bound. HUD takes enforcement action for multifamily properties with a score below 60. Federal internal control standards state that management should use quality information to achieve the entity’s objectives. In particular, internal control standards note the importance of using the entity’s objectives and related risks to identify the information requirements needed to achieve the objectives and address the risks. REAC’s property inspection scores are currently presented as numerical results without any information on the range associated with the score. REAC’s prior version of its scoring software automatically calculated the sampling errors in the inspection scores, and this information was available for inspection scores from fiscal years 2002 through 2013. However, according to REAC staff, the current version of its scoring software does not automatically calculate the sampling errors, in part because of a lack of resources and also because they believe there is no need to calculate them. Yet, in a review we conducted of REAC in 2000, officials told us that they planned to adjust the score downward and take appropriate actions for inspection scores with a lower bound that fell under an administrative cutoff, such as 60 points. During our current review, REAC staff told us that they did not implement this plan because they would need to coordinate with other HUD offices, such as the Office of Housing, and issue a notice in the Federal Register for public comment. Based on our analysis of REAC inspection data, HUD potentially could have taken enforcement actions against more properties if REAC had taken sampling errors in inspection scores into account. For example, from fiscal years 2002 through 2013, about 4.3 percent of inspections of multifamily and public housing properties had an inspection score of 60 or slightly above 60 but had a lower bound score under 60. In addition, some multifamily and public housing properties might have been inspected more frequently if the sampling errors were taken into account. For example, federal regulations require inspections of multifamily properties scoring 90 or greater once every 3 years; scoring 80 to 89 once every 2 years; and scoring less than 80 every year. Taking sampling errors into account, about 7.1 percent of multifamily properties inspected from fiscal years 2002 through 2013 might have been inspected 1 year after the most recent inspection rather than 2 years. Likewise, about 7.2 percent of inspections of multifamily properties might have occurred 2 years after the most recent inspection, rather than 3 years. Without reporting on sampling errors and considering the results, REAC will not identify some properties which could require more frequent inspections or enforcement actions. REAC lacks comprehensive or organized documentation of the sampling methodology it uses to make generalizable estimates about the condition of properties with its scoring system. REAC’s documentation supporting its sampling methodology is contained in five documents, none of which provides a comprehensive description of the methodology with all changes to the methodology incorporated. The main document that describes the sampling methodology is a paper presented to the American Statistical Association in 2002. This document provides a very short summary of the sampling methodology, but some key assumptions, calculations, and details are not included. For example, this document does not show how REAC derived one of the variables used to calculate the number of units to sample. When we asked REAC staff to provide us with documentation on how they derived this variable, they could only provide us with an email from 2005 from a former REAC statistician that discussed some of the statistical considerations that went into the derivation of the sample-size formula. The other four documents related to the sampling methodology are dated prior to 2002 and include the initial methodology developed and subsequent changes, but these also do not provide complete information on why key assumptions were used, or the documents lack certain formulas. Further, REAC has not updated any of its documents related to the sampling methodology since 2002 to reflect current practices. Federal internal control standards state that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. In particular, the standards note the importance of developing and maintaining documentation of the internal control system. This documentation provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as a means to communicate that knowledge as needed to external parties, such as external auditors. Further, this documentation of controls, including changes to controls, is evidence that controls are identified, capable of being communicated to those responsible for their performance, and capable of being monitored and evaluated by the entity. However, REAC does not have a process to ensure comprehensive and organized documentation of the sampling methodology of its inspection process. Instead, REAC relies on the institutional knowledge of individual staff members. For example, when we requested documentation of its sampling methodology, REAC relied on a statistician who had been with the organization for many years to locate and provide us with the documents we requested. In addition, we had to interview this individual to better understand the methodology because key pieces of information were missing from these documents. REAC staff told us that since the inspection process has remained relatively consistent over time, they have not seen the need to ensure that documentation of the sampling methodology is comprehensive and organized. By interviewing multiple individuals, reviewing multiple documents, and conducting our own calculations, we were able to determine that REAC’s sampling methodology is suitable for making generalizable estimates about the condition of a property with the scoring system. However, the lack of comprehensive and organized documentation could affect REAC’s ability to preserve institutional knowledge and make changes or improvements to its inspection process if key staff leave the agency. REAC schedules inspections of multifamily properties based on the prior REAC inspection score, but it did not meet its schedule for about 20 percent of inspections from calendar years 2013 through 2017. As discussed earlier, federal regulations require inspections of multifamily properties scoring 90 or greater once every 3 years, those scoring 80 to 89 once every 2 years, and those scoring less than 80 every year. Our analysis of REAC inspection data showed that about 20 percent of the properties were not inspected within 3 months before or after what HUD has identified as the ideal date to conduct the inspection, called an ideal future date. On average, REAC conducted inspections for these properties about 6 months past the ideal future date. REAC staff told us that there may be legitimate reasons for not conducting an inspection according to the ideal future date. For example, Multifamily Housing can delay an inspection because of natural disasters or major rehabilitations to the property, among other reasons. However, REAC maintains limited data on the reasons why inspections have been rescheduled or cancelled. In addition, these data are not readily available to understand retrospectively why an inspection did not occur on schedule. REAC also does not track its progress toward meeting its requirement for inspecting multifamily properties within prescribed time frames. Federal internal control standards state that management should use quality information to achieve the entity’s objectives. In particular, the standards note the importance of designing a process that uses the entity’s objectives and related risks to identify the information requirements needed to achieve the objectives and address the risks. Further, management should obtain relevant data from reliable internal and external sources in a timely manner and process these data into quality information that supports the internal control system. Multifamily Housing depends on REAC inspections to provide assessments of the physical condition of properties under its jurisdiction (discussed in greater detail later in this report). REAC’s inability to adhere to the inspection schedule for multifamily properties could hinder Multifamily Housing’s ability to monitor the physical condition of properties on a timely basis and take enforcement actions when warranted. The lack of a mechanism to track REAC’s progress toward meeting its requirement for inspecting multifamily properties also hinders REAC’s ability to determine what factors are contributing to delays in conducting the inspections. As a result, REAC lacks the information needed to determine the scope of the problem and what actions it can take to ensure multifamily properties are inspected on a timely basis. REAC has started a pilot program to staff inspections that contractors typically do not bid on, but it has not developed a formal plan to evaluate the results of this pilot. Since 2005, REAC has used the reverse auction program to save money on inspections and increase small business participation. However, under the reverse auction program, REAC has faced challenges in obtaining bids for inspections in some urban areas, such as Chicago, and some remote areas. To address this challenge, for a select number of properties, REAC has implemented a pilot program as an alternative to the reverse auction program. Under this alternative process, REAC has awarded multiple Indefinite Delivery/Indefinite Quantity (IDIQ) contracts to four companies to conduct these inspections. The IDIQ contracts are intended to ensure that REAC obtains physical inspections of all HUD-assisted properties on one task order rather than allowing contractors to selectively choose properties under the current program. The “all or none” approach, a key feature of these IDIQ contracts, eliminates the need to re-auction the same properties multiple times at higher prices to incentivize contractors to bid on the property. The pilot differs from REAC’s current physical inspection process in a number of ways. The pilot requires the companies that have been awarded the IDIQ contract to inspect all properties in a geographic region rather than to select which individual properties they want to bid on. Another difference is that the companies conduct quality assurance functions normally conducted by REAC staff, such as ensuring that inspectors are certified and identifying and addressing any gaps in inspectors’ performance. As of November 2018, REAC had focused its efforts on implementing the pilot but had not developed a formal plan to evaluate its results. GAO’s guide for designing evaluations states that a program evaluation is a systematic study using research methods to collect and analyze data to assess how well a program is working and why. Some key attributes of effective program evaluation design include the following: identification of data sources and collection procedures to obtain relevant, credible information; clear criteria for making comparisons that will lead to strong, defensible evaluation conclusions; and an established evaluation scope that will ensure the evaluation is tied to research questions. Federal internal control standards also state that management should use quality information to achieve the entity’s objectives. In particular, the standards note the importance of management designing a process that uses the entity’s objectives and related risks to identify information requirements needed to achieve the objectives and address the risks. Further, the standards stress the importance of management obtaining relevant data from reliable internal and external sources in a timely manner based on the identified information requirements. REAC staff told us that they plan to measure the success of the pilot program by determining whether companies are completing quality inspections in a timely manner. However, REAC staff did not provide details about how the results of the pilot would be compared to the existing process and how the quality of inspections and the performance of inspectors would be measured and assessed. Absent a formal process that incorporates key attributes for effectively evaluating the results of the pilot program, REAC may lack the information needed to determine if the pilot is a success or whether changes are needed before moving from a pilot to a permanent process. HUD has made limited progress in implementing recommendations from an internal review of REAC that was conducted in 2016. HUD created the Rapid Response and Resolution team—which consisted of staff from REAC and other units within HUD, including Multifamily Housing—in response to, among other things, problems associated with Eureka Gardens, a multifamily property in Jacksonville, Florida. In 2015, REAC conducted a physical inspection of Eureka Gardens, and the contract inspector gave the property a score of 85. However, REAC later declared that the inspection was out of standard when it learned that the contract inspector had only inspected one of the two properties associated with Eureka Gardens (the better of the two properties). REAC officials told us that property management engaged in some deceptive practices (such as making quick, cheap repairs) in an attempt to influence the inspection score. According to these officials, the inspector did not conduct the inspection consistent with REAC’s standards and was subsequently decertified. REAC then reinspected the entire Eureka Gardens property with its own quality assurance staff and found numerous deficiencies, which resulted in the property receiving an inspection score of 62. The Rapid Response and Resolution team developed 31 recommendations, 8 of which were specific to REAC, in January 2017. As of December 2018, nearly 2 years after the recommendations were developed and 3 years after the initial inspection of Eureka Gardens, REAC had reached concurrence with Multifamily Housing on 3 of these recommendations and asked for Multifamily Housing’s consideration of the funding and rulemaking requirements for the remaining 5. HUD had also not yet implemented the 3 recommendations on which it reached concurrence. Some of these recommendations address REAC’s management of the inspection process. They include the following: Weighting of dwelling units in inspection score. The review team recommended that REAC consider increasing the weight of dwelling- unit deficiencies in the physical condition score. This recommendation attempts to address the issue, discussed earlier, of property owners who focus their repairs on common areas of the property over dwelling units. Notice provided to property owners of impending inspection. This recommendation reduces the time that REAC can take to notify property owners of an upcoming inspection from 15 days to 3 days for properties that have failed their previous REAC inspection. REAC staff said that this change would provide a more accurate picture of the condition of properties since property owners generally address the maintenance of the property just before an inspection. In addition, this recommendation could address the concern discussed earlier of property owners hiring current or former REAC contract inspectors to help them prepare for an inspection. This recommendation should also encourage property owners to maintain properties in good condition at all times, according to REAC staff. Exigent health and safety risks. Another recommendation was that REAC work with Multifamily Housing and PIH to implement a risk- based exigent health and safety abatement verification policy. According to REAC staff, some properties certify that they have corrected exigent health and safety deficiencies when they have not done so. We found that many inspections conducted from fiscal years 2013 through 2017 had at least one exigent health and safety deficiency, and the percentage has been higher in recent years (see table 2). Field office staff from PIH and Multifamily Housing may check to ensure that these repairs have been made when they are onsite. However, neither of these offices has a formal program to ensure that property owners are actually addressing the exigent health and safety issues. As a result, property owners may choose to correct only those deficiencies that they believe will be checked by HUD field office staff, according to REAC staff. Federal internal control standards state that management should identify, analyze, and respond to risks related to achieving the defined objectives. By establishing the Rapid Response and Resolution team, HUD took the steps of identifying the risks to its inspection process and designing responses to these risks. However, the standards also call for remediating identified internal control deficiencies on a timely basis. HUD officials we met with attributed the delay in implementing the recommendations to prior vacancies in some senior leadership positions, including positions in Multifamily Housing. HUD’s delay in implementing most of the recommendations from the Rapid Response and Resolution team affects REAC’s ability to respond to weaknesses it has identified in the inspection process in a timely manner. Contract inspector candidates certify through an application that they meet REAC’s qualification requirements, but REAC does not currently verify that candidates have met these requirements before REAC selects them for training and determines them to be eligible to inspect HUD- assisted properties. Before inviting candidates to participate in inspector training, REAC requires them to certify that they meet three main qualifications: Inspections. Candidates must have conducted a minimum of 250 residential or commercial inspections. Building trades knowledge. Candidates must have building trades knowledge, such as knowledge of construction methods or electrical systems. Computer literacy. Candidates must be able to use email, the internet, and Microsoft Windows. However, REAC does not require documentation from contract inspector candidates demonstrating that they successfully conducted 250 inspections. REAC officials told us that they intend to verify a sample of the 250 inspections for each inspector, but as of November 2018 they had not yet developed a process for doing so, such as by developing a methodology for sampling and a timeline for contacting references. In contrast, one of the home inspection associations we met with, ASHI, requires certified inspector candidates to submit a list of 250 fee-paid home inspections that meet or exceed the ASHI standards and to provide a notarized affidavit validating those inspections. In addition, REAC staff told us that some contract inspector candidates have inspection experience based on inspections that are not as rigorous as those conducted using the Uniform Physical Condition Standards protocol. Participants in three of the four discussion groups we held with REAC quality assurance inspectors and supervisors told us that they had trained candidates who had included information on their applications about previous inspection experience that was not well matched to REAC’s inspection process. For instance, some inspector candidates submitted Federal Emergency Management Agency inspections and U.S. Army Office of Housing inspections as evidence of having completed 250 inspections, but REAC officials said these inspections are not as comprehensive as REAC inspections because they do not assess building systems, such as electrical or heating, ventilation, and air conditioning systems. Federal internal control standards call for management to recruit competent individuals so that they are able to accomplish their assigned responsibilities. In addition, key principles for workforce planning state that agencies need to determine the critical skills and competencies necessary to achieve their goals. REAC officials told us that the inspector training program should weed out inspector candidates that may not have the appropriate qualifications. However, although REAC officials told us that inspector candidates have been removed from training for not having the requisite skills, the officials were not able to determine how many candidates had misrepresented their qualifications on their application or had failed training for other reasons. REAC does not verify the inspections submitted by inspector candidates—relying instead on training to screen out unqualified candidates—and does not determine the type of inspection that may count as a qualifying inspection. As a result, REAC may be allowing candidates with insufficient experience to proceed in the training process, which may waste resources by training candidates who are unlikely to become successful inspectors. Contract inspector candidates must complete several phases of REAC training—online, in-class, and field—and pass associated examinations, as well as a background check. Online training. Inspector candidates first complete a 6-week online training that includes web-based modules on the Uniform Physical Condition Standards protocol and the use of the software system for the handheld data collection device. Candidates must pass a pre- certification examination to progress to the next phase of training. In-class training. After passing a background check, inspector candidates then begin in-class training. This phase consists of 3 to 4 days of in-class training led by REAC quality assurance inspectors and covers the compilation bulletin, Uniform Physical Condition Standards protocol, best practices, simulations of the inspection software, and hands-on practice exercises using the software. To proceed to field training, inspector candidates must pass a certification examination with a minimum score of 75 percent that covers material from both the compilation bulletin and the Uniform Physical Condition Standards protocol. Field training. The last phase is a 5-day field training course that culminates in a field examination. REAC quality assurance inspectors lead and provide instruction for the first 4 days of field training. Inspector candidates independently conduct a mock inspection using the Uniform Physical Condition Standards protocol on the fifth day, and a quality assurance inspector evaluates the candidate’s performance. REAC has made changes to training in recent years. For example, REAC began using actual HUD-assisted properties, rather than simulated properties, for the mock inspection. Some quality assurance staff and property owner associations told us they regarded the changes made in recent years to be beneficial. Participants in three of the four discussion groups we held with quality assurance supervisors and inspectors, as well as two representatives of property owner advocacy organizations, said that, in addition to classroom training, field training on a physical property helped to assess the competency of inspector candidates. In addition, stakeholders—including property managers, contract inspectors, and REAC staff—told us the mock inspections have been effective at providing training to new inspectors, and that the professionalism of contract inspectors has improved. REAC contracts with a private vendor to provide the contract inspector online training, and the vendor provides data and reports that REAC staff use to track inspector candidates’ progress through the online training modules. REAC officials told us they use this information to identify areas of the training where candidates struggle and to help revise the training material. In addition, REAC solicits feedback from contract inspector candidates on the online training. REAC also uses key performance indicators to track the number of inspector candidates who enroll and whether they pass or fail training. However, REAC does not currently have formal metrics or use data to track the effectiveness of its three phases of training. For instance, REAC does not track key measures of performance that could provide management with information to improve the training process, such as how individuals score in each section of the in-class training examination and their field examinations. REAC also does not track the resources spent on training, either in terms of funds spent or number of quality assurance inspectors who participate. According to key practices we have identified for training and development, agencies should have processes to systematically track the cost and delivery of training and measure the effectiveness of those efforts. REAC officials said that they would like to have such mechanisms and have developed a proposal to consolidate training functions and better align training to REAC’s strategic goals. However, the proposal does not include performance measures for evaluating the effectiveness and efficiency of training. Use of cost-tracking and performance measures tied to its strategic goal of improving the inspection process could improve REAC’s ability to manage scarce resources, evaluate the effectiveness of its training program, and plan for future training. REAC’s quality assurance inspectors—who train and oversee contract inspectors—must be able to conduct physical inspections of properties as well as assess contract inspectors’ performance. To assess contract inspector performance, quality assurance inspectors oversee and mentor contract inspectors during CQA reviews and provide them feedback in a collaborative manner, an approach REAC management implemented in 2017. Some senior quality assurance inspectors are also responsible for leading classroom and field training for contract inspectors. According to REAC officials, REAC’s quality assurance inspectors receive the same training as contract inspectors on the Uniform Physical Condition Standards inspection protocol. However, REAC’s training for quality assurance inspectors does not include formal instruction on how to coach or provide feedback during CQA reviews. Instead, new quality assurance inspectors are provided with on-the-job training, and they can only conduct CQA reviews independently when quality assurance supervisors are satisfied that they are sufficiently competent. Beyond the on-the-job training, quality assurance inspectors are encouraged to undergo additional online training on coaching, but there are no specific training requirements related to conducting CQA reviews. Participants in two of our three discussion groups with quality assurance inspectors told us they were not sure how to provide the collaborative coaching and mentorship REAC officials said they wanted. REAC also does not specifically train quality assurance inspectors in how to provide classroom and field training to contract inspectors, and participants in all three discussion groups with quality assurance inspectors told us that instructors do not seem to take a consistent approach to classroom and field training. In addition, REAC’s training requirements for quality assurance inspectors are not documented in the quality assurance standard operating procedures or other documents we reviewed. For example, REAC’s new, more collaborative approach to CQA reviews was communicated to quality assurance inspectors during staff meetings, but REAC staff have not documented the approach or developed any specific training. Some contract inspectors told us that quality assurance inspectors often have less experience conducting inspections than they do. They suggested that this gap may affect quality assurance inspectors’ ability to competently oversee CQA reviews and conduct QCIs. REAC officials told us they are considering changing quality assurance inspector training requirements to be more rigorous than contract inspector training. For example, staff from REAC’s Quality Control group, created in 2017, told us that they are considering expanding training on the five inspectable areas and assessing quality assurance inspectors to see if they need additional support in any of these areas. They would also like to require quality assurance inspectors to pass the training examinations with minimum scores of 90 percent, instead of the score of 75 percent that currently applies to both contract and quality assurance inspectors. However, the Quality Control group has not implemented these changes, officials said, because its staff resources are limited, and staff have been reallocated to support other projects within REAC. In comparison, one of the home inspector associations we met with, InterNACHI, has specific requirements for its instructors. According to the association, its instructors are certified master inspectors, have completed a minimum of 1,000 paid inspections or hours of education or some combination thereof, and have conducted inspections for a minimum of 3 years. The instructors also assist in developing the educational material for training courses. Federal internal control standards state that management should demonstrate a commitment to recruit, develop, and retain competent individuals. In particular, the standards note that agency personnel need to possess and maintain a level of competence that allows them to accomplish their assigned responsibilities. The standards also note the importance of management enabling individuals to develop competencies appropriate for key roles and tailoring training based on the needs of the role. Without assessing whether training for quality assurance inspectors is sufficient and requiring additional training as needed, REAC may not have reasonable assurance that these inspectors have the skills required to oversee contract inspectors. Federal internal control standards also state that management should design control activities to achieve objectives and respond to risks, and they note the importance of documenting internal control—for example, in management directives, administrative policies, or operating manuals. These standards also state that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. For example, the standards note that effective documentation assists in management’s design of internal controls by establishing and communicating the who, what, when, where, and why of internal control execution to personnel. Without documenting training requirements that encompass all job responsibilities, REAC may not have reasonable assurance that the required skills and competencies are clearly communicated to and understood by quality assurance inspectors and aligned with job duties. REAC has ongoing requirements for contract inspectors to maintain their eligibility, but these do not include continuing education requirements. Contract inspectors must conduct at least 25 successful inspections per year—that is, inspections found to be within REAC’s inspection standards—and pass a background check every 5 years to remain certified. REAC also offers optional training through online refresher modules. However, REAC does not know how many contract inspectors use these resources or how effective they are. In comparison, ASHI and InterNACHI have continuing education requirements for their certified inspectors. ASHI requires inspectors to earn 20 continuing education credits annually. The qualifying training courses must be ASHI-approved, the inspector must submit a signed affidavit attesting to having attended the training, and ASHI spot checks to monitor compliance. InterNACHI requires inspectors to earn 24 continuing education credits annually and to pass the InterNACHI Online Inspector Examination with a score of 80 percent or better every 3 years. REAC encourages quality assurance inspectors to take additional training but does not require continuing education. REAC offers optional “dine- and-learn events” to update both contract and quality assurance inspectors on policy and procedure changes and point out errors they commonly observe. In 2017 REAC also began offering limited coaching to contract inspectors by quality assurance inspection reviewers, a process separate from CQA reviews. The reviewers compare physical defects identified by contract inspectors to those that were identified by quality assurance inspectors during QCIs of the same property. Reviewers then provide one-on-one feedback to contract inspectors to address any discrepancies in inspection scores. REAC officials said that for continuing education they prefer self-paced learning to formal instruction because it more appropriately matches the varying education needs of inspectors. REAC’s strategic plan proposes developing REAC-wide policies for staff training and skill development, but it does not include any requirements for continuing education. Key practices we have previously identified for training and development suggest that agencies should encourage employees to take an active role in their professional development, which can include requiring employees to complete a specific level of continuing education. Ongoing training requirements for contract and quality assurance inspectors could help REAC ensure that inspectors are up-to- date on REAC policies and industry standards. Such continuing education could also refresh existing knowledge, helping contract and quality assurance inspectors conduct high-quality inspections consistently. Continuing education could also help quality assurance inspectors to develop their mentoring and coaching skills, which would better enable them to develop and oversee contract inspectors. REAC’s mechanisms to monitor and evaluate its contract inspectors include collaborative quality assurance reviews, quality control inspections, and various other monitoring tools. REAC uses CQA reviews to monitor, evaluate, coach, and provide feedback to contract inspectors. REAC has documented its processes for conducting and reporting on CQA reviews in field training guidance, standard operating procedures, and the compilation bulletin. To determine which inspections will receive a CQA review, REAC combines a risk-based approach—targeting low-performing inspectors—with scheduling needs, based on the timing and geographic location of the inspection. REAC conducted almost 3,000 CQA reviews from fiscal years 2013 through 2017. As shown in table 3, the percentage of inspections each year that received a CQA review ranged from about 3 to 8 percent. Our analysis of CQA review data shows that some contract inspectors are not conducting inspections in accordance with REAC standards. From fiscal years 2013 through 2017, an average of 17 percent of CQA reviews resulted in contract inspectors receiving a rating that was outside of REAC’s physical inspection standards, referred to as an outside standard rating. This rating is based on the contract inspector committing at least 1 of 18 types of performance- or scheduling-related REAC protocol violations, with 8 of the performance violations resulting in an automatic outside standard rating. The percentage of outside standard ratings was significantly higher in fiscal years 2015 through 2017, as compared to 2013 and 2014 (see fig. 4). According to REAC officials, this increase was likely due, in part, to an increase in the number of less experienced contract inspectors. Specifically, from September 2013 through December 2015, REAC attempted to expand the pool of contract inspector candidates by lowering the required number of inspections from 250 to 50. REAC officials confirmed that these inspectors were less experienced and more likely to violate protocols. As previously discussed, REAC has taken steps to make its CQA reviews more collaborative, but some stakeholders said that challenges remain. REAC’s 2015 standard operating procedures stated that the goal for CQA reviews should not be to designate a contract inspector as outside standard, but rather to ensure inspection accuracy and to improve the knowledge of the contract inspector. However, it was not until more recently that REAC management emphasized in several staff meetings the need for quality assurance inspectors to take a collaborative approach, according to REAC staff. Despite this new emphasis, participants in a discussion group we held with contract inspectors told us that they believe a punitive approach persists with some quality assurance inspectors, that repeated pairings of contract and quality assurance inspectors could lead to bias, and that contract inspectors who receive a high number of CQA reviews may feel like REAC is targeting them. REAC uses QCIs to further ensure the accuracy of inspections conducted by contract inspectors. As previously noted, a combination of factors can lead REAC to reject an inspection and trigger a QCI, including significant differences between the current inspection and previous inspections and other contextual factors, such as the inspector’s past CQA review performance. In a QCI, the quality assurance inspector reviews an inspection report and then conducts a new inspection to identify potential weaknesses and evaluate the inspector’s performance. The QCI results in a new inspection score. REAC has standard operating procedures that document requirements for scheduling, conducting, and reporting QCIs. REAC completed 226 QCIs from March 2017 through June 2018. Our review found that more than 50 percent of QCIs resulted in an outside standard rating. On average, contract inspectors gave properties a score that was 16 points higher than the score given subsequently by quality assurance inspectors, indicating that those contract inspectors missed deficiencies. Of these inspections, about 15 percent that had initially received a passing score from the contract inspector failed the subsequent QCI. REAC also uses ratings and reports to oversee contract inspectors. REAC assigns each contract inspector a rating based on a combination of factors, including CQA results and percentage of inspections rejected, and these ratings help target which inspectors should receive CQA reviews and CQIs. REAC also produces two reports for all contract inspectors to assist in its oversight: Defect Comparison Reports compare the specific deficiencies reported by an inspector to the frequency with which other contract inspectors reported that same deficiency across properties. REAC primarily uses the results to target areas to coach contract inspectors who have been flagged for a QCI. Defect Delta Reports compare deficiencies in a contract inspector report to deficiencies a quality assurance inspector reported in a follow-up inspection (usually a QCI). REAC primarily uses this information to identify the types of deficiencies the contract inspector is missing. REAC did not meet management targets for the number of CQA reviews to be conducted in any quarter from fiscal years 2013 through 2017 (see fig. 5). REAC officials told us their management target is to conduct three CQA reviews for each high-risk contract inspector and two CQA reviews for lower-risk contract inspectors each quarter. REAC officials told us that in developing the targets, they attempted to balance risks to the quality of inspections and resources available. In addition, as of June 2018, REAC had not met management targets for timeliness of QCIs in any quarter. REAC has no documented timeliness goals for QCIs, but REAC officials told us that QCIs are supposed to take place within 30 days of the original inspection date because the condition of the property can change over time (see fig. 6). REAC officials told us they did not meet these management targets for CQAs and QCIs because they did not have enough quality assurance inspectors. In addition, when quality assurance inspectors are pulled onto other projects, such as supporting HUD’s efforts related to natural disasters, REAC’s ability to conduct CQAs and QCIs is reduced. For example, in fiscal year 2018, 28 quality assurance inspectors were pulled offline to assist HUD in areas affected by hurricanes. REAC officials told us these temporary reassignments have affected their ability to implement the quality assurance process. REAC staff told us that the quality of inspections may have deteriorated because some contract inspectors were aware that quality assurance inspectors would not be conducting CQA reviews or QCIs during those post-disaster periods. REAC has recently hired more quality assurance inspectors to help address staffing shortages. In addition, REAC officials told us that they intend to take into account the likely effects of natural disasters on their ability to conduct quality assurance reviews when planning for these reviews in the future, but REAC has not yet developed a plan to meet its targets that includes, for example, mechanisms to mitigate resource constraints and unforeseen demands on staff. According to REAC’s strategic plan, to produce physical inspections that are reliable, replicable, and reasonable, REAC is to look for patterns and trends in inspection results, such as inconsistencies between inspectors, regional and area differences, and patterns in different inspection criteria. In addition, the strategic plan calls for REAC to assess and improve the quality of contract inspectors. However, if REAC is unable to meet its management targets for CQA reviews, it may not be able to consistently produce high-quality inspections because it is not providing routine opportunities for contract inspectors to receive coaching from quality assurance inspectors, which could include addressing deficiencies that the contract inspectors did not initially identify and record. In addition, if QCIs are not conducted shortly after the original inspections, REAC may not be able to verify the quality of the inspection because the condition of the property could change over time. REAC’s inability to meet management targets for CQA reviews and QCIs could also affect its ability to monitor patterns in inspection results because, for example, the quality of QCI data would be less reliable due to the lapse in time. As a result, REAC may not be using quality assurance inspector resources as effectively as possible. REAC’s Inspector Administration division administers a variety of administrative actions and disciplinary sanctions against contract inspectors in response to complaints or CQA reviews and QCIs. Inspector Administration officials said that they acknowledge and follow up on all complaints received from property representatives and residents, among others. Complaints about a contract inspector can relate to conduct, inspection protocol violations, scheduling, and conflicts of interest, among other issues. Inspector Administration uses the Code of Conduct, Uniform Physical Condition Standards inspection protocol, and compilation bulletin as standards for evaluating contract inspector conduct. In order of increasing severity, Inspector Administration can issue a letter of warning, issue a performance deficiency, suspend or decertify the inspector, or refer the inspector to HUD’s OIG, among others. While Inspector Administration can use professional judgement in adjudicating complaints, some actions are automatic. For example, decertification is automatic for inspectors with three or more performance deficiencies, inspectors found to have engaged in egregious misconduct, or inspectors who conduct fewer than 25 inspections annually. Inspector Administration took more than 700 administrative enforcement actions against contract inspectors from fiscal years 2013 through 2017 (see fig. 7). As part of its effort to reform its contract inspector pool, REAC decertified 127 inspectors from fiscal years 2013 through 2017 due to inactivity, conduct, or performance issues. For example, REAC decertified the contract inspector who gave Eureka Gardens a passing inspection score even though it was in poor physical condition. Two advocacy organizations told us they noticed that REAC was decertifying more inspectors than in the past, and one said that the quality of contract inspectors had improved as a result. In response to concerns from contract inspectors, Inspector Administration is proposing changes to, among other things, provide contract inspectors who are subject to potential enforcement actions with more opportunities to present their perspective. For example, Inspector Administration would allow contract inspectors to appeal performance deficiencies earlier in the process. Other proposed changes would make performance deficiencies based on outside standard ratings discretionary instead of automatic and would remove a performance deficiency from a contract inspector’s record after 25 consecutive inspections without a new performance deficiency instead of 30. Inspector Administration officials said the new rules would also adjust decertification sanction periods, which specify the amount of time a decertified contact inspector must wait before reapplying to REAC, to account more appropriately for the reason the contact inspector left REAC (e.g., resignation, performance, or conduct). REAC created the Quality Control group to standardize quality assurance inspector reviews by conducting more frequent oversight and looking for trends across all quality assurance inspectors, according to a Quality Control official. This official said that one type of oversight involves a quality control staff member conducting an identical inspection 1 day after that of a quality assurance inspector to determine how well the inspector recorded deficiencies. Inspections are then rated as either “acceptable” or “unacceptable” based on whether the inspector followed established protocols and observed and accurately recorded 90 percent or greater of the existing deficiencies. According to the official, inspection reviews are expected to be shared with quality assurance management and individual supervisors to support quality assurance inspector development. This official also told us Quality Control plans to conduct reviews of quality assurance inspectors at least once a year, or more frequently as needed. In November 2018, Quality Control developed a mission statement which says that the primary goal of the group is to improve the consistency of inspections. Also in November 2018, Quality Control developed procedures for reviewing quality assurance inspectors, which include processes for conducting field reviews of completed inspections, criteria for acceptable inspections, and processes for providing feedback. An official from Quality Control said that the group worked with other divisions within REAC, such as PASS Quality Assurance and Research and Development, to develop the procedures and criteria for evaluating quality assurance inspectors. The official told us both its mission statement and procedures have not been implemented, in part because Quality Control staff have been repeatedly pulled onto other special projects. The official told us that these documents have been approved by REAC management and that Quality Control intends to implement the procedures in 2019. According to federal internal control standards, management should implement control activities through policies. For example, the standards call for documenting in policies each unit’s responsibility for an operational process’s objectives and related risks. Without finalizing and implementing its policies and procedures for reviewing quality assurance inspectors, Quality Control may not be able to provide consistent reviews of quality assurance inspectors, which could affect the quality of inspections as well as the feedback and coaching quality assurance inspectors provide to contract inspectors. Prioritizing the implementation of Quality Control’s review procedures could help ensure that Quality Control achieves its objectives and provides consistent reviews of quality assurance inspectors. The standards REAC uses to measure quality assurance inspectors’ performance do not fully align with their job duties. Quality assurance supervisors are primarily responsible for evaluating quality assurance inspector performance using five performance elements, which REAC’s performance appraisal system describes as follows: Collaboration: Provide customer service communication both verbally and in writing to internal and external HUD stakeholders, customers, or anyone who comes in contact with quality assurance services. Individual training: Develop competencies and perform individual training associated with job duties. Personal investment: Improve processes, such as through special projects or self-initiated projects that improve the quality assurance division’s standard operating procedures, the Uniform Physical Condition Standards inspection protocol, the compilation bulletin, or others. Risk management: Maximize scarce resources and be cost efficient to the government in all aspects of job duties and assignment. Meeting the need for quality affordable rental housing: Perform in accordance with all protocols and standard operating procedures, and complete CQA reviews and Uniform Physical Condition Standards inspections. REAC’s performance appraisal system includes descriptions of the standards for each of the five performance elements, as well as supporting behaviors. For example, to be rated fully successful for “meeting the need for quality affordable rental housing,” quality assurance inspectors should independently complete Uniform Physical Condition Standards inspections with no more than two inspections being rejected by REAC within the rating period. Based on the standards, quality assurance inspectors are also expected to conduct CQA reviews and field trainings for contract inspector candidates. However, the performance appraisal system for quality assurance inspectors does not include performance elements with competencies that relate to all of their job duties. For example, the performance appraisal system does not define expectations for performing CQA reviews or QCIs. In addition, it does not include criteria for evaluating the training, coaching, and mentoring that quality assurance inspectors are expected to provide to contract inspectors. Quality assurance supervisors can incorporate information from reviews of quality assurance inspectors by Quality Control in their performance evaluations. However, REAC officials told us that Quality Control does not evaluate inspectors based on the performance elements and standards. Instead, Quality Control’s reviews only evaluate an inspector’s performance as it relates to the QCI being reviewed, such as following established protocols and observing and accurately recording 90 percent or greater of the existing deficiencies. In addition, Quality Control’s reviews do not include evaluations of a quality assurance inspector’s performance for other key job duties, such as training and mentoring contract inspectors. According to key practices we have identified for effective performance management, agencies should use competencies to define the skills and supporting behaviors that individuals need to effectively contribute to organizational results. REAC staff told us they do not know when the performance elements and standards for quality assurance inspectors were last revisited, and new job duties such as conducting QCIs have been added that are not part of the performance elements. Better alignment between the performance competencies and the job responsibilities of quality assurance inspectors would help ensure that inspectors are assessed on all their key duties—including training and mentoring contract inspectors—which could improve the quality of inspections and reviews. PIH and Multifamily Housing each have separate processes to monitor the conditions of HUD-assisted properties, including physical conditions, and take enforcement actions if properties are not decent, safe, sanitary, and in good repair. PIH assesses the performance of PHAs on key indicators through a federal regulatory process—the Public Housing Assessment System. PIH also monitors PHAs through a Risk Assessment Protocol, which incorporates qualitative data and determines actions to address identified risks. The Risk Assessment Protocol is intended to be a proactive approach to address risk at PHAs and use resources efficiently. Separately, Multifamily Housing monitors properties that score below 60 on the REAC physical inspection. To account for properties scoring 60 or above on the REAC inspection, as well as to monitor property characteristics other than physical conditions, Multifamily Housing assesses properties through its risk rating system. The Public Housing Assessment System uses the REAC physical inspection score for each public housing development to determine the physical performance of the PHA. The physical performance of PHAs is one of four indicators within the Public Housing Assessment System, which assesses the performance of PHAs and determines a performance designation. The four indicators are (1) the physical condition of the PHA’s housing developments, (2) the financial condition of the agency, (3) the management operations of the agency, and (4) utilization of property modernization and development funds (capital fund). REAC inspection scores are adjusted to reflect the size of each housing development, and their weighted average is the physical performance indicator for a PHA. The physical indicator score, worth a maximum of 40 points (out of 100 points total) toward the overall Public Housing Assessment System score, has the highest value of the four indicators. To determine the financial, management, and capital fund indicators, PHAs upload information electronically to REAC, and REAC’s data systems generate a score for each indicator and overall. Figure 8 shows the maximum value for each indicator and overall score. Table 4 explains how the indicator and overall assessment scores lead to a performance designation. PHAs are assessed and receive a performance designation every 1 to 3 years, according to their size and prior performance designation. PHAs with at least 250 units receive an assessment annually. PHAs with fewer than 250 units receive an assessment every 3 years if designated as a high performer, 2 years if designated as a standard or substandard performer, and annually if designated as a troubled or capital fund troubled performer. In years that smaller PHAs do not receive an assessment, they must provide financial data to REAC but do not receive a published assessment score or designation. Following REAC’s release of the performance designations, PHAs and PIH each have a role in ensuring that physical deficiencies are corrected. REAC is not responsible for ensuring that PHAs correct physical deficiencies. According to federal regulations, PHAs must take certain actions depending on their performance designation. PHAs designated as troubled must enter into a recovery agreement with PIH to improve their performance within 2 years. PHAs designated as standard or substandard performers must correct deficiencies identified in the assessment within 90 days, or they may develop a plan to correct the deficiency within a specified time frame. PIH officials told us they monitor whether PHAs designated as standard or substandard performers have developed a plan or if field offices are assisting the PHA. PHAs designated as high performers are not required to correct deficiencies. Table 5 shows the number of PHAs in each designation for fiscal years 2013 through 2017, including some PHAs exempt from receiving a performance designation (e.g., small PHA deregulation). If PHAs do not correct deficiencies or improve their performance, PIH officials told us they can initiate a series of actions. First, PIH field offices are to remind PHAs of their obligation to provide housing that is decent, safe, sanitary, and in good condition. If those conversations are not effective, PIH can take administrative or enforcement actions. For example, PIH can refer PHAs to the Departmental Enforcement Center, which can exclude PHA leadership from participating in HUD programs. However, we previously found that PIH refers PHAs to the Departmental Enforcement Center infrequently, making 12 referrals in 2017 and 25 referrals in 2016. In rare instances, PIH also can place the PHA into administrative receivership and take control of the PHA’s operations. These actions also could be part of a recovery agreement for troubled performer PHAs. PIH officials told us they initiate actions specified in the recovery agreement for troubled performer PHAs that do not improve their performance within 2 years. To inform its monitoring efforts, PIH uses the Risk Assessment Protocol to assess PHAs in four risk categories: physical, governance, financial, and management. PIH collects quantitative data from various HUD data systems and qualitative data from a survey administered by PIH field offices. The physical risk category uses a PHA’s Public Housing Assessment System physical indicator score—which is determined using the REAC inspection score—as one factor in determining physical risk. PIH also assesses physical risk using the qualitative survey and location of the PHA. Additionally, the performance designation from the Public Housing Assessment System—which incorporates the REAC inspection score—is included as part of assessing governance risk. The financial and management categories do not incorporate the REAC physical inspection score. For each risk category, PIH assigns points and designates a risk level for each PHA, as shown in figure 9. A higher number of points is associated with higher risk. For example, PIH assigns 25 points to PHAs with a physical indicator score of 25 or below and zero points to PHAs with a physical indicator score of 28 or higher. After assigning points, PIH designates a risk level for each risk category, as well as overall, based on the average PHA score for each category and overall. These risk designations are very high, high, moderate, and low. PHAs furthest from and above the average score are designated as very high risk, and PHAs closest to the average score are designated as low risk. PIH designates a risk level to PHAs every quarter, although some information used to determine the risk level is not updated every quarter. For example, the qualitative survey is updated every other quarter. PIH determines actions—called risk treatments—to address each risk category based on a PHA’s risk level. PIH determines actions each quarter for every PHA newly designated as very high or high risk, and it determines actions every other quarter for all other very high, high, or moderate risk PHAs. To address physical risks, field office staff may provide training or technical assistance to PHAs. For example, field office staff told us they provided technical assistance by explaining the physical inspection standards and policies related to using operating funds to make physical repairs. Risk treatments have a completion date, and PIH field office staff are to monitor whether the treatment is effective. If the risk treatments do not result in improvements, PIH officials told us they can seek technical assistance from subject matter experts within PIH or can elevate the risk treatment, among other actions. For example, PIH can provide on-site assistance rather than remote assistance. Multifamily Housing is required to direct property owners to correct physical deficiencies based on the REAC inspection score. For properties that score below 60 on the REAC physical inspection, Multifamily Housing issues property owners a notice to take the following actions: (1) provide a copy of the notice to residents; (2) survey 100 percent of the property to identify all physical deficiencies; (3) correct all deficiencies identified during the survey and the REAC inspection; (4) certify that they have corrected all deficiencies; and (5) submit a 100- percent survey of the property and certification of corrected deficiencies to HUD. Property owners should complete these actions within 60 days of receiving the notice but may request an extension if correcting the deficiencies will take longer than 60 days. For example, Multifamily Housing may issue extensions for notices received in winter months because seasonal conditions may make certain repair work, such as pouring concrete, more difficult to complete within 60 days. Multifamily Housing schedules a follow-up inspection depending on whether property owners submit a certification, as well as if the property scores 30 or below on the inspection. For property owners who certify that deficiencies have been corrected, Multifamily Housing schedules the property’s next inspection to take place within 1 year after the date of the last inspection. For property owners who do not submit the certification or for properties that score 30 or below on the REAC inspection, Multifamily Housing or the Departmental Enforcement Center schedules a follow-up inspection as soon as possible. Multifamily Housing uses the REAC score from that next inspection to determine whether the owner corrected deficiencies. After issuing a notice, Multifamily Housing can take various actions when properties’ scores on the REAC inspection remain below 60, if owners do not certify or correct physical deficiencies. Table 6 summarizes the actions Multifamily Housing took in fiscal years 2016 and 2017. For example, Multifamily Housing officials initially can place a flag in a data system to indicate that an owner has not met requirements for properties to be decent, safe, sanitary, and in good repair. This flag may prevent the owner from further participation in HUD programs. Another action Multifamily Housing officials can take is to change the property’s management agent. Multifamily Housing officials told us this action has been successful in improving the physical conditions of properties when properties do not require significant repair work. Multifamily Housing also can take more significant actions, such as terminating a rental assistance contract or foreclosing on a loan and relocating tenants from these properties. In addition to taking these actions, REAC and Multifamily Housing refer properties to the Departmental Enforcement Center when they score below a determined threshold. Upon publishing the inspection score, REAC refers properties that score 30 or below on a REAC inspection to the Departmental Enforcement Center automatically. Multifamily Housing officials told us they coordinate with relevant stakeholders to discuss these properties. Multifamily Housing also can refer properties electively to the Departmental Enforcement Center when they score between 31 and 59 on the REAC inspection. Further, Multifamily Housing can recommend specific actions for the Departmental Enforcement Center to take regardless of a property’s inspection score. The Departmental Enforcement Center can impose civil money penalties to encourage compliance with HUD’s regulations or limit a property owner from participating in HUD programs. Our analysis of referral data for physical conditions from fiscal years 2012 through 2017 shows that for 12 referrals, the Departmental Enforcement Center imposed money penalties through a settlement, and that no referrals resulted in a suspension or debarment. However, according to our previous work on the Departmental Enforcement Center, most referrals result from financial reviews rather than physical inspections. The Office of Multifamily Housing’s current practice of issuing notices to property owners when the REAC score is 59 or below is inconsistent with the legal requirement. As previously discussed, for properties that score 59 or below on the REAC inspection, HUD issues notices for property owners to certify that deficiencies have been identified and corrected within 60 days. However, the 2017 and 2018 Consolidated Appropriations Acts state that HUD must provide a notice to owners of properties that score 60 or below on the REAC physical inspection. Multifamily Housing officials told us that they believe language in the appropriations acts is not clear regarding the threshold to issue notices to property owners. Specifically, the appropriations acts state that HUD should issue a notice for properties that score 60 or below, and also that HUD may withdraw the notice to property owners when they successfully appeal their inspection score to 60 or above. Additionally, Multifamily Housing officials told us that HUD’s long-standing and current practice is to issue notices when a property receives a score of 59 or below. According to our analysis of inspection data, 30 properties received a score of 60 from May 2017 to December 2017 and would not have received a notice to correct physical deficiencies under HUD’s approach. Unless Congress changes the threshold identified in appropriations acts from 60 to 59 or HUD changes its practice to issue notices to properties that score 60 or below, HUD’s actions will continue to be inconsistent with the legal requirement. Multifamily Housing also uses other processes to monitor the physical condition of properties, including properties that score 60 or above on the REAC inspection. These other processes incorporate additional aspects of properties beyond physical conditions. Multifamily Housing’s risk rating system uses information on properties’ physical, financial, and management conditions to assign one of three risk ratings—troubled, potentially troubled, or not troubled—to each property. The REAC inspection score, along with actions taken to correct deficiencies, is one factor that determines the risk rating. Specifically, properties that score between 30 and 70 on the REAC inspection are rated as potentially troubled if the property owner is addressing physical deficiencies. Properties that score between 30 and 59 are rated as troubled if the owner has not certified that deficiencies have been corrected. Properties that score below 30 are rated as troubled and maintain that rating until the next REAC inspection. Multifamily Housing field office and headquarters staff told us they provide greater monitoring and oversight to properties rated as troubled and potentially troubled. Properties rated as troubled are required to develop an action plan to identify and document steps to address their risk, including physical risk. For example, a plan to improve the physical condition of a property may direct property owners to rehabilitate units. Properties rated as potentially troubled may develop such a plan but are not required to do so. Additionally, Multifamily Housing headquarters staff conduct a monthly call with field office staff to discuss properties rated as troubled. Multifamily Housing officials told us they review properties every 3 to 12 months based on the risk rating and can take actions if properties are not correcting issues. If property owners do not correct issues outlined in their plan, Multifamily Housing can take many of the actions listed previously, such as changing the management agent. Multifamily Housing can also monitor properties through other processes, such as site visits or other reviews. According to Multifamily Housing officials, field office staff conduct site visits of properties if they receive multiple complaints from tenants or notice a particular concern, or if the property receives media attention. Multifamily Housing also can conduct site visits of properties through a Management and Occupancy Review. Multifamily Housing officials told us they are moving toward a risk-based approach, using results from prior reviews and a property’s risk rating to determine how often to conduct these Management and Occupancy Reviews. However, Multifamily Housing officials told us that budget and staffing constraints continue to limit the number of reviews completed annually, with less than half of project-based rental assistance properties reviewed in 2017. To complete Management and Occupancy Reviews, HUD staff or contractors review documentation to monitor whether properties are adhering to requirements for receiving HUD funding and to target potential issues. This review gathers information on seven factors of property management, including management of a property’s physical condition. As part of gathering information, HUD staff or contract administrators interview the property owner or agent and may visit a sample of housing units to verify that deficiencies identified in the REAC inspection have been corrected. The Management and Occupancy Review specifies—in a summary report for owners and agents— corrective actions to take within targeted completion dates, not to exceed 30 days, based on the documentation review and on-site visit. Properties that perform poorly on the review also must provide proof of taking these actions. If properties do not provide proof of taking these corrective actions, Multifamily Housing can take some of the previously listed actions, such as changing the agent of a property. REAC’s inspection process annually identifies properties that are in poor physical condition and contain life threatening health and safety issues. With over 2 million moderate- and low-income households living in public housing or multifamily properties assisted or insured by HUD, it is imperative that these properties are decent, safe, sanitary, and in good repair. Our review of REAC found areas for improvement in its inspection process: Review of inspection process. A comprehensive review of the inspection process could help REAC identify risks and ensure it is meeting the goal specified in its strategic plan that inspections be reliable, replicable, and reasonable. Sampling errors in inspection scores. If REAC were to resume reporting on sampling errors and develop a process to address properties that fall below certain cutoff scores when the sampling error is taken into account, it would have the information it needs to identify properties that may require more frequent inspections or enforcement actions. Sampling methodology documentation. Comprehensive and organized documentation of the sampling methodology could help REAC preserve the institutional knowledge of important features of its inspection process, particularly when key staff leave the agency. Timing of housing inspections. Improvements in REAC’s on-time performance of multifamily property inspections could provide HUD with more timely information on the physical condition of these properties and the information it needs to take any enforcement actions. Further, by developing mechanisms to track its progress on meeting the schedule for inspections and improving its collection of data on why inspections are delayed, REAC could better determine what factors are contributing to delays in conducting inspections. Staffing inspections. A formal evaluation plan could help REAC determine if its pilot program for staffing inspections in difficult geographic areas is a success or whether changes are needed before moving from a pilot to a permanent process. Implementation of open recommendations. Taking timely actions on internal-review recommendations could help HUD to improve REAC’s inspection process and the safety of HUD-assisted properties. We also found areas for improvement in REAC’s processes for selecting, training, and overseeing contract and quality assurance inspectors: Inspector candidates’ qualifications. A more robust process for verifying contract inspectors’ qualifications could reduce the number of candidates with insufficient experience who participate in REAC’s training program, which could help REAC to expend fewer resources on training candidates who are unlikely to become successful inspectors. Contract inspector training. Evaluating the effectiveness of its training program for contract inspectors could help REAC better assess the quality of the program and plan for future training. Quality assurance inspector training. By developing and documenting training for quality assurance inspectors that encompasses all of their job responsibilities, REAC can better ensure that inspectors have the skills required to oversee contract inspectors. Continuing education requirements. Continuing education requirements for contract and quality assurance inspectors could help REAC ensure that inspectors are up-to-date on REAC policies and industry standards. Targets for reviews of contract inspectors. Improving its ability to meet management targets for CQA reviews and QCIs could help REAC better ensure that contract inspectors are receiving the feedback needed to improve their performance, thereby improving the quality of inspections. Formal policies for Quality Control group. By implementing policies and procedures for the Quality Control group, REAC can help ensure that the group achieves its objective of providing consistent reviews of quality assurance inspectors that will enable these inspectors to improve their oversight roles. Performance standards for quality assurance inspectors. Reviewing and updating REAC’s performance standards for quality assurance inspectors so that they align with their job duties can help REAC ensure that staff understand how their duties are prioritized within REAC’s mission and improve the quality of performance reviews. Finally, Multifamily Housing’s current practice of taking actions against property owners when the REAC score is 59 or below is inconsistent with the legal requirement to take action when the score is 60 or below. While in practice this affects very few properties, without either Congress changing the threshold identified in appropriations acts from 60 to 59 or HUD changing its practice to issue notices to properties that score 60 or below, HUD’s actions will continue to be inconsistent with the legal requirement. We are making the following 14 recommendations to HUD: The Deputy Assistant Secretary for the Real Estate Assessment Center should conduct a comprehensive review of the physical inspection process. (Recommendation 1) The Deputy Assistant Secretary for the Real Estate Assessment Center should resume calculating the sampling error associated with the physical inspection score for each property, identify what changes may be needed for HUD to use sampling error results, and consider those results when determining whether more frequent inspections or enforcement actions are needed. (Recommendation 2) The Deputy Assistant Secretary for the Real Estate Assessment Center should develop comprehensive and organized documentation of REAC’s sampling methodology and develop a process to ensure that documentation is maintained going forward. (Recommendation 3) The Deputy Assistant Secretary for the Real Estate Assessment Center should track on a routine basis whether REAC is conducting inspections of multifamily housing properties in accordance with federal guidelines for scheduling and coordinate with the Deputy Assistant Secretary for Multifamily Housing to minimize the number of properties that can cancel or reschedule their physical inspections. (Recommendation 4) The Deputy Assistant Secretary for the Real Estate Assessment Center should design and implement an evaluation plan to assess the effectiveness of the Indefinite Delivery/Indefinite Quantity pilot in ensuring timely and quality inspections for properties in hard-to-staff geographic areas. (Recommendation 5) The Deputy Assistant Secretary for Multifamily Housing and the Deputy Assistant Secretary for the Real Estate Assessment Center should expedite implementation of the recommendations from the Rapid Response and Resolution Team. (Recommendation 6) The Deputy Assistant Secretary for the Real Estate Assessment Center should follow through on REAC’s plan to create a process to verify candidate qualifications for contract inspectors—for example, by calling references and requesting documentation from candidates that supports their completion of 250 residential or commercial inspections. The plan should also consider whether certain types of inspections—such as Federal Emergency Management Agency inspections and U.S. Army Office of Housing inspections—satisfy REAC’s requirements. (Recommendation 7) The Deputy Assistant Secretary for the Real Estate Assessment Center should develop a process to evaluate the effectiveness of REAC’s training program—for example, by reviewing the results of tests or soliciting participant feedback. (Recommendation 8) The Deputy Assistant Secretary for the Real Estate Assessment Center should revise training for quality assurance inspectors to better reflect their job duties. Revised training should be documented, include expanded subject matter training, and address skills that may not be included in training for contract inspectors—for example, instructing contract inspector candidate trainings and coaching and providing feedback. (Recommendation 9) The Deputy Assistant Secretary for the Real Estate Assessment Center should develop continuing education requirements for contract and quality assurance inspectors. (Recommendation 10) The Deputy Assistant Secretary for the Real Estate Assessment Center should develop and implement a plan for meeting REAC’s management targets for the timeliness and frequency of CQA reviews and QCIs. The plan should include consideration of resources of and demands on quality assurance inspectors, including the effect of natural disasters and other special assignments. (Recommendation 11) The Deputy Assistant Secretary for the Real Estate Assessment Center should ensure that Quality Control’s policies and procedures for overseeing quality assurance inspectors are implemented. (Recommendation 12) The Deputy Assistant Secretary for the Real Estate Assessment Center should review quality assurance inspector performance standards and revise them to better reflect the skills and supporting behaviors that quality assurance inspectors need to effectively contribute to REAC’s mission. (Recommendation 13) The Deputy Assistant Secretary for Multifamily Housing should report to Congress on why the agency has not complied with the 2017 and 2018 Consolidated Appropriations Acts requirement to issue notices to properties when the REAC score is 60 or below, including seeking any statutory flexibilities or exceptions believed appropriate. (Recommendation 14) We provided a draft of this report to HUD for review and comment. In written comments, reproduced in appendix V, HUD agreed with 11 recommendations, partially agreed with 2, and neither agreed nor disagreed with 1. In its written comments, HUD noted that it largely agreed with the findings and has been examining how it can develop, pilot, and evaluate an alternate approach to its inspection model that will address the issues raised in our report. Consistent with our report, HUD recognized that after 20 years, its physical inspection process has become susceptible to manipulation. HUD said it plans to pilot a new physical inspection process in one of HUD’s administrative regions later this year. HUD stated that given its limited resources, it will be unable to simultaneously develop the new process and implement all of the recommendations to its current process. We maintain that implementing the recommendations will help REAC to ensure that properties are decent, safe, sanitary, and in good repair. HUD agreed with 11 recommendations and provided specific information about planned steps to implement them. For example, for our first recommendation on conducting a comprehensive review of REAC’s physical inspection process, HUD noted in its written comments that it plans to develop new standards, protocols, scoring approaches, and software to be validated through a demonstration. In addition, if resources are available, HUD plans to contract with an external vendor to assess the accuracy and effectiveness of the new inspection process and the statistical validity of scoring. For our eighth and ninth recommendations on evaluating and revising training for contract and quality assurance inspectors, HUD noted that it would evaluate its internal training program for contract inspectors as it pilots its new inspection process and compare the results with its evaluation of an outsourced training approach. In addition, HUD noted that it would identify the subject matter expertise needed for quality assurance inspectors and provide training to address any skills gaps among these inspectors. HUD partially agreed with our fourth and sixth recommendations and noted some considerations for addressing them. HUD partially agreed with our fourth recommendation regarding tracking its progress on conducting inspections of multifamily properties in accordance with federal guidelines, but did not identify the reason for its partial agreement. In written comments, HUD described actions it plans to take that we consider consistent with the intent of the recommendation. We maintain that this recommendation should be implemented to achieve benefits, including better understanding of the factors that contribute to inspection delays. HUD also partially agreed with our sixth recommendation regarding expedited implementation of recommendations from the Rapid Response and Resolution Team. In written comments, HUD noted that in order to balance resources invested in the current approach with those needed to design future operations, it would consider whether the remaining recommendations from the Rapid Response and Resolution Team fit with the new inspection model that it plans to pilot. Whether in the current inspection model or a future one, we maintain that expediting implementation of the recommendations from the Rapid Response and Resolution Team will support that team’s intention to address conditions at troubled multifamily properties. HUD neither agreed nor disagreed with our second recommendation to resume calculating the sampling error associated with the physical inspection for each property, identify the changes that may be needed for HUD to use sampling error results, and consider those results when determining whether more frequent inspections or enforcement actions are needed. In response to this recommendation, HUD noted in its written comments that it is examining resource implications, regulations and policies that would need to be changed, and the viability and effectiveness of making the changes included in our recommendations. We maintain that implementing this recommendation would improve REAC’s inspection process by identifying properties that may require more frequent inspections or enforcement actions. We are sending copies of this report to the appropriate congressional committees and the Secretary of Housing and Urban Development. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or GarciaDiazD@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report examines (1) the Department of Housing and Urban Development’s (HUD) Real Estate Assessment Center’s (REAC) process for identifying physical deficiencies; (2) REAC’s processes for selecting, training, and developing contract and quality assurance inspectors; (3) REAC’s processes for monitoring contract and quality assurance inspectors; and (4) HUD’s monitoring and enforcement processes for addressing physical deficiencies and how REAC’s information is used to support these processes. To address the first objective, we reviewed regulations and policies and procedures related to REAC’s physical inspection process. Specifically, we reviewed the final notice on REAC’s physical inspection scores and the 2017 update to REAC’s compilation bulletin, which is the guidance document for inspectors conducting physical inspections. We also reviewed REAC’s user guide, which explains how REAC’s inspection software and handheld data collection devices are used to conduct the inspection and record deficiencies. To describe the quality assurance processes for physical inspections, we reviewed REAC’s quality assurance standard operating procedures, which provide instructions to REAC’s quality assurance inspectors on how they are to conduct various monitoring activities over contract inspectors to assess the quality of inspections. We also reviewed REAC’s standard operating procedures for post-inspection reviews. As part of our assessment of the physical inspection process, we reviewed the statistical methodology used by REAC to determine the sample size for dwelling units and buildings. We reviewed REAC’s documentation describing the sample-size calculations for units and buildings and interviewed a REAC statistician to obtain information on the statistical approach and assumptions used in the sample size calculations. With this information, we were able to conduct our own calculations on the sample-size and compare our results to REAC’s. To report on the number of physical inspections conducted from fiscal years 2013 through 2017, as well as other data on inspections over this period, we accessed REAC’s Record and Process Inspection Data database. This database contains information related to physical inspections, such as the types and locations of properties inspected, dates of inspection, and inspection scores. To assess the reliability of the database, we first identified the various tables in the database that held the relevant data we needed for our analysis. We also identified the common identifier in each of these tables to construct records of inspections with the relevant data. We met with REAC’s staff to confirm that our selection of the tables and our construction of records was correct. We then performed our analysis and developed various descriptive statistics, such as the number of inspections per year by property type from fiscal years 2013 through 2017, the number of multifamily properties that failed their REAC inspection (scored below 60) for fiscal years 2013 through 2017, the percentage of multifamily property inspections that occurred on time given their inspection score, and various inspection score ranges by state. We compared our statistics on the number of inspections per year with comparable statistics developed by REAC. In cases where we had differences, we obtained explanations from REAC for these differences and revised our analysis where appropriate. Based on our overall assessment of the REAC data we used, we found them to be sufficiently reliable for analyzing the number and timing of inspections and trends in scoring. To obtain the views of various stakeholders on the inspection process, we held discussion groups with contract inspectors and REAC’s quality assurance inspectors and supervisors. Each discussion group had between 6 and 13 participants and was facilitated by a GAO staff member. We covered a number of topics in these discussion groups, including the inspection and quality assurance processes. We held one discussion group with contract inspectors, three with REAC quality assurance inspectors, and one with REAC quality assurance supervisors: Contract inspectors. For the discussion group with the contract inspectors, we invited all of the contract inspectors who were attending a conference at REAC’s headquarters in Washington, D.C. Thirteen contract inspectors attended the discussion group. Quality assurance inspectors. For the discussion groups with the quality assurance inspectors, we reached out to all quality assurance staff and coordinated with REAC to arrange specific meeting times to maximize the number of participants. We held two separate discussion groups with experienced inspectors. The first of these groups had 11 participants, and the second group had 6. We also held a separate discussion group with 11 newly hired quality assurance inspectors. Quality assurance supervisors. For the last discussion group, we reached out to all quality assurance supervisors and met with 6 of them. We recorded all of the discussion groups to help transcribe the conversations. In order to analyze the discussion group transcripts, we identified phrases that represented key themes across the groups. One GAO analyst reviewed one of the transcripts to identify any additional phrases we should add to our analysis. Once we arrived at our final set of key themes, one GAO analyst reviewed all of the transcripts and matched responses in the transcripts to the key themes. A second GAO analyst then checked the work to determine if he agreed with the coding of the first analyst. If there were any disagreements on the coding, the two analysts met to reach consensus on the appropriate coding. Finally, to obtain the perspectives of property owners on REAC’s inspection process, we met with four organizations representing multifamily or public housing property owners. These organizations were the Council for Large Public Housing Authorities, the National Affordable Housing Management Association, the National Leased Housing Association, and the Public Housing Authorities Directors Association. Also, to understand how private home inspection associations developed their inspection processes, we interviewed staff from the American Society of Home Inspectors and the International Association of Certified Home Inspectors. To address the second and third objectives, we reviewed REAC’s policies and procedures for selecting, training, developing, and monitoring contract and quality assurance inspectors. We reviewed the contract inspector candidate assessment questionnaire and construction analyst job announcement, which describe the requirements to become a contract and quality assurance inspector, respectively. We also reviewed documents describing the online (Phase Ia), classroom (Phase Ib), and field (Phase II) training courses. We also reviewed an assessment that Deloitte, a management consultant firm, conducted of REAC’s training, quality assurance, and inspector oversight processes. We compared REAC’s training processes for inspectors with key attributes of effective training and development programs. In our discussion groups with contract and quality assurance inspectors, we also asked their views on REAC’s selection, training, and monitoring processes. In addition, we interviewed REAC management officials to discuss their processes for the selection, training, monitoring, and oversight of contract and quality assurance inspectors. We spoke with staff from the American Society of Home Inspectors and the International Association of Certified Home Inspectors to understand how their selection and training requirements for inspectors who are members of home inspection associations compared with REAC’s. To examine REAC’s processes for monitoring contract inspector performance, we reviewed REAC’s quality assurance standard operating procedures, REAC’s strategic plan, and various tools REAC has developed to assess how contract and quality assurance inspectors perform relative to their peers. We obtained data on collaborative quality assurance reviews for fiscal years 2013 through 2017 and data on quality control inspections for January 2017 through June 2018. We analyzed the data to determine, for example, how often contract inspectors were conducting inspections in accordance with REAC’s Uniform Physical Conditions Standards protocol and its quality assurance standard operating procedures, and how often REAC was meeting its goals for timeliness and frequency of reviews. We assessed the reliability of the data by interviewing knowledgeable officials and conducting manual testing on relevant data fields for obvious errors. Based on these steps, we found the data to be sufficiently reliable for the purposes of our analyses. To examine REAC’s processes for monitoring and overseeing quality assurance inspector performance, we reviewed the performance standards and performance elements REAC uses to evaluate quality assurance inspectors. We interviewed staff from REAC’s Quality Control department, which conducts inspection reviews on quality assurance inspectors. We compared REAC’s performance management processes to key practices we have identified for effective performance management. We also compared REAC’s policies for oversight and monitoring of quality assurance inspectors to criteria in Standards for Internal Control in the Federal Government. To address the fourth objective, we reviewed documentation related to monitoring and enforcement processes for HUD’s Office of Multifamily Housing (Multifamily Housing), Office of Public and Indian Housing (PIH), and the Departmental Enforcement Center. For example, we reviewed relevant protocols and guidance documents on PIH’s and Multifamily Housing’s processes to address physical risk, among other risks. We also reviewed the relevant legal authorities in the 2014 through 2018 Consolidated Appropriations Acts and federal regulations for these HUD program offices to take enforcement actions for properties with physical deficiencies. We interviewed officials from Multifamily Housing, PIH, and the Departmental Enforcement Center on their processes to monitor the physical condition of properties and take enforcement actions. We further selected two Multifamily Housing and four PIH field offices throughout the United States to understand actions they take to monitor properties and ensure that physical deficiencies are corrected. We developed a two- stage process to select field offices with a higher percentage of inspections with scores 70 and below. We first selected HUD regions based on our score criteria and then selected specific field offices within those regions using similar score criteria. Because we selected a nonprobability sample of field offices, the information we obtained cannot be generalized more broadly to all field offices. However, the information provides important context and insight into how the enforcement process for physical deficiencies works across the country. In addition, we obtained data on performance designations for public housing agencies within PIH, actions taken by Multifamily Housing for properties scoring below 60 on the REAC inspection, and actions taken by the Departmental Enforcement Center for Multifamily Housing properties. We assessed the reliability of the data by reviewing relevant HUD guidance and obtaining written responses from agency officials on how the data were collected, maintained, analyzed, and presented. Based on these steps, we found the data to be sufficiently reliable for the purposes of our analyses. Finally, we reviewed prior reports from GAO and from the HUD Office of Inspector General that discussed efforts to monitor the physical condition of properties, among other conditions. We conducted this performance audit from July 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Real Estate Assessment Center (REAC) conducted 44,486 inspections of Office of Multifamily Housing (Multifamily Housing) properties from fiscal years 2013 through 2017, according to our analysis of REAC’s inspection data. Properties received a score from 0 to 100, with a score below 60 considered as failing. Table 7 shows the percentage of inspections conducted in each state across three score ranges. States varied in the percentage of inspections that fell within the score range considered failing (0 to 59), from a low of 1 percent to a high of 10 percent. REAC inspects properties with lower scores more frequently than properties with higher scores. For example, properties that scored below 80 would have been inspected annually over this period, while properties that scored 90 or above would have been inspected every 3 years. The Real Estate Assessment Center (REAC) conducted 15,156 inspections of public housing properties from fiscal years 2013 through 2017, according to our analysis of REAC’s inspection data. Properties received a score from 0 to 100, with a score below 60 considered as failing. Table 8 shows the percentage of inspections conducted in states or U.S. territories across three score ranges. States varied in the percentage of inspections that fell within the score range considered failing (scores 0 to 59), from a low of 1 percent to a high of 34 percent. REAC generally inspects properties with lower scores more frequently than properties with higher scores. According to our analysis, REAC conducted fewer than 100 inspections of public housing properties in 18 states or territories. Table 9 shows the number of inspections conducted within three score ranges for these 18 states or territories. The Rapid Response and Resolution Team was created by the Department of Housing and Urban Development (HUD) in May 2016 to address troubled multifamily properties by improving HUD’s internal processes for assessing properties and analyzing risk so that properties do not become troubled; improving HUD’s processes for inspecting properties so that troubled ones are identified earlier and more reliably and communicating the results to stakeholders; and improving HUD’s processes for enforcing corrective actions and resolving troubled properties and working with owners so that HUD resources are used only on safe and healthy housing. The team consisted of staff from the Real Estate Assessment Center (REAC) and other units within HUD, including the Office of Multifamily Housing (Multifamily Housing). In January 2017, the team presented 31 recommendations, 8 of which were specific to REAC. As of December 2018, REAC had not yet implemented any of these recommendations. REAC had reached concurrence with Multifamily Housing on 3 of these recommendations and asked for Multifamily Housing’s consideration of the funding and rulemaking requirements for the remaining 5 recommendations. The 8 recommendations that were specific to REAC are as follows: 1. Implement a risk-based exigent health and safety abatement verification policy. 2. Inspect properties that have a REAC physical inspection score of less than 60 after a 3-day notice. 3. Increase the scoring weights of units and reexamine point deduction caps. 4. Expand photo capability in the inspection process to level 1 and level 2 deficiencies and a panoramic photo of the property. 5. Inspect carbon monoxide detectors in the inspection process. 6. Develop health and safety abatement requirements, including focusing on water ponding and missing lead-based paint disclosure forms and inspection reports. 7. Take enforcement action to protect tenants before the 45-day appeal period is over for properties that score under 30 points and that have exigent health and safety deficiencies. 8. Require electronic exigent health and safety certifications and abatements within 24 hours of the inspection. In addition to the contact named above, Andy Pauline (Assistant Director), José R. Peña (Analyst in Charge), Carl Barden, Chloe Brown, Hannah Dodd, Juan Garcia, Jeff Harner, Emily Hutz, Jill Lacey, Jerry Sandau, Jessica Sandler, Jennifer Schwartz, and Jena Sinkfield made key contributions to this report.", "summary": "Over 2 million low- and moderate-income households live in HUD-assisted (subsidized) or -insured multifamily housing. HUD's REAC uses contractors to inspect the physical condition of these properties to determine that they are decent, safe, sanitary, and in good repair. The 2017 Consolidated Appropriations Act, Joint Explanatory Statement, included a provision for GAO to review REAC's policies and processes. This report discusses, among other things, (1) REAC's process for identifying physical deficiencies and (2) REAC's selection, training, and monitoring of contract inspectors and its own quality assurance inspectors. GAO reviewed HUD documents and data related to REAC's physical inspection process, use of contract and quality assurance inspectors, and enforcement processes. GAO also interviewed HUD officials and housing industry stakeholder groups and conducted discussion groups with contract and quality assurance inspectors. The Department of Housing and Urban Development's (HUD) Real Estate Assessment Center's (REAC) standardized process to identify physical deficiencies at HUD multifamily properties (including public housing) has some weaknesses. For example, REAC has not conducted a comprehensive review of its inspection process since 2001, even though new risks to its process have emerged, such as property owners misrepresenting the conditions of their properties. A comprehensive review could help REAC identify risks and ensure it is meeting the goal of producing inspections that are reliable, replicable, and reasonable. In addition, REAC does not track its progress toward meeting its inspection schedule for certain properties, which could hinder HUD's ability to take enforcement actions. Finally, in the wake of concerns that inspections were not always identifying troubled properties, REAC and other HUD units, including the Office of Multifamily Housing, made eight recommendations in January 2017 to enhance the inspection process, but HUD had only approved three of these recommendations and had not implemented any of them as of December 2018. REAC uses contractors to inspect properties; these contract inspectors are trained and overseen by quality assurance inspectors hired directly by REAC. However, REAC's processes to select, train, and monitor both contract inspectors and quality assurance inspectors have weaknesses. Selection. REAC does not verify the qualifications of contract inspector candidates before they are selected to begin training to become certified inspectors. Formal processes to verify qualifications may help REAC identify unqualified candidates before they begin training and avoid expending resources on training these candidates. Training. REAC lacks formal mechanisms to assess the effectiveness of its training program for contract and quality assurance inspectors. In addition, unlike other professional inspection organizations, REAC does not have continuing education requirements. Formal mechanisms to assess the effectiveness of its training program could help REAC ensure that its program supports the development needs of inspectors. Further, requiring continuing education could help REAC ensure that inspectors are current on any changes in REAC's policies or industry standards. Monitoring. REAC has not met management targets for the number and timeliness of its inspection oversight reviews of contract inspectors. For example, REAC has not met its target of conducting three quality assurance reviews of poor-performing contractors per quarter. As a result, if deficiencies are not identified and recorded by contract inspectors, they may not be addressed in a timely manner. In addition, REAC's performance standards for its quality assurance inspectors have not been updated to reflect their broader job duties, such as conducting inspector oversight reviews and coaching and mentoring contract inspectors. Performance standards that are directly linked to these job duties would help ensure that inspectors are assessed on all of their key responsibilities. GAO makes 14 recommendations to HUD to improve REAC's physical inspection process and its selection, training, and monitoring of contract and quality assurance inspectors, among other things. HUD agreed with 11 recommendations, partially agreed with 2, and neither agreed nor disagreed with 1. GAO maintains that its recommendations should be fully addressed to improve the inspection process.", "document_type": "gao"}
{"report": "DOD has completed three additional statutory requirements of section 911 since our August 2019 report, but has not completed three remaining requirements, as shown in table 2. We previously reported that DOD had completed four of the statutory requirements, specifically awarding a contract for a study to determine how to best implement cross-functional teams, providing the results of the study to Congress, establishing any cross-functional teams to address critical department objectives and outputs, and reporting to Congress on the establishment of the cross- functional teams. Thus, in total, DOD has completed seven of the 10 statutory requirements. For more detail on all 10 statutory requirements, see appendix II. On October 29, 2019, the Secretary of Defense approved DOD’s organizational strategy. In preparing the strategy for review and approval, OCMO obtained input on the draft organizational strategy from other DOD and OSD components, consistent with a recommendation from our February 2018 report that OCMO obtain stakeholder input on the development of the organizational strategy. We found that the strategy addresses key requirements of section 911, including identifying critical objectives that would benefit from the use of cross-functional teams and providing for the appropriate use of these teams. As part of the organizational strategy, DOD also identified the actions it has taken to streamline the organizational structure and processes of the Office of the Secretary of Defense, another requirement of section 911. For example, the strategy states that DOD has delegated authority to approve certain global force management actions to the Chairman of the Joint Chiefs of Staff and delegated certain acquisition oversight functions to the military departments. Further, consistent with our recommendation from our February 2018 report that the CMO address how the department will promote and achieve a collaborative culture, the organizational strategy includes a short reference to our leading practices for mergers and organizational transformations. However, while the approved organizational strategy cites the leading practices, it does not include specific implementation steps that explain how DOD will follow these practices. Earlier drafts of the organizational strategy that we had reviewed included more specific implementation steps, but those steps were removed during the internal DOD review process. As we reported in August 2019, a January 2019 draft of the organizational strategy included practical implementation steps DOD planned to take to advance a collaborative culture, each of which were shown to align with our leading practices for mergers and organizational transformations. For example, consistent with the leading practice for establishing a coherent mission and integrated strategic goals to guide the transformation, the January 2019 draft proposed that the CMO develop an implementation plan with goals and milestones for its efforts to implement the organizational strategy, communicate those goals and milestones, and report periodically on the achievement of the goals. However, in place of these specific steps, the approved organizational strategy simply lists these leading practices and makes a broad statement that DOD is committed to further incorporating and institutionalizing these practices at every opportunity. An OCMO official told us these implementation steps were removed as the OCMO prepared the draft for department-wide coordination and submission to the Secretary of Defense for review and approval. According to that official, OCMO officials made this change because the Secretary and Deputy Secretary of Defense were newly confirmed, and OCMO officials did not want to commit them to a specific course of action. That official also told us that DOD might use its senior leadership forums, such as the Deputy’s Management Action Group (DMAG), to monitor implementation of the organizational strategy and identify opportunities to improve collaboration, including implementation of our leading practices. However, the official acknowledged that any plan to use such forums for monitoring implementation has not been finalized. As we stated in making our February 2018 recommendation that the department address how it would promote and achieve a collaborative culture, section 911 identified several outcomes that DOD should achieve to advance such a culture. We also noted that DOD could use our leading practices for mergers and organizational transformations to address how the department will advance a culture that is collaborative, team-oriented, results-driven, and innovative. We further stated that DOD would be better positioned to transform and meet its mission if it incorporated these leading practices in its organizational strategy as a way to better articulate how the department will achieve the outcomes that advance a collaborative culture across DOD and address the requirements of section 911. Specific implementation steps like those included in earlier drafts of the organizational strategy offered the department a clear path forward for pursuing the goals of section 911 and promoting a collaborative culture. Absent these steps, such as developing an implementation plan with goals and milestones, it is less clear how DOD intends to implement the organizational strategy and assess progress toward its goals. Identifying and documenting specific implementation steps to advance a collaborative culture—such as those OCMO included in earlier drafts of the organizational strategy—is necessary to fully address the requirements of section 911. On December 12, 2019, the Secretary of Defense approved DOD’s guidance on cross-functional teams. We found that this two-page guidance addresses most, but not all, of the 911 requirements and leading practices for cross-functional teams. Specifically, it addresses in whole or in part six of the seven section 911 requirements and six of the eight leading practices. The Secretary-approved guidance also directs the CMO to develop more detailed implementing guidance. It will be important for the CMO to develop and issue this detailed implementing guidance to fully address section 911 requirements and our leading practices for effective cross- functional teams, consistent with a recommendation in our February 2018 report. According to an OCMO official, OCMO plans to use previously drafted terms of reference as the basis for the CMO’s more detailed implementing guidance. Based on our review, when the Secretary of Defense approved guidance is considered along with the draft terms of reference expected to serve as detailed implementing guidance, both documents will fully address all section 911 requirements and leading practices for effective cross-functional teams. We will monitor the department’s progress in issuing this guidance as part of our normal process of assessing DOD’s efforts to implement our recommendations. DOD has not approved its curriculum for training for cross-functional team members and their supervisors. In February 2018, we reported that DOD’s draft curriculum for cross-functional team members and their supervisors addressed the section 911 requirements for that training. We reported in August 2019 that DOD had provided required training using its draft curriculum to members of the EMSO team—DOD’s only established section 911 team at the time—but had not provided training to their supervisors. According to DOD’s comments on our August 2019 report, DOD expected the draft curricula for training for cross-functional team members and their supervisors to have been approved simultaneously with the issuance of the Secretary’s guidance on cross-functional teams. According to OCMO officials, however, DOD has contracted for the delivery of the required training for cross-functional team members and their supervisors. One of those officials also told us OCMO now expects that training to be completed in 2020. Another OCMO official told us that the OCMO has been further refining the draft curriculum based on feedback from the members of the EMSO team and external experts before submitting the curriculum for review and approval. DOD has not provided required training on cross-functional teams and related subjects to presidential appointees and the curriculum has not been approved. Section 911 required presidentially appointed, Senate- confirmed officials to receive training on leadership, modern organizational practice, collaboration, and the operation of cross- functional teams within 3 months of their appointment or to receive a waiver from the President of the United States. As of October 2019, 23 of 36 such positions had been filled and the officials had been in their positions for more than 3 months; none had received the statutorily mandated training. According to DOD’s comments on our August 2019 report, DOD expected the draft training curricula for presidential appointees to have been approved simultaneously with the issuance of the Secretary’s guidance on cross-functional teams. According to OCMO officials, however, DOD has contracted for the delivery of the required training for presidential appointees. One of those officials also told us they now expect that training to be provided in 2020. An OCMO official told us that OCMO has been further refining the draft curriculum and discussing possible venues for providing this training for presidential appointees, including one of the weekly meetings that the Deputy Secretary of Defense has with all Office of the Secretary of Defense presidential appointees. DOD has not completed the required analysis of the successes and failures of its cross-functional teams. Section 911 requires DOD’s analysis to be completed with support from external experts in organizational and management sciences within 18 months of the establishment of the first cross-functional team under section 911. Because the first cross-functional team was established in August 2017, this analysis was due in February 2019. According to OCMO officials, DOD has contracted with an organization to help develop the analysis. One of the officials also told us DOD expects the analysis to be completed in 2020. Another OCMO official told us in December 2019 that work on the assessment, including a survey and structured interviews, was underway, and that an initial draft report was expected by the end of December 2019. DOD’s EMSO team is continuing to work toward its mission to develop requirements and specific plans to improve EMSO capabilities across the department and to achieve operational superiority. The team is developing 13 initiatives in four areas—governance, organization, capabilities and gaps, and training and readiness. In addition, the team issued a report required by section 1053 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019, which included the mandated assessments of the electronic warfare capabilities of the Russian Federation and the People’s Republic of China in consultation with the Director of the Defense Intelligence Agency. Section 1053 also required the team to, among other things, update the department’s Electronic Warfare Strategy in coordination with the Electronic Warfare Executive Committee. According to an EMSO official, the team is developing a new strategy, which is scheduled for completion in June 2020. The EMSO team is continuing to demonstrate leading practices for effective cross-functional teams, similar to what we reported in August 2019. Specifically, at that time, we reported that the EMSO team was demonstrating leading practices for effective cross-functional teams, such as a well-defined team structure and well-defined team goals. Based on the results of our recent survey of individual team members, most team members believe the team is demonstrating open and regular communication, an inclusive team environment, has an empowered cross-functional team leader, and has well-defined team goals. However, our survey results show that team members responded less favorably to questions about senior management support than to questions about the other leading practices. Specifically, less than half of the respondents agreed with the statements that DOD’s senior leadership provides the team with sufficient resources for its work, supported the team as a priority, and supported the team’s goals and objectives. In their survey responses and during interviews, team members expressed their concerns about the lack of resources, such as funding and sufficient office space to perform their work. According to team officials, they are continuing to work with the OCMO to resolve the team’s resource issues. In our August 2019 report, we stated that the team’s progress was negatively affected by funding delays resulting from disagreements among senior leadership over the responsibility for funding the team. The disagreement had been resolved for fiscal year 2019, but had not yet been resolved for future fiscal years. We recommended, and DOD concurred, that the CMO and EMSO cross- functional team clarify roles and responsibilities for providing administrative support and funding for the team beyond fiscal year 2019 in accordance with the memorandum establishing the team. According to EMSO team officials, however, funding for future years has not been identified. The team has discussed its funding needs with the OCMO and staff from the Office of the Deputy Secretary of Defense, but there is still no clarity regarding responsibility for funding the team. The team’s budget submission as part of DOD’s fiscal year 2021 budget process was withdrawn because the amount requested was smaller than the amounts typically reviewed in the process. According to an EMSO team official, the OCMO is providing funding for the team incrementally on a quarterly basis, and is facing challenges with funding the team’s request for a contract due to the department operating under a continuing resolution. According to another EMSO team official, the team is maintaining the status quo with its current funding and is not considering any additional initiatives. We also reported in our August 2019 report that, according to a team official, while the team had its own office space, the space did not have the level of security required to allow the team to work on a third of its initiatives. Team officials have since told us the team plans to move to an appropriately secure space in early 2020. We will continue to monitor DOD’s progress to secure resources and office space for the team as part of our normal process of assessing DOD’s efforts to implement our recommendations. In its approved organizational strategy, DOD identified two existing task forces to expand the number of cross-functional teams. First, the Secretary of Defense established the Close Combat Lethality Task Force in February 2018 to develop, evaluate, recommend, and implement improvements to U.S. squad-level infantry combat formations and strengthen the combat, lethality, survivability, resiliency, and readiness of infantry squads. Second, the Secretary of Defense established the Protecting Critical Technology Task Force in October 2018 to address concerns over the security of the department’s critical technology and the loss of classified information and controlled unclassified information that puts DOD’s investments at risk and erodes the lethality and survivability of U.S. forces. According to an OCMO official, the OCMO updated the organizational strategy and designated these two task forces as cross- functional teams as a result of input from DOD senior leadership during their review of the draft organizational strategy. Based on our review of the documents used to establish the two task forces, we found that they would meet only some of the requirements we reviewed for cross-functional teams as mandated by section 911. For example, we found that the documentation for the Close Combat Lethality Task Force, as it was established, shows that the task force has a clearly established objective; is directed to develop recommendations such as policy changes and investment decisions; and is directed to make decisions on cross-functional issues—some of the key section 911 requirements. Similarly, we found that the documentation for the Protecting Critical Technology Task Force, as established, shows that the director of the task force has the authority to select the membership from across the department, another key requirement. However, based on the documents we reviewed, we found that the teams would not meet other requirements. For example, we found that the documentation for both teams did not ensure that those team members and leaders who are supervisors receive training in elements of successful cross-functional teams. According to an OCMO official, the OCMO will ensure that these task forces identified as cross-functional teams meet the requirements of section 911. For example, the OCMO will provide the required training. DOD’s newly issued guidance on cross-functional teams could help ensure that existing and any new cross-functional teams meet section 911 requirements. In addition, it could help provide these existing and any new teams with the information, direction, and authority they need to comply with mandated requirements for cross-functional teams. For example, section 911 permits the Secretary to delegate to cross- functional teams any decision-making authority that the Secretary considers appropriate to achieve the objectives of the teams; DOD’s guidance delineates the decision-making authority of cross-functional teams. More than 3 years after the passage of the National Defense Authorization Act for Fiscal Year 2017, DOD has begun to take key steps to address the requirements of section 911 and to promote a more collaborative culture in the department, including issuing its organizational strategy and making greater use of cross-functional teams under the act. Even as it has taken these steps, challenges for the departments’ ongoing implementation of section 911 remain. The department has still not addressed key requirements to help promote a collaborative culture and, according to officials, still has not identified responsibility for funding one of its cross-functional teams established under section 911. Further, specific implementation steps that would have offered the department a clear path forward for pursuing the goals of section 911 and promoting a collaborative culture at DOD were removed from DOD’s approved organizational strategy—a disappointing development. Identifying and documenting specific implementation steps to encourage a collaborative culture is necessary to fully address the requirements of section 911 and encourage such a culture. The Secretary of Defense should ensure that the Chief Management Officer identify and document specific implementation steps to advance a collaborative culture, consistent with our leading practices for mergers and organizational transformations. We provided a draft of this report to DOD for review and comment. In its written comments, which are reproduced in Appendix IV, DOD concurred with our recommendation. DOD also provided additional information on the steps that DOD has taken or plans to take to advance a collaborative culture, such as the Secretary and Deputy Secretary of Defense’s use of DOD’s senior governance forums to encourage collaboration across the department. DOD also stated that it plans to incorporate policies based on best practices for cultivating a collaborative organizational climate into the CMO’s guidance on the implementation of cross-functional teams as well as future National Defense Strategies and National Defense Business Operations Plans. We are sending copies of this report to the appropriate congressional committees and to the Secretary of Defense and Chief Management Officer. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this are listed in appendix V. Section 911 of the NDAA for Fiscal Year 2017 included a provision for us—every 6 months after the date of enactment on December 23, 2016, through December 31, 2019—to submit to the congressional defense committees a report. Each report is to set forth a comprehensive assessment of the actions that DOD has taken pursuant to section 911 during each 6-month period and cumulatively since the NDAA’s enactment. Table 3 identifies our five prior reports on DOD’s implementation of section 911 and the status of the 11 recommendations from those reports. Section 911 of the National Defense Authorization Act for Fiscal Year 2017 requires the Secretary of Defense to take several actions. Table 4 summarizes these requirements, the due date, and the date completed, if applicable, as of December 2019. In February 2018, we reported on eight leading practices for implementing effective cross-functional teams. Table 5 identifies these leading practices and their related key characteristics. In addition to the contact named above, Margaret Best (Assistant Director), Daniel Ramsey (Analyst-in-Charge), Sierra Hicks, Alexa Kelly, Richard Powelson, and Paulina Reaves made key contributions to this report. Other contributors included Tracy Barnes, Arkelga Braxton, Michael Holland, Ned Malone, Judy McCloskey, Jeremy Rogers, Ron Schwenn, and Sarah Veale.", "summary": "DOD has had longstanding organizational and management challenges that hinder collaboration. Section 911 of the NDAA for Fiscal Year 2017 directed the Secretary of Defense to, among other things, issue an organizational strategy that identifies critical objectives that span multiple functional boundaries, establish cross-functional teams to support this strategy, and provide related guidance and training. The NDAA for Fiscal Year 2017 also included a provision for GAO periodically to assess DOD's actions in response to section 911. GAO has issued a series of reports since June 2017 and made a number of recommendations to DOD. This report assesses the extent to which DOD has made progress in (1) implementing the requirements of section 911 and (2) establishing cross-functional teams. GAO reviewed documentation, interviewed cross-functional team members and other DOD officials, and compared DOD's actions to section 911 requirements and leading practices for cross-functional teams. Since GAO's August 2019 report, the Department of Defense (DOD) has taken actions to complete three additional statutory requirements of section 911 of the National Defense Authorization Act (NDAA) for Fiscal Year 2017, but has not completed three remaining requirements. These requirements are intended to support cross-functional teams and to promote department-wide collaboration (see table). Cross-functional teams rely on individuals with different types of expertise to work toward a common, well-defined goal, and are thought to deliver better and faster solutions to complex and fast-moving problems. DOD's approved organizational strategy addresses key requirements of section 911, including identifying critical objectives that would benefit from the use of cross-functional teams and providing for the appropriate use of these teams. However, the strategy did not include practical, specific implementation steps to guide DOD's efforts to advance a collaborative culture, which had been included in earlier draft versions of the strategy. These steps had aligned with GAO's leading practices for mergers and organizational transformations. Specific implementation steps like those included in earlier drafts of the organizational strategy offered DOD a clear path forward for pursuing the goals of section 911 and for promoting a collaborative culture. Absent identifying and documenting specific implementation steps, it is less clear how DOD intends to implement the organizational strategy and assess progress toward its goals. DOD's existing cross-functional team charged with improving electromagnetic spectrum operations and defending its communication systems from attacks is continuing its work by issuing a statutorily mandated report, among other efforts, but DOD has not clarified responsibility for funding the team. GAO will continue to monitor DOD's progress toward providing such support to the team as GAO recommended in August 2019. In addition, DOD has designated the Close Combat Lethality Task Force and the Protecting Critical Technology Task Force as new cross-functional teams, although they meet only some of the section 911 requirements. DOD officials said they will ensure that the newly designated teams meet these requirements, including providing required training. In this report, GAO recommends that DOD identify and document specific implementation steps to advance a collaborative culture, consistent with GAO's leading practices. GAO also reiterates the importance of addressing its prior recommendations. DOD concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Sanctions provide a range of tools that Congress and the President may use to seek to alter or deter the behavior of a foreign government, individual, or entity in furtherance of U.S. national security or foreign policy objectives. For example, sanctions may be used in response to human rights abuses, weapons proliferation, or occupation of a foreign country; ultimately seeking to change the behavior of those perpetrating these offenses. Sanctions may include actions such as limiting trade; blocking assets and interest in assets subject to U.S. jurisdiction; limiting access to the U.S. financial system, including limiting or prohibiting transactions involving U.S. individuals and businesses; restricting private and government loans, investments, insurance, and underwriting; and denying foreign assistance and government procurement contracts. Sanctions can be comprehensive or targeted. Comprehensive sanctions. Generally, comprehensive sanctions include broad-based trade restrictions and prohibit commercial activity with an entire country. Examples of comprehensive sanctions include U.S. sanctions against Iran and Cuba. Targeted sanctions. Targeted sanctions restrict transactions of and with specific persons or entities. For example, the U.S. sanctions program related to Somalia targets persons engaging in acts threatening the peace, security, or stability of Somalia. Sectoral sanctions are a form of targeted sanctions directed at a specified sector, or sectors, of a target’s economy. For instance, Executive Order 13662 authorized sanctions targeting certain sectors of the Russian economy as might later be determined by the Secretary of the Treasury in consultation with the Secretary of State, such as the financial services, energy, mining, and defense and related materiel sectors. The United States also uses supplementary sanctions, known as secondary sanctions, which target third-party actors doing business with, supporting, or facilitating targeted regimes, persons, and organizations. For example, in February 2017, Treasury imposed sanctions against 13 individuals and 12 entities, including persons outside Iran, for their involvement in or support for Iran’s ballistic missile program, as well as for acting for or on behalf of, or providing support to, Iran’s Islamic Revolutionary Guard Corps-Qods Force. There are currently 20 country-based or country-related sanctions programs, according to lists of sanctions programs published by Treasury and State. The sanctions may target the governments of these countries or individuals and entities. Figure 1 shows country-based and country- related U.S. sanctions programs as of July 2019. Treasury, State, and Commerce, as well as various other U.S. agencies, play roles in implementing sanctions. Treasury implements sanctions by taking actions such as designating entities for the application of sanctions. These sanctions may include blocking entities’ access to U.S.-based assets, prohibiting them from engaging in financial transactions in the United States, and restricting access to U.S. financial services. Treasury’s Office of Foreign Assets Control (OFAC), which is part of the Office of Terrorism and Financial Intelligence (TFI), has primary responsibility for Treasury’s sanctions implementation, according to Treasury. TFI is charged with safeguarding the U.S. financial system against illicit use and combating rogue nations, terrorist facilitators, weapons of mass destruction proliferators, money launderers, drug kingpins, and other national security threats. As part of its implementation of sanctions, OFAC publishes a list, known as the Specially Designated Nationals List, of individuals, groups, and entities whose assets in the United States are blocked and with which U.S. persons are prohibited from dealing. The addition of an individual, group, or entity to this list is referred to as a sanctions designation. Entities or groups listed include those owned or controlled by, or acting for or on behalf of, targeted country governments. OFAC also lists individuals, groups, and entities, such as terrorists and narcotics traffickers, designated under targeted sanctions programs that are not country specific. OFAC may also issue licenses, general or specific, to permit activities that would otherwise be prohibited under a sanction. For example, OFAC has issued a general license to allow nongovernmental organizations to engage in not-for-profit activities in Syria in support of humanitarian projects, democracy-building, education, and noncommercial development projects directly benefitting the Syrian people. According to Treasury, OFAC participates in all aspects of sanctions implementation, including, targeting, outreach to the public, and compliance. OFAC also enforces sanctions by conducting civil investigations of sanctions violators and working with law enforcement agencies. State implements economic and other sanctions through a variety of actions, such as implementing sanctions-related controls on defense exports, restricting foreign aid, implementing arms embargoes pursuant to United Nations Security Council resolutions, and restricting visas. State’s primary sanctions coordination office is the Office of Economic Sanctions Policy and Implementation (SPI), which is part of the Division for Counter Threat Finance and Sanctions in State’s Bureau of Economic and Business Affairs. According to State, SPI is responsible for developing and implementing foreign policy–related sanctions adopted to counter threats to national security posed by particular activities and countries. In addition, according to State, SPI builds international support for implementing sanctions, provides foreign policy guidance to Treasury’s OFAC and Commerce’s Bureau of Industry and Security on sanctions implementation, and works with Congress to draft legislation that advances U.S. foreign policy goals in these areas. Further, according to State, SPI works to remove sanctions when appropriate to reward and incentivize improved behavior or demonstrate U.S. support for newly established democratic governments. Although SPI is State’s primary sanctions coordinating office, other State bureaus, offices, and overseas posts may have significant roles in sanctions implementation, depending on the sanctions program. Some functional bureaus interact with OFAC within their areas of expertise. For example, according to State, the Bureau of International Security and Nonproliferation has expertise on missile, chemical, and biological proliferation as well as how to counter proliferation. The bureau assists in developing sanctions programs and designating sanctions targets under nonproliferation law, according to State. Also, the Bureau of Counterterrorism and Countering Violent Extremism takes part in developing and evaluating sanctions policy as well as helping target entities for sanctions under various authorities, including an executive order targeting those that commit or support terrorism and the Foreign Terrorist Organization section of the Immigration and Nationality Act, according to State. Additionally, the Bureau of International Narcotics and Law Enforcement Affairs uses its expertise in drug trafficking, corruption, and crime to assist in selecting targets for counternarcotics sanctions, transnational criminal organization sanctions, and corruption-related sanctions under human rights law, according to State. SPI also works with State’s regional bureaus, such as the Bureau of African Affairs; country offices; and overseas posts to develop potential targets for given sanctions programs, such as those in Somalia and Burundi. Both Treasury and State also have intelligence offices that provide the sanctions-implementing offices with information to facilitate sanctions targeting and enforcement efforts and developing new sanctions policy. Treasury’s Office of Intelligence and Analysis (OIA). TFI’s OIA is responsible for TFI’s intelligence functions as well as for integrating the Treasury Department into the larger Intelligence Community and providing support to both Treasury leadership and the Intelligence Community. State’s Bureau of Intelligence and Research (INR). INR’s primary mission is to provide all-source intelligence and analysis to serve U.S. diplomacy. INR provides independent analysis of events to State policymakers as well as officials throughout the U.S. government and coordinates with other intelligence agencies to obtain relevant information to inform State policymakers. For example, INR’s analytical offices and its Sanctions Support Team, when requested, gather and provide information—both classified and open sourced— on sanctions targets to policy officials at State and Treasury. In addition to OIA and INR, other U.S. intelligence agencies provide support to the sanctions-implementing agencies. Commerce implements sanctions by restricting licenses for exports, reexports, and transfers (in-country) involving U.S.-origin items— commodities, software, and technology—subject to its jurisdiction and destined for sanctioned persons, entities, and destinations. Through its export licensing process, Commerce’s Bureau of Industry and Security (BIS) restricts sanctioned countries’ and persons’ access to U.S. items. BIS also enforces export controls through its Office of Export Enforcement, which conducts criminal and administrative investigations of potential violations of export regulations. Other U.S. agencies with roles in sanctions implementation include the Departments of Defense, Energy, Homeland Security, and Justice. The agencies involved and the extent of their involvement depend largely on their area of expertise. The following are a few examples of how other agencies are involved with sanctions: The Department of Defense restricts arm sales and other forms of military cooperation and is involved in decisions regarding export licenses. The Department of Energy assists in implementing nonproliferation sanctions. The Department of Homeland Security’s Customs and Border Protection helps assure that shipments to and from sanctioned countries and entities do not leave or enter the United States. The Department of Justice investigates and prosecutes violations of sanctions and export laws and provides legal reviews of sanctions’ designations. The roles of Treasury, State, and Commerce in implementing sanctions are assigned either directly by the statute or executive order authorizing the sanctions or through an interagency process and agreement. Some statutes and executive orders designate an agency to serve as the primary agency for sanctions implementation and also designate one or more agencies to support the primary agency through consultation. For example, Executive Order 13570, Prohibiting Certain Transactions With Respect to North Korea, authorizes Treasury, in consultation with State, to carry out actions to employ all powers granted to the President by specified laws to carry out the purposes of the order. While some statutory authorities may designate specific agencies for implementation, most do not make such designations but rather delegate the authority to do so to the Office of the President, according to State officials. Agency officials also noted that they are often involved in drafting new sanctions legislation and, if the statute will designate specific agency roles, are able to advise lawmakers regarding the selection of the primary agency for implementing sanctions. When a statute or executive order authorizing sanctions delegates authority to the Office of the President, specific agency roles are assigned through an interagency process at the National Security Council (NSC). According to State officials, the NSC’s Principals Coordinating Committee discusses and assigns agency roles in a sanctions program. According to State officials, most of the committee’s decisions about agency roles are made at the staff level, and the actual principals become involved only if there is a disagreement among the agencies’ staffs. State officials told us that each agency’s area of expertise and its available resources factor into the selection of an agency to lead implementation of a particular sanctions authority. For example, according to a State official, Treasury is often the lead for country-based sanctions, because these programs often focus on international financial transactions, while State usually serves as the lead for sanctions requiring more specialized knowledge, such as those relating to weapons of mass destruction and nuclear nonproliferation. State officials added that there is usually very little, if any, disagreement among the agencies regarding whether they should have primary or consultative roles. Once a decision is made, the President typically issues a delegation memo assigning responsibility for implementation of elements of the sanctions authority to each agency involved, according to Treasury officials. Treasury, State, and Commerce each provide publicly available information about the sanctions they implement and the authorities underlying those sanctions. Treasury. OFAC maintains a publicly available list of all sanctions laws and executive orders that Treasury has a role in implementing. The list is organized by sanctioned country and functional program. For each country-based, country-related, or functional program, the entry in the list includes a discussion of statutory authorities, executive orders, and regulations under which the program is implemented. According to Treasury officials, OFAC staff track and update changes in U.S. sanctions policy as needed and post new sanctions information to the agency’s website as soon as a sanction is approved. State. SPI also maintains publicly available lists of the major sanctions laws and executive orders that State has a role in implementing. These lists are organized by sanctioned country and by functional program. According to State officials, SPI typically updates these lists when authorities are established or rescinded and periodically reviews and updates the web pages where it posts the lists. According to State officials, the lists are not intended to be comprehensive and are meant only to give the reader a general understanding of some of State’s high-profile sanctions programs and to provide an initial resource for information and recent actions. Commerce. BIS produces a compilation of legal authorities pertaining to the administration of export controls under the Export Administration Regulations. Unlike Treasury and State’s lists, Commerce’s compilation comprises all of Commerce’s legal authorities to control exports, reexports, and transfers (in-country). These include executive orders, laws, and presidential declarations authorizing controls related to national security, chemical and biological weapons, and nuclear nonproliferation reasons, as well as controls for foreign policy–related sanctions. According to Commerce officials, the compilation is updated annually to reflect additions to, or deletions of legal authorities. BIS also issues rules amending the Export Administration Regulations to implement new executive orders and statutory and other legal authorities on a frequent basis, at times within a few days of the announcement or enactment of the underlying authority. According to Commerce officials, publishing rules amending the Export Administration Regulations provides the public with timely notice of changes to Commerce’s sanctions authorities and actions taken pursuant to these authorities. Treasury, State, and Commerce assess potential and observed impacts of specific sanctions, but officials stated they do not conduct agency assessments of the effectiveness of sanctions in achieving broader U.S. policy goals and cited various difficulties in doing so. Each agency’s sanctions implementation offices rely mainly on assessments performed by the Intelligence Community, including Treasury’s OIA and State’s INR. These assessments analyze the impacts of specific sanctions on a particular aspect of the sanction’s target—for example, the sanctions’ impact on the target country’s economy or trade, according to agency officials. However, these assessments do not analyze sanctions’ overall effectiveness in achieving broader U.S. policy goals or objectives, such as whether the sanctions are advancing the national security and policy priorities of the United States, according to Treasury officials. Treasury, State, and Commerce have not conducted such broader assessments on their own, and agency officials cited a variety of difficulties related to doing so. However, according to Treasury, State, and Commerce, agency assessments of sanctions’ impacts often contribute to broader interagency discussions, typically coordinated through the NSC, that examine the effectiveness of sanctions in achieving policy goals. According to agency officials, an NSC-led process allows the U.S. government to draw upon multiple agencies’ inputs and perspectives, and to consider these issues in the larger policy context, because sanctions are often only one element of broader government-wide strategies to achieve U.S. policy goals. Treasury has assessed both the observed and potential impacts of specific sanctions designations on various aspects of targets, such as a target country’s economy. Treasury’s intelligence component, OIA, conducts the majority of these impact assessments and produces analytic papers on sanctions’ impacts, according to officials. OIA officials stated that the type of analysis varies depending on the purpose or nature of the assessment. For example, some analytic papers focus on the overall economic impact of the sanction on the target country, while others examine the impact on a specific target, such as an entity or group of entities. According to Treasury officials, the office has conducted both short-range and long-range analyses of sanctions’ impacts at both the country-specific and the authority-specific level. Treasury officials said that the frequency of assessments conducted for a particular country or authority varies according to the sanctions program’s size and relative importance to current U.S. policy goals. OIA officials reported that the Under Secretary for TFI requires that impact assessments be conducted prior to an action as part of the targeting process and retrospectively after a designation takes place. According to Treasury officials, TFI, including OIA, considers conducting such impact assessments to be part of OIA’s mission. OIA officials noted that OIA, as well as TFI more broadly, considers understanding sanctions impact to be integral to developing sanctions policy and making targeting decisions. OIA officials stated that their impact assessments are circulated within Treasury and their broader analytic papers are circulated within the Intelligence Community and interagency. In addition, OFAC officials reported that they request impact assessments from OIA whenever new sanctions targets are being considered. OFAC officials stated that OIA’s impact assessments are an integral part of any targeting matrix prepared by OFAC’s Office of Global Targeting. According to OFAC officials, the type of assessment requested depends on the issue, program, and target. The requested assessments may include, for example, determining whether a target has assets in the United States to an extent that sanctions would be impactful, identifying the holdings of a given target globally and its interactions with the United States, or analyzing the second- and third-order effects of a potential sanctions designation. OFAC officials said that these assessments are also used in risk- mitigation planning. For example, if an assessment revealed that a particular sanction would lead to an undesirable consequence, such as blocking important medical supplies or other humanitarian items, OFAC might take preemptive measures to mitigate that undesirable consequence through a general license or other available tools. Treasury’s Office of International Affairs also prepares some assessments of sanctions’ impacts. According to Treasury officials, the Office of International Affairs occasionally conducts macroeconomic assessments of the impact of specific sanctions to inform TFI policymaking. A senior Office of International Affairs official reported that most of the office’s macroeconomic analyses of sanctions’ impacts are focused on the potential impact on economic growth and financial stability in the target country. In addition, OFAC officials stated that the Office of International Affairs often participates in agency discussions and may provide verbal or written assessments of sanctions’ impact on foreign partners’ industries and markets as well as on U.S. companies. State conducts some assessments of the impact of sanctions on their intended targets. INR produces most reports on sanctions impact, which are based on all sources of information (i.e., classified and open source). According to INR officials, these reports are often produced at the request of State policymakers, and occasionally coordinated with the broader Intelligence Community. INR facilitates the review of sanctions’ impacts on particular governments or other areas of interest at the request of, or in partnership with, State’s regional and functional bureaus. According to INR, most of INR’s intelligence support responds to specific questions and requests, such as whether a particular company is still operating in a sanctioned country. According to State officials, INR provides responses to requests in written products, such as formal INR or Intelligence Community assessments, or more informally through channels such as oral briefings or email responses. INR officials noted that written products often inform interagency discussions on sanctions at the NSC, since questions asked at State often become relevant to broader policy discussions. Other State entities have also examined the impact of sanctions. In 2016, State’s Office of the Chief Economist, responding to a request from SPI, analyzed the economic impact of targeted sanctions on Russian firms. According to SPI officials, they commissioned the study because they wanted to understand the specific impact of sanctions on a country that was already facing economic challenges, given that sanctions were among several foreign policy tools used to address Russian behavior. According to SPI officials, this was the only analysis of sanctions impact that SPI had requested of the Office of the Chief Economist in the past 5 years. In addition, some embassies have used cables to State headquarters to report on the impact of sanctions. According to State, most such information on a sanction’s impact is captured in a sentence or two as part of a cable focused on other issues. However, embassies in countries where sanctions are imposed on the host government (or nearby governments) often dedicate significant time to reporting on the impact of sanctions and how they affect broader foreign policy, according to State officials. For example, the U.S. embassy in Seoul produced a series of cables in 2017 and 2018 detailing observed impacts of sanctions on the North Korean economy. Commerce has conducted some assessments of the prospective impacts of sanctions, according to Commerce officials. According to Commerce officials, the Under Secretary or Deputy Under Secretary communicates requests for analyses of sanctions that originate with the NSC’s Principals Coordinating Committee. According to Commerce officials, these requests are infrequent, with very few received in recent years, and generally related only to Russia and Iran. According to Commerce, the results of these assessments may include two components: (1) a simulation of potential economic impact and (2) background data on trade flows and vulnerabilities. The first component may include a projection of sanctions’ impact on gross domestic product (GDP), consumer prices, production in specific industries, jobs, and trade flows. The second component may include background on the amount and nature of any U.S. trade with countries that might be sanctioned. For example, in March 2015, Commerce produced an analysis to determine the areas of greatest interdependence among the United States, Russia, and U.S. partners that were at risk of being affected by prospective sanctions against Russia. Treasury and State officials reported using assessments of sanctions’ impacts provided by intelligence agencies outside Treasury or State. Assessments used by Treasury. OFAC officials reported requesting assessments from other intelligence agencies, in addition to OIA’s assessments. According to OFAC, the type of assessment requested—for example, gauging the reaction of a target or government leadership to sanctions or examining a target’s assets globally—depends on the issue and the program. OFAC also reported requesting analysis of sanctions’ impact on strategic targets and their associates. OFAC officials reported that these assessments are taken into account as Treasury considers developing additional sanctions policies, targets, or both. Assessments used by State. INR and SPI officials stated that they use assessments of sanctions’ impact conducted by intelligence agencies outside State. According to an INR official, the INR sanctions team will obtain Intelligence Community assessments relevant to State policymakers concerns. SPI officials stated that most of the assessments they use are focused on the potential impact of proposed sanctions. According to the officials, the assessments help them design sanctions tools and develop targets to maximize impact. For example, according to SPI officials, the Intelligence Community will assess where the largest impact might be by assessing whether actors are likely to cease particular activities if targeted or will identify points where targets interface with the U.S. financial system. SPI officials stated that the number of assessments conducted depends on multiple variables, including current events in the targeted country and the degree of senior policymaker interest. An INR official stated that most Intelligence Community resources (i.e., intelligence collection and analysis) are focused on just a few sanctions regimes, such as North Korea, Iran, and Russia. Moreover, according to State officials, routine, finished analysis—assessing the impact of sanctions either before or after their imposition—is not always available from the Intelligence Community or is slow in delivery. State officials stated that this type of regular intelligence reporting and analysis is critical to informing sanctions policymaking at all stages (e.g., planning, targeting, implementing, enforcing, and revising). Treasury, State, and Commerce officials identified a range of analytic issues that make it difficult to assess the effectiveness of a sanctions program in meeting broad U.S. foreign policy goals. The difficulties they cited included the following: Isolating sanctions’ effects from other factors is difficult. Agency officials cited the difficulty—or, in some cases, the impossibility—of identifying sanctions as the sole or most significant cause of a target’s action relative to U.S. policy goals. For example, a sanctioned country may decide to cease certain behavior for any number of reasons that may be unrelated to the sanctions or other U.S. policy measures. OFAC officials also stated that behavioral change can be subtle, incremental, and lacking clear correlations with specific causes. In addition, Treasury officials noted that sanctions are often used in conjunction with other policy tools, such as diplomatic engagement with the target, export controls, and visa bans. Distinguishing the impact of each policy tool used is exceedingly difficult due to the limited information available via intelligence and law enforcement channels, according to Treasury officials. Policy goals and objectives often shift. Treasury officials stated that U.S. policy goals and objectives underpinning the sanctions can change over the course of a sanctions program, making it difficult to measure sanctions’ effectiveness in achieving any ultimate policy objective. According to OFAC officials, because sanctions programs are ongoing, any assessments of a sanctions program’s effectiveness would necessarily be interim, not final, and the metrics used to measure effectiveness might change over the program’s duration. Reliable data are sometimes lacking. Agency officials stated that a lack of reliable data on certain targets or countries can also make it difficult to assess the effectiveness of sanctions. According to Treasury, State, and Commerce officials, given these difficulties and limited resources, they do not conduct their own assessments of the overall effectiveness of existing sanctions programs in achieving broad policy goals. Instead, they have directed resources toward the assessments of sanctions’ impacts on targets, such as the impact on a target country’s economy or trade. Agency officials also noted that there is no policy or requirement for agencies to assess the effectiveness of sanctions programs in achieving broad policy goals. However, Treasury and State officials stated that sanctions policy is continuously evaluated informally by those implementing the sanctions, as new information comes in and as new targets are developed. Moreover, Treasury, State, and Commerce stated that agency assessments of sanctions’ impacts often contribute to broader interagency discussions, typically coordinated through the NSC, that examine the effectiveness of sanctions in achieving broad policy goals. According to agency officials, an NSC-led process allows the U.S. government to draw on multiple agencies’ inputs and perspectives, and to consider these issues in the larger policy context, given that sanctions are often only one element of broader government-wide strategies to achieve U.S. policy goals. We found strong evidence—based on studies examining factors that contributed to the effectiveness of sanctions in changing targeted countries’ behavior—that sanctions have been more effective when implemented through an international organization, or when targeted countries had some existing dependency on or relationship with the United States. We also found strong evidence—based on studies examining factors that increased the economic impact of sanctions on targeted countries—that sanctions imposed through an international organization were associated with greater impact. In addition, we found strong evidence that the economic impact of sanctions has generally been greater when they were more comprehensive in scope or severity. Sanctions may also have unintended consequences for targeted countries, such as negative impacts on human rights or public health. In some studies, larger economic impacts were associated with more unintended consequences, suggesting an important policy trade-off. Some aspects of U.S. sanctions policy, such as targeted sanctions, were generally not analyzed separately in the studies we reviewed, which could reduce the studies’ applicability to contemporary policymaking. We found strong evidence, based on studies examining factors that contributed to the effectiveness of sanctions in changing behavior, that sanctions have been more effective when they were implemented through an international organization (e.g., the United Nations) or when the target had some existing dependency on or relationship with the United States (e.g., U.S. foreign aid, military support or alliance, or relatively large bilateral trade relationship). Studies using different methods, datasets, and time periods consistently found that the United States was more likely to achieve its sanctions goals when an international organization was involved or when the target had some existing dependency on or relationship with the United States. We found some evidence, based on a smaller number of studies, that sanctions have been more effective when the target state had low per- capita income, when a country’s threat of imposing sanctions was assessed to be credible, or when sanctions imposed relatively high costs on the target state. For example, one study found that the likelihood of the target’s acquiescing to all of the sanctioning country’s demands increased when sanctions were imposed on a target with low per-capita income. Another study found that targets were more likely to acquiesce in response to threatened sanctions when the United States had not backed down against a resisting target recently. A third study found that more-severe sanctions increased the likelihood that the sanctioning country achieved more of its goals, suggesting that sanctions imposing relatively high costs have been more effective. Our review also suggests that in some circumstances, the risk of sanctions has deterred states from undertaking activities that would likely have resulted in the imposition of sanctions. Factors that have increased the measured effectiveness of sanctions may also increase their deterrent effect. For example, two studies found that the greater the trade flows between the target state and the sanctioning country, the greater the likelihood of sanctions’ success. A separate study demonstrated that this same dependency—greater trade between the target and the United States—led to greater deterrence of nuclear proliferation. More generally, states are likely to consider the risks associated with undertaking activities that could lead to the imposition of economic sanctions, among other factors. These risks include the likelihood of sanctions being imposed or removed, the states’ vulnerabilities to the different types and amounts of pressure that could result from sanctions, and the consequences that the states would experience if sanctions were imposed. See the text box for more detail on the potential risks that states that could be the target of sanctions might consider. (The text box is intended to provide a more general framework for understanding how states may anticipate and respond to sanctions; it reflects, but is not limited to, the specific factors included in the studies we reviewed.) Risk Framework for States That May Be Targets of Economic Sanctions Likelihood of sanctions’ being imposed or removed. States that may be targets of sanctions may assess the credibility of any explicit threats to impose or maintain sanctions and the credibility of any assurances that sanctions will be removed when the activity that motivated the imposition of sanctions ceases. Vulnerabilities to potential pressure from sanctions. States that may be targets of sanctions may assess whether the benefits of withstanding pressure that could result from the sanctions exceed the costs. For example, states may be concerned that higher economic costs from sanctions could be associated with greater impact on the material wellbeing of individuals and firms. Higher economic costs could also make it more difficult to compensate those affected by the sanctions—and those costs could be especially burdensome in states with low per-capita income. However, states likely consider not only the costs from sanctions but also the extent to which they might over time avoid or adapt to these costs. For example, if potential sanctions are likely to disrupt trade and investments from major commercial partners, states that are potential targets may examine whether developing or expanding relationships with third parties could mitigate the loss of these economic relationships. Sanctions imposed via an international organization (e.g., a multilateral approach associated with the United Nations) may make it more difficult for targets to avoid or adapt to sanctions—for example, by finding alternative commercial partners—and may signal a more robust international consensus regarding the objectives of the sanctions. Consequences if sanctions are imposed. States that may be targets of sanctions may assess the direct financial impact as well as future diplomatic, political, or security implications of the potential sanctions. That is, before engaging in activities that could trigger sanctions, states that depend on the United States may consider the possible impact of their actions on their future relationships with the United States in other areas, including military cooperation or the provision of aid. Conversely, states that are less dependent on the United States might anticipate fewer ongoing benefits from acquiescing to U.S. demands. Two important types of U.S. sanctions—targeted sanctions and secondary sanctions—were present during the time periods covered by the studies we reviewed. However, the studies generally did not account differently for these two sanctions types than for non-targeted and primary sanctions, respectively. As a result, the studies generally did not reflect differences between the effectiveness of these types of sanctions. This limitation of the available studies could reduce the applicability of this research to contemporary policymaking. Targeted sanctions. Targeted sanctions restrict transactions of and with specific entities and individuals, such as those who may have influence with a state’s government. In response to such sanctions, the targeted actors may in turn influence their government to change its behavior. Targeted sanctions seek to minimize impact on society at large and maintain most trade relationships with non-targeted actors in the country. However, our interpretation of studies of sanctions suggests that the targeted actors may use their influence with their government to extract concessions that compensate them for the impact of sanctions, which could limit the effectiveness of certain targeted sanctions. Secondary sanctions. Secondary sanctions, also known as supplementary sanctions, target third-party actors doing business with, supporting, or facilitating targeted regimes, persons, and organizations. From the perspective of a third-party actor, secondary sanctions likely increase the risk involved in commercially partnering with primary sanctions targets. Thus, secondary sanctions, especially those implemented by a country as large and interconnected as the United States, may make it more difficult for primary targets to avoid or adapt to sanctions. Our interpretation of studies of sanctions suggests that the effects of secondary sanctions imposed by the United States could be similar to the effects of sanctions imposed with a large or multilateral coalition through an international organization, since sanctions imposed through an international organization also increase the difficulty of finding alternative commercial partners. However, our interpretation of the studies suggests that if secondary sanctions were imposed without an international organization they would be unlikely to signal a robust international consensus regarding the sanctions’ objectives, and thus may not as effectively deter their targets, or third parties, from developing alternative commercial arrangements. While the studies we reviewed generally did not separately analyze targeted or secondary sanctions, states remain likely to consider the risks associated with undertaking activities that could lead to the imposition of these sanctions and sanctions in general. With respect to targeted and secondary sanctions, states—both primary targets and third-country actors—are likely to consider, among other things, the risks associated with undertaking activities that could result in targeted or secondary sanctions and the consequences they would experience if targeted or secondary sanctions were imposed. We found strong evidence, based on studies examining factors that increased the economic impact of sanctions, that sanctions’ economic impacts on targets have generally been greater when the sanctions were more comprehensive or were imposed through an international organization. For example, one study found that UN sanctions had an adverse impact on target countries’ economic growth and that this impact increased with more-comprehensive sanctions. Another study found that imposing sanctions along with other countries led to reductions in both U.S. and other Group of Seven countries’ bilateral trade with targeted countries. Some other studies suggest that sanctions may also have unintended consequences. For example, some studies suggest that sanctions have had a negative impact on human rights, the status of women, public health, or democratic freedoms in target countries. In addition, more frequent and comprehensive use of sanctions could encourage sanctions targets, potential targets, and their commercial partners to develop trade and financial ties that are less dependent on the United States. The extent of these unintended consequences can be proportionate to the comprehensiveness or economic impact of sanctions. As a result, the cost or comprehensiveness of sanctions could entail important policy trade-offs—that is, higher economic costs may be more coercive but may also yield greater unintended consequences. For example, two academic studies, based on data from sanctions implemented between 1972 and 2000, found that the negative impact of sanctions on democratic and press freedoms was generally greater with more comprehensive sanctions. Two other studies found that the public health effect of sanctions depended on the costliness or economic impact of the sanctions. Targeted sanctions could, in principle, reduce the unintended consequences of sanctions by reducing economic impacts on society at large. We provided a draft of this report to Treasury, State, and Commerce for review and comment. We received technical comments from all three agencies, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Secretary of State, the Secretary of Commerce, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612, or GianopoulosK@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our objectives were to (1) describe how the roles of the Departments of the Treasury (Treasury), State (State), and Commerce (Commerce) in implementing U.S. sanctions authorities are identified; (2) examine the extent to which U.S. agencies assess the effectiveness of sanctions; and (3) identify factors that have been shown by publicly available studies to contribute to the effectiveness of economic sanctions. To describe how Treasury’s, State’s, and Commerce’s roles in implementing U.S. sanctions authorities are identified, we reviewed legal authorities, including statutes and executive orders, that authorize various sanctions programs and interviewed relevant agency officials. We also discussed with Treasury, State, and Commerce officials the interagency process used in determining sanctions roles. To examine the extent to which U.S. agencies assess the effectiveness of sanctions, we interviewed officials and reviewed documents from Treasury, State, Commerce, and the Office of the Director of National Intelligence. We also obtained and reviewed agency assessments for sanctions programs related to Burundi, North Korea, Russia, and Somalia. We selected these country-based sanctions programs to obtain at least one country program with more than 200 current sanctions designations and at least one country program with fewer than 200 but more than 10 current sanctions designations as of September 2018. In addition, we included a mixture of different-size economies, based on annual gross domestic product (GDP). We used the agencies’ assessments of the selected programs to gain insight into the types of analysis conducted. To identify factors that have been shown by publicly available studies to contribute to the effectiveness of economic sanctions, we conducted a literature search for studies that examined: factors that contributed to the effectiveness of economic sanctions in changing behavior, and factors that increased the economic impact of sanctions. To identify existing studies, we used three methods. First, we conducted searches of various databases, which produced 280 studies. Second, we conducted snowball sampling, by identifying additional studies cited in papers we had already identified. Third, we asked several academic experts to validate our list of studies and recommend any additional studies that they felt met our criteria. To focus on recent research on the factors that contributed to the effectiveness or economic impact of economic sanctions and to target articles for detailed review, we included studies that met the following criteria: The study evaluated the factors that contributed to the effectiveness or economic impact of sanctions. The study included quantitative analysis of research data, which aggregated and identified patterns across many sanctions episodes. The study was published in a peer-reviewed journal or was an academic working paper. The study included data on U.S.-imposed bilateral or multilateral sanctions but may also have included sanctions imposed by other countries. The study was in English. The study was published from 2004 through October 2018. As an additional date restriction, we only included studies with at least some data from 2000 through October 2018, though the study could have included earlier data as well, in order to improve the likely relevance of the research. The publication date restriction made it more likely that included studies would be cognizant of an important source of bias in earlier sanctions research. Prior to 2004, researchers tended to examine the impact of implemented sanctions and generally excluded cases where the threat of sanctions might have led a target to change their behavior prior to implementation. More generally, observed outcomes of implemented economic sanctions are not representative of the range of circumstances in which sanctions could be imposed, threatened, or useful for deterrence, and as a result these observed outcomes tend to understate the effectiveness of economic sanctions. Finally, to select the studies to be included in our in-depth review, we evaluated them to determine whether they met additional criteria for methodological soundness. We assessed whether the studies used and clearly described appropriate statistical methods to adjust, or control, for factors that could influence the effectiveness or economic impact of sanctions. Additionally, we included only papers that ascribed statistical precision to modeled estimates. To validate the studies we selected for in-depth review, we requested suggestions regarding our list of studies from the following academic experts: Daniel W. Drezner, Bryan R. Early, and T. Clifton Morgan. We identified these researchers on the basis of the relevance of their publications to our objectives, the methodological impact of their contributions to the literature, and the number of citations of any relevant publications since 2009. Applying the selection criteria and the criteria for methodological soundness and incorporating the academic experts’ suggestions resulted in a list of 17 sufficiently rigorous studies, all of which had appeared in peer-reviewed journals. Ten studies were relevant to the factors that contributed to the effectiveness of economic sanctions and seven studies were relevant to the factors that increased the economic impact of sanctions. To obtain relevant context and background, we also examined additional studies related to the factors that contributed to the effectiveness of economic sanctions. These studies did not meet our criteria for inclusion in our in-depth review but provided insight into issues related to the analysis of effectiveness of sanctions and potential unintended consequences of sanctions. All of the studies that met the criteria for our in-depth review, as well as others we cited, are included in appendix II. To review the 17 studies we selected, we used a data collection instrument (DCI) designed to record each study’s research methodology, including its data, outcome measures, control variables, limitations, and analytic techniques and to summarize its major findings. Analysts then independently reviewed the studies and the information captured in the DCIs, reconciling any differences in their assessments through discussion. Next, we summarized the findings and categorized and aggregated the factors relevant to the effectiveness or economic impact of sanctions. We also shared a summary of our initial findings with the academic experts, who generally concurred with our findings. We characterized factors as being supported by “strong evidence” for the purposes of our review only if at least four studies—including more than half of studies that included this factor—found it to have a statistically significant effect and no studies found a statistically significant effect with the opposite sign. We characterized factors as being supported by “some evidence” for the purposes of our review only if at least two studies— including at least half of studies that included this factor—found it to have a statistically significant effect and no studies found a statistically significant effect with the opposite sign. The studies we examined varied in the quality of their methodologies, and as a result, we could not confidently report on precise estimates of the impact of different factors on the effectiveness or economic impact of sanctions. While the statistical models used in the studies we reviewed controlled for factors that could influence the success or failure of sanctions in different circumstances, these models are also subject to some biases and imperfections. For example, studies may not have accounted for all factors that might influence the success of sanctions or may not have recognized or controlled for selection biases that influenced when and how sanctions were imposed. Finally, sanctions datasets include variables for which researchers exercised varying degrees of judgment to code accurately and consistently and which therefore may be measured with imprecision or error. We conducted this performance audit from May 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Bapat, Navin A., Tobias Heinrich, Yoshiharu Kobayashi, and T. Clifton Morgan. “Determinants of Sanctions Effectiveness: Sensitivity Analysis Using New Data.” International Interactions, vol. 39, no. 1 (2013): pp. 79- 98. Bapat, Navin A., and T. Cliff Morgan. “Multilateral Versus Unilateral Sanctions Reconsidered: A Test Using New Data.” International Studies Quarterly, vol. 53, no. 4 (2009): pp. 1075-1094. Biglaiser, Glen, and David Lektzian. “The Effect of Sanctions on U.S. Foreign Direct Investment.” International Organization, vol. 65, no. 3 (2011): pp. 531-551. Caruso, Raul. “The Impact of International Economic Sanctions on Trade: Empirical Evidence over the Period 1960-2000.” Rivista Internazionale di Scienze Sociali, vol. 113, no. 1 (2005): pp. 41-66. Early, Bryan R. “Unmasking the Black Knights: Sanctions Busters and Their Effects on the Success of Economic Sanctions.” Foreign Policy Analysis, vol. 7, no. 4 (2011): pp. 381-402. Early, Brian R., and Robert Spice. “Economic Sanctions, International Institutions, and Sanctions Busters: When Does Institutionalized Cooperation Help Sanctioning Efforts?” Foreign Policy Analysis, vol. 11, no. 3 (2015) pp. 339-360. Hatipoglu, Emre, and Dursun Peksen. “Economic Sanctions and Banking Crises in Target Economies.” Defence and Peace Economics, vol. 29, no. 2 (2018): pp. 171-189. Krustev, Valentin L., and T. Clifton Morgan. “Ending Economic Coercion: Domestic Politics and International Bargaining.” Conflict Management and Peace Science, vol. 28, no. 4 (2011): pp. 351-376. Lektzian, David, and Dennis Patterson. “Political Cleavages and Economic Sanctions: The Economic and Political Winners and Losers of Sanctions.” International Studies Quarterly, vol. 59, no. 1 (2015): 46-58. Major, Solomon. “Timing Is Everything: Economic Sanctions, Regime Type, and Domestic Instability.” International Interactions, vol. 38, no. 1 (2012): pp. 79-110 Miller, Nicholas L. “The Secret Success of Nonproliferation Sanctions.” International Organization, vol. 68, no. 4 (2014): pp. 913-944. Neuenkirch, Matthias, and Neumeier, Florian. “The Impact of UN and US Economic Sanctions on GDP Growth.” European Journal of Political Economy, vol. 40, part A, (2015): pp. 110-125. Nooruddin, Irfan, and Autumn Lockwood Payton. “Dynamics of Influence in International Politics: The ICC, BIAs, and Economic Sanctions.” Journal of Peace Research, vol. 47, no. 6 (2010): pp. 711–721. Peksen, Dursun. “Autocracies and Economic Sanctions: The Divergent Impact of Authoritarian Regime Type on Sanctions Success.” Defence and Peace Economics, Vol. 30, No. 3 (2017): pp. 253-268. Peksen, Dursun and Byunghwan Son. “Economic Coercion and Currency Crises in Target Countries.” Journal of Peace Research, vol. 52, no. 4 (2015): pp. 448-462. Peterson, Timothy M. “Sending a Message: The Reputation Effect of US Sanction Threat Behavior.” International Studies Quarterly, vol. 57, no. 4 (2013): pp. 672-682. Shin, Geiguen, Seung-Whan Choi, and Shali Luo. “Do Economic Sanctions Impair Target Economies?” International Political Science Review, vol. 37, no. 4 (2016): pp. 485-499. Allen, Susan Hannah, and David J. Lekztian. “Economic Sanctions: A Blunt Instrument?” Journal of Peace Research, vol. 50, no. 1 (2013): pp. 121-135. Drezner, Daniel W. “Sanctions Sometimes Smart: Targeted Sanctions in Theory and Practice.” International Studies Review, vol. 13, no. 1 (2011): pp. 96-108. Drezner, Daniel W. “The Hidden Hand of Economic Coercion.” International Organization, vol. 57, no. 3 (2003): pp. 643-659. Drury, A. Cooper, and Dursun Peksen. “Women and Economic Statecraft: The Negative Impact Economic Sanctions Visit on Women.” European Journal of International Relations, vol. 20, no. 2 (2014): pp. 463-490. Forrer, John. “Economic Sanctions: Sharpening a Vital Foreign Policy Tool.” Atlantic Council Issue Brief. Washington, D.C.: Atlantic Council, June 2017. Harrell, Peter. “Is the U.S. Using Sanctions Too Aggressively? The Steps Washington Can Take to Guard Against Overuse.” Foreign Affairs. September 11, 2018. Licht, Amanda A. “Hazards or Hassles: The Effect of Sanctions on Leader Survival.” Political Science Research and Methods, vol. 5, no.1 (2017): pp. 143-161. Marinov, Nikolay. “Do Economic Sanctions Destabilize Country Leaders?” American Journal of Political Science, vol. 49, no. 3 (2005): pp. 564-576. Peksen, Dursun. “Coercive Diplomacy and Press Freedom: An Empirical Assessment of the Impact of Economic Sanctions on Media Openness.” International Political Science Review, vol. 31, no. 4 (2010): pp. 449-469. Peksen, Dursun. “Economic Sanctions and Human Security: The Public Health Effect of Economic Sanctions.” Foreign Policy Analysis, vol. 7, no. 3 (2011): pp. 237-251. Peksen, Dursun, and A. Cooper Drury. “Coercive or Corrosive: The Negative Impact of Economic Sanctions on Democracy.” International Interactions, vol.36, no. 3 (2010): pp. 240-264. Wood, Reed M. “‘A Hand upon the Throat of the Nation’: Economic Sanctions and State Repression, 1976–2001.” International Studies Quarterly, vol. 52, no. 3 (2008): pp. 489-513. In addition to the contact named above, Drew Lindsey (Assistant Director), Michael Maslowski (Analyst in Charge), Eugene Beye, Nisha Rai, Michael Hoffman, Reid Lowe, Christopher Keblitis, Grace Lui, Justin Fisher, Leia Dickerson, Michael Simon, and Julia Robertson made key contributions to this report.", "summary": "The United States maintains dozens of economic sanctions programs to counteract activities that threaten U.S. national interests. There are currently 20 country-based or country-related sanctions programs, according to lists of sanctions programs published by Treasury and State (see map). Additional countries may also be affected by sanctions programs that target entities regardless of their geographic location, such as counter-narcotics sanctions. Treasury, State, and Commerce, among other agencies, coordinate to implement these programs. Sanctions may place restrictions on a country's entire economy, targeted sectors of the economy, or individuals or corporate entities. Reasons for sanctions range widely, including support for terrorism, narcotics trafficking, weapons proliferation, and human rights abuses. Economic restrictions can include, for example, denying a designated entity access to the U.S. financial system, freezing an entity's assets under U.S. jurisdiction, or prohibiting the export of restricted items. GAO was asked to review issues related to the implementation and effectiveness of economic sanctions. Among other things, this report (1) examines the extent to which U.S. agencies assess the effectiveness of sanctions, and (2) identifies factors that have been shown by publicly available studies to contribute to the effectiveness of economic sanctions. GAO reviewed documents and interviewed officials at Treasury, State, and Commerce and in the U.S. Intelligence Community. GAO also reviewed academic studies that used rigorous statistical methods to analyze the impact and effectiveness of economic sanctions across many sanctions programs. The Departments of the Treasury (Treasury), State (State), and Commerce (Commerce) each undertake efforts to assess the impacts of specific sanctions on the targets of those sanctions. For example, Treasury and State both analyze or compile information on sanctions programs' impacts, such as on a target country's economy. In addition, Commerce assesses prospective impacts of some sanctions on targeted countries and others. According to Treasury and State officials, the agencies also use Intelligence Community assessments to gauge sanctions' impacts. However, agency officials cited several difficulties in assessing sanctions' effectiveness in meeting broader U.S. policy goals, including challenges in isolating the effect of sanctions from other factors as well as evolving foreign policy goals. According to Treasury, State, and Commerce officials, their agencies have not conducted such assessments on their own. However, they stated that agency assessments of sanctions' impacts often contribute to broader interagency discussions that examine the effectiveness of sanctions in achieving policy goals. The academic studies GAO reviewed suggest that several factors have contributed to more-effective sanctions. Studies examining factors that contribute to the effectiveness of sanctions in changing targeted countries' behavior provided evidence that sanctions have been more effective when (1) they were implemented through an international organization (e.g., the United Nations) or (2) the targeted countries had some existing dependency on, or relationship with, the United States, such as a trade or military relationship. In addition, studies examining factors that increased sanctions' economic impact provided evidence that the impact has generally been higher when the sanctions were more comprehensive in scope or severity, or—similar to the findings on effectiveness in changing behavior—were imposed through an international organization. Sanctions may also have unintended consequences for targeted countries, such as negative impacts on human rights or public health. In some studies, larger economic impacts were associated with more unintended consequences.", "document_type": "gao"}
{"report": "Medicare and Medicaid FFS are federal health care programs, though there are certain distinctions between the programs’ coverage and financing. Medicare coverage policies are generally established at the national level, and the program directly pays providers for services rendered. Medicaid is a federal-state program, and states are provided flexibility to design their coverage policies. State Medicaid agencies pay providers for services rendered, and the federal government and states share in the financing of the program, with the federal government matching most state expenditures. The Improper Payments Information Act of 2002 (IPIA), as amended, requires federal executive branch agencies to report a statistically valid estimate of the annual amount of improper payments for programs identified as susceptible to significant improper payments. To accomplish this, agencies follow guidance for estimating improper payments issued by OMB. According to the HHS-OIG, which conducts annual compliance reviews and regularly reviews the estimation methodology for both the Medicare FFS and Medicaid improper payment measurement programs, the methodology for both programs’ estimates comply with federal improper payment requirements. To estimate improper payments in Medicare and Medicaid FFS, respectively, CMS’s CERT and PERM contractors randomly sample and manually review medical record documentation associated with FFS claims for payment from providers, also known as medical reviews. The CERT and PERM programs project the improper payments identified in the sample to all FFS claims to estimate improper payment amounts and rates for the programs nationally for a given fiscal year. For Medicare, the CERT contractor conducted medical reviews on about 50,000 Medicare claims in fiscal year 2017. For Medicaid, the PERM contractor conducted medical reviews on nearly 31,000 Medicaid claims across fiscal years 2015, 2016, and 2017 to estimate fiscal year 2017 improper payments. Although IPIA, as amended, only requires agencies to develop one improper payment estimate for each identified program, both the CERT and PERM programs also estimate national service-specific improper payment amounts and rates to identify services at high risk for improper payment. Additionally, the PERM program estimates state-level improper payment rates based on the amounts of improper payments identified through medical reviews in each state. The CERT and PERM contractors conduct medical reviews to determine whether claims were paid or denied properly in accordance with program coverage policies—including coverage policies based on statutes, regulations, other CMS coverage rules, and each state’s coverage policies in the case of Medicaid. To perform medical reviews, trained clinicians review documentation—such as progress notes, plans of care, certificates of medical necessity, and physician orders for services—to ensure that claims meet program coverage policies. In general, Medicare and Medicaid documentation requirements define the documentation needed to ensure that services are medically necessary and demonstrate compliance with program coverage policies. For example, Medicare home health services must be supported by documentation demonstrating compliance with the coverage policy that beneficiaries be homebound, among other requirements. Certain coverage policies and documentation requirements were implemented to help reduce the potential for fraud, waste, and abuse. For example, Medicare implemented a requirement that DME providers maintain documentation demonstrating proof of item delivery, to better ensure program integrity. (Figure 1 presents an example of a progress note to support the medical necessity of Medicare home health services. See App. III for additional examples of provider documentation). The CERT and PERM contractors classify improper payments identified through medical review by the type of payment error. Two types of errors are related to documentation—no documentation and insufficient documentation. No documentation: Improper payments in which providers fail to submit requested documentation or respond that they do not have the requested documentation. Insufficient documentation: Improper payments in which providers submit documentation that is insufficient to determine whether a claim was proper, such as when there is insufficient documentation to determine if services were medically necessary, or when a specific, required documentation element, such as a signature, is missing. In fiscal year 2017, insufficient documentation comprised the majority of estimated FFS improper payments in both Medicare and Medicaid, with 64 percent of Medicare and 57 percent of Medicaid medical review improper payments. Improper payments stemming from insufficient documentation in Medicare FFS increased substantially starting in 2009, while insufficient documentation in Medicaid has remained relatively stable since 2011 (see Fig. 2). CMS has attributed the increase in Medicare insufficient documentation since 2009 in part to changes made in CERT review criteria. Prior to 2009, CERT medical reviewers used “clinical inference” to determine that claims were proper even when specific documentation was missing if, based on other documentation and beneficiary claim histories, the reviewers could reasonably infer that the services were provided and medically necessary. Beginning with CMS’s fiscal year 2009 CERT report, in response to 2008 HHS-OIG recommendations, CMS revised the criteria for CERT medical reviews to no longer allow clinical inference and the use of claim histories as a source of review information. More recent policy changes that added to Medicare documentation requirements may have also contributed to the increase in insufficient documentation in Medicare FFS. Medicare’s CERT and Medicaid’s PERM contractors make multiple attempts to contact providers to request medical record documentation for medical reviews, and review all documentation until they must finalize the FFS improper payment estimate. The CERT and PERM contractors allow providers 75 days to submit documentation, though providers can generally submit late documentation up to the date each program must finalize its improper payment estimate, known as the cut-off date (See Fig. 3.). Both programs also contact providers to subsequently request additional documentation if the initial documentation submitted by the providers does not meet program requirements. Initial documentation request: The CERT and PERM contractors make initial requests for documentation by sending a letter and calling the provider. After the initial provider request, if there is no response, the contractors contact the provider at least three additional times to remind them to submit the required documentation. If there is no response, the claim is determined to be improper due to no documentation. Claims are also classified as improper due to no documentation when the provider responds but cannot produce the documentation, such as providers that do not have the beneficiary’s documentation or records for the date of service, among other reasons (see Table 1). For referred services, such as home health, DME, and laboratory services, the CERT contractor also conducts outreach to referring physicians to request documentation. For example, for a laboratory claim, the CERT contractor may contact the physician who ordered the laboratory test to request associated documentation, such as progress notes. Conversely, the PERM contractor told us they generally do not contact referring physicians to request documentation. Subsequent documentation request: If a provider initially submits documentation that is insufficient to support a claim, then the CERT and PERM contractors subsequently request additional documentation. In fiscal year 2017, of the 50,000 claims in the CERT sample, the contractor requested additional documentation from 22,815 providers. Providers did not submit additional documentation to sufficiently support 56 percent of the associated claims. For the 3 years that comprise the 2017 Medicaid improper payment rate, of the nearly 31,000 claims in the PERM sample, the contractor requested additional documentation for 5,448, and providers did not submit additional documentation to sufficiently support about 8 percent of the 5,448 claims. In addition to having similar outreach to providers for obtaining documentation, the CERT and PERM contractors also have processes to refer suspected fraud to the appropriate program integrity entity, to ensure the accuracy of medical reviews, and to allow providers to dispute improper payment determinations. Suspected fraud: When CERT and PERM contractors identify claims with evidence of suspected fraud, they are required to refer the claims to other program integrity entities that are responsible for investigating suspected fraud. CERT and PERM contractor officials said that in 2017, the CERT contractor referred 35 claims, and the PERM contractor did not make any referrals. Interrater reliability (IRR) reviews: As a part of their medical review processes, both the CERT and PERM contractors conduct IRR reviews, where two reviewers conduct medical reviews on the same claim and compare their medical review determinations. These IRR reviews ensure the consistency of medical review determinations and processes for resolving differences identified through the IRR reviews. CMS staff said that they also review a sample of the CERT and PERM contractors’ payment determinations to ensure their accuracy. CERT: The contractor performs IRR reviews for at least 300 claims each month, including claims with and without improper payment determinations. PERM: The contractor conducts IRR reviews of all improper payment determinations, except improper payments due to no documentation, and 10 percent of all correctly paid claims in the sample, which combined was about 3,600 claims for the fiscal year 2017 national improper payment rate. Disputing improper payment determinations: Both CERT and PERM contractors have processes in place for disputing the CERT or PERM contractor’s improper payment determinations. These processes involve reviewing the claim, including any newly submitted documentation, and may result in upholding or overturning the initial improper payment determination. Improper payment determinations that are overturned prior to the CERT and PERM contractors’ cut-off dates are no longer considered improper, and estimated improper payment amounts and rates are adjusted appropriately. CERT: Medicare Administrative Contractors, which process and pay claims, may dispute the CERT contractor’s improper payment determinations first with the CERT contractors and then, if desired, with CMS. Additionally, Medicare providers can appeal the CERT contractor’s improper payment determinations through the Medicare appeals process. PERM: State Medicaid officials may dispute the PERM contractor’s improper payment determinations first with the PERM contractor and then, if desired, with CMS. Providers are not directly involved in this process; instead, providers can contact the state to appeal the improper payment determination. We found that Medicare, relative to Medicaid, had a higher estimated FFS improper payment rate primarily due to insufficient documentation in fiscal year 2017. According to CMS data, across all services in fiscal year 2017, the rate of insufficient documentation was 6.1 percent for Medicare and 1.3 percent in Medicaid, substantially greater than the difference in rates for all other types of errors, which were 3.4 and 1.0 percent, respectively. For home health, DME, and laboratory services, the insufficient documentation rate was at least 27 percentage points greater for Medicare than for Medicaid, and for hospice services, the rate was 9 percentage points greater (see Fig. 4). Differences between Medicare and Medicaid coverage policies and documentation requirements likely contributed to the substantial variation in the programs’ insufficient documentation rates for the services we examined. Among the services we examined, there are four notable differences in coverage policy and documentation requirements that likely affected how the programs conducted medical reviews: face-to-face examinations; prior authorization; signature requirements; and documentation from referring physicians for referred services, as discussed below. Face-to-face examinations. In part to better ensure program integrity, the Patient Protection and Affordable Care Act established a requirement for referring physicians to conduct a face-to-face examination of beneficiaries as a condition of payment for certain Medicare and Medicaid services. States were still in the process of implementing the policies for Medicaid in fiscal year 2017. include narrative information that sufficiently supported that the beneficiary had a life expectancy of less than 6 months. include the certification date span. documentation supporting that the referring physician conducted an examination when certifying the medical necessity of the service. Hospice providers must submit documentation of a face-to-face examination when recertifying the medical necessity of hospice services for beneficiaries who receive care beyond 6 months after their date of admission. (See sidebar for examples of insufficient documentation in Medicare hospice services.) CMS officials told us that documentation requirements for the face-to-face examination policy for home health services in particular led to an increase in insufficient documentation. When initially implemented in April 2011, home health providers had to submit separate documentation from the referring physician detailing the examination and the need for home health services. Beginning January 2015, CMS changed the requirement to allow home health providers to instead use documentation from the referring physician, such as progress notes, to support the examinations. CMS and several stakeholders attributed recent decreases in the home health improper payment rate to the amended documentation requirement (see Fig. 5). agency did not apply to the sampled day of care associated with the claim. health and DME services in Medicaid in 2016; however, the requirement likely did not apply to many claims subject to fiscal year 2017 PERM medical reviews. Medicaid does not have a face-to-face policy for hospice services, and most states we interviewed did not have such policies. (See sidebar for examples of insufficient documentation in Medicaid.) Prior authorization. Medicare does not have the same broad authority as state Medicaid agencies to implement prior authorization, which can be used to review documentation and verify the need for coverage prior to services being rendered. State Medicaid agencies we spoke with credit prior authorization with preventing improper payments from being paid in the first place. CMS has used prior authorization in Medicare for certain services through temporary demonstration projects and models, as well as one permanent program. In April 2018, we found that savings from a series of Medicare temporary demonstrations and models that began in 2012 could be as high as about $1.1 to $1.9 billion as of March 2017. We recommended that CMS take steps, based on its evaluations of the demonstrations, to continue prior authorization. All six of our selected states use prior authorization in Medicaid for at least one of the four services we examined. In particular, all six selected states require prior authorization for DME, and five require prior authorization for home health. Officials from several states noted that they often apply prior authorization to services at high risk for improper payments, and most told us that prior authorization screens potential improper payments before services are rendered. We did not evaluate the effectiveness of states’ use of prior authorization, or review the documentation required by states for prior authorization. (See Fig 6 for an example state Medicaid prior authorization form.) Physician signatures: While both Medicare and state Medicaid agencies require signatures on provider documents to ensure their validity, Medicare has detailed standards for what constitutes a valid signature. physician did not support the medical necessity for the specific type of catheter ordered. variety of situations. For example, illegible signatures and initials on their own are generally invalid, though they are valid when over a printed name. Examples of insufficient documentation in Medicare laboratory Documentation from the referring physician did not support the order or an intent to order the billed laboratory tests. In Medicaid, PERM contractor staff told us that state agencies generally have not set detailed standards for valid signatures, and that reviewers generally rely on their judgment to assess signature validity. Documentation from the referring physician did not support that the beneficiary’s currently has diabetes for a billed laboratory test for the management and control of diabetes. Documentation for referred services. Medicare requires documentation from referring physicians to support the medical necessity of the referred services that we examined—home health, DME, and laboratory services—but Medicaid generally does not require such documentation. Medicare generally requires documentation from the referring physician, such as progress notes, to support the medical necessity of referred services. CMS officials told us that Medicare requires such documentation from referring physicians to ensure that medical necessity determinations are independent of the financial incentive to provide the referred service, particularly as certain referred services are high risk for fraud, waste, and abuse. (See sidebar for examples of insufficient documentation in Medicare home health, DME, and laboratory services.) In Medicaid, documentation requirements to support the medical necessity of referred services are primarily established by states, and states generally do not require documentation, such as progress notes from referring physicians, to support medical necessity. Further, PERM contractor staff told us that they generally do not review such documentation when conducting medical reviews of claims for referred services. Officials from CMS, the CERT contractor, and provider associations told us that Medicare’s documentation requirements for referred services present challenges for providers of referred services to submit sufficient documentation since they are dependent on referring physician documentation to support medical necessity. Some officials further stated that referring physicians may lack incentive to ensure the sufficiency of such documentation, as they do not experience financial repercussions when payments for referred services are determined to be improper. Officials told us that: It is generally not standard administrative practice for laboratories or DME providers to obtain referring physician documentation, and referring physicians may not submit them when the referred services are subject to medical review. For example, laboratories generally render services based solely on physician orders for specific tests, and generally do not obtain associated physician medical records. Referring physicians may not document their medical records in a way that meets Medicare documentation requirements to support the medical necessity of referred services. Officials from a physician organization told us that physicians refer beneficiaries for a broad array of services, and face challenges documenting their medical records to comply with Medicare documentation requirements for various referred services. We previously reported on CMS provider education efforts and recommended that CMS take steps to focus education on services at high risk for improper payments and to better educate referring physicians on documentation requirements for DME and home health services. CMS agreed with and has fully addressed our recommendation. Medicare and Medicaid pay for many of the same services, to some of the same providers, and likely face many of the same underlying program risks. However, because of differences in documentation requirements between the two programs, the same documentation for the same service can be sufficient in one program but not the other. The substantial variation in the programs’ improper payment rates raise questions about how well their documentation requirements help in determining whether services comply with program coverage policies, and accordingly help identify causes of program risks. This is inconsistent with federal internal control standards, which require agencies to identify, analyze, and respond to program risks. CMS officials attributed any differences in the two programs’ documentation requirements to the role played by the states in establishing such requirements under Medicaid, and told us that they have not assessed the implications of how differing requirements between the programs may lead to differing assessments of the programs’ risks. CMS relies on improper payment estimates to help develop strategies to reduce improper payments, such as informing Medicare’s use of routine medical reviews, educational outreach to providers, and efforts to address fraud. Without a better understanding of how documentation requirements affect estimates of improper payments, CMS may not have the information it needs to effectively identify and analyze program risks, and develop strategies to protect the integrity of the Medicare and Medicaid programs. CMS’s Patients over Paperwork initiative is an ongoing effort to simplify provider processes for complying with Medicare FFS requirements, including documentation requirements. Although CMS officials said this initiative is intended to help providers meet documentation requirements in both Medicare and Medicaid, current efforts only address Medicare documentation requirements. As part of the initiative, CMS solicited comments from stakeholders through proposed rulemaking on documentation requirements that often lead to insufficient documentation, and CMS officials stated that they have met with provider associations to obtain feedback. The initiative is generally focused on reviewing documentation requirements the agency has the authority to easily update, namely requirements that are based on CMS coverage rules, as opposed to requirements based on statute. Through this initiative, CMS has clarified and amended several Medicare documentation requirements. For example, CMS clarified Medicare documentation requirements for DME providers to support proof of item delivery. As part of another initiative to examine insufficient documentation in Medicare, CMS found that 3 percent of improper payments due to insufficient documentation were clerical in nature in fiscal year 2018. For the CERT’s fiscal year 2018 medical reviews, the CERT contractor classified whether improper payments due to insufficient documentation were clerical in nature—meaning the documentation supported that the service was covered and necessary, had been rendered, and was paid correctly, but did not comply with all Medicare documentation requirements. Such errors would not result in an improper payment determination if the documentation had been corrected. For example, such clerical errors may involve missing documentation elements that may be found elsewhere within the medical records. According to CMS officials, the information gathered on clerical errors may inform efforts to simplify documentation requirements. Specifically, CMS plans to use this information to help identify requirements that may not be needed to demonstrate medical necessity or compliance with coverage policies. CMS said that it does not plan to engage in similar efforts to examine insufficient documentation errors in Medicaid because of challenges associated with variations in state Medicaid documentation requirements and the additional burden it would place on states. On a national basis, CMS’s PERM program generates statistically valid improper payment estimates for the Medicaid FFS program. At the state level, however, CMS officials told us that the PERM contractor’s medical reviews do not generate statistically generalizable information about improper payments by service type and, as a result, they do not provide robust state-specific information on the corrective actions needed to address the underlying causes of improper payments. According to CMS, the number of improper payments identified through medical reviews is too small to generate robust state-specific results. In fiscal year 2017, the PERM contractor identified 918 improper payments nationwide out of nearly 31,000 claims subjected to medical reviews. More than half of all states had 10 or fewer improper payments identified through medical reviews in fiscal year 2017, and these made up about 7 percent of total sample improper payments identified through medical reviews (see Table 2). According to CMS officials, estimating improper payments for specific service types within each state with the same precision as the national estimate would involve substantially expanding the number of medical reviews conducted and commensurately increasing PERM program costs. CMS officials also estimated federal spending on PERM Medicaid FFS medical reviews at about $8 million each year, which does not include state costs, the federal share of the state costs, or providers’ costs. Of our six selected states, officials from one state said that data on service-specific improper payment rates at the state level would be useful, though officials had reservations about increasing sample sizes because of the resources involved in doing so. CMS requires state Medicaid agencies to develop corrective actions to rectify each improper payment identified. However, since the Medicaid review sample in a state typically is not large enough to be statistically generalizable by service type, the identified improper payments may not be representative of the prevalence of improper payments associated with different services within the state. Accordingly, corrective actions designed to rectify specific individual improper payments may not address the most prevalent underlying causes of improper payments. For example, state Medicaid officials in four of our six states said that most improper payments identified through PERM medical reviews are unique one-time events. Federal internal control standards require agencies to identify and analyze program risks so they can effectively respond to such risks, and OMB expects agencies to implement corrective actions that address underlying causes of improper payments. Without estimates that provide information on the most prevalent underlying causes of improper payments within a state, particularly by service type, a state Medicaid agency may not be able to develop appropriate corrective actions or prioritize activities to effectively address program risks. Corrective actions that do not address the underlying causes of improper payments are unlikely to be an effective use of state resources. Increasing sample sizes of the PERM is one approach that could improve the usefulness of the medical reviews for states—but other options also exist. For example, PERM findings could be augmented with data from other sources—such as findings from other CMS program integrity efforts, state auditors, and HHS-OIG reports. States conduct their own program integrity efforts, including medical reviews, to identify improper payments and state Medicaid officials we spoke with in four of our six selected states said that they largely rely on such efforts to identify program risks. One state’s Medicaid officials said that state-led audits allow them to more effectively identify—and subsequently monitor—services that are at risk for improper payments in the state. CMS also could use data from other sources on state-specific program risks to help design states’ PERM samples. These options could help CMS and the states better identify the most prevalent causes of improper payments and more effectively focus corrective actions and program integrity strategies to address program risks. State Medicaid agencies may, but are not required to, determine whether providers included in the PERM sample are under fraud investigation and notify the PERM contractor. Under CMS policy, when a state notifies the PERM contractor of a provider under investigation, the contractor will end all contact with the provider to avoid compromising the fraud investigation, and the claim will be determined to be improper, due to no documentation. In fiscal year 2017, of the 328 Medicaid improper payments due to no documentation, 27 (8 percent) from five states, according to CMS, were because the provider was under fraud investigation. If a state Medicaid agency does not notify the PERM contractor about providers under fraud investigation, the PERM contractor will conduct its medical review, which involves contacting the provider to obtain documentation as a part of its normal process, and communicate about improper payment determinations. Contacting providers that are under fraud investigation as part of PERM reviews could interfere with an ongoing investigation, such as in the following ways we identified based on information from the Association of Certified Fraud Examiners and others. The contact by the PERM contractor to request documentation, although unrelated to the fraud investigation, may give the impression that the provider is under heightened scrutiny. This could prompt the provider to change its behavior, or to destroy, falsify, or create evidence. These actions could in turn disrupt or complicate law enforcement efforts to build a criminal or civil case. The PERM contractor’s communication about improper payment determinations may prompt states to conduct educational outreach to the provider about proper billing procedures. This may inadvertently change the billing practices of a fraudulent provider for whom law enforcement is trying to establish a pattern of behavior. We found that states may not have processes to determine whether providers included in the PERM sample are under fraud investigation. Of the six states we spoke with, officials from two states said they did not have a mechanism in place to identify providers under fraud investigation. However, it is a best practice for investigative and review entities to communicate and coordinate with one another to determine if multiple entities are reviewing the same provider and for investigators to work discreetly without disrupting the normal course of business, based on our analysis of information from the Association of Certified Fraud Examiners and others. Accordingly, investigators should be aware of other government entities that are in contact with providers under investigation, such as the PERM contractor, who may contact providers multiple times to request documentation, and refer identified improper payments for recovery. If multiple entities are reviewing the same provider, one entity may be directed to pause or cease its activities, such as a PERM medical review, to reduce the risk of compromising an active fraud investigation. CMS has stated that it is not the agency’s intention to negatively impact states’ provider fraud investigations and, therefore, it has provided states the option to notify the PERM contractor of any providers under investigation to avoid compromising investigations. However, CMS does not require states to determine whether providers under PERM medical reviews are also under fraud investigation, which creates the potential that PERM reviews could interfere with ongoing investigations. State Medicaid agencies may not have incentives to notify the PERM contractor of providers under fraud investigation, as doing so will automatically result in a no documentation error, which increases states’ improper payment rates. Medicaid officials from one state we spoke with said that while they check whether providers subject to PERM reviews are under investigation for fraud, they do not report these instances to the PERM contractor because the PERM contractor would find a no documentation error and the claim would be cited as improper, increasing the state’s improper payment rate. Officials from another state said this policy penalizes states, in the form of higher state-level improper payment rates that may reflect poorly on states. Additionally, officials from this state were reluctant to develop corrective actions for improper payments stemming from such no documentation errors. CMS and states need information about the underlying causes of improper payments to develop corrective actions that will effectively prevent or reduce future improper payments in Medicare and Medicaid FFS. The substantial variation in Medicare and Medicaid estimated improper payment rates for the services we examined raise questions about how well the programs’ documentation requirements ensure that services were rendered in accordance with program coverage policies. While our study focused on certain services with high rates of insufficient documentation, differences in documentation requirements between the programs may apply to other services as well. Without examining how the programs’ differing documentation requirements affect their improper payment rates, CMS’s ability to better identify and address FFS program risks and design strategies to assist providers with meeting requirements may be hindered. At the state level, PERM medical reviews do not provide robust information to individual states. CMS’s requirements to address individual improper payments may lead states to take corrective actions that may not fully address underlying causes of improper payments identified through medical review, and may misdirect state efforts to reduce improper payments. Absent a more comprehensive review of existing sources of information on the underlying causes of Medicaid improper payments, CMS and states are missing an opportunity to improve their ability to address program risks. In addition, the lack of a requirement for state Medicaid agencies to determine whether providers whose claims are selected for PERM medical reviews are also under fraud investigation risks compromising ongoing investigations. Further, citing such claims as improper payments in states’ estimated improper payment rates may discourage state Medicaid agencies from notifying the PERM contractor that a provider is under investigation. We are making the following four recommendations to CMS: The Administrator of CMS should institute a process to routinely assess, and take steps to ensure, as appropriate, that Medicare and Medicaid documentation requirements are necessary and effective at demonstrating compliance with coverage policies while appropriately addressing program risks. (Recommendation 1) The Administrator of CMS should take steps to ensure that Medicaid medical reviews provide robust information about and result in corrective actions that effectively address the underlying causes of improper payments. Such steps could include adjusting the sampling approach to reflect state-specific program risks, and working with state Medicaid agencies to leverage other sources of information, such as state auditor and HHS-OIG findings. (Recommendation 2) The Administrator of CMS should take steps to minimize the potential for PERM medical reviews to compromise fraud investigations, such as by directing states to determine whether providers selected for PERM medical reviews are also under fraud investigation and to assess whether such reviews could compromise investigations. (Recommendation 3) The Administrator of CMS should address disincentives for state Medicaid agencies to notify the PERM contractor of providers under fraud investigation. This could include educating state officials about the benefits of reporting providers under fraud investigation, and taking actions such as revising how claims from providers under fraud investigation are accounted for in state-specific FFS improper payment rates, or the need for corrective actions in such cases. (Recommendation 4) We provided a draft of this report to HHS for comment, and its comments are reprinted in appendix I. HHS also provided us with technical comments, which we incorporated in the report as appropriate. HHS concurred with our first recommendation that CMS institute a process to routinely assess and ensure that Medicare and Medicaid documentation requirements are necessary and effective. HHS stated that CMS’s Patients over Paperwork initiative is focused on simplifying Medicare documentation requirements and noted that for the Medicaid program, CMS will identify and share documentation best practices with state Medicaid agencies. CMS’s Patients over Paperwork initiative may help CMS streamline Medicare documentation requirements. However, we believe CMS should take steps to assess documentation requirements in both programs to better understand the variation in the programs’ requirements and their effect on estimated improper payment rates. Without an assessment of how the programs’ documentation requirements affect estimates of improper payments, CMS may not have the information it needs to ensure that Medicare and Medicaid documentation requirements are effective at demonstrating compliance and appropriately address program risks. HHS did not concur with our second recommendation that CMS ensure that Medicaid medical reviews provide robust information about and result in corrective actions that effectively address the underlying causes of improper payments. HHS noted that increasing the PERM sample size would involve increasing costs and state Medicaid agencies’ burden, and that incorporating other sources of information into the PERM sample design could jeopardize the sample’s statistical validity. HHS also commented that it already uses a variety of sources to identify and take corrective actions to address underlying causes of improper Medicaid payments. We acknowledge that increasing the sample size would increase the costs of the PERM medical review program, though the level of improper payments warrants continued action. Further, under the current approach, we found that CMS and state Medicaid agencies are expending time and resources developing and implementing corrective actions that may not be representative of the underlying causes of improper payments in their states. It is important that corrective actions effectively and efficiently address the most prevalent causes of improper payments, and our report presents options that could improve the usefulness of the PERM’s medical reviews—such as augmenting medical reviews with other sources of information during the development of corrective actions. We continue to believe that corrective actions based on more robust information would help CMS and state Medicaid agencies more effectively address Medicaid program risks. HHS concurred with our third and fourth recommendations that CMS minimize the potential for PERM medical reviews to compromise fraud investigations and address disincentives for state Medicaid agencies to notify the PERM contractor of providers under fraud investigation. In its comments HHS described the actions it has taken and is considering taking to implement these recommendations. We are sending copies of this report to appropriate congressional committees, to the Secretary of Health and Human Services, the Administrator of CMS, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114, or cosgrovej@gao.gov or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. During the period of our review, fiscal year 2017 data represented the most recent, complete data for both Medicare and Medicaid fee-for- service (FFS) estimated improper payment amounts and rates. As of March 2019, the Centers for Medicare & Medicaid Services published the fiscal year 2018 Medicare FFS Supplemental Improper Payment Data report, but had not published the 2018 Medicaid FFS Supplemental Improper Payment Data report. The Centers for Medicare & Medicaid Services estimated Medicare FFS spending of $389 billion, and $32 billion in improper payments. Table 3 below presents updated fiscal year 2018 data for the Medicare improper payment data by the services examined in our report. Medicare and state Medicaid agencies have released template medical record documentation, such as certificates of medical necessity and plans of care that providers may use to document information necessary to ensure compliance with coverage policies. This appendix presents examples of such templates. Figure 7 presents a Medicare template that referring physicians can use to certify beneficiary need for home health services. Figure 8 presents a Medicare template that referring physicians can use to certify beneficiary need for home oxygen supplies. Figure 9 presents a template from the Indiana Medicaid program that hospices may use to document beneficiary plans of care. In addition to the contact named above, Leslie V. Gordon (Assistant Director), Michael Erhardt (Analyst-in-Charge), Arushi Kumar, and Dawn Nelson made key contributions to this report. Also contributing were Sam Amrhein, Vikki Porter, and Jennifer Rudisill.", "summary": "In fiscal year 2017, Medicare FFS had an estimated $23.2 billion in improper payments due to insufficient documentation, while Medicaid FFS had $4.3 billion—accounting for most of the programs' estimated FFS medical review improper payments. Medicare FFS coverage policies are generally national, and the program directly pays providers, while Medicaid provides states flexibility to design coverage policies, and the federal government and states share in program financing. Among other things, GAO examined: (1) Medicare and Medicaid documentation requirements and factors that contribute to improper payments due to insufficient documentation; and (2) the extent to which Medicaid reviews provide states with actionable information. GAO reviewed Medicare and Medicaid documentation requirements and improper payment data for fiscal years 2005 through 2017, and interviewed officials from CMS, CMS contractors, and six state Medicaid programs. GAO selected the states based on, among other criteria, variation in estimated state improper payment rates, and FFS spending and enrollment. The Centers for Medicare & Medicaid Services (CMS) uses estimates of improper payments to help identify the causes and extent of Medicare and Medicaid program risks and develop strategies to protect the integrity of the programs. CMS estimates Medicare and Medicaid fee-for-service (FFS) improper payments, in part, by conducting medical reviews—reviews of provider-submitted medical record documentation to determine whether the services were medically necessary and complied with coverage policies. Payments for services not sufficiently documented are considered improper payments. In recent years, CMS estimated substantially more improper payments in Medicare, relative to Medicaid, primarily due to insufficient documentation (see figure). For certain services, Medicare generally has more extensive documentation requirements than Medicaid. For example, Medicare requires additional documentation for services that involve physician referrals, while Medicaid requirements vary by state and may rely on other mechanisms—such as requiring approval before services are provided—to ensure compliance with coverage policies. Although Medicare and Medicaid pay for similar services, the same documentation for the same service can be sufficient in one program but not the other. The substantial variation in the programs' improper payments raises questions about how well the programs' documentation requirements help identify causes of program risks. As a result, CMS may not have the information it needs to effectively address program risks and direct program integrity efforts. CMS's Medicaid medical reviews may not provide the robust state-specific information needed to identify causes of improper payments and address program risks. In fiscal year 2017, CMS medical reviews identified fewer than 10 improper payments in more than half of all states. CMS directs states to develop corrective actions specific to each identified improper payment. However, because individual improper payments may not be representative of the causes of improper payments in a state, the resulting corrective actions may not effectively address program risks and may misdirect state program integrity efforts. Augmenting medical reviews with other sources of information, such as state auditor findings, is one option to better ensure that corrective actions address program risks. GAO is making four recommendations to CMS, including that CMS assess and ensure the effectiveness of Medicare and Medicaid documentation requirements, and that CMS take steps to ensure Medicaid's medical reviews effectively address causes of improper payments and result in appropriate corrective actions. CMS concurred with three recommendations, but did not concur with the recommendation on Medicaid medical reviews. GAO maintains that this recommendation is valid as discussed in this report.", "document_type": "gao"}
{"report": "Priority Enforcement Program. Under PEP, which was in effect from January 5, 2015 until February 20, 2017, DHS personnel were directed to, among other things, prioritize the apprehension, detention, and removal from the United States of aliens who pose a threat to national security, border security, and public safety, including convicted felons. It further directed DHS personnel to prioritize for removal new immigration violators and those who had been issued a final order of removal on or after January 1, 2014 and to exercise prosecutorial discretion, as appropriate, in accordance with these priorities and existing guidance. A 2011 ICE memorandum identified factors to consider when exercising prosecutorial discretion, such as the length of the individual’s presence in the United States, whether the person or person’s immediate relative has served in the U.S. military, on the basis of humanitarian reasons such as personal or family illness, among other factors. Executive Order 13768. Executive order 13768, issued on January 25, 2017, focuses on immigration enforcement within the United States. Among other things, the executive order lays out the administration’s immigration enforcement priorities for removable aliens. Specifically, the executive order prioritizes for the removal from the United States aliens who are removable based on certain criminal and security grounds in the Immigration and Nationality Act; as well as removable aliens who have been convicted of, charged with, or committed acts that constitute a criminal offense; have engaged in fraud or otherwise abused any government program; or who are determined to otherwise pose a risk to public safety or national security. In addition, it calls for the termination of the PEP and reinstitution of Secure Communities. See table 1 for a description of enforcement priorities for the removal of aliens from the United States under PEP and Executive Order 13768. The Secretary of Homeland Security issued the 2017 DHS memo to implement Executive Order 13768. According to the 2017 DHS memo, in addition to the priorities outlined in the executive order, the Director of ICE, Commissioner of CBP, and Director of U.S. Citizenship and Immigration Services may allocate resources to prioritize enforcement activities as they deem appropriate, such as by prioritizing enforcement actions against convicted felons or gang members. ICE issued a memo further directing efforts to implement the executive order and apply the guidance from the 2017 DHS memo. The ICE memo stated that ICE was to review all existing policies and guidance documents and revise or rescind relevant policies in order to ensure consistency with the executive order. In addition, ICE’s Office of the Principal Legal Advisor (OPLA) issued additional guidance to OPLA attorneys to implement the 2017 DHS memo. OPLA is responsible for providing legal advice, training, and services to support the ICE mission, and for defending the interests of the United States in the administrative and federal courts including immigration court proceedings. See figure 1 for a timeline of DHS memoranda and Executive Order establishing immigration enforcement priorities from 2015 to 2018. Prosecutorial Discretion. Prosecutorial discretion is the longstanding authority of an agency charged with enforcing a law to decide where to focus its resources and whether or how to enforce, or not to enforce, the law against an individual. Due to limited resources, ICE cannot respond to all immigration violations or remove all persons who are determined to be in the United States without legal status, and therefore, must exercise prosecutorial discretion in the enforcement of the law. In accordance with the DHS, ICE, and OPLA memos, agents and officers are to exercise prosecutorial discretion on a case-by-case basis based on the individual facts presented in consultation with the head of the field office, and prosecutorial discretion is not to be exercised in a manner that exempts or excludes a specified class or category of foreign nationals from enforcement of the immigration laws. ICE’s ERO conducts civil immigration enforcement actions, which includes administrative arrests, detentions, and removals. Arrests. ERO arrests aliens for civil violations of U.S. immigration laws. Through the Criminal Alien Program, ICE identifies and arrests potentially removable aliens who are incarcerated within federal, state, and local prisons and jails. The National Fugitive Operations Program identifies and arrests removable aliens who are at-large. ICE does not detain all aliens it arrests, due to lack of bed space, among other factors. To inform custody decisions for aliens who are arrested and not subject to mandatory detention, ICE guidance requires officers to consider certain factors, including risk of flight, risk of harm to public safety, and special vulnerabilities. For example, individuals with a physical or mental illness or disability, or individuals who fear being harmed in detention based on their sexual orientation or gender identity may be considered for release or alternatives to detention (ATD) based on these special vulnerabilities. The ATD program requires that, among other things, aliens released into the community agree to appear at all hearings and report to ICE periodically. Non-detained Unit. ERO is also responsible for supervising and ensuring that aliens who are not held in detention facilities comply with requirements to appear in immigration court for their administrative removal proceedings. ICE uses one or more release options when it determines that an alien can be released from ICE custody—including bond, order of recognizance, order of supervision, parole, and on condition of participation in the ATD program. Total ATD enrollment numbers ranged from about 29,000 in calendar year 2015 to over 78,000 in calendar year 2018. ICE does not track specific characteristics of individuals enrolled in ATD programs, including aliens who are pregnant, nursing, disabled, elderly, primary caregivers of minor children, among others. ICE may also release aliens on bond or an order of recognizance who do not pose a threat to public safety, present a low risk of flight, and who are not required to be detained. In addition, in rare instances, ICE may release an alien on an order of supervision when there is no significant likelihood of removal in the reasonably foreseeable future. For example, ICE may not be able to coordinate travel arrangements for certain aliens with final orders of removal who are from countries with which the United States does not have repatriation agreements. An alien subject to a final order of deportation or removal may also request a stay of deportation or removal. ICE may also release certain aliens on parole for urgent humanitarian reasons or significant public benefit, or for a medical emergency or legitimate law enforcement objective, on a case-by-case basis. Detentions. ICE is responsible for providing safe, secure, and humane confinement for detained aliens in the United States who may be subject to removal while they await the resolution of their immigration cases or who have been ordered removed from the United States. This includes aliens transferred to ICE from CBP who were apprehended at or between ports of entry. In fiscal year 2019, ERO oversaw the detention of aliens in 147 facilities authorized to house detainees for over 72 hours. ICE manages these facilities in conjunction with private contractors, state and local governments, and through contract with another federal agency. Within ERO, ICE Health Service Corps (IHSC) is responsible for providing direct medical, dental, mental health care, and public health services to detainees in 20 facilities authorized to house detainees for over 72 hours. Facilities serviced by IHSC include service processing centers, contract detention facilities, dedicated intergovernmental service agreement facilities, and family residential centers. IHSC medical staff are to monitor and implement policy provisions related to pregnant and mentally ill detainees. At detention facilities that are not staffed with IHSC personnel, similar services are provided by local government staff or private contractors and overseen by ICE. Removals. ICE removes aliens who have been determined to be removable and not eligible for any requested relief or protection pursuant to an administrative final order of removal. A removal is defined as the compulsory and confirmed movement of an inadmissible or deportable alien out of the United States. ICE removals include both aliens arrested by ICE and aliens who were apprehended by CBP and transferred to ICE. ERO operates across 24 areas of responsibility nationwide and each area of responsibility is led by a field office director. Each ERO field office director is required by ICE policy to designate supervisory level employees to serve, as a collateral duty, as field liaisons for their area of responsibility tasked with monitoring and implementing the provisions of policies for certain selected populations. These field liaison roles include the LGBTI Field Liaison, Child Welfare Field Point of Contact, Supporting Disability Access Coordinator, and Juvenile Coordinator. In addition to ERO and OPLA, ICE Homeland Security Investigations (HSI) conducts worksite enforcement operations among other law enforcement operations such as oversight of the Student and Exchange Visitor program. This includes arresting undocumented workers and employers who knowingly hire them. We did not include HSI worksite enforcement arrests in our analysis of ICE arrest data because we were unable to identify the number of unique arrests in these data for the purpose of depicting general arrest trends. ERO arrests, detentions, and removals varied during calendar years 2015 through 2018, and increased overall for the period, as shown in figure 2. Specifically, males, aliens from four countries—Mexico, Guatemala, El Salvador, and Honduras—and convicted criminals accounted for the majority of ICE arrests and removals. The majority of ICE detentions were made up of males, aliens from the same four countries, and non- criminals. See appendix II for additional information on ERO arrests, detentions, and removals by gender, country of citizenship, arresting agency, and criminality. ERO Arrests. The number of ERO arrests varied from calendar years 2015 through 2018 but increased overall from 112,870 in 2015 to 151,497 in 2018, see figure 2 above. Male aliens, citizens of four countries— Mexico, Guatemala, El Salvador and Honduras—and arrests of aliens from state and local jails, through the Criminal Alien Program, accounted for the majority of these arrests each year from 2015 through 2018. Further, ERO arrests increased in all ERO areas of responsibility from calendar years 2015 and 2016, when PEP was in effect, to calendar years 2017 and 2018, following implementation of the 2017 DHS memo. Arrests of convicted criminals accounted for the majority of arrests in all areas of responsibility during both periods. However, as shown in figure 3, the proportion of arrests of convicted criminals decreased in each area of responsibility due to an increased number of arrests of non-criminals following the implementation of the 2017 DHS memo. See appendix II for additional information on ERO arrests by gender, country of citizenship, arresting agency, and criminality. ERO Detentions. The number of ERO detentions varied from calendar years 2015 through 2018 but increased overall from 324,320 in 2015 to 438,258 in 2018. Male aliens and citizens of four countries—Mexico, Guatemala, El Salvador and Honduras—collectively accounted for most ERO detentions. The majority of detentions resulted from CBP arrests at or between ports of entry. While the number of ERO detentions of convicted criminals stayed relatively stable from 2015 to 2018, the number of detentions of non-criminals increased from 171,856 in 2015 to 279,469 in 2018 and accounted for the majority of ERO detentions each year, as shown in figure 4. See appendix II for additional information on detentions by gender, country of citizenship, arresting agency, and criminality. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” According to ICE officials, administrative arrests of non-criminals include individuals who have been charged but not convicted of a crime as well as those with no prior criminal history. According to ICE, ICE officers electronically request and retrieve criminal history information about an alien from the FBI’s National Crime Information Center database, which maintains a repository of federal and state criminal history information, and other sources. We used ICE’s determination of criminality for our analysis. ERO Removals. The number of ERO removals varied from calendar years 2015 through 2018 but increased overall from 231,559 in 2015 to 261,523 in 2018. Male aliens and citizens of four countries—Mexico, Guatemala, El Salvador and Honduras—collectively accounted for most ERO removals. The majority of removals resulted from CBP arrests at or between ports of entry. While removals of both convicted criminals and non-criminals increased overall, removals of convicted criminals accounted for the majority of removals each year, see figure 5. See appendix II for additional information on removals by gender, country of citizenship, arresting agency and criminality. According to ICE officials, in early 2018, ERO conducted a review of all existing policies and related documents to help ensure alignment with the 2017 DHS memo, resulting in operational policies related to six of the eight selected populations discussed in this report. The six policies in effect as of July 2019 for the selected populations provide direction and guidance to ERO officers on the identification, detention, care, and removal of aliens who are: individuals with mental disorders, transgender, individuals with disabilities, parents of minors, pregnant, and juveniles. Of the six policies in effect, three were not impacted by the 2017 DHS memo and ERO did not make changes to these policies; two were impacted by the 2017 DHS memo and were revised to remove language ERO determined to be inconsistent with the memo; and guidance on managing juveniles was first issued after the 2017 DHS memo. For the remaining two populations, ERO does not have a separate policy on care provided to detainees who are nursing and as a result of the policy review, rescinded a prior policy related to exercising prosecutorial discretion for elderly individuals, as shown in figure 6. Individuals with Mental Disorders. In May 2014, ICE issued a memo titled Identification of Detainees with Serious Mental Disorders or Conditions, which sets forth procedures to assist ICE and detention facility personnel in identifying detainees with serious mental disorders or conditions in order to assess appropriate facility placement and treatment. To identify individuals with mental disorders, ICE’s national detention standards require facilities to conduct an initial medical screening for all detainees, including a documented mental health screening, a 14-day full medical assessment, with mental health components, and timely referral for follow-up mental evaluations, diagnosis, and treatment. ICE’s policy also requires detention facilities to notify ICE field office directors of detainees with specified serious mental disorders. In addition, the policy requires that relevant personnel meet regularly to monitor the cases of detainees with serious mental disorders until their removal or release. ERO officials in all six areas of responsibility we visited said that these meetings are conducted weekly or biweekly with attorneys, medical staff, and ERO management staff to discuss and evaluate the needs of each detainee’s medical care and security needs. According to ICE, this memo did not need to be revised to align with the 2017 DHS Memo. Our analysis of ICE data shows that the number of detentions of individuals with mental disorders at IHSC-staffed facilities varied from calendar years 2015 through 2018 but increased overall from 8513 to 8796 individuals. Transgender Individuals. In June 2015, ICE issued a memo titled Further Guidance Regarding the Care of Transgender Detainees, which provides guidance regarding the placement and care of transgender adult detainees in ERO custody. This memo provides guidance for initial processing of transgender detainees who voluntarily disclose their gender identity to detention officers. Further, when a detainee self-identifies as transgender, the memo directs ERO officers to make individualized placement determinations to ensure the detainee’s safety, and to ensure the facility chosen for placement is able to provide appropriate care for the individual, and to the extent practicable to consider the availability of medical personnel who have experience providing care and treatment to transgender detainees, including the delivery of hormone therapy. This memo also directs ERO to designate a National LGBTI Coordinator to serve as the primary point of contact and subject matter expert for ERO regarding the care and treatment of detainees in ERO custody who self- identify as transgender. Specifically, the National LGBTI Coordinator is to evaluate and report information from all relevant ICE data systems regarding the demographics, care, and custody of transgender detainees and ensure field compliance with the provisions of this memo, among other things. Further, each field office is required to have a LGBTI Field Liaison, appointed by the Field Office Director. The memo directs LGBTI Field Liaisons to provide regular updates to the national ERO LGBTI Coordinator and ERO Headquarters on the progress of implementing and maintaining the provisions of this memo, which includes determining the appropriateness of facilities to house transgender detainees. In addition, the memo requires certain detention facilities to convene a meeting no later than 72 hours after a transgender detainee’s arrival to the facility to assess medical, psychological, and housing needs. During our site visits, officers in three of the six areas of responsibility we visited said that they conduct these meetings with relevant ERO management staff and medical officials in accordance with the memo. According to ICE officials, the transgender care memo did not need to be revised to align with the 2017 DHS Memo. The transgender care memo states that field office directors may exercise prosecutorial discretion for transgender individuals who are not subject to mandatory detention. Field ERO officers in five of the six areas of responsibility we visited explained that ERO generally does not detain transgender individuals unless their criminal histories warrant detention, in accordance with the memo. Specifically, officers in three of these five areas of responsibility reported that transgender individuals are likely to be released on bond or under an order of supervision. However, in the sixth area of responsibility, one ERO officer observed an increase in the detention of transgender individuals beginning in early 2017, which the official attributed to the revised priorities described in the 2017 DHS memo. In addition, attorneys from three NGOs we met with also observed an increase in the detention of transgender individuals or described ongoing challenges related to a decrease in the availability of dedicated transgender housing facilities. They also provided anecdotes of transgender clients who had been detained or who experienced challenges obtaining access to appropriate medical care while in detention. Our analysis of ICE data shows that the number of detentions of transgender individuals increased from 237 in calendar year 2016 to 284 in calendar year 2018. While ICE does not have separate policies for aliens who are lesbian, gay, bisexual, or intersex, the national LGBTI coordinator and LGBTI field liaisons also serve as subject matter experts for the care and treatment of these detainees. In addition, the transgender care memo prohibits discrimination or harassment of any kind based on a detainee’s sexual orientation or gender identity. As such, ERO officers may take steps to protect a detainee who expresses safety concerns based on their sexual orientation, according to ERO officials. According to ERO officers in five of the six areas of responsibility we visited, they do not ask detainees about sexual orientation unless the individual voluntarily discloses this information. Additionally, ERO officers in the same five areas of responsibility stated that they do not take sexual orientation into consideration for detention or housing decisions, unless an individual specifically requests protective custody due to safety concerns or harassment. Individuals with Disabilities. In December 2016, ERO issued a directive titled Assessment and Accommodations for Detainees with Disabilities, which establishes policy and procedures for ERO to oversee and communicate with detention facilities on the identification, assessment, and accommodation of detainees with disabilities. According to this directive, ERO field leadership is to notify detention facilities in each area of responsibility of their existing obligations under federal law to accommodate detainees with disabilities. These obligations include maintaining a process to identify these detainees through observation, assessments, screenings, and self-identification; notifying detainees of their right to request accommodations; and establishing a process to inform a detainee of the final decision on the request for accommodations, including whether the facility will provide alternative accommodations that are equally effective as those requested; among other things. In addition, this directive requires ERO to designate an ERO disability access coordinator who is to serve as the primary point of contact and subject matter expert for ERO headquarters and the field regarding the accommodation of, and communication with, detainees with disabilities in ERO custody. Among other duties, the ERO disability access coordinator is responsible for evaluating information from all relevant ICE data systems regarding the identification, care, approved accommodations and custody of detainees with disabilities; as well as maintaining records of detainees with communication and mobility impairments, including records of denials of detainee requests for accommodations by facilities. According to the directive, detainees with communication impairments include detainees with hearing, visual, and speech impairments (e.g., detainees who are deaf or hard of hearing, blind, or nonverbal). Detainees with mobility impairments include detainees with physical impairments who require a wheelchair, crutches, prosthesis, cane, other mobility device, or other assistance. Accommodations for these impairments may include accessible showers, Braille material, or note takers for persons with physical and sensory impairments, among other things. The ERO disability access coordinator is also responsible for helping to ensure compliance with the provisions of this directive. Field office directors are required to appoint at least one supervisory-level employee to serve as the supporting disability access coordinator for each area of responsibility. Supporting disability access coordinators are responsible for serving as the main point of contact for their field office regarding compliance with federal law and DHS, ICE, and ERO regulations, detention standards, policies, and procedures related to detainees with disabilities. Supporting disability access coordinators are also responsible for collaborating and communicating with ERO headquarters, field office, detention facility, and health care personnel to monitor the care and treatment of detainees with disabilities, among other things. In all six areas of responsibility we visited, supporting disability access coordinators and medical staff told us that they track detainees who receive accommodations for communication and mobility impairments by recording the accommodation on a form that they submit to ERO headquarters. According to ICE, the Assessment and Accommodations for Detainees with Disabilities directive did not need to be revised to align with the 2017 DHS Memo. This directive states that it is meant to implement and complement the requirements of Section 504 of the Rehabilitation Act of 1973 and states that detainees with disabilities will be provided an equal opportunity to access, participate in, or benefit from in-custody programs, services, and activities, and that detainees with disabilities will be provided with auxiliary aids and services as necessary to allow for effective communication. Further, the directive states that a field office director may consider releasing from ICE custody a detainee with an impairment or disability who is not subject to mandatory detention. ERO officers in five areas of responsibility we visited reported that they consult with the supporting disability access coordinator, medical staff, or a supervisor to determine whether local detention facilities are able to provide appropriate accommodations. Our analysis of ICE data shows that the number of detentions of individuals with communication and mobility impairments increased from 434 to 530 in calendar years 2017 to 2018. Parents or Legal Guardians of Minors. In August 2017, ICE issued a policy titled Detention and Removal of Alien Parents or Legal Guardians, which provides guidance regarding the detention and removal of alien parents and legal guardians, including those with children who are U.S. citizens and legal permanent residents and parents with ongoing cases in family court or child welfare proceedings in the United States. This policy directs ERO to designate a child welfare coordinator to serve as the primary point of contact and subject matter expert for all ICE personnel regarding child welfare issues related to detained alien parents. The child welfare coordinator is also responsible for evaluating information from all relevant ICE data systems regarding detained alien parents or legal guardians of U.S. citizen and legal permanent resident minors and sharing appropriate information with field points of contact, among other things. Specifically, this policy directs field office directors to make appropriate arrangements for detained parents to attend child welfare proceedings. ERO officers in three of the six areas of responsibility we visited stated that they coordinate visits to family courts for the detained parent to appear at these hearings. The field office director in each area of responsibility is to designate a field point of contact to communicate with the child welfare coordinator and address public inquires related to detained parents or legal guardians in ERO custody. The August 2017 policy superseded an August 2013 policy titled Facilitating Parental Interests in the Course of Civil Immigration Enforcement Activities, which ERO revised to align with the 2017 DHS memo. In the revised policy, ERO removed language indicating that field office directors should weigh whether an exercise of prosecutorial discretion may be warranted for an alien who is a parent or legal guardian of a U.S. citizen or legal permanent resident minor or is a primary caretaker of a minor, and to exercise such discretion as early as possible. ERO officers in five of the six areas of responsibility we visited stated that they typically do not detain parents of minors, unless criminal history warrants detention. Attorneys we met with from a NGO that provides services to immigrant families and refugees stated that they have observed an increase in the number and length of detentions of parents or legal guardians of minors since January 2017. We were not able to identify trends in detention of detained parents because ERO does not collect or maintain data on this population in a readily available format. Pregnant Women. In December 2017, ICE issued a directive titled Identification and Monitoring of Pregnant Detainees, which sets forth policy and procedures to ensure pregnant detainees in ICE custody for immigration violations are identified, monitored, tracked, and housed in an appropriate facility to manage their care. According to ICE policy on women’s health, pregnant women are identified upon arrival to a detention facility because all women of childbearing age undergo a pregnancy test during intake processing. According to the December 2017 directive, IHSC personnel are responsible for notifying the field office director and IHSC headquarters, as soon as practical, when a pregnant detainee is identified; monitoring the condition of pregnant detainees, including the general health of the pregnant detainee and medical condition of the fetus; and communicating with the field office director about any specific risk factors or concerns. In addition, IHSC personnel are to provide oversight and review of facility capabilities to determine if the needs of a pregnant detainee can be accommodated and recommend to the field office director when a transfer to another facility is necessary for appropriate medical care. Further, IHSC personnel are to develop and maintain a system for tracking and monitoring all pregnant detainees. This policy superseded an August 2016 version with the same title, which ERO revised to align with the 2017 DHS memo, according to ICE officials. In the revised version, ERO removed language stating that absent extraordinary circumstances pregnant women will generally not be detained by ICE. In five of the six areas of responsibility we visited, ERO officers stated that unless mandatory detention is required, they still generally avoid detaining pregnant women. In addition, ERO officers in all six areas of responsibility we visited stated that they are less likely to detain and may release a woman who is having a high risk pregnancy or in the third trimester of her pregnancy. However, an official in the sixth area of responsibility noted that under the revised policy, pregnant women may be detained during the third trimester, if she is likely to be removed quickly and has medical clearance to fly. Officers in two of the six areas of responsibility we visited noted that pregnant women may also be released on bond, under an order of supervision, or other non- detention options, after assessing the facts of the case. Attorneys and policy advocates we met with from three NGOs that represent a range of immigrant populations stated that they have observed increases in the detention of pregnant women since January 2017. Attorneys from another NGO we met with provided anecdotes of cases of pregnant detainees who experienced medical challenges, including miscarriages while in custody. Our analysis of ICE data shows that the number of detentions of pregnant women varied, but increased overall, from 1380 in calendar year 2016 to 2098 in calendar year 2018. Juveniles. In April 2018, ICE issued the Field Office Juvenile Coordinator Handbook to guide ERO staff in processing, transporting, managing, and removing juveniles—persons encountered by ERO who have not reached 18 years of age. Field office juvenile coordinators, who serve as local subject-matter experts on juvenile matters for each area of responsibility, provide policy guidance to ERO personnel within their areas of responsibility, and assist with case review and custody redeterminations. Field office juvenile coordinators are also required to coordinate with other federal agencies including the Office of Refugee Resettlement, where juveniles designated as unaccompanied alien children are typically transferred. According to ERO policy, unaccompanied alien children apprehended by ERO or transferred into ERO custody by CBP are to be placed in the care of the Office of Refugee Resettlement within 72 hours of identification, if they are not repatriated at the border. The Field Office Juvenile Coordinator Handbook was released after the 2017 DHS memo and aligns with the 2017 DHS Memo. According to officers in four of the six areas of responsibility we visited, ERO does not target juveniles for arrests, unless they have criminal records. For example, officers we met with in one area of responsibility stated that ERO typically does not target juveniles in that location, unless they are affiliated with gangs, because they are unlikely to pose a public safety threat. Our analysis of ICE data shows that the number of arrests of juveniles varied, but increased overall, from calendar years 2015 through 2018. We excluded juveniles from our analysis of individual ICE detention data because ICE is generally not responsible for detaining juveniles, as discussed above. Nursing Women. While ICE does not have a separate policy on the care, detention, or removal of women who are nursing, the 2017 Directive on Women’s Health Services provides guidance to IHSC staff on the delivery and administration of health services to this population. According to this directive, women who are nursing are identified during initial processing before being placed into custody at a detention facility because ERO officials and medical personnel are required to ask women if they are breastfeeding. Medical personnel make recommendations pertaining to the detention of women who are nursing, and in most cases, these detainees are placed in IHSC-staffed facilities. IHSC personnel record and use this information to monitor the care and needs of women who are nursing, according to IHSC officials. In five of the six areas of responsibility we visited, officers stated that they typically do not detain women who are nursing, unless their criminal histories warrant detention. Specifically, health officials in one of the five areas of responsibility explained that if a nursing mother is detained, she is typically released within a few hours or placed on bond or order of supervision. Our analysis of ICE data shows that the number of detentions of nursing women at IHSC-staffed facilities varied from calendar years 2015 through 2018 but increased overall from 157 in 2015 to 381 in 2018. Elderly Individuals. ICE no longer has a policy guiding the detention or care of elderly detainees. According to ICE guidance on assessing individuals with special vulnerabilities during the intake process, ICE generally considers someone to be elderly starting at age 65. However, the guidance instructs agents and officers to assess whether these individuals have physical indicators of infirmity or fragility caused by old age when making decisions regarding detaining or releasing them. In February 2018, as part of its effort to align internal policies with the 2017 DHS memo, ERO rescinded a 2009 policy directing officers to administratively close cases of non-criminal fugitives who are 70 years old or older for humanitarian/health reasons. ERO officers in five of the six areas of responsibility we visited reported that they do not target individuals who are elderly and continue to consider criminal history and medical condition when deciding whether to detain them. For example, officials in one of these five areas of responsibility explained that someone who committed an aggravated felony would be subject to mandatory detention regardless of age, but if the individual has a serious medical condition, such as advanced cancer, ERO may decide to release them from custody because the agency would be responsible for the cost of their medical treatments while they are in custody. Officers in the sixth area of responsibility said they have started to detain individuals who are elderly following the issuance of the 2017 DHS memo, but noted that they coordinate with the courts to expedite these hearings before an immigration judge who may order the release of an elderly detainee. Attorneys we met with from a NGO that provides services to immigrant families and refugees stated that they have observed an increase in detentions of individuals who are elderly, and only those with serious medical issues were considered for release. Our analysis of ICE data shows that the number of detentions of individuals who were elderly varied, increasing overall, from 882 in calendar year 2015 to 1159 in calendar year 2018. Available ICE data show that detentions of most of the selected populations in our review varied between calendar years 2015 and 2018. Specifically, detentions of transgender individuals and pregnant women increased from calendar years 2016 to 2018, after ICE began collecting data for these populations. Similarly, detentions of individuals with disabilities increased from 2017 to 2018, after ICE began collecting data for this population. Detentions of individuals with mental disorders and nursing women at IHSC-staffed facilities varied from calendar years 2015 to 2018. Finally, detentions of individuals who were elderly varied, increasing overall during the same timeframe. We were unable to obtain data on parents or legal guardians of minors in ICE custody because ICE does not collect or maintain data on this population in a readily available format. ICE began collecting and maintaining data on transgender individuals who voluntarily disclose their gender identity to ICE officers in November 2015, as previously discussed. ERO officials said they use these data to monitor the placement and care of transgender individuals in ICE custody, in accordance to ICE’s memo on Further Guidance Regarding the Care of Transgender Detainees. These data show that the number of detentions of transgender individuals increased from calendar years 2016 through 2018, as shown in table 2. Detentions resulting from CBP arrests accounted for about half of the total detentions of transgender individuals in 2016 and 2017, increasing to 69 percent in 2018. Also shown in table 2, detentions of non-criminal transgender individuals increased from calendar years 2016 through 2018, increasing from 46 percent of total detentions of transgender individuals in 2016 to 71 percent in 2018. Detentions of non-criminal transgender individuals include both detentions of individuals with pending criminal charges (ranging from 12 to 24 percent) and individuals with no recorded criminal history (ranging from 76 to 88 percent). Detentions resulting from CBP arrests comprised most of these detentions (ranging from 77 to 91 percent). Detentions of transgender individuals with criminal convictions decreased over the same period, and most resulted from ICE arrests (ranging from 71 to 84 percent). For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” According to ICE officials, administrative arrests of non-criminals include individuals who have been charged with, but not convicted of a crime, (we refer to these as “aliens with pending criminal charges”), as well as those with no prior criminal history, (we refer to these as “aliens with no recorded criminal history”). According to ICE, ICE officers electronically request and retrieve criminal history information about an alien from the FBI’s National Crime Information Center database, which maintains a repository of federal and state criminal history information, and other sources. We used ICE’s determination of criminality for our analysis. ICE began collecting and maintaining data on certain detainees with disabilities–i.e., those with communication and mobility impairments— who disclosed their impairment or who were identified by facility staff as having an impairment in January 2017, in accordance with its directive, titled Assessment and Accommodations for Detainees with Disabilities. These data show that detentions of individuals with disabilities increased from calendar years 2017 to 2018, as shown in table 3. Detentions resulting from ICE arrests accounted for the majority of these detentions (70 percent in 2017 and over 50 percent in 2018). Also shown in table 3, detentions of convicted criminals with disabilities decreased from calendar years 2017 to 2018, and accounted for the majority of total detentions of this population (67 percent in 2017 and 53 percent in 2018). Most of these detentions resulted from ICE arrests (89 percent in 2017 and 72 percent in 2018). Detentions of non-criminals in this population increased from calendar years 2017 to 2018. Detentions of individuals with no recorded criminal history accounted for most detentions of non-criminals in this population (71 percent in 2017 and 79 in 2018 percent), and the majority resulted from CBP arrests (68 percent in 2017 and 74 percent in 2018). ICE began collecting and maintaining data on pregnant women in ICE’s custody in June 2015. IHSC officials said they use these data to monitor the condition of pregnant women in ICE custody, including the term of the pregnancy, general health of the pregnant detainee, and medical conditions of the fetus, in accordance to ICE’s directive on Identification and Monitoring of Pregnant Detainees. These data show that the number of detentions of pregnant women varied, but increased overall from calendar years 2016 through 2018, as shown in table 4. Detentions resulting from CBP arrests accounted for most of the total detentions of pregnant women each year (ranging from 90 to 96 percent). Also shown in table 4, detentions of non-criminal pregnant women varied from calendar years 2016 through 2018, but increased overall. Detentions of non-criminal pregnant women accounted for most of the total detentions of pregnant women each year (ranging from 91 to 97 percent), and detentions of women with no recorded criminal history accounted for almost all of these detentions (ranging from 96 to 99 percent). Detentions of convicted criminal pregnant women also increased overall for the period. ICE began collecting and maintaining data needed to identify individuals with mental disorders at IHSC-staffed facilities in August 2013. According to IHSC officials, ICE does not collect these data for non-IHSC staffed facilities, in part because many of these facilities do not have electronic health records. However, IHSC personnel are notified of detainees with mental disorders at non-IHSC staffed facilities and these individuals may be transferred to another facility if the current facility is unable to provide appropriate care. While we were not able to present the overall number of detentions of individuals with mental disorders in ICE custody, we reviewed available ICE data to indicate the number and characteristics of detentions of individuals with mental disorders at IHSC- staffed facilities. These data show that the number of detentions of individuals with mental disorders at IHSC-staffed facilities varied from calendar years 2015 through 2018, as shown in table 5. Detentions resulting from CBP arrests accounted for the majority of these detentions (ranging from 53 to 67 percent) in 2015, 2016, and 2018. In 2017, detentions resulting from ICE arrests accounted for the majority (51 percent) of these detentions. Also shown in table 5, detentions of non-criminals with mental disorders varied from calendar years 2015 through 2018. These detentions accounted for the majority of total detentions of individuals with mental disorders in 2015, 2016, and 2018 (ranging from about 53 to 58 percent). Detentions of individuals with no recorded criminal history accounted for most detentions of non-criminals for this population (ranging from 79 to 92 percent), and most resulted from CBP arrests (ranging for 77 to 97 percent). Detentions of convicted criminals with mental disorders varied over the period and the majority resulted from ICE arrests (ranging from 71 to 79 percent). IHSC began collecting and maintaining data needed to identify women who are nursing at IHSC-staffed facilities, which is where ICE typically detains women who are nursing, in August 2013. These data are used to monitor the care and needs of women who are nursing, according to IHSC officials. While we were not able to present the overall number of detentions of nursing women in ICE custody, we reviewed available ICE data to indicate the number and characteristics of detentions of nursing women at IHSC-staffed facilities. These data show that the number of detentions of nursing women at IHSC-staffed facilities varied from calendar years 2015 through 2018, as shown in table 6. Detentions resulting from CBP arrests accounted for most of the detentions of women who were nursing each year (ranging from 98 to 99 percent). Also shown in table 6, detentions of both non-criminal and convicted criminal nursing women at IHSC-staffed facilities varied from calendar years 2015 through 2018. Detentions of non-criminal women who were nursing accounted for most of the total detentions of nursing women at IHSC-staffed facilities each year (ranging from 98 to 99 percent), and detentions of women who were nursing with no recorded criminal history accounted for almost all of these detentions (ranging from 99 to 100 percent), and resulted from CBP arrests (ranging from 98 to 100 percent). From calendar year 2015 through 2018, ICE collected and maintained data on a detainee’s date of birth and is able to identify whether an individual is elderly, defined as someone who is over 65 years old, by calculating the individual’s age at the time they are detained. ICE does not collect or maintain specific data on whether an individual is elderly because it does not have a separate policy for elderly detainees. Rather, ICE considers an individual’s health, criminal history, and other factors when making detention determinations, according to officials. ICE data show that the number of detentions of individuals who were elderly varied, but increased overall from calendar years 2015 through 2018, as shown in table 7. Detentions resulting from ICE arrests accounted for the majority of detentions of individuals who were elderly each year (ranging from 64 to 71 percent). Also shown in table 7, detentions of both non-criminal and criminal individuals who were elderly varied from calendar years 2015 through 2018, and increased overall. Detentions of convicted criminals accounted for the majority of detentions of individuals who were elderly each year (ranging from 65 to 74 percent) and most of these detentions resulted from ICE arrests (ranging from 82 to 85 percent). Detentions of individuals who were elderly with no recorded criminal history accounted for most detentions of non-criminal individuals who were elderly (ranging from 80 to 91 percent), and the majority resulted from CBP arrests (ranging from 70 to 74 percent). While ICE collects information on detained parents or legal guardians, including those of U.S. citizens and legal permanent resident minors, this information is not maintained in a readily available format that would allow ICE to systematically identify such detained parents and ensure officers are collecting information on this population as required by policy. According to ICE officials, before making custody determinations, ICE officers are instructed to inquire whether arrested aliens are parents or legal guardians of minors, including parents of U.S. citizen and legal permanent resident minors. ICE officers are to enter this information in a separate tab in the ENFORCE Alien Detention Module, a subsystem within ICE’s data system for recording information about individuals in its custody. This information on detained parents, however, cannot be readily searched to identify all detained parents or legal guardians in custody. Therefore, ICE does not know how many detained parents or legal guardians are in custody, including parents of U.S. citizen and legal permanent resident minors, during any given time. In accordance with a currently recurring Congressional reporting requirement, ICE generates a semi-annual report on removals of parents of U.S.-born citizen children. However, officials explained that they must review this information manually to generate the report and added that ICE is not required to report in an aggregate way on detained parents of U.S. citizen or legal permanent residents. ICE also tracks individual cases requiring specific actions, such as arranging transportation for parents to attend child welfare proceedings or accommodating visitation for parents with mandated child visitation schedules. However, according to ICE officials, these parents represent a small proportion of all parents in ICE custody. ICE’s policy on Detention and Removal of Alien Parents or Legal Guardians requires ICE personnel to enter information into ENFORCE once a detained alien has been determined to be a parent or legal guardians of a U.S. citizen or legal permanent resident minor. As previously mentioned, this policy also requires the Child Welfare Coordinator to evaluate information from all relevant ICE data systems regarding detained parents or legal guardians of minors, including parents of U.S. citizen and legal permanent resident minors, and share appropriate information with the ERO field points of contact. ICE’s policy further states that in pursuing the enforcement of U.S. immigration laws against parents of minors, ICE personnel should remain cognizant of the impact enforcement actions may have on U.S. citizen or legal permanent resident minors. Standards for Internal Control in the Federal Government call for design of any data collection to collect quality information, and for management to use quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. Because information entered into ICE’s data system on detained parents or legal guardians, including those of U.S. citizen or legal permanent resident minors, is not maintained in a readily available format, ICE headquarters officials cannot ensure that ICE officers are collecting and entering this information into the system as required by policy. According to ICE officials, the agency had previously considered implementing a system update to readily identify certain detained parents of minors, but as of October 2019 is no longer considering this update. Collecting and maintaining information in a readily available format on detained parents of U.S. citizen or legal permanent resident minors could help ensure that ICE personnel can identify, evaluate, and share information on this population, as required by ICE policy. In addition, collecting and evaluating this information would provide greater transparency regarding the impacts of ICE’s enforcement actions on U.S. citizen or legal permanent resident minors. In 2015, DHS reported that about 12 million aliens were residing in the United States without lawful status or presence, which includes parents of U.S. citizen, legal permanent resident, and alien minors. Through its policies, ICE has established the importance of collecting and maintaining information on detained parents and legal guardians of U.S. citizen and legal permanent resident minors. However, because ICE has not implemented a process to collect or maintain this information in a readily available format, it does not have reasonable assurance that it can identify all detained parents and legal guardians of U.S. citizen and legal permanent resident minors. Therefore, ICE cannot evaluate and share this information and ensure its officers are collecting information on this population in accordance with its policy. Implementing a process to collect and maintain this information in a readily available format would allow ICE to better assess the impacts of its enforcement actions on U.S. citizen and legal permanent resident minors and help improve ICE oversight efforts. The Director of ICE should implement a process to collect and maintain data in a readily available format on detained parents or legal guardians of U.S. citizen and legal permanent resident minors to ensure that information on this population is entered into ICE’s data system as required by policy. (Recommendation 1) We provided a draft of this report for review and comment to DHS. DHS provided comments, which are reproduced in appendix XI. DHS also provided technical comments, which we incorporated, as appropriate. DHS did not concur with our recommendation. Specifically, in its comments, DHS stated that data on detained parents or legal guardians of U.S. citizens and legal permanent residents are available to approved EARM users and that we did not identify any problems with the quality of the data. However, as we noted in our report, these data are not readily available because ICE’s data on family relationships, including parents or legal guardians of U.S. citizens and legal permanent resident minors, can only be accessed by manually reviewing each separate case file in EARM. To that end, we or anyone else wishing to do so are unable to determine whether there are problems with the data as ICE is not able to provide aggregate data that would allow us to assess the quality or to report on these data. In its comments, DHS states that ICE does not have any requirement or need to aggregate data on this particular group and doing so would not better inform ICE’s decision making processes. However, as noted in the report, ICE’s policy states that in pursuing the enforcement of U.S. immigration laws against parents of minors, ICE personnel should remain cognizant of the impact enforcement actions may have on U.S. citizen or legal permanent resident minors. Without making these data readily available, ICE is not able to account for the overall impact of its enforcement actions on U.S. citizen or legal permanent resident minors whose parents or legal guardians have been detained. Additionally, headquarters and field officials we met with during the course of this review agreed that having this information readily available would be useful. They also explained that ICE was developing a method to better track and report on primary caregivers of children. However, in October 2019, ICE officials stated that the agency is no longer considering this improvement. We continue to believe that collecting and maintaining information in a readily available format on detained parents or legal guardians of U.S. citizen or legal permanent resident minors could help ensure that ICE personnel can identify, evaluate, and share information on this population, as required by ICE policy. Without such data, ICE headquarters officials cannot ensure that ICE officers are collecting and entering this information into the system as required. In addition, collecting and evaluating this information would provide greater transparency regarding the impacts of ICE’s enforcement actions on U.S. citizen or legal permanent resident minors. We are sending copies of this report to the appropriate congressional committees, and the Acting Secretary of the Department of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or goodwing@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix XII. This appendix provides additional information on our objectives, scope, and methodology. Specifically, our objectives were to examine the following questions: 1. What does ICE data show about ICE arrests, detentions, and removals from calendar years 2015 through 2018? 2. What policies are in effect for selected populations and what changes did ICE make to align these policies with the 2017 DHS memo? 3. To what extent does ICE collect data on selected populations in detention and what do these data show? To address our first question, we analyzed individual-level data from the U.S. Immigration and Customs Enforcement (ICE) Integrated Decision Support (IIDS) database, to determine the total number of ICE Enforcement and Removal Operations (ERO) administrative arrests (arrests), detentions, and removals from January 2015 (the start of the Priority Enforcement Program) through December 2018 (to include the first two years for the 2017 DHS Memo). ERO conducts civil immigration enforcement actions, which includes arrests for civil violations of U.S. immigration laws, detentions, and removals. Arrests. We analyzed individual-level arrest data from IIDS to determine the total number of ERO arrests for each calendar year 2015 through 2018. We examined multiple data fields from the individual-level arrest data, including alien file number, family name, given name, gender, country of citizenship, arrest date, area of responsibility, and criminality, among other variables. Because aliens may have multiple arrests, we used alien number and arrest date to identify the unique number of arrests rather than the number of unique aliens who were arrested. We excluded from our analysis arrest records that had a missing alien number, an invalid alien number— i.e., that included all zeroes or had duplicate alien number and arrest date combinations—or records that indicated test in the name fields. We analyzed these data to determine total numbers of arrests by gender, country of citizenship, criminality, arresting program, and area of responsibility. To determine the number of arrests by gender, we analyzed IIDS individual-level arrest data. We also analyzed these data to determine the number of arrests by criminality for each gender, using ICE’s determination of criminality for our analysis, as discussed below. To determine the number of arrests by country of citizenship, we analyzed IIDS individual-level arrest data. ICE obtains country of citizenship data from arrest reports, which may be based on documentation or self-reported. To determine the number of arrests by criminality, we analyzed IIDS individual-level arrest data. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” According to ERO officials, arrests of non-criminals include individuals who have been charged but not convicted of a crime as well as those with no prior criminal history. According to ICE, ICE officers electronically request and retrieve criminal history information about an alien from the FBI’s National Crime Information Center (NCIC) database, which maintains a repository of federal and state criminal history information. ICE officers are also able to manually enter criminal history information in ICE’s data system if they discover additional criminal history information that was not available in NCIC. ICE officers may also check for criminal convictions committed outside the United States, on a case-by-case basis. Most of the ICE data we reviewed indicated criminal or non-criminal history, where criminal included convictions, and non-criminal included both pending criminal charges and other immigration violations. Therefore, wherever we referred to criminality, we used ICE’s determination of criminality—criminal or non-criminal—for our analysis. To determine the number of arrests by arresting program, we analyzed IIDS individual-level arrests data to determine the number of arrests at-large in the communities by ICE’s fugitive operations teams and those resulting from an incarceration in federal, state, and local prisons and jails through the Criminal Alien Program. To determine the number of arrests by ERO area of responsibility, we analyzed IIDS individual-level arrests data for calendar years 2015 through 2018. We also used these data to calculate the proportion of arrests of convicted criminals by ERO area of responsibility. We compared the number of arrests across the 24 ERO areas of responsibility to examine the differences in enforcement actions between the years the Priority Enforcement Program were in effect (2015-2016) and the years immediately following implementation of the DHS memo (2017-2018). We excluded from our analysis arrest records that had a missing or unknown area of responsibility. We also analyzed IIDS individual-level arrest data to determine the total number of arrests of juveniles during calendar years 2015 through 2018. Because aliens may have multiple arrests, we used alien number and arrest date to identify the unique number of arrests rather than the number of unique aliens who were arrested. We excluded from our analysis arrest records that had a missing alien number, an invalid alien number—i.e., that included all zeroes or had duplicate alien number and arrest date combinations. We used these data to determine the total number of arrests of juveniles by age and gender. Detentions. We analyzed individual-level detention data from IIDS to determine the total number of ERO detentions during calendar years 2015 through 2018. We examined multiple data fields from the individual-level detention data, including alien file number, person id, family name, given name, gender, country of citizenship, arresting agency, criminality, detention facility, book-in date, book-out date, release reason, and length of stay, among other variables. Because aliens may have multiple detentions, we used alien number and initial book-in date fields—i.e., the first date the individual is taken into ICE custody—to identify the unique number of detentions rather than the number of unique aliens who were detained. We excluded from our analysis arrest records that had a missing alien number or had an invalid alien number—i.e., that included all zeroes. We analyzed these data to determine total numbers of detentions by gender, country of citizenship, arresting agency, and criminality. To determine the number of detentions by gender, we analyzed IIDS individual-level detention data. We also analyzed these data to determine the number of detentions by arresting agency—ICE or U.S. Customs and Border Protection (CBP)—and criminality for each gender. We included all detentions resulting from both ICE and CBP arrests because ICE is responsible for detaining certain aliens apprehended by CBP at or between ports of entry. To conduct our analysis, we used ICE’s determination of criminality— criminal or non-criminal—which ICE determines by conducting electronic criminal history checks, as previously discussed. To determine the number of detentions by country of citizenship, we analyzed IIDS individual-level detention data. ICE obtains country of citizenship data from arrest reports, which may be based on documentation or self-reported. To determine the number of detentions by arresting agency, we analyzed IIDS individual-level detention data for detentions resulting from ICE arrests and those resulting from CBP arrests at or between ports of entry. To determine the number of detentions by criminality, we analyzed IIDS individual-level detention data. We also examined the extent to which detentions varied by criminality and arresting agency. To conduct our analysis, we used ICE’s determination of criminality— criminal or non-criminal—which ICE determines by conducting electronic criminal history checks, as previously discussed. Removals. We analyzed individual-level removal data from IIDS to determine the total number of ERO removals during calendar years 2015 through 2018. We examined multiple data fields from the individual-level removal data, including alien file number, family name, given name, gender, country of citizenship, criminality, arresting agency, and removal date, among other variables. Because aliens may have multiple removals, we used alien number and removal date to identify the unique number of removals rather than the number of unique aliens. We excluded from our analysis removal records that had a missing alien number, an invalid alien number—i.e., that included all zeroes, or had duplicate alien number and removal date combinations, or records that indicated test in the name fields. We analyzed these data to determine total numbers of removals by gender, country of citizenship, arresting agency, and criminality. To determine the number of removals by gender, we analyzed IIDS individual-level removal data. We also analyzed these data to determine the number of removals by arresting agency and criminality for each gender. To conduct our analysis, we used ICE’s determination of criminality—criminal or non-criminal—which ICE determines by conducting electronic criminal history checks, as previously discussed. To determine the number of removals by country of citizenship, we analyzed IIDS individual-level data. ERO obtains country of citizenship data from arrest reports, which may be based on documentation or self-reported. To determine the number of removals by arresting agency, we analyzed IIDS individual-level removal data for removals resulting from ERO arrests and those resulting from CBP arrests at or between ports of entry. To determine the number of removals by criminality, we analyzed IIDS individual-level removal data. To conduct our analysis, we used ICE’s determination of criminality—criminal or non-criminal— which ICE determines by conducting electronic criminal history checks, as previously discussed. We determined that the data used in each of our analyses were sufficiently reliable for the purposes of this report by analyzing available documentation, such as related data dictionaries; interviewing ICE officials knowledgeable about the data; conducting electronic tests to identify missing data, anomalies, or erroneous values; and following up with officials, as appropriate. We also analyzed arrest data from Homeland Security Investigations (HSI) worksite enforcement to determine the total number of criminal and administrative arrests conducted by HSI worksite enforcement between January 2015 and December 2018. We were unable to use these data for the purposes of reporting the total number of arrests by HSI worksite enforcement for each calendar year. Specifically, we identified combined arrest, charge, and conviction dates in the same field, among other issues, which limited our ability to identify the number of aliens arrested by HSI as a result of worksite enforcement operations each year. To address our second question, we reviewed a master list of ICE policies and interviewed policy officials to identify policies related to individuals with special vulnerabilities. Based on this review as well as input from nongovernmental organizations (NGOs) that serve or represent various populations, we selected eight populations including aliens who are: lesbian, gay, bisexual, transgender, and intersex (LGBTI), individuals with disabilities, juveniles, parents or legal guardians of minors, pregnant, individuals with mental disorders, women who are nursing, or individuals who are elderly. To identify the changes ICE made to align these policies with the 2017 DHS memo, we reviewed specific provisions in the executive order and implementing memoranda. We then analyzed existing policies as well as policies that ICE revised or rescinded to align with the 2017 DHS memo, including policies related to prosecutorial discretion and selected populations. We conducted interviews with officials from ICE headquarters offices, including the Office of the Principal Legal Advisor, Office of Policy, Homeland Security Investigations, as well as program officials within ERO, including Domestic Operations, Fugitive Operations, and Custody Management Divisions. We met with six national organizations that serve or represent immigrants as well as six state or regional organizations that serve or represent immigrants in the locations we visited to obtain their perspectives on how the policies affected the individuals they represent. The perspectives of NGOs are not generalizable and my not be indicative of care provided at all detention facilities. We selected these NGOs to reflect a range of types of populations served or represented as well as based on their proximity to ICE areas of responsibility we visited, see table 8 for more information on the organizations we interviewed. We conducted site visits to six selected ICE ERO areas of responsibility (Atlanta, Dallas, Los Angeles, San Diego, St. Paul, and Washington, D.C.) and interviewed ICE officials to obtain their perspectives on the policy revisions. We selected these locations based on the prevalence of arrests in fiscal year 2017, percent changes in arrests from fiscal year 2016 to 2017, and geographical dispersion. Specifically, we identified locations that had the highest arrest numbers in fiscal year 2017 or the largest percentage increases in arrests from fiscal years 2016 to 2017, and then selected locations that provided wide geographical representation. In each location we met with ERO liaisons and officers responsible for monitoring and implementing the provisions of policies for certain selected populations, as well as detention and deportation officers and supervisors who oversee the detention and removal of aliens, including those with special vulnerabilities. We also met with ICE medical staff in areas of responsibility with this position. In one area of responsibility, we limited our visit to a detention facility and met with the staff at that facility due to its proximity to another area of responsibility we visited. The information obtained from these site visits is not generalizable and may not be indicative of care provided to all populations at all detention facilities, but provided insights into how selected ICE areas of responsibility conduct enforcement activities and implement immigration enforcement policies. To address our third question, we reviewed multiple data sources that ICE uses to track information on certain aliens with special vulnerabilities in detention and matched these data with IIDS individual-level detention data to determine what ICE data show about detentions of selected populations between January 2015 and December 2018. To conduct our analysis, we first excluded records that contained missing alien numbers or alien numbers that were all zeroes. Then, we matched each data source to the IIDS detention data using alien number and excluded additional records we were unable to match. Because aliens may have multiple detentions, we compared the admission or book-in date from each data source with the book-in dates from the IIDS detention data, and excluded additional records with dates beyond 30 days apart. We analyzed this information to determine the total number of detentions for six of the eight selected populations (aliens who are: transgender, individuals with disabilities, pregnant, individuals with mental disorders, nursing, and elderly); and the number of detentions resulting from ICE versus CBP arrests; as well as detentions by criminality and the length of detention for each of these six populations. We excluded juveniles from our analysis because ERO is generally not responsible for detaining juveniles. To determine the extent to which ICE maintains data on detained parents or legal guardians of minors, we reviewed ICE policies pertaining to detained parents, including those that set forth requirements for tracking detained parents or legal guardians of U.S. citizens and legal permanent resident minors. We also interviewed ERO officials about ICE’s data collection processes and any limitations with the data it collects and maintains. We assessed ICE’s efforts to track this population against agency policy. To conduct our analysis of criminality for each population, we used ICE’s determination of criminality—criminal or non-criminal—which ICE determines by conducting electronic criminal history checks, as previously discussed. We also analyzed IIDS data on criminal charges for detentions of aliens that resulted from ICE arrests to determine the type of charges (e.g., immigration-related or other criminal charges) associated with these detentions. To conduct our analysis on length of detention, we compared initial book-in date with the most recent book-out date to calculate the total days in detention for each of our selected populations. Transgender Individuals: We matched ERO records for transgender detainees from calendar years 2016 through 2018 with IIDS individual-level detention data to determine the total number of detentions of transgender individuals, as well as the number of detentions by arresting agency, criminality, and length of detention. We excluded 4 of the unique transgender detainee records for 2016, 33 for 2017 and 27 for 2018. These records were excluded because we were unable to match these records to the IIDS individual level- detention data using alien number and book-in date combinations. According to ICE officials, this may be due to data entry errors. Our analysis is based on those records we were able to match: 228 for 2016, 241 for 2017, and 277 for 2018. ICE also recorded 55 transgender detainees in 2015; however, we excluded these records from our analysis since ICE did not collect complete data on this population in 2015. For the LGBTI population, ICE only collects and maintains data on transgender individuals in detention. Therefore, we were only able to analyze data for this subset of the LGBTI population. Individuals with Disabilities: We matched ERO records for individuals with communication and mobility impairments in ERO custody during calendar years 2017 and 2018 with IIDS individual- level detention data to determine the total number of detentions of these individuals, as well as the number of detentions by arresting agency, criminality, and length of detention. We excluded 5 of the unique detainee records for 2017, and 1 for 2018 because we were unable to match these records to the IIDS individual level-detention data using alien number and book-in date combinations. According to ICE officials, this may be due to data entry errors. Our analysis is based on those records we were able to match: 424 for 2017, and 516 for 2018. When ICE began collecting these data, it included aliens who were placed in detention prior to January 2017. We excluded 99 records for this reason from our analysis since ICE did not collect complete data on this population prior to January 2017. Pregnant Women: We matched ICE Health Service Corps (IHSC) records for pregnant women in ERO custody during calendar years 2016 through 2018 with IIDS individual-level detention data to determine the total number of detentions of pregnant women, as well as the number of detentions by arresting agency, criminality, and length of detention. We excluded 60 of the unique pregnant detainee records for 2016, 20 for 2017 and 32 for 2018 because we were unable to match these records to the IIDS individual-level detention data using alien number and book-in date combinations. According to ICE officials, this may be due to data entry errors. Our analysis is based on those records we were able to match: 1,377 for 2016, 1,150 for 2017, and 2,094 for 2018. ICE also recorded 675 pregnant detainees in 2015; however, we excluded these records from our analysis since ICE did not collect complete data on this population in 2015. Elderly Individuals: We analyzed data records in IIDS for elderly individuals (those 65 years or older at the time of initial book-in) in ERO custody during calendar years 2015 through 2018 to determine the total number of detentions of elderly individuals, as well as the number of detentions by arresting agency, criminality, and length of detention. According to ERO, the agency does not maintain separate data records for elderly individuals in ERO custody; however, ERO officials were able to identify these detainees by calculating their age at the time they were detained. We excluded 4 of the unique elderly detainee records for 2015, 3 for 2016 and 4 for 2018 because we were unable to match these records to the IIDS individual-level detention data using alien number and book-in date combinations. According to ICE officials, this may be due to data entry errors. Our analysis is based on those records we were able to match: 863 for 2015, 736 for 2016, 763 for 2017, and 1,132 for 2018. Individuals with Mental Disorders and Nursing Women: We matched IHSC records for individuals with mental disorders and nursing women detained at IHSC-staffed facilities during calendar years 2015 through 2018 with IIDS individual-level detention data to determine the total number of detentions of each of these populations, as well as the number of detentions by arresting agency, criminality, and length of detention. Because ICE did not maintain data on individuals with mental disorders or nursing women detained at the over 200 non-IHSC staffed facilities, our findings for these two populations are not generalizable, but provided valuable insights into these detentions. We excluded 207 of the unique detainee with mental disorders records for 2016, 850 for 2017, and 1,233 for 2018 because we were unable to match these records with the IIDS individual-level detention data using alien number and book-in date combinations. Our analysis is based on the unique detainee with mental disorders records we were able to match: 8,138 for 2015, 9,466 for 2016, 8,643 for 2017, and 8,501 for 2018. Similarly, we excluded 2 of the unique nursing detainee records for 2015, 3 for 2017 and 5 for 2018 for the same reason. Our analysis is based on the unique nursing detainee records we were able to match: 157 for 2015, 399 for 2016, 564 for 2017, and 381 for 2018. According to ICE officials, this may be due to data entry errors. We assessed the reliability of the data used in each of our analyses by analyzing available documentation, such as related data dictionaries; interviewing ERO officials knowledgeable about the data; conducting electronic tests to identify missing data, anomalies, or erroneous values; and following up with officials, as appropriate. We determined the data were sufficiently reliable for depicting general trends in detentions for the selected populations. We conducted this performance audit from November 2017 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The number of Enforcement and Removal Operations (ERO) administrative arrests (arrests) by gender, country of citizenship, ICE enforcement program, criminality, and area of responsibility from calendar years 2015 through 2018. The number of detentions by gender, country of citizenship, arresting agency, and criminality from calendar years 2015 through 2018. The number of removals by gender, country of citizenship, arresting agency, and criminality from calendar years 2015 through 2018. We analyzed individual-level Immigration and Customs Enforcement (ICE) data to identify ERO arrests, detentions, and removals during calendar years 2015 through 2018. The Number of Arrests Varied during the Period, Increasing Overall. The number of ERO arrests varied from calendar years 2015 through 2018, and increased more than 30 percent overall for the 4-year period (from 112,870 arrests in 2015 to 151,497 arrests in 2018). During the two years Priority Enforcement Program (PEP) was in effect, the number of ERO arrests varied little, decreasing 5 percent from 2015 to 2016. Following issuance of the 2017 DHS memo, ERO arrests increased 41 percent from 2016 to 2017, and stayed relatively the same from 2017 to 2018. Arrests by Gender. Each year from calendar years 2015 through 2018, arrests of males accounted for the majority of ERO arrests (ranging from 92 to 93 percent), as shown in figure 7. Arrests by Country of Citizenship. Each year from 2015 through 2018, ERO arrests of citizens of Mexico, Guatemala, El Salvador, and Honduras collectively accounted for about 86 percent of all ERO arrests, with individuals from Mexico accounting for the majority (ranging from 59 to 65 percent), as shown in figure 8. All other individual countries collectively accounted for about 14 to 15 percent of total arrests each year. Arrests by ICE Enforcement Program. Arrests of individuals from federal, state and local prisons and jails, through the Criminal Alien Program, accounted for the majority (ranging from 72 to 76 percent) of ERO arrests each calendar year from 2015 through 2018, as shown in figure 9. Arrests of individuals at-large through Fugitive Operations (ranging from 17 to 19 percent) and other programs accounted for the balance of the arrests each year. Criminal Alien Program arrests also accounted for most of the increase in ERO arrests in calendar years 2017 and 2018 (see figure 9). Arrests by Criminality. As shown in figure 10, the number and proportion of ERO arrests of non-criminals aliens increased each year from calendar years 2015 through 2018. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” Specifically, the arrests of non-criminals increased from 13,494 (12 percent of total arrests) in 2015 to 51,513 (34 percent of total arrests) in 2018. According to ERO officials, arrests of non-criminals include individuals who have been charged with but not convicted of a crime as well as those with no prior criminal history. The number of ERO arrests of convicted criminals stayed relatively stable from calendar years 2015 to 2018, ranging between about 91,000 and 107,000. Each of these years, arrests of convicted criminals comprised the majority of total arrests, but decreased from 88 percent in 2015 to 66 percent in 2018. Most arrests of convicted criminals resulted from the Criminal Alien Program (ranging from 76 to 80 percent), followed by Fugitive Operations (ranging from 15 to 19 percent). Arrests by Areas of Responsibility. The number of ERO arrests increased in all ERO areas of responsibility when comparing calendar years 2015 and 2016, when PEP was in effect, to calendar years 2017 and 2018, following implementation of the 2017 DHS memo. These increases ranged from less than 1 percent increase in the Los Angeles area of responsibility to a 99 percent increase in the Miami area of responsibility. Arrests of convicted criminals accounted for the majority of total arrests in all areas of responsibility. However, the proportion of arrests of convicted criminals to total arrests decreased in all areas of responsibility from 2015 and 2016 to 2017 and 2018. This decrease is partially due to the increase in the number of ERO arrests of non- criminals in all areas of responsibility during these years. Table 9 presents total numbers of ERO arrests for each of ERO’s 24 areas responsibility nationwide. It also presents the percentage of arrests of convicted criminals by area of responsibility for calendar years 2015 and 2016 combined and calendar years 2017 and 2018 combined. The Number of Detentions Varied, Increasing Overall. The number of ERO detentions varied from calendar years 2015 through 2018, and increased more than 30 percent overall for the 4-year period (from 324,320 detentions in 2015 to 438,258 detentions in 2018). ERO detention data include detentions resulting from both ICE and CBP arrests. During the two years PEP was in effect, the number of ERO detentions increased 13 percent, from 324,320 in 2015 to 366,740 in 2016. Following issuance of the 2017 DHS memo, ERO detentions decreased 15 percent from 2016 to 2017 (from 366,740 to 310,309 detentions), and increased 41 percent from 2017 to 2018 (to 438,258 detentions). Detentions by Gender. Each year from calendar years 2015 through 2018, detentions of males accounted for the majority of ERO detentions (ranging from 74 to 81 percent), as shown in figure 11. Detentions by Country of Citizenship. Each year from 2015 through 2018, ERO detentions of citizens of Mexico, Guatemala, El Salvador, and Honduras collectively accounted for the most detentions (ranging from 84 to 89 percent). All other individual countries collectively accounted for 11 to 16 percent of total detentions each year, as shown in Figure 12. Detentions by Arresting Agency. Detentions resulting from CBP arrests at or between ports of entry accounted for the majority of ERO detentions each year from calendar years 2015 through 2018 (ranging from 52 to 71 percent). Detentions resulting from CBP arrests also accounted for most of the variation in detentions from year to year, as shown in figure 13. Detentions resulting from ICE arrests varied little from 2015 to 2016, increased in 2017, and then varied little from 2017 to 2018. Detentions by Criminality. As shown in figure 14, the number of ERO detentions of non-criminals varied, but increased overall from calendar years 2015 to 2018. These detentions accounted for the majority of total ERO detentions each year (ranging from 53 to 64 percent). The variation in the number of detentions of non-criminals was partially due to fluctuations in detentions that resulted from CBP arrests. The number of ERO detentions of convicted criminals stayed relatively stable from 2015 to 2018, and accounted for the minority of total ERO detentions (ranging from 36 to 47 percent). The majority of these detentions resulted from ICE arrests (ranging from 64 to 76 percent) rather than CBP arrests. The Number of Removals Varied, Increasing Overall. The number of ERO removals varied from calendar years 2015 through 2018, and increased 13 percent overall for the 4-year period (from 231,559 removals in 2015 to 261,523 removals in 2018). ERO removal data include removals resulting from both ICE and CBP arrests. During the two years PEP was in effect, the number of ERO removals varied little, increasing 6 percent from 2015 to 2016. Following issuance of the 2017 DHS memo, ERO removals decreased 12 percent in 2017, and increased 21 percent from 2017 to 2018. Removals by Gender. Removals of male aliens accounted for most of ERO removals (about 90 percent) each year from calendar years 2015 through 2018, as shown in figure 15. Removals by Country of Citizenship. In addition, from calendar years 2015 through 2018, ERO removals of citizens of Mexico, Guatemala, El Salvador, and Honduras collectively accounted for most of the removals each year (ranging from 90 to 94 percent). Citizens of all other countries collectively accounted for 6 to 10 percent of total removals each year, as shown in figure 16. Removals by Arresting Agency. Each year, removals resulting from CBP arrests at or between ports of entry accounted for the majority of total ERO removals (ranging from 60 to 74 percent). ERO removals resulting from CBP arrests also accounted for most of the variation in total removals from year to year, as shown in figure 17. Removals by Criminality. The number and proportion of ERO removals of non-criminals varied, but increased overall, from calendar years 2015 through 2018, as shown in figure 18. Specifically, removals of non- criminals increased from 40 percent of total removals in 2015 to 43 percent of total removals in 2018. Most removals of non-criminals resulted from CBP arrests (ranging from 80 to 95 percent), rather than ICE arrests. ERO removals of convicted criminals varied, increasing overall, from calendar years 2015 to 2018, and accounted for the majority of total ERO removals each year (ranging from 55 to 60 percent). Removals of convicted criminals resulted from CBP and ICE arrests at approximately equal levels. This appendix presents the overall number of Enforcement and Removal Operations (ERO) administrative arrests (arrests), detentions, and removals of males from calendar years 2015 through 2018, including the number of arrests by criminality and the number of detentions and removal by criminality and arresting agency. We analyzed individual- level Immigration and Customs Enforcement (ICE) data to identify ERO arrests, detentions, and removals of males during calendar years 2015 through 2018. The Number of Arrests of Males Generally Increased. The number of ERO arrests of males varied from calendar years 2015 through 2018 but generally increased by 32 percent across the period, as shown in figure 19. During the two years the Priority Enforcement Program (PEP) was in effect, between calendar years 2015 and 2016, the number of ERO arrests remained stable, decreasing by about 5 percent in that period. The following year, after the issuance of the 2017 DHS memo in February 2017, ERO arrests increased by about 40 percent from calendar years 2016 to 2017, and decreased by less than 1 percent in calendar year 2018. Arrests of Males by Criminality. During the same time, the proportion of ERO arrests of convicted criminal males decreased each year from 90 percent of total arrests of males in calendar year 2015 to 69 percent in calendar year 2018, as shown in figure 19. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” Conversely, the proportion of ERO arrests of non-criminal males increased each year, from 10 percent of total arrests of males in calendar year 2015 to 31 percent of total arrests in calendar year 2018. According to officials, arrests of non-criminals include individuals who have been charged with but not convicted of a crime as well as those with no prior criminal history. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” According to ICE officials, administrative arrests of non-criminals include individuals who have been charged with but not convicted of a crime as well as those with no prior criminal history. According to ICE, ICE officers electronically request and retrieve criminal history information about an alien from the FBI’s National Crime Information Center database, which maintains a repository of federal and state criminal history information, and other sources. We used ICE’s determination of criminality for our analysis. Detentions of Males Increased Overall. The number of ERO detentions varied from calendar years 2015 through 2018, but increased overall by 32 percent over the period, as shown in figure 20. ERO detention data include detentions resulting from both ICE and U.S. Customs and Border Protection (CBP) arrests. During the two years PEP was in effect, the number of ERO detentions of males increased by more than 8 percent from calendar years 2015 to 2016. Following the issuance of the 2017 DHS memo, the number of male detentions decreased by more than 8 percent in calendar year 2017, and increased again in calendar year 2018, by over 32 percent. Detentions of Males by Arresting Agency. Detention of males resulted from both ICE and CBP arrests from calendar years 2015 through 2018, as shown in figure 20. For all the years in this period, except calendar year 2017, detentions resulting from a CBP arrest at or between ports of entry account for the majority of the detentions of males (ranging from about 58 to 63 percent). In calendar year 2017, detentions resulting from ICE arrests accounted for about 56 percent of all male detentions. Detentions of Males by Criminality. During the same time, the number and proportion of ERO detentions of convicted criminal males varied, ranging from 45 to 57 percent of all detentions of males, as shown in figure 21. The majority of these detentions resulted from ICE arrests, ranging from 66 to 77 percent of all convicted criminal male detentions. The number of ERO detentions of non-criminal males also varied, ranging from 43 to 55 percent of all detentions of males. Detentions of non- criminal males primarily resulted from CBP arrests, which ranged from 69 to 93 percent of detentions of non-criminal males between calendar years 2015 and 2018. Removals of Males Increased Overall. The number of ERO removals of males varied from calendar years 2015 through 2018, but increased overall by 14 percent over the period, as shown in figure 22. ERO removal data include removals resulting from both ICE and CBP arrests. During PEP, which was in effect from calendar years 2015 and 2016, the number of ERO removals of males increased by about 6 percent. From calendar years 2016 to 2017, following the issuance of the 2017 DHS memo, the number of these removals decreased by more than 11 percent, then increased by more than 20 percent in calendar year 2018. Removals of Males by Arresting Agency. From calendar years 2015 to 2018, the majority of ERO removals of males resulted from CBP arrests at or in between ports of entry (ranging from 58 to 72 percent), as shown in figure 22. Removals of Males by Criminality. From calendar years 2015 through 2018, ERO removals of convicted criminal males accounted for the majority of removals each year, ranging from 58 to 63 percent of the total removal of males, as shown in figure 23. The removals of convicted criminal males were the result of both CBP and ICE arrests. For all the years in this period, except calendar year 2017, removals resulting from a CBP arrest account for the majority of the removals of convicted criminal males (ranging from about 52 to 56 percent). In calendar year 2017, removals resulting from ICE arrests accounted for about 56 percent of all removals of convicted criminal males. ERO removals of non-criminal males varied, increasing overall, from calendar years 2015 to 2018, and accounted for the minority of ERO removals of males each year (ranging from 37 to 42 percent). Most of the removals of non-criminal males were as a result of CBP arrests, ranging from 79 to 95 percent of all removals of non-criminal males. This appendix presents the overall number of Enforcement and Removal Operations (ERO) administrative arrests (arrests), detentions, and removals of females from calendar years 2015 through 2018, including the number of arrests by criminality and the number of detentions and removals by criminality and arresting agency. We analyzed individual- level Immigration and Customs Enforcement (ICE) data to identify ERO arrests, detentions, and removals of females during calendar years 2015 through 2018. The Number of Arrests of Females Generally Increased. The number of ERO arrests of females generally increased more than 70 percent from calendar years 2015 through 2018, as shown in figure 24. Between 2015 and 2016, the two years the Priority Enforcement Program (PEP) was in effect, the number of ERO arrests remained stable, decreasing by less than 1 percent in that period. Following the issuance of the 2017 DHS memo, ERO arrests increased by 65 percent from calendar years 2016 to 2017, and increased by less than 5 percent in calendar year 2018. Arrests of Females by Criminality. During the same time, the proportion of arrests of non-criminal females increased each year from 43 percent in calendar year 2015 to 63 percent of total arrests of females in calendar year 2018. For the purposes of this report and our presentation of ICE data, we refer to potentially removable aliens without criminal convictions known to ICE as “non-criminals” and aliens with criminal convictions known to ICE as “convicted criminals.” According to officials, arrests of non-criminals include individuals who have been charged with but not convicted of a crime as well as those with no prior criminal history. Conversely, the proportion of ERO arrests of convicted criminal females decreased each year from 57 percent in calendar year 2015 to 37 percent in calendar year 2018, as shown in figure 24. Detentions of Females Increased Overall. The number of ERO detentions varied from calendar years 2015 through 2018, and increased more than 45 percent over the period, as shown in figure 25. ERO detention data include detentions resulting from both ICE and U.S. Customs and Border Protection (CBP) arrests. During the two years PEP was in effect, the number of ERO detentions of females increased by more than 28 percent from calendar years 2015 through 2016. Following the issuance of the DHS memo, the number of detentions decreased by about 36 percent in 2017, then increased by over 77 percent in calendar year 2018. Detentions of Females by Arresting Agency. Detentions of females resulting from CBP arrests at or between ports of entry accounted for most of the detentions of females each year from calendar years 2015 through 2018 (ranging from 84 to 94 percent), as shown in figure 25. Detentions of Females by Criminality. As shown in figure 26, the number of ERO detentions of non-criminal females varied, but increased overall from calendar years 2015 to 2018. These detentions accounted for most of the total ERO detentions of females each year (ranging from 87 to 92 percent). Most of the detention of non-criminal females resulted from CBP arrests (ranging from 91 to 98 percent) rather than ICE arrests. The number of ERO detentions of convicted criminal females stayed relatively stable from calendar years 2015 through 2018, and accounted for the minority of total ERO detentions (ranging from 8 to 13 percent). CBP and ICE arrests accounted for approximately the same number of detentions of convicted criminal females. Removals of Females Increased Overall. The number of ERO removals of females remained relatively stable from calendar years 2015 through 2018, but increased overall by 6 percent over the period, as shown in figure 27. ERO removal data include removals resulting from both ICE and CBP arrests. During the PEP, which lasted from calendar years 2015 and 2016, the number of ERO removals increased by more that 2 percent. From calendar years 2016 to 2017, following the issuance of the 2017 DHS memo, the number of ERO removals decreased by more than 14 percent, then increased by more than 20 percent in 2018. Removals of Females by Arresting Agency. Each calendar year, removals resulting from CBP arrests at or between ports of entry accounted for most of the ERO removals of females (ranging from 80 to 90 percent), as shown in figure 27. Removals of Females by Criminality. From calendar years 2015 through 2018, the majority of ERO removals were of non-criminal females (ranging from 66 to 72 percent), as shown in figure 28. Most removals of non-criminal females resulted from CBP arrests (ranging from 88 to 97 percent), rather than ICE arrests. ERO removals of convicted criminal females varied, increasing overall, from calendar years 2015 to 2018, and accounted for the minority of ERO removals of females each year (ranging from 28 to 34 percent). The majority removals of convicted criminal females also resulted from CBP arrests (ranging from 56 to 71 percent). This appendix presents the overall number of Enforcement and Removal Operations (ERO) administrative arrests (arrests) of juveniles—persons encountered by ERO who have not reached 18 years of age—as well as the number of juvenile arrests by age and gender. We analyzed individual-level Immigration and Customs Enforcement (ICE) data to identify the number of ERO arrests of juveniles during calendar years 2015 through 2018. The Number of Arrests of Juveniles Increased Overall. The number of ERO arrests of juveniles increased overall by 53 percent from calendar years 2015 through 2018, as shown in figure 29. During the two years the Priority Enforcement Program was in effect, ERO arrests of juveniles increased 47 percent (from 887 arrests in 2015 to 1,307 arrests in 2016). Following issuance of the 2017 DHS memo, ERO arrests of juveniles increased 76 percent in calendar year 2017 (2,294 arrests), and decreased 41 percent in calendar year 2018 (1,361 arrests). Arrests of Juveniles by Age. The proportion of arrests for juveniles of all age groups—ages 0 to 6, 7 to 12, and 13 to 17—varied between calendar years 2015 and 2018, as shown in figure 30. For instance, the proportion of arrests of juveniles ages 0 to 6 between calendar years 2015 and 2018, ranged from 31 to 43 percent of the total number of arrests of juveniles. The proportion of arrests of juveniles ages 7 to 12 ranged from 16 percent to 23 percent of total arrests of juveniles during this same period while arrests of juveniles ages 13 to 17, during the same period ranged from 34 percent to 50 percent of total arrests of juveniles. Arrests of Juveniles by Gender. Each calendar year from 2015 through 2018, arrests of male juveniles accounted for the majority of ERO arrests of juveniles (ranging from 57 to 66 percent), as shown in figure 31. This appendix presents the number of U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) administrative arrests by country of citizenship for calendar years 2015 through 2018. Each year from 2015 through 2018, ERO administratively arrested aliens from over 200 countries. This appendix presents the number of U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) detentions by country of citizenship for calendar years 2015 through 2018. Each year from 2015 through 2018, ERO detained aliens from over 200 countries. This appendix presents the number of U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) removals by country of citizenship for calendar years 2015 through 2018. Each year from 2015 through 2018, ERO removed aliens from almost 200 countries. This appendix presents the number and type of criminal charges of U.S. Immigration and Customs Enforcement (ICE) Enforcement and Removal Operations (ERO) detentions of selected populations (aliens who are: transgender, individuals with disabilities, pregnant, individuals with mental disorders, women who are nursing, or individuals who are elderly) resulting from ICE arrests. ICE administrative arrests of aliens for civil violations of U.S. immigration laws include arrests of both aliens with prior criminal convictions and those without prior criminal convictions. According to ICE, ICE officers electronically request and retrieve criminal history information about an alien from the FBI’s National Crime Information Center (NCIC) database, which maintains a repository of federal and state criminal history information. ICE officers are also able to manually enter criminal history information in ICE’s data system if they discover additional criminal history information that was not available in NCIC. ICE officers may also check for criminal convictions committed outside the United States, on a case by case basis. To identify which convictions or charges were immigration-related for these selected populations, we reviewed the criminal history information recorded in ICE’s data system by ICE officers. m ICE collected data to identify each of these populations beginning at different timeframes or subsets within the population, as shown below. For information on the number of detentions of selected populations resulting from ICE arrests by criminal charge type, see tables 13 through 18. This appendix presents the length of U.S. Immigrations and Customs Enforcement (ICE) Enforcement and Removal Operations detentions of selected populations—aliens who are: transgender, individuals with disabilities, pregnant, individuals with mental disorders, women who are nursing, or individuals who are elderly. Available ICE data varied for each of these populations because ICE began collecting these data at different time periods. In addition, the length of some detentions from a particular year may be undetermined because they were still ongoing at the time of our review (as of May 15, 2019). We present available data for each of the populations. Detentions of Transgender Individuals. Based on available records each year from 2016 through 2018, the majority of detentions of transgender individuals were 90 days or less (ranging from 62 to 70 percent), as shown in table 19. Detentions of Individuals with Disabilities. Based on available records in calendar years 2017 and 2018, the majority of detentions of individuals with disabilities were 90 days or less (56 and 65 percent, respectively), as shown in table 20. Detentions of Pregnant Women. From calendar years 2016 through 2018, the majority of detentions of pregnant women were 15 days or less (ranging from 71 to 93 percent), as shown in table 21. Detentions of Individuals with Mental Disorders at ICE Health Service Corps-staffed facilities. Based on available records each year from calendar years 2015 through 2018, the majority of detentions of individuals with mental disorders at ICE Health Service Corps (IHSC)- staffed facilities were 90 days or less (ranging from 59 to 71 percent), as shown in table 22. Detentions of Nursing Women at IHSC-staffed facilities. From calendar years 2015 through 2018, most detentions of nursing women at IHSC-staffed facilities were 30 days or less (ranging from 77 to 97 percent), as shown in table 23. Detentions of Elderly Individuals. Based on available records each year from calendar years 2015 through 2018, most of the detentions of elderly individuals were 90 days or less (ranging from 80 to 84 percent), with the majority being of 30 days or less, as shown in table 24. In addition to the contact name above, Meg Ullengren (Assistant Director), Carissa Bryant (Analyst-in-Charge), Hiwotte Amare, Michele Fejfar, Eric Hauswirth, Dainia Lawes, Marycella Mierez, Heidi Nielson, and Claire Peachey made key contributions to this report.", "summary": "In January 2017, the President issued Executive Order 13768 that instructs the Department of Homeland Security (DHS) to enforce U.S. immigration law against all removable individuals. In February 2017, the Secretary of DHS issued a memorandum (2017 DHS memo) establishing policy and providing guidance related to the Executive Order. Within DHS, ICE is responsible for providing safe confinement for detained aliens, including certain vulnerable populations. GAO was asked to review ICE immigration enforcement priorities, including those for vulnerable populations. This report examines (1) ICE data on arrests, detentions, and removals from calendar years 2015 through 2018; (2) the policies in effect for selected populations and any changes ICE made to align these policies with the 2017 DHS memo; and (3) the extent to which ICE collects data on selected populations and what those data show. GAO analyzed ICE data on arrests, detentions, and removals from calendars years 2015 through 2018; reviewed policies and documents on eight populations GAO selected based on ICE policies and input from organizations that represent various vulnerable populations; and interviewed agency officials. The numbers of administrative arrests (arrests), detentions, and removals of aliens (people who are not citizens or nationals of the United States) by U.S. Immigration and Customs Enforcement (ICE) varied during calendar years 2015 through 2018, and increased overall for the period. Males, aliens from four countries—Mexico, Guatemala, El Salvador, and Honduras—and convicted criminals accounted for the majority of ICE arrests and removals. The majority of detentions were made up of males, aliens from the same four countries, and non-criminals. ICE has policies related to six of the selected populations GAO examined, including aliens who are: transgender, individuals with disabilities, individuals with mental disorders, juveniles, parents of minors, and pregnant. These policies provide guidance on identifying, detaining, caring for, and removing aliens in these populations. After issuance of the 2017 DHS memo, ICE removed language from its existing policies for individuals who are pregnant and parents of minors that it determined to be inconsistent with 2017 DHS memo. Available ICE detention data show that detentions of transgender and pregnant individuals increased from calendar years 2016 to 2018 and detentions of individuals with disabilities increased from 2017 to 2018. Detentions at facilities staffed by ICE medical personnel of individuals with mental disorders and women who are nursing varied from calendar years 2015 to 2018. We found that ICE does not collect or maintain readily available data on detained parents or legal guardians of U.S. citizen or legal permanent resident minors, as required by ICE policy. Without such information, ICE headquarters officials cannot ensure that ICE officers are collecting and entering this information into the system as required by policy. ICE officials said they have considered actions to identify this population, but are no longer considering these actions as of October 2019. Maintaining these data in a readily available format could help ensure that ICE personnel identify, evaluate, and share information on this population. GAO is recommending that ICE collect readily available data on detained parents or guardians of U.S. citizen and legal permanent resident minors. DHS did not concur with the recommendation. GAO continues to believe this recommendation is valid as discussed in the report.", "document_type": "gao"}
{"report": "According to EPA, risk assessments provide information on potential health or ecological risks. Information from risk assessments, in combination with other information, provides the basis for risk management actions, as illustrated in the risk assessment model in figure 1. EPA may also consider scientific and economic factors; court decisions; and social, technological, and political factors during the risk management process. A number of program and regional offices at EPA prepare chemical risk assessments. These risk assessments in turn provide the foundation for EPA’s risk management decisions, such as whether EPA should establish air and water quality standards to protect the public from exposure to toxic chemicals. To prepare these risk assessments, some EPA program and regional offices often rely in part on chemical assessments that the IRIS Program, as part of ORD, prepares. IRIS assessments generally include the first two steps of the risk assessment process seen in green in figure 1: (1) hazard identification and (2) dose-response assessment. Hazard identification identifies credible health hazards associated with exposures to a chemical; dose-response assessment characterizes the quantitative relationship between chemical exposure and each credible health hazard. The program derives toxicity values through this quantitative relationship. These toxicity values are combined with exposure assessments (produced by other offices within EPA) to produce a risk assessment. OCSPP, which oversees TSCA implementation, also prepares chemical risk assessments, though it does not generally rely on IRIS toxicity values. OCSPP’s risk evaluations provide the foundation for a risk management action under TSCA if a use is found to present unreasonable risk of injury to human health or the environment. Risk management actions under TSCA can include but are not limited to restrictions or bans on a chemical or a condition of use, limitations on processing or manufacture, or changes to product labeling. Figure 2 shows EPA’s organizational structure, including the program and regional offices that prepare chemical risk assessments. EPA created the IRIS Program in 1985 to help develop consensus opinions within EPA about the health effects from lifetime exposure to chemicals. The IRIS database of chemical assessments contains EPA’s scientific positions on the potential human health effects that may result from exposure to various chemicals in the environment, and as of November 2018, it included information on 510 chemicals. Based on our body of work on the IRIS Program, the program’s importance has increased over time as EPA program offices and regions have increasingly relied on IRIS chemical assessments in making environmental protection and risk management decisions. In addition, state and local environmental programs, as well as some international regulatory bodies, rely on IRIS chemical assessments in managing their environmental protection programs. The IRIS Program uses a seven-step process to produce chemical assessments, as shown in figure 3. The first step in the assessment development process is developing a draft assessment. This begins with IRIS Program staff determining the scope and initial problem formulation of an assessment in consultation with EPA program and regional offices. This information is documented in an IRIS Assessment Plan and released for agency and public comment. After obtaining feedback on the IRIS Assessment Plan, IRIS Program staff prepare an assessment protocol for public comment that describes the methods that IRIS will use to conduct the assessment. During Step 1 (Scoping and Problem Formulation) IRIS Program staff conduct preliminary searches of scientific literature and screen relevant studies to understand the extent and nature of the available evidence. This informs the level of effort, identifies areas of scientific complexity, and helps the IRIS Program estimate time frames for conducting the assessment. The program staff select and extract relevant data and analyze and integrate the evidence into the draft assessment. The final step in preparing the draft assessment is deriving chemical toxicity values. After these draft development steps (step 1 in fig. 3), the draft assessment goes through internal agency and interagency review, public comment, and peer review, as shown in steps 2 through 4 in figure 3. After making revisions to address comments received (step 5), the assessment goes through another round of internal and interagency review (steps 6a and 6b), and then the program finalizes and posts the assessment to the IRIS website. According to IRIS officials, in order to prepare IRIS assessments, a group of staff with specialized skills are required. On any given assessment, approximately a dozen staff drawn from several different backgrounds (e.g., toxicologists and epidemiologists) work on each assessment. While some of the assessment preparation—that is, setting up database searches and performing initial search screenings—can be performed by any staff, other parts of assessment development require that the staff have specific expertise. The IRIS assessment development process—and the associated implementation of systematic review processes—has continued to evolve since 2011, primarily as a result of NAS recommendations made in two reports issued in 2011 and 2014. The 2011 report was a NAS peer review of the IRIS assessment of formaldehyde. In that report, NAS recommended several changes to the formaldehyde assessment and also offered recommendations more generally about the IRIS assessment development process. For example, NAS recommended methods for identifying evidence to be included in IRIS assessments; assessing and weighting that evidence in preparing the assessment; selecting studies that are used for calculating toxicity; and documenting how those toxicity calculations are carried out. A House appropriations committee report for fiscal year 2015 directed EPA to implement the 2011 report’s recommendations and NAS to review the changes that EPA was making (or proposing to make). In its review, NAS made additional recommendations to the program. In April 2018, NAS released a report on the IRIS Program’s responses to the 2014 recommendations. IRIS assessments are one potential source of information for risk assessors in OCSPP who conduct risk evaluations informing risk management activities under TSCA. The purpose of risk evaluation is to determine whether a chemical substance presents an unreasonable risk to human health or the environment. TSCA authorizes EPA to evaluate and, if appropriate, regulate existing chemicals and new chemicals. TSCA generally covers chemicals manufactured, imported, processed, distributed in commerce, used, or disposed of in the United States. If EPA finds that any of these activities with respect to a specific chemical presents an unreasonable risk of injury to health or the environment, EPA must issue regulations that can, among other things, restrict or prohibit these activities. TSCA also specifies the information obtained from chemical companies that EPA must publicly disclose and the circumstances under which chemical companies can claim certain information, such as data about chemical processes, as confidential business information. EPA’s OPPT within the Office of Chemical Safety and Pollution Prevention manages risk assessment and risk management strategies for chemicals under TSCA. According to EPA officials, OPPT’s Risk Assessment Division uses a number of different streams of information—including IRIS assessments—to prepare chemical risk assessments in order to make determinations about the safety of chemicals, and the Chemical Control Division uses those risk assessments to prepare risk management plans for chemicals. Prior to 2016, environmental and industry stakeholder organizations expressed concern that public confidence was decreasing regarding the safe use of chemicals in commerce and that federal oversight should be strengthened. For example, according to an American Bar Association new TSCA guide, the desire for reform was driven by a proliferation of state-based chemical initiatives threatening to disturb interstate commercial transactions and by a continuing erosion of public confidence in TSCA’s ability to protect human health and the environment from unreasonable risks presented by chemicals. In addition, according to a statement from the Environmental Defense Fund, federal oversight could not keep pace with science or rapidly expanding production and use of chemicals. In June 2016, Congress passed the Lautenberg Act, which amended TSCA in several ways. Table 1 summarizes some of the major changes in the act, along with the purpose and application of TSCA’s major sections. Since passage of the Lautenberg Act, several areas of disagreement have arisen among stakeholders regarding the implementation of various aspects of the act. One of the main points of ongoing discussion centers on what conditions of use EPA must consider in a chemical risk evaluation under TSCA. EPA and some stakeholders also disagree on other areas such as the methodologies EPA uses in its systematic review approach, the extent to which companies’ data are exempt from disclosure, and the extent to which the fees rule accurately reflects EPA’s costs for implementing TSCA. Some of these issues have resulted in litigation. The IRIS Program has addressed many process challenges, such as by making changes to address the length of time it takes to develop chemical assessments and to increase transparency, but EPA has not made progress toward producing chemical assessments. However, the release of documents related to IRIS assessments was delayed for nearly 6 months because EPA leadership instructed the IRIS Program not to release any assessment documentation pending the outcome of EPA leadership deliberations concerning IRIS Program priorities. The IRIS Program in 2011 began making changes to address identified challenges, particularly the length of time the program took to produce assessments and the level of transparency in how the program prepared assessments. The program has made some progress since the beginning of 2017 toward producing assessments and is ready to release assessment-related documents. These changes were made in response to program implementation challenges identified by governmental, industry, academic, and non-governmental stakeholders in recent years. For example, in its 2011 report, NAS identified timeliness and transparency as issues. In our review of the 2011 and 2014 NAS reports and other documentation as well as our interviews with IRIS officials and leadership and officials in program and regional offices that use IRIS assessments, we identified the key actions the IRIS Program has taken to address lack of timeliness in producing assessments and lack of transparency in how it produces assessments. Developing IRIS assessments has historically been a lengthy process. Because of the rigor of the IRIS process and the amount of literature that program staff must search and consider, producing an assessment typically takes several years, as we found in December 2011. Program and regional offices that use IRIS assessments understand this, and officials from several program and regional offices told us that despite the length of time it takes for the IRIS Program to complete its assessments, they prefer these assessments as sources of information over other agencies’ toxicity assessments. To address the length of time it takes to produce assessments, the IRIS Program is (1) employing project management principles and specialized software that enable the program to better plan assessment schedules and utilize staff to make the systematic review process more efficient; (2) focusing on better scoping assessments to create timely, fit-for-purpose products that address specific agency needs; and (3) streamlining the peer review process as much as possible. The Program Has Adopted Project Management Principles and New Software The first way in which the IRIS Program is addressing the length of time it takes to produce assessments is by utilizing project management principles and new software that enable the program to better plan assessment schedules and utilize staff. IRIS officials said that by using these tools, IRIS staff are able to view project tasks, timelines, and milestones to manage their individual tasks and assessment work. For example, IRIS officials said that as part of an EPA-wide initiative, they began incorporating lean management techniques, which aim to improve efficiency and effectiveness by reducing unnecessary process steps and waiting time. Additionally, IRIS officials said that they have begun using a staffing model that trains staff to be proficient in all phases of the systematic review process (i.e., screening, data extraction, study evaluation, and evidence synthesis). This modularity will make it easier for staff to work across teams and on multiple projects, assisting with systematic review needs while also contributing in their areas of expertise, according to IRIS Program officials. In addition, the IRIS Program began using both project management software and business intelligence and visualization software in 2017. IRIS Program leadership is using this software to generate resource allocation reports showing staff assignments, enabling leadership to better manage staff workloads. According to IRIS officials, the recent adoption of specialized systematic review software also enables program staff to perform more literature searches faster, and the ability to filter search results allows staff to find more quickly the most relevant information for an assessment. Use of software tools with machine-learning capabilities facilitate program staff’s ability to screen studies for relevance more quickly compared to approaches used before 2017. Prior to the adoption of these specialized software tools, much of the development of an assessment was manual (i.e., using a spreadsheet). For example, for one assessment developed manually, contactors working on an IRIS assessment took over 200 hours to screen and catalog 1,200 epidemiological studies, including carrying out quality assurance checks. By comparison, using machine-learning tools, EPA staff were able to screen almost 5,500 articles in about 30 hours. With the new tools, quality assurance was embedded into the workflow by having two independent reviewers and a software-facilitated process track and resolve screening conflicts. Additionally, an official from EPA’s National Health and Environmental Effects Research Laboratory said that the laboratory uses a similar screening process. The laboratory worked with the IRIS Program to identify similar constructs in their processes and used each other’s results to make changes and validate tools used by both. According to IRIS officials, as a result, the use of these tools has created more efficient workflow processes, leading to considerable cost and time savings. The incorporation of systematic review software tools has greatly helped the program more efficiently carry out tasks like screening literature, evaluating study quality, extracting data, and developing visualizations, according to IRIS Program officials we interviewed. Most importantly, the software tools allow multiple staff members to work on tasks simultaneously, rather than one at a time, facilitating concurrent completion of key assessment pieces. The Program Tailors Assessments to Program and Regional Office Needs The second way in which the IRIS Program is reducing the length of time it takes to produce assessments is by tailoring them to program and regional office needs, called fit-for-purpose assessments. According to IRIS officials, part of the reason assessments historically were time- consuming was because the program tried to synthesize and present all possible information on the human health effects of a particular chemical, including multiple exposure pathways (e.g., inhalation, ingestion, or dermal) and reference doses, reference concentrations, and cancerous and non-cancerous effects. This required large amounts of data extraction and was very time intensive. Beginning in early 2017, the program began implementing the fit-for-purpose approach to producing assessments. IRIS officials said the idea is that instead of producing a wide-ranging assessment, the program can produce assessments that are more limited in scope and targeted to specific program and regional office needs, reducing the amount of time IRIS staff needed to search for information, synthesize it and draft, review, and issue an assessment. For example, if the Office of Air and Radiation needed a chemical assessment that examined only inhalation exposures, the IRIS Program could limit its assessment to a single exposure pathway, which would reduce the amount of data that staff review and extract and, with less text to draft and less complex peer reviews, allow the assessment to more quickly move through the process. IRIS officials said that if offices make subsequent requests for other effects or exposure pathways, the IRIS Program can update the original assessment. IRIS officials said that they expect time savings as a result of moving to the fit-for-purpose model. As of November 1, 2018, the IRIS Program had produced two fit-for-purpose assessments: a request for correction on chloroprene and an update of the assessment on acrolein. An assessment on perfluorobutane sulfonic acid (PFBS) was also released for public comment following peer review. PFBS are a member of a class of man-made chemicals known as per- and polyfluoroalkyl substances (PFAS)—a groups that also includes perfluorooctane sulfonate acid (PFOS), perfluorooctanoic acid (PFOA), GenX, and many others. In addition, since 2017, the IRIS Program released scoping and problem formulation materials for six IRIS chemical assessments (nitrates/nitrites, chloroform, ethylbenzene, uranium, ammonia, and naphthalene). Additionally, the program is examining ways to assist program and regional offices with information that may not necessitate developing a full assessment. For example, the Office of Air and Radiation was doing work using a toxicity value for acrolein that the California Environmental Protection Agency prepared in 2008, because that value was more recent than the value in the IRIS database. However, a large number of studies on acrolein had been released since 2008, so the IRIS Program searched approximately 10,000 new studies and concluded that the study used by California Environmental Protection Agency in 2008 was still the most appropriate study for chronic toxicity value derivation. In addition, IRIS staff developed an updated draft reference concentration for acrolein based on this study. The screening and update process took approximately 4 months, demonstrating how the IRIS Program’s use of new tools and a targeted scope resulted in more timely attention to program office needs. The Program Is Streamlining the Peer Review Process The third way the IRIS Program is addressing the length of time it takes to produce assessments is by streamlining the peer review process as much as possible without compromising the quality of the review. EPA guidelines require peer review of all IRIS assessments. Smaller, less complex assessments may be peer reviewed through a contractor-led letter review or panel; more complex assessments are usually reviewed by a full Scientific Advisory Board (SAB) or a NAS panel, though IRIS leadership determines the most appropriate method of peer review based on Office of Management and Budget and EPA Peer Review Handbook guidelines. While the contractor-led letter or panel reviews are no less robust than full SAB or NAS panel reviews, the contractor-led reviews are usually smaller and completed in less time because they are reviewing smaller, less complex IRIS assessments. The time savings occur because the reviewers do not typically meet in person, or may meet only once, typically taking a few months to complete their reviews. In contrast, SAB and NAS panels involve larger numbers of people who meet multiple times, review longer and more complex assessments, and must reach consensus on their reviews. As a result, SAB and NAS peer reviews can take more than a year to complete. IRIS officials said that as they try to produce more fit-for-purpose assessments that are smaller in scope, they plan to utilize letter reviews as appropriate, to streamline the peer review process. IRIS Program officials said they also hope that other changes they recently implemented—primarily, increased transparency and systematic review—will help speed up the peer review process by producing a higher-quality overall draft. Another major category of NAS recommendations that the IRIS Program has addressed is the need for greater transparency in how the program conducts assessments. For example, one industry representative expressed concern in August 2018 about transparency before the program began making changes, describing the IRIS Program as a “black box” because “no one knew how the program created its methodologies, weighted evidence, or produced assessments.” In response, the IRIS Program has in the past several years (1) implemented systematic review, which provides a structured and transparent process for identifying relevant studies, reviewing their methodological strengths and weaknesses, and integrating these studies as part of a weight of evidence analysis, and (2) increased outreach efforts with stakeholders and the public, both in terms of the frequency and the depth of content about assessment preparation. The Program Began Implementing Systematic Review as a Basis of Its Assessments The IRIS Program began addressing the need for greater transparency by implementing systematic review as a basis for every assessment and has been doing so for several years. A systematic review is a structured and documented process for transparent literature review. It is a scientific investigation that focuses on a specific question and uses explicit, prespecified scientific methods to identify, select, assess, and summarize the findings of similar but separate studies. The goal of systematic review methods is to ensure that the review is complete, unbiased, reproducible, and transparent. By using systematic review, the IRIS Program can demonstrate that it considered all available literature in forming conclusions and deriving toxicity values. Utilizing the new software tools described above allows program staff to search more widely than before and to identify the most relevant results faster and more accurately. The IRIS Program is working with technical experts to increase the applications of machine learning for carrying out systematic review. Additionally, new software allows the IRIS Program to save and publish its search strings and to indicate why it selected certain studies over others for review and inclusion. The software also allows multiple staff to check searches and concur or not-concur with the initial assessment about including a scientific article in the draft assessment. IRIS officials told us that the transparency associated with systematic review and clearer explanation of methodologies in assessments (as well as releasing subsidiary documents, such as IRIS Assessment Plans and Assessment Protocols) will improve stakeholders’ understanding of how the program arrives at its conclusions. The Program Has Made Changes to Communication Frequency and Type The IRIS Program also furthered transparency by increasing the frequency, structure, and content of communications with EPA program and regional offices about overall program priorities and individual assessments. This allows EPA program and regional offices to know when to expect assessments, as well as what those assessments will cover. To prepare the 2015 Multi-Year Agenda, the IRIS Program solicited requests from EPA program and regional offices about which chemical assessments they needed; these requests were released in December 2015. When new leadership joined the IRIS Program in early 2017, the new officials began reaching out to individual program and regional offices to re-confirm their needs and priorities. IRIS officials said this effort was in part to ensure that the IRIS Program was delivering what the program offices needed, as well as to help the IRIS Program keep its priorities up to date and ensure that resources (primarily staff) were aligned with EPA-wide priorities. Based on these conversations with program and regional office staff, the IRIS Program made some chemical assessments higher priority and removed others from the program’s workflow, consistent with stated needs. In May 2018, the IRIS Program prepared a statement for posting on the IRIS website outlining these changes to the program’s workflow and an updated list of assessments that were being developed with anticipated completion time frames. However, EPA leadership in ORD—the office that oversees the IRIS Program—did not approve this statement for release because current EPA leadership in program and regional offices had not formally requested these assessments. Nevertheless, officials from program and regional offices that use IRIS assessments told us that they received clear communication from the IRIS Program about priorities and timelines for individual assessments. According to these officials, some of this communication took place when IRIS Program leadership reached out to program and regional office officials to confirm their needs, and some took place during monthly telephone calls the IRIS Program held to update stakeholders on assessment development timelines. Program and regional office officials told us that they appreciated the IRIS Program’s recent efforts to understand program and regional office needs and timelines; communicate the status of assessments more frequently; and find ways to assist program offices that may not require developing a full assessment, such as assessment updates or literature reviews. Since 2013, the IRIS Program has released preliminary assessment materials—including IRIS Assessment Plans and assessment protocols— so that EPA and interagency stakeholders and the public could be aware of scoping and problem formulation for each assessment. Since 2017, according to EPA, these documents had a new structure and better demonstrate the application of systematic review, and they continue to convey EPA’s need for each assessment and frame questions specific to each assessment. Officials in several program and regional offices that use IRIS assessments told us that the release of IRIS Assessment Plans and protocols was very helpful because it allowed them to offer early input to the IRIS Program about the scope of an assessment, when it could affect the direction of the assessment. IRIS officials also said that they created templates for several parts of the assessment process, including the IRIS Assessment Plans and assessment protocols, which help maintain consistency throughout assessment development and from one assessment to the next. During calendar year 2018, the IRIS Program planned to release documents or hold meetings for 15 of the 23 ongoing chemical assessments in development, as well as for the IRIS Handbook and a template for assessment protocols. From January through May 2018, the IRIS Program met each of its internal deadlines for work on 9 different chemical assessments and released the template for assessment protocols for agency review. The IRIS Program also produced a report to Congress on the program’s work in January 2018 and took part in a NAS review of the program in February 2018. The NAS review, which offered a third-party assessment of the program’s efforts, provided a supportive assessment of ongoing transformations aimed at ensuring data quality, new systematic approaches for data analysis and expanded stakeholder engagement efforts, and increased the efficiency of assessments. According to the report, NAS reviewers were impressed with the changes being instituted in the IRIS Program since 2014, including substantive reforms by new IRIS Program leadership, such as the development, implementation, and use of systematic review methods to conduct IRIS assessments. In addition, as of August 2018, the final IRIS assessment of hexahydro-1,3,5-trinitro-1,3,5-triazine (RDX) was issued. In early November 2018, IRIS officials told us that the agency had almost completed internal review of the handbook, which was being prepared for public release. In December 2018, the IRIS Program and OPPT participated in a NAS workshop that informed the systematic review of mechanistic evidence. The IRIS Program has made important changes aimed at producing more timely and transparent assessments, but IRIS officials told us that proposed budget cuts have caused them concern about whether they will have sufficient resources to expand assessment work in the future. The human health risk assessment area, of which IRIS’s budget makes up approximately half, has been funded at about $38 million annually since fiscal year 2013 based on our review of EPA budget documents. However, the President’s budget request for human health risk assessment work in fiscal years 2018 and 2019 was $22.5 million and $22.2 million, respectively. This represents a cut of approximately $17 million from previous budget levels dating back to fiscal year 2013. The IRIS Program budget would drop approximately 40 percent from $20.8 million to approximately $12 million if these cuts were enacted. Congress did not support these reductions. Specifically, according to the joint explanatory statements accompanying the Consolidated Appropriations Act, 2018, and Consolidated Appropriations Act, 2019, Congress had agreed to continue providing funding at fiscal year 2017 enacted levels. Cuts to the program could impact EPA’s regulatory work: Officials in almost all of the program and regional offices that use IRIS assessments told us that they rely on IRIS assessments to do their work—it is the first place they look for chemical toxicity values, and if the IRIS Program is unable to produce assessments, their offices would be challenged to meet statutory deadlines and there would be a generally negative effect on public health. The IRIS Program made progress developing assessments and producing assessment documentation (e.g., IRIS Assessment Plans and protocols) in early 2018. However, EPA leadership deliberations about the program’s priorities that took place from June through December 2018 delayed the program’s assessment production. IRIS officials told us that in early June 2018 EPA leadership in ORD informed them that the IRIS Program could not release an assessment without a formal request for that assessment from the current leadership of a program office. At the request of the Administrator, IRIS officials prepared a survey of program and regional offices, asking them to re- confirm their needs for 20 assessments that were in development. This survey was sent by memorandum in August 2018. Program office responses were to be signed by the Assistant Administrator of each program office to ensure that the re-confirmations were consistent with the priorities of EPA program office leadership. While survey responses were being compiled, EPA leadership in ORD instructed the IRIS Program not to publically release any assessment documentation. As a result, any assessment or subsidiary assessment document (e.g., an IRIS Assessment Plan or protocol) that was ready for agency review, public comment, or peer review was unable to proceed through the IRIS assessment development process. In late October 2018, prior to releasing results of the initial program and regional office survey, EPA leadership in ORD made a second request of program offices for a prioritized list of assessments. According to officials from the IRIS office, who were queried for advice by officials from some program offices, ORD’s second request was made verbally at a meeting and included direction to the program offices to limit their requests to no more than three to four chemicals. ORD’s request did not provide information on the basis for selecting priorities or the reason for the limit of three or four chemical assessments from the original survey submissions. The calls for advice from program office officials represented the first time the IRIS Program heard about the requests for a prioritized list, according to IRIS program officials. And since neither the program and regional offices nor the IRIS Program had information from the Administrator’s office about what the prioritization was meant to achieve, the IRIS Program was unable to provide guidance about what chemicals might be considered a priority, or how many they might be able to continue work on. When EPA leadership’s deliberations about the program’s priorities were completed, a memorandum was issued on December 4, 2018, that listed 11 chemical assessments that the IRIS Program would develop. This was a reduction of the program’s workflow from 22 assessments, but the memorandum announcing the reduced workflow gave no reason for the reduction. The memorandum accompanying the list of 11 chemicals gave no indication of when more assessments could be requested or if IRIS’s workflow would remain at 11 chemicals for the foreseeable future. According to the memorandum, the 11 chemicals were requested by two EPA program offices (the Office of Water and the Office of Land and Emergency Management). We received this memorandum at the end of our review and did not have the opportunity to review the prioritization process that led to its drafting. Two weeks after the issuance of the memorandum, the IRIS program publicly issued an outlook of program activities, which included two additional assessments that were not included in the memorandum. These two assessments, ethyl tertiary butyl ether (ETBE) and tert-butyl alcohol (TBA), were not included in the memorandum because they were out for public comment and external peer review. Furthermore, four assessments that were in the later stages of development and had not been issued were not included in the December 2018 Outlook. The four assessments were: acrylonitrile, n-Butyl alcohol, formaldehyde, and polycyclic aromatic hydrocarbon (PAH). The assessment of formaldehyde was, according to the “IRIS Assessments in Development” website, at Step 4 of the IRIS process (an assessment is drafted and was ready to be released for public comment and external peer review). The absence of these four assessments from the December 2018 Outlook could create confusion for stakeholders interested in them. EPA provided no information on the status of these four assessments or whether it planned to discontinue working on them or restart them at another time. As we have previously reported, an overarching factor that affects EPA’s ability to complete IRIS assessments in a timely manner is that once a delay in the assessment process occurs, work that has been completed can become outdated, necessitating rework throughout some or all of the assessment process. Thus, it remains to be seen when these assessments can be expected to move to the next step in the IRIS process or be completed. As of December 19, 2018, the status of the 13 assessments in the December 2018 Outlook was: External peer review: ETBE and TBA. Draft Development: arsenic, inorganic; chromium VI; polychlorinated biphenyls (PCBs; noncancer); perfluorononanoic acid (PFNA); perfluorobutanoic acid (PFBA); perfluorohexanoic acid (PFHxA); perfluorohexane sulfonate (PFHxS); and perfluorodecanoic acid (PFDA). Scoping and Problem Formulation: mercury salts; methylmercury; vanadium and compounds. According to IRIS officials, the IRIS Program was unable to release any work since June 2018, while it was waiting for feedback from the Administrator’s office regarding whether its assessment workflow was consistent with agency priorities. IRIS officials told us that staff continued whatever draft development work that they could do internally, but several IRIS staff have been working increasingly for OPPT to support its work preparing risk evaluations under TSCA. ORD reported to us that in September 2018—3 months after IRIS assessments were stopped from being released because of ongoing EPA leadership deliberations—5 of approximately 30 IRIS staff were supporting OPPT with 25 to 50 percent of their time. In October 2018—4 months after IRIS assessments were stopped from being released—28 of approximately 30 IRIS staff were supporting OPPT with 25 to 50 percent of their time. According to IRIS officials, this was occurring primarily because OPPT has a significant amount of work to do to meet its statutory deadlines, and OPPT needed IRIS staff expertise to help meet those deadlines. As noted above, TSCA establishes a regulatory standard that generally differs from those under other environmental laws, so the TSCA assessments will not necessarily be relevant to other EPA programs that have relied on IRIS endpoint values in making their regulatory decisions. EPA has demonstrated progress implementing TSCA by responding to TSCA’s statutory deadlines through the end of fiscal year 2018, including promulgating rules, developing guidance, and releasing reports. However, EPA faces key challenges to its ability to implement TSCA, such as managing the risks posed by ongoing litigation, ensuring appropriate resources, developing guidance to ensure consistency, and ensuring that the new chemicals review process is efficient and predictable. EPA has responded to initial statutory deadlines under TSCA, as amended by the Lautenberg Act, including requirements to promulgate new rules, develop guidance, and release reports. For example, EPA began 10 risk evaluations drawn from the 2014 update of the TSCA Work Plan within 180 days of enactment of the Lautenberg Act (§ 6(b)(2)(A)); submitted an initial report to Congress estimating capacity for and resources needed to complete required risk evaluations within 6 months of enactment (§ 26(m)(1)); carried out and published in the Federal Register an inventory of mercury supply, use, and trade in the United States by April 1, 2017. (§ 8(b)(10)(B)); developed guidance to assist interested persons in developing and submitting draft risk evaluations within 1 year of enactment (§ 26(l)(5)); and developed a plan for using alternative test methods to reduce use of vertebrate animal testing within 2 years of enactment (§ 4(h)(2)(A)). In addition, in four areas in which Congress required EPA to establish processes and structures for TSCA, EPA finalized four rules detailing the general processes for prioritizing and evaluating chemicals under TSCA, known together as the Framework Rules. EPA responded to the 1-year deadlines to establish three of the four Framework Rules. These three rules are the risk prioritization rule, which explains EPA’s process for prioritizing existing chemicals for risk evaluation; the risk evaluation process rule, which explains EPA’s process for conducting risk evaluations on existing chemicals; and the inventory notification rule, which requires manufacturers and processors of chemical substances to report which chemicals are currently in commerce. The fourth Framework Rule EPA issued, which had no issuance deadline, implements a Lautenberg Act provision authorizing EPA to collect fees for carrying out a number of different activities under TSCA, including collecting fees from manufacturers and processors that submit new chemicals or submit chemicals for significant new uses to EPA for review. Though EPA responded to all of the statutory deadlines, some environmental and industry stakeholder organizations we interviewed told us that they do not believe this is a complete measure of how well EPA is implementing TSCA. Representatives from one environmental stakeholder organization told us in July 2018 that it is still too early to assess how well EPA is implementing TSCA because none of the existing chemical risk evaluations ongoing under the new process have been released; the wording in the new rules and documentation is unclear; and the risk prioritization rule, the risk evaluation rule, and the inventory reset rule have been challenged in court. However, in January 2019 they told us that they were too optimistic in their assessment of TSCA implementation and believe EPA is falling behind in its progress. As of December 2018, representatives from another environmental stakeholder group told us that, while EPA has met a number of major statutory deadlines, the agency’s rules and other actions do not reflect the best available science and are contrary to both the letter and intent of the new TSCA Act. However, in January 2019 an industry stakeholder organization noted that the 2016 amendments to TSCA are generally being implemented effectively and efficiently as Congress envisioned, and the agency continues to meet important deadlines required by the law. In addition, they also told us that EPA’s TSCA program is also utilizing the best available science and a weight of the evidence approach to make high quality chemical management decisions. Representatives from industry stakeholder organizations we interviewed told us they believe the rules are consistent with TSCA, but that EPA is not consistently meeting the 90-day deadline to make determinations on new chemicals or the 30-day deadline to make determinations on low-volume exemptions. EPA faces challenges with its ability to implement TSCA, such as managing the risk posed by ongoing litigation, ensuring appropriate resources, developing guidance documents to ensure consistency, and ensuring that the new chemicals review process is efficient and predictable. Three of the four Framework Rules that EPA issued to implement TSCA have been challenged in court: the risk prioritization rule, the risk evaluation rule, and the inventory notification rule. Procedures for Prioritization of Chemicals for Risk Evaluation under the Toxic Substance Control Act (risk prioritization rule). In Safer Chemicals, Healthy Families v. U.S. Environmental Protection Agency, a collection of environmental and public health organizations challenged several aspects of EPA’s TSCA implementation, including the risk prioritization rule. Specifically, the environmental organizations argue, among other things, that the plain language of TSCA requires EPA to consider all conditions of use in prioritizing chemicals for review under TSCA, rather than excluding, for example, uses that EPA believes are “legacy uses” for which a chemical is no longer marketed. EPA and chemical industry intervenors respond by arguing that TSCA grants EPA discretion to determine what conditions constitute a chemical’s conditions of use and to generally exclude legacy activities—primarily historical activities that do not involve ongoing or prospective manufacturing, processing, or distribution in commerce of a chemical substance as a product. Procedures for Chemical Risk Evaluation under the Amended Toxic Substances Control Act (risk evaluation rule). In Safer Chemicals, Healthy Families v. U.S. Environmental Protection Agency, the environmental organizations also contend that EPA’s risk evaluation rule is contrary to TSCA, in part because, as noted above, the rule “impermissibly” excludes uses that the law requires EPA to include in its risk evaluations. EPA and industry intervenors responded by arguing that TSCA grants EPA discretion to determine what conditions constitute a chemical’s conditions of use. The organizations also argued that the risk evaluation rule would deter public participation in the risk evaluation process by imposing criminal penalties on a member of the public who submits incomplete information to EPA but does not impose similar penalties on manufacturers. In August 2018, the government moved to vacate the penalty regulation, and the environmental organizations consented to this motion. Inactive) Requirements (inventory notification rule). In Environmental Defense Fund v. U.S. Environmental Protection Agency, an environmental organization challenged EPA’s inventory notification rule, which EPA issued in response to a TSCA requirement that EPA identify which chemicals in the TSCA inventory are still in use and require substantiation of claims that chemical identities constitute confidential business information that can be withheld from public disclosure. The environmental organization argued, among other things, that the rule impermissibly allows any persons to assert confidentiality claims for any chemical they manufacture or process, rather than just the original claimant. EPA and industry intervenors responded in part by arguing that TSCA specifically allows any affected manufacturers to maintain an existing confidentiality claim for a specific chemical identity, which the industry intervenors assert constitutes critically important intellectual property. OPPT officials told us they are trying to not anticipate the results of the litigation and, instead, address the outcome of each case as it is decided. They stated that they are staying aware of developments in ongoing litigation and are constantly considering potential outcomes but believe it would not be reasonable to prepare explicit resource plans for unknown future scenarios. If EPA loses any of these lawsuits, it may need to devote additional resources to implement the relevant provisions of TSCA. For example, if the suit involving the risk evaluation rule is successful, EPA may be forced to redo parts of its risk evaluations close to the December 2019 deadline to finalize these evaluations. EPA is required to complete its first 10 existing chemical evaluations not later than 3 years after the date on which it initiated the risk evaluations, which was December 2016. TSCA also allows for an extension of the risk evaluation deadlines for up to 6 months if the agency deems it necessary. The Lautenberg Act greatly increased OPPT’s workload. Prior to the enactment of the Lautenberg Act, EPA did not have deadlines for completing existing chemical evaluations. Under the Lautenberg Act, EPA must finalize 10 ongoing risk evaluations by December 2019, which represents a tight deadline, according to EPA officials. Furthermore, the law requires EPA to ensure that 20 risk evaluations are ongoing for high- priority substances 3-1/2 years after enactment and that at least 20 chemical substances have been designated as low-priority substances. In addition, under TSCA prior to the Lautenberg Act, a new chemical could enter commerce after 90 days unless EPA took action to the contrary. Under the Lautenberg Act, EPA is required to make a determination on a new chemical before it can be manufactured—another source of increased workload. Partially because of the increased workload, some OPPT officials told us that they have concerns about staff capacity within OPPT. Officials in both the Chemical Control Division (responsible for risk management) and the Risk Assessment Division (responsible for risk assessment) said that they do not have sufficient resources to do their work. This included staff from all five technical teams we interviewed in the Risk Assessment Division. Technical teams are working groups organized by discipline that bring together experts from across OPPT branches. The Risk Assessment Division is particularly affected by the heavy workload, according to OPPT officials and representatives from an industry stakeholder organization. The division must review all of the premanufacture notices for new chemicals and contribute to the first 10 existing chemical evaluations. Officials from the Chemical Control Division told us that the Risk Assessment Division is struggling more because its work requires more technical employees. The officials said that EPA is hiring additional full-time equivalents (FTE), but it takes time to train new people, and this will initially increase workload. Officials told us that in July 2018, OPPT had about 300 FTEs and was authorized to hire 40 additional FTEs. As of October 2018, OPPT officials told us that they had hired or extended offers to 20 to 25 of that 40 and continued to hire more employees. OPPT officials told us that reaching an appropriate level of FTEs—including recruiting and retaining staff—is challenging. OPPT officials said they expect that the recently announced initiative to implement direct hiring authority for scientific and technical positions will have a positive impact on these efforts. To address the staffing challenge, staff have also been reassigned from other parts of EPA to OPPT. For example, staff in the Safer Choice Program—an EPA program that helps consumers, businesses, and purchasers find products that perform and are safer for human health and the environment—were redeployed to the Chemical Control and the Risk Assessment Divisions. Representatives from both industry stakeholder organizations we interviewed told us that it can be difficult to work with recently reassigned staff who are not familiar with the chemicals they are working on. Representatives from an industry stakeholder organization told us that, in some cases, OPPT staff are ill-prepared to make decisions about a premanufacture notice. OPPT senior officials said there is always a learning curve for reassigned employees, but they do not put new people in positions to make decisions on premanufacture notices. They said that these decisions are never made by one person in a vacuum. OPPT officials and staff told us that they are generally optimistic about an upcoming reorganization of OPPT that will separate assessment and management of new and existing chemicals programs and better align the structure of OPPT with the focus of TSCA’s provisions. For example, the Chemical Control Division and the Risk Assessment Division currently each handle both new and existing chemicals, and the planned reorganization will divide the divisions into new and existing chemical divisions. However, staff told us that they have concerns about whether the new divisions will be adequately staffed, the timing of the reorganization, and their future placements. Staff from multiple technical teams we interviewed in the Risk Assessment Division said that they are not sure if, after the reorganization, the new divisions will be adequately staffed. Staff from one technical team said there has been increased attrition in recent years, partially because of concerns about the upcoming reorganization. Staff from another technical team said that a large number of management positions are unfilled. Staff from multiple technical teams told us that it will take time after the reorganization to redistribute work and train staff. Staff from one team said the reorganization is ill-timed because there are currently too many other ongoing high-priority projects. Staff from multiple technical teams also told us that they are experiencing anxiety about their future placements and with whom they will work. In commenting on a draft of this report, EPA stated that the concerns raised by staff are likely common to any program undergoing change. OPPT officials said they submitted the reorganization proposal to EPA’s Office of Mission Support—formerly the Office of Administration and Resources Management—in October 2018 and that it could take several more months as EPA management works out details with labor unions and addresses other issues. Officials said that they anticipate implementing the reorganization in early 2019. OPPT senior officials said that now that OPPT has many new responsibilities and a heavier workload, they are taking steps to improve capacity by implementing the reorganization and hiring new staff. The officials said that though there will inevitably be growing pains, the changes are part of a larger plan specifically designed to better position OPPT to implement TSCA. Senior officials also told us that they have spent considerable time setting expectations for new and existing staff. In tandem with the major changes that increased EPA’s workload, the 2016 amendments to TSCA authorize EPA to establish fees to defray a portion of the costs of administering TSCA sections 4, 5, and 6 and collecting, processing, reviewing, providing access to, and protecting information about chemical substances from disclosure, as appropriate, under TSCA section 14. Affected businesses began incurring fees under the new rule as of October 1, 2018, but it is unclear whether the fees collected will be sufficient to support relevant parts of the program. OPPT officials told us that while they are uncertain how much the fees rule will generate the first year, they believe that over the course of a few years, the amount of money generated should stabilize. The first year is where officials are not sure how much they may receive. Officials expect to collect an average of $20 million per year over the next 3 fiscal years. In fiscal year 2019, however, they expect to collect approximately $7 million to $8 million. According to EPA, the agency will be tracking its costs and use that information to adjust future fees, if appropriate. As required by law, EPA will evaluate and readjust, if necessary, the fees every 3 years. EPA estimates the average yearly cost of TSCA implementation for fiscal years 2019 through 2021 to be $80,178,000. EPA’s fiscal year 2019 budget justification shows $57,973,700 allocated to TSCA implementation. However, EPA does not expect a budget shortfall in fiscal year 2019 because, according to officials, they (1) have funds available from 2018 to support fiscal year 2019 needs, (2) receive support from other EPA offices like the Office of General Counsel and the Office of Research and Development, (3) expect fiscal year 2019 costs to be lower than the 3-year average described in the fees rule, and (4) expect some indirect costs to be covered by non-TSCA budget categories. EPA also faces challenges in developing guidance to ensure consistency in implementing the law. OPPT officials said that, given the tight timelines that TSCA requires, they have not yet created all the necessary guidance for staff implementing the law. Officials likened it to building an airplane as they fly it, as they must create guidance and processes, while simultaneously applying them to chemical evaluations. Staff from four of five technical teams we interviewed are either currently updating their guidance, still developing their guidance, or have never developed guidance before. Staff from two teams told us that they are developing the guidance as they apply it to their work. OPPT officials told us that they are using some guidance that was in place before the Lautenberg Act was enacted, though they are working on updates. Representatives we interviewed from industry stakeholder organizations said they want EPA to be clear about its standards for the new chemicals program and how they are defining terms in TSCA. Representatives from one industry stakeholder organization suggested that EPA should establish some definitions and develop guidance on how to apply those definitions, in order to help both chemical manufacturers and reviewers within OPPT. In June 2018, EPA released “Points to Consider When Preparing TSCA New Chemical Notifications,” guidance that representatives from industry stakeholder organizations said is helpful, but they are still not sure how EPA is using information like the Points to Consider guidance in its evaluations and against what standard EPA’s reviewers are reviewing and assessing a chemical. Representatives we interviewed from industry stakeholder organizations said that decisions on new chemical reviews depend on individual reviewers because EPA has not provided the reviewers with guidance that ensures consistency. OPPT officials also said consistency is a challenge in conducting risk assessments. Representatives we interviewed from environmental stakeholder organizations did not mention consistency as an area of challenge. Representatives from both industry stakeholder organization we interviewed also told us that the new chemicals program is too slow and unpredictable, which can negatively affect innovation. For example, representatives from one company told us in comments they provided through an industry stakeholder organization we interviewed that it submitted a premanufacture notice for a substance that would decrease the potential for worker and environmental exposure while providing improved product performance. The approval process extended to nearly 550 days compared to the 90 days it typically took to obtain approval prior to TSCA’s amendment. EPA can request extensions, and submitters can voluntarily suspend the review process; therefore, the overall process can extend beyond the 90-day requirement. For example, in the new chemical review process, EPA first makes an initial determination. If a company does not like this initial determination, it can request more time to provide additional data or develop new data in an effort to get a positive final determination. A company withdraws its submission prior to a final EPA determination if it is clear the determination will not be favorable and the chemical will be regulated. EPA officials said the agency does not violate the mandated timelines because submitters agree to voluntarily suspend the review process. However, representatives from one industry stakeholder organization told us that as of December 2018, with the passage of time and greater familiarity with Lautenberg, OPPT’s decision making process has improved and is more predictable. EPA officials said that historically, even among new chemicals for which EPA completed review, 57 percent actually entered commerce. Officials said that in the past companies submitted new chemicals just to see what determinations EPA would make. Going forward, as of October 2018, officials said they expect larger fees will result in some companies choosing to be more selective in the chemicals they submit to the program. In addition, EPA officials told us that after OPPT’s reorganization, a more devoted team will focus on pre-notice meetings with companies. Officials said this should reduce some of the back and forth with submitters, thereby improving timelines. Representatives we interviewed from industry stakeholder organizations also told us that delays motivate companies to introduce chemicals first in foreign markets. For example, one company told us through comments it provided through an industry stakeholder organization we interviewed that it developed a new technology in the United States, but because of the lengthy delays experienced with new chemicals reviewed under TSCA, they will neither register nor commercialize the product in the United States at this time. Rather, the company has decided to pursue commercialization in Europe, which will enable the company to deliver the benefits of this new technology to their customers in the European market sooner than is possible in the United States. We provided a draft of this report to EPA for its review and comment. We received written comments from EPA that are reproduced in appendix I and summarized below. In its written comments, EPA stated that while the draft comprehensively describes the challenges facing the TSCA and IRIS programs, it does not appropriately address EPA’s extensive progress in implementing TSCA, and EPA recommended that our final report include information regarding its accomplishments under the new law. Specifically, we report on the steps EPA has taken to respond to the requirements of the law because in many instances, whether EPA’s response is legally sufficient is in litigation, and GAO does not typically express a view on legal or factual matters in dispute before a court. We have updated our report with additional examples, which the agency provided in its comments, of steps it has taken to implement TSCA. In addition, EPA requested that we consider its progress made in addressing and controlling toxic chemicals with respect to the five criteria for removal from our high-risk list. The application of the high-risk criteria was not within the scope of this report. Our forthcoming 2019 high-risk update will address actions taken by agencies on the list, including EPA, since the last update in 2017. EPA said that to monitor progress, it had put into place a rigorous program; as a regular practice, EPA stated that Deputy Assistant Administrators from the Office of Chemical Safety and Pollution Prevention conduct monthly Business Review meetings with the Office Directors, Deputy Office Directors, lead region representatives, and other key staff. EPA stated that during these meetings they discuss their organizations’ operations and performance, including TSCA implementation status, using performance charts to track progress on mission measures, identify and update countermeasures, and resolve problems. However, over the year that we conducted our review, EPA officials did not mention conducting such meetings and did not provide documentation that such meetings took place. Further, in its written comments, EPA provided technical comments on the draft report, which we address as appropriate. In one comment, EPA stated that instead of noting that the agency has successfully implemented many statutory requirements, the draft report stated that EPA responded to deadlines. We believe the report correctly characterizes steps EPA has taken to implement TSCA, and, as noted above, whether EPA’s response is legally sufficient is in litigation, and GAO does not typically express a view on legal or factual matters in dispute before a court. In another case, the technical comments contradicted facts that we gathered during our review. For instance, while EPA stated that the draft report incorrectly noted that most of the IRIS staff had been working on TSCA activities, we provide further information to support our original statement; we replaced the term ‘most’ with specific data on the number of IRIS staff and the percentage of their time that was devoted to TSCA activities. Also in its technical comments, EPA stated that our analysis highlighted uncertainty resulting from the agency’s recent activities to ensure IRIS Program efforts were aligned with the highest priorities of the agency. EPA acknowledged that this action did result in a delay but that in the long term, it would ensure that EPA’s program and regional office priorities are being addressed and that each office is fully engaged in the development of IRIS assessments that will strengthen the agency’s ability to address its mission for protecting human health and the environment. However, as we state in our report, prior to releasing results from the initial program and regional office survey, EPA leadership in ORD made a second request for a prioritized list of chemical assessments. According to officials from the IRIS office, who were queried for advice, the second request was made verbally at a meeting and did not provide the offices with information on the basis for selecting priorities or the reason for limiting the number of assessments to three or four chemicals. In addition, the ultimate priority list EPA issued in December 2018 reflected the priorities of two program offices and did not provide evidence that other EPA program offices had no interest in IRIS assessments. Because EPA did not identify the basis for program offices to select priorities or the reason for limiting the number of chemicals to assess, the process was not transparent, leaving room for uncertainty. EPA also provided additional technical comments, which we have incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Administrator of the Environmental Protection Agency, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In addition to the contact named above, Diane Raynes (Assistant Director), Summer Lingard-Smith (Analyst in Charge), Alisa Carrigan, Tara Congdon, Richard P. Johnson, Amber Sinclair, and William Tedrick made key contributions to this report. In addition Karen Howard, Dennis Mayo, Dan Royer, and Sara Sullivan made important contributions. Chemical Innovation: Technologies to Make Processes and Products More Sustainable. GAO-18-307. Washington, D.C.: February 8, 2018. Chemicals Management: Observations on Human Health Risk Assessment and Management by Selected Foreign Programs. GAO-16-111R. Washington, D.C.: October 9, 2015. Chemical Assessments: Agencies Coordinate Activities, but Additional Action Could Enhance Efforts. GAO-14-763. Washington, D.C.: September 29, 2014. Chemical Regulation: Observations on the Toxic Substances Control Act and EPA Implementation. GAO-13-696T. Washington, D.C.: June 13, 2013. Chemical Assessments: An Agencywide Strategy May Help EPA Address Unmet Needs for Integrated Risk Information System Assessments. GAO-13-369. Washington, D.C.: May 10, 2013. Toxic Substances: EPA Has Increased Efforts to Assess and Control Chemicals but Could Strengthen Its Approach. GAO-13-249. Washington, D.C.: March 22, 2013. Chemical Assessments: Challenges Remain with EPA’s Integrated Risk Information System Program. GAO-12-42. Washington, D.C.: December 9, 2011. Chemical Assessments: Low Productivity and New Interagency Review Process Limit the Usefulness and Credibility of EPA’s Integrated Risk Information System. GAO-08-440. Washington D.C: March 7, 2008. High-Risk Series: An Update. GAO-09-271. Washington D.C: January 2009. High-Risk Series: Progress on Many High-Risk Areas, While Substantial Efforts Needed on Others. GAO-17-317. Washington D.C: February 15, 2017.", "summary": "EPA is responsible for reviewing chemicals in commerce and those entering the marketplace. Currently there are more than 40,000 active chemical substances in commerce, with more submitted to EPA for review annually. EPA's IRIS database contains the agency's scientific position on the potential human health effects that may result from exposure to various chemicals in the environment. EPA's IRIS Program, which produces toxicity assessments, has been criticized in the past for timeliness and transparency issues. In response, the IRIS Program committed to making program improvements starting in 2011, which the National Academy of Sciences (NAS) recently commended. TSCA as amended in 2016 provides EPA with additional authority to review both existing and new chemicals and to regulate those that EPA determines pose unreasonable risks to human health or the environment. This report describes (1) the extent to which the IRIS Program has addressed identified challenges and made progress toward producing chemical assessments; and (2) the extent to which EPA has demonstrated progress implementing TSCA. GAO reviewed NAS and EPA documents and interviewed officials from EPA and representatives from two environmental and two industry stakeholder organizations. The Environmental Protection Agency's (EPA) Integrated Risk Information System (IRIS) Program, which prepares human health toxicity assessments of chemicals, has made progress addressing historical timeliness and transparency challenges in the assessment process. Efforts to address timeliness include employing project management principles and specialized software to better plan assessments and utilize staff. To address the need for greater transparency in how the program conducts assessments, IRIS officials and the IRIS Program have implemented systematic review, which provides a structured and transparent process for identifying relevant studies, reviewing their methodological strengths and weaknesses, and integrating these studies as part of a weight of evidence analysis. Since the process improvements were implemented, the program made progress toward producing chemical assessments through May 2018. In June 2018, the EPA Administrator's office told IRIS officials that they could not release any IRIS-associated documentation without a formal request from EPA program office leadership. In August 2018, according to IRIS officials, program office leadership was asked to reconfirm which ongoing chemical assessments their offices needed. In late October 2018, these offices were asked to limit their chemical requests further, to the top three or four assessments. At the same time—4 months after IRIS assessments were stopped from being released—28 of approximately 30 IRIS staff were directed to support implementation of the Toxic Substances Control Act of 1976 (TSCA), as amended, with 25 to 50 percent of their time, according to officials. Then on December 19, 2018, the Office of Research and Development released its IRIS Program Outlook, which provided an updated list of 13 assessments. Eleven of the 13 chemicals on the IRIS Program Outlook were requested by two EPA program offices. A memorandum issued earlier in December, gave no indication of when additional assessments could be requested or what the IRIS Program's workflow would be in the near term. EPA has demonstrated progress implementing TSCA, which was amended in June 2016, by responding to statutory deadlines. For example, EPA finalized rules detailing the general processes for prioritizing and evaluating chemicals, known as the Framework Rules, but three of the four rules have been challenged in court. Environmental organizations have argued, among other things, that TSCA requires EPA to consider all conditions of use in prioritizing and evaluating chemicals, rather than excluding, for example, uses that EPA believes are \"legacy uses,\" for which a chemical is no longer marketed. EPA argued that TSCA grants it discretion to determine what constitutes a chemical's conditions of use. Amendments to TSCA in 2016 increased EPA's responsibility for regulating chemicals and in turn, its workload. As such, EPA is required to prioritize and evaluate existing chemicals by various deadlines over an extended period and to make a regulatory determination on all new chemicals. Senior management told GAO that they were confident that ongoing hiring and reorganization would better position the office that implements TSCA. GAO made recommendations previously to improve the IRIS Program and TSCA implementation. EPA provided comments, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "Of TCJA’s 119 provisions, 86 relate to business and international tax law, ranging in scope from tax treatment of commuter benefits to significant modifications to international aspects of U.S. income tax. See table 1 for select examples of tax law changes resulting from TCJA. While Congress amends the tax code routinely, the time constraints and magnitude of changes within TCJA are less common. According to IRS officials, the last time IRS implemented major tax law changes was in 1986. For TCJA, IRS had a relatively short time frame to implement because the law included many time-sensitive provisions that were either retroactively effective, or immediately effective upon the law’s enactment. To implement TCJA, IRS established working groups to provide project management oversight, coordinate the implementation of TCJA provisions across IRS, and identify priorities, challenges, and risks of the new tax law changes. For instance, TRIO was established in January 2018 as a short-term centralized authority to prioritize, oversee, and coordinate implementation of TCJA, as shown in figure 1. TRIO’s oversight model was based on the working groups convened during IRS’s implementation of Patient Protection and Affordable Care Act. Made up of officials with expertise across IRS, including IRS’s business operating divisions (BOD)—the offices responsible for implementation, oversight, and compliance of tax laws—TRIO was established to temporarily oversee TCJA implementation through the 2019 filing season. TRIO’s objectives for the 2019 filing season included ensuring that taxpayers understood their tax obligations and that IRS could process tax returns, payments, and refunds. In March 2019, TRIO dissolved and transitioned oversight and operations to the BODs. In addition to the working groups that were established to implement TCJA, IRS also relied on its usual practices for implementation of tax law changes, including developing guidance, training employees, and updating technology systems: Determining appropriate guidance for release. IRS interprets the law and develops guidance using a variety of documents and services to communicate its interpretation to help taxpayers understand their tax obligations. IRS guidance includes Treasury Decisions (the formal name for final or temporary tax regulations), which are considered the legally binding interpretation of the statute and IRS’s official position on federal tax law. Treasury generally has 18 months after tax law changes to issue final regulations for them to be retroactively effective to the date of enactment, though there is an exception to prevent abuse. In some cases, Treasury will issue temporary regulations—to provide immediate guidance—prior to issuing final tax regulations. Other forms of guidance include proposed regulations—a step in the regulation development process—revenue rulings, revenue procedures, and notices, among other documents, to provide additional official guidance to taxpayers. IRS also provides taxpayers with a range of other information sources, including frequently asked questions, webinars, YouTube videos, and news releases. Developing guidance. IRS’s Chief Counsel, in coordination with Treasury’s Office of Tax Policy, drafts tax regulations and also works with IRS BODs and the public. Draft tax regulations are circulated throughout IRS and Treasury for review and approval before being published as a proposed tax regulation in the Federal Register. The public is given the opportunity to provide comments, which are analyzed and incorporated as appropriate into another draft of the regulation. The draft tax regulation is again circulated through IRS and Treasury for review and approval, before being published as a final tax regulation in the Federal Register. In some instances, once the draft proposed and final regulations have gone through the IRS and Treasury approval process, regulations may be subject to review by OIRA. OIRA reviews tax regulations that may create serious inconsistencies or otherwise interfere with another agency’s actions, raise novel legal or policy issues, or have an annual non-revenue effect on the economy of $100 million or more measured against a no-action baseline. Conducting stakeholder outreach. In addition to the development of regulations, IRS works with the public to gather feedback, educate taxpayers on published guidance, and inform it of upcoming efforts to provide additional guidance on key areas where IRS and stakeholders require additional clarity. Developing internal policies and procedures. IRS updates its Internal Revenue Manual (IRM)—the official compilation of instructions to staff on the administration and operation of the IRS—with procedures that inform staff of the steps they should take to correctly complete work and administer new tax law changes. Training employees. IRS trains employees to understand revisions in the tax code and ensure they have the tools necessary to manage key priorities such as using data and analysis to improve customer service and enforcement efforts. Modifying Information Technology (IT) Systems. IRS’s Information Technology organization updates the application programs of the tax return intake systems to allow IRS to accept and process tax returns. Generally, IRS captures data from electronically filed (e-filed) tax returns through its Modernized e-File application in a format that can be used for compliance and enforcement purposes. Given the magnitude and short timeline for TCJA implementation, IRS reassessed priorities to implement the law. While some IRS officials said they were largely able to balance TCJA implementation with their other work, other officials from Chief Counsel told us they decreased some field services to taxpayers, and scaled back non-TCJA guidance development. Additionally as a result of TCJA, IRS temporarily postponed some planned work, including some IT work and publication of previously planned taxpayer guidance on health savings accounts, the work opportunity tax credit, and other areas. To meet statutory requirements and best meet taxpayer needs, IRS prioritized 33 TCJA provisions for initial implementation, including 12 business and international provisions as the highest priorities, as shown in table 2. IRS officials said their highest priorities were to implement retroactive provisions because they affected the tax year beginning prior to January 1, 2018—and entirely new provisions. According to IRS planning documentation, in making these decisions, the agency considered the anticipated amount of public scrutiny, as well as the necessary amount of internal collaboration, external stakeholder coordination, and the extent of IT system modifications required to implement. To help taxpayers understand the new tax law and meet their tax obligations, IRS released various types of guidance. Officials told us they aimed to address the most significant questions through early guidance, before answering secondary questions in subsequent guidance. IRS developed comparisons of TCJA with the previous law to help taxpayers understand changes by topic and conducted public information campaigns targeting specific audiences, such as small businesses, to help taxpayers identify the right information and resources to meet their tax obligations. According to IRS officials, one challenge with taxpayers needing to rely on guidance when guidance has not been finalized is that unresolved questions can create uncertainty and guesswork for some taxpayers. While some tax practitioners we spoke with said the release of shorter and earlier information was helpful to provide insight into initial IRS positions on provisions that required immediate instruction, other tax practitioners said that the absence of complete information meant that taxpayers had to file their taxes without certainty. For instance, IRS worked to provide early information to taxpayers on the immediately effective repatriation tax. Repatriation tax payments were due in 2018; however, under the law, taxpayers had the option to pay in installments over 8 years. IRS did not have time to release comprehensive guidance in advance. To provide some early information to taxpayers, IRS instead released three notices (in January, February, and April 2018) and a revenue procedure (February 2018) to help taxpayers understand topics such as whether they were subject to the tax and their tax liability. In May 2019, the Treasury Inspector General for Tax Administration (TIGTA) reported that the short implementation time frame did not leave taxpayers sufficient time to understand the guidance and comply with their resulting tax liability. TIGTA reported that while IRS made a reasonable effort to inform taxpayers of the requirements under the repatriation tax, some taxpayers overpaid their first-year repatriation tax installment without the knowledge that IRS would not be refunding excess remittances of installments. The initial repatriation tax information issued mid-filing season instructed taxpayers to make two separate payments— one for their income tax liability and one for their repatriation tax liability, language that was later clarified. Subsequently, IRS announced that excess payments would be applied to the unpaid portion of the taxpayer’s liability and that IRS was legally precluded from issuing a refund of any excess remittances. TIGTA reported that for the 2017 tax year, 115 taxpayers filed repatriation tax refund claims—amounting to $2.8 billion—which, according to TIGTA, indicated that these were unintended overpayments. TIGTA recommended that IRS take steps to inform taxpayers when the next payment is due and how their excess payment was applied to their repatriation tax balance. According to TIGTA, IRS agreed to these recommendations and is taking steps to implement them. Because of the magnitude of the changes and the immediate effective dates of many TCJA provisions, Chief Counsel collaborated earlier and more frequently with IRS BODs to implement TCJA. IRS officials said these enhanced collaborative efforts were best practices and critical to timely TCJA guidance development. Although there are some guidelines in the IRM for intra-agency coordination, IRS has not identified instances when this enhanced collaboration would benefit guidance development or taken steps to document these parameters to assure consistency and accountability. Based on our analysis, we found that IRS officials leveraged several key practices for implementing collaborative mechanisms to support TCJA implementation, including identifying leadership roles and responsibilities, identifying relevant participants, and using resources to facilitate collaboration, which we identified in prior work. For instance, IRS formed TRIO to manage TCJA implementation and centralize accountability and decision-making. Additionally, Chief Counsel’s earlier and more frequent work with the BODs allowed for participants with appropriate skills and expertise to contribute to guidance development and highlight potential enforcement concerns. This collaboration included weekly, and in some instances daily, meetings for participants to provide implementation status updates. Further, IRS developed joint project documents and leveraged collaborative technologies to track and manage TCJA implementation and facilitate sharing across the agency. IRS officials stated that there were several benefits to this enhanced collaborative approach, including: more efficient and effective development of comprehensive regulations, for instance guidance for the QBI provision; faster decision-making on time-sensitive regulations; earlier identification of tax administration and enforcement concerns; mitigation of potential enforcement challenges, such as narrowing the definition of specified trades and businesses on the QBI deduction; and ability to begin compliance planning earlier. Our prior work on interagency collaboration mechanisms and the Standards for Internal Control in the Federal Government identify areas for agencies to improve and sustain collaboration. For instance, we identified that frequent communication can help facilitate working across agency boundaries and that articulating agreement in formal documents that are regularly updated and monitored can strengthen commitment to working collaboratively. In addition, federal internal control standards state that agencies should ensure stakeholders from different parts of an organization communicate to help the agency fulfill its mission. Chief Counsel officials acknowledged the value of this enhanced collaboration but as of December 2019 had not identified or documented criteria for when this collaborative approach would benefit guidance development and help achieve agency goals. Chief Counsel officials said that the guidelines as written provided flexibility in determining when to collaborate early with other offices during TCJA implementation. In addition, officials said that the value of collaboration depends on the scope and complexity of a tax law change and the decision to use earlier and more frequent collaboration would need to consider tradeoffs and other considerations such as other IRS priorities and the effects of pulling employees away from other activities. However, IRS officials described the enhanced collaboration used throughout TCJA implementation as unprecedented and key to successful implementation, indicating that identifying the situations when this earlier and more frequent collaboration would make sense and updating relevant documentation to reflect this could benefit IRS guidance development. Documenting the parameters and procedures for enhanced collaboration practices would better position IRS to be prepared to use enhanced collaboration during implementation of complex or time- sensitive changes to the tax code. For example, enhanced collaboration may help to identify and mitigate potential administrative effects of regulatory design decisions, potentially helping IRS identify more cost- effective alternatives within the limits of available resources. These potential benefits are also supported by our past work on regulatory design during the rulemaking process. Specifically, we found that it is important for agencies to consider enforcement and compliance issues during regulation development because different design choices have implications for future enforcement and compliance efforts. While developing regulations to help implement and administer TCJA provisions, Treasury and IRS made discretionary decisions in the regulatory development process that have meaningful effects on taxpayers’ tax liability and government revenue collection that were not included in their analysis. Changes to tax liability have distributional consequences, as taxes transfer money from taxpayers to the government, but do not directly affect the total resources available to the country. These distributional effects are one element that should be recognized during the regulatory development process, along with costs and benefits of the regulations. While we found that, among the provisions we looked at more deeply, Treasury’s analyses did recognize some costs and benefits related to factors such as administrability, compliance costs, and economic distortions, Treasury’s analyses did not generally assess the distributional effects, including effects on tax revenue collection, the regulations had as a result of changes in tax liability. As part of the regulatory development process, Treasury and IRS must adhere to Executive Order (E. O.) 12866, which establishes standards for regulatory planning and review. E.O. 12866 instructs agencies to select regulatory approaches that maximize net benefits, including economic, distributive, and equity effects, unless a statute requires another regulatory approach. Any regulation that is determined to be significant must be submitted to OIRA for review, along with an analysis of the costs and benefits of that regulation. However, until 2018, Treasury’s and IRS’s tax regulations were not regularly subjected to analysis and review under E.O. 12866. In many cases, tax regulations were deemed not significant under E.O. 12866, and as a result, Treasury and IRS did not perform regulatory analyses and they were not reviewed by OIRA. Some tax regulations were also exempt from OIRA review, which was otherwise required under E.O. 12866 based on an agreement between OMB and Treasury. However, E.O. 13789, signed in 2017, instructed the Secretary of the Treasury to reconsider the scope of that exemption, and in April 2018, Treasury and OMB signed a Memorandum of Agreement (MOA) subjecting certain tax regulations to OIRA review. In accordance with the MOA and the requirements in E.O. 12866, for regulations deemed significant, Treasury is responsible for conducting and producing an analysis of the impact of the regulations, including an assessment of costs and benefits. Tax regulations with an anticipated annual non-revenue effect of $100 million or more are deemed economically significant, and are subjected to this additional analysis. Under the MOA, Treasury was allowed a 12-month transition period to obtain reasonably sufficient resources to meet the additional requirements for economically significant regulations. The transition period expired in April 2019, and any new regulations will be subjected to these additional analyses where applicable. E.O. 12866 and OMB Circular No. A-4, a guide developed by OMB for agencies to perform regulatory analyses required by E.O. 12866, emphasize that agencies should assess the costs and benefits of proposed regulations. In some cases, regulations may transfer money from one group to another, creating no net costs or benefits to society as a whole, but nonetheless affecting those who have been affected by the transfers. When regulations have this effect, they are said to have a distributive impact on society, and both E.O.12866 and OMB Circular A-4 instruct agencies to consider distributive effects. Because revenues raised through taxation are transfers and are not costs or benefits to society, OMB Circular A-4 instructs agencies to develop a description of the distributional effects of a regulation that is separate from the costs and benefits. Such an analysis should recognize the effects of the regulation across the population and the economy, divided up in various ways, such as income groups, race, sex, industrial sector, or geography. Treasury’s and IRS’s significant proposed and final rules used to implement TCJA included a section analyzing the impact of the regulations; however, we found these analyses generally overlooked the distributional effects of the regulations arising from changes in tax liability and revenue collection. The illustrative examples below from TCJA regulations highlight the potential effects of Treasury’s and IRS’s regulatory decisions on tax liability and how those were reflected in Treasury’s analysis. Eligibility for QBI deduction for real estate and insurance brokers. The QBI deduction provides a deduction of up to 20 percent of QBI, but depending on a taxpayer’s taxable income, a specified service trade or business (SSTB) may not be a qualified trade or business and therefore may not produce QBI. The statute defines SSTBs as trades or businesses within a list of broadly-identified fields. Treasury and IRS determined that guidance clarifying the types of trades or businesses that would be considered to be within the listed fields was needed. As one example, the statute specified that “brokerage services” are considered an SSTB, but Treasury and IRS regulations further specified that “brokerage services” was limited to securities brokers, while other brokerage services, including real estate brokers and insurance brokers, were explicitly excluded from the definition of “brokerage services.” The choices Treasury and IRS made when providing additional guidance on SSTBs will significantly affect the tax burden and revenue collected from certain businesses. In its analysis of its decisions regarding the definitions of SSTBs, Treasury stated that articulating which business activities were or were not considered SSTBs would provide clarity to taxpayers and prevent similarly-situated taxpayers from behaving differently, which could potentially create economic inefficiencies. Treasury did not address the fact that decisions about which business activities would be considered SSTBs would affect eligibility for a 20 percent deduction, and would affect the distribution of resources between certain taxpayers and the federal government. According to data from IRS’s Statistics of Income on sole proprietorships—one of several business structures that can earn a QBI deduction—categories representing insurance agencies and brokerages, and offices of real estate agents, brokers, property managers, and appraisers recorded more than $35 billion in net income in 2016. The precise effect of not being categorized as an SSTB depends on the specific circumstances of the individual businesses, but given the magnitude of their annual net revenue, excluding real estate and insurance brokers from the definition of SSTB could lower their collective tax burden by billions of dollars annually. This could result in a reduction in federal tax revenues compared to the regulatory alternative of considering these sectors to be SSTBs. End date for opportunity zones. An investor who invests capital gains in a Qualified Opportunity Fund, and maintains that investment for at least 10 years, is eligible to make an election at the time of sale that would render such gains no longer taxable. TCJA’s statutory language did not specify an end date for investors to make this election, or a point at which taxpayers must dispose of investments in opportunity funds and recognize future capital gains to be taxed. IRS’s October 2018 proposed regulations for opportunity zones stated that investors will have until December 31, 2047, to dispose of investments and make this election. The decision to set an end date of December 31, 2047, was one of four approaches discussed in the proposed regulations. The other options considered were to offer no further guidance on this issue, to specify no end date to elect the gain exclusion, and to allow the election until December 31, 2047, but without disposition of the assets. In its analysis of this decision, Treasury considered how providing clarity would help taxpayers make more efficient investments in opportunity zones. Treasury also considered how forced dispositions could lead to economic inefficiencies, while a longer time horizon could lead to greater investment, but more administrative costs. Treasury did not, however, assess how the different decisions would influence the ultimate tax liability of investors. The determination of a disposition date can have a potentially large effect on tax liability. For example, if a taxpayer invested $1 million into an opportunity fund in 2019, and that grew at a 7 percent rate, it would be worth approximately $2 million after 10 years, $3.9 million after 20 years, and $6.6 million in 2047. Under Treasury’s and IRS’s regulations, such capital gains—$5.6 million in this example—would be exempted from taxation. We found that in the course of developing regulatory impact analyses for TCJA regulations, Treasury generally excluded any analysis of distributional effects due to changes in tax revenue collection. In the examples above, Treasury’s decisions would significantly affect tax liability for certain taxpayers, which were not reflected in Treasury’s analyses of the regulations. Treasury officials did not conduct distributional analyses related to revenue effects because in their view, the MOA instructed them to focus only on non-revenue effects and superseded E.O. 12866. This view is reflected in Treasury’s guidance to staff on how to conduct regulatory analyses. Specifically, Treasury’s internal guidance instructs staff to conduct distributional analyses, describing how benefits, costs, and transfers are distributed among subpopulations. This guidance further states that staff should not include transfers of revenue to the government, and Treasury officials told us that they did not think they should include any analysis of these effects in their regulatory impact analyses. However, Treasury’s understanding that revenue effects should be excluded from its analyses is inconsistent with the MOA and OIRA’s position. While Section 1 of the MOA between Treasury and OMB excludes revenue effects for the purposes of determining whether or not a regulation is economically significant, and thus subject to OIRA review, that limitation does not appear elsewhere in the MOA, and the MOA does not state that revenue should be excluded from all analysis. OIRA officials told us that that all agencies, including Treasury, are subject to the same requirements of E.O. 12866, and that outside of the MOA, OIRA had no agreements with Treasury that would otherwise modify the requirements. OIRA officials we spoke with reiterated that all agencies, including Treasury, should generally analyze the distributional impact of their regulations, and OMB’s guidance identifies changes in tax revenue as an example of a transfer that would have a distributional impact. OIRA officials stated that they recognize conducting these analyses was a new procedure for Treasury, and that Treasury officials were still learning how to apply the analytical framework in Circular A-4. Treasury’s internal guidance for conducting regulatory impact analyses is inconsistent with the standards in E.O. 12866 and OMB Circular A-4 that all agencies are expected to follow. Considering distributional effects related to tax revenue in the analyses would improve transparency surrounding how decisions made by Treasury and IRS affect various groups across the population. Robust analysis ensures that regulatory choices are made after appropriate consideration of the likely consequences, and provides transparency to the public and policymakers. Our prior work emphasizes the importance of transparency in the rulemaking process, and specifically that a regulatory impact analysis consistent with E.O. 12866 and OMB Circular A-4 provides a systematic framework for identifying and assessing the economic tradeoffs associated with alternative regulatory choices. By excluding analyses of distributional effects due to changes in tax liability, including effects on tax revenue collection, Treasury and IRS risk making regulatory decisions that have significant economic effects without fully understanding the consequences of their decisions. Further, the consequences of Treasury and IRS decisions and the tradeoffs they considered are not transparent to the public without an acknowledgement of the distributional effects of tax revenue changes. A lack of full information may also inhibit OIRA’s ability to effectively review the regulations and limit decision makers’ understanding of the effects of a law. Data-reliability issues in IRS’s documents for tracking implementation of TCJA’s business and international provisions made it challenging to characterize both the scope and status of implementation activities. However, based on IRS data we corroborated with publicly-available information (e.g., published guidance), we determined that IRS has made considerable progress in implementing many of TCJA’s business and international provisions through issuing guidance, updating IT systems, and training IRS staff. Given the magnitude of changes and near immediate effective dates, tax professionals we interviewed generally spoke favorably about IRS’s pace in developing TCJA guidance and the quality of the guidance developed. We found errors and inconsistencies in IRS’s documentation used to track TCJA implementation. While we did not find errors and inconsistencies in the majority of IRS’s TCJA implementation tasks, we did identify multiple instances of inaccurate recording of the task status, conflicting information in separate tracking documents, and several other miscellaneous errors. Examples include: Seven TCJA provisions and six updates to the IRM were inaccurately identified as complete in the tracking document for the responsible BODs, potentially delaying work on implementation. IRS had cancelled IRM updates for five IRM sections for one provision, but tracking documents across multiple BODs did not accurately capture this fact, which could result in a misallocation of staff and resources. IRS officials could not verify whether all tasks included in TRIO’s Enterprise Integrated Project Plan (EIPP) tracking document had been carried over to the new tracking documents following the dissolution of TRIO, increasing the risk of previously planned tasks mistakenly being left incomplete. At least 22 unique identifiers used to track tasks across iterations of TRIO’s EIPP tracking document were inconsistent between updates, limiting IRS’s ability to accurately track changes in guidance planning over time. The lack of consistency and accuracy across IRS’s tracking documentation is not in accordance with Standards for Internal Control in the Federal Government. These standards direct management to use quality information to make informed decisions and evaluate the entity’s performance or efficiency in achieving key objectives and addressing risks. Changes in IRS’s method of monitoring TCJA implementation status contributed to the data-reliability issues we identified. Early TCJA implementation efforts involved close coordination among multiple internal organizations. When TRIO was responsible for coordinating implementation efforts, it maintained a unified tracking system as part of its coordination management. However, when TRIO was disbanded, BODs and other IRS organizations used several different methods of tracking implementation status. According to IRS officials, in some cases, these new methods were not compared with TRIO’s documentation to ensure all necessary tasks were carried over. Additionally, the implementation tracking tools used by these organizations were not uniform in data included, format, or the frequency with which they were updated. These issues may impede the ability to coordinate internally and to monitor overall implementation status. IRS officials stated that these inconsistencies did not pose obstacles to implementation, and that the IRS organization with overall responsibility for a given task was accurately tracking implementation status. While IRS officials said the inconsistencies did not impact implementation, developing a process or modifying the existing process to accurately and consistently track the implementation status of provisions could improve IRS’s ability to prioritize resources and coordinate implementation efforts. For example, such tracking could help prevent misunderstandings regarding the implementation status of a provision that could lead management to reallocate resources away from ongoing implementation tasks. Further, it could help ensure IRS’s implementation efforts are efficient, as each BOD would have the same information to help coordinate prioritization efforts. While TCJA implementation is a one-time effort, IRS officials stated that efforts will extend beyond a decade into the future, as some provisions (such as opportunity zones) may require further guidance as key deadlines are reached. Additionally, IRS has identified the need for further guidance or implementation tasks as implementation has progressed, and the timeline for full implementation may be extended as IRS receives new information or observes changes in taxpayer behavior. Further, IRS is implementing provisions of a new law reforming aspects of the agency and may face similarly extensive implementation projects in the future. The Taxpayer First Act, signed into law on July 1, 2019, calls for several IRS reforms, including changes to rules related to enforcement as well as modernizing IRS structure and technology, among other things. Management may be able to identify issues with, or improvements to, the implementation process using quality information on implementation status. By improving the ability to monitor and evaluate implementation progress, IRS will be better equipped to evaluate existing implementation processes. IRS also will be better positioned to effectively implement significant tax law or organizational changes in the future. IRS has attempted to determine the amount of guidance required for TCJA implementation throughout the implementation process, but the amount of guidance has fluctuated for several reasons. For instance, in July 2018 IRS planned to issue 40 proposed regulations and 35 final regulations by December 2021 to implement the 86 business and international provisions. But by the end of the 2019 fiscal year, IRS planned to issue 53 proposed regulations and 51 final regulations by February 2022. According to IRS officials, they initially expected to issue less guidance than now planned, but as work progressed, they discovered they would need to issue more guidance or issue some guidance through multiple regulations to address taxpayer comments and inquiries. Conversely, in some cases IRS determined that some guidance initially planned was no longer necessary after further consideration. As of the end of fiscal year 2019, IRS Chief Counsel reported that it had issued 90 pieces of guidance and was developing another 43 to implement the 86 business and international provisions of TCJA. Overall, as of the end of fiscal year 2019, IRS publicly issued approximately half of planned official guidance. As shown in figure 2, for the 12 provisions that IRS identified as high-priority, the agency issued 13 of 19 planned proposed regulations and three of 18 planned final regulations. IRS missed internal target dates for issuing 10 guidance documents initially targeted for publication by the end of the fiscal year, including three final regulations. According to IRS officials, several factors affected IRS’s ability to issue guidance within planned time frames: Ambitious project planning. Scheduled completion dates for some tasks were “aspirational” and developed early in the implementation process. Officials stated that they understood from the beginning of implementation that their planned dates might change, and that they did not expect there to be any impact on taxpayers. Revised regulatory review process. As discussed earlier in this report, beginning in April 2018, OIRA began subjecting more tax regulations to further review as agreed to in the MOA between OMB and Treasury. Based on our analysis, from July 2018 to September 30, 2019, OIRA took an average of about 38 calendar days to review 25 TCJA business and international regulations. See appendix III for a table of all TCJA regulations relating to business and international provisions reviewed by OIRA and associated review times. Partial lapse in appropriations. According to IRS officials, a partial lapse in appropriations from December 22, 2018, through January 25, 2019, contributed to implementation delays. For example, IRS officials estimated that the issuance of final regulations for the qualified business income deduction and repatriation tax was delayed 1 to 2 weeks. While IRS was generally able to continue working on TCJA implementation tasks, it had to allocate some resources towards unplanned administrative tasks during this period. During a lapse of appropriations, the Antideficiency Act generally restricts agencies from continuing operations funded by annual appropriations. However, Congress passed a separate 2-year appropriation for IRS to perform TCJA implementation activities. Some IRS personnel that would otherwise have been furloughed were instead able to continue TCJA implementation work through the use of this special appropriation. Additionally, IRS had to develop justifications for the Federal Register to publish TCJA regulations during the lapse in appropriations that it would not have had to do in the absence of a partial lapse in appropriations, which reduced available resources for implementation tasks. IRS officials also stated that they faced issues working with partners at Treasury and OIRA. Treasury’s Lapse in Appropriations Plan states that Office of Tax Policy staff could work on policies to restore appropriations and developing revenue estimates for pending appropriations negotiations, but does not include work on TCJA. Further, while OIRA continued regulatory review in certain circumstances, approximately 67 percent of OMB’s staff was furloughed. Of the remaining guidance, IRS plans to issue 13 of the remaining final TCJA regulations related to business or international provisions by December 31, 2019. IRS plans to issue 12 final regulations in 2020, three in 2021, and one in 2022. It has not determined publication dates for 14 final regulations. To implement TCJA, IRS has provided a substantial amount of written guidance. Between TCJA’s enactment and the end of fiscal year 2019, IRS published 1,383 pages of guidance related to TCJA’s business and international provisions in the Internal Revenue Bulletin, out of a total of 4,064 pages published during that period. By comparison, from 2013 to 2015, IRS published approximately 2,000 pages of guidance annually. IRS also issued more than 115 pieces of business- and international- related products, including news releases, frequently asked questions, virtual webinars, YouTube videos, and targeted publications, such as the example in figure 3. Tax practitioners we spoke with were generally favorable about IRS’s pace in developing TCJA guidance and the quality of the guidance developed. For example, they generally stated that IRS’s multi-pronged approach to providing both official guidance and other information sources was helpful and allowed practitioners to understand of the likely impacts of tax reform prior to the release of final regulations better. Additionally, Tax Notes—a well-regarded publisher of a collection of professional tax products—named the IRS’s tax reform regulatory team as Person of the Year for 2018 for issuing many TCJA regulations in less than a year. According to IRS officials, IRS’s Information Technology organization completed all TCJA tasks that the organization agreed to complete prior to the opening of the 2019 filing season, including updates to electronic forms and the underlying technology IRS uses to receive returns. According to IRS officials, they completed these tasks by prioritizing TCJA work over other tasks and modifying its routine processes for implementing IT changes. IRS’s Information Technology organization also worked with the BODs to determine which data were most important to have in Extensible Markup Language (XML) format, which is more accessible than data in Portable Document Format (PDF) format. While BOD officials requested programming for TCJA-related requirements that would necessitate that the Information Technology organization enable forms in XML format, IRS’s Information Technology organization ultimately determined that it could not deliver updates for all TCJA affected forms in advance of the 2019 filing season, and forms where IT could not deliver updates in XML format would be implemented in PDF format. For example, according to IRS officials, they prioritized having tax year 2018 XML data for the repatriation tax because this tax was immediately effective for tax year 2017, had a short-lived time frame, and presented challenges for monitoring. BODs requested that all affected forms be converted for the 2020 filing season. To further facilitate the implementation of TCJA-related IT tasks, IRS officials told us that they designed a framework to streamline communication between the Information Technology organization, subject matter experts, and the IRS BODs. These sessions enabled staff to work through and identify IT requirements in real time, rather than requiring Information Technology organization staff to wait until the BODs submitted a work request to begin work. As of October 2019, IRS’s Information Technology organization had identified an additional 124 TCJA-related tasks for the 2020 filing season. Officials expected to complete these tasks prior to the filing season. According to IRS documentation and officials, these tasks include updating underlying programming of IT systems to capture tax return information in a way that can be more easily used for compliance purposes, updating critical IT systems, and implementing error resolution codes to correct some mistakes on submitted returns. While the Information Technology organization had not yet approved all work and some TCJA requested work was pending analysis or approval in its work tracking spreadsheet, according to Information Technology organization officials, they are aware of the work and proceeding with implementation for the Modernized e-File application, the system used to file returns electronically. According to IRS documentation, the agency has begun training staff on several TCJA provisions, including high-priority provisions, and plans to deliver additional training in 2020. According to IRS, workforce training is a critical component of tax law implementation to ensure that the workforce is equipped to identify and address potential audit issues associated with the new tax law provisions as well as to provide the appropriate level of taxpayer service. According to IRS documentation and officials as of the end of fiscal year 2019, the agency delivered training for business and international TCJA changes in multiple formats, including virtual and in-person training. These sessions have addressed at least 28 of the 69 business and international provisions identified as requiring training. IRS began larger scale in-person training in August 2019 and is developing content for further training in fiscal year 2020. The in-person training primarily addresses high-priority TCJA provisions such as QBI deduction, opportunity zones, the repatriation tax, the limitation on the interest deduction, the tax on global intangible low-taxed income, and the base erosion and anti-abuse tax. IRS officials said that their training efforts have been a major undertaking and that they focused their training efforts on high priority provisions and provisions that affected a large number of taxpayers. Some of these training sessions will culminate in an interactive risk assessment exercise. IRS planned to train about 8,500 employees in these sessions. IRS plans to continue TCJA training in 2020 as IRS finalizes regulations. According to SB/SE’s implementation tracking documentation, it plans to complete training by the end of 2020. According to LB&I documentation, it plans to hold virtual training in March, May, and June 2020 addressing, among other things, some high priority provisions, including the repatriation tax and base erosion and anti-abuse tax. Treasury did not issue all planned final regulations within the 18 months the agency generally has to issue regulations retroactive to the date of a law’s enactment or before taxpayers were required to file tax returns, which has the potential to be significant for both taxpayers and IRS. Specifically, of the 51 planned final regulations to implement TCJA business and international provisions, Treasury issued five within the 18- month time frame. Treasury also issued one temporary regulation within this time frame. Treasury did not release any final regulations for eight of its 12 priority provisions. As discussed earlier in this report, taxpayers and other stakeholders appreciated the supplemental information Treasury provided in the absence of final regulations. According to IRS Chief Counsel officials, however, a significant effect of relying on proposed regulations rather than final regulations is uncertainty. In instances where Treasury has yet to issue regulations or any other guidance, taxpayers must rely on the statutory language to understand the law. For example, LB&I officials said that taxpayers may not be able to correctly calculate tax for foreign branch losses because IRS included limited information on related forms as final guidance had not yet been issued. Similarly, tax practitioners we interviewed cited several provisions in need of additional guidance and identified challenges associated with those provisions that have the potential to affect taxpayers’ ability to comply with the law. Challenges identified by tax practitioners we interviewed included confusion regarding and challenges related to the definitions of “related party” and “interest” in the proposed regulations for the limitation on the deduction for interest and difficulty for individuals and corporations to understand and comply with international changes given the interdependence of several of the international provisions. A September 2019 Treasury Inspector General for Tax Administration (TIGTA) report also raised concerns related to taxpayers’ ability to comply with the international provisions. Further, proposed regulations are subject to change when Treasury finalizes them, which could create additional burdens for taxpayers. For example, Treasury’s proposed rule—issued in August 2018—for determining whether a foreign corporation’s earnings are subject to the repatriation tax was modified from a 5-percent threshold for application of the special attribution rules relating to partnerships and trusts to a 10- percent threshold under the final regulations—issued in February 2019. Because the repatriation tax was immediately effective, taxpayers needed to pay their tax liability, or make installment payments towards that liability, before IRS was able to finalize its regulations. Some taxpayers who would have been subject to the tax had the proposed regulations been finalized without change may not be subject to this tax because of changes between the proposed and final regulations, and any payments towards repatriation tax liability would no longer be needed. According to IRS officials, taxpayers who initially made repatriation tax payments but are not subject to the tax under the final regulations will need to file an amended return to receive a refund of their repatriation tax payments. The lack of finalized guidance can also create challenges for IRS in the agency’s efforts to ensure compliance with the new law. For example, LB&I officials told us they have identified form changes needed related to at least one TCJA provision for which Treasury had yet to issue final regulations, but they need to be mindful when proposing form changes because final regulations could require additional form changes and could require rework. Further, in September 2019, TIGTA reported that the lack of final of final guidance delayed training for LB&I staff, which could hinder LB&I’s ability to respond to emerging compliance risks. According to IRS Chief Counsel officials, if IRS believes that a rule articulated in proposed regulations under a statutory provision is correct, it may proceed to enforce that interpretation of the statute in the absence of final regulations. However, in the event of litigation, the interpretation set forth in the proposed regulations would not carry the same weight as final regulations. IRS may also face additional challenges administering the law in instances where the agency has yet to issue proposed regulations. Treasury can issue final regulations that are retroactively effective to the proposed regulations. As of the end of fiscal year 2019, Treasury had not issued 27 planned proposed regulations for business and international provisions. Generally final regulations not issued by the end of calendar year 2019 would not be effective until 2020. According to TIGTA, if IRS makes substantial changes to the proposed regulations, Treasury and IRS may decide not to apply those revisions retroactively to the date of the proposed regulations. While Treasury was unable to issue all final regulations within the 18- month time frame and before taxpayers needed to begin filing tax returns affected by TCJA changes, IRS took actions to mitigate the potential impact of the lack of final guidance. According to IRS officials, they prioritized which regulations needed to be issued to be retroactively applicable to the date of the law’s enactment. For example, Treasury’s QBI deduction regulations included anti-abuse rules to prevent taxpayers from being able to engage in transactions that will artificially increase their deduction. Treasury’s repatriation tax regulations also included rules preventing taxpayers from being able to take actions to reduce their repatriation tax liability. Further, in one instance, Treasury issued a temporary regulation in a situation where Treasury did not have time to issue proposed and final regulations to prevent abuse of TCJA changes related to a deduction for dividends received from certain foreign corporations. We identified 11 business and international provisions where TCJA’s statutory language either required or authorized additional information reporting to administer and enforce them. These include the QBI deduction, repatriation tax, and base erosion and anti-abuse tax. TCJA changes also enabled IRS to address a prior reporting gap related to foreign branch activity that will help with compliance and enforcement efforts, according to LB&I officials. As shown in the examples below, in some instances, the statute did not include an information reporting framework to enforce provisions, and IRS has taken some steps to mitigate information reporting gaps. Limitation on interest deduction. Tax practitioners we interviewed told us that they doubted that IRS would be able to verify information related to controlled foreign corporations that are subject to the limitation of business interest expense because there are limitations on information reporting from other countries. According to IRS officials, the statute made substantial changes to this code section and did not correspondingly include a framework for IRS to require information reporting. IRS is taking mitigation actions to help ensure compliance despite the lack of information reporting framework. For example, according to officials, IRS has the authority to require information from taxpayers and developed a new form to collect information needed to ensure taxpayer compliance with this change. In addition, IRS is planning to make changes to another form to help with compliance efforts. Opportunity zones. While the statute did not grant IRS specific authority to require information reporting for opportunity zones—a tax expenditure that is intended to spur economic growth in low-income areas—IRS has general authority to require information reporting and plans to require and use information reporting to ensure compliance with this provision. As shown in table 3, IRS plans to use information reported on four forms. Taxpayers who invest in qualified opportunity funds may qualify for potentially large benefits that are time dependent. When taxpayers initially invest eligible capital gains in qualified opportunity funds, they can defer the tax due on those gains until the earlier of 2026 or when taxpayers dispose, in whole or in part, of (e.g., sell or exchange) those investments. Specifically, taxpayers receive an increase in the basis of their investment in the qualified opportunity fund if they hold the investment at least 5 years and an additional increase in their basis if they hold their investments an additional 2 years. Taxpayers who hold investments at least 10 years can elect to have their investments valued at the fair market value when they dispose of the investments, and thus would not need to pay taxes on any gains on their initial investments. IRS plans to use taxpayer-reported information and possibly some fund-reported information on the forms listed above in table 3 to identify taxpayers who have invested in qualified opportunity funds to confirm eligibility for tax benefits for investing in and holding those investments in qualified opportunity funds. In other instances, third-party information is not available for IRS to corroborate taxpayer-related information. For example, above certain income thresholds only businesses engaged in an eligible trade or business qualify for the QBI deduction and this information is self- reported. Our past work has found that one of the important factors contributing to the tax gap is the extent to which information is reported to IRS by third parties. For example, according to 2011–2013 IRS data, for income types where there is little or no third-party information reporting (e.g., business income), taxpayers misreported more than half of this income. Without reliable information reporting, IRS will likely need to conduct labor-intensive audits, such as correspondence or face-to-face audits, to ensure compliance with certain TCJA provisions. The potential need to conduct labor-intensive audits could create challenges for IRS given recent trends in audit rates and staffing reductions. Specifically, IRS audit rates of large corporations with assets of $10 million or greater declined from 17.7 percent in fiscal year 2011 to 7.9 percent in fiscal year 2017. We previously reported that IRS’s staffing has declined each year since 2011, and has significantly reduced enforcement activities. In September 2019, TIGTA reported LB&I had difficulty hiring personnel with the skills needed for TCJA implementation. This could limit IRS’s ability to conduct correspondence or face-to-face audits to ensure taxpayer compliance, including TCJA provisions. LB&I and SB/SE officials expressed their confidence in IRS’s ability to audit TCJA provisions sufficiently. SB/SE has developed compliance plans for TCJA provisions identified as having the potential for fraud. SB/SE officials said TCJA work will be prioritized and SB/SE can use some filtering to help identify noncompliance. For example, regarding the QBI deduction, they said IRS may be able to identify returns that need further review based on tax return data. According to LB&I officials, they planned to hire an additional 600 staff, including about 300 revenue agents by the end of fiscal year 2019, and as of the end of the fiscal year, LB&I had selected 430 applicants to hire to help with compliance and enforcement efforts. Revenue agents are of particular importance to IRS’s enforcement efforts as they conduct audits of tax returns. In March 2019, we reported that IRS has skills gaps within its revenue agent workforce, and the agency was taking action to address those gaps. For example, the agency established communications with revenue agents to increase awareness about detail and developmental opportunities, and was developing a plan for more effectively including revenue agents in management training. We recommended that IRS take actions to reduce skills gaps among revenue agents, including developing schedules for skills assessments and reporting on agency efforts to close those gaps. IRS agreed with our recommendation and, as of December 2019, IRS plans to report on efforts to close skills gaps among revenue agents by December 2021. Because IRS had not yet updated all systems prior to accepting tax year 2018 (filing season 2019) returns, IRS was not able to capture all return information in XML format—a format that allows for greater accessibility and analysis. According to IRS documentation and officials, the agency was unable to obtain Extensible Markup Language (XML) data for 11 provisions that LB&I and SB/SE had requested for tax year 2018, including certain high-priority provisions. Instead, according to IRS officials, the agency captured this information in PDF, which is challenging for officials to use for data analytics and trend analysis. According to IRS officials, examiners will be able to view the PDFs and use that information if the return is selected for audit. Officials also told us they have other ways to select returns for audit in the absence of XML data. While the agency does not have any agency-wide plans to retroactively convert PDF data to XML data, which could help with compliance analytics and planning, IRS is capable of conducting this work. For example, IRS staff could transcribe, or manually enter, selected information from returns filed on paper into IRS’s IT systems to process these returns. Additionally, Information Technology organization officials told us they could develop a program to convert PDF forms to an XML format, if the effort is deemed a high priority. Converting data into usable formats for compliance purposes would be consistent with IRS’s strategic plan and Standards for Internal Control in the Federal Government. IRS’s strategic plan includes a strategic goal to advance data access, usability, and analytics to inform decision-making and improve operational outcomes. Specifically, IRS is to use analytics to improve enforcement efforts and maximize learning from tests and data. According to Standards for Internal Control in the Federal Government, agencies should use quality information to achieve their objectives. As part of this, agencies should obtain data and process these data into quality information. LB&I officials said they are taking steps to convert their PDF data into useable data for compliance purposes. According to LB&I officials, they identified which provisions’ data would be useful to retroactively transcribe and they are coordinating with other parts of IRS to complete the transcription. They identified the data on forms related to certain new TCJA provisions as a higher priority for transcribed data. According to officials, they then coordinated with various IRS offices, including the Office of Research Applied Analytics and Statistics, that have the capability to use optical character recognition technology to convert certain forms for these TCJA sections into a more useable format. Statistics of Income, a division within the Wage and Investment Division, is providing clerical staff to perform data validation on the converted data. According to LB&I officials, LB&I plans to use this information to help develop filters and compliance models and it will enable them to conduct analysis earlier than planned because they had not expected to have access to this data. Unlike LB&I, SB/SE had not reviewed the costs and benefits of converting PDF forms for their provisions to determine which PDF forms, if any, would be a good use of IRS resources to convert to XML format to help with compliance planning. According to SB/SE officials, they did not know IRS had the capacity to retroactively convert PDF data to XML format and were unaware of LB&I’s efforts to convert select TCJA PDF forms to useable data. Assessing the costs and benefits of converting PDF data to a more useable format, such as XML format, would be consistent with OMB guidance on using cost-benefit analysis to support agency planning efforts. OMB provides guidance to agencies for conducting economic cost-benefit and cost-effectiveness assessments that promote efficient resource allocation through well-informed decision-making. These assessments should consider different alternatives to meet program objectives along with a discussion of costs and benefits. For provisions where IRS does not have XML data, IRS may not be able to adequately identify both intentional and unintentional compliance risks and may be missing opportunities to better ensure compliance with and enforce TCJA provisions. For example, we previously reported that without comprehensive transcribed data, examiners cannot immediately access and review all data reported on tax returns, which burdened taxpayers as well as made examiners less efficient in doing their jobs. According to IRS officials, retroactively transcribed data would be helpful to SB/SE for compliance planning and enforcement efforts, especially for at least one TCJA provision. Further, taxpayers may think they are in compliance and may not be alerted to their errors until IRS has data stored in a format that can be analyzed more easily. Similarly, in October 2011 we reported that IRS said that having more tax return information available electronically, such as through transcription, would reduce burdensome examinations for compliant taxpayers, as well as facilitate enforcement efforts, make case resolution faster, and increase compliance revenue. However, without an analysis of the costs and benefits of retroactively converting PDF data to XML data, SB/SE cannot determine which PDF forms would likely yield benefits that would outweigh the costs of this effort. Management also cannot make an informed decision as to which PDF data would benefit SB/SE if converted to XML format without this information. While IRS may not have complete data on the potential benefits of converting PDF data to XML data, high-level analysis could show whether the potential benefits outweigh the costs. In instances where IRS finds that potential benefits outweigh the costs, SB/SE and IT could provide this information to management to inform its decision as to whether the work is cost effective. Using this information, management could determine if the work should be conducted, and if it should be a high priority for SB/SE and the Information Technology organization. As of the end of fiscal year 2019, IRS made considerable progress implementing TCJA, however, much work remains, and IRS has publicly issued approximately half of planned official guidance. Given the magnitude and immediate effective dates for many TCJA provisions, Chief Counsel collaborated earlier and more closely with IRS BODs which enabled the agency to more efficiently and effectively develop guidance that accounts for tax administration and enforcement concerns. Moving forward, IRS can leverage the lessons learned from this enhanced collaboration. By identifying situations when this earlier and more frequent collaboration would benefit IRS’s guidance development process and by updating any relevant policies or procedures to document beneficial collaboration practices, IRS will be better prepared to implement the next set of complex or time-sensitive changes to the tax code. In developing regulations for TCJA provisions, Treasury and IRS made decisions that could potentially affect tax liability by billions of dollars per year, which would have distributional effects on the economy, but these effects were not included in their regulatory analyses. The distributional effects of tax liability changes from regulations can be significant; updating Treasury’s internal guidance to include analysis of these effects in the rulemaking process would provide greater transparency to the public, and would better inform decision makers who must determine which regulatory alternative is the best to adopt. Addressing data reliability issues in IRS’s tracking documentation could better ensure that further TCJA implementation work is performed in an efficient and timely manner and better enables IRS to identify opportunities for improvements to their implementation process. Additionally, this could enable IRS to better complete and evaluate existing TCJA implementation processes, as well as be better equipped to improve those processes for future application. SB/SE’s ability to analyze tax return data and efficiently plan compliance efforts is impeded by the lack of easily accessible and useable data for certain TCJA changes. Taking steps to obtain these data in instances where the potential benefits outweigh the costs would help the agency identify return filing trends and potential noncompliance to help the agency improve audit selection. It would also help SB/SE fulfill IRS’s goals of improving operations using data analytics and would also help the agency be able to effectively ensure compliance with and enforce TCJA provisions. We are making a total of five recommendations, including four to IRS and one to Treasury. Specifically: The Chief Counsel of the Internal Revenue Service, in coordination with appropriate offices, should identify and document parameters and procedures for applying enhanced collaborative approaches to regulation and other guidance development with IRS Business Operating Divisions. (Recommendation 1) The Commissioner of Internal Revenue should develop a process to accurately and thoroughly capture implementation status of ongoing projects in accordance with Standards for Internal Control in the Federal Government. (Recommendation 2) The Commissioner of Small Business/Self Employed should coordinate with appropriate IRS divisions or offices to identify the costs and benefits of retroactively transcribing taxpayer data resulting from TCJA. (Recommendation 3) Based on the costs and benefits identified in recommendation 3, the Commissioner of Small Business/Self Employed should determine which TCJA provisions’ data should be converted into a more useful electronic format for compliance and enforcement purposes and work with the appropriate offices to obtain the transcribed data, as appropriate. (Recommendation 4) The Assistant Secretary of Tax Policy should update Treasury’s internal guidance to ensure that Treasury’s regulatory impact analyses include examination of the distributional effects of revenue changes when regulations influence tax liability. (Recommendation 5) We provided a draft of this report to the Commissioner of Internal Revenue, the Secretary of the Treasury, and the Director of the Office of Management and Budget for review and comment. In its written comments, which are summarized below and reproduced in appendix IV, IRS disagreed with the four recommendations addressed to that agency. The Director of Treasury’s Office of Tax Analysis did not comment on the merits of the recommendation directed to Treasury and provided other comments by email, which are summarized below. In addition, IRS, Treasury, OMB also provided technical comments, which we incorporated as appropriate. IRS disagreed with our recommendation to identify and document parameters and procedures for applying enhanced collaborative approaches to regulation and other guidance development (Recommendation 1). IRS stated it believes that its Internal Revenue Manual provides sufficient guidance and flexibility on when such enhanced collaboration is appropriate and that establishing specific criteria is likely to reduce the flexibility and independent judgement that presently exists. Additionally, IRS said that this type of collaboration is not needed for more routine tax law changes. We are recommending that IRS document the collaboration procedures that were cited as critical for implementing TCJA for use in specific instances—such as during complex or time-sensitive tax law changes. As discussed in the report and acknowledged in IRS’s letter, this collaboration was particularly helpful for TCJA implementation and had many benefits, such as faster decision-making and identifying enforcement concerns earlier in the guidance development process. We believe that by implementing this recommendation, IRS can help ensure that institutional knowledge and beneficial practices from TCJA implementation will be documented and effectively leveraged to support implementation of future time-sensitive or complex tax law changes without restricting IRS’s flexibility. Documenting procedures would ensure IRS can retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. For our recommendation that IRS develop a process to accurately and thoroughly capture implementation status of ongoing projects in accordance with federal internal control standards (Recommendation 2), IRS disagreed that a new process is needed and said that inaccurate reporting of implementation status did not harm IRS implementation of any TCJA provision. As we acknowledge in this report, IRS officials told us implementation was not impeded by data inconsistencies. However, accurately and thoroughly capturing implementation status on ongoing projects would provide accurate information to decision makers and could prevent potential misreporting, mismanagement, or inefficient resource investment in the future. For example, our ability to use these data to inform Congress of TCJA implementation status was impeded because we deemed the data unreliable for this purpose. Our recommendation does not require IRS to develop a new process for capturing and tracking implementation status. If deemed appropriate, IRS could, instead, update or modify existing processes in ways designed to ensure data reliability. IRS disagreed with our recommendations to identify the costs and benefits of retroactively transcribing certain taxpayer data and then to implement transcription based on this determination (Recommendations 3 and 4). IRS stated that retroactively transcribing data is a resource- intensive, manual process. We disagree with this assertion. LB&I is using optical character recognition to convert PDF data into a more useable format, which is a semi-automated process. Further, as also stated in this report, IRS IT officials we interviewed told us they had the capability to develop a program that would convert PDF data to a more useable format if IRS management deemed it a priority. In its response, IRS also states that the benefits of converting data to a more useable format are unknown. We do not expect IRS to conduct a complex and detailed cost-benefit analysis. Rather, as acknowledged in this report, a high-level analysis of costs and benefits could help IRS management determine what, if any, data would benefit compliance and enforcement efforts. IRS could use readily available existing information (such as the number of returns affected by a certain provision, LB&I and IT cost data on conversion efforts already implemented, or the usefulness of past compliance analytics in similar areas) to inform the analysis. IRS also states that the potential noncompliance costs are unknown until the agency completes audits of TCJA provisions. As we reported, conducting audits is labor-intensive and IRS’s audit rate and enforcement efforts have declined since 2011. Further, senior IRS officials we interviewed stated that a limitation of taxpayer information in the PDF format is that it is not easily analyzed. Therefore, we believe that converting data in instances where the benefits outweigh the costs would better position IRS to more effectively and efficiently pursue its mission of ensuring taxpayer compliance. In an email, the Director of Tax Analysis indicated that Treasury generally did not agree with the report’s findings regarding its economic analyses. The Director did not specifically comment on the merits of our recommendation that Treasury update its guidance for conducting regulatory impact analyses (Recommendation 5), but stated that the analyses underlying Treasury’s tax regulations have fully complied with the MOA established with OMB, which in Treasury’s view focuses on non- revenue effects. We maintain that decisions Treasury and IRS made when developing regulations to implement TCJA could potentially impact tax liability by billions of dollars per year; however, Treasury’s internal guidance dictates that these revenue effects should not be included in its economic analyses of the regulations. Amending Treasury’s guidance to ensure that impacts on tax revenue and liability are included would make the guidance consistent with E.O. 12866 and OMB Circular A-4, which underlie the MOA and instruct agencies to analyze the distributional consequences of regulations. Including these effects of tax regulations, as we recommended, is necessary in order to provide greater transparency to the public and better inform decision makers, who must determine which regulatory alternative is the best to adopt. We are sending copies to the appropriate congressional committees. We are also sending copies of the report to the Commissioner of Internal Revenue, the Secretary of the Treasury, the Director of the Office of Management and Budget, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or lucasjudyj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report (1) examines the Internal Revenue Service’s (IRS) processes that it has in place to provide guidance to taxpayers on Public Law 115- 97, commonly referred to as the Tax Cuts and Jobs Act of 2017 (TCJA) business and international provisions; (2) assesses the economic analyses Department of the Treasury (Treasury) conducted as part of the regulatory development process; (3) evaluates IRS monitoring of implementation of these provisions and describes implementation status; and (4) examines any challenges that could affect IRS’s ability to effectively administer these provisions. We defined business and international provisions as provisions assigned to IRS’s Large Business & International (LB&I) Division or Small Business/Self-Employed (SB/SE) Division. To examine IRS’s processes to provide guidance to taxpayers, we analyzed IRS documentation, such as prioritization records, guidance development records, and actual regulations and other guidance documents (e.g., notices and news releases) and interviewed IRS officials. Specifically, we reviewed IRS’s documentation of prioritization of TCJA provisions and interviewed IRS officials in the Tax Reform Implementation Office (TRIO) and the Office of Chief Counsel (Chief Counsel) to examine the criteria IRS used to prioritize TCJA provisions for implementation. We also reviewed IRS documentation on internal coordination and interviewed IRS TRIO and Chief Counsel officials to examine IRS’s strategy for and process of guidance development and IRS’s plan to provide taxpayers with timely information. We used criteria from Standards for Internal Control in the Federal Government and our key practices for collaboration to determine the extent to which IRS’s process for providing guidance to taxpayers was consistent with these standards and best practices. To assess the economic analyses Treasury conducted as part of the regulatory development process, we analyzed IRS, Treasury Office of Tax Policy (OTP), and Office of Management and Budget (OMB) documentation detailing the regulatory development and decision-making processes. We also interviewed officials from IRS TRIO, Chief Counsel, OTP, and OMB Office of Information and Regulatory Affairs (OIRA). Specifically, to identify the factors Treasury and IRS considered when analyzing trade-offs presented by different regulatory options to decide which regulatory options to select, we analyzed underlying regulatory development documentation and interviewed relevant officials. For example, we examined issues lists, internal memorandums, emails discussing regulatory alternatives and their tradeoffs, and early drafts regulations with internal comments. We also analyzed TCJA published regulations and interviewed OIRA and Treasury OTP officials to determine the extent to which Treasury OTP and IRS included discussions of regulatory alternatives and cost-benefit and economic analyses of these alternatives in the published regulations. We used criteria from OMB regulatory guidance for executive branch agencies to examine Treasury’s development and analyses of regulatory alternatives. This guidance includes the Memorandum of Agreement (MOA) between Treasury and OMB prescribing OMB review of tax regulations under Executive Order 12866; Executive Order 12866, Regulatory Planning and Review; and OMB Circular A-4, Regulatory Analyses, to determine the extent to which Treasury’s analyses met OMB guidance for developing regulations. To describe the implementation status of business and international TCJA provisions, we analyzed IRS project management documentation, such as IRS’s Enterprise Integrated Project Plan (EIPP) for TCJA implementation and publicly issued guidance and met with IRS officials. Specifically, we analyzed EIPP to determine which tasks were guidance or training related based on description, and developed keywords to limit our dataset to only relevant tasks. We interviewed IRS TRIO officials to ensure we accurately interpreted the description and status of the identified implementation tasks. We monitored for progress on guidance tasks by regularly reviewing IRS’s tax reform website and the Federal Register, as well as SB/SE and LB&I’s implementation trackers and Chief Counsel’s guidance planning documentation. We reviewed Chief Counsel, LB&I, and SB/SE documentation (e.g., implementation trackers) and met with those officials to understand their internal tracking mechanisms for TCJA tasks and implementation status. To monitor training tasks, we used the EIPP to establish which provisions would require training and reviewed training documentation (e.g., training schedules and materials) from LB&I and SBSE. To describe and monitor information technology (IT) implementation status, we analyzed IRS’s Information Technology organization’s TCJA implementation documentation and met with IRS Information Technology organization officials. We reviewed IRS’s IRM website to determine whether IRS had updated its IRM sections as planned in its EIPP and other planning documents. While we identified potential data reliability issues with the EIPP, LB&I’s implementation tracking documentation, and SB/SE’s implementation tracking documentation (including inaccurate recording of the completion status of multiple categories of tasks, inconsistent use of unique task identifiers across tracking documentation, and potential errors introduced in the transition from the EIPP to the subsequent tracking documentation), we determined that the data were sufficiently reliable for the purpose of reporting the status of guidance releases, training, and overall TCJA IT tasks. We did not find the data sufficiently reliable to report on the status of IRM updates. We were also unable to report on the number of IT tasks specific to business and international provisions as a subset of overall TCJA IT implementation because IRS’s IT organization did not track work by TCJA section. To assess the reliability of the EIPP, we met with TRIO officials to understand how the EIPP was created and updated, as well as verified information from outside sources, including the Federal Register and IRS’s tax reform website. After identifying potential discrepancies in LB&I’s and SB/SE’s TCJA tracking documentation, we followed up with SB/SE and LB&I to determine whether the status of our selected tasks was accurate and complete. SB/SE and LB&I provided responses and statements indicating that the status of some tasks was not accurately recorded. For example, we identified an instance where LB&I’s tracking documentation had a provision’s final regulations listed as issued in July 2019, when IRS had yet to issue the guidance. Based on these discrepancies and inconsistencies, we used criteria from the Standards for Internal Control in the Federal Government to evaluate IRS’s project management activities. To identify the impact of OIRA’s effect on the status of TCJA implementation, we analyzed information available on the agency’s public website to determine the length of time of OIRA review of regulations. We compared the length of time of OIRA’s review to agreed-upon time frames for OIRA review of tax regulations in the Memorandum of Agreement, Review of Tax Regulations under Executive Order 12866 (MOA) between Treasury and OMB to determine the extent to which OIRA met the MOA’s 10- and 45-day time frames. To examine challenges that could affect IRS’s ability to effectively administer these provisions, we analyzed TCJA and IRS documentation. Further, we interviewed TRIO, LB&I, SB/SE, IT, Chief Counsel officials, and outside tax practitioners. We analyzed TCJA’s statutory language to identify instances where the law included compliance safeguards, such as anti-abuse provisions or information reporting requirements. We reviewed IRS documentation (e.g., SB/SE compliance plans) and interviewed IRS officials to understand IRS’s views on the opportunities, challenges, and risks to administering and ensuring compliance with the new law. We also interviewed and subsequently analyzed statements from seven randomly selected tax practitioners who had submitted public comments on IRS’s proposed regulations for the qualified business income (QBI) deduction, opportunity zones, and the repatriation tax (see below for discussion of provisions we further analyzed) to identify outside perspectives on challenges for IRS administration and enforcement. We downloaded the public comments on these proposed regulations on April 9, 2019. For the QBI deduction, the open comment period was from August 16, 2018, to October 1, 2018, and as of the time we downloaded comments, there were 340 comments. For the repatriation tax, the open comment period was from August 9, 2019, to October 9, 2019, and as of the time we downloaded comments, there were 188 comments. For opportunity zones, the open comment period was from October 29, 2018, to February 8, 2019, and as of the time we downloaded comments, there were 185 comments. We also interviewed tax practitioners from two of the four “Big Four” tax firms and one outside tax practitioner to which we were referred to describe some outside opinions’ on challenges for IRS administration and enforcement. The views expressed in these interviews are not necessarily representative of those of other tax practitioners, or tax practitioners as a whole, and the views of the tax practitioners we interviewed are being used as illustrative examples throughout our report. We examined these challenges and risks and subsequently followed up with IRS to examine the extent to which IRS was aware of them and planning mitigating actions to address them. We used IRS’s strategic plan and to Standards for Internal Control in the Federal Government as criteria for identifying any gaps between mitigation efforts and overall agency-wide goals and priorities. As part of our work, we further analyzed three provisions—the QBI deduction, opportunity zones, and the repatriation tax—to gain specific insights into the decision-making process for prioritizing and developing guidance and regulations and factors that may affect IRS’ ability to effectively administer these provisions. We selected these three provisions for closer examination based on a number of factors, including (1) IRS designating them higher priority for implementation and identification, and (2) IRS, the National Taxpayer Advocate, and other knowledgeable stakeholders identifying them as especially challenging or complex to implement, administer, or enforce. Further, these three selections ensured we were able to examine at least one provision impacting domestic taxpayers managed by SB/SE division and at least one provision impacting foreign, or multinational, taxpayers managed by LB&I. We conducted this performance audit from August 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We found that, as of September 30, 2019, on average, the Office of Management and Budget’s (OMB) Office of Information and Regulatory Affairs (OIRA) completed its review of 25 Tax Cuts and Jobs Act of 2017 (TCJA) regulations in about 38 calendar days, as shown in tables 5 and 6. While according to the Memorandum of Agreement between OMB and the Department of Treasury, OIRA has 45 calendar days to review tax regulations, OIRA agreed to consider an expedited review of 10 business days for TCJA regulations. As of September 30, 2019, OIRA agreed to review three regulations in an expedited fashion and OIRA completed two of these reviews in 10 business days and the third in 12 business days. In addition to the contact named above, Brian James (Assistant Director), Dawn Bidne (Analyst-in-Charge), Michael Bechetti, Justin Bolivar, Tara Carter, Jacqueline Chapin, Nina Crocker, Robert Gebhart, Thomas Gilbert, Travis Hill, Naomi Joswiak, Mark Kehoe, Shelbe Klebs, Daniel Mahoney, Regina Morrison, Benjamin Moser, Sabine Paul, Bradley Roach, Erin Saunders-Rath, Jerome Sandau, Andrew J. Stephens, Rachel Stoiko, Jennifer Stratton, Peter Verchinski, and Sarah Wilson made key contributions to this report. 2019 Tax Filing: IRS Successfully Implemented Tax Law Changes but Needs to Improve Service for Taxpayers with Limited-English Proficiency. GAO-20-55. Washington, D.C.: January 15, 2020. Tax Gap: Multiple Strategies Are Needed to Reduce Noncompliance, GAO-19-558T. Washington, D.C.: May 9, 2019. Internal Revenue Service: Strategic Human Capital Management is Needed to Address Serious Risks to IRS’s Mission. GAO-19-176. Washington, D.C.: March 26, 2019. 2018 Tax Filing: IRS Managed Processing Challenges and Enhanced Its Management of Tax Law Changes. GAO-18-471. Washington, D.C.: September 10, 2018. Federal Regulations: Key Considerations for Agency Design and Enforcement Decisions. GAO-18-22. Washington, D.C.: October 19, 2017. Regulatory Guidance Processes: Treasury and OMB Need to Reevaluate Long-standing Exemptions of Tax Regulations and Guidance. GAO-16-720. Washington, D.C.: September 6, 2016. Federal Rulemaking: Agencies Included Key Elements of Cost-Benefit Analysis, but Explanations of Regulations’ Significance Could Be More Transparent . GAO-14-714. Washington, D.C.: September 11, 2014.", "summary": "According to IRS, TCJA was the most sweeping tax law change in more than three decades, with 86 provisions that modified, added to, or repealed business and international taxes, such as the qualified business income deduction. IRS determined it would take significant effort to implement the law given the limited time-frame and magnitude of the provisions. GAO was asked to review IRS's implementation of TCJA business and international provisions. Among other reporting objectives, this report examines IRS's (1) progress implementing the provisions, (2) processes to provide guidance, and (3) challenges for effectively administering these provisions. To address these objectives, GAO analyzed IRS documentation on project management, compliance planning, and regulation development. Additionally, GAO interviewed IRS officials and tax practitioners. The Internal Revenue Service (IRS) has made considerable progress issuing guidance to taxpayers for Public Law 115-97—commonly known as the Tax Cuts and Jobs Act of 2017 (TCJA)—but has additional work remaining to issue all planned guidance, as shown in the figure. To improve efficiency of TCJA guidance development, IRS internally collaborated earlier and more frequently than during more routine tax law changes. IRS officials said the benefits of this enhanced collaboration included faster decision-making on time-sensitive guidance, including regulations. IRS officials agreed enhanced collaboration had value but as of December 2019 had not identified the parameters for when this collaborative approach would be warranted. IRS may face challenges ensuring compliance with certain TCJA provisions because third-party information reporting is not always available. GAO's past work has found that one of the important factors contributing to the tax gap is the extent to which information is reported to IRS by third parties. Without third-party reporting, IRS will have to rely on resource-intensive audits to enforce certain TCJA provisions, which could be challenging given recent trends of declining audit rates and enforcement staff. GAO has recommendations from March 2019 for IRS to take actions to mitigate hiring risks and reduce skill gaps. IRS was also unable to update all information technology systems prior to the start of the 2019 tax season due to the magnitude of TCJA changes. As a result, IRS was not able to capture certain tax return information in a format that can be easily analyzed to help with compliance planning activities. One IRS division took steps to convert certain tax return data to a more useable format, but efforts to identify other viable opportunities have not been taken. Without appropriate data for analyses, IRS could face challenges enforcing certain TCJA provisions. GAO is making five recommendations, including that IRS develop and document procedures for continued enhanced collaboration and convert tax return data to a more useable format for compliance purposes. IRS disagreed; however, GAO believes that these recommendations will benefit guidance development and tax administration. In prior work, GAO recommended that IRS measure which activities are producing desired hiring outcomes and take steps to reduce skill gaps among revenue agents. IRS agreed with these recommendations and, as of December 2019, plans to report on efforts to close skill gaps by December 2021.", "document_type": "gao"}
{"report": "The Freedom of Information Act establishes a legal right of access to government information on the basis of the principles of openness and accountability in government. Before FOIA’s enactment in 1966, an individual seeking access to federal records faced the burden of establishing a “need to know” before being granted the right to examine a federal record. FOIA established a “right to know” standard, under which an organization or person could receive access to information held by a federal agency without demonstrating a need or reason. The “right to know” standard shifted the burden of proof from the individual to a government agency and required the agency to provide proper justification when denying a request for access to a record. Any person, defined broadly to include attorneys filing on behalf of an individual, corporations, or organizations, can file a FOIA request. For example, an attorney can request labor-related workers’ compensation files on behalf of his or her client, and a commercial requester, such as a data broker who files a request on behalf of another person, may request a copy of a government contract. In response, an agency is required to provide the relevant record(s) in any readily producible form or format specified by the requester, unless the record falls within a permitted exemption that provides limitations on the disclosure of information. Various amendments have been enacted and guidance issued to help improve agencies’ processing of FOIA requests. For example: The Electronic Freedom of Information Act Amendments of 1996 (1996 FOIA amendment) strengthened the requirement that federal agencies respond to a request in a timely manner and reduce their backlogged requests. Executive Order 13392, issued by the President in 2005, directed each agency to designate a senior official as its chief FOIA officer. This official was to be responsible for ensuring agency-wide compliance with the act. The chief FOIA officer was directed to review and report on the agency’s performance in chief FOIA officer reports. The OPEN Government Act, which was enacted in 2007 (2007 FOIA amendment), made the 2005 executive order’s requirement for agencies to have a chief FOIA officer a statutory requirement. It also required agencies to include additional statistics, such as more details on processing times, in their annual FOIA reports. The FOIA Improvement Act of 2016 (2016 FOIA amendment) addressed procedural issues, including requiring that agencies (1) make records available in an electronic format if they have been requested three or more times; (2) notify requesters that they have not less than 90 days to file an administrative appeal, and (3) provide dispute resolution services at various times throughout the FOIA process. Further, the act required OMB, in consultation with the Department of Justice, to create a consolidated online FOIA request portal that allows the public to submit a request to any agency through a single website. The 1996 FOIA amendment required agencies, including DHS, to generally respond to a FOIA request within 20 working days. Once received, the request is to be processed through multiple phases, which include assigning a tracking number, searching for responsive records, and releasing the records to the requester. In responding to requests, FOIA authorizes agencies to use nine exemptions to withhold portions of records, or the entire record. These nine exemptions can be applied by agencies to withhold various types of information, such as information concerning foreign relations, trade secrets, and matters of personal privacy. FOIA allows a requester to challenge an agency’s final decision on a request through an administrative appeal or a lawsuit. Agencies generally have 20 working days to respond to an administrative appeal. Created in 2003, DHS assumed control of about 209,000 civilian and military positions from 22 agencies and offices that specialize in one or more aspects of homeland security. By the nature of its mission and operations, the department creates and has responsibility for vast and varied amounts of information covering, for example, immigration, border crossings, law enforcement, natural disasters, maritime accidents, and agency management. According to its 2018 Chief FOIA Officer Report, DHS’s organizational structure consists of 24 offices, directorates, and components. FOIA requests are split between the department’s Privacy Office, which acts as its central FOIA office, and FOIA offices in the department’s component agencies. Three of the major operational components of DHS are: U.S. Citizenship and Immigration Services (USCIS) promotes an awareness and understanding of citizenship, and ensures the integrity of the nation’s immigration system. Its records include asylum application files and other immigration-related documents. Customs and Border Protection (CBP) secures the border against transnational threats and facilitates trade and travel through the enforcement of federal laws and regulations relating to immigration, drug enforcement, and other matters. The agency maintains records related to agency operations, activities, and interactions. Immigration and Customs Enforcement (ICE) promotes homeland security and public safety through the criminal and civil enforcement of federal laws governing border control, customs, trade, and immigration. It maintains information related to the law enforcement records of immigrants and detainees, as well as information pertaining to human trafficking/smuggling, gangs, and arrest reports. According to its 2018 Chief FOIA Officer Report, DHS and its component agencies reported that they processed 374,945 FOIA requests in fiscal year 2018—the most of any federal government agency. As of its 2018 report, the department had a backlog of 53,971 unprocessed requests— the largest backlog of any federal agency. Amendments and guidance relating to FOIA call for agencies, including DHS, to implement key requirements aimed at improving the processing of requests. Among others, these requirements call for agencies to (1) update response letters, (2) implement tracking systems, (3) provide FOIA training, (4) provide records online, (5) designate chief FOIA officers, and (6) update and publish timely and comprehensive regulations. As we noted in our June 2018 report, DHS had implemented these six FOIA requirements. Update response letters: The FOIA amendments require that certain information be included in agency response letters. For example, if part of a FOIA request is denied, agencies are required to inform requesters that they may seek assistance from the FOIA public liaison of the agency or the National Archives and Records Administration’s Office of Government Information Services (OGIS); file an appeal to an adverse determination within a period of time that is not less than 90 days after the date of such adverse determination; and seek dispute resolution services from the FOIA public liaison of the agency or OGIS. DHS had updated its FOIA response letters to include this specific information, as required per the amendments. Implement tracking systems: DHS used commercial automated systems, as called for by various FOIA amendments and guidance, and had established telephone or internet services to assist requesters in tracking the status of a request. The department used modern technology (e.g., mobile applications) to inform citizens about FOIA. The commercial systems allowed requesters to submit a request and track the status of that request online. In addition, DHS developed a mobile application that allowed FOIA requesters to submit a request and check its status. The department’s FOIA tracking systems were compliant with requirements of Section 508 of the Rehabilitation Act of 1973 (as amended), which required federal agencies to make their electronic information accessible to people with disabilities. Provide FOIA training: DHS’ chief FOIA officer offered FOIA training opportunities to staff in fiscal years 2016 and 2017, as required by the 2016 FOIA amendments. Specifically, the department provided training in responding to, handling, and processing FOIA requests. Provide records online: DHS posted records online for three categories of information, agency final opinions and orders, statements of policy, and frequently requested orders as required by 2009 memorandums from both the President and the Attorney General. Designate chief FOIA officers: DHS designated its Chief Privacy Officer as its Chief FOIA Officer. This position was a senior official at the assistant secretary or equivalent level, as required by a 2005 executive order and the 2007 FOIA amendments. Update and publish timely and comprehensive regulations: Guidance from the Department of Justice Office of Information Policy (OIP) encourages agencies to, among other things, describe their dispute resolution process; describe their administrative appeals process; notify requesters that they have a minimum of 90 days to file an administrative appeal; include a description of unusual circumstances and restrictions on an agency’s ability to charge certain fees when FOIA’s times limits are not met; and update agency regulations in a timely manner (i.e., update regulations by 180 days after the enactment of the 2016 FOIA amendment). DHS had addressed these five requirements in updating its regulations, as called for in the 2016 FOIA amendment and in related OIP guidance. The Attorney General’s March 2009 memorandum called on agency chief FOIA officers to review all aspects of their agencies’ FOIA administration and report to Justice on steps that have been taken to improve FOIA operations and disclosure. Subsequent Justice guidance directed agencies that had more than 1,000 backlogged requests in a given year to describe their plans to reduce their backlogs. Beginning in calendar year 2015, these agencies were to describe how they had implemented their plans from the previous year and whether that had resulted in a backlog reduction. In June 2018, we reported that DHS received about 191,000 to about 326,000 requests per year—the most requests of any agency—for a total of 1,320,283 FOIA requests in fiscal years 2012 through 2016. Further, the department had a backlog ranging from 28,553 in fiscal year 2012 to 53,971 in fiscal year 2018. The total numbers of these requests and backlogs are shown in table 1. We also reported that DHS, in its chief FOIA officer reports from fiscal years 2012 to 2016, stated that it had implemented several methods to reduce backlogs. According to the reports, the DHS Privacy Office, which is responsible for oversight of the department’s FOIA program, worked with components to help address the backlogs. The reports noted that the Privacy Office sent monthly emails to component FOIA officers on FOIA backlog statistics, convened management meetings, conducted oversight, and reviewed workloads. Leadership met weekly to discuss the oldest pending requests, appeals, and consultations, and determined steps needed to process those requests. In addition, in 2018, we noted that several other DHS components reported implementing actions to reduce backlogs. CBP hired and trained additional staff, encouraged requesters to file requests online, established productivity goals, updated guidance, and used better technology. USCIS, the National Protection and Programs Directorate, and ICE increased staffing or developed methods to better forecast future workloads to ensure adequate staffing. ICE also implemented a commercial off-the-shelf web application, awarded a multimillion-dollar contract for backlog reduction, and detailed employees from various other offices to assist in the backlog reduction effort. Due to these efforts by the Privacy Office and other components, the backlog dropped 66 percent in fiscal year 2015, decreasing to 35,374 requests. Yet, despite the continued efforts, the backlog numbers increased again. According the 2018 Chief FOIA Officer’s report, the department ended 2018 with a backlog of 53,971 requests. DHS attributed these increases to several factors, including an increase in the number of requests received, the increased complexity and volume of responsive records for those requests, and the loss of staff needed to process the requests. In June 2018, we reported that one reason DHS was struggling to consistently reduce its backlogs is that it lacked documented, comprehensive plans that would provide a more reliable, sustainable approach to addressing backlogs. In particular, it did not have documented plans that described how it intended to implement best practices for reducing backlogs over time. These best practices, as identified by Justice’s OIP, included specifying how DHS would use metrics to assess the effectiveness of backlog reduction efforts and ensuring that senior leadership supports backlog reduction efforts. In our June 2018 report, we recommended that the department take steps to develop and document a plan that fully addresses best practices with regard to the reduction of backlogged FOIA requests. In response, DHS reported that it had initiated a department-wide compliance assessment and stated that it planned to use the results of the assessment to help guide it in identifying best practices and areas of improvement. As of this month (October 2019), the department stated that the draft plan is currently with the components for review and is pending clearance. Until it has a final plan that fully addresses best practices, DHS will likely continue to struggle to reduce its backlogs to a manageable level. This is particularly important, as the number and complexity of requests will likely increase over time. Among the most frequent FOIA requests made to DHS are those for immigration files. These files usually contain various types of information pertaining to immigrants, including asylum applications, law enforcement records, and border crossing documents. As such, they may contain information and records that are generated by various DHS components or other agencies. In 2014, we reported that within DHS, three components—USCIS, CBP, and ICE—created most of the documents included in immigration files. USCIS was the custodian of the files, and all FOIA requests for such files were either initiated with, or referred to, USCIS for processing. Specifically, to process a FOIA request for an immigration file, the USCIS staff to whom the request was assigned first manually entered the requester’s data, such as a name and address, into USCIS’s FOIA system to establish a record of the request. Next, the staff retrieved and scanned the documents in the requested file and reviewed the documents. If all of the documents were generated by USCIS, the staff made redactions as needed, sent the documents to the requester, and closed out the request. Further, if the FOIA request covered files containing documents generated by CBP, then USCIS was able to process the request on the basis of an agreement to that effect with CBP. By having USCIS process such requests for CBP documents, the two components avoided duplication in their response to a FOIA request. In November 2014, however, we reported that USCIS and ICE did not have such an agreement for documents generated by ICE. Thus, the USCIS staff was to identify any such documents and make them available to ICE’s FOIA staff for their separate processing. In doing so, we noted that USCIS and ICE engaged in duplicative processing of FOIA requests for those immigration files containing documents related to law enforcement activities that were generated by ICE. Specifically, to facilitate ICE’s review of such files, USCIS staff transferred copies of the ICE-generated documents to a temporary electronic storage drive maintained by USCIS. ICE retrieved the documents, and the ICE staff then re-entered the data to create a new FOIA request in ICE’s FOIA processing system. The staff then proceeded with processing the requested documents, and released them to the requester—in essence, undertaking a new, and duplicate, effort to respond to the FOIA request. Figure 1 depicts the duplication that occurred in USCIS’s and ICE’s downloading and re-entering of data to respond to FOIA requests for immigration files. We noted that, up until April 2012, USCIS and ICE had an agreement whereby USCIS processed ICE’s documents contained in an immigration file. However, the components’ officials stated that, since that agreement ended, the components had not made plans to enter into another such agreement. According to ICE’s FOIA Officer, USCIS’s processing of ICE’s documents in immigration files was viewed as being too costly. Nonetheless, while there would be costs associated with USCIS processing ICE’s documents in immigration files, the potential existed for additional costs to be incurred in the continued duplicate processing of such files. Our work has noted that duplication exists when two or more agencies or programs are engaged in the same activities or provide the same services to the same beneficiaries. We concluded that the duplicate processing of a single FOIA request by USCIS and ICE staff contributed to an increase in the time needed to respond to a FOIA request for immigration files. Because USCIS did not send the immigration file to ICE until it had completed its own processing of the relevant documents— which, according to USCIS, took on average 20 working days—ICE usually did not receive the file to begin its own processing until the 20-day time frame for responding to a request had passed. We pointed out that re-establishing an agreement that allows USCIS to process ICE-generated documents included in requests for immigration files, to the extent that the benefits of doing so would exceed the cost, could enable the two components to eliminate duplication in their processes for responding to such a request. Further, it could help reduce the time needed by these components in responding to a request. Therefore, in November 2014, we recommended that DHS direct the Chief FOIA Officer to determine the viability of re-establishing the service- level agreement between USCIS and ICE to eliminate duplication in the processing of immigration files. We stressed that, if the benefits of doing so would exceed the costs, DHS should re-establish the agreement. We also reported on our finding and recommendation regarding duplicate processing in our reports and updates on fragmentation, overlap, and duplication, issued in 2015 through 2019. In response, DHS indicated that it was working on a system intended to address the duplication. Specifically, in August 2018, DHS’s Privacy Office Director of Correspondence/Executive Secretary stated that the Privacy Office was leading a working group in collaboration with the Office of the Chief Information Officer to develop requirements for a single information technology solution for processing incoming FOIA requests. The director added that DHS used three disparate systems to track, manage, and process FOIA requests and that moving USCIS and ICE to one processing solution should result in processing benefits and lower overall administrative costs. We continue to track DHS’s progress in implementing this recommendation. However, as of October 2019, DHS’s Privacy Office stated that these actions were still in progress. In conclusion, DHS has implemented a number of key FOIA practices. However, it does not have a comprehensive plan to address its FOIA backlog, nor has it yet addressed duplication in its FOIA process. Addressing both of these issues is important, as the number and complexity of requests will likely increase over time and DHS may be challenged in effectively responding to the needs of requesters and the public. Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staffs have any questions about this testimony, please contact Vijay A. D’Souza, Director, Information Technology and Cybersecurity, at (202) 512-6240 or dsouzav@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony statement. GAO staff who made key contributions to this testimony include Neela Lakhmani and Anjalique Lawrence (assistant directors), Kara Epperson, Christopher Businsky, Nancy Glover, and Scott Pettis. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "FOIA requires federal agencies to provide the public with access to government records and information based on the principles of openness and accountability in government. Each year, individuals and entities file hundreds of thousands of FOIA requests. DHS continues to receive and process the largest number of FOIA requests of any federal department or agency. For fiscal year 2018, over 40 percent of federal FOIA requests (about 396,000) belonged to DHS. GAO was asked to summarize its November 2014 and June 2018 reports which addressed, among other things, (1) DHS's methods to reduce backlogged FOIA requests and (2) duplication in DHS's processing of FOIA requests. In conducting this prior work, GAO evaluated the department's and components' FOIA policies, procedures, reports, and other documentation; and interviewed agency officials. GAO also followed up on its recommendations to determine their implementation status. The Department of Homeland Security's (DHS) responsibilities for processing Freedom of Information Act (FOIA) requests are split between the department's Privacy Office, which acts as its central FOIA office, and FOIA offices in the department's component agencies, such as U.S. Citizenship and Immigration Services and Immigration and Customs Enforcement. In 2018, GAO reported that DHS had implemented several methods to reduce backlogged FOIA requests, including sending monthly emails to its components on backlog statistics and conducting oversight. In addition, several DHS components, implemented actions to reduce their backlogs. Due to efforts by the department, the backlog dropped 66 percent in fiscal year 2015, decreasing to 35,374 requests. Although there was initial progress by the end of fiscal year 2015, the number of backlogged requests increased in fiscal years 2016 and 2018 (see figure). One reason DHS was struggling to consistently reduce its backlogs is that it lacked documented, comprehensive plans that would provide a more reliable, sustainable approach to addressing backlogs and describe how it will implement best practices for reducing backlogs over time. DHS attributed the increase in its FOIA backlogs to several factors, including the increased numbers and complexity of requests received and the volume of responsive records for those requests. Until it develops a plan to implement best practices to reduce its backlogs, DHS will likely continue to struggle to reduce the backlogs to a manageable level. In addition, in 2014 GAO reported that certain immigration-related requests were processed twice by two different DHS components. The duplicate processing of such requests by the two components contributed to an increase in the time needed to respond to the requests. GAO continued to report this issue in its 2019 annual product on opportunities to reduce fragmentation, overlap, and duplication. In its prior reports, GAO made five recommendations to DHS. These included, among other things, that DHS (1) take steps to develop and document a plan that fully addressed best practices with regard to reducing the number of backlogged FOIA requests and (2) eliminate duplicative processing of immigration-related requests. The department agreed with the recommendations. However, as of October 2019, DHS had not fully implemented all of them.", "document_type": "gao"}
{"report": "DOD uses military and commercial satellite communications (SATCOM) to meet its global communications requirements. DOD acquires wideband capacity through two methods: DOD purpose-built: DOD obtains some of its SATCOM through its purpose-built systems, which include Wideband Global SATCOM (WGS) satellites. While DOD awards contracts to commercial companies to build these systems, the department is responsible for the systems’ procurement, operations and sustainment; therefore, they are considered purpose-built. Commercial contracts: DOD also purchases commercial SATCOM services to supplement its purpose-built systems, such as for satisfying users who have needs beyond available military satellite resources, supporting training on ground systems, or meeting the needs of unique users. In these cases, DOD acquires commercial SATCOM bandwidth through several competitively selected vendors, who are responsible for operating and sustaining their own systems. Military SATCOM architectures fall into three types: protected, which provides secure, assured communications; wideband, which supports worldwide capacity for high data rate communications, including high-quality voice and imagery; and narrowband, which provides reliable and secure communications less vulnerable to adverse weather conditions or other physical limitations, such as distance, dense foliage, and terrain. DOD’s primary wideband satellite communications system, WGS, currently provides a portion of DOD’s required SATCOM bandwidth, but the Air Force estimates its satellite constellation’s capabilities will begin to degrade in the late 2020s. The Air Force is adding at least one more satellite to the WGS constellation and plans for an enhanced WGS-11 to provide the capacity of two satellites. During the Wideband AOA, DOD estimated that adding this satellite to the constellation would extend the availability of wideband communications to 2031. According to the Air Force, there is potential for adding a 12th WGS satellite to the constellation. Like other types of space systems, DOD’s wideband SATCOM systems generally involve four types of interrelated segments that make a space capability fully functional. As illustrated in figure 1, they include (1) the space segment—namely the satellites; (2) the ground segment, with network services and also including satellite and payload control systems and data processing subsystems and facilities; (3) user equipment, such as radios, terminals, and routers needed by the warfighter to use the capability; and (4) launch vehicles and facilities. Within the space segment, satellites operate in several different types of orbits to meet different communication and mission needs, as shown in figure 2. The orbital location of a satellite can affect its capacity to transmit data, or what parts of the Earth can receive its signal. For example, highly elliptical orbits are necessary for providing long dwell times over northern latitudes due to the curvature of the Earth, while other orbits cover remaining latitudes. Wideband satellites operate in different radio frequency spectrum bands. DOD typically relies on C, X, Ku, and Ka-bands to provide wideband connectivity, determined by where and how users are operating. Each of these frequency bands has advantages and disadvantages for various applications. Satellite transponders operating at the lower C-band frequencies are less susceptible to degradation from rain than other bands. In the United States, the X-band is specifically designated for use by the U.S. government and the North Atlantic Treaty Organization. The Ku-band operates at higher frequencies and can communicate with smaller antennas and offer more flexibility. The still-higher-frequency Ka- band satellites can transmit more data than C, X, and Ku-band satellites, but their signals are more susceptible to degradation from water vapor and rain than satellites in lower frequency bands. Commercial satellite communication providers have historically operated primarily in the Ku- band but are now expanding services in the Ka-band to offer higher data rates. An AOA is a key first step in DOD’s acquisition process and assesses alternative solutions for addressing future needs. DOD acquisition guidance provides the purpose and procedures associated with conducting an AOA to support decision making. DOD experts in areas such as cost estimating, technological analysis, and acquisitions, along with military and commercial stakeholders, comprise the AOA study team. The study team is involved in the day-to-day work of the AOA process and conducts the analyses that form the foundation of the assessment. During the AOA study period, the study team develops alternatives to satisfy capability gaps that they assess against pre-established performance requirements. We have identified 22 best practices for an AOA process. Of these, 6 best practices are associated with a “comprehensive” AOA. Comprehensive means that the AOA process ensures that the mission need is defined in a way to allow for a robust set of alternatives, that no alternatives are omitted, and that each alternative is examined thoroughly for the project’s entire life cycle. Without a clearly defined mission need and comprehensive list of alternatives, the AOA process could overlook the alternative that best meets the mission need. Furthermore, without considering the complete life cycle of each alternative, decision makers will not have a comprehensive picture of the alternatives analyzed. DOD completed its analysis of wideband SATCOM alternatives in June 2018 and identified 11 alternatives that represent several possible approaches to SATCOM acquisitions. We found the Wideband AOA to be a comprehensive assessment. The Office of the Secretary for Defense for Acquisition and Sustainment completed the Wideband AOA in June 2018 to support decision making for future wideband architectures. Several subsystems comprise a SATCOM architecture and can include the number, type, orbital location, and capacity of satellites and associated ground or user segments. WGS constellation satellites will begin reaching their end of life in the early 2030s, which means DOD will need to begin launching replacement system satellites in the late 2020s. DOD satellite systems take, on average, over 7 years to develop and launch the first satellite of a purpose-built system. Given these time frames, the Wideband AOA study team focused on possible alternatives DOD could begin developing as early as 2019. In October 2016, the Office of the Secretary of Defense- Cost Assessment and Program Evaluation developed the Wideband Communications Services Analysis of Alternatives Study Plan. This Study Plan provided the schedule and tasks to be conducted for the Wideband AOA. These tasks included identifying study questions to be addressed and listing measures of performance and effectiveness. The Study Plan also described the organizational structure and methodology for executing the Wideband AOA. The Wideband AOA study team developed 11 alternatives that broadly represented three different acquisition approaches: legacy DOD SATCOM procurement focused on purpose-built systems with some commercially-contracted services; commercial-focused SATCOM procurement; and a strategy that would transition from a mainly purpose- built system to a more commercial SATCOM-oriented model. Historically, DOD has bought purpose-built SATCOM assets, including satellites and supporting ground systems, while contracting for supplemental commercial bandwidth. Table 1 summarizes the architectures and these approaches. Our assessment of the Wideband AOA found that it met our criteria for a comprehensive AOA process. Table 2 shows our determinations of how fully the Wideband AOA met each of our six best practices. Appendix I provides more detail on our AOA best practices. Based on our analysis, we found that the Wideband AOA study team thoroughly addressed a wide range of possible satellite system alternatives. Moreover, the Wideband AOA study examined the ground segment systems—including user terminals—which will communicate with the satellite system DOD chooses to replace WGS. Although user terminals were not the primary focus of this AOA, DOD officials told us this effort was the first time DOD has studied and consolidated department-wide costs for these terminals, which they said provided valuable context to decision-makers. We discuss this new information on terminals in further detail later in this report. As set forth in the AOA Study Plan, the Wideband AOA study team solicited and incorporated input from across DOD stakeholders, such as the military services, operational users, and SATCOM partner nations. The study team also solicited and incorporated information from commercial SATCOM vendors to inform its alternatives. Additionally, the Wideband AOA study team incorporated information from interrelated studies, referred to as pilots and pathfinders, that the Air Force and Defense Information Systems Agency conducted. These studies recommended ongoing experimentation and adaptation to identify, incorporate, and guide future commercial SATCOM development, as well as changes to DOD’s approach to SATCOM acquisitions. As set forth in its Study Plan, the Wideband AOA study team obtained military input from across DOD and information from commercial SATCOM vendors to inform its alternatives. AOA working groups were one of several mechanisms DOD used to obtain stakeholder input. The AOA study plan directed the establishment of eight working groups to consolidate subject matter experts for relevant SATCOM topics, as shown in table 3. Each working group, task force, and team conducted its analysis and wrote an appendix to the AOA report summarizing its methodology, inputs, and results. Each team also provided its own conclusions or recommendations, which contributed to the overall findings and recommendations of the AOA report. Military service representatives who participated in the Wideband AOA described to us how their personnel were involved in many or all of the working groups. AOA study leaders also emphasized the quality of the input from the working groups and were confident the AOA successfully captured the perspectives of acquisition, operational, and user communities—personnel responsible for buying, controlling, and using wideband SATCOM. In addition to the working groups, the Wideband AOA study team developed functional requirements for the alternatives by requesting SATCOM user demand data from the services, and invited SATCOM partner nations to participate in the AOA—a portion of which accepted. These efforts provided additional information from user communities. Wideband AOA study team leaders described how they relied on a formal Joint Chiefs of Staff process to obtain inputs from the military services on their current and projected bandwidth demands. Through this process, the department obtained SATCOM user demand data from combatant commands, military services, and their sub-commands. The AOA study team then used these results to develop an aggregate user demand projection that was foundational to the AOA. Any viable alternative had to provide sufficient bandwidth to meet future user demand. DOD requested inputs from commercial SATCOM vendors and the Commercial Working Group used these to identify the space system subcomponents, namely technical characteristics, including frequency bands, orbit, and satellite mass that the Technologies and Alternatives Working Group eventually combined into the 11 final alternatives. The Commercial Working Group’s intent in identifying these subcomponents was to represent capabilities the SATCOM industry will have on-orbit by 2023, without depicting any single vendor’s potential system. The Commercial Working Group also incorporated results from DOD pilot and pathfinder efforts (discussed below) to develop a roadmap for DOD to implement an enterprise management approach to SATCOM procurement and operations. The Air Force and Defense Information Systems Agency conducted interrelated pilot and pathfinder studies before and during the Wideband AOA that provided information on SATCOM business arrangements, user terminal prototyping, and acquisition efficiencies. In 2014 and 2015, Congress authorized, and then directed, DOD to carry out a pilot program on the acquisition of commercial satellite communication services. As part of this pilot, DOD initiated pathfinder projects to test the feasibility of these new business arrangements. The Air Force and Defense Information Systems Agency studied and prototyped methods to improve commercial SATCOM acquisition and provide more flexible satellite connections for mobile SATCOM users. The agencies did so by contracting with commercial SATCOM providers for the following: Air Force Pilot – define and demonstrate prototyping to improve access to commercial SATCOM. The Air Force completed phases 1 and 2 of this 3-phase pilot program, studying preferential purchasing approaches that incentivize industry and the types of SATCOM architectures that enable such purchasing, such as a managed services approach that consolidates commercial SATCOM procurement for DOD users. Phase 1 studied commercial satellite communication architecture and business structures. The Wideband AOA’s Commercial Working Group used the phase 1 results in its modeling of SATCOM enterprise management. Phase 2 demonstrated a flexible modem-to-terminal interface to allow a terminal to “roam” or switch between different manufacturers’ satellite constellations. Phase 3 is ongoing and focuses on network integration risk reduction efforts. Air Force Pathfinders – prove that innovative business arrangements can meet DOD requirements and reduce costs. Through the pathfinder research efforts, the Air Force purchased an on-orbit transponder as well as pre-launch transponder to demonstrate different strategies for buying SATCOM. The final pathfinder effort is ongoing and is to demonstrate how access to shared bandwidth and more flexible ground systems can improve SATCOM access for warfighters. These types of capabilities help users to move more quickly and easily, with a reliable SATCOM connection. Defense Information Systems Agency Pathfinders – examine how acquisition efficiencies improve SATCOM services. The pathfinders’ findings provided observations on market trends for SATCOM contracting, namely that pricing will continue to decrease. The pathfinders also showed that DOD’s typical SATCOM requirements are not stable from year to year, meaning DOD cannot accurately predict when or where it will need surge SATCOM capacity. The pathfinders also identified management challenges to aggregating SATCOM requirements. The pilot and pathfinder efforts recommended ongoing experimentation and adaptation to identify, incorporate, and guide developing commercial SATCOM capabilities, as well as changes to DOD’s traditional approach to SATCOM acquisitions. In particular, both the Air Force and Defense Information Systems Agency recommended that DOD adapt to changing business models, especially for managed services in commercial SATCOM, in which DOD would purchase SATCOM services but would not own or manage the systems and data rates. Changing business models could also include greater coordination with the SATCOM industry, so DOD can better incorporate commercial technology into future systems. The Defense Information Systems Agency also recommended that DOD pursue an alignment of common types of user terminals and SATCOM architectures. For example, many programs use a different approach to procuring terminals and SATCOM architectures, which prevents DOD from taking advantage of commonalities that could save resources. Such commonalities include users in the same geographic area. These Air Force and Defense Information Systems Agency recommendations overlap with half of the findings and recommendations of the Wideband AOA. DOD concluded in the Wideband AOA that integrating purpose-built satellite systems and commercially-provided systems into a hybrid architecture would be more cost effective and capable than any single purpose-built or commercial system alone. The AOA study team recommended actions to obtain more information on transitioning to a more integrated architecture of purpose-built and commercial systems and reducing risk. However, DOD does not have a plan to implement these recommendations and inform timely decision-making. During the AOA, DOD found that integrating purpose-built satellites and commercially-provided systems into a hybrid architecture would save costs and provide more capability than any single purpose-built or commercial system alone. The department currently uses a mix of purpose-built and commercial SATCOM contracts, but DOD has not historically managed these systems in coordination, or with an enterprise approach. DOD considered 11 architectures in its final analysis and all were to some extent hybrids of purpose-built and commercial systems because the AOA study team found that DOD requires a combination of military and commercial system capabilities. The Wideband AOA report identified three of the 11 potential architectures that would best meet DOD’s wideband SATCOM needs: Legacy Purpose-Built and Commercial Contracting Architecture - Procure and field a new purpose-built constellation for X and Ka-band capabilities with anti-jam technologies and upgraded antennas. DOD would continue to contract for commercial SATCOM as needed. Commercial-Oriented Architecture - Pursue advanced commercial high capacity satellites with steerable beams over the Ka-band. Also procure 10 purpose-built satellites to meet the military’s requirement for X-band communications. Transitional Step to Commercial Architecture - Transition to commercially-managed services architecture in low-Earth orbit for approximately 5,000 users over the long term. DOD would procure and field the modernized, purpose-built legacy architecture described above, then modify its suite of user terminals to align with the new low-Earth orbit satellites, emphasizing a cost-effective strategy to do so. For users who do not transition to the new commercial satellites, the purpose-built constellation provides continued X and Ka-band capability. During the Wideband AOA, DOD found that any post-WGS solution must continue to provide purpose-built SATCOM capabilities. For example, some users require X-band communications and identified this as the single most important capability to maintain. However, commercial constellations provide limited X-band communications due to this band’s historical use for military communications. The companies and international partners that do offer X-band communications provide fragmented coverage that does not fully meet DOD’s needs. In addition, commercial satellite constellations do not offer services in all of the areas DOD operates, such as over oceans and in polar regions. At the same time, because purpose-built systems alone cannot meet all military requirements, DOD found it will need to rely on commercial capabilities as part of a future architecture. Consequently, the AOA study team assessed alternatives that would expand DOD’s use of emerging commercial technologies. For example, DOD expects certain operations, like aerial vehicle flights that rely on wideband SATCOM, to increase and drive demand for commercial SATCOM capabilities. Moreover, the AOA study team found that emerging commercial capabilities could meet routine military needs, such as training, at a competitive cost. The AOA study team concluded integrating these capabilities into a future architecture would be beneficial. In its Wideband AOA report, the AOA study team made a series of recommendations focused on maintaining current wideband capabilities and overcoming near-term information gaps in transitioning to new SATCOM acquisition and management approaches. All of the recommendations focused on gaining information needed to transition to a hybrid architecture of purpose-built and commercial systems in the long term. Table 4 provides examples of DOD’s recommendations and the additional knowledge DOD needs to obtain as it pursues a post-WGS solution. The Wideband AOA recommendations also addressed risks associated with any new SATCOM architecture, which the study team found include: (1) the uncertain stability and maturity of emergent commercial SATCOM systems and (2) the magnitude of replacing or modifying SATCOM user terminals. Commercial Technology Stability and Maturity: DOD found in the Wideband AOA that the commercial SATCOM market needs time to grow and stabilize as industry seeks to build a consumer base, especially for low-Earth-orbit-based internet services. The AOA study team found that if commercial companies cannot close their businesses cases around proposed solutions, DOD investments or programs that rely on those proposed solutions may fail. Further, many commercial systems, especially those based in low-Earth orbit, are still maturing. SATCOM providers have not yet worked closely with DOD to see how they would need to modify such constellations to operate with future DOD systems, including ground systems. Wideband AOA stakeholders—military and commercial—also described their struggle to share information on technical requirements, new capabilities, and pricing. For example, military stakeholders wanted more detailed engineering data on emerging commercial capabilities while commercial stakeholders wanted additional information on proposed alternatives for providing cost data. Commercial stakeholders also sought to protect their proprietary information. DOD’s recommendation to invest in and shape commercial SATCOM development is aimed at reducing this risk and improving information sharing between DOD and the SATCOM industry. Replacing or Modifying User Terminals: Managing user terminal development and upgrades is complex and, according to DOD officials, is one of the largest challenges the department faces in selecting a post-WGS architecture. In its analysis, DOD found that managing upgrades or replacement costs and schedules for over 17,000 terminals of approximately 135 different designs was a major challenge. The AOA’s analysis showed that out-of-cycle terminal replacement would drive significant costs and affect DOD operations. For example, vehicles like Humvees or ships have maintenance periods that are scheduled years in advance. Changing terminals could require unscheduled maintenance, potentially disrupt personnel planning, and cost more than if the terminals were upgraded on their planned refresh cycles. Certain users also cannot transition to commercial SATCOM and still meet operational requirements. For example, Navy stakeholders told us their terminals were not considered for transition to commercial systems during the Wideband AOA due to a number of issues, including Ku-band radio frequency interference, all-weather availability, open ocean coverage, and network constraints. Both our past work and the Wideband AOA found that DOD faces ongoing risks in aligning its satellite and ground control systems. We have reported that these risks have arisen, in part, because user terminal development programs are typically managed by different military acquisition organizations than those managing the satellites and ground control systems. The AOA recommendation to develop an enterprise SATCOM terminal strategy is aimed at reducing the risk user terminals present to DOD’s post-WGS SATCOM architecture. DOD’s recommendations that focus on gaining additional knowledge align with GAO’s acquisition best practices for knowledge-based decision- making and risk reduction, but DOD lacks a formal plan to implement these recommendations. More specifically, DOD’s recommendation to gain knowledge about the viability and maturity of commercial SATCOM system technologies corresponds with our best practices that outline the importance of ensuring needed technologies are proven to work as intended before programs begin. According to officials we spoke with from various DOD organizations involved in the Wideband AOA and SATCOM acquisitions, they have work ongoing that provides relevant information, including Air Force pathfinders and a study of ground infrastructure supporting WGS. However, these officials told us that there is no formal plan to guide post-AOA efforts including coordinating and providing the knowledge DOD needs to mitigate risks and inform timely decisions on DOD’s next wideband communications architecture. If DOD does not develop and implement a plan—including roles, responsibilities, and time frames—for building knowledge, then DOD risks not having enough information to make timely, knowledge-based decisions on systems that provide critical communications for military operations. For example, the Wideband AOA recommended developing an enterprise terminal strategy to centralize user terminal procurement. Without a plan to guide such an effort, it is unclear what organization within DOD would begin working with the military services to develop this strategy and potentially adjust the services’ acquisition approach to terminals. At the same time, it is important to note that DOD space acquisition is facing a changing leadership environment, and developing and implementing a plan for post-AOA efforts would need to take place in the midst of such changes. In 2016, we reported that for over 2 decades, fragmentation and overlap in DOD space acquisition management and oversight had led to ineffective and untimely decision-making, leading to delays in space system development and increasing the risk of capability gaps across critical weapons systems. DOD and Congress are taking steps designed to ultimately streamline decision-making and clarify authorities for space; however, it will likely take several years to implement such changes. Moreover, it is unclear the extent to which these changes will affect acquisition of user terminals—a long-standing challenge for DOD because the organizations responsible for buying terminals are not the same organizations that buy satellites. The changes being instituted include: Re-established United States Space Command. In August 2019, the President re-established the U.S. Space Command as a unified combatant command. DOD will form today’s Space Command with some offices from Strategic Command responsible for space operations, with the mission to protect and defend space assets. Although U.S. Space Command does not conduct space acquisitions, it is responsible for the satellite operators who help systems like WGS function—stakeholders in a post-WGS decision. Transferred commercial SATCOM procurement to Air Force Space Command. At the direction of the National Defense Authorization Act for Fiscal Year 2018, Air Force Space Command assumed responsibility for procuring commercial satellite communications for DOD in December 2018. The Defense Information Systems Agency previously managed most commercial SATCOM acquisitions and is still responsible for other types of ground segment systems. Proposed Establishment of a United States Space Force. Early in 2019, the President and DOD proposed the establishment of a U.S. Space Force as a sixth branch of the U.S. Armed Forces within the Department of the Air Force. The Space Force would include the uniformed and civilian personnel conducting and directly supporting space operations from all DOD armed forces, assume responsibilities for all major military space acquisition programs—including those for SATCOM, and create the appropriate career tracks for military and civilian space personnel. Congress is deliberating the final composition of the proposed Space Force. Established the Space Development Agency. In March 2019, DOD established the Space Development Agency to unify and integrate efforts across DOD to define, develop, and field innovative satellite solutions, including communications. The Space Development Agency is focused on a low-Earth-orbit constellation to provide communications and other satellite-based operational support for DOD, which could also provide information for selecting a post-WGS architecture. As of this time, DOD has not determined how this new organization will mesh with the Air Force Space and Missile Systems Center that acquires satellite systems; the Defense Advanced Research Projects Agency, which creates breakthrough technologies and capabilities; and similar organizations within the department. The Wideband AOA’s recommendations for gathering additional information to reduce risk and inform DOD’s decision-making are good first steps to ensure any post-WGS architecture will effectively and efficiently meet DOD’s needs. The addition of one or two more WGS satellites provides some extra time for DOD to field new satellites, avoid capability gaps, and implement the AOA recommendations. However, given the typical 7-year development timelines for space systems, DOD will need to decide on a way forward within the next several years so that new satellites will be available when needed. Attempting to implement the Wideband AOA recommendations without developing a plan for guiding multiple knowledge-building efforts across DOD raises risk that information gaps will not be closed in time to be useful or not closed at all. Consequently, it is important for DOD to coordinate these efforts and focus on how best to obtain a future wideband architecture that provides critical communications for military operations. The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment develop and implement a plan to guide and coordinate efforts to implement the Wideband AOA recommendations to support timely, informed decisions on its next wideband satellite communications architecture. (Recommendation 1) We provided a draft of this report to DOD for review and comment. DOD provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or by email at chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. The analysis of alternatives (AOA) process is an analytical study that is intended to compare the operational effectiveness, cost, and risks of a number of potential alternatives to address valid needs and shortfalls in operational capability. This process helps ensure that the best alternative that satisfies the mission need is chosen on the basis of the selection criteria, such as safety, cost, or schedule. GAO has identified 22 best practices for an AOA process by (1) compiling and reviewing commonly mentioned AOA policies and guidance used by different government and private-sector entities and (2) incorporating experts’ comments on a draft set of practices to develop a final set of practices. These practices can be applied to a wide range of activities and situations in which a preferred alternative must be selected from a set of possible options, as well as to a broad range of capability areas, projects, and programs. These practices can also provide a framework to help ensure that entities consistently and reliably select the project alternative that best meets the mission need. The guidance below is meant as an overview of the key principles that lead to a successful AOA process and not as a “how to” guide with detailed instructions for each best practice identified because each entity may have its own process in place. The 22 best practices that GAO identified are grouped into the following five phases: Initialize the AOA Process: includes best practices that are applied before starting the process of identifying, analyzing, and selecting alternatives. This includes determining the mission need and functional requirements, developing the study time frame, creating a study plan, and determining who conducts the analysis. Identify Alternatives: includes best practices that help ensure the alternatives that will be analyzed are sufficient, diverse, and viable. Analyze Alternatives: includes best practices that compare the alternatives selected for analysis in terms of costs, benefits, and risks. The best practices in this category help ensure that the team conducting the analysis uses a standard, quantitative process to analyze the alternatives. Document and Review the AOA Process: includes best practices that are applied throughout the AOA process, such as documenting in a single document all steps taken to initialize, identify, and analyze alternatives, selecting a preferred alternative, and independently reviewing the AOA. Select a Preferred Alternative: includes the final step of comparing alternatives and selecting a preferred alternative that best meets the mission need. The five phases address different themes of analysis necessary to complete the AOA process and comprise the beginning of the AOA process (defining the mission need and functional requirements) through the final step of the AOA process (select a preferred alternative). There are three key entities who are directly involved in the AOA process: the customer, the decision maker, and the AOA team. The customer refers to the group that implements the final decision (i.e. the program office, agency, and the like). A complex AOA process that impacts multiple agencies can have multiple customers. The decision maker is the person or entity who signs off on the final decision and analysis documented by the AOA report, and who will select the preferred alternative based on the established selection criteria. The decision maker should remain informed throughout the AOA process. For example, the decision maker could form a committee that consists of management and other groups independent of the AOA process who possess the required technical expertise or broad organizational knowledge to keep the decision maker apprised of and to inform the AOA process. The AOA team is the group involved in the day-to-day work of the AOA process and who conducts the identification and assessment of alternatives that is the foundation of the AOA process. We assessed the Department of Defense’s (DOD) Wideband Communication Services AOA against the “comprehensive” characteristic. Overall, the AOA met the six best practices we identified. Table 5 shows the relevant AOA best practices for the “comprehensive” characteristic. The Department of Defense (DOD) made the following recommendations in its Wideband Communications Services Analysis of Alternatives (AOA) report: 1. Immediately conduct a business case analysis that examines incorporating anti-jam and cybersecurity features that improve upon legacy capability into the Wideband Global SATCOM (WGS) Space Vehicle (SV) 11/12 procurement. 2. Investigate the impacts of WGS SV 11/12 to ground infrastructure, mission management, and user terminals to understand necessary modifications. 3. Develop and implement a DOD Enterprise Satellite Communications (SATCOM) Terminal Strategy that targets an approved Joint Information Environment architecture, reduces complexity of terminal diversity and programmatic governance, facilitates rapid modernization, and drives innovating business reforms, optimizing cost, schedule, and performance and interoperability. 4. Fund a purpose-built capability post-WGS SV 11/12 meeting user demands, including all weather capabilities, with a recommended start in fiscal year 2020, including consideration of alternate orbital regimes and approaches to cost-effectively meet needs while addressing proliferation, protection, and resiliency. The purpose is to ensure availability of DOD SATCOM resources to meet requirements where anticipated commercial offerings fail to materialize or are insufficient. 5. Continue efforts to invest in and shape commercial capabilities to support future DOD needs, including protection features, resilience, contested and all-weather capabilities, and polar coverage. Additionally, invest in and shape commercial industry development and risk reduction efforts focused on cybersecurity, terminal militarization/weapon system integration, management and control, technology assessment and development, and spectrum access. 6. Continue to fund existing and new SATCOM risk reduction efforts, evaluate blended commercial/military constellations, and expand the scope of pilots to include development of architectural standards and interface controls for enterprise management and control, terminal recapitalization plans, and means for terminals and/or weapon system platforms to transition satellite constellations and any DOD managed services. 7. Fund the design and implementation of a prototype wideband enterprise SATCOM management and control capability based on an approved Joint Information Environment architecture that integrates the management of Military, Commercial, and International Partner- provided SATCOM services and networks and supports the Enterprise Operational Management requirement in the Joint Space Communications Layer Initial Capabilities Document Change 1. 8. Plan for investment in Protected Tactical Waveform capabilities to commercial and military band terminals to align with the Protected Anti-Jam Tactical SATCOM planned ground and space milestones. 9. Fund pilot efforts to identify risks and opportunities to use commercially-managed services for Army’s Combat Support Logistics Very Small Aperture Terminals and ways to mitigate that risk. 10. Pursue partnership opportunities with Norway and Canada to achieve earlier Arctic coverage capability. Cristina T. Chaplain, (202) 512-4841 or chaplainc@gao.gov. In addition to the contact named above, Rich Horiuchi, Assistant Director; Burns C. Eckert (Analyst in Charge); Erin Cohen; Emile Ettedgui; Jon Felbinger; Kurt Gurka; Stephanie Gustafson; Jennifer Leotta; Roxanna Sun; and Jay Tallon made key contributions to this report.", "summary": "DOD officials estimate spending an average of $4 billion each year to acquire and sustain wideband satellite communications that provide fast and reliable voice, video, and data transmissions critical to military operations. DOD is considering how to meet its future wideband needs across many different operating environments and scenarios. The National Defense Authorization Act for Fiscal Year 2016 required DOD to conduct a Wideband Communications Services AOA to identify ways to replace current systems as the satellites reach the end of their service lives. The National Defense Authorization Act for Fiscal Year 2017 contained a provision for GAO to assess DOD's analysis. This report addresses (1) whether the Wideband AOA was comprehensive, (2) how DOD solicited input from stakeholders, and (3) the conclusions DOD reached through the Wideband AOA. GAO reviewed the Wideband AOA along with DOD policies, documentation, and analyses; interviewed DOD officials and commercial stakeholders; and assessed the AOA against best practices for a comprehensive AOA process. The Department of Defense (DOD) conducted a comprehensive analysis of alternatives (AOA) process for wideband satellite communications, as determined through an assessment of the AOA against relevant GAO best practices. A comprehensive analysis of alternatives process indicates that the analysis team thoroughly addressed a wide range of possible satellite system alternatives. DOD used multiple methods to obtain stakeholder input, in accordance with its Wideband AOA study plan. For example, the study team incorporated input from across the military services and operational users, among others. Moreover, the Air Force and Defense Information Systems Agency conducted interrelated studies to provide additional information to the Wideband study team. DOD's analysis concluded that integrating military and commercial systems into a hybrid architecture would be more cost effective and capable than either acquisition approach alone. However, DOD also found that it needs more information to select its next satellite communications architecture and made recommendations for further study. Examples of these recommendations include: Develop an enterprise satellite communications terminal strategy – DOD found the magnitude of replacing user terminals to work with new systems was challenging and that more information on emerging technology and possible changes to terminal acquisition approaches would help DOD address this challenge. Invest in commercial technologies – DOD found that it lacked detailed technical information on commercial systems' cyber protections and that additional information on such protections would help DOD determine the extent to which they would meet DOD's needs. Such recommendations align with GAO's acquisition best practices for knowledge-based decision-making and have the potential to improve the department's satellite communications acquisitions. However, DOD stakeholders said there is no formal plan to guide and coordinate implementation of the AOA recommendations. Without such a plan, DOD is at increased risk of not having the information it needs to make timely, knowledge-based decisions on future systems to provide critical communications for military operations. GAO is recommending that DOD develop a plan to guide implementation of the Wideband AOA recommendations. DOD provided technical comments on a draft of this report, which GAO incorporated as appropriate.", "document_type": "gao"}
{"report": "DOD’s travel pay program is comprised of payments made by the department to active, reserve, and National Guard service members and civilian employees for temporary and permanent travel expenses. DOD travel is generally documented using authorizations and vouchers. Travel authorizations direct an individual or group of individuals to travel and provide information regarding what travel expenses are authorized to be paid. Travelers submit travel vouchers after the travel is completed to claim reimbursement for the official travel expenses they have incurred. There are a number of DOD entities involved in creating, reviewing and approving, paying, and reporting on DOD travel payments: Travelers are the service-members and civilian employees engaging in travel who create, amend, and digitally sign travel authorizations and vouchers and are legally liable for submitting false or fraudulent claims for payment. Authorizing officials are responsible for authorizing travel and controlling the use of travel funds. The DTS Regulations state that authorizing officials must review, verify, and approve authorizations prior to travel. Certifying officers certify vouchers for payment. According to the DOD guidance on DTS, known as the DTS Regulations, certifying officers must implement, maintain, and enforce internal procedures and controls to minimize erroneous payments; they are presumed negligent and may be pecuniarily liable for all improper payments that they certify. Authorizing officials who are also certifying officers review and certify travel vouchers and verify all required supporting documentation before the vouchers are paid. The Defense Travel Management Office (DTMO) oversees and facilitates DTS, including any necessary changes or enhancements to the system. It establishes and maintains the DTS Regulations, which define the responsibilities of users by role and the minimum required training for each user role, among other things. DTMO also maintains DTS travel payment data that are used for estimating and reporting on improper payments. The Defense Finance and Accounting Service (DFAS), as part of DOD’s efforts to reduce improper travel payments, is responsible for reviewing a sample of paid DTS travel vouchers to estimate and report improper travel payments. DFAS also provides data on improper travel payments to DOD components on a quarterly basis. The Office of the Under Secretary of Defense (Comptroller) compiles DOD-wide data on improper payments annually as part of DOD’s Agency Financial Report. It also oversees and facilitates DOD efforts to reduce improper travel payments. The Improper Payments Information Act of 2002, which was later amended by the Improper Payments Elimination and Recovery Act of 2010 (IPERA) and the Improper Payments Elimination and Recovery Improvement Act of 2012 (IPERIA), defines an improper payment as any payment that should not have been made or that was made in an incorrect amount (including overpayments and underpayments) under statutory, contractual, administrative, or other legally applicable requirements. In accordance with OMB guidance, DOD has identified travel pay as susceptible to improper payments based on the large volume of transactions and high dollar amount of the program. As a program considered susceptible to significant improper payments, DOD travel pay is subject to certain IPIA requirements. Specifically, IPIA, as amended, requires federal executive branch agencies to (1) develop a statistically valid estimate of the annual amount of improper payments for programs identified as susceptible to significant improper payments, (2) implement corrective actions to reduce improper payments and set reduction targets, and (3) report on the results of addressing these requirements. IPERA also requires executive agencies’ Offices of Inspector General to annually determine and report on whether their agencies complied with certain IPERA-related criteria. These criteria include the requirements to publish a report for the most recent fiscal year that meets OMB reporting requirements, publish statistically valid improper payment estimates, publish and meet reduction targets for improper payment rates, and publish corrective action plans. If an agency does not meet one or more of the six IPERA criteria for any of its programs or activities, the agency is considered noncompliant with IPERA. The DODIG reported that in fiscal year 2018, DOD travel pay was not in compliance with IPIA, as amended, for the seventh consecutive year. Specifically, DOD met three of the six IPERA-related criteria for its travel pay program, by publishing all required information in the Payment Integrity section of its Agency Financial Report; conducting program-specific risk assessments; and reporting an improper payment rate of less than 10 percent for each of the eight programs that included an improper payment estimate in the fiscal year 2018 Agency Financial Report. However, the DODIG reported that DOD did not publish reliable improper payment estimates, include all required elements for the descriptions of corrective action plans, or meet its targets for reducing improper payments. To meet IPIA requirements, agencies follow guidance issued by OMB for estimating improper payments. OMB Circular No. A-123, Appendix C instructs agencies to obtain the input of a statistician to prepare a statistical sampling and estimation method that produces statistically valid estimates of improper payments. Agencies are required to meet a number of requirements on the content of the sampling plans, including providing clear and concise descriptions of the methods used that also address the assumptions used, sample sizes, and precision, among other aspects. The guidance also says that agencies should incorporate refinements to their methods based on recommendations from agency staff or auditors, such as their agency Inspector General or GAO, whenever possible. OMB guidance also includes requirements for annual reporting on improper payment estimates. According to the guidance, when calculating a program’s annual improper payment amount, agencies should use only the amount paid improperly. For example, if a $100 payment was due, but a $110 payment was made erroneously, then the amount applied to the annual estimated improper payment amount should be $10. In addition, when an agency’s review is unable to discern whether a payment was proper as a result of insufficient or lack of documentation, this payment must also be considered an improper payment. OMB also requires agencies to identify and report on the root causes of the improper payments and implement corrective actions to prevent and reduce these causes for programs that have been identified as susceptible to significant improper payments, including DOD’s travel pay program. OMB emphasizes that, in identifying root cause, it is important to distinguish between what constitutes a root cause that created an error and an internal control problem that failed to catch an error. The guidance instructs agencies to implement corrective actions that are responsive to root causes, are proportional to the severity of the associated amount and rate of the root cause, and are measurable. It also instructs agencies to annually review their existing corrective actions to determine whether any action can be intensified or expanded to achieve its intended result. To comply with IPIA and OMB requirements, and in response to our prior recommendations, DFAS updated its statistical sampling plan in fiscal year 2017 to develop and report improper payment estimates for DTS. The plan is designed to estimate the dollar amount of improper payments, which includes both travel payments that were made in excess of the correct amount (overpayments) and those that were made for less than the correct amount (underpayments). When DOD is unable to discern whether a travel payment is proper because there is insufficient or no documentation to support it, that payment is also included in the improper payment estimate. On a monthly basis, DFAS statistically samples paid travel vouchers, stratified first by component and then by dollar amount. DFAS officials then conduct a review of the sampled post-payment vouchers to identify erroneous travel vouchers and the types of errors that were made. Based on the errors found during the review, DFAS calculates an estimate of the improper payments for each component. The military services process a small portion of their travel payments through other disbursing systems and are responsible for conducting their own post-payment reviews to estimate the improper payments for those systems. The DOD improper payment rate is the estimated total of improper payments from all post- payment reviews divided by the total number of payments. For example, in fiscal year 2018, DOD reported an improper payment rate of 4.59 percent, or $365.32 million of the $7.96 billion total travel payments. Using DTS data, we calculated that DOD had spent an average of $6.1 billion annually on DTS travel payments in fiscal years 2016 through 2018—a total of about $18.3 billion in travel payments for those years. Travel for active duty servicemembers accounted for the largest portion of those travel payments. We calculated that DOD components reported over $9.5 billion in DTS travel payments for active duty servicemembers in fiscal years 2016 through 2018, accounting for approximately 52 percent of the total travel payments. For the same time period, DTS travel payments for DOD civilian employees totaled about $5.3 billion (29 percent of the total), and travel payments for Reserve and Guard members totaled about $3.5 billion (19 percent of the total) (see fig. 1). DOD data on DTS travel payments show that out of 10 different categories used to identify the purpose of travel, the category representing “training” accounted for the largest percentage of the travel payments. Payments for “training attendance” accounted for about $6.6 billion (36 percent) of the $18.3 billion in total travel payments for fiscal years 2016 through 2018 (see table 1). Payments for the trip purpose “other travel” accounted for about $3.1 billion (17 percent) of the total travel payments for that time period. “Other travel” is any travel for reasons not covered by the other trip purpose categories; the purpose must be further specified in the travel authorization. Based on our analysis, most travel categorized as “other travel” was further specified with the trip type “routine TDY,” which refers to a travel assignment to a location other than the employee’s permanent duty station. The two other trip purposes that accounted for the highest percentage of travel payments, based on our analysis of the DTS data, are “special mission” and “site visit,” which each accounted for about $2.9 billion (16 percent) of the total travel payments for fiscal years 2016 through 2018. Using DTS data, we also calculated that DOD’s reported total travel payments increased from fiscal years 2016 through 2018, for a total increase of approximately $1 billion (16 percent) in nominal dollars and $0.68 billion (11 percent) in constant dollars during fiscal years 2016 through 2018 (see fig. 2). The DOD officials we interviewed were unable to explain why travel payments increased during fiscal years 2016 through 2018 but speculated that overall increases in DOD’s budget likely corresponded with additional travel expenses. Officials also stated that travel expenses are tied to DOD’s mission requirements. For instance, DOD military and civilian personnel provided support to civil authorities in areas such as humanitarian assistance and disaster recovery during the period of our review, according to these officials. Travel by DOD personnel to locations for these missions would contribute to DOD’s travel expenses. According to data provided by DFAS, the annual average of DOD improper travel payments was about $322 million for fiscal years 2016 through 2018, totaling $965.5 million (or 5.3 percent of total DTS travel payments) for those years. For fiscal year 2016, DFAS calculated that an estimated $416.6 million in travel payments (7.3 percent of total fiscal year 2016 DTS travel payments) were improper. For fiscal year 2017, DFAS’s estimate of improper payments was $252.4 million (4.2 percent of total fiscal year 2017 DTS travel payments). However, data availability issues limited the scope of that year’s post-payment review, which is used to estimate the improper payment rate. For fiscal year 2018, DFAS’s estimate of improper payments was $296.6 million (4.5 percent of total fiscal year 2018 DTS travel payments). These improper payment amounts include both overpayments and underpayments and do not necessarily indicate a monetary loss to the government. According to DOD’s Agency Financial Report, payments identified as improper do not always represent a monetary loss. For instance, an otherwise legitimate payment that lacks sufficient supporting documentation or approval is reported as improper but is not considered a monetary loss if documentation or approval is subsequently provided. Monetary loss is an amount that should not have been paid and could be recovered. With respect to monetary loss, DFAS calculated that of the DTS improper payments, the department incurred an estimated $205 million (1.6 percent of total DTS travel payments) loss to the government for fiscal years 2017 and 2018 (see fig. 3). Specifically, for fiscal year 2017, DFAS calculated an estimated monetary loss of $97.7 million (1.6 percent of total DTS travel payments), and for fiscal year 2018, it calculated an estimated monetary loss of $107.3 million (1.6 percent of total DTS travel payments). According to DFAS officials, the monetary losses estimated by DFAS were a result of travel voucher errors such as claiming an expense that is automatically generated by DTS during the booking process, rather than updating the travel voucher with the amount actually paid. Other errors that DFAS considers to indicate a monetary loss to the government include duplicate paid vouchers, mileage paid incorrectly, lodging expenses paid twice, and expenses that do not match the receipts (e.g., lodging). DOD established and has taken steps to implement a Remediation Plan aimed at reducing improper travel payments that includes specific requirements for all DOD components as well as a committee to monitor the efforts of 10 components that DOD identified as key to addressing improper travel payments. However, DOD did not consider available data on improper travel payment rates in its selection of these 10 components to implement its risk-based approach. Further, the 10 components have not fully implemented the Remediation Plan requirements, and other components were generally unaware of the requirements in the Remediation Plan and DOD’s broader efforts to resolve and mitigate improper travel payments. In October 2016, DOD established a Remediation Plan for improper payments in its travel pay program. The memorandum establishing the plan specified that it applied to the Military Departments, Defense Agencies, Joint Staff, and Combatant Commands. The Under Secretary of Defense (Comptroller) noted in the memorandum that the rate of improper travel payments had reached an unacceptable level, causing the department’s program for preventing improper payments to be non- compliant with IPERA. Accordingly, the Remediation Plan specified steps that DOD components were required to take to reverse the department’s poor performance. Specifically, it stated that the military services, defense agencies, DOD field activities, Joint Staff, and combatant commands must each designate in writing a Senior Accountable Official (SAO) responsible for implementing the plan’s requirements for that component, train travelers and approving officials, issue guidance on holding approving officials pecuniarily liable for improper travel payments, and prepare component-specific remediation plans and identify corrective actions, among other things. DOD specified that certain steps were to be completed by November 1, 2016. The requirements specified in DOD’s Remediation Plan are listed in table 2. DOD officials informed us that they also established a Senior Accountable Official Committee (SAO committee) consisting of the SAOs from the 10 components. The committee provided a mechanism for DOD’s Deputy Chief Financial Officer to monitor the implementation of the Remediation Plan’s requirements by those components. The SAO committee included the four military services and six additional components: the U.S. Special Operations Command, the Defense Logistics Agency, the Defense Contract Management Agency, the Defense Information Systems Agency, the Missile Defense Agency, and the Defense Contract Audit Agency. An Office of the Under Secretary of Defense (OUSD) (Comptroller) official told us that DOD did not monitor the implementation of other components’ efforts to implement the Remediation Plan’s requirements. The SAO committee met four times from January 2017 through September 2017, with a fifth meeting in May 2018. At these meetings, components represented on the committee discussed approaches they had taken to prevent improper travel payments and highlighted examples of best practices to educate travelers and approving officials about how to avoid improper travel payments. In addition, DFAS officials presented the results of monthly post-payment reviews to identify the most common errors associated with improper travel payments. In June 2018, DOD broadened the scope of the SAO committee and chartered the DOD Improper Payments Senior Accountable Officials Steering Committee, which was established to address all programs included in DOD’s improper payments reporting—not just travel pay. As of May 2019, this steering committee had met twice, in December 2018 and again in March 2019. DOD identified components to include on the SAO committee based on fiscal year 2016 DTS travel payments but did not consider components’ improper payment rates as selection criteria. According to OUSD (Comptroller) officials, DOD used a risk-based approach to select the 10 components to include in the SAO committee, because these components accounted for the significant majority of the department’s DTS travel payments. However, as a result of the way in which DOD reports its estimated rates of improper travel payments, it is unclear whether there is an association between the volume of DTS travel payments and improper travel payment rates. DOD officials told us that they did not use estimated improper travel rates as a selection criterion because DFAS does not report estimated improper payment rates for all DOD components in its annual agency financial report. Instead, DFAS uses a stratified sampling method for the post-payment review of travel vouchers, which means that the sample sizes for certain individual components—such as smaller defense agencies—may be too small to be statistically reliable. As a result, DFAS reports improper payment rates for the individual military services and U.S. Special Operations Command, but it reports an aggregate rate for the defense agencies that DFAS officials told us also includes “joint commands.” Notwithstanding DOD’s current sampling approach for determining improper payment rates, DOD has previously reported discrete improper payment rates for components that are not represented on the SAO committee, and there may be additional data sources on component- specific improper payment rates. First, a 2016 DODIG report on improper travel payments presented the results of a DFAS review of DTS vouchers for 58 DOD components for July through December, 2014, including 48 components not represented on DOD’s SAO committee. Second, DOD has reported improper payment rates for specific components other than the military services as part of the Remediation Plan effort. Specifically, DFAS has reported an improper payment rate for U.S. Special Operations Command in the quarterly reports it provided to the SAO committee separately from the aggregate rate it reports for other “joint commands.” Third, we found that other sources of data on estimated improper travel payment rates may be available to the department. For example, of the non-SAO components that responded to our survey, 7 of 28 indicated that they track their rate of improper travel payments. Because DOD’s approach to monitoring specific components’ implementation of the Remediation Plan was based solely on the amount of DTS travel payments, DOD lacks assurance that the components it selected for greater scrutiny were the ones most at risk for improper travel payments. Standards for Internal Control in the Federal Government notes that management can define risk tolerances for defined objectives, specifically the acceptable level of variation in performance relative to the achievement of objectives. Federal internal control standards also state that agencies should evaluate whether a risk-based approach is appropriately designed by considering whether it is consistent with expectations for the defined objectives. If the approach is not consistent with expectations, agencies should revise the approach to achieve consistency. In this case, DOD decided to accept the risk associated with targeting its Remediation Plan efforts to only those components that accounted for most of the department’s total travel payments in fiscal year 2016. However, without including improper payment rates in its analysis, DOD may have excluded components with lower overall travel payments that had significant improper payment rates. As a result, DOD cannot be assured that it has implemented the Remediation Plan in a way that is both efficient and effective in reducing improper travel payments. The 10 components that make up the SAO committee and were identified as key to the effort to reduce improper payments took some steps to address the Remediation Plan requirements but did not complete all of the requirements outlined in the Plan. For example, 7 of the 9 components that responded to our survey reported that they had designated an SAO. Further, these components indicated that their SAOs had completed some required steps, such as issuing guidance to ensure that front-end internal controls were in place to prevent improper travel payments; reviewing training plans to determine their effectiveness in preventing improper travel payments; and providing initial or refresher training to all travelers and approving officials, among other actions. However, none of the components that responded to our survey had completed all of the requirements by the due date of November 1, 2016. As of March, 2019, when we surveyed the 10 DOD components, only four of the 9 components that responded to our survey had completed all of the requirements (see table 3). For instance, 1 component (the Defense Information Systems Agency) had not developed a component-level remediation plan, and 6 of the 10 components had not developed corrective action plans to address the improper travel payments they identified, as required by the Remediation Plan. OUSD (Comptroller) officials told us that they required only the military services to complete corrective action plans, because these components accounted for about 92 percent of DTS travel payments. We found that, while DOD established specific milestones for certain actions in the Remediation Plan, it did not establish milestones for completing most of the actions. Specifically, as shown in table 2 earlier in this report, only 5 of the 11 requirements in the Remediation Plan had an associated due date. Further, while DOD established a mechanism to monitor whether the components had implemented the Remediation Plan requirements through the SAO committee, this mechanism was not effective in holding them accountable for doing so. For example, at the first SAO committee meeting (January 18, 2017), the SAOs were told to complete the Remediation Plan requirements by March 1, 2017, and to be prepared to discuss them at the next SAO committee meeting. However, at the next meeting (March 29, 2017), only 3 components—the Navy, the Defense Information Systems Agency, and the Defense Logistics Agency—were prepared to present their component-level remediation plans to the committee. At the meeting, the DOD Deputy Chief Financial Officer, serving as the chair of the committee, emphasized that components needed to document progress in order to demonstrate that the department was working toward identifying root causes and implementing corrective action plans to prevent and reduce improper travel payments. At the May 24, 2018 SAO committee meeting, 3 additional components—the Air Force, the Defense Contract Management Agency, and the Missile Defense Agency— presented their plans to the committee. However, as of March 2019, the U.S. Special Operations Command and the Defense Contract Audit Agency had still not presented their plans to the committee. Standards for Internal Control in the Federal Government states that management should evaluate performance and hold individuals accountable for their internal control responsibilities. Accountability is driven by the tone at the top of an organization and supported by the commitment to integrity and ethical values, organizational structure, and expectations of competence, which influence the control culture of the entity. In addition, the standards state that management should establish and operate monitoring activities to monitor the internal control system and evaluate the results. As we stated earlier in this report, DOD has been challenged by inaccurate and inconsistent estimates of improper payment rates, which do not allow for reliably tracking the rate of improper travel payments over time. By establishing milestones, monitoring progress, and holding component leadership accountable for the implementation of the requirements of the Remediation Plan, DOD would have greater assurance that it has taken sufficient actions to reduce improper travel payments. As we noted above, the department memorandum outlining the Remediation Plan was addressed to all components, and DOD officials confirmed that, although they monitored implementation of the Remediation Plan for the 10 components represented on the SAO committee, the 42 components not represented on the SAO committee (non-SAO committee components) were still required to complete the actions specified in the Plan. However, we found that, based on our survey results, half of the components that responded to our survey were unaware of the requirements established in the Remediation Plan. Of the 28 non-SAO committee components that completed our survey, 14 (50 percent) responded that they were either not at all familiar with the Remediation Plan requirements or only slightly familiar with the requirements. Our survey results and review of DOD documentation also indicate that many of the 42 non-SAO committee components had taken some steps to reduce improper payments, consistent with the Remediation Plan requirements, but had not completed all of the Plan’s requirements. For example, of the 28 non-SAO committee components that completed our survey, 10 (36 percent) responded that they had not designated an SAO or other lead entity in writing, and 8 (29 percent) did not know whether their component had designated a SAO. Our survey results also indicate that most of the components not represented on the SAO committee who responded to our survey were unaware of department efforts to prevent and reduce improper travel payments. Specifically, many of the non-SAO committee components had not been made aware of efforts to implement the Remediation Plan across the department through mechanisms such as the SAO committee meeting minutes or quarterly DFAS reports. Sixteen of the 28 non-SAO committee components who responded to our survey reported that no one from their organization had ever attended an SAO committee meeting, and 11 responded that they did not know if anyone from their component had attended. Further, 15 of the 28 components who responded to our survey reported that they had never received a copy of the official SAO committee meeting minutes, and 13 responded that they did not know whether they had. Nine of the 28 components responded that they did not receive copies of the DFAS quarterly reports on improper payments, which are used to track the types of errors that occur in travel payments and help components to target actions to address them. Standards for Internal Control in the Federal Government states that management should internally communicate the necessary quality information to achieve the entity’s objectives. Communicating quality information down, across, up, and around reporting lines to all levels of an entity contributes to the design, implementation, and operating effectiveness of this principle. An OUSD (Comptroller) official confirmed that DOD did not take action to share information on the Remediation Plan requirements or implementation efforts with components not represented on the SAO committee. When DOD made the decision to focus the SAO committee on 10 components, it did not establish a mechanism or document how information on Remediation Plan efforts would be communicated to the non-SAO committee components, which are also required to implement the Plan. As a result, the components that are not represented on the SAO committee have not benefited from information on the Plan’s requirements or lessons learned and best practices that were identified during the SAO committee effort—which may have helped them to reduce their improper payments. Providing opportunities for all components to benefit from the Remediation Plan efforts would give DOD greater assurance that it has taken steps to reduce its overall improper payment rate. DOD has established mechanisms to identify and address the errors that most frequently lead to improper travel payments, but we found some limitations with these mechanisms because they did not consistently identify the root causes of the errors. DTMO Compliance Tool. In response to a requirement in the National Defense Authorization Act for Fiscal Year 2012, DTMO developed a compliance tool that uses a set of digital queries to automatically review vouchers submitted for payment through DTS to determine whether they meet criteria that indicate the potential for improper payment. According to DTMO, as of fiscal year 2018, the tool had recovered $25 million over 5 years. If a voucher is flagged by this tool, an email is automatically generated to the traveler and approving official associated with that voucher with instructions for correcting the error. For example, the compliance tool flags vouchers with duplicate expenses, such as expenses for lodging or rental cars. However, the tool does not flag all potential improper payments, because it does not identify all types of voucher errors. For instance, according to DTMO officials, the tool cannot identify vouchers that have been submitted without required receipts. For fiscal year 2018, the average rate for DTS vouchers identified as erroneous by the DTMO compliance tool was 0.044 percent. In contrast, DOD reported an improper payment rate of 4.5 percent for DTS vouchers in fiscal year 2018. In addition, the tool does not identify the root causes leading to those errors. Rather, the tool simply notifies the traveler and approving official associated with a specific voucher with characteristics indicative of a potential improper payment and requests that they amend the voucher to remove any errors. DFAS Sampling. Each month, DFAS selects a sample of vouchers that have been processed in DTS and assigns staff to review those vouchers to determine whether any resulted in an improper payment. According to DFAS officials, DFAS provides the results of these reviews to the components represented on the SAO committee. DFAS also prepares quarterly reports that summarize the most frequent errors that lead to improper travel payments and presents these reports for discussion at SAO committee meetings. DFAS reports the frequency of voucher errors for each military service and U.S. Special Operations Command and an aggregate rate for defense agencies and joint commands. The DFAS reports also suggest corrective actions to address the identified errors. For example, in November 2018, DFAS reported that the voucher error leading to the third largest amount of improper payments was “Lodging—Paid Without a Receipt,” which accounted for a total of $21,810 in improper payments in that month. The corrective action DFAS suggested was for reviewers or approving officials to verify that receipts were uploaded to DTS and that any uploaded receipts met the criteria for valid receipts. If either of these conditions was not met, the reviewer was to return the voucher to the traveler to correct and resubmit. However, these corrective actions did not address the root causes of those errors. Specifically, neither DFAS nor the SAO committee determined why travelers were not uploading receipts for lodging expenses or why officials were approving vouchers without receipts. According to DFAS reports, errors related to missing lodging receipts were among the top 5 errors from October 2016 through June 2017. By December 2018, these were was the most common errors DFAS identified—accounting for a total of $53,125 in improper payments in that month—yet DOD did not develop corrective actions to address the root cause (i.e., why travelers were continuing to submit vouchers without lodging receipts). SAO Committee Effort. As we discussed earlier in this report, beginning in January 2017, OUSD (Comptroller) convened five meetings of the SAOs from 10 components that, according to officials, accounted for the majority of DOD travel payments in fiscal year 2016. At these meetings, representatives from the components discussed approaches they were using to reduce improper travel payments. In addition, representatives from DTMO and DFAS presented trends resulting from their efforts to identify improper travel payments using the DTMO Compliance Tool and DFAS post-pay sampling. These presentations conveyed information about the types of voucher errors that were leading to improper travel payments, and SAOs in attendance discussed how to mitigate those errors. However, our review of SAO Committee meeting minutes and the remediation plans prepared by those components represented on the committee found that the components did not identify the root causes of errors leading to improper travel payments. Military Services’ Corrective Action Plans. The military services, in coordination with OUSD (Comptroller), developed corrective action plans to address improper travel payments. OUSD (Comptroller) provided the military services with guidance on developing the corrective action plans that states that corrective action plans are required to reduce improper payments, as well as to address specific audit recommendations and issues of IPERA non-compliance. OUSD (Comptroller) also provided the military services with a corrective action plan template that instructs them to describe what the plan is intended to address, i.e., improper payments, a specific audit recommendation, or noncompliance issues. The template also defines root causes as “underlying issues that are reasonably identifiable, can be controlled by management, and require implementing corrective actions to mitigate.” As of May 2019, the military services had prepared 12 corrective action plans for the travel pay area. However, we found that only 4 of them included specific corrective actions addressing the root causes of improper travel payments. We also found that the plans varied in terms of their sophistication in discussing and identifying root causes. For example, none of the corrective action plans prepared by the Air Force targeted the root causes of improper travel payments. By contrast, one of the Navy’s corrective action plans clearly identified the root cause of an error (vouchers being approved without the required forms) and specified 10 milestones and associated corrective actions to address the root cause. Of the Army’s two corrective action plans, one addressed weaknesses in the Army’s sampling plan for determining improper payments at overseas offices but did not discuss identifying the root causes of improper travel payments, and the other required Army travel management officials at overseas offices to improve their reporting of improper travel payments to more clearly link corrective actions with root causes. While DOD has taken some positive steps to identify the errors that most frequently lead to improper travel payments, our review found that component officials do not have a clear understanding of what constitutes the “root cause” of an improper travel payment. For example, component officials who responded to our survey consistently mischaracterized root causes as the specific errors leading to improper payments (e.g., missing receipts) rather than the underlying reasons for those errors. Our survey asked respondents if their component had taken steps to identify the root causes of voucher errors that led to improper travel payments in fiscal year 2018 and, if so, to provide examples of root causes they had identified. While 31 of the 37 (84 percent) components that responded to the question indicated that they had taken steps to identify root causes, and 28 (76 percent) indicated that they had taken steps to address those identified root causes, open-ended survey responses indicated that the components did not understand the term “root cause.” Specifically, 24 of the 31 (77 percent) components that provided open-ended responses with examples of the root causes they identified cited voucher errors—such as missing receipts—rather than identifying the root causes for why those errors occurred. This indicates that the 31 components that responded to this question did not understand the term “root cause”. It also suggests that the number of components that actually took actions to address root causes is likely significantly lower than the numbers reported by the survey respondents. OMB guidance specifies that agencies should ensure they have identified a true root cause of an improper payment, because it is critical to do so in order to formulate effective corrective actions. DOD’s Financial Management Regulation (FMR) states that root causes of improper payments must be identified and corrective plans developed and monitored on a regular basis to ensure that future improper payments will be reduced and eliminated. However, neither DOD’s FMR nor the June 2018 charter for the DOD Improper Payments SAO Steering Committee defines the term “root cause.” And while DOD has established some mechanisms to try to help components identify root causes, our survey demonstrates that many travel management officials at DOD components do not clearly understand the meaning of root cause. Specifically, of the 31 components that provided examples of what they believed to be the root causes of voucher errors, only 7 provided examples of actual root causes. Until DOD defines the term “root cause” to ensure a common understanding of the term across the department, DOD travel management officials will likely miss opportunities to make changes that could help to address the underlying causes of improper travel payments. All of the corrective action plans prepared by the military services that are intended to identify root causes of improper travel payments specified the costs associated with implementing the corrective actions. While many of the actions do not fully address root causes, as previously discussed, it is important that the department weighs the cost-effectiveness of its actions. However, we found that the services had not incorporated a consideration of cost-effectiveness into their decisions on whether to implement those actions, at least in part because OUSD (Comptroller) had not provided guidance on how they should assess the cost-effectiveness of potential corrective actions. Specifically, the template OUSD (Comptroller) provided to the military services for preparing corrective action plans neither asked for information on costs nor specified how to determine the cost-effectiveness of specific corrective actions. In May 2019, an OUSD (Comptroller) official told us that DOD is considering formulating guidance on how components should determine cost-effectiveness. OMB guidance states that agencies should be able to measure the effectiveness and progress of each individual corrective action on an annual basis. The guidance further states that agencies should annually review their existing corrective actions to determine if any existing action can be intensified or expanded so that it results in a high return on investment in terms of reduced or prevented improper payments. Addressing the root causes of improper travel payments can be costly, requiring investments in technology changes, among others. For example, component officials whom we interviewed and who responded to our survey indicated that several of the root causes for improper travel payments were related to design flaws in DTS. According to DOD officials, a feature of DTS called “Trip Workbook” is used by travelers to upload and attach receipts to vouchers. However, “Trip Workbook” is not visible to approving officials when they process the voucher for approval and payment. As a result, vouchers are being approved without the required receipts, because approving officials cannot determine whether or not the receipts have been attached. Officials stated that changes to DTS are often costly and can take a long time, and in some instances they can be more costly than the improper payment amounts they are intended to reduce. Without clear guidance to assist components in determining whether proposed corrective actions are cost-effective to implement, DOD travel management officials will be hampered in making informed decisions about which actions to implement and which to leave unfunded. DOD spent about $6 billion annually in DTS travel payments from fiscal years 2016 through 2018 for its personnel to travel in support of its mission, but since 2012 the DODIG has consistently found the DOD travel program to be non-compliant with statutory requirements to mitigate improper payments. In 2016, DOD began implementing a Remediation Plan to address weaknesses in its management of improper travel payments. However, DOD did not consider component-specific improper payment rates in addition to overall travel payments when developing its risk-based approach to monitoring the implementation of the Plan. Thus, DOD lacks assurance that the components it selected for greater scrutiny were the ones most at risk for improper travel payments. Further, even the components that DOD determined were critical to implementing the Remediation Plan did not fully implement the Plan’s requirements, because DOD had not established milestones for completing all of the requirements, monitored whether the components had completed them on time, or held them accountable for completing the requirements. In addition, DOD did not establish a mechanism to share the results of the SAO committee’s initiatives to reduce improper payments with travel management officials across the department, limiting opportunities for the components that were not represented on the SAO committee to benefit from Remediation Plan efforts. DOD has taken some positive steps to identify the errors associated with improper travel payments but can do more to effectively and efficiently address the underlying root causes. First, DOD has not established a common definition of root cause so that travel management officials across the department can clearly identify actions needed to address improper travel payments. In the absence of such a definition, the department is limited in its ability to address the underlying reasons for improver travel payments. Second, DOD components lack guidance to assist them in determining the cost-effectiveness of addressing root causes of improper travel payments. Such guidance would help to provide assurance that investments are targeted to actions that are cost effective to implement. We are making five recommendations to DOD. The Secretary of Defense should ensure that the Under Secretary of Defense (Comptroller) revises the approach for selecting components to implement the DOD Travel Pay Improper Payments Remediation Plan to consider available improper payment rate data in addition to data on the components’ amount of travel payments. (Recommendation 1) The Secretary of Defense should ensure that the Under Secretary of Defense (Comptroller) expedites completion of the remaining Travel Pay Improper Payments Remediation Plan requirements by establishing milestones for the requirements, monitoring whether the components have completed them on time, and holding components accountable for completing the requirements. (Recommendation 2) The Secretary of Defense should ensure that the Under Secretary of Defense (Comptroller) establishes a mechanism to share the results of the SAO committee’s initiatives to reduce improper travel payments with all appropriate travel management officials across the department. (Recommendation 3) The Secretary of Defense should ensure that the Under Secretary of Defense (Comptroller) takes action to ensure a common understanding of the concept of root cause across the department. This could be done by, among other actions, revising the Financial Management Regulation or the charter for the DOD Improper Payments SAO Steering Committee to include a definition of the term and including a definition of the term in the mechanism used to share the results of the SAO committee’s initiatives to reduce improper travel payments with travel management officials across the department. (Recommendation 4) The Secretary of Defense should ensure that the DOD Deputy Chief Financial Officer directs the chairs of the SAO Committee, with the input of OUSD (Comptroller), DTMO and DFAS, to provide guidance to the components on how to determine whether actions that would address root causes are cost effective to implement. (Recommendation 5) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix III, DOD did not concur with our first recommendation, partially concurred with our second and fifth recommendations, and concurred with our third and fourth recommendations and outlined its plan to address them. DOD also provided technical comments, which we incorporated in the report where appropriate. In non-concurring with our first recommendation that OUSD (Comptroller) revise the approach for selecting components to implement the DOD Travel Pay Improper Payments Remediation Plan (Remediation Plan) to consider available improper payment data in addition to the amount of travel payments of DOD components, DOD stated that OUSD (Comptroller) had focused implementation of its remediation efforts on the 10 components that accounted for approximately 95 percent of the department’s travel pay disbursements in DTS. DOD added that this approach achieved maximum coverage of travel payments, given its time and resource limitations. DOD also stated that improper payment metrics reported by DFAS supported this approach, as these data show that the military services accounted for 92 percent of DTS travel payments and a majority of improper travel payments. We acknowledge in our report that DOD identified the 10 components to include on the SAO committee because these components accounted for the significant majority of the department’s fiscal year 2016 DTS travel payments. However, our report also states that it is unclear whether there is an association between the volume of DTS travel payments and improper travel payment rates (measured in terms of the percentage of DTS travel payments made improperly), because DOD does not routinely collect data on improper travel payment rates for all components even though—as we also note in our report—such data are available. As a result, DOD may have excluded components with relatively lower travel payments but higher rates of improper payments. DOD’s approach can serve to reduce DOD’s total improper travel payment amounts, but it may not fully support a key goal of DOD’s Remediation Plan—to reduce the risk of improper travel payments. Thus, we continue to believe that DOD should incorporate improper payment rates into its approach to oversee the implementation of its remediation efforts. In partially concurring with our second recommendation that OUSD (Comptroller) expedite completion of the remaining Remediation Plan requirements by establishing milestones for the requirements, monitoring whether the components have completed them on time, and holding components accountable to completing the requirements, DOD stated that OUSD (Comptroller) will expedite completion of the Remediation Plan requirements for the six components that have not yet completed them. DOD specified that OUSD (Comptroller) will establish milestones for the remaining requirements, monitor their progress, and hold components accountable for their completion. DOD stated that it would complete these actions by January 31, 2020. DOD also reiterated that it does not believe detailed oversight beyond the largest components is cost-effective, but noted that it would continue to monitor the non-SAO components and their impact on improper travel payments. The intent of our recommendation is to ensure that DOD expedites completion of the Remediation Plan requirements for, at a minimum, the 10 components that accounted for a significant majority of DOD’s DTS travel payments. We believe the planned actions that DOD outlined in its response will meet the intent of our recommendation. Further, as discussed in our report, requiring additional components to complete the Remediation Plan requirements may be warranted if those components have relatively high improper payment rates. Therefore, DOD’s stated plan to monitor other components and their impact on improper travel payments would be responsive to our recommendation, provided the department holds non- SAO committee components accountable for addressing high improper payment rates. In partially concurring with our fifth recommendation that the DOD Deputy Chief Financial Officer direct the chairs of the SAO Committee, with the input of OUSD (Comptroller), DTMO and DFAS, to provide guidance to the components on how to determine if actions that would address root causes are cost-effective to implement, DOD stated that OUSD (Comptroller) will revise the improper payments corrective action plan template to require reporting components to perform a cost-benefit analysis to determine the best or most cost-effective solution, resulting in savings to the department. DOD added that OUSD (Comptroller) will not provide specific steps to the components on how to determine whether their actions are, in fact, cost-effective to implement. DOD further stated that it believes that the criteria and/or appropriate steps to determine whether corrective actions are cost-effective for a component must be identified and agreed upon internally within the component. DOD stated that it would complete these actions by October 31, 2019. The intent of our recommendation is to ensure that DOD components determine the cost-effectiveness of actions to address the root causes of improper travel payments. DOD’s stated plan to require the reporting components to perform a cost-benefit analysis will meet the intent of our recommendation, provided that the department ensures that the components are evaluating the cost-effectiveness of planned corrective actions that address the root causes of improper travel payments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the DOD Chief Management Officer, the Under Secretary of Defense (Comptroller), the Secretary of the Army, the Secretary of the Air Force, the Secretary of the Navy, the Commandant of the Marine Corps, the Chairman of the Joint Chiefs of Staff, the Director of the Defense Finance and Accounting Service, and the Director of the Defense Travel Management Office. In addition, the report is available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Defense Media Activity (DMA) Missile Defense Agency (MDA) Defense Acquisition University (DAU) Defense Advanced Research Projects Agency (DARPA) Defense Commissary Agency (DECA) Defense Contract Audit Agency (DCAA) Defense Finance and Accounting Service (DFAS) Defense Intelligence Agency (DIA) Defense Logistics Agency (DLA) Defense Security Service (DSS) Defense Technical Information Center (DTIC) Defense Technology Security Administration (DTSA) Defense Threat Reduction Agency (DTRA) Department of Defense Education Activity (DODEA) National Defense University (NDU) National Geospatial-Intelligence Agency (NGA) Defense POW/MIA Accounting Agency (DPAA) Defense Health Agency (DHA) Court of Appeals for the Armed Forces (CAAF) Uniformed Services University of Health Sciences (USU) DOD Inspector General (DOD IG) Defense Contract Management Agency (DCMA) Defense Security Cooperation Agency (DSCA) White House Military Office (WHMO) Defense Microelectronics Activity (DMEA) Test Resource Management Center (TRMC) Office of the Secretary of Defense (OSD) Office of Economic Adjustment (OEA) Office of General Counsel (OGC) Defense Human Resources Activity (DHRA) Component Name Washington Headquarters Service (WHS) Pentagon Force Protection Agency (PFPA) Joint Chiefs of Staff (JCS) U.S. Africa Command (AFRICOM) U.S. Central Command (CENTCOM) U.S. European Command (EUCOM) U.S. Northern Command (NORTHCOM) U.S. Indo-Pacific Command (INDOPACOM) U.S. Special Operations Command (SOCOM) U.S. Strategic Command (STRATCOM) U.S. Transportation Command (TRANSCOM) Inter American Defense Board (IADB) Joint Interagency Task Force – West (JIATF-W) North Atlantic Treaty Organization (NATO) United Nations Command/US Forces Korea (USFK) U.S. Military Entrance Processing Command (USMEPCOM) Components represented on the Senior Accountable Official Committee (SAO committee) since establishment of the committee. The SAO committee had a total of 13 member components, but DOD officials told us that 3 components (the Office of the Under Secretary of Defense (Comptroller), the Defense Finance and Accounting Service, and the Defense Travel Management Office) served in support roles and were not held accountable for completing the Remediation Plan requirements. Our objectives were to examine (1) the amount the Department of Defense (DOD) spent on Defense Travel System (DTS) travel payments for fiscal years 2016 through 2018 and how much of those payments DOD estimated to be improper; (2) the extent to which DOD implemented its Remediation Plan; and (3) the extent to which DOD established mechanisms to identify errors leading to improper travel payments, the root causes of those errors, and the cost effectiveness of addressing root causes. To address our first objective, we collected DTS data on travel payments for fiscal years 2016 through 2018, by DOD component and trip purpose, from the Defense Travel Management Office (DTMO). We used this time period because DOD issued its plan to remediate improper payments in 2016. We calculated the total payments for that time period, as well as the average annual payments and subtotals for various categories—such as the military services and the trip purposes—that represented the top three highest percentages of payments. We discussed with DTMO officials how the data were generated and what the data points represented. We chose to focus on DTS because it is the primary system for processing travel vouchers for DOD, and the vouchers it processes account for the majority of DOD travel. We also collected data from the Defense Finance and Accounting Service (DFAS) on travel payments made in DTS that were identified as improper, as well as data on the dollar amount of those improper payments that were estimated to result in a monetary loss to the government. We discussed with DFAS officials the methodology that they used to estimate both the improper payment amounts and the portions of those amounts that were estimated to be monetary losses to the government. To assess the reliability of the data we obtained, we reviewed corroborating documentation, analyzed the data for inconsistencies, and interviewed service officials about the reliability of the data. We determined that the data were sufficiently reliable for our reporting purposes, which were to determine the amount of DOD’s DTS travel payments and to provide insight into the estimated improper travel payment amounts that the department reported for fiscal years 2016 through 2018. However, we also determined that, based on persistent problems with DOD’s improper payment estimates that we and the DOD Inspector General have reported since 2013, these data were not sufficiently reliable for other purposes, such as determining the specific progress DOD has made in reducing its rates of improper travel payments. To address our second objective, we reviewed documents and met with officials to discuss DOD’s implementation of its Remediation Plan. We also conducted a web-based survey of officials at DOD components. We administered the survey from February 4 through March 29, 2019, soliciting information on the extent to which components had implemented the Remediation Plan, steps the components had taken to address improper travel payments, the types of issues that frequently lead to improper travel payments, and challenges associated with reducing improper travel payments. We sent this survey to 52 components, 37 (71 percent) of whom responded. More specifically, 9 of 10 (90 percent) components represented on the Senior Accountable Official (SAO) committee (SAO components) responded and 28 of 42 (67 percent) components not represented on the SAO committee (non- SAO components) responded. The survey results represent the views of only those components that responded and may not be generalizable to all components. The results of our survey provide measures of component officials’ views at the time they completed the survey in February and March 2019. Please see appendix I for a list of the 52 components we contacted. How familiar are you, in responding to this survey on behalf of the #COMPONENT, with DOD’s Travel Pay Improper Payments Remediation Plan (dated October 1, 2016), if at all? (Response options provided: Checkboxes labeled “Very familiar,” “Moderately familiar,” “Slightly familiar,” “Not at all familiar,” and “No opinion/no response.”) Has a lead entity in the #COMPONENT been designated for implementing DOD’s Travel Pay Improper Payments Remediation Plan (dated October 1, 2016) requirements? (Response options provided: Checkboxes labeled “Yes, an office has been designated the lead for this effort,” “Yes, a person has been designated the lead for this effort,” “No entity has been designated to lead implementation requirements,” and “Don’t know”) Has the #COMPONENT designated in writing a Senior Accountable Official (SAO)? (An SAO is a Senior Executive Service member, general officer, or flag officer designated by a component as responsible for reducing improper payments.) (Response options provided: Checkboxes labeled “Yes,” “No, but my component is represented by an SAO in another component or organization,” “No,” and “Don’t know.”) Has the #COMPONENT completed this? (Response options provided: Checkboxes labeled “Yes,” “No,” and “Don’t know.”) If yes, what was the month the #COMPONENT completed the action? (Response option provided: one text box.) If yes, what was the year the #COMPONENT completed the action? (Response option provided: one text box.) Has the #COMPONENT completed any of the following actions? Review Defense Finance and Accounting Service (DFAS) reports on improper travel payments. (Response options provided: “Yes,” “No,” “Not applicable (do not receive DFAS reports),” and “Don’t know.”) Have representatives of the #COMPONENT attended the quarterly Senior Accountable Official (SAO) meetings since they were first held in January 2017? An SAO is a Senior Executive Service member, general officer, or flag officer designated by a component as responsible for reducing improper payments. (Response options provided: “Yes, a representative of our component attended all of the meetings,” “Yes, a representative of our component attended some, but not all, of the meetings,” “No, a representative of our component has never attended an SAO meeting,” and “Don’t know.”) Has the #COMPONENT received a copy of the official minutes of the quarterly Senior Accountable Official (SAO) meetings since they were first held in January 2017? (Response options provided: “Yes, our component received a copy of the minutes for all of the meetings,” “Yes, our component received a copy of the minutes for some, but not all, of the meetings,” “No, our component has not received a copy of the minutes for any of the SAO meetings,” and “Don’t know.”) Has the #COMPONENT taken steps to identify the root causes of voucher errors that led to improper travel payments in fiscal year 2018? Note, for the purpose of this question we define root causes as “the reasons personnel made errors preparing or approving vouchers,” including but not limited to: travelers were insufficiently trained on voucher preparation, approvers did not have sufficient time to review vouchers, and/or Defense Travel System was not effectively designed to process vouchers. (Response options provided: “Yes,” “No,” and “Don’t know.”) What are some examples of root causes of voucher errors that the #COMPONENT identified in fiscal year 2018? (Response option provided: one text box.) Has the #COMPONENT taken steps to address any identified root causes of voucher errors that led to improper travel payments in fiscal year 2018? (Response options provided: “Yes,” “No,” and “Don’t know.”) What steps have been taken by the #COMPONENT to address the root causes of voucher errors that led to improper travel payments in fiscal year 2018? (Response option provided: one text box.) Because the majority of survey respondents did not provide open-ended responses to each question, we did not conduct a formal content analysis of the responses. We determined that the open-ended responses would not be representative of all components that responded to our survey, and we therefore present them only as illustrative examples. To analyze open-ended comments provided by those responding to the survey, GAO analysts read the comments, jointly developed categories for the responses, and flagged relevant responses for inclusion in this report. To address our third objective, we reviewed DOD’s Remediation Plan, documents related to DOD’s implementation of the Remediation Plan, such as the minutes of SAO committee meetings, and the June 2018 DOD Improper Payments Senior Accountable Officials Steering Committee Charter. In addition, we met with DOD and component officials to discuss efforts to identify and address root causes of improper travel payments and conducted a web-based survey of travel administrators in 52 DOD components (summarized above) to obtain information on their efforts to identify and address the root causes of improper travel payments. We compared the information we obtained with OMB guidance on how agencies are to identify and address the root causes of improper payments, as well as the definition of root cause contained in the template DOD uses for corrective action plans intended to address improper travel payments. We conducted this performance audit from April 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Matthew Ullengren (Assistant Director), Vincent Buquicchio, Christopher Gezon, Foster Kerrison, Jill Lacey, Joanne Landesman, Rob Letzler, Kelly Liptan, and Michael Silver made key contributions to this report.", "summary": "Improper payments—including payments that should not have been made or were made in an incorrect amount—are a long-standing, significant challenge in the federal government. Both GAO and the DOD Inspector General have reported on problems related to improper payments in DOD's travel pay program. This report examines (1) the amount DOD spent on DTS travel payments for fiscal years 2016 through 2018 and how much of those payments DOD estimated to be improper and the extent to which DOD has (2) implemented its Remediation Plan and (3) identified travel payment errors, the root causes of those errors, and the cost-effectiveness of addressing root causes. GAO analyzed fiscal years 2016 through 2018 data on DTS payments, reviewed DOD's Plan and documentation, interviewed officials about implementation efforts, and surveyed 52 DOD components about steps taken to address improper travel payments. The Department of Defense's (DOD) Defense Travel System (DTS)—the primary system DOD uses to process travel payments—accounts for most of DOD's travel payments. DOD spent $18.3 billion on DTS travel payments from fiscal years 2016 through 2018, while incurring a reported $965.5 million in improper travel payments. In that period, DOD averaged $6.1 billion in DTS travel payments and $322 million in improper travel payments annually. Not all improper travel payments—such as legitimate payments that initially lacked supporting documentation―represented a monetary loss to the government. Officials said DOD first estimated a monetary loss from improper travel payments in fiscal year 2017. For fiscal years 2017 and 2018 it estimated a total monetary loss of $205 million out of $549 million in improper DTS payments (see fig.). In October 2016, DOD established a Remediation Plan to reduce improper travel payments and a committee to monitor implementation of the plan at 10 DOD components. DOD selected these 10 components because they accounted for a significant percentage of total travel payments. However, DOD did not take into account the components' own estimates of their improper payment rates. As of March 2019, only 4 of the 9 components that responded to GAO's survey had completed all of the plan's requirements, in part because of a lack of milestones in the plan and ineffective monitoring for required actions. As a result, DOD does not have reasonable assurance that its actions have been sufficient. DOD has mechanisms to identify errors leading to improper travel payments, and some components have developed specific corrective plans to address the errors. However, GAO found that these efforts did not clearly identify the root causes of the errors, in part because there is no common understanding of what constitutes the root cause of improper travel payments. DOD components also have not incorporated considerations of cost-effectiveness into decisions about whether to take actions that could reduce improper payments. Without addressing these issues, DOD will likely miss opportunities to implement the changes necessary to address the root causes of improper travel payments. GAO made 5 recommendations, including that DOD consider data on improper payment rates in its remediation approach; define the term “root cause”, and consider cost effectiveness in deciding how to address improper payments. DOD generally concurred with 4 recommendations, but did not concur with revising its approach for selecting components to implement its Remediation Plan, stating that it has already taken actions that address this issue. GAO believes the recommendation remains valid.", "document_type": "gao"}
{"report": "The Coast Guard owns or leases more than 20,000 facilities consisting of various types of buildings and structures. The Coast Guard’s shore infrastructure is organized into five product lines and 13 asset types, known as asset lines. For example, within its shore operations asset line, the Coast Guard maintains over 200 stations along U.S. coasts and inland waterways to carry out its search and rescue operations, as well as other missions such as maritime security. Much of the Coast Guard’s infrastructure is vulnerable to the effects of extreme weather and can be costly to repair or replace after major storms. From December 2005 through June 2019, the Coast Guard received about $2 billion in supplemental appropriation funds to, among other things, rebuild or relocate 15 facilities damaged by hurricanes. During this time, the Coast Guard relocated facilities further inland or to higher ground, upgraded facilities to be more resilient, and designed new facilities with features to protect them from natural disasters. For example, after being damaged by Hurricane Ike in 2008, the Coast Guard relocated a regional facility in Houston, Texas further inland to help protect the new facility from extreme weather. The facility was also designed to withstand wind speeds of up to 115 miles per hour. In February 2017, the Coast Guard’s Civil Engineering program also issued guidance intended to increase the likelihood that new or recapitalized buildings would be designed to withstand natural disasters, and to enable the Coast Guard to better manage risks to its operations and personnel, among other things. We found in February 2019 that the condition of the Coast Guard’s shore infrastructure was deteriorating and almost half of it was past its service life—resulting in (1) recapitalization and new construction and (2) deferred maintenance backlogs of at least $2.6 billion as of 2018. In 2018, the Coast Guard graded its overall shore infrastructure condition as a C minus based on criteria it derived from standards developed by the American Society of Civil Engineers. Table 1 shows information about the number of assets, replacement value, service life of, and condition grades assigned by the Coast Guard for each of its asset lines for fiscal year 2018. The aging and deteriorating condition of the Coast Guard’s shore infrastructure has led to at least $2.6 billion in deferred construction projects and maintenance backlogs. With almost half of its infrastructure past its service life, and given recent Coast Guard funding requests for its shore infrastructure, it will take many years for the agency to address these backlogs. For example, in 2018 the Coast Guard estimated that it would take almost 400 years to address just the $1.774 billion recapitalization and new construction backlog—assuming an overall 65- year service life and that funding would continue at the fiscal year 2017 appropriations level. This time frame estimate excludes the Coast Guard’s $900 million deferred depot-level maintenance backlog. Table 2 provides information on the Coast Guard’s two shore infrastructure backlogs as of August 2018. Nevertheless, the size and estimated costs of the Coast Guard’s backlogs may be understated. We found in February 2019 that the Coast Guard’s estimated costs did not include hundreds—or the majority—of the projects on the recapitalization and new construction backlog. For example, we reported that there were 205 projects on the backlog without cost estimates. Officials explained that they had not prepared cost estimates for these projects because they were in the preliminary stages of development. Our previous reports have identified various steps the Coast Guard has taken to begin to improve how it manages its shore infrastructure. Some of the steps the Coast Guard has taken align with leading practices for managing public sector backlogs and key practices for managing risks to critical infrastructure, including identifying risks posed by the lack of timely investment, identifying mission-critical facilities, disposing of unneeded assets, and beginning an assessment of shore infrastructure vulnerabilities. Specifically, the Coast Guard has: Identified risks posed by lack of timely investment. In February 2019, we found that the Coast Guard had a process to identify, document, and report risks to its shore infrastructure in its annual shore infrastructure reports for fiscal years 2015 through 2018. These reports identified the types of risks the Coast Guard faces in not investing in its facilities, including financial risk, capability risk, and operational readiness risk. The Coast Guard met this leading practice to identify risk in general terms—for example, in terms of increased lifecycle costs, or risk to operations. Identified mission-critical and mission-supportive shore infrastructure. In February 2019, we found that since at least 2012, the Coast Guard had documented its process to classify all of its real property under a tier system and established minimum investment targets by tier as part of its central depot level maintenance expenditure decisions. These tiers—which range from mission- critical to mission-supportive assets—were incorporated into guidance that Coast Guard decision makers are to follow in their deliberations about project funding, and to help them determine how to target funding more effectively. For example, Coast Guard guidance for fiscal years 2019 through 2023 prioritized expenditures on shore infrastructure supporting front line operations, such as piers or runways, over shore infrastructure providing indirect support to front line operations, such as administrative buildings. Assessed selected buildings for vulnerabilities. We issued a report today that discusses the Coast Guard Civil Engineering program’s efforts to conduct a vulnerability assessment of its owned and occupied buildings, which the Coast Guard initiated in 2015 and aims to complete in 2025. The Coast Guard calls this infrastructure review the Shore Infrastructure Vulnerability Assessment. The focus of Phase I of this assessment, completed in 2019, was to determine the vulnerability of certain occupied buildings to 10 natural disasters. Further, the assessment results are intended to assist with contingency planning by identifying which Coast Guard facilities are likely to remain operational after a natural disaster. During Phase I of this assessment, completed in 2019, the Coast Guard analyzed 3,214 buildings, almost 16 percent of its infrastructure, for vulnerabilities to disasters such as floods, earthquakes, and hurricanes. The analysis identified Coast Guard- wide infrastructure vulnerabilities to coastal risks such as shoreline loss, coastal erosion and earthquakes, as well as tsunami risks on the West Coast of the United States, Alaska, Guam, and Hawaii, and immediate and serious flood risks in Puerto Rico and the Gulf and East Coasts. The Phase I report recommended that Coast Guard units and contingency planners consider these vulnerabilities when preparing contingency plans or making capital investments. The Coast Guard has also initiated a follow up effort involving structural analyses for buildings it believes to be more susceptible to damage from earthquakes and wind. Officials involved said their aim is to complete this effort in 2025. The Coast Guard has taken actions to begin to improve its shore infrastructure management. However, as we previously reported, the Coast Guard has not fully applied leading practices and key risk management steps to improve its shore infrastructure management. Specifically, we found, among other things, that the following actions could help improve the Coast Guard’s shore infrastructure management efforts: Employ models for predicting the outcome of investments and analyzing tradeoffs. In February 2019, we found that a 2017 Coast Guard Aviation Pavement Study employed a model that found that the Coast Guard could more efficiently prioritize investment in aviation pavement. A subsequent Coast Guard aviation pavement plan recommended actions to use the study results and potentially save $13.8 million. However, we found that the Coast Guard had not fully implemented its own recommended actions to achieve the cost savings. Additionally, we found that while a similar analytical approach to efficiently prioritizing investments in aviation pavement could be applied to all of the shore infrastructure asset lines, the Coast Guard had not applied the approach to other asset lines. By not employing similar models across its asset lines for predicting the outcome of investments, analyzing tradeoffs, and optimizing decisions among competing investments, the Coast Guard is missing opportunities to potentially identify and achieve cost savings across other asset lines. We recommended that the Coast Guard employ models for its asset lines that would predict the investment outcomes, analyze tradeoffs, and optimize decisions among competing investments. The Coast Guard agreed with our recommendation but as of August 2019 had not addressed it. The Coast Guard stated that it plans to assess the use of modeling tools used by the Department of Defense as well as other alternatives to enhance its real property asset management capability. We will continue to monitor its actions. Dispose of unneeded assets. In October 2017, we found that disposing of unneeded assets, such as closing unnecessarily duplicative boat stations, based on a sound analytical process, could potentially generate $290 million in cost savings over 20 years. Specifically, the Coast Guard identified 18 unnecessarily duplicative boat stations with overlapping coverage that could be permanently closed without negatively affecting the Coast Guard’s ability to meet its mission requirements, including its 2-hour search and rescue response standard. In 2017, the Coast Guard affirmed that its leadership believes the study remains valid, but as of September 2019 it has not closed any stations. Figure 1 depicts the extent of the Coast Guard’s overlapping boat and air station search and rescue coverage, as identified by the Coast Guard, some of which the Coast Guard determined to be unnecessarily duplicative. In February 2019, we found that 5 of the 18 boat stations recommended for closure had projects listed on the Coast Guard’s current project backlog. For example, Station Shark River, in New Jersey, was recommended for recapitalization in fiscal year 2017, despite Coast Guard recommendations to close the station in 1988, 1996, 2007, and 2013. Notably, the Coast Guard has made multiple attempts in previous years to close such stations but was unable to due to congressional intervention, and subsequent legislation prohibiting closures. In October 2017, we recommended that the Coast Guard establish and implement a plan with target dates and milestones for closing boat stations that it has determined provide overlapping search and rescue coverage and are unnecessarily duplicative. In February 2019, we further recommended disposing of unneeded assets to more efficiently manage resources and better position the Coast Guard and Congress to address shore infrastructure challenges. The Coast Guard agreed with our recommendations. As of September 2019, the Coast Guard reported that it was considering changes in the operational status of several stations, such as closing the stations during the winter months when they conduct few, if any, search and rescue cases. The Coast Guard estimated that it will continue to consider changes until March 2020. These are positive steps, but we continue to believe that it is important for the Coast Guard to dispose of unneeded assets. Given the Coast Guard’s competing acquisition, operational, and maintenance needs, and its existing $1.774 billion project backlog of recapitalization and new construction projects, these actions may help to mitigate some of its resource challenges. We will continue to monitor the Coast Guard’s efforts to implement these recommendations. Report shore infrastructure project backlogs accurately. In February 2019, we found areas in which the Coast Guard could increase budget transparency for shore infrastructure by accurately reporting project backlogs and costs in Congressionally-required plans. Specifically, we found that the Coast Guard had not provided accurate information to Congress necessary to inform decision- makers of the risks posed by untimely investments in maintenance and repair backlogs. For example, the Coast Guard had not provided complete information to Congress in its Unfunded Priorities Lists of shore infrastructure projects, including information about tradeoffs among competing project alternatives, as well as the impacts on missions conducted from shore facilities in disrepair. We also found that Coast Guard budget requests related to shore infrastructure for fiscal years 2012 through 2019 generally did not identify funding to address any backlogs of deferred maintenance or recapitalization, except for one fiscal year—2012—when the Coast Guard requested $93 million to recapitalize deteriorated/obsolete facilities. We also found that the Coast Guard had not provided accurate information about its requirements-based budget targets for shore infrastructure in its budget requests. According to Coast Guard officials, a requirements-based budget is an estimate of the cost to operate and sustain its shore infrastructure portfolio of assets over the lifecycle of the asset, from initial construction or capital investment through divestiture or demolition. Further, we found that Coast Guard recapitalization targets showed a far greater need than was reflected in the appropriations it requested from fiscal years 2012 through 2019. Specifically, Coast Guard targets for recapitalization of shore assets indicated the Coast Guard needs $290 to $390 million annually for its recapitalization efforts. However, its budget requests for fiscal years 2012 through 2018 have ranged from about $5 million to about $99 million annually. We recommended that the Coast Guard include supporting details about competing project alternatives and report tradeoffs in Congressional budget requests and related reports. Without such information about the Coast Guard’s budgetary requirements, the Congress will lack critical information that could help to prioritize funding to address the Coast Guard’s shore infrastructure backlogs. While the Coast Guard agreed with our recommendation, in August 2019 officials reported that they will continue to develop budgets as the agency has done but will include additional information in future required reports to Congress. We will continue to monitor these actions. Fully implement DHS’s Critical Infrastructure Risk Management Framework. In September 2019, we found that the Coast Guard has taken some steps to improve the resilience of its shore infrastructure by rebuilding storm-damaged facilities and initiating a vulnerability assessment, but its processes to improve shore infrastructure resilience are not fully aligned with the five steps DHS has identified for critical infrastructure risk management (DHS Critical Infrastructure Risk Management Framework). The five steps include: (1) setting goals and objectives, (2) identifying critical infrastructure, (3) assessing and analyzing risks and costs, (4) implementing risk management activities, and (5) measuring the effectiveness of actions taken. We found that the Coast Guard is not positioned to provide decision makers with complete details of which infrastructure facilities are critical, and the type of information the DHS Critical Infrastructure Risk Management Framework recommends for making cost effective risk management decisions. The Coast Guard identified occupied buildings that may be important to operations and assessed their vulnerability through its Shore Infrastructure Vulnerability Assessment process, but this process did not identify all shore infrastructure assets that are critical to its missions—such as aircraft runways—or screen them for all vulnerabilities, such as flooding. Similarly, we found that while the Coast Guard identified almost 800 buildings that may be vulnerable to tornadoes and another 1,000 buildings vulnerable to hurricanes, it has not analyzed the potential consequences, such as economic losses, costs for rebuilding, and impact on mission, should this infrastructure suffer damage from those vulnerabilities. Without a complete understanding of both the vulnerabilities of its infrastructure and the consequences to its mission operations if its infrastructure is damaged, the Coast Guard risks questionable recapitalization investments for improving resilience when selecting projects to fund. Such an understanding is especially important given its existing project backlogs of at least $2.6 billion. The five steps of the DHS Critical Infrastructure Risk Management Framework are intended to guide decision making and prioritize actions to more effectively achieve desired outcomes. Therefore, in September 2019 we recommended that the Coast Guard implement risk management processes that more fully align with the five key steps outlined in DHS’s Critical Infrastructure Risk Management Framework to better guide its shore infrastructure investment decisions. The Coast Guard agreed with our recommendation. It stated that it plans to make progress towards implementing the recommendation while developing and implementing its Component Resilience Plan, in accordance with the recently mandated DHS Resilience Framework. It intends to complete these efforts by the end of 2021. The Coast Guard also intends to develop, by July 2020, goals and objectives for measuring the effectiveness of actions taken to identify resilience readiness gaps and resource needs. We will continue to monitor these efforts. Chairman Maloney, Ranking Member Gibbs, and Members of the Subcommittee, this completes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-3841 or andersonn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact above, Dawn Hoff, Assistant Director; Andrew Curry, Analyst-in-Charge; Peter Haderlein; Landis Lindsey; Calaera Powroznik, and Molly Ryan made key contributions to this testimony. Other staff who made key contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Coast Guard, within the Department of Homeland Security (DHS), owns or leases more than 20,000 shore facilities—such as piers, boat stations, air stations, runways, and housing units—at more than 2,700 locations, from which it carries out its missions. This shore infrastructure is often positioned along the nation's coastlines where it can be vulnerable to damage from extreme weather. This statement summarizes GAO findings related to the condition of Coast Guard shore infrastructure, actions the Coast Guard has taken to improve its management of its shore infrastructure, and additional actions it needs to take. This statement is based on three GAO products issued from October 2017 through September 2019, along with selected updates on actions the Coast Guard has taken to address GAO's recommendations from these reports. GAO analyzed relevant Coast Guard documents, management processes and decisions, and interviewed Coast Guard officials. To conduct updates, GAO also reviewed information on the Coast Guard's actions to implement its prior recommendations. In February 2019, GAO reported that the Coast Guard's $18 billion portfolio of shore infrastructure was deteriorating, and almost half of it was past its service life as of 2018. Coast Guard data showed that it would cost at least $2.6 billion to address its maintenance and recapitalization (major renovation) project backlogs at recent funding levels. Coast Guard data also showed that hundreds of projects had not been factored into the backlog costs. GAO's prior work has shown that the Coast Guard has taken initial steps toward improving how it manages its shore infrastructure, including conducting an initial assessment of shore infrastructure vulnerabilities. However, GAO also found that the Coast Guard had not fully applied leading practices and key risk management steps in managing its shore infrastructure, and needs to take the following actions: Employ models for predicting the outcome of investments and analyzing tradeoffs . In February 2019, GAO found that the Coast Guard had used a model to determine that it could more efficiently prioritize its investment in aviation pavement—one segment of an almost $3 billion portfolio of aviation shore infrastructure—and save about $13.8 million. However, as of February 2019, the agency had not implemented the aviation pavement study results. Moreover, according to Coast Guard officials, the agency could employ models to its entire portfolio of shore infrastructure. By not implementing the results of its aviation pavement model or employing similar models across its shore infrastructure assets, the Coast Guard is missing opportunities to potentially identify and achieve cost savings across other assets. Dispose of unneeded assets. In October 2017, GAO found that closing boat stations that the Coast Guard had found to be unnecessarily duplicative could potentially generate $290 million in cost savings over 20 years. However, in February 2019, GAO found that instead of closures, the Coast Guard was planning recapitalization projects at 5 of the 18 stations it had recommended for closure. Given the Coast Guard's competing shore infrastructure priorities and existing project backlogs, GAO recommended disposing of unneeded assets to more efficiently manage resources and better position the Coast Guard and Congress to address shore infrastructure challenges. Implement DHS's Critical Infrastructure Risk Management Framework. In September 2019, GAO found that DHS has recognized the importance of protecting critical infrastructure from extreme weather and other risks. However, the Coast Guard has not fully aligned its processes for improving shore infrastructure resilience with DHS's five key steps for critical infrastructure risk management. For example, when identifying and then assessing risks to its infrastructure—two of the steps in the DHS process—the Coast Guard did not identify all assets that are critical to its missions, such as aircraft runways, or screen them for all vulnerabilities, such as flooding. Aligning its processes with the DHS steps would provide greater assurance that the Coast Guard is investing its resources to minimize potential damage and expenses caused by future extreme weather events. In the three reports, GAO made 10 recommendations to improve the Coast Guard's asset management efforts, including employing models for predicting investment outcomes, disposing of unneeded assets, and implementing DHS's critical infrastructure risk management framework to guide shore infrastructure resilience decisions. DHS concurred and generally described planned actions to address these recommendations, but has not yet fully implemented them.", "document_type": "gao"}
{"report": "BLS currently produces a number of different price indexes to estimate price inflation (see table 1). In line with its strategic plan, BLS aims to make these estimates as accurate as possible, meaning that they reflect the average level of price inflation for a selected group of consumers. The accuracy of a price index can be assessed in multiple ways, such as the extent to which the index applies appropriate formulas to data that are complete and drawn from sufficiently large samples covering the relevant group of people. BLS bases its collection of these data on the population covered by the Consumer Price Index for All Urban Consumers (CPI-U). BLS then uses data collected for the CPI-U to produce three other price indexes. After introducing the CPI-U as its primary, or headline, index, BLS maintained a separate data collection for the CPI-W from 1978 through 1980 but found little difference between data for CPI-W and CPI- U. According to BLS, as a result of this and budgetary issues, BLS stopped collecting separate data for the CPI-W in 1981 and began using CPI-U data to derive the CPI-W. To create the CPI-U, BLS chooses a sample of outlets (e.g., stores or internet sites) at which the CPI-U population shops (see fig. 1 for more information on how BLS creates price indexes). BLS then collects price data at these outlets for goods and services the CPI-U population buys and uses the data to develop basic, or elementary, indexes for each good and service. BLS combines the elementary indexes into a single, aggregated index by applying a set of expenditure weights—factors that determine, for example, whether a change in the price of apples or mobile phone service has a larger effect on total inflation (see fig. 2). These expenditure weights reflect the proportion of spending consumers direct to each good or service. To develop expenditure weights, BLS directs the Census Bureau to gather data about the relative importance of each purchase within the target population’s “market basket” of consumer goods and services. The Census Bureau collects these data in the Consumer Expenditure Survey, a nationwide household survey conducted by BLS to determine how consumers spend their money that also contains demographic data about the households surveyed. BLS uses 2 years of Consumer Expenditure Survey data to calculate the expenditure weights, in part so the sample sizes are large enough to produce accurate weights. From data collected to produce the CPI-U, BLS derives two subpopulation indexes—indexes that focus on the spending patterns of a portion of the population of all urban consumers: the CPI-W and the CPI- E. To produce these subpopulation indexes, BLS adjusts the relative importance of price changes in each good and service through a process sometimes referred to as “reweighting,” meaning BLS develops alternate sets of expenditure weights that reflect the spending patterns of the subpopulation. For example, since medical care comprises more of the CPI-E subpopulation’s total expenditures (about 12 percent) than of the CPI-U population’s total expenditures (about 9 percent), the CPI-E gives more weight to medical care than the CPI-U. BLS also creates a “chained” index using the same data for the entire CPI-U population but changing the formula used to combine indexes for each good and service, known as elementary or basic indexes, into a single aggregated index. This formula captures how consumers shift spending among different types of goods and services as prices change (see text box). In contrast, the other indexes assume that consumers keep purchasing various categories of goods and services in the same proportions over a 2-year period regardless of price changes. What is a chained price index? A chained price index uses a formula that is believed by some economists to better approximate a cost-of-living index by more accurately accounting for changes in consumption patterns in response to relative price changes. They contend that such a formula reduces the potential for overstating inflation relative to the other indexes BLS produces, which assume consumers keep buying goods and services in the same proportions no matter their price. Like the other three indexes BLS produces, the Chained CPI-U reflects consumers’ ability to adapt to changing prices by choosing among closely related goods and services as prices change, for example purchasing a different type of apple because it is on sale. However, unlike the other three indexes, the Chained CPI-U further reflects consumers’ ability to choose among all available goods and services as prices change, such as taking a train to work instead of driving when the price of gasoline rises, and purchasing headphones to listen to music during the commute. We previously reported that, were federal retirement benefits to be indexed to the Chained CPI-U, SSA and other agencies would need to determine whether to base retirement COLAs on final data that may be outdated or preliminary data that may be inaccurate. This is because the data needed to use a superlative index formula only become available after a significant time lag. This lag delays issuance of final monthly estimates for the Chained CPI-U by up to 1 year. Additionally, the chair of a panel convened at the request of BLS to examine issues in measuring the cost of living cautioned that chained indexes may not accurately reflect the way people with varying incomes substitute goods and services. For example, retirees with lower incomes might not have the same ability as retirees with higher incomes to substitute other goods and services when the prices of needed medical care or prescription drugs rise. BLS receives input on its processes from several sources. For example, BLS receives advice and recommendations from several advisory committees that variously focus on technical issues and the needs of users of BLS statistics. BLS also periodically receives input on its price indexes through external commissions and panels. For example, in May 1995, the U.S. Senate created the Advisory Commission to Study the Consumer Price Index, commonly referred to as the “Boskin Commission,” after its chairman, Michael J. Boskin. In December 1996, the Boskin Commission released its final report identifying sources of bias in the production of CPIs that the commission concluded were causing the indexes to overstate inflation. BLS also receives input on its price indexes through public comment. For example, in May 2019, the Office of Management and Budget issued a request for public comments on the various price indexes produced by BLS and BEA. While there are a number of federal retirement benefit programs, Social Security is by far the largest provider of indexed retirement and disability benefits in the United States, paying out over $1,047 billion in retirement and disability benefits in 2019. Social Security was established in 1935 to provide for the general welfare of older Americans by, among other things, establishing a system of federal old-age benefits, including a retirement program. To determine a worker’s initial retirement benefit, Social Security indexes the worker’s earnings to an average wage index. According to SSA, this ensures that a worker’s future benefit reflects the general rise in the standard of living that occurred during his or her working lifetime. Since 1975, Social Security has also indexed retirement benefits after the initial benefit level has been set to a CPI. According to SSA, this ensures that benefits are not eroded by inflation over time. When SSA began indexing benefits, CPI-W was the only national CPI available, and SSA continues to use the CPI-W to determine COLAs. As we have previously reported, the Social Security program faces financial difficulties that, if not addressed, will affect its long-term stability. In April 2020, SSA projected that Social Security’s retirement program trust fund will be unable to pay full benefits in 2034. We have also reported that, according to projections by SSA and the Congressional Budget Office, use of an alternate index to determine COLAs would have less effect on Social Security’s long-range finances than some other options for addressing the program’s finances, such as changing the taxation of earnings or raising the retirement age. That said, we found that, according to SSA projections, using an alternate CPI to calculate COLAs would affect Social Security’s finances in different ways. Specifically, using the CPI-E would increase expected COLAs and thus program costs and using the Chained CPI-U would decrease expected COLAs and thus program costs, while using the CPI-U would result in little change to either. Produced by BEA, the National Accounts are a set of statistics on U.S. production, income, consumption, investment, and saving. Among these are Gross Domestic Product, a measure of the goods, services, and structures produced across the economy, and the Personal Consumption Expenditures index, a measure of consumer inflation similar to CPIs, but constructed using different methods and data sources and covering different populations and transactions. Data collected by BEA to produce the National Accounts differ in a number of ways from those collected by BLS to produce CPIs. For example, while CPIs focus on the expenditures of households in urban areas, the National Accounts also include expenditures on institutional populations, such as individuals living in nursing homes. Further, while CPI expenditure data are based on the recollection of consumers, National Accounts expenditure data primarily reflect the records of the businesses that serve consumers. In other words, to collect data on the quantity of goods and services consumed, BLS surveys consumers about how much they bought, whereas BEA surveys companies about how much they sold. The National Accounts are produced primarily from data collected by federal government agencies. These data include both “statistical” data collected from federal statistical agencies, such as the Census Bureau, as well as “administrative” data collected by federal agencies as a byproduct of administering their programs. For example, BEA uses sample data generated by the Internal Revenue Service in processing tax returns to estimate corporate profits. BEA supplements these statistical and administrative data collected by federal agencies with data obtained from trade associations, businesses, international organizations, and other sources. BLS faces a number of challenges related to the accuracy and timeliness of CPIs, as well as challenges related to measuring inflation for older Americans. Some of these challenges may have implications for federal retirement benefit adjustments. According to BLS officials and documentation, BLS is unsure if the data sources it uses to produce the CPI-U are adequate to produce accurate subpopulation estimates—specifically, the CPI-E and CPI-W. For the CPI-E, BLS has not evaluated the adequacy of the CPI-U data it uses to measure inflation for the 62-and-older subpopulation. Specifically, BLS has not evaluated the extent to which CPI-U data represent the outlets where members of this older subpopulation shop, the prices they pay, or the mix of goods and services they purchase. BLS considers the CPI-E an experimental index, in part, because of the relatively small sample size within the Consumer Expenditure Survey used to create the expenditure weights for this subpopulation, which account for the mix of goods and services the subpopulation purchases. According to BLS documentation, the expenditure weights for the CPI-U rely on about 65,000 household interviews, which are collected quarterly over 2 years. In contrast, the expenditure weights for subpopulation indexes use about one-third or less of that: 21,000 interviews for the CPI-E and 16,000 for the CPI-W. For the CPI-W, BLS has not evaluated the adequacy of using CPI-U data since 1980, but the relative sample size used to calculate the expenditure weights for the CPI-W subpopulation has been shrinking in part because of declining response rates and demographic shifts away from the occupations included in the CPI-W. For example, occupations in the CPI- W include blue-collar jobs such as clerical, sales, laborer, and construction jobs. BLS officials and documentation indicate that as a result of these demographic shifts and the subsequent shrinking sample size within the Consumer Expenditure Survey, the accuracy of the CPI-W expenditure weights may be deteriorating. A core element of BLS’s mission is to provide accurate products. Moreover, standards of internal control call for agencies to obtain relevant data from reliable internal and external sources to meet information requirements for meeting their objectives. For BLS, this could include obtaining relevant data from reliable sources for producing CPIs. BLS officials said they have not evaluated the adequacy of the existing data because it is costly to undertake a full evaluation, but there may be cost- efficient ways to do so. BLS also has not evaluated different methods to conduct a cost-efficient analysis. Without taking actions to understand available options for a cost-efficient solution, BLS lacks reasonable assurance that adjustments to Social Security and other retirement benefits are based on indexes that reflect what they are intended to reflect. Specifically, benefits could be subject to adjustment based on potentially inaccurate information. Most experts we interviewed identified potentially cost-efficient methods to evaluate the adequacy of existing data for subpopulation indexes. For example, five experts we interviewed, including some on BLS advisory groups, suggested that BLS may be able to use existing data to examine the adequacy of using Consumer Expenditure Survey data for the CPI-E. Specifically, one expert suggested that BLS could compare expenditure patterns for the older subpopulation in the Consumer Expenditure Survey to those in third-party data. Another expert added that the overall prices older Americans pay may not be significantly different than the prices the general population pays. For example, gas stations generally charge the same price to each customer regardless of age, so this expert said that it may not be worthwhile for BLS to collect separate price data for older Americans. Another expert indicated that, while it might not be possible to link expenditures and demographics (such as age) for all CPI categories using third-party data, it may be possible for certain categories such as groceries, which are a sizeable portion of the older population’s expenditures. Another suggested that to improve subpopulation indexes, BLS could shift resources from cost savings realized from other ongoing projects. BLS officials acknowledged some potentially cost-efficient methods could exist to evaluate the adequacy of existing data for subpopulation indexes. For example, they said that a recent change in survey methodology will enable them to connect demographic information with information on where people shop beginning in 2019. The ability to make this connection should allow them to determine whether certain subpopulations shop at the same or different outlets and could help them determine the adequacy of their outlet sample selection. According to agency officials, BLS advisory groups could weigh in on such issues, but BLS has not asked the advisory groups to do so nor do the advisory groups have any recent or ongoing research on indexes for subpopulations such as older Americans. BLS officials added that obtaining transaction and demographic data from credit card companies could help, but cautioned that companies may be unwilling to share these data. BLS is currently undertaking a project to improve how it estimates its subpopulation indexes, CPI-E and CPI-W, in part by examining changes to the formulas used to apply expenditure weights. As part of its justification for the project, BLS expressed concerns about the decrease in the relative sample size for the CPI-W population in the Consumer Expenditure Survey and reiterated the importance of the CPI-W in adjusting federal retirement benefits. This project is a step in the right direction but does not fully address the question of whether the CPI-U data are adequate to produce CPI-W and CPI-E. In 2009, BLS began another project to address measurement error in and households’ willingness to respond to the Consumer Expenditure Survey, which is primarily conducted to create expenditure weights for CPIs. According to agency documents, the survey faces increasing costs and declining response rates. One particular goal of the project is to reduce error due to underreporting. For example, BLS is currently testing replacing a paper record of household expenditures with an online form with the goal of more accurately capturing expenditures and maintaining response rates. The project is ongoing and BLS expects to implement changes in stages through and beyond 2022. According to agency officials, the project was not designed to address subpopulation indexes, but instead was designed to address broader issues with the accuracy of the Consumer Expenditure Survey. BLS also faces challenges regarding the timeliness and relevance of CPIs. In particular, most CPIs are published using expenditure data that can be up to 4 years old, and, in this dynamic economy, as expenditure data age, they become less relevant to present-day expenditure patterns. Most of BLS’s price indexes, including the CPI-U, CPI-E, and CPI-W, rely on 2 years of expenditure data and the data require additional time to be collected and processed for use, referred to as a lag. For example, the CPIs produced from January 2014 to December 2015 used expenditure data from 2011 through 2012. BLS officials said reducing the lag could enable more timely use of expenditure data for CPIs but would not be possible without a significant change to the use or design of the Consumer Expenditure Survey. Another of BLS’s indexes, the Chained CPI-U, aims to incorporate current-period expenditure data, which may be most relevant for current- period price changes, but as we reported in 2019, the data are subject to revision and BLS produces the final, revised Chained CPI-U with a 10 to 12 month delay. BLS officials told us they do not currently have timely enough expenditure data to produce the Chained CPI-U without this delay. We found in our 2019 report that if the Chained CPI-U were to be used to calculate Social Security or other federal retirement benefit COLAs, it could result in permanent differentials stemming from measurement error that would have a larger effect on people who receive benefits longest or have lower incomes. BLS also faces several other challenges measuring inflation for older Americans, several of which BLS is examining in the subpopulation project discussed above. Large purchases. BLS is examining how to treat large purchases that are acquired in one time period but used throughout many time periods, such as owner-occupied housing and durable goods. BLS’s current approach to owner-occupied housing is to calculate what it would cost to rent a similar home. In part, because many seniors own their homes, BLS is considering instead calculating how much it costs to own and occupy the home (e.g., by including mortgage interest payments but not the purchase price of the home). Definition of average. BLS is also examining whether a subpopulation index should represent the average expenditures of all households (as its CPIs currently do) or the expenditures of an average household. The current approach of representing the average expenditures of all households is simpler because the index can be constructed from information on average expenditures. The alternate approach of representing expenditures of an average household is more complicated because it gives each household equal weight, and requires first constructing a price index for each household, then an averaging of those indexes. According to BLS, the current approach tends to give more relative weight to the purchasing behavior of higher-income households, whereas the alternate approach may be more appropriate for a subpopulation index, such as the one used to adjust Social Security benefits. For example, taking the average of all expenditures tends to reflect the more expensive purchases typically made by higher-income households. In contrast, measuring the average household’s expenditures may better represent expenditures made by a particular subpopulation, such as recipients of federal benefits programs like Social Security. User needs. BLS is also examining how to define the subpopulation of interest to meet the needs of its users, such as the Social Security Administration. Specifically, CPI-E is based on households headed by someone age 62 or older and the CPI-W is based on households with particular occupations, and BLS is examining whether other definitions could meet user needs. For example, BLS said it plans to contact stakeholders to ask about whether expanding the CPI-W to include all labor force participants (thereby increasing sample size) would meet user needs. Quality change vs. inflation. A further challenge for all price indexes is determining what portion of the price change is due to changes in quality as opposed to inflation, according to eight of the nine experts we interviewed. BLS has several methods to adjust for quality changes. For example, if an older television is replaced with a new model with an increased price, BLS analysts collect information on the characteristics of those televisions and conduct an analysis to determine how much of the price change is due to a change in quality (e.g., the new television has additional features). The remainder of the price change is attributed to inflation. While accounting for quality change is a challenge for all price indexes, four of the nine experts we interviewed said it may be particularly difficult when measuring inflation for older populations. According to these experts, this is because older populations tend to consume more medical care goods and services, for which quality changes are particularly difficult to measure. Alternative data. To improve its price indexes, BLS is exploring the use of alternative data sources, such as “big data” obtained directly from companies, from third parties, or from the internet (see text box below). For example, BLS recently purchased a large private dataset to use in an experimental index for new vehicles. According to BLS, big data may lead to methodological improvements and cost savings in the CPIs. Notably, some big data may provide “real-time” expenditure data that could potentially be used to capture consumer behavior in response to relative price changes, thereby addressing substitution bias. According to agency officials and most experts we spoke with, big data may be promising but incorporating them in the CPIs requires additional considerations and adjustments to the processes BLS currently has in place. For example, the data may not be consistently available with the information needed to produce CPIs. Additionally, big data are not always free and some companies may be reluctant to share these data. What is “big data?” Big data encompass a number of very large data sets that can be structured or unstructured and have the potential to be mined for information. Web-scraped data and scanner data are two prominent types of big data relevant for consumer price indexes. Web- scraped data are price data collected on goods sold online. Scanner data include price and quantity data on sales of goods obtained by scanning bar codes for goods, such as at electronic points of sale in retail outlets. Advances in technology have allowed large amounts of data to be collected and stored easily and could be used in consumer price index construction. In addition to big data, BLS currently uses some administrative data collected by the federal government to improve inflation estimates for certain goods and services. For example, BLS obtains information from the Department of Energy on household consumption averages for electricity and piped gas service. It also uses administrative data from the Centers for Medicare & Medicaid Services about which facilities provide adult home care. According to BLS officials, they are unable to use some administrative data (e.g., certain federal tax data) because of current law. Other data collected by the federal government (National Accounts data). While BLS is exploring numerous alternative data sources, BLS has not fully explored the potential to update expenditure weights on a more frequent basis using supplementary data from the National Accounts in years when the most current biennial weights using Consumer Expenditure Survey data are not available. As discussed earlier, BLS typically requires 2 years of data from the Consumer Expenditure Survey to produce expenditure weights, which have a lag. In contrast, National Accounts data comprise administrative and statistical data representing the whole economy, many of which have a large sample size and are available on an annual basis. Standards of internal control call for agencies to obtain relevant data from reliable internal and external sources in a timely manner to meet information requirements for meeting their objectives. For BLS, this could include obtaining relevant data from reliable sources for producing CPIs. As part of its strategic plan, BLS maintains goals to improve the accuracy and timeliness of BLS data and to ensure relevance in an ever-changing economy. Without adequately exploring the potential of using National Accounts data to supplement Consumer Expenditure Survey data, BLS may be missing an opportunity to move closer towards those goals. Over time, expenditure survey data lose their accuracy and relevance to the present-day expenditure patterns of consumers, which can introduce bias in measures of inflation used to adjust federal retirement benefits. For example, the longer the time period between expenditure weight updates, the longer the delay to include new products in the expenditure patterns reflected in the CPIs. This delay could become increasingly important because of the rapid development in new technology, such as smart phones. Of the 15 publications we reviewed, six discussed ways to improve the CPI and four of these suggested more timely expenditure weight updates could make the CPIs more accurate and relevant. For example, a 2009 working paper by BLS staff found that more frequent weighting may offer better representation of current price change, as well as a closer approximation to a cost-of-living index. In particular, the authors simulated updating expenditure weights annually, which resulted in slower inflation increases that the authors posited are a closer approximation to a cost-of-living index. While these improvements may not be currently possible given the lag in Consumer Expenditure Survey data, the authors conclude that further examination of the weighting issue is a potentially fruitful avenue of research. The three other studies similarly indicated that more timely weight updates would result in more relevant CPIs, for example by better reflecting changes in consumer spending patterns. BLS officials acknowledged that updating the weights more frequently would make the index more relevant, though they did not believe using the Consumer Expenditure Survey to do so was practical in part because they said it would require additional costs to increase the sample size. In 2002, BLS increased the frequency of its weight updates from every 10 years to every 2 years, which they said was an improvement but required a sample size increase in Consumer Expenditure Survey. As previously described, the Consumer Expenditure Survey faces increasing costs and declining response rates and, according to agency officials, obtaining a large enough sample to update weights annually would require a 50 to 100 percent increase in sample size, for example, to avoid an increase in sampling error. Indeed, three studies we reviewed suggested that it can be challenging to obtain enough responses for household surveys such as the Consumer Expenditure Survey, indicating that alternate data sources may become more important. In contrast, BLS officials acknowledged that National Accounts data could provide useful supplementary information if the expenditure survey is not providing timely enough data. However, BLS officials said they have not explored using National Accounts data, in part because they have not examined the effects of altering the expenditure weights in about 10 years. BLS officials expressed concern that National Accounts data can be subject to revision. According to the Bureau of Economic Analysis (BEA), the revisions do not reflect errors but are driven by the incorporation of more complete source data. BLS officials also noted that some National Accounts data are adjusted by the CPI, so BLS would have to remove the CPI’s effect in order to use National Accounts data in the CPI. Moreover, the supplementary use of National Accounts data could also help address some of the concerns with measurement error in household surveys, according to some literature we reviewed. Specifically, National Accounts data could be used to address underreporting due to recall bias, the difficulty some survey respondents have recalling infrequent purchases, or underreporting of certain goods that may be seen as socially undesirable, such as tobacco and alcohol. For example, according to a recent Brookings Institution report, the National Accounts data used for the BEA’s Personal Consumption Expenditure index weights are mostly based on business surveys and administrative data and thereby avoid the reporting biases inherent in the Consumer Expenditure Survey. BLS’s Technical Advisory Committee recommended using administrative data to address such underreporting in fiscal year 2016, as did a National Academy of Sciences report in 2013. While BLS has taken steps toward increased use of administrative data, BLS has not fully implemented the Technical Advisory Committee recommendation as of March 2020. Our review of Organisation for Economic Co-operation and Development (OECD) countries’ national pension systems revealed that it is relatively uncommon to use a retiree-specific index (i.e., a CPI for the older subpopulation) for the purpose of adjusting national pension benefits. Of the 36 OECD countries, 27 have national pension programs in which indexation is based, at least in part, on prices after initial benefits have been set, similar to Social Security in the United States (see app. I). Most OECD countries use their primary measures of inflation to adjust national pension benefits, according to reports and documents about the retirement systems in these countries. Of the 27 countries using prices to adjust national pension benefits, we found evidence in 10 that the national statistical agency produces an index for the older subpopulation. Each of these 10 countries generally uses the same price information for the older subpopulation index as the main CPI but reweights the price information based on the expenditures for that subpopulation, rather than gathering new information that is unique to that group (see text box). A similar approach is used for the CPI-E in the United States. However, of these 10 countries, only four countries use the index for the older subpopulation to adjust their national pension benefits (Australia, Czech Republic, Hungary, and the Slovak Republic). The others produce the subpopulation index for research or other purposes, but do not use it for pension benefit adjustments. Agency officials in all three of our case study countries (Australia, New Zealand, and the United Kingdom) said they generally saw a value in having a primary index for macroeconomic purposes, such as inflation targeting, and a subpopulation index that could be used for other purposes, such as indexation of benefits. Methods for Validating Use of Existing CPI Data in Subpopulation CPIs In the three case study countries we selected for review, each national statistical agency relied upon different approaches to validate the use of existing data from the primary (main) CPI in the subpopulation CPI. Agency officials indicated that some of the methods for validating the use of existing CPI data for the subpopulation CPIs were cost efficient. Australia agency officials said they validated the use of existing data in the index for the older subpopulation in part by both researching whether pensioners pay different prices or shop at different outlets and cross-checking some data from industry sources. Officials said they expected that pensioners and the general population generally pay the same prices for most items and included different prices in the index for the older subpopulation for those items known to be discounted for pensioners. To get a better sense of the older population’s expenditures, they also increased the sample size of the expenditure survey from about 7,000 households to about 10,000 households to include more pensioners. New Zealand agency officials said they validated the use of existing data in part by using existing expenditure data to confirm that goods and services most important to the older subpopulation were adequately represented in the data. They also said they consider the coverage of the subpopulation group when determining the make-up of the CPI basket. Since older people may shop at different stores than the general population, New Zealand’s statistical agency also developed separate outlet weights for the older subpopulation, which more accurately reflect the different mix of outlets, or stores, frequented by this group, according to agency officials. Overall, officials said they found that using subpopulation-specific outlet data instead of general CPI outlet data had very little impact on the index for the older subpopulation. United Kingdom agency officials said they validated the use of existing data by organizing expenditure data from the household survey into categories that align with national expenditure data, which allowed them to generate bigger samples than exist in the household survey data. As a result of the larger sample, their statistical agency said they were able to achieve more precise estimates for the index for the older subpopulation. It is also relatively uncommon for a country to produce a chained index for the purpose of adjusting national pension benefits. Of those 27 OECD countries that are using price indexation, five of them produce a chained index (Australia, Canada, the United States, the United Kingdom, and New Zealand). However, none of the OECD countries use the chained index to adjust their national pension benefits. In our three case study countries, the statistical agencies used the chained index as an analytical tool to measure bias in the CPI or for comparative purposes. Officials we spoke with said that the delay required to produce a chained index made it impractical to use the index to adjust benefits. While some of the stakeholders in selected case study countries indicated it could be theoretically possible to create a chained CPI for the older subpopulation, we did not identify any countries with such an index during this review. While government-collected data are often collected for reasons other than the production of the CPIs, the three selected case study countries are using government-collected data to help fill the gaps in data they collect expressly for the CPI (see table 2). According to agency officials in the three selected countries, use of this government-collected data improves accuracy of the CPIs and can be a relatively affordable way to supplement data collected for the CPI. National Accounts, key sources of government-collected data, are typically used for national summary measures like the Gross Domestic Product. However, all three of the selected countries are also using relevant consumption data from National Accounts to supplement their CPI data, which agency officials in Australia said is in-line with recommendations from the International Labour Organization (see text box). Australia, New Zealand, and the United Kingdom are all using their National Accounts data to supplement expenditure survey data in their CPIs, while New Zealand is also using another form of government- collected administrative data to improve its CPIs. International Guidance for Calculating CPIs and Subpopulation Indexes The International Labour Organization produces a manual that provides an overview of issues that national statistical offices can consider when making decisions on how to deal with the various problems in the compilation of Consumer Price Indexes. Researchers from many countries’ national statistical agencies, universities, and international organizations (such as the World Bank, International Monetary Fund, and Organisation for Economic Co-operation and Development) are involved in creating the manual. The manual also establishes international conventions, such as a suggestion that countries regularly evaluate the use of average wages as opposed to price indexes (and vice versa). Last published in 2004, an update to the manual is scheduled to be released in 2020. The upcoming revised manual is expected to elaborate on the use of National Accounts data and alternative data sources to develop expenditure weights. Australia. Australia’s statistical agency uses consumption data from their National Accounts to update the CPI expenditure weights more frequently than officials said was previously possible. Using this data has helped reduce substitution bias, meaning that the data better reflect changes in consumer purchases in response to price changes. Previously, Australia updated its expenditure weights every 6 years, when its household expenditure survey was released. In other words, the CPI was previously calculated assuming that consumers’ expenditure patterns did not change for 6 years. As a result, the CPI did not account for substitution patterns to different goods and services over significant periods of time, leading to bias in the CPI. In 2018, the Australian statistical agency incorporated National Accounts data in the CPI in those years when the expenditure survey was not conducted, allowing the expenditure weights to be updated annually to reflect what statistical agency officials described as more timely and relevant consumption patterns and to improve the accuracy of the data. According to Australian statistical agency officials, they did not have the budget to increase the frequency of their household expenditure survey, which they said is very costly. Instead, officials said they researched alternative ways that would allow for more frequent reweighting and settled on using the National Accounts data in between survey years to update the weights annually. This approach does not require a budget increase because the National Accounts data are already produced. Australian officials said more frequent weighting helped reduce substitution bias in their CPIs by about 0.2 percentage points per year, which can have a large impact on benefits over time. By incorporating consumption data from the National Accounts, Australian statistical agency officials said they can generate more timely and relevant CPI measures, including the subpopulation indexes. Australia’s index for the older subpopulation, called the Pensioner and Beneficiary Living Cost Index, also benefits from more frequent updates of the expenditure weights and subsequent reduction in substitution bias in the CPI, according to agency officials. Agency officials said that despite not having demographic information in the National Accounts, their methods have made use of this consumption data fit for purpose for the subpopulation indexes, and the subpopulation indexes are as methodologically sound as the primary CPI. New Zealand. New Zealand’s statistical agency also uses National Accounts data to estimate expenditure weights for insurance services, which are relatively difficult to measure in survey data, according to agency officials. Specifically, the expenditure weights for health and life insurance are based on data from the National Accounts. United Kingdom. In the United Kingdom, annual spending data from the National Accounts are the main source for CPI expenditure weights, as stakeholders noted that the National Accounts spending data are more precise and timely than their household expenditure survey. According to statistical agency officials, household expenditure data are ultimately obtained by organizing the United Kingdom’s expenditure survey data into categories that align with the National Accounts and scaling up these data to the National Accounts data. Officials said this method allows the United Kingdom’s statistical agency to achieve larger sample sizes, and thus smaller variances and more precision in estimates for subgroup indexes. United Kingdom officials said that their National Accounts estimates are more accurate and comprehensive than their household expenditure survey, which has a smaller sample size of nearly 6,000 households. Having more accurate expenditure data and weights leads to a more accurate and relevant primary index for pension benefits, as well as a more accurate subpopulation index, according to agency officials. The National Accounts data also help the United Kingdom adjust for any potential underreporting of particular goods in the household expenditure survey, such as alcohol, further increasing the accuracy and relevance of the dataset, according to officials. Collecting prices directly from the source is more accurate than relying on someone to recall how much they spent on items, according to one stakeholder. Government agencies from selected countries also produce other administrative data that can be useful in measuring the CPI. For example, New Zealand’s statistical agency partnered with the Ministry for Business, Innovation, and Employment to use its tenancy bond database, which covers approximately 85 percent of all rental housing units in the country. These data facilitated a new way to measure rent in their CPI. Moreover, this partnership enabled New Zealand’s statistical agency to create an index of rent prices monthly, instead of quarterly, which resulted in a more accurate and timely depiction of what people are spending on rent and a more accurate indexation of benefits overall. According to agency officials, the transition to these administrative data replaced the CPI survey of landlords, and in doing so it lowered respondent burden, increased the timeliness of the rental component of New Zealand’s CPI, and improved population coverage. In all of our case study countries, various data are used to measure housing prices (see text box). Housing and the Consumer Price Index Measuring the change in housing prices for CPI is widely acknowledged by experts to pose methodological and data challenges. In response, national statistical agencies have developed a variety of approaches to address the measurement of owner-occupied housing costs, both in the primary CPI and subpopulation indexes. Officials in the national statistical offices of the case study countries said that one of the factors underlying the approach to housing is whether the measure should reflect inflation in the economy overall or inflation as experienced by households. In Australia and New Zealand, the primary CPI includes price changes stemming from the purchase of a new home but not via mortgage interest payments (known as the acquisitions approach), while the subpopulation index excludes the purchase of a new home but includes mortgage interest (referred to as outlays or payment approach). In the United Kingdom, there are two versions of the primary CPI: one that uses “rental equivalence” (a calculation of what the owner would pay in rent for an equivalent house) and one that excludes owner-occupied housing costs. In addition, the United Kingdom’s subpopulation index uses a payments approach. Officials in our selected case study countries said they are using alternative big data sources, such as web-scraping data and transactional (scanner) data to help them more accurately index their national pension benefits (see table 3). These officials said that these alternative data sources allow countries to obtain a higher volume of data and more accurate data to incorporate into their CPIs, subsequently making the indexation of benefits more accurate. Electronic price data obtained from a retailer, whether through the retailer’s website or through scanner data the retailer shares with the national statistical agency, reflects accurate and timely data on the price and quantity of goods and services sold. Electronic price data can be an improvement over data collected in household expenditure surveys, for example, as several experts and agency officials in one case study country noted that household expenditure surveys suffer from recall bias, resulting in less accurate spending data. The three selected countries are at different stages of incorporating scanner data into their CPI. Officials at the national statistical agencies in all three of our case-study countries stated that they are primarily focused on incorporating scanner data from grocery stores into their CPI. Using grocery store data is possible, in part, because these countries contain a relatively small number of stores that dominate grocery sales, according to agency officials, which is a difference from the United States. Australia. According to stakeholders, the Australian statistical agency developed a formula that incorporates a chained formula into a portion of the CPI using high- frequency scanner data from the country’s dominant grocery stores, which provides timely price and expenditure data on food items for their indexes. Integrating this type of high- frequency data is not easy, they said, since the traditional CPI formulas are not built to handle the volume of data that scanner data produce. However, in consultation with academics and statistical agencies from around the world, Australia was able to develop a chained formula that uses an innovative statistical method, known as a multilateral approach, to incorporate the scanner data. As a result, the portion of the CPI for which Australia has scanner data (about one-sixth of the CPI, comprised mostly of food and other grocery data) is based on a chained formula. Incorporating these data allows the country to include all of the products available in the datasets, rather than a small sample of products, leading to a more accurate calculation of food prices and a more accurate index overall, for both the general population and the older subpopulation, according to agency officials. Stakeholders in Australia noted that the international price statistics community has since reached a consensus that multilateral methods are the most effective way to capitalize the full amount of information provided in scanner data, and they said that the forthcoming update of the International Labour Organization’s CPI Manual is expected to recommend this method as well. New Zealand. New Zealand’s statistical agency is working towards incorporating more scanner data, primarily from its two large supermarket chains, in the production of the country’s CPIs, which will help achieve a more accurate index for both the general population and the older subpopulation, according to agency officials. New Zealand started using retail scanner data to supplement its expenditure data in its CPI in 2006, and in 2014 New Zealand incorporated direct measurement from scanner data for consumer electronics products into its CPI. Officials from the national statistical agency said they hope to expand their use of this type of big data in the near future. They have already received the data from supermarkets, whose goods account for roughly 20 percent of the goods and services in the CPI, but they have not yet integrated the data into their CPIs. Agency officials said they expect to integrate this in the next year. New Zealand’s statistical agency officials said they have a goal to obtain scanner data for other CPI components soon as well, such as fuel. United Kingdom. In the United Kingdom, agency officials said improvements in technologies have resulted in new alternative sources for price data that could be used in the compilation of their price indexes in the near future. The United Kingdom’s statistical agency is currently exploring both scanner data and online price data. The agency currently has several streams of research looking into the expanded use of alternative data, including research studying the feasibility of moving away from collecting prices manually towards using electronic means wherever feasible and efficient. The agency is now receiving web-scraped data from an online source that captures prices from online sales of goods like clothing. The United Kingdom’s statistical agency is also continuing to engage with retailers on receiving scanner data covering areas such as clothing and groceries, targeting some of the largest retailers from which the agency currently manually collects prices. These data sources may provide a more efficient way to capture the increase in online expenditures that has occurred over the last decade, and will likely continue to occur. These new data are initially being used for research work, but over time the web-scraped online prices and scanner data will be used when calculating primary inflation indexes, according to agency officials. The research done by the United Kingdom’s statistical agency into grocery store items has also enabled officials there to explore different methods of collecting web scraped prices in-house. The officials said this has led to wider benefits for the agency in general, with an increase in knowledge and experience that has contributed to the success of other big data projects. Our selected case-study countries use committees with stakeholders and advisory panels, including academic researchers with subject matter expertise, to implement innovative changes to their CPIs (see table 4). The statistical agencies in these three countries have shown a willingness to act on recommendations that came out of these collaborative efforts. These countries are also seeking input from the international statistical community, which country officials said has led to positive developments in their CPIs. Australia. Australia’s statistical agency has taken a variety of approaches to collaborate with external stakeholders, which agency officials said has led to positive changes to their CPIs, and thus indexation of benefits over the years. According to agency officials, Australia’s collaborative efforts include: conducting regular reviews and seeking stakeholder input every 6 years with the release of the expenditure survey; convening workshops with stakeholders including both academics and users (e.g., the agencies that distribute benefits); participating in international conferences to receive feedback on changes to the country’s CPI and subpopulation indexes; partnering with methodology experts in other agencies such as the Treasury and central bank, occasionally by obtaining staff on detail; and commissioning reports that research and review measures to strengthen the financial security of seniors. These reviews and associated collaborative efforts have helped the agency learn more about the issues it faces and have helped trigger changes that will improve the accuracy of the nation’s CPI, according to agency officials. For example, as discussed above, agency officials said that a 2011 CPI review revealed concern by the Reserve Bank of Australia and others that the infrequent reweighting was resulting in bias in the CPI that affected inflation targeting by the central bank, as well as benefit expenditures. This review helped spur innovations, such as including the incorporation of scanner data into the nation’s CPI, which delivered positive results with respect to more timely and relevant data being used to estimate inflation. Australia’s statistical agency officials said they sought extensive input from key governmental stakeholders, a number of academic experts, as well as international experts to research how to best incorporate scanner data into their CPI, which agency officials noted was necessary to facilitate the integration of high-frequency scanner data into the CPI. They also conducted numerous bilateral and multilateral consultations with key stakeholders in the government that use CPI data, including the Reserve Bank of Australia, the Treasury, Department of Finance, Department of Social Services, and State Treasuries. Australian statistical agency officials suggested that consulting with users of the data frequently was an important part of implementing changes to the measurement of the CPI and subpopulation indexes. New Zealand. New Zealand’s statistical agency has also used CPI advisory committees composed primarily of external stakeholders who make use of the agency’s CPIs. For example, in 2013 New Zealand’s statistical agency convened a committee to independently review the methods and practices used to compile the CPI and make recommendations, for example, about how additional indexes should be measured. The committee also incorporated public submissions on the scope and uses of the CPI, for example, from nongovernmental organizations and interest groups such as retiree advocacy groups. The committee then released a report recommending the creation of additional CPIs that are designed for microeconomic purposes, such as the indexation of retirement benefits, to better reflect changes in the purchasing power of the incomes of particular subgroups of the population, like the older subpopulation. The committee also recommended that New Zealand’s statistical agency review the sample size and collection methods of their expenditure survey to improve the reliability of expenditure estimates of the required population subgroups so that the estimates could eventually be of high enough quality to be published, which they subsequently were. According to officials, the committee’s report helped lead to the creation of New Zealand’s subpopulation indexes. Moreover, the committee recommended that the statistical agency try to use retail scanner data to measure price change and stated that the method aligns with international best practices. New Zealand’s statistical agency recognized these best practices and the international consensus that multilateral methods are the preferred way to incorporate big data. Indeed, it has started to use these methods in the rental prices data and it plans to continue to research implementing these methods further. United Kingdom. The United Kingdom has also developed advisory panels on consumer prices to provide independent advice to the National Statistician, which officials said has allowed the United Kingdom’s statistical agency to learn more about challenges with the nation’s CPIs and to find possible solutions. Similar to the United States, the United Kingdom has advisory groups on technical issues, as well as on the uses of price indexes. The reports published by various advisory groups have raised technical issues with the Retail Price Index (RPI), which is the United Kingdom’s longest running measure of inflation. These technical issues resulted in the RPI being higher than the CPI. Ultimately, agency officials said consultations and advisory panel input helped lead to the RPI being decertified as a national statistic (see text box). The United Kingdom’s statistical agency also hosted numerous meetings and a collaborative workshop about the conceptual foundations of its subpopulation indexes, which are currently being developed. According to agency officials, obtaining input from internal and external stakeholders has been critical to developing solutions to indexation challenges. The United Kingdom’s Experience Changing Price Index Used for Pension Adjustments Changing the index used for benefit adjustments can be difficult, as switching price indexes can involve tradeoffs. For example, public and private pension benefits in the United Kingdom have traditionally been indexed by the Retail Price Index (RPI), the oldest index in the United Kingdom. The United Kingdom recently switched indexation of certain government benefits, including pension benefits, from the RPI to the slower-growing CPI. This is expected to result in lower payouts from the government. In contrast, the government continued using the faster- growing RPI for some provisions, such as student loan interest rates, that resulted in higher payments to the government. Stakeholders suggested that having multiple measures of inflation can create incentives for the government to use different indexes for its own budgetary advantage, with pensioners receiving lower benefit adjustments and students facing relatively higher loan payment adjustments. The United Kingdom’s experience highlights that changing the index for benefits may result in advantages and disadvantages for different groups and thus may be politically difficult, according to agency officials. Federal retirement programs like Social Security have relied upon a subpopulation price index to adjust benefits since automatic cost-of-living adjustments were first enacted almost 45 years ago. This index estimates changes in purchasing power for wage earners as opposed to changes in the standard of living or some other type of measurement. In recent years, numerous legislative proposals have been suggested to change this index from one that measures the purchasing power of wage earners to one that targets some different population, for example one solely focused on the elderly. Much of the debate over using a different index has centered on the ability (i.e., the accuracy) of the indexes to capture changes in the cost of living for a particular group in society. BLS is unsure whether the data sources it currently uses are adequate to produce accurate CPI-E and CPI-W subpopulation indexes on a timely basis, according to BLS officials and documentation. While the CPI-E is experimental and not used by federal programs, the CPI-W is used to adjust billions of dollars of Social Security and other federal retirement program benefits. It is therefore critical that the measurement be as accurate as possible. However, ensuring the measurement’s accuracy may require a reexamination of the underlying data used to produce the subpopulation indexes. BLS has not evaluated the adequacy of existing data because it is costly to undertake a full evaluation, according to agency officials. But experts we interviewed, including some on BLS advisory groups, indicate there may be cost-efficient ways to conduct such a review. Although the experiences of other countries may not be directly applicable, other countries have found ways to evaluate the use of existing data for their subpopulation indexes, and officials in all three of our case study countries expressed the view that some of these methods were cost efficient. Absent BLS evaluating the adequacy of the existing data it uses to produce its subpopulation indexes, BLS will continue to be uncertain if its subpopulation indexes are accurate and it may not learn of potential areas for improvement. In addition, BLS currently relies on the Consumer Expenditure Survey to produce expenditure weights that measure the mix of goods and services consumers purchase and, because of survey shortcomings and processing lags, the weights reflect spending patterns that can be up to 4 years out of date. Although BLS has taken other steps to improve the accuracy, timeliness, and relevance of data used in the CPIs, BLS has not fully explored the potential to update expenditure weights on a more frequent basis using annual data from the National Accounts, which are currently collected in part to measure Gross Domestic Product. While not specifically designed for use in CPIs, the National Accounts data may provide BLS an opportunity to supplement Consumer Expenditure Survey data in the intervening years. Moreover, some literature we reviewed indicated that the use of National Accounts data has the potential to mitigate measurement error in the Consumer Expenditure Survey, thereby increasing accuracy. Without adequately exploring the potential of such an option, BLS may be missing an opportunity to improve its CPIs. We are making the following two recommendations to the Department of Labor: The Secretary of Labor should ensure that BLS explores cost-efficient ways to evaluate the data sources currently used to produce subpopulation indexes, such as by engaging more directly with other stakeholders or seeking input from its advisory groups and other knowledgeable entities about approaches to expand data collection in a cost-efficient manner. (Recommendation 1) The Secretary of Labor should ensure that BLS explores the use of already collected National Accounts data to produce more accurate, timely, and relevant CPIs. (Recommendation 2) We provided a draft of the report to the Department of Labor, the Social Security Administration, and the Department of State for their review and comment. We also sent an informational copy to the Bureau of Economic Analysis. The Department of Labor and the Social Security Administration provided technical comments, which we have incorporated where appropriate. In an email, the Department of State said it had no comments on the report. The Department of Labor also provided written comments, which are reproduced in appendix III and discussed below. In its written comments, the Department of Labor stated that BLS continually improves its measures according to a guiding principle to provide accurate, objective, relevant, timely, and accessible information. The Department of Labor agreed with the first recommendation to explore cost-efficient ways to evaluate the data sources currently used to produce subpopulation indexes and stated that it would continue to investigate improvements to subpopulation indexes. The Department of Labor disagreed with the second recommendation to explore the use of National Accounts data in the construction of its indexes, stating that the National Accounts data are not a replacement for Consumer Expenditure Survey data. While we agree that the National Accounts data are not a wholesale replacement for the Consumer Expenditure Survey data, we believe that it would be useful to examine National Accounts data as an augmenting, alternative source of data that could supplement or enrich the Consumer Expenditure Survey. Such an effort could potentially lead to more accurate, timely, and relevant CPIs. Although the Department of Labor stated that the Consumer Expenditure Survey is a continuous survey and that data are received quarterly, most CPIs still rely on expenditure weights based on Consumer Expenditure Survey data that are up to 4 years out-of-date. In addition, the Consumer Expenditure Survey faces increasing costs and declining response rates. The Department of Labor stated in its comments that it is exploring ways to accelerate the data collection and processing time and that it periodically investigates the frequency of updating expenditure weights. We commend the Department of Labor for considering these efforts, and we maintain that they could take further action to explore additional opportunities for improvement. For example, the Department of Labor could research the extent to which there are instances or categories for which the National Accounts data could be used to produce more up-to- date expenditure weights than the Consumer Expenditure Survey. As we noted in our report, Department of Labor officials told us they periodically examine National Accounts expenditure data to explore differences with the Consumer Expenditure Survey data, not to explore supplementary use of alternative data. While it cannot be ensured that every expenditure data point in the National Accounts will be of use for producing CPIs, we maintain that further exploring the National Accounts expenditure data as a complement to the Consumer Expenditure Survey data may provide opportunities for BLS to improve the accuracy, timeliness, and relevance of its CPIs. We are sending copies of this report to the Secretary of Labor, the Commissioner of Social Security, and the Secretary of State. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Appendix II: Additional Information about Selected Case Study Countries technical corrections as necessary. We note also that the fact that a legal feature was successful in one or more of the countries we visited, which may have significantly different cultures, histories, and legal systems than the United States, does not necessarily indicate that it would be successful in the United States. Charles A. Jeszeck, (202) 512-7215 or jeszeckc@gao.gov In addition to the contact named above, Michael Collins (Assistant Director), Laura Hoffrey (Analyst in Charge), Emilio Fonseca, Kathleen McQueeney, Tom Moscovitch, and Julie Miller made key contributions to this report. Also contributing to this report were Deborah Bland, Alicia Cackley, Charles Ford, Sarah Gilliland, Susan Irving, Kelsey Kreider, Sheila McCoy, Jessica Orr, Oliver Richard, Joseph Silvestri, Almeta Spencer, Curtia Taylor, Frank Todisco, Walter Vance, Adam Wendel, and Sirin Yaemsiri.", "summary": "In the United States, federal retirement programs typically include cost-of-living adjustments based on a CPI that measures inflation for a subpopulation of workers. This includes Social Security, which provides benefits for more than 60 million older Americans, workers with disabilities, and their families. As the life expectancy of Americans continues to increase, more Americans will be subject to these adjustments, so it is critical for them to be accurate. GAO was asked to review U.S. and international efforts to measure the cost of living for older populations. This report examines (1) key issues that BLS faces in measuring the cost of living for older Americans; and (2) the experiences of other countries that developed alternate methods of adjusting retirement benefits. GAO reviewed pertinent literature; assessed BLS efforts to measure inflation; conducted case studies in three countries—Australia, New Zealand, and the U.K.—with a variety of CPIs, which GAO selected based on expert referral and document review; and interviewed agency officials and experts. The U.S. Bureau of Labor Statistics (BLS) faces accuracy, timeliness, and relevancy challenges developing consumer price indexes (CPI) for subpopulations of blue-collar workers and older Americans. For example, the CPI for these workers is used to adjust federal retirement benefits for inflation, including Social Security. BLS has not evaluated the extent to which its existing data are adequate to produce CPIs that reflect what these subpopulations pay, where they shop, and what they purchase. Officials cite budgetary reasons for not having done this, but there may be cost-efficient methods for evaluating the adequacy of these data. Without an evaluation, federal retirement benefits could be subject to adjustment based on potentially inaccurate information. Additionally, BLS has made limited use of certain data already collected by the federal government—such as National Accounts data on U.S. production and consumption—that could be used to increase the accuracy, timeliness, and relevancy of CPI calculations that reflect the mix of goods and services consumers purchase. Without adequately exploring the potential of using these data, BLS may be missing an opportunity to improve its CPIs. Reports about the retirement systems in the 36 Organisation for Economic Co-operation and Development countries indicate that most use their primary measures of inflation to adjust government retirement benefits. In addition, all three of GAO's case study countries (Australia, New Zealand, and the United Kingdom, or U.K.) have a variety of CPIs, including for subpopulations, and they filled information gaps in their CPIs with National Accounts and other data. For example, Australia and the U.K. use National Accounts data annually to update their calculations of the mix of goods and services consumers buy, thereby making the CPIs more relevant and accurate. All three countries also collaborated with stakeholders—such as other agencies—to implement changes, for example by gathering input on the design of subpopulation CPIs. GAO recommends that BLS explore cost-efficient ways to evaluate the data currently used to produce subpopulation indexes, and explore the use of National Accounts data to produce more accurate, timely, and relevant CPIs. BLS agreed with the first recommendation but disagreed with the other. GAO continues to believe both recommendations are warranted, as discussed in the report.", "document_type": "gao"}
{"report": "Sanctions are imposed pursuant to statute, executive order, or other authorities. For example, the President may use authorities granted in the International Emergency Economic Powers Act (IEEPA) and the National Emergencies Act (NEA) to issue executive orders authorizing sanctions. The United Nations Participation Act of 1945 provides the basis for the U.S.’s implementation of United Nations Security Council sanctions mandated under Article 41 of the United Nations Charter. Sanctions provide a range of tools that Congress and the President may use to attempt to alter or deter the behavior of a foreign government, an individual, or an entity in furtherance of U.S. national security or foreign policy objectives. For example, sanctions may be imposed in response to human rights abuses, weapons proliferation, or occupation of a foreign country. Sanctions may include actions such as limiting trade; blocking assets and interests in assets subject to U.S. jurisdiction; limiting access to the U.S. financial system, including limiting or prohibiting transactions involving U.S. individuals and businesses; restricting private and government loans, investments, insurance, and underwriting; and denying foreign assistance and government procurement contracts. The United States imposes comprehensive sanctions and targeted sanctions. Comprehensive sanctions generally include broad-based trade restrictions and prohibit commercial activity with an entire country. Examples of comprehensive sanctions include U.S. sanctions against Iran and Cuba. Targeted sanctions restrict transactions of, and with, specific persons or entities. For example, the U.S. sanctions program related to Somalia targets persons engaging in acts threatening the peace, security, or stability of that country. Sectoral sanctions are a form of targeted sanctions directed at a specified sector, or sectors, of a target’s economy. For instance, Executive Order 13662 authorized sanctions targeting persons operating in certain sectors of the Russian economy as might later be determined by the Secretary of the Treasury in consultation with the Secretary of State, such as the financial services, energy, mining, and defense and related materiel sectors. Supplementary sanctions, also known as secondary sanctions, target third-party actors doing business with, supporting, or facilitating targeted regimes, persons, and organizations. For example, in February 2017, Treasury imposed sanctions against 13 individuals and 12 entities for their involvement in, or support for, Iran’s ballistic missile program as well as for acting for or on behalf of, or providing support to, Iran’s Islamic Revolutionary Guard Corps–Qods Force. OFAC’s implementation of sanctions includes publishing the Specially Designated Nationals and Blocked Persons List of individuals, groups, and entities whose assets in the United States are blocked and with whom U.S. persons are prohibited from dealing. The addition of an individual, group, or entity to this list is referred to as a sanctions designation. Agencies may issue licenses to authorize transactions with sanctioned entities that otherwise would be prohibited by existing sanctions. According to OFAC, many of its licensing determinations are guided by U.S. foreign policy and national security concerns. In making these determinations, OFAC must often coordinate with State and other government agencies, such as Commerce. OFAC issues two types of licenses: (1) general licenses, which authorize a particular type of transaction for a class of persons without the need to apply for a specific license, and (2) specific licenses, which OFAC issues to a particular person or entity to authorize a particular transaction. Commerce’s Bureau of Industry and Security (BIS) issues two forms of authorization: (1) an individual validated license requiring an application and (2) a license exception allowing an export or reexport, under stated conditions, for which no application is required. Laws and executive orders establishing sanctions may designate agency implementation roles. Some sanctions-related executive orders designate both primary and consultative agencies. For example, Executive Order 13818 establishes sanctions that include blocking the U.S. assets of persons whom the Secretary of the Treasury, in consultation with the Secretary of State and the Attorney General, determines to be responsible for, or complicit in, serious human rights abuse, among other measures. Executive orders may also broadly direct U.S. government agencies to take appropriate measures within their authorities to perform specified functions and duties. When roles are not assigned by the law or executive order authorizing the sanctions, agency roles are typically assigned through an interagency process. The IEEPA and the NEA mandate that the President report to Congress when using authorities granted under those laws. The IEEPA requires the President to report, among other things, actions taken in the exercise of IEEPA authorities to Congress at least once during each succeeding 6- month period following the administration’s initial reporting of the authorities’ use. The NEA requires the President to transmit a report to Congress within 90 days after the end of each 6-month period following a declaration of a national emergency, providing the total U.S. government expenditures that are directly attributable to the exercise of powers and authorities conferred by declaration of the emergency. The President has delegated responsibility for many of these reports to the Secretary of the Treasury. However, the President delegated responsibility for the report on the National Emergency With Respect to Proliferation of Weapons of Mass Destruction, Executive Order 12938, to the Secretary of State. The Foreign Narcotics Kingpin Designation Act (Kingpin Act), enacted in 1999, mandates that the President prepare classified reports by July 1 of each year that include the number of new Kingpin Act designations and the personnel and resources directed toward the imposition of Kingpin sanctions. The Trade Sanctions Reform and Export Enhancement Act of 2000 (TSRA) mandates that the applicable department or agency submit quarterly and biennial reports on activity under the act regarding the department or agency’s determinations and processing of license applications for export of agricultural commodities, medicines, and medical devices to specified entities and destinations, including state sponsors of terrorism. OFAC and Commerce’s BIS submit reports in response to the TSRA. To implement sanctions, agencies need to identify the human resources needed for the work. Strategic workforce planning focuses on developing long-term strategies for acquiring, developing, and retaining an organization’s total workforce to meet the needs of the future. Agency approaches to such planning can vary with each agency’s particular needs and mission. We have previously identified five principles that a strategic workforce planning process should address: 1) Involve top management, employees, and other stakeholders. 2) Determine the critical skills and competencies that will be needed. 3) Develop strategies that are tailored to address gaps in number, deployment, and alignment of human capital approaches. 4) Build the capability needed to address administrative, educational, and other requirements important to support workforce strategies. 5) Monitor and evaluate progress toward human capital goals and the contribution that human capital results have made toward achieving programmatic goals. Treasury, State and Commerce have units dedicated primarily to sanctions implementation and also have units with roles in sanctions implementation in addition to other responsibilities. Other agencies, including the Departments of Defense, Energy, Homeland Security, and Justice and federal financial regulatory agencies, play specific roles in sanctions implementation based on their expertise or broader duties. Agencies’ roles in sanctions implementation may be assigned to them in legislation, by executive order, in presidential memorandums, or through the interagency process. Table 1 shows the roles that agencies may have in sanctions implementation and examples of agency actions associated with each role. Treasury, State, and Commerce each have units that focus primarily on sanctions implementation and that act in all five of the roles we identified. Treasury. Treasury’s OFAC, part of the department’s Office of Terrorism and Financial Intelligence (TFI), administers and enforces economic sanctions based on U.S. foreign policy and national security through consultation with the Secretary of State. OFAC acts under presidential national emergency powers, as well as authority granted by specific legislation, to impose controls on transactions and freeze assets under U.S. jurisdiction. OFAC consists of four offices: The Office of Sanctions Policy and Implementation leads OFAC’s design, implementation, and evaluation of sanctions programs and develops OFAC’s public guidance, licenses, and regulations. The Office of Compliance and Enforcement works to promote compliance with OFAC’s sanctions programs and investigates apparent violations. The Office of Global Targeting works with other units within TFI, other U.S. agencies, and foreign partners to identify and investigate targets for sanctions designation. The Office of Sanctions Support and Operations supports all sanctions-related functions at OFAC, including human capital and budgetary functions. State. State’s Office of Economic Sanctions Policy and Implementation (SPI)—housed in the Bureau of Economic and Business Affairs, Division for Counter Threat Finance and Sanctions—is responsible for providing foreign policy guidance for the vast majority of sanctions programs and obtaining international cooperation with U.S. agencies enforcing sanctions. According to SPI, it acts as State’s central coordinating office for 25 of the 30 sanctions programs that were active as of April 2019. SPI also implements sanctions under authorities delegated to the Secretary of State, including sanctions on Iran and Syria. Commerce. In Commerce’s BIS, the Foreign Policy Division (FPD) of the Office of Nonproliferation and Treaty Compliance is one of the components that implements sanctions through U.S. export controls. The division is responsible for developing, analyzing, evaluating, and coordinating export controls related to sanctions policy. In addition to having units that primarily focus on sanctions, Treasury, State, and Commerce have units that carry out roles in sanctions implementation in addition to other responsibilities. Treasury. Treasury has several other units that support sanctions implementation. For example, in TFI, the Office of Intelligence and Analysis examines classified and unclassified reporting, financial transactions, and open-source databases for evidence of sanctions violations. The Financial Crimes Enforcement Network monitors and analyzes financial information on threats, producing intelligence reports that may identify targets for designation and sanctions violators. In addition to TFI units, the Internal Revenue Service, the Office of International Affairs, and the Office of the General Counsel also have roles in sanctions implementation. For example, the Office of International Affairs helps to assess the likely impact of sanctions and conducts outreach to foreign counterparts regarding sanctions implementation. State. Units at State have sanctions implementation roles related to their expertise. Some of these units take actions in all five of the sanctions roles shown in table 1 and are responsible for specific sanctions authorities within State, according to State officials. For example, the Bureau of International Narcotics and Law Enforcement Affairs is responsible for coordinating and communicating State’s position on existing or proposed new sanctions in relation to the Kingpin Act and transnational criminal organizations. According to State officials, the Bureau of Counterterrorism and Countering Violent Extremism leads State in designating Specially Designated Global Terrorists under Executive Order 13224 and Foreign Terrorist Organizations under Section 219 of the Immigration and Nationality Act. The Bureau of Economic and Business Affairs’ Office of Threat Finance Countermeasures has a primary role in implementing sanctions under Executive Order 13224, which targets terrorist financiers and others who provide material support to terrorists. Commerce. Commerce has several other units that support sanctions implementation. For example, the Office of Export Enforcement provides input regarding sanctions proposals and feedback regarding any adverse impact to existing investigations. The Office of National Security and Technology Transfer Controls implements primarily sectoral sanctions by providing technical analyses of items and recommendations during sanctions development. The Office of Exporter Services provides a range of resources, including electronic resources and educational seminars, which provide exporters with guidance on export compliance processes and procedures. Table 2 provides an overview of the various roles that Treasury, State, and Commerce units play in sanctions implementation. See appendix II for additional details. Several other agencies have more-specific roles in sanctions implementation, with the extent of their involvement dependent largely on their area of expertise. These agencies carry out their sanctions-related roles in addition to other responsibilities. Department of Defense. The Office of the Under Secretary of Defense for Policy contributes to sanctions implementation, participating in all roles except targeting. The office coordinates department units’ reviews of sanctions proposals, provides the department’s recommendation to interagency partners during sanctions development, and represents the department during interagency discussions regarding sanctions enforcement. Department of Energy. The National Nuclear Security Administration supports sanctions by providing technical analyses of weapons of mass destruction and conventional arms transactions that may be subject to sanctions and by providing recommendations during sanctions development. The National Nuclear Security Administration also reviews export licenses for munitions and items with both military and commercial applications, known as dual-use items, which may include parties subject to sanctions. Department of Homeland Security. Units of the Department of Homeland Security also have varied roles in sanctions implementation. For example, the Human Rights Violators and War Crimes Unit in U.S. Immigration and Customs Enforcement’s Homeland Security Investigations includes a Global Magnitsky investigative support team, which targets serious human rights abusers and corrupt foreign officials through OFAC sanctions and visa denials. Units in U.S. Customs and Border Protection maintain a list of sanctioned countries and couriers for which shipment applications are rejected and use an automated targeting system to identify high- risk shipments and coordinate appropriate enforcement actions. Department of Justice. Multiple Department of Justice units contribute to sanctions implementation, participating in all roles except licensing. For example, the National Security Division works with law enforcement partners to facilitate the investigation and prosecution of sanctions violators. Financial regulatory agencies. Financial regulatory agencies with roles in sanctions implementation may review the compliance programs of the institutions they oversee with respect to OFAC requirements. Some of these agencies can also enforce penalties for significant deficiencies in institutions’ OFAC compliance programs. Financial regulatory agencies generally examine institutions’ compliance with OFAC policies concurrently with examinations for compliance with the Bank Secrecy Act (BSA) and anti–money laundering (AML) statutes. Table 3 provides an overview of the various roles of these agencies in sanctions implementation. Also see appendix II for additional details of agency units’ sanctions implementation roles. See appendix III for information about agency units’ number of personnel with sanctions implementation responsibilities. All three of the sanctions implementation units we reviewed have generally received steady or increasing resources since fiscal year 2015 but have faced challenges in filling some positions. OFAC has received increasing inflation-adjusted budgetary and authorized human resources each fiscal year since 2015 but has consistently experienced a gap between the number of authorized and actual full-time equivalents (FTEs). OFAC officials attributed the gap to challenges in hiring due to competition from other agencies and the private sector and the time needed for new hires to obtain security clearances. State SPI has also generally received additional authorized inflation-adjusted budgetary and human resources but has not been fully staffed in recent years. Commerce’s FPD has received relatively steady inflation-adjusted budgetary resources but, according to Commerce officials, lacks funding to fill one of its 10 positions. OFAC received increasing budgetary resources in each of the last 5 fiscal years. In inflation-adjusted terms, OFAC’s budgetary resources increased by a total of 58 percent, from approximately $29.7 million in fiscal year 2014 to approximately $46.8 million in fiscal year 2019. (See fig. 1.) OFAC has also received authority to hire additional FTEs since fiscal year 2014, yet a number of the additional authorized positions have remained unfilled. According to OFAC officials, OFAC allocated most of its additional authorized FTEs to the Office of Global Targeting, which is responsible for conducting investigations of sanctions targets. At the start of fiscal year 2014, 10 of OFAC’s 173 authorized positions (6 percent) were unfilled. By the start of fiscal year 2020, 55 of OFAC’s 259 authorized positions (21 percent) were unfilled. In the intervening period, the gap between authorized and actual FTEs at the start of each fiscal year ranged from 34 to 58 positions (14 to 26 percent of authorized FTEs). (See fig. 2.) Despite the increase in authorized FTEs, OFAC has faced challenges in filling the additional positions. At the start of fiscal year 2020, 21 percent of OFAC’s authorized sanctions investigator positions (13 of 62) were not filled. Also unfilled were nine of 25 OFAC sanctions licensing officer positions, three of 18 enforcement officer positions, two of 15 sanctions policy analyst positions, and six of 14 sanctions compliance officer positions. Officials of both OFAC and Treasury’s Office of the Assistant Secretary for Management cited three primary challenges in hiring candidates with the necessary qualifications: Competition with other agencies, including those in the intelligence community, which can use direct-hire authority to expedite the hiring process Competition with the private sector, which offers higher salaries The time required for security clearance processing, which delays hiring for positions, such as sanctions investigators, who need a special sensitive investigation that must be adjudicated at the top secret/sensitive compartmented information levelTreasury does not currently have direct-hire authority for OFAC but can use other authorities to address hiring challenges. OFAC can use TFI’s agency-specific schedule A authority, which excepts up to 100 positions at TFI from competitive selection requirements; schedule A authority is not specific to OFAC. In August 2019, officials of Treasury’s Office of the Assistant Secretary for Management stated that the office was not seeking direct-hire authority through the Office of Personnel Management. Additionally, the officials noted that Treasury has used flexibilities such as veterans’ hiring preferences to fill positions. However, in December 2019, Treasury officials stated that they had determined to seek direct-hire authority and would support the passage of legislation providing such authority. SPI received annual budgetary resource increases in fiscal years 2015 through 2018, before a slight decline in fiscal year 2019. In inflation- adjusted terms, SPI budgetary resources increased overall by 42 percent, from $2.3 million in fiscal year 2014 to $3.2 million in fiscal year 2019. (See fig. 3.) SPI has received authority to hire six additional FTEs for fiscal year 2020, but more than half of its authorized positions were vacant at the start of the year. SPI’s authorized FTEs ranged from 13 to 16 in fiscal years 2014 to 2019 and increased to 21 FTEs for fiscal year 2020. At the start of each fiscal year from 2014 to 2019, SPI had one to three fewer actual FTEs than authorized. However, the increase in authorized FTEs for fiscal year 2020 followed a decline in the number of filled positions during fiscal year 2019, when SPI lost more than a third of its staff. As a result, as of the beginning of fiscal year 2020, more than half of SPI’s 21 authorized FTEs were unfilled. (See fig. 4.) According to SPI officials, the departures during fiscal year 2019 were for the most part unscheduled and resulted from staff promotions, moves to elsewhere in State, or resignations to accept positions in other agencies or the private sector. SPI officials added that a department-wide backlog in hiring constrained SPI’s ability to fill these gaps and that the office would have to pay for the additional six FTEs without an increased budget. As of December 2019, State was recruiting to fill some of these positions, according to SPI officials. SPI expected one staff member to start in early January, had extended an offer to another, and was advertising to fill four additional positions. While SPI has generally received increased budgetary resources and authorized FTEs in recent years, State discontinued the Office of the Coordinator for Sanctions Policy, formerly housed in the Office of the Secretary. The office was responsible for, among other things, coordinating sanctions strategies, integrating sanctions into foreign policy plans, and analyzing the effects of sanctions. According to data that State provided, the office had an authorized staff of seven FTEs at the start of each fiscal year from 2014 through 2018, with the exception of fiscal year 2016, when eight FTEs were authorized. State also reported that the office had one to four unfilled positions at the start of each fiscal year during this period. FPD received an overall increase in budgetary resources from fiscal year 2014 to fiscal year 2019, but most of the increase occurred from fiscal year 2014 to fiscal year 2015. Overall, FPD’s budgetary resources increased by 28 percent, adjusted for inflation, from fiscal year 2014 to fiscal year 2019. However, after a 24 percent increase in fiscal year 2015, resources remained steady through fiscal year 2019 at approximately $1.4 million per year, adjusted for inflation. (See fig. 5.) FPD has had the same number of authorized FTEs since fiscal year 2014, maintaining an authorized level of 10 FTEs from fiscal year 2014 to fiscal year 2020. FPD generally had one fewer actual FTE than authorized as of the beginning of each fiscal year. (See fig. 6). At the beginning of fiscal year 2020, according to Commerce officials, the Foreign Policy Division lacked funding to advertise and hire for the vacant position. According to Commerce officials, FPD receives a funding amount for personnel and the funding they have received is sufficient for nine FTEs. Officials at sanctions-focused units at Treasury, State, and Commerce all described their use of the annual budget process to assess their resource needs, and Treasury and Commerce have undertaken broader planning efforts. Treasury’s OFAC has begun an internal workforce planning process that, if implemented as described, would satisfy principles for strategic workforce planning that we have previously identified. According to State SPI officials, SPI assesses its resources in the annual budget formulation process and has been able to add temporary positions in response to workforce needs. Commerce BIS officials stated that they shift resources in response to needs, and BIS has previously prepared a budget strategy that included its office primarily responsible for sanctions implementation. Treasury, State, and Commerce all face challenges in measuring changes in their sanctions workload over time. Treasury’s OFAC reviews and requests resources as part of the annual TFI budget development process, which considers OFAC’s requests along with those of other TFI components. According to OFAC officials, OFAC submits its funding and resource needs to TFI for consideration. The OFAC budget justification for TFI includes the number of positions requested for all OFAC components as well as a description of each request. According to OFAC, once TFI has considered all of its component submissions, TFI submits its budget request to the Assistant Secretary for Management, who considers it as part of Treasury’s larger budget request. OFAC also stated that it has also used quarterly meetings and discussions as part of Treasury’s quarterly performance reviews to review resource needs and challenges. In addition to undertaking reviews as part of the budget process, OFAC launched a workforce planning effort in fiscal year 2019 and stated that it would be led by OFAC’s Office of Sanctions Support and Operations. As part of this effort, the Office of Sanctions Support and Operations stated that it plans to use Treasury’s department-wide workforce planning model and tools to gather information from OFAC’s component offices as a basis for, among other things, analyzing risks to OFAC’s mission, identifying resource gaps, and developing an action plan to address them. OFAC further stated that it plans to use its ongoing workforce planning model to assess the effectiveness of its current hiring authorities. In October 2019, OFAC officials stated that they expected to submit preliminary recommendations for each OFAC component to OFAC leadership by the end of December 2019. However, OFAC officials later stated that, because of the departure of the Assistant Director of Management Programs—the OFAC senior leader responsible for implementing the workforce planning initiative—on October 1, 2019, the planned date to submit preliminary recommendations to OFAC leadership was rescheduled to March 31, 2020. We analyzed the model and tools that OFAC is using for its ongoing resource analysis, to determine whether the process they set out would address five principles for strategic workforce planning that we had previously identified. We concluded that, if it were implemented as OFAC documents describe, the process would satisfy these principles. For example, the process calls for involving management and employees during its development and implementation and calls on managers to consider critical skills and competencies in their workforce analysis. State SPI requests resources as part of its annual budget process. State does not request a separate budget for SPI but instead combines SPI with the Office of Threat Finance Countermeasures (TFC) in its annual budget request. According to SPI officials, State sends the combined request for TFC and SPI to the Office of Management and Budget (OMB) every year, although the resources obtained may not reflect SPI’s original request. For example, SPI officials stated that SPI requested a greater increase in authorized positions for fiscal year 2020 than it ultimately received. SPI officials described ways that they assess staff workloads and seek to add or adjust resources on a continual basis. According to SPI officials, they have worked to fill positions on a temporary basis in response to rising needs. For example, SPI was authorized to add three temporary positions to cover the additional workload from Iran and Venezuela sanctions in early 2019. According to SPI officials, in justifying the request for additional temporary positions, SPI noted a significant increase in officer workload during the reimposition of sanctions against Iran, as well as maximum-pressure campaigns against Iran and Venezuela and increased activity related to existing and new sanctions authorities. As of October 2019, State planned to convert the three positions to permanent positions. Similarly, SPI officials stated that SPI justified its request for an increase in positions for fiscal year 2020 by noting an increasing use of sanctions as part of U.S. maximum economic pressure campaigns across multiple regions. Agency approaches to workforce planning can vary depending on each agency’s particular needs and mission. For subunits such as SPI, using the budget process, identifying changing priorities, and responding flexibly to those changes can address workforce planning needs. SPI officials further stated that SPI expects to review its workforce needs and structure if new executive orders delegate additional sanctions authorities to the Secretary of State. Commerce BIS units such as FPD assess and communicate their resource needs as part of the annual budget formulation process, according to BIS officials. BIS officials described budget formulation at Commerce as a “bottom-up” process, with BIS units providing information that is folded into Commerce’s overall budget. During this process, BIS budget office staff meet with program staff, review budget guidance provided by OMB as well as BIS’s own guidance, and ask program officials to identify any new initiatives or any new requirements for resources. According to BIS officials, each program office prepares a summary description of the request and needed resources for approval by the Assistant and Deputy Assistant Secretary for that office, the Deputy Under Secretary, and ultimately the BIS Under Secretary. According to BIS officials, BIS’s budget office then requests additional information about the approved activities. BIS’s Budget Office in turn submits the materials to the Commerce Departmental Budget Officer, who takes into account any known OMB and congressional viewpoints and department priorities. According to BIS officials, because of competing priorities, BIS funding priorities are not always carried over into the department’s overall request. BIS officials noted that, absent additional resources, they have some flexibility to shift personnel within the bureau to address periods of increased sanctions-related demand. For smaller units such as FPD, using the budget process, identifying changing priorities, and responding flexibly to those changes can address their workforce planning needs. Commerce previously prepared a multiyear budget strategy that assessed workforce needs throughout BIS, including FPD. In 2016, a contractor that Commerce hired prepared a Five-Year Budget Strategy Plan, which included workforce planning and projections. As part of the assessment, the plan analyzed BIS license volume and estimated the amount of time that staff in the BIS Export Administration’s Office of Nonproliferation and Treaty Compliance (which includes FPD) spent on particular tasks, such as conducting license application reviews, making license determinations, and developing regulations related to sanctioned countries. The plan projected future BIS license volume, external factors that would affect BIS workload, and the future FTEs that BIS would need to perform its mission. The plan examined the workload projection and the effect of attrition and concluded that FPD would need 0.5 additional FTEs by 2020 and 1.25 additional FTEs by 2022. BIS officials stated that they initially used the budget strategy plan to help with budgeting. However, according to the officials, the plan and its assumptions quickly became obsolete and they did not use it in subsequent years. In addition, BIS officials stated that the plan did not recognize BIS’s ability to shift resources or request appropriations as needed. Treasury, State, and Commerce units that focus primarily on sanctions implementation have information that can measure changes in agency workload over time; however, agency officials cited challenges in using this information as accurate measures of workload for the purpose of informing resource needs. For example, counting the number of individual actions taken to implement sanctions (e.g., designations, licenses, or the imposition of a penalty) does not capture the actions’ varying complexity or the time spent on developing potential actions that are ultimately not taken. Agency officials noted that, in general, the drivers of their workloads are global events and U.S. foreign policy priorities that may lead to more or less sanctions activity. Table 4 shows (1) selected information that can be used to measure changes in agency workload over time and (2) the potential weaknesses of these measures. OFAC and State each prepare and submit reports in response to the requirements of the IEEPA and the NEA. Both OFAC and State report sanctions implementation actions in response to the requirements of the IEEPA. OFAC’s NEA-mandated reports generally include information on expenditures reported by Treasury and State and by any other agencies identified in the relevant executive order. However, according to State’s most recent NEA reports, no specific State expenditures were directly attributable to the exercise of authorities conferred by the declaration of a national emergency under the NEA during the reporting period. In previous reviews, we and Treasury’s Office of Inspector General have found weaknesses in the consistency and timeliness of OFAC reports mandated by the Kingpin Act and the TSRA, respectively. Both OFAC and State include information on actions taken to implement sanctions programs in response to the requirements of the IEEPA. OFAC’s reports on sanctions programs under the IEEPA include data on the number of designations and the type of entity designated, the number of licensing actions, and the number and value of blocked transactions for sanctions programs authorized by the IEEPA. State’s IEEPA-mandated report for a weapons of mass destruction sanctions program (Executive Order 12938), prepared by State’s Bureau of International Security and Nonproliferation (ISN), summarizes the actions State has taken to address nonproliferation through bilateral and multilateral channels, including actions taken against Russia, North Korea, Syria, and the reimposition of nuclear-related sanctions on entities in Iran. Both OFAC and State included the reports responding to IEEPA requirements as part of the same document submitted in response to the NEA report requirements. OFAC’s reports on sanctions programs under the NEA include a summary total of expenditures reported by various agencies to implement those programs, as well as a listing of the agencies whose expenditures are included in the reports. The reports state that the expenditures included are predominantly personnel wage and salary costs. OFAC contacts multiple agencies to compile estimates of total expenditures for its NEA reports. According to OFAC officials, OFAC contacts an agency about its expenditures if the relevant executive orders have delegated sanctions implementation authority to the agency or tasked it with certain duties. Using a standardized request message, OFAC asks such agencies to estimate their expenditures for the national emergency by, for example, estimating the hours spent by staff members on activities related to the emergency and multiplying that number by appropriate hourly compensation rates. OFAC stated that it always asks State to provide estimated expenditure information and contacts other agencies to seek their expenditures on a program-by-program basis. OFAC’s NEA reports include Treasury and other agencies. All 25 of the NEA reports from mid- to late 2018 that we reviewed included Treasury expenditures, which were in many cases limited to OFAC and the Treasury Office of General Counsel. All but one report included State expenditures. Three reports included Commerce expenditures, five included Department of Homeland Security expenditures, and 12 included Department of Justice expenditures. While the reports did not include other agencies’ expenditures, some of the reports explicitly acknowledged that they did not reflect certain operating costs incurred by the intelligence and law enforcement communities. State ISN’s May 2019 NEA-mandated report for Executive Order 12938 stated that there were no specific expenditures directly attributable to the exercise of authorities conferred by the declaration of a national emergency under the NEA during the 6-month reporting period. The prior two reports also stated that there were no specific expenditures directly attributable to the sanctions program. The reports included no other information about the program expenditures. In response to our requests, State officials provided additional information about the NEA reporting of expenditures. According to the officials, State reported no expenditures for implementation activities for Executive Order 12938 because those activities have been subsumed into expenditures for normal, daily work—similar to overhead expenses. Expenditures for the implementation activities are mixed with, and indivisible from, the ongoing programming activities of the relevant offices and agencies. State officials indicated that State would report an amount other than zero if funds were reprogrammed, additional staff were required, or staff engaged in activities in addition to daily, normal work to implement the executive order. State officials also told us that they consulted State’s Bureau of Arms Control, Verification and Compliance, regional bureaus, and offices in the Departments of Commerce, Defense, and Energy in preparing the report. However, State’s reports have not included any of these additional statements about the information that State considered in concluding there were no specific expenditures attributable to the sanctions program. Standards for Internal Control in the Federal Government states that management should externally communicate the necessary quality information to achieve the entity’s objectives so that external parties can help the entity achieve its objectives and address related risks. Because State’s reports do not include the additional information that State considered, Congress lacks complete information regarding sanctions implementation expenditures. We have previously found that agencies do not report expenditures in response to OFAC’s Kingpin Act data requests in a consistent fashion. The Kingpin Act mandates that the President prepare a classified report to the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the Senate by July 1 of each year that, among other things, includes the status of sanctions imposed under the Kingpin Act and the personnel and resources directed to the imposition of Kingpin sanctions. OFAC compiles and submits these reports. OFAC’s Kingpin reports include previous year and cumulative data on the number of asset-blocking actions and Kingpin designations. The reports also include Treasury, State, DOD, and Justice expenditures, which the reports indicate are mostly personnel salary costs. However, we recently found that the agencies did not use consistent methods, across agencies and time, in providing their expenditures to OFAC for Kingpin Act program activities. We recommended that the Secretary of the Treasury (1) ensure that OFAC provide its partner agencies more specific guidance regarding Kingpin Act–related expenditure data to improve the consistency of data submitted by these agencies and (2) disclose information about limitations in the consistency and reliability of the agency expenditure data in its annual reports to Congress. Treasury OFAC and Commerce BIS each submit reports to Congress mandated by the TSRA. Treasury’s Inspector General found that OFAC had not submitted its reports in a timely fashion and recommended OFAC take steps to improve the timeliness of its submissions. OFAC. OFAC’s TSRA-mandated reports include information about its determinations regarding applications for licenses as well as the time it spent processing the applications. In April 2018, Treasury’s Office of Inspector General found that OFAC had not issued these reports in a timely manner and recommended that OFAC provide guidance to ensure that future TSRA-mandated reports are timely. According to the Treasury Office of Inspector General, Treasury’s actions in response—bringing its submission of the TSRA-mandated reports up to date and revising its TSRA report procedures—satisfied the intent of the office’s recommendation, but the Inspector General would continue to follow up. However, OFAC’s submission of the TSRA- mandated reports has continued to lag. OFAC released the TSRA- mandated reports for the second, third, and fourth quarters of fiscal year 2018 (i.e., January through September 2018) in November 2019; released the report for the first quarter of fiscal year 2019 in December 2019; and released the report for the second quarter of fiscal year 2019 in February 2020. OFAC’s most recent biennial report, for October 2014 through September 2016, was issued in August 2019. BIS. BIS’s TSRA-mandated reports include information about the licensing actions taken by BIS in relation to exports of agricultural commodities to Cuba, as well as processing times for those actions. BIS submitted its most recent report on January 17, 2020, covering the period from October 1 to December 31, 2019. BIS’s most recent biennial report, for October 2016 through September 2018, was issued in November 2018. The United States has increasingly relied on sanctions as a means to achieve important foreign policy goals. Implementing these sanctions involves multiple government agencies, some of which have multiple units with roles in sanctions implementation. Key agencies that implement sanctions have generally received steady or growing resources in recent years, but Treasury and State have staffing gaps and face challenges in securing the staff needed to fill their authorized positions. Treasury OFAC has an ongoing effort to assess its workforce needs, and Treasury, State, and Commerce all assess workforce needs through the budget process. The IEEPA and NEA each include requirements for reports to Congress that Congress can use to review the activities and expenditures that have been used for implementing these sanctions. However, State’s reports for Executive Order 12938 have not explained the information that State considered in reporting no expenditures. As a result, Congress does not have complete information about the data that State considers in calculating its sanctions implementation resources, which Congress could use to inform its review of agency resource requests. The Secretary of State should direct the Assistant Secretary for International Security and Nonproliferation to include additional information about the expenditures it considers in its NEA-mandated reporting for Executive Order 12938. We provided a draft of this report to the Departments of Commerce, Defense, Energy, Homeland Security, Justice, State, and the Treasury, as well as the Commodity Futures Trading Commission, Federal Deposit Insurance Corporation, Federal Reserve System, Internal Revenue Service, National Credit Union Administration, Office of the Comptroller of the Currency, and Securities and Exchange Commission for review and comment. State provided official comments, which are reproduced in appendix IV. State concurred with our recommendation and indicated that it will provide additional clarity on its procedures in future NEA-mandated reporting for Executive Order 12938. The Departments of Commerce, Homeland Security, Justice, State, and the Treasury, as well as the Internal Revenue Service, Office of the Comptroller of the Currency, and Securities and Exchange Commission also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees and to the Secretaries of Commerce, Defense, Energy, Homeland Security, Justice, State, and the Treasury, as well as the Chairman and Chief Executive of the Commodity Futures Trading Commission, Chairman of the Federal Deposit Insurance Corporation, Chair of the Board of Governors of the Federal Reserve System, Commissioner of the Internal Revenue Service, Chairman of the National Credit Union Administration, the Comptroller of the Currency, and the Chairman of the Securities and Exchange Commission. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612, or GianopoulosK@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Our objectives were to examine (1) agencies’ roles in sanctions implementation, (2) the resources available to agency units that focus primarily on sanctions implementation, (3) the extent to which agency units that primarily focus on sanctions implementation have assessed their resource needs, and (4) agencies’ reporting to Congress on sanctions implementation expenses and activities. To examine agencies’ roles in sanctions implementation, we identified agencies involved in sanctions implementation by reviewing sanctions authorities, including statutes and executive orders, and agency documents and websites and interviewing agency officials. We used these documents and interviews to summarize agencies’ principal roles in sanctions implementation, and we vetted this summary with the Departments of the Treasury (Treasury), State (State), and Commerce (Commerce), which we had identified through our initial interviews and review of background materials as having units that focus primarily on sanctions implementation. We then prepared a data collection instrument to obtain information on sanctions implementation from agencies across the government. Using this instrument, we requested information about the specific actions these agencies performed for each of the roles we identified, the number of staff they devoted to sanctions implementation, and the estimated percentage of time these staff spent on sanctions implementation in fiscal year 2019. We also requested information about the sources and methods that agencies or agency units used to produce these estimates. We pretested the instrument with the Office of the Comptroller of the Currency and the Department of Homeland Security’s U.S. Customs and Border Protection and made changes based on the results of the pretest before sending the instrument to all agencies or agency units that we had identified as having a role in sanctions implementation. To estimate in full-time equivalents (FTE) the staff resources that agencies devoted to sanctions implementation, we multiplied agencies’ estimates of the number of staff devoted to sanctions implementation by the agencies’ estimates of the percentage of time those staff spent on sanctions-related duties. To examine the resources available to agency units that focus primarily on sanctions implementation, we reviewed congressional budget justifications and used a data collection instrument to obtain information on (1) funding for units that focused primarily on sanctions implementation at Treasury, State, and Commerce in fiscal years 2014 through 2019 and (2) personnel in these units as of the beginning of fiscal years 2014 through 2020. We compared the information that agencies provided with data in their congressional budget justifications and determined that these data were sufficiently reliable for reporting on trends in funding, authorized FTEs, and filled positions at these agency units. We then examined challenges associated with hiring for, and filling, positions at these agency units by interviewing agency officials and reviewing agencies’ responses to our written questions. To examine the extent to which agency units that primarily focus on sanctions implementation have assessed their resource needs, we interviewed agency officials and reviewed their written responses to our questions about their budget development processes and any relevant workforce analyses and plans they had prepared. We reviewed documentation of Treasury’s ongoing workforce planning process against criteria for strategic workforce planning that we had previously identified, to assess whether the process, if completed according to plan, would address principles of strategic workforce planning that we had previously identified. We reviewed agency performance reports and annual reports and interviewed agency officials representing Treasury, State, and Commerce units that focus primarily on sanctions implementation, to identify any additional information the agencies had that could measure changes in agency workload over time. We then reviewed that information and interviewed agency officials to assess how accurately the measures reflected each agency’s sanctions workload. To examine agency reporting to Congress on sanctions implementation expenses and activities, we reviewed background information on sanctions implementation to identify mandated reports that included information on sanctions expenses and activities. We confirmed our list of the mandated reports that included sanctions expenses and activities with Treasury’s Office of Foreign Assets Control. We also reviewed sanctions legislation such as the International Emergency Economic Powers Act, the National Emergencies Act, the Foreign Narcotics Kingpin Designation Act and the Trade Sanctions Reform and Export Enhancement Act of 2000 to identify the specific requirements for those mandated reports on agency expenses and activities. We then requested from agency officials copies of the agencies’ most recently submitted mandated reports as of January 2019 and analyzed the agencies and types of expenses the reports identified. We requested information from agency officials and reviewed supporting documentation in order to describe how agencies estimated their expenses for sanctions implementation. We conducted this performance audit from October 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To determine agencies’ roles in sanctions implementation, we sent a data collection instrument to all agency units that we had identified as having a role in sanctions implementation, requesting information on the specific actions the agency units perform for each role. Tables 5 through 12 summarize the information provided in the agency units’ responses to the data collection instrument. We identified units of 13 agencies that have a role in sanctions implementation, and we requested that each unit report the number of personnel with sanctions-related duties and the estimated percentage of time these personnel spent on such duties in fiscal year 2019. The agency units used various methods to generate their estimates. Several of the units were unable to estimate numbers of personnel with sanctions- related duties or the percentage of time these personnel spent on sanctions-related duties. In many cases, agency units were unable to disaggregate the relatively minimal resources devoted to sanctions implementation from the resources for wider duties related to their mission. The following provides information about each agency or agency unit. Department of State (State). All nine units that State identified as having a role in sanctions implementation were able to estimate the number of personnel with sanctions implementation duties in fiscal year 2019. The units used sources such as position descriptions and management surveys of staff to generate the estimates. Department of the Treasury (Treasury). Of the seven Treasury units from which we received information, five were able to estimate the number of personnel with sanctions implementation duties in fiscal year 2019. Officials of the sixth unit stated that they could not provide such an estimate. The seventh unit, the Office of Intelligence and Analysis of the Office of Terrorism and Financial Intelligence (TFI), provided an estimate of the percentage of time its analytic staff devoted to sanctions but, because of sensitivity concerns, did not provide estimates of the number of personnel with sanctions implementation duties. Department of Commerce (Commerce). Of the six Commerce units from which we received information, five were able to estimate the number of personnel with sanctions implementation duties in fiscal year 2019. However, Export Enforcement, a much larger BIS unit with over 170 employees, was not able to disaggregate the time its personnel spent on sanctions implementation from its broader export control enforcement activities. According to Export Enforcement officials, its investigative management system does not record whether its activities respond to potential violations of Office of Foreign Assets Control (OFAC) sanctions or violations of the Export Administration Regulations. Many of the cases that the office investigates include potential violations of both sanctions and the regulations. Department of Defense. The Department of Defense’s Office of the Under Secretary of Defense for Policy, which includes the Defense Technology Security Administration, was able to estimate the number of personnel with sanctions implementation duties. To generate the estimates, the office used sources including position descriptions and management judgement of time spent by individual action officers on sanctions. Department of Energy. The Department of Energy’s National Nuclear Security Administration relied on management judgment to estimate the number of personnel with sanctions duties. Department of Homeland Security. At the Department of Homeland Security, units in U.S. Immigration and Customs Enforcement were able to estimate the number of personnel with sanctions implementation duties in fiscal year 2019 by analyzing their investigative case management database. However, other department units were unable to provide such estimates. For example, Coast Guard officials reported that it would be difficult to estimate the number of personnel with sanctions implementation duties because these personnel are located throughout the United States and the world and do not record the time they spend on sanctions. Department of Justice. At the Department of Justice, the National Security Division and most sections of the Criminal Division were able to estimate the number of personnel with sanctions implementation duties in fiscal year 2019. However, other department units were unable to provide such estimates. For example, Drug Enforcement Administration (DEA) officials stated that it is difficult to quantify the time that DEA’s special agents dedicate specifically to sanctions. According to agency officials, investigations and operations to secure evidence for indictments can also be used to support sanctions designations. As a result, according to DEA, the agents spend minimal time on sanctions implementation that they would not have spent on their work in any case. The Federal Bureau of Investigation noted the same justification for why the bureau was unable to provide estimates of the number of personnel with sanctions-related duties. Financial regulatory agencies. The six financial regulatory agencies identified as having a role in sanctions implementation were unable to estimate numbers of personnel with sanctions implementation duties. Financial regulators were generally unable to disaggregate the time that personnel spent on OFAC compliance examinations because these are often performed concurrently with broader Bank Secrecy Act/Anti–Money Laundering examinations. See table 13 for additional information about each agency unit. In addition to the contact named above, Drew Lindsey (Assistant Director), Michael Simon (Analyst-in-Charge), Neil Doherty, Justin Fisher, Reid Lowe, Grace Lui, Christina Pineda, Julia Robertson, and Paul Sturm made key contributions to this report.", "summary": "The United States has implemented dozens of sanctions programs to counteract activities that threaten U.S. national interests. Sanctions may place restrictions on entire countries, sectors of countries' economies, or specific corporations or individuals. Examples of restrictions include limiting access to the U.S. financial system, freezing assets under U.S. jurisdiction, and restricting trade. The United States has implemented an increasing number of sanctions in recent years, including sanctions on countries that conduct a significant amount of international trade, such as Russia, Venezuela, and Iran. GAO was asked to examine the resources U.S. agencies have devoted to sanctions implementation. This report examines (1) agencies' roles in sanctions implementation, (2) resources available to agency units that focus primarily on sanctions implementation, (3) the extent to which agency units that focus primarily on sanctions implementation have assessed their resource needs, and (4) agencies' reporting to Congress on sanctions implementation expenses and activities. GAO gathered data from 13 agencies and their sub-units to identify their roles and the personnel they used for sanctions implementation. GAO also reviewed agency reporting, planning, and budget documents and interviewed agency officials. Agencies may have one or more roles in sanctions implementation—for example, developing policy and investigating, enforcing, and prosecuting violations. The Departments of the Treasury, State, and Commerce each have a unit focused primarily on sanctions—Treasury's Office of Foreign Assets Control (OFAC), State's Office of Economic Sanctions Policy and Implementation (SPI), and Commerce's Bureau of Industry and Security's (BIS) Foreign Policy Division (FPD). GAO identified 10 other agencies with roles in sanctions implementation. OFAC, SPI, and FPD generally received steady or growing resources in recent years, but OFAC and SPI face hiring challenges. In fiscal years 2014 to 2019, OFAC received a 58 percent budget increase and additional hiring authority, but vacancies ranged from 6 to 26 percent of its authorized full time equivalents (FTEs). OFAC attributed its hiring challenges to competition from other agencies and the private sector and the time needed for security clearances. State SPI received authority to hire six additional FTEs in fiscal year 2020, for a total of 21, but more than half of its authorized positions were vacant at the start of the fiscal year. FPD lacks funding to fill one of its 10 authorized positions. OFAC, SPI, and FPD all consider resource needs as part of annual budget processes, and OFAC has an ongoing process to assess its workforce needs. OFAC began its workforce planning process in fiscal year 2019 and expects to make preliminary recommendations in March 2020. According to SPI officials, SPI cited the increasing use of sanctions across multiple regions in justifying its request for additional fiscal year 2020 positions. BIS prepared a 2016 plan that assessed its workforce, including FPD, but stated that it no longer uses the plan. Agencies provide information on selected sanctions expenses and activities in mandated reports. Treasury's reports on 25 sanctions programs include expenses for Treasury, State, and other agencies if relevant executive orders identify them. State reported activities for a weapons of mass destruction sanctions program but also reported no specific expenditures for the program. State reviewed program information to prepare the reports, but the reports do not describe what it considered, limiting information available to Congress. GAO recommends that State include additional information about the expenditures it considers in its reporting for the Proliferation of Weapons of Mass Destruction sanctions program. State concurred with the recommendation.", "document_type": "gao"}
{"report": "To help manage its multi-billion dollar acquisition investments, DHS has established policies and processes for acquisition management, requirements development, test and evaluation, and resource allocation. The department uses these policies and processes to deliver systems that are intended to close critical capability gaps, helping enable DHS to execute its missions and achieve its goals. DHS policies and processes for managing its major acquisition programs are primarily set forth in its Acquisition Management Directive 102-01 and Acquisition Management Instruction 102-01-001. DHS issued the initial version of this directive in November 2008 in an effort to establish an acquisition management system that effectively provides required capability to operators in support of the department’s missions. DHS has issued multiple updates to its acquisition management directive and instruction, in part to be responsive to GAO’s recommendations. DHS issued the current version of the directive in February 2019 and the current version of the instruction in May 2019; however, we did not assess programs against these updates because the programs in our review established initial baselines prior to the approval of the directive and instruction. DHS’s Under Secretary for Management is currently designated as the department’s Chief Acquisition Officer and, as such, is responsible for managing the implementation of the department’s acquisition policies. DHS’s Under Secretary for Management serves as the acquisition decision authority for the department’s largest acquisition programs, those with LCCEs of $1 billion or greater. Component Acquisition Executives—the most senior acquisition management officials within each of DHS’s components—may be delegated acquisition decision authority for programs with cost estimates between $300 million and less than $1 billion. Table 1 identifies how DHS has categorized the 29 major acquisition programs we reviewed in this report, and table 8 in appendix II specifically identifies the programs within each level. DHS acquisition management policy establishes that a major acquisition program’s decision authority shall review the program at a series of predetermined acquisition decision events (ADE) to assess whether the major program is ready to proceed through the acquisition life cycle phases. Depending on the program, these events can occur within months of each other or be spread over several years. Figure 1 depicts the acquisition life cycle in the March 2016 version of DHS acquisition management policy. An important aspect of an ADE is the decision authority’s review and approval of key acquisition documents. See table 2 for a description of the type of key acquisition documents identified in the March 2016 acquisition management directive and instruction that required department-level approval before a program moves to the next acquisition phase. DHS acquisition management policy establishes that the APB is the agreement between program, component, and department-level officials establishing how systems being acquired will perform, when they will be delivered, and what they will cost. Specifically, the APB establishes a program’s schedule, costs, and key performance parameters. DHS defines key performance parameters as a program’s most important and non-negotiable requirements that a system must meet to fulfill its fundamental purpose. For example, a key performance parameter for an aircraft may be airspeed and a key performance parameter for a surveillance system may be detection range. The APB establishes objective (target) and threshold (maximum acceptable for cost, latest acceptable for schedule, and minimum acceptable for performance) baselines. According to DHS policy, if a program fails to meet any schedule, cost, or performance threshold approved in the APB, it is considered to be in breach. Programs in breach are required to notify their acquisition decision authority and develop a remediation plan that outlines a timeframe for the program to return to its APB parameters, re-baseline—that is, establish new schedule, cost, or performance goals—or have a DHS-led program review that results in recommendations for a revised baseline. In addition to the acquisition decision authority, other bodies and senior officials support DHS’s acquisition management function: The Acquisition Review Board reviews major acquisition programs for proper management, oversight, accountability, and alignment with the department’s strategic functions at ADEs and other meetings as needed. The board is chaired by the acquisition decision authority or a designee and consists of individuals who manage DHS’s mission objectives, resources, and contracts. The Office of Program Accountability and Risk Management (PARM) is responsible for DHS’s overall acquisition governance process, supports the Acquisition Review Board, and reports directly to the Under Secretary for Management. PARM develops and updates program management policies and practices, reviews major programs, provides guidance for workforce planning activities, provides support to program managers, and collects program performance data. Components, such as U.S. Customs and Border Protection, the Transportation Security Administration, and the U.S. Coast Guard sponsor specific acquisition programs. The head of each component is responsible for oversight of major acquisition programs once the programs complete delivery of all planned capabilities to end users. Component Acquisition Executives within the components are responsible for overseeing the execution of their respective portfolios. Program management offices, also within the components, are responsible for planning and executing DHS’s individual programs. They are expected to do so within the cost, schedule, and performance parameters established in their APBs. If they cannot do so, programs are considered to be in breach and must take specific steps, as noted above. Figure 2 depicts the relationship between acquisition managers at the department, component, and program level. In 2016, we found that DHS had not effectively implemented or adhered to its review process for major acquisitions and recommended that DHS reinstate the Joint Requirements Council (JRC) to review and approve acquisition requirements and assess potential duplication of effort across the department. DHS established a JRC to develop and lead a component-driven joint requirements process for the department. In March 2016, DHS revised its policy instruction to reflect the addition of the JRC as an acquisition oversight body. Among other responsibilities, the JRC is to provide requirements-related advice and validate key acquisition documentation to prioritize requirements and inform DHS investment decisions among its components. The JRC chair is a member of the Acquisition Review Board and advises the board on capability gaps, needs, and requirements at key milestones in the acquisition life cycle. In March 2019, we reported that the JRC could better fulfill its mission by identifying overlapping or common requirements, and by making recommendations to senior leadership to inform budget decisions and help ensure that DHS uses its finite investment resources wisely. We will continue to monitor the JRC’s efforts through GAO’s high risk work. In May 2009, DHS established policies that describe processes for testing the capabilities delivered by the department’s major acquisition programs. The primary purpose of test and evaluation is to provide timely, accurate information to managers, decision makers, and other stakeholders to reduce programmatic, financial, schedule, and performance risks. We provide an overview of each of the 29 programs’ test activities in the individual program assessments presented in appendix I. DHS testing policy assigns specific responsibilities to particular individuals and entities throughout the department: Program managers have overall responsibility for planning and executing their programs’ testing strategies, including scheduling and funding test activities and delivering systems for testing. They are also responsible for controlling developmental testing, which is used to assist in the development and maturation of products, manufacturing, or support processes. Developmental testing includes engineering- type tests used to verify that design risks are minimized, substantiate achievement of contract technical performance, and certify readiness for operational testing. Operational test agents are responsible for planning, conducting, and reporting on operational test and evaluation to identify whether a system can meet its key performance parameters and provide an evaluation of the operational effectiveness, suitability, and cybersecurity of a system in a realistic environment. Operational effectiveness refers to the overall ability of a system to provide a desired capability when used by representative personnel. Operational suitability refers to the degree to which a system can be placed into field use and sustained satisfactorily. Operational cybersecurity refers to the degree to which a system is able to accomplish its mission in a cyber-contested environment. The operational test agents may be organic to the component, another government agency, or a contractor, but must be independent of the developer to present credible, objective, and unbiased conclusions. The Director, Office of Test and Evaluation is responsible for approving major acquisition programs’ operational test agent and test and evaluation master plans, among other things. A program’s test and evaluation master plan must describe the developmental and operational testing needed to determine technical performance and operational effectiveness, suitability, and cybersecurity. As appropriate, the Director is also responsible for observing operational tests, reviewing operational test agents’ reports, and assessing the reports. Prior to a program’s ADE 3, the Director provides the program’s acquisition decision authority a letter of assessment that includes an appraisal of the program’s operational test, a concurrence or non-concurrence with the operational test agent’s evaluation, and any further independent analysis. As an acquisition program proceeds through its life cycle, the testing emphasis moves gradually from developmental testing to operational testing. See figure 3. DHS has established a planning, programming, budgeting, and execution process to allocate resources to acquisition programs and other entities throughout the department. DHS uses this process to produce the department’s annual budget request and multi-year funding plans presented in the FYHSP report, a database that contains, among other things, 5-year funding plans for DHS’s major acquisition programs. According to DHS guidance, the 5-year plans should allow the department to achieve its goals more efficiently than an incremental approach based on 1-year plans. DHS guidance also states that the FYHSP articulates how the department will achieve its strategic goals within fiscal constraints. At the outset of the annual resource allocation process, the department’s Office of Strategy, Policy, and Plans and Office of the Chief Financial Officer provide planning and fiscal guidance, respectively, to the department’s components. In accordance with this guidance, the components should submit 5-year funding plans to the Chief Financial Officer. These plans are subsequently reviewed by DHS’s senior leaders, including the DHS Secretary and Deputy Secretary. DHS’s senior leaders are expected to modify the plans in accordance with their priorities and assessments, and they document their decisions in formal resource allocation decision memorandums. DHS submits the revised funding plans to the Office of Management and Budget, which uses them to inform the President’s annual budget request—a document sent to Congress requesting new budget authority for federal programs, among other things. In some cases, the funding appropriated to certain accounts in a given fiscal year remains available for obligation and can be carried over to subsequent fiscal years. Figure 4 depicts DHS’s annual resource allocation process. Federal law requires DHS to submit an annual FYHSP report to Congress at or about the same time as the President’s budget request. Two offices within DHS’s Office of the Chief Financial Officer support the annual resource allocation process: The Office of Program Analysis and Evaluation (PA&E) is responsible for establishing policies for the annual resource allocation process and overseeing the development of the FYHSP. In this role, PA&E develops the Chief Financial Officer’s planning and fiscal guidance, reviews the components’ 5-year funding plans, advises DHS’s senior leaders on resource allocation issues, maintains the FYHSP database, and submits the annual FYHSP report to Congress. The Cost Analysis Division is responsible for reviewing, analyzing, and evaluating acquisition programs’ LCCEs to ensure the cost of DHS programs are presented accurately and completely, in support of resource requests. This division also supports affordability assessments of the department’s budget, in coordination with PA&E, and develops independent cost analyses for major acquisition programs and independent cost estimates upon request by DHS’s Under Secretary for Management or Chief Financial Officer. Of the 27 programs we assessed with approved APBs, 25 are on track to meet their current schedule and cost goals as of August 2019. Of these 25 programs, 11 programs revised their schedule and cost goals in response to a prior breach of their APBs or to incorporate program changes. Of the 27 programs, two programs breached their schedule or cost goals between January 2018 and August 2019, and as of August 2019 had not yet re-baselined. This shows improvement from our prior review where seven programs were in breach. In addition, some programs, although currently on track to meet their goals, are nonetheless facing risks of breaching schedule or cost goals, or have plans to revise their baseline in the future. Further, as a result of the fiscal year 2019 partial government shutdown, five programs received approval for schedule adjustments, and other programs reported difficulty obligating funds before the end of the fiscal year. Finally, our analysis showed that seven programs are projected to experience an acquisition funding gap in fiscal year 2020, but, according to program officials, these gaps will be mitigated. We also reviewed two programs that were early in the acquisition process and planned to establish department-approved schedule and cost goals during our review. However, these programs were delayed in getting department approval for their initial APBs for various reasons; therefore, we excluded them from our assessment of whether programs were on track to meet schedule and cost goals. We plan to assess these programs in our future reviews; however, we provide more details on these two programs in the individual assessments in appendix I. Table 3 summarizes our findings regarding the status of major acquisition programs meeting their schedule and cost goals, and we present more detailed information after the table. We found that 25 of 27 programs we reviewed with department-approved APBs were on track to meet their current baseline schedule and cost goals as of August 2019. Of these, 11 programs met schedule and cost goals established prior to December 2017. Six of these programs are in the process of revising their baselines or plan to revise their baselines in the near future to account for program changes or to add capabilities. For example, the U.S. Coast Guard’s Fast Response Cutter and National Security Cutter programs plan to revise their baselines because they received additional funding to procure more cutters than reflected in their current baselines. Program officials said these programs are planning to update their APBs in fiscal year 2020 to reflect these changes. In addition, as shown in table 3, five of the 25 programs that met schedule and cost goals had only recently established initial APBs (between January 2018 and August 2019). Three of these five—Customs and Border Protection’s Biometric Entry-Exit program and Border Wall System Program, and the U.S. Coast Guard’s Polar Security Cutter—are new Level 1 major acquisition programs and as of August 2019 their combined life cycle costs were approximately $15 billion. In addition, DHS recently approved baselines for two Transportation Security Administration programs—Advanced Technology and Credential Authentication Technology. These programs were previously projects under the Passenger Screening Program, but according to Transportation Security Administration officials, transitioned into standalone programs to better align program office staffing to capabilities and focus on mitigating capability gaps, among other things. Eleven of the 25 programs that we found to be on track to meet current schedule and cost goals revised schedule and cost goals between January 2018 and August 2019. DHS leadership approved revised baselines for these programs for two primary reasons: to remove the program from breach status or to account for program changes, or both. Five of the 11 programs that revised their baselines did so in response to a breach of their cost or schedule goals and were subsequently removed from breach status. See table 4. DHS leadership approved revised baselines for these five programs following various actions by the program offices such as: Customs and Border Protection’s Automated Commercial Environment breached its cost and schedule goals in April 2017, which Customs and Border Protection officials attribute to an underestimation of the level of effort needed to complete development. The program revised its approach to developing remaining functionality by removing some capability from the program’s baseline and delaying development until funding is provided. As shown in table 4, the full operational capability date was delayed. The program’s total life-cycle cost increase is primarily attributed to a change in how threshold cost goals were calculated. Customs and Border Protection’s Medium Lift Helicopter re- baselined following a schedule breach of its ADE 3, among other things. As part of the re-baselining efforts, the program revised its cost goals to remove personnel costs and update the aircraft operational hours, among other things, which then resulted in a cost decrease of $515 million. Officials reported that the effect of the breach on the program’s schedule was minimal because the program was able to make adjustments to its testing schedule to assess multiple aircraft concurrently. DHS Management Directorate’s Homeland Advanced Recognition Technology re-baselined following multiple delays in awarding contracts and issues stemming from a subsequent bid protest. The re-baseline included a cost goal decrease resulting from an enhanced solution for biometric data storage. U.S. Coast Guard’s H-65 Conversion - Sustainment Program re- baselined to address delays which USCG officials primarily attributed to underestimating the technical effort necessary to meet requirements. As part of the re-baseline, the program also added a service life extension program to extend aircraft service life by replacing obsolete components. The program’s total life-cycle cost threshold decreased by approximately $200 million from its prior APB. Coast Guard officials attribute the decrease to the program’s ability to reduce labor costs, among other things, by synchronizing the service life extension program with other aircraft upgrades. U.S. Citizenship and Immigration Services’ Transformation program re-baselined in June 2018—lifting a strategic pause that limited new program development for 18 months. The program’s revised APB reflects a re-organization of the Transformation program as well as a new development strategy. The program breached its schedule in September 2016 when it failed to upgrade U.S. Citizenship and Immigration Services’ application processing information system to include applications for naturalization. In addition, between January 2018 and August 2019, DHS leadership approved revisions to six programs’ baselines that were not prompted by a breach. These programs either planned to revise their baselines to incorporate changes in technology, among other things, or to make changes to their scope. Customs and Border Protection’s Biometric Entry-Exit program revised its schedule goals in March 2019—after establishing an initial baseline in May 2018—to remove ADE 2C, the decision event when low-rate initial production is typically approved. Customs and Border Protection’s Border Wall System Program revised its baseline in August 2018 to replace sections of the border wall system in the San Diego sector. In addition, in May 2019 the program received approval for an additional baseline to extend the border wall system in the Rio Grande Valley sector. Customs and Border Protection’s Multi-role Enforcement Aircraft revised its baseline to increase the program’s quantity from 16 to 29 aircraft. The 16 aircraft from the prior APB provided maritime interdiction capabilities. The additional 13 aircraft are for air interdiction capabilities. Cybersecurity and Infrastructure Security Agency’s National Cybersecurity Protection System Program revised its baseline in January 2018 to inform ADEs for the program’s information sharing and intrusion-prevention capabilities and to account for schedule and cost changes after bid protests. However, the program updated its APB again in October 2018 to address an error found in the LCCE. Specifically, the LCCE that provided the basis for the program’s APB cost goals did not accurately account for the program’s sunk costs. In addition, the program added an additional 2 years of costs to its LCCE and revised its approach to estimating threshold costs. Once revised, the program’s total life-cycle cost threshold increased by more than $1.7 billion (41 percent) from the program’s January 2018 APB. The program’s full operational capability date was extended by two years to March 2021. Cybersecurity and Infrastructure Security Agency’s Next Generation Networks Priority Services revised its baseline in April 2018 to add capability to provide priority access for landline telephone calls to select government officials during emergencies. As a result, the program’s full operational capability date was extended by 3 years—to December 2025—and total acquisition costs increased by $68 million (10 percent). Transportation Security Administration’s Technology Infrastructure Modernization program revised its baseline in July 2019 to de-scope the program and narrow the definition of full operational capability. DHS leadership reported that by the time the program had delivered functions needed to meet the needs of end users, the Transportation Security Administration had updated and improved its legacy systems. As a result, costs decreased by $15 million (1 percent) and the program achieved full operational capability 3 years earlier than previously planned. Between January 2018 and August 2019, two programs breached their schedule or cost goals—down from seven programs in our previous assessment. As of August 2019, neither of these programs had revised their baselines. Customs and Border Protection’s Integrated Fixed Towers program declared a schedule breach of the program’s baseline in February 2019 as a result of delays in negotiations with the Tohono O’odham Nation—a sovereign Native American Nation—regarding access to tribal lands to construct towers and deploy systems. Customs and Border Protection subsequently reached an agreement with the Nation in March 2019. As of September 2019, the program was in the process of revising its APB to adjust deployments within the Nation’s land. Program officials anticipate the program’s full operational capability date will slip from September 2020 to March 2021 as a result of these actions. Transportation Security Administration’s Electronic Baggage Screening Program updated its LCCE in August 2019 which exceeds its baseline operations and maintenance (O&M) cost threshold. Transportation Security Administration officials attribute the program’s cost breach to an increase in maintenance costs related to sustaining screening technologies longer than initially planned. As of September 2019, the program’s revised APB, which TSA officials said will address the O&M cost increase, had not yet been approved. In addition, some of the programs on track as of August 2019 are facing risks that might lead to schedule slips or cost growth in the future. For example, U.S. Coast Guard’s Offshore Patrol Cutter may experience cost increases and schedule slips in the future. Specifically, the program’s shipbuilder reported damages from Hurricane Michael in October 2018 that have resulted in a long-term degradation of its ability to produce the Offshore Patrol Cutters at the previously estimated cost and schedule. As of August 2019, the Coast Guard was still assessing the shipbuilder’s report on the damage sustained and the potential effect on the Offshore Patrol Cutter program. U.S. Coast Guard’s Polar Security Cutter met established cost and schedule milestones between January 2018 and August 2019, but program officials stated that they anticipate a schedule slip because delivery of the lead ship in the awarded contract is two months after the program’s APB threshold date. We previously found that the program is at risk of experiencing future schedule delays and cost growth. The program’s schedule is driven by the need to address a potential gap in icebreaking capabilities once the Coast Guard’s only operational heavy polar icebreaker reaches the end of its service life as early as 2023. As a result, planned delivery dates are not informed by a realistic assessment of shipbuilding activities. We also found that the program is at risk of costing more than estimated because its LCCE—while adhering to most cost estimating best practices—is not fully reliable as it did not quantify the range of possible costs over the entire life of the program. Customs and Border Protection’s Biometric Entry-Exit program plans to re-baseline and achieve ADE 3—which will authorize full-rate production—in September 2019. However, program officials stated that not all testing will be completed to inform the ADE 3. As a result, DHS leadership will not have data related to the Biometric Entry-Exit system’s resiliency to cyberattacks before making this decision. We provide more information in the individual program assessments in appendix I, and we will continue to monitor these programs in future assessments. Due to a lapse in appropriations for fiscal year 2019, the federal government partially shut down from December 22, 2018, to January 25, 2019. Most Level 1 and Level 2 acquisition program staff were furloughed during the partial government shutdown, which affected the execution of these programs. As a result, in March 2019, DHS’s Under Secretary for Management, in coordination with PARM, authorized Component Acquisition Executives to request up to a 3-month extension for any program schedule milestone date, and inform PARM of any proposed changes in writing. PARM officials stated that they developed this process to mitigate program schedule risks since the government shutdown was beyond the control of program officials. Five programs requested and received approval from DHS leadership to extend schedule milestones by 3 months. Of these, three programs reported that the 3month extension will allow the programs to stay on track to meet their adjusted milestones—Federal Emergency Management Agency’s Logistics Supply Chain Management System, Customs and Border Protection’s Biometric Entry-Exit, and U.S. Coast Guard’s Medium Range Surveillance Aircraft programs. However, Coast Guard officials stated that the Offshore Patrol Cutter program requested approval to extend the program’s ADE 2C milestone to enable Coast Guard officials time to assess the shipbuilder’s report on damage caused by Hurricane Michael before determining the next steps for the program. The Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation program received approval to extend two schedule milestones—initial operational capability for two segments of the program—because the program experienced delays as a result of the partial government shutdown. In addition, DHS leadership previously directed the program to conduct an ADE 2B for a new segment by March 2019. The ADE 2B has been delayed 9 months to December 2019 to allow the program additional time to complete required acquisition documentation to inform the ADE. Programs also reported experiencing other effects of the partial government shutdown. Specifically, officials from several programs identified challenges in obligating funds by the end of the fiscal year due to the truncated timeframe. For example, Transportation Security Administration’s Electronic Baggage Screening Program officials reported that as a result of the partial government shutdown, contract awards had been delayed. These officials explained that contracting obligation activities from the component were compressed into the last two quarters of fiscal year 2019 and the program had to compete for contracting officer resources within the limited timeframe. Based on the information presented in the 2020-2024 FYHSP report to Congress, DHS’s acquisition portfolio is not affordable over the next 5 years, meaning that the anticipated funding will not be adequate to support the programs. But our analysis found the reported acquisition funding gaps may be overstated when additional information is taken into account. For example, the fiscal year 2020-2024 FYHSP report contained acquisition affordability tables for 21 of the 27 programs we assessed that have approved APBs. Of the 21 programs included in the FYHSP report, 11 were projected to have an acquisition affordability gap in fiscal year 2020. However, some of the cost information used to develop these projections was outdated since the FYHSP report—which was issued in August 2019—relied on cost estimates developed in April 2018. Therefore, we updated the analysis using the programs’ current LCCEs based on the approved scope of the program, as of August 2019 (as presented in the individual assessments in appendix I). In addition, we discussed funding gaps with program officials to determine additional funding sources, such as fees collected, funding from previous fiscal years that remained available for obligation—known as carryover funding, funds provided by components, or funding received above what was originally requested. Based on our analysis, we found that seven programs may have acquisition funding gaps in fiscal year 2020 rather than the 11 identified in the FYHSP report. However, the affordability gap for all seven programs we identified may be overstated because program officials reported that these programs either had carryover funding, received funding above what was requested, or anticipate receiving funding from the component to mitigate the affordability gap, as shown in table 5. Further, officials from several programs in our review told us that the programs were projected to experience a funding gap that could cause future program execution challenges, such as cost growth, or that programs were taking steps to mitigate funding gaps. For example, Customs and Border Protection’s Biometric Entry-Exit program—which is primarily fee-funded—conducted an affordability analysis that showed projected fees had declined. To mitigate risks of a potential affordability gap, program officials stated the number of officers to conduct enforcement activities at airport departure gates was reduced and the program is working with the component to identify other sources of funding. In addition, DHS Management Directorate’s Homeland Advanced Recognition Technology program reported that the program will use carryover funding to address the program’s affordability gap in fiscal year 2020. However, the program will also need to defer development of some additional capabilities to 2021 to remain affordable. In addition, officials from Customs and Border Protection’s Border Wall System Program stated the program is mitigating future acquisition funding gaps, in part by not developing its baseline until after funding amounts are determined. According to officials, this was necessary to mitigate program risks due to uncertainty in funding; however, through DHS’s resource allocation process, the program has requested $5 billion each year from fiscal year 2020 to fiscal year 2024. We elaborate on programs’ affordability over the next 5 years in the individual program assessments in appendix I. Traceability, which DHS policy and acquisition best practices call for, helps ensure that program goals are aligned with program execution plans, and that a program’s various stakeholders have an accurate and consistent understanding of those plans and goals. We found that the cost and performance goals in the acquisition programs’ approved APBs generally traced to the estimated costs identified in LCCEs and key performance parameters identified in operational requirements documents. That is, information in the APB matched the document required to be used as the basis for the baselines. In contrast, the schedule goals in the approved APBs generally did not trace to the Integrated Master Schedule (IMS), as required by the DHS acquisition management instruction and as a best practice identified in GAO’s Schedule Assessment Guide. Similarly, we found the required basis for the cost and performance goals is consistently identified in DHS acquisition management policy and guidance, whereas the basis for the schedule goals is not. We found that cost and performance goals in approved APBs generally traced to estimated costs in LCCEs and key performance parameters in operational requirements documents. However, schedule goals were generally not traceable to the IMSs, as required by DHS acquisition management instruction and as identified as a best practice in GAO’s Schedule Assessment Guide. Of the 27 programs we assessed with established baselines, 21 established or revised their APBs after DHS updated its acquisition management instruction in March 2016, which was the most current version of the guidance when we initiated our review. Table 6 shows the results of our analysis for the traceability of baselines to cost, schedule, and performance documents for those 21 programs. As shown in table 6, the APB goals traced to the key performance parameters in the operational requirements documents for all 21 programs that we reviewed. Generally, the APB goals traced to the costs in the LCCEs, though we found that three programs were not traceable. For example: The APB total life-cycle cost goals for Custom and Border Protection’s Tactical Communications Modernization program traced to the program’s LCCE, but the separate acquisitions and O&M costs were not traceable. The Transportation Security Administration’s Electronic Baggage Screening Program did not include sunk costs in the LCCE, and as a result the APB cost goals did not trace. In contrast, we could trace all schedule events and dates in the approved APBs to the programs’ IMS for only six of 21 programs. There was variation in how the programs’ APBs lacked traceability to the IMS. For example: The IMS for the Customs and Border Protection’s Border Wall System Program estimates the full operational capability dates to be between October 2021 and December 2021, whereas the approved APB includes an objective date of October 2022 and a threshold date of December 2022. The APB for the U.S. Citizenship and Immigration Services’ Transformation program does not identify a source for the schedule baseline. Program officials told us that they do not have an IMS and instead they use the schedule in the program’s release roadmap, a document that information technology programs use to communicate how they will iteratively deliver features. However, schedule events identified in the APB, such as full operational capability, were not identified in the release roadmap. Similarly, we found programs that developed an IMS but did not include all future APB milestones, such as Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics Mitigation and Transportation Security Administration’s Credential Authentication Technology. According to GAO’s Schedule Assessment Guide, schedules should be verified to ensure that they are vertically traceable—that is, verified to ensure the consistency of dates, status, and scope requirements between different levels of the schedule and management documents. Further, this guide states that a schedule baseline signifies a consensus of stakeholders on the required sequence of events, resources, and key dates. The IMS is more accurate when stakeholders agree on the underlying assumptions. These stakeholders would include, for example, program offices, end users, and component and DHS leadership. Further, DHS acquisition policy requires programs to obtain review and approval of LCCEs and operational requirements documents from various stakeholders within components and DHS headquarters. However, DHS acquisition policy states that approval of IMSs is based on DHS guidance and component policy and that program managers will provide the IMS to DHS in support of the acquisition review process. Officials from PARM and the Office of the Chief Financial Officer told us that the components vary in their capacity to develop schedules and assess schedule risks and there is a lack of expertise within the department to review program schedules. The lack of traceability between IMSs and schedule goals in the APB indicates that DHS does not have an appropriate oversight process in place to ensure APBs trace to schedule goals in the IMSs, in accordance with DHS policy and GAO’s best practices. Without this traceability, DHS cannot ensure that the understanding of program schedules among different stakeholders is consistent and accurate. As a result, DHS leadership may be approving program schedule goals that do not align with program execution plans. We found that LCCEs and operational requirements documents are consistently identified as the basis of cost and performance goals in DHS’s acquisition management policy and guidance. However, we also found that the documents do not consistently require that an IMS be used as the basis of schedule goals. Specifically, DHS’s acquisition management instruction and DHS’s Systems Engineering Life Cycle Guidebook—which outlines the technical framework for DHS’s acquisition management system—differ regarding the source of APB schedule milestone dates. Table 7 summarizes our findings on DHS’s acquisition policy and guidance related to developing APB cost, schedule, and performance goals. DHS’s acquisition management instruction states that the APB should trace to the IMS, which is consistent with GAO’s Schedule Assessment Guide. This instruction differs from the guidance in the Systems Engineering Life Cycle Guidebook, which in contrast, directs programs to use the APB as an input when developing the IMS. PARM officials said they were unaware of the inconsistency and confirmed that the IMS should provide the basis of APB schedule goals, as identified in DHS’s acquisition management instruction. PARM officials also acknowledged that the information related to schedule development should be consistent across all of DHS’s policies, instructions, and guidebooks. Conflicting agency-wide policy and guidance can lead to a lack of clarity and consistency on how programs develop their schedules. In addition, the lack of a well-developed schedule can contribute to poor acquisition outcomes, such as increased costs and delayed delivery of capabilities needed by end users. As previously noted, DHS’s 2019 update to its acquisition management directive and associated instruction addressed a GAO recommendation related to better defining requirements before establishing acquisition program baselines. PARM officials told us they plan to update the Systems Engineering Life Cycle Guidebook by the end of calendar year 2019 to account for the revisions in the acquisition management directive and associated instruction. At that time, they also plan to correct the inconsistency related to the documents used to develop APB schedule goals. Since we began reviewing DHS’s portfolio of major acquisitions in 2015, the department has strengthened implementation of its policies to improve acquisition oversight. These efforts have begun to yield better results as the performance of DHS’s major acquisition portfolio has improved compared to our last review. As DHS major acquisition policy has evolved over time, the department has put in place oversight and approval processes that help ensure cost and performance goals are clear, consistent, and trace to key acquisition documents serving as the basis for those goals. However, opportunities remain for DHS to provide better oversight of major acquisition programs’ schedule goals, as we found that these goals generally did not trace to the integrated master schedules per DHS policy. When schedule goals are not traceable, DHS decision makers cannot be sure that the schedule presented is consistent and accurate. Until DHS develops an oversight process to ensure schedules are developed and updated appropriately, the department cannot ensure that its most expensive acquisition programs are able to deliver capabilities needed by end users when promised. In addition, we found inconsistencies within DHS’s major acquisition policy and system engineering guidance in identifying the basis of schedule goals. Without consistent schedule development guidance, DHS has no way of knowing that programs establish schedules in a consistent manner and in accordance with GAO’s scheduling best practices. We are making the following two recommendations to DHS. The Secretary of Homeland Security should ensure that the Undersecretary for Management develops an oversight process to confirm that programs’ schedule goals are developed and updated in accordance with GAO’s Schedule Assessment Guide, to include ensuring traceability between APB schedule goals and IMSs. (Recommendation 1) The Secretary of Homeland Security should ensure that the Undersecretary for Management revises the schedule development guidance in the Systems Engineering Life Cycle Guidebook to state clearly that an IMS should be used as the basis for APB schedule goals. (Recommendation 2) We provided a draft of this report to DHS for review and comment. DHS’s comments are reproduced in appendix III. DHS also provided technical comments which we incorporated as appropriate. In its comments, DHS concurred with both of our recommendations and identified actions it planned to take to address them. We are sending copies of this report to the appropriate congressional committees and the Acting Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix presents individual assessments for each of the 29 programs we reviewed. Each assessment presents information current as of August 2019. They include standard elements, such as an image, a program description, and summaries of the program’s progress in meeting cost and schedule goals, performance and testing activities, and program management-related issues, such as staffing. The information presented in these assessments was obtained from the Department of Homeland Security (DHS) documentation, answers to our questionnaire by DHS officials, interviews with program officials, and includes our analysis of program information. Each assessment also includes the following figures: Fiscal Years 2020–2024 Affordability. This figure compares the funding plan presented in the Future Years Homeland Security Program report to Congress for fiscal years 2020-2024 to the program’s current cost estimate. We use this funding plan because the data are approved by DHS and Office of Management and Budget, and was submitted to Congress to inform the fiscal year 2020 budget process. The data do not account for other potential funding sources, such as carryover funding. Acquisition Program Baseline (APB) Thresholds vs. Current Estimate. This figure compares the program’s cost thresholds from the initial APB approved after DHS’s acquisition management policy went into effect in November 2008 and the program’s current DHS-approved APB to the program’s expected costs as of August 2019. The source for the current estimate is the most recent cost data we obtained (i.e., a department-approved life-cycle cost estimate, updated life-cycle cost estimates submitted during the resource allocation process to inform the fiscal year 2020 budget request, or a fiscal year 2019 annual life-cycle cost estimate update). Schedule Changes. This figure consists of two timelines that identify key milestones for the program. The first timeline is based on the initial APB DHS leadership approved after the department’s current acquisition management policy went into effect. The second timeline identifies when the program expected to reach its major milestones as of August 2019 and includes milestones introduced after the program’s initial APB. Dates shown are based on the program’s APB threshold dates or updates provided by the program office. Test Status. This table identifies key recent and upcoming test events. It also includes DHS’s Director, Office of Test and Evaluation’s assessment of programs’ test results, if an assessment was conducted. Staffing Profile. This figure identifies the total number of staff a program needs (measured in full time equivalents) including how many are considered critical and how many staff the program actually has. Lastly, each program assessment summarizes comments provided by the program office and identifies whether the program provided technical comments. Page left blank intentionally. AUTOMATED COMMERCIAL ENVIRONMENT (ACE) CUSTOMS AND BORDER PROTECTION (CBP) The ACE program is developing software that will electronically collect and process information submitted by the international trade community. ACE is intended to provide private and public sector stakeholders access to information, enhance the government’s ability to determine whether cargo should be admitted into the United States, increase the efficiency of operations at U.S. ports by eliminating manual and duplicative trade processes, and enable faster decision making. Program completed operational testing in June 2018, but cybersecurity was not tested. Collections functionality will remain in the legacy system until additional funding is provided for development. GAO last reported on this program in May 2018 and March 2018 (GAO-18-339SP, GAO-18- 271). Following a cost and schedule breach in April 2017, CBP separated the ACE program’s Collections functionality—which collects and processes duties owed on imported goods—from its Core functionality to permit deployment of the other post-release capabilities, such as Liquidations and Reconciliation. CBP previously reported that officials were not versed in the complexities of collection in the legacy system and underestimated the level of effort required to integrate Collections capabilities into ACE. In August 2018, the program received Department of Homeland Security (DHS) approval to defer Collections functionality as an unfunded requirement. CBP officials said the Collections functionality will remain in the legacy system until funding for development is provided. ACE continued deployment of the Core functionality and updated acquisition documents including the program’s acquisition program baseline (APB) and life-cycle cost estimate (LCCE) to reflect the program changes. DHS leadership approved the program’s updated APB in November 2018—removing the program from breach status. The program achieved full operational capability (FOC) for Core functionality and received acquisition decision event (ADE) 3 approval in November 2018— approximately 2 years later than initially planned. Although the program removed costs associated with Collections functionality, the program’s total APB cost threshold increased by more than $500 million from its prior APB. This cost increase is primarily the result of a change in the way the program’s threshold costs were calculated. CBP officials estimated the total cost of decoupling Collections from ACE’s remaining functionality to be $30 million. In March 2019, the program received funding and approval for ADE 2B for the first of four planned releases of Collections functionality, but did not receive funding for the remaining releases. CBP officials applied for Technology Modernization Funds (TMF). However, in September 2019, CBP officials stated that a decision on TMF funding had not yet been made. CBP officials estimated that it would take 18 months to move Collections into ACE. In June 2019, the program updated its LCCE to inform the budget process—the LCCE includes some costs for Collections functionality, but the total cost is not yet known. Customs and Border Protection (CBP) AUTOMATED COMMERCIAL ENVIRONMENT (ACE) When DHS leadership re-baselined the ACE program in 2013, the program adopted an agile software development methodology to accelerate software creation and increase flexibility in the development process. The ACE program office oversees agile teams that conduct development and O&M activities. Staffing needs for ACE have decreased in the last year, which CBP officials attribute to the program completing most development efforts. These officials explained that staff from prior agile development teams were shifted to sustainment teams. In June 2019, CBP officials told GAO that, while ACE has some critical staffing gaps, these gaps have not affected program execution. CBP officials also stated that they plan to use existing contracts to address staffing needs for the Collections functionality, once funding for development is received. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CUSTOMS AND BORDER PROTECTION (CBP) The BEE program is intended to verify the identities of travelers leaving the United States at air, land, and sea ports of entries using biometric data, such as facial recognition. The program has developed a capability to match photos of departing travelers to their passport photos or photos obtained upon a traveler’s arrival into the United States to identify foreign nationals that stay in the United States beyond their authorized periods of admission. CBP is currently focused on the air segment. Program deploying capabilities beyond approved quantity without approval from leadership. CBP pursuing public/private partnerships to reduce costs. GAO last reported on this program in May 2018 and February 2017 (GAO-18-339SP, GAO-17-170). In May 2018, the Department of Homeland Security (DHS) leadership approved BEE’s initial acquisition program baseline (APB) which established the cost, schedule, and performance parameters for the air segment. DHS leadership subsequently granted the BEE program acquisition decision event (ADE) 2A approval for this segment and directed the program to return for a combined ADE 2B/C. DHS leadership delayed the program’s ADE 2B decision—which will authorize the program to initiate development of the air segment—from October 2018 to December 2018 to allow for the completion of the test and evaluation master plan (TEMP). However, in October 2018, CBP officials told GAO that the facial matching service was ready to support nationwide deployment, and the program was on track to reach its initial operational capability (IOC) of supporting 30 international flights per day by December 2018. DHS leadership approved the program’s request to remove ADE 2C—which would authorize low-rate production—from its APB and granted the program ADE 2B in December 2018. In March 2019, DHS leadership approved the program’s updated APB, which reflected schedule changes related to the TEMP, schedule slips related to the fiscal year 2019 partial government shutdown, and removal of ADE 2C. The program’s APB costs goals remained the same. CBP officials said the program plans to re-baseline and achieve ADE 3—which will authorize full-rate production—in September 2019. However, in June 2019, CBP officials told GAO the program has continued to deploy capabilities to airports and airlines—beyond those needed to achieve IOC. The BEE program is primarily funded by fees. Congress provided that half the amount collected from fee increases for certain visa applications from fiscal years 2016 through 2025—up to $1 billion—would be available to DHS until expended for the development and implementation of the BEE system. In February 2018, Congress extended this period through fiscal year 2027. CBP officials said the current funding structure poses challenges because fees fluctuate based on immigration rates. The program conducted an affordability analysis in 2018 that showed projected fees had fallen from $115 million per year to $56 million per year. To address the funding gap, the program reduced the number of officers conducting enforcement activities at airport departure gates and is working with CBP to identify other sources of funding. . Customs and Border Protection (CBP) Since 1996, several federal statutes have required development of an entry and exit system for foreign nationals. DHS has been exploring biometric exit capabilities since 2009 and an Executive Order issued in March 2017 directed DHS to expedite the implementation of the BEE system. CBP is pursuing public/private partnerships in which airlines and airports invest in the equipment to collect biometric data to reduce program costs and improve the passenger boarding process. In September 2019, CBP officials told GAO they have received commitment letters from 28 airports and airlines since March 2018 and officials expect to operate within the airports with the highest volume of international flights by October 2021. CBP officials also told GAO that the program works independently with airlines and airports and does not seek any component or department approvals before proceeding to deploy technologies. These officials stated they proceed in this manner because program stakeholders have been highly engaged since the program’s ADE 1, internal testing results have been positive, and the congressional mandate necessitates expediency. CBP officials said the program’s current staffing level is manageable, but they will need more staff in the future to help manage planned partnerships with airlines and airports. CBP provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CUSTOMS AND BORDER PROTECTION (CBP) The border wall system is intended to prevent the illegal entry of people, drugs, and other contraband by enhancing and adding to the 654 miles of existing barriers along the U.S. southern border. CBP plans to create a border enforcement zone between a primary barrier—such as a fence—and a secondary barrier. To establish the enforcement zone, the wall system may also include detection technology, surveillance cameras, lighting, and roads for maintenance and patrolling. Program establishes baselines as funding is received, but does not have a cost estimate to support funding plan. Current baselines do not account for all DHS and DOD border wall system construction efforts. GAO last reported on this program in July 2018 and May 2018 (GAO-18-614, GAO-18- 339SP). The Department of Homeland Security (DHS) plans to establish cost, schedule, and performance goals for each individual segment of the border wall system in separate acquisition program baselines (APB) as funding becomes available. The program’s current APBs were approved in May 2019 and account for segments funded in fiscal years 2018 and 2019, totaling nearly 123 miles of border wall system. DHS leadership approved a revised APB for the two segments funded in fiscal year 2018. This included cost and schedule goals for the replacement of an existing 14 miles of primary and secondary barriers in San Diego. It also refined the cost goals for an initial 60 mile segment in the Rio Grande Valley (RGV), because in the 2018 and 2019 Consolidated Appropriations Acts, Congress prohibited use of funds for construction in areas constituting about 4 miles. The program’s total cost for these efforts is nearly $2.2 billion. DHS leadership approved an initial APB for a second segment of nearly 53 miles in RGV in response to funding received in fiscal year 2019. The program’s total cost for this segment is approximately $2.6 billion. However, the design for this segment has not yet been approved, which could affect APB costs or schedule or both. In June 2019, to inform the budget process, the program developed a cost estimate that appears much greater than its APB goals because it reflects DHS’s funding request to Congress—not the current plans of the program. DHS officials reported that they did not have a cost estimate to support the requested amounts because the program develops acquisition documentation after funding becomes available. The current APBs do not account for related construction efforts that may limit oversight of the development of the entire border wall system. For example, in November 2018, CBP leadership was granted approval to oversee a segment replacing about 48 miles of primary pedestrian wall. Further, in February 2019, DHS requested that the Department of Defense (DOD) assist with the construction of infrastructure along the southern border. DOD agreed to provide support and is using $2.5 billion of DOD’s fiscal year 2019 funds to support these efforts. In September 2019 DOD officials identified an additional $3.6 billion, if needed. CBP officials told GAO that they provided a prioritized list of segments and construction standards to DOD, but said that they have limited insight into DOD’s planned efforts. 05/19 FY 2018 APB revised/ FY19 initial APB approved 03/23 FY 2018 segments full operational capability (FOC) Customs and Border Protection (CBP) The Border Wall System Program was initiated in response to an Executive Order issued in January 2017 stating that the executive branch is to secure the southern border through the immediate construction of a physical wall on the southern border of the United States. To expedite the acquisition planning process, CBP officials said they leveraged expertise from staff that worked on previous border fencing programs and were familiar with implementation challenges, such as land access. CBP intends to prioritize segments based on threat levels, land ownership, and geography, among other things. CBP plans to continue coordinating with the U.S. Army Corps of Engineers for engineering support and for awarding and overseeing the construction contracts. CBP officials stated that land access and acquisition issues are significant challenges and could affect the program’s ability to meet its schedule goals. CBP officials reported that the program has sufficient staff to manage the program’s work based on the funding received to date. The program’s unfilled staffing gaps are not yet funded positions. CBP officials stated that they will hire additional staff to fill the vacant positions once funding becomes available. CBP officials reviewed a draft of this assessment and provided no comments. CROSS BORDER TUNNEL THREAT (CBTT) CUSTOMS AND BORDER PROTECTION (CBP) The CBTT program is intended to help CBP identify, acquire, and implement operational services and technologies necessary to obtain subterranean domain awareness along the United States land border. These technologies will help CBP address existing gaps in the prediction, detection, confirmation, investigation, and remediation of cross border tunnels. CBP’s analysis of alternatives for detection capabilities identified a solution and CBP will conduct future analysis. Program performed two technology demonstrations, and CBP officials determined technologies were sufficient. GAO last reported on the program in August 2018 and May 2017 (GAO-18-550, GAO-17-474). In August 2015, the Department of Homeland Security’s (DHS) Under Secretary for Management (USM) granted the CBTT program acquisition decision event (ADE) 1 approval. The program initiated work on an analysis of alternatives (AoA) in March 2016, which considered technologies to detect four CBP classifications of illicit tunnels—rudimentary, sophisticated, mechanically bored, and interconnecting tunnels—but yielded no results. Program leadership and stakeholders subsequently determined that the AoA should be refocused to address tunnel detection threats in seven high-risk operational areas and broadened to incorporate newer tunnel detection technologies, among other things. In May 2018, the AoA was completed and, based on its results, CBP identified a preferred system—a variation of a legacy tunnel detection system used by the Department of Defense (DOD). In June 2018, DHS leadership directed the program to continue technology demonstrations of upgrades to the legacy tunnel detection system in order to mitigate technical and operational risks and refine program requirements, including identification of the areas where the capability will be deployed. At that time, DHS leadership directed the program to return to the acquisition review board for a combined ADE 2A and 2B to establish an initial acquisition program baseline (APB) for tunnel detection capability. CBP officials said the program now plans to pursue only ADE 2A when it returns to the acquisition review board, per DHS’s revised acquisition policy. As of September 2019, the program had not yet completed key acquisition documents that will support the program’s APB. CBP officials told GAO that the program experienced delays in updating the acquisition documents—including the operational requirements document—for the detection capability as a result of continued work with stakeholders. The program continues to work with stakeholders to refine end- user requirements, determine testing needs, and complete a technical assessment. CBP officials told GAO that the program plans to use an incremental acquisition approach to address the other capability gaps. They added that the incremental approach is necessary because the capability gaps the program intends to address are broader than one system can cover. Customs and Border Protection (CBP) CROSS BORDER TUNNEL THREAT (CBTT) In 2008, CBP began collaborating with the DHS Science and Technology Directorate, other federal partners, and private industry to develop and acquire tunnel detection technology. In September 2012, the DHS Inspector General found that CBP did not have the technological capability to detect illicit cross-border tunnels routinely and accurately. DHS leadership subsequently approved the CBTT Mission Needs Statement, which identified six capabilities—predict the location of illicit tunnels; detect the presence of suspected tunnels and tunneling activity and project the trajectory of a discovered tunnel; confirm a tunnel’s existence and map its location and measurements; investigate and exploit tunnels and tunnel activity; remediate discovered tunnels; and coordinate information sharing on tunnel threats. CBP officials stated that the CBTT Concept of Operations (CONOPS) was approved in June 2019. CBP officials also stated that the development of the CONOPS was informed by market research and AoA activities. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. INTEGRATED FIXED TOWERS (IFT) CUSTOMS AND BORDER PROTECTION (CBP) The IFT program helps the Border Patrol detect, track, identify, and classify illegal entries in remote areas. IFT consists of fixed surveillance tower systems equipped with ground surveillance radar, daylight and infrared cameras, and communications systems linking the towers to command and control centers. CBP plans to deliver or upgrade approximately 48 IFT systems across six areas of responsibility (AoR) in Arizona: Nogales, Douglas, Sonoita, Ajo, Tucson, and Casa Grande. System acceptance test completed in Sonoita AoR; all systems accepted by program. Border Patrol requested CBP add camera suites to address tower reductions in the Ajo and Casa Grande AoRs. GAO last reported on this program in May 2018 and November 2017 (GAO-18-339SP, GAO-18-119). The program declared a potential schedule breach in December 2017 because the program did not receive funding from the Department of Homeland Security (DHS) to address new IFT requirements, including camera upgrades and replacement of existing tower systems deployed in Tuscon and Ajo under a legacy program. In January 2018, CBP officials updated the program’s affordability analysis to reflect a reduction of IFT tower deployments—which mitigated the potential schedule breach. Specifically, a resolution passed within the Tohono O’odham Nation—a sovereign Native American Nation—that reduced the number of IFT tower systems CBP can deploy on the Nation’s land from 15 to 10. This reduction mitigated the funding shortfall that had put the program at risk of not achieving full operational capability (FOC) in September 2020. In February 2019, CBP declared a schedule breach of the program’s current acquisition program baseline (APB) as a result of delays in the negotiations with the Tohono O’odham Nation regarding access to tribal lands to construct towers and deploy IFT systems in the Ajo and Casa Grande AoRs. CBP subsequently reached an agreement with the Nation in March 2019. DHS leadership directed the program to revise its APB to reflect changes in tower deployments. CBP officials told GAO they submitted a revised APB to DHS leadership in June 2019, but as of September 2019 it had not yet been approved. CBP officials anticipate the program’s FOC date will slip to March 2021 as a result of these actions. In June 2019, the program updated its life-cycle cost estimate (LCCE) to inform the budget process. The updated LCCE includes estimated costs for camera upgrades and accounts for the reduction in IFT systems. CBP completed deployments in the Sonoita AoR in October 2017 and replaced legacy systems in the Tucson and Ajo AoRs in September 2018 and December 2018, respectively. In January 2015, Border Patrol requested the program prioritize replacing these legacy systems because the technology was obsolete and more expensive to maintain than IFT technology planned for deployment in other AoRs. 10/15 Initial operational capability (Nogales) Customs and Border Protection (CBP) INTEGRATED FIXED TOWERS (IFT) When CBP initiated the IFT program, it decided to procure a non-developmental system, and it required that prospective contractors demonstrate their systems prior to CBP awarding the contract. The program awarded the contract to EFW, Inc. in February 2014, but the award was protested. GAO sustained the protest and CBP reevaluated the offerors’ proposals before it decided to re-award the contract to EFW, Inc. As a result, EFW, Inc. could not initiate work at the deployment sites until fiscal year 2015. According to CBP officials, the number of IFT towers deployed to a single AoR is subject to change based on Border Patrol assessments. Border Patrol was briefed and approved the reduction of towers within tribal lands. To mitigate capability gaps resulting from the tower reduction, Border Patrol requested the program deploy two additional IFT camera suites in Ajo. DHS leadership directed CBP to develop a border technology plan that includes IFT capabilities. According to CBP officials, the plan calls for an additional 11 AoRs and 35 IFTs. Although the program has not yet received funding for expansion to the 11 AoRs, in September 2018, CBP officials stated they began updating acquisition documents. CBP officials also stated the program does not have a staffing gap, but will require additional staff if funding for the expansion to the 11 AoRs is received. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. MEDIUM LIFT HELICOPTER (UH-60) CUSTOMS AND BORDER PROTECTION (CBP) UH-60 is a medium-lift helicopter that CBP uses for law enforcement and border security operations, air and mobility support and transport, search and rescue, and other missions. CBP’s UH-60 fleet consists of 20 aircraft acquired from the U.S. Army in three different models. CBP previously acquired 4 modern UH-60M aircraft and converted 6 of its older 16 UH-60A aircraft into more capable UH-60L models. CBP is replacing the remaining 10 UH-60A with reconfigured Army HH-60L aircraft. Flight acceptance testing for the first reconfigured aircraft completed in February 2018. Program is assessing additional medium lift capability requirements. GAO last reported on this program in May 2018 (GAO-18-339SP). In July 2018, Department of Homeland Security (DHS) leadership granted the program acquisition decision event (ADE) 3 approval and approved the replacement of CBP’s remaining UH-60A aircraft for reconfigured Army HH-60L aircraft. CBP will begin replacing its UH-60A model aircraft on a one-to-one basis as the reconfigured Army HH-60Ls are delivered. DHS leadership previously approved the transfer of three reconfigured HH-60Ls. According to CBP officials, the ADE 3 approval to replace the remaining seven aircraft was based on the evaluation of an initial reconfigured prototype, which was delivered in 2018. CBP officials anticipate that the second and third reconfigured HH-60Ls will be delivered in fiscal year 2020. The program re-baselined as part of the ADE 3 approval process, removing it from breach status. The program previously experienced cost increases after accommodating a change in DHS’s appropriations structure and schedule slips because of a directive from DHS to develop a comprehensive border plan, which contributed to delays in getting approvals for some of the documents required for ADE 3. The program also anticipated delays in delivery for the second reconfigured HH-60L because of a redesign to be compliant with federal aviation regulations. DHS leadership and CBP officials determined that the effect of the schedule breach was minimal because the program was able to adjust its schedule so that the second and third reconfigured HH-60Ls can be accepted concurrently. The program still plans to achieve full operational capability (FOC) in September 2022 once all 10 of the reconfigured HH-60L aircraft are accepted and deployed. The program updated its life-cycle cost estimate (LCCE) to inform the program’s revised acquisition program baseline (APB). The program’s acquisition cost thresholds increased by nearly $100 million, and the operations and maintenance (O&M) cost thresholds decreased by approximately $15 million. These changes reflect updates to aircraft operational hours and the results of the Army’s annual obsolescence study, among other things. The updated LCCE also removes personnel costs included in the program’s initial APB, which CBP officials previously told GAO are funded through a separate, central funding account for all of CBP’s air and marine assets. Customs and Border Protection (CBP) MEDIUM LIFT HELICOPTER (UH-60) In July 2018, DHS leadership directed CBP to address requirements for additional medium-lift capability, including coordinating with Department of Defense and DHS stakeholders, such as the U.S. Coast Guard, that also maintain a fleet of H-60 aircraft. CBP officials stated a desire to replace its other medium lift helicopters as they are retired from the fleet with additional reconfigured HH-60L aircraft. This would not increase the overall number of medium lift helicopters, but would increase the number of UH-60 aircraft. If the number of UH-60 aircraft increases, the program will need to seek approval from DHS and extend its FOC date. In April 2019, CBP updated its interagency agreement with the Army to support completing the program’s currently approved quantity. According to CBP officials, this agreement could support acquiring additional reconfigured HH-60Ls if approved by DHS. CBP previously acquired UH-60 as a part of its Strategic Air and Marine Program (StAMP). In July 2016, DHS leadership designated UH-60 as a separate and distinct major acquisition program. In October 2018, CBP officials told GAO they continue to maintain a consolidated program office where the same staff from StAMP support all remaining acquisitions, including UH-60. CBP officials said they have refined the program’s staffing profile and taken steps to mitigate the gap. For example, in June 2019, CBP officials said they had hired four new employees and established a memorandum of agreement with CBP’s Office of Acquisition for matrixed support to assist with developing acquisition documents, as needed. CBP officials stated that as of August 2019, DHS’s Joint Requirements Council validated a requirement for 35 total Medium Lift Helicopters, and the program office is working on a strategy to achieve that inventory target. CBP officials also provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. MULTI-ROLE ENFORCEMENT AIRCRAFT (MEA) CUSTOMS AND BORDER PROTECTION (CBP) MEA are fixed-wing, multi-engine aircraft that can be configured to perform multiple missions including maritime, air, and land interdiction, as well as signals detection to support law enforcement. The maritime and air interdiction MEA are equipped with search radar and an electro-optical/infrared sensor to support maritime surveillance and airborne tracking missions. MEA will replace CBP’s fleet of aging C-12, PA-42, and BE-20 aircraft. Air interdiction configuration is operationally effective and suitable with limitations; cyber testing is not complete. Program developing requirements for next configuration; pursuing total of 38 MEA. GAO last reported on this program in May 2018 (GAO-18- 339SP). In February 2019, Department of Homeland Security (DHS) leadership approved a revised acquisition program baseline (APB), which increased the program’s quantity to 29 MEA: 16 previously approved maritime interdiction MEA and 13 additional air interdiction MEA. CBP officials told GAO they also requested approval to acquire all remaining air interdiction MEA. However, in April 2019, DHS leadership directed CBP to complete follow-on operational test and evaluation (OT&E) of the air interdiction configuration and undergo an acquisition decision event (ADE) 3 review before the program could receive full-rate production approval. DHS leadership previously approved CBP’s request to procure additional aircraft in the air interdiction configuration that exceeded the program’s initial baseline of 16 MEA. Specifically, DHS leadership approved procurement of MEA 17 in September 2017 after congressional conferees agreed to an additional aircraft beyond DHS’s budget request. In addition, DHS leadership approved MEA 18-20 in August 2018. CBP officials told GAO it was necessary to procure additional MEA to maintain the production schedule for already ordered aircraft. CBP officials accepted delivery of MEA 16 in February 2019—completing delivery of all maritime interdiction configured MEA. CBP officials said the program experienced a few months delay in delivery of MEA 13-16 because the contractor began laying off staff prior to the program receiving DHS leadership approval to acquire MEA 18-20. According to CBP officials, the program will need to receive ADE 3 approval to procure the remaining air interdiction MEA before the end of September 2019 to avoid future production issues. The program’s revised APB extends the program’s full operational capability (FOC) date by nearly 7 years, to account for the production and delivery of the air interdiction aircraft. The program updated its life-cycle cost estimate (LCCE) in September 2018 to inform its revised baseline. This estimate decreased by approximately $1.4 billion from the program’s previous LCCE due to a reduction in the number of total aircraft—from the program’s proposed end state of 38 MEA to the 29 included in its revised APB—and planned flight hours. Customs and Border Protection (CBP) MULTI-ROLE ENFORCEMENT AIRCRAFT (MEA) In April 2016, CBP identified capability needs in three additional mission areas and proposed increasing the program’s total to 38 MEA by adding 13 air (reflected in the February 2019 APB), six land interdiction MEA, and three signals detection MEA. The Joint Requirements Council endorsed CBP’s findings, but recommended CBP develop a number of requirements documents—including an operational requirements document (ORD)—to fully validate the findings. In June 2019, CBP officials said they had begun developing requirements for the land interdiction MEA—the next configuration the program plans to pursue. CBP previously acquired MEA as a part of its Strategic Air and Marine Program (StAMP). In July 2016, DHS leadership designated MEA as a separate and distinct major acquisition program. In October 2018, CBP officials told GAO they continue to maintain a consolidated program office where the same staff from StAMP support all remaining acquisitions, including MEA. CBP officials said they have refined the program’s staffing profile and taken steps to mitigate the gap. For example, in June 2019, CBP officials said they had hired four new employees and established a memorandum of agreement with CBP’s Office of Acquisition for matrixed support to assist with developing acquisition documents, as needed. CBP officials previously told GAO that the staffing gap contributed to delays in developing acquisition documentation for the air interdiction MEA. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CUSTOMS AND BORDER PROTECTION (CBP) The NII Systems Program supports CBP’s interdiction of weapons of mass destruction, contraband such as narcotics, and illegal aliens being smuggled into the United States, while facilitating the flow of legitimate commerce. CBP officers use large- and small-scale NII systems at air, sea, and land ports of entry; border checkpoints; and international mail facilities to examine the contents of containers, railcars, vehicles, baggage, and mail. CBP is evaluating technologies to increase efficiencies and address capability gaps. Staffing challenges pose risk to current program execution and planning for follow-on to NII program. GAO last reported on this program in May 2018 (GAO-18-339SP). The NII Systems program is on track to meet its approved cost and schedule goals. The Consolidated Appropriations Act of 2019 included $570 million of acquisition funding for the NII program—$520 million above the President’s budget level. CBP officials told GAO they plan to use the additional acquisition funding primarily to increase scanning capability at land points of entry along the southwest border by recapitalizing some large-scale capabilities and deploying additional small-scale capabilities. The program updated its life-cycle cost estimate (LCCE) in June 2018. The program’s acquisition costs remain within its acquisition program baseline (APB) cost thresholds and continue to decrease. Compared to the prior year’s estimate, the program’s acquisition costs decreased by $81 million and operations and maintenance increased by $33 million. However, the LCCE update only estimated costs through fiscal year 2026—9 years short of the program’s final year. In June 2019, CBP officials told GAO that they were in the process of updating the program’s LCCE. These officials stated that they plan to extend the LCCE through the program’s final year and adjust program costs based on program changes made in response to the additional funding received. CBP plans to deploy full operational capability (FOC) quantities of 342 large- and 5,455 small-scale NII systems in fiscal year 2020—4 years earlier than the program’s current APB threshold date. In November 2018, Department of Homeland Security (DHS) leadership decided that once FOC quantities for large and small-scale systems are deployed, CBP will initiate a transfer of the NII program to the operational activity for sustainment efforts. In addition, once FOC quantities are deployed, DHS leadership determined that CBP may adjust large- and small-scale NII deployment quantities in excess of FOC with similarly capable systems to address changing capacity needs and emerging threats. CBP is assessing requirements to address capability gaps, such as increased throughput. In June 2019, CBP officials reported that some technologies being assessed can be procured through the current NII program because CBP considers them to be similarly capable systems. However, these officials also told GAO that CBP is developing acquisition documents to inform a follow-on NII program for other technologies. Customs and Border Protection (CBP) CBP is in the process of assessing requirements to inform the follow-on NII program. In March 2017, the Joint Requirements Council (JRC) validated a capability analysis report (CAR) that assessed capability gaps in NII operations to assist with identifying potential upgrades to existing systems and developing requirements for future systems. DHS leadership approved a new NII Mission Needs Statement (MNS) in August 2018, which updated the capability gaps identified in the CAR and described mission needs and capabilities to address the gaps. The JRC endorsed the MNS, but recommended that CBP address cybersecurity threats and vulnerabilities as requirements and solutions evolve, and also include the Transportation Security Administration—which leverages some of the same equipment to perform their mission—in defining requirements, among other things. CBP officials told GAO that they are developing acquisition documentation to inform acquisition decision event 1 for the follow-on NII program planned for September 2019, including a concept of operations and an initial cost estimate. CBP’s ability to successfully execute the existing NII Systems program and plan for future efforts may be at risk because of understaffing. As of September 2019, the program continued to face a staffing gap of approximately 21 percent. CBP officials said that they plan to mitigate the gap with government personnel from other offices within the component and with contractor support. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. REMOTE VIDEO SURVEILLANCE SYSTEM (RVSS) CUSTOMS AND BORDER PROTECTION (CBP) RVSS helps the Border Patrol detect, track, identify, and classify illegal entries across U.S. borders. RVSS consists of daylight and infrared video cameras mounted on towers and buildings with communications systems that link to command and control centers. From 1995 to 2005, CBP deployed approximately 310 RVSS towers along the U.S. northern and southern borders, and initiated efforts to upgrade legacy RVSS towers in Arizona in 2011. Diesel generators that power relocatable towers cause vibrations that could impact mission operations. Once funded, program plans to award a contract for additional deployments along the southwest border. GAO last reported on this program in May 2018 and November 2017 (GAO-18-339SP, GAO-18-119). In April 2016, Department of Homeland Security (DHS) leadership elevated RVSS from a level 3 program—which focused on upgrading legacy RVSS in Arizona—to a level 1 program after approving CBP’s plan to expand deployments to the Rio Grande Valley (RGV) sector and adding an additional 6 sectors along the southwest border—Laredo, Del Rio, Big Bend, El Paso, El Centro, and San Diego. DHS leadership approved the program to move forward with deployments at two Border Patrol stations within the RGV, which can be completed as options under the program’s existing contract, if exercised. However, DHS leadership also directed the program to re-baseline to account for its expanded scope and conduct an acquisition decision event (ADE) 2A to obtain approval for additional deployments. CBP officials previously told GAO the program anticipated conducting its ADE 2A and obtaining DHS leadership approval for an acquisition program baseline (APB) establishing cost, schedule and performance goals for the expanded program by December 2018. As of September 2019, the program had not yet received approval for key acquisition documents to conduct ADE 2A, including the APB, but CBP officials anticipate approval of these documents by March 2020. CBP officials primarily attribute these delays to a lack of funding for the additional deployments. CBP officials said the upcoming APB will include only deployments to Arizona and the RGV sector to align with funding received. Future deployments will require additional APB updates, which CBP officials said would be developed as funding becomes available. In June 2019, the program updated its life-cycle cost estimate (LCCE) to inform the budget process. The updated LCCE included the expansion to the 6 sectors along the southwest border, relocatable RVSS towers, and operations and maintenance costs for previously fielded systems. However, CBP officials told GAO the LCCE is in the process of another update, which will inform the upcoming APB and include the expansion across additional sectors across southwest border and upgrades to legacy RVSS towers. Customs and Border Protection (CBP) REMOTE VIDEO SURVEILLANCE SYSTEM (RVSS) In July 2013, CBP awarded a firm fixed-price contract for a commercially available, non-developmental system. This contract covered the program’s initial scope to deploy upgraded RVSS in Arizona and included options for some initial work within the RGV sector. According to CBP officials, the program will need to award a new contract to cover expansion to the remaining six sectors along the southwest border. CBP officials drafted the request for proposals for the new contract, but it cannot be released until funding is received. CBP officials said the program is experiencing challenges in the RGV sector related to land acquisition. The U.S. Army Corps of Engineers is leading efforts to acquire land for RVSS and other border security programs, including the Border Wall System Program (BWSP). CBP officials told GAO that the RVSS program is coordinating with BWSP on its planned deployments within the RGV sector. Program officials anticipate that some RVSS towers will be co-located within the border wall. In the interim, CBP officials said the program is using short-term agreements with landowners to place relocatable towers in areas where border wall construction is planned. These officials reported that the short-term agreements provide flexibility for the placement of towers and can be completed more quickly than permanent agreements. CBP officials stated that the program’s current staffing plan was based on receiving funding for the expansion to RGV. Program officials said they will address the staffing needs once additional funding is received, but current operations have not been affected by the staffing gap. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CUSTOMS AND BORDER PROTECTION (CBP) The TACCOM program is intended to upgrade land mobile radio infrastructure and equipment to support approximately 95,000 users at CBP and other federal agencies. It is replacing obsolete radio systems with modern digital systems across various sectors located in 19 different service areas, linking these service areas to one another through a nationwide network, and building new communications sites to expand coverage in five of the 19 service areas. CBP officials reported that prior software issues have been addressed. Program continues to face staffing challenges due to competition from the private sector, among other things. GAO last reported on this program in May 2018 (GAO-18-339SP). In September 2018, the TACCOM program achieved full operational capability (FOC)—nine months later than initially planned. However, in July 2018, the program’s operational test authority (OTA) conducted a survey of end users and concluded that there were still large gaps in coverage the TACCOM capabilities were intended to address. CBP officials stated that limited funding has affected the program’s ability to address the remaining gaps in coverage. Department of Homeland Security (DHS) leadership previously approved a re-baseline of the TACCOM program in November 2017 after it experienced a schedule slip and cost growth. In July 2017, CBP officials notified DHS leadership that the program would not achieve FOC as planned due to issues related to federal information security requirements. In addition, the program experienced cost growth as a result of increased contractor labor costs and support for facilities and infrastructure. In November 2017, DHS’s Chief Financial Officer (CFO) approved the program’s revised life-cycle cost estimate (LCCE). At that time, DHS‘s CFO noted that the program’s estimate exceeded its available funding and requested that the program address the affordability gap before it was re-baselined. Nevertheless, DHS leadership approved the program’s revised acquisition program baseline (APB). CBP officials subsequently identified errors in the approved APB cost threshold tables and provided revised amounts, which are presented here. In September 2018, program officials told GAO that they completed an affordability analysis and submitted it to CBP and DHS leadership. CBP officials reported that the funding the program received in 2018 and carryover funds from prior years decreased the program’s affordability gap. However, CBP reported that in future years, funding gaps will require the program to reduce operations and maintenance requirements to match the appropriated funding and will continue to limit the program’s ability to address coverage gaps. Customs and Border Protection (CBP) CBP officials told GAO that in January 2018, the program moved from a mission support office to a joint program office under Border Patrol as part of CBP’s reorganization. The goal of this move was to make CBP land mobile radio capabilities seamless by combining the mission critical voice functions within Air and Marine Operations, the Border Patrol, and the Office of Field Operations—the TACCOM program’s primary customers—under one organizational leader: the Border Patrol Chief. In September 2018, CBP officials told GAO that the program reorganized staff within the program as it transitioned to an office under Border Patrol. CBP officials reported that hiring and retaining qualified land mobile radio engineers and information technology technical staff is a challenge because of lengthy hiring timeframes and competition with the private sector. CBP officials stated that the TACCOM upgrades improved interoperability, coverage, capacity, reliability and encryption to provide critical communications support to the agents and officers who secure the Nation’s borders. The program continues to provide LMR System Maintenance to include operation, sustainment and performance monitoring to ensure reliable and consistent border protection communications. CBP officials also provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CUSTOMS AND BORDER PROTECTION (CBP) TECS (not an acronym) is a law-enforcement information system that has been in place since the 1980s and that helps CBP officials determine the admissibility of persons entering the United States at border crossings, ports of entry, and prescreening sites located abroad. CBP initiated efforts to modernize TECS to provide users with enhanced capabilities for accessing and managing data. Costs increased by $400 million in revised cost estimate due to extended sustainment timeframe. CBP working to address and prevent major system outages. GAO last reported on this program in May 2018 (GAO-18-339SP). Department of Homeland Security (DHS) leadership approved the fourth version of the program’s acquisition program baseline (APB) in July 2016. In this APB, CBP split full operational capability (FOC) into two separate operational capability milestones to better reflect the program’s activities at its primary and secondary data centers. CBP delivered operational capability at the primary data center and transitioned all remaining TECS users to the modernized system in December 2016. CBP delivered operational capability at the secondary data center in June 2017—as scheduled. This data center provides redundant TECS access to minimize downtime during system maintenance or unscheduled outages. However, not all test results were available in time for the program’s acquisition decision event (ADE) 3 decision. In August 2017, DHS leadership directed CBP to conduct follow-on operational test and evaluation (OT&E) activities to address known issues and conduct cybersecurity OT&E. The program completed follow-on OT&E in October 2018. DHS’s Director, Office of Test and Evaluation (DOT&E) completed an assessment of the test results in June 2019—which is intended to inform acquisition decisions. In June 2019, the program’s annual life-cycle cost estimate (LCCE) was updated in accordance with DHS’s guidance to include operations and maintenance (O&M) costs for 10 years past the program’s planned FOC date. The updated LCCE includes program costs through fiscal year 2028—7 years longer than the prior LCCE and the program’s current APB cost goals. However, the LCCE update does not include estimated costs for all program plans, such as migrating the data centers to a cloud infrastructure. CBP officials plan to incorporate these costs into future LCCE updates when requirements are better defined. The program’s O&M costs increased and exceeded the program’s APB O&M cost threshold by approximately $400 million. DHS officials stated that the additional O&M costs do not constitute a cost breach because the program is considered to be in O&M phase of the acquisition life cycle. Customs and Border Protection (CBP) Since the program has completed development, CBP is focused on ensuring that the modernized TECS system works as intended by addressing operational issues as they are identified. For example, in January 2017, TECS Modernization experienced a major outage that resulted in airport delays. CBP officials previously said that they continually monitor system health through a 24/7 operations center and have established a group dedicated to address system issues. In November 2017, DHS’s Office of Inspector General (OIG) found that CBP took sufficient steps to resolve the January 2017 outage, but underlying issues could result in future outages, including inadequate software capacity testing and deficient software maintenance. The OIG made five recommendations for CBP to implement improvements. CBP concurred with four of the recommendations but did not concur with a recommendation regarding CBP’s need to ensure staff make timely notifications of critical vulnerabilities to operating systems. CBP reported that the program’s notification activities were within DHS’s vulnerability management policy windows for testing and deploying software patches that were not deemed critical. Further, in September 2017, the DHS OIG found that nearly 100 outages, periods of latency, or instances of degraded service, were reported for TECS Modernization applications between June 2016 and March 2017, and recommended that CBP develop a plan to address factors that contributed to these challenges. CBP concurred with the recommendations. CBP officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CONTINUOUS DIAGNOSTICS AND MITIGATION (CDM) CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA) The CDM program aims to strengthen cybersecurity of the federal government’s networks by continually monitoring and reporting vulnerabilities at more than 65 civilian agencies. CDM provides four capabilities: Asset Management reports vulnerabilities in hardware and software; Identity and Access Management focuses on user access controls; Network Security Management will report on efforts to prevent attacks; and Data Protection Management will provide encryption to protect network data. Program revised its key performance parameters to better align with cybersecurity standards. The program began using a new contract vehicle and is hiring additional staff to support new capabilities. GAO last reported on this program in May 2018 (GAO-18-339SP). According to CISA officials, as a result of the 2019 partial government shutdown, the program experienced delays that impacted the program’s ability to achieve initial operational capability (IOC) for Identity and Access Management and Network Security Management capabilities as planned. In response, Department of Homeland Security (DHS) leadership approved a 3-month extension to both milestones. As a result, the IOC threshold date for Identity and Access Management capabilities was extended to and later achieved in June 2019. The IOC threshold date for Network Security Management was extended to December 2019. The program updated its life-cycle cost estimate (LCCE) in April 2019 to inform the budget process. This estimate exceeds the program’s current operations and maintenance (O&M) and total life-cycle cost thresholds by approximately $300 million and $100 million, respectively. The program’s cost increase is primarily attributed to evolving requirements described in the explanatory statements accompanying recent Appropriations Acts and the Office of Management and Budget (OMB). Specifically, CISA officials said the program received $110 million above the Presidential Budget Request and noted this was to accelerate procurement of CDM capabilities for additional agencies not in the original program scope and accelerate mobile and cloud computing visibility across the .gov domain, among other things. In addition, the program received funding in 2018 and 2019 after OMB directed that the CDM program cover certain costs of sustaining licenses for supported agencies, which CISA officials estimate will cost the program an additional $62 million. The program also estimates that O&M costs for these additional requirements will require a total of an additional $79 million in future years. In May 2019, CISA officials said the program is updating key acquisition documentation, such as its acquisition program baseline (APB) and LCCE, to inform acquisition decision event (ADE) 2B for Data Management Protection capabilities. They noted that the updated acquisition documents will account for the increased demand for CDM services. The program previously planned to achieve this ADE 2B by March 2019. However, due in part to the partial government shutdown, the program now plans to achieve the ADE 2B in 2020. Cybersecurity and Infrastructure Security Agency (CISA) CONTINUOUS DIAGNOSTICS AND MITIGATION (CDM) The CDM program updated its acquisition plan to reflect a change in strategy for procuring CDM tools and services. Previously, the program used blanket purchase agreements established by the General Services Administration (GSA) Federal Supply Schedule. CISA officials told GAO that in February 2018 the program began using an existing GSA government-wide acquisition contract and as of August 2019, the program has awarded 5 of 6 planned task orders to obtain CDM tools and services on behalf of participating agencies. According to CISA officials, the new acquisition strategy is intended to provide greater flexibility in contracting for current capabilities and to support future capabilities. Participating agencies will also be able to order additional CDM-approved products or services from GSA’s schedule for information technology equipment, software, and services. The program previously used the term “phases” and renamed the phases in the fall of 2018 to align with the associated capabilities it deploys. CISA officials explained that a phased deployment implied a serial implementation; however, CDM capabilities can be deployed in parallel. The program is not currently experiencing workforce challenges. The program received approval for 29 new positions to address staffing needs for the Network Security Management and Data Protection Management capabilities. Officials plan to fill those positions in fiscal years 2019 and 2020. CISA officials stated that in addition to efforts identified in this assessment, the program continues to manage its budget to ensure program costs match available funding and is leveraging the collective buying power of federal agencies and strategic sourcing to continue achieving government cost savings on CDM products. CISA officials also provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. NATIONAL CYBERSECURITY PROTECTION SYSTEM (NCPS) CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA) NCPS is intended to defend the federal civilian government from cyber threats. NCPS develops and delivers capabilities through a series of “blocks.” Blocks 1.0, 2.0, and 2.1 are fully deployed and provide intrusion-detection and analytic capabilities across the government. The NCPS program is currently deploying EINSTEIN 3 Accelerated (E3A) to provide intrusion-prevention capabilities and plans to deliver block 2.2 to improve information sharing across agencies. Program capabilities determined to be operationally suitable, effective, and cyber resilient with limitations. Staffing challenges may impact program execution. GAO last reported on this program in May 2018 (GAO-18-339SP). In February 2018, the Department of Homeland Security’s (DHS) Under Secretary for Management (USM) granted NCPS acquisition decision event (ADE) 3 approval for E3A to transition to sustainment and ADE 2C approval for block 2.2 to deploy additional capabilities. DHS’s USM also directed NCPS to address several issues identified during test events that informed the ADEs, including the following: For EA—Conduct follow-on operational test and evaluation (OT&E) by March For block 2.2—Review the operational requirements document (ORD) and concept 2019 to assess cybersecurity, among other things. of operations (CONOPS) to ensure they accurately reflect the mission environment and processes, review current and planned capabilities to ensure they will adequately address the ORD and CONOPS, and conduct another operational assessment (OA) prior to initial OT&E. The program revised its acquisition program baseline (APB) in January 2018 in preparation for the ADEs. However, the program updated its APB again in October 2018 to address an error found in the life-cycle cost estimate (LCCE), to add an additional 2 years of program costs, and to revise the approach to estimating threshold costs. Specifically, the LCCE that provided the basis for the program’s APB cost goals did not accurately account for the program’s sunk costs. Once corrected, the program’s total life-cycle cost threshold was $5.9 billion—more than $1.7 billion more than in the program’s January 2018 APB. CISA officials reported that while correcting the sunk costs increased the APB cost goals, the change did not affect estimating future costs and, therefore, will not impact program affordability. In March 2019, to inform the budget process, the program updated its corrected LCCE—which is within its current APB cost goals. In the program’s January 2018 APB, the ADE 3 date for block 2.2 slipped by 2 years— from March 2019 to March 2021—compared to its prior APB. According to CISA officials, this milestone was revised due to bid-protest-related delays involving the award of the program’s development, operations, and maintenance contract. CISA officials said that due to several protests, the award was delayed until June 2018— nearly 3 years later than planned. Cybersecurity and Infrastructure Security Agency (CISA) NATIONAL CYBERSECURITY PROTECTION SYSTEM (NCPS) A intrusion-prevention capabilities have been primarily provided through sole source contracts with internet service providers and a contract to provide basic intrusion-prevention services. In December 2015, Congress required DHS to make available for use by federal civilian agencies, certain capabilities, such as those provided by NCPS’s EA at approximately 93 percent of federal civilian agencies and departments and, in October 2018, CISA officials reported that NCPS was up to 95 percent, with mainly small and micro organizations remaining. CISA officials said they are working with the various agencies to migrate agency email to a cloud environment, but each department and agency requires a unique solution and coordination can be a challenge. In April 2019, CISA officials reported that if the program’s staffing gap is not addressed, the program may experience a delay in meeting mission requirements. CISA officials told GAO that the federal hiring process and DHS’s lengthy suitability screening process have made recruitment efforts challenging because qualified candidates often find other employment while waiting for these processes to be completed. In addition, CISA officials anticipate workforce challenges if, in the future, they are not able to use compensation flexibility for cybersecurity specialists. CISA officials reviewed a draft of this assessment and provided no comments. NEXT GENERATION NETWORKS PRIORITY SERVICES (NGN-PS) CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY (CISA) NGN-PS is intended to address an emerging capability gap in the government’s emergency telecommunications service, which prioritizes phone calls for select officials when networks are overwhelmed. CISA executes NGN-PS through commercial telecommunications service providers, which addresses the government’s requirements, as they modernize their own networks. Full operational capability for wireless capabilities delayed by 3 years to incorporate design changes in network. New program for acquisition of data and video capabilities to begin in fiscal year 2020. GAO last reported on this program in May 2018 (GAO-18-339SP). The NGN-PS program is developing and delivering prioritized voice capability in three increments: increment 1 maintains current priority service on long distance calls as commercial service providers update their networks; increment 2 delivers wireless capabilities; and increment 3 is intended to address landline capabilities. In October 2018, Department of Homeland Security (DHS) leadership granted the NGN-PS program acquisition decision event (ADE) 3 for increment 1. At that time, the program also declared full operational capability (FOC) for increment 1. Once operational, capabilities acquired by NGN-PS are transferred to CISA’s Priority Telecommunications Service program. In April 2018, DHS leadership approved a revised acquisition program baseline (APB) for NGN-PS and subsequently authorized the program to initiate development of increment 3. The previous APB included only costs and schedule milestones associated with increments 1 and 2. The revised APB modified the program’s cost and schedule goals to include goals for increment 3 and updates to cost goals previously established for increments 1 and 2. Specifically, the program’s total acquisition cost threshold increased by $68 million. This change reflects $144 million in additional costs to develop landline capabilities and a cost savings of approximately $100 million on previous increments, among other things. Program officials primarily attributed the cost savings on increment 1 to design changes implemented by a commercial service provider within its network. In addition, according to program officials, the increment 2 FOC goal was revised in the updated APB to allow additional time for a commercial service provider to incorporate design changes into its network. As a result, the FOC date for increment 2 slipped 3 years to December 2022. The program plans to achieve FOC for increment 3 in December 2025. The program updated its life-cycle cost estimate (LCCE) in February 2019. The updated LCCE includes operations and maintenance (O&M) costs, although the APB does not. Officials said this is not considered a breach because the O&M costs include staffing outside of O&M phase activities. Cybersecurity and Infrastructure Security Agency (CISA) NEXT GENERATION NETWORKS PRIORITY SERVICES (NGN-PS) In October 2018, DHS leadership approved the separation of the development of capabilities for data and video priority services into a new acquisition program. DHS leadership approved the decision because data and video capabilities are different than landline priority, and the addition of these capabilities would significantly extend the expected end date of the NGN-PS program. CISA officials anticipate establishing a preliminary baseline for the data and video capabilities in early fiscal year 2020. NGN-PS was established in response to an Executive Order requiring the federal government to have the ability to communicate at all times during all circumstances to address national security issues and manage emergencies. A Presidential Policy Directive issued in July 2016 superseded previous directives requiring continuous communication services for select government officials. According to CISA officials, the new directive validates requirements for the voice phase and was used to develop requirements for the data and video phase. In May 2019, the program reported four critical staffing vacancies, including two new positions. The program reported that it continues to have difficulty filling a systems engineer billet, which program officials attribute to the lengthy federal hiring process, DHS’s suitability screening process, and the fiscal year 2019 partial government shutdown. To mitigate the impact of the staffing gap on program execution, the program leverages contract support and staff from the Priority Telecommunications Service program. In addition to activities identified in this assessment, CISA officials stated that the program will continue planning for data and video priority in future budget years. CISA officials also said that service providers undergo annual network service verification testing and that the program is currently making progress in hiring for numerous positions. CISA officials also provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. HOMELAND ADVANCED RECOGNITION TECHNOLOGY (HART) HART will replace and modernize DHS’s legacy biometric identification system—known as IDENT—which shares information on foreign nationals with U.S. government and foreign partners to facilitate legitimate travel, trade, and immigration. The program plans to develop capabilities in four increments: increments 1 and 2 will replace and enhance IDENT functionality; increments 3 and 4 will provide additional biometric services, as well as a web portal and new tools for analysis and reporting. Program updated operational requirements document and revised its key performance parameters. Program is taking steps to address challenges as a result of a shortfall in staff with technical skillsets. GAO last reported on this program in May 2018 (GAO-18-339SP). In May 2019, DHS leadership approved a revised acquisition program baseline (APB) for the HART program, removing it from breach status, after the program experienced a schedule slip in June 2017. Specifically, the HART program declared a schedule breach when officials determined the program would not be able to meet its initial APB milestones. HART officials attributed the schedule slip to multiple delays in awarding the contract for increments 1 and 2 and a subsequent bid protest—which GAO denied. The program initiated work with the contractor in March 2018 and revised key acquisition documents, including its acquisition program baseline (APB) and life-cycle cost estimate (LCCE), to reflect program changes. For example, officials revised these documents to account for schedule delays and the contractor’s solution for enhanced biometric data storage. Specifically, the contractor plans to deliver services using a cloud-based solution rather than through DHS’s data centers. The HART performance work statement shows delivering services through the cloud provides greater flexibility to scale infrastructure supporting services at a lower cost. The program’s initial operational capability (IOC) date—when all customers will transition from using IDENT to HART—slipped 2 years to December 2020. This is a significant challenge because IDENT is at risk of failure and additional investments are necessary to keep the system operational. HART’s full operational capability (FOC) date—when the program plans to deploy enhancements of biometric services and new tools for analysis and reporting—slipped nearly 3 years to June 2024. HART’s total APB cost thresholds decreased by approximately $2 billion, which officials primarily attribute to the less expensive cloud-based solution and removal of IDENT upgrade costs, among other things. However, officials identified a risk that costs associated with the cloud-based solution could increase because technical requirements were not fully developed when the LCCE informing the revised APB was developed. As a result, HART is at risk for a future cost breach once these technical requirements are better defined. The affordability surplus from fiscal years 2020 through 2024 may be overstated because, according to officials, projected funding covers both IDENT and HART. HOMELAND ADVANCED RECOGNITION TECHNOLOGY (HART) In April 2019, following the passage of the Cybersecurity and Infrastructure Security Agency (CISA) Act of 2018, the transfer of CISA’s Office of Biometric Identity Management (OBIM)—which includes the HART program—to DHS’s Management Directorate was implemented. The transfer was informed by a working group including OBIM, DHS’s MGMT, and CISA subject matter experts. In June 2019, HART officials told GAO they are currently planning for increments 3 and 4, which will provide new and enhanced capabilities, analytics, and reporting, and additional biometric modalities and services, among other things. In June 2019, HART officials released a request for information for increments 3 and 4, which will inform the program’s acquisition plan and statement of work for a request for proposal. At the direction of DHS leadership, HART program officials coordinated with DHS’s Chief Technology Officer to assess the skills and functions of staff necessary to execute the program. In its August 2019 staffing plan, the program reported workforce risks, including a potential shortfall in staff with technical skillsets; however, officials stated that they are mitigating the shortfall, in part, by providing training activities for current staff. In June 2019, HART officials noted that the federal hiring process and DHS’s lengthy security clearance process have made recruitment efforts challenging. HART officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. LOGISTICS SUPPLY CHAIN MANAGEMENT SYSTEM (LSCMS) FEDERAL EMERGENCY MANAGEMENT AGENCY (FEMA) LSCMS is a computer-based tracking system that FEMA officials use to track shipments during disaster-response efforts. It is largely based on commercial-off- the-shelf software. FEMA initially deployed LSCMS in 2005, and initiated efforts to enhance the system in 2009. According to FEMA officials, LSCMS can identify when a shipment leaves a warehouse and the location of a shipment after it reaches a FEMA staging area near a disaster location. LSCMS found operationally effective and operationally suitable with limitations, but not cyber secure. Program transitioned to cloud data storage and plans to conduct annual cybersecurity testing. GAO last reported on this program in May 2018 (GAO-18- 339SP). In September 2019, Department of Homeland Security (DHS) leadership granted the program approval of acquisition decision event (ADE) 3 and acknowledged the program’s achievement of full operational capability (FOC). DHS leadership previously denied the program’s request for acquisition decision event ADE 3 and FOC approval until issues with the system’s backup server were resolved. Program officials reported that the program addressed these issues in August 2019. In November 2017, DHS leadership approved a revised acquisition program baseline (APB) after the LSCMS program experienced a schedule slip because of the 2017 hurricane season. FEMA officials said the need to deploy LSCMS personnel in support of response and recovery efforts during multiple hurricanes—Harvey, Irma, and Maria—jeopardized the program’s ability to complete all required activities as planned. Specifically, the program was unable to complete follow-on operational test and evaluation (OT&E) to achieve ADE 3 and FOC by its initially planned APB dates of September 2018 and December 2018, respectively. The program was able to retain most of its initial schedule by working with its operational test agent (OTA) to adjust the follow-on OT&E plan, which significantly reduced the scope of dedicated testing needed to complete follow-on OT&E. Specifically, the OTA collected operational data during the 2017 hurricane response efforts, which allowed them to assess approximately two-thirds of the performance measures required for follow-on OT&E. In December 2018, the program updated its life-cycle cost estimate (LCCE), which is within the program’s APB cost thresholds. The program’s operations and maintenance (O&M) costs decreased in part because the program plans to transition LSCMS data storage from a physical facility to a cloud environment. The updated LCCE also estimates costs for conducting technology refreshes annually instead of every 5 years, which FEMA officials said will make the program’s future funding needs more stable as the program moves into sustainment. Federal Emergency Management Agency (FEMA) LOGISTICS SUPPLY CHAIN MANAGEMENT SYSTEM (LSCMS) The LSCMS program previously experienced significant execution challenges because of prior poor governance. FEMA initially deployed the enhanced LSCMS in 2013 without DHS leadership approval, a DOT&E letter of assessment, or a DHS-approved APB documenting the program’s costs, schedule, and performance parameters, as required by DHS’s acquisition policy. DHS’s Office of Inspector General also found that neither DHS nor FEMA leadership ensured the program office identified all mission needs before selecting a solution. In response, DHS leadership paused all LSCMS development efforts in April 2014 until the program addressed these issues, among others. FEMA subsequently completed an analysis of alternatives and developed an APB based on this assessment. DHS leadership approved the program’s initial APB in December 2015 and authorized FEMA to resume all LSCMS development and acquisition efforts in March 2016. In July 2019, FEMA reported that the program had initiated the hiring process for its vacant positions. In July 2019, FEMA officials told GAO one of the positions had already been filled. According to FEMA officials, the program revised its methodology for completing its most recent staffing profile to reflect the current and future staffing needs of the program. FEMA officials said that the current staffing levels will not change significantly after the program achieves FOC, as there will be a continued need for regular updates to the system. FEMA officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. NATIONAL BIO AND AGRO-DEFENSE FACILITY (NBAF) SCIENCE AND TECHNOLOGY DIRECTORATE (S&T) The NBAF program is constructing a state-of-the-art laboratory in Manhattan, Kansas to replace the Plum Island Animal Disease Center. The facility will enable the Department of Homeland Security (DHS) and the Department of Agriculture (USDA) to conduct research, develop vaccines, and provide enhanced diagnostic capabilities to protect against foreign animal, emerging, and zoonotic diseases that threaten the nation’s food supply, agricultural economy, and public health. Program is on track to meet May 2021 initial operational capability date. DHS and USDA have developed a transition plan and are coordinating on commissioning efforts. GAO last reported on this program in May 2018 (GAO-18-339SP). The NBAF program was originally planned be a joint operation between DHS and USDA, with DHS taking the lead on construction and operation of the facility. However, the President’s budget request for fiscal year 2019 proposed transferring operational responsibility for NBAF, which includes operational planning and future facility operations, to USDA. In the Joint Explanatory Statement for the Consolidated Appropriations Act of 2018, congressional conferees specified that DHS would retain responsibility for completing construction of NBAF. As a result, DHS will continue to oversee and manage activities required to complete construction and achieve initial operational capability (IOC), which is facility commissioning. USDA will then be responsible for achieving full operational capability (FOC), including operational stand- up of the facility and all subsequent operations. The program’s acquisition program baseline (APB) has not yet been updated to reflect the change in responsibility for achieving FOC and to remove operational costs, which will now be budgeted for by USDA. NBAF officials said the transition introduces cost and schedule risks to the program because highly integrated activities—such as commissioning and operational stand-up—are now being managed by two different agencies, but DHS and USDA will continue to coordinate through the transition process. NBAF officials told GAO that construction activities thus far—such as pouring concrete for the main laboratory—have proceeded as anticipated and the program is on track to meet its APB cost and schedule goals through IOC, planned for May 2021. According to NBAF officials, the program has already received full acquisition funding for the facility construction efforts through federal appropriations and gift funds from the state of Kansas. The program previously planned to use operations and maintenance funding to support operational stand-up activities and awarded a contract for operational planning. However, beginning in fiscal year 2019, DHS will no longer request operations and maintenance funding for NBAF, as all such funding and activities will be the responsibility of USDA. Congressional conferees noted that $42 million in funding to USDA is to address operational stand-up activities and other initial costs to operate and maintain the facility. The Consolidated Appropriations Act of 2019 also authorized DHS to transfer personnel and up to $15 million in certain funds to USDA for contracts and associated support of the operations of NBAF. Science and Technology Directorate (S&T) NATIONAL BIO AND AGRO-DEFENSE FACILITY (NBAF) NBAF officials reported that they are coordinating with USDA officials, the commissioning agent, and federal regulators responsible for awarding the registrations needed for NBAF to conduct laboratory operations to determine how the final commissioning report will be structured to support FOC and federal certification to begin laboratory operations. In June 2019, DHS and USDA signed a memorandum of agreement that established plans to transfer NBAF operational responsibility from DHS to USDA. The memorandum establishes responsibilities related to costs and funding, requirements for establishing NBAF, and considerations for interagency coordination once NBAF is operational, among other things. For example, some USDA staff will participate in the NBAF commissioning process, but they will be integrated with DHS’s onsite construction oversight team to maintain the integrity of DHS’s existing oversight approach for the NBAF construction/ commissioning contract. The memorandum of agreement also states that DHS, in consultation with USDA, will plan for the appropriate timing and necessary mechanism to transfer identified DHS employees to USDA for NBAF activities. According to NBAF officials, DHS plans to transfer staff from both the Plum Island Animal Disease Center and the program’s on-site construction oversight team to USDA to preserve institutional knowledge. USDA was appropriated $3 million in the Consolidated Appropriations Act of 2018 to begin hiring NBAF operational staff and the memorandum of agreement notes that USDA will work with DHS to increase staffing in fiscal year 2019 as required by the construction commissioning schedule. In April 2019, the program’s staffing assessment was updated to reflect program needs from fiscal year 2019 through IOC. At that time, the NBAF officials reported that the program is fully staffed. NBAF officials reviewed a draft of this assessment and provided no comments. ADVANCED TECHNOLOGY (AT) TRANSPORTATION SECURITY ADMINISTRATION (TSA) The AT Program supports the checkpoint screening capability by providing capability to detect threats in the passenger’s carry-on baggage, including explosives, weapons, and other prohibited items. The AT-1 and AT-2 X-ray systems screen carry-on baggage providing threat detection capabilities for a wide range of threats. AT-2 Tier I and Tier II systems provide enhanced detection capabilities and improved image resolution. Computed technology (CT)—which offers enhanced three-dimensional imaging and detection capabilities over the currently deployed AT system—is also being procured through AT program. Both AT and CT units have experienced challenges achieving performance goals. Procurement and deployment of CT units will transfer to Checkpoint Property Screening System program. GAO last reported on AT as a part of the Passenger Screening Program in May 2018 (GAO-18- 339SP). In February 2018, Department of Homeland Security (DHS) leadership approved transitioning existing Passenger Screening Program (PSP) projects—including AT—into stand-alone programs to better align program office staffing to capabilities and focus on mitigating capability gaps, among other things. In fiscal year 2018, TSA determined that CT is the best technology available to address rapidly evolving threats in the transportation sector. As a result, TSA determined it would leverage the AT program to initiate the acquisition of CT systems. In December 2018, DHS leadership approved an acquisition program baseline (APB) for AT as a standalone program, which included cost and schedule goals for AT and CT that were presented separately. For AT, fiscal year 2018 and prior year costs were not included in the APB cost goals because those costs are considered sunk costs for PSP. AT does not have any acquisition costs because full operational capability for AT was achieved in 2016 under PSP. AT’s operations and maintenance (O&M) costs— which total $590 million—are related to maintaining AT-1 and AT-2 X-ray systems and incorporating upgrades to enhance detection capability and increase passenger volume through AT-2 Tier I and Tier II systems. When DHS leadership approved the APB, they also approved the acquisition decision event (ADE) 3—authorizing the procurement of CT units in fiscal year 2019 only. The APB includes acquisition costs for the fiscal year 2019 procurements but it does not identify any O&M costs for CT. In March 2019, DHS leadership acknowledged the AT program’s ADE 3 for AT-2 Tier II. The program previously achieved full operational capability (FOC) for AT-2, but ADE 3 was not achieved primarily because one the program’s key performance parameters (KPP) needed to be refined. The AT program’s surplus from fiscal years 2020-2024 may be overstated in DHS’s funding plan to Congress because costs associated with CT were not previously included in the AT cost estimate. However, the AT and CT costs in the affordability assessment are combined here. The purchase of CT units will become a separate acquisition for the fiscal year 2021 programming and budget cycle with an updated cost estimate. Transportation Security Administration (TSA) ADVANCED TECHNOLOGY (AT) TSA intends to transition the procurement and deployment of CT units, among other things, to the Checkpoint Property Screening System (CPSS), which, as of August 2019, had not yet been established. CPSS is a separate acquisition program that is intended to address capability gaps in passenger screening technologies. Through CPSS, TSA plans to eventually deploy CT to all checkpoints and replace AT X-ray technology. According to TSA officials, Automated Screening Lane (ASL) technologies have been managed by the AT program since March 2019. TSA is not incurring acquisition costs for ASLs, but the source of funding for O&M costs is unclear. DHS leadership directed TSA to begin tracking ASL maintenance and repairs to inform future budget requests, among other things. TSA officials stated that one of the program’s vacant positions has not yet been funded. To mitigate the staffing gap, TSA officials stated they are disbursing tasks among existing staff until the position is filled. TSA officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. CREDENTIAL AUTHENTICATION TECHNOLOGY (CAT) TRANSPORTATION SECURITY ADMINISTRATION (TSA) The CAT system is used to verify and validate passenger travel and identification documents prior to entering secure areas in airports. CAT reads data and security features embedded in identification documentation (ID), verifies security features are correct, and displays authentication results to the operator. The CAT system also verifies the passenger has the appropriate flight reservation to progress through security screening and enter the secure area, among other things. Program met its key performance parameters, but needs to address cyber resiliency and other issues. CAT system will require regular updates to address changes to state identification documentation. GAO last reported on CAT as part of the Passenger Screening Program in May 2018. (GAO-18-339SP). In February 2018, the Department of Homeland Security (DHS) approved transitioning existing Passenger Screening Program (PSP) projects, including CAT, into stand-alone programs to better align program office staffing to capabilities and focus on mitigating capability gaps, among other things. In December 2018, DHS leadership approved an acquisition program baseline (APB) for CAT as a stand-alone program. The APB reflected a revised testing and deployment strategy. Specifically, TSA no longer intends to pursue separate deployments of CAT for TSA Pre® and standard lanes. TSA concluded that the separate approach would extend the overall schedule to deploy CAT units to the field and was an inefficient use of resources. In February 2019, DHS leadership granted the program acquisition decision event (ADE) 3 for procurement and deployment of CAT units and acknowledged the program’s initial operational capability (IOC) based on the fielded units. TSA now plans to achieve full operational capability (FOC) in September 2022—more than 1 year earlier than previously planned for standard lanes, but 8 years later than initially planned under PSP. According to TSA officials, the program recently accelerated its deployment schedule to meet existing and emerging threats. The program developed an initial life-cycle cost estimate (LCCE) to inform the APB and ADE 3 and updated the estimate in June 2019 to inform the budget process. The program’s June 2019 LCCE reflects an O&M cost decrease of over $80 million, which TSA officials attribute to a reduction in enhancements needed to accelerate deployments. The program was not included in DHS’s funding plan to Congress for fiscal years 2020-2024 because the program is no longer expected to receive acquisition funding. TSA officials stated that they are working with TSA’s Chief Financial Officer and the CAT vendor to identify and mitigate any funding issues that may arise as the program moves into production. Transportation Security Administration (TSA) CREDENTIAL AUTHENTICATION TECHNOLOGY (CAT) TSA officials stated that CAT is expected to be TSA’s primary identification verification method by the end of fiscal year 2019. However, TSA officials said the CAT system will require regular updates to address changes to state IDs. In November 2018, TSA officials reported that states are in the process of adopting new requirements identified in the REAL ID Act of 2005. Among other things, the Act establishes minimum security standards for ID issuance and production, and prohibits federal agencies from accepting IDs from states not meeting these standards unless the Secretary of Homeland Security has granted the issuing state an extension of time to meet the requirements. TSA officials said that the current manual process of verifying a passenger’s ID against their boarding pass will be used if CAT units are unavailable and between system updates. In May 2019, the program reported two critical staffing vacancies. TSA officials reported that these positions have been filled. TSA officials reviewed a draft of this assessment and provided no comments. ELECTRONIC BAGGAGE SCREENING PROGRAM (EBSP) TRANSPORTATION SECURITY ADMINISTRATION (TSA) Established in response to the terrorist attacks of September 11, 2001, EBSP tests, procures, and deploys transportation security equipment, such as explosives trace detectors and explosives detection systems, across approximately 440 U.S. airports to ensure 100 percent of checked baggage is screened for explosives. EBSP is primarily focused on delivering new systems with enhanced screening capabilities and developing software upgrades for existing systems. Follow-on testing completed in January 2019; initial results show improvement in effectiveness. EBSP is pursuing a new procurement strategy for two types of detection systems. GAO last reported on this program in May 2018 (GAO-18-339SP). In August 2019, TSA declared a cost breach of EBSP’s current acquisition program baseline (APB) due to increased maintenance costs. The program previously revised its APB in May 2016 to account for budget reductions and to implement the program’s strategy to prioritize funding to extend the life of screening technologies, among other things. TSA has implemented these changes through ongoing maintenance and system upgrades, to include detection algorithm updates. DHS officials reported that this strategy has improved security effectiveness and operational efficiencies at a lower cost than replacing legacy systems with new systems. However, this approach increased the number of systems that are out-of-warranty and increased the maintenance needed to sustain these systems. This new strategy, coupled with increased maintenance activities, resulted in an operations and maintenance (O&M) cost increase exceeding the program’s APB O&M cost threshold. As of September 2019, the program’s revised APB, which TSA officials said will address the O&M cost increase, had not yet been approved. In January 2018, DHS leadership approved the program’s request to deploy an explosives detection system with an advanced threat detection algorithm. TSA officials reported that they achieved initial operational capability (IOC) of these systems in February 2018; this is the program’s final APB milestone. TSA leadership subsequently approved the program to deploy detection algorithm updates to fielded systems. Based on the program’s July 2019 life-cycle cost estimate (LCCE), the program is projected to face an acquisition funding gap of $29 million over the 5-year period. However, the program’s total projected funding gap, including O&M, is expected to be approximately $223 million. TSA officials told GAO that one of their primary challenges is funding, and that to mitigate anticipated funding gaps, the program may shift other projects from one fiscal year to another or cancel them altogether. Transportation Security Administration (TSA) ELECTRONIC BAGGAGE SCREENING PROGRAM (EBSP) As of July 2019, EBSP has 1,678 explosives detection systems and 2,477 explosives trace detectors deployed nationwide. In February 2018, DHS leadership approved the program’s updated acquisition plan, which reflects a new procurement strategy. Under the new procurement strategy, the program will transition from procuring systems with different sizes and speeds to two types: (1) inline systems that integrate with a baggage handling system and are linked through a network, and (2) stand-alone systems that may be integrated with a baggage handling system, but not linked to a network. In addition, TSA officials reported that the new strategy reflects updates to EBSP’s vendor qualification process, which is intended to improve collaboration with vendors so they can develop more technically mature systems. In March 2018, DHS leadership approved a pilot effort in which TSA’s Chief Acquisition Executive (CAE) provides oversight of changes to deployed systems, including algorithm updates. According to TSA officials, this process is intended to limit some steps in the formal oversight process so capabilities can be deployed more rapidly. DHS leadership plans to assess this pilot process to determine its effectiveness. In May 2019, the program reported that the five vacant positions impact the program’s performance and execution schedules at times. To mitigate the staffing gap, program officials said that current staff are temporarily assuming additional duties. TSA officials stated that issues identified in DOT&E assessments were corrected, and that follow-on test activities were conducted and resulted in favorable evaluations and capability deployment. TSA officials also provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. TECHNOLOGY INFRASTRUCTURE MODERNIZATION (TIM) TRANSPORTATION SECURITY ADMINISTRATION (TSA) The TIM program was initiated to address shortfalls in TSA’s threat assessment screening and vetting functions by providing a modern end-to-end credentialing system. The TIM system will manage credential applications and the review process for millions of transportation workers and travelers by supporting screening and vetting for Transportation Worker Identification Credential (TWIC) and TSA Pre®. Program achieved full operational capability for TWIC and TSA Pre® capabilities. Program met its four key performance parameters. GAO last reported on this program in May 2018 and October 2017 (GAO-18-339SP, GAO-18-46). In November 2018, Department of Homeland Security (DHS) leadership approved the TIM program’s request to descope and change its definition of full operational capability (FOC) to include only the TWIC and TSA Pre® capabilities. By the time TIM had fully delivered capabilities for TWIC and TSA Pre®, TSA had made ongoing updates and improvements to the remaining legacy vetting and credentialing systems to meet security and mission demands, which had also sufficiently met end user needs. According to TSA officials, any additional system development would produce redundant functionality. Going forward, the program plans to continue to modernize the legacy systems and to achieve additional efficiencies. The program updated its key acquisition documents, including its acquisition program baseline (APB) and life-cycle cost estimate (LCCE) to reflect the change in scope. In July 2019, DHS leadership approved program’s revised APB. DHS leadership granted the program acquisition decision event (ADE) 3 and acknowledged the program’s achievement of FOC—fulfilling TSA Pre® and TWIC mission needs for vetting and credentialing—in August 2019. DHS leadership previously approved a revised APB for the TIM program in September 2016. Prior to the approval of the program’s 2016 APB, DHS leadership paused new development for 22 months after the program breached its APB goals for various reasons including technical challenges. In July 2019, DHS headquarters conducted an independent cost assessment to inform ADE 3, which TSA adopted as the program’s LCCE. The revised LCCE reflected the program’s reduced scope. The program’s APB acquisition cost goal decreased by nearly $220 million from the program’s 2016 APB. The reduction in costs is primarily attributed to the reduction in the program’s scope. However, the program’s operations and maintenance APB cost goals increased by $205 million primarily due to maintenance of legacy systems to address user needs. Transportation Security Administration (TSA) TECHNOLOGY INFRASTRUCTURE MODERNIZATION (TIM) In October 2017, GAO found that TSA had not fully implemented several leading practices to ensure successful agile adoption. GAO also found that TSA and DHS needed to conduct more effective oversight of the TIM program to reduce the risk of repeating past mistakes. DHS concurred with all 14 GAO recommendations to improve program execution and oversight, and identified actions DHS and TSA can take to address them. As of September 2019, TSA addressed all but one recommendation— to ensure DHS leadership reached consensus on, documented, and implemented oversight and governance changes for agile program reviews. TSA reported a critical staffing gap of four FTEs in 2019, including a manager position to adapt initiatives to agile business and development processes. TSA officials stated that the staffing gap has had minimal impact on program execution. To mitigate the gap, the program is leveraging support from contractors and matrixed staff. TSA officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. FAST RESPONSE CUTTER (FRC) UNITED STATES COAST GUARD (USCG) The USCG uses the FRC to conduct search and rescue, migrant and drug interdiction, and other law enforcement missions. The FRC carries one cutter boat on board and is able to conduct operations in moderate sea conditions. The FRC replaces the USCG’s Island Class patrol boat and provides improved fuel capacity, surveillance, and communications interoperability with other Department of Homeland Security (DHS) and Department of Defense assets. FRC found operationally effective and suitable, and all key performance parameters validated. Defect in ship structure found, requiring changes in production and retrofits to cutters already delivered. GAO last reported on this program in May 2018 and March 2017 (GAO-18-339SP, GAO-17-218). The FRC program is on track to meet its current cost and schedule goals. USCG officials told GAO the program is revising its acquisition program baseline (APB) in 2019 to reflect an increase in FRCs. The USCG previously planned to acquire 58 FRCs and, as of August 2019, 35 had been delivered and another 21 were on contract. However, in fiscal years 2018 and 2019, congressional conferees supported funds for the acquisition of 4 additional FRCs to begin replacing 6 cutters currently operating in the Middle East. To account for the increase of up to 6 additional FRCs, USCG officials stated that they are revising the program’s acquisition documents and anticipate completing these updates by the end of calendar year 2019. To inform the budget process, the program updated its life-cycle cost estimate in June 2019 to reflect the additional 4 cutters that have been funded. The updated estimate remains within the program’s current APB cost thresholds. USCG officials stated that the contractor—Bollinger Shipyards LLC—is meeting the program’s current delivery schedule and the program is on track to achieve full operational capability (FOC) for the original 58 cutters by March 2027, as planned. However, the program’s FOC date will likely be extended to account for the delivery of the additional cutters in the revised APB. The program’s initial operational capability (IOC) date previously slipped due to a bid protest related to the program’s initial contract award—now known as the phase 1 contract—and the need for structural modifications. USCG officials attributed a subsequent 5-year slip in the program’s FOC date to a decrease in annual procurement quantities under the phase 1 contract. In May 2014, the USCG determined that it would procure only 32 of the 58 FRCs through this contract and initiated efforts to conduct full and open competition for the remaining 26 vessels— known as phase 2. In May 2016, the USCG awarded the phase 2 contract to Bollinger Shipyards LLC for the remaining 26 FRCs. Under the phase 2 contract, the USCG can procure 4 to 6 FRCs per option period. For fiscal year 2019, the USCG reported that it exercised an option for 6 FRCs. According to USCG officials, the phase 2 contract will need to be modified to increase the total quantity allowed under the current contract and account for the additional FRCs, but as of July 2019 the modifications had not been made. United States Coast Guard (USCG) FAST RESPONSE CUTTER (FRC) The USCG continues to work with Bollinger Shipyards LLC to address issues covered by the warranty and acceptance clauses for each ship. For example, in the fall of 2017, USCG officials reported identifying a latent defect that would affect the FRC’s ability to achieve its intended 25-year structural fatigue life. USCG officials said cracks were found in the interior steel structure of two FRCs, prompting a class-wide inspection. Upon further analysis, the USCG determined that the fatigue issues were due to faulty design assumptions and identified 12 areas of structural weakness that will require reinforcements to the ship’s interior steel structure. In response, USCG officials stated that the contractor developed corrective actions—ranging in complexity from adding bracket supports to removing and replacing large sections of steel—that have been approved by the USCG. USCG officials further stated that corrections are being incorporated during production, but FRCs that have already been delivered will need to be retrofitted during regular maintenance periods, scheduled through 2025. These officials added that these defects do not affect current operations. In addition, the contractor is undertaking retrofits for nine of the 10 engine issues covered by the warranty that are affecting the fleet—such as leaking exhaust pipes—and a prototype solution for the remaining issue is being assessed. As of June 2019, USCG officials reported the FRC’s warranty has resulted in $123 million in cost avoidance. In July 2019, USCG officials stated they had filled the one critical staffing gap and were in the process of hiring staff to address the remaining staffing gaps. USCG officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. H-65 CONVERSION/SUSTAINMENT PROGRAM (H-65) UNITED STATES COAST GUARD (USCG) The H-65 aircraft is a short-range helicopter that the USCG uses to fulfill its missions, including search and rescue, ports and waterways security, marine safety, and defense readiness. The H-65 acquisition program consists of eight discrete segments that incrementally modernize the H-65 aircraft fleet. The program is currently focused on the service life extension program (SLEP) and upgrades to the automatic flight control system (AFCS) and avionics. H-65 aircraft failed to meet two key performance parameters in testing; has not yet tested cyber resiliency. Program to synchronize upgrades into scheduled maintenance periods. GAO last reported on this program in May 2018 (GAO-18-339SP). In March 2018, Department of Homeland Security (DHS) leadership approved the program’s revised acquisition program baseline (APB), removing it from breach status, which USCG officials primarily attributed to underestimating the technical effort necessary to meet requirements. DHS leadership also granted the program approval for ADE 2C for low-rate initial production of the avionics and AFCS upgrades and ADE 2B for the addition of a SLEP. The SLEP is expected to extend the flight hour service life of each aircraft from 20,000 flight hours to 30,000 flight hours by replacing obsolete aircraft components. USCG officials stated the USCG plans to operate the H-65 aircraft until 2039 so that the USCG can prioritize funding for the Offshore Patrol Cutter. The USCG also plans to align its next helicopter acquisition effort with the Department of Defense’s future vertical lift acquisition plans. The program’s current APB reflects the restructured program schedule which synchronizes the SLEP with the avionics and AFCS upgrades. Specifically, the new program structure calls for completing the SLEP and upgrades to AFCS and avionics during the same scheduled maintenance period. This structure allows the USCG to leverage accessibility of components the program intends to replace as part of the SLEP while the aircraft is being assembled to accommodate the avionics and AFCS upgrades. As a result, USCG officials reported that the program will avoid some labor costs and will reduce the risk of damaging AFCS and avionics components which would need to be removed during the SLEP. In its current APB the program’s full operational capability (FOC) date was extended by nearly 2 years to September 2024, primarily to incorporate the SLEP. The program’s total life-cycle cost threshold decreased by approximately $200 million from its March 2014 APB, which USCG officials attributed to decreased labor costs, among other things. USCG officials told GAO they were in the process of updating the program’s key acquisition documents to inform the program’s ADE 3 decisions for full rate production of the avionics and AFCS upgrades and the SLEP. In July 2019, USCG officials said they do not plan to update the program’s APB for the upcoming ADEs because the program is on track and does not require changes to its cost, schedule, or performance goals. United States Coast Guard (USCG) H-65 CONVERSION/SUSTAINMENT PROGRAM (H-65) The USCG awarded contracts to Rockwell Collins—the original equipment manufacturer of the legacy AFCS and avionics—for continued development of the AFCS and avionics upgrades in July 2016 and March 2017, respectively. USCG officials said they expect delivery of the upgrades to the fleet in May 2020. USCG officials said there is risk involved with extending the aircrafts’ service life beyond 20,000 flight hours since it has never been done by other agencies that operate the H-65. USCG officials stated that the aircraft manufacturer, Airbus, assisted the USCG’s chief aeronautical engineer in identifying parts that need replacement. As part of the program’s revised acquisition strategy, the USCG plans to synchronize the SLEP with the avionics and AFCS upgrades and conduct this work during the programmed depot maintenance cycles in fiscal years 2020 through 2024. USCG officials reported that this strategy allows the program to leverage the engineering and program management contractors already in place and ensures SLEP component availability before production support from Airbus ends in 2018. In April 2019, the USCG reported the program had one critical staffing gap—a deputy program manager. USCG officials reported the program filled the position in August 2019. USCG officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. LONG RANGE SURVEILLANCE AIRCRAFT (HC-130H/J) UNITED STATES COAST GUARD (USCG) The USCG uses HC-130H and HC-130J aircraft to conduct search and rescue missions, transport cargo and personnel, support law enforcement, and execute other operations. Both aircraft are quad-engine propeller-driven platforms. The HC-130J is a modernized version of the HC-130H, which has advanced engines, propellers, and equipment that provide enhanced speed, altitude, range, and surveillance capabilities. Design of new mission system processor is complete; USCG officials reported all key performance parameters met. Transfer of surplus HC-130H aircraft to other agencies delayed. GAO last reported on this program in May 2018 (GAO-18-339SP). As of July 2019, the USCG has yet to complete a more than 4-year effort to revise the acquisition program baseline (APB)—to account for significant program changes. Specifically, the USCG decided to pursue an all HC-130J fleet and, in fiscal year 2014, Congress directed the transfer of 7 HC-130H aircraft to the U.S. Air Force. The USCG was in the process of upgrading these aircraft but canceled further HC-130H upgrades. In September 2017, Department of Homeland Security (DHS) leadership directed the USCG to submit the revised APB by January 2018. As of July 2019, USCG officials had revised key acquisition documents such as the program’s life-cycle cost estimate (LCCE) and operational requirements document (ORD)—which will inform the program’s revised APB—but USCG officials told GAO the APB is not expected to be approved until August 2019. USCG officials said the re-baseline has been delayed, in part, because Congress directed the USCG to conduct a multi-phased analysis of its mission needs. In November 2016, the USCG submitted the results of its analysis for fixed-wing aircraft, which confirmed the planned total quantity of 22 HC-130J aircraft and an annual flight-hour goal of 800 hours per aircraft. The results of the analysis are reflected in the program’s revised LCCE, which DHS approved in June 2019. However, the USGC plans to decommission the HC-130H fleet by the end of fiscal year 2022, which may result in a capability gap since the program’s revised LCCE indicates that the fleet will consist of only 14 HC-130J aircraft in fiscal year 2022. In addition, the program’s revised ORD includes a full operational capability (FOC) date—when all 22 aircraft are operational and assigned to USCG air stations—of September 2033. The revised FOC date is more than 6 years beyond the program’s current threshold date of March 2027. GAO previously reported that the program was at risk of not meeting its previously planned FOC date because the USCG had not requested adequate funding. The program’s revised LCCE acquisition costs decreased in part because costs associated with the initially planned HC-130H improvements were removed. However, the program’s operations and maintenance costs increased by over $800 million over the program’s previous estimate, which is primarily attributed to a 13-year increase in the life expectancy of the HC-130J aircraft. United States Coast Guard (USCG) LONG RANGE SURVEILLANCE AIRCRAFT (HC-130H/J) In December 2013, Congress directed the transfer of seven HC-130H aircraft to the U.S. Air Force for modifications—which consist of upgrades and installing a fire retardant delivery system—and subsequent transfer to the U.S. Forest Service. This direction factored into the USCG’s decision to pursue an all HC-130J fleet. However in August 2018, Congress directed that the U.S. Air Force transfer the modified aircraft to the state of California, Natural Resources Agency, for use by the Department of Forestry and Fire Protection. USCG officials reported seven aircraft will be transferred to the state of California, Natural Resources Agency, and the USCG does not plan to retain the surplus aircraft. As of July 2019, no HC-130H aircraft have been transferred. The USCG plans to procure a total of 22 HC-130Js. In July 2019, USCG officials reported 13 HC-130J aircraft had been delivered and USCG had awarded contracts for three more. At that time, the USCG also had 14 HC-130Hs in its inventory. The USCG planned to remove four of the HC-130Hs from service in 2019 as HC-130Js and C-27Js are delivered. USCG officials said the program is not experiencing any workforce issues as a result of its staffing gap. The program filled the one critical vacancy in August 2019 and is in the process of hiring staff to fill an additional vacancy. USCG officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. MEDIUM RANGE SURVEILLANCE AIRCRAFT (HC-144A/ C-27J) UNITED STATES COAST GUARD (USCG) The USCG uses HC-144A and C-27J aircraft to conduct all types of missions, including search and rescue and disaster response. All 32 aircraft—18 HC-144A aircraft and 14 C-27J aircraft—are twin-engine propeller driven platforms. The interior of both aircraft are able to be reconfigured to accommodate cargo, personnel, or medical transports. New mission system processor installed on five HC-144A aircraft. Program challenges related to purchasing spare parts and accessing technical data are improving. GAO last reported on this program in May 2018 (GAO-18- 339SP). In April 2019, Department of Homeland Security (DHS) leadership approved a change to the program’s current acquisition program baseline (APB) to adjust the program’s schedule milestones as a result of the fiscal year 2019 partial government shutdown. USCG officials told GAO that delays in funding limited contracted work for the program during the shutdown. USCG officials stated that the program could not recover from the lost time and, in response, DHS leadership authorized the program’s request for a 3-month extension on the program’s future APB milestones. The current APB was approved in August 2016 to reflect the restructuring of the HC-144A acquisition program. The USCG initially planned to procure a total of 36 HC-144A aircraft, but reduced that number to the 18 it had already procured after Congress directed the transfer of 14 C-27J aircraft from the U.S. Air Force to the USCG in fiscal year 2014. The program’s APB divides the program into two phases. Phase 1 includes acceptance of the 18 HC-144A aircraft and upgrades to the aircraft’s mission and flight management systems. Phase 2 includes acceptance of and modifications to the C-27J aircraft to meet the USCG’s mission needs. In July 2019, USCG officials said that the program had completed upgrades on five HC-144A aircraft and plans to complete upgrades on all HC-144As by September 2021. For phase 2, the USCG has accepted all 14 C-27Js from the U.S. Air Force and plans to complete the modification of these aircraft by June 2025 to achieve full operational capability (FOC). To inform the budget process, in June 2019 the program updated its life-cycle cost estimate (LCCE), which is within its current APB cost thresholds. The program’s total life-cycle cost decreased by approximately $115 million. USCG officials attribute the decrease to refinement of the cost estimate based on actual costs, changes to the schedule for the mission system upgrades, and a delay in operating missionized C-27Js—which reduces the total estimated aircraft flight hours—among other things. USCG officials said that they plan to delay operation of missionized C-27Js to ensure adequate logistics support is available for the aircraft. In addition, congressional conferees supported $18 million in fiscal year 2018 for the USCG to purchase a flight simulator for training purposes. According to USCG officials, prioritizing the procurement of the flight simulator in fiscal year 2018 addressed C-27J training needs and provided over $15 million in cost savings for the program. United States Coast Guard (USCG) MEDIUM RANGE SURVEILLANCE AIRCRAFT (HC-144A/C-27J) GAO previously found that the program faced challenges purchasing spare parts and accessing technical data for the C-27J, which was affecting the USCG’s ability to transition the aircraft into the fleet. USCG officials told GAO that these issues are improving. Specifically, they stated that program awarded two contracts for spare parts to third-party suppliers in early 2018 and purchased spare parts in bulk in 2017 to maintain the fleet. In July 2019, USCG officials said the program has been able to stock sites well enough to keep assets available for use, and will continue to work with the contractors to address the issue. USCG officials said that a contract was awarded to the original equipment manufacturer in April 2017 that allows the USCG appropriate rights to the technical data. Also, in August 2019, USCG officials told GAO they received all C-27J technical data in the Air Force’s possession, including operations and maintenance manuals, as part of the transfer of 14 C-27J aircraft from the Air Force to the Coast Guard. USCG officials told us that the program updated its acquisition plan in February 2018 to incorporate the procurement of a new full-motion flight simulator training device for the C-27J aircraft. The USCG received funding to purchase a flight simulator in fiscal year 2018 and plans to begin instructor training on the device in August 2019. In July 2019, USCG officials told GAO that the program’s staffing is not negatively impacting program execution. USCG officials explained that they have filled four of the program’s reported staffing vacancies and plan to fill the remaining position soon. USCG officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. NATIONAL SECURITY CUTTER (NSC) UNITED STATES COAST GUARD (USCG) The USCG uses the NSC to conduct search and rescue, migrant and drug interdiction, environmental protection, and other missions. The NSC replaces and provides improved capabilities over the USCG’s High Endurance Cutters. The NSC carries helicopters and cutter boats, provides an extended on-scene presence at forward deployed locations, and operates worldwide. Follow-on operational testing was completed in 2018, but unmanned aerial surveillance aircraft testing was delayed. The USCG continues to address issues identified with the NSC propulsion system. GAO last reported on this program in May 2018 and April 2017 (GAO-18-339SP, GAO-17- 218). In November 2017, Department of Homeland Security (DHS) leadership approved a revised acquisition program baseline (APB), which accounted for the addition of a ninth NSC to the program of record. The USCG originally planned to acquire eight NSCs; however, in fiscal year 2016 Congress appropriated funds specifically for the production of a ninth NSC. Congressional conferees subsequently included in fiscal year 2018 $540 million and $635 million to be immediately available and allotted to contract for production of a 10th NSC and purchase of long lead time materials and production of an 11th NSC, respectively. According to USCG officials, the USCG awarded a contract to produce the ninth NSC in December 2016 and awarded a production contract for the 10th and 11th NSCs in December 2018. As of August 2019, eight NSCs have been delivered and the remaining three NSCs are under contract for production. USCG officials reported that the program is currently on track to meet its current APB schedule and anticipate delivery of the ninth NSC in September 2020. However, the program’s full operational capability (FOC) date is expected to be extended until 2024 as a result of the anticipated delivery of the 11th NSC in January 2024. According to USCG officials, the program’s acquisition documentation, including the APB, is being revised to reflect the additional NSCs and these updates are expected to be complete by July 2020. To inform the budget process, the program updated its LCCE to include the 10th and 11th NSCs. As a result, the program’s life-cycle costs exceed the current APB thresholds. Despite this cost growth, the program’s total life-cycle cost is still less than the program’s initial estimate for eight ships. USCG officials attribute the overall decrease to more accurate estimates and reduced operations and maintenance (O&M) costs. The program’s current APB cost thresholds already reflect cost growth that occurred earlier in the program, when the program implemented several design changes to address equipment issues. As of September 2017, 12 equipment systems had design changes, which USCG estimated cost over $260 million. This work includes structural enhancements on the first two NSCs and the replacement of the gantry crane, which aids in the deployment of cutter boats. United States Coast Guard (USCG) NATIONAL SECURITY CUTTER (NSC) According to program officials, the USCG relies on the Navy to request funding for and provide certain systems on the NSC such as the Close In Weapon System, which includes a radar-guided gun used to protect against anti-ship cruise missiles. USCG officials reported that some of these Navy systems may not be available in time to support the production of the ninth, 10th and 11th NSCs, since these cutters were unplanned additions to the NSC program and the Navy had not included funding for some of these systems in its budget requests. According to program officials, they are working with the Navy to identify options to mitigate this issue. Officials stated that an option being considered is constructing the NSCs with space available for the Navy equipment to be installed after delivery. USCG officials said the program’s staffing vacancies had not negatively affected program execution and, as of September 2019, all three vacancies had been filled. The program’s staffing profile represents staffing requirements through NSC 11, and USCG officials reported that the program office would need to reassess future staffing requirements if the USCG acquires additional NSCs. USCG officials stated that with the exception of small unmanned aerial surveillance aircraft, follow-on OT&E testing is completed. Additional testing are planned in fiscal year 2020. A comprehensive update of the program’s LCCE is being drafted to reflect costs of the 10th and 11th NSC. The program will base the cost goals of the next revision to the APB on this update. The next revision of the APB will include a revised FOC date based on delivery of the 11th NSC in January 2024. USCG officials also provided technical comments on a draft assessment, which GAO incorporated as appropriate. OFFSHORE PATROL CUTTER (OPC) UNITED STATES COAST GUARD (USCG) The USCG plans to use the OPC to conduct patrols for homeland security, law enforcement, and search and rescue operations. The OPC is being designed for long-distance transit, extended on-scene presence, and operations with deployable aircraft and small boats. It is intended to replace the USCG’s aging Medium Endurance Cutters (MEC) and bridge the operational capabilities provided by the Fast Response Cutters and National Security Cutters. Shipyard sustained damage in Hurricane Michael, expected to result in program cost and schedule changes. USCG assessing the effects from hurricane and plans to identify a path forward in early fiscal year 2020. GAO last reported on this program in May and July 2018 (GAO-18-339SP, GAO-18-629T). In May 2018, the Department of Homeland Security (DHS) approved a revised life-cycle cost estimate (LCCE) for the OPC program, which officials said reflects a refinement of the OPC design and planned systems—including a weight increase of 27 percent—and the incorporation of actual contract data, among other things. The USCG is not reporting a cost increase because the amount of OPC acquisition costs that the program plans to fund, approximately $10.3 billion, remains within the program’s acquisition program baseline (APB) cost thresholds. However, the revised LCCE included a shift of some costs that were previously planned to be funded by the program to other sources, such as other parts of the USCG or the U.S. Navy. This government-furnished equipment, which is now estimated to cost nearly $2 billion, will largely be funded by the U.S. Navy, according to USCG officials. Overall, the total program acquisition costs increased by approximately $1.7 billion from the previous estimate. In October 2018, the shipbuilder, Eastern Shipbuilding Group, suffered damage as a result of Hurricane Michael. The shipbuilder reported to the USCG in May 2019 that it can no longer afford the estimated costs associated with the OPC contract without assistance from the government. In January 2019, the shipbuilder resumed construction of the lead ship, but the damages sustained have resulted in a long-term degradation of their ability to produce the OPCs at the previously estimated cost and schedule. The shipbuilder has projected hundreds of millions of dollars in increased contract costs—which it attributes to anticipated skilled labor shortages and a loss of production efficiencies—and a 9- to 12-month delivery delay for each of the first nine ships. Despite these anticipated cost increases and schedule delays, as of July 2019, USCG officials said they had not formally notified DHS leadership of a potential cost or schedule breach because they are continuing to assess how to move forward. DHS leadership granted the program a 3-month extension to achieve its acquisition decision event (ADE) 2C in December 2019 to mitigate impacts from the fiscal year 2019 partial government shutdown. USCG officials said they are preparing for the ADE 2C, but also are using the additional time to assess the shipbuilder’s report, analyze estimates, and determine a path forward by early fiscal year 2020. United States Coast Guard (USCG) OFFSHORE PATROL CUTTER (OPC) According to USCG program officials, they have established a team with representatives from DHS, USCG, and the U.S. Navy to assess the impact of Hurricane Michael and determine a way forward. As part of its assessment, these officials said they are evaluating a number of options, including modifications to the original contract. Regardless of the path forward, USCG officials stated the program will likely need congressional approval of the contracting strategy and financial resources necessary to execute the new plan. USCG officials stated that DHS leadership will review the program’s status and determine whether to authorize the construction of OPC 2 and the purchase of initial materials needed for OPC 3 at the program’s ADE 2C. USCG officials stated that they anticipate the exercise of a contract option for the construction of OPC 2 and the materials for OPC 3 will be delayed as the program and shipbuilder continue to assess the impact of the hurricane on OPC production. The OPC program is continuing to increase staffing as the program matures and production activities increase. In July 2019, USCG officials said the program has a staffing gap of five FTEs, none of which are critical. Officials said they were in the process of hiring staff to fill these positions. USCG officials provided technical comments on a draft of this assessment, which GAO incorporated as appropriate. POLAR SECURITY CUTTER (PSC) UNITED STATES COAST GUARD (USCG) The PSC program—formerly designated as the Heavy Polar Icebreaker—is intended to assist the USCG in maintaining access to Arctic and Antarctic polar regions. The USCG requires its icebreaking fleet to conduct multiple missions, including defense readiness; marine environmental protection; ports, waterway, and coastal security; and search and rescue. The USCG plans to acquire three PSCs to recapitalize its heavy polar icebreaker fleet, which currently consists of one operational ship. DHS identified three critical technologies in its June 2019 technology readiness assessment of the program. Program awarded a $750 million detail design and construction contract to VT Halter Marine in April 2019. GAO last reported on this program in May and September 2018 (GAO-18-339SP, GAO-18- 600). In January 2018, Department of Homeland Security (DHS) leadership approved the program’s initial acquisition program baseline (APB), establishing cost, schedule, and performance goals. The program achieved a combined acquisition decision event (ADE) 2A/2B in February 2018, which authorized the initiation of development efforts. However, in September 2018, GAO found that the program’s schedule and cost estimates are optimistic. Specifically, GAO found that the program’s planned delivery dates are not informed by a realistic assessment of shipbuilding activities. Instead, the schedule is driven by the potential gap in icebreaking capabilities once the USCG’s only operational heavy polar icebreaker reaches the end of its service life. As a result, the program is at risk of experiencing schedule delays. Similarly, GAO found that the program’s life-cycle cost estimate (LCCE) adheres to most cost estimating best practices but is not fully reliable. This was due, in part, to the cost estimate not quantifying the range of possible costs over the entire life of the program. As a result, the program is at risk of costing more than estimated. In April 2019, the program awarded a $746 million contract to VT Halter Marine for the detail design and construction of the lead PSC. According to USCG officials, the program is revising both the program schedule and cost estimate with information from the shipbuilder. For example, delivery of the lead ship in the awarded contract is anticipated in May 2024—2 months after the program’s APB threshold date. In addition, the program updated its LCCE in June 2019 to inform the budget process, but this estimate does not reflect cost changes as a result of the contract award. USCG officials acknowledged the schedule and cost risks identified by GAO and plan to address these risks as part of the acquisition documentation updates. From 2013 through 2019, the program received $1.035 billion in funding—$735 million in USCG appropriations and $300 million in Navy appropriations. USCG officials stated that the lead ship is fully funded but any funding gaps in the future may result in delays to delivery of the two follow-on ships. United States Coast Guard (USCG) POLAR SECURITY CUTTER (PSC) The USCG established an integrated program office and ship design team with the Navy and, in 2017, DHS, the USCG, and the Navy entered into several agreements that outline major roles and responsibilities, including the Navy’s role in contracting on behalf of the Coast Guard. The ship design team provided technical oversight for the development of the PSC’s concept designs, which the USCG used to inform the ship’s specifications and program’s life-cycle cost estimate. According to USCG officials, as of July 2019, the USCG and the Navy established a project residence office of three staff at the shipbuilder’s facility in Pascagoula, Mississippi to provide oversight of shipbuilding efforts. In April 2019, USCG reported that it is increasing the required staffing level for the program as it matures, with 5 FTEs added in fiscal year 2019. According to program officials, as of July 2019, three of these five vacancies—including the commanding officer and executive officer of the project resident office—have been filled. USCG officials said the remaining positions were being addressed by active duty USCG staff and through the civilian hiring process. In September 2018, GAO made six recommendations to DHS, the USCG, and the Navy to address risks GAO identified with the PSC program. As of August 2019, three of the six recommendations remain open. USCG officials stated that the PSC program awarded a contract for the detail design and construction of up to three cutters to VT Halter Marine in April 2019—ahead of schedule. USCG officials added that the program has either addressed or is in the process of addressing all of GAO’s recommendations contained in GAO-18-600, including an update to the schedule and cost estimate to reflect the award to VT Halter Marine. USCG officials also provided technical comments on a draft assessment, which GAO incorporated as appropriate. UNITED STATES CITIZENSHIP AND IMMIGRATION SERVICES (USCIS) The Transformation program was established in 2006 to transition USCIS from a fragmented, paper-based filing environment to a consolidated, paperless environment for electronically processing immigration and citizenship applications. The program is delivering system capability through releases that either deploy electronic, web-based application forms or improve system functionality. Program revised key performance parameters to reflect the program’s new baseline. Program reorganized to leverage USCIS expertise and focus on system functionality. GAO last reported on this program in May 2018 and July 2016 (GAO-18-339SP, GAO-16- 467). In June 2018, Department of Homeland Security (DHS) leadership approved Transformation’s revised acquisition program baseline (APB) and subsequently removed the program from breach status—lifting a strategic pause that had limited new program development for 18 months. The program experienced a schedule breach in September 2016 when it failed to upgrade to USCIS’s application processing information system to include applications for naturalization. The new baseline modified the program’s cost, schedule, and performance parameters and reflects changes to the way the program delivers capabilities and a new acquisition strategy. Specifically, the new APB revised the scope of the Transformation program to focus on improving functionality—such as application processing time. Under the prior strategy, the program was focused on adding new applications or forms—from four separate lines of business—to the upgraded processing system. The program plans to complete major development work in September 2019 and achieve full operational capability (FOC) in March 2020. Despite the 18-month pause in development, the program’s FOC dates slipped only 1 year from its previously revised APB. In August 2019, USCIS officials reported that the program is on track to meet its revised schedule goals. In its revised APB, the program’s acquisition cost threshold decreased from its previous APB by approximately $200 million primarily because the program shifted costs to operations and maintenance (O&M) to align with DHS’s new common appropriations structure. As a result of this shift in costs and because the new APB extended the program’s life cycle by 2 years, O&M costs increased by nearly $800 million from the program’s previous APB. In June 2019, the program updated its LCCE again to inform the budget process, which is within its APB cost thresholds. In September 2016, the Transformation program breached its schedule baseline when persistent system deficiencies forced the program to revert 84,000 monthly applications for naturalization forms from an upgraded application information system to a legacy platform. USCIS officials said the program had previously prioritized an ambitious release schedule over needed functionality. In response, USCIS dismantled the program office and repositioned Transformation under the USCIS Office of Information Technology so the program could leverage additional engineering expertise. According to officials, the program has also focused on activities like prototyping and beta testing forms, and is deploying updates as targeted changes to specific forms or functionality rather than major system upgrades. The program previously made significant changes after it experienced a 5-month delay in 2012. DHS attributed this delay to weak contractor performance and pursuing an unnecessarily complex system, among other things. To address these issues, the Office of Management and Budget, DHS, and USCIS determined the program should implement an agile software development methodology and increase competition for development work. These changes were reflected in the program’s April 2015 revised baseline. In July 2019, the program office reported that it is working to fill staffing vacancies, but the gap has not had a negative impact on program execution. In the meantime, the program is mitigating the gap with existing staff and contractors. However, officials noted that if positions remain unfilled, the program could experience schedule delays, among other things. USCIS officials reviewed a draft of this assessment and provided no comments. The objectives of this audit were designed to provide congressional committees insight into the Department of Homeland Security’s (DHS) major acquisition programs. We assessed the extent to which (1) DHS’s major acquisition programs are on track to meet their schedule and cost goals and (2) current program baselines trace to key acquisition documents. To address these questions, we selected 29 of DHS’s 80 major acquisition programs. We selected all 17 of DHS’s Level 1 acquisition programs—those with life-cycle cost estimates (LCCE) of $1 billion or more—that had at least one project, increment, or segment in the Obtain phase—the stage in the acquisition life cycle when programs develop, test, and evaluate systems—at the initiation of our audit. Additionally, we reviewed 12 other major acquisition programs—including 6 Level 1 programs that either had not yet entered or were beyond the Obtain phase, and 6 Level 2 programs that have LCCEs between $300 million and less than $1 billion—that we identified were at risk of not meeting their cost estimates, schedules, or capability requirements based on our past work and discussions with DHS officials. Specifically, we met with representatives from DHS’s Office of Program Accountability and Risk Management (PARM)—DHS’s main body for acquisition oversight— as a part of our scoping effort to determine which programs (if any) were facing difficulties in meeting their cost estimates, schedules, or capability requirements. The 29 selected programs were sponsored by eight different components, and they are identified in table 8, along with our rationale for selecting them. To determine the extent to which DHS’s major acquisition programs are on track to meet their schedule and cost goals, we collected key acquisition documentation for each of the 29 programs, such as all LCCEs and acquisition program baselines (APB) approved at the department level since DHS’s current acquisition management policy went into effect in November 2008. DHS policy establishes that all major acquisition programs should have a department-approved APB, which establishes a program’s critical cost, schedule, and performance parameters, before they initiate efforts to obtain new capabilities. Twenty- seven of the 29 programs had one or more department-approved LCCEs and APBs between November 2008 and August 31, 2019. We used these APBs to establish the initial and current cost and schedule goals for the programs. We then developed a data collection instrument to help validate the information from the APBs and collect similar information from programs without department-approved APBs. Specifically, for each program, we pre-populated data collection instruments to the extent possible with the schedule and cost information we had obtained from the APBs and our prior assessments (if applicable) to identify schedule and cost goal changes, if any, since (a) the program’s initial baseline was approved and (b) December 2017—the data cut-off date of our 2018 assessment. We shared our data collection instruments with officials from the program offices to confirm or correct our initial analysis and to collect additional information to enhance the timeliness and comprehensiveness of our data sets. We then met with program officials to identify causes and effects associated with any identified schedule and cost goal changes, including changes as a result of the fiscal year 2019 partial government shutdown. Subsequently, we drafted preliminary assessments for each of the 29 programs, shared them with program and component officials, and gave these officials an opportunity to submit comments to help us correct any inaccuracies, which we accounted for as appropriate (such as when new information was available). Additionally, in July 2018 and July 2019, we obtained copies of the detailed data on affordability that programs submitted to inform the fiscal year 2019 and 2020 resource allocation processes. We also obtained copies of any annual LCCE updates programs submitted in fiscal years 2018 and 2019. For each of the 27 programs with a department-approved APB, we compared (a) the most recent cost data we collected (i.e., a department-approved LCCE, the detailed LCCE information submitted during the resource allocation process, an annual LCCE update, or an update provided by the program office) to (b) DHS’s funding plan presented in the Future Years Homeland Security Program (FYHSP) report to Congress for fiscal years 2020-2024, which presents 5-year funding plans for DHS’s major acquisition programs, to assess the extent to which a program was projected to have an acquisition funding gap. Through this process, we determined that our data elements were sufficiently reliable for the purpose of this engagement. The FYHSP reports information by the department’s new common appropriation structure, which created standard appropriation fund types including (1) procurement, construction, and improvements and (2) operations and support. We refer to these types of funding as (1) acquisition and (2) operations and maintenance throughout this report. current version of the guidance when we initiated our review. We reviewed each program’s most recent APB to determine whether the APB referenced the documents that were used as the basis of its cost, schedule, and performance parameters. We asked program officials to provide the underlying documentation if the APB did not reference a document. We then compared the APB cost, schedule, and performance parameters to the information in the underlying documents. Specifically, we compared the approved LCCE to the APB objective and threshold cost values, the operational requirements document to the APB key performance parameters, and the integrated master schedule to the APB schedule goals. We determined that the cost and performance goals for a program were traceable if the information from the underlying documentation was the same as the cost and performance parameters in the APB. We determined that program schedule goals were traceable to the integrated master schedule, if all future baseline milestones identified in the APB were identified in the integrated master schedule. In addition, the milestone date from the integrated master schedule was within the range of the objective and threshold schedule goals identified in the APB. We did not include programs in our analysis with APBs approved before DHS updated its acquisition policy in March 2016 because they were developed under previous guidance when the requirements for developing APBs were different. We also did not include the APBs approved after DHS updated its acquisition policy in February 2019 because the update was not in place when we initiated this review. In addition, we interviewed officials from headquarters organizations, including PARM, to discuss how policies related to developing APBs are being implemented and clarify requirements for establishing APB parameters. We interviewed component and program officials to identify causes of inconsistencies between the approved APB and documents that provided the basis for approved cost, schedule, and performance parameters. We conducted this performance audit from April 2018 through December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact listed above, Rick Cederholm (Assistant Director), Alexis Olson (Analyst-in-Charge), Whitney Allen, Leigh Ann Haydon, Khaki LaRiviere, Sarah Martin, and Kelsey Wilson made key contributions to this report. Other contributors included Mathew Bader, Andrew Burton, Erin Butkowski, John Crawford, Aryn Ehlow, Lorraine Ettaro, Laurier R. Fish, Alexandra Gebhard, Elizabeth Hosler-Gregory, Stephanie Gustafson, Jason Lee, Claire Li, Ashley Rawson, Jillian Schofield, Roxanna Sun, Anne Louise Taylor, and Lindsay Taylor. Homeland Security Acquisitions: Opportunities Exist to Further Improve DHS’s Oversight of Test and Evaluation Activities. GAO-20-20. Washington, D.C.: October 24, 2019 High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP. Washington, D.C.: March 6, 2019. Coast Guard Acquisitions: Polar Icebreaker Program Needs to Address Risks before Committing Resources. GAO-18-600. Washington, D.C.: September 4, 2018. DHS Acquisitions: Additional Practices Could Help Components Better Develop Operational Requirements. GAO-18-550. Washington, D.C.: August 8, 2018. Southwest Border Security: CBP Is Evaluating Designs and Locations for Border Barriers but Is Proceeding Without Key Information. GAO-18-614. Washington, D.C.: July 30, 2018. Coast Guard Acquisitions: Actions Needed to Address Longstanding Portfolio Management Challenges. GAO-18-454. Washington, D.C.: July 24, 2018. Homeland Security Acquisitions: Leveraging Programs’ Results Could Further DHS’s Progress to Improve Portfolio Management. GAO-18-339SP. Washington, D.C.: May 17, 2018. DHS Program Costs: Reporting Program-Level Operations and Support Costs to Congress Would Improve Oversight. GAO-18-344. Washington, D.C.: April 25, 2018. Border Security: Additional Actions Could Strengthen DHS Efforts to Address Subterranean, Aerial, and Maritime Smuggling. GAO-17-474. Washington, D.C.: May 1, 2017. Homeland Security Acquisitions: Identifying All Non-Major Acquisitions Would Advance Ongoing Efforts to Improve Management, GAO-17-396. Washington, D.C.: April 13, 2017. Homeland Security Acquisitions: Earlier Requirements Definition and Clear Documentation of Key Decisions Could Facilitate Ongoing Progress. GAO-17-346SP. Washington, D.C.: April 6, 2017. Homeland Security Acquisitions: Joint Requirements Council’s Initial Approach Is Generally Sound and It Is Developing a Process to Inform Investment Priorities. GAO-17-171. Washington, D.C.: October 24, 2016. Homeland Security Acquisitions: DHS Has Strengthened Management, but Execution and Affordability Concerns Endure. GAO-16-338SP. Washington, D.C.: March 31, 2016. Homeland Security Acquisitions: Major Program Assessments Reveal Actions Needed to Improve Accountability. GAO-15-171SP. Washington, D.C.: April 22, 2015. Homeland Security Acquisitions: DHS Should Better Define Oversight Roles and Improve Program Reporting to Congress. GAO-15-292. Washington, D.C.: March 12, 2015. Homeland Security Acquisitions: DHS Could Better Manage Its Portfolio to Address Funding Gaps and Improve Communications with Congress. GAO-14-332. Washington, D.C.: April 17, 2014. Homeland Security: DHS Requires More Disciplined Investment Management to Help Meet Mission Needs. GAO-12-833. Washington, D.C.: September 18, 2012.", "summary": "Each year, the DHS invests billions of dollars in a diverse portfolio of major acquisition programs to help execute its many critical missions. DHS plans to spend more than $10 billion on these programs in fiscal year 2020 alone. DHS's acquisition activities are on GAO's High Risk List, in part, because of management and funding issues. The Explanatory Statement accompanying the DHS Appropriations Act, 2015 included a provision for GAO to review DHS's major acquisitions on an ongoing basis. This report, GAO's fifth review, assesses the extent to which: (1) DHS's major acquisition programs are on track to meet their schedule and cost goals, and (2) current program baselines trace to key acquisition documents. GAO assessed 27 acquisition programs, including DHS's largest programs that were in the process of obtaining new capabilities as of April 2018, and programs GAO or DHS identified as at risk of poor outcomes. GAO assessed cost and schedule progress against baselines; compared APB cost, schedule and performance parameters to underlying documents used in establishing baselines; and interviewed DHS officials. As of August 2019, 25 of the 27 Department of Homeland Security (DHS) programs GAO assessed that had approved schedule and cost goals were on track to meet current goals. The remaining two programs breached their schedule or cost goals. This represents an improvement since GAO's last review. However, GAO found that some of the programs that were on track as of August 2019 are at risk of not meeting cost or schedule goals or both in the future. For example, the U.S. Coast Guard's Offshore Patrol Cutter program faces potential cost increases and schedule slips in the future as a result of damages to the shipbuilder's facility from Hurricane Michael in October 2018. Traceability, which is called for in DHS policy and GAO scheduling best practices, helps ensure that program goals are aligned with program execution plans, and that a program's various stakeholders have an accurate and consistent understanding of those plans and goals. Of the 27 programs GAO assessed, 21 had established baselines after DHS updated its acquisition policy in March 2016 (the most current version of the policy at the beginning of this review). GAO found that the 21 programs' baseline cost and performance goals generally traced to source documents, such as life-cycle cost estimates and planned performance outcomes. However, schedule goals did not generally match up to the programs' integrated master schedules (IMS), as required by DHS acquisition management instruction and as a best practice identified in GAO's Schedule Assessment Guide (see figure). The lack of traceability between IMSs and schedule goals in the approved acquisition program baselines (APB) indicates that DHS does not have appropriate oversight processes in place to ensure that schedules are accurately reflected in program baselines, in accordance with DHS policy and GAO's best practices. Therefore, DHS cannot ensure that the understanding of program schedules among different stakeholders, including component and DHS leadership is consistent and accurate. As a result, DHS leadership may be approving program schedule goals that do not align with program execution plans. GAO is making two recommendations, including that DHS put in place an oversight process to ensure that programs' schedule goals are developed and updated according to GAO's scheduling best practices. DHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "For decades, fingerprint analysis was the most widely used biometric technology for positively identifying arrestees and linking them with any previous criminal record. However, beginning in 2010, the FBI began incrementally replacing the Integrated Automated Fingerprint Identification System (IAFIS) with Next Generation Identification (NGI). NGI was not only to include fingerprint data from IAFIS and biographic data, but also to provide new functionality and improve existing capabilities by incorporating advancements in biometrics, such as face recognition technology. As part of the fourth of six NGI increments, the FBI updated the Interstate Photo System (IPS) to provide a face recognition service that allows law enforcement agencies to search a database of criminal photos that accompanied fingerprint submissions using a photo of an unknown person—called a probe photo. The FBI began a pilot of NGI-IPS in December 2011, and NGI-IPS became fully operational in April 2015. NGI-IPS users include the FBI and selected state and local law enforcement agencies, which can submit search requests to help identify an unknown person using, for example, a photo from a surveillance camera. When a state or local agency submits such a photo, NGI-IPS uses an automated process to return a list of candidate photos from the database. The number of photos returned ranges from 2 to 50 possible candidate photos from the database, depending on the user’s specification. According to the FBI, in fiscal year 2018, NGI-IPS returned about 50,000 face recognition search results to law enforcement agency users, a decrease from about 90,000 search results in fiscal year 2017. Figure 1 describes the process for a search requested by state or local law enforcement. In addition to the NGI-IPS, the FBI has an internal unit called Facial Analysis, Comparison and Evaluation (FACE) Services that provides face recognition capabilities, among other things, to support active FBI investigations. FACE Services has access to NGI-IPS, and can also search or request to search databases owned by the departments of State and Defense and 21 states, which use their own face recognition systems. Figure 2 shows which states partnered with the FBI for FACE Services requests, as of May 2019, according to the FBI. Unlike NGI-IPS, which primarily contains photos obtained from criminal justice sources, these external systems primarily contain photos from state and federal government databases, such as driver’s license photos and visa applicant photos. According to the FBI, the total number of face photos available in all searchable repositories for FACE Services is over 641 million. Biometric images specialists for FACE Services manually review any photos received from their external partners before returning a photo as an investigative lead to the requesting FBI agents. No more than two photos are returned as a lead after the specialist for FACE Services completes the review. However, according to FACE Services officials we met with during our May 2016 review, if biometric images specialists determine that none of the databases returned a likely match, they do not return any photos to the agents. According to the FBI, from August 2011 (when searches began) through April 2019, FACE Services received 153,636 photos of unknown persons (often called probe photos) from FBI headquarters, field offices, and overseas offices, which resulted in 390,186 searches of various databases in attempt to find photo matches of known individuals in these databases. Federal agency collection and use of personal information, including face images, is governed primarily by two laws: the Privacy Act of 1974 and the privacy provisions of the E-Government Act of 2002. The Privacy Act places limitations on agencies’ collection, disclosure, and use of personal information maintained in systems of records. The Privacy Act requires that when agencies establish or make changes to a system of records, they must notify the public through a system of records notice (SORN) in the Federal Register. According to Office of Management and Budget (OMB) guidance, the purposes of the notice are to inform the public of the existence of systems of records; the kinds of information maintained; the kinds of individuals on whom information is maintained; the purposes for which they are used; and how individuals can exercise their rights under the Privacy Act. The E-Government Act of 2002 requires that agencies conduct Privacy Impact Assessments (PIAs) before developing or procuring information technology (or initiating a new collection of information) that collects, maintains, or disseminates personal information. The assessment helps agencies examine the risks and effects on individual privacy and evaluate protections and alternative processes for handling information to mitigate potential privacy risks. OMB guidance also requires agencies to perform and update PIAs as necessary where a system change creates new privacy risks, for example, when the adoption or alteration of business processes results in personal information in government databases being merged, centralized, matched with other databases or otherwise significantly manipulated. Within DOJ, preserving civil liberties and protecting privacy is a responsibility shared by departments and component agencies. As such, DOJ and the FBI have established oversight structures to help protect privacy and oversee compliance with statutory and policy requirements. For example, the FBI drafts privacy documentation for its face recognition capabilities, and DOJ offices review and approve key documents developed by the FBI—such as PIAs and SORNs. We reported in May 2016 that the FBI did not (1) update the NGI-IPS PIA in a timely manner when the system underwent significant changes, or (2) develop and publish a PIA for FACE Services before that unit began supporting FBI agents. However, DOJ and the FBI have since taken steps to review and publish PIAs more quickly. As discussed in our 2016 report, consistent with the E-Government Act and OMB guidance, DOJ developed guidance that requires initial PIAs to be completed at the beginning of development of information systems and any time there is a significant change to the information system in order to determine whether there are any resulting privacy issues. In accordance with this guidance, FBI published a PIA at the beginning of the development of NGI-IPS in 2008, as required. However, the FBI did not publish a new PIA or update the 2008 PIA before beginning to pilot NGI-IPS in December 2011 or as significant changes were made to the system through September 2015. During the pilot, the FBI used NGI- IPS to conduct over 20,000 searches to assist in investigations. Similarly, DOJ did not approve a PIA for FACE Services when it began supporting investigations in August 2011. As a new use of information technology involving the handling of personal information, it too required a PIA, according to the E-Government Act, as well as OMB and DOJ guidance. Figure 3 provides key dates in the implementation of these face recognition capabilities and the associated PIAs. DOJ approved the NGI-IPS PIA in September 2015 and the FACE Services PIA in May 2015—over 3 years after the NGI-IPS pilot began and FACE Services began supporting FBI agents with face recognition services. Among other factors, implementation of the NGI-IPS pilot constituted a significant change in the FBI’s use of the technology that, consistent with the E-Government Act and OMB guidance required DOJ/FBI to update the PIA. Similarly, DOJ/FBI acknowledged that FACE Services began supporting FBI investigations in 2011, which involved storing photos in a new work log and also performing automated searches instead of manual searches. As a new use of information technology involving the handling of personal information, it too required a PIA. While DOJ and the FBI updated the internal drafts of these PIAs, the public remained unaware of the department’s consideration for how the FBI uses personal information in the face recognition search process. Given the issues we identified, we recommended that DOJ assess the PIA development process to determine why PIAs were not published prior to using or updating face recognition capabilities. Although DOJ officials did not concur with this recommendation, they did agree that all DOJ processes may be reviewed for improvements and efficiencies. In November 2018, DOJ officials told us that they had reviewed the PIA development process and determined that one reason the FBI’s face recognition PIAs were not completed more quickly was because the FBI and DOJ engaged in an extensive PIA revision process. As a result, DOJ reported that it implemented a pilot in 2018 to expedite the PIA approval process, which included developing a PIA approval template, conducting DOJ’s review earlier in the process, and focusing the review solely on legal sufficiency instead of a more comprehensive review that included less significant editorial changes. According to DOJ, this new process has significantly reduced the time required between the completion of the PIA process by the FBI and the review by DOJ. Further, DOJ reported that it has applied the same process to other DOJ components since December 2018, and that the pilot is evolving into an operational process. We will continue to monitor DOJ’s implementation of its review process changes. We reported in May 2016 that DOJ did not publish a SORN, as required by the Privacy Act, that addresses the collection and maintenance of photos accessed and used through the FBI’s face recognition capabilities, in a timely manner. The DOJ published the SORN on May 5, 2016—after completion of our review—even though those capabilities were in place since 2011. According to OMB guidance then in effect, the SORN “must appear in the Federal Register before the agency begins to operate the system, e.g., collect and use the information.” However, from 2011 through May 2016, the agency collected and maintained personal information for these capabilities without the required explanation of what information it was collecting or how it was used. For example, at the time of our review, the existing version of the SORN that covered FBI’s face recognition capabilities was dated September 1999. According to DOJ officials, it did not address the collection and maintenance of photos accessed and used through NGI for the FBI’s face recognition capabilities but rather discussed fingerprint searches. Given that DOJ did not publish the SORN in a timely manner, we recommended DOJ develop a process to determine why a SORN was not published for the FBI’s face recognition capabilities prior to using NGI-IPS, and implement corrective actions to ensure SORNs are published before systems become operational. DOJ agreed, in part, with our recommendation and submitted the SORN for publication after we provided our draft report for comment. According to DOJ, it continues to review and update its pre-existing SORNs on an ongoing basis and is continually improving the scope and efficiency of its privacy processes. However, as of May 2019, DOJ had not taken actions to address our recommendation. Further, in April 2019, DOJ stated that with respect to transparency, a published PIA will provide much the same information that would be contained in a SORN and may provide it in a timelier manner. However, according to OMB guidance, the purpose of the SORN is to inform the public of the existence of systems of records; the kinds of information maintained; the kinds of individuals on whom information is maintained; the purposes for which they are used; and how individuals can exercise their rights under the Privacy Act. Further, PIAs and SORNs both contain information key to providing the public with information about the collection of their personal information, among other things. We continue to believe that by assessing the SORN development process and taking corrective actions to ensure timely development of future SORNs, DOJ would be better positioned to provide the public with a better understanding of how personal information is being used and protected by DOJ components. The Criminal Justice Information Services Division (CJIS), which operates FBI’s face recognition capabilities, has an audit program to evaluate compliance with restrictions on access to CJIS systems and information by its users, such as the use of fingerprint records. However, at the time of our May 2016 review, it had not completed audits of the use of NGI-IPS or FACE Services searches of external databases. We reported that state and local users had been accessing NGI-IPS since December 2011 and had generated IPS transaction records since then that would enable CJIS to assess user compliance. In addition, we found that the FACE Services Unit had used external databases that included primarily civil photos to support FBI investigations since August 2011, but the FBI had not audited its use of those databases. Standards for Internal Control in the Federal Government calls for federal agencies to design and implement control activities to enforce management’s directives and to monitor the effectiveness of those controls. In May 2016, we recommended that the FBI conduct audits to determine the extent to which users of NGI-IPS and biometric images specialists in FACE Services are conducting face image searches in accordance with CJIS policy requirements. DOJ partially concurred with our recommendation. Specifically, DOJ concurred with the portion of our recommendation related to the use of NGI-IPS. In March 2017, DOJ reported that the FBI began assessing NGI-IPS requirements in participating states in conjunction with its triennial National Identity Services audit, and by February 2018 had conducted eight NGI-IPS audits, which found no significant findings of noncompliance. In February 2018, DOJ provided us with copies of the final audit results for one state and its NGI-IPS audit reference guide. The FBI reported that it conducted an audit of FACE Services in September 2018. According to FBI documentation, the purpose of the audit was to determine the extent to which specialists in FACE Services conducted face image searches in accordance with FBI privacy laws and policies. The scope of the audit focused on determining adherence to policies which govern the appropriate use of NGI-IPS, including those for policy development as well as authorized requests and responses. The FBI reported that it finalized the audit report in April 2019, which concluded that the Face Services Unit is operating in accordance with privacy laws and policies. Further, the FBI stated in May 2019 that audits of FACE Services will continue on a triennial basis and that it conducts triennial audits of states that use NGI-IPS. As a result, DOJ has fully implemented our recommendation. In May 2016, we reported that prior to accepting and deploying NGI-IPS, the FBI conducted testing to evaluate how accurately face recognition searches returned matches to persons in the database. However, we found that the tests were limited because they did not include all possible candidate list sizes and did not specify how often incorrect matches were returned. According to the National Science and Technology Council and the National Institute of Standards and Technology at the time, the detection rate (how often the technology generates a match when the person is in the database) and the false positive rate (how often the technology incorrectly generates a match to a person in the database) are both necessary to assess the accuracy of a face recognition system. The FBI’s detection rate requirement for face recognition searches at the time stated that when the person exists in the database, NGI-IPS shall return a match of this person at least 85 percent of the time. However, we found that the FBI only tested this requirement with a candidate list of 50 potential matches. In these tests, 86 percent of the time, a match to a person in the database was correctly returned. The FBI had not assessed accuracy when users requested a list of 2 to 49 matches. According to FBI, a smaller list would likely lower the accuracy of the searches as the smaller list may not contain the likely match that would be present in the larger list. Further, FBI officials stated during our May 2016 review that they had not assessed how often NGI-IPS face recognition searches erroneously match a person to the database (the false positive rate). If false positives are returned at a higher than acceptable rate, law enforcement users may waste time and resources pursuing unnecessary investigative leads. In addition, we concluded that by conducting this assessment the FBI would help ensure that it is sufficiently protecting the privacy and civil liberties of U.S. citizens enrolled in the database. Therefore, we recommended that the FBI conduct tests of NGI-IPS to verify that the system is sufficiently accurate for all allowable candidate list sizes and ensure that both the detection rate and the false positive rate are identified for such tests. In comments on our draft report in 2016, and reiterated during recommendation follow-up in May 2019, DOJ did not concur with this recommendation. DOJ officials stated that the FBI has performed accuracy testing to validate that the system meets the requirements for the detection rate, which fully satisfies requirements for the investigative lead service provided by NGI-IPS. As of May 2019, DOJ has not taken action to address the recommendation. We continue to believe that the recommended action is needed. Such action would allow the FBI to have more reasonable assurance that NGI- IPS provides leads that help enhance, rather than hinder, criminal investigations and that helps protect the privacy of citizens. As noted above, a key focus of our recommendation is the need to ensure that NGI-IPS is sufficiently accurate for all allowable candidate list sizes. As we reported, although the FBI tested the detection rate for a candidate list of 50 photos, they did not do such tests when NGI-IPS users request smaller candidate lists—specifically between 2 and 50 photos. Further, according to the FBI Information Technology Life Cycle Management Directive, testing needs to confirm the system meets all user requirements. Because the accuracy of NGI-IPS’s face recognition searches when returning fewer than 50 photos in a candidate list is unknown, the FBI is limited in understanding whether the results are accurate enough to meet NGI-IPS users’ needs. In comments on our May 2016 report, DOJ officials also stated that searches of NGI-IPS produce a gallery of likely candidates to be used as investigative leads, not for positive identification. As a result, according to DOJ officials, NGI-IPS cannot produce false positives and there is no false positive rate for the system. We disagree with DOJ. According to the National Institute of Standards and Technology, the detection rate and the false positive rate are both necessary to assess the accuracy of a face recognition system. Generally, face recognition systems can be configured to allow for a greater or lesser number of matches. A greater number of matches would generally increase the detection rate, but would also increase the false positive rate. Similarly, a lesser number of matches would decrease the false positive rate, but would also decrease the detection rate. Reporting a detection rate of 86 percent without reporting the accompanying false positive rate presents an incomplete view of the system’s accuracy. We reported in May 2016 that FBI, DOJ, and OMB guidance all required annual reviews of operational information technology systems to assess their abilities to continue to meet cost and performance goals. For example, the FBI’s Information Technology Life Cycle Management Directive required an annual operational review to ensure that the fielded system is continuing to support its intended mission, among other things. In May 2016, we reported that the FBI had not assessed the accuracy of face recognition searches of NGI-IPS in its operational setting—the setting in which enrolled photos, rather than a test database of photos are used to conduct a search for investigative leads. According to FBI officials, at the time of our May 2016 review, the database of photos used in its tests was representative of the photos in NGI-IPS, and ongoing testing in a simulated environment was adequate. However, according to the National Institute of Standards and Technology, as the size of a photo database increases, the accuracy of face recognition searches performed on that database can decrease due to lookalike faces. At the time of our review, FBI’s test database contained 926,000 photos while NGI-IPS contained about 30 million photos. We concluded that by conducting an operational review of these systems, FBI officials would obtain information regarding what factors affect the accuracy of the face recognition searches, such as the quality of the photos in the database, and if NGI-IPS is meeting federal, state, and local law enforcement needs. As a result, we recommended the FBI conduct an operational review of NGI-IPS, at least annually, that includes an assessment of the accuracy of face recognition searches and take actions, as necessary, to improve the system. In May 2016, DOJ concurred with this recommendation and has taken steps to seek input from its users. For example, the FBI submitted a staff paper through the fall 2016 Advisory Policy Board Process to solicit feedback from its users. Specifically, officials said the paper requested feedback on whether the face recognition searches of the NGI-IPS are meeting their needs, and input regarding search accuracy. According to FBI officials, no users expressed concern with any aspect of the NGI-IPS meeting their needs, including accuracy. DOJ reported that it repeated this process in the fall of 2017. Although FBI’s action of providing working groups with a paper presenting our recommendation is a positive step, FBI’s actions do not fully meet the recommendation. FBI’s paper was presented as informational, and did not result in any formal responses from users. We disagree with FBI’s conclusion that receiving no responses on the informational paper fulfills the operational review recommendation, which includes determining that NGI-IPS is meeting user’s needs. In addition, in May 2019, the FBI stated that it will be working with the National Institute of Standards and Technology on annual operational testing and that such testing meets the intention of this recommendation. However, the proposed testing, while promising, will not occur in an operational environment. As such, we continue to believe the FBI should conduct an operational review of NGI- IPS at least annually, as we recommended. In May 2016 we reported that FBI officials had not assessed the accuracy of face recognition systems operated by external partners. Specifically, before agreeing to conduct searches on, or receive search results from, these systems, the FBI did not ensure the accuracy of these systems was sufficient for use by FACE Services. Standards for Internal Control in the Federal Government calls for agencies to design and implement components of operations to ensure they meet the agencies mission, goals, and objectives, which, in this case, is to identify missing persons, wanted persons, suspects, or criminals for active FBI investigations. As a result, we recommended the FBI take steps to determine whether each external face recognition system used by FACE Services is sufficiently accurate for the FBI’s use and whether results from those systems should be used to support FBI investigations. In comments on our draft report in 2016, and reiterated during subsequent recommendation follow-up, DOJ officials did not concur with this recommendation. DOJ officials stated that the FBI has no authority to set or enforce accuracy standards of face recognition technology operated by external agencies. In addition, DOJ officials stated that the FBI has implemented multiple layers of manual review that mitigate risks associated with the use of automated face recognition technology. Further, DOJ officials stated there is value in searching all available external databases, regardless of their level of accuracy. We acknowledge that the FBI cannot and should not set accuracy standards for the face recognition systems used by external partners. We also agree that the use of external face recognition systems by the FACE Services Unit could add value to FBI investigations. However, we disagree with DOJ and continue to believe that the FBI should assess the quality of the data it is using from state and federal partners. We also disagree with the DOJ assertion that manual review of automated search results is sufficient. Even with a manual review process, the FBI could miss investigative leads if a partner does not have a sufficiently accurate system. The FBI has entered into agreements with state and federal partners to conduct face recognition searches using hundreds of millions of photos. Without assessments of the results from its state and federal partners, the FBI is making decisions to enter into agreements based on assumptions that the search results may provide valuable investigative leads. For example, the FBI’s accuracy requirements for criminal investigative purposes may be different than a state’s accuracy requirements for preventing driver’s license fraud. By relying on its external partners’ face recognition systems, the FBI is using these systems as a component of its routine operations and is therefore responsible for ensuring the systems will help meet the FBI’s mission, goals and objectives. Until FBI officials can assure themselves that the data they receive from external partners are reasonably accurate and reliable, it is unclear whether such agreements are beneficial to the FBI, whether the investment of public resources is justified, and whether photos of innocent people are unnecessarily included as investigative leads. Chairman Cummings, Ranking Member Jordan, and Members of the Committee, this concludes my prepared statement. I would be happy to respond to any questions you may have at this time. For questions about this statement, please contact Gretta Goodwin at (202) 512-8777 or GoodwinG@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this statement include Dawn Locke (Assistant Director), Jason Jackson (Analyst-In- Charge), Jennifer Beddor, Ann Halbert-Brooks, Eric Hauswirth, Paul Hobart, Richard Hung, Susanna Kuebler, Kay Kuhlman, Tom Lombardi, and Dina Shorafa. Key contributors for the previous work that this testimony is based on are listed in the previously issued product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Technology advancements have increased the overall accuracy of automated face recognition over the past few decades. This technology has helped law enforcement agencies identify criminals in their investigations. However, there are questions about the accuracy of the technology and the protection of privacy and civil liberties when face recognition technologies are used to identify people for investigations. This statement describes the extent to which the FBI (1) ensures adherence to laws and policies related to privacy regarding its use of face recognition technology, and (2) ensures its face recognition capabilities are sufficiently accurate. This statement is based on GAO's May 2016 report regarding the FBI's use of face recognition technology (GAO-16-267) and includes agency updates to GAO's recommendations. To conduct its prior work, GAO reviewed federal privacy laws, and DOJ and FBI policies and operating manuals. GAO interviewed officials from the FBI and the departments of Defense and State, which coordinate with the FBI on face recognition. GAO also interviewed two state agencies that partner with the FBI to use multiple face recognition capabilities. For updates, GAO reviewed FBI data, as well as materials provided by DOJ and the FBI on the status of GAO's recommendations. In May 2016, GAO found that the the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) could improve transparency and oversight to better safeguard privacy and had limited information on accuracy of its face recognition technology. GAO made six recommendations to address these issues. As of May 2019, DOJ and the FBI had taken some actions to address three recommendations—one of which the FBI has fully implemented—but has not taken any actions on the other three. Privacy . In its May 2016 report, GAO found that DOJ did not complete or publish key privacy documents for FBI's face recognition systems in a timely manner and made two recommendations to DOJ regarding its processes for developing these documents. These included privacy impact assessments (PIA), which analyze how personal information is collected, stored, shared, and managed in federal systems, and system of records notices, which inform the public about, among other things, the existence of the systems and the types of data collected. DOJ has taken actions to expedite the development process of the PIA. However, DOJ has yet to take action with respect to the development process for SORNs. GAO continues to believe both recommendations are valid and, if implemented, would help keep the public informed about how personal information is being collected, used and protected by DOJ components. GAO also recommended the FBI conduct audits to determine if users of FBI's face recognition systems are conducting face image searches in accordance with DOJ policy requirements, which the FBI has done. Accuracy . GAO also made three recommendations to help the FBI better ensure the accuracy of its face recognition capabilities. First, GAO found that the FBI conducted limited assessments of the accuracy of face recognition searches prior to accepting and deploying its face recognition system. The face recognition system automatically generates a list of photos containing the requested number of best matched photos. The FBI assessed accuracy when users requested a list of 50 possible matches, but did not test other list sizes. GAO recommended accuracy testing on different list sizes. Second, GAO found that FBI had not assessed the accuracy of face recognition systems operated by external partners, such as state or federal agencies, and recommended it take steps to determine whether external partner systems are sufficiently accurate for FBI's use. The FBI has not taken action to address these recommendations. GAO continues to believe that by verifying the accuracy of both systems—its system, and the systems of external partners—the FBI could help ensure that the systems provide leads that enhance criminal investigations. Third, GAO found that the FBI did not conduct an annual review to determine if the accuracy of face recognition searches was meeting user needs, and recommended it do so. In 2016 and 2017 the FBI submitted a paper to solicit feedback from system users. However, this did not result in formal responses from users and did not constitute a review of the system. GAO continues to believe that conducting such a review would help provide important information about potential factors affecting accuracy of the system. In its May 2016 report, GAO made three recommendations related to privacy, one of which has been implemented. GAO also made three recommendations related to accuracy that the FBI is still working to address.", "document_type": "gao"}
{"report": "The FHLBank System comprises 11 federally chartered banks. The FHLBanks represent 11 districts and are headquartered in Atlanta, Boston, Chicago, Cincinnati, Dallas, Des Moines, Indianapolis, New York City, Pittsburgh, San Francisco, and Topeka (see fig. 1). Each FHLBank is cooperatively owned by its members––such as commercial and community banks, thrifts, credit unions, and insurance companies. As of December 31, 2017, the number of member institutions in each district varied widely, as did the total amount of assets each FHLBank held (see table 1). Each FHLBank has a board of directors made up of member directors and independent directors. As shown in figure 2, the Federal Home Loan Bank Act (as amended by HERA) and its regulations set forth a number of requirements for FHLBank board directors. As of October 2018, each FHLBank board had 14–24 directors, for a total of 194 directors (see table 2). Of the 194, 108 were member directors and 86 were independent directors, including 24 public interest directors. Each board elects a chair and vice chair who serve 2-year terms. As of October 2018, of the 11 board chairs, six were member directors and five were independent directors, including two public interest directors (see table 3). Each FHLBank has a president who reports to the bank’s board of directors, but no representatives from bank management may serve on the boards. To implement requirements in HERA, in December 2010 FHFA issued the Minority and Women Inclusion rule to set forth minimum requirements for FHLBank diversity programs and reporting. Among other things, the 2010 rule required each bank to create its own Office of Minority and Women Inclusion (OMWI) or designate an office to perform duties related to the bank’s diversity efforts, and establish policies related to diversity and inclusion, including policies on nominating board directors. The 2010 rule also requires FHLBanks to submit an annual report to FHFA on their diversity efforts. FHFA also evaluates the quality of corporate governance by board directors as part of its on-site annual examinations and off-site monitoring of FHLBanks. For example, FHFA’s examination includes reviewing the bank boards’ responsibilities, board and committee meeting minutes, and the boards’ oversight of the banks’ operations and corporate culture. Our previous work on diversity includes reports on Federal Reserve Banks’ board diversity, FHLBank board governance, women on corporate boards, and diversity in the financial services sector. In 2011, we found limited diversity among the boards of the 12 Federal Reserve Banks. We recommended that the Board of Governors of the Federal Reserve System encourage all Reserve Banks to consider ways to help enhance the economic and demographic diversity of perspectives on boards, including by broadening potential candidate pools. The recommendation was implemented in December 2011. In a 2015 report on FHLBank board governance, we found that FHFA and FHLBanks had taken steps to increase board diversity, including creating regulations that encouraged the banks to consider diversity in board candidate selection and developing processes to identify and nominate independent directors. In a 2015 report on women on corporate boards, we found that while the share of women on boards of U.S. publicly traded companies had increased, reaching complete gender balance could take many years. We identified factors that might hinder women’s increased representation on boards, including boards not prioritizing recruiting diverse candidates and low turnover of board seats. In addition, in 2017 we reported that representation of women and minorities at the management level in the financial services sector showed marginal or no increase during 2007–2015. Since our 2015 report on FHLBank board governance, FHFA has taken additional actions to encourage diversity on FHLBank boards, including adding a requirement for the banks to report board demographics, clarifying expectations for board elections outreach, requesting the creation of a system-wide board diversity task force, and allowing some banks to add an independent director. FHFA has a limited role in overseeing FHLBanks’ board diversity, according to FHFA staff, because that is not part of the agency’s statutory responsibilities. While FHFA reviews the list of independent director nominees for FHLBank boards to ensure that the nominees meet all eligibility and qualification requirements, board directors are not FHLBank employees. Rather, they form the oversight body of each bank. In contrast, FHFA has a larger role in monitoring diversity efforts related to the workforce and suppliers of the banks. For example, the agency’s annual examination manual contains a section that covers such efforts. FHFA oversight of diversity efforts also includes reviewing the FHLBanks’ annual reports on diversity efforts, which the banks are required to submit under HERA. In adopting its Minority and Women Inclusion rule of 2010 to implement this requirement, FHFA stated that it would analyze and include information from the banks’ annual reports in the agency’s own annual report to Congress. The banks’ annual reports initially included data related to their workforce and supplier diversity efforts. In May 2015, FHFA amended the 2010 rule and added two reporting requirements for the annual reports: (1) data on gender and race/ethnicity of board directors (which the directors would voluntarily self-report), and (2) information on the banks’ outreach efforts (such as to promote diversity when nominating and soliciting director candidates). FHFA stated in its 2015 amendments that it intended to use the director data to analyze future trends in board diversity and the effectiveness of each bank’s policies and procedures to encourage board diversity. FHFA also clarified expectations on FHLBank diversity efforts in a 2016 amendment to its regulation related to bank board directors as well as in guidance and communications to FHLBanks. Clarifying scope of election outreach activities. According to FHFA staff, FHLBanks had inquired if the existing regulation would prohibit the banks from conducting outreach to or recruiting of diverse board candidates in the nomination or solicitation process. FHFA regulation restricts FHLBanks from advocating for a particular member director candidate or influencing the board election for member and independent directors. According to FHFA staff, to address these concerns, the agency amended the regulation in 2016 to clarify that the banks may conduct outreach to find diverse board director candidates. FHFA staff added that the regulation amendment also made clear that the banks may fulfill the regulatory requirement to encourage consideration of diversity in nominating or soliciting candidates for board director positions without violating restrictions on advocating for particular director candidates. Guidance. FHFA provided FHLBanks with guidance related to diversity, including board diversity. For example, the agency provided guidance on the roles and duties of the banks’ OMWI officers and the scope of diversity regulations. FHFA provided the banks a template to report newly required data on the gender and race/ethnicity of board directors. To help banks prepare their annual reports, in June 2018 FHFA also developed an annual report template that outlines and describes the contents of the required reporting elements. The template includes sections for individual FHLBanks to present data on board composition by diversity categories and to describe past and future outreach activities and strategies to promote board diversity and outcomes from the bank’s activities. Communications. FHFA has communicated guidance and discussed board diversity issues with FHLBank boards and with staff involved in the banks’ board diversity efforts. For example, FHFA staff gave presentations at meetings during which FHLBank board directors shared information on board diversity efforts. The staff noted FHFA’s OMWI director generally attends the semi-annual conferences of the banks’ OMWI officers, during which she discusses diversity issues such as the roles and responsibilities of these officers and the scope of the FHFA regulations. Furthermore, FHFA OMWI and other offices developed and implemented some strategies to help FHLBanks maintain or increase board diversity. In 2016, FHFA OMWI staff met with FHLBanks and requested that the banks create a Bank Presidents Conference Board Diversity Task Force to share practices to promote board diversity. The staff said that they act as facilitators and informal advisors and may provide technical assistance to the system-wide task force—for example, by developing a list of practices related to board diversity. Also, as encouraged by FHFA, starting in 2017, each bank has a representative (a board director or the bank president) on the task force. Also, based on FHFA’s 2016 annual FHLBank board analysis, the FHFA Director approved requests from three FHLBanks to add an independent director seat for their 2017 boards to help maintain or increase board diversity. FHFA extended the offer to the other banks (except Des Moines, as its board was undergoing restructuring after the merger with Seattle). FHFA staff said in preparation for their 2017 FHLBank board analysis, they informally monitored the gender and minority status of the additional independent director seats filled by the seven banks that accepted the offer. Six of the seats were filled by women (of whom two were minorities) and one seat was filled by a minority male, according to FHFA staff. FHFA staff also told us the FHFA Director has some discretion on the number of director seats based on an individual bank’s circumstances, including the request to maintain diversity. For example, in 2018, one FHLBank requested to retain its female board vice chair to help preserve diversity and institutional knowledge on its board. FHFA granted the bank’s request to keep the director for another year. FHFA staff told us that FHFA has considered issuing guidance in two areas, but that these areas do not represent immediate priorities for their diversity efforts. Specifically, FHFA OMWI staff stated that the office intended to develop an examination module on board diversity, but this is not the office’s high priority for 2019. As previously noted, FHFA’s current examination manual includes a section that covers FHLBanks’ workforce and supplier diversity efforts. But, the manual does not consider board diversity-related issues in as much detail as the supplier and workforce section. For example, it covers FHFA’s review of the quality of corporate governance by board directors and mentions the consideration of diversity for potential board director candidates. Also, the 2015 rule amendments noted that the agency intended to develop guidance to further elaborate on its expectations related to outreach activities and strategies for the banks’ board directors. FHFA staff told us that they would like to focus on ongoing diversity efforts and gather more information before starting new efforts. At the overall FHLBank board level, the share of female directors increased from 18 percent (34 directors) in 2015 to 23 percent (44 directors) in October 2018 (see fig. 3). This represented a continuation of an upward trend. For example, we previously reported a 16 percent share (31 female directors) in 2014. Each FHLBank had at least two female board directors in October 2018, but some boards had higher shares of female directors than others. As shown in figure 4, four banks—Chicago, Des Moines, Dallas, and Pittsburgh—had four or more female board directors (representing 22–38 percent of the boards). In comparison, seven banks had two or three female directors (representing 14–20 percent). Additionally, FHLBanks varied in how many female directors were added from 2015 to October 2018—one bank added two, six each added one, and four added none. For additional information on the number of board directors by bank and by gender from 2015 to October 2018, see appendix II. Women have some representation in board leadership positions. In October 2018, two FHLBanks—Des Moines and Pittsburgh—had female vice chairs of their respective board. Another bank (San Francisco) had a female vice chair of its board in 2016 and 2017. In 2015, we reported that one bank (Atlanta) had a female board chair. Additionally, each bank’s board has committees (such as the Audit Committee and the Risk Management Committee) with committee chairs and vice chairs. Ten of the 11 banks had board committees with at least one female chair or vice chair in October 2018. The share of women who chaired board committees was the same as the share of women on the overall FHLBanks boards in October 2018—23 percent. We compared female representation on FHLBank boards to that of other corporate boards and that of senior management in the financial services sector. Women constituted 23 percent of FHLBank boards in October 2018 and 22 percent of boards of the companies in the Standard and Poor’s 500 in 2017, as reported by Institutional Shareholder Services. Our analysis of the most recently available EEOC data found that the share of women in senior management positions in the financial services industry in 2016 was 29 percent. The share of women on FHLBank boards was 19 percent in the same year. Senior management in the financial services sector represents a pool of comparable candidates that could provide directors for FHLBank boards. The share of directors who self-identified as racial/ethnic minorities increased from 2015 to 2017, but the size of the increase is unclear due to the number of directors who did not report this information. Board directors voluntarily submit demographic information, including race/ethnicity. Some directors might have chosen not to self-identify their race/ethnicity. At the overall FHLBank board level, the share of directors who self- identified as racial/ethnic minorities increased from 2015 to 2017 (see fig. 5). Eleven percent (20 directors) of FHLBank board directors self- identified as racial/ethnic minorities in 2015 and 15 percent (30 directors) in 2017. Four percent (7 directors) did not self-identify in 2015 and 8 percent (15 directors) in 2017. The increase in the number of directors who identified as racial/ethnic minorities shows an upward trend from 10 percent (19 directors) in 2014, as we reported in 2015. The number of directors who self-identified as racial/ethnic minorities varied by bank. As shown in figure 6, all 11 FHLBanks had at least one minority director on the board in 2017, and six banks had three or more minority directors. Ten of the 11 banks each added one minority director during 2015–2017. For additional information on the number of board directors by bank and by race/ethnicity in 2015–2017, see appendix II. More specifically, as seen in table 4, in 2017, 9 percent (18 directors) identified as African-American, 4 percent (8 directors) identified as Hispanic, 2 percent (3 directors) identified as Asian, and 1 percent (1 director) identified as “other.” Racial/ethnic minorities have limited representation in board leadership positions. As of October 2018, one FHLBank had a vice chair of its board who identified as a minority. In 2017, another bank had one vice chair of its board who identified as a minority. We compared the FHLBank boards’ share of racial/ethnic minorities to those of corporate boards and senior management in the financial services sector. In 2017, 15 percent of the FHLBank board directors identified as racial/ethnic minorities, as previously noted. This compares to 14 percent on boards of directors of companies in the Standard and Poor’s 500 in 2017, according to Institutional Shareholder Services, and 12 percent in senior management of the financial services industry in 2016, based on our analysis of EEOC data. In 2016, the share of minority directors on FHLBank boards was 13 percent. Board demographic data collection processes vary by FHLBank, which may contribute to the differences in the number of directors who did not self-identify their gender, race/ethnicity, or both. FHFA has not reviewed the banks’ varying processes to determine whether some processes were more effective, such as whether the practices allowed banks to more effectively identify and follow up with directors who may have forgotten to respond. All directors at three banks self-reported their gender and race/ethnicity in 2015–2017, but some directors at the other eight banks did not self-identify this information. However, we could not determine whether those directors deliberately chose not to self-report this information or inadvertently did not respond to the data collection forms or questions. As allowed by FHFA regulation, FHLBanks varied in the data collection forms they used, questions they asked, and methods they used to distribute forms to board directors to obtain self-reported gender and race/ethnicity information. For example, the three banks with complete data from all directors each used different data collection forms. One bank collected gender and race/ethnicity as a voluntary section of its annual board director skills assessment, which was filled out by each director. Two banks distributed a separate data collection form at a board director meeting or through an online survey, which might have included a mechanism for tracking which directors had not responded to the survey. The other eight banks, which had incomplete demographic data, also used varying data collection processes. Of these, four banks distributed their data collection forms during a board meeting or through an e-mail, and the other four banks used online surveys. Of the 11 banks, six included an option on their forms to mark “opt not to self-identify,” while five included similar language as part of the form indicating that completing the form is voluntary. Although some banks had similar approaches to data collection, such as using an online survey, it is unclear whether certain approaches helped some banks to obtain more complete data despite directors’ right to opt out of self-reporting demographic information. FHFA has implemented some efforts on improving the quality of the data FHLBanks report to the agency, but FHFA staff told us that such efforts have not included a review of how the banks collect board director demographic data. For example, FHFA created templates to help banks report board data and board-related content, and its data reporting manual focused on reporting data related to the banks’ workforce, supplier base, and financial transactions. However, none of these documents discussed processes for collecting board director demographic data. According to FHLBank staff, FHFA’s instructions on board director data collection are limited to what is stated in the regulation. That is, banks should collect data on their board directors’ gender and race/ethnicity using EEOC categories, and such data should be voluntarily provided by the directors without personally identifiable information. FHFA’s 2015 regulation amendments require FHLBanks to compare the board demographic data with prior year’s data and provide a narrative of the analysis. FHFA also stated in the amendments that it intended to use the director data to establish a baseline to analyze future trends of board diversity. Additionally, federal internal control standards state that agency management should use quality information to achieve their objectives. Quality information would include complete and accurate information that management can use to make informed decisions in achieving key objectives. By obtaining a better understanding of the different processes FHLBanks use to collect board demographic data, FHFA and the banks could better determine which processes or practices could contribute to more complete data. For example, there may be practices that could help banks more effectively follow up with directors who might have missed the data collection forms or questions. More complete board demographic data could help FHFA and the banks more effectively analyze data trends over time and demonstrate the banks’ efforts to maintain or increase board diversity. FHLBanks report some challenges that may slow or limit their efforts to increase board diversity, which include low levels of diversity in the financial sector; member institutions not prioritizing diversity; balancing the need for diversity with retaining institutional knowledge; and competition for women and minority candidates. Despite these challenges, the banks have taken several steps to help increase board diversity. According to FHLBank representatives, including board directors, the FHLBank boards face challenges that may slow or limit their efforts to increase diversity, including the following: Low levels of diversity in the financial sector. Twelve representatives from nine FHLBanks told us that the pool of eligible women and minority board candidates is small in the banking and financial sector. For example, five representatives emphasized that the majority of member institutions have chief executive officers (CEO) who are white males. In particular, one director told us that out of the hundreds of member institutions affiliated with his FHLBank, he knew of only six female CEOs. Directors representing five banks also noted that the pool of eligible, diverse candidates in senior management positions in the financial services sector can be even smaller in certain geographic areas. As a result, it can be particularly challenging for some banks to fill member director seats because, by statute, candidates for a given FHLBank board must come from member institutions in the geographic area that the board seat represents. For example, one director said that the pool of such candidates is especially small in rural areas. In 2015, FHFA told us that the overall low levels of diversity in the financial services sector, including at FHLBank member institutions, increased the challenges for improving board diversity. However, representatives of corporate governance organizations with whom we spoke told us that the financial services sector does not face unique challenges. Representatives also said that qualified women and minority candidates are present in the marketplace. Our analysis of 2016 EEOC data found that the representation of women in senior management in the financial services sector was within 1 percentage point of the share of women in senior management in the private sector overall, and minority representation was within 4 percentage points. Member institutions may not always prioritize diversity in director elections. As previously discussed, member institutions nominate member director candidates and vote for the member director and independent director candidates. Ten representatives from eight FHLBanks stated that member institutions may prioritize other considerations over diversity when they nominate and vote on board candidates, such as name recognition or a preference for candidates who are CEOs. One director told us that the member banks may not be as interested in diversity as the FHLBanks. Another director emphasized that FHLBanks are trying to change attitudes and embed diversity in the member institutions’ operations. He characterized this process as a marathon, not a sprint. Board directors with whom we spoke also stressed that FHFA regulations do not allow the FHLBank boards to exert influence over how member institutions vote. Board directors can emphasize the importance of diversity to member institutions but cannot in their official capacity campaign for specific candidates. Balancing the need for diversity with retaining institutional knowledge. Directors from five banks told us that they aim to balance bringing in new women or minority directors with retaining the valuable institutional knowledge of incumbent directors. One director added that new board directors face a steep learning curve. Thus, the directors at some banks will recruit new directors only after allowing incumbent directors to reach their maximum number of terms (which could translate to several years). As we reported in 2015, FHFA staff acknowledged that low turnover, term lengths, and the need to balance diversity with required skills posed challenges to the FHLBank board diversity. In our 2016 report on women on corporate boards, relevant stakeholders acknowledged this as a challenge because directors with longer tenure possess knowledge about a company that newer directors cannot be expected to possess. Competition for women and minority candidates. Board directors from five FHLBanks told us that they face competition as they seek to recruit women and minority candidates. For example, a director from one bank told us that his board encouraged a potential female candidate to run for a director seat. However, the candidate felt she could not accept the opportunity because of her existing responsibilities on the boards of two publicly traded companies. While these challenges can apply to member and independent directors, representatives from all 11 FHLBanks emphasized that it can be particularly challenging to find and elect female or minority member directors. Our analysis of FHLBank board director data confirmed that across 11 FHLBank boards, female representation was lower among member directors (13 directors or 12 percent) than independent directors (31 directors or 36 percent) in October 2018. FHFA stated in this review and in 2015 that they are aware of the potential difficulty of identifying diverse candidates for member directors and that greater board diversity likely would be achieved with independent directors. Since 2015, FHLBanks have taken actions to help increase board diversity, including developing and implementing practices and strategies that target board diversity in general and member directors specifically. As previously discussed, at the request of FHFA, the banks established the Bank Presidents Conference Board Diversity Task Force. The purpose of the task force is to develop recommendations for advancing board diversity and to enhance collaboration and information sharing across FHLBank boards. Each bank is represented by a board director or the bank president. Representatives meet regularly to discuss challenges, recommend practices, and receive training. One task force representative told us that her participation on the taskforce has helped demonstrate to her board and bank that diversity matters. Others mentioned that the ability to share practices and learn from other banks was a great benefit. As part of its work, the task force developed a list of practices that FHLBanks have used or could use to improve board diversity (see text box). According to bank staff, the list was approved by the presidents of each bank and distributed to bank staff. The practices can be generally summarized into three categories—emphasizing the importance of diversity; assessing skills diversity; and seeking new ways to find candidates—which are generally similar to the commonly cited practices for improving board diversity we identified in 2015. Summary of Practices Developed by Bank Presidents Conference Board Diversity Task Force of the Federal Home Loan Banks Include references to diversity on the bank website, in appropriate publications, in presentations about the bank, and particularly in all election materials. Educate current board members on the business case for diversity. Educate member institutions on the business case for diversity through member meetings, newsletter articles, etc. to help develop a more diverse member base and help groom new leaders. Perform a skills assessment of current board skills and areas of expertise and determine skill sets and expertise needed. Review the term limits of current directors and determine the possible loss of continuity if multiple incumbent directors leave the board in a short period of time. Build a pool of diverse member and independent candidates. Conduct outreach to regional and national business organizations, such as trade associations, women and minority business groups, and professional organizations, to ask for referrals of possible candidates and form relationships prior to a board election. Seek an additional independent board seat from the Federal Housing Finance Agency. Example of Diversity Statement in an Election Announcement for a Federal Home Loan Bank The Federal Home Loan Bank of New York (FHLBNY) included the following statement in its 2017 director election announcement package: “The FHLBNY’s Board of Directors consists of a talented group of dedicated individuals that benefits from, among other things, demographic (including gender and racial) diversity, and we expect that this will continue in the future. As you consider potential nominations for Member Directorships and give thought to persons who might be interested in Independent Directorships, please keep diversity in mind. Your participation in this year’s Director Election process is greatly appreciated, and will help continue to keep the Board and the FHLBNY diverse and strong.” Emphasizing the importance of diversity. All 11 FHLBanks included statements in their 2017 election announcements that encouraged voting member institutions to consider diversity during the board election process. Six banks expressly addressed gender, racial, and ethnic diversity in their announcements. One female director with whom we spoke said that she was encouraged to run for a board seat after reading an election announcement in 2013 that specifically called for candidates with diverse backgrounds. All 11 FHLBanks also referenced their commitment to diversity on their websites, including posting diversity and inclusion policies, describing diversity missions, or including board statements on diversity. Directors we interviewed from all 11 FHLBanks told us that their bank conducted or planned to conduct diversity training for board directors. The training sessions covered topics such as the business case for diversity and unconscious bias. Additionally, board directors from two banks discussed efforts to encourage member institutions to increase diversity, such as holding a panel on the importance of diversity at the annual member conference. In 2015, we found that demonstrating a commitment to diversity in ways similar to these is a first step towards addressing diversity in an organization. Assessing skills diversity. Nine FHLBanks performed board skills assessments annually or biennially. These assessments asked directors to evaluate their knowledge of specific topic areas. FHFA regulation allows each bank to annually conduct a skills and experience assessment and, if applicable, inform members before elections of particular qualifications that could benefit the board. In 2015, we found that conducting a skills assessment was a commonly cited practice for boards seeking to increase representation of women and minorities. The other two FHLBanks conducted board self-assessments annually, focused on board effectiveness and organization, but did not evaluate the skills of their individual directors. All 11 FHLBanks also reported regularly reviewing the remaining terms of current directors to determine the possible loss of continuity. Seeking new ways to find candidates. Representatives from 10 FHLBanks noted that their banks maintain a pool of diverse director candidates for future open positions. FHLBanks described using various methods to build these pools. All 11 banks described outreach to trade organizations, industry groups, universities, and nonprofit organizations when looking to identify women and minority candidates. For example, FHLBank of Pittsburgh identified 15 organizations in its district that actively promote diversity and the inclusion of women and minorities in business to specifically target in 2017. Directors from seven banks also reported hiring a search firm or consultant to help them identify women and minority candidates. These activities are consistent with commonly cited practices described in our 2015 work that boards can use to reach out beyond the typical pool of applicants. As previously mentioned, seven FHLBanks requested or were offered an additional independent director seat by FHFA. According to FHFA staff, four of the seats were filled by white females, two were filled by minority females, and one was filled by a minority male. Example of a Diversity Practice Focused on Member Directors In 2017, the Federal Home Loan Bank of San Francisco developed a Member Director Diversity Outreach Plan. The plan included eight steps that provide timelines and specific assignments for directors and bank management. For example, steps include conducting early outreach to trade organizations where women and minority directors might participate, individual director outreach to potential candidates, and developing a list of prospective candidates in case of vacancy appointments. Following the implementation of this plan, member institutions elected one female director and one minority director to fill the vacant member director seats. Fill interim seats with women and minority candidates. FHLBanks can appoint women or minority candidates to fill interim member director seats. By regulation, when a director leaves the board in mid- term, the remaining board directors may elect a new director for the remaining portion of the term. For example, the FHLBank of Pittsburgh reported electing a minority director in 2017 to fill a vacant member director seat. One director told us that when a female or minority director is elected for an interim term, the election increases the likelihood of the director being elected by the member institutions for a following full term. Conduct mentoring and outreach. FHLBank board directors also can use their personal networks to conduct outreach and mentor potential candidates. Current directors can pledge to identify and encourage potential women and minority candidates to run for the board. For example, one director told us that his board emphasizes the need for directors to pay attention to potential women and minority candidates they meet. This director said he had personally contacted qualified potential candidates and asked them to run. Another director noted that women and minority directors are likely to know other qualified candidates with diverse backgrounds. These directors can identify and refer individuals in their networks. Another director emphasized the importance of member directors conducting outreach to member institutions. Member directors have the most interaction with the leadership of member institutions and can engage and educate them on the importance of nominating and electing diverse member directors. Look beyond CEOs. Additionally, FHLBanks can search for women and minority candidates by looking beyond member bank CEOs. By regulation, member directors can be any officer or director of a member institution, but there is a tendency to favor CEOs for board positions, according to board directors, representatives of corporate governance organizations, and academic researchers with whom we spoke. The likelihood of identifying a woman or minority candidate increases when member institutions look beyond CEOs to other officers, such as chief financial officers or board directors. For example, the FHLBank of Des Moines expanded its outreach to women and minority candidates to include board directors at member institutions. In 2017, a female director who is a board member of her member institution was elected. The Housing and Economic Recovery Act of 2008 emphasized the importance of diversity at the FHLBank System, and FHFA and FHLBanks have undertaken efforts to encourage diversity at the banks’ boards. In particular, FHFA plans to use data it collects on the gender and race/ethnicity of board directors as a baseline to analyze trends in board diversity. While FHFA regulation allows directors to choose not to report this information, the banks’ varying data collection processes did not always allow banks to accurately account for missing information (as in the case of directors forgetting to respond to the data questions or fill out forms). Reviewing the processes the banks use to collect the demographic data could help FHFA and the banks identify practices to produce data that would better allow FHFA to track trends in board diversity. FHFA could work with FHLBanks (potentially through the system-wide Board Diversity Task Force) to conduct such a review. The Director of FHFA’s Office of Minority and Women Inclusion, in consultation with FHLBanks, should conduct a review on each bank’s processes for collecting gender and race/ethnicity data from boards of directors and communicate effective practices to FHLBanks. (Recommendation 1) We provided a draft of this report to FHFA and each of the 11 FHLBanks for review and comment. In its comments, reproduced in appendix III, FHFA agreed with our recommendation. FHFA commented that it intends to engage with FHLBanks’ leadership in 2019 to discuss board data collection issue and address our recommendation. FHFA also stated that it plans to request that the Board Diversity Task Force explore the feasibility and practicability for FHLBanks to adopt processes that can lead to more complete data on board director demographics. In addition, four FHLBanks provided technical comments, which we incorporated as appropriate. The other seven FHLBanks did not have any comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Acting Director of FHFA, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or ortiza@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines the (1) extent to which the Federal Housing Finance Agency (FHFA) has taken steps to encourage board diversity at the Federal Home Loan Banks (FHLBank); (2) trends in diversity composition (gender, race, and ethnicity) for the boards of individual FHLBanks; and (3) challenges FHLBanks face and practices they use in recruiting and maintaining a diverse board. While diversity has many dimensions, this report focuses on gender, race, and ethnicity. To understand the steps FHFA has taken to encourage FHLBank board diversity, we reviewed relevant laws and regulations related to FHLBank boards, including FHFA regulations on director elections and diversity reporting requirements. For example, we reviewed the relevant sections in the Housing and Economic Recovery Act of 2008 pertaining to FHFA and the banks and FHFA’s 2010 Minority and Women Inclusion rule and its 2015 amendments. We also reviewed other FHFA and bank documentation related to board director elections and diversity considerations. For example, we reviewed FHFA’s annual board director analysis for 2016–2018 to identify actions the agency took to help maintain or increase the number of female or minority directors at the FHLBank boards. Additionally, we interviewed FHFA staff to understand the agency’s role in overseeing FHLBank board diversity and the agency’s efforts in helping the banks maintain or increase board diversity. To describe trends in FHLBank board diversity, we analyzed gender and race/ethnicity data self-reported by board directors in FHLBanks’ annual reports to FHFA as of the end of 2015, 2016, and 2017. The banks’ annual reports use the gender and race/ethnicity classifications from the Employer Information Report (EEO-1) of the Equal Employment Opportunity Commission (EEOC). The EEO-1 report race/ethnicity categories are Hispanic or Latino, White, Black or African-American, Native Hawaiian or Other Pacific Islander, Asian, Native American or Alaska Native, and Two or More Races. The Hispanic or Latino category in EEO-1 incorporates Hispanics or Latinos of all races. For our report, we used the following categories: Hispanic, White, African-American, Asian, and “Other.” We included only non-Hispanic members under White, African-American, Asian, and “Other.” We included Asian American, Native Hawaiian or Pacific Islander under the Asian category, and we included Native American or Alaskan Native, and Two or More Races under “Other.” To provide more recent data on gender composition, we also analyzed data on the gender of directors who were on boards as of October 17, 2018. Specifically, we compiled a list of board directors who started or continued their terms on the boards in 2018, based on board director information from the banks’ 2017 Form 10-K filings with the Securities and Exchange Commission (SEC). The filings include the names and brief biographies of board directors, which we used to derive the gender data for directors. For example, if directors were referred to as “Mr.” in the Form 10-Ks, we counted them as male. If they were referred to as “Ms.,” we counted them as female. We then confirmed with each FHLBank the compiled list of board directors, as of October 17, 2018. Because some directors did not self-identify their gender in 2015–2017 annual reports, we also used information in the banks’ 2014–2016 Form 10-Ks to derive data on the gender of the banks’ board directors. As a result, we were able to report the gender information for all FHLBank board of directors from 2015 through October 2018. We separately requested the names of the chairs and vice chairs for the committees of each bank’s board as of October 26, 2018. We then derived the gender of the chairs and vice chairs for these committees based on the information in the banks’ Form 10-Ks. To analyze data on board director race/ethnicity, we relied on FHLBanks’ 2015–2017 annual reports. However, we were not able to use banks’ Form 10-Ks to derive data on race/ethnicity for board directors who did not self-identify race/ethnicity in the annual reports because the 10-Ks do not include such information. We also requested and analyzed from each bank data on the gender and race/ethnicity of their board chair and vice chair as of October 17, 2018. We assessed the reliability of the data from the banks’ annual reports and Form 10-Ks through electronic testing, a review of documentation, and interviews with knowledgeable agency staff, and we determined these data to be sufficiently reliable for describing the overall trends and composition of gender and race/ethnicity at the FHLBank boards, except the data for directors who did not self- identify their race/ethnicity, as discussed in the report. We also compared the most recently available demographic information on FHLBank board directors with the demographic composition of senior management in the financial services industry and the overall private sector (excluding financial services), based on data from the 2016 EEO-1 report from EEOC. Senior management in the financial services industry represents a pool of comparable candidates that could provide directors for FHLBank boards. The EEO-1 report data are annually submitted to EEOC by most private-sector firms with 100 or more employees. The data include gender and race/ethnicity of the employees by job category. We included workforce from all sites of multi-establishment companies (companies with multiple locations). Consequently, the analysis included in this report may not match the analysis found on EEOC’s website, which excludes workforce from sites of multi-establishment companies with less than 50 employees. In our analysis of senior management-level diversity in the financial services sector, we included companies in the finance and insurance industry categorized under code 52 of the North American Industry Classification System. We assessed the reliability of the data from the EEO-1 report through electronic testing, a review of documentation, and interviews with knowledgeable agency staff. We determined these data to be sufficiently reliable for comparing the composition of gender and race/ethnicity in the financial services sector and the overall private sector with that of the FHLBank boards. Furthermore, to provide a general comparison of FHLBank board diversity composition with corporate boards of U.S. companies, we reviewed research that discussed data related to diversity at corporate boards of U.S. companies in recent years. In addition, from each FHLBank, we requested and reviewed the instrument they used to collect gender and race/ethnicity information from their board directors. We also obtained and reviewed information on the methods the banks used to distribute and collect the data collection instruments, and any instructions FHFA provided to the banks or that the banks provided to the board directors on collecting this information. We reviewed relevant information from the banks’ annual reports and relevant regulations on collecting and submitting board directors’ gender and race/ethnicity information. We also compared the banks’ data collection processes with relevant federal internal control standards. To determine the challenges the FHLBanks face and practices they use to recruit and maintain a diverse board, we interviewed staff at FHLBanks and FHFA to learn about the Bank Presidents Conference Board Diversity Task Force and the list of diversity practices compiled by the task force. We reviewed and analyzed the banks’ 2017 annual reports to learn about the most recent practices the banks implemented. We also reviewed the banks’ websites and bank documents, such as election materials and skills assessments for all 11 banks. In addition, we conducted semi- structured interviews with 10 board directors and one bank president, who act as representatives on the system-wide board diversity task force. We also conducted semi-structured interviews with a nongeneralizable sample of FHLBank board chairs from six banks (Atlanta, Boston, Des Moines, Pittsburgh, San Francisco, and Topeka). We selected these banks to achieve variation in board diversity composition (share of women and minority directors), asset size, and geographic locations. In these interviews, we asked directors and staff about the challenges their banks faced as they sought to increase or maintain diverse boards. We also asked about their participation on the task force, the task force diversity practices, and any other practices their banks had implemented related to board diversity efforts. To determine if the task force diversity practices generally followed commonly cited practices used to improve board diversity, we compared the task force practices against commonly cited practices we identified in previous work in 2015. To verify that the practices we identified in 2015 were still relevant and useful, we interviewed three academics and representatives of four organizations that advocate for board diversity, including gender and racial/ethnic diversity. We selected these external stakeholders based on their research and experience related to increasing board diversity and referrals from others knowledgeable in the field. In our interviews with external stakeholders, we also asked about the challenges that financial organizations or other publicly traded companies may face as they work to increase or maintain board diversity. We compared these answers to the challenges that FHLBank representatives described. We conducted this performance audit from July 2018 to February 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Anna Maria Ortiz, (202) 512-8678, ortiza@gao.gov. In additional to the individual named above, Kay Kuhlman (Assistant Director), Anna Chung (Analyst in Charge), Laurie Chin, Kaitlan Doying, Jill Lacey, Moon Parks, Barbara Roesmann, Jessica Sandler, and Jena Sinkfield made key contributions to this report.", "summary": "The FHLBank System consists of 11 regionally based banks cooperatively owned by member institutions. In 2018, each FHLBank had a board of 14–24 directors. Member directors are nominated from member institutions and independent directors from outside the system. Member institutions vote on all directors. At least two independent directors on a board must represent consumer or community interests. FHFA is the regulator of the FHLBanks. GAO was asked to review FHLBanks' implementation of board diversity and inclusion matters. This report examines (1) steps FHFA took to encourage board diversity at FHLBanks; (2) trends in gender, race, and ethnicity on FHLBank boards; and (3) challenges FHLBanks face and practices they use to recruit and maintain diverse boards. GAO analyzed FHLBank data on board demographics, reviewed policies and regulations, and reviewed previous GAO work on diversity at FHLBanks and the financial services industry. GAO interviewed FHFA and FHLBank staff and a nongeneralizable sample of FHLBank board directors and external stakeholders knowledgeable about board diversity. The Federal Housing Finance Agency (FHFA) has taken formal and informal steps to encourage board diversity at Federal Home Loan Banks (FHLBank) since 2015. For example, FHFA required FHLBanks to add board demographic data to their annual reports; clarified how banks can conduct outreach to diverse board candidates; and allowed some banks to add an independent director. Since 2015, the share of women and minority directors on the boards of FHLBanks increased (see figure). The number of women directors increased from 34 in 2015 to 44 in October 2018, and the number of minority directors increased from 20 in 2015 to 30 in 2017, based on most recently available data. Trends for minority directors were less clear, because the banks' varying data collections processes did not always allow them to determine the extent to which directors opted out or forgot to answer data collection forms. FHFA stated that it planned to use board data to establish a baseline to analyze diversity trends. A review of the banks' data collection processes would help identify whether practices exist that could help improve the completeness of the data. FHLBanks reported they continued to face some challenges to their efforts to promote board diversity, especially among member director seats. The challenges include (1) balancing the addition of new women or minority directors with retaining the institutional knowledge of existing directors; and (2) competing with other organizations for qualified female and minority board candidates. Despite reported challenges, FHLBanks have taken measures to promote board diversity, such as establishing a task force to promote board diversity through information sharing and training. Individually, the FHLBanks emphasized the importance of diversity in election materials, built pools of diverse candidates, and conducted outreach to industry and trade groups. They also took actions to increase diversity specifically among member directors, including filling interim board seats with women and minority candidates and encouraging directors to personally reach out to potential women and minority candidates. GAO recommends that FHFA, in consultation with FHLBanks, review data collection processes for board demographic information and communicate effective practices to banks. FHFA agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "The Tobacco Control Act specifies the total amount of tobacco user fees that FDA is authorized to assess and collect each fiscal year (beginning with fiscal year 2009) and stipulates those fees must be used for FDA’s tobacco regulation activities. FDA collected about $4.5 billion in tobacco user fees from fiscal year 2010 through fiscal year 2018, according to FDA budget documents, and has ongoing authority to assess and collect $712 million from tobacco manufacturers and importers annually starting in fiscal year 2019. See table 1 for the total user fees the Tobacco Control Act authorized FDA to collect, by fiscal year. All of FDA’s activities related to regulating tobacco products—including activities aimed at preventing youth use of tobacco products, educating the public about tobacco products and the risks associated with their use, and issuing regulations on the marketing and advertising of tobacco products—are funded through tobacco user fees, as required by the Tobacco Control Act. FDA’s Center for Tobacco Products (CTP), which was established by the act, is responsible for executing FDA’s tobacco regulation responsibilities. Within CTP, the two main offices involved in carrying out FDA’s tobacco user fee responsibilities are the Office of Management and the Office of Compliance and Enforcement. CTP’s Office of Management staff duties include—but are not limited to—calculating individual tobacco manufacturer’s and importer’s market share quarterly within each tobacco product class, as well as completing FDA’s year-end reconciliation process to ensure its market share calculations for each fiscal year are based on complete and accurate data. CTP’s Office of Compliance and Enforcement staff are involved in FDA’s efforts to implement and enforce the Tobacco Control Act by (1) informing tobacco manufacturers and importers that they must pay the required quarterly tobacco user fee, if they have not done so, by the due date, and (2) working to obtain voluntary compliance, or taking advisory or enforcement actions, when manufacturers or importers continue to fail to comply with the user fee requirements. FDA’s Office of Financial Management is responsible for calculating the quarterly assessments for each tobacco product class, and for activities related to the billing and collection of tobacco user fees. For example, FDA’s Office of Financial Management generates quarterly invoices for individual manufacturers and importers based on CTP’s market share calculations. Additionally, this office processes tobacco user fee payments received and works with CTP’s Office of Compliance and Enforcement to help collect user fee payments from tobacco manufacturers and importers that do not pay a quarterly assessment by the due date. The Tobacco Control Act establishes requirements regarding the calculation, billing, and collection of tobacco user fees. Calculation. For each fiscal year, total user fees are to be allocated in 1. Class allocation. The amount of total user fees for a fiscal year (e.g., $635 million for fiscal year 2017) is allocated among the different tobacco product classes subject to user fees; this allocation is based on each class’s share of the gross domestic volume of tobacco products introduced into the U.S. market. 2. Individual allocation. The amount of user fees allocated to each manufacturer or importer is proportional to its market share within a given class of tobacco products. For example, a manufacturer with 50 percent of the cigarette market would be required to pay 50 percent of user fees allocated for the cigarette product class. The act specifies that no manufacturer or importer of tobacco products shall be required to pay a user fee in excess of the percentage share of such manufacturer or importer. See figure 1 for a summary of the tobacco user fee allocation process under the Tobacco Control Act. Notifications to each manufacturer or importer of the amount of its quarterly tobacco user fee assessments are to be sent at least 30 days before the end of the quarter for which the assessment is made. Collection. Tobacco user fee payments are due the last day of each quarter. If a manufacturer or importer does not pay its user fee assessments by the last day of the relevant quarter, the act states that tobacco product shall be deemed adulterated. Since the enactment of the Tobacco Control Act, FDA has issued several final rules (regulations) regarding its process to calculate, bill, and collect tobacco user fees, including the following: In 2014, FDA issued a final rule requiring tobacco manufacturers and importers to submit to FDA the information needed to calculate individual tobacco user fees, starting with fiscal year 2015. This rule applied to the four classes of tobacco products FDA initially regulated: cigarettes, snuff, chewing tobacco, and roll-your own tobacco. Fiscal year 2015 was the first year for which FDA obtained the data directly from manufacturers and importers to calculate individual tobacco user fee assessments. In 2016, FDA issued a final rule extending FDA’s regulatory authority to all tobacco products, including pipe tobacco and cigars (but excluding accessories of newly deemed products). Using its deeming authority, FDA issued another final rule requiring that pipe tobacco and cigar manufacturers and importers submit to FDA the information required to calculate user fees for these tobacco product classes. FDA began collecting tobacco user fees from the pipe tobacco and cigar classes in fiscal year 2017. See appendix I for a timeline of events related to FDA tobacco product user fees. FDA’s process for calculating, billing, and collecting user fees involves five steps. First, FDA collects the data needed to calculate the quarterly user fee allocations for each tobacco product class and, within each class, for individual manufacturers and importers. For its quarterly class allocation calculations, FDA collects data on the total volume (units) of tobacco products introduced into the U.S. market for each tobacco product class from the Department of the Treasury’s Alcohol and Tobacco Tax and Trade Bureau (TTB)—these data are published on the TTB website. FDA also collects data from individual manufacturers and importers on the volume of and federal excise taxes paid for their tobacco products introduced into the U.S. market in each product class. Tobacco companies submit these data to FDA as part of required monthly report submissions. Second, FDA uses the TTB data it collected to calculate the quarterly class allocations. Third, FDA calculates the user fees owed by individual manufacturers or importers within a given product class, based on their market share in each tobacco product class and the quarterly class allocation it previously calculated. Fourth, FDA bills—that is, generates and mails user fee invoices to—tobacco product manufacturers and importers each quarter. Fifth, FDA collects user fee payments. User fees that are not received by FDA by the last day of the quarter are considered late, and are subject to financial charges beginning 30 days past the invoice due date and for each 30-day period that the assessment remains unpaid. Figure 2 shows the steps in FDA’s process to calculate, bill, and collect user fees. From fiscal year 2015—the first year that FDA obtained data directly from manufacturers and importers to calculate user fee assessments—through fiscal year 2017—the most recently available data at the time of our analysis—FDA assessed and collected about $1.8 billion in tobacco user fees. During this time, the vast majority of the total user fees assessed and collected each fiscal year were from manufacturers and importers of cigarettes. See figure 3 for user fees that FDA assessed, by product class, for fiscal years 2015 through 2017. FDA’s process is designed to ensure the quarterly user fees it calculates, bills, and collects each fiscal year are complete and accurate. This process is also designed to ensure user fee invoices are billed to tobacco manufacturers and importers in a timely manner and to help the agency ensure user fee payments are collected in a similar manner. Additionally, FDA has designed procedures to retroactively adjust its quarterly individual user fee calculations to include relevant excise tax data not reported to FDA at the time these calculations were completed. The agency’s year-end reconciliation process is designed to make these adjustments to ensure that the user fees assessed for a given fiscal year are complete and accurate. Calculation. FDA’s process related to its quarterly individual user fee calculations includes procedures to ensure its individual quarterly user fee assessments are complete and accurate. Tobacco manufacturers and importers provide monthly reports to FDA on the volume of and excise taxes paid on tobacco products introduced into the U.S. market, and those data are reviewed by CTP’s Office of Management for accuracy. If CTP identifies incomplete data or inaccurate reporting, it will contact the appropriate manufacturer or importer in an attempt to resolve discrepancies (e.g., differences between what the company reported to FDA and the supporting document it provided) prior to calculating individual market share for the quarterly billing cycle. However, according to agency officials, if the team is unable to resolve any discrepancies by the time it must submit market share percentages to FDA’s Office of Financial Management for the quarterly billing process, it uses the potentially incomplete or inaccurate data for its market share calculations. FDA officials stated that the agency may make adjustments to individual market shares and resulting user fees based on late or amended data it receives from manufacturers and importers after that data is received. While this is an option, FDA generally relies on its year-end reconciliation process to make all adjustments resulting from late or amended data received at one time, according to FDA officials. Billing: FDA’s process related to quarterly tobacco user fee billing includes procedures to ensure the invoices it creates for individual tobacco manufacturers and importers are complete and accurate—based on CTP’s market share percentages calculated using the monthly excise tax data submitted to FDA by manufacturers and importers—and mailed in a timely manner. For example, FDA’s billing procedures provide for quarterly user fee assessments to be calculated automatically in FDA’s Tobacco Billing Portal. Collection: FDA’s process related to the collection of quarterly tobacco user fees includes procedures to help it ensure quarterly tobacco user fee payments received are complete, accurate, and timely recorded. FDA has also designed mechanisms to identify and collect payment from tobacco manufacturers and importers who do not pay their invoices by the quarterly user fee due date (i.e., the last day of the applicable fiscal year quarter). For example, FDA has an internal system that is designed to generate alerts to warn staff of unpaid invoices that are approaching 30, 60, and 90 days past due so FDA can issue notification letters to inform the tobacco manufacturers and importers that their invoices are overdue and provide instructions for making a payment. (See appendix II for additional information on FDA’s process for the calculation, billing, and collection of tobacco user fees.) Outside of its tobacco user fee calculation, billing, and collection cycle, FDA’s procedures state that FDA will review TTB data to develop a list of current tobacco permit holders that may be subject to user fees. According to FDA officials, reviewing this list helps the agency ensure it has included all manufacturers and importers within relevant tobacco product classes in its individual quarterly user fee calculations. FDA procedures state that CTP’s Office of Management contacts the permit holders that have not reported monthly data to FDA, if identified, to inform them that (1) they are required to report monthly data to FDA for purposes of making user fee market share calculations, and (2) the permit holder may be required to pay quarterly tobacco user fees as a result of these data. User Fee Adjustments: FDA has also designed procedures to retroactively adjust its quarterly individual user fee calculations to include relevant excise tax data that were misreported or not reported to FDA at the time these calculations were completed. Individual quarterly user fee assessments are based on the market share of manufacturers and importers within each tobacco product class. As a result, FDA needs to recalculate all individual market share percentages within a given class of tobacco products if it receives new or amended data related to the excise taxes paid by manufacturers and importers in that class, to ensure compliance with the Tobacco Control Act. According to FDA’s procedures, FDA may recalculate its individual quarterly market share percentages to include changes identified by late or amended data submissions from individual tobacco manufacturers and importers, and FDA will recalculate market shares to include changes identified during its year-end reconciliation process. Late or amended data submissions. According to FDA’s procedures, FDA can receive data from tobacco manufacturers and importers that did not previously submit monthly data to FDA and were therefore excluded from FDA’s initial quarterly market share calculations. FDA can also receive late or amended data from tobacco manufacturers and importers that previously reported incomplete or inaccurate monthly data to FDA. According to FDA, in some instances, these late or amended data are data that FDA had requested during its monthly review process, but were received after FDA completed its quarterly market share calculations. According to FDA, companies may also voluntarily provide updated reports that the company itself determined were a correction to previously submitted data. Year-end reconciliation based on annual tax records from TTB and U.S. Customs and Border Protection (CBP). FDA’s procedures state that it will make annual adjustments to user fees for each fiscal year as part of its year-end reconciliation process. FDA’s procedures state that, by FDA request, TTB and CBP will provide an annual report listing the tobacco excise taxes paid by each manufacturer and importer subject to the tobacco user fee requirement. FDA officials stated that FDA submits an annual request to TTB and CBP for their records of the excise taxes paid by each tobacco permit holder in the six relevant tobacco product classes for the prior fiscal year. As of July 2019, FDA officials stated that because TTB and CBP have up to 3 years to update and finalize their data files, CTP plans to update its procedures to include two reconciliation processes for each fiscal year. According to FDA officials, the first reconciliation, the year-end reconciliation process, would begin immediately following the end of a fiscal year, and the second reconciliation would occur 3 years after that fiscal year ends. FDA’s Year-End Reconciliation Process Following the close of each fiscal year, the Food and Drug Administration’s (FDA) Center for Tobacco Products (CTP) initiates the year-end reconciliation process by requesting official records from the Alcohol and Tobacco Tax and Trade Bureau (TTB) and U.S. Customs and Border Protection (CBP). This process is designed to ensure that the tobacco user fees assessed that year are complete—that is, that all manufacturers and importers subject to user fees were assessed user fees—and accurate—that is, that the user fees assessed each quarter were based on accurate market share information. As designed, the year-end reconciliation includes steps for FDA to compare the information the agency used to calculate quarterly user fees with independent information obtained from TTB and CBP on the individual tobacco manufacturers and importers who paid tobacco excise taxes (to ensure FDA has a complete list of those who should pay user fees) and the amounts paid (to ensure FDA used the right amounts to calculate market share and user fees). According to FDA officials, the year-end reconciliation is designed to identify and make any needed corrections to its individual market share calculations based on findings of new, amended, or missing excise tax payments using the annual tax data provided by TTB and CBP (see sidebar). For example, FDA officials stated that FDA will use the data obtained from TTB and CBP to help identify tobacco manufacturers or importers that should have been assessed user fees but were not, due to the companies not reporting monthly data to FDA as required (non- reporters). This process also enables FDA to identify and address fraudulent reporting by tobacco manufacturers and importers who knowingly failed to submit or submitted false information in monthly forms sent to FDA. If FDA recalculates its quarterly market share percentages based on findings of new or amended excise tax data, FDA’s procedures specify that FDA will then make necessary adjustments to individual tobacco user fee assessments. FDA officials stated that FDA can apply necessary market share adjustments to individual user fee assessments in a subsequent quarterly invoicing cycle, or after the agency completes its year-end reconciliation process based on annual tax data from TTB and CBP. According to FDA officials, in order to limit the need to re-invoice companies multiple times outside of the regular billing cycle, FDA prefers to send the adjusted invoices out once the year-end reconciliation process is complete. However, the officials stated that they can make changes outside of the year-end reconciliation. For example, the officials reported making adjustments to individual user fee assessments for the cigar class once, for the first quarter of fiscal year 2017. In that instance, after receiving updated reports from two cigar companies that had initially reported incorrect excise tax data to FDA, FDA officials stated that the agency (1) recalculated the market share of cigar manufacturers and importers based on the amended data FDA received from both companies and (2) made necessary adjustments to the market share percentages and associated user fees for that class for that quarter. According to FDA, the agency has not completed its year-end reconciliation process since completing the reconciliation for fiscal year 2015—the first year that FDA obtained data directly from manufacturers and importers to calculate user fee assessments. FDA designed the year- end reconciliation process to ensure the agency’s individual user fee calculations are based on complete and accurate data and accurately reflect the market share of each tobacco manufacturer and importer. FDA procedures state that FDA will conduct an annual adjustment for each fiscal year using data received from TTB and CBP for individual manufacturers and importers. According to FDA officials, the agency has been unable to complete the reconciliation process for fiscal years 2016 through 2018 because it identified problems with the quality of data it had initially received from TTB and CBP for those years. FDA officials stated that the agency has worked with TTB and CBP, and officials believe they have determined the reasons for the data problems. Specifically, FDA officials said that changes in both the TTB and CBP internal data systems affected the data fields that FDA needs to complete the reconciliation process. As of July 2019, FDA officials had received revised excise tax and volume data for fiscal years 2016 and 2017 from CBP and TTB. They also received revised 2018 data from CBP and had requested, but not yet received, revised 2018 data from TTB. FDA officials said that once they have received the remaining 2018 data and determined that the data from both agencies are of sufficient quality, they will be able to perform the annual reconciliation process for those fiscal years. According to FDA officials, before they can be certain the data are of sufficient quality, the agency needs to modify its internal data system to accommodate a new CBP data format, and then run the data through the updated system. As of July 2019, FDA projects these modifications to its data system will be completed by the end of calendar year 2019. Once the modifications are finished, FDA projects it will complete the reconciliation process for fiscal year 2016 within 3 to 6 months, and then complete the reconciliation for fiscal years 2017 and 2018 in 3- to 6- month intervals consecutively after that. While FDA has identified the steps to perform the year-end reconciliation process for fiscal years 2016 through 2018, it could also face delays in the future, because it does not have reasonable assurance that it will receive quality data from TTB and CBP in a timely manner to complete the reconciliation process for future years. According to FDA officials, their efforts to obtain the data they need from TTB and CBP have focused on fiscal years 2016 through 2018, and they have not determined procedures or time frames for obtaining data from TTB and CBP for future years. However, according to FDA officials, the agency was considering possible actions for obtaining data in future years. One possible option the agency was exploring was the possibility of FDA gaining direct access to CBP’s and TTB’s data systems to obtain the data needed for the year- end reconciliation. According to officials, as of July 2019, CBP had offered this direct access to its data, and the officials expect to pursue this option with TTB officials for similar access. In addition, the agency reported efforts to schedule meetings with TTB and CBP to discuss establishing memorandums of understanding, or other written agreements, that would establish expectations—such as time frames and data format—with the agencies to obtain the quality data needed for the year-end reconciliation. As of September 2019, FDA reported it had scheduled a meeting with CBP officials and was working to schedule a meeting with TTB officials, but the agency had not yet determined procedures or time frames for obtaining the needed data from these agencies for future years. Federal internal control standards call for agencies to use quality information to achieve their objectives. As part of this standard, agencies obtain relevant data from reliable sources in a timely manner and process these data into quality information that supports their internal control system. Federal internal control standards also call for agencies to externally communicate the quality information necessary to achieve its objectives. As part of this standard, agencies communicate quality information externally through reporting lines so that external parties can help the entity achieve its objectives and address related risks. For example, information communicated includes significant matters relating to risks, changes, or issues that impact the agency’s internal controls. Consulting with TTB and CBP, determining procedures and time frames for FDA to receive the quality data it needs in future years, and documenting them in a written agreement would help to address this risk. Without completing the year-end reconciliation process in a timely manner, FDA cannot ensure that the data it uses to calculate individual user fees are complete and accurate. Until it works with TTB and CBP and resolves this issue, FDA is at increased risk that user fees may not be properly assessed on individual tobacco manufacturers and importers based on their market share of each tobacco product class. FDA collects user fees from tobacco manufacturers and importers for its tobacco regulation activities—including important activities such as educating the public about the risks associated with the use of tobacco products and preventing youth use of these products. The agency has designed a process with several steps for assessing these fees, including a year-end reconciliation, to ensure that the calculations are complete and accurate—that is, that all companies subject to user fees pay them, and that no companies are assessed fees in excess of their market share. However, for several years, FDA has faced serious delays obtaining the quality data it needs from TTB and CBP to complete the year-end reconciliations, according to FDA. Until FDA consults with these agencies to determine and document the procedures and time frames that will allow FDA to obtain the quality data it needs to complete this key step in a timely manner, the agency risks repeating these delays. Without performing its year-end reconciliation, FDA is at increased risk of allowing some companies—such as those who did not report information to FDA or who did not report accurate information—to not pay their required share of user fees, while other companies pay too much. The Commissioner of FDA should consult with TTB and CBP to determine and document—for example in Memorandums of Understanding or other written agreements—procedures and time frames for FDA to receive quality data from TTB and CBP that will allow FDA to complete its reconciliation process in a timely manner. (Recommendation 1) We provided a draft of this product to HHS for comment. In its comments, reproduced in appendix III, HHS generally agreed with our recommendation. The agency commented that it recognized GAO’s thorough review of FDA’s tobacco user fee program and stated that it is critically important for FDA to have a tobacco user fee collection program that is accurate, complete, and predictable. FDA also stated that it has prioritized making the necessary enhancements to its internal data system to accommodate the new format of TTB and CBP data files, and that these changes are on track to be completed by the end of 2019. HHS also provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Health and Human Services, FDA Commissioner, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This appendix provides additional information on the Food and Drug Administration’s (FDA) process, which is designed to ensure the quarterly user fees it calculates, bills, and collects each fiscal year are complete and accurate and that user fee invoices are billed to and collected from tobacco manufacturers and importers in a timely manner. Calculation. FDA’s process related to its quarterly user fee calculations include procedures to ensure the tobacco product class and individual manufacturer and importer allocations are accurate. According to FDA’s procedures, at the start of each fiscal year, FDA Office of Financial Management, Division of User Fees staff (1) calculate the percentage share for each tobacco product class and (2) enter these percentage shares into FDA’s User Fee System, which automatically calculates quarterly class allocations for each tobacco class. According to FDA officials, FDA’s Office of Financial Management, Division of User Fees staff, as well as Center for Tobacco Products’s (CTP) Office of Management, User Fee Management Team staff, review the class allocation calculations to verify the percentage shares were accurately calculated for each tobacco product class before entering the class percentages into FDA’s User Fee System. Prior to calculating individual market share percentages that are the basis for individual user fees, the User Fee Management Team within CTP’s Office of Management reviews the monthly data reported to FDA by tobacco manufacturers and importers for accuracy. According to FDA’s procedures, the CTP User Fee Management Team checks to ensure that the volume and excise tax data reported on each FDA form 3852 are accurate based on the accompanying supporting documents. According to FDA procedures, if the CTP User Fee Team identifies incomplete or inaccurate monthly reports, it contacts the appropriate tobacco manufacturers or importers to request the missing documentation or an amended FDA form 3852 and tries to resolve any inaccuracies prior to calculating individual market share for the quarterly billing cycle. Billing. According to FDA’s procedures, the CTP User Fee Management Team submits market share percentages to the FDA Office of Financial Management, Division of User Fees in the month prior to the date that invoices are to be issued. For example, for the first quarterly invoicing cycle (October through December), the CTP User Fee Management Team would submit market share percentages on November 15 and invoices would be mailed by the Division of User Fees by December 1. Using the market share data, the Division of User Fees calculates the quarterly user fee amount assessed to individual manufacturers and importers within each tobacco product class as part of its quarterly invoicing process. FDA officials stated that, prior to creating quarterly invoices, the Division of User Fees reviews CTP market share data to ensure it received all necessary data. Prior to mailing quarterly invoices to individual tobacco manufacturers and importers, FDA officials stated that division staff verifies that the invoices created are complete and accurate by comparing the invoice information to the CTP market share data. Collection. FDA’s Office of Financial Management, Division of User Fees utilizes different mechanisms to identify and notify tobacco manufactures and importers who do not pay their invoices by the quarterly user fee due date (i.e., the last day of the applicable fiscal year quarter). According to FDA’s procedures, the Division of User Fees uses a program within FDA’s User Fee System—referred to as the Dunning Tracker—to track relevant invoice data, including the date user fee payments are due and the amounts owed. The Dunning Tracker is designed to generate alerts to warn division staff of unpaid invoices that are approaching 30, 60, and 90 days past due so they can issue Dunning notification letters—which inform the tobacco manufacturers and importers that their invoices are overdue and provide instructions for making a payment. The Dunning notification letters also inform tobacco manufacturers and importers of the amount of additional charges assessed based on the number of days that the payment is late. According to FDA officials, division staff verify that a Dunning notification letter is issued for each tobacco manufacturer or importer with an outstanding invoice and that the appropriate charges have been assessed. According to FDA officials, the Division of User Fees also maintains an arrears list—a list of tobacco manufacturers and importers who have not paid their quarterly user fees on time. FDA’s procedures provide that the Division of User Fees will share the arrears list with the CTP Office of Compliance and Enforcement to assist that office’s efforts to obtain compliance with the user fee requirements. FDA officials stated that the office monitors the arrears list and takes enforcement action when appropriate. The officials said that the office will first issue information letters, separate from the Dunning notification letters, to each tobacco manufacturer and importer on the arrears list to try to obtain voluntary compliance on the user fee payments owed. FDA officials stated that if the office is unable to obtain compliance after it issues the information letter, it may take further action, such as notifying the delinquent company that all tobacco products manufactured and imported by it are adulterated. Agency officials told us that, in 2014, FDA notified three individual tobacco manufacturers that all the tobacco products they manufactured were adulterated due to these companies’ failure to pay their tobacco user fees. According to FDA’s procedures, the Division of User Fees refers delinquent debt to the Department of Health and Human Services (HHS) Program Support Center when outstanding invoices reach 90 days past due. The Program Support Center will pursue collection efforts per its standard procedures and issues two reports each month to the Division of User Fees to inform it of which debts have been collected and which are uncollectable. In addition to the contact named above, Kim Yamane (Assistant Director), Matthew Byer (Analyst in Charge), Sam Amrhein, Julie Flowers, Jackie Hamilton, Derry Henrick, Vikki Porter, and LaDonna Towler made key contributions to this report.", "summary": "Tobacco use causes more than 480,000 deaths each year, according to the Department of Health and Human Services (HHS). To protect the public, the Family Smoking Prevention and Tobacco Control Act granted FDA, an agency within HHS, authority to regulate tobacco products. To fund FDA's tobacco regulation activities—such as those aimed at preventing youth use of tobacco products—the act authorizes FDA to assess and collect a specified total amount of user fees from tobacco manufacturers and importers each fiscal year. The total amount of user fees are to be allocated based on the individual manufacturers' and importers' market share in six FDA-regulated tobacco product classes. GAO was asked to review FDA's tobacco user fees. This report examines FDA's process for the calculation, billing, and collection of these fees. GAO reviewed the relevant law and regulations, as well as FDA policies and procedures, and interviewed FDA officials. In fiscal year 2017, the latest data available at the time of our analysis, the Food and Drug Administration (FDA) assessed about $635 million in user fees to tobacco manufacturers and importers of six classes of FDA-regulated tobacco products—cigarettes, snuff, chewing tobacco, roll-your-own tobacco, pipe tobacco, and cigars. (See figure.) FDA has a process that is designed to ensure accurate calculation, billing, and collection of tobacco user fees. However, the agency has not completed a key step in this process—its year-end reconciliation—since doing so for fiscal year 2015. FDA procedures provide that the agency will conduct this year-end reconciliation annually after receiving necessary data from the Department of the Treasury's Alcohol and Tobacco Tax and Trade Bureau (TTB) and U.S. Customs and Border Protection (CBP). FDA relies on this year-end reconciliation to ensure that its user fee calculations are based on complete and accurate data—that is, that all manufacturers and importers subject to tobacco user fees were assessed fees correctly, based on accurate market share data. Incomplete or inaccurate data for one manufacturer or importer affects the market share—and the user fee amount—for all other manufacturers and importers in its product class. FDA has not completed this year-end reconciliation in recent years because of delays in obtaining the quality data it needs from TTB and CBP. While FDA has reported receiving most of the data for fiscal years 2016 through 2018 and has plans for completing the reconciliation for those years, the agency faces a risk of repeating delays in its reconciliation efforts in the future because it does not have reasonable assurance that it will receive quality data in a timely manner moving forward. Until FDA consults with TTB and CBP to determine and document the procedures and time frames that will allow FDA to obtain the quality data it needs to complete this key step in a timely manner, the agency risks repeating these delays. GAO is recommending that FDA consult with TTB and CBP to determine and document procedures for FDA to obtain quality data so the agency can complete its annual reconciliation process in a timely manner. HHS agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "Air ambulance providers use either helicopters or fixed-wing aircraft, as shown in Figure 1, depending on where and how far they are transporting patients. Helicopters are generally used for transports from the scene of the accident or injury to the hospital or for shorter-distance transports between hospitals. Helicopter bases may be at hospitals, airports, or other types of helipads, and a provider may need to fly from its base to the scene or a hospital to pick up the patient being transported. Air ambulance providers typically respond to calls for helicopter transports within a certain area around their bases in part to ensure appropriate response times. Fixed-wing aircraft are generally used for longer-distance transports between hospitals. Fixed-wing bases are at airports, and the patient is transported by ground ambulance to and from the airports. Air ambulance providers respond to emergencies without knowing patients’ health insurance coverage, such as whether the patient has private insurance, Medicare, Medicaid, or no insurance. According to our previous analysis of information from eight selected air ambulance providers, in 2016, Medicare patients received 35 percent of helicopter transports, privately-insured patients received 32 percent, Medicaid patients received 21 percent, uninsured patients received 9 percent, and patients with other types of coverage such as automobile and military- sponsored insurance received a small percentage. Relatively few patients receive air ambulance transports, but those patients who do generally have no control over the decision to be transported by air ambulance or the selection of the air ambulance provider, as shown in Figure 2. For privately-insured patients, this means they cannot necessarily choose to be transported by air ambulance providers in their insurers’ network and can potentially receive a balance bill from the providers for the difference between the price charged by the provider and the amount paid by the insurer. This amount is in addition to copayments, deductibles, or other types of cost-sharing that patients typically pay under their insurance. Air ambulance providers are prohibited from sending balance bills to Medicare and Medicaid patients, while uninsured patients might be held responsible by the air ambulance provider for the entire price charged. With many types of health care services, both health care providers and insurers have incentives to negotiate and enter into contracts that specify amounts that providers will accept as payment in full, thereby avoiding the potential for balance bills for those services. Insurers can offer—and health care providers may be willing to accept—payment rates that are much lower than the providers’ charged amounts because the providers may receive more patients as an in-network provider. Furthermore, when patients are choosing insurance plans, they may consider how many or which providers are in-network, particularly for providers such as hospitals or certain physicians. The emergency nature of most air ambulance transports, as well as their relative rarity and high prices charged, reduces the incentives of both air ambulance providers and insurers to enter into contracts with agreed- upon payment rates, which means air ambulance providers may be more often out-of-network when compared with other types of providers. Decisions by first responders and physicians on which air ambulance provider to call are typically not based on the patient’s insurance plan, meaning that being in-network may not increase air ambulance providers’ transport volume. As a result, according to stakeholders we spoke to, if insurers offer payment rates that are much lower than the air ambulance providers’ charged amounts, the air ambulance providers may be less willing than other health care providers to accept those payment rates. Furthermore, given the relative rarity of air ambulance transports, patients may not anticipate needing air ambulance transports and may not choose insurance plans based on which or how many air ambulance providers are in insurers’ networks. Approaches by states or the federal government to limit balance billing may target providers, insurers, or both. Examples of approaches described in research on balance billing include a cap on the amount that providers can charge or a requirement for insurers to pay the full amount charged by providers. However, according to the research, targeting just providers or insurers can result in undesired outcomes. Capping the amount providers can charge could result in insurers that underpay for services, which could lead some providers to reduce service or exit the market altogether. Conversely, requiring insurers to pay the full amount charged by providers could result in providers that overcharge for services, which could lead to higher premiums charged to patients. The authority of states to address issues related to air ambulance balance billing is affected by the following federal laws: Airline Deregulation Act of 1978 (ADA): A provision in this law preempts state-level economic regulation—i.e., regulating rates, routes, and services—of air carriers authorized by DOT to provide air transportation. In general, courts have held that air ambulances are considered to be air carriers under the ADA’s preemption provision, and courts, DOT, and state attorneys general have determined specific issues related to the air ambulance industry that can and cannot be regulated at the state level. McCarran-Ferguson Act of 1945: This act affirmed that states have the authority to regulate the business of insurance. For example, states may review insurers’ health insurance plans and premium rates. In instances of balance billing, states can determine whether the insurer paid a provider in accordance with its policy for paying for out-of-network services. Employee Retirement Income Security Act of 1974 (ERISA): ERISA provides a federal framework for regulating employer-based pension and welfare benefit plans, including health plans. Although states may regulate health insurers, ERISA preemption generally prevents states from directly regulating self-insured employer-based health plans. In 2017, as previously mentioned, we reported on the increase in prices charged by helicopter air ambulance providers and on the lack of data on the factors that may be affecting prices charged. We also found only limited information was available related to several key aspects of the industry, ranging from basic aspects—such as the composition of the industry by type of air ambulance provider, the prices charged by air ambulance providers, and the number of overall transports—to the more complex, such as the extent of contracting between air ambulance providers and insurers or the extent of balance billing to patients. Given DOT’s authority to oversee certain aspects of the industry, we made four recommendations to DOT in 2017 to increase transparency and obtain information to better inform their oversight of the air ambulance industry: (1) communicating a method to receive air ambulance complaints, including those regarding balance billing; (2) taking steps to make complaint information publicly available; (3) assessing available federal and industry data to determine what information could assist in the evaluation of future complaints; and (4) considering consumer disclosure requirements for air ambulance providers, such as established prices charged and the extent of contracting with insurers. DOT has taken steps to respond to the first two recommendations, including adding information to its website describing how air ambulance complaints can be registered and used by DOT. It has also listed the number of air ambulance complaints filed with DOT each month starting in January 2018—23 air ambulance complaints have been filed with DOT through November 2018. DOT has not yet acted on the remaining two recommendations. Air ambulance providers added helicopter bases from 2012 through 2017, according to our analysis of the ADAMS data. Specifically, there were 752 bases in the 2012 data and 868 bases in the 2017 data. When we compared the data for each year, there were 554 bases in both years of data (i.e., existing bases), 314 bases in the 2017 data only (i.e., new bases), and 198 bases in the 2012 data only (i.e., closed bases); the new and existing bases are shown in Figure 3. This addition in bases also increased the total area served by helicopter bases by 23 percent. Several air ambulance providers told us about their decisions to open new bases. For example, one air ambulance provider told us that one way it evaluates the need for a new base in an area is to ask hospitals in that area about the number of transports they typically require and the length of time it takes helicopters to arrive to pick up patients. Along with adding helicopter bases, air ambulance providers also added fixed-wing bases from 2012 through 2017, according to our analysis of the ADAMS data. Specifically, there were 146 bases in the 2012 data and 182 bases in the 2017 data. When we compared the data for each year, there were 114 bases in both years of data (i.e., existing bases), 68 bases in the 2017 data only (i.e., new bases), and 32 bases in the 2012 data only (i.e., closed bases); the new and existing bases are shown in Figure 4. Both the existing and new bases are more prevalent in the Western and Southern parts of the United States. Given that fixed-wing aircraft are used for longer-distance transports and that patients are brought to the base rather than picked up by fixed-wing aircraft, we did not measure the area or any changes in the area served by fixed-wing bases, which are usually airports. Based on our previous work, we further analyzed two trends related to where air ambulance providers have chosen to locate their new bases. New bases in rural areas: About 60 percent of the new helicopter bases and about half of the new fixed-wing bases in the ADAMS data were in rural areas. We previously reported that some helicopter air ambulance providers told us that the lower population density in rural areas leads to fewer transports per helicopter at rural bases. They also said that, despite the lower population density, rural areas may have greater need for air ambulance transports. This may be due to, for example, the closure of some rural hospitals and the establishment of regional medical facilities, such as cardiac and stroke centers that provide highly specialized care. New bases in areas with existing coverage: For just under half of the new helicopter bases in the ADAMS data, the area served overlapped with existing air ambulance coverage by more than 50 percent. On one hand, according to some stakeholders we spoke to, the new helicopters may help enhance available services by, for example, being able to respond to a call if the existing ambulance resources are in use or otherwise unavailable. On the other hand, as we have previously reported, some air ambulance providers told us that when helicopters are added to bases in areas with existing coverage, those helicopters are not serving additional demand. As a result, the same number of transports is spread out over more helicopters, reducing the average number of transports per helicopter. The FAA Reauthorization Act of 2018, which became law in October 2018, requires the FAA to assess the availability of information to the general public related to the location of heliports and helipads used by helicopters providing air ambulance services and to update current databases or, if appropriate, develop a new database containing such information. This could provide additional information about base locations going forward. In the FAIR Health data on air ambulance transports for privately-insured patients, about two-thirds of the approximately 13,100 and 20,700 transports with information on network status were out-of-network in 2012 and 2017, respectively. (See Table 1.) The proportions were similar for both helicopter and fixed-wing transports in each year. The proportion of out-of-network air ambulance transports in the FAIR Health data set is higher than what research shows for ground ambulance transports and other types of emergency services. For example, one study found that 51 percent of ground ambulance transports in 2014 were out-of-network, and the same study and another one found that 14 and 22 percent of emergency department visits in 2014 and 2015 involved out-of- network physicians, even at in-network hospitals. Air ambulance providers and insurers we spoke to confirmed that their proportion of out-of-network transports was high in 2017, but some also reported they have recently been entering into more network contracts. For example, one of the large independent air ambulance providers and a national insurer entered into a contract that covered patients in five states as of August 2018. These contracts could decrease the extent of out-of- network transports and balance billing in the future for these states. Increases in the prices charged for air ambulance transports may exacerbate the financial risks related to balance billing for those with private insurance. In 2017, the median price charged by air ambulance providers for a transport was approximately $36,400 for a helicopter transport and $40,600 for a fixed-wing transport, according to our analysis of FAIR Health data. The prices charged in 2017 were an increase of over 60 percent from 2012, when the median price charged was approximately $22,100 for a helicopter transport and $24,900 for a fixed- wing transport. There is limited information on what insurers pay for out- of-network services. While out-of-network transports may result in balance billing, the FAIR Health data we analyzed do not indicate the extent to which patients received balance bills and, if so, the size of the bills. In addition, as we previously reported, there is a lack of comprehensive national data about the extent and size of balance bills, and air ambulance providers are generally not required to report such data. However, some states have attempted to collect information from patients about balance billing for air ambulance services. Therefore, to provide insights into potential balance bill amounts, we reviewed data on consumer complaints that two of our selected states had received about specific incidents of balance billing for 2014 through 2018. Data for Maryland contained about two dozen complaints with information on the specific amount of balance bills, and those amounts ranged from $12,300 to $52,000. Data from North Dakota contained three dozen complaints with information on the specific amount of balance bills, and those amounts ranged from $600 to $66,600, though all but one amount was over $10,000. Given that providers may agree to reduce amounts that patients would otherwise owe or insurers may increase their payments to providers, along with limited national data, the extent to which patients actually pay the full amounts of balance bills received is also unclear. Generally, officials from air ambulance providers we spoke to said that they first encourage patients to appeal to their insurers for increased payment. If these appeals do not fully address the balance bill, the providers may offer various payment options. For example, officials from one air ambulance provider said that it offers a discount of up to 50 percent off the balance bill if the patient pays the remaining 50 percent immediately. Alternatively, the provider requests detailed financial information—such as income, obligations and debts, and medical bills—to determine whether to potentially offer other discounts or a payment plan. This process can take multiple months, and officials from another air ambulance provider said patients who do not respond to letters and calls may be more likely to be referred to a collections process. Air ambulance providers we spoke with said that they use discretion on how much assistance to offer, and not all patients receive discounts after providing all relevant documentation. Even with discounts, according to data from some air ambulance providers we spoke with, the amount patients pay can still be in the thousands of dollars. Four of our selected states attempted to limit balance billing through the regulation of insurers (Montana, New Mexico, North Dakota, and Texas). Additionally, four states have attempted to limit balance billing through education and public pressure on stakeholders (Florida, Maryland, New Mexico, and North Dakota). Four of the six states we selected—Montana, New Mexico, North Dakota, and Texas—have attempted to limit balance billing by air ambulance providers through the regulation of insurers, as shown in Table 2. Three states have faced challenges in federal district court related to whether their attempts to limit balance billing by air ambulance providers are preempted by the federal ADA. As of January 2019, the case in New Mexico was dismissed on procedural grounds, and the cases in North Dakota and Texas have been decided. The hold-harmless requirement and dispute resolution process established by Montana’s law is an example of how states are attempting to limit balance billing by regulating the business of insurance. Under the hold-harmless requirement, the financial risk for potential balance billing is transferred from patients to the insurer by limiting the patients’ out-of- pocket costs to their cost-sharing responsibilities. However, according to state officials, the dispute resolution process established by this law had not yet been used as of December 2018. The requirement and process apply to transports for patients covered by Montana-regulated insurance plans. It does not apply to transports for individuals in most self-insured plans subject to ERISA, nor does it apply to transports for individuals, such as tourists, covered by insurance plans regulated by other states. The stated purpose of the law establishing this process is to prevent state residents from incurring excessive out-of-pocket expenses in air ambulance situations in a manner that is not preempted by the ADA. Officials in Montana and North Dakota reported receiving fewer consumer complaints about balance billing after implementing their laws to limit balance billing. One reason for this decrease in consumer complaints, according to officials in Montana, was that uncertainty over the possible effects of the law has made most air ambulance providers more willing to enter into contract negotiations with insurers. The officials added that shortly after the law’s enactment, a large insurer and a large air ambulance provider entered into a network contract. Additionally, another air ambulance provider in Montana confirmed that although it had provided out-of-network transports, it had not sent balance bills to patients since the law took effect. Officials in both states could not comprehensively report the extent to which instances of balance billing may have decreased in their state. As required by FAA Reauthorization Act of 2018, the Secretary of Transportation has taken steps to form an advisory committee on air ambulance patient billing. DOT issued a solicitation in December 2018 for applications and nominations for membership on this advisory committee. The committee is to consist of representatives from state insurance regulators, health insurance providers, patient advocacy groups, consumer advocacy groups, and physicians specializing in emergency, trauma, cardiac, or stroke care, among others. The Act directs the advisory committee to issue a report within 180 days of its first meeting and to make recommendations that address the following, among other things: The disclosure of charges and fees for air ambulance services; Options and best practices for preventing balance billing—such as improving network and contract negotiation, dispute resolutions between health insurers and air medical service providers, and explanations of insurance coverage; Steps that states can take to protect consumers consistent with current legal authorities regarding consumer protection; and The recommendations from our 2017 report, including any additional data that DOT should collect from air ambulance providers and other sources to improve its understanding of the air ambulance market and oversight of the industry. Officials in three selected states—Florida, New Mexico, and North Dakota—have provided information to educate consumers and other stakeholders about balance billing for air ambulance transports. The Florida Office of the Insurance Consumer Advocate and the New Mexico Office of Superintendent of Insurance reviewed air ambulance transports in their states and issued public reports with recommendations to improve transparency and education, among other recommendations. Florida’s report, issued in June 2018, recommends that insurers and air ambulance providers improve transparency about the availability of in-network air ambulance providers in a given area and provide information about rate justifications and billing practices to help consumers anticipate potential out-of-network costs. New Mexico’s report, issued in January 2017, recommends educating emergency room physicians and other health care providers about the impact of air ambulance bills on consumers and on how to select in-network air ambulance providers. Additionally, since 2017, the North Dakota Insurance Department has produced a publicly available guide showing which air ambulance providers are in-network with the three insurers in the state. This guide is part of the state’s requirement that, for non-emergency transports, hospitals inform patients about the network status of air ambulance providers. Although the three large independent air ambulance providers we spoke with told us that non-emergency transports comprise only a small percentage of air ambulance transports, officials in North Dakota said some dispatchers and first responders reported using the guide to call in-network air ambulance providers when possible for emergency transports. Finally, one additional selected state—Maryland—has increased public awareness of air ambulance balance billing, which has generated public pressure on air ambulance providers and insurers to encourage the two sides to negotiate contracts. The Maryland Insurance Administration convened a public meeting in September 2015 with the goal of raising public awareness about air ambulance balance billing in the state. The meeting involved statements from patient, air ambulance, hospital, and insurer stakeholders. One of the large independent air ambulance providers said that public pressure following the meeting, as well as subsequent engagement from the state insurance commissioner, were factors in securing a contract with a large insurer in the state. We provided a draft of this report to the Department of Health and Human Services and DOT for review and comment. The Department of Health and Human Services told us they had no comments on the draft report, and DOT provided technical comments that we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Administrator of the Centers for Medicare & Medicaid Services, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact James Cosgrove, Director, Health Care at (202) 512-7114 or cosgrovej@gao.gov or Heather Krause, Director, Physical Infrastructure at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. In addition to the contacts named above, Lori Achman (Assistant Director), Heather MacLeod (Assistant Director), Corissa Kiyan-Fukumoto (Analyst-in-Charge), William Black, George Bogart, Stephen Brown, Krister Friday, Matthew Green, Barbara Hansen, Giselle Hicks, and Vikki Porter made key contributions to this report. Air Ambulance: Data Collection and Transparency Needed to Enhance DOT Oversight. GAO-17-637. Washington, D.C.: July 27, 2017. Air Ambulance: Effects of Industry Changes on Services Are Unclear. GAO-10-907. Washington, D.C.: Sept. 30, 2010.", "summary": "Air ambulances provide emergency services for critically ill patients. Relatively few patients receive such transports, but those who do typically have no control over the selection of the provider, which means privately-insured patients may be transported by out-of-network providers. The Joint Explanatory Statement accompanying the 2017 Consolidated Appropriations Act includes a provision for GAO to review air ambulance services. Among other objectives, this report describes (1) the extent of out-of-network transports and balance billing and (2) the approaches selected states have taken to limit potential balance billing. GAO analyzed a private health insurance data set for air ambulance transports with information on network status and prices charged in 2017 (the most recent data available). Although this was the most complete data identified, the data may not be representative of all private insurers. In addition, GAO interviewed officials in six states (Florida, Maryland, Montana, New Mexico, North Dakota, and Texas) selected in part for variation in approaches to limit balance billing and location. GAO also interviewed air ambulance providers, health insurers, and Centers for Medicare & Medicaid Services and Department of Transportation (DOT) officials. DOT provided technical comments on a draft of this report, which GAO incorporated as appropriate, and the Department of Health and Human Services had no comments. Privately-insured patients transported by air ambulance providers outside of their insurers' provider networks are at financial risk for balance bills—which, as the figure shows, are for the difference between prices charged by providers and payments by insurers. Any balance bills are in addition to copayments or other types of cost-sharing typically paid by patients under their insurance coverage. According to GAO's analysis of the most complete data identified for air ambulance transports of privately-insured patients, 69 percent of about 20,700 transports in the data set were out-of-network in 2017. This is higher than what research shows for ground ambulance transports (51 percent in 2014 according to one study) and other emergency services. Air ambulance providers that GAO spoke with reported entering into more network contracts recently, which could lower the extent of out-of-network transports in areas covered by the contracts. While out-of-network transports may result in balance billing, the data GAO analyzed do not indicate the extent to which patients received balance bills and, if so, the size of the bills. In addition, as GAO reported in 2017, there is a lack of national data on balance billing, but some states have attempted to collect information from patients. For example, GAO reviewed over 60 consumer complaints received by two of GAO's selected states—the only states able to provide information on the amount of individual balance bills—and all but one complaint was for a balance bill over $10,000. Patients may not end up paying the full amount if they reach agreements with air ambulance providers, insurers, or both. The amounts of potential balance bills are informed in part by the prices charged. GAO's analysis of the data set with transports for privately-insured patients found the median price charged by air ambulance providers was about $36,400 for a helicopter transport and $40,600 for a fixed-wing transport in 2017. The six states reviewed by GAO and others have attempted to limit balance billing. For example, the six states have taken actions to regulate insurers, generate public attention, or both. As required by recent federal law, the Secretary of Transportation has taken steps to form an advisory committee to, among other things, recommend options to prevent instances of balance billing.", "document_type": "gao"}
{"report": "Opioids, such as hydrocodone and oxycodone, can be prescribed to treat both acute and chronic pain. Opioids can pose serious risks when they are misused. These risks include addiction, overdose, and death. As a result, opioids are classified as controlled substances, which means that their use and disposal are subject to additional oversight by DEA. Some studies suggest that the majority of patients who received prescriptions for opioids often do not use a large portion of the drugs dispensed. A study that surveyed U.S. adults who had received opioids found that approximately 60 percent of patients who were no longer using the medication had unused opioids. Two studies reported that over one- half of patients did not use all of the opioids prescribed to them after surgery; these studies found that patients reported leaving 15 to 20 pills unused, representing 54 percent to 72 percent of the opioids they were prescribed. Another study on patient opioid use after a cesarean section and thoracic surgery found that most patients, 83 percent and 71 percent respectively, used less than half of the total opioids they were prescribed. There is no federal law or regulation imposing requirements for how patients are to dispose of unused opioids. However, DEA, FDA, and EPA all have authorities and initiatives related to patient disposal of opioids. DEA regulations specify three take-back options that patients can opt to use to dispose of their unused controlled substances: take-back events, permanent collection sites, and mail-back programs. DEA hosts semi- annual events called National Prescription Drug Take-Back Days, where temporary collection sites are set up in locations such as police stations. Advertisements encourage community participation in the events and educate the community on safe disposal of unused medications, including opioids. DEA also registers collectors and provides information to the public about the location of permanent collection sites for take-back, such as at local retail pharmacies or hospital pharmacies, and sets requirements for the provision of postage-paid envelopes that patients can use to mail unused drugs to a collector for destruction. DEA regulations establish a standard for the destruction of controlled substances that applies to DEA registrants, which can destroy opioids on patients’ behalf. DEA registrants include pharmaceutical companies that manufacture controlled substances, health care providers who prescribe them, and pharmacies that dispense them. The standard for destruction requires that controlled substances maintained or collected by DEA registrants be rendered non-retrievable. This means that the physical and chemical conditions of the controlled substance must be permanently altered, thereby rendering the controlled substance unavailable and unusable for all practical purposes. According to DEA, as of May 2019, the only method currently used to meet this standard is incineration, and DEA rulemaking states that DEA will not evaluate, review, or approve methods used to render a controlled substance non-retrievable. FDA has broad authority under the Federal Food, Drug, and Cosmetic Act to evaluate whether a drug is safe and effective and ensure the benefits of drugs outweigh the risks. FDA may require manufacturers to develop a risk evaluation and mitigation strategy (REMS) for drugs with serious safety risks, including the risk of abuse, to ensure that the benefits outweigh the risks. Under one REMS, for example, manufacturers of opioids intended for outpatient use must make training available to health care providers involved in the treatment and monitoring of patients who receive opioids. The training must contain certain elements, including how providers should counsel patients and caregivers about the safe use and disposal of these opioids, among other things. In October 2018, the SUPPORT Act authorized FDA to, at its discretion, require specific packaging or disposal systems as a part of certain drugs’ REMS. For drugs with a serious risk of overdose or abuse, FDA may require the drug to be made available for dispensing to certain patients with “safe disposal packaging” or a “safe disposal system” for purposes of rendering the drug non-retrievable in accordance with DEA regulations. Before imposing these requirements, FDA must consider the potential burden on patient access to the drug and the health care delivery system. As of May 2019, FDA had not imposed any REMS requirements using the new SUPPORT Act authority. Under the Resource Conservation and Recovery Act (RCRA), EPA has authority to regulate the generation, transportation, treatment, storage, and disposal of hazardous waste, including certain discarded opioids. However, hazardous waste pharmaceuticals generated by households are not regulated as hazardous waste even if the waste would otherwise be considered hazardous. Opioids and other household waste pharmaceuticals collected through a take-back option are also exempt from most hazardous waste regulations, provided certain conditions are met. Some states and localities have imposed additional requirements for pharmaceutical disposal, such as requirements for drug manufacturers to manage or fund the disposal of collected household pharmaceuticals. According to DEA, FDA, and EPA, patients should use take-back options to dispose of unused opioids, whenever feasible. Only if take-back options are not feasible, FDA recommends flushing opioids on FDA’s flush list down the toilet to remove them from the home as soon as possible. For opioids not on the flush list, the agencies recommend placing the drugs in the household trash mixed with an unpalatable substance. (See fig. 1). Officials from FDA said that the primary goal of these recommendations is to remove dangerous substances from the home as soon as possible to reduce accidental poisoning, which also may address issues related to intentional misuse. FDA officials explained that the agency has not measured the effects of its recommendations for disposing of opioids on opioid misuse, as of May 2019, because it is difficult to establish a causal link between the recommendations and any reductions in misuse. DEA, FDA, and EPA recommend using a take-back option as the preferred method for patients to dispose of unused prescription opioids. Under this method, patients can bring unused opioids to DEA’s semi- annual take-back events or to DEA-registered permanent collection sites, or use mail-back to deliver opioids to a DEA-registered collector for destruction. When patients use these take-back options, the drugs they dispose of are ultimately incinerated, which is the only method that DEA officials said is known to render the drugs non-retrievable, that is, permanently and irreversibly destroyed. Our analysis of DEA and U.S. Census Bureau data shows that as of April 2019, 71 percent of the country’s population lived less than 5 miles from a permanent collection site, and in 42 states, at least half of the population lived within 5 miles of a site. (See fig. 2). This number has increased since our April 2017 report, when we found that about half of the country’s population lived less than 5 miles away from a site. Our analysis also shows that 90 percent of the population lived within 15 miles of a site, though in rural areas only 57 percent lived within 15 miles. In addition, two studies found that patients were willing to bring unused opioids to a take-back location as long as it was located within 5 to 8 miles of their home address. If take-back options are not feasible, FDA recommends flushing the opioids on its flush list down the toilet, because a single dose can be fatal to a child or a pet. Flushing is a permanent way to remove opioids from the home. FDA confirmed that as of June 2019, 11 of 14 drugs on the flush list are opioids, which represents about three-quarters of the approved opioid active ingredients intended for outpatient use (see sidebar). Some portion of drugs that are flushed down the toilet ultimately enter surface and wastewater streams. However, a 2017 FDA study on the environmental impact of drugs listed on the flush list concluded that flushing these opioids has negligible effects on the environment and human health, particularly relative to the amount of opioids that are excreted after taking them as prescribed, because not all of the drug is metabolized. (See text box for a summary of the effects of disposal options on the environment.) Environmental Effects of Disposal Options The environmental impact of opioid disposal depends on the method used—take-back options, flushing, or trash. According to Environmental Protection Agency (EPA) and Drug Enforcement Agency (DEA) officials, disposal of drugs through take-back options results in disposal by permitted incineration, which fully destroys the active form of the drugs. EPA officials told us that flushing or placing opioids in the trash can introduce active opioids into wastewater streams, groundwater, and surface waters. Incineration of Drugs from Take-Back Options. Opioids disposed of using take-back options are destroyed by incineration, which, according to DEA officials, is the only method currently used to meet its non-retrievable standard for destruction. EPA officials told us that based on data from DEA, the amount of household pharmaceutical waste gathered and incinerated during DEA’s semi-annual take-back events is small compared to the total amount of waste one incinerator burns on an average day. EPA officials recommended take-back options as the preferred method of opioid disposal. Flushing. Opioids enter the water supply when excreted by patients who take opioids as prescribed and when patients intentionally flush unused opioids down the toilet. EPA officials told us that most wastewater treatment facilities are not designed to eliminate opioids from wastewater streams. Further, measureable concentrations of opioids have been reported in surface and ground water sources around the world. Trash. Disposal of unused opioids in the trash often introduces opioids into landfills. Studies in scientific literature show that pharmaceutical ingredients have been observed in the water that passes through landfills, called leachate. Similar to opioids that are flushed, opioids in landfill leachate can end up in wastewater streams and other water sources, according to EPA officials. If an opioid is not on the FDA flush list and a take-back option is not feasible, the agencies direct patients to take a series of steps to dispose of their opioids in household trash by: (1) mixing the drugs in an unpalatable substance such as dirt, cat litter, or used coffee grounds, (2) placing the mixture in a sealed container or plastic bag, and (3) throwing the container in the trash. An EPA official said that mixing the drugs with an unpalatable substance is meant to deter misusers from searching through the trash to retrieve the drugs. Disposal of opioids in the trash—either with an unpalatable substance or in-home disposal product—removes them from the home, but this option may not be permanent and the drugs still may be available for misuse. Drugs that are disposed in the trash ultimately are introduced to landfills, where they can escape landfill containment and enter wastewater streams or ground water sources. FDA’s website notes the availability of commercial products for disposing of unused opioids and other drugs in the home. FDA officials stated that, as of May 2019, the agency had not evaluated the effectiveness of these products or made any recommendations related to their use, but they are aware that patients may opt to use these products. These products, known as in-home disposal products, are proprietary substances that patients can mix with their unused drugs, including opioids, before disposing of them in the trash. In-home disposal product vendors told us they sell or donate their products to pharmacies, local law enforcement, and community groups, which then distribute them to patients. A representative from a group that distributes these products, the AmerisourceBergen Foundation, noted that in-home disposal products may be a convenient option for patients for whom take-back options are not feasible, and marketing materials from a product vendor instruct patients to use their product if a take-back option is not available. Vendors indicate that their products can prevent misuse of opioids by rendering drugs non-retrievable at home and by motivating patients to dispose of unused opioids. According to DEA officials, rendering opioids non-retrievable by using an in-home disposal product is challenging, because the drugs have a variety of chemical and physical properties and potencies. Furthermore, according to DEA officials, a lethal dose of fentanyl can be as low as 250 micrograms in adults—and lower in children—underscoring the importance of effective disposal. Some vendors have presented evaluations of their commercial products. A recent comprehensive review of eight in-home disposal products raised concerns about the credibility of vendors’ evaluations and concluded that additional independent laboratory analysis is needed to fully examine product performance and assess how well these products achieve stated goals. Our review of evaluations from three vendors found that the studies contained some inconsistencies and gaps in the evaluation methods used, raising questions about the studies’ conclusions that the products are effective for disposing of opioids. In some cases, studies included detailed, but inconsistent, methods. For example, in four studies about one product, the researchers concluded that the product deactivated most of an opioid dissolved in water. However, one of the earlier studies reported that whole pills did not dissolve in water, which could impact the results, but later studies did not include similar data. In other cases, companies’ evaluations were summaries of results that did not provide enough information to independently verify or assess whether the products deactivate opioids and prevent misuse. For example, one company’s research documents presented images of a mixture as evidence that the drugs had degraded, rather than results of a test measuring if drugs were still detectable. In addition, the studies included little information about the products’ effectiveness at treating mixtures of multiple drugs at the same time, a scenario that stakeholders have referred to as “real world” use testing. Disposal methods—when patients use them promptly—remove unused opioids from the home and therefore can be effective at reducing opioid misuse. FDA officials said that the federally recommended methods for disposing unused opioids are intended to remove these substances from the home as soon as possible, and stated that as long as individuals dispose of opioids promptly rather than storing them, then FDA has achieved its goal. However, the studies we reviewed suggest that most patients do not dispose of unused opioids using a federally recommended method. Specifically, three studies examined how patients disposed of unused opioids and found that between 12 percent and 41 percent of patients disposed of them using a federally recommended method. For example, one of the studies found that of 570 survey respondents who had unused opioids, 12 percent of respondents reported using a take-back option, 14 percent reported that they flushed them down the toilet, and 6 percent reported that they threw them in the trash after mixing with an unpalatable substance. Other studies we reviewed show that take-back options are often used to dispose of drugs other than opioids. Two studies found that less than 10 percent of the catalogued drugs brought to DEA take-back days were controlled substances, which included opioids, while another study weighed drugs brought to take-back events and permanent collection sites and reported less than 3 percent were controlled substances, including opioids. The same study found that annually, controlled substances disposed of at take-back events and permanent collection sites accounted for about 0.3 percent of those dispensed in the area, and concluded that take-back events may have a minimal impact on reducing the availability of unused opioids for misuse. Studies indicate that patients who receive an in-home disposal product may be more likely to dispose of unused opioids, but they may also be less likely to use federally recommended options like take-back or flushing. Two studies in our review found that patients who receive an in- home disposal product have reported that they are more likely to dispose of unused opioids than those who did not receive the product. Use of in- home disposal products—which may not be effective at permanently destroying drugs—may deter patients from using federally recommended options, like take-back, that have been proven effective. For example, one of these studies found that only one of the 70 patients who received an in-home disposal product used a take-back option for disposal, despite the study taking place in a state where we estimated that 77 percent of the population lived less than 5 miles from a permanent collection site. Studies indicate that patients are often unaware of federally recommended disposal options. Three of the 25 studies we reviewed suggest that many patients were not aware of federally recommended methods for disposing of opioids. For example, a study of cancer patients who received opioid prescriptions reported that more than three- quarters of these patients were unaware of proper opioid disposal methods. Another 2016 study of 1,032 patients found that nearly half of the respondents did not recall receiving information on proper disposal from pharmacists, medication packaging, or media outlets. Studies also indicate that patients choose not to dispose of unused opioids, and that they knowingly participate in the majority of opioid misuse. Five of the studies we reviewed found that between one-quarter and three-quarters of patients stored unused opioids for future use or had misplaced their unused opioids. For example, one of these studies found that 49 percent of survey respondents kept or planned to keep unused opioids for future use, and 14 percent were likely to let a family member use their opioid medications in the future. Federal data about the sources of misused opioids indicate that patients are complicit with most misuse. SAMHSA estimates that 5 percent of people nationwide who misused opioids in 2017 took these drugs from someone else without asking. In contrast, SAMHSA estimates that 85 percent of opioid misuse occurs with the patient’s knowledge or active participation, either through the patient misusing his or her own prescription by taking the drug for pain other than for which it was prescribed or by giving or selling the prescribed opioids to another person. (See fig. 3). To motivate patients to use federally recommended methods to dispose of unused opioids, FDA and some physician organizations have created educational materials on safe disposal methods. For example, FDA launched a public awareness campaign called “Remove the Risk” on April 25, 2019—complete with educational materials such as public service announcements, social media posts, fact sheets, and other web-based content. AMA representatives reported that the AMA has provided physicians with educational material on drug disposal and prescribing. Specifically, AMA representatives told us that the association has compiled a two-page document for physicians containing information about drug disposal, links to DEA information on nearby permanent collection sites and take-back events, and FDA guidance on safe disposal of medications. This document included recommendations for physicians to talk to patients about safe use of prescription opioids, remind patients to store their medications in a safe place out of reach from children, and have a conversation with patients about the most appropriate ways to dispose of expired, unwanted, or unused opioids. The AmerisourceBergen Foundation has also partnered with communities to promote safe opioid disposal by providing education about take-back options and commercial in-home disposal products to patients. A representative from the Foundation explained that its Safe Disposal Support Program provides non-profit organizations or municipalities with commercial in-home disposal products, which then can be distributed free of charge to other organizations, individuals, or households. It also recommends that patients use take-back options when available. The representative said that organizations are to demonstrate to patients how these products work either through a brief in-person demonstration at an event or through a video. According to the representative, these products and demonstrations help people reflect on what is in their home and needs to be disposed of, either using a product or a take-back option. Despite such efforts, little is known about the extent to which stakeholders’ efforts to educate the public are effective in increasing use of federally recommended disposal methods. FDA officials said that they are not aware of the extent to which providers are familiar with all disposal methods or the extent to which providers discuss the importance of proper disposal with patients. As part of FDA’s REMS requirements for outpatient opioids, manufacturers must make training available to health care providers involved in the treatment and monitoring of patients who receive opioids, which includes information about the need to communicate with patients about disposal of unused drugs. FDA officials said that opioid manufacturers must assess the effectiveness of their REMS, including an assessment of prescribers’, other health care providers including pharmacists’, and patients’ understanding of the key risk messages conveyed through the educational materials. FDA expects to receive the next REMS assessment with the results of these analyses in 2020. The AMA has not been able to measure the effects of its recommendations, but provided anecdotal feedback from its members that many physicians do not consistently speak to their patients about disposal. FDA officials and AMA representatives indicated that in addition to educating patients on opioid disposal methods, focusing efforts on reducing the amount of unused opioids would be an effective approach for reducing misuse and abuse. For example, FDA officials said that adding packaging configurations that contain smaller quantities of certain opioids could help prescribers to more carefully consider the amount of opioid pain medication they prescribe. This in turn may reduce the number of unused opioids available in the home that could be inappropriately accessed by family members or visitors, and could potentially reduce the risk for misuse and abuse. Representatives from the AMA explained that it and other organizations are working to provide opioid prescribing resources and guidance to help physicians effectively manage patients’ pain, which representatives said will reduce the number of unused opioids available for misuse. FDA officials and a researcher also noted that dispensing opioids in packaging that makes it easy to count the number of unused pills may help patients identify intentional misuse. The FDA and EPA provided technical comments on a draft of this report, which we incorporated as appropriate; the DEA did not have comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, the Administrator of the DEA, the Administrator of the EPA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. James Cosgrove, (202) 512-7114 or cosgrovej@gao.gov. In addition to the contact named above, individuals making key contributions to this report include Leslie V. Gordon (Assistant Director), A. Elizabeth Dobrenz (Analyst-in-Charge), Sam Amrhein, Jieun Chang, Diana Chung, Kaitlin Farquharson, and Dennis Mayo. Also contributing were Giselle Hicks, Cynthia Khan, and Ethiene Salgado-Rodriguez.", "summary": "In 2017, an estimated 11.1 million Americans misused a prescription pain reliever, which included opioids. This misuse contributes to opioid abuse and death, which has quintupled from 1999 to 2017; about 17,000 people died from prescription opioid overdoses in 2017. Government agencies and stakeholders have attempted to address the potential for misuse and abuse by facilitating safe disposal of unused prescription opioids and other drugs. The SUPPORT for Patients and Communities Act enacted in 2018 included a provision for GAO to review patient disposal of unused opioids, among other things. This report examines (1) federally recommended and other available methods patients may use to dispose of unused prescription opioids, and (2) what is known about patients' use of these methods. To do this work, GAO examined peer-reviewed, academic literature on outcomes for prescription opioid disposal; reviewed federal agency documentation; interviewed federal agency officials, independent researchers, and stakeholder group representatives—such as those from the American Medical Association; and analyzed DEA data as of April 2019 on permanent drug collection sites. GAO also interviewed representatives of three companies that manufacture commercial in-home disposal products and reviewed publicly available documents about these products. The Food and Drug Administration (FDA), Drug Enforcement Administration (DEA), and Environmental Protection Agency (EPA) recommend that patients dispose of unused presciption opioids by bringing them to DEA-registered collection sites or a DEA take-back event, or using mail-back programs. As of April 2019, 70 percent of the U.S. population lived less than 5 miles from permanent collection sites, which are often located at pharmacies. If collection sites, take-back events, or mail-back programs are not feasible, FDA recommends quickly and permanently removing the most dangerous prescription opioids, such as hydrocodone and fentanyl, from the home by flushing them down the toilet. For all other prescription opioids, the agencies recommend disposal in the trash after mixing them with unpalatable substances, such as cat litter. Commercial products to facilitate in-home disposal also exist, and FDA is aware that patients may opt to use these products for disposal in the trash. Available studies suggest that many patients are unaware of federally recommended disposal methods or choose not to dispose of unused prescription opioids. For example, five studies found that between one-quarter and three-quarters of patients stored unused opioids for future use or had misplaced their unused opioids. Further, federal data indicate that 85 percent of intentional misuse occurs with the patient's knowledge—for example, when a patient sells or gives away unused prescription opioids. To educate and motivate patients to dispose of unused opioids, FDA launched a public awareness campaign called “Remove the Risk” in April 2019. Also, FDA and other stakeholders have created educational materials for patients and providers on safe opioid disposal.", "document_type": "gao"}
{"report": "First, DOD is facing substantial supply chain challenges that are hindering the readiness of the F-35 fleet. Specifically, spare parts shortages throughout the F-35 supply chain are contributing to F-35 aircraft being unable to perform as many missions or to fly as often as the warfighter requires. The F-35’s unique supply chain is central to DOD’s strategy to sustain the growing fleet. Rather than owning the spare parts for their aircraft, the Air Force, Navy, and Marine Corps, along with international partners and foreign military sales customers, share a common, global pool of parts. This construct for the F-35 supply chain was intended to ease the logistical burden and provide economies of scale for the military services and international partners; however, the global pool does not have enough spare parts. Specifically, from May through November 2018, F-35 aircraft across the fleet were unable to fly about 30 percent of the time due to parts shortages, as compared with a program target of 10 percent. Below is pictured an F-35B aircraft conducting training aboard a ship. Our work found that several factors contribute to these parts shortages, including F-35 parts that are breaking more often than expected, and DOD’s limited capability to repair parts when they break. Specifically, as of April 2019, the F-35 program was failing to meet four of its eight reliability and maintainability targets—which determine the likelihood that the aircraft will be in maintenance rather than available for operations— including metrics related to part removals and part failures. For instance, we reported at that time that the special coating on the F-35 canopy that enables the aircraft to maintain its stealth had failed more frequently than expected, and the manufacturer was unable to produce enough canopies to meet demands. These reliability challenges are exacerbated by DOD’s limited capability to repair broken parts at the military depots. The capabilities to repair parts are currently 8 years behind schedule. DOD originally planned to have repair capabilities at the depots ready by 2016, but as we reported in April 2019, the depots will not have the capability to repair all parts at expected demand rates until 2024. As a result, the average time taken to repair an F-35 part was more than 6 months, or about 188 days, for repairs completed between September and November 2018—more than twice as long as planned. At that time, there was a backlog of about 4,300 spare parts awaiting repair at depots or manufacturers. We have also reported on other challenges that DOD faces related to its supply chain, including challenges in supporting deployed F-35 aircraft around the world, in clarifying how scarce parts will be distributed, in establishing a plan for a global supply chain network, and in maintaining accountability for spare parts. Figure 2 depicts many of these and other challenges that DOD faces related to the F-35 supply chain. DOD has not fully implemented seven of our recommendations related to its supply chain challenges: Revise sustainment plans: In October 2017, we reported that DOD’s reactive approach to planning for and funding the capabilities needed to sustain the F-35 resulted in significant readiness challenges— including delays in the establishment of part repair capabilities at the depots—and placed DOD at risk of being unable to leverage the capabilities of the aircraft it had purchased. We recommended that DOD revise its sustainment plans to ensure that they include the key requirements and funding needed to fully implement the F-35 sustainment strategy. Conduct a comprehensive review of the F-35 supply chain: While DOD had ongoing efforts to increase the availability of spare parts, we found in April 2019 that DOD would likely continue to face challenges because the program was not planning for the quantity of parts necessary in its spare parts projections to meet warfighter requirements. Simply purchasing more F-35 parts may not be a viable solution for DOD, given the affordability concerns the program faces. These complex problems necessitate a comprehensive approach by DOD, or it is at risk that the F-35 will not be able to conduct the full range of intended missions. We recommended that DOD conduct a comprehensive review of the F-35 supply chain to determine what additional actions are needed to close the gap between warfighter requirements for aircraft performance and the capabilities that the F- 35 supply chain can deliver, in light of the U.S. services’ affordability constraints. Develop a process to modify the afloat and deployment spare parts packages: DOD purchases certain packages of F-35 parts years in advance to support aircraft on deployments, including on ships—called afloat and deployment spare parts packages. In April 2019, we reported that continued modifications to parts and aircraft can make such packages out-of-date by the time F-35 units deploy, and that the F-35 program did not have a process and funding in place to change out mismatched parts. This could put the military services at risk of not having the parts they need to support future deployments. We recommended that DOD develop a process to modify afloat and deployment spare parts packages, to include reviewing the parts within the packages to ensure that they match deploying aircraft and account for updated parts demand, and aligning any necessary funding needed for the parts updates. Mitigate risks related to operating and sustaining the F-35 in the Pacific: In March 2018, we issued a classified report on DOD’s initial transfer of F-35s to a Marine Corps base in Japan that, among other things, described the warfighting capabilities the F-35 brought to the Pacific and assessed operational challenges the Marine Corps faced. In April 2018, we publicly reported on the recommendations from this classified report, including our recommendation that the Marine Corps assess the risks associated with key supply chain-related challenges related to operating and sustaining the F-35 in the Pacific, and that it determine how to address those risks. Revise the business rules for prioritizing scarce F-35 parts: In April 2019, we reported that there was uncertainty about how the program will prioritize scarce F-35 parts among global participants. While the F-35 program had developed a set of business rules, those rules lacked clarity and detail. Absent comprehensive business rules, the F-35 program could face challenges in transparently allocating parts to support competing U.S. and international requirements. We recommended that DOD revise the business rules for the prioritization of scarce F-35 parts across all program participants so as to clearly define the roles and responsibilities of all stakeholders, the process for assigning force activity designations, and the way in which deviations from the business rules will be conducted. Complete a detailed plan for the establishment of the global network for moving F-35 parts: In April 2019, we reported that DOD’s networks to move F-35 parts around the world to the United States and international participants were immature. Because the F- 35 program did not fully recognize the complexity of establishing a global network for moving F-35 parts, this network is now several years behind schedule and there is risk that it will not be fully capable to support an expanding fleet. We recommended that DOD complete a detailed plan for the establishment of the global network for moving F-35 parts that outlines clear requirements and milestones to reach full operational capability, and that includes mechanisms to identify and mitigate risks to the F-35 global spares pool. Clearly establish how DOD will maintain accountability for F-35 parts: In April 2019, we reported that in its rush to field aircraft and its heavy reliance on the prime contractor, DOD had not consistently followed DOD guidance for property accountability. Simply put, DOD did not have records of all the F-35 spare parts it had purchased; where those parts were located; and how much the military services had paid for them. We recommended that DOD issue a policy consistent with DOD guidance that clearly establishes how DOD will maintain accountability for F-35 parts within the supply chain, and identify the steps needed to implement the policy retrospectively and prospectively. DOD concurred with these recommendations and has made some progress in addressing them, including issuing a revised life cycle sustainment plan in January 2019. In addition, DOD has taken actions to increase the availability of spare parts, such as efforts to improve the reliability of parts and incentivize manufacturers to repair parts. Second, DOD continues to face challenges with the F-35’s Autonomic Logistics Information System (ALIS). ALIS is a complex information technology system supporting operations, mission planning, supply-chain management, maintenance, and other processes. It is intended to provide the necessary logistics tools to F-35 users as they operate and sustain the aircraft. For supply chain management, for example, ALIS is supposed to automate a range of supply functions—including updating the status of parts, generating supply work orders, and communicating critical data about parts. However, we reported in April 2019 that these capabilities were immature, resulting in numerous challenges and the need for maintainers and supply personnel at military installations to perform time-consuming, manual workarounds in order to manage and track parts. We reported that one Air Force unit estimated that it spent the equivalent of more than 45,000 hours per year performing additional tasks and manual workarounds because ALIS was not functioning as needed. In our prior work we identified several challenges associated with ALIS, including the following examples (see table 1). We have made six recommendations since 2014 to help DOD address ALIS-related challenges. DOD generally concurred with these recommendations. It addressed two by developing a plan that prioritizes ALIS risks and creating a training plan for ALIS. However, DOD has not taken action on four of our recommendations. These are: Establish a performance-measurement process: In September 2014, we reported that ALIS had experienced recurring problems, including user issues and schedule delays, and was a risk that could adversely affect DOD’s sustainment strategy. But we found that DOD did not have a process to determine and address the most significant performance issues with ALIS based on user requirements, which could limit its ability to effectively and efficiently address performance issues and identify root causes of those issues. We recommended that DOD establish a performance-measurement process for ALIS that includes, but is not limited to, performance metrics and targets that (1) are based on intended behavior of the system in actual operations and (2) tie system performance to user requirements. Incorporate cost-estimating best practices: In April 2016, we reported that DOD’s $16.7 billion life cycle cost estimate for ALIS was not fully credible since DOD had not performed key analyses as part of the cost-estimating process. We recommended that DOD conduct uncertainty and sensitivity analyses consistent with cost-estimating best practices. Ensure that future cost estimates use historical data: In April 2016, we also reported that DOD’s ALIS cost estimate was not fully accurate because DOD did not use historical cost data, including actual cost data from ALIS and data from other comparable programs. We recommended that DOD ensure that future estimates of ALIS costs use historical data as available and reflect significant program changes consistent with cost-estimating best practices. Test the operation of the F-35 when disconnected from ALIS: In March 2018, we issued a classified report on DOD’s initial transfer of F-35s to a Marine Corps base in Japan that, among other things, described the warfighting capabilities the F-35 brought to the Pacific and assessed any operational challenges the Marine Corps faced. In April 2018, we publicly reported on the recommendations from this classified report, including our recommendation that the F-35 program test operating the F-35 disconnected from ALIS for extended periods of time in a variety of scenarios, to assess the risks related to operating and sustaining the aircraft, and determine how to mitigate any identified risks. We are currently conducting a review of ALIS, assessing how DOD is managing current and future issues related to the system. We plan to complete this review in early 2020. Third, at the core, DOD’s current sustainment challenges have largely resulted from insufficient planning. We have found that DOD lacks information about the technical characteristics and costs of the F-35, which will impair its ability to plan for the long-term sustainment of the F- 35 fleet. The current F-35 sustainment strategy states that the primary contractor will provide logistics support for the aircraft. In October 2017, we reported that while DOD planned to enter into 5-year, fixed-price, performance-based contracts with the prime contractor in the next few years, DOD did not have full information on F-35 technical characteristics or costs to enable it to effectively negotiate those contracts. Specifically, certain technical aspects of the aircraft remained immature or uncertain, including reliability measures that are lagging behind operational requirements. As previously discussed, in April 2019 we reported that the F-35 program was still not on track to meet its targets for four out of eight reliability and maintainability metrics, and that the program had not taken adequate steps to ensure that those targets would be met. DOD officials told us that there would be inherent risk in signing a long-term, performance-based contract before reliability and maintainability data were more fully known, as those data would influence how much aircraft performance should cost. In addition, DOD did not have full visibility into the actual costs of some key sustainment requirements that are considered cost-drivers within the program, such as the actual costs of parts and repairs. Thus, DOD had relied on projected parts reliability and pricing to formulate cost estimates. Actual costs of sustainment requirements can change significantly from initial projections. For instance, we reported that, between the program’s 2014 and its 2015 estimates, the costs of initial spare parts over the life cycle increased by $447 million. The lack of cost information continues to be a challenge for DOD, as we reported in April 2019. DOD officials have stated that they need to know actual costs in order to improve both their confidence in the estimates and their understanding of how cost is related to performance. Below is pictured an F-35A aircraft being refueled. Further, DOD lacks the technical data from the prime contractor needed to fully understand the technical characteristics of the F-35 aircraft and enable potential competition of future sustainment contracts. Technical data include the blueprints, drawings, photographs, plans, instructions, and other documentation required to adequately produce, operate, and sustain weapon systems. Technical data are critical for weapon systems such as F-35 aircraft, as they provide DOD with the information necessary to support the fleet. In April 2019, we found that challenges related to readiness and costs were driving DOD to begin to develop an option for DOD-led supply chain management as a potential alternative to the performance-based contracts through which the prime contractor would provide logistics support. The DOD-led option would require the department to obtain significant amounts of technical data on F-35 parts from the manufacturers of those parts; however, at that time DOD was facing challenges in obtaining the needed data. DOD has not fully implemented 10 of our recommendations related to these issues: Develop a long-term Intellectual Property strategy: In September 2014, we reported that DOD had not identified all of the technical data it needs from the contractor, and at what cost, to enable competition of future sustainment contracts, which put the program at risk of not having the flexibility to make changes to its sustainment strategy. We recommended that DOD develop a long-term Intellectual Property strategy to include, but not be limited to, the identification of current levels of technical data rights ownership by the federal government and all critical technical data needs and their associated costs. Assess whether the program reliability and maintainability targets are still feasible: In April 2019, we reported that the F-35 program continued to fall short of meeting performance targets for half of its reliability and maintainability metrics. Program officials said that those targets need to be reevaluated to determine more realistic performance targets, but they had not taken action to do so. We recommended that DOD assess whether the program’s reliability and maintainability targets are still feasible, and revise accordingly. Identify specific and measurable reliability and maintainability objectives: In April 2019, we reported that the F-35 program’s plan for improving reliability and maintainability did not address the four under-performing metrics. Specifically, the guidance the program has used to implement this plan does not define specific, measurable objectives for what the desired goals for F-35 reliability and maintainability performance should be. As long as these metrics continue to fall short, the military services may have to settle for aircraft that are less reliable and more costly to maintain than originally planned. We recommended that DOD identify specific and measurable reliability and maintainability objectives in its guidance. Link reliability and maintainability improvement projects to the associated objectives: In April 2019, we reported that the F-35 program had not aligned its planned reliability and maintainability improvement projects with reliability and maintainability goals, which could put the program at risk of not meeting those goals. We recommended that DOD identify and document in guidance which reliability and maintainability improvement projects will achieve the identified objectives. Prioritize funding for reliability and maintainability improvement: In April 2019, we reported that the F-35 program office had estimated potential life-cycle cost savings of more than $9.2 billion from implementing the reliability and maintainability improvement projects in its plan, but had not prioritized or dedicated funding in its budget necessary to carry out the projects. As a result, projects had been prematurely suspended or delayed. We recommended that the F-35 program office prioritize funding for the reliability and maintainability improvement plan. Re-examine the metrics DOD will use to hold the contractor accountable: In October 2017, we reported that DOD might not be using the appropriate performance metrics under trial performance- based agreements to achieve desired outcomes or hold the contractor accountable for performance. We recommended that DOD re- examine the metrics that it will use to hold the contractor accountable under the fixed-price, performance-based contracts, to ensure that such metrics are objectively measurable, are fully reflective of processes over which the contractor has control, and drive desired behaviors by all stakeholders. Delay entering into multi-year, fixed-price, performance-based contracts: In October 2017, we reported that DOD was moving quickly toward negotiating longer-term performance-based contracts without a sufficient understanding of the actual costs and technical characteristics of the aircraft, which put DOD at risk of overpaying for sustainment support that is not sufficient to meet warfighter requirements. We recommended that, before DOD enters into multi- year, fixed-price, performance-based contracts, it ensure that it has sufficient knowledge of the actual costs of sustainment and technical characteristics of the aircraft at system maturity. Obtain comprehensive cost information for F-35 spare parts: In April 2019, we reported that DOD did not have comprehensive cost information for individual F-35 spare parts, and that it faced challenges in obtaining this information from the prime contractor. This lack of cost information impedes DOD’s ability to develop a complete understanding of the costs for the F-35 system and to effectively negotiate with the prime contractor for sustainment support. We recommended that DOD develop a methodical approach to consistently obtain comprehensive cost information from the prime contractor for F-35 spare parts within the supply chain. Formalize a methodology for recording military service funds spent on F-35 parts: In April 2019, we reported that the military services could not track the funds that they had spent for the purchase of F-35 spare parts to the actual parts on their financial statements, thereby hindering DOD’s financial improvement and audit readiness efforts. We recommended that DOD complete and formalize a methodology for the U.S. services to use in recording on their financial statements the funds spent on F-35 parts within the global spares pool. Clearly define the F-35 supply chain management strategy: In April 2019, we reported that DOD was caught between two distinct sustainment concepts—the program’s official contractor-provided logistics support construct and DOD’s effort to develop options for DOD-led supply chain management. Until DOD clearly defines its strategy for managing the F-35 supply chain in the future, the F-35 program will lack the certainty and unity of effort necessary to meaningfully improve supply chain performance and reduce costs. We recommended that DOD clearly define the strategy by which it will manage the F-35 supply chain in the future and update key strategy documents accordingly, to include any additional actions and investments necessary to support that strategy. DOD concurred with all of these recommendations. Seven of the preceding recommendations were made earlier this year, and we recognize that it will take time for DOD to implement them. However, DOD’s attention to each of these recommendations is important to improving its long-term sustainment planning. In summary, DOD’s costs to purchase the F-35 are expected to exceed $406 billion, and the department expects to spend more than $1 trillion to sustain its F-35 fleet. Thus, DOD must continue to grapple with affordability as it takes actions to increase the readiness of the F-35 fleet and improve its sustainment efforts to deliver an aircraft that the military services and partner nations can successfully operate and maintain over the long term within their budgetary realities. DOD’s continued attention to our recommendations will be important as it balances these goals. We will continue to monitor DOD’s efforts to implement our recommendations. Chairmen Garamendi and Norcross, Ranking Members Lamborn and Hartzler, and Members of the Subcommittees, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have questions about this testimony, please contact Diana Maurer, Director, Defense Capabilities and Management, at (202) 512-9627 or maurerd@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Alissa Czyz and Kasea Hamar (Assistant Directors); Jon Ludwigson, Vincent Buquicchio, Tracy Burney, Desiree Cunningham, Jeff Hubbard, Justin Jaynes, Amie Lesser, Sean Manzano, Jillena Roberts, Michael Silver, Maria Staunton, Tristan T. To, Cheryl Weissman, and Elisa Yoshiara. F-35 Joint Strike Fighter: Action Needed to Improve Reliability and Prepare for Modernization Efforts. GAO-19-341. Washington, D.C.: April 29, 2019. F-35 Aircraft Sustainment: DOD Needs to Address Substantial Supply Chain Challenges. GAO-19-321. Washington, D.C.: April 25, 2019. F-35 Joint Strike Fighter: Development Is Nearly Complete, but Deficiencies Found in Testing Need to Be Resolved. GAO-18-321. Washington, D.C.: June 5, 2018. Warfighter Support: DOD Needs to Share F-35 Operational Lessons Across the Military Services. GAO-18-464R. Washington, D.C.: April 25, 2018. Military Aircraft: F-35 Brings Increased Capabilities, but the Marine Corps Needs to Assess Challenges Associated with Operating in the Pacific. GAO-18-79C. Washington, D.C.: March 28, 2018. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington, D.C.: October 26, 2017. F-35 Joint Strike Fighter: DOD’s Proposed Follow-on Modernization Acquisition Strategy Reflects an Incremental Approach Although Plans Are Not Yet Finalized. GAO-17-690R. Washington, D.C.: August 8, 2017. F-35 Joint Strike Fighter: DOD Needs to Complete Developmental Testing Before Making Significant New Investments. GAO-17-351. Washington, D.C.: April 24, 2017. F-35 Joint Strike Fighter: Continued Oversight Needed as Program Plans to Begin Development of New Capabilities. GAO-16-390. Washington, D.C.: April 14, 2016. F-35 Sustainment: DOD Needs a Plan to Address Risks Related to Its Central Logistics System. GAO-16-439. Washington, D.C.: April 14, 2016. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress. GAO-16-489T. Washington, D.C.: March 23, 2016. F-35 Joint Strike Fighter: Assessment Needed to Address Affordability Challenges. GAO-15-364. Washington, D.C.: April 14, 2015. F-35 Sustainment: Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates. GAO-14-778. Washington, D.C.: September 23, 2014. F-35 Joint Strike Fighter: Slower Than Expected Progress in Software Testing May Limit Initial Warfighting Capabilities. GAO-14-468T. Washington, D.C.: March 26, 2014. F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities. GAO-14-322. Washington, D.C.: March 24, 2014. F-35 Joint Strike Fighter: Restructuring Has Improved the Program, but Affordability Challenges and Other Risks Remain. GAO-13-690T. Washington, D.C.: June 19, 2013. F-35 Joint Strike Fighter: Program Has Improved in Some Areas, but Affordability Challenges and Other Risks Remain. GAO-13-500T. Washington, D.C.: April 17, 2013. F-35 Joint Strike Fighter: Current Outlook Is Improved, but Long-Term Affordability Is a Major Concern. GAO-13-309. Washington, D.C.: March 11, 2013. Joint Strike Fighter: DOD Actions Needed to Further Enhance Restructuring and Address Affordability Risks. GAO-12-437. Washington, D.C.: June 14, 2012. Joint Strike Fighter: Restructuring Added Resources and Reduced Risk, but Concurrency Is Still a Major Concern. GAO-12-525T. Washington, D.C.: March 20, 2012. Joint Strike Fighter: Implications of Program Restructuring and Other Recent Developments on Key Aspects of DOD’s Prior Alternate Engine Analyses. GAO-11-903R. Washington, D.C.: September 14, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Is Still Lagging. GAO-11-677T. Washington, D.C.: May 19, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Still Lags. GAO-11-325. Washington, D.C.: April 7, 2011. Joint Strike Fighter: Restructuring Should Improve Outcomes, but Progress Is Still Lagging Overall. GAO-11-450T. Washington, D.C.: March 15, 2011. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "DOD's F-35 Lightning II fighter aircraft provides key aviation capabilities to support the U.S. National Defense Strategy. The F-35 is also DOD's most costly weapon system, with U.S. sustainment costs estimated at more than $1 trillion over its life cycle. As of October 2019, there were more than 435 U.S. and international F-35 aircraft in operation, with more than 3,300 aircraft expected to be fielded throughout the life of the program. While there is little doubt that the F-35 brings unique capabilities to the U.S. military, DOD faces significant challenges in sustaining a growing fleet. This statement discusses F-35 sustainment challenges. It also summarizes GAO's open recommendations related to these challenges. This statement is based on previously published work since 2014 related to F-35 acquisition, sustainment, affordability, ALIS, operations, and the global supply chain. The Department of Defense (DOD) faces challenges in sustaining a growing F-35 fleet. This statement highlights three challenges DOD has encountered related to F-35 sustainment, based on prior GAO work (see figure). As a result of these challenges, F-35 performance has not met warfighter requirements. While DOD works to address these issues, it must also grapple with affordability. DOD has determined that it will need to significantly reduce F-35 sustainment costs—by 43 percent per aircraft, per year in the case of the Air Force—in order for the military services to operate the F-35 as planned. Continued attention to GAO's recommendations in these areas will be important as DOD takes actions to improve F-35 sustainment and aircraft performance for the warfighter. GAO has 21 recommendations related to the challenges described in this statement that DOD has not fully implemented. DOD generally concurred with all 21 recommendations. Continued attention to these recommendations is needed by DOD to successfully operate and sustain the F-35 fleet over the long term within budgetary realities.", "document_type": "gao"}
{"report": "IRS Form 990-series return or notice must be filed by most organizations exempt from income tax under Internal Revenue Code section 501(a), and certain political organizations and nonexempt charitable trusts. TE/GE uses Form 990 reporting for promoting compliance and enforcing federal tax law for tax-exempt organizations (see appendix II for a copy of the Form 990 and a list of its schedules). Form 990 asks for information about an organization such as: employees, governance, and compensation; revenue and expenses; assets and liabilities; employment tax compliance; and specific organizational issues, such as lobbying by charities and private foundations. TE/GE redesigned the Form 990 for the first time in nearly 30 years for tax year 2008, and has made subsequent changes to the form (see appendix III for a summary of the changes). For tax year 2017, which is the most recent year of completed filing data, organizations filed 319,183 Form 990s. Beyond the basic Form 990, other versions include: Form 990–EZ, Short Form Return of Organization Exempt from Income Tax. This form reduces the filing burden on small tax-exempt organizations. Organizations with less than $200,000 in gross receipts and less than $500,000 in total assets may use it. For tax year 2017, 232,764 Form 990-EZ’s were filed. Form 990–N, Electronic Notice (e-Postcard) for Tax-Exempt Organizations Not Required to File Forms 990 or 990–EZ. Most small organizations whose annual gross receipts are normally $50,000 or less may file Form 990-N. For tax year 2017, 652,280 Form 990-N’s were filed. Form 990–PF, Return of Private Foundation. In addition to private foundations, nonexempt charitable trusts treated as private foundations are required to file Form 990-PF. For tax year 2017, 113,658 Form 990-PF’s were filed. Certain larger organizations are required to electronically file their returns. The Taxpayer First Act of 2019 requires all organizations to electronically file Form 990’s for tax years beginning after July 1, 2021. TE/GE can assess financial penalties for failing to file a required Form 990. As an employer, or if an exempt organization generates unrelated business income, additional tax reporting requirements may apply, such as for employment tax or unrelated business income. A 2017 TE/GE reorganization created CP&C to provide a centralized approach to compliance planning, examination selection and assignment and planning and monitoring activities. CP&C has three groups as follows: 1. Issue Identification and Special Review identifies and develops issues for examinations or compliance activities and certain criteria for examination selection. 2. Classification and Case Assignment uses IRS staff known as “classifiers” to review returns for examination under different examination sources (see appendix IV). Classification is the process of determining whether a return should be selected for compliance activities, what issues should be the primary focus of the compliance activity, and the type of compliance activity that should be conducted. 3. Planning and Monitoring develops an annual work plan and monitors performance. The work plan details the number of examination starts, closures and other measures. It develops classification requests to ensure that enough returns are available to meet work plan goals. TE/GE’s Compliance Governance Board (Governance Board) oversees TE/GE’s compliance program, including CP&C operations such as approving priority issue areas—known as compliance strategies. The Governance Board also reviews program goals, considers metrics and reporting, and reviews the performance of compliance strategies. The Governance Board has five TE/GE executives plus counsel who are voting members as well as three non-voting members. The Exempt Organizations examinations group is responsible for compliance activities. Examinations have various outcomes for an organization. The most severe outcome is revocation of tax exempt status. Taxes—such as employment or excise—may be assessed as a result of an examination. In fiscal year 2019, approximately $131 million in taxes were assessed. TE/GE conducts compliance contacts—non-examination correspondence such as compliance checks and soft letters—that are used to handle some compliance issues. For example, compliance checks determine whether specific reporting or filing requirements have been met. A “soft letter” notifies an organization of changes in tax-exempt law or potential compliance issues. A response to these letters is not required. TE/GE also reviews tax-exempt hospitals for compliance with certain community benefit requirements. In fiscal year 2019, TE/GE closed 1,470 compliance checks, sent 3,955 soft letters, and closed 750 hospital reviews. Compliance checks and hospital reviews can result in an examination while responses to soft letters may result in a compliance check. TE/GE identifies exempt organization returns for examination from many sources and categorizes examinations into three groups, known as portfolios: (1) Data Driven Approaches, (2) Referrals and Other Casework, and (3) Compliance Strategies. All three rely on data, to some extent, to make decisions on selecting returns for examination. This portfolio uses analytical models and queries based on quantitative criteria to identify potential examinations. TE/GE has three separate models that review exempt organization data from Forms 990, 990-EZ, and 990-PF for compliance. The models “score” returns for examination based on potential noncompliance. The Form 990, 990-EZ and 990-PF models have 354 unique queries. For purposes of this report, a query reviews databases to identify responses on returns that may indicate noncompliance because they do not meet certain criteria or expected values, such as exceeding a dollar threshold. Exempt Organizations Examination staff developed many of the queries, based on information collected on the Form 990 after it was redesigned for tax year 2008, according to TE/GE officials. As queries were developed, staff tested and used them to identify certain potentially noncompliant populations and to identify returns that were flagged by multiple queries. Starting in fiscal year 2016, TE/GE began using queries in models. The models use a scoring system that applies weights, or points, to each query result to generate a score—which for the Form 990 model has ranged from zero to more than 50—for a return. The models also screen out returns that are approaching a statute of limitations date, if the organization is not active, or has a current or recent examination history. Since November 2017, staff have been able to submit potential compliance issues for consideration through an online submission portal for Governance Board approval. CP&C has the option of considering whether these ideas result in model changes, according to IRS officials. Twice a year, each model is run using the latest data, and generates a Model Score Sheet (MSS). The MSS is a ranked list of returns that score above a minimum threshold. A classifier uses the ranking to identify returns for potential examination. Although the models screen for examination status and statute of limitations, a TE/GE official said the classifier also checks whether the statute of limitations date is near and whether the organization recently had undergone an examination or compliance check, as well as whether the return was identified under another selection method. This official explained that a classifier checks the criteria because conditions may have changed since the model’s last run. The classifier selects returns to fulfill a stocking plan, which identifies the number and type of returns to be examined to meet work plan requirements. See figure 1. Aside from the three models, TE/GE also uses other methods and data to identify and develop compliance work. The Data Driven Approaches portfolio includes approaches that TE/GE developed in partnership with IRS’s RAAS division. The partnership began in 2016 and continues today, according to IRS officials. The portfolio also includes some of the queries that TE/GE ran prior to fiscal year 2016 for examination selection. Some of these examinations remained open as of fiscal year 2019. Although not all of the returns selected for examination in this portfolio rely on data for examination selection, we describe them all below. Referrals. Referrals are complaints about exempt organization noncompliance made by third parties, including the public and other IRS offices or divisions. Post Determination Compliance. Sampling and queries are used to identify organizations that file Form 1023-EZ. Claims. Claims are requests for tax refunds, adjustments of tax paid, or credits not previously reported or allowed. Form 990 Queries (pre-model): These queries were run prior to fiscal year 2016. Some of these examinations remained open as of fiscal year 2019. Training. TE/GE uses these examinations, selected based on various methods, to teach examiners. Other Projects. TE/GE initiated these examinations under older compliance projects, using a variety of selection methods. The Compliance Strategies portfolio consists of compliance issues that originated from a Compliance Issue Submission Portal for TE/GE staff. The strategies are approved by the Governance Board, which results in adding the compliance strategy to the work plan. In fiscal year 2019, TE/GE closed examinations under three compliance strategies, including private foundation loans, and for-profit entities that converted to 501(c)(3) organizations. Returns are selected using sampling or other uses of data. Table 1 shows examinations closed for the three portfolios. Once an examination is underway, an examiner may expand it to include an organization’s returns for other tax years or other types of returns such as employment tax returns. IRS refers to these additional examinations as “pick-ups,” each of which is counted as a separate examination. Examiners must obtain manager approval to expand an examination. Examiners are required to check that an organization filed all returns that are required. If the examiner finds that a return was not filed—such as an employment tax return—and is unable to secure the return, he or she may prepare a “dummy” return called a substitute for return (SFR). The organization’s activities, records, and documents may then be examined. In 2017, TE/GE hired a contractor to assess aspects of the exempt organization process for examination selection, with a focus on the Form 990 model. In January 2018, the contractor released a report on the development and operation of the models. The contractor released a second report in July 2018 on the Form 990 model performance. The contractor found the model was not always identifying the “next best case” as TE/GE intended because scores did not consistently predict certain measures of noncompliance. Across both reports, the contractor made 17 recommendations, which we discuss later in this report (see appendix V). As of March 2020, TE/GE implemented one recommendation on model update submissions and part of another on hiring assessments. In September 2019, TE/GE initiated another study with the same contractor—with a planned release of the report in September 2020—on developing alternatives to the Form 990 model. Since the Form 990 model was first run for fiscal year 2016, the percentage of examinations closed that were identified by using data, such as through models or queries, has increased each year, as shown in figure 2. Almost half of these examinations are from the models. This increased reliance on using data in selecting returns for examination offers potential efficiencies. For example, a potential efficiency from using data to find possible noncompliance could mean fewer steps for staff who classify returns. Ultimately, this could allow TE/GE to shift staff from classifying returns to doing compliance activities such as examinations to confirm any actual noncompliance. Another potential efficiency would be selecting more examinations that find changes to the return. To measure the outcomes of examinations, TE/GE computes a “change rate,” or the percentage of closed examinations with a change to the return. In general, a higher change rate indicates that more examinations found noncompliance. Examinations selected using data have a slightly better change rate than other selection sources (84 percent versus 82 percent) for closures in fiscal years 2016 through 2019. Similar to all examinations that used data, the change rate for examinations selected using data through the Form 990 model (87 percent) was higher than the change rate for other selection sources (82 percent) in fiscal years 2016 through 2019. However, we found evidence that the changes identified in examinations did not clearly result from using the Form 990 model’s scoring system. Specifically: The model has not improved change rates compared to pre-model Form 990 queries. A higher model score is not associated with a higher change rate. Most examination changes credited to the model come from pick-up returns and SFR’s that examiners identify rather than from primary returns identified by the model score. The scoring generated by the Form 990 model has not improved change rates compared with the Form 990 queries that TE/GE used prior to the model. The change rates for both the Form 990 model and the pre-model queries, for fiscal years 2016 through 2019, was 87 percent. Similarly, for the last 2 fiscal years, the change rate for all Form 990 models was roughly equivalent to the change rate for other selection sources of exempt organization examinations. As shown in table 2, the models had a slightly higher change rate in fiscal year 2018, and a slightly lower change rate in 2019, compared to the other sources. Form 990 model scores for returns do not consistently predict examination change rates based on our analysis of examination closures since the model’s first run in 2016 through fiscal year 2019; the scores better predicted the rate at which returns were selected for examination. See figure 3. The figure shows little relationship between model scores and change rates; change rates remained relatively flat as model scores increase. While change rates were slightly higher for the less than 1 percent of returns scoring 45 or above relative to lower-scoring returns, TE/GE only examined 65 returns during fiscal years 2016 through 2019 that scored this high. The overall correlation between model scores and change rates is -.02. A TE/GE official said that it is not difficult to find a small issue on a return, which allows for a change regardless of score. To attempt to measure the severity of an examination change, TE/GE developed a weighted disposal score (WDS). However, TE/GE does not have documented criteria or justifications for how the weights were developed. A TE/GE official acknowledged that TE/GE has not used WDS because of questions about how consistently the weights have been developed. If WDS was to be used as a measure, TE/GE would need to ensure the adequacy of the support for the related weights and scores. According to TE/GE’s fiscal year 2020 Program Letter, the model relies on quantitative criteria, “which allows TE/GE to allocate resources that focus on issues that have the greatest impact.” To the extent that a higher model score does not predict a higher change rate, the model is not selecting returns with the greatest impact. Further, taxes assessed per return also indicate that examinations are not having the greatest impact. For fiscal years 2016 through 2019, the examinations credited to the model averaged $2,460 in proposed tax assessments per return, compared with an average of $19,042 for the rest of the exempt organization examinations. TE/GE acknowledged that its scoring methods are limited because it does not utilize modern data practices. It contracted for a study, to be completed in September 2020, of alternative model architectures and scoring methods that incorporate best practices for using criteria and options for scoring returns. As shown in table 3, the Form 990 model scoring did not account for most closed examinations and examination changes credited to the model during fiscal years 2016 through 2019. Rather, examinations of “pick-up” returns and substitutes for returns (SFRs) accounted for most closed examinations and produced a higher change rate than examinations of primary returns scored by the model. Examiners find these other returns during examinations of returns identified by the model. The higher change rates for pick-up and SFR returns compared to the primary returns identified by the model support TE/GE’s policy to examine all pick-up returns and SFRs that meet examination criteria. However, this raises questions about how well the model identifies noncompliant returns. Given the lower change rate for the returns the model scored, the queries for noncompliance on the Form 990 may not be effective. While the model includes queries on noncompliance related to “pick-up” issues such as unfiled employment tax returns, the necessary data were not available to allow us to analyze how often these queries identified the primary return for potential noncompliance. As discussed later, an analysis of queries could provide insight into the validity of the model. Internal control should be an integral part of an agency’s operational processes and structure to help managers achieve their objectives on an ongoing basis. When evaluating implementation, management determines if the control exists and is operational. A deficiency in implementation exists when no such control is present or is not implemented correctly, preventing objectives from being met. Documentation is required to show the effective design, implementation, and operation of an internal control system. The level and nature of documentation can vary based on the size of the agency and the complexity of its processes. Management exercises judgment in determining the extent of documentation that is needed. TE/GE has not fully implemented or documented internal controls for analyzing data for examination selection, meaning it cannot be assured that its selection decisions will produce the desired outcomes. The internal controls range from two controls that TE/GE adequately documented and implemented to seven others where TE/GE did not. The seven include five controls presented as sequential steps in using data for making selection decisions as well as two controls addressing timely documentation of Internal Revenue Manual (IRM) sections and risk management. The first internal control TE/GE implemented involved assessing staff competence. To ensure competence in using data to make decisions, TE/GE officials contracted with data specialists for modeling expertise to incorporate statistical and machine learning into examination selection. Bringing in this modeling expertise was an important step because exempt organization examinations staff, rather than statisticians or data analysts, initially developed the examination selection models, according to TE/GE officials. TE/GE also provided documents on training and basic duties for staff when analyzing data. What are Internal Controls and Why Do They Matter? One way federal agencies can improve accountability in achieving their missions is to implement an effective internal control system. Effective internal control comprises the plans, methods, policies, and procedures used to fulfill objectives on an ongoing basis. It serves as the first line of defense in safeguarding assets and increases the likelihood that an agency will achieve its objectives while adapting to changing environments, demands, risks, and priorities. Effective internal control provides reasonable, not absolute, assurance that an organization will meet its objectives. The second internal control involved communicating inside and outside of TE/GE. Internally, TE/GE staff could provide feedback through an online compliance issue submission portal in fiscal year 2018. Submissions may become compliance strategies or model queries. As for external communication, TE/GE collaborated on data-related issues in an IRS- wide group and with statistical specialists in the RAAS division. For example, RAAS identified potential data sources for compliance issues and drew samples for certain compliance strategies to test rates of noncompliance. In addition, to show how it communicates essential information with staff and outside parties, TE/GE provided examples on disseminating guidance and examination accomplishments, including examination starts and closures. TE/GE did not fully implement and document internal control over the processes and data used to select returns for examination. These processes cover five key steps for using data to decide which returns to select for examination (see figure 4). Effective internal controls would enable TE/GE to show how feedback and lessons learned in Step 5 can help it better determine how to create and use quality information (Step 3) and what decisions to make (Step 4) when pursuing the established objectives (Step 1). However, TE/GE has not defined measurable objectives or undertaken regular evaluations to assess progress toward objectives. Although TE/GE was able to describe its approach for accessing relevant and reliable data, processing those data into quality information and using the data to make decisions, it was not able to fully document how its control processes worked, as discussed below. Since its 2017 reorganization, TE/GE has not established measurable objectives to select exempt organization returns for examination (see figure 5). Specifically, TE/GE has not produced formal objectives that are aligned with its mission and the IRS strategic plan, are expressed in quantitative terms, and are related to examination selection and program outcomes. TE/GE documents, including Program Letters and Business Performance Reviews, refer to outcomes that could constitute objectives—such as improving the models and advancing data analytics to drive decisions about identifying and addressing existing and emerging areas of noncompliance—but they do not identify them as such. TE/GE officials acknowledged the need to establish measurable objectives. They said their efforts are evolving and they need to improve analytical abilities to help assess the capacity for meeting objectives. For example, one official said they are working to establish objectives at the onset of a compliance strategy. Without measurable and defined objectives, TE/GE cannot effectively analyze how well it selects returns for examination and lacks a clear vision of what it is trying to achieve. A lack of measurable objectives also hinders implementing other internal controls, such as evaluating performance or assessing risk, as discussed later. The IRM has procedures for processing Form 990 data, which include controls over acceptance and transmission of the data (see figure 6). TE/GE provided data that showed error rates for electronically filed returns filed in 2019 were between 1 and 4 percent. However, taxpayer or transcription error rates for paper returns filed in 2019 were between 19 and 32 percent of filed returns, depending on the version of the Form 990. TE/GE was not able to show that it regularly reviews and remediates such errors to ensure the reliability of Forms 990 data. However, under the Taxpayer First Act of 2019, electronic filing of all Forms 990 will be required for tax years starting July 2, 2021. This change should remediate the known errors from paper-filed returns and increase data reliability. We found several issues with TE/GE’s processing of queries in the Form 990, 990-EZ and 990-PF models that affect the validity or reliability of the scores that the models generate to rank returns for examination selection (see figure 7). As a result, TE/GE cannot ensure that the model scores properly rank the returns for examination selection. Specifically, TE/GE does not consistently assign point values for the queries used to generate the model scores and inform selection decisions. We also found errors in TE/GE’s documentation of the queries, which lead to redundant queries, and inflated model scores. Finally, TE/GE has no control procedures to ensure consistent testing of proposed queries. Inconsistent Point Values for Queries Raise Concerns about Model Scores We estimate that for 24 percent of queries (83 queries) from the models, TE/GE staff did not assign point values for queries consistent with its definitions for the four categories (see table 4). Not implementing the defined point values puts the model scores at risk of inconsistent scoring and examination selection. We found three types of queries involved with the inconsistent assignment of point values. 1. Miscategorized queries were not assigned to the category that matches TE/GE’s definition. These occurred because TE/GE has not documented specific rules for query categorization. As a result, we found an estimated 7.4 percent of queries (26 queries) where TE/GE staff overrode the category definitions when assigning points without documenting the reasons. Absent the reasons, TE/GE cannot ensure consistent treatment of similar queries. In our sample, these override decisions included assigning: Three queries to the Speculative category, which is worth five points, when the definitions supported the Automatic category, which is worth 10 points. TE/GE officials said they did this to offset potentially confusing language in the return lines or instructions. One query to the Automatic category rather than the Speculative category supported by the definitions. TE/GE officials said they used the higher point value category to increase the chance of selection so that certain Form 990-PF attachments, which the queries do not cover, would be more likely to be considered for examination. 2. Queries could fit into more than one category based on TE/GE’s definitions. We estimate that 16 percent (55) of the queries could fit in more than one category. Of these, 18 in our sample could have been placed in the Missing Schedule/Form category. In addition, we found one query in our sample that TE/GE labeled as having a duplicate but one query was assigned to the Automatic category worth 10 points and the other was assigned to the Inconsistencies category worth one point. TE/GE officials acknowledged that some queries could fit in more than one category. When we asked why certain queries for missing schedules and forms were not categorized as such, these officials described a hierarchy of missing forms based on being subject to penalties and interest, such as employment tax returns, and their associated categories. They did not document or consistently implement this hierarchy as queries identifying the same missing form sometimes were in different categories. 3. Sliding scale queries whose point values differ from those stated in TE/GE’s model documentation. We found nine queries with sliding scale point values that involved Form 1099 information returns. The sliding scales reduce point values based on the severity of the compliance issue, such as reducing the query point values if the organization filed a low number of information returns. TE/GE did not provide documentation about the rationale and associated definitions for these queries. Without documentation on the different treatment of these queries, TE/GE is not transparent about the rationale for assigning points through a sliding scale to support its model scoring. TE/GE officials said they have not updated definitions and criteria for using the categories and sliding scales because of a decision to keep the model operating as is and to update documentation as time permits. After our preliminary analyses, TE/GE provided updated definitions for the four categories, and descriptions of the sliding scales that were used for queries. However, these definitions and descriptions do not include any decision rules or criteria that document how to apply them. Further, the sliding scale descriptions do not offer definitions for words like “low,” when referring to the volume of information returns filed. Definitions that are incomplete and not always followed when assigning point values raise concerns about consistency and transparency in scoring returns for examination selection. TE/GE’s assignments affect scores and whether a return is placed on the MSS for examination consideration. Inconsistent or invalid assignment of point values may distort the potential for examination. For example, of the nine miscategorized queries we analyzed in our sample, we determined that if their categorizations were corrected, hits on three of the queries would make a return eligible for the MSS and hits on two others may make a return eligible, depending on the other queries the return hit. Changes to two queries would have made returns no longer eligible for the MSS. Query Documentation Has Errors That Forestall Valid Analysis of Queries We estimate that about 27 percent (96 queries) of the queries in the models had errors in the documented descriptions. Query descriptions detail the logic and data used from specific forms and line numbers that the queries scan. The errors we found include: references to older versions of the forms as well as omissions of form lines used in the query; and query descriptions that did not match programming code. To address these differences, TE/GE proposed corrections to the query descriptions. A TE/GE official said re-visiting the query documentation is part of the contractor’s 2020 study and that TE/GE does not have a timeline for correcting the documentation. In addition to errors, the descriptions also use inconsistent language, which prevents easy identification of queries by issue. For example, to identify all queries related to excess benefit transactions, one must manually search different fields for terms such as “excess benefit,” “excessive benefit,” and “EBT” (excess benefit transaction). Furthermore, TE/GE’s database fields only capture one issue per query. Since many queries involve multiple issues, these fields cannot be used to fully inventory the queries. These errors and inconsistencies in the query descriptions occurred because TE/GE has no procedures for regular reviews of queries as forms or laws change. TE/GE Compliance Governance Board (Governance Board) members review query descriptions prior to implementation but do not review details of the queries in the context of the entire model. Further, TE/GE procedures only require review of programming code before queries are sent to the Governance Board. Review of the code once it is integrated into the model program is optional, according to TE/GE procedures. The errors and inconsistent descriptions prevent TE/GE from having a comprehensive and accurate inventory of queries within and across models. Without regular reviews, TE/GE cannot be assured that its programming code is correct and that any analyses of the performance of queries or the models as a whole are valid. When we asked about the lack of regular reviews of queries, TE/GE officials said they plan to implement reviews but did not provide us with a plan or timeframes for doing so. Another effect of not having a comprehensive and accurate inventory is that TE/GE cannot analyze query performance and identify queries that look for the same compliance issue to prevent redundancies and to ensure valid and consistent scoring. As a result, we found queries that address the same or similar issues with the same criteria, inflating scores for returns and making selection for examination more likely. Our analysis of the July 2019 Form 990 model run showed 90 pairs of queries, involving 78 unique queries that hit together at least 90 percent of the time. By having two queries that rely on the same criteria, returns accumulate extra points for the same behavior. For example, all 910 returns that hit an employment tax query also hit a query that shares some of the same criteria and thresholds. As a result, these returns accumulated 10 points rather than five points, making them eligible for the MSS. Aside from our sample, we found queries seeking certain organizations with political campaign activities and political expenditures that would total 15 points in the Form 990 model. Queries identifying these same activities and expenditures would total 30 points in the Form 990-EZ model. TEGE’s contractor recommended in 2018 that TE/GE eliminate “redundant” queries, which is similar to our finding. TE/GE officials said they do not believe the redundant queries are duplicates and they are awaiting the results of the contractor’s study in 2020 before making changes. Until TE/GE resolves the extent to which it has redundant queries, it cannot do a valid analysis of whether its queries identify the most noncompliant returns. TE/GE Lacks Procedures and Criteria for Testing Proposed Model Queries TE/GE has no procedures requiring the testing of proposed model queries. Even so, based on our sample of the new queries in the fiscal year 2018 Form 990 model, TE/GE would be able to provide evidence of tests for an estimated 94 percent of all new queries. However, TE/GE also does not have procedures for how to conduct testing or what data to use. The testing that has been performed consisted of running the query on certain tax years of returns to count the number of returns flagged, according to a TE/GE official. TE/GE does not run the queries on data from closed examinations to see whether the queries would identify known compliance issues that justify an examination. Interactions with existing queries are not tested. When considering new queries, Governance Board members see the number of returns flagged by each query during testing, but have no criteria to determine whether a query flags an appropriate number of returns. A TE/GE official said TE/GE does not believe it needs to document procedures for testing. In the absence of procedures and standards, TE/GE cannot ensure that testing of new queries is done consistently with appropriate data sources and research standards. By only testing the number of returns that a query flags, TE/GE cannot validate that proposed queries can effectively identify the noncompliance that would be worth examining. Using tested, validated and documented data is a critical step in ensuring that research is proper, reliable, and accomplished in accordance with expectations, according to the IRM. Without testing queries on reliable data, and making adjustments based on criteria, TE/GE risks implementing queries that do not produce reasonable numbers of hits that are worth pursing through examinations. For examination sources that used data other than the models, we found that TE/GE did not always document its processing of data into quality information. We identified common “start-to-finish” segments to this processing of data, including: submitting a proposal and supporting data to find noncompliance; reviewing the potential data sources and queries or thresholds to be used as examination selection criteria; and recommending the proposed effort for approval through the appropriate executives. On one hand, TE/GE provided documentation of the required approvals for these segments in processing data for five compliance strategies. These strategies included examining loans by private foundations and collecting information on organizations that exceed investment income limitations. On the other hand, TE/GE did not provide similar start-to-finish documentation on processing quality information from other examination sources that use data outside of the models; examples include research projects under the Data Driven Approaches portfolio and projects that use queries under the Referrals and Other Casework portfolio (see table 1). Over several discussions, TE/GE did not explain why it did not fully document such projects. By not fully documenting how it processes data into quality information, and by not linking such processes to measurable objectives, TE/GE cannot ensure that it is analyzing quality information in selecting examinations. For the compliance strategies, TE/GE showed evidence of using the quality information to decide which returns to select for examination, such as for Governance Board decisions. However, TE/GE did not provide documentation on how it made selection decisions using data for other projects that use queries (see figure 8). In addition, TE/GE did not use quality information to decide how frequently to run the model. TE/GE decided to run the Form 990 models twice per year without analyzing the effects. Moreover, we found that the time between runs is inconsistent. Since the Form 990 model’s first run, the time between runs ranged from 84 days to 251 days. Since returns are ranked on the MSS, eliminations result in the classification staff selecting lower scoring returns. The average score for examined returns was 27.1 for the list that was used for 84 days compared to 23.2 for the list used for 251 days. To the extent that TE/GE ensures that its model scores are as reliable and valid as possible, analyzing data could help TE/GE identify the frequency of model runs that maximizes the use of model scores to guide decisions on examination selection. For example, analyzing Form 990 filing patterns could help identify the optimal timing of model runs, allowing for adequate time remaining under the statute of limitations. TE/GE does not regularly evaluate its models and other selection processes that use data. In particular, model scores for all returns are not retained or are inconsistent from year to year which limits the ability to conduct evaluations. Furthermore, TE/GE does not evaluate reasons why some selected returns are not examined, which could help improve selection methods (figure 9). TE/GE Has No System for Regularly Evaluating Examination Selection Decisions TE/GE has not regularly evaluated its examination selection decisions that rely on data to improve its selection methods. While TE/GE commissioned the contractor evaluations of its Form 990 model, it has no documented process for continued evaluations of the model or any evaluations of other sources, such as research projects, that rely on data to select returns for examination. For its compliance strategies, not enough examinations have closed under the strategies to warrant evaluations yet, according to a TE/GE official. Data limitations have challenged evaluation efforts, according to a TE/GE official. To address this, TE/GE started capturing more detailed data on examination outcomes; however no evaluations of outcomes have resulted. The officials noted that they have been spending more time reporting and monitoring compared to analyzing and evaluating, which they said needs to occur more often. Without evaluation, TE/GE cannot ensure that its use of data to select returns is working as intended. In addition to not evaluating selection decisions and their outcomes, TE/GE has also not addressed the Form 990 model deficiencies the contractor previously identified. In its 2018 reports, the contractor made 17 recommendations (see appendix V for the status of each recommendation). A TE/GE official said it had not acted on many recommendations because all examination selection strategies are being evaluated with the transition to the Compliance Planning and Classification (CP&C) office. TE/GE initiated another study in 2019 with the same contractor to address its 2018 recommendations among other tasks. As of March 2020, TE/GE implemented one recommendation and part of another, deferred action on nine recommendations until after the contractor finishes the new study, deferred action on three due to other reasons, and did not clearly provide a status for two. In addition, TE/GE will likely not implement the other recommendation. According to contract documentation, the study will explore architectures and alternative designs to the model, propose up to three compliance actions other than examinations, and recommend measures to monitor the actions’ effectiveness. TE/GE expects a final report by September 2020. To the extent that TE/GE has not implemented the contractor’s recommendations from 2018, the related deficiencies identified in the Form 990 model will have persisted for more than 2 years by the time the contractor issues its 2020 report. Unless TE/GE documents its consideration and action of the recommendations, the value of the contractor’s work is diminished and possible improvements may be overlooked. TE/GE Has Not Retained Complete Data to Allow for Full Evaluation of Its Models Until recently, TE/GE did not retain model scores for each return and query performance data that would be useful for evaluation. The January 2018 contractor report recommended that TE/GE save model data. For its July 2018 report, the contractor had to recreate historical scoring data for its evaluation. TE/GE officials said they increased storage space and saved the fiscal year 2018 data. When we asked for these data, TE/GE officials said that each time they run a model, they overwrite the old data. The officials said they did not have space on their server to save all of the data. Instead, TE/GE had been saving the MSS’s for each run. However, the MSSs have only limited value for evaluating the model and queries. Specifically, the MSS for each model run contains score information for only about 20,000 returns (out of about 300,000 scored) that have a certain minimum score and hit queries in certain categories. Further, the MSS does not contain data on model queries that are flagged. In September 2019, TE/GE officials said the Research, Applied Analytics and Statistics division provided temporary server storage space to save model data through September 2020 while the contractor assesses TE/GE’s models. Starting with the July 2019 model run, TE/GE is saving score and query performance data for all filed returns. In January 2020, TE/GE officials told us they developed a way to save data on query hits for all returns run through the model. However, TE/GE has not provided documentation to show exactly what data will be saved over the long term for all filed returns run through the model. Without complete historical data on model scores and query hits, TE/GE cannot assess the full performance of its models. Such data would facilitate an analysis of the queries, and whether they identified returns with changes or related pick- up returns. Historical Data on Examination Outcomes Lack Consistency, Which Complicates Evaluation TE/GE does not analyze consistent multi-year data on examination outcomes, which would facilitate evaluation of its use of data in selecting returns for examination. TE/GE officials said they use historical data— such as change rates—to determine the success of an examination source. TE/GE provided historical data on examination starts, closures, and pick-up returns covering 2 years but did not provide data beyond that and change rates were not always included. Further, TE/GE has used different methods to organize and report examination outcomes over the years. These differences in reporting outcomes affect TE/GE’s data in the following ways: Starting with fiscal year 2018, data on exempt organizations examinations include federal, state and local employment tax examinations. Prior to 2018, TE/GE reported these employment tax examination data separately. After TE/GEs reorganization in 2017, it grouped examinations into portfolios and changed the portfolio definitions during 2018. As of March 2020, TE/GE has not produced a consistent method of summarizing of historical data. TE/GE officials acknowledged data limitations, and said they are working to implement recommendations from a 2019 study to improve capturing examination data. TE/GE officials said the staff member analyzing data has been doing so for many years, allowing them to reconcile the data. However, this poses a risk that other IRS or oversight entities cannot reconcile the data. According to internal control standards, agencies should establish effective methods for retaining organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as contingency plans to respond to sudden personnel changes. TE/GE’s inconsistent data limit its ability to conduct evaluations. These inconsistent data also prevent TE/GE from establishing baselines or targets for examination outcomes such as change rates to help measure the success of its selection methods. In fiscal year 2019, TE/GE did not examine about 20 percent of the exempt organization returns that had been selected for examination. Although this rate of non-examined returns has improved in recent years, TE/GE has not analyzed data to explore why the rate has improved and how to reduce it further. Our analysis showed that almost 30 percent of these returns were not examined because they were too close to the statute of limitations date. TE/GE officials did not have a reason why the returns were sent to the field for examination if the statute date was so close. TE/GE officials said they do not regularly analyze reasons for non-examined returns. They said they have analyzed only the number of non-examined returns by manager and area. In addition, TE/GE officials said they implemented new guidance in fiscal year 2019 for staff who make decisions to not examine returns, which is intended to improve the information they have on these decisions. As of fiscal year 2019, TE/GE began tracking certain non-examined returns by project code but has not committed to analyzing the data. Non-examined returns are not an efficient use of resources, as the time spent reviewing and rejecting these returns—even if minimal—reduces the time staff have for conducting examinations. Routinely analyzing reasons for non-examined returns, as well as related data, could help TE/GE identify actions to reduce the number of returns that are sent to the field but are then declined for examination by a manager or examiner. TE/GE did not annually update procedures on examination selection and databases in certain IRM sections since the May 2017 reorganization. The Internal Revenue Manual (IRM) states that procedures in IRM sections must be annually reviewed and updated as needed. TE/GE released updated IRM sections for two of the three groups in CP&C. It released a section on the Issue Identification and Research in September 2018, and one on the Classification and Case Assignment procedures in September 2019. However, these sections do not cover the steps the model classifier takes when reviewing returns from the MSS. As of December 2019, no IRM section has been released on the Planning and Monitoring group. As such, TE/GE staff does not always have official information on roles and responsibilities for new entities and processes created since May 2017. For certain updated or new IRM sections, TE/GE did not release interim guidance while those sections awaited approval. IRS requires issuance of interim guidance to address deviations from the IRM, even if temporary. Instead of developing interim guidance, TE/GE officials stated that, in the wake of the reorganization, they decided to use desk guides, such as for the IRM section on classification and case assignment processes. However, TE/GE did not update its desk guides on processes until more than 2 years after the reorganization. Furthermore, the desk guides do not cover the specific duties of the model classifier, or the steps for classification of returns identified for compliance strategies. IRM guidance states that management must develop and maintain documentation on data systems; collection and analysis; and responsibilities for data collection, input and analysis. Timely documentation of new procedures and responsibilities improves the accuracy and reliability of IRM content. According to the IRM, when the IRM and related guidance are not current, TE/GE increases the risk that staff follow incorrect procedures, use guidance that is not transparent to the public, administer tax laws inconsistently, and misinform taxpayers. Good federal government practice requires risk management, without which, TE/GE could undercut its use of data to enhance decisions on examination selection. Although the use of data in examination selection has the potential to improve efficiencies in classifying and examining returns to identify noncompliance, any new endeavor carries risks. TE/GE did not identify any TE/GE-specific risks that could undercut its success in using data to select exempt organization returns for examination. As of December 2019, the TE/GE risk register identified 12 risks, ranging from aging technology and infrastructure to employee engagement and morale. One risk— data access and analytics—involved using data in general decision making at the IRS level rather than TE/GE decisions about examination selection or its related models. TE/GE officials said they are analyzing and responding to this risk under the IRS- wide risk management process. TE/GE did not document why it did not identify any TE/GE-specific risks in using data for examination selection. Our report discusses a number of deficiencies that could be potential risks to TE/GE using data in selecting returns for examination. For example, TE/GE lacks program objectives that would be necessary to identify and assess risks. We also found weaknesses in how TE/GE processes and analyzes data to inform examination selection and how it evaluates selection decisions. Further, the IRM states that TE/GE’s Compliance Governance Board (Governance Board) should consider risks in its decisions and we saw that risks were considered in documents proposing examination selection criteria to the Governance Board. We did not find evidence that TE/GE’s risk management process recorded these risks for analysis and any response if needed. After we shared our concerns about the lack of identified risks, TE/GE officials noted that TE/GE participates in mitigation steps as identified by the IRS Risk Office. TE/GE officials also mentioned CP&C representation in an IRS pilot program designed to explore ways to better select employment tax cases. While such actions could be a component of a risk management strategy, it is incomplete and it is unclear how this initiative would help TE/GE identify, analyze, and mitigate risk. Not identifying and managing risks identified in this report leaves TE/GE open to errors and examination selection decisions that are potentially not transparent or not fair. As such, without objectives and a consistent and documented process for identifying and managing risks, TE/GE cannot effectively address risks that may hamper its efforts to use data to enhance its compliance work. Increasingly constrained resources underscore the importance of TE/GE’s efforts to efficiently identify and examine exempt organization returns that have the highest noncompliance potential. TE/GE has developed ways to use data to aid in examination selection. However, opportunities exist to strengthen internal controls to help ensure that data used are reliable, decision rules are clear and documented, and objectives are identified and being achieved. TE/GE should take several steps to improve the reliability and validity of the models. These steps include improving documentation of decision rules and criteria for scoring; regularly reviewing model documentation and programing; testing new queries and their interaction with existing queries; retaining model and query data; and periodically evaluating the performance of selection methods. In absence of regular evaluation of its examination selection decisions, TE/GE misses opportunities for improving its selection processes. Deficiencies that TE/GE’s contractor already identified provide an opening for improving its models. Without consistent historical data, TE/GE will be limited in assessing progress and making improvements. A review of the reasons why certain returns selected for examination are not examined is an example of an evaluation that could help inform process improvements. Ensuring that all procedures are current and accurate would reduce the potential for employees following incorrect procedures and administering tax laws inconsistently. TE/GE’s lack of identified risks from using data in examination selection precludes TE/GE from analyzing and responding to those risks. By taking actions to further strengthen these internal controls, TE/GE could enhance its efforts to identify and examine the most noncompliant exempt organizations and enhance IRS’s oversight of tax exempt organizations and help maintain the integrity of the charitable sector and the larger exempt community. We are making the following 13 recommendations to IRS: The Commissioner of Internal Revenue should document measurable objectives for using data in selecting exempt organization returns for examination. (Recommendation 1) The Commissioner of Internal Revenue should document and consistently use clear criteria and decision rules on assigning point values to queries, using categories and sliding scales. (Recommendation 2) The Commissioner of Internal Revenue should require a regular review of query descriptions and programming to ensure their accuracy and minimize queries that flag the same or similar compliance issue. (Recommendation 3) The Commissioner of Internal Revenue should develop procedures and criteria to test new queries prior to implementation in the models. (Recommendation 4) The Commissioner of Internal Revenue should more fully document how TE/GE processes data and uses data to make examination selection decisions for sources outside of the model such as research projects and other projects that use queries. (Recommendation 5) The Commissioner of Internal Revenue should conduct an analysis to identify the optimal interval between model runs. (Recommendation 6) The Commissioner of Internal Revenue should establish a process for regularly evaluating selection decisions and related outcomes for the models and other processes that use data to select returns for examinations. (Recommendation 7) The Commissioner of Internal Revenue should document consideration or action on recommendations from its 2018 and 2020 contractor assessments. (Recommendation 8) The Commissioner of Internal Revenue should document how score and query data for all returns in the models will continue to be saved over the long term. (Recommendation 9) The Commissioner of Internal Revenue should ensure that historical data on examination outcomes are consistently defined and used when doing analysis of examination outcomes. (Recommendation 10) The Commissioner of Internal Revenue should routinely analyze the reasons for not examining selected returns and identify any necessary actions to address the reasons. (Recommendation 11) The Commissioner of Internal Revenue should annually review and update procedures as needed in relevant IRM sections on examination selection and issue interim guidance until the affected IRM sections are updated. (Recommendation 12) The Commissioner of Internal Revenue should document why TE/GE has not identified any risks in its risk register for using data to select exempt organization returns for examination. If risks are subsequently identified, TE/GE should document how it plans to analyze and address them. (Recommendation 13) We provided a draft of this report to IRS for review and comment. IRS provided written comments, which are reproduced in appendix VI and summarized below. Of our 13 recommendations, IRS agreed with 12 and disagreed with one. IRS also provided technical comments, which we incorporated as appropriate. IRS disagreed with our recommendation on ensuring that historical data on examination outcomes are consistently defined (Recommendation 10), pointing out that its raw data are consistently defined in its information systems. Our concern, however, is with how the outcome data are reported and analyzed, which inhibits understanding of outcome trends over time. In response to IRS comments, we added language to the final recommendation to more clearly focus on the consistency of the outcome data used and analyzed over the years. In addition, although IRS agreed with our recommendation to more fully document how TE/GE processes and uses data to make examination selection decisions outside of the model (Recommendation 5), IRS said that it would provide documentation on a project (other than compliance strategies) that is approved by the Governance Board. While we look forward to such documentation, we are primarily interested in IRS documenting a system for how it processes and uses data to select returns for examinations for projects outside of the model, regardless of Governance Board approval. As discussed in the report, IRS has such a system for projects in its compliance strategies portfolio, which could provide a framework to follow. Similarly, IRS agreed to analyze return due dates of the filing populations commonly associated with the examinations (Recommendation 6). We will be interested to see how that analysis helps IRS to determine the optimal interval between model runs, which is the focus on our recommendation. We are sending copies to the appropriate congressional committees, the Secretary of the Treasury, the Commissioner of Internal Revenue, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. This report assesses (1) the use of data to select tax-exempt organization returns for examination; and (2) the process the Tax Exempt and Government Entities (TE/GE) division has established to select returns for examination. To assess the use of data to select tax-exempt organization returns for examination, we reviewed data from the Internal Revenue Service’s (IRS) Returns Inventory and Classification System (RICS) for fiscal years 2016 to 2019. Table 5 defines the variables and measures we analyzed. We analyzed aggregated data at the project code level, and we grouped project codes by examination source (for example, examinations from referrals occurred under several project codes). Based on our testing of the data and review of documentation and interviews, we determined that the data were reliable for purposes of assessing TE/GE’s selection processes. We analyzed outcomes from the Form 990, Return of Organization Exempt from Income Tax model. We used RICS data and Model Score Sheets (MSS), for examinations closed from October 1, 2015 through September 30, 2019. Each model run generates an MSS, which is a ranked list of Form 990s that hit certain types of queries and have a minimum score. We matched Form 990 scores from the MSS with selection information and examination outcomes in RICS for examinations closed under all project codes, though the data presented in objective one is specific to examinations started under the Form 990 project code. We used source codes—which indicate whether an examination was a pick-up, substitute for return or primary return—to analyze what types of examinations produced the highest change rates under the Form 990 model project code. To inform this work, we reviewed recent TE/GE contractor assessments of exempt organization examination selection and the Form 990 model. To assess the process that TE/GE has established to select returns for examination, we reviewed internal controls steps in Standards for Internal Control in the Federal Government (Green Book). Given TE/GE’s emphasis on using data in examination selection, we identified five internal control steps related to analyzing data to select returns for examination to address our objectives. We selected four other internal controls because they constitute practices common to all five steps in the selection process. These are presented in table 6. Define objectives in measurable terms so performance in achieving objectives can be assessed. (Green Book (GB) 6.04) Obtain relevant data from reliable internal and external sources in a timely manner based on identified information requirements. (GB 13.04) Process the obtained data into quality information that supports the internal control system (i.e., using data in decision making); use quality information to achieve the entity’s objectives; and document policies on the responsibilities for data collection, input, and analysis. (GB 13.05, 13.01, and 12.02) Use the quality information to make informed decisions in achieving key objectives. (GB 13.05) Evaluate performance (outcomes) for key objectives and take actions to remediate deficiencies. (GB 13.05, 16.03, and 17.06) Develops, maintains, and updates in a timely fashion documentation on the responsibilities for data collection, input and analysis for using data in decision making. (GB 12.02 and 12.05 and IRM) Defines risk tolerances in specific and measurable terms, considers internal and external factors to identify risks, analyzes risks to estimate significance, and designs specific actions for response. (GB 6.09, 7.04, 7.05, and 7.09) Ensures that personnel possess competence to meet responsibilities as well as understand the importance of effective data analysis in decision making. (GB 4.04) Communicates necessary information to enable personnel to perform key roles for analyzing data in decision making and with external parties. (GB 14.03 and 15.20) To identify criteria specific to IRS, we reviewed the Internal Revenue Manual (IRM), which provides standards and guidance similar to the criteria we identified. We shared the Green Book and IRM criteria with TE/GE, as well as our expectations of the documentation that would show adherence to these criteria. Our assessment focused on examination sources developed after the 2017 reorganization and sources that rely on data for selection (such as models and projects that use queries). Examination sources that did not rely on data, such as claims, were not assessed. We reviewed the referrals classification process to consider how data might be used to enhance it. We analyzed TE/GE documents such as Program Letters, Business Performance Reviews, desk guides, memorandums, work plans, performance data, contractor reports and training documents. In addition, we assessed documents—such as meeting minutes and research results—showing the development and approval of data queries and projects used in examination selection. We reviewed the MSSs for the Form 990 model, and procedures for the Form 990 model, the Form 990-EZ, Short Form Return of Organization Exempt from Income Tax, and Form 990-PF, Return of Private Foundation, models. We selected a generalizable stratified random sample of 114 of the 354 unique queries in the three models (see table 7). Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval (e.g., the margin of error is +/- 10 percentage points). This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. Our sample is designed to control the margin of error of attribute estimates within the overall scope query sample as well as the combined Form 990 query sample (a combination of strata 2 and 4 plus certainty selections). The sample was designed as follows. There is one certainty stratum for Form 990-PF queries where we selected a 100 percent sample (i.e. a census), and this stratum does not have a margin of error. We selected these queries with certainty because of the smaller population size in this stratum. For remaining strata, we selected the necessary sample size to achieve an overall 95 percent confidence interval for attribute (percentage) estimates with a margin of error of about +/-10 percentage points under proportionate allocation. In addition, the sample size was increased in strata 2 and 4 (combining Form 990 model queries) to achieve the necessary sample size for a 95 percent confidence interval with a margin of error of about +/-10 percentage points within this group. For the sampled queries, we compared their category and descriptions as provided in the model documentation, with TE/GE’s definitions of the categories to assess whether the query was categorized appropriately. We also compared the query descriptions with the forms to assess whether the referenced lines were relevant to the query. Additionally, we reviewed the model programming code to check for errors and consistency with the query descriptions. For query categorizations that did not match TE/GE’s definitions or queries that appeared to have errors in the descriptions or programming, we asked TE/GE to review and explain its decisions. To identify potentially redundant queries, we analyzed output from the July 2019 Form 990 model run, the only one available at the time of our analysis. Within our sample, we reviewed 36 of the 104 newly added queries in the fiscal year 2018 model. Specifically, we reviewed approval documentation and meeting minutes to test whether two levels of management and the Compliance Governance Board approved new queries, consistent with TE/GE procedures. We also reviewed evidence that TE/GE tested each query prior to its approval for inclusion in the models. We held two telephone focus groups with the nine classifiers who review exempt organizations referrals. We asked questions about the data and resources they use to classify referrals, how they convey their results, and how they are provided feedback. We interviewed officials from the Compliance Planning and Classification office and IRS’s Research, Applied Analytics and Statistics division who worked on several compliance research initiatives. We met regularly with TE/GE to share ongoing assessments. We conducted this performance audit from November 2018 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The figure below shows the text of the 2019 version of Form 990, Return of Organization Exempt from Income Tax. A list of schedules for the Form 990 is provided in table 8 following the form. The remaining pages of the Form 990 are available at IRS’s website, accessed March 23, 2020: https://www.irs.gov/pub/irs-pdf/f990.pdf. Most exempt organizations are required to file an annual form to report their activities, structure, revenue and expenses, and other items. The organization’s classification under the Internal Revenue Code and its gross receipts and total assets, determines which form must be filed. Most organizations file one of the following: Form 990, Return of Organization Exempt from Income Tax; Form 990-EZ, Short Form, Return of Organization Exempt from Form 990-PF, Return of Private Foundation or Section 4947(a)(1) Trust Treated as Private Foundation. The Internal Revenue Service (IRS) last redesigned the Form 990 series for tax year 2008. The redesign added 14 schedules to the existing two, and reflected changes in the tax-exempt sector and tax law. Some changes from the redesign were phased in and implemented for tax year 2008 and 2009 filings. We summarized changes as found in the “What’s New” section of the form instructions for each of the three Form 990 types and for each year. We grouped the changes into two categories as defined by: New or revised question(s): The addition of new lines, check boxes, narratives or schedules. This includes changes to accommodate new laws or reporting requirements, such as new reporting thresholds or standards. Instructions and format: New descriptions or details in the instructions, such as specifying examples or how to provide certain information to IRS. This also includes changes that affect order of lines or schedules, but not the content. For the Form 990 changes since the redesign, IRS made 56 changes to the form or its instructions for tax years 2009 through 2019 (see table 9 below). These changes include three to the 2018 form implementing new excise taxes on net investment income of certain colleges and universities and on certain tax-exempt organization executive compensation. Aside from new electronic filing requirements for tax years beginning July 2, 2019, the 2019 form did not have any changes. In addition to the 56 changes, IRS made 95 clarifications to existing lines or instructions, or revisions to definitions from tax years 2009 through 2018. These clarifications provide more specific definitions or other details. Further, several of the schedules had additions. For example, the Patient Protection and Affordable Care Act led to additional reporting on Schedule H, Hospitals, to fulfill requirements that hospitals report on each of their facilities and conduct a Community Health Needs Assessment every 3 years. Most of the Form 990-EZ’s 27 changes occurred in tax years 2009 through 2012, of which 12 were for 2011 and several of them focused on compensation reporting. IRS also made 27 clarifications for 2009-2013. Public Law 115-97 did not affect Form 990-EZ. There were no changes to the 2019 form. See table 10. For the Form 990-PF, IRS made the fewest changes compared to Forms 990 and 990-EZ, with only 11 changes and four clarifications for tax years 2009 through 2019. The Form 990-PF had three changes prompted in 2018 by Public Law 115-97. Electronic filing requirements apply to Form 990-PF for tax years starting July 2, 2019, but there were no other changes for the 2019 form. See table 11. Appendix IV describes the general examination selection process for exempt organization returns, and specific classification steps that apply to certain returns. The annual work plan is the foundation for identifying and assigning returns for examination. The Compliance Planning and Classification (CP&C) office follows various steps to identify returns to fulfill the work plan, which end in the assignment of returns for potential examinations to field work groups. The intended process is in figure 11 and discussed below. Annual work plan. CP&C’s Planning and Monitoring group develops the annual work plan. The work plan provides estimates of examination starts and closures. It also has estimates for the number of hours to be spent per return examination and the number of days to complete an examination. Planning and Monitoring develops estimates at the project code level, which corresponds to a specific examination source or project such as the Form 990 model. The Tax Exempt and Government Entities’ (TE/GE) Compliance Governance Board approves the work plan. TE/GE provides a summary of the work plan in its annual Program Letter. Stocking report. The Planning and Monitoring group uses the work plan to issue “stocking” reports to guide classifiers on types of returns to identify for potential examination. Planning and Monitoring considers available examiners, and progress in meeting work plan numbers. The report lists the number of returns needed by grade, project code, and classification source. Classification. Classifiers review stocking plans to identify returns for potential examination. Classifiers are to eliminate returns for consideration if the (1) return is approaching its statute of limitation date, (2) organization has been examined in the last 3 years, or (3) organization is under a compliance check. Establishing the return and initial case building. If classifiers identify examination potential, they establish returns in the Audit Information Management System and Reporting Compliance Case Management System (RCCMS). The returns are sent for initial case building—developing paperwork to initiate the examination— according to a TE/GE official. Virtual shelf. Established returns and the initial case material are sent to the virtual shelf, which is an electronic inventory of returns that may be assigned for examination. Certain referrals, claims, compliance strategies, and other returns are prioritized, according to a TE/GE official. Returns remain on the shelf until assigned for examination or otherwise closed due to statute of limitations, according to a TE/GE official. Examination assignment. Functional Assignment Coordinators pull returns from the virtual shelf to fulfill field group work requests. Returns on the virtual shelf that matched a work order undergo additional case building before delivery to field examination groups. Monitoring. Planning and Monitoring staff regularly review reports that compare work plan goals with current work, and run algorithms to forecast upcoming work. These reviews are intended to ensure that sufficient work is available for assignment, excess work is not created, and returns approaching statute of limitations are identified. The monitoring informs new stocking reports. Classification steps vary depending on how a return was identified for potential examination. For returns identified with queries or models, classifiers check a limited set of criteria once a return is identified. For returns identified through other sources, such as referrals, the classifier also reviews facts and circumstances about potential noncompliance in returns. We focus here on examination sources that rely on data—such as models or queries—and referrals. Referrals are complaints of exempt organization noncompliance made by third parties, including the public and other parts of the Internal Revenue Service. We describe referrals classification because it is one of the top sources of exempt organizations examinations. The models are run to identify returns with potential noncompliance and lists them on a Model Score Sheet (MSS). The MSS is a ranked list of returns by scores from the model. According to a TE/GE official, the classifier: works down the list, starting with the highest scores, to fill stocking checks whether the return was also identified for a compliance strategy; and. eliminates returns based on the statute of limitations and recent examination activity. For some projects in the Compliance Strategies portfolio, a query is run or returns are sampled to identify a population meeting indicators of potential noncompliance. Then, the classifier uses the stocking report to select returns with certain geographic or case grade criteria and eliminates returns based on statute of limitations, recent examination status, and resolving non-filing issues, according to a TE/GE official. TE/GE classifiers do a triage to review and eliminate referrals that are not relevant to tax administration or do not have substantiated information. The triage classifier sorts referrals and reviews the following: organization status (for example, already revoked or terminated); examination history of the organization; and evidence of substantial inurement or private benefit, non-exempt activities, or material employment tax or unrelated business income that would result in a significant tax assessment. Referrals that pass triage are either sent to classification or, if they deal with political issues, are sent to a committee of three TE/GE managers, who vote on a selection decision. For all referrals, the classifier researches the referral. Research sources include websites, external databases, and IRS taxpayer account databases. The classifier may look at the organization’s website, information about officers, or prior examination history. Referrals with examination potential are either assigned immediately or placed on the virtual shelf. Referrals that must be immediately assigned include those with strong indicators of fraud, illegal or illicit activities (including terrorism), or referrals from whistleblowers, or certain other IRS divisions. Other referrals are labeled as high, medium or lower priority, based on potential for revocation or significant tax assessments. The Tax Exempt and Government Entities division (TE/GE) hired a contractor to review the effectiveness of its Form 990 examination selection model. The contractor prepared two reports. The first, delivered in January 2018, makes recommendations on the model process, the computing environment, and performance measures. The second, delivered in July 2018, makes recommendations to more effectively and efficiently identify returns for examination, such as through the model. Within the two reports, the contractor made 17 recommendations. Table 12 lists the recommendations and the status of each. In September 2019, TE/GE initiated another study, anticipated to be completed in September 2020. The study focuses on developing alternatives to enhance the models. The study will explore architectures and alternative designs for the model and propose alternative compliance actions to examinations and recommend measures to monitor their effectiveness. In addition to the contact named above, Tom Short (Assistant Director), Lindsay Swenson (Analyst-in-Charge), Ann Czapiewski, George Guttman, Amalia Konstas, Krista Loose, Alan Rozzi, Cynthia Saunders, Andrew J. Stephens, and Sonya Vartivarian made key contributions to this report.", "summary": "Exempt organizations often provide charitable services, or in some instances, membership benefits in furtherance of an exempt purpose. They generally do not pay federal income tax. IRS examines exempt organization returns (Form 990 and others) to address noncompliance, which may promote confidence in the tax exempt sector. In 2016, IRS started using three analytical models using Form 990 data to identify potential noncompliance and select returns for examination. GAO was asked to review IRS's use of Form 990 data. This report assesses (1) IRS's use of data to select returns for examination and, (2) the process IRS has established for selecting returns. GAO analyzed (1) examination data from fiscal years 2016 through 2019 including results from the largest Form 990 model, and (2) model documentation for a generalizable sample. GAO interviewed IRS officials and assessed IRS policies and procedures using relevant standards for internal control. The Internal Revenue Service (IRS) used data to select almost 70 percent of its examinations of Form 990 returns in fiscal year 2019. Almost half of these examinations were selected using models that score returns for potential noncompliance (see figure). Of the returns examined that were selected using the model, 87 percent resulted in a change to the return, indicating that IRS identified noncompliance. GAO found that the model did not improve change rates compared to prior selection methods and a higher model score is not associated with a higher change rate. IRS has not fully implemented or documented internal controls in its established processes for analyzing data for examination selection. For example: IRS has not defined measurable objectives for using data to select returns for examination . Without measurable objectives, IRS cannot assess how well it is doing or fully implement other internal controls. IRS's models have deficiencies affecting the validity and reliability of return scoring and selection . IRS has incomplete definitions and procedures and did not always follow its definitions when assigning point values for identifying potential noncompliance for examination. As a result, return scoring by the models is not always consistent. IRS did not consistently document the processing and use of data in decision-making on examination selection . Without such documentation, IRS cannot support its use of data in examination selection in all cases. IRS does not regularly evaluate examination selection. Examination data were inconsistent across years and IRS only tracks one prior year of data. IRS also did not save data on all returns that the models scored. Without data and regular evaluations, IRS cannot assure that its models are selecting returns as intended and that deficiencies are identified and corrected. GAO makes 13 recommendations, including that IRS establish objectives, revise model documentation, fully document processing and using data in decisions, and regularly evaluate examination selection. IRS agreed with all recommendations except one related to evaluating examination selection methods using consistent historical data over time. GAO continues to believe that this recommendation is valid as discussed in the report.", "document_type": "gao"}
{"report": "American Samoa consists of five volcanic islands and two coral atolls in the South Pacific, about 2,600 miles southwest of Hawaii (see fig. 1). American Samoa has a combined land area of 76 square miles, slightly larger than Washington, D.C. Approximately 98 percent of the population of American Samoa lives on the main island of Tutuila, and most economic activity (including tuna canning) and government operations take place in and around the harbor of the capital city, Pago Pago, on Tutuila (see fig. 2). Most of Tutuila consists of rugged terrain with little level land. With a significant portion of its population and infrastructure located in low-lying coastal areas, American Samoa faces the risk of tsunamis and other coastal hazards. In September 2009, a tsunami following a magnitude 8.1 earthquake left 34 people dead in American Samoa, and caused severe damage to homes, businesses, and water and electrical infrastructure. In February 2018, Tropical Storm Gita struck the territory, causing damage with at least 50 percent of American Samoan residents facing some level of loss to property, according to American Samoa Department of Commerce estimates. The American Samoa government estimates that the disaster caused nearly $200 million in damages to public and private property. In response to both natural disasters, the federal government issued major disaster declarations and assisted with recovery efforts. The 2010 U.S. Census found American Samoa’s population to be 55,519, a decrease of 3 percent from its 2000 population. Individuals who are neither U.S. citizens nor U.S. nationals, most of them from the Independent State of Samoa, constituted approximately 35 percent of the territory’s population in that year. BEA most recently estimated American Samoa’s 2018 population to be approximately 58,000. The 2010 census also reported that American Samoa’s median household income remained well below, and its poverty rate well above, that of the United States. In 2009, American Samoa’s median household income was $23,892, 47 percent of the U.S. median household income, while its poverty rate was 57.8 percent, nearly four times the U.S. rate of 15.1 percent. U.S. interest in the Samoan islands began in 1872 with efforts by the U.S. Navy to establish a naval station in Pago Pago Harbor. A U.S.-British- German protectorate over all Samoan islands ended in 1899, when the islands that constitute American Samoa were placed under U.S. control. The U.S. Naval Station in the territory was established in 1900. From 1900 through 1904, the U.S. government negotiated control over American Samoa, and the U.S. Navy subsequently took responsibility for federal governance of the territory. In 1951, governance was transferred to the Secretary of the Interior. In 1960, American Samoa residents adopted their own constitution, but amendments to the constitution may be made only by an act of Congress. Persons born to non-U.S. citizen parents in American Samoa are U.S. nationals but may apply to become naturalized U.S. citizens. In addition, U.S. non-citizen nationals from American Samoa have the right to travel freely, live, and work throughout the United States. American Samoa exercises authority over its immigration system and customs through locally adopted laws. While American Samoans may serve in the U.S. military, they do not have voting representation for legislation passed before the full U.S. Congress, including legislation setting the minimum wage in American Samoa. The United States provides assistance to the American Samoa government, including funding the majority of its revenue. In fiscal year 2018, the American Samoa government’s financial audit reported that U.S. federal grants provided approximately $150 million of $246 million in total American Samoa government revenue. Ranked by approximate grant expenditures, the largest federal grantors were the Departments of Health and Human Services ($43 million), Agriculture ($33 million), Interior ($30 million), Education ($28 million), Transportation ($18 million), and Homeland Security ($5 million). The federal minimum wage was first enacted as part of the Fair Labor Standards Act of 1938 (FLSA). The FLSA specified that for industries engaged in commerce or in the production of goods for commerce, its policy was to correct and, as rapidly as practicable, to eliminate labor conditions detrimental to the maintenance of the minimum standard of living necessary for health, efficiency, and general well-being of workers without substantially curtailing employment or earning power. Since 1938, there have been nine amendments to the FLSA establishing new minimum wages and usually raising the rate through a series of steps over 2 to 4 years. The FLSA was amended in 1956 to provide for American Samoa minimum wages to be established through a special industry committee (SIC) process similar to that used in Puerto Rico and the U.S. Virgin Islands. Federal policy called for the minimum wage rates for industries in American Samoa to reach the federal level as rapidly as was economically feasible without substantially curtailing employment. The final SIC, which recommended minimum wages to be applied in 2005 and 2006, recommended minimum wages for 18 industry categories. These 18 industry categories remain in existence for present-day minimum wages in American Samoa. Since 2007, U.S. federal law has determined minimum wages in American Samoa. In 2007, Congress passed the Fair Minimum Wage Act of 2007, which eliminated the SICs and created a schedule of increases to American Samoa minimum wages that has since been revised and applied over a number of years. The Fair Minimum Wage Act of 2007 amended the FLSA, raising the federal minimum wage in a series of three steps from $5.15 to, effective July 2009, $7.25 per hour. The amended provision also eliminated the SICs in American Samoa and introduced a schedule for raising the minimum wages, by equal amounts, until all 18 minimum wage categories in American Samoa reached the federal level. According to the U.S. Department of Labor, when the law was enacted, nearly 80 percent of eligible American Samoa workers earned less than $7.25 per hour. The initial Fair Minimum Wage Act of 2007 schedule, which called for $0.50 annual increases, would have increased all American Samoa minimum wages to the current federal level by May 2016. After the initial (2007) schedule, each subsequent law revising the schedule of minimum wage increases for American Samoa extended the projected dates for American Samoa minimum wages to reach the federal level. Measures adopted in 2009 and 2010 retained the $0.50 increases but delayed their application, so that convergence between the American Samoa minimum wages and the federal level would have occurred in 2018 rather than 2016. Subsequent measures—applying increases every third year and reducing each increase from $0.50 to $0.40—delayed convergence of American Samoa minimum wages with the federal level by more substantial intervals. The current schedule establishes increases of $0.40 every 3 years for all 18 industry categories in American Samoa, with the most recent increase in September 2018 and the next increase scheduled for September 2021. If American Samoa minimum wages continue to increase by $0.40 every 3 years as scheduled, and if the current federal level does not increase, the highest minimum wage in American Samoa, for the stevedoring industry, will reach the federal level in 2027, while the lowest minimum wage, for the garment manufacturing industry, will reach the federal level in 2036. Minimum wages for the largest employer overall, government, and the largest private-sector employer, the fish canning and processing industry, will reach the federal level by 2036 and 2033, respectively. Table 1 shows past and projected minimum wages in American Samoa for these industries. (App. III shows the current federal minimum wage in American Samoa by industry.) Since 1957, American Samoa minimum wages have risen, first as recommended by SICs and then in accordance with schedules set by legislation. However, with the exception of 1986, when the highest American Samoa minimum wages—for fish canning and processing, petroleum marketing, and stevedoring—converged with the federal level of $3.35, American Samoa minimum wages have remained below the federal level (see fig. 3). American Samoa’s economy largely contracted during the past decade. Adjusted for inflation, gross domestic product declined by 18.2 percent from 2007 to 2017, though it increased by 2.2 percent in 2018. According to the American Samoa Department of Commerce, the 2018 uptick is likely to be temporary, partly reflecting reconstruction activity for Tropical Storm Gita. Changes in government spending and the tuna canning industry, including disaster-related federal funding and cannery closures, have impacted American Samoa’s economy. From 2007 to 2018, American Samoa employment varied by year without a clear trend, while workers’ inflation-adjusted earnings generally declined. American Samoa continues to depend on the territorial government and tuna canning industry as key sectors. The American Samoa government continues efforts to diversify the economy, and in recent years, these efforts have centered on the development of a new industry, telecommunications. Employment did not exhibit a clear trend, but varied from year to year from 2007 to 2018. Specifically, it ranged from about 16,000 to about 20,000 with a peak year in 2009. In 2018, employment was at the same level as it was in 2007, at about 17,000. Figure 5 shows the trend in employment in American Samoa over this period. In addition, we analyzed data from alternative sources, which also showed that employment lacked a clear trend from year to year. According to American Samoa Statistical Year Book data, employment ranged from about 14,000 to 19,000 from 2007 to 2017 with a peak in 2010. According to the U.S. Census Bureau’s County Business Pattern data, which mostly excludes certain groups such as the public sector, private sector employment ranged from about 7,000 to 10,000 from 2008 to 2017, with a peak in 2009. For more information, see appendix IV. Average earnings of employed workers contracted from 2007 to 2018 when adjusted for inflation. For the overall period from 2007 to 2018, average inflation-adjusted earnings fell by about 11 percent (from about $11,000 to about $10,000), reflecting an increase in average annual earnings of about 29 percent and an increase in prices of about 44 percent. For the most recent year available, 2017 to 2018, average inflation-adjusted earnings was almost unchanged—growing by about 1 percent. Figure 6 shows the trend in earnings in American Samoa from 2007 to 2018. For more information, see appendix IV. The territorial government and tuna canning industry are important sectors of American Samoa’s economy, contributing almost half of American Samoa’s employment and GDP. The American Samoa government and the tuna canning industry have historically employed the largest numbers of workers in American Samoa. In 2018, the government sector employed about 42 percent of the American Samoa’s workforce and the tuna cannery employed about 14 percent (see fig. 7). The territorial government continues to be the largest employer, while the tuna canning industry continues to be the largest private sector employer. The government and the tuna canning industry also remain large contributors to GDP in American Samoa. In 2017, government and manufacturing (primarily composed of tuna canning) contributed 42 percent of American Samoa’s total GDP (see fig. 7). The tuna canning industry plays a key role contributing to the territory’s trade, primarily through exports. According to U.S. Census Bureau data, processed tuna annually accounted for over 88 percent of exports from American Samoa to the United States from 1995 to 2018. According to American Samoa government officials, government and the tuna canning industry are the two main pillars of the economy and sustain other industries across the territory. The territory’s component units, including the Lyndon B. Johnson Tropical Medical Center, American Samoa Community College, American Samoa Power Authority, and American Samoa Telecommunications Authority, provide healthcare, higher education, utility, and telecommunications services, respectively. The tuna canning industry provides direct and indirect benefits to other industries. American Samoa Department of Commerce officials stated that the remaining cannery generates demand for support industries such as transportation and warehousing, retail and wholesale, and construction. American Samoa government officials also noted that the cannery’s large demand for shipping, transportation, and energy might reduce the cost of these services for the entire territory. In 2017, canned tuna constituted over 90 percent of American Samoa’s exports, and fish for processing constituted over 35 percent of American Samoa’s imports (see fig. 8). To reduce the territory’s dependence on its government and the tuna canning industry, the American Samoa government continues its efforts to diversify the economy. According to the American Samoa government, the territory’s dependence on the government and the tuna canning industry has exposed the economy to external risks, including changes in federal grant funding and global competition in the tuna canning industry. To reduce this dependence, the government has developed plans to diversify the economy. American Samoa’s economic development implementation plan for fiscal years 2014 to 2017 and economic development strategy for 2018 to 2022 outline economic development goals for sectors such as transportation and tourism, as well as action items to achieve these goals. The American Samoa government has identified ecotourism as an economic opportunity because the island’s mountains, tropical rainforests, coral reefs, and National Park may be attractive to tourists (see fig. 9). However, the American Samoa government has cited the federal restrictions on competition in passenger air carrier service to American Samoa as an impediment to developing the tourism sector. The United States restricts foreign airlines from carrying U.S. domestic passengers or cargo between U.S. locations, other than as part of a through trip involving a foreign location (cabotage), unless authorized by the U.S. Department of Transportation on the basis of specific criteria. According to the American Samoa government, as of August 2019, there are two passenger air flights per week between American Samoa and the United States (via Hawaii), with a third weekly flight added during peak travel seasons. American Samoa’s 2016 Workforce Innovation and Opportunity Act Unified Plan targets the development of five industries: fisheries and agriculture, telecommunications and information technology, manufacturing, visitors, and handicrafts. The plan notes that American Samoa is experiencing emigration of workers to the United States, countered in part by immigration of tuna cannery workers from neighboring islands to American Samoa. The plan cites low wages as a reason that high-skilled members of the labor force leave the territory. In recent years, the American Samoa government’s efforts to diversify the economy have centered on the development of the telecommunications industry. The government has made major investments in telecommunications infrastructure over the past 5 years. American Samoa Telecommunications Authority officials told us that they have managed the development of the territory’s telecommunications infrastructure projects. Completed in 2015, the Broadband Linking the American Samoa Territory (BLAST) project replaced the territory’s copper infrastructure with a fiber optic network capable of delivering high-speed data, voice, and cellular backhaul services. The U.S. Department of Agriculture’s Rural Utility Service funded the over $90 million project with an approximately $81 million grant and $10 million loan. According to American Samoa Telecommunications Authority officials, the Hawaiki cable project, completed and activated in 2018, added bandwidth to the BLAST network by connecting the territory via an underwater cable branch to the main Hawaiki cable trunk in Hawaii. The officials stated that the Hawaiki cable is a 15,000 kilometer, high- capacity underwater cable connecting Australia and New Zealand to the mainland United States, American Samoa, and Hawaii. The American Samoa government invested approximately $30 million to acquire its connection to the Hawaiki cable, using funding from American Samoa’s 2018 general revenue bond series. According to American Samoa Telecommunications Authority officials, other ongoing, multi-million dollar projects to enhance the territory’s telecommunications infrastructure include projects to upgrade BLAST bandwidth distribution and replace the territory’s 2G network with LTE technology. The American Samoa government believes that the newly activated Hawaiki cable and BLAST fiber optic network have raised the territory’s potential to develop new industries tied to telecommunications, including information communication technology and business process outsourcing. According to an American Samoa Department of Commerce survey of over 50 public and private stakeholders, 64 percent of respondents—the largest share—identified information communication technology as one of the most promising economic development opportunities for the territory. The next four most promising opportunities identified by approximate share of respondents (in parentheses) included “Attracting investors for capital investment projects (58 percent), “General Tourism” (47 percent), “Ecotourism” (47 percent), and “Federal Programs” (47 percent). American Samoa government officials acknowledge that despite progress made, American Samoa’s telecommunications industry is still at an early stage of development. The American Samoa government seeks to attract new telecommunications businesses, including a proposed call center, by identifying various competitive advantages for locating in American Samoa. American Samoa Department of Commerce officials stated that these advantages include an English-(American) speaking workforce with the lowest labor costs in the United States, and the territory’s qualification as an on-shoring location for call centers and other business process outsourcing operators. American Samoa Department of Commerce and American Samoa Telecommunications Authority officials stated that they are currently developing a territorial broadband strategy and proof-of- concept for a call center industry, expected to be released in mid-2020. Additionally, American Samoa Telecommunications Authority officials expect the Territorial Bank of American Samoa, opened in October 2016, to support the efforts to develop the telecommunications industry by encouraging investment in financial technology businesses. American Samoa Telecommunications Authority officials stated that the bank is partnering with the authority to develop internet banking services, which are expected to be offered in the next 2-3 years. American Samoa’s tuna canning industry faces multiple challenges, including increased competition and minimum wage increases, which led to cannery closures from 2007 to 2018. The companies that experienced the closures explained that minimum wage increases were a factor in the closures but not a main factor. With the closures, employment of cannery workers decreased, but inflation-adjusted earnings of cannery workers who maintained their jobs increased. StarKist Co. now operates the single remaining cannery in American Samoa, StarKist Samoa, but faces financial challenges. In addition to increased competition and labor market challenges, the industry faces other challenges, such as lower wages relative to those in American Samoa for cannery workers in other tuna-exporting countries. However, American Samoa offers the tuna canning industry advantages relative to the U.S. mainland and other countries, including lower wages compared to those in the U.S. mainland as well as duty-free access to the U.S. canned tuna market, according to StarKist Samoa officials. American Samoa’s tuna canning industry experienced cannery closures from 2007 to 2018 that adversely impacted the economy in that time period, as mentioned earlier. (For a timeline of selected events related to American Samoa’s tuna canning industry, see app. V.) StarKist Co., Chicken of the Sea, and Samoa Tuna Processors, which is owned by Tri Marine International (Tri Marine), have each operated or closed canneries in American Samoa over the years, as follows. StarKist Co. StarKist Co. (headquarters in Pittsburgh, Pennsylvania) has operated a cannery, StarKist Samoa, in American Samoa since 1963. StarKist Samoa is the one remaining cannery on the island, as mentioned earlier (see fig. 10). As of June 2018, StarKist Samoa employed 2,439 hourly wage workers. Chicken of the Sea. Chicken of the Sea (headquarters in El Segundo, California) operated a cannery in American Samoa, which it closed in September 2009. According to CRS, in the 1950s, the Department of the Interior contracted with Van Camp Seafood Company to move onto the island and develop a fish processing plant. Thai Union closed the Chicken of the Sea Samoa Packing cannery in American Samoa in September 2009. According to Chicken of the Sea officials, limited tuna supply was a key factor in the decision to close the cannery. The American Samoa minimum wage increases were a minor factor, but not as significant as other factors related to tuna supply, labor availability, logistics, and utility costs in contributing to the cannery’s closure. The company relocated its canning operations to the U.S. state of Georgia while outsourcing the more labor-intensive processes, including cleaning and cooking tuna loins (a low-tariff U.S. import), to countries with lower labor costs. By relocating to Georgia, Chicken of the Sea noted that it improved flexibility in sourcing and processing fish from multiple locations depending on where supply was readily available. Tri Marine International (Tri Marine). Tri Marine (headquarters in Bellevue, Washington) acquired the former Chicken of the Sea cannery in American Samoa in October 2010, undertook a multi- million dollar investment to renovate and expand it, and opened the new facility under the name Samoa Tuna Processors in January 2015. However, Tri Marine suspended its canning operations in American Samoa indefinitely in December 2016, primarily in response to highly competitive price setting across the global tuna canning industry, according to Tri Marine. Tri Marine explained that the American Samoa minimum wage increases were a minor factor—not as significant as rising price competition and high production costs, such as for utilities—in contributing to Samoa Tuna Processors’ closure. The company subsequently transferred its canned tuna sourcing operations from American Samoa to Thailand, Peru, and the Solomon Islands to take advantage of decreased production costs. According to a report by the Pacific Islands Forum Fisheries Agency, in 2018, StarKist Co. signed a 10-year lease agreement to use Tri Marine’s Samoa Tuna Processors facility for StarKist Samoa operations. According to a Tri Marine official, in 2019, the Bolton Group (Italy) completed its acquisition of Tri Marine. The acquisition did not include Samoa Tuna Processors, and the Tri Marine ownership change did not affect the 10-year lease agreement between StarKist Co. and Samoa Tuna Processors, according to the official. From 2007 to 2018, cannery employment in American Samoa fell from about 4,500 in 2007 to 2,469 in 2018, a decline of 45 percent. Most of the decline occurred in the period between 2007 and 2010, with the closure of the Chicken of the Sea cannery. Figure 11 shows the trend in cannery employment in American Samoa over this period. The inflation-adjusted earnings of cannery workers in American Samoa who have maintained their jobs during this period have increased by more than inflation. In American Samoa, the vast majority of cannery workers earn close to the minimum wage. Moreover, the hourly wage of minimum wage cannery workers has increased by more than inflation since 2007. Specifically, during this period, the minimum wage has risen by 70 percent (from $3.26 to $5.56, from the first half of 2007), while prices have increased by 44 percent. However, this analysis does not include those workers who have lost employment or have had hours cut. StarKist Co. faces continuing financial challenges because of legal issues, as follows. In 2019, StarKist Co. was sentenced to pay a criminal fine of $100 million, the statutory maximum, for its role in a conspiracy to fix prices for canned tuna sold in the United States. This fine amounts to almost three times StarKist Samoa’s cost of labor in 2018. According to StarKist Co.’s General Counsel, the company will potentially have to close the cannery in American Samoa and move operations to a foreign country to afford to pay the fine for price-fixing. For its role in price-fixing, StarKist Co. has faced—and may continue to face— lawsuits from wholesalers, food service companies and retailers, and customers. For example, in January 2019, StarKist Co. announced that its portion of a settlement with Walmart was $20.5 million, based on a combination of cash payment and certain commercial terms. In addition, in September 2017, StarKist Co. agreed to pay a $6.3 million penalty resulting from violations of federal environmental laws, according to the U.S. Department of Justice. The U.S. Department of Justice and the U.S. Environmental Protection Agency reached an agreement with StarKist Co. and StarKist Samoa, requiring a series of upgrades to reduce pollution, improve safety measures, and comply with important federal environmental laws at their tuna processing facility in American Samoa, the department reported. American Samoa’s tuna canning industry faces multiple challenges in addition to scheduled minimum wage increases. One challenge is rising competition in the global tuna canning industry, as the value of foreign processed tuna exports to the United States has increasingly exceeded the value of American Samoa processed tuna exports to the United States (see fig. 12). Specifically, tuna industry officials stated that firms in the U.S. canned tuna market are highly competitive in price setting as opposed to differentiating their product lines. A tuna canning industry official stated that price competition and the financial pressures of the recent anti-trust judgements have forced the U.S. canned tuna market into a cost-cutting environment. According to the same tuna canning industry official, firms must look to lower costs related to labor, energy usage, and shipping to remain competitive in the U.S. market. The official stated that firms implicated in the price-fixing scheme have agreed as part of a legal settlement resulting from a lawsuit to supply their product at lower prices. This puts more pressure on firms to implement cost-saving measures to maintain their U.S. market shares. For example, StarKist Samoa has implemented cost-saving measures to reduce labor and energy costs and has also raised prices and relocated business off the territory. American Samoa’s tuna canning industry also faces other challenges, as described below. Competitors’ canning production strategies. According to StarKist Co. officials, StarKist Co.’s main competitors implement a supply chain production process that spans more than one country. Conversely, StarKist Samoa’s full production process still occurs in American Samoa (see fig. 13). According to StarKist Samoa officials, the cost savings between a fully U.S.-based manufacturing process and an outsourced manufacturing process is substantial and places American Samoa at a distinct disadvantage. According to StarKist Samoa officials, StarKist Co.’s main competitors use a model that outsources the workforce-intensive process to extremely low-wage countries. They explained that StarKist Co.’s competitors clean, cook, and freeze the tuna before importing it—subject to an average tariff of $11 per metric ton—into the mainland United States, where it is then thawed and packaged. Furthermore, our analysis of the global tuna industry suggests that, under certain assumptions, this model can improve cost savings and competitiveness. See appendix VI for the results of our analysis of the global tuna industry and more details about the assumptions we used. Tuna canning industry officials also stated that a new production process combined with lower labor costs for packaging tuna in foreign countries decreases American Samoa’s competitiveness as a location of operation. Lower wages for cannery workers in other countries, relative to those in American Samoa. According to a tuna canning industry official, tuna canneries have moved operations from American Samoa to Thailand, Peru, and the Solomon Islands, in part because of the lower labor costs. According to an industry official, one prominent tuna exporting country offers wages as low as $10 dollars per day, whereas a full- time worker in 2020 at the cannery in American Samoa would earn over $44 per day. Upcoming minimum wage increases in American Samoa. Upcoming minimum wage increases in American Samoa will increase labor costs for the tuna canning industry. According to data provided by StarKist Samoa, most cannery workers in American Samoa would be impacted by a minimum wage increase. Specifically, over 90 percent of StarKist Samoa’s employment (roughly 2,200 workers) could be affected by the next minimum wage increase scheduled for September 30, 2021. At 2018 levels of employment, labor costs could increase by about $2 million at 2021 minimum wage levels. Decreased direct access to tuna supply. A number of factors have decreased direct access to tuna supply. The Pacific Remote Islands Marine National Monument regulations have had the biggest impact on tuna supply to the cannery, according to StarKist Co. officials. Also according to Starkist Co. officials, marine monuments in the region have closed fishing grounds to U.S. purse seine vessels that historically delivered tuna to local canneries in American Samoa, and the Rose Atoll Marine National Monument reduced fishing grounds in U.S. waters around American Samoa that were very important to the American Samoa longline fleet. In 2017, National Marine Fisheries Service removed a regulatory exemption that had allowed certain large U.S. longline vessels to fish in portions of the American Samoa Large Vessel Prohibited Area. Delivery volume from a Chinese tuna supplier that used to send fishing boats to supply canneries in American Samoa directly has decreased significantly as a result of China paying subsidies to Chinese fishing vessels in the Pacific, according to StarKist Co. officials. The subsidy draws potential tuna suppliers from the American Samoa market to the Chinese market, the officials stated. American Samoa offers the tuna canning industry certain competitive advantages relative to the U.S. mainland and other countries, as follows. Lower wages for cannery workers in American Samoa relative to those on the U.S. mainland. American Samoa offers lower labor costs relative to the U.S. mainland. For example, while the 2020 minimum wage for fish canning and processing in American Samoa is $5.56 per hour, Georgia’s wage for manufacturing is $15 per hour. Tariff-free access to the U.S. canned tuna market. According to StarKist Co. officials, U.S. trade policies provide tariff-free access to the U.S. market for processed tuna from American Samoa, while foreign suppliers generally are subject to tariffs for these goods. On average, foreign suppliers’ canned or pouched tuna is subject to an average tariff rate of 12 percent. However, U.S. trade agreements with certain countries may provide those countries tariff-free or reduced-tariff access to the United States. Tax credits provided by the federal and local government. The American Samoa tuna canning industry receives both federal and local tax benefits. U.S. tax policies have reduced federal taxes on income earned by qualifying U.S. corporations investing in American Samoa. Under the Internal Revenue Code, qualifying American Samoa tuna canneries have received an economic development credit for U.S. corporate income taxes. StarKist Samoa reported saving $5.9 million in 2016 through this tax credit. Canneries in American Samoa have also benefited from exemptions from local taxes. According to American Samoa government officials, the local tax exemption has allowed StarKist Samoa to reduce its corporate tax liability to the American Samoa government to 20–25 percent of the amount owed. According to American Samoa government officials, the total corporate and excise tax revenue loss to the American Samoa government is estimated to be $15–20 million annually. Federal procurement opportunities related to canned tuna. According to StarKist Samoa officials, operating in American Samoa offers access to certain U.S. government contracts that require U.S.-sourced and -processed fish, and allows them to comply with Buy American requirements. However, according to the officials, most school districts that enter into such contracts waive the Buy American requirements because StarKist Co. is the only tuna company that qualifies, and as a result, competitive bids reveal that the cost of domestic product is significantly higher than the cost of non-domestic product. StarKist Samoa reported that $15.8 million or 4 percent of its revenue in 2018 was from federal procurement that included contracts with the U.S. Department of Agriculture and the U.S. military. The American Samoa government and Chamber of Commerce both view the minimum wage increases as conflicting with sustainable economic development. Both expressed concerns about the reliance of American Samoa’s economy on the tuna canning industry and the potential negative impact of minimum wage increases on the remaining cannery in American Samoa. The American Samoa government stated that it supports a minimum wage that its economy can support. While the American Samoa government noted that it is committed to ensuring that the people of American Samoa can meet the basic cost of living, it stated that the impact of upcoming minimum wage increases on StarKist Co. would be extensive. The American Samoa government predicts that it would take years for the economy to recover if StarKist Co. should cease operations in American Samoa, and suggested that the burden of any economic impact would be on the federal government. The American Samoa government specified challenges that it believes StarKist Co. currently faces, including recent federal fines, decreasing supply of tuna, higher infrastructure costs in American Samoa compared to those of other countries, and increased regulation costs by the U.S. Coast Guard and U.S. Environment Protection Agency. In October 2019, the American Samoa Minimum Wage Task Force, commissioned by the Governor of American Samoa, provided us with its findings and recommendations. It reported that American Samoa's economy is unique and starkly different from the economies of all U.S. states and territories, and that, aside from the American Samoa government, the remaining and only pervasive economic driving force in the territory is StarKist Samoa. It also noted that its main objective is to express to the U.S. Congress the importance of involving the territory in the process of determining the applicable minimum wage for American Samoa. The task force identified various policy options and recommended that a combination of a moratorium on minimum wage increases and special industry classification or a special industry committee would increase and maximize the opportunity for local stakeholder participation. These have been long-standing positions of the American Samoa government. In response to a prior report, the American Samoa government requested we convey its position to the U.S. Congress to postpone the minimum wage increases. In response to another prior report, the American Samoa government recommended the pursuit of a U.S. Department of Labor-constituted committee similar to a special industry committee. While the American Samoa Chamber of Commerce noted that its employers support fair minimum wages for their workers, it stated that it supports any delay in minimum wage increases for the cannery until another economic option is feasible. The American Samoa Chamber of Commerce explained that while data show a shift in employment away from the cannery, StarKist Samoa still provides significant financial benefits to American Samoa in the form of decreasing fuel and shipping costs. The American Samoa Chamber of Commerce predicts that any increase in minimum wage could force the closure of StarKist Samoa and drive American Samoa into a recession. Public and private sector employers and workers we interviewed commented on the impact of minimum wage increases, including potential benefits and challenges. Potential positive impact on the livelihood of workers. Multiple employers and workers we met with stated that increasing the minimum wage would have a positive impact on the livelihood of workers. For example, a worker said that minimum wage increases have helped offset the increasing prices of imported products and excise tax products. Another worker stated that minimum wage increases help people to meet their community and church financial obligations. Some employers and workers noted that minimum wage increases improve customers’ ability to pay bills and their likelihood of using necessary services. Potential negative impact on the remaining cannery. Multiple workers and employers we met with generally stated that minimum wage increases could lead to a potential negative impact on StarKist Samoa. Multiple workers stated that such impact could result in a loss of jobs and increases in shipping costs, among other things. Some public employers were concerned that minimum wage increases could lead to the closure of the remaining cannery, and one of them stated that the potential closure was the main factor in the minimum wage increase discussion. One public worker stated that StarKist Samoa closing the remaining cannery is a major concern because the company is the main source of tax revenue. Another public worker added that having already seen a cannery close after minimum wage increases has raised concerns that it might happen again with StarKist Samoa. In addition, a private employer stated that after the Samoa Tuna Processors cannery closed in 2016, the employer’s retail sales decreased sharply and the economy now relies on the remaining cannery, StarKist Samoa. Increased recruitment and retention of workers. Some employers and workers we met with noted that a higher minimum wage could lead to increased recruitment and retention. For example, multiple employers noted the challenges of recruiting and retaining skilled workers given the low wages on the island, which often compel such workers to leave the island for better opportunities. One employer said that it could not recruit without minimum wage increases. Another employer stated that even low-paid workers often leave the island to obtain better pay in higher-paying countries. Some employers and workers noted that the lack of staff, especially nurses and teachers, has led to challenges, such as a negative impact on healthcare and education on the island. One of these employers stated that the minimum wage is too low and there is a lack of good teachers on the island. This employer was upset that the local school did not have a math teacher, noting that teachers leave or simply do not come to work because the pay is too low. One of these workers stated that nurses have moved off-island because their pay is too low and because overwork has contributed to potential health hazards. Keeping American Samoan youth on the island. Multiple employers and workers we met with were concerned that the current minimum wage was insufficient to keep younger American Samoans on the island, especially those who are college-educated. For example, an employer stated that there is a lack of young talent because there are no jobs on the island and pay is low. Another employer stated that some American Samoans earn degrees abroad and come back to American Samoa, but find that they cannot advance their careers on the island and leave again after 1-2 years. Some workers we met with spoke as parents about their children leaving the island, and became emotional upon sharing that they did not anticipate their children returning. Wage stagnation versus wage compression. While some workers we met with said they believed that a lack of an increase would lead to wage stagnation, other workers, as well as employers, we met with said they believed that an increase would lead to wage compression. Some workers noted not receiving pay increases despite working for an employer for many years and obtaining certifications. For example, a worker stated that if it were not for minimum wage increases, the worker would not receive any pay raises. However, another worker was upset that colleagues who had just started working were receiving more money than those who had been with the employer for many years. Funding for minimum wage increases. Multiple employers and workers said they were concerned about how future minimum wage increases could be funded. For example, a public employer noted that it did not oppose the minimum wage increases because the current minimum wage was barely enough to survive on, but was concerned about where the funding and revenue to sustain the increases would come from. Another employer stated that identifying additional funds for minimum wage increases is a major challenge. This employer noted that the company had not yet laid off workers to fund minimum wage increases, but might have to consider it. Public and private sector employers and workers we interviewed also commented on the following topics related to minimum wage increases: Proposed alternatives. Multiple employers and workers suggested alternative ways of increasing minimum wages in American Samoa. For example, an employer stated that minimum wages should be set based on the actual conditions of American Samoa rather than on what it believed to be an arbitrary federal schedule, and a worker stated that the U.S. Department of Labor reviewing the minimum wage and making changes is preferred to scheduled changes. Minimum wage levels. In addition, while cannery workers we met with generally agreed that the current minimum wage was sufficient, other workers, as well as some employers, stated that the current minimum wage and the scheduled minimum wage increases were insufficient. While cannery workers generally noted that they were happy to have previous minimum wage increases, they were fearful that future increases could lead to a loss of hours or complete job loss should the cannery close. However, other workers disagreed. For example, one worker explained that minimum wage increases did not keep pace with the cost of living. Another worker stated that 40 cents every 3 years is only about 13 cents per year, which the worker considered insufficient. Some employers and workers became emotional when speaking about their own financial situations or those of their workers, relatives, or fellow American Samoans. Varying degrees of impact on the livelihood of workers. While public employers generally stated that the impact of the minimum wage increases on their workers was minimal, private employers noted varying degrees of impact on their workers. Some public employers stated that the majority of American Samoa government workers are paid above the minimum wage, and noted that the minimal impact was a result of the local government raising the minimum wage to $5 ahead of the 2018 minimum wage increase to $5.21. Potential positive impact on the economy if the remaining cannery closes. Some private employers stated that there could be a positive impact on the economy if the remaining cannery closes. For example, a private employer stated that the American Samoa economy is so used to having the cannery as its pillar that it has not truly tried to diversify the economy. This employer added that American Samoa needed to continue shifting away from the cannery and toward the rest of the private sector. Another private employer stated that the American Samoa economy is better off without the remaining cannery and that an economist’s analysis of the cannery’s true impact on the rest of the economy is needed. Cost of living. Multiple workers, as well as some employers, were concerned that minimum wage increases could lead to increases in the cost of living, with some noting that the cost of living in American Samoa is already high because living on a remote island requires a high amount of imported goods. While a public employer stated that business owners pass the cost of minimum wage increases to customers, a private employer stated that business owners are unable to do so because of competition. Another employer noted concerns about inflation, stating that minimum wage increases might drive up prices and rent. Cultural considerations. Multiple employers and workers cited the importance of considering American Samoa’s unique culture when setting minimum wage increases. While some workers and an employer noted that the cost of living in American Samoa is unique in that communal land and living off the land through fishing and gardening could minimize housing and food costs, others noted that community and church financial obligations are significant costs. One employer stated that these costs could amount to up to a quarter of worker’s paycheck. A worker stated that nonresidents, like many of the cannery workers, pay much higher medical costs; and an employer stated that foreign workers pay much higher housing costs. Other economic challenges. Multiple public and private employers and workers cited an array of economic challenges other than minimum wage increases, including the high cost of living on the island and increased taxes and fees. For example, one employer stated that American Samoa government taxes and fee increases are more of a challenge than minimum wage increases. We provided a draft of this report to the U.S. Departments of Commerce, the Interior, and Labor, and the American Samoa government for comment. The Department of Commerce provided technical comments, which we incorporated as appropriate. The Department of Labor informed us that it had no comments. In its comments, reproduced in appendix VII, the Department of the Interior said it would be beneficial to the American Samoa government if we provided information on all potential alternatives to setting minimum wages, including the once-utilized special industry committees. Such a study was beyond the scope of this report, which focused on (1) economic trends including changes in employment and earnings since the minimum wage increases in American Samoa began in 2007, (2) the status of the tuna canning industry, and (3) stakeholder views on the minimum wage increases. In its comments, reproduced in appendix VIII, the American Samoa government noted that the draft report did not reference findings and recommendations of the American Samoa Minimum Wage Task Force, commissioned by the Governor of American Samoa. The task force recommended the establishment of a special industry committee and a moratorium on minimum wage increases to allow ample time for such a special industry committee to form. We have added information on these findings and recommendations. We are sending copies of this report to the appropriate congressional committees, the U.S. Secretaries of Commerce, the Interior, and Labor, and the Governor of American Samoa. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact David Gootnick at (202) 512-3149, or gootnickd@gao.gov; or Oliver Richard at (202) 512-8424, or richardo@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IX. This report updates our previous reports on the impact of minimum wage increases in American Samoa and examines (1) economic trends including changes in employment and earnings since the minimum wage increases in American Samoa began in 2007, (2) the status of the tuna canning industry, and (3) stakeholder views on the minimum wage increases. To examine economic trends including changes in employment and earnings, we analyzed gross domestic product data from the U.S. Bureau of Economic Analysis; tax and administrative data from the American Samoa government; and employment, earnings, and wage data gathered through an employer questionnaire that we submitted to American Samoa’s tuna canning industry. To examine the status of the tuna canning industry, we estimated changes in employment and earnings using the employer questionnaire, analyzed tuna trade data from the U.S. Census Bureau, and interviewed tuna cannery industry representatives and stakeholders. To examine stakeholder views on the minimum wage increases, we conducted interviews with officials from the American Samoa government and American Samoa Chamber of Commerce, and employers and workers from the public and private sectors. The federal sources generally used to generate data on employment and earnings in the United States, including the Current Population Survey and the Current Employment Statistics program, do not cover American Samoa. Therefore, we collected our own data on employment and earnings in American Samoa. Consistent with our prior reports, we reported on employment and earnings from 2007 to the most recent year available. Employment and earnings figures are based on our analysis of combined worker data from various sources. We used employer-level data that we obtained from the American Samoa Department of Commerce and Department of Treasury to measure the annual employment of the American Samoa government and its component units: (1) American Samoa Community College, (2) LBJ Tropical Medical Center Authority, (3) American Samoa Power Authority, and (4) American Samoa Telecommunications Authority. We used tuna canning industry employers’ responses to our employer questionnaire to estimate cannery employment and earnings. We used individual-level tax records that we received from the American Samoa Department of Treasury to measure annual employment and earnings in American Samoa’s private sector excluding the canneries. To adjust earnings for inflation, we relied on the Consumer Price Index (CPI) as provided by the American Samoa government. To estimate employment and earnings for non-cannery workers in the private sector, we relied on individual-level tax data that we obtained from the American Samoa Departments of Commerce and Treasury. We restricted the sample to tax records received for tax years 2005 through 2018. We excluded tax records that contained invalid values in the variables that uniquely identify employers and workers. We also excluded records that contained non-numeric values in Social Security withholdings. Together, these records accounted for less than 2 percent of all tax records in the sample between 2005 and 2018, and accounted for less than 1 percent of total gross wages during this period. In addition, we excluded a small number of tax records—26 out of over 130,000 total records during this period—that reported zero annual earnings under gross wages, Social Security, and Medicare wages. In addition, in less than 100 cases, we adjusted the reported gross wages of workers if the worker had reported Medicare or Social Security wages but had reported gross wages that were very extreme in value (for example, zero or over $300,000), under the assumption that these were data errors. We estimated annual employment by summing the number of workers reported by each employer, for employers for which there was at least one tax record reporting positive wages for a given year. Under this approach, it is important to note that if a worker had multiple employers, the worker was counted more than once. Because of data limitations, we did not include data for tax year 2015 in our analysis of employment and earnings in American Samoa. We excluded this year because, according to the American Samoa government, individual-level tax records for that year are incomplete. Consistent with this observation, we found that the data contained lower counts of employers and workers in the private sector excluding the canneries in tax year 2015 than in any other tax year between 2005 and 2018. With the exception of tax year 2015 data, we found the data on employment and earnings sufficiently reliable for the purposes of our reporting objectives. For more details on our methodology for estimating employment and earnings in comparison to our methodology used in previous reports, see appendix IV. To examine the status of the territory’s key private sector industry—tuna canning—we estimated changes in employment and earnings by submitting an employer questionnaire to American Samoa’s tuna canning industry. In accordance with other federal employment surveys and with our employer questionnaires for our 2010, 2011, 2014, and 2016 reports on the impact of minimum wage increases in American Samoa, our employer questionnaire requested employment and wage data for mid- June pay periods in 2016, 2017, and 2018 from American Samoa’s tuna canning industry—in this case, the territory’s one remaining cannery, StarKist Samoa. In our 2016 report, we asked for employment in the mid- January 2016 pay period. We used the 2016, 2017, and 2018 data to update and extend the time series of employment and earnings data received from our prior employer questionnaires provided to American Samoa’s tuna canning industry. We found the data collected through the employer questionnaire for prior reports and this report sufficiently reliable for the purposes of our reporting on changes in American Samoa employment and earnings from 2007 to 2018. Data based on employers’ questionnaire responses include the reported numbers of hourly workers as well as their annual earnings at the canneries as of June in the given year. The questionnaire asked separately for data regarding workers paid an hourly wage and workers paid an annual salary. For hourly wage workers, respondents were asked to provide the number of workers paid at each wage rate. For salaried workers, respondents were asked the number of full-time and part-time workers paid at each salary level. In compiling the questionnaire-based earnings data for a given year, we assumed that all hourly cannery workers earned the minimum wage for that year and worked all year. When the minimum wage changed midyear, we assumed that the original wage applied for the first half of the year and the revised wage for the second half of the year. To adjust earnings for inflation, we relied on the American Samoa CPI. Using employer questionnaire data, we determined the number of workers that would be affected by future minimum wage increases because their wages were at or below future scheduled minimum wage increases. We estimated the cost of future scheduled minimum wage increases by calculating the cost to the cannery of increasing each worker’s wages to scheduled levels. This estimate assumed that workers worked full-time and all year (i.e., 2,080 hours) and that the minimum- wage increase would not affect the wages of workers currently earning more than the minimum wage. In addition, we interviewed cannery representatives and industry experts to obtain their views on competitive challenges facing the industry, including changes in minimum wage rates, access to fishing grounds, and preferential trade status. To illustrate other potential tuna production scenarios, we developed a model where tuna production relocates from the current status quo in American Samoa to one of two alternative scenarios of loining or canning tuna, or both, in other locations. Changes in labor and tariff costs are compared to the status quo scenario in American Samoa. The model uses assumptions based on the tuna canning industry employment count from the employer questionnaire responses and information obtained during interviews with tuna cannery employers. (See app. VI for the results of our analysis and more details about the assumptions we used.) This model is an update of the model we used for our December 2016 report. To examine stakeholder views on the minimum wage increases, we conducted interviews with officials from the American Samoa government and American Samoa Chamber of Commerce, and employers and workers from the public and private sectors. During our fieldwork trip to American Samoa in October 2019, we conducted interviews with government officials, employers, other private sector representatives, and workers to obtain views and information on the minimum wage increases. In total, we conducted 15 interviews: five employer interviews (the American Samoa government and three of its component units, and StarKist Samoa), two employer group interviews (private employers that are American Samoa Chamber members and ethnic business employers), and eight worker group interviews. For the primary American Samoa government and StarKist Samoa, we conducted two worker group interviews for each. In the group interviews, we followed a standard protocol that asked for participants’ views on the impact of the minimum wage increases. We interviewed a nongeneralizable sample of employers and workers selected on the basis of key industry information from prior GAO reports and employment data from the American Samoa government. Specifically, we selected the following employers and their workers: (1) the American Samoa government, (2) StarKist Samoa, (3) American Samoa Medical Center, (4) American Samoa Community College, and (5) American Samoa Power Authority. To supplement these employers and workers, we requested that the American Samoa Chamber of Commerce identify additional employers and their workers on the basis of criteria related to the tuna canning, construction, and retail industries, among other things. The American Samoa Chamber of Commerce arranged a group of 15 employers and their workers belonging to its membership and related to the tuna canning, construction, and retail industries, as well as a group of eight employers related to the territory’s ethnic (including Filipino, Chinese, Korean) business community. Overall, the number of participants in each group interview ranged from four to 20, for a total of over 100 participants. The range in number of participants applies to all of the interviews, regardless of their composition. In addition, we reviewed data and interviewed officials from the U.S. Departments of the Interior, Commerce, and Labor. We also reviewed U.S. minimum wage laws and other relevant laws and regulations. We did not review the extent to which laws were properly enforced or implemented. The scope of our study also does not include workers in the underground economy, which would include employers that may not comply with laws, including tax, minimum wage, immigration, and other laws. We did not review compliance with laws as part of this study. We conducted this performance audit from June 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 2 summarizes key federal laws regarding minimum wages in American Samoa. Figure 14 shows a U.S. Department of Labor poster outlining federal minimum wage requirements for American Samoa employers subject to the Fair Labor Standards Act (FLSA). According to the department, all such employers are required to post this information in conspicuous places in every establishment where employees subject to the FLSA’s minimum wage provisions are employed to permit them to readily observe it. Table 3 compares American Samoa employment data from 2007 to 2018 obtained on this review, data reported in GAO-17-83, and data from the American Samoa Statistical Yearbook 2017, an annual report produced by the American Samoa Department of Commerce. Data obtained on this review were composed of American Samoa tax records, including individual-level data, and responses from a questionnaire submitted to StarKist. Data reported in GAO-17-83 relied on aggregate data and did not include individual-level tax records. The data in the tables derived from these different sources are broadly consistent, but there are differences in certain years. The largest gaps between the alternate sources are in 2009 and 2012. According to the American Samoa Department of Commerce, some temporary government workers are not reflected in the data reported in GAO-17-83. We also compared American Samoa private sector employment data that we obtained and analyzed to County Business Patterns private sector employment data, collected by the U.S. Census Bureau. Private sector employment data that we analyzed indicated 2,000 to 3,000 more workers employed than County Business Patterns private sector employment data, depending on the year. According to the U.S. Census Bureau, this may largely be because the County Business Patterns data capture employment during the week of March 12, while the tax data include employment throughout the year. In addition, given that the American Samoa manufacturing sector is largely composed of the tuna canning industry, we also compared cannery data that we obtained on this review to County Business Patterns manufacturing data, which County Business Patterns reports in selected years. As table 4 shows, cannery employment data are in a similar range as County Business Patterns manufacturing data. Table 5 compares American Samoa workers’ earnings data from 2007 to 2018 obtained on this review and data reported in GAO-17-83. As shown, the data are broadly consistent. We also compared American Samoa workers’ earnings data from 2007 to 2018 obtained on this review to County Business Patterns data. In general, average earnings estimates in the County Business Patterns data are somewhat higher than in the American Samoa tax data, as shown in table 6. However, both series show growth in earnings over the period of 2008 to 2017 of approximately 20 to 30 percent. As an additional test of the reliability of the individual-level tax data, we examined trends in the distribution of worker-level earnings. A prior GAO report found that the minimum wage increases narrowed the gap between lower- and higher-paid workers in American Samoa from 2007 to 2009. We first examined whether the tax data also show that the gap narrowed during this period and then examined trends through 2018. One limitation of this analysis was that it was restricted to the private sector excluding the canneries. Therefore, any patterns that we documented in this sector may not reflect changes to the American Samoa workforce as a whole. We began our analysis in 2006 to provide information before the Fair Minimum Wage Act of 2007. To measure a worker’s annual earnings, we summed all of the worker’s gross wages from his or her tax records in a given tax year. According to the tax data, in 2006, workers at the 50th percentile of annual earnings earned $6,031. This amount is only 8 percent higher than what full-time workers would have earned if they were continuously employed at the lowest minimum wage that was in effect in American Samoa in 2006 ($2.68 per hour). In comparison, in the same year workers at the 90th percentile earned $18,747, or 3.1 times higher than the 50th percentile. We found that earnings at the 50th percentile experienced a larger increase than earnings at the 90th percentile from 2006 through 2009, and this ratio fell to 2.7. Figure 15 depicts trends in the gap between lower- and higher-paid workers in American Samoa from 2006 through 2018, as measured using the tax data by the ratio between the 90th and 50th percentiles of earnings. Overall, from 2006 through 2018, this gap fell by 17 percent, from 3.1 to 2.6. The decline is attributable to a 48 percent increase in earnings for workers at the 50th percentile, compared to only a 23 percent increase for workers at the 90th percentile. The following events highlight changes in American Samoa’s minimum wages and the status of the tuna canning industry from 2007 to 2019: 2007. Fair Minimum Wage Act includes a provision to incrementally increase American Samoa minimum wages to the federal level ($7.25 per hour). Special industry committees that previously set minimum wages in American Samoa are disbanded. Minimum wages in American Samoa rise by $0.50 as federally mandated. Minimum wage for fish canning and processing workers becomes $3.76. May 2008. Minimum wages in American Samoa rise by $0.50 as federally mandated. Minimum wage for fish canning and processing workers becomes $4.26. May 2009. Minimum wages in American Samoa rise by $0.50 as federally mandated. Minimum wage for fish canning and processing workers becomes $4.76. September 2009. Chicken of the Sea closes its cannery in American Samoa. The company relocates its canning facilities to the U.S. state of Georgia while outsourcing labor-intensive processes to countries with lower labor costs. The Samoa earthquake and tsunami cause severe damage and leave 34 people dead in American Samoa. The federal government issues a disaster declaration and assists with tsunami recovery efforts. October 2010. Tri Marine International acquires former Chicken of the Sea facility in American Samoa, located adjacent to the StarKist Samoa cannery. American Samoa government grants Tri Marine International exemption from local taxes for 10 years. December 2012. American Samoa government grants StarKist Samoa exemption from local taxes for 10 years. January 2015. Tri Marine International opens $70 million Samoa Tuna Processors cannery after large capital investments in prior years to renovate and expand the former Chicken of the Sea cannery. September 2015. Minimum wages in American Samoa rise by $0.40 as federally mandated. Minimum wage for fish canning and processing workers becomes $5.16. December 2016. Tri Marine International indefinitely suspends operations at its Samoa Tuna Processors cannery in American Samoa. September 2017. StarKist Co. agrees to pay a $6.3 million penalty resulting from violations of federal environmental laws. October 2017. StarKist Samoa temporarily halts operations for 5 weeks because of fish supply setbacks and equipment upgrades. February 2018. According to American government estimates, Tropical Storm Gita causes nearly $200 million in damages to public and private property. The federal government issues a disaster declaration and assists with disaster recovery efforts. May 2018. According to a report by the Pacific Islands Forum Fisheries Agency, StarKist Co. signs 10-year lease agreement with Tri Marine International to sub-lease its Samoa Tuna Processors facility for use in StarKist Samoa operations. September 2018. Minimum wages in American Samoa rise by $0.40 as federally mandated. Minimum wage for fish canning and processing workers becomes $5.56. September 2019. StarKist Co. is sentenced to pay a criminal fine of $100 million for its role in price fixing. Although American Samoa’s tuna canning industry faces multiple challenges in addition to scheduled minimum wage increases, American Samoa offers the tuna canning industry certain competitive advantages relative to the U.S. mainland and other countries. To illustrate tuna canning costs for other business models, we compared the labor and tariff costs associated with three potential business models for the cannery operations currently used by firms in the global tuna industry. The following analysis provides cost estimates for the three possible models, assuming constant total production under each model. Our analysis considers only labor costs and tariffs to show the effect of variation across different models. Our analysis excludes other associated costs, including transportation and refrigeration, as well as costs associated with establishing multiple production locations. Therefore, we assume that shipping costs and other conversion costs, such as for electricity usage, are identical. We also assume that fixed costs for starting operations in a new location (i.e., search costs) are equal to zero. We assume the alternative country is Thailand, on the basis of prior related reports and interviews with relevant officials and stakeholders. All of the tariff and tax assumptions used in our analysis are based on input from tuna canning industry officials. Model A (maintaining all loining and canning in American Samoa): This is the current production process for the remaining cannery operating in American Samoa. Tuna processing currently performed in American Samoa remains entirely in American Samoa. The cannery located in American Samoa hires local and foreign workers to loin—clean, cook, and cut—and can the fish. With an estimated workforce of 2,000 employees in American Samoa, the associated labor cost was an estimated $23 million in 2019. The canned tuna from American Samoa is exported directly to the United States and, according to cannery officials who utilize this model, such canned tuna is eligible for tariff-free access to the U.S. market. The cannery, which is a qualified domestic corporation, according to cannery officials, receives an estimated $5 million as a federal tax credit. Model B (relocating loining to Thailand or another country with low labor costs and canning processed loins in the U.S. states): This is the current production process for a firm operating a cannery outside of American Samoa. The loining operation—the most labor-intensive part of the operation—would move to a country with low labor costs, such as Thailand, where the fish would be loined, sealed in pouches, and frozen. The loined, frozen fish would then be exported to the U.S. mainland, where it would be canned. With an estimated workforce of 1,700 employees in a country with low labor costs making $1.25 per hour, the associated labor cost would be $4.4 million; and with an estimated workforce of 300 employees in the U.S. mainland at $15 per hour, the associated labor cost would be $9.4 million. Therefore, the total associated labor cost in 2019 for this model would be $14 million. No workers would remain in American Samoa, and 300 workers would be employed on the U.S. mainland. The imported fish would carry an average tariff of $11 per metric ton. This model assumes that the firm operating outside of American Samoa would not qualify for the American Samoa economic development credit. Model C (relocating all loining and canning to Thailand or another country with low labor costs): This is an alternative production process for operating canneries outside of American Samoa. Tuna processing currently performed in American Samoa would relocate to a foreign country with low labor costs. All operations, including loining and canning the fish, would take place in this foreign country. With an estimated workforce of 2,000 employees in a country with low labor costs making $1.25 per hour, the associated labor cost in 2019 would be $5 million. No workers would remain in American Samoa and no workers would be employed in the U.S. mainland. The imported fish would carry an average tariff of 12 percent of export revenue. This model assumes that a firm operating outside of American Samoa would not qualify for the American Samoa economic development credit. Figure 16 shows that, considering labor and tariff costs along with tax credits, Model A has higher costs than Model B. Model B presents cost savings; however, importing processed loins to the United States would incur tariffs, and wages for canning in any of the 50 U.S. states would be higher than in competing tuna processing countries. Model C presents the highest combined labor and tariff costs and would result in an estimated 2,000 fewer jobs in American Samoa. Table 7 below shows how revenue and labor and trade costs are computed for each model. The following are GAO’s comments to the Department of Interior’s letter. With respect to paragraph 4 of the U.S. Department of the Interior’s letter above, the suggested further study was beyond the scope of this report, which focused on (1) economic trends including changes in employment and earnings since the minimum wage increases in American Samoa began in 2007, (2) the status of the tuna canning industry, and (3) stakeholder views on the minimum wage increases. In addition to the contacts named above, Emil Friberg (Assistant Director), Benjamin Bolitzer (Assistant Director), Justine Lazaro (Analyst in Charge), Samuel Huang, James Boohaker, Carl Nadler, Debbie Chung, Christopher Keblitis, Sara Daleski, Martin De Alteriis, and Alex Welsh made key contributions to this report. American Samoa: Alternatives for Raising Minimum Wages to Keep Pace with the Cost of Living and Reach the Federal Level. GAO-17-83. Washington, D.C.: December 2, 2016. American Samoa and the Commonwealth of the Northern Mariana Islands: Economic Indicators Since Minimum Wage Increases Began. GAO-14-381. Washington, D.C.: March 31, 2014. American Samoa and Commonwealth of the Northern Mariana Islands: Employment, Earnings, and Status of Key Industries Since Minimum Wage Increases Began. GAO-11-956T. Washington, D.C.: September 23, 2011. American Samoa and Commonwealth of the Northern Mariana Islands: Employment, Earnings, and Status of Key Industries Since Minimum Wage Increases Began. GAO-11-427. Washington, D.C.: June 23, 2011. American Samoa and Commonwealth of the Northern Mariana Islands: Wages, Employment, Employer Actions, Earnings, and Worker Views Since Minimum Wage Increases Began. GAO-10-333. Washington, D.C.: April 8, 2010.", "summary": "In 2007, Congress passed legislation that established a schedule of periodic increases that would have raised all minimum wages in American Samoa to the current federal level ($7.25 per hour) by 2016. However, subsequent legislation has postponed or reduced scheduled minimum wage increases. The most recent minimum wage increase in American Samoa occurred on September 30, 2018, but all minimum wages in American Samoa are not scheduled to converge with the current federal level until 2036. Pub. L. No. 111-5, enacted in February 2009, included a provision for GAO to report periodically on the economic impact of minimum wage increases in American Samoa. This report examines (1) economic trends including changes in employment and earnings since the minimum wage increases in American Samoa began in 2007, (2) the status of the tuna canning industry, and (3) stakeholder views on the minimum wage increases. GAO analyzed federal and American Samoa data for 2016 through 2018, and interviewed employers and workers in American Samoa selected on the basis of employment levels, among other criteria. Commenting on a draft of this report, the American Samoa government suggested creating a committee to set minimum wages in the territory and a moratorium on minimum wage increases until the committee is formed. The Department of the Interior suggested GAO conduct further study, including on the use of a committee to set minimum wages. The suggested further study was beyond the scope of this report. American Samoa's economy largely contracted during the past decade. Adjusted for inflation, gross domestic product declined by 18.2 percent from 2007 to 2017, and increased by 2.2 percent in 2018 (see fig.). While American Samoa employment varied by year from 2007 to 2018, workers' inflation-adjusted earnings generally declined. American Samoa's economy continues to depend on the territorial government and tuna canning industry as key sectors. Changes in government spending and the tuna canning industry, including cannery closures, have impacted American Samoa's economy. To reduce the territory's dependence on the government and the tuna canning industry, the American Samoa government continues its efforts to diversify the economy. American Samoa's tuna canning industry faces multiple challenges, including increased competition and minimum wage increases, which led to cannery closures from 2007 to 2018. The companies that experienced the closures explained that minimum wage increases were a factor in the closures, but not a main factor. With the closures, employment of cannery workers decreased but inflation-adjusted earnings of cannery workers who maintained their jobs increased. StarKist Co. now operates the single remaining cannery in American Samoa, StarKist Samoa, but faces financial challenges. In addition to increased competition and labor market challenges, the industry faces other challenges, such as lower wages relative to those in American Samoa for cannery workers in other countries. However, American Samoa offers the tuna canning industry advantages relative to the U.S. mainland and other countries, including lower wages compared to those in the U.S. mainland as well as duty-free access to the U.S. canned tuna market, according to StarKist Samoa officials. The American Samoa government and the American Samoa Chamber of Commerce (the Chamber) view the minimum wage increases as conflicting with sustainable economic development, but employers and workers GAO interviewed noted benefits and challenges presented by minimum wage increases. The government supports setting a minimum wage that the economy can support, while the Chamber supports delaying minimum wage increases for the cannery. Employers and workers GAO interviewed noted a potential positive impact on the livelihood of workers but a potential negative impact on the remaining cannery, among other things.", "document_type": "gao"}
{"report": "In 2017, three major hurricanes made landfall in the United States and historic wildfires struck California. According to FEMA, the 2017 hurricanes and wildfires collectively affected 47 million people—nearly 15 percent of the nation’s population. See figure 1 for a timeline of these major disasters. When disasters hit, state and local entities are typically responsible for disaster response efforts. The Stafford Act establishes a process by which the Governor of the affected state or the Chief Executive of an affected Indian tribal government may request a presidential major disaster declaration to obtain federal assistance. According to the DHS National Response Framework—a guide to how the federal government, states and localities, and other public and private sector institutions should respond to disasters and emergencies—the Secretary of Homeland Security is responsible for ensuring that federal preparedness actions are coordinated to prevent gaps in the federal government’s efforts to respond to all major disasters, among other emergencies. The framework also designates FEMA as the lead agency to coordinate the federal disaster response efforts across 30 federal agencies. The National Response Framework identifies 14 emergency support functions that serve as the federal government’s primary coordinating structure for building, sustaining, and delivering disaster response efforts across more than 30 federal agencies. Each function defines specific mission areas—such as communication, transportation, and energy—and designates a federal department or agency as the coordinating agency. For example, provision of assets and services related to public works and engineering, such as temporary roofing or power, are coordinated by USACE within DOD. See Appendix II for more information about emergency support function responsibilities across the federal government. FEMA’s Response Directorate coordinates disaster response efforts through mission assignments—work orders that it issues to other federal agencies to direct them to utilize their authorities and the resources granted to them under federal law in support of direct assistance to state, local, tribal, and territorial governments. Mission assignments are authorized by the Stafford Act, and agencies may fulfill these assignments through federal contracts. FEMA made 1,515 mission assignments for the 2017 hurricanes and California wildfires, and total obligations for these mission assignments were more than $7.8 billion as of January 2018, according to FEMA. See figure 2 for a depiction of the mission assignment process under a notional scenario of removing derelict marine vessels—boats and ships damaged during a hurricane and that are determined to be inoperable. The National Response Framework states that when an Emergency Support Function is activated in response to an incident, the primary agency for that emergency support function is responsible for executing contracts and procuring goods and services as needed, among other things. For example, DOD and USACE are the coordinators for Emergency Support Function 3—public works and engineering—and as part of this role, these agencies are responsible for emergency contracting support for lifesaving and life-sustaining services. As such, during the 2017 disasters, USACE obligated funds on contracts in support of its assigned mission of public works and engineering by restoring the electrical grid in Puerto Rico following Hurricane Maria and removing debris following the California wildfires. In its role as the lead coordinator of federal disaster response efforts across federal agencies, FEMA’s contracting workforce plays a key role in post-disaster contracts. FEMA’s contracting efforts are supported by its contracting workforce within FEMA’s Office of the Chief Procurement Officer (OCPO). In our prior work, we found that FEMA’s contracting workforce had grown significantly since Hurricane Katrina, but the agency struggled with attrition at times. While the majority of FEMA’s contracting workforce is located in headquarters, contracting officers are also located in each of FEMA’s 10 regional offices. See figure 3 for the location of FEMA’s 10 regional offices as well as the states and territories for which each one is responsible in terms of fulfilling National Response Framework duties. In addition, FEMA can deploy members of its Disaster Acquisition Response Team (DART), a group whose primary purpose is to support contract administration for disasters. There are two DART teams under FEMA’s Expeditionary branch, each comprised of contracting officers, contracting specialists, and quality assurance specialists. Figure 4 shows how FEMA’s contracting workforce is organized. In headquarters, FEMA’s contracting officers support a variety of functions, such as contracting for information technology needs, activities to prepare for and mitigate disasters, and disaster response. In the field, the disaster and field operations division manages contracting for disaster response efforts including: Logistics: delivering goods and services to support disaster survivors and communities, including life-sustaining commodities such as meals, blankets, and electricity generators, Response: coordinating capabilities needed immediately following a disaster, such as air and ground evacuation services and emergency sheltering, and Recovery: primarily supporting rebuilding efforts, including technical assistance programs. Regional contracting officers serve as the first response for contracting if a disaster occurs in their region. During a disaster, the regional offices can request additional contracting support from headquarters if needed. Contracting officers are typically located in each regional office’s mission support division, which provide essential administrative, financial, information technology, and acquisition support for the region. Each region is headed by a Regional Administrator who reports directly to the head of FEMA, the FEMA Administrator. In response to a 2009 DHS Inspector General Report, FEMA created a formal agreement to establish a new role for FEMA’s OCPO to oversee regional contracting staff. The Inspector General report found that regional contracting officers only reported to their respective supervisor in the region—who usually are not contracting officers—with no formal link to FEMA’s OCPO. The Inspector General recommended that only contracting officials should manage the technical performance of contracting officers. The report stated that having the contracting officer’s performance and career advancement controlled by someone who is not a contracting professional was an internal control risk and created a potential conflict-of-interest situation for the contracting officer. A subsequent 2011 agreement between the regions and headquarters states that a FEMA OCPO official will be the contracting officers’ performance reviewer and that the regional supervisors will continue to manage regional contracting officials’ day-to-day activities. As a result, regional contracting officers have a dual reporting chain to both FEMA OCPO in headquarters and to their supervisor within the region. In September 2015, we identified challenges with how the agreement was being implemented, particularly in that it heightened the potential for an environment of competing interests for the regional contracting officers. Specifically, we found that being physically located in a regional office where their regional supervisor is not a contracting professional gave contracting officers less standing to resist requests to perform duties outside of a contracting officer’s responsibilities or to resist pressure from program officials to make certain decisions. Further, we found that FEMA had not updated its 2011 agreement, even though the agreement states that FEMA OCPO and the regions will revisit it each year. We recommended that the FEMA Administrator direct FEMA OCPO and the regional administrators to revisit the 2011 agreement to, among other things, add details about the extent of operational control headquarters and regional supervisors should exercise to minimize potential competing interests experienced by regional contracting officers, and further detail headquarters and regional supervisors’ roles and responsibilities for managing regional contracting officers to improve coordination and communication. We also recommended, and FEMA agreed, that it establish a plan to review this agreement on an annual basis. As of January 2019, FEMA had not implemented these recommendations. After a major disaster is declared, FEMA establishes a joint field office, a temporary office through which it coordinates disaster response and recovery efforts with state and local governments and organizations. Once the need for disaster response and recovery ends and a joint field office is closed, the contracts supporting the disaster are returned to the cognizant regional contracting office. Congress enacted the Post-Katrina Emergency Management Reform Act of 2006 (PKEMRA) after shortcomings were identified in preparation for and response to Hurricane Katrina—one of the largest and most destructive natural disasters in U.S. history, which hit the Gulf Coast in 2005. PKEMRA included several provisions related to contracting, including: Contracting preference for local vendors. PKEMRA amended the Stafford Act to provide a contracting preference for local vendors. Specifically, for contracts or agreements with private entities, the provisions of the act state, in part: in general, for major disaster assistance activities, agencies shall provide a preference, to the extent feasible and practicable, to organizations, firms, and individuals residing or doing business primarily in the area affected by the major disaster or emergency; they may be set aside for local vendors, which means that only vendors residing or primarily doing business in the declared disaster area are allowed to compete for an award; those not awarded to local vendors shall be justified in writing in the contract file. After the enactment of PKEMRA, changes were made to the FAR to implement provisions regarding the award of set-aside contracts to local vendors. Figure 5 displays the steps a contracting officer must take to implement the preference for awarding post-disaster contracts to a local vendor based on related laws and regulation. Use of noncompetitive contracts using the urgency exception. Agencies are generally required to use full and open competition— achieved when all responsible sources are permitted to compete— when awarding contracts. The Competition in Contracting Act of 1984 recognizes that full and open competition is not feasible in all circumstances and authorizes contracting without full and open competition under certain conditions, such as in cases with an unusual and compelling urgency and the government would be seriously injured unless the agency is permitted to limit the number of sources from which it solicits offers (“urgency exception”). When DHS awards disaster contracts non-competitively based on the urgency exception, PKEMRA, as implemented in the Homeland Security Acquisition Regulation, restricts the period of performance to 150 days, unless the Head of Contracting Activity determines that exceptional circumstances apply. For other uses of the urgency exception, the FAR’s period of performance limit is generally no more than one year. Generally, exceptions to full and open competition must be supported by written justifications that contain sufficient facts and rationale to justify use of the specific exception. Depending on the proposed value of the contract, the justifications require review and approval at successively higher approval levels within the agency. Use of advance contracts. PKEMRA requires FEMA to establish advance contracts, which are typically needed to quickly provide life- sustaining goods and services, such as tarps and meals, in the immediate aftermath of disasters. While not required under PKEMRA, USACE also establishes advance contracts for supplies and services (e.g., generators for its temporary power mission) using its independent statutory authorities for emergency management, such as Section 5 of the Flood Control Act of 1941. In addition, DLA has an interagency agreement with FEMA to provide disaster commodities and services, including fuel. As such, DLA also has some advance contracts in place. In December 2018, we found that FEMA and USACE were the primary users of advance contracts. As of June 30, 2018, federal agencies obligated at least $5 billion through post-disaster contracts to support disaster response and recovery efforts after hurricanes Harvey, Irma, and Maria and the 2017 California wildfires. USACE and FEMA awarded over three quarters of the reported obligations on post-disaster contracts. However, data on post-disaster contracting are not comprehensive due to changes in the criteria for establishing and closing a NIA code and DHS’s inconsistent implementation of the criteria for closing codes. Specifically, we found DHS closed the codes for Hurricanes Harvey and Irma less than a year after the storms hit, compared to prior hurricanes when the NIA codes remained open for at least 5 years. As of June 30, 2018, federal agencies obligated at least $5 billion through post-disaster contracts in response to the three 2017 hurricanes and the California wildfires. Data on obligations for the California wildfires are limited to those contracts identified by two selected agencies in our review—FEMA and USACE—because no NIA code was established in FPDS-NG to track contracts specifically for the wildfire events at a government-wide level. The obligations on post-disaster contracts accounted for more than half of the $9.5 billion in contract obligations on contracts related to the three hurricanes and the 2017 California wildfires, with the remainder of the dollars obligated on advance contracts. See figure 6 for details on post-disaster and advance contract obligations by event. FEMA and USACE accounted for more than three quarters of the total obligations on post-disaster contracts for the three hurricanes. Because there was no NIA code for the 2017 California wildfires, we cannot identify government-wide obligations in FPDS-NG and, therefore, do not know which agencies had the highest contract obligations for the two wildfire events. Figure 7 provides details on known obligations on post-disaster contracts, by agency. About 63 percent of the obligations on post-disaster contracts, or $3.1 billion, was for services. See figure 8 for a breakdown of services and products by 2017 disaster. Five services across the 2017 disasters comprised nearly 80 percent of total obligations for services on post-disaster contracts. Contracts for repair and maintenance services comprised 38 percent of total obligations on post-disaster contracts for services, largely driven by the $1 billion obligated to support the power restoration effort in Puerto Rico following Hurricane Maria. Following Hurricanes Harvey and Irma, agencies primarily awarded post-disaster contracts for management support functions, such as call center services. See figure 9 for the top post- disaster contract services across the three hurricanes and the California wildfires. Of the $1.8 billion agencies obligated on goods through post-disaster contracts, 28 percent was on contracts for subsistence, such as food and water. Nearly 30 percent, or more than $530 million, of all obligations on post-disaster contracts for goods was on contracts for electric wire and power distribution equipment, almost all of which was for the power mission in Puerto Rico following Hurricane Maria. See Figure 10. Across all three hurricanes and the California wildfires, we found that the competition rate—the percentage of total obligations reported under competitive contracts—was about 75 percent for post-disaster contracts. This is an increase from the past since we previously found that the competition rate in the immediate aftermath of Hurricane Katrina was about 53 percent. Contracting for disaster relief and recovery efforts presents unique circumstances in which to solicit, award, and administer contracts. Under the FAR, agencies are generally required to use full and open competition when soliciting offers, with some exceptions. As discussed earlier, an agency may award a contract without full and open competition, for example when the need for goods and services is of such an unusual and compelling urgency that the federal government faces the risk of serious financial or other type of loss, unless the agency is permitted to limit the number of sources from which it solicits offers (“urgency exception”). When using the urgency exception, the FAR requires agencies to request offers from as many potential sources as practicable. Based on FPDS-NG data, we found that about 47 percent of obligations on post-disaster contracts were on contracts citing the urgency exception, with 63 percent of those obligations on contracts coded in FPDS-NG as using “limited competition.” Among our selected contracts, we also found that contracting officers implemented the urgency exception to seek offers from as many sources as possible in different ways. Of the 11 contracts in our sample that cited the urgency exception, five included abbreviated award time frames in the justification documentation. The full extent of disaster contracting—for both advance and post- disaster contracts—related to the 2017 disasters is unknown due to changes in the criteria for establishing and closing a NIA code in FPDS- NG and DHS’s inconsistent implementation of the updated criteria for closing codes. The NIA code data element in FPDS-NG was established following landfall of several major hurricanes in 2005 to enable consistent tracking of emergency or contingency-related contracting. Contracting officers select the applicable NIA code in FPDS-NG when entering related contract information into the system. Officials at GSA—the agency responsible for operating and maintaining FPDS-NG—stated there is little to no cost or administrative burden associated with establishing or maintaining a NIA code. Based on a memorandum of agreement (the agreement), GSA, DHS, and DOD are jointly responsible for determining when a NIA code should be established and closed. DHS delegated its role, on behalf of civilian agencies for disaster or emergency events, to its Office of the Chief Procurement Officer (DHS OCPO), and DOD, on behalf of military departments and defense agencies for contingency operations, delegated its role to the Defense Contract and Pricing office. The agreement outlines criteria DHS and DOD should consider in making determinations to establish and close a NIA code. We identified changes in the criteria for establishing and closing a NIA code between a June 2012 agreement and a June 2018 update that superseded and replaced it. According to DHS OCPO officials, the agencies updated the agreement to incorporate lessons learned (such as adding that events should have a procurement impact as criteria for establishing a NIA code), and because it had not been revisited in 6 years. See table 2 for criteria from the agreements, changes in 2018, and examples of potential implications of those changes that we identified related to emergency or disaster events. The June 8, 2012 agreement criteria applied to the establishment of NIA codes for the 2017 disasters, while the June 1, 2018 updates applied to determinations to close or extend the NIA codes after this date for the 2017 disasters. DHS OCPO requested that a NIA code be established for each of the 2017 major hurricanes (Harvey, Irma, and Maria). However, the codes for Harvey and Irma closed on June 30, 2018, less than a full year after the hurricanes hit. The code for Maria was scheduled to close on December 15, 2018, and in August 2018 we began raising questions about the planned or actual NIA code closures for the three 2017 hurricanes. Since December 2018, DHS OCPO provided two additional extensions for Maria, with the code now valid through June 15, 2019, about 21 months after that hurricane made landfall. In contrast, the NIA code for Hurricane Sandy, which made landfall in October 2012, remained open until December 2017, more than 5 years after the disaster. The NIA code for Hurricane Katrina, which made landfall in August 2005, remained open until August 2018, 13 years after the disaster. We observed that DHS OCPO requested NIA codes for Hurricanes Florence and Michael in 2018, although we did not review the data associated with those events. After we sent this report to the agencies for comment on February 15, 2019, the agencies allowed the codes for Florence and Michael to expire, on March 15, 2019 and April 12, 2019, respectively. DHS OCPO officials offered several different rationales to support their decision to close the NIA codes for the 2017 hurricanes and cited the changes to the criteria in the 2018 agreement for closing the codes. However, we found that these rationales were inconsistent with the criteria in the agreement, did not consider key user needs, and did not fully explain the decisions to close these codes. For example: DHS OCPO officials told us that NIA codes for disasters should be closed when agencies no longer use the special emergency procurement authority such that the procurement thresholds—such as the simplified acquisition and micro purchase thresholds—return to the general (non-emergency) procurement thresholds in the FAR. Further, when FEMA requested to keep the codes open, DHS OCPO questioned why agencies would need to continue tracking with a NIA code after the thresholds had returned to general procurement thresholds. DHS officials stated that the updated agreement put an emphasis on this criterion; however, our analysis indicated that was not consistent with 2018 agreement, which includes multiple criteria and is not limited to this factor. Further, the agreement does not provide additional emphasis on one criterion over others. DHS OCPO officials stated that the purpose of the NIA code is to track federal procurement related to response, not recovery efforts. However, both the 2012 and 2018 agreements specifically state that the NIA code is intended to track disaster response and recovery efforts. Further, according to the National Response Framework and National Disaster Recovery Framework, we found that there are no clear lines of distinction between the start and end date of these two efforts, and often these stages of the process overlap. Additionally, FEMA officials from the Recovery Support Function Leadership Group’s Program Management Office stated that they use the NIA code to track government-wide contracting related to recovery efforts. The Recovery Support Function Leadership Group, an interagency body chaired by FEMA, tasked the Program Management Office with providing accountability and transparency of projects and outcomes for the 2017 disasters, among other things. DHS OCPO officials pointed to the Digital Accountability and Transparency Act of 2014 as providing alternatives to FPDS-NG. The Digital Accountability and Transparency Act of 2014 required improvements in the quality of data on federal spending, including disaster spending, by making data more accessible and transparent, such as by improving the quality of data submitted by federal agencies to USASpending—an online tool that tracks federal grant, loan, contract, and other awards. However, we found that USASpending provided some information on contract obligations using disaster response and recovery funds but does not separate obligations by disaster event. Further, our prior work on the Digital Accountability and Transparency Act of 2014 has found limitations with the data agencies provide, notably the completeness and accuracy of data. Specifically, we found that agencies routinely provided award descriptions in an abbreviated way and lacked clarity needed to compare data across the federal government. Moreover, we found inconsistencies in agencies’ ability to track contract actions by disaster. While FEMA has the capacity to provide contract information by disaster through a centralized contract tracking tool, USACE officials stated that they use a decentralized tracking process where they reach out to the districts and centers to identify and track disaster contracts without a NIA code. Prior to the June 30, 2018 decision to close the NIA codes for Harvey and Irma, DHS OCPO officials told us they found that the number of actions FEMA was making for these events had decreased. Our analysis of the NIA codes showed that components across ten departments, including within DHS and DOD, were executing contracts related to Harvey and Irma in June 2018. When we requested supporting documentation and analysis, DHS OCPO officials provided some correspondence with FEMA but did not provide government-wide data analysis to identify what other agencies were awarding and executing contracts related to these events. DHS OCPO officials stated they also sought input from DOD through the Defense Pricing and Contracting Office on whether to keep the codes open. According to DHS officials, DOD deferred to DHS on the decision because DHS was responsible for establishing the codes. Further, DOD officials did not provide evidence that would allow us to determine whether they assessed which defense components were executing contracts related to these events or sought the input of the components that were doing so, such as USACE and the Navy. FPDS-NG—a public, government-wide database of federal procurements—offers a resource the federal government can use to create recurring and special reports for key users, such as the President, Congress, executive agencies, and the general public. The NIA code in FPDS-NG provides consistent tracking and government-wide visibility into contracting related to disaster events through a publicly available database. Without clear criteria for establishing and closing NIA codes that consider the needs of data providers and users, such as FEMA, and the high visibility of the event being tracked and a mechanism to ensure consistent implementation of these criteria, insight into disaster contracting may be limited. Additionally, federal internal control standards state that management should use quality information, communicate quality information internally, and communicate quality information externally to achieve objectives. Management should accomplish this by considering appropriate methods for communicating externally, such as to the President, Congress, and the general public. As noted above, the 2018 agreement no longer includes the 2012 criteria that a NIA code can be closed if the NIA no longer has high visibility and there is no other interest in the NIA code. In our discussions with officials, DHS OCPO could not provide a rationale for these changes and the rationale is also not included in the updated agreement. Prior to DHS OCPO’s decision to close the codes for Hurricanes Harvey and Irma, a senior FEMA procurement official requested that they remain open, in part because of the high visibility of these events. As such, this official stated that there will be continued interest in the 2017 hurricanes including inquiries from Congress, which will require agency officials to pull data for interested parties, as that data can no longer be tracked and identified through public databases, such as FPDS-NG and USASpending. DHS OCPO officials denied FEMA’s request, pointing to the criteria in the 2018 agreement, which does not include consideration of the visibility of the event or key user needs. As the federal agency responsible for coordinating disaster response and recovery, FEMA is well positioned to understand the level of national and political interest in tracking procurement information for a disaster or emergency event. Yet, it is unclear why neither the 2012 nor the updated 2018 agreements included a role for or consideration of key users, such as FEMA and Congress. Further, as noted above, FEMA program officials expressed concern over closing the Harvey and Irma codes because they had planned to use the codes to assess recovery efforts for the 2017 disasters. As we have previously reported, it can take years to fully account for federal contract obligations related to response and recovery after a hurricane. Once a NIA code is closed, there is no publicly available, government-wide system to track contract obligations for specific events. Moreover, DHS OCPO officials were unable to provide data analysis conducted using available data from prior events to determine historical patterns in federal contracting obligations for disasters prior to closing the codes for Hurricanes Harvey and Irma. Figure 11 illustrates the lack of insight we have into disaster contracting activities related to the 2017 hurricanes, in comparison to what we know about prior storms with high federal procurement obligations. Further, using the description field in FPDS-NG, we found that between July 1 and September 30, 2018, after the NIA codes were closed, agencies obligated at least $136 million on contracts for Hurricane Harvey and $123 million on contracts for Hurricane Irma. While this provides some important insights regarding the continued contracting activity related to these hurricanes, the description field in FPDS-NG cannot be relied on to provide a full picture. Some agencies may include event- specific information in the description field; however, we found that, for the 2017 hurricanes, about 65 percent of contract obligations linked to a NIA code did not include event-specific information in the description. Without reopening the NIA codes for Hurricanes Harvey and Irma, and, to the extent practicable, retroactively populating the NIA codes for contract actions supporting response and recovery for these hurricanes during the period they were closed, decision makers are missing important information to understand the procurement impact of these disasters. Retroactively entering NIA code information is not unprecedented. For example, based on our analysis, the NIA codes for the 2005 hurricanes were established in October 2005, and contracting officers retroactively entered data for contracts related to these events which occurred as early as August of that year to enable full insight into contracting for these disasters. Based on the contracts we reviewed and officials we spoke with responsible for the planning of these contracts, we found that agencies experienced challenges planning for post-disaster contracts, especially when it came to contracting with local vendors. Additionally, FEMA also experienced challenges with requirements development—in that program officials did not always provide well-defined or sufficiently specific requirements for post-disaster contracts. However, FEMA has taken steps to address its challenges with requirements development, but it is too soon to tell the extent to which these steps will address the challenges we identified. Steps to Implement Local Vendor Preference, as Outlined in the Post-Katrina Emergency Management Reform Act and the Federal Acquisition Regulation (FAR) Step 1: Identify the set-aside area in accordance with FAR § 26.202-1—Local Area Set-Aside and § 6.208—Set-asides for Local Firms During a Major Disaster or Emergency Step 2: Conduct market research to determine whether there are qualified vendors in the set-aside area. Step 3: Issue a solicitation that provides for local vendor preference to the extent feasible and practicable either through the use of a set-aside or an evaluation preference. Step 4: Review offers based on evaluation criteria in the solicitation. If using a local area set-aside, review information from potential vendors to determine if they reside or primarily do business in the set-aside area in accordance with FAR § 52.226-3—Disaster or Emergency Area Representation. Step 5: Award contract to qualified vendor. If the vendor selected is not local or no qualified vendors are in the set-aside area, justify the decision in writing. determine that a vendor resides or primarily does business in the local justify in writing awards that they made to vendors outside the set- aside area. For the contracts we reviewed, contracting officials at FEMA correctly identified the local area for six set-aside contracts across the three hurricanes, and USACE correctly identified the local area for two set- aside contracts in Puerto Rico. However, based on the interviews we conducted during our review, USACE contracting officials were not consistently aware of the specific regulation for doing so and did not correctly identify the local area for two other USACE contracts awarded in support of the California wildfires. When awarding a local area set-aside or using an evaluation preference for local vendors, FAR § 26.202-1 states that a major disaster area can span several counties in several contiguous states, but need not include all the counties in the disaster area, and cannot extend beyond the counties designated in a Presidential disaster declaration. Figure 12 provides an example of a disaster declaration that depicts which counties could be included in the set-aside area. For all six local area set-aside FEMA contracts—awarded in response to Hurricanes Harvey, Irma, and Maria—we reviewed, FEMA officials defined the local area in accordance with regulation. This was an improvement from what we previously found. Specifically, in 2015, we found that FEMA contracting officers were confused about the definition of the set-aside area and recommended that the FEMA Administrator provide new or updated guidance to ensure all contracting officers are aware of requirements concerning contracting with local vendors, among other things. DHS concurred, and FEMA updated its annual disaster contracting webinar training to reiterate the requirement and clarify how to determine the geographic area using the disaster declaration. For the two local area set-aside USACE contracts awarded, officials responsible for those contracts told us that when awarding these contracts, they were not aware of the regulatory requirements for defining the geographic area of the local area set-aside. However, as the presidential disaster declaration for Hurricane Maria included the entire island of Puerto Rico, the local set-aside area covered the entire island. As a result, officials met the set-aside area requirement in accordance with regulation, even though they noted that they were not familiar with the requirement at the time. Officials told us they became aware of the regulation after conducting research pursuant to a protest related to the use of local vendor preference. We also reviewed two other USACE contracts that were used to support the debris removal mission following the California wildfires. Contracting officials stated that they conducted market research on the availability of local contractors, and they ultimately did not find qualified local firms. However, based on a review of contract file documentation, we found that USACE officials did not identify the local area in accordance with regulation for these contracts. Instead they used congressional districts that overlapped with impacted areas to identify the local area. We found that the areas USACE identified included areas outside of the geographic area defined by the presidential disaster declaration for the California wildfires. Contracting officials responsible for these debris removal contracts stated they were not aware of a policy or regulation for how to identify the geographic area for a local area set-aside, but that their office had internally determined the use of congressional districts impacted by a disaster to be the preferred method. A senior USACE official told us that there is no agency supplemental guidance or related training regarding the use of local vendor preference for contracts supporting disaster recovery and response, only that they expect USACE contracting officials to comply with the FAR. Without additional guidance or related training, contracting officers may be unaware of how to define the geographic area for a local area-set aside in accordance with regulation and may miss opportunities to support improving the local economies of disaster impacted areas by giving preference in awarding contracts to local vendors to the extent feasible and practicable, per the Stafford Act. Despite contracting officers having a high degree of discretion to determine that an offeror qualifies as a “local firm,”—that is, a firm that resides or primarily does business in the designated set-aside area— contracting and legal officials at both FEMA and USACE told us they were unsure what or how much information is sufficient to determine that an offeror qualifies as a local firm under the FAR. After contracting officials have identified the geographic boundaries of the local “major disaster or emergency area” and included required clauses in the solicitation and issued it as a local area set-aside, offerors must represent in their offer that they reside or primarily do business in the set-aside area. Specifically, FAR § 52.226-3(c) outlines two criteria a contracting officer should use to determine whether an offeror is to be considered “local.” If an offeror does not meet these first two criteria, FAR § 52.226- 3(d) provides eight additional criteria contracting officers may consider to make this determination (see sidebar). under FAR § 52.226-3(c) An offeror is considered to reside or primarily do business in the set-aside area if, during the last 12 months, 1) the offeror had its main operating office in the area; and 2) that office generated at least half of the offeror’s gross revenues and employed at least half of the offeror’s permanent employees. If the offeror does not meet the criteria under FAR § 52.226-3(c) consider other factors listed in FAR § 52.226-3(d) including: 1) Physical location(s) of the offeror’s permanent office(s) and date any office in the set-aside area(s) was established; 2) Current state licenses; 3) Record of past work in the set-aside area(s); 4) Contractual history the offeror has had with subcontractors and/or suppliers in the set-aside area; 5) Percentage of the offeror’s gross revenues attributable to work performed in the set-aside area; 6) Number of permanent employees the offeror employs in the set-aside area; 7) Membership in local and state organizations in the set-aside area; and 8) Other evidence that establishes the offeror resides or primarily does business in the set-aside area. Of the eight local area set-aside contracts we reviewed, two were impacted by bid protests—which is when an offeror challenges an award or proposed award of a contract or a solicitation—related to the FAR criteria for determining that an offeror qualifies as a local firm. The following protests show examples of the criteria agencies reviewed to determine whether a firm resided or primarily did business in a set-aside area. FEMA contract for food: In a protest of the award of a contract for food on the basis that FEMA improperly determined the protester failed to meet the requirements in FAR§ 52.226-3(d), the protester stated it met the requirements of FAR § 52.226-3(d), because it had (1) done past work in the set-aside area; (2) maintained a warehouse in the set-aside area; (3) maintained a contractual history with subcontractors in the set-aside area; and (4) maintained a current state license and filed a franchise tax return. FEMA denied, the protest stating that the evidence the protester provided was not sufficient to qualify as “residing or primarily doing business” in the local area. USACE Blue Roof contract: To support the Blue Roof mission— which provides temporary blue plastic roofs for disaster-impacted residences to prevent further damage and allow homeowners to arrange for permanent repairs—following Hurricane Maria in Puerto Rico, contracting officials awarded two post-disaster contracts. In a protest of the awards filed with GAO, the protestor argued, among other things, that one of the awardees did not meet local firm criteria in FAR § 52.226-3(c). USACE had assessed information on the awardee, including its local business address in the System of Award Management and other documentation of prior work in Puerto Rico, prior to award and determined that the awardee met Stafford Act criteria for award to a local vendor. USACE officials told us that, after the protest was filed, they further assessed information on the awardee in question and determined that it was a subsidiary of a larger national company. According to USACE officials, in order to quickly continue work on the Blue Roof mission, which had increased in scale, USACE negotiated pricing with the protestor while the protest was ongoing and made a third award under the solicitation. The protestor withdrew the protest. Contracting and legal officials at FEMA and USACE described difficulty in determining whether a vendor resides or primarily does business in the local set-aside area and cited a lack of clarity and different interpretations of the FAR. Based on conversations with the agencies’ legal officials, we found that USACE and FEMA applied the eight criteria in FAR § 52.226- 3(d) differently. FEMA officials told us that in determining whether a firm is local, if the first two criteria are not met, they evaluate an offeror’s information related to the eight criteria in FAR §52.226-3(d) to see if the first two criteria can be met with this additional information. They added that they look to see if the firm’s main operating office is in the set-aside area and if that office generated at least half of the offeror’s gross revenues and employed at least half of its permanent employees, but stated that the eight criteria do not need to be met within the last 12 months. Alternatively, USACE officials told us that in determining if a firm is local, if the first two criteria are not met, they evaluate an offeror’s information against the eight criteria in FAR § 52.226-3(d) independent of the two criteria described under FAR § 52.226-3(c). Legal officials at both USACE and FEMA stated that the FAR criteria should be clarified. Further, agencies’ varying application of the criteria increases the risk that an offeror may be considered local by some agencies, but not others. FEMA legal officials told us that contracting officers have been instructed to ask offerors for information on a local firm status in post-disaster solicitations. USACE legal officials explained that it is not always clear what specific information or documents provide the necessary information to meet the criteria under FAR § 52.226-3. For example, it may not be clear what documentation adequately demonstrates the number of permanent employees the offeror employs in the set-aside area, or the percentage of the offeror’s gross revenue earned in the set-aside area. The Office of Federal Procurement Policy provides overall direction of government-wide procurement policies, regulations, procedures, and forms for executive agencies. However, Office of Federal Procurement Policy staff told us that they have not provided additional guidance or clarification related to this FAR clause. Federal internal control standards state that management should use quality information to achieve objectives. Management should accomplish this by identifying information requirements, collecting relevant data from reliable sources, and processing data into quality information to be communicated internally and externally. Without clarifying guidance, contracting and legal officials will likely continue to have varying interpretations on how to implement the FAR criteria for determining that an offeror qualifies as a local firm. When contracts for major disaster or emergency assistance activities are not awarded to local vendors, the Stafford Act, as implemented in the FAR, requires that the decision be justified in writing in the contract file. Contracting officers at three of the four agencies included in our review— FEMA, USACE, and the Coast Guard—did not consistently justify in writing the award of selected contracts to non-local vendors. Specifically, 12 of the 14 contracts in our review that were not awarded to local vendors did not contain the required written justifications in the files (see table 3). DLA included written justifications for the use of non-local vendors, as required. After the 2017 disasters, FEMA identified the absence of justifications for the use of non-local vendors as an area for improvement. According to FEMA officials, they subsequently released guidance and a pre-solicitation memorandum to assist contracting officers in identifying what documentation related to local vendor preference is required in a contract file. FEMA officials told us they expect these steps will improve compliance with the requirement to document the justification for using non-local vendors going forward. While the Coast Guard provided a memorandum ahead of the 2017 disaster response that addressed the use of local vendors, it did not reference the requirement under the Stafford Act, as implemented in the FAR, to justify in writing the use of non-local vendors. A senior USACE official told us the agency had not issued any guidance to address requirements for contracting with local vendors and was not aware of any guidance issued at the department level. USACE legal officials noted the lack of written justification may be due to abbreviated timeframes under which post-disaster contracts are awarded. However, we found that USACE contracts included consolidated justification documents outlining rationales for the use of limited competition or abbreviated solicitation timeframes, but they did not include justifications for the use of non-local vendors. Without additional guidance or tools, contracting officials may not be aware that they are required to include written justifications for the use of non-local vendors in contract files, and federal agencies are at risk of not complying with the Stafford Act requirement to do so. Contracting officers responsible for the FEMA contracts we selected and senior procurement officials stated that during disaster response they received post-disaster requirements packages that were lacking in technical specificity or were otherwise deficient, but FEMA has begun to address this challenge. Program officials communicate contract requirements to contracting officers through requirements documents that include, among other items, a statement of work describing goods or services to be provided by an offeror, market research, and an independent government cost estimate. Contracting officials explained that when they received deficient documents, they had to conduct additional work to refine the requirements before soliciting for the contract—such as spending time assisting program officials to develop the required documentation. This additional work may add time to already tight award time frames for post-disaster contracts. When compared to large dollar value acquisitions, post-disaster contracts are awarded on significantly abbreviated time frames. For example, among the 12 FEMA contracts we assessed, time frames between the submission of a resource request and award date ranged from 1-26 days. This is faster than suggested; FEMA’s Procurement Administrative Lead Time guidance suggests preparation time frames of 60-300 days for new procurements based on the nature and value of an action. We found instances where FEMA program offices provided inaccurate or untimely estimates of the quantities of goods or services needed for the contracts we reviewed, in some cases leading to additional time and efforts spent to meet the need. For example: After Hurricane Harvey, FEMA awarded contracts to supply a food bank. Officials told us the initial requirement from the food bank through the program office to the contracting officer was expressed in terms of “truck loads” but did not specify, for example, how large the truck should be, or how many pallets should be loaded per truck. FEMA ultimately awarded three contracts to meet the post-disaster need—the first contract had a period of performance of 4 days and, according to FEMA officials, was intended to meet initial needs for food while the program and contracting officials determined the full scope of the requirement. The second contract—a $37 million contract with a period of performance of 52 days—was intended to fulfill the remaining requirement. However, due to miscommunication of the requirement as documented in the contract files and according to a program official responsible for the contracts, FEMA needed to award a third contract for an additional 2.5 months and $23 million to meet the need. Due to the value of the contracts, FEMA deemed that the subsequent contract required a new solicitation and award, rather than a modification to the existing contracts, thereby increasing the time and effort required of procurement personnel to meet the post- disaster need for food. In response to Hurricane Maria, FEMA awarded four post-disaster contracts for self-help tarps—which are used to cover small areas of roof damage. Of these contracts, two were terminated for convenience, both of which were included in our sample. The terminations were due in part to a national supply shortage. FEMA officials told us that under one of the contracts included in our review, at the request of the Commonwealth of Puerto Rico through program officials, FEMA ordered 500,000 40-foot-by-40-foot tarps, which differ from the size of the tarps normally ordered and stocked by the agency. Due to the supply shortage, FEMA received none, but officials noted that the impact of not receiving the tarps was minimal because the agency had initially overestimated the total number of tarps needed. Since the 2017 disasters, FEMA has started to address the issues with requirements development. Specifically, in 2018, FEMA officials told us the agency used portfolio managers in the field to assist with developing requirements for disaster response. Previously, in 2017, portfolio managers told us they supported the National Response Coordination Center but did not deploy to the disasters. Organizationally housed within FEMA’s OCPO, portfolio managers we spoke with told us they provide general templates for and guidance on acquisition documents for program officials to use and are primarily responsible for supporting steady-state acquisitions included in FEMA’s Master Acquisition Planning Schedule. Additionally, portfolio managers told us they provide informal, optional, “brown bag” training sessions for program officials. FEMA OCPO officials told us that they receive more requests for portfolio manager assistance than they can support, as the portfolio management section only maintains up to six staff. FEMA OCPO officials noted, however, that the agency expected to award an acquisition support contract to expand portfolio management capabilities. While the use of portfolio managers is an important step, it is too soon to tell the extent to which the use of portfolio managers in the field will address FEMA’s challenges with requirements development for post-disaster contracts. The agencies we reviewed each have a process for identifying lessons learned following a disaster, and we found they used these processes for the 2017 disasters. While agencies have identified actions they plan to take in response to the lessons they found following the 2017 disasters, additional challenges remain. Specifically, the agencies in our review encountered interagency contracting coordination challenges during the mission assignment process. Further, FEMA identified disaster contracting workforce shortages. FEMA, USACE, Coast Guard, and DLA each have processes for identifying lessons learned within their agencies through after-action reports. These reports identify lessons learned and areas for improvement and may be completed following a training exercise or a real-world event. Through these processes, agencies identified lessons learned during the 2017 disasters. Table 4 lays out each agency’s practice or requirement for identifying lessons learned and key findings— those related to contracting and mission assignments during the 2017 disasters. FEMA has also taken steps to identify interagency lessons learned by leading the Emergency Support Function Leadership Group and developing a mechanism to regularly report to the Secretary of Homeland Security. This group consists of the national emergency support function coordinators from each of the functions (such as transportation and firefighting), along with FEMA headquarters and regional officials. This body of senior officials is tasked with coordinating responsibilities and resolving operational and preparedness issues relating to interagency response activities in support of the National Response Framework. According to its charter, the group is required to carry out post-incident and after-exercise critiques, and perform substantive reviews of after- action reports, with recommendations for federal interagency partners to address shortfalls. Following the 2017 disasters, in May 2018, the Emergency Support Function Leadership Group identified 19 corrective actions, including improvements to mission assignment submission documents. Federal internal control standards state that communicating internally is key to an entity achieving its objectives. Further, as part of this communication, management should receive quality information about the entity’s operational processes that flows up the reporting lines from personnel to help management achieve the entity’s objectives. FEMA officials stated that there are processes, such as data calls, in place to solicit input from agencies. However, we noted, and FEMA officials agreed, that there is no formal reporting mechanism to the leadership group, and that it is up to the representatives from these agencies to raise issues for the group’s consideration. However, this is not consistently happening within the Coast Guard because it does not have a formal reporting process for soliciting input from officials directly involved in responding to these disasters to share with the Emergency Support Function Leadership Group. Coast Guard officials stated that they actively collect input during and immediately after an event or incident response, and that Coast Guard responders are able to provide input and issues through their chain of command at any time, but there is no formal process for reporting to the interagency group. During the course of our review, USACE officials did not provide information that indicated they had a formal reporting process for soliciting input from officials directly involved in responding to these disasters to share with the Emergency Support Function Leadership Group. Some senior level USACE officials responsible for the agency’s public works and engineering mission stated that they were unsure of the process for raising concerns to the Emergency Support Function Leadership Group and that officials were sometimes hesitant to raise issues to the group. However, in response to our draft report, USACE stated it has a formal process called the USACE Remedial Action Program for soliciting input from officials directly involved in the agency’s response and recovery following a disaster. As discussed later, we will follow up with USACE as part of our recommendation follow-up process. While Emergency Support Function Leadership Group member agencies may raise issues to the group, additional opportunities exist within these agencies to enhance the lines of communication from responders to the senior officials that comprise this leadership group. For example, some of the interagency challenges we identified in our review were not identified by this group, such as challenges in managing state and local expectations of federal response, which is discussed in more detail below. Also, USACE officials told us that some of the interagency challenges they cited following the 2017 disasters related to the mission assignment process were still present during the response to Hurricane Florence, which struck the Carolina coast in 2018. Formal processes for Emergency Support Function agencies—such as the Coast Guard and USACE—to solicit and share input from officials directly involved in the response and recovery efforts would help ensure the Emergency Support Function Leadership Group does not miss additional opportunities to improve disaster response. As the federal disaster coordinator, FEMA obtains requirements from states and localities and tasks the appropriate federal agencies, based on their emergency support function, through the mission assignment process. The agency assigned to a specific mission is then responsible for fulfilling those requirements, and may use contracts to do so. For example, the Coast Guard fulfills its pollution mitigation mission by executing contracts, and utilizes its own workforce to execute its search and rescue mission. USACE officials we spoke with raised concerns about the mission assignment process for the debris removal and power restoration missions related to the 2017 disasters. Specifically, USACE officials noted concerns about coordination between state, local, and federal partners for the contracts we reviewed. USACE debris removal mission: In December 2018, we found that USACE and California state officials reported different expectations related to USACE’s debris removal contracts following the wildfires, such as what structures would be removed from private properties and what levels of soil contamination would be acceptable. USACE removed more than 2.2 million tons of debris from more than 4,500 properties following the northern California wildfires. Due to the size and scope of this mission, USACE used both its advance contracts and additional post-disaster contracts for debris removal. According to USACE officials, they relied on FEMA, the lead for coordinating federal disaster response, to manage communication with states and localities and to identify and manage expectations about the scope of work to be performed using their debris removal contracts. USACE officials cited challenges with communicating to state and local officials what the agency was permitted to do under its mission assignment. For example, USACE officials told us that local officials believed that USACE would replace soil removed as part of its debris removal efforts; however, this was not part of the mission assignment from FEMA. Further, officials added that different environmental standards created confusion regarding what types of soil should be removed. For example, Napa County officials said that USACE’s mission required them to ensure that no contaminated soil remained on the properties, without regard for the naturally occurring levels of arsenic and asbestos in Napa area soil. As a result, Napa County officials said that USACE removed more soil than was necessary. However, following discussions with Napa County officials, USACE obtained site-specific samples from some properties to understand pre-existing contamination levels prior to further debris removal. USACE power restoration mission: Hurricane Maria destroyed much of the electricity grid in Puerto Rico, leaving millions without power and resulting in the longest blackout in U.S. history. To restore power to its 3.3 million people, Puerto Rico requested federal assistance with its power grid. To coordinate this effort across all stakeholders, FEMA established a unified command structure—which included the federal agencies, the Puerto Rican government and its contractors, and utility companies providing mutual assistance. According to FEMA officials, this structure allowed stakeholders to target priority work, ensure crews could access the work areas, and identify the needed materials. USACE officials stated that they received direction from FEMA and had limited direct interaction with Puerto Rican officials. However, despite this structure, USACE officials noted that changing direction from FEMA contributed to inefficiencies in contract management. For example, the scope of power restoration work Puerto Rico was requesting changed several times—such as from transmission work to distribution. These changes necessitated adjustments in contractor workforce configurations and contributed to idle time and equipment, according to officials. FEMA’s mission assignment policy designates a Federal Disaster Recovery Coordinator as the person responsible for facilitating disaster recovery coordination and collaboration among federal, state, local, tribal, and territorial governments; the private sector; and voluntary, faith-based, and community organizations. However, neither FEMA’s mission assignment policy nor its guide—which provides guidance on how to open and close mission assignments—provide additional details on how that coordination is to take place. Further, FEMA’s Response Directorate—the office that oversees the mission assignment process— was unable to identify at what level this coordination should occur. USACE and Coast Guard officials also noted that the mission assignment process does not account for other contracting considerations, such as demobilization, which occurs when contractor personnel leave the work site and return to their headquarters. According to USACE and Coast Guard officials, demobilization is required to be completed by the end of the contract’s period of performance; therefore, contracting officers need to know when the mission will end so that they can build adequate time for demobilization into the contract. Coast Guard pollution mitigation mission: Under this mission, the Coast Guard is responsible for responding to threats to public health, welfare, or the environment caused by actual or potential oil and hazardous materials incidents. Coast Guard officials told us that mission timing and the length of requirements were not communicated by FEMA in a timely manner. They told us that they contacted FEMA multiple times to determine if its mission assignment would be continued, but they did not receive an answer until shortly before the end of a contract’s period of performance. As a result, officials told us they were unsure whether they would need to demobilize contractors before completing the work, which created uncertainty about the availability of subcontractors. A FEMA Response Directorate official stated that these issues are coordination and planning concerns that should be worked out in advance between FEMA and the mission assigned agency. Ultimately, FEMA extended the Coast Guard’s mission assignment for pollution mitigation following Hurricane Maria four times. Figure 13 depicts the number of times Coast Guard’s mission was extended by FEMA. USACE power restoration mission: USACE officials cited similar challenges during the power restoration mission in Puerto Rico following Hurricane Maria. For example, USACE officials stated they typically begin planning for demobilization as soon as a mission begins. However, in this instance, officials did not know the eventual end date in order to plan for demobilization activities. Officials added that demobilization may take about 30 days, but USACE cannot extend contracts or obligate funds without a FEMA mission assignment extension. For example, if the mission assignment is scheduled to end on June 30, contracting officials would need to direct the contractor to begin demobilization as early as May 31. Officials stated that a mission assignment extension or option period of 30 days beyond the anticipated mission end date would facilitate demobilization and reduce any undue burden or concern around demobilization efforts. FEMA’s mission assignment guide does not provide a process or mechanism to follow up on the status of a mission once it is assigned. A FEMA official stated that the Response Directorate is responsible for informing their leadership of expiring mission assignments and contacting the mission-assigned agency to make them aware of the impending expiration, but that there is no standard time frame for doing so. Further, the official stated that, in some cases, FEMA may be performing this work a few days before a mission is set to expire. However, officials at USACE and Coast Guard told us they are dependent upon FEMA to reissue, clarify, or extend mission assignments. Further, the FEMA official told us that contracting considerations—such as the time needed for a contractor to mobilize and demobilize—are not necessarily built into the period of performance of a mission assignment. FEMA identified issues related to the mission assignment process, both during the 2017 disasters and following Hurricane Sandy in 2012. For example, in its 2013 Hurricane Sandy After-Action Report, FEMA found that the mission assignment process was not optimally set up to quickly surge resources to the field in a large-scale incident. To address these challenges, FEMA convened an Executive Steering Committee to update the mission assignment process, among other actions, and subsequently updated its mission assignment policy in 2015. Following the 2017 disasters, the Emergency Support Function Leadership Group identified challenges related to the mission assignment process and made recommendations to: (1) ensure response officials are properly trained on their department or agency’s statutory authorities and FEMA’s mission assignment process, and (2) develop specific recommendations to the FEMA Response Directorate on ways to reform mission assignment submission documents. These recommendations have been assigned to working groups within the Emergency Support Function Leadership Group, which plans to track the status until they are implemented. While these actions may improve the mission assignment process, they do not specifically address the issues we identified related to coordination and contracting. While the emergency support functions lay out agencies’ general responsibilities, agencies are dependent upon FEMA’s mission assignment process to further define how to perform their roles. Federal internal control standards state that management should implement control activities through its policies. These control activities include periodically reviewing policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. Further, these standards also state that communicating internally and externally are key to achieving an entity’s objectives. As part of its internal controls, entities should evaluate the methods to communicate quality information throughout and outside of the entity on a timely basis. While FEMA revised its mission assignment guide in 2017, it still does not require FEMA to lay out coordination responsibilities in detail when assigning a mission. Without a mission assignment policy and related guidance that better incorporates contracting considerations, such as demobilization, and requires FEMA to clearly define coordination responsibilities with federal, state, and local stakeholders during the mission assignment process, federal agencies may encounter challenges fulfilling their assigned missions and may not fulfill their disaster response and recovery missions efficiently. During the 2017 disasters, FEMA leveraged contracting staff from its regions, headquarters, and the DART teams—FEMA’s deployable contracting workforce. However, FEMA’s after-action report and officials we spoke with cited workforce shortages as a continuing challenge for disaster response and recovery. For example, officials we spoke with in several regional offices stated that there are only one to three contracting officers per region. Further, information provided by FEMA OCPO shows that eight of FEMA’s 10 regional offices have only one permanent full- time contracting official. Some of FEMA’s regional offices have additional contracting staff through FEMA’s Cadre of On-Call Response/Recovery Employees, but this varies from region to region. Regional offices are responsible for managing post-disaster contracts, even if regional procurement staff were not involved in the initial award of those contracts, according to FEMA officials. As noted in table 4 above, FEMA’s after-action report recommended increasing contract support capacities; however, it did not provide a specific plan to do so. According to FEMA officials, the agency’s workforce needs have not been assessed since a FEMA workforce analysis pilot conducted in 2014. We have identified several key principles that strategic workforce planning should address, including: determining the critical skills and competencies that will be needed to achieve current and future programmatic results, and developing strategies that are tailored to address gaps in the number, deployment, and alignment of human capital approaches for enabling and sustaining the contributions of all critical skills and competencies. Further, in our review of FEMA’s 2014 analysis, we found that FEMA evaluated contracting workforce needs, but did not specifically consider contracting workforce needs in the regional offices or address DART employees. The analysis was based on 5 years of workload data and conducted at the task or activity level, such as performing market research prior to making a contract award. However, the analysis did not prioritize skills or mission needs, nor did it identify critical competencies. In September 2018, FEMA procurement officials told us that, based on the 2014 analysis, they planned to hire 57 additional contracting staff. Officials noted that FEMA’s general operation funding does not support these additional hires, thus the agency plans to hire these staff as Stafford Act employees for 2-year appointments using disaster funding. While this is an important step, it is unclear when these staff will be hired or how they will be allocated across FEMA OCPO. For example, as of July 2018, FEMA OCPO had 72 vacant positions, including key leadership positions and contracting specialists. Without assessing its current contracting workforce needs—including staffing levels, mission needs, and skill gaps—and developing a plan to address these gaps that includes time frames, FEMA will not know whether it has the appropriate number of contracting officials with the key skills needed to meet its mission and is not likely to be well-positioned to respond to future disasters. Contracting during a disaster can pose a unique set of challenges as officials face a significant amount of pressure to provide life-sustaining goods and services to survivors as quickly as possible. Given the scale and consecutive nature of the 2017 disasters, disaster contracts— particularly post-disaster contracts—played a key role in the response and recovery efforts. In these situations, it is important that the federal government be accountable for the contracting decisions it makes and the money it obligates, support the local economy and survivors as effectively as possible, and implement lessons learned before the next disaster strikes. Regarding accountability for the contracting decisions it makes and dollars obligated following disasters, without the ability to track disaster contracts using a NIA code in FPDS-NG, agencies, Congress, and the public lack full insight into post-disaster contracts. Providing clear criteria for establishing and closing the NIA code that accounts for the needs of users and consistently implementing these criteria will help ensure insight into high-visibility disaster events. Further, the ability to identify and track contracting dollars for disasters through a publicly available database, such as FPDS-NG, can reduce the burden on agencies to provide these data for interested parties, including Congress and other users, and offer a resource for historical data across major disasters. To help meet the needs of the local economy as effectively as possible, using a contracting preference for vendors in a disaster-affected area is an important component to early recovery efforts. Without guidance or training to ensure contracting officers are aware of the regulatory definition of the local area, agencies may miss opportunities to provide financial support to local vendors. Additionally, without clarifying how contracting officers determine whether offerors reside or primarily do business in a disaster area for the purposes of a local area set-aside, contract officials will remain uncertain on how to implement related FAR criteria. Similarly, guidance and tools to help ensure contracting officials are aware of the requirement to provide preference to the extent feasible and practicable to local vendors, including the need for written documentation on the use of non-local vendors for post-disaster contracts, will help ensure agencies comply with the requirement to do so. Taken together, these actions could enhance compliance with the Stafford Act provisions related to the award of contracts to local businesses in the disaster area, which could help jump-start the local economy. With regards to implementing lessons learned before the next disaster strikes, large scale disasters, like those that occurred in 2017, require effective coordination across emergency support function agencies. Given the Emergency Support Function Leadership Group’s responsibility to identify gaps or seams in the federal government’s efforts to respond to disasters, it is essential that the group have accurate and up-to-date information. Formal processes for soliciting and sharing information to communicate lessons learned to this group would help enhance agencies’ abilities to identify and address weaknesses in disaster response. Further, incorporating contracting considerations, such as demobilization, into the mission assignment policy, could enhance federal agencies’ ability to fulfill their disaster response and recovery missions efficiently. Lastly, without an assessment of FEMA’s contracting workforce needs, FEMA is at risk of not having a sufficient contracting workforce during a disaster. We are making a total of 10 recommendations, including one to DHS, one to the Office of Federal Procurement Policy, two to FEMA, three to the Army, two to the Coast Guard, and one to GSA (in coordination with DOD and DHS). The Administrator of the General Services Administration, in coordination with the Secretaries of Defense and Homeland Security, should jointly revisit and assess the extent to which the criteria in the 2018 NIA code Memorandum of Agreement, including criteria for closing NIA codes, meet long-term visibility needs for high visibility events and account for the needs of users, such as FEMA, other agencies, and the Congress. At a minimum, the agreement should include criteria that take into account the roles of the federal agencies involved in response and recovery and provide a process that ensures consistent consideration and implementation of the criteria. (Recommendation 1) Until the NIA code Memorandum of Agreement between the General Services Administration and the Departments of Defense and Homeland Security is revised, the Secretary of Homeland Security should, in coordination with the Department of Defense and the General Services Administration, keep the existing NIA code for Hurricane Maria open, reopen the other NIA codes established for 2017 and 2018 hurricanes (Hurricanes Harvey, Irma, Florence, and Michael), and request that agencies retroactively enter NIA codes for contract actions for Hurricanes Harvey and Irma made after June 30, 2018, for Hurricane Florence made after March 15, 2019, and for Hurricane Michael made after April 12, 2019 into FPDS-NG to adequately capture contract obligations, to the extent practicable. (Recommendation 2) The Secretary of the Army should direct the Commanding General of the U.S. Army Corps of Engineers to provide guidance or related training to ensure contracting officers are aware of the regulatory definition of “local area”. (Recommendation 3) The Administrator of the Office of Federal Procurement Policy should provide additional clarification on how contracting officers should determine whether offerors reside or primarily do business in a disaster area for the purposes of a local area set-aside contract. (Recommendation 4) The Commandant of the Coast Guard should provide guidance and tools for contracting officials to use to ensure requirements concerning contracting with local vendors, including justification requirements for the use of non-local vendors, are consistently met. (Recommendation 5) The Secretary of the Army should direct the Commanding General of the U.S. Army Corps of Engineers to provide guidance and tools for contracting officials to use to ensure requirements concerning contracting with local vendors, including justification requirements for the use of non- local vendors, are consistently met. (Recommendation 6) The Secretary of the Army should direct the Commanding General of the U.S. Army Corps of Engineers to establish a formal process to solicit input from officials directly involved in the agency’s response and recovery following a disaster and to share that input with the Emergency Support Function Leadership Group. (Recommendation 7) The Commandant of the Coast Guard should establish a formal process to solicit input from officials directly involved in the agency’s response and recovery following a disaster and to share that input with the Emergency Support Function Leadership Group. (Recommendation 8) The FEMA Administrator should take the lead to work together with the Coast Guard and the U.S. Army Corps of Engineers to revise the mission assignment policy and related guidance to better incorporate consideration of contracting needs, such as demobilization, and to ensure clear communication of coordination responsibilities related to contracting. (Recommendation 9) The FEMA Administrator should assess its workforce needs—including staffing levels, mission needs, and skill gaps—for contracting staff, to include regional offices and DART; and develop a plan, including timelines, to address any gaps. (Recommendation 10) We provided a draft of this report to DOD, DHS, GSA, and OMB for review and comment. In written comments provided by DOD, DHS, and GSA (reproduced in appendixes III, IV, and V), as well as an email response from OMB, the agencies concurred with nine of the 10 recommendations. They generally provided steps they plan to take to address these recommendations. As discussed further below, USACE described actions it stated were sufficient to fully address the seventh recommendation, the steps described by FEMA would not fully meet the intent of the tenth recommendation, and DHS did not concur with our second recommendation. In response to the seventh recommendation as written in our draft report—to establish a formal process to solicit input from officials directly involved in the agency’s response and recovery following a disaster and to share that input with the Emergency Support Function Leadership Group—in its comments, USACE concurred and stated it has a formal process and it considered the recommendation completed. USACE noted that its Remedial Action Program solicits input from officials involved in response and recovery efforts and added that USACE shares findings from this program with the Emergency Support Function Leadership Group throughout the year and annually during the senior leaders seminar. During the course of our review, USACE did not provide information that indicated that they had such a formal process. As part of our recommendation follow-up process, we will request documentation regarding the process and how it solicits and shares information to the Emergency Support Function Leadership Group. In response to the tenth recommendation that FEMA assess its workforce needs—including staffing levels, mission needs, and skill gaps—for contracting staff, to include regional offices and DART; and develop a plan, including timelines, to address any gaps, FEMA stated that its Office of the Chief Component Procurement Officer assesses its workforce on an annual basis, with the last assessment conducted in January 2019. FEMA also noted that it entered into a contract for acquisition support services and plans to hire Cadre of On-Call Response and Recovery employees to provide dedicated support during disasters. Following FEMA’s response, we requested and received the FEMA Office of the Chief Component Procurement Officer’s 2019 workforce assessment. As with FEMA’s 2014 workforce analysis, the 2019 assessment calculated the number of employees needed based on the estimated time to complete a task. However, the assessment did not include an analysis of mission needs or skill gaps, and the assessment provided does not specify whether it includes the needs of regional offices and DART. FEMA estimates that it will implement this recommendation in September 2019, and we will continue to monitor FEMA’s planned efforts through our recommendation follow-up process. DHS did not concur with the draft report’s second recommendation regarding NIA codes. In its response, with regards to extending existing NIA codes and reinstating expired NIA codes, DHS stated that it is bound by the memorandum of agreement with GSA and DOD, unless or until all three signatory agencies agree to revise or suspend the agreement. We recognize that all three agencies are bound by the agreement, and also recommended in the first recommendation that GSA, DOD, and DHS jointly revisit the agreement. GSA concurred with this recommendation in its written comments reproduced in Appendix V. In an email sent from an official within DOD’s Defense Pricing and Contracting Office, DOD concurred. DHS did not respond to our first recommendation. As such, we have revised the second recommendation to state that DHS take action in coordination with DOD and GSA. We also note that the memorandum of agreement states that extending expiring or already expired NIA code end date is appropriate, in part, when two or more agencies do not have a reasonable alternative method of identifying and internally tracking those emergency acquisitions. We discuss in our report how once the NIA code is closed, there is no publicly available, government-wide system to track contract obligations for specific events. We also discuss how, using the description field (which does not provide a full picture) in FPDS-NG, agencies obligated more than $250 million on contracts for Hurricanes Harvey and Irma during the three months after the NIA codes for these two hurricanes were closed. Given this, we continue to believe DHS should consider reopening the codes for Hurricanes Harvey and Irma, in coordination with DOD and GSA. Moreover, in its response to the second recommendation DHS further stated that FEMA’s Office of the Chief Component Procurement Officer (who is not currently a party to the memorandum of agreement), believes the recommendation to extend the NIA codes for 2018 Hurricanes Michael and Florence goes beyond the scope of this audit. While the main focus of this report is the 2017 hurricanes and California wildfires, we discuss Hurricanes Florence and Michael in this draft with respect to the NIA codes, as the same issues and concerns we raised apply regardless of the year of the hurricane. However, after we sent the draft to the agencies for comment, the agencies let the codes for Hurricanes Florence and Michael expire on March 15, 2019 and April 12, 2019, respectively. We therefore revised the second recommendation to recommend that the codes for Hurricanes Florence and Michael should be reopened (rather than kept open). In its written comments, DHS also stated that neither DHS nor FEMA can unilaterally direct other agencies to retroactively enter FPDS-NG data for Hurricanes Harvey and Irma. We acknowledge this and have revised the recommendation to recommend that DHS request, rather than direct, other agencies to retroactively enter the information, to the extent practicable. As we state in the report, the NIA codes for the 2005 hurricanes were established in October 2005, and contracting officers retroactively entered data for contracts related to these events to enable full insight into contracting for these disasters. DHS further stated that retroactively entering data into FPDS-NG is not practical and places an unreasonable burden on contracting staff, and that the draft did not support the case that there were any benefits to be gained. We recognize that there is some burden associated with the recommendation, thus we recommended that DHS request agencies take action to the extent practicable. In terms of benefits, the report identifies benefits in terms of providing decision makers with important information to understand the procurement impact of such disasters. DOD and DHS also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the U.S. Army Corps of Engineers Director of Contracting, the Director of the Defense Logistics Agency, the Secretary of Homeland Security, the Administrator of the Federal Emergency Management Agency, the Federal Emergency Management Agency’s Chief Procurement Officer, the Commandant of the Coast Guard, the Administrator of the General Services Administration, the Director of the Office of Management and Budget, and the Administrator of the Office of Federal Procurement Policy. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or makm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report specifically addresses the use of post disaster contracts and: (1) assesses the extent to which federal agencies obligated funds on post-disaster contracts in response to the 2017 major disasters; (2) assesses the extent to which selected agencies experienced challenges in the planning process for selected post-disaster contracts; and (3) describes selected agencies’ lessons learned as a result of the 2017 major disasters and assesses the extent to which they have taken action to address them. To identify the extent to which federal agencies obligated funds on post- disaster contracts in response to the 2017 disasters, we reviewed Federal Procurement Data System-Next Generation (FPDS-NG) data through June 30, 2018, the most recent and complete data at the time of our review. We adjusted the obligation data to constant fiscal year 2018 dollars using the Fiscal Year Gross Domestic Product price index. We identified hurricane obligations using the national interest action (NIA) code, as well as the contract description. Data on obligations for the California wildfires is limited to those contracts, if any, identified by the agencies with the highest obligations on post- disaster contracts for the hurricanes—the Federal Emergency Management Agency (FEMA), U.S. Army Corps of Engineers (USACE), Defense Logistics Agency (DLA), and the U.S. Coast Guard (Coast Guard)—because no NIA code was established in FPDS-NG. Coast Guard officials stated that they did not execute any contracts in response to the 2017 California wildfires. DLA officials stated that they maintain contracts, which for the most part provide inventory replenishment for DLA and the U.S. Forest Service within the U.S. Department of Agriculture, but they were unable to provide data on contracts awarded or executed specifically for the two wildfire disasters in the scope of our review. Therefore, our analysis only captures obligations for FEMA and USACE reported contracts related to the 2017 California wildfires. To determine which obligations were made through the use of post- disaster contracts versus advance contracts, we reviewed documentation provided by FEMA and USACE identifying the advance contracts they have in place and that were used in support of the 2017 disasters. We analyzed the FPDS-NG data against these contracts to identify obligations on post-disaster contracts and compared these to obligations on advance contracts by disaster. We analyzed competition procedures used and the types of goods and services procured for post-disaster contracts. In addition to advance contracts for disaster response, agencies can leverage other existing contract vehicles. For example, to respond to its pollution mitigation functions under emergency support function 10, the Coast Guard awards task orders off of its portfolio of basic ordering agreements. For the purposes of this report, post-disaster contracts include all contract awards and orders that were not identified by FEMA or USACE as advance contracts. To assess the extent to which disaster contract obligations can be tracked through FPDS-NG using the NIA code, we identified prior hurricane events with the highest contract obligations from 2005 through September 2018. We analyzed the data to determine when the highest level of federal contract obligations occurs following a hurricane. We also assessed the process for establishing and closing a NIA code. Specifically, we reviewed the criteria in the 2012 and 2018 memorandums of agreement between DHS, DOD, and the General Services Administration, and interviewed officials involved in the process. We assessed the reliability of FPDS-NG data by reviewing existing information about the FPDS-NG system and the data it collects— specifically, the data dictionary and data validation rules—and performing electronic testing. We also compared FPDS-NG data to the contract files in our review. Specifically, to review our selected post-disaster contracts for data reliability, we compared items such as, the extent competed, the use of a local area set-aside, NIA code, and termination status, based on the contract information and the information in FPDS-NG. Based on the steps we took, we determined the FPDS-NG data were sufficiently reliable for the purposes of describing agencies’ post- disaster contract obligations. To assess the extent to which agencies experienced challenges in the planning of selected post-disaster contracts, we reviewed relevant laws and regulations, including the Post-Katrina Emergency Management Reform Act (PKEMRA), the Federal Acquisition Regulation (FAR), the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act), as well as agency policy and guidance. We identified a non-generalizable sample of 23 post-disaster contracts from the four agencies with the highest post-disaster obligations based on FPDS-NG data as of March 31, 2018—DHS’s FEMA, DOD’s USACE, DOD’s DLA, and DHS’s Coast Guard. We selected contracts across the four major 2017 disasters included in our scope (Hurricanes Harvey, Irma, and Maria, as well as the California wildfires) based on four selection criteria—(1) contracts using the urgency exception to full and open competition; (2) contracts using a local area set-aside; (3) contracts awarded to small businesses; and (4) contracts terminated for cause or convenience. Our goal in this selection was to ensure we selected a range of contracts within each of these four criteria so as to assess the extent to which these contracts implemented certain laws and regulations. Specifically, we selected contracts based on the use of urgency and local area set-asides in order to assess agencies’ implementation of relevant PKEMRA, Stafford Act and FAR criteria for post-disaster contracts. Because the obligations for local area set-aside contracts was low across all federal agencies, about 5 percent of total post-disaster obligations, we selected contracts that were awarded to small business vendors as a proxy to identify other awards to local vendors. Finally, we selected terminated contracts to assess additional challenges related to post- disaster contracts, such as the availability of contracted services and supplies and the requirement setting process. Based on these criteria, we selected 12 FEMA, 7 USACE, 2 DLA, and 2 Coast Guard contracts. Findings based on information collected from the 23 contracts cannot be generalized to all post-disaster contracts. Additional details on our selected contracts can be found in table 5. To assess how agencies used the urgency exception to full and open competition, we reviewed selected contracts for the inclusion of a justification and approval for other than full and open competition including sole source justifications and exclusion of sources justifications. To assess the extent to which agencies provided preference to local vendors for post-disaster contracts, we reviewed selected contract files for the use of a set-aside or an evaluation preference listed in the contract solicitation, and the inclusion of justifications for contracts not awarded to local vendors. Additionally, we reviewed applicable agency guidance and interviewed contracting and senior procurement officials across all four agencies regarding their use of local area set-asides, including the means by which they define the geographic set-aside area and determine that an offeror primarily resides or does business in the set-aside area. We also met with officials from the Office of Management and Budget’s Office of Federal Procurement Policy to discuss relevant FAR criteria. To assess how FEMA program offices develop and deliver requirements packages for use by contracting officers and the extent to which those packages are sufficiently specific to allow contracting officers to issue a contract solicitation, we interviewed contracting, program, and senior procurement officials responsible for the contracts in our selection sample. We discussed the specificity of initial versus final requirements, the nature of requirements changes, the process of requirements development, and training provided to program officials regarding the requirements development process. We also reviewed new post-disaster awards at FEMA to determine time frames between resource request to award on average for post-disaster contracts. We compared these findings to relevant agency guidance on acquisition planning. To describe lessons learned selected agencies identified related to the use of post-disaster contracts and assess the extent to which agencies have taken action to address them, we reviewed available completed after-action reports from the 2017 and prior disasters, including the Hurricane Sandy FEMA After-Action Report, the 2017 Hurricane Season FEMA After-Action Report, USACE’s Temporary Emergency Power Mission After Action Review for Hurricane Matthew, USACE’s Puerto Rico After Action Review, USACE’s Northern California Wildfires Debris Removal Mission After Action Review, the Coast Guard’s 2017 Hurricane Season Strategic Lessons Learned After Action Report, and the Defense Logistics Agency’s 2017 Hurricane After Action Meeting papers. We also reviewed findings from the Emergency Support Function Leadership Group related to interagency lessons learned. As part of our review, we identified requirements for agencies to document or practices agencies use to document lessons learned following a disaster, agency specific and interagency lessons learned specific to post-disaster contracts and mission assignments, and recommendations or actions planned by the agencies to address them. We reviewed federal internal control standards and the Emergency Support Function Leadership Group charter and the standard operating procedures for its Preparedness Evaluation/Corrective Action Working Group. To describe challenges related to coordination with state and local officials on the use of post-disaster contracts, we interviewed FEMA, USACE, DLA, and Coast Guard officials. To obtain perspectives and examples from state and local government officials involved in disaster response, we interviewed officials in California on the use of federal contracts. We also met with state and local officials in Texas, Florida, Puerto Rico, and the U.S. Virgin Islands to discuss the federal response to the 2017 hurricanes more broadly. The information gathered from these officials is not generalizable to all officials. To describe challenges related to the mission assignment process, we interviewed FEMA, USACE, and Coast Guard officials, including officials from FEMA’s Response Directorate and the contracting officials from USACE and the Coast Guard that awarded the contracts these agencies used to fulfill their missions. We also reviewed the mission assignment documents, where FEMA assigned USACE and Coast Guard missions and laid out their responsibilities. To assess workforce challenges, we reviewed DHS’s 2014 workforce assessment, which identified gaps in FEMA’s contracting workforce. We also obtained information from FEMA on its current contracting workforce in headquarters, regional offices, Disaster Assistance Response Team, and joint field offices. We also interviewed FEMA contracting officials to obtain their perspectives and experiences during the 2017 disaster season. We conducted this performance audit from March 2018 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The National Response Framework identifies 14 emergency support functions (ESF) and designates a federal department or agency as the coordinating agency for each function. ESFs are the federal government’s primary coordinating structure for response, and under this structure, the Federal Emergency Management Agency (FEMA) acts as the federal coordinating agency. In addition to the contact named above, Janet McKelvey (Assistant Director), Katherine Trimble (Assistant Director), Caryn E. Kuebler (Analyst in Charge), Lindsay Taylor, and Sarah Tempel were principal contributors. In addition, the following people made contributions to this report: Emily Bond, Lorraine Ettaro, Suellen Foth, Julia Kennon, Carol Petersen, Sylvia Schatz, Alyssa Weir, and Robin Wilson.", "summary": "Federal contracts play a key role in timely response and recovery efforts following disasters. While federal agencies, such as FEMA and USACE, may have advance contracts in place for obtaining goods and services following disasters, agencies may also award post-disaster contracts. GAO was asked to review the federal government's response to three major hurricanes in 2017, as well as the 2017 California wildfires. This report addresses, among other objectives, the extent to which (1) federal agencies obligated funds on post-disaster contracts in response to the these events, and (2) selected agencies experienced challenges in the planning of selected contracts. GAO analyzed data from the Federal Procurement Data System-Next Generation; selected a non-generalizable sample of 23 post-disaster contracts based on factors such as if the contract was set aside for award to a local contractor; reviewed federal regulations and agency guidance; and interviewed agency officials. Following hurricanes Harvey, Irma, and Maria and the 2017 California wildfires, federal agencies obligated at least $5 billion in post-disaster contracts—which are awarded after disasters hit— to support disaster response and recovery efforts. The U.S. Army Corps of Engineers (USACE) and the Federal Emergency Management Agency (FEMA) comprised over three-quarters of reported post-disaster contract obligations as of June 30, 2018 (see figure). However, the full extent of post-disaster contracting related to the 2017 disasters is unknown due to the Department of Homeland Security's (DHS) inconsistent implementation of the criteria for closing a national interest action (NIA) code. This code allows agencies to track data on contract actions related to national emergencies, providing government-wide insight into response and recovery efforts. DHS closed the codes for Harvey and Irma on June 30, 2018, less than a year after those hurricanes hit. In contrast, the codes for prior hurricanes were open for at least five years, with Katrina remaining open for 13 years. Based on a review of 23 contract files from FEMA, USACE, the Defense Logistics Agency, and the Coast Guard, GAO identified challenges in the planning of selected contracts. For example, GAO found USACE officials were not consistently aware of the regulation that defines “local area.” GAO also found that contracting officers at FEMA, USACE, and the Coast Guard did not consistently write justifications for awards to non-local vendors outside the disaster area, as required. FEMA developed guidance to address this, but the Coast Guard and USACE have not issued guidance or tools to address this requirement. Without addressing planning challenges, agencies may miss opportunities to award contracts to local businesses in the disaster area to the extent feasible and practicable, which could help jump-start the local economy. GAO is making 10 recommendations, including that DHS reopen NIA codes for Hurricanes Harvey and Irma; USACE provide guidance on the local area definition; and the Coast Guard and USACE provide guidance to ensure contracting requirements for the use of non-local vendors are met. Agencies concurred with 9 recommendations. DHS did not agree that NIA codes should be reopened. GAO continues to believe DHS should do so, to the extent practicable, as discussed in the report.", "document_type": "gao"}
{"report": "The Ethics in Government Act of 1978 was enacted to preserve and promote the accountability and integrity of public officials, and the institutions of the federal government. The act requires political appointees and high-ranking government officials to complete a public financial disclosure report to help prevent and mitigate conflicts of interest for the purpose of increasing public confidence in the integrity of government. The act also established restrictions on postemployment activities of certain employees, and created OGE. The primary mission of the executive branch ethics program is to prevent conflicts of interest on the part of executive branch employees. The executive branch ethics program is a shared responsibility across government (see figure 1). OGE is the supervising ethics office for the executive branch and sets policy for the entire executive branch ethics program. Executive branch agency heads are responsible for leading their agency’s ethics program. Agency leaders are ultimately responsible for their organizations’ ethical culture. Their actions can demonstrate the level of commitment to ethics and set a powerful example for their employees. Designated Agency Ethics Officials (DAEO) and other agency ethics staff carry out ethics program responsibilities and coordinate with OGE. Inspectors General and the Department of Justice are authorized to investigate potential violations of criminal statutes pertaining to ethics. Executive branch employees are individually responsible for understanding and complying with the requirements of ethics laws and regulations, and are collectively responsible for making ethical conduct a standard of government service. Executive branch employees are ultimately responsible for understanding and abiding by the various ethics laws. Generally, executive branch employees are prohibited from working on government matters that will affect their personal financial interest or the financial interests of a spouse or minor child; general partner; any organization in which they serve as an officer, director, or trustee; and any person or organization with whom they are negotiating or have an arrangement for future employment. Executive branch employees are also subject to criminal statutes prohibiting bribery and illegal gratuities; civil statutes requiring public financial disclosure; and employee standards of conduct, such as acting at all times in the public’s interest, serving as good stewards of public resources, and refraining from misusing their office for private gain. Agency Offices of Inspectors General (OIG) have a responsibility to investigate potential ethics violations. Among our three case study agencies, since January 2017, the HHS and Interior OIG have investigated potential travel and ethics issues involving political appointees while the SBA OIG did not initiate any similar investigations. The HHS OIG investigated the former Secretary of HHS’s use of chartered and commercial aircraft and found that it did not always comply with applicable federal travel regulations and HHS policies and procedures. In response to its OIG’s findings, HHS implemented additional steps for political appointees’ travel approval. Since January 2017, the Interior OIG has initiated five investigations into potential ethics violations involving the former Secretary of the Interior. As of March 1, 2019, three investigations related to the former Secretary were completed. As a result of the first completed investigation, the Interior OIG found that “incomplete information” about the former Secretary’s travel and use of chartered flights during 2017 was provided to the DAEO for review. The other two completed investigations found no evidence that the former Secretary violated ethics laws. Two investigations remained open as of March 2019. Interior’s DAEO described multiple strategies that were implemented to address issues observed within the ethics program after he was hired in April 2018, such as establishing weekly meetings with the former Secretary of the Interior to discuss ethics matters. Executive Branch political appointees are subject to more ethics restrictions than other executive branch employees. Appointees make or advocate policy for a presidential administration or support those positions. Appointees generally serve at the pleasure of the appointing authority and do not have the civil service protections afforded to other federal employees. There are four major categories of political appointees: Presidential Appointees with Senate confirmation (PAS); presidential appointees; noncareer employees in the Senior Executive Service (SES); and Schedule C employees. The most recent Plum Book, which was published on December 1, 2016, identified about 4,000 political appointee positions from these four major categories across the entire executive branch as of June 30, 2016 (see figure 2). The Plum Book identifies presidentially appointed positions within the federal government using data from the Office of Personnel Management. It is published every 4 years just after the presidential election, alternately, by the Senate Committee on Homeland Security and Governmental Affairs and the House Committee on Oversight and Government Reform. In addition to the ethics laws for executive branch employees, several recent presidential administrations have issued an order requiring political appointees in executive branch agencies to sign an ethics pledge. Some of the restrictions in the ethics pledge relate to areas already covered under existing ethics provisions, such as restrictions on accepting gifts and postemployment restrictions. Political appointees may receive an ethics pledge waiver from the President or his designee of certain or all ethics restrictions and authorizations enabling them to participate in otherwise prohibited activities. Political appointees that sign the pledge are contractually bound to adhere to its restrictions. If violated, the restrictions in the pledge could only be enforced through civil actions. To foster transparency, federal law permits members of the public to access various government records. OGE provides online access to certified copies of public financial disclosure reports for PAS and certain other executive branch employees, as well as any applicable ethics agreements, certification of compliance for the ethics agreement, and certificates of divestiture for PAS. OGE also provides online access to copies of ethics pledge waivers for appointees at agencies. Members of the public can use this information to assist in holding government officials accountable for carrying out their duties free from conflicts of interest. OPM, PPO, and two nongovernmental organizations provide some data on political appointees serving in the executive branch, but the data have limitations that impede their usefulness. The Senate Homeland Security and Governmental Affairs Committee and the House Oversight and Government Reform Committee publish OPM data on political appointees after each presidential election in the Plum Book. Data include name, title, type of appointment, salary, and location of employment. The data reflect the positions and the individuals who are filling the positions at a single point in time, about 5 months prior to the report’s publication. While the data are comprehensive and publicly available, they are not timely. Because the Plum Book is a snapshot in time, it does not reflect changes that occur in between publications, such as changes to who is holding a certain position, the position title, and vacancies. OPM also maintains more timely data on federal personnel; however, these data are not comprehensive or publicly accessible for identifying individuals serving in political appointee positions. OPM maintains data in the Executive and Schedule C System and the Enterprise Human Resources Integration (EHRI) system—the latter serves as OPM’s primary repository for human capital data. We found both systems have limitations, several of which were also identified by OPM officials. The Executive and Schedule C System is not comprehensive. It includes data on Schedule C and noncareer SES political appointees, but generally does not include data on presidential appointees or PAS. Publicly available EHRI data do not identify political appointees, either at the individual or group level. In addition, the EHRI source data is not publicly available. Political appointees can be identified from a combination of multiple variables, but these combinations are not consistent within or across appointee types. OPM provided some data on political appointees serving in the executive branch as of June 2018 from the Executive and Schedule C System. We reviewed the data and found errors and omissions. For example, we found instances in which individuals appeared to be holding political appointee positions that they departed several months prior and individuals known to currently hold political appointee positions were not identified. We also found that the data are incomplete. For example, the data did not include information on political appointee positions within the EOP. The EOP provides data to OPM only every 4 years for inclusion in the Plum Book. In addition to OPM, the White House maintains timely data on political appointees that are likely more comprehensive than OPM’s data but are not publicly available. Historically, PPO maintained data on political appointees as part of its responsibilities to recruit, vet, and place political appointees in positions across the government. PPO data on political appointees have not been made publicly available by the Trump, Obama, or Bush administrations. According to former officials from the Bush and Obama administrations, PPO maintained and used data on political appointees to carry out its responsibilities. For example, during the Obama administration, PPO established a database to help with filling political appointee positions and managing the overall appointee process. The database included preliminary information on candidates, such as names, application status, and where the applicant was in the vetting process. After a position was filled, the database tracked information such as the name of the appointee, position, federal department or agency, and start and departure dates. The primary limitation of the data was that departure dates of political appointees were unreliable. The former Obama administration official attributed this limitation to the lack of a process for agencies to formally notify PPO when an appointee left a position. To address this gap, PPO met regularly with staff in federal agencies to review data for accuracy. There are requests by members of the public to obtain data on political appointees serving in the executive branch. For example, between January 2017 and November 2018, OPM received approximately 32 requests through the Freedom of Information Act (FOIA) for data on political appointments across federal agencies. According to OPM officials, requests for data on political appointees are common and tend to increase at the start of a new administration. Former PPO officials also stated that when they served at PPO they received requests for data on political appointees serving in the executive branch. In the absence of comprehensive and timely data on political appointees serving in the executive branch, two nongovernmental organizations—the Partnership for Public Service and ProPublica—stated that they collect and report some data themselves. The Partnership for Public Service primarily tracks and reports data on PAS appointments, which are compiled from publicly available sources such as Congress.gov and agency websites. According to the Partnership for Public Service, accurately tracking departure dates is the most significant limitation. Some PAS departures, such as cabinet level officials, are typically reported in the media; however, lower-level PAS departures may not be reported. ProPublica collects and reports data on all types of political appointees serving in the executive branch. To obtain and compile its data, ProPublica makes FOIA requests to OPM and departments and agencies across the executive branch for political appointee staffing lists. ProPublica also makes requests for other data, such as financial disclosure forms through an administrative process required by the Ethics in Government Act of 1978. ProPublica said it has had more than 166,000 unique visitors to its database since it launched in March 2018. According to officials at ProPublica, one limitation is that they rely on agency responses to FOIA requests and therefore the data may not be comprehensive or timely. The public has an interest in knowing who is serving in the government and making policy decisions. The Office of Management and Budget (OMB) stated that transparency promotes accountability by providing the public with information about what the government is doing. In a 2009 memorandum, OMB directed agencies to make information available online and to use modern technology to disseminate useful information, rather than waiting for specific requests under FOIA. Although some data are publicly available on political appointees and FOIA requests can be used to varying effect to obtain data on political appointees, neither option results in comprehensive, timely, and publicly available data. Until the names of political appointees and their position, position type, agency or department name, start and end dates are publicly available at least quarterly, it will be difficult for the public to access comprehensive and reliable information. Making such information available would promote transparency. The public, including independent researchers, the media, and nongovernmental organizations, can use these data to perform independent analyses to identify gaps and challenges for filling political appointee positions or to identify potential conflicts of interest. Such analyses would also facilitate congressional oversight of executive branch appointees by providing a comprehensive and timely source of information on political appointees. As of March 2019, no agency in the federal government was required to publicly report comprehensive and timely data on political appointees serving in the executive branch. As the leader of human resources and personnel policy, OPM is positioned to collect, maintain, and make political appointee data publicly available on a frequent and recurring basis. However, OPM is limited in its ability to provide comprehensive data, in part because it does not regularly receive data from each agency that has political appointees, such as the EOP, which has approximately 225 political appointee positions based on the 2016 Plum Book. PPO is positioned to make more comprehensive data on political appointees publicly available. However, PPO is reestablished with each new presidential administration, which could be a barrier to establishing a consistent process for maintaining and publishing data on a recurring basis. Ultimately, it is a policy decision as to which agency is best positioned to report comprehensive and timely data on political appointees. All three agencies we reviewed—HHS, Interior, and SBA—generally used appropriate internal controls to ensure they met basic ethics program requirements, such as financial disclosure, though two of the agencies— Interior and SBA—could do more to strengthen their ethics programs. SBA and Interior had not fully documented some of their procedures for ethics training and the ethics pledge, respectively. In implementing their ethics programs, each agency addressed human capital issues and workforce continuity challenges; however, we found that vacancies and staff turnover had negative effects on Interior’s ethics program. For the full results of our assessment of agencies’ internal controls, see appendix II. All three agencies we reviewed met the minimum statutory and regulatory requirement to have written procedures for financial disclosure. Federal law requires agencies to develop written procedures to collect, review, and evaluate financial disclosure reports (see sidebar). Each agency established financial disclosure processes in addition to what is required to reduce the risk of political appointees performing agency work while they may have conflicts of interest. For example, prior to an HHS political appointee’s first day, the HHS process requires the appointee’s financial disclosure report to be submitted and reviewed, and any potential conflicts be either resolved or identified, and an ethics agreement put in place with a timeline for conflict of interest resolution. This process aims to ensure that appointees are in compliance with ethics laws and regulations when they begin government service, rather than 30 days or more into their appointment. File a new entrant public financial disclosure report within 30 days of assuming a public filing position. If appointed to a position requiring Senate confirmation, file a nominee report within 5 days of transmittal of the President’s nomination to the Senate for confirmation. File a termination report within 30 days of leaving office. HHS and SBA have additional processes that include written procedures which reflect OGE’s guidance for reviewing reports, such as following up with appointees when a financial disclosure report appears incomplete. OGE officials told us that engaging with an appointee during the review process allows agencies to confirm that the appointee understands and completes each required item. These interactions are also an opportunity to provide ethics counseling and establish a relationship with appointees who may be new to government service. Interior instituted a process in June 2018 that requires ethics officials to interview new appointees, review their financial disclosure report, and complete a financial disclosure checklist prior to certification. In reviewing a nongeneralizable sample of political appointees at each of the three agencies, we found that nearly all political appointees filed financial disclosure reports on time, with four exceptions of non-PAS appointees from our Interior and SBA samples (see table 1). In one case, an Interior appointee who was required to file both a new entrant and termination report did not do so. According to Interior ethics officials, the office mistakenly determined that the appointee was excluded from public filing requirements. An individual who does not serve more than 60 days in a calendar year is not required to file a new entrant or a termination financial disclosure report; however, this political appointee served for 63 days. Three appointees—two from SBA and one from Interior—filed new entrant reports past their due dates. Late filing heightens the risk of appointees performing agency work while having conflicts of interest; however, none of the three appointees filed more than 30 days after the due date or the last day of an extension, and therefore were not subject to a late filing fee. For example, one Interior appointee received a 30-day extension to file a new entrant report, but filed it 4 days late. One SBA appointee received an extension exceeding the maximum time—90 days—that an agency may grant to any filer and consequently filed 2 days late. According to SBA ethics officials, the appointee was given a 92-day extension because the due date was miscalculated. A second SBA appointee filed a report 1 day past the due date. We did not find timeliness issues with any reports filed by appointees at HHS or filed by PAS appointees at Interior or SBA. Agency ethics officials generally reviewed appointees’ financial disclosure reports in a timely manner. However, agencies followed up with non-PAS political appointees’ to varying degrees when their financial disclosure reports were potentially missing information. For example, SBA followed up with an appointee to confirm that the appointee had not inadvertently omitted information, such as a retirement plan, from the financial disclosure report because the appointee reported having previous long- term employment. HHS asked for and received clarifying information from an appointee who reported compensation for legal work but did not report individual clients. However, Interior ethics officials told us they did not follow up with two appointees in our sample who reported having no previous outside employment. Interior officials acknowledged that the reports were neither reviewed nor certified properly. According to Interior’s new Designated Agency Ethics Official (DAEO), the June 2018 update to Interior’s review process was implemented in response to deficiencies within its financial disclosure program. HHS and Interior had written procedures for initial ethics training as required, but SBA did not until February 2019. Federal regulation requires agencies to establish written procedures for providing initial ethics training beginning in January 2017 (see sidebar). Carry out an ethics education program to teach employees how to identify government ethics issues and obtain assistance in complying with ethics laws and regulations. Establish written procedures, which the DAEO must review each year, for providing initial ethics training. HHS’s and Interior’s written procedures reflect the requirements of initial ethics training. For example, both agencies’ procedures describe time frames for providing initial ethics training to political appointees no later than 3 months after their appointment date, as well as the method for doing so. Prior to February 2019, SBA did not have adequate written procedures in place to address the requirement that became effective in January 2017. SBA’s written procedures now reflect the requirements of initial ethics training. Now that SBA officials have formally documented procedures, they can have reasonable assurance that the procedures are implemented as intended and that all required appointees are provided initial ethics training. Interior’s and HHS’s ethics programs track and maintain documentation of dates that political appointees received initial ethics training. During the time of our review, SBA did not adequately document political appointees’ training dates. For example, ethics officials at Interior manually record training dates in a spreadsheet shared between Interior’s ethics office, Office of Human Resources, and the White House Liaison. HHS requires appointees to confirm in writing that they completed initial ethics training. According to SBA ethics officials, the previous Alternate DAEO informally documented the dates that political appointees received training in her personal notes. Standards for internal control state that management should document significant events, and that documentation and records should be properly managed, maintained, and readily available for examination. Allowing one individual to control all key aspects of documenting an event puts the program at risk of errors. As of February 2019, SBA officials had developed a tracking sheet and a certificate for appointees to sign that indicates they completed initial ethics training. We plan to assess the implementation of the tracking sheet to confirm that SBA is using the tracker to hold appointees accountable by documenting their completion of initial ethics training requirements. By developing and implementing a mechanism, such as a tracking sheet, SBA can have reasonable assurance that political appointees meet the requirement to take initial ethics training. Our review of agency documentation, including SBA’s informal documentation, found that political appointees completed required initial ethics training on time. Also, all three agencies provided the required additional live ethics briefing for PAS appointees together with initial ethics training. In addition to required training, all three agencies provided examples of other ways they have reminded appointees about their personal ethical responsibilities. For example: In advance of the holiday season, Interior provided supplementary training to political appointees on restrictions on accepting gifts. SBA used its agency-wide newsletter during the March Madness college basketball tournament to remind employees that they are prohibited from gambling in the workplace. HHS updated its ethics website to highlight Hatch Act rules in preparation for upcoming elections. Political appointees we reviewed at each agency had signed the required ethics pledge prescribed in Executive Order 13770, “Ethics Commitments by Executive Branch Appointees.” However, nine Interior appointees’ and one HHS appointee’s pledges were not timely signed. For example, the former Secretary of the Interior signed the pledge 19 days after his appointment. According to an Interior ethics official, the political appointees were directed to sign the pledge at the start of their appointments, but did not do so. Interior’s new DAEO told us in October 2018 that Interior now requires all appointees to sign the pledge on their first day as a condition of continuing their employment; however, this procedure has not been formally documented. The non-PAS HHS appointee signed the pledge 9 days after his permanent appointment date. While the restrictions under the pledge are enforceable by civil action, there are no legal consequences, such as fines or penalties, for failing to timely sign the pledge. for all appointees, a 2-year ban on involvement in “particular matters” involving former employers and clients; for former lobbyists, a 2-year ban on involvement on particular matters on which he or she lobbied; and for appointees who leave government service, a 5-year ban on lobbying agencies in which they served. The President or his designee may grant a waiver of any of the restrictions contained in the executive order. As of March 2019, 32 executive branch appointees—not including White House appointees— received limited waivers of the pledge. Interior’s then acting solicitor and principal deputy solicitor signed a limited waiver of certain restrictions on lobbying activities for one appointee in our sample upon the appointee’s departure from the agency in July 2017. However, according to Interior ethics officials, the official from the Solicitor’s Office did not have authority to grant a waiver. Furthermore, Interior’s ethics office was not included in the decision to grant the waiver, although Interior ethics officials ultimately notified the appointee when they became aware that the waiver was legally invalid. According to the DAEO, Interior is updating and documenting its ethics program processes and procedures, including new processes to sign ethics pledges and grant waivers, but did not provide a time frame for completion. We discuss Interior’s efforts to document overall ethics program processes and procedures later in this report. We found that all of the agencies we reviewed are addressing human capital issues and workforce continuity challenges to varying extents to achieve the goals and objectives of the ethics program. Standards for internal control state that management can help ensure operational success by having the right personnel for the job on board and maintaining a continuity of needed skills and abilities. Standards for internal control also state that management has a responsibility to obtain the workforce necessary to achieve organizational goals. HHS and Interior reported challenges to recruiting and retaining ethics staff with the necessary knowledge, skills, and abilities. All of the reviewed agencies reported varying levels of effort to address vacancies, skills gaps, and succession planning. HHS reported vacancies in its ethics program as well as challenges in recruiting and hiring; however ethics program officials took actions to mitigate negative effects of the vacancies. As of October 1, 2018, HHS’s Ethics Division had six vacancies out of 32 full-time positions (a vacancy rate of approximately 19 percent), including the Alternate DAEO position. HHS officials told us that a senior attorney was assigned to assume the duties of the Alternate DAEO position for six months in 2018. HHS ethics officials told us that the 2017 government-wide hiring freeze and workforce reduction plan affected their efforts to fill vacancies. However, ethics officials also told us that, as of October 1, 2018, four people had tentatively accepted offers to fill vacancies. HHS ethics officials told us that applicants for ethics attorneys and specialist positions generally do not have a background in federal government ethics laws. As a result, Ethics Division officials said that it must invest time and resources to train new hires, who attend and review OGE trainings, participate in monthly interagency ethics meetings, and take HHS-specific ethics training. HHS ethics officials told us that new ethics program hires are assigned work from across the spectrum of ethics subject matter and trained one- on-one by senior staff. To address staffing shortages and prepare for potential attrition, the HHS ethics officials said they cross-train staff members and assign back-up team members to support HHS’s operating and staff divisions. In addition, to track potential staff attrition or retirement, the ethics officials told us that the Ethics Division uses OPM’s Federal Employee Viewpoint Survey data collected from HHS employees. However, the data only give the Ethics Division a general sense of the number of personnel that are planning to leave or retire. HHS Ethics Division officials said they use survey data because there is a general sensitivity related to asking about retirement and delays in planned retirements that could affect recruiting and hiring replacements. Interior’s ethics office also reported vacancies and challenges in recruiting and hiring that contributed to the issues in the ethics program. As of November 2018, the Interior ethics office reported that out of 14 full-time positions, four were vacant (a 29 percent vacancy rate). All vacancies were ethics attorney positions. Interior reported an ongoing transformation of the department’s ethics program and officials said that the vacancies resulted from prioritizing the staffing at individual bureaus— such as the National Park Service and Fish and Wildlife Service—instead of the department-level ethics office, which is responsible for overseeing the bureaus’ ethics programs and providing ethics services to employees at the Office of the Secretary, the Office of the Solicitor, and to all of Interior’s political appointees. Interior’s ethics officials said that the high vacancy rate in their ethics office affected its ability to properly collect and review financial disclosure forms—one of the main responsibilities of the federal ethics program. According to Interior’s new DAEO, the office received an influx of financial disclosure reports during the presidential transition, but was unprepared to handle them. Furthermore, during 2017 one official was responsible for reviewing and certifying more than 300 public financial disclosure forms. The official was unable to balance proper and timely review of forms with other responsibilities that also included reviewing and certifying more than 800 confidential disclosure forms. In the Interior Inspector General’s 2018 report on Interior’s Major Management Challenges, ethics staffing was identified as a limitation, as staffing shortages could lead to delays in reviewing appointees’ financial disclosure documentation. While the single Interior official was experienced in reviewing financial disclosure forms, Interior officials stated that there was not enough management support, training, or resources provided to properly review financial disclosure forms in 2017. According to the DAEO, a new supervisory ethics official for financial disclosure forms was hired in September 2018 as part of a proposed and ongoing organizational restructuring of Interior’s ethics office. In addition, Interior posted a job announcement for a second ethics attorney and now has two ethics specialists for financial disclosures. The DAEO stated that the ethics program also plans to increase the number of ethics officials that review and certify financial disclosures, and has established new program goals, such as improving ethics staff competencies for technical review of financial disclosure reports. Interior ethics officials also reported that the government-wide hiring freeze affected their ability to hire staff and address ethics program staff continuity. To build capacity within the ethics program and create a strong ethical culture at the agency and bureau levels, the Acting Deputy Secretary recommended in May 2017 that Interior develop a structure and staffing plan to have a full-time ethics official for every 500 employees by fiscal year 2020. On October 26, 2018, Interior officials stated that the ethics program was implementing the Acting Deputy Secretary’s staffing plan. However, OGE benchmarking guidance states that there is no “right” ratio for the number of ethics staff per employee, and that agencies should determine their ratio based on certain aspects of individual ethics programs, such as the scope of potential conflicts and the complexity of financial disclosure reports. Interior officials could not explain how the ratio was determined nor provide a strategy for achieving the goal or evaluating whether the ratio is meeting the needs of the department in the future. We have previously identified leading practices for human capital management; these practices include that agencies should determine the workforce skills and competencies needed to achieve current and future goals and objectives as well as identify and develop strategies to address gaps. In addition, agencies should continually assess and improve human capital planning and investment, and assess the impact on accomplishing the mission. Without having a better understanding of resource needs and documenting how to properly allocate and determine needed resources, Interior may not accurately estimate its needs and may not be best positioned to assess and strengthen its ethics workforce to achieve program goals and objectives. Moreover, staff turnover at the Interior ethics office also reduced institutional knowledge. For example, Interior’s ethics office could not produce the documentation of the policies and procedures that support its ethics program—an internal control requirement—such as documenting and providing written responses to ethics queries and the tools used to ensure short and long-term continuity of operations. However, the ethics office previously provided documented evidence of some of these policies and procedures in its response to OGE’s 2016 program review. Interior ethics officials stated that the OGE response was produced prior to the DAEO retiring and drafted by staff who no longer work at Interior. Standards for Internal Control also require agencies to document key processes and procedures to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as a means to communicate that knowledge as needed to external parties, such as external auditors. Both HHS and SBA provided documentation of ethics program policies and procedures while Interior did not provide documentation. Since there was no formal documentation of the ethics program’s policies and procedures, Interior ethics officials stated that the ethics office will document them as part of its organizational restructuring plans. As of March 2019, Interior officials had not provided this documentation. For example, the ethics program is to ensure that all ethics related advice, legal analyses, and conclusions are documented. However, without Interior completing the documentation of its policies and procedures and making them accessible to staff, institutional knowledge may be lost, and there is greater risk of not achieving the goals and objectives of the ethics program. SBA did not report challenges to recruiting or staff continuity in part because of the small size of the ethics program. SBA’s ethics program is administered by three full-time officials and during our review, the DAEO position was vacant for more than 3 months due to the retirement of the previous DAEO. However, the Alternate DAEO assumed the responsibility for managing the ethics program until a new DAEO was hired in August 2018. Ethics officials reported that the program could draw upon a pool of field attorneys previously designated to perform collateral ethics duties to temporarily address disruptions in staffing. To address continuity and succession, SBA ethics officials reported that a headquarters staff attorney was detailed to the ethics program to prepare for the possible retirement of its current Alternate DAEO. Strong ethics programs are critical to ensuring public trust in government and the integrity of actions taken on the public’s behalf. The executive branch ethics program is a shared responsibility across government. Political appointees, in particular agency heads, have a personal responsibility to exercise leadership in ethics. Some data are available on political appointees serving in the Executive Branch but the data have limitations that impede their usefulness. To facilitate independent review and analysis related to political appointees, members of the public need access to information on who is serving in political appointee positions. Otherwise, they are limited in their ability to discern whether appointees are performing their duties free of conflict. Information on the political appointees serving in the executive branch at any point in time would also facilitate congressional oversight. Both OPM and PPO are positioned to report these data, but there are some benefits and drawbacks of each agency’s current capacity that will need to be considered. Ultimately, it is a policy decision as to which agency is best positioned to report comprehensive and timely data on political appointees. Further, a robust internal control system is critical for agency ethics programs to achieve their mission of preventing conflicts of interest on the part of their employees. Without effective internal controls, agency ethics programs cannot reasonably assure that they are mitigating the risk—or the appearance of—public servants making biased decisions when carrying out the governmental responsibilities entrusted to them. During the course of our review SBA took steps to establish written procedures for initial ethics training, but still needs to complete the implementation of procedures to track and verify that all political appointees meet ethics training requirements. As Interior continues to reorganize its ethics program, improved strategic workforce planning can help to accurately assess its needs, maintain continuity, and achieve program goals and objectives. Finally, ensuring that Interior’s ethics processes and procedures are fully documented and easily accessible to staff can help mitigate the risk of reduced institutional knowledge, and can improve the ability to communicate with external parties. Congress should consider legislation requiring comprehensive and timely information on political appointees serving in the executive branch to be collected and made publicly accessible. (Matter for Consideration 1) We are making a total of three recommendations, including one to SBA, and two to Interior. The Administrator of the Small Business Administration should implement procedures to track and verify that required employees complete initial ethics training and that completion of this training is documented. (Recommendation 1) The Secretary of the Interior should direct the Departmental Ethics Office, in conjunction with the Chief Human Capital Officer, to develop, document, and implement a strategic workforce planning process that aligns with its ongoing departmental reorganization and that is tailored to the specific needs of the ethics program. As part of this process, Interior should monitor and assess the critical skills and competencies that its ethics program needs presently and is projected to need in the future. (Recommendation 2) The Secretary of the Interior should ensure that the department’s ethics program policies and procedures are documented and easily accessible to program staff. (Recommendation 3) We provided a draft of this report for comment to the Department of Justice (DOJ), the White House Counsel’s Office at the Executive Office of the President (EOP), the Department of Health and Human Services (HHS), the Department of the Interior (Interior), the Inspector General of the Department of the Interior (OIG), the Office of Government Ethics (OGE), the Office of Personnel Management (OPM), and the Small Business Administration (SBA). Interior, SBA, and OGE provided written comments, which are reproduced in appendixes IV, V, and VI respectively. Interior officials concurred with our recommendations and described steps they are taking to begin addressing them. In our draft report, we made two recommendations to SBA. Our first recommendation was that SBA establish written procedures for initial ethics training as required. SBA officials did not agree or disagree with this recommendation, but during their review of the draft report, they provided documentation to show that they had established written procedures in line with our draft recommendation. As such, we revised our final report to include the actions taken by SBA in February 2019 and to delete our recommendation to establish written procedures for initial ethics training. With regard to our second draft recommendation to SBA, which remains in our final report as our first recommendation, SBA again did not agree or disagree with the recommendation. SBA officials provided documentation to support that they have taken initial steps to address our recommendation to implement procedures to track and verify completion of initial ethics training by political appointees. We plan to assess the implementation of these new procedures to confirm that, in operation, these procedures meet the intent of our recommendation. In addition to the written comments we received, SBA, HHS, OGE, and OPM provided technical comments, which we incorporated as appropriate. DOJ and the Interior OIG had no comments on the draft report. EOP did not respond to our request for comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 1 day from the report date. At that time, we will send copies to the appropriate congressional committees, the Acting Attorney General of DOJ, the White House Counsel, the Secretary of HHS, the Acting Secretary of the Interior, the Acting Inspector General at the Interior, the Director of OGE, the Acting Director of OPM, the SBA Administrator, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or nguyentt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Our objectives were to evaluate the extent to which (1) existing data identify political appointees serving in the executive branch at any point in time, and (2) selected agencies use appropriate internal controls to reasonably ensure that their ethics programs are designed and implemented to meet statutory and regulatory requirements. To evaluate the extent to which data identifying political appointees serving in the executive branch at any point in time exist, we first synthesized requirements for reporting and developed criteria for comprehensive and timely reporting. We reviewed relevant laws and standards, and the United States Government Policy and Supporting Positions (Plum Book). We used the Office of Management and Budget’s Open Government Directive (M-10-06) memorandum to develop criteria for transparency and public availability. We interviewed officials from the Office of Personnel Management (OPM) to understand the extent to which data they collect on current political appointees are comprehensive, timely, and reportable. OPM provided data on the political appointees serving in the federal government between January 2017 and June 2018. We also requested and obtained information from OPM on the volume of Freedom of Information Act requests for data on political appointees to assess demand for this type of data. To further evaluate public demand for political appointee data, we interviewed two nongovernmental organizations that track political appointees in the executive branch, ProPublica, and the Partnership for Public Service. We gathered information on the public’s demand for information regarding political appointees, and the use and limitations of data. Both organizations provided statistics quantifying public demand, including number of unique visitors to their website and media impressions. Media impressions are any viewing of or interaction with a piece of content. We requested information or interviews with the Office of Presidential Personnel (PPO) and several White House Liaisons to understand how they track, maintain, and use data on political appointees serving in the executive branch. A senior leader at PPO and one White House Liaison acknowledged our request for an interview but deferred to the White House Counsel’s Office. As well, an ethics officer indicated they would be unable to facilitate the exchange of information with the White House Liaison Office in their agency. The White House Counsel’s Office did not acknowledge requests for information or interviews. We interviewed former senior PPO officials from the two previous administrations to understand how they tracked, maintained and used data on political appointees. To identify internal control processes and determine the extent to which selected agencies use appropriate controls to ensure their ethics programs are designed and implemented to meet statutory and regulatory requirements, we first identified four case study agencies. We selected a range of case study agencies based on the number and type of political appointees as well as the strength of their ethics programs, as determined by Office of Government Ethics (OGE) reviews. Using data from the 2016 Plum Book, we identified the total number of political appointee positions within each agency or department across the following four categories: presidential appointees with Senate confirmation (PAS), presidential appointees, noncareer members of the Senior Executive Service, and Schedule C appointees. We selected the Executive Office of the President (EOP) as a case study agency because EOP has the largest number of presidential appointees, and because OGE has not recently conducted a program review of EOP. According to OGE, ethics program reviews are a primary means of conducting systematic oversight of executive branch ethics programs. OGE completed a review of each agency between January 2014 and January 2018. Since the White House Counsel’s Office did not acknowledge receipt of our notification letter we could not review EOP’s practices. To allow for more comparability among case studies, we excluded agencies and departments that did not have at least one PAS, and one presidential appointee or noncareer member of the Senior Executive Service. From the remaining list of departments and agencies, we excluded those with nine or fewer total political appointee positions. We divided the remaining agencies into two groups: large agencies with more than 100 political appointees and small agencies with fewer than 100 political appointees. To ensure we observed a range of practices, we selected a large agency with no recommendations in its most recent OGE program review—the Department of Health and Human Services and an agency with multiple unaddressed recommendations from its most recent OGE program review—the Department of the Interior. To select our final case study, we used human resources data from OPM’s FedScope tool to determine the number of employees at each agency as of September 2017. We limited our selection to noncabinet agencies with between 2,000 and 10,000 employees. Out of the four remaining agencies, we randomly selected the Small Business Administration. To evaluate the extent to which the three reviewed agencies have and use appropriate internal controls to reasonably ensure that the objectives of their ethics programs are achieved, we reviewed selected principles from Standards for Internal Control in the Federal Government based on our review, analysis and professional judgment as to which were relevant to effectively execute an executive branch ethics program. Selected internal control principles included: 3.01: Management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives; 4.01: Management should demonstrate a commitment to recruit, develop, and retain competent individuals; 10.01: Management should design control activities to achieve objectives and respond to risks; and 14.01: Management should internally communicate the necessary quality information to achieve the entity’s objectives. Reviewed agencies confirmed that these internal control principles were relevant to effectively execute their ethics program. We provided each agency with an identical set of questions based on the selected internal control principles and components. We used agency responses to questions and supporting documentation to evaluate whether agencies’ policies and processes to oversee ethics compliance for political appointees were consistent with the internal control principles. We used a nongeneralizable random sampling method to select political appointees whose documentation we would review for compliance with certain ethics requirements. Agencies provided data detailing the political appointees within the agency at any point in time beginning January 20, 2017 and as of January 28, 2018. To assess the reliability of the data, we asked each agency’s officials about how the data were obtained, where the data came from, and what steps, if any, they each took to assure the accuracy and completeness of the data. Officials at each agency knowledgeable about their data provided responses. Based on those responses, we determined that the data were sufficiently reliable to indicate each agency’s political appointees, with start and end dates, for use in selecting a sample of appointees at each agency. Within each agency, we used random sampling to identify up to three PAS appointees and up to nine non-PAS appointees, including up to three appointees that separated from the agency during the time frame above. Each case study agency completed a data collection instrument that identified the applicable ethics requirements for each selected appointee. Each agency provided documentation to communicate how those requirements were met for each appointee. We reviewed the documentation to determine whether agency internal controls were sufficient to ensure that certain ethics program requirements were met. In addition, we conducted interviews with agency ethics officials, as needed, to discuss documentation provided. We also conducted several interviews with OGE officials to inform how we developed the data collection instrument and evaluate appointee compliance in alignment with OGE’s principles and practices. Our review of political appointees’ documentation was limited to testing the sufficiency of the agencies’ ethics program processes and procedures. We did not review financial disclosure forms with the intent of identifying conflicts of interest nor did we perform a conflict of interest analysis. Also, because we used a nongeneralizable sample of political appointees, results from the sample cannot be used to make inferences about all the agencies’ political appointees. We conducted this performance audit from October 2017 to February 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Use of Internal Controls in Reviewed Agencies’ Ethics Programs Has the agency established an organizational structure for its ethics program? Management should demonstrate a commitment to recruit, develop, and retain competent individuals. Are agency ethics program staff evaluated? Are agency ethics program staff’s expectations developed and documented? Does the agency commit resources to the ethics program? Does the agency recruit, develop, and train ethics program staff? Does the agency prepare alternate or contingency plans for ethics program staff attrition, succession, or other potential disruptions to staff levels? Management should design control activities to achieve objectives and respond to risks. Does the agency have goals and objectives for the ethics program? Are these goals and objectives documented? Does the agency have processes and procedures in place to support the goals and objectives of the ethics program? Does the agency have processes and procedures in place to ensure political appointees who are not Presidential Appointees with Senate Confirmation do not undertake an activity that represents an actual or apparent conflict of interest? Does the agency have processes and procedures in place to ensure that political appointees receive required training? Management should internally communicate the necessary quality information to achieve the entity’s objectives. Does the agency communicate ethics program related information to political appointees? Signed the Executive Order 13770, “Ethics Pledge” Presidential Appointee with Senate confirmation (PAS) nominee financial disclosure report filed no later than 5 days after nomination by the President PAS nominee signed an Ethics Agreement to address identified conflicts of interest Non-PAS new entrant financial disclosure report filed within 30 days of assuming the duties of the position, or within extension of time for filing Received live ethics briefing within 15 days of appointment (PAS only) Termination financial disclosure report filed within 30 days of leaving government (if appointee departed from the agency) Because we used a nongeneralizable sample of political appointees, results from the sample cannot be used to make inferences about all of the agencies’ political appointees. In addition to the above contact, Melissa Wolf and Carol Henn (Assistant Directors), Erinn L. Sauer (Analyst-in-Charge), Caitlin Cusati, Ann Czapiewski, Robert Gebhart, Travis Hill, James Lager, Brittaini Maul, Steven Putansu, Mary Raneses, Andrew J. Stephens, and Mackenzie D. Verniero made major contributions to this report.", "summary": "Federal agencies' ethics programs seek to prevent conflicts of interest and safeguard the integrity of governmental decision-making. GAO was asked to review compliance with ethics requirements for political appointees in the executive branch. This report examines the extent to which (1) existing data identify political appointees serving in the executive branch, and (2) selected agencies use internal controls to reasonably ensure that their ethics programs are designed and implemented to meet statutory and regulatory requirements. GAO reviewed available data on political appointees. GAO also reviewed three case study agencies selected to provide a range in agency size and number of political appointees. GAO reviewed ethics documentation for a nongeneralizable sample of political appointees at the three agencies at any point between January 2017 and 2018 and interviewed officials from the agencies and two non-governmental organizations. There is no single source of data on political appointees serving in the executive branch that is publicly available, comprehensive, and timely. Political appointees make or advocate policy for a presidential administration or support those positions. The Office of Personnel Management (OPM) and two nongovernmental organizations collect, and in some cases, report data on political appointees, but the data are incomplete. For example, the data did not include information on political appointee positions within the Executive Office of the President. The White House Office of Presidential Personnel (PPO) maintains data but does not make them publicly available. The public has an interest in knowing the political appointees serving and this information would facilitate congressional oversight and hold leaders accountable. As of March 2019, no agency in the federal government is required to publicly report comprehensive and timely data on political appointees serving in the executive branch. OPM is positioned to maintain and make political appointee data publicly available on a timely basis but is limited in its ability to provide comprehensive data. PPO has more comprehensive data but may not be positioned to publish data on a recurring basis. Ultimately, it is a policy decision as to which agency is best positioned to report comprehensive and timely data on political appointees. All three agencies GAO reviewed generally used appropriate internal controls to ensure they met basic ethics program requirements, though two of the agencies could take actions to strengthen their ethics programs. The Departments of Health and Human Services (HHS), and the Interior (Interior), and the Small Business Administration (SBA) all have procedures for administering their financial disclosure systems. HHS and Interior had procedures for providing initial ethics training as required beginning in January 2017. Prior to February 2019 SBA did not have written procedures for initial ethics training and did not adequately document political appointees' training dates. SBA's written procedures now reflect the requirements of initial ethics training and SBA developed a tracking sheet to indicate appointees completed training. GAO will assess the implementation of the tracking sheet to confirm the process is sufficient for documenting appointees' completion of initial ethics training. Interior's ethics program has human capital and workforce continuity challenges. Interior reported that four out of 14 full-time positions were vacant. Interior officials attributed the vacancies to a recent transformation of the ethics program and prioritizing the staffing at individual bureaus such as the National Park Service. However, vacancies affected the ethics program's ability to properly document policies and procedures as well as file and review financial disclosure forms. According to Interior officials, steps are being taken to address vacancies and document policies and procedures. However, GAO found that a more strategic and documented approach would enable Interior to better manage human capital, fill key positions, and maintain institutional knowledge. Congress should consider legislation requiring the publication of political appointees serving in the executive branch. GAO also recommends three actions: SBA should document that training was completed; Interior should conduct more strategic planning for its ethics workforce and document ethics program policies and procedures. SBA neither agreed nor disagreed with GAO's recommendation, but provided documentation that partially addresses the recommendation. Interior agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "FAA issues aircraft registrations according to eligibility requirements prescribed by federal statute in support of International Civil Aviation Organization requirements that every aircraft engaged in international air navigation must bear its appropriate nationality and registration marks. Specifically, the law requires that the aircraft may not be registered under the laws of a foreign country and must be owned by (1) a citizen of the United States, (2) a foreign citizen lawfully admitted for permanent residence in the United States, (3) a noncitizen corporation that is organized and doing business under the laws of the United States or a state if the aircraft is based and primarily used in the United States, or (4) the U.S. government, District of Columbia government, or the government of a U.S. state, territory, or possession. By law and FAA policy, FAA imposes safety obligations on all owners of registered aircraft. To meet these obligations, an owner must maintain current information about the identity and whereabouts of the operators of an aircraft and location and nature of the aircraft’s operation on an ongoing basis. In doing so, the owner is to retain the ability to provide the operator with safety-critical information in a timely manner, and to obtain information responsive to FAA inquiries, including investigations of alleged violations of FAA regulations. Such information supports FAA’s ability to carry out its oversight obligations under U.S. and international law. FAA’s aircraft registry is an owner registry; it is not intended to include aircraft operator information. Only an aircraft’s owner may apply for registration, and a registration is not valid if the interest of the applicant in the aircraft was created by a transaction that was not entered into in good faith, but rather was made to avoid registration requirements. In addition, anyone who knowingly and willfully submits documents to FAA with false, misleading, or fraudulent information could be subject to criminal penalties and revocation of the aircraft registration. To register an aircraft for a 3-year period, in addition to a $5 application fee, applicants must submit to FAA at least two primary documents: (1) a completed application form and (2) a bill of sale or other evidence of aircraft ownership. A sample aircraft registration submission for an individual owner is shown in figure 1 below. For additional information about required documentation based on registration type, see appendix III. According to FAA officials, in 2018 FAA received approximately 71,000 registration applications. FAA also issues dealer certificates, also known as dealer licenses, in support of aviation commerce. Individuals and legal entities who are U.S. citizens can apply for an aircraft dealer certificate. The dealer certificate is valid for 1 year at a cost of $10 for the initial certificate and $2 for additional certificates. The certificates allow manufacturers and dealers to demonstrate and merchandize aircraft for prospective buyers and to make flight tests without a standard aircraft registration certificate. A dealer may obtain one or more certificates and may use a certificate for any aircraft the dealer owns. Dealer certificates require the applicant to be a U.S. citizen, identify an established place of business in the United States, provide a mailing and physical address, and substantially engage in manufacturing or selling of aircraft. Among other things, a dealer certificate is generally valid when the dealer, his or her agent or employee, or prospective buyer within the United States operate the aircraft, and only for flights that are required for testing of the aircraft or necessary for, or incident to, the sale of the aircraft. In 2018, there were 9,864 dealer certificates in the aircraft registry, primarily issued to corporations, limited liability companies (LLC), or individuals. FAA’s aircraft registration application form identifies eight registration types, including individual, corporation, and government. In 2018, there were 294,221 aircraft registered with FAA across all registration types (see fig. 2). The various registration types are associated with different types of aircraft ownership structures. Individuals who are U.S. citizens or resident aliens can register aircraft in the United States as individual owners or as part of a legal entity, such as a corporation or LLC. Legal entities that meet certain requirements can also register aircraft in the United States. For most types of legal entities, the entity must qualify as a U.S. citizen. For example, a corporation may own and register an aircraft as a U.S. citizen if (1) it is organized under the laws of the United States or a state, District of Columbia, or a territory or possession of the United States; (2) the president and at least two-thirds of the board of directors and other managing officers are citizens of the United States; (3) it is under the actual control of citizens of the United States; and (4) at least 75 percent of the voting interest is owned or controlled by persons that are citizens of the United States. Depending on the type of legal entity, additional requirements may apply, and in some cases additional documentation must be provided to FAA. For some legal entities, the registered owners of aircraft may not be the beneficial owners—the persons who ultimately own and control an aircraft. See appendix III for further information about the types of registrations and an additional ownership structure, along with associated documentation requirements beyond the aircraft registration application form, bill of sale, and $5 registration fee. If necessary, a corporation may use a voting trust to establish the fourth element of citizenship noted above for the purposes of registering an aircraft. Generally, a voting trust legally transfers the voting control in the corporation from a foreign citizen to a U.S. citizen who holds those interests in trust; however, the exact requirements are governed by the law of the state in which the trust is created. FAA regulations have included requirements around the use of voting trusts since 1980. When promulgating the relevant regulations, FAA explained that use of a voting trust allows a domestic corporation to come within legal compliance by placing the “voting interest of the stock of the corporate applicant . . . in the hands of U.S. citizens as voting trustees that the trustees have a valid, independent, and bona fide control of the voting interest.” As a result, if a voting trust is used by the domestic corporation to meet the fourth element of citizenship, the corporation must submit to FAA a copy of the voting trust agreement, which identifies the voting interests and must be binding upon all parties to the transaction, as well as an affidavit from each voting trustee, which represents that the voting trustee is an independent actor. A sample aircraft registration submission for a corporation using a voting trust is shown in figure 3 below. Trusts are not a registration type on the FAA aircraft registration application form; however, trusts are a legal structure that may own property such as an aircraft and therefore may be used to register an aircraft. As of June 2019, according to FAA data, there were 11,364 trusts in the aircraft registry. Depending on whether the trustee is an individual or an entity as well as on the specific terms of the trust, the aircraft’s owner in the FAA registry may be listed as an individual or as a corporation (see fig. 4). A trust may own and register an aircraft if each of the trustees is a U.S. citizen or resident alien, and 75 percent of the control of the trust must be vested in U.S. citizens or resident aliens. Specifically, each trustee must affirm that trust beneficiaries who are not U.S. citizens or resident aliens do not have more than 25 percent of the aggregate power to influence or limit the exercise of the trustee’s authority. However, foreign citizens who are not resident aliens may have more than 25 percent of the beneficial interest in the trust. Trusts for which foreign citizens have a majority of the beneficial interest are generally referred to as “noncitizen trusts,” even though legal title in the aircraft remains owned by one or more U.S. citizen or resident alien trustees. In a 1979 rulemaking, FAA cited “increased activities of foreign investors in aircraft financing” as a reason for updating its regulations related to noncitizen trusts. In the ensuing decades, FAA experienced problems obtaining important operational and maintenance information concerning aircraft owned by noncitizen trusts from the owner trustees, prompting FAA in 2011 to begin a review of its policies and practices regarding the registration of such aircraft. After a series of public meetings and receipt of written public comments, FAA issued a notice of policy clarification for noncitizen trusts in 2013. Among other things, the policy clarification confirmed that the “FAA does not consider the status of the trustee as the owner of the aircraft under a trust agreement as having any differing effect on its responsibilities for regulatory compliance issues compared to other owners of a U.S.-registered aircraft,” and that “FAA is not aware of any basis for treating one type of owner—such as a trustee under a noncitizen trust—differently from any other owner of a civil aircraft on the U.S. registry when considering issues of regulatory compliance.” FAA collects, stores, and makes publicly available aircraft registration information. FAA collects basic aircraft registration data from the application form, which are available and searchable on FAA’s website or in imaged records in portable document format (PDF). FAA data available on its website include aircraft registration number (tail or N- number), serial number, aircraft make and model, owner name, owner’s address, and registration status. According to FAA officials, FAA stores scanned images in two key systems: (1) aircraft records, which includes documents such as registration application forms and bills of sale, and (2) ancillary files, which includes documents such as trust agreements. FAA officials told us that aircraft record files are accessible to the LEAU, FAA LEAP, and aviation safety inspectors who access aircraft records files via a web-based portal. Ancillary files must be accessed on-site at the FAA Aeronautical Center in Oklahoma City, Oklahoma. The LEAU has direct access to the ancillary files and provides aircraft record and ancillary file information to law-enforcement agencies, FAA LEAP, and aviation safety inspectors. Additionally, all records are accessible to the public in FAA’s public documents room located at the FAA Aeronautical Center or upon request. Figure 5 shows collection, storage, and availability of FAA’s aircraft registration documentation. Within FAA’s Aviation Safety office, the Flight Standards Service manages the Civil Aviation Registry and is the primary user of aircraft registry information. Registry staff process registrations for U.S. civil aircraft, issue aircraft registration numbers, and record conveyances affecting interest in aircraft. Internal FAA users of registration information include officials from ASH, LEAP, and SEIT, and aviation safety inspectors. FAA LEAP and SEIT coordinate closely with registry officials to request registration information in support of their missions on security and law-enforcement assistance. Apart from FAA, major users of aircraft registry information are organizations serving the aviation industry, international civil aviation agencies, federal safety officials, and law- enforcement agencies (see table 1). In 1964, FAA issued updated aircraft registration regulations and set the aircraft registration fee at $5. In 1988, Congress passed the Federal Aviation Administration Drug Enforcement Assistance Act of 1988 (FAA DEA Act), which declared that it is FAA policy to assist law-enforcement agencies in the enforcement of laws relating to the regulation of controlled substances and, among other things, required FAA to promulgate regulations that would require individuals to provide their driver’s license number and entities to provide a tax identification number in their registration application. In 1990, FAA issued a proposed rulemaking that, among other things, required a driver’s license number for an individual and a tax identification number for others. In 2005, FAA issued a notice of proposed rulemaking withdrawal, stating that it fulfilled the requirements of the FAA DEA Act, with certain exceptions, through changes to its system and procedures used by the FAA Civil Aviation Registry, such as by providing law-enforcement agencies access to the registry data. With regard to the requirement to provide a driver’s license number or tax identification number, FAA determined that the requirement would be detrimental to users of aircraft records and potentially to the aircraft owners, and cause an unnecessary burden on aircraft owners and government, and that this information was not necessary for law-enforcement agencies to carry out their responsibilities. In 2010, to improve the quality of registry data and to provide more accurate information to law-enforcement agencies and other users, FAA started requiring aircraft registration renewal. Such renewals must occur every 3 years. In 2018, the FAA Reauthorization Act of 2018 required FAA to modernize the Civil Aviation Registry’s information technology (IT) systems. The act also required FAA to initiate a rulemaking to extend the registration duration for noncommercial general aviation aircraft from 3 to 7 years. Beneficial ownership and legal information can assist law-enforcement and safety authorities by identifying those natural persons who may be responsible for the underlying activity of concern, or who may have relevant information to further an investigation. The Financial Action Task Force (FATF)—an international standards-setting body for combating money laundering, financing of terrorism, and other related threats to the integrity of the international financial system—has examined how legal and beneficial ownership information can assist law- enforcement and other competent authorities. FATF was established by the group of seven economic summit partners, known as the G7, of which the United States is a member, and the Treasury’s Office of Terrorist Financing and Financial Crimes leads the U.S. delegation to FATF. FATF developed a series of 40 recommendations, last updated in 2019, that are recognized as the international standard for combating of money laundering and the financing of terrorism and proliferation of weapons of mass destruction. Specifically, FATF Recommendations 24 and 25 call on member countries to ensure the availability of adequate, accurate, and timely information on the beneficial ownership of corporate vehicles that can be accessed by competent authorities in a timely fashion. To the extent that such information is made available, it may help financial institutions and other organizations to implement the due-diligence requirements on corporate vehicles including to identify the beneficial owner and to identify and manage financial crimes risks, including sanctions requirements. Internal controls help entities fulfill their mission and objectives while safeguarding assets and ensuring proper stewardship of public resources. According to federal internal control standards, managers are responsible for an effective internal control system, which increases the likelihood that an entity will achieve its objectives. Additionally, managers are responsible for proactively managing risks, including fraud risks and misconduct such as waste and abuse, to facilitate the entity’s mission and strategic goals by ensuring that taxpayer dollars and government services are being used for their intended purposes. The Fraud Reduction and Data Analytics Act of 2015, enacted in June 2016, required federal agencies to establish financial and administrative controls for managing fraud risks. These requirements are aligned with leading practices outlined in A Framework for Managing Fraud Risks in Federal Programs (Fraud Risk Framework). GAO’s Fraud Risk Framework outlines leading practices to prevent, detect, and respond to fraud risks. As depicted by the larger circle for prevention in the sidebar, preventive activities generally offer the most cost-efficient use of resources, since they enable managers to avoid costly and inefficient recovery activities following fraudulent transactions. Therefore, leading practices for strategically managing fraud risks emphasize risk-based preventive activities. FAA reviews registry applicant information for completeness and compliance with regulations—generally accepting self-certification of eligibility and aircraft ownership—but does not verify this information or collect key information on applicants and aircraft owners, according to our review of the registry process. This limits FAA’s ability to prevent fraud and abuse in aircraft registrations, which has enabled aircraft-related criminal, national security, or safety risks, according to our case-study review. Specifically, FAA’s review of aircraft registrations and dealer certifications primarily focuses on ensuring that applicants provide required documents and that forms are complete. Additionally, FAA requires limited personally identifiable information (PII), and it generally does not use that information to verify applicant information. The registry is further vulnerable to fraud and abuse when applicants register aircraft using opaque ownership structures that limit transparency into beneficial owners of aircraft. FAA’s approach has focused on obtaining and recording the required documents, and consequently, FAA has not identified fraud risks, their likelihood and impact, the suitability of controls, and other aspects of a fraud risk assessment that would support fraud prevention activities. As a result, FAA is limited in its ability to ensure registrant eligibility and prevent fraud and abuse and associated criminal, national security, and safety risks involving U.S.-registered aircraft. FAA generally accepts certification by applicants of their eligibility and aircraft ownership and performs limited review of applicant information to identify potential fraud or abuse. Specifically, FAA requires applicants to submit signed documents that attest to the requirements relevant to their registration type, including U.S. citizenship, resident alien status, or eligibility as a noncitizen corporation. Where owners are LLCs or trusts, applicants submit documentation that the entity is organized under U.S. or state laws. Additionally, applicants must submit evidence of aircraft ownership, such as a bill of sale, and attest to their ownership of the aircraft. According to FAA policy, by signing the application form, applicants certify to the truthfulness and accuracy of the information provided and that they understand that knowingly and willfully submitting documents to FAA with false, misleading, or fraudulent information could subject the person to criminal penalties and revocation of the aircraft registration. FAA collects applicants’ name and address, although according to officials, it accepts this information as factually valid and does not make an attempt to detect intentional fraud at the time of application. FAA does not require or collect other PII, such as the applicant’s date of birth or driver’s license information for individual applicants, or taxpayer identification numbers and state of incorporation for legal and corporate entities, for identity verification or record keeping. FAA collects some PII in the airmen registry, such as for pilot licensing, but it does not use this information for aircraft registration verification purposes. Use of PII is a key way federal programs verify the identity and eligibility of potential beneficiaries. FAA’s policy is to review documents for acceptability during the initial registration. This includes, for example, checking for internal discrepancies within the documents submitted, ensuring that documents are complete, and that the self-certification is signed. For previously registered aircraft, FAA also reviews prior bill of sale documents for inconsistencies in the chain of ownership. Where owners are corporations with complex ownership structures, such as LLCs that are owned by other LLCs, registry officials may request review by FAA’s legal counsel to confirm eligibility. FAA’s legal counsel may also review documentation provided by noncitizen corporations as well as trust agreements and related documents for registrations involving noncitizen trusts, statutory trusts, and corporations using voting trusts to meet U.S. citizenship requirements at the time of registration. In these cases, according to FAA officials, FAA legal counsel reviews documentation to ensure that the entity is organized under U.S. or state laws and may periodically perform spot checks by contacting a Secretary of State office to confirm the existence of an entity. However, where the owner is a U.S.-citizen corporation, FAA generally does not request or review articles or certificates of incorporation to ensure the entity is organized under U.S. or state laws. In addition, FAA does not require or review additional documentation for individual, partnership, and government registration types. For these applicants, FAA checks (1) all sections of the application form for completeness, (2) chain of ownership, and (3) that applicants self-certify their U.S. citizenship. Further, according to FAA officials, when FAA informs applicants of its unfavorable determination, such as when reviewing LLC documentation, for example, applicants are generally provided an opportunity to remedy deficiencies and resubmit their applications. According to FAA officials, FAA applies the same scrutiny to resubmissions as it does to initial applications. In addition, FAA does not review documents for eligibility when individuals certify that there have not been any changes since initial registration. As with aircraft registrations, FAA does not verify dealer identity, check for prior relevant violations, or enforce requirements associated with dealer certificates, such as verifying that dealers are substantially engaged in manufacturing or selling aircraft or only operating domestically, except when delivering an aircraft to a foreign purchaser. Furthermore, FAA regulations do not prescribe enforcement mechanisms to ensure continued dealer eligibility once approved or at the time of certificate renewal. Law-enforcement and FAA LEAP agents told us that dealer certificates is an area in need of greater oversight because dealer certificate applications have been falsified similar to other aircraft registrations, as discussed below. Additionally, FAA LEAP agents told us that they have identified instances of dealers acting as nominees on behalf of foreign entities, registering aircraft under their U.S. dealer certificate. The use of a nominee is an invalid means to register an aircraft, including for dealers. FAA LEAP agents noted that, in their experience, this practice may have enabled otherwise ineligible foreign entities to meet aircraft registration citizenship requirements. In our case studies and interviews with FAA, we identified examples of fraudulent registrations and potential abuse of the registry that occurred within the context of FAA’s current practice of limited verification and review of applicant information. In addition, our analysis of address data and investigation of selected addresses highlights the risks of abuse arising from FAA’s approach of not verifying address information. The examples below illustrate some of the risks associated with FAA not verifying: (1) applicant identity, (2) ownership, and (3) address information. Applicants falsified identities and registration self-certification. A 2017 case involving an aircraft registered through a falsified identity illustrates inherent risks of not verifying applicants’ information and identities, such as through PII or other checks. According to FAA documents, an applicant registered an aircraft as an LLC owner with supporting documents identifying two individual members. In registration documents, the applicant provided the name of a stolen identity for the first LLC member’s name and “John Doe” for the second. FAA accepted the registration information as factually valid and the aircraft remained legitimately registered for about 1 year. A DEA and FAA LEAP investigation of aircraft operating outside the United States eventually discovered the falsification. When FAA LEAP agents contacted the first named individual of the LLC, he affirmed that he was not a member of the LLC, never owned an aircraft, and never executed any documents to register an aircraft in his individual capacity or on behalf of a business entity. FAA LEAP determined that the stolen identity had been used to submit aircraft registration paperwork without the individual’s knowledge or consent. Accordingly, FAA revoked the aircraft registration, finding that the registration was invalid because the applicant’s interest in the aircraft was created by a transaction that was not entered into in good faith. This revocation was associated with a broader effort by DEA and FAA involving international operations of multiple U.S.-registered aircraft that resulted in aircraft and cocaine seizures, discussed later in this report. Aircraft broker fraudulently registered multiple aircraft for bank loan fraud scheme. A 2013 case involving an aircraft sales broker and dealer who was convicted of making a false statement to FAA in registering aircraft, among other convictions, illustrates risks associated with FAA’s reliance on self-certification and limited review of ownership information. In this case, the broker submitted fraudulent registration applications and bills of sale to FAA using forged signatures for over 20 aircraft as part of a multi-million-dollar bank fraud scheme. FAA accepted the broker’s self- certification as factually valid. The broker used the registration certificates that FAA had provided as an asset to support a loan application that resulted in a $3 million bank loan for his failing aircraft sales business. The bank uncovered the fraud over a year after the sales broker first submitted to the bank fraudulent aircraft registration documents to execute the bank loan. A subsequent investigation by the Federal Bureau of Investigation revealed the extent of the fraud, namely that the main thrust of the fraud scheme was to pledge 22 aircraft as collateral, which neither the broker nor his company owned, in order to obtain money from the bank. As a result of the fraud, some of the rightful owners of the aircraft experienced difficulty reinstating aircraft registrations in their names. For example, one owner told federal investigators that he could not fly his aircraft for 2 years because the registration of his aircraft was in the name of the fraudulent broker. This aircraft broker was also a licensed dealer, who held and renewed a dealer certificate during the time he was perpetrating his illicit scheme submitting fraudulent aircraft registrations to FAA. Noncompliant addresses. We also identified registrations with potentially noncompliant addresses and addresses that did not match USPS postal verification data in our analysis of FAA’s publicly available and ancillary registry data files. Our analysis illustrates noncompliance risks associated with FAA’s approach of not verifying physical address information as well as safety and security risks associated with FAA’s ability to readily identify or contact owners when issues arise. FAA regulations require that owners submit physical address information in their application forms. According to FAA policy, a physical address is needed so that the owner can be located, if necessary, for security or safety reasons. According to FAA officials, FAA will accept the use of a mail drop or a registered agent’s address as a mailing address, provided the physical address is included. However, our analysis of 2018 physical and mailing address data shows that over 2,000 (about 1 percent) of addresses list a mail drop location without a physical address, which does not comply with FAA’s requirement. We selected seven of these cases for further verification using online and subscription database research, including three for site inspection. In our review of seven selected cases based on categories of addresses and locality, we identified three cases in which a physical address was not provided by registrants. Through a site inspection for one of the selected cases, we were able to confirm a UPS Store location was provided as the mailing address, and no physical address was provided as required by FAA policy. (See sidebar.) For the remaining two cases, the registrants provided the addresses of the registered agents that likely facilitated the application on behalf of the registrants, but no physical addresses were provided. The address of one of these registered agents is the same address we identified in a case study discussed later in this report. In that case, FAA registry officials were not able to get in contact with the owner, who used a registered agent address, after the aircraft had crashed outside the United States. The aircraft was being operated by a foreign government, following its seizure on drug trafficking charges. FAA sent multiple letters to the owner to deregister the aircraft and also when the aircraft registration was expiring, but all were returned as refused by the registered agent. As discussed later, the use of a registered agent address may provide a layer of anonymity in aircraft ownership and pose challenges when FAA or law-enforcement agencies need to contact registered owners. The address of this mail drop location was used in one of the aircraft registration cases we selected for postal address verification, inconsistent with Federal Aviation Administration policy. Additionally, we selected five dealer addresses for further review. We found that in three cases physical addresses were provided on the certificate application forms as required. In two remaining cases, we cannot make any conclusions regarding the validity of the physical addresses provided because we could not confirm through our online and subscription databases whether the companies were or were not located at the physical addresses provided to the registry. In addition to fraud and abuse risks posed by limited verification and review of applicant information, the registry faces risks associated with nominee registrations. As noted above, use of a nominee is an invalid means to register an aircraft and involves a person or business acting on behalf of an ineligible owner, as shown in the following example. Fraudulently registered aircraft linked to notorious cartel. A 2016 case involving the use of a nominee to register an aircraft on behalf of an ineligible owner illustrates risks of registration fraud by individuals and entities misrepresenting their aircraft ownership. In this case, law- enforcement officials received information that an aircraft was in the process of being purchased by a foreign national. A U.S. corporation, acting on behalf of entities known to have ties to the Sinaloa Cartel, purchased the aircraft, filed registration documents for it, and represented itself as the aircraft owner. According to court documents, by registering as the aircraft owner, the nominee corporation concealed the otherwise ineligible non–U.S. citizen ownership of the aircraft by entities with Mexican drug cartel ties. FAA accepted the registration and registered the aircraft in 2014. A law-enforcement agency, which was aware of the scheme, seized the aircraft shortly after final payment was made on it. Law-enforcement investigation into this case also revealed that some of the same entities had previously been involved in similar schemes involving aircraft purchases and registration associated with drug trafficking. The aircraft was subsequently forfeited to the federal government because its registration was fraudulent and it was purchased with assets derived from wire fraud, money laundering, or other unlawful activities. As part of its IT modernization effort, FAA identified some risks to the aircraft registry, such as financial fraud and terrorist access. FAA officials have also pointed to various FAA LEAP and law-enforcement activities directed at managing these risks, as discussed later in this report. These are reactive measures, and the current process—which accepts applicant information at face value—is not designed to identify and prevent fraud and abuse. Preventive activities generally offer the most cost-efficient use of resources because they enable managers to avoid a costly and inefficient “pay-and-chase” approach. According to federal internal control standards, managers should identify, analyze, and respond to risks. Furthermore, GAO’s Fraud Risk Framework emphasizes risk-based preventive activities that are based on a comprehensive, documented risk assessment that identifies risks, assesses them, and develops a strategy to address analyzed risks, including periodic assessments to evaluate continuing effectiveness of the risk response. To identify risks, managers should consider the types of risks, including both inherent and residual risks. To assess risks, managers should estimate the significance of a risk by considering the magnitude of impact, likelihood of occurrence, nature, and tolerance of the risk. Managers should then design overall risk responses for the analyzed risks based on the significance of the risk and defined risk tolerance. According to FAA officials, FAA has not conducted such an assessment, which would better position it to design and implement risk-based preventive and other controls to manage these risks. As our case studies and illustrative examples demonstrate, this has enabled illicit actors to defraud and abuse the registry, with criminal and national security consequences. In addition, federal internal control standards call for agency management to design control activities to achieve objectives and respond to risks, including designing a variety of transaction controls, which may include verifications, reconciliations, and authorizations. As discussed in the Fraud Risk Framework, a leading practice to effectively prevent instances of potential fraud is for managers to take steps to verify reported information, particularly self-reported data and other key data necessary to determine eligibility. According to FAA officials, the law directs FAA to register an aircraft or issue a dealer certificate that meets eligibility requirements, but does not require FAA to verify the accuracy of the information included in the registration application. Yet without such a review to verify applicants’ information, FAA cannot be assured it is appropriately determining eligibility for the approximately 71,000 applications the registry processes annually. In turn, this limits FAA’s ability to prevent fraud and abuse of the registry from registrants engaged in illicit activities. Aircraft Registration and Dealer Fees Aircraft registration costs $5 and a dealer certificate costs $10 for initial application and $2 for additional certificates. While these fees are attractive to aircraft owners and dealers for economic reasons, we previously determined that the registration fee, in place since 1964, did not cover the cost of reviewing and processing an application. Considering only inflation adjustment, the $5 fee would be $41 in 2019 dollars, which may still be short of what the Federal Aviation Administration (FAA) would need to cover its expenses. FAA has been working to increase registration-related fees since 2013. According to FAA officials, FAA is evaluating regulatory strategy in light of registry information technology modernization and considering other regulatory priorities. According to FAA officials, although they have the authority to collect information for verification purposes, they do not have the tools and resources to do so. With respect to tools, as noted earlier, FAA is making plans to modernize registry operations by implementing streamlined and automated processes where registration information is submitted electronically. According to FAA officials, this is expected to improve online data availability and allow for cross-checking information with other data sources, such as other government databases. With respect to resources, FAA collects a fee that is intended to cover registration processing activities. However, the registration fee has remained the same—$5—since 1964, and for many years has not covered FAA costs associated with registration processing. In a 1993 report, we estimated that FAA had forgone about $6.5 million in fees since 1968 because the registration fee did not cover the cost of reviewing and processing an application. Since that time, U.S. taxpayers have subsidized the processing of aircraft registrations and dealer certificates, including legal analysis, and covering the costs of labor, technology, postage, and other direct and indirect expenses. GAO’s federal user fee guide states that fee collections should be sufficient to cover the intended portion of program costs over time, including factors such as inflation. (See sidebar.) Without a fee that keeps pace with inflation and covers the cost of collecting and verifying applicant information for these high-value assets, FAA passes these costs on to U.S. taxpayers and limits the resources available for applicant verification. Individuals or entities may use opaque ownership structures—a legitimate means to register aircraft—to disguise potential ineligibility or hide illicit activity, according to our illustrative case and intermediary research, and interviews with FAA and law-enforcement officials. Opaque ownership structures are legitimate business structures that are widely used by corporations and individuals to facilitate commerce as well as for asset and tax management. However, we identified cases where these structures were used to name legal entities or trusts as the owner of an aircraft to disguise potential ineligibility or provide layers of anonymity in support of illicit activity. The lack of transparency related to these registrations also creates challenges for safety and law-enforcement investigators seeking information about beneficial owners of aircraft to support timely investigations, according to these officials. On the basis of interviews with FAA LEAP, SEIT, and law-enforcement officials, we identified four types of ownership structures that can be used to register an aircraft so that the beneficial owner is not transparent. The four types can be used alone or in combination and include the use of (1) LLCs, (2) shell companies, (3) noncitizen trusts, and (4) U.S. citizen corporations using voting trusts. According to our analysis of the registry’s calendar year 2018 data, although not mutually exclusive, there were 54,549 aircraft registered to LLCs; approximately 2,300 aircraft registered to likely shell companies; 3,300 registered as noncitizen trusts, and 4,200 registered to U.S. citizen corporations using voting trusts. The four types of opaque ownership structures are often established by intermediaries— individuals and entities that facilitate aircraft registration for a fee, such as by establishing legal structures and submitting aircraft registration applications and renewals. (See sidebar.) The use of intermediaries adds a layer of opacity to aircraft registrations. Intermediaries may not know, and most are not required to know, beneficial owners of aircraft they help to register. However, intermediaries that are banks are required to establish due diligence procedures for accepting and monitoring their clients as part of banks’ anti-money-laundering requirements under the Bank Secrecy Act and its amendments. To obtain beneficial ownership information, banks must identify and verify the identity of any individual who owns 25 percent or more of a legal entity, and an individual who controls the legal entity. Other intermediaries are not required to establish due-diligence procedures for accepting and monitoring their clients. Another approach that adds opacity to aircraft registrations is when applicants use the address of a registered agent—a person or entity authorized to accept service of process or other important legal and tax documents on behalf of a business—as the applicant’s address. Although the use of opaque ownership structures, intermediaries, and registered agents can serve legitimate purposes, they can also be abused in the context of aircraft registration to disguise potential ineligibility or hide illicit activity, according to our analysis of registry data and research. (See app. IV for additional details on the use of opaque ownership structures for aircraft registration.) In our analysis of illustrative cases involving U.S.-registered aircraft and our intermediary research, we identified examples where opaqueness and complexities of aircraft registrations using the ownership structures hindered FAA’s ability to prevent abuse of the registry to facilitate other criminal activity. In these examples, intermediaries used mechanisms allowable under current registration requirements to register aircraft, sometimes using multiple ownership structures for the same registration. The first example, based on our review of FAA registration records, illustrates opaqueness of information contained in FAA registration records and includes the use of multiple intermediaries and jurisdictions for an aircraft associated with asset forfeiture. The second example illustrates the use of an intermediary in establishing opaque ownership structures for several aircraft involved in illicit activities, including actions subject to U.S. sanctions. Use of multiple intermediaries and jurisdictions to obscure ownership of aircraft. According to our review of registry documents for this case, an intermediary registered the aircraft in 2010 using a noncitizen trust, providing limited information about the corporate trustor, whose beneficial owner was a high-net-worth foreign national. To register the aircraft, the intermediary—a bank providing corporate owner trustee services for aircraft registrations—established the noncitizen trust. The trust agreement identified the trustor as a company established in the British Virgin Islands. The trustor’s address for correspondence was listed as a post office box in Switzerland, with an email address indicating another trust company. Signatures of two trustors, identified as directors of two other apparent intermediary companies, were illegible and omitted printed names of individuals (see fig. 6). In 2019, the foreign national consented to the forfeiture of this aircraft and other property to DOJ in exchange for the release of certain other frozen assets, with both parties agreeing that the agreement did not constitute a finding of guilt, fault, liability, or wrongdoing. Use of an intermediary to obscure ownership of multiple aircraft. Between 2011 and 2018, an intermediary set up various corporations to facilitate aircraft registrations. The intermediary was an attorney who established the corporations using a registered agent service and also established voting trusts for those corporations to meet U.S. citizenship requirements for the aircraft registrations. Acting as director of these corporations, which have indicators of being shell companies, he registered two aircraft in 2011 and 2013. In 2019, individuals associated with these companies were sanctioned by OFAC as part of a U.S. sanctions program. Specifically, the individuals were designated in connection with paying bribes and involvement in a corruption scheme designed to take advantage of Venezuela’s currency exchange practices. The intermediary facilitated an aircraft sale about a month prior to the OFAC sanction designation for one aircraft and resigned from his position as director of the other company upon the OFAC announcement. Another aircraft registered by a company with the assistance of this intermediary in 2012 was seized in 2016 and forfeited to the U.S. government as part of the black-market currency exchange scheme. The investigation revealed that the aircraft had been purchased by a U.S. corporation whose sole beneficial owner was a Venezuelan individual using proceeds from a scheme that involved black-market currency exchange. The U.S. government seized the aircraft, alleging it was purchased with assets traceable to money laundering or other illegal activities, and the aircraft was later forfeited. Through our research on intermediaries, we identified another aircraft in which this intermediary had been similarly involved. Registration documents for this aircraft indicate a pattern of activity associated with potential trade-based money laundering. We are making a referral to DHS HSI for further investigation to determine whether individuals associated with the aircraft may have engaged in unlawful activity. Opaque ownership structures pose challenges for law-enforcement investigations. According to the 2018 National Money Laundering Risk Assessment, federal law-enforcement agencies noted that misuse of legal entities posed a significant money laundering risk and that law- enforcement efforts to uncover beneficial owners of companies can be resource-intensive, especially when ownership trails lead outside the United States or involve numerous layers. Law-enforcement officials across multiple agencies and FAA ASH, LEAP, and SEIT officials noted that challenges identifying beneficial owners of aircraft can impede their investigations. According to FAA LEAP agents, it is an ongoing challenge for them to identify beneficial owners. For example, according to FAA LEAP agents, a secretary of a company frequently registers aircraft on the company’s behalf and it takes time to determine the identity of the company’s beneficial owner. Limited PII in the registry records further impedes law-enforcement efforts. FAA LEAP agents and law-enforcement officials from DHS HSI and DEA described challenges they experience in their investigative work because aircraft registration records do not contain relevant PII, as noted above. For example, according to LEAP agents, they experience daily challenges identifying individuals without PII, particularly those with common names, hyphenated names, and multiple last names. This can be particularly difficult when aircraft are registered through legal structures, and, as DHS HSI officials noted, penetrating through the layers of ownership can take time, slowing down investigations. Further, one DEA official stated that without PII, identifying beneficial owners of aircraft is a challenge in his investigations, and in two cases he was ultimately unable to identify beneficial owners of aircraft. In prior work, we reported on challenges that law-enforcement officials face in their investigations when information is not available, particularly company ownership information such as names of directors or officers. As discussed earlier, the FAA DEA Act required FAA to promulgate regulations—in consultation with other federal agencies, law-enforcement officials, and representatives of the general aviation industry—that would require individuals to provide driver’s license and taxpayer identification numbers, but did not require applicants to provide date of birth. FAA’s approach, however, did not require applicants to submit driver’s license and taxpayer identification numbers. In part to serve the aviation community, which relies on publicly available registration information for the purchase and sale of aircraft, in 2005 FAA determined that adding PII to the records would require restricting access to them and therefore it would be detrimental to users of aircraft records, burdensome on aircraft owners and the government, and not necessary for law enforcement. FAA’s IT Modernization The Federal Aviation Administration (FAA) is making plans to modernize its information technology (IT) infrastructure for the registry, including potentially revising relevant regulations. According to FAA, it plans, among other things, to (1) enhance service delivery through process improvement and automation for near real-time access to accurate information; (2) utilize technology to reduce or eliminate mail, fax, or paper-driven service requests, processing, and information delivery; and (3) utilize technology to mine data to support risk-based decision-making, including the use of business intelligence algorithms to eliminate fraud, inaccurate information, and inappropriate use. In a May 2019 report, the Department of Transportation (DOT) Office of Inspector General (OIG) assessed FAA’s efforts and plans and determined that the agency has not identified costs, schedule, or an acquisition strategy for IT modernization. DOT OIG recommended, among other things, that FAA develop a timeline for making key decisions to implement IT modernization. See Department of Transportation, Office of Inspector General, FAA Plans To Modernize Its Outdated Civil Aviation Registry Systems, but Key Decisions and Challenges Remain, AV2019052 (May 8, 2019) We recognize the concerns for federal agencies associated with collecting and storing PII as well as the potential burden for applicants to submit such information. However, according to FAA officials, the IT modernization for which FAA is currently in its planning stages is intended to provide FAA the technical capability to adjust the level of access to registry records for various users, restricting PII access for some while allowing broader access to authorized users such as law-enforcement agencies. (See sidebar.) Industry associations and corporate registry users we interviewed expressed concerns about client privacy; however they also indicated openness to future technology improvements of FAA systems. Additionally, as noted earlier, use of PII is a key way federal programs verify the identity and eligibility of potential beneficiaries. Including in the planning stages of IT modernization basic elements of PII such as name, date of birth, physical address, and a driver’s or pilot’s license could provide FAA with the initial capability to verify applicant information while it develops a risk-based approach informed by its risk assessment. According to federal internal control standards, managers should use quality information to achieve the entity’s objectives, including obtaining relevant data from reliable internal and external sources in a timely manner. By not collecting and recording PII at the time of application and renewal, FAA has limited assurance of registrants’ eligibility, and lacks information that could support its oversight and law-enforcement officials’ ability to identify relevant persons and entities as part of investigations involving registered aircraft. As with applicant PII, FAA does not require applicants to submit information on beneficial owners of aircraft—individuals and certain entities that own more than 25 percent of the aircraft. In addition to the federal internal control standards for managers to use quality information to achieve the entity’s objectives, U.S. implementation of international standards for combating money laundering and terrorism financing would need to ensure availability of adequate, accurate, and timely information on beneficial ownership of high-value assets. By not collecting and recording information on beneficial owners in an electronic format that facilitates data analytics, FAA has limited assurance of registrants’ eligibility, and lacks information that could support its oversight and law- enforcement officials’ ability to identify relevant persons and entities as part of investigations involving registered aircraft. FAA makes some use of registry information on a case-by-case basis to detect potential fraud and abuse. FAA LEAP agents, in addition to supporting law-enforcement officials by providing access to registry information and specialized guidance related to aviation issues, have conducted registry analyses to identify suspicious and potentially illicit actors. For example, in 2018, FAA LEAP agents and registry officials started a project to flag aircraft registrations for FAA LEAP monitoring when applications are filed by entities or individuals, such as multiple shell companies associated with a certain individual, suspected of abusing registry processes. Additionally, one FAA LEAP agent told us that he reviews aircraft registrations filed the previous day and checks them against other information sources to determine suspicious activity, sharing leads identified through this analysis with law-enforcement officials for further investigation. However, this case-by-case review is limited to the data and information FAA currently collects, and is further hindered by a data format that does not support data analytics for fraud and abuse detection. FAA collects some information that could support fraud and abuse detection and oversight. As described earlier, FAA collects information on aircraft owners from the registration application, such as name and address, and these data are searchable and electronically analyzable. In April 2018, FAA also began tracking aircraft registrations that use voting trusts to meet U.S. citizenship requirements and trusts with noncitizen trustors, which are opaque ownership structures discussed earlier. This included recording in ancillary files the names of individuals and entities with potentially significant responsibilities for aircraft ownership, such as trustors and voting trustees. Additionally, according to FAA and some industry officials, the 3-year registration renewal implemented in 2010 has helped improve the quality of registry data that FAA collects. According to FAA officials, in addition to updating owner address information, registration renewal improves data quality as it prompts (1) reports of unreported aircraft sales, (2) new registrations due to ownership changes, and (3) cancelations due to destruction, scrapping, and exports. However, the benefits of registration renewal for data-quality purposes could diminish when the renewal period for noncommercial general aviation aircraft changes from 3 to 7 years, in alignment with new requirements from the FAA Reauthorization Act of 2018. Nevertheless, most of the information that FAA collects in the ancillary files and elsewhere is not recorded in a format that facilitates data analytics, according to our review of FAA’s registry system. Specifically, data on individuals and legal entities with potentially significant responsibilities for aircraft ownership such as trustors, beneficiaries, stockholders, directors, and managers are stored as imaged PDF records that, due to information-system limitations, cannot facilitate data analytics. For example, information on LLC directors and managers as well as directors, managers, and stockholders of U.S. citizen corporations that use voting trusts is stored in imaged records. Our intermediary research identified an aircraft registered to a company whose sole stockholder was subject to U.S. sanctions; however, FAA currently stores data on foreign stockholders of U.S. citizen corporations that use voting trusts in PDF records, preventing it from being able to conduct data analysis to identify such individuals or entities for all registrations. Such data may be useful in identifying entities and individuals subject to U.S. sanctions, as discussed below. Additionally, the current system configuration limits FAA to viewing individual records within the ancillary files. This configuration prevents agency officials from tracking aircraft registration numbers—a common identifier—across records or linking them to the registration data portion of the registry. Further, FAA internally tracks noncitizen trusts and U.S. citizen corporations using voting trusts as one category within registry data, preventing analysis and monitoring of each group of registrations. Lastly, FAA stores records of declarations of international operations— requests that expedite registration processing for aircraft intending to travel outside the United States—as imaged PDF records, so information about the aircraft, owner’s name, departure and destination locations, date of intended travel, and name of the individual submitting the declaration are not in a format that facilitates data analytics. According to 2017–2018 analysis of information from declarations of international operations with checks against flight history data, FAA SEIT identified patterns of activity that could be used in support of safety and law- enforcement investigations, as discussed later in this report. Furthermore, due to manual data entry and lack of verification, the registry’s postal data may not support effective data analytics and oversight. FAA staff also have the option to override the formatting prompts produced by its address validation software. Our analysis of 2018 physical and mailing address data found that about 25,000 (9 percent) of all registrant addresses did not match a valid address in the USPS postal verification data, while just over 300 (about 3 percent) of all dealer addresses did not match. Of the seven aircraft registration cases we selected based on address category and locality, we found three registrant addresses that indicated a registry data-quality issue and one that did not. Specifically, our review of the application forms for two registrants showed that a physical address was provided by the registrants, but was not recorded in the physical address file. In another case, our review of five registration records for one company showed that FAA revoked registrations for the five aircraft in 1971, but did not deregister them until 2019, sending deregistration notification letters to the original address, which were returned as undeliverable. We did not find any noncompliance in the last case and, based on our review of aircraft registration documents, determined that a change of address form was provided to FAA following the most-recent renewal, but the new address had not yet been updated at the time we received the physical address data. As described earlier, FAA is taking steps to modernize its IT system for the registry because it is outdated. According to a recent DOT OIG report, the system had its last significant upgrade in 2008, is approaching the end of its service life, suffers intermittent outages, and uses an outdated programming language. According to FAA, the future system is expected to streamline and automate processes, allow for the submission of electronic forms, improve online data availability, and implement additional security controls, such as software that can cross-check aircraft registrations with other government databases. In December 2018 and June 2019, FAA issued requests for information to conduct a market survey and to develop a strategy based on feedback received, respectively. As of November 2019, FAA was making plans to issue a request for proposal, but did not identify specific time frames. Registry system modernization presents an opportunity to mitigate data format limitations as FAA designs new systems and controls. According to federal internal control standards, managers should use quality information to achieve the entity’s objectives. Managers can do that by designing processes and identifying information requirements needed to achieve objectives and address risks as well as by processing obtained data into quality information that supports the internal control system. This could include electronically analyzable information from declarations of international operations and information on owners and related individuals and entities with potential significant responsibilities for aircraft ownership such as beneficial owners, trustors, trustees, stockholders, directors, and managers. Without analyzable data on significant parties involved in aircraft registrations that can be linked through a common identifier, FAA is limited in its ability to exercise its domestic and international oversight functions and fully support safety and law-enforcement investigations. Use of data analytics to detect suspicious activity, anomalies, or patterns is one of the leading practices identified in GAO’s Fraud Risk Framework. However, registry officials primarily use collected data to send automated notifications, such as for aircraft renewals, and current use of data to support oversight is limited, in part hindered by data format limitations described earlier. In addition, registry officials do not analyze various external data sources against registry data to detect patterns of potential fraud or abuse. Risk indicators identified through such analyses may serve as points of inquiry for a broader fraud risk assessment, or for further examination of conduct that may pose criminal, national security, or safety risks. To demonstrate how FAA could identify registrations with indicators of potential fraud or abuse that may enable criminal activity, national security, and safety risks, we analyzed aircraft registry and related data. Specifically, we analyzed aircraft registry data from publicly available and ancillary files, as well as matched registry data against other datasets to identify (1) registrations using registered agent address, (2) registrations using opaque ownership structures, (3) aircraft registration addresses located in countries identified by the Department of State as associated with major illicit drug production and money laundering, (4) OFAC data on individuals and entities subject to U.S. sanctions, and (5) NTSB safety accident and incident reports. Based on this analysis, we found over 17,000 registrations out of approximately 300,000 registrations associated with one or more risk indicators for fraud or abuse. The majority of registrations (over 15,000 or about 90 percent) were associated with one risk indicator, about 2,000 registrations (10 percent) were associated with two risk indicators, and the remaining 140 (1 percent) were associated with three or more risk indicators. The results of our various analyses are described below. Use of registered agent address. As discussed earlier, registered agents are authorized to accept legal documents on behalf of a business. According to FAA officials, FAA will accept the use of a registered agent’s address as a mailing address, provided the owner’s physical address is also included. Our analysis of registry data identified cases where a registered agent’s address was recorded as the registrant’s physical address. The registry data do not specifically identify registered agents, but by analyzing address information for calendar year 2018, we identified at least 4,080 cases using registered agents’ addresses. For one of the registered agents we were able to confirm, we identified 965 associated registrations, including about 300 registrations associated with characteristics of a likely shell company or that were a noncitizen trust or a U.S. citizen corporation using a voting trust. Further, for this one registered agent, we identified about 280 unique business names, associated with about 760 registrations, which used this registered agent’s address on aircraft registration applications. Additionally, based on our analysis of postal address data provided by FAA as well as verification of selected cases, we identified and confirmed through site inspections two additional registered agents whose addresses were used in over 100 registrations and over 3,220 registrations, respectively. Use of registered agent addresses, when not accompanied by physical address information, particularly in combination with opaque ownership structures, provides a layer of anonymity to beneficial owners of aircraft and may mask ineligibility or illicit actors. Noncitizen trusts and U.S. citizen corporations using voting trusts. We reviewed internal FAA trust data from April 2018 through May 2019— the full range of data available at the time of our review—to identify the number of registrants that were noncitizen trusts or were U.S. citizen corporations using a voting trust. In total, we found about 6,800 such registrations contained in the registry data. Of these registrations, two were associated with individuals subject to U.S. sanctions, four were associated with an FAA revocation or suspension, and 16 appeared to be shell companies. FAA regulations allow for registrations using noncitizen trusts and U.S. citizen corporations using voting trusts as valid means of enabling registrants to meet FAA’s citizenship requirements. However, as discussed earlier and according to FAA and law-enforcement officials, registrations using noncitizen trusts and U.S. citizen corporations using voting trusts may also mask ineligibility or illicit actors. Consistent with their program-management responsibilities, if FAA registry officials detect aircraft owners, dealers, or intermediaries potentially abusing registration requirements or abusive use of noncitizen or voting trusts, they may send them warnings of denial of future services if observed abusive actions continue. For example, if registry officials suspect that an entity applying for registration is misrepresenting its citizenship, officials could request citizenship information as appropriate for the president, board of directors, and managing officers. If the inquiry results in a determination that the entity does not qualify as a citizen, FAA could deny the application or issue a letter of apparent ineffectiveness for an existing registration. However, according to FAA officials, they take mitigation actions on a case-by-case basis because they do not have a systematic way to analyze data and detect potential fraud and abuse. Department of State country lists associated with major illicit drug production and money laundering. We analyzed registry address data using lists of countries associated with major illicit drug production and money laundering published by the Department of State to identify aircraft registrations associated with such countries. We found 251 registrations with addresses located in countries on the Department of State’s list of money laundering jurisdictions that were registered as noncitizen trusts or corporations using voting trusts. Countries identified in the Department of State’s lists do not necessarily indicate that a registration is associated with criminal activity. However, the risk of abuse or illicit activity with these registrations may be increased when combined with the use of opaque ownership structures, another risk indicator that, according to FAA and law-enforcement officials, may mask ineligibility or illicit activity. U.S. sanctions. We analyzed and matched registry data to U.S. sanctions data that contain information on blocked assets and sanctioned entities and individuals. Through this data analysis as well as illustrative case and intermediary research, we identified six aircraft owned by entities subject to Venezuela-related U.S. sanctions from 2017 to February 2019. These six aircraft involved registrations established by intermediaries using noncitizen trusts or by U.S. citizen corporations using voting trusts, where aircraft were beneficially owned by noncitizen trustors or stockholders of companies using voting trusts to meet U.S. citizenship registration requirements. However, as discussed earlier, trust agreements that contain information on aircraft owners and related individuals and entities with potentially significant responsibilities for aircraft ownership are stored in PDF format that are not electronically analyzable, potentially inhibiting detection of sanctioned individuals or entities. Additionally, our analysis identified limitations in the sharing of sanctions information within FAA, specifically between the aircraft registry and dealer records. These limitations present the risk of registry abuse or illicit activity through sanctions violations while potentially impeding effective coordination between FAA and Treasury’s OFAC, which administers U.S. sanctions programs. On the basis of U.S. national security and foreign policy goals, OFAC can impose controls on transactions and block or freeze assets under U.S. jurisdiction, including aircraft. By blocking an asset such as an aircraft, its title remains with the targeted individual or entity; however, these individuals and entities cannot exercise the powers and privileges normally associated with ownership unless authorized by OFAC. Certain activities related to the use of the aircraft may violate the relevant sanctions program. Additionally, OFAC regulations generally prohibit persons and entities within the United States from engaging in transactions involving blocked property—including U.S-incorporated companies and aircraft—of sanctioned individuals and entities. OFAC-Sanctioned Aircraft One of the U.S.-registered aircraft about which Treasury’s Office of Foreign Assets Control (OFAC) notified the Federal Aviation Administration (FAA) was used as part of an illicit narcotics trafficking scheme. According to its 2017 announcement, OFAC designated a high-ranking Venezuela government official as a Specially Designated Narcotics Trafficker pursuant to the Foreign Narcotics Kingpin Designation Act (“Kingpin Act”) for playing a significant role in international narcotics trafficking. According to OFAC, the sanctioned official used a front man who laundered drug proceeds and purchased assets. In addition to a network of international companies, according to OFAC, the front man owned or controlled five U.S. companies, including a limited liability company (LLC) that registered an aircraft with FAA and used a voting trust to meet U.S. citizenship requirements. As part of its action, OFAC identified the U.S.-registered aircraft and the LLC as blocked property. FAA deregistered the aircraft in 2019 after registration renewal documentation submitted to FAA contained numerous errors. However, because the flags placed on sanctioned individuals’ and entities’ registration records do not extend to dealer records, FAA issued a dealer certificate to the blocked LLC after the OFAC designation and without coordination with OFAC, according to FAA records and officials. The blocked LLC held the dealer certificate for a year until the certificate expired. (See app. I.) FAA relies on OFAC to share information on sanctions and does not check whether applicants and aircraft are subject to U.S. sanctions or blocking at registration, at renewal, or on a periodic basis. Specifically, FAA does not proactively obtain and use OFAC data to detect (1) blocked aircraft, (2) entities or individuals subject to sanctions, or (3) those with potentially significant responsibilities for aircraft ownership, such as intermediaries registering on behalf of blocked aircraft or entities. Our analysis of the six cases revealed that OFAC officials initiated coordination with FAA, notifying FAA about four of the six cases. According to FAA officials, when FAA finds out about a blocking action from OFAC, it internally flags registry records and will withhold registration processing actions until further communication with OFAC. However, according to FAA officials, FAA does not have the authority to deny or revoke a registration solely because the registration is associated with an individual subject to OFAC sanctions. Accordingly, in those instances, FAA would register the aircraft or the aircraft’s registration would remain valid. In addition, although FAA flags sanctioned individuals’ and entities’ registry records, the flags do not extend to dealer certificate records. As a result, sanctioned individuals or entities flagged in aircraft registration records are not flagged by FAA for OFAC coordination before receiving a dealer certificate, which could allow operation of blocked aircraft under that certificate. One of the six cases we identified illustrates the criminal and national security risks involved with the use of U.S.-registered aircraft by OFAC-sanctioned individuals and entities, as well as risk-management challenges associated with dealer certificates. (See sidebar.) OFAC efforts to identify aircraft assets associated with sanctioned individuals and entities can encounter obstacles. According to OFAC officials, they search the publicly available FAA registry to identify aircraft for potential blocking. Where OFAC is aware that a sanctioned individual has control of a company, and the company had directly registered an aircraft, a search of the public database can provide relevant information about the aircraft. However, according to OFAC officials, identifying aircraft is more challenging when, for example, a voting trust or a shell company is the registered owner. As a result, OFAC does not have all the information from FAA it might need to support its investigations or enforcement when aircraft associated with sanctioned entities and individuals are not readily identifiable. FAA’s IT modernization provides an opportunity for FAA to link flagged records across aircraft registration and dealer systems and to proactively check OFAC sanctions data. OFAC provides information on individuals and entities subject to sanctions on its website that can be checked using online searches or by downloading data, but FAA officials said that checking sanctions designations would require resources and extend processing time for aircraft registrations. However, automated linkages across aircraft registration and dealer systems, and checks of OFAC information, could be achieved through FAA IT modernization, which aims to automate near-real time access to accurate information. An aspect of the modernization project could involve automatically cross-referencing sanctions data, which are dynamic and updated in real time in response to U.S. sanctions programs, with aircraft registration information on owners and related individuals and entities with potentially significant responsibilities for aircraft ownership, such as intermediaries. FAA noted that it does not have authority to deny or revoke a registration based solely on an OFAC sanctions designation. Nevertheless, records that are flagged across aircraft registration and dealer systems, as well as awareness of blocked aircraft, sanctioned owners, or intermediaries doing business with sanctioned entities, would help to ensure coordinated actions with OFAC. Such coordination would allow OFAC to seek a delay from FAA of the registration or dealer certification, to alert law- enforcement agencies to determine aircraft location, or to coordinate with its U.S. partner agencies on investigations as appropriate. By not linking flagged records across systems and not proactively checking OFAC sanctions data, FAA and OFAC may be unaware of, and therefore not well-positioned to manage, risks associated with registration of blocked aircraft, sanctioned entities, or intermediaries operating in violation of U.S. sanctions. In addition, FAA misses opportunities to address abuse of the registry for illicit purposes, as well as to provide information to OFAC in support of U.S. efforts to curb drug trafficking, corruption, and other illicit activity. Aircraft primarily operating outside the United States. According to our analysis of NTSB data, we identified 303 cases of U.S.-registered aircraft involved in accidents and incidents outside the United States from calendar years 2010 to 2018. According to FAA officials and our illustrative case research, U.S.-registered aircraft that are primarily based and operated outside the United States may be associated with risk of registration abuse. For example, FAA SEIT and LEAP officials told us that they were aware of numerous cases of aircraft operated primarily outside the United States that were registered to nominee buyers. In addition, they noted international operation of aircraft that were associated with illicit activity and registration violations such as bills of sale identifying foreign owners and cloned registrations. A 2010 case involving a U.S.-registered aircraft seized for alleged drug trafficking by the Panamanian government highlights registration violation risks related to aircraft primarily operating outside the United States. After Panama seized the aircraft, it was turned over to the country’s civil aviation authority (CAA), which registered the aircraft in Panama and painted a Panamanian registration number on it. According to FAA officials, the CAA did not seek to deregister the aircraft from the United States, and the new registration was likely invalid under international law. According to FAA officials, the Panamanian CAA operated the aircraft for about 1 year before it crashed. During that time, the aircraft remained registered to the original U.S. owner at a registered agent address. FAA sent multiple letters to the owner to deregister the aircraft and also when the aircraft registration was expiring, but all were returned as refused by the registered agent. Multiple Safety Violations Contributed to the Crash of an Aircraft Primarily Operating Outside the United States Our research identified a case where safety violations contributed to a fatal accident in the Caribbean involving a U.S.-registered aircraft in 2016. A Jamaican aviation training center was operating the aircraft since 2015 and at the time of the crash. The accident investigation by Jamaican authorities identified multiple safety deficiencies as the causes and contributing factors of the crash. This included falsified aircraft maintenance records, an engine replacement that did not conform to aircraft model and type, and the use of non-U.S.-certified maintenance programs. (See app. I.) Furthermore, aircraft that are based and primarily operated outside the United States may pose safety risks by not meeting FAA aircraft maintenance standards. Once registered with FAA, aircraft owners must continue to meet eligibility requirements and, along with operators, comply with certain maintenance responsibilities in order to operate, regardless of their location. According to FAA officials, U.S.-registered aircraft operating outside the United States may receive less scrutiny and inspections from other countries’ CAAs, and nefarious actors prefer a U.S. registration when aircraft are inspected abroad. Additionally, FAA SEIT and LEAP officials told us that they were aware of many U.S.- registered aircraft primarily operating in Latin American countries that may not be following required U.S. maintenance programs, thus posing aviation safety risks. One of our case studies highlights safety risks related to U.S.-registered aircraft that are primarily based and operated outside the United States. (See sidebar.) In another example involving 2011 and 2013 FAA examinations, an FAA maintenance inspector conducted inspections of U.S.-registered helicopters and airplanes located in Panama at the request of the Panama CAA and found multiple violations. According to FAA, the inspection of 16 aircraft initially found that, in addition to registration issues such as flying with a temporary registration, ten aircraft had maintenance issues, including maintenance performed by nonauthorized personnel. At least seven of the issues identified during this inspection resulted in FAA enforcement actions. According to this official, two of the aircraft had significant maintenance concerns and were not airworthy. On the basis of his experience inspecting aircraft domestically, safety violations among the aircraft inspected in Panama were more significant. In combination with other data sources and information, flight history data can provide indications of safety risks associated with aircraft based and primarily operated outside the United States. However, according to registry officials, they do not use these data to identify such risks. To examine specific registrations based on the entire risk-indicator data analysis, we also reviewed randomly selected aircraft registrations across each overall risk-indicator category. Our review of 20 selected registrations generally confirmed the risk-indicator characteristics we had identified for analysis. We did not identify further indicators of risk as part of this review except for the OFAC cases described earlier. Analysis of various data sources, alone or in combination, can help detect patterns of potential fraud or abuse. As demonstrated by our analysis, FAA data, such as postal addresses, information on dealers, noncitizen corporations, intermediaries, and entities with significant responsibilities for aircraft ownership, among others, along with various external databases could be used for such a purpose. FAA also has access to flight history data, currently used on an ad hoc basis, but which could also serve for (1) routine oversight functions such a verifying aircraft are based and primarily operating in the United States for certain registrant types or (2) to detect patterns of activity associated with declarations of international operations that could be used in support of safety and law- enforcement investigations. In addition, our analysis of registry data against external data sources, such as OFAC sanctions lists, illustrates the utility of such analyses for detecting registrant risks. FAA currently does not use internal or external information for such analysis or to assist in safety or law-enforcement oversight responsibilities across multiple aircraft, registrations, or dealer certificates. This is due, in part, to data limitations, but also because, according to registry officials, their role is primarily focused on recording of aircraft registration information. Aircraft registration data made available through IT modernization, as well as other currently available data, could support ongoing monitoring and risk- based oversight by FAA. Federal internal control standards call on managers to establish and operate activities to monitor the internal control system and evaluate results. By not analyzing available internal and external data, FAA is missing opportunities to identify registrant risks, conduct oversight, and safeguard the registry from potential fraud and abuse. Furthermore, while FAA registry officials may take risk-based mitigation actions, such as by sending warnings letters or denying services if abusive actions are detected, it generally does not take such action. According to FAA officials, the registry focuses on recording information, while it is currently the responsibility of other FAA organizations, such as ASH, LEAP, and SEIT, to detect fraud. However, federal internal control standards require managers to respond to risks by remediating internal control deficiencies on a timely basis. Without timely and measured risk-based mitigation actions, the aircraft registry continues to be vulnerable to fraud and abuse. In this context, as the key program office, aircraft registry is best positioned to manage fraud and abuse risks—by preventing, detecting, and responding to risks—in close coordination with stakeholder organizations such as ASH, LEAP, and SEIT. FAA and law-enforcement agencies have a variety of enforcement mechanisms to respond to instances of suspected fraud and abuse in aircraft registrations. For example, FAA can use administrative actions, such as aircraft registration suspensions and revocations, and law- enforcement agencies can use civil actions and criminal prosecutions to seize aircraft, among other enforcement actions. Law-enforcement agencies such as DEA, DHS HSI, and DOT OIG have authority to investigate criminal activity and take actions to seize aircraft when warranted. Recognizing the need for better dialogue and coordination, in August 2017 FAA LEAP agents launched the Aircraft Registry Task Force to discuss ideas and solutions for dealing with potentially fraudulent aircraft registrations and to improve FAA processes to assist the law-enforcement community. The first meeting, in August 2017, included participants from FAA—aircraft registry officials, legal counsel, ASH, LEAP, and SEIT—as well as other federal agencies, including DEA and DHS HSI. This meeting was the first time these various units came together to discuss aircraft registry vulnerabilities. FAA and law-enforcement officials presented cases associated with fraudulent aircraft registrations, highlighting safety implications. Participants also discussed issues related to deregistration, and aircraft seizures, among others. According to aircraft registry officials and FAA LEAP agents, the task force meeting discussions resulted in several changes, including revisions to the signature block in the aircraft application form, addition of a separate registration type for LLCs for tracking purposes, and sharing of declarations of international operations with FAA LEAP and SEIT. Specifically, regarding modifications to the signature block, in 2018 FAA added a statement requiring applicants to certify that information they provide is true and accurate while also identifying specific penalties for false information. The subsequent task force meeting, held in October 2018, included only FAA participants. Aircraft registry officials, legal counsel, ASH, LEAP, and SEIT, among others, discussed follow-up from the previous meeting and covered topics associated with ongoing concerns such as falsification of registration documents, incomplete applications, and proof of citizenship, among others. According to FAA officials, since the October 2018 meeting, the task force has not met. FAA and DEA have also established informal mechanisms to address registration violations and safety risks associated with aircraft based and operated outside the United States. For example, in 2016 and 2017, DEA and FAA LEAP and SEIT officials conducted a joint initiative at the request of the government of Guatemala to examine multiple U.S.- registered aircraft located in Guatemala. According to FAA, a total of 81 U.S.-registered aircraft were inspected through this effort as of April 2017. During the inspections, FAA identified more than 25 registration violations and numerous safety violations resulting in approximately 31 condition notices. Additionally, authorities seized eight aircraft with an approximate value of $2.5 million as well as over 400 kilograms of cocaine. According to FAA, registration violations identified during this effort included inconsistencies with trust agreements and associated documentation, violations involving U.S. corporations having individuals listed as president who do not meet U.S. citizenship requirements, and documentation allowing non-U.S. citizens to control U.S.-citizen entities that had registered aircraft. Since then, according to FAA officials, on the basis of the results of this initiative, DEA and FAA officials have conducted similar visits to other countries in Latin America and the Caribbean. The visits typically include training for local CAA officials on authorities to inspect U.S.-registered aircraft, ramp checks of U.S.- registered aircraft located in these countries, and maintenance inspections. FAA and DHS HSI also use informal collaboration mechanisms to support law-enforcement investigations. According to DHS HSI officials, they have a robust relationship with an FAA LEAP agent with whom they communicate on a daily basis. This agent has helped to investigate aircraft sale transactions and other cases and also provided leads to DHS HSI officials. Declarations of International Operations The Convention on International Civil Aviation requires registration certificates for international operations. The Federal Aviation Administration’s typical registration process takes 16–20 working days, during which applicants may fly domestically using a temporary registration. Registry officials have put in place declarations of international operations for applicants to notify the registry of the intent to operate internationally thereby expediting typical processing time to the same day or next day. FAA registry officials have been sharing expedited registration filings— declarations of international operations to expedite registration processing for aircraft intending to travel internationally—with FAA LEAP and SEIT officials for monitoring and analysis purposes. (See sidebar.) However, this informal collaboration does not extend to FAA sharing of declarations of international operations with DHS HSI or DEA. According to law- enforcement officials, declarations of international operations present challenges. Specifically, DEA officials noted that expedited registrations limit the amount of time law enforcement can effectively query appropriate sources of information to determine that payment for the aircraft is not derived from illicit proceeds. In addition, according to DEA officials, expedited registrations shorten the amount of time investigators have to determine whether the aircraft is being used to facilitate drug crimes and to identify beneficial owners of the aircraft, which, as discussed earlier in this report, can be a time-consuming process. The lack of notification about declarations of international operations further compounds these challenges. DHS HSI officials explained that they have experienced challenges not receiving information from expedited registrations, which could have allowed some illicit actors to expediently move or export aircraft out of the country, including as part of trade-based money laundering or trafficking schemes. According to these officials, aircraft can be purchased with illicit proceeds to launder money as well as used to smuggle illicit cargo such as persons, cash, cigarettes, and liquor. DHS HSI officials stated that, in one case, which resulted in aircraft seizure, the aircraft potentially could have been seized 2 years earlier if they had received declaration of international operations at the time of aircraft registration. Additionally, according to DHS HSI officials, information from declarations of international operations could help to generate leads, including information on planned travel to countries that are associated with illicit drug trafficking or money laundering. For example, they noted that in investigations of trade-based money laundering schemes, information from declarations of international operations can be used to check against shipping export declarations and trade data from other countries. Separately, in our analysis of aircraft registered to entities subject to U.S. sanctions described earlier, we found that five of the six aircraft registrations received expedited processing. Although not a precise indicator of actual travel, information from declarations of international operations could provide timely information about potential planned movement of aircraft in time-sensitive situations as well as bring awareness for longer-term investigative purposes. Expedited registrations provide more immediate opportunity to move aircraft out of the country and information on applicants’ intention to do so, which can inform monitoring and law-enforcement action. However, FAA does not provide declarations of international operations to DHS HSI or DEA. Without declarations of international operations, these law-enforcement entities may be missing opportunities to generate leads that would ultimately support FAA’s interests in addressing abuse of the registry for illicit purposes and support detection and response to potential trade-based money laundering and other cross-border schemes. Our prior work on interagency collaboration identified practices that can help enhance and sustain collaboration among federal agencies, including written agreements and use of liaison positions. Agencies that articulate their agreements in formal documents, such as memorandums of understanding, can strengthen their commitment to working collaboratively. Additionally, articulating a common outcome and roles and responsibilities in a written document can facilitate coordination. Similarly, the use of liaison positions, when an employee of one organization is assigned to work primarily or exclusively with another agency, can enhance coordination. For example, by providing direct access to agency information, liaison positions have helped to facilitate sharing of information and coordination of missions and activities. As relatively new and unofficial collaboration mechanisms, the Aircraft Registry Task Force and other efforts have not been fully utilized or leveraged some of the enhanced collaboration practices such as written agreements or liaison positions at law-enforcement agencies. While FAA LEAP agents coordinate with law-enforcement officials, these are not liaison positions as suggested by leading practices for collaboration, wherein an employee is assigned to or works primarily with another agency and has direct access to agency staff and information, and arrangements are formally outlined, such as in memorandums of understanding. Rather, FAA LEAP agents are assigned to FAA and do not have formal agreements for collaboration. The Aircraft Registry Task Force holds potential for FAA to work collaboratively internally and externally by formalizing various informal coordination efforts, such as international inspections by FAA and DEA and sharing of declarations of international operations with law-enforcement agencies, to bring together varied perspectives, functions, and skill sets necessary to mitigate aircraft registry vulnerabilities going forward. Leading practices in risk management also call for involvement of relevant stakeholders as part of risk-assessment and risk-mitigation activities. In the FAA context, the aircraft registry is best positioned to develop preventive measures and controls in coordination with FAA LEAP, SEIT, and law-enforcement stakeholders. FAA’s aircraft registry, the largest in the world, is preferred by aircraft owners for safety, economic, and financial reasons. Accordingly, the integrity of owner information for registry users is important to support these benefits. It is also important to ensure the registry is not exploited for fraudulent purposes or to support illicit activity involving U.S.- registered aircraft. FAA’s current process does not include strong controls to prevent ineligible registrants and potential fraud and abuse, instead allowing registrants to self-certify their information with limited independent review. A comprehensive registry risk assessment could help to manage risks of fraud and abuse, which enable criminal, national security, and other risks. Such a risk assessment, which considers inherent and residual risks as well as determination of likelihood, impact, and risk tolerance, would support the development of a risk-based strategy and approach to guide registry actions in preventing, detecting, and responding to fraud and abuse risks. To support its eligibility determinations, FAA currently obtains limited PII from individual registrants, aircraft dealers, or those entities (e.g., trustors) who might have a significant role in aircraft registrations. Additionally, the registry lacks information about beneficial owners of aircraft. Further, the registry generally accepts self-certification of eligibility and aircraft ownership and does not verify the information it receives. Such an approach may be appropriate for the majority of law-abiding registrants, but it leaves the registry vulnerable to exploitation by those who wish to circumvent eligibility requirements, disregard safety standards, or pursue criminal activities. Limited transparency into who beneficially owns aircraft has also precluded FAA from maximizing its collaboration with partners in the law-enforcement and safety communities to support detection and investigation of criminal, national security, and safety risks associated with registered aircraft. U.S. taxpayers have subsidized the costs of aircraft registration for several decades. Without a change to aircraft registration and dealer fees, the costs of FAA labor, technology, coordination, and risk-based oversight for these high-value assets would continue to be borne by the public and limit resources available for applicant verification. The absence of more and electronically analyzable information has substantially hindered FAA’s ability to use the registry as a tool to detect potential fraud and abuse and to oversee registered aircraft. As part of its ongoing IT modernization, FAA has an opportunity to collect such data and record them in a format that facilitates data analytics. These data could help FAA detect potential fraud and abuse and conduct preventive, risk-based monitoring and oversight of aircraft registrations as well as dealer certifications to ensure the integrity of the registry. They would also support a risk-based approach for verifying information provided by some registry applicants as well as for taking corrective actions. Additional information would position FAA to more broadly prevent, detect, and respond to risks associated with the aircraft registry and to facilitate data analytics by FAA and stakeholders for oversight, safety, and law- enforcement purposes. For example, FAA officials could analyze data patterns for potential fraud and abuse, as well as share data across dealer and aircraft records and to check OFAC sanctions data to ensure that they coordinate about owners with sanctions designations, as appropriate. Lastly, FAA lacks formal agreements with other federal entities to respond to risks. Specifically, FAA can provide additional support to law- enforcement and safety investigations by sharing quality information about individuals and entities with potentially significant responsibilities in aircraft registrations, as well as other registration information, such as declarations of international operations. FAA’s Aircraft Registry Task Force positions FAA to work collaboratively internally—among officials from the aircraft registry, legal counsel, ASH, LEAP, and SEIT—and with external law-enforcement to share information and to take advantage of collaborative mechanisms to formalize coordination. We are making the following 15 recommendations to FAA: The Administrator of FAA should conduct and document a risk assessment that considers inherent and residual fraud and abuse risks that may enable criminal, national security, or safety risks. (Recommendation 1) The Administrator of FAA should determine impact, likelihood, and risk tolerance as part of a risk assessment. (Recommendation 2) The Administrator of FAA should develop a strategy that outlines specific actions to address analyzed risks, including periodic assessments to evaluate continuing effectiveness of the risk response. (Recommendation 3) The Administrator of FAA should collect and record information on individual registrants, initially including name, address, date of birth, and driver’s license or pilot’s license, or both, with subsequent PII elements informed by the risk assessment, once completed. (Recommendation 4) The Administrator of FAA should collect and record information on legal entities not traded publicly—on each individual and entity that owns more than 25 percent of the aircraft; for individuals: name, date of birth, physical address, and driver’s license or pilot’s license, or both; and for entities: name, physical address, state of residence, and taxpayer identification number. (Recommendation 5) The Administrator of FAA should verify aircraft registration applicants’ and dealers’ eligibility and information. (Recommendation 6) The Administrator of FAA should increase aircraft registration and dealer fees to ensure the fees are sufficient to cover the costs of FAA efforts to collect and verify applicant information while keeping pace with inflation. (Recommendation 7) The Administrator of FAA should ensure, as part of aircraft registry IT modernization, that information currently collected in ancillary files or in PDF format on (1) owners and related individuals and entities with potentially significant responsibilities for aircraft ownership (e.g., beneficial owners, trustors, trustees, beneficiaries, stockholders, directors, and managers) and (2) declarations of international operations is recorded in an electronic format that facilitates data analytics by FAA and its stakeholders. (Recommendation 8) The Administrator of FAA should link information on owners and related individuals and entities with significant responsibilities for aircraft ownership through a common identifier. (Recommendation 9) The Administrator of FAA should, as part of IT modernization, develop an approach to check OFAC sanctions data on owners and related individuals and entities with potentially significant responsibilities for aircraft ownership for coordination with OFAC and to flag sanctioned individuals and entities across aircraft registration and dealer systems. (Recommendation 10) The Administrator of FAA should use data collected as part of IT modernization as well as current data sources to identify and analyze patterns of activity indicative of fraud or abuse, based on information from declarations of international operations, postal addresses, sanctions listings, and other sources, and information on dealers, noncitizen corporations, and individuals and entities with significant responsibilities for aircraft ownership. (Recommendation 11) The Administrator of FAA should develop and implement risk-based mitigation actions to address potential fraud and abuse identified through data analyses. (Recommendation 12) The Administrator of FAA should develop mechanisms, including regulations if necessary, for dealer suspension and revocation. (Recommendation 13) The Administrator of FAA, in coordination with relevant law-enforcement agencies, should enhance coordination within the Aircraft Registry Task Force through collaborative mechanisms such as written agreements and use of liaison positions. (Recommendation 14) The Administrator of FAA, in coordination with relevant law-enforcement agencies, should develop a mechanism to provide declarations of international operations for law-enforcement purposes. (Recommendation 15) We provided a draft of this product to DOT, DOJ, DHS, and Treasury for review and comment. DOT provided written comments, which are reproduced in appendix V. DOT concurred with our recommendations. Specifically, DOT stated that it supports other government agencies in addressing illegal activities and enforcing U.S. sanctions and agreed that enhancements to the accuracy of registry information would expedite enforcement actions and reduce the risk of ineligible aircraft registrations. FAA and DHS provided technical comments, which we incorporated as appropriate. DOJ and Treasury did not have any comments. We are sending copies of this report to the appropriate congressional committees, the Secretary of Transportation, the Attorney General, the Secretary of Homeland Security, the Secretary of the Treasury, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at 202-512-6722 or shear@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VI. We conducted illustrative case research related to U.S.-registered aircraft generally covering the 2010–2018 period, including over 1,200 publications and reports from cases investigated by law-enforcement agencies, news articles, and agency and safety investigation reports. We selected six case studies for in-depth review across three categories of risk enabled by aircraft registration fraud and abuse—criminal activity, national security, and safety (see app. II for additional details on the selection methodology). All selected cases are intended for the purpose of illustrating fraud and abuse vulnerabilities associated with the aircraft registration process. These cases may not represent all existing vulnerabilities and are not generalizable to the Federal Aviation Administration (FAA) registry population as a whole. From 2010 to 2011, an aircraft sales broker obtained multiple registration certificates from FAA for aircraft he did not rightfully own or possess. According to court records associated with this case, the broker submitted to FAA fraudulent registration applications and bills of sale with forged signatures for 22 aircraft as part of a multi-million-dollar bank fraud scheme. He used the registration documents that FAA provided as an asset to support a loan application that ultimately resulted in an approximately $3 million bank loan used to float his failing aircraft-sales business. The bank uncovered the fraud over a year after the sales broker first submitted the fraudulent aircraft registration documents to execute the loan. A subsequent investigation by the Federal Bureau of Investigation revealed the extent of the fraud, namely that the main thrust of the fraud scheme was to pledge as collateral 22 aircraft that neither the broker nor his company owned, in order to obtain money from the bank. Court records reveal that law-enforcement officials interviewed some of the rightful owners of the aircraft, who stated that the aircraft were always in their possession and they had never sold the aircraft to the fraudulent broker. These owners identified the signatures on the bills of sale used to register the aircraft as forged. In 2013, the broker pled guilty to bank fraud, making a false statement to a federally insured financial institution, and making a false statement to FAA in the registration of aircraft. As a result of the fraud, some of the rightful owners of the aircraft experienced difficulty in reinstating the aircraft registrations in their name. For example, one owner told federal investigators that he could not fly his aircraft for 2 years because the registration of his aircraft was in the name of the fraudulent broker. Another owner stated that he incurred thousands of dollars in legal fees to reinstate the registration of the aircraft in his name. Additionally, the court ordered the broker to pay approximately $2.4 million in restitution to the bank. In 2014, a U.S.-registered aircraft was seized by and subsequently forfeited to the U.S. government in 2016 because the aircraft had been fraudulently registered and it was purchased with assets derived from wire fraud, money laundering, or other unlawful activities, according to court records associated with this case. The registration was found to be fraudulent because at the time of registration, the applicant was not the true owner of the aircraft. Rather, the U.S. corporation that registered the aircraft acted as a nominee to purchase and register the aircraft on behalf of entities known to have ties to the Sinaloa Cartel, one of the world’s most notorious criminal enterprises. Law-enforcement officials were aware of the scheme and seized the aircraft shortly after final payment was made on it. Court records reveal that this corporation had been previously investigated for violations related to false and fictitious U.S. registration of aircraft on behalf of a criminal organization, and that the corporation’s owner was well known to members of law-enforcement agencies for his suspected role in multiple illegal activities. The aircraft was ultimately forfeited to the U.S. government because it had been purchased with proceeds traceable to illegal activities. In 2012, an intermediary established a U.S. corporation for a foreign national beneficial owner, and the company registered the aircraft. The foreign national was engaged in the black-market currency exchange, which is a common scheme used in trade-based money laundering. In this case, the foreign national conspired with another individual to fraudulently purchase millions of dollars in Venezuela at a rate preferred by the Venezuelan government that was reportedly established as a control to prevent capital flight from Venezuela. Court records show that the aircraft was purchased with illicit proceeds from this fraudulent scheme. In 2016, U.S. law enforcement seized the aircraft, and in 2018 it was forfeited to the U.S. government. In 2017, as the result of a multiyear investigation, the Department of the Treasury’s Office of Foreign Assets Control (OFAC) designated the Executive Vice President of Venezuela as a Specially Designated Narcotics Trafficker pursuant to the Foreign Narcotics Kingpin Designation Act for playing a significant role in international narcotics trafficking. According to the 2017 OFAC announcement on this case, this Venezuelan government official facilitated shipments of narcotics with the final destinations of Mexico and the United States, including control over airplanes and ports used in drug trafficking in Venezuela. According to OFAC, in previous government positions, this official oversaw and partially owned large narcotics shipments destined for the United States. Further, this official also used a front man who laundered drug proceeds and purchased assets. In addition to a network of international companies, according to OFAC, the front man owned or controlled five U.S. companies, including a limited liability company (LLC) that registered an aircraft with FAA using a voting trust to meet U.S. citizenship requirements. As part of its action, OFAC also designated the front man for providing material assistance, financial support, or goods or services in support of the international narcotics trafficking activities of, and acting for or on behalf of, the Venezuelan Executive Vice President. OFAC also identified as blocked property the U.S.-registered aircraft as well as the LLC used to register the aircraft. According to FAA officials, the agency does not have the legal authority to deny a registration solely because of a sanctions designation. OFAC notified FAA of the designation, and FAA flagged the aircraft in its system. FAA deregistered the aircraft in 2019 after registration renewal documentation submitted to FAA contained numerous errors. However, because the flags placed on sanctioned individuals’ and entities’ registration records do not extend to dealer records, FAA issued a dealer certificate to the blocked LLC after the OFAC designation and without coordination with OFAC, according to FAA records and officials. The blocked LLC held the dealer certificate for a year until the certificate expired. In 2011, an aircraft registered to a U.S. citizen with a registered agent address disappeared and was reported to have crashed off the coast of Panama with six fatalities. At the time of the crash, the government of Panama was operating the aircraft while it was still under the U.S. registration of the owner. According to FAA officials and documents we reviewed, the aircraft was in the possession of the Panamanian government because it had been seized by Panamanian authorities in 2010 on allegations that it had been used to traffic narcotics from Panama into Colombia. According to an FAA official knowledgeable about this case, as part of the seizure, a Panamanian court assigned the aircraft to the Panamanian civil aviation authority, which then registered the aircraft in Panama and painted a Panamanian registration number on it. However, the Panamanian civil aviation authority did not take the actions to first deregister the aircraft in the United States, so the new registration was likely invalid under international law. When told this by an FAA official, Panamanian authorities removed the Panamanian registration number from the plane and replaced it with the original N-number. FAA sent multiple letters to the owner to deregister the aircraft and also when the aircraft registration was expiring, but all were returned as refused by the registered agent. According to an FAA official we interviewed about this case, the Panamanian civil aviation authority operated the aircraft under U.S. registration for approximately 1 year until its crash. According to this official, at the time of the crash the aircraft was reportedly operated by the Panamanian civil aviation authority for the purposes of radar maintenance missions in that country. In 2016, an aircraft registered to a U.S.-based LLC crashed in the Caribbean, resulting in fatal injuries to all three people aboard. According to the accident report, the aircraft was operated by a foreign entity, an aviation training center located in Jamaica. The Jamaican civil aviation authority, the entity responsible for investigating the accident, found multiple safety deficiencies as the causes and contributing factors of the fatal crash. These deficiencies include the aircraft’s engine replacement not conforming to its design type; engine parts showing signs of wear ranging from worn to extremely worn conditions exhibiting heavy corrosion; and falsified maintenance records. FAA, by law, imposes safety obligations on all owners of aircraft. To meet these obligations, an owner must maintain current information about the identity and whereabouts of the actual operators of an aircraft and location and nature of the operation on an ongoing basis, thereby allowing that owner to provide the operator with safety-critical information in a timely manner, and to obtain information responsive to FAA inquiries, including investigations of alleged violations of FAA regulations. Such information is an essential element in FAA’s ability to carry out its oversight obligations under U.S. and international law. The safety deficiencies cited in the accident report indicate that, as the registered owner of the aircraft, the LLC may not have been fulfilling its safety obligations. Our objectives were to assess the Federal Aviation Administration’s (FAA) (1) actions to prevent fraud and abuse in aircraft registrations, (2) ability to detect potential fraud and abuse in aircraft registrations, and (3) actions and coordination with law-enforcement entities to respond to aircraft registry–related fraud and abuse risks. To address all objectives, we reviewed laws, regulations, and FAA policies pertaining to the aircraft registration eligibility requirements and processes. We also reviewed standard operating procedures, policy statements, and guidance for staff charged with processing aircraft registrations and addressing administrative compliance actions— including FAA Order 2150.3C issuing enforcement actions per its compliance and enforcement program, FAA Aircraft Examiner’s Guidelines outlining the steps for processing aircraft registrations, and published International Civil Aviation Organization civil aviation standards. We also reviewed prior GAO reports and Department of Transportation (DOT) Office of Inspector General (OIG) reports regarding the quality and utility of registry data, risks, and ongoing challenges associated with the registry’s information technology (IT) system. For all objectives, we interviewed FAA officials from: aircraft registry, legal counsel, FAA’s Security and Hazardous Materials Safety (ASH), FAA’s Law Enforcement Assistance Program (LEAP), and FAA’s Special Emphasis Investigation Team (SEIT). We also interviewed aviation safety, foreign policy, and law-enforcement officials to obtain broader perspectives, where applicable, on the registration process, challenges, and vulnerabilities, including officials from the National Transportation Safety Board (NTSB), the Department of the Treasury’s (Treasury) Office of Foreign Assets Control (OFAC) and Internal Revenue Service Criminal Investigations, the Department of Justice’s (DOJ) Drug Enforcement Administration (DEA), the Department of Homeland Security’s (DHS) Homeland Security Investigations (HSI), and DOT’s OIG. We interviewed aviation industry associations, selected based on a range of aviation interests, such as general aviation and equipment leasing. We also interviewed aircraft registry intermediaries—individuals and entities that facilitate aircraft registrations for others—such as trust companies, banks, and a registered agent, selected based on our analysis of aircraft registry data across types of intermediaries and number of registrations. We also reviewed relevant international standards on countering money laundering and issues related to transparency of corporate structures and beneficial ownership of assets. We performed a descriptive analysis of the registry data from calendar year 2010 through 2018. To do this, we first performed an in-depth review of the calendar year 2018 registry master data—which contains the most-current registration information for our review period—and selected key fields such as aircraft registration number and registrant name information for further analysis. For the remaining calendar years 2010 to 2017 annual files, we focused on identifying any substantive differences occurring between years for the selected key fields. We developed frequencies of the selected key fields to determine the number of registered aircraft, registration types and ownership structures (such as corporations, trusts, and dealers) used to register aircraft, and registration status across the 9-year period of our review. In September 2018 we conducted a site visit to the FAA Registry facility located at the Mike Monroney Aeronautical Center in Oklahoma City, Oklahoma. During the site visit, we interviewed officials from FAA’s major components responsible for processing aircraft registrations and addressing administrative compliance actions, including registry data analysts and managers for the aircraft and airmen systems, FAA ASH officials, and an Office of the Chief Counsel attorney. We also observed firsthand the registry’s process for receiving, sorting, scanning, and recording aircraft registration and renewal application packages. To determine potential fraud and abuse in aircraft registration and FAA actions to prevent them, we analyzed and synthesized a variety of information, including agency reports, registration, postal, and sanctions data, and news articles, among other sources. Our review of information generally spanned fiscal years 2010 through 2018. To identify illustrative cases of potential fraud and abuse, we conducted a literature review that included sources such as Lexis Nexis news articles, DOJ press releases, and investigative reports published by DOT OIG, FAA LEAP, Internal Revenue Service Criminal Investigations, and DHS HSI. We also searched the NTSB publicly available online database of aviation accidents and incidents for examples of safety-related cases. Our literature search yielded over 900 publications and over 300 aviation accident reports for further screening. We then applied two levels of criteria to filter the results for case narrative selections. For the first level, we identified 66 cases from fiscal years 2010 to 2018 involving U.S.- registered aircraft related to three categories of risk enabled by fraud and abuse—criminal activity, national security, and safety. Next, we performed a secondary level of review and selected 28 illustrative cases that included case details, such as entity names and aircraft registration numbers, to facilitate further research including legal review to ensure that selected case studies were adjudicated by a court of law, where applicable. Of those 28 cases, we selected six case studies for in-depth review. We also drew examples from our research of intermediaries of the registry, including selected banks, trust companies, and registered agents. For our in-depth research of these cases, we reviewed available information contained in the FAA Civil Aviation Registry, FAA Electronic Document Retrieval System, and ancillary files; aircraft flight plans; NTSB accident report information; state business registration data; court records; and GAO’s internal resources that included a mix of government and corporate databases. All selected cases are intended for the purpose of illustrating fraud and abuse vulnerabilities associated with the aircraft registration process and may not represent all existing vulnerabilities, nor are they generalizable to the FAA registry population as a whole. To further determine potential fraud and abuse in aircraft registrations, we analyzed FAA aircraft registry address data from calendar year 2018. Using registry address information, we performed a match to United States Postal Service (USPS) data to identify examples of potentially unverified and noncompliant addresses provided to the registry. To analyze postal address data, we used the address fields contained in the FAA registry master and dealer data to verify address information and identify examples of invalid addresses provided to the registry in calendar year 2018, which is the most-current registry data included in our review. Additionally, we obtained data from an internal registry physical address report that we then matched to the calendar year 2018 registry master data to replace mail drop boxes with physical address information, where available. We then performed a match of this updated address file to the USPS Address Matching System as of June 2019 to identify examples of potentially invalid addresses. Our match results revealed a number of commercial mail drop locations, including post office boxes, and addresses that did not match to the postal data. We selected seven aircraft registration addresses and five dealer addresses (total of 12 match results) using a randomized list filtered by locality. We then manually verified the match results for these selected cases using publicly available online geo-mapping tools such as Google Maps and company listings such as White Pages. On the basis of the results of those searches, we selected three aircraft registrations and three dealer certifications that highlight examples of potentially noncompliant addresses provided to the registry in violation of FAA regulations and policy. We conducted subscription database searches and reviewed FAA registration documents for these selected cases based on categories of addresses, such as mail drop boxes, and verified three addresses selected based on locality through site inspections by GAO investigators. Finally, we analyzed the costs associated with aircraft and dealer certificate registrations. To do this, we reviewed an FAA internal report that assessed the costs of FAA’s registration processing, and compared proposed fees to the current fee values for aircraft registrations and dealer certificates. We also reviewed GAO’s federal user fee guide provision that states that fee collections should be sufficient to cover the intended portion of program costs over time, including accounting for factors such as inflation. We reviewed a prior 1993 GAO report in which we determined that the registration fee, in place since 1964, did not cover the cost of reviewing and processing a registration application. Finally, we performed an inflation analysis of the 1964 fee level adjusted for inflation based on the Consumer Price Index. To assess FAA’s ability to detect potential fraud and abuse in aircraft registrations, we examined FAA aircraft registry data collection and storage as well as oversight actions based on registry information and data. We also conducted data mining and matching to identify registrations with indicators of potential fraud or abuse that may enable criminal activity, national security, and safety risks by analyzing FAA aircraft registry master data from calendar years 2010 through 2018, as well as other registry-based and external data sets. We selected five risk indicators, which were informed by interviews with FAA and law- enforcement officials and our background research, for analysis of registry-related data and for matching to a selection of external data sets. We analyzed FAA aircraft registry data to identify registrations with characteristics that matched one or more risk indicators, such as registrations using opaque ownership structures—corporation- and trust- based ownership that disguises the beneficial owner—and registration addresses in countries identified by the Department of State as associated with major illicit drug production and money laundering, among other factors. The risk indicators do not prove fraud or that any unlawful activity has occurred. Alone or together, the risk indicators may serve as points of inquiry for further examination of conduct that may run counter to the interests of the federal government by posing potential criminal, national security, or safety risks. On the basis of the results of our risk-indicator analysis using registry data, we selected a total of five items as potential risk indicators. We selected three risk indicators based on public and internal aircraft registry data. We compared the registry master data to the list of countries published in the latest Department of State narcotics control and financial crimes watch lists. Additionally, we reviewed nonpublic extracts of FAA registry voting trusts used by U.S. citizen corporations and noncitizen trusts from April 2018 through May 2019—the most complete data available at the time of our review—due to their opaque ownership structures and potential for abuse as registration vehicles. We also performed an analysis of types of intermediaries and selected a registered agent as a risk indicator based on confirmed misuse of its address as a means for corporate entities to register aircraft. To establish our population of corporate entities for outreach, we selected four corporate codes contained in the registry data. Next, we developed selection criteria that included geographic distribution (U.S.-based or foreign-based); registrant size based on thresholds that reflect the distribution of registered aircraft (small, medium, or large); and finally, registrant type (bank, trust company, or registered agent). Based on these criteria, we randomly selected two U.S.-based banks and four U.S.- based and foreign trust companies to interview. To identify registered agents, which are not specifically coded in the registry data, we summarized the registry address information and selected all entities with two or more aircraft registrations per address for further screening. We then randomly selected one established registered agent entity for outreach. We analyzed extracts from two external selected data sources for the risk indicator data matching—Treasury OFAC lists of sanctioned entities and individuals, and an NTSB accidents and incidents report—covering the period January 2010 through March 2019, where available. To do this, we used key fields to match the selected data sources to the FAA registry master and trust data, and selected additional risk indicators based on our analysis of the match file results. We matched aircraft registry data to the OFAC lists of sanctioned entities and individuals as of March 2019 to identify aircraft, individuals, and entities subject to U.S. sanctions. We combined five cases identified from our OFAC data match with one additional case identified through our illustrative case and intermediary research to report on our findings of U.S.-sanctioned individuals and aircraft. We included all NTSB-reported accidents and incidents of U.S.- registered aircraft taking place outside the United States as a safety risk indicator. Using the FAA registry aircraft registration number and registrant name fields as the primary match keys, we performed a final merge of all risk indicators identified through our multiple analysis steps described above. Our combined risk flag match returned over 17,000 records, which we used to develop totals for each risk indicator category that we identified. Next, we randomized the list generated from our combined match and applied criteria to filter cases for further review. These criteria included cases with multiple risk indicators, as well as prioritization of risk based on a combined evaluation across all risk indicator categories, among other filters. In total, we selected 20 cases for agency follow-up and in-depth file reviews based on a comprehensive assessment of risk flag categories described above. However, without reviewing a generalizable sample of cases across all categories, we were unable to determine the extent of risk such cases may represent as a proportion of total registrations. Therefore, we used the results of our file reviews for these 20 cases solely to illustrate examples of the risk indicators that we identified. We assessed the reliability of each data set described above for the purposes of generating high-level totals, as well as identifying and tracking potential risk-indicator cases across time. To do this, we performed electronic tests using reports from eight information systems to determine the completeness and accuracy of key fields contained in the data files. We also submitted to the overseeing offices for all eight information systems general data-quality questions regarding the purpose of the data, their structure, definitions and values for selected fields, automated and manual data-quality checks to ensure the accuracy of the data, and limitations. Overall, we found that the data were generally reliable for the purpose of performing a cross-comparison of current registrations associated with safety and compliance violations over the nine-year period of our review. To assess FAA’s actions and coordination with law-enforcement agencies to respond to registration-related risks, in addition to the interviews noted above, we reviewed FAA policies pertaining to the aircraft registration process and documents about FAA and law-enforcement efforts to address registry-related vulnerabilities. We reviewed FAA enforcement actions and government-wide data on aircraft seizures. To generate government-wide totals for aircraft seizures and forfeitures over time, we obtained data extracts from the DOJ Consolidated Asset Tracking System and DHS Customs and Border Protection Seized Assets and Case Tracking System from fiscal years 2010 through 2018. We limited our Consolidated Asset Tracking System data request to aircraft adjudicated as either seized and forfeited, or seized and substituted for cash forfeiture, while the report from the Seized Assets and Case Tracking System contains all seizures recorded by Customs and Border Protection during our review period. Therefore, the reports represent different populations, and we opted to report the totals for the two databases separately. Where feasible, we assessed the reliability of data in each system described above for the purposes of generating high-level totals. Our data-quality testing of selected data elements showed that the primary fields of interest were well-populated and sufficiently reliable for our purposes. We conducted this performance audit from November 2017 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We conducted our related investigative work in accordance with investigation standards prescribed by the Council of the Inspectors General on Integrity and Efficiency. In addition to an aircraft registration application form, evidence of ownership, and $5 registration fee, the Federal Aviation Administration (FAA) requires additional documentation based on the type of individual or entity that owns the aircraft, as discussed in table 2 below. Opaque ownership structures are legitimate business structures that are widely used by corporations and individuals to facilitate commerce as well as for asset and tax management. However, the lack of transparency related to aircraft registrations using opaque ownership structures also creates challenges for safety and law-enforcement investigators seeking information about beneficial owners to support timely investigations. The Financial Action Task Force (FATF) and other international organizations have determined that beneficial ownership information can be obscured through, among other things, the use of shell companies (which can be established with various forms of ownership structures) especially in cases where there is foreign ownership that is spread across jurisdictions; complex ownership and control structures involving many layers of shares registered in the name of other legal entities; formal nominee shareholders and directors where the identity of the beneficial owner is undisclosed; trusts and other legal arrangements that enable a separation of legal ownership and beneficial ownership of assets; and use of intermediaries in forming legal entities, including professional intermediaries. Shell companies, one of the opaque ownership structures, may be formed for legitimate purposes to obtain financing prior to starting operations. In the aircraft ownership context, shell companies may own aircraft by holding title for registration purposes. However, shell companies may also be used to conceal the beneficial owner’s identity for illicit purposes. For example, according to Federal Aviation Administration (FAA) officials, some aircraft registrations have “stacked” company ownership, where shell companies own each other. Such ownership arrangement can be used for illicit purposes to conceal the identity of foreign-based beneficial owners and create challenges for investigators, according to law- enforcement officials. Further, shell companies may use a registered agent’s mailing address on their aircraft application forms, further obscuring aircraft ownership information. Table 3 describes the four opaque ownership structures, their legitimate uses, and how they can be vulnerable to abuse, according to our illustrative case and intermediary research, and interviews with FAA and law-enforcement officials. In the example and figure below, we illustrate opaqueness and complexities of aircraft registrations using intermediaries and opaque ownership structures. It is based on an actual case from our review of aircraft registration documents and research from corporate filings and other databases. Apparent shell company and noncitizen trust used to register aircraft for unknown foreign beneficial owner. In this case, a foreign company obtained U.S. aircraft registration through an intermediary, using opaque ownership structures. This is allowable under current registration requirements and there is no identified wrongdoing in this case. The application, depicted in figure 13, shows the involvement of an intermediary, who used various legal entities and took a number of steps to facilitate aircraft registration for a beneficial owner who is unknown. The intermediary listed himself as the director of a corporation, N003 Inc., which was established using a company that provides company formation and registered agent services. Among other indicators, N003 Inc. appeared to be a shell company established shortly before the filing of the aircraft registration. The intermediary also used the mailing address of the registered agent as the owner’s address on the aircraft registration application. Further, the intermediary established a noncitizen trust for aircraft ownership. The trust agreement identified N003 Inc. as the owner trustee of the aircraft, and a foreign corporation, DEF Ltd., as the trustor. As such, the role of the intermediary, the use of apparent shell company and noncitizen trust ownership structures, and use of the registered agent’s mailing address worked to obscure the foreign beneficial owner of the aircraft while facilitating access to U.S. aircraft registration. Rebecca Shea, (202) 512-6722 or shear@gao.gov In addition to the contact named above, Tonita Gillich (Assistant Director), Irina Carnevale (Analyst-in-Charge), James Ashley, Priyanka Sethi Bansal, Gary Bianchi, Daniel Bibeault, Kimberley Bynum, Steven Campbell, Colin Fallon, Robert Graves, Ying Long, Olivia Lopez, Maria McMullen, James Murphy, George J. Ogilvie, Sean Peck, and April Van Cleef made key contributions to this report.", "summary": "The U.S. aircraft registry, managed by FAA, maintains information on approximately 300,000 civil aircraft. FAA issues aircraft registration to individuals and entities that meet eligibility requirements, such as U.S. citizenship or permanent legal residence. Registry fraud and abuse hinders the ability of law-enforcement and safety officials to use the registry to identify aircraft and their owners who might be involved in illicit or unsafe operations. GAO was asked to examine registry fraud and abuse. This report assesses FAA's actions to (1) prevent, (2) detect, and (3) respond to fraud and abuse risks in aircraft registrations. GAO reviewed relevant laws, regulations, and FAA policies; reviewed reports, DOJ press releases, and court cases that illustrated risks associated with the registry; analyzed aircraft registry data from fiscal year 2010 through 2018 to identify registrations with risk indicators; and interviewed FAA registry, legal, law-enforcement liaison, and safety officials, as well as officials from DOJ and DHS. To register civil aircraft, the Federal Aviation Administration (FAA) generally relies on self-certification of registrants' eligibility and does not verify key information. According to GAO's review of the registry process, there are risks associated with FAA not verifying applicant identity, ownership, and address information. The registry is further vulnerable to fraud and abuse when applicants register aircraft using opaque ownership structures that afford limited transparency into who is the actual beneficial owner (i.e., the person who ultimately owns and controls the aircraft). Such structures can be used to own aircraft associated with money laundering or other illegal activities (see example in figure). FAA has not conducted a risk assessment that would inform its eligibility review and collection of information to manage risks. Without a risk assessment, FAA is limited in its ability to prevent fraud and abuse in aircraft registrations, which enable aircraft-related criminal, national security, or safety risks. FAA makes some use of registry information to detect risks of fraud and abuse, but the format of the data limits its usefulness. Specifically, most data on individuals and entities with potentially significant responsibilities for aircraft ownership, such as trustors and beneficiaries, are stored in files that cannot be readily analyzed due to system limitations. As FAA modernizes its information-technology systems, it has an opportunity to develop data analytics capabilities to detect indicators of fraud and abuse in the registry. FAA takes administrative actions, such as registration revocations, to respond to registration violations and coordinates with law-enforcement agencies on investigations and enforcement actions such as aircraft seizures. Since 2017, FAA has coordinated with the Departments of Justice (DOJ) and Homeland Security (DHS) as part of an Aircraft Registry Task Force to address aircraft registry vulnerabilities. However, this coordination is informal, and other mechanisms for joint enforcement actions, sharing of information, and use of liaison positions are not in place, GAO is making 15 recommendations to FAA, including that it collect and verify key information on aircraft owners; undertake a risk assessment of the registry; leverage information-technology modernization efforts to develop data analytics approaches for detecting registry fraud and abuse; and formalize coordination mechanisms with law-enforcement agencies. FAA agreed with all recommendations.", "document_type": "gao"}
{"report": "The Dodd-Frank Act was enacted to promote the financial stability of the United States by improving accountability and transparency in the financial system and protecting consumers from abusive financial services practices, among other purposes. To help detect and prevent securities misconduct, section 961 of the Dodd-Frank Act promotes complete and consistent performance of SEC staff examinations, investigations and reviews, and appropriate supervision of these activities through internal supervisory controls. SEC has submitted eight annual reports to Congress under section 961, all of which stated that both its internal supervisory controls and its staff procedures were effective for the period under review. In addition, all such reports stated that no significant deficiencies in internal supervisory controls were identified. Section 961 does not define “internal supervisory control.” SEC has defined internal supervisory controls as the processes established by management to monitor that the procedures applicable to staff (that is, established day-to-day procedures to be followed by the employees within the applicable programs) are consistently being performed according to policy and procedures, and also remain reasonable, adequate, and current. SEC is the primary regulator of the U.S. securities markets and is responsible for protecting investors, maintaining fair, orderly, and efficient markets, and facilitating capital formation. To fulfill this mission, SEC requires public companies to disclose meaningful financial and other information to the public, examines firms it regulates, and investigates potential violations of the federal securities laws. SEC is organized into five divisions and 24 offices. SEC’s approximately 4,400 staff are located in Washington, D.C., and in 11 regional offices. As discussed previously, four divisions and offices are subject to section 961 of the Dodd-Frank Act (see table 1). SEC formalized its Section 961 Working Group in 2017. The primary purposes of the Working Group are to enhance the efficiency and effectiveness of SEC’s processes related to section 961 compliance and to enhance coordination and information sharing among the divisions and offices. The Working Group is a staff-level group comprising one or more representatives from each of the four divisions and offices subject to section 961 as well as the Office of the Chief Operating Officer. These staff are responsible for carrying out the Working Group’s responsibilities, which include establishing a common understanding and consistent approach to compliance; creating a means to share information and ideas to improve the efficiency and effectiveness of section 961 compliance activities; discussing best practices to streamline procedures and documentation of internal control testing and reporting; and developing and updating guidance related to implementing section 961. Standards for Internal Control in the Federal Government provides the overall framework for establishing and maintaining internal control in federal agencies. Agency management is responsible for adapting the framework for an agency. Furthermore, an agency may use the framework to organize its development and implementation of internal controls and implement its standards throughout the agency or at an office level. Five interrelated components and associated principles establish requirements for developing and maintaining an effective internal control system: Control environment: The control environment is the foundation for an internal control system. It provides discipline and structure, which affect the overall quality of internal control. It influences how objectives are defined and control activities are structured. The oversight body and management establish and maintain an environment throughout the entity that sets a positive attitude toward internal control. Risk assessment: Management assesses the risks facing the entity as it seeks to achieve its objectives. This assessment provides the basis for developing appropriate risk responses. Management assesses risks the entity faces from external and internal sources. Control activities: Control activities are the actions management establishes through policies and procedures to achieve objectives and respond to risks in the internal control system, which includes the entity’s information system. Information and communication: Management uses quality information to support the internal control system. Effective information and communication are vital for an entity to achieve its objectives. Entity management needs access to relevant and reliable communication related to internal and external events. Monitoring: Internal controls are dynamic and have to be adapted continually to risks and changes an entity faces. Monitoring the internal control system is essential in helping internal control remain aligned with changing objectives, environment, laws, resources, and risks. Internal control monitoring assesses the quality of performance over time and promptly resolves the findings of audits and other reviews. Corrective actions are a necessary complement to control activities to achieve objectives. To be effective, an agency’s internal control system must incorporate the five components of internal control in an integrated manner throughout its operations and on an ongoing basis. Once in place, internal control provides reasonable, not absolute, assurance of meeting agency objectives. When evaluating the design of internal control, management determines if controls individually and in combination are capable of achieving an objective and addressing related risks. To the extent a control does not fully achieve an objective or address related risks, it is deficient, and such deficiencies may be associated with a control’s design or operation. A deficiency in design exists when a control necessary to meet a control objective is missing, or an existing control is not properly designed so that even if the control operated as designed, the control objective would not be met. A deficiency in operation exists when a properly designed control does not operate as designed or the person performing the control does not possess the necessary authority or competence to perform the control effectively. In addition to the requirements under section 961 of the Dodd-Frank Act, SEC must establish and maintain effective internal control and financial management systems that meet the objectives of the Federal Managers’ Financial Integrity Act of 1982 (FMFIA). FMFIA requires agencies to annually assess and report on the internal controls that protect the integrity of their programs and whether financial management systems conform to related requirements. In addition, FMFIA requires agencies to provide an assurance statement regarding the effectiveness of the agency’s internal controls. SEC’s internal controls for financial management systems are not included in this report because they are reported in our annual financial audit of SEC. In addition, all of SEC’s internal controls—including those which constitute internal supervisory controls—are in scope for FMFIA. In response to section 961 of the Dodd-Frank Act, the Working Group put in place a framework that provides guidance for division and office staff responsible for assessing the effectiveness of internal supervisory controls (control framework). The control framework draws on external sources such as federal internal control standards as well as internal documents such as SEC’s Reference Guide for Compliance with Section 961 of the Dodd-Frank Act, the Risk Management and Internal Control Review Reference Guide from the Office of the Chief Operating Officer, and the charter for the Working Group. These internal documents include definitions, criteria, and other guidance and together compose SEC’s control framework. For example, the control framework includes time frames for when divisions and offices should assess their internal supervisory controls and report findings to Congress (see fig. 1). SEC’s control framework consists of three phases—risk assessment, internal supervisory control testing, and communication of results—during which division and office staff conduct activities to systematically assess and report on the effectiveness of their internal supervisory controls (see fig. 2 for examples). Changes to SEC’s control framework since our last review (which focused on fiscal years 2013–2015) include revisions to key guidance documentation and reclassification of some controls (as nonsupervisory controls). The Working Group revised elements of its control framework documentation since our last review. First, the Working Group streamlined the Reference Guide for Compliance with Section 961 by removing direct guidance—for example, steps staff should take to assess the design and operation of internal supervisory controls—and replaced it with references to the Risk Management and Internal Control Review Reference Guide. Second, the Working Group also updated other information such as the agency’s definition for internal supervisory control. Third, some divisions and offices changed which controls they considered to be internal supervisory controls subject to section 961 assessments. As stated previously, SEC defines internal supervisory controls as the processes established by management to monitor that procedures applicable to staff (the established day-to-day procedures to be followed by the employees within the applicable program) are consistently being performed according to policy and procedures, and also remain reasonable, adequate, and current. Division and Office officials elaborated further, stating they only consider controls that are supervisory in nature and directly related to the consistent and complete execution of examinations of registered entities, enforcement investigation, or reviews of corporate financial securities filings to be internal supervisory controls relevant to section 961. More specifically, OCIE reduced the number of controls it classified as internal supervisory controls from 40 in fiscal year 2015 to 14 in fiscal year 2018 by reclassifying some controls as nonsupervisory controls and by consolidating others (see table 2). For example, OCIE no longer classifies examination program strategy and selection controls (such as development and dissemination of examination program goals) as internal supervisory controls. Therefore, the controls are no longer assessed under section 961. OCIE officials explained that the strategy and selection of controls are performed by management and related to the selection of registrants for examinations, and not to staff conducting examinations consistently with professional competence and integrity. Similarly, the number of internal supervisory controls Corporation Finance maintained decreased from 25 in fiscal year 2015 to eight in fiscal year 2018. Corporation Finance officials told us that they determined that certain controls previously considered relevant to section 961 did not represent processes that fall within the core function of reviewing corporate financial securities filings and thus should not be considered internal supervisory controls under section 961. Enforcement maintained 25 internal supervisory controls from fiscal year 2015 to fiscal year 2018, while OCR had 13–14 internal supervisory controls during the same period. As of the end of fiscal year 2018, SEC’s control framework continued to reflect key components of internal control. We compared the framework against federal internal control standards. Specifically, we assessed whether the control framework reflected the five components of internal control—control environment, risk assessment, control activities, information and communication, and monitoring. We determined that SEC’s control framework included attributes covering each of the components. For example, the framework included oversight structures to monitor the design and operation of division and office internal supervisory controls, assigned responsibilities to division and office staff, incorporated steps for staff to follow to assess risks and test internal supervisory controls, and included mechanisms to correct deficiencies and report findings to internal and external stakeholders (such as Congress). See table 3 for additional examples that illustrate how the control framework reflected relevant standards. Divisions and offices have not developed written policies and procedures to ensure that they systematically assess the effectiveness of procedures applicable to staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings. As mentioned previously, the report required under section 961 of the Dodd-Frank Act must include an assessment of the effectiveness of both internal supervisory controls and staff procedures. Division and office officials told us that they used findings and conclusions from their internal supervisory control assessments to support their conclusions that staff procedures were effective. As discussed earlier, SEC defines internal supervisory controls to include two types of processes used by managers: (1) those used to monitor whether staff follow existing procedures and (2) those used to monitor whether the procedures remain reasonable, adequate, and current. We found that SEC’s assessments of internal supervisory controls did not directly assess the effectiveness of staff procedures for three primary reasons. First, the controls included in SEC’s assessment generally consist of processes that monitor whether staff follow existing procedures, not processes that monitor whether the procedures remain reasonable, adequate, and current. Second, SEC’s assessments of internal supervisory control focus on evaluating the extent to which managers executed the controls for which they are responsible. Although the controls monitor whether staff follow underlying procedures, the control assessments do not directly address whether those underlying staff procedures are designed to effectively achieve their stated objectives (for example, identifying and mitigating securities misconduct by securities market participants). Lastly, documentation of division and office internal supervisory control assessments did not speak to how division and office staff reached conclusions that procedures applicable to staff were effective. In addition to findings from internal supervisory control assessments, SEC officials also told us about policies and procedures, compliance testing, and other activities that provide information regarding the effectiveness of staff procedures. Corporation Finance officials further elaborated by stating that there is no single or discrete assessment to test the effectiveness of staff procedures. Rather, the officials explained that the division relies on activities performed throughout the year that contribute to the evaluation of the effectiveness of staff procedures. Examples of activities all or some divisions and offices referenced included the following: Enforcement, Corporation Finance, OCIE, and OCR officials told us that senior management from each division or office monitor the effectiveness of their programs throughout the year to help assess the effectiveness of staff procedures. Examples of monitoring activities include discussions with staff and subject-matter experts who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings. OCR and Corporation Finance provided examples of documentation for these activities. Enforcement, Corporation Finance, OCIE, and OCR provided documentation that showed they developed review teams, task forces, projects, or initiatives that review specific policies or risks, which can result in updates to procedures. Corporation Finance, OCIE, and OCR officials told us that they have implemented reviews and redesigns of their policies and procedures through periodic reviews of their respective program manuals. See table 4 below for additional examples of activities that divisions and offices referenced as assessments of the effectiveness of staff procedures. The activities mentioned above could provide valuable information for staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings, but they do not represent systematic assessments for the purposes of section 961. In particular, these activities varied between divisions and offices, mostly were implemented on an irregular basis, and were not established through written policies or procedures. In addition, none of the divisions and offices provided documentation linking the results of these, or any other, activities to the conclusions in SEC’s annual reports to Congress under section 961, each of which have stated that SEC’s staff procedures were effective for the period under review. Furthermore, only Corporation Finance officials told us that they discuss the effectiveness of staff procedures with their Director when they present their annual internal supervisory control assessment findings. As stated previously, the control framework includes an oversight structure, timelines, evaluation criteria, and documentation requirements, and SEC considers its control assessments under the framework to represent assessments of the effectiveness of staff procedures. However, SEC has not developed detailed policies, procedures, or guidance for assessing the effectiveness of staff procedures for the purposes of section 961. For example, the activities that divisions and offices referenced as assessing the effectiveness of staff procedures were not established through written policies for section 961-reporting purposes. And, existing guidance documents such as the Reference Guide for Compliance with Section 961 do not include steps or documentation requirements for assessing staff procedures. Federal internal control standards state the importance for agency management to establish policies and procedures to achieve objectives. Because divisions and offices lack written policies and procedures for assessing the effectiveness of staff procedures, each uses informal methods and varied processes instead of a systematic approach that document how each division and office reached its conclusions (that staff procedures were effective) in SEC’s annual section 961 report to Congress. Establishing written policies and procedures for systematically assessing the effectiveness of staff procedures would provide SEC with greater assurance that the procedures were effective in the context of section 961 and would help divisions and offices meet objectives. To evaluate the extent to which SEC’s internal supervisory controls met federal internal control standards and SEC guidance, we evaluated a non-generalizable sample of internal supervisory controls. We assessed whether (1) controls were designed to address objectives and respond to risks and (2) control activities were implemented through policies. We discuss below our findings related to the 39 internal supervisory controls that SEC identified as related to section 961. See appendix II for an example of the template we used to evaluate the controls. All 39 internal supervisory controls that we evaluated incorporated design elements to achieve SEC’s control objectives and respond to risks that SEC identified. We assessed the overall design of selected internal supervisory controls against four design elements identified in federal internal control standards: Control activities should respond to identified objectives and risks, Appropriate types of control activities should be used, Control activities should be designed at the appropriate levels of the organization (Director, Assistant Director, Branch Chief, etc.), and Control activity duties should be segregated where practical. We found that, for the selected controls, each division and office designed control activities to respond to identified objectives and risks by identifying the risks addressed by each control and the control objective (how a control will address the associated risk) in their risk and control matrixes. In their risk and control matrixes, the divisions and offices also have established characteristics identified by relevant standards as important for designing appropriate controls, including the control frequency, control owner, and whether a control is automated or manual, preventive or detective, and key or secondary. To ensure that control activities are designed at the appropriate levels, each division and office identified control owners in their risk and control matrixes and in the control descriptions they identified the job title of staff responsible for executing the controls. Finally, the divisions and offices segregated control duties in cases in which the need for such segregation was apparent. For example, a second review by a higher-level official was included in some controls that required approval decisions. For the results of our control design assessments, see appendix III. Ten of the 39 controls we evaluated lacked key information needed to help ensure execution of the control activities (see table 5). Federal internal control standards state that documentation is required for the effective design, implementation, and operating effectiveness of an entity’s internal control system, including documentation of internal control responsibilities through policies. We assessed SEC’s documented control activities against three key attributes identified in federal internal control standards: Establishment of procedures to support control execution, Assignment of responsibility for control execution, and Establishment of time frames for control execution. Two or three of the selected controls from each division and office did not incorporate key execution attributes, as seen in table 5. For the results of our control design assessments, see appendix III. Descriptions for many control activities did not specify procedures to be performed or, in some cases include time frames, but all controls we assessed assigned responsibility for control execution (see table 6). More specifically, 10 of the 39 controls had no requirement to document execution of the control activities. For example, one Enforcement control and two Corporation Finance controls intended to monitor compliance with timeliness metrics did not include a requirement to document whether the control activities had been executed—that managers completed the review of the timeliness reports, noted if any cases were nearing the time frame threshold, or took appropriate actions in response. In addition, three of the 39 controls we reviewed did not include the control activity attribute of follow-up actions to be taken. For example, the Corporation Finance timeliness controls discussed above also did not establish follow-up actions for cases in which a team or individual neared the timeliness threshold. Follow-up actions could include emailing or calling relevant staff when a timeliness threshold was within a certain number of days of being breached. The divisions and offices did not establish operational procedures for how the control activities would be performed in three of the 39 controls we reviewed. For example, an OCIE control intended to track enrollment and completion of new examiner training lacked underlying procedures for identifying or tracking training progress of new employees. The divisions and offices did not establish time frames for executing control activities in three of the 39 controls we reviewed. For example, while the Corporation Finance timeliness controls discussed above identified the reports to be reviewed, one of the two controls did not specify when the reports should be reviewed. By not incorporating key control attributes into their control activities, SEC may not have reasonable assurance that internal supervisory controls are effectively implemented. Some of the controls with weaknesses in one or more of the control attributes lacked documentation of the controls’ execution, which hindered our ability to test whether the controls operated as intended, as discussed in the next section. For example, two of the timeliness controls for Corporation Finance, described above, did not include a documentation requirement, and no documentation of control execution was created. In lieu of reviewing documentation of control execution, for SEC’s assessment of the effectiveness of its internal supervisory controls, the divisions and offices asked supervisors twice a year (by email) whether they had executed this control weekly over the course of the year. Staff from some divisions and offices said the reason that control activity attributes were not included in some of the controls was because policies and procedures had been long established and orally communicated, but not written into the control activities. Based on Standards for Internal Control in the Federal Government, SEC developed a reference guide to provide guidance for identifying, documenting, and monitoring controls. The reference guide states that internal control activities should be written to describe the actual activities performed to meet the control objective, and at a minimum, identify control procedures and how they are to be executed, establish a documentation requirement for control execution, and assign responsibility and establish time frames for control execution. Following SEC guidance for developing control activities could help divisions and offices ensure evidence exists of control execution and better enable control monitoring by SEC, and oversight by external parties, such as GAO and the SEC Inspector General. In turn, better control monitoring would help ensure that SEC’s internal supervisory controls are effectively implemented and that procedures necessary to achieve organizational objectives are followed. Furthermore, enhancing control activity descriptions would provide SEC greater assurance that staff have the information necessary to effectively implement the controls. We selected 18 of 39 internal supervisory controls across the four divisions and offices to assess whether they operated as intended in fiscal year 2018. (See figure 3 for an overview of how we determined they operated as intended, partially operated as intended, or did not operate as intended.) As an example of how we conducted these assessments, we reviewed one OCIE control that called for manager approval at three points of an examination and additional assistant director approval to close the examination, as described in OCIE’s control documentation. To assess whether this control operated as intended, we selected and reviewed a random, generalizable sample of examinations in OCIE’s internal system to determine whether all of the control’s activities—in this case, management approvals—had been executed. We could not assess some of the controls we selected because SEC did not provide sufficient documentation to allow us to determine whether the control operated as intended. For example, two of four Corporation Finance controls did not include a documentation requirement for weekly monitoring of staff compliance with internal policy. As a result, documentation did not exist for us to assess whether supervisors executed these control activities throughout the year. For more information on how we determined whether controls were operating as intended, see appendix I. Of the 15 controls we could assess, 13 operated as intended and two partially operated as intended (see table 7). We could not assess three controls because sufficient documentation was not provided. More specifically, a control documentation requirement was not established for the three controls—as identified through our assessment of the control’s design, described earlier. We determined that two OCIE controls partially operated as intended. For example, while we found that 20 percent of sampled OCIE examinations were not approved within the designated deadline, all examinations were closed and included all required elements (see table 8). We were unable to assess three of 18 selected controls because the divisions and offices did not provide sufficient documentation on the execution of control activities (see table 9). We found these controls lacked a documentation requirement for control execution in their control activity descriptions and did not produce sufficient documentation, which prevented us from determining whether these controls operated as intended. For example, two of four Corporation Finance controls did not include a requirement to document execution of the control activity— weekly monitoring of staff compliance with internal policy. Because these controls did not produce documentation of weekly monitoring throughout the year as prescribed in the control activity frequency, we did not receive documentation to allow us to assess whether supervisors executed these control activities on a weekly basis or, in some cases, at all. Additionally, we could not assess one selected OCIE control involving tracking of new employee training. To help detect and prevent securities misconduct, section 961 of the Dodd-Frank Act requires SEC to assess the effectiveness of both its internal supervisory controls and the procedures applicable to staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings. While SEC has established a framework for systematically assessing the effectiveness of its internal supervisory controls, it has not established a framework for systematically assessing the effectiveness of staff procedures or documenting how SEC reached related conclusions about the procedures in its annual reports to Congress under section 961. Creating written policies and procedures to systematically assess the effectiveness of staff procedures and documenting the results of such assessments would provide SEC with greater assurance that the staff procedures are effective, a key objective of section 961. Every control we reviewed incorporated design elements to achieve SEC’s control objectives and respond to risks that it identified. However, nine of the 39 controls did not incorporate one or more key attributes that would help ensure execution of the control, including documentation requirements, detailed procedures, identification of follow-up actions, assignment of responsibility for control execution, and time frames for control execution. Following SEC guidance for developing detailed control activities could help divisions and offices ensure evidence of control execution and better enable control monitoring by SEC and external parties, such as GAO and the SEC Inspector General. In turn, better control monitoring would help ensure that SEC’s internal supervisory controls are effective and that procedures necessary to achieve organizational objectives are followed. Furthermore, enhancing control activity descriptions would provide SEC greater assurance that staff have the information necessary to effectively implement the controls. We are making the following five recommendations to SEC. The SEC Chair should direct the Directors of the Division of Corporation Finance, Division of Enforcement, Office of Compliance Inspections and Examinations, and Office of Credit Ratings to develop written policies and processes to systematically assess the effectiveness of staff procedures (procedures applicable to staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings). Examples of elements SEC could include in the policies and processes are the steps necessary to conduct such assessments, including time frames in which the assessments should be performed and reviewed; assignment of responsibilities related to the assessments; requirements for documenting assessments; and steps for staff to take to mitigate and report deficiencies identified as a result of the assessments. (Recommendation 1) The Director of the Division of Corporation Finance should ensure that all internal supervisory controls include documentation requirements, detailed procedures, identified follow-up actions, implementation time frames, and assignment of control execution responsibility, in accordance with SEC guidance and federal internal control standards for implementing control activities through documented policies. (Recommendation 2) The Director of the Division of Enforcement should ensure that all internal supervisory controls include documentation requirements, detailed procedures, identified follow-up actions, implementation time frames, and assignment of control execution responsibility, in accordance with SEC guidance and federal internal control standards for implementing control activities through documented policies. (Recommendation 3) The Director of the Office of Compliance Inspections and Examinations should ensure that all internal supervisory controls include documentation requirements, detailed procedures, identified follow-up actions, implementation time frames, and assignment of control execution responsibility, in accordance with SEC guidance and federal internal control standards for implementing control activities through documented policies. (Recommendation 4) The Director of the Office of Credit Ratings should ensure that all internal supervisory controls include documentation requirements, detailed procedures, identified follow-up actions, implementation time frames, and assignment of control execution responsibility, in accordance with SEC guidance and federal internal control standards for implementing control activities through documented policies. (Recommendation 5) We provided a draft of this report to SEC for review and comment. In written comments (reproduced in appendix VI), SEC agreed with our findings and concurred with our recommendations. In addition, SEC provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Chair of SEC, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. This report focuses on activities that fall within the purview of the Division of Corporation Finance (Corporation Finance), Division of Enforcement (Enforcement), Office of Compliance Inspections and Examinations (OCIE), and Office of Credit Ratings (OCR) at the Securities and Exchange Commission (SEC)—to which we refer collectively as the divisions and offices. We examined (1) the extent to which SEC’s internal supervisory control framework during fiscal years 2016–2018 reflected federal internal control standards; (2) how SEC evaluated the effectiveness of staff procedures in fiscal year 2018; (3) the extent to which selected controls in fiscal year 2018 were designed consistent with relevant standards; and (4) the extent to which selected controls operated as intended in fiscal year 2018. For our first objective, we obtained and reviewed relevant documentation on SEC’s internal supervisory control framework for fiscal years 2016– 2018 and interviewed division and office staff responsible for developing and updating the framework. We then assessed this framework against Standards for Internal Control in the Federal Government and determined the extent to which the framework reflected these standards. Specifically, we assessed the framework against the five components of internal control—control environment, risk assessment, control activities, information and communication, and monitoring—and the 17 principles associated with these components. We compared information on changes SEC made to its internal supervisory control framework with information from our previous review and federal internal control standards to determine the extent to which the framework continued to reflect internal control standards. For our second objective, we reviewed policies, procedures, and guidance documents (for fiscal year 2018) relating to SEC assessments of the effectiveness of procedures applicable to staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings. We also interviewed SEC staff to obtain an understanding of the steps and activities that divisions and offices take to assess the effectiveness of staff procedures. We intended to assess how SEC assessed staff procedures to determine the extent to which SEC’s assessments reflected federal internal control standards. However, as discussed in the report, we found SEC did not have a framework for assessing the effectiveness of staff procedures. We therefore examined policies, procedures, and guidance, but did not assess them against the components and principles associated with the federal standards for internal control. For our third objective, we used the policies, procedures, and control objectives to determine if the design of selected division and office internal supervisory controls in place during fiscal year 2018 was consistent with federal internal control standards and SEC guidance for designing internal controls. We developed an evaluation template and used it to assess selected controls from each division and office by having multiple analysts conduct independent reviews and then reached a final consensus by conducting a joint review with the same analysts. We used Standards for Internal Control in the Federal Government and The Committee of Sponsoring Organizations of the Treadway Commission’s Internal Control – Integrated Framework to develop our template. We also reviewed documents and interviewed staff to obtain a thorough understanding of the internal supervisory controls used to oversee the processes for conducting examinations of registered entities, enforcement investigations, and reviews of corporate financial securities filings. We selected for our review a non-generalizable sample of 53 controls in place during fiscal year 2018—13 controls in Corporation Finance, 15 controls in Enforcement, 11 in OCIE, and 14 in OCR. We grouped these controls into sets because some underlying staff processes had multiple associated controls. In cases in which we selected a control that was part of a set, we would review every control in the associated set. We selected controls and control sets that SEC designated as being associated with processes that have the highest risk or potential impact on achieving stated objectives until we reached our target of 10–15 controls per division or office. Some control sets also contained controls that were not related to section 961. Therefore, to fully assess complete control sets associated with underlying processes, our selection contained some controls that were not related to section 961. However, in this report we only discuss and include analysis for those controls that SEC identified as related to section 961, which comprises 39 controls—eight in Corporation Finance, 10 in Enforcement, eight in OCIE, and 13 in OCR. For our fourth objective, we developed an evaluation template for each control and conducted independent primary and secondary reviews to reach a final consensus on the operation of each control. The template was created using SEC’s control activities and related policy and procedural documents we received as part of our design assessment. We used the template to determine the extent to which the execution of controls met the design criteria. Depending on the extent to which they met criteria established from control design documents, the selected controls were grouped under one of the following categories: (1) operated as intended, (2) partially operated as intended, (3) did not operate as intended, and (4) could not be assessed because control documentation did not exist due to design weaknesses, was not received, or was not relevant. Because the nature of controls varied, we evaluated controls by applying the factors below in conjunction with professional judgment. We focused on whether deficiencies would affect the implementation and operation of controls. For controls that operated as intended, we determined that the divisions and offices provided documentation demonstrating that all control activities were executed for the instances of control implementation we reviewed. We considered controls to have partially operated as intended if the documentation provided supported that only some control activities were executed or if at least one control activity did not operate as intended, but the overall control was executed for most instances. We did not identify any controls that did not operate as intended. This determination would have applied to controls for which we received sufficient documentation to assess the control’s operation and for which the divisions and offices did not execute all control activities in most instances. For controls that we could not assess, we did not receive sufficient documentation that would enable us to make a determination of whether the control was executed or operated as intended. For these controls, we also used the results of our design assessments to determine whether the controls included a documentation requirement that would enable us to assess whether they operated as intended. We judgmentally selected a non-generalizable sample of 18 controls across all four divisions and offices from the population of 39 internal supervisory controls we reviewed in the third objective. We selected these controls based on factors such as whether they were classified as key to achieving objectives, high-risk, or having high potential impact on achieving stated objectives or likelihood of failure. We then created a generalizable, random sample of cases to review for eight controls, and we reviewed all instances for the remaining controls because they occurred annually or had few instances. In some cases, we conducted on-site testing in which we assessed samples of cases for controls by demonstrations of the divisions and offices’ internal systems. We conducted this performance audit from October 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix illustrates the template we used to assess the design of selected controls from each division and office that we reviewed at the Securities and Exchange Commission (SEC). For each control, we reviewed policies, procedures, and control objectives to determine if the design of the selected internal supervisory controls was consistent with federal internal control standards and SEC guidance for designing internal controls. To assess the extent to which design of the Securities and Exchange Commission’s (SEC) internal supervisory controls was consistent with federal internal control standards and SEC guidance for designing internal controls, we reviewed 39 internal supervisory controls across the four divisions and offices in place during fiscal year 2018. We used the policies, procedures, and control objectives to determine if the controls’ designs were consistent with the standards and guidance. This appendix illustrates the template we used to assess the operation of selected Securities and Exchange Commission internal supervisory controls. For each control, we compared control activity descriptions, including policy and procedure documents to determine whether selected controls operated as intended. As part of our review, we tested 18 internal supervisory controls across four divisions and offices at the Securities and Exchange Commission (SEC) to determine whether they operated as intended. Controls were assessed using SEC’s control activity descriptions, including related policy and procedure documents. For controls that operated as intended, SEC provided documentation demonstrating that all control activities were executed. We considered controls to have partially operated as intended if the documentation supported that only some control activities were executed or if at least one control activity did not operate as intended, but the overall control was executed. We did not identify any controls that did not operate as intended, but this would have applied to controls for which we received sufficient documentation and the divisions and offices did not execute all control activities. Controls that we could not assess lacked sufficient documentation that would have enabled us to determine whether they operated as intended. In addition to the contact named above, Kevin Averyt (Assistant Director), Christopher Ross (Analyst in Charge), Aaron A. Colsher, Justin Fisher, Efrain Magallan, Marc Molino, Kirsten Noethen, Barbara Roesmann, and Farrah Stone made key contributions to this report.", "summary": "Section 961 of the Dodd-Frank Wall Street Reform and Consumer Protection Act directs SEC to assess and report annually on internal supervisory controls and procedures applicable to staff performing examinations, investigations, and securities filing reviews. The act also contains a provision for GAO to report on SEC's internal supervisory control structure and staff procedures. GAO's last report was in 2016 ( GAO-17-16 ). This report examines SEC's internal supervisory control framework and assessment of staff procedures, the design of selected controls, and the operation of selected controls. GAO analyzed SEC's internal supervisory control framework and related policies and guidance and evaluated the design and execution of a non-generalizable sample of controls selected because they addressed high-risk processes. As of fiscal year 2018, the Securities and Exchange Commission's (SEC) internal supervisory control framework—which provides guidance for division and office staff responsible for assessing the effectiveness of internal supervisory controls —reflected federal internal control standards. GAO determined that SEC's framework included elements covering each of the five components of internal control—control environment, risk assessment, control activities, information and communication, and monitoring. However, SEC does not have written policies or guidance to ensure that relevant SEC divisions and offices systematically assess the effectiveness of procedures applicable to staff who perform examinations of registered entities, enforcement investigations, and reviews of corporate securities filings. Establishing such policies would provide SEC greater assurance that these procedures are effective at achieving their objectives. All the SEC controls GAO evaluated were designed consistent with standards, and a majority operated as intended. SEC guidance and federal internal control standards state that (1) controls should be designed to address objectives and respond to risks and (2) control activities should be implemented through policies, including documentation requirements, and include detail to enable management to monitor control execution. Control design. All 39 controls GAO evaluated included design elements to achieve SEC's control objectives and respond to risks it identified. However, 10 of these 39 controls did not include key attributes, such as requirements to document, and set time frames for, control execution (see fig.). Control operation. GAO could not assess the operation of three of 18 selected controls because documentation of control execution did not exist. Of the remaining controls, 12 operated as intended and three partially operated as intended. Examples of controls that operated as intended include SEC's approval of examinations and tracking of investigations. By more consistently following SEC guidance and federal internal control standards for developing control activities, including documentation requirements, relevant SEC divisions and offices would enhance their ability to monitor and ensure the effectiveness of their internal supervisory controls. Legend: Corporation Finance = Division of Corporation Finance; Enforcement = Division of Enforcement; OCIE = Office of Compliance Inspections and Examinations; and OCR = Office of Credit Ratings. Source: GAO analysis of Securities and Exchange Commission (SEC) documents. | GAO-20-115 GAO is making five recommendations to SEC related to developing policies to assess the effectiveness of staff procedures and ensuring that all relevant divisions and offices follow SEC guidance and federal internal control standards for implementing control activities through documented policies. SEC agreed with the recommendations.", "document_type": "gao"}
{"report": "Federal agencies and our nation’s critical infrastructures rely on information technology systems that are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the numerous operating systems, applications, and devices comprising their systems and networks. Further, federal systems and networks are at an increased risk of attack. This is due to those systems often being interconnected with other internal and external systems and networks, including the internet. Cloud computing relies on internet-based interconnectivity and resources to provide computing services to customers, while intending to free customers from the burden and costs of maintaining the underlying infrastructure. As federal agencies increasingly use cloud computing to perform their missions, the implementation of effective information security controls becomes more important. The effective implementation of a standardized process for securing cloud environments could reduce risks to agency systems and information maintained on an agency’s behalf. The Federal Information Security Modernization Act of 2014 (FISMA) was enacted to provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets. The act requires federal agencies to develop, document, and implement an information security program, and evaluate the program’s effectiveness. FISMA also requires OMB to develop and oversee the implementation of policies, principles, standards, and guidelines on information security in federal agencies, except with regard to national security systems. The law assigns OMB the responsibility of requiring agencies to identify and provide information security protections commensurate with assessments of risk to their information and information systems. In addition to implementing an agencywide security program, FISMA requires agencies to ensure the security of information and systems maintained by or on behalf of the agency. The law also applies to systems used or operated by a contractor or other organization on behalf of the agency, such as IT resources provided via cloud services. In December 2010, OMB issued a plan for improving IT management that included provisions for a decision framework to migrate IT services to cloud environments. Since then, OMB has developed cloud computing requirements, issued a number of cloud-related documents, and established FedRAMP. OMB cloud-related documents include: Federal Cloud Computing Strategy, which was intended to accelerate the government’s use of cloud computing by requiring agencies to evaluate safe, secure cloud computing options before making any new investments. Security Authorization of Information Systems in Cloud Computing Environments, which established FedRAMP in December 2011. 2019 Federal Cloud Computing Strategy, issued in June 2019, updates the 2011 Federal Cloud Computing Strategy and provides agencies with additional guidance on implementing cloud solutions and emphasizes cloud security as one of the three pillars of successful cloud adoption. In addition, the FedRAMP PMO established a framework for authorizing cloud services and guidance to help participants, including all agencies, implement it. According to the program management office, the framework is based on NIST guidance that agencies are supposed to follow. In addition to the framework, the program management office issued guidance on how agencies can leverage existing security authorization packages. Agencies can select different cloud services to support their missions. These services can range from a basic computing infrastructure on which agencies run their own software, to a full computing infrastructure that includes software applications. In defining cloud service models, NIST identifies three primary models, as follows: Infrastructure as a Service (IaaS). The cloud service provider delivers and manages the basic computing infrastructure of servers, software, storage, and network equipment. The agency provides the operating system, programming tools and services, and applications. Platform as a Service (PaaS). The cloud service provider delivers and manages the infrastructure, operating system, and programming tools and services, which the agency can use to create applications. Software as a Service (SaaS). The service provider delivers one or more applications and all the resources (operating system and programming tools) and underlying infrastructure, which the agency can use on demand. In addition, agencies can choose from a variety of arrangements for obtaining cloud services (called cloud deployment models), ranging from a private cloud for one organization to sharing a public cloud. NIST identified the following four cloud deployment models: Private cloud. The service is set up specifically for one organization, although there may be multiple customers within that organization and the cloud may exist on or off the customer’s premises. Community cloud. The service is set up for organizations with similar requirements. The cloud may be managed by the organizations or a third-party and may exist on or off the organization’s premises. Public cloud. The service is available to the general public and is owned and operated by the service provider. Hybrid cloud. The service is a composite of two or more of the three deployment models (private, community, or public) that are bound together by technology that enables data and application portability. These deployment models differ from each other in the number of consumers they serve, the nature of various consumers’ data that may be present in the cloud environment, and the amount of control consumers have over their data. A private cloud can allow for its consumers to have ultimate control in selecting who has access to that cloud environment. Community clouds and hybrid clouds allow for a mixed degree of consumers’ control and knowledge of other consumers. A public cloud allows access by all interested consumers, but, in doing so, should not allow one consumer who uses it to know or control data that belong to other consumers of that environment. Established by OMB and managed by GSA, the FedRAMP program is intended to provide a standardized approach to securing systems, assessing security controls, and continuously monitoring cloud services used by federal agencies. According to GSA, this approach is a “do once, use many times” framework that potentially lowers government costs, eliminates duplications, and ensures the consistent application of federal security requirements. The goals of FedRAMP are to: ensure that cloud-based services used by government agencies have adequate safeguards in place; eliminate the duplication of effort to assess security controls, and reduce risk management costs; and enable rapid and cost-effective procurement of information systems/service for federal agencies. The program’s key participants are the FedRAMP PMO, JAB, federal agencies, cloud service providers, and third-party assessor organizations. FedRAMP PMO. FedRAMP’s PMO is headed by GSA and serves as the facilitator of the program. The office’s responsibilities include managing the program’s day-to-day operations, creating guidance and templates for agencies and cloud service providers to use for developing, assessing, authorizing, and continuously monitoring cloud services per federal requirements (e.g., FISMA). JAB. The JAB is made up of chief information officers from the Department of Defense (DOD), DHS, and GSA. It is the primary governing and decision-making body of the program. The JAB is responsible for defining and establishing FedRAMP baseline security controls and accreditation criteria for third-party assessment organizations. The JAB is also responsible for issuing a provisional authorization to operate (P-ATO) for cloud services it determines will be leveraged across most of the federal government. Federal agencies. They are consumers and, in some cases, providers of cloud services. Agencies are responsible for ensuring that cloud services which process, transmit, or store government information, use FedRAMP’s baseline security controls before they issue subsequent authorizations for using those cloud services. Cloud service providers (CSP). These providers include commercial firms and some federal agencies that offer cloud services to agencies. Providers are required to meet the FedRAMP security requirements and implement the program’s baseline security controls. Providers work with an independent third-party assessment organization to conduct an initial system assessment, create security assessment documentation per the program’s requirements, and comply with federal requirements for incident reporting, among others. Third-party assessment organizations. These FedRAMP accredited assessors perform initial and periodic assessments of cloud providers’ controls to ensure they meet the program’s requirements. In addition, these assessors must be accredited through FedRAMP if they are assessing a cloud provider seeking a provisional authorization from the JAB. For details on the roles and responsibilities of other entities involved with the program, see table 6 in appendix II. In December 2015, the FedRAMP PMO developed a security assessment framework that is to be followed by the cloud service providers (providers) and agencies seeking to authorize cloud services through the program. In addition to outlining roles and responsibilities, the framework provides agencies and cloud service providers with guidance on elements key to issuing authorizations for using cloud services through the program. These elements are critical to developing the information system or cloud service authorization package. Authorization packages include, but are not limited to the following artifacts: a control implementation summary, the security plan, the security test plan and assessment report, and remedial actions plan. These artifacts are described in table 1. FedRAMP provides agencies with two options for authorizing cloud services. The first option, called a JAB authorization, involves the agency authorizing the cloud service based on a provisional authorization issued by the board. The second option, called an agency authorization, involves the agency issuing an authorization after either sponsoring a cloud service provider through FedRAMP, or by leveraging another agency’s FedRAMP authorization of that cloud service provider. Using either of these options, the agency is to review the authorization package for that cloud service prior to issuing its authorization. In reviewing the package, the agency is to consider the cloud service’s system impact level (low impact, moderate impact, or high impact), and deployment model, among other things, to help determine which authorization option is more appropriate. After an agency has reviewed the package and made a risk-based decision to authorize a cloud service for use, it is to formally document this decision in an authorization letter. The agency official authorizing the cloud service must provide a copy of the letter to the FedRAMP PMO. The PMO uses the information to verify agency use and keep other agencies informed of any changes to a provider’s authorization. As of July 2019, all 24 CFO Act agencies participated in FedRAMP. According to the program management office’s documentation, from June 2017 through July 2019, these agencies’ use of FedRAMP authorizations increased from 390 authorizations to 926 authorizations. Specifically, the number of JAB authorizations increased from 155 to 317—a 105 percent increase. Further, the total number of agency sponsored and –leveraged authorizations increased, from 235 to 609—a 159 percent increase. Figure 1 illustrates the increase in the number of FedRAMP authorizations for the 24 agencies from June 2017 through July 2019. Survey responses from 23 of 24 CFO Act agencies indicated that the highest number of cloud service authorizations through FedRAMP were for Software as a Service. Software as a Service accounted for 331 of the 590 reported authorizations or 56 percent. For the other two services, Infrastructure as a Service and Platform as a Service, agencies reported issuing 153 authorizations (26 percent) and 106 authorizations (18 percent), respectively. Figure 2, depicts the authorizations by agency and cloud service and shows that 18 of 23 agencies issued more authorizations for Software as a Service than Platform as a Service or Infrastructure as a Service. In addition, while agencies are consumers of cloud services, some agencies also serve as cloud service providers to other federal agencies. Four of 24 agencies reported that they served as cloud service providers to other federal agencies in FY 2017. All four agencies reported that their cloud services received authorizations that were approved through FedRAMP and used by other federal agencies. These four agencies reported a total of seven cloud services with an agency authorization and one cloud service with a provisional authorization from the JAB. OMB required all agencies to use FedRAMP for authorizing cloud services by June 2014, and by June 2017, all of the 24 CFO Act agencies were using the program. However, the agencies also used cloud services that were not authorized through the program. In responding to our survey, the majority of the agencies (15 of 24) reported that they used cloud services that were not authorized through FedRAMP. For instance, one agency reported that it used 90 cloud services that were not authorized through FedRAMP and the other 14 agencies reported using a total of 157 cloud services that were not authorized through FedRAMP. Seven agencies responded that they only use cloud services authorized through FedRAMP. Two agencies did not provide a response for this question. Agencies provided varying explanations for using cloud services that were not authorized through FedRAMP. For example, officials from two of the agencies stated that they were unable to identify providers authorized through the program that could meet their unique needs. An official from a third agency noted that the efforts to meet the program’s requirements were labor-intensive and that it was too expensive for the providers to become compliant with FedRAMP. In addition, that official stated that providers did not want to pursue FedRAMP compliance unless they had enough demand from federal customers. An official from a fourth agency stated that some of that agency’s cloud services were considered to be private and, thus, did not need to be authorized through the program. Nevertheless, according to that official, the agency performed its own authorization actions to ensure that FedRAMP requirements were met. In a similar example, an official at another agency noted that it took a significant amount of time for a provider to complete the FedRAMP process and that the agency had to issue its own authorization while the provider was going through the process. That authorization had not yet been approved through FedRAMP. The survey responses of cloud service providers were consistent with the agencies’ responses and indicated that multiple agencies were using cloud services that were not authorized or approved through FedRAMP. For example, 31 of 47 providers that responded to our survey reported that, during FY 2017, agencies had used their cloud services and those services were not authorized by FedRAMP. According to one cloud service provider, agencies were using 30 of its cloud services that were not authorized through FedRAMP. Another cloud service provider reported that agencies were using nine of its cloud services that were not authorized through the program. Officials from the FedRAMP program management office also provided several reasons why agencies did not use the program for all of their cloud services. For example, one PMO official indicated agencies had misperceptions of the program, its process, and resources required for a FedRAMP authorization. The official also specified that agencies did not use the program for all their cloud services because of internal resource constraints based on other competing agency priorities. Based on our work, another potential reason that agencies authorize cloud services outside of the FedRAMP program is that OMB has not adequately monitored compliance with this requirement. As mentioned earlier, OMB has issued a number of policies encouraging agencies to adopt cloud computing solutions and requiring agencies to use FedRAMP for authorizing cloud services. Nevertheless, OMB has not monitored agencies’ compliance or held agencies accountable for complying with the requirement to ensure that agencies are using the program to authorize their cloud services. According to an OMB technical specialist, the office collects and reviews data from the FedRAMP Marketplace to monitor agencies’ use of the program. However, the office does not collect data on the extent to which federal agencies are using cloud services authorized outside of the program or oversee agencies’ compliance with using FedRAMP. As a result, if OMB does not monitor or hold agencies accountable for using the FedRAMP program, OMB and federal agencies have reduced assurance that security controls required by the program are being consistently implemented. Additionally, OMB may lack information on agencies’ needs for cloud services. Although the four selected agencies included key documents supporting FedRAMP’s authorization process, they did not consistently include key information in those documents. Specifically, these four agencies did not consistently or fully address required information in system security plans, security assessment reports, and remedial action plans. In addition, the agencies did not always prepare their authorizations approving the use of cloud services. FedRAMP recommends that agencies use the FedRAMP Control Implementation Summary (CIS) when leveraging cloud services for their systems. In addition, FedRAMP specifies that agencies are to use NIST guidance when addressing their individual or shared control implementation responsibilities when leveraging cloud services. All 10 authorization packages we reviewed contained a summary, which identified agencies’ control implementation responsibilities as well as that of the cloud service providers. An objective of system security planning is to improve the protection of information system resources. A system security plan provides an overview of the security requirements for a system or cloud service and describes the controls that are in place or planned to meet those requirements. To identify controls that an agency will need to document on its security plan, the agency reviews the CIS which lists both the agency and CSP’s security control responsibilities. Further, NIST guidelines state that federal agencies’ system security plans should identify: an explicitly defined authorization boundary for the system, how the system operates in terms of mission and business processes, the security categorization of the system including supporting rationale, the operational environment of the system and connections to other information systems, the security controls in place or planned for meeting security requirements, including a rationale for supplementing controls, and a review and approval by the authorizing official or designated representative prior to plan implementation. As shown in table 2, the four selected agencies had documented security plans for 10 systems. However, the agencies had not consistently addressed the required information in their plans. As illustrated above, the security plans for the nine selected systems did not fully address all required information. For example, three plans partially identified the operational environment of the system, such as identifying external connections which could include the cloud service the agency system was leveraging. In addition, nine plans did not fully address the extent to which security controls were in place, including those listed as the agency’s responsibility. Further, agencies did not provide complete support that their authorizing officials had reviewed and approved the plans for five systems. Specifically, agencies provided signed letters indicating that the agencies initially approved the plans. However, agencies did not provide documentation to show that subsequent changes to the system security plan after the date of the signed letters were reviewed and approved by the authorizing official. Additionally, one agency had an expired letter. Until agencies fully address required information in their security plans, including the controls relied on by the cloud service provider, they have reduced assurance that security controls are in place and operating as intended. NIST specifies that organizations document the results of security assessments in a security assessment report. According to FedRAMP’s guidance, agencies are to use the Control Implementation Summary to identify controls that are their responsibility and assess agency-specific controls, inclusive of any agency controls that are shared with providers. The security assessment report is to summarize the control testing and describe whether the tested controls were effectively in place. As shown in table 3, agencies did not always summarize the testing of controls on security assessment reports. The four agencies prepared security assessment reports for each of the 10 selected systems. However, agencies summarized the results of control tests for only three of the 10 systems reviewed. USAID summarized the test results in the security assessment report for the agency system we reviewed, but the other three agencies did not consistently summarize their results. For example, HHS did not summarize test results for three controls for one system and six controls for another system. GSA did not summarize tests results for 17 controls for one of its systems. If security assessment reports do not fully summarize the test results, agencies may have limited assurance that the controls intended to protect agency data in the cloud environment are in place and operating effectively. A remedial action plan assists agencies in identifying, assessing, prioritizing, and monitoring progress in correcting security weaknesses that are found in information systems. NIST guidelines specify that organizations develop a remedial action plan, also referred to as a plan of action and milestones, to document the organization’s planned actions to correct weaknesses or deficiencies noted during the assessment of security controls of the information system. In addition, FedRAMP guidance stated that all agencies should follow FISMA which requires agencies to have a process for documenting remedial actions to address any deficiencies in the information security policies, procedures, and practices. OMB requires that remedial action plans include the following information: a description of the specific weakness; the name of the office or organization responsible for resolving the weakness; an estimate of the funding required to resolve the weakness, including the anticipated source of funding; an estimated completion date for resolving the weakness; key milestones with estimated completion dates; any changes to the key milestones and completion dates; the source of the identified weakness (e.g. security assessment, program review, inspector general audit, etc.); and the status of the corrective action (ongoing, completed, etc.). As shown in table 4, the four selected agencies documented remedial action plans for each of the selected systems, but did not consistently identify required information. As illustrated above, three plans partially identified the office responsible for addressing the weakness. Two plans did not include changes to information regarding key milestones and completion dates and two partially included the information. Further, two agencies partially identified the source of the weakness for three systems while a third agency did not identify any sources for the selected system. Until agencies include all required elements in their remedial action plans, they will be less likely to effectively assess, prioritize, and monitor efforts to resolve weaknesses in their systems. OMB defines an authorization to operate as an official management decision where a federal official or officials authorize the operation of information system(s) and accept the risk to agency operations and assets, individuals, and other organizations based on the implementation of security and privacy controls. OMB requires agencies to use FedRAMP processes when granting authorizations to operate for their use of cloud services. According to FedRAMP PMO guidance, authorizing officials should document the authorization of (1) the agency system supported by the cloud service and (2) the cloud service used by the agency. Additionally, the agency should provide a copy of its authorization letter for the cloud service (cloud service authorization letter) to the FedRAMP program management office so that the office can verify the agency’s use of the service and keep agencies informed of any changes to a provider’s authorization status. As shown in Table 5, agencies did not consistently prepare and provide the FedRAMP PMO with the cloud service authorization letter. GSA prepared both system and cloud service authorization letters for its two selected systems. However, the other three agencies did not consistently prepare the letters. Specifically, USAID did not consistently prepare letters authorizing the cloud service and the system supported by the cloud service. In addition, HHS and EPA did not consistently prepare letters authorizing their use of the cloud services. Further, EPA, HHS, and USAID did not consistently provide the FedRAMP PMO with authorization letters for cloud services. Although GSA and an HHS component, CDC, provided cloud service authorization letters to the FedRAMP PMO, only HHS included the requirement to provide the letter to the FedRAMP PMO in its guidance. Three of the four selected agencies did not include this requirement in their guidance. Not including this requirement in their security guidance could be a potential reason for agencies’ inconsistent implementation. If agencies do not provide copies of their cloud service authorization letters to the program management office, the office may not have accurate information on which agencies are using approved cloud services. Further, the lack of such information could result in the office being delayed in notifying agencies when a service provider’s authorization has been revoked or a provider has experienced a security incident. Agencies provided various reasons for not including required information in FedRAMP authorization documents. Such reasons included the agency was restricted from documenting proprietary information concerning the cloud service provider’s portion of the shared control in the security plan and the agency was tracking all remedial actions, but the agency did not include them in the plan it provided to us. By not including the required information, agencies have reduced assurance that controls over cloud services have been effectively implemented. FedRAMP participants identified a number of the program’s benefits, such as improved security of agencies’ data and increased efficiency for providers to obtain authorizations. Participants also cited a number of challenges, such as the agency resources needed for authorizing a cloud service or the resources needed by the provider to implement the program’s requirements. To address challenges, GSA has taken steps to improve the program, but its guidance on FedRAMP’s requirements and participant’s responsibilities was not always clear and the program’s process for monitoring the status of security controls over cloud services was limited. FedRAMP participants indicated that implementing certain elements of the program were challenging. Participants specifically identified the authorization process, remedial actions, and time and resources as key challenges. Authorization process and requirements. Complex authorization process. Surveyed participants—agencies and cloud service providers—responded that simplifying the agency authorization process would help them to better understand and manage their ongoing authorizations and continuous monitoring efforts. For example, 17 of 23 agencies, responding to this question, identified the agency authorization process as an area for improvement as did 30 of 47 surveyed cloud service providers. Survey respondents indicated that the agency authorization process should be streamlined to be less-restrictive and time-consuming. Agencies also reported that overcoming the complexity of the authorization process was one of their largest hurdles. According to the Director of FedRAMP, the FedRAMP PMO encourages agencies to streamline their agency authorization processes to be less- restrictive and time-consuming. Limitations with reviewing authorization packages. Agencies also identified reviewing authorization packages as a challenge. Agencies reported in the survey and during interviews that there were limitations in their ability to review cloud security packages prior to selecting a cloud service provider. Agencies that are currently using or want to evaluate specific FedRAMP authorized cloud services are able to access FedRAMP security packages directly through the FedRAMP Secure Repository, located on OMB MAX portal. However, agencies are given a 30-day period to access packages, which one agency official stated is too short of a time period for them to properly review documentation. Although access is limited to 30 days, agencies are able to renew the access by sending an email to the FedRAMP program management office. The Director of FedRAMP indicated that agencies can work directly with cloud service providers to obtain additional permissions to the package to save, print, email, post, publish, or reproduce. In addition, agencies expressed challenges with restrictions on downloading the packages, which limited their ability to automate their review of packages and subsequent monitoring of changes to the services security posture. Agencies also cited challenges with sharing review-related information due to the restrictive nature of cloud service nondisclosure agreements. The Director of FedRAMP mentioned that agencies can work directly with cloud service providers to obtain additional access permissions to their packages. Lack of uniform guidance for selecting cloud services. Federal agencies suggested that uniform guidance on authorization packages could assist FedRAMP customers in making better risk-based decisions in selecting cloud services. Agency officials we interviewed stated the quality and reviews of authorization packages approved through FedRAMP varied. Officials stated that inconsistencies in both FedRAMP agency and JAB provisional authorization packages have required some agencies to perform additional work. According to the officials, while the JAB process takes longer, the review appears to be more detailed than the agency process. Officials noted that improving guidance on reviewing authorization packages could help with the consistency and quality of the agency package reviews. The FedRAMP PMO has taken action and published guidance during our engagement to address more details of the authorization process. In addition, according to the Director of FedRAMP, the FedRAMP PMO launched a series of training events between February 2018 and June 2019 that provided detailed guidance into the package review process. Need for improved collaboration and coordination. Participants also identified opportunities for improving collaboration and coordination. Federal agencies suggested that improved collaboration among federal agencies in leveraging cloud services could provide transparency on the cloud service providers and the services other agencies are using. This could inform agencies on whether those services could be adopted to fit the need of their missions. Agencies also mentioned that FedRAMP PMO could improve its coordination across federal agencies and cloud service providers to provide consistent information and help facilitate opportunities to improve the program. For example, three participants suggested improving cross-agency collaborations for cloud authorizations. Additionally, one survey participant noted that improved collaboration within the cloud service provider community could provide a better understanding of the impacts and associated cost of potential changes to program’s policies or requirements before they are made. According to officials from the FedRAMP PMO, their standard practice is to solicit feedback from industry and agency stakeholders prior to release of significant guidance. They added that they plan to continue collaborating with agency and industry partners. Remedial action process. In responding to our survey, 9 of 23 agencies reported that the lack of clarity on actions taken to resolve weaknesses in systems supporting cloud services was a major or moderate challenge. Specifically, two agencies cited this area as a major challenge and seven as a moderate challenge. Two agencies suggested that the program management office could make improvements by providing better visibility and traceability of the remedial action process to inform agencies on the risks associated with a cloud service. Participants responded that the remedial action process could be improved by having structured procedures for aggregating system vulnerabilities and deficiencies. This would provide agencies with better information on weaknesses identified by cloud service providers or their third party assessors in order to better consider risks prior to the purchase or use of cloud services. Additionally, agencies cited the need for improvements to the consistency of remedial action plans. Specifically, agencies cited the need for a consistent format and content of remedial action plans among security packages. Further, one cloud service provider stated that outcome-based performance metrics were a better measure of monitoring the status and effectiveness of the ongoing authorization and assessment of cloud services, as opposed to only relying on remedial action plans. According to the Director for FedRAMP, the FedRAMP PMO developed additional remedial action guidance in February 2018 and a dedicated webpage specific to the remedial action process in January of 2018. Additionally, the Director noted that for all JAB provisional authorizations, the FedRAMP PMO and JAB analyzes raw data on vulnerability scans and provides a one-page summary report that is available to agencies within the OMB MAX portal. Commitment of time and resources to complete and maintain an agency authorization. The amount of time to complete an agency authorization to operate for a cloud service was cited as one of the most challenging aspects of FedRAMP. In responding to our survey, six agencies cited the commitment of time and resources for agency authorizations as a major challenge; five agencies identified it as a moderate challenge; and six as a minor challenge. One responding agency mentioned that the time and costs associated with completing and maintaining an ongoing agency authorization was burdensome to both the agency and cloud vendor. This burden was due to a lack of allocated agency resources to continue implementing the program’s requirements. In response to this challenge, the program management office has streamlined the authorization process for low-risk systems to allow for risk-based decisions that can reduce the time and resources required for an agency authorization. In addition, 36 of 47 cloud service providers responding to our survey indicated that the significant amount of resources required to implement the program’s requirements for an authorization was a major or moderate challenge. Additionally, JAB technical representatives identified many of the challenges and opportunities for improving the program that agencies and cloud service providers identified. In addition, the officials stated that the FedRAMP PMO is aware of these issues and has taken steps to address them. According to the JAB technical representatives, the FedRAMP PMO’s program intended improvements include, but are not limited to, updates to guidance and education resources, plans to automate the continuous monitoring process with vulnerability scanning tools, and reduced time and costs associated for completing the authorization process for both customer agencies and cloud service providers. According to the Director for FedRAMP, the FedRAMP PMO has continued to make enhancements based on industry and agency feedback. The official reported that numerous guidance documents, relating to continuous monitoring, the agency authorization process, and FedRAMP designations have been released during our engagement. The official also mentioned that the PMO actively seeks feedback from stakeholders and that additional opportunities for FedRAMP training was available. GSA has taken a number of steps to improve FedRAMP. Among other things, the office has provided updated instructions for completing authorization packages and established and updated its training portal to help agencies and cloud service providers better understand the steps required for obtaining an authorization. In addition, the office has taken steps to streamline the authorization process and provided additional guidance on continuous monitoring of security controls over cloud services. Nevertheless, FedRAMP’s requirements and guidance on implementing controls were not always clear and the program’s process for monitoring the status of security controls over cloud services was limited. Clarity in program requirements and responsibilities. Agencies reported challenges with understanding FedRAMP’s requirements and the process for granting an agency authorization. Specifically, agencies cited the need for clearer guidance on requirements and agency responsibilities for completing and maintaining an authorization. Eight agencies reported the clarity of FedRAMP requirements associated with the agency authorization process as a moderate challenge; whereas nine identified it as a minor challenge and no agencies reported it as a major challenge. Five agencies reported this was not a challenge. In addition, 20 of 24 surveyed agencies indicated that additional guidance describing roles and responsibilities would be very or moderately useful to their participation in FedRAMP. Further, 37 of 47 cloud service providers specified that additional guidance for describing the security roles and responsibilities between agencies and cloud service providers was needed. Both agencies and cloud service providers commented that existing guidance for using the program does not fully address control implementation roles and responsibilities and that a process should be established to address these issues. Officials from selected agencies also indicated that responsibilities were not always clearly detailed. Specifically, HHS, GSA, and USAID officials stated that guidance for using FedRAMP could be clearer on helping define roles and responsibilities between agencies and providers in implementing security controls for cloud services. The JAB technical representatives we interviewed acknowledged that while control implementation responsibilities between the agency and cloud service provider are defined in the Control Implementation Summary, in some cases, shared responsibilities are not clearly delineated. The JAB technical representatives stated that the unclear shared responsibilities could lead to inconsistent implementation of certain controls between the agency and its provider. According to the Director of FedRAMP, it is the cloud service providers’ responsibility to ensure the spreadsheet identifying control responsibilities are completed accurately and consistently. Our analysis of agency documentation of required information in authorization packages found that the cause of selected agencies’ gaps in required information for security plans, security assessment reports and remedial action plans were due in part, to unclear guidance for implementing their control responsibilities. If responsibilities are not clear, agencies may have reduced ability to ensure that controls over the cloud services they authorized are in place and effective. Limited capabilities for continuously monitoring security controls. FedRAMP’s continuous monitoring process does not allow for an automated review of control requirements by agencies with security management tools. According to NIST SP 800-137, security continuous monitoring is maintaining an ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. In addition, NIST mentions that timely, relevant, and accurate information is vital, particularly when resources are limited and agencies must prioritize their efforts. According to the program’s officials, they will be working with NIST to incorporate automation into the authorization process. Based on our work and survey responses from agencies and cloud service providers, a number of weaknesses with the program’s continuous monitoring process existed. For example, copy-protected PDFs, Word documents, and Excel spreadsheets comprised the remedial action plans and other documents supporting continuous monitoring of FedRAMP cloud service provider controls. Because of the static nature of the documents, including restrictions on copying information concerning cloud service provider controls, the documents could not be readily integrated with agencies’ automated security management tools in providing ongoing awareness of control implementation. Further, agency staff would have to spend time manually accessing and reviewing the documents each time they needed to determine the status of a cloud service’s implementation of a particular control. Agency personnel would also have to confirm that the documents they reviewed were the most current version. According to the Director of FedRAMP, agencies may request unrestricted access to the security package directly from the provider. Agencies’ survey responses also indicated that: 1) remedial action plans, used in continuous monitoring, were not updated consistently, 2) the manual process did not allow for automated data feeds into their continuous monitoring tools, and 3) restrictions on copying documents reduced information sharing within the agency. Further, 21 of 23 agencies responded that FedRAMP’s continuous monitoring of cloud security controls was a needed area of improvement. Cloud service providers also reported difficulties (36 of 47) with implementing continuous monitoring which could highlight the need for further improvements. In response, the Director of FedRAMP indicated that as of October 30, 2018, the FedRAMP PMO consolidated all continuous monitoring guidance documents, templates, and blog posts to a single webpage for ease of access by program stakeholders. JAB technical representatives also acknowledged challenges with implementing continuous monitoring such as difficulties with using continuous monitoring reports to assess the security posture of a cloud service. According to JAB technical representatives, agencies are responsible for reviewing continuous monitoring reports from the cloud service providers, but not all agencies could effectively conduct continuous monitoring. For example, an agency’s continuous monitoring efforts could be affected from not receiving a timely notification that its cloud service provider has uploaded the required monthly continuous monitoring updates, including updates to remedial actions. According to the Director of FedRAMP, the OMB MAX portal provides the capability for agencies to receive automatic notifications when there is an update to the continuous monitoring. Agencies can enable updates by selecting the “Watch this Page” option in the menu bar. While the FedRAMP PMO recommends agencies to enable this feature, agencies were not aware of the feature. As a result, agencies may not be aware that such updates have taken place and tend to be reliant on a providers’ ability to ensure that effective security practices are in place. The JAB technical representatives commented that as cloud services evolve and mature, the continuous monitoring process needs to become more automated and user-friendly to provide real-time awareness of the security status of cloud services. Until the PMO allows for more options to automate continuous monitoring, agencies may have less assurance that they will receive timely information on the extent that controls are being effectively implemented for the cloud services they are using. In addition, as more federal agencies move toward DHS’s Continuous Diagnostics and Mitigation program, automation may become even more important. Although federal agencies increased their use of FedRAMP, they continued to authorize the use of cloud services that had not been approved through the program. While OMB requires agencies to use FedRAMP to authorize the use of cloud services, it did not monitor or ensure that agencies used the program to authorize cloud services. As a result, agencies have less assurance that security controls over cloud services have been consistently implemented. The selected agencies did not fully address key elements necessary for implementing the FedRAMP authorization process. Agencies did not consistently address required information for implementing controls, summarizing control tests, and tracking corrective actions. In addition, agencies also did not always provide the FedRAMP PMO with their cloud service authorization letters. By not fully addressing these elements, agencies have less assurance that they have effectively implemented security controls intended to protect their data in cloud environments and that those controls operating as intended. FedRAMP participants identified a number of benefits as well as challenges with the program. Among other benefits, several agencies indicated that FedRAMP improved of the security of their data. However, participants identified challenges with the program and areas where the program could be improved. GSA has taken a number of actions toward improving and furthering the program’s progress, nonetheless unclear guidance and limitations with FedRAMP’s continuous monitoring process could hamper the program’s effectiveness and result in agencies implementing the program unevenly. We are making a total of 25 recommendations—1 recommendation to OMB and 24 recommendations to the 4 selected agencies in our review, including additional recommendations to GSA as the FedRAMP program lead. The Director of OMB should establish a process for monitoring and holding agencies accountable for authorizing cloud services through FedRAMP. (Recommendation 1) The Administrator of GSA should direct the Director of FedRAMP to clarify guidance to agencies and cloud service providers on program requirements and responsibilities. (Recommendation 2) The Administrator of GSA should direct the Director of FedRAMP to improve the program’s continuous monitoring process by allowing more automated capabilities, including for agencies to review documentation. (Recommendation 3) The Administrator of GSA should update security plans for selected systems to include the description of security controls and reviews and approvals plan. (Recommendation 4) The Administrator of GSA should update the security assessment report for the selected system to identify the summarized results of control effectiveness tests. (Recommendation 5) The Administrator of GSA should update the list of corrective actions for selected systems to identify the responsible office and estimated funding required and anticipated source of funding. (Recommendation 6) The Administrator of GSA should develop guidance requiring that cloud service authorization letters be provided to the FedRAMP program management office. (Recommendation 7) The Secretary of HHS should direct the Director of CDC to update the security plan for the selected system to identify the authorization boundary, the system operational environment and connections, a description of security controls, and the individual reviewing and approving the plan and date of approval. (Recommendation 8) The Secretary of HHS should direct the Director of CDC to update the security assessment report for the selected system to identify the summarized results of control effectiveness tests. (Recommendation 9) The Secretary of HHS should direct the Director of CDC to update the list of corrective actions for the selected system to identify the specific weaknesses, funding source, changes to milestones and completion dates, identified source of weaknesses, and status of corrective actions. (Recommendation 10) The Secretary of HHS should direct the Administrator of CMS to update the system security plans for selected systems to identify a description of security controls. (Recommendation 11) The Secretary of HHS should direct the Administrator of CMS to update the security assessment report for selected system to identify the summarized results of control effectiveness tests. (Recommendation 12) The Secretary of HHS should direct the Administrator of CMS to update and document the CMS remedial action plan for the selected system to identify the anticipated source of funding. (Recommendation 13) The Secretary of HHS should direct the Administrator of CMS to prepare letters authorizing the use of cloud services for the selected systems and submit the letters to the FedRAMP program management office. (Recommendation 14) The Secretary of HHS should direct the Director of NIH to update security plans for selected systems to identify the authorization boundary, system operation in terms of mission and business processes, operational environment and connections, and a description of security controls. (Recommendation 15) The Secretary of HHS should direct the Director of NIH to update the security assessment report for selected systems to identify summarized results of control effectiveness tests. (Recommendation 16) The Secretary of HHS should direct the Director of NIH to update the NIH list of corrective actions for selected systems to identify estimated funding and anticipated source of funding, key milestones with completion dates, and changes to milestones and completion dates. (Recommendation 17) The Secretary of HHS should direct the Director of NIH to submit the division’s letters authorizing the use of cloud services for the selected systems to the FedRAMP program management office. (Recommendation 18) The Administrator of EPA should update security plan for the selected operational system to identify a description of security controls, and the individual reviewing and approving the plan and date of approval. (Recommendation 19) The Administrator of EPA should update the security assessment report for the selected operational system to identify the summarized results of control effectiveness tests. (Recommendation 20) The Administrator of EPA should update the list of corrective actions for the selected operational system to identify the specific weakness, estimated funding and anticipated source of funding, key remediation milestones with completion dates, changes to milestones and completion dates, and source of the weaknesses. (Recommendation 21) The Administrator of EPA should prepare the letter authorizing the use of cloud service for the selected operational system and submit the letter to the FedRAMP program management office. (Recommendation 22) The Administrator of EPA should develop guidance requiring that cloud service authorization letter be provided to the FedRAMP program management office. (Recommendation 23) The Administrator of USAID should update the list of corrective actions for the selected system to include the party responsible for addressing the weakness, and source of the weakness. (Recommendation 24) The Administrator of USAID should prepare the letter authorizing the use of cloud service for the selected system and submit the letter to the FedRAMP program management office. (Recommendation 25) We provided a draft of this report to OMB and the 24 CFO Act agencies for review and comment. In response, we received comments from OMB and the four agencies (GSA, HHS, EPA, and USAID) to which we made recommendations. Specifically, in comments provided via email on October 15, 2019, an OMB Associate General Counsel stated that OMB neither agreed nor disagreed with our draft recommendation that it establish a process for monitoring and enforcing agency compliance with its guidance on using FedRAMP. The official asserted that OMB does not have a mechanism for enforcing agencies’ compliance with its guidance on FedRAMP. However, we believe OMB can and should hold agencies accountable for complying with its policies. Policies without accountability mechanisms present the risk that the benefits expected from their implementation will likely not be realized. To ensure our position is clearly stated, we modified the recommendation to state that OMB should establish a process for monitoring and holding agencies accountable for authorizing cloud services through FedRAMP. In addition, the OMB Associate General Counsel stated that the report did not appropriately reflect FedRAMP’s progress. We disagree. Although identifying the program’s progress was not one of our objectives, we highlighted several areas throughout the report where progress was achieved such as the agencies’ increasing use of the program to authorize cloud services and the development of additional guidance and training opportunities for using the program. The OMB Associate General Counsel also commented on the duration of the audit. Additionally, OMB commented that our use of surveys on agencies and cloud service providers’ use of FedRAMP did not address whether the program was meeting its overall objectives, but presented more of a perception. As discussed in the scope and methodology for this review, and consistent with our objectives, the purpose of the surveys was to obtain program participants’ views on the benefits, challenges, and their use of the program. Additionally, our review, as designed, including our timelines, allowed us the opportunity to best assess the implementation of the program. OMB also provided technical comments, which we have incorporated into our report as appropriate. In its written comments, GSA concurred with each of our six recommendations. The agency stated that it is developing a plan to address the recommendations. GSA’s comments are reprinted in appendix IV. In written comments, HHS concurred with each of our 11 recommendations. One operating division, CDC, noted that our observations were narrowly focused on authorization artifacts and did not take their FISMA compliant authorization process into account. We disagree. Our reviews of their FedRAMP authorization processes included procedures for reviewing security practices that are required under FISMA. The department stated that it would work with its operating divisions to address our recommendations. HHS’s comments are reprinted in appendix V. The agency also provided technical comments, which we incorporated into the report as appropriate. EPA provided written comments, in which it disagreed with the findings for two recommendations, partially agreed with the findings for one recommendation and disagreed with two other recommendations. EPA disagreed with the finding supporting our recommendation to update the security plans for the two selected systems to identify specific required information The agency stated that one of the systems we selected for review was no longer in production and not used for EPA's operations. Nevertheless, the agency stated that its chief information security officer would coordinate with the agency’s information security officers to ensure that security plans for the systems used to support its operations include all required information. We acknowledged in the report that EPA discontinued the system after we completed our review of the system’s authorization package. However, our recommendation in the draft report did not clearly convey that it was intended only for the operational system. Thus, we revised the recommendation to specify the system in operation. EPA disagreed with the finding supporting our recommendation to update the security control assessment report for one of the selected systems to identify the summarized results of control effectiveness tests. The agency stated that it used a FedRAMP certified third-party assessor that provided full documentation of control test results. However, neither the security assessment report nor other documents that EPA provided to us summarized information on how the agency tested the effectiveness of its corrective actions to rectify a critical control that had previously failed. As a result, EPA had limited assurance that it had effectively implemented a control that was intended to protect agency data in the cloud environment. Accordingly, we believe that our recommendation is warranted. EPA partially agreed with the finding supporting our recommendation to update the list of corrective actions for the selected systems to identify specific required information. The agency stated that one of the systems we selected for review was no longer in production and not used for EPA's operations. In addition, the agency said that the Chief Information Security Officer would coordinate with agency information security officers to ensure that plans of corrective actions and milestones include all required information, as appropriate. We acknowledged in the report that EPA discontinued its use of the system after we completed our review of the system’s authorization package. However, our recommendation in the draft report did not clearly convey that it was intended only for the operational system. As a result, we revised the recommendation to specify the system in operation. EPA disagreed with our recommendation that the agency prepare letters authorizing the cloud services for the selected systems and submit the letters to the FedRAMP program management office. The agency stated that one of the systems we selected for review was no longer in production and not used for EPA's operations. We acknowledged in the report that EPA had discontinued the system after we completed our review of the system's authorization package. However, our recommendation in the draft report did not clearly convey that it was intended only for the operational system. We have revised the recommendation accordingly. EPA also stated that it prepares and sends authorization letters for cloud services to the FedRAMP PMO. However, at the time of our review, the FedRAMP PMO stated it had not received the cloud service authorization letter from EPA for the selected operational system. We believe that our revised recommendation for EPA to prepare and send the cloud service authorization to the FedRAMP PMO for the operational system is warranted. EPA disagreed with our recommendation that the agency develop guidance requiring cloud service authorization letters to be provided to the FedRAMP program management office. The agency stated that it had a standard operating procedure in which the EPA Chief Information Security Officer forwards the letters to the FedRAMP program management office. However, the agency did not provide us a copy of the standard operating procedure or otherwise demonstrate that it had such an operating procedure. Thus, we continue to believe that the recommendation is warranted. EPA’s comments are reprinted in appendix VI. The agency also provided technical comments, which we incorporated into the report, as appropriate. Further, in written comments, USAID concurred with two of our three recommendations, but did not concur with the third. Specifically, USAID concurred with the two recommendations for the agency to update the list of corrective actions for the selected system and prepare the letter authorizing the use of cloud services supporting the system and submit it to the FedRAMP program management office. However, USAID did not concur with our recommendation to update the system security plan for the selected system to identify the authorization boundary, system operational environment and connections, and a description of security controls. The agency provided additional information that it had documented the authorization boundary, system operational environment and connections, and security controls for the selected system. Upon our review of the information, we agreed that the agency had sufficiently documented these items. Accordingly, we revised our report to reflect the agency’s actions and withdrew the recommendation from the report. USAID’s comments are reprinted in appendix VII. In addition to the aforementioned responses, two agencies—the Department of Veterans Affairs and the Social Security Administration— provided written responses stating that they had no comments on the draft report. These agencies’ responses are reprinted in appendixes VIII and IX, respectively. Also, the Department of Justice provided technical comments, which we incorporated into the report as appropriate. Sixteen CFO agencies provided emails stating that they had no comments on the draft report. These agencies were the Departments of Agriculture, Commerce, Defense, Education, Energy, Homeland Security, Housing and Urban Development, the Interior, Labor, State, Transportation, and the Treasury; as well as the National Aeronautics and Space Administration, National Science Foundation, Nuclear Regulatory Commission, and Office of Personnel Management. We did not receive a response from one agency—the Small Business Administration. We are sending copies of this report to appropriate congressional committees, the Director of the Office of Management and Budget, the 24 CFO Act agencies; and other interested parties. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions on matters discussed in this report, please contact Gregory C. Wilshusen at (202) 512-6244 or WilshusenG@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix X. Our objectives were to determine the extent to which 1) federal agencies used FedRAMP to authorize the use of cloud services, 2) selected agencies addressed key elements of the program’s authorization process, and 3) program participants identified FedRAMP benefits and challenges. The scope of our review included the 24 agencies covered by the Chief Financial Officers Act. To address the three objectives, we developed one survey for the 24 agencies and another survey for 83 cloud service providers identified by the FedRAMP Program Management Office (PMO) as participating in the program. We administered these web-based surveys between April and November 2018. We sent two follow-up email messages to all nonrespondents and subsequently attempted to contact the remaining nonrespondents by telephone or email at least twice more. To inform our survey questions and options, we designed our questionnaire based on FedRAMP PMO documentation and interviews with the 24 agencies and cloud service providers. We pretested the surveys with three major federal agencies, three cloud service providers, and one internal GAO group. We requested that agency chief information officers and chief information security officers review and confirm the results of the survey. We received completed surveys from 24 of 24 agencies (a 100 percent response rate) for our agency survey and 47 of the 83 cloud survey providers identified (a 57 percent response rate) for our cloud service provider survey. Not all survey respondents provided answers to all survey questions. With any survey, error can be introduced with respect to measurement of concepts, representation of respondents, and other factors, and we took steps to minimize these errors. We conducted a nonresponse bias analysis to determine whether certain cloud service providers might have been more or less likely to respond to the survey than others. Specifically, we examined whether a cloud service provider’s service model (e.g., Software as a Service, Infrastructure as a Service, Platform as a Service), impact level (e.g., high, moderate, low), or deployment model (e.g., government, hybrid, private) was related to whether the CSP responded to the survey. We found that a higher share of cloud service providers that provide Software as a Service (SaaS) responded to the survey than those that provide Infrastructure as a Service (IaaS). In addition, we found that a higher share of cloud service providers that deployed in the government community cloud responded to the survey than those that deployed in the public cloud. These results suggest that cloud service providers that utilize certain service or deployment models were more likely to reply to the survey than others. As a result, the responses of the cloud service provider survey represent only those cloud service providers that participated in this survey, and are not generalizable to cloud service providers as a whole. Despite these limitations, the survey results provide insight into the experiences and views of cloud service providers that did respond. In addition to the surveys, to address our first objective, we examined 2017, 2018, and 2019 Joint Authorization Board (JAB) and agency authorization data from the 24 agencies to determine if there were an increase, decrease, or no change in the usage of the program. We also interviewed knowledgeable officials from the 24 agencies and FedRAMP PMO to obtain their views on the program. To address our second objective, we selected four agencies from the 24 agencies based on those with the highest and lowest amount of FedRAMP PMO reported FedRAMP authorizations as of June 15, 2017. We selected the four agencies by dividing them into three equal groups of eight agencies based on the highest to lowest number of FedRAMP PMO reported service authorizations. We selected at least one agency with the highest number of authorizations through FedRAMP in each group, unless we conducted prior FedRAMP work with the agency. Given that two agencies in the third group had the same number of services authorized, we selected both agencies as one had a higher number of reported provisional authorizations through the FedRAMP Joint Authorization Board process and the other had the higher number of reported authorizations through the FedRAMP agency process. To avoid a duplication of our efforts given limited resources, we excluded DOD because another GAO team was reviewing the department’s cloud- related efforts, which included leveraging FedRAMP authorizations. As a result, we selected the Department of Health and Human Services, General Services Administration, the Environmental Protection Agency, and the United States Agency for International Development for our review. Because HHS is a large federated agency, we selected three operating divisions for a more detailed review. The three operating divisions included the Centers for Disease Control and Prevention (CDC), Centers for Medicare and Medicaid (CMS), and National Institutes of Health (NIH). We selected these divisions based on their extensive usage of cloud service providers authorized through FedRAMP. To select the agency systems’ authorization packages for review, we first identified six cloud services based on FedRAMP PMO data that indicated as of June 15, 2017, the 24 agencies used these cloud services the most. We then requested the selected agencies to provide us with an inventory of systems that relied on the six cloud services in fiscal years 2017 and 2018. From these inventories, we selected 10 agency systems. However, due to sensitivity concerns, we are not disclosing the names of the systems in this report. The case studies we selected are not generalizable to the other agencies covered by the Chief Financial Officers Act. However, it may show the potential FedRAMP issues other agencies face. For each agency system, we reviewed security authorization documentation, including: cloud service provider documentation, such as the Control Implementation Summary on agency and cloud service provider responsibilities to determine the extent agencies documented selected core controls and consistently documented responsibilities in the system security plan; security plans to determine the extent to which plans documented and implemented selected identified core security controls, and met FedRAMP and National Institute of Standards and Technology (NIST) elements; security assessment reports to determine if the effectiveness of selected core controls had been assessed and operating as intended; the extent to which agencies documented remedial action plans for selected systems to determine if they met FedRAMP or Office of Management and Budget (OMB) elements; and authorization letters to determine the extent appropriate officials approved a cloud service and agency system for use. To select identified core controls as part of our authorization documentation review, we identified and selected 24 security controls from the 97 identified core controls. Then, to determine the agencies’ compliance with the FedRAMP authorization process to assure the protection of agency data, we compared the authorization documentation with the Federal Information Security Modernization Act of 2014, the Federal Risk and Authorization Management Program guidance, including the program’s Security Assessment Framework, OMB guidance, and NIST Special Publication 800-53 Revision 4. Each authorization package area was examined and reviewed by an analyst and each conclusion was corroborated by a second analyst. Where there was disagreement in the assessment, analysts discussed their analysis and reached a consensus. In addition, we interviewed security representatives and management officials from our selected agencies to determine the effectiveness of the FedRAMP authorization process in reviewing the controls necessary for securing agency data in the cloud, and potential rationale for deficiencies identified in authorization documentation. We also interviewed FedRAMP PMO and OMB staff on their efforts related to the FedRAMP authorization process. To address our second and third objectives, we also interviewed JAB technical representatives to obtain their views on the benefits and challenges of FedRAMP. Additionally, we obtained information about how the JAB technical representatives reviewed authorization packages. To determine the reliability of the data used to select agencies and of other data to address our three objectives, we assessed the following: FedRAMP program management office points of contact list provided for active cloud service providers and federal agency users of FedRAMP, FedRAMP program management office data on the 24 CFO Act agencies’ fiscal years 2017, 2018, and 2019 JAB and agency authorizations, FedRAMP program management office data on cloud service provider participation and agency usage of FedRAMP as of June 15, 2017, Agency inventory of systems relying on selected cloud services, Cloud service provider authorization documentation contained within Cloud service provider and agency reported third-party assessment organizations’ security assessment reports, and Agency plans of actions and milestones. To assess the reliability of the information received and reviewed on the FedRAMP marketplace, we collected and reviewed information on agencies’ quality control procedures and asked program officials relevant questions on the FedRAMP authorization log standard operating procedure. We reviewed GSA program officials’ responses to our data reliability questions such as: how the information was generated, how current the data provided was, how frequently it was updated, and how the data was accurately and consistently entered into the system used. The limitation FedRAMP officials noted was that the data generated was based on voluntarily provided authorization to operate letters submitted to the FedRAMP program management office by each of the CFO Act agencies. To ensure that the agency systems we reviewed relied on selected cloud service provider products, we had agencies confirm their use of the service supporting the agency’s system. We then compared the selected services with agencies’ annual FISMA reporting to OMB along with system security documentation (e.g. system security plans) to determine whether the cloud service services we selected were applicable to the selected agency system. A limitation with this method of selection is if an agency’s inventory is inaccurate, we would need to reselect a system. For this review, one agency’s inventory and system was incomplete resulting in removing that agency system from our selection. To confirm agencies’ virtual access to packages in OMB’s repository or a cloud service provider’s repository, we obtained screen captures of web portal contents from the FedRAMP PMO. We compared these screen captures with our own virtual access to the packages. We also obtained additional information from the FedRAMP PMO on how it ensures the accuracy and reliability of the cloud service provider package information. One limitation of this method is that cloud service providers could update documentation where access was outside of OMB MAX portal, and the PMO may not be immediately aware of package updates. To verify the accuracy and reliability of plans of actions and milestones provided by agencies, we compared the agency’s plans of actions and milestones with required OMB elements. We also requested that agencies describe how they generated the plans of action and milestones provided to us, identify the quality control procedures used, and any limitations to the data they provided. We evaluated the materiality of the information we obtained and compared it to our audit objectives. We assessed the reliability of the information by reviewing related documents and internal controls such as agency policies and procedures as well as examining packages stored in OMB’s MAX portal and cloud service provider repositories. We also interviewed knowledgeable agency officials. Through these methods, we concluded that the information was sufficiently reliable for the purposes of our reporting objectives. We conducted this performance audit from November 2016 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: FedRAMP Roles and Responsibilities Roles and responsibilities Issues policies which define the key requirements and capabilities of the FedRAMP program. Oversees and reports on agencies’ implementation of information security requirements, including implementation of FedRAMP. Develops processes for agencies and providers to request FedRAMP security authorization; Creates a framework for agencies to leverage security authorization packages; Establishes a centralized and secure repository for authorization packages that agencies can leverage to grant security authorizations; Coordinates with the National Institute of Standards and Technology ( NIST) and American Association for Laboratory Accreditation to implement a formal conformity assessment to accredit assessors; Develops templates for standard contract language and service level agreements , Memorandum of Understanding and/or Memorandum of Agreement; and Is led by GSA and serves as a liaison to ensure effective communication among all participants. Defines and updates the FedRAMP security authorization requirements; Approves accreditation criteria for third-party assessment organizations; Reviews security assessment packages of cloud service providers to grant provisional authorizations; Ensures provisional authorizations are reviewed and updated regularly; and Notifies agencies of changes to or removal of provisional authorizations. Advises FedRAMP on FISMA compliance guidance and assists in developing the standards for the accreditation of independent third-party assessment organizations (3PAO). Distributes FedRAMP information to federal CIOs and other representatives through cross- agency communications and events. Assists government-wide and agency-specific efforts to provide adequate, risk-based and cost- effective cyber security; Coordinates cyber security operations and incident response; Develops continuous monitoring standards for ongoing cyber security of federal Information systems; and Develops guidance on agency implementation of the Trusted Internet Connection program with cloud services. Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov. In addition to the individual named above, Sara Ann W. Moessbauer, (Director), Larry Crosland (Assistant Director), Rosanna Guerrero (Analyst-in-Charge), Sher’rie Bacon, Nabajyoti Barkakati , Christina Bixby, David Blanding, Chris Businsky, Fatima Jahan, David Plocher, Dana Pon, Carl Ramirez, Cynthia Saunders, and Priscilla Smith made significant contributions to this report.", "summary": "Federal agencies use internet-based (cloud) services to fulfill their missions. GSA manages FedRAMP, which provides a standardized approach to ensure that cloud services meet federal security requirements. OMB requires agencies to use FedRAMP to authorize the use of cloud services. GAO was asked to review FedRAMP. The objectives were to determine the extent to which 1) federal agencies used FedRAMP to authorize cloud services, 2) selected agencies addressed key elements of the program's authorization process, and 3) program participants identified FedRAMP benefits and challenges. GAO analyzed survey responses from 24 federal agencies and 47 cloud service providers. GAO also reviewed policies, plans, procedures, and authorization packages for cloud services at four selected federal agencies and interviewed officials from federal agencies, the FedRAMP program office, and OMB. The 24 federal agencies GAO surveyed reported using the Federal Risk and Authorization Management Program (FedRAMP) for authorizing cloud services. From June 2017 to July 2019, the number of authorizations granted through FedRAMP by the 24 agencies increased from 390 to 926, a 137 percent increase. However, 15 agencies reported that they did not always use the program for authorizing cloud services. For example, one agency reported that it used 90 cloud services that were not authorized through FedRAMP and the other 14 agencies reported using a total of 157 cloud services that were not authorized through the program. In addition, 31 of 47 cloud service providers reported that during fiscal year 2017, agencies used providers' cloud services that had not been authorized through FedRAMP. Although the Office of Management and Budget (OMB) required agencies to use the program, it did not effectively monitor agencies' compliance with this requirement. Consequently, OMB may have less assurance that cloud services used by agencies meet federal security requirements. Four selected agencies did not consistently address key elements of the FedRAMP authorization process (see table). Officials at the agencies attributed some of these shortcomings to a lack of clarity in the FedRAMP guidance. Program participants identified several benefits, but also noted challenges with implementing the FedRAMP. For example, almost half of the 24 agencies reported that the program had improved the security of their data. However, participants reported ongoing challenges with resources needed to comply with the program. GSA took steps to improve the program, but its FedRAMP guidance on requirements and responsibilities was not always clear and the program's process for monitoring the status of security controls over cloud services was limited. Until GSA addresses these challenges, agency implementation of the program's requirements will likely remain inconsistent. GAO is making one recommendation to OMB to enhance oversight, two to GSA to improve guidance and monitoring, and 22 to the selected agencies, including GSA. GSA and HHS agreed with the recommendations, USAID generally agreed, EPA generally disagreed, and OMB neither agreed nor disagreed. GAO revised four recommendations and withdrew one based on new information provided; it maintains that the remaining recommendations are warranted.", "document_type": "gao"}
{"report": "BLM leases federal lands to private entities for oil and gas development generally through auctions. In the auctions, if BLM receives any bids that are at or above the minimum acceptable bid amount of $2 an acre— called bonus bids—the lease is awarded to the highest bidder (leases obtained in this way are called competitive leases). Tracts of land that do not receive a bid at the auction are made available noncompetitively for a period of 2 years on a first-come, first-served basis (leases obtained in this way are called noncompetitive leases). The government collects revenues from oil and gas leases under terms and conditions that are specified in the lease, including rental fees and royalties. Annual rental fees are fixed fees paid by lessees until production begins on the leased land or, when no production occurs, until the end of the period specified in the lease. For federal oil and gas leases, generally the rental rate is $1.50 per acre for the first 5 years, and $2 per acre each year thereafter. Once production of the resource starts, the lessees pay the federal government royalties of at least 12.5 percent of the value of production. Oil and gas parcels are generally leased for a primary term of 10 years, but lease terms may be extended if, for example, oil or gas is produced in paying quantities. A productive lease remains in effect until the lease is no longer capable of producing in paying quantities. The fiscal system refers to the terms and conditions under which the federal government collects revenues from production on leases, including from payments specified in the lease (e.g., royalties and rental payments). We reported in December 2013 that, since 1990, all federal coal leasing has taken place through a lease-by-application process, where coal companies propose tracts of federal lands to be put up for lease by BLM. BLM is required to announce forthcoming lease sales, and the announcement notes where interested stakeholders can view lease sale details, including bidding instructions and the terms and conditions of the lease. BLM leases a tract to the highest qualified bidder, as long as its bonus bid meets or exceeds $100 per acre and BLM’s confidential estimate of fair market value. Annual rental fees are at least $3 an acre, and royalties are 8 percent of the sale price for coal produced from underground mines and at least 12.5 percent of the sale price for coal produced from surface mines. Tracts are leased for an initial 20-year period, as long as the lessee produces coal in commercial quantities within a 10-year period and meets the condition of continued operations. Bonds can help ensure lands affected by energy development are properly reclaimed, that is, according to BLM, restored to as close to their original natural states as possible. Bonds provide funds that can be used by the relevant regulatory authority to reclaim such lands if the operator or other liable party does not do so. For oil and gas developed on federal lands, BLM requires operators to provide a bond before certain drilling operations begin. Wells are considered orphaned and fall to BLM to reclaim if they are not reclaimed by their operators, there are no other responsible or liable parties to do so, and their bonds are too low to cover reclamation costs. For surface coal mining, the Surface Mining Control and Reclamation Act of 1977 (SMCRA) requires operators to submit a bond to either Interior’s Office of Surface Mining Reclamation and Enforcement (OSMRE) or an approved state regulatory authority before mining operations begin for development on federal or nonfederal lands. Among other bonding options, coal operators may choose to self-bond, whereby the operator promises to pay reclamation costs. Royalties that companies pay on the sale of oil and natural gas extracted from leased federal lands and waters constitute a significant source of revenue for the federal government. The Federal Oil and Gas Royalty Management Act of 1982 requires, among other things, that Interior establish a comprehensive inspection, collection, and fiscal and production accounting and auditing system for these revenues. In particular, the act requires Interior to establish such a system to provide the capability of accurately determining oil and gas royalties, among other moneys owed, and to collect and account for such amounts in a timely manner. To accomplish this, Interior tasks its Office of Natural Resources Revenue (ONRR) with collecting and verifying the accuracy of royalties paid by companies that produce oil and gas from over 26,000 federal leases. Each month, these oil and gas companies are to self-report data to ONRR on the amount of oil and gas they produced and sold, the value of this production, and the amount of royalties that they owe to the federal government. To ensure that the data provided to ONRR are accurate and all royalties are being paid, ONRR relies on its compliance program. Under this program, ONRR initiates compliance activities by selecting companies and properties for review to assess the accuracy of their royalty data and their compliance with all relevant laws and regulations. Under the Minerals Leasing Act of 1920, Interior is authorized to collect royalties on oil and gas produced on federal lands, and BLM is required to ensure that operators producing oil and gas take all reasonable precautions to prevent the waste of oil or gas developed on these lands. While most of the natural gas produced on leased federal lands and waters is sold and therefore royalties are paid on it, some is lost during production for various reasons, such as leaks or intentional releases for ongoing operational or safety procedures. Natural gas that is released for operational or safety procedures is released directly into the atmosphere (vented) or burned (flared). In addition to gas that is lost during production, some natural gas may be used to operate equipment on the lease (lease use). We use the term natural gas emissions to refer to vented, flared, and lease use gas collectively. Interior has generally exempted operators from paying royalties on reported natural gas emissions, and so such emissions represent a loss of royalty revenues for the federal government. Venting and flaring natural gas also has environmental implications as it adds greenhouse gases to the atmosphere—primarily methane and carbon dioxide. Natural gas consists primarily of methane, and methane (which is released through venting) is 34 times more potent by weight than carbon dioxide (which is released through flaring) in its ability to warm the atmosphere over a 100-year period, and 86 times more potent over a 20-year period, according to the Intergovernmental Panel on Climate Change. Key federal lease terms are the same as they were decades ago, and Interior has not adjusted lease terms for inflation or other factors, such as changes in market conditions, which may affect the government’s fair return. In addition, preliminary observations from our ongoing work indicate that federal oil and gas lease terms and practices differ from those of selected states, with selected state governments generally charging higher royalty rates on production on state lands than the federal government charges for production on federal lands. We have previously recommended that Interior should establish procedures for determining when to conduct periodic assessments of the oil and gas fiscal system, including how the federal government’s share of revenues compares with those of other resource owners. Interior has established procedures for determining when to conduct periodic assessments of the oil and gas fiscal system, and according to its policy, BLM plans to complete the next assessment in late 2019. Key federal lease terms are the same as statutory minimums established decades ago. For onshore oil and gas leases, the minimum royalty rate of 12.5 percent has been in place since 1920, and minimum bonus bids and rental rates are currently set at the statutory minimums established in 1987. For coal, the royalty rate for surface mining is set at the statutory minimum set in the Mineral Leasing Act. We previously found that royalty rates for oil and gas leases have not been adjusted to account for changes in market conditions, and our preliminary analysis for our ongoing work suggests that adjusting rental rates for inflation could generate increased federal revenues. We reported in December 2013 that Interior offers onshore leases with lease terms— terms lasting the life of the lease—that have not been adjusted in response to changing market conditions, potentially foregoing a considerable amount of revenue. Energy markets have also changed since federal oil and gas lease terms were established. For example, we reported in June 2017 that, according to the U.S. Energy Information Administration, almost all of the recent increase in overall oil and gas production had centered on oil and gas located in shale and other tight rock geologic formations, spurred by advances in production technologies such as horizontal drilling and hydraulic fracturing. In addition, we estimate that, based on preliminary observations, the rental rate would be $2.91 per acre if it were adjusted for inflation, which would have generated about $3.6 million for the first year for new leases issued in fiscal year 2018, or an additional $1.8 million. In June 2017, we reported that raising federal royalty rates for onshore oil, gas, and coal resources could decrease oil and gas production on federal lands by either a small amount or not at all but could increase overall federal revenue, according to studies we reviewed and stakeholders we interviewed. The two oil and gas studies we reviewed for that report modeled the effects of different policy scenarios on oil and gas production on federal lands and estimated that raising the federal royalty rate could increase net federal revenue from $5 million to $38 million per year. One of the studies stated that net federal revenue would increase under three scenarios that modeled raising the royalty rate from the current 12.5 percent to 16.67 percent, 18.75 percent, or 22.5 percent. The other study noted that the effect on federal revenue would initially be small but would increase over time. The two coal studies we reviewed for our June 2017 report analyzed the effects of different policy scenarios on coal production on federal lands, and both studies suggested that a higher royalty rate could lead to an increase in federal revenues. Specifically, one study suggested that raising the royalty rate to 17 percent or 29 percent might increase federal revenue by up to $365 million per year after 2025. The other study suggested that increasing the effective rate could bring in an additional $141 million per year in royalty revenue. However, we reported that the extent of these effects was uncertain and depended, according to stakeholders, on several other factors, such as market conditions and prices. Based on preliminary observations from our ongoing work, federal onshore lease terms and practices for oil and gas development differ from those of selected states (see table 1). For example, selected state governments tend to charge higher royalty rates for oil and gas development on state lands than the federal government charges for production on federal lands. For coal production, we reported in June 2017 that royalty rates charged by selected states were generally the same as federal rates. Royalty rates for the six states representing over 90 percent of total federal oil, gas, and coal production in fiscal year 2015 ranged from 8 to 12.5 percent for surface coal and from 8 to 10 percent for underground coal. Other factors influence the competitiveness of the development of oil and gas resources on federal land versus nonfederal land. We also reported in June 2017 that some stakeholders we spoke with stated that there was already a higher regulatory burden for oil and gas companies to develop resources on federal lands than on nonfederal lands. For coal, BLM officials stated that—assuming the royalty rate was the same—the main difference between federal and nonfederal coal was the additional regulatory burden of producing on federal lands. In our ongoing work examining the oil and gas lease permitting process, our preliminary interviews indicate that drilling permit fees are higher for federal lands than for the states we reviewed. However, operators we interviewed said that the filing fee was not an important or major factor in their decisions to apply for federal drilling permits. In addition to regulatory differences, in June 2017 we reported that a few stakeholders told us that competitiveness of federal lands for development depends on the location of the best resources—such as areas with low exploration and production costs. We also reported in June 2017 that most areas with major U.S. tight oil and shale gas plays—areas of known oil and gas sharing similar properties—and major U.S. coal basins do not overlap with federal lands. We have reported on steps Interior has taken to assess its oil and gas fiscal system—the terms and conditions under which the federal government collects revenues from production on leases—and have made recommendations intended to help ensure that the federal government receives a fair return on its oil and gas resources. For example, in September 2008, we found that Interior had not evaluated the federal oil and gas fiscal system for over 25 years and recommended that a periodic assessment was needed. In response to our September 2008 report, Interior contracted for a study that was completed in October 2011 and compared the federal oil and gas fiscal systems of selected federal oil and gas regions to that of other resource owners. However, in December 2013, we reported that Interior officials said that the study was not adequate to determine next steps for onshore lease terms. Interior has considered making changes to improve its management of federal oil and gas resources. For example, in April 2015, BLM sought comments on a number of potential reforms to the oil and gas leasing process, including changing royalty rates, but took no further action. In November 2016, BLM did issue the Methane and Waste Prevention Rule, which incorporated flexibility for the bureau to make changes to onshore royalty rates, as we recommended in December 2013. Officials told us in October 2018 that they were not aware of BLM issuing any recent competitive leases with a royalty rate higher than 12.5 percent. In addition, in March 2017, the Secretary of the Interior established the Royalty Policy Committee (committee), which was to be comprised of stakeholders representing federal agencies, states, Indian tribes, mining and energy, academia, and public interest groups. The purpose of the committee was to advise the Secretary on the fair market value of mineral resources developed on federal lands, among other issues. The committee met four times over the 2 years it was in effect and approved recommendations related to Interior’s oversight of its oil and gas programs. This included two recommendations to conduct studies that compare the U.S. oil and gas fiscal system to certain other countries’ fiscal systems. However, a U.S. District Court found that the establishment of the committee violated the law and prohibited Interior from relying on any of the committee’s recommendations. Interior has established procedures for assessing the oil and gas fiscal system. In December 2013, we found that Interior did not have documented procedures for determining when to conduct additional periodic assessments of the oil and gas fiscal system, and we recommended that Interior put such procedures in place. Further, we reported that documented procedures could help Interior ensure that its evaluations take relevant factors into consideration. These factors may change over time as the market for oil and gas, the technologies used to explore and produce oil and gas, or the broader economic climate changes. In August 2016, in response to our recommendation, Interior reported that it had developed documented procedures for conducting assessments of the oil and gas fiscal system, fully implementing our recommendation. To meet this recommendation, BLM established a fiscal assessment policy that describes actions it will take every 3 years and every 10 years. Based on this policy, the next assessment is expected to be completed in late 2019. According to the policy, every 3 years BLM plans to conduct a review of the oil and gas fiscal systems of the states with significant oil and gas leasing activity where there is also significant federal onshore leasing activity. The policy states that every 10 years— depending on available appropriations—Interior plans to co-sponsor with the Bureau of Ocean Energy Management an independent study of government take from lease and development of federal oil and gas resources. In February 2019, as part of our ongoing work examining oil and gas leases, BLM officials told us that the bureau had contracted for an external fiscal assessment in 2018 and that the report would be completed in mid-2019. According to Interior officials, the study is undergoing final review. We have reported that weaknesses with bonds for coal mining and for oil and gas development pose a financial risk to the federal government as laws, regulations, or agency practices have not been adjusted to reflect current economic circumstances. We have also reported that BLM has no mechanism to pay for reclaiming well sites that operators have not reclaimed. We reported in March 2018 that self-bonding for coal mining creates a financial risk for the federal government. If specific conditions are met, SMCRA allows states to let an operator guarantee the cost for reclaiming a mine on the basis of its own finances—a practice known as self- bonding—rather than by securing a bond through another company or providing collateral, such as cash, letters of credit, or real property. We reported that as of 2017, eight states held coal self-bonds worth over $1.1 billion. In the event a self-bonded operator becomes bankrupt and the regulatory authority is not able to collect sufficient funds to complete the reclamation plan, the burden could fall on taxpayers to fund reclamation. According to stakeholders we interviewed for our March 2018 report, self- bonding for coal mining presents a financial risk to the federal government for several reasons. It is difficult to (1) ascertain the financial health of an operator, in part, because greater financial expertise is often now needed to evaluate the complex financial structures of large coal companies as compared to when self-bonding regulations were first approved in 1983; (2) determine whether an operator qualifies for self- bonding; and (3) secure a replacement for existing self-bonds when an operator no longer qualifies. For example, some stakeholders we interviewed told us that the risk from self-bonding is greater now than when OSMRE first approved its self- bonding regulations in 1983; at that time, the office noted there were companies financially sound enough that the probability of bankruptcy was small. However, according to an August 2016 OSMRE policy advisory, three of the largest coal companies in the United States declared bankruptcy in 2015 and 2016, and these companies held approximately $2 billion in self-bonds at the time. Because SMCRA explicitly allows states to decide whether to accept self-bonds, eliminating the risk that self-bonds pose to the federal government and states would require SMCRA to be amended. In our March 2018 report, we recommended that Congress consider amending SMCRA to eliminate self-bonding. Interior did not provide written comments on the report. We reported in September 2019 that bonds held by BLM have not provided sufficient financial assurance to prevent orphaned oil and gas wells on federal lands. Specifically, we reported that BLM identified 89 new orphaned wells from July 2017 through April 2019, and 13 BLM field offices identified about $46 million in estimated potential reclamation costs associated with orphaned wells and inactive wells that officials deemed to be at risk of becoming orphaned in 2018. Although BLM does not estimate reclamation costs for all wells, it has estimated reclamation costs for thousands of wells whose operators have filed for bankruptcy. Based on our analysis of these estimates, we identified two cost scenarios: low-cost wells typically cost about $20,000 to reclaim, and high-cost wells typically cost about $145,000 to reclaim. In our September 2019 report, based on our cost scenarios described above, we found that most bonds (84 percent) that we were able to link to wells in BLM data are likely too low to fund reclamation costs for all the wells they cover. Bonds generally do not reflect reclamation costs because most bonds are set at regulatory minimum values, and these minimums have not been adjusted to account for inflation since they were first set in the 1950s and 1960s, as shown in figure 1. In addition, these minimums do not account for variables, such as the number of wells they cover, or other characteristics that affect reclamation costs, such as increasing well depth. In addition to the wells identified by BLM as orphaned over the last decade, in our September 2019 report we identified inactive wells at increased risk of becoming orphaned and found their bonds are often not sufficient to reclaim the wells. Our analysis of BLM bond value data as of May 2018 and ONRR production data as of June 2017 revealed that a significant number of inactive wells remain unplugged and could be at increased risk of becoming orphaned. Specifically, we identified 2,294 wells that may be at increased risk of becoming orphaned because they have not produced since June 2008 and have not been reclaimed. Since these at-risk wells are unlikely to produce again, an operator bankruptcy could lead to orphaned wells unless bonds are adequate to reclaim them. In our September 2019 report, we stated that if the number of at-risk wells is multiplied by our low-cost reclamation scenario of $20,000, it implies a cost of about $46 million to reclaim these wells. If the number of these wells is multiplied by our high-cost reclamation scenario of $145,000, it implies a cost of about $333 million. When we further analyzed the available bonds for these at-risk wells, we found that most of these wells (about 77 percent) had bonds that would be too low to fully reclaim the at-risk wells under our low-cost scenario. More than 97 percent of these at-risk wells have bonds that would not fully reclaim the wells under our high-cost scenario. Without taking steps to adjust bond levels to more closely reflect expected reclamation costs, BLM faces ongoing risks that not all wells will be completely and timely reclaimed, as required by law. We recommended in our September 2019 report that BLM take steps to adjust bond levels to more closely reflect expected reclamation costs. BLM concurred with our recommendation. However, while BLM stated it had updated its bond review policy, it is unclear whether the updated policy will improve BLM’s ability to secure bond increases. In addition to fulfilling its responsibility to prevent new orphaned wells, it falls to BLM to reclaim wells that are currently orphaned, and BLM has not always been able to do so quickly. For example, we reported in September 2019 that there were 51 wells that BLM identified as orphaned in 2009, and that they had not been reclaimed as of April 2019. As noted above, BLM faces significant estimated potential reclamation costs associated with orphaned wells and inactive wells. The Energy Policy Act of 2005 directs Interior to establish a program that, among other things, provides for the identification and recovery of reclamation costs from persons or other entities currently providing a bond or other financial assurance for an oil or gas well that is orphaned, abandoned, or idled. In our September 2019 report we described one way in which BLM may be able to accomplish this is through the imposition of user fees, such as at the time an operator submits an application for permit to drill or as an annual fee for inactive wells. Some states, such as Wyoming, have dedicated funds for reclaiming orphaned wells. According to one official we interviewed with the Wyoming Oil and Gas Conservation Commission, the Commission has reclaimed approximately 2,215 wells since 2014 under its Orphan Well Program, which is funded through a conservation tax assessed on the sale of oil and natural gas produced in the state. Developing a mechanism to obtain funds from operators for such costs could help ensure that BLM can reclaim wells completely and timely. In commenting on a draft of our September 2019 report, BLM stated that it does not have the authority to seek or collect fees from lease operators to reclaim orphaned wells. We continue to believe a mechanism for BLM to obtain funds from oil and gas operators to cover the costs of reclamation of orphaned wells could help ensure BLM can completely and timely reclaim these wells, some of which have been orphaned for at least 10 years. Accordingly, in our September 2019 report, we recommended that Congress consider giving BLM the authority to obtain funds from operators to reclaim orphaned wells and requiring BLM to implement a mechanism to obtain sufficient funds from operators for reclaiming orphaned wells. In May 2019, we found that ONRR had begun implementing several initiatives to help the agency operate more effectively, according to ONRR officials. For example, in March 2017, ONRR initiated Boldly Go, an effort to assess its organizational structure and identify and implement potential improvements. ONRR was also in the process of implementing a new electronic compliance case management and work paper tool referred to as the Operations and Management Tool. According to ONRR documents, this tool was to combine multiple systems into one and was intended to serve a variety of functions. ONRR documents stated that the tool is designed to be a single, standardized system that reduces manual data entry, creates a single system of record for ONRR case data, offers checks to eliminate data entry errors, and provides greater transparency for outside auditors. The agency also introduced a new auditor training curriculum in April 2018. In our May 2019 report, we also found that ONRR reported generally meeting its annual royalty compliance goals for fiscal years 2010 through 2017. However, we found that while ONRR’s fiscal year 2017 compliance goals could be useful for assessing certain aspects of ONRR’s performance, they may not have been effectively aligned with the agency’s statutory requirements or its mission to account for all royalty payments. For example, ONRR’s fiscal year 2017 compliance goals did not sufficiently address its mission to collect, account for, and verify revenues, in part, because its goals did not address accuracy, such as a coverage goal (e.g., identifying the number of companies or percentage of royalties subject to compliance activities over a set period). We stated that by establishing a coverage goal that aligns with the agency’s mission, ONRR could have additional assurance that its compliance program was assessing the extent to which oil and gas royalty payments were accurate. Overall, we made seven recommendations, including that ONRR establish an accuracy goal that addresses coverage that aligns with its mission. Interior concurred with our recommendations. We issued reports in October 2010 and July 2016 that included several recommendations regarding steps Interior should take to better account for and manage natural gas emissions associated with oil and gas development. In October 2010, we reported that data collected by Interior to track venting and flaring on federal leases likely underestimated venting and flaring because they do not account for all sources of lost gas. For onshore federal leases, operators reported to Interior that about 0.13 percent of produced gas was vented or flared. Estimates from the Environmental Protection Agency and the Western Regional Air Partnership showed volumes as high as 30 times higher. We reported that economically capturing onshore vented and flared natural gas with then-available control technologies could increase federal royalty payments by $23 million annually. We also found limitations in how Interior was overseeing venting and flaring on federal leases, and made five recommendations geared toward ensuring that Interior had a complete picture of venting and flaring and took steps to reduce this lost gas where economic to do so. Interior generally concurred with our recommendations. In July 2016, we found that limitations in Interior’s guidance for oil and gas operators regarding their reporting requirements could hinder the extent to which the agency can account for natural gas emissions on federal lands. Without such data, Interior could not ensure that operators were minimizing waste and that BLM was collecting all royalties that were owed to the federal government. We recommended, among other things, that BLM provide additional guidance for operators on how to estimate natural gas emissions from oil and gas produced on federal leases. BLM concurred with the recommendation. Interior has taken steps to implement our past recommendations regarding the control of natural gas. Accounting for natural gas is important for ensuring that the federal government receives all royalties it is due and because methane—which comprises approximately 80 percent of natural gas emissions—is a potent greenhouse gas that has the ability to warm the atmosphere. In addition, we reported in July 2016 that increased oil production in recent years has resulted in an increase in flared gas in certain regions where there is limited infrastructure to transport or process gas associated with oil production. In November 2016, Interior issued regulations intended to reduce wasteful emissions from onshore oil and gas production that were consistent with our recommendations. In June 2017, however, Interior postponed the compliance dates for relevant sections of the new regulations and then suspended certain requirements in December 2017. Interior subsequently issued revised regulations in September 2018 that are not consistent with the findings and recommendations in our prior work. In our prior work and preliminary observations in our ongoing work, we have found that some states have requirements that are more stringent than BLM’s regarding accounting for and managing natural gas emissions. For example, we reported in July 2016 that North Dakota targeted the amount of gas flared from two geologic formations in the state by imposing restrictions on the amount of gas operators may flare from existing and new sources. We also reported that North Dakota requires operators to include a gas capture plan when they apply to drill a new oil well. According to state officials we interviewed for our report, gas capture plans help facilitate discussions between oil producers and firms that process and transport gas and have improved the speed at which new wells are connected to gas gathering infrastructure. In the course of our ongoing work, we obtained documents indicating that per its regulations, North Dakota requires all gas produced and used on a lease for fuel purposes or that is flared must be measured or estimated and reported monthly, and that all vented gas be burned and the volume reported. In addition, based on preliminary observations in our ongoing work, Colorado and Texas both charge royalties on vented and flared gas volumes. In the course of our ongoing work, we obtained documents indicating that the Colorado Oil and Gas Conservation Commission, which regulates oil and gas activity in the state, addresses both venting and flaring as well as leaks. Colorado officials we interviewed with the State Land Board told us in September 2019 that, since 2018, the state charges royalties on all vented and flared gas volumes, with certain exceptions. These officials told us that prior to 2018, vented and flared gas could be exempt from royalties, but that it was uncommon. In addition, in Texas, a state official we interviewed told us that vented or flared volumes must be reported monthly and that charging royalties on these volumes increases revenues. Chairman Lowenthal, Ranking Member Gosar, and Members of the Subcommittee, this completes my prepared testimony. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Frank Rusco, Director, Natural Resources and Environment at (202) 512-3841 or RuscoF@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. GAO staff who made key contributions to this testimony are Quindi Franco (Assistant Director), Marie Bancroft (Analyst-In- Charge), Antoinette Capaccio, John Delicath, Jonathan Dent, Elizabeth Erdmann, Glenn C. Fischer, Emily Gamelin, William Gerard, Cindy Gilbert, Holly Halifax, Richard P. Johnson, Christine Kehr, Michael Kendix, Greg Marchand, Jon Muchin, Marietta Mayfield Revesz, Dan Royer, and Kiki Theodoropoulos. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Interior oversees energy production on federal lands and waters and is responsible for ensuring taxpayers receive a fair return for access to federal energy resources. Oil, gas, and coal on federal lands provide an important source of energy for the United States; they create jobs; and they generate billions of dollars in revenues that are shared between federal, state, and tribal governments. However, when not managed properly, energy production on federal lands can create risks to public health and the environment, such as contaminated surface water. In February 2011, GAO designated Interior's management of federal oil and gas resources as a program at high risk for fraud, waste, abuse, and mismanagement or the need for transformation. This testimony discusses GAO's work related to ensuring a fair return on resources from federal lands. To do this work, GAO drew on reports issued from May 2007 through September 2019 and preliminary observations from ongoing work. GAO reviewed relevant federal and state laws, regulations, and policies; analyzed federal data; and interviewed federal, state, and industry officials, among others. GAO's prior and ongoing work found challenges related to ensuring a fair return for oil, gas, and coal developed on federal lands in areas, including the following: Oil, Gas, and Coal Lease Terms and Conditions. Key federal lease terms are the same as they were decades ago, and Interior has not adjusted them for inflation or other factors that may affect the federal government's fair return. In June 2017, GAO reported that raising federal royalty rates—a lease term that defines a percentage of the value of production paid to the government—for onshore oil, gas, and coal resources could decrease production on federal lands by a small amount or not at all but could increase overall federal revenue. Also, preliminary observations from GAO's ongoing work indicate that selected states charge royalty rates for oil and gas produced on state lands at a higher rate than the federal government charges for production on federal lands. Oil, Gas, and Coal Bonding. GAO found in September 2019 that oil and gas bonds do not provide sufficient financial assurance because, among other things, most individual, statewide, and nationwide lease bonds are set at regulatory minimum values that have not been adjusted for inflation since the 1950s and 1960s (see figure). Further, GAO reported in March 2018 that coal self-bonding (where an operator promises to pay reclamation costs without providing collateral) poses financial risks to the federal government. Bonds provide funds that can be used to reclaim lands—restore them as close to their original natural states as possible—if an operator or other liable party does not do so. Natural Gas Emissions. In October 2010, GAO reported that data collected by Interior likely underestimated venting and flaring because they did not account for all sources of lost gas. GAO reported that economically capturing vented and flared natural gas could increase federal royalty payments by $23 million annually and made recommendations to help Interior better account for and manage emissions. In November 2016, Interior issued regulations consistent with GAO's recommendations, but Interior has since issued revised regulations, which are inconsistent with GAO's recommendations. For the reports discussed in this testimony, GAO has made 20 recommendations and three matters for congressional consideration. Interior has taken steps to implement a number of these recommendations, but 10 recommendations and two matters for congressional consideration remain unimplemented, presenting opportunities to continue to improve management of energy resources on federal lands.", "document_type": "gao"}
{"report": "The U.S. older adult population is growing and is projected to steadily increase in the coming decades. By 2060, the U.S. Census Bureau projects that adults 65 or older will make up nearly one-quarter of the total U.S. population. In addition to the overall growth in this population, the number of adults 85 or older is expected to nearly triple, from 6.4 million in 2016 to 19 million in 2060 (see fig. 1). Several federal nutrition assistance programs serve older adults, which are overseen by HHS’s Administration for Community Living (ACL) and USDA’s Food and Nutrition Service (FNS). The characteristics of older adults served by these programs vary, as do the types of assistance provided, the numbers of participants, and the amounts of federal expenditures (see table 1). The nutrition assistance programs serving older adults are overseen by ACL and FNS’s national and regional offices and are generally administered by state and local entities. The ACL and FNS national offices allocate funding and develop program regulations and guidance, and their respective regional offices provide support, such as technical assistance and training, to state agencies. State agencies implement the programs directly or through local entities. In the four programs that provide meals and monthly food packages to participants, state agencies work with regional and local agencies, such as government entities or private nonprofit organizations, to provide nutrition assistance to participants (see fig. 2). Specifically, in FNS’s two programs, state agencies work directly with local providers, while in ACL’s two programs, states work with regional level area agencies on aging, which generally contract with local providers. Area agencies on aging are public or private nonprofit entities that are responsible for planning and delivering services to older adults within their geographic service area. The Dietary Guidelines for Americans and the Dietary Reference Intakes (DRIs) are the two federally supported scientific bodies of work that provide broad information and guidance on the nutritional needs of healthy populations to help individuals maintain health and prevent nutrition-related chronic diseases. The dietary guidelines are developed by HHS and USDA and summarized in a federal policy document that focuses on providing practical nutritional and dietary information and guidance for Americans ages 2 and older. Overall, the 2015-2020 Dietary Guidelines recommend the consumption of a variety of vegetables, fruits, grains (at least half of which are whole grains), and protein, as well as fat-free or low-fat dairy and oils—sources of essential fatty acids and vitamin E. They also recommend foods and beverages that limit saturated and trans fats, as well as added sugars and sodium. Developed by the National Academies of Sciences, Engineering, and Medicine, the DRIs are a set of values used to plan and assess diets and nutrient intakes in both the United States and Canada, and the DRIs also provide scientific support for the development of the dietary guidelines. Specifically, the DRIs provide nutrient intake recommendations at levels considered safe for consumption of a wide range of nutrients, including vitamins, such as vitamins A and C; minerals, such as sodium and iron; and macronutrients, such as fiber and fat. The majority of older adults in the U.S. have chronic conditions, and evidence shows that nutrition is associated with the development of such conditions. Older adults are the fastest growing segment of the population, and they also have the greatest prevalence of chronic conditions. For example, according to the most recent data available from the Centers for Disease Control and Prevention (CDC), 62 percent of older adults 65 and older had more than one chronic condition in 2016, such as diabetes or heart disease, compared to 18 percent of adults ages 18 to 64. Although the risk of developing chronic conditions increases with age, research has shown that poor nutrition is a contributor to negative health outcomes, including many chronic conditions. For example, research shows that over- and under-consumption of certain nutrients, in addition to physical inactivity, is associated with the development of chronic conditions, including certain cancers, obesity, heart disease, and diabetes. The CDC reported that, in 2016, nutrition- related chronic conditions, including heart disease and stroke, were among the leading causes of death for older adults 65 and older in the United States, with heart disease accounting for 25 percent of deaths among this population. At the same time, research shows that nutrients and diet can prevent, delay, or assist in managing many chronic conditions, and individuals with certain chronic conditions may have different nutritional needs compared to healthy individuals. For example, according to research reviewed during development of the dietary guidelines and DRIs: diets low in sodium that also replace some carbohydrates with protein or unsaturated fats lower blood pressure and cholesterol levels, both reducing the risk of developing heart disease and helping to manage it; consumption of certain types of dietary fats, such as omega-3 fatty acids found in fish and flaxseed, for example, may help prevent or manage heart disease; increased consumption of fiber reduces total blood cholesterol, and high cholesterol is both a chronic condition as well as an increased risk for developing other chronic conditions, such as heart disease and stroke; and decreased consumption of foods high in added sugars, saturated fats, and sodium helps reduce the risk of diabetes, stroke, or heart attack. Research has shown that certain age-related changes may impair older adults’ ability to meet their nutritional needs, potentially resulting in negative health outcomes. According to a study conducted by the Academy of Nutrition and Dietetics, physiological changes that occur with age, such as decreased metabolism and reductions in muscle mass and nutrient absorption, may make it difficult for older adults to meet their nutritional needs. Research reviewed to develop the dietary guidelines also indicates that older adults experience a decline in calorie or energy needs as they age, due in part to decreased physical activity. As a result of reduced energy needs, older adults exhibit less hunger and also experience changes in taste sensation and sense of smell, all of which may lead to decreased food consumption, according to the Academy of Nutrition and Dietetics study. Inadequate consumption of certain nutrients, such as potassium, may lead to increased risk of negative health outcomes, including the development of chronic conditions, as noted earlier. Age-related physical or mental impairments also may impact older adults’ ability to meet their nutritional needs, potentially resulting in negative health outcomes. The Older Americans Act defines disability to include a physical or mental impairment, or combination of the two, that results in substantial functional limitations to certain major life activities, including self-care and mobility, among other things. An HHS official we spoke with noted that some older adults’ inability to perform daily activities— which can include eating, walking, or leaving the home to obtain groceries or meals, because of a physical or mental impairment—can contribute to inadequate nutrition. According to the CDC, age-related declines in cognitive functioning, such as the ability to reason and remember, may affect some older adults’ ability to leave their homes and shop for food, hindering their ability to meet their nutritional needs. Further, HHS reported that older adults with age-related physical impairments, such as impaired mobility and vision, may have difficulty opening, reading, and using food packaging, limiting their ability to prepare food. According to an Academy of Nutrition and Dietetics study, older adults with a physical impairment, such as an inability to chew or swallow food, may have reduced ability to consume nutrients, which, as previously noted, may increase their risk of negative health outcomes. Older adults may also require the use of medication, which may impact their ability to absorb or consume nutrients and meet their nutritional needs. For example, according to the National Institute on Aging, common side effects of certain medications can include reduced appetite and dry mouth, which may make it difficult to chew and swallow. In addition, some medications require older adults to limit their consumption of certain foods, such as citrus fruit, as consumption of these foods may change the effectiveness of the medications or cause other negative health outcomes. However, such restrictions may impact older adults’ ability to obtain the nutrients commonly found in those foods. Further, some older adults experience food insecurity, and therefore have limited access to adequate food and nutrients, which research has shown may lead to negative health outcomes. According to research reviewed to develop the dietary guidelines, food insecurity is a leading nutrition- related public health issue that compromises nutrient intake, potentially resulting in an increased risk of developing a chronic condition, as well as difficulty managing chronic conditions. USDA reported that 8 percent of U.S. households with an older adult and 9 percent of U.S. households in which an older adult lived alone experienced food insecurity in 2017—the most recent year for which data are available. According to HHS, food insecure older adults are more likely to experience negative health outcomes than their food secure counterparts. For example, research has shown that older adults who are food insecure consume lower amounts of essential nutrients and are more likely to experience negative health outcomes, like diabetes or physical or mental impairments. The federal nutrition guidelines—the dietary guidelines and Dietary Reference Intakes (DRIs)—provide broad nutrition guidance for healthy populations. However, the guidelines do not address the nutritional needs of older adults, including the majority of older adults in the United States who have multiple chronic conditions. Specifically, the guidelines focus on the foods and nutrients healthy individuals need to maintain health and prevent nutrition-related chronic conditions, which limit their applicability to older adults who already have chronic conditions. According to the scientific report for the 2015-2020 Dietary Guidelines, the guidelines are expected to evolve to address public health concerns and the nutritional needs of specific populations. Further, a report from a DRI working group indicates that the growth of the older adult population and the prevalence of chronic conditions in this group highlight the importance of understanding how nutrition can help to address chronic conditions. Although DRI researchers recently took steps to examine research on the relationship between nutrition and chronic conditions, they noted in a March 2019 report that current research on this issue is somewhat limited. At the same time, the federal nutrition guidelines do not address the varying nutritional needs of older adults of different ages and instead focus on guidelines for broad age groups. Specifically, the dietary guidelines provide information by gender on the nutrient needs of all adults 51 or older, and the DRIs provide this information by gender for older adults 51 through 70 and 71 or older. However, research has shown that these broad age categories do not account for how needs change with age among older adults, particularly for those 71 or older. For instance, according to the Academy of Nutrition and Dietetics study, the nutrient needs of older adults can be wide-ranging given the various changes that may occur with aging, such as those associated with reduced energy needs. Further, according to a summary report on the DRIs, physiological functioning, such as nutrient absorption, varies greatly after age 70. HHS officials similarly noted that nutritional needs change with each stage in life, and the needs of older adults who are in their 60s and those who are in their 90s or older may be substantially different. Additionally, researchers note that information on the varying nutritional needs of the different age groups of older adults is limited. For instance, the advisory committee that developed the 2015-2020 Dietary Guidelines noted that more data are needed on older adults’ diets, particularly for those 71 or older, and the degree to which age-related changes affect older adults’ ability to establish and maintain proper nutrition. Similarly, researchers at the Jean Mayer USDA Human Nutrition Research Center on Aging—one of the largest research centers studying nutrition and aging in the United States—told us that research on different age groups has been hindered in part by limitations in national nutrition and health data on older adults, and adults 85 or older, in particular, despite the projected growth of this age group. HHS officials said they intend to include a focus on nutritional guidance for older adults in the 2025-2030 Dietary Guidelines update, but they have not yet documented their plans to do so. Broadly, HHS and USDA officials told us they intend to address the nutritional needs of individuals across the entire lifespan in future updates to the dietary guidelines. USDA is leading the 2020-2025 Dietary Guidelines update, which will include guidance for those individuals in the earliest stages of life. HHS officials said that when they lead the 2025-2030 Dietary Guidelines update, they intend to include a focus on nutritional guidance for older adults. However, HHS has not yet documented this intention, such as through a formal plan. As noted, older adults’ nutritional needs can vary with age and many face certain challenges that additional nutrition guidance could help address, such as the management of chronic conditions or age-related changes, yet guidance currently falls short in part because of limited research evaluating older adults’ nutritional needs. In its Strategic Plan for fiscal years 2018-2022, HHS notes that one of the department’s objectives is to prevent, treat, and control communicable diseases and chronic conditions. As previously noted, the dietary guidelines are also expected to evolve to address public health concerns and the nutritional needs of specific populations. A plan for incorporating a focus on older adults in a future dietary guidelines update, such as one that addresses their various needs based on available research on this population and identifies existing information gaps, could help ensure federal nutrition guidelines better address the nutritional needs of this population. The four federal nutrition assistance programs that we reviewed and that provide meals and food directly to older adults have federal nutrition requirements, while two other programs we reviewed that provide older adults with benefits to purchase food do not. Specifically, HHS’s congregate and home-delivered meal programs and USDA’s Child and Adult Care Food Program (CACFP) have nutrition requirements for older adults’ meals, and the Commodity Supplemental Food Program (CSFP) has nutrition requirements for the monthly food package provided to older adults. Two other federal programs—USDA’s Supplemental Nutrition Assistance Program (SNAP) and Senior Farmers’ Market Nutrition Program—provide older adults with benefits to purchase food, and neither program has specific nutritional requirements that must be met when purchasing food. The four programs with nutrition requirements used the federal nutrition guidelines—the Dietary Guidelines for Americans—as the basis for their nutrition requirements. These guidelines are also the basis for nutrition requirements in other federal nutrition assistance programs, such as those that serve children. As discussed earlier, the current guidelines provide broad guidance on nutrition for healthy populations and therefore serve a role in health promotion for all individuals. Several of the nutrition assistance programs that have nutrition requirements for meals or food served to older adults also require other services to help ensure older adults’ nutritional needs are met. These services include nutrition education, screenings and assessments, and the use of nutrition professionals. Three of the four selected nutrition assistance programs serving older adults that have nutrition requirements also require nutrition education to support efforts to meet older adults’ nutritional needs. These programs are HHS’s congregate and home-delivered meal programs and USDA’s CSFP, which provides monthly food packages. See figure 5 for examples of nutrition education materials from selected states. To help promote health and delay adverse health conditions among older adults, area agencies on aging, either directly or through their local providers, are required to provide nutrition education to congregate and home-delivered meal participants. According to HHS regional officials we spoke with, there are no requirements for the frequency or type of nutrition education that must be provided, though as officials in one region noted, programs are encouraged to provide education that is science- based. According to the nationwide evaluation of the congregate and home-delivered meal programs, almost half of state agencies surveyed in 2014 required area agencies on aging, either directly or through their local providers, to provide nutrition education at least quarterly, and about one-quarter of state agencies require it to be provided semi-annually or annually. Officials from two of the four state agencies told us local providers educate participants in a variety of ways, including by directly sharing nutrition-related information about specific menu items or meals offered to participants or by partnering with other entities, such as universities, to help educate older adults on nutritional well-being. State agencies overseeing CSFP food packages must also establish a nutrition education plan and ensure that local providers provide nutrition education to program participants. For example, providers must include information about the nutritional value and use of the foods provided in the food package and should account for specific ethnic and cultural characteristics of program participants. USDA regional officials and state agency officials overseeing CSFP in three of the four states told us that providers generally use USDA’s household foods fact sheets—which includes food product descriptions, general food storage information, recipes, and nutritional information—to provide nutrition education to CSFP participants. State officials in our selected states also noted other methods CSFP providers used to support nutrition education. For example, officials in one of the states told us one of their distribution sites provides nutrition education materials in 17 languages to accommodate the different cultural backgrounds of the population it serves. Officials in another state we visited told us some of their provider sites partner with universities, inviting staff from the university’s nutrition program to the provider site to share and discuss nutrition information with participants. Both of HHS’s congregate and home-delivered meal programs require states to ensure area agencies on aging or local providers conduct nutrition screenings and assessments of participants to help identify health risks. According to HHS data for fiscal year 2016, the most recent year for which data are available, just over one-fifth (347,002) of the 1.6 million congregate meal participants served and more than one-half (496,729) of the 868,382 home-delivered meal participants served were deemed at high nutrition risk. HHS officials stated that there is no federal policy or requirement on how assessments are conducted or their frequency, and states have the flexibility to determine their own process for assessing the nutritional needs of participants. However, HHS provides a tool that states may use for these assessments. See sidebar for the Federal Nutrition Screening tool used to determine a person’s nutrition risk. According to the nationwide evaluation of the congregate and home-delivered meal programs, over half of area agencies on aging and local providers of congregate and home-delivered meal programs had a formal process for assessing nutritional needs. Further, HHS regional officials we spoke with suggested that these assessments generally occur annually. Across the four selected states we visited, the majority of area agencies on aging conducted nutrition screenings and assessments, with the frequency varying from every 6 months to every few years. The Older Americans Act requires states to prioritize certain groups with high social and economic needs, such as those who are low-income, minorities, or isolated, and two area agencies on aging told us they use nutrition risk screenings and assessments to address malnutrition and identify those individuals who fall in these categories. HHS’s congregate and home-delivered meal programs require the use of nutrition professionals, such as registered dieticians, to help local providers meet the nutritional needs of older adults—primarily through menu reviews to verify that each menu is following federal nutrition requirements, according to HHS officials. According to the nationwide evaluation of the congregate and home-delivered meal programs, at least one-half of the state agencies, area agencies on aging, and local providers used the services of a nutrition professional to help meet the nutritional needs of older adults. In the four selected states, three state agencies had a nutrition professional on staff or contracted with a nutrition professional who worked with area agencies on aging to review menus, and in the other state, a nutrition professional was on staff or contracted for by area agencies on aging or local provider sites. In addition to menu reviews, nutrition professionals in the four selected states were also involved in activities such as training meal providers or providing nutrition education and counseling to participants. As part of HHS’s oversight of the congregate and home-delivered meal programs, regional officials meet with state staff and review state plans and other program information, but these efforts do not require states to provide documentation that meals served to participants comply with the programs’ nutrition requirements. State agencies are responsible for monitoring area agencies on aging’ implementation of these programs and ensuring that meals are consistent with the programs’ nutritional requirements. HHS regional offices, in turn, conduct oversight of the nutrition programs through its reviews of states. HHS’s guidance directs regional staff to collect information from states on the use of nutrition professionals in these programs. However, HHS’s guidance does not direct regional staff to systematically review or collect any other information from states, such as approved menus, to confirm that meals served to participants are consistent with the programs’ nutrition requirements. A recent national evaluation of meals provided through the congregate and home-delivered meal programs, however, indicates that state oversight of meals’ consistency with program nutrition requirements may have limitations. According to the 2017 evaluation, while program meals generally contributed positively to participants’ diets, the meals were higher in sodium and saturated fat than the recommended limits. For example, the diets of the majority of congregate and home-delivered meal participants included adequate amounts of a range of vitamins and minerals, with the exception of magnesium and calcium. However, a majority of participants had intakes of sodium and saturated fat from these meals that exceeded the dietary guidelines’ recommended limits. Specifically, 94 percent of congregate meal participants and 69 percent of home-delivered meal participants had sodium intakes from program meals that exceeded the dietary guidelines’ recommended limit. Likewise, 89 percent of congregate meal participants and 72 percent of home-delivered meal participants had saturated fat intakes from program meals that exceeded the recommended limit, despite the role state agencies play in monitoring programs to ensure meals meet federal nutrition requirements. According to the evaluation, overconsumption of sodium and saturated fat may pose a public health concern. Information obtained from the selected states we visited also suggests that state oversight of congregate and home-delivered meals’ consistency with program nutritional requirements may have limitations. Specifically, some selected states did not utilize a nutrition professional at the state level to help ensure meals served through the programs met federal nutrition requirements. For example, in one state, the state-level nutrition professional position was vacant and, officials from an area agency on aging we spoke with confirmed that state-level monitoring of menus for compliance with nutrition requirements had not occurred due to the vacancy. Area agency on aging officials added that the vacancy has also meant that state staff are not available to train or provide guidance to area agencies on the programs’ nutrition requirements. In the other state, officials from an area agency on aging told us the state agency has not focused on oversight of providers’ menus. HHS is responsible for overseeing its federal nutrition assistance programs to ensure compliance with the programs’ nutrition requirements. More complete information on state efforts to assess meal consistency with federal nutrition requirements could help HHS assure that meals served to program participants are meeting those requirements. In USDA’s CACFP, which provides meals to older adults at adult day care centers, USDA regional offices review states’ monitoring of local providers for consistency with federal meal pattern requirements. States are required to review each entity involved in the CACFP at least once every 3 years. During these reviews, state staff must assess provider compliance with federal requirements, which includes a review of a sample of the provider’s menus to ensure they comply with federal meal pattern requirements. Through federal management evaluations, USDA regional staff review states’ monitoring of the program, including their reviews of menus to ensure compliance with meal pattern requirements, and conduct onsite reviews at both the state agency and local provider level. Regional staff told us they review all states at least once every 3 years. However, USDA regional officials told us they lack information on how the program is working at adult day care centers, in part because its onsite reviews of adult day care providers are generally limited, unlike on the child care side of the program. According to USDA officials, the majority of state agencies oversee both child care and adult day care CACFP providers, and USDA’s criteria for selecting providers for onsite reviews focus on those providers receiving the highest reimbursement amounts. According to regional officials, because CACFP serves a significantly greater number of meals to children than to adults, providers receiving the highest reimbursement amounts are those serving meals in child care sites in the majority of states. Thus, federal onsite reviews of providers serving meals to older adults in adult day care centers generally have been limited. USDA’s regional officials told us that because they have not done onsite reviews at most adult day care centers recently, they lack information on how the program is working in those centers. USDA officials in four of the seven regional offices told us they receive few questions or requests for technical assistance from state agencies or providers operating the program in adult day care centers. However, our discussions with providers in the four selected states suggest that they face challenges operating the program in these centers and addressing the varying needs of participants they serve, such as those with physical and mental impairments, and may benefit from additional information or assistance. USDA is statutorily required to review state agency and provider compliance with regulations governing program administration and operation of certain nutrition assistance programs, including CACFP. Further, USDA guidance notes that its management evaluations are critical for monitoring state agency program compliance and improving program operations by providing a basis for assessing the administration of the CACFP and developing solutions to challenges in program operations. Without taking action to ensure on-site reviews of adult day care centers participating in CACFP are conducted more consistently, USDA may be missing an opportunity to identify and help address challenges adult day care centers face in operating the program, such as challenges meeting varied needs of participants. Such efforts could help them better assess the extent to which centers are meeting the nutritional needs of the older adults they serve and to better target technical assistance. For USDA’s CSFP, which provides monthly food packages to older adults, USDA regional office oversight includes reviews of state agencies’ monitoring of local providers and visits to local providers, covering all states at least once every 3-5 years. Regional staff indicated that they review monthly participation data, food inventory reports, and state plans as part of their oversight of the program. As part of their visits with local providers, regional officials told us they open and review food packages at local sites to ensure packages include the required food components and assess the types of nutrition education provided to participants, such as recipes or cooking classes. The growth in the older adult population has led to an increased demand for nutrition programs to serve them, and some providers told us they faced challenges meeting the nutritional needs of this population. From 2009 through 2018, the population of adults 60 or older grew by 31 percent. Federal funding for certain nutrition assistance programs serving older adults has not increased at the same rate as the population. Specifically, during that same time period, federal funding for HHS’s congregate and home delivered meal programs grew by 13 percent. HHS officials told us that with the increased demand for these programs and relatively flat federal funding, some providers have been unable to maintain the same level and quality of service that they have historically provided. According to state officials and providers in three of the four selected states we visited, the increased demand for older adult nutrition programs has resulted in waiting lists, in particular for the home-delivered meal program. For example, state officials in one selected state we visited told us they have large waiting lists in their state for the home-delivered meal programs due to a higher demand for services. They indicated that, in the absence of other changes, they will only be able to serve new people through attrition of current program participants. One provider in the same state said they have a waiting list of more than 12,000 older adults for their home-delivered meal program. Another provider told us they are currently serving about 10 percent of the older adult population in their area, although the need for these services is greater, and they have continually had a waiting list for their home-delivered meal program. Some providers have leveraged additional funding sources to decrease waiting lists and expand the reach of their congregate and home- delivered meal programs. Specifically, in two of the four states we visited, some providers said they have received additional funding to support nutrition and other services for older adults through a local property tax— called a millage tax. In one of these states, a local provider told us that the local millage tax provided $9.8 million for older adult services in 2018. Officials noted that these funds allowed providers to add new meal routes and decrease waiting lists for home-delivered meals, as well expand the capacity of senior centers to serve more older adults through nutrition and other programs. In three of the four selected states, some providers reported partnering with various entities, including grocery stores, local farmers, and others to obtain food at low or no cost or serve more older adults, which helped them to meet the increased demand for the congregate and home- delivered meal programs. For example, in one state, the area agency on aging that directly provides meals joined a larger consortium of organizations to purchase food at a lower cost from a food vendor. In another state we visited, a provider we spoke with reported that the majority of its food for older adults’ meals came from food donations provided by local grocery stores and food banks and through a program in which local farmers dedicate some of their produce for donation. This provider indicated that food donations saved them $140,000 in food costs in 2018 (see fig.6). Providers we spoke with in the four selected states reported challenges meeting older adults’ needs for certain meal accommodations, and both providers and state officials that administer the congregate and home- delivered meal programs as well as the CACFP meal program across the four states reported a need for additional information from the federal agencies overseeing these programs. As previously noted, the majority of older adults in the United States now have more than one chronic condition and older adults may have physical or mental impairments—all factors that may necessitate certain accommodations to ensure meals meet their nutritional needs. Although some providers we spoke with have taken steps to mitigate challenges meeting these needs, some reported that they continue to face challenges, such as the lack of skilled chefs and other resources, to make such accommodations. Providers of HHS’s congregate and home-delivered meal programs in three of the four states said they faced challenges making meal accommodations to meet the dietary needs of older adult participants with chronic health conditions. As previously noted, 62 percent of older adults 65 and older had more than one chronic health condition in 2016—the most recent year for which data are available. Eight of the 14 congregate and home-delivered meal providers across the selected states we visited said they do not tailor meals to meet participants’ special dietary needs— for example, due in part to limited resources and capacity. For example, four providers told us it is cost prohibitive to tailor meals. At one site we visited that does tailor meals, local officials told us that their vendor charges more for tailored meals because of the additional work involved to customize meals to meet the needs of participants with specific health conditions. Another provider said that some chefs lack the skills needed to prepare such meals. For example, the provider said that although some older adults need mechanically soft or pureed meals because of oral health issues, staff may lack the skills to produce those meals. Federal restrictions on reimbursing liquid meals may make providing such meals cost-prohibitive, according to officials in selected states. For example, state and local officials and a provider in two selected states said that program participants who are unable to chew, swallow, or digest solid foods due to various health conditions, may need such meals, yet these meals do not qualify for federal meal reimbursement. According to HHS officials, while a liquid meal does not qualify for meal replacement, states may use federal funds dedicated to providing nutrition education, counseling, and other aging services to purchase these meals. Some of these program providers in the selected states used additional funding sources to help them make meal accommodations for program participants with special dietary needs, and HHS also funds awards that can be used for this purpose. For example, an area agency in one selected state we visited received a grant from a local foundation to provide some of their home-delivered meal participants with special dietary meals, including for those with renal conditions and diabetes for up to 3 months. Similarly, another provider used a grant to provide liquid meals to home-delivered meal participants who needed them. Since 2017, HHS has also awarded grants to support innovative projects that enhance the quality, effectiveness, and outcomes of the congregate and home-delivered meal programs, and some of the projects have focused on providing meal accommodations for certain program participants. For example, a grantee in one state used these grant funds to develop and deliver modified meals appropriate for home-delivered meal participants with reduced dental function. Another state grantee created new medically-tailored meals for program participants transitioning from hospital to home. According to HHS officials, the department has seen positive preliminary results from the innovation grants, but does not currently have a centralized location that compiles information for congregate and home- delivered meals providers on promising approaches for making meal accommodations for participants with special dietary needs. HHS officials said they have shared some information on the projects through webinars and conferences and provided links to webinar materials on the National Resource Center on Nutrition and Aging website—funded by HHS. Further, HHS officials noted that they posted additional relevant materials, such as a toolkit focused on lowering sodium in meals, on the Center’s website. However, these materials are not compiled in one location on the Center’s website, which may hinder meal providers’ ability to locate all of the relevant information HHS has compiled. State officials and providers across the four selected states said that federal guidance on accommodating the special dietary needs of older adult program participants is limited and additional support would be helpful. HHS is responsible for collecting and disseminating information on older adults. Providing information on promising practices and available opportunities may help support providers’ efforts to accommodate the special dietary needs of some older adults participating in these programs. State and local entities administering USDA’s CACFP in adult day care centers in the four selected states reported that they face challenges providing meal accommodations to meet the nutritional needs of program participants. Officials in three selected states said they believe the federally-required meal patterns do not fully address older adults’ nutritional needs, including those with special dietary needs. For example, milk is a federally-required component of breakfasts and lunches served through the program, though officials from three selected states said that milk can be problematic for older adults because many are lactose-intolerant or do not like drinking milk. Further, officials in one state said that the meal pattern includes a significant amount of carbohydrates, which is inconsistent with the needs of older adults who have diabetes. Although CACFP requires adult day care centers to serve meals consistent with federal meal pattern requirements or a participant’s plan of care, which may include medically-prescribed meal accommodations, state officials reported some older adults face barriers to obtaining medical documentation of meal accommodation needs. Specifically, officials from two selected states said that some participants may not have access to medical providers, and officials from one of those states explained that a visit to a medical provider is sometimes cost- prohibitive for those with limited incomes. Officials in two of the four selected states said adult day care meal providers have used available federal options that allow older adults to tailor their own meals to meet their nutritional needs, though officials also noted that these options have limitations. For example: State officials in one selected state said they encourage adult day care centers to implement the federal “offer versus serve” option. This option allows adult participants, including older adults, to decline, for example, up to two of the five meal components required with a lunch—milk, fruits or vegetables, grains, and meat or meat alternate. According to USDA guidance, this option may reduce waste and give adults more choices. However, officials in this state noted that making choices is sometimes difficult and time-consuming for program participants with cognitive impairments, such as Alzheimer’s disease or dementia. State officials in another state said that the federal family-style meal service option, which allows older adults to serve themselves from communal platters of food with assistance from supervising adults, if needed, also provides older adults with the ability to tailor meals to meet their needs. However, state officials in this state noted this meal service approach also creates challenges with feeding certain older adults appropriately. For example, this approach makes it harder to meet the needs of those with particular dietary or functional requirements, such as those who have specific nutritional needs due to chronic conditions or those with swallowing or chewing issues. State officials and adult day care providers across all four selected states said that federal guidance for providing meals to older adults in adult day care centers is limited, and providers in two of the states said they lack information on ways to address some of the challenges associated with providing meals that meet the nutritional needs of older adults in these centers. For example, providers noted that information on promising practices for serving the differing needs of older adults in these centers, including those with special dietary needs and those with functional limitations, would assist their efforts to meet participants’ nutritional needs. State officials or providers in all four selected states said that FNS’s efforts to provide guidance and trainings are more focused on the child care component of the CACFP than the adult day care component. USDA officials confirmed their efforts to provide guidance to meal providers have been primarily focused on the child care side of the program in light of the larger number of participants served. Although USDA provides some guidance and information to address the adult component of the CACFP, some CACFP entities serving older adults may not be aware of these resources, and information on promising practices or other resources to help providers meet the varying needs of older adults is more limited. USDA officials said CACFP guidance and trainings address the implementation of adult meal pattern requirements and existing flexibilities with these requirements, such as allowable substitutions for milk. USDA also produced a handbook specifically for adult day care centers in 2014 to help assist providers in these centers. However, USDA officials said that awareness of existing guidance and trainings available may be lacking, in part, because turnover for CACFP providers is high and new providers may not be aware of existing resources. Some providers also said that more information on how to address the special dietary needs and functional limitations of some participants would be helpful, as USDA’s existing guidance and trainings focus on standard adult meal pattern requirements. For example, while the 2014 handbook includes information on meal patterns and different serving methods to provide meals, it does not include information specific to meeting the differing needs of older adults in these centers. In October 2019, USDA officials told us that they are in the process of updating this handbook to reflect new policies, guidance, and promising practices for addressing the needs of older adults. USDA officials also stated that they are in the process of reviewing a promising practice to address meal accommodations for older adults with varying needs. USDA is responsible for providing training and technical assistance to states in order to assist state agencies with program management and facilitate effective operation of the program. Without awareness of existing resources and additional guidance and information to help adult day care providers address the challenges they face meeting the nutritional needs of the older adults they serve, providers may continue to be limited in their ability to do so. USDA, state, and local officials administering the CSFP said that the federal requirements for foods provided in each monthly food package limit the extent to which providers can tailor or alter the foods provided to accommodate individual participants’ nutritional needs; though some approaches and recent changes help address this challenge. For example, two food package providers we spoke with said they use other methods of food delivery along with the food package such as a pantry or grocery store-style model, which allows participants to come to a site and choose from a variety of foods that meet the requirements (see fig. 7). USDA also recently issued updated federal requirements for the type and quantity of foods provided in the food package, which department officials said provide more variety to be more useful to older adults. As previously noted, some regional USDA officials told us that early feedback from states on the changes has been positive, though states have until November 2019 to implement the new requirements. For example, USDA officials in one regional office said states provided positive feedback on the introduction of new food items, such as lentils. Providers reported ongoing program administration challenges, such as staffing constraints, which to some extent challenge their efforts to meet the nutritional needs of older adults. For example, state and local officials and providers of the congregate and home-delivered meal programs across three of the four selected states said they face challenges finding and retaining a sufficient number of staff for program operations, which could include preparing and serving meals, and delivering meals. Four of the 14 providers of these programs reported that they struggle to offer competitive wages and benefits, which hinders their ability to hire and retain staff. To help overcome staffing constraints, some providers partnered with various entities. For example, in all four selected states, providers of the congregate and home-delivered meal programs established partnerships with entities such as colleges and local businesses to solicit volunteers to help with program operations. In one state, a provider partnered with a local college’s nursing program and students volunteered to assist with assessments for home-delivered meal participants. In another state, staff from a local police department volunteer and deliver meals to home- delivered meal participants in one area. One meal provider said that the efforts of volunteers, who donate their time and cover expenses for gas and vehicle insurance to help provide home-delivered meals to participants, are worth $100,000 in annual support to their program. This provider noted that they would be unable to operate the program without volunteers. See figure 8 for pictures of volunteers helping to prepare food in selected states. Providers of the CSFP food packages and congregate and home- delivered meal programs in three selected states we visited also reported challenges obtaining transportation to bring older adults to meal and food distribution sites and deliver meals and food packages to older adults, though some have found ways to mitigate these challenges. For example, providers in three selected states said a lack of transportation options prevents some older adults from visiting congregate meal sites as well as food package distribution sites, as public transportation is not always available and many older adult participants do not drive. According to local officials in one state, transportation is also a challenge for the home- delivered meal program, particularly in rural areas, because the distance between participants’ homes affects the cost of delivering meals. Similarly, officials at one local agency on aging said providers in its area would like to serve more people, but are unable to add additional routes because of transportation costs. To help mitigate transportation challenges and manage associated costs, some providers in the selected states have adjusted meal services and found alternative ways to transport clients to meal service sites. For example, to help control transportation costs, three providers in two selected states changed from delivering one hot meal daily to delivering multiple frozen meals once a week to home-delivered meal participants. In addition, one provider partnered with a local meal delivery service that used FedEx to deliver 10 home-delivered meals every 2 weeks to program participants. To help alleviate transportation challenges that older adults face getting to meal sites, three providers in two states partnered with private companies to provide participants with rides to and from meal sites for a minimal fee. Another provider used grant funds they received from their state to purchase vans they then used to provide older adults with transportation to and from the meal sites. Some providers also reported challenges accommodating the varied dietary preferences of different groups of older adults, as preferences sometimes vary by age and cultural or ethnic background, and being responsive to these preferences can increase the likelihood that meals will help older adults meet their nutritional needs. For example, HHS officials, as well as local providers in three out of the four selected states said the dietary preferences of adults in their 60s sometimes vary greatly from the preferences of adults in their 90s. Local officials in two states said that providers of congregate and home-delivered meal programs in their states noted that “older old” adults may prefer meals that include meat and potatoes, while “younger old” adults may prefer lighter meals, such as those consisting of soups and salads. In addition, providers in three selected states we visited told us they serve many older adults from diverse cultural or ethnic backgrounds, or with dietary preferences, such as a vegetarian diet, or who do not eat certain foods because of their religious beliefs. To meet the varied dietary preferences of the older adults they serve, and increase the likelihood that meals will help participants meet their nutritional needs, some providers reported taking various approaches. For example, one congregate meal site we visited offered a lunch entree choice of either meat and potatoes or a sandwich wrap with vegetables. Another congregate meal site offered a hot lunch, plus a soup and salad bar, in a restaurant-like setting. Providers also tried to incorporate certain foods on their menus that reflect the cultural or ethnic preferences of participants. For example, the adult day care provider and the congregate and home-delivered meal providers we visited in one selected state in the South all noted that their menus aim to include certain foods associated with their regional culture, such as red beans and rice. By 2060, older adults are expected to make up nearly one-quarter of the total U.S. population. HHS and USDA play important roles in promoting the health of this growing population both through administration and oversight of federal nutrition assistance programs that serve older adults and efforts to update federal nutrition guidelines, which serves as the basis for nutrition requirements in these programs. While federal nutrition guidelines provides broad guidance on nutrition for healthy populations, they do not address the varying nutritional needs of older adults, such as those who have common chronic conditions or face age-related changes. The 2025-2030 Dietary Guidelines update is expected to include a focus on nutritional guidance for older adults, but no formal plan to include this focus has been developed. A plan to incorporate the varied needs of older adults into the dietary guidelines could assist older adults with making their own dietary decisions and help providers of nutrition assistance programs better meet older adults’ nutritional needs. Further, HHS and USDA administration and oversight of the nutrition assistance programs is not fully addressing some of the challenges states and local providers indicated hinder their efforts to meet older adults’ nutritional needs. For example, providers we spoke with faced challenges meeting older adults’ needs for certain meal accommodations, and information from HHS and USDA regarding promising approaches to meeting those needs is limited or not sufficiently disseminated. Further, both HHS and USDA’s efforts to oversee older adult meal programs have limitations that affect information available at the federal level needed to ensure programs are meeting older adults’ nutritional needs. We are making the following five recommendations. The Administrator of ACL should work with other relevant HHS officials to document the department’s plan to focus on the specific nutritional needs of older adults in the 2025-2030 update of the Dietary Guidelines for Americans, which would include, in part, plans to identify existing information gaps on older adults’ specific nutritional needs. (Recommendation 1) The Administrator of ACL should direct regional offices to take steps to ensure states are monitoring providers to ensure meal consistency with federal nutrition requirements for meals served in the congregate and home-delivered meal programs. (Recommendation 2) The Administrator of FNS should take steps to improve its oversight of CACFP meals provided in adult day care centers. For example, FNS could amend its approach for determining federal onsite reviews of CACFP meal providers to more consistently include adult day care centers. (Recommendation 3) The Administrator of ACL should centralize information on promising approaches for making meal accommodations to meet the nutritional needs of older adult participants in the congregate and home-delivered meal programs, for example in one location on its National Resource Center on Nutrition and Aging website, to assist providers’ efforts. (Recommendation 4) The Administrator of FNS should take steps to better disseminate existing information that could help state and local entities involved in providing CACFP meals meet the varying nutritional needs of older adult participants, as well as continue to identify additional promising practices or other information on meal accommodations to share with CACFP entities. (Recommendation 5) We provided a draft of this report to HHS and USDA for review and comment. In its written comments, HHS agreed with our three recommendations to ACL (Recommendations 1, 2, and 4). In response to our first recommendation, HHS stated that ACL plans to work with the Office of Disease Prevention and Health Promotion and other relevant HHS officials and agencies to document HHS’s plans to emphasize the specific and varying nutritional needs of older adults in the 2025-2030 update. HHS also stated that ACL plans to acquire the services of a registered dietician with specialized expertise in older adults’ nutritional needs. In response to our second recommendation, HHS stated that ACL’s program and evaluation offices will collaborate on the development of plans to ensure state compliance with federal requirements. In response to our recommendation that ACL centralize information on promising practices, HHS stated that ACL will award a contract in fiscal year 2020 for a new National Resource Center on Nutrition and Aging to, among other things, centralize information on promising approaches so nutrition services providers can access it easily. HHS’s comments are reproduced in appendix II. In oral comments, USDA officials, including the Directors of the FNS Child Nutrition Program Monitoring and Operational Support Division and the Child Nutrition Program Nutrition Education, Training, and Technical Assistance Division generally agreed with our two recommendations to FNS (Recommendations 3 and 5). In response to our recommendation to improve CACFP oversight, FNS officials agreed with the intent of improving oversight of CACFP meals provided in adult care centers. These officials also noted that activities and changes in this area must be consistent with statutory and regulatory requirements, balanced with current priorities given the size of the program, and mindful of resources available to perform additional oversight. While we recognize that the CACFP serves fewer adults than children and that FNS oversight resources are limited, we believe that FNS is in a position to identify the best way to improve its oversight of CACFP meals provided in adult day care centers while taking into consideration the availability of its resources. In response to our recommendation to share additional information with state and local CACFP entities, FNS officials stated that there is existing guidance and information on the adult component of the CACFP, which it communicates through multiple channels. These officials said that some states and localities may be unaware of these resources, in part, because of high turnover among staff who administer these programs. FNS officials acknowledged that they could do more to increase awareness of existing resources, as well as continue to identify and share new practices to help entities providing CACFP meals in adult day care centers address challenges associated with providing meals that meet nutritional needs of older adults. USDA also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretaries of HHS and USDA and interested congressional committees. The report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Our report examines (1) the relationship of older adults’ nutrition to health outcomes and the extent to which federal nutrition guidelines address older adults’ nutritional needs; (2) the extent to which federal nutrition assistance programs serving older adults have nutrition-related requirements and how these requirements are overseen; and (3) challenges program providers face in meeting the nutritional needs of older adults. In addition to the methods discussed below, to address all three research objectives we reviewed relevant federal laws, regulations and guidance. To provide context for all three research objectives, we examined federal projections of growth in the older adult population covering the time period of 2016 through 2060. We relied on the U.S. Census Bureau’s projections of the U.S. population by various demographic traits including age, sex, race, Hispanic origin, and nativity. We assessed the reliability of these data by reviewing technical documentation describing the methodology, assumptions, and inputs used to produce the 2017 National Population Projections, upon which the 2020-2060 estimates are based. We determined these data to be sufficiently reliable for the purposes of our report. To provide context on the federal nutrition assistance programs serving older adults, we examined federal data on expenditures and participation in these programs for the most recent fiscal year available. For the congregate and home-delivered meal programs, we relied on State Program Report data from fiscal year 2017, the most recent data available at the time of our review, from the U.S. Department of Health and Human Services’ (HHS) AGing Integrated Database. These data are submitted on an annual basis by states to HHS’s Administration for Community Living (ACL). For program expenditure and participation data for the Child and Adult Care Food Program, Commodity Supplemental Food Program, Senior Farmers’ Market Nutrition Program, and Supplemental Nutrition Assistance Program (SNAP), we relied on fiscal year 2018 data from the U.S. Department of Agriculture’s (USDA) National Data Bank and submitted through USDA’s Food and Nutrition Service (FNS) grantee reports. We also relied on fiscal year 2017 data from USDA’s Characteristics of SNAP Households report on the number of older adult participants in SNAP, the most recent year for which these data were available. To assess the reliability of these data, we interviewed FNS officials and reviewed relevant technical documentation. We determined that these data were sufficiently reliable for the purposes of our report. To address our first objective on what is known about the relationship between older adults’ nutrition and health outcomes, we conducted a literature search to identify relevant peer-reviewed studies on the relationship between nutritional needs and health outcomes of older adults covering the time period of 2013 through 2018. We searched research databases, such as ProQuest, Scopus, and Ebsco (AgeLine, EconLit, and CINAHL), using search terms such as nutrition and aging and dietary guidelines for seniors. We reviewed the results of the search to identify publications that (1) included a literature review and synthesis of studies on the connection between nutrition and health outcomes for older adults, including the factors that may affect older adults’ nutritional needs, such as age-related changes and (2) emphasized the general diet-health relationship among broad populations of older adults. Because these broader studies were most relevant to our objective, we excluded studies that (1) focused on the relationship between a specific food or nutrient and a single health outcome (e.g., salt and cardiovascular disease) or (2) studied a narrow group of older adults (e.g., residents of a single U.S. state or region). We conducted detailed reviews of these studies to assess the soundness of the reported methods and the credibility and reliability of the conclusions drawn by the authors, and deemed them to be sufficiently credible, reliable, and methodologically sound for the purposes of our report. To help inform all of our research objectives and gather information about nutrition assistance programs that provide meals and food packages to older adults at the local level, we conducted visits to 25 local meal and food distribution sites in four states: Arizona (5 sites), Louisiana (10 sites), Michigan (6 sites), and Vermont (4 sites) between December 2018 and March 2019. We interviewed officials from a variety of entities involved in administering these programs in each of the states, including 20 state and area agencies on aging and 20 local providers; observed meal services and food distribution; and held conversations with older adult program participants. We selected states and local sites within those states based on a high percentage of adults 60 or older, and to ensure variation across the sites in geographic location, urban and rural location, percentage of older adults in poverty, and program provider and site type. We visited a wide variety of site locations including, but not limited to, senior centers, community centers, adult day care centers, and senior housing. Because we relied on a nongeneralizable sample of sites and states, the views of the entities we interviewed do not represent the views of all providers of federal nutrition assistance programs providing meals and food packages to older adults or participants in those programs. Prior to each selected state visit, we gathered information from state and area agencies on aging responsible for administering these programs using semi-structured interview questions. We collected information on state and area agency on aging roles in administering nutrition assistance programs for older adults, federal nutrition requirements in these programs, oversight and monitoring of programs, partnerships to help meet the nutritional needs of older adults, outreach efforts, assistance from federal agencies, and challenges in administering the programs and meeting the nutritional needs of the older adult populations served. At each site, we gathered information from local providers and participants using semi-structured interview questions. We collected information on program provider operations; characteristics of the population served; efforts to meet the nutritional needs of the population served, other nutrition-related services; challenges with meeting the nutritional needs of the population and efforts to address them; outreach efforts; and assistance received from regional, state, and federal agencies. We also collected perspectives on food received and program impacts on health outcomes from those participating at sites. In addition, at each site we observed food and meal delivery and the approximate number of participants and staff operating the site. To inform all three research objectives, we interviewed officials from HHS’s Administration for Community Living and USDA’s Food and Nutrition Service in their national office and all of their regional offices. We also interviewed a broad range of national groups, including advocacy, research, and service provider organizations involved in nutrition assistance programs serving older adults. These included AARP, Feeding America, Food Research and Action Center, Jean Mayer USDA Human Nutrition Research Center on Aging, Mathematica Policy Research, Meals on Wheels America, National Academies, National Association of Area Agencies on Aging, National Association of Nutrition and Aging Services Programs, National Association of States United for Aging and Disabilities, National Commodity Supplemental Food Program Association, and National Council on Aging. To inform our first objective on the extent to which federal nutrition guidelines address older adults’ nutritional needs, we reviewed the federal guidance reports that detail the nutrition requirements for Americans, including those reports supporting the 2015-2020 Dietary Guidelines for Americans and the body of work on the Dietary Reference Intakes. To obtain information specific to our second objective on how nutrition assistance programs serving older adults are overseen, we reviewed relevant federal program documents on monitoring and oversight of these programs. In addition, we reviewed relevant studies conducted on behalf of HHS that evaluated the impact of its nutrition assistance programs on older adults’ nutrition. These studies evaluated program participants’ diet quality and nutrient intake, as well as program administration, among other things. We assessed the reliability of results in these evaluations by interviewing officials responsible for conducting these evaluations. In addition to the contact above, Rachel Frisk and Theresa Lo (Assistant Directors), Claudine Pauselli (Analyst-in-Charge), Jessica Ard, and Vernette G. Shaw made key contributions to this report. Also contributing to this report were Priyanka Sethi Bansal, Tim Bushfield, Daniel Concepcion, Kathleen van Gelder, Sarah Gilliland, Isabella Guyott, Serena Lo, Stacy Ouellette, Amber Sinclair, Joy Solmonson, Almeta Spencer, Curtia Taylor, Adam Wendel, and Sirin Yaemsiri.", "summary": "The U.S. population is aging and, by 2030, the U.S. Census Bureau projects that one in five Americans will be 65 or older. Recognizing that adequate nutrition is critical to health, physical ability, and quality of life, the federal government funds various programs to provide nutrition assistance to older adults through meals, food packages, or assistance to purchase food. This report examines (1) the relationship of older adults' nutrition to health outcomes and the extent to which federal nutrition guidelines address older adults' nutritional needs, (2) nutrition requirements in federal nutrition assistance programs serving older adults and how these requirements are overseen, and (3) challenges program providers face in meeting older adults' nutritional needs. GAO reviewed relevant federal laws, regulations, and guidance and conducted a comprehensive literature search; visited a nongeneralizable group of four states—Arizona, Louisiana, Michigan, and Vermont—and 25 meal and food distribution sites, selected for a high percentage of adults 60 or older, and variations in urban and rural locations, and poverty level; and interviewed officials from HHS, USDA, states, national organizations, and local providers. Research shows that nutrition can affect the health outcomes of older adults. Federal nutrition guidelines provide broad guidance for healthy populations, but do not focus on the varying nutritional needs of older adults. Department of Health and Human Services (HHS) data show that the majority of older adults have chronic conditions, such as diabetes or heart disease. Research shows that such individuals may have different nutritional needs. As older adults age, they may also face barriers, such as a reduced appetite, impairing their ability to meet their nutritional needs. HHS plans to focus on older adults in a future update to the guidelines, but has not documented a plan for doing so. Documenting such a plan could help ensure guidelines better address the needs of the population. Of the six federal nutrition assistance programs serving older adults, four have requirements for food that states and localities provide directly to participants, and federal agencies oversee states' monitoring of these requirements. In HHS's and U.S. Department of Agriculture's (USDA) meal programs, states must ensure meals meet requirements. Yet, HHS does not gather information from states, such as approved menus, to confirm this, and localities in two of the four selected states said state monitoring of menus was not occurring. Further, USDA regional officials told GAO they lack information on how meal programs operate at adult day care centers as they primarily focus on other sites for their on-site reviews. Additional monitoring could help HHS and USDA ensure meal programs meet nutritional requirements and help providers meet older adults' varying needs. In the states GAO selected, meal and food providers of the four nutrition programs with nutrition requirements reported various challenges, such as an increased demand for services. Providers in three of the four states reported having waiting lists for services. Providers of HHS and USDA meal programs in all four states also reported challenges tailoring meals to meet certain dietary needs, such as for diabetic or pureed meals. HHS and USDA have provided some information to help address these needs. However, providers and state officials across the four states reported that more information would be useful and could help them better address the varying nutritional needs of older adults. GAO is making five recommendations, including that HHS develop a plan to include nutrition guidelines for older adults in a future update, and that HHS and USDA improve oversight of meal programs and provide additional information to meal providers to help them meet older adults' nutritional needs. HHS and USDA generally concurred with our recommendations.", "document_type": "gao"}
{"report": "In 1968, Congress created NFIP, with the passage of the National Flood Insurance Act, to help reduce escalating costs of providing federal flood assistance to repair damaged homes and businesses. According to FEMA, NFIP was designed to address the policy objectives of identifying flood hazards, offering affordable insurance premiums to encourage program participation, and promoting community-based floodplain management. To meet these policy objectives, NFIP has four key elements: identifying and mapping flood hazards, floodplain management, flood insurance, and incentivizing flood-risk reduction through grants and premium discounts. NFIP enables property owners in participating communities to purchase flood insurance and, in exchange, the community agrees to adopt and enforce NFIP minimum floodplain management regulations and applicable building construction standards to help reduce future flood losses. A participating community’s floodplain management regulations must meet or exceed NFIP’s minimum regulatory requirements. Insurance offered through NFIP includes different coverage levels and premium rates, which are determined by factors that include property characteristics, location, and statutory provisions. NFIP coverage limits vary by program (Regular or Emergency) and building occupancy (for example, residential or nonresidential). In NFIP’s Regular Program, the maximum coverage limit for one-to-four family residential policies is $250,000 for buildings and $100,000 for contents. For nonresidential or multifamily policies, the maximum coverage limit is $500,000 per building and $500,000 for the building owner’s contents. Separate coverage is available for contents owned by tenants. NFIP also offers Increased Cost of Compliance coverage for most policies, which provides up to $30,000 to help cover the cost of mitigation measures following a flood loss when a property is declared to be substantially or repetitively damaged. Through NFIP, FEMA maps flood hazard zones on a Flood Insurance Rate Map, which participating NFIP communities must adopt. According to FEMA, floodplain management standards are designed to prevent new development from increasing the flood threat and to protect new and existing buildings from anticipated flooding. FEMA has a division responsible for flood mapping activities and policy and guidance, but stakeholders from various levels of government and the private sector participate in the mapping process, as appropriate. A community’s Flood Insurance Rate Map serves several purposes. They provide the basis for setting insurance premium rates and identifying properties whose owners are required to purchase flood insurance. Since the 1970s, homeowners with federally backed mortgages or mortgages held by federally regulated lenders on property in a special flood hazard area have been required to purchase flood insurance. Others may purchase flood insurance voluntarily if they live in a participating community. The maps also provide the basis for establishing minimum floodplain management standards that communities must adopt and enforce as part of their NFIP participation. As of May 2020, 22,487 communities across the United States and its territories voluntarily participated in NFIP by adopting and agreeing to enforce flood-related building codes and floodplain management regulations. FEMA supports a variety of community-level flood mitigation activities that are designed to reduce flood risk (and thus NFIP’s financial exposure). These activities, which are implemented at the state and local levels, include hazard mitigation planning; adoption and enforcement of floodplain management regulations and building codes; and use of hazard control structures such as levees, dams, and floodwalls or natural protective features such as wetlands and dunes. FEMA provides community-level mitigation funding through its HMA grant programs. In addition, FEMA’s Community Rating System is a voluntary incentive program that recognizes and encourages community floodplain management activities that exceed the minimum NFIP requirements. Flood insurance premium rates are discounted to reflect the reduced flood risk resulting from community actions that meet the three goals of reducing flood damage to insurable property, strengthening and supporting the insurance aspects of NFIP, and encouraging a comprehensive approach to floodplain management. At the individual property level, mitigation options include property acquisition—or “buyouts”—to either demolish a building for green space or relocate a building to a low flood risk area, elevation, or floodproofing. Acquisition and demolition (acquisition) is one of the primary methods by which states or localities use FEMA funding to mitigate flood risk. Through this process, a local or state government purchases land and structures that flooded or are at risk from future floods from willing sellers and demolishes the structures. The community restricts future development on the land, which is maintained as open space in perpetuity to restore and conserve the natural floodplain functions. According to FEMA officials, an advantage of property acquisition is that it offers a permanent solution to flood risks, whereas other mitigation methods make properties safer from floods but not immune. Property acquisition and demolition is a voluntary process, and property owners are paid fair market value for their land and structures. Acquisition is typically done on a community-wide scale, purchasing several or all properties in an at-risk neighborhood. Acquisition projects typically require building consensus from property owners and sustained communication and collaboration between residents and the government executing the project. Acquisition and relocation (relocation) refers to purchasing a structure and moving it to another location instead of demolishing it. Through this process, state or local governments use FEMA funding to help purchase land from willing sellers and assist the property owners with relocating the structure. The structure must be sound and feasible to move outside of flood-prone areas. Relocation is a voluntary process and property owners are paid fair market value for their land. Elevation involves raising a structure so that the lowest occupied floor is at or above the area’s base flood elevation. Structure elevation may be achieved through a variety of methods, including elevating on continuous foundation walls; elevating on open foundations, such as piles, piers, or columns; and elevating on fill. Structures proposed for elevation must be structurally sound and capable of being elevated safely. Further, elevation projects must be designed and adequately anchored to prevent flotation, collapse, and lateral movement of the structure from flooding, waves, and wind. Floodproofing falls into two categories: dry floodproofing and wet floodproofing. Dry floodproofing involves sealing a structure to prevent floodwater from entering. Examples of dry floodproofing measures include using waterproof coatings or coverings to make walls impermeable to water, installing waterproof shields, and installing devices that prevent sewer and drain backup. Dry floodproofing is appropriate only where floodwaters do not exceed three feet, the speed of flood waters is low, and the duration of flooding is relatively short because walls and floors may collapse from the pressure of higher water levels. Wet floodproofing involves changing a structure to allow floodwaters to enter and exit with minimal damage. Wet floodproofing is used in parts of a structure that are not used as living space, such as a crawlspace, basement, or garage. Examples of wet floodproofing measures include installing flood openings in the foundation and enclosure walls below the base flood elevation, using flood-resistant building materials and furnishings located below the base flood elevation, and either elevating or floodproofing all utility systems and associated equipment to protect them from damage. FEMA administers three HMA grant programs that can be used to fund flood mitigation projects: the Hazard Mitigation Grant Program (HMGP), Pre-Disaster Mitigation (PDM), and Flood Mitigation Assistance (FMA). Eligible HMA applicants include states, territories, and federally recognized tribal governments. Local communities cannot apply directly to FEMA for HMA funding but instead must collaborate as sub-applicants with their state, territory, or tribal government and then receive funding through that entity. Certain nonprofit organizations can act as sub- applicants but only under HMGP. Generally, individuals may not apply for HMA funding, but they may benefit from a community application. Applicants to all three programs must have FEMA-approved hazard mitigation plans. FEMA evaluates HMA applications based on technical feasibility and cost-effectiveness, among other factors. In fiscal year 2019, HMA awarded $859 million in funding. Eligible activities differ for the three programs but must be consistent with FEMA’s National Mitigation Framework. The Hazard Mitigation Grant Program helps communities implement hazard mitigation measures following a presidential major disaster declaration to improve community resilience to future disasters. HMGP provides funding to protect public or private property through various mitigation measures based on state or tribal priorities. Mitigation project examples include acquisition, relocation, retrofitting structures to minimize damages from various natural hazards, and elevating flood prone structures. HMGP recipients (states, territories, and federally recognized tribal governments) are primarily responsible for prioritizing, selecting, and administering state and local hazard mitigation projects. According to FEMA guidance, although individuals may not apply directly to the state for assistance, local governments engage interested property owners during the application process. A formula based on the size of the presidential disaster declaration determines the amount of money available to HMGP. Pre-Disaster Mitigation seeks to reduce overall risk to the population and structures from future natural hazard events, while also reducing reliance on federal funding in future disasters. PDM grants fund mitigation plans and eligible projects that reduce or eliminate long-term risk to people and property from natural disasters, such as property acquisition, property elevation, earthquake hardening, and construction of tornado and high-wind safe rooms. Generally, local governments (i.e., sub-applicants) submit mitigation planning and project applications to their state, territory, or federally recognized tribal government (i.e., applicants) for review and prioritization. The state, territory, or federally recognized tribal government then submits one PDM grant application to FEMA for consideration. Annual Congressional appropriations fund these grants, and FEMA awards them on a nationally competitive basis. In fiscal year 2019, Congress appropriated $250 million to PDM, which was the program’s final year of funding. In 2018, Congress passed the Disaster Recovery Reform Act, which included amendments to PDM, which FEMA calls the Building Resilient Infrastructure and Communities program. According to FEMA officials, this program is replacing PDM in fiscal year 2020 and will be funded through the Disaster Relief Fund as a 6 percent set-aside from the estimated total amount of grants for each major disaster declaration. FEMA has solicited public input on the program and said it expects to release a notice of funding opportunity in summer 2020. Flood Mitigation Assistance is designed to reduce or eliminate flood insurance claims by funding cost-effective flood mitigation projects that reduce or eliminate long-term risk of flood damage to structures insured under NFIP. Typical projects may include acquisition of RL properties, elevation of buildings, and neighborhood-scale flood defense investment. Generally, local communities will sponsor applications on behalf of homeowners and then submit the applications to their state. A state or federally recognized tribal government must submit the grant applications to FEMA. Annual Congressional appropriations fund FMA grants, and FEMA awards them on a nationally competitive basis. FMA appropriations have remained relatively stable at about $175 million for fiscal years 2016 through 2019. RL properties present a financial challenge for NFIP. FEMA has three definitions for such properties that vary slightly to meet the specific needs of different programs: NFIP Repetitive Loss refers to an NFIP-insured structure that has incurred flood-related damage on two occasions during a 10-year period, each resulting in at least a $1,000 claim payment. FEMA uses the NFIP RL definition for insurance purposes related to the Community Rating System, for local hazard mitigation plans, and for eligibility determinations for preferred risk policies and individual assistance. FMA Repetitive Loss refers to an NFIP-insured structure that (a) has incurred flood-related damage on two occasions in which the cost of repair, on average, equaled or exceeded 25 percent of the value of the structure at the time of each such flood event; and (b) at the time of the second incidence of flood-related damage, the flood insurance policy contained Increased Cost of Compliance coverage. FEMA uses this definition for FMA purposes, as these properties are eligible for the largest federal cost share for mitigation, up to 90 percent. This is also the same definition NFIP uses to approve an Increased Cost of Compliance payment. Severe Repetitive Loss refers to an NFIP-insured structure that has incurred flood-related damage for which (a) four or more separate claims have been paid that exceeded $5,000 each and cumulatively exceeded $20,000; or (b) at least two separate claim payments have been made under such coverage, with the cumulative amount of such claims exceeding the fair market value of the insured structure. FEMA has two severe RL definitions for mitigation and insurance, which are similar except that the insurance definition includes only residential structures, while the mitigation definition includes all structures. FEMA uses the severe RL definition for grant eligibility and cost share, the Community Rating System, and insurance rate setting. HMGP is the largest of FEMA’s three HMA programs and, unlike the others, it is based on the amount of disaster assistance a state or territory receives following a presidential disaster declaration (see table 1). PDM and FMA are smaller grant programs that receive annual appropriations and are not directly tied to an immediately preceding disaster. Because these programs do not require an immediate disaster declaration, FEMA considers them pre-disaster programs, as their intent is to mitigate potential damage before disasters occur. HMGP and PDM can be used for projects that mitigate the risk of many hazards, including flood, wind, fire, earthquake, and drought, but FMA can only be used to mitigate the risk of flood (see table 1). Furthermore, FMA funds can only be used to mitigate properties that are insured by NFIP, but HMGP and PDM funds can be used to mitigate properties without NFIP coverage. Properties mitigated in a special flood hazard area, where the structure remains on the parcel, must maintain a flood insurance policy after project completion. HMA grants fund a variety of methods to mitigate the flood risk of properties, including acquisition, elevation, relocation, and floodproofing. In most cases, HMA grants cover up to 75 percent of the project cost, and the grantee generally must contribute the remainder using nonfederal funds (although there are some exceptions, discussed below). However, PDM will cover up to 90 percent of project costs for communities that meet FEMA’s definition of small and impoverished. Moreover, FMA will cover up to 90 percent for projects that mitigate RL properties and up to 100 percent for severe RL properties. Funding levels for the three programs have varied over time because they have depended on disaster declarations and annual appropriations (see fig. 1). HMGP is the largest of the three programs—adjusted for inflation, annual HMGP grants have reached $2.9 billion, while PDM and FMA have never exceeded $300 million. According to FEMA officials, the estimated annual funding for the Building Resilient Infrastructure and Communities program, the successor to PDM, will average $300 million to $500 million, as it will be funded by a 6 percent set aside of annual estimated disaster grant expenditures. HMA funding also varies by state. Louisiana has obligated the most funding. After adjusting for inflation, it has obligated more than $3.1 billion from all three programs since HMGP was created in 1989, followed by California ($2.0 billion), Texas ($1.8 billion), New York ($1.6 billion), and Florida ($1.5 billion), while the bottom 18 states and territories each obligated less than $50 million (see fig. 2). Because HMGP is the largest program and is tied to presidential declarations, these totals reflect, in part, the extent to which states and territories have experienced natural disasters in this time period. Typically, recipients of federal mitigation grants must use nonfederal funds to meet cost share requirements because federal law prohibits the use of more than one source of federal disaster recovery funding for the same purpose. However, according to FEMA, some federal programs are exempt from these requirements due to authorizing statutes and therefore may be used in concert with HMA funds. Department of Housing and Urban Development’s Community Development Block Grant (CDBG) program. The Department of Housing and Urban Development awards CDBG funds to state and local governments to support a variety of community and economic development needs. According to FEMA’s HMA Cost Sharing Guide, HMA applicants may use several categories of CDBG funds as a source of project cost share, as long as the project meets Department of Housing and Urban Development rules. CDBG Disaster Recovery funds are the most frequently used form of HMGP cost share from a federal agency, according to FEMA. FEMA Increased Cost of Compliance coverage. NFIP offers Increased Cost of Compliance coverage, which provides up to $30,000 for policyholders to fund mitigation efforts on their property if they experience substantial damage or if their structure is an RL property. Between 1997 and 2014, the vast majority (99 percent) of Increased Cost of Compliance claims met the substantially damaged property definition, according to a 2017 report from the University of Pennsylvania. Unlike CDBG, which is awarded to states and local governments, Increased Cost of Compliance is awarded directly to individuals. According to FEMA, it is eligible as an HMA nonfederal cost share because it is considered a direct contract between the insurer and policyholder. FEMA allows recipients to assign their funds to the community as part of a collective mitigation project, and the community is then obligated to provide HMA funding to any property owner who contributed Increased Cost of Compliance dollars toward the nonfederal cost share. As of September 2019, FEMA had closed more than 38,000 Increased Cost of Compliance claims with dates of loss since 1997, totaling more than $877 million. Small Business Administration disaster loans. Small Business Administration disaster loans provide up to $200,000 for repairing or replacing a primary residence and $40,000 for repairing or replacing personal items that have been affected by a disaster. The interest rate cannot exceed 4 percent for applicants unable to access credit elsewhere, and cannot exceed 8 percent for all others. Secondary or vacation homes are not eligible, but qualified rental properties may be eligible under the Small Business Administration’s business disaster loan program, which offers loans of up to $2 million. According to FEMA guidance, these loans can serve as a source of cost share if HMA grants are disbursed early enough; however, the differing award timelines often make these funding sources incompatible. Further, disaster loans may not be eligible in conjunction with HMA funds due to duplication of benefits, but general-purpose Small Business Administration loans are not subject to this restriction, according to FEMA. In addition to FEMA’s three HMA programs, other federal, state, and local programs have helped acquire properties. Community Development Block Grants. In addition to its use as a cost- share complement to HMA grants, states and communities can use CDBG Disaster Recovery funding as a stand-alone source of property acquisition funds, according to the Department of Housing and Urban Development. Availability of CDBG Disaster Recovery funds is subject to supplemental appropriations following a presidential disaster declaration and must be used in response to that specific disaster. CDBG Disaster Recovery funds are disbursed to state and local governments and not to individuals directly. However, the governmental recipient can award CDBG Disaster Recovery funds to private citizens, nonprofits, economic development organizations, businesses, and other state agencies. The Bipartisan Budget Act of 2018 appropriated funding for CDBG, of which the Department of Housing and Urban Development allocated almost $6.9 billion for CDBG mitigation funds for the first time, as a result of the 2015 to 2017 disasters. Unlike CDBG Disaster Recovery funds, which the recipient must use in response to a specific disaster, recipients may use CDBG Mitigation funds to mitigate risks from future disasters. U.S. Army Corps of Engineers’ National Nonstructural Committee. The Army Corps of Engineers (Corps) conducts a range of mitigation measures through the National Nonstructural Committee, including acquisitions, elevations, relocations, and floodplain mapping. Nonstructural refers to measures that attempt to mitigate the consequences of floods, as opposed to structural measures intended to prevent floods from occurring. According to the Corps, except for limited research funding, it does not offer grants for flood risk management projects, and large projects generally require specific authorization from Congress. However, the Corps’ Continuing Authority Program allows it to execute smaller projects at its discretion. For example, for one of the programs, the federal government funds 65 percent of a project’s cost, and the project sponsor must provide all land, easement, rights-of-way, relocations, and disposal areas required for the project. The sponsor’s cost share includes credit for provision of the requirements above and pre-approved work-in-kind, but at least five percent must be provided in cash. Department of Agriculture’s Natural Resources Conservation Service Emergency Watershed Protection Program. The Federal Agriculture Improvement and Reform Act of 1996 enables the Emergency Watershed Protection Program to purchase floodplain easements on residential and agricultural land for flood mitigation purposes and to return the land to its natural state. For agricultural and residential land, this program pays up to the entire easement value and also funds property demolition or relocation, according to the Department of Agriculture. Land generally must have flooded in the past year or twice within the previous 10 years to be considered eligible. State and local acquisition programs. While state and local governments are active participants in federal acquisition projects, some have also developed their own acquisition programs. These programs vary on the extent to which they rely on federal funds, if at all. For example: The Harris County Flood Control District, a special purpose district, in Texas acquired about 3,100 properties between 1985 and 2017, according to a 2018 report from Rice University, using a combination of FEMA grants, Corps funds, and local dollars. Charlotte-Mecklenburg Storm Water Services, a joint city-county utility in North Carolina, has acquired more than 400 homes since 1999. Initially, it primarily used federal funds, but now it uses almost solely stormwater fees and other local revenue to fund acquisitions. The utility’s Quick Buys program allows it to acquire properties soon after a flood, before homeowners invest in repairs, whereas federal acquisitions often occur after property owners have begun rebuilding, according to FEMA officials. New Jersey, through its Blue Acres program, plans to acquire up to 1,300 properties damaged by Superstorm Sandy. The program has used state funds, including $36 million in bonds, as well as more than $300 million in federal funding received from multiple agencies. Since 1989, the primary means by which FEMA has mitigated flood risk at the property level has been by funding property acquisitions. Acquisitions accounted for about 75 percent of FEMA’s $5.4 billion in flood mitigation spending, adjusted for inflation, from 1989 to 2018 (see fig. 3). Most of the remaining spending was used to elevate properties, with smaller amounts used to floodproof and relocate properties. The average federal cost-per-property was $136,000 for acquisitions and $107,000 for elevations, according to 2008-2014 FEMA data. As seen in figure 4, FEMA-funded property acquisitions have fluctuated over time but have generally increased since FEMA’s HMA programs began. For example, from 1989 through 1992—the first four years of HMGP funding and prior to the creation of PDM and FMA—less than $8 million, adjusted for inflation, was obligated for property acquisitions each year, resulting in fewer than 200 acquisitions each year (see fig. 4). The highest acquisition funding generally was associated with years that had significant flood events, such as Superstorm Sandy (2012) and Hurricanes Harvey, Irma, and Maria (2017). From fiscal years 1989-2018, approximately $3.3 billion of property acquisition funding, adjusted for inflation, occurred through HMGP, resulting in the acquisition of 41,458 properties (see fig. 5). HMGP represented about 90 percent of all property acquisitions and 82 percent of all acquisition funding, with PDM and FMA representing the remainder. As a result, most FEMA-funded acquisitions occurred following flood events. Most of the funding, adjusted for inflation, for HMGP’s and PDM’s flood mitigation projects has been for property acquisition (83 percent and 89 percent of total funds, respectively), while most FMA funding has been for elevation (49 percent). Although FEMA mitigated more than 57,000 properties for flood risk from 1989 to 2018, including more than 46,000 through acquisition, the number of nonmitigated RL properties increased from 2009 to 2018. Figure 6 shows that this growth in the number of RL properties has outpaced efforts to mitigate their flood risk. From 2009 through 2018, FEMA’s inventory of new RL properties grew by 64,101. During this period, FEMA mitigated 4,436 RL properties through its three HMA programs, and an additional 15,047 were mitigated through other federal or state programs. As a result, the number of nonmitigated RL properties increased by 44,618—more than double the number of RL properties that were mitigated in that time period. States varied in the extent to which they mitigated high-risk properties, including RL properties, between 1989 and 2018. While FEMA does not require a property to be an RL property to receive flood mitigation funding, the number of properties mitigated by a state relative to its population of RL properties provides context to its flood mitigation progress. For example, some states with large numbers of RL properties, such as Texas, Louisiana, Florida, and New York, mitigated few properties relative to their numbers of RL properties (see table 2). Other states, such as Missouri and North Carolina, have far fewer RL properties but have mitigated more properties relative to their numbers of RL properties. States also varied in their methods for flood mitigation (see table 2). For example, while property acquisition accounted for 81 percent of mitigated properties nationwide, it represented closer to half of mitigated properties in Virginia, New Jersey, and Florida and only 19 percent in Louisiana. According to some FEMA and local officials, high property values in some regions can make acquisitions cost prohibitive and other mitigation methods such as elevation more attractive because they do not incur the cost of purchasing the land. Many other factors could affect mitigation, including homeowners’ preferences. Further, the voluntary nature of FEMA’s HMA programs may limit states’ ability to acquire properties with known flood risk. According to FEMA, acquisition permanently addresses flood risk because, unlike elevation or floodproofing, it moves individuals and structures away from flood risk rather than mitigating a structure in place. In a subsequent report, we plan to explore in more detail the factors, including homeowner demand for acquisition, that have affected the extent to which states have used acquisition to mitigate flood risk. NFIP represents a fiscal exposure to the federal government because its premium rates have not kept pace with the flood risk of the properties it insures. Addressing this imbalance would mean reducing the flood risk of the insured properties, increasing premium revenue, or some combination of both. Despite FEMA’s efforts to mitigate its insured properties’ flood risk, premium rates for many properties do not reflect the full estimated risk of loss. As we have reported previously, mitigation alone will not be sufficient to resolve NFIP’s financial challenges; structural reforms to the program’s premium rates will also be necessary. NFIP’s total annual flood claim payments have grown in recent years, potentially indicating an increase in flood risk. For example, the eight years of the highest annual NFIP claims have all occurred since 2004, with particularly catastrophic flood events accounting for much of these claims: In 2005, claims reached $17.8 billion ($23.3 billion, adjusted for inflation), largely due to Hurricanes Katrina, Rita, and Wilma. In 2012, claims reached $9.6 billion ($10.7 billion, adjusted for inflation), largely due to Superstorm Sandy. In 2017, claims reached $10.5 billion ($11.0 billion, adjusted for inflation), largely due to Hurricanes Harvey, Irma, and Maria. These severe weather events appear to be contributing to the long-term increases in claims paid by NFIP, as would be expected with infrequent but severe events. As seen in figure 7, the amount of claims paid per policy, adjusted for inflation, does not show a steady increase in claims but rather substantial spikes in certain years associated with catastrophic flooding events. RL properties have contributed heavily to NFIP’s claims and, as noted earlier, the number of RL properties continues to rise despite FEMA’s mitigation efforts. Of the $69.7 billion in claims NFIP paid out from 1978 to 2019, $22.2 billion was for flood damage sustained by RL properties (32 percent). The frequency and intensity of extreme weather events, such as floods, are expected to increase in coming years due to climate change, according to the U.S. Global Change Research Program and the National Academies of Sciences. Further, numerous studies have concluded that climate change poses risks to many environmental and economic systems and a significant financial risk to the federal government. For example, according to the November 2018 National Climate Assessment report, the continued increase in the frequency and extent of high-tide flooding due to sea level rise threatens America’s trillion-dollar coastal property market. According to the National Oceanic and Atmospheric Administration, minor flood events (sometimes referred to as nuisance flooding) also are projected to become more frequent and widespread due to climate change. While it is uncertain the exact extent to which flood risk has changed and will continue to change, NFIP’s fiscal exposure will persist as long as premium rates do not keep pace with flood risk. As we have been reporting since 1983, NFIP’s premium rates do not reflect the full risk of loss because of various legislative requirements and FEMA practices. To set premium rates, FEMA considers several factors, including location in flood zones, elevation of the property relative to the community’s base flood elevation, and characteristics of the property, such as building type, number of floors, presence of a basement, and year built relative to the year of the community’s original flood map. Most NFIP policies have premium rates that are deemed by FEMA to be full-risk rates, which FEMA defines as sufficient to pay anticipated losses and expenses. However, FEMA’s overall rate structure may not reflect the full long-term estimated risk of flooding, as discussed below. Subsidized rates. NFIP offers some policyholders subsidized rates—that is, rates that intentionally do not reflect the full risk of flooding. These premium rates are intended to encourage the widespread purchase of flood insurance by property owners and encourage floodplain management by communities. Subsidized rates generally are offered to properties in high-risk locations (special flood hazard areas) that were built before flood maps were created. FEMA staff said they have begun increasing rates for certain subsidized properties as prescribed under the Biggert-Waters Flood Insurance Reform Act of 2012 and the Homeowner Flood Insurance Affordability Act of 2014. In addition, the percentage of subsidized policies is decreasing. According to FEMA data, the percentage of NFIP policies receiving subsidized rates dropped from about 22 percent in July 2013 to about 17 percent in June 2019. In 2013, we recommended that FEMA obtain elevation information to determine full-risk rates for subsidized properties. As of January 2020, FEMA had not fully implemented this recommendation but was in the process of doing so. For example, FEMA had requested proposals from third-party vendors for obtaining the elevation information and was reviewing these proposals. This information remains necessary for FEMA to determine the adequacy of its premium rates and the costs of any subsidization. It will also allow Congress and the public to understand the amount of unfunded subsidization within the program and the federal fiscal exposure it creates. Grandfathered rates. FEMA allows some property owners whose properties are remapped into higher-risk flood zones to continue to pay the premium rate from the lower-risk zone. FEMA data show that about 9 percent of NFIP policies were receiving a grandfathered rate as of June 2019. In 2008, we recommended that FEMA collect data to analyze the effect of grandfathered policies on NFIP’s fiscal exposure. As of February 2020, FEMA officials said they had not fully implemented this recommendation but were in the process of doing so. The officials told us they had finished collecting data on grandfathered policies and that they planned to analyze it as they completed efforts to update their premium rate setting approach. Collection and analysis of data on grandfathered policies will help FEMA understand and communicate the extent to which these policies are contributing to NFIP’s fiscal exposure. Rates designated full-risk. As we reported in 2008 and 2016, it is unclear whether premiums FEMA considers to be full-risk actually reflect the full long-term estimated risk of loss. For example, NFIP full-risk premium rates do not fully reflect the risk of catastrophic losses or the expenses associated with managing them. Private insurers typically manage catastrophic risk using capital, reinsurance, and other instruments, such as catastrophe bonds, and include the associated expenses in premium rates. By contrast, FEMA has traditionally managed catastrophic risk by relying on its authority to borrow from Treasury. In January 2017, FEMA began purchasing reinsurance to transfer some of its flood risk exposure to the private reinsurance market. However, FEMA has not accounted for these expenses in setting its NFIP premium rates. Reinsurance could be beneficial because it would allow FEMA to recognize some of its flood risk and the associated costs up front through the premiums it must pay to the reinsurers rather than after the fact in borrowing from Treasury. However, because reinsurers must charge FEMA premiums to compensate for the risk they assume, reinsurance’s primary benefit would be to manage risk rather than to reduce NFIP’s expected long-term fiscal exposure. Congress has directed FEMA to provide discounted premium rates to promote affordability for policyholders but did not provide FEMA with dedicated funds to pay for these subsidies. As a result, premium revenue has been insufficient to pay claims in some years, requiring borrowing from Treasury to make up for the shortfall. While Congress passed reforms to NFIP in 1994 and 2004, neither set of actions sufficiently addressed program revenue. In 2005, Hurricanes Katrina, Rita, and Wilma hit the Gulf Coast and resulted in NFIP borrowing nearly $17 billion from Treasury to pay claims (see fig. 8). In July 2012, Congress passed the Biggert-Waters Flood Insurance Reform Act, which contained significant reforms to NFIP’s premium rates. But a few months later, Superstorm Sandy occurred, pushing NFIP’s debt to $24 billion. Following policyholders’ concerns about the rate increases authorized by the 2012 act, Congress slowed the pace of many of these rate increases in 2014 with the Homeowner Flood Insurance Affordability Act. In the fall of 2017, Hurricanes Harvey, Irma, and Maria occurred, prompting additional borrowing from Treasury and causing NFIP to reach its borrowing limit. In response, Congress canceled $16 billion of NFIP’s debt in October 2017, which allowed NFIP to pay claims from these storms. Since September 2017, NFIP has been operating under a series of short-term authorizations, the most recent of which expires in September 2020. As of March 2020, NFIP’s debt remained at $20.5 billion. To improve NFIP’s solvency and enhance the nation’s resilience to flood risk, we suggested in 2017 that Congress could make comprehensive reforms that include actions in six areas. We reported that it was unlikely that FEMA would be able to repay its debt and that addressing it would require Congress to either appropriate funds or eliminate the requirement that FEMA repay the accumulated debt. However, eliminating the debt without addressing the underlying cause of the debt—insufficient premium rates—would leave the federal taxpayer exposed to a program requiring repeated borrowing. To address NFIP’s fiscal exposure, there are two general approaches: decrease costs or increase revenue. Decreasing costs to the program in the form of claims involves mitigating insured properties’ flood risks. Mitigation can be very costly, but there will be some properties for which the cost to mitigate will be outweighed by the benefit of reduced flood risk and, ultimately, fiscal exposure. Mitigation may be a cost-effective option for those properties for which full-risk rates would be cost-prohibitive. Increasing revenue would require reforms to NFIP’s premium rates. FEMA has begun increasing rates on subsidized properties. But, as we suggested in 2017, Congress could remove existing legislative barriers to FEMA’s premium rate revisions. Members of Congress and others have raised concerns about such reforms because raising premium rates may make coverage unaffordable for some policyholders. To address these concerns, we suggested that all policies include full-risk premium rates, with targeted, means-based, appropriated subsidies for some policies. This would improve the program’s solvency while also addressing affordability concerns. Assigning full-risk premium rates to all policies would remove subsidies from those who do not need them, helping improve solvency. It would also more accurately signal the true flood risk to property owners and enhance resilience by incentivizing mitigation measures, such as acquisition. Means-based subsidies would ensure that property owners who needed help would get it, and an explicit appropriation for the subsidies would make their true cost transparent to taxpayers. We maintain that a comprehensive approach that includes mitigation and rate reform is needed to address NFIP’s fiscal exposure. Because several categories of NFIP premium rates do not reflect the full risk of flood loss, FEMA has had to borrow $36.5 billion from Treasury to pay claims from several catastrophic flood events since 2005. To address this, some have suggested additional funding to mitigate RL properties. While we acknowledge that mitigation is part of the solution, we maintain that a more comprehensive approach is necessary to address the program’s fiscal exposure. We have made two recommendations to FEMA that, if implemented, could help inform Congress’ efforts to reform NFIP. In 2008, we recommended that FEMA collect information on grandfathered properties and analyze their financial effect on NFIP, and in 2013, we recommended that FEMA obtain elevation information on subsidized properties. By implementing these recommendations, FEMA would better understand NFIP’s fiscal exposure and be able to communicate this information to Congress. Further, we suggested in 2017 that Congress take a comprehensive approach to reforming NFIP. One important first step would be to implement full-risk premium rates for all policies, with appropriated means-based subsidies for some policies. Full-risk premium rates would remove subsidies from those who do not need them, helping improve solvency, and also more accurately signal the true flood risk to property owners and incentivize efforts to mitigate flood risk. Further, means- based subsidies would ensure that property owners who need help will get it, and having Congress explicitly appropriate for the subsidies would make the true cost of the subsidy transparent to taxpayers. While this would be an important step to putting NFIP on a sustainable path, comprehensive reform of the program should also address the other issues we have identified, including mitigating the flood risk of insured properties. We provided a draft of this report to the Department of Homeland Security for its review and comment. The agency provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report addresses the Federal Emergency Management Agency’s (FEMA) National Flood Insurance Program (NFIP). Our objectives were to examine (1) funding programs available for property acquisitions, (2) FEMA’s flood mitigation efforts, and (3) factors contributing to NFIP’s fiscal exposure. To describe funding programs available for property acquisitions, we reviewed authorizing legislation, the Code of Federal Regulations, and FEMA guidance and manuals, including the Hazard Mitigation Assistance Guidance and Cost Share Guide, to identify program characteristics, eligibility requirements, and application guidelines. To identify funding for these programs, we analyzed FEMA’s project-level Hazard Mitigation Assistance (HMA) data from its Enterprise Applications Development Integration and Sustainment system, which FEMA uses to track mitigation projects funded through its HMA grant programs. To summarize Increased Cost of Compliance coverage, which NFIP policyholders can use to fund mitigation efforts, we analyzed FEMA’s NFIP claims database to identify the number and amount of such claims. We also interviewed the FEMA officials responsible for administering these grant programs. Further, we identified other federal agency programs that can fund property acquisitions or meet cost share requirements and reviewed their authorizing legislation and their relevant federal regulations. Finally, to identify examples of state and local programs that have been used to fund property acquisitions, we reviewed academic reports, including from the University of North Carolina and Rice University. To review FEMA’s flood mitigation efforts, we analyzed FEMA’s project- level HMA data from the “Mitigation Universe” of its Enterprise Applications Development Integration and Sustainment system. We analyzed several variables in this dataset, including number of properties, federal share obligated, mitigation type category, grant program area, grant program fiscal year, and state. For the analyses by mitigation type category, we excluded projects (79 percent of the total records) that did not include a flood mitigation activity (those with values of “Other” or “Pure Retrofit”). Of the remaining records, 98 percent were “Pure,” meaning all properties within each project were of a single mitigation method type (acquisition, elevation, floodproof, or relocation). The remaining 2 percent were “Mixed,” indicating a project contained at least one acquisition and at least one elevation but could also contain other mitigation methods. For analyses by grant program area, we treated projects funded through the Severe Repetitive Loss and Repetitive Flood Claims grant programs as being part of the Flood Mitigation Assistance program and projects funded through the Legislative Pre-Disaster Mitigation program as being part of the Pre- Disaster Mitigation program. For data on the number of flood mitigated properties, we used the final number of properties mitigated by a project. For data on funding, we used the federal share of the project’s obligated funding. To analyze mitigated and nonmitigated repetitive loss (RL) properties, we summarized FEMA’s RL property mitigation report, which tracked the cumulative number of RL properties by year from June 2009 through June 2018. To describe the number of RL properties by state, we analyzed FEMA’s list of RL properties as of August 31, 2019, which included every property that at any point FEMA had designated as an RL property under any of its three definitions. The list included properties that had since been mitigated, as well as those that are no longer insured by NFIP. To examine factors contributing to NFIP’s fiscal exposure, we analyzed FEMA’s claims dataset as of September 30, 2019. This dataset includes the more than 2 million claims paid to NFIP policyholders since the beginning of the program. We excluded records whose status was “open” or “closed without payment.” Further, we excluded records whose year of loss was before 1978 because FEMA officials told us that that was the first year they considered their claims data to be reliable and complete. To identify factors that contribute to NFIP’s fiscal exposure and illustrate how this fiscal exposure has materialized and changed over time, we reviewed several of our previous reports and the Department of the Treasury’s statements of public debt. Finally, to summarize how flood risk could change in the future, we reviewed our previous reports on climate change. In general, we adjusted for inflation any dollar figures that we compared or aggregated across multiple years and indicated this accordingly. To do this, we used the Bureau of Labor Statistics’ Consumer Price Index for All Urban Consumers. To assess the reliability of all of the datasets we analyzed for this report, we requested and reviewed preliminary versions of the data and accompanying data dictionaries. We used the data dictionary to identify potential variables for use in our analyses and output statistics on these variables (e.g., frequencies of values, number of blanks or zero values, minimum, maximum, and mean) to identify any potential reliability concerns such as outliers or missing values. We met with relevant FEMA officials to discuss each of the data sets to understand how FEMA collected, used, and maintained the data; the reliability and completeness of key variables; reasons for any potential discrepancies we identified; and whether our understanding of the data and approach to analyzing them were accurate and reasonable. After these meetings, we requested updated versions of the data and updated our analyses accordingly. We determined that all data elements we assessed were sufficiently appropriate and reliable for this report’s objectives. We conducted this performance audit from January 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. January 1983: We recommended that FEMA improve its rate-setting process to ensure adequate income for NFIP and suggested that Congress either limit FEMA’s borrowing for extraordinary losses or establish an emergency fund for such losses, and pay for NFIP subsidies with appropriations. March 1994: We found that NFIP’s premium income was insufficient to meet expected future losses because of subsidized rates and suggested that Congress consider how any changes in premium rates would affect policyholder participation. September 1994: National Flood Insurance Reform Act. Developed a mitigation assistance program and expanded the mandatory purchase requirement. June 2004: Flood Insurance Reform Act. Authorized grant programs to mitigate properties that experienced repetitive flooding losses. August-October 2005: Hurricanes Katrina, Rita, Wilma. Caused $17.1 billion in NFIP claims. FEMA debt to Treasury increased to $16.9 billion in fiscal year 2006. March 2006: We added NFIP to our high-risk list. October 2008: We recommended that FEMA collect data to analyze the effect of grandfathered policies on NFIP’s fiscal exposure. November 2008: We identified three options for addressing the financial impact of subsidies: increasing mitigation efforts; eliminating or reducing subsidies; and targeting subsidies based on need. June 2011: We suggested that Congress allow NFIP to charge full- risk premium rates to all property owners and provide assistance to some categories of owners to pay those premiums. July 2012: Biggert-Waters Flood Insurance Reform Act. Required FEMA to increase rates for certain subsidized properties and grandfathered properties; create a NFIP reserve fund; and improve flood risk mapping. October 2012: Superstorm Sandy. Caused $8.8 billion in NFIP claims. FEMA debt to Treasury increased to $24 billion in fiscal year 2013. February 2013: We added limiting the federal government’s fiscal exposure by better managing climate change risks to our high-risk list. July 2013: We recommended that FEMA obtain elevation information to determine full-risk rates for subsidized policyholders. March 2014: Homeowner Flood Insurance Affordability Act. Reinstated certain rate subsidies removed by the Biggert-Waters Flood Insurance Reform Act of 2012; established a new subsidy for properties that are newly mapped into higher-risk zones; restored grandfathered rates; and created a premium surcharge that would be deposited into the NFIP reserve fund. October 2014: We recommended that FEMA amend NFIP minimum standards for floodplain management to encourage forward-looking construction and rebuilding efforts that reduce long-term risk and federal exposure to losses. July 2015: We recommended that the Mitigation Framework Leadership Group establish an investment strategy to identify, prioritize, and guide federal investments in disaster resilience and hazard mitigation-related activities. August-October 2016: Hurricane Matthew and Louisiana floods. Caused $3.1 billion in NFIP claims. FEMA debt to Treasury debt increased to $24.6 billion in early fiscal year 2017. April 2017: We suggested that Congress make comprehensive reforms to NFIP that include actions in six areas: (1) addressing the debt; (2) removing legislative barriers to full-risk premium rates; (3) addressing affordability; (4) increasing consumer participation; (5) removing barriers to private-sector involvement; and (6) protecting NFIP flood resilience efforts. August-September 2017: Hurricanes Harvey, Irma, and Maria. Caused $10 billion in NFIP claims. FEMA reached the limit of its Treasury borrowing authority of $30.4 billion. September 2017: NFIP’s last long-term authorization ended, resulting in a string of short-term reauthorizations. October 2017: Congress canceled $16 billion of NFIP’s debt to enable FEMA to continue paying flood claims. This reduced FEMA’s debt to Treasury to $20.5 billion. March 2020: FEMA’s debt to Treasury remained at $20.5 billion. September 2020: NFIP’s current short-term authorization ends. In addition to the contact named above, Patrick Ward (Assistant Director), Christopher Forys (Analyst in Charge), Emily Bond, Christina Cantor, William Chatlos, Eli Dile, Lijia Guo, Holly Halifax, Laura Ann Holland, Yann Panassie, Stephen Ruszczyk, Jessica Sandler, Joseph Silvestri, Jena Sinkfield, and Kelsey Wilson made key contributions to this report.", "summary": "NFIP has faced significant financial challenges over the years, highlighted by a rise in catastrophic flood events and its $20.5 billion debt to Treasury. Contributing to these challenges are repetitive loss properties—those that have flooded and received a claim payment multiple times. Acquiring and demolishing these properties is one alternative to paying for repeated claims, but questions exist about the cost, efficiency, and effectiveness of this approach. GAO was asked to review FEMA's property acquisition efforts as a means of addressing NFIP's financial challenges. This report examines (1) funding programs available for acquisitions, (2) FEMA's flood mitigation efforts, and (3) factors contributing to NFIP's fiscal exposure. To conduct this work, GAO reviewed FEMA guidance and other documentation; analyzed FEMA data sets related to NFIP policies and claims, repetitive loss properties, and mitigation projects; and interviewed FEMA officials. The Federal Emergency Management Agency (FEMA) administers three grant programs that can fund efforts to mitigate the flood risk of properties insured by the National Flood Insurance Program (NFIP). Together, these three programs funded $2.3 billion in mitigation projects from fiscal years 2014 through 2018. The largest program's funding is tied to federal recovery dollars following presidential disaster declarations, while the other two programs are funded each year through congressional appropriations. States and localities generally must contribute 25 percent of the cost of a mitigation project, but some other federal program funds can be used for that purpose. One example of such a project is property acquisition—purchasing a high-risk property from a willing property owner, demolishing the structure, and converting the property to green space. From 1989 to 2018, FEMA has helped states and localities mitigate more than 50,000 properties; however, the number of nonmitigated repetitive loss properties (generally meaning those that flooded at least twice in 10 years) has grown. Mitigation efforts varied by state. Property acquisition accounted for about 80 percent of mitigated properties nationwide, but, in some states, elevation (raising a structure) was more commonly used. In addition, some states (e.g., Missouri and North Carolina) mitigated a high number of properties relative to their numbers of repetitive loss properties, while others (Florida, New York, Louisiana, and Texas) mitigated a low number. While these efforts can reduce flood risk and claim payments, the federal government's fiscal exposure from NFIP remains high because premium rates do not fully reflect the flood risk of its insured properties. NFIP has experienced several catastrophic flood events in recent years, and the frequency and severity of floods is expected to increase. However, NFIP's premium rates have not provided sufficient revenue to pay claims. As a result, FEMA still owed Treasury $20.5 billion as of March 2020, despite Congress cancelling $16 billion of debt in 2017. As GAO has reported in the past (GAO-17-425), Congress will need to consider comprehensive reform, including mitigation and structural changes to premium rates, to ensure NFIP's solvency. GAO suggested in GAO-17-425 that Congress make comprehensive reforms to NFIP to improve the program's solvency. Given NFIP's continued debt growth, GAO maintains that comprehensive reform warrants consideration.", "document_type": "gao"}
{"report": "The NASA Authorization Act of 2010 directed NASA to develop SLS, to continue development of a crew vehicle, and to prepare infrastructure at Kennedy Space Center to enable processing and launch of the launch system. To fulfill this direction, NASA formally established the SLS launch vehicle program in 2011. Then, in 2012, NASA aligned the requirements for the Orion program with those of the newly created SLS and EGS programs. Figure 1 provides details about each SLS hardware element and its source as well as identifies the major portions of the Orion spacecraft. In order to facilitate Congressional oversight and track program progress, NASA establishes an agency baseline commitment—the cost and schedule baselines against which the program may be measured—for all projects that have a total life cycle cost of $250 million or more. NASA refers to these projects as major projects or programs. When the NASA Administrator determines that development cost growth within a major project or program is likely to exceed the development cost estimate by 15 percent or more, or a program milestone is likely to be delayed from the baseline’s date by 6 months or more, NASA replans the project and submits a report to this committee—the Committee on Science, Space, and Technology of the House of Representatives—and the Committee on Commerce, Science, and Transportation of the Senate. Should a major project or program exceed its development cost baseline by more than 30 percent, the program must be reauthorized by the Congress and rebaselined by NASA in order for the contractor to continue work beyond a specified time frame. NASA tied the SLS and EGS program cost and schedule baselines to the uncrewed first mission—known now as Artemis-1—originally planned for November 2018. The Orion program’s cost and schedule baselines are tied to a crewed second mission—known as Artemis-2—planned for April 2023. In April 2017, we found that given combined effects of ongoing technical challenges in conjunction with limited cost and schedule reserves, it was unlikely that these three programs would achieve the originally committed November 2018 launch readiness date. Cost reserves are for costs that are expected to be incurred—for instance, to address project risks—but are not yet allocated to a specific part of the project. Schedule reserves are extra time in project schedules that can be allocated to specific activities, elements, and major subsystems to mitigate delays or address unforeseen risks. We recommended that NASA confirm whether the November 2018 launch readiness date was achievable and, if warranted, propose a new, more realistic Artemis-1 date and report to Congress on the results of its schedule analysis. NASA agreed with both recommendations and stated that it was no longer in its best interest to pursue the November 2018 launch readiness date. Subsequently, NASA approved a new Artemis-1 schedule of December 2019, with 6 months of schedule reserve available to extend the date to June 2020, and revised the costs that it expects to incur (see table 1). In June 2019, we found that within 1 year of announcing a delay for the first human spaceflight mission, senior NASA officials acknowledged that the revised Artemis-1 launch date of December 2019 was unachievable and the June 2020 launch date (which takes into account schedule reserves) was unlikely. These officials estimated that there were 6 to 12 months of schedule risk associated with this later date, which means the first launch may occur as late as June 2021 if all risks are realized. As we found in June 2019, this would be a 31-month delay from the schedule originally established in the programs’ baselines. Officials attributed the additional schedule delay to continued production challenges with the SLS core stage and the Orion crew and service modules. NASA officials also stated that the 6 to 12 months of risk to the launch date accounts for the possibilities that SLS and Orion testing and final cross-program integration and testing at Kennedy Space Center may result in further delays. As we noted in our report, these 6 to 12 months of schedule risk do not include the effects, if any, of the federal government shutdown that occurred in December 2018 and January 2019. In commenting on our June 2019 report, NASA stated that its Lunar 2024 planning activities would include an Artemis-1 schedule assessment. However, in July 2019, NASA reassigned its senior leaders responsible for human spaceflight programs. The NASA Administrator stated in August 2019 that, as a result, the agency does not plan to finalize schedule plans for Artemis-1 until new leadership is in place at the agency. Additional details follow on the status of each program, including cost, schedule, and technical challenges. SLS. As we found in June 2019, ongoing development issues with the SLS core stage—which includes four main engines and the software necessary to command and control the vehicle—contributed to the SLS program not being able to meet the June 2020 launch date. Officials from the SLS program and Boeing, the contractor responsible for building the core stage, provided several reasons for the delays. These reasons include the underestimation of the complexity of manufacturing and assembling the core stage engine section—where the RS-25 engines are mated to the core stage—and those activities have taken far longer than expected. Since our June 2019 report, based on our review of the program’s most recent status reports, NASA has reported progress across many parts of the SLS program. For example, NASA has delivered the four RS-25 engines to Michoud Assembly Facility. NASA has also completed qualification testing of all components of the boosters and reports that there is schedule margin remaining for the booster deliverables. In addition, NASA reports that Boeing has made continued progress and expects that the core stage will be complete and ready for testing in December 2019. Completion of the core stage will represent a significant milestone for the program. In June 2019, we found that that SLS program has been underreporting its development cost growth since the December 2017 replan. This underreporting is because of a decision to shift some costs to future missions while not adjusting the baseline costs downward to reflect this shift. The SLS development cost baseline established in August 2014 for Artemis-1 includes cost estimates for the main vehicle elements—stages, liquid engines, boosters—and other areas. According to program officials, because of the December 2017 replan process, NASA decided that costs included as part of the SLS Artemis-1 baseline cost estimate would be more appropriately accounted for as costs for future flights. Thus, NASA decided not to include those costs, approximately $782 million, as part of the revised SLS Artemis-1 cost estimate. However, NASA did not lower the $7 billion SLS development cost baseline to account for this significant change in assumptions and shifting of costs to future flights. This decision presents challenges in accurately reporting SLS cost growth over time. NASA’s decision not to adjust the cost baseline downward to reflect the reduced mission scope obscures cost growth for Artemis-1. In June 2019, we found that NASA’s cost estimate as of fourth quarter fiscal year 2018 for the SLS program indicated development cost growth had increased by $1 billion, or 14.7 percent. However, our analysis showed that development cost growth actually increased by $1.8 billion or 29.0 percent, when the development baseline is lowered to account for the reduced mission scope. Essentially, NASA is holding the baseline costs steady, while reducing the scope of work included in current cost estimates (see figure 2). As NASA determines its new schedule for the first mission, it is likely this cost growth will increase as additional time in the schedule leads to additional costs. In our June 2019 report, we recommended that the SLS program calculate its development cost growth using a baseline that is appropriately adjusted for scope and costs NASA has determined are not associated with the first flight, and determine if the development cost growth has increased by 30 percent or more. NASA agreed with the recommendation and NASA officials stated that they plan to implement the recommendation when new leadership is in place for the human space exploration programs. Looking ahead, based on our review of the program’s most recent status reports, completing core stage manufacturing and integration and green run testing will be the critical path—the path of longest duration through the sequence of activities in the schedule—for the SLS program. During green run testing, NASA will fuel the completed core stage with liquid hydrogen and liquid oxygen and fire the integrated four main engines for about 500 seconds. The green run test carries risks because it is the first time that several things are being done beyond just this initial fueling. For example, it is also the first time NASA will fire the four main engines together, test the integrated engine and core stage auxiliary power units in flight-like conditions, and use the SLS software in an integrated flight vehicle. In addition, NASA will conduct the test on the Artemis-1 flight vehicle hardware, which means the program would have to repair any damage from the test before flight. Orion. While the Orion program’s schedule performance is measured only to the Artemis-2 mission, we found in June 2019 that the program was not on schedule to support the June 2020 launch date for the first mission. This was due to delays with the European Service Module and component issues for the avionics systems for the crew module, including issues discovered during testing. We found that these specific problems were resolved by the time of our report, but had already contributed to the inability of the program to meet the June 2020 launch date. Since we last reported, as of August 2019, the Orion program has completed significant events including completing the crew module and the service module prior to integration and conducting a test to demonstrate the ability to abort a mission should a life-threatening failure occur during launch. The program is tracking no earlier than October 2020 for an Artemis-1 launch date but that does not reflect the ongoing agency-wide schedule assessment noted above. In June 2019, we found that the Orion program has reported development cost growth but is not measuring that growth using a complete cost estimate. In summer 2018, the Orion program reported development cost growth of $379 million, or 5.6 percent above its $6.768 billion development cost estimate. Program officials explained that the major drivers of this cost growth were the slip of the Artemis-1 launch date, which reflected delays in the delivery of the service module; Orion contractor underperformance; and NASA-directed scope increase. However, during our review, Orion program officials originally stated that this cost estimate assumes an Artemis-2 launch date of September 2022, which is 7 months earlier than the program’s agency baseline commitment date of April 2023 that forms the basis for commitments between NASA, the Congress, and Office of Management and Budget. Subsequently, during the review, program officials told us that its cost projections fund one of those 7 months. In either case, NASA’s current cost estimate for the Orion program is not complete because it does not account for costs that NASA would incur through April 2023. As of September 2019, the program was targeting October 2022 for the Artemis-2 launch. In June 2019, we recommended that the Orion program update its cost estimate to reflect its committed Artemis-2 baseline date of April 2023. In its response, NASA partially agreed with our recommendation. NASA stated that providing the estimate to the forecasted launch date— September 2022—rather than to the committed baseline date of April 2023 is the most appropriate approach. However, by developing cost estimates only to the program’s goals and not relative to the established baseline, the Orion program is not providing NASA or the Congress the means of measuring progress relative to the baseline. We continue to believe that NASA should fully implement this recommendation. Looking ahead, based on our review of the program’s most recent status reports, there is an emerging issue that may delay schedule further for the first mission. Namely, there is the risk of damage to the Orion capsule during travel to and from integrated testing at Plum Brook Station in Ohio. The program office is studying whether it will be able to safely transport the integrated crew and service modules via the Super Guppy airplane as planned or if it will have to use an alternate airplane. We will continue to monitor this effort. Beyond Artemis-1, the Orion program must also complete development efforts for future missions. For example, the Artemis-2 crew module will need environmental control and life support systems, system updates from Artemis-1, and updated software to run these new elements. EGS. At the time of our June 2019 report, the EGS program was expecting to have facilities and software ready by the planned June 2020 launch date. We found that the program had overcome many challenging development hurdles that led to previous schedule delays. These hurdles included completing and moving the Mobile Launcher—a platform that carries the rocket to the launch pad and includes a number of connection lines that provide SLS and Orion with power, communications, coolant, fuel, and stabilization prior to launch—into the Vehicle Assembly Building for the multi-element verification and validation processes. Since our June 2019 report, the program is now targeting an Artemis-1 launch date of August 2020. According to NASA officials, the delay is primarily driven by challenges encountered installing ground support equipment on the Mobile Launcher and developing software, and does not reflect the ongoing agency-wide schedule assessment. The program has operated within the costs established for the June 2020 launch date, $3.2 billion, but officials stated that NASA is reevaluating the program’s development cost performance and will establish an updated baseline when new leadership is in place. Moving forward, based on our review of the program’s most recent status reports, the program has to complete the multi-element verification and validation process for the Mobile Launcher and Vehicle Assembly Building and complete its two software development efforts. Additionally, the EGS program is responsible for the final integration of the three programs. NASA officials stated that the 6 to 12 months of risk to the June 2020 launch date includes risk associated with EGS completing this integration that includes test and checkout procedures after SLS and Orion components arrive. Officials explained that the EGS risk is based on a schedule risk analysis that considered factors such as historical pre- launch integrated test and check out delays and the learning curve associated with a new vehicle. As previously stated, our prior work has shown that the integration and test phase often reveals unforeseen challenges leading to cost growth and schedule delays. NASA is currently embarking on an aggressive goal to return humans to the lunar surface in 2024. To achieve this goal, NASA not only needs SLS, Orion, and EGS to have completed their first two test missions, but is also developing several new systems. These new systems include a Lunar Gateway that will orbit the moon, landers that will transport astronauts from the Gateway to the lunar surface, and new space suits. Human spaceflight projects face inherent technical, design, and integration risks because they are complex, specialized, and are pushing the state of the art in space technology. Moreover, these programs can be very costly and span many years, which means they may also face changes in direction from Administrations and the Congress. Meeting the 2024 goal will also be challenging given the effort needed to better manage SLS, Orion, and EGS, coupled with the addition of the new programs, which are likely to compete for management attention and resources. Nevertheless, our past work has identified a range of actions that NASA can take to better position its human spaceflight programs for success. Today I would like to highlight three lessons from the SLS, Orion, and EGS programs that NASA can apply to improve the management of its human spaceflight programs. Enhance Contract Management and Oversight to Improve Program Outcomes. Over the past several years, we and the NASA Office of the Inspector General have identified shortcomings related to NASA’s management and oversight of its human spaceflight contracts. These shortcomings have left NASA ill-positioned to identify early warning signs of impending schedule delays and cost growth, reap the potential benefits of competition, and achieve desired results through contractor incentives. In July 2014, we found that NASA allowed high-value modifications to the SLS contracts to remain undefinitized for extended periods—in one instance a modification remained undefinitized for 30 months. Undefinitized contract actions such as these authorize contractors to begin work before reaching a final agreement with the government on terms and conditions. We have previously found that while undefinitized contract actions may be necessary under certain circumstances, they are considered risky in part because the government may incur unnecessary costs if requirements change before the contract action is definitized. Because lack of agreement on terms of the modification prolonged NASA’s timeframes for definitizing, the establishment of contractor cost and schedule baselines necessary to monitor performance was delayed. Specifically, we found in July 2014 that, in most cases, the SLS program did not receive complete earned value management data derived from approved baselines on these SLS contracts. Earned value, or the planned cost of completed work and work in progress, can provide accurate assessments of project progress, produce early warning signs of impending schedule delays and cost overruns, and provide unbiased estimates of anticipated costs at completion. In July 2014, we also found the SLS program could be in a favorable position to compete contracts for the exploration upper stage, the upper stage engine, and advanced boosters that it expected to use on future variants of the launch vehicle. At that time, except for the RS- 25 engines, NASA’s contracting approach for the SLS program did not commit the program beyond the hardware needed for the second mission, and we found that moving forward the agency would be in a position to take advantage of the evolving launch vehicle market. We found that an updated assessment of the launch vehicle market could better position NASA to sustain competition, control costs, and better inform the Congress about the long-term affordability of the program. We recommended that before finalizing acquisition plans for future capability variants, NASA should assess the full range of competition opportunities and provide to the Congress the agency’s assessment of the extent to which development and production of future elements of the SLS could be competitively procured. NASA agreed with the recommendation, which we have identified as among those that warrant priority attention. Since we made that recommendation, NASA has awarded a sole- source contract for the upper stage engine and agency officials told us in July 2018 that they planned to incorporate additional booster development under the existing contract. This further limits an opportunity for competition for the program. Our body of work on contracting has shown that competition in contracting is a key element for achieving the best return on investment for taxpayers. We have found that promoting competition increases the potential for acquiring quality goods and services at a lower price and that noncompetitive contracts carry the risk of overspending because, among other reasons, they have been negotiated without the benefit of competition to help establish pricing. In July 2016, we found that the lack of earned value management data for the SLS Boeing core stage contract persisted. Without this information, some 4.5 years after contract award, the program continued to be in a poor position to understand the extent to which technical challenges with the core stage were having schedule implications or the extent to which they may have required reaching into the program’s cost reserves. In October 2018, the NASA Office of Inspector General reported that NASA does not require Boeing to report detailed information on development costs for the two core stages and exploration upper stage, making it difficult for the agency to determine if the contractor is meeting cost and schedule commitments for each deliverable. The NASA Office of Inspector General found that given the cost-reporting structure, the agency is unable to determine the cost of a single core stage. Internally, Boeing tracks all individual costs but submits a combined statement of labor hours and material costs through the one contract line item for all its development activities. NASA approximates costs based on numerous monthly and quarterly reviews with the contractor to track the progress of each individual deliverable. The NASA Office of Inspector General made a number of recommendations aimed at improving reporting relative to the core stage contract. Among these was a specific recommendation to separate each deliverable into its own contract line item number for tracking performance, cost, and award fees. NASA concurred with this recommendation and is currently renegotiating the core stage contract with Boeing. In June 2019, we found that NASA’s approach to incentivizing Boeing for the SLS stages and Lockheed Martin for the Orion crew spacecraft have not always achieved overall desired program outcomes. NASA paid over $200 million in award fees from 2014-2018 related to contractor performance on the SLS stages and Orion spacecraft contracts, but the programs continue to fall behind schedule and incur cost overruns. For example, in its December 2018 award fee letter to Boeing in which the contractor earned over $17 million in award fees, NASA’s fee determination official noted that the significant schedule delays on this contract have caused NASA to restructure the flight manifest for SLS. For the Lockheed Martin Orion contract, the contractor earned over $29 million for the award fee period ending April 2017. NASA noted that Lockheed Martin was not able to maintain its schedule for the crew service module and that the contractor’s schedule performance had decreased significantly over the previous year. In June 2019, we reported that our past work shows that when incentive contracts are properly structured, the contractor has profit motive to keep costs low, deliver a product on time, and make decisions that help ensure the quality of the product. Our prior work also shows, however, that incentives are not always effective tools for achieving desired acquisition outcomes. We have found that, in some cases, there are significant disconnects between contractor performance for which the contractor was awarded the majority of award fees possible without achieving desired program results. Additionally, we have found that some agencies did not have methods, data, or performance measures to evaluate the effectiveness of award fees. As part of our June 2019 report, we recommended that NASA direct the SLS and Orion programs to reevaluate their strategies for incentivizing contractors and determine whether they could more effectively incentivize contractors to achieve the outcomes intended as part of ongoing and planned contract negotiations. NASA agreed with the intent of this recommendation and stated that the SLS and Orion program offices reevaluate their strategies for incentivizing contract performance as part of contracting activities including contract restructures, contract baseline adjustments, and new contract actions. We will continue to follow-up on the actions the agency is taking to address this recommendation after its ongoing contract negotiations are complete. Minimize Risky Programmatic Decisions to Better Position Programs for Successful Execution. Through our reviews of NASA’s human spaceflight programs, we have found that NASA leadership has approved programmatic decisions that compound technical challenges. These decisions include approving cost and schedule baselines that do not follow best practices, establishing insufficient cost and schedule reserves, and operating under aggressive schedules. As a result, these programs have been at risk of cost growth and schedule delays since NASA approved their baselines. In July 2015, we found that NASA generally followed best practices in preparing the SLS cost and schedule baseline estimates for the limited portion of the program life cycle covered through launch readiness for the first test flight of SLS. However, we could not deem the cost estimate fully reliable because it did not fully meet the credibility best practice. While an independent NASA office reviewed the cost estimate developed by the program and as a result the program made some adjustments, officials did not commission the development of a separate independent cost estimate to compare to the program cost estimate to identify areas of discrepancy or difference. In addition, the program did not cross-check its cost estimate using an alternative methodology. The purpose of developing a separate independent cost estimate and cross-checking the estimate is to test the program’s cost estimate for reasonableness and, ultimately, to validate the cost estimate. In July 2016, we found that the Orion program’s cost and schedule estimates were not reliable based on best practices for producing high-quality estimates. For example, the cost estimate lacked necessary support and the schedule estimate did not include the level of detail required for high-quality estimates. Therefore, we recommended that NASA perform an updated joint cost and schedule confidence level analysis including updating cost and schedule estimates in adherence with cost and schedule estimating best practices, which we have identified as among those recommendations that warrant priority. NASA officials have stated that they have no plans to implement our recommendation. In commenting on the July 2016 report, NASA stated that the agency reviewed, in detail, the Orion integrated cost/schedule and risk analysis methodology and determined the rigor to be a sufficient basis for the agency commitments. However, without sound cost and schedule estimates, decision makers do not have a clear understanding of the cost and schedule risk inherent in the program or important information needed to make programmatic decisions. We continue to believe that NASA should fully implement our recommendation. In our 2017 High-Risk Report, we highlighted concerns that all three programs—SLS, Orion, and EGS—were operating with limited cost reserves, limiting each program’s ability to address risks and unforeseen technical challenges. For example, we found in July 2016 that the Orion program was planning to maintain low levels of cost reserves until later in the program. The lack of cost reserves at that time had caused the program to defer work to address technical issues to stay within budget. Also in our 2017 High-Risk Report, we highlighted concerns regarding each program managing to an aggressive internal NASA launch readiness date. This approach creates an environment for programs to make decisions based on reduced knowledge to meet a date that is not realistic. For example, the EGS program had consolidated future schedule activities to prepare the Mobile Launcher—the vehicle used to bring SLS to the launch pad—to meet its internal goal. The program acknowledged that consolidating activities—which included conducting verification and validation concurrent with installation activities—increased risk because of uncertainties about how systems not yet installed may affect the systems already installed. Officials added, however, that this concurrency is necessary to meet the internal schedule. Subsequently, as discussed above, NASA delayed its committed launch readiness date. Improve Transparency into Costs for Long-term Plans. As we previously reported, a key best practice for development efforts is that requirements need to be matched to resources (for example, time, money, and people) at program start. In the past, we have found that NASA programs, including the Constellation Program, did not have sufficient funding to match demanding requirements. Funding gaps can cause programs to delay or delete important activities and thereby increase risks. In addition, since May 2014, we have found there has been a lack of transparency into the long-term costs of these human spaceflight programs. As discussed above, the EGS and SLS programs do not have a cost and schedule baseline that covers activities beyond the first planned flight. In addition, as previously noted, the Orion program does not have a baseline beyond the second planned flight. As a result, NASA is now committing to spend billions of taxpayer dollars for missions that do not have a cost and schedule baseline against which to assess progress. To that end, we have made recommendations in the past on the need for NASA to baseline these programs’ costs for capabilities beyond the first mission; however, a significant amount of time has passed without NASA taking steps to fully implement these recommendations. Specifically, among those recommendations that we have identified as warranting priority attention, in May 2014, we recommended that, to provide Congress with the necessary insight into program affordability, ensure its ability to effectively monitor total program costs and execution, and to facilitate investment decisions, NASA should: Establish a separate cost and schedule baseline for work required to support the SLS for the second mission and report this information to the Congress through NASA’s annual budget submission. If NASA decides to fly the SLS configuration used in the second mission beyond that mission, we recommended that it establish separate life cycle cost and schedule baseline estimates for those efforts, to include funding for operations and sustainment, and report this information annually to Congress via the agency’s budget submission. Establish separate cost and schedule baselines for each additional capability that encompass all life cycle costs, to include operations and sustainment. This is important because NASA intends to use the increased capabilities of the SLS, Orion, and EGS well into the future. As part of the latter recommendation, we stated that, when NASA could not fully specify costs due to lack of well-defined missions or flight manifests, the agency instead should forecast a cost estimate range— including life cycle costs—having minimum and maximum boundaries and report these baselines or ranges annually to Congress via the agency’s budget submission. In its comments on our 2014 report, NASA partially concurred with these two recommendations, noting that much of what it had already done or expected to do would address them. For example, the agency stated that establishing the three programs as separate efforts with individual cost and schedule commitments met the intent of our recommendation. NASA also stated that its plans to track and report development, operations, and sustainment costs in its budget to Congress as the capabilities evolved would also meet the intent of the recommendation. In our response, we stated that while NASA’s prior establishment of three separate programs lends some insight into expected costs and schedule at the broader program level, it does not meet the intent of the two recommendations because cost and schedule identified at that level is unlikely to provide the detail necessary to monitor the progress of each block against a baseline. Further, we stated that reporting the costs via the budget process alone will not provide information about potential costs over the long term because budget requests neither offer all the same information as life-cycle cost estimates nor serve the same purpose. Life-cycle cost estimates establish a full accounting of all program costs for planning, procurement, operations and maintenance, and disposal and provide a long-term means to measure progress over a program’s life span. We continue to believe that NASA should fully implement these recommendations. As NASA considers these lessons, it is important that the programs place a high priority on quality, for example, holding suppliers accountable to deliver high-quality parts for their products through such activities as regular supplier audits and performance evaluations of quality and delivery. As we found in June 2019, both the SLS and Orion programs have struggled at times with the quality of parts and components. For example, the Orion contractor has had a number of issues with subcontractor-supplied avionics system components failing during testing that have required time to address. NASA has highlighted concerns over the contractor’s ability to manage its subcontractors and the resulting significant cost, schedule, and technical risk impacts to the program. And the SLS program faced setbacks after its contractor did not verify the processes that its vendors were using to clean the fuel lines, resulting in delays to resolve residue and debris issues. Chairwoman Horn, Ranking Member Babin, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any question that you may have at this time. If you or your staff have any questions about this testimony, please contact Cristina T. Chaplain, Director, Contracting and National Security Acquisitions at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this statement include Molly Traci, Assistant Director; John Warren; Sylvia Schatz; Ryan Stott; and Chad Johnson. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "NASA is undertaking a trio of closely related programs to continue human space exploration beyond low-Earth orbit. These three programs include a launch vehicle, a crew capsule, and the associated ground systems at Kennedy Space Center. All three programs are working towards a launch readiness date of June 2020 for the first mission. NASA then plans for these systems to support future human space exploration goals, which include seeking to land two astronauts on the lunar surface. GAO has a body of work highlighting concerns over NASA's management and oversight of these programs. This statement discusses (1) the cost and schedule status of NASA's human spaceflight programs and (2) lessons that NASA can apply to improve its management of its human spaceflight programs. This statement is based on eight reports issued from 2014 to 2019 and selected updates as of September 2019. For the updates, GAO analyzed recent program status reports on program progress. The National Aeronautics and Space Administration's (NASA) three related human spaceflight programs are in the integration and test phase of development, a phase of the acquisition process that often reveals unforeseen challenges leading to cost growth and schedule delays. Since GAO last reported on the status of these programs in June 2019, each program has made progress. For example, the Orion program conducted a key test to demonstrate the ability to abort a mission should a life-threatening failure occur during launch. As GAO found in June 2019, however, the programs continue to face significant schedule delays. In November 2018, within one year of announcing an up to 19-month delay for the three programs—the Space Launch System (SLS) vehicle, the Orion crew spacecraft, and Exploration Ground Systems (EGS)—NASA senior leaders acknowledged the revised launch date of June 2020 is unlikely. In addition, any issues uncovered during integration and testing may push the date as late as June 2021. Moreover, GAO found that NASA's calculations of cost growth for the SLS program is understated by more than 750 million dollars. GAO's past work has identified a number of lessons that NASA can apply to improve its management of its human spaceflight programs. For example, NASA should enhance contract management and oversight to improve program outcomes. NASA's past approach in this area has left it ill-positioned to identify early warning signs of impending schedule delays and cost growth or reap the benefits of competition. In addition, NASA's approach to incentivizing contractors through contract award fees did not result in desired outcomes for the SLS and Orion programs. Further, NASA should minimize risky programmatic decisions to better position programs for successful execution. This includes providing sufficient cost and schedule reserves to, among other things, address unforseen risk. Finally, realistic cost estimates and assessments of technical risk are particularly important at the start of an acquisition program. But NASA has historically provided little insight into the future cost of these human spaceflight programs, limiting the information useful to decision makers. GAO has made 19 recommendations in these eight prior reports to strengthen NASA's acquisition management of SLS, Orion, and EGS. NASA generally agreed with GAO's recommendations, and has implemented seven recommendations. Further action is needed to fully implement the remaining recommendations.", "document_type": "gao"}
{"report": "According to USDA, beginning with NSLP’s authorization in 1946, the federal government has gradually built an array of nutrition assistance programs designed to help the most vulnerable populations meet their food needs. Currently, eight of USDA’s nutrition assistance programs are targeted to providing food to children, as noted in table 1. USDA oversees the child nutrition programs at the federal level, and state agencies and local organizations play key roles in program administration and implementation. The Improper Payments Information Act of 2002 (IPIA), as amended, requires agencies to estimate improper payments for programs and activities identified as being susceptible to significant improper payments, implement corrective actions, and report on their results for these programs, among other things. An improper payment is any payment that should not have been made or that was made in an incorrect amount (including overpayments and underpayments) under statutory, contractual, administrative, or other legally applicable requirements. It includes any payment to an ineligible recipient, any payment for an ineligible good or service, any duplicate payment, any payment for a good or service not received (except for such payments where authorized by law), and any payment that does not account for credit for applicable discounts. Reducing improper payments—such as payments to ineligible recipients or duplicate payments—is critical to safeguarding federal funds. The Office of Management and Budget (OMB) provides guidance to federal agencies on effectively measuring, reporting, and reducing their improper payment rates. USDA reports annual improper payment estimates for four child nutrition programs: the school meals programs—NSLP and SBP—as well as WIC, and CACFP. IPIA, as amended, requires agencies to review all programs and activities at least once every 3 years and identify those that may be susceptible to significant improper payments. Federal law also requires agencies’ Inspectors General to annually assess and report on whether agencies complied with six criteria listed in the Improper Payments Elimination and Recovery Act of 2010 (IPERA), as amended, related to improper payments. These criteria are (1) publish an agency financial statement in the form required by OMB guidance; (2) conduct program- specific improper payment risk assessments, if required; (3) publish improper payment estimates, if required; (4) publish corrective action plans for programs and activities deemed susceptible to significant improper payments; (5) publish and meet annual improper payment reduction targets; and (6) report an improper payment rate of less than 10 percent for each program and activity for which an improper payment estimate was published. Federal law requires agencies with 3 or more consecutive years of noncompliance findings by their Inspectors General to submit to Congress a reauthorization proposal or a proposal for statutory changes necessary to bring programs into compliance. FNS has taken various actions to improve the integrity of the child nutrition programs in response to findings from our prior work. Over the last 6 years, we issued five reports on the school meals programs, WIC, and SFSP, which included recommendations to FNS intended to improve the integrity of these programs. In response, FNS has addressed many of these recommendations, though additional actions are needed. In 2014, we issued two reports on school meals that found multiple opportunities for FNS to improve school meals program integrity and oversight, all of which FNS has since acted on. Specifically, in January 2014, we recommended that FNS take two different actions aimed at providing assistance to improve state oversight of local school food authority (SFA) administration of the programs; and in May 2014, we recommended that FNS take multiple actions to improve oversight and enhance verification processes that ensure only children who meet income requirements receive free and reduced price school meals. In January 2014, we reported that FNS had provided a significant amount of guidance and training to help states with oversight of local SFAs that directly provide meals to children in schools, but that certain aspects of the guidance may have hindered state oversight of program compliance. (See fig. 1 for entities involved in school meals oversight.) For example, we found evidence indicating that FNS’s guidance allowing states to focus their oversight on providing technical assistance to SFAs, rather than documenting instances of noncompliance and requiring corrective actions to address them, may have resulted in some SFAs that were not fully meeting requirements being certified as in compliance. According to Standards for Internal Control in the Federal Government, federal agencies should have policies and practices in place to provide reasonable assurance that programs are operating in compliance with applicable laws and regulations. Without documentation of noncompliance and requirements for corrective actions, SFAs may not have adequate information on the types of ongoing compliance issues and the need to take corrective actions. Further, FNS may lack information on areas that are problematic across SFAs, which could be the focus of future technical assistance efforts. In 2014, FNS substantially revised and updated the process through which states conduct program oversight—the administrative review—and in our January report, we also found that states reported a need for more information and training related to monitoring SFA financial management. Specifically, we reported that, previously, states had not been required to assess SFA financial management during monitoring reviews, but that states were now responsible for reviewing several aspects of SFA financial management, such as their nonprofit food service accounts and indirect costs. We surveyed all of the states, and over three-fourths reported the need for additional guidance or training from FNS on SFA financial management. We found that while FNS had provided some assistance to states on the new requirements related to SFA financial management, FNS officials had not collected information from all states on their needs in this area. Because state reviews are the key tool used to ensure the integrity of the school meals programs, if state reviewers are unable to effectively review SFA financial management, the federal government will lack assurance that SFAs are complying with federal requirements in this area. In our January 2014 report, we recommended that the Secretary of Agriculture direct the Administrator of FNS to (1) clarify to states the importance of documenting compliance issues found during administrative reviews and requiring corrective actions to address them, and (2) assess all states’ needs for information to improve their ability to oversee SFA financial management and provide assistance to meet identified needs. FNS officials generally agreed with our recommendations and have since addressed them. For example, FNS issued a memo on July 11, 2014, to all regional and state directors reiterating the importance of documenting review findings and any resulting technical assistance and corrective actions. Also in that month, FNS completed its initial efforts to systematically assess all states’ needs for information to improve their ability to oversee SFA financial management. Further, in 2015 and 2016, FNS discussed financial management issues with states during a national meeting and held three national training sessions and a webinar focused on reviewing SFA financial management. In our May 2014 report on school meals, we found that FNS had taken steps to help identify and prevent children ineligible for free or reduced price meals from receiving those benefits, but additional opportunities existed to enhance the application verification process and strengthen program integrity. For example, we reported that school districts are required to verify applications for free and reduced price meals if they are deemed to be questionable, known as for-cause verification. Some school districts were not conducting any for-cause verifications and FNS guidance did not provide indicators or describe scenarios that could assist school districts in identifying questionable applications. Further, FNS’s data on the outcomes of applications verified for cause were combined with data on the outcomes of applications verified for other reasons, limiting FNS’s ability to use these data to assess the effectiveness of for- cause verifications. Standards for Internal Control in the Federal Government direct agencies to design control activities to ensure management’s directives are carried out. Without FNS analysis of data on the outcomes of for-cause verifications, or provision of additional guidance on applications that may merit for-cause verification, some school districts may have continued to overlook these applications, potentially hindering program integrity. In our May 2014 report, we recommended that the Secretary of Agriculture take multiple actions to improve integrity of the school meals programs through additional verification of applications, including that USDA evaluate the data collected on for-cause verification outcomes, and, if appropriate, provide additional guidance for conducting for-cause verification that includes possible indicators of questionable or ineligible applications. FNS took actions in response to all of our recommendations. For example, FNS reported in March 2017 that it analyzed the data on verification outcomes and did not find that any benefit in integrity and oversight would be gained by requiring the reporting of for-cause verification outcomes separately. However, FNS also reported that it disseminated additional guidance in August 2014 for conducting for-cause verifications, which included criteria for identifying possible indicators of questionable or ineligible applications. In 2013 and 2014, we issued two reports on WIC that found multiple opportunities for FNS to improve program integrity and oversight, many of which FNS has since addressed. Specifically, in February 2013, we recommended that FNS review federal monitoring reports on state WIC program administration to assess program risks at a national level, and in December 2014, we recommended that FNS take multiple actions to improve federal WIC oversight and assist states’ efforts to prevent and address online sales of WIC formula. In our February 2013 report, we found that FNS regularly assisted and monitored states’ administration of WIC but needed to improve agency oversight of states’ policies and procedures for determining WIC applicants’ income eligibility for the program. We reported that while federal regulations define criteria that must be used to determine applicants’ income eligibility for WIC, state and local agencies are also given some discretion. We found that FNS generally had not focused its assistance to states on key income eligibility requirements for which states have discretion, such as determination of family size and the time period of income assessed, in the years preceding our report. However, through its monitoring reports, FNS had identified problems with, or concerns about, income eligibility determination policies or procedures in one-third of the states reviewed. Standards for Internal Control in the Federal Government indicate that management should identify, analyze, and respond to risks related to achieving defined objectives and note that risk identification methods may include consideration of deficiencies identified through audits and other assessments. At the time of our review, FNS officials said that they planned to begin regularly reviewing monitoring findings at the national level to identify areas of program risk and target assistance to states accordingly; however, officials did not indicate when those reviews would begin. Without conducting a complete review of its state monitoring findings, FNS lacked information it could potentially use to target additional assistance and clarification on income eligibility determination to states and help ensure overall program integrity. In our February 2013 report, we recommended that the Secretary of Agriculture direct FNS to develop a timeline for reviewing its federal monitoring reports on state WIC program administration to assess program risks at a national level and target assistance to states. FNS officials concurred with our recommendation, and FNS has since addressed it. Specifically, in that year, FNS staff developed a process to use an automated report to identify areas in need of correction or improvement that were found during its monitoring reviews of WIC conducted across the country. The report went into production on November 1, 2013, and FNS reported that staff would review the reports quarterly to assess the frequency of findings in each policy and program area and respond by providing policy clarification, training, or other corrective actions to states. A posting from late June 2014 included the container size in the title and stated: “I am looking to sell 5 [brand name] 12.5oz cans (NOT OPENED) because is super picky and does not want to drink it no matter what i do. will drink the kind for some reason. I told my WIC office to switch me to another brand but they say it might take 3 months. Im asking 35$ but best offer will do since the brand I buy is from so Im not looking to make a profit here if you consider each can is 16$ at the store. please text if interested!! A posting from early July 2014 included the brand, type, and container size in the title and stated: “I have 7 powder cans of they dnt expire for another year at least just got them from my wic n we ended up switching formulas so its $65.oo for pick up all 7 cans or $70 if i have to drive.” In December 2014, we reviewed the online sale of infant formula provided to WIC participants, a practice prohibited by WIC program rules, and concluded that FNS had provided limited assistance to states in preventing and addressing these sales. We found that FNS had not conducted any nationwide studies on the extent of online sales of WIC formula by program participants, though information gathered from state WIC officials and our own limited monitoring suggested that some WIC formula was offered for sale online. (See sidebar.) The use of the internet as a marketplace had substantially increased in the years preceding our report; therefore, actions needed to ensure WIC participants did not inappropriately use infant formula had changed as well. Yet, we found that FNS had not studied cost-effective techniques for monitoring potential online sales of WIC benefits. Standards for Internal Control in the Federal Government note that agencies should identify, analyze, and respond to significant changes that could impact the internal control system. However, FNS had not directed states to inform participants that selling WIC formula, including online, is against program rules, which could lead to participants making these sales and unknowingly using program resources inappropriately. Further, we noted that although states are responsible for controlling participant violations— including sales of WIC benefits—FNS is responsible for determining compliance with the WIC statute and regulations. However, we reported that FNS had not required states to describe procedures for controlling these violations in their WIC state plans, leaving the agency without assurance that efforts were taking place nationwide. Through interviews with state and local WIC agency officials from 12 states for our December 2014 report, we found that states varied in their approaches and the amount of resources devoted to monitoring attempted WIC formula sales, and some expressed concerns about the return on investment for these efforts. Because WIC participants purchase the same brands and types of infant formula from stores as non-WIC customers, monitoring attempted online sales of WIC formula can present a challenge. State officials we spoke with cited additional challenges to monitoring online sales, including the difficulty of identifying WIC participants in online posts that allow sellers to remain relatively anonymous, and as a result, some expressed concerns about the return on investment for these monitoring efforts. Standards for Internal Control in the Federal Government suggest that agencies consider both benefits and costs when designing and implementing internal controls. However, because FNS had not assessed the nationwide extent of online sales of WIC formula by program participants, nor determined cost-effective approaches for identifying and addressing these sales, FNS and the states were poorly positioned to strike the appropriate balance of costs and benefits when determining how to target their resources to ensure program integrity. In our December 2014 report, we recommended that the Secretary of Agriculture direct the Administrator of FNS to (1) instruct states to inform participants that they are not allowed to sell WIC food benefits, including online; (2) require states to inform FNS of their procedures for identifying attempted sales of WIC food benefits and analyze the information to ascertain the national extent of state efforts; and (3) collect information to help assess the national extent of attempted online sales of WIC formula and determine cost-effective techniques states can use to monitor online classified advertisements. FNS agreed with our recommendations and took several steps to address them, though the agency has yet to fully address the third. Specifically, FNS promulgated final regulations that were effective in May 2016 requiring state agencies to inform applicants and participants about the prohibition against the sale of WIC food benefits, including online. Further, in April 2015, FNS issued guidance directing states to articulate their policies and procedures for identifying and monitoring online sales of WIC benefits in their state plans; and in July 2018, an FNS contractor completed a study analyzing state efforts in this area. Also in that month, an FNS contractor completed a study intended to provide information to help FNS address our third recommendation that the agency assess the prevalence of online sales of WIC formula and identify cost-effective techniques states can use to monitor and prevent them. However, FNS indicated that it would not be releasing the study to states, in part because it included information that was investigative in nature. In April 2019, FNS officials indicated that they are currently developing guidance on best practices and cost-effective techniques identified in the report to disseminate to WIC state agencies later in 2019. Informing states of cost-effective techniques for monitoring and preventing online WIC formula sales would address our recommendation. In May 2018, we reviewed the SFSP, which generally provides food to children in low-income areas during periods when schools are closed for vacation, and assessed several aspects of the program, including participation. (See fig. 2 for an SFSP breakfast we observed during a site visit to one of three states we visited.) We found that nationwide, the total number of meals served to children in low-income areas through the SFSP increased from 113 to 149 million (about 32 percent) from fiscal year 2007 through 2016. FNS directs states to use the number of meals served, along with other data, to estimate the number of children participating in the SFSP. However, we found that participation estimates had been calculated inconsistently from state to state and year to year. Recognizing this issue, in 2017, FNS clarified its instructions for calculating participation estimates to help improve their consistency, noting that these estimates are critical for informing program implementation and strategic planning. However, we determined that the method FNS directed states to use would continue to provide unreliable estimates of participation, hindering the agency’s ability to use them for these purposes. Standards for Internal Control in the Federal Government state that agencies should maintain quality data and process it into quality information that is shared with stakeholders to help achieve agency goals. In our May report, we made four recommendations to FNS to improve the integrity of the SFSP, including that FNS take steps to improve its estimate of children’s participation in the SFSP by addressing, at a minimum, identified issues that continued to limit the reliability of the estimate. FNS officials generally agreed with our recommendations, and the agency has since provided information on actions it has planned, or begun to take, to address them. For example, in March 2019, FNS reported that it plans to complete an evaluation of how SFSP participation is calculated by summer 2020. We will continue to monitor FNS’s progress in addressing our SFSP recommendations. In fiscal year 2018, USDA reported improper payments for the child nutrition programs totaling an estimated $1.8 billion, or just over 1 percent of the $151 billion in improper payments federal agencies estimated government-wide in that year. GAO has reported improper payments as a material weakness in internal control in its reports on the U.S. government’s consolidated financial statements, noting that improper payments have consistently been a government-wide issue and reducing these payments is critical to safeguarding federal funds. Since fiscal year 2013, the school meals programs have consistently reported the highest improper payment rate estimates across the child nutrition programs. For example, in recent years, USDA reported annual improper payment rate estimates of about 15 percent and 24 percent for the NSLP and SBP, respectively, compared to about 5 percent and 1 percent for WIC and CACFP, respectively. The estimated total amount of improper payments in the school meals programs are also high, and these programs, along with WIC, are included on OMB’s list of programs with over $100 million in annual monetary losses. The USDA Office of Inspector General’s (OIG) most recent report on the department’s compliance with improper payment requirements, which assessed fiscal year 2017, found that the four child nutrition programs for which USDA estimates improper payments were noncompliant with improper payment requirements. The reasons for noncompliance varied, as the OIG noted that USDA has yet to develop a methodology to report a complete improper payment estimate for CACFP, and corrective actions taken in the other child nutrition programs have not yielded the desired reductions in estimated improper payments. According to our 2018 report, the four child nutrition programs contributed to the government-wide total of 58 programs in 14 federal agencies that agency inspectors general found were noncompliant with improper payment requirements in fiscal year 2017. Further, the four child nutrition programs had been reported as noncompliant for 7 years. We also noted that USDA was one of three federal agencies with programs reported as noncompliant for 3 or more consecutive years that had not notified Congress of their noncompliance, as required, despite prior recommendations that we, and the OIG, had made to USDA to do so. However, USDA submitted a letter to Congress in June 2018 that reported these programs’ noncompliance and described the agency’s planned actions to bring them into compliance. Over time, USDA has undertaken a variety of corrective actions aimed at reducing improper payments in the child nutrition programs, yet the estimated improper payment rates for these programs remained generally steady until fiscal year 2018. For that year, USDA changed what it considers to be an improper payment in the school meals programs, resulting in improper payment estimates that are substantially lower than, and not comparable to, those from prior years. According to USDA, FNS made this change after evaluating its definition of improper payments for the school meals programs and determining that the agency would no longer include a previously identified source of error in its estimates. According to FNS officials, FNS implemented this change after consultation with OMB, and FNS also briefed the USDA OIG on the change in advance of implementation. The USDA OIG has not yet released its report assessing USDA’s fiscal year 2018 compliance with improper payment requirements. To help ensure that annual estimates are produced for all child nutrition programs susceptible to significant improper payments, a 2018 USDA OIG report recommended that FNS complete an SFSP risk assessment for improper payments taking into account all of the risk factors identified by OMB as likely to contribute to improper payments. Although FNS’s 2017 SFSP risk assessment concluded that the program was at low risk for significant improper payments, the OIG found that FNS’s assessment was insufficient because it did not consider multiple risk factors regarding program vulnerabilities and improper payments that OMB requires be taken into account. The OIG reviewed SFSP’s payment structure, monitoring results, and investigations and media cases regarding fraud, and found that these suggest the program is vulnerable to significant improper payments. FNS concurred with the OIG’s recommendation. In April 2019, a senior FNS official indicated that the agency completed a risk assessment for SFSP in response to the OIG’s recommendation, determined that the program is at a high risk of improper payments, and is currently developing a methodology for measuring improper payments in the program. Chairman Roberts, Ranking Member Stabenow, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Kathryn A. Larin, Director, Education, Workforce, and Income Security Issues at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Rachel Frisk (Assistant Director) and Theresa Lo (Analyst in Charge). In addition, key support was provided by David Barish, Daniel Flavin, Alex Galuten, Sheila R. McCoy, Jean McSween, Almeta Spencer, and Matt Valenta. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In fiscal year 2018, the federal government provided about $30 billion for USDA's child nutrition programs, including the school meals programs, WIC, and SFSP, among others. In that year, the federal government spent almost $14 billion on the largest of these programs, the National School Lunch Program, which supported the provision of meals to about 30 million children. Federal, state, and local entities play important roles in administering the child nutrition programs and ensuring program integrity. For example, USDA annually estimates improper payments in these programs, which are an indicator of program integrity, and states monitor implementation of the programs by local organizations that directly provide food and services to participants. This testimony discusses (1) actions USDA has taken to address GAO's prior recommendations related to program integrity in the child nutrition programs and (2) improper payments in these programs. This testimony is based on prior GAO reports on child nutrition programs issued from 2013 through 2018, recent GAO and USDA reports on improper payments, and updates GAO obtained in March and April 2019 from USDA officials on actions related to GAO's prior recommendations and improper payments in child nutrition programs. The U.S. Department of Agriculture (USDA) has taken steps, or is planning steps, to improve the integrity of the child nutrition programs in response to recommendations from GAO's prior work. For example: School meals. In 2014, GAO identified several opportunities for USDA to improve school meals oversight and integrity. For example, through GAO's survey of states, over three-fourths reported a need for USDA guidance on monitoring the financial management of local entities that provide meals to children in schools—an area we reported states were newly required to review. GAO recommended that USDA assess states' needs for information in this area. USDA did this assessment and provided related guidance and training to states. Special Supplemental Nutrition Program for Women, Infants, and Children (WIC). In 2013 and 2014, GAO identified several ways that USDA could improve program integrity and oversight in WIC, which provides food benefits to individuals who are low-income. For example, GAO found that USDA had not used its own monitoring findings on state policies for determining applicants' income eligibility to target assistance to states, and recommended that USDA do so. In response, USDA developed a process for reviewing and acting on its monitoring results. Summer Food Service Program (SFSP). In 2018, GAO identified several opportunities for USDA to improve program integrity in the SFSP, which provides food to children in low-income areas when schools are closed for vacation. For example, GAO found that USDA did not collect reliable data on children's participation in the program and that estimates were calculated inconsistently from state to state and from year to year. GAO recommended that USDA take steps to improve the reliability of these estimates and take additional actions to improve program integrity. USDA recently reported plans to address GAO's recommendations. USDA reported improper payments for four child nutrition programs totaling an estimated $1.8 billion in fiscal year 2018, or just over 1 percent of the $151 billion in improper payments that agencies estimated government-wide. GAO has reported that reducing improper payments—which generally include payments that should not have been made or were made in an incorrect amount—is critical to safeguarding federal funds. Since fiscal year 2013, the school meals programs have consistently reported the highest improper payment rates across the child nutrition programs. Over time, USDA has taken a variety of corrective actions aimed at reducing improper payments in child nutrition programs, yet estimated improper payment rates for these programs remained generally steady until fiscal year 2018. For that year, USDA changed what it considers to be an improper payment in the school meals programs, resulting in improper payment estimates that are substantially lower than those from prior years. The Office of Management and Budget (OMB) provides guidance to federal agencies on measuring and reporting improper payment rates, and USDA reported that it made this change after consultation with OMB. GAO made 14 recommendations to USDA in its prior reports on child nutrition. USDA generally concurred with the recommendations and has addressed nine, taken some steps to address one, and is planning to address the remaining four.", "document_type": "gao"}
{"report": "CBP’s Office of Field Operations (OFO) is responsible for inspecting pedestrians, passengers, and cargo at 110 land POEs, which have a combined total of 173 crossings (see figure 1). OFO has 20 field offices nationwide that oversee the operations of all POEs within their designated areas of responsibility. Travelers seeking entry to the United States through a land POE are required to present valid travel documents. In response to a recommendation from the 9/11 Commission and the Intelligence Reform and Terrorism Prevention Act of 2004, DHS and the Department of State implemented the Western Hemisphere Travel Initiative, which requires all travelers to present documents that denote identity and citizenship, such as a passport, when entering the United States. Foreign nationals may have particular travel document requirements, such as a visa or other entry permit, which vary based on such factors as nationality and the purpose of travel. See table 1 for examples of the types of acceptable documents for travelers coming into the United States through land POEs. There are also documentary requirements for commercial vehicles with cargo seeking entry into the United States. The Trade Act of 2002, as amended, establishes requirements for commercial vehicles with cargo to electronically submit information to CBP at least 1 hour in advance of arrival at a land POE. The information required includes data on the vehicle (e.g., Vehicle Identification Number or license plate number), the shipper, the carrier, scheduled date and time of arrival, and the description and weight of the cargo, among other things. Commercial vehicles with cargo valued less than $2,500 are considered “informal entries” that are exempt from the advance cargo information reporting requirements. CBP inspects travelers and cargo seeking to enter the country through land POEs. These inspections involve a targeting process in which CBP uses law enforcement databases to identify and target higher-risk passengers, pedestrians, commercial vehicles, and cargo before arrival at a land POE. Targeting. CBP uses law enforcement, intelligence, and other enforcement data to identify higher-risk individuals, vehicles, or cargo for additional scrutiny upon their arrival at a land POE. Most cargo-carrying commercial vehicles must submit an electronic manifest (e-manifest) with information on the shipment to CBP at least 1 hour in advance of arrival at a land POE. CBP personnel at the POEs are to use the e-manifest and CBP’s Automated Targeting System to identify high-risk inbound cargo. The Automated Targeting System is a decision support tool that compares traveler, cargo, and conveyance information against law enforcement, intelligence, and other enforcement data using risk-based targeting scenarios and assessments. It draws on many law enforcement, intelligence, and other enforcement databases, including the Terrorist Screening Database, the Department of Justice’s National Crime Information Center, the Social Security Administration Death Master File, and the National Insurance Crime Bureau’s private database of stolen vehicles. CBP policy requires that high-risk cargo be targeted for additional research and analysis and generally will also require the high- risk cargo to undergo a secondary examination once it arrives at the POE. In addition, CBP personnel at the POEs or field offices may review seizure and arrest reports, and other law enforcement information to identify individuals or vehicles that have associations with known criminals and place a “lookout” on them in TECS, CBP’s system for processing travelers. TECS will flag travelers with lookouts for additional inspection if they arrive at the land POE. CBP personnel at the POEs or field offices may also use this information to develop products on recent trends that can help inform inspections. Once passengers, pedestrians, and commercial vehicles arrive at a land POE, CBP has various processes for inspecting them, including preprimary, primary, and secondary inspections, as explained below (see figure 2). Preprimary. In the preprimary area, both commercial vehicles and passenger vehicles will generally pass through radiation portal monitors that are designed to detect radiation and help prevent the smuggling of nuclear material into the United States (see figure 3). In the passenger vehicle environment, the preprimary area also contains license plate readers and Radio Frequency Identification (RFID) readers to capture information on vehicles and RFID-enabled travel documents. Examples of RFID-enabled travel documents include passport cards and border crossing cards. When a vehicle enters the preprimary inspection lane, a sensor grid determines that a vehicle has entered the lane. The sensors deploy a flash strobe that illuminates the area and license plate reader cameras take a picture of the front and rear of the vehicle. The information associated with the license plate number is run against law enforcement databases to alert the officer during the primary inspection if there is a potential issue with the vehicle or its occupants. Similarly, as a vehicle approaches the primary inspection area, travelers are directed to hold up their RFID travel documents to be read by RFID readers. Some land POEs may also have RFID readers for pedestrians. See figure 4 for examples of a license plate reader and RFID reader. The preprimary area is also used to direct travelers to different lanes according to the type of travel documents they have. For example, CBP may use signs to designate specific lanes for travelers with RFID or other machine readable documents (“Ready lanes”) or for trusted travelers (see figure 5). Primary inspection. During the primary inspection, CBP officers inspect travelers, vehicles, and cargo to determine compliance with U.S. law and admissibility to the United States. A CBP officer is to examine travel documents to ensure their validity and visually match the traveler to the photo identification to confirm the traveler’s identity. All travelers’ names and license plates generally are to be screened against law enforcement databases. As previously discussed, this screening process may begin in the preprimary area when license plate and RFID readers collect data on vehicles and travelers with RFID travel documents. CBP officers may also manually enter data on travelers and vehicles during the primary inspection. A CBP officer is to interview travelers to obtain a declaration of citizenship, the purpose of travel, and items acquired outside the United States. For commercial vehicles, the CBP officer may also review the manifest and the results of targeting, if any. All CBP officers conducting primary inspections are to wear personal radiation detectors— small devices designed to be worn on a belt—to help detect radiation and help ensure the safety of officers and the traveling public. If the inspection cannot be completed at the primary inspection location, a more thorough inspection is required and the travelers, vehicles, or cargo are to be referred for secondary inspection. Travelers, vehicles, or cargo can be directed to secondary inspection for a wide range of issues, including when: radiation is detected (either on the traveler or from his or her vehicle), the traveler does not have required travel documents, the officer has questions about the validity of travel documents, the traveler’s information matches information that may be of concern from law enforcement or intelligence data, or the officer suspects that the traveler is carrying contraband. Foreign visitors to the United States (with the exception of Canadian citizens and Mexican citizens using border crossing cards) may also be referred to secondary inspection to complete processing of their admission records, referred to as Form I-94s. Additionally, CBP selects passenger vehicles at random to be sent to a secondary inspection for a Compliance Examination (COMPEX). COMPEX is a program designed to help measure the effectiveness of CBP’s inspections and is discussed in more detail later in this report. Secondary inspection. A secondary inspection may include a CBP officer conducting further questioning of travelers or additional examination of the traveler, vehicle, or cargo. CBP may use canines, non- intrusive inspection (NII) X-ray, Gamma-ray, or radiation detection equipment, or physically examine the traveler, vehicle, or cargo. CBP may also examine a traveler’s electronic devices, such as computers, tablets, and mobile phones. To examine cargo, CBP may require the contents to be offloaded. When foreign visitors are referred to a secondary inspection to process Form I-94 admission records, CBP officers are to conduct interviews and additional database screening, including biometric checks of fingerprints. CBP policy calls for documentation, immigration, and other admissibility issues to be resolved before a traveler or vehicle is permitted to enter the country. Below, figure 6 shows a canine examination and figure 7 shows an example of NII equipment and scans of vehicles with indicators of contraband smuggling. CBP also has additional processes to enhance preprimary, primary, or secondary inspections at land POEs, including: Canines. CBP has canines that can detect concealed humans, narcotics, currency, firearms, and agriculture products. Depending on availability, land POEs may deploy officers with canines to walk among the vehicles in preprimary waiting to reach an inspection booth. Canines may also be used in the pedestrian and commercial vehicle environments. As previously mentioned, canines are also used for some secondary searches. Anti-Terrorism Contraband Enforcement Teams. These teams conduct special operations that focus on anti-terrorism and the interdiction of narcotics, alien smugglers, and fraudulent documents, among other contraband. For example, at one POE we visited, members of the Anti-Terrorism Contraband Enforcement Team told us they often walk among the passenger vehicles in the preprimary area to look for indicators of illicit activity. Tactical Terrorism Response Teams. These teams provide immediate counterterrorism response capabilities at some land POEs. Members of Tactical Terrorism Response Teams receive counterterrorism training and are responsible for interviewing known and suspected terrorists at ports of entry to help determine admissibility and collect intelligence. Blitzes and other local practices. CBP officers at land POEs may perform “blitzes”, in which inspections are enhanced for a period of time. For example, CBP officials told us that blitzes may include looking in all vehicle trunks during the primary inspection or sending additional vehicles for NII (X-ray) exams during a certain period of time. Officers at the POEs we visited also discussed other local initiatives to enhance inspections. For example, one POE we visited used NII to screen all commercial vehicles. Another POE we visited partnered with the local authority that manages an international bridge to deploy license plate readers for commercial vehicles before the vehicles enter the bridge into the United States. The bridge authority uses the license plate reading to check if the commercial vehicle has submitted the required e-manifest to CBP; only those commercial vehicles that have submitted the required e-manifests are allowed to cross. Officials from CBP told us that, in the future, CBP and the bridge authority plan to deploy additional technology in the preprimary area on the non-U.S. side of the border, including facial recognition and NII. In addition, CBP has plans to make future improvements to inspection processes. For example, CBP is conducting tests to use facial recognition technology as part of inspections at land POEs. According to CBP, facial recognition technology may enhance its ability to detect imposters by matching facial images of those arriving with images on file. CBP began a facial recognition test in the passenger vehicle environment at the Anzalduas, Texas land POE in August 2018 and expects the test to run for up to 1 year. In September 2018, CBP initiated a project at the Port of San Luis, Arizona to demonstrate the feasibility of acquiring photos of all arriving pedestrians and comparing those photos to photos on file. Subsequently, in October 2018, CBP officials stated they extended this demonstration project to the Port of Nogales, Arizona. According to CBP, these pedestrian demonstration projects built upon an earlier pilot project at the Port of Otay Mesa, California, which ran from February through May 2016. Testing this technology is one of CBP’s key efforts in developing the capability to fulfill DHS’ statutory responsibility to collect biometric information from arriving and departing aliens. CBP has numerous directives, handbooks and other official instructions that specify policies and procedures for inspections at land POEs. However, many of these documents have not been reviewed and updated as required by OFO’s January 2016 OFO Policy Management Handbook. This guidance states that all of OFO’s policies must be reviewed and updated, as necessary at least once every 3 years to help ensure the timely provision of uniform and relevant policy. In some cases, the policy documents issued by OFO or its program offices have not been reviewed and updated for almost two decades. See table 2 below for a list of such policies we identified that have not been reviewed and updated to reflect changes in processes since their issuance consistent with OFO’s policy management requirements. As a result of policies not being reviewed and updated by OFO, these policies, as currently written, do not fully reflect changes in technology, operating conditions, or inspection processes. For example: The 2008 policy on processing travelers and vehicles at land POEs does not include information on the Consolidated Secondary Inspection System, the current system used to record secondary inspections. It also directs officers to follow guidance in the Inspector’s Field Manual, which has since been discontinued. The 1999 Compliance Measurement directive refers to procedures for a paper-based system, while the system is now electronic, according to officials. The 2004 Personal Search Handbook does not incorporate the 2015 National Standards on Transport, Escort, Detention, and Search policy that prohibited CBP officers from observing personal cavity searches conducted by medical personnel. The 1999 Narcotics Interdiction Handbook and the 2002 canine policies do not address fentanyl. Fentanyl is a synthetic opioid that requires special handling and has been a main contributor to the recent spike in overdose deaths in the United States, according to the Centers for Disease Control and Prevention. OFO’s Planning, Program, Analysis, and Evaluation (PPAE) Quality Assurance Enterprise Division (QAED) is responsible for monitoring that each program office review and update, as needed, the policies for its programs. QAED has an internal tracking system and sends out reminders to CBP program offices about policies that need to be reviewed, and updated, if necessary. QAED officials acknowledged that many policies need to be updated because some are almost 20 years old and many technological and other changes have occurred that may not be described in existing policies. CBP officials stated that they are in the process of updating some policies, including the 1999 Compliance Measurement directive, the 2002 Canine Enforcement Program Handbook, the 2004 Personal Search Handbook, and the 2008 Primary Processing of Travelers and Vehicles Seeking Entry to the United States at Land Ports of Entry directive. Officials attributed the lack of timely updating to several factors. OFO officials responsible for reviewing and updating policies said that the process can be time-consuming and difficult, as there may be many needed changes or may include conducting site visits to identify best practices and areas for improvement. In addition, QAED officials responsible for monitoring policy updates said QAED has 12 staff and is responsible for three OFO-wide mission areas in addition to policy management, as well as a number of other responsibilities within PPAE. Further, according to QAED officials, they do not have authority to require cognizant program offices to review and update their policies in line with the OFO Policy Management Handbook. QAED officials agreed that CBP and OFO could better ensure compliance with OFO’s policy updating requirements. OFO’s 2016 OFO Policy Management Handbook states that the timely provision of uniform and relevant policy facilitates informed decision- making at all levels of the organization and that an effective policy management program is critical to the success of any organization. By reviewing and updating as necessary all relevant policies related to land POE inspections consistent with OFO’s policy handbook, CBP could better ensure that officers have guidance needed to consistently and properly inspect vehicles and their passengers, pedestrians, and commercial vehicles. CBP uses various mechanisms at the port, field office, and national levels to monitor inspection activities at land POEs to help ensure that CBP officers are following policies and procedures. At the POE level, supervisors and port management monitor many of the inspection tasks in real-time by reviewing computer-based records and logs of inspections and observing inspections. CBP also provides tools to the ports to assist with supervisory monitoring efforts, such as Enforcement Link Mobile Operations Red Flag (ELMOrf)—a computer application that provides alerts to supervisors via mobile device when certain types of events occur during primary inspections that warrant supervisory oversight. Table 3 below provides key monitoring mechanisms CBP uses for its land POE inspections at the port level. At the field office level, field office staff may monitor land POE activities within their area of responsibility through periodic assessments of supervisor monitoring duties, such as inspection report reviews. In addition, all field offices have Integrity Officers tasked with identifying potential corruption and officer training issues at the ports. Table 4 below provides key monitoring mechanisms CBP uses for its land POE inspections at the field office level. CBP’s national level initiatives include its Self-Inspection Program (SIP) and the Operational Field Testing Division’s covert testing program. The Self-Inspection Program is an annual internal self-assessment of various CBP component offices and includes assessment of various inspection activities at POEs. Table 5 below provides key monitoring mechanisms CBP uses for its land POE inspections at the national level. CBP produces CBP-wide analyses of the SIP results it collects annually, but the analyses are not done in a manner—such as at the port level and over multiple years—that would allow CBP to identify potentially reoccurring deficiencies at individual POEs. The Management Inspections Division issues a report each year which provides comprehensive SIP results across CBP offices for that year and highlights compliance issues identified (referred to as the SIP Summary Analysis Report). Similarly, OFO issues an annual report which provides comprehensive results and highlights compliance issues identified across OFO’s programs for that year. See figure 8 for an overview of the SIP process. With regard to the 2018 SIP Summary Analysis Report, the Management Inspections Division reported that approximately 80 percent of all SIP worksheets, which document the results of the self-assessments, submitted across CBP in the 2018 cycle had no deficient conditions. The report also identified the six worksheets with the highest number of deficient conditions across OFO and the questions associated with the most corrective actions for those worksheets. For worksheets that the report did not highlight, additional summaries of the OFO data are provided, including the number of worksheets submitted and the number of worksheets reporting corrective actions. OFO’s SIP annual report also provides summaries of the SIP results, but with additional analysis specific to OFO. The 2018 OFO SIP annual report calculated an overall compliance rate of 92.4 percent across the 31,947 questions for worksheets completed by OFO that year. The report also provided summaries of data used to calculate compliance rates for each worksheet assigned to OFO and included trends in compliance rates for each over 3 years. Additionally, the report provided summaries of the data for each OFO field office that includes number of worksheets submitted, the number of deficient conditions in the given year, and the number of corrective actions for each POE under the field office. Beginning in 2017, the OFO report provided an analysis of any SIP worksheet question with a compliance rate below 90 percent in a given year and the actions planned or taken to increase future compliance. While these reports provide useful summary data of CBP’s monitoring of inspections activities and recommendations for increasing compliance for some programs and processes, our analysis of SIP results showed that opportunities exist for CBP to identify potential reoccurring deficiencies at individual land POEs over time. Specifically, our analysis of SIP results from 2013 through 2018 identified reoccurring instances of noncompliance at individual land POEs indicating the possibility that the corrective actions taken each year to address the deficiencies did not fully remediate them. We found that management at the land POEs with reoccurring instances of deficiencies took corrective actions each year to address the identified deficiencies, and in some instances, management proposed and implemented the same corrective action in multiple years to try to resolve the identified deficiency. While the Management Inspections Division and OFO reports provide some useful analysis to identify programs or specific activities across CBP to target for remediation each year, these reports have not positioned CBP to identify and more effectively address reoccurring deficiencies at individual POEs. Standards for Internal Control in the Federal Government provides that management should use quality information to achieve the entity’s objectives and management should process the obtained data into quality information that supports the internal control system. Furthermore, management should remediate identified internal control deficiencies on a timely basis and the audit resolution process is completed only after action has been taken that (1) corrects identified deficiencies, (2) produces improvements, or (3) demonstrates that the findings and recommendations do not warrant management action. Additionally, management, with oversight from the oversight body, is to monitor the status of remediation efforts so that they are completed on a timely basis. Management Inspections Division and OFO officials stated that their analyses are designed to identify systemic compliance issues across OFO. In addition, OFO officials stated that port management is responsible for addressing compliance issues of individual land POEs. However, without an analysis to identify reoccurring deficiencies at all individual land POEs, the Management Inspections Division and OFO are not well positioned to determine whether CBP may need to take additional or alternative actions to more effectively address the deficiencies at these ports. By enhancing analysis of the SIP data to include analysis at the port level over time, CBP could better identify potential reoccurring deficiencies with inspections at land POEs and could be better positioned to more fully remediate them and ensure compliance with inspection policies. CBP has produced comprehensive analyses of the results from some of its covert operational tests conducted at land POEs in fiscal years 2013, 2014 and 2018. These comprehensive assessments of aggregated covert test results provide analysis of trends, common vulnerabilities, and best practices used in inspections across land POEs; however, CBP has not developed comprehensive assessments for various other covert tests it conducted during this time frame. Of the 213 land POE tests conducted from fiscal years 2013 through 2018, 78 were included in comprehensive assessments. CBP’s Operational Field Testing Division (OFTD) is responsible for covertly assessing and evaluating the integrity of CBP’s personnel, technologies, and policies and procedures at land POEs. From fiscal years 2013 through 2018, OFTD conducted a variety of tests of inspections at land POEs including: fraudulent document and imposter tests, canine contraband detection tests, biological agent detection tests, NII equipment contraband detection tests, radiation detection capabilities tests, and assessments of Tactical Terrorism Response Teams. See figure 9 for an overview of the process for fraudulent document and imposter covert testing. For tests conducted from fiscal years 2013 to 2018, OFTD produced three comprehensive assessments related to tests it conducted at land POEs. One assessment compiled the results of 129 fraudulent document and imposter tests conducted at 10 land POEs and 14 airports in fiscal years 2012 and 2013. Another assessment covered 34 NII equipment tests conducted in fiscal years 2013 and 2014 at land POEs and seaports, of which nine of the tests were at land POEs. The third assessment, issued in 2018, covered 33 NII equipment tests conducted in fiscal year 2018 at six land POEs. While OFTD produced comprehensive assessments for these tests, OFTD did not comprehensively analyze the results of various other types of covert tests conducted from fiscal years 2013 through 2018. Such covert tests included 34 tests for canine detection of contraband, 11 for agricultural and biological agent detection, seven for radiation detection, and seven for Tactical Terrorism Response Team response. Additionally, OFTD conducted another 72 fraudulent document and imposter tests and six NII equipment tests over this time period that were not included in the comprehensive assessments described above. Overall, we found that 135 of 213 tests conducted from fiscal years 2013 through 2018 were not included in comprehensive assessments. For tests not included in comprehensive assessments, analysis of the test is limited to a test summary document that is produced following a test or group of tests conducted during a field visit to one location. The summaries identify officer actions during the test and record whether the test resulted in an interdiction of the test subject. Some of the summaries also include findings, identify leading practices, and provide recommendations to the POE where the test or tests were conducted to improve the inspections. While these summaries provide useful information, they encompass the results of tests at individual POEs and do not provide an evaluation of aggregated test results that could more broadly identify vulnerabilities, trends, and best practices across land POEs as provided in the comprehensive assessments. According to OFTD officials, they have drafted a policy and standard operating procedures that would address comprehensive analysis of covert testing results, but these have been in development for 3 years and have not been finalized. OFTD did not provide further details or documentation of the draft policy or procedures or a date for completion. Additionally, OFTD officials stated that in some cases they did not have a sufficient number of covert test results to conduct a comprehensive analysis. OFTD officials also stated that an additional comprehensive assessment of fraudulent document and imposter tests was not needed as OFTD completed this type of assessment in 2013 and no new findings were generated by subsequent tests. We recognize that the small number of certain tests limit OFTD’s ability to conduct comprehensive analyses. However, we found that from fiscal years 2013 through 2018 over half (135 of 213) of the tests conducted at land POEs were not included in a comprehensive assessment and a formalized policy could better position OFTD to be able to conduct these analyses moving forward. Further, our analysis of covert test interdiction rates suggests that additional periodic comprehensive analysis could help inform CBP management of vulnerabilities, systemic inspection deficiencies, leading practices observed, and ways to improve inspection processes. Moreover, the reasons for non-interdiction in the fraudulent document and imposter covert tests conducted since the last comprehensive assessment may be different due to changes in inspection technologies, training, personnel, or the threat environment. OFTD officials agreed and stated that another comprehensive assessment is being developed based on covert tests focused on facial recognition technologies. Standards for Internal Control in the Federal Government provides that management should implement control activities through policies, including documenting such policies. In addition, management should monitor the internal control system through ongoing monitoring and separate evaluations. These evaluations are to be used periodically and may provide feedback on the effectiveness of ongoing monitoring. Furthermore, management should evaluate and document issues identified through separate evaluations to identify internal control deficiencies and monitor changes in the internal control system. By implementing a policy for conducting periodic comprehensive analyses of its covert operational test results, CBP would be better positioned to understand the effectiveness of inspection policies, personnel, and technologies across land POEs over time. Furthermore, periodic analyses could help identify inspection vulnerabilities that may be occurring more broadly, trends in these vulnerabilities, and best practices in mitigating such vulnerabilities on a more consistent basis. CBP uses various sets of performance measures including organizational performance measures, internal performance measures, program and port-specific measures, and measures required by the National Defense Authorization Act for Fiscal Year 2017 (NDAA). CBP reports organizational measures externally to inform program management while internal measures track additional areas of performance to inform OFO management. In addition, some CBP programs and ports track measures specific to their performance at land POEs. DHS also reports measures that cover CBP’s efforts to detect illegal activity at land POEs as required by the NDAA. These performance measures generally reflect attributes of effective measures, however, CBP has not set an ambitious target for one measure—the land border interception rate. CBP tracks and externally reports the results of performance measures annually in its Organizational Performance Measures Overview. The Overview states that it serves as a tool for leadership to manage programs using performance information and includes performance measure descriptions, targets, results, and trends over time. CBP developed and reports on two measures that cover the detection of illegal activity among inbound passenger vehicle and cargo traffic at land POEs: (1) the estimated percentage of land border privately-owned vehicles with passengers who are compliant with laws, rules, and regulations; and (2) the percentage of inbound cargo identified as high-risk that is assessed or scanned prior to departure or at arrival at a U.S. air, land, and sea POE. CBP also tracks, but does not report, data on the percentage of high-risk inbound cargo assessed or scanned prior to departure or upon arrival at U.S. land POEs, which in fiscal year 2018 was 97.7 percent. See figures 10 and 11 for CBP’s reported results for these measures by fiscal year. CBP measures the percentage of privately-owned vehicles with passengers who are compliant with all federal, state, and local laws and regulations through its COMPEX program. COMPEX is a statistical survey in which vehicles cleared for entry into the United States by CBP are randomly selected for a comprehensive audit through a computer- generated random sample. CBP is to conduct an audit of the selected vehicles by doing a secondary inspection using a standardized system of checks to identify any violations that were missed during the routine inspection. Violations found in the COMPEX audits represent violations missed by CBP and are used by CBP to estimate the total number of violations missed by CBP operations. According to officials, CBP uses these data— along with data on violations CBP officers identify during the normal inspection process—to calculate the overall estimated percentage of land border privately-owned vehicles with passengers compliant with laws, rules, and regulations. As shown in Figure 10, CBP has set a target rate of 99.5 percent compliance. From fiscal years 2015 through 2018, CBP reported estimated rates of over 99 percent compliance. While CBP nearly met its target across all of these years, CBP plans to work with field office management and review COMPEX secondary inspection findings to identify noncompliance trends and identify the underlying reasons for noncompliance. In addition, CBP plans to develop materials to educate travelers on relevant laws and requirements. As previously discussed, in the cargo environment, CBP identifies potentially high-risk cargo through the Automated Targeting System. CBP then tracks the percentage of such cargo assessed or scanned prior to arrival or at a land POE. As shown in Figure 11, CBP has set a target rate of identifying 100 percent of potentially high-risk cargo. For fiscal years 2014 through 2017, CBP reported rates of 99 percent or higher, and in 2018, the rate was 97.9 percent. According to CBP, it did not meet its target rate of 100 percent in fiscal year 2018 because of challenges related to changes in high-risk status that occur en route, data entry errors, and logistical or scheduling errors. OFO plans to address these challenges by working with internal stakeholders to resolve status- tracking problems and information-processing errors and by working with shippers and carriers to rectify logistical and scheduling issues. In addition to its externally-reported organizational performance measures, OFO tracks two performance measures internally that relate to efforts to detect illegal activity among inbound traffic at land POEs: the percentage of individuals screened against law enforcement databases for entry into the United States and the land border interception rate for passengers in privately-owned vehicles with major violations. See figure 12 for CBP’s performance by fiscal year. CBP uses COMPEX data to estimate the land border interception rate for privately-owned vehicles containing passengers with major violations (interception rate). This represents the number of major violations in privately-owned vehicles at the border that CBP intercepts divided by the estimated total number of major violations. CBP tracked the percentage of individuals screened against law enforcement databases for entry into the United States across fiscal years 2013 through 2018, but plans to discontinue use of this measure beginning in fiscal year 2019 according to CBP officials. CBP officials stated that this measure was originally created to track progress toward electronic screening of travel documents as part of the Western Hemisphere Travel Initiative. This measure tracks the percentage of travelers screened against law enforcement databases using electronically readable documents. According to CBP officials, there have been a variety of technology infrastructure upgrades and changes to vehicle processing software at land POEs that have reduced the relevance of this measure for land POE operations and CBP plans to discontinue its use as a result. Some CBP programs that operate as part of the inspection process track performance data on the results of their program activities. For example, CBP tracks results from the Canine Program. Canine handlers are to enter performance data into the Canine Tracking System locally at land POEs. They track data on the numbers of days canine officers worked, searches conducted, and fines and arrests that result from canine searches. In addition, some land POEs track performance data on local efforts to detect illegal activity. For example, officials at one POE we visited track data on the numbers and types of seizures, arrests, and immigration enforcement actions that occur at the port. In 2018, DHS began reporting additional metrics to measure the effectiveness of border security at land POEs in response to the National Defense Authorization Act for Fiscal Year 2017 (NDAA). The NDAA requires DHS to produce an annual report for appropriate congressional committees, the Comptroller General, and certain other entities. This report is to include certain metrics to measure the effectiveness of border security between POEs, at POEs, in the maritime environment, and with respect to aviation assets and other air and marine operations in the land domain. DHS submitted the fiscal year 2017 Border Security Metrics Report in response to the NDAA requirement in May 2018. Nine of the metrics in DHS’s fiscal year 2017 report cover CBP’s efforts to detect illegal activity at land POEs, although many of these measures group land POE data with other types of ports. DHS reported data for 7 of these 9 metrics. In some instances, DHS reported that it did not have the specific data needed for a required metric and provided other available data instead. DHS reported data in response to the following required metrics related to land ports of entry in the fiscal year 2017 Border Security Metrics Report: total inadmissible travelers at ports of entry (DHS does not have a methodology to estimate total inadmissible travelers, and therefore presented data on known inadmissible travelers), refusal rate at ports of entry, illicit drugs seized at ports of entry, port of entry illicit drug seizure rate, major infractions at ports of entry (DHS does not have a methodology to estimate all major infractions, and therefore included data on known passenger infractions), cocaine seizures effectiveness rate at land ports of entry, and secondary examination rate. CBP did not leverage existing data from the COMPEX program to estimate all major infractions in the fiscal year 2017 Border Security Metrics Report, but began reporting these data in the fiscal year 2018 report. The NDAA requires DHS to report the number of infractions related to travelers and cargo committed by major violators who are interdicted by OFO at ports of entry and the estimated number of such infractions committed by major violators who are not so interdicted. In the fiscal year 2017 DHS Border Security Metrics Report, DHS reported the number of known major infractions at ports of entry. DHS also reported that they did not have a methodology to estimate the number of infractions among those who are not interdicted. However, CBP estimates the number of undetected major infractions through the COMPEX program. CBP officials stated there was likely a miscommunication within CBP that led to the DHS Office of Immigration Statistics—the DHS office that compiled the Border Security Metrics Report— not using COMPEX data to report the estimated number of major infractions in the 2017 Border Security Metrics Report. In addition, the DHS Office of Immigration Statistics was not aware that CBP’s COMPEX was applicable for purposes of reporting this metric. As a result of our review, DHS included an estimate of the number of major infractions not interdicted by CBP using data from the COMPEX program in the fiscal year 2018 Border Security Metrics Report. CBP organizational and internal performance measures for detecting illegal activity at land POEs generally reflect key attributes of effective performance measures that we previously identified. Based on our analysis of CBP’s organizational and internal performance measures, these measures generally reflect the key attributes listed in table 6. For example, CBP clearly defines its externally-reported organizational measures and presents baselines and trends in its Organizational Performance Measures Overview. In addition, CBP’s Organizational Performance Measures Overview provides linkage between its externally-reported organizational measures and DHS mission. CBP performance measures also have limited overlap with each other presenting new information beyond what other measures provide. Our analysis of CBP’s measures found that they focus on the commercial and passenger-owned vehicle environments and currently provide limited coverage of the pedestrian traveler environment. According to CBP officials, the agency is in the process of expanding the two COMPEX measures to include pedestrian travelers at land POEs, which would provide greater coverage of CBP’s core program activities for detecting illegal activity at land POEs. According to CBP officials, CBP began collecting COMPEX data for all pedestrian POEs in 2015. CBP officials stated they are in the process of reviewing the collected data and are working to refine the methodology and operational issues that may impact the reliability of the results. After CBP resolves these data issues, CBP will begin reporting the results of COMPEX audits in the pedestrian environment, according to CBP officials. Our analysis of CBP’s measures also found that CBP generally sets ambitious but realistic targets for its organizational and internal performance measures. However, CBP’s target for the land border interception rate is lower than the actual reported rate for fiscal years 2015 through 2018. We previously identified critical success factors for goal-setting and performance measurement efforts. Creating ambitious but realistic and measurable “stretch” goals based on current performance levels, among other things, supports the organization in achieving performance improvements. In addition, the Office of Management and Budget Circular A-11 states that agencies are expected to set ambitious goals to push them to achieve significant performance improvements beyond current levels. OFO officials stated they set the target for the land border interception rate following methodological changes OFO implemented in the COMPEX program in 2015. However since that time, OFO officials in the Strategic Transformation Office—the office that reviews and provides input into targets for CBP’s organizational performance measures—stated they have not reviewed this target because it is an internal measure and they do not review these as they would for the externally-reported organizational measures. Nevertheless, OFO officials stated they use this measure internally for performance management and to report results to OFO management. Because OFO sets a target for the interception rate and uses this measure internally, a more ambitious target for the measure would better encourage CBP to review its performance of inspection activities that impact the measure and challenge them to identify ways of improving performance. Inspecting travelers and cargo seeking entry to the United States through land POEs is critical to preventing terrorists and other inadmissible persons, as well as nuclear materials, narcotics, and other contraband, from entering the country. OFO has implemented processes and deployed technology to screen and examine travelers and cargo at POEs; however, by reviewing and updating its inspection policies in accordance with its own established time frames, CBP could better ensure that officers have guidance needed to consistently and properly inspect passengers, pedestrians, and commercial vehicles. Further, while CBP has taken steps to monitor compliance with inspection policies through the SIP and covert operational tests, it could more fully analyze the results. By identifying and addressing reoccurring SIP deficiencies at individual land POEs and implementing a policy to conduct periodic comprehensive analyses of covert test findings, CBP could be better positioned to enhance inspections and address vulnerabilities. Lastly, CBP has established various measures to assess the effectiveness of its inspections; however, establishing an ambitious and realistic target for its major violations interception rate could encourage additional improvements in performance. We are making the following four recommendations to CBP: The Commissioner of CBP should review and update policies related to land port of entry inspections in accordance with OFO guidance. (Recommendation 1) The Commissioner of CBP should analyze the results of the Self- Inspection Program over time and at a level necessary to identify and address potentially reoccurring inspection deficiencies at individual ports of entry. (Recommendation 2) The Commissioner of CBP should implement a policy to conduct periodic comprehensive analyses of covert test findings. (Recommendation 3) The Commissioner of CBP should develop a new target for the land border interception rate for passengers in privately-owned vehicles with major violations that sets an ambitious and realistic goal based on past performance. (Recommendation 4) We provided a draft of this report to DHS for its review and comment. DHS provided comments, which are reproduced in appendix I. In its comments, DHS concurred with the four recommendations. DHS also provided technical comments, which we incorporated as appropriate. With regard to the first recommendation that CBP update policies related to land POE inspections in accordance with OFO guidance, DHS stated that OFO has initiated a process to modernize handbooks, policy memoranda, and directives. With regard to the second recommendation that CBP analyze SIP results over time and at a level necessary to identify and address potentially reoccurring deficiencies at individual POEs, DHS stated that OFO plans to begin training on how to conduct this analysis so it may be conducted for 2021 SIP results. With regard to the third recommendation that CBP implement a policy to conduct periodic comprehensive analyses of covert test findings, DHS stated that CBP is in the process of writing a policy that will document procedures for comprehensive reporting, including periodic reviews of corrective actions taken to mitigate vulnerabilities. With regard to the fourth recommendation that CBP develop a new target for the land border interception rate, DHS stated that OFO will set a new target for fiscal year 2020 using data from the previous three fiscal years. If fully implemented, these actions will meet the intent of our recommendations. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Kirk Kiester (Assistant Director), Heather May (Analyst in Charge), Carl Barden, Michele Fejfar, Eric Hauswirth, Susan Hsu, Richard Hung, Jeff Love, Mara McMillen, Sasan J. “Jon” Najmi, and Jonathan Tumin made key contributions to this report.", "summary": "CBP, within the Department of Homeland Security (DHS), is the lead federal agency charged with a dual mission of facilitating the flow of legitimate travel and trade at the nation's borders while keeping terrorists and their weapons, criminals and their contraband, and inadmissible aliens out of the country. GAO was asked to review CBP's process for inspecting passenger vehicles, pedestrians, and commercial vehicles at land POEs to secure the border. This report examines to what extent CBP (1) has processes and policies for inspections, (2) monitors inspection activities, and (3) has measures to assess its efforts to detect illegal activity of passengers, pedestrians, and commercial vehicles at land POEs. To address these questions, GAO analyzed CBP documents and data related to inbound inspections; interviewed officials; and observed operations at a non-generalizable sample of seven land POEs, selected to reflect a range of traffic volumes and geographic locations, among other things. This is a public version of a sensitive report that GAO issued in June 2019. Information that DHS deemed sensitive has been omitted. U.S. Customs and Border Protection (CBP) has processes for inspecting passenger vehicles, pedestrians, and commercial vehicles at U.S. land ports of entry (POE). These processes include reviewing travel documents, screening against law enforcement databases, and using canines and X-ray equipment (see figure below). However, because CBP has not updated many of its policies—in a few cases for almost 20 years—they do not always reflect changes in technology or processes, such as those for conducting searches and handling fentanyl. By reviewing and updating policies, CBP could help ensure officers have guidance needed to consistently and properly perform inspections. CBP has various mechanisms at the port, field office, and national levels to monitor inspection activities at land POEs, but opportunities exist to enhance analysis of the results from its national level Self-Inspection Program (SIP) and covert operational testing. The SIP is an annual self-assessment that POEs are to conduct to determine compliance with CBP policies. CBP analyzes the results of the SIP annually to identify systemic compliance issues across CBP that year; however, it does not analyze noncompliance at individual POEs over time. By analyzing these data, CBP could better identify and address deficiencies at individual POEs. In addition, CBP has produced three comprehensive assessments, which analyzed aggregated results for certain types of covert tests, such as fraudulent document tests, conducted at land POEs in fiscal years 2013, 2014, and 2018. However, CBP has not done so for other types of tests, such as canine contraband detection tests, conducted from fiscal years 2013 through 2018. By implementing a policy for periodically conducting such analyses, CBP could identify vulnerabilities, trends, and best practices occurring more broadly. CBP uses various sets of measures to assess its efforts to detect illegal activity at land POEs. CBP performance measures generally reflect the key attributes of effective measures, but CBP does not set an ambitious and realistic target for one measure. CBP's target for the land border interception rate—the estimated percentage of major violations in privately-owned vehicles that CBP intercepts out of the projected total number of major violations—is lower than the actual reported rate for fiscal years 2015 through 2018. A more ambitious target for the interception rate would better encourage CBP to review past performance of inspection activities that impact the measure and challenge CBP to identify ways to improve performance . GAO recommends that CBP: (1) review and update policies related to land POE inspections in accordance with CBP guidance; (2) analyze the SIP results to identify and address reoccurring inspection deficiencies at individual POEs; (3) implement a policy to conduct periodic comprehensive analyses of covert test findings; and (4) develop a more ambitious target for the land border interception rate measure. DHS concurred.", "document_type": "gao"}
{"report": "The federal government plans to invest over $90 billion in IT in fiscal year 2019. Nevertheless, we have previously reported that investments in federal IT too often resulted in failed projects that incurred cost overruns and schedule slippages, while contributing little to the desired mission- related outcomes. For example: The tri-agency National Polar-orbiting Operational Environmental Satellite System was disbanded in February 2010 at the direction of the White House’s Office of Science and Technology Policy after the program spent 16 years and almost $5 billion. The Department of Homeland Security’s (DHS) Secure Border Initiative Network program was ended in January 2011, after the department obligated more than $1 billion for the program. The Department of Veterans Affairs’ Financial and Logistics Integrated Technology Enterprise program was intended to be delivered by 2014 at a total estimated cost of $609 million, but was terminated in October 2011. The Department of Defense’s Expeditionary Combat Support System was canceled in December 2012 after spending more than a billion dollars and failing to deploy within 5 years of initially obligating funds. The United States Coast Guard (Coast Guard) decided to terminate its Integrated Health Information System project in 2015. As reported by the agency in August 2017, the Coast Guard spent approximately $60 million over 7 years on this project, which resulted in no equipment or software that could be used for future efforts. Our past work has found that these and other failed IT projects often suffered from a lack of disciplined and effective management, such as project planning, requirements definition, and program oversight and governance. In many instances, agencies had not consistently applied best practices that are critical to successfully acquiring IT. Federal IT projects have also failed due to a lack of oversight and governance. Executive-level governance and oversight across the government has often been ineffective, specifically from CIOs. For example, we have reported that some CIOs’ roles were limited because they did not have the authority to review and approve the entire agency IT portfolio. In addition to failures when acquiring IT, our cybersecurity work at federal agencies continues to highlight information security deficiencies. The following examples describe the types of risks we have found at federal agencies. In September 2018, we reported that the Department of Education’s Office of Federal Student Aid exercised minimal oversight of lenders’ protection of student data and lacked assurance that appropriate risk- based safeguards were being effectively implemented, tested, and monitored. In August 2017, we issued a report stating that, since the 2015 data breaches, the Office of Personnel Management (OPM) had taken actions to prevent, mitigate, and respond to data breaches involving sensitive personal and background investigation information. However, we noted that the agency had not fully implemented recommendations made to OPM by DHS’s United States Computer Emergency Readiness Team to help the agency improve its overall security posture and improve its ability to protect its systems and information from security breaches. We reported in July 2017 that information security at the Internal Revenue Service had weaknesses that limited its effectiveness in protecting the confidentiality, integrity, and availability of financial and sensitive taxpayer data. An underlying reason for these weaknesses was that the Internal Revenue Service had not effectively implemented elements of its information security program. In May 2016, we found that the National Aeronautics and Space Administration, the Nuclear Regulatory Commission, OPM, and the Department of Veteran Affairs did not always control access to selected high-impact systems, patch known software vulnerabilities, or plan for contingencies. An underlying reason for these weaknesses was that the agencies had not fully implemented key elements of their information security programs. We reported in August 2016 that the information security of the Food and Drug Administration had significant weaknesses that jeopardized the confidentiality, integrity, and availability of its information systems and industry and public health data. Congress and the President have enacted various key pieces of reform legislation to address IT management issues. These include the federal IT acquisition reform legislation commonly referred to as the Federal Information Technology Acquisition Reform Act (FITARA). This legislation was intended to improve covered agencies’ acquisitions of IT and enable Congress to monitor agencies’ progress and hold them accountable for reducing duplication and achieving cost savings. The law includes specific requirements related to seven areas: Agency CIO authority enhancements. CIOs at covered agencies have the authority to, among other things, (1) approve the IT budget requests of their respective agencies and (2) review and approve IT contracts. Federal data center consolidation initiative (FDCCI). Agencies covered by FITARA are required, among other things, to provide a strategy for consolidating and optimizing their data centers and issue quarterly updates on the progress made. Enhanced transparency and improved risk management. The Office of Management and Budget (OMB) and covered agencies are to make detailed information on federal IT investments publicly available, and agency CIOs are to categorize their investments by level of risk. Portfolio review. Covered agencies are to annually review IT investment portfolios in order to, among other things, increase efficiency and effectiveness and identify potential waste and duplication. Expansion of training and use of IT acquisition cadres. Covered agencies are to update their acquisition human capital plans to support timely and effective IT acquisitions. In doing so, the law calls for agencies to consider, among other things, establishing IT acquisition cadres (i.e., multi-functional groups of professionals to acquire and manage complex programs), or developing agreements with other agencies that have such cadres. Government-wide software purchasing program. The General Services Administration is to develop a strategic sourcing initiative to enhance government-wide acquisition and management of software. In doing so, the law requires that, to the maximum extent practicable, the General Services Administration should allow for the purchase of a software license agreement that is available for use by all executive branch agencies as a single user. Maximizing the benefit of the Federal Strategic Sourcing Initiative. Federal agencies are required to compare their purchases of services and supplies to what is offered under the Federal Strategic Sourcing Initiative. In June 2015, OMB released guidance describing how agencies are to implement FITARA. This guidance was intended to, among other things: assist agencies in aligning their IT resources with statutory requirements; establish government-wide IT management controls to meet the law’s requirements, while providing agencies with flexibility to adapt to unique agency processes and requirements; strengthen the relationship between agency CIOs and bureau CIOs; and strengthen CIO accountability for IT costs, schedules, performance, and security. The guidance identifies a number of actions that agencies are to take to establish a basic set of roles and responsibilities (referred to as the common baseline) for CIOs and other senior agency officials and, thus, to implement the authorities described in the law. For example, agencies are to conduct a self-assessment and submit a plan describing the changes they intend to make to ensure that common baseline responsibilities are implemented. In addition, in August 2016, OMB released guidance intended, among other things, to define a framework for achieving the data center consolidation and optimization requirements of FITARA. The guidance directed agencies to develop a data center consolidation and optimization strategic plan that defined the agency’s data center strategy for fiscal years 2016, 2017, and 2018. This strategy was to include, among other things, a statement from the agency CIO indicating whether the agency had complied with all data center reporting requirements in FITARA. Further, the guidance states that OMB is to maintain a public dashboard to display consolidation-related costs savings and optimization performance information for the agencies. Congress has recognized the importance of agencies’ continued implementation of FITARA provisions, and has taken legislative action to extend selected provisions beyond their original dates of expiration. Specifically, Congress and the President enacted laws to: remove the expiration dates for the enhanced transparency and improved risk management provisions, which were set to expire in 2019; remove the expiration date for portfolio review, which was set to expire in 2019; and extend the expiration date for FDCCI from 2018 to 2020. In addition, Congress and the President enacted a law to authorize the availability of funding mechanisms to help further agencies’ efforts to modernize IT. The law, known as the Modernizing Government Technology (MGT) Act, authorizes agencies to establish working capital funds for use in transitioning away from legacy IT systems, as well as for addressing evolving threats to information security. The law also creates the Technology Modernization Fund within the Department of the Treasury, from which agencies can “borrow” money to retire and replace legacy systems, as well as to acquire or develop systems. Further, in February 2018, OMB issued guidance for agencies on implementing the MGT Act. The guidance was intended to provide agencies additional information regarding the Technology Modernization Fund, as well as the administration and funding of the related IT working capital funds. Specifically, the guidance encouraged agencies to begin submitting initial project proposals for modernization on February 27, 2018. In addition, in accordance with the MGT Act, the guidance provided details regarding a Technology Modernization Board, which is to consist of (1) the Federal CIO; (2) a senior IT official from the General Services Administration; (3) a member of DHS’s National Protection and Program Directorate; and (4) four federal employees with technical expertise in IT development, financial management, cybersecurity and privacy, and acquisition that were appointed by the Director of OMB. Congress and the President enacted the Federal Information Security Modernization Act of 2014 (FISMA) to improve federal cybersecurity and clarify government-wide responsibilities. The act addresses the increasing sophistication of cybersecurity attacks, promotes the use of automated security tools with the ability to continuously monitor and diagnose the security posture of federal agencies, and provides for improved oversight of federal agencies’ information security programs. To this end, the act clarifies and assigns specific responsibilities to entities such as OMB, DHS, and the federal agencies. Table 1 describes a selection of the OMB, DHS, and agency responsibilities. Beyond the implementation of FITARA, FISMA, and related actions, the administration has also initiated other efforts intended to improve federal IT and the nation’s cybersecurity. Specifically, in March 2017, the administration established the Office of American Innovation, which has a mission to, among other things, make recommendations to the President on policies and plans aimed at improving federal government operations and services. In doing so, the office is to consult with both OMB and the Office of Science and Technology Policy on policies and plans intended to improve government operations and services, improve the quality of life for Americans, and spur job creation. In May 2017, the Administration also established the American Technology Council, which has a goal of helping to transform and modernize federal agency IT and how the federal government uses and delivers digital services. The President is the chairman of this council, and the Federal CIO and the United States Digital Service Administrator are among the members. In addition, in May 2017, the President signed Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. This executive order outlined actions to enhance cybersecurity across federal agencies and critical infrastructure to improve the nation’s cyber posture and capabilities against cybersecurity threats. Among other things, the order tasked the Director of the American Technology Council to coordinate a report to the President from the Secretary of DHS, the Director of OMB, and the Administrator of the General Services Administration, in consultation with the Secretary of Commerce, regarding the modernization of federal IT. In response, the Report to the President on Federal IT Modernization was issued in December 2017 and outlined the current and envisioned state of federal IT. The report focused on modernization efforts to improve the security posture of federal IT. Further, it recognized that agencies have attempted to modernize systems but have been stymied by a variety of factors, including resource prioritization, ability to procure services quickly, and technical issues. The report provided multiple recommendations intended to address these issues through the modernization and consolidation of networks and the use of shared services to enable future network architectures. Further, in March 2018, the Administration issued the President’s Management Agenda, which laid out a long-term vision for modernizing the federal government. The agenda identified three related drivers of transformation—IT modernization; data, accountability, and transparency; and the workforce of the future—that are intended to push change across the federal government. The Administration also established 14 related Cross-Agency Priority goals, many of which have elements that involve IT. In particular, the Cross-Agency Priority goal on IT modernization stated that modern IT must function as the backbone of how government serves the public in the digital age. This goal established three priorities that are to guide the Administration’s efforts to modernize federal IT: (1) enhancing mission effectiveness by improving the quality and efficiency of critical services, including the increased utilization of cloud-based solutions; (2) reducing cybersecurity risks to the federal mission by leveraging current commercial capabilities and implementing cutting edge cybersecurity capabilities; and (3) building a modern IT workforce by recruiting, reskilling, and retaining professionals able to help drive modernization with up-to-date technology. On May 15, 2018, the President signed Executive Order 13833: Enhancing the Effectiveness of Agency Chief Information Officers. Among other things, this executive order was intended to better position agencies to modernize their IT systems, execute IT programs more efficiently, and reduce cybersecurity risks. The order pertains to 22 of the 24 Chief Financial Officers (CFO) Act agencies; the Department of Defense and the Nuclear Regulatory Commission are exempt. For the covered agencies, the executive order strengthened the role of agency CIOs by, among other things, requiring them to report directly to their agency head; serve as their agency head’s primary IT strategic advisor; and have a significant role in all management, governance, and oversight processes related to IT. In addition, one of the cybersecurity requirements directed agencies to ensure that the CIO works closely with an integrated team of senior executives, including those with expertise in IT, security, and privacy, to implement appropriate risk management measures. In the March 2019 update to our high-risk series, we reported that agencies still needed to complete significant work related to the management of IT acquisitions and operations. As government-wide spending on IT increases every year, the need for appropriate stewardship of that investment increases as well. However, we stated that OMB and federal agencies have not made significant progress since 2017 in taking the steps needed to improve how these financial resources are budgeted and realized. To address this issue, we highlighted the need for OMB and federal agencies to further implement the requirements of federal IT acquisition reforms, including the enhancement of CIO authority. Our update to the IT acquisitions and operations high-risk area also stressed that OMB and agencies needed to continue to implement our prior recommendations in order to improve their ability to effectively and efficiently invest in IT. Specifically, since fiscal year 2010, we have made 1,278 recommendations to address shortcomings in IT acquisitions and operations. As stated in our 2019 high-risk update, OMB and agencies should demonstrate government-wide progress by, among other things, implementing at least 80 percent of our recommendations related to managing IT acquisitions and operations. As of June 2019, OMB and agencies had fully implemented 768 (or 60 percent) of their 1,277 recommendations. Figure 1 summarizes the progress that OMB and agencies have made in addressing our recommendations compared to the 80 percent target. Overall, federal agencies would be better positioned to realize billions in cost savings and additional management improvements if they address these recommendations, including those aimed at implementing CIO responsibilities, reviewing IT acquisitions; improving data center consolidation; and managing software licenses. In all, various laws, such as FITARA and related guidance, assign 35 IT management responsibilities to CIOs in six key areas. These areas are: leadership and accountability, budgeting, information security, investment management, workforce, and strategic planning. In August 2018, we reported that none of the 24 agencies we reviewed had policies that fully addressed the role of their CIO, as called for by federal laws and guidance. In this regard, a majority of the agencies had fully or substantially addressed the role of their CIOs for the area of leadership and accountability. In addition, a majority of the agencies had substantially or partially addressed the role of their CIOs for two areas: information security and IT budgeting. However, most agencies had partially or minimally addressed the role of their CIOs for two areas: investment management and strategic planning. Further, the majority of the agencies minimally addressed or did not address the role of their CIOs for the remaining area: IT workforce. Figure 2 depicts the extent to which the 24 agencies addressed the role of their CIOs for the six areas. Notwithstanding the shortfalls in agencies’ policies addressing the roles of their CIOs, most agency officials stated that their CIOs are implementing the responsibilities even if the agencies do not have policies requiring implementation. Nevertheless, in their responses to our survey, the CIOs of the 24 selected agencies acknowledged that they were not always very effective in implementing the six IT management areas. Specifically, at least ten of the CIOs indicated that they were less than very effective for each of the six areas of responsibility. We believe that until agencies fully address the role of CIOs in their policies, agencies will be limited in addressing longstanding IT management challenges. Figure 3 depicts the extent to which the CIOs reported their effectiveness in implementing the six areas of responsibility. Beyond the actions of the agencies, however, shortcomings in agencies’ policies were also partially attributable to two weaknesses in OMB’s guidance. First, the guidance did not comprehensively address all CIO responsibilities, such as those related to assessing the extent to which personnel meet IT management knowledge and skill requirements and ensuring that personnel are held accountable for complying with the information security program. Correspondingly, the majority of the agencies’ policies did not fully address nearly all of the responsibilities that were not included in OMB’s guidance. Second, OMB’s guidance did not ensure that CIOs had a significant role in (1) IT planning, programming, and budgeting decisions; and (2) execution decisions and the management, governance, and oversight processes related to IT, as required by federal law and guidance. In the absence of comprehensive guidance, CIOs would not be positioned to effectively acquire, maintain, and secure their IT systems. In response to the survey conducted for our August 2018 report, the 24 agency CIOs also identified a number of factors that enabled and challenged their ability to effectively manage IT. Specifically, most agency CIOs cited five factors as being enablers to effectively carry out their responsibilities: (1) NIST guidance, (2) the CIO’s position within the agency hierarchy, (3) OMB guidance, (4) coordination with the Chief Acquisition Officer (CAO), and (5) legal authority. Further, three factors were cited by CIOs as major factors that have challenged their ability to effectively carry out responsibilities: (1) processes for hiring, recruiting, and retaining IT personnel; (2) financial resources; and (3) the availability of personnel/staff resources. As shown in figure 4, the five enabling factors were identified by at least half of the 24 CIOs and the three factors cited as major challenges were identified by at least half of the CIOs. Although OMB issued guidance aimed at addressing the three factors identified by a majority of the CIOs as major challenges, the guidance did not fully do so. Further, regarding the financial resources challenge, OMB recently required agencies to provide data on CIO authority over IT spending; however, its guidance did not provide a complete definition of that authority. In the absence of such guidance, agencies created varying definitions of CIO authority. Until OMB updates its guidance to include a complete definition of the authority that CIOs are to have over IT spending, it will be difficult for OMB to identify any deficiencies in this area and to help agencies make any needed improvements. In order to address challenges in implementing CIO responsibilities, we made three recommendations to OMB and one recommendation to each of the selected 24 federal agencies for each of the six IT management areas. Most agencies agreed with or had no comments on the recommendations. However, as of June 2019, none of the 27 recommendations had been implemented. We will continue to monitor the implementation of these recommendations. FITARA includes a provision to enhance covered agency CIOs’ authority through, among other things, requiring agency heads to ensure that CIOs review and approve IT contracts. OMB’s FITARA implementation guidance expanded upon this aspect of the legislation in a number of ways. Specifically, according to the guidance: CIOs may review and approve IT acquisition strategies and plans, rather than individual IT contracts; CIOs can designate other agency officials to act as their representatives, but the CIOs must retain accountability; CAOs are responsible for ensuring that all IT contract actions are consistent with CIO-approved acquisition strategies and plans; and CAOs are to indicate to the CIOs when planned acquisition strategies and acquisition plans include IT. In January 2018, we reported that most of the CIOs at 22 selected agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. For instance, most of the 22 agencies did not identify all of their IT contracts. In this regard, the agencies identified 78,249 IT- related contracts, to which they obligated $14.7 billion in fiscal year 2016. However, we identified 31,493 additional IT contracts with combined obligations totaling $4.5 billion, raising the total amount obligated to IT contracts by these agencies in fiscal year 2016 to at least $19.2 billion. Figure 5 reflects the obligations that the 22 selected agencies reported to us relative to the obligations we identified. The percentage of additional IT contract obligations we identified varied among the selected agencies. For example, the Department of State did not identify 1 percent of its IT contract obligations. Conversely, eight agencies did not identify over 40 percent of their IT contract obligations. Many of the selected agencies that did not identify these IT contract obligations also did not follow OMB guidance. Specifically, 14 of the 22 agencies did not involve the acquisition office in their process to identify IT acquisitions for CIO review, as required by OMB. In addition, seven agencies did not establish guidance to aid officials in recognizing IT. We concluded that, until these agencies involve the acquisitions office in their IT acquisition identification processes and establish supporting guidance, they cannot ensure that they will identify all such acquisitions. Without proper identification of IT acquisitions, these agencies and their CIOs cannot effectively provide oversight of these acquisitions. In addition to not identifying all IT contracts, 14 of the 22 selected agencies did not fully satisfy OMB’s requirement that the CIO review and approve IT acquisition plans or strategies. Further, only 11 of 96 randomly selected IT contracts at 10 of the 22 agencies were CIO-reviewed and approved as required by OMB’s guidance. The 85 contracts that were not reviewed had a total possible value of approximately $23.8 billion. Until agencies ensure that CIOs are able to review and approve all IT acquisitions, CIOs will continue to have limited visibility and input into their agencies’ planned IT expenditures and will not be able to effectively use the increased authority that FITARA’s contract approval provision is intended to provide. Further, agencies will likely miss an opportunity to strengthen their CIOs’ authority and the oversight of acquisitions. As a result, agencies may award IT contracts that are duplicative, wasteful, or poorly conceived. As a result of these findings, we made 39 recommendations in our January 2018 report. Among these, we recommended that agencies ensure that their acquisition offices are involved in identifying IT acquisitions and issuing related guidance and that IT acquisitions are reviewed in accordance with OMB guidance. OMB and the majority of the agencies generally agreed with or did not comment on the recommendations. As of June 2019, 23 of the 39 of the recommendations had not been implemented. Data center consolidation efforts are key to implementing FITARA. Specifically, OMB established the FDCCI in February 2010 to improve the efficiency, performance, and environmental footprint of federal data center activities. The enactment of FITARA in 2014 codified and expanded the initiative. In addition, in August 2016, OMB issued a memorandum which established the Data Center Optimization Initiative (DCOI) and included guidance on how to implement the data center consolidation and optimization provisions of FITARA. Among other things, the guidance required agencies to consolidate inefficient infrastructure, optimize existing facilities, improve their security posture, and achieve cost savings. According to the 24 agencies covered by the initiative, data center consolidation and optimization efforts had resulted in approximately $4.7 billion in cost savings through August 2018. Even so, additional work remains to fully carry out the initiative. Specifically, in a series of reports that we issued from July 2011 through April 2019, we noted that, while data center consolidation could potentially save the federal government billions of dollars, weaknesses existed in several areas, including agencies’ data center consolidation plans, data center optimization, and OMB’s tracking and reporting on related cost savings. In April 2019, we reported that agencies continued to report mixed progress toward achieving OMB’s goals for closing data centers and realizing the associated savings by September 2018. Specifically, as of August 2018, over half of the agencies reported that they had met, or planned to meet, all of their OMB-assigned closure goals for tiered data centers by the deadline. Six agencies reported that they did not plan to meet their goals for tiered data centers. In addition, as of August 2018, 11 agencies reported that they had already met the goal for closing 60 percent of their non-tiered centers, three agencies reported that they planned to meet the goal by the end of fiscal year 2018, and nine agencies reported that they did not plan to meet the goal by the end of fiscal year 2018. In all, the 24 agencies reported a total of 6,250 data center closures as of August 2018, which represented about half of the total reported number of federal data centers. In addition, the agencies reported 1,009 planned closures by the end of fiscal year 2018, with an additional 191 closures planned through fiscal year 2023, for a total of 1,200 further closures. Further, in August 2018, 22 agencies reported that they had achieved $1.94 billion in cost savings for fiscal years 2016 through 2018, while two agencies reported that they had not achieved any savings. In addition to that amount, 21 agencies identified an additional $0.42 billion in planned savings through fiscal year 2018—for a total of $2.36 billion in planned cost savings from fiscal years 2016 through 2018. Nevertheless, this total is about $0.37 billion less than OMB’s goal of $2.7 billion for overall DCOI savings. From July 2011 through April 2019, we made a total of 196 recommendations to OMB and 24 agencies to improve the execution and oversight of the initiative. Most agencies and OMB agreed with our recommendations or had no comments. As of June 2019, 79 of these 196 recommendations had not been implemented. In our 2015 high-risk report’s discussion of IT acquisitions and operations, we identified the management of software licenses as a focus area, in part because of the potential for cost savings. Federal agencies engage in thousands of software licensing agreements annually. The objective of software license management is to manage, control, and protect an organization’s software assets. Effective management of these licenses can help avoid purchasing too many licenses, which can result in unused software, as well as too few licenses, which can result in noncompliance with license terms and cause the imposition of additional fees. As part of its PortfolioStat initiative, OMB has developed a policy that addresses software licenses. This policy requires agencies to conduct an annual, agency-wide IT portfolio review to, among other things, reduce commodity IT spending. Such areas of spending could include software licenses. In May 2014, we reported on federal agencies’ management of software licenses and determined that better management was needed to achieve significant savings government-wide. Of the 24 selected agencies we reviewed, only two had comprehensive policies that included the establishment of clear roles and central oversight authority for managing enterprise software license agreements, among other things. Of the remaining 22 agencies, 18 had policies that were not comprehensive, and four had not developed any policies. Further, we found that only two of the 24 selected agencies had established comprehensive software license inventories, a leading practice that would help them to adequately manage their software licenses. The inadequate implementation of this and other leading practices in software license management was partially due to weaknesses in agencies’ policies. As a result, we concluded that agencies’ oversight of software license spending was limited or lacking, thus, potentially leading to missed savings. However, the potential savings could be significant considering that, in fiscal year 2012, one major federal agency reported saving approximately $181 million by consolidating its enterprise license agreements, even when its oversight process was ad hoc. Accordingly, we recommended that OMB issue a directive to help guide agencies in managing software licenses. We also made 135 recommendations to the 24 agencies to improve their policies and practices for managing licenses. Among other things, we recommended that the agencies (1) regularly track and maintain a comprehensive inventory of software licenses and (2) analyze the inventory to identify opportunities to reduce costs and better inform investment decision making. Most agencies generally agreed with the recommendations or had no comments. As of June 2019, 27 of the 135 recommendations had not been implemented. Table 2 reflects the extent to which the 24 agencies implemented the recommendations in these two areas. We have consistently identified shortcomings in the federal government’s approach to cybersecurity. In particular, in a September 2018 report, we identified four major cybersecurity challenges: (1) establishing a comprehensive cybersecurity strategy and performing effective oversight, (2) securing federal systems and information, (3) protecting cyber critical infrastructure, and (4) protecting privacy and sensitive data. To address these challenges, we identified 10 critical actions that the federal government and other entities need to take. For example, in order to address the challenge of securing federal systems and information, we identified three actions that the agencies should take: (1) improve implementation of government-wide cybersecurity initiatives, (2) address weaknesses in federal information security programs, and (3) enhance the federal response to cyber incidents. Figure 6 depicts the 10 critical actions to address the four major cybersecurity challenges. As we have previously noted, in order to strengthen the federal government’s cybersecurity posture, agencies should fully implement the information security programs required by FISMA. In this regard, FISMA provides a framework for ensuring the effectiveness of information security controls for federal information resources. The law requires each agency to develop, document, and implement an agency-wide information security program. Such a program should include risk assessments; the development and implementation of policies and procedures to cost- effectively reduce risks; plans for providing adequate information security for networks, facilities, and systems; security awareness and specialized training; the testing and evaluation of the effectiveness of controls; the planning, implementation, evaluation, and documentation of remedial actions to address information security deficiencies; procedures for detecting, reporting, and responding to security incidents; and plans and procedures to ensure continuity of operations. Since fiscal year 2010, we have made 3,058 recommendations to agencies aimed at addressing the four cybersecurity challenges. These recommendations have identified actions for agencies to take to strengthen technical security controls over their computer networks and systems. They also have included recommendations for agencies to fully implement aspects of their information security programs, as mandated by FISMA. Nevertheless, many agencies continue to be challenged in safeguarding their information systems and information, in part, because many of these recommendations have not been implemented. Of the 3,058 recommendations made since 2010, 2,384 (or 78 percent) had been implemented as of June 2019, leaving 674 recommendations (or 22 percent) unimplemented. In order to determine the effectiveness of the agencies’ information security programs and practices, FISMA requires federal agencies’ inspectors general to conduct annual independent evaluations. The agencies are to report the results of these evaluations to OMB, and OMB is to summarize the results in annual reports to Congress. In these evaluations, the inspectors general are to frame the scope of their analyses, identify key findings, and detail recommendations to address the findings. The evaluations also are to capture maturity model ratings for their respective agencies. Toward this end, in fiscal year 2017, the inspector general community, in partnership with OMB and DHS, finalized a 3-year effort to create a maturity model for FISMA metrics. The maturity model aligns with the five function areas in the NIST Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework): identify, protect, detect, respond, and recover. This alignment is intended to help promote consistent and comparable metrics and criteria and provide agencies with a meaningful independent assessment of their information security programs. The maturity model is designed to summarize the status of agencies’ information security programs on a five-level capability maturity scale. The five maturity levels are defined as follows: Level 1 (Ad hoc): Policies, procedures, and strategy are not formalized; activities are performed in an ad-hoc, reactive manner. Level 2 (Defined): Policies, procedures, and strategy are formalized and documented but not consistently implemented. Level 3 (Consistently Implemented): Policies, procedures, and strategy are consistently implemented, but quantitative and qualitative effectiveness measures are lacking. Level 4 (Managed and Measurable): Quantitative and qualitative measures on the effectiveness of policies, procedures, and strategy are collected across the organizations and used to assess them and make necessary changes. Level 5 (Optimized): Policies, procedures, and strategy are fully institutionalized, repeatable, self-generating, consistently implemented and regularly updated based on a changing threat and technology landscape and business/mission needs. According to this maturity model, Level 4 (managed and measurable) represents an effective level of security. Therefore, if an inspector general rates an agency’s information security program at Level 4 or Level 5, then that agency is considered to have an effective information security program. For fiscal year 2017, the inspectors general for six of the 23 civilian CFO Act agencies reported that their agencies had an effective agency-wide information security program. Specifically, for the five function areas in the NIST Cybersecurity Framework, most inspectors general reported that their agencies were at Level 3 (consistently implemented) for the identify, protect, and recover functions, and at Level 2 (defined) for the detect and respond functions. Table 3 shows the individual maturity ratings for each covered agency. In its efforts toward strengthening the federal government’s cybersecurity, OMB also requires agencies to submit related cybersecurity metrics as part of its Cross-Agency Priority goals. In particular, OMB developed the IT modernization goal so that federal agencies will be able to build and maintain more modern, secure, and resilient IT. A key part of this goal is to reduce cybersecurity risks to the federal mission through three strategies: manage asset security, protect networks and data, and limit personnel access. The key targets supporting each of these strategies correspond to areas within the FISMA metrics. Table 4 outlines the strategies, their associated targets, and the 23 civilian CFO Act agencies’ progress in meeting those targets, as of June 2018. In conclusion, by addressing the high-risk areas on improving the management of IT acquisitions and operations and ensuring the cybersecurity of the nation, the government has the opportunity to both save billions of dollars and advance the efficiency and effectiveness of government services. Most agencies have taken steps to execute key IT management and cybersecurity initiatives, including implementing CIO responsibilities, requiring CIO reviews of IT acquisitions, realizing data center consolidation cost savings, managing software assets, and complying with FISMA requirements. The agencies have also continued to address the recommendations that we have made over the past several years. Nevertheless, further efforts by OMB and federal agencies to implement our previous recommendations would better position them to improve the management and security of federal IT. To help ensure that these efforts succeed, we will continue to monitor agencies’ efforts toward implementing the recommendations. Chairman Connolly, Ranking Member Meadows, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Carol C. Harris, Director of Information Technology Acquisition Management Issues, at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kevin Walsh (Assistant Director), Meredith Raymond (Analyst-in-Charge), Chris Businsky, and Rebecca Eyler. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal government plans to spend over $90 billion in fiscal year 2019 on IT. Even so, IT investments have too often failed or contributed little to mission-related outcomes. Further, increasingly sophisticated threats and frequent cyber incidents underscore the need for effective information security. To focus attention on these concerns, GAO's high-risk list includes both the management of IT acquisitions and operations and cybersecurity. This statement summarizes federal agencies' progress in improving the management and ensuring the security of federal IT. It is primarily based on GAO's reports issued between July 2011 and April 2019 on (1) CIO responsibilities, (2) CIO IT acquisition review requirements, (3) data center consolidation efforts, (4) the management of software licenses, and (5) cybersecurity. The Office of Management and Budget (OMB) and federal agencies have taken steps to improve the management of information technology (IT) acquisitions and operations and ensure federal cybersecurity through a series of initiatives. As of June 2019, federal agencies had fully implemented 60 percent of the 1,277 IT management-related recommendations that GAO has made to them since fiscal year 2010. Likewise, agencies had implemented 78 percent of the 3,058 security-related recommendations that GAO has made since 2010. Even with this progress, significant actions remain to be completed. Chief Information Officer (CIO) responsibilities . Laws such as the Federal Information Technology Acquisition Reform Act (FITARA) and related guidance assigned 35 key IT management responsibilities to CIOs to help address longstanding challenges. In August 2018, GAO reported that none of the 24 selected agencies had established policies that fully addressed the role of their CIO, as called for by laws and guidance. GAO recommended that OMB and each of the 24 agencies take actions to improve the effectiveness of CIOs' implementation of their responsibilities. As of June 2019, none of the 27 recommendations had been implemented. CIO IT acquisition review . According to FITARA, covered agencies' CIOs are required to review and approve IT contracts. Nevertheless, in January 2018, GAO reported that most of the CIOs at 22 covered agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. Consequently, GAO made 39 recommendations to improve CIO oversight for these acquisitions. As of June 2019, 23 of the recommendations had not been implemented. Consolidating data centers . OMB launched an initiative in 2010 to reduce data centers. According to 24 agencies, data center consolidation and optimization efforts had resulted in approximately $4.7 billion in cost savings through August 2018. Even so, additional work remains. GAO has made 196 recommendations to OMB and agencies to improve the reporting of related cost savings and to achieve optimization targets. As of June 2019, 79 of the recommendations had not been implemented. Managing software licenses . Effective management of software licenses can help avoid purchasing too many licenses that result in unused software. In May 2014, GAO reported that better management of licenses was needed to achieve savings, and made 136 recommendations to improve such management. As of June 2019, 27 of the recommendations had not been implemented. Ensuring the nation's cybersecurity . While the government has acted to protect federal information systems, GAO has consistently identified shortcomings in the federal government's approach to cybersecurity. The 3,058 recommendations that GAO made to agencies since 2010 have been aimed at addressing cybersecurity challenges. These recommendations have identified actions for agencies to take to fully implement aspects of their information security programs and strengthen technical security controls over their computer networks and systems. As of June 2019, 674 of the recommendations had not been implemented. Since fiscal year 2010, GAO has made about 1,300 recommendations to OMB and agencies to address shortcomings in IT acquisitions and operations, as well as approximately 3,000 recommendations to agencies to improve the security of federal systems. These recommendations addressed, among other things, implementation of CIO responsibilities, oversight of the data center consolidation initiative, management of software license efforts, and the efficacy of security programs and technical controls. Implementation of these recommendations is essential to strengthening federal agencies' acquisitions, operations, and cybersecurity efforts.", "document_type": "gao"}
{"report": "We have previously reported that multiple federal programs provide or support early learning and child care, but the CCAMPIS program is the only one designed specifically to support the participation of low-income parents in postsecondary education by funding child care services. Education awards CCAMPIS competitive grants for up to 4 years to colleges to either support existing campus-based child care programs or establish new programs. Grant funds are primarily intended to help students who receive or are eligible to receive federal Pell Grants, but grantees may also serve low-income graduate students or low-income foreign students. Education reported that CCAMPIS grantees received about $15 million in fiscal year 2017 and about $33 million in fiscal year 2018. HHS administers other key federally funded programs that subsidize child care that may assist college students: the Child Care and Development Fund (CCDF), Temporary Assistance for Needy Families (TANF), and Head Start. CCDF is the primary source of federal funding dedicated to helping low-income families pay for child care. Parents must generally be working or attending a job training or education program to receive CCDF child care subsidies. States have flexibility to establish program eligibility criteria and other priorities within the program’s broad federal requirements. According to the HHS fiscal year 2020 budget justification, the CCDF program provides about $8.2 billion in federal funds per year for child care. In fiscal year 2017, the latest year for which preliminary data were available, CCDF provided child care assistance to about 1.3 million children each month. TANF is a federal block grant to states that supports cash assistance and a variety of other benefits and services to low-income families with children. States may use their TANF funds to directly fund child care, both for families receiving TANF cash assistance and for other low-income families in the state. In 2017, 9 percent of federal TANF funds used—or $1.5 billion—was spent directly for child care, while states spent $2.3 billion in maintenance of effort funds directly on child care, according to the HHS fiscal year 2020 budget justification. In addition, states transferred $1.3 billion in federal TANF funds to CCDF in fiscal year 2017. Head Start grants are awarded directly to public and private nonprofit and for-profit preschool and child care providers. The purpose of the Head Start program is to promote the school readiness of low-income children through the provision of educational, health, and other services. Most Head Start participants are 3- and 4-year-old children, but through the Early Head Start program, many infants and toddlers also receive early education and child care services. In fiscal year 2017, Head Start provided about $9.6 billion in grants and other services, and the program served over 1 million children. Under Title IV of the Higher Education Act of 1965, as amended, the federal government offers students financial assistance to help pay for their education. To be eligible for most federal student aid, a student must demonstrate financial need. Students are eligible for federal need based aid if the cost of attending a school is more than a family’s expected financial contribution. A family’s expected contribution is an approximation of the financial resources a family has available to help pay for a student’s postsecondary education expenses. The cost of attendance is calculated by each school using elements set forth in federal law. In addition to expenses such as tuition, fees, and room and board, the cost of attendance may include a dependent care allowance for students who incur such costs—including for child care— while in school. Being eligible for a dependent care allowance increases the student’s total cost of attendance, which could make the student eligible for additional financial assistance. Federal student aid is awarded primarily through grants and loans. Grants: Federal Pell Grants are the primary federal grant aid available to low-income undergraduate students with financial need. The maximum allowable Pell Grant was $6,095 for the 2018-2019 school year. A student’s expected family contribution is a key determinant of Pell Grant eligibility. Federal Direct Loans: Education provides loans to undergraduate and graduate students both with and without financial need. The maximum amount an undergraduate student may borrow in federal student loans is based on the student’s year in school and dependency status (see table 1). Students are classified as either financially dependent on their parents or financially independent. Students with dependent children are categorized as independent students for the purpose of calculating federal student aid. In addition, the total amount of grants and scholarships plus the total amount of federal student loans a student receives cannot exceed the total cost of attendance at his or her school. As a result, some students may be eligible for a lower federal loan amount than the maximum allowable amount, after grant and scholarship aid are factored in. For example, if an independent, first-year student’s total cost of attendance is $20,000, and the student receives $12,000 in grant and scholarship aid, the student can take out no more than $8,000 in federal student loans, which is less than the first-year limit of $9,500. Under federal law, schools participating in federal student aid programs are required to disclose certain consumer information, including information about college costs and the availability of federal student aid. We have previously reported that schools are increasingly using their websites to share consumer information, according to Education officials. Schools must also post a tool on their websites to help students estimate their cost of attendance based on their individual circumstances. Student parents comprised about 20 percent of undergraduate students, and many had characteristics that Education has reported can affect their likelihood of staying enrolled in school and completing a degree, such as being a single parent and working full time. In 2015-2016, an estimated 22 percent of undergraduate students (4.3 million of 19.5 million) were parents, according to our analysis of Education’s nationally representative NPSAS data. This percentage has remained close to one-quarter since 2003-2004, peaking at nearly 26 percent in 2011-2012. In addition, about 55 percent (2.4 million) were single parents and 44 percent (1.9 million) were working full-time while enrolled (see fig. 1). About 23 percent (nearly 1 million) were single parents working full-time while enrolled. In addition, undergraduate student parents in 2015-2016 were older than other students and mostly female, and a higher percentage were African- American compared to students without children. The average age of undergraduate student parents was 33, compared to 24 for all other undergraduates. A relatively small proportion of undergraduate student parents—15 percent—was age 23 or younger. Most student parents were female (71 percent). An estimated 23 percent of undergraduate student parents were African-American, compared to 13 percent of all other undergraduates (see app. II for additional information on student parent characteristics). Education data indicate that a lower percentage of undergraduate student parents earned a degree compared to students without children. According to our analysis of the 2009 BPS data—a 6-year follow-up survey of the cohort of first-time students in the 2003-2004 school year— an estimated 52 percent of undergraduate student parents left school without a degree within 6 years, compared to 32 percent of students without children (see fig. 2). Compared to students without children, a higher percentage of undergraduate student parents were enrolled in private for-profit schools, programs of two years or less, and online programs, according to NPSAS data for 2015-2016. An estimated 25 percent of undergraduate student parents were enrolled in programs taught entirely online, compared to 7 percent of all other undergraduates (see fig. 3). Undergraduate student parents had fewer financial resources available to fund their education than students without children, according to NPSAS data for 2015-2016. An estimated 67 percent of undergraduate student parents in 2015-2016 had an expected family contribution of zero, compared to 31 percent of students without children. Student parents also had an average expected family contribution of $9,180, compared to $17,506 for students without children. Accordingly, about half of student parents received a federal Pell Grant, compared to 35 percent of all other undergraduates. In addition, a higher percentage of student parents rely on federal student loans compared with other students. Approximately 62 percent of undergraduate student parents used federal student loans for their education, compared to 50 percent of students without children. About half of student parents had childcare expenses, in addition to their education and other living expenses. An estimated 45 percent reported paying for child care in 2015-2016, paying an average of about $490 per month (see fig. 4). An estimated 56 percent of student parents had a child age 5 or younger. However, about 60 percent of undergraduate student parents were enrolled in schools that did not offer on-campus childcare for students. CCAMPIS grantees reported that about 3,320 student parents received subsidized child care services for at least one academic term during the 2016-2017 school year, the most recent year for which performance data were available. The 85 schools that submitted CCAMPIS program data for this time period were about evenly split between 2-year (42) and 4- year (43) schools. The average amount awarded to each school for the year was approximately $182,000. Grantees reported that there were more children of CCAMPIS-eligible parents on waiting lists to receive child care services (over 4,200 children) than the number of children served by the 85 schools (about 4,000). Many of the children on waiting lists were infants and toddlers (65 percent). Most CCAMPIS participants in 2016-2017 were female and low-income undergraduate students, according to data reported by grantees. Further, most participants were undergraduates who either received or were eligible to receive federal Pell Grants (85 percent). About 10 percent were low-income graduate students. Almost 80 percent of CCAMPIS participants were female. A majority of female CCAMPIS participants attended 2-year schools (53 percent). In contrast, most male participants were enrolled in 4-year schools (70 percent). Grantee reported data also indicate that about half of CCAMPIS participants were single parents, although most male students served by the grant were married (78 percent). Just under half of CCAMPIS participants were white, 25 percent Hispanic or Latino, and 15 percent were Black or African-American. Grantees reported using CCAMPIS funds to subsidize a variety of child care services, either provided on-campus or in the community. Almost all grantee schools (84) reported using CCAMPIS funds to subsidize full-time child care, while 72 funded part-time child care (see fig. 5). Fewer schools funded before- or after-care or care during the evening (18 schools) or weekends (5 schools). Many grantees also reported funding parenting classes (e.g., workshops on time management and family nutrition) and meetings (e.g., student parent advisory board meetings). Grantees funded other activities with their CCAMPIS grants, such as student advising, free finals week child care, and child health screenings, according to grantee data. While some schools paid for the entire cost of child care for CCAMPIS participants, most provided partial subsidies using a sliding fee scale. Among the students that grantees reported as receiving a CCAMPIS- funded child care subsidy, over 75 percent had some out-of-pocket child care expenses (2,091 of 2,754). The median amount students paid out- of-pocket each month was about $160, after receiving about $385 per month in grant-funded subsidies. CCAMPIS grants can help schools address the demand for child care that their on-campus child care centers have not been able to accommodate. For example, prior to receiving the CCAMPIS grant, the on-campus child care center at one 2-year school on the West Coast served children age 2.5 to 5 years, according to school officials. With CCAMPIS grant funding, officials said they were able to expand on-campus child care for school- age children (ages 5-13). They said the grant also allows the school to offer drop-in child care when local elementary schools are closed. In another case, to help meet demand for child care among student parents that its on-campus child care center could not accommodate, an official from a 4-year school in the Rocky Mountain region said the school has established relationships with approximately 20 community-based child care centers and used CCAMPIS funds to help students pay for child care provided by these off-campus centers. These CCAMPIS grantees told us they also used grant funds to offer students supportive services in addition to subsidized child care. For example, the 2-year school on the West Coast runs a family resource center that provides free baby clothes, diapers, wipes, college textbooks, and school supplies for students and their children. The 4-year school has used CCAMPIS funds to pay for a graduate student to provide home visits for student parents who have concerns about their children's development or behavior. These schools also relied on funding from other sources to support student parents. For example, officials from the 2-year school we spoke with said the school uses local funds to host weekly faculty-led playgroups and state funding to increase student parent access to food pantries and housing assistance and to host evening parenting workshops led by a marriage and family counselor. In its budget justification to Congress, Education reports on the progress that CCAMPIS grantees make toward meeting the program’s performance goals; however, flaws in its calculations prevented Education from reporting reliable results. Education reports information on three performance measures for CCAMPIS participants: their persistence in school, the federal cost for each persistent student, and their graduation rate. The persistence rate for students participating in the CCAMPIS program is the percentage of program participants who receive child care services that remain in postsecondary education at the end of the academic year, according to Education’s published definition. To calculate this measure Education’s explanation states that it includes any student that has remained enrolled in school at the end of the school year, transferred from a 2-year to a 4-year school during the school year, or graduated during the school year. However, Education’s calculations did not produce results that align with this definition of persistence; specifically, the agency’s calculations did not identify students who remained enrolled until the end of the school year. Education counted a student as persisting if the grantee reported the student as enrolled and participating in the CCAMPIS program in either the fall or the winter terms and did not consider whether students were also enrolled in another term during the year. As a result, a student who was enrolled and participating in CCAMPIS during the fall term and withdrew from school during the spring term was counted as having persisted in school. Further, while Education’s calculation included students who graduated at some point during the school year, it did not include students who transferred from a 2-year to a 4 year school. Using Education’s definition, we recalculated the percentage of CCAMPIS participants who persisted until the end of the 2016-2017 school year. Specifically, we limited our analysis to students who grantees reported as having participated in CCAMPIS during either the fall or winter term and persisted to the spring term. While Education reported a persistence rate of about 74 percent in its fiscal year 2020 budget justification to Congress, our recalculation indicated that the persistence rate was an estimated 82 percent. The flaws in Education’s persistence rate calculation meant the agency also reported unreliable results for the federal cost per CCAMPIS participant who persisted in school. Given our recalculation of the persistence rate for students enrolled in both 2-year and 4-year schools, we calculated that the cost per CCAMPIS participating student who persisted during the 2016-2017 school year was about $7,550. Education reported this cost as $5,625 in its fiscal year 2020 budget justification to Congress. Education defines its graduation rate measure as the percentage of CCAMPIS program participants enrolled in 2-year schools who graduate from postsecondary education within 3 years of enrollment. According to Education’s published definition of this measure, it is intended to be consistent with Education’s standard graduation rate reported by all 2- year schools that receive federal student aid funds. Education does not calculate or report the graduation rate for CCAMPIS participants enrolled in 4-year schools. However, Education’s calculations did not produce results that aligned with its published graduation rate definition. To correctly calculate the graduation rate, based on its definition, Education would need to track the enrollment of a cohort of CCAMPIS participating students in 2-year schools who started school in the same year. This would allow Education to follow these students over 3 years to identify how many of them graduated during this time period. Instead, Education included in its calculation students that participated in CCAMPIS at any point during a 3- year period regardless of when they first enrolled in school. Education does not currently collect data from CCAMPIS grantees that indicate when students first enrolled in school, which it would need to accurately calculate the percentage of CCAMPIS program participants enrolled in 2- year schools who graduate within 3 years of enrollment. Education officials said that they were concerned that collecting such student enrollment information could be overly burdensome for grantees. Education officials acknowledged that they had not accurately defined this performance measure in the fiscal year 2020 budget justification to Congress. Specifically, Education officials said that although the published definition of the CCAMPIS graduation rate states it is consistent with the agency’s standard graduation rate measure, program officials actually calculate something different. Officials said that because they do not collect data on when students first enroll in school, they calculated the percent of CCAMPIS participants who graduated within 3 years of receiving CCAMPIS subsidies instead. While this alternative could be used as a CCAMPIS outcome measure, Education’s calculations did not align with this definition because they did not organize students into cohorts based on when they first started receiving CCAMPIS subsidies. Education has the data to do this, but would need to revise its calculations. Without either collecting the student enrollment data needed to calculate a standard 3-year graduation rate or accurately defining and calculating a different metric, Education is unable to report reliable college completion results for CCAMPIS participants. Having accurate performance measures is critical to assessing the effectiveness of the CCAMPIS program. Federal standards for internal controls state that management should ensure that measurements achieve the appropriate level of precision and accuracy for their reporting purposes. These federal standards also state that when communicating with external parties, managers should share quality information to help the entity achieve its objectives. However, Education has not calculated a persistence rate or graduation rate that accurately reflects the CCAMPIS program’s performance measures, as the agency has publicly defined them. As a result, the agency is unable to give a reliable accounting of CCAMPIS performance in its budget justification to Congress. Reporting unreliable performance information about the CCAMPIS program affects Education’s ability to manage the program and Congress’ ability to make informed funding and program decisions. College students may benefit from other key federal programs that fund child care services for low-income families—CCDF, TANF, and Head Start—but little is known about the extent to which they benefit. Child Care and Development Fund: HHS does not track how many families use CCDF child care subsidies specifically to pursue postsecondary education, as this is an optional program activity, according to HHS officials. HHS tracks and reports on child care subsidy use for training and education as a broader category. For fiscal year 2016, in about 6 percent of families receiving child care subsidies a parent was enrolled in training or education, and in an additional 7 percent of families a parent was enrolled in training or education while also employed, according to state reported data. These data also show that states differed in the extent to which parents pursuing training or education received such subsidies. For example, three states provided CCDF subsidies during an average month in 2016 to only a small number of families where a parent was not employed while pursuing education or training (less than one-half of one percent). In contrast, two states provided CCDF subsidies to about 20 percent of families where a parent was pursuing education or training while not employed. Some states have established policies that restrict postsecondary students’ access to CCDF funds, according to our analysis of an HHS report containing information on key state CCDF policies as of 2017. Specifically, four states have policies that limit students who are pursuing postsecondary education from receiving child care subsidies. Nine additional states do not allow access to child care subsidies for full-time students, unless they also meet work requirements. For example, Arizona, Kentucky, Pennsylvania, and Washington require full-time students to work 20 hours each week in addition to attending school. States have implemented other policies that affect CCDF subsidy access for postsecondary students. Program length: Eight states limit the length of time students may receive child care subsidies for enrollment in a postsecondary program. For example, Alabama, Kansas, New Hampshire, and Wisconsin limit postsecondary programs to 24 months. Program type: Ten states place restrictions on the type or nature of the postsecondary program students may pursue. For example, states may limit approved programs to vocational programs. Almost all states exclude graduate level programs. Academic Achievement: Four states have policies related to the minimum grade point average students must maintain to receive child care subsidies. For example, Illinois requires that students that do not work 20 hours per week maintain a 2.5 average. In 2016, HHS issued an informational memorandum with examples of policies and practices that could help states support parents who need child care assistance to participate in education programs. Such strategies included limiting the number of hours students were required to work and ensuring student parents are aware of child care services. See the text box for an example of how one school reported it is using CCDF funds to assist student parents. Example of using the Child Care and Development Fund (CCDF) to subsidize child care for student parents New York state uses CCDF funds to offer child care subsidies to students enrolled in its State University of New York (SUNY) and City University of New York (CUNY) schools. These colleges partner with nonprofit child care providers and receive CCDF funds to provide child care subsidies to income-eligible students. Schools receive additional state funds to help pay for child care operating costs, such as staff salaries, supplies, and meals for children. A school official from one of the state’s community colleges told GAO that CCDF subsidizes care during time students are in class. School officials submit students’ class schedules to the state when applying for benefits on students’ behalf. Students pay out of pocket for any time they elect to enroll their children in care that is in addition to scheduled class time. However, eligible families may not receive a CCDF child care subsidy, as states often do not have sufficient funds to serve all eligible families. HHS officials said that states must prioritize three types of eligible families: families with very low incomes, families with children with special needs, and families who are experiencing homelessness. Temporary Assistance for Needy Families: Student parents may also be eligible to receive child care subsidies from their state’s TANF program, but it is unclear how many students benefit from these subsidies. HHS officials said that although they track the amount of TANF funds states use to help families pay for child care, HHS does not collect information that would allow it to identify how many families are using child care to pursue postsecondary education. According to NPSAS data, an estimated 4 percent of undergraduate student parents reported that a member of their household received TANF assistance during either 2013 or 2014. For an example of how one school reported it is using TANF funds to assist student parents, see the text box. Example of using Temporary Assistance for Needy Families (TANF) to subsidize child care for student parents A TANF-funded program in Arkansas called the Career Pathways Initiative assists student parents with child care costs. This program also offers financial assistance for school-related expenses and a number of other supportive services. To access child care assistance from the Career Pathways Initiative, student parents must have an income at or below 250 percent of the poverty level or receive another state service, such as Medicaid. According to an official from one community college in the state, in order to receive a child care subsidy at that school, students must also work at least one hour per week. Research on the Career Pathways Initiative found that, of the nearly 30,000 low-income participants enrolled in Arkansas community colleges between 2006 and 2013, more than 52 percent graduated with a degree or certificate. This is more than double the 24 percent completion rate of all Arkansas community college students who did not participate in the program. Metis Associates and the Arkansas Research Center, “College Counts Evidence of Impact: A Research Analysis of the Arkansas Career Pathways Initiative.” January 2018. Head Start: Student parents may also enroll their children in Head Start programs, and some colleges have received Head Start grants or partnered with local Head Start programs to connect eligible student parents with services. HHS officials said they do not, however, collect information from Head Start grantees to identify how many grantees partner with colleges or how many Head Start grantees themselves are colleges. They also said they cannot quantify the number of student parents with children enrolled in Head Start programs because that information is not collected by the Office of Head Start, as this is not a primary purpose of the program. At many Head Start programs— particularly those located in early learning or child care centers—services are only available on a part day or part week basis, which may not align with a student’s school or work schedules. See the text box for an example of how one school reported it is supporting its student parents with Head Start funds. Example of using Head Start to subsidize child care for student parents A community college district in the Northwest that comprises two campuses, has received a Head Start grant for approximately the past 25 years. According to school officials, in 2018, the district managed 9 Head Start and Early Head Start centers located across the county, including centers on each of the district’s community college campuses. According to school officials, the district used Head Start funding to offer family well-being services for student parents, including helping families find housing, providing referrals for mental health counseling, and providing bus passes. In addition, the program connected families with medical and dental services. For the 2017-2018 school year, the district reported that over 88 percent of children enrolled in its Head Start centers were up-to-date on dental and medical screenings. In certain circumstances, a student parent may be eligible to receive additional federal student aid to help pay for child care. Students with dependent children in paid child care are allowed to request a dependent care allowance as part of their financial aid calculation, but whether it provides them with additional financial aid depends largely on other school costs. For example, at higher-cost schools, these students may already be eligible for the maximum amount of federal student loans before adding this allowance. In these situations, requesting a dependent care allowance would not increase the amount of federal student loans available to the student because they have already reached the maximum. At lower-cost schools, such as community colleges, costs may be low enough to allow student parents to access additional federal student loans by adding a dependent care allowance. According to our analysis of 2016 NPSAS data, an estimated 2.6 million student parents nationwide were eligible for a lower federal loan amount than the maximum allowable loan amount, so that adding a dependent care allowance might make them eligible for a higher federal loan amount. Figure 6 illustrates how adding a dependent care allowance can affect a student’s federal student loan amount at a school with a relatively low cost of attendance. In this example, adding a $3,000 dependent care allowance to a student’s cost of attendance increases the amount of federal student loans the student can borrow without exceeding the maximum amount available ($9,500 for a first-year, independent undergraduate student). At a higher-cost school, however, a student may already be eligible for the maximum possible loan amount, so adding a dependent care allowance would not affect how much the student could take out in federal student loans. Officials from seven of the 13 schools we interviewed said that adding a dependent care allowance would more likely increase the amount of federal student loans a student can borrow, rather than increase a student’s access to grant or scholarship aid. However, school officials we interviewed who recently added dependent care allowances to students’ financial aid calculations said that students with a dependent care allowance may, in some cases, receive additional grants from the state or school. Officials at most of the 13 schools we contacted said they receive relatively few requests for a dependent care allowance, generally ranging from zero to 47 in 1 year. Officials at the eight schools that had included this allowance in recent years reported different ways of determining the amount of the allowance. At two of these schools, officials said they allot a fixed amount for the dependent care allowance. Officials at the other six schools said allowance amounts are flexible and based on students’ documented child care expenses, and can vary depending on the number of children in child care. Fixed. One school in the Northwest surveys local child care providers annually to determine the community standard rate each year and bases its dependent care allowance amount on the average market value in the area, according to a school official. This rate is two tiered. The first tier is for children ages 0-5 and is $552 per month and the second is for children ages 6-12, with a monthly allowance of $276. At a school in the Midwest, an official said that the school provides a fixed allowance amount to all students who indicate they have a dependent child on the Free Application for Federal Student Aid (FAFSA). The allowance amount is based on the student’s enrollment status (e.g., $900 per school year for a student enrolled full-time). The school included a dependent care allowance for 30 percent of students who received financial aid in 2017-2018, according to a school official. Flexible. At one school in the South, students can request a dependent care allowance based on their actual child care expenses, according to a school official. Financial aid officials at the school use their judgment to determine if the request is reasonable for the community and may request documentation for requests exceeding $2,500 per semester. For example, students with more than one child may spend more than $2,500 per semester on child care. An official at another school in the West said it does not set limits for the allowance, but financial aid counselors use their judgment to counsel students if the requested amount looks too high for the student’s circumstances. The average allowance amount at this school is between $600 and $1,000 per month. Not all students may want to increase their student loans to finance their child care costs while in school, but access to additional federal student loans could be a useful option for those students who need it. We previously reported that officials at a national association of community colleges said that low-income students often use federal loans to help them pay for basic living expenses. These loans can be a valuable resource for some students who need additional funds to support themselves while in college, but some school officials cautioned that loans may not be the best choice for all students, and may worsen the financial position of already vulnerable students. However, two recent studies of 2-year students examined how federal financial aid improved students’ college outcomes. One study found that federal financial aid helped reduce the drop-out risk for some students, while another study found that students who received federal student loans had completed more college credits and earned higher grades than those who did not. About two-thirds of the college websites we reviewed (40 of 62) did not include information on their websites about the option to include a dependent care allowance in financial aid calculations. While schools are required to post certain college cost information on their websites and inform students about the availability of financial aid, they are not required to inform students about the dependent care allowance. At 29 of these 40 schools, the average net price for a low-income student is low enough that some students may qualify for additional loan amounts with the addition of a dependent care allowance. We reviewed the websites of schools that were CCAMPIS grant recipients. As CCAMPIS grant recipients, these schools serve students with a demonstrated need for child care services, and have shown an interest in helping students with their child care needs. Given that most of these schools do not provide information online about the option to include a dependent care allowance, other schools without the same focus on student parents may be even less likely to make information about this option available. If schools are not consistently informing students about the option to access additional federal student aid, student parents who could benefit may not be aware the option exists, and therefore not apply for additional aid that could help them pay for child care. Among the 22 schools that did provide information about the dependent care allowance on their websites, we found that the details they provided varied. They ranged from a general statement on the existence of the allowance to explicit instructions on how to request it, and, in some cases, the specific dependent care allowance amounts the school would provide. Three of the 22 schools that discussed the dependent care allowance on their websites did not post any instructions on how to add the allowance to financial aid calculations, and the instructions posted on the other 19 school websites varied. Such instructions included directing students to contact the financial aid office and submitting a financial aid award appeal. Among the 13 schools at which we conducted interviews, six schools included information about the dependent care allowance on their websites and seven did not. Officials at two schools that publicized the allowance on their websites said that the schools also took other steps to inform current students about the dependent care allowance. For example, one school official said the school references the allowance in emails to students about the on-campus child care center. Officials at the other schools—including the seven schools that did not include information on their websites—said that they did not use any other method to inform current students about the dependent care allowance. Further, none of the 13 schools made information publicly available to prospective students using anything other than the schools’ website, according to school officials. Additionally, although not generalizable, there was a relationship between those schools that used their websites to inform student parents about the option to include a dependent care allowance and whether they had provided this allowance in recent years. All six schools that provided dependent care allowance information online also reported including this allowance in the financial aid calculations of some students in recent years. Of the seven schools that did not include dependent care information online, just two of them reported that they had provided any dependent care allowances in recent years. Education uses its Federal Student Aid (FSA) Handbook—a comprehensive annual guide to regulatory and administrative requirements for federal student aid programs—to instruct school financial aid officials on how to incorporate the dependent care allowance in a student’s financial aid calculations. However, the handbook does not encourage schools to make information readily available to students via school websites about the option to increase federal student aid to help pay for child care or what steps they need to take to request it. Posting this information on school websites would make it more easily accessible to students, including prospective students who may not have access to publications located on campus. Education has used its handbook to encourage schools to adopt other suggested practices, such as informing students about how to save money on textbooks by either renting them or purchasing used copies. Moreover, Education officials said that they could include language in the handbook encouraging schools, as a best practice, to include information about the dependent care allowance on school websites along with other college cost information. Federal standards for internal control state that management should consider the availability of information and the extent to which information is readily available to the intended audience. Because the dependent care allowance can affect how much financial aid a student can access, making this information accessible on school websites would help ensure enrolled and prospective students are aware of all of their financial aid options. Student parents face many obstacles to completing college, including paying for child care, and are less likely to complete school than students without children. The CCAMPIS program offers financial assistance that can provide key support to help student parents complete college. However, because Education is not accurately calculating its CCAMPIS performance measures, the agency is not reporting reliable information on program outcomes. As a result, it is difficult for Education and Congress to evaluate the effectiveness of the program and make informed funding and program decisions. Federal student aid can be an important resource available to help student parents—who have fewer financial resources than other students—pay for child care while enrolled in school, but only if students are aware of the option to increase aid to help cover child care costs. Without information made widely available on school websites, student parents who could benefit may not know they can obtain additional aid. Moreover, the challenges this population faces in completing college make it especially important that they know about the types of assistance available to them. This information is particularly important for prospective students as they consider costs among different schools. Encouragement from Education for schools to provide information about the dependent care allowance on their websites could offer student parents more complete information about the financial aid resources available to them and how to request additional aid that could ultimately help them remain in school and graduate. We are making the following three recommendations to Education. The Assistant Secretary for Postsecondary Education should correctly calculate its CCAMPIS program persistence rate and cost per persisting student measures. (Recommendation 1) The Assistant Secretary for Postsecondary Education should either collect the CCAMPIS participant enrollment data needed to calculate a standard 3-year graduation rate or accurately define and calculate a different college completion measure. (Recommendation 2) The Chief Operating Officer of Federal Student Aid should encourage schools—through appropriate means, such as the FSA Handbook—to inform students via school websites about the availability of the dependent care allowance and how to request the allowance. (Recommendation 3) We provided a draft of this report to HHS and Education for review and comment. HHS provided technical comments, which we incorporated as appropriate. Education provided written comments, which are reproduced in appendix III. In its comments, Education stated that the report inaccurately characterizes the CCAMPIS performance data as unreliable and disagreed with the recommendation to correctly calculate its CCAMPIS persistence rate and cost per persistent student measures (recommendation 1). Regarding this first recommendation, Education acknowledged one error in its persistence rate calculation that affected the accuracy of both the persistence rate and cost per persistent student measures that it reported in its fiscal year 2020 budget justification to Congress. The agency noted that it plans to correct this error in its fiscal year 2021 budget justification. In addition, Education stated that it would explore a different model for calculating the persistence rate. While we support Education’s plans to correct the error it acknowledged and explore another model for calculating the persistence rate, Education’s persistence rate calculation has additional errors that the agency needs to correct to accurately calculate the CCAMPIS program’s persistence rate. For example, as we stated in the report, Education’s calculations did not include students who transferred, which the agency has reported should be included in its persistence rate measure. Moreover, we identified other technical errors in the numerator and denominator of Education’s formulas. For example, when calculating the persistence rate for CCAMPIS participants, Education counted students who declined to participate in the CCAMPIS program. We continue to believe that it is important for Education to report reliable program information to oversee and monitor the program and to provide accurate information to Congress. To do this, Education needs to take additional action to address all of the errors in its persistence calculations. Education disagreed with the recommendation to collect the CCAMPIS participant enrollment data needed to calculate a standard 3-year graduation rate or accurately define and calculate a different college completion measure (recommendation 2). Education stated that it could address our concerns with a modification to the description of the measure published in the agency’s budget justification. Specifically, Education said it plans to clarify that, for graduation rate data published for fiscal year 2020 and prior years, the term “within 3 years of enrollment” means within 3 years of enrolling in the CCAMPIS program. However, as we stated in the report, Education’s calculations do not align with this measure either. As for future years, the agency stated that it will explore transitioning to a new model of tracking CCAMPIS students over time, which, as described, would be consistent with Education’s standard graduation rate. However, Education noted that it must carefully balance the need to collect more informative and reliable data from grantees with the need to avoid adding unnecessary reporting burdens. We recognize that collecting the enrollment data needed to calculate the standard graduation rate could place a burden on grantee schools. Our recommendation therefore gives Education the option to define a different college completion measure and calculate it correctly. We continue to believe that Education needs to take steps to either collect the necessary enrollment data to calculate a standard 3-year graduation rate or correctly calculate a modified college completion measure. Education disagreed with the recommendation to encourage schools— through appropriate means, such as the FSA Handbook—to inform students via school websites about the availability of the dependent care allowance and how to request the allowance (recommendation 3). Education stated that it believes it would be inappropriate to indiscriminately encourage all schools to encourage student parents to borrow additional loans without considering a student’s individual financial circumstances. We did not suggest that schools should encourage all student parents to borrow additional loans to pay for child care. Instead, we recommended that Education encourage schools to make students aware of this potential option—which federal law makes available to students—to allow them to make informed financial decisions based on their personal circumstances. We made this recommendation because we found that schools were not consistently sharing information with students about the dependent care allowance or how to request one. We further recognized in the report that not all students may want to increase their student loans to finance their child care costs while in school; however, access to additional federal student loans could be a useful option for those students who may need it, so we believe students should be aware of this potential option. Education also stated that it would be inappropriate for the agency to require schools to take actions that could erode their student loan repayment and default rates. We did not recommend that Education require schools to take any action; rather, we recommended that Education encourage schools to inform students about a potentially available federal resource. In addition, Education did not provide any evidence that being aware of or using the dependent care allowance would negatively affect student loan repayment or default rates. Further, access to additional financial resources can help some students succeed in school if it allows them to work less and study more. For example, as cited in the report, recent research suggests that additional federal financial aid, including student loans, can lead to improved academic outcomes for some students. Education also expressed concerns about students borrowing more and noted there are numerous federal, state, local, and private options that offer low-income students affordable or no-cost child care. Education noted that the federal Child Care and Development Fund (CCDF) provides significant resources for student parents. However, as we noted in the report, some states either fund very few families pursuing education or training or have implemented policies that restrict access to CCDF subsidies for college students. Education also noted that many colleges, as well as countless faith-based organizations offer affordable or no-cost child care to low-income students. However, we found that nearly half of student parents reported paying for child care, with costs averaging about $490 per month. Moreover, even colleges that received a CCAMPIS grant had significant waiting lists for assistance and reported more children on waiting lists for CCAMPIS assistance than children receiving subsidized care from the CCAMPIS program. Finally, Education noted that the Federal Student Aid Handbook already contains information about the dependent care allowance and its inclusion in students’ financial aid calculations. While the handbook does include information to help school financial aid administrators implement a dependent care allowance appropriately, it is not a resource directed at student parents. For this reason, we recommended that Education encourage schools to take steps to inform students about the dependent care allowance and how to request one. We continue to believe that it is important for Education to encourage schools to inform student parents about the availability of the dependent care allowance and how to request it. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the Secretary of Education, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (617) 788-0534 or emreyarrasm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines 1) What is known about the characteristics and degree completion of undergraduate students with dependent children? 2) What is known about the Child Care Access Means Parents in School grant program and how reliable is Education’s reported outcome information? 3) What is known about student parent access to other key federal programs that help low-income families pay for child care? 4) To what extent do selected schools that serve student parents publicize information about the option to increase federal student aid to help pay for child care? This appendix provides details of the data sources used to answer these questions, the analysis we conducted, and any limitations to our analysis. Student Parent Characteristics and Degree Completion To examine the characteristics and degree completion of undergraduate student parents, we analyzed data from the Department of Education’s (Education) National Postsecondary Student Aid Study (NPSAS) from the 2015-2016 school year, the most recent year available. NPSAS data contain nationally representative, detailed demographic and financial aid data for college students enrolled in postsecondary education programs. These data come from institutional records, government databases, and interviews with students. We also analyzed Beginning Postsecondary Students Longitudinal Study (BPS) data from 2008-2009. BPS tracks students over a 6-year period and collects both survey and transcript data. The most recently completed BPS cohort first enrolled in postsecondary education in the 2003-2004 school year. We assessed the reliability of the NPSAS and BPS data by reviewing existing information about the data and the system that produced them. We also interviewed agency officials knowledgeable about the data. We determined these data to be reliable for our purposes. Because the NPSAS and BPS data are based on probability samples, estimates are calculated using the appropriate sample weights provided, which reflect the sample design. Unless otherwise noted, all percentage estimates from the NPSAS data analysis have 95 percent confidence intervals within plus or minus 3.8 percentage points of the percent estimate, and all number estimates from the NPSAS data analysis have 95 percent confidence intervals within plus or minus 9 percent of the estimate. Similarly, all percentage estimates from the BPS data analysis have 95 percent confidence intervals within plus or minus 3.7 percentage points of the percent estimate. We compared 95 percent confidence intervals for both NPSAS and BPS data to identify statistically significant differences between specific estimates and the comparison groups. The information collected from the interview portions of the NPSAS and BPS studies, such as the variables measuring whether students have children in paid child care and a student’s monthly child care costs, is self-reported and is not based entirely on federal determinations or cross- verified with outside sources. Students’ monthly child care costs may be prone to more error than simpler yes/no questions. Child Care Access Means Parents in School Grant Program To determine what is known about the Child Care Access Means Parents in School (CCAMPIS) grant program, we reviewed relevant program information and federal laws and regulations, and interviewed Education officials knowledgeable of the program. To provide illustrative examples of how selected colleges and universities use CCAMPIS grant funding to help students pay for child care, we interviewed officials from two schools. We selected these two schools based on expert and agency recommendations and research. We also considered level of degree program (2-year and 4-year) and geographic diversity. We also conducted descriptive analysis of the performance data that CCAMPIS grantees reported to Education for the 2016-2017 school year, the most recently available performance data at the time of our review. Education provided us with performance information from the 85 colleges and universities that received their first year of grant funding in fiscal years 2013 and 2014. At the time of our review, Education had not yet collected performance data for the 2017-2018 school year, which would be the first project year for the 62 schools that were awarded CCAMPIS grants in fiscal year 2017. Education collects annual performance information from CCAMPIS grantees using annual performance reports. Grantees report both summary information for all participating students as well as detailed information—listed separately—for each participating student. Education officials said that they do not use the summarized participant data for performance calculations because of inconsistencies they identified in grantees’ reported data. Instead, Education uses the detailed information grantees provide for each student. This student-level data includes student demographic information, the number of children served, CCAMPIS child care subsidies received, and child care fees paid. Grantees also report each student’s CCAMPIS participation and academic enrollment during four academic terms (fall, winter, spring, and summer). To assess the reliability of the CCAMPIS performance data, we reviewed related program documentation, interviewed knowledgeable agency officials, and conducted electronic data testing for missing data, outliers, and logical errors. When we reviewed the student-level data, we identified instances of incomplete and inconsistent data that affected which students could be identified as participating in the CCAMPIS program. To address these concerns, we excluded from our analysis students that grantees reported as having 1) declined to participate in CCAMPIS for each of the four academic terms, 2) no enrollment information for any of the four academic terms, and 3) an enrollment code not included in Education’s report instructions. We discussed our methodology for identifying program participants with Education officials, who agreed with our approach. We also omitted from our analysis any student for whom grantees reported duplicate information. After these corrections, we determined that CCAMPIS student-level performance data were sufficiently reliable for the purpose of describing participant characteristics. We determined that selected summary variables reported elsewhere in grantees’ performance reports were similarly reliable for the purpose of describing child care services funded and number of children on waiting lists. We also examined Education’s calculations underlying the CCAMPIS program’s performance measures that the agency reported in its fiscal year 2020 budget justification to Congress and assessed them against federal internal control standards related to data quality. Because of the flaws we identified in Education’s calculations, we developed our own calculations of Education’s performance measures using the 2016-2017 CCAMPIS program performance data. Student Parents Access to Other Key Federal Child Care Programs To examine student parents’ access to other key federal programs that assist low-income families with child care costs, we focused on the Child Care and Development Fund (CCDF), Temporary Assistance for Needy Families (TANF), and Head Start and reviewed relevant federal laws and regulations, agency guidance, and program documents. To describe the extent to which states have established CCDF program policies that limit postsecondary students’ access to child care subsidies, we summarized information published in the CCDF Policies Database Book of Tables: Key Cross-State Variations in CCDF Policies as of October 1, 2017. To provide illustrative examples of how selected schools use these programs to help college students pay for child care, we interviewed school officials from three colleges and universities that also received CCAMPIS grants. We selected schools based on expert and agency recommendations and research. We also considered level of degree program (2-year and 4- year) and geographic diversity. To assess the extent to which selected schools are publicizing information about the option to increase federal student aid to help pay for child care, we reviewed the websites of the 62 schools that first received a CCAMPIS grant in fiscal year 2017. These were the most recently awarded CCAMPIS grants at the time of our review. In order to review comparable information across all schools, we developed a standardized data collection instrument that we used to examine the availability of information on the option to include a dependent care allowance. We developed the instrument after reviewing the websites of 22 schools and interviewing officials from four schools to learn more about their practices for informing students about the dependent care allowance. We selected these four schools because they did not include information about the dependent care allowance on their websites, students attending these schools borrowed federal student loans, and at least one-third of enrolled students were age 25 or older. We conducted our review from October through December 2018. One analyst recorded information in the data collection instrument and another analyst checked and verified it. We collected complete information for all 62 schools and analyzed the information across schools. We did not, as a part of our review of school websites, assess the schools for compliance with any laws or regulations. Instead, this review was intended to understand what information is made available to students on school websites. To better understand these 62 schools and their practices, we examined additional federal data and interviewed financial aid officials from 13 of the 62 schools to obtain additional information about school practices for incorporating the dependent care allowance into students’ financial aid calculations. The results from our website reviews and school interviews are not generalizable. We selected these schools to achieve a mix of schools that did and did not publicize the availability of the dependent care allowance on their websites, as well as degree levels (2-year and 4- year), and geographic diversity. We also considered the cost of attendance for the average low-income student, after grant or scholarship aid. We also analyzed the characteristics of all 62 schools using 2016-2017 data, the latest available, from Education’s Integrated Postsecondary Education Data System (IPEDS), and examined the characteristics in the context of our website analysis. We also interviewed federal officials from Education about the information the agency provides to schools about the dependent care allowance. We assessed the reliability of the IPEDS data by reviewing existing information about the data and the system that produced them, and determined they were reliable for our purposes. We assessed Education’s practices against federal internal control standards for communicating with external parties. We conducted this performance audit from April 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individual named above, Michelle St. Pierre (Assistant Director), Karissa Robie (Analyst-in-Charge), Jennifer Cook, and Marissa Jones Friedman made key contributions to this report. Also contributing to this report were, Deborah Bland, Kevin Daly, Nisha Hazra, Gina Hoover, Michael Kniss, Sheila R. McCoy, Jean McSween, Brittni Milam, John Mingus, Jessica Orr, Joshua Paul, Benjamin Sinoff, and Adam Wendel.", "summary": "Student parents face many challenges, including paying for child care, that can make it difficult for them to complete a degree. The federal government supports student parents through Education's CCAMPIS program, which provides colleges funding for child care services, and federal student aid, which can also help students pay for child care. GAO was asked to provide information on student parents and the federal programs that support these students. This report examines, among other objectives, what is known about the characteristics and degree completion of undergraduate students with children; what is known about the CCAMPIS program and how reliable Education's reported outcomes are; and to what extent selected schools publicize the option to increase federal student aid to help pay for child care. GAO analyzed 2009 and 2016 federal student data (the most recent available) and CCAMPIS program performance data, reviewed how the 62 schools that were awarded CCAMPIS grants in 2017 publicized the student aid option to help pay for child care, and reviewed relevant federal laws and regulations and agency documents. GAO interviewed officials from Education and selected schools. More than one in five undergraduate students were raising children, and about half of student parents left school without a degree, according to Department of Education (Education) data. In 2015-2016, an estimated 22 percent of undergraduates (4.3 million of 19.5 million) were parents. An estimated 55 percent of student parents were single parents, 44 percent were working full-time while enrolled, and 64 percent attended school part-time. Undergraduate student parents had fewer financial resources to fund their education than students without children. Nearly half of student parents reported paying for child care, with monthly costs averaging about $490. A higher percentage of student parents left school without a degree (52 percent) compared to students without children (32 percent) as of 2009 (the most recent data available). Education's Child Care Access Means Parents in School (CCAMPIS) program helped about 3,300 students pay child care costs for about 4,000 children in 2016-2017. Another 4,200 children were on waiting lists to receive assistance. Most CCAMPIS participants paid some child care fees after receiving subsidies—the median payment each month was about $160. Education measures participants' persistence in school and graduation rate to assess the performance of the CCAMPIS program. However, flaws in its calculations of these two measures prevented Education from reporting reliable results, making it difficult for Education and Congress to evaluate the program's effectiveness. Some student parents could be eligible to increase their federal student loans to help pay for child care by asking their schools to include an allowance for dependent care expenses in their financial aid calculations. However, schools do not always publicize this allowance to current and prospective students. GAO reviewed the websites—where schools post other college cost information—of schools serving student parents and found that about two-thirds of these websites did not mention the allowance. Schools are not required—and Education does not encourage them—to inform student parents about the allowance. As a result, eligible student parents may be unaware of this option to request additional financial support to help them complete their degree. GAO is making three recommendations to Education to correct its CCAMPIS persistence and graduation rate calculations and to encourage schools to inform students about the option to increase federal student aid to help pay for child care. Education disagreed with GAO's recommendations, but described plans to improve its performance calculations. GAO continues to believe additional actions are warranted. (617) 788-0534 or emreyarrasm@gao.gov .", "document_type": "gao"}
{"report": "Disaster response can involve many federal, state, territorial, tribal, private sector, and voluntary organizations. The National Response Framework describes how the federal government, states and localities, and other public and private sector institutions should respond to disasters and emergencies. For example, state, local, tribal, and territorial governments are to play the lead roles in disaster response and recovery. Local emergency agencies—police, firefighters, and medical teams—are to be the first responders. In serving individuals who have disabilities and others who have access or functional needs, disaster responders at all levels are responsible for ensuring compliance with any applicable requirements for equal opportunity and non-discrimination. Federal agencies become involved in responding to a disaster when effective response and recovery are beyond the capabilities of the state and local governments. The Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act) authorizes federal funding and support to assist states and localities in responding to a disaster. This federal support is available under the Stafford Act when the President declares a major disaster or emergency in response to a request by the governor or by the chief executive of a tribal government. Under the National Response Framework, DHS is the federal agency with primary responsibility for coordinating disaster response, and within DHS, FEMA has lead responsibility. In addition to DHS, at least 29 other federal agencies carry out disaster assistance programs and activities. The National Response Framework identifies 15 emergency support functions (ESFs)—such as communication, transportation, and energy— and designates a federal department or agency as the coordinating agency for each function. Under the National Response Framework, FEMA is designated as the coordinating agency for ESF-6, which includes mass care, emergency assistance, temporary housing, and human services. The National Response Framework also designates primary and support agencies for each ESF. Both FEMA and the Red Cross are the primary agencies for ESF-6. As co-primary agencies, FEMA and the Red Cross are responsible for working closely to coordinate mass care and related services across sectors, including identifying resource needs, organizations with mass care capacity to address those needs, and establishing strategies to address resource gaps (see fig. 1). According to ESF-6, Red Cross also provides technical assistance to FEMA and serves as its principal mass care subject matter expert. The Red Cross works with FEMA to provide such assistance to state and local partners, according to FEMA. In addition, the Red Cross and FEMA facilitate the mobilization of resources and coordination within the whole community for the provision of mass care services. The Red Cross role in ESF-6 has shifted over time. At the time of Hurricane Katrina, Red Cross was a primary agency, but in the 2008 update to ESF-6 it became a support agency. However, in a 2013 update, Red Cross was shifted back to the primary agency role and given new responsibilities such as working with FEMA to identify available mass care capacity, anticipate mass care requirements, and establish strategies to address gaps in coordination. These responsibilities, among others, remain in effect under the current ESF structure. FEMA and Red Cross coordinate mass care with the support of other federal agencies such as USDA, the Department of Health and Human Services, and the Department of Defense (DOD), as well as voluntary organizations and partners at the state and local levels. There are also over a dozen federal agencies named as having supporting roles in ESF- 6 (see app. I for a list of ESF-6 support agencies). For example, DOD and its Army Corps of Engineers provides construction and engineering support for temporary housing and sheltering, including inspecting shelter facilities to ensure accessibility and suitability. In addition, ESF-6 names over 50 members of the National Voluntary Organizations Active in Disaster (NVOAD) that provide a wide range of services in support of mass care and other ESF-6 activities, including the Salvation Army, Southern Baptist Convention Disaster Relief, and Feeding America. State and local governments are vital to mass care provision and assessing their own communities’ response capabilities. According to ESF-6, local government agencies coordinate with voluntary organizations and the private sector to coordinate activities that meet immediate needs of disaster survivors. When those needs exceed local resources, the state may provide additional support. When these resources are insufficient, federal assistance may be requested through the FEMA regional office. We found in 2018 that FEMA faced a number of challenges that slowed and complicated its response efforts to the 2017 hurricanes, especially Hurricane Maria in Puerto Rico. The sequential and overlapping timing of the three hurricanes strained staffing resources and created logistical challenges in deploying additional assistance (see fig. 2). In particular, FEMA had already deployed staff and resources to support the response efforts for Hurricane Harvey in Texas when the other major hurricanes made landfall shortly thereafter. Moreover, FEMA’s response efforts in Puerto Rico and the U.S. Virgin Islands were complicated by a number of factors, including their distance from the continental United States and limited local preparedness for a major hurricane. We have previously reported that there is increasing reliance on the federal government for disaster assistance as the number of natural disasters increases and that costs will likely continue to rise as the climate changes. FEMA identified key findings related to mass care in its After-Action Report for the 2017 hurricanes, noting differences in shelter populations across the states, as well as the duration of shelter stays (see fig. 3). FEMA also reported facing challenges transitioning survivors out of group shelters in a timely fashion. In order to qualify for federal emergency preparedness funding, states and eligible urban areas (grantees) are required to regularly submit information to FEMA on their ability to respond to a disaster. Specifically, grantees first identify their own capability targets—such as for sheltering disaster victims—through the Threat and Hazard Identification and Risk Assessment, and then assess their progress toward these targets annually in the Stakeholder Preparedness Review (capabilities assessments). In fiscal year 2018, FEMA awarded $402 million to states and territories through the State Homeland Security Program, and $580 million to urban areas through the Urban Area Security Initiative, both of which require grantee capability assessments. FEMA provides guidance and technical assistance to state and local partners in their self-assessment efforts. According to officials, FEMA does not conduct its own evaluations of state, local, and voluntary organizations’ capabilities. FEMA and Red Cross established joint operation centers where they co- located with key partners such as the Salvation Army and NVOAD for each of the 2017 hurricanes, which facilitated coordination of shelter, feeding, and supply distribution. In addition to co-locating at FEMA’s National Response Coordination Center in Washington, D.C., FEMA, the Red Cross, and key mass care partners also co-located in state and local emergency operations centers (see fig. 4). Our prior work has found co-location of staff enhances interagency collaboration. Co-location contributed to relationship-building that facilitated communication and coordination of mass care services, according to FEMA, Red Cross, and emergency management officials in all four states we visited. See figure 5 for examples of how various agencies and sectors prepared food and supplies for mass care operations. Co-location meant workers could communicate face-to-face, as key partners needed to collaborate and communicate resource requests to FEMA and other agencies. In the U.S. Virgin Islands, DOD provided airplanes that enabled workers to fly between the islands to attend face- to-face meetings, according to FEMA regional officials. According to officials in two states we visited, this type of face-to-face communication facilitated building relationships. Moreover, officials in one state told us that co-location enabled them to communicate survivor needs directly to FEMA, which could then provide assistance. This was especially critical when power and cell phone service were out, particularly in Puerto Rico and the U.S. Virgin Islands, which experienced prolonged power outages and disabled electronic communications. Officials from federal agencies and the Red Cross described some additional benefits of co-location: USDA Food and Nutrition Service (FNS) officials said co-located ESF- 11 (Agriculture and Natural Resources) staff in the National Response Coordination Center provided food inventories to staff at the ESF-6 desk. Red Cross officials said they were able to quickly obtain supply trucks after Hurricane Harvey in Texas because the Red Cross had representatives at FEMA’s National Response Coordination Center. As we previously reported, DOD provided high-water vehicles, amphibious vehicles, and boats to transport supplies for the Red Cross and support FEMA logistics efforts. Officials in one state noted that in-person communication was especially useful for coordinating mass care when FEMA’s on-line system for submitting resource requests could not be used (see text box). Web Emergency Operations Center Resource requests can be communicated through the Federal Emergency Management Agency’s (FEMA) Web Emergency Operations Center (WebEOC), an electronic system that processes and tracks resource requests from state or local governments. WebEOC supports emergency management processes and functions by providing a real-time operating picture for FEMA headquarters, regions, and federal, state, local, and tribal strategic partners. In 2015, the Department of Homeland Security’s Office of Inspector General (OIG) found that WebEOC was not sufficiently integrated with key agency systems and could cause delays in providing disaster assistance. In 2017, WebEOC was used in two of our four selected states, and a predecessor system to WebEOC was used by one of FEMA’s regional offices, according to officials in these areas. WebEOC was useful in tracking resource requests, but in-person communication was more helpful for coordinating mass care, according to FEMA regional officials. In cases where staff could not access WebEOC, requests to FEMA were presented on paper, according to state officials. In 2018, FEMA reported that it had provided every state with FEMA WebEOC accounts so state users could submit resource requests directly to FEMA. WebEOC also allows FEMA to share aggregated data, such as shelter counts and feeding information, according to FEMA officials. Federal officials and partners in Texas, Florida, Puerto Rico, and the U.S. Virgin Islands described many challenges they encountered in coordinating mass care. While the concurrence and intensity of the 2017 hurricanes presented many unforeseen challenges, several state and local governments and voluntary organizations told us about issues related to mass care coordination and planning. As a result, some supply distribution, sheltering, and feeding needs went unmet. Miscommunication: Miscommunication among disaster workers affected supply distribution. For example, FNS officials reported challenges with delivering baby formula for about 28,000 infants in Puerto Rico through FEMA. One shipment of baby formula was lost and discovered frozen and unusable in Puerto Rico because FEMA officials were not aware that the products had been delivered, according to FNS’ 2018 After-Action Report. The report also stated that some perishable infant formula and food remained at a port in Florida several weeks after delivery. FEMA officials told us they shipped nearly 400 containers of infant formula and food in the first 3 months after Hurricane Maria, but that competition for port clearances made it challenging to coordinate, prioritize, and track supplies. As a result, some who needed these supplies may not have received them. FEMA officials also noted that they believe survivor needs were met by a combination of disaster relief supplies and the restoration of capacity at grocery stores. According to FNS’2018 After- Action Report, their officials met with FEMA and completed training on FEMA’s logistics system in 2018 to be able to better track future shipments of these products. Insufficient shelter staff: In Texas and Florida, emergency managers we spoke with described having unprecedented numbers of residents needing shelters but not enough staff initially to operate them. To address this gap, they said they relied on members of the state National Guard or local government and community organizations to staff shelters, but in some instances, shelters continued to have insufficient numbers of workers. To improve shelter staffing for future disasters, emergency managers in Florida told us they are working on training additional county employees to serve as shelter staff. Serving individuals who have disabilities: Public shelters faced challenges in some cases serving individuals who have disabilities, as we previously reported. For example, we reported in 2019 that some individuals who have disabilities faced challenges accessing services from local shelters, including restrooms. In another example, the lack of a quiet space in public shelters for individuals with autism negatively impacted their mental health, according to officials from an advocacy group. Extensive damage to hurricane shelters: In Texas, Puerto Rico, and the U.S. Virgin Islands, Hurricanes Harvey, Maria, and Irma damaged many buildings planned for use as hurricane shelters, according to emergency management and local government officials in these areas. As a result, some remaining shelters were at maximum capacity. In some cases, survivors and staff had to relocate to alternate sites during the hurricanes. For example, an arena in Humacao, Puerto Rico, and a Department of Human Services building in the U.S. Virgin Islands served as shelters when intended shelter buildings were destroyed by Hurricanes Maria and Irma, respectively (see fig. 6). Damaged roads and communications infrastructure: Damaged and flooded roads and the affected terrain in all four states contributed to challenges in distributing supplies, especially in Puerto Rico and the U.S. Virgin Islands. In Puerto Rico, FEMA received complaints from municipalities that food was not reaching neighborhoods in need. Impassable roads and no ability to communicate challenged FEMA’s plans, which had designated certain partners to distribute meals. Several weeks after Hurricane Maria hit, FEMA redesigned its distribution strategy, which included identifying the most vulnerable municipalities and having liaisons from the Puerto Rico Emergency Management Agency and the municipalities help coordinate the distribution. This enabled food to reach neighborhoods in need. Insufficient supplies: According to Puerto Rico Department of Education officials, FEMA was initially reluctant to provide water to schools serving as shelters because the schools were supposed to have their own water supply from the Puerto Rico Department of Education’s warehouses. However, Puerto Rico Department of Education officials said they only had enough water for shelter residents for 30 days. The agency requested help to meet additional needs, but FEMA did not have enough water or food boxes to help supplement the schools’ supply. There were several thousand people sheltered in the schools, but according to these officials, the Puerto Rico Department of Education was responsible for providing food and water to survivors whether or not they were shelter residents. Once the Puerto Rico Department of Education officials met with FEMA and demonstrated their need for water, they were able to secure supplies from FEMA. Early relocation of survivors to hotels: In Texas, the early relocation of survivors from shelters to eligible hotels under FEMA’s Transitional Sheltering Assistance program challenged mass feeding operations, according to two Texas emergency management officials and representatives of two voluntary organizations. As a result, some survivors did not receive food assistance, as described below. FEMA’s Transitional Sheltering Assistance program and the Department of Agriculture’s Disaster Supplemental Nutrition Assistance Program (D- SNAP), while not considered to be a central part of mass care under the National Response Framework, provide assistance to survivors after disasters and provide services that may intersect with mass care activities. According to officials in Texas and Florida, some aspects of how these programs were implemented contributed to unmet needs. Transitional Sheltering Assistance program: After the initial response effort ends and mass shelters close, FEMA’s Transitional Sheltering Assistance program is intended to provide short-term sheltering assistance to survivors who are still unable to return home. States request FEMA approval for Transitional Sheltering Assistance when they determine there is a need for short-term assistance. According to officials in Texas, the Transitional Sheltering Assistance program was activated earlier than they expected before mass shelters closed, resulting in survivors leaving early to stay in program-eligible hotels. According to these officials, the early activation resulted in the inability to track where survivors were located and where survivors needed assistance. According to an official at a voluntary organization, survivors in program-eligible hotels were going without food and some were eating coffee grounds in their hotel rooms because they had no food and no money to purchase food. Officials from state agencies and voluntary organizations that could provide assistance told us they could not get information from the hotels about how many survivors were guests at specific hotels, due to the hotels’ reluctance to provide guests’ information. When voluntary organizations tried to set up feeding operations at hotels, some hotels did not want the organizations to set up feeding operations on hotel premises, according to organizational representatives. One state official also said some hotels did not allow food distribution because of concerns about food sitting in rooms or the hotels’ preference that their guests use their restaurant facilities. D-SNAP: D-SNAP provides temporary food assistance for households affected by a natural disaster. D-SNAP usually begins after grocery stores have re-opened and families are able to purchase and prepare food at home. USDA’s FNS offers guidance to states that choose to operate a D-SNAP program on where and how to operate D-SNAP registration sites, including guidance on serving individuals who have disabilities and the elderly. For example, FNS guidance states that D- SNAP registration sites should offer extra cooling measures in a special waiting area for individuals who have disabilities and the elderly, and move these individuals to the front of regular registration lines. FNS’ After-Action Report identified, and state and county officials in Texas and Florida said they observed, D-SNAP registration sites that did not appropriately serve elderly individuals or those who have disabilities, such that some elderly survivors fainted while waiting in the heat. In one state we visited, officials from a local voluntary organization said the state government did not work with community-based groups to identify local D-SNAP registration sites. As a result, D-SNAP registration sites did not align with where survivors needed assistance, and according to these officials approximately 50,000 applicants came to one site and were turned away after waiting for hours in the heat. To help address these challenges, some elderly individuals and individuals with disabilities in Florida were allowed to register for D-SNAP over the phone in December 2017 and in May 2018, according to a state official. While the National Response Framework indicates that many agencies participating in disaster response formalize their responsibilities in written agreements, we found that key mass care partners did not have such agreements or that they did not clearly outline responsibilities at the time of the 2017 hurricanes. Although Red Cross has written agreements with some state and local partners, counties we visited in Florida, Texas, and the U.S. Virgin Islands—states where Red Cross shelters disaster victims—did not have written agreements that clearly specified what mass care services would be provided by the Red Cross. In Florida, several counties we visited did not have formal agreements with the Red Cross during the 2017 hurricane season. In lieu of a formal agreement, one of the counties had an email from the Red Cross stating that the Red Cross could support one of 15 shelters, according to officials and documents we reviewed. In some cases, even when written agreements were established, there were still unclear roles and expectations. For example, another Florida county did have an agreement in place, but county officials said they found out after the 2017 hurricane season started and shortly before Hurricane Irma that the Red Cross could support only eight shelters—a substantial decrease from previous years. Further, when counties did have written agreements with the Red Cross, the agreements did not always clearly define responsibilities. The agreements also did not specify how and at what point sheltering and feeding needs and capabilities should be communicated by the Red Cross to counties, which exacerbated challenges in providing these services after the hurricanes. After the 2017 hurricane season, officials in three states we visited said they have been working toward clarifying responsibilities in written agreements. Red Cross officials also said they have been developing letters of intent with local government partners since 2017, which describe what services can be provided by the Red Cross in these localities. However, our review of some of these new finalized agreements found they lack consistency and detail in what each of the parties can deliver regarding sheltering, feeding, and supply distribution. For example, Red Cross’ agreement with one Florida county specifies it can operate two shelters for about 1,000 residents, while its agreement with another county states it will “support shelters as resources allow.” Red Cross officials said written agreements may be difficult to change as needs and capabilities change over the course of the response to a disaster. Outside of written agreements, Red Cross officials said they collaborate with government agencies in other ways, such as participating in mass care exercises to create a shared understanding of mass care roles and work on jointly-developed response plans. Red Cross officials also told us that they need to be clearer with local jurisdictions about what they can and cannot provide, and that they need to reach mutual understanding with local governments about shared planning assumptions, such as the peak shelter population and what the Red Cross could provide within specified timeframes. According to Red Cross officials, neither they nor local governments established clear expectations in the past. In August 2017, the Red Cross launched a nationwide readiness initiative focusing on mass care planning discussions with local governments. This initiative also includes clarifying planning assumptions with local governments on a recurring basis. FEMA provides some guidance to states and localities about how to effectively coordinate with mass care partners, as well as a training course that encourages establishing written agreements. FEMA’s training materials for the mass care planning and operations course describe the differences in types of agreements that states and localities might establish with mass care partners, and specifically suggest defining the roles and responsibilities of each party. In addition, FEMA has helped developed tools for stakeholders to use when specifically coordinating mass care operations, such as the Multi-Agency Feeding Support Plan Template. This tool guides states, voluntary organizations, and other partners to clearly establish roles and responsibilities related to specific aspects of feeding, including the delivery of supplies and networking with other organizations to identify unmet needs. FEMA officials noted that all of their mass care templates encourage this type of planning for roles and responsibilities. However, FEMA guidance and training materials do not suggest detailing the specific responsibilities of each entity for mass care services in the written agreements. For example, the guidance does not explicitly prompt states and localities to use their written agreements to specifically establish how much shelter and feeding assistance an agency, government, or organization can provide. Our prior work has found that clarifying responsibilities through written agreements is critical to effective interagency collaboration. When an agency, government, or organization does not specifically indicate how much shelter and feeding assistance it can provide in a disaster, its partners may have unfounded expectations. For example, in Texas, officials in one city said when one large mass shelter first opened, there were only a small number of Red Cross volunteers, which was insufficient to operate and manage a shelter with tens of thousands of survivors; this was short of city officials’ understanding that Red Cross would fully staff the location from the beginning. Without further guidance from FEMA on how to establish effective written agreements, unmet expectations between state and local partners and voluntary organizations may persist and place disaster survivors at risk. Our prior work has also found that federal agencies engaged in collaborative efforts need to create the means to evaluate their activities in order to identify areas for improvement. In addition, federal internal control standards state that management should establish an organizational structure, assign responsibility, and delegate authority to key roles in order to achieve objectives. Moreover, the organizational structure should be evaluated periodically in order to meet the objectives and adapt to new situations. FEMA is responsible for coordinating and supporting the federal response to major disasters and relies significantly on the Red Cross as its co-primary agency under ESF-6. While FEMA and the Red Cross conduct after-action reviews following certain major disasters, including for the 2017 hurricane season, these reviews are focused on response and recovery efforts and do not include a broader review of roles and responsibilities of the co-primary agencies. Based on its findings on the 2017 hurricane season, FEMA called for some revisions to the National Response Framework and ESF annexes related to coordination across sectors. Accordingly, FEMA is currently revising the framework, which is considered a living document to be regularly reviewed to reflect experience gained from its use. However, FEMA has not proposed revisions to ESF-6 as part of its current review of the National Response Framework and ESF annexes. Specifically, FEMA has not reviewed whether the current structure of ESF-6 leadership roles and responsibilities is best suited for coordinating mass care, or whether there are responsibilities that should be shifted. ESF-6 is unique among ESFs in that it has a voluntary organization serving as a co-primary agency. Further, the Red Cross’ role under ESF-6 has changed multiple times since Hurricane Katrina. According to FEMA officials, FEMA is not required to review ESF-6 leadership roles and responsibilities, and instead focuses on the overall improvement of mass care delivery, including mass care activities and services. However, FEMA’s ESF Leadership Group noted that it was not always clear which agency that is part of an ESF is best suited to carry out a task. Evaluating collaborative efforts can help key decision makers within the agencies obtain feedback for improving both policy and operational effectiveness. Moreover, the National Response Framework is considered a living document, and DHS plans regular reviews to evaluate consistency with existing and new policies, evolving conditions, and the experience gained from its use. As we have previously reported, in disasters in which the federal government is involved, the extent and effectiveness of the Red Cross’s activities could have a direct impact on the nature and scope of the federal government’s activities. Given the challenges experienced with mass care during the response to the 2017 hurricanes, FEMA is missing an opportunity to identify areas for improvement and strengthen interagency coordination by not reviewing ESF-6 leadership roles and responsibilities. Many FEMA, Red Cross, local government officials, and representatives from local voluntary organizations we interviewed emphasized the importance of pre-existing relationships among established partners in coordinating mass care during the 2017 hurricanes. Relationships between these established mass care partners were often formed during non-disaster periods through regular conference calls and mass care training exercises. For example, officials in all four state emergency management departments we visited described positive relationships developed with FEMA staff through regular joint training exercises. FEMA’s Voluntary Agency Liaisons (VALs) help facilitate relationships between FEMA and established mass care partners. For example, VALs serve as contacts for non-governmental organizations active in disasters on a routine basis and during disaster response. In one FEMA regional office, officials said VALs serve as mass care specialists and regularly participate in calls with mass care partners. While such pre-existing relationships among established mass care partners facilitated mass care coordination, officials from voluntary organizations that did not have pre-existing relationships—unaffiliated organizations—reported challenges connecting with established mass care organizations, such as FEMA and the Red Cross, to share knowledge that could have informed response efforts. During the 2017 hurricane response, officials from unaffiliated organizations such as local advocacy groups and faith-based organizations told us they experienced challenges sharing critical information regarding needs, resources, and capabilities with established mass care organizations. These coordination challenges affected their ability to provide mass care services to certain populations. For example: A group of community organizations in Florida representing low- income and migrant populations had information on the location of people needing assistance, but reported difficulties in locating FEMA and Red Cross officials with whom to share that information. Representatives of a community group that assists victims of domestic violence in the U.S. Virgin Islands said there was no centralized way to share critical information and no plan for how to best address the issues facing these survivors. For example, they said the Red Cross had mapped damaged areas but was not sharing that information with community groups that could have provided assistance. This group said these maps could have been used to help locate people who were at particular risk. Red Cross officials stated that they experienced challenges in sharing damage assessment information in the U.S. Virgin Islands due to technology issues, which prevented them from being able to share these data securely with other organizations. Representatives from several faith-based organizations in multiple states told us they had food, water, and supplies, as well as local knowledge of need. Two of these representatives said FEMA and the Red Cross did not share information with them as to where they had already distributed supplies. This information was important so as to not duplicate efforts and to ensure those who still needed supplies were not overlooked, according to these representatives. Some migrant populations in all four areas we visited were hesitant to seek or receive assistance from federal, state, and local government agencies due to their undocumented immigration status, according to emergency management officials and community group representatives. Officials from multiple local voluntary organizations said they knew where migrant populations were located and what types of assistance they needed; they were trusted by these populations, but had difficulty finding FEMA or Red Cross representatives for sharing this information. Established mass care partners, including FEMA and the Red Cross, may not share information with unaffiliated organizations due to concerns about privacy, according to officials. Local governments also may not receive such information, because FEMA shares it with the states and the states are responsible for determining when to share it with local governments, according to FEMA officials. Local governments and unaffiliated organizations told us, however, that they do not need personally identifiable information, and that aggregated information about overall resource needs in certain locations would be sufficient for their purposes. For example, county officials in two states told us it was difficult to get FEMA data that would have helped them target areas for assistance, including those that other agencies might not have been able to reach. Similarly, the leader of a group that coordinates local voluntary organizations said they only needed aggregate-level data to identify needs in different counties. In addition, the Red Cross told us that mass care partners could access certain information from their RC View portal, which provides situational awareness information that supports resource requests and needs assessments. However, the Red Cross did not share such information with all its partners during the 2017 hurricanes because the technology was not yet ready. As of May 2019, Red Cross officials told us they are working on providing access to their RC View portal for several key partners, and that they intend to expand access to RC View to additional organizations in the future. ESF-6 states that Red Cross, in conjunction with FEMA, will facilitate the mobilization of private sector partners for the provision of mass care services. FEMA’s most recent strategic plan emphasizes the importance of a whole community approach to disaster response because individuals and local communities are the true first responders in a disaster. FEMA guidance states that the integration of non-traditional responders (which may include unaffiliated organizations) providing mass care services may be necessary during severe disasters. Federal internal control standards also emphasize the importance of communicating externally to key stakeholders. By not engaging in information sharing with unaffiliated organizations, FEMA and the Red Cross may miss opportunities to more accurately and efficiently coordinate mass care. As a result, those in need may not receive critical assistance in a timely way. Red Cross’ Training for Staff Deployed to Disaster Areas Red Cross provides training for its staff and volunteers deployed to disaster areas. This training includes information on the area of deployment, the nature of the disaster, and any cultural sensitivities they need to be aware of, according to Red Cross officials. However, unfamiliarity with local traditions and norms challenged Red Cross personnel when they arrived at disaster sites in 2017, and some local governments and community groups said this affected mass care coordination. Red Cross officials said they initially did not have enough Spanish speakers in Puerto Rico during the response to Hurricane Maria, for example. To address this need, they used Spanish-speaking workers from the International Red Cross community in Mexico and South America to assist with mass care coordination, according to Red Cross officials. As a result of challenges encountered during the 2017 hurricane season, Red Cross officials said that they have made changes to their approach intended to increase their engagement with the Latino community. This effort includes having materials translated into Spanish. To counter concerns among some disaster survivors about providing immigration status information, Red Cross officials said they have taken steps to clarify that the Red Cross does not collect this information. Information on the mass care capabilities of state and local jurisdictions that FEMA collected in 2016 and 2017 was not specific enough to aid the agency in its response to the 2017 hurricanes, according to FEMA’s After- Action Report and agency officials. The reporting process at the time of the 2017 hurricanes did not require grantees to report specific estimates of their current capabilities for providing mass care, which resulted in an incomplete picture of capabilities. With regard to mass care capabilities, FEMA did not ask grantees to report the number of people they could shelter, or how long they could maintain sheltering operations. For example, one state affected by the 2017 hurricanes identified gaps in the state’s capability to provide cots, blankets, laundry facilities, kitchens, and shelter facilities, but did not quantify the shortfall in its assessment submitted in December 2016. In addition, it was optional for grantees to describe deficiencies in their mass care capabilities at the time of the 2017 hurricanes, according to FEMA officials. One grantee affected by the 2017 hurricanes had indicated in its assessment from December 2016 that there were gaps in several mass care capabilities, such as shelter equipment and training for family reunification. However, this grantee chose not to include an additional description of what those gaps were. As a result of these limitations, FEMA and its grantees did not have specific information on state, territorial, and urban mass care capabilities or gaps at the time of the 2017 hurricanes. Officials from several states told us they were not aware of capabilities assessments being used during the response to the 2017 hurricanes, but some said this information could have been useful. For example, an official in one state said the information could be used for resource targeting. In submissions from the year following the 2017 hurricanes, 35 state and territorial grantees did not provide gap descriptions for mass care, which were optional at the time. According to FEMA, the agency recognized the limitations of the capabilities assessment data it had been collecting and began revising its methodology prior to 2017. FEMA’s After-Action Report for the 2017 hurricanes stated that one reason the agency began revising its capabilities assessment methodology was to provide more actionable information to use during response. Revisions were implemented for the 2018 reporting period that could result in FEMA collecting more specific and descriptive data on mass care capabilities, such as the number of people for whom the grantee can provide shelter, food, water, and relocation assistance as part of mass care (see table 1). FEMA’s 2018 guidance encouraged grantees to use a standardized format developed by FEMA, which allows grantees to insert community- specific numbers into a template when they report capability targets and estimates. The new standardized format also generates a quantitative statement of a grantee’s capability gaps (see table 2). Other new changes in FEMA’s revised approach will also allow the agency to collect more specific information on mass care capabilities. For example, starting in 2018, grantees were required to: Report the extent to which capabilities have been lost, built, or sustained over the previous year. Describe intended approaches for addressing capability gaps and sustaining capabilities built, including investments in resources. Describe the extent to which funding sources contributed to building or sustaining capabilities and improving disaster outcomes. Rate their level of confidence (1-5 scale) in the accuracy of their capability assessment for each target. These data elements have the potential to inform both disaster planning and response operations. FEMA revised its methodology for collecting capabilities assessment data in 2018, but it does not collect key information that could better inform its mass care planning. FEMA does not specifically require grantees to solicit the input of key partners in assessing mass care capabilities, according to officials, even though mass care generally depends on the work of such organizations. For example, the Salvation Army and the Southern Baptist Convention Disaster Relief often play key roles in mass care feeding, and the Red Cross manages sheltering in many locations, but they are not always included in mass care capabilities assessments submitted by grantees. FEMA officials told us that the new methodology should naturally foster engagement between grantees and their stakeholders, which should provide a better understanding of local capabilities for sheltering and feeding. According to these officials, under the new framework, FEMA requires grantees to report the number and type of government agencies and nongovernment organizations that participated in estimating capabilities (see fig. 7). However, by not requiring that grantees solicit input from organizations that provide mass care, or that grantees name specific organizations in their submissions, FEMA may rely on capabilities assessments developed without consultation with voluntary organizations providing key mass care services. We found that two of the six grantees included in our review did not report participating with the Red Cross, faith-based organizations, or other VOAD groups, in their 2018 assessments. An official from one of these jurisdictions confirmed that they had never reached out to voluntary organizations to take part in the assessment process, due to staff turnover and lack of time, despite relying on these organizations for providing mass care. An official from another jurisdiction said it is detrimental not to have voluntary partners’ input when preparing capabilities assessments because these partners are critical to providing mass care and play vital roles in disaster response. According to FEMA’s guidance, all organizations—not just government agencies—should be involved in preparedness efforts, and grantees should involve stakeholders throughout the process. FEMA’s guidance encourages a whole-community approach in which grantees include community stakeholders and subject-matter experts in estimating capabilities. Further, federal internal control standards emphasize the importance of designing systems for obtaining information that help an agency achieve its objectives. Without including key mass care providers when estimating capabilities and naming them in their capabilities assessments, grantees and FEMA may not collect reliable mass care capability estimates, or know who to contact in response to a disaster. States and localities may not be able to efficiently allocate their own resources to areas of unmet need and may be more reliant on outside resources during disaster response, which could have implications for the allocation of federal resources. FEMA reviews grantees’ capabilities assessments using standard checklists, but does not have a systematic process for providing feedback to grantees on their submissions in order to improve the usefulness of the information in them. FEMA officials use the checklists to assess the completeness and reasonableness of the submissions. Specifically, FEMA regional officials use the checklists to look for outliers, inconsistencies, invalid information, and inputs that to do not align with FEMA guidance or information that does not pass a “common sense” check. For example, one 2018 checklist we reviewed included comments from FEMA that the grantee’s capabilities assessment was only partially “complete and reasonable” because it showed no gaps for most capabilities, which might suggest that the targets it set are too low. FEMA officials told us that if the checklist identifies shortcomings in a grantee’s assessment, the regional office will send the assessment back to the grantee and communicate what needs to be changed. However, regional offices vary in their approaches to following up with grantees to obtain more information when potential issues are identified, and FEMA has not provided them with written guidance to standardize this feedback process. FEMA officials from two regional offices told us that the headquarters and regional preparedness divisions discussed follow-up protocols by phone, but they did not provide documentation that identified conditions or considerations for when to follow up with grantees or provide feedback. As a result, grantees may not receive consistent feedback from FEMA on their assessment of mass care capabilities and the information provided may remain incomplete. Rather than systematically providing feedback on the content of capabilities assessments, FEMA officials told us that they focus on identifying areas in which they can provide support to grantees. Their view is that communities know more about their own capabilities than the federal government does, and that it would not be appropriate to suggest major changes to the submitted assessments. Officials from one FEMA region said they view these submissions as self-assessments that are used for maintaining relationships with states and to help states better understand their capabilities and gaps. Officials also said that the FEMA regional office or the national preparedness office, or both, examine grantees’ disaster scenarios described in the assessments, the grantees’ self-assessed scores, and areas of grantee strengths and weaknesses to determine how FEMA can better support them. FEMA officials said they also phone grantees after each submission cycle to discuss challenges, including how to improve FEMA’s technical assistance and support, and how to make the process more useful for grantees. State officials we spoke to said that especially since the 2017 hurricanes, they have received more upfront guidance from FEMA than previously. Generally, FEMA’s support to grantees includes published guidance, annotated examples, technical assistance webinars, and a help desk for phone and email assistance. In 2018, FEMA also began piloting readiness visits where FEMA regional officials met with state and local grantees to discuss capability gaps identified in their assessments, according to officials. However, officials from three of the six grantees included in our review said that they did not receive key feedback from FEMA about their mass care capabilities assessments that would have been useful. An official in one state said it did not receive helpful feedback from FEMA prior to the 2017 hurricane season and, in particular, the official would have liked FEMA to confirm whether the state had completed its assessment correctly and completely, or if other information was needed. Officials from another state said that they did not receive any substantive feedback on their 2017 assessment. Officials from one urban area grantee said they did not receive technical feedback on areas of least readiness, and noted it would be helpful if FEMA could provide insight on the information provided in cases where the grantee had assigned a low confidence level in its capability assessment. Officials from four of the six grantees we spoke with said they would like additional clarity about the process from FEMA. For example, one state official said that understanding how FEMA uses capabilities information would have helped the grantee know how to improve its responses; get other agencies to participate more in the process; and solicit better, more tailored information from partners. This official noted that FEMA addressed this issue in 2019 by sharing more information about how it uses capabilities information. An official from another state said the state preparedness office would like input about how to obtain information from other agencies and how to assess capabilities at the local level. FEMA has an opportunity to use its review of capability assessments to improve its ability to assist with future disasters. After reviewing the 2018 submissions that used the new methodology, FEMA officials told us they are planning to develop criteria for evaluating future submissions and establish a regular process for providing feedback. By not systematically following up with grantees thus far, FEMA limits the extent to which it can build and supplement the emergency preparedness capabilities of these grantees. According to FEMA, it routinely analyzes capabilities assessment information for this purpose. FEMA has a strategic goal that involves supporting emergency managers in building the capacity to self- evaluate, monitoring the completion of improvement actions, and sharing insights. Providing feedback to grantees, including on the effective use of capability assessments as well as potential pitfalls, may help grantees develop their capability assessments and inform plans for how FEMA and the grantee will respond to disasters. Without clear protocols for providing feedback, grantees and FEMA may not possess complete, accurate, and reliable information on communities’ mass care capabilities, which will limit the effectiveness of the capability assessment process in contributing to the goal of national preparedness. The 2017 hurricane season presented unprecedented challenges for mass care service providers, and for survivors in Florida, Puerto Rico, Texas, and the U.S. Virgin Islands. While many partners coordinated extensively on the mass care response to 2017 hurricanes, unmet needs in sheltering, feeding, and supply distribution should spur FEMA and the Red Cross to consider the sufficiency of current agreements, especially with state and local governments. In particular, the 2017 hurricanes highlighted the importance of state and local governments understanding the services that mass care providers can deliver, particularly when disasters are severe or overlapping. Without FEMA providing more targeted guidance to help states and localities develop specific written agreements with voluntary organizations providing mass care services, expectations for what these organizations can provide may be unclear, putting disaster victims at risk. Moreover, without proactively considering the roles and responsibilities that the federal disaster framework establishes for agencies and organizations coordinating mass care, DHS lacks assurance that responsibilities are assigned to the entities best suited to carry them out. In addition, mass care coordination efforts during the 2017 hurricane season illustrated the importance of appropriately sharing information about capabilities and resources as part of advance preparation. During a disaster, local community groups are often the most informed about where needs exist, but also may not be connected with established mass care partners. Further leveraging community groups could prove vital for meeting mass care needs in a large-scale disaster, especially for the most vulnerable populations. FEMA does not explicitly require grantees to involve key mass care providers in their capabilities assessments. This may make it difficult for grantees to be well informed as to what they are actually capable of delivering locally. Further, FEMA has not documented a consistent, systematic approach to following up with partner governments on their reporting of mass care capabilities, while some grantees have said that additional feedback would be useful for preparedness and response efforts. As a result, some grantees may be ill-prepared to meet the mass care needs of the public during future disasters. We are making a total of six recommendations, including the following recommendation to the Secretary of Homeland Security: To strengthen the mass care response to future disasters, the Secretary of Homeland Security should direct FEMA to periodically review the current structure of ESF-6 leadership roles and responsibilities for coordinating mass care. (Recommendation 1) In addition, we are making the following four recommendations to the FEMA Administrator: To better clarify what mass care services voluntary organizations can provide, especially for severe or overlapping hurricanes, FEMA should strengthen its guidance to state and local governments to emphasize the importance of clearly defining roles and responsibilities related to mass care when state and local governments develop written agreements with partner organizations. This could include creating a guidance document or memo that calls attention to the issue and brings together existing resources, such as the Multi-Agency Feeding Plan Template and training materials, in a comprehensive and accessible manner. (Recommendation 2) To ensure assistance reaches all survivors, FEMA should develop mechanisms for the agency and its partners to leverage local community groups, such as conducting regular outreach to communicate and share aggregate information with these groups. (Recommendation 3) To ensure more accurate mass care capability assessments, FEMA should require grantees to solicit capabilities information from key mass care service-delivery providers in making capability estimates and identify these providers in their submissions. (Recommendation 4) To build the emergency preparedness capabilities of grantees, FEMA should develop systematic, documented protocols to determine the conditions under which it will follow up and provide feedback to grantees about mass care capability assessments. (Recommendation 5) We are also making the following recommendation to the American Red Cross: To ensure assistance reaches all survivors, Red Cross should develop mechanisms for it and its partners to leverage local community groups, such as conducting regular outreach to communicate and regularly share aggregate information with these groups. (Recommendation 6) We provided a draft of this report to DHS and the American Red Cross (Red Cross) for review and comment. DHS and American Red Cross provided written comments, which are reproduced in appendices II and III, and described below. In addition to its formal letter, DHS provided technical comments, which we incorporated as appropriate. We also provided relevant excerpts of the draft report to third parties, such as state and local government agencies and voluntary organizations we interviewed. These third parties provided technical comments, which we incorporated as appropriate. In its formal letter, DHS concurred with four of our recommendations and did not concur with one recommendation. Specifically, DHS and FEMA did not concur with our recommendation that FEMA should require grantees to include key mass care service-delivery providers in making capability estimates and identify these providers in their submissions. The letter noted the importance of involving stakeholders and subject matter experts at multiple levels of government and across sectors in order to develop complete and accurate assessments. However, DHS and FEMA said that requiring communities to include the key mass care providers in capabilities assessments is not the most effective approach for achieving this outcome. Because grantees cannot control which partners participate, DHS and FEMA said implementing this recommendation would increase the burden on grantees and could put certain communities at a disadvantage. In addition, DHS and FEMA said that because capabilities assessments are not limited to mass care, such a requirement may have unintended consequences for other partners. Instead, the letter stated that FEMA plans to continue working with the mass care community to identify the best solution, including encouraging collaboration at all levels of government. We modified our recommendation to address their concern. Specifically, we clarified that FEMA should require grantees to solicit information from key mass care partners and to identify these partners in their submission. This change acknowledges that grantees cannot compel partners to participate, but they can, at a minimum, invite such partners to participate in the process. We continue to believe that grantees should be required to make an effort to include mass care providers in developing their mass care capability assessments, as this is vital for developing high quality assessments. FEMA has emphasized the importance of having an active relationship and ongoing communication with key partners before disasters strike. In its Strategic Plan, FEMA states that pre-disaster coordination and communication among partners is critical to improve response and recovery outcomes. Thus, we do not believe it would be an undue burden to reach out to such partners as part of the capability assessment process. With regard to the remaining recommendations, DHS and FEMA described steps they have taken or plan to take to address the issues raised. While DHS concurred with recommendation 1 to direct FEMA to periodically review the ESF-6 leadership roles and responsibilities, the department considers this issue to be resolved because FEMA routinely conducts after-action reports and recently established a working group focused on performance metrics and corrective actions. We agree that these actions are important parts of effectively overseeing and evaluating ESF activities and results. While these efforts may address the responsibilities of ESF agencies, they may overlook the overall leadership roles of ESF agencies. In order to fully implement the recommendation, DHS and FEMA would also need to establish a process for reviewing the structure of ESF leadership roles on a regular basis. In concurring with recommendation 3, DHS and FEMA detailed several approaches they use to connect with local resources, including collaborating with VOAD groups at national, state, and local levels, and indicated that they consider this recommendation already implemented. Given the information gathered from several unaffiliated organizations in areas affected by the 2017 disasters, it is clear there is more work to be done in terms of sharing critical information about mass care needs and resources. Therefore, we continue to encourage FEMA to develop additional mechanisms to enhance outreach to organizations that may not be aware of existing approaches such as collaboration with the VOAD groups. Red Cross agreed with our recommendation to leverage local community groups through outreach and information-sharing. Red Cross noted several ongoing activities to engage such community groups and said the organization intends to continue expanding outreach, data-sharing, and engagement initiatives. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, American Red Cross, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512- 7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Department of Homeland Security - Federal Emergency Management Department of Homeland Security - Federal Emergency Management Support Agencies with Roles Directly Related to Mass Care (Feeding, Sheltering, Supply Distribution, and Family Reunification): Corporation for National and Community Service Department of Defense/ U.S. Army Corps of Engineers Department of Health and Human Services Department of Homeland Security Department of Veterans Affairs National Center for Missing & Exploited Children National Voluntary Organizations Active in Disaster (National VOAD) In addition to the contact named above, Scott Spicer (Assistant Director), Amy Moran Lowe (Analyst-in-Charge), Grace Cho, and Michael Walton made key contributions to this report. Also contributing to this report were Joel Aldape, Aditi Archer, Susan Aschoff, James E. Bennett, Deirdre Gleeson Brown, Alicia Cackley, Sarah Cornetto, Elizabeth Curda, Chris Currie, Kelly DeMots, Erin Guinn-Villareal, Camille Henley, Denton Herring, Sara Schibanoff Kelly, James Lawson, Matthew T. Lowney, Sheila R. McCoy, Jean McSween, Amanda R. Parker, Sara Pelton, Brenda Rabinowitz, Michelle Sager, Brian Schwartz, Almeta Spencer, Manuel Valverde, Jr., and Su Jin Yon.", "summary": "Three catastrophic hurricanes affected more than 28 million people living in Texas, Florida, Puerto Rico, and the U.S. Virgin Islands in 2017. Hurricanes Harvey, Irma, and Maria—which all made landfall within four weeks—caused a combined $265 billion in damage, and led to unprecedented demands for food and shelter, according to FEMA. FEMA and the Red Cross are the primary agencies responsible for coordinating mass care under the federal disaster response framework. GAO was asked to review their efforts. This report examines (1) FEMA's and the Red Cross' coordination of mass care in response to the 2017 hurricanes, and (2) FEMA's support and use of assessments of mass care capabilities for the 2017 hurricanes. GAO reviewed relevant federal laws, federal frameworks, and written agreements between federal, state, or local governments and various voluntary organizations providing mass care services. GAO also interviewed state, territorial, local, and voluntary organization officials in Florida, Puerto Rico, Texas, and the U.S. Virgin Islands; as well as officials from Red Cross, FEMA, other relevant federal agencies, and voluntary organizations. Following the three major U.S. hurricanes in 2017, disaster relief efforts of the Federal Emergency Management Agency (FEMA) and the American Red Cross (Red Cross) benefitted from locating key partners in the same place. In-person coordination was critical to maintaining communication in Puerto Rico and the U.S. Virgin Islands given the prolonged power outages and damage to public structures (see photo). However, some needs related to mass care—such as shelter, food, and supply distribution—were unmet. For example, local officials in Texas said flooded roads prevented trucks from delivering supplies. Providers encountered challenges in part because state and local agreements with voluntary organizations did not always clearly detail what mass care services could be provided. Additionally, FEMA guidance and training materials do not explicitly encourage states and localities to include in their written agreements the specific assistance each agency or organization can provide. This limits the benefits of mass care coordination and may put disaster victims at risk. State, territorial, and local grantees of federal disaster preparedness grants are required to regularly submit information on their capabilities to FEMA, and FEMA has provided related guidance and technical assistance. However, the information some grantees provided to FEMA was not specific enough to aid its response in 2017. Moreover, FEMA does not require grantees to specify the organizations providing mass care services in their capabilities assessments. Also, FEMA does not have systematic protocols for providing feedback to grantees to improve their assessments. These limitations hinder FEMA's efforts to strengthen emergency preparedness. GAO is making six recommendations, including that FEMA emphasize the importance of defining roles and responsibilities in its guidance to states and localities, require them to solicit information from key mass care providers in assessing capabilities, and develop protocols for providing feedback to grantees on capability assessments. FEMA agreed with all but one of GAO's recommendations; GAO maintains its recommendations are valid.", "document_type": "gao"}
{"report": "This section provides an overview of (1) the impact of nuclear or radiological events, (2) U.S. efforts to combat nuclear or radiological smuggling, (3) STC program goals and phases, (4) how the STC program operates, and (5) STC program activities. We previously reported that a terrorist’s use of either an improvised nuclear device or a radiological dispersal device could have devastating consequences, including not only loss of life but also enormous psychological and economic impacts. An improvised nuclear device is a crude nuclear bomb made with highly enriched uranium or plutonium. A radiological dispersal device —frequently referred to as a dirty bomb— would disperse radioactive materials into the environment through a conventional explosive or through other means. Depending on the type of radiological dispersal device, the area contaminated could be as small as part of a building or a city block or as large as several square miles. If either type of device were used in a populated area, hundreds of individuals might be killed or injured from the explosion or face the risk of later developing health effects because of exposure to radiation and radioactive contamination. U.S. efforts to counter nuclear or radiological threats are considered a top national priority. Federal agencies that have a role in combating nuclear or radiological smuggling are responsible for implementing their own programs under the GNDA. The GNDA comprises programs run by U.S. agencies, including DHS, the FBI, and NNSA, as well as partnerships with local, state, tribal, and territorial governments; the private sector; and international partners. These programs are designed to encounter, detect, characterize, and report on nuclear or radiological materials that are “out of regulatory control”, such as those materials that have been smuggled or stolen. Under DHS’s reorganization, there is no longer a specific directorate in charge of GNDA responsibilities, according to CWMD officials. However, CWMD officials said that GNDA responsibilities, such as identifying gaps in current nuclear detection capabilities, will be distributed throughout CWMD components. CWMD initiated the STC program with three primary goals: (1) enhance regional capabilities to detect and interdict unregulated nuclear and other radiological materials, (2) guide the coordination of STC cities in their roles defined by the GNDA, and (3) encourage participants to sustain their nuclear or radiological detection programs over time. According to the Program Management Plan, for each city, the STC program consists of three phases that provide for the development, integration, and sustainment of nuclear or radiological detection capability by cities to support state, local, and tribal operations. Phase 1: Development of initial operating capability. CWMD provides a mechanism for cities to develop initial operating capability to detect and report the presence of nuclear or radiological materials that are out of regulatory control. During phase 1, efforts focus on satisfying the immediate needs of state and local agencies in developing detection and reporting capabilities. This phase of the implementation is expected to take 3 years. Phase 2: Integration. CWMD provides additional resources to cities to allow them to develop enhanced detection, analysis, communication, and coordination functionality. These resources build on the integration of state and local capabilities with U.S. government activities and the GNDA that existed prior to cities’ participation in the STC program or were established during phase 1. This phase is expected to take about 2 years. Phase 3: Sustainment. CWMD provides indirect support to cities to sustain their capabilities. CWMD maintains a relationship with local program operators through assistance with alarm response and subject matter expertise. For example, it provides advice to cities on training, practice exercises, and questions as they arise. As of March 2019, Chicago and Houston are in phase 1 of the program, the National Capital Region is in phase 2, and New York—New Jersey and Los Angeles—Long Beach are in phase 3. The STC program operates as a cooperative agreement between CWMD and eligible cities. Accordingly, a substantial amount of interaction is expected between CWMD and program participants. A full cooperative agreement package for the STC program includes a notice of funding opportunity, notice of financial assistance award (assistance award), and general guidance documents for the program. It also includes requirements for cities to develop performance metrics for achieving key program tasks, such as purchasing equipment and conducting training, and to submit quarterly financial and performance reports. CWMD seeks applications for the program through a notice of funding opportunity, which lays out eligibility criteria and other requirements. According to CWMD officials, after New York—New Jersey was accepted into the STC program, CWMD opened up eligibility for the program to cities in DHS’s Urban Area Security Initiative (UASI) identified as having the highest risk for a terrorist attack. In the application process, one local government entity applies as the principal partner for the city (e.g., the New York Police Department is the principal partner for New York— New Jersey). Once CWMD accepts a city into the program, the city receives an assistance award, which details the approved budget for the year and may include an approved purchase plan. DHS prefers that a lead agency within the city distributes funds or any equipment purchased with program funds to the other state and local partners, such as police departments of neighboring jurisdictions, fire departments, or public health officials, among others. According to CWMD officials, every year cities in the program must apply for the next increment of funding from the program; if a city’s application is approved, it receives an amendment to its assistance award. There is a 5-year period of performance— corresponding to phases 1 and 2—under which the cities are eligible to receive and obligate funding. CWMD officials told us that they can grant an extension to cities to obligate the funds if they have not been able to do so within the original 5-year period. In phase 3 of the program, CWMD may provide technical assistance or subject matter expertise to cities but no further funding. Cities in the STC program may spend their funds on nuclear and radiological detection equipment, training, and administrative program costs, among other things. Several types of detection equipment may be approved for purchase. Personal radiation detectors (PRD) are wearable radiation detectors, approximately the size of a cell phone. When exposed to elevated radiation levels, the devices alarm with flashing lights, tones, vibrations, or combinations of these. Most PRDs numerically display the detected radiation intensity (on a scale of 0 to 9) and thus can be used to alert the officer of a nearby radiation source. However, they typically are not as sensitive as more advanced detectors and cannot identify the type of radioactive source. Radiation detection backpacks are used for primary screening and for conducting wide area searches, according to CWMD officials. These officials said the size of the detector contained within the backpack allows the operator greater detection sensitivity as compared to a PRD. CWMD officials also said these devices are especially useful for screening a large venue for radiological materials prior to occupancy by the public. Radiation isotope identification devices are radiation detectors that can analyze the energy spectrum of radiation, which enables them to identify the specific radioactive material emitting the radiation. Such devices are used to determine if detected radiation is coming from a potential threat or from naturally occurring radioactive material, such as granite. Mobile detection systems contain larger detectors. Typically, mobile detection systems interface with a laptop computer to display alarms and analysis, and are capable of both detection and identification. This type of system may be mounted on vehicle platforms, such as cars, trucks, vans, boats, or helicopters. Figure 2 shows examples of such equipment. Such equipment and associated training are the basis for the capability provided through the STC program. Officials we interviewed in one STC city told us that in order to operate the equipment, law enforcement, fire, health, and other state and local personnel must take training on the process for screening and for resolving alarms related to suspected nuclear or radiological material. As shown in figure 3, primary screening is the first step of the process: if an officer is able to determine the source of the alarm and deems it a nonthreat, then the case is resolved. According to CWMD officials, PRDs often detect nuclear or radiological materials that do not actually pose threats, such as radiation from medical treatments and from naturally occurring substances such as granite. An officer who is not able to determine the source of the alarm should initiate a secondary screening process; according to CWMD officials, secondary screening varies by locality. Officers with advanced training conduct secondary screening by using equipment such as radiological isotope identification devices to identify the type of source material detected. If, after secondary screening, officers still suspect a threat, they can contact technical “reachback,” which is a system that puts officers on the ground in communication with off-site specialists and resources. This technical reachback can provide greater expertise, including the ability to analyze the energy spectrum detected during screening and improve identification of the source and nature of the potential threat. CWMD officials said that the technical reachback may occur at the state and local or national level. State and local technical reachback procedures may vary, but national level technical reachback is standardized with 24-hour call centers run by the Department of Energy or U.S. Customs and Border Protection. According to CWMD officials, at any point in the screening process, if a secondary screening device is utilized, it is standard protocol for the officer to alert the FBI of the incident. If a threat is suspected, the FBI can deploy a team that is trained to respond to such a threat. DHS’s CWMD does not collect information to fully track cities’ use of STC funds for approved purposes and to assess the cities’ performance in the program. Specifically, CWMD tracks cities’ spending using program funds and some performance data through quarterly reports that it collects from cities, but does not collect other key data to track itemized expenditures and to assess how effectively cities achieved key performance metrics and program milestones or how they performed in exercises or drills that simulate a nuclear or radiological threat. CWMD tracks cities’ spending using program funds through quarterly financial reports it collects from cities, according to CWMD officials, but does not collect other key data to ensure that funds are spent for approved purposes and not spent on unrelated program activities. Specifically, CWMD provides each city eligible for additional funding an assistance award every year that includes an approved budget for spending categories such as program staff and equipment, but CWMD officials told us that CWMD does not track itemized expenditures to ensure that program funds were spent according to this budget. According to CWMD’s program agreements with cities, cities must have written approval from DHS in advance of spending obligated program funds for all equipment purchases in the amount of $5,000 or more per unit cost. However, CWMD officials told us that because of time and resource constraints, they do not collect data that cities maintain in their internal systems on the expenditures they actually made with program funds, even though CWMD’s program agreements with cities typically specify that CWMD or DHS’s Grants and Financial Assistance Division (GFAD) may access these data at any time. Furthermore, although GFAD officials told us that CWMD, in conjunction with the Grants Officer at GFAD, has the authority to conduct programmatic and financial audits and site visits to cities, these audits are infrequent and limited in their ability to ensure that cities’ expenditures were in accordance with CWMD’s approved purchase plans, which take into account program goals and objectives. According to these officials, in the program’s history, GFAD has conducted a total of two desk audits in two STC cities—New York—New Jersey and Los Angeles—Long Beach. GFAD initiated these two audits in 2015 and, according to GFAD officials, examined a small random sample of purchases. GFAD officials said they do not currently plan to conduct any additional audits in STC cities because of resource constraints. The extent of CWMD’s tracking of cities use of STC program funds is not consistent with federal internal control standards, which state that program management should design control activities to achieve objectives, such as comparing actual performance to planned or expected results and analyzing significant differences. However, according to CWMD officials, CWMD does not compare information on expenditures to cities’ approved purchase plans. As a result, DHS does not know the dollar amounts cities actually spent on program purchases. By regularly collecting detailed information from cities on expenditures made using program funds and comparing that information to approved purchase plans, CWMD would have greater assurance that cities spent funds as approved and that the expenditures are in keeping with program goals and objectives. Because CWMD does not regularly collect or maintain data on how cities spent program funds, we requested that it ask cities for these data and provide them for our review. Table 1 summarizes STC program funds obligated to and spent by each city and shows that New York—New Jersey spent about three-quarters of all STC funds—about $110 million of the $145 million cities spent as of June 30, 2018. As discussed above, New York—New Jersey was the pilot city for the program and was not subject to the $30 million limit on program funding. In addition to program funds, CWMD provided cities with nonmonetary assistance in the form of training, among other things. These data also show that cities spent most STC funds on equipment purchases. Specifically, about two-thirds of STC funds spent were for equipment to detect nuclear or radiological threats—about $95 million of the $145 million spent. Among the four cities that have purchased equipment, the largest equipment purchase category was PRDs, at over $40 million. Cities also reported purchasing equipment such as backpacks that contain radiation detectors; radiation isotope identification devices, which identify the type of radiation that is emitted from a source; and mobile systems that detect radiation from a vehicle on the ground or in the air. In addition, cities spent STC funds on training, staff, and contracts for training and other services, according to the data. Collectively, cities spent about 6 percent of program funds on training, 3 percent on staff, and 14 percent on contracts for training and other services. (See table 2.) CWMD tracks some performance data in quarterly reports it collects from cities, but it does not collect data to ensure that key performance metrics and program milestones identified in the Program Management Plan are achieved. For example, the quarterly reports CWMD collects from cities show the quantities of equipment, by type, that cities purchased with STC funds over the course of the program (see table 3), but these reports do not show whether the quantities of equipment met cities’ targets for equipment purchases. In addition, these reports do not show how much cities spent to purchase equipment for the program. CWMD’s notices of funding opportunity require cities to identify and submit key performance metrics for measuring progress against their objectives and a schedule of program milestones as part of their application to the STC program. According to the CWMD officials, each STC city submitted a Gantt chart—which plots planned activities over time—as part of its initial application. However, over the course of the program, CWMD found this tool had limited value and later gave each city the latitude to manage its program timeline as it deemed appropriate. In addition to the Gantt charts, CWMD officials said they provided cities with templates to develop checklists to document their progress against their objectives and compare their progress to planned actions. However, CWMD officials told us that they view this checklist as a guide to help cities plan rather than a firm program requirement, and cities have not submitted these checklists. Until CWMD requires cities to submit checklists or equivalent information on their progress in the STC program, it will not have complete information on how cities are performing compared to the key performance metrics and program milestones they identified for themselves. CWMD does not consistently collect information on how cities performed during STC program-funded exercises and drills that test cities’ ability to detect a simulated nuclear or radiological threat. CWMD’s notices of funding opportunity entered into after 2007 generally state under program performance reporting requirements that cities must submit operational reports, such as exercise after-action summaries. CWMD officials told us that they have provided STC cities with a template for preparing after- action reports—which assess a city’s performance during an exercise and include improvement plans following exercises that the program funded. These reports and plans could provide greater insight than quarterly performance reports on the effectiveness of cities’ capabilities. Nonetheless, available performance data show that CWMD did not enforce this requirement and that cities have submitted very few after- action reports. In their quarterly performance reports, the four cities other than New York—New Jersey reported completing 231 drills and exercises but only five after-action reports and one improvement plan. Officials from New York—New Jersey, whose performance reporting requirements differ from those of other cities according to CWMD officials, said that they complete over 100 drills and exercises per year but do not complete after-action reports because of the amount of paperwork that would be required. CWMD officials said that they did not enforce the requirement to submit after-action reports and improvement plans because they felt they could not force cities to report this information. Officials also told us that even though cities are aware of requirements in CWMD’s notices of funding opportunity to provide these reports and plans, cities may be reluctant to complete them because they could highlight weaknesses in their capabilities. We have previously found that a leading practice to promote successful data-driven performance reviews includes participants engaging in rigorous and sustained follow-up on issues identified during reviews. Until CWMD more fully assesses cities’ performance by consistently enforcing reporting requirements on how cities performed during exercises, it cannot assess the extent to which cities could effectively detect or deter a nuclear or radiological threat. DHS’s CWMD does not have assurance that cities can sustain threat detection and deterrence capabilities gained through the STC program, and cities anticipate funding challenges once STC program funding ends. Specifically, CWMD has not enforced sustainment planning requirements and has taken limited action to help cities sustain their capabilities, even though encouraging sustainment is one of its primary program goals. Cities anticipate funding challenges that will adversely affect their ability to sustain capabilities after the program. CWMD identified a key goal related to sustainment of cities’ nuclear or radiological detection program overtime in its Project Management Plan and requires cities to plan for sustainment. However, CWMD has not enforced sustainment planning requirements and has taken limited action to help cities sustain capabilities. CWMD’s program agreements generally require cities to submit plans describing how they will sustain capabilities gained through the program. For example, some of CWMD’s program agreements state that these sustainment plans must (1) explain how the city will support and sustain STC capabilities after completing the program, (2) describe potential sources of future financial support, and (3) commit to obtaining future financial assistance beyond CWMD support. However, CWMD accepted sustainment plans from four cities that did not identify how they will sustain capabilities once program funding ended. Each of the cities’ plans clearly state that they will have difficulty sustaining the program without additional federal funds. (See fig.4.) We also found that three of the four sustainment plans submitted to CWMD provide little detail about the specific equipment or training cities expect they will need after program funding ends. CWMD, however, did not take steps to address these concerns because CWMD officials said that they viewed finding alternative sources of funding to sustain capabilities as the cities’ responsibility. CWMD officials told us that they provide some ongoing technical assistance to cities in the sustainment phase of the program, but this assistance does not include additional funding. Thus far, New York—New Jersey is the only city of the two cities in the sustainment phase that has received technical assistance. Furthermore, CWMD did not consistently take steps to ensure that cities planned for sustainment when making purchasing decisions. As previously noted, program agreements generally require sustainment plans. Under CWMD’s Project Management Plan, CWMD expects cities to submit those sustainment plans to CWMD within 24 months of their initial award date. However, New York—New Jersey and Los Angeles— Long Beach did not submit their sustainment plans until many years after they began to receive STC funding. New York—New Jersey, for example, did not submit a draft sustainment plan until 2015, nearly 8 years after the city initially received funding because CWMD did not include a sustainment plan requirement for the city until its award for fiscal year 2011 and allowed 36 months to complete a sustainment plan. Similarly, Los Angeles—Long Beach did not submit a draft sustainment plan until 2017—5 years after the city initially received funding. In its program agreement with Los Angeles—Long Beach, CWMD required that a sustainment plan be submitted within 18 months of the award date, but CWMD did not enforce this requirement and accepted a sustainment plan from Los Angeles—Long Beach that was significantly delayed. It is unclear whether New York—New Jersey and Los Angeles—Long Beach ever finalized their draft sustainment plans. CWMD identified sustainment as a program goal but has not enforced its own requirements related to this goal or taken steps to analyze the risks sustainment challenges pose to its program’s success. Federal internal control standards state that program management should identify, analyze, and respond to risks related to achieving the defined objectives. Unless CWMD analyzes risks related to sustainment, works with cities to address these risks, and enforces sustainment planning requirements for cities that join the program in the future, program participants could see their radiological detection programs and related capabilities deteriorate over time. Officials from all five cities raised concerns to us about their ability to maintain capabilities over time without a dedicated source of funding once STC program funding ends. For example, New York—New Jersey officials told us that they informed CWMD they would not be able to maintain capabilities past 2021 without additional funds. Houston conducted an analysis of the funds needed to sustain the program and estimated that it would generally need over $1 million per year, primarily to replace equipment. City officials also said that they are already experiencing challenges that will have implications for funding and sustainment of the program. For example, Chicago officials said they are facing challenges regarding funding for training. These officials said CWMD told them that the company that conducted training in the other STC cities—at no cost to those cities—will no longer be the designated training entity. But a new training company has not been put in place. CWMD has not communicated a new plan for training Chicago’s officers on equipment that has already been purchased, and Chicago officials told us that they do not have additional funds to purchase training. Chicago officials said that if they do not receive future years of funding to conduct training on the already-purchased equipment, their planned capabilities could go to waste. According to several city officials, cities cannot rely on other DHS grant programs or federal grant programs or local sources of funding to sustain the STC program. Specifically, the officials said that cities’ ability to obtain funds from DHS’s UASI for sustainment may be limited, in part because of ineligibility by some partner agencies within an STC city. For example, law enforcement agencies in Santa Ana, California, received support from the STC program as part the Los Angeles—Long Beach city region, but they would not be eligible for UASI funds because Santa Ana is not in the Los Angeles—Long Beach UASI region. Moreover, UASI funds may not be sufficient to meet demand from cities. Houston city officials said that in fiscal year 2017, the city had requested $40 million in UASI funds from the UASI Committee, which distributes UASI funds in each city. But the committee had only $23 million to disperse to Houston. According to CWMD officials, other DHS grant programs within the Federal Emergency Management Agency—such as the Homeland Security Grant Program— may not provide a guaranteed source of consistent funding. Further, CWMD, NNSA, FBI, and city officials that we interviewed said they were not aware of any other federal grant program that cities could utilize to sustain nuclear or radiological detection capabilities. At a local level, several city officials said that there are competing funding priorities, such as preventing school shootings and addressing the opioid crisis, that require more money and attention because they affect the local community more directly every day. DHS has not (1) fully developed potential changes or documented a plan for making changes to the STC program; (2) identified the basis for such changes; and (3) clearly communicated with the cities, raising concerns about how the changes will impact them. CWMD officials told us that the agency is considering several potential changes to the STC program that would broaden its geographic reach and scope, but it has not fully developed or documented these changes and does not have a strategy or plan for implementing them. According to these officials, CWMD has not made any final decisions about potential changes and therefore has not developed any formal strategic documents. Based on our interviews with CWMD and city officials and some limited information in DHS’s fiscal year 2019 budget justification, we found that CWMD is considering making the following changes to the STC program: New program goals. CWMD officials told us that the STC program’s new goals would be to (1) enhance regional capabilities to detect, analyze, report, and interdict nuclear and other radioactive threats; (2) provide defense in large geographic regions; and (3) maximize deployment of detection equipment to nonfederal agencies to support federal nuclear detection priorities. The first program goal is one of the original program goals. However, CWMD officials said that under this proposal, CWMD would no longer include encouraging cities to sustain capabilities over time as a program goal because CWMD has discussed centralizing acquisition of detection equipment. Expansion of the program’s geographic coverage. Although legacy cities would still receive support under the new version of the STC program, CWMD officials said that the new program would provide national coverage and would include detection and deterrence activities in regions well outside of cities that UASI identified as having the highest level of threat and risk for a terrorist attack. Prior to proposing this change, CWMD had included in DHS’s fiscal year 2018 budget justification its intent to select a sixth and seventh city to participate in the program by the end of fiscal year 2018, which CWMD officials told us did not occur. In DHS’s fiscal year 2019 budget justification, CWMD stated its intent to support the development of nuclear or radiological detection capability for broader regions. Centralized acquisition of detection equipment. Instead of providing funding to STC cities to purchase detection equipment directly, CWMD officials told us that they would plan to centralize the acquisition process and purchase equipment on behalf of cities and regions. CWMD officials told us that they expect most of this equipment to be PRDs. A greater role for other agencies. CWMD officials said that although the STC program would remain a CWMD-only program, CWMD expects to work closely with the FBI, NNSA, and other DHS components, such as the U.S. Coast Guard and U.S. Customs and Border Protection, to detect and deter nuclear or radiological threats. Currently, according to CWMD officials, CWMD is working with the FBI and NNSA on a Domestic Detection Concept of Operations to coordinate their capabilities and functions. In addition, CWMD officials said that they plan to align the STC program with the existing FBI stabilization program, which responds to nuclear or radiological threats that have been detected. According to CWMD officials, CWMD would rely on FBI-led stabilization teams for guidance on selecting and distributing detection equipment for the STC program. Each stabilization team would have a partner STC program office to test, calibrate, and distribute detection equipment and to train operators, and the STC program would provide funding to cities to maintain these offices. Inclusion of chemical and biological weapon detection and deterrence within the program’s scope. The Countering Weapons of Mass Destruction Act of 2018 includes chemical and biological weapon detection and deterrence under the scope of CWMD but limits the STC program to detecting and deterring nuclear or radiological threats. CWMD officials told us that they had planned to add chemical and biological detection and deterrence efforts to the STC program, but such a change would now require a statutory change. The changes that CWMD is considering making to the STC program would be significant in scope. However, CWMD officials confirmed that CWMD has not documented these potential changes for key stakeholders, such as cities or partner agencies or provided strategic documents to describe how it plans to implement any changes. FBI officials we interviewed said that although the FBI supports greater coordination between CWMD and FBI-led stabilization teams, these programs will remain distinct and independent, with separate and dedicated lines of funding and personnel. These officials also said that CWMD and the FBI will not share equipment or technicians. According to NNSA officials, there is no new role defined for NNSA in the STC program, although NNSA leadership has asked its Radiological Assistance Program to contribute to the STC program where possible. NNSA officials also said that NNSA and CWMD will continue to coordinate on how information flows at a federal level if a nuclear or radiological threat has been detected. CWMD officials told us that they first introduced potential program changes to five STC cities at a meeting in February 2018 and met with leadership from these cities in August 2018 to discuss these changes further. In November 2018, we contacted officials from the STC cities to determine whether they understood how the STC program would continue. Officials from the STC cities made statements that indicated confusion and uncertainty about the future of the program. For example: Officials from one city told us they believed that changes to the STC program would apply only to new cities joining the program, even though CWMD officials told us that the changes would affect all cities going forward. Officials in another city told us that they left the August meeting with the impression that the changes presented were only preliminary proposals up for discussion and that the program could evolve in any number of directions. However, documents CWMD provided to us during interviews show CWMD’s intention to make several of the specific changes described above, even though the agency’s proposals for the STC program have not yet been finalized. Officials in most cities told us they believed that CWMD may provide them separate funding under the new program for sustaining capabilities developed to date, but CWMD officials told us that no final decisions had been made regarding future support for legacy cities. Most city officials we interviewed said that the August meeting provided a high-level overview of potential changes and little detail on how such changes would be implemented or affect city operations. Our past work has discussed the importance of strategic planning. We have reported that, among other things, strategic plans should clearly define objectives to be accomplished and identify the roles and responsibilities for meeting each objective. By developing a written strategic plan (or implementation plan) for any potential changes to the STC program, CWMD would provide clarity on what specific changes are planned and how CWMD plans to implement them. For example, given the uncertainty around the future direction of the program, a written strategy would help shed light on the exact role that CWMD envisions for partner federal agencies and how it plans to utilize these partnerships to acquire and distribute equipment. In October 2018, we briefed staff on the Senate Committee on Homeland Security and Governmental Affairs and House Committee on Homeland Security on our ongoing work, including our preliminary findings on the benefits of (1) developing an implementation plan for potential changes to the STC program and (2) assessing the effect of changes on the program. The recent Countering Weapons of Mass Destruction Act of 2018, signed into law on December 21, 2018, requires that CWMD develop an implementation plan that among other things, identifies the goals of the program and provides a strategy for achieving those goals. The act requires CWMD to submit this implementation plan to Congress by December 21, 2019. In addition, the law requires a subsequent report assessing effectiveness and proposing changes for the program, which could provide clarity on how proposed changes would align with STC program strategy and how CWMD plans to implement them. CWMD is also required to consult with and provide information to appropriate congressional committees before making any changes to the STC program, including an assessment of the effect of the changes on the capabilities of the STC program. CWMD has not identified a clear basis for making program changes, and the extent to which these changes can be attributed to new priorities under DHS’s reorganization is unclear. CWMD officials told us that they have not conducted any studies or analyses that would justify making changes to the program. In DHS’s fiscal year 2019 budget justification, CWMD discussed the importance of using the STC program to build capabilities far outside the immediate target areas, (i.e., cities) and the need to detect threats along the air, land, or sea pathways into and within the country that terrorists could potentially use to reach their targets. However, according to CWMD officials, CWMD has not identified a change in the nature or level of nuclear or radiological threats to explain its intent to move from its original city-focused model for the STC program to a more national approach. In addition, as stated above, CWMD does not collect information to fully assess the performance of cities currently in the program and therefore does not have a performance-based rationale for changing its program goals. CWMD officials said that the uncertainty surrounding making changes reflect a program under transition within an agency under transition—that is, the reorganization from DNDO to CWMD. The Countering Weapons of Mass Destruction Act of 2018 requires that before making changes to the STC program, the Assistant Secretary of CWMD brief appropriate congressional committees about the justification for proposed changes. This briefing is to include, among other things, an assessment of the effect of changes, taking into consideration previous resource allocations and stakeholder input. This new requirement would provide DHS an opportunity to identify the basis for potential changes. Assessing such changes could provide more reasonable assurance that they would strengthen the program and not result in unintended consequences, such as reducing capabilities in current cities. CWMD has not clearly communicated with the cities currently in the STC program about the status of potential program changes, raising concerns among these cities about how the changes will impact them. Although CWMD officials told us that the STC program would still support cities currently in the program, CWMD has not communicated to cities the levels of funding or other resources they can expect to receive going forward under the new version of the program. Notably, CWMD has not explained how expanding the program’s geographical coverage would affect cities currently in the program, including any effect on the availability of resources for these cities. City officials told us that they had several concerns, including the following, about CWMD’s potential changes for the STC program: Ability to choose equipment that meets a city’s needs. Some city officials we interviewed expressed concerns that the potential changes could detract from their ability to decide which types of equipment and support would best meet their needs. For example, officials in one city expressed concern that their planned calibration laboratory, which is used to maintain equipment, could become obsolete if CWMD chose to distribute PRDs that differ from the type the city currently uses. Furthermore, some city officials questioned whether CWMD and local FBI-led stabilization teams could adequately assess the specific equipment needs of state and local partner agencies within current STC cities. FBI officials told us that they do not assess the equipment needs of state and local partner agencies, but instead share information with those partners should they wish to acquire similar resources in order to maintain state, local, and federal capabilities. Scope of the program. Several city officials said concerns arose when CWMD requested that STC cities test toxic compound meters in 2018, raising questions about the scope of the program. These devices are designed to detect the presence of certain chemical weapons, but the STC program does not include detecting or deterring chemical weapons. Therefore, several officials felt that the request to test the devices was outside the scope of their mission. CWMD officials said that although the meters were not connected with the STC program, it made sense to reach out to the STC cities as CWMD already had a relationship with the cities and they were deemed appropriate locations. Role of the FBI. Some city officials told us that they had heard from CWMD that the FBI could play an expanded role in secondary screening in the future, which they felt could be problematic because of the FBI’s limited staff presence in field locations. FBI officials we interviewed said that they did not plan to conduct additional secondary screening in the future; instead they plan to formalize the secondary screening process that is already in place in STC cities. According to FBI officials, the bureau would always respond to situations requiring a threat assessment. Effect on future funding, including for sustainment activities. CWMD recently informed National Capitol Region officials that they would not receive an expected fifth year of funding because of planned program changes. City officials said that this change came as a surprise to them and now they will only be able to buy approximately 90 percent of the equipment they had originally planned to purchase. In addition, these officials said that they planned to use much of the fifth year funding for sustainment activities, such as training classes, and that this loss would adversely affect their current sustainment plans. CWMD officials said that under the new program, CWMD will take responsibility for sustaining the nuclear or radiological detection equipment distributed to cities, but, as described above, these officials said that no final decisions have been made regarding future support for legacy cities. Several city officials said that CWMD had not adequately responded to their concerns and that there has been less communication from CWMD about the STC program since 2017 as a result of the DHS reorganization. Further, several city officials said that they expected CWMD to set up quarterly meetings with STC city leadership following the August meeting, but they had not received any notifications about additional meetings. CWMD officials told us that they intend to have more frequent meetings with STC city leadership in the future but were unable to schedule a meeting during the first quarter of fiscal year 2019. Federal internal control standards state that management should externally communicate the necessary quality information to achieve the entity’s objectives. If CWMD does not clearly communicate to the cities how the existing program will operate until a new program is developed and implemented, these cities could face difficulties planning for the future and achieving the program’s detection and deterrence objectives. DHS’s STC program has taken steps to address a top-priority threat to national security by providing high-risk cities with resources to develop nuclear or radiological detection capabilities. However, in implementing the program, CWMD does not collect key data to track itemized expenditures and to assess how effectively cities achieved key performance metrics and program milestones or how well they performed in exercises or drills that simulate a nuclear or radiological threat. By regularly collecting detailed information from cities on expenditures made using program funds and comparing that information to approved purchase plans, CWMD would have greater assurance that cities spent funds as approved, and consistent with program goals, and that the expenditures are in keeping with program objectives. In addition, until CWMD requires cities to submit checklists or equivalent information on their progress in the STC program, it will not have complete information on how cities are performing compared to the key performance metrics and program milestones they identified for themselves. Further, until CWMD more fully assesses cities’ performance by consistently enforcing requirements, as applicable, that cities report on how they performed during exercises, it cannot assess the extent to which cities could effectively detect or deter a nuclear or radiological threat. CWMD identified sustainment as a program goal but has not enforced its own requirements related to this goal or taken steps to analyze the risks sustainment challenges pose to its program’s success. Unless CWMD analyzes these risks, works with cities to address them, and enforces sustainment planning requirements for future cities, program participants could see their radiological detection capabilities deteriorate over time. CWMD officials told us that the agency is considering several potential changes to the STC program that would broaden its geographic reach and scope, but it has not fully developed or documented these changes and does not have a strategy or plan for implementing them. The Countering Weapons of Mass Destruction Act of 2018 requires that the Secretary of Homeland Security develop a strategy and implementation plan for the STC program and a subsequent report assessing effectiveness and proposing changes for the program, which could provide clarity on how proposed changes would align with STC program strategy and how CWMD plans to implement them. CWMD also has not provided a clear basis for proposed program changes. The act further requires that, before making changes, the Assistant Secretary of CWMD brief appropriate congressional committees about the justification for proposed changes, which should include an assessment of the effect of changes. This new requirement could help ensure that changes will strengthen the program and not result in unintended consequences, such as reducing capabilities in current cities. In the meantime, CWMD has not clearly communicated how its proposed changes will impact cities currently in the STC program, raising concerns among these cities about how the changes will impact them. If CWMD does not clearly communicate to the cities how the existing program will operate until a new program is developed and implemented, these cities could face difficulties planning for the future and achieving the program’s detection and deterrence objectives. We are making the following four recommendations to CWMD: The Assistant Secretary of CWMD should ensure that the office regularly collects detailed information from cities on expenditures made using program funds and compares that information to approved purchase plans to ensure that these funds were spent as approved, consistent with program goals, and that the expenditures are in keeping with the objectives of the program. (Recommendation 1) The Assistant Secretary of CWMD should more fully assess cities’ performance by collecting information from cities on achieving key performance metrics and program milestones and enforcing reporting requirements on performance during exercises. (Recommendation 2) The Assistant Secretary of CWMD should analyze risks related to sustaining detection capabilities, work with cities to address these risks, and enforce sustainment planning requirements for future cities. (Recommendation 3) The Assistant Secretary of CWMD should clearly communicate to cities how the existing program will operate until a new program is developed and implemented. (Recommendation 4) We provided a draft of this product to DHS, the FBI, and NNSA for review and comment. In its comments, reproduced in appendix I, DHS concurred with our recommendations in the draft report. DHS identified actions it would take to address these recommendations, including revising quarterly reporting requirements to include detailed information on expended funds, performance metrics, program milestones, and exercise activities. In addition, DHS said it would engage with cities to procure and distribute equipment and to refurbish or replace it when appropriate, and would conduct on-site senior-level meetings with all current STC cities to continue discussions about new procedures, partnerships, and sustainment of capability. We believe these actions, if implemented as described, would address the intent of our recommendations. DHS also provided technical comments, which we incorporated as appropriate. The FBI and NNSA told us that they had no comments on the draft report. We are sending copies of this report to the appropriate congressional committees, the Secretary of Homeland Security, the Secretary of Energy, the Assistant Attorney General for Administration of the Department of Justice, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Ned H. Woodward (Assistant Director), Keya Cain (Analyst in Charge), and Alexandra Jeszeck made key contributions to this report. Chris P. Currie, Pamela Davidson, R. Scott Fletcher, Juan Garay, Tom James, Benjamin Licht, Greg Marchand, Cynthia Norris, and Kiki Theodoropoulos also contributed to this report.", "summary": "Countering the threat that a terrorist could smuggle nuclear or radiological materials into the United States is a top national security priority. In fiscal year 2007, DHS initiated the STC program to reduce the risk of the deployment of a nuclear or radiological weapon by establishing capability in state and local agencies to detect and deter such threats. Since the program began, five participating cities have spent almost $145 million in program funds. GAO was asked to review the STC program. This report examines (1) the extent to which DHS tracks cities' use of program funds and assesses their performance; (2) what assurance DHS has that cities can sustain capabilities gained through the STC program and the challenges, if any, that cities face in sustaining such capabilities; and (3) potential changes to the STC program and how DHS plans to implement them, the basis for these changes, and the extent to which DHS has communicated with cities about the impact of making changes. GAO reviewed DHS documents, conducted site visits to all cities in the program, and interviewed DHS and city officials. The Department of Homeland Security (DHS) does not collect information to fully track cities' use of Securing the Cities (STC) program funds for approved purposes and to assess their performance in the program. To reduce the risk of successful deployment of nuclear or radiological weapons in U.S. cities, the program establishes local threat detection and deterrence capabilities. DHS tracks cities' spending of program funds and some performance data through cities' quarterly reports but does not collect other data on itemized expenditures and to assess how effectively cities achieved performance metrics and program milestones or how they performed in drills that simulate a threat. For example, DHS does not compare information on expenditures to the purchase plans it approved for cities. As a result, DHS does not know the dollar amounts cities actually spent on program purchases. Expenditure data GAO requested show that cities spent most funds on detection equipment—that is, $94.5 million of the $144.8 million cities spent through June 30, 2018. By regularly collecting expenditure information from cities and comparing it to approved purchase plans, DHS could better ensure these funds were spent consistent with program goals. DHS does not have assurance that cities can sustain threat detection and deterrence capabilities gained through the STC program. DHS has not enforced planning requirements for sustaining those capabilities and has taken limited action to help cities do so, although encouraging sustainment is one of its primary program goals. Officials from the five cities in the program told GAO that they anticipate funding challenges that will adversely impact their ability to sustain capabilities over time. For example, several city officials said they cannot rely on other DHS or federal grant programs or local sources of funding once STC funding ends. Unless DHS analyzes risks related to sustainment, works with cities to address these risks, and enforces sustainment-planning requirements for cities in the program in the future, program participants could see their radiological detection programs and related capabilities deteriorate. DHS has not (1) fully developed potential changes or documented a plan for making changes to the STC program; (2) identified the basis for such changes; and (3) consistently communicated with cities, raising concerns about how the changes will impact them. DHS officials told GAO that the agency is considering several potential changes to the STC program that would broaden its geographic reach and scope and centralize acquisition of detection equipment, among other things, but it has not fully developed or documented these changes and does not have a strategy or plan for implementing them. A law enacted in December 2018 requires DHS to develop an implementation plan for the STC program. The law's requirements would provide DHS an opportunity to identify the basis for potential changes, and assessing such changes would provide more reasonable assurance that they would strengthen the program. Further, most city officials GAO interviewed said that in an August 2018 meeting, DHS provided a high-level overview of potential changes and little detail on how such changes would be implemented or affect city operations. If DHS does not clearly communicate to cities how the program will operate under potential changes, these cities could face difficulties planning for the future and achieving the program's detection and deterrence objectives. GAO is making four recommendations including that DHS regularly collect detailed information from cities on program expenditures; analyze risks related to sustainment, work with cities to address these risks, and enforce sustainment-planning requirements for cities in the program; and clearly communicate to cities how the existing program will operate until a new program is in effect. DHS concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "TSA is responsible for securing the nation’s civil aviation system, which includes domestic and foreign air carrier operations to, from, within, or overflying the United States, as well as the foreign point-to-point operations of domestic air carriers. Air carriers are responsible for implementing TSA security requirements predominantly through TSA- approved security programs. These requirements for air carriers include, among other things, measures related to the screening of passengers, baggage, and cargo; training of employees in security and screening procedures; testing employee proficiency in screening; and access to aircraft. In addition, TSA may impose additional requirements in the form of security directives or emergency amendments when more immediate action on behalf of air carriers is necessary. Whereas security programs include standing regulatory requirements, directives are not intended to be permanent in nature and are expected to eventually be canceled, for example, should the threat or vulnerability cease to exist. If TSA determines that safety and the public interest require the incorporation of measures from directives into security programs, TSA will amend the programs after providing affected air carriers with notice and an opportunity for comment. TSA may impose directives based on the following: Threat information. Directives may focus on addressing specific threats. For example, in June 2017, TSA announced new security requirements in a directive on international aviation security that included, among other requirements, heightened screening of personal electronic devices larger than a cellphone for air carriers operating last point of departure flights to the United States. The directive was based on intelligence that terrorists were attempting to smuggle explosive devices in various consumer items (e.g., laptops). Events. Terrorist attacks, both successful and foiled, can also lead to the issuance of directives. For example, in response to a terrorist plot in July 2017, TSA issued security directives and emergency amendments in September 2017 requiring air carriers transporting cargo to the United States from last point of departure airports in Turkey to submit advance cargo data to DHS. Results of foreign airport assessments and air carrier inspections. TSA may issue directives requiring air carriers to implement security measures to account for vulnerabilities at foreign airports identified during TSA assessments (e.g., inadequate perimeter fencing). Through its foreign airport assessment program, TSA determines whether foreign airports that provide service to the United States maintain and carry out effective security measures. TSA does not have authority to impose or otherwise enforce security requirements at foreign airports and, therefore, often seeks to address security vulnerabilities it identifies by working with domestic and foreign air carriers to implement security measures to mitigate any identified vulnerabilities, as appropriate, while also working with the foreign governments to address the vulnerabilities. Measures required by directives to mitigate vulnerabilities identified during foreign airport assessments include screening passengers at the boarding gate and posting guards around parked aircraft. Air carriers must implement the security measures set forth in applicable directives in addition to other requirements imposed and enforced by TSA to remain compliant with TSA security requirements. However, TSA may approve the use of an alternative measure used in place of an existing measure required by a directive if TSA determines the alternative measure will achieve the required level of security. For example, an air carrier may request to use a different screening technology than specified in a directive, which TSA could approve if it determines the security outcome is commensurate, according to TSA officials. To ensure that air carriers meet applicable security requirements, including those imposed through directives, TSA conducts inspections of domestic and foreign air carriers. As of March 2019, there were 46 TSA directives related to air carrier operations at last point of departure airports in effect. These directives most often applied to passenger operations in specific foreign locations (see fig. 1). The characteristics of the 46 directives vary in a number of ways. For example: Of these directives, 25 were for foreign air carriers and 21 were for domestic air carriers. More than half of the current directives were issued prior to 2014, and most have a stated duration of 2 years or less. According to TSA officials and corroborated by our analysis, threat-driven directives, just over 60 percent of all directives, are generally in effect for about a year. Our analysis also shows that all directives with 3-year durations pertain to cargo-related threats, which TSA officials said are unlikely to change in the near term. However, foreign airport vulnerability- driven directives may have time horizons of about 2 years because, according to TSA officials, it could take foreign governments or airport authorities longer than 1 year to take corrective actions to address the deficiencies. About 30 percent of directives apply to air carrier operations worldwide and 70 percent apply to air carrier operations at airports in certain countries. Specifically, there are 33 directives that apply to specific countries in Asia, Africa, the Caribbean, Central America, or the Middle East. The security policies the directives address also vary and include passenger screening (23 directives), cargo (23), checked baggage (12), and aircraft security (12), among others. Although TSA generally issues directives with expiration dates, it may decide to renew the directive based on the threat or vulnerability. TSA has renewed or updated the 46 directives related to air carrier operations at last point of departure airports an average of five times through its review process. TSA has developed a process for reviewing directives that requires intra- agency coordination across TSA offices, and we found that the agency generally implemented this process in the 43 reviews it conducted from January 2017 to March 2019. However, TSA has not defined when or how it is to coordinate with air carriers and other industry stakeholders in reviewing directives. In addition, when TSA officials have coordinated with domestic and foreign air carriers, they have not documented the input air carriers provided. Further, TSA has not defined the process for cancelling or incorporating directives into air carrier security programs and certain directives are longstanding. TSA issued a management directive in 2012 and associated standard operating procedures in 2016 to guide the development and review of directives, among other policies. The management directive provides high-level TSA policy for the development, external coordination, and issuance of, among other things, directives. Further, the management directive describes the roles and responsibilities individual TSA offices have when developing directives, which are shown in table 1. The standard operating procedures describe the process that TSA is to apply to ensure that subject-matter experts coordinate to identify the problem and formulate solutions while obtaining appropriate stakeholder input from air carriers and their associations. TSA is to develop and review directives in accordance with steps identified in the TSA management directive and associated standard operating procedures, which include creating a team, developing a problem statement and options, drafting the policy document, and obtaining interoffice and management approval. Figure 2 shows how TSA is to apply this process to the development and review of directives. The directive development process can take weeks if, for example, the directive is merely expanding the applicable locations from an existing directive, or several months, as was the case of the broad-scoped worldwide directive regarding personal electronic devices and other international aviation security measures. Based on our review of TSA documents and meetings with TSA officials, TSA has generally adhered to its internal process to update or cancel directives in the 43 reviews conducted from 2017 to March 2019. Key steps of this process include the following: Initiate review process and create team. TSA initiates the directive review process because of (1) new intelligence, (2) feedback received from air carriers, (3) new information received from foreign airport assessments or air carrier inspections, or about 90 days before a directive is to expire, according to TSA officials. After initiation, TSA’s standard operating procedures state that all TSA offices that have equity in the security policy subject matter are to be invited to participate in the directive review team. TSA may also include other DHS components or government agencies in the team. According to our review of TSA documentation, in all 43 reviews TSA created an interoffice team that included Policy, Plans, and Engagement; Global Operations; and Chief Counsel. Our analysis also shows that at least 28 reviews included TSA Intelligence and Analysis. Further, certain teams reviewing vulnerability- driven directives included TSA field staff, such as TSA international industry representatives, TSA representatives, and regional operations center managers who have responsibility for the overall planning and conduct of assessments and air carrier inspections at foreign airports. In addition, according to TSA officials and corroborated by TSA documentation, they coordinated as needed with other federal partners— including DHS, the State Department, where TSA has a liaison embedded, and the National Security Council. Develop problem statement and options. To understand the environment and the nature of the threat, the team is to request a threat summary from TSA Intelligence and Analysis and, based on the intelligence summary, prepare a problem statement outlining the threat and vulnerability. The team is also to develop a proposed solution to the problem statement, and the team may decide to propose to either update or cancel the directive through an action memo written for TSA leadership. TSA officials stated that criteria for updating and canceling directives include whether the threat or vulnerability remains, intelligence, feedback from air carriers, and the results of air carrier inspections and airport assessments. Updates can result in a renewal of the policy with no significant changes or a revision to the security measures. All reviews developed a problem statement and documented proposed solutions in action memos that also included draft updates to the directives, as applicable. Further, Intelligence and Analysis officials stated that they provided the team with updated threat information and recommendations on whether the directive required a change or could be canceled. Obtain final approval and disseminate directive. If the team does not decide to cancel a directive, the completed drafts are to be routed to TSA offices for review and then to the administrator or assistant administrator for final approval. After final approval, TSA is to post worldwide directives to DHS’s Homeland Security Information Network. However, if the directive is country or region-specific TSA officials stated that they post an announcement on the network that the affected air carriers should contact their TSA international industry representatives for more information. According to our file review, TSA documented interoffice approval to the updates or cancellations for at least 41 of the 43 reviews. Further, the teams obtained administrator or assistant administrator approval in all 43 reviews. TSA headquarters officials and international industry representatives as well as air carrier representatives confirmed that directives are posted to the Homeland Security Information Network. TSA’s Standard Operating Procedures for Security Policy Development, Coordination, and Issuance requires TSA officials to obtain input from key stakeholders and representatives of affected regulated parties (e.g., air carriers), as appropriate, as shown in figure 2. However, the standard operating procedures do not explain what “as appropriate” means. Figure 3 shows a TSA international industry representative briefing foreign air carrier representatives on the 2017 international aviation security emergency amendment. TSA is also to incorporate key stakeholder input into the final draft as appropriate. TSA officials stated that they generally obtain mostly informal feedback from domestic air carriers and their associations during quarterly meetings with industry or through air carriers’ regular coordination with TSA international industry representatives. However, TSA officials stated that the extent to which they include air carriers and aviation associations in the review process varies. For example, TSA officials may share drafts of the directives with the air carriers for feedback or decide to only discuss the content of the directive at a high level, depending on the threat or vulnerability, air carriers involved, whether the changes needed are time-sensitive, and countries involved. While TSA’s standard operating procedures state that TSA is to coordinate with air carriers and other industry stakeholders, the feasibility of doing so when issuing or updating directives (particularly when the time frame is short and security measures must reach the industry rapidly due to a specific threat or recent event) is limited, according to TSA officials. These officials noted that engagement is more likely to take place when a directive is up for renewal or is being updated. Representatives from domestic air carriers confirmed that TSA has coordinated with them but also told us that the coordination has been inconsistent. Officials from four of the five domestic air carriers (three passenger and one all-cargo air carrier) and two associations representing domestic air carriers we met with told us that coordination with TSA on directives has improved since 2017. The air carrier representatives also stated that coordination with their TSA international industry representatives on directives was helpful. For example, all three domestic passenger air carriers we met with stated that TSA international industry representatives coordinated closely with them during the multiple revisions of the 2017 directive pertaining to international aviation security and that TSA made changes based on the feedback or approved alternative security measures they requested. However, representatives from both passenger and all-cargo domestic air carriers and an association that represents them identified ways that TSA coordination has been inconsistent when reviewing directives. For example, representatives from one of these air carriers stated that TSA sometimes coordinates with them when revising directives but generally seeks feedback from the same one or two air carriers that fly globally or operate out of the most last point of departure airports and does not always coordinate with air carriers that do not have a large global operation. In addition, a representative from another air carrier told us that TSA only coordinated with them after they insisted on being included in the process to revise a security directive; TSA did not proactively seek their input. Similarly, representatives from an association told us that TSA did not coordinate with them on the 2018 revision of a security directive issued to increase security requirements applied to cargo shipments originating in, transiting through, or transferring from Egypt until the association first reached out and that the process was not fully transparent. Although TSA verbally shared anticipated changes, representatives from the association were not clear what the new language would say or what it meant. While TSA sometimes includes domestic air carriers in the directive review process, foreign air carriers are generally not included, according to their representatives. Representatives from four of the five foreign air carriers we met with told us that they have a productive relationship with their TSA international industry representative and that TSA has made changes to emergency amendments based on alternative security measures they have requested. However, representatives from all five foreign air carriers noted that TSA generally does not solicit their input when reviewing emergency amendments. Representatives from the association that represents foreign air carriers told us that TSA’s coordination is sporadic; sometimes TSA would coordinate with industry when revising directives, and other times TSA would not—even though such coordination was necessary, in their view. For example, the representatives from this association stated that TSA has not consistently provided them with draft directives to review prior to issuance. These officials also stated that TSA coordination usually comes after they request being included in the process. All three international industry representative groups responsible for coordinating with foreign air carriers confirmed that TSA generally does not include their air carriers or the association that represents them when revising emergency amendments. Instead of coordinating with TSA, foreign air carriers may provide their input to domestic code-share partners, according to one TSA international industry group and representatives from a domestic air carrier. Representatives from both domestic and foreign air carriers and their associations identified negative effects of inconsistent coordination with TSA during the directive review process and stated that improved coordination would lead to more efficient and effective security measures. For example, according to representatives from six air carriers and two associations we met with, TSA did not include them at all or early enough in the directive review process. These carriers and associations identified a number of issues with the revised directives because of this lack of coordination, such as directives that were vague, less effective, or difficult for carriers to implement. For example, representatives from an association and one air carrier noted that cargo directives are not always effective because they do not fully account for how cargo moves around the world (e.g., shippers may transport cargo by truck from one country to another before loading it onto a U.S.-bound aircraft to avoid security measures specific to certain foreign airports). Representatives from two air carriers provided an example of vague requirements in directives related to aircraft cabin search procedures that has led to TSA international industry representatives and inspectors offering different interpretations of the same requirement. As a result, representatives of the air carriers said they do not know how to implement, and have at times been found in violation of, the requirement. In addition, according to representatives from one foreign air carrier, had TSA included them and other foreign air carriers early on in the review process, the changes to the 2017 emergency amendment pertaining to international aviation security measures would have been more efficient and effective. For example, within 3 months of issuance, TSA revised the directive twice to, among other things, change screening requirements for personal electronic devices (e.g., allowing for alternative screening methods). According to representatives from this air carrier, TSA could have reduced or eliminated the need for such revisions had TSA officials better coordinated with air carriers. Moreover, representatives from one association stated that when TSA does not involve them or the air carriers in the directive review process, TSA is missing an opportunity to implement the most effective security measures and may actually inadvertently create security vulnerabilities. TSA’s 2018 Administrator’s Intent states that TSA is to coordinate with external customers early and often for diverse perspectives and to develop trusted relationships to grow opportunities for mission success. Moreover, the Administrator’s Intent has a goal to effectively secure and safeguard the transportation system through contributions from a diverse and interconnected community of stakeholders, which includes actively seeking stakeholder input. The goal further states that coordinating with industry and other partners will enable timely and well-informed decisions and increase security effectiveness. In addition, TSA’s Standard Operating Procedures for Security Policy Development, Coordination, and Issuance requires TSA officials to obtain input from key stakeholders and representatives of affected regulated parties (e.g., air carriers), when developing the problem statement, developing options, and drafting the directive (as appropriate), as discussed above. TSA is also to incorporate key stakeholder input into the final draft as appropriate. TSA officials identified several reasons why coordination with air carriers and their association may be inconsistent. For example, TSA does not have guidelines that are specific as to how it is to coordinate with air carriers and their associations, and coordination can be difficult to define. In addition, the level of coordination with industry stakeholders is to some extent driven by the discretion of TSA administrators and assistant administrators. As the personnel in these positions change, so too does the level of expected coordination with industry. According to TSA officials, they cannot write specific requirements for each of the over 200 air carriers with U.S.-bound operations and necessarily must choose which air carriers to seek input from. In addition, TSA officials noted that they coordinate with one or two domestic air carriers that chair the security committee within the association that represents both passenger and all-cargo air carriers. Further, TSA officials may decide not to share much information at all with air carriers owned and operated by certain foreign governments because of potential security concerns. Although TSA’s Standard Operating Procedures for Security Policy Development, Coordination, and Issuance require TSA officials to obtain input from air carriers and key stakeholders, the current procedures do not provide clear guidance on the circumstances under which coordination should occur. Better defining (e.g., develop guiding principles) how to coordinate with air carriers and other stakeholders during the review of directives and implementing such guidance would help TSA ensure that it more consistently coordinates with air carriers over time, addresses air carriers concerns, and issues directives that enable air carriers to effectively secure their operations against the identified threats or vulnerabilities. When TSA officials have coordinated with domestic and foreign air carriers, they have not documented the input air carriers provided. Based on our review of the 43 directive reviews TSA conducted from 2017 to March 2019, TSA officials did not document the input they have received from air carriers. TSA did provide us with emails and appointments with associations and air carriers to obtain their input during revisions to the 2017 directives pertaining to international aviation security, but this documentation did not capture a summary of the discussions or stakeholder concerns. TSA’s Standard Operating Procedures for Security Policy Development, Coordination, and Issuance requires that stakeholder and regulated party input be documented and include the entity consulted, date, location, and a brief summary of the discussion and specific stakeholder input, to include any concerns. In addition, Standards for Internal Control in the Federal Government states that effective documentation assists in management’s design of internal control by establishing and communicating who, what, when, where, and why of internal control execution to personnel. Documentation also provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as a means to communicate that knowledge as needed to external parties, such as external auditors. According to TSA headquarters officials, TSA does not document its coordination with air carriers and their associations because the feedback that it solicits and receives from air carriers and associations is mostly informal. TSA officials stated that for the 2017 directives pertaining to international aviation security, for example, they had to adjudicate many requests through dialogue with air carriers and their associations but the discussions were not documented, as it would have been too burdensome. However, TSA officials stated that most directives do not have the broad scope or apply to as many air carriers as the 2017 directive pertaining to international aviation security. Documenting the input provided by air carriers during the directive review process, even if the input is deemed informal, would better ensure that TSA provides insight on shared air carrier views or concerns, and retains knowledge about who, what, when, where, and why coordination occurred. In addition, TSA would be able to reference documented information for decision-making purposes, which could help ensure that TSA is consistently coordinating with air carriers during the review of directives and addressing their concerns. In general, directives are not meant to be permanent, and TSA has canceled some of them in recent years. Specifically, of the total of 78 directives related to air carrier operations at last point of departure airports in effect at some point from fiscal year 2012 to March 2019, 46 remain current while 32 were canceled for a variety of reasons (see fig. 4). One reason TSA might cancel a directive is if the agency incorporates the directive’s security measures into air carrier security programs. When this occurs, TSA initiates the directive review process and the directive will be canceled simultaneously with the security program change taking effect, according to TSA officials. TSA officials stated that they follow a similar process when they cancel a directive and include that directive’s security measures in a new directive. As a result, there is no lapse in security measure requirements. Although TSA has canceled some directives, others are longstanding. According to TSA officials, they have incorporated threat-based directives into air carrier security programs but not foreign airport vulnerability- based directives because the latter are site-specific and would not apply to all air carriers. However, as shown in figure 5, more than half (25 of 46) of directives related to last point of departure airports have been in effect for more than 5 years, and about one quarter (12) were threat- based. According to TSA officials, the threat pertaining to these directives still exists. Further, certain security measures predate the issuance of the directives that remain in effect. As shown in figure 4, the security measures within one-third (12) of the canceled directives were incorporated into new directives. According to TSA officials, there are security measures in certain directives that predate the creation of TSA in 2001. Representatives of the air carriers and associations we met with identified directives that have, in their view, persisted for too long, which can create redundant and confusing security requirements. Specifically, half of the air carrier representatives we met with told us that some directive requirements conflict with requirements in the air carriers’ security programs, are redundant, or could be incorporated into the security programs. According to representatives from one air carrier, without an exit strategy or plan to help TSA determine when it can cancel directives, the directives may be in effect beyond their useful time frame and are in some instances outdated or redundant. For example, representatives from this air carrier stated that directives require air carriers to identify baggage in a manner to thwart an attack in which passengers check their baggage with explosives in it but do not board the plane. However, given advancements in screening technology, such security measures are no longer required, according to these representatives. In addition, according to representatives from another air carrier, there are often conflicts between the directives and the security programs, which may cause confusion and sometimes misinterpretation of security requirements. Further, representatives from a third air carrier and one association also told us that there is value in incorporating directives into air carrier security programs because it removes the uncertainty involved, and air carriers can better plan for security requirements. TSA headquarters and field officials told us that there are directives that can be incorporated into air carrier security programs. For example, TSA headquarters officials stated that they have identified several such directives, including a 2012 emergency amendment and a 2017 security directive and emergency amendment related to passenger international aviation security; a 2014 security directive regarding the handling of items containing liquids, aerosols, and gels (e.g., personal hygiene products) brought into the aircraft cabin by passengers; and security directives and emergency amendments pertaining to cargo from certain Middle Eastern and African countries. Further, three groups of TSA international industry representatives told us that TSA should incorporate certain directives into security programs. Further, they stated that certain directives overlap, have outdated requirements, or contradict each other. For example, they highlighted overlap between requirements found in the 2012 emergency amendment and 2017 emergency amendments related to passenger international aviation security, as well as the air carriers’ security programs. Both emergency amendments have security requirements pertaining to passenger screening, aircraft security, and catering. According to one group of international industry representatives, there is confusion among themselves and air carriers over which emergency amendment supersedes the other. Although TSA officials have identified directives that they may be able to cancel by incorporating them into security programs, TSA does not have a defined process for doing so. TSA’s standard operating procedures provide step-by-step guidance for issuing new or revised security requirements through the directive review process, but it does not provide similar guidance for incorporating directives into security programs. Specifically, TSA officials have not resolved how they will accomplish key steps in incorporating certain long-standing directives into the security programs. For example, TSA officials stated that they are considering incorporating a 2011 security directive and emergency amendment pertaining to security measures for cargo from Yemen. However, TSA officials are unclear how they might request comments from air carriers because not all air carriers transport cargo from that country. Further, TSA officials stated that they have not determined whether or how they might incorporate vulnerability-driven directives into security programs. In addition, according to TSA officials, TSA’s reorganizations, personnel changes, and limited staff availability have delayed efforts to incorporate longstanding directives into security programs. TSA officials stated they have been attempting to incorporate the 2012 international aviation security emergency amendment into the security programs for foreign air carriers for the past 10 years. Specifically, in 2012 TSA consolidated over 20 worldwide threat-based emergency amendments issued from 2001 to 2012 into one emergency amendment covering a number of different types of security measures with the plan to next incorporate it into the security program, according to TSA officials. However, since that time, TSA has renewed the emergency amendment 13 times, each time with a new expiration date. TSA officials stated that it is easier to renew directives to ensure that the security measures remain in place than to incorporate them into security programs. Despite these challenges, TSA officials stated that they are mapping out how to incorporate certain directives into air carrier security programs. Further, they may be able to develop the changes to the programs and draft action memos for the TSA Administrator to approve by the end of 2019, according to these officials. As of July 2019, TSA officials had identified the directives it first planned to migrate into security programs and begun the process. However, these officials had not yet finalized plans for doing so. TSA Management Directive 2100.5 provides high-level TSA policy for the development, external coordination, and issuance of security programs and directives. It states that during the creation of all directives (i.e., security directives and emergency amendments), a sunset date will be assigned. This date is to serve as the date where a decision will be made by the agency to either cancel the directive or convert it into a security program change. Factors for this decision will include a comprehensive intelligence review, assessment of risk-based relevance, and operator performance and compliance. According to the management directive, this lifecycle analysis will ensure that directives are not permanent in nature and that the security program change process is routinely used as the vehicle for long-term regulatory requirements. However, the management directive does not preclude continuation of a directive, and TSA may decide to renew the directive, as appropriate. Further, according to the standard operating procedures associated with this management directive, the goal of the policy development process is to enhance TSA’s ability to make sound and timely policy decisions. In addition, Standards of Internal Control in the Federal Government states that management should define objectives clearly to enable the identification of risks and define risk tolerances. This involves clearly defining what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. By defining the process for cancelling or incorporating directives into security programs, including expected time frames, and taking actions to implement this process, as applicable, TSA could better ensure that it clarifies and streamlines the security requirements for air carriers that operate at last point of departure airports in a timely manner and in a way that uses limited resources efficiently. Further, taking these steps would help ensure that requirements in directives that should become permanent are incorporated into security programs. Given that terrorist groups continue to target international aviation, it is paramount that TSA effectively update and issue security directives and emergency amendments in response to threats. For the approximately 300 airports in foreign countries offering last point of departure flights to the United States, TSA may issue directives when immediate action on behalf of air carriers is necessary and has developed a review process for these directives, but it has not defined the circumstances under which TSA is to coordinate with air carriers and other industry stakeholders throughout the process. Better defining (e.g., develop guiding principles) how TSA is to coordinate with air carriers and implementing such guidance would help TSA ensure that it more consistently coordinates with air carriers over time, air carriers concerns are addressed, and it issues directives that enable air carriers to effectively secure their operations against the identified threats or vulnerabilities. In addition, documenting the input provided by air carriers during the directive review process would help TSA better ensure that it captures stakeholder views or concerns and retains knowledge about who, what, when, where, and why coordination occurred. TSA would also be able to reference documented information for decision-making purposes, which could help ensure that TSA is consistently coordinating with air carriers during the review of directives and addressing their concerns. Further, TSA has not always canceled longstanding directives or incorporated them into air carrier security programs. However, according to TSA Management Directive 2100.5, directives are not meant to be permanent. Recognizing that threat-driven exigent circumstances may preclude consultation, better defining the process for cancelling or incorporating directives into security programs, including expected time frames, and taking actions to implement this process, as applicable, could better ensure that TSA clarifies and streamlines the security requirements for air carriers that operate at last point of departure airports in a timely manner and in a way that uses limited resources efficiently. We are making the following three recommendations to TSA: The Administrator of TSA should ensure that the Assistant Administrator for Policy, Plans, and Engagement and the Assistant Administrator for Global Operations better define (e.g., develop guiding principles) how TSA is to coordinate with air carriers and other stakeholders during the review of security directives and emergency amendments, and implement such guidance (Recommendation 1). The Administrator of TSA should ensure input provided by air carriers and other stakeholders is documented during the security directive and emergency amendment review process (Recommendation 2). The Administrator of TSA should ensure that the Assistant Administrator for Policy, Plans, and Engagement defines a process for cancelling or incorporating security directives and emergency amendments into security programs, including time frames, and take action to implement this process, as applicable (Recommendation 3). We provided a draft of our report to DHS for review and comment. In written comments, which are included in appendix I and discussed below, DHS concurred with our three recommendations and described actions taken to address them. DHS also provided technical comments, which we have incorporated into the report, as appropriate. With respect to our first recommendation that TSA better define how to coordinate with air carriers and other stakeholders during the review of security directives and emergency amendments, and implement such guidance, DHS stated that TSA is developing a process for more formal and consistent coordination with air carrier and industry association stakeholders. With regard to our second recommendation that TSA document the input provided by air carriers and other stakeholders during the security directive and emergency amendment review process, DHS stated that TSA will require international industry representatives and other TSA officials to keep records of all communications related to review and feedback on directives. TSA officials plan to incorporate substantive feedback into action memos associated with the review of directives. With respect to our third recommendation that TSA define a process for cancelling or incorporating security directives and emergency amendments into security programs, DHS stated that TSA will establish milestones at which TSA will conduct a formal review to determine if long- standing directives should be consolidated into a security program or otherwise cancelled. We are sending this report to the appropriate congressional committees and to the acting Secretary of Homeland Security. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff members have any questions about this report, please contact William Russell at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. William Russell (202) 512-8777 or russellw@gao.gov. In addition to the contact above, Kevin Heinz (Assistant Director), Paul Hobart (Analyst-in-Charge), Charles Bausell, Michele Fejfar, Sally Gilley, Eric Hauswirth, Tom Lombardi, and Adam Vogt made key contributions.", "summary": "Approximately 300 airports in foreign countries offer last point of departure flights to the United States. When threat information or vulnerabilities at foreign airports indicate an immediate need for air carriers to implement additional security measures, TSA may issue new or revise existing security directives (for domestic air carriers) and emergency amendments (for foreign air carriers). The TSA Modernization Act includes a provision for GAO to examine TSA's review process for directives that apply at last point of departure airports. This report (1) identifies key characteristics of the TSA directives and (2) assesses TSA's process to review directives. GAO reviewed TSA policies and procedures, analyzed TSA program information, and interviewed TSA officials and representatives from a nongeneralizable sample of 10 air carriers, selected to represent carriers with high numbers of U.S.-bound flights, and three industry associations. As of March 2019, there were 46 Transportation Security Administration (TSA) security directives and emergency amendments (i.e., directives) in effect related to air carrier operations at foreign airports. Twenty-eight directives addressed threats (e.g., explosives in laptops) and 18 pertained to vulnerabilities identified at foreign airports (e.g., inadequate perimeter fencing). TSA reviews directives, but its process does not fully define how to coordinate with industry representatives and TSA has not incorporated the security measures of many longstanding directives into air carrier security programs in accordance with TSA policy. Representatives from four domestic air carriers stated that coordination with TSA on directives has improved. However, representatives from six air carriers and two associations indicated that TSA has issued revised directives that are vague or difficult to implement—which, for example, contributed to TSA officials offering different interpretations of aircraft cabin search requirements—because TSA did not sufficiently include them in the review process. Better defining how TSA coordinates with air carriers and other stakeholders would help ensure that TSA issues directives that enable air carriers to effectively secure their operations against the identified threats or vulnerabilities. In addition, when TSA officials have coordinated with air carriers, they have not documented the input provided. Documenting the input could help ensure that TSA is consistently addressing air carrier concerns and retaining knowledge about who, what, when, where, and why coordination occurred. Further, TSA policy states that directives are not intended to be permanent and are expected to eventually be canceled or incorporated into security programs. GAO analysis found that TSA issued more than one half (25) of the directives prior to 2014, meaning they have been in effect for more than 5 years. Several have been in effect for more than 10 years (see figure). As of July 2019, TSA officials had begun the process to migrate directives into security programs as deemed appropriate, but had not yet finalized their plans for doing so. Defining the process for incorporating directives into security programs, including expected timeframes, and taking actions to implement this process, as applicable, could better ensure that TSA clarifies and streamlines security requirements in a timely manner. GAO recommends that TSA (1) better define how to coordinate with air carriers when reviewing directives, (2) document air carrier input, and (3) define a process, including time frames, for cancelling or incorporating security measures from directives into security programs. DHS concurred with all three recommendations.", "document_type": "gao"}
{"report": "Available federal law enforcement data show a range of threats and assaults against the four federal land management agencies’ employees in fiscal years 2013 through 2017. The severity of these incidents ranged from threats conveyed over the telephone to attempted murder and included an incident in which an employee was stabbed outside a federal building. The number of incidents of threats and assaults varied by agency. For example, for fiscal years 2013 through 2017 BLM data included 88 incidents of threats and assaults against BLM FWS data included 66 incidents of threats and assaults against FWS Forest Service data included 177 incidents of threats and assaults against Forest Service employees; and Park Service data included 29 incidents of threats and assaults against Park Service employees. Further, FBI data for fiscal years 2013 through 2017 show that the FBI initiated under 100 domestic terrorism investigations into potential threats to federal land management agencies. Our analysis of the FBI data showed that the majority of the domestic terrorism investigations involved BLM. Additionally, the majority involved individuals motivated by anti- government ideologies. For example, the FBI investigated one case in which a BLM law enforcement officer received more than 500 harassing phone calls and several death threats after a subject posted personal information about the officer on the social media platform Twitter. However, the number of actual threats and assaults against federal land management employees is unclear and may be higher than what is represented in available data, because not all incidents of threats and assaults against land management agency employees are captured in the agencies’ databases. There are several reasons why this may be the case. Specifically, some incidents of threats and assaults are investigated by local or state law enforcement and may be recorded in their data systems rather than in the land management agencies’ systems. Additionally, officials from two agencies we interviewed said that when a single incident involved multiple offenses, the less serious offenses are unlikely to be recorded in the data system and, therefore, the entirety of what occurred may not be captured. Further, land management agency employees do not always report all incidents of threats. For example, some field unit employees said that in certain circumstances, they consider receiving threats as a normal part of their job. Some officials also described being threatened while off duty, such as being harassed in local stores or being monitored at their home, and they said that in some cases they did not report the incident because it was a common occurrence. However, even in more high-profile incidents, agency officials told us that employees may not always report threats to agency law enforcement. For example, agency officials we interviewed cited specific incidents around the time of the 2016 armed occupation of FWS’s Malheur National Wildlife Refuge that they did not necessarily report to their agency’s law enforcement. These incidents included individuals holding anti-government beliefs who followed a teenage girl wearing a BLM shirt around the local grocery store and threatened to burn her house down, and agency employees who had shots fired over their heads while working in the field. According to officials at two agencies, many employees were traumatized by the Malheur occupation and some did not return to work, including some who transferred to other agency field units. Federal land management agencies use various approaches to protect their employees from threats and assaults, including deploying agency law enforcement officers to protect employees and resources and building relationships with external law enforcement entities and the public. Specifically, when necessary, agencies deploy additional law enforcement officers to assist their local officers. For example, during the armed occupation of the Malheur National Wildlife Refuge, FWS officials reported deploying FWS law enforcement officers from around the country to field units in western states to provide additional security for FWS employees. Agency officials we interviewed also told us that they build relationships with local, state, and other federal agency law enforcement entities to help protect employees and resources in the field and to assist with coordinating law enforcement responses. Such relationships are important because not all field units have a law enforcement officer, and those that do often rely on local law enforcement for assistance in responding to incidents of threats or assaults against agency employees. For example, officials we interviewed at a field unit in Nevada stated that during a high-profile court case involving the agency, the Las Vegas Metropolitan Police Department kept a patrol car outside the field unit for several days to help ensure field unit employees’ safety. Finally, officials at several field units we visited stated that their law enforcement officers are focused on educating, rather than policing, visitors. Agency officials we interviewed cited several factors that can affect their ability to protect employees. Specifically, agency officials noted that employees are required to interact with the public as part of their official duties and may wear uniforms, which makes them easily recognizable and can put them at risk of being threatened or assaulted. (See figure 1.) Additionally, agency officials stated that it can be difficult to protect employees because, as part of their field work, employees may be dispersed across hundreds of miles of federal lands and may be located hours or days away from the nearest agency law enforcement officer. For example, as of fiscal year 2018, BLM had 194 field law enforcement officers to cover the 245 million acres of land managed by BLM. Further, the number of agency field law enforcement officers at all four land management agencies declined from fiscal year 2013 through fiscal year 2018. For example, BLM experienced a decrease of 9 percent, while the Forest Service experienced a decrease of 22 percent, the largest decrease among the four agencies. Finally, agency officials we interviewed said that the risk to employee safety posed by individuals holding anti-government sentiments can be unpredictable and that incidents of threats and assaults against employees by such individuals are generally sporadic. The four federal land management agencies have completed some but not all of the facility security assessments on their occupied federal facilities as required by the ISC Standard. Agency officials cited various reasons for not doing so, including lack of resources, training, and expertise. Not complying with the ISC Standard’s requirement to complete facility security assessments on all occupied facilities could leave federal agencies exposed to risks in protecting their employees and facilities. While FWS has a plan to complete its assessments, BLM, the Forest Service, and the Park Service do not. Specifically: FWS. FWS has conducted five facility security assessments on its approximately 465 occupied facilities. According to FWS headquarters officials, FWS employees have limited physical security expertise to conduct facility security assessments; therefore, the agency has developed a plan to meet the ISC Standard’s requirement using contractors. BLM. BLM has conducted 21 facility security assessments on its approximately 280 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan to do so. Forest Service. The Forest Service has conducted at least 135 facility security assessments on its approximately 1,135 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan for doing so. Park Service. The Park Service has conducted at least 148 facility security assessments on its approximately 1,505 occupied facilities, but officials do not know when they will complete the remaining assessments and do not have a plan to do so. The ISC Standard requires that agencies conduct assessments using a methodology that meets, among other things, two key requirements: (1) consider all of the undesirable events (e.g., arson and vandalism) identified in the ISC Standard as possible risks to facilities, and (2) assess the threat, vulnerability, and consequence for each of these events. The Forest Service’s methodology meets these two requirements and utilizes an ISC-compliant facility security assessment methodology developed by the U.S. Department of Agriculture. The Park Service’s methodology partially meets the requirements because it does not include a step to assess the consequences of specific undesirable events, as required by the ISC Standard. BLM and FWS have not yet established methodologies for conducting facility security assessments, although officials we interviewed from each agency stated that they intend to develop an ISC- compliant methodology. Specifically, BLM officials told us that they plan to hire a security manager who will develop an assessment methodology but did not know when the manager would be hired. FWS officials we interviewed provided a high-level description of what they expected to be included in their new methodology. However, FWS’s description did not indicate that the agency would evaluate the consequences of specific undesirable events, as required by the ISC Standard. Without developing a plan for conducting all of the remaining facility security assessments and using a methodology that complies with ISC requirements, agencies may not identify the risks their facilities face or identify the countermeasures they could implement to mitigate those risks. Based on these findings, we made a total of six recommendations to the four land management agencies, including that BLM, the Forest Service, and the Park Service each develop a plan to conduct all required facility security assessments agency-wide; The Park Service update its facility security assessment methodology to address the consequences of specific undesirable events in order to comply with requirements in the ISC Standard; and BLM and the Forest Service each develop facility security assessment methodologies that comply with requirements in the ISC Standard. The four land management agencies generally concurred with our recommendations and provided examples of actions they plan to take to address our recommendations, including revising policies and developing new tools, training, and data system modules. Chairwoman Haaland, Republican Leader Young, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Anne-Marie Fennell at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff members who made key contributions to this testimony are Casey L. Brown (Assistant Director), Tanya Doriss (Analyst in Charge), Charles W. Bausell, Charles A. Culverwell, John W. Delicath, Emily E. Eischen, Cindy K. Gilbert, Richard P. Johnson, Vanessa E. Obetz, Dan C. Royer, and Breanna M. Trexler. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "A 2014 government report predicted that the rate of violent domestic extremist incidents would increase. In recent years, some high-profile incidents have occurred on federal lands, such as the armed occupation of a FWS wildlife refuge in 2016. Federal land management agencies manage nearly 700 million acres of federal lands and have law enforcement divisions that protect their employees and secure their facilities. This testimony summarizes GAO's September 2019 report on how land management agencies protect their employees and secure their facilities (GAO-19-643). In that report, GAO examined, among other things, for the four federal land management agencies, (1) what is known about the number of threats and assaults against their employees and (2) the extent to which agencies met federal facility security assessment requirements. For the report, GAO analyzed available government data on threats and assaults; examined agencies' policies, procedures, and documentation on facility security assessments; compared the agencies' methodologies against ISC requirements; and interviewed land management agency, ISC, and FBI officials. Data from the four federal land management agencies—the Forest Service within the U.S. Department of Agriculture and the Bureau of Land Management (BLM), Fish and Wildlife (FWS), and National Park Service (Park Service) within the Department of the Interior—showed a range of threats and assaults against agency employees in fiscal years 2013 through 2017. For example, incidents ranged from telephone threats to attempted murder against federal land management employees. However, the number of actual threats and assaults is unclear and may be higher than what is captured in available data for various reasons. For example, employees may not always report threats because they consider them a part of the job. Federal Bureau of Investigation (FBI) data for fiscal years 2013 through 2017 also showed that the FBI initiated under 100 domestic terrorism investigations into potential threats against federal land management agencies. The majority of these FBI investigations involved BLM, and the majority involved individuals motivated by anti-government ideologies. The four federal land management agencies have not completed all of the facility security assessments on their occupied federal facilities as required by the Interagency Security Committee (ISC). Officials at the four agencies said that either they do not have the resources, expertise, or training to conduct assessments agency-wide. FWS has a plan to complete its assessments, but BLM, the Forest Service, and the Park Service do not. Such a plan could help these agencies address the factors that have affected their ability to complete assessments. The ISC also requires that agencies conduct assessments using a methodology that meets, among other things, two key requirements: (1) consider all of the undesirable events (e.g., arson and vandalism) identified as possible risks to facilities, and (2) assess the threat, vulnerability, and consequence for each of these events. The Forest Service's methodology meets these two requirements and the Park Service's methodology partially meets the requirements, but BLM and FWS have not yet established methodologies for conducting facility security assessments. Without developing a plan for conducting all of the remaining facility security assessments and using a methodology that complies with ISC requirements, agencies may not identify the risks their facilities face or identify the countermeasures—such as security cameras or security gates—they could implement to mitigate those risks. In its September 2019 report, GAO made six recommendations: that BLM, the Forest Service, and the Park Service develop a plan for completing facility security assessments; and that BLM, FWS, and the Park Service ensure their facility security assessment methodologies comply with ISC requirements. The agencies generally concurred with the recommendations.", "document_type": "gao"}
{"report": "Transnational criminal organizations and terrorist organizations use a variety of money laundering schemes to disguise the origin and destination of their illicit proceeds and integrate their assets in legitimate financial entities. According to the U.S. government’s 2018 National Strategy for Combating Terrorist and Other Illicit Financing, the criminal activities in the United States that generate the largest share of illicit proceeds for laundering are fraud, drug trafficking, human smuggling, human trafficking, organized crime, and government corruption. FATF has identified three primary methods of money laundering: the laundering of money through the financial system, the physical movement of money (such as through cash couriers), and TBML. FATF has defined TBML as “the process of disguising the proceeds of crime and moving value through the use of trade transactions in an attempt to legitimize their illicit origins.” The volume of international trade is significant and has grown over time. According to the World Trade Organization, in 2018, there was $19.67 trillion in international merchandise trade and $5.63 trillion in international services trade. Although international trade offers many economic opportunities for the United States and other countries around the world, the number and complexity of international trade transactions present a number of risks and vulnerabilities that make them susceptible to abuse by criminal and terrorist organizations. For example, the large volume of international trade complicates detection of individual illicit transactions. In the United States alone, on a typical day in fiscal year 2019, almost 79,000 containers and $7.3 billion worth of goods entered the country through ports of entry, according to U.S. Customs and Border Protection (CBP). Similarly, different studies have noted that the increasingly complex nature of international trade—with the movement of goods and services around the world and the use of various financing and payment structures—makes detecting suspicious transactions difficult. TBML schemes can involve misrepresenting the price, quantity, or type of goods or services in trade transactions, but other types of TBML schemes, such as the Black Market Peso Exchange, do not need to rely on this type of misrepresentation. In misrepresentation schemes, the parties involved in the trade transaction may under or over invoice goods or services; issue multiple invoices for the same goods or services; provide more or less goods or services than the declared amount, including in some cases providing no goods or services; or falsely describe the types of goods or services provided. Through these types of misrepresentation, value can be transferred from one party to another and the illicit origins of criminal proceeds obscured. In a hypothetical TBML scheme involving the misrepresentation of the price of goods, a criminal organization in Country A needs to launder the proceeds from its criminal activity and move these proceeds to Country B. To accomplish this, the criminal organization will use the illicit proceeds to purchase 100,000 cell phones worth $100 each. The criminal organizations will then make arrangements to export the 100,000 cell phones to a co-conspirator in Country B. However, the criminal organization in Country A, will fraudulently invoice the cell phones at $10 each rather than $100 each. Thus, the co-conspirator in Country B pays a total of $1 million for the cell phones, rather than their true value of $10 million. The co-conspirator then sells the cell phones at their true market value of $10 million in Country B resulting in the criminal organization having successfully transferred $9 million in value from Country A to Country B through TBML. Figure 1 illustrates how such a price misrepresentation scheme works. Similarly, the criminal organization can transfer value through misrepresentation of the quantity or type of goods being exported. For example, the criminal organization can invoice its co-conspirator for 50,000 cell phones, but actually ship 100,000 phones, or it can claim that it is shipping different, lower value items such as USB flash drives. Under a hypothetical Black Market Peso Exchange scheme, a criminal organization operating in Country A, which uses dollars, will take the dollar proceeds of its criminal activities to a currency broker’s representative that has access to currency reserves from Country B (pesos). At the same time, in Country B, an import company will contact the currency broker seeking dollars to pay for goods that it wishes to import from Country A. The currency broker uses the dollars provided by the criminal organization to pay exporters in Country A on behalf of the importer in Country B. The importer receives and sells the goods in Country B and pays the currency broker in pesos. The currency broker then pays the criminal organization in Country B in pesos, completing the transfer of its proceeds. Thus, the criminal organization has successfully shifted the value of its proceeds from Country A to Country B without having to physically move money, or transfer funds through the banking system, from Country A to Country B. Figure 2 shows such a Black Market Peso Exchange scheme involving the United States and Colombia. TBML differs from other crimes, such as trade or customs fraud, that may occur in connection with trade and the movement of goods, according to Treasury officials. Organizations and individuals involved in TBML exploit vulnerabilities in international trade to move value across international borders in an attempt to disguise the origin, nature, or source of illicit proceeds, which may derive from a variety of predicate crimes. According to Treasury officials, while offenses like smuggling and fraud may resemble TBML, they differ in purpose. For example, smugglers attempt to evade detection or the payment of custom fees, duties or taxes while moving legitimate, illicit, or restricted goods across borders. Similarly, in frauds involving the (purported) purchase or sale of goods, one of the parties to the transaction seeks to deceive another one for financial gain. In TBML, the scheme may be accomplished using fraudulent documents, such as false invoices, but this is not a necessary part of the scheme, nor does it alone represent TBML. In TBML schemes that involve misrepresenting the price, quantity, or type of goods, both the buyer and seller normally understand that the goods shipped or funds paid may differ from what is stated in the supporting documents. Within the United States, a number of laws and regulations are used to combat TBML. The Bank Secrecy Act, which was passed in 1970, and implementing anti-money laundering (AML) regulations provide the legal and regulatory framework for preventing, detecting, and deterring money laundering in the United States. The Bank Secrecy Act regulations generally require banks and other financial institutions, such as money service businesses, securities broker-dealers, and certain types of insurance companies, among others, to, for example, collect and retain various records of customer transactions, verify customers’ identities at the time of account opening, maintain AML programs, and report suspicious transactions or cash transactions over a certain amount. In addition, the Trade Facilitation and Trade Enforcement Act of 2015, signed into law in 2016, addressed trade facilitation and trade enforcement issues such as import safety, the protection of intellectual property, and the prevention of the evasion of duties, among other things. Further, individuals can be prosecuted under U.S. law, such as section 1956 of title 18 of the United States Code, for money laundering, including TBML schemes. For example, under section 1956, defendants can be prosecuted for money laundering activities, including those involving falsely classifying goods or entering goods by means of false statements. Within the U.S. government, a number of agencies play a role in working with international partners to combat money laundering more broadly, as well as TBML specifically. These include DHS, DOJ, State, and Treasury and their component agencies and offices. DHS: Within DHS, ICE’s Homeland Security Investigations (HSI) investigates financial crimes and money laundering cases, including those involving TBML. HSI has established a TTU that seeks to identify global TBML trends, provide investigation support to HSI and other law enforcement efforts, and conduct ongoing analysis of trade data provided through partnerships with TTUs that it has helped establish in other countries. CBP is responsible for enforcing U.S. trade laws, facilitating compliant trade, collecting revenue, and protecting the U.S. economy and consumers from harmful imports and unfair trade practices. As part of its mission, CBP conducts targeting of high-risk shipments that may involve trade violations, including violations linked to TBML schemes. DOJ: The Drug Enforcement Administration (DEA) and the Federal Bureau of Investigation both conduct investigations of criminal organizations that may use TBML to launder their illicit proceeds. In addition, the DOJ Criminal Division’s Money Laundering and Asset Recovery Section and U.S. Attorney’s Offices throughout the country prosecute cases involving money laundering crimes, including TBML schemes. State: State’s Bureau of International Narcotics and Law Enforcement Affairs (INL) leads State’s AML technical assistance efforts with international partners. In this role, INL works in global and regional forums to promote the implementation of international AML standards. INL also funds AML assistance programs in countries around the world. Finally, INL publishes the annual International Narcotics Control Strategy Report, which includes an analysis of countries identified as “major money laundering countries.” In addition to INL, State’s Bureau of Economic and Business Affairs and Bureau of Counterterrorism also play a role in State’s AML and countering the financing of terrorism (CFT) efforts. Treasury: Treasury’s Financial Crimes Enforcement Network (FinCEN) collects, analyzes, and disseminates the financial intelligence information it collects pursuant to the Bank Secrecy Act to support efforts to combat financial crime, including money laundering. FinCEN is responsible for administering the Bank Secrecy Act and coordinating with federal and state regulatory agencies on AML/CFT efforts. Additionally, FinCEN serves as the Financial Intelligence Unit (FIU) of the United States, which entails gathering and analyzing Suspicious Activity Reports (SAR) and other financial information relevant to money laundering, terrorist financing, and other financial crimes, as well as disseminating the results of this analysis to law enforcement and other competent authorities. A number of other Treasury agencies and offices also play a role in efforts to combat money laundering, including TBML. For example, Treasury’s Office of Technical Assistance (OTA) provides assistance to partner countries to help strengthen their efforts to combat economic crimes. Treasury’s Office of Terrorist Financing and Financial Crimes is the policy coordination office for illicit finance and develops and implements U.S. government strategies to combat all forms of illicit finance domestically and internationally. Internal Revenue Service Criminal Investigation investigates tax crimes and other financial crimes, including those associated with TBML schemes. It has lead authority for investigating criminal violations of the Bank Secrecy Act. Internationally, the U.S. government participates in a number of bodies that address issues related to TBML, including the Egmont Group, FATF, UNODC, and the WCO. The Egmont Group: The Egmont Group, formed in 1995, is composed of FIUs from 164 jurisdictions. The organization seeks to foster information exchange among its members to support efforts to combat money laundering and terrorist financing. In addition, the Egmont Group provides training and technical assistance to its member FIUs. FinCEN represents the United States at the Egmont Group. The Egmont Group’s Secretariat is located in Canada. FATF: FATF is an intergovernmental body, formed in 1989, that sets internationally recognized standards for developing AML/CFT regimes and assesses the ability of member jurisdictions to meet these standards. In addition, FATF works to identify specific money laundering methods and promotes international cooperation in disrupting and dismantling those money laundering schemes. FATF’s membership includes 37 jurisdictions and two regional organizations—the European Commission and the Gulf Cooperation Council. Treasury’s Office of Terrorist Financing and Financial Crimes heads the United States delegation to FATF. The FATF Secretariat is located in Paris, France. UNODC: UNODC is an agency within the United Nations, formed in 1997, that works to combat illicit drugs and other international crime in more than 150 countries throughout the world. As part of its mandate, UNODC carries out the Global Program against Money Laundering, Proceeds of Crime and the Financing of Terrorism. Through this program, UNODC seeks to strengthen the ability of United Nations member states to implement measures against money laundering and the financing of terrorism and to assist them in detecting, seizing, and confiscating illicit proceeds. State is the lead agency representing the United States at UNODC. UNODC is headquartered in Vienna, Austria and has field offices in 20 countries, as well as liaison offices in New York and Brussels, Belgium. WCO: The WCO, established in 1952, is an intergovernmental body whose mission is to enhance the effectiveness and efficiency of customs administrations around the world and to help them in their dual role of facilitating international trade while also promoting security. WCO’s membership includes customs agencies from 183 countries. CBP is the lead agency representing the United States at WCO. The WCO’s Secretariat is located in Brussels, Belgium. Different types of criminal and terrorist organizations use TBML to disguise the origins of their illicit proceeds and fund their operations. In some cases, these organizations may manage the TBML schemes directly, and in other cases, they may enlist the services of professional money launderers. Drug trafficking organizations. Drug trafficking organizations throughout Latin America, including in Colombia and Mexico, have used TBML schemes for decades to launder the proceeds from illegal drug sales. These organizations make billions of dollars from the sale of illegal drugs in the United States and elsewhere. Although much of these revenues remain with the ultimate sellers of the illegal drugs in the United States, significant amounts of illicit proceeds are sent back to drug trafficking organizations in supplier countries, including through TBML schemes. For example, in a 2017 reporting cable on Colombia’s cocaine economy, State noted that U.S. law enforcement agencies and independent economists have estimated that somewhere between $5 billion to $10 billion in cocaine proceeds are laundered back to Colombia each year, frequently using TBML schemes. U.S. government reporting, including Treasury’s 2020 National Strategy for Combating Terrorist and Other Illicit Financing and DEA’s 2019 National Drug Threat Assessment, and various U.S. officials noted that a key trend related to TBML that has occurred in recent years is the increasing involvement of Chinese criminal organizations in TBML globally, including in the United States. Chinese money laundering networks are working increasingly with Mexican drug cartels to assist the cartels in laundering drug proceeds. In addition, U.S. government reporting, including the 2018 National Money Laundering Risk Assessment, and U.S. officials noted Chinese criminal gangs are using TBML schemes to repatriate proceeds from the sale of synthetic opioids in the United States and around the globe. Other criminal organizations. In addition to drug trafficking, criminal organizations have used TBML schemes to launder proceeds from a range of other crimes, including illegal mining, human trafficking, and the sale of counterfeit goods. For example, criminal organizations in Colombia have used TBML to disguise the origins of illegally mined gold, in exchange for funds, according to U.S. Embassy Bogotá and Colombian government officials we interviewed. Corrupt government officials. In certain countries, senior government officials and government entities have used TBML schemes to disguise profits derived from corrupt practices, according to U.S. government reporting. For example, FinCEN has reported that senior government officials in Venezuela have used TBML as part of schemes to steal money from the Venezuelan government’s food distribution program. Terrorist organizations. Terrorist organizations, including Hezbollah and the Revolutionary Armed Forces of Colombia (known by its Spanish acronym FARC), have also used TBML schemes to launder funds. For example, a number of U.S. officials and knowledgeable sources have noted that Hezbollah operates a number of TBML schemes in the Tri-Border Area in South America, where Argentina, Brazil, and Paraguay meet, which help to fund the terrorist organization’s activities around the world. Criminal and terrorist organizations use a range of TBML schemes with varying levels of complexity. In many instances, these organizations combine TBML techniques with other forms of money laundering, such as bulk cash smuggling and the laundering of funds through the banking system. The U.S. government, foreign governments, and international bodies have identified a number of different examples of the types of TBML schemes that occur. For example: In one case described in Treasury’s 2018 National Money Laundering Risk Assessment and ICE press releases, HSI led an investigation, known as Operation Fashion Police, which targeted businesses in the Los Angeles Fashion District that were suspected of being involved in Black Market Peso Exchange schemes to launder the proceeds of illegal drug sales on the behalf of international drug cartels. As a result of the investigation, two owners of a textile company pled guilty to using the business to receive bulk cash that they knew or believed to be the proceeds of narcotics trafficking and part of a Black Market Peso Exchange scheme. The two individuals received approximately $370,000 in cash delivered on four separate occasions as payment for goods shipped to Mexico, Guatemala, and other countries in Latin America. Operation Fashion Police, along with several related investigations, also resulted in the seizure of tens of millions of dollars in bulk cash stashed at warehouses in the Los Angeles area. In one case identified by Treasury, DOJ indicted seven co- conspirators for participating in an international TBML scheme. The individuals are alleged to have used family-owned import-export businesses in Long Island and Miami and to launder millions of dollars in illegal drug proceeds. As part of the scheme, the defendants are alleged to have taken in bulk cash deliveries from drug dealers in the United States and disguised the transfer of money to South America and elsewhere through the actual and purported purchase and export of mobile phones. In another case, according to U.S. government information provided to FATF, Colombian drug cartel representatives in the United States deposited proceeds from illegal drug sales into the U.S. financial system. The cartel then used these funds to buy gold from Colombia, which it imported into the United States. The cartel representatives in the United States then melted down the gold and recast and enameled the gold to disguise it as low value items such as nuts and bolts. The cartel then exported the disguised gold back to Colombia where it was melted down once again and the process was repeated. Through this scheme, the cartel was able to use the same gold to justify multiple payments to its representatives in Colombia, thus transferring proceeds from its U.S. operations. In Australia, according to U.S. Embassy Canberra officials, Chinese criminal organizations give Australian dollars from drug sales to individual Chinese nationals, known as Daigou shoppers, who pose as retail shoppers and use the funds to purchase various items in Australia on behalf of buyers in China who want to purchase higher quality foreign goods. The Daigou shoppers then ship the items to the buyer or deliver them by hand. The buyers in China then pay the Chinese criminal organizations, in Chinese yuan, for the items. Through this TBML scheme, the criminal organizations are able to move their proceeds to China without going through the financial system. Finally, in Benin, Lebanese financial institutions linked to Hezbollah were involved in schemes that used TBML to launder funds and move criminal proceeds through West Africa and back to Lebanon, according to State reporting in its 2015 International Narcotics Control Strategy Report. The criminals using these schemes wired funds from Lebanon to the United States to buy used cars, which were then shipped to Benin and sold throughout West Africa. The criminals then combined the profits from the sale of these cars with the proceeds from drug sales in Europe and subsequently sent the funds back to Lebanon via bulk cash smuggling and deposited the funds into the Lebanese financial system. According to information from different U.S. agencies, international bodies, and partner countries, criminal and terrorist organizations use a wide variety of goods in TBML schemes, but HSI analysis has found the most common items are precious metals, automobiles, clothes and textiles, and electronics (see fig. 3). As of 2018, HSI reported that approximately 70 percent of its TBML-related casework involved these four types of goods. However, criminal and terrorist organizations use any number of different goods in TBML scje,es. For example, U.K. government officials told us about a scheme involving the misrepresentation of dental equipment as books in a series of exports from the United States to the United Kingdom. In addition to international trade in goods, available evidence indicates that TBML schemes, at times, involve international trade in services. According to HSI, under some TBML schemes, shell companies are created that issue invoices for consulting or other professional services which are used to justify the international movement of funds as payment for the invoiced services. U.S. agencies and other sources have noted the potential for TBML schemes involving services such as consulting, accounting, and web design, among others. Various U.S. agencies, international bodies, and knowledgeable sources have identified a number of “red flags” that may indicate TBML schemes. For example, table 1 includes a list of nine red flag indicators that HSI has identified related to TBML schemes. U.S. agencies have identified a number of countries around the world as being at risk for money laundering more generally and TBML specifically. For example, State’s annual International Narcotics Control Strategy Report (INCSR) identifies “major money laundering countries,” as required by the Foreign Assistance Act. Over the last 5 years, the INCSR has identified, on average, almost 80 countries as being major money laundering countries. In addition, State has identified countries that face TBML-specific risks in the country reports included within the INCSR each year. For example, in our review of the 2019 INCSR, we found that State had cited TBML risks in 26 countries or territories in a number of different regions of the world. Previously, HSI conducted an analysis of TBML- related SARs filed by financial institutions with FinCEN in fiscal year 2012. Of the 474 TBML-related SARs that financial institutions filed during this period, HSI found that 93 different countries or territories were referenced with the five most frequently mentioned being Nigeria, Hong Kong, Mexico, Venezuela, and Panama. More recently, in 2019, HSI identified Mexico, China, Colombia, the United Arab Emirates, Ecuador, Peru, Venezuela, and the United Kingdom as its key countries of TBML concern. In addition to identifying different countries that are vulnerable to money laundering, the U.S. government and FATF, among others, have identified free trade zones as particular areas of risk for TBML. In a 2010 report on money laundering vulnerabilities in free trade zones, FATF identified approximately 3,000 free trade zones located in 135 countries and noted they had systemic weaknesses making them susceptible to money laundering and terrorist financing. These weaknesses included less stringent AML/CFT reporting requirements, relaxed oversight by responsible government authorities, and weak procedures for inspecting goods, among other things. Similarly, the 2019 INCSR notes that the 114 free trade zones in Colombia are vulnerable to TBML due to inadequate regulation, supervision, and transparency. Available evidence from the U.S. government, international bodies, and knowledgeable sources suggests that the amount of TBML occurring globally is substantial and has increased in recent years. State has reported that the amount of money laundered through TBML schemes may potentially be up to hundreds of billions of dollars globally, every year. Some U.S. officials and knowledgeable sources believe that, based upon available evidence, TBML is likely one of the largest forms of money laundering. In addition, as countries have strengthened their controls to combat other forms of money laundering, various U.S. government reports and officials, as well as knowledgeable sources have stated that there are indications that criminal organizations and terrorist organizations have increased their use of TBML to launder their funds. For example, FinCEN has reported that since the Mexican government increased restrictions on U.S. dollar cash deposits at Mexican financial institutions in 2010, Mexican drug cartels appear to have increasingly turned to TBML as an alternative means of repatriating profits from U.S. drug sales. Similarly, in Australia, as controls on large cash deposits at ATMs have increased since 2017, criminals have increased their use of TBML to hide their profits, according U.S. officials at Embassy Canberra. In addition, the 2020 National Strategy for Combating Terrorist and Other Illicit Financing notes that there has been a steady decrease in seizures related to bulk cash smuggling from 2012 through 2018 and states that this decrease could indicate that criminal organizations are increasingly turning to other means to move illicit money, including TBML. Although various observers believe the magnitude of TBML is large, specific estimates of the amount of TBML occurring around the world are unavailable. A number of academic studies have sought to quantify various aspects of illicit financial flows and money laundering. Although the results of such studies can shed light on the potential volume of TBML, none of those we identified in our literature review sought to develop estimates of TBML specifically. In addition, the studies we reviewed all had certain methodological limitations. We found, based upon our review of relevant literature, that academic studies seeking to quantity potential illicit financial flows do not provide the exact extent of TBML. These studies capture activities that are generally broader than TBML, such as tax avoidance, trade price manipulation, or trade misinvoicing, which demonstrates the difficulty in estimating the exact magnitude of TBML activity. For example, one academic researcher analyzed U.S. Census Bureau trade data over time to estimate money moved in and out of the United States through trade price manipulation, which involves prices showing up outside of an expected range. The stated objectives of trade price manipulation in this study include not only TBML, but also income tax avoidance or evasion, among other things. Therefore, measurement of trade price manipulation is generally broader than that of TBML. For 2018 alone, this researcher estimated that trade price manipulation accounted for approximately $278 billion moved out of and $435 billion moved into the United States. Global Financial Integrity, a nonprofit organization dedicated to studying the cross-border flow of illegal money, has analyzed International Monetary Fund and United Nations data to develop an estimate of potential trade misinvoicing between developing and advanced economies. In a 2019 report, it calculated the illicit financial flows to and from 148 developing countries from 2006 to 2015. For 2015, it estimated that potential trade misinvoicing to and from these 148 developing countries were between $0.9 trillion and $1.7 trillion. Global Financial Integrity defines trade misinvoicing as a method for moving money illicitly across borders that involves the deliberate falsification of the value, volume, or type of commodity in an international commercial transaction of goods or services by at least one party to the transaction. Therefore, measurement of trade misinvoicing is generally broader than that of TBML. Appendix II provides additional details on our literature review and efforts to quantify illicit financial flows, including TBML. Certain international bodies, such as UNODC, and other organizations have produced estimates on the amount of criminal proceeds and the volume of money laundering more broadly. For example, in 2011, UNODC conducted a meta-analysis of the results of various studies and estimated that in 2009 the amount of funds available for laundering, including TBML, was likely around 2.7 percent of global gross domestic product, or $1.6 trillion. However, the report’s authors noted that the studies reviewed in the meta-analysis contained a range of methodological issues and information gaps. FinCEN data on SARs related to TBML can also provide an indication of the potential volume of TBML activity that financial institutions have detected. In 2010, FinCEN issued an advisory on TBML that found that financial institutions had filed over 17,000 SARs related to potential TBML between January 2004 and May 2009, involving over $276 billion worth of transactions. In addition, we analyzed FinCEN data from more recent years, using a different methodology, and found financial institutions had filed 7,044 SARs related to TBML from 2014 to 2018, including 1,673 in 2018. FinCEN officials noted that the number of TBML-related SARs is a small portion of the total of 9.6 million SARs it received over this period. However, FinCEN officials also acknowledged that financial institutions may not have enough information on many trade transactions to determine whether there is suspicious activity and whether that suspicious activity is potentially related to TBML schemes. In addition, FinCEN officials noted that suspicious activity related to TBML schemes could be reported under different categories. Officials and reporting from relevant international bodies and selected partner countries, and knowledgeable sources have recommended that governments consider a number of different practices to strengthen their efforts to detect and combat TBML. After reviewing and analyzing these sources, we identified and grouped these recommended practices into the following five categories: (1) partnerships between governments and the private sector, (2) training in detecting and combatting TBML, (3) sharing information through interagency collaboration, (4) international cooperation through information and knowledge sharing, and (5) further research on challenges, such as potential impediments to combatting TBML. In addition, we identified examples of steps the United States and other countries have taken in line with these practices. Officials and knowledgeable sources also noted some potential difficulties to implementing some of the recommended practices that have been identified. Reporting from relevant international bodies and certain partner countries, and knowledgeable sources have proposed that governments develop partnerships with the private sector to combine and collectively analyze information needed to identify potential TBML schemes and trends. Through these partnerships, representatives from the private and public sector could meet on a regular basis to share information on suspicious activity that may warrant further investigation. For example, FATF’s guidance paper Best Practices on Trade Based Money Laundering stated that governments should consider conducting periodic joint meetings with the private sector to discuss emerging TBML trends. Governments can also provide feedback to private sector entities on what information is helpful as they conduct investigative work. FATF standards on information sharing state that anti-money laundering authorities should provide feedback to financial institutions to assist them with complying with AML requirements in the countries in which they are operating. For example: U.S. example: In 2017, FinCEN publicly launched the “FinCEN Exchange” to enhance information sharing between FinCEN, law enforcement agencies, and financial institutions. FinCEN invites financial institutions to voluntarily participate. As of December 2018, FinCEN had convened more than a dozen briefings with law enforcement agencies across the country, involving more than 40 financial institutions. According to FinCEN officials, through the FinCEN Exchange, the U.S. government and the private sector are able to exchange information on priority illicit finance threats, including TBML. For example, according to Treasury officials, FinCEN convened a FinCEN Exchange focused on TBML in San Antonio, Texas in April 2018. According to Treasury’s 2018 National Strategy for Combating Terrorist and Other Illicit Financing, the information provided by financial institutions through the FinCEN Exchange briefings has assisted FinCEN in targeting TBML networks. Other country example: In 2015, the United Kingdom established the Joint Money Laundering Intelligence Task Force as a collaborative mechanism between the U.K. government and the private sector to share and collectively analyze information on money laundering and economic crime threats. The task force brings together a range of private and public sector organizations, including law enforcement agencies and financial institutions. According to U.K. officials, TBML is one of the four priority areas of the task force. The task force has established six expert working groups led by representatives of the financial sector, including a TBML expert working group. Among other things, the TBML expert working group offers experts witness statements on TBML to support criminal prosecutions. In addition to sharing information with and providing feedback to financial institutions, several knowledgeable sources and reports from international bodies stated that these partnerships should also include a broad range of private sector entities involved in international trade. Several knowledgeable sources have highlighted the need for other private sector entities involved in international trade, such as shipping companies, freight forwarders, and customs brokers, to play a role in working with governments to identify TBML activities. One knowledgeable source noted that broader partnerships are important because banks and other financial institutions have a limited ability to detect indicators of potential TBML in a majority of trade transactions. For example, according to the Wolfsberg Group, 80 percent of international trade is conducted through open-account trade. With open-account trade, the transaction is not financed by a bank. Banks are generally not involved beyond processing the buyer’s payment to the seller and do not typically receive supporting documentation related to the transaction. Thus, financial institutions have limited visibility over open-account transactions and thus limited ability to identify suspicious activity. Several knowledgeable sources and reports from certain partner countries also acknowledged that challenges exist to creating partnerships with the private sector. They emphasized that for these partnerships to be successful, governments should ensure all participants trust that any information they share will be handled appropriately. For example, one knowledgeable source noted that countries could develop standards for information sharing between banks, while providing assurances about data security, privacy, and confidential commercial information. In addition, several knowledgeable sources and reports from partner countries stated that countries should address challenges related to privacy laws that prohibit banks from sharing client information or barriers restricting government agencies from sharing intelligence information with private sector partners. Relevant international bodies, including FATF, and knowledgeable sources stated that given the complexity of and difficulty in detecting TBML, governments could consider providing additional training to relevant government officials on techniques to detect and counter the threat. Governments would provide the training to government agencies, such as customs and tax collection agencies, tailored to meet the specific requirements and needs of different government authorities. Several knowledgeable sources and reports from international bodies noted that governments should also conduct events and other outreach activities to educate private sector entities. Some stated that such events and outreach activities could help increase the capacity of personnel at banks and other financial institutions to identify the characteristics, emerging trends, and new methods of TBML. According to FATF’s guidance paper on TBML, governments could organize conferences on the topic, or develop materials to help inform staff of various private sector organizations who monitor suspicious financial activity and potential TBML risks. For example: U.S. example: In 2018, FinCEN organized a conference on TBML for several U.S. agencies involved in combatting TBML, including HSI, CBP, and Internal Revenue Service Criminal Investigation, in addition to government officials from partner countries and non-government participants. The conference provided presentations on a range of issues related to TBML, such as the vulnerabilities in the gold industry that make it susceptible to TBML and the evolution of the Black Market Peso Exchange. In 2019, FinCEN organized an additional conference focused on TBML and bulk cash smuggling. Other country example: The Mexican government is working with State/INL to develop anti-money laundering experts and to build an AML task force. INL also created a training program to certify compliance officers, state auditors, prosecutors, analysts, and regulators in Mexico City on TBML. Several U.S. embassy officials noted that some partner countries needed to account for additional factors when creating TBML-specific training. They stated that before receiving TBML training, some partner countries needed to build more basic foundational skills. For example, U.S. embassy officials in Colombia stated that their priority is to provide Colombian prosecutors with more basic training on prosecutorial skills, such as presenting oral arguments, before offering advanced training, such as how to build a TBML case. Several knowledgeable sources, partner country officials, and international body reports we reviewed recommended that governments share information and data through domestic interagency collaboration to combat TBML. According to United Kingdom officials and an international body report, sharing trade data and relevant financial information, such as SARs, through an interagency approach is critical because TBML and its predicate crimes often cut across multiple agencies and their authorities and responsibilities. Agencies also bring different skill sets to investigations, such as expertise on customs enforcement, financial crimes, and trade data analysis. To foster interagency collaboration, several knowledgeable sources stated that governments could consider creating multi-agency task forces or mechanisms to address the challenges posed by TBML. For example: U.S. example: The El Dorado Task Force is an interagency investigative body that consists of 55 law enforcement agencies in New York and New Jersey, including federal agents, state and local police investigators, intelligence analysts, and federal prosecutors. The task force contains 12 groups, including one focused specifically on TBML. Officials from the El Dorado Task Force stated that as an interagency task force, it is able to utilize the respective expertise of various agencies and analyze multiple sources of information, such as international trade and Bank Secrecy Act data, in its investigative work. Other country example: The United Kingdom created the National Economic Crime Centre, which involves officials from multiple agencies, including law enforcement and regulatory bodies. The National Economic Crime Centre’s mission is to strengthen and prioritize the U.K. government’s coordination efforts by combining operational capabilities, data, and intelligence to target economic crime. To target specific crimes, the National Economic Crime Centre has created working groups, including a TBML one, to further cooperation and build expertise. Several U.S. embassy officials and host country officials stated that some countries may be hesitant to share information with all of the agencies involved in combatting TBML. These officials noted that issues such as corruption and lack of trust between agencies might limit the willingness and ability of countries to share information. For example, several Colombian government officials stated that corruption in their government limits the number of counterparts from other agencies that they can trust to collaborate with on combatting TBML. Several officials from certain partner countries, knowledgeable sources, and reports we read stated that trade partners could share trade data and relevant financial information with each other through bilateral or multilateral partnerships. Officials and international body reports also emphasized how important it is for countries to see both sides of trade transactions in order to detect anomalies that might reveal TBML activities. FATF reports noted governments could work together to create a secure system or mechanism that countries could use to exchange trade data and financial information. According to the Asia/Pacific Group on Money Laundering’s APG Typology Report on Trade Based Money Laundering, governments could coordinate international capacity building efforts with partner country counterparts, such as sharing strategies on combatting TBML and emerging trends related to TBML. For example: U.S. example: As part of its TTU program, HSI has established a formalized bilateral mechanism with a number of partner countries, particularly in the Western Hemisphere, to exchange and conduct ongoing analysis of trade data to facilitate the detection of suspicious TBML-related activities. By sharing these data, HSI and each of its partner TTUs are able to see import and export data for goods moving between the United States and the partner country. Other country example: The Paraguayan government has taken initial steps to coordinate with several countries in the region to try to increase the sharing of trade information, including Chile, Uruguay, and Argentina. According to a U.S. embassy official in Paraguay, the Paraguayan government also participates in a regional security mechanism with Brazil, Argentina, and the United States to address broader regional security threats, including money laundering activities. Figure 4 shows photos from Ciudad del Este, Paraguay, on Paraguay’s border with Brazil and Argentina, a region that has been identified by U.S. and Paraguayan officials as a key hub of TBML activity. U.S. officials and knowledgeable sources, however, noted several challenges to international cooperation related to technology and data uniformity. For example, officials from HSI stated that while international cooperation is critical to combat TBML, changes in government administration and technological limitations affect the continuity and the commitment to information sharing with foreign partners. In addition, U.S. officials and reports we reviewed stated that countries could consider enhancing and creating more uniformity in their data collection efforts so that they could use the data more effectively to combat TBML. For example, U.S. embassy officials and knowledgeable sources stated that countries need a common formatting or trade transactions identifier to allow countries to match import and export data more easily. HSI and partner country officials noted that, without a common identifier, they have faced difficulties connecting the import and export sides of trade transactions as they have sought to analyze trade data to identify potential cases of TBML. In addition, while some U.S. officials and knowledgeable sources see arrangements for sharing trade data between multiple countries as a possible means of improving detection of TBML-related activities, U.S. officials said that a lack of trust among countries complicates such efforts. U.S. officials and officials from countries we visited noted that countries might be reluctant to share their trade data more widely through multilateral mechanisms due to perceived risks the sharing of such important information might have on their commercial competitiveness. These officials noted the difficulty in creating a multilateral TTU because of these limitations. Multiple knowledgeable sources, as well as reports from international bodies, stated that governments could conduct further research on challenges that reduce their ability to combat TBML effectively, including potential impediments. According to the Asia/Pacific Group on Money Laundering’s report on TBML, developing a comprehensive strategy would help governments to address key challenges to combat TBML while also facilitating legitimate trade. In addition, one partner country report highlighted the need for an ongoing assessment of TBML to address challenges as the threat continues to evolve. For example: U.S. example: In 2015 and 2018, Treasury produced the National Money Laundering Risk Assessment, identifying the money laundering threats and risks, including TBML, which confront the United States. The assessments also identify the challenges U.S. agencies face in combating money laundering. For example, the 2018 assessment found that merchants sometimes knowingly accept illicit payments in exchange for trade goods without reporting the transactions and individuals can abuse their professional position at financial institutions by ignoring suspicious transactions. Other country example: In 2017, the Government of Singapore worked with private sector entities to identify and assess key issues that Singapore faced related to money laundering. As a result of that study, in 2018, the government produced the Best Practices for Countering Trade-Based Money Laundering report. The study found that, for example, banks should periodically conduct a risk assessment on risk factors related to TBML and test TBML red flags for effectiveness. Several knowledgeable sources stated that international bodies could examine any challenges and provide additional guidance to member countries on combatting TBML. According to Treasury officials, FATF is currently examining operational challenges related to TBML to provide additional guidance to member countries on combatting it. These officials indicated that this new study should provide an updated definition of TBML to better distinguish money laundering activity from other criminal activity. Additionally, an official from Treasury’s Office of Terrorism and Financial Intelligence said the best practices in FATF’s 2008 report were still relevant and that FATF has produced other reports since then related to TBML, such as its 2010 report on money laundering vulnerabilities in free trade zones. In the report, FATF noted a number of challenges related to combating TBML in these zones. For example, it reported that relaxed oversight and lack of data collection in free trade zones make them vulnerable to these schemes. Knowledgeable sources and reports from international bodies and a partner country also recommended further research about other impediments that challenge the ability of governments to combat TBML. For example, reports from international bodies and a partner country highlighted the ease with which shell companies can be established in many jurisdictions and the lack of transparency regarding the beneficial owners of such shell companies. According to FATF and various U.S. officials, criminal organizations can use shell companies to funnel illicit money through accounts that obscure the source of the funds. FATF recommends in its international standards that countries take measures to ensure relevant authorities have timely access to information on the ownership and control of legal persons. DHS, DOJ, State, and Treasury provide a variety of support to partner countries to assist in combating TBML, including establishing information- sharing methods, funding training and technical assistance, and providing ongoing law enforcement cooperation. The U.S. government’s primary partnership effort focused specifically on combating TBML is HSI’s TTU program. Under the program, HSI has set up TTUs in 17 partner countries. HSI established the first TTU with Colombia in 2005 and the most recent one with New Zealand in 2019. HSI’s goal with the TTU program is to exchange trade data with its partner TTUs to allow agencies in each country to work together to better identify anomalies in trade data that may indicate TBML. For example, through the analysis of shared trade data, HSI and a partner TTU may be able to determine if there is a discrepancy between the reported value of goods when they leave the United States and the reported value of the goods when they arrive in the partner country (and vice versa). There are four key steps that HSI and a partner country undertake in establishing a TTU, according to HSI officials: As a precondition for setting up a TTU, a country must have a Customs Mutual Assistance Agreement or similar information sharing agreement in place with the United States. HSI then negotiates a memorandum of understanding (MOU) with the relevant counterpart agency setting out the details of the partnership. Once the partner country signs the MOU, HSI provides the partner TTU access to its specialized system for analyzing trade data—the Data Analysis and Research for Trade Transparency System (DARTTS). HSI also provides training to the partner TTU on the system’s use. Table 2 shows the partner countries participating in the TTU program and how often HSI and each country share data. In addition to the TTU program, U.S. agencies have established other methods for sharing information with partners overseas that support efforts to combat money laundering, including TBML. For example, U.S. officials at Embassy Canberra reported that HSI had set up a pilot program in which the U.S. government shares its Reports of International Transportation of Currency or Monetary Instruments with the Australian Border Force. By comparing the U.S. information with what the Australian Border Force collects, the Australian Border Force has been able to identify and apprehend a number of bulk cash smugglers, according to Embassy Canberra officials. U.S. agencies have also worked to organize a number of ongoing or ad hoc forums for sharing information related to transnational crime, including money laundering and other economic crime. For example, DOJ’s Office of Overseas Prosecutorial Development, Assistance and Training has organized, with State support, two sessions of the Transnational Criminal Organizations Working Group, which brings together officials from the United States, Colombia, and Mexico to participate in specialized training and to develop joint strategies and best practices for combating transnational criminal organizations that threaten the three countries. According to an Office of Overseas Prosecutorial Development, Assistance and Training official at Embassy Bogotá, combating money laundering, including TBML, was a focus of the group’s most recent session in June 2019. State and Treasury’s OTA have funded a range of foreign assistance programs in partner countries that provide training and technical assistance related to combating money laundering and economic crimes. State allocated approximately $90 million in fiscal years 2014 through 2018 to programs to counter financial crimes and money laundering throughout the world. According to State, this funding supported a range of programs, including programs to assist countries in drafting legislation and regulations; training bank regulators and examiners, financial investigators, prosecutors, and judges; and strengthening the ability of FIUs in partner countries to receive, analyze, and disseminate suspicious activity reports, among other things. Although State has not funded any programming that focused exclusively on TBML during this period, it reported that it allocated approximately $5 million in fiscal years 2014 through 2018 for programs that included a substantial amount of information on the investigation, enforcement, or prosecution of TBML. For example, according to State, it has funded a series of projects to reform Peru’s criminal justice system that, among other things, helped strengthen the country’s ability to fight TBML. More recently, in fiscal year 2019, State noted that it has allocated approximately $5 million to the WCO for a project focused specifically on TBML. According to State, through this program, WCO will build the capacity of customs agencies to detect and deter smuggling and misreporting used to facilitate TBML. Treasury’s OTA allocated approximately $20 million in fiscal years 2014 through 2018 for projects to counter economic crimes throughout the world. Through these projects, OTA funds advisors—either a resident advisor who remains in the host country for several years, or a group of intermittent advisor who travel to the host country for short-term assignments. According to Treasury, these projects support the implementation of AML/CFT legal and regulatory regimes, as well as host government institutions, that are able to combat economic crimes. Although OTA has not funded any projects focused specifically on TBML, it stated that OTA advisors routinely discuss with their country partners the different methods that criminals use to launder money, including TBML. According to OTA, its assistance has addressed TBML to varying degrees in a number of projects. For example, OTA helped Peru’s tax and customs authorities to develop training for the Peruvian National Police Money Laundering Unit on how to best use customs databases to identify potential leads in TBML cases. Law enforcement agencies, including DEA, HSI, the Federal Bureau of Investigation, and Internal Revenue Service Criminal Investigation, have also posted personnel overseas that collaborate with law enforcement officials from the host country to work on cases related to TBML. For example, according to HSI data, the agency has opened TBML investigations supported by its personnel at embassies in a number of countries, including Colombia, Mexico, the United Kingdom, the Netherlands, the Dominican Republic, Singapore, and Spain. U.S. law enforcement personnel have also set up U.S.-supported vetted units in partner countries. For example, DEA has established Sensitive Investigative Units in a number of countries, such as Colombia and Paraguay. DEA partners with these units to investigate and disrupt various aspects of drug trafficking organizations’ operations, including money laundering activities. Over time, HSI’s work with partner TTUs has helped in the successful disruption of certain TBML schemes. For example, HSI reported that the Panamanian TTU provided analysis to support an investigation that successfully disrupted an illicit tobacco smuggling ring involving several Panamanian companies. The investigation led to four arrests and the seizure of over $10 million in cigarettes. In another case, HSI reported that HSI and the Peruvian TTU worked together to support an investigation that disrupted a TBML scheme involving the import of illegally mined gold into the United States from Peru. While HSI and other U.S. government officials have stated the TTUs in some countries have played an important role in certain investigations, the TTU program has faced challenges that limited its results in disrupting TBML schemes, including: Insufficient resources or support for the partner TTUs. In recent years, the U.S. government has not provided any funding directly to partner TTUs to support their activities, according to HSI officials. These officials noted that while HSI does not obligate funds to directly support partner TTUs, the agency will fund the travel expenses for its personnel to travel to a foreign country to provide training to a partner TTU. Previously, State had provided a limited amount of funding to certain partner TTUs, including for training and the purchase of computer software, according to State officials. However, State officials reported that State has not provided any funding for partner TTUs since fiscal year 2013, because insufficient evidence of the program’s effectiveness and various programming obstacles have led the department to prioritize funding for other anti-money laundering and crime prevention programs over the TTU program. For example, State officials noted that limited support from some U.S. embassies and a lack of HSI staff posted at them negatively affected the TTU program at times. However, State officials noted that they are generally supportive of the TTU concept and would consider providing further funding for the program, if HSI can demonstrate program results. HSI officials noted that they have not sought State funding for the TTU program in recent years, but would be interested in discussing State’s expectations regarding program results and pursuing State funding going forward. U.S. and partner country officials also noted that host governments have not always dedicated the necessary personnel and information technology resources to ensure the effective operations of the TTUs. For example, HSI officials stated that a lack of funding for partner TTUs has contributed to technology gaps between U.S. and partner country systems. Slow expansion of program and limited geographic range. Although HSI has established the goal of expanding the TTU program, the expansion has slowed over the last few years and it operates mainly in Latin America, despite the range of countries around the world that face risks related to TBML. HSI officials stated they have had discussions with several additional countries about establishing TTUs, but have not yet been able to finalize agreements with a number of these countries, resulting in only two new TTUs being set up over the last 3 years. Delays in launching partner TTUs and lapses in their operation. The TTU program has experienced delays in launching TTUs after HSI and the partner governments have signed the MOUs. For example, HSI officials at Embassy Canberra noted that HSI signed the MOU with Australia to establish its TTU in 2012, but it did not become fully operational until 2017. According to HSI officials, this delay was due to significant coordination challenges within the Australian government. Several TTUs have also experienced lapses in their operations. For example, the TTU in Argentina launched in 2006, but the two countries halted information sharing between 2011 and 2015. According to HSI officials, this halt in information sharing was because of U.S. concerns with corruption in the Argentinian government at that time. Differences in objectives between HSI and partner TTUs. HSI officials noted that one limitation in the TTU program is that partner TTUs frequently focus on revenue collection issues and place less priority on disrupting TBML schemes than HSI does. For example, partner TTUs may seek to identify instances of customs fraud, which can reduce duties collected by customs agencies on imported goods, but they may not pursue the investigation further to disrupt the criminal organizations involved in the scheme. Limited authorities and lack of interagency coordination in TTU partner countries. Partner TTUs generally operate within their countries’ custom agencies, which frequently do not have their own law enforcement authorities, according to HSI and other U.S. officials. As a result, they must coordinate with law enforcement partners within their countries to be effective. However, HSI officials noted that such coordination does not always take place. For example, HSI officials in Mexico stated that the Mexico TTU has had limited effectiveness because of a lack of sufficient cooperation between Mexican customs and law enforcement officials. Similarly, in Brazil, HSI officials noted information sharing with that country’s TTU has been delayed because the TTU lacks ready access to trade data and must purchase it from a different Brazilian government agency. Data sharing and connectivity. HSI and partner government officials have also noted issues about uploading partner trade data into DARTTS and ensuring these data are in a compatible format. For example, an HSI official in the United Kingdom described a delay of several months in uploading data from the United Kingdom into DARTTS because of data formatting issues. In addition, U.S. officials at Embassy Canberra noted that the Australian TTU has frequently experienced connectivity problems with DARTTS that have challenged the TTU’s ability to upload its data to the system. In addition, HSI and partner TTU officials noted that there are certain limitations in DARTTS, including difficulties in working with cross-border data, that reduce its effectiveness as a tool for HSI and partner TTUs to use in identifying potential cases of TBML. DHS noted that details on these limitations are sensitive and we did not include the specifics in this report. Although the TTU program has faced a number of challenges, HSI has not taken key management steps that could help guide its efforts, including developing a strategy and a performance monitoring framework. Because the TTU program involves partnerships between HSI and foreign governments, HSI has varying levels of ability to address these challenges through independent action. However, by developing a strategy and a performance monitoring framework, HSI could assess how best to plan for and address these challenges in order to maximize the program’s effectiveness. HSI officials stated that they have not produced any sort of planning or strategy documents specifically for the TTU program. HSI has produced a strategic plan for fiscal years 2016 through 2020 that references the TTU program. For example, the strategy notes that HSI plans to, “continue to provide operational, analytical, technical, and targeting support on trade- based money laundering and illicit funding investigations being conducted by HSI field offices and partner TTUs.” However, the strategy includes only limited references to the TTU program’s operations. According to HSI officials, for the TTU program specifically, they only conduct informal, periodic planning, such as identifying countries that they would like to prioritize for inclusion in the TTU program. DHS Directive 101-01 establishes requirements for planning, budgeting, programming, and executing for the department and its component agencies. Among other things, the directive requires agency heads, including the Director of ICE, to establish planning processes and methods to oversee program management and risk management activities for the programs and operations under their purview. HSI officials noted that in addition to the HSI strategic plan, they have used some documents, such as FATF’s 2008 report on best practices for combating TBML, to guide the TTU program, but have not prioritized the development of a strategy for the TTU program because of resource constraints. Without such a strategy, however, HSI lacks an important tool to guide its operations, including how best to work with its partner TTUs to identify potential cases of TBML, prioritize potential cases for further investigation, and successfully conduct these investigations. In addition, without a strategy, HSI cannot effectively plan how to grow the TTU program, where appropriate, and establish TTUs in additional priority countries. Although developing a strategy would require an investment of resources, a strategy would help ensure HSI is utilizing its limited resources effectively to achieve the TTU program’s goals over the long term. According to HSI officials, the HSI TTU tracks some information on the results of domestic investigations, including the number of TTU-related cases initiated and arrests made, but it does not have a performance monitoring framework, with specified metrics, that allows it to track the results of its work with partner TTUs. HSI officials also stated they have not conducted any evaluations of the factors that increase or decrease the TTUs’ effectiveness. As part of its requirement on planning, programming, budgeting, and execution, DHS Directive 101-01 states that, among other things, the objective of the execution phase is to account for cost and performance to determine if value has been delivered to stakeholders. The directive also notes that annual analysis and reporting of financial expenditures and performance measure results are key deliverables during the execution phase. HSI officials acknowledged that a performance monitoring framework would be beneficial, but they have prioritized other operational issues because of limited resources. In addition, they noted designing a performance monitoring framework that would allow HSI to measure and evaluate the results achieved through its work with partner TTUs would be challenging because, among other things, enforcement efforts of partner TTUs are not within their control and they do not have access to all partner country information. According to HSI officials, they instead rely on measures such as the number of trade records uploaded into DARTTS and the number of foreign users of DARTTS, among other things. However, without a performance monitoring framework for the TTU program, HSI lacks important information on what successes the program has achieved and how to replicate them with other partner TTUs. In addition, HSI lacks key information on areas where the program is not achieving its intended results and what adjustments to make in response. As with the development of a strategy, working to establish a performance monitoring framework would entail an investment of resources, but once completed it could help HSI in assessing how to maximize the impact of its resource investments in the TTU program. In addition, the performance monitoring framework could help demonstrate results to other stakeholders, such as State, that may wish to consider providing support to the TTUs in partner countries. The U.S. government has worked with FATF, the Egmont Group, UNODC, and the WCO to combat TBML. Among other things, the U.S. government has worked with these international bodies to develop anti- money laundering standards, share information regarding TBML methods and specific cases, and provide training and technical assistance to strengthen the ability of countries to combat TBML. As a member of FATF, the U.S. government has supported the organization’s efforts to develop internationally recognized standards for combating money laundering, terrorist financing, and the financing of the proliferation of weapons of mass destruction. FATF’s standards, updated in 2019, include 40 recommendations. According to FATF, it designed these recommendations to set out the critical measures that countries should establish to: identify the risks, and develop policies and domestic coordination; pursue money laundering, terrorist financing, and the financing of apply preventive measures for the financial sector and other establish powers and responsibilities for the competent authorities (such as investigative, law enforcement and supervisory authorities) and other institutional measures; enhance the transparency and availability of beneficial ownership information of legal persons and arrangements; and facilitate international cooperation. To date, FATF’s standards do not include any specific reference to TBML. However, Treasury officials from the U.S. government’s delegation to FATF stated that the standards are designed to provide a robust framework to help competent authorities prevent, detect, and mitigate against the misuse of global trade and combat all forms of money laundering, including TBML. For example, the officials noted that FATF’s third recommendation identifies the need for countries to criminalize money laundering, which would include TBML activity. The U.S. government also works with FATF to conduct mutual evaluations of member countries. FATF designed these evaluations, which are periodic peer reviews for each country, to provide a detailed assessment of a country’s technical compliance with the FATF standards and the effectiveness of its AML/CFT systems. These evaluations may at times highlight issues related to TBML in countries. For example, FATF’s 2014 mutual evaluation of Spain found a significant number of cases involving TBML, particularly those associated with value added tax or other tax fraud schemes. The U.S. government has also supported FATF’s development of several reports on TBML, including a 2006 report on types of TBML schemes and a 2008 report on best practices for detecting TBML. More recently, FATF published various other reports addressing issues relevant to combating TBML, including the 2010 Money Laundering Vulnerabilities of Free Trade Zones, the 2015 Money Laundering/Terrorist Financing Risks and Vulnerabilities Associated with Gold, and the 2018 Professional Money Laundering. These reports provide a range of guidance to countries on how to detect and combat TBML. FinCEN has worked with its fellow FIUs in the Egmont Group to exchange tactical, operational, and strategic information to assist in efforts to combat money laundering, including TBML. As part of its work with Egmont Group partners, FinCEN shares information on particular cases in response to requests from fellow FIUs, proactively shares relevant information with other FIUs, and requests information from FIUs. According to FinCEN officials, Egmont Group membership is critical to information sharing in support of FinCEN analysis and U.S. law enforcement cases because it provides assurances that members have the appropriate policies and procedures in place to respond to and protect sensitive information. FinCEN and its FIU counterparts follow the Egmont Group’s Principles for Information Exchange Between Financial Intelligence Units, in addition to the law of each jurisdiction, to foster cooperation while sharing information securely. Generally, Egmont Group members use a dedicated computer system that the organization has developed, the Egmont Secure Web, to share information securely. FinCEN officials stated that they respond to about 1,000 information requests a year from other Egmont Group members. For example, at the request of a foreign FIU, FinCEN conducted research on an import/export company suspected of involvement in TBML, summarizing relevant SARs and identifying other relevant information on the subjects. FinCEN’s assessment determined the potential use of a TBML scheme and use of shell companies to obfuscate the flow of funds. FinCEN has also supported the Egmont Group’s efforts to provide training to member FIUs on issues related to money laundering and terrorism financing. For example, FinCEN has helped develop and deliver Egmont Group-sponsored training to FIU analysts on how to understand complex financial data. However, Treasury officials stated that the Egmont Group has not provided any TBML-specific training. Although the Egmont Group has not sponsored TBML-specific training for FIUs, FinCEN officials noted that FinCEN has hosted officials from several partner FIUs at the TBML conferences it held in 2018 and 2019 and has provided its own TBML- related training to partner FIUs. For example, in October 2019, FinCEN provided TBML-related training to Mexico’s FIU. Finally, FinCEN has supported the Egmont Group’s development of relevant guidance documents. For example, the Egmont Group developed, in partnership with FATF, a 2013 report called Money Laundering and Terrorist Financing through Trade in Diamonds. According to the report, the two bodies decided to undertake the research because they had (1) never conducted in-depth research on the diamond trade and associated money laundering and terrorist financing risks and (2) a number of participants in the bodies had noted indications that the diamond trade was being exploited for money laundering and terrorist financing purposes. More recently, in July 2018, the Egmont Group produced an additional report with FATF, Concealment of Beneficial Ownership, which also discussed certain TBML schemes. The U.S. government also partners with UNODC in its work to combat illicit drugs and international crime, including TBML. Among other things, State has provided funding to UNODC’s Global Program against Money Laundering, Proceeds of Crime and the Financing of Terrorism. Through the program, UNODC has provided training and technical assistance to a range of member states throughout the world. For example, as part of the program, UNODC places AML experts in countries for up to a year to serve as mentors. These mentors provide a range of support, such as helping countries establish functioning FIUs. UNODC also conducts shorter-term workshops and training sessions, such as mock trial training for law enforcement officers, prosecutors, and judges to enhance their ability to investigate and prosecute money laundering cases. In addition, according to UNODC, under the program, it has developed model legislation that United Nations members can use in setting AML/CFT legal regimes in their countries that are consistent with FATF standards. The U.S. government has also supported certain UNODC programs that have specifically addressed issues related to TBML. According to a UNODC official in Colombia, UNODC has worked with State INL and HSI to provide training for governments in the region to increase expertise on TBML. The official said that UNODC is prioritizing TBML-specific trainings, particularly to build TBML knowledge amongst new prosecutors. In addition, UNODC headquarters officials noted that State INL has supported the development of a program on TBML that UNODC is planning in the Caribbean. The U.S. government also works with the WCO to develop and strengthen the role of customs administrations in tackling TBML. Among other things, CBP has supported WCO’s efforts to develop enforcement tools, guidance and best practices, and training for member countries. For example, CBP has supported the WCO’s development of its Cargo Targeting System. The system, which is available to all WCO members, is designed to assist customs agencies in conducting automated risk assessments of import, export, and transshipment cargo in order to identify high risk shipments that warrant further investigation. With WCO support, several customs agencies also developed the “Compendium of Customs Operational Practices for Enforcement and Seizures,” a tool that provides practical examples for improving enforcement and seizure practices. With CBP support, WCO has produced a number of guidance and best practices documents that can support efforts to combat TBML. For example, in a 2018 report, the WCO described a number of best practices that customs administrations could consider for combating illicit financial flows via trade misinvoicing. In addition, in 2019, the WCO and the Egmont Group developed a Customs-FIU Cooperation Handbook that provides their members guidance and best practices for enhancing global collaboration efforts between customs agencies and FIUs. Finally, the WCO has provided training for its member countries to deter illicit activities and combat TBML. For example, through the WCO, HSI special agents with AML and TBML expertise have conducted workshops to assist WCO member countries in their operational efforts. The WCO also organized a joint workshop with the Organization for Economic Co- operation and Development in 2019 that was designed to raise awareness among customs agencies, FIUs, and law enforcement agencies about TBML related to gems and precious metals. In 2019, the WCO also agreed to launch a two-year counter-TBML effort entitled “Project TENTACLE,” according to CBP officials. The project will include the delivery of TBML workshops to WCO members through 2021, as well as five operational customs activities that follow each workshop. This project will focus on the Asia/Pacific, Africa, and South America regions. State INL has provided funding for Project TENTACLE, in coordination with experts from ICE and CBP. WCO officials noted the lack of training that many customs administrations have on TBML, and the need for regularized training on the subject. TBML poses significant national security risks to the United States. Criminal and terrorist organizations use TBML schemes to disguise the origins of billions of dollars in funds generated by their illicit activities. Given the national security threat that TBML poses, it is crucial that the U.S. government develop an effective response to combat it. Because TBML is international in nature and frequently involves complex, difficult to detect schemes that cut across international borders, it is important that the U.S. government respond through domestic efforts and collaborate with partner countries and international bodies to address the problem. As the U.S. government’s primary partnership program focused on combating TBML, the TTU program plays a key role in these efforts to collaborate with other countries. Although the TTU program has achieved some successes, it has also faced a number of challenges. However, HSI has not taken key management steps to address those challenges and to strengthen the TTU program. HSI, for example, has not established a strategy for the TTU program. Because HSI does not have such a strategy, it lacks an important guide for its efforts to maximize the effectiveness of its existing TTU partnerships and to prioritize efforts to expand the program to other countries. HSI also does not have a performance monitoring framework that tracks the results of its work with partner TTUs. Without such a framework, HSI does not have a means of systematically tracking progress toward program goals and identifying areas that need adjustments to improve program results. We are making two recommendations to DHS: The Secretary of Homeland Security should direct the Director of ICE to develop a strategy for the TTU program to ensure that ICE has a plan to guide its efforts to effectively partner with existing TTUs, and to expand the program, where appropriate, into additional countries. (Recommendation 1) The Secretary of Homeland Security should direct the Director of ICE to develop a performance monitoring framework for the TTU program that would enable the agency to systematically track program results and how effectively it is achieving the program’s goals. (Recommendation 2) We provided a draft of the report to DHS, DOJ, State, and Treasury. DHS, State, and Treasury provided technical comments, which we incorporated as appropriate. DOJ noted that it had no comments on the draft. DHS also provided written comments, which are reproduced in appendix III. In its comments, DHS stated it concurred with our recommendation that the Secretary of Homeland Security direct the Director of ICE develop a strategy for the TTU program, but did not concur with our recommendation to develop a performance monitoring framework for the program. In its response to our recommendation regarding a strategy for the TTU program, DHS noted that HSI has a strategic plan for fiscal years 2016 through 2020 that addresses the TTU program. However, it stated that the TTU program would develop, as a complement to the HSI strategic plan, a document that outlines emerging threats and challenges, as well as existing metrics that are used to track program results for the TTU. In noting it did not concur with our recommendation to develop a performance monitoring framework for the TTU, DHS stated the TTU program already collects a number of statistics each fiscal year related to its program results and can use these statistics to demonstrate program results. DHS also stated that while the TTU program’s primary mission is to establish partnerships and provide foreign law enforcement with information tools to facilitate the exchange of data between TTUs, HSI has limited ability to track the activities of partner TTUs and cannot dictate the enforcement actions partner countries take. In our report, we acknowledge that the HSI TTU tracks some information on the results of domestic investigations, as well as other information, such as the number of records in DARTTS. We also acknowledge that because the TTU program involves partnerships between HSI and foreign governments, HSI does not have the ability to independently control all aspects of the program’s performance. However, we believe that further action by HSI to establish a performance monitoring framework is warranted for the following reasons. First, although HSI has noted examples of statistics it can use to measure the performance of the TTU program, it does not have a formally documented framework or process for measuring its performance or reporting performance results. Second, while the TTU program has identified a few indicators it uses in assessing performance, it has not established any indicators with goals for which to measure its results against, making it challenging to assess whether HSI is making progress to achieve the program’s goals. Third, even though HSI has some measures, such as the number of TTU-related cases it has initiated or arrests made, HSI officials acknowledged that the agency does not track information on what role the TTU actually played in these cases. As a result, HSI cannot establish the extent to which the TTU, rather than a different HSI office, has contributed to any of the measures. Fourth, although we recognize that HSI does not have the ability to dictate what actions partner TTUs will take and may not have access to all relevant partner country information, HSI does have opportunities to take further action to monitor the outputs of its work with partner TTUs. For example, HSI could work with partner TTUs to collect information more systematically on successful cases that they have initiated. HSI could also collect information on factors that reduced the ability of partner TTUs to successfully pursue cases. Other U.S. agencies have conducted performance monitoring and evaluations on programs that rely on partnership and collaboration with foreign governments. We continue to believe in the need for a rigorous performance monitoring framework for the TTU program, a key U.S. government effort in combatting TBML. We note that HSI could potentially integrate a performance monitoring framework into the strategy it plans to develop in response to our first recommendation. For example, DHS stated in its comments that HSI plans to document the metrics it will use to measure the TTU program’s results in that strategy. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Acting Secretary of Homeland Security, the Secretary of State, the Secretary of the Treasury, and the Attorney General. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-8612 or GianopoulosK@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix IV. This report examines (1) what the available evidence indicates about the types and extent of international trade-based money laundering (TBML) activities, (2) the practices international bodies, selected countries, and knowledgeable sources have recommended for detecting and combating TBML, and (3) the extent to which U.S. Immigration and Customs Enforcement has effectively implemented the TTU program and the steps the U.S. government has taken to collaborate with international partners to combat TBML. To address all three objectives, we analyzed relevant data and documentation from the Departments of Homeland Security (DHS), Justice (DOJ), State (State), and the Treasury (Treasury). For example, we reviewed U.S. government documents that discuss risks associated with TBML, including Treasury’s 2015 and 2018 National Money Laundering Risk Assessment and 2015 and 2018 National Terrorist Financing Risk Assessment and the Drug Enforcement Administration’s annual National Drug Threat Assessment. In addition, we reviewed U.S. government strategy documents that provide information on the extent and types of TBML, including Treasury’s 2018 National Strategy for Combating Terrorist and Other Illicit Financing and State’s annual International Narcotics Control Strategy Report (Volume II). We also analyzed other U.S. government reporting on TBML, including TBML- related advisories from Treasury’s Financial Crimes Enforcement Network (FinCEN), selected cables from U.S. embassies describing TBML issues in their host country, and summary analyses from Immigration and Customs Enforcement Homeland Security Investigation’s (HSI) Trade Transparency Unit (TTU). Finally, we conducted interviews with officials from DHS, DOJ, State, and Treasury in Washington, D.C. We also selected a nongeneralizable sample of six countries to study in greater depth. We conducted fieldwork in three of these countries: Colombia, Paraguay, and the United Kingdom. During our fieldwork in each country, we interviewed U.S. embassy officials from DHS, DOJ, State, and Treasury. In each country, we also interviewed host country officials, including TTU, law enforcement, financial intelligence unit, and financial regulatory agency officials. In addition, in Paraguay, we traveled to Ciudad del Este to observe commercial activity and border operations on Paraguay’s border with Brazil and Argentina. For the other three countries we selected—Australia, Mexico, and Singapore—we conducted work remotely. We interviewed, via telephone, U.S. embassy officials in Australia and Mexico, and obtained written responses from U.S. officials at Embassy Singapore. To select these six countries, we considered several criteria, including (1) the type and extent of TBML risk, (2) the types and level of U.S. collaboration with the country, (3) the presence of U.S. agencies that work on TBML in the country, (4) the extent to which the country had implemented recommended practices to identify and combat TBML (with a goal of covering a range of levels of adoption), and (5) the country’s location (with a goal of covering a range of geographic regions). The team also considered additional factors based on recommendations from knowledgeable sources, such as selecting countries with differing levels of capacity to respond to the TBML threat. To determine what available evidence indicates about the types and extent of international TBML, we analyzed documentation from relevant international bodies including the Egmont Group of Financial Intelligence Units (the Egmont Group) the Financial Action Task Force (FATF), the United Nations Office on Drugs and Crime (UNODC) and the World Customs Organization (WCO). For example, we reviewed these reports: FATF’s 2006 Trade Based Money Laundering and 2008 Best Practices Paper on Trade Based Money Laundering; the Egmont Group’s and FATF’s 2013 Money Laundering and Terrorist Financing through Trade in Diamonds; UNODC’s 2011 Estimating Illicit Financial Flows Resulting from Drug Trafficking and Other Transnational Organized Crimes; and WCO’s 2018 Illicit Financial Flows via Trade Mis-invoicing. To gather further information regarding the types and extent of international TBML activities, we conducted 15 interviews, covering a nongeneralizable sample of individuals knowledgeable about TBML and efforts to combat it, including academic researchers, think tank officials, private sector representatives from trade organizations and individual companies, and former U.S. government officials. Throughout this report, we refer to these individuals as “knowledgeable sources.” In selecting these knowledgeable sources, we conducted initial research to identify individuals or organizations that had conducted research related to TBML and prioritized those whose work was frequently cited by other sources. We also requested recommendations from U.S. agencies and the knowledgeable sources we spoke with regarding other individuals or organizations we should meet with during our work. In selecting these knowledgeable sources, we sought to choose people with different types of experiences studying and working on issues related to TBML to get a range of perspectives. We also conducted a literature search for studies from peer-reviewed journals, conference papers, dissertations, government reports, industry articles, and think tank publications that sought to quantify the amount of TBML activities. We also asked for recommendations on relevant publications as part of our initial meetings with U.S. agencies and knowledgeable sources. We examined summary level information about each piece of literature, and then from this review, identified articles that were germane to our report. A GAO economist then evaluated the methods used in the research and a GAO methodologist performed a secondary review and confirmed the summarized research findings. We reviewed 10 studies published between January 2009 and July 2019 that were relevant to our research objective on what the available evidence indicates about the extent of international TBML activities. We also reviewed one additional article published in 1999, which was frequently cited in other articles as a pioneer of measuring money laundering and included it in our review. To identify the practices international bodies, selected countries, and knowledgeable sources have recommended for detecting and combating TBML, we conducted a literature review to find relevant studies and other reports prepared by international bodies, industry groups, think tanks, academics, and foreign governments. We then analyzed these studies and reports to identify recommendations they made regarding practices for detecting and combating TBML. To gather further information regarding recommended practices for detecting and combating TBML and potential challenges in implementing such practices, we interviewed U.S. representatives of FATF and the Egmont Group, conducted interviews with UNODC officials, and obtained written responses to a set of questions from the WCO. We also spoke with U.S. embassy officials in five of the countries we selected for our nongeneralizable sample and obtained written responses from U.S. embassy officials in the sixth country. In addition, we spoke with host country officials in three of those countries. Finally, we spoke with selected knowledgeable sources. Through our work, we identified a range of recommended practices related to detecting and combating TBML. We grouped these recommended practices into five categories. We also identified examples of the steps that the U.S. government and other countries have taken to implement practices in each of these five categories. To examine the extent to which U.S. Immigration and Customs Enforcement has effectively implemented the TTU program, we collected information on HSI’s TTU program, including data on HSI’s TTU partner countries, the details on the TTU program’s operations, and documentation on the data system HSI developed to support the TTU program—the Data Analysis and Research for Trade Transparency System (DARTTS). We also evaluated HSI’s management of the TTU program by comparing the steps it had taken to establish a strategy and performance monitoring framework to requirements that DHS has established related to planning, programming, budgeting, and execution. To identify the steps HSI had taken, we interviewed HSI officials and reviewed relevant documentation on the TTU program. To examine the steps U.S. agencies have taken to collaborate with international partners to combat TBML, we also obtained and analyzed foreign assistance data, for fiscal years 2014 through 2018, from State on financial crimes and money laundering assistance programs it funded and from Treasury’s Office of Technical Assistance (OTA) on economic crimes assistance programs it funded. To assess the reliability of these data, we reviewed available documentation and interviewed knowledgeable U.S. officials. We determined that the State and Treasury OTA assistance data were sufficiently reliable for our purposes to present summary information on funding for assistance programs. We also reviewed other relevant U.S. government documentation describing training, technical assistance, or other support that U.S. agencies provided to partner countries to assist them in combating TBML or money laundering more broadly. For example, we reviewed selected performance reports for State anti-money laundering programs and selected end-of-project reports for Treasury OTA economic crimes programs. To gather information on the U.S. government’s collaboration with international bodies, we reviewed documentation from the Egmont Group, FATF, UNODC, and WCO describing the key activities of the bodies. Finally, as part of our work for this objective, to learn more about U.S. agencies’ work with partner countries and international bodies to combat TBML, we also interviewed U.S. officials in Washington, D.C. and interviewed U.S. embassy and host government officials in partner countries. We conducted this performance audit from January 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. To determine the extent of trade-based money laundering (TBML) activities, we conducted a literature search for studies that sought to quantify potential illicit financial flows, including TBML. We considered existing studies from peer-reviewed journals, conference papers, dissertations, government reports, industry articles, and think-tank publications identified through searches the GAO librarian conducted of various databases, such as EconLit, Social SciSearch, and Scopus. We also asked for recommendations on relevant publications as part of our initial meetings with U.S. agencies and knowledgeable sources. After conducting the searches and relying on recommendations, we started the review with 82 studies. To assess the methodological quality of the studies, we relied on generally accepted social science standards. We examined summary level information about each piece of literature, and then from this review, identified 14 articles that sought to quantify potential illicit financial flows, including TBML. A GAO economist evaluated the methods used in the research, eliminated some research if the methods were not appropriate or not rigorous, and then summarized the research findings. In addition, a GAO methodologist performed a secondary review and confirmed our reported analysis of the finding. We further eliminated four studies and eventually identified 10 studies published between 2009 and 2019 that were relevant to our research objective on what the available evidence indicates about the extent of international TBML activities. We also identified one additional article published in 1999, which other articles frequently cited as a pioneer method of measuring money laundering, and included it in our review. See table 3 below for the list of studies included in our analysis. We found that estimating the extent of money laundering is a challenging task given that criminals seek to hide their illegal activities. Still, economic and statistical models have been developed that attempt to quantify the extent of such activities using various published datasets. However, none of the studies we identified in our literature review sought to develop estimates of TBML specifically and all the studies we reviewed capture activities that are generally broader than TBML to include tax avoidance, trade price manipulation, or trade misinvoicing, which demonstrates the difficulty in estimating the magnitude of TBML activity. In addition, according to the literature we reviewed, the studies we identified all had certain methodological limitations. We found that studies seeking to quantify potential money laundering activities, including TBML, have typically relied on one of four methods: (1) Walker gravity model, (2) unit price analysis, (3) trade mirror analysis, or (4) a theoretical model. One of the first researchers that attempted to measure money laundering is John Walker. In a paper published in 1999, he used what became known as the Walker gravity model to estimate the amount of money laundering globally. The gravity model states that the amount of trade from place A to place B depends on the size of the population in A, the “attractiveness” of B to people based in A, and the distance between the two places. The Walker model based the “attractiveness” of a place on four assumptions: (1) foreign countries with a tolerant attitude towards money laundering will attract a greater proportion of the funds than more vigilant countries; (2) high levels of corruption or conflict will deter money launderers, because of the risks of losing their funds; (3) countries with high levels of gross national product per capita will be preferred by money launderers, since it would be easier to “hide” their transaction; and (4) other things being equal, geographic distance, and linguistic or cultural differences, work as deterrents to money launderers. According to the literature we reviewed, the Walker gravity model has several limitations. First, because the flows of money laundering are unobservable, it is not possible to assess the quality of the formula. Second, although some factors in the attractiveness indicators are plausible, they are still arbitrary. Third, the researcher acknowledged that these figures represent only an interim set of results to show the types of output that would be derived from a fully developed model. These estimates are not his best and final estimates of money laundering around the world. Because of these limitations and considering the estimates are based on data that date to 1995, we did not present the estimates in the report. However, considering the importance of the Walker gravity model in the literature on measuring money laundering, we discussed this model in the report to provide context on methods used to quantify potential money laundering activities. A researcher used the unit price analysis to analyze U.S. trade data to quantify the magnitude of suspicious trade transactions. The database contains information at the transaction level that is reported to the U.S. Census Bureau from Shipper’s Export Declarations and U.S. Customs Service Entry Summary forms. The model follows the International Revenue Service’s definition of suspicious prices, which, according to the researcher, is defined as prices that are outside of the upper- or lower- quartile price range for each commodity in each country. He then aggregated the total dollar amount to come up with an estimate of the amount of suspicious trade. The researcher found that in 2018, total money moved out of United States through under-valued exports and over-valued imports was approximately $278 billion. Total money moved into the United States through over-valued exports and under-valued imports was approximately $435 billion. According to the literature we reviewed and information we received from the Census Bureau, we found that the unit price analysis approach has several limitations. First, the Census Bureau edits raw trade data received from Customs and Border Protection by automatically correcting unit prices that fall outside of its price parameters, which it establishes using industry analysis, input from public and private entities, and trend data. Of the total amount of export and import records in a specific month, roughly 18 percent to 22 percent contain some type of editing, according to the Census Bureau. The edited data with some extreme unit prices (those that fall outside of price parameters set by the Census Bureau) already “corrected” creates issues for the unit price analysis, which relies on identification of extreme unit prices. Second, the use of lower- or upper-quartile as price filters is somewhat arbitrary. For example, another study noted a fundamental weakness is that unit price analysis depends on the existence of a benchmark against which “abnormality” can be assessed. A lower benchmark would, in most product categories, produce more prices flagged as suspicious. Moreover, estimates from the unit price analysis also include other types of illicit activities in addition to TBML, such as income tax avoidance or evasion, among others. Therefore, this measurement of suspicious trade is generally broader than that of TBML. In addition, because of their focus on identifying suspicious prices, these estimates exclude other types of TBML that may not utilize over- or under-invoicing techniques, such as the Black Market Peso Exchange. The third approach, adopted by Global Financial Integrity and several other scholars, uses trade mirror analysis to estimate the amount of trade misinvoicing. This approach compares what country A reports as an export to country B and what B reports as an import from A (or vice versa). The calculation assumes the price and volume declared to both countries authorities would match after accounting for insurance and freight costs, and that any further difference between the trades reported by the countries indicates trade misinvoicing. In its latest report, Global Financial Integrity measured trade misinvoicing using two datasets. First, Global Financial Integrity relied on the International Monetary Fund’s (IMF) Direction of Trade Statistics and selected bilateral trade reports for 148 developing countries trading with 36 advanced economies from 2006 to 2015. Global Financial Integrity calculated potential trade misinvoicing as the import and export gaps, netted of the insurance and freight costs differentials. Second, Global Financial Integrity used United Nations Comtrade data to calculate trade gaps, where Comtrade gaps are calculated for each of the Harmonized System six-digit commodity classes available. Global Financial Integrity found that over the 10-year period of this study, potential trade misinvoicing amounted to between 19 and 24 percent of developing country trade on average. For 2015, it estimated that potential trade misinvoicing to and from these 148 developing countries were between $0.9 trillion and $1.7 trillion. According to the literature we reviewed, the Trade Mirror Analysis approach also has several limitations. First, alternative, legitimate reasons for import and export gaps may exist. For example, a researcher noted that “price volatility, transit and merchant trade, and the use of bonded warehouses can result in large trade data discrepancies arising from legitimate trade.” Another researcher also noted that major differences in customs import valuation methodologies and customs administration fees could contribute to trade data discrepancies. Moreover, accurate records may not always exist, especially in developing economies. Second, according to one researcher, the IMF and the United Nations, whose data these studies draw on, warn that the statistics cannot be reliably used in this way. The IMF says, “we caution against attempting to measure by using discrepancies in macroeconomic datasets…. fficial estimates of trade misinvoicing cannot be derived by transforming trade data from the IMF Trade Statistics and/or United Nations Comtrade, either by individual country or in aggregate.” Moreover, Global Financial Integrity defines trade misinvoicing as the fraudulent manipulation of the price, quantity, or quality of a good or service to shift money across international borders. Therefore, this measurement of trade misinvoicing is generally broader than that of TBML. However, certain types of TBML schemes are likely not included in the estimate of trade misinvoicing. For example, Black Market Peso Exchange schemes are likely not included because they do not require falsification of the price, quantity, or quality of a good or service. Another study sought to account for various factors that may lead to simple import-export discrepancies. The analysis focuses on under- reporting of Italian exports and over-reporting of Italian imports. The authors used a linear mixed model, where the dependent variable is the discrepancy in mirror statistics. The authors adopted a “residual approach,” in which the model controls for the main legal determinants of mirror statistics gaps, and the estimate residuals are proxy measures of the illegal component of such discrepancies. Using this approach, the authors were able to calculate irregular trade flows at country-sector level and rank countries and sectors by their risk levels. This approach uses economic theory to determine how much launderers would launder if they acted in an economic rationally manner. One study developed a theoretical model for estimating money laundering in the United States and the 15 countries that were in the European Union at the time. According to a researcher, the model assumes that “agents have the option to work partly in the legal economy and partly in the illegal economy. They face transaction costs in the legal sector and costs of being detected in the illegal sector. Two types of firms produce with two different technologies a legal good and an illegal good. The government sets fines, can influence the probability of detection, and can influence the liquidity of the economy. There is a liquidity constraint. If households want more liquid funds, they must engage in the illegal sector. The ‘optimal’ money laundered depends on the labor services allocated to the legal and illegal sector and on the prices and on the quantities of both goods.” The model uses parameters for the U.S. economy and for the European Union macro area and creates simulations to generate equilibrium allocations for money laundering. According to one study, this model has the advantage of having a solid micro-foundation, which helps to identify rational laundering behavior. However, the model is highly theoretical and has various unrealistic assumptions. For example, according to the model, without liquidity constraint in the economy, there would be no money laundering. Moreover, one of the parameters used in the model—the probability of being detected—is calibrated using data for the Italian economy from 1998 through 2000. Given the limitations discussed above and because the data date to 1998, we did not present the estimates in the report. However, considering that the theoretical model is one of the methods frequently discussed in the literature on measuring money laundering, we discussed this model in the report to provide context on methods used to quantify potential money laundering activities. In addition to the contact named above, Juan Gobel (Assistant Director), Ming Chen (Assistant Director), Ryan Vaughan (Analyst-in-Charge), Joyce Y. Kang, Pamela Davidson, Leia Dickerson, Neil Doherty, Toni Gillich, Jeff Harner, Georgette Hagans, Grace Lui, Dan Luo, and Aldo Salerno made key contributions to this report.", "summary": "TBML involves the exploitation of international trade transactions to transfer value and obscure the origins of illicit funds. Various observers have noted that although TBML is a common form of international money laundering, it is one of the most difficult to detect due to the complexities of trade transactions and the sheer volume of international trade, among other things. This report examines (1) what the available evidence indicates about the types and extent of international TBML activities, (2) the practices international bodies, selected countries, and knowledgeable sources have recommended for detecting and combating TBML, and (3) the extent to which ICE has effectively implemented the TTU program and steps the U.S. government has taken to collaborate with international partners to combat TBML. GAO analyzed U.S. agency and international body data and documentation, conducted a literature review, and interviewed U.S. officials and selected knowledgeable sources. Different types of criminal and terrorist organizations use trade-based money laundering (TBML) to disguise the origins of their illicit proceeds and fund their operations. TBML schemes can rely on misrepresenting the price, quantity, or type of goods in trade transactions, but other methods are also used. For example, some drug trafficking organizations from Latin America have used a type of TBML scheme known as the Black Market Peso Exchange (BMPE) to launder funds. BMPE schemes involve merchants who—wittingly or not—accept payment in illicitly derived funds, often from third parties to a trade transaction, for exports of goods. In carrying out TBML schemes, criminal and terrorist organizations use various goods, including precious metals and automobiles (see fig.). U.S. officials and other sources have identified a number of countries as being at particular risk for TBML schemes. Available evidence indicates that the amount of TBML occurring globally is likely substantial. However, specific estimates of the amount of TBML occurring around the world are not available. Officials and reporting from relevant international bodies and selected partner countries, and knowledgeable sources recommended various practices for countries to consider to combat TBML, which GAO grouped into five categories: (1) partnerships between governments and the private sector, (2) training, (3) sharing information through domestic interagency collaboration, (4) international cooperation, and (5) further research on challenges to combating TBML. The U.S. government's key international effort to counter TBML is the Trade Transparency Unit (TTU) program under the Department of Homeland Security's (DHS) Immigration and Customs Enforcement (ICE). ICE set up TTUs in 17 partner countries with the goal of exchanging and analyzing trade data to identify potential cases of TBML. While TTUs have played a role in some TBML investigations, the TTU program has experienced various challenges, including lapses in information sharing between ICE and the partner TTUs, differing priorities between ICE and partner TTUs in pursuing TBML investigations, and limitations in the data system that ICE and the TTUs use. However, ICE has not developed a strategy to increase the effectiveness of the TTU program or a performance monitoring framework to assess the results of its work with partner TTUs. As a result, ICE does not have a clear guide on how best to operate the TTU program and cannot make management decisions based on program results. In addition to the TTU program, the U.S. government collaborates with partner countries and international bodies through a range of other activities, such as developing international anti-money laundering standards, providing training and technical assistance, establishing information-sharing methods, and providing ongoing law enforcement cooperation. GAO recommends that DHS develop (1) a strategy to maximize TTU program effectiveness and (2) a performance monitoring framework for the TTU program. DHS concurred with the first, but did not concur with the second recommendation, citing data it already collects and challenges it faces. GAO continues to believe the recommendation is valid, as discussed in the report.", "document_type": "gao"}
{"report": "The FirstNet-AT&T network contract and its associated task orders define the requirements AT&T must meet. The contract currently involves five task orders, four of which relate directly to the network’s deployment. Task orders 1 and 2 (actions complete). Required AT&T to develop and deliver individual network deployment plans for each of the 56 states, territories, and the District of Columbia (hereafter, states). The governor of each state had the opportunity to review the plan and opt in to allow FirstNet and AT&T to build the network in their state. All governors opted in by the applicable deadline. The result of this process was a state deployment plan that included state-specific commitments made by AT&T. Task order 3 (actions ongoing). Requires AT&T to deploy, operate, and maintain the network’s “core” and all of its functions, and provide for the development of device and application ecosystems for the network. A network core consists of national and regional data centers and other elements that store, process, and secure network users’ traffic (activity), and interface with federal, state, and local networks. AT&T deployed the core in March 2018. The network uses the spectrum reserved for public-safety use (“Band 14”), as well as the spectrum that AT&T’s existing, commercial network operates on. When Band 14 spectrum capacity is not being used by public-safety users, AT&T can use the excess capacity for its non-public-safety, commercial-network users. As such, among the functions that task order 3 provides for are capabilities that allow prioritizing a public- safety user’s network access and traffic over other users and, when necessary, preempting other users altogether. These functions are commonly referred to as “priority and preemption.” Task order 4 (actions ongoing). Requires AT&T to deploy the network’s Band 14 coverage in the states, including building the “radio-access network” in each state that connects to the network’s core and backhaul (which carries network users’ traffic) and fulfilling the state-specific commitments. Radio-access networks consist of cell towers, sites, and other elements that connect network-users’ devices to the network core. This task order also requires AT&T to provide 72 “deployable” cellular assets—meaning, transportable equipment (typically in a vehicle) that can provide additional network coverage when needed—dedicated solely for FirstNet network users. The task order also provides for access to at least 300 additional deployables in AT&T’s fleet. The contract and task orders 3 and 4 outline a phased approach for deploying the network’s capabilities and coverage (in both non-rural and rural areas), with five “initial” operating-capability phases that build to a “final” operating capability expected in 2023, as well as ongoing performance, maintenance, and continuous improvement through 2042. As described further below, each phase provides for increased capabilities and coverage—and some outline goals for network user adoption—and AT&T must meet certain required milestones in each phase to receive payment for that phase from FirstNet. Figure 1 depicts the phased timeline for task orders 3 and 4. The Band 14 spectrum on which AT&T is building the network is a key component that differentiates it from other commercial networks, as the network’s full capabilities and functionality are only available via Band 14. For example, certain high-power user equipment can transmit at stronger signals; this signal increase can only be done using the Band 14 spectrum. However, at its expected final operating capability, the network using Band 14 spectrum will not cover the entire country. Public-safety network users will also have access to the non-Band 14 LTE spectrum that AT&T uses for its existing, commercial network (with priority and preemption), though this spectrum does not have all the full capabilities of Band 14, as in the high-power user equipment example above. According to AT&T, when including this non-Band 14 spectrum, the network will cover 76.2 percent of the U.S. geographically and around 99 percent of the population. Network users are to also have access, by request, to deployable assets that can provide temporary coverage when needed, such as in remote and wilderness areas that will not have permanent coverage. AT&T has met, and exceeded, the first required nationwide network- coverage milestone. According to FirstNet documentation, AT&T is required to meet certain coverage milestones in both non-rural and rural areas and by the end of March 2019, AT&T had met the requirement to provide at least 20 percent of the total expected Band 14 coverage in both non-rural and rural areas. The Band 14 coverage milestones that AT&T is contractually required to meet to receive payment increase each year through March 2023, when AT&T is to have completed 100 percent of the total expected Band 14 coverage. For example, by March 2021, the coverage milestones are 80 percent of the total expected Band 14 coverage in both non-rural and rural areas and by March 2022, 95 percent. Per the terms of the contract, prior to meeting the first milestone, AT&T provided initial coverage via its existing, commercial wireless network and made 72 deployables (such as mobile cell sites on trucks) available for network users. AT&T fulfilled the deployables requirement through a combination of deployables built specifically for network users and others allocated from AT&T’s existing fleet of deployables used for disaster relief. Specifically, to complete the first coverage milestone, AT&T delivered Band 14 coverage in about 63 percent of the total square miles required by 2023 in non-rural areas, and about 21 percent of the total square miles required by 2023 in rural areas, according to FirstNet documentation. For meeting this milestone, FirstNet paid AT&T approximately $1.2 of the $6.5 billion. Since completing this milestone, AT&T has continued to expand coverage and, according to FirstNet officials, is also on track to meet the next coverage milestone (due March 2020) early, although FirstNet was in the process of completing final verification and validation activities as of September 2019. AT&T constructed or “delivered” (i.e., these sites are all on-air) thousands of Band 14 cell sites to produce the level of coverage needed to meet the March 2019 milestone. Since then, according to FirstNet documentation, AT&T has continued adding Band 14 sites, delivering—as of July 2019— more than one-third of the total Band 14 cell sites planned for the entire network. AT&T may deliver these cell sites through a combination of constructing new sites, retrofitting existing AT&T sites, or acquiring or contracting with local providers, such as rural telecommunications carriers. Although FirstNet tracks the status of planned cell sites (such as which sites are undergoing environmental policy review or are currently operational, or on-air), cell sites are not an explicit part of the contractual coverage milestones required for AT&T to receive payment. That is, AT&T’s payment is not contingent upon getting a certain number, type, or location of cell sites on-air, but rather the amount of coverage (in square miles) provided on a nationwide level by these sites. While AT&T met the first coverage milestone and has delivered more than a third of the planned cell sites nationwide, AT&T also has state- specific commitments. These commitments or targets, like the delivery of sites, are not explicit contractual payment milestones. AT&T and the states negotiated the commitments during the state opt-in process, and AT&T delineated them in the state plans. For example, among states in our review, AT&T made commitments regarding the number of Band 14 cell sites, including new cell sites, and future coordination with state, local, or tribal authorities to discuss governance or priority coverage areas, among other things. According to our analysis of FirstNet documentation, progress toward meeting state-specific coverage commitments has varied. For example, among our case-study states as of July 2019, AT&T’s progress meeting the total coverage commitment in non-rural areas ranged from approximately 20 percent complete in one state to nearly 100 percent in others. In comparison, AT&T’s coverage progress in rural areas ranged from about 14 percent complete in one state to about 91 percent in another. Likewise, AT&T’s progress meeting state-specific commitments for delivery of Band 14 cell sites has varied across states. For example, in our case-study states, AT&T delivered between 9 and 71 percent of the total committed Band 14 cell sites as of July 2019. According to FirstNet documentation and officials, variances in state progress are allowable, as the contractual payment requirements focus on outcomes related to nationwide milestones. FirstNet documentation specifies that if the nationwide payment milestone was met, regardless of the amount of coverage that was deployed in a specific state, FirstNet deemed AT&T to have fulfilled that phase for all states. Moreover, FirstNet officials explained that multiple factors can contribute to delays or variance in progress across states, including natural and man-made disasters, subcontractor issues that AT&T must work through with local partners, and technical challenges common to cellular networks, such as degraded performance due to mixing of radio-frequency signals. Furthermore, FirstNet officials explained that AT&T has the first 5 years of the contract to meet all commitments made to the states. AT&T is on track to meet the first adoption milestone, which is to have a certain number of devices connected or subscribed onto the network (“device connections”) by the end of March 2020. FirstNet uses device connections as a proxy for adoption and has set or “forecasted” monthly targets that build up to the nationwide connections expected by March 2020. Our analysis of FirstNet documentation indicates that AT&T is making progress in meeting the monthly nationwide targets leading up to March 2020. Specifically, we found that AT&T was at approximately 165 percent of the July 2019 target. See figure 2 for a comparison of actual nationwide device connections versus the forecasted targets by month through July 2019. Furthermore, while AT&T must meet the nationwide device-connection milestone to receive payment for the phase ending March 2020, the targets are to be prorated depending on the month that AT&T meets the corresponding nationwide coverage requirement. Thus, if AT&T meets this requirement early (i.e., before March 2020), then the required adoption milestone is to be reduced accordingly. For example, if AT&T completes the coverage milestone in September 2019, then it would be required to meet a corresponding adoption target for that timeframe. While AT&T is on track to meet the nationwide, forecasted device- connection targets that serve as the payment milestone, our analysis found that there is variation in who is adopting the network. The targets are broken out by device connections associated with “primary” versus “extended-primary” users in different states. FirstNet defines primary users as those in the law-enforcement, fire, and emergency medical- services disciplines, whereas extended primary encompasses a myriad of other types of public-safety entities. For example, according to our analysis of FirstNet documentation, there are extended-primary users from transit agencies; public-utility and tow-truck companies; school districts; a state child-protective-services agency; airports; and television- media news outlets. Nationwide, with regard to primary users, AT&T was at 196 percent of the July 2019 target. For extended-primary users, AT&T was at approximately 106 percent of the nationwide target. These device connections are also distributed amongst the different types of public- safety entities. For example, for primary device connections, AT&T was at more than twice the forecasted nationwide target for law enforcement, as of July 2019. Our analysis also shows that there is wide variance in where adoption is occurring. Specifically, we found that AT&T is exceeding the device connection targets forecasted in certain states but lagging in others. Among our case-study states as of July 2019, for example, device connections for primary users in one state were more than 5 times the target, whereas in another state, AT&T had met only 33 percent of the target by July 2019. Adoption by extended-primary users among our case-study states also varied, with one state at 3 times the target compared to only 7 percent of the target met in another. Many types of devices are connected to the network and users’ experiences with network performance can vary based on the specific device they use. According to FirstNet documentation as of April 2019, 93 device types, 47 of which are Band-14 capable, were vetted and published on the list of devices certified for use on the network maintained by Commerce’s National Institute of Standards and Technology. Our analysis found that a variety of devices and device models are being used on the network, including smartphones, mobile hotspots, trunk modems, laptops, and tablets. As of July 2019, the most prevalent type of device was smartphones. FirstNet has acknowledged that user experiences on the network may vary depending on the type and model of device. Some public-safety officials we interviewed described inferior experiences on certain types or models of devices. In at least one case, AT&T worked with the public-safety entity to address identified device performance issues. Aside from device connections, FirstNet also tracks and has reported— via press releases, board presentations, and its most recent annual report to Congress—on the number of public-safety entities that have started using the network. For example, in April 2019, FirstNet reported to Congress that more than 7,000 public-safety agencies were using the network. This number represents agencies with at least one device connection, which may indicate piloting of the network. For example, one agency we interviewed had only about 2 dozen of its approximately 1,300 total devices on the network. Similarly, officials from multiple other public- safety agencies explained they were in the piloting phase (i.e., testing a small number or types of devices to gauge network performance) and that they were using or would continue to use another carrier for broadband services to ensure effective redundancy and emergency planning. According to FirstNet officials, AT&T provides the count of public-safety agencies at periodic program-review meetings and documents it in a required contract deliverable. We analyzed this deliverable and were able to approximate FirstNet’s reported numbers. FirstNet employs a variety of mechanisms to manage and oversee AT&T’s deployment of the network and monitor contract performance. We found that many of FirstNet’s approaches to managing and overseeing AT&T’s network deployment and contract performance generally align with the key contract-oversight practices identified in federal acquisition regulations and other government, academic, and industry guidance on contract oversight that we reviewed, as shown in table 1. We analyzed the key performance indicators and other documentation related to all 46 quality assurance elements that FirstNet monitors as of April 2019 and found that AT&T’s performance was rated as “excellent” in over half of these elements but “unsatisfactory” in almost a quarter. Regarding the number of unsatisfactory ratings, FirstNet officials stated that these ratings did not raise concerns given where AT&T was in the deployment lifecycle at the time of our review. That is, the rating may measure performance on an item that was not yet contractually due. For example, AT&T cannot achieve an excellent rating for certain elements that relate to coverage deployment until it is closer to the network’s final operating capability, expected in March 2023. Relatedly, according to FirstNet documentation as of April 2019, FirstNet had issued only one corrective action report since awarding the contract. According to FirstNet officials at the time of our review, although FirstNet has rejected or requested corrections to some items submitted by AT&T, no other concerns have risen to this level because they have been successful in resolving issues at lower levels first. FirstNet’s oversight activities leading up to the March 2019 coverage milestone were the first wherein it had to validate AT&T’s delivery of Band 14 coverage. FirstNet’s methodology for doing so included verifying AT&T’s prediction of the signal strength at which the necessary throughput—or, capacity, the amount of data transported successfully in a given time period—would be achieved, and reviewing AT&T’s lab and field tests. FirstNet then engaged in a process to verify the validity of AT&T’s coverage-prediction maps to ensure they were an acceptable representation of coverage in the field. Finally, FirstNet confirmed that the on-air coverage as compared to the expected total coverage at the network’s final operating capability met the contractual requirement. FirstNet’s methodology did not include conducting its own coverage tests in the field. According to FirstNet officials, FirstNet does not perform independent verification of network coverage in the field because FirstNet officials believe the contract provides an appropriate level of detail within the contractual deliverables and supporting information that is used to validate and verify the coverage milestones. While many of FirstNet’s contract-oversight mechanisms generally align with key practices, we found that some have weaknesses that limit their effectiveness. Specifically, FirstNet lacks: (1) a reliable master schedule to review, (2) communication with relevant stakeholders regarding contract oversight, and (3) meaningful information on end-users’ satisfaction to gauge performance quality. Key practices for contract oversight call for tracking the contractor’s performance and progress toward the expected schedule. Furthermore, GAO’s Schedule Assessment Guide identifies 10 best practices associated with effective scheduling, and they are grouped into 4 characteristics of a reliable schedule—comprehensive, well-constructed, credible, and controlled. The contract cites this guide when detailing the schedule’s requirements. As described above, AT&T must provide a current master schedule to FirstNet monthly. However, we found that FirstNet’s use of the schedule AT&T provides is limited because, based on our assessment, it only partially or minimally meets the characteristics of a reliable schedule, as shown in table 2 and described further below. Comprehensive. We found that the schedule did not reflect all of the work to be performed, precluding a comprehensive view of the entire program. For example, although a master schedule should be a comprehensive plan of all government, contractor, and subcontractor work that must be performed to complete the project, the schedule did not capture all government (e.g., FirstNet) activities or cover the entire contract period. Our schedule guide notes that management should be aware of how long government activities take because they often have a clear effect on schedules. An integrated master schedule should reflect all efforts necessary to successfully complete the program. Failing to include all work for all deliverables, regardless of whether they are the government’s responsibility or the contractor’s, can hamper program members’ understanding of the complete plan. Further, our analysis showed that there was a 1:1 detail-to-milestone ratio, meaning there was 1 detail activity for every milestone in the schedule, which is a low level of planning detail. Activities contained in the schedule did not always have manageable or reasonable durations; for example, over 50 percent of remaining activities had durations greater than 2 standard working months, with 25 percent of those having durations greater than 1 year. Our schedule guide notes that, for a schedule to provide a more accurate view of progress, longer activities should be broken down into smaller efforts where possible. While some of these activities had long durations because FirstNet expects AT&T to plan them in the future, some were not designated as such and had no other noted justification. Moreover, the schedule did not show any resources (i.e., labor, materials, travel, facilities, equipment, etc.). Our schedule guide also notes that resources must be considered in the creation of a schedule because their availability directly affects an activity’s duration, and a schedule without resources implies their unlimited supply and availability. Well-constructed. We found that the schedule had a high number of date constraints and an unreasonable amount of total float (or slack). For example, 60 percent of remaining activities and milestones in the schedule had “start-no-earlier-than” constraints. These date constraints confine the schedule by preventing tasks from starting earlier even if predecessor activities are completed ahead of schedule, which prevent the constrained activities from taking advantage of possible savings being introduced by predecessor activities. Our schedule guide recommends minimizing and justifying (in documentation) date constraints because they override the schedule’s logic and restrict how planned dates respond to accomplished effort. Schedules with constrained dates can portray an artificial view of the program and begin to look more like calendars than schedules. Moreover, over 50 percent of remaining activities had total float greater than 2 standard working months, with the average being over 200 days. In other words, activities in the schedule can slip an average of 200 working days before delaying the project’s finish date. Our schedule guide notes that without accurate values of total float, the schedule cannot be used to identify activities that could be permitted to slip and thus release and reallocate resources to activities that require more resources to be completed on time. Finally, while we found that the schedule had continuous critical paths, there was not enough detail activities to track the work necessary to achieve project milestones. Credible. We found that there was no risk analysis performed for the schedule. Our schedule guide notes that data about program risks should be incorporated into a statistical simulation to predict the level of confidence in meeting a program’s completion date; to determine the contingency, or reserve of time, needed for a level of confidence; and to identify high-priority risks. Additionally, our schedule guide notes that a schedule should be (1) “horizontally traceable,” meaning that it should link products and outcomes associated with other sequenced activities; such links are commonly referred to as “hand- offs” and serve to depict the relationships between different program elements and verify that activities are arranged in the right order, and (2) “vertically traceable,” meaning data are consistent between different levels of the schedule. Our analysis found that the schedule responded when significant delays were introduced into the planned activities; that is, when we tested the robustness of the schedule by extending activities’ durations, forecasted dates recalculated appropriately. However, as described above, we found that the schedule did not capture all activities or provide sufficient detail, meaning it cannot be fully traceable horizontally. We also found that, in general, the schedule provided good vertical traceability—that is, dates were traceable between status reports and the schedule. However, when we compared other reported information to the schedule, there were instances where this traceability was not the case. For example, one monthly report stated that baseline information was included for all tasks and milestones of a particular task order, but we found that the schedule did not in fact include this information. Vertical traceability provides assurance that the representation of the schedule to different audiences is consistent and accurate. Controlled. We found that the schedule was updated regularly using actual progress and logic by trained AT&T personnel, with supporting documentation and review procedures. We also found that not all activities in the schedule had baseline dates. According to FirstNet officials, portions of the schedule are baselined on a rolling basis once the next requirements traceability matrixes are created. However, some activities with no baseline dates had already begun or been completed. Further, FirstNet officials stated that no “basis document” exists for the baselined schedule. Our schedule guide notes that a corresponding basis document is important because it explains the overall approach to the program, defines custom fields in the schedule file, details assumptions used in developing the schedule, and justifies constraints, lags, long activity durations, and any other unique features of the schedule. Furthermore, while AT&T was submitting schedule variance information, it covered only tasks that had been baselined, when the majority of activities in the schedule were missing baseline dates. Without formally established baseline-schedule start and finish dates to measure performance against, FirstNet is limited in how it can use the schedule to identify or mitigate the effect of unfavorable performance. Overall, FirstNet officials said they are not concerned about the gaps in the AT&T master schedule for a variety of reasons. Namely, officials stated that FirstNet entered into a contract with AT&T that lays out specific milestones that AT&T must meet or it does not receive payment. Accordingly, they said that the summary level of detail is sufficient for FirstNet’s purposes, as AT&T’s program management office determines what activities are appropriate to track to meet those milestones and AT&T maintains its own, more detailed schedule. They further added that given the firm-fixed price nature of the contract, it is not practical or helpful for FirstNet to collect information on the resources for AT&T’s deliverables; if it takes AT&T 50 or 50,000 individuals to complete the requirement that decision is for AT&T to determine. As such, although the contract cites GAO’s schedule guide when detailing the schedule’s requirements, FirstNet excluded requirements related to resources. Similarly, FirstNet excluded requirements related to schedule risk analysis primarily, according to FirstNet officials, because risks to the established schedule milestones were largely considered when evaluating AT&T’s proposal prior to contract award. Finally, FirstNet officials highlighted that the schedule is not the only measure for progress and reporting, noting that it employs many other mechanisms to monitor and oversee AT&T’s progress and performance, and discusses the schedule during program management review and other meetings with AT&T. However, the contract itself states that FirstNet is responsible for ensuring the overall success of the network and that, to do so, its responsibilities after contract award include overseeing the program schedule. Regarding resources in particular, the contract also states that these responsibilities include managing schedule resources. Thus, while it may not be necessary for FirstNet to collect information from AT&T on every resource detail, as FirstNet has stated, it is nevertheless important for FirstNet to gain an understanding of the overall resources needed to complete the work. This understanding could include, for example, evidence that sufficient resources were assigned to activities in the more detailed schedule that AT&T maintains. Our schedule guide notes that resources must be considered in the creation of a schedule—and it is important that FirstNet have sufficient insight into those resources—because their availability directly affects an activity’s duration. Regarding schedule risk analyses, consideration of risks to the milestones prior to contract award may not serve as a substitute for a risk analysis of the current schedule, which would include detail on activities and risks that could not have been known or fully understood prior to the award. Finally, while FirstNet utilizes a variety of other mechanisms to oversee AT&T’s performance, having a more detailed master schedule from AT&T would strengthen FirstNet’s use of the schedule as a management and oversight tool. For example, such a schedule could improve FirstNet’s insight into the activities driving AT&T’s deployment of the network and completion of requirements, how each activity relates to others, and any potential risks. It could also provide FirstNet with additional information that could help it and AT&T manage tradeoffs and make decisions to maximize the program’s success across the entire country. Key practices for contract oversight call for communicating appropriate information to relevant stakeholders and reporting on monitoring results. Additionally, the 2012 Act requires FirstNet to consult—via a designated single point of contact (SPOC) in each state—with regional, state, local, and tribal jurisdictions regarding a host of activities, such as: ongoing compliance review and monitoring of the management and operation of the network; practices, procedures, and standards for the management and operation of the network; terms of service for use of the network; radio-access network build out, placement of cell towers, and coverage areas; and assignment of priority and selection of entities seeking use of the network. Furthermore, the contract requires AT&T to report, by state, on the state- specific commitments made as a result of the state opt-in process. Portions of this report are to be shareable with states, and it is to detail the deadline by which the commitments will be fulfilled, the status of fulfilling them, and include evidence of the state’s satisfaction with progress. Beginning April 2018, AT&T is required to deliver this report semi-annually. Although two such state-specific commitment reports were due as of July 2019, only one has been completed by AT&T and accepted by FirstNet. Additionally, according to FirstNet officials as of October 2019, the report was not shared with the states. Numerous state, local, and tribal stakeholders we interviewed described having had very little contact with FirstNet or being generally dissatisfied with the level or quality of information they had received from FirstNet and AT&T. These officials said that FirstNet had communicated little to no information on AT&T’s progress deploying the network in their area, or if and how FirstNet was monitoring performance. For example, many officials said that they had limited interaction with FirstNet beyond public relations emails or events promoting the network, or noted that their interactions lacked substantive information and details that would be of more value. The SPOCs were particularly dissatisfied with the lack of transparency surrounding the contractual requirements or FirstNet’s oversight of progress to date. Many of these state officials noted that the level of communication and information shared by FirstNet post contract award stood in stark contrast to the level of engagement prior to the state’s opt-in decision. Numerous state, local, and tribal stakeholders we interviewed said that additional information on AT&T’s deployment and FirstNet’s oversight would be helpful or that greater transparency was needed. Officials wanted additional information on, among other things: contract requirements, milestones, and progress; technical details on the network including operational status and location of cell sites; subscribers within the official’s agency or agencies across the state that had adopted the network; and FirstNet’s oversight activities and results, including assurance from FirstNet that network coverage and performance had been verified. Even public-safety officials who were pleased with their experiences on the network to date or their relationship with FirstNet representatives reported that having more information was important. In the absence of this type of information, many public-safety entities we contacted expressed concern that they did not know whether FirstNet was holding AT&T accountable. For example, several officials indicated they did not know whether FirstNet or AT&T was “running the show.” State, local, and tribal stakeholders we interviewed gave a variety of reasons for wanting greater transparency on contractual requirements and oversight. Numerous public-safety officials said that they needed to know this information for tactical response and planning, or state and local contracting purposes. For example, some local public-safety officials described wanting to have basic information on the contract coverage phases in their states so that they could confidently plan out equipment lifecycles. Additionally, many SPOCs said that there was a duty for FirstNet as the contracting agency to oversee that state-specific commitments were met. Many SPOCs also stated that their attempts to obtain more information from FirstNet or AT&T per the agreed-upon commitments had been delayed. At times, when they reached out to FirstNet, they were directed back to AT&T, or vice versa. Numerous stakeholders agreed that given the nature of the network as a public resource—involving public investment and funds, with the expressed purpose of serving public safety—they expected greater transparency from both FirstNet and AT&T. FirstNet officials provided several reasons for not communicating the additional information cited by the stakeholders we spoke to and for not reporting on monitoring results. In particular, FirstNet officials told us there is no contractual requirement to communicate or share information collected, including any performance information or monitoring results, with any stakeholders or network users. However, its Public Safety Advocacy team serves as the primary interface to the public-safety community and conducts considerable outreach to stakeholders, as described above. Regarding the SPOCs, the officials further said that they believe the 2012 Act’s consultation requirement applied only to the initial planning stages (namely, the development of the request for proposal prior to contract award). As such, they do not believe they are legally obligated to continue to communicate specifically as identified in the 2012 Act. Additionally, FirstNet has stated that much of the information AT&T provides is proprietary and, therefore, cannot be disclosed to stakeholders. Finally, regarding the state-commitments report, FirstNet officials have said that FirstNet shares subsets of this information with states that request it during consultative interactions with FirstNet and in coordination with AT&T, but does not routinely share the full report to protect confidential commercial or trade-secret information. While the 2012 Act does require consultation to occur “in developing requests for proposals,” it also states “and otherwise carrying out its responsibilities,” suggesting a broader application than just the initial planning stages, which is FirstNet’s interpretation. Moreover, while there are valid concerns about disclosing proprietary information and statutory prohibitions on doing so, there are opportunities for FirstNet to communicate additional information in ways it deems appropriate. For example, communicating how it oversees AT&T, the mechanisms it employs, and the performance areas it monitors could be done in a manner that does not disclose proprietary AT&T information, as these are government activities. Additionally, a state official and some local government officials we spoke to said that certain AT&T commercial information (e.g., the location of cell towers) could already be publicly available through local permitting offices. Further, federal internal-control standards note that management may select appropriate methods for external reporting, meaning management can consider what methods are appropriate for different audiences when communicating and reporting information. Finally, the contract states that except as specifically indicated or with explicit written permission from FirstNet, AT&T’s deliverables documentation shall not contain proprietary information or have any restriction on reproduction and/or distribution, suggesting that upon awarding the contract, FirstNet recognized the value of limiting these instances. Industry guidance on project management that we reviewed—and which is cited in the contract—notes that analyses of high-profile project failures highlight the importance of stakeholder engagement. It also notes that communicating with stakeholders in an appropriate way can mean the difference between a project’s success and failure. Stakeholders’ lack of information on the program and FirstNet’s oversight of AT&T can make it difficult for stakeholders to assess what benefits have, or have not, been realized, which may affect their enthusiasm and continued support of the program. This scarcity of information has also left them speculating about other matters such as what, if any, oversight FirstNet conducts of AT&T. By not communicating additional information and reporting on monitoring results, FirstNet could be unknowingly reinforcing nascent skepticism of the program overall and of itself as the entity charged with holding AT&T accountable. Key practices for contract oversight call for obtaining information on end- users’ satisfaction that can be used as a metric to gauge performance quality. For example, industry guidance on program management emphasizes that end-users’ satisfaction is a powerful metric that should be obtained to gauge program quality, noting that the benefits, product, or service delivered is best evaluated by those who receive it. While FirstNet collects some information—via its QASP monitoring, as described above—that could relate to end-users’ satisfaction, these metrics provide limited insight into users’ experiences. For example, although AT&T surveys some customers to ask them whether they would recommend FirstNet services to a colleague to satisfy a QASP requirement, a user could recommend the service not because they are satisfied but because they have limited alternatives. Indeed, while many state and local public-safety officials we spoke to were pleased with their experience migrating to or piloting the network, numerous officials told us about experiences that fell short of their expectations for a public-safety broadband network backed by the government. Numerous officials told us that they had concerns about misleading or disorganized sales tactics from AT&T representatives. For example, while some officials said that their AT&T representative had been candid in explaining the limited available coverage in their area, many officials told us about instances when AT&T representatives had shown them maps depicting more coverage than actually existed or that were insufficiently granular for their mission work. Similarly, while many officials recounted positive experiences with network coverage or performance or AT&T representatives, many also described instances when equipment failed to work or perform as expected during piloting phases or exercises. In some instances, these officials stated that FirstNet or AT&T representatives explained, after the fact, that differences in user experience were to be expected depending on the device model or subscriber identity module (SIM) card being employed. Specifically, FirstNet or AT&T officials explained that the optimal performance could only be achieved when Band 14 devices connected to a Band 14 cell site. According to FirstNet officials, the best experience will be when subscribers use a Band 14-capable FirstNet-ready device with a FirstNet SIM card while in a Band 14 coverage area. The officials said any other combination could result in slightly degraded performance or features being unavailable. This is notable given that Band 14 coverage is still limited and generally state and local public-safety officials do not have insight as to where these sites were located or when, if ever, coverage will be expanding, as previously discussed. As stated above, at its final operating capability, the network utilizing Band 14 spectrum will not cover the entire country. Many officials also expressed concerns about the network’s quality of service, priority, and preemption capabilities over the long run or during a catastrophic event. They speculated about the type or expanding number of subscribers allowed on the network or whether at some point in the future, the network would become saturated because non-public safety organizations or individuals (either extended-primary users or non-verified public-safety subscribers) were being granted priority and preemption capabilities. Exacerbating these concerns, many officials noted that they did not have insight into who had subscribed even within their own agency or state, or lacked confidence in how FirstNet or AT&T verifies individuals’ public-safety status, based on anecdotal experiences. Further, some officials also raised concerns about their inability to test the network during congested periods or simulate catastrophic power failures and lack of insight into if or how AT&T had hardened the network. Many officials discussed or shared after-action reports or their testing results with us, and several communicated that they had shared or would be willing to share such information with FirstNet as well to support validation of the network’s actual performance. According to FirstNet officials, the key performance indicators identified via the QASP are the performance quality measures, not end-users’ satisfaction. They also stated that “disincentive” payments embedded in the contract serve as an incentive for AT&T to ensure end-users’ satisfaction. Specifically, if AT&T does not meet user adoption (i.e., device connection) goals specified in the contract, it has to make payments to FirstNet on a timetable identified in the contract. Additionally, according to FirstNet officials, they informally hear information on end- users’ satisfaction and the network’s performance through many of the engagements its Public Safety Advocacy team conducts, which they can informally share with AT&T. However, disincentive payments (and the user-adoption goals tied to them) may be a limited reflection of end-users’ satisfaction for various reasons. For example, users may continue to subscribe to the service not because they are satisfied with it but because agency procurement lifecycles and budgets prevent them from changing providers, or because they find it difficult to break a sales contract, have already sunk costs into the transition, or lack alternatives in the market. Additionally, if AT&T perceives that the value derived from its commercial customers’ use of the excess Band 14 spectrum capacity is greater than the disincentive payment it must make to FirstNet, it may view making the payment as an acceptable tradeoff. Alternatively, aggressively pursuing sales contracts with potential public-safety users to avoid the payments may not be welcomed by the public-safety community, which could result in negatively, not positively, affecting end-users’ satisfaction, as some public-safety network users we spoke to said it had. Finally, while the informal collection and sharing of information on satisfaction can be valuable, it does not serve as a formal performance-quality measure, which could provide FirstNet with additional recourse should issues arise. End-user adoption is both a goal of the program and how AT&T plans to fund the $40 billion of investment in the network. Adoption may be driven by satisfaction in addition to need. Ultimately, end-users’ dissatisfaction could affect the success of the program. Thus, FirstNet’s lack of formal insight into end-users’ satisfaction hampers its ability to take actions that could increase the program’s chance of succeeding. By not obtaining and using this information to inform its oversight or related activities, FirstNet could be missing an opportunity to increase assurance of the program’s long-term success. The FirstNet public-safety broadband network has the potential to save lives every day. Since beginning their 25-year partnership, AT&T has made progress deploying the network and meeting contractual milestones and goals, and FirstNet has employed a variety of mechanisms—many of which align with key practices—to oversee AT&T’s performance. However, the success of the network depends not only on AT&T’s contract execution and FirstNet’s oversight but also on the confidence of the end users, the nation’s first responders. As FirstNet enters the next phases of its partnership with AT&T, it could reduce the risks to the network’s long-term success by strengthening its schedule oversight; increasing transparency, communication, and reporting of additional information to states and other public-safety stakeholders; and obtaining and using meaningful information on the satisfaction of the first responders for whom the network is intended. We are making the following four recommendations to FirstNet: FirstNet’s Chief Executive Officer should take steps to ensure that the integrated master schedule for the program is developed and maintained in accordance with the best practices provided in GAO’s Schedule Assessment Guide. (Recommendation 1) FirstNet’s Chief Executive Officer should identify additional information about the program, including FirstNet’s oversight and monitoring activities, that can be shared with public-safety stakeholders and periodically communicate and report this information to them. (Recommendation 2) FirstNet’s Chief Executive Officer should share relevant portions of the accepted state-specific commitment reports with the states, as specified in the contract. (Recommendation 3) FirstNet’s Chief Executive Officer should, in consultation with public- safety stakeholders and its contractor, as appropriate, identify and obtain periodic information or meaningful indicators on end-users’ satisfaction that would serve as a metric to gauge performance quality, including the effect of the FirstNet network and products on public-safety operations. (Recommendation 4) We provided a draft of the sensitive report to FirstNet for review and comment. FirstNet’s comments on the sensitive report are reprinted in appendix II. In these comments, FirstNet stated that it agreed with all of our recommendations; will take appropriate additional steps to apply lessons learned and address our concerns; and will continue to find ways to improve transparency with and feedback from its stakeholders, in addition to refining the integrated master schedule. Separately, FirstNet also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Chief Executive Officer of FirstNet, the Secretary of Commerce, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines the extent to which (1) AT&T is meeting the established milestones for deploying the nationwide public-safety broadband network, including coverage and adoption goals, via its contract with the First Responder Network Authority (FirstNet), and (2) FirstNet is overseeing AT&T’s deployment of the network in accordance with key practices. To assess progress toward the coverage and adoption milestones, we reviewed the FirstNet-AT&T network contract, corresponding task orders, and relevant documentation contained in FirstNet’s contract files, including information or “deliverables” submitted by AT&T that had been reviewed by FirstNet for contract compliance. We also reviewed additional FirstNet documentation, such as board-meeting materials, annual reports to Congress, press releases, fact sheets, and official blog postings. We reviewed the Middle Class Tax Relief and Job Creation Act of 2012 (the 2012 Act), which created FirstNet as an independent authority charged with establishing a nationwide public-safety broadband network that would, among other things, be deployed in phases that included substantial coverage milestones in rural areas. Within the contract, we identified the various coverage and adoption milestones and focused our analysis primarily on task order 3, phase 3 (which spanned March 31, 2018, to March 30, 2019) and task order 4, phase 2 (which spanned October 1, 2018, to March 30, 2019) milestones. We focused on these task orders because they are most relevant to the network’s coverage deployment and adoption, and on these phases because they were the phases under way at the time we began our review. We did not review activities or progress as described in AT&T deliverables dated beyond September 2019 given the timing of our review. We also did not make any conclusions about progress toward the final phases of these task orders. However, we did assess the master schedule to determine its reliability and validity for planning and tracking progress toward the final phases as described further below and in our report. The contractual deliverables that we reviewed in some cases included detailed data broken out by state and public-safety discipline. In particular, we analyzed data that indicated progress toward nationwide and state Band 14 network coverage (in square miles); cell site delivery; monthly adoption targets (i.e., device connections) by discipline; and types of devices connected. When analyzing these data, in all cases, we used the most currently available data at the time of our request for the information, and we report data as of September 2019. Although all data were the most currently available as of September 2019, because the deliverables have varying cycles for when AT&T is contractually required to report the information, we specify throughout the report the “as of” period these data represent. We assessed the reliability of these data by asking FirstNet officials questions about how they review the deliverables and about data sources, quality, and timeliness, as well as by electronically testing the dataset for missing or invalid entries. We removed a small number of missing or invalid entries from our analysis of device types and models and count of public-safety agencies. We did not assess AT&T’s underlying systems or databases, nor did we interview AT&T officials about their protocols for producing this data. We found these data reliable for the purpose of describing FirstNet’s current and projected progress toward coverage and adoption milestones for the related task orders and phases. To further assess deployment progress, we conducted case studies of seven states to illustrate and obtain greater context on variations in state- level coverage and adoption. We selected our case-study sample to include states that had very high-density counties; relatively large numbers of low-population density counties; high poverty rates (due to budgetary challenges public-safety entities may face); varying levels of progress in cell site delivery as of January 2019 (the most currently available data at the time of our selection); and geographic diversity and tribal lands. In total, the selected states represent almost a third of the contract dollars allocated for network coverage deployment. Our case- study analyses included reviewing and comparing the deployment plans and commitment letters for these seven states (detailing the agreed-upon, state-specific commitments AT&T made to these states) against the deliverables describing the progress AT&T made on some of these commitments, as of July 2019. It also included interviewing state, local, and tribal officials and first responders from these states, as described further below. The case studies and stakeholders’ views illustrate experiences with FirstNet’s deployment of the network across a wide cross section of geographies and network users to date but are not generalizable to those of all FirstNet stakeholders or the network as a whole. We also interviewed FirstNet officials to obtain their perspectives on AT&T’s progress and factors that may explain the variance across states. To examine FirstNet’s oversight efforts, we reviewed the FirstNet-AT&T network contract and documentation contained in FirstNet’s contract files, as well as additional FirstNet documentation. In addition to the material described above, this documentation included, for example, the Quality Assurance Surveillance Plan, requirements traceability matrixes, verification reports, memos, Contract Administration Plan, FirstNet Acquisition Manual, guidance documents on contract management and procedures, and FirstNet officials’ written responses to questions we posed. For the same reasons described above, we focused primarily on material related to task order 3, phase 3 and task order 4, phase 2. We interviewed FirstNet officials to obtain greater context on FirstNet’s oversight mechanisms and their use, and to observe FirstNet’s verification activities and the platform it uses to manage its contract files. Further, we reviewed key acquisition and contract-oversight practices established in the Federal Acquisition Regulation and the Commerce Acquisition Regulation, as well as the Commerce Acquisition Manual and other academic and industry guidance. We also reviewed the 2012 Act and federal standards for internal control. We selected those practices that were most appropriate given FirstNet’s contract approach (i.e., Indefinite-Delivery/Indefinite-Quantity, Firm-Fixed-Price contract vehicle) and the stage of the acquisition process FirstNet was in during the course of our review. We assessed FirstNet’s oversight efforts against these practices. We also compared the network’s integrated master schedule, which AT&T provides to FirstNet, to scheduling best practices in GAO’s schedule guide. Collectively, these best practices are organized into four characteristics of a reliable schedule. A schedule is considered reliable if each of the four characteristics is substantially or fully met; if any of the characteristics are not met, or minimally or partially met, the schedule cannot be considered reliable. We reviewed the schedule as of its status date January 31, 2019, which represented the latest status update to the schedule at the time we began our schedule analysis. In reviewing the schedule, we also reviewed the schedule dictionary, work breakdown structure, and program management review or monthly progress reports dated October 2018 to January 2019, among other documents. We provided our criteria and draft schedule analyses to FirstNet for review. To inform both of our objectives, we conducted about 40 interviews with state, local, and tribal officials and first responders. These interviews represented almost 30 different states’ single point of contact (SPOC) to FirstNet or their designees, and over 30 different state, local, or tribal public-safety entities. The public-safety entities we interviewed included police and fire departments, sheriffs’ offices, emergency medical-services providers, and emergency-management agencies, among others. We interviewed the SPOC from each of our case-study states and received information from other SPOCs (or a designee) via a multi-state focus-group discussion and written responses to the semi-structured discussion questions and prompts we posed. A GAO moderator led the discussion to establish ground rules and keep participants focused on the specified issues within the discussion time frame. We selected state, local, and tribal public-safety entities within our case-study states to interview. To select the state and local public-safety entities to interview, we reviewed the AT&T subscription management report provided to FirstNet as of February 2019 (the most current available at the time of our selection) and asked the SPOCs for recommendations within their state. Generally, we selected among the largest subscribers (meaning, the most number of devices on the network) in each of the primary public-safety disciplines (law enforcement, fire, emergency-medical services) in each state, and selected others to ensure representation among urban, suburban, and rural areas. To select the tribal entities to interview we asked the National Tribal Emergency Management Council for a recommendation in each state. Not all public-safety entities accepted our interview requests. Among our case-study states, we conducted a site visit in one state region. We selected this region for our visit because of the concentration of subscribers within reasonable geographic proximity to each other. For additional context, during this visit we also met with the FirstNet Public Safety Advisors that serve the state and attended a FirstNet presentation and town hall meeting hosted by the local chapter of the Association of Public Safety Communications Officials. Because stakeholders varied in their expertise with various topics, not every stakeholder provided an opinion on every topic. Throughout this report we refer to “some” stakeholders if officials from 3–5 entities, “several” if 6–9, “many” if 10–19, and “numerous” if 20 or more expressed the view. Finally, for additional perspective we also interviewed the National Public Safety Telecommunications Council because of its role as a federation of organizations whose mission is to improve public-safety communications and interoperability. As noted above, stakeholders’ views are not generalizable to those of all FirstNet stakeholders. In addition to the contact named above, Sally Moino (Assistant Director); Nalylee Padilla (Analyst in Charge); David Aja; Melissa Bodeau; Andrew Burton; Mark Goldstein; Yvette Gutierrez; David Hooper; Jason Lee; Andrew Stavisky; Hai Tran; William Woods; and Friendly Vang-Johnson made key contributions to this report.", "summary": "Public-safety officials such as police officers and firefighters rely on communications systems to do their jobs. The Department of Commerce's FirstNet must establish a nationwide public-safety broadband network for use by these officials. In March 2017, FirstNet awarded a 25-year, multibillion-dollar contract to AT&T to deploy, operate, and maintain the network. AT&T must meet milestones specified in the contract, such as for providing network coverage and for the network's adoption. FirstNet's oversight of AT&T's progress and performance is critical given the contract's scope and duration. GAO was asked to review FirstNet's progress and oversight. GAO examined the extent to which (1) AT&T is meeting milestones for the network's coverage and adoption and (2) FirstNet is overseeing AT&T in accordance with key practices. GAO analyzed FirstNet and AT&T documentation; assessed FirstNet's oversight efforts against key contract-oversight practices identified in federal regulations and other government, academic, and industry guidance; and assessed the program's master schedule against GAO best practices. GAO interviewed FirstNet officials, and selected state, local, and tribal officials and first responders representing a variety of viewpoints. Although not generalizable, they provided useful perspectives. AT&T is meeting—or on track to meet—all nationwide, contractual network coverage and usage (adoption) milestones for the First Responder Network Authority (FirstNet) public-safety broadband network. AT&T has met the first nationwide coverage milestone (20 percent of the final expected coverage by March 2019), but coverage varies across states. Similarly, AT&T is on track to meet the first nationwide adoption milestone (which is to have a certain number of devices connected to the network by March 2020). AT&T has exceeded adoption targets in most states but lags in others. According to FirstNet officials, variances by state are allowable, as the key milestones are nationwide. FirstNet uses various mechanisms to oversee AT&T; many of which align with key contract-oversight practices. For example, FirstNet uses a quality assurance surveillance plan to evaluate AT&T's performance. However, GAO found that FirstNet lacked (1) a reliable master schedule to review, (2) communication with relevant stakeholders regarding contract oversight, and (3) meaningful information on end-users' satisfaction to gauge performance quality. Schedule. AT&T is required to provide a current master schedule to FirstNet monthly, but the schedule only partially or minimally meets the characteristics of a reliable schedule per GAO best practices. For example, the schedule only partially captures all activities or the duration or sequence of activities. Key practices call for tracking a contractor's progress toward the expected schedule. Having a more detailed schedule to review could improve FirstNet's insight into AT&T's deployment and strengthen FirstNet's use of the schedule as a management tool. Stakeholder communication. Numerous public-safety officials GAO interviewed were dissatisfied with the level or quality of information received from FirstNet, noting that FirstNet had communicated little to no information on AT&T's progress or FirstNet's oversight. FirstNet officials said there is no contractual requirement to share such information, but key practices call for communicating appropriate information to relevant stakeholders and reporting on monitoring results. The lack of information has left stakeholders speculating about what, if any, oversight FirstNet conducts; sharing more information about the oversight FirstNet conducts could improve public-safety sentiment for and support of the program. End-users' satisfaction. FirstNet collects some information that could relate to end-users' satisfaction, but this information provides limited insight into users' experiences. For example, AT&T surveys some users to ask whether they would recommend FirstNet services, but a user might do so due to limited alternatives, not satisfaction. Although end-users' satisfaction is not a performance quality measure in the contract, key practices call for using end-user satisfaction information as a metric to gauge performance quality. By not using this information to inform FirstNet's oversight or related activities, FirstNet could be missing an opportunity to increase assurance of the program's long-term success. This is a public version of a sensitive report that GAO issued in December 2019. Information that FirstNet deemed proprietary has been omitted. GAO is making four recommendations, including that FirstNet ensure the schedule aligns with GAO best practices, share additional oversight and other information with appropriate stakeholders, and utilize end-user satisfaction information to gauge performance. FirstNet agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The Rogue River-Siskiyou National Forest, located mainly in southwestern Oregon and extending into northern California, encompasses nearly 1.8 million acres. The west side of the forest lies within the Klamath-Siskiyou ecoregion, which is known for its ecological diversity, with 28 coniferous tree species and numerous rare and endemic plants. The forest also contains diverse topography, with steep terrain and rugged geological features across several mountain ranges, including the Klamath Mountains, Siskiyou Mountains, Cascade Range, and Coast Range. Access to the forest is limited, due to many roadless areas and over 340,000 acres of wilderness, including the 180,000-acre Kalmiopsis Wilderness, where the Chetco Bar Fire began. Cities and communities in Oregon near the fire include Brookings and Gold Beach—along the coast of the Pacific Ocean—as well as Agness, Cave Junction, and Selma in Curry and Josephine counties. Figure 1 shows the final perimeter of the fire in southwest Oregon. The part of southwestern Oregon where the Rogue River-Siskiyou National Forest is located is a fire-adapted ecosystem, meaning that most native species and plant communities have evolved with fire, and many are adapted to or dependent on periodic wildfires. The historic fire interval in the area where the Chetco Bar Fire occurred varied, as did the historic severity of fires, according to a Forest Service ecologist. The forest experienced a number of fires over the 30 years before the Chetco Bar Fire occurred. In 1987, the Silver Fire burned nearly 100,000 acres. Fifteen years later, in 2002, the Biscuit Fire burned nearly 500,000 acres, including areas previously burned by the Silver Fire. The Chetco Bar Fire started in the areas burned by both the Silver and Biscuit Fires. In 2018, the year after the Chetco Bar Fire, the forest experienced another large fire, the Klondike Fire, which burned about 175,000 acres, abutting the burn scar of the Chetco Bar Fire in some places. The occurrence of large fires in the western United States has been increasing, while, at the same time, fire seasons have been increasing in length, according to recent assessments. Some of these assessments have found that these increases are due in part to climate change, which has contributed to increasing temperatures and droughts in the West, as well as a later onset of fire-season-ending rains. We have previously found that the cost of disasters, including wildfires, is projected to increase as extreme weather events such as droughts become more frequent and intense due to climate change. Moreover, land use practices have increased the risk that severe and intense wildfires will affect people and communities. As we have previously described, land use practices over the past century have reduced forest and rangeland ecosystems’ resilience to fire. In particular, fire suppression—with 95 percent or more of fires suppressed for nearly a century—and timber harvesting and reforestation have contributed to abnormally dense accumulations of vegetation, and these accumulations can fuel uncharacteristically large or severe fires. In some parts of southwestern Oregon, significant vegetation has built up, according to Forest Service and other documents. As a result, southwestern Oregon, as well as other parts of the country, is under high to very high risk from fire, according to a risk assessment and Forest Service presentation. At the same time, development in and around wildland areas continues to increase, placing more people, businesses, and infrastructure at risk of being affected by fires. Because a single firefighting entity may not be able to handle all wildfires in its jurisdiction, agencies in the United States use an interagency incident management system that depends on the close cooperation and coordination of federal, state, tribal, and local fire protection agencies. The Forest Service is the predominant federal firefighting agency in terms of funding. Other federal firefighting agencies include the Bureau of Indian Affairs, BLM, Fish and Wildlife Service, and National Park Service. Federal and nonfederal firefighting entities generally share their firefighting personnel, equipment, and supplies and work together to fight fires, regardless of who has jurisdiction over the burning lands. Agreements between cooperating entities govern these firefighting efforts and contain general provisions for sharing firefighting assets and costs. On a large wildfire, firefighting efforts generally fall into two phases—initial attack and extended attack. The initial attack phase consists of the efforts to control a fire during the first “operational period” after the fire is reported, generally 24 hours. While the majority of fires on Forest Service land are controlled and suppressed during initial attack, some fires require further firefighting efforts. Such additional efforts are referred to as extended attack. The Forest Service and its interagency cooperators use an incident management system designed to provide appropriate leadership of firefighting efforts. There are five types of incidents, ranging in complexity from type 5 (least complex) to type 1 (most complex). The fire’s complexity determines the type of incident commander and management team assigned. For example, for a type-5 incident, the incident commander may be a local employee qualified to direct initial attack efforts on a small fire with two to six local firefighters. In contrast, for a type-1 incident, the incident commander is one member of a highly qualified incident management team, often with more than 500 firefighters and other personnel. There are sixteen interagency type-1 incident management teams that operate nationwide and are typically deployed to fires for 14-day assignments. In addition, the Forest Service has four type-1 incident management teams under its National Incident Management Organization (NIMO). The Forest Service calls these “short” teams; each team has seven full-time members, but they can add additional members as needed. NIMO teams generally handle complex fires, including long-duration fires, so as not to tie up critical firefighting personnel over a long time. A single incident management team, under the direction of the agency administrator (the line officer, such as the forest supervisor or district ranger, responsible for management of the incident), is typically in charge of a fire, but the incident management system may be expanded into a unified command structure when multiple jurisdictions are involved. This structure brings together incident commanders from the relevant jurisdictions to facilitate a coordinated and integrated interagency response. In such cases, members of the unified command work together to develop a common set of incident objectives and strategies, maximize the use of firefighting assets, and enhance the individual jurisdictions’ efficiency. Once assigned to a fire, an incident management team works with local line officers and fire management staff to determine the strategy and tactics to use in managing the fire. The strategy is the overall plan designed to control the fire; for example, to protect structures and contain the fire within a certain geographic area. Tactics are actions taken to accomplish the objectives set out in the strategy. For example, the fire may be attacked directly, with firefighters working at the fire’s edge to extinguish it. If direct attack is not possible, practical, or safe—because the fire is burning too intensely or on very steep slopes, for example— firefighters may choose to attack it indirectly. In such cases, firefighters typically select an area away from the fire and construct a “fireline,” where vegetation is cleared in an effort to stop the fire’s spread at that point or slow it sufficiently to allow firefighters to attack directly. Firefighters often incorporate geographic features such as roads, rocky areas, ridgelines, and rivers into firelines to increase their effectiveness. In some cases firefighters conduct burnout operations, in which they intentionally set fire to fuels between a fireline and the main fire perimeter to slow or contain a rapidly spreading fire by depriving it of fuel. In carrying out strategies and tactics, firefighters use a variety of firefighting assets, both on the ground and in the air. Ground-based assets include firefighting crews, wildland fire engines, and machinery such as bulldozers, which firefighters use to help construct firelines. When providing personnel to fight fires, the Forest Service and other federal agencies generally rely on a “militia” strategy whereby personnel within each agency are trained to serve in firefighting roles when needed, in addition to performing their day-to-day work responsibilities. Air-based assets include helicopters and fixed-wing air tankers. Helicopters generally drop water directly on a fire, whereas air tankers generally drop fire retardant ahead of the fire, often near a fireline that has been constructed, to slow a fire’s spread. Air tankers range in size from small single-engine air tankers, which are maneuverable but carry only small amounts of retardant, to large aircraft such as converted DC-10s or Boeing 747s—referred to as “very large air tankers”—which can carry substantial amounts of retardant but whose use can be limited in mountainous terrain because of their size. The level of risk that decision makers and firefighters are willing to accept in any given situation depends on the experience and training of those involved. Overall, agency firefighting doctrine emphasizes safety above all other concerns; Forest Service policy, for example, states, “In conducting wildland fire suppression, responsible officials shall give first priority to the safety of firefighters, other personnel, and the public.” Firefighters and other personnel who respond to wildland fire incidents are required to complete training to help them identify risks as well as develop appropriate strategies and tactics to respond to different situations. The Chetco Bar Fire grew slowly in the summer of 2017 before undergoing a period of rapid growth driven by strong, hot winds. In response, the Forest Service and other agencies undertook various firefighting strategies and tactics over different phases of the fire, described below. Figure 2 provides a timeline of the fire’s key events. In the initial phase (July 12-13, 2017), the Chetco Bar fire was relatively small and inaccessible. When the fire was first detected on July 12, it was estimated to be between one quarter and one half acre in size, burning in remote, steep terrain in the Kalmiopsis Wilderness in the Rogue River- Siskiyou National Forest. The fire’s initial location was several miles from the closest road access point. No properties or other “values at risk” (such as structures, other property, and natural and cultural resources that could be damaged by a wildfire) were in the immediate vicinity of the fire, according to Forest Service documents and officials. The Forest Service was notified of the Chetco Bar Fire at 2:43 p.m. on July 12 and, at 4:14 p.m., four Forest Service firefighters rappelled from a helicopter to assess the fire. The rappellers landed on a ridge above the fire to create a helispot (a temporary helicopter landing area) so that additional firefighters and equipment could more easily be brought to the fire. The rappellers requested and received permission from the district ranger for chainsaw use in the Kalmiopsis Wilderness to prepare the helispot, and they worked on cutting trees and clearing brush until late that evening, according to Forest Service documents and national forest officials. The rappellers estimated that the helispot was 60 percent cleared by the end of the first day, according to national forest officials. While the rappellers were working, the Forest Service helicopter returned to its base near Grants Pass, Oregon, to attach a bucket to drop water onto the fire. In the meantime, two helicopters from the Oregon Department of Forestry headed to the fire. The three helicopters dropped about 17,000 gallons of water the first day, according to Forest Service documents. Forest Service officials said these water drops were intended to slow the spread of the fire while the rappellers worked to clear the helispot. Anticipating that the helispot would be completed shortly, the Forest Service ordered two 20-person crews to assist in firefighting efforts the next day. As the rappellers set up camp for the night, incident command radioed them to say that the fire appeared to be holding at about three quarters of an acre. The next morning, July 13, the Forest Service brought in four additional rappellers to continue working on the helispot throughout the morning and into the afternoon (see fig. 3). One of the rappellers walked the perimeter of the fire and determined that the fire had grown to about 10 acres overnight. While the rappellers were working, two helicopters dropped about 18,000 gallons of water that day and a single engine air tanker dropped 1,200 gallons, according to a Forest Service document. The crew bosses for the two crews that had been ordered the previous day flew over the fire early afternoon of July 13, according to Forest Service documents. They estimated the fire had grown to about 15 acres and observed a number of spot fires (smaller fires separate from the main fire) caused by burning material rolling down the hill. They expressed safety concerns about bringing crews into that area and also determined the helispot needed more work before a helicopter could land safely. Since the crews would need to be shuttled in by helicopter, the crew bosses decided not to bring in the requested crews, according to officials. Later that day, the incident commander requested a helicopter to remove the eight rappellers from the fire because of safety concerns and a low probability of success at containing the fire, according to the incident commander and Forest Service documents. The rappellers said that it was taking much longer to complete the helispot than initially anticipated and they did not have a good safety zone or escape route. They also noted that there was unburned vegetation on the slope between the fire and the helispot they were constructing—a dangerous situation if the fire started to spread quickly. The rappellers were removed by 5:00 p.m., at which time the helicopters also stopped dropping water. Figure 4 shows the ignition point of the Chetco Bar Fire and the fire’s growth as of July 13, 2017. In the second phase of the fire, Rogue River-Siskiyou National Forest officials assigned a type-3 incident management team to manage the response to the Chetco Bar Fire, following the unsuccessful initial attack. Forest Service documents indicated that fire behavior was moderate over the next several weeks, averaging around 150 acres of growth per day. The Chetco Bar Fire was a relatively low-priority fire during this phase, since it was far from values at risk and it remained within the Kalmiopsis Wilderness, while other fires in the region were threatening communities and resources, according to Forest Service documents and incident management team officials. Because firefighters had been unable to suppress the fire during initial attack, national forest officials said they anticipated, based on knowledge of previous fires in the area, that the Chetco Bar Fire would become a long-term incident. The type-3 incident management team completed a long-term assessment and began working to contain the fire using long- term, indirect strategies. Under the type-3 team, crews scouted potential locations to fight the fire and started building firelines some distance away, approximately 6 miles from the fire and outside of the wilderness boundary, according to a Forest Service document and an incident management team official. Several additional fire crews were assigned to work on the fire during this time, with staffing fluctuating between approximately 40 and 140 people per day. As the type-3 team’s 2-week rotation was ending, national forest officials decided to bring in a NIMO team to assume command of the fire. Officials said they brought in a NIMO team because it consisted of type-1-qualified staff who could be staffed on the fire for longer than 2 weeks, and the team could expand or contract as needed. The NIMO team took command of the fire on July 29, with the fire estimated at 2,181 acres in size, and started updating the type-3 team’s long-term assessment and developing a long-term implementation plan. The plan identified 13 trigger points, referred to as “management action points,” to help guide decision-making on protecting high values at risk if certain conditions were met. For example, the plan laid out actions to prevent the fire from crossing the Chetco River—the first trigger point identified—and actions to be taken if the fire crossed the river. The NIMO team continued the type-3 team’s efforts to construct a series of firelines away from the main fire and, according to a team summary document, completed all of the firelines by August 17. Forest Service officials told us that for these firelines to be effective, firefighters would have needed to burn the vegetation between the lines and the fire itself (known as a burnout). National forest and NIMO team officials said that the teams had not yet taken this step because they considered it an unnecessary risk as long as the fire remained north of the Chetco River. These officials said that burnout operations pose risks if the fire set by firefighters burns in a different direction than intended, and such operations can unnecessarily burn a larger area of the forest if the fire does not reach the burnout. Therefore, one national forest official said firefighters will prepare firelines but not conduct burnout operations until the incident management team determines they are needed—particularly since safety risks can be associated with conducting burnout operations. Figure 5 shows the Chetco Bar Fire’s growth from July 14 through August 16, 2017. As the fire burned into August, hotter and drier weather created conditions for more active fire behavior in the third phase of the fire. Chetco Effect winds developed in mid-August 2017, causing the Chetco Bar Fire to rapidly expand and intensify (see sidebar). The Forest Service was aware of the potential for such winds, as fire behavior modeling and the July 2017 long-term assessment showed the potential for these winds to increase fire behavior dramatically by mid-August. The winds, combined with dry fuels and heavy vegetation, created conditions that led to extreme fire behavior. Chetco Effect Winds Chetco Effect winds, also known as Brookings Effect winds, are warm, dry, and strong winds flowing down the Chetco River Basin toward Brookings, Oregon (see figure below). Such winds are more broadly referred to as Foehn or downslope winds, other examples being the Santa Ana winds in southern California and the Diablo winds in northern California. Chetco Effect winds can happen any time and generally occur two to four times a year, according to the National Weather Service. The Chetco Effect winds first occurred the evening of August 15 and morning of August 16, but the fire remained north of the Chetco River. When the winds returned the evening of August 16 and morning of August 17, the fire crossed the river and began expanding rapidly, in part because heavy vegetation on the south side of the river fueled the fire under the winds. Many officials and stakeholders said nothing could be done to moderate the fire’s behavior when the Chetco Effect winds were in effect. The fire increased in size from 8,500 acres on August 17 to 91,551 acres on August 21 (see fig. 6). As a result, the Chetco Bar Fire became a much higher priority fire, according to Forest Service documents. The NIMO team ordered additional crews on August 17, in anticipation of conducting burnout operations along 10 miles of fireline in an attempt to slow the fire, according to Forest Service documents. However, the Chetco Effect winds caused the fire to move rapidly toward and past the fireline before the Forest Service could conduct the planned burnouts. Even though the fireline was completed prior to being overrun by the fire, national forest officials told us that the weather conditions were not favorable for burnout operations, as the winds would have blown the burnout fires back toward private timberlands and populated areas. The winds also caused embers to fly far ahead of the fire during this time, creating spot fires 1 to 2 miles or more ahead of the main flame front. On August 18, the Chetco Bar Fire began spreading from national forest onto private timberlands and unincorporated areas containing homes. As the fire began to threaten homes and other structures, the NIMO team directed firefighters to take appropriate action to try to protect those structures, if fire behavior allowed. For example, between August 18 and 21, Forest Service documents indicated that firefighters cleared brush around several structures and homes in a small community known as Wilderness Retreat and along two Forest Service roads. On August 19, the fire burned rapidly toward Wilderness Retreat and firefighters conducted an emergency burnout, which successfully protected the community, according to a NIMO team document and national forest officials. Around this time in another area, the Chetco Bar Fire burned six primary residences and more than 20 other structures, according to state and Forest Service documents. On August 20, the fire traveled 6 miles toward Brookings in a single day, and threatened more than 3,000 homes during this phase. As the Chetco Bar Fire burned toward Brookings, the NIMO team notified the Curry County Sheriff that residents would need to be evacuated. However, the rapid spread of the fire provided limited time to notify residents and conduct evacuations, according to a NIMO team document and national forest officials. The Curry County Sheriff’s Office issued the first evacuation notices on August 18, and additional evacuation notices were issued between August 19 and 21. As the fire expanded, the NIMO team ordered additional firefighting assets, increasing the ground assets assigned from 65 firefighters and 1 fire engine on August 17, 2017, to 788 firefighters and 90 fire engines by August 21. However, some assets ordered were not available because they were assigned to other fires in the region. In addition to ground assets, additional aircraft were ordered and assigned to assist the firefighting effort—such as two large and one very large air tankers, which dropped retardant on the fire on August 17 and August 18. The incident management team had requested two additional air tankers, but the requests were cancelled since aircraft were unavailable, according to a Forest Service document. Some ordered drops from air tankers also were cancelled because of poor visibility from smoke. Six helicopters were ordered during this phase, four of which were assigned to the fire, but the helicopters also were unable to fly due to smoke, according to flight communication logs and an incident management senior official. With the Chetco Bar Fire’s rapid growth, national forest officials decided to order a type-1 incident management team on August 21. Since mobilizing the team would take time, a type-2 team already in the vicinity was brought in to assist the NIMO team on August 19. The type-1 team arrived on August 23 and assumed command on August 26, according to a team document. In the fourth phase, the Chetco Bar Fire continued to burn actively through the end of August and into September 2017, but the rate of its spread generally slowed. However, high temperatures and low humidity contributed to the fire growing from 97,758 acres on August 22 to 191,067 acres on September 22 (see fig. 7). Evacuations continued in the early part of this phase, threatening more than 8,500 homes during parts of September, but evacuation orders began to be lifted as the risk to homes declined. During this phase, the Forest Service ordered more firefighting assets, resulting in over 1,700 firefighters in total assigned to the fire. Between September 6 and 19, the fire began expanding to the east and the fire was divided into an east and west zone, with separate incident management teams assigned to each zone. Firefighters constructed firelines to the south and west of the fire. Forest Service documents indicated the agency put in 128 miles of fireline cut by bulldozers and 52 miles of hand cut fireline, and used 141 miles of existing roads and 25 miles of natural features as firelines. Air tankers and helicopters continued supporting firefighters, dropping over 950,000 gallons of water, 55,000 gallons of retardant, and 10,000 gallons of gel during this phase, according to Forest Service documents. However, smoke from the fire hampered air operations, with one type-1 team reporting it was unable to conduct air operations for about half of the days it was in command (August 26 through September 9). Firefighters gained substantial control of the fire during this phase, going from 0 percent containment on August 22 to 97 percent containment by September 22. In mid- to late-September, the weather started to change, with cooler days and more moisture, which helped to moderate the fire’s behavior. By September 23, the area had received several inches of rain, which nearly contained the fire, according to an incident management team document. Firefighting assets were released as the fire was contained. The Chetco Bar Fire was declared fully contained on November 2—nearly 4 months after it was detected. The fire burned a total of approximately 191,197 acres, according to the Forest Service’s Burned Area Emergency Response (BAER) report (see fig. 8). Forest Service officials and stakeholders we interviewed raised a number of concerns about the Forest Service’s response to the Chetco Bar Fire. Many of these concerns related directly to the Forest Service’s response to the fire; some related to broader agency programs that may have had an effect on fire behavior. We grouped these concerns into five categories: (1) aggressiveness of firefighting response, (2) availability of firefighting assets, (3) communication with cooperators, (4) communication with the public, and (5) timber harvest and other fuel reduction activities. The Forest Service has taken steps that may help address some of the concerns, such as those related to communication. Agency officials and stakeholders expressed differing views about some of the concerns and whether changes were necessary. Some national forest officials and many stakeholders we interviewed said that the Forest Service was not aggressive enough in fighting the Chetco Bar Fire before the Chetco Effect winds arrived in mid-August. Several of these stakeholders said if the Forest Service had used more aggressive firefighting strategies and tactics, the agency could have prevented the fire from getting as large as it did and threatening homes. Some of these officials and stakeholders raised concerns about whether incident management teams and line officers appropriately balanced the risks of different firefighting decisions during the fire. Some said the strategies and tactics taken early on may have put hundreds of firefighters and the public at risk later in the fire. National forest and incident management team officials said that in attempting to suppress the Chetco Bar Fire, they adopted firefighting strategies and tactics that considered firefighter safety, the values at risk, and the probability of success. National forest officials said that when deciding how to respond to the fire, they prioritized firefighter safety and also considered the likelihood that a particular response would be successful, in accordance with 2017 Forest Service guidance. As previously discussed, in the early stages of the Chetco Bar Fire, firefighters expressed concerns about their safety and the likelihood of success of certain tactics. In addition, national forest officials noted that after the rappellers asked to be pulled out of the fire and other firefighters expressed safety concerns, line officers were hesitant to send in additional firefighters. Other officials and stakeholders said the area where the Chetco Bar Fire started is very dangerous, with some noting that it is one of the most dangerous areas in the region and possibly the country to fight fire. Specific concerns about the aggressiveness of the Forest Service’s response included the following: Number of firefighters. Some officials and several stakeholders raised concerns about the Forest Service not sending in more firefighters at the beginning of the Chetco Bar Fire to try to contain it before it threatened homes. In response, national forest officials said that the four rappellers that were sent on the first day were part of an 18-person crew stationed near Grants Pass, Oregon. They were the only crew members available to respond on July 12, as the remaining crew members had just returned from another fire assignment, and firefighters are generally required to take 2 days off after completing a standard 14-day fire assignment. As previously noted, safety concerns also factored into decisions to remove the rappellers and not add crews on the second day of the fire. Absence of smokejumpers. Some stakeholders raised concerns that the Forest Service did not send smokejumpers into the Chetco Bar Fire in its early stages, saying that smokejumpers may have been more effective at suppressing the fire when it was small. In response, national forest officials said that the rappellers who were sent to the fire were located much closer to the ignition point than the closest smokejumpers and were able to respond more quickly. These officials also said that rappellers can be more effective in rough terrain with heavy timber, since they do not need an open space to land with parachutes and can be dropped closer to the fire. Use of helicopters. Several stakeholders raised concerns about the Forest Service stopping the use of helicopters to drop water on the fire after the rappellers were removed. According to interagency guidance and Forest Service officials, water drops are not as effective at containing a fire without crews on the ground (to build firelines, for example), and they did not want to expose helicopter crews to unnecessary risk for actions that were unlikely to be effective. In addition, officials said that the water drops were causing burning logs and other debris to roll down the hill and create spot fires. Interagency guidance discusses the importance of coordinating air and ground firefighting tactics, noting that the effectiveness of aircraft is dependent on the deployment of ground assets. Use of indirect strategies. Several stakeholders raised concerns about incident management teams not engaging the fire more directly in the first several weeks rather than constructing fireline miles away. Some of these stakeholders described this indirect approach as a “watch and wait” or “let it burn” approach. In response, officials said that they looked for locations and opportunities to fight the fire directly, but the fire’s remote location and rugged terrain made this difficult. One official estimated it would have taken firefighters 2 days to hike to the fire because of the distance and trail conditions. Number of burnout operations. Several officials raised concerns about the Forest Service not conducting burnout operations before the Chetco Effect winds arrived in mid-August. However, as previously noted, officials stated that there are risks in conducting such operations. Limited use of chainsaws. Some national forest officials raised concerns about limited use of chainsaws in the Kalmiopsis Wilderness, saying this prevented them from making quicker progress in constructing fireline. For example, two national forest fire management officials said that in trying to clear a wilderness trail to use as a fireline, the crew used handsaws rather than chainsaws after the initial attack, which made the task more difficult and time consuming. Limited action to protect homes. Several stakeholders raised concerns about incident management teams not doing more to protect homes, stating that firefighters and equipment in the vicinity of homes that later burned were not used to help protect those homes. In response, national forest and headquarters officials said that although the agency tries to prevent fires from reaching homes, protecting homes and other private structures is the responsibility of state and local entities. Moreover, headquarters officials noted that Forest Service firefighters are not trained or equipped to defend structures. Forest Service officials said that since the Chetco Bar Fire, the agency has expanded tools that may help address some of these concerns for future fires. They noted that some of these tools were not widely available at the time of the Chetco Bar Fire but are becoming more common. In particular, the Forest Service has an evolving risk management assistance program aimed at improving decision-making on fires by developing a strategic evaluation process. This program includes risk- management assistance teams that can be deployed to fires to assist with key decisions and exercises to help incident management teams and line officers analyze different firefighting options, according to program documents. For example, the Forest Service developed a tradeoff analysis tool through which decision makers assess different firefighting options and rate them according to how well they address firefighter safety, public safety, and values at risk. During the 2018 Klondike Fire, national forest officials said they brought in a risk-management team to facilitate analysis of firefighting options and included cooperators in the discussions. Officials said these discussions helped everyone understand the risks and tradeoffs of various firefighting options, adding transparency to the process. Several officials and stakeholders raised concerns about the number of firefighting assets assigned to the Chetco Bar Fire. According to Forest Service documents and officials, firefighting assets were stretched thin fighting other fires in the region, and there were a number of times throughout the Chetco Bar Fire when assets, such as management teams, crews, and helicopters, were requested but were unavailable (see table 1). For example, an incident management team that was heading to the Chetco Bar Fire was diverted to the Eagle Creek Fire, which was threatening homes and other structures near Portland, Oregon. Further, some officials said limited availability of certain firefighting assets with specific capabilities, such as infrared drones that can “see” through smoke or cloud cover, hindered their ability to fight the fire when visibility was limited. Some officials also emphasized the importance of having more long-term fire analysts assigned to national forests and incident management teams to help develop and interpret fire behavior models and long-term assessments that, in turn, could help protect people and values at risk. However, other officials said that having additional assets likely would not have made a significant difference in the response to the Chetco Bar Fire because of the difficult terrain where the fire started and because of the Chetco Effect winds. Beyond their specific concerns with the Chetco Bar Fire, some stakeholders also observed the Forest Service would likely benefit from having additional firefighting assets in the future, as the frequency and intensity of fires are likely to increase. Forest Service officials acknowledged that there were not enough firefighting assets in 2017, given the number of large fires that year. As a result, they said they had to make difficult decisions regarding prioritizing assets, with fires threatening life and property receiving higher priority. Forest Service officials said that the agency is working to increase the number of some types of firefighting assets. For example, headquarters officials said that the agency was in the process of developing a drone program. In addition, officials said that the agency is working on increasing the availability of some assets, such as air tankers and helicopters, through the use of different contracting authorities. Several officials and stakeholders raised concerns about communication among the various cooperators before and during the Chetco Bar Fire. In particular, some said that differences in firefighting approaches—due in part to cooperators’ differing missions, responsibilities, and priorities—had not been fully clarified in advance, leading some cooperators to express frustration with the Forest Service’s response to the fire. For example, according to some officials and stakeholders, the Oregon Department of Forestry and Coos Forest Protective Association generally place more emphasis on protecting timberlands than the Forest Service, and this sometimes leads to differences in the agencies’ preferred approaches to responding to fires. For example, when determining where to construct a fireline, Forest Service officials may identify a location aimed to keep a fire from reaching homes, whereas cooperators from the Oregon Department of Forestry or Coos Forest Protective Association may prefer a location that also protects timberlands. In addition, some stakeholders said that the frequent rotation of incident management teams—generally about once every 2 weeks—made it difficult for local cooperators to coordinate with those teams. One official noted that rotation of teams can make it difficult to build trust and maintain good communication with cooperators and the public. However, Forest Service headquarters officials said that the agency has studied the structure and use of incident management teams in the past, and the agency has not identified a better approach. Several officials and some stakeholders noted lessons learned from the Chetco Bar Fire. For example, they cited the need to do more pre-season fire planning, such as meeting with cooperators before the fire season begins to discuss coordination among agencies and planning how they might respond to fires in certain situations. Some also noted the need to improve communication and transparency with cooperators during fires, such as through the use of risk-management assistance teams previously discussed. Officials and stakeholders said that communication among cooperators in the region has improved since the Chetco Bar Fire, helping to develop a shared understanding of the potential firefighting response in different locations and under different conditions. Many officials and several stakeholders said the Forest Service did not provide sufficient or timely information to the public about the danger from the Chetco Bar Fire and what the agency was doing to fight it. In particular, several officials raised concerns about the Forest Service waiting to hold its first public meeting until over a month after the fire was detected. Several officials and some stakeholders said that in the absence of sufficient information, misinformation and rumors—such as incorrect information on evacuations in certain areas—spread, leading to frustration, anger, and fear on the part of the public. Officials and stakeholders said another lesson learned was the importance of communicating accurate and timely information through various means, including public meetings and social media. Officials and stakeholders told us that the Rogue River-Siskiyou National Forest is taking steps to help ensure that it communicates more effectively during fires. For example, national forest officials said that since the Chetco Bar Fire, they have increased their level of communication with local communities. Officials also said they are now more proactive in monitoring social media and ensuring they post correct information on fires, among other things. As a result, officials and stakeholders said that public perception of the 2018 Klondike Fire was much more positive than of the Chetco Bar Fire, even though both fires burned more than 175,000 acres. fueled the Chetco Bar Fire and made firefighting efforts more dangerous by leaving snags (standing dead trees) that could injure or kill firefighters. Following wildfires, the Forest Service may consider whether to leave burned trees and allow the burned area to recover naturally or to harvest some of those trees—called salvage harvesting—with the intention of generating funds to help pay for the recovery of natural resources or infrastructure, such as trails or roads, among other purposes. Considerable scientific uncertainty exists about whether and how quickly harvested areas recover compared with unharvested areas. Disagreement also exists about the extent salvage harvesting generates funding, considering the cost of planning, preparing, and administering sales of salvaged trees. Following the Chetco Bar Fire, the Forest Service determined that 13,626 acres of the burned area were potentially available for salvage harvesting. These areas had 50 to 100 percent tree mortality and were in areas of the Rogue River-Siskiyou National Forest where timber harvesting aligned with existing management objectives, according to an official. The Forest Service narrowed the area that it proposed putting up for salvage harvesting to 4,090 acres, removing areas that lacked economically viable timber, were inaccessible to logging equipment, were in roadless areas, or had sensitive wildlife habitat, among other factors. The total number of acres the Forest Service offered for salvage harvesting was 2,194 acres across 13 sales, according to an official. Of the 13 salvage sales offered, eight were sold, totaling 1,957 acres, and five were not sold. Of these five offers, three did not receive bids, and two were dropped by the Forest Service due to market changes or other considerations. In contrast, several Forest Service officials and some stakeholders said that higher levels of timber harvest and fuel reduction would not have made a large difference in the Chetco Bar Fire because of the fire’s intensity and rate of spread under the Chetco Effect winds. Several said that if there had been more timber harvest, the forest might have been replanted in ways that could have made the fire worse. Specifically, when replanting is done following timber harvest, trees may be planted more densely and uniformly than would occur if vegetation were allowed to grow back naturally, according to a Forest Service ecologist and some stakeholders. In addition, slash (debris from logging operations) is sometimes left on the ground after timber harvest, which can fuel future fires. As a result, areas where timber has been harvested may burn more severely during future fires, according to some officials and stakeholders. Rogue River-Siskiyou National Forest officials said the forest has been carrying out many fuel reduction activities and has exceeded its fuel reduction target every year from fiscal year 2014 through fiscal year 2019 (see appendix I for a map of past timber harvests and other fuel reduction activities). As part of its fuel reduction efforts, the forest is creating some larger breaks in vegetation by connecting areas where fuel reduction activities have taken place, according to officials. Further, national forest officials are maintaining some firelines that were built during previous fires, including the Chetco Bar Fire, to aid in their response to future fires. Agency officials said these efforts are part of a broader effort to move towards spatial fire planning, where areas at risk and effective places to contain wildfires are identified before fires start. Forest Service officials and stakeholders we interviewed and reports and other documents we reviewed identified a variety of effects the Chetco Bar Fire had on local communities and resources. We grouped these effects into four categories: (1) homes and infrastructure, (2) public health, (3) local businesses and workers, and (4) natural and cultural resources. Most of the identified effects were negative, although some positive short- and long-term effects were identified. For example, the Chetco Bar Fire damaged habitat for many wildlife species, but some species that prefer burned landscapes likely benefitted from the fire, according to officials. The Chetco Bar Fire destroyed six homes and damaged one home, according to Forest Service and state documents. The fire also threatened over 8,500 homes, causing more than 5,000 residents to be evacuated over the course of the fire, according to Forest Service documents. In addition, Forest Service and state documents stated that the fire destroyed more than 20 other structures and damaged at least eight more, such as garages and other outbuildings. After a severe wildfire, soil erosion can increase and cause adverse effects. As fires burn, they destroy plant material, such as roots and leaves, that help prevent erosion during severe rainstorms. Plant roots help stabilize the soil, and leaves slow runoff by allowing water to seep into the soil. In some severe fires, burning vegetation creates a gas that penetrates the soil. As the soil cools, this gas condenses and forms a waxy coating that causes the soil to repel water. Rainwater and melted snow can then flow across these surfaces and cause erosion. Erosion can reduce water quality and damage roads. In addition, because burned soil does not absorb as much water as unburned soil, seeds have a harder time germinating, and surviving plants find it more difficult to obtain moisture. the 63 miles of trails within the fire perimeter. Further, a campground within the national forest was partially damaged and closed to the public while being repaired. Erosion following the Chetco Bar Fire also washed approximately 40,000 cubic yards of sediment into the Port of Brookings Harbor. A port official said that dredging the harbor is estimated to cost $4 million. The official noted that the commission governing the port was pursuing grants, such as disaster grants from the Federal Emergency Management Agency, to help with dredging costs but was unsure whether total costs could be covered. Local officials said that post-fire erosion could also negatively affect drinking water infrastructure, since the Chetco Bar Fire burned about 80 percent of Brookings’ watershed. Brookings received a grant to evaluate the fire’s effect on the city’s water system, according to a local official. The city hired a consultant, who reported in June 2018 that the quality of the water was generally excellent and that no significant water quality effects from the fire had been observed. People with existing lung disease may not be able to breathe as deeply or vigorously as they normally would during exposure to high levels of particulate matter. Healthy people may also experience these effects. susceptibility to respiratory infections and aggravate existing respiratory diseases, such as asthma and chronic bronchitis. smoke (see sidebar). Most healthy individuals recover quickly from smoke exposure and will not experience long-term health effects, according to an Environmental Protection Agency document; however, the smoke exposure effects are more sudden and serious for sensitive groups, including children, older adults, and people with existing heart or lung disease. Local health officials and a national forest official also raised concerns about the potential long-term effects of exposure to wildfire smoke, but little data exist on such effects. The Forest Service reported that four towns in the vicinity of the Chetco Bar Fire experienced, on average, about 9 days of unhealthy or worse air quality, although the severity and duration of wildfire effects on air quality varied by town (see fig. 10). Of these towns, Brookings had the most days—three—measured as “hazardous,” the worst category. The four towns also experienced about 5 days, on average, that were measured as being unhealthy for sensitive groups. Many residents also experienced mental and emotional effects from the Chetco Bar Fire, according to local health officials and some stakeholders. A local health official said that some residents experienced post-traumatic stress disorder after the fire, with some residents becoming hypervigilant of smoke and sirens. Some stakeholders noted that the 2018 Klondike Fire, which burned nearby, led to additional mental and emotional stresses for those affected by the Chetco Bar Fire. The Chetco Bar Fire’s effects on local businesses and workers included damage to the tourism and logging industries. Local businesses lost revenue in the short term because of decreased summer tourism during the Chetco Bar Fire, according to some documents and many stakeholders. According to estimates from the Oregon Tourism Commission, businesses—including tourism-dependent ones such as hotels and restaurants—lost over $1 million in both Curry and Jackson counties, and businesses in Josephine County lost over $160,000 during the 2017 fire season. For example, the Oregon Shakespeare Festival canceled nine outdoor performances because of wildfire smoke, resulting in losses estimated at about $600,000, according to a company document. In addition, one vineyard in Cave Junction lost an estimated $10,000 to $20,000 in revenue because of reduced tasting room sales and vacation rentals, according to an Oregon vineyard association spokesperson. The decrease in tourism also had short-term negative effects on workers in the tourism industry. According to a report, workers in Curry County lost income, in part due to employee furloughs, because of wildfires in 2017. Another document cited that Josephine County lost an estimated 100 jobs in 2017 because of the Chetco Bar Fire. Following the fire, the governor of Oregon created the Chetco Bar Fire Recovery Council to help the region recover from the fire. The council assessed economic damage, identified recovery needs, and identified potential state funding for those needs. For example, in November 2017, the council identified a potential need for state economic development funds to assist local businesses. However, the council reported in March 2018 that three businesses affected by the fire had received federal loans from the U.S. Small Business Administration and that there was no longer a clear need for state economic development funds. In addition, some stakeholders we interviewed and documents we reviewed raised concerns that if summer wildfire smoke became common in southern Oregon, it could have a long-term negative effect on tourism. However, a 2019 report found that wildfire smoke had a minimal effect on people’s willingness to consider traveling to southern Oregon in the future. One local business has set up air quality monitors at a tourist attraction to inform tourists of the current air quality. The Chetco Bar Fire burned 14,130 acres of nonfederal timberlands, according to the Forest Service’s BAER report. One privately owned lumber company was particularly hard hit, with the fire burning about 10,000 acres of its timberlands, according to company representatives. This loss was about 10 percent of the company’s timberlands and represented about 5 years of its average harvest. Following the fire, the company salvage-harvested approximately 6,000 acres of the burned timber, which company representatives said provided some short-term economic benefits for the company and, according to one stakeholder, also temporarily increased employment for loggers and truck drivers in the area. However, the long-term effects of the fire on the company are unknown. One representative said, depending on future market conditions, the loss of timber from the Chetco Bar Fire could lead the company to lay off employees or could jeopardize its future. The severity of the Chetco Bar Fire varied across the forest, which led to varied effects on soil and vegetation. As shown in figure 11, within the perimeter of the Chetco Bar Fire, burn severity ranged as follows: unburned or very low (19 percent, or 36,027 acres); low (40 percent, or 76,613 acres); moderate (34 percent, or 64,545 acres); and high (7 percent, or 14,012 acres). The severity with which soil burns during a fire affects both the potential for erosion following the fire and the severity of damage to vegetation. Areas of the Chetco Bar Fire that burned at moderate and high severity had increased potential for erosion, according to the BAER report. As previously discussed, post-fire erosion damaged roads and other infrastructure. Further, the BAER report noted that severely burned areas may have lower soil productivity and vegetation growth. However, most of the native vegetation in the area is adapted to fire and is likely to recover over time, according to the BAER report. Moreover, a Forest Service ecologist said the Chetco Bar Fire helped create a more diverse forest structure (characterized as a mosaic of different species and age classes) that benefits many plant and animal species (see fig. 12). For example, nine sensitive plant species found in the area burned by the Chetco Bar Fire thrive in early post-fire ecosystems, according to a Forest Service document. Further, officials said rapid regrowth of vegetation, such as a moss that thrives after fires, helped reduce erosion and limit potential future damage to roads and trails. Forest Service officials and documents noted that they did not expect widespread, long-term negative effects on vegetation from the Chetco Bar Fire, but they identified two negative effects: Invasive plants. More than a thousand individual invasive plants (such as noxious weeds) were introduced to an approximately 13,000- acre area of the national forest during the Chetco Bar Fire, mainly via firefighters’ boots and equipment. Invasive plants can, in some cases, displace native plants, compromise the quality and quantity of habitat for wildlife and fish, and increase wildfire risk. A national forest official said that it is labor intensive and costly to eradicate invasive plants because they have to be pulled out by hand. The official said the agency does not have the resources to remove all of the invasive plants brought in during the fire and is prioritizing removal of those that are the fastest growing, most disruptive, and affect the most highly valued resources. In addition, the National Forest Foundation administered a $7,000 grant to remove invasive plants on 10 of the affected acres in June and July 2019. Redwood stands. The Rogue River-Siskiyou National Forest contains the northernmost naturally occurring coast redwood tree stands, and the Chetco Bar Fire burned about 12 percent of the total area of redwood stands within the forest, or about 60 acres, according to a Forest Service ecologist. However, most of the area burned at low severity, though parts burned at moderate or high severity. The ecologist said redwoods are adapted to survive fire, noting that larger trees will usually resprout from dormant buds under the bark along the entire length of the trunk (see fig. 13). Smaller trees and larger trees burned at high severity can be killed at the top but are often able to resprout. In the short-term, the Chetco Bar Fire killed or damaged habitat for many wildlife species, although the exact effect of the fire on wildlife is unknown, according to a Forest Service official. Most wildlife species are expected to recover, but the effects on some threatened and sensitive species could be longer lasting, according to Forest Service documents and officials. For example, half of the 13 known northern spotted owls—a species that is federally listed as threatened under the Endangered Species Act—living within the perimeter of the fire were estimated to have died from the fire, according to a Forest Service biologist. In addition, this biologist said the fire’s effect on the population of a seabird called the marbled murrelet, as well as on two mammals—Pacific marten and fisher—is unknown, although it negatively affected their habitats. National forest officials said the Chetco Bar Fire also likely benefitted some wildlife species because the mosaic landscape resulting from the fire is preferred by some wildlife, including deer, elk, migratory birds, butterflies, and woodpeckers. For example, black-backed woodpeckers thrive in partly burned areas because they eat wood-boring beetles that feed on recently burned trees. Erosion resulting from the Chetco Bar Fire likely had short-term negative effects on fish populations, including the threatened coho salmon, according to the BAER report. Sediment in the water makes it harder for fish to breathe and can smother their eggs. In addition, over time, increased sediment in streams and rivers can disrupt salmon migration because salmon use their sense of smell to navigate to their native stream to spawn, and sediment can mask that smell. Some stakeholders said they were concerned that the loss of shade from trees might lead to warmer river water, thereby harming salmon. However, a Forest Service biologist said that vegetation near the river has regrown since the fire and there is no indication that the temperature of the river water has increased. The fire may provide some long-term benefits for salmon and other fish species. Specifically, erosion following the fire is likely to increase the supply of downed trees and coarse gravel in streams and rivers, which provide places for fish to lay their eggs and hide, according to a study and a Forest Service biologist. Some cultural resources—including archaeological sites, historic structures, and areas significant to contemporary Native American tribes—were negatively affected by the Chetco Bar Fire. The Forest Service reported that 130 known and recorded Native American archaeological sites were located within the perimeter of the Chetco Bar Fire, 49 of which the agency characterized as isolated sites containing one to three stone artifacts. The effect of the Chetco Bar Fire on known and recorded sites—and on any cultural sites not previously identified—is not fully known. Following the fire, as part of its BAER report, the Forest Service assessed some of these sites, including a prehistoric Native American village site and an area culturally important to Native American tribes. This report noted a number of cultural artifacts, such as arrowheads and tools, that were discolored by the fire or were displaced or moved during or after the fire by, for example, soil disruption caused by trees falling or roots burning and collapsing. The report also stated additional damage could occur in the future; for example, increased erosion could further damage some cultural sites, and vegetation loss could make artifacts more visible, increasing the potential for looting and vandalism. To help mitigate some of the effects, the Forest Service planted some of the burned area with native grass seed to reestablish ground cover and reduce erosion. In addition to the fire damaging cultural resources, a Forest Service archaeologist said fire suppression activities caused some damage. For example, Native American arrowheads and tools were unearthed when a bulldozer constructed a fireline. The archeologist said that they took precautions to minimize suppression impacts on cultural resources, for instance by avoiding using heavy equipment in areas where cultural resources were known to be located. We provided a draft of this report to the Departments of Agriculture and the Interior for review and comment. In an email dated April 17, 2020, the Forest Service, responding on behalf of the Department of Agriculture, said it generally agreed with the draft report. The Forest Service also provided a technical comment, which we incorporated. The Department of the Interior told us it had no comments on the report. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Agriculture, the Secretary of the Interior, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. Figure 14 shows the timber harvests and other fuel reduction activities— such as thinning vegetation or conducting prescribed burns—done in the area of the Chetco Bar Fire from 2008 through 2017. Anne-Marie Fennell, (202) 512-3841 or fennella@gao.gov In addition to the individual named above, Jonathan Dent (Assistant Director), Lesley Rinner (Analyst-in-Charge), Elizabeth Jimenez, and Jesse Lamarre-Vincent made key contributions to this report. Philip Farah, Ellen Fried, Richard P. Johnson, John Mingus, Edward J. Rice, Sara Sullivan, and Elizabeth Wood made additional contributions.", "summary": "A wildfire known as the Chetco Bar Fire began in the summer of 2017 in southwest Oregon and burned more than 190,000 acres over nearly 4 months. Since the fire began in a national forest, the Department of Agriculture's Forest Service played a key role in managing the firefighting response. Because the fire also threatened other lands, state and private firefighting entities were also involved. GAO was asked to review the Forest Service's response to and the effects of the Chetco Bar Fire. This report describes (1) key events of the Chetco Bar Fire and the Forest Service's firefighting response, (2) key concerns raised by Forest Service officials and stakeholders about the Forest Service's response, and (3) effects of the fire on local communities and resources. GAO reviewed federal documents related to key events and the response, such as incident action plans and daily status summaries; analyzed reports on effects of the fire; and visited burned areas. GAO also interviewed Forest Service, state, and local officials involved in the response, as well as other stakeholders—such as representatives of nongovernmental organizations and community members—to discuss key concerns and effects of the fire. To identify the stakeholders, GAO reviewed documents and interviewed Forest Service officials and stakeholders, who suggested others to interview. The Chetco Bar Fire was first reported in July 2017, burning in the Rogue River-Siskiyou National Forest in Oregon. Because of the remote, steep terrain, initial Forest Service attempts to fight the fire at close range were unsuccessful. The fire grew slowly over the next month. Firefighters, directed by the Forest Service, responded in various ways, such as by constructing “firelines”—clearing vegetation—in an effort to stop the fire's spread. In mid-August, strong, hot winds caused the fire to expand rapidly, from 8,500 acres to more than 90,000 acres over several days, threatening thousands of homes. Firefighters continued constructing firelines and dropped water and retardant on the fire to try to contain it. In September, the weather changed and cooler days and rain moderated the fire. Firefighers fully contained the fire in November (see figure). Forest Service officials and stakeholders raised a number of key concerns about the Forest Service's response to the Chetco Bar Fire. For example, some said that if the Forest Service's response had been more aggressive, it might have kept the fire from growing and threatening homes. Forest Service officials said that in making firefighting decisions, they prioritized firefighter safety and considered the likelihood that a particular response would be successful. The agency has taken steps to improve decision-making for future wildfires, such as developing a tradeoff analysis tool to help decision makers assess firefighting options. Forest Service officials, stakeholders, and documents identifed various effects of the fire. Some of these sources cited negative effects including destruction of six homes, damage to roads and trails, and damage to habitat for the northern spotted owl. However, the fire likely improved habitat for some species, such as woodpeckers that eat beetles that feed on burned trees, according to officials.", "document_type": "gao"}
{"report": "Uranium enrichment is the process of increasing the concentration of the uranium-235 isotope relative to uranium-238 in a quantity of uranium. Natural uranium consists of approximately 0.7 percent of the fissile uranium-235 isotope, while uranium used in commercial nuclear power reactors generally consists of 3 to 5 percent uranium-235 and uranium for nuclear weapons requires a higher concentration of uranium-235. In addition, as a nuclear reactor operates, some of the uranium in the reactor fuel is converted to plutonium, which can also be used as a weapons material when it is separated from other elements of the irradiated, or spent, fuel through a process known as reprocessing. Plutonium and enriched uranium are “special nuclear material” under the Atomic Energy Act. The processes for obtaining such material— enrichment and reprocessing—are called sensitive nuclear technologies. Under the Treaty on the Nonproliferation of Nuclear Weapons, which came into force in 1970, non-nuclear weapon state parties to the treaty may not acquire nuclear weapons and must conclude a Comprehensive Safeguards Agreement (CSA) with the International Atomic Energy Agency (IAEA). IAEA is an independent international organization affiliated with the United Nations that has the dual mission of promoting the peaceful uses of nuclear energy and verifying, through a set of technical measures called safeguards, that nuclear technologies and materials are not diverted from peaceful uses to military purposes. Most countries have also brought into force an Additional Protocol to their CSAs, which provides IAEA with a broader range of information on the country’s nuclear and nuclear-related activities than under a CSA alone and gives the agency’s inspectors access to an expanded range of locations. For example, the Additional Protocol requires states to declare the location and status, among other things, of uranium mines and uranium and thorium mills. Under a CSA alone, material in mining or ore processing activities (e.g., uranium at mines and mills) is not subject to the agency’s safeguards as it is not yet suitable for enrichment. The United States promotes universal adoption of the Additional Protocol as a policy, but it is not a requirement for the conclusion of a nuclear cooperation agreement with the United States. Figure 1 shows the safeguards arrangements of the partners with which the United States has nuclear cooperation agreements. Section 123 of the AEA establishes a framework for civilian nuclear cooperation agreements, which are a prerequisite for the export of certain nuclear material and equipment, including major components of nuclear reactors. The United States has 23 such agreements with other nations and entities. Section 123 generally requires that nuclear cooperation agreements include nine nonproliferation conditions, such as a guarantee from the cooperating party that transfers will not be used for any military purpose. The President may exempt an agreement from any of these requirements, provided that the president determines that the inclusion of any such requirement would be seriously prejudicial to United States nonproliferation objectives or otherwise jeopardize the common defense and security. See Table 1 for a list of the nine requirements. Section 123 of the AEA also requires that State supply the President with an unclassified Nuclear Proliferation Assessment Statement (NPAS) for each proposed agreement, accompanied by a classified annex prepared in consultation with the Director of National Intelligence. The NPAS describes how the agreement meets AEA nonproliferation requirements and usually includes an overview of the other party’s nuclear energy program and related infrastructure, nonproliferation policies, and relations with countries of proliferation concern. Section 123 also lays out requirements for informing congressional committees and obtaining congressional review. It requires that the President submit any proposed agreement along with the NPAS to the House Committee on Foreign Affairs and the Senate Committee on Foreign Relations for consultation for a period of at least 30 days of continuous session. The proposed agreement, with the NPAS, must subsequently be submitted to Congress as a whole (and referred to the abovementioned committees) for a period of 60 days of continuous session, during which the committees consider it and submit recommendations to the House and Senate, respectively, as to whether to approve the agreement. As a general matter, the agreement may then be brought into effect unless a joint resolution of disapproval is enacted before the end of this period. Section 123 also requires the President to keep the abovementioned committees “fully and currently informed” of any initiative or negotiations relating to a new or amended agreement for peaceful nuclear cooperation. Figure 2 depicts the stages and time frames for negotiation and conclusion of nuclear cooperation agreements. Another section of the AEA, Section 57(b), governs the direct or indirect engagement or participation in the development or production of special nuclear material outside the United States. Under this provision, DOE regulates exports of commercial nuclear technology and assistance. DOE has promulgated these regulations at 10 C.F.R. Part 810; authorizations under these regulations are accordingly referred to as “Part 810 authorizations.” Activities authorized under section 57(b) may not require a nuclear cooperation agreement. The Secretary of Energy signed seven “Part 810” authorizations for the export of nuclear technology to Saudi Arabia between December 2017 and February 2019. For more information about Part 810, see table 2. In negotiating nuclear cooperation agreements, the United States has sometimes pursued nonproliferation measures beyond the nine conditions specified by the AEA. For example, the agreement that the United States concluded with the United Arab Emirates (UAE) in 2009 includes a provision in which UAE agreed to forswear enrichment and reprocessing capabilities. This broad restriction on any enrichment and reprocessing, which became known as the “gold standard,” goes beyond the enrichment and reprocessing restriction required by Section 123 of the AEA, because it applies to all nuclear material rather than just U.S.- obligated material. U.S.-obligated material includes material transferred by the United States or material used in, or produced through, the use of material or facilities transferred by the United States. Following the conclusion of the UAE agreement, the NSC deliberated requiring the so- called “gold standard” for all nuclear cooperation agreements as a policy, but ultimately adopted a policy of pursuing it on a case-by-case basis. The nuclear cooperation agreement that the United States concluded with Taiwan in 2014 included a similar provision. By contrast, the agreement concluded with Vietnam the same year includes a political commitment, rather than a legal one, not to acquire enrichment and reprocessing capabilities. In addition to the roles of State, DOE, and the NSC discussed previously, additional U.S. agencies such as Commerce, DOD, and NRC are involved in matters related to international nuclear cooperation and the negotiation and conclusion of a nuclear cooperation agreement. Table 2 describes agency roles related to nuclear cooperation. Stakeholders we interviewed identified various potential nonproliferation benefits and concerns related to negotiating a nuclear cooperation agreement with Saudi Arabia. Specifically, stakeholders identified the following benefits: A nuclear cooperation agreement would limit production of weapons-usable material. Several stakeholders told us that a nuclear cooperation agreement with Saudi Arabia would give the United States the opportunity to directly restrict Saudi Arabia’s proliferation potential. For example, a U.S.-Saudi nuclear cooperation agreement would include a term required by the AEA that would limit Saudi Arabia’s production of weapons-usable material by prohibiting Saudi Arabia from separating plutonium accumulated in any reactor supplied under the agreement without U.S. consent. According to some stakeholders, other potential supplier countries likely would not impose such restrictions as conditions of supplying Saudi Arabia with nuclear materials or equipment. Cooperation would help the United States retain influence. Several stakeholders noted that nuclear cooperation with Saudi Arabia could help revitalize the United States as a global nuclear supplier, which would help the United States retain its current influence over global nonproliferation norms and rules. For example, as a global nuclear supplier, the United States would have greater influence in international nuclear forums such as the Nuclear Suppliers Group, which establishes nonproliferation guidelines. According to one stakeholder, the United States’ political leverage to promote strong global nonproliferation norms depends upon the United States’ retaining a leadership role in nuclear energy. Another stakeholder said that nuclear cooperation agreements provide the United States with influence over countries’ proliferation decisions. For instance, this stakeholder said that nuclear cooperation agreements include legal conditions that reinforce the legal obligations of the Treaty on the Nonproliferation of Nuclear Weapons and create an additional disincentive to violate those conditions or withdraw from the treaty. Stakeholders we interviewed also identified several proliferation concerns that U.S.-Saudi nuclear cooperation may not mitigate, and could potentially aggravate. According to these stakeholders, concerns include the following: Concerns about stated Saudi nuclear weapon ambitions and commitment to obligations. Some stakeholders expressed concern over Saudi officials’ stated interest in acquiring nuclear weapons. As previously noted, senior Saudi officials have said publicly that there could be conditions under which the country would seek to acquire nuclear weapons or develop a nuclear weapons program. For example, Saudi Crown Prince Mohammed bin Salman said publicly in 2018 that if Iran develops or obtains a nuclear weapon, Saudi Arabia would also work to do so. In 2009 and 2012, respectively, King Abdullah and Prince Turki al- Faisal were reported to have made similar statements. Some stakeholders said that the intent behind such statements was to send a message about Saudi Arabia’s posture toward Iran, but some other stakeholders said that lower-lever Saudi officials have also indicated that the country is open to pursuing nuclear weapons. Several stakeholders said that such statements should be taken seriously as indicators of Saudi nuclear weapons ambitions. One stakeholder said that such statements raise concerns as to Saudi Arabia’s commitment to its obligations under the Treaty on the Nonproliferation of Nuclear Weapons. This stakeholder also said that Saudi Arabia has demonstrated willingness to disregard the terms of transfers of U.S. conventional arms to the country, calling into question whether the country could be trusted to abide by the terms of the nuclear cooperation agreement. Concerns about the extent to which a nuclear cooperation agreement would mitigate the risks of a Saudi weapons program. Several stakeholders questioned whether the terms of an agreement would meaningfully restrict proliferation behavior. For example, notwithstanding the provision of Section 123 of the AEA that prohibits a partner country from using U.S.-obligated material or equipment for weapons purposes, some stakeholders said that another risk of nuclear cooperation is that it would provide Saudi Arabia with the infrastructure and knowledge to produce nuclear material for a future weapons program. In addition, some stakeholders said that there were questions as to whether the United States could enforce the terms of an agreement if it was breached—for example, whether in practice the United States would be able to retrieve U.S.-obligated nuclear material from another country. One stakeholder also noted that the terms of a nuclear cooperation agreement would only be relevant in mitigating proliferation risks if Saudi Arabia contracted with a U.S. company to build the reactors. If Saudi Arabia purchases reactors from other suppliers, its nuclear program will not be bound by the section 123-mandated restrictions of a nuclear cooperation agreement with the United States, since those restrictions only apply to U.S.-obligated material. Concerns about the thoroughness of a U.S. assessment of Saudi proliferation risks. Some stakeholders raised concerns about whether the NPAS process would adequately assess Saudi proliferation risks. We have previously identified weaknesses in the NPAS process related to interagency consultation and a robust, transparent review process. As described above, an NPAS for a U.S.-Saudi nuclear cooperation agreement would be expected to include an overview of Saudi Arabia’s nuclear energy program and related infrastructure, nonproliferation policies, and relations with countries of proliferation concern. An NPAS would also include an analysis of the adequacy of safeguards and other control mechanisms to ensure that assistance provided under the U.S.- Saudi agreement is not used to further any nuclear weapons effort. Some stakeholders said that it would be important for the NPAS for Saudi Arabia to address the questions regarding the country’s stated intentions to develop a nuclear weapons program. One stakeholder questioned whether an NPAS would provide a sufficient assessment of Saudi nuclear proliferation behavior or potential because the statutory requirement for intelligence community input into the NPAS is narrowly worded. Specifically, the addendum that the intelligence community is to provide to each NPAS is required to contain a comprehensive analysis of the country’s export control system with respect to nuclear-related matters, including interactions with other countries of proliferation concern and the actual or suspected nuclear, dual-use, or missile-related transfers to such countries, but the requirement does not call for the intelligence community to assess the country’s intent to develop nuclear weapons. State officials declined to tell us whether they had begun drafting an NPAS in anticipation of an agreement with Saudi Arabia. However, State officials noted that their engagement with the intelligence community in the development of an NPAS goes beyond the requirements of that statute, but they also said that the legal requirement was limited. Concerns about regional proliferation risks and undermining of global nonproliferation norms. Several stakeholders expressed concerns about the regional and international nonproliferation implications of a U.S.-Saudi nuclear cooperation agreement. For example, several stakeholders said that an agreement without restrictions on enrichment and reprocessing could lead to the renegotiation of the agreement with the UAE. The agreement with the UAE, which includes a commitment to forswear enrichment and reprocessing, also contains a provision that would allow the UAE to request renegotiation of its agreement if another country in the region concludes a less restrictive agreement with the United States. Several stakeholders also raised the concern that a nuclear cooperation agreement without additional nonproliferation conditions would undermine U.S. and global nonproliferation norms by sending the message that such norms were negotiable. For example, in addition to the Additional Protocol being a mechanism to prevent diversion of nuclear material, many stakeholders said that insisting on the Additional Protocol was critical and emphasized the importance of the Additional Protocol as a global nonproliferation norm. Several stakeholders also questioned the premise that supplying Saudi Arabia’s nuclear program would allow the United States to retain influence over international nonproliferation norms. One stakeholder said that the United States has not been a significant nuclear exporter for decades and has nonetheless retained its influence. The United States and Saudi Arabia have not made significant progress toward a nuclear cooperation agreement because of persistent differences between the parties over nonproliferation conditions, including U.S. insistence that Saudi Arabia conclude an Additional Protocol with IAEA and that Saudi Arabia agree to restrictions on enrichment and reprocessing, based on our analysis of available information. The United States and Saudi Arabia first held formal nuclear cooperation negotiations in 2012, during which the United States provided a draft agreement text to Saudi officials that included the nine nonproliferation conditions required under Section 123 of the AEA, according to NNSA officials. In that round of negotiations, Saudi officials accepted “the vast majority” of the conditions in the draft text, according to NNSA officials; these officials estimated that approximately three pages of the text remained to be negotiated. NNSA officials told us that the areas of disagreement include provisions required by the AEA. In the next formal negotiations in 2018, there was no progress in resolving the remaining issues, and no changes to the text of the agreement were made at the time, according to agency officials. The areas of disagreement that were not resolved in 2012—including those regarding provisions required by the AEA—remained unresolved as of January 2020, according to agency officials. These areas of disagreement include: Additional Protocol. The United States has urged Saudi Arabia to conclude an Additional Protocol with IAEA, according to a September 2019 letter from the Secretary of Energy to the Saudi Minister of Energy, Industry, and Mineral Resources and based on public statements by the Secretary of Energy and another government official. Several former agency officials and other stakeholders said that Saudi Arabia has expressed an unwillingness to conclude an Additional Protocol with IAEA. Restriction on enrichment and reprocessing. According to public statements by agency officials, the United States supports a permanent restriction on enrichment and reprocessing. According to the Secretary’s September 2019 letter and to former officials we interviewed, however, the United States may be willing to accept a temporary restriction on enrichment and reprocessing in its negotiations with Saudi Arabia. According to these former officials, such a temporary restriction would allow the United States and other countries more time to work with Saudi Arabia to reach agreement on mutually acceptable terms. However, one stakeholder said that this option would not be attractive to Saudi Arabia and would not be useful to the United States as a nonproliferation measure because an existing nuclear cooperation agreement and any nuclear infrastructure that it would have enabled would reduce U.S. leverage to influence Saudi enrichment and reprocessing decisions in the future. Despite the lingering disagreement on certain provisions between both countries, NNSA officials told us in November 2019 they believed the negotiations had made progress since 2012 because the continued interactions with Saudi officials over this time were useful in advancing Saudi understanding of the United States’ position on the nonproliferation conditions of a potential agreement. We are unable to characterize Saudi views on the status of the negotiations or on other aspects of our review, because State did not respond to our repeated requests for assistance in facilitating travel to Saudi Arabia and interviews with relevant Saudi officials. We also did not receive a response to our written request to the Saudi ambassador to the United States for an opportunity to interview relevant Saudi officials about the negotiations. Agency management of U.S.-Saudi nuclear cooperation negotiations remains unclear with regard to agency roles and informing Congress. We were unable to confirm U.S. agency roles at a range of U.S.-Saudi interactions where nuclear cooperation was or may have been discussed. We were also unable to determine whether the agencies kept the relevant congressional committees fully and currently informed of the negotiations. The roles various U.S. agencies have played in U.S.-Saudi nuclear negotiations remain unclear because DOE and State did not provide us with information to clarify or corroborate such roles. According to a State official and DOE officials, State would have “by definition” led any negotiations and without State present, any interactions between U.S. and Saudi officials on nuclear cooperation did not constitute negotiations. The AEA stipulates that State conduct any nuclear cooperation negotiations but does not define “negotiations.” According to one stakeholder, during an NSC meeting in late 2017, during which nuclear cooperation with Saudi Arabia was discussed, the NSC made a decision to reinforce established agency roles, including specifying that State would lead any negotiations. We were unable to confirm whether NSC made such a decision because NSC did not respond to our requests for interviews or documentation. However, through our interviews with State, DOE, and NRC officials, we determined that representatives of each agency participated in the 2012 and March 2018 formal nuclear cooperation negotiations with Saudi Arabia. State and DOE officials did not provide information that we requested about interactions between the United States and Saudi Arabia, such as the dates and agency participants. However, despite the limited cooperation from State and DOE, we were able to identify through our analysis of documentation and interviews with other stakeholders, a range of interactions between the United States and Saudi Arabia where nuclear cooperation was or may have been discussed. The interactions we were able to identify during which potential nuclear cooperation was discussed are as follows: five bilateral meetings, including a September 2018 meeting in Washington, D.C., a December 2018 meeting in Saudi Arabia, and an August 2019 meeting in Washington, D.C.; a Civil Nuclear Energy Roundtable in Saudi Arabia in December 2017, a commercial nuclear mission to Saudi Arabia in April 2018, in partnership with DOE; and the letter from the Secretary of Energy to his Saudi counterpart in September 2019 conveying U.S. positions on nonproliferation conditions for U.S.-Saudi nuclear cooperation. We also identified five interactions where the U.S. Secretary of Energy and Saudi officials may have discussed nuclear cooperation, including a phone call in November 2017 and meetings on the sidelines of four events: the IAEA General Conference in Austria in September 2017, the Bilateral Energy Dialogue in Saudi Arabia in December 2017, the World Economic Forum in Switzerland in January 2018, and the Future Investment Initiative in Saudi Arabia in October 2019. Figure 3 illustrates U.S.-Saudi negotiations and other interactions, and appendix II includes a detailed list of the interactions we were able to identify. Because State and DOE did not cooperate with our information requests, we cannot confirm that the interactions we identified constitute all of the interactions between the United States and Saudi Arabia on potential nuclear cooperation since 2012. Furthermore, we were unable to determine whether the agencies followed the established roles in the other interactions with Saudi Arabia where nuclear cooperation was or may have been discussed because NSC, State, and DOE did not respond to our requests for information to clarify these matters. Specifically, with the exception of the April 2018 commercial nuclear mission to Saudi Arabia, we were unable to determine whether State or other agency officials authorized, were present for, or were aware of a number of DOE–led interactions with Saudi Arabia described above. In addition, State and DOE officials declined to confirm whether State authorized the September 2019 letter from the Secretary of Energy to his Saudi counterpart regarding U.S. positions on the nonproliferation conditions for nuclear cooperation. It is unclear whether the agencies kept the relevant committees fully and currently informed of U.S.-Saudi negotiations. State officials stated that they consistently provide information to Congress, but the limited information they provided to us does not support this position. As previously stated, section 123 of the AEA requires that the President keep certain congressional committees “fully and currently informed of any initiative or negotiations relating to a new or amended agreement for peaceful nuclear cooperation.” State officials told us during our May 2019 interview that they consistently provided information to Congress on the nuclear cooperation negotiations and other interactions with Saudi Arabia. However, neither State nor DOE provided documentation within the time frame of our review to support these statements. DOE did not respond to our request for information on any dates or related details of any congressional briefings related to U.S.- Saudi nuclear cooperation negotiations. State did not respond to our initial request in May 2019 for information on dates and related details of any congressional briefings it held on U.S.-Saudi nuclear cooperation negotiations. However, in January 2020, after reviewing a preliminary draft of this report, State officials provided a list of congressional briefings on U.S. nuclear cooperation initiatives since 2013. We reviewed this list and identified two briefings specifically focused on nuclear cooperation negotiations with Saudi Arabia: one held in January 2018 for House Committee on Foreign Affairs staff and another held in May 2019 for House Committee on Oversight and Reform staff. State officials also noted that U.S.-Saudi nuclear cooperation may have been discussed in other State briefings that focused on nuclear cooperation in general or with other countries, such as briefings to the House Committee on Foreign Affairs and Senate Committee on Foreign Relations in July 2019 and November 2019. State officials declined to discuss the details of any congressional briefings with us, including the participating agencies, substantive issues, and other details. Consequently, we could not establish the extent and substance of information the agencies provided to Congress on U.S.-Saudi nuclear cooperation negotiations. After State did not provide us with the information we requested, we reached out to a number of current and former staff of the House Committee on Foreign Affairs and Senate Committee on Foreign Relations, representing both parties. Through our interviews with eight of these staff, we were able to identify one congressional briefing by the agencies in December 2017 on the status of U.S.-Saudi nuclear cooperation negotiations. However, based on our interviews with congressional staff, we were unable to identify the dates of any other briefings by the agencies on the U.S.-Saudi nuclear cooperation negotiations. Notably, based on our review of the documentation and interviews with congressional staff, it does not appear that the agencies provided a briefing to the House Committee on Foreign Affairs or Senate Committee on Foreign Relations until more than a year after the last formal U.S.-Saudi nuclear cooperation negotiations in March 2018. Current and former congressional staff we interviewed also described their frustration in trying to obtain information, beyond briefings, from the agencies on the status of the negotiations. Several current and former congressional committee staff we interviewed told us that they learned of developments in the U.S.-Saudi negotiations through the press or from representatives of the nuclear industry, rather than directly from the agencies, despite having asked the executive branch to keep them informed of any developments. For example, one former staff member of a relevant committee told us that they learned of the March 2018 formal negotiations just days before the meeting through a press article. Another former congressional committee staff member said that since late 2017, the agencies have only provided information to Congress about the negotiations in response to forceful measures, such as holds on nominations or legislation. According to many of the current and former congressional staff we interviewed, this stands in contrast to past practice in which agencies regularly briefed the committees on nuclear cooperation negotiations without coercion, and sometimes even initiated the meetings. State and DOE provided Congress with contradictory justifications for not providing such information to Congress, according to our review of documents and interviews with congressional staff. For example, one congressional committee staff member told us that agency officials said they were not obligated to keep the committee currently and fully informed of negotiations because the United States was not in negotiations with Saudi Arabia. On another occasion, when pressed by members of Congress in congressional hearings, an agency official said he could not discuss nuclear cooperation negotiations with Saudi Arabia because negotiations were ongoing. Specifically, in September 2019, the Assistant Secretary of State for International Security and Nonproliferation stated in a hearing that he could not get into details of nuclear cooperation negotiations with Saudi Arabia because the negotiations were ongoing. These contradictory justifications may have led to inconsistency in the agencies providing information to Congress on nuclear cooperation negotiations. By committing to regularly scheduled, substantive briefings to Congress on nuclear cooperation initiatives and negotiations, State and DOE could enhance transparency and build confidence with Congress on nuclear cooperation, preemptively address congressional concerns about cooperation with certain countries, and support congressional oversight on nonproliferation matters. Former congressional staff, including those involved in drafting Section 123(e) in 2008—the “fully and currently informed” provision—said the intent of the provision was to promote transparency on the status of any nuclear cooperation negotiations to the congressional committees of jurisdiction to lay the groundwork for congressional consideration of any agreement. However, some former congressional staff said that the provision allows for broad interpretation and that it may be up to Congress to more clearly define the “fully and currently informed” requirement. By specifying, through an amendment to the AEA, its expectations for timeliness and information provided by the agencies on nuclear cooperation negotiations and initiatives, Congress could have better assurance that it will get the information it needs for its oversight of nuclear nonproliferation matters. State officials told us that they consistently provided information to Congress on the nuclear cooperation negotiations and other interactions with Saudi Arabia. They later provided a list of congressional briefings on U.S. nuclear cooperation initiatives since 2013 but did not specify what was discussed. Based on this limited information, it is unclear whether the briefings by State kept Congress fully and currently informed of developments in the negotiations with Saudi Arabia, and congressional staff provided us with examples of having to find information on the negotiations from other sources, such as press articles. NNSA is a separately organized agency within the Department of Energy, with responsibility for its nuclear weapons and nonproliferation programs, among other things. transparency and build confidence with Congress on nuclear cooperation, preemptively address concerns about cooperation with certain countries, and support congressional oversight on nuclear nonproliferation matters. Former congressional staff involved in drafting the “fully and currently informed” provision said that its intent was to promote transparency and lay the groundwork for congressional consideration of any agreement. However, some said that this provision allows for broad interpretation of the “fully and currently informed” requirement. By specifying, through an amendment to the AEA, its expectations for timeliness and information provided by the agencies regarding nuclear cooperation negotiations and initiatives, Congress could have better assurance that it will get the information it needs for its oversight of nuclear nonproliferation matters. Congress should consider amending the Atomic Energy Act to require regularly scheduled briefings, for instance, on a quarterly basis, and specify expectations for the content of such briefings, such as potential difficulties in negotiating nonproliferation conditions with partner countries. The Secretary of State, in coordination with the Secretary of Energy, should commit to regularly scheduled, substantive briefings for the House Committee on Foreign Affairs and the Senate Committee on Foreign Relations on all initiatives and negotiations related to nuclear cooperation in order to enhance transparency and establish greater confidence with Congress on nuclear cooperation matters. (Recommendation 1) We provided a draft of this report to the Secretaries of State, Energy, Defense, and Commerce, and to the Chairman of the NRC for review and comment. In its written comments, reproduced in appendix III, State neither agreed nor disagreed with our findings, and concurred with our recommendation. State also noted in its response that it is already implementing the recommendation; specifically, that it conducted briefings on nuclear cooperation in 2018 and 2019 to Congress. However, as we noted in our report, because State officials declined to discuss the details of these briefings, we could not establish the extent and substance of information the agencies provided to Congress on U.S.-Saudi nuclear cooperation negotiations. Furthermore, as we reported, staff of the relevant congressional committees we interviewed were able to identify only one briefing on U.S.-Saudi nuclear negotiations and several staff expressed frustration in trying to get information about the negotiations, including learning of developments through the press. NRC also provided written comments, which are reproduced in appendix IV; NRC neither agreed nor disagreed with our recommendation. DOE provided technical comments, which we incorporated as appropriate. DOD and Commerce did not have any comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of State, the Secretary of Energy, the Secretary of Defense, the Secretary of Commerce, the Chairman of the Nuclear Regulatory Commission, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. NNSA is a separately organized agency within the Department of Energy, with responsibility for its nuclear weapons and nonproliferation programs, among other things. Saudi nuclear cooperation negotiations and any areas of disagreement, we also reviewed official documentation such as agency correspondence to Saudi officials and transcripts of congressional hearings. In addition, we submitted to the Saudi Ambassador to the United States a written request for an opportunity to interview relevant Saudi officials about the negotiations, but did not receive a response. To examine U.S. agency management of the negotiations, including how the agencies have informed Congress about the negotiations, we reviewed official documentation such as agency correspondence to Saudi officials, certain export authorization application packages, dates of congressional briefings on nuclear cooperation, and agency documentation related to U.S. government advocacy for U.S. businesses related to nuclear cooperation with Saudi Arabia. We also requested a list of dates and participants of U.S.-Saudi interactions pertaining to nuclear cooperation, as well as materials used for briefings, if any, by the agencies to Congress. The agencies provided us with limited information in response to some categories we requested and did not provide information in other categories. Specifically, beginning in May 2019, we requested from the Departments of State and Energy and the National Security Council (NSC) basic factual information on license applications for the transfer of nuclear technology to Saudi Arabia; the dates of any discussions or negotiations between U.S. and Saudi officials; the U.S. and Saudi agencies, offices, and representatives present at such meetings; and the types of records produced from such meetings. DOE provided us with information on the license applications, and State and DOE provided us with limited information on their general processes relating to the negotiation of agreements. State officials also provided a list of congressional briefings on U.S. nuclear cooperation initiatives since 2013 in January 2020, after reviewing a preliminary draft of this report, but declined to discuss the details of the briefings with us, including the participating agencies, substantive issues, and other details that would have allowed us to establish the extent of information provided to Congress on U.S.-Saudi nuclear cooperation negotiations. Furthermore, neither agency nor NSC provided substantive information in any of the other categories we requested; in order to complete this review within a time frame responsive to the needs of our congressional requesters, we adjusted our audit objectives to focus on examining the status of the negotiations and management of the negotiations process. Because State, NSC, and DOE did not provide information to fully address these adjusted objectives, we obtained documentation and information from other agency officials and over 30 other stakeholders, including, as previously noted, former senior U.S. government officials, current and former congressional staff, and nuclear industry representatives and knowledgeable nongovernmental experts who have followed the negotiations. We conducted our work from April 2019 through April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Since the United States and Saudi Arabia signed a memorandum of understanding on nuclear energy cooperation in 2008, there have been a variety of interactions between the United Sates and Saudi Arabia regarding potential nuclear cooperation between both countries, as well as other developments related to such cooperation. The Atomic Energy Act (AEA) does not define “negotiations.” In this report, we use “formal nuclear cooperation negotiations” and “formal negotiations” to signify sessions where parties aim to agree on specific terms and conditions in the text of an agreement. We use the term “interactions” for all U.S.-Saudi encounters on potential nuclear cooperation other than the two formal negotiations explicitly identified by agency officials. Table 3 provides information on dates we identified of formal U.S.-Saudi negotiations; other U.S.-Saudi interactions; National Security Council meetings to discuss policy and related matters on U.S.-Saudi negotiations; agency briefings to Congress on the negotiations; and other related developments, including developments in Saudi Arabia related to its planned nuclear power program. See table 3 for more information. In addition to the individual named above, other key contributors to this report were William Hoehn, Assistant Director; Alisa Beyninson, Analyst in Charge; Antoinette Capaccio; Tara Congdon; Camille Pease; Steven Putansu; Dan Royer; Sara Sullivan; and Madeline Welter.", "summary": "U.S. policy has long sought to balance U.S. civilian nuclear exports with the nation's obligation to ensure that they are not used to proliferate nuclear weapons. The Atomic Energy Act (AEA) provides a framework for certain civilian nuclear exports and outlines the requirements for nuclear cooperation agreements, including that certain nonproliferation conditions be met; that State conduct negotiations with the technical assistance and concurrence of DOE; and that the President keep certain congressional committees fully and currently informed of negotiations or initiatives. This report describes, among other things, (1) the status of U.S.-Saudi negotiations and any areas of disagreement and (2) what is known about U.S. agency management of the negotiations. GAO reviewed the AEA and documentation of interactions between U.S. and Saudi officials regarding nuclear cooperation. GAO received limited information from State and DOE officials during the review but interviewed over 30 other stakeholders, including former senior executive branch officials, former congressional staff, and others with knowledge of and insights into nuclear cooperation issues and the negotiations. Since 2008, when the United States and Saudi Arabia signed a memorandum of understanding on nuclear energy cooperation, the current and prior U.S. administrations have engaged in discussions and negotiations about nuclear cooperation with the Saudi government. However, these negotiations are stalled; the two countries have not been able to resolve disagreements on several nonproliferation conditions, including Saudi Arabia agreeing to enrichment and reprocessing restrictions and signing an Additional Protocol with the International Atomic Energy Agency (IAEA), which would allow IAEA to obtain additional information about and access to Saudi nuclear activities. U.S. agency management of the negotiations with Saudi Arabia remains unclear in two areas regarding AEA requirements—(1) that the Department of State (State) conduct negotiations, with the technical assistance and concurrence of the Department of Energy (DOE), and (2) that certain congressional committees be informed. First, it is unclear which U.S. agencies were present at or aware of various interactions where nuclear cooperation was or may have been discussed, except for the formal negotiations in 2012 and 2018 and a commercial mission coordinated with State. GAO was able to identify eight interactions where nuclear cooperation was discussed and five more interactions where nuclear cooperation may have been discussed (see figure). Note: Interactions depicted in this figure include meetings, phone calls, and a letter, among other things. Second, GAO was unable to determine whether the agencies kept the committees fully and currently informed. GAO identified two briefings on the negotiations—in December 2017 and January 2018—to the relevant committees, but it does not appear that these committees were briefed until more than a year after the March 2018 formal negotiations. According to congressional staff, Congress on occasion learned of developments through non-agency sources and had to apply forceful measures, including holds on nominations, to get information from the executive branch. By committing to regular briefings to Congress on nuclear cooperation negotiations and initiatives, State could better support congressional oversight on nuclear nonproliferation matters. In addition, congressional staff have said the AEA allows for broad interpretation of the “fully and currently informed” requirement. By specifying, through an amendment to the AEA, its expectations for timeliness and information provided by the agencies on nuclear cooperation negotiations and initiatives, Congress could have better assurance that it receives the information it needs for oversight of nuclear nonproliferation matters. GAO believes that Congress should consider amending the Atomic Energy Act to require regularly scheduled briefings. GAO is also making a recommendation that the Secretary of State commit to regularly scheduled, substantive briefings to the relevant congressional committees. State concurred with our recommendation.", "document_type": "gao"}
{"report": "In 2014, Congress issued two separate mandates to DOT to develop strategies related to challenges facing the U.S.-flag fleet, specifically: The Secretary of Transportation was directed to develop a national maritime strategy with recommendations to, among other things, help U.S.-flag vessels remain competitive. The Secretary of Transportation and the Maritime Administration (MARAD) within DOT were directed to develop, in collaboration with DOD, a national sealift strategy to ensure the long-term viability of U.S.-flag vessels and U.S.-citizen mariners. As we reported in August 2018, according to MARAD and DOD officials, MARAD has been working on a single draft maritime strategy to meet both mandates because the broader national maritime strategy would need to encompass the national sealift strategy, as well. While there is no statutory deadline for the completion of the national sealift strategy, in the John S. McCain National Defense Authorization Act for Fiscal Year 2019, the statutory deadline for the national maritime strategy was extended from February 2015 to February 2020. In our August 2018 report, we noted that MARAD officials had completed a draft strategy in 2016, but they told us that the strategy was subject to the new administration’s review. At that time, MARAD and DOT officials told us that they viewed the existing draft strategy as pre-decisional and could provide no timeline for when they planned to move the strategy forward. In our report, we concluded that the delay in submitting the strategy to Congress had resulted in decision-makers not having the information they needed and recommendations from the agency to inform policy-making in this area. We recommended that DOT complete the national maritime strategy and establish time frames for its issuance. DOT concurred with our recommendation. In our recent discussions with DOT officials after passage of the John S. McCain National Defense Authorization Act for Fiscal Year 2019, they told us that DOT now plans to meet the new statutory deadline and issue the strategy by February 2020. Stakeholders we spoke with for our August 2018 report identified two primary challenges to ensuring that the U.S.-flag fleet would continue to meet DOD’s national defense needs. First, they described maintaining the financial viability of U.S.-flag vessels participating in MSP as a challenge. Second, stakeholders identified a potential shortage of U.S. citizen mariners available to crew the government-owned reserve fleet during a military activation as a challenge, in part due to the declining numbers of U.S.-flag vessels that employ these mariners. In our August report, we noted that MARAD had identified some options to address the competitiveness of U.S.-flag vessels and the long-term viability of the U.S.-citizen mariners—issues that are very similar to the key challenges identified by stakeholders. However, DOT and MARAD officials had stated that they were not yet ready to address the feasibility of these options, or formally propose them. According to MARAD officials, the relative cost of operating a U.S.-flag vessel compared to a foreign-flag vessel has increased in recent years, making it more challenging for vessel operators to remain economically viable under the U.S. flag. In our August report we found that financial support to U.S.-flag vessels through both the MSP stipend and the government cargo preference requirements has helped ensure a sufficient number of internationally trading U.S.-flag vessels are available to meet DOD’s most recently stated cargo capacity needs from such vessels. On the other hand, according to MARAD officials, the additional cost of operating a U.S. flag vessel compared to a foreign-flag vessel has increased—from about $4.9 million annually in 2009 and 2010 to about $6.2 to $6.5 million currently—making it harder for such vessels to remain financially viable. This cost differential results primarily from the rising relative costs of employing U.S. versus foreign mariners as crew. Compounding the increasing costs of operating U.S. flag vessels, the volume of government cargo—a key source of revenue for many U.S.- flagged vessels—has fallen in recent years as the international military presence of the United States and funding for food aid overseas have both declined. In response to these challenges, Congress increased the MSP stipend from $3.5 million to $4.99 million per vessel from fiscal year 2016 to 2017. MARAD officials said this increase has temporarily stabilized the financial situation of MSP vessel operators. However, they added that trends in operating costs and government cargo suggest that the ability to retain an adequate number of financially-viable U.S.-flagged vessels will remain an ongoing challenge. MARAD officials identified the following options as having potential to reduce the costs of operating a U.S.-flag vessel—which would in turn make U.S.-flag vessels more competitive in the international cargo market: MARAD is part of a U.S. Registry Working Group looking at a range of actions to decrease the time and cost of bringing vessels under the U.S. flag, including the cost of meeting Coast Guard requirements. For example, the group is looking at a recommendation for the broader application of internationally recognized vessel standards to U.S.-flag vessels to meet Coast Guard requirements. In the current strategic plan for 2017 through 2021, MARAD identified two areas of reform—mariner income-tax relief and liability insurance reform—that could reduce the crew costs of operating under a U.S. flag. According to MARAD officials, some stakeholders have recommended that MARAD consider requesting the elimination of a tax on U.S.-flag vessels receiving maintenance overseas to reduce maintenance costs for U.S.-flag vessels. In general, maintenance and repairs on U.S.-flag vessels not conducted at U.S. shipyards are subject to a statutory 50 percent ad valorem tax on the cost of maintenance performed in a foreign country. According to 12 of the 14 MSP vessel operators we spoke with for our August report, U.S. shipyards are typically more expensive than foreign shipyards or may not be close to the vessel’s location or route, so they typically choose to pay the tax and have the maintenance performed overseas. Four MSP vessel operators we spoke to stated that they send U.S.-flag vessels to U.S. shipyards for maintenance when it makes sense from a logistical and financial perspective. MARAD officials we spoke to said they are considering the effect of eliminating the tax, a step that would reduce costs for vessel operators but would potentially negatively affect the financial viability of U.S. shipyards, which the law was designed to assist. However, MARAD officials stated that they have not yet evaluated these trade-offs. MARAD and DOD’s Transportation Command (Transportation Command) officials have also identified—but not officially proposed—several options to address the decline in government cargo carried on U.S.-flag vessels, which would also make U.S.-flag vessels more competitive by providing more revenues. In our August 2018 report, Transportation Command officials and ship operators to whom we spoke told us that they consider access to U.S. government cargo to be a critical means of sustaining U.S.-flag vessels. Transportation Command and MARAD officials stated that one way to increase the amount of commercial cargo on U.S.-flag vessels would be to require that certain energy export commodities, such as oil or liquefied natural gas, be carried on U.S.-flag vessels. While this option has been considered in the past, it would require new legislation and would potentially have a negative impact on the export market for liquefied natural gas. In 2015, we analyzed the potential effects of a requirement that U.S. liquefied natural gas exports be carried on U.S.- built and -flagged vessels. We found that such a requirement could potentially increase the number of U.S.-flag vessels by 100 over the course of many years; however, due to their higher operating costs, this would increase the cost of transporting liquefied natural gas from the United States, decrease the competitiveness of U.S. liquefied natural gas in the world market, and in turn, reduce demand for U.S. liquefied natural gas. MARAD officials stated that another option would be increasing the percentage of other cargo, such as food aid, that civilian agencies are required to transport on U.S.-flag vessels. This would also require an amendment to existing legislation and would also have trade-offs, since cargo requirements such as these can result in higher shipping costs that can negatively affect the missions of civilian agencies, in particular food aid agencies. Another option identified by MARAD officials to address declining government cargo volumes would be to increase the MSP stipend to replace some of the government support previously provided through cargo preference requirements, as was done for fiscal year 2017. The second challenge identified by stakeholders related to maintaining adequate sealift for defense needs is the potential shortage of U.S.- citizen mariners available to crew the government-owned reserve fleet during a crisis. The government’s reserve fleet vessels are held in reduced operating status with minimal crew in peacetime. When put into full operating status—such as for a surge related to a wartime effort— these vessels need additional crew, and DOD counts on mariners working on oceangoing U.S.-flag vessels to meet this need. MARAD and DOD have raised concerns about the sufficiency of U.S.-citizen mariners to meet this need. For example, in January 2018, in a statutorily mandated report, MARAD’s Maritime Workforce Working Group estimated a shortage of over 1,800 mariners in the case of a drawn-out military effort, although it also recommended data improvements to increase the accuracy of the count of available mariners. Specifically, in this report, the working group estimated approximately 11,768 qualified and available U.S.-citizen mariners as of June 2017— 1,839 less than the 13,607 mariners the working group estimates would be needed for sustained operation of the reserve and commercial fleet. The working group based its identification of 11,768 existing qualified U.S.-citizen mariners on the number of U.S.-citizen mariners actively sailing on U.S.-flag commercial and government-owned oceangoing vessels. For the vessels in full operating status, the working group accounted for 2 mariners employed for each crew position. The double crew, which according to MARAD officials is typical for a commercial U.S.-flag vessel operating in international trade, allows each mariner, over the course of a year, to work for 6 months on the vessel and take 6 months of earned leave. The working group assumed that during a military activation, commercial operations would continue at the same level as during peacetime—but that some U.S-citizen mariners currently working on commercial vessels would be willing to reduce the amount of earned leave they took in order to work on government-owned reserve vessels. The working group analyzed this scenario by changing the ratio of crew positions to crew from 2 to 1.75. As illustrated in figure 1, under this scenario, with an average of 26 crew positions per vessel, between 6 and 7 mariners per existing commercial oceangoing U.S.-flag vessel are made available to crew the reserve fleet. According to the working group’s methodology, given the size of the current U.S.-flag oceangoing fleet and the number of currently employed mariners on this fleet, there are enough U.S.-citizen mariners to crew the reserve fleet during an initial surge, but not for a sustained activation, during which the working group estimated that the reserve vessels themselves would need a double crew to allow for crew rotations. This need for crew rotations on the reserve vessels led the working group to estimate a shortage of 1,839 U.S.-citizen mariners. Moreover, the working group’s report found that the shortage of mariners may be understated if some of the estimated available mariners are unable or unwilling to continue sailing during times of national emergency, as available mariners are not required to crew the reserve fleet. Although the working group concluded that there is a shortage of mariners for sustained operations, its report also details data limitations that cause some uncertainty regarding the actual number of existing qualified mariners and, thus, the extent of this shortage. The working group’s approach—driven, in part, by limitations of the U.S. Coast Guard’s database that tracks mariner credentials—did not count any qualified mariners who are no longer employed on U.S.-flag oceangoing vessels or who are employed on other types of vessels but may have the required credentials. In fact, according to the working group’s analysis, over 15,000 mariners listed in the U.S. Coast Guard’s database have unlimited credentials but are unaccounted for, as they are neither currently employed on large, oceangoing vessels nor serving as civil- service mariners committed to government-owned vessels. The working group stated that the availability and continuing proficiency of these mariners remains unknown. MARAD officials emphasized to us, however, that mariners who have not worked on the right types of vessels for more than 18 months are likely to need additional training before they would be qualified to crew the reserve fleet during a military activation. The working group’s report contains several recommendations related to improving information on the number of available and willing mariners. These recommendations include replacing the Coast Guard database with one that would enable a more accurate account of available mariners, and establishing a periodic survey of the U.S.-citizen mariner pool to allow MARAD to determine, with reasonable certainty, how many qualified mariners would be available and willing to sail on U.S.- government reserve vessels if called upon to do so. The report concluded that until these agencies improve the tracking of licensed mariners who may be available to crew the government-owned reserve vessels when activated into full operating status, the extent to which there is a shortage of mariners for defense needs will remain unclear. The lack of information on the extent to which there is a shortage of mariners limits the U.S. government’s ability to effectively plan for such needs. In January 2018, MARAD’s administrator testified that MARAD is working with the Coast Guard and the maritime industry to better track licensed mariners who may no longer be sailing but could serve in a time of crisis, and in March 2018, MARAD officials told us they are taking steps to initiate a new survey of mariners, as recommended in the working group’s report. In its report, the working group also identified options to address the challenge of ensuring a sufficient number of U.S.-citizen mariners for defense needs. It identified two actions that could help increase the number of U.S.-citizen mariners—one focused specifically on mariners and the other focused more broadly on the merchant marine, which encompasses U.S.-flag vessels and U.S.-citizen mariners. However, the working group’s report did not discuss specific costs or trade-offs related to either action or elaborate any further on them. The report identified the following actions: MARAD should develop a broad-based reserve program that would identify and support qualified mariners willing to sail in commercial and government-owned vessels during an emergency. MARAD would provide limited financial assistance in training mariners and maintaining credentials, in turn for which mariners who participate would be obligated to sail in the event of a defense need. MARAD and other U.S. government agencies should support a healthy merchant marine (which encompasses U.S.-flag vessels and U.S.-citizen mariners). The government should fully support programs including MSP, requiring the government to ship certain cargo on U.S flag vessels, the Jones Act, and government chartering of privately owned vessels. If DOD determines that national needs require more mariners and vessels than can be provided through current programs, those programs should be expanded to meet such needs. In conclusion, the U.S.-flag fleet is increasingly facing challenges that threaten its ability to meet future defense needs. In response to congressional mandates, MARAD has been working on a national maritime strategy and plans to issue one by February 2020. However, until such a strategy is in place, decision-makers will have limited information to make important policy choices that consider all the relevant tradeoffs associated with this complex issue. Chairman Mast, Ranking Member Garamendi, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions. If you or your staff have any questions about this testimony, please contact Andrew Von Ah, Director, Physical Infrastructure, at (202) 512- 2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Alwynne Wilbur (Assistant Director), Stephanie Purcell, (Analyst in Charge), Bonnie Ho, Christopher Jones, and Amy Rosewarne. Other staff who made key contributions to the report cited in the testimony are identified in the source product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The U.S. government relies on U.S.-flag vessels to transport cargo and provide a pool of U.S.-citizen mariners who could be called upon to support defense needs in times of war or crisis. Through financial support and by requiring government agencies to ship certain cargo on U.S. flag vessels, the United States has supported the viability of the U.S.-flag fleet. However, concern has grown about the fleet's future sustainability. In 2014, Congress mandated that DOT develop national strategies to address this issue. This statement summarizes GAO's August 2018 report on challenges in sustaining the U.S. flag fleet for defense purposes and DOT's efforts to draft a national maritime strategy that addresses these challenges. Specifically, it discusses: (1) the status of the mandated national strategies and (2) challenges that stakeholders identified related to sustaining the U.S.-flag fleet and options DOT has considered for addressing them. For the August 2018 report, GAO reviewed relevant laws, regulations, reports, and studies. GAO also analyzed data on international government cargo and interviewed officials from DOT and DOD, vessel operators, and other stakeholders. For this statement, GAO spoke to DOT officials for an update on the status of the strategy. The Department of Transportation (DOT) is still finalizing the national maritime strategies that were called for in two separate mandates by Congress in 2014. According to DOT officials, DOT has been working on a single draft maritime strategy to meet both mandates. This strategy is intended to address how to make vessels registered to the United States (U.S.-flag vessels) more competitive in the international cargo market. It is also intended to address how to ensure the long-term viability of U.S.-flag vessels and U.S.-citizen mariners. The Department of Defense (DOD) counts on U.S.-citizen mariners that work on U.S.-flag vessels to crew the government-owned reserve fleet during a crisis. In an August 2018 report, GAO concluded that by not completing the strategy or establishing a timeline for completing it, DOT had delayed providing decision-makers the information they needed to address challenges facing the U.S. flag fleet. Subsequently, with the passage of the John S. McCain National Defense Authorization Act for Fiscal Year 2019, Congress extended the deadline for the strategy to February 2020. According to DOT officials, DOT will issue the strategy by the new deadline. Stakeholders GAO spoke with for its August 2018 report identified two primary challenges to ensuring that the U.S.-flag fleet would continue to meet DOD's national defense needs: (1) maintaining the financial viability of the U.S.-flag fleet, which is threatened by the increasingly higher costs of operating U.S. vessels compared to foreign flag vessels and a decrease in government cargo being shipped internationally; and (2) a potential shortage of U.S. citizen mariners available to support defense needs, in part due to the declining numbers of U.S.-flag vessels that employ these mariners. For example, the number of U.S. flag vessels involved in international trade declined from 199 vessels at the end of 1990 to just 82 vessels by the end of 2017. DOT officials have identified some options to make U.S.-flag vessels more competitive, increase the amount of commercial cargo on U.S. flag vessels, and address a potential shortage of U.S.-citizen mariners, although they are not ready to assess their feasibility or formally propose these options. To address the challenge of maintaining the financial viability of U.S.-flag vessels, DOT has identified options such as changing regulations to decrease the costs of bringing a ship under the U.S. flag and requiring that certain energy export commodities, such as oil or liquefied natural gas, be carried on U.S.-flag vessels. To address the potential shortage of U.S.-citizen mariners, DOT convened a working group to determine how many mariners would be needed to meet defense needs. The working group estimated a shortage of over 1,800 U.S.-citizen mariners in the event of a sustained military activation, although it also recommended data improvements to increase the accuracy of the count of available mariners. In addition, the working group identified two actions that could help increase the number of U.S.-citizen mariners: (1) developing a reserve program to identify and support qualified mariners willing to sail to support defense needs during an emergency and (2) expanding programs and requirements that support U.S.-citizen mariners, such as requirements that government agencies must ship certain cargo on U.S. flag vessels. In the August 2018 report, GAO recommended that DOT complete the national maritime strategy and establish time frames for its issuance. DOT concurred with the recommendation.", "document_type": "gao"}
{"report": "SBA has not fully addressed deficiencies we have previously identified for the WOSB program, and these deficiencies are affected by SBA’s ongoing implementation of changes to the program authorized by the National Defense Authorization Act of 2015 (2015 NDAA). As of early June 2019, SBA had implemented one of the three changes to the program authorized in the 2015 NDAA. Specifically, in September 2015 SBA published a final rule to implement sole-source authority (to award contracts without competition), effective October 2015. The two other changes—authorizing SBA to implement its own certification process for WOSBs and requiring SBA to eliminate the option for firms to self-certify that they are eligible for the WOSB program—had not been implemented. On May 14, 2019, SBA published in the Federal Register a proposed rule that eliminates the self-certification option and describes a potential certification process to be administered by SBA. SBA officials have stated that the agency will not eliminate self-certification until the new certification process for the WOSB program is in place, which they expect to implement by June 2021. In addition, SBA has not fully addressed WOSB program oversight deficiencies described in our March 2019 report and first identified in our 2014 report. We reported that SBA did not have formal policies for reviewing the performance of its four approved third-party certifiers (private entities approved by SBA to certify the eligibility of WOSB firms), including their compliance with their agreements with SBA. Further, we found that SBA had not developed formal policies and procedures for, among other things, reviewing the monthly reports that certifiers submit to SBA. We recommended that the Administrator of SBA establish comprehensive procedures to monitor and assess the performance of the third-party certifiers in accordance with their agreements with SBA and program regulations. While SBA has taken some steps to address our recommendation, including conducting a compliance review of the certifiers in 2016, SBA officials said in June 2018 that SBA had no plans to conduct further compliance reviews until the final rule implementing the new certification process was completed. By waiting to improve its oversight of the WOSB program, SBA cannot provide reasonable assurance that certifiers are complying with program requirements and cannot improve its efforts to identify ineligible firms or potential fraud. In addition, the implementation of sole-source authority in light of these continued oversight deficiencies can increase program risk. Consequently, we maintain that our recommendation should be addressed. SBA also has not fully addressed deficiencies related to eligibility examinations that we described in our March 2019 report and first identified in our October 2014 report. We found that SBA lacked formalized guidance for its eligibility examination processes and that the examinations identified high rates of potentially ineligible businesses. As a result, we recommended that SBA enhance its examination of businesses that register for the WOSB program to ensure that only eligible businesses obtain WOSB set-asides. Specifically, we suggested that SBA should take actions such as (1) completing the development of procedures to conduct annual eligibility examinations and implementing such procedures; (2) analyzing examination results and individual businesses found to be ineligible to better understand the cause of the high rate of ineligibility in annual reviews and determine what actions are needed to address the causes, and (3) implementing ongoing reviews of a sample of all businesses that have represented their eligibility to participate in the program. SBA has taken some steps to implement our recommendation, such as including written policies and procedures for WOSB program eligibility examinations in a standard operating procedure and a Desk Guide. However, SBA does not collect reliable information on the results of its annual eligibility examinations. In addition, SBA continues to have no mechanism to look across examinations for common eligibility issues to inform the WOSB program. As we noted in 2014, by not analyzing examination results broadly, the agency is missing opportunities to obtain meaningful insights into the program, such as the reasons many businesses are deemed ineligible. Further, SBA still conducts eligibility examinations only of firms that have already received a WOSB award. Restricting the samples in this way limits SBA’s ability to better understand the eligibility of businesses before they apply for and are awarded contracts, as well as its ability to detect and prevent potential fraud. We recognize that SBA has made some effort to address our recommendation by documenting procedures for conducting annual eligibility examinations of WOSB firms. However, without maintaining reliable information on the results of eligibility examinations, developing procedures for analyzing results, and expanding the sample of businesses to be examined to include those that did not receive contracts, SBA limits the value of its eligibility examinations and its ability to reduce ineligibility among businesses registered to participate in the WOSB program. Leading fraud risk management practices state that federal program managers should design control activities that focus on fraud prevention over detection and response, to the extent possible. The deficiencies in SBA’s oversight of the WOSB program limit SBA’s ability to identify potential fraud risks and develop any additional control activities needed to address these risks. As a result, the program may continue to be exposed to the risk of ineligible businesses receiving set- aside contracts. In addition, in light of these continued deficiencies, the implementation of sole-source authority without addressing the other changes made by the 2015 NDAA could increase program risk. For these reasons, we maintain that our previous recommendation that SBA enhance its WOSB eligibility examination procedures should be addressed. In addition, similar to previous findings from SBA’s Office of Inspector General, our March 2019 report found that about 3.5 percent of contracts using a WOSB set-aside were awarded for ineligible goods or services from April 2011 through June 2018. At that time, SBA was not reviewing contracting data that could identify this problem and inform SBA which agencies making awards may need targeted outreach or training. As a result, we found that SBA could not provide reasonable assurance that WOSB program requirements were being met and that the program was meeting its goals. We recommended that SBA develop a process for periodically reviewing the extent to which WOSB program set-asides are awarded for ineligible goods or services and use the results to address identified issues, such as through targeted outreach or training to agencies making awards under the ineligible codes. In early May 2019, SBA said that it had initiated such efforts. In September 2018, we found that although SBA had adopted criteria and guidance for a risk-based approach to certifying and recertifying firms for the HUBZone program in March 2017, the extent to which it conducted a risk assessment to inform its approach was unclear. In 2015, we found that SBA lacked key controls for its recertification process and recommended that SBA assess the process. In 2009, SBA increased documentation requirements for certification but not recertification (which determines continued program eligibility every 3 years). In March 2017, SBA changed its recertification criteria and guidance to require firms with $1 million or more in HUBZone contract awards to provide documentation to support continuing eligibility. During our work for the September 2018 report, SBA officials stated they had completed a risk assessment of the HUBZone recertification process, but did not provide us with documentation on when they performed the risk assessment, which risks were identified and considered, or what analysis established the $1 million threshold. As of May 2019, SBA had not provided documentation showing that it had performed the risk assessment, but we maintain that an assessment of the recertification process would help inform a risk- based approach to reviewing and verifying information from firms that appear to pose the most risk to the program. In addition, SBA had not provided documentation showing that a technology-based solution designed to address some of the ongoing challenges with the recertification process had been implemented. SBA officials had previously estimated this solution would be available first in spring 2017 and then by the end of calendar year 2017. We also found in our September 2018 report that, based on our review of case files for a nongeneralizable sample of 12 firms in Puerto Rico that received HUBZone certification between March 2017 and March 2018, SBA did not consistently document or follow its policies and procedures for certification reviews: SBA did not have complete documentation in nine of 12 cases. SBA officials described alternative procedures they used to determine firms’ eligibility, but SBA had not updated its internal policy manuals to reflect these procedures, and analysts did not document use of such procedures in the files we reviewed. As a result, SBA did not have reasonable assurance that firms met HUBZone criteria. In four of 12 cases, SBA did not follow its policy to conduct three levels of review (by an analyst, a senior analyst, and the program director or deputy) when determining whether to approve or deny a firm. It was unclear to what extent SBA reviewed staff compliance with certification and recertification review procedures. SBA provided an assurance letter stating that it evaluated the Office of HUBZone’s internal controls and concluded the controls were effective, but the letter did not specify what steps SBA took for the evaluation. We recommended that SBA (1) update its internal policy manuals for certification and recertification reviews to reflect existing policies and procedures not currently in written guidance and (2) conduct and document reviews of staff compliance with procedures associated with HUBZone certification and recertification. In response to our report, SBA said that it planned to update its internal policies on certification and recertification by issuing a procedural notice and to begin reviewing and documenting staff compliance with the updated procedures outlined in the notice. However, as of May 2019, SBA had not provided documentation showing that it had completed these planned actions. In September 2018, we found that for fiscal year 2017, SBA revised the methodology for its Small Business Procurement Scorecard, which is used to assess federal agencies’ progress toward small business procurement goals. SBA made revisions to address requirements specified in the National Defense Authorization Act for Fiscal Year 2016. SBA (1) reduced the share of the total scorecard grade devoted to prime contracting achievement, which is the dollar amount of contracts awarded directly to small businesses, and (2) added an element calculating changes in the number of small businesses receiving prime contracts. SBA made two additional revisions—with input from other agencies’ representatives—to increase the share of subcontracting achievement results and the share of the peer review of required activities designed to facilitate small business procurement. In July 2018, officials said they had begun developing a plan to evaluate the effects of the revised scorecard methodology but did not provide a draft plan. Conducting a well-designed and comprehensive evaluation could aid SBA in determining whether the scorecard is an effective tool for helping to achieve the agency’s strategic goals. In our September 2018 report, we also found that the published fiscal year 2017 scorecards originally contained errors, including an incorrect grade and numeric score for one agency, and SBA does not have a process to ensure that scorecard results are published accurately. Although SBA later corrected the errors, it did not initially document that scorecards had been changed, which is inconsistent with SBA’s policy on information quality. SBA officials said that errors occurred in the process of formatting scorecards for publication. Errors in the published scorecards—and the initial lack of disclosure about corrections—weaken data reliability and may undermine confidence in scorecard data. We recommended that SBA (1) design and implement a comprehensive evaluation to assess scorecard revisions and (2) institute a process for reviewing scorecards for accuracy prior to publication and a mechanism for disclosing corrected information. Since our report, SBA has proposed a two-phase program evaluation of the scorecard. SBA officials said that they plan for phase one to include a report to Congress on the impact of the small business procurement goal program for Chief Financial Officers Act agencies and to provide a recommendation on continuing, modifying, expanding, or terminating the scorecard program. SBA plans to provide the phase one report in September 2019. In phase two, SBA plans to conduct a program evaluation that investigates the effectiveness of the small business contracting scorecard on federal agency small business contracting goal achievement. SBA has not provided a time frame for phase two. With respect to the second recommendation, SBA officials said that SBA has developed a procedure that includes a prepublication review process for procurement scorecards. The officials said the procedure identifies responsibilities, provides for an independent peer review, and includes supervisory review. Officials said the procedure also includes measures for post-publication review and corrections. We will review supporting documentation for this new procedure to assess whether this recommendation can be closed as implemented. Chairman Rubio, Ranking Member Cardin, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact William Shear, Director, Financial Markets and Community Investment at (202) 512-8678 or shearw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Andrew Pauline (Assistant Director), Paige Smith (Assistant Director), Winnie Tsen (Assistant Director), and Jennifer Schwartz. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal agencies conduct a variety of procurements that are reserved for small business participation through small business set-asides. These set-asides can be for small businesses in general, or they can be specific to small businesses that meet additional eligibility requirements in programs such as those for WOSB or HUBZone. SBA administers both the WOSB and HUBZone programs. SBA also produces an annual Small Business Procurement Scorecard to measure how much contracted spending federal agencies allocate to small businesses and whether the federal government is meeting its goals for awarding contracts to small businesses. GAO issued three reports between September 2018 and March 2019 on SBA contracting programs (see GAO-18-666 , GAO-18-672 , and GAO-19-168). This testimony is primarily based on these three reports and discusses prior GAO findings and SBA's progress on implementing GAO's recommendations on (1) the WOSB program, (2) the HUBZone program, and (3) SBA's procurement scorecard. To update the status of prior recommendations, GAO reviewed updates from SBA and interviewed officials. The Small Business Administration (SBA) has not fully implemented GAO's prior recommendations to address oversight deficiencies in the Women-Owned Small Business (WOSB) and Historically Underutilized Business Zone (HUBZone) programs and to improve evaluation of its procurement scorecard. GAO maintains that its recommendations should be addressed. Women-Owned Small Business Program. In its March 2019 report, GAO found that SBA had not addressed WOSB program oversight deficiencies identified in GAO's 2014 report (GAO-15-54). For example, GAO had found that SBA did not have procedures related to reviewing the performance of the four third-party certifers—private entities approved by SBA to certify the eligibility of WOSB firms—as well as information the certifiiers submitted to SBA. GAO recommended that SBA establish procedures to assess the performance of the certifiers and the information they submitted. While SBA conducted a compliance review of the certifiers in 2016, SBA said in June 2018 that it had no plans to conduct further compliance reviews until a final rule implementing a new certification process was completed. SBA officials said that they expected the rule to be implemented by June 2021. By waiting to improve its oversight of the WOSB program, SBA cannot provide reasonable assurance that certifiers are complying with program requirements and cannot improve its efforts to identify ineligible firms or potential fraud. HUBZone Program. In September 2018, GAO reported that it had reviewed case files for a nongeneralizable sample of 12 firms in Puerto Rico that received HUBZone certification between March 2017 and March 2018 and found that SBA did not consistently document or follow its policies and procedures for certification reviews. For example, SBA did not have complete documentation in nine of 12 cases and did not follow its policy to conduct three levels of review when determining whether to approve or deny a firm in four of 12 cases. As a result, SBA did not have reasonable assurance that firms meet HUBZone criteria. SBA said that it planned to implement GAO's recommendations that SBA (1) update internal policy manuals for certification and recertification and (2) conduct and document reviews of staff compliance with relevant procedures. However, as of May 2019, SBA had not provided documentation showing that it had completed these planned actions. Small Business Procurement Scorecard. For fiscal year 2017, SBA revised the methodology for its Small Business Procurement Scorecard, which assesses the efforts of federal agencies to support contracting with small businesses. For example, one revision reduced the share of the total scorecard grade devoted to prime contracting achievement (the dollar amount of contracts awarded directly to small businesses). GAO recommended in September 2018 that SBA design and implement a comprehensive evaluation to assess the scorecard revisions. Since that report was issued, SBA has proposed but not yet implemented a two-phase evaluation of the scorecard to include an evaluation of the scorecard's effect on federal agencies achieving small business contracting goals. SBA said that it expects to complete phase one by September 2019 and has not provided a time frame for phase two.", "document_type": "gao"}
{"report": "In June 2018, DOD’s Chief Management Officer established the Community Services Reform Task Force to perform a business case analysis to determine whether consolidating the defense resale organizations would result in efficiencies. The task force conducted its work from July 2018 through November 2018, during which it collected financial and other data from the four resale organizations and conducted workshops with subject matter experts from the resale organizations. In November 2018, the military departments were given an opportunity to review the business case analysis, provide comments, and indicate whether they concurred with the analysis. In its business case analysis, the task force recommended consolidating the four defense resale organizations into a single organization. The task force stated that consolidation would eliminate duplication that currently exists across the resale organizations and increase the competitiveness, or financial viability, of defense resale, which has seen sales declines in recent years. Specifically, the task force recommended that a single chief executive officer or director be responsible for leading the organization and report to a single board of directors. The task force also recommended that separate leadership positions for commissary operations and exchange operations be established, and that a chief administrative officer manage the business functions that are common to the current resale organizations, such as information technology (IT), human resources, marketing, and finances. Figure 1 shows the task force’s recommended organizational chart for the consolidated resale organizations. The task force estimated that the time frame for consolidating the four defense resale organizations would be 5 years for implementation, and that consolidation would result in “net savings” (i.e., estimated savings minus estimated costs) ranging from about $690 million to $1.3 billion during the first 5 years, followed by annual net savings of approximately $390 million to $670 million every year thereafter. Specifically: Estimated savings: The task force estimated that consolidating the four defense resale organizations would result in savings in three areas: (1) reduction of the cost of goods sold in the commissaries and the exchanges; (2) reduction of the cost of goods and services that are not sold but are necessary for operating stores (e.g., plastic shopping bags and custodial services); and (3) reduction of payroll costs by eliminating redundant personnel. According to the task force, consolidation would result in estimated savings of $1.4 billion to $2.1 billion over the first 5 years, followed by annual savings of $470 million to $750 million. Estimated costs: The task force estimated that consolidating the defense resale organizations would result in costs from four areas: (1) development of new, common IT systems; (2) severance pay for separating employees and retention bonuses to incentivize employees to remain; (3) operation of a transformation management office, supported by private contractors, to implement the consolidation; and (4) costs to convert DeCA to a non-appropriated fund organization. According to the task force, consolidation would result in estimated costs of $700 million to $810 million over the first 5 years, followed by annual costs of $80 million. DOD’s Chief Management Officer in March 2019 and the Deputy Secretary of Defense in August 2019 both approved the results of the business case analysis and directed that plans be made for consolidation, pending congressional action to remove the statutory prohibition on consolidating the commissary and exchange systems. The task force may have overestimated the expected savings from reducing the “cost of goods sold” (i.e., the cost of purchasing products that are resold in commissaries or exchanges) and underestimated the expected costs from IT consolidation and headquarters relocation. The task force estimated that most of the savings (i.e., about 70 percent annually) to be achieved from consolidating the four defense resale organizations would result from reducing the cost of goods sold. According to the task force’s business case analysis, retailers often pay different costs for identical products, and mergers are an opportunity for retailers to compare costs across a larger combined organization and make decisions that maximize savings. In the case of a consolidated defense resale organization, the task force stated in its business case analysis that savings could be achieved by implementing what the task force called category management reforms and by obtaining the lowest cost for identical products sold by both commissaries and exchanges. Task force officials added that one board of directors and one chief executive officer overseeing the consolidated resale organization would be more likely to achieve savings than the current, individual boards of directors and chief executive officers of the resale organizations. GAO-18-151SP. DeCA and one or more exchange organization, or Two or more of the exchange organizations (and not DeCA). In addition to overlap in identical products sold, task force officials told us that savings from category management reforms are dependent, in part, on the amount of overlap in vendors that sell products to the resale organizations. Specifically, task force officials stated that there are opportunities to reduce cost of goods sold through negotiations with vendors that sell items to both DeCA and the exchange organizations. For example, task force officials stated that the consolidated organization could negotiate better prices with a vendor that sells family-size items to DeCA and single-size items to the exchange organizations, even though those items are not identical. Industry Benchmarks The industry benchmarks used by the task force are based on proprietary data gathered and owned by Boston Consulting Group based on its experience working with mergers and category management reforms in the private sector retail industry. These benchmarks were presented as a percentage of cost of goods sold; specifically, the task force estimated that savings from obtaining the lowest cost for identical items were from 1 to 1.5 percent of the cost of goods sold, and savings from category management efforts were from 2.5 to 4 percent of the cost of goods sold. We did not review and evaluate the underlying data that were used to develop the proprietary benchmarks. Based on this information, the task force calculated the estimated savings that would result from reducing the cost of goods sold by multiplying the total cost of goods sold for all four resale organizations in fiscal year 2017 ($9.5 billion) by industry benchmarks developed by Boston Consulting Group (see sidebar for more information on these benchmarks). This calculation showed an estimated annual savings of $329 million to $517 million from reducing the cost of goods sold. However, additional information from the task force suggests this savings estimate may be overstated because there is limited overlap in the products DeCA sells (i.e., groceries and household goods) and the products the exchange organizations sell (i.e., goods and services similar to retail stores). According to the task force, about $2.2 billion of DeCA’s cost of goods sold in fiscal year 2017 were for products also sold by at least one of the exchange organizations, which is equivalent to about 23 percent of the total cost of goods sold for the four resale organizations. This differs from the data provided in the business case analysis, which stated that 62 percent of the total cost of goods sold was for identical products sold by two or more resale organizations; however, that figure also includes products sold by two or more exchange organizations and not DeCA (we further discuss product overlap among the exchange organizations below). Given the more limited product overlap between DeCA and the exchange organizations, it is unclear whether using the total cost of goods sold for all four resale organizations as the basis for estimating savings was appropriate. Additionally, the business case analysis did not fully identify the amount of vendor overlap that exists between DeCA and the three exchange organizations, but the data that were provided in the business case analysis suggest that limited vendor overlap exists. Specifically, the business case analysis provided data for 10 vendors that sell to the defense resale organizations, but those vendors represent less than 20 percent of the cost of goods sold to DeCA and the exchange organizations in fiscal year 2017. Further, only 5 of the 10 vendors identified in the business case analysis sold goods to both DeCA and the exchange organizations, and their cost of goods sold accounted for about 10 percent ($972 million) of the total cost of goods sold for the four resale organizations ($9.5 billion). Based on these data, the extent of vendor overlap between DeCA and the exchange organizations—and, as a result, how much can be saved through category management reforms by consolidating DeCA and the exchange organizations—is unclear. Although the task force stressed the importance of a conservative estimate in both its business case analysis and in meetings with us, our assessment of the assumptions and methodology for estimating savings from the cost of goods sold found that a more conservative approach could have been used to better ensure estimated savings were not overstated. For example, one method could have been to multiply the benchmarks by the cost of goods sold for just the three exchange organizations (about $5.5 billion in fiscal year 2017, per the task force), as data provided by the task force indicate that about 67 percent of the cost of goods sold for the exchange organizations in fiscal year 2017 were for identical products sold by at least two exchange organizations. Another method, which task force officials suggested after we shared our concerns about their methodology, could have been to multiply the benchmarks by the cost of goods sold for the exchange organizations, plus the portion of DeCA’s cost of goods sold that overlaps with at least one exchange organization (about $2.2 billion in fiscal year 2017, per the task force). Either method would be more conservative than the one adopted in the business case analysis and would yield a savings estimate that is about 20 to 40 percent lower, but would be more consistent with the task force’s assertion that consolidation savings are dependent on the amount of overlap among the merging organizations. DOD policy states that an economic analysis should base its analysis of benefits on facts and data whenever possible. Additionally, our Assessment Methodology for Economic Analysis states that an economic analysis should examine the effects of an action by considering relevant alternatives and justifying what the world would be like under each alternative; describe and justify the analytical choices, assumptions, and data used; and assess how plausible adjustments to each important analytical choice and assumption affect the estimates of savings. Ensuring that the estimates for cost of goods savings are accurate is particularly important, as they account for approximately 70 percent of the task force’s overall savings estimate from consolidation. However, the task force did not fully identify and analyze in its business case analysis how many identical products are sold by both DeCA and the exchange organizations or how many vendors sell products to both DeCA and the exchange organizations. According to task force officials, they did not provide data on product overlap between DeCA and the exchange organizations because it would not change their savings methodology or estimate, and they did not provide more information on vendor overlap because of the proprietary nature of that data. However, the amount of product and vendor overlap that exists across the four resale organizations will have a direct effect on the amount of savings to be achieved from consolidation, as acknowledged by the task force. Without the task force reassessing the approach it used to estimate savings from the cost of goods sold and, if necessary, making adjustments to those estimates, decision makers in DOD and Congress may lack confidence in the reliability of the task force’s savings estimates in the business case analysis and will not have complete information as they consider defense resale consolidation. Based on our analysis of the business case analysis, we found that DOD’s task force may have underestimated the expected costs of consolidating the four defense resale organizations in two areas: (1) the development of new, common IT systems and (2) the location of a new headquarters for the consolidated organization. The task force estimated in its business case analysis that most of the costs (i.e., about 50 percent annually) of consolidating the four defense resale organizations will result from developing new, common IT systems to support the consolidated organization. In the business case analysis, the task force stated that it worked with the four resale organizations to calculate a cost estimate of $292 million to $352 million for developing five types of IT systems that are needed for the consolidated organization: merchandising, store inventory management, financial management and general ledger, transportation and logistics, and ecommerce. According to the business case analysis, the task force’s cost estimates for developing new, common IT systems for the consolidated organization were to be based on data provided by the resale organizations on recent or projected costs for replacing similar systems or performing major upgrades to existing systems, when available. For example, the task force’s estimate for the merchandising system was approximately $115 million, which the business case analysis stated is based on a $35 million estimate provided by AAFES, a $23.5 million estimate provided by NEXCOM, a $15 million estimate provided by MCCS, and a $41 million estimate provided by DeCA. However, the task force’s cost estimate for IT consolidation may be understated because it is based, in part, on less expensive minor IT system upgrades and partial replacements, according to the resale organizations. Based on our analysis of information provided to us by the resale organizations, about $140 million (about 40 percent) of the overall IT cost estimate was based on what the resale organizations described as minor upgrades or partial replacements. Specifically, while MCCS confirmed the cost estimates attributed to them in the business case analysis were for total IT system replacement costs, the other three resale organizations—AAFES, NEXCOM, and DeCA— disagreed with the task force’s characterization that all the data used to calculate IT system estimates represented costs for replacements or major upgrades. AAFES told us that the cost estimates cited in the business case analysis for its merchandising, financial management and general ledger, and transportation and logistics systems reflected minor upgrades of specific modules within the overall systems, and the cost to replace or upgrade the entire system would be significantly higher. NEXCOM stated that the cost estimates for upgrading its merchandising, store inventory management, and financial management and general ledger systems were for minor upgrades, not replacements or major upgrades, as stated by the task force. DeCA told us that the estimate for replacing its store inventory management system only represented 1 year of costs, even though DeCA plans to incur replacement costs through at least 2022. According to the task force, the task force and the resale organizations agreed on the methodology for estimating IT costs, and the subject matter experts from the resale organizations provided the cost data used in the business case analysis. However, based on information provided by the resale organizations, it appears that the task force may not have always based its cost estimate on replacement or major upgrade costs— consistent with the key assumption that new IT systems would be developed for the consolidated resale organization—but, rather, used minor upgrade or partial replacement costs in some cases. Specifically, task force officials told us they believed the estimates provided by the resale organizations were too high to be minor upgrades or partial replacements, based on their understanding of IT requirements for resale operations. Further, task force officials stated that their overall IT cost estimate was likely overstated, not understated. For example, they stated that their estimate is higher than what is typically spent for a private sector consolidation of similar size. However, the task force stated that it did not use private sector IT cost estimates in its business case analysis because it determined that public sector IT costs would likely be higher than private sector IT costs. Additionally, task force officials told us that some planned spending on existing IT systems by the four resale organizations would not be necessary as a result of consolidation. However, the business case analysis does not quantify how much future spending could be reduced or factor those reductions into the IT cost estimate. According to the GAO Cost Estimating and Assessment Guide, cost estimates are developed based on assumptions that are defined to establish the baseline conditions the estimate will be built from. Additionally, our Assessment Methodology for Economic Analysis states that an economic analysis should define an appropriate baseline that represents the best assessment of what the world would be like under that alternative. Thus, estimating costs that reflect the baseline conditions is a key step in developing a sound cost estimate. Additionally, we have previously reported that federal IT investments frequently fail or incur cost overruns and schedule slippages. As such, high-quality data are imperative for ensuring proper management and oversight of IT investments. The task force’s IT cost estimate is particularly important, as it represents about 50 percent of the total estimated costs for defense resale consolidation. Until the task force consults with the resale organizations to reassess the methodology for estimating IT costs, decision makers in DOD and Congress may not have a reliable and complete understanding of the estimated costs for the implementation of new, common IT systems, which is information DOD and Congress need as they consider defense resale consolidation. According to the task force, there would be costs associated with relocating AAFES, NEXCOM, MCCS, and DeCA to a new headquarters location, to include relocating existing personnel, hiring new personnel, and obtaining real estate. Although no relocation options were presented in the business case analysis, task force officials told us there are multiple options for where to locate the headquarters of a consolidated resale organization. One option cited by the task force would be to create a new headquarters in the Washington, DC, area, which would be the most expensive option, as it would likely involve acquiring new real estate and hiring personnel in a high-cost region. Another option cited by the task force would be to locate all exchange operations and staff at the existing AAFES headquarters in Dallas, TX, and maintain commissary operations and staff at the existing DeCA headquarters at Fort Lee, VA. This option would likely be less expensive, as personnel and available real estate are already present at both locations. In January 2020, task force officials also told us that an even less expensive option they might consider is maintaining commissary and exchange headquarters staff at their current locations, but having personnel work for the consolidated organization, rather than for DeCA or the exchange organizations. Despite the potential for relocation costs, the task force did not include a range of cost estimates for different relocation options in its business case analysis. According to task force officials, relocation cost estimates were not included because the headquarters location has not been chosen, and costs will vary widely depending on the chosen location. While actual relocation costs will depend on the chosen headquarters location, this fact does not prevent the task force from presenting a range of cost estimates in advance of that decision being made. Task force officials also said that including relocation cost estimates would not have changed the conclusion of the business case analysis. However, without a range of relocation cost estimates, we were unable to assess the effect of relocation costs on the conclusion of the business case analysis. DOD policy states that an economic analysis should quantify the costs associated with each alternative under consideration whenever possible so that they may be included in the economic analysis calculation. Additionally, our Assessment Methodology for Economic Analysis states that an economic analysis should quantify the important costs, where feasible, to inform decision makers about the economic effects of a proposed action. Without developing and providing a range of relocation cost estimates from the least expensive option to the most expensive, decision makers in DOD and Congress will not be fully informed about the costs of consolidation, which is necessary information for deciding whether to consolidate the four defense resale organizations. The military departments officially concurred with the task force’s business case analysis for consolidating the four defense resale organizations. However, the military departments also provided written comments that detailed concerns with fundamental aspects of the business case analysis, to include: the use of proprietary industry benchmarks; estimated savings, costs, and timeline of the consolidation; and the proposed governance structure for the new resale organization. In an April 2019 report to Congress that summarized the business case analysis, DOD stated that the military departments agreed with the consolidation. However, the report did not disclose the military departments’ comments and concerns on the business case analysis, which are relevant as Congress considers defense resale consolidation. In their written comments, the military departments either stated concerns about the consolidation or included critical comments from the exchange organizations—all of which opposed the consolidation. Specifically: The Army concurred with the business case analysis but noted that funding for morale, welfare, and recreation programs must be preserved or increased as a result of the consolidation. In addition, the Army’s comment letter included as an attachment written comments from AAFES, which expressed opposition to the consolidation and detailed concerns with the business case analysis. For example, AAFES stated that the business case analysis relied on unverifiable, proprietary industry benchmarks that overstated the benefits of consolidation, underestimated the costs and time to consolidate, and did not account for recent efforts by the resale organizations to reduce costs by collaborating on a purchasing alliance. The Air Force also concurred with the business case analysis, but noted in its comments that mergers and acquisitions have historically cost more, taken longer, and saved less than originally expected. As a result, the Air Force recommended that a phased implementation plan be followed to guard against financial risk. The Air Force also stated that morale, welfare, and recreation funding currently provided by the exchanges should be maintained while opportunities are examined to reduce the need for appropriated funding. The Navy initially non-concurred with the business case analysis in December 2018. In its comment letter, the Navy stated that the task force’s analysis was flawed beyond repair and included comments from NEXCOM and MCCS that also opposed consolidation. For example, the exchanges’ comments stated that the expected cost savings were overstated, that potential inefficiencies from consolidation were not discussed, and that the resale organizations could achieve cost savings through greater collaboration without the need for consolidation. NEXCOM and MCCS also stated concern that the task force’s savings projection relied heavily on unverifiable industry benchmarks. In addition, MCCS expressed concern that consolidation could result in unexpected costs from separating exchange operations from the rest of MCCS operations, which also include the Marine Corps’ morale, welfare, and recreation and family programs. In January 2019, the Navy changed its position to concur subject to several significant comments and clarifications, and attached a letter detailing comments and concerns similar to those it submitted with its original non-concurrence in December 2018. Officials from the resale organizations further articulated their concerns about the business case analysis when they met with us. For example, resale officials told us they are concerned that savings are overstated, that costs are understated, and that the proprietary benchmarks used by the task force are unverifiable or may not be applicable to the public sector. Exchange officials also stated that they are worried about the effect of consolidation on morale, welfare, and recreation funding generated by the exchanges. Specifically, exchange officials are concerned that exchange revenue currently used for morale, welfare, and recreation programs could be used to pay for consolidation expenses or to reduce the amount of appropriated funds allocated to the commissaries. Despite the concerns detailed in the comments from the military departments and resale organizations, DOD did not include them in its April 2019 report to Congress summarizing the results of the business case analysis. The National Defense Authorization Act for Fiscal Year 2019 required DOD to include in its report the recommendations of the Secretaries of the military departments regarding the plan to consolidate the defense resale organizations. When we asked the task force why DOD did not provide Congress with the comments and concerns cited by the military departments and the resale organizations, officials stated that they were advised by DOD’s Office of General Counsel not to include the comments because they contained information that may have disclosed DOD’s deliberative process. Task force officials also stated that the savings, cost, and timeline estimates in the business case analysis were conservative, and that the proprietary industry benchmarks are based on years of experience by Boston Consulting Group and similar to those cited by prior studies. Regarding the purchasing alliance formed by the resale organizations to reduce their cost of goods sold, task force officials stated they do not believe such efforts to reduce costs will be sustained without a single chief executive officer and board of directors to ensure those efforts continued, as recommended in the business case analysis. Finally, the task force stated in the business case analysis that any savings achieved from consolidation could be used to increase morale, welfare, and recreation funding or reduce appropriations used to fund DeCA, and that decisions on how to allocate savings will be made by the proposed board of directors. According to task force officials, some of the concerns articulated by the military departments and the exchanges could be motivated by a general opposition to consolidation. However, without a more complete reporting of the military departments’ perspectives on consolidation and the task force’s response to those comments, Congress may be unaware of the views various organizations within DOD have regarding the business case analysis, which is relevant information as Congress considers defense resale consolidation. Moreover, fully reporting the comments and concerns could strengthen trust and collaboration among the task force, military departments, and resale organizations on any future resale reforms. Four defense resale organizations currently operate about 240 commissaries (operated by DeCA) and 2,500 exchange facilities (operated by AAFES, NEXCOM, and MCCS) worldwide to provide reduced-priced groceries and retail goods and services to DOD servicemembers, their families, and retirees. DeCA operations are funded in part by appropriations, which have totaled approximately $1.3 billion in recent years. By law the commissary and exchange organizations must be operated separately. In November 2018, a DOD task force completed a business case analysis and concluded that consolidating the four defense resale organizations into a single organization would result in several hundred million dollars in annual cost savings. However, we found that the task force’s projected savings from reducing the cost of goods sold may be overestimated, and that projected costs for IT development and headquarters relocation may be underestimated. Further, while the military departments concurred with the task force’s recommendation to consolidate, DOD did not fully share their comments and concerns about the business case analysis with Congress. DOD’s proposed consolidation will cost several hundred million dollars, take years to implement, and involve multiple DOD organizations. Given the cost and complexity of the proposed defense resale consolidation, DOD can ensure that Congress has the reliable information it needs to consider consolidation by reviewing and updating savings and cost estimates and sharing comments and concerns from the military departments. We are making the following four recommendations to DOD. The Secretary of Defense should ensure that the DOD Chief Management Officer direct the task force to reassess its approach to estimating savings from cost of goods sold—to include reassessing its use of the cost of goods sold for all four defense resale organizations rather than, for example, just for the three exchange organizations—and make any necessary adjustments to its savings estimates for consolidation and provide that updated information to Congress. (Recommendation 1) The Secretary of Defense should ensure that the DOD Chief Management Officer direct the task force, in consultation with the resale organizations, to reassess its methodology for estimating IT costs of consolidation, and make any necessary adjustments to its range of IT cost estimates and provide that updated information to Congress. (Recommendation 2) The Secretary of Defense should ensure that the DOD Chief Management Officer direct the task force to develop a range of cost estimates for relocating the defense resale organizations, and adjust its range of cost estimates for consolidation and provide that updated information to Congress. (Recommendation 3) The Secretary of Defense should ensure that the DOD Chief Management Officer provide additional written information to Congress on the comments and concerns from the military departments and resale organizations on the task force’s November 2018 business case analysis, as well as the task force’s response to those comments and concerns. (Recommendation 4) We provided a draft of this product to DOD for review and comment. In its comments, reproduced in appendix III and summarized below, DOD concurred with the first three recommendations and did not concur with the fourth recommendation. DOD also provided technical comments, which we incorporated as appropriate. DOD stated in its letter that it continues to firmly believe that consolidation of above-store operations of DeCA and the military exchanges is the right path forward and that it intends to move forward with this effort. DOD also requested that we consider the first three recommendations as implemented, based on information provided in the letter and as detailed below. Regarding the first recommendation for the task force to reassess its approach to estimating savings from cost of goods sold—to include reassessing its use of cost of goods sold by all four defense resale organizations rather than, for example, just the three exchange organizations—and make any necessary adjustments to its savings estimates for consolidation and provide that updated information to Congress, DOD stated that it had reassessed its approach and found that there is significant overlap and, therefore, savings opportunity in products sold by DeCA and the exchanges. DOD also provided revised savings estimates that exclude DeCA’s cost of goods sold from its methodology that show net savings ranging from $309 million to $739 million in the first 5 years of consolidation, followed by $255 million to $457 million per year thereafter. These figures are about 44 percent to 55 percent lower than the business case analysis’s estimate for the first 5 years and about 32 to 35 percent lower per year thereafter. By providing these revised savings estimates, we believe that DOD has addressed the intent of the recommendation. With regard to the second recommendation for the task force to reassess its methodology for estimating IT costs of consolidation, and make any necessary adjustments to its range of IT cost estimates and provide that updated information to Congress, DOD stated that the task force followed up with AAFES, NEXCOM, and DeCA to get an update on the cost estimates these entities expressed concern about to us. However, according to DOD, those resale organizations were unable to provide alternate data to use in place of the numbers in the business case analysis. DOD further stated in its letter that because no alternative data were provided, the department will continue to use the estimate in the business case analysis and will reengage with the resale organizations to develop more detailed IT design plans and make any necessary updates to the IT cost estimates as integration planning moves forward. As DOD develops its more detailed IT design plans and associated cost estimates, we will follow up with the department, including the resale organizations, to determine whether this recommendation has been addressed. In commenting on the third recommendation for the task force to develop a range of cost estimates for relocating the defense resale organizations, and adjust its range of cost estimates for consolidation and provide that updated information to Congress, DOD provided three possible courses of action, along with corresponding cost estimates. These possible courses of action, from least expensive to most expensive, are: (1) maintain operations at all four existing locations (no cost); (2) maintain commissary operations at DeCA headquarters, perform all exchange functions at AAFES headquarters, and close the NEXCOM and MCCS headquarters (one-time costs of $5.5 million and recurring annual costs of $1.3 million); and (3) create a new headquarters to perform all commissary and exchange operations near Washington, D.C. (one-time costs of $19.6 million and recurring annual costs of $19.7 million). DOD stated that consolidation would still result in financial benefits, even if the department chooses the most costly of these courses of action. By providing these cost estimates, we believe that DOD has addressed the intent of the recommendation. While we have determined that DOD has met the intent of the first and third recommendations, we also note that, in its comment letter, the department questioned some aspects of our analysis and conclusions regarding the first three recommendations. We stand by our analysis and conclusions and offer the following response: DOD stated in its comment letter that modifying the business case analysis’s approach to cost of goods savings would result in an incorrect use of benchmarks and go against industry best practice. For example, DOD stated that estimating savings by using the cost of goods sold for just the three exchange organizations, or for the three exchange organizations plus a portion of DeCA, would be flawed. However, as noted in our report, the latter method was recommended to us by task force officials when we raised concerns about the accuracy of the task force’s savings estimates in the business case analysis. In addition, multiplying the benchmarks by the cost of goods sold for the exchange organizations, as opposed to for all four resale organizations, would be more consistent with the assertion in the business case analysis that consolidation savings are dependent on the overlap among the merging organizations. DOD questioned the accuracy of some of our figures in the report by providing different data on product and vendor overlap between DeCA and the exchange organizations. However, this information was not included in the task force’s business case analysis or offered to us during the course of our audit. In addition, when we asked for supporting documentation that would allow us to validate the new figures, DOD did not provide any. DOD stated in its comments that excluding all or including only a portion of DeCA’s cost of goods sold implies that there is no opportunity to achieve savings between DeCA and the exchanges. Our report does not make this assertion, but rather offers a methodology that would result in a more conservative savings estimate, consistent with the data presented in the business case analysis and provided by task force officials, to better ensure that estimated savings were not overstated. As noted above, DOD did not concur with the fourth recommendation for the department’s Chief Management Officer to provide additional written information to Congress on the comments and concerns from the military departments and resale organizations on the task force’s November 2018 business case analysis, as well as on the task force’s response to those comments and concerns. DOD stated in its written response to our report that the department considered all the comments submitted in its decision-making process and that all of the military department secretariats agreed with above-store consolidation, despite their comments on the business case analysis. DOD further stated that the military department comments regarding the business case analysis were shared with congressional committee professional staff, and DOD suggested in its letter that this recommendation be closed. However, DOD’s written response did not provide information on which comments were shared, whether those comments were communicated in writing or orally, or which committee or committees received information on the comments. In their written comments on the business case analysis, the military departments detailed concerns with fundamental aspects of the analysis, to include: the use of proprietary industry benchmarks; estimated savings, costs, and timeline of consolidation; and the proposed governance structure for the new resale organization. We continue to believe that implementing this recommendation would help ensure that Congress has the full information it needs as it considers defense resale consolidation and would also help strengthen trust and collaboration among the various DOD stakeholders involved in defense resale, particularly given their role in any consolidation, should one occur. We will follow up with DOD as part of our regular recommendation follow- up process. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; and the Secretaries of the Army, Air Force, and Navy. In addition, the report is available at no charge on our website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The National Defense Authorization Act for Fiscal Year 2016 mandated that the Department of Defense (DOD) report on DOD’s plan to achieve budget neutrality for commissaries and exchanges—which DOD interpreted as ending the use of appropriated funding—and included a provision for us to assess DOD’s report. In November 2016, we found that DOD’s May 2016 report did not provide a plan for achieving budget neutrality. DOD reported that it would not be able to eliminate fully the use of appropriated funds for defense resale, but the department did not provide detailed information supporting that conclusion. Instead, the report stated that DOD expected to achieve $2 billion in cost savings over a 5-year period from fiscal year 2017 through fiscal year 2021. However, we found that the report did not include any assumptions, methodology, or specific time frames related to initiatives that would lead to these savings. We recommended that DOD provide information to Congress to support its conclusion about budget neutrality and develop a plan for achieving reductions to defense resale appropriations. DOD concurred with our recommendations, but as of February 2020 had not addressed them. In March 2017, we reported on DOD’s commissary operations, including the extent to which the Defense Commissary Agency (DeCA) had assurance that it was maintaining the desired savings rate for its customers. DeCA’s desired savings rate—which at the time of our March 2017 report was 30 percent and is now 23.7 percent—shows how much a customer can expect to save on grocery purchases at a commissary in comparison to purchases at other local grocery stores. We found that DeCA lacked reasonable assurance that it was maintaining its desired savings rate for commissary customers because of weaknesses in its methodology for calculating the savings rate. For example, the methodology did not use a random sample of overseas commissaries or account for seasonal and geographic variations in item prices. We also found that DeCA’s business model departed from practices generally employed by commercial grocery stores. For example, DeCA did not assess the contribution of the sale of each product to a given store’s total sales in determining which products to sell, and it had not conducted cost- benefit analyses for its use of stocking and custodial service contracts or product distribution options across all commissaries. We recommended that DOD (1) address limitations identified in its savings rate methodology; (2) develop a plan with objectives, goals, and time frames to improve efficiency in product management; and (3) conduct comprehensive cost-benefit analyses for service contracts and distribution options. As of February 2020, DOD had addressed the first two recommendations but had not addressed the third recommendation. We assessed DOD’s business case analysis on consolidating the four defense resale organizations against the five key elements of an economic analysis, as described in our Assessment Methodology for Economic Analysis (see table 1). Elizabeth A. Field, (202) 512-2775 or fielde1@gao.gov In addition to the contact named above, Suzanne Perkins (Assistant Director), Geoffrey Peck (Analyst-in-Charge), Pedro Almoguera, Noah Gerber, Mae Jones, Matthew Kienzle, Amie Lesser, Felicia Lopez, and Jeanne Sung made key contributions to this report.", "summary": "DOD operates about 240 commissaries and 2,500 exchanges that sell groceries and retail goods and services to servicemembers, their families, and retirees. Commissaries and exchanges are operated by four resale organizations, and in November 2018 a DOD task force completed a business case analysis on consolidating those organizations. The National Defense Authorization Act for Fiscal Year 2020 included a provision for GAO to review DOD's business case analysis. This report evaluates the extent to which (1) DOD's business case analysis for consolidating the four resale organizations provided reliable savings and cost estimates and (2) the military departments concurred with the business case analysis and DOD shared their accompanying comments with Congress. GAO evaluated the business case analysis against DOD- and GAO-identified key elements of economic analyses; reviewed comments on the business case analysis; and interviewed DOD officials. A Department of Defense (DOD) task force's business case analysis for consolidating the defense resale organizations—the Defense Commissary Agency (DeCA), the Army and Air Force Exchange Service, the Navy Exchange Service Command, and Marine Corps Community Services—may not provide reliable savings and cost estimates. These organizations sell groceries and retail goods to servicemembers, their families, and retirees. The task force recommended consolidating the four resale organizations into a single organization, estimating “net savings” (i.e., savings minus costs) of about $690 million to $1.3 billion during the first 5 years. However, the task force may have overestimated savings and underestimated costs. Savings from reducing the cost of goods sold. The task force estimated that DOD would save several hundred million dollars annually by reducing the cost of purchasing goods that are resold in stores. Specifically, the task force multiplied the fiscal year 2017 total cost of goods sold for all four resale organizations by industry benchmarks, reasoning that mergers lead to more savings when merging organizations sell a high amount of identical products. However, task force data show that DeCA and the exchange organizations have limited identical products; the overlap between DeCA products and those of at least one exchange organization amounts to less than one-third of the total cost of goods sold. Thus, multiplying the benchmarks by the total cost of goods sold for all four organizations may not have been appropriate. Information technology (IT) costs. The task force estimated the costs of developing new, common IT systems to operate a consolidated resale organization to be between $326 million and $401 million, about 50 percent of estimated consolidation costs. The task force stated that it based IT cost estimates on data resale organizations provided for major upgrades or system replacements. But GAO found that about 40 percent of the IT cost estimate was based on minor upgrades or partial replacements, not major upgrades or system replacements. Thus, the estimate may be understated. Headquarters relocation costs. According to the task force, there will be costs if DOD decides to relocate the four defense resale organizations to a new headquarters location. However, the task force did not include cost estimates for relocation in its business case analysis. According to federal law, the operation of the commissary and exchange systems may not be consolidated unless authorized by Congress. Until the task force reassesses and updates, as necessary, its savings and costs estimates, DOD and Congress will not have reliable information to consider resale consolidation. The military departments officially concurred with the business case analysis, but provided written comments detailing fundamental concerns with the analysis, such as the use of proprietary industry benchmarks and the estimated savings and costs. In April 2019, DOD reported to Congress that the military departments agreed with consolidation, but did not disclose the accompanying comments. Without more complete reporting of those comments, Congress has limited visibility of the views of the organizations involved in a potential consolidation. GAO is making four recommendations, including that DOD reassess and update as necessary its estimates for consolidation savings and costs, and provide additional information to Congress on the military departments' comments on the November 2018 business case analysis. DOD concurred with three recommendations and provided updated estimates. DOD did not concur with the last recommendation. GAO continues to believe providing such information is beneficial, as discussed in the report.", "document_type": "gao"}
{"report": "DOT is made up of nine modal administrations and the Office of the Secretary of Transportation (OST), each of which has its own mission, primarily focused on enhancing mobility and safety. Among other activities, modal administrations oversee financing and grant funding programs specific to their modes (e.g., roads, transit, rail). OST oversees the formulation of national transportation policy and promotes intermodal transportation. In this latter role, OST administers programs that provide grants to projects that can represent multiple transportation modes: roads, bridges, transit, rail, or ports. In fall 2015, DOT created the Build America Transportation Investment Center within OST—a predecessor to the Bureau. This new center was created to be a single point of contact and coordination for project sponsors seeking to apply for finance programs and explore innovative financing, in recognition of the fact that sponsors can face difficulties navigating multiple modal administrations to apply for funding or financing for a single project. In 2015, DOT was required by law to establish a finance bureau to align, coordinate, and consolidate certain surface transportation funding and financing programs. The Bureau—located within OST—is led by an Executive Director, who is responsible for managing and overseeing the daily activities, decisions, operations, and personnel of the Bureau. The Executive Director is appointed by the Secretary and then approved by the President. Three financing programs and one grant funding program were moved into the Bureau. Collectively, these programs provide billions of dollars of support to transportation projects across the country, as described below: TIFIA. TIFIA provides direct loans, loan guarantees, and standby lines of credit to surface transportation projects of national or regional significance. Eligible projects include a variety of projects such as highways, intermodal stations, and passenger rail. The fundamental goal of TIFIA is to leverage federal funds by attracting substantial private and other non-federal co-investment, and the legislation creating TIFIA stated that the program can do so by complementing existing resources to fill market gaps. For fiscal year 2018, the FAST Act authorized $285 million in funding to cover the federal government’s cost of providing financing and administering the program. According to DOT, $1 of TIFIA’s budget authority generally allows DOT to provide more than $10 in credit assistance, so $285 million in funding authority could support approximately $2.9 billion in assistance. TIFIA has provided over $31 billion in financing to 79 projects since its creation in 1998. The Federal Highway Administration (FHWA) administered TIFIA before it was moved to the Bureau. RRIF. RRIF provides direct loans and loan guarantees to finance the development of railroad infrastructure, such as rehabilitating passenger equipment and acquiring or rehabilitating track and bridges. Created in 1998, the RRIF program is authorized to provide up to $35 billion in credit assistance, and RRIF dedicates part of this funding to providing vital access to financing for smaller, short-line and regional railroads, which have historically lacked the access to private financing. The RRIF statute permits appropriations of budget authority to be used for the cost of providing financing, but appropriations acts have typically prohibited the use of appropriations for such purposes. This prohibition, however, was not included in the fiscal year 2018 Consolidated Appropriations Act and appropriations were, for the first time, made available to pay the cost of providing financing. RRIF loans totaling over $5 billion have supported 39 projects as of February 2019. The Federal Railroad Administration (FRA) administered RRIF before it was moved to the Bureau. PAB for Highway and Surface Freight Transfer Facilities. PAB provides private-sector developers of certain types of surface transportation projects with access to tax-exempt financing. In contrast to TIFIA and RRIF, where the federal government directly provides loans and other forms of credit assistance, PAB does not directly provide financing but enables a state or city to borrow on behalf of private companies and nonprofits. PAB does, however, impose costs on the federal government through forgone tax revenues. The total amount of PAB for surface transportation is limited by statute to $15 billion, and the Secretary of Transportation allocates this available capacity among qualified projects. As of February 2019, DOT had allocated about $10.3 billion in PAB to 27 projects. A different office within OST previously administered PAB. Infrastructure for Rebuilding America (INFRA). The FAST Act authorized DOT to award $4.5 billion in discretionary grants for nationally significant freight and highway projects for fiscal years 2016 through 2020. In response, DOT developed the INFRA grant funding program. States and local governments are among the eligible entities that may apply for INFRA grants. DOT may fund freight or highway projects that meet statutory requirements, such as reserving at least 25 percent of available funds for rural areas. In June 2018, DOT announced its most recently proposed INFRA grants totaling nearly $1.5 billion for 26 projects. The FAST Act also created the Council on Credit and Finance (Council) to review and make recommendations to the Secretary on applications for DOT’s financing programs, regularly review projects that have received financing, and conduct other duties the Secretary establishes. The Council is mostly comprised of DOT political appointees, including the Deputy Secretary of Transportation, Under Secretary of Transportation for Policy, and Administrators of FRA, FHWA, and the Federal Transit Administration (FTA). The FAST Act outlined specific responsibilities for the Bureau, some of which relate to administering the above programs. The responsibilities include the following, grouped into five broad categories: Administering the application evaluation process for certain Establishing procedures for analyzing and evaluating applications for these programs, as well as for documenting major decisions in the application evaluation process through a decision memorandum or similar mechanism that provides a clear rationale for such decisions Streamlining the approval processes for the above programs Providing assistance to project sponsors seeking funding or financing Making credit assistance programs more accessible Providing technical assistance, upon request, for proposed public- private partnerships and environmental reviews and permitting, among other areas Promoting innovative-financing best practices: Developing and monitoring best practices for state authorities and practices, standard contracts, and analytical tools Improving environmental reviews and permitting: Serving as DOT’s liaison on the Council on Environmental Quality Coordinating efforts to improve the efficiency and effectiveness of the environmental review and permitting process Identifying, developing, and tracking metrics for permit reviews and decisions Sharing information on procurement costs and risks: Developing procurement benchmarks for projects receiving assistance under the above programs, and collecting and publishing information on procurement benchmarks; to the extent possible, the benchmarks should establish maximum thresholds for cost increases and schedule delays, establish uniform ways to measure these changes, and be tailored to different types of project procurement Developing guidance to require and publish value for money and after-action reports findings for public-private partnerships seeking assistance from the Bureau programs The conference report accompanying the FAST Act noted that the Bureau would serve as a one-stop shop for states and local governments, and to serve in this capacity, the report highlights the Bureau’s role to work with individual project sponsors as the Bureau administers financing programs, as well as its broader role to help reduce costs and uncertainty with environmental reviews and permitting and procurement. The FAST Act also gave the Secretary of Transportation authority to consolidate or eliminate different offices within DOT as it creates the Bureau. DOT established an organizational structure for the Bureau and created a consolidated process for it to use when working with sponsors to evaluate applications for financing programs and provide assistance. Creating this process helped the Bureau make progress on two of its FAST Act responsibilities, and overall, DOT’s initial steps were important actions that allowed it to open and operate the Bureau. Since the Bureau was established in 2016, it has made more limited progress on its other responsibilities, including promoting innovative-financing best practices for certain types of projects. Although we recognize that it is a relatively new office that in many ways remains a work in progress, the Bureau lacks a plan to guide its ongoing and future efforts and has not established performance indicators to measure its outcomes and assess progress. DOT designed and established the Bureau in the year after the FAST Act’s enactment. DOT established internal committees and hired a consultant to produce an initial implementation plan to establish the Bureau. To create this plan, the consultant analyzed existing staffing and processes, interviewed internal and external stakeholders, and examined organizational structures at public and private sector entities, among other things. DOT prioritized several areas for this initial work, including consolidating existing processes for evaluating applications for finance programs and providing assistance, that were important to opening and operating the Bureau as well as assuming control of the financing programs. As part of its work to develop a structure for the Bureau, DOT’s initial implementation plan set out guiding principles for what the Bureau aims to achieve: mobilizing available financial resources for high-impact transportation projects in the United States; identifying and encouraging innovative best practices in project planning, financing, delivery, and monitoring; clearing roadblocks to provide financing and grants more quickly and transparently, with a streamlined user interface and less uncertainty, complexity, and cost for project sponsors; and ensuring the protection of public resources through efficient leveraging of taxpayer money and the development of a creditworthy portfolio of projects. DOT also created an organizational structure for the Bureau and laid out the Bureau’s relationships to other offices in DOT. When the Bureau opened in July 2016, DOT appointed an Acting Executive Director, filled 29 positions with staff from other DOT offices, and created two offices within the Bureau, all of which generally aligned with the initial implementation plan. The Outreach and Project Development Office largely aligns with the Bureau responsibility to provide assistance to sponsors, which includes providing technical assistance on public-private partnerships and federal requirements to specific project sponsors as they prepare to apply for funding and financing. The Bureau’s Credit Programs Office largely aligns with the Bureau’s responsibility to administer the application evaluation process for certain programs through its work on underwriting, risk management, and portfolio management. DOT decided to also leverage other DOT offices within OST and modal administrations to carry out some of the Bureau’s work. Bureau officials told us this was a more efficient approach because it used the expertise and support of existing DOT offices rather than duplicating this expertise and support. For example, DOT used staff in OST that administer another competitive grant funding program to administer the INFRA grant program. See appendix II for more detail on the Bureau’s organizational structure and staffing. In its initial work, DOT also created a consolidated process for the Bureau to use when working with project sponsors pursuing TIFIA and RRIF financing, including standardized steps for evaluating applications for financing programs as well as providing assistance. Applications for the PAB program, which was also moved into the Bureau, go through many of the same application evaluation steps as TIFIA and RRIF, especially in the latter phases. DOT’s work to create this process aligned with two responsibilities given to the Bureau in the FAST Act: Administering the application evaluation process for certain programs Providing assistance to project sponsors seeking funding or financing DOT, in creating this process, set out steps that the Bureau would follow when working with sponsors. In the first two phases—initial engagement and project development—the Bureau provides assistance to project sponsors as they consider and navigate the financing programs. In those phases, a single point of contact works with sponsors to share information on the Bureau and provide assistance as sponsors develop materials to apply for financing programs. In the remaining phases of the process, Bureau staff and other DOT officials evaluate financing applications. During the creditworthiness review for a TIFIA or RRIF loan, for example, Bureau staff and independent advisors conduct an in-depth review of the project, including the sufficiency of a proposed repayment stream or collateral pledged. Throughout the process, the Credit Review Team—a decision-making body composed of Bureau and other DOT staff—votes at three points whether to advance a project seeking a TIFIA or RRIF loan and votes once for PAB allocations. During a later phase in the process, the Council then votes whether to recommend that an application advance to the Secretary for approval. The phases and steps in the Bureau’s process are summarized in figure 1 below. In creating this consolidated process, DOT also sought to improve and streamline the process, as called for in the FAST Act. Overall, DOT officials and documentation stated that these improvements, described below, should allow the Bureau to gather more information and better assist sponsors in the early phases of the process as well as identify and address potential issues earlier in the process. Single point of contact in the initial engagement and project development phases. The Bureau provides a single point of contact to assist sponsors during the early phases of the process. With a single point of contact, the Bureau aims to provide a streamlined interface with DOT for a sponsor. Furthermore, Bureau documents show that the single point of contact works with the sponsor to identify specific technical assistance needs—such as help completing environmental review requirements—and then develops a roadmap for providing this assistance as the sponsor develops its draft application. The point of contact can also help to resolve any conflicting requirements; for example, Bureau officials said the point of contact can facilitate discussions with a project sponsor and modal administrations on which Buy America requirements apply for a multi-modal project, as the requirements may differ across modes. Bureau officials said the Bureau’s work in these phases builds off the functions of the Bureau’s predecessor, the Build America Transportation Investment Center, which the initial implementation plan shows reached out to some sponsors interested in federal financing and connected them to the TIFIA, RRIF, and PAB programs, as well as the work of the former TIFIA Joint Program Office and RRIF Office. In contrast, the Bureau now more formally connects early assistance to later phases where the Bureau evaluates financing applications, all within the same office. Combined process for the creditworthiness review, application review, and Council review phases. The Bureau’s process combined the various review processes previously used by the three separate offices—in FHWA, FRA, and OST—to administer the three financing programs—TIFIA, RRIF, and PAB, respectively. For example, before this new process was implemented, a sponsor seeking a TIFIA loan and a RRIF loan would have to submit two applications to two offices and then work through two different processes; now a sponsor can submit one application to the Bureau and work through a single process for both loans. Our analysis of DOT and Bureau documents found that the reviews conducted in these phases are largely built off and resemble previously used processes. For example, the initial implementation report shows that previously the offices administering TIFIA, RRIF, and PAB were each required to brief the Council’s predecessor at different steps for each program, while the new process requires briefings to the Council at the same step for each program. Formalized decision-making body that monitors and advances projects through phases. The Credit Review Team—the new, primary decision-making body within the Bureau—plays a key role in deciding when projects can advance from one phase to another. For example, the team reviews a project’s initial materials for a TIFIA or RRIF loan and then votes on whether the project is ready to advance to the creditworthiness review phase. According to Bureau documents, the team’s predecessor, a less formal working group, did not review projects until after the creditworthiness review began. Bureau documents show that the Credit Review Team is meant to meet weekly, in contrast to its predecessor organization, which met monthly. According to Bureau officials, this more frequent meeting schedule allows the Bureau to expedite its decision-making. Since DOT designed and established the Bureau, the Bureau has made more limited progress in its first 2 years on addressing additional responsibilities assigned to it by the FAST Act, as listed and described below. Bureau officials spoke generally about plans to continue making progress on these responsibilities in the future, and pointed out that the Bureau is still a relatively new office that remains a work in progress. However, Bureau officials were unable to provide written plans or timelines for these additional efforts. Promoting innovative-financing best practices. The Bureau has started to address this responsibility by employing the expertise of modal administration staff. The Bureau signed an agreement with FHWA in October 2016 to leverage the expertise of FHWA’s long- standing Office of Innovative Program Delivery rather than duplicate these efforts in the Bureau. Since signing the agreement, the Bureau and FHWA have jointly developed or updated a number of resources for public-private partnerships, building on FHWA’s existing work. This includes conducting on-site trainings for state entities and updating two model contract guides. Progress with other modal administrations has been more limited. For example, Bureau staff told us they have worked with FTA to start to identify gaps and jointly produce materials, such as an upcoming public-private partnership procurement guide. Though the Bureau does not have a signed agreement with FTA, Bureau officials said they want to sign one. Bureau officials said that they have started speaking with officials at other modal administrations to identify opportunities but that it will take time to identify gaps and develop tools in innovative financing for rail, maritime, and aviation. Improving environmental reviews and permitting. Bureau officials said they have relied on the expertise of DOT’s Infrastructure Permitting Improvement Center to carry out responsibilities to improve environmental reviews and permitting, rather than duplicate this expertise in the Bureau. The Center’s stated mission is to improve the performance of federal environmental review and permitting of infrastructure projects. As a result, Bureau officials said the Center carries out several specific responsibilities directed to the Bureau in the FAST Act, including serving as DOT’s liaison to the Council on Environmental Quality and tracking metrics for permit reviews and decisions in a public dashboard. According to Bureau officials, the Infrastructure Permitting Improvement Center and the Bureau also jointly hired an environmental expert. This environmental expert’s duties include supporting broad efforts to improve the efficiency and effectiveness of these processes in the Center and providing technical assistance to ensure that environmental reviews on specific projects move forward in the Bureau. Bureau officials told us that the Bureau does not have a written plan to document its efforts to fulfill the Bureau’s FAST Act environmental review and permitting responsibilities, beyond the position description for the environmental expert, because both offices are under the direction of the Under Secretary. However, the position description does not mention the Bureau or provide a sequence or timeline to fulfill these responsibilities that could help ensure continued progress. Sharing information on procurement costs and risks. The Bureau has not taken steps to collect or share information on procurement costs and risks, though documents show it has coordinated with FHWA to take some preliminary planning steps. For its FAST Act responsibility to develop, collect, and publish procurement benchmarks, the Bureau and FHWA published a preliminary paper in June 2017 that identified the types of procurement information to collect and publish, identified existing information sources for highway projects, and outlined possible next steps. However, Bureau officials told us that much work remains to identify specific cost and schedule information to collect from project sponsors and ultimately publish procurement benchmarks for projects across modes. The FAST Act also directs the Bureau to require sponsors procuring a project as a public-private partnership to conduct and publish value for money assessments and after-action reports, but the Bureau has not taken steps to do so. Bureau officials stated that additional efforts to address these responsibilities will require additional work and resources. Bureau officials could not provide a written plan or schedule for these future efforts. Several factors, including some outside the Bureau’s control, have affected the Bureau’s ability to more fully carry out its responsibilities in its 2 years of operation. First, there have been changes in leadership. After the presidential transition in early 2017, many DOT leadership positions, including many members of the Council, were vacant until new political appointees were put in place. Bureau documents show that the Council did not meet for 2 months, and Bureau officials told us that career staff sat on the Council to enable it to meet and resume voting on applications until appointees were confirmed. In addition, the Bureau’s Executive Director stepped down in November 2017. The Bureau is currently trying to fill that position through a second job announcement. With the Executive Director position vacant, Bureau officials told us that the Deputy Assistant Secretary and 3 senior officials from the Bureau and OST have fulfilled the day-to-day activities of that leadership role in the interim. Bureau officials told us that the lack of an Executive Director has had an effect on setting long-term plans for the Bureau; such planning is part of the duties of that position. Some stakeholders we spoke to stressed the importance of having an Executive Director in place so Bureau staff can quickly elevate issues or make decisions that currently need to be made by higher-level officials. Second, the Bureau has had a number of vacant positions since it was opened. Based on Bureau documents and discussions with Bureau officials, we determined that between 8 and 11 positions in its current organizational chart were vacant during 2018. During the government- wide hiring freeze in early 2017, the Bureau could not fill any vacancies, but several positions remained vacant before and after the hiring freeze, and two former Bureau officials said that the Bureau remained understaffed into mid-2017. The positions vacant during 2018 changed over time due to attrition, but two positions that remained vacant throughout this period are the transit-oriented development and project finance specialists. When asked about the vacancies in early 2018, Bureau officials said that they had originally wanted to fill the Executive Director position before filling other vacancies but later decided to start filling some critical vacancies. In July 2018, Bureau officials discussed their strategy for filling some vacant positions in response to immediate needs and in October 2018 said they intended to fill all vacant positions. Throughout this period, Bureau officials verbally shared these staffing priorities with us but did not provide a written plan or strategy for prioritizing the Bureau’s vacancies. Bureau officials said they do not have a timeline to fill remaining vacant positions in part due to limited human capital resources to draft position descriptions and conduct other parts of the hiring processes. DOT’s efforts to establish the Bureau and its processes were guided by an initial implementation plan. However, subsequent work by the Bureau to address its responsibilities and continue its implementation efforts is ongoing without the benefit of a plan and associated timelines. Key practices for organizational transformations state that an agency must set implementation goals and a timeline and ensure that top leadership drives the transformation, as such a transformation could take years to complete. Bureau officials have developed general priorities and approaches that they said have been communicated to staff through regular meetings and use specific performance plans to guide work in certain areas. However, without detailed written plans with implementation goals and timelines, the Bureau risks not being able to sustain the progress it has made in the last 2 years and ensure that it implements all of its statutory responsibilities in a timely manner. Finally, though the consultant’s report recommended that the Bureau develop indicators to track its performance, the Bureau has not established any indicators or measures to track progress in accomplishing its guiding principles or mission to be a “one-stop shop.” Federal standards for internal control and key practices for organizational transformations stress the importance of setting measurable objectives and developing performance measures to assess progress. The consultant’s initial implementation plan identified a number of potential performance indicators for the Bureau, including customer satisfaction. Bureau officials said they currently track data on projects through early assistance and application evaluation. However, Bureau officials said they do not want to use certain indicators, such as those that measure how long different parts of the process take, as they could create incentives to move projects ahead before they are ready. However, our prior work shows that to counter such incentives as well as to help an agency avoid drawing the wrong conclusions about its effectiveness, an agency could use multiple indicators rather than any one indicator to assess progress. Concerns about one indicator might be countered by information from other indicators. For example, to help offset incentives to move projects ahead before they are ready, an indicator for how long different parts of the process take could be considered along with an indicator that also measures the ratio of projects that were and were not returned to staff to gather additional information. Without establishing or beginning to use performance indicators that measure the Bureau’s performance rather than the progress of individual projects as it currently does, the Bureau will not know if it is achieving its guiding principles or meeting the mission set out in the conference report that it serve as a “one-stop shop” that advances projects. Sponsors we interviewed had mixed views on the Bureau’s process for evaluating applications and providing technical assistance, including views on whether the process was quick or streamlined. Selected sponsors had a generally positive experience with the PAB application evaluation process. However, for TIFIA and RRIF, selected sponsors had more mixed experiences and identified challenges with the application evaluation process, including the length and uncertainty of the process, changes to requirements or terms, and unclear goals and risk appetite— that is, how much risk an agency is willing to accept to achieve its goals— for the programs. Bureau officials identified limitations to providing more certainty to sponsors for each of these challenges and noted that the Bureau cannot control all the factors, such as a sponsor’s responsiveness or changes to a project’s proposed financing, surrounding the application evaluation process. However, the Bureau has also not determined how it will improve or streamline its process by, for example, consistently soliciting feedback from sponsors, nor has it outlined the goals and appetite for risk for TIFIA and RRIF. As discussed earlier, DOT created a consolidated process for evaluating applications for its financing programs. Selected sponsors we interviewed that applied for a PAB allocation since the Bureau was created had a generally positive experience with the PAB application evaluation process. In particular, sponsors of the four PAB projects we selected said the process was quick and streamlined. For example, each sponsor said the process met or exceeded its schedule expectations for receiving a PAB allocation. In addition, these sponsors said the process was simple to follow and that the simplicity was an important strength. One sponsor found its point of contact’s efforts to clearly explain information requirements early in the process as useful to understand the Bureau’s expectations. DOT officials also said that PAB applications can move relatively quickly as they, in contrast to TIFIA and RRIF, do not create a direct financial risk for DOT or the federal government since DOT’s role is limited to approving the use of tax-exempt bond authority. Selected sponsors that applied for TIFIA and RRIF financing had mixed views on their overall experiences with the Bureau’s application evaluation process. Some sponsors had positive experiences to share. Among sponsors of six projects we selected, two sponsors said they believed the application evaluation process was streamlined, and five sponsors said it was somewhat streamlined. Some sponsors based their responses on comparing the Bureau’s process to the processes previously used to administer TIFIA and RRIF, while other sponsors focused on whether the process was efficient. For example, one sponsor that was new to TIFIA and that believed the process was streamlined said the Bureau was thorough but did not ask repetitive questions and that the process was not overly onerous. In terms of speed, two sponsors said the process was quick, two said the process was somewhat quick, and three said the process was not quick. Among sponsors of the six projects we selected and ten additional sponsors and stakeholders that had experience with some part of the Bureau’s application evaluation process, five sponsors and one stakeholder found the responsiveness of the Bureau’s staff to questions or issues as most useful, and several sponsors also praised individual staff or cited the professionalism and commitment of Bureau staff. Despite these positive comments, sponsors and stakeholders we interviewed also identified challenges with the application evaluation process for TIFIA and RRIF and offered some suggestions to improve the process, including how to further streamline the process. Based on our interviews, the most common challenges involved uncertainty related to the overall length of the application process, changes to the Bureau’s requirements or terms for loans, and the goals and risk appetite for the financing programs. We and others have previously reported on some of these challenges for TIFIA or RRIF. Length and uncertainty of process. Four sponsors and one stakeholder said the overall length of the application evaluation process creates a challenge when seeking and planning for credit assistance. This challenge predated the Bureau as we similarly reported in 2012 and 2016, before the Bureau was created, that project sponsors cited the length of the application evaluation process for the TIFIA and RRIF programs respectively as challenges. Furthermore, seven sponsors and three stakeholders we spoke with also said the Bureau should refine or further streamline the application evaluation process. For example, one sponsor said it faced an uncertain timeline when its project awaited Credit Review Team approval and that it was not informed by the Bureau when the meeting would be held. The Bureau instituted regular Credit Review Team and Council meetings to give sponsors a greater sense of certainty and transparency on when DOT would be voting to advance a project. Another sponsor said it took the Bureau over 3 months to procure independent advisors to help with the Bureau’s creditworthiness review, though Bureau officials said it takes about 6 weeks to procure these advisors. In our analysis of six selected TIFIA and RRIF projects, we found that five projects signed their credit agreements between 3 and 6 months later than was anticipated when the project was in creditworthiness review, according to Bureau documents for each project. Our analysis also found that the processing time for steps in the process varied, including steps that may be more within the Bureau’s control. For example, the number of days between a project’s receiving approval by the Council and the Secretary ranged from same-day approval to 43 days. Though some slowdowns can result from factors that are out of the Bureau’s control, sponsors we interviewed discussed the overall effect of slowdowns to projects. For example, sponsors of two projects said application slowdowns led to cost increases and a schedule delay for one project. To improve the application evaluation process, three sponsors and one stakeholder said the Bureau could provide tailored schedules for a project for each phase of the process. One stakeholder also said the Bureau could add certainty and transparency by providing information on how long different phases generally take, information that this stakeholder said it had not received when working with the Bureau, though this is a customary practice when seeking financing in the private sector. Bureau officials pointed out limitations to providing or predicting formal schedules and timelines for the process for specific projects. Bureau officials said many factors influence how quickly a project can advance through the application evaluation process for TIFIA and RRIF, primarily the quality of the project’s credit and overall complexity. In addition to these primary factors, Bureau officials said an application’s processing time can be affected by a sponsor’s responsiveness to requests or whether the sponsor is concurrently negotiating other agreements. Bureau officials said they do not tell a sponsor the specific date of the Credit Review Team or Council meeting on which its project will be reviewed, but instead tell a sponsor what information is needed and by when to reach the next meeting. The Bureau takes this approach because a sponsor may, for example, provide incomplete information, meaning the project would have to wait to be discussed at a meeting that is later than expected. Furthermore, the dates of Council meetings often change due to the members’ schedules, and the Bureau does not want to cause a sponsor undue alarm if the date changes. Bureau officials said they provide a general schedule to a sponsor once a project enters creditworthiness review and use this schedule as a starting point to build a tailored schedule for a project. We found that this general schedule uses historical data to show how long steps in the process could take, but this schedule uses steps and decisions for the process used for TIFIA that pre-dated the Bureau. Bureau officials also said they may informally identify ways to expedite the process where appropriate for a specific project, but that these enhancements affect primarily lower-risk projects. Changing requirements or terms for loans. Six sponsors said changing requirements or terms during the application evaluation process created a challenge of having to navigate new expectations during the process. For example, two sponsors said they had to make changes to terms and conditions for loans late in the process. Specifically, one of the sponsors said it would have preferred to learn about the Bureau’s policy related to certain terms earlier in the process rather than have to accept an unexpected change late in the process, after it has committed time and resources to the process. One sponsor said certain terms developed by the Bureau’s underwriting team, which conducts the creditworthiness review, had to be restructured following review by the Credit Review Team. Another sponsor said the Bureau changed or introduced new requirements after it began the application evaluation process, including what was required at particular steps, but did not provide reasoning for its changes. To address such challenges, four sponsors and two stakeholders said the Bureau could better accommodate projects with different revenue streams by, for example, creating different standard terms and contract templates. Bureau officials described factors that can result in changes to the tentative terms and conditions during the application evaluation process for a project. For instance, if a project’s scope or construction cost estimates change significantly in ways that affect the financial assumptions for a project, the Bureau must reevaluate the project and make changes to the terms and conditions accordingly. Bureau officials said they try to balance providing certainty and flexibility but lean toward providing flexibility; for instance, the Bureau will try to accommodate a sponsor that changes the proposed financing for a project, which then may result in changes to terms as the Bureau reevaluates the project’s risk. In addition, the terms and conditions discussed for a project are tentative until they are approved by the Credit Review Team, Council, and Secretary. According to Bureau officials, sponsors can advance through the application process more quickly and with greater certainty by agreeing to use the Bureau’s standard credit terms—that is, agreeing to the terms and conditions in a template provided by the Bureau as opposed to choosing to negotiate with the Bureau with those terms and conditions as a starting point. Finally, Bureau officials said they were developing two additional standard loan templates to post on the Bureau’s website with the two existing loan templates for projects with different financing structures and revenue streams. Unclear program goals and risk appetite. Many sponsors we interviewed said the Bureau did not clearly convey the program goals or appetite for risk for its TIFIA and RRIF programs. Eight sponsors and one stakeholder cited the Bureau’s approach toward risk as creating a challenge for sponsors to determine if their projects fit the Bureau’s programs. Four sponsors said the Bureau required strict terms and conditions in its credit agreements that seemed excessive, and one sponsor said such strict terms can impose additional costs on a sponsor without materially improving credit quality since a project must have an investment-grade credit rating. One sponsor stated that the lack of clarity on goals and appetite for risk for its project, coupled with other challenges, led the sponsor to withdraw from seeking financing. According to the sponsor, while the programs were created to fill market gaps, it is not clear whether the Bureau’s financing programs currently seek to provide financing to lower risk projects that have a high-quality credit rating or to higher risk projects that are unable to secure financing in the private markets. Similarly, a May 2017 Congressional Research Service report noted that a significant portion of RRIF financing has gone to passenger rail projects since 2008, though the program was primarily created to support freight rail projects, and that the size of loans and some of the risks for passenger rail assistance differ from the assistance historically provided for freight rail. One sponsor we spoke with said it would be helpful if the Bureau and the Council shared information with sponsors regarding DOT’s appetite for risk when evaluating projects, similar to how commercial banks can share a risk profile framework. Bureau officials said DOT’s financing programs and their treatment of risk have evolved over the past decade based on changes to private markets and lessons learned by DOT in working on projects that faced bankruptcy. According to Bureau officials, the Bureau has also changed its standard terms and conditions, as any lender would do, over time. However, Bureau officials said the Bureau lacks an external statement that communicates its goals and appetite for risk for its financing programs. Bureau officials told us they have developed a draft risk appetite statement for internal use. Officials said this risk appetite statement is imbedded in draft credit-risk guidelines the Bureau is developing to use to enable more consistent review of individual projects applying for financing. The officials noted that this draft statement is short and general by design because TIFIA and RRIF can finance a wide range of projects. Furthermore, Bureau officials said it would be difficult to create a public risk appetite statement, as suggested by the consultant, that did not constrain their flexibility to finance a range of projects, particularly as the Bureau seeks to further diversify its portfolio and assist a variety of projects. In lieu of a public risk appetite statement, the Bureau encourages sponsors to meet with its staff early to assess whether a project would be a good fit for its financing programs. However, Bureau officials agreed that it could be beneficial for the Bureau to issue a public statement that conveys how it intends to balance its financing portfolio and support varying types of risks and projects that seek assistance. Given the challenges identified by sponsors, we found that the Bureau has not developed an approach to assess how effectively its application evaluation process works for TIFIA and RRIF, including what in the process is challenging and what works well. In particular, Bureau officials said they have not formally analyzed the amount of time it takes for projects to proceed through the process due to concerns that assessing speed and efficiency may not be appropriate to track for all projects. For example, a sponsor may not need financing immediately and thus choose to proceed at a slower pace. Also, while Bureau officials said it would be beneficial to formally solicit and analyze the satisfaction of sponsors that have closed loans, the Bureau has not implemented a mechanism to systematically solicit feedback on sponsors’ experiences, including any challenges. Federal standards for internal control state that management should design control activities to achieve its objectives. Control activities include reviews of an agency’s programs or activities to compare actual results to objectives and expected results, for example by evaluating the amount of time projects take in each step of the process. Federal standards for internal control also state that an agency should externally communicate information to achieve its objectives; this communication includes receiving information through reporting lines from external parties to help ensure effective operations. In addition, Office of Management and Budget guidance to agencies that manage financing programs also states that effective oversight relies on robust data collection and reporting systems that include, for instance, metrics from collected feedback on customer service or overall applicant satisfaction. As noted above, the Bureau cannot control all the factors and circumstances surrounding the application evaluation process. However, officials have stated that the Bureau seeks to expand and diversify the types of projects that access the TIFIA and RRIF programs, and one of the Bureau’s own guiding principles is to clear roadblocks to provide financing more quickly and transparently and to have a consistent application process. Without a mechanism to formally examine how to improve and further streamline the process, the Bureau may be missing an opportunity to address any recurring challenges with the process or with how the Bureau communicates with sponsors, a situation that could discourage sponsors from the seeking financial assistance from these programs. Moreover, the Office of Management and Budget has directed agencies that manage financing programs to establish acceptable risk thresholds to balance policy goals with risks and costs to the taxpayer, and to monitor the program’s progress toward achieving policy goals within those acceptable risk thresholds. Federal standards for internal control also call for management to define objectives or goals clearly to enable the identification of risks and define risk tolerances. These standards also call for management to externally communicate the necessary information to achieve its goals. In the initial implementation plan, the Bureau’s consultant recommended that the Bureau publicly issue a risk appetite statement that specified acceptable types of risks and projects DOT would support. We have previously reported that setting an organizational risk appetite is an example of a good practice agencies can take to align risk management processes to goals and objectives. We also reported that by not clearly defining and communicating its appetite for risk, an agency could be taking risks well beyond management’s comfort level or be passing up opportunities by assuming its leaders were risk averse. In addition, a former DOT official we interviewed said DOT and the Bureau should have an in-depth conversation about the risk in its portfolio of projects to help decide what risks are tolerable and, thus, help the Bureau better decide the risks it can accept for individual projects. Without clearly defining and communicating to the public the goals and appetite for risk for TIFIA and RRIF programs, the Bureau may be missing an opportunity to make its application process more transparent. Moreover, by issuing a public statement that clearly communicates the types of risks DOT is willing to accept, sponsors would be in a better position to determine if the TIFIA and RRIF programs would be a feasible option for their projects before committing resources to applying. Since it opened in July 2016, the Bureau has provided technical assistance to sponsors for 119 distinct projects, based on our analysis of Bureau data. As of August 2018, about half of projects were in the early phases of working with the Bureau. In total, 56 projects were in initial engagement or project development, the phases during which the Bureau provides technical assistance to sponsors (see table 1). By mode, rail and highway projects comprised about half of all projects. The amount of technical assistance and level of interaction between the Bureau and project sponsor in the initial engagement and project development phases varied, based on the sponsor’s experience using DOT’s financing programs and the project’s complexity. For example, one sponsor we interviewed met with the Bureau to discuss the expected timing to apply for and receive a TIFIA loan; this sponsor did not seek additional technical assistance in project development as it had previously received a TIFIA loan and had completed work to comply with federal requirements for the project, including the environmental review and permitting work. Another sponsor we interviewed was new to the Bureau’s financing programs and met with the Bureau to learn more generally about the requirements for the different programs and the application process. Half of the sponsors we interviewed were satisfied with the Bureau’s technical assistance, but some sponsors expressed concerns including the following: Ability and willingness to move projects forward. In our interviews with 16 sponsors that received technical assistance from the Bureau, 8 said they were satisfied with the technical assistance provided by the Bureau, and 9 said that the Bureau functioned as a one-stop shop to access financing and funding programs and technical assistance. However, six sponsors said the Bureau’s technical assistance was slightly helpful or not helpful in clearing roadblocks to provide credit and grants more quickly and transparently. For example, one sponsor said its project experienced delays over a period of several months as it made multiple attempts to obtain specific, actionable feedback from the Bureau on its materials to better understand what was needed to advance in the Bureau’s process. Lack of clarity on RRIF program eligibility. In our interviews with sponsors, a recurring concern included a lack of clarity from the Bureau on eligibility requirements for the RRIF program, in particular for sponsors seeking financing for transit-oriented development projects. For example, from information gathered from sponsors of 10 inactive projects, we found that four were transit-oriented development projects that became inactive because the Bureau determined them to be ineligible. Sponsors of two of these projects said they were initially told their projects would be eligible, but after continuing to work with the Bureau for 5 to 6 months, the sponsors said their transit-oriented development projects were determined to be ineligible for the RRIF program. In addition, sponsors of these two projects said they faced difficulty reconciling differences found in the Bureau’s transit-oriented development eligibility guidance for the RRIF program and transit-oriented development guidance issued by modal administrations for other programs. For example, one sponsor said it felt that the Bureau’s guidance did not clearly outline the eligibility requirements for transit-oriented development for the RRIF program and that it would help if the Bureau provided greater clarity about what kinds of development around rail stations would be eligible. In response to these concerns, the Bureau has begun taking steps that could help address them. For example, the Bureau is working to develop an expedited application process—RRIF Express—for RRIF projects that meet certain criteria. As we and the DOT Office of Inspector General have previously reported, sponsors have identified challenges with RRIF that, in some cases, have deterred them from applying to the program, so steps taken by the Bureau to expand use of the program are of particular interest to many sponsors of potential rail projects. Despite these efforts, as stated earlier, the Bureau does not have a written plan to guide its continued implementation efforts, and it does not have a formal mechanism to examine how it could improve its process for working with sponsors. Such a plan and mechanism could help the Bureau better understand and appropriately address sponsors’ concerns with the Bureau’s provision of technical assistance. As discussed earlier, the FAST Act required the Bureau to document major decisions in the application evaluation process and provide a clear rationale for its decisions. Federal standards for internal control also call for management to internally communicate the necessary quality information to achieve its objectives; this communication includes providing management quality information that is necessary for effective oversight. We reviewed documents for six TIFIA and RRIF projects and found the Bureau documented each decision to approve these projects and provided a clear rationale for those decisions. To document decisions about whether to advance and approve these projects, the Bureau used formal meeting agendas and notes from the Credit Review Team and Council meetings and internal memorandums. For example, the Bureau used internal memorandums to record the Secretary’s signature of approval to extend credit to a project. To document the rationale in support of these decisions, the Bureau used internal reports and memorandums. For example, to support its decisions to invite or not invite a project sponsor to submit a formal application, the Credit Review Team provided a description of how the project satisfied program requirements like having a preliminary rating opinion letter and how the project satisfied program creditworthiness standards including the sufficiency of the repayment source or collateral. However, in our review of four projects that received PAB allocations, we found that while the Bureau documented its decision about whether to advance and approve each application, it did not document a clear rationale to support that decision. Specifically, the Bureau recorded decisions in Credit Review Team and Council meeting materials and the approval letter sent to the sponsor. To evaluate a PAB application, the Bureau reviews the application against statutory eligibility requirements and the availability of PAB allocation capacity. We found that the Bureau’s documents in the PAB evaluation process lacked a clear rationale in support of decisions. Specifically, the documents summarized information from the application but did not articulate whether or how the Bureau determined that this summarized information from the application satisfied PAB eligibility and availability requirements. We found that this occurred because the Bureau lacks a policy to document the rationale for how a project meets statutory and DOT requirements in order to advance a PAB application. DOT officials said determining whether a project meets requirements to receive a PAB allocation can be self-evident, and therefore, the application itself can be sufficient documentation. However, absent a documented rationale to support its decisions, it is not immediately clear what information the Bureau cited or used to make decisions about applications through the process. As a result, DOT, the Bureau, and the PAB program could be exposed to risks. For example, we previously reported that programs that do not have defined application review procedures may not review applications consistently and thereby leave the program vulnerable to questions about the integrity of the process. Moreover, as the PAB program nears the $15 billion allocation limit, recording the rationale—including the effect of a proposed allocation—would help ensure DOT’s decision makers receive up-to-date information needed to make informed decisions and manage the program. With the creation of the Bureau, transportation projects seeking financing from DOT have a new, central point of contact for assistance. A concerted initial-planning effort enabled the Bureau to open and start working with project sponsors in just over 6 months after federal law called for its creation. The Bureau has made varied progress on its statutory responsibilities since it was created over 2 years ago. This situation underscores the need to sustain momentum beyond an initial implementation effort, in order to give ongoing planning and attention to additional priorities and tasks and to identify possible improvements based on early experiences. The Bureau was given a challenging task— to serve as a one-stop shop that provides a number of different services and diverse technical resources. However, without an implementation plan and performance indicators, it may not be able to sustain its progress and prioritize its efforts. In response to congressional direction for the Bureau to make changes to streamline the application evaluation process for DOT’s financing programs, the Bureau created a new, consolidated process to accept and evaluate applications. However, the Bureau has not developed an approach to examine whether opportunities for further streamlining and improvement exist. Furthermore, absent clarity about the Bureau’s appetite for risks for its financing programs, sponsors lack information to know if they should invest time and resources applying for TIFIA or RRIF for their projects. Without examining the Bureau’s process and communicating its appetite for risk, the Bureau may be missing an opportunity to address any recurring challenges that may undermine the purpose and availability of its programs. Finally, for the PAB program, the Bureau does not have a policy to document its rationale justifying decisions and that lack of a rationale may leave the Bureau open to challenges regarding its decisions. By providing the rationale for its decisions, the Bureau could engender more trust in these decisions and increase the program’s transparency. We are making the following five recommendations to DOT: The Under Secretary of Transportation for Policy should ensure that the Build America Bureau develop a detailed implementation plan that sets goals and a timeline for the Bureau’s continued efforts, fills vacancies in the Bureau, and prioritizes and sequences work to carry out the multiple responsibilities given to the Bureau in the FAST Act. (Recommendation 1) The Under Secretary of Transportation for Policy should ensure that the Build America Bureau develop performance indicators to assess the Bureau’s progress toward meeting its guiding principles or mission as a “one-stop shop.” (Recommendation 2) The Under Secretary of Transportation for Policy should ensure that the Build America Bureau develop a mechanism to assess the Bureau’s application evaluation process for TIFIA and RRIF and identify and address opportunities to improve and further streamline the process. This evaluation should include mechanisms to solicit feedback from project sponsors that sought financing. (Recommendation 3) The Under Secretary of Transportation for Policy should ensure that the Build America Bureau develop and adopt a public statement that outlines DOT’s and the Bureau’s policy goals and appetite for risk for the TIFIA and RRIF financing programs. (Recommendation 4) The Under Secretary of Transportation for Policy should ensure that the Build America Bureau establish a policy to document a clear rationale to support decisions made in the PAB application evaluation process to explain why an allocation should or should not be approved. (Recommendation 5) We provided a draft of this report to the Department of Transportation for review and comment. In its comments, reproduced in appendix III, DOT concurred with our recommendation to develop performance measures (Recommendation 2) and to assess its application review process (Recommendation 3). DOT did not fully concur with our recommendations to develop a detailed implementation plan (Recommendation 1), adopt a public statement of its policy goals and risk appetite for its financing programs (Recommendation 4), and establish a policy to document the rationale for decisions in the PAB process (Recommendation 5). In its comments, DOT did not provide reasons for disagreeing with these three recommendations. We continue to believe that it is important for DOT to implement these recommendations to help the Bureau prioritize and complete its continued implementation efforts and to help improve the transparency of the Bureau’s processes and decisions for evaluating applications. DOT also provided one technical comment, which we incorporated. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or flemings@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The Fixing America’s Surface Transportation Act (FAST Act) required that the Department of Transportation (DOT) establish a finance bureau to coordinate and consolidate certain surface transportation funding and finance programs. The FAST Act also included a provision for GAO to review the Bureau’s actions to establish procedures for evaluating applications for programs it administers and provide a clear rationale for major decisions in the application evaluation process. We assessed (1) the progress DOT made to establish the Bureau and carry out its responsibilities; (2) the Bureau’s process for evaluating applications and providing technical assistance, including obtaining the views of sponsors and stakeholders; and (3) whether the Bureau, when evaluating applications, has provided a clear rationale for its decisions. In the second objective, we focused on the Bureau’s work evaluating applications and providing technical assistance because these two responsibilities aligned with the mandate for GAO and were responsibilities the Bureau has made the most progress on. To examine DOT’s progress establishing the Bureau, we reviewed DOT and Bureau documents—90-day and yearly implementation progress reports to Congress, operating procedures, job descriptions and position postings for vacant positions, and budget requests—to determine DOT’s plans and progress organizing and staffing the Bureau. We also analyzed reports, including an initial implementation plan, created by a consultant DOT hired in 2016 to help it create and organize the Bureau, and we reviewed the FAST Act and appropriations acts to identify DOT authorities to eliminate and consolidate offices and transfer funds and staff in order to establish the Bureau. We interviewed former and current DOT and Bureau officials to understand DOT’s goals and priorities, coordination with modal administrations, challenges or successes, and key next steps for the Bureau. We selected former DOT and Bureau officials who played key roles to establish or work in the Bureau or that were recommended in our interviews. We also interviewed select associations and advisors about their interactions with the Bureau to date, including observations on its creation, organization, and staffing. We selected associations representing project sponsors that have sought or could seek assistance from the Bureau, that vary in mode and sponsor type, and that vary in terms of experience working with the Bureau since July 2016. We selected advisors that have experience working with multiple project sponsors and that worked with the most sponsors of recently closed TIFIA and RRIF loans. At the end of this appendix, these selected organizations are included in table 2, which lists the individuals and organizations interviewed for this report. In addition, to determine DOT’s and the Bureau’s progress in carrying out responsibilities set out for the Bureau in the FAST Act, we examined DOT and Bureau documents, such as the Credit Programs Guide and Build America Bureau Processes and Governance Manual, and procedures, documents, and other information publicly available on the Bureau’s website. We supplemented this information with interviews with DOT and Bureau officials to understand the progress the Bureau made for each responsibility and how the Bureau prioritized its approach to fulfilling these responsibilities overall. We also used these interviews to understand the Bureau’s timeline or strategy for fulfilling each responsibility in the future or the cause of no action to date for responsibilities on which the Bureau has taken limited or no action, as well as to understand what metrics or performance measures DOT established to track its progress or outcomes for these responsibilities. We also asked stakeholders we interviewed—including select former DOT officials, associations, and advisors, selected as described above— about their observations on the Bureau’s progress in carrying out these responsibilities. We compared DOT’s and the Bureau’s efforts to federal standards for internal control and key practices for organizational transformations. To assess the Bureau’s process for evaluating applications and providing technical assistance, we reviewed the Credit Programs Guide and other Bureau documents and interviewed Bureau officials to determine the phases and steps in the process. We also reviewed these documents and interviewed Bureau officials to understand the changes DOT made to combine and consolidate existing processes. Our review of the process of evaluating applications included semi-structured interviews with selected project sponsors and stakeholders to understand their experiences using the application evaluation process, experiences working with the Bureau, and comparisons of the application process before and after the Bureau was created, if applicable. First, we selected sponsors for the 10 projects for which we reviewed application documents, as described below, to determine whether the Bureau provided a clear rationale for its decisions. Second, we selected other stakeholders—including advisors and associations (as described above) and projects sponsors with experience applying for DOT financing both before and after the Bureau was created. Among these project sponsors, we selected three projects that had multiple loans; used special authorities or agreements (i.e., master credit agreement); or employed public-private partnerships to deliver projects. Five additional project sponsors, selected as part of other samples described in this appendix, had experience with some part of the TIFIA or RRIF application evaluation process under the Bureau, so we asked these sponsors questions on this part of the process. We analyzed the interview responses by categorizing them based on the extent to which respondents said the process was quick, streamlined, and transparent; what in the process was most useful and most challenging; suggestions for improving the process; and overall satisfaction or dissatisfaction with the process. Furthermore, our review of the Bureau’s process for providing technical assistance included analyzing the Bureau’s data to describe the projects that have sought assistance from the Bureau since it opened by mode, location, type of financing pursued, and step reached in the application process. For technical assistance, we focused on project-specific assistance provided by the Outreach and Project Development Office before a project enters the creditworthiness review phase—referred to as initial engagement and project development. We reviewed the Bureau’s data on projects from April 2018 as well as updated data from August 2018. To assess the reliability of these data, we reviewed relevant documents and interviewed Bureau officials responsible for overseeing the data to learn how information was entered, maintained, and reviewed. We also reviewed relevant data elements for missing data, outliers, and obvious errors. Based on these steps we determined that the data were sufficiently reliable for the purpose of describing the number and type of projects that worked with the Bureau and selecting project sponsors to interview. We also conducted semi-structured interviews with project sponsors to understand their experiences working with the Bureau during the initial engagement and project development phases. In these interviews, we asked sponsors whether the Bureau serves as a single DOT point of contact and provides access to its finance programs with greater speed and transparency; for projects no longer seeking assistance from the Bureau, we asked about the reasons for doing so. Among project sponsors actively working with the Bureau, we identified 32 projects that began working with the Bureau after it was created in July 2016, that had met with or been in contact with the Bureau in the 6 months prior to April 2018, and that the Bureau ranked as 2 or higher on its readiness scale. Of these projects, we selected 13 sponsors to ensure variety in project status (i.e., initial engagement, project development, creditworthiness), mode, total project cost, prior experience with DOT’s financing programs, and location. Among project sponsors no longer actively working with the Bureau, we identified 10 projects that began working with the Bureau after it was created in July 2016 and had at least two interactions with the Bureau, based on available data. We selected 5 of these sponsors to interview to ensure variation in mode and location. For the Bureau’s provision of technical assistance, we categorized the responses to questions in terms of which interactions with the Bureau were most useful and most challenging, suggestions for improving the process, and overall satisfaction or dissatisfaction. For inactive project sponsors, we categorized responses according to reasons the project became inactive or withdrew from working with the Bureau, and what other financing, if any, was used for the project. Table 2 below lists project sponsors and other organizations we interviewed. Overall, we assessed the Bureau’s process for evaluating applications and providing technical assistance and the collected evidence against federal standards for internal control and Office of Management and Budget’s guidance for agencies that manage financing programs. To assess whether the Bureau provided a clear rationale for its decisions when evaluating applications, we reviewed the Credit Programs Guide and other Bureau documents to identify steps and major decision points and accompanying documents in the application evaluation process. We identified 5 major decision points for TIFIA and RRIF and 3 major decision points for PAB. We also used these documents to identify evaluation criteria for each major decision point (i.e., the information or requirements that the Bureau says must be considered at each decision point) to use to assess whether the Bureau provided a clear rationale for each decision point. We confirmed our list of steps and major decision points, as well as accompanying documents, with Bureau staff responsible for the financing programs. We did not examine whether the Bureau documented decisions for the grant funding program it administers, and we have previously evaluated this program and also have work in progress to evaluate it. To assess whether the Bureau followed these procedures and documented major decisions and rationale, we selected projects that went through most of the application process after the Bureau updated its process in September 2016. For TIFIA and RRIF, these are projects that completed the first or second decision point—being invited to enter creditworthiness or being invited to submit a formal application—and had signed credit agreements as of March 31, 2018. We selected all three projects that completed the first decision point and had signed credit agreements. We selected 3 of the 5 projects that completed the second decision point and had signed credit agreements to ensure variation in type of sponsor (e.g., state or local government, private entity), mode, and size of loan. For PAB, we selected all four projects that submitted an application after September 2016 and received an allocation as of March 2018. For each selected project, we reviewed Bureau documents, including meeting agendas and summaries, memos, summaries of financial analyses, and letters to sponsors. Two GAO staff independently reviewed these documents to determine if the Bureau documented and provided a clear rationale for each major decision point, comparing the documents against practices in the Bureau’s application evaluation process and federal standards for internal control. Using Bureau documents, we also calculated how much time it took for each project to move between each step and decision point and determined whether each project met its anticipated financial close date. We did not compare the amount of time it took for these projects to complete the application process to projects that received financing before DOT created the Bureau because the steps and decision points for the application process changed. However, we interviewed Bureau officials to understand the application evaluation process and the 10 projects we selected. We also drew on past GAO work and that of others to understand past findings and challenges for the financing programs before the Bureau was created. The consultant’s initial implementation plan for the Build America Bureau (Bureau)—created by the consultant while working with the Department of Transportation’s (DOT) internal committees—outlined an organizational structure with responsibilities and roles for its positions. Most positions resided in three offices that administer specific programs or provide technical assistance to sponsors. The Outreach and Project Development Office works to educate project sponsors about how they can best combine DOT’s financing and funding programs as well as innovative project delivery approaches. The implementation plan envisioned a director to manage the office, general project development lead positions to conduct outreach and provide assistance to sponsors on specific projects, and specialized project development lead positions with expertise in a particular area, such as rail or maritime, to help sponsors with more complex projects and to provide technical assistance to other sponsors and staff in the Bureau. The plan also envisioned best practices positions with expertise in public-private partnerships, transit-oriented development, or federal permitting. The Credit Programs Office administers the application processes for the Transportation Infrastructure Finance and Innovation Act (TIFIA) and Railroad Rehabilitation and Improvement Financing (RRIF) programs. The implementation plan envisioned a director to manage the office with the remaining positions split among three areas: underwriting positions to review and evaluate project applications, portfolio management positions to manage existing credit agreements, and risk management positions to evaluate project- specific risks, conduct audit activities, and carry out other risk and budget activities. Underwriting staff, for example, conduct an in-depth review of a project application that includes evaluating the plan of finance and feasibility of the revenue stream pledged to repay credit assistance or sufficiency of other pledged collateral. For the Infrastructure for Rebuilding America (INFRA) Grants Office, the structure envisioned a director and additional positions to administer the competitive grant program. Beyond these offices, the initial implementation plan proposed an Executive Director, as required by statute, to lead the Bureau’s work and positions to support the entire Bureau. The organizational structure also included additional positions to provide full-time legal support to the Bureau, which are housed in DOT’s Office of General Counsel. Our analysis—based on Bureau documents and discussions with Bureau officials—shows that when the Bureau opened in July 2016, 7 months after the Fixing America’s Surface Transportation Act (FAST Act) was enacted, it largely followed the envisioned structure. When the Bureau opened in July 2016, DOT detailed or transferred 29 staff to run the Bureau. Twenty-five of these staff filled positions in the Bureau’s three offices, and the four remaining staff filled positions in the Office of General Counsel that provided dedicated legal services to the Bureau. These staff came from other parts of DOT as follows: Federal Highway Administration (FHWA). DOT detailed 16 staff from FHWA’s TIFIA Joint Program Office to the Bureau, primarily to work in the Bureau’s Credit Programs Office. DOT also detailed three attorneys from FHWA’s Office of the Chief Counsel to the Office of General Counsel. Federal Railroad Administration (FRA). DOT transferred five staff from FRA to the Bureau’s Credit Programs Office. Federal Transit Administration (FTA). DOT transferred one attorney from this modal administration to the Office of General Counsel. Maritime Administration. DOT transferred one staff member from this modal administration to the Bureau to work in the Outreach and Project Development Office. Office of the Secretary of Transportation (OST). DOT transferred the remaining three staff from the Build America Transportation Investment Center to work in the Outreach and Project Development Office and in Bureau leadership and support roles. DOT, in opening the Bureau, did not fill any of the positions in the INFRA Grants Office. According to current and former DOT officials, DOT used staff in OST that administer another competitive grant funding program to administer the first round of INFRA grants, as noted above. This decision also allowed DOT to move quickly to make grants for the first round of funding. At the same time, DOT officials told us that no funding was provided specifically to administer the INFRA program, so hiring staff to fill those envisioned positions would have diverted resources from other Bureau priorities. In addition, one OST staff person who both worked on the INFRA program and managed the Private Activity Bonds (PAB) program continued to manage PAB after the Bureau took over administration of that program while staying in OST. DOT also decided to leverage other DOT offices and modal administrations to carry out some of the Bureau’s work. Bureau officials stated that this model allows the Bureau to realize efficiencies by using the expertise and support of existing DOT offices rather than duplicating this expertise and support. Figure 2 summarizes the DOT offices that the Bureau interacts with, based on our analysis of Bureau and DOT documents and interviews with Bureau officials. Support provided by other offices within OST: As noted above, the Office of Infrastructure Finance and Innovation administers the INFRA program, leveraging the experience and knowledge of staff in that office that administer another competitive grant program. The Bureau also coordinates with the Infrastructure Permitting Improvement Center on its FAST Act responsibilities related to environmental reviews and permitting. Expertise from DOT’s modal administrations: Designated liaisons in FRA, FTA, FHWA, and the Maritime Administration coordinate with the Bureau to help assess project readiness or identify issues on projects applying for financing, such as ongoing litigation or work remaining on environmental reviews. Liaisons are funded by their modal administration and told us that they spend anywhere from 10 to 75 percent of their time serving as a liaison to the Bureau. The FAST Act gave DOT authority to consolidate or eliminate offices and positions when creating the Bureau. When the Bureau opened in July 2016, DOT eliminated the FRA office that administered RRIF and the Build America Transportation Investment Center as staff and functions transferred to the Bureau. DOT also plans to eliminate the TIFIA Joint Program Office—the office that FHWA staff detailed to the Bureau formerly worked in. According to DOT officials, the FHWA staff from that office are fully integrated and working in the Bureau; however, these staff will remain FHWA employees until DOT completes actions to transfer funds and staff to the Bureau and formally eliminate that office. See below for more detail on the transfer of funds and staff. DOT officials said it was easier to eliminate FRA’s RRIF office than the TIFIA Joint Program Office because the RRIF office did not have dedicated administrative funding like the TIFIA office did and FRA employees worked on RRIF as one of several duties. After opening and operating the Bureau, DOT made minor changes to the initial organizational structure. According to DOT officials, the Bureau has evolved and changed since it began operations—as would occur for any new office—and its current structure differs in various ways from its initial structure. Based upon the Bureau’s early experience, it eliminated 7 proposed positions: 1 position providing legal support, 3 positions for outreach to sponsors, 2 for addressing risk management, and 1 for managing the Bureau’s portfolio. The Bureau decided to eliminate the outreach positions because despite earlier findings that DOT’s TIFIA and RRIF programs were underutilized, officials discovered that more sponsors than expected were interested in those financing programs. The Bureau also added 5 positions that had not been initially proposed: 2 underwriter positions and 3 positions that work across individual Bureau offices. These cross-Bureau positions handle several duties, including budget, human resources, and procurement issues for the Bureau, working closely with the Office of the Under Secretary for Policy. Funding for the Bureau currently comes from three sources, though DOT officials said they want to consolidate all funding for the Bureau in OST. First, 12 positions are funded through appropriations from general revenues to OST specifically for the Bureau. The President’s budget request has requested funding to support these 12 positions since fiscal year 2017. Second, 23 positions for the TIFIA program are funded through appropriations from the Highway Trust Fund. This funding cannot be used for positions that do not work on matters involving the TIFIA program, unless it is formally transferred to the Bureau, according to DOT. Third, the remaining 8 positions identified in the Bureau organizational chart are not carried out by Bureau employees. Instead, they are carried out by contractors and employees supported by other units of DOT, an approach that Bureau officials said is consistent with the missions of those other units and the Bureau. For instance, FHWA funds two positions in the Outreach and Project Development Office, outside of funding for TIFIA. DOT’s initial ability to transfer funds under the FAST Act to support the Bureau ended in December 2017; according to Bureau officials, this impaired the Bureau’s ability to finish steps to formally consolidate staff who are paid from the Highway Trust Fund. Due to how funds for TIFIA are authorized to FHWA in the FAST Act, DOT needed to receive transfer authority beyond December 2017 so that it could maintain its ability to pay Highway Trust-funded employees in future years after they are formally transferred to OST and paid from OST’s budget. In early 2018, DOT’s ability to transfer funds was extended in the fiscal year 2018 Consolidated Appropriations Act. DOT provided information to the appropriations committees on transferring funds and consolidating offices, as required in statute, and is awaiting a response from these committees. See figure 3 below for position titles, locations in the organization, and funding sources as of October 2018. The Bureau has had many vacant positions since it opened in July 2016, based on our interviews with current and former DOT officials and our review of Bureau documents. In the 6 months after the Bureau opened, DOT filled some positions, including competitively selecting an Executive Director. Then, in early 2017, DOT and other executive branch agencies were subject to a hiring freeze for about 3 months. However, in the time since the end of the hiring freeze, we found that the Bureau has continued to have many vacant positions (see fig. 4). The Executive Director position has been vacant since the person previously in that role stepped down in November 2017. DOT posted an unsuccessful announcement for this position in November 2017, followed by a second announcement in April 2018 that largely matched the earlier announcement. Beyond the Executive Director, the Bureau has had between 8 and 11 vacant positions in its organizational structure throughout 2018. Some positions, such as the Deputy Executive Director position, have never been filled. Other positions were filled but became vacant as staff left the Bureau for other opportunities. According to our analysis of Bureau documents, 16 of the 29 staff who were detailed or transferred to work in or for the Bureau when it was created in July 2016 remained in the Bureau as of August 2018. DOT and Bureau officials said that DOT did not want to fill vacant positions in the Bureau before filling the Executive Director position, as hiring is one of that position’s duties. Therefore, between fall 2017 and spring 2018, while the Executive Director position was vacant, DOT did not actively fill other vacancies, instead taking a “wait and see” approach, according to DOT and Bureau officials. However, in spring 2018, DOT and Bureau officials said they identified 5 critical vacancies to fill but were not able to provide a written document that laid out a hiring plan or sequence for filling the remaining positions. As of October 2018, Bureau officials said they had filled 5 positions and are in various stages of filling all the remaining vacant positions, either planning to write position descriptions, working with human resources to post jobs, or are in the hiring process. Finally, according to DOT and Bureau officials, DOT continues to use other OST staff to administer INFRA because of uncertainties related to the Bureau’s funding sources. However, DOT and Bureau officials said that many members of the team that oversees the INFRA evaluation process are also members of the Council on Credit and Finance, so the Bureau has an indirect role in the program. The Bureau has used detailees and contractors to fill vacant positions in the Outreach and Project Development Office. This office, unlike the Credit Programs Office, did not have an existing program or a large existing office to fill its positions from. Since July 2016, four detailees from other parts of DOT have filled positions in the Outreach and Project Development Office—the project development or specialized project development lead positions—on short, 4 to 6 month terms. Two of these detailees were reassigned permanently to these positions in the Bureau in summer 2018, and the other two detailees returned to their prior roles. Recently, the Bureau filled one additional such positon with a 2-year detailee from the Federal Aviation Administration. Finally, the Bureau filled two other positions with staff provided through an interagency agreement with the John A. Volpe National Transportation Systems Center effective through fiscal year 2020. In addition to the contact named above, Steve Cohen (Assistant Director); Joanie Lofgren (Analyst in Charge); Lauren Friedman; David Hooper; Lauren Lynch; Ned Malone; Malika Rice; Amy Rosewarne; and Michael Sweet made key contributions to this report.", "summary": "Constructing surface transportation projects can be long endeavors and involve multiple DOT offices. The 2015 Fixing America's Surface Transportation Act (FAST Act) required DOT to establish a finance bureau to consolidate certain funding and financing programs. The FAST Act further required that DOT improve procedures for evaluating applications for these programs—including providing a clear rationale for decisions and streamlining the process. The FAST Act also gave this finance bureau other responsibilities such as promoting best practices for innovative financing. In response, DOT opened the Build America Bureau in July 2016. The FAST Act included a provision for GAO to review the Bureau. This report assesses, among other things, (1) progress DOT made to establish the Bureau and carry out its responsibilities, (2) the Bureau's process for evaluating applications, and (3) whether the Bureau provided a clear rationale for decisions in that process. GAO reviewed federal laws and Bureau documents and interviewed DOT officials and selected stakeholders, including 28 project sponsors selected so projects varied by mode, cost, and outcome. The Department of Transportation (DOT) has taken initial steps to establish the Build America Bureau's (Bureau) organizational structure and to create a process to help the Bureau carry out some of its responsibilities since it was created in 2016. However, the Bureau lacks a plan to guide its ongoing and future efforts. Initial steps included creating a consolidated process to evaluate applications for three financing programs: Transportation Infrastructure Finance and Innovation Act (TIFIA), Railroad Rehabilitation and Improvement Financing (RRIF), and Private Activity Bonds (PAB). DOT largely based this consolidated process on prior practices used for individual programs but also sought to improve and streamline the process. For example, DOT formed a decision-making body that meets more frequently than a predecessor group to quickly address issues and to decide when to advance projects through the process. However, progress has been more limited in implementing other responsibilities, such as promoting best practices for innovative financing. While some of the lack of progress can be attributed to factors such as changes in leadership and staff, the Bureau lacks a plan with implementation goals and a timeline to guide its ongoing and future efforts and also lacks performance indicators to assess its progress. Without these tools, the Bureau may face difficulties prioritizing work to carry out other responsibilities and maintaining momentum throughout continued implementation efforts and any future changes in leadership and staff. While the Bureau has taken steps to improve and streamline the application evaluation process, it does not have a mechanism to assess how well the process works—including what is challenging and what works well. Project sponsors GAO interviewed had mixed views on the Bureau's application evaluation process and whether it was streamlined. Selected sponsors that applied for TIFIA and RRIF financing identified challenges with the process, including the length of the process and changes to requirements or terms for a loan. For example, sponsors said the Bureau took longer than it had estimated to procure external advisors to help conduct its evaluation of applications. According to the sponsors, such delays and uncertainty led to cost increases for two projects and construction delays for one project. Bureau officials noted that many factors outside the Bureau's control influence the length of the application evaluation process, such as changes to a project's scope and construction cost estimates. However, the Bureau has not taken steps, such as consistently soliciting feedback from sponsors, to assess how to further improve and streamline its process. Without taking such steps, the Bureau is missing an opportunity to further streamline the process and to ensure that any challenges do not discourage sponsors from seeking the Bureau's financing programs. GAO found that the Bureau provided a clear rationale for decisions to advance or approve projects in the TIFIA and RRIF programs but did not do so for the PAB program. While DOT did document the decisions made in each step of the application evaluation process for the PAB program, the lack of a documented rationale to support these decisions leaves that program open to questions about the integrity of its process, as it is not immediately clear how the Bureau determined that an application satisfied requirements and what information was used to support decisions that advanced projects. GAO is making five recommendations, including that the Bureau develop a plan to guide its efforts and assess ways to further improve the application evaluation process. DOT concurred with two but did not fully concur with three of the recommendations and provided no rationale. GAO continues to believe the recommendations are valid as discussed in the report.", "document_type": "gao"}
{"report": "Consistent with the discretion afforded by the APA, Regulations.gov and agency-specific comment websites use required and optional fields on comment forms to collect some identity information from commenters. In addition to the text of the comment, agencies may choose to collect identity information by requiring commenters to fill in other fields, such as name, address, and email address before they are able to submit a comment. Regardless of the fields required by the comment form, the selected agencies all accept anonymous comments in practice. Further, because the APA does not require agencies to authenticate submitted identity information, neither Regulations.gov nor the agency-specific comment websites contain mechanisms to check the validity of identity information that commenters submit through comment forms. Regulations.gov and agency-specific comment websites also collect some information about public users’ interaction with their websites through application event logs and proxy server logs, though the APA does not require agencies to collect or verify it as part of the rulemaking process. This information, which can include a public user’s Internet Protocol (IP) address, browser type and operating system, and the time and date of webpage visits, is collected separately from the comment submission process as part of routine information technology management of system security and performance, and cannot be reliably connected to specific comments. Seven of 10 selected agencies have documented some internal guidance associated with the identity of commenters during the three phases of the public comment process: intake, analysis, and response to comments. However, the focus and substance of this guidance varies by agency and phase of the comment process. As shown in table 1, for selected agencies that have guidance associated with the identity of commenters, the guidance most frequently relates to the comment intake or response to comment phases of the public comment process. The guidance for these phases addresses activities such as managing duplicate comments (those with identical or near-identical comment text but varied identity information) or referring to commenters in a final rule. Agencies are not required by the APA to develop internal guidance associated with the public comment process generally, or identity information specifically. Within the discretion afforded by the APA, the 10 selected agencies’ treatment of identity information during the comment intake, comment analysis, and response to comments phases of the public comment process varies. Selected agencies differ in how they treat identity information during the comment intake phase, particularly in terms of how they post duplicate comments, which can lead to identity information being inconsistently presented to public users of comment systems. With regard to the comment intake phase in particular, the variation in how agencies identify duplicate comments and post comments results in identity information being inconsistently presented on Regulations.gov or the agency-specific websites. Generally, officials told us that their agencies either (1) maintain all comments within the comment system or (2) maintain some duplicate comment records outside of the comment system, for instance, in email file archives. For example, according to officials of one participating agency—the Wage and Hour Division (WHD)—all duplicate comments are stored in Regulations.gov. Our analysis of WHD comments did not suggest that any comments were missing from Regulations.gov. However, in one example, almost 18,000 duplicate comments were included in attachments under one individual’s name in the comment title. While all of the comments are included within 10 separate attachments, none of the identity information included with these comments can be easily found without manually opening and searching all 10 attachments, most of which contain approximately 2,000 individual comments. Selected agencies’ treatment of identity information during the comment analysis phase also varies. Specifically, program offices with the responsibility for analyzing comments place varied importance on identity information during the analysis phase. Finally, all agencies draft a response to comments with their final rule, but the extent to which the agencies identify commenters or commenter types in their response also varies across the selected agencies. Our analysis of Regulations.gov and agency-specific comment websites shows that the varied comment posting practices of the 10 selected agencies are not always documented or clearly communicated to public users of the websites. In part to facilitate effective public participation in the rulemaking process, the E-Government Act of 2002 requires that all public comments and other materials associated with a given rulemaking should be made “publicly available online to the extent practicable.” Additionally, key practices for transparently reporting open government data state that federal government websites—like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. We found that the selected agencies we reviewed do not effectively communicate the limitations and inconsistencies in how they post identity information associated with public comments. As a result, public users of the comment websites lack information related to data availability and limitations that could affect their ability to use and make informed decisions about the comment data and effectively participate in the rulemaking process themselves. Public users of Regulations.gov seeking to submit a comment are provided with a blanket disclosure statement related to how their identity information may be disclosed, and are generally directed to individual agency websites for additional detail about submitting comments. While additional information is provided in the Privacy Notice, User Notice, and Privacy Impact Assessment for Regulations.gov, public users are not provided any further detail on Regulations.gov regarding what information, including identity information, they should expect to find in the comment data. Additionally, there is not enough information to help public users determine whether all of the individual comments and associated identity information are posted. Available resources on Regulations.gov direct public users to participating agencies’ websites for additional information about agency-specific review and posting policies. Seven of the eight participating agencies’ websites direct public users back to Regulations.gov and the Federal Register, either on webpages that are about the public comment process in general, or on pages containing information about specific NPRMs. Three of these participating agencies—the Environmental Protection Agency (EPA), Fish and Wildlife Service (FWS), and Food and Drug Administration (FDA)—do provide public users with information beyond directing them back to Regulations.gov or the Federal Register, but only FDA provides users with details about posting practices that are not also made available on Regulations.gov. The eighth participating agency—the Employee Benefits Security Administration (EBSA)—does not direct public users back to Regulations.gov, and instead re-creates all rulemaking materials for each NPRM on its own website, including individual links to each submitted comment. However, these links go directly to comment files, and do not link to Regulations.gov. While EBSA follows departmental guidance associated with posting duplicate comments, which allows some discretion in posting practices, the agency does not have a policy for how comments are posted to Regulations.gov or its own website. Further, in the examples we reviewed, the content of the NPRM-specific pages on EBSA’s website does not always match what is posted to Regulations.gov. Because participating agencies are not required to adhere to standardized posting practices, Regulations.gov directs public users to participating agency websites for additional information about posting practices and potential data limitations. However, these websites do not describe the limitations associated with the identity information contained in publicly posted comments. As allowed for under the APA, all of the participating agencies in our review vary in the way in which they post identity information associated with comments—particularly duplicate comments. However, the lack of accompanying disclosures may potentially lead users to assume, for example, that only one entity has weighed in on an issue when, actually, that comment represents 500 comments. Without better information about the posting process, the inconsistency in the way in which duplicate comments are presented to public users of Regulations.gov limits public users’ ability to explore and use the data and could lead users to draw inaccurate conclusions about the public comments that were submitted and how agencies considered them during the rulemaking process. Both nonparticipating agencies use comment systems other than Regulations.gov and follow standardized posting processes associated with public comments submitted to their respective comment systems, but the Securities and Exchange Commission (SEC) has not clearly communicated these practices to the public. Although it appears to users of the SEC website that the agency follows a consistent process for posting duplicate comments, at the time of our June 2019 report, this practice had not been documented or communicated to public users of its website. In contrast, FCC identifies its policies for posting comments and their associated identity information in a number of places on the FCC.gov website, and on its Electronic Comment Filing System (ECFS) web page within the general website. Regarding comments submitted to rulemaking proceedings through ECFS, public users are informed that all information submitted with comments, including identity information, will be made public. Our review of ECFS comment data did not identify discrepancies with this practice. Although the public comment process allows interested parties to state their views about prospective rules, the lack of communication with the public about the way in which agencies treat identity information during the posting process, particularly for duplicate comments, may inhibit users’ meaningful participation in the rulemaking process. While the APA does not include requirements for commenters to provide identity information, or for agency officials to include commenters’ identity as part of their consideration of comments, key practices for transparently reporting open government data state that federal government websites— like those used to facilitate the public comment process—should fully describe the data that are made available to the public, including by disclosing data sources and limitations. In our June 2019 report, we made eight recommendations. Specifically, we recommended that five of the selected agencies establish a policy for posting comments, and that those five agencies plus three others take action to more clearly communicate their policies for posting comments, particularly with regard to identity information and duplicate comments. The eight agencies generally agreed with our recommendations and identified actions they planned to take in response, such as developing policies for posting duplicate comments and communicating those in various ways to public users. Since issuing our June 2019 report, SEC has taken action that is responsive to the recommendation we made to it. Specifically, in September 2019, SEC issued a memorandum that reflects SEC’s internal policies for posting duplicate comments and associated identity information. In addition, SEC has communicated these policies to public users on the SEC.gov website by adding a disclaimer on the main comment posting page that describes how the agency posts comments. Chairmen Portman and Lankford, Ranking Members Carper and Sinema, and Members of the Subcommittees, this concludes my prepared remarks. I would be happy to answer any questions you may have at this time. For further information regarding this testimony, please contact Seto J. Bagdoyan, (202) 512-6722 or bagdoyans@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony are David Bruno (Assistant Director), Elizabeth Kowalewski (Analyst in Charge), and Dahlia Darwiche. Other individuals who also contributed to the report on which this testimony is based include Enyinnaya David Aja, Gretel Clarke, Lauren Kirkpatrick, James Murphy, Alexandria Palmer, Carl Ramirez, Shana Wallace, and April Yeaney. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal agencies publish on average 3,700 proposed rules yearly and are generally required to provide interested persons (commenters) an opportunity to comment on these rules. In recent years, some high-profile rulemakings have received extremely large numbers of comments, raising questions about how agencies manage the identity information associated with comments. While the APA does not require the disclosure of identifying information from a commenter, agencies may choose to collect this information. This testimony summarizes GAO's June 2019 report on public comment posting practices (GAO-19-483). In that report, GAO examined (1) the identity information collected by comment websites; (2) the guidance agencies have related to the identity of commenters; (3) how selected agencies treat identity information; and (4) the extent to which selected agencies clearly communicate their practices associated with identity information. The agencies were selected on the basis of the volume of public comments they received on rulemakings. For this testimony, GAO obtained updates on the status of recommendations made to the selected agencies. The Administrative Procedure Act (APA) governs the process by which many federal agencies develop and issue regulations, which includes the public comment process (see figure). In June 2019, GAO found that Regulations.gov and agency-specific comment websites collect some identity information—such as name, email, or address—from commenters who choose to provide it during the public comment process. The APA does not require commenters to disclose identity information when submitting comments. In addition, agencies have no obligation under the APA to verify the identity of such parties during the rulemaking process. GAO found in the June 2019 report that seven of 10 selected agencies have some internal guidance associated with the identity of commenters, but the substance varies. This reflects the differences in the way that the selected agencies handle commenter identity information internally. GAO also found that the selected agencies' practices for posting public comments to comment websites vary considerably, particularly for duplicate comments (identical or near-identical comment text but varied identity information). For example, one agency posts a single example of duplicate comments and indicates the total number of comments received, but only the example is available to public users of Regulations.gov. In contrast, other agencies post all comments individually. As a result, identity information submitted with comments is inconsistently presented on public websites. The APA allows agencies discretion in how they post comments, but GAO found that selected agencies do not clearly communicate their practices for how comments and identity information are posted. GAO's key practices for transparently reporting government data state that federal government websites should disclose data sources and limitations to help public users make informed decisions about how to use the data. If not, public users of the comment websites could reach inaccurate conclusions about who submitted a particular comment, or how many individuals commented on an issue. In June 2019, GAO made recommendations to eight of the selected agencies regarding implementing and communicating public comment posting policies. The agencies generally agreed with the recommendations and identified action they planned to take in response. Since the June 2019 report, one agency has implemented GAO's recommendation.", "document_type": "gao"}
{"report": "VA has purchased health care services from community providers since as early as 1945. In general, veterans may be eligible for community care when they are faced with long wait times or travel long distances for appointments at VA medical facilities, or when a VA medical facility is unable to provide certain specialty care services, such as cardiology or orthopedics. In general, community care services must be authorized in advance of when veterans access the care. Currently, there are several community care programs through which VA purchases hospital care and medical services for veterans, including the Choice Program. In implementing the VA MISSION Act, VA plans to consolidate four of its community care programs for veterans under the Veterans Community Care Program, which is expected to go into effect by June 2019. (See table 1.) VA also provides health care services to veterans and other eligible beneficiaries through community providers under additional benefit programs. These benefit programs include the Civilian Health and Medical Program of the Department of Veterans Affairs (CHAMPVA) and the Camp Lejeune Family Member Program, among others. After implementing the VA MISSION Act, VA will continue to operate the community care programs for other eligible beneficiaries, such as CHAMPVA and others, as it has historically done. Appendix I contains more information about VA’s community care programs. The amount of funding VA receives to provide its health care services is determined during the annual appropriations process. In preparation for the process, VA develops an estimate of the resources needed to provide its health care services—known as its health care budget estimate—for two fiscal years. This budget estimate is one step in a complex, multistep budget formulation process, which culminates in an appropriation request for VA health care that updates the earlier, advance appropriation request for the upcoming fiscal year and an advance appropriation request for the next fiscal year in the President’s annual budget request to Congress. VA’s health care budget estimate includes the total cost of providing health care services, including direct patient costs, as well as costs associated with management, administration, and maintenance of facilities. VA uses its Enrollee Health Care Projection Model (EHCPM) to estimate the majority of resources needed to meet the expected demand for health care services, and uses other methods for the remaining services. VA uses the EHCPM to make projections 3 and 4 years into the future for budget purposes based on data from the most recent fiscal year. For example, in 2017, VA used data from fiscal year 2016 to develop its health care budget estimate for the fiscal year 2019 request and advance appropriation request for fiscal year 2020. The EHCPM’s estimates are based on three basic components: (1) the projected number of veterans who will be enrolled in VA health care, (2) the projected quantity of health care services enrollees are expected to use, and (3) the projected unit cost of providing these services. Each component is subject to a number of complex adjustments to account for the characteristics of VA health care and the veterans who access VA’s health care services. (See fig. 1.) VA uses other methods to estimate resources needed for the remaining portion of its budget estimate. This portion of the budget includes the state home per diem program, CHAMPVA, and other health care programs for veterans and other eligible beneficiaries, as well as health- care-related initiatives proposed by the Secretary of Veterans Affairs or the President. (See app. II for more information about the other methods VA uses in developing its health care budget estimate.) VHA generally starts to develop a health care budget estimate approximately 10 months before the President submits the budget to Congress, which should occur no later than the first Monday in February. The budget estimate changes during the 10-month budget formulation process, in part, due to successively higher levels of review in VA and OMB before the President’s budget request is submitted to Congress. (See table 2.) The Secretary of Veterans Affairs considers the health care budget estimate developed by VHA when assessing resource requirements among competing interests within VA, and OMB considers overall resource needs and competing priorities of other agencies when deciding the level of funding requested for VA’s health care services. OMB passes back decisions, known as a “passback,” to VA and other agencies on their budget estimate, along with funding and policy proposals to be included in the President’s budget request. VA has an opportunity to appeal the passback decisions before OMB finalizes the President’s budget request. Concurrently, VA prepares a congressional budget justification that provides details supporting the policy and funding decisions in the President’s budget request. As of fiscal year 2017, VA primarily receives funding for all health care it provides or purchases through the following appropriation accounts: Medical Services: health care services provided to eligible veterans and other beneficiaries in VA facilities and non-VA facilities, among other things. Medical Community Care: health care services that VA authorizes for veterans and other beneficiaries to receive from community providers. Medical Support and Compliance: the administration of the medical, hospital, nursing home, domiciliary, supply, and research activities authorized under VA’s health care system, among other things. Medical Facilities: the operation and maintenance of VHA’s capital infrastructure, such as the costs associated with nonrecurring maintenance, leases, utilities, facility repair, laundry services, and groundskeeping, among other things. Separate from VA’s health care appropriation accounts, the Veterans Access, Choice, and Accountability Act of 2014 provided $10 billion in funding for the Choice Program, which was implemented in early fiscal year 2015 and authorized until funds were exhausted or through August 7, 2017, whichever occurred first. However, VA received additional authority and funding to maintain the Choice Program through June 6, 2019, when the new Veterans Community Care Program is expected to go into effect. VA expects that the new Veterans Community Care Program will be primarily funded through the Medical Community Care appropriation account. Our analysis of VA budget justification data shows that from fiscal year 2014 through fiscal year 2018, the total amount VA actually obligated for community care increased 82 percent, from $8.2 billion to $14.9 billion. Since VA implemented the Choice Program in fiscal year 2015, the share of VA’s obligations for community care relative to VA’s total obligations for health care services increased through fiscal year 2018, from about 14 to 19 percent of VA’s total obligations for health care services. By fiscal year 2021, VA estimates that the total amount obligated for community care will increase to $17.8 billion, an increase of about 20 percent from the $14.9 billion in actual obligations for fiscal year 2018. (See fig. 2.) As figure 2 shows, the largest increase in actual obligations for community care occurred from fiscal years 2015 through 2016, when they increased by $3.4 billion, from $8.9 billion to $12.3 billion. According to VA officials, this increase in obligations during this period reflected veterans’ expanded use of community care through the Choice Program, as more providers participated in the provider networks established by third-party administrators or entered into provider agreements with VA facilities. (Fig. 3 provides information on VA’s obligations for community care by the Choice Program and by other community care programs.) The increase in actual obligations for community care from fiscal year 2016 through fiscal year 2017 was also largely due to expanded use of community care through the Choice Program. VA officials attributed this increase to efforts to obligate as much of the available Choice Program funding as possible before the anticipated end of the Choice Program in August of 2017. From fiscal years 2017 through 2018, obligations for community care continued to increase, but the increase was partially due to greater use of other community care programs, according to VA officials. From fiscal years 2014 through 2018, the increases in total actual obligations for VA community care were driven largely by increases in obligations for outpatient and inpatient services. Over this time period, VA’s actual obligations for outpatient services increased by $2 billion, from $2.3 billion to $4.3 billion, and actual obligations for inpatient services increased by $818 million, from $1.8 billion to $2.7 billion. Figure 4 illustrates how outpatient and inpatient services accounted for most of VA’s total community care obligations for fiscal year 2018. VA estimated that from fiscal years 2019 through 2021, obligations for community care will increase to $17.8 billion, which VA officials said are attributable to the new eligibility criteria under the VA MISSION Act. The authority for the Choice Program ends June 6, 2019, after which the new Veterans Community Care Program—which consolidates VA’s community care programs under the VA MISSION Act—will be expected to begin. For comparison purposes, the largest increase in obligations for services provided at VA medical facilities is estimated to occur between fiscal years 2020 and 2021. VA officials said this increase is attributable, in part, to efforts related to hiring and telehealth in response to the eligibility criteria under the VA MISSION Act. Our analysis of VA data on authorizations for community care shows that the number of veterans authorized to use community care increased 41 percent from fiscal years 2014 through 2018. (See fig. 5.) The approximately 1.8 million veterans authorized to use community care in 2018 represented about 30 percent of all veterans accessing VA health care services that year (approximately 6.2 million veterans). By fiscal year 2021, VA officials told us that they estimate that at least 1.8 million veterans will still use community care. Our analysis of VA data also shows that after being authorized for care, veterans’ utilization of certain community care services increased from fiscal years 2014 through 2018. Over this time period, a number of outpatient services experienced increases of more than 200 percent in utilization, especially chiropractic visits (418 percent, from 143,000 to 743,000 visits), physical therapy visits (252 percent, from 857,000 to 3 million visits), and non-mental health related office visits (243 percent, from 651,000 to 2.2 million visits). In comparison, our analysis found relatively smaller increases in veteran utilization for certain inpatient services. For example, the utilization for surgical inpatient stays increased about 39 percent—from 253,000 to 352,000 bed days. VA first developed a separate budget estimate for community care to inform the President’s fiscal year 2017 budget request. Beginning with the President’s fiscal year 2018 budget request, VA updated its EHCPM to develop over 75 percent of its community care budget estimate and used other methods to develop the remainder. Subsequent changes were made to the community care budget estimates developed by the EHCPM for fiscal years 2018 and 2019 through successively higher levels of review in VA and OMB. VA first developed a separate budget estimate of the resources it would need for community care—as distinct from the care provided in VA medical facilities—in order to inform the President’s fiscal year 2017 budget request for VA. Prior to this fiscal year 2017 budget request, VA developed a single budget estimate of the resources needed to provide all VA health care services, regardless of whether these services were purchased from community providers or delivered in VA medical facilities, because all these services were to be funded through the same appropriation account. According to VA officials, at the time a separate community care appropriation account and budget estimate were unnecessary, because community care accounted for a relatively small portion of VA’s overall health care budget. However, once the medical community care appropriation account was established in fiscal year 2017, VA began developing a separate budget estimate for community care, as required by law. To develop its first estimate of the resources needed for community care for fiscal year 2017, VA made adjustments to existing estimates for total demand for care—both in VA medical facilities and community care combined—developed by the EHCPM. At the time, VA used the EHCPM to estimate the resources needed to provide VA health care services to veterans, including inpatient, outpatient, and long-term care. However, the EHCPM did not make separate estimates for community care and care provided at VA facilities; according to VA officials, VA adjusted the EHCPM estimates by assuming that for each service, the share of total utilization and costs devoted to community care would be the same as they had been in the most recently completed fiscal year. In addition, after this adjustment, VA made additional changes to the community care budget estimate, which resulted in a net increase of $2.5 billion. Nearly all of this increase reflected an anticipated impact of the expanded access under the Choice Program, according to VA officials. Overall, this approach accounted for about 75 percent of the $12.3 billion community care budget estimate that informed the President’s budget request for fiscal year 2017. To develop the remaining portion of its community care budget estimate, VA used methods other than the EHCPM that, according to VA officials, were used historically to develop estimates of the resources needed for the state home per diem program and benefit programs. For example, VA develops budget estimates for certain services under the state home per diem program by creating projections of the amount of care to be provided using information about the size and demographic characteristics of the enrolled veteran population and projections of the unit cost of providing one day of care using recent cost experience. According to VA officials, VA was able to continue using these other methods, because the services under these programs have been provided through community providers and not VA medical facilities. While methods for each program vary, in general, these methods are based on each program’s historical utilization and costs. (See app. II for additional information on the methods VA uses to develop the budget estimates for each of these community care programs.) Beginning with the President’s fiscal year 2018 budget request, VA updated its EHCPM directly to estimate most of the resources needed to purchase community care for veterans. Specifically, VA updated the EHCPM to estimate the amount of resources needed to purchase a set of more than 40 community care services that have accounted for over 75 percent of VA’s total community care budget estimates of $12.6 billion for fiscal year 2018 and $12.4 billion for fiscal year 2019. These health care services were grouped into seven service types and include outpatient care, inpatient care, and long-term care. (See app. III for a list of the health care services). Of these services, outpatient services typically accounted for the largest share of VA’s community care budget estimate. For the remainder of community care services—including services provided under the state home per diem program and benefit programs— VA did not use the EHCPM and instead continued to use the other methods it has historically used to develop budget estimates for these services. (See fig. 6.) VA made several changes to the EHCPM to develop most of its community care budget estimate. Historically, the EHCPM estimated resources needed to meet the total expected demand for VA health care—a combination of care provided in VA medical facilities and through community care programs. VA updated the EHCPM to determine the proportion of demand met by community care by projecting enrolled veterans’ expected utilization of community care and the expected costs of purchasing these services. In what follows, we describe five major changes made to the EHCPM allowing VA to estimate the budgetary resources needed for community care. 1. Reliance on community care services. The EHCPM has historically accounted for the extent to which enrolled veterans would be projected to obtain health care services through the VA as opposed to other health care programs or insurers—referred to as reliance on VA health care. VA updated the EHCPM so that it can further account for the extent to which enrolled veterans would be expected to use VA’s community care programs as opposed to using care in VA’s medical facilities. Each year, the EHCPM determines reliance on VA community care based on a combination of historical experience—or the extent to which community care was used in prior fiscal years— and on the projected impact of new VA policies and operational guidance. For example, for the fiscal year 2019 budget estimates, the EHCPM projected reliance on VA care to be about 38 percent, of which 14 percent would be met through community care. Thus, the EHCPM projected reliance on VA’s community care programs to be about 5.3 percent for all care enrolled veterans are projected to use in fiscal year 2019. 2. Accounting for difference in community providers’ efficiency delivering inpatient services. VA also updated the EHCPM so that community care utilization projections account for the fact that veterans receiving inpatient care through community providers generally have relatively shorter lengths of inpatient stays compared with veterans receiving care at VA medical facilities. According to officials from VA and its actuarial consultant, community providers on average have historically performed better than VA providers on national benchmarks measuring how well providers manage the length of inpatient stays, while not affecting quality of care. To account for this difference, VA uses an adjustment factor when projecting utilization of inpatient services based on potentially avoidable days of care for community providers. 3. Comparing projected utilization with actual utilization for community care services. VA developed an adjustment factor for the EHCPM’s utilization estimates to account specifically for the differences between projected utilization and actual utilization of community care for the most recently completed fiscal year of data. According to VA officials, the difference typically reflects utilization behavior among providers or patients that are difficult to estimate based solely on historical data—such as changes in local practice patterns (e.g., providers choosing to use magnetic resonance imaging versus x-rays). To account for this behavior, VA compares projected and actual utilization and creates an “actual-to-expected” adjustment factor for each health care service to account for the difference. 4. Projecting unit costs for community care services. VA updated the EHCPM so that it could estimate what are known as the unit costs of purchasing community care services for veterans. In general, the unit cost of a community care service comprises the payment made to the provider (known as direct patient costs), as well as the indirect costs associated with administration and overhead. Indirect costs include (1) the fees paid to the contractors for administrative responsibilities for the Choice Program, (2) VA billing and processing costs and care coordination costs associated community care programs, and (3) certain costs associated with the VA Central Office that support community care (e.g., the salaries for officials from the Office of Community Care and other VA Central Office officials). 5. Accounting for community care service complexity and inflation. VA made other changes to the EHCPM’s unit cost projections for community care. For example, VA updated the EHCPM so that it accounts for costs associated with changes in the complexity—that is, the level of resources required to deliver—of health care services VA purchases from community providers. Officials from VA and its actuarial consultant noted that more complex services require relatively more resources to deliver, such as more expensive equipment (e.g., magnetic resonance imaging); more provider time; or higher-cost providers, such as surgeons. Officials anticipate that most services that VA purchases in the community will increase in complexity, leading to higher projected unit-costs for community care. VA also updated the EHCPM so that its unit cost estimates for community care account for inflation in the cost of labor and equipment. VA’s community care budget estimates are reviewed at successively higher levels at VA and OMB to inform the President’s budget request for VA. VA identified several changes made during the review process to its estimates projected by the EHCPM for fiscal years 2018 and 2019; these changes were due to the availability of more current information related to utilization and costs, among other factors. For fiscal year 2018, changes resulted in a budget request for VA community care in the President’s budget request that was approximately $1 billion lower than VA’s original EHCPM budget estimate of $10.7 billion. These changes included the following: A $996 million decrease reflecting the availability of more current information showing that an anticipated increase in utilization due to the Choice Program was too high. A $600 million decrease reflecting the availability of more current information showing that overhead costs initially allocated to community care in the data used in the EHCPM were too high. A $180 million decrease accounting for VA’s implementation of a new law that reduces VHA’s use of community care for examinations determining veterans’ disability ratings. A $500 million increase accounting for a court ruling that affected veteran eligibility for reimbursement of emergency community care, which was expected to increase utilization. A $250 million increase reflecting the availability of more current information that indicated administrative costs for the Choice Program in the data used in the EHCPM were too low. For fiscal year 2019, changes resulted in a budget request for VA community care in the President’s budget request that was nearly $1 billion higher than VA’s original EHCPM budget estimate of $8.6 billion. These changes included the following: A $1.7 billion increase reflecting more current information indicating that community care administrative costs and the utilization levels in the data used in the EHCPM were too low. A $1 billion increase accounting for a delay in the timing of the implementation of community care network contracts. According to VA officials, this resulted in the continued use of reimbursement rates in community care that were higher than Medicare reimbursement rates. A $1.8 billion decrease that reflected VA’s implementation of a new policy that changed the timing of community care obligations from when a veteran is authorized to use community care to the when a claim for actual services is paid. Our analysis of data included in VA’s budget justifications shows that in fiscal years 2017 and 2018, VA obligated $1.2 billion and $2.2 billion more for community care than originally estimated at the time of the President’s budget requests for those years. In both years, VA’s actual obligations for both the Choice Program and other community care programs were higher than estimated. (See table 3.) According to VA officials, the higher-than-estimated obligations for the Choice Program for fiscal year 2017 were driven, in part, due to changes in Choice Program policies and a large increase in the cost per authorization for care. In the case of other community care programs, VA officials told us that the higher-than-estimated obligations for both fiscal years 2017 and 2018 were driven, in part, by local practice patterns (e.g., providers choosing to use magnetic resonance imaging versus x-rays) and the capacity of VA medical facilities to provide services. As discussed later in this report, VA also received and reallocated additional funding to purchase community care in fiscal years 2017 and 2018, which contributed to actual obligations being higher-than-estimated obligations. Our analysis of VA’s obligations by service type shows that in fiscal year 2017, VA’s higher-than-estimated obligations for community care were primarily for outpatient and inpatient services, as shown in table 4. In fiscal year 2018, the higher-than-estimated obligations for community care were primarily for outpatient services, while there was an overall decrease in obligations for inpatient services. (See table 5.) Additionally, for some service types, VA’s actual obligations were lower than estimated in fiscal years 2017 and 2018. To obligate $13.6 billion for community care in fiscal year 2017 and $14.9 billion in fiscal year 2018—amounts that were $1.2 billion and $2.2 billion higher, respectively, than what VA originally estimated for its budget request, and what VA received in its annual appropriation—VA requested and received additional Choice Program funding outside of the annual appropriations process. VA also reallocated funding from other sources, including unobligated funding from a prior fiscal year and collections, to pay for the other community care programs. Specifically, the $13.6 billion and $14.9 billion VA obligated for community care in fiscal years 2017 and 2018, respectively, came from the following sources: Choice Program. For both fiscal years, VA obligated from its remaining funding and prior-year recoveries from the previous fiscal years, and requested and received additional funding three times outside of the annual appropriations process. (Table 6 below summarizes the time frames during which VA requested and received additional appropriations for the Choice Program outside of the annual appropriations process for fiscal years 2017 and 2018.) Other community care programs. For both fiscal years, VA obligated from its annual appropriation and transferred a portion of its overall collections from its Medical Care Collections Fund to the medical community care account. In addition, for fiscal year 2018, VA used unobligated funding and prior-year recoveries from fiscal year 2017. We provided a draft of this product to VA and OMB for comment. VA provided technical comments, which we incorporated as appropriate. OMB had no comments. We are sending copies of this report to the Secretary of Veterans Affairs, the Director of the Office of Management and Budget, appropriate congressional committees, and other interested parties. This report is also available at no charge on the GAO Web site at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or silass@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. While the majority of veterans utilizing Department of Veterans Affairs’ (VA) health care services receive care in VA-operated medical facilities, veterans may also obtain services from non-VA providers in the community—known as community care—through one of several community care programs aimed at helping to ensure that veterans receive timely and accessible care. In implementing the VA MISSION Act, VA plans to consolidate four of its community care programs for veterans—dialysis contracts, individually authorized care, the Patient- Centered Community Care Program, and the Veterans Choice Program— under the Veterans Community Care Program, which is expected to go into effect by June 2019. In addition, VA has several other community care programs that serve veterans and programs that provide health care services to other eligible beneficiaries, including a veteran’s spouse or dependent child. Dialysis contracts. When dialysis services—a life-saving medical procedure for patients with permanent kidney failure—are not feasibly available at VA medical facilities, veterans may be referred to one of VA’s contracted dialysis providers, and veterans may receive dialysis at local clinics on an outpatient basis, or at home (if the contractors offer home- based dialysis services). Individually authorized care. When a veteran cannot access a particular specialty care service from a VA medical facility—either because the service is not offered, the veteran would have to wait too long for an appointment, or the veteran would have to travel a long distance to a VA medical facility—VA medical facility staff may request an individual authorization for the veteran to obtain the service from a community provider who is willing to accept VA payment. Patient-Centered Community Care. VA contracted with two third-party administrators to develop regional networks of community providers of specialty care, mental health care, limited emergency care, and maternity and limited newborn care when such care is not feasibly available from a VA medical facility. To be eligible to obtain care from Patient-Centered Community Care providers, veterans must meet the same criteria that are required for individually authorized care. Veterans Choice Program. VA modified its Patient-Centered Community Care contracts with the two third-party administrators to implement the Veterans Choice Program. This program allows eligible veterans to obtain health care services from community providers if the veteran meets certain criteria, including when a veteran cannot receive care within 30 days from the veteran’s or physician’s preferred date, or face an unusual or excessive burden in traveling to a VA medical center. Agreements with federal partners and academic affiliates. When services are not available at VA medical facilities, VA may obtain specialty, inpatient, and outpatient health care services for veterans through different types of sharing agreements—those with other federal facilities (such as those operated by the Department of Defense and the Indian Health Service), those with Tribal Health Programs, and those with university-affiliated hospitals, medical schools, and practice groups (known as academic affiliates). Emergency care. When emergency community care is not preauthorized, VA may reimburse community providers for emergency care for eligible veterans for a condition related to a service-connected disability, and for eligible veterans for a condition not related to a service- connected disability. Foreign Medical Program. The Foreign Medical Program is VA’s health care benefits program for eligible veterans who are residing or traveling abroad and have a service-connected disability. State Home Per Diem Program. Under the State Home Per Diem Program, states provide care for eligible veterans in three different types of programs: nursing home, domiciliary, and adult day health care. Camp Lejeune Family Member Program. The Camp Lejeune Family Member Program is for family members of veterans that lived or served at U.S. Marine Corps Base Camp Lejeune, North Carolina, for no fewer than 30 days between January 1, 1957, and December 31, 1987, and were potentially exposed to drinking water contaminated with industrial solvents, benzene, and other chemicals. The program provides health care to veterans who served on active duty at Camp Lejeune and to reimburse eligible Camp Lejeune family members for health care costs related to one or more of 15 specified illnesses or medical conditions specified in law. Children of Women Vietnam Veterans Health Care Benefits Program. This program provides health care benefits to female Vietnam veterans’ birth children who the Veterans Benefits Administration has determined to have a covered birth defect. This program is not a comprehensive health care plan and only covers those services necessary for the treatment of a covered birth defect and associated medical conditions. Civilian Health and Medical Program of the Department of Veterans Affairs (CHAMPVA). CHAMPVA is a comprehensive health care program that provides health care coverage for spouses, children and primary caregivers of veterans who are permanently and totally disabled from a service-connected disability. CHAMPVA functions similarly to traditional health insurance, with most care in the program delivered using non-VA community providers. Spina Bifida Health Care Benefits Program. This program provides health care benefits to certain Korea and Vietnam veterans’ birth children who have been diagnosed with spina bifida. The Department of Veterans Affairs (VA) and its actuarial consultant use the Enrollee Health Care Projection Model to develop most of the department’s estimate of the resources needed to meet the expected demand for VA’s health care services. VA uses other methods to estimate the remaining resources needed. This remaining portion includes community care programs for veterans and other eligible beneficiaries, including the State Home Per Diem Program and the Civilian Health and Medical Program of the Department of Veterans Affairs (CHAMPVA). State Home Per Diem Program. This program pays per diem for state- provided care for eligible veterans in three different types of programs: domiciliary, nursing home, and adult day health care. For state home domiciliary and nursing care, categorized as institutional care, VA creates budget projections based on historical funding data. For state home adult day health care, categorized as non-institutional care, VA’s budget estimates are based on projections of the amount of care provided— which is known as workload—and the unit cost of providing a day of this care. VA projects the demand for non-institutional care services using information about the size and demographic characteristics of the enrolled veteran population. VA projects unit cost for non-institutional care services by calculating unit-cost increases observed from recent experience and then using this information to project future unit costs. VA multiplies the workload estimates, unit-cost estimates, and the number of days in the fiscal year to develop an estimate of the amount of resources needed for non-institutional care. CHAMPVA. CHAMPVA provides health care coverage for spouses and children of veterans who are permanently and totally disabled from a service-connected disability. CHAMPVA functions similarly to traditional health insurance—most care within CHAMPVA is delivered using non-VA community providers. Therefore, developing estimates of the resources needed for CHAMPVA requires factoring in utilization patterns and cost inflation that are generally outside of VA’s control. Budget estimates for CHAMPVA are developed using a formula that computes the predicted number of users and costs per-member per-year. VA works with its actuarial consultant to generate projections of CHAMPVA users that incorporate changes related to the population of disabled veterans and projections of expected increases and decreases in the CHAMPVA- eligible population. In addition, the actuarial consultant projects the costs per-member per-year, which is calculated by dividing the most current fiscal year data on total CHAMPVA expenditures by the number of actual users. Trends are then incorporated to predict the future costs per- member per-year, which is multiplied by projections of the number of CHAMPVA users to develop CHAMPVA budget estimates. Using its Enrollee Health Care Projection Model (EHCPM), the Department of Veterans Affairs (VA) developed estimates for 79 health care services—available in VA medical facilities or through community care—for the fiscal year 2019 President’s budget request. As shown in table 7, VA developed separate estimates for the 43 services that were available through community care. Some of these 43 services were only available through community care. These services were primarily long- term care, including nursing home care provided at community nursing homes, home hospice care, home respite care, homemaker or home health aid programs, and purchased skilled nursing care. The Department of Veterans Affairs (VA) and its actuarial consultant use the Enrollee Health Care Projection Model (EHCPM) to develop most of the department’s budget estimate to meet the expected demand for VA’s health care services. This estimate includes the services that VA purchases from non-VA community providers through its various community care programs, including the Veterans Choice Program (Choice Program). Based on our interviews with various VA officials, VA’s Office of Enrollment and Forecasting provided utilization and cost data from fiscal year 2016 community care claims from four different sources for use in the 2017 EHCPM, which was used to project the fiscal year 2019 budget estimate. (See fig. 7.) Specifically, the Office of Enrollment and Forecasting—which is responsible for compiling the claims data used in the EHCPM—obtained community care claims data, including Choice Program claims, from VA’s Fee Basis Claims System. In addition, the Office of Enrollment and Forecasting worked with VA’s Allocation Resource Center to gather additional utilization and cost data from Choice Program claims processed outside the Fee Basis Claims System, and other data needed for the 2017 EHCPM. Specifically, the Allocation Resource Center compiled claims data for those Choice Program claims paid through expedited payments. The Allocation Resource Center also pulled data on dual eligible veterans, from the Department of Defense’s Medical Data Repository, and indirect costs associated community care claims (for example, costs associated with care coordination or claims processing) from VA’s Managerial Cost Accounting system. In addition to the contact named above, Rashmi Agarwal (Assistant Director), Aaron Holling (Analyst-in-Charge), Chad Clady, and Kate Tussey made key contributions to this report. Also contributing were Krister Friday, Jacquelyn Hamilton, and Muriel Brown. Veterans Choice Program: Further Improvements Needed to Help Ensure Timely Payments to Community Providers. GAO-18-671. Washington, D.C.: September 28, 2018. Veterans Choice Program: Improvements Needed to Address Access- Related Challenges as VA Plans Consolidation of its Community Care Programs. GAO-18-281. Washington, D.C.: June 4, 2018. VA’s Health Care Budget: In Response to a Projected Funding Gap in Fiscal Year 2015, VA Has Made Efforts to Better Manage Future Budgets. GAO-16-584. Washington, D.C.: June 3, 2016. Veterans’ Health Care: Proper Plan Needed to Modernize System for Paying Community Providers. GAO-16-353. Washington, D.C.: May 11, 2016. Veterans’ Health Care Budget: Improvements Made, but Additional Actions Needed to Address Problems Related to Estimates Supporting President’s Request. GAO-13-715. Washington, D.C.: August 8, 2013. Veterans’ Health Care: Improvements Needed to Ensure That Budget Estimates Are Reliable and That Spending for Facility Maintenance Is Consistent with Priorities. GAO-13-220. Washington, D.C.: February 22, 2013. Veterans’ Health Care Budget: Better Labeling of Services and More Detailed Information Could Improve the Congressional Budget Justification. GAO-12-908. Washington, D.C.: September 18, 2012. Veterans’ Health Care Budget: Transparency and Reliability of Some Estimates Supporting President’s Request Could Be Improved. GAO-12-689. Washington, D.C.: June 11, 2012. VA Health Care: Estimates of Available Budget Resources Compared with Actual Amounts. GAO-12-383R. Washington, D.C.: March 30, 2012. VA Health Care: Methodology for Estimating and Process for Tracking Savings Need Improvement. GAO-12-305. Washington, D.C.: February 27, 2012. Veterans’ Health Care Budget Estimate: Changes Were Made in Developing the President’s Budget Request for Fiscal Years 2012 and 2013. GAO-11-622. Washington, D.C.: June 14, 2011. Veterans’ Health Care: VA Uses a Projection Model to Develop Most of Its Health Care Budget Estimate to Inform the President’s Budget Request. GAO-11-205. Washington, D.C.: January 31, 2011. VA Health Care: Challenges in Budget Formulation and Issues Surrounding the Proposal for Advance Appropriations. GAO-09-664T. Washington, D.C.: April 29, 2009. VA Health Care: Challenges in Budget Formulation and Execution. GAO-09-459T. Washington, D.C.: March 12, 2009. VA Health Care: Long-Term Care Strategic Planning and Budgeting Need Improvement. GAO-09-145. Washington, D.C.: January 23, 2009. VA Health Care: Budget Formulation and Reporting on Budget Execution Need Improvement. GAO-06-958. Washington, D.C.: September 20, 2006.", "summary": "VA continues to focus on the use of community care to address challenges with veterans' access to health care services at VA medical facilities. In fiscal year 2019, VA plans to consolidate the Veterans Choice Program and several other community care programs under a single new Veterans Community Care Program. GAO and others have previously reported on past challenges VA has faced regarding the reliability, transparency, and consistency of its budget estimates for health care. GAO was asked to review VA's use of community care and efforts to develop budget estimates for this care. This report describes (1) trends in obligations for and utilization of VA's community care programs since fiscal year 2014, (2) how VA develops its community care budget estimate and any subsequent changes made to this estimate, and (3) how VA's actual obligations for community care compared with estimated obligations for fiscal years 2017 and 2018. GAO reviewed actual obligation and utilization data for fiscal years 2014 through 2018, as well as estimated obligations for fiscal years 2019 through 2021. GAO also reviewed available VA documentation on the methods and data used to develop VA's community care budget estimate that informed the President's budget request for fiscal years 2017 through 2019. GAO also interviewed VA officials and contractors responsible for developing these estimates, and OMB staff responsible for the federal budget. VA and OMB reviewed a draft of this report. VA's technical comments were incorporated as appropriate. To help ensure that veterans are provided timely and accessible health care services, the Department of Veterans Affairs (VA) may purchase care from non-VA providers, known as community care. VA obligated $14.9 billion for community care in fiscal year 2018, an increase of $6.7 billion (about 82 percent) since fiscal year 2014. The number of veterans authorized to use community care increased from 1.3 million to 1.8 million during this period. By fiscal year 2021, VA estimated obligations to increase to $17.8 billion, and officials estimate at least 1.8 million veterans will continue to use this care. Note: VA estimated obligations for fiscal year 2019 to reflect $1.8 billion in anticipated savings as a result of a VA policy change regarding the timing of certain community care obligations. VA uses a projection model to estimate the majority of resources needed to provide health care services. Beginning with the President's fiscal year 2018 budget request, VA updated its model to estimate the resources needed to purchase over 40 community care services accounting for over 75 percent of VA's community care budget estimate. These services include outpatient and inpatient care, among others. For the remainder of its community care budget estimate, which includes nursing care in state-operated homes, VA uses other methods based on historical utilization. VA's budget estimate is successively reviewed at VA and the Office of Management and Budget (OMB) to inform the President's budget request. VA identified several changes made during the review process to its budget estimate for fiscal years 2018 and 2019 to reflect more current information related to utilization and costs, among other factors. VA's actual obligations for community care for fiscal years 2017 and 2018 were $1.2 billion and $2.2 billion higher, respectively, than originally estimated. According to VA officials, this occurred for several reasons, including policy changes and increased costs for the Veterans Choice Program. To support higher obligations, VA requested and received additional funding for the Veterans Choice Program outside the annual appropriations process and used other funding sources, such as unobligated amounts from prior fiscal years.", "document_type": "gao"}
{"report": "Promoting respect for human rights is a goal of U.S. foreign policy. The United States considers the advancement of human rights when providing security assistance to foreign countries. Providing training on human rights issues and international humanitarian law to foreign security forces can further U.S. credibility and interests. For example, such training could help maintain local populations’ cooperation with U.S. security efforts by curbing potential abuses by partner country forces. Human rights abuses by U.S.–backed forces can damage the local population’s support for the United States’ strategic aims, according to guidance from the U.S. Army. The United States provides military equipment and training, including human rights training, to partner countries through a variety of security cooperation and assistance programs authorized by statutes, some of which are codified within Title 10 and Title 22 of the U.S. Code. Human rights training is incorporated into broader security cooperation and assistance efforts. DOD and State share responsibility for developing policy for, managing, and implementing human rights training. Title 10 programs are generally overseen by DOD. Title 22 programs primarily fall under State. According to DOD and State officials, most Title 22 human rights training is implemented by DOD. DOD integrates human rights concepts into various types of training and assistance, including “train and equip” programs and defense institution building. Train and equip programs provide training, equipment, and small–scale military construction activities intended to build the capacity of partner nations’ military forces. Defense institution building activities are security assistance programs intended to empower partner nation defense institutions to establish or re-orient their policies and structures to make their defense sector more accountable, effective, and responsive to civilian control, among other things. Some of the authorities under which DOD and State provide human rights training to partner countries require such training when security assistance is provided. For example, one of the more recent and significant changes to security assistance legislation was the 2017 NDAA, which enacted a new chapter in Title 10 of the U.S. Code containing authorities related to security cooperation. Among other things, the 2017 NDAA replaced multiple capacity building authorities with a new statute codified at 10 U.S.C. § 333 (Section 333). All Section 333 programs are required to include elements that promote observance of and respect for human rights and fundamental freedoms, rule of law, and the law of armed conflict, as well as respect for civilian control of the military. Prior to the 2017 NDAA, a similar requirement was mandated for security assistance delivered under the Global Train and Equip program (then codified at 10 U.S.C. § 2282), which required that U.S. assistance pursuant to this authority include “elements to promote observance of and respect for human rights and fundamental freedoms and respect for legitimate civilian authority.” Section 333 covers a greater range of security assistance programs—for example, counternarcotics assistance—than did Section 2282. Other authorities include human rights considerations in their authorizing language. For example, in 1976, Congress established the International Military Education and Training (IMET) program codified within Title 22. The program provides education and training to foreign military personnel with the objectives of professionalizing military forces and increasing respect for democratic values and human rights. In 1990, Congress expanded the objectives of the IMET program to include fostering greater understanding of and respect for civilian control of the military, contributing to responsible defense resource management, and improving military justice systems and procedures in accordance with internationally recognized human rights. State and DOD refer to the expanded IMET objectives as Expanded IMET (E-IMET). Table 1 lists key authorities through which DOD and State provide human rights training to foreign security forces. In addition to human rights training, U.S. agencies consider human rights records when providing certain assistance. The Foreign Assistance Act of 1961, as amended, prohibits assistance to a unit of a foreign government’s security forces if the Secretary of State has credible information that such unit has committed a gross violation of human rights. DOD–funded training programs are covered by a similar provision. These requirements are commonly referred to as Leahy laws. As we have previously reported, these laws and the corresponding policies developed to enforce and supplement these laws are intended to leverage U.S. assistance to encourage foreign governments to prevent their security forces from committing human rights violations and to hold their forces accountable when violations occur. To address requirements under both the State and DOD Leahy laws, State has established a process for vetting potential recipients of U.S. security assistance training. State’s Bureau of Democracy, Human Rights, and Labor (DRL) is responsible for overseeing this vetting process and for developing human rights vetting policies, among other duties. DOD incorporates human rights training as part of a wide range of assistance programs that involve a number of DOD entities in different capacities. (See table 2). State incorporates rule of law assistance and human rights training as part of a wide range of assistance programs that involve a number of State entities in different capacities. (See table 3). DOD operates a number of education facilities that provide training to foreign security forces and many include human rights–related material in their curriculum. However, there are a few training providers that deliver the majority of human rights training through courses explicitly focused on such topics as well as in courses and residential programs that include related material. In addition, State provides some human rights training through the International Law Enforcement Academies (ILEA). Defense Institute of International Legal Studies (DIILS): DIILS is housed under DSCA and is DOD’s lead resource for providing legal education and rule of law engagement training to foreign military personnel and civilian defense officials. DIILS delivers its training primarily through either in-residence courses—for which members of foreign security forces attend trainings at the DIILS campus—or through mobile education training that is delivered to foreign military forces overseas. DIILS provides three types of training: (1) core rule of law training in the United States and abroad, (2) defense institution building, and (3) mandated human rights training delivered under Section 333. DIILS is the only institute to provide the mandated human rights training delivered under Section 333. DOD officials said there are no plans for other facilities to be certified to meet these training requirements. Mandated Human Rights Training Provided by DIILS: In response to the increased demand for mandated human rights training, DIILS created a three–tiered training model to deliver mandated human rights training, according to DIILS officials, who also noted that DIILS is in the early stages of applying the model. The three–tiered training model categorizes mandated human rights training according to basic, intermediate, and advanced trainings. Basic training includes a 2-hour block of scripted coursework which is dedicated to general topics covering human rights and is appropriate when providing training to military units who are not dealing with a combat environment, for example. Military officials without legal training or nonattorney civilian personnel—including contractors— may conduct this training. Intermediate and advanced training is typically 8 or 16 hours of training, respectively, and instruction is provided by DIILS staff and other military attorneys. According to DIILS officials, each intermediate or advanced training is intended to be tailored for the recipient military unit based on an assessment of its duties and the lethality of any equipment provided through the security assistance. Western Hemisphere Institute for Security Cooperation (WHINSEC): WHINSEC, also operated by DOD, provides professional education and training, including human rights training, for military and law enforcement personnel from countries in the Western Hemisphere. The Institute’s Center for Human Rights and Democracy promotes human rights education and training through international programs and partnerships. Curriculum developed by the Center includes topics such as the lawful use of lethal force, due process under international human rights law, and violence against women and vulnerable groups. Examples of WHINSEC’s Human Rights Training: To meet its statutory requirement to provide human rights training, WHINSEC provides a mandatory, 10-hour training on human rights for every student. This training covers five objectives: (1) human rights, (2) the rule of law, (3) due process (4) civilian control of the military, and (5) the role of the military in a democratic society. Additionally, WHINSEC students are required to take an ethics course that builds on the material covered in the human rights and democracy classes. WHINSEC also includes human rights–related material in a number of other courses. For example, the Counter Transnational Threats course focuses on threat interdiction activities using simulated exercises and scenarios. WHINSEC officials explained that one such scenario involves students conducting a simulated raid of a drug lab. (See fig. 1). During the exercise, students encounter armed and unarmed criminals, along with civilians. The simulation is intended to create real–world human rights scenarios for students to assess and apply lessons learned from classroom–based human rights training. Center for Civil–Military Relations (CCMR): CCMR is a DOD organization within the Naval Postgraduate School. CCMR was designed to support the goals of E-IMET and strengthen civil–military relationships through a variety of education and training programs. Additionally, CCMR focuses on defense institution building activities provided under DOD’s Title 10 authority. Like DIILS, CCMR delivers in-residence programs and mobile education training. Examples of CCMR’s Human Rights Training: CCMR officials said that human rights–related material is included in many CCMR programs, although it is not always an explicit focus. For example, although the Maritime Security Program does not explicitly focus on human rights, CCMR staff said that human rights–related topics are integrated into various aspects of the program. One of the program’s modules focuses on how to apply the appropriate use of force when enforcing international and maritime law. CCMR staff said they use practical scenarios to prompt discussion among classroom participants on techniques to avoid use of lethal force. Participants might discuss how to respond if a potential suicide vessel is approaching a ship, including the use of barriers or other deterrents to prevent potential terrorist activity without use of lethal force. Additional DOD Training Providers: A number of other DOD facilities provide training to eligible foreign security forces that includes human rights–related material. These facilities include: Regional Centers: DOD operates five regional centers of strategic studies, whose main purpose is to engage senior leaders in partner countries. A common topic taught at Regional Centers includes civil– military relations, which generally contains information related to human rights. Judge Advocate General (JAG) schools: JAG schools train students on the rules of armed conflict and international humanitarian law; international students may attend these schools, according to DOD officials. Service War Colleges: The service war colleges educate representatives of foreign security forces at a general level about U.S. laws and policies. Human rights–related material may be included, although DOD officials acknowledged such material is peripheral to the main mission. Defense Institute of Security Cooperation Studies (DISCS): International partners who are interested in Foreign Military Sales management participate in human rights training at DISCS. According to DOD officials, DISCS trains hundreds of foreign partners each year on military sales. State’s Bureau of International Narcotics and Law Enforcement Affairs (INL): State INL funds human rights–related training that is delivered by ILEAs. The ILEAs are a global network of training centers with a mission to support emerging democracies; help promote U.S. interests through international cooperation; and promote social, political, and economic stability by combating crime. According to State, this mission is met through strengthening the rule of law and stressing respect for human dignity in law enforcement. ILEAs represent a major component of training provided to foreign law enforcement entities, but do not represent all human rights–related law enforcement training supported by State. DOD was unable to provide aggregate data on the extent of human rights training for foreign security forces. According to agency officials, DOD does not systematically track all human rights training in DOD systems. As a result, DOD officials noted they were unaware of the full scope of the agency’s human rights training. DOD officials said it is challenging to track human rights training because many courses and training activities might include human rights content. DOD training activities are tracked in the Security Cooperation Training Management System (SC-TMS). However, the tracking is focused on the training overall rather than on any one component of the training conducted, such as human rights. For example, a course at a Regional Center might include human rights– related topics in a civil–military relations class but DOD is not able to identify such a course in SC-TMS or elsewhere as one that could be considered human rights training. DOD officials noted that while DOD is not required to track all human rights training, DSCA and DIILS have systems in place intended to track the provision of human rights training mandated by Section 333, as described below. DSCA uses a case management system to track the mandated human rights training that DIILS provides under Section 333. However, limitations in the implementation of this system have led to questions about the completeness of the data. The case management system is used across DOD to track and manage a range of security assistance programs, in addition to DIILS training. The system is designed so that the implementing entity enters information into the case management system about the training or other security assistance programming provided. However, DOD has not designated DIILS as an implementing agency with authority to enter or edit data in the case management system. As a result, for many years DIILS has relied on a different entity to enter human rights training data into the system. DIILS officials said the U.S. Navy’s agent for international education and training acted as the implementing agency and entered data in the system for DIILS. Due to DIILS’ inability to enter data or make changes in the case management system, DIILS officials told us they have been unable to ensure that data on DIILS training are properly entered. In addition, although DSCA is the DOD entity with oversight responsibilities for ensuring that Section 333 human rights training is provided as appropriate, DSCA officials acknowledged that they did not consistently take steps to monitor the accuracy and completeness of data on the DIILS–provided Section 333 human rights training. DSCA officials said that most of the DIILS trainings likely were entered into DOD’s data system because policy and procedures for capturing training records require it, such as the requirements spelled out in DOD’s Security Assistance Management Manual. However, DSCA officials said they do not have assurance that all trainings were entered as a matter of practice because they lack a process to regularly review whether the training data were captured as required. DOD officials said as of fiscal year 2019, DSCA and DIILS are taking steps to enable DIILS to enter human rights training data directly into the case management system as an implementing agency, but this is still an ongoing effort and not yet operational. In addition, as part of broader changes implemented in 2019 related to how DIILS is funded, the Navy agent is no longer entering information into the case management system about training DIILS provides under Section 333. In the meantime, DIILS continues to track the provision of training using an internal spreadsheet, according to officials, and plans to enter training data into the case management system when they get access as an implementing agency. Federal standards for internal control state that management should use quality information and design appropriate types of control activities in the entity’s information systems to achieve objectives and ensure quality external reporting. In the case of human rights training, DOD officials acknowledged that they do not have a process to ensure that information on mandated human rights training is systematically and accurately entered into its tracking systems. Without such a process, DOD is limited in its ability to monitor compliance with the statutory requirement that Section 333 assistance include a human rights training component. DOD tracks and reports funding for mandated human rights training at a global level, but not by country and program, although DOD is taking steps to do so. DSCA has published periodic reports that include global funding information for Section 333 activities, including the mandated human rights training. In 2016, Congress required the Director of DSCA to publish quarterly monitoring reports on the status of funding allocated for Section 333 activities. DSCA published three quarterly monitoring reports in fiscal year 2018, which identified the amount of unobligated funds, disbursements, and unliquidated obligations for Section 333 activities. According to the monitoring report from the third quarter of fiscal year 2018, year-to-date unobligated funds for human rights training totaled over $2 million dollars, disbursements totaled about $17,000, and unliquidated obligations totaled about $200,000. The funding data for human rights training is generally reported globally in these reports, not by a specific program or country. DOD could not provide the information we requested on funds obligated and disbursed for mandated human rights training, by program and country, for fiscal years 2015 through 2018. DSCA officials said they could not provide these data because it was challenging to pull this type of information from their systems in a usable way. Further, DOD officials noted that their previous accounting system made it challenging to obtain funding data easily. DSCA and DIILS transitioned to a new accounting system in 2017 which, according to DSCA officials, was expected to provide more detailed information on the status of funding for human rights training. However, DOD officials said that the transition to the new accounting system introduced errors in the data and DIILS staff are still working through a learning curve in adopting the new system. Under the new accounting system, DIILS is to enter information using a unique program and task- naming convention. DSCA officials said the new accounting system, when fully implemented, is expected to allow both DSCA and DIILS to track funds according to the specific recipient country and Section 333 security assistance program, which would better enable DOD and others to effectively monitor the status of funds dedicated to these efforts. State officials said they rely on DOD to track funding and information on the Title 22 authorities that DOD implements, including IMET, which State officials said is its most substantial source of human rights–related training for foreign military forces. DOD provided information on the funding for certified E-IMET courses in recent years. However, according to DOD officials, not all E-IMET courses are related to human rights. State INL maintains data on human rights–related training delivered by ILEAs, which is a major component of training provided to foreign law enforcement entities. In September 2018, we reported that while INL collects data for certain types of police training, such as training provided through the ILEA program, they do not have reliable information readily available on police trained through INL–funded projects. We recommended that State develop and implement a process to collect more reliable data on the number of police trained in El Salvador, Guatemala, and Honduras, the geographic focus of that review. State concurred with our recommendation and stated that it is in the process of developing specific indicators related to police training. According to our review of State data on human rights–related training delivered by ILEAs, State supported human rights training for over 5,400 law enforcement personnel from over 100 countries at ILEAs from fiscal years 2015 through 2017. (See fig. 2.) State identified 31 trainings provided by ILEAs that included human rights topics. (See table 4). According to State, the course that received the most funding—Law Enforcement and Leadership Development—is not expressly focused on human rights but is a 6-week long course that includes human rights concepts in different modules. State provided approximately $34.4 million for such training to foreign law enforcement entities at ILEAS from fiscal years 2015 through 2017. (See fig. 3.) Although officials at both agencies identified examples of past monitoring and evaluation (M&E)–related efforts for security assistance programs, DOD and State officials acknowledged that they have not assessed the effectiveness of human rights training for foreign security forces provided as part of such programs. DOD. DOD officials cited student surveys and after-action reports—which are summaries of the training events, training outcomes, challenges encountered, and further actions to be taken that are prepared by course facilitators—as examples of M&E–related efforts: At DIILS, course facilitators use surveys to solicit student feedback on courses and on the relevance of the course materials. They also use after-action reports, which, according to officials, provide continuity and capture lessons learned from human rights training in partner countries for DIILS facilitators who will be traveling to those countries in the future. At CCMR, according to CCMR officials, training facilitators prepare after-action reports for each course that involves human rights content. They also solicit input from the security cooperation officers in the country where the training took place. At the U.S. Africa Command, officials also said that they prepare after-action reports on DIILS–provided mandated human rights training, which they share with DIILS. Officials said these reports often discuss improvements needed with regard to logistics planning for human right training that DOD provides in African countries. State. Examples of related M&E efforts that State has conducted include a multi-year survey of IMET and evaluations of some security assistance programs. For example, State and DOD funded a survey of IMET graduates which DOD entities conducted and covered the period from 2007 through 2014. The multi-year survey measured, among other things, if graduates reported an improved understanding of internationally recognized human rights. According to DOD officials, DOD is beginning to develop a new M&E approach for DOD’s security assistance programs. However, DOD has not established a timeline for evaluating the effectiveness of human rights training for foreign security forces that is often included as part of such assistance. The 2017 NDAA, enacted in December 2016, requires DOD to conduct assessment, monitoring, and evaluation of its security assistance programs and activities. The steps DOD is taking to implement the 2017 NDAA M&E requirements include: Policy guidance: DOD issued Instruction 5132.14: Assessment, Monitoring, and Evaluation Policy for the Security Cooperation Enterprise in January 2017. The instruction states that M&E will foster accurate and transparent reporting to key stakeholders on the outcomes and sustainability of security cooperation and improve returns on DOD security cooperation investments. The new M&E requirements are intended to include centralized, independent, and rigorous evaluations of significant security cooperation initiatives to examine their relevance, effectiveness, and sustainability, among other things. DOD officials said that they planned to develop additional guidance to meet the mandated M&E requirements for security assistance, which includes human rights training. Security assistance guidelines: Based on new security assistance guidelines, DOD developed templates for documents that combatant commands are required to complete when planning security assistance activities. These templates for initial assessment and initiative design documents (including for rule of law and human rights training) incorporate M&E into design and planning of security assistance programs and activities. Geographic combatant commands are required to submit these documents to DSCA for projects that are developed in fiscal year 2019 and will be implemented beginning in fiscal year 2020. Draft evaluation agenda: In 2018, DOD prepared a draft evaluation agenda which outlines notional timeframes for evaluations. However, DOD officials could not specify when they plan to finalize the agenda, and as of April 2019 could not tell us when DOD planned to begin monitoring and evaluating human rights training for foreign security forces because they have not developed a timeline for doing so. According to DOD officials, DOD is in the initial phase of developing its overall approach to monitoring and evaluating security assistance, of which human rights training is a small part. The 2019 NDAA, enacted in 2018, requires, as a condition for expending 50 percent of DOD operations and maintenance funds made available for Section 333 assistance, that DOD establish a written plan describing, among other things, evaluation activities planned for security assistance programs for fiscal year 2019. In addition, according to the Office of Management and Budget’s monitoring and evaluation guidelines for the federal government entities providing foreign assistance, agencies should establish annual monitoring and evaluation objectives and timetables to plan and manage the process of monitoring, evaluating, analyzing progress, and applying learning toward achieving results. Developing a timeline for implementing its activities to monitor and evaluate the effectiveness of human rights training, which could be done as part of DOD’s monitoring and evaluation of its broader security assistance efforts, would provide greater assurance that DOD will complete M&E requirements. According to State officials, they have not established a plan, with a clear timeline, for evaluating the effectiveness of human rights training provided as part of IMET. Officials from State’s Bureau of Political–Military Affairs (PM) acknowledged that State’s responsibilities for IMET include M&E of the program. According to these officials, PM is in the initial phase of developing M&E of its security assistance programs, including IMET. They stated that for this reason PM is not currently planning to evaluate human rights training provided under IMET. Although DOD implements IMET, PM has overall responsibility for the program. According to State’s January 2018 Guidance for the Design, Monitoring and Evaluation Policy at the Department of State, it is essential that bureaus and independent offices have comprehensive plans for monitoring and evaluating all their programs and projects, and the plans should include, among other things, an implementation schedule. An M&E plan with a clear timeline for human rights training provided under IMET will better position State and DOD to determine the effectiveness of a significant component of U.S. human rights training for foreign militaries and identify areas for improvement. Additionally, an evaluation of the effectiveness of the human rights training would provide other important stakeholders, including Congress, with evidence to better inform decisions about U.S.–funded human rights training provided under IMET. Such an evaluation could be done as part of State’s broader effort to evaluate IMET. According to DOD and State officials and outside experts we interviewed, there are several challenges to achieving human rights objectives—such as a decrease in human rights violations or promoting greater respect for human rights—through training alone. Such challenges include tailoring training to the partner nation, integrating it into operational training, and a lack of capabilities and accountability systems on the part of partner nations. Agency officials and outside experts we spoke with stated that it can be challenging to tailor human rights training to the partner nation, the unit receiving assistance, and, when appropriate, the type of equipment being provided. DIILS has developed a three–tiered training model to meet the requirements of Section 333, as discussed above, and DIILS officials stated that they work to tailor trainings to the extent possible, including by selecting trainers with experience relevant to the equipment that the U.S. government provides and adding additional training when needed. However, agency officials and experts stated that DIILS, as a small entity, has limited capacity to tailor human rights trainings for specific situations, especially since DIILS must cover certain material to meet the Section 333 requirements. In addition, DIILS’ ability to tailor training is limited because, according to agency officials, mandated human rights training—typically a classroom course—is generally added to a security assistance package for a partner nation once the planning process has been completed. Since the human rights training is not integrated when the security assistance is planned, it is not generally feasible to adjust the training after the fact to address a specific situation in a given partner country, according to DOD officials. DSCA officials acknowledged that most human rights training is not sufficiently tailored to the needs of the recipient countries and that they have not yet fully incorporated human rights training considerations into security assistance planning. These officials said more work remains to be done to ensure that assistance under the Section 333 authority include comprehensive human rights training designed to meet specific partner nation needs. Agency officials and outside experts we interviewed stated that it can be challenging to achieve human rights objectives through human rights training as currently delivered because mandated human rights training is typically delivered as a stand–alone course in a classroom setting, rather than integrated into operational training. Agency officials stated that integrated training can be more effective because it would expose participants to practical skills that could help them comply with human rights concepts and avoid human rights violations during military or law enforcement operations. For example, State officials said that operational training on how to run a checkpoint while respecting human rights principles is likely to be more effective than training slides that outline international treaties on human rights. Agency officials and outside experts also stated that partner nations may lack capabilities and accountability systems. A military justice system might not hold responsible soldiers who commit human rights violations. A partner nation may lack equipment, experienced personnel, and planning for precision targeting to avoid civilian casualties. Further, partner nations may lack the political will to focus on human rights, and poorly–resourced security forces might see human rights as a low priority. Agency officials and outside experts said that without defense institution building that would address some of these broader systemic issues, human rights training may be less likely to have an effect in some countries. Finally, agency officials noted that in some instances, competing priorities necessitate prioritizing U.S. national security interests when providing security assistance, with human rights receiving less emphasis. Instilling respect for human rights in our foreign partners is important to achieving U.S. foreign policy goals. Human rights training that DOD and State provide is one means to do so, but DOD and State are unable to provide a comprehensive accounting of the full array of human rights training they support. With the demand for human rights training increasing as a result of Section 333, a process to ensure training information is systematically tracked would provide DOD greater assurance that it is complying with the statutory requirement to provide human rights training as a component of Section 333 assistance. Furthermore, DOD and State are not able to provide stakeholders, including Congress, with an evaluation of the effectiveness of human rights training the agencies support. Without monitoring and evaluation, decision–makers may be unable to identify whether human rights training provided through Section 333, IMET, and other authorities is achieving objectives and whether it could be adjusted for greater effectiveness. We are making a total of three recommendations, including two to DOD and one to State. Specifically: The Secretary of Defense should direct the Director of the Defense Security Cooperation Agency to establish processes to ensure that information on the provision of Section 333 mandated human rights training is systematically and accurately entered into its tracking systems. (Recommendation 1) The Secretary of Defense should direct the Under Secretary of Defense for Policy to develop a timeline for implementing its activities to monitor and evaluate the effectiveness of human rights training for foreign security forces. (Recommendation 2) The Secretary of State, in consultation with the Secretary of Defense, should develop a plan with a clear timeline for monitoring and evaluating the effectiveness of human rights training for foreign security forces provided under IMET. (Recommendation 3) We provided a draft of this report for review and comment to DOD and State. DOD concurred with the two recommendations directed to the Secretary of Defense and identified actions it plans to take to address them. Regarding the recommendation to monitor and evaluate human rights training, DOD stated that it would do so as part of monitoring and evaluating its broader security assistance efforts. DOD’s written comments are reproduced in appendix II. State disagreed with the recommendation directed to the Secretary of State. State’s written comments are reproduced in appendix III. In its comments, State acknowledged that human rights training is a vital element of IMET programs and agreed with the need to monitor and evaluate the effectiveness of training—including human rights training— delivered through IMET. However, the department stated that it did not agree to separately conduct monitoring and evaluation of human rights training for IMET participants. Our recommendation for State to develop a plan with a timeline to evaluate the effectiveness of human rights training provided under IMET does not call for a separate evaluation. State could meet the intent of our recommendation through evaluating the effectiveness of human rights training as part of its broader efforts to monitor and evaluate IMET. We added a statement to the report to that effect. We are sending copies of this report to the appropriate congressional committees, the Secretaries of Defense and State, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact Jennifer Grover at 202-512-7141 or groverj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. This report (1) describes the entities through which the Department of Defense (DOD) and the Department of State (State) provide training for foreign security forces on human rights and international humanitarian law; (2) assesses the extent to which DOD and State track the provision of and funding for the training; and (3) examines the extent to which DOD and State have evaluated the effectiveness of the training; and (4) provides DOD, State, and outside expert views on human rights training. To address these objectives, we reviewed laws, guidance, budget documents, course catalogs, and agency data. We also interviewed agency officials in Washington, D.C., and at DOD geographic combatant commands. In addition, we conducted site visits at three facilities that provide human rights training: the Center for Civil–Military Relations (CCMR) in Monterey, California; the Defense Institute of International Legal Studies (DIILS) in Newport, Rhode Island; and the Western Hemisphere Institute for Security Cooperation (WHINSEC) in Fort Benning, Georgia. To address the structures through which DOD and State provide training for foreign security forces on human rights and international humanitarian law, we also reviewed course catalogs and interviewed DOD officials from several DOD entities, including the Defense Security Cooperation Agency; the Office of the Undersecretary of Defense for Policy; U.S. Africa Command; U.S. Indo-Pacific Command; and CCMR, DIILS, and WHINSEC. At State, we interviewed officials from the Bureaus of Political–Military Affairs; Democracy, Human Rights, and Labor; and International Narcotics and Law Enforcement Affairs; and the Office of Foreign Assistance Resources. To address what is known about tracking and funding for the training, including whether and how DOD comprehensively tracks human rights training, we reviewed DOD guidance and interviewed DOD officials and training providers. With the 2017 National Defense Authorization Act (NDAA) consolidating authorities—codified at 10 U.S.C. § 333—and the resulting increase in demand for the human rights training DIILS provides under that authority, we then focused on the ways in which that training and its funding is tracked in DOD systems. We reviewed agency documents, including congressional notifications and quarterly monitoring reports, to review how the training data are reported. We also reviewed federal internal control standards to determine what responsibilities agencies have related to information collection and communication. To assess the extent to which DOD and State have evaluated the effectiveness of the training, we reviewed monitoring and evaluation (M&E) policy and guidance documents and other relevant documents. We interviewed DOD and State officials about their current and planned actions to monitor and evaluate human rights training as well as examples of M&E-related efforts for security assistance programs that include human rights training. We also reviewed legislation, including the 2017 and 2019 NDAAs, which outline M&E requirements for DOD’s security assistance. In addition, we reviewed State’s January 2018 Guidance for the Design, Monitoring and Evaluation Policy at the Department of State to determine M&E requirements for State. To collect information on DOD, State, and outside expert perspectives of human rights training provided to foreign security forces, we conducted individual semistructured interviews with selected stakeholders, including agency officials and outside experts, who consisted of former government officials and representatives of nongovernmental organizations and think tanks. To identify outside experts, we asked stakeholders, including current government officials, to recommend other stakeholders we should speak with (i.e., snowball sampling). In our interviews, we collected information on perspectives of factors that could potentially enhance the effectiveness of human rights training and challenges to achieving human rights objectives through such training. The information we obtained from these stakeholders cannot be generalized across all stakeholders. We conducted this performance audit from February 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Jennifer A. Grover, 202-512-7141 or groverj@gao.gov. In addition to the contacts named above, Juan Gobel, Christina Werth, Emily Desai, Sada Aksartova, James McCully, David Payne, Neil Doherty, John Hussey, Mark Dowling, and Rachel Stoiko contributed to this report.", "summary": "The U.S. government seeks to advance human rights when it provides security assistance to foreign countries. Such assistance includes DOD– and State–supported human rights and international humanitarian law training for foreign security forces. The NDAA for Fiscal Year 2017 consolidated multiple capacity building authorities, now codified at 10 U.S.C. § 333. DOD implements most U.S. human rights training for foreign security forces. Congress included a provision in the NDAA for Fiscal Year 2018 for GAO to review human rights training for foreign security forces. This report, among other objectives, (1) describes the entities through which DOD and State provide such training, (2) assesses the extent to which DOD and State track the provision of and funding for such training, and (3) examines the extent to which DOD and State have evaluated the effectiveness of the training. GAO reviewed laws, regulations, guidance, agency training and funding data, and course catalogs, and interviewed agency officials. Several entities within the Departments of Defense (DOD) and State (State) are involved in human rights training. DOD's Defense Security Cooperation Agency (DSCA) conducts program management for DOD's efforts to build the capacity of foreign security forces. The human rights training required by 10 U.S.C § 333 is provided exclusively by the Defense Institute of International Legal Studies (DIILS), a DOD entity. DOD operates a number of other educational entities that provide training to foreign security forces, and many include human rights–related material in their curriculum or through operational exercises. (See figure.) DOD does not systematically track human rights training and, as a result, only limited information is available on the provision of and funding for these activities. Without a process to ensure systematic and accurate tracking of human rights training data, DSCA is limited in its ability to monitor its compliance with the training–related provision of the National Defense Authorization Act (NDAA) for Fiscal Year 2017. State relies on DOD to track human rights training for military forces and tracks some training and funding data for police. DOD and State have not assessed the effectiveness of human rights training for foreign security forces, according to agency officials. The NDAA for Fiscal Year 2017 required DOD to conduct monitoring and evaluation of its security assistance programs. DOD has taken initial steps to develop monitoring and evaluation policies but officials stated that they have not yet determined when DOD will evaluate human rights training. State officials said they do not know when the agency will begin monitoring and evaluating human rights training provided under the International Military Education and Training program, a large source of funding for such training. Monitoring and evaluation would enable DOD and State to determine the effectiveness of U.S.–provided human rights training for foreign security forces. GAO is making three recommendations, including that the Secretary of Defense establish a process to systematically track mandated human rights training and develop a timeline for implementing monitoring and evaluation. DOD agreed. GAO also recommends that the Secretary of State develop a plan with a timeline to monitor and evaluate such training. State disagreed. GAO continues to believe the recommendation is valid as discussed in the report.", "document_type": "gao"}
{"report": "FEMA is the federal agency primarily responsible for assisting state and local governments, private entities, and individuals to prepare for, mitigate, respond to, and recover from natural disasters, including floods. Floods are the most frequent natural disasters in the United States, causing billions of dollars of damage annually. In 1968, Congress passed the National Flood Insurance Act, which created NFIP, to address the increasing amount of flood damage, the lack of readily available insurance for property owners, and the cost to the taxpayer for flood-related disaster relief. Since its inception, NFIP has served as a key component of FEMA’s efforts to minimize or mitigate the damage and financial impact of floods on the public, as well as to limit the need for federal assistance after floods occur. A primary goal of NFIP is to minimize flood-related property losses by making flood insurance available on reasonable terms and encouraging its purchase by commercial and residential property owners who need flood insurance protection. The program focuses on areas in communities that are at the highest risk of flooding, known as special flood hazard areas. As of November 2019, 22,436 communities across the United States and its territories voluntarily participated in NFIP by adopting and agreeing to enforce flood-related building codes and floodplain management requirements. FEMA uses community assistance visits and community assistance contacts to oversee community enforcement of NFIP requirements. Community assistance visits are on-site assessments of a community’s floodplain management program and its knowledge and understanding of NFIP’s floodplain management requirements. During the visit, FEMA also helps the community remedy any program deficiencies or violations. Some visits are conducted by FEMA regional office staff and others by state floodplain management personnel, through funding from FEMA’s Community Assistance Program (State Support Services Element). Community assistance contacts are usually done by telephone, and their purpose is to establish or re-establish contact with an NFIP community regarding any existing problems or issues and to offer assistance if necessary. These contacts generally include a broad discussion of the community’s floodplain management activities, as well as any outstanding deficiencies and violations and community actions taken to resolve them. NFIP regulations allow FEMA to place a community on probation or to suspend the community from the program if it does not meet or enforce NFIP requirements. After a flood, local officials in communities that participate in NFIP must determine whether the proposed repairs to a damaged building are above or below FEMA’s threshold for substantial improvement or repair of substantial damage. Substantial improvement refers to any reconstruction, rehabilitation, addition, or other improvement of a structure that equals or exceeds 50 percent of the market value of the structure before the start of the construction. Repair of substantial damage means that the cost of restoring the structure to its pre-damage condition equals or exceeds 50 percent of the market value of the structure before the damage occurred. Substantially improved and substantially damaged buildings must be brought into compliance with NFIP requirements for new construction, including the requirement that lowest floors be elevated above the level indicated by the current NFIP flood map. These requirements help reduce future flood risk by elevating or otherwise mitigating properties at risk of flooding. FEMA officials generally do not conduct substantial damage assessments themselves but offer communities tools they can use to collect information and perform damage assessments. When a building insured under NFIP suffers a flood loss and is declared substantially damaged, the owner of the building can apply to receive up to $30,000, on top of any claim payment, to help rebuild according to current NFIP requirements, under a program called Increased Cost of Compliance. In 1990, FEMA implemented a voluntary rating system to recognize and encourage community floodplain management activities that exceed the minimum NFIP requirements. Communities may apply to join CRS if they are in full compliance with the minimum NFIP floodplain management requirements. As of June 2017, about 5 percent of NFIP communities participated in CRS, and more than 69 percent of all flood insurance policies were written in CRS communities. Communities are grouped into classes based on their ratings and can move up in ratings by earning CRS credits for activities such as increasing public information about flood risks, preserving open space, taking steps to reduce flood damage, and preparing residents for floods. The three goals of the CRS program are to reduce flood damage to insurable property by reducing existing buildings’ risk of flood damage and by protecting new buildings from current and future flood hazards; strengthen and support the insurance aspects of NFIP, in particular by encouraging communities to implement NFIP flood maps and increasing residents’ awareness of flood risk so they purchase and maintain flood insurance policies; and foster a comprehensive approach to floodplain management, such as by ensuring that new development does not cause adverse impacts elsewhere in the watershed or on other properties. As the community earns credits for additional flood-mitigation activities, residents and property owners in special flood hazard areas become eligible for increased NFIP policy premium discounts. Each CRS class improvement produces a 5 percent greater discount on flood insurance premiums for properties in the special flood hazard area, up to a maximum of 45 percent. FEMA contracts with a private company to administer many aspects of the CRS program. This contractor verifies the activities of communities on a 5-year cycle, though some communities may be visited on a 3-year cycle as their CRS class and discount improve. Communities can lose discounts if they do not sustain their activities. Communities in Texas and Florida made up 2 percent and 6 percent, respectively, of all NFIP communities nationwide, and their residents purchased almost half of all NFIP policies in force in 2019 (see fig. 1). After Hurricanes Harvey and Irma, property owners in Texas, Florida, and other states made about 98,000 flood insurance claims to NFIP and received a total of almost $10 billion. According to FEMA, Hurricane Harvey required a disaster response that was the largest in Texas state history. Nearly 80,000 homes had at least 18 inches of floodwater, and 23,000 of those had more than 5 feet. Older homes that were not built to minimum NFIP standards sustained the greatest damage. In Florida, Hurricane Irma caused widespread damage to residential and commercial buildings and infrastructure, and flood damage occurred particularly in low-lying areas. Community participation in NFIP is voluntary, but communities must join NFIP for their residents to purchase flood insurance through the program. To join NFIP, communities must adopt and enforce FEMA-approved building standards, floodplain management strategies, and floodplain management regulations to reduce future flood damage. FEMA relies on the communities to notify it of changing flood hazards and help update flood hazards on NFIP flood maps. (See figure 2 for an example of how development can increase flood risk.) Communities designate a floodplain administrator, who may be a local member of the community, such as a building inspector, community zoning official, engineer, or planner, or an entity contracted by the community, such as a county, regional planning agency, another jurisdiction or authority, or a private firm. 44 C.F.R. § 60.2(h). base flood elevations, or the elevation to which FEMA anticipates floodwater will rise during a flood (see fig. 3). Communities must require permits for all development in special flood hazard areas. The permit requirement includes both the construction of buildings or other structures and other land operations, such as mining, paving, excavation, or drilling, which can increase the risk of flooding by obstructing floodwater flows. Development must not increase the flood hazard on other properties. NFIP requires communities to regulate development to ensure that new development does not increase the risk of flooding for surrounding properties. 44 C.F.R. § 60.3. elevated to or above the base flood elevation indicated on the NFIP flood map. FEMA allows elevation on fill; elevation on posts, piers, or columns; or elevation on walls or a crawlspace (see fig. 4). Some communities set standards higher than what is required by NFIP. For example, Harris County, Texas, and Key West, Florida, require new or substantially improved construction to be elevated 2 feet and 1 foot, respectively, above NFIP’s base flood elevation level. In addition, several communities in Florida have cumulative substantial improvement rules. The rules require property owners who make substantial improvements over a period of time to a home built before the community implemented NFIP flood maps to elevate or bring the home into NFIP compliance. Several FEMA studies show that homes that are rebuilt above the base flood elevation suffer less damage in subsequent floods. Challenges expressed by some community officials whom we interviewed included difficulty enforcing NFIP requirements after a storm, retaining experienced floodplain management staff, and implementing updated NFIP flood maps. Difficulty inspecting buildings after a flood. Officials in several communities discussed the challenges related to inspecting buildings for substantial damage after a flood. In one community, inspectors had difficulty assessing flood damage because officials allowed construction to begin immediately and without a building permit. Floodplain officials in two communities said insurance adjustors may pay claims before inspectors have assessed damage, hindering inspectors’ ability to determine if repairs will exceed 50 percent of the home’s value if the homeowner begins to repair damage before the inspection. Challenges retaining floodplain management staff. In eight of the 19 communities we visited, officials cited difficulties obtaining or retaining sufficient staff to perform work such as conducting substantial damage assessments or fulfilling CRS paperwork requirements. For example, one floodplain official told us that after a major storm, the small floodplain management office was overwhelmed with trying to inspect damaged buildings to determine which would require rebuilding to current NFIP standards. Another community we visited did not have a full-time floodplain manager and relied on its building department, which is responsible for issuing building permits, to implement NFIP requirements. Officials said that retaining floodplain management staff is challenging due to factors such as the overwhelming amount of work that had to be performed after a hurricane and low prioritization of floodplain management in noncoastal communities. Two officials said that floodplain management is a difficult job, which can lead to high turnover of staff. Difficulty adopting new NFIP flood maps. Officials in three communities said the introduction of a new flood map can create difficulties. For example, an official said a new flood map can increase the size of the special flood hazard area and require more property owners to buy flood insurance. Another official said that new maps also can raise the base flood elevation, which can raise the cost of insurance premiums. A community official said that his community has been working with FEMA to revise a map for a few years and noted that some property owners in the community planned to challenge the new maps, further delaying adoption. FEMA’s primary method of verifying community compliance with NFIP requirements is through community assistance visits. These visits, along with community assistance contacts—which are in-depth discussions that can be conducted by telephone—are intended to help FEMA prevent, identify, and mitigate deficiencies in a community’s floodplain management. According to FEMA’s guidance, FEMA or state specialists who conduct these visits are to take the following steps (see fig. 5): Prepare for the visit. Specialists prepare for the visit by learning about the characteristics of the community and its prior history with NFIP in order to identify potential issues. Conduct the visit. Specialists tour the community, meet with local officials, and inspect files, among other activities. During the tour, specialists make observations, such as noting for later file inspection whether new structures or structures undergoing major repair meet permit documentation and base flood elevation requirements, and whether major new developments will divert flood water from special flood hazard areas. The specialists meet with local officials to assess the community’s floodplain management program and to provide technical assistance. Specialists also inspect the community’s files to assess the documentation and activities of its floodplain management program. Document findings. Within 30 days of the visit, the specialists are to enter information obtained from the visit, including specific information on deficiencies and violations, into FEMA’s Community Information System. Follow up with the community. After completing the visit, the specialists who conducted the visit are to ensure that the community resolves deficiencies and violations found during the visit in a timely manner. Specialists are to consider additional action, including enforcement actions, if deficiencies remain. In our visits to NFIP communities, officials told us that community assistance visits generally were consistent with the process we found documented in FEMA’s guidance. For example, community officials said specialists toured the floodplains to observe structures (such as new construction, renovations, and waterfront developments) and inspected community files, including permits and elevation certificates. The community officials said specialists generally spent from 1 to 7 days on site performing their reviews. Until recently, FEMA’s guidance documents stated that its goal was to visit all communities it considered to be high-risk every 5 years. FEMA designated some communities as high-risk based on factors including the community’s size, number of flood insurance policies, and number of previously damaged structures. Lower-risk communities were designated to receive a community assistance contact, training, or other contact without regard to time frame. FEMA officials with whom we spoke noted that the risk factors used to designate communities had not been updated since 2010. As a result, according to FEMA officials, in 2019 FEMA began developing a new selection tool that includes updated criteria and focuses on the risk of flooding in a community, the opportunity for a community to improve resilience, and the level of interest a community has in improving its floodplain management. An early version of the tool was released for testing in 2019. FEMA officials said that they and the states started using the new tool to select communities for the annual community visit cycle that began in July 2019. FEMA officials said that while they no longer have a goal of visiting high-risk communities once every 5 years, they do not anticipate conducting fewer visits than before. FEMA officials also noted that communities requesting to participate in CRS will be prioritized for a community assistance visit. From January 2008 through July 2019, FEMA met the 5-year goal for 13 percent of high-risk communities in Florida and 5 percent of such communities in Texas (see fig. 6). FEMA records also indicated that approximately 13 percent of high-risk communities in Florida and 31 percent in Texas did not receive a community assistance visit in that period. However, most high-risk communities in the two states were visited at some point during the overall time period. About 87 percent of high-risk communities in Florida and about 69 percent in Texas received at least one visit during that period. FEMA officials said that one reason for the limited number of visits to some high-risk communities is that FEMA resources, including state specialists, can be diverted to assist with disaster recovery efforts. FEMA officials also said that it is a challenge to visit all high-risk communities in states with a large number of NFIP communities, such as Texas and Florida, but they generally do not have the same challenge in states with fewer communities. FEMA officials said that in 2019 they employed about 120 specialists nationally, and that state grants allowed for another 130 state specialists to be divided among all states. Based on our analysis of FEMA’s data for Florida and Texas, FEMA regional staff completed about 20 percent of the visits and state specialists and others completed the remaining 80 percent. A FEMA official told us that the agency has been considering using methods other than community visits (such as checking in with communities 12–18 months after a flood) to verify compliance with NFIP requirements. However, as community assistance visits currently remain FEMA’s primary tool for ensuring compliance, the limited number of visits it has conducted in high-risk communities hinders its ability to provide such oversight. For example, it hinders FEMA’s ability to prevent, identify, and mitigate deficiencies in communities’ implementation of NFIP requirements, which, in turn, can limit their ability to prevent or limit future flood losses. According to FEMA guidance, specialists should document their community assistance visits, including information on any deficiencies and violations found during the visit, in FEMA’s Community Information System within 30 days of the visit. If a deficiency or violation is found, the specialists are to close out the record of the community visit after any deficiencies and violations have been addressed. The guidance further states that during the course of the visit, specialists should collect documentation that thoroughly supports their findings. Such documentation helps monitor a community’s progress toward resolving its floodplain management issues and, if needed, support any enforcement actions. Our review of FEMA records of community assistance visits in Florida and Texas from 2008 through 2019 showed that about one-third of all records remained open for a year or longer, and in some cases records stayed open for 5 years or more (see fig. 7). For example, around 29 and 23 percent of community assistance visits conducted in Florida and Texas, respectively, remained open for 3 or more years. In Florida, 4 percent remained open for 8 years or more. FEMA headquarters officials told us that they were unsure whether individual records remained open due to unresolved deficiencies and violations or because the specialist who conducted the visit failed to close the record. The officials also noted that specialists who enter information into the Community Information System about deficiencies and violations may not understand the importance of noting specific details and, as a result, may exclude details in many cases. As such, the level of detail can vary from one visit record to another depending on the individual entering the data. FEMA officials told us that turnover of state floodplain specialists and community floodplain managers could be a reason that many records remained open for an extended period. For example, they said turnover among state specialists could result in visit records remaining open because the staff responsible for closing a visit record no longer worked for the state. They also said that turnover among community floodplain managers could result in deficiencies remaining open for extended periods because there was no one in the community to address them. Furthermore, they said that because of the high turnover of community floodplain managers, they want to find other ways of monitoring community compliance with NFIP requirements. FEMA officials told us that another reason visit records can remain open for longer periods of time is FEMA’s approach to community oversight. The officials said that they would rather work with a community to resolve any deficiencies and consider steps such as suspension and probation to be a last resort. As a result, FEMA guidance does not include a maximum number of days a deficiency can remain open before beginning enforcement action, such as probation or suspension. Standards for internal control in the federal government state that management should use quality information to achieve the entity’s objectives. Without appropriate steps to ensure that it has reliable and timely information on community assistance visits, FEMA cannot readily determine if open records indicate a recordkeeping problem, a community deficiency that needs to be addressed, or something else. As a result, FEMA’s ability to determine if communities have been following NFIP requirements is hindered and the agency may miss opportunities to prevent future flood losses. Immediately after a flood, local floodplain management officials may assess the extent of damage to individual properties and determine whether damage is substantial enough that certain structures must be rebuilt to current NFIP requirements. As stated earlier, a substantially damaged property is one requiring repair work that costs 50 percent or more of a structure’s pre-flood market value. Local officials usually assess substantial damage to a property in three stages. Initial assessment. Local officials conduct initial assessments of flood-damaged properties—typically by driving through affected areas—to gauge the number of buildings affected and extent of damage. Preliminary damage assessments. These assessments are performed by FEMA or state officials, along with community officials. They are intended to broadly characterize the extent of damage. Local officials charged with performing building inspections and making substantial damage determinations may find the results of these assessments useful for identifying areas where significant damage has occurred and to coordinate their substantial damage inspections. Substantial damage assessment. Local officials conduct substantial damage assessments on the most severely damaged structures. These assessments are more in depth than the initial review and generally involve identifying damage to a property, estimating the cost to fix that damage, and determining whether the damaged structure can be classified as substantially damaged. State and FEMA representatives can assist local officials in performing these assessments, as they did after Hurricanes Harvey and Irma. FEMA also recently began offering communities an updated version of its substantial damage estimator tool, a software template designed to help officials assess damage more quickly and consistently. Figure 8 illustrates the process for declaring properties to be substantially damaged after a flood. While FEMA may provide assistance in conducting damage assessments, NFIP guidance documents state that community floodplain management officials are responsible for estimating the cost to repair and the market value of the structure, determining which properties are substantially damaged, and notifying property owners of their determination. As noted earlier, NFIP requires property owners to bring any substantially damaged buildings located in a special flood hazard area into compliance with minimum NFIP requirements, if they choose to rebuild. This could mean elevating their structure to reduce the risk of future flood damage or losses. For example, several officials from NFIP communities we visited commented that properties raised to or built at higher elevations following floods prior to 2017 received less flood damage during the events of 2017. Commercial and residential property owners with NFIP flood insurance who wish to rebuild a property that has been declared substantially damaged must work with the insurance company through which they purchased their NFIP policy to process their NFIP claim, and then must obtain permits from their community for repair work. As noted previously, these policy holders may be eligible to receive additional funding through NFIP’s Increased Cost of Compliance program—currently up to $30,000 beyond the claim payment—to help with the cost of bringing their home into compliance with current NFIP standards. FEMA does not have ready access to data on substantial damage assessments outside of community assistance visits, which we noted above are FEMA’s primary mechanism for NFIP community oversight. For example, we requested data from FEMA on the number of substantial damage assessments performed after Hurricane Harvey in Texas and Hurricane Irma in Florida in 2017. FEMA headquarters officials said that the data were not readily available and they would have to reach out to the regional offices to provide the figure, which took several months. In addition, FEMA regional officials said in August 2019 that they were still assessing the total number of properties that were substantially damaged in Texas in 2017 and that it would take approximately 12 to 24 months to collect these data. They estimated that local NFIP officials and state contractors in Texas performed 27,000 substantial damage assessments with FEMA assistance after Hurricane Harvey. FEMA regional officials also said that following Hurricane Irma, FEMA floodplain management specialists helped train local officials for, or assisted local communities in conducting, 20,206 substantial damage assessments in Florida. According to FEMA, as of December 2019, approximately 2,232 properties had been declared substantially damaged as a result of Hurricane Irma, 86 percent of which had been brought into compliance with NFIP regulation. FEMA officials could not tell us how many substantial damage assessments were conducted in Texas after Hurricane Harvey almost 2 years after the hurricane in part because FEMA does not have ready access to community data on substantial damage assessments. To access data on substantial damage assessments, FEMA headquarters officials first need to ask FEMA regional officials to request data from NFIP communities, and then wait for the communities to compile and send the data to the regional offices. FEMA officials also can review data on individual substantial damage assessments during community assistance visits. FEMA officials said they have not centralized or automated their collection of information on substantial damage assessments for several reasons. FEMA officials said that, in their view, the community is responsible for gathering and maintaining this information as a condition of its NFIP participation, and they consider the communities to be owners of those data. Furthermore, they said that centralized collection of substantial damage data would involve data privacy issues and be a drain on limited resources for disaster relief. However, FEMA officials expressed concern that some communities might not be consistently maintaining documentation of the substantial damage assessments. FEMA officials told us that they have two initiatives underway to help NFIP communities and FEMA staff collect data on substantial damage assessments: Substantial damage estimator tool. Updates to the substantial damage estimator tool, discussed earlier, should help communities collect data more consistently and better document assessments, according to FEMA officials. Community officials can use the tool to evaluate flood damage to residential and nonresidential structures and enter information such as structure type and address. The tool also includes a square-footage calculator and now allows photographs or other files to be attached to the completed assessment. Staff guidance. New staff guidance, which officials said will be implemented sometime in 2020, explicitly outlines for NFIP floodplain managers and FEMA staff the information NFIP communities should collect and maintain when performing substantial damage assessments. The guidance was created to address what FEMA officials believed were shortcomings in existing guidance to communities, which may have made some NFIP communities reluctant to conduct substantial damage assessments and enforce the requirements for those deemed substantially damaged. The new guidance also establishes time frames for data collection at the NFIP community level. While these steps may improve the quality of FEMA’s data on substantial damage assessments, federal internal control standards state that management should obtain relevant data from reliable sources in a timely manner based on the identified information requirements and obtain data on a timely basis so that they can be used for effective monitoring. If FEMA headquarters and regional offices do not have ready access to such data beyond the data collected during community assistance visits, they will be hindered in their ability to evaluate community compliance with NFIP requirements. FEMA also may be hindered in its ability to measure the effectiveness of substantial damage assessments, such as the extent to which substantially damaged homes are rebuilt according to NFIP requirements. It is especially important for FEMA to monitor community compliance with the process for assessing substantially damaged properties because this is the system FEMA uses to mitigate flooded properties and reduce the risk of future losses. If FEMA does not know how effectively this process operates, it could miss opportunities to use the process to reduce the financial exposure of NFIP. NFIP communities that we visited reported varying levels of access to NFIP claims data and information. According to FEMA guidance, the agency should provide local officials with information on their community that includes the number of flood insurance policies in force, dollar amount of coverage, and the number of claims. NFIP communities also can access information on publicly available data on claims payouts. Officials in some communities we visited were able to access claims data while officials in other communities were not. Some officials with whom we spoke were unsure whether access was permissible. For example, an NFIP community official in Texas said that FEMA told his office they could not provide him with the data when he asked for it. Another Texas official said that typically the communities do not have access to data on flood losses and claims paid. In Florida, an official said that she was able to access some data on NFIP claims in her area as long as the community did not use the data to make substantial damage determinations. Community officials told us that it would be helpful for them to access NFIP claims data after a flood. For example, a number of community floodplain managers told us that having NFIP claims information from FEMA would benefit their flood recovery efforts because it would allow them to better target their substantial damage assessments and make that process more efficient. Officials from other NFIP communities that we visited stated that claims data could help them identify property owners who were likely to start to rebuild and ensure they obtained permits, which can be difficult to determine otherwise. Another group of community officials said that claims data for their community indicated NFIP paid out more than the community’s own estimated value of the insured homes in their community, indicating there may have been more substantially damaged homes than they identified. FEMA officials acknowledged confusion among communities concerning their access to NFIP claims data and said they have been working to address it, noting that they must ensure compliance with the Privacy Act of 1974, under which the agency can share certain data only with organizations that have a programmatic need for the information. Officials also said they have been working to streamline the process through which NFIP communities can request claims data. For example, they said they have been considering the most efficient methods for sharing data with local communities that require post-disaster flood information while protecting the privacy of the data. In addition, FEMA officials said they have been drafting guidance—which they expect to be issued in 2020—and a new form for community data requests. They said their intent is that once communities are approved for access to a certain type of data, they would not have to reapply for subsequent requests. FEMA officials said the guidance will provide communities with access to NFIP claims data on a property-by-property basis. Federal standards for internal control state that management should externally communicate necessary quality information to achieve the agency’s objectives and address related risks. While FEMA has taken positive steps toward reducing confusion surrounding communities’ access to claims data, at the time of our review FEMA had not yet finalized new guidance. As a result, we were unable to evaluate the potential of these tools to effectively resolve communities’ confusion over appropriate access to claims information. Until FEMA clarifies the process for communities to access claims data on properties within their community, FEMA may be missing an opportunity to provide communities with data that they would find helpful in the substantial damage assessment process. FEMA relies on communities participating in NFIP to follow its floodplain management requirements, which are designed to reduce the risk of flood damage and the resulting cost to taxpayers. Community assistance visits are the agency’s primary tool for ensuring that communities implement these requirements. However, in Texas and Florida FEMA often has not conducted such visits to high-risk communities and lacks complete data on the results. As a result, FEMA’s ability to ensure that the communities follow NFIP requirements is limited. In addition, FEMA does not have ready access to data on substantially damaged properties and the related documentation, which hinders its ability to determine if an NFIP community has followed NFIP substantial damage assessment procedures and correctly identified all substantially damaged homes. This, in turn, limits FEMA’s ability to evaluate NFIP’s effectiveness. Finally, confusion exists among some NFIP communities regarding their access to NFIP claims data, potentially limiting the benefit such data could provide to those communities in identifying substantially damaged properties and ensuring all repairs of flood damage are done to NFIP community standards. We are making a total of four recommendations to FEMA: The Administrator of FEMA should assess different approaches, in addition to community assistance visits, for using existing resources to ensure communities’ compliance with NFIP requirements. This should include analyzing alternatives to community assistance visits. (Recommendation 1) The Administrator of FEMA should identify appropriate steps to ensure it has complete, up-to-date, and reliable records of community assistance visits, including information on why some visit records remain open for a significant period of time. (Recommendation 2) The Administrator of FEMA should ensure that communities are consistently collecting data on their substantial damage assessments and that FEMA has a way to readily access those data to evaluate community compliance with NFIP requirements for rebuilding substantially damaged properties. (Recommendation 3) The Administrator of FEMA should clarify with NFIP communities its policies on sharing data on NFIP claims and provide such information to those communities as needed. (Recommendation 4) We provided a draft of this report to the Department of Homeland Security for review and comment. In its comments, the Department of Homeland Security concurred with our recommendations. FEMA also provided technical comments, which we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report (1) describes the requirements that communities participating in the National Flood Insurance Program (NFIP) must meet and the challenges they face in doing so, (2) examines the extent to which the Federal Emergency Management Agency (FEMA) uses community visits to ensure communities follow requirements, and (3) examines how FEMA oversees community implementation of NFIP requirements for conducting substantial damage assessments. This report focuses on NFIP communities in Florida and Texas that were affected by Hurricanes Irma and Harvey in 2017. For all three objectives, we reviewed FEMA guidance and regulations for communities participating in NFIP and in FEMA’s Community Rating System. We interviewed officials from FEMA’s Federal Insurance and Mitigation Administration, as well as officials in two FEMA regional offices in Georgia and Texas. We also visited 18 communities in Texas and Florida, and an additional community in Louisiana, that were affected by flooding in the 2017 hurricanes. We conducted structured interviews with officials in these communities. We selected these communities to represent a mix of large and small communities and because they participate in FEMA’s Community Rating System. The officials we interviewed included floodplain managers, emergency management coordinators, watershed managers, and representatives of homebuilder associations. We also interviewed representatives of four national and state floodplain associations, and three additional experts—two academic experts and a city official—with significant knowledge of NFIP and flooding issues. For our first objective, we analyzed the responses of these officials to identify the most commonly cited challenges. For our second objective, we analyzed data on community assistance visits in Florida and Texas from FEMA’s Community Information System from January 1, 2008, through July 30, 2019, and spoke with FEMA and community officials. To determine whether FEMA carries out the community assistance visits in accordance with its own guidance, we reviewed FEMA’s guidance for specialists to prepare for, conduct, and follow up on the visits. We also spoke with FEMA and other officials about their experience with the visits to determine whether FEMA and state specialists generally followed FEMA’s guidance. To determine the extent to which FEMA met its goal of visiting high-risk communities once every 5 years, we compared the data in the Community Information System on community visits against the lists of Tier 1 (high-risk) and Tier 2 (lower- risk) communities provided by FEMA. We also analyzed the data to determine the length of time that records from the community visits were left open, and whether the records were complete. While we noted that the data in the Community Information System were at times incomplete, we found the data reliable enough to identify the frequency of community assistance visits and issues with data entry. For our third objective, to examine how FEMA oversees community implementation of NFIP requirements for conducting substantial damage assessments, we reviewed FEMA policies and guidance, including NFIP Floodplain Management Requirements outlined in 44 C.F.R. Parts 59 and 60. We also reviewed FEMA’s Substantial Improvements Substantial Damage Desk Reference (FEMA 758-P) and FEMA flood-mitigation requirements. We examined FEMA’s NFIP post-flood processes and procedures related to substantial damage assessments. We reviewed FEMA data on the number of substantial damage assessments performed in Florida and Texas after Hurricanes Irma and Harvey as well as the number of damaged properties that received increased cost of compliance funding. We discussed with community officials their experiences conducting substantial damage assessments and the challenges they faced in doing so. We also reviewed literature to identify actions taken by NFIP communities after a flood, and we reviewed FEMA documentation to determine the actions taken by FEMA and NFIP communities after a flood. We also compared FEMA’s practices for collecting data for effective monitoring and communication against federal standards for internal controls. We conducted this performance audit from October 2018 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Alicia Puente Cackley, (202) 512-8678 or cackleya@gao.gov. In addition to the contact named above, Patrick Ward (Assistant Director), Leah DeWolf (Analyst in Charge), Audrey Blumenfeld, Tarik Carter, Anar Jessani, Angela Pun, Jessica Sandler, Jennifer Schwartz, and Jena Sinkfield made key contributions to this report. William Chatlos and Yann Panassie provided technical assistance.", "summary": "NFIP's effectiveness depends in part on communities implementing FEMA requirements on floodplain management and post-disaster rebuilding efforts. GAO was asked to undertake a comprehensive evaluation of federal disaster preparedness, response, and recovery efforts. This report examines (1) requirements NFIP communities must meet and challenges they face, (2) FEMA's use of community visits to ensure compliance, and (3) how FEMA oversees community implementation of NFIP requirements for conducting substantial damage assessments. GAO analyzed FEMA data on oversight visits and substantial damage assessments from January 2008 through July 2019. GAO also interviewed floodplain managers in 19 communities in Texas, Florida, and Louisiana, and officials from FEMA and floodplain management organizations. The Federal Emergency Management Agency (FEMA) requires communities participating in the National Flood Insurance Program (NFIP) to adopt FEMA floodplain maps; limit flooding caused by new development; and require that substantially damaged structures meet elevation requirements (see figure). Community floodplain officials cited challenges, including difficulty inspecting buildings after a flood, staff turnover, and adopting new NFIP flood maps. FEMA primarily uses community assistance visits to monitor compliance with NFIP requirements. The visits include evaluations of recent construction. Until 2019, FEMA's goal was to visit all communities considered to be high-risk every 5 years. However, FEMA did not meet this goal in Texas or Florida in 2008–2019 because of a lack of resources. Many high-risk communities received only one visit in this period, and some were not visited at all. Without regular monitoring, FEMA's ability to ensure communities comply with requirements is limited. FEMA and state specialists also are to close out records of these visits in FEMA's tracking system if they find no deficiencies or violations, or when the community has resolved any issues. However, in Florida and Texas GAO found that records for many visits remained open for several years, and FEMA staff were unsure whether this indicated unresolved deficiencies or incomplete recordkeeping. Unreliable recordkeeping hinders FEMA's ability to assess community compliance with NFIP requirements. After a flood, one key community responsibility is to assess whether flood damage on a property was substantial (50 percent or more of the property's value). In such cases, the community must ensure the properties are rebuilt to current NFIP standards. However, FEMA generally does not collect or analyze the results of these assessments, limiting its ability to ensure the process operates as intended. Furthermore, FEMA has not clarified how communities can access NFIP claims data. Such data would help communities target substantial damage assessments after a flood. GAO is making four recommendations to FEMA: The agency should (1) assess different approaches for ensuring compliance with NFIP requirements, (2) ensure data on community visits are up-to-date and complete, (3) ensure communities collect data on substantial damage assessments, and (4) clarify policies on data sharing between FEMA and NFIP communities. FEMA concurred with the recommendations.", "document_type": "gao"}
{"report": "The use of ESG factors has emerged as a way for investors to capture information on potential risks and opportunities that otherwise may not be taken into account in financial analysis. ESG factors like climate change impacts and workplace safety may affect a company’s expected financial performance and thereby its value to shareholders. See table 1 for examples of ESG factors. ESG standard-setting organizations were created to improve transparency and consistency in companies’ disclosure of ESG information. Several independent and nonprofit organizations have created voluntary frameworks companies may use to disclose on ESG issues, as shown in table 2. Frameworks are generally comprised of single-issue categories that contain several specific disclosure topics related to that category. SEC rules and regulations generally require public companies to disclose, among other things, known trends, events, and uncertainties that are reasonably likely to have a material effect on the company’s financial condition or operating performance, as well as potential risks to investing in the company. SEC considers information to be material if there is a substantial likelihood that a reasonable investor would consider it important in making an investment decision in the context of the total mix of available information. Public companies disclose information on an ongoing basis through annual 10-K filings, quarterly 10-Q filings, and definitive proxy statements, among other disclosure requirements. Regulation S-K contains SEC integrated disclosure requirements for 10-K filings and other periodic reports filed with SEC. Staff in Corporation Finance are to selectively review 10-K filings for compliance with requirements outlined in Regulation S-K and other applicable accounting standards and form requirements. While federal securities laws generally do not specifically address the disclosure of ESG information, Regulation S-K’s disclosure requirements for nonfinancial information apply to material ESG topics. Regulation S-K also includes prescriptive requirements for disclosure of certain topics considered to be ESG topics, such as board composition, executive compensation, and audit committee structure. Corporation Finance’s legal and accounting staff review filings through seven offices organized by industry, and office managers assign different levels of reviews to 10-K filings, such as full reviews (which include financial and legal reviews) and financial-only reviews. The Sarbanes- Oxley Act of 2002 requires SEC to review the financial statements of each reporting company at least once every 3 years, which informs, among other factors, how Corporation Finance selects and determines the extent to which 10-K filings are reviewed. In conducting these reviews, Corporation Finance staff may provide comments to a company to obtain additional information, clarification on the company’s disclosure, or to significantly enhance its compliance with applicable reporting requirements. Comments depend on the issues that arise in a particular filing, and staff may request that a company provide additional information to help them better evaluate disclosures. SEC occasionally issues interpretive releases on topics of general interest to the business and investment communities, which reflect the Commission’s views and interpret federal securities laws and SEC regulations. For example, in 2010, SEC issued the Commission Guidance Regarding Disclosure Related to Climate Change, which described how existing disclosure requirements could apply to climate change-related information and how companies may consider climate disclosures in required filings. In 2018, SEC also issued the Commission Statement and Guidance on Public Company Cybersecurity Disclosures, outlining how existing reporting requirements could apply to cybersecurity-related risks and incidents. These interpretive releases do not establish new reporting requirements. Instead, they identify items in existing laws and regulations that may be most likely to require disclosure on these topics, such as description of the company’s business and potential risk factors that may affect the company. Institutional investors with whom we spoke generally agreed that ESG issues can have a substantial effect on a company’s long-term financial performance. All seven private asset managers and representatives at five of seven public pension funds said they seek ESG information to enhance their understanding of risks that could affect companies’ value over time. Representatives at the other two pension funds said that they generally do not consider ESG information relevant to assessing companies’ financial performance. While investors with whom we spoke primarily used ESG information to assess companies’ long-term value, other investors also use ESG information to promote social goals. A 2018 US SIF survey found that private asset managers and other investors, representing over $3.1 trillion (of the $46.6 trillion in total U.S. assets under professional management), said they consider ESG issues as part of their mission or in order to produce benefits for society. Institutional investors we interviewed identified various ways they use ESG disclosures to inform their investment decisions and manage risks related to their investments. Protecting long-term investments by monitoring companies’ management of ESG risks. Some investors with whom we spoke noted that they primarily make long-term investments in passively managed funds, which may prevent them from making investment decisions based on ESG information. However, 10 of 14 investors said that their focus on long-term factors that drive value leads them to monitor or influence companies’ management of ESG issues to protect their investments. Investors generally said they use ESG disclosures to determine which ESG issues companies monitor and to assess how companies manage these risks. Nearly all investors said ESG issues can be important to a company’s operations and performance over time. For example, seven of 14 investors said they used ESG disclosures to identify companies that were less transparent than their peers or appeared to be outliers in their industries, such as having less board diversity than their peers. Investors then engaged with these companies to discuss their risk- management strategies, encourage disclosure on ESG issues, or provide information about what kind of disclosure they would find useful. Informing shareholder votes. Most investors with whom we spoke said they use ESG information to inform their votes as shareholders at annual shareholder meetings, either through a proxy advisory firm or independently. Specifically, nine of 14 investors said that ESG information informs how they vote on directors’ nominations to the board and other proposals at public companies’ annual meetings. For example, representatives from two large public pension funds said they withhold votes for directors if they determine that a company’s board had not effectively disclosed issues, such as climate risk or executive performance metrics. Creating ESG funds or portfolios. Five of 14 investors we interviewed said they created ESG-focused investment funds or portfolios with goals such as promoting social responsibility and environmental sustainability. In creating these funds and portfolios, investors generally review companies’ ESG disclosures to determine which companies to include or exclude from these funds or portfolios. For example, two private asset managers said they created ESG funds or portfolios to attract investors focused on social goals, such as faith-based investors, while representatives from one pension fund said they had worked with an asset manager to create a low- emissions index intended to support the Paris Agreement’s goals. Divesting. Some investors we interviewed said they typically would not divest based on a company’s ESG disclosures, and three said that ESG information could lead them to divest. A mid-size asset manager noted that the firm works with companies to improve their disclosures rather than divest. Conversely, representatives from one mid-size pension fund said they found that buying or selling shares is a more efficient method for changing corporate behavior than the lengthier strategy of engaging companies in dialogue. Additionally, a large asset manager said that its portfolio managers sell shares if a company’s ESG performance or response to engagement is poor. Although some studies report that the quantity and quality of ESG disclosures generally improved in the last few years, 11 of 14 investors with whom we spoke said they seek additional ESG disclosures from companies to address gaps and inconsistencies, among other issues. Investors described challenges with understanding and interpreting both quantitative and narrative disclosures. Quantitative disclosures. Investors cited examples of inconsistencies in companies’ quantitative disclosures that limit comparability, including comparability among companies that disclose on the same ESG topics. Specifically, investors described challenges such as the variety of different metrics that companies used to report on the same topics, unclear calculations, or changing methods for calculating a metric. For example, five of 14 investors said that companies’ disclosures on environmental or social issues use a variety of metrics to describe the same topic. A few studies have reported that the lack of consistent and comparable metric standards have hindered companies’ ability to effectively report on ESG topics, because they are unsure what information investors want. In addition, some investors said that companies may change which metrics they use to disclose on an ESG topic from one year to the next, making disclosures hard to compare within the same company over time. Narrative disclosures. Most investors noted gaps in narrative disclosures that limited their ability to understand companies’ strategies for considering ESG risks and opportunities. For example, some investors noted that some narrative disclosures contained generic language, were not specific to how the company addressed ESG issues, or were not focused on material information. For example, two private asset managers said that companies may provide boilerplate narratives or insufficient context for their quantitative disclosures, and representatives from one pension fund said that the fund would like additional disclosures on cybersecurity but has found that most disclosures on this topic are generic and not very helpful. Additionally, most institutional investors said that there is fragmentation in the format or location of companies’ ESG disclosures, which can make this information hard to compile and review. However, these investors generally said that it is more important for companies to focus on providing disclosures than on how or where the disclosures are presented. These investors said that they are able to purchase access to compiled data from third-party data providers to use in their analysis of companies’ ESG disclosures. Regarding how investors seek ESG disclosures, nearly all institutional investors with whom we spoke said they engage with companies to request additional ESG disclosures through meetings, telephone calls, or letters. Some investors said that companies’ responsiveness, which can include producing ESG presentations for investors and discussing ESG information on earnings calls, varied by size because larger companies have more resources to respond to investor engagement. Engagement also can be complicated by conflicting investor demands, as well as the proliferation of standards and surveys. According to representatives from an industry group that we interviewed, the large number of demands for specific ESG information from investors and third parties can pose a challenge to companies as they prioritize how to respond. For example, one company said it receives diverse requests for information that indicate that those investors do not agree on what issues are most important. Some investors seek additional ESG disclosures by submitting shareholder proposals, which are requests from shareholders that the company take action on a specific issue or issues. These proposals are generally presented for a shareholder vote at public companies’ annual meetings. However, shareholder proposals can be withdrawn before coming to a vote when the company reaches an agreement with the shareholder who submitted the proposal prior to the annual meeting. Our analysis of a generalizable sample of companies listed on the S&P 1500 found that in 2019, an estimated 10 percent of companies received one or more shareholder proposals and an estimated 5 percent of companies received one or more shareholder proposals related to increasing ESG disclosures. For the ESG-related proposals in our sample, on average about 28 percent of shareholders voted in favor of these proposals and no proposals received more than 50 percent of the vote. As shown in table 3, the companies in our sample received a total of six proposals requesting additional ESG disclosures on a variety of social and governance topics. Most of these proposals were submitted to large companies. Investors that submitted proposals included one public pension fund, one labor organization, three socially focused asset managers, and one higher education endowment. All of the private asset management firms and representatives from three of seven pension funds we interviewed said they do not use shareholder proposals as a means to influence companies’ ESG disclosures. One of these pension funds said they have found filing shareholder proposals unnecessary after engaging in dialogue with companies. However, representatives from four of seven pension funds said they have filed shareholder proposals to seek additional ESG disclosures. Two large pension funds said they have found filing shareholder proposals an important engagement method for getting companies’ attention on ESG issues, while the other two funds noted that it was rare for them to file a proposal. Similarly, studies and reports we reviewed indicated that shareholder proposals are concentrated among a relatively small number of shareholders and that the number of proposals has been declining in the last 5 years. For example, a law firm’s analysis of shareholder proposals filed with companies listed on the S&P 1500 in 2019 reported that 10 investors submitted over half of all proposals. This report also found that faith-based investors and socially focused asset managers, who seek to advance social causes in their investments, submitted the majority of environmental and social proposals in both 2018 and 2019. In addition, this analysis showed that the total number of shareholder proposals, including withdrawn proposals, submitted annually declined each year from 2015 to 2019. As the total number of proposals has declined, shareholder proposals related to environmental and social issues constituted over 45 percent of proposals each year from 2015 to 2019. While studies found that during this same time period shareholder support increased for these environmental and social proposals that went to a vote, shareholder support for most of them remained below 30 percent. Representatives from public companies with whom we spoke said they use several methods and consider multiple factors when deciding which ESG topics to report. Most companies (10 of 18) noted that legal and regulatory requirements were their primary consideration when determining which ESG factors to disclose. In addition, nearly all companies (15 of 18) told us they conduct some form of stakeholder engagement when determining what ESG information beyond regulatory requirements to report. As part of the engagement process, companies generally said they reach out to investors, representatives of communities they operate in, and other interested stakeholders to solicit their opinions about which ESG factors are important to them. Some companies described their ESG stakeholder engagement process as part of their broader company-wide outreach efforts, while others told us they hired outside firms to conduct this engagement on their behalf. In addition to stakeholder outreach, most companies (11 of 18) told us they perform assessments to determine which ESG topics to include in their regulatory filings or other reports. As part of these assessments, companies review a wide array of potential risks and identify the ones that would have the most impact on their business. In addition to requirements, outreach and assessments, most companies (nine of 18) told us they review ESG disclosure frameworks, such as GRI and SASB, to inform their consideration of which ESG factors to disclose. Similar to deciding which ESG topics to disclose, most companies (10 of 18) told us they also rely on legal and regulatory requirements when determining where to disclose ESG information. Specifically, companies said they identify those ESG factors that should be included in the 10-K or proxy statement according to SEC requirements, and publish information on these factors in their regulatory filings. In addition, some companies (six of 18) told us that they view their voluntary sustainability report as complementary to their regulatory filings. Specifically, four companies said they view their sustainability reports as a place to publish relevant ESG information that may not necessarily be material under the SEC definition and is therefore not included in regulatory filings. Lastly, some companies also told us that their voluntary sustainability reports provide an opportunity to disclose information that is of interest to ESG-focused investors or non-investor stakeholders. For example, some companies (five of 18) told us they use these reports to reach a broader stakeholder audience beyond investors, including employees and customers, when writing their sustainability reports. In addition to the regulatory and voluntary reporting that we reviewed, representatives from all 18 companies said they communicate ESG information in other ways. For example, most companies (13 of 18) said they also publish issue-specific ESG reports, most commonly on climate change. Most companies (12 of 18) also said they include ESG information on their company websites, because information could be updated more frequently and include more dynamic content, such as videos. Finally, most companies (11 of 18) told us they have developed ESG-focused presentations for investors, and some companies (four of 18) said they have begun including ESG information in their traditional investor communications, such as quarterly earnings calls and stockholder bulletins. To assess the amount and characteristics of the ESG information companies report, we reviewed regulatory filings and voluntary reports issued by 32 large and mid-size public companies in eight industries. For each company, we reviewed two types of regulatory filings (10-K and the definitive proxy statement), annual reports (when distinct from the 10- K), and voluntary sustainability reports (where available). Of our selected companies, 25 published voluntary sustainability reports and 21 published annual reports separate from their 10-Ks. Using keyword search terms, we searched these documents to identify disclosures related to eight broad ESG factors and 33 more-specific disclosure topics under these factors (see fig. 1). We selected ESG factors from among those that a range of market observers frequently cited as important to investors or potentially material and selected ESG topics by reviewing ESG disclosure frameworks. For more information about this methodology, see appendix I. As shown in figure 2, we identified disclosures on six or more of the eight ESG factors for 30 of the 32 companies in our sample and identified 19 companies that disclosed information on all eight factors. All selected companies disclosed at least some information on factors related to board accountability and resource management. In contrast, we identified the fewest companies disclosing on human rights and occupational health and safety factors. With regard to the 33 more-specific ESG topic disclosures we examined, 23 of 32 companies disclosed on more than half of them. The topics companies disclosed most frequently were related to governance of the board of directors and addressing data security risks. Conversely, based on disclosures we identified, we found that companies less frequently reported information on topics related to the number of self-identified human rights violations and the number of data security incidents. In addition, we found that companies most frequently disclosed information on narrative topics and less frequently disclosed information on quantitative topics. There are several reasons why a company may not have disclosed information on a specific ESG topic, including that the topic is not relevant to its business operations or material. Figure 3 compares the amount of disclosure on the 33 ESG topics within and across the selected industries. We identified the most disclosure on the group of topics related to board accountability, climate change, and workforce diversity and the least amount on topics related to human rights. SEC requires companies to report certain governance information in their proxy statements in advance of shareholder meetings where shareholders elect members of the company’s board of directors, which may help explain why board accountability topics are the most reported across industries in our sample. Additionally, differences in disclosure can result, in part, from the relevance of an ESG topic to a particular industry. For example, more companies in the airline and oil and gas industries disclosed information on climate change, while more companies in the internet media and banking industries disclosed information on data security. We identified disclosures on fewer topics by companies in the internet media industry than the other industries we assessed. None of the four internet media companies in our sample issued a stand-alone sustainability report. As discussed below, most companies tended to include more extensive ESG disclosures in their sustainability reports than in their regulatory filings. Figure 4 illustrates how the amount of disclosures on the 33 ESG topics compared across the four types of documents we reviewed. We found that companies generally reported information on a wider variety of ESG topics in their voluntary sustainability reports. Specifically, with the exception of a few topics, when companies disclosed information on an ESG topic, they most frequently did so in their sustainability reports. Certain ESG topics were reported more frequently in regulatory filings. For example, nearly all selected companies reported ESG information related to their board of directors in their proxy statements. Additionally, we found that companies disclosed on risks related to climate change, data security, hiring employees, and resource management in their 10- Ks, which includes a risk factors section where companies are required to discuss the most significant factors that make investment in the company speculative or risky. As discussed earlier, some investors with whom we spoke said they seek additional narrative disclosures from companies whose disclosures contained generic language or did not provide specific details about how the company manages ESG-related risks or opportunities. Among the 33 ESG topics we reviewed, 16 were topics for which companies reported a narrative rather than quantitative disclosure. We categorized these narrative disclosures as either generic or company-specific (see fig. 5 for examples). We defined company-specific disclosures as those that discussed specific ways that ESG-related risks and opportunities could affect the company’s operations or specific steps the company takes to manage or respond to the ESG-related risks or opportunities. We defined disclosures that did not include such specific details as generic disclosures. As a result, such generic disclosures can be considered applicable to the reporting company as well as to many of its peers. According to two reports, companies may choose not to disclose more detailed information for a particular ESG topic for several reasons, including concerns that such disclosures would put the company at a competitive disadvantage or expose it to legal liability. For 11 of the 16 narrative topics, among companies for which we identified disclosures on these topics, at least 75 percent disclosed company-specific information (see fig. 6). For certain topics, such as those related to companies’ actions to add new directors to the board and promote diversity and inclusion, most companies disclosed information and nearly all of those companies reported company-specific information. In contrast, for other narrative topics, such as addressing data security risks and describing climate-related risks and opportunities, we identified company-specific information for less than two-thirds of disclosing companies. In addition, for one narrative topic, describing obstacles that might limit the company’s ability to hire the talent it needs, less than one- third of disclosing companies reported company-specific information. We also found that disclosures we identified in companies’ 10-K filings were less likely to be company-specific than those in the other three types of documents we reviewed. Though most of the narrative ESG disclosures we reviewed contained company-specific details, these disclosures varied in the amount of detail they provided about how a company manages ESG-related risks and opportunities (see fig. 7). In particular, some companies’ disclosures included details about specific steps the company was taking to manage an ESG-related risk or opportunity and details about the results of such efforts, while others did not. To the extent that some companies provided more detailed disclosures, those companies’ disclosures could be of greater usefulness to investors trying to understand the ESG risks facing a company or the steps the company was taking to manage ESG risks. We identified inconsistencies in how companies disclosed on some of our selected quantitative ESG topics, which may limit investors’ ability to compare these disclosures across companies. Specifically, we found instances where companies defined terms differently or calculated similar information in different ways. We most frequently identified these inconsistencies in quantitative topics associated with climate change, personnel management, resource management, and workforce diversity. For quantitative topics related to data security, human rights, and occupational health and safety, five or fewer of the 32 companies in our sample disclosed information on these topics, limiting comparisons across companies. As previously discussed, some investors told us that one of the reasons they seek additional ESG disclosures is because it is difficult to compare disclosures across companies. SEC also noted in a 2016 concept release that sought comment on modernizing certain disclosure requirements in Regulation S-K that consistent disclosure standards can increase the efficiency with which investors process the information. Additionally, three of the most commonly used ESG disclosure frameworks—GRI, SASB, and TCFD—have a stated goal to help companies disclose information in a way that allows investors to compare information among companies. Despite this focus on comparable reporting from investors, regulators, and standard-setters, we identified instances where companies reported certain quantitative metrics differently from one another for some ESG topics. For example, in workforce diversity disclosures, some companies reported their employee demographics using broad groupings, such as “minority” or “ethnically diverse,” while others reported by specific racial or ethnic groups. Similarly, some companies defined greenhouse gas emissions differently. Most companies combined carbon dioxide and other greenhouse gases when reporting emission data, but a few reported carbon dioxide emissions alone. We also identified instances of companies using different calculation methods or units of measure when reporting information related to climate change and resource management. For example, companies used different base years when calculating their reduction in greenhouse gas emissions, limiting their comparability. Some companies reported reductions year-over-year, while many reported reductions over multiple years with no consistency within or across industries. For example, airline companies we reviewed reported emission reductions with base years ranging from 1990 to 2017. Similarly, when disclosing total water withdrawal, eight companies used metric units of measure while two companies used imperial units of measure. Companies that used the same ESG framework did not always disclose on ESG topics in a consistent manner. Specifically, we identified the types of inconsistencies discussed above in quantitative disclosures among those companies using the GRI framework. For example, we identified four different methods for reporting workforce diversity among companies that reported using the GRI framework to develop their disclosures. The GRI framework does not specify the method for reporting diversity information, as it does for certain other topics. SEC staff generally use a principles-based approach to overseeing public companies’ disclosures of nonfinancial information, including information on ESG topics. Under this approach, SEC staff rely primarily on companies to determine what information is material and requires disclosure in their SEC filings, such as the 10-K filing. SEC officials noted that companies are ultimately responsible for the disclosures they provide to investors, and they have liability for their disclosures under federal and state securities laws. While federal securities laws generally do not specifically address the disclosure of ESG information, Regulation S-K’s disclosure requirements for nonfinancial information apply to material ESG topics. Corporation Finance officials noted that their reviews of public companies’ 10-K filings are not a checklist review for compliance with securities regulations. Instead, these reviews are meant to identify and address potentially significant disclosure issues, such as nondisclosure of information that the Corporation Finance review team believes is material and therefore may influence an investor’s investment decision. Some Corporation Finance review staff told us that in their reviews of public companies’ 10-K filings they generally defer to companies’ determinations about which ESG information is relevant to their business and should be disclosed. Review staff also generally said they perform company- and industry-specific research as part of their review, including company websites, web searches for news articles, and earnings calls that may identify material ESG information. In a January 2020 statement that addressed climate change and environmental disclosures, the SEC Chairman reiterated his view that SEC’s approach to disclosure on these topics should continue to be rooted in materiality, including providing investors with insight regarding the company’s assessments and plans for addressing material risks to its business operations. The Chairman’s statement also noted that this approach is consistent with the Commission’s ongoing commitment to ensure that current disclosures on these issues provide investors with a mix of information that facilitates well-informed capital-allocation decisions. Corporation Finance has provided its review staff with internal review guidance that highlights relevant issues to consider, while emphasizing the use of professional judgment when reviewing companies’ 10-K and other filings. Staff use internal procedural guidance that provides steps for conducting and documenting reviews of filings. While this guidance does not include specific instructions for reviewing ESG disclosures, staff are instructed to conduct background research on companies and industries to determine if there is material information, such as potential risks, that may be relevant to a company’s filing. As noted above, according to review staff, this company-specific research could include ESG information. In addition, Corporation Finance has distributed internal review guidance on a few ESG-related topics. This guidance illustrates how existing disclosure requirements may apply to a given topic and offers information for staff to consider when conducting background research and performing filing reviews. In cases where the SEC review team identifies a potential disclosure deficiency related to an ESG or other topic, they may issue a comment letter to the company to request additional information or additional disclosures when necessary. Most review staff with whom we spoke said ESG-related information generally does not rise to the level of comment unless they identify material information during background research that may be relevant to the company’s operations. In April 2019, Corporation Finance reallocated responsibilities for reviewing nonfinancial information in 10-K filings, which also can include ESG information, from attorneys to accountants. Corporation Finance officials cited resource constraints, which reduced the number of attorneys within the Division, as a factor in this decision. While review teams vary by industry group and company, attorneys previously held primary responsibility for reviewing nonfinancial disclosures, whereas accountants primarily reviewed financial statements and related disclosures in 10-K filings. SEC staff provided training to accountants on how to conduct these reviews, which outlined Regulation S-K reporting requirements for nonfinancial disclosures and highlighted areas for staff to consider in various sections of the 10-K. Two of six accounting review staff with whom we spoke noted that this training was thorough and said they refer to training materials when conducting 10-K filing reviews. Additionally, most accounting review staff told us they can consult legal staff within their industry offices during reviews as necessary. According to Corporation Finance officials, attorneys may still participate in reviews of 10-K filings. Accounting staff also noted that they previously reviewed nonfinancial information within the context of financial disclosures as part of their financial reviews of 10-K filings. Corporation Finance has conducted assessments of samples of public companies’ 10-K filings to examine the amount and type of disclosure on selected ESG topics. Overall, Corporation Finance staff found that most sampled companies included disclosure of selected ESG topics within 10- K filings and told us they did not issue additional guidance or interpretive releases on these topics following these assessments. Climate change disclosures: In 2012 and 2014, SEC staff issued mandated reports to the Senate Committee on Appropriations that assessed the compliance of climate change disclosures included in a sample of 60 companies’ 10-K filings in selected industries. The Committee had required these reviews following SEC’s issuance of its interpretive release on climate change disclosures in 2010. SEC staff found that most sampled companies included climate-related information within their 10-K filings with varying levels of detail. Since 2014, Corporation Finance has conducted additional internal assessments on these topics that have resulted in findings consistent with previous reviews. Additional ESG-related disclosures: In recent years, Corporation Finance staff conducted additional assessments of disclosures related to some ESG topics. These assessments involved staff reviewing the disclosures of a sample of companies’ filings and evaluating compliance with disclosure requirements. Corporation Finance found that while the level of detail among disclosures varied, nearly all companies included the relevant ESG topic within their filings. Additionally, Corporation Finance staff outlined action items for the Division, such as providing comments to companies as appropriate and monitoring press reports for information that may be material for companies to disclose. In addition to internal assessments, SEC has taken steps to identify significant emerging disclosure issues through the creation of the Office of Risk and Strategy within Corporation Finance. According to Corporation Finance officials, this office was created in February 2018 and was allocated additional resources in October 2019 to support its risk surveillance function, in which it identifies emerging issues that may be material for public companies by reviewing press articles, speeches, and information from other sources such as industry experts. According to Corporation Finance officials, once the office identifies an issue that may present material disclosure risks, it may perform research and analysis that can determine whether further internal or external guidance may be necessary. Corporation Finance officials also noted these efforts may result in additional guidance to review staff based on topics identified. Investors and market observers have proposed a range of policy options to improve the quality and usefulness of ESG disclosures. These options include legislative or regulatory action to require or encourage certain ESG disclosure practices, as well as private-sector approaches, such as industry-developed frameworks and stock-exchange listing requirements. These policy options can pose important trade-offs in relation to the extent to which they impose specific new disclosure requirements or encourage companies to voluntarily adopt certain ESG disclosure practices. For example, while new ESG-related requirements may help achieve greater comparability in ESG disclosures across companies and reduce investor demands on public companies, voluntary approaches may provide more flexibility to companies while limiting potential costs associated with disclosing ESG information that may not be relevant for their business. Some institutional investors and market observers have proposed new legislative or regulatory requirements to enhance public companies’ ESG disclosures. These actions could take the form of new requirements for specific ESG disclosures, a new SEC regulation that endorses the use of an ESG disclosure framework, or new SEC interpretive releases on ESG disclosure topics. Some market observers have recommended that SEC issue new rules requiring issue-specific ESG disclosures, such as disclosures related to climate change. For example, one investor association said that it has supported various petitions and requests for rulemaking at SEC on environmental and human capital issues. SEC has taken steps to consider these types of issue-specific ESG disclosures. For example, in August 2019, SEC proposed including disclosure topics related to human capital resources and management in the description of business section of Regulation S-K. The rule has not been finalized, but in comment letters to SEC on the proposed rule, some organizations requested more line-item disclosures and metrics on this topic. Gender Pay Gap Disclosure Requirements in the United Kingdom (UK) In 2017, the UK required issue-specific disclosure rules for large companies to report the difference in average pay for male and female employees, according to a report by the UK House of Commons’ Business, Energy, and Industrial Strategy Committee. An intended benefit of gender pay gap disclosure is achieving greater equity in pay by gender and improved economic performance among UK companies, according to this committee report. However, the committee found in its 2018 review of this reporting that some companies were unsure how to account for alternative compensation, such as child care vouchers and bonuses, and that additional guidance was necessary to help companies standardize their disclosures. The committee’s report also recommended that the government mandate narrative disclosures where companies explain their action plan for closing any gender pay gap they may have. As previously mentioned, most investors told us they seek comparable information across companies, which line-item disclosure requirements may facilitate. Increasing comparability across companies also may reduce investor demands on companies, which have been increasing the last 5 years, according to most companies with whom we spoke. Additionally, requiring ESG disclosures in companies’ regulatory filings— rather than across multiple locations—could reduce information disparities between large and small investors, because the information would be located in a single place that was readily available to everyone. For example, some third-party data providers, which compile ESG information from various sources, may be prohibitively expensive to individual investors and small advisors, according to a study commissioned by the Department of Labor. One impediment to improved ESG disclosures that some institutional investors, companies, and market observers with whom we spoke cited was the lack of consensus around what information companies should be disclosing. Focusing on issue-specific ESG disclosure rules could allow SEC to enhance disclosures on the most pressing issues that may have more consensus, according to two academics we interviewed. As previously discussed, our review found that several ESG factors were commonly disclosed by companies across industries, including board accountability, climate change, and workforce diversity. On the other hand, regulatory requirements that necessitate new or additional disclosures may increase compliance costs for companies. None of the 18 companies with whom we spoke had quantified the costs associated with their ESG reporting. However, companies generally said that collecting and reporting ESG information required input from employees across the company. Three companies said ESG reporting represented an increasing opportunity cost as employees spent more time on reporting and away from business activities. Data not used in regular business operations or data that required outside assurance were the most costly disclosures, according to some companies. In addition, some market observers have noted that issue-specific rules can become outdated as issues evolve and that these types of disclosures would reduce flexibility for companies. Line-item or issue- specific disclosures also may not be relevant for all companies, possibly resulting in large volumes of immaterial information. According to one academic, compelling companies to disclose on issues that may not be relevant to them could distract companies from using resources on the relevant disclosures. Other market observers recommended that SEC issue a new rule endorsing one or more comprehensive ESG reporting frameworks, such as SASB or GRI, for companies’ reporting of material ESG issues. SEC has required the use of frameworks in other rulemakings, such as rules related to companies’ evaluation and disclosure of their internal controls. For that rule, SEC endorsed the Committee of Sponsoring Organizations of the Treadway Commission (COSO) Framework as satisfying regulatory requirements. In its evaluation of several countries’ reporting policies, the United Nations Environment Programme recommended regulators use existing international standards and guidelines when developing sustainability reporting policies. Regulations that endorse one or more frameworks could maintain flexibility for companies, because companies could choose which parts of the framework are relevant to their businesses. In addition, frameworks can be updated over time without necessitating new rulemaking in contrast to issue-specific requirements that could become outdated. Some institutional investors and companies with whom we spoke noted the importance of flexibility if there were to be any new regulation for ESG disclosures. Additionally, frameworks could encourage companies to disclose on a wide range of ESG issues. Most investors told us they focused on a broad array of ESG issues in their analyses. European Union Directive Endorsement of ESG Frameworks A 2014 European Union directive that endorsed companies’ use of existing frameworks to report how they manage social and environmental challenges has needed several updates to improve comparability across companies, according to a report by the European Securities and Markets Authority (ESMA). In 2017 and 2019, the European Commission issued voluntary guidelines for the directive that encouraged companies to use an established disclosure framework to make nonfinancial information easier to report and compare, according to ESMA. However, respondents to a 2019 survey by ESMA said that among other obstacles, the lack of specificity in the directive’s requirements and the use of various frameworks contributed to a lack of comparability among companies’ environmental, social, and governance (ESG) disclosures. As a result, ESMA recommended the European Commission amend the directive to include both general principles for reporting ESG information as well as a set of specific, universal disclosures. However, companies reporting based on different frameworks may limit comparability across companies, and there was not consensus on which framework companies should use. While some institutional investors told us they supported SASB’s framework, investors also mentioned other frameworks such as GRI, TCFD, and CDP. In a 2019 survey of 46 global institutional investors, a consulting firm found that agreeing on ESG standards that are relevant to companies’ performance was a challenge. Additionally, the Chamber of Commerce noted that companies said in roundtable discussions that the lack of universally accepted ESG reporting standards was a major challenge to effective ESG reporting. There have been initiatives recently to standardize ESG frameworks. However, a project to improve comparability across frameworks found that there were already high levels of agreement between climate change disclosures standards and that standard-setting organizations needed to more clearly communicate how their standards were interconnected. Additionally, companies reporting under a framework may choose not to disclose certain ESG information, which could result in less comparability. As previously discussed, among the company disclosures we reviewed, we identified instances of calculation inconsistency among quantitative disclosures for companies that reported information according to GRI— the most prevalent reporting framework in our sample—because GRI does not always include prescriptive disclosure recommendations and sometimes allows for different calculation methods. Some institutional investors and companies with which we spoke indicated that additional SEC interpretative releases addressing how ESG topics fit within existing disclosure requirements could be helpful. These releases can highlight the importance of ESG disclosures without requiring a rule change, because they clarify without changing the existing disclosure requirements. Some investors and SEC review staff said that interpretive releases serve as a good reminder for companies to consider ESG issues in their disclosures. Interpretive releases also maintain flexibility for companies to disclose the information that is material for each company. However, two market observers noted that because these releases do not create new disclosure requirements, they may not have much impact on ESG disclosures on their own. About half of the companies told us previous SEC releases had been helpful, but most investors said disclosures on these issues remain inconsistent. Eight of 18 companies said SEC’s previous releases on climate change and cybersecurity had helped create an even playing field for companies or underscored the need for more transparency on these issues, among other things. However, two investors and one international organization noted that the release on climate change did not appear to expand disclosure of climate change risk among U.S. companies. As previously discussed, SEC staff reviewed samples of company’s disclosures on climate change and found that most sampled companies included climate-related information within their 10-K filings with varying levels of detail. As a result, SEC staff decided against recommending that the Commission issue additional releases. Some institutional investors, companies, and market observers have cautioned against legislative and regulatory intervention in ESG disclosures and have recommended private-sector approaches to improve companies’ ESG disclosures. One advantage of private-sector approaches is that because they are voluntary, they provide companies with flexibility. Some investors and companies said flexibility was important in ESG reporting because the relevance of ESG issues can vary by company and change over time. Conversely, because ESG disclosures remain voluntary under these approaches, companies may choose not to use them in their reporting. Private-sector approaches could include industry-developed frameworks and stock exchange listing requirements. Some market observers with whom we spoke recommended that industries develop their own industry-specific ESG framework. For example, Edison Electric Institute and the American Gas Association partnered to develop standards to guide electric and natural gas companies’ ESG reporting. According to the American Gas Association, the framework was created to provide the financial sector with more uniform and consistent ESG data and information. SASB’s framework also provides industry-specific standards, covering 77 different industries. Industry-specific standards focus on ESG issues that industry representatives believe are relevant to that industry. Some investors, companies, and market observers said that ESG issues vary by industry and therefore industry-specific standards are preferred. As previously discussed, we identified some differences in the amount of disclosures on specific ESG topics between industries. Agreed-upon industry-specific standards provide consensus across various stakeholders and provide comparability of ESG disclosures across companies, according to some market observers, which also may reduce investor demands on companies. One disadvantage of relying on industries to create standards is that some industries may be diverse and unable to find consensus on standards. For example, two companies told us that their unique business model does not fit into one industry group. Company and trade association interests also may conflict with those of investors and other stakeholders. According to two academics with whom we spoke, individual companies do not have an incentive to work towards standardized ESG reporting standards and will not do so on their own. In some countries, stock exchanges have used ESG disclosure listing requirements to try to improve companies’ disclosures. The United States has several stock exchanges that list publicly traded companies, and none have extensive ESG disclosure listing requirements. NASDAQ produces a voluntary ESG reporting guide for companies and the New York Stock Exchange, as a subsidiary of the Intercontinental Exchange, has declared its support for ESG disclosures of its listed companies, but neither requires such ESG reporting to be listed on its exchange. Johannesburg and Tokyo Stock Exchange Listing Requirements Stock exchanges in Japan and South Africa are examples where listing requirements have been implemented to improve public companies’ environmental, social, and governance (ESG) reporting in those countries. According to officials from Japan’s Financial Services Agency, listing requirements on the Tokyo Stock Exchange have helped change how Japanese companies disclose ESG-related information and engage in proactive risk management. Similarly, officials from the Johannesburg Stock Exchange said that its listing requirements have had a positive impact on companies’ integrated reporting, which includes ESG information. However, these officials stated that other factors also have contributed to the increase in integrated reporting in South Africa. These include an understanding by local companies of how ESG factors affect their day-to-day operations and increased investor interest in ESG disclosures. According to research comparing integrated reporting in 10 countries, a number of factors contributed to South African companies high-quality integrated reports, including a framework for integrated reporting developed by a local nonprofit organization to assist companies in meeting the listing requirements. according to two industry studies. One third-party data provider noted that listing requirements provide an incentive—listing on the exchange— for companies to report on ESG issues. However, competition between U.S. stock exchanges could give companies alternative listing opportunities if one stock exchange enacted ESG disclosure listing requirements. According to officials from the Johannesburg Stock Exchange, as commercial entities, stock exchanges may choose to avoid imposing mandatory listing requirements on companies because they would risk losing listings that generate revenue to other exchanges or discouraging companies from listing publicly. Finally, some institutional investors, companies, and market observers noted that it was too early to prescribe standards for ESG disclosures, because there is not consensus among companies, investors, and market observers on which ESG issues should be disclosed. The marketplace should be given time to resolve these issues, according to these market participants and observers. Government officials in the United Kingdom and Japan and industry association representatives from South Africa noted that increased investor interest prompted more meaningful ESG disclosures from companies in their countries. However, they said that nonfinancial reporting requirements can be a catalyst for changing attitudes towards ESG disclosures. We provided a draft of this report to SEC for review and comment. SEC provided written comments that are reprinted in appendix II. SEC also provided technical comments, which we incorporated as appropriate. In its written comments, SEC generally concurred with our findings and stated that our report will contribute to the ongoing discussion around ESG disclosures among public companies, investors, and policy makers. SEC also highlighted some of its related activities, such as issuing interpretive releases on climate change and cybersecurity and soliciting public comments on disclosure requirements. In addition, SEC reiterated its commitment to materiality as the foundational principle for public company disclosure requirements. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 4 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Chairman of the Securities and Exchange Commission, and other interested parties. In addition, the report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines (1) why and how investors have sought additional environmental, social, and governance (ESG) disclosures; (2) how public companies’ disclosures of selected ESG factors have compared within and across selected industries; (3) steps the Securities and Exchange Commission (SEC) staff have taken to assess the effectiveness of the agency’s efforts to review the disclosure of material ESG factors; and (4) the advantages and disadvantages of policy options that investors and market observers have proposed to improve ESG disclosures. To obtain information about why and how investors have sought additional ESG disclosures, we reviewed relevant reports and studies by academics, investment firms, and others published in the last 5 years. We identified these reports and studies through interviewing investors and market observers, reviewing sources cited in documents we obtained, and conducting internet searches. These reports and studies provided investor perspectives on issues related to ESG disclosures, including how investors use ESG disclosures, the types of ESG disclosures investors seek from companies, and investors’ use of shareholder proposals to request ESG information. In addition, we selected a nongeneralizable sample of 14 institutional investors and conducted semi-structured interviews with them to obtain information and perspectives on how and to what extent they incorporate ESG information into their investment decisions, why they do or do not incorporate ESG information, and why and how they engage with companies around these disclosures. Institutional investors include public and private entities that pool funds on behalf of others and invest the funds in securities and other investment assets. For our sample, we selected private-sector asset management firms and public pension funds of varying size: four large private asset management firms (each with more than $1 trillion in worldwide assets under management as of December 31, 2018); three mid-sized private asset management firms (each with from $500 billion to $1 trillion in worldwide assets under management as of December 31, 2018); three large public pension funds (each with more than $100 billion in total assets as of September 30, 2018); and four mid-sized public pension funds (each with from $40 billion to $100 billion in total assets as of September 30, 2018). To get a mix of regional perspectives, we incorporated geographic location into our selection when possible. For example, we selected at least one of the seven public pension funds from each of four U.S. census regions (Northeast, South, Midwest, and West). The information collected from this sample of institutional investors cannot be generalized to the larger population of all institutional investors. To obtain information about the extent to which investors have used shareholder proposals to promote improved ESG disclosures, we analyzed proposals submitted to a stratified random sample of 100 companies listed as of October 4, 2019, on the S&P Composite 1500, which combines three indices—the S&P 500, the S&P MidCap 400, and the S&P SmallCap 600 (see table 4). For our sample, we refer to companies appearing in the S&P 500 as large, companies in the S&P MidCap 400 as mid-sized, and companies in the S&P SmallCap 600 as small. With this probability sample, each company on the S&P Composite 1500 had a nonzero probability of being included, and that probability could be computed for any company. We stratified the population into three groups on the basis of company size, and each sample element was subsequently weighted in the analysis to account statistically for all the members of the population, including those that were not selected. All sample estimates in this report are presented along with their 95 percent confidence intervals. For each company in our sample, we obtained and reviewed its definitive proxy statement for the annual meeting that took place in calendar year 2019 to identify shareholder proposals. Using a data collection instrument, we analyzed each shareholder proposal submitted to a company in our sample to determine if it was related to ESG disclosures, what type of ESG disclosure it was requesting (environmental, social, or governance), and what type of investor (such as individual, labor union, or pension fund) requested the proposal. For any company in our sample that disclosed one or more shareholder proposals in its definitive proxy statement, we obtained and reviewed the company’s 8-K that included the number of votes each proposal received at the company’s annual meeting. We then calculated the percentage of votes in favor of the proposal, using the number of votes shareholders cast in favor of the proposal divided by the sum of votes cast in favor, against, and to abstain. We downloaded these SEC filings from its online Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system. To compare public companies’ ESG disclosures within and across industries, we identified and analyzed disclosures related to eight ESG factors by 32 large and mid-sized public companies across eight industries. First, we judgmentally selected eight ESG factors by reviewing ESG factors frequently cited by a range of market observers (such as ESG standard-setting organizations, academics, nonprofits, and international organizations) as being important to investors or possibly material for companies in several industries and through discussions with market observers, including two ESG standard-setting organizations and one investor association. We selected eight factors that were among the most frequently cited, including at least two from each of the three categories of ESG (environmental, social, and governance). The eight ESG factors we selected were (1) climate change, (2) resource management (water and energy), (3) human rights, (4) occupational health and safety, (5) personnel management, (6) workforce diversity, (7) board accountability, and (8) data security. We then judgmentally selected 33 specific topics to represent company disclosures on the eight ESG factors. Among these 33 specific topics, we selected 16 narrative disclosure topics that companies can address by providing a narrative discussion of ESG-related risks and opportunities and their management of them and 17 quantitative disclosure topics that companies can address by providing numbers and percentages. We selected these topics by reviewing four ESG disclosure frameworks and identifying commonly occurring disclosure topics associated with the selected ESG factors. For a list of the ESG factors and topics we selected, see figure 1 in the body of the report. We then selected a nongeneralizable sample of 32 large and mid-sized public companies to review their disclosures on the eight ESG factors and 33 ESG topics. First, we judgmentally selected eight industries from which to select public companies. We identified industries that were likely to disclose information on the selected ESG factors; had multiple companies included in the S&P 500; and, when taken together, represented a diverse range of industry sectors. The eight industries we selected were (1) airlines, (2) beverages, (3) biotechnology and pharmaceuticals, (4) commercial banks, (5) consumer retail, (6) electric utilities, (7) internet media and services, and (8) oil and gas production. We used industry classifications from the Standard Industrial Classification system, which SEC’s Division of Corporation Finance uses as a basis for assigning review responsibilities for industry groups. We then selected four public companies within each of these eight industries for a total of 32 companies. We selected four companies per industry that were among the eight largest in terms of market capitalization and that, when considered collectively within industries, provided representation across different U.S. regions. We limited our selection to U.S. public companies that were traded on either of the two largest American stock exchanges. The information collected from this sample of public companies cannot be generalized to the larger population of all public companies. We reviewed recent regulatory filings for these companies and voluntary reports, such as corporate social responsibility reports, to identify relevant disclosures on the selected ESG topics. We reviewed companies’ 2018 10-Ks, 2019 definitive proxy statements (which typically covered the same reporting period as the 2018 10-K), and 2018 annual reports (when different from the 10-K). We also reviewed companies’ most recent sustainability reports available on their websites, accessed from July through December 2019. We defined a sustainability report as a voluntary, stand-alone document that provided information on sustainability and other issues related to environmental, social, and governance factors. Companies can use other means to report ESG information, such as their websites or issue-specific company reports. We did not include single-issue documents or information included on websites that was not also part of the sustainability report. There are several reasons why a company may not disclose information on a specific ESG topic; for example, the topic may not be relevant to its business operations or the company may not consider it to have a significant enough impact on its financial performance to warrant disclosure. To identify relevant disclosures, we searched each document for a list of keywords related to each of the eight ESG factors to help identify passages likely to contain ESG disclosures on the 33 specific ESG topics. We selected these keywords by reviewing the 33 topics we selected and identifying unique terms associated with them. We categorized each narrative disclosure as being generic or company-specific. We categorized a narrative disclosure as company-specific if it included details about how ESG-related risks and opportunities affect the company’s specific operations or how the company manages these risks or opportunities. Otherwise, we characterized the narrative disclosure as generic. Generic narrative disclosures are disclosures that could apply to the reporting company as well as to many of its peers. We considered each disclosure as a whole and, if it provided some company-specific information, we categorized the disclosure as company-specific. In addition, we conducted semi-structured interviews with representatives of 18 of the 32 selected companies to obtain their perspectives on how they determine what ESG information to disclose, where to disclose it, and the benefits and challenges of ESG reporting. We requested interviews with all 32 of the selected companies, but eight companies declined and six companies did not respond to our request. For those that did not respond, we made at least three requests by email. We interviewed at least one company from each of the selected industries. Furthermore, through the semi-structured interviews with investors described above, we obtained investors’ perspectives on characteristics of ESG disclosures that may limit their usefulness to investors. To understand SEC’s current regulatory framework for overseeing public companies’ disclosures, we reviewed relevant laws and regulations, such as Regulation S-K and the Sarbanes-Oxley Act of 2002. To review SEC’s efforts related to ESG disclosures, we reviewed relevant SEC policies and procedures, such as internal guidance and SEC’s interpretive releases to public companies on climate change and cybersecurity disclosures. We also reviewed SEC’s 2012 and 2014 reports on climate change disclosures to the U.S. Senate Committee on Appropriations. We reviewed additional internal SEC assessments on selected ESG- related topics to obtain information on steps taken by SEC to review ESG disclosures. To obtain information on how staff conduct reviews of annual 10-K filings and ESG information, we interviewed SEC officials from the Division of Corporation Finance and a nongeneralizable sample of 15 review staff from the same division (six attorneys, six accountants, and three office chiefs). For our sample, we judgmentally selected staff in industry groups in accordance with those selected for our sample of public companies and with varying levels of tenure at SEC. The information collected from this sample of SEC review staff cannot be generalized to the larger population of all SEC review staff. To identify relevant policy proposals to improve ESG disclosures, we reviewed reports and public statements from investors, ESG standard- setting organizations, and other groups that provided their perspectives on the current state of ESG disclosures and potential policy proposals, including advantages and disadvantages of these proposals. For example, we reviewed letters submitted by various groups to SEC in response to its 2016 request for public comment on possible changes to regulation S-K, as well as press releases by large asset management firms. We conducted searches of government and academic literature for research on ESG disclosures from the previous 5 years. We searched the internet and various databases, such as ProQuest Newsstand Professional and Scopus. Using broad search terms, we identified articles related to our research objectives that provided useful context and discussion topics for interviews with market observers, investors, and companies. We also identified relevant reports and studies through investor and market observer interviews, by reviewing sources cited in documents we obtained, and through internet searches. In addition, we reviewed reports and studies on international ESG disclosure requirements to identify and obtain information about relevant policy approaches implemented in other countries. We interviewed government officials in the United Kingdom and Japan and stock exchange and industry association representatives from South Africa to obtain their perspectives on the quality of ESG disclosures in their countries and the advantages and disadvantages of their current ESG disclosure laws and policies. We selected these countries for interviews because each had implemented one or more of the ESG policies that had been discussed as potential policy proposals by investors and market observers in the United States. Finally, we interviewed a nongeneralizable sample of 13 market observers selected to represent a range of stakeholders, including ESG standard-setting organizations, academics, and representatives of industry and investor groups, to obtain their perspectives on issues and policy options related to ESG disclosures. We selected these market observers through studies and reports of companies ESG disclosures that identified leading observers with subject matter expertise and through referrals obtained during interviews for this study. We also used information obtained from our interviews with investors and companies to inform our analysis for this objective. We conducted this performance audit from January 2019 to July 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Michael Clements at (202) 512-8678 or clementsm@gao.gov. In addition to the contact named above, John Fisher (Assistant Director), Katherine Carter (Analyst in Charge), Emily Bond, Rachel DeMarcus, David Dornisch, Justin Fisher, Christopher Lee, Elizabeth Leibinger, Efrain Magallan, Adam Martyn, Patricia Powell, Jena Sinkfield, Tyler Spunaugle, Winnie Tsen, and Jack Wang made key contributions to this report.", "summary": "Investors are increasingly asking public companies to disclose information on ESG factors to help them understand risks to the company's financial performance or other issues, such as the impact of the company's business on communities. The Securities and Exchange Commission requires public companies to disclose material information—which can include material ESG information—in their annual 10-K filings and other periodic filings. GAO was asked to review issues related to public companies' disclosures of ESG information. This report examines, among other things, (1) why investors seek ESG disclosures, (2) public companies' disclosures of ESG factors, and (3) the advantages and disadvantages of ESG disclosure policy options. GAO analyzed 32 large and mid-sized public companies' disclosures on 33 selected ESG topics. Among other criteria, GAO selected companies within eight industries that represented a range of sectors in the U.S. economy and selected ESG factors that were frequently cited as important to investors by market observers. GAO also reviewed reports and studies on ESG policy proposals and interviewed 14 large and mid-sized institutional investors (seven private-sector asset management firms and seven public pension funds), 18 public companies, 13 market observers (such as ESG standard-setting organizations, academics, and other groups), and international government, stock exchange, and industry association representatives. Most institutional investors GAO interviewed (12 of 14) said they seek information on environmental, social, and governance (ESG) issues to better understand risks that could affect company financial performance over time. These investors added that they use ESG disclosures to monitor companies' management of ESG risks, inform their vote at shareholder meetings, or make stock purchasing decisions. Most of these institutional investors noted that they seek additional ESG disclosures to address gaps and inconsistencies in companies' disclosures that limit their usefulness. GAO's review of annual reports, 10-K filings, proxy statements, and voluntary sustainability reports for 32 companies identified disclosures across many ESG topics but also found examples of limitations noted by investors. Twenty-three of 32 companies disclosed on more than half of the 33 topics GAO reviewed, with board accountability and workforce diversity among the most reported topics and human rights the least. Disclosure on an ESG topic may depend on its relevance to a company's business. As shown in the figure, most companies provided information related to ESG risks or opportunities that was specific to the company, though some did not include this type of company-specific information. Additionally, differences in methods and measures companies used to disclose quantitative information may make it difficult to compare across companies. For example, companies differed in their reporting of carbon dioxide emissions. Policy options to improve the quality and usefulness of ESG disclosures range from legislative or regulatory action requiring or encouraging disclosures, to private-sector approaches, such as using industry-developed frameworks. These options pose important trade-offs. For example, while new regulatory requirements could improve comparability across companies, voluntary approaches can provide flexibility to companies and limit potential costs.", "document_type": "gao"}
{"report": "The organization that is now FAMS was created in 1961 to counter hijackers. The Aviation and Transportation Security Act, enacted in November 2001, established TSA as the agency responsible for civil aviation security and transferred FAMS along with other aviation security- related responsibilities from the Federal Aviation Administration to TSA. Among other things, the Act expanded FAMS’s mission and workforce in response to the September 11, 2001, terrorist attacks. Specifically, the Act authorizes TSA to deploy air marshals on every passenger flight of a U.S. air carrier and requires TSA to deploy air marshals on every such flight determined by the TSA Administrator to present high security risks—with nonstop, long-distance flights, such as those targeted on September 11, 2001, considered a priority. As of August 2019, FAMS had thousands of employees and 20 field offices across the United States. FAMS’s Field Operations Division consists, in part, of these field offices, which are divided into regions overseen by Regional Directors. A Supervisory Air Marshal in Charge (SAC) manages each field office, assisted by a Deputy Supervisory Air Marshal in Charge or Assistant Supervisory Air Marshals in Charge, depending on the size of the field office. SFAMs typically oversee squads of air marshals in the field offices. FAMS’s Flight Operation Division consists of the Systems Operation Control Section, among other groups. The Systems Operation Control Section is responsible for planning and preparing air marshals’ schedules, which are based on 28-day cycles known as roster periods. It is also responsible for monitoring all FAMS missions. For example, its Mission Operations Center is responsible for providing real-time support to air marshals performing missions by resolving mission-related issues, including last-minute scheduling changes. The senior leader of FAMS is the Executive Assistant Administrator / Director of FAMS. Given that there are many more U.S. air carrier flights each day than can be covered by air marshals, FAMS uses a concept of operations to set forth its methodology for deploying air marshals. FAMS’s concept of operations prioritizes flights that it considers higher risk, such as those for which a known or suspected terrorist is ticketed. FAMS refers to these flights as Special Mission Coverage (SMC) and, according to FAMS Flight Operation Division officials, FAMS typically learns of them no more than 72 hours in advance of flight departure and sometimes less than an hour before departure time. According to Flight Operations Division officials, in March 2018 FAMS adopted a new concept of operations that expanded the number of SMCs. To cover SMCs, FAMS uses air marshals scheduled to standby status, who report to their home airport and fly upon notification. If no air marshals in standby status are available, FAMS may reassign air marshals from regularly scheduled missions or air marshals who were not scheduled to fly at that time. FAMS has established scheduling guidelines intended to balance mission needs with air marshals’ quality of life. Specifically, Systems Operation Control Section officials maintain guidelines detailing parameters for shift length and rest periods when scheduling air marshals to fly missions. Exceptions to these guidelines are permitted to meet mission needs and the Mission Operations Center is not restricted by the guidelines when addressing mission scheduling issues, such as flight delays. For an overview of FAMS’s scheduling guidelines for shift length and rest, see figure 1. Air marshals are expected to be available to work as needed, 24 hours a day. To compensate air marshals for the demands of their position, air marshals receive law enforcement availability pay, which provides eligible TSA law enforcement officers, including air marshals, a 25 percent increase in their base pay for working or being available to work an annual average of 2 hours or more of unscheduled overtime per regular workday. In addition to law enforcement availability pay, certain air marshals are eligible to receive overtime pay after working more than 85.5 hours in a single 14-day pay period. Based on FAMS 2019 human capital data, approximately 85 percent of FAMS employees are law enforcement officers (e.g., air marshals). FAMS’s law enforcement workforce is largely White, male, and 40 years of age or older. As of August 2019, 68 percent of FAMS law enforcement employees identified as White, followed by 14 percent Hispanic or Latino, 12 percent Black or African American, 3 percent Asian, 1 percent American Indian or Alaskan Native, and 1 percent identified as Other or more than one race. Also as of August 2019, approximately 94 percent of FAMS law enforcement employees were male, approximately 76 percent were aged 40 or older, and approximately 51 percent have been with the agency since 2002. See figure 2. Air marshals report being concerned about their health. Air marshals in all six offices we visited stated that health issues are a key quality of life concern. The most common health issues air marshals raised in discussion sessions with us were extreme fatigue, mental health issues, difficulty maintaining a healthy diet, and increased frequency of illness. In addition, OPM’s FEVS survey asked FAMS employees whether they “believe they are protected from health and safety hazards.” DHS estimates that in fiscal year 2018—the most recent year for which complete FEVS results are available—less than half (44 percent) of FAMS employees believed they were protected from health and safety hazards. Moreover, during the 6-year period from fiscal year 2013 through 2018—a period during which the number of FAMS employees decreased by 17 percent—the number of workers’ compensation claims filed by FAMS employees nearly quadrupled, from 71 claims to 269 claims. From fiscal year 2013 through 2019, thirteen air marshals died while employed with FAMS, one of whom died while on duty covering a flight. According to FAMS officials, five of the thirteen deaths were caused by suicide; and FAMS officials did not know the cause of death for the other eight. Concerns about air marshals’ health are long-standing. For example: In 2008, a FAMS Medical Issues Working Group reported that air marshals had experienced various types of health issues—poor physical fitness as well as musculoskeletal injuries and upper respiratory infections. The Working Group also noted that air marshals’ disrupted sleep patterns often resulted in fatigue and long hours and made it difficult for air marshals to work out and maintain healthy eating habits. In 2012, the FAMS-commissioned Harvard sleep and fatigue study— which included a literature review, an analysis of air marshals’ work schedules, and a survey of air marshals—reported that shift work schedules, like air marshals’ flight schedules, can cause significant acute and chronic sleep deprivation which in turn can adversely affect their personal health, such as increasing the risk of heart disease. The study also reported that sleep deprivation degrades air marshals’ ability to think quickly, make good decisions, and to recognize when fatigue impairs performance and safety. In 2013, a FAMS review of air marshals’ fitness noted that air marshals were experiencing high injury rates when taking their physical fitness assessments and declining overall health and wellness. FAMS officials attributed air marshals’ declining overall health and wellness in part to the increasing age of air marshals. FAMS has had initiatives in place to assess air marshals’ health. For example, since 2004 FAMS has required that individual air marshals obtain a medical examination at least every 2 years. In addition, FAMS has operated a Health, Fitness, and Wellness Program since 2015 and a Hearing Conservation Program since 2017. However, FAMS maintains limited health information in a data system. Since 2004, FAMS has gathered information on individual air marshals’ health to help ensure employees meet its medical standards. Specifically, FAMS has required that air marshals obtain a medical examination from private, FAMS-approved clinics at least every 2 years. According to FAMS policy, these exams are to assess air marshals’ cognitive, physical, psychomotor, and psychological abilities and include certain cardiac, pulmonary, audiometric, and visual tests. FAMS’s Medical Programs Section—an office staffed with one part-time physician, five nurses, and three administrative staff—is responsible for helping ensure that air marshals obtain their required medical examinations. The office also follows up if an exam indicates an air marshal may have a health issue that may affect their ability to perform their duties, such as a sleep disorder or high blood pressure. Clinicians who conduct the periodic medical examinations provide the Medical Programs Section a medical report, which they use to determine if an air marshal is medically qualified to perform the essential functions of the position in a safe and efficient manner. Air marshals deemed unqualified to perform one or more essential functions of the position, with or without reasonable accommodation, are subject to administrative actions, such as being placed on light or limited duty status and possibly non-disciplinary removal based on medical inability to perform the essential function of the position. FAMS officials report, however, that they have not entered air marshals’ medical information, including their medical qualification status, into a data system because medical information is protected by law and their existing data system—the Federal Air Marshal Information System (FAMIS) is not suitable to maintain medical information. Instead, the Medical Programs Section maintains the results of air marshals’ medical exams—including their qualification status—in paper files. Medical Programs Section officials explained that because medical information about air marshals are not in a data system, reviewing and compiling information to obtain a comprehensive assessment—such as the number of air marshals who are medically qualified—would be resource-intensive. Medical Programs Section officials noted that it would be helpful to be able to analyze air marshals’ health records to identify any trends across the workforce. FAMS officials report that by the end of September 2020 the Medical Programs Section plans to review and evaluate software platforms that would be suitable for medical data. However, these same officials reported that, as of September 2019, the work on this initiative had been verbal and informal so they were not able to provide documentation of this effort. OPM’s 2018 report on human capital management highlights the importance of using data to conduct workforce analyses to help identify and properly address human capital challenges. Without information about the number and proportion of the FAMS workforce who are medically qualified, FAMS management has a limited understanding of its workforce’s ability to fly missions and fulfill their duties. Further, FAMS management cannot readily identify trends among its workforce and therefore is also limited in their ability to identify any problems and make better-informed workforce planning decisions. In May 2015, FAMS initiated a Health, Fitness, and Wellness Program intended to address concerns with air marshals’ fitness and injury rates and improve air marshals’ overall health and wellness. According to FAMS policy, the program is intended to provide opportunity, resources, and education necessary to enhance mission readiness and promote workplace wellness. For example, FAMS requires air marshals to participate in a health and fitness assessment twice a year to measure their fitness including cardio-respiratory endurance, muscular strength, muscular endurance, and flexibility. FAMS physical fitness instructors administer the assessment and record the results in FAMIS, such as the number of pushups an air marshal can complete in one minute. Since February 2016, FAMS has used these data to track air marshals’ mandatory participation in the assessments and to identify individual air marshals who do not maintain their fitness levels or show improvement. However, it has not used these data to analyze trends in the fitness of the workforce as a whole. FAMS officials noted that analyzing these data could provide some indication of the state of the workforce, but they have not done so because these data provide a limited snapshot and other information would need to be considered to provide a full understanding of the workforce’s well-being. Two other aspects of the program are the establishment of Health Fitness and Wellness Coordinators and an optional Health Risk Assessment. FAMS Health, Fitness, and Wellness Program coordinators are responsible for engaging with air marshals to promote a culture of wellness, build an inclusive fitness community at each location, and provide health, fitness, and wellness recommendations. The national coordinator of the Health, Fitness, and Wellness Program is also responsible for providing oversight of the program, ensuring program effectiveness, and providing FAMS leadership with program reports and assessments when requested. According to FAMS documents, the optional Health Risk Assessment is intended to help air marshals identify modifiable health risk factors. The assessments are completed by air marshals and reviewed by a certified occupational health nurse. Air marshals then meet with FAMS Medical Programs Section staff to discuss their health and recommendations to promote health and wellness, and prevent disease. FAMS officials report that in 2015, they completed eight Health Risk Assessments; however, since then no additional air marshals have requested this assessment. Medical Programs Section officials stated that few air marshals took advantage of this option because air marshals prefer to obtain health services outside of the agency (i.e. with private providers) to maintain their privacy. In August 2017, FAMS established a Hearing Conservation Program to provide a coordinated approach to prevent hearing loss due to noise exposure in the work environment and to be compliant with federal regulations. According to FAMS documentation, air marshals are regularly or intermittently exposed to gunshot noise such as during training activities. Through this program FAMS has provided training about the adverse effects of noise and administered baseline audiograms and annual testing of air marshals. FAMS physicians are to evaluate data from the hearing screenings and conduct follow-up with individual air marshals when there is a change in the test results. FAMS officials report that they maintain these test records in the Medical Programs Section’s paper files for individual air marshals. As of July 2019, FAMS estimated that about two-thirds of air marshals had obtained baseline audiograms. FAMS officials report that they do not have plans to analyze air marshals’ audiogram results in the aggregate. Instead, FAMS officials plan to review the program at least annually to identify any enhancements that could improve program efficiency and effectiveness. FAMS began more closely monitoring certain workforce-wide data in response to management concerns that arose in 2016 about the rising costs associated with workers’ compensation claims. In 2016, it began to more closely monitor the number and costs of workers’ compensation claims. In February 2019, FAMS hired a safety specialist to begin analyzing available information on air marshals’ on-the-job injuries in an effort to identify ways to prevent them from occurring, according to FAMS officials. Although FAMS monitors certain information on workers’ compensation claims and has plans to further monitor workplace injuries, it has not used or planned to use other information it collects to assess the health of its workforce in a comprehensive manner that would enable it to look for broader health trends and risks. As previously discussed, FAMS collects and reviews in-depth health information on each air marshal at least every 2 years. However, it has not analyzed this information to distill trends across the workforce because, according to FAMS officials, it would be difficult given that FAMS maintains individual air marshals’ medical information in paper files. Similarly, FAMS routinely collects data from air marshals’ health and fitness assessments but has not used these data to identify any workforce-wide trends because, as discussed above, FAMS officials state that these data would provide a limited snapshot of air marshals’ fitness. Further, although FAMS began collecting data from hearing screenings in 2018, officials indicated that they do not have any plans to analyze these data for the workforce as a whole. Furthermore, since 2015, the National Coordinator for the Health, Fitness, and Wellness Program is responsible for providing program assessments when requested but, as of July 2019, FAMS leadership has not requested any such reports. There is evidence of interest within FAMS in information about the overall health of the workforce. In 2017, the FAMS Advisory Council asked the Medical Programs Section to report on the health and wellness of the workforce. According to documents we reviewed, in March 2017, Medical Programs Section officials reported to the advisory council that air marshals’ most common medical restrictions were due to mental health and cardiac conditions and the most common work-related medical issues were orthopedic issues resulting from training-related injuries. However, Medical Programs Section officials told us their assessment was not derived from an analysis of air marshals’ medical data but rather relied on anecdotal information gathered from on-call nurses fielding calls from sick air marshals and providing routine occupational health case management. OPM’s 2018 report on human capital management highlights the importance of using data to conduct workforce analyses to help identify and properly address human capital challenges. The FAMS Medical Programs Section and other offices regularly collect information about individual air marshals’ illnesses and injuries as well as health and fitness information but FAMS management is not analyzing it to inform decisions and address any potential health risks. If FAMS management analyzed this information in a manner consistent with relevant policies and requirements, they would be better positioned to identify medical, health, and fitness issues among the entire workforce, make informed workforce planning decisions, and take steps they deemed warranted, such as providing targeted education or revising its policies. Further, in February 2018, OPM identified “enhancing productivity through a focus on employee health” as a key priority within human capital management for the federal workforce. Four months later, in June 2018, TSA identified “care for our people” as a leadership principle and directed leaders to prioritize employee welfare. In November 2019, FAMS management officials provided us with a statement that said, in part, that “understanding the overall health and wellness of our air marshals is paramount.” They further stated that they now plan to create a working group to identify options to monitor the health of the workforce as a whole. They did not provide any timeframes or documentation of this effort. However, if implemented, this could be a good first step toward assessment of the overall health of the FAMS workforce. Without information on the overall health and fitness of the FAMS workforce, FAMS management is not well positioned to prioritize employee health and welfare or ensure that it deploys a workforce capable of fulfilling its national security mission. Air marshals in each of the six field offices we visited stated that schedule unpredictability—short-notice changes to their start times, missions, and at-home days—was a key quality of life issue. Air marshals explained that they have experienced changes to their scheduled mission days and non-mission days—such as in-office training and scheduled days off—so they could cover mission needs that came up on short notice. In addition, air marshals in four of the six field offices we visited explained that they have been taken off of their scheduled missions on short notice so they could cover higher-risk missions. Air marshals in all six field offices stated that schedule unpredictability has made it difficult to manage their personal commitments. For example, air marshals described some challenges planning and attending family events, maintaining personal relationships, obtaining childcare, and scheduling doctor’s visits for themselves and their children. Air marshals in one office also described anxiety about the possibility of missing a phone call asking them to report for a mission and about their ability to arrive to work on time when given short notice. Air marshals, supervisors, and FAMS management we met with explained that changes to FAMS’s deployment strategy in March 2018 that increased the number of SMCs have increased schedule unpredictability. According to Flight Operations Division officials, FAMS typically does not learn of these missions more than 72 hours in advance. Our analysis of FAMS data shows that the average number of SMCs per roster period more than tripled after FAMS implemented its new concept of operations in March 2018, and air marshals’ SMC-related schedule changes more than doubled during the same period. FAMS has taken some steps to mitigate the impacts of SMCs on air marshals’ schedules as follows: Implemented a standby shift and increased the number of air marshals on standby. FAMS Flight Operations Division officials report that they implemented a standby shift to staff SMCs in June 2018. According to Flight Operations Division officials, FAMS typically staffed SMCs using air marshals scheduled to domestic and international missions, recovery shifts, or ground-based duties prior to the implementation of the standby shift. Flight Operations Division officials also report that they increased the number of scheduled standby shifts in an effort to curtail schedule unpredictability. Based on our review of FAMS data, the number of scheduled standby shifts more than tripled from June 2018 to December 2018. According to these officials, scheduling air marshals on standby shifts is intended to improve schedule predictability by reducing the frequency that air marshals have their planned work schedules adjusted so they can cover SMCs. Expanded to multiple standby shifts with staggered start times and modified standby shift start times. According to Flight Operations Division officials, field office SACs reported that FAMS frequently adjusted air marshals’ scheduled start times for the single standby shift in response to SMC requests. To reduce this schedule unpredictability, Flight Operations Division officials reported that in November 2018, they began scheduling air marshals to multiple standby shifts per day with staggered start times, rather than just one shift per day. These officials stated that they received positive feedback regarding this change during management’s subsequent field office visits. We asked air marshals in four of the six field offices we visited for their perspectives on the effectiveness of this change during discussion sessions and received mixed feedback. Air marshals in two field offices stated that they thought this change had improved SMC scheduling by reducing the number of changes to standby shift start times. However, air marshals in each of these four field offices stated that Mission Operations Center personnel do not always observe air marshals’ scheduled standby shift hours. Systems Operation Control Section officials noted that the magnitude of adjustments to air marshals’ standby shift start times is not always significant. To further reduce schedule unpredictability, FAMS also began modifying standby shift start times for some of its field offices in December 2018. Flight Operations Division officials stated that they modify standby shift start times for individual field offices based on specific SMC timing trends in field offices. According to Flight Operations officials, they analyzed air marshals’ scheduled standby shift start times and actual start times both before and after these changes and concluded that they were reducing start time variance. For example, they found that between October 28, 2018, and November 24, 2018—a period during which they report using one standby shift—approximately 46 percent of actual standby shift start times deviated from scheduled start time by 4 or more hours. Between June 9, 2019, and July 6, 2019, after FAMS Flight Operation Division officials reported having expanded to multiple standby shifts and adjusted start times for individual offices, FAMS officials found that approximately 33 percent of actual standby shift start times deviated from scheduled start times by 4 or more hours. Flight Operations Division officials stated that these changes have reduced the frequency of SMCs covered by air marshals not in standby status. Our analysis of FAMS data on SMC-related schedule changes shows that FAMS reduced the need to make changes to the schedules of air marshals that were not on recovery or standby shifts in order to staff SMCs. Additionally, Flight Operations Division officials stated that they continue to monitor data on SMC start times to identify the optimal standby shift start times to reduce scheduling unpredictability. Improved coordination with field offices. In April 2019, FAMS management issued guidance aimed at improving coordination between the Mission Operations Center and field offices to reduce schedule unpredictability. First, the guidance requires that the Mission Operations Center obtain field office approval prior to adjusting an air marshal’s standby shift start time by more than 2 hours in order to staff an SMC. Second, in situations where FAMS receives a SMC request with more than 24 hours’ notice and there are no available air marshals scheduled to standby, Mission Operations Center and field office personnel are to use air marshals scheduled to recovery shifts (if they are available and at the field office’s discretion) before pulling air marshals from non-SMC missions to cover the request. According to FAMS management, this latter change is intended to reduce the number of non-SMC missions dropped to cover SMCs. FAMS management and Flight Operations Division personnel monitor some information about air marshals’ planned and actual schedules. According to Flight Operations Division officials, they routinely monitor average scheduled shift length, average actual shift length, and average scheduled rest for domestic and international missions through monthly field office-specific reports. These officials stated that field office SACs and other FAMS management officials use the reports to understand characteristics like the mission tempo in each field office. Our analysis of air marshals’ work hours as recorded on their time sheets demonstrated that air marshals’ shift lengths were generally consistent with scheduling guidelines for selected roster periods, but in each period a few shifts were not. Additionally, our analysis of air marshals’ regular days off showed that air marshals generally received 8 days off per roster period—consistent with FAMS scheduling guidelines—for the periods we analyzed. The details of that analysis are presented in appendix II. Domestic missions. Generally, FAMS schedules air marshals to shifts that range between 6.5 and 10 hours on days that they fly domestic missions, but the Mission Operations Center has the authority to extend shift lengths to 12 hours. During the four roster periods we reviewed, air marshals’ domestic mission shifts were generally shorter than 10 hours. Specifically, during the 28-day roster periods we examined in fiscal year 2019, we estimate that air marshals exclusively worked shifts lasting 10 hours or less approximately 87 percent of the time. Air marshals worked one or more shifts that extended beyond the scheduling guideline of 10 hours about 13 percent of the time. For example, during the 28-day roster periods we examined in fiscal year 2019, we estimate that air marshals worked at least one shift between 10 hours and 12 hours about 10 percent of the time and worked at least one shift that was greater than 12 hours approximately 3 percent of the time. See figure 3 for the results of our analysis of domestic mission shifts. International missions. Scheduling guidelines for international missions vary based on factors like mission destination, and some missions are not subject to a maximum duration. Given the guideline variation for international missions, we examined actual international missions against the highest international mission shift length specified by the guidelines— 18 hours—as well as guidance that requires the Mission Operations Center to consider scheduling alternatives when a delay causes an international mission shift to last beyond 20 hours. Air marshals generally worked in accordance with guidelines for international missions. Specifically, we found that air marshals generally worked shifts that lasted fewer than 18 hours during the four roster periods we analyzed. During the 28-day roster periods we examined in fiscal year 2019, we estimate that air marshals exclusively worked shifts lasting 18 hours or less approximately 71 percent of the time. Air marshals worked one or more shifts lasting more than 18 hours about 29 percent of the time. For example, during the 28-day roster periods we examined in fiscal year 2019, we estimate that air marshals worked at least one shift between 18 and 20 hours approximately 24 percent of the time and worked at least one shift greater than 20 hours about 11 percent of the time. See figure 4 for the results of our analysis of international mission shifts. FAMS management’s monthly reports on average shift lengths do not provide insight into the extent air marshals are working hours consistent with scheduling guidelines. For example, FAMS management reports for the roster periods we analyzed for fiscal years 2018 and 2019 showed that the average domestic mission shift lasted between about 6.5 and 7.5 hours. While these average times are below the 10-hour guideline for domestic mission shifts, these data are not granular enough to determine whether any air marshals worked shifts that exceeded scheduling guidelines. With regard to international missions, because FAMS’s guidelines vary more widely depending on the specifics of the mission, a single average of all international mission durations is even less useful in determining the extent to which air marshals’ work hours were consistent with applicable guidelines. For example, one FAMS management report stated that the average international mission shift length between October 29, 2017, and November 25, 2017—the first period we examined in fiscal year 2018— was 12 hours and 55 minutes. Although this average exceeds the scheduling guideline of 12 hours for international mission shifts to North and Central American destinations that do not include an overnight layover, this average is less than the guideline of 15 hours for international mission shifts to North and Central American destinations that include an overnight layover. As a result, the average shift length would not have made clear how often guidelines were being observed. FAMS’s scheduling guidelines allow for exceptions to accommodate operational needs, but more information on actual work hours could improve FAMS management’s insight into how air marshals’ quality of life is being balanced against mission needs. For example, FAMS management’s reports could include other statistics that would provide more insight into air marshals’ domestic mission shifts, such as minimum or maximum actual shift lengths or the extent of variation across actual shift lengths. Flight Operations Division officials explained that they do not monitor other statistics that could provide more insight into actual work hours because they had not identified a need to do so but stated that they could and added that more information could be helpful. Standards for Internal Control in the Federal Government requires that management use quality information to achieve the entity’s objectives by, for example, processing its data into quality information that management uses to make informed decisions. Without monitoring the extent to which air marshals’ shifts and rest periods are consistent with scheduling guidelines, FAMS management is not well positioned to determine if scheduling guidelines are serving their purpose to balance air marshals’ quality of life with FAMS’s operational needs to execute its mission, nor can it determine the extent to which air marshals are working beyond the guidelines. As a result, the agency may not be able to successfully manage risks of potentially decreased alertness and focus when air marshals perform their duties. FAMS has not made its scheduling guidelines available to all air marshals. During our visits to a non-generalizable sample of field offices, many FAMS personnel—including field office management, SFAMs, and air marshals—stated that they did not have access to scheduling guidelines. Rather, several air marshals stated that they learned of the scheduling guidelines through discussions with immediate supervisors and interactions with the Mission Operations Center. Air marshals in two field offices we visited stated that they had asked for a copy of the guidelines but were never provided one. Air marshals told us it would be helpful to have access to the guidelines so that they can understand how FAMS schedules its shifts. When we asked why the guidelines were not available to employees, Systems Operation Control Section officials reported that they were previously unaware that the field office SACs did not have access to the guidelines. In response, in June 2019, they provided Field Operations Division leadership with a document outlining the guidelines for distribution to field office SACs. However, according to Systems Operation Control Section officials, they did not explicitly direct the field office SACs to further disseminate the guidelines to air marshals in their respective field offices. As of July 2019, Systems Operation Control Section officials were not aware to what extent the document was disseminated beyond the field office SACs, if at all. FAMS scheduling guidelines are intended to balance mission needs with air marshals’ quality of life. As discussed above, these guidelines include specific parameters for shift length and rest periods when air marshals fly missions. Further, exceptions to these guidelines are permitted to meet operational needs. Standards for Internal Control in the Federal Government provides that management should implement control activities, such as FAMS scheduling guidelines, and that it is helpful for management to communicate them to personnel so they can implement them for their assigned responsibilities. Furthermore, the FAMS- commissioned Harvard sleep and fatigue study states that policies concerning work hours and scheduling need to be well communicated. Without access to the scheduling guidelines, air marshals and their supervisors may not be aware of management’s intended balance between mission needs and air marshals’ quality of life. Further, they may not feel empowered to request schedule changes that may be needed to ensure air marshals are sufficiently rested to carry out their mission. Some field office SFAMs we spoke to in our discussion sessions were not clear about protocols that require Mission Operations Center personnel to obtain their approval before making certain adjustments to air marshals’ schedules. FAMS protocols state that the Mission Operations Center can extend an air marshal’s domestic mission shift to 12 hours or reduce rest following a domestic shift to 10 hours. However, the Mission Operations Center must first obtain the approval of a field office SFAM before extending an air marshal’s domestic mission shift beyond 12 hours or reducing rest below 10 hours. SFAMs we discussed this issue with during our six site visits had varying levels of knowledge about their authority or involvement in approving such changes. For example, individual SFAMs in two field offices we visited told us they were aware of the requirements but in two other field offices, SFAMs stated that they did not have any say in adjustments to air marshals’ schedules, regardless of the circumstances. SFAMs were also unaware of field offices’ authority to remove air marshals from missions on short notice. FAMS protocols authorize, and Systems Operation Control Section officials confirmed, that field office SFAMs can remove air marshals from a mission the day of or day before the mission. However, there were SFAMs that were unaware of this in each of the four field offices where we discussed the topic. Some SFAMs had the understanding that management officials—either field office SACs or other management officials outside of field offices—or Mission Operations Center personnel must make these decisions. Systems Operation Control Section officials explained that field office SFAMs do not have access to the Standard Operating Procedure that sets forth these protocols, nor have they provided written guidance on the protocols. Systems Operation Control Section officials stated that they have not given supervisors access to these protocols or written guidance on them because they chose to communicate protocols through verbal briefings. Systems Operation Control Section officials explained that they follow the protocols and had not previously seen a need to share them more widely, but acknowledged that doing so would increase transparency. It is important that SFAMs have access to protocols outlining their role and authority so that they can carry out their job. Standards for Internal Control in the Federal Government provides that management should implement control activities through policies by, for example, communicating to personnel the policies and procedures so that the personnel can implement the control activities for their assigned responsibilities. Furthermore, the FAMS-commissioned Harvard sleep and fatigue study states that policies concerning work hours and scheduling need to be well communicated. Providing SFAMs with written information on these protocols that detail their involvement and authorities in making decisions that affect air marshals’ quality of life would provide clarity for SFAMS, who we found to be uncertain about their authorities in this regard. From fiscal years 2016 through 2018, FAMS employees filed 230 EEO complaints with TSA’s Civil Rights Division (CRD), though employees may have reported additional discrimination complaints through other means. CRD is responsible for receiving and handling FAMS employees’ EEO complaints. During this 3-year period, the number of EEO complaints CRD handled regarding FAMS employees was proportional to the number of complaints handled for employees across all of TSA, relative to the size of each workforce. Specifically, in 2018 the ratio of total complaints to total number of employees was 2.8 percent for FAMS and 2.1 percent for TSA. Although reporting to CRD is the only means for FAMS employees to file an EEO complaint, they may choose to report discrimination to their manager or to other entities including the DHS OIG or TSA’s Anti- Harassment Program, which is overseen by the National Resolution Center. The Anti-Harassment Program can take immediate action intended to stop the discriminatory behavior by, for example, separating the employees involved in the complaint. FAMS employees may also choose to report to CRD as well as one or more of the other available means. Once an employee files a complaint with any of these entities, agency officials are to follow processes to investigate the allegation to determine if the complaint is substantiated or not substantiated. See appendix III for a description of the four venues through which FAMS employees can raise discrimination complaints, including what is known about the number and nature of complaints received through each venue in fiscal years 2016 through 2018. We found that some FAMS employees may choose not to report an allegation of discrimination to any of these venues. For example, air marshals in five of the six field offices we visited indicated that they may not file a discrimination complaint because they were concerned about retaliation. Additionally, air marshals in three discussion sessions indicated that some FAMS employees may prefer to handle an allegation of discrimination themselves by speaking directly with the person involved. Further, representatives of a FAMS employee group and the professional association representing federal law enforcement officers we met with stated some FAMS employees may choose not to report an allegation of discrimination to any of these venues. As such, the 230 EEO complaints may underestimate the total number of incidents of alleged discrimination within FAMS. FAMS’s 2012 action plan identified a number of existing TSA and FAMS efforts already in place at that time—such as providing certain training— and stated FAMS’s commitment to continuing and improving these existing efforts with a goal to enhance organizational and cultural initiatives regarding diversity and equal employment opportunities. Consistent with FAMS’s 2012 plan, DHS, TSA, and FAMS have provided EEO and diversity training to FAMS employees and offered several forums for air marshals to raise concerns about discrimination. Training. Since 2003, DHS and TSA have required all employees— including air marshals—to complete training intended to, among other things, prevent discrimination. These include mandatory annual DHS training, TSA new-hire training, and some optional TSA training. For example since 2003, TSA has required new employees to complete a course called Introduction to Civil Rights which provides an overview of civil rights, EEO laws, and TSA’s related complaint process. In addition, as of December 2006, DHS has required all employees to complete annual No FEAR Act training to inform employees of their rights and responsibilities with regard to discrimination in the workplace. FAMS management officials told us that educating the workforce about discrimination is important because education promotes and opens communication avenues within FAMS that were previously underutilized. TSA has also provided training beyond these required courses. For example, CRD officials told us that at the start of each fiscal year they work with FAMS management to identify FAMS field offices where concerns about discriminatory behavior have been raised. CRD officials stated that they have then provided in-person tailored trainings based on the field offices’ needs. Additionally, in August 2019, TSA’s Anti- Harassment Program provided FAMS leadership with an overview of the program—including defining harassment and manager and employee responsibilities. According to CRD and FAMS officials, they are in the process of developing additional courses that could be helpful to preventing discrimination, including civility courses, coaching through conflict, and crucial conversations training. Venues. FAMS has venues for air marshals to raise issues, such as concerns about discrimination. Specifically, in 2002 FAMS created “Field Office Focus Groups;” in 2006 FAMS established an Ombudsman position; and in 2011 FAMS created EEO points of contact in FAMS field offices. FAMS Field Office Focus Groups. During the early ramp-up of FAMS after September 11, 2001, FAMS established an internal initiative called “Field Office Focus Groups” to provide a venue for employees to raise issues, such as concerns about discrimination, to field office management through group discussions. We reviewed Field Office Focus Group meeting minutes from all 20 field offices from October 2016 through December 2018. During these meetings, discrimination-related issues were discussed in two field offices. For example, in one focus group air marshals inquired about their recourse when they believe management has retaliated against them. FAMS Ombudsman. FAMS established a FAMS-specific Ombudsman position in 2006. The FAMS Ombudsman is responsible for answering inquiries about agency policies and helping employees identify options to resolve workplace concerns, such as concerns about discrimination. The FAMS Ombudsman we met with told us they have fielded inquiries about discrimination but they do not keep records on the number of inquiries. The Ombudsman estimated that between May 2018, when assuming the Ombudsman position, and July 2019 the office received, on average, eight calls per month from air marshals on various topics, some of which involved inquiries about discrimination. In these cases the Ombudsman explained that they had informed individuals of the resources available to them as well as the 45-day time frame to file an EEO complaint with CRD if they chose to do so. Air marshals in five of the six field offices we visited reported being aware of the Ombudsman position. EEO Points of Contact in all FAMS field offices. According to FAMS officials, in 2011, FAMS began to establish EEO points of contact in FAMS’s 20 field offices. FAMS officials report that these points of contact are intended to provide ready, onsite referrals to CRD staff and facilitate access to information about EEO and diversity training opportunities. As of August 2019, FAMS officials told us that all FAMS field offices have at least one EEO point of contact and several field offices have more than one. The FAMS 2012 action plan highlighted additional efforts to prevent discrimination but FAMS has not fully implemented or maintained these efforts. According to FAMS leadership, they have not fully implemented or continued the efforts they set forth in the 2012 action plan because the changeover in FAMS leadership since 2012 resulted in a loss of focus on implementing the plan. For example, the plan called for each FAMS field office to develop an EEO/diversity action plan to strengthen the current workplace environment. Each plan was to emphasize four principles: leadership commitment, recruitment and resourcing, career development and enhancement, and employee engagement/workplace culture. As of July 2019, none of the field offices had a diversity action plan in place. In addition, the 2012 action plan called for FAMS to continue to convene diversity focus groups. In 2010 and 2011, FAMS conducted 10 diversity focus groups to solicit input from the workforce related to recruitment, retention, discrimination, harassment, and retaliation, according to FAMS officials. However, FAMS has not held these diversity focus groups since 2011. Further, in 2007, TSA established what is now the Diversity and Inclusion Change Agents Council, which serves as a venue where TSA employees, including air marshals, can promote diversity. In the 2012 action plan, FAMS planned to have all levels of FAMS employees, including senior leadership, such as SACs and Assistant Supervisory Air Marshals in Charge, represented on the council. However as of 2019, two air marshals are the FAMS representatives on this council. Concerns with discrimination persist among air marshals. For example, FAMS employees’ fiscal year 2018 FEVS survey responses related to issues of discrimination were consistently less positive than those of DHS and TSA employees overall, although the proportion of EEO complaints among FAMS’s workforce is similar to TSA’s as a whole. Specifically, DHS estimates that less than half (44 percent) of FAMS employees feel they can disclose a suspected violation without fear of reprisal. Further, FAMS employees’ positive responses were lower than TSA and DHS employees’. Similarly, a smaller estimated percent of FAMS employees believe that prohibited personnel practices are not tolerated (FAMS 54 percent, TSA 60 percent, and DHS 62 percent). Further, as described earlier, air marshals in five of the six field offices we visited raised concerns about potential retaliation for reporting discrimination. For example, one air marshal expressed concern that they might be given undesirable travel schedules as retaliation if they filed a complaint. Finally, according to employee exit surveys conducted by TSA in fiscal years 2012 through 2018, of the 342 FAMS respondents who completed a survey, 26 (about 8 percent) cited that a reason for leaving was diversity or inclusion barriers in the workplace. Given these indications of concerns about discrimination in the FAMS work environment, it is important that FAMS management reaffirm and strengthen its efforts to prevent discrimination. The Equal Employment Opportunity Commission’s Management Directive 715 requires agencies to take appropriate steps to establish a model EEO program and identifies six essential elements for a model EEO program, including demonstrated commitment from agency leadership and proactive prevention of unlawful discrimination. Further, it is DHS’s stated objective to develop and maintain a high performing workforce in part by promoting a culture of transparency, fairness, and equal employment opportunity throughout the DHS workforce. By taking steps to renew its commitment to the goals and initiatives in its 2012 action plan, such as updating and following through on its 2012 action plan, FAMS management can demonstrate leadership commitment to the prevention of discrimination. Doing so could better ensure it proactively addresses and reduces concerns of discrimination among its workforce. Federal air marshals are deployed worldwide to protect civil aviation against the risk of terrorist violence. Although FAMS has taken some steps to address air marshals’ quality of life issues, FAMS management does not have information about the number and proportion of the workforce who are medically qualified, which limits their understanding of the workforce’s ability to fulfill its duties. Further, FAMS has not assessed the overall health of its workforce by analyzing available data, which would allow it to identify any health and fitness trends or risks among its workforce, take steps to mitigate these risks, make informed workforce planning decisions, and prioritize employee welfare to ensure that it deploys a workforce capable of fulfilling its national security mission. FAMS does not monitor the extent to which air marshals’ actual work hours are consistent with scheduling guidelines, limiting its ability to determine if air marshals’ quality of life is being balanced with the agency’s operational needs. FAMS also has not shared these scheduling guidelines with air marshals or provided guidance outlining authorities and procedures for changing air marshals’ schedules with field offices. Sharing these guidelines would improve the ability of air marshals and their supervisors to address quality of life issues related to long shifts and inadequate rest. Finally, although FAMS has taken steps to prevent discrimination, FAMS employees have continued to file discrimination complaints indicating that at least the perception of discrimination persists. By taking steps to reaffirm and strengthen its efforts to prevent discrimination, such as updating and following through on its 2012 action plan, FAMS management could better ensure it proactively addresses and reduces concerns of discrimination consistent with DHS’s objective of developing and maintaining a high performing workforce through fairness and equal employment opportunity. We are making the following six recommendations to FAMS: The Executive Assistant Administrator / Director of FAMS should identify and utilize a suitable system that provides information about air marshals’ medical qualification status. (Recommendation 1) The Executive Assistant Administrator / Director of FAMS should develop and implement a plan to assess the health and fitness of the FAMS workforce as a whole, including trends over time. (Recommendation 2) The Executive Assistant Administrator / Director of FAMS should identify and implement a means to monitor the extent to which air marshals’ actual shifts and rest hours are consistent with scheduling guidelines. (Recommendation 3) The Executive Assistant Administrator / Director of FAMS should provide all air marshals access to scheduling guidelines, including workday length and rest periods. (Recommendation 4) The Executive Assistant Administrator / Director of FAMS should disseminate or otherwise provide supervisory air marshals access to guidance that outlines authorities and procedures for changing an air marshal’s work schedule. (Recommendation 5) The Executive Assistant Administrator / Director of FAMS should take steps to reaffirm and strengthen efforts to prevent discrimination by, for example, updating and following through on its 2012 action plan and renewing leadership commitment to the plan’s goals. (Recommendation 6) We provided a draft of our report to DHS for comment. In written comments, which are included in appendix IV, DHS concurred with our six recommendations and described steps they plan to take to address them, including estimated timeframes for completion. With regard to our first recommendation that FAMS identify and utilize a suitable system that provides information about air marshals’ medical qualification status, DHS officials stated that FAMS is evaluating case management software to track this information and plans to pursue funding for this effort in fiscal year 2021. This action, if fully implemented, should address the intent of this recommendation. With regard to our second recommendation that FAMS develop and implement a plan to assess the health and fitness of the FAMS workforce as a whole, DHS officials stated that FAMS recently established a team to develop a plan for assessing workforce health and wellness issues. Adopting and implementing a plan that assesses the health and fitness of the FAMS workforce as a whole should address the intent of this recommendation. With regard to our third recommendation that FAMS identify and implement a means to monitor the extent to which air marshals’ actual shifts and rest hours are consistent with scheduling guidelines, DHS officials stated that FAMS will begin tracking air marshals’ actual hours and examine the extent to which air marshals’ actual and scheduled hours vary. This information could be helpful, for example, in assessing air marshals’ schedule predictability. However, to address the intent of this recommendation, FAMS would need to monitor the extent that air marshals’ actual work and rest hours are consistent with FAMS’s scheduling guidelines. With regard to our fourth recommendation to provide all air marshals access to scheduling guidelines, according to DHS officials, FAMS will provide air marshals ongoing access to the guidelines. Similarly, with regard to our fifth recommendation to provide supervisory air marshals access to guidance that outlines authorities and procedures for changing an air marshal’s work schedule, according to DHS officials, FAMS will provide supervisors ongoing access to scheduling authorities and procedures. These actions, if fully implemented, should address the intent of these recommendations. With regard to our sixth recommendation that FAMS reaffirm and strengthen efforts to prevent discrimination, DHS officials stated that FAMS plans to review the goals of its 2012 action plan and develop steps to strengthen efforts to prevent discrimination. If fully implemented, these actions should address the intent of this recommendation. We are sending copies of this report to the appropriate congressional committees and to the Acting Secretary of Homeland Security, Administrator of TSA, Executive Assistant Administrator / Director of FAMS, and other interested parties. In addition, this report is available at no charge on the GAO website at http://gao.gov. If you or your staff have any questions concerning this report, please contact me at (202) 512-8777 or russellw@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. The objectives of this report are to (1) assess the extent to which the Federal Air Marshal Service (FAMS) has taken steps to address air marshals’ health concerns; (2) assess the extent to which FAMS has taken steps to address air marshals’ concerns about their work schedules; and (3) describe what is known about the number of discrimination complaints FAMS employees have reported to the Transportation Security Administration (TSA) and FAMS and assess the extent to which TSA and FAMS have taken steps to prevent discrimination in the workplace. To address all three objectives, we visited a non-generalizable sample of six FAMS field offices in: Atlanta, Georgia; Dallas, Texas; Los Angeles, California; Newark, New Jersey; New York, New York; and Seattle, Washington. We chose these field offices to capture variation in the following factors: the number of special mission coverage trips (SMCs) in fiscal year 2018; the rate of schedule changes by field office in fiscal year 2018; the rate of equal employment opportunity complaints by field office for fiscal years 2015 through 2018; the number of employees in each field office as of September 2018; field office location; and results from the Office of Personnel Management’s (OPM) 2018 Federal Employee Viewpoint Survey (FEVS). To obtain a range of perspectives on quality of life issues, work schedules, and discrimination within FAMS, we conducted discussion sessions with air marshals as well as separate discussion sessions with supervisory federal air marshals (SFAMs) in each field office. We conducted a total of ten discussion sessions with air marshals. We initially conducted one discussion session with air marshals in the Seattle field office—where we spoke with approximately 15 air marshals—and one discussion session with air marshals in the Dallas field office—where we spoke with approximately 30 air marshals. Following these discussion sessions, we developed a standardized list of questions used to facilitate two discussion sessions with approximately 10 air marshals each, in each of the remaining four field offices (Atlanta, Los Angeles, Newark, and New York). We also conducted a total of six discussion sessions exclusively with SFAMs—one session in each field office that we visited. The discussion session in the Seattle field office consisted of two SFAMs, while all others consisted of approximately 10 SFAMs. Following discussion sessions with SFAMs in the Seattle and Dallas field offices, the team developed a standardized list of questions that was used by a moderator in meetings with SFAMS in the remaining four field offices. For discussion sessions with air marshals and SFAMs, we requested that each field office make available a diverse group of participants, to include women and minorities. These were semi-structured discussions, led by a moderator who followed a standardized list of questions and allowed for unstructured follow-up questions. The results from these group discussions are not generalizable to air marshals or SFAMs who did not participate in them, but they provided a range of perspectives from about 125 air marshals and about 50 SFAMs spanning the six FAMS field offices we visited. In each field office we visited we also interviewed field office management officials about these same topics. Finally, we interviewed field office operations staff in four of the six field offices about their role in scheduling air marshals. To obtain additional perspectives on these topics, we interviewed a TSA employee group (Women Executives at FAMS); a professional association representing federal law enforcement officers, including air marshals (the Federal Law Enforcement Officers Association); and the FAMS Ombudsman. To address the first objective about air marshals’ health concerns, we reviewed prior research on FAMS workforce issues including our past reports on challenges associated with FAMS’s workforce; a 2012 FAMS- commissioned Harvard Medical School study on air marshal sleep and fatigue; and reports from FAMS working groups that examined medical issues and physical fitness. To identify air marshals’ current concerns about health issues, we asked air marshals about any quality of life issues they face during discussion sessions. We then performed a content analysis of the results and identified key issues relating to health that were raised during the discussion sessions. One of our analysts conducted this analysis, tallying the number of discussion sessions in which certain health issues were discussed by air marshals. A different analyst then checked the information for accuracy, and any initial disagreements were discussed and reconciled by the analysts. We also analyzed results of OPM’s FEVS for FAMS, TSA, and DHS employees in 2018—the most recent data available at the time of our review. We analyzed FEVS question number 35, which asks survey participants if “Employees are protected from health and safety hazards on the job.” We assessed the reliability of the FEVS data by reviewing OPM’s 2018 FEVS Technical Report and reviewing confidence intervals for the data points we included in this report. We determined that the data we used were sufficiently reliable for use in the analysis presented in this report. We also analyzed FAMS’s workers’ compensation claim data for FAMS employees for fiscal years 2013 (when FAMS reviewed air marshals’ physical fitness) through 2018 (the most recent full fiscal year of data available). We assessed the reliability of the claim data by interviewing cognizant FAMS officials, obtaining information about the data systems that maintain these data, and conducting checks for missing and out of range values. We determined that the data we used were sufficiently reliable for use in the analysis presented in this report. To identify steps FAMS has taken to address air marshals’ health concerns, we asked FAMS management, SFAMs, and air marshals we met with in headquarters and field offices to identify efforts to assess and promote air marshals’ health—such as programs, policies, and practices. We reviewed documentation related to these efforts including FAMS’s policies outlining medical standards for air marshals and its Health, Fitness, and Wellness program, as well as FAMS analyses of health issues among air marshals, workers’ compensation claims, and on-the- job injuries. For example, we examined (a) minutes from two FAMS meetings when FAMS Medical Programs Section officials reported on medical and health issues among air marshals; (b) summary information from TSA’s Occupational Safety, Health, and Environment Division describing air marshals’ worker compensation claims from fiscal years 2015 through 2018; (c) an analysis of injuries and illnesses reported by air marshals from calendar years 2016 through 2018. We also reviewed information about FAMS practices for maintaining medical and health information about air marshals. We compared FAMS’s efforts to address air marshals’ health concerns to OPM strategies for human capital management and a TSA strategic planning document from June 2018. To address the second objective to examine the extent to which FAMS has taken steps to address air marshals’ concerns about their work schedules, we reviewed FAMS documents outlining scheduling guidelines for shift length and rest periods, protocols for adjusting air marshals’ schedules, and FAMS management reports with statistics on air marshals’ planned and actual schedules. We analyzed data from FAMS’s Aircrews data system on the number of SMC missions and the number of changes made to air marshals’ schedules in order to cover SMCs between November 2016 and June 2019. We also analyzed data from FAMS’s Aircrews data system on the number of scheduled standby shifts between June 2018—when FAMS began scheduling air marshals to standby shifts to staff SMCs—and August 2019. We assessed the reliability of these data by reviewing documentation regarding the source of this data and by obtaining information from knowledgeable agency officials about its accuracy and completeness. We found these data to be sufficiently reliable for use in our analysis. To identify the lengths of air marshals’ shifts when they flew missions, we analyzed 808 air marshal time sheets. We first selected four separate 28-day periods, known as roster periods, during which air marshals flew missions. Our analysis included air marshals scheduled to fly or on recovery shifts on 11 or more days during the selected roster periods. This resulted in a total of 7,981 roster periods worked by air marshals as our population of interest. To help ensure the sample included air marshals from field offices that had high rates of SMCs for each roster period, we stratified our population into eight mutually exclusive strata based on the roster period and the percentage of each field office’s missions that were SMCs in each roster period. We then randomly selected a stratified sample of 101 air marshals from each roster period proportionally allocated across the SMC percentage strata within each roster period. Using these data for these air marshals, we analyzed the length of air marshals’ shifts when they flew domestic and international missions to identify shifts that were (1) consistent with or (2) exceeded scheduling guidelines. For example, we analyzed time sheets to estimate the percentage of roster periods worked by air marshals that included one or more shifts longer than 10 hours. We also analyzed time sheets to estimate the percentage of roster periods worked by air marshals that included one or more shifts between 10 and 12 hours and to estimate the percentage of roster periods worked by air marshals that included one or more shifts longer than 12 hours. We also examined the number of air marshals’ regular days off. Specifically, we analyzed air marshals’ time sheets to estimate the percentage of roster periods worked by air marshals that included less than 8 regular days off. In performing this analysis, we did not count days as regular days off when air marshals reported receiving a regular day off but also reported time worked for the same day, unless the time worked was carryover from a prior workday. In conducting these time sheet analyses, we took steps to minimize issues that might affect data reliability. Specifically, we identified time and attendance sheets that included errors that would impact our analysis— such as those with missing values—and either excluded them or obtained corrected information from FAMS. We excluded a total of 44 of the 404 roster periods initially selected in our sample. We also performed an analysis to ensure that by excluding these timesheets we did not introduce bias into our sample. We found no evidence of bias and concluded the sample data was sufficiently reliable for the purposes of producing population estimates. The results of our analysis are generalizable to the roster periods analyzed. To identify steps FAMS has taken to address air marshals’ concerns about their schedules, we interviewed management officials from FAMS’s Flight Operations Division about their efforts to (1) monitor air marshals’ shifts and rest against scheduling guidelines and (2) make scheduling protocols available to staff. We compared FAMS’s actions to address air marshals’ scheduling concerns to two principles in Standards for Internal Control in the Federal Government related to the need to implement control activities and use quality information to achieve an entity’s objectives. To address the third objective about discrimination, we reviewed FAMS, TSA, and DHS policies related to discrimination and interviewed FAMS, TSA, and DHS officials to understand how FAMS employees report discrimination complaints. Specifically, we met with officials in TSA’s Civil Rights Division (CRD), TSA’s Anti-Harassment Program, FAMS Incident Activity Coordination and Trends Unit, and DHS OIG. We also examined the number and characteristics of discrimination complaints reported by FAMS employees from fiscal year 2016 through fiscal year 2018—the most recent 3 full years of data available at the time of our review. Specifically, we analyzed record-level data on discrimination complaints filed or reported by FAMS employees to TSA’s CRD, TSA’s Anti- Harassment Program, and FAMS’s Incident Activity Coordination and Trends Unit. We also obtained information from the DHS OIG on individual complaints they received that involved FAMS employees and included complaints of discrimination. Generally, we analyzed the date of the complaint, type of allegation, basis of the discrimination, and outcomes. We assessed the reliability of the data from TSA’s CRD, TSA’s Anti-Harassment Program, and FAMS’s Incident Activity Coordination and Trends Unit by interviewing cognizant TSA and FAMS officials, obtaining information about the data systems that maintain these data, and conducting checks for missing and out of range values. We determined that the data we used was sufficiently reliable for use in the analysis presented in this report. To examine the proportion of the FAMS and TSA workforces who alleged discrimination relative to the size of these workforces, we compared the number of complaints handled by TSA’s CRD for fiscal years 2016, 2017 and 2018 to the total number of employees during the same fiscal years. We assessed the reliability of the TSA’s CRD data by interviewing cognizant TSA officials and obtaining information about the data system that maintains these data. We determined that the data we used was sufficiently reliable for use in the analysis presented in this report. To identify steps TSA and FAMS have taken to prevent discrimination in the workplace, we interviewed TSA and FAMS management, SFAMs, and air marshals we met with during our site visits. We then analyzed documentation related to the identified efforts such as minutes from all 20 FAMS Field Office Focus Group meetings between October 2016 and December 2018 as well as DHS and TSA training materials related to preventing discrimination. To identify air marshals’ current perspectives about discrimination, we asked air marshals in our discussion sessions about the processes for reporting discriminatory behavior as well as their perspectives on discriminatory behavior within FAMS. We then performed a content analysis of the results and identified key issues that were raised during the discussion sessions, including air marshals’ comments regarding their experiences related to retaliation for reporting discrimination. One of our analysts conducted this analysis, tallying the number of discussion sessions in which certain issues were discussed by air marshals. A different analyst then checked the information for accuracy. We then determined the extent to which certain key issues were raised among the sessions. In addition, we analyzed results of OPM’s FEVS for FAMS, TSA, and DHS employees in 2018. Specifically, we analyzed FEVS question number 17, which asks survey participants if employees “Can disclose suspected violation without fear of reprisal.” We also analyzed FEVS question number 38, which asks survey participants if “Prohibited personnel practices are not tolerated.” As noted above, we assessed the reliability of the FEVS data and determined that the data we used was sufficiently reliable for use in the analysis presented in this report. We also analyzed data from TSA’s employee exit survey results for FAMS employees from fiscal years 2012 through 2018—the period for which full year data were available since the DHS OIG review. Specifically, we examined the extent to which employees’ reasons for leaving included diversity or inclusion barriers in the workplace. We assessed the reliability of the exit survey data by obtaining information about how the data are collected from TSA officials. We determined that the data we used were sufficiently reliable for use in the analysis presented in this report. We compared TSA’s and FAMS’s efforts to prevent discrimination in the workplace to the Equal Employment Opportunity Commission’s Management Directive 715. This policy requires agencies to take appropriate steps to establish a model equal employment opportunity (EEO) program and identifies six essential elements for a model EEO program. In addition, we compared TSA’s and FAMS’s efforts to DHS’s and TSA’s strategic planning documents which both include an objective to develop and maintain a high-performing workforce. We conducted this performance audit from July 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Federal Air Marshal Service’s (FAMS) scheduling guidelines state that each air marshal is scheduled to receive a minimum of 60 hours of rest around 2 consecutive regular days off each week, or a total of 8 regular days off each 28-day roster period. FAMS Flight Operations officials stated that there are exceptions that may prevent an air marshal from being scheduled to receive 2 regular days off each week, such as international deployments that last 6 or more days and travel to and from training programs that last 6 or more days. Additionally, FAMS management officials and air marshals that we interviewed stated that air marshals may be asked to cover flights for which a potentially high-risk passenger has been ticketed—known as Special Mission Coverage deployments—on their scheduled regular days off if no other air marshals are available. Furthermore, FAMS Flight Operations officials stated that FAMS may ask air marshals to receive non-consecutive regular days off due to operational needs. We analyzed air marshals’ regular days off as recorded on their timesheets to determine the extent that they were consistent with these scheduling guidelines. Specifically, we analyzed a generalizable sample of air marshals’ timesheets for two roster periods in fiscal year 2018 and two roster periods in fiscal year 2019. We found that air marshals generally received 8 regular days off in the roster periods we analyzed. Specifically, during the 28-day roster periods we examined in fiscal year 2019, we estimate that air marshals received 8 regular days off approximately 98 percent of the time. However, some air marshals did not receive all 8 regular days off. Specifically, during the 28-day roster periods we analyzed in fiscal year 2019, we estimate that air marshals received 7 regular days off approximately 2 percent of the time. See figure 5 for results of our analysis. There are four venues through which Federal Air Marshal Service (FAMS) employees can raise discrimination complaints. One of these venues is the Transportation Security Administration’s (TSA) Civil Rights Division (CRD) which is responsible for receiving and handling FAMS employees’ equal employment opportunity (EEO) complaints. Although reporting to CRD is the only means for FAMS employees to file an EEO complaint, they may choose to report discrimination in other venues. Specifically, they may report discrimination to their manager, TSA’s Anti-Harassment Program—which is overseen by TSA’s National Resolution Center, or the Department of Homeland Security’s (DHS) Office of Inspector General (OIG). FAMS employees may also choose to report to CRD as well as to one or more of the other available entities. Table 1 describes what is known about the number and nature of complaints received through each venue in fiscal years 2016 through 2018. In addition to the contact named above, Claudia Becker (Assistant Director), Anne Akin (Analyst-in-Charge), Enyinnaya Aja, James Ashley, Carl Barden, Taiyshawna Battle, Edda Emmanuelli-Perez, Eric Hauswirth, Yvonne Jones, Jesse Jordan, Ellie Klein, Thomas Lombardi, Diona Martyn, Sam Portnow, Minette Richardson, Forrest Rule, Raymond Sendejas, Michael Silver, and Adam Vogt also made key contributions to this report.", "summary": "In the wake of 9/11, terrorists continue to target aircraft and airports, underscoring the ongoing threat to civil aviation and the need for effective security measures. FAMS deploys air marshals on selected flights to address such threats and is a key component of TSA's approach to aviation security. However, longstanding challenges faced by FAMS's workforce could impact its ability to carry out its mission. GAO was asked to review FAMS workforce issues. This report addresses (1) the extent to which FAMS has taken steps to address air marshals' health concerns, (2) the extent to which FAMS has taken steps to address air marshals' concerns about their work schedules, and (3) the number of discrimination complaints FAMS employees have reported and the extent to which FAMS has taken steps to prevent discrimination. GAO analyzed TSA and FAMS policies; documentation of efforts to address air marshals' quality of life issues; and FAMS data on missions, schedules, and discrimination complaints. GAO also interviewed TSA and FAMS officials, including FAMS management and air marshals in a non-generalizable sample of six FAMS field offices selected to capture a breadth of perspectives. Air marshals continue to express concerns about their health, but the Federal Air Marshal Service (FAMS) has not comprehensively assessed the health of its workforce. Air marshals in all six field offices we visited noted health issues, such as sleep deprivation, as a key quality of life concern. FAMS has taken steps to assess air marshals' individual health, such as requiring medical exams, but has not comprehensively assessed the overall health of its workforce and has not developed a plan to do so. FAMS officials stated that it would be difficult to analyze air marshals' medical records because they are not stored electronically, though they are researching options to do so. FAMS could develop and implement a plan to analyze the employee health data it already collects to identify workforce trends, and use this information to better promote employee welfare consistent with Transportation Security Administration (TSA) leadership principles. FAMS has taken some steps to address air marshals' concerns about their work schedules. In March 2018, FAMS revised its deployment strategy to expand coverage of certain high risk missions that it typically learns of 72 hours in advance. Following this, changes to air marshals' schedules to accommodate these missions more than doubled. In response, FAMS altered how it staffs these missions and reports that these modifications have reduced schedule changes. FAMS also maintains shift length and rest period guidelines intended to balance mission needs with air marshals' quality of life. However, FAMS does not monitor the extent to which air marshals' actual work hours are consistent with guidelines because it has not identified a need to do so. As a result, it cannot determine how frequently air marshals work beyond guidelines and is not well-positioned to manage risks associated with long work hours. From fiscal years 2016 through 2018, FAMS employees filed 230 discrimination complaints with TSA's Civil Rights Division, though employees may have reported additional discrimination complaints through other means. In 2012, FAMS adopted an action plan to address discrimination and has taken some steps called for in the plan, such as sustaining a FAMS Ombudsman position. However, due to a loss of management focus on the plan, FAMS has not fully implemented other planned efforts, such as holding diversity focus groups. Taking steps to reaffirm its efforts to prevent discrimination would demonstrate leadership commitment to reducing concerns of discrimination within FAMS. GAO is making six recommendations to FAMS, including that it implement a plan to assess the health of the FAMS workforce, monitor the extent that air marshals' shifts are consistent with guidelines, and strengthen efforts to prevent discrimination. DHS concurred with all six recommendations.", "document_type": "gao"}
{"report": "VA is responsible for providing benefits to veterans, including health care, disability compensation, and various types of financial assistance. In fiscal year 2019, VA received a total budget of $201.1 billion, and the largest discretionary budget in its history—$86.6 billion, about $20 billion higher than in 2015. The department operates one of the largest health care delivery systems in the nation through its Veterans Health Administration (VHA), with 172 medical centers and more than 1,000 outpatient facilities organized into regional networks. VA has faced growing demand by veterans for its health care services, with the total number of veterans enrolled in VA’s health care system rising from 7.9 million to more than 9 million from fiscal year 2006 through fiscal year 2017. In fiscal year 2019, VHA received $73.1 billion of VA’s $86.6 billion discretionary budget. In addition to providing health care services, VA provides cash benefits to veterans for disabling conditions incurred in or aggravated by military service. To carry out its mission, VA spends tens of billions of dollars to procure a wide range of goods and services, including medical supplies; to construct hospitals, clinics, and other facilities; and to provide the information technology (IT) to support its operations. We have made hundreds of recommendations to improve VA’s management and oversight of the services it provides to veterans. Specifically, since 2000, we have made 1,225 recommendations to VA. While VA has implemented most of the recommendations, a number remain open, as of April 2019. Specifically, more than 125 recommendations related to VA health care remain open, including 17 recommendations that have remained open for 3 years or more; 15 recommendations related to improving VA acquisition management remain open, including 1 recommendation that has remained open for 3 years or more; and 12 recommendations related to management of disability claims workloads. In 2017, we began sending letters to VA and appropriate congressional committees identifying priority recommendations for VA to implement in order to significantly improve its operations. We categorized these recommendations into nine areas: (1) veterans’ access to timely health care; (2) veterans’ community care program; (3) human capital management; (4) information technology; (5) appeals reform for disability benefits; (6) quality of care and patient safety; (7) national policy documents; (8) contracting policies and practices; and (9) veterans’ access to burial options. Since we designated VA health care as a high-risk area in 2015, VA has begun to address each of the identified five areas of concern related to managing risks and improving VA health care: (1) ambiguous policies and inconsistent processes; (2) inadequate oversight and accountability; (3) IT challenges; (4) inadequate training for VA staff; and (5) unclear resource needs and allocation priorities. Since our 2017 High-Risk Report, ratings for all five criteria remain unchanged as of March 2019. Specifically, the leadership commitment and action plan criteria remain partially met. Although VA has experienced leadership instability over the past 2 years in several senior positions, a new Secretary was confirmed in July 2018. Secretary Wilkie has demonstrated his commitment to addressing the department’s high- risk designation by, among other things, creating an office to direct an integrated, focused high-risk approach and communicating to VA leaders the importance of addressing our recommendations and working with GAO. The Secretary’s actions, to date, have allowed the department to maintain its leadership commitment rating as of March 2019. The action plan criterion also remains partially met as of March 2019. In March 2018, VA submitted an action plan to address the underlying causes of its high-risk designation, but the plan did not clearly link actions to stated outcomes and goals or establish a framework to assess VA’s progress. VA officials told us that instead of revising the March 2018 action plan, it will incorporate its plans to address the high-risk designation into the department’s current initiatives. Specifically, VA is currently implementing the VHA Plan for Modernization, through which the department intends to modernize VA’s structure, culture, governance, and systems through organizational improvements. VA officials have indicated that the VHA Plan for Modernization is intended, among other things, to address the high-risk areas for VA health care. VA officials also told us they are currently developing operational plans for the VHA Plan for Modernization, and these plans will include goals, time frames, and metrics, among other things. VA estimates that the operational plans will be complete by September 2019. The monitoring, demonstrated progress, and capacity criteria remain unmet since our 2017 High-Risk Report. In order to address the monitoring and demonstrated progress criteria, VA’s ongoing revisions to its action plan need to include the addition of certain essential components, including metrics, milestones, and mechanisms for monitoring and demonstrating progress in addressing the high-risk areas of concern. VA’s capacity rating also remains not met. Though the department took steps to establish offices, workgroups, and initiatives to address its high-risk designation, many of these efforts are either in the initial stages of development or resources have not been allocated. For each of the five identified areas of concern related to managing risks and improving VA health care, ratings reflect the level of progress VA has made to address them. Ambiguous policies and inconsistent processes. Since our 2017 High-Risk Report, ratings for all five criteria remain unchanged for this area of concern as of March 2019. Leadership commitment: partially met. In September 2017, we reported that VHA had approximately 800 national policies, the majority of which were outdated. VHA reported reducing the number of national policies by 26 percent, and work continues in this area. In addition, VHA established an inventory of approximately 55,000 local policies as of October 2017. In October 2018, VHA noted its plans to determine who is responsible for monitoring implementation of national and local policy, as well as the alignment between these levels of policy. At that time, VHA also discussed its future plans to monitor the implementation and alignment of national and local policy and update its national policy directive by the end of June 2019. Additionally, VA has implemented a structure for leadership input into the policy process, such as at the VHA Chief of Staff level. However, senior leadership has lacked the stability needed to ensure issued policy meets agency goals. Capacity: not met. Since 2017, VA has issued an updated directive on policy management, and put in place procedures to train staff and obtain input from all levels on policy development. However, VA continues to face challenges in this area because it is reliant on contracts and information technology resources, which if delayed, can impede progress toward meeting goals. Action plan: partially met. Since 2017, VA has further refined its root cause analysis for this area of concern. In June 2017, VA also identified the following as enterprise-wide root causes of its high-risk designation: disjointed strategic planning; poorly defined roles, responsibilities, and decision authorities; poor horizontal and vertical integration; lack of reliable data and analysis; ineffective human capital management; and inadequate change management. VA relied on these root cause analyses as the foundational drivers for the VHA Plan for Modernization. However, VA has not used these analyses to develop and prioritize appropriate milestones and metrics in the action plan. Monitoring: not met. Since the March 2018 action plan lacked specific metrics and mechanisms for assessing and reporting progress, it is not clear how VA is monitoring its progress. Demonstrated progress: not met. Our work continues to indicate VA is not yet able to show progress in this area. Since its 2015 high-risk designation, we have made 50 new recommendations in this area of concern, 32 of which were made since our 2017 report was issued. For example, In November 2017, we reported that, due in part to misinterpretation or lack of awareness of VHA policy, VA medical center officials did not always conduct or document timely required reviews of providers when allegations were made against them. We also found that VHA was unable to reasonably ensure appropriate reporting of providers to oversight entities such as state licensing authorities. As a result, VHA’s ability to provide safe, high quality care to veterans is hindered because other VA medical centers, as well as non-VA health care entities, may be unaware of serious concerns raised about a provider’s care. We recommended that VHA direct medical centers to document and oversee reviews of providers’ clinical care after concerns are raised, among other recommendations. All of our recommendations remain open. As of January 2019, VA estimated completing the recommended revisions to its policy and audit processes in August 2019 and August 2020, respectively. In July 2018, we reported that VA collected data related to employee misconduct and disciplinary actions, but data fragmentation, reliability issues, and inadequate guidance impeded department-wide analysis of those data. Thus, VA management is hindered in making knowledgeable decisions regarding the extent of misconduct and how it was addressed. We recommended that VA develop and implement guidance to collect complete and reliable misconduct and associated disciplinary-action data department-wide, whether through a single information system, or multiple interoperable systems. VA concurred with this priority recommendation, which remains open. VA reported that it expects to implement one or more information systems that will collect misconduct and associated disciplinary action data in January 2020. Inadequate oversight and accountability. Since our 2017 High-Risk Report, ratings for one criterion improved and four remain unchanged for this area of concern as of March 2019. Leadership commitment: partially met. VA has made organizational changes, including establishing the Office of Integrity, to standardize and streamline the agency’s oversight of its programs and personnel. However, since 2017, the lack of stability in the Under Secretary for Health position has hindered its ability to demonstrate sustained commitment to improving this area of concern. Capacity: not met. VA has begun to implement capacity-building initiatives directed at improving oversight and accountability. For example, VHA’s Office of Internal Audit and Risk Assessment, a key component of the department’s oversight and accountability model, began conducting audits in 2018. However, according to VA’s action plan, the department has yet to allocate resources for this office, such as sufficient staff to carry out its activities. Action plan: partially met. In March 2019, the rating for this criterion improved to partially met. In 2018, VA conducted an analysis of the root causes contributing to findings of inadequate oversight and accountability, an important step in identifying the underlying factors contributing to this area of concern. addresses gaps in physician staffing, including those for mental health providers, which may affect veterans’ access to care, among other issues. We recommended that VHA should develop and implement a process to accurately count all physicians providing care at each medical center, including physicians who are not employed by VHA. VHA did not concur with this recommendation, which we reiterated in our priority recommendation letter. In a series of reports from 2012 through 2018, GAO found VA’s wait time data unreliable for primary and specialty care, as well as for care in the community. GAO also found that VA did not measure the full wait times that veterans experience in obtaining care across these settings. Specifically, in December 2012, we made two recommendations to VA to improve the reliability and oversight of wait time measures, both of which are designated as priority, and remain open. Similarly, in June 2018, we reported that VHA could not systematically monitor the timeliness of veterans’ access to Veterans Choice Program care because it lacked complete, reliable data to do so. Specifically, we found (1) a lack of data on the timeliness of accepting referrals and opting veterans in to the program, (2) inaccuracy of clinically indicated dates, which are used to measure the timeliness of care, and (3) unreliable data on the timeliness of urgent care. We recommended that VA take steps to improve the timeliness and accuracy of data on veterans’ wait times for care and its oversight of the future community care program that will consolidate other community care programs with the Veterans Choice Program, whose authority sunsets on June 6, 2019. VA concurred with eight of the 10 recommendations related to these findings, all of which remain open. VA reported that, in order to improve wait times data accuracy under the Veterans Community Care Program, it intends to implement several initiatives through September 2019. In September 2018, we reported on the timeliness of third-party administrators’ payments to community providers under VA’s largest community care program, the Veterans Choice Program. Although VA has taken steps to improve the timeliness of claim payments to these providers, VA is not collecting data or monitoring compliance with third-party administrators’ customer service requirements for provider calls. This could adversely affect the timeliness with which community providers are paid, possibly making them less willing to participate and affecting veterans’ access to care. We recommended that VA collect data on and monitor compliance with its requirements pertaining to customer service for community providers. VA agreed with the recommendations, but has not yet implemented them. In November 2018, we reported that VHA’s suicide prevention media outreach activities declined in recent years due to leadership turnover and reorganization. Additionally, we found that VHA did not assign key leadership responsibilities or establish clear lines of reporting for its suicide prevention media outreach campaign, which hindered its ability to oversee the campaign. In April 2019, VA implemented one of the recommendations by providing a new oversight plan for its suicide prevention media outreach campaign. It plans to implement the remaining recommendation by working with communications experts to develop metrics, targets, and an evaluation strategy to improve its outreach efforts. In April 2019, we reported that VHA’s appraisal process for assessing medical center director performance relies heavily on medical center performance information. VHA designed the Strategic Analytics for Improvement and Learning (SAIL) system to provide internal benchmarking of medical center performance and to promote high quality health care delivery across its system of regional networks and medical centers. SAIL was evaluated in 2014 and 2015 by VHA and an external contractor, respectively, but VHA has not assessed the recommendations from those evaluations, or taken action on them. The evaluations, which found issues related to the validity and reliability of SAIL and its ratings for measuring performance and fostering accountability, together included more than 40 recommendations for improvement. Without ensuring that the recommendations resulting from these previous evaluations are assessed and implemented as appropriate, the identified deficiencies may not be adequately resolved, and VHA’s ability to hold officials accountable for taking the necessary actions may be diminished. VA concurred with the two recommendations we made to address these findings, both of which remain open. Information technology challenges. Since our 2017 High-Risk Report, ratings for one criterion regressed, one improved, and three remain unchanged this area of concern as of March 2019. Leadership commitment: not met. In March 2019, the rating for this criterion declined to not met. In January 2019, the Senate confirmed a new VA Chief Information Officer (CIO). This is the fourth official to lead VA’s IT organization since our 2017 High-Risk Report, and the frequent turnover in this position raises concerns about VA’s ability to address the department’s IT challenges. Capacity: not met. In May 2018, VA awarded a contract to acquire the same commercial electronic health record system as the Department of Defense (DOD). However, VA is early in the transition and its actions are ongoing. Additionally, VA has developed a strategy for decommissioning its legacy IT systems, which are tying up funds that could be reallocated for new technology to enable improved veteran care, but has made limited progress in implementing this effort. Action plan: partially met. In March 2019, the rating for this criterion improved to partially met. In 2018, VA conducted an analysis to identify the root causes of IT challenges, which informed the goals in its action plan. However, VA’s action plan contained significant information gaps, including missing interim milestone dates. These information gaps raise questions about VA’s commitment to addressing IT-related root causes and need to be addressed before we can consider this criterion met. Monitoring: not met. The March 2018 action plan lacked specific metrics and mechanisms for assessing and reporting progress. Demonstrating progress: not met. Our work continues to indicate VA is not yet able to show progress in this area. Since its 2015 high-risk designation, we have made 14 new recommendations in this area, 12 of which were made since our 2017 report was issued. For example: In June 2017, to address deficiencies we found related to VA’s pharmacy system, we recommended that VA take six actions to provide clinicians and pharmacists with improved tools to support pharmacy services to veterans and reduce risks to patient safety. This included assessing the extent to which the interoperability of VA and DOD’s pharmacy systems impacts transitioning service members. VA generally concurred with these recommendations, all of which remain open. In April 2019, we testified that from 2001 through 2018, VA pursued three efforts to modernize its health information system— the Veterans Health Information Systems and Technology Architecture (VistA). (See Fig. 2.) However, these efforts resulted in high costs, created challenges ensuring the interoperability of health data, and ultimately did not result in a modernized VistA. Specifically, in December 2017, we reported that VA obligated over $1.1 billion for contracts with 138 contractors during fiscal years 2011 through 2016 for two modernization initiatives, an Integrated Electronic Health Record program with the DOD and VistA Evolution. We have ongoing work that examines the cost to VA of VistA and the department’s actions to transition from VistA to a new electronic health record system. Regarding the department’s most recent effort, the Electronic Health Record Modernization, we testified in April 2019 that the governance plan for this program was not fully defined, which could jeopardize its fourth attempt to modernize its electronic health record system. VA plans to implement the same electronic health record system the DOD is currently deploying. The new system is intended to be the authoritative source of clinical data to support improved health, patient safety, and quality of care provided by VA. VA has not fully implemented our priority recommendation calling for the department to define the role of the Interagency Program Office in the governance plans for acquisition of the department’s new electronic health record system. VA concurred with this recommendation and reported that the Joint Executive Committee, a joint governance body, approved a role for the Interagency Program Office, but as of April 2019 VA has yet to provide us with documentation of this development. We also testified in April 2019 that VA has not yet fully addressed the recommendation we made in September 2014 to expedite the process for identifying and implementing an IT system for the Family Caregiver Program. We reported in September 2014 that the Family Caregiver Program, which was established to support family caregivers of seriously injured post-9/11 veterans, has not been supported by an effective IT system. Specifically, we reported that, due to limitations with the system, the program office did not have ready access to the types of workload data that would allow it to routinely monitor workload problems created by the program. Without such information, the program’s workload issues could persist and impact the quality and scope of caregiver services, and ultimately the services that veterans receive. VA concurred with our recommendation and subsequently began taking steps to implement a replacement system. However, the department has encountered delays and reported recently initiating an effort to implement a new IT system to support the program based on existing commercially available software. We have ongoing work to evaluate VA’s effort to acquire a new IT system to support the Family Caregiver Program. Inadequate training for VA staff. Since our 2017 High-Risk Report, ratings for one criterion improved and four remain unchanged for this area of concern as of March 2019. Leadership commitment: not met. VA officials have reported progress in establishing a process to develop an enterprise-wide annual training plan to better ensure that VA staff are adequately trained to provide high-quality care to veterans. However, the actions necessary to complete and implement this training plan are not reflected in VA’s March 2018 action plan for the training area of concern, raising questions about the process through which it will be developed. The lack of progress in setting clear goals for improving training demonstrates that VA lacks leadership commitment to address our concerns in this area. Capacity: not met. VA has created working groups and task forces— such as the Learning Organization Transformation Subcommittee in the National Leadership Council—with specific responsibilities. However, VA’s ability to demonstrate capacity is limited because, according to VA’s March 2018 action plan, the department relies on external contractor support services to meet training goals. Action plan: partially met. In March 2019, the rating for this criterion improved to partially met. VA completed a root cause analysis for training deficiencies, which informed the goals underlying its action plan. However, the action plan continues to have deficiencies identified in 2017. For example, not all goal descriptions correspond to planned actions and the action plan lacks detail about how and which data will be collected to assess progress. Monitoring: not met. The March 2018 action plan lacked specific metrics and mechanisms for assessing and reporting progress. Demonstrated progress: not met. Our work continues to indicate that VA is not yet able to show progress in this area. Since its 2015 designation, we have made 11 new recommendations in this area of concern, 3 of which were made since our 2017 report was issued. For example, in April 2018 we reported that, while the department has recommended training for patient advocates—staff members who receive and document feedback from veterans or their representatives—it has not developed an approach to routinely assess their training needs or monitored training completion. The failure to conduct these activities increases VA’s risk that staff may not be adequately trained to advocate on behalf of veterans. As a result, we recommended VHA develop an approach to routinely assess training needs and monitor training completion. VA concurred with our recommendations, which remain open. Unclear resource needs and allocation priorities. Since our 2017 High-Risk Report, ratings for one criterion improved and four remain unchanged for this area of concern as of March 2019. Leadership commitment: partially met. In December 2017, a VA Chief Financial Officer (CFO) was confirmed after the department spent over 2.5 years under an interim CFO. In addition, VA is in the process of establishing a new office to estimate workforce resource requirements. Capacity: not met. VA has established functions intended to inform cost analyses of major VA initiatives, including a new financial management process to replace its outdated financial systems. However, it is unclear in its action plan the extent to which VA has identified the resources needed to establish and maintain these functions. Action plan: partially met. In March 2019, the rating for this criterion improved to partially met. Since our 2017 High-Risk Report, VA conducted a root cause analysis of this area of concern. However, VA’s action plan lacks metrics for monitoring progress and does not include all of VA’s ongoing actions, such as efforts to assess current and future regional demand for veterans’ health care services. Monitoring: not met. Since VA’s action plan lacks specific metrics and mechanisms for assessing and reporting progress, it is not clear how VA is monitoring its progress. Demonstrating progress: not met. Our work continues to indicate VA is not yet able to show progress in this area. Since its 2015 designation, we have made 16 new recommendations in this area of concern, 10 of which were made since our 2017 report. For example: In May 2017, we reported identifying several limitations with VA’s clinical productivity metrics and statistical models for tracking clinical efficiency; this limits VA’s ability to assess whether resources are being used effectively to serve veterans. Specifically, we found that productivity metrics may not account for all providers or clinical services, reflect the intensity of clinical workload, and reflect providers’ clinical staffing levels. Additionally, we found that efficiency models may also be adversely affected by inaccurate workload and staffing data. As a result, VA cannot systematically identify best practices to address low productivity and inefficiency as well as determine the factors VA medical centers commonly identify as contributing to low productivity and inefficiency. We made four recommendations to address these findings; three of which VA implemented in the spring of 2018 by improving productivity metrics and staffing and workload data. To implement the remaining recommendation, VA should establish a process to oversee medical centers’ plans for addressing low clinical productivity and inefficiency. In August 2018 we reported that VA medical centers face challenges operating their Sterile Processing Services programs— notably, addressing workforce needs, such as lengthy hiring time frames and limited pay and professional growth potential. VHA’s Sterile Processing Services workforce challenges pose a potential risk to VA medical centers’ ability to ensure access to sterilized medical equipment. Until VHA examines these workforce needs, VHA won’t know whether or to what extent the reported challenges adversely affect VA medical centers’ ability to effectively operate their Sterile Processing Services programs and ensure access to safe care for veterans. We recommended that VA examine workforce needs and take action based on this assessment, as appropriate. VA concurred with this recommendation, which remains open. In light of numerous contracting challenges that we have identified, and given the significant investment in resources to fulfill its critical mission of serving veterans, we added VA acquisition management as a new high- risk area in 2019. VA has one of the most significant acquisition functions in the federal government, both in dollar amount of obligations and number of contract actions. Specifically, about a third of VA’s discretionary budget in fiscal year 2018, or about $27 billion, has been used to contract for goods and services. We have identified challenges in the following areas of concern related to VA’s acquisition management: (1) outdated acquisition regulations and policies; (2) lack of an effective medical supplies procurement strategy; (3) inadequate acquisition training; (4) contracting officer workload challenges; (5) lack of reliable data systems; (6) limited contract oversight and incomplete contract file documentation; and (7) leadership instability. Outdated acquisition regulations and policies. VA’s procurement policies have historically been outdated, disjointed, and difficult for contracting officers to use. In September 2016, we reported that (1) the acquisition regulations contracting officers currently follow have not been fully updated since 2008 and (2) VA had been working on completing a comprehensive revision of its acquisition regulations since 2011. VA’s delay in updating this fundamental source of policy has impeded the ability of contracting officers to effectively carry out their duties. We recommended in September 2016 that VA identify measures to expedite the revision of its acquisition regulations and clarify what policies are currently in effect. VA concurred with this priority recommendation and, as of January 2019, had rescinded or re-issued updated policy memoranda for all information letters, which VA previously used to provide guidance that was temporary in nature. VA has also made some progress in updating its acquisition regulations, but more work remains to be done over the next several years. As of April 2019, VA reports that 15 of the 41 parts in its acquisition regulations update were published as final rules, 10 were issued as proposed rules for public comment, and the remainder are at an earlier stage of the rulemaking process. All parts are scheduled to be out for public comment by March 2020, but the final rules are not expected to be published until April 2021. Lack of an effective medical supplies procurement strategy. VA’s program for purchasing medical supplies has not been effectively executed, nor is it in line with practices at leading hospitals. To support more efficient purchasing of medical supplies for its 172 medical centers that serve the needs of about 9 million veterans, VA launched the Medical Surgical Prime Vendor-Next Generation (MSPV-NG) program in December 2016. MSPV-NG was part of VA’s overall effort to transform its supply chain and achieve $150 million in cost avoidance. In November 2017, we reported that VA’s approach to developing its catalog of supplies was rushed and lacked key stakeholder involvement and buy-in. It also relied on establishing non-competitive blanket purchase agreements for the overwhelming majority of products, resulting in low utilization by medical centers. VA had set a target that medical centers would order 40 percent of their supplies from the MSPV-NG catalog, but utilization rates were below this target with a nationwide average utilization rate across medical centers of about 24 percent as of May 2017. This low utilization adversely affected VA’s ability to achieve its cost avoidance goal. We recommended in November 2017 that VA develop, document, and communicate to stakeholders an overarching strategy for the program. VA concurred with this priority recommendation and is developing strategies to address it. First, in February 2019, VA developed and documented a new, overarching acquisition strategy for its Medical Surgical Prime Vendor (MSPV) program, and has begun the process of communicating it to key stakeholders, including clinical and logistics staff. Further, VA is developing a separate strategy to involve clinicians in developing requirements with plans to complete a pre-pilot of this strategy by September 2019. In response to a congressional request to assess these and other program changes, we recently began a review of VA’s MSPV program. Inadequate acquisition training. VA acquisition training, at times, has not been comprehensive nor provided to staff that could benefit from it. A 2006 statute required, and a 2016 Supreme Court decision (Kingdomware Technologies, Inc. v. United States) reaffirmed, that VA is to give preference to veteran-owned small businesses when competitively awarding contracts—a program known as Veterans First. In September 2018, we reported that training on VA’s Veterans First policy did not address some of its more challenging aspects. For example, many of the contracting officers we interviewed were uncertain about how to balance the preference for veteran-owned small businesses with fair and reasonable price determinations when lower prices might be found on the open market. In addition, VA provided several installments of online training sessions on the Veterans First policy to contracting officers but did not make them mandatory. As a result, only 52 percent of VA contacting officers completed the follow-up training by the spring of 2018. We recommended in September 2018 that VA provide more targeted training to contracting officers on how to implement the Veterans First policy, particularly in the area of making fair and reasonable price determinations, and assess whether this training should be designated as mandatory. VA concurred, and in April 2019, VA’s Chief Acquisition Officer (CAO) stated that VA is taking steps to make this training mandatory. VA also reported that its Acquisition Academy will provide Veterans First training to all contracting staff on May 30, 2019. Contracting officer workload challenges. The majority of our reviews since 2015 have highlighted workload as a contributing factor to the challenges that contracting officers face. Most recently, in September 2018, we reported that about 54 percent of surveyed VA contracting officers said their workload was not reasonable and found that workload stresses have exacerbated the struggles that they face implementing the department’s Veterans First policy. In addition, in September 2016, we reported that VHA contracting officers processed a large number of small dollar-value actions to support medical center operations, many of which involve emergency procurements of routine items to support immediate patient care. Contracting officers and the department’s Acting CAO told us that these frequent and urgent small-dollar transactions reduce contracting officers’ efficiency and ability to take a strategic view of VHA’s overarching procurement needs. We reported in November 2017 that emergency procurements accounted for approximately 20 percent—$1.9 billion—of VHA’s overall contract actions in fiscal year 2016. Figure 3 shows the percent of VHA contract actions designated as emergencies in fiscal year 2016 by each network contracting office. We recommended in November 2017 that VHA network contracting offices work with medical centers to identify opportunities to more strategically purchase goods and services frequently purchased on an emergency basis. VA concurred with this recommendation and recently offered to provide us with a demonstration of the supply chain dashboard that VA uses to track items purchased on an emergency basis, which we plan to attend by the end of May 2019. VA also agreed to conduct an analysis of its purchase card spending to identify items that should be purchased through its MSPV program. VA expects to complete this analysis by July 2019. If implemented, this would allow for both greater contracting officer efficiency and cost savings. For example, based on a similar recommendation we made in 2012, VA began more systematically employing strategic sourcing in FY 2013, and in subsequent fiscal years reported about $10 billion in savings over a 5-year period. Lack of reliable data systems. The lack of accurate data has been a long-standing problem at VA. In September 2016, we reported that VA had not integrated its contract management and accounting systems, resulting in duplicative efforts on the part of contracting officers and increased risk of errors. We and VA’s Inspector General each recommended that VA perform data checks between the two systems. VA concurred with this recommendation and some VA contracting organizations have made efforts to address this risk. Further, VA reported in March 2019, that it plans to adopt a new integrated financial and contract management system, which it plans to install VA-wide over a 9- year period, with the final site receiving the system in 2027. Limited contract oversight and incomplete contract file documentation. VA has had difficulty ensuring that its contracts are properly monitored and documented. In September 2018, we reported that, although VA obligated $3.9 billion to veteran-owned small businesses in fiscal year 2017, its contracting officers were not effectively monitoring compliance with key aspects of the department’s Veterans First policy, such as limits on subcontracting (which ensure that the goal of the program—to promote opportunities for veteran-owned businesses—is not undermined). In many cases, we found that clauses requiring compliance were not included in the VA’s contracts and orders with veteran businesses because the contracting officers either forgot to include them or were unaware of the requirement. The contracting officers we spoke with also said that they do not have sufficient time or knowledge to conduct oversight. Through limited reviews, VA has identified a number of violations that would warrant a broader assessment of the fraud risks to the program. We recommended in September 2018 that VA establish a mechanism to ensure that mandatory subcontracting-related clauses be consistently incorporated into set-aside contracts with veteran-owned businesses and that VA conduct a fraud risk assessment for the Veterans First program. VA concurred with these recommendations and is taking steps to implement them. For example, VA reported in April 2019 that it had made modifications to its electronic contract management system to ensure the clauses would be included in set-aside contracts and anticipated completing testing of the modifications in May 2019. We also reported in September 2016 that a number of VA contract files we reviewed were missing key documents, increasing the risk that key processes and regulations were not followed. We recommended that VA focus its internal compliance reviews to ensure that required contract documents are properly prepared and documented. VA concurred with this recommendation. Since then, VA has made policy changes that revised its processes for compliance reviews of contract documentation. We are currently following up with VA to obtain the results of its compliance reviews to determine if VA has fully implemented this recommendation. Leadership instability. We have previously reported, most recently in September 2018, that procurement leadership instability has made it difficult for the VA to execute and monitor the implementation of key acquisition programs and policies. For example, changes in senior procurement leadership, including the CAO and VHA’s Chief Procurement and Logistics Officer, occurred during the implementation of MSPV-NG and similar instability in leadership affected the MSPV-NG program office itself. Overall, the MSPV-NG program office has had four directors, two of whom served in an acting capacity, since its inception in 2014. To address this instability, we recommended in November 2017 that VA appoint a non-career employee as the CAO and prioritize the hiring of the MSPV-NG program office’s director position on a permanent basis. VA concurred with these recommendations and implemented them in 2018. Stable leadership should help bring consistent and much needed direction to the MSPV-NG program, but we recently identified other areas within the VA where sustained leadership is also needed. For instance, in September 2018, we reported there have been six Acting Directors within the past 2 and a half years within an oversight office that helps assess whether VA is in compliance with aspects of its Veterans First policy. We designated improving and modernizing federal disability programs as high risk in 2003. An estimated one in six working-age Americans reported a disability in 2010. Many of these Americans need help finding or retaining employment, or rely on cash benefits if they cannot work. Three of the largest federal disability programs—one run by VA— disbursed about $270 billion in cash benefits to 21 million people with disabilities in fiscal year 2017. However, federal disability programs, including VA’s, struggle to meet their needs. In particular, VA struggles to manage its disability claims workloads, and, when determining whether individuals qualify for disability benefits, VA relies on outdated eligibility criteria. Managing disability claims workloads. Since our 2017 High-Risk Report, our assessment of ratings for all five criteria remains unchanged for this area of concern for VA as of March 2019. Leadership commitment: met. VA has maintained leadership focus on managing initial disability claims and appeals workloads through various initiatives to improve benefits processing and reduce backlogs. Enhancing and modernizing VA’s disability claims and appeals processes are goals in its 2018–2024 strategic plan. Capacity: partially met. VA has continued building the capacity to process initial disability claims, such as using an electronic system to distribute claims ready for decisions to available staff. On appeals, VA is reforming its process, onboarding hundreds of new staff, and implementing new technology. However, as we reported in March 2018, VA’s appeals plan does not provide reasonable assurance that it will have the capacity to implement the new process and manage risks. VA agreed with our recommendation to better assess risks associated with appeals reform and took some steps to address risks, such as limited testing of the new process. However, as of April 2019 VA has not fully addressed this recommendation. For example, VA has not developed plans to fully address risks, such as veterans choosing more resource-intensive options at higher rates than expected. Action plan: partially met. VA continues to implement plans to reduce the initial disability claims backlog. For appeals reform, VA submitted its appeals plan in November 2017 and provided several progress reports throughout 2018. In March 2018, we reported that VA’s plan for implementing a new disability appeals process did not explain how VA would assess the new process compared to the legacy process, and did not fully address risks associated with implementing a new process. We made two recommendations to improve VA’s disability benefit appeals process, including that VA (1) clearly articulate in its appeals plan how it will monitor and assess the new appeals process compared to the legacy process, and (2) ensure that its appeals plan more fully addresses related risks, given the uncertainties associated with implementing a new process. As of April 2019, VA has taken actions to address our recommendations, although key steps remain. For example, VA has not fully articulated detailed steps and time frames for assessing the relative performance of the new and legacy appeals processes. Without this assessment, VA cannot determine the extent to which the new process will achieve final resolution of veterans’ appeals sooner than the legacy process. Monitoring: partially met. VA monitors the timeliness of initial disability claims and legacy appeals, and has set timeliness goals for some, but not all, of the appeal options under the new process. VA’s plans also signal how it intends to monitor the allocation of staff for concurrent workloads in its legacy and new appeals processes. However, as of April 2019, VA has yet to specify a complete set of balanced goals for monitoring the new and legacy appeals processes (including timely and accurate processing of appeals while ensuring veteran satisfaction). Demonstrated progress: partially met. VA reported it reduced the backlog of initial disability claims from 611,000 in March 2013 to about 81,000 at the end of fiscal year 2018. However, VA’s Inspector General reported in September 2018 that VA overstated its performance by only reporting about 79 percent of the backlog. For appeals, VA addressed some gaps in its plan for implementing appeals reform, in accordance with our 2017 and 2018 recommendations, and has prioritized processing of legacy appeals. However, as of September 2018, VA still had a backlog of about 396,000 legacy appeals. Updating disability benefit eligibility criteria. Since our 2017 High-Risk Report, VA’s ratings for the action plan and monitoring criteria regressed while the other three remain unchanged as of March 2019. Leadership commitment: met. VA has sustained leadership focus on updating its Veterans Affairs Schedule for Rating Disabilities (VASRD)—used to assign degree of disability and compensation levels for veterans with military service-connected injuries or conditions—to reflect advances in medicine and labor market changes. Capacity: partially met. In August 2017, VA officials told us that it had taken actions to hire more staff for the regulations updates and leverage outside researchers to evaluate veterans’ loss of earnings in the current economy. However, as of September 2018, the agency was still working to hire these staff. Moreover, VA’s current earnings loss study covers only 8 of over 900 diagnostic codes and 2 of 15 body systems. VA needs to continue its current hiring and earnings loss planning efforts to ensure it has the capacity to comprehensively update the VASRD. Action plan: partially met. In March 2019, the rating for this criterion declined to partially met. As of April 2019, VA’s efforts to update the VASRD included new plans to conduct earnings loss studies. Veterans Benefits Administration officials stated they completed a study for eight diagnostic codes under two body systems, and the agency is determining whether its current approach for evaluating earnings loss is applicable to updating other diagnostic codes. However, we lowered VA’s prior rating of met to partially met because its latest August 2018 updated plan, issued since our 2017 High-Risk Report, provided limited detail on key planned activities, potentially jeopardizing its third attempt at modernization over the past decade. For example, VA’s plans do not indicate how and when VA will assess the applicability of its current approach, and does not include plans for updating earnings loss information for the remaining diagnostic codes and body systems. Monitoring: partially met. In March 2019, the rating for this criterion declined to partially met. According to VA officials, VA continues to track its progress toward finishing the medical updates by fiscal year 2020 and has updated its project plan to reflect delayed time frames. However, we lowered VA’s prior rating for this criterion from met to partially met because VA’s plans have changed since our last update, and although it is conducting a study to update earnings loss information for some diagnostic codes and body systems, its plan does not include timetables for monitoring these or future updates to earnings loss information. Demonstrated progress: partially met. VA reported that as of December 2018, it promulgated final regulations for 6 of 15 body systems, proposed regulations for 2, and is reviewing draft regulations for the remaining 7. However, VA has fallen about 4 years behind in its efforts to fully update the VASRD and has not completed earnings loss updates. Several other government-wide high-risk areas include VA and its operations. These areas include (1) improving the management of IT acquisitions and operations, (2) strategic human capital management, (3) managing federal real property, and (3) ensuring the cybersecurity of the nation. Improving the management of IT acquisitions and operations. The executive branch has undertaken numerous initiatives to better manage the more than $90 billion that is annually invested in IT across the government. However, our work shows that federal IT investments, including those made by VA, too frequently fail or incur cost overruns and schedule slippages while contributing little to mission-related outcomes. Thus, in 2015, we added improving the management of IT acquisitions and operations to the High-Risk List. To address the portion of the high-risk area for which it is responsible, VA should, among other things, implement our past recommendations on improving IT workforce planning practices and establishing action plans to modernize or replace obsolete IT investments. In August 2018, for example, we found that VA’s policies did not fully address the role of its CIO consistent with federal laws and guidance in the areas of IT workforce, IT strategic plan, IT budgeting, and IT investment management. Until VA fully addresses the role of the CIO in all of its policies, it will be limited in addressing longstanding IT management challenges. We recommended that VA’s IT management policies address the role of the CIO for key responsibilities in the four areas we identified. VA concurred with this recommendation, which remains open. Strategic human capital management. This area was added to our High-Risk List in 2001 and continues to be at risk today because mission-critical skills gaps both within federal agencies and across the federal workforce are impeding the government from cost-effectively serving the public and achieving results. As of December 2018, VA reported an overall vacancy rate of 11 percent at VHA medical facilities, including vacancies of over 24,000 medical and dental positions and around 900 human resource positions. Also, with 32 percent of the VA workforce eligible to retire in the next 5 fiscal years, VA must address these mission-critical skill gaps and vacancies that we continue to identify in our work. In December 2016, for example, we found that VHA’s limited human resources capacity combined with weak internal control practices has undermined VHA’s human resources operations and its ability to improve delivery of health care services to veterans. Further, VHA is challenged by inefficiencies in its performance management processes, including the lack of a performance appraisal IT system, which prevents it from identifying trends and opportunities for improvement. VHA can better support medical centers by establishing clear lines of accountability for engagement efforts, collecting and leveraging leading practices, and addressing barriers to improving engagement. We made three recommendations to VA to improve its performance management system. VA partially concurred with these recommendations, which remain open. Managing federal real property. Since federal real property management was placed on the High-Risk List in 2003, the federal government has given high-level attention to this issue. However, federal agencies, including VA, continue to face long-standing challenges, including (1) effectively disposing of excess and underutilized property, (2) relying too heavily on leasing, (3) collecting reliable real property data for decision making, and (4) protecting federal facilities. In January 2019, for example, we reported that VA has enhanced its data collection on vacant properties, but the agency does not collect information needed to track and monitor disposal projects at the headquarters level. Without information on the status of disposal projects, VA cannot readily track and monitor its progress and identify areas where facilities’ managers may need additional assistance. As a result, we recommended that VA improve its procedures related to disposal of excess and underutilized property to help local facility managers plan, implement, and execute projects to dispose of those properties. In addition, VA should collect key information on the status of these disposal projects to help manage the process and identify areas where management attention is needed. VA concurred with the three recommendations we made related to these findings, all of which remain open. Ensuring the cybersecurity of the nation. We have designated information security as a government-wide high-risk area since 1997. We expanded this high-risk area in 2003 to include protection of critical cyber infrastructure and, in 2015, to include protecting the privacy of personally identifiable information. Federal agencies and our nation’s critical infrastructures are dependent on IT systems and electronic data to carry out operations and to process, maintain, and report essential information. The security of these systems and data is vital to public confidence and national security, prosperity, and well- being. Because many of these systems contain vast amounts of personally identifiable information, agencies must protect the confidentiality, integrity, and availability of this information. In addition, they must effectively respond to data breaches and security incidents when they occur. In May 2016, for example, we found that VA had developed a risk assessment for their selected high-risk systems, but had not always effectively implemented access controls. These control weaknesses included those protecting system boundaries, identifying and authenticating users, authorizing access needed to perform job duties, and auditing and monitoring system activities. Weaknesses also existed in patching known software vulnerabilities and planning for contingencies. An underlying reason for these weaknesses is that the key elements of information security programs had not been fully implemented. VA concurred with all of our five recommendations related to improving its cybersecurity controls. However, two recommendations—which specifically call for the department to conduct security control assessments and develop a continuous monitoring strategy—remain open. In November 2018, the department’s inspector general reported that VA had made progress in developing, documenting, and distributing policies and procedures to support its security program, but identified IT security as a major management challenge due to the persistence of deficiencies. For example, the inspector general identified significant deficiencies related to access, configuration management, change management, and service continuity. In addition, VA’s financial statement auditor reported deficiencies in the department’s IT security controls as a material weakness for financial reporting purposes. The auditor has reported IT security controls as a material weakness for more than 10 years. Since his confirmation in July 2018, Secretary Wilkie has demonstrated his commitment to addressing the department’s high-risk designations by, among other things, creating an office to direct an integrated approach for high-risk concerns and communicating to VA leaders the importance of addressing our recommendations. Additionally, VA leadership has also encouraged senior leaders to meet with GAO subject matter experts from acquisition, performance, human capital, and financial management, among other areas, to discuss leading practices and VA’s modernization efforts. In addition, senior leaders from GAO and VA meet regularly to identify and address the root causes of high-risk issues, and discuss the status of our recommendations and VA’s efforts to address them. Fully addressing these issues will require sustained leadership attention on these issues as well as leadership stability—something that VA has not had in recent years. In particular, in the 2 years prior to Secretary Wilkie’s confirmation, VA experienced leadership instability with senior- level vacancies in key positions, including the Under Secretary for Health, CIO, and Deputy Under Secretary for Health for Community Care. In addition to sustained leadership, VA must develop action plans for addressing the high-risk issues. As noted earlier, VA officials have stated that they are currently working to address our high-risk concerns through the implementation of the VHA Plan for Modernization. The plan, which identifies high-level implementation targets through 2020, provides a framework to address the Secretary’s four priorities: (1) improving training and customer service; (2) implementing the VA MISSION Act and improving veterans’ access to care; (3) connecting the VA’s electronic health records system to the DOD’s to ensure a continuum of care for transitioning service members; and (4) transforming VA’s business systems. As part of this effort, VA is focused on “10 lanes of effort,” including transitioning to the same electronic health record system the DOD is currently deploying, and transforming its business systems— including its human resource management, finance and acquisition management, and supply chain functions—to improve the quality and availability of services at VA medical centers. In closing, VA has launched several significant efforts to address many of the underlying management challenges it faces, including transforming its electronic health record and financial management systems, updating its medical surgical prime vendor program, and implementing the VA MISSION Act. Any one of these efforts would be a significant undertaking for an agency given their scope, time frames, and costs, and VA is attempting to concurrently implement them. If successful, these efforts could be transformative for VA. Sustained congressional oversight of VA’s efforts will also be needed. We stand ready to support this oversight through continued monitoring of VA’s efforts as it ensures that the modernization efforts integrate and address many of the concerns that led to the designation of various VA areas as high risk. Chairman Pappas, Ranking Member Bergman, and Members of the Subcommittee, this concludes my statement. I would be pleased to respond to any questions you may have. For further information about this statement, please contact Debra A. Draper at (202) 512-7114 or draperd@gao.gov or Sharon M. M. Silas at (202) 512-7114 or silass@gao.gov for VHA health care issues; Shelby S. Oakley at (202) 512-4841 or oakleys@gao.gov for VA acquisition management issues; or Elizabeth H. Curda at (202) 512-7215 or curdae@gao.gov for VA disability claims issues. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Ann Tynan, Mark Bird, David Bruno, Keith Cunningham, Cathleen Hamann, Lisa Gardner, Steven Lozano, William Reinsberg, Maria Storts, Jamie Whitcomb, Amanda Cherrin (Analyst-in-Charge), Kate Tussey, Jeff Hartnett, and Teague Lyons. Vikki Porter and Jacquelyn Hamilton also contributed to this statement. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VA is responsible for providing benefits and services to veterans, including health care, disability compensation, and various types of financial assistance. In fiscal year 2019, VA received a total budget of $201.1 billion and a discretionary budget of $86.6 billion—the largest in VA's history—to carry out its mission. GAO, along with the VA Inspector General and other entities, continues to identify significant deficiencies in VA's governance structures and operations—all of which can affect the care provided to our nation's veterans. This testimony focuses on the status of VA's efforts to address GAO's high-risk designations and open GAO recommendations in the following areas: VA health care, acquisition management, and disability claims workloads and benefit eligibility criteria, among other areas. It is primarily based on GAO's March 2019 high-risk update and a body of work that spans more than a decade. The Department of Veterans Affairs (VA) has longstanding management challenges. As a result, GAO added several VA programs to its High-Risk List. This list focuses attention on government operations that are most vulnerable to fraud, waste, abuse, or mismanagement, or in need of transformation. These include managing risks and improving VA health care, VA acquisition management, and improving and modernizing VA disability programs, including managing claims and updating eligibility criteria. VA health care was designated high risk in 2015 due to concerns about VA's ability to ensure the cost-effective and efficient use of resources to improve the timeliness, quality, and safety of health care for veterans. GAO identified five areas of concern: (1) ambiguous policies and inconsistent processes; (2) inadequate oversight and accountability; (3) information technology challenges; (4) inadequate training for VA staff; and (5) unclear resource needs and allocation priorities. VA's efforts to address each of these areas have been impeded by leadership instability. However, since his July 2018 confirmation, Secretary Wilkie has demonstrated his commitment to address the department's high-risk designations. His actions to date have allowed the department to maintain its leadership commitment rating of partially met in GAO's 2019 High-Risk update. VA also partially met the action plan criteria. As of March 2019, it did not meet the other three criteria for removal from the High-Risk List (agency capacity, monitoring, and demonstrated progress). This is, in part, because GAO continues to have audit findings that illustrate that the five areas of concern have not been fully addressed. For example: In a series of reports from 2012 through 2018, GAO found VA's wait time data unreliable for primary and specialty care as well as for care in the community. GAO also found that VA did not measure the full wait times that veterans experience in obtaining care across these settings. In November 2017, GAO reported that VA medical center officials did not always conduct or document timely required reviews of providers when allegations of wrongdoing were made against them. In April 2019, GAO found that VA's governance plan for modernizing its electronic health record system was not fully defined, potentially jeopardizing its fourth attempt at modernization. In April 2019, GAO reported that VA's appraisal process for assessing medical center director performance relies heavily on a system with long-identified deficiencies that remain unaddressed, thus diminishing VA's ability to hold officials accountable. In its 2019 High-Risk Report, GAO added VA acquisition management as a high-risk area in light of the department's numerous contracting challenges and the significant federal investment in serving veterans. To date, GAO has identified challenges in the following areas: (1) outdated acquisition regulations and policies; (2) lack of an effective medical supplies procurement strategy; (3) inadequate acquisition training; (4) contracting officer workload challenges; (5) lack of reliable data systems; (6) limited contract oversight and incomplete contract documentation; and (7) leadership instability. For example, as of May 2019, VA does not have updated acquisition regulations and officials expect to have a full update by 2021; a process which has been in place since 2011. GAO designated improving and modernizing federal disability programs, including VA's program, as high risk in 2003. GAO identified two areas of concern related to VA: (1) managing disability claims workload and (2) updating disability benefit eligibility criteria. As a result of these concerns, veterans may not have their disability claims and appeals processed in a timely manner. GAO reported in March 2018 that VA is making a major effort to reform its appeals process by onboarding new staff and implementing new technology. However, its appeals planning process does not provide reasonable assurance that it will have the capacity to successfully implement the new process and manage risks. VA agreed with GAO's recommendation to better assess risks associated with appeals reform. VA leadership has committed to addressing GAO's high-risk concerns and has launched several transformational efforts. For example, VA is currently implementing the Veterans Health Administration Plan for Modernization, a framework that aims to modernize the department, as well as the VA MISSION Act of 2018. This Act requires VA to consolidate programs that allow veterans to receive care outside VA. If successful, these efforts could be transformative for VA. However, such success will only be achieved through sustained leadership attention and detailed action plans that include metrics and milestones to monitor and demonstrate VA's progress. Sustained congressional oversight will also be essential. Since 2000, GAO has made more than 1,200 recommendations to reduce VA's high-risk challenges, and VA has implemented approximately 70 percent. GAO will continue to monitor VA's progress in implementing the remaining open recommendations.", "document_type": "gao"}
{"report": "Mobile devices, such as smartphones and tablets, use wireless networks to enable voice and data communications. These wireless networks comprise several components. For example, cell sites—a base station equipped with an antenna—receive and transmit radio signals to mobile devices. In addition to traditional “macro cells,” 5G networks also use smaller wireless infrastructure, known as “small cells,” which can be installed on existing structures, including macro towers, buildings, utility poles, or streetlights. Base station controllers manage communications between the cell site and the mobile switching center, or the “core network.” The core network then directs the communication to landline phones, other cell phones, or the internet. Finally, backhaul facilities, such as fiber optic cables or microwaves, transport the communications (See fig. 1.). Cell sites use radio frequency spectrum to receive and transmit radio signals to and from mobile devices. Spectrum is a finite natural resource used to provide a variety of communication services to businesses and consumers, as well as federal, state, and local governments. Businesses and consumers use spectrum for a variety of wireless services including mobile voice and data, Wi-Fi- and Bluetooth-enabled devices, broadcast television, radio, and satellite services. Federal, state, and local governments’ uses of spectrum include national defense, law enforcement communication, air traffic control, weather services, military radar, and first responder communications. The frequency bands have different characteristics that make them more or less suitable for specific purposes. For example, different bands have different limits to the amount of information that they can carry, known as “data capacity,” and different levels of ability to effectively penetrate or bend around physical obstacles and cover distances, known as “propagation.” Regarding wireless communication: Low-band spectrum (generally defined as under 1 gigahertz (GHz)) typically has relatively low data capacity but has propagation characteristics that enable transmission over longer distances and penetration of buildings and other physical barriers better than higher bands. Mid-band spectrum (generally defined as between 1 GHz and 6 GHz) tends to provide greater data capacity than low bands and has better propagation qualities than higher bands. High-band spectrum (generally defined as those above 24 GHz) allows for high data capacity but has relatively limited propagation, to the point that bands at higher frequencies (according to FCC, those above 95 GHz) are most prone to obstruction by natural or manmade objects, such as trees or glass. In the United States, two federal agencies are primarily responsible for managing spectrum. FCC is the federal agency responsible for allocating spectrum for consumer and commercial purposes (as well as state and local government uses), assigning spectrum licenses to those entities, and making spectrum available for use by unlicensed devices. Licensing assigns frequencies of spectrum, in a specific area, and—generally speaking, according to FCC officials—to a specific entity, such as a telecommunications company. NTIA is responsible for establishing policy on regulating federal spectrum use. NTIA assigns frequencies to government agencies, maintains federal spectrum use databases for those assignments, and oversees, in cooperation with other relevant federal agencies, which spectrum bands reserved for federal government use might be made available for commercial use. Approximately every 10 years since around the early 1980s, wireless carriers have deployed a new generation of technology, and each development has changed how people and businesses use mobile communication. These technologies can bring greater speed and capabilities to mobile networks and can provide new revenue streams for carriers and economic gains for national economies. For example, a trade organization representing carriers reported that U.S. leadership in developing and deploying 4G brought in significant economic benefits, adding billions of dollars to the U.S. economy. The carriers we spoke with are currently developing and deploying 5G networks, which will allow for enhanced mobile broadband, offering greater speed and higher data capacity than previous generations of mobile wireless networks. Carriers in the United States are currently deploying 5G as “hybrid” 5G, which uses 5G technologies in combination with existing 4G networks to improve the networks’ speed by enhancing the technology that connects a user device to a core network. In the future, carriers that want to deploy “standalone” 5G will have to replace their existing 4G network infrastructure with new 5G equipment to enhance the core network. The new, standalone 5G networks will allow for additional enhanced capabilities, such as lower “latency,” and will be better able to support other advanced use cases (see fig. 2). Carriers have thus far deployed limited 5G services as hybrid 5G networks in the United States, and are taking different approaches with regard to spectrum use for 5G. For example, some carriers told us that they are relying on low-band spectrum for their 5G network. Other carriers are using high-band spectrum in limited locations. In both cases, customers need to purchase new 5G-capable smartphones to use these hybrid 5G networks. In general, telecommunications networks, including mobile networks, provide important economic and educational opportunities to communities, but different socioeconomic groups and groups in different geographic areas have historically received different levels of access to telecommunications services, leading to a disparity called the “digital divide.” A number of factors explains the digital divide. For example, as we have reported in the past, rural areas tend to have conditions—such as low population density or difficult terrain—that can increase the costs for carriers to deploy and maintain networks. Furthermore, lower-income households may have access to the necessary infrastructure for service but may not be able to afford the service. Experts we convened told us that the lack of sufficient access to mid- band spectrum is a key challenge to deploying 5G, noting that mid-band spectrum is particularly important for 5G deployment because of its network characteristics and potential to be interoperable with other 5G networks worldwide. Experts stated that the availability of mid-band spectrum to carriers in the United States is not yet sufficient to meet carriers’ needs for 5G network deployment because of existing congestion within the band. Experts stated that carriers will need a mix of low-, mid-, and high-band spectrum when deploying 5G networks because of the network characteristics unique to each spectrum band. For example, one expert noted that mid-band spectrum provides 5G network characteristics that cannot be achieved using solely low- or high-band spectrum. Signals using mid-band spectrum have better propagation (i.e., ability to effectively penetrate or bend around physical obstacles and cover distances) than signals using high-band spectrum (see fig. 3) and carry more data than low-band spectrum. Global harmonization of spectrum, or the use of the same spectrum bands among countries around the world, helps ensure that 5G devices will work across countries. Countries that harmonize spectrum for 5G may benefit by making international travel and communication more convenient. For example, consumers from countries that deploy 5G using the same spectrum bands will have the benefit of roaming across networks. Spectrum harmonization also creates economies of scale that can reduce the costs of manufacturing wireless devices and deploying network equipment. Countries, including the United States, have identified specific frequencies in mid-band spectrum that may be used for 5G. However, experts told us that, as currently allocated, mid-band spectrum is highly congested, leading to an insufficient amount available for carriers to deploy 5G networks in the United States. According to NTIA officials, current mid-band spectrum users—known as “incumbents”—include federal government users that have primary access rights to the spectrum and face challenges in readily transitioning to new or less favorable spectrum bands. For example, agencies’ existing technologies may be designed specifically for their existing spectrum bands. Additionally, according to FCC officials, it is becoming increasingly challenging to relocate federal users out of a spectrum band entirely and into a new band due to a variety of factors, including concerns about potential interference as well as greater spectrum use in recent years. According to experts, large consecutive portions of spectrum will be necessary for commercial users deploying 5G networks. Using smaller or non- consecutive portions of spectrum may limit the capability of the network. According to FCC officials, FCC has taken several actions to make additional spectrum available for carriers planning to deploy 5G networks. Some examples of FCC’s actions to make low-, mid-, and high-band spectrum available for 5G deployment include: Low-Band: FCC concluded an auction in 2017 for low-band 600 megahertz (MHz) spectrum licenses, assigning 70 MHz for licensed wireless operations. Such spectrum auctions allow FCC to use competitive bidding to choose from among two or more applications for a spectrum license. Mid-Band: FCC issued a Report and Order in July 2019 that made spectrum licenses within the 2.5 GHz band accessible to nonfederal users. High-Band: FCC held its first auctions for high-band 5G spectrum in the 24 GHz and 28 GHz bands in 2018 and 2019. FCC also began an auction of 3,400 MHz of spectrum in the upper 37, 39 and 47 GHz bands in December 2019; bidding in this auction concluded on March 5, 2020. FCC officials told us that they are aware that mid-band spectrum will be particularly important for 5G deployment despite congestion amongst federal users in this spectrum range. FCC is taking steps to make some additional mid-band spectrum available. For example, in February 2020, FCC announced that it had adopted new rules to auction 280 MHz of mid- band spectrum, which can be used for 5G purposes. This spectrum, (3.7 to 3.98 GHz) is currently being used primarily by satellite operators. In March 2020, FCC released a public notice seeking comment on procedures to be used for the auction of this spectrum, which is currently scheduled to begin on December 8, 2020. As another example, according to FCC, in April 2020 FCC provided for expanded Wi-Fi use in 1,200 MHz of spectrum in the 6 GHz band. Such advanced Wi-Fi networks, FCC told us, will be capable of working hand-in-hand with commercial networks to enable robust 5G device broadband connectivity and may be able to help alleviate commercial wireless network congestion. Other activities, according to FCC, include: (1) opening a proceeding in the 3.1 to 3.55 GHz band to consider potential shared use between federal operations and flexible use commercial services; and (2) authorizing a private entity to deploy a low-power terrestrial nationwide network in certain frequencies that will make available additional spectrum for advanced wireless services, including 5G. FCC and NTIA also developed a spectrum-sharing framework in the 3.5 GHz band that will increase the availability of this mid-band spectrum targeted globally for 5G. This framework separates users into three hierarchical “tiers,” giving differing priority access to the spectrum (3.55 GHz to 3.7 GHz, also known as the “Citizens Broadband Radio Service”) depending on the user’s tier. The first tier includes incumbents, such as federal users (e.g., U.S. Navy radar systems) and a number of commercial users. These users receive first priority and protection from all other users. Tier two users—referred to as “Priority Access Licensees”—are, according to FCC, wireless users that obtain licenses at auction or, following the auction, via secondary markets. These users, which can include wireless carriers, have access to the same mid-band spectrum when a tier one user is not using the spectrum, but FCC officials said these users will need to move to another frequency when a nearby tier one user accesses the same frequency. Third tier users access the band as available. FCC officials stated that this spectrum-sharing framework will allow for increased spectral utilization of mid-band spectrum in a band like 3.5 GHz and that individual users (e.g., the public using mobile devices) will not notice any difference in their network connection. According to FCC officials, the technology supporting this spectrum-sharing framework is now authorized for full commercial deployment. They also said that FCC certified administrators in January 2020 to coordinate this framework, which will allow for full commercial operation, and that FCC has scheduled to begin auctioning licenses for tier two users on July 23, 2020. Other federal agencies are also involved with managing spectrum in the United States. For example, NTIA, which manages federal spectrum use, is working with FCC on the technical design and implementation of the spectrum-sharing framework discussed above. NTIA is also seeking to identify additional spectrum for 5G, in conjunction with FCC. According to FCC, some of the most useful portions of mid-band spectrum are already occupied by a federal incumbent and FCC is limited in its ability to make this spectrum available for commercial use. According to NTIA officials, the agency is focused on meeting the spectrum requirements set forth in the Making Opportunities for Broadband Investment and Limiting Excessive and Needless Obstacles to Wireless Act (MOBILE NOW Act) of 2018, which requires NTIA and FCC to prepare a report by 2022 identifying potential spectrum for future use. For example, NTIA is currently studying the feasibility of spectrum sharing in the 3.45 to 3.55 GHz band. Overall, FCC’s efforts, in conjunction with NTIA, to date have primarily made more high-band spectrum available for 5G purposes. According to the Department of Commerce’s 2019 Annual Report on the Status of Spectrum Repurposing, 84 percent (4,950 MHz out of 5,863 MHz) of the spectrum made available by FCC and NTIA has been within high-band. According to the report, 12 percent (709 MHz of 5,863 MHz) of the spectrum FCC and NTIA have made available has been within mid-band. NTIA officials said there has been more of a focus on repurposing high- band spectrum because there is a far greater amount of this spectrum available for use and fewer incumbent users within this spectrum. Further, NTIA officials stated that these amounts are a snapshot as of the time the 2019 report was issued and the ratios will change, as additional spectrum is made available. Other recent FCC actions, including those described above, may make more mid-band spectrum available in the future. For example, FCC told us that it has a number of active proceedings that could make additional mid-band spectrum available to commercial users. To guide its 5G-related efforts, including spectrum management, FCC has developed its Facilitate America’s Superiority in 5G Technology Plan (5G FAST Plan). This Plan includes three “key components: (1) pushing more spectrum into the marketplace; (2) updating infrastructure policy; and (3) modernizing outdated regulations.” According to FCC officials, the 5G FAST Plan represents FCC’s strategy for supporting 5G, and these key components are FCC’s broad strategic goals for 5G. However, FCC has not laid out in the 5G FAST Plan how it will implement and assess progress toward the three key components. Our past work on strategic planning has identified related leading practices. These include identifying: (1) specific and measurable performance goals to show progress toward broad strategic goals; (2) the activities (also known as strategies) the agency will take to make progress toward its goals; and (3) related performance measures to assess actual progress made toward the performance goals. Although FCC’s 5G FAST Plan notes actions or strategies FCC has taken regarding managing spectrum for 5G, it does not clearly identify specific and measurable performance goals and related measures for spectrum management related to 5G deployment. For example, the plan notes that FCC’s actions on the 2.5 GHz, 3.5 GHz, and 3.7 - 4.2 GHz bands could make up to 844 MHz available for 5G, but these strategies are not related to any identified performance goals or measures. Without such strategic planning efforts, it is unclear if these actions will be sufficient to address the challenges experts raised about the lack of mid-band spectrum for 5G. Additionally, establishing performance goals and measures would allow FCC to assess its spectrum management strategies and track the progress it is making toward its goals. Further, according to FCC officials, the priorities noted in the 5G FAST Plan were not developed with outside entities, such as NTIA or other relevant stakeholders, including carriers. Leading practices, as identified in our previous work, show that successful organizations base their strategic planning, to a large extent, on the interests and expectations of their stakeholders, which could include other federal agencies, Congress, and others. Thus, involving stakeholders in the strategic planning process helps ensure that the agency’s efforts are targeted at the highest priorities. According to FCC officials, it can be difficult to set goals for specific amounts of spectrum to be made available because of, in part, the fast- changing nature of the telecommunications industry. While we recognize that setting such goals, measures, or strategies may be difficult, our past work on strategic planning has found that there is no more important element in results-oriented management than an agency’s strategic planning effort. This effort is the starting point and foundation for defining what the agency seeks to accomplish, identifying the strategies it will use to achieve desired results and then determining how well it succeeds in reaching results-oriented goals and achieving objectives. Proactively developing performance goals, strategies and measures— with the involvement of relevant stakeholders—to manage spectrum demands associated with 5G deployment would help ensure that sufficient amounts of spectrum in consecutive portions are made available to avoid delaying the deployment and limiting the capabilities of 5G networks. Additionally, by incorporating these key elements into its strategic planning for 5G, FCC would be able to assess its progress in managing spectrum, particularly the congested mid-band spectrum that is important to 5G deployment. Experts we convened told us that 5G deployment, especially high-band 5G networks, will likely widen the existing digital divide, particularly between urban and rural areas, as well as within urban areas. Experts and stakeholders told us that 5G using high-band spectrum is likely to be first deployed in areas already equipped with much of the necessary infrastructure (i.e., fiber and power). Experts said these areas are generally more urban, densely populated, high-income areas as opposed to rural or low-income areas. Stakeholders told us that rural areas will see 5G deployed mostly on lower frequencies, on which signals can propagate further but which cannot carry the same bandwidth (i.e., data throughput) as higher frequencies can. Within urban settings, experts said that high-band 5G networks are more likely to be deployed in commercially viable areas, including those parts of a city that already are equipped with fiber and power and, presumably, already benefit from the most advanced mobile broadband services available. For example, an expert representing the wireless industry stated that only about 10 percent of the District of Columbia would receive 5G services using high- band spectrum, as it would be cost-prohibitive for the carriers to install 5G using this spectrum beyond that 10 percent of the city. Experts told us that individuals without access to 5G networks will not be able to take advantage of the use cases that 5G promises, including the high-speed connections offered by enhanced mobile broadband. Experts stated that this situation will greatly affect, among other things, the economic and educational opportunities that 5G promises to make possible. We have previously reported on the digital divide, or the varying levels of access to technologies such as internet and wireless services among different socioeconomic groups, as well as groups in different geographic areas. For example, as we have reported in the past, rural areas tend to have conditions—such as low population density or difficult terrain—that can increase the costs for carriers to deploy and maintain networks in those areas. Furthermore, lower-income households may be located in areas with access to the necessary infrastructure for certain services but may not be able to afford them. The challenge for some households to afford the most advanced mobile communications services would become worse if carriers charge more for 5G services. An Expert’s Perspective on the Digital Divide “Employers who want to ensure that their workforce has access to 5G, or their factory floor has access to 5G, won't locate in communities that don't have those services, thereby exacerbating the existing digital divide.” FCC has taken steps to address digital divide issues, with some of these efforts potentially affecting the digital divide as it relates to 5G deployment. For example, according to FCC officials, FCC issued a recent order approving a merger between two mobile carriers that included certain service requirements to increase 5G access nationwide. FCC told us that the merged company will face significant financial penalties if it fails to meet these requirements. Additionally, FCC has established financial support that may be used for 5G-related efforts. The Universal Service Fund provides financial support to carriers through different programs, each targeting a particular group of telecommunications carriers or consumers. For example, one of these programs, the High Cost Program, provides support in rural or remote areas where the customer base is relatively small and the cost of installing infrastructure is high. According to FCC officials, the support provided by the Universal Service Fund can evolve over time to address emerging technologies, including 5G. For example, the officials stated that in response to recent hurricanes in the Caribbean, the Universal Service Fund is currently being used to support deployment of fiber and power in parts of Puerto Rico and the U.S. Virgin Islands, which will help support future deployment of 5G in those areas. Further, in December 2019, the FCC Chairman announced his intention to establish the “5G Fund,” which would make up to $9 billion in Universal Service Fund support available to carriers to deploy 5G services in rural areas of the United States. In April 2020, FCC issued a Notice of Proposed Rulemaking and Order seeking comments on the framework for the 5G Fund and on approaches to identifying eligible areas for support. Although FCC’s actions could help address the digital divide, its existing planning documents for 5G do not include key elements that would allow FCC to understand the effects of these efforts as they relate to 5G deployment. Neither FCC’s strategic plan for 2018 through 2022 nor its 5G FAST Plan include specific performance goals—or related strategies and measures—that would allow FCC to assess the effectiveness of its efforts to close the digital divide associated with 5G deployment. For example, FCC’s strategic plan for 2018 through 2022 includes a strategic goal and performance goals to close the digital divide, but the performance goals are not specific or measurable. Further, neither the strategic plan nor the 5G FAST Plan include specific performance measures regarding the effects of 5G on the digital divide. Moreover, while FCC’s strategic plan states that a strategy to help close the digital divide is that it will set rules to encourage and facilitate the development of 5G networks, the strategy is not associated with specific performance goals or measures regarding the effects of 5G on the digital divide. Additionally, the 5G FAST Plan identifies a number of current and future strategies for FCC but does not include specific performance goals or measures that would allow it to understand what those strategies are intended to achieve and the effects those strategies are having on the digital divide as 5G networks are deployed. These omissions are contrary to leading practices of results-oriented organizations identified in previous GAO work. These leading practices call for performance goals and related strategies and measures, as we previously described. Such leading practices, as previously noted, include identifying: (1) specific and measurable performance goals to show progress toward broad strategic goals; (2) the activities (also known as strategies) the agency will take to make progress toward its goals; and (3) related performance measures to assess the results of the strategies and actual progress made toward the performance goals. FCC officials said that they are focusing on reducing the digital divide and have set high-level goals, but have not established goals specific to 5G. However, by establishing specific and measurable performance goals for 5G with related strategies and measures, FCC will have greater assurance that it has properly planned actions to effectively address the likely adverse effects on the digital divide as 5G networks are deployed. For example, specific goals for 5G will help FCC assess the effectiveness of its recent decision to make $9 billion in Universal Service Fund support available to carriers to deploy 5G services. Experts told us that deploying 5G infrastructure will be very costly for carriers. According to international standards established for 5G networks, to support all the new capabilities of 5G, carriers will need to replace their 4G core networks with new 5G equipment. These standalone 5G networks will provide new capabilities such as ultra- reliable low latency communications that could enable the development of new, more advanced use cases. In the meantime, carriers are currently deploying hybrid 5G, which uses existing 4G network infrastructure, but they still must make some upgrades to their 4G equipment and in some instances, deploy additional cell sites, such as small cells, to provide hybrid 5G service. These small cells can be installed on existing structures, such as buildings or streetlights. See figure 4 for examples of small cells. Some carriers are deploying 5G using low-band spectrum, which is much less costly to deploy because carriers can use their existing 4G cell towers. However, low-band spectrum does not enable the same data speeds as other types of 5G. As discussed previously, the United States has made a large amount of high-band spectrum available for 5G. The use of such spectrum increases the cost of 5G infrastructure deployment because it requires more small cell installations. Experts suggested that, because of the increased costs, carriers may limit deployment of high- band 5G network equipment to high-density areas such as sections of cities or stadiums. Moreover, a recent Defense Innovation Board report referenced a preliminary study that indicated that carriers would have to install approximately 13 million base stations, at a cost of approximately $400 billion, to deliver 5G service using this high-band spectrum to 72 percent of the population. In addition to installing the actual cell site equipment, each small cell site has costs associated with it: Fiber: Experts told us that fiber deployment is critical to the success of 5G. They noted that getting enough fiber in place to support the large increase in small cells will require a massive infrastructure deployment. For example, experts stated that currently there is not enough fiber in the ground in most places to support 5G. The fiber network must also have the capacity to handle the increased traffic from 5G. Experts told us that the new fiber needed for 5G will be costly to install, both in urban and rural areas. For example, installing fiber in urban areas can be costly due to local rules and difficulty accessing the right-of-way. In rural areas, fiber deployment costs are high because carriers must install fiber over longer distances to reach customers. Power: In addition to fiber, new cell sites also require a power source. While some small cells are being installed on light poles that have an existing power source, an expert noted that sometimes these are only powered on at night. Another expert noted that carriers may need to install back-up power sources, in case of a power outage. Permitting: When installing a new cell site, carriers generally must seek approval from the federal, state, or local government that controls the right-of-way or property where the cell site is to be located. This may require carriers to pay permitting fees or meet certain aesthetic requirements. Experts told us that the fact that different cities have different permitting regimes drives up the cost to build infrastructure. For example, experts told us that making sure small cells meet different localities’ requirements for design, dimension, and other aesthetic requirements is difficult for carriers and could slow deployment. However, other experts noted that these local permitting processes enable local governments to ensure 5G is being deployed in such a way that would benefit their citizens. For example, according to a report by the National League of Cities, San Jose, California created a tiered pricing structure to encourage carriers to cover more of the city. The city plans to use some of the revenues from this permitting process to help close the digital divide in the city, for example by allowing people to check out devices at libraries. Experts’ Perspectives on Permitting Costs “There are several thousand municipalities in the United States, each of which has different paperwork, processes, and payment mechanisms for siting small cells, which increases 5G deployment cost and time and inhibits the rollout of the networks.” “5G deployment requires many more small cells than 4G required macro cells, thereby increasing the reliance on public right-of-ways. As a result, we have seen cities restricted from charging market rates for permitting. However, cities play a really crucial role in ensuring that the deployment of these technologies and the use of public right-of-ways is coupled with public interest obligations.” Carriers’ current financial condition will also affect how they deploy 5G, including where and what type of networks they deploy. Experts noted that carriers in the United States may not currently have the capital required to fund large-scale deployments of 5G due, in part, to the costs of recent business decisions. Additionally, an expert mentioned that carriers would likely only be able to afford to deploy high-band spectrum in small sections of cities. Another expert predicted that carriers may not replace existing 4G equipment until it becomes less reliable over time, leading to a more comprehensive roll-out of 5G in 6 to 8 years. A representative from a carrier said that while it did not anticipate any additional revenue from 5G deployment, carriers still must deploy 5G because to not do so would place their companies at extreme risk of losing large numbers of customers, potentially eroding their revenue base. Experts’ Perspectives on Economic Challenges to 5G Deployment “Most of the major carriers in the United States aren't in great financial shape. They've leveraged up and have made acquisitions into new spaces. …The challenge for these carriers is do they have the billions of dollars required for another large-scale capital program, or do they just sort of put it out there because it’s good PR.” “Right now, from an economic standpoint, there isn't a strong case for making this enormous investment in 5G and it feels like it's more of a defensive play by carriers.” Experts also noted that consumers are not always willing to pay more for 5G service, which reduces carriers’ ability to recoup their deployment investments. For example, one expert questioned whether consumers in the United States were willing to pay anything more for 5G, and another noted that carriers are currently charging the same price for 5G and 4G service. Additionally, experts told us that there is no clear use case currently developed for 5G in the United States, besides enhanced mobile broadband. The 5G use cases often cited, such as remote surgery or autonomous vehicles, are unlikely to be developed in the near future. Without such use cases, they said, carriers lack a strong business case for deploying 5G. Other experts noted, however, that 4G use cases— such as social media or ride sharing apps—did not exist when carriers started to deploy 4G, but were developed after 4G was in place. Similarly, experts predicted that 5G use cases would be developed after 5G networks were available in the United States. To help reduce the cost of deploying 5G infrastructure, FCC has taken steps to expedite the permitting and review of small cells. For example, FCC issued a Programmatic Agreement for the Collocation of Wireless Antennas, which reduces the regulatory approval process for collocating small cells that are on existing infrastructure, such as utility poles. In addition, FCC adopted an order and declaratory ruling regarding state and local government reviews of small cell applications, which set parameters for fees and time frames for these reviews. This Order went into effect in January of 2019; however, it is currently being challenged in federal court. FCC also adopted an order that, among other things, exempted the construction of small cells from compliance with federal historic preservation and environmental review that were applied to large macro towers. A recent federal court decision, overturned the exemption and the FCC repealed the section of the order. In addition to the steps FCC has taken to limit regulatory and permitting costs, experts suggested that carriers could consider sharing their network infrastructure to reduce their capital expenditure for deploying 5G. Through infrastructure sharing agreements, two or more carriers share infrastructure such as radio antennas or fiber to deliver service to users. This sharing reduces deployment costs for carriers and allows them to deploy in areas where the costs would normally be prohibitive, such as rural areas. Such sharing agreements can increase choices for consumers, as more carriers can afford to operate in areas they would not normally be able to. FCC officials said that industry is already moving toward greater shared infrastructure and FCC’s efforts are designed to promote it. However, such sharing agreements may have the potential to decrease competition, if not well monitored. In addition, a carrier may not be willing to share infrastructure with other carriers for fear of losing its competitive advantage. For example, according to a report by the Body of European Regulators, a carrier that is the only one offering service in a certain area could lose competitive advantage and not be rewarded for its investments in the area under a sharing agreement. Infrastructure sharing is common in other countries; the same report by the Body of European Regulators found that carriers in 14 European countries had active sharing agreements with joint deployment in place. For example, in Spain, some carriers share their mobile networks in areas with fewer than 175,000 inhabitants. According to the report, 5G will further incentivize network sharing, as carriers need to deploy more small cells and fiber. Experts told us, however, that such sharing agreements were uncommon in the United States. Instead, carriers typically install their own network infrastructure, leading to overlapping networks and higher overall deployment costs. FCC officials said they recognize the benefits of infrastructure sharing, especially for 5G, but said that the decision about whether to share infrastructure is ultimately up to each carrier. Officials noted that carriers will use their own economic and engineering analysis in determining how to deploy 5G. 5G networks could create significant economic benefits for the United States, as companies develop products and technologies to access 5G’s new capabilities. Carriers currently face challenges to deploying 5G, however, which could delay or even limit the United States’ opportunity to realize those benefits. FCC has taken a number of actions regarding 5G deployment, but it has not clearly developed specific and measurable performance goals and related measures–with the involvement of relevant stakeholders, including NTIA–to manage the spectrum demands associated with 5G deployment. This makes FCC unable to demonstrate whether the progress being made in freeing up spectrum is achieving any specific goals, particularly as it relates to congested mid-band spectrum. Additionally, without having established specific and measurable performance goals with related strategies and measures for mitigating 5G’s potential effects on the digital divide, FCC will not be able to assess the extent to which its actions are addressing the digital divide or what actions would best help all Americans obtain access to wireless networks. We are making the following two recommendations to FCC: The Chairman of FCC should develop, in coordination with NTIA and other relevant stakeholders, specific and measurable performance goals—with related strategies and measures—to manage spectrum demands associated with 5G deployment. (Recommendation 1) The Chairman of FCC should develop specific and measurable performance goals—with related strategies and measures—to determine the effects 5G deployment and any mitigating actions may have on the digital divide. (Recommendation 2) We provided a draft of this report to FCC and NTIA for review and comment. FCC provided written comments, which we have reprinted in appendix II. FCC and NTIA also provided technical comments, which we incorporated as appropriate throughout our report. In its written comments, FCC neither agreed nor disagreed with our recommendations. FCC described the challenges associated with developing performance goals for managing the spectrum demands associated with 5G deployment. Specifically, FCC stated that such goals could limit the options available to manage spectrum demands. Instead, FCC stated that it adopts specific and measurable performance goals— with related strategies and measures—during ongoing rulemakings, which allow FCC to establish engineering, economic, or other technical outcomes. We acknowledge in our report that setting specific and measurable performance goals, strategies, and measures can be challenging, but continue to believe such strategic planning would benefit FCC’s spectrum management efforts. We did not identify what specific and measurable performance goals, strategies, and measures FCC should develop because FCC is in the best position to make such determinations. However, as we describe in our report, FCC still has not engaged in this strategic planning effort. Our past work has found that there is no more important element in results-oriented management than an agency’s strategic planning effort. That effort should be the starting point and foundation for FCC to define what it seeks to accomplish, identify the strategies it will use to achieve desired results, and then determine how well it succeeds in reaching results-oriented goals and achieving objectives. Related to our recommendation for FCC to develop specific and measurable performance goals to determine the effects 5G deployment and any mitigating actions may have on the digital divide, FCC noted that it is taking regulatory actions and providing funds designed to reduce the digital divide. FCC further said that it remains committed to promoting robust 5G deployment nationwide and, consistent with our recommendation, will continue to explore new ways to evaluate how it may impact efforts to close the digital divide. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 15 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Chairman of the FCC, the Secretary of the Department of Commerce, and other interested parties. In addition, the report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or Vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report examines the challenges, and the federal government’s efforts, related to 5G deployment with regard to: (1) managing spectrum; (2) closing the digital divide; and (3) addressing economic issues. These were the top three challenges to 5G deployment identified by the 17 experts we convened. To identify challenges to 5G deployment, we issued a brief questionnaire to 146 GAO-identified stakeholders with knowledge of 5G networks. These stakeholders included officials from the federal government, as well as representatives from academia, industry, and consumer groups. Stakeholders were identified by reviewing previous GAO reports and through background research and were selected to provide a range of perspectives on 5G deployment. We asked these stakeholders to identify challenges to deploying 5G networks in the U.S. and received 23 responses. We conducted a content analysis to categorize the responses into a final set of 13 challenges. See table 1 for a list of the challenges. Because content analysis relies on the judgment of coders to determine whether qualitative data reflects particular categories, we took several steps to ensure that this judgment remained objective, accurate, and consistent. These steps included using independent coders from two different mission teams within GAO to ensure consistent judgment of categories. The independent coders were in general agreement on the challenges categories. On the basis of this high level of agreement between coders, as well as a review by a third independent analyst, we are confident that our content analysis represents an objective, accurate, and consistent assignment of these coding categories. We then convened a meeting of 17 experts to discuss the above challenges to 5G deployment. Our meeting of experts was held at the National Academies of Sciences, Engineering, and Medicine (NASEM) in October 2019 over one-and-a-half days. Staff from NASEM assisted us in identifying experts for the meeting. To identify the experts appropriate for this meeting, NASEM relied on staff experience and professional judgment drawn from its Computer Science and Telecommunications Board. We selected the final panel of experts in consultation with NASEM staff with the goal of ensuring that a broad range of views was represented from multiple 5G-related areas, such as those of wireless carriers, academia, and consumer and industry groups. See table 2 for a list of the experts that participated in the meeting. The meeting was moderated by GAO staff who guided the experts through questions about each challenge to 5G deployment. The experts also discussed potential actions the federal government could take to address those challenges and were asked to identify the most significant challenges to 5G deployment. This meeting of experts was planned and convened with the assistance of NASEM to better ensure that a breadth of expertise was brought to bear in its preparation; however, all final decisions regarding meeting substance and expert participation are the responsibility of GAO. Any conclusions and recommendations in GAO reports are solely those of the GAO. The meeting was recorded and transcribed to ensure that we accurately captured the experts’ statements, and we reviewed and analyzed the transcripts as a source of evidence. We edited experts’ quotations from the transcripts for clarity and conciseness to include in this report. In addition to the experts we spoke to on the panel, we also interviewed 16 stakeholders—as well as officials from the Federal Communications Commission (FCC), the National Telecommunications and Information Administration (NTIA), and the National Institute of Standards and Technology—to further understand the challenges to 5G deployment. We selected these stakeholders based on our prior telecommunications work, other 5G literature, and recommendations from stakeholders we interviewed to provide a range of perspectives on 5G deployment. Stakeholders were from two universities, four industry associations, five wireless carriers, as well as five local governments and organizations. To identify these local governments, we selected a group of cities to include those where wireless carriers have announced they will launch 5G services, and selected a mix of cities where there was local opposition to 5G, as well as cities with state or local laws regarding small cell permitting. We then selected lower-population density cities in the same states as those cities, using U.S. Census data. To select these cities, we identified the county with the median population density of the state, and then selected the city which holds the county seat. We attempted to contact all the selected cities and were able to schedule and hold interviews with representatives from Los Angeles, California; Jacksonville, Florida; Greenville, Illinois; and Naples, Florida. The information we obtained from these interviews is not meant to be generalizable to other cities’ experiences, but is meant to provide illustrative examples of actual 5G deployment. See table 3 for a complete list of stakeholders we interviewed. Finally, to assess the federal government’s actions to address challenges to 5G deployment, we reviewed relevant statutes and literature, along with reports and documents from FCC and the Department of Commerce. For example, we reviewed FCC reports and orders related to 5G networks, the Department of Commerce’s Spectrum Repurposing Report, along with planning reports such as FCC’s Facilitate America’s Superiority in 5G Technology Plan (5G FAST Plan) and FCC’s and the Department of Commerce’s strategic plans. In addition, we interviewed FCC and NTIA officials about their efforts to address 5G deployment challenges. We compared FCC efforts to address 5G deployment challenges to its own strategic goals and relevant leading practices for performance management identified in our prior body of work. We conducted this performance audit from February 2019 to June 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Andrew Von Ah, (202) 512-2834 or vonaha@gao.gov. In addition to the contact named above, Keith Cunningham (Assistant Director); Daniel Paepke (Analyst in Charge); Oluwaseun Ajayi; Carol Bray; Vijay D’Souza; Wayne Emilien; Jonathan Felbinger; Richard Hung; Catrin Jones; Michael Krafve; Kaelin Kuhn; Hannah Laufe; Dan Luo; Neelaxi Lakhmani; Brian Mazanec; Jamilah Moon; Cheryl Peterson; Erika Prochaska; Malika Rice; Oliver Richard; Pamela Snedden; Andrew Stavisky; Hai Tran; Christopher Turner; Tatyana Walker; and Michelle Weathers made key contributions to this report.", "summary": "As the latest generation of mobile communications, 5G networks are expected to provide faster connections to support consumer, industry, and public sector services. While private sector carriers deploy 5G networks, FCC has a role in managing deployment challenges, such as how to allocate low-, mid-, and high-band spectrum for 5G use. GAO was asked to review 5G deployment challenges. This report examines challenges and the federal government's efforts related to 5G deployment with regard to managing spectrum for 5G and closing the digital divide, among other things. GAO, with assistance from the National Academies of Sciences, Engineering, and Medicine, convened a meeting of 17 experts from academia, industry, and consumer groups; reviewed relevant statutes, literature, and FCC documentation; and interviewed FCC and other relevant federal officials, along with stakeholders that include various localities, wireless carriers, and industry associations. Approximately every 10 years since the early 1980s, wireless carriers have deployed a new generation of wireless communication technology. This decade is no different, as carriers are now developing and deploying 5G networks, which offer greater speed and higher data capacity than previous generations of mobile wireless networks. Carriers in the United States are currently deploying “hybrid” 5G, which uses 5G technologies in combination with existing 4G networks to improve the networks' speed. In the future, carriers may deploy “standalone” 5G, which relies exclusively on 5G equipment to allow for additional enhanced capabilities (see fig. 1). Radio frequency spectrum is a finite natural resource used to provide a variety of communication services to businesses and consumers, as well as to federal, state, and local governments. The frequency bands—often referred to as low-band, mid-band, and high-band spectrum—have different characteristics that make them more or less suitable for specific purposes. Experts GAO convened said that mid-band spectrum is highly congested, leading to an insufficient amount available for carriers to deploy their 5G networks in the United States. The experts stated that to avoid delays in 5G deployment, the commercial sector needs access to more mid-band spectrum. These experts highlighted the need for mid-band spectrum for 5G due to mid-band's use internationally and because of its properties. Mid-band spectrum allows for higher data capacity than lower bands and can penetrate physical obstacles over long distances—a property known as “propagation”— better than higher bands (see fig. 2). The Federal Communications Commission (FCC) has some efforts under way to make additional mid-band spectrum available but so far has primarily made high-band spectrum available for 5G because it is more readily available. Making more mid-band spectrum available to the commercial sector will be challenging, as current mid-band spectrum users include federal government users that may not be able to readily transition to new or less favorable spectrum bands. FCC's planning document for 5G includes a section on making additional spectrum available but does not clearly identify specific and measurable performance goals or measures to manage the spectrum demands for 5G. Without such strategic planning efforts, FCC will be unable to determine the effectiveness of its spectrum management efforts, particularly related to the congested mid-band spectrum that is critical to 5G deployment. The experts GAO convened also stated that 5G deployment would likely exacerbate disparities in access to telecommunications services, known as the “digital divide.” Specifically, experts as well as stakeholders GAO interviewed said that 5G using high-band spectrum—which allows for high data capacity—is likely to be first deployed in areas already equipped with much of the necessary infrastructure. Experts said the areas with existing infrastructure are generally urban, densely populated, high-income areas as opposed to rural or low-income areas. Further, within urban settings, experts said that high-band 5G networks are more likely to be deployed in commercially viable areas, including those parts of a city that already are equipped with fiber and power and, presumably, already benefit from the most advanced mobile broadband services available. FCC has taken steps to address the digital divide, including a recent announcement to make up to $9 billion in funding available to carriers to deploy 5G in rural areas of the United States. However, FCC has not developed specific and measurable performance goals with related strategies and measures to assess how well its actions are mitigating the added effects 5G deployment will have on the digital divide. FCC should develop specific and measurable performance goals with related strategies and measures to: (1) manage spectrum demands for 5G and (2) determine the effects 5G deployment and any mitigating actions may have on the digital divide. FCC indicated that setting spectrum goals could unnecessarily limit its options but did not agree or disagree with GAO's recommendations. GAO continues to believe that well-considered strategic planning would benefit FCC's efforts.", "document_type": "gao"}
{"report": "From 1944 through 1988, the production of plutonium at Hanford generated about 525 million gallons of radioactive and hazardous waste. Some of the waste was dumped directly into the soil, some was encased in drums or other containers and buried, and about 54 million gallons were stored on-site in 177 underground tanks. Some of the waste stored in the underground tanks is “high-level waste” (HLW) mixed with hazardous chemicals that is to be vitrified—a process in which the waste is immobilized in glass—prior to disposal. “Low-activity waste” (LAW) is EM’s term for the portion of the tank waste with low levels of radioactivity. EM estimates that LAW comprises more than 90 percent of the volume in the tanks but contains less than 10 percent of the radioactivity. EM currently plans to treat much of Hanford’s tank waste in the WTP. The WTP is the most technically complex and largest construction project within EM. As figure 2 shows, the WTP consists of facilities that are designed to separate waste into low-activity and high-level waste streams. Once completed, the WTP is to treat the HLW and a portion of the LAW in separate facilities using vitrification. The WTP consists of the following facilities: Pretreatment Facility. This facility is to receive the waste from the tanks and separate it into HLW and LAW. Under the original WTP design, all waste must first pass through this facility before it can be treated. Tank waste to be sent to the pretreatment facility for processing must meet specific physical and chemical characteristics, known as waste acceptance criteria, and the waste must be certified as having met these criteria before transfer from the tanks to the pretreatment facility. For example, WTP waste acceptance criteria may stipulate that waste meet certain requirements for chemical composition, particle size, and density in order to be handled by the pretreatment facility. Construction of this facility as originally designed is about 40 percent complete. LAW Vitrification Facility. This facility is designed to receive the LAW and immobilize it by vitrification. The canisters of vitrified waste will be permanently disposed of at another facility on the Hanford Site. Construction of this facility is nearing completion, and EM plans to complete commissioning of the facility no later than December 31, 2023. As currently designed, this facility would only have capacity to treat a third to half of the LAW currently in the waste tanks. EM is analyzing alternatives for treating the remaining LAW, known as supplemental LAW. HLW Vitrification Facility. This facility is designed to receive the HLW and immobilize it by vitrification. The canisters of vitrified waste will be stored on-site until a final repository is established. Construction of this facility is about 40 percent complete. Effluent Management Facility. The Effluent Management Facility is being built to evaporate much of the liquid waste produced during LAW processing and vitrification at the LAW Facility. Design work on this facility is nearly complete and construction is under way. EM plans to complete construction of this facility in December 2021. Analytical Laboratory. This facility will be used to analyze the waste at various stages of treatment, such as testing samples of the vitrified waste to ensure that it meets certain criteria and regulatory requirements for disposal. Construction of this facility is complete and EM has begun startup and commissioning activities. Balance of Facilities. These facilities consist of the 22 support facilities that make up the plant infrastructure, such as cooling water systems and silos that hold glass-forming materials. Construction of these facilities is nearing completion, and EM has begun startup and commissioning activities. The WTP has faced hundreds of technical challenges since the early years of the project. These challenges ranged from effectively mixing the waste prior to treatment to addressing potential erosion in the facility piping. We have reported on these challenges in the past and have made numerous related recommendations to EM. For example, in 2003 we found that BNI and outside experts had concerns about the technology for separating the waste—including problems associated with mixing the waste during separations and evaporating water from the waste—and they proposed more testing to resolve those challenges. We recommended that EM consider further testing to resolve those challenges before moving forward with construction of the pretreatment facility. In early 2007, EM decided to build a pilot-scale facility for the WTP to fully test pretreatment technologies before completing the full- scale design of the facility. Similarly, in 2006 we found that the WTP continued to face numerous technical challenges and that many of the technical challenges still had not been addressed even though EM was moving forward with construction on the pretreatment facility. We recommended that EM resolve the technical challenges before moving forward. EM agreed and took steps to ensure that the design of each WTP component was at least 90 percent complete before construction or installation. In December 2012, we found that the WTP continued to face significant technical challenges, even though construction was 55 percent complete, and we recommended that EM not resume construction of the pretreatment facility until the issues had been fully resolved. Because of these ongoing challenges, in December 2012, EM’s WTP Engineering Division issued a memorandum that recommended that all activities affecting design, construction, and installation of structures, systems, and components be stopped. According to the memorandum, stopping work would help ORP avoid future nuclear safety and quality compromises and substantial rework. Instead of stopping all work at the WTP, ORP management stopped work only on those facilities that faced the most significant technical challenges, namely, the pretreatment and HLW facilities. As we discuss in this report, EM has not yet resumed construction on the pretreatment and HLW facilities. In 2015, we reported that because of ongoing problems hampering the progress of the pretreatment facility at Hanford, EM was pursuing other pretreatment alternatives (such as feeding the waste from the tanks directly to the vitrification facilities) but had not properly defined the mission need for the analysis or developed a reliable life-cycle cost estimate for the alternatives being analyzed. We recommended that EM revise its analysis to consider a variety of alternatives without limiting potential solutions and that EM further limit construction activities on the pretreatment facility until aggressive risk mitigation strategies are developed and employed to address the technical challenges. EM opted to change the alternative pretreatment approach it had been pursuing and in 2018 began design work on a different alternative pretreatment approach. In April 2018, we reported that seven of nine ORP quality assurance experts expected rework would be needed for existing facilities, including the pretreatment facility. In that report we noted that according to three experts with knowledge about maintenance programs, BNI had not established a fully effective WTP quality assurance program, particularly for the pretreatment facility and HLW facility, and as a result, structures, systems, and components at these facilities have deteriorated and been damaged. We recommended that EM (1) determine the full extent to which problems exist in all WTP structures, systems, and components, (2) stop work in areas where quality assurance problems are recurring until ORP’s Quality Assurance Division can verify that the problems are corrected and will not recur, and (3) revise ORP’s organizational structure so that the quality assurance function is independent of ORP upper management. As of March 2020, EM had implemented one of our three recommendations (revising ORP’s organizational structure), but had not yet fully implemented the other recommendations. Cleanup of the Hanford Site is governed by two main documents. The 1989 Hanford Federal Facility Agreement and Consent Order—or Tri- Party Agreement (TPA)—is an agreement among DOE, Ecology, and the Environmental Protection Agency. The TPA lays out a series of legally enforceable milestones for completing major activities in Hanford’s waste treatment and cleanup process. The 2010 Consent Decree, as amended, resolves certain disputes between Ecology and DOE and addresses a subset of cleanup activities, including completing the construction and achieving initial operations of the WTP and retrieving waste from specified single-shell tanks. Among other things, the consent decree requires DOE to do the following: Begin treating LAW by 2023; Substantially complete the construction of the pretreatment facility by Start WTP operations by 2036. The TPA requires DOE to complete the treatment and vitrification of all HLW and LAW in the Hanford tanks by 2047. In addition to oversight by Ecology and the Environmental Protection Agency, DNFSB is responsible for, among other things, reviewing the design of new defense nuclear facilities at DOE’s sites, including the WTP. DNFSB, established in 1988, provides independent analysis, advice, and recommendations to the Secretary of Energy—in the Secretary’s role as operator and regulator of DOE’s defense nuclear facilities—to ensure adequate protection of public health and safety at these facilities. DNFSB is not authorized to issue regulations binding on DOE apart from establishing reporting requirements. Instead, DNFSB uses both informal interactions and formal communications with DOE to help ensure that its concerns are addressed. DOE Order 413.3B establishes program and project management requirements for the acquisition of capital assets with the purpose of delivering projects within budget, on time, and capable of meeting mission performance. EM is required to manage its cleanup projects in accordance with this order. In particular, Order 413.3B requires EM to conduct an AOA that is consistent with the 22 AOA best practices we identified. DOE also has an AOA guide, which describes suggested approaches for DOE and its contractors to be consistent with the 22 best practices for an AOA process. The 22 best practices compile common AOA policies and guidance used by different government and private- sector entities and incorporate experts’ comments. These best practices include the following: Define mission need, Develop AOA time frame, Establish AOA team, Define selection criteria, Weight selection criteria, Include baseline (or status quo) alternative, and Develop a life-cycle cost estimate for each viable alternative. From early fiscal year 2013 until the end of fiscal year 2018, EM spent about $752 million to maintain the pretreatment facility and resolve technical challenges. Over half of the $752 million went toward overhead, oversight, and other costs to maintain the partially constructed facility. The remaining costs went toward resolving technical challenges. Design and construction of the pretreatment facility is on hold, and DOE’s budget request for fiscal year 2020 states that EM plans to continue “limited activities” on the pretreatment facility to keep the facility in a preservation and maintenance mode. However, officials told us that EM does not have a cost estimate for completing the pretreatment facility, and EM has no plans to develop such an estimate in the near future. From early fiscal year 2013—when work involving design and construction of the pretreatment facility was suspended—until the end of fiscal year 2018, EM spent about $752 million on the pretreatment facility. Among other things, EM used this funding for resolution of the technical challenges that led to the suspension of the facility’s construction, overhead and project management, equipment purchase and management, facility maintenance, BNI award and contract modification fees, and EM oversight. (See fig. 3.) Less than half of the $752 million spent on the pretreatment facility in fiscal years 2013 through 2018 went toward resolving technical challenges associated with the facility. According to EVM system reports, EM spent approximately $323 million—or 43 percent of the $752 million in total costs—on costs incurred by BNI to resolve the technical challenges. This includes activities such as identifying research tasks needed to resolve the technical challenges and performing testing, as well as the cost of subcontracts to assist BNI in resolving the technical challenges. Pretreatment Facility Lifetime Overhead Costs In fiscal year 2019, Bechtel National, Inc. (BNI), the prime contractor for Hanford’s Waste Treatment and Immobilization Plant (WTP)— including the pretreatment facility—allocated $1.5 billion in overhead costs to the pretreatment facility in its Earned Value Management system (for fiscal years 2001 through 2014) that had previously been recorded in non-facility specific accounts. What we refer to as overhead BNI refers to as project services allocation or shared services, which according to officials at the Office of River Protection includes both traditional overhead costs (such as light and power), as well as the cost of common activities for multiple facilities and the management system used for those facilities. Prior to fiscal year 2015, overhead costs for the entire WTP were recorded in non-facility specific accounts. In fiscal year 2015, BNI changed the way that it accounts for these costs by allocating overhead costs to each individual facility; however, at the time, this change was only made for future overhead costs for the entire WTP. In June 2019, BNI also applied this change to pre-2015 costs, which brings BNI’s total pretreatment facility costs, from the beginning of the contract in December 2000 through July 2019, to $3.4 billion—$1.5 billion of which are overhead costs. However, this allocation of cost to each facility from the project level shared services accounts did not change the overall cost of the WTP project. because of design changes. According to ORP officials, EM did not pay a termination fee for procurements that were terminated because of the vendor going out of business; however, for other terminated procurements, EM might have to pay additional costs if the vendor submits a claim for compensation to BNI, for which BNI in turn seeks reimbursement from EM. In either case, there may be additional costs related, for example, to picking up and transporting items. Facility Maintenance. About $18.8 million—or 2 percent of the total $752 million—went towards the costs of general facility maintenance. According to ORP officials, facility maintenance includes activities such as maintaining building access controls, maintaining installed components, cleaning up waste from birds, removing snow and trash, and conducting periodic walks of the facility to determine the condition of materials in the building, among other things. Award fees are an amount of money added to a contract, which a contractor may earn in whole or in part by meeting or exceeding subjective criteria stated in an award fee plan typically related to areas within quality, technical ingenuity, cost-effective management, program management, and other unquantifiable areas. Award fees in the context of this report refer to money earned by BNI based on its performance in carrying out work on the pretreatment facility. In this report, contract modification fees refer to money negotiated between BNI and EM based on a change in the contract agreed to by both parties. $153 million—the facility’s highest costs from fiscal year 2013 through fiscal year 2018. (See fig. 4.) Contributing to the fiscal year 2017 costs was a one-time $60 million contract modification fee for both the pretreatment facility and the high-level waste facility that was negotiated between BNI and EM. According to EM officials, EM and BNI negotiated this fee for work completed by BNI in previous years for which it had not been paid a fee. This work included developing facility designs, resolving technical issues, and conducting reviews and research studies. Design and construction of the pretreatment facility have been on hold since 2012. At the time construction was halted, BNI estimated that construction of the facility was about 40 percent complete. In July 2018, the U.S. Army Corps of Engineers reported that construction of the facility was still about 40 percent complete. In a tour of the facility in May 2019, we observed that construction remains on hold and that EM is instead using the space inside the partially constructed building to conduct worker training exercises. Additionally, DOE’s budget request for fiscal year 2020 states that EM plans to continue “limited activities”—such as maintaining the existing facility, storing uninstalled equipment, and maintaining records for quality assurance—on the pretreatment facility to keep the facility in a preservation and maintenance mode. ORP officials told us in September 2019 that EM does not plan to restart design and construction activities on the pretreatment facility until alternatives for pretreating HLW have been analyzed. According to EM officials, EM does not have an updated cost estimate for completing the pretreatment facility, as required under DOE Order 413.3B. This order requires EM to develop, maintain, and document cost estimates in a manner consistent with methods and best practices identified in GAO’s Cost Estimating and Assessment Guide, as well as other documents, including the Office of Management and Budget’s Circular A-11, prior to DOE approving a performance baseline change. EM’s last independently verified approved cost estimate for completing the entire WTP was completed in 2006. At that time, EM estimated that completing the pretreatment facility would cost approximately $2.5 billion. However, the pretreatment facility has surpassed that amount. Specifically, through fiscal year 2018, EM spent about $3.8 billion on the facility, including approximately $3 billion spent prior to halting construction in 2012 and $752 million spent in fiscal years 2013 through 2018. EM was in the process of updating the cost estimate in 2012 when construction of the pretreatment facility was suspended, and therefore EM’s update to the cost estimate was suspended as well. ORP officials told us that they do not have plans to complete a cost estimate for the pretreatment facility. According to these officials, they cannot complete a cost estimate for the pretreatment facility until EM has made a decision about the future of the facility and, if necessary, BNI develops design changes to address technical challenges. The officials explained that the development of design changes depends on the prioritization of funding. They also explained that ORP’s highest funding priority is to begin vitrifying some LAW as soon as possible by bypassing the pretreatment facility using alternative technologies and sending the separated LAW directly to the WTP’s LAW vitrification facility—an approach known as Direct-Feed Low-Activity Waste (DFLAW). Officials told us that ORP’s second highest funding priority is the completion of the HLW facility and that the pretreatment facility will not be a priority until EM has made a decision on which pretreatment methods to use going forward and updated the design changes for the facility as needed. After EM halted construction on the pretreatment facility in 2012, EM began working with BNI to address the longstanding technical challenges associated with the design and construction of the pretreatment facility. According to July 2019 correspondence between EM and BNI, both parties consider these technical challenges to be resolved, and according to ORP officials, pretreatment facility engineering and design followed by its construction may now continue. However, based on our interviews with EM and BNI officials, EM has not yet designed or engineered the solutions. In addition, according to DNFSB officials, the DNFSB does not consider the technical challenges to be resolved yet, though it continues to review EM’s efforts. In late 2012, EM halted construction of the pretreatment facility, and EM and BNI began work to resolve technical issues. In November 2012, EM formed a design completion team responsible for resolving the technical challenges. In May 2014, EM asked BNI to submit a plan for resolving the challenges and resuming construction of the pretreatment facility. EM ultimately identified eight key categories of technical challenges to be resolved before resuming construction of the pretreatment facility (see table 1 for a list of the eight categories, and see app. III for a more detailed description of each category of technical challenges). The majority of these categories involved portions of the pretreatment facility intended to manage the HLW. For example, one category EM identified involves preventing hydrogen from building up in the facilities’ piping and vessels, which could cause an explosion. Another category involves preventing corrosive waste from eroding treatment equipment, which could cause a leak of radioactive materials. In June 2014, BNI formed eight teams to address each category of technical challenges. For example, to address the technical challenges associated with mixing the waste in the pretreatment facility using a technology known as pulse-jet mixing, the design completion team developed a plan to standardize and test a new design to address pulse- jet mixing challenges. Similarly, to address concerns about the potential weaknesses in equipment and piping located in rooms inaccessible to humans once operations begin (known as black cells), EM formed a black cell analysis team. BNI submitted interim updates to EM on the proposed resolution of specific challenges as BNI addressed them. For example, in December 2017, BNI informed EM of its resolution of the challenges related to facility ventilation. Similarly, in September 2018, BNI informed EM of its resolution of the challenges related to the black cells. BNI sent similar correspondence on the other six categories of technical challenges to EM throughout 2019. According to EM officials, EM and its contractors provided DNFSB documentation and briefings on the resolution of the technical challenges. In June 2019, BNI informed EM that it considered all eight categories of technical challenges to be resolved. In July 2019, EM subsequently informed BNI that it agreed with BNI’s conclusions that the technical challenges were resolved. According to ORP officials, “resolved” means that all the required studies, calculations, and testing have been completed and demonstrated to independent experts and EM that (1) the issue is fully understood so that no further research is needed and (2) a solution is ready for detailed design. Although EM and BNI consider the technical challenges associated with the pretreatment facility to be resolved, EM and BNI have not yet designed or engineered the solutions. BNI acknowledged early in the process that resolution of the technical challenges would involve not only a conceptual solution, but also subsequent design, engineering, and, in some cases, testing of the solutions before construction could resume on the pretreatment facility. For example, in its June 2014 plan for addressing the challenges, BNI noted that prior to making a decision to proceed with construction of the facility, it would need to conduct a number of additional steps, including updating the designs of the pretreatment facility and assessing the nuclear safety basis and the contract implications for the updated designs. In addition, ORP officials told us that proposed revisions to the pretreatment facility would require negotiation with Ecology. As of February 2020, EM and BNI had not yet begun developing these required designs and engineering changes and have no plans to do so until a decision is made on the future of the facility. According to EM officials, ORP’s current priorities are to begin DFLAW operations and to conduct an analysis of alternatives related to the treatment of the HLW. These next steps could involve significant work and potential rework to the facility. According to EM officials, resolving the technical challenges likely will require BNI to change its designs for the pretreatment facility and conduct significant rework in portions of the facility that have been completed. ORP officials said that they expect this design work to be significant and do not expect it to be complete enough to proceed with the construction of the facility until at least 2022, depending on the availability of funding to support the design work. BNI’s plan going forward includes a number of steps related to updating the pretreatment facility designs. As a result of this significant engineering work still ahead, as we reported in May 2015, EM likely will have to conduct rework of the existing facility (which is 40 percent built), leading to further cost increases and schedule delays. For example, BNI will need to redesign any existing components and systems that have become obsolete since EM halted construction or that need to be reworked to accommodate the technical solutions. In addition, DNFSB officials have begun reviewing EM’s proposed solutions, but they said that they do not consider the technical challenges to be resolved. Although EM does not require DNFSB approval to restart construction of the pretreatment facility, ORP officials said that they consider the next step in the process to be DNFSB review of their solutions. DNFSB officials, on the other hand, said that the process used to review issues is as follows: (1) DNFSB raises a concern; (2) EM comes up with a conceptual solution, presents it to DNFSB, and receives feedback; and (3) EM then comes up with a design solution, presents it to the DNFSB, and receives feedback. According to DNFSB officials, because they have not been able to review the updated engineering and design plans, they are not in a position to approve the proposed solution. Since 2012, DNFSB has been reviewing EM’s proposed technical solutions as part of its role to provide independent advice and recommendations to DOE regarding the protection of public health and safety at DOE facilities. As of December 2019, DNFSB had officially commented on one of EM’s proposed solutions—related to technical challenges surrounding the pulse-jet mixers—and noted simply that EM’s and BNI’s work “strengthens the technical foundation” for using the mixers and that DNFSB would “continue to follow the design process.” With regard to the remaining challenges, DNFSB officials said that for some, additional deficiencies needed to be addressed. For others, DNFSB officials said they were reviewing the details of EM’s proposed solution or needed additional information from EM. For two of the categories of technical challenges, DNFSB officials said they considered them to be operational rather than safety issues and therefore DNFSB would not review EM’s proposed solutions. (See table 2.) To begin treating LAW by 2023 as required, EM began pursuing pretreatment alternatives in 2013 and has spent about $428 million on developing these alternatives for LAW pretreatment capabilities that were originally planned for the pretreatment facility. We reported in May 2015 that in analyzing alternative LAW pretreatment approaches, EM did not meet two key steps outlined in best practices and DOE internal guidance—define mission need and develop a life-cycle cost estimate for its alternatives. We recommended that EM revise its mission need and its cost estimates for the alternatives being reviewed. In April 2019, EM began analyzing alternatives for treating HLW, and EM officials stated that this analysis of HLW treatment alternatives would follow best practices. However, as of February 2020, EM did not yet have a well- defined mission need statement for its HLW treatment AOA, nor did it have life-cycle cost estimates related to the pretreatment facility, as called for by best practices. In addition, Ecology, a key regulatory stakeholder for the Hanford cleanup, has raised concerns about the AOA as well as EM’s engagement with regulators during this process. In 2013, to meet its deadline to begin treating LAW by 2023, EM began work on a strategy to bypass the pretreatment facility and instead separate out some of the LAW to remove most of the radioactivity from the tank waste. This approach, called DFLAW, has involved several different activities since 2013 such as constructing separate facilities and infrastructure to accomplish this work, as well as modifying existing facilities: Direct-Feed Low-Activity Waste Modifications and Effluent Management Facility. EM has spent $272 million on modifications to the WTP to support the DFLAW approach, including designing and constructing the Effluent Management Facility. The Effluent Management Facility is intended to manage the high volume of contaminated liquid generated through the processing of LAW. This capability was originally designed to be located in the pretreatment facility. Low-Activity Waste Pretreatment System. In fiscal years 2014 through 2018, EM spent approximately $146 million on the Low- Activity Waste Pretreatment System. The Low-Activity Waste Pretreatment System included designing a permanent facility to receive and treat liquid waste, separating out the less radioactive portion from the underground tanks in preparation for direct feed to the WTP’s LAW facility. This function was originally intended to be accomplished by the pretreatment facility. In November 2017, ORP ordered work on this permanent facility to be suspended because, according to EM officials, the cost estimates for completing it had become too high and the urgency of meeting the pending treatment deadline too great. Tank Side Cesium Removal System (TSCR). EM spent about $6 million for work on a demonstration of the TSCR technology in fiscal year 2018 after suspending the Low-Activity Waste Pretreatment System. TSCR will be built next to an underground double-shelled waste tank and will filter waste directly from the tank to remove solids and cesium. The resulting waste will be pumped to a different underground tank for storage until it can be sent to the LAW facility for vitrification. This would enable the rest of the waste to be fed directly to the WTP’s LAW facility. ORP plans this demonstration project to be complete as early as 2021 and then, depending on the results, ORP could decide to build additional TSCR units near other tank farms to treat more of the tank waste. In addition to DFLAW, EM briefly pursued a smaller-scale pretreatment approach—known as the Test Bed Initiative—in which low-level waste was drawn directly out of the underground tanks (using existing processes and commercial facilities), grouted on site, and shipped to a disposal facility in Texas. EM spent about $4.8 million in fiscal years 2016 through 2018 to design the technology and treat 3 gallons of waste from the underground tanks. EM suspended the Test Bed Initiative in June 2019. In total, EM has spent about $428 million developing these alternative pretreatment approaches for LAW, in addition to the $752 million spent on the pretreatment facility since 2012. (See fig. 5.) EM began exploring alternative LAW pretreatment approaches as early as 2006 in connection with its analysis of options for treating the supplemental LAW at Hanford. In September 2013, in an effort to make progress while working to resolve technical challenges on the pretreatment facility, EM announced plans to pursue these alternative LAW pretreatment approaches and received funding to do so. However, as we reported in May 2015, EM did not properly define the mission need for the analysis or develop a reliable life-cycle cost estimate for the alternatives it analyzed prior to selecting its preferred alternative: First, in May 2015, we found that EM had developed a narrow statement of mission need that effectively excluded other potential alternatives from being considered. This, we noted, was contrary to DOE requirements in DOE Order 413.3B and our best practices for an AOA process, which specify that statements of mission need should not identify a particular solution such as equipment, facility, or technology, to allow the analysis the flexibility to explore a variety of alternatives without limiting potential solutions. We noted that by narrowly defining the mission need in this way, EM effectively narrowed the range of acceptable options and excluded from consideration other alternatives to expediting waste treatment and addressing the potential danger posed by the leakage of waste from the tanks. Second, we noted in May 2015 that in choosing its current approach to treating LAW, EM did not develop a life-cycle cost estimate for its Low-Activity Waste Pretreatment System approach and did not develop life-cycle cost estimates for all of the alternatives before choosing its course of action. Our AOA best practices and DOE’s AOA Guide call for developing a life-cycle cost estimate for each alternative, including all costs from inception of the project through design, development, deployment, operation, maintenance, and disposal. We recommended in our May 2015 report that EM revise its mission need statement and life-cycle cost estimate for the Low-Activity Waste Pretreatment System. EM opted to change this alternative pretreatment approach and in 2018 began designing and building TSCR, as noted above. EM did not undertake an AOA process before making that decision; instead, EM chose to pursue TSCR, a technology similar to one being used at the Savannah River Site in South Carolina. EM officials said the decision to move forward on these LAW pretreatment alternatives without an AOA process was based on the urgency of the upcoming requirement to begin treating LAW by 2023. We continue to believe that as EM pursues additional treatment alternatives, EM should properly define the mission need for the analysis and develop a reliable life-cycle cost estimate for the alternatives it is analyzing. In April 2019, EM initiated an AOA for treating the HLW in the tanks at Hanford and plans to conclude the review and report its findings in September 2020. According to the review team’s September 2019 study plan, the review is to analyze 15 alternatives, including completing the pretreatment facility as planned, repurposing the pretreatment facility, and changing the current approach to pursue other pretreatment options. Some of the other options the review team plans to explore include sending HLW directly from the underground tanks to the HLW facility for treatment, building alternate HLW pretreatment facilities, and shipping the HLW to the Savannah River Site in South Carolina for treatment. (See appendix IV for a list of the alternatives being analyzed.) EM officials said that in undertaking this AOA for HLW treatment alternatives, they plan to meet best practices for an AOA process and those in DOE’s AOA Guide. They noted that, consistent with these AOA best practices, EM has developed a time frame to complete the review, established a review team, and defined and weighed selection criteria against which to compare the alternatives. However, based on our review, as of February 2020, EM had not yet met two key steps—defining mission need and developing a life-cycle cost estimate for the baseline alternative—that are among the best practices we identified for an AOA process. First, EM has not yet defined the mission need, which is the first element in a successful AOA and is called for in DOE’s guidance for conducting an AOA. One ORP official said that a succinct definition of the mission need for the AOA does not exist but is or can be deduced from the documents provided to the contractor conducting the analysis. An official from DOE’s Office of Project Management confirmed that there is no mission need statement and noted that because the WTP began prior to the DOE Order requiring a mission need statement, there is no such statement for the WTP or for the current AOA. We have previously noted that defining the mission need is the first step in the AOA process in order to ensure that the AOA process does not favor one solution over another. We have also previously noted that when a concise set of objectives is established, it can ensure that the decision-making process stays open to a range of potential options. Second, as we noted earlier in this report, EM does not have an updated cost estimate for the baseline (or status quo) alternative of completing the pretreatment facility. As such, it is uncertain if or how EM will have a life-cycle cost estimate to compare the baseline alternative to the other alternatives it is analyzing. One of the best practices for an AOA process calls for the inclusion of the cost to pursue the baseline alternative (in this case, the cost of completing the existing pretreatment facility), to provide a basis of comparison among alternatives. However, EM officials told us that they do not intend to update EM’s cost estimate for completing the existing pretreatment facility because it is not a priority for ORP; instead, ORP’s priority is beginning DFLAW operations. Without a life-cycle cost estimate for EM’s baseline alternative, decision makers will not have a complete picture of the costs and will have difficulty comparing the alternatives because comparisons may not be based on accurate information. Without a defined mission need and a complete cost estimate for the baseline alternative, EM’s AOA for HLW treatment alternatives will be missing key elements that are necessary to provide decision makers with the information needed to make the best decision going forward. EM’s analysis and the subsequent decisions that are made based on that analysis could be undermined as a result. Officials from Ecology have raised concerns about EM’s lack of progress on finishing the original pretreatment facility and EM’s shifting focus on the pretreatment mission. In a letter to EM in May 2019, Ecology’s director outlined a series of concerns related to the pretreatment mission and stated that Ecology is not “conceding to, accepting, or acquiescing in any alternative path forward that is different than what has been agreed to in the TPA and Amended Consent Decree between our two agencies.” In September 2019, ORP informed Ecology that a serious risk had arisen that DOE might be unable to meet certain Amended Consent Decree milestones related to, among other things, the construction of the pretreatment facility. In the same month, ORP agreed to participate in “holistic negotiations” to identify a new path forward for treating and disposing of Hanford’s tank waste. As part of this agreement, the parties involved—EM, Ecology, and the Environmental Protection Agency—could use the services of a mediator to assist with negotiations, which may be completed by July 31, 2020. Ecology officials also said that EM has not adequately consulted with them while making important decisions about the pretreatment mission and facility. In particular, in January 2020, Ecology officials told us that they had not been engaged early, often, or appropriately by EM regarding EM’s changing plans to pretreat the tank waste and that they were concerned about the possible negative impacts of EM diverting its resources away from completing the pretreatment facility. According to Ecology officials, they have been invited to key EM meetings but have not been properly engaged in the decision-making process. In an October 2019 presentation to panelists from the National Academies of Sciences, Engineering, and Medicine, Ecology officials noted their frustration with “too many ideas that did not work out, resulting in long delays.” In December 2019, because of concerns that EM was not providing access to all of the information needed to make timely regulatory decisions, Ecology issued a determination requiring EM to provide information as required by the TPA within 30 days. In January 2020, after EM failed to provide the information, Ecology fined EM $1 million and reiterated that without access to this crucial data, it was nearly impossible for Ecology to independently verify compliance with cleanup regulations. According to officials at EM headquarters, engagement with Ecology is a priority, and ORP officials said that since 2018, their engagement with Ecology has improved. In particular, ORP officials noted that Ecology has had representatives on a joint team tasked with exploring the options to be examined under the HLW AOA and has a representative on the AOA review team to observe the deliberations. In September 2019, we outlined a risk-informed framework for making cleanup decisions and recommended that EM incorporate this framework into its cleanup policy across the entire DOE complex. DOE agreed with this recommendation but has yet to respond with a plan to implement it. In that report, we state that the risk-informed decision-making framework can be applied to a range of cleanup decisions, from selecting a cleanup approach at a single site to prioritizing cleanup activities across sites. The risk-informed decision-making framework consists of several steps, including engaging with stakeholders such as Ecology throughout the decision-making process. In that report, we noted that the goal of engaging stakeholder groups in a risk-informed cleanup decision should be to incorporate their viewpoints and seek their acceptance of the decision-making process as transparent and legitimate, rather than to obtain their concurrence with the final decision. We also found that this can best be accomplished when EM seeks stakeholders’ input and buy-in to the process by providing meaningful opportunities for engagement early in the process, communicating throughout the process, and providing transparent, understandable information about the science and rationale behind the final decision. Doing so can help improve the likelihood that stakeholders will view the decision-making process as fair and legitimate. By following the steps outlined in our risk-informed decision-making framework as it makes decisions about the future of the Hanford pretreatment facility, EM and stakeholders would have greater assurance that EM’s decision-making process is transparent, participatory, and credible. After nearly 20 years and with over $11 billion spent since EM awarded the contract to design and build the WTP, the WTP is not complete and has faced numerous technical challenges, cost overruns, and schedule delays. According to a recent study by the U.S. Army Corps of Engineers and EM’s Hanford Lifecycle Report, the largest and most complex portion of the WTP—the pretreatment facility—is unlikely to be completed as designed and scheduled. Since the early years of the project, we have recommended that EM stop moving ahead on the pretreatment facility until it resolves the numerous technical challenges or conducts a reliable analysis of alternatives and determines a risk-informed, cost-effective path forward. However, EM has yet to fully implement these recommendations. EM officials reported that the technical challenges that have plagued the project for years have been solved, but EM has not developed the design and engineering changes needed to implement the solutions. Instead, EM is focusing on analyzing alternatives to accomplish the mission of the pretreatment facility and officials have stated that this analysis will follow best practices we have identified and DOE guidance. EM’s current AOA of HLW treatment alternatives is still under way, and officials told us that they intend to follow best practices for developing an AOA. However, as of February 2020, the AOA still lacks at least two key elements of the best practices. First, without a clear statement of mission need, it is unclear on what basis decision makers will consider and assess the alternatives being considered. Second, without an updated life-cycle cost estimate to complete the pretreatment facility, it is unclear whether the HLW pretreatment alternatives being analyzed represent a better path forward than completing the partially constructed pretreatment facility as originally planned. Without these key elements of an AOA, EM’s ultimate decision may not be the best option or be credible with stakeholders. Throughout this decision-making process, EM’s engagement with Ecology has not met the expectations of the regulator, resulting in fines and further delays as all parties participate in an ongoing, mediated negotiation on a path forward. By following the steps outlined in our risk-informed decision-making framework as it makes decisions about the future of the pretreatment facility, EM can ensure that its regulators have greater assurance that EM’s decision-making process is transparent, participatory, and credible. We are making the following two recommendations to DOE: The Secretary of Energy should direct the Assistant Secretary of Environmental Management to ensure that EM’s final AOA for HLW pretreatment at the Hanford Site includes a definition of mission need and life-cycle cost estimates for the baseline or status quo alternative, as called for in the best practices for an AOA process we have identified and DOE guidance. (Recommendation 1) The Secretary of Energy should direct the Assistant Secretary of Environmental Management to follow the steps outlined in GAO’s risk- informed decision-making framework as EM makes decisions about the future of the pretreatment mission; in particular, engaging the Washington State Department of Ecology in the AOA process, communicating with them throughout the process, and providing them with transparent information about the rationale behind the final decision. (Recommendation 2) We provided a draft of this report to the Secretary of the Department of Energy. In its written comments, reproduced in appendix VI, DOE concurred in principle with our recommendations and outlined a plan to address the recommendations by December 31, 2020. DOE also provided additional technical comments, which we have incorporated into the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to this report are listed in appendix VII. Our report examines (1) the cost of pretreatment efforts from fiscal year 2013 through fiscal year 2018 and the status of the pretreatment facility, (2) the status of the technical challenges facing the pretreatment facility, and (3) the steps the U.S. Department of Energy’s (DOE) Office of Environmental Management (EM) is taking to begin treating waste by 2023 as required and the extent to which EM has engaged with regulators. To determine the cost of the pretreatment facility, we reviewed Earned Value Management (EVM) status reports from Bechtel National, Inc. (BNI) and fiscal year totals for EM’s oversight costs and BNI’s award and contract modification fees for the pretreatment facility for fiscal years 2013 through 2018 provided by officials in EM’s Office of River Protection (ORP), which oversees the construction of the Waste Treatment and Immobilization Plant (WTP) at Hanford. BNI’s EVM status reports give actual costs for the work performed categorized by a number of different activities, such as engineering to design the pretreatment facility and the acquisition of plant equipment items to be installed in the pretreatment facility. For reporting purposes, we combined BNI accounts with similar activity descriptions and renamed them. To determine the activities included in the accounts, we reviewed both the Work Authorization Document, which describes activities covered by each account used in BNI’s EVM status reports, as well as descriptions of major accomplishments achieved each fiscal year included in the summary status report. To determine the cost of alternative pretreatment efforts, we reviewed EVM status reports for the Direct-Feed Low-Activity Waste project, the Low-Activity Waste Pretreatment System, and the Tank Side Cesium Removal project for fiscal years 2014 through 2018. Because the Test Bed Initiative project did not use an EVM system until fiscal year 2018, we reviewed invoiced costs data for that project for fiscal years 2016 through 2018. To gain context on the planned capabilities of these projects, we reviewed project presentations for pretreatment alternatives and interviewed ORP and BNI officials to learn more about the progress made in developing each project. To assess the reliability of all cost data for both the pretreatment facility and alternative pretreatment efforts, we reviewed documentation and officials’ responses related to data-gathering processes, data storage systems, and data limitations for each of the relevant sources to ORP. Based on this, we found all of the data sources to be sufficiently reliable for our reporting objectives. Finally, to determine the extent to which EM has established a cost estimate to complete the pretreatment facility that is consistent with DOE policy set out in DOE Order 413.3B, we interviewed officials about EM’s cost estimate to complete the facility. To examine the status of technical challenges facing the pretreatment facility and to gather information pertaining to obstacles and risks of project completion, we reviewed the following documents: ORP’s 2018 briefing to the Washington State Department of Ecology (Ecology) regarding the status of challenges, BNI’s 2018 briefing about the status of the pretreatment facility, The U.S. Army Corps of Engineers’ 2018 report on the status of the The Defense Nuclear Facilities Safety Board’s (DNFSB) 2017 technical report on WTP hazards. We also interviewed officials from EM, regulators at Ecology, officials from the U.S. Environmental Protection Agency, and contractor officials who are working to resolve these challenges to better understand the status of the technical challenges, as well as any concerns they might have. In addition, we interviewed officials from DNFSB—an independent agency that provides analysis, advice, and recommendations to the Secretary of Energy regarding the adequate protection of public health and safety at DOE’s defense nuclear facilities—regarding DNFSB’s assessment of the technical challenges and what additional steps, if any, DOE needs to take to resolve the challenges. To examine the steps EM is taking to begin treating waste by 2023 as required, we visited the WTP construction site at Hanford in May 2019 to observe the status of the construction of the pretreatment facility and pretreatment alternatives. We reviewed historical documentation, such as technical reports summarizing testing, and studies conducted by EM and its contractors. These reports included Washington River Protection Solutions’ 2014 low-activity waste (LAW) alternatives analyses summary and its 2011 conceptual design report, and CH2M HILL Hanford Group’s 2006 LAW First Study. We interviewed DOE officials from headquarters to discuss the status of and future plans for the WTP and DOE officials from ORP at Hanford to gather information about the project. We also interviewed ORP contractors regarding their ongoing and planned efforts related to pretreatment of the tank waste and regulator officials from Ecology to better understand their concerns and priorities. To analyze the extent to which EM is following guidance and best practices as it conducts its analysis of alternatives (AOA) of high-level waste (HLW) treatment alternatives, we first interviewed DOE officials and reviewed available documentation associated with DOE’s ongoing AOA to determine the status of the draft AOA. We then reviewed the steps EM is taking and compared them against DOE’s project management requirements (DOE Order 413.3B) and guidance (DOE Analysis of Alternatives Guide) and the best practices for an AOA process that we identified in our prior work. Because EM was conducting its own AOA concurrent with our review, we selected two key best practices in an AOA process—define mission need and develop a life-cycle cost estimate for the baseline (or status quo) alternative—because these two steps are requisite for completing the remaining steps of an AOA. These steps are also essential to ensuring that the other 20 best practices and the results of the AOA are credible and based on accurate information. We also noted best practices that EM officials noted EM has met thus far. In addition, we compared EM’s decision-making process, in particular its stakeholder engagement, against a framework for risk-informed decision- making we developed in our prior work. We developed this framework in 2019 to assist agencies in identifying and implementing the essential elements of risk-informed decision-making. To create the framework, we synthesized key concepts from relevant literature and input from experts who participated in a meeting convened by the National Academies of Sciences, Engineering, and Medicine. We conducted this performance audit from February 2019 to May 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Office of Environmental Management’s contractor for its pretreatment facility, BNI, tracks its costs in its Earned Value Management system. Costs are tracked through the use of different accounting codes that represent the costs of different types of activities. For reporting purposes, we combined BNI accounts with descriptions of similar activities and renamed them. The table below lists the labels we used, the BNI account codes included in each label, and selected examples of activities described for each accounting code. Appendix III: Technical Challenges Facing the Department of Energy’s Waste Treatment and Immobilization Plant’s (WTP) Pretreatment Facility Description Inadequate pulse jet mixing can lead to the accumulation of solids in process vessels, resulting in generation and accumulation of hydrogen and potentially leading to explosions. Settled sludge layers will rise in temperature, increasing the hydrogen generation rate. Up to 16 of the 177 underground tanks at Hanford contain large-size plutonium particles that could settle onto internal surfaces of the pulse-jet mixer vessels, which use compressed air to mix the waste. If the pulse-jet mixers could not then resuspend settled particles, an uncontrolled nuclear chain reaction known as a criticality accident could occur. In the Pretreatment facility and High-Level Waste (HLW) facility, the accumulation of hydrogen gas in piping and small vessels can occur after the loss of off-site power or after an interruption of a transfer of waste due to operator error and during normal operation in isolated pipe sections, potentially causing an explosion. Accumulating solids in pulse-jet mixing vessels could cause excessive air to be discharged in the vessels. This discharge could cause premature erosion of vessel surface bottoms, all of which are located in nonmaintanable areas called black cells. In addition, pulse-jet mixing vessels may need structural modifications to account for abnormal environmental conditions, such as seismic events. Because of uncertainties in waste feed characteristics, the vessel and piping design in the Pretreatment facility and HLW facility may require revisions to account for the amount of wear the equipment will need to withstand. Excessive wear could damage plant equipment and result in interruption of operations or leakage of material from vessels and piping. The potential incorporation of a Standards High Solids Vessel into Pretreatment requires a detailed study to determine the feasibility and optimization of this design change. An additional opportunity is created to revisit the capability to perform In service inspections in order to underpin resolution of erosion/corrosion questions. The Project has not established an in-service inspection program. Once WTP operations begin, equipment in black cells within the Pretreatment facility and HLW facility must last for the WTP’s 40-year expected design life without maintenance because significant failures of components installed in the black cells could impact the throughput and mission duration of the WTP. Potential weaknesses in equipment and piping located within black cells must be identified before WTP operations begin to ensure that timely repairs can be conducted, should failure of these components occur. Ventilation systems in the Pretreatment facility, HLW facility, and Low-Activity Waste facility must be able to contain radioactive material that could be released from primary confinement. The structural integrity of some internal vessel components in these facilities could be compromised if seismic or other events beyond the design basis occur. The ventilation system must survive a release of radioactive material without shutdown, plugging, or blowing out filters to continue to provide confinement. Appendix IV: High-Level Waste (HLW) Alternatives Being Analyzed by the Office of River Protection Description HLW is received, characterized, and pretreated in HLW Feed Preparation Facility; contaminated liquids produced in the process are concentrated in a new HLW Effluent Management. HLW is sampled, characterized, and staged in the tanks. HLW is then pretreated in HLW Feed Preparation Facility; contaminated liquids produced in the process are concentrated in HLW Effluent Management Facility. Same as previous alternative with some processes performed at a higher temperature. HLW is transferred to the pretreatment facility for preparation and staging; then leached, washed, and concentrated in the HLW Feed Preparation Facility. Contaminated liquids produced in the process are concentrated in the pretreatment facility. HLW treated using alternative technologies such as grouting or steam reforming. Would require technology development, research and development, lab testing and technology readiness assessment. HLW is immobilized within existing tanks using alternative technologies. Would require technology development, research and development, lab testing and technology readiness assessment. HLW in the tanks located furthest away from the Waste Treatment and Immobilization Plant (in the western portion of the site) is pretreated and treated in new west area HLW Feed Preparation Facility, HLW Effluent Management Facility, and HLW vitrification facilities. HLW is received, characterized, and pretreated in in HLW Feed Preparation Facility; contaminated liquids produced in the process are concentrated in new facilities. Pretreatment facility repurposed to treat low-activity waste. HLW is transferred to compliant mediums for transfer to Savannah River Site for treatment and vitrification. Fuels Material Examination Facility would be retrofitted to provide pretreatment capabilities. HLW vitrification facility is abandoned; pretreatment facility is repurposed to pretreat and vitrify HLW. HLW is pretreated and vitrified at a near-tank mobile facility or in a centrally located facility using bulk vitrification technology. Would require technology development, research and development, lab testing and technology readiness assessment. Same as the second alternative above with added filtering capability. HLW is sampled, characterized, and staged in the tanks. Contaminated liquids produced in the process are concentrated in HLW Effluent Management Facility. Same as previous alternative with added step of concentrating the HLW in the HLW Effluent Management Facility before sending it to be vitrified. The guidance below is meant as an overview of the key principles that lead to a successful AOA process and not as a “how to” guide with detailed instructions for each best practice identified. Conforming to the 22 best practices helps ensure that the preferred alternative selected is the one that best meets the agency’s mission needs. Not conforming to the best practices may lead to an unreliable AOA, and the customer will not have assurance that the preferred alternative best meets the mission needs. Table 6 shows the 22 best practices. David C. Trimble, (202) 512-3841 or trimbled@gao.gov In addition to the contact named above, Amanda K. Kolling (Assistant Director), Jeffrey T. Larson (Analyst in Charge), Mark Braza, Kelly Friedman, Richard P. Johnson, Gwen Kirby, and Alan K. Smith made key contributions to this report.", "summary": "The Hanford Site in Washington State contains large quantities of nuclear waste. EM has been building the Waste Treatment and Immobilization Plant—which consists of multiple facilities, including a key pretreatment facility—to treat a large portion of the nuclear waste at Hanford. Under way since 2000 and costing over $11 billion to date—$3.8 billion of that spent on the pretreatment facility—the plant has faced technical challenges, cost overruns, and schedule delays. In late 2012, work on the pretreatment facility stopped until technical challenges could be resolved. In 2018, the U.S. Army Corps of Engineers reported that at current annual funding levels, completing the pretreatment facility on time would not be possible. Senate Report 116-48 accompanying the National Defense Authorization Act for fiscal year 2020 included a provision for GAO to review this project. This report examines (1) the cost of pretreatment efforts from fiscal year 2013 through fiscal year 2018, (2) the status of the technical challenges facing the pretreatment facility, and (3) the steps EM is taking to start treating waste by 2023 as required, among other things. GAO toured the facility, analyzed EM documents and expenditure data, and interviewed EM officials. The Department of Energy's (DOE) Office of Environmental Management (EM) spent $752 million in fiscal years 2013 through 2018 on the pretreatment facility at the Hanford Site in Washington State. This facility was to separate nuclear waste into two streams for treatment in other site facilities. However, EM stopped design and construction of the facility in 2012 due to technical challenges. According to expenditure data, over half of the $752 million EM spent was for overhead, oversight, procurements, and facility maintenance. The rest was spent resolving the technical challenges. DOE's fiscal year 2020 budget request states that EM plans to continue “limited activities”—such as maintaining the existing facility and storing uninstalled equipment—while construction remains on hold. After working to address pretreatment facility technical challenges since 2012, EM and its contractor consider these challenges—ranging from facility ventilation concerns to preventing explosions during waste treatment—to be conceptually resolved. However, EM has not yet designed, engineered, or tested solutions to the challenges. In addition, the Defense Nuclear Facilities Safety Board—an independent agency that provides analysis, advice, and recommendations regarding safety at DOE's defense nuclear facilities—does not consider the challenges resolved pending additional information and, in some cases, additional design and engineering work by EM. To begin treating waste by 2023 as required, EM has been pursuing alternatives to the pretreatment facility. Since 2013, EM has spent over $400 million pursuing alternatives for low-activity waste pretreatment capabilities originally planned for the pretreatment facility. However, as GAO reported in May 2015, EM did not properly define a mission need statement or a life-cycle cost estimate prior to selecting its preferred alternative for treating low-activity waste, consistent with analysis of alternatives best practices and DOE policy, and GAO recommended EM revise its analysis. In April 2019, EM began an analysis of alternatives for treating high-level waste, which EM expects to be completed in September 2020. However, as of February 2020, EM had not yet defined a mission need for this new analysis of alternatives and did not have a life-cycle cost estimate for its baseline alternative. Without these, decision makers will not have the information they need to make the best decisions for pretreating high-level waste, and EM cannot assure decision makers that alternative approaches meet mission needs. GAO is making two recommendations, including that DOE ensure that its analysis of alternatives for pretreatment of high-level waste include a mission need statement and a life-cycle cost estimate for the baseline alternative. DOE concurred in principle with both recommendations.", "document_type": "gao"}
{"report": "EEOC provides leadership and guidance to federal agencies on all aspects of the federal government’s EEO program. EEOC assures federal agency and department compliance with EEOC regulations, provides technical assistance to federal agencies concerning EEO complaint adjudication, monitors and evaluates federal agencies’ affirmative employment programs, develops and distributes federal sector educational materials, conducts training for stakeholders, provides guidance and assistance to Administrative Judges who conduct hearings on EEO complaints, and adjudicates appeals from administrative decisions made by federal agencies on EEO complaints. EEOC’s MD-715 requires agencies to take appropriate steps to establish a model EEO program and to ensure that all employment decisions are free from discrimination. It also sets forth the standards by which EEOC will review the sufficiency of agency Title VII and Rehabilitation Act programs, which include periodic agency self-assessments and the removal of barriers to free and open workplace competition. Under MD-715, federal agencies, and any subordinate component that enjoys autonomy from its parent agency, are required to submit annual MD-715 EEO program status reports to EEOC. Completed MD-715 reports include: Part F: Requires designated agency officials to certify that the agency has completed an annual self-assessment (Part G) and established plans to correct any program deficiencies (Part H), as well as conducted comprehensive barrier analyses and established plans to eliminate identified barriers (Part I). Part G: Contains a self-assessment checklist for an agency to assess its compliance with essential EEO program elements to operate a model EEO program and identify any deficiencies. Part H: Describes the agency’s plans to address identified deficiencies. Part I: Shows identified EEO triggers and barriers for race, gender, and national origin; how the agency plans to address them; and who the responsible officials are. Part J: Contains the agency’s affirmative action plan for individuals with disabilities and individuals with targeted disabilities. Additionally, federal agencies are required to identify and eliminate barriers that impede free and open competition in their respective workplaces. EEOC reporting requirements state that a barrier is an agency policy, procedure, practice, or condition that limits or tends to limit employment opportunities for members of a particular gender, race, or ethnic background, or for individuals based on disability status. According to EEOC’s instructions, many employment barriers are built into the organizational and operational structures of an agency, and are embedded in the day-to-day procedures and practices of the agency. Agencies are also required to identify EEO program deficiencies and develop plans to address them. According to EEOC’s instructions, deficiencies are weaknesses in an agency’s EEO program where agency officials need to provide more attention. For example, a deficiency might be that the EEO director is not under the direct supervision of the agency head, or that an EEO Director or Officer lacks a regular, effective means of informing the agency head and other top management of the effectiveness, efficiency, and legal compliance of the agency’s EEO program. EEOC’s Office of Federal Operations instructs agencies on how to complete their MD-715 reports, provides training and technical assistance, and offers additional informal assistance, such as sharing best workplace practices. Based on agency MD-715 reports, EEOC includes assessments of agency progress in its Annual Report on the Federal Workforce, and in notice and feedback letters addressed to individual agencies. In addition, according to EEOC officials, EEOC meets with each agency every 3 years to review the status of its compliance with federal EEO laws, regulations, and management directives. If EEOC determines that areas of noncompliance exist in an agency’s program, it may take compliance actions. Compliance actions include requiring the agency to provide an update on the status of its plans to correct deficiencies in its MD-715 submission, or to submit a Compliance Report to EEOC explaining the agency’s progress in correcting deficiencies within 6 months of the date of a feedback letter. If agencies do not comply, EEOC may choose to initiate its noncompliance process, which could include conducting a program evaluation, issuing a notice to the Secretary of Homeland Security, or publicly identifying DHS as a noncompliant agency. As part of its noncompliance process, EEOC has conducted program evaluations of DHS components. In 2013, EEOC initiated a program evaluation at TSA to determine the adequacy and appropriateness of the EEO complaint framework in all offices and directorates within TSA. EEOC reported in 2014 that TSA’s EEO complaint process was adequate and complied with its regulations. However, EEOC made eight recommendations to TSA, including one that called for TSA to modify the EEO information in its training materials and presentations. In response to EEOC’s report, TSA submitted a letter to EEOC stating that it planned to address all of the EEOC recommendations and had already taken steps to implement several of them. In addition, in 2018, EEOC conducted a multiagency program evaluation that included U.S. Customs and Border Protection (CBP). It found that CBP had no women serving in positions that involve intercepting prohibited commodities or persons, and that women comprised only 5 percent of its border patrol agents. EEOC stated that the report’s recommendations may help CBP with its hiring efforts. CRCL, through the Deputy Officer for EEO and Diversity, is responsible for processing complaints of discrimination; establishing and maintaining EEO programs; fulfilling reporting requirements as required by law, regulation, or executive order; evaluating the effectiveness of EEO programs; leading the department’s diversity management program; and preparing and submitting DHS’s annual MD-715 report to EEOC. According to EEOC policy, a second-level reporting component is one that enjoys autonomy from its parent agency, and has 1,000 or more employees. EEOC instructions require second-level reporting components submit MD-715 reports to their agency headquarters for inclusion in the agency-wide report in addition to submitting them directly to the EEOC. DHS’s Headquarters EEO Office, a part of CRCL, implements the EEO program for all headquarters employees and applicants. DHS has nine second-level reporting components, including DHS Headquarters, that are required to submit individual MD-715 reports to EEOC. Each component has an office headed by a director charged with implementing its EEO program. Figure 1 shows the officials who are primarily responsible for EEO at DHS. CRCL develops DHS’s annual MD-715 EEO program status report and submits it to EEOC. CRCL works with components to gather and analyze necessary data and information, and to perform the required MD-715 exercises that are ultimately used to complete the overall DHS MD-715 report. CRCL includes components’ identified deficiencies in the DHS- wide MD-715 report. The Secretary of Homeland Security (or its designee) and CRCL’s Deputy Officer for EEO and Diversity are to certify DHS’s MD-715 report before CRCL sends the report to EEOC. Figure 2 illustrates DHS’s MD-715 report development process. This process includes conducting a self-assessment checklist of DHS’s and its components’ efforts to achieve a model EEO program and barrier analysis to eliminate identified EEO barriers. DHS has taken steps to follow EEOC’s guidance by using and analyzing various information sources, investigating possible causes of potential barriers or triggers, and planning activities to address and eliminate barriers. EEOC MD-715 guidance calls for federal agencies to continually work towards preventing all forms of discrimination and eliminating barriers that may impede free and open competition in the workplace. Figure 3 shows the barrier identification and elimination steps under MD- 715. DHS generally uses the information sources that EEOC guidance recommends in addition to workforce data to help identify potential barriers. As directed by EEOC guidance, DHS analyzes its workforce data to help identify triggers or indicators of potential EEO barriers by comparing the racial, national origin, gender, and disability profiles of its total workforce, and for various occupational categories to relevant civilian labor workforce data. In fiscal year 2017, DHS analyzed all available workforce data including: Total Workforce – Distribution by Race/Ethnicity, Gender, and Participation Rates by Major Occupations – Distribution by Race/Ethnicity, Gender, and Disability, and Applicants and Hires by Major Occupations – Distribution by Race/Ethnicity, Gender, and Disability. In addition to analyzing workforce data, in each of the fiscal years 2014 through 2017, DHS utilized the U.S. Office of Personnel Management’s Federal Employee Viewpoint Survey (FEVS) and DHS’s employee exit survey results to help identify and address barriers. For example, CRCL, in DHS’s fiscal year 2017 MD-715 report, used FEVS and exit survey results to help investigate the possible causes of higher-than- expected nonretirement separations for white females and several other ethnic and racial groups. According to the report, possible causes included the lack of advancement opportunities, insufficient work/life programs, and the lack of alternate work schedules. During our small group discussions, DHS employee groups told us that through the MD-715 report development process, they helped identify and address triggers and barriers. For example, Special Emphasis Program Managers we spoke with told us that DHS components conduct climate surveys to obtain input from employees on workforce practices every 1 or 2 years. Further, several DHS components’ MD-715 reports referenced soliciting employee input, such as obtaining Disability Employment Program Managers’ input via quarterly disability employment advisory council meetings where they share best practices and discuss issues and topics including barriers. Our review of DHS’s MD-715 reports showed that DHS identified three department-wide triggers in fiscal years 2014 through 2017. The three triggers were (1) high rate of nonretirement separations for certain groups, particularly white women; (2) low participation rates of women and various ethnic and racial groups in the permanent workforce; and (3) low participation rates of individuals with disabilities and targeted disabilities. Subsequent to its trigger identification and department-wide barrier analysis, from fiscal years 2014 through 2017, DHS identified three barriers: (1) problems with supervision/management, lack of advancement opportunities, lack of alternate work schedules, insufficient work/life programs, and personal/family related reasons causing higher- than-expected nonretirement separations for white females and several ethnic and racial groups; (2) the geographic location of jobs which has contributed to the low hiring rates of racial groups in certain major occupations; and (3) medical and physical requirements of law enforcement positons, such as the ability to engage in moderate to arduous physical exertion, which limit the eligibility of some applicants with targeted disabilities. DHS identified these barriers by analyzing component and DHS level workforce data and reviewing DHS FEVS and exit survey results. DHS identified barriers in its MD-715 reports for fiscal years 2014 through 2017. However, EEOC noted that for fiscal years 2015 to 2017, DHS had not identified any policies, procedures, practices, or conditions causing (1) low hiring rates for women in certain major occupations, and (2) the high separation rate of employees with disabilities. As stated in EEOC’s guidance, barrier elimination is a vital step to addressing identified barriers and working towards the goal of making the federal government a model employer. To address and eliminate identified barriers, EEOC’s instructions direct agencies to include in their MD-715 reports measurable objectives, an action plan that includes planned activities and completion dates, as well as officials responsible for overseeing the plan, and a summary of accomplishments. Since our 2009 recommendations, DHS has included interim milestones in its MD-715 reports. Our 2009 report showed that DHS had modified nearly all of its target completion dates. We recommended that DHS identify essential activities and establish interim milestones necessary for the completion of all planned activities to address identified barriers to EEO. In its fiscal year 2011 MD-715 report to EEOC, DHS identified essential activities and established interim milestones. Based on its MD- 715 reporting for fiscal years 2014 through 2017, DHS has continued to identify planned activities and establish interim milestones. Our review of DHS’s MD-715 reports from fiscal years 2014 through 2017 also shows that DHS has planned activities and targeted completion dates to address each identified barrier, and each trigger for a potential barrier. For example, to address the low participation rates of women and several ethnic and racial groups in DHS’s overall workforce, DHS’s planned activities included researching where to conduct outreach for the identified groups, and producing a plan to integrate data from the multiple applicant data-tracking systems used across DHS. DHS’s outreach activities included identifying colleges and universities with large populations of underrepresented groups, identifying relevant job fairs in selected service areas, and conducting focus group meetings with employees from underrepresented groups to determine how to improve recruitment and retention, among other events. These events were initiated in 2011, but are to be reviewed and updated annually. For example, DHS reported that it develops a “Top 25” list of annual outreach and recruitment activities that include law enforcement focused events. DHS also reported developing a framework in 2016 for applicant flow data analysis—important for identifying and addressing potential recruitment and outreach barriers. In 2017, activities included conducting more robust department-wide analysis of applicant data. Many of the activities were initiated in prior years and target dates for completion were met. To address the high nonretirement separation rate of certain groups, notably white women, DHS’s planned activities included updating and augmenting previously instituted exit survey methods, and identifying and implementing retention interventions. Further, in its fiscal year 2014-2017 reports, DHS has identified essential activities, established interim milestones, and met recurring interim milestones for its planned activities. For example, DHS reported that it planned to research where to conduct outreach for groups in occupations with underrepresentation. DHS components completed this outreach activity in 2012, and components and facilities are to annually identify (1) colleges with substantial populations of underrepresented groups, (2) relevant job fairs in the service area, and (3) relevant local affinity groups and community groups, among other outreach activities. Additionally, DHS’s Office of the Chief Human Capital Officer (OCHCO) has lead responsibility for implementing a multiyear plan for targeted recruitment of applicants from identified underrepresented groups. OCHCO completed its initial multiyear plan in 2012 and is to annually update its established goals for intern programs, job fairs, and local advertising. All four selected DHS components have taken steps to follow EEOC guidance to conduct barrier analyses. Of the components, Federal Law Enforcement Training Centers (FLETC), the U.S. Secret Service (Secret Service), the Transportation Security Administration (TSA), and U.S. Citizenship and Immigration Services (USCIS), only one, TSA, identified any EEO barriers. However, each of the components identified triggers and analyzed potential barriers by reviewing workforce data (i.e., data on total workforce, new hires, and mission critical occupations) and comparing the data to relevant benchmarks, reviewing various information sources to help identify possible barriers that may be resulting in the current condition highlighted by the analysis of workforce data, and reporting action plans and time frames for addressing potential or actual barriers. The Secret Service’s fiscal year 2017 MD-715 report showed that after analyzing demographic data to identify triggers, the Secret Service used FEVS data to identify potential barriers to the employment of individuals with disabilities in occupations where the triggers were identified. In addition, USCIS stated in its fiscal year 2017 MD-715 report that its review of exit survey data provided reasons that men, Hispanics, and whites left the agency, but data were inconclusive regarding the continuing underrepresentation of those groups. USCIS also reported that it would continue analyzing exit data in fiscal year 2018. In fiscal year 2017, TSA identified two barriers in its MD-715 report—(1) medical and physical restrictions limit opportunities for individuals with disabilities and individuals with targeted disabilities in Transportation Security Officer and Federal Air Marshal occupations, and (2) women are not applying to Transportation Security Officer or Federal Air Marshal positions at the same rate as men. TSA reported that it analyzed workforce data and policies, procedures, and practices related to recruiting, hiring, and promotions to try to determine what may be contributing to low participation rates for women and individuals with disabilities. TSA also interviewed employees involved in those processes, and conducted focus groups with supervisors and leadership at airports and field offices. TSA’s plans to address barriers include developing a communication plan to promote TSA programs that support persons with disabilities and with targeted disabilities; making sure training modules are accessible; conducting training to increase awareness of unconscious bias towards working with individuals with disabilities; and working with its human capital office and others to assist with recruiting and hiring to more effectively target women. Although FLETC, Secret Service, and USCIS did not identify EEO barriers in fiscal year 2017, they each developed action plans that identified activities designed to help address and correct undesired conditions, identified responsible officials, and set time frames for addressing the conditions. Examples of selected components’ plans and activities include: FLETC. To address low participation rates of persons with targeted disabilities in the permanent workforce, FLETC-planned activities include working with human resource specialists to identify data and timelines needed to create reports in its applicant data flow system that would help identify any barriers in the selection process, and working to resolve issues concerning applicant flow data in the applicant pool. Secret Service. To address low participation rates of certain groups in the general workforce and new hires, planned activities include quarterly tracking and reporting ethnicity, race, and gender data net changes, hires, resignations, and retirements. Other activities would involve working closely with the Office of Human Resources Talent and Employee Acquisition Management Division in recruitment activities. USCIS. To address the lower-than-expected participation rate of certain groups in the permanent workforce—for example, white males and females and Hispanic males—planned activities include conducting comprehensive applicant flow data analysis of the top five major occupational categorizes, and administering and analyzing a bi- annual EEO and Diversity Climate Survey. DHS has provided training for its components on how to conduct EEO barrier analysis. In 2016 and 2018, DHS trained DHS component EEO officials on methods for identifying the root of specific triggers in the workplace, as well as steps for eliminating identified barriers. According to DHS’s analysis of participant training evaluations, the majority of participants believed they would be able to apply what they learned from the training. In 2017, DHS provided a 2-day barrier analysis training to agency and component affirmative employment practitioners that introduced various barrier analysis methods. It included an exercise involving a hypothetical federal agency. Based on our review of participant evaluations, participants were satisfied with the training. DHS reported improvements in EEO indicators in its MD-715 reports from fiscal years 2014 through 2017. DHS cited its higher FEVS scores under employee engagement. For example, although DHS’s employee engagement remained 7 percent below the government-wide average, it increased from 54 percent in 2014 to 60 percent in 2017. According to DHS, this score was largely driven by TSA and U.S. Customs and Border Protection employees, who accounted for 46.8 percent of DHS’s completed surveys. Our review of DHS’s workforce data from fiscal years 2014 through 2017 showed that every minority group as well as individuals with disabilities and individuals with targeted disabilities had been trending in a positive direction since fiscal year 2014. Further, DHS officials told us that minority representation was up 3 percent and female representation was up 2 percent since 2015. In addition, DHS has produced barrier analysis reports that address underrepresentation of women and various ethnic and racial groups. In 2018, DHS completed a barrier analysis report on Hispanic employment in General Schedule pay scale grades 12 and higher, as required by EEOC and the U.S. Office of Personnel Management. The report identified several potential triggers, such as Hispanic women separating from DHS, and related barriers, such as possible harassment of Hispanic employees and women, and glass walls. DHS also developed action plans focused on enhancing elder and family care programs, offering training on preventing harassment in the workforce, increasing recruitment into job series with substantial promotion opportunities, and ensuring interview panels were diverse and interviewers properly trained. Although DHS has reported positive trending in various underrepresented groups, DHS officials said they were unable to fully identify the barriers contributing to the underrepresentation of women in its workforce despite conducting the required barrier analysis. In 2014, DHS conducted a barrier analysis of women in law enforcement to help identify any barriers. While specific barriers were not identified, DHS’s report, Women in Law Enforcement Study, provided insight into why DHS employed lower rates of female law enforcement officers than federal government-wide. For example, study participants shared anecdotal instances of where they or their colleagues did not pursue promotional opportunities because they perceived their work environment made them choose between the job and family. The study also highlighted steps DHS could take to help address its underrepresentation of women, such as being more creative in its approach to attracting qualified women through use of social media, and by creating more family-friendly environments. According to EEOC, one important tool in examining the fairness and inclusiveness of the federal government’s recruitment efforts is applicant flow data. By reviewing the yield of an agency’s recruitment effort, the organization can reassess and improve its effort to reach all segments of the population. EEOC guidance states that having department-wide applicant flow data could aid in analyzing differences in selection rates among different groups for a particular job. In July 2017, EEOC informed DHS that the agency’s applicant flow data were incomplete. DHS has reported challenges in collecting department-wide data that could help identify potential barriers. EEOC found that DHS’s workforce data tables do not always contain all of the agency’s applicant flow data. According to EEOC, without such data, it becomes much more difficult to pinpoint the specific policies, procedures, or practices in which barriers might be embedded. DHS does not have a consolidated applicant flow data system. According to DHS, four of its components use one system (USA Staffing), while five other components use a different system (Monster Government Solutions). Office for Civil Rights and Civil Liberties (CRCL) officials told us DHS is developing a new system to integrate applicant flow data department-wide. However, the officials could not give us a time frame for when the system is expected to be completed. As a work-around, DHS explained that it obtains these data directly from each component that uses Monster Government Solutions. CRCL officials said they will report complete applicant flow data in fiscal year 2019. In addition to creating a model EEO environment, progress in eliminating EEO barriers can help DHS avoid costs related to workplace disputes. According to EEOC guidance, the elimination of barriers may help an agency avoid expensive costs, such as back pay awards, compensatory damages, and attorney’s fees, from findings of discrimination. EEOC found 81 instances of discrimination from fiscal years 2014 through 2017 resulting in DHS paying nearly $30 million to cover judgments, awards, and settlements for these EEO cases, or an average of $7.4 million per year. These expenses were nearly equal to the average annual cost of DHS’s EEO program, which DHS estimated at about $7.63 million in fiscal year 2019. DHS does not have complete performance metrics or mechanisms for tracking progress towards eliminating its identified EEO barriers. For example, CRCL does not maintain numerical objectives or goals for eliminating barriers involving certain EEO groups, such as workplace satisfaction of white females or the retention rate of women in law enforcement positions. According to CRCL officials, they are not required to establish performance metrics or mechanisms for tracking progress towards eliminating barriers beyond what is included in the department- wide MD-715 report. DHS reported one performance measure for its EEO program—the percent of timely merit Final Agency Decisions (FADs). Standards for Internal Control in the Federal Government states that management should establish specific and measureable objectives, and ways to assess progress including performance metrics and milestones. It also states that management should design control activities to achieve objectives and respond to risks. Such control activities may include the establishment and review of performance metrics. Further, EEOC guidance states that agencies are not prevented from establishing additional practices that exceed its requirements. DHS officials acknowledged that their EEO program performance measurement does not reflect all the work that they do. According to CRCL officials, CRCL has proposed additional performance measures for its MD-715 activities, but they were rejected by DHS’s Office for Policy because they were not directly related to national security or public safety. DHS’s Office for Policy is responsible for approving new performance measures. CRCL officials told us that adopting hiring goals for individuals with disabilities and individuals with targeted disabilities—which had previously been identified as potential barriers—has been beneficial in garnering support and commitment towards meeting them. They said that DHS incorporated these goals into its efforts and initiatives to increase the recruitment, hiring, advancement, and retention of individuals with disabilities. Implementing performance metrics could help DHS better assess its progress in eliminating EEO program barriers. As shown in table 1, our analysis of DHS’s MD-715 reports found that DHS did not meet about a quarter of the compliance measures for a model EEO program for each fiscal year from 2014 through 2017. Specifically, over this 4-year period, DHS did not meet 26 percent of its compliance measures (128 out of 487). The largest percentage of unmet measures occurred under the model EEO essential element D—which focuses on proactive steps taken by an agency to prevent unlawful discrimination—where about 53 percent or 21 of 40 measures were unmet. According to DHS officials, in Part G of its MD-715 report, DHS includes deficiencies identified and reported at the component level as well as deficiencies directly attributable to the department. For example, in each of the fiscal years 2015 through 2017, DHS reported that it did not meet a compliance measure under element D that senior managers successfully implement EEO action plans and incorporate EEO action plan objectives into agency strategic plans. Specifically, in fiscal years 2015 through 2017, DHS noted that USCIS had not met this measure, and in fiscal year 2017, the Federal Emergency Management Agency (FEMA) and DHS Headquarters did not meet this measure. Our analysis of components’ MD-715 reports showed that components did not meet 9 percent of the compliance measures for a model EEO program from fiscal years 2014 through 2017. Specifically, over this 4- year time frame, components had a combined total of 369 program deficiencies out of a total of 4,229 compliance measures. DHS Headquarters, one of the nine second-level reporting components, accounted for 36 percent of deficient measures (134 of 369), while the other eight components accounted for 64 percent (235 of 369) of deficient measures. Examples of DHS’s deficient measures included EEO directors not under the direct supervision of the agency head, and the lack of established timetables or schedules for the agency to review its employee development and training programs for systemic barriers that may be impeding full participation in training opportunities by all groups. DHS and its components did not have action plans to address some of their self-identified deficiencies from fiscal years 2014 through 2017. Specifically, DHS did not have action plans to address 56 percent, or 72 of the 128 reported deficiencies, and components did not have action plans to address nearly half, or about 179 of the 369 deficiencies reported by all of the components during the four year period. For example, in fiscal year 2017, four out of nine DHS components—U.S. Customs and Border Protection (CBP), DHS Headquarters, FEMA, and Federal Law Enforcement Training Centers (FLETC)—did not have action plans to ensure that their EEO directors report directly to their agency heads. EEOC guidance requires agencies to demonstrate meaningful progress toward the removal of deficiencies, and to develop action plans for how agencies will attain the essential elements of a model EEO program. Specifically, for each deficient measure, agencies are to develop an action plan for correcting the deficiency. The plan should identify and briefly describe the deficiency; provide a measurable objective, including the reason for the deficiency, and target date for completion; identify officials responsible for overseeing implementation of planned activities to accomplish the objective; and provide for a yearly update on status of activities until objective is completed (i.e., the deficiency is removed). In addition, Standards for Internal Control in the Federal Government states that management should design control activities to achieve objectives. Control activities, such as policies or procedures to enforce directives, can help identify if a required activity is not being achieved (e.g., action plan completion) or implemented. The four selected DHS components told us that they do not have standard operating procedures for completing their MD-715 reports, including review and assessment of deficiencies and action plans, but have various processes in place to review their reports for accuracy and completeness. For example, according to USCIS, its process for the preparation and review of its MD-715 report includes providing a self- assessment checklist to each of its subcomponents; a review of their responses for accuracy; and follow-up with subcomponents to address any questions. In addition, USCIS stated that its MD-715 report undergoes multiple levels of reviews by subject matter experts and managers that include collaboration with human capital and chief counsel, and obtaining review and approval from the Director and other agency officials. The other three components—FLETC, TSA, and Secret Service—also reported having MD-715 review processes in place, including report review and approval by senior management; however, none specifically cited a review and approval of action plans to address reported deficiencies. CRCL officials told us that DHS and its components’ MD-715 reports met EEOC requirements for action plans for fiscal years 2014 through 2017 by providing explanations for, or briefly stating plans to address, the majority of their deficiencies rather than developing action plans identifying how each deficiency would be addressed. During our review of the MD-715, we noted that the Part G self-assessment checklist form gave respondents the option of providing a brief explanation in a comment box on the form or completing an action plan for each deficiency in Part H of the MD-715 report. For fiscal year 2018, EEOC revised its MD-715 report form and instructions to clarify that a plan is required for each identified program deficiency. For example, one component responded to a measure that asks whether an agency implemented an adequate data collection and analysis system that permits tracking of the information required by MD-715 and these instructions by stating “selected offices were currently working on the initiative.” The same component responded to a measure that asks whether an agency tracked recruitment efforts and analyzed efforts to identify potential barriers in accordance with MD-715 standards by stating, “The inconsistencies with the reporting of applicant flow data will need to be addressed to help identify potential barriers.” Another component responded to this measure by stating that, while its participation in various events are tracked, a clear, concise, and efficient system to track and analyze recruitment efforts according to MD-715 standards is currently not in place. Neither component provided a plan for how these deficient measures would be addressed. EEOC continues to identify areas of noncompliance in DHS component EEO programs. For example, in fiscal year 2017, EEOC noted that three of four selected components had areas of noncompliance. The areas of noncompliance included (1) failure to timely issue FADs, and (2) not establishing timetables or schedules to review its merit program policies and procedures, employee recognition awards programs, and employee developmental training programs for potential barriers. Developing policies or procedures, in consultation with the Deputy Officer for EEO and Diversity, to help ensure component EEO programs have action plans with measurable objectives for addressing deficiencies could help DHS components better comply with EEOC requirements. DHS continues to report insufficient staffing to support its EEO program. In 2009, we reported that, according to CRCL, DHS modified the target dates for planned activities to address identified barriers primarily because of staffing shortages in both CRCL and the Office of the Chief Human Capital Officer. We also reported that DHS had not conducted barrier analyses of policies, procedures, and practices that were established or used after fiscal year 2004 because of resource limitations, such as staffing and limited funding to contract for this activity. According to CRCL’s MD-715 and Notification and Federal Employee Antidiscrimination and Retaliation (No FEAR) Act reports from fiscal years 2014 through 2017, certain aspects of DHS’s EEO program did not have sufficient staffing. In addition, in fiscal years 2014 through 2017, DHS reported that staffing shortages contributed to it not meeting its target for the percent of timely decisions on discrimination complaints. In fiscal year 2017, DHS reported deficiencies for five out of seven staffing measures in its MD-715 report. In February 2019, CRCL officials told us they lacked staffing to issue timely decisions on discrimination complaints, to increase the number of mediators in the alternative dispute resolution program, and to provide them with training. From fiscal years 2014 through 2017, DHS and its components reported funding and staffing challenges in components’ EEO programs. As shown in table 2, DHS and its components reported that certain aspects of components’ EEO programs do not have sufficient funding or staffing from fiscal years 2014 through 2017. EEOC guidance states that an agency must provide its EEO program with sufficient budget and staffing to be able to successfully implement various activities, including (1) conducting a self-assessment of the agency for possible program deficiencies; (2) conducting a thorough barrier analysis of its workforce; and (3) ensuring timely, thorough, and fair processing of EEO complaints. CRCL and component EEO officials told us that they do not have formal staffing models to assess appropriate staffing of their EEO program sections. CRCL officials explained that each component EEO program section is unique with its own assessments and measures by the leaders in charge of their funding and staffing resources. Using these informal processes to identify staffing needs, CRCL and component EEO officials told us that they have requested additional staffing and funding to address some of their EEO program deficiencies from their top leadership. However, they said that additional staffing has not been granted. Our analysis of DHS’s congressional budget justifications show that DHS’s EEO program funding requests have decreased each year from nearly $8 million in fiscal year 2016 to nearly $7 million in fiscal year 2019. CRCL officials told us that DHS’s overall resources for the EEO program have not significantly increased. A staffing model could be a computer-based formula that estimates the number of staff needed to conduct varying numbers of EEO activities, such as processing a certain number of complaints or providing a certain number of training courses on an annual or ad hoc basis. As we have reported, a staffing model is a helpful tool that could better justify requests for resources to top leadership. Staffing models can identify resources required to enable program delivery to a sufficient degree and in a timely manner, or to adapt to changes in program delivery. According to DHS, the department has contracted support to help components develop models for Mission Support areas as part of a larger effort to ensure that all positions are eventually covered by a staffing model. Developing and utilizing a formal staffing model for its EEO program could help CRCL better identify, request, and obtain the staff it needs. Further, developing staffing models, in collaboration with the Deputy Officer for EEO and Diversity, would help components to better assess the staff they need. DHS did not respond timely to EEOC’s findings of noncompliance and EEOC did not follow up with DHS concerning the untimely response. In July 2017, in its most recent review of DHS compliance with EEOC requirements, EEOC reported nine areas of noncompliance in DHS’s EEO program. For example, EEOC found that DHS lacked resources to process EEO complaints and to conduct trend analyses of workforce data. EEOC stated in its feedback letter to DHS that it would initiate its noncompliance process if DHS did not submit a report explaining the agency’s progress in correcting its EEO program deficiencies by January 2018. However, according to DHS officials, due to an administrative oversight, DHS was unaware of EEOC’s July 2017 feedback letter until October 2018, when we asked about it. In February 2019, DHS submitted a report to EEOC that responded to each area of noncompliance. EEOC officials told us that it had not initiated its noncompliance process against DHS, but that it had placed DHS in its queue for agencies to be held in noncompliance. As discussed earlier, DHS Headquarters, a second-level reporting component, is required by EEOC to submit a separate MD-715 report to EEOC. However, DHS’s Headquarters EEO Office did not submit a separate MD-715 report to EEOC during fiscal years 2014 through 2017. DHS Headquarters EEO Office staff told us that the office had not submitted the required reports due to staff vacancies, including its EEO director position. They explained that the component’s EEO data and information were subsumed in DHS’s department-level MD-715 submission. In October 2018, CRCL filled its Headquarters EEO director position, which had been vacant for 8 months. DHS officials told us they plan to submit Headquarters’ fiscal year 2018 MD-715 report to EEOC by the due date. In February 2019, EEOC officials told us that DHS could be subject to EEOC’s noncompliance process if the report is not received. As shown in figure 4, CRCL and the Strategic, Recruitment, Diversity, and Inclusion (SRDI) Office support and oversee components in their efforts to identify and address EEO barriers. For example, CRCL convenes an EEO council consisting of EEO directors from each component that meets monthly and, among other things, shares best practices for identifying and addressing barriers. In addition, CRCL hosts EEO and Diversity Training Conferences for EEO staff that includes barrier analysis training. Further, CRCL provides midyear feedback to component EEO officials on components’ planned action items and plans for inclusion in their respective MD-715 reports. For example, based on our review of the CRCL statistician’s notes, during feedback meetings with components in 2017, he suggested that components consider opportunities for improving their draft MD-715 reports. The notes show that at least two out of nine components—CBP and DHS Headquarters—were given feedback to conduct more robust barrier analyses. SRDI supports component EEO program efforts to address EEO barriers related to recruitment, hiring, veterans, and individuals with disabilities. For example, to increase the participation of women in law enforcement across the department, SRDI held a joint hiring event in Dallas based on its analysis that a large number of female veterans live in Texas. According to SRDI officials, SRDI also assists DHS components with their evaluations of their human capital policies, procedures, or practices that may represent EEO barriers, such as awards, promotions, and career development. For example, in fiscal year 2016, SRDI analyzed the representation of the DHS Senior Executive Service Candidate Development Program applicant pool by various ethnic and racial groups, and by actual selectee participation. When it found that the representation rate of women decreased from 32.5 percent in the application stage to 23.4 percent in the selection stage, SRDI stated that the results, among other things, triggered the need for further analysis. Two cohorts later in 2018, the representation rate of women increased from 23.3 percent to 41.4 percent in the selection/participant stage. Further, CRCL and SRDI officials said they collaborate on a number of EEO activities to identify and address EEO barriers. For example, SRDI works together with CRCL to provide input for completing MD-715 report sections that address human capital-related EEO barriers. In addition, SRDI and CRCL worked together to conduct a barrier analysis of Hispanic employee representation. DHS components told us that its collaboration practices are generally working well and provided examples. In our interviews of nine DHS components, they told us they are generally satisfied that DHS has: clearly defined its short- and long-term outcomes, bridged the organizational cultures of participating agencies, clearly defined roles and responsibilities for participating agencies, included all relevant DHS participants when identifying and addressing EEO barriers, funded and staffed its collaborative mechanisms, such as monthly EEO council meetings, and documented its agreements on how participating agencies will be collaborating in identifying and addressing barriers. All nine components told us that CRCL regularly meets with them and provides guidance on identifying and addressing barriers. Four components specifically stated that CRCL provided assistance for reviewing and processing EEO data. For example, USCIS officials said that CRCL’s statistician provided direction on analyzing workforce data when conducting barrier analysis. Components also said that they find the training and technical assistance provided by CRCL helpful, and specifically commented that DHS’s EEO and Diversity Training Conferences have helped improve their barrier analyses. While DHS components are generally satisfied with DHS’s collaboration practices, some components provided examples of collaboration practices that could be improved. Three components—CBP, the U.S. Secret Service (Secret Service), and USCIS—told us that collaboration on funding or staffing efforts could be improved. For example, USCIS officials said CRCL lacks sufficient staffing to provide needed training, tools, and assistance to components to meet new MD-715 reporting requirements. Three components—CBP, the Transportation Security Administration, and USCIS—cited the lack of written guidance and agreements regarding collaboration between CRCL and components as areas that could be improved. For example, USCIS officials said that its collaborative efforts with CRCL were guided by informal best practices, feedback, and guidance, but having formal written guidance and agreements could clarify roles and responsibilities for identifying and addressing component EEO triggers and barriers. CRCL officials and component EEO officials stated that component EEO directors report directly to their respective component heads and not to CRCL. While CRCL requires components to meet to discuss midyear updates on their EEO efforts, CRCL officials explained that DHS components are responsible for developing, certifying, and submitting their own MD-715 reports to EEOC. They also said that if EEOC finds areas of noncompliance in DHS components’ EEO programs, EEOC requires DHS components to submit their compliance reports directly to EEOC. In fiscal year 2017, EEOC provided notice to six out of eight DHS components for having areas of noncompliance in their EEO programs. For five out of six DHS components, EEOC required components to establish plans to correct deficiencies, submit compliance reports explaining the agency’s progress in correcting these deficiencies, and showing meaningful progress in implementing its plans within 6 months. We found that three out of five DHS components—CBP, FEMA, and USCIS—did not submit timely compliance reports in response to EEOC’s feedback letters. Due to an administrative oversight, CBP officials explained that the component did not submit a compliance report that was due in February 2018 until we asked about it during our review. Although CBP submitted the report in March 2019, the report did not include plans to correct three out of seven areas of noncompliance. As of July 2019, CBP has taken steps to address the areas of noncompliance but has not yet responded to EEOC. As a result, CBP remains at risk of EEOC initiating the noncompliance process against it. FEMA also did not submit a compliance report that was due in February 2018 until we asked about it during our review. In June 2019, FEMA responded to EEOC’s feedback letter and included plans to correct three areas of noncompliance. FEMA’s response stated that the component would provide another update on its plans to correct these areas to EEOC in October 2019. FEMA’s response also stated that it would update its actions on 12 other areas of noncompliance in its fiscal year 2018 MD- 715 report. EEOC guidance states that an agency’s EEO Director ultimately is responsible for ensuring equal opportunity throughout the entire agency. In addition, Standards for Internal Controls in the Federal Government states that management should implement control activities through policies. According to CRCL officials, CRCL does not have policies and procedures to ensure that components have addressed EEOC’s feedback letters completely and timely. CRCL officials said CRCL does not have the authority to ensure components’ responses completely and timely address EEOC’s feedback letters. They explained that components interact directly with EEOC and are not required to discuss EEOC’s feedback with CRCL. CRCL officials further said that components may address EEOC’s feedback in their MD-715 reports instead of sending compliance reports to EEOC. For example, in response to the EEOC’s 2017 feedback letter, in its MD-715 report for fiscal year 2017, the U.S. Coast Guard discussed ways to assist DHS with improving its issuance of Final Agency Decisions. CRCL reported in its MD-715 reports from fiscal years 2015 through 2017 that it had authority for components’ EEO programs. A DHS delegation of authority order states that CRCL can recommend EEO program improvements to the component head before he or she responds to EEOC’s feedback letters. In addition, CRCL could use its existing practices to discuss EEOC’s feedback letter with components, such as midyear update meetings and monthly council meetings. However, CRCL officials stated they did not meet to discuss EEOC’s feedback letters with components in 2018. EEOC officials told us they send component feedback letters to both the component and CRCL, and invite CRCL officials to participate in component site visits. They also explained that DHS could be found noncompliant if a component’s EEO program does not comply with EEOC guidance. Developing policies and procedures for responding completely and timely to EEOC’s feedback letters may help the department comply with EEOC guidance. While DHS officials told us that ensuring DHS components’ compliance with MD-715 guidance is EEOC’s responsibility, EEOC officials explained that DHS’s responsibility equaled the responsibility that EEOC has to ensure DHS components’ compliance with MD-715 guidance. In addition, MD-715 guidance states that federal agencies, such as DHS, have the primary responsibility to ensure nondiscrimination in employment. Our prior work has found that an agency can benefit from periodically evaluating its organizational structure. Additionally, Standards for Internal Control in the Federal Government states that agency management should establish an organizational structure to achieve the agency’s objectives. According to these standards, an effective management practice for attaining this outcome includes periodically evaluating the organizational structure to ensure that it meets its objectives. As we previously discussed, EEOC found areas of noncompliance in the EEO programs of six out of eight DHS components, and two of the six components did not have plans to correct all of the areas of noncompliance until we asked about them during our review. While CRCL officials told us that they lack authority to certify that components’ MD-715 reports comply with MD-715 guidance, EEOC guidance states that an agency’s EEO Director ultimately is responsible for ensuring equal opportunity throughout the entire agency. EEOC guidance allows DHS components to report to either the Deputy Officer for EEO and Diversity or the Secretary of Homeland Security. However, DHS has not taken steps—in consultation with EEOC and other agencies as relevant—to analyze options to address EEO program management weaknesses, such as analyzing alternatives for granting additional authorities to the Deputy Officer for EEO and Diversity to ensure DHS components comply with MD-715 guidance, and assessing benefits and trade-offs of each alternative. In the absence of these steps, DHS may not be positioned to effectively manage its EEO program. As the third largest U.S. government department, the challenges DHS has faced to fully implement effective EEO programs may result in widespread negative consequences, including monetary expenses borne by the agency in connection with workplace disputes and decreased morale and productivity resulting from the ineffective and inefficient use of human capital resources. MD-715 requires DHS and its components to report annually on the status of their EEO activities and include plans that set forth steps they will take to correct deficiencies or improve EEO efforts. From fiscal years 2014 through 2017, DHS and its components have reported deficiencies in their EEO programs and identified EEO barriers in their workforces. We found areas for improvement in DHS and its components’ EEO programs that could help ensure success and compliance with MD-715. Specifically, DHS does not have complete performance metrics for the department’s EEO program, including a mechanism for tracking progress towards eliminating barriers. Developing performance metrics for the department’s EEO program could help improve progress in eliminating identified EEO barriers. In addition, DHS and its components reported that they lack action plans for addressing deficiencies in their MD-715 reports. Developing policies and procedures could help DHS component EEO Directors correct deficiencies in their EEO programs. DHS and its components also reported that areas of their EEO programs do not have sufficient staffing to successfully implement EEO activities. Developing formal staffing models could help DHS and its components better assess their resource needs to correct their deficiencies and eliminate their barriers. Further, from fiscal years 2014 through 2017, EEOC found areas of noncompliance in DHS and its component EEO programs. Without developing policies and procedures for responding completely and timely to EEOC’s feedback letters, DHS components may not correct areas of noncompliance and remain at risk of financial penalties and lost employee potential. Finally, DHS has not taken steps to address the key EEO program management weaknesses. Analyzing options for granting additional authorities to the Deputy Officer for EEO and Diversity can help position DHS to ensure its components are complying with MD-715 guidance. The commitment of DHS’s leadership is essential to successfully addressing these issues. By focusing leadership attention on developing performance metrics, policies and procedures, and staffing models, DHS and its components can help improve their EEO programs by making progress towards eliminating barriers, obtaining sufficient staffing, and addressing areas of noncompliance. We are making the following six recommendations to DHS: 1. The Secretary of Homeland Security should develop performance metrics for the department’s EEO program including a mechanism for tracking progress towards eliminating barriers. (Recommendation 1) 2. DHS component EEO Directors, in consultation with the Deputy Officer for EEO and Diversity, should develop policies and procedures to help ensure that their component EEO programs have action plans for addressing deficiencies in their MD-715 reports. (Recommendation 2) 3. The Deputy Officer for EEO and Diversity should develop a formal staffing model for its EEO program. (Recommendation 3) 4. DHS component EEO Directors, in collaboration with the Deputy Officer for EEO and Diversity, should develop component formal staffing models. (Recommendation 4) 5. The Deputy Officer for EEO and Diversity should develop policies and procedures for responding in a complete and timely manner to EEOC’s feedback letters. (Recommendation 5) 6. The Secretary of Homeland Security—in consultation with CRCL and EEOC, and other agencies and components, as relevant—should analyze options for granting additional authorities to the Deputy Officer for EEO and Diversity to ensure DHS components comply with MD-715 guidance, including the authority of the Deputy Officer for EEO and Diversity to certify components’ MD-715 reports. (Recommendation 6) We provided a draft of this report to DHS and to EEOC for review and comment. In its official comments, reproduced in appendix I, DHS agreed with all six of our recommendations, and DHS and EEOC provided separate technical comments to the draft of our report, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6806 or jonesy@gao.gov, or Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Yvonne D. Jones, (202) 512-6806 or jonesy@gao.gov. Christopher P. Currie, (404) 679-1875 or curriec@gao.gov. In addition to the contacts named above, Clifton G. Douglas, Jr. (Assistant Director), Luis E. Rodriguez (Analyst-in-Charge), Adam J. Brooks, Carla D. Brown, Andrew Howard, Haley Klosky, and Steven Putansu made key contributions to this report.", "summary": "EEOC's Management Directive 715 requires that, to attract and retain top talent, federal agencies are to identify EEO barriers in their workforces and deficiencies in their EEO programs, execute plans to address them, and report annually to EEOC. In 2009, GAO reported that DHS had opportunities to better identify and address barriers to EEO in its workforce, and made recommendations which DHS has taken action to address. GAO was asked to provide an update on DHS's efforts to identify and address barriers to EEO in its workforce. This report examines the steps DHS has taken to (1) identify and address barriers to EEO in its workforce, (2) identify and address EEO program deficiencies, (3) address areas of noncompliance in its EEO program identified by EEOC, and (4) oversee and support component EEO programs. GAO reviewed DHS's and its components' policies, procedures, practices, and reports for their EEO programs for fiscal years 2014 through 2018, interviewed DHS and its component EEO officials, and assessed DHS employee survey results. GAO also reviewed EEOC's feedback on DHS's and its components' EEO programs, and interviewed EEOC officials. The Department of Homeland Security (DHS) has identified barriers to equal employment opportunity (EEO) and has plans to address them, but lacks performance metrics for tracking its progress towards eliminating these barriers. DHS identified three barriers from fiscal years 2014 through 2017: (1) problems with supervision/management, lack of advancement opportunities, and lack of alternate work schedules, among other things, causing higher-than-expected nonretirement separations for white females and several ethnic and racial groups; (2) the geographic location of jobs, which has contributed to low hiring rates of racial groups in certain major occupations; and (3) the medical and physical requirements of various law enforcement positions, such as the ability to engage in moderate to arduous physical exertion, which limit the eligibility of some applicants with targeted disabilities. While DHS reports some improvements in employee engagement and representation of minorities and women, it does not have complete performance metrics, such as the retention rate of women in law enforcement positions. Implementing performance metrics could help DHS better assess its progress in eliminating barriers. DHS and its components have identified various deficiencies in their EEO programs, but lack policies and procedures for developing action plans and formal staffing models to address some deficiencies. DHS components did not have action plans to address nearly half (179 out of 369) of the deficiencies self-reported by all components from fiscal years 2014 through 2017. For example, in fiscal year 2017, four DHS components did not have action plans to ensure that their EEO directors report directly to their agency heads. Developing policies and procedures to help ensure components' EEO programs have action plans for addressing deficiencies could help DHS components better comply with Equal Employment Opportunity Commission (EEOC) requirements. Developing and utilizing formal staffing models for their EEO programs could help DHS and its components to better identify, request, and obtain the staff they need. For example, DHS and its components reported that staffing challenges contributed to some of their EEO program deficiencies, and acknowledged they lack formal models to use their existing staffing to address the deficiencies. DHS has plans to address the nine areas of noncompliance in its EEO program identified by EEOC. For example, in its most recent review of DHS compliance with EEOC requirements, EEOC identified that DHS did not provide complete demographic data on new hires and promotions in its report to EEOC in fiscal year 2016. DHS officials told us that the department plans to report the data by collecting complete data from DHS components in fiscal year 2019. DHS's EEO and human capital offices assist and support DHS components in identifying and addressing EEO barriers. However, the EEO office lacks policies and procedures to ensure components respond timely and completely to areas of noncompliance identified in EEOC feedback letters. Additionally, DHS EEO officials said they lack authority to ensure components' compliance with EEOC requirements. Without addressing these issues, DHS may not be effectively positioned to manage its EEO program. GAO is making six recommendations, including: develop performance metrics for the department's EEO program; develop DHS and component formal staffing models; and analyze options for granting additional authorities to the most senior official for EEO and Diversity. DHS concurred with our six recommendations and described actions the department plans to take to address them.", "document_type": "gao"}
{"report": "This section provides an overview of the Hanford Site, including DOE’s progress cleaning up the site, and DOE’s requirements and organizational structure for managing and overseeing cleanup and S&M activities at the site. Located in southeastern Washington State, the Hanford Site is one of the most contaminated nuclear waste sites in North America. The site covers 586 square miles upriver from the cities of Richland, Pasco, and Kennewick. The Columbia River flows through about 50 miles of the site. The River Corridor and Central Plateau represent the two main geographic areas for cleanup work. See Figure 1 for a map of the Hanford Site. DOE’s primary goal for cleaning up Hanford is to protect the Columbia River from contamination now and in the future and to restore groundwater. Since cleanup began in 1989, DOE has made progress towards these goals, including remediating 1,342 of 2,032 waste sites, demolishing 889 of 1,715 excess facilities, removing 18.5 million tons of contaminated soil and debris from areas along the Columbia River, and treating 20 billion gallons of contaminated groundwater. DOE’s most recent schedule estimate for completing cleanup of the Hanford Site is 2078, although final decisions for many cleanup actions have not yet been made. RL’s current overarching set of near-term cleanup goals and priorities—outlined in its 2020 Vision—include initiating the transfer of radioactive sludge from the K basin, cleaning up highly contaminated soils underneath the 324 building, and completing demolition of the Plutonium Finishing Plant, which is among Hanford’s most contaminated nuclear facilities. Table 1 includes a list and summary descriptions for each of the contaminated excess facilities we selected for our review. A more detailed discussion of the scope for our review is presented in appendix I. The objectives for conducting S&M of contaminated excess facilities are to ensure adequate containment of any contaminants left in place; provide physical safety and access controls; and maintain the facility in a manner that will minimize risk to human health and the environment. S&M requirements are derived primarily from nuclear facility safety regulations and DOE orders concerning occupational safety, environmental protection, security, and emergency response planning. DOE orders also require that nuclear facility maintenance plans address aging degradation and obsolescence and that surveillance inspections be conducted to detect malfunction and deterioration and determine whether the structural integrity of contaminated excess facilities is threatened. Under the TPA Action Plan, DOE has established an S&M plan for each of the key excess facilities. The S&M plan identifies the facility and associated structures covered by the plan and the specific inspection activities and frequencies to be conducted. For the other excess facilities, S&M requirements are established through provisions of the cleanup contract which require that the contractor perform the S&M activities necessary to maintain them in a safe and compliant condition. Due to the wide variation in types of contaminated excess facilities and associated hazards and risks, RL uses a graded approach that allows for differences from facility to facility regarding the frequency and extent of inspections and associated structural integrity engineering evaluations. Structural integrity engineering evaluations are conducted to determine the adequacy, structural integrity, and soundness of structures and their components. Inspections are conducted using a procedural checklist comprising a list of functional areas from the facility’s inspection plans or procedures, which personnel performing inspections are to evaluate. Inspection checklists can include, among other things, structural integrity (an integral part of excess facility inspections), animal and water intrusion, electrical hazards, and ground subsidence. The S&M plans for contaminated excess facilities require interior walk-through inspections generally on an annual basis but that can vary depending on the facility. Typically, these inspections follow a designated path intended to represent conditions that might be present in areas of the facility that are not visually inspected. In addition, a qualified structural engineer conducts an inspection of the roof integrity—recognized as the most likely risk of failure for the contaminated excess facilities—and other associated structures at those facilities. The frequency, extent of future inspections, and recommendations resulting from these periodic inspections are to be documented by the structural engineer. The program offices at DOE headquarters, RL, and Hanford contractors have overlapping roles and responsibilities for managing and overseeing the cleanup and S&M of Hanford excess facilities. These include: Office of Environmental Management: DOE established EM in 1989 to address the environmental legacy of 50 years of nuclear weapons production and government-sponsored nuclear energy research across the country. EM is responsible for the cleanup of large amounts of radioactive wastes, spent nuclear fuel and nuclear material, contaminated soil and groundwater, and the decommissioning and demolition of contaminated excess facilities at various sites. EM offices involved with oversight of contaminated excess facilities cleanup and S&M activities include: Field Operations Oversight/Chief of Nuclear Safety Office. This office has responsibility for strengthening federal oversight of EM’s cleanup mission, including maintaining operational awareness of field office sites’ operations oversight and implementation of nuclear safety requirements, including requirements for S&M. The Standards and Quality Assurance Office. This office assists with headquarters review of deactivation and decommissioning project planning documents, configuration management and controls, and S&M programs. Office of Enterprise Assessments. This independent office, which reports directly to the Office of the Secretary, is responsible for implementing DOE’s Independent Oversight Program for safety and security in accordance with various DOE policies and orders. Through this program, the office conducts appraisals of the adequacy of DOE policy and requirements and the effectiveness of DOE and contractor line management performance in safety and security. The Office of Environment, Safety, and Health Assessments. This office is responsible for conducting assessments to provide information on programs and performance in protecting DOE workers, the public, and environment from hazards present at DOE sites and operations. It also conducts special reviews and studies of safety and emergency management topics and activities where warranted based on circumstances or performance or as directed by DOE management. Hanford Site. RL is responsible for managing and overseeing non- tank waste cleanup activities at Hanford—including S&M of excess facilities—in the Central Plateau area and for completion of some remaining cleanup work in the River Corridor. RL management and oversight includes verification that work is performed in a safe, secure, and quality manner that protects the public, the worker, and the environment and complies with contractual requirements. Project and Facilities Division. This division is responsible for managing and overseeing the cleanup and S&M of Hanford’s excess facilities. Operations Oversight Division. This division has primary responsibility for day-to-day oversight to ensure cleanup work is performed in compliance with requirements for safety, quality assurance, and quality control. This includes ensuring that S&M activities follow approved plans and procedures and that the contractor corrects any deficiencies identified during facility inspections. Site Stewardship Division. This division manages the Long Term Stewardship Program that includes overseeing S&M of the six cocooned reactors. Cleanup Contractor. Private firms under contract to DOE perform the cleanup and S&M work at Hanford. Central Plateau Cleanup. Since 2008, cleanup and S&M of most of the contaminated excess facilities discussed in this report have been performed under the Plateau Remediation Contract by C2HM HILL Plateau Remediation Company. The S&M activities for excess facilities, including how often and what parts of the facility are inspected, are determined by the contractor as necessary to meet contract requirements. Mission Support. Mission Support Alliance is the contractor for the Long Term Stewardship Program and is responsible for ongoing S&M activities for the six cocooned reactors; these activities are expected to last for at least 75 years. DOE has taken some actions to evaluate the causes of the PUREX tunnel 1 collapse, but has not determined the programmatic causes that contributed to the tunnel collapse, such as by completing an accident investigation or a root cause analysis. In addition, DOE headquarters’ recommendations to improve S&M of contaminated excess facilities and the availability of information on the condition of at-risk areas within these facilities have not been fully implemented. RL has taken some actions to evaluate the physical causes that contributed to the PUREX Tunnel 1 collapse, but has not determined the programmatic causes that led to the collapse, such as by completing an accident investigation or a root cause analysis, among other things. Specifically, after the collapse, RL took several actions to comply with a 2017 Washington State Department of Ecology Administrative Order. In this order, the Washington State Department of Ecology determined that RL and the Hanford cleanup contractor were not operating and maintaining the PUREX Tunnel 1 to achieve compliance with the site’s hazardous waste permit and failed, among other things, to keep the operation of the tunnel undisturbed until closure of the facility. The Administrative Order required RL to take several corrective actions to address violations outlined in the Administrative Order, including determining the cause of the PUREX Tunnel 1 collapse. To fulfill the 2017 Administrative Order corrective action, the cleanup contractor performed an engineering evaluation to determine the structural conditions that led to the collapse of PUREX Tunnel 1. However, the contractor noted in the evaluation that due to the risks of exposure to high radiation levels and urgency to seal the collapsed area, there was insufficient information available to determine the causes of the collapse. Instead, the evaluation identified three potential causes of the collapse, with the most likely cause being deterioration and decay of the tunnel’s timber structure. The state accepted these findings from the engineering evaluation as satisfying the requirements in the Administrative Order corrective action that RL identify the causes of the collapse. Notably, the 2017 structural engineering evaluation of Tunnel 1 conducted after the tunnel collapse did not include a root cause analysis to determine the underlying programmatic causes that contributed to DOE not performing previously recommended structural assessments or detecting through regular S&M activity the imminent collapse of PUREX Tunnel 1 collapse. DOE had been aware of concerns with the structural integrity of Tunnel 1 since the 1970s. These concerns lead to the completion of structural assessments in the late 1970s, early 1980’s, and in 1991, when it was recommended that the tunnel be reassessed again in 10 years. Due to elevated risk of contamination and radiation exposure to inspectors, subsequent structural integrity assessments were completed using existing information from prior evaluations, including testing of tunnel structural material, instead of collecting updated information through physical inspections to determine if the PUREX tunnels were structurally sound for continued use, according to RL officials. Figure 2 illustrates the timeline of events related to the tunnels, showing that while the structural integrity of Tunnel 1 was raised several times over the last 40 years and it was recommended in 1991 to assess the tunnel again by 2001, an assessment did not occur until after the May 2017 PUREX Tunnel 1 collapse as part of the corrective actions required by the state. DOE’s order on accident investigations contains requirements to initiate an investigation into both the individual and organizational (programmatic) root and contributing causes of events resulting in, but not limited to, a fatality of an employee or member of the public or serious injury requiring hospitalization; loss of control of radioactive material or environmental release of hazardous material; or at least $2.5 million in damage to property or in costs for cleaning, decontaminating, renovating, replacing or rehabilitating. According to RL officials, RL did not initiate such an investigation into programmatic causes because management concluded that the PUREX Tunnel 1 collapse did not reach these threshold requirements. However, according to RL officials’ written responses to our questions about incident, the costs of responding to the PUREX Tunnel 1 collapse and stabilizing the tunnel exceeded $10 million. DOE Order 232.2A, Occurrence Reporting and Processing of Operations Information, also requires the investigation, categorization, and analysis of reportable occurrences by facility representatives and contractors using a graded approach in accordance with locally approved procedures for implementing the requirements of this order. For an occurrence such as the May 2017 PUREX tunnel collapse, which constituted noncompliance with regulatory requirements that created the potential for actual harm, DOE’s order and related guidance indicates that a causal analysis should have been performed to identify the root causes, including the programmatic causal factor or factors that, if corrected, would prevent similar future occurrences. According to the cleanup contractor’s condition report on the PUREX tunnel collapse, the contractor initially classified the incident as a significant event because it was categorized as an operational emergency and significant by default. According to this report, under the contractor’s reporting procedures, such a classification requires the performance of a root cause analysis to determine the causes and corrective actions with the intent of preventing recurrence. The contractor’s condition report related to the incident notes that RL waived the performance of a root cause analysis in favor of a less rigorous apparent cause analysis to determine the structural factors that led to the collapse of PUREX Tunnel 1. According to a written explanation provided to us by RL management, while the tunnel collapse was due to structural degradation, RL’s first priority was stabilizing the tunnel to mitigate the potential for further collapse, and a programmatic root cause analysis to determine the cause was not warranted. In this written response, RL did not provide any explanation for why a programmatic root cause analysis was not warranted. In an email, RL’s Operations and Oversight Division facility representative granted the cleanup contractor’s request for a waiver from conducting a root cause analysis and concurred with their assertion that an apparent cause analysis was more appropriate. Based on this direction, a root cause analysis was not performed. A root cause analysis, performed by either DOE headquarters or RL in accordance with the requirements of DOE’s orders on accident investigations and occurrence reporting, would have included an assessment of the underlying programmatic factors that contributed to the collapse of PUREX Tunnel 1. For example, a root cause analysis would determine why PUREX facility inspections that only include visual observations of the surface areas around the tunnels were insufficient in identifying the likelihood of the imminent collapse of PUREX Tunnel 1; why a recommendation made in 1991 for an engineering evaluation to be completed by 2001 to determine if the tunnel was still structurally sound for continued use was not completed; or why RL did not make stabilization or cleanup of the tunnel a higher priority. By conducting a root cause analysis to determine any programmatic weaknesses that contributed to the collapse of PUREX Tunnel 1, and taking action to address any identified weaknesses, DOE would have greater assurance that another, similar event will not take place at Hanford. In June 2017, shortly after the PUREX Tunnel 1 collapse, EM initiated an Extent of Condition Review to investigate program weaknesses and risks in regard to contaminated excess facilities at three DOE sites, including Hanford. Although EM’s 2017 Extent of Condition Review concluded that, overall, the S&M processes for excess facilities were adequate in mitigating risks, EM’s review identified some weaknesses and made four recommendations to improve the S&M of contaminated excess facilities and availability of information on these facilities’ condition. Specifically, two of these four recommendations addressed weaknesses in inspections of facilities and improving information about the condition of excess facilities: A comprehensive review should be conducted to identify high-risk areas within excess facilities where inspections have not been conducted for over 5 years. The results of the review should be used to inform the risk management process used to prioritize actions and projects. For excess facilities for which limited areas may be used for ongoing operations or storage of nuclear materials, the S&M of the unused areas should be reviewed to assure long-term integrity and stability that is comparable to facilities that are excess. RL has not fully implemented these two recommendations. RL has taken some actions, including commissioning an engineering team to evaluate the structural integrity of some facilities similar to the PUREX tunnels that may pose a future threat of collapse. However, this evaluation of the structural integrity of Hanford’s contaminated excess facilities was not comprehensive and did not include an evaluation of the structural integrity of all excess facilities of concern that may be at risk of structural failure. For instance, the scope of the evaluation was focused on 27 underground waste storage structures in the Central Plateau, such as cribs, tanks and trenches, which were constructed prior to PUREX Tunnel 1. In addition, this evaluation was largely based on old data and did not include any physical or non-physical inspection and testing to verify if a facility or part of a facility needed to be stabilized or prioritized for cleanup, according to RL officials. In addition, although recommended in EM’s 2017 Extent of Condition Review, to date, RL has not taken action to direct the cleanup contractor to carry out comprehensive inspections at all contaminated excess facilities, and there are areas of some facilities that still have not been entered, either physically or by remote means, to conduct internal inspections. RL officials told us that they generally agree that inspections of aging facilities should include evaluations of their structural integrity. According to these officials, there have been ongoing discussions about such inspections, including how often and in what areas to conduct them. Officials said these decisions would need to be determined on a case-by- case basis depending on the safety consequences of potential incidents. They also stated that RL has prioritized removing hazards to reduce potential threats to human health and the environment to reduce future surveillance and maintenance costs and preparing the canyon areas and other facilities for final cleanup. According to EM headquarters officials, the 2017 Extent of Condition Review recommendations were intended to be considered as opportunities for improvement which site management could incorporate as deemed appropriate. EM officials explained that there is no requirement for sites to take action to implement the review recommendations or track their progress. However, by not taking actions to implement the Extent of Condition Review recommendations, RL will continue to lack information about the condition of high-risk areas within contaminated excess facilities where inspections have not been conducted for several years and will miss opportunities to identify and address any deteriorating conditions that could lead to the collapse of another contaminated excess facility. The Hanford contractor is generally conducting surveillance inspections of most contaminated excess facilities as required. However, EM’s 2017 Extent of Condition Review and our review found that the cleanup contractor did not conduct comprehensive inspections at all contaminated excess facilities and that there are areas of some facilities that personnel infrequently or never enter, physically or by remote means, to conduct interior inspections. In addition, although EM’s 2017 Extent of Condition Review team noted that they observed examples where appropriate S&M activities were taking place at contaminated excess facilities, the team also acknowledged that such activities do not assure the EM sites’ S&M programs are adequate to prevent mishaps, as evidenced by the collapse of PUREX tunnel. Further, DOE headquarters offices responsible for the evaluation of DOE site activities have not conducted any specific assessments or audits focusing on management and oversight of Hanford S&M activities since 2013. According to EM’s 2017 Extent of Condition Review and our review of inspection reports at selected facilities, routine surveillance inspections of Hanford’s contaminated excess facilities are being conducted and the EM review concluded that Hanford’s surveillance inspections were generally adequate. However, this same EM review, as well as our review, identified weaknesses in Hanford’s inspection program. DOE orders require sites to clearly address aging degradation and obsolescence and to conduct surveillance inspections at contaminated excess facilities to detect malfunction and deterioration and determine whether the structural integrity of contaminated excess facilities is threatened. Once DOE determines that a facility is excess to mission needs, the disposition phase of a contaminated excess facility’s life cycle usually includes deactivation, decommissioning, and S&M activities, followed by decontamination and demolition. According to RL officials, a graded approach—taking into account the risks posed at each contaminated excess facility— can be used to tailor S&M activities, including the frequency of facility inspections. In addition, S&M plans and procedures are prepared by DOE and implemented by the contractor, who determines the frequencies and areas of contaminated excess facilities included in surveillance inspections. EM’s 2017 Extent of Condition Review found that at three EM sites, including Hanford, contaminated excess facilities surveillance inspections were adequate and overall ensured that the S&M programs were mitigating risks. Additionally, the review found that the sites were giving appropriate attention to roof integrity through the S&M process. Roof structural integrity is a key concern at contaminated excess facilities, as the roof serves as protection against spread of contamination and represents the most likely failure risk and safety risk for workers. Further, in our review of selected contaminated excess facilities, we found that the Hanford cleanup contractor has conducted annual surveillance inspections of most of these facilities and has taken action to ensure the structural integrity of some contaminated excess facilities. For example, RL’s responses to our questionnaire indicated that for 16 of the 18 contaminated excess facilities we selected for our review, the contractor conducts interior inspections of structural integrity on a periodic basis. In addition, we found that between 2008 and 2018, the contractor annually inspected three of the four contaminated excess facilities we selected for our in-depth reviews. However, RL responses to our questionnaire revealed concerns with completeness of structural integrity evaluations and the structural integrity of some facilities. For five of 18 facilities, RL officials identified structural integrity or degradation which could lead to the potential release of hazardous or nuclear materials, such as the May 2017 partial collapse of PUREX Tunnel 1, as a concern. RL responses also indicated that engineering analyses to evaluate structural integrity had been conducted for 13 of the 18 facilities; however, at 10 of these facilities some areas were not included in the evaluation due to concerns about worker safety from radiological or other hazards. Further, EM’s 2017 Extent of Condition Review, other recent DOE reports, and our review of inspection reports for selected contaminated excess facilities found several instances in which the cleanup contractor did not conduct comprehensive surveillance inspections at all excess contaminated facilities, including infrequently or never entering portions of some facilities, either physically or by remote means, to conduct interior structural integrity evaluations. REDOX. According to the 2015 Canyon Risk Mitigation Plan, the REDOX canyon is not accessed during routine S&M activities. This report also notes that the canyon deck area is expected to be highly contaminated, is not inspected, has not been entered in more than 50 years, and structural conditions are unknown. The canyon deck is located in the central portion of the canyon building and is isolated from other areas of the facility by thick reinforced concrete walls and floors. It is located above the facility process cells that were used to extract plutonium. According to RL officials, these process cells and other parts of the main canyon building are not accessed during routine walkthrough inspections due to high levels of radioactive contamination. Furthermore, in the contractor’s 2016 annual inspection of the REDOX facility complex, the contractor did not evaluate three annexes of the canyon facility for structural integrity, according to RL’s response to our questionnaire. According to RL officials, the contractor did not carry out these evaluations of the annexes because RL plans to complete their final cleanup in the near term. However, according to a 2016 DOE planning document, the schedule for conducting the cleanup of the annexes is unknown, and RL officials told us it may be several more years before cleanup begins. Because these annexes are not inspected for structural integrity, RL and the cleanup contractor may not have sufficient information regarding their condition for planning purposes, such as assessing if immediate maintenance is required to stabilize a structure or prioritizing an annex for immediate cleanup. In addition, according to a 2012 DOE report, because the canyon was not deactivated after shutdown in the 1960s, information is very limited and there is a significant level of uncertainty about the conditions inside the building. According to the EM’s 2017 Extent of Condition Review, despite ongoing S&M activities, if facility deterioration continues and is left unaddressed, the condition of the facility could present a threat to human health and the environment, as well as increase the costs of S&M in the near term. PUREX. According to EM’s 2017 Extent of Condition Review, parts of the main PUREX facility are not physically inspected, including the canyon deck. The canyon deck is in the central portion of the main canyon building and is isolated from the surrounding areas of the facility by thick, reinforced concrete walls and floors and has not been entered in more than 10 years, according to the Hanford cleanup contractor’s 2015 Canyon Risk Mitigation Plan report. According to this report, conditions within this space are unknown, and high contamination levels are expected. Due to lack of information and concerns about this area, the 2015 Canyon Risk Mitigation Plan recommended—for data-gathering and planning purposes— inspecting this area either physically or remotely, if physical entry is not possible due to high levels of radiation. This report also stated that future cleanup work could not be initiated in this area without sufficient information related to the condition of the canyon deck. In addition, a 2019 engineering evaluation of the facility determined that degradation may not be fully addressed by S&M activities and the risk of release of hazardous substances will increase as degradation continues or goes undetected. Figure 3 shows the main PUREX plant and auxiliary facilities. 216-Z-9 Crib. According to the EM’s 2017 Extent of Condition Review, due to the highly contaminated nature of 216-Z-9 Crib, inspections of this facility are limited to external surveillance of the roof and looking down the facility stairwell to the trench area of the crib. However, a 2006 inspection of the interior of the crib utilized a remote controlled device to inspect and determine that the structural integrity of the facility’s roof was suspect. This inspection recommended that the roof be inspected for structural integrity every 5 years; however RL did not direct the contractor to inspect the facility until 2016. Furthermore, according to RL officials, when the facility was inspected in 2016 and then again in 2018, the inspections did not include an engineering evaluation or use of non-physical engineering or robotic tools to inspect the structural integrity of the roof, as was done in 2006, to determine if the facility was safe for continued use. Despite the lack of an engineering evaluation or interior inspection of the roof, the 2016 and 2018 inspection reports gave the facility a passing grade for structural integrity—raising questions about both the basis and reliability of this assessment. RL officials told us they did not instruct the contractor to conduct such an evaluation because recent visual surveillance inspections of the outside of the crib roof did not indicate that structural failure was imminent. However, in its January 2019 structural integrity assessment of contaminated excess facilities at risk of collapse, the contractor reported that this facility was among 11 facilities needing further evaluation. Plutonium Finishing Plant 241-Z-361 Settling Tank. According to RL’s response to our January 2019 questionnaire, the interior of the Plutonium Finishing Plant 241-Z-361 Settling Tank is not inspected. RL’s response noted that although there are concerns regarding the structural integrity of the facility, the facility is safe for continued use. However, RL’s response is not consistent with prior studies on the condition of the tank. To support the questionnaire response, RL referred to the 2018 Documented Safety Analysis and a 1997 Structural Integrity Assessment for Plutonium Finishing Plant 241-Z- 361 Settling Tank. The 2018 Documented Safety Analysis concludes that the tank is in a structurally degraded condition but is not considered at risk of imminent failure. However, the 1997 Structural Integrity Assessment that DOE used to support the conclusion in its Documented Safety Analysis determined it was not possible to accurately assess the condition of concrete in the facility and there were uncertainties associated with the strength of its structural steel. The 1997 report also concluded that deteriorating conditions of the facility could lead to the leakage of radioactive waste material, further accelerating the degradation through corrosion and conditions that could result in the collapse of the tank. Notably, a subsequent 1999 video inspection revealed cracking in the interior roof, dissolving of the interior steel liner, and deterioration of the concrete sidewall of the tank. Despite these documented concerns about the structural integrity of the facility, RL officials that we spoke with could not provide a specific reason for why the interior of this facility has not been inspected. Most recently, a structural integrity initial assessment performed for the contractor in January 2019 identified the Plutonium Finishing Plant 241-Z-361 Settling Tank as the top priority among 11 contaminated excess facilities needing further evaluation to determine if the facility is structurally sound for continued use. This report stated that the facility is currently in a structurally degraded condition, with severe deterioration of the construction materials supporting the structure. 224B Concentration Facility. This facility is contaminated from past operations and parts of the facility are not physically inspected, according to the 2015 Canyon Risk Mitigation report. In addition, according to a 2015 RL briefing report, the facility’s roof is aging and will likely require replacement within 5 years. According to RL officials, the roof of this facility has not been replaced, and according to RL’s response to our questionnaire, no significant maintenance or structural work has been conducted since 2008 and none is needed or planned based upon the current condition of the facility. However, RL’s response to our questionnaire indicates that RL has not conducted a structural integrity engineering evaluation of the facility to support this conclusion. According to RL officials, they are currently in the process of developing a plan to complete decommissioning and decontamination of the facility. Under the TPA, the plan is to be submitted by the end of September 2020. However, RL officials told us that even with regulatory approval of the plan, DOE likely will use additional funding to pursue other near-term cleanup priorities rather than clean up the 224B Concentration Facility. According to EM’s 2017 Extent of Condition Review, other recent DOE reports, and our review of inspection reports for selected contaminated excess facilities, gaps in S&M activities are, in some cases, due to access challenges at the facilities. According to the EM 2017 Extent of Condition Review, not all facility areas are inspected regularly due to difficulty of access or elevated risk of contamination or exposure, or because those areas are in such a degraded condition they are not safe to enter. However, the contractor has demonstrated the capability to use engineering or robotic evaluations to inspect or determine the structural integrity of the facility, or parts of the facility, and verify whether it needs to be stabilized or prioritized for cleanup. For example, such analyses were done at the PUREX tunnels and at the 216-Z-9 Crib, as noted above. Despite this capability, RL management has not directed the cleanup contractor to perform such inspections for some of Hanford’s contaminated excess facilities or parts of facilities. According to RL officials, decisions on regularity and types of inspections and structural evaluations will depend on the known risks associated with the facility. Without directing the contractor to routinely conduct comprehensive inspections to gather crucial information on the condition of contaminated excess facilities, RL cannot ensure that it is meeting all of DOE’s S&M requirements—such as addressing aging degradation and obsolescence of facilities—and preventing other potential events similar to the PUREX tunnel collapse. DOE headquarters offices have conducted some assessments of RL cleanup work but have not conducted any assessments or audits focused on RL’s oversight of the cleanup contractor’s S&M activities since 2013. EM’s Field Operations Oversight/Chief of Nuclear Safety Office and DOE’s Office of Enterprise Assessments are required to conduct independent oversight to the extent necessary to evaluate the effectiveness of DOE field office oversight of contractor activities, including activities needed to maintain contaminated excess facilities in a safe and compliant condition pending their final cleanup. We reviewed 21 DOE HQ oversight reports on RL activity from the past 5 years and determined that none of these assessments or audits focused on RL’s management and oversight of the contractor’s S&M activities for contaminated excess facilities. We spoke with DOE officials from two headquarters offices responsible for independent oversight of DOE field offices—the EM Field Operations Oversight/Chief of Nuclear Safety Office and the Office of Enterprise Assessments. Officials with both headquarters offices confirmed that neither office has conducted a specific assessment or audit focusing on RL’s management and oversight of S&M activities for contaminated excess facilities in the last 5 years. Officials with the Office of Enterprise Assessments told us that, given the limited resources available to conduct oversight, they have to prioritize and be selective about the reviews they plan to conduct in a given year, and conducting an in-depth assessment of RL’s oversight of Hanford S&M activity has not been a priority with that office. In December 2018, the office considered whether to conduct a formal assessment of RL oversight of Hanford S&M activity, but decided that such an assessment was not needed. However, the projected overall time in S&M mode underscores the importance that S&M be adequate to maintain facility safety during the final stages of cleanup operations through a seamless transition to the final disposition of the facility to protect human health and the environment. We found that S&M requirements for selected contaminated excess facilities will continue for decades. Specifically, our review of 18 contaminated facilities at Hanford found that many of these facilities were determined to be excess between the 1960s and the late 1980s and transitioned into S&M status at that time. Notably, our review of these facilities shows that several of them do not have planned cleanup completion dates and for those with cleanup completion dates, cleanup is scheduled to be completed between 1 and 6 decades in the future. Table 2 shows the dates for when the 18 contaminated excess facilities transitioned into S&M mode and how long RL will need to continue S&M activities until cleanup is completed. As S&M of Hanford’s contaminated excess facilities is expected to continue for many decades, conducting an effective S&M program is essential to minimize the risks of potential releases of contamination that could harm the environment or human health before cleanup is completed. Notably, RL has not established final cleanup dates for several of the 18 contaminated excess facilities included in our review. DOE, however, has not conducted independent reviews of S&M oversight activity necessary to determine whether weaknesses exist in RL’s management and oversight of the Hanford Site contractor’s S&M activities for these facilities. Without prioritizing and conducting periodic assessments or audits focused on RL’s management and oversight of the Hanford Site contractor’s S&M activities for contaminated excess facilities, DOE does not have assurance that RL is overseeing S&M activity in a way that ensures contaminated excess facilities are being inspected and maintained in a safe and compliant condition pending final cleanup. RL seeks to balance risks with other factors, such as legally enforceable milestones, available budget, and stakeholder interests, to prioritize cleanup activities that support achieving its overarching Hanford Site cleanup goals, according to RL officials and planning documents. While EM has overall responsibility for managing DOE’s cleanup program, including deactivation and demolition of excess facilities, it has delegated prioritization of cleanup activities to the sites through the annual budget process. As part of the process, EM requests sites develop and submit a site-specific Integrated Priority List to EM management. The Integrated Priority List is based on a number of site-specific factors, including regulatory commitments, agreements with EPA and states, and risks to worker safety and the environment. According to RL officials, EM does not provide specific written guidance for the sites to follow in developing their priority lists, other than a list of seven general factors. RL officials told us that more specific guidance is not necessary because site management needs the flexibility in setting and adjusting cleanup priorities to reflect changes in site conditions and other evolving circumstances as they arise. Since 2017, RL and the Hanford cleanup contractor have been using a new site-wide risk-informed tool, known as the Project Evaluation Matrix, to help inform decisions on which cleanup priorities to include in the Integrated Priority List. The matrix is used to produce a prioritized listing of the stabilization, waste removal, and other activities that need to be completed as part of the deactivation and decommissioning of the contaminated excess facilities and their associated buildings, structures, and waste sites. RL and cleanup contractor officials described the matrix as a broad, overarching tool to aid in establishing a qualitative basis by which they can determine and agree on cleanup priorities that are planned to be executed within the next 1 to 5 years. Neither the Washington State Department of Ecology nor the Environmental Protection Agency is directly involved in the development of the rankings in the matrix. The contractor’s guidance document explains that the risk evaluation process used to develop the matrix rankings involves a number of steps. It starts with the data collection phase, during which RL and the contractor collect information on site conditions from a variety of sources, such as historical records, safety assessments, subject matter experts, and S&M activities. This information is then used to develop relative ranking scores for the various cleanup and S&M activities using weighted scores for three criteria: (1) risk reduction; (2) mortgage reduction/cost avoidance; and (3) TPA milestones/regulatory drivers. The initial scores also take into consideration other factors such as potential consequences of failure and overall project lifecycle costs. After developing an initial risk ranking of cleanup projects and activities, the contractor works with RL management to evaluate the initial results and make adjustments as necessary to reflect comments, changes in conditions, or new work scope. The risk rankings are then updated and used by RL to inform decisions on which projects to prioritize in its Integrated Priority List budget submission to EM. As funding decisions are made and cleanup work proceeds, risks are reassessed and the process starts again. RL officials explained that planned cleanup priorities established in the Integrated Priority List can be adjusted as necessary to reflect information learned through S&M activities and changes in site conditions. For example, routine annual S&M inspections at one facility identified concerns with the integrity of the roof. Based on these concerns, a structural analysis was performed by the cleanup contractor, and RL adjusted its priorities for fiscal year 2016 to include replacing the facility’s roof. Similarly, RL may also modify its planned cleanup priorities to reflect changes in site conditions, such as completing cleanup of a facility or taking actions to stabilize a facility pending its final disposition. For example, based on structural evaluations completed after the partial collapse of Tunnel 1 in May 2017, RL elevated interim stabilization of both PUREX tunnels as among its top priorities in fiscal years 2018-2019. The ability of RL management to establish and adjust cleanup priorities depends on the availability of quality information on site conditions that is reliable, complete, and current. One source of information for this process is annual and routine S&M activities for Hanford’s contaminated excess facilities. These activities, such as facility inspections, structural integrity evaluations, and radiological monitoring, help provide management with updated information on potential changes in site conditions that may lead to an adjustment in previously planned priorities. As discussed above, however, both EM’s 2017 Extent of Condition Review and our review found that parts of certain contaminated excess facilities that may be at risk for structural deterioration—such as the REDOX annexes—are not included in the routine surveillance inspections and have not been inspected within the past 5 years, or longer. We also identified instances where structural integrity evaluations for some facilities, such as for the 216-Z-9 crib and the Plutonium Finishing Plant 241-Z-361 Settling Tank, appear to have relied on outdated information and reached determinations seemingly inconsistent with the contractor’s more recent analyses and conclusions. By conducting comprehensive surveillance inspections of Hanford’s contaminated excess facilities, DOE would have greater assurance that RL and the contractor’s process for identifying cleanup priorities reflects the current status of the potential human health and environmental risks present at such facilities. At Hanford, RL has made progress in cleaning up approximately 800 excess facilities, and six major plutonium production reactors are now cocooned and waiting final dispositioning. Despite efforts to mitigate risks and cleanup excess facilities, significant vulnerabilities remain at Hanford due to, among other things, the degrading state of hundreds of contaminated excess facilities still requiring cleanup. Given the pivotal role of the S&M program in ensuring that aging and degrading contaminated excess facilities do not collapse or fail to contain radioactive or hazardous material, it is important that this program is functioning effectively and that any weaknesses are addressed in a timely manner. The partial collapse of PUREX Tunnel 1 was a clear signal that there are flaws in the S&M program at Hanford. By conducting a root cause analysis to determine any programmatic weaknesses that contributed to the causes of the PUREX Tunnel 1 collapse, and taking action to address any identified weaknesses, DOE will have greater assurance that another, similar event will not occur at Hanford. Additionally, the PUREX Tunnel 1 event demonstrates that RL and the cleanup contractor need complete and updated information regarding the condition of aging contaminated excess facilities to determine if facilities should be stabilized to prevent structural failure or prioritized for cleanup. This information can only be acquired by routinely completing comprehensive surveillance inspections, to include, if necessary, engineering evaluations including the use of remote controlled probes. Without directing the contractor to conduct routine and comprehensive inspections to gather crucial information on the condition of contaminated excess facilities, RL cannot ensure that it is meeting all of DOE’s S&M requirements—such as addressing aging degradation and obsolescence of facilities—and preventing other potential events similar to the PUREX tunnel collapse. Furthermore, because DOE headquarters offices have not prioritized and conducted any assessments or audits focused on RL’s oversight of the cleanup contractor’s S&M activities within the past 5 years or since the PUREX Tunnel 1 collapse, they are missing an opportunity to identify and address any Hanford S&M program weaknesses that may have led to the collapse. We are making the following three recommendations to DOE: The Assistant Secretary of DOE’s Office of Environmental Management should direct RL to conduct a root cause analysis to identify any programmatic causes that may have led to the collapse of PUREX Tunnel 1. (Recommendation 1) The Assistant Secretary of DOE’s Office of Environmental Management, while ensuring the protection of DOE workers, the public, and the environment, should ensure that RL directs the Hanford Site cleanup contractor to explore using robotic or other means to routinely complete comprehensive surveillance inspections of contaminated excess facilities to identify aging degradation and obsolescence of facilities and take timely action as warranted. (Recommendation 2) The Secretary of Energy should ensure DOE headquarters offices responsible for the oversight of EM sites’ field offices conduct an assessment of RL’s management and oversight of the Hanford Site contractor’s surveillance and maintenance activity for contaminated excess facilities. Based on the results of this assessment, DOE headquarters offices should consider whether such assessments should be conducted on a periodic basis. (Recommendation 3) We provided a draft of this report to the Secretary of the Department of Energy. In its written comments, reproduced in appendix III, DOE agreed with the report’s findings and concurred with our recommendations. In addition, DOE described ongoing and planned actions to address our recommendations by December 31, 2020. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees; the Secretary of Energy; the Director, Office of Management and Budget; and other interested parties. In addition, the report will be available at no charge on the GAO website at www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. This report reviews issues related to the cleanup, inspection and maintenance of Hanford’s contaminated excess facilities, such as the Plutonium Uranium Extraction Plant (PUREX), and how the Department of Energy (DOE) and the Richland Operations Office (RL) prioritizes and schedules cleanup and ensures that the Hanford Site contractor inspects and maintains these facilities. The objectives of our review were to (1) examine actions DOE has taken to evaluate the causes of the PUREX Tunnel Collapse, 2) examine the extent to which DOE ensures that the contractor’s surveillance and maintenance of Hanford’s contaminated excess facilities meet DOE requirements, and (3) describe how DOE determines the priority ranking and schedule for cleanup of Hanford’s excess facilities. To examine actions DOE has taken to address the PUREX Tunnel Collapse and the extent to which DOE ensures that the contractor’s surveillance and maintenance (S&M) of Hanford’s contaminated excess facilities meets DOE requirements, we reviewed DOE orders, policies, RL procedures, and documents that describe DOE’s S&M requirements. We also obtained and reviewed DOE evaluation reports and assessments of S&M activities and operations at Hanford facilities; these include the Office of Environmental Management’s (EM) 2017 Extent of Condition Review for Excess Facilities and historic S&M assessment reports on PUREX tunnel structural stability. To describe how DOE determines the priority ranking and schedule for Hanford cleanup work of Hanford’s contaminated excess facilities, we reviewed federal environmental regulations, legal agreements, planning documents from DOE and the Hanford cleanup contractor, DOE directives and guidance, and reports by the Consortium for Risk Evaluation with Stakeholder Participation and others on ways to consider risk in making cleanup decisions. These include, but are not limited to, the Tri-Party Agreement (TPA) and associated Action Plan; EM’s Fiscal Year 2020 budget request; RL’s 2015 Vision and 2020Vision, which include high-level cleanup priorities and goals; the Hanford cleanup contractor’s Project Evaluation Matrix and its associated guideline; and RL’s Integrated Priority List. For all objectives, we also interviewed DOE officials with RL, the DOE Office of Inspector General at Hanford, and DOE headquarters offices, including the Office of Enterprise Assessments and EM’s Office of Safety, Security, and Quality Assurance. In addition, we interviewed Hanford cleanup contractors, officials from the Washington State Department of Ecology, and officials from the Defense Nuclear Facilities Safety Board. Due to the large number of Hanford contaminated excess facilities requiring cleanup (approximately 800), we focused our review on 18 contaminated excess facilities. These contaminated excess facilities represent the majority of the excess facilities cleanup effort and include some of the most challenging of the non-tank waste cleanup efforts remaining at Hanford, according to DOE officials. We chose key excess contaminated facilities as identified in the TPA because, among other things, DOE and its regulators identify these facilities in Section 8 of the agreement as presenting sufficient potential environmental concern that coordination of the decommissioning process with cleanup activities under the agreement was deemed necessary. We also selected the five other contaminated excess facilities because DOE identified them as having 1) high risks to the environment, workers, and public safety, 2) high annual S&M costs, and 3) high disposition costs. See Table 1 in the report for summary descriptions of each facility we selected. To gather information about RL’s planning on S&M activities at Hanford and estimated costs for fiscal year 2019, we administered a questionnaire to RL facility representatives responsible for overseeing the cleanup contractor’s implementation of S&M for contaminated excess facilities. For each facility, the representatives were asked whether there was an S&M plan for the facility, when it was developed, and when it was most recently updated. We also asked about the type and frequencies of facility inspections, whether the facility included areas where structural integrity was a concern, if any structural integrity evaluations had been conducted, and whether any significance corrective or preventative maintenance had been performed. We also asked them to explain the facility representative’s role in overseeing that the contractor was conducting S&M activities in accordance with the applicable plan and DOE requirements. A copy of the complete questionnaire is included in appendix II. We conducted two pretests of the questionnaire with RL officials in November and December 2018, and we revised it in response to their comments. During this process, we sought to ensure that (1) the questionnaire questions were clear and unambiguous, (2) terminology was used correctly, (3) the questionnaire did not place an undue burden on respondents, and (4) respondents had sufficient information to answer the questions. For the questionnaire we identified an initial set of 21 contaminated excess facilities based on the following criteria: (1) whether they were a key facility identified by DOE and its regulators in Section 8 of the Tri- Party Agreement Action Plan and (2) whether we considered them to be a contaminated excess facility that poses high risks to the environment, workers, and public safety; (3) whether it has potentially high annual surveillance and maintenance costs; and (4) whether it has high final disposition costs based on information we gathered from DOE. After further correspondence with RL officials, we agreed that three of the contaminated excess facilities on our list could be deleted because they were not in S&M mode, as cleanup was completed for one facility, one was undergoing active cleanup, and the other was in operational status. We sent the questionnaire by email in a password-protected Word document to which respondents could return electronically after marking checkboxes or entering responses into open-answer boxes. We sent the questionnaire with a cover letter to DOE officials on January 10, 2019, with a request to complete and return it by January 31, 2019. By February 25, 2019, we received completed questionnaires for each of the 18 selected contaminated excess facilities. In addition, to provide further context for all objectives, we conducted in- depth reviews regarding S&M of selected Hanford facilities. For these reviews, we selected four high-risk facilities: PUREX, REDOX, the 224B Concentration Facility, and the 216–Z-9 Crib. We used a judgmental (non-probability) sample to select four contaminated excess facilities for in-depth review. These facilities have been identified by DOE, the DOE Office of Inspector General, or the Consortium for Risk Evaluation with Stakeholder Participation as contaminated excess facilities with concerns regarding high risks to the environment, workers, and public safety and risk of potential release of radioactive material and other hazardous materials due to aging degradation and weakening structural integrity. In addition, these contaminated excess facilities are moderate- to high-risk priority facilities for cleanup, according to the contractor’s June 2018 Project Evaluation Matrix, but not scheduled to start cleanup for at least 5 years. For these reviews, we examined DOE documents, including inspection records dating back to the start of fiscal year 2008 through the end of fiscal year 2018 to determine if inspections were occurring, and interviewed RL officials. We conducted this performance audit from March 2018 to January 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individual named above, Ned Woodward, Assistant Director; Tara Congdon; Justin Fisher; Richard Johnson; Michael Meleady; Peter Ruedel; Sara Sullivan; and Roxanne Sun made key contributions to this report.", "summary": "DOE's Hanford site in Washington State contains thousands of contaminated excess facilities and waste sites that remain to be cleaned up. In May 2017, a partial roof collapse at a waste storage tunnel facility for one of the former plutonium nuclear processing plants raised questions about the S&M of Hanford's excess facilities and how RL prioritizes cleanup of these facilities. GAO was asked to review DOE's cleanup of Hanford's contaminated excess facilities, including how DOE ensures that the Hanford Site contractor inspects and maintains facilities. This report examines, among other things, (1) DOE's actions to evaluate the causes of the PUREX tunnel collapse, and (2) the extent to which DOE ensures that S&M of Hanford's contaminate excess facilities meet DOE requirements. GAO reviewed DOE documents, administered a questionnaire to collect S&M information about 18 selected facilities representing the majority of the Hanford facilities cleanup effort, conducted in-depth reviews of selected Hanford facilities, and interviewed DOE and Hanford cleanup contractor officials. The Department of Energy (DOE) has taken some actions to evaluate the physical causes that contributed to the May 2017 partial collapse of the Plutonium Uranium Extraction (PUREX) Tunnel 1, but has not determined the programmatic causes that led to the collapse, such as by completing an accident investigation or a root cause analysis, among other things. For example, although an engineering evaluation of the tunnels was completed at the request of the State of Washington, Richland Operations Office (RL) officials told GAO an accident investigation was not initiated because the event did not meet threshold requirements in a DOE order that includes, among other things, damages or costs exceeding $2.5 million. However, GAO's analysis shows that the costs of responding to the event and stabilizing the tunnel were about $10 million. At the contractor's request, RL also waived performance of a root cause analysis, which DOE guidance states is typically required for such a significant event, and agreed to a less rigorous analysis of the potential physical causes of the event. By conducting a root cause analysis to determine any programmatic weaknesses that contributed to the collapse of PUREX Tunnel 1, and taking action to address any identified weaknesses, DOE will have greater assurance that another, similar event will not take place. According to a DOE report and GAO's review, although the Hanford contractor is generally conducting routine surveillance inspections of contaminated excess facilities, these inspections have weaknesses and GAO found that DOE has not ensured requirements are fully met. Specifically, DOE orders require that processes be in place to ensure that inspections are conducted to detect deterioration and determine whether the structural integrity of facilities is threatened. A December 2017 DOE report and GAO's review found that the surveillance and maintenance (S&M) inspections at several facilities were not comprehensive and that there are areas of some facilities that personnel infrequently or never enter—physically or by remote means—to conduct inspections. For example, parts of the Reduction-Oxidation Facility have not been entered in more than 50 years and structural conditions are unknown. Without conducting comprehensive inspections, RL cannot ensure that it is meeting all of DOE's S&M requirements, such as addressing aging degradation and obsolescence of some facilities, and preventing other potential events similar to the PUREX tunnel collapse. In addition, GAO's review of oversight reports since 2013 by DOE headquarters offices responsible for evaluating field office operations found that none of these assessments focused on RL's management and oversight of the contractor's S&M activities. DOE's Oversight Policy requires DOE to conduct independent oversight to the extent necessary to evaluate the effectiveness of DOE field office oversight of contractor activities. Without conducting periodic assessments or audits focused on RL's management and oversight of the contractor's S&M activities for contaminated excess facilities, DOE does not have assurance that RL is overseeing S&M activity in a way that ensures these facilities are inspected and maintained in a safe and compliant condition pending final cleanup. GAO recommends that DOE (1) analyze the programmatic root causes of the tunnel collapse, (2) routinely conduct comprehensive inspections of contaminated excess facilities and take timely action as warranted, and (3) assess RL oversight of S&M of Hanford excess facilities. DOE agreed with GAO's recommendations and stated that it is taking steps to implement all of them by December 2020.", "document_type": "gao"}
{"report": "The Marine Corps’ Marine Helicopter Squadron One (HMX-1) currently uses a fleet of 23 helicopters to support the President in the national capital region, the continental United States and overseas. In April 2002, the Navy began developing a replacement helicopter later identified as the VH-71. Schedule delays, performance issues, and a doubling of estimated acquisition costs from $6.5 billion to $13 billion prompted the Navy to terminate the VH-71 program in 2009. Our prior work found that the VH-71 program’s failure to follow acquisition best practices was a critical factor in the program’s poor performance that led to its ultimate termination. In the case of the VH-71, the Navy had a faulty business case, did not perform appropriate systems engineering analysis to gain knowledge at the right times, and failed to make necessary trade-offs between resources and requirements even after years of development. Because of these failures, the program was unable to achieve a stable design and experienced significant cost growth and schedule delays. Although the prior replacement program was terminated, the need for a replacement helicopter remained. As a result, the Navy initiated a follow- on replacement program in 2010. In April 2012, the Secretary of Defense approved the Navy’s plan based on the modification of an in-production helicopter to meet Navy requirements. The VH-92A is expected to provide improved performance, survivability, and communications capabilities, while offering increased passenger capacity when compared to legacy helicopters. In May 2014, the Navy competitively awarded a contract to Sikorsky to develop the VH-92A, which included options for production. The $2.7 billion contract includes a fixed-price incentive (firm target) Engineering and Manufacturing Development (EMD) phase and a firm-fixed price production phase with options for three lots for 17 helicopters, spares and support equipment. Under the EMD phase, Sikorsky has delivered two development test helicopters which were used in an operational assessment that was completed in April 2019. Additionally, Sikorsky has delivered three of four System Demonstration Test Article (SDTA) production representative helicopters that are being used in developmental testing and that will also be used to evaluate the VH-92A’s operational effectiveness and suitability during the program’s Initial Operational Test and Evaluation (IOT&E). The fourth SDTA helicopter is to be delivered in May 2020 and will also be used to conduct IOT&E. In June 2019, the Assistant Secretary of the Navy, Research, Development and Acquisition (RD&A) approved the program to begin low-rate initial production of the helicopters and authorized the program to exercise the contract options for the first two low-rate production lots. Shortly thereafter, the Navy exercised the Lot l option for 6 helicopters, initial spares, and support equipment for $542 million. Those helicopters, initial spares and support equipment are all to be delivered in calendar year 2021. In February 2020, the Navy exercised the Lot ll option for $471 million for 6 additional helicopters and associated support equipment. All of these helicopters and support equipment will be delivered in calendar year 2022. The Navy had planned for two years of low-rate initial production of 6 helicopters each year followed by one year of full-rate production for the remaining 5 helicopters. The Navy’s acquisition strategy in support of the production decision included a change in that plan with the re-designation of full-rate production as a third lot of low-rate production. A key reason for the change is that the planned full-rate production run of 5 helicopters was too small to achieve the potential cost benefits of full-rate production, which typically involves purchasing a sufficient number of helicopters to decrease unit cost. This revised strategy would also enable the Navy to award the third production lot seven months earlier than the originally planned May 2021. Before obligating the funding available for the second lot, the program office had to brief the Assistant Secretary of the Navy (RD&A) on various elements of the VH-92A’s performance. The program office is required to obtain approval from the Assistant Secretary of the Navy (RD&A) for the procurement of the last lot (Lot lll) with a decision brief that includes, among other things, the status of IOT&E. Building a VH-92A helicopter involves work at three facilities. To begin the production process, Sikorsky takes an S-92A helicopter from its commercial production line in Coatesville, Pennsylvania and flies it to a dedicated VH-92A modification facility in Stratford, Connecticut. Once there, Sikorsky removes some components, such as circuit breaker panels, engines, and main and tail rotor blades and replaces them with VH-92A components. Additionally, Sikorsky modifies the helicopter to accommodate VH-92A specific subsystems, including racks and wiring for a Navy-developed mission communications system (MCS). Sikorsky then flies the helicopter to a dedicated facility in Owego, New York where it integrates the MCS, installs the executive cabin interior, paints the helicopter, and conducts final testing before delivering the helicopter to the government. See figure 1 for a depiction of modifications of the commercial S-92A helicopter to the VH-92A presidential helicopter. We have reported annually on the Navy’s effort to replace the current fleet of presidential helicopters since 2011. Our reports highlighted, in part, the extent to which the Navy used the lessons learned from the failed VH-71 program—the need to balance requirements, costs, and schedule and the importance of establishing a knowledge-based program that is aligned with acquisition best practices—in its new effort. For example, our 2011 report found that while the replacement program was early in its development cycle, the Navy’s initial efforts appeared to reflect the intent to pursue a best practices aligned knowledge-based acquisition. Following the program’s entry into the EMD phase of acquisition in April 2014, we found that the Navy’s reliance on mature technologies, selection of an existing helicopter for use in the program, and award of a fixed-price incentive type contract reduced risk. As to be expected with a major system development effort, however, we found the program still faced a number of technical challenges. In four reports issued from 2016 to 2019, we found that the Navy continued making progress in developing the VH- 92A helicopter while managing design, integration and technical challenges. Some key technical risk and challenges that we previously identified are summarized in table 1. We discuss the current status of the Navy’s efforts to address these challenges later in the report. In April 2019, the Navy estimated that the VH-92A would cost about $4.9 billion to develop and produce and about $15.6 billion to operate and support the helicopters through fiscal year 2062. Overall, the Navy’s $20.5 billion estimate reflects a 10-percent reduction from the program’s 2014 baseline estimate (see table 2). The Navy and contractor officials worked together to remain within the program’s April 2014 cost baseline, in part, by keeping requirements stable, limiting the design changes, and taking advantage of cost saving initiatives. For example, the Navy has not added any key performance requirements to the fixed-price incentive contract since it was awarded in 2014. The Navy has, however, implemented a small number of design changes to add an additional cockpit display and increase the height of the upper portion of the forward aircraft door. Previously, we found that cost saving initiatives included leveraging the Federal Aviation Administration’s airworthiness certification process, optimizing work processes, and reducing the movement of helicopters between contractor sites. In addition, the Navy attributes the reduction in cost to support the VH- 92A fleet to using a planned maintenance interval concept as the basis for its April 2019 cost estimate. Program officials explained that the April 2014 baseline estimate was based on the approach used to maintain the current fleet of VH-3D and VH-60N presidential helicopters. For these helicopters, the contractor carries out depot-level maintenance by disassembling, inspecting, and reassembling them at its maintenance depot. However, for the VH-92A, the Navy intends to perform depot-level maintenance itself through scheduled inspections at its own presidential helicopter support facility, which was designed to support this approach. As a result, the Navy expects to be able to support the VH-92A fleet in a more cost-effective manner while ensuring the availability of the helicopter to perform its mission. The program has made progress addressing technical risks and performance challenges we discussed in prior reports and deficiencies confirmed during the April 2019 operational assessment. According to program officials, solutions for these performance shortfalls, except for the landing zone suitability issue, have been developed and successfully tested during integrated testing and will be evaluated during the 3-month IOT&E test scheduled to begin in June 2020. The program is pursuing options to achieve landing zone suitability that include possible changes in operational procedures, helicopter design, and lawn surface treatments. If design modifications are required, they will not be implemented until after IOT&E. As a result, the Navy may not be able to fully demonstrate that the VH-92A helicopter meets all its key requirements until after the test program is complete. Further, IOT&E results may also identify additional issues that may require additional design or software changes. Depending on the severity of the issues, the Navy may need additional time to test and incorporate changes into the helicopter, including those helicopters currently in production. The program office has mitigated or reduced risk on some technical issues we discussed in prior reports. For example, according to program documents, the program has mitigated the risk in the following areas: helicopter start procedures, electromagnetic environment effects/ electromagnetic pulse and cybersecurity. The Navy assessed these capabilities during earlier developmental test and during the operational assessment, which concluded in April 2019; subsequently, the Navy approved the program to enter into production. However, the operational assessment confirmed other known performance shortfalls—specifically those associated with the MCS—that, if not corrected, could prevent the program from meeting certain operational requirements. The MCS replaces the communications suite currently used by the in- service fleet and provides VH-92A passengers, pilots, and crew with simultaneous short- and long-range secure and non-secure voice and data communications capabilities. As such, its performance is critical for the VH-92A to meet its mission. To conduct its operational assessment, the Navy used two development test helicopters and a developmental version of MCS software with known performance and capability limitations. The operational assessment confirmed these MCS-related performance limitations, including dropped communication connections. Navy officials noted that these and other MCS-related performance shortfalls could, if not addressed, reduce the helicopter’s availability to perform its transport mission and lower overall reliability, among other operational requirements. Overall, the operational assessment confirmed 24 MCS-related performance limitations. According to program officials, they have incorporated or identified fixes to 22 of the 24 issues, which they are now testing on SDTA helicopters. In turn, these fixes are expected to be incorporated into MCS software that will be tested during IOT&E. According to program officials, the remaining two MCS issues are related to bandwidth and an unreliable off-aircraft network configuration affecting on-aircraft system performance. According to those officials, the VH-92A is already equipped with a wide-band line-of-sight system that provides high bandwidth, though with coverage limitations. The program is conducting market research on how to provide the helicopter with increased bandwidth with increased coverage. The remaining two issues were assessed earlier as having a serious (but not critical) impact to mission accomplishment. In addition to the MCS deficiencies, the helicopter experienced problems with other components during the April 2019 operational assessment. For example, the mission and maintenance data computer repeatedly sent out false warning alarms/notifications, which affected the reliability and required the aircrew to spend extra time troubleshooting or switch to a backup helicopter. A software update to help address this issue is planned for the computer prior to IOT&E. The program is also still working to demonstrate the ability of the helicopter to meet a key system capability requirement to land the helicopter without damaging landing zones (including the White House South Lawn). For landing zone suitability, the program’s objective has been to assess the downwash and exhaust effects on the landing zone. In a September 2018 training event, the Navy found that VH-92A’s exhaust damaged a landing zone. Program officials stated that the training event did not represent a typical operational scenario since the lawn was exposed to the helicopter’s exhaust for a longer period than it would be under normal operating conditions. The program is studying solutions to minimize risk of landing zone damage including possible changes in operational procedures, helicopter design, and lawn surface treatments. For example, the contractor developed a prototype design change to the helicopter’s auxiliary power unit to deflect exhaust. Flight testing of the prototype design change was conducted in March 2020 with analysis of the results expected in April 2020. Navy officials stated the contractor is also conducting testing to determine if changes in helicopter and/or engine operating procedures can mitigate the risk of landing zone damage. According to both program officials and contractor representatives, a decision on potential solutions will be made prior to IOT&E. If design modifications are required, they will not be implemented until after IOT&E. Initial operational testing of the VH-92A, which will be used to evaluate operational effectiveness and suitability of the helicopter, training system, support equipment, upgraded MCS software and other changes implemented to address previously identified issues, is now scheduled to be conducted between June and September 2020. As such, IOT&E will be conducted about 3 months later than we reported in 2019, but is expected to be completed by the threshold (latest acceptable) date in the Navy’s April 2014 baseline. Program officials attributed the 3-month delay to the need to develop MCS hardware and software changes that are currently being tested. Should IOT&E demonstrate that efforts to address the MCS performance issues or other previously identified issues are insufficient—or if the testing identifies new issues that result in the program being unable to meet its operational requirements—then the program may need to identify, test and incorporate changes into the VH- 92A’s design and into the helicopters already in production, further delaying the program and increasing associated costs. As previously noted, the first delivery of the helicopters ordered under the first production option is scheduled to begin in April 2021. As a result of the revised IOT&E test schedule, the program office has also delayed the initial operational capability (IOC) milestone, which clears the helicopter to enter service, by 3 months to January 2021. This new date represents a total delay of 6 months from the original date but still remains within the IOC threshold date established in April 2014. Figure 2 compares the program’s 2019 schedule with the 2014 baseline schedule and the 2018 schedule we reported on last year. Program officials acknowledged that if there is a delay in the program that results in the program breaching a schedule threshold established in its acquisition baseline, they would need to submit a program deviation report to the Assistant Secretary of the Navy (RD&A). In turn, the program may need to keep certain staff in place longer than originally planned, potentially increasing program costs. However, program officials told us that the program can cover any additional costs with existing funding. Further, Navy officials stated that should IOC be delayed, the Navy will continue to use its existing fleet of presidential helicopters as the VH-92A transitions into the HMX-1 fleet. Navy officials indicated that the transition process will be gradual, and that the existing fleet is sufficiently funded until HMX-1 completes the transition. We are not making any recommendations in this report. We provided DOD with a draft of this report. DOD provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense and the Secretary of the Navy. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or DiNapoliT@gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix l. In addition to the contact above, Bruce H. Thomas, Assistant Director; Marvin E. Bonner; Bonita J.P. Oden; Alexander Webb; Peter Anderson; Robin Wilson; and Marie Ahearn made key contributions to this report. Presidential Helicopter: Program Continues to Make Development Progress While Addressing Challenges. GAO-19-329. Washington, D.C.: April 11, 2019.* Presidential Helicopter: VH-92A Program Is Stable and Making Progress While Facing Challenges. GAO-18-359. Washington, D.C.: April 30, 2018.* Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: March 30, 2017.* Presidential Helicopter: Program Progressing Largely as Planned. GAO-16-395. Washington, D.C.: April 14, 2016.* Presidential Helicopter Acquisition: Program Established Knowledge- Based Business Case and Entered System Development with Plans for Managing Challenges. GAO-15-392R. Washington, D.C.: April 14, 2015.* Presidential Helicopter Acquisition: Update on Program’s Progress toward Development Start. GAO-14-358R. Washington, D.C.: April 10, 2014. Department of Defense’s Waiver of Competitive Prototyping Requirement for the VXX Presidential Helicopter Replacement Program. GAO-13-826R. Washington, D.C.: September 6, 2013. Presidential Helicopter Acquisition: Program Makes Progress in Balancing Requirements, Costs, and Schedule. GAO-13-257. Washington, D.C.: April 9, 2013. Presidential Helicopter Acquisition: Effort Delayed as DOD Adopts New Approach to Balance Requirements, Costs, and Schedule. GAO-12-381R. Washington, D.C.: February 27, 2012. Defense Acquisitions: Application of Lessons Learned and Best Practices in the Presidential Helicopter Program. GAO-11-380R. Washington, D.C.: March 25, 2011. *GAO issued these reports on the VH-92A program in response to a provision in National Authorization Defense Act of 2014.", "summary": "The mission of the presidential helicopter fleet is to provide safe, reliable, and timely transportation in support of the President. The Navy plans to acquire a fleet of 23 VH-92A helicopters to replace the current Marine Corps fleet which has been in use for more than 40 years. Delivery of production VH-92A helicopters is scheduled to begin in April 2021 and be completed in January 2023. The National Defense Authorization Act of 2014 included a provision for GAO to report annually on the acquisition of the VH-92A helicopter. This report, GAO's sixth related to the provision, examines (1) the extent to which the program is meeting cost goals and (2) performance and schedule challenges that the program has experienced. To conduct this work, GAO compared the Navy's April 2019 cost estimates for acquiring and maintaining the new helicopters and October 2019 program schedule information to its April 2014 acquisition baseline. GAO reviewed development test results and status reports from the program. GAO also interviewed officials from the program office, Navy test organizations, and the contractor. GAO is not making any recommendations in this report. The Navy estimates the cost to develop, procure, and maintain the VH-92A ® over its 40-year operational life to be just over $20.5 billion, or about 10 percent less than the Navy's 2014 baseline estimate (see table). Navy and contractor officials worked to remain within the program's April 2014 cost baseline estimate, in part, by keeping program requirements stable, limiting design changes, and taking advantage of cost saving initiatives. The Navy also plans to use Navy personnel and facilities to perform depot-level maintenance for the VH-92A fleet, rather than sending the helicopters back to the contractor as is currently done. The program has made progress addressing technical risks and performance challenges GAO discussed in prior reports; however, an April 2019 operational assessment confirmed several other risks that could affect the helicopter's ability to meet its reliability and availability requirements. For example, Navy officials stated that the assessment confirmed known limitations with the mission communications system. Upgraded software intended to address those limitations is to be evaluated during the initial operational test and evaluation scheduled to be conducted between June and September 2020. The results of that testing could impact the Navy's planned January 2021 decision to begin using the helicopters as part of the presidential helicopter fleet.", "document_type": "gao"}
{"report": "This section provides information on the electricity provider, impact of 2017 hurricanes, and status of electricity restoration in Puerto Rico and the U.S. Virgin Islands. Also, it describes FEMA’s Public Assistance Program. Electricity provider. PREPA is a public power utility owned by the Commonwealth of Puerto Rico and a monopoly supplier of electricity in the commonwealth. It is also one of the nation’s largest public power utilities, serving approximately 1.5 million customers. PREPA was approximately $9 billion in debt prior to Hurricanes Irma and Maria, and its electric power infrastructure was known to be in poor condition, largely due to underinvestment and poor maintenance practices. In May 2018, we found that inadequate management of PREPA’s financial condition contributed to Puerto Rico’s persistent deficits. Specifically, PREPA did not update or improve its electric generation and transmission systems, which hampered their performance and led to increased costs of producing electricity that it did not fully pass on to consumers. In addition, Puerto Rico’s economy is in a prolonged period of economic contraction, and according to U.S. Census Bureau estimates, its population declined from a high of approximately 3.8 million people in 2004 to 3.3 million people in 2017, a decline of 12.8 percent. Along with the declining population, demand for electricity declined 18 percent from 2007 to 2017, according to PREPA. Impact of 2017 hurricanes. Hurricanes Irma and Maria in September 2017 left Puerto Rico’s entire electricity grid inoperable, according to the economic and disaster recovery plan for Puerto Rico. According to a report by a working group that included utilities and national laboratories, among others, because of the extended and unprecedented damage, a significant portion of the generation, transmission, and distribution system must be rebuilt, including high-voltage transmission lines that often survive lower category hurricanes. While Puerto Rico’s population had already been declining, the migration of people from Puerto Rico accelerated following the hurricanes, according to PREPA. Status of electricity restoration. According to PREPA, it took roughly 11 months for power to be restored to all of the customers able to receive power safely in Puerto Rico following the hurricanes. A PREPA official told us that PREPA’s estimates of customers with power restored are based on the number of meters that it knows are served by a given power line and on the number of meters it can read currently. Power has been restored to 100 percent of customers that are able to receive power safely, but this does not mean that all pre-storm customers have power restored, as some structures may not have been deemed safe for power restoration, according to PREPA officials. Figure 1 shows the percentage of customers with electricity restored in Puerto Rico beginning in January 2018 when PREPA was able to start estimating this information. Although PREPA estimates that electricity had been restored to all customers by August 2018, in some instances electricity service has been supported by temporary generators, and outages have continued. For example, as of December 11, 2018, USACE was supporting seven generators that were supporting micro grids for the island municipalities of Vieques and Culebra. These islands had previously been served by an undersea transmission line connecting the islands to PREPA’s main grid on Puerto Rico. According to the U.S. Energy Information Administration, total electricity sales in Puerto Rico returned to pre–Hurricane Maria levels as of April and May 2018, although residential electricity sales appear to continue to lag historical levels, reflecting some continued outages. Electricity provider. VIWAPA, a public utility, is a monopoly provider of electric power services in the U.S. Virgin Islands and serves approximately 55,000 customers throughout the territory. Like PREPA, VIWAPA faced financial challenges before the hurricanes. The USVI Hurricane Recovery and Resilience Task Force Report noted that VIWAPA has a 17 percent non-payment rate across its customer base, a significant unfunded pension liability, and long-term debt commitments of $265 million. In addition, the report states that the U.S. Virgin Island’s energy system faces many challenges that have led to higher rates and a historically unreliable grid. These include an aging, inefficient, and oversized infrastructure and heavy reliance on imported fossil fuels. The report also says that peak demand declined 18 percent from 2011 through 2017, driven by a variety of factors, including population decline. In addition, the report says that VIWAPA’s high energy rates and reliability issues have led some customers— particularly larger commercial and industrial ones—to leave the grid. Impact of 2017 hurricanes. Hurricanes Irma and Maria damaged more than 90 percent of VIWAPA’s aboveground power lines and over 20 percent of VIWAPA’s generation capacity, according to the USVI Hurricane Recovery and Resilience Task Force Report. Specifically, the hurricanes damaged more than 20,000 poles and 1,100 miles of transmission and distribution lines, according to the report. Although 90 percent of VIWAPA’s above ground power lines were damaged, this was far fewer than the miles of transmission and distribution lines damaged in Puerto Rico. Electricity status. According to VIWAPA, following the hurricanes, it took roughly 5 months for power to be restored to all of the eligible customers in the U.S. Virgin Islands. Eligible customers were those whose homes were safely able to receive power. Some homes had suffered substantial damage to their electrical infrastructure from the hurricanes and were not able to receive power safely until their electrical equipment was repaired. VIWAPA’s estimates of customers with power restored are based on the number of meters that VIWAPA knows are served by a given power line, as VIWAPA’s automated system for determining the percentage of customers without power was destroyed and is still being restored, according to a FEMA official. Although electricity service has been restored, electricity demand has not recovered to prestorm levels. According to the USVI Hurricane Recovery and Resilience Task Force Report, VIWAPA’s peak demand—the maximum energy load consumed by customers at any point in a year—was approximately 107 megawatts before the storms, but as of May 2018 it was 66 megawatts. The report says that demand will likely rebound to some degree as the territory rebuilds and recovers; however, it is unclear how quickly or by how much. FEMA, in leading the coordination of federal disaster response efforts, provides assistance through its Public Assistance Program to state, territorial, local, and tribal governments and certain types of private nonprofit organizations to assist them in responding to and recovering from major disasters or emergencies. FEMA Public Assistance Program funds can be provided for emergency work, such as for emergency protective measures that must be done immediately to protect public health and safety; permanent work, which includes the restoration of disaster-damaged management costs, which include indirect costs, administrative expenses, or other expenses that are not directly chargeable to a specific project and that a recipient or subrecipient incurs in administering and managing Public Assistance awards. Generally, emergency work takes place for about 6 months following a disaster, while permanent work can take place over a decade, according to FEMA officials. FEMA can provide grants for both emergency and permanent work, and it can also provide direct federal assistance for emergency work. Under direct federal assistance, federal agencies directly perform or contract for the emergency work. FEMA’s Public Assistance Program allows for the federal government to provide direct assistance at the request of the state, territorial, and local governments when the impact of an incident is so severe that the state, territorial, and local governments lack the capability to perform or contract eligible emergency work. Under the Public Assistance Program and the Stafford Act, FEMA may mission assign—issue a work order that directs another federal agency, such as DOE or USACE to utilize its authorities and the resources granted to it under federal law—in support of this direct assistance to state, local, and territorial governments. The Community Disaster Loan program provides loans to local governments that have suffered substantial loss of tax and other revenue in areas included in a major disaster declaration. The loan funding may be used for existing essential municipal functions and expanded functions required to meet disaster-related needs, but not for capital improvements or repair or restoration of damaged public facilities. Federal agencies provided traditional support to restore electricity in response to Hurricanes Irma and Maria in both Puerto Rico and the U.S. Virgin Islands—such as providing temporary power for critical facilities. They also provided unprecedented support in Puerto Rico by helping to coordinate efforts to repair Puerto Rico’s electricity grid rather than primarily supporting the local utility’s efforts. Factors that affected the electricity grid restoration efforts in Puerto Rico and the U.S. Virgin Islands included logistical constraints, availability of materials, the financial condition of local utilities, and the unprecedented and extensive role of federal agencies. Appendix I provides timelines of federal and other efforts to support electricity grid restoration in Puerto Rico and the U.S. Virgin Islands after the 2017 hurricane season. Federal agencies assisted in the restoration of electricity after Hurricanes Irma and Maria in a variety of ways. FEMA provided billions in grants and direct federal assistance for electricity restoration. DOE provided subject matter expertise and coordination assistance. USACE provided temporary emergency power in Puerto Rico and the U.S. Virgin Islands. In addition, FEMA and USACE undertook unprecedented roles to help coordinate and directly assist with grid restoration in Puerto Rico. Grants, direct federal assistance, and loans from FEMA. FEMA provided billions in grants and direct federal assistance to support electricity restoration in Puerto Rico and the U.S. Virgin Island through its Public Assistance Program. As public utilities, both PREPA and VIWAPA are eligible applicants for federal assistance through FEMA’s Public Assistance Program for the repair, restoration, and replacement of public facilities damaged or destroyed by a major disaster. As of July 20, 2018, FEMA had obligated approximately $3.2 billion for direct federal assistance through mission assignments and Public Assistance grant funds for electricity restoration in Puerto Rico and approximately $795 million for the U.S. Virgin Islands. This includes $2 billion that FEMA obligated for direct federal assistance through mission assignments to USACE for temporary emergency power and grid restoration efforts in Puerto Rico. In the U.S. Virgin Islands, FEMA obligated $63 million for direct federal assistance related to electricity restoration, most of which was obligated to USACE and DOE. Table 1 shows FEMA funding obligations for electricity restoration efforts in Puerto Rico and the U.S. Virgin Islands. In addition, FEMA provided $75 million to VIWAPA through the Community Disaster Loan program as of July 20, 2018, according to FEMA officials. FEMA officials said that the most common use for Community Disaster Loan funds is payroll, and other examples of eligible uses include employee benefits, facilities maintenance costs, and normal operating materials. Coordination and technical assistance from DOE. DOE received mission assignments from FEMA and deployed staff from its headquarters, site offices, and power marketing administrations to provide subject matter expertise and technical assistance in support of electricity grid damage assessments and power restoration efforts in both Puerto Rico and the U.S. Virgin Islands. According to DOE officials, DOE’s primary role in the response efforts on Puerto Rico and the U.S. Virgin Islands was coordination and provision of subject matter experts, as is typical for DOE’s role as the lead agency for the energy sector emergency support function. In Puerto Rico, however, DOE provided more advisors for a longer period of time than would be typical because of the extent of the damage to the electricity grid in Puerto Rico and PREPA’s limited capacity to respond, according to DOE officials. Specifically, DOE staffed up to 12 project support advisors to Puerto Rico from October 18, 2017, to August 8, 2018, and one supply chain support advisor from December 18, 2017, to March 16, 2018. These advisors provided subject matter expertise to USACE by reviewing construction plans and providing recommendations for prioritization, and scheduling and assisting in inventory management for incoming electrical grid equipment, among other things, according to DOE. In addition, in the U.S. Virgin Islands DOE deployed a team of 36 people from the Western Area Power Administration along with trucks and materials to help rebuild the electricity grid through a FEMA mission assignment. DOE officials told us that the department is also providing ongoing support on how to improve grid resilience as part of grid restoration and recovery efforts in both Puerto Rico and the U.S. Virgin Islands. Temporary power from USACE. USACE provided temporary emergency power for critical facilities in Puerto Rico and the U.S. Virgin Islands. These temporary emergency power missions provided and maintained generators to deliver electricity to critical public facilities, such as hospitals and relief centers. After receiving a FEMA mission assignment to provide temporary emergency power in Puerto Rico, USACE deployed its Emergency Power Planning and Response Team, USACE government employees, soldiers from the 249th Engineer Battalion, and contractors. USACE installed a record number of emergency electric generators in Puerto Rico—over 2,300—through the end of May 2018. The previous record was 310 emergency generators installed in response to Hurricane Katrina. On May 17, 2018, FEMA approved the extension of the USACE mission assignment for emergency power to November 30, 2018. This extension permitted USACE to continue its support for the more than 700 generators still in use throughout Puerto Rico at that time. FEMA later extended the mission assignment until April 8, 2019. As of December 11, 2018, USACE was supporting 24 generators in Puerto Rico, seven of which were supporting micro grids for the island municipalities of Vieques and Culebra. In the U.S. Virgin Islands, USACE installed 180 generators as a part of its temporary emergency power mission. USACE’s temporary emergency power mission for the U.S. Virgin Islands was completed in February 2018, and USACE is no longer supporting generators there. Unprecedented Roles by FEMA and USACE in Puerto Rico. In addition to the typical roles federal agencies undertake in restoration activities, FEMA and USACE undertook unprecedented roles in Puerto Rico because of the severe and widespread impacts of Hurricane Maria and PREPA’s limited capacity. For the first time in its history, FEMA undertook the role of helping to coordinate major electricity grid restoration because PREPA did not have the necessary capability, capacity, or structure to respond, according to FEMA officials. FEMA officials also noted that PREPA’s workers were not only engaged in restoration work but were also victims dealing with the same post- hurricane effects as the rest of the population. As part of its response, FEMA mission assigned USACE to lead federal efforts to repair Puerto Rico’s electricity grid—a role USACE had not played in the past during a domestic disaster response. Specifically, on September 30, 2017, the FEMA Administrator tasked USACE with leading the planning, coordination, and integration of the grid restoration. FEMA assigned USACE to lead federal efforts and provide direct support for grid restoration because PREPA was overwhelmed and had liquidity issues and USACE had the structures in place to award contracts with and bring in grid restoration crews, according to FEMA officials. In order to carry out its mission assignment, USACE issued contracts to bring lineworkers and materials to Puerto Rico to support the reinstallation and repair of transmission and distribution lines, among other power restoration activities. As of June 30, 2018, USACE had obligated approximately $1.5 billion on these contracts. Figure 2 shows USACE and its contractors working to restore electricity in Puerto Rico. USACE’s grid restoration mission assignment from FEMA ended on May 18, 2018, because, according to FEMA officials, power had been restored to approximately 98 percent of customers and PREPA, with its remaining contractors, had adequate capability to do the remaining work. In addition to the federal response, PREPA issued its own contracts to bring in additional lineworkers, received assistance from the New York State Utility Contingent, and requested and received mutual assistance from other utilities. PREPA did not initially reach out for mutual assistance. About 6 weeks following Hurricane Maria, on October 31, 2017, PREPA formally requested aid from other utilities on the mainland through the American Public Power Association and the Edison Electric Institute. The electric power industry sent two individuals to Puerto Rico on November 3, 2017 and they began assessing storm damage and working with PREPA, FEMA, USACE, and DOE officials to develop a restoration plan. On November 22, 2017, the Governor of Puerto Rico appointed one of these individuals as Power Restoration Coordinator to oversee the multipronged restoration effort. According to the Power Restoration Coordinator, as a first step he worked to create an incident command structure, and incident management teams began arriving in December. Once the incident command structure was in place, the industry deployed additional crews, equipment and materials in January to accelerate the ongoing restoration efforts across the island. As discussed previously, local utilities are typically responsible for restoring service, with federal agencies providing financial and other support. In contrast, approximately half of the lineworkers working to restore the electricity grid in Puerto Rico were USACE or USACE contractors at the peak of restoration efforts in February 2018, as shown in figure 3. FEMA established a unified command structure to coordinate efforts of federal agencies, PREPA, PREPA’s contractors, the New York State Utility Contingent, and utilities providing mutual assistance to PREPA, to help target priority work, ensure that crews could get to the work, and identify needed materials. Figure 4 shows the unified command structure. According to documents we reviewed and our interviews with officials and representatives, the most commonly cited factors that affected federal electricity grid restoration efforts in Puerto Rico and the U.S. Virgin Islands included (1) logistical challenges, (2) availability of materials, (3) financial condition of local utilities and poor condition of existing infrastructure, and (4) the extensive and unprecedented role of federal agencies. Logistical challenges. Responding to disasters on islands presents a number of logistical challenges. Specifically, according to federal officials, getting the crews, equipment, and materials needed to support restoration efforts to an island was more difficult and time- consuming than doing so on the mainland. This includes prepositioning assets, such as generators, and delivering equipment and materials in advance of a storm. The difficulties were greater in the days following the hurricanes since neither the ports nor the airports in Puerto Rico and the U.S. Virgin Islands had power, which prevented the delivery of materials to the islands. In Puerto Rico, the Port of San Juan reopened for daylight operations 3 days after Hurricane Maria made landfall; every airport and seaport had limited capacity after reopening for approximately 7 days post-landfall, according to FEMA’s 2017 Hurricane Season After-Action Report. Federal officials in the U.S. Virgin Islands told us that they faced further delays locating key supplies because of inadequate labelling of shipping containers at the port. For example, some containers were marked only as disaster supply equipment, which did not sufficiently identify the contents within them. According to USACE’s 2018 Remedial Action Program Senior Leader Briefing, USACE lacked the expertise and capabilities to manage the large operational logistics requirements to support the Puerto Rico and U.S. Virgin Islands response. Availability of materials. The sequence of three hurricanes making landfall in the United States in 2017 and the need to restore electricity service in Texas, Florida, and elsewhere, in addition to Puerto Rico and the U.S. Virgin Islands, complicated the restoration effort in the two territories. Since utilities in all affected areas were acquiring materials to restore electricity service, demand for these materials increased and available supplies were generally low; in some instances materials were only available as they were manufactured. Few, if any, materials were stockpiled locally on Puerto Rico. In addition, some of the equipment used in Puerto Rico was not standard in the continental United States and required ordering of specialized materials, resulting in delays in the restoration process. The U.S. Virgin Islands also faced supply issues, which became worse once grid recovery work in Puerto Rico began. Financial condition of local utilities and poor condition of existing infrastructure. Electric utilities in both Puerto Rico and the U.S. Virgin Islands were insolvent, which led to a lack of maintenance and presented its own challenges for restoring the grids after the storms. Specifically, PREPA was approximately $9 billion in debt before the 2017 hurricane season, with annual costs that exceeded its revenues. Puerto Rico’s electric power infrastructure was in poor condition before the 2017 hurricane season largely because of PREPA’s underinvestment and poor maintenance practices. For example, PREPA canceled its vegetation management program because of its financial situation; this contributed to the destruction of transmission and distribution lines when the hurricane arrived, according to FEMA officials. Similarly, in the U.S. Virgin Islands, financial challenges contributed to the extent of the damage to grid infrastructure. Specifically, VIWAPA officials told us that VIWAPA’s financial challenges prevented certain infrastructure improvements and a large proportion of the electricity poles were at or above their weight capacity, increasing the likelihood and extent of wind damage during the hurricanes. According to VIWAPA officials, VIWAPA was aware that there were too many lines and heavy transformers on old poles, but was not in a position to address this concern prior to the hurricanes. Extensive and unprecedented role of federal agencies. FEMA did not anticipate or plan for the extensive role that it and USACE played in grid restoration in Puerto Rico. According to FEMA’s after action report for the 2017 hurricane season, FEMA’s planning assumptions for a hurricane, earthquake, or tsunami striking Puerto Rico and the U.S. Virgin Islands underestimated the actual requirements. As discussed above, prior to Hurricane Maria in Puerto Rico, USACE had never worked on a large-scale power restoration as part of a domestic disaster response and did not have expertise in this area, according to USACE officials. This affected grid restoration efforts. For example, USACE did not have a grid restoration contract in place to immediately initiate grid repair efforts, according to USACE officials. Rather, USACE issued an order off of a pre-existing contract that it had under its public works and engineering support function to bring electric utility lineworkers to Puerto Rico. According to USACE officials, a bid protest against one of USACE’s contracts delayed its ability to increase the contract to bring more lineworkers to Puerto Rico. In addition, the contract review and approval process USACE used to obtain supplies took longer than it would typically take utilities to get supplies, according to FEMA officials we interviewed. According to USACE officials, USACE followed federal acquisition regulations, which is a slow process compared to private party purchases. USACE officials said that USACE is considering looking at what would be needed to create an advance grid restoration contract. FEMA, USACE, and DOE identified potential actions to address these challenges. According to its after action report, FEMA plans to establish a standing interagency Power Task Force to coordinate with DOE, USACE, and state and local governments and provide crisis planning for the energy sector emergency support function to support the restoration of power during future national response efforts. USACE’s 2018 Remedial Action Program Senior Leader Briefing made recommendations to improve contingency contracting and operational logistics, among other things. Specifically, recommendations included that USACE review existing and planned advance contracts and make adjustments as necessary to increase capacity and improve capabilities, and that USACE work with FEMA to convene an interagency logistics planning team and identify logistics contracting gaps and propose government and private sector solutions. DOE’s after action report for the 2017 hurricane season says that the lessons learned from the response to Hurricane Maria may prompt some programmatic improvements to the energy sector emergency support function roles and responsibilities related to island response, among other potential improvements. In addition, the report states that because of the extensive damage to grid infrastructure and the length of the restoration and recovery, there is an increasing need to incorporate resilience and hardening into restoration, recovery, and mitigation planning and execution. We provided a draft of this report to the Department of Defense (DOD), the Department of Homeland Security (DHS), DOE, and the governments of Puerto Rico and the U.S. Virgin Islands for review and comment. In its comments, reproduced in appendix II, DHS indicated that a top priority of DHS, FEMA and the entire federal government has been to provide life safety and life-sustaining resources to Puerto Rico and the U.S. Virgin Islands, including efforts to restore power and stabilize critical infrastructure. DHS, DOD, and DOE also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of Energy, the Secretary of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. See figures 5 and 6 for a timeline of federal and other efforts to support electricity grid restoration in Puerto Rico and the U.S. Virgin Islands after the 2017 hurricane season. In addition to the contact named above, Quindi Franco (Assistant Director), Marya Link (Analyst in Charge), Janice Ceperich, William Gerard, Cindy Gilbert, Joseph Maher, David Marroni, Bolko Skorupski, Sheryl Stein, and Jarrod West made key contributions to this report.", "summary": "In 2017, Hurricanes Irma and Maria damaged much of the electricity grids' transmission and distribution systems in USVI and Puerto Rico. The hurricanes left most of USVI's 106,405 people and all of Puerto Rico's 3.3 million without power and resulted in the longest blackout in U.S. history. Under the National Response Framework, electric utilities are responsible for repairing infrastructure and restoring service. They often use mutual assistance—voluntary partnerships with other electric utilities—to bring in additional resources to help restore electricity. Federal agencies provide financial assistance; help coordinate the federal response; and in severe emergencies, provide logistical support, such as assisting in damage assessments and location and transportation of repair crews and equipment. GAO was asked to review the federal response to the 2017 hurricanes. This report provides information on federal support for restoring the electricity grids in Puerto Rico and USVI and factors affecting this support. GAO has ongoing work examining federal support to improve grid resilience in Puerto Rico. GAO reviewed agency documents and funding data through July 20, 2018, the most recent data available; interviewed officials from FEMA, DOE, and USACE; and conducted site visits to Puerto Rico and USVI. Federal agencies supported efforts to restore electricity in the U.S. Virgin Islands (USVI) and Puerto Rico through the types of support they traditionally provide following disasters and, in Puerto Rico, in some unprecedented ways. USVI. Federal agencies provided traditional federal support to the electric utility's restoration efforts. For example, the Federal Emergency Management Agency (FEMA) provided financial assistance through its Public Assistance Program, and the Department of Energy (DOE) provided subject matter expertise to assist the local utility. In addition, the U.S. Army Corps of Engineers (USACE) provided generators for hospitals and other critical facilities. FEMA obligated about $795 million for these efforts as of July 20, 2018. According to the local utility, it took about 5 months for power to be restored to all customers with structures deemed safe for power restoration. Puerto Rico. In addition to the traditional types of support, FEMA and USACE undertook unprecedented roles of helping to coordinate and directly assist with grid restoration in Puerto Rico. FEMA requested that USACE lead federal grid repair efforts because of the scale of the damage and because the Puerto Rico Electric Power Authority (PREPA) did not have the capacity to respond, according to FEMA officials. FEMA obligated about $3.2 billion for electricity restoration efforts as of July 20, 2018, and PREPA estimated that it took roughly 11 months for power to be restored to all customers with structures deemed safe for power restoration. Various factors affected federal support for electricity grid restoration, according to officials GAO interviewed and documents reviewed. For example, getting the crews and materials needed to islands was more difficult and time-consuming than on the mainland. In Puerto Rico, PREPA was insolvent, which presented challenges for restoring the grid. For example, PREPA canceled its vegetation management program; this contributed to the destruction of the grid when the hurricane arrived, according to FEMA officials. In addition, FEMA did not anticipate or plan for the extensive federal role in grid restoration in Puerto Rico, and USACE did not have a contract in place to immediately initiate grid repair efforts, according to USACE officials. FEMA and USACE identified potential actions to address these challenges, such as reviewing advance contracts.", "document_type": "gao"}
{"report": "We found that the National Biodefense Strategy and associated plans bring together all the key elements of federal biodefense capabilities, which presents an opportunity to identify gaps and consider enterprise- wide risk and resources for investment trade-off decisions. However, challenges with planning to manage change; limited guidance and methods for analyzing capabilities; and lack of clarity about decision- making processes, roles, and responsibilities while adapting to a new enterprise-wide approach could limit the success of the Strategy’s implementation. The National Biodefense Strategy and its associated plans bring together the efforts of federal agencies with significant biodefense roles, responsibilities, and resources to address naturally-occurring, accidental, and intentional threats. The Strategy and plans also provide processes for collecting and analyzing comprehensive information across the enterprise, an important step toward the kind of enterprise-wide strategic decision-making we have called for. The Strategy defines the term “biothreat” broadly to include all sources of major catastrophic risk, including naturally-occurring biological threats, the accidental release of pathogens, and the deliberate use of biological weapons. Officials we interviewed noted that this is the first time that the federal government has identified activities across the whole biodefense enterprise and assessed resources and gaps to address multiple sources of threat regardless of source. The Strategy also outlines high-level goals and objectives to help define priorities. NSPM-14, which was issued to support the strategy, established a structure and process by which federal agencies can assess enterprise-wide biodefense capabilities and needs, and subsequently develop guidance to help inform agency budget submissions. NSPM-14 lays out, in broad strokes, a process to identify biodefense efforts and assess how current resources support the Strategy, how existing programs and resources could better align with the Strategy, and how additional resources, if available, could be applied to support the goals of the Strategy. As shown in figure 1, this process begins through a data call with participating agencies documenting all biodefense programs, projects, and activities within their purview in a biodefense memorandum. In interviews, officials from participating agencies stated that the NSPM- 14 processes constitute a new approach to identifying gaps and setting budget priorities for biodefense, and that they viewed the approach as generally well designed. Additionally, agency officials said that the assessment and joint policy guidance development process outlined in NSPM-14 offered some promise for helping agencies identify the resources necessary to achieve the Strategy’s goals. Nevertheless, officials from all of the agencies we interviewed, even those with the most optimistic views on the leadership and governance structure design, tempered their responses with the caveat that implementation is in such early stages that it remains to be seen how effective these structures will actually be once tested. In our February 2020 report, we also identified challenges that if not addressed could hinder enterprise-wide biodefense efforts. Specifically, although the Strategy and associated plans establish the foundation for enterprise risk management, we and biodefense agency officials identified multiple challenges that could affect the Strategy’s implementation. These include challenges individual agencies faced during the initial data collection process as well as a lack of planning and guidance to support an enterprise-wide approach. In our analyses and interviews, we found that parts of the process in the first year were underdeveloped, raising questions about (1) the plans to support change management practices and ensure that early-implementation limitations do not become institutionalized in future years’ efforts; (2) guidance and methods for meaningfully analyzing the data; and (3) the clarity of decision-making processes, roles, and responsibilities. Challenges adapting to new procedures. During our interviews, agency officials reported challenges they faced in the first-year’s data collection effort. These challenges may have led to incomplete data collection, but are not wholly unexpected given they occurred in the context of the individual agencies and officials adapting to new procedures and a broader cultural shift from how they have approached their biodefense missions in the past. Officials told us that because of the learning involved the first time through the process, agencies may not have submitted complete or detailed information about their biodefense programs. Some officials we interviewed voiced concern that this first-year effort could set a poor precedent for these activities in future years if the challenges are not acknowledged and addressed. For example, an official noted that committing to the first-year’s results as the “baseline” for future years of the Strategy’s implementation could compound or institutionalize the issues encountered in the first year. Officials from HHS and Office of Management and Budget staff stressed that this process will be iterative, with the first year being primarily about outlining the existing biodefense landscape. Our prior work on organizational transformations states that incorporating change management practices improves the likelihood of successful reforms and notes that it is important to recognize agency cultural factors that can either help or inhibit reform efforts. However, the agencies involved in implementing the Strategy do not have a plan that includes change management practices that can help prevent these challenges from being carried forward into future efforts, and help reinforce enterprise-wide approaches, among other things. To address this issue, we recommended the Secretary of HHS direct the Biodefense Coordination Team to establish a plan that includes change management practices—such as strategies for feedback, communication, and education—to reinforce collaborative behaviors and enterprise-wide approaches and to help prevent early implementation challenges from becoming institutionalized. HHS concurred with this recommendation. Guidance and methods for analyzing data. We found a lack of clear procedures and planning to help ensure that the Biodefense Coordination Team is prepared to analyze the data, once it has been collected, in a way that leads to recognition of meaningful opportunities to leverage resources in efforts to maintain and advance national biodefence capabilities. In particular, HHS (1) has not documented guidance and methods for analyzing the data, including but not limited to methods and guidance for how to account for the contribution of nonfederal capabilities; and (2) does not have a resource plan for staffing and sustaining ongoing efforts. Specifically, we found that the processes for the Biodefense Coordination Team to analyze the results of all the individual agency data submissions and identify priorities to guide resource allocation were not agreed upon or documented prior to the agency efforts and continue to lack specificity and transparency. In our interviews, officials from four agencies said they were uncertain about fundamental elements of the implementation process, including how information gathered will be used to identify gaps and set priorities. Additionally, the initial effort to collect information on all programs, projects, and activities focused on existing federal activities and did not include a complete assessment of biodefense capabilities at the nonfederal level ̶ capabilities needed to achieve the goals and objectives outlined in the Strategy. Officials we interviewed also expressed concern about the resources that the Biodefense Coordination Team had available to it, both in the first year and on an ongoing basis. The officials told us that not all agencies were able to provide a full-time detailee to help support the team. We have previously reported that agencies need to identify how interagency groups will be funded and staffed. However, officials from multiple agencies told us that the initial planning for the staffing and responsibilities for the Biodefense Coordination Team had not been finalized. Without a plan to help ensure sufficient resources and mitigate resource challenges for ongoing efforts, the Biodefense Coordination Team risks not having the capacity it needs to conduct meaningful analysis, which would undermine the vision created by the Strategy and NSPM-14. To address these issues, we recommended the Secretary of HHS direct the Biodefense Coordination Team to (1) clearly document guidance and methods for analyzing the data collected from the agencies, including ensuring that nonfederal resources and capabilities are accounted for in the analysis, and (2) establish a resource plan to staff, support, and sustain its ongoing efforts. HHS concurred with both recommendations. Roles and responsibilities for joint decision-making. The governing bodies overseeing the National Biodefense Strategy’s implementation— the Biodefense Steering Committee and Biodefense Coordination Team—did not clearly document key components of the assessment process and roles and responsibilities for joint decision-making in the first year of NSPM-14 implementation. This raises questions about how these bodies will move from an effort to catalog all existing activities to decision- making that accounts for enterprise-wide needs and opportunities. For example, officials from multiple agencies were not certain how the governing bodies would make joint decisions regarding priority-setting and the allocation of resources, how they would assign new biodefense responsibilities if gaps were identified, and to what extent the Biodefense Steering Committee could enforce budgetary priorities, if at all. We also found a lack of shared understanding and agreement about how the interagency process would work to align resources toward any identified gaps and reconfigure resources for any identified redundancies or inefficiencies. Additionally, we found that Presidential memorandums guiding the process did not detail specific decision-making principles or steps for reaching consensus or even for raising decision points about how to best leverage or direct resources across the enterprise in response to any gaps or inefficiencies. Similarly, agency officials we interviewed were not clear how this process would work, how decisions would be made, or how agencies would agree to take on new responsibilities to bridge gaps to achieve the Strategy’s goals. Further, the governing bodies have not fully defined the roles and responsibilities for making enterprise-wide decisions that affect individual agency budgets and for enforcing enterprise-wide budget priorities. As with other parts of the NSPM-14 implementation process, the details regarding specific roles and responsibilities for directing and enforcing budget decisions lack detail and specificity. Additionally, officials from four agencies stated that the charter for the Biodefense Coordination Team has not been finalized, further delaying the articulation of roles and responsibilities and the ability to establish a shared agenda and common operating picture. As a result, some officials remain skeptical of the effectiveness of any decisions made. We previously reported that effective national strategies should help clarify implementing organizations’ relationships in terms of leading, supporting, and partnering. In the context of the Strategy, that includes how enterprise-wide decisions about leveraging or directing resources to fill gaps and reduce inefficiency will be made and by whom. Similarly, our previous work has found that articulating and agreeing to a process for making and enforcing decisions and clarifying roles and responsibilities can improve the clarity surrounding a shared outcome, and that articulating these agreements in formal documents can strengthen agency commitment to working collaboratively and provide the overall framework for accountability and oversight. Uncertainty around the mechanisms to identify enterprise-wide priorities along with the lack of clearly documented and agreed upon processes, roles, and responsibilities for joint decision-making jeopardize the Strategy’s ability to enhance efficiency and effectiveness of the nation’s biodefense capabilities. To address this issue, we recommended that the Secretary of HHS direct the Biodefense Coordination Team to clearly document agreed upon processes, roles, and responsibilities for making and enforcing enterprise-wide decisions. HHS concurred. In conclusion, the current COVID-19 outbreak demonstrates that responding to the ever-changing nature and broad array of biological threats is challenging. The National Biodefense Strategy calls for the need to improve state, local, tribal, territorial, private sector, federal, regional, and international surveillance systems and networks to contain, control and respond to biological incidents. As the current coronavirus outbreak continues to cross regional and international borders, the federal government must take necessary steps to protect the American public. At the same time, we must not lose sight of the next threat. The National Biodefense Strategy and NSPM-14 put in place a framework to be able to assess threats and make difficult decisions about how to apply limited resources to achieve the best benefit. However, the Strategy is only as good as its implementation. Taking the necessary steps to address the recommendations we have made regarding managing this cultural change, analyzing data, ensuring sufficient resources to maintain implementation efforts, and clearly articulating roles and responsibilities for joint decision-making will better position our nation for the threats we face today and in the future. Chairwoman Maloney, Ranking Member Jordan, and Members of the Committee, this concludes our prepared statement. We would be happy to respond to any questions you may have at this time. If you or your staff has any questions concerning this testimony, please contact Christopher P. Currie at (404) 679-1875, CurrieC@gao.gov or Mary Denigan-Macauley at (202) 512-7114, DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this statement include Kathryn Godfrey (Assistant Director), Susanna Kuebler (Analyst- In-Charge), Michele Fejfar, Eric Hauswirth, Tracey King, and Jan Montgomery. Key contributors for the previous work that this testimony is based on are listed in each product. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "GAO has reported on the inherent fragmented nature of the federal and nonfederal resources needed to protect the nation from potentially catastrophic biological threats. GAO called for a strategic approach to help the federal government better leverage resources and manage risk The White House issued the National Biodefense Strategy and the Presidential Memorandum on the Support for National Biodefense to promote a more efficient and coordinated biodefense enterprise. The National Defense Authorization Act for Fiscal Year 2017 included a provision that GAO review the strategy. This testimony highlights key findings from our February 2020 report, which analyzed the extent to which the Strategy and related implementation efforts are designed to allow an enterprise-wide approach. Issued in September 2018, the National Biodefense Strategy (Strategy) and implementation plan, along with National Security Presidential Memorandum-14 (NSPM-14), are designed to enhance national biodefense capabilities. NSPM-14 established a governance structure composed of relevant federal agencies and chaired by the Secretary of Health and Human Services (HHS) to guide implementation. It also required federal agencies with biodefense responsibilities to collect and assess data on their biodefense activities to, among other things, identify gaps. There are a number of challenges, however, that could limit long-term implementation success. Among other things, there was no documented methodology or guidance for how data are to be analyzed to help the enterprise identify gaps and opportunities to leverage resources, including no guidance on how nonfederal capabilities are to be accounted for in the analysis. Agency officials were also unsure how decisions would be made, especially if addressing gaps or opportunities to leverage resources involved redirecting resources across agency boundaries. Although HHS officials pointed to existing processes and directives for interagency decision making, GAO found there are no clear, detailed processes, roles, and responsibilities for joint decision-making, including how agencies will identify opportunities to leverage resources or who will make and enforce those decisions. As a result, questions remain about how this first-year effort to catalogue all existing activities will result in a decision-making approach that involves jointly defining and managing risk at the enterprise level. Without clearly documented methods, guidance, processes, and roles and responsibilities for enterprise-wide decision-making, the effort runs the risk of failing to move away from traditional mission stovepipes toward a strategic enterprise-wide approach that meaningfully enhances national capabilities. In the February 2020 report, GAO made four recommendations to the Secretary of HHS, including working with other agencies to document methods for analysis and the processes, roles, and responsibilities for enterprise-wide decision making. HHS concurred with all the recommendations and described steps to implement them.", "document_type": "gao"}
{"report": "As shown in table 1 the cost of counting the nation’s population has been escalating with each decade. The 2010 Census was the most expensive in U.S. history at about $12.3 billion, and was about 31 percent more costly than the $9.4 billion 2000 Census (in 2020 dollars). According to the Bureau, the total cost of the 2020 Census in October 2015 was estimated at $12.3 billion and in October 2017 that cost estimate grew to approximately $15.6 billion, approximately a $3 billion increase. Additionally, Bureau officials told us that while the estimated cost of the census had increased to $15.6 billion, it was nevertheless managing the 2020 Census to a lower cost of $14.1 billion. Bureau officials explained that the $14.1 billion includes all program costs and contingency funds to cover risks and general estimating uncertainty. The remaining $1.5 billion estimated cost is additional contingency for “unknown unknowns”—that is, low probability events that could cause massive disruptions—and several what-if scenarios such as an increase in the wage rate or additional supervisors needed to manage field operations. Moreover, as shown in figure 1, the average cost for counting a housing unit increased from about $16 in 1970 to around $92 in 2010 (in 2020 constant dollars). At the same time, the return of census questionnaires by mail (the primary mode of data collection) declined over this period from 78 percent in 1970 to 63 percent in 2010. Declining mail response rates have led to higher costs because the Bureau sends temporary workers to each non-responding household to obtain census data. Achieving a complete and accurate census has become an increasingly daunting task, in part, because the population is growing larger, more diverse, and more reluctant to participate in the enumeration. In many ways, the Bureau has had to invest substantially more resources each decade to conduct the enumeration. In addition to these external societal challenges that make achieving a complete count a daunting task, the Bureau also faces a number of internal management challenges that affect its capacity and readiness to conduct a cost-effective enumeration. Some of these issues—such as acquiring and developing IT systems and preparing reliable cost estimates—are long-standing in nature. At the same time, as the Bureau looks toward 2020, it has faced emerging and evolving uncertainties. For example, on March 26, 2018, the Secretary of Commerce announced his decision to add a question to the decennial census on citizenship status which resulted in various legislative actions and legal challenges. Ultimately, the case was heard by the U.S. Supreme Court, which, in a June 26, 2019, ruling, prevented the addition of the question because the Court found that the evidence Commerce provided in the case did not match the Secretary’s explanation. In addition, the Fourth Circuit Court of Appeals remanded other legal challenges to the district court on June 24, 2019, for further legal action, which is yet to be resolved. According to Bureau officials, on June 28, 2019, Commerce asked the Bureau to put its scheduled July 1 start date for printing questionnaires on hold while it considered legal implications of the Supreme Court ruling. On July 2, 2019, Commerce told the Bureau to proceed with printing questionnaires and other materials without the citizenship question on them. As of July 5, 2019, the Department of Justice (DOJ) indicated that, although printing was continuing without the citizenship question, DOJ was evaluating legal options to include the question. On July 11, 2019, the President announced that instead of collecting this information from the census questionnaire, he ordered all federal agencies to provide data on citizenship status to Commerce using legally available federal records. We have not analyzed this decision or its implications, if any, for how the Bureau will tabulate its official counts. We will continue to monitor developments for Congress. The Bureau also faced budgetary uncertainties that, according to the Bureau, led to the curtailment of testing in 2017 and 2018. However, the Consolidated Appropriations Act, 2018 appropriated for the Periodic Censuses and Programs account $2.544 billion, which more than doubled the Bureau’s request in the President’s Fiscal Year 2018 Budget of $1.251 billion. According to the explanatory statement accompanying the act, the appropriation, which is available through fiscal year 2020, was provided to ensure the Bureau has the necessary resources to immediately address any issues discovered during operational testing, and to provide a smoother transition between fiscal year 2018 and fiscal year 2019. The availability of those resources enabled the Bureau to continue preparations for the 2020 Census during the 35 days in December 2018 to January 2019 when appropriations lapsed for the Bureau and a number of other federal agencies. Moreover, the Consolidated Appropriations Act, 2019 appropriated for the Periodic Censuses and Programs account $3.551 billion. According to Bureau officials, this level of funding for fiscal year 2019 is sufficient to carry out 2020 Census activities as planned. Importantly, the census is conducted against a backdrop of immutable deadlines. In order to meet the statutory deadline for completing the enumeration, census activities need to take place at specific times and in the proper sequence. Thus, it is absolutely critical for the Bureau to stay on schedule. Figure 2 shows some dates for selected decennial events. The Bureau has begun to open its area census offices (ACO) for the 2020 Census. It has signed leases for all 248 ACOs, of which 39 of the offices will be open for the address canvassing operation set to begin in August 2019 where staff verifies the location of selected housing units. The remaining 209 offices will begin opening this fall. In 2010 the Bureau opened 494 census offices. The Bureau has been able to reduce its infrastructure because it is relying on automation to assign work and to record payroll. Therefore there is less paper—field assignments, maps, and daily payroll forms—to manually process. For the 2020 Census, the Bureau is refining its recruiting and hiring goals, but tentatively plans to recruit approximately 2.24 million applicants and to hire over 400,000 temporary field staff from that applicant pool for two key operations: address canvassing, and nonresponse follow-up, where they visit households that do not return census forms to collect data in person. In 2010 the Bureau recruited 3.8 million applicants and hired 628,000 temporary workers to conduct the address canvassing and nonresponse follow-up field operations. According to Bureau officials, it has reduced the number of temporary staff it needs to hire because automation has made field operations more efficient and there is less paper. As of June 2019, the Bureau reported that for all 2020 Census operations it had processed about 430,000 applicants. In addition, the Bureau was seeking to hire approximately 1,500 partnership specialists by the end of June 2019 to help increase census awareness and participation in minority communities and hard-to-reach populations. As of July 9, 2019, the Bureau’s latest biweekly reporting indicated that it had hired 813 partnership specialists as of June 22, 2019. Moreover, as of July 10, 2019, Bureau officials told us that another 830 applicants were waiting to have their background checks completed. According to Bureau officials, hiring data are based on payroll dates generated biweekly, while background check data are tracked internally. Therefore, according to Bureau officials, more current hiring data were not available as of July 10, 2019 to indicate whether the Bureau had met its June 30 hiring goal. Among other things, partnership specialists are expected to either provide or identify partners to help provide supplemental language support to respondents locally in over 100 different languages. We will continue to monitor the Bureau’s progress in meeting its partnership specialist staffing goals and addressing any turnover that takes place. Hiring partnership specialists in a timely manner and maintaining adequate partnership specialist staffing levels are key to the Bureau’s ability to carry out its planned outreach efforts, especially to hard-to-count communities. Moreover, Bureau officials also stated that the current economic environment (i.e., the low unemployment rate compared to the economic environment of the 2010 Census) has not yet impacted their ability to recruit staff. The Bureau will continue to monitor the impact of low unemployment on its ability to recruit and hire at the local and regional levels. For the 2020 Census, the Bureau is substantially changing how it intends to conduct the census, in part by re-engineering key census-taking methods and infrastructure, and making use of new IT applications and systems. For example, the Bureau plans to offer an option for households to respond to the survey via the internet and enable field-based enumerators to use applications on mobile devices to collect survey data from households. To do this, the Bureau plans to utilize 52 new and legacy IT systems, and the infrastructure supporting them, to conduct the 2020 Census. A majority of these 52 systems have been tested during operational tests in 2017 and 2018. For example, the Bureau conducted its 2018 End-to- End test, which included 44 of the 52 systems and was intended to test all key systems and operations in a census-like environment to ensure readiness for the 2020 Census. Nevertheless, additional IT development and testing work needs to take place before the 2020 Census. Specifically, officials from the Bureau’s Decennial Directorate said they expect that the systems will need to undergo further development and testing due to, among other things, the need to add functionality that was not part of the End-to-End test, scale system performance to support the number of respondents expected during the 2020 Census, and address system defects identified during the 2018 End-to-End test. To prepare the systems and technology for the 2020 Census, the Bureau is also relying on substantial contractor support. For example, it is relying on contractors to develop a number of systems and components of the IT infrastructure, including the IT platform that is intended to be used to collect data from households responding via the internet and telephone, and for non-response follow-up activities. Contractors are also deploying the IT and telecommunications hardware in the field offices and providing device-as-a-service capabilities by procuring the mobile devices and cellular service to be used for non-response follow-up. In addition to the development of technology, the Bureau is relying on a technical integration contractor to integrate all of the key systems and infrastructure. The contractor’s work is expected to include, among other things, evaluating the systems and infrastructure and acquiring the infrastructure (e.g., cloud or data center) to meet the Bureau’s scalability and performance needs; integrating all of the systems; and assisting with technical, performance and scalability, and operational testing activities. In February 2017, we added the 2020 Decennial Census as a high-risk area needing attention from Congress and the executive branch. This was due to significant risks related to, among other things, innovations never before used in prior enumerations, the acquisition and development of IT systems, and expected escalating costs. Among other things, we reported that the commitment of top leadership was needed to ensure the Bureau’s management, culture, and business practices align with a cost-effective enumeration. We also stressed that the Bureau needed to rigorously test census-taking activities; ensure that scheduling adheres to best practices; improve its ability to manage, develop, and secure its IT systems; and have better oversight and control over its cost estimation process. Our experience has shown that agencies are most successful at removal from our High-Risk List when leaders give top level attention to the five criteria for removal and Congress takes any needed action. The five criteria for removal that we identified in November 2000 are as follows: Leadership Commitment. The agency has demonstrated strong commitment and top leadership support. Capacity. The agency has the capacity (i.e., people and resources) to resolve the risk(s). Action Plan. A corrective action plan exists that defines the root causes and solutions, and that provides for substantially completing corrective measures, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated Progress. The agency has demonstrated progress in implementing corrective measures and in resolving the high-risk area. These five criteria form a road map for efforts to improve, and ultimately address, high-risk issues. Addressing some of the criteria leads to progress, while satisfying all of the criteria is central to removal from the list. As we reported in the March 2019 high-risk report, the Bureau’s efforts to address the risks and challenges for the 2020 Census had fully met one of the five criteria for removal from the High-Risk List—leadership commitment—and partially met the other four, as shown in figure 3. Additional details about the status of the Bureau’s efforts to address this high-risk area are discussed later in this statement. The 2020 Census is on our list of high-risk programs because, among other things, (1) innovations never before used in prior enumerations are not expected to be fully tested, (2) the Bureau continues to face challenges in implementing IT systems, (3) the Bureau faces significant cybersecurity risks to its systems and data, and (4) the Bureau’s cost estimate for the 2020 Census was unreliable. If not sufficiently addressed, these risks could adversely impact the cost and quality of the enumeration. Moreover, the risks are compounded by other factors that contribute to the challenge of conducting a successful census, such as the nation’s increasingly diverse population and concerns over personal privacy. The basic design of the enumeration—mail out and mail back of the census questionnaire with in-person follow-up for non-respondents—has been in use since 1970. However, a lesson learned from the 2010 Census and earlier enumerations is that this traditional design is no longer capable of cost-effectively counting the population. In response to its own assessments, our recommendations, and studies by other organizations, the Bureau has fundamentally re-examined its approach for conducting the 2020 Census. Specifically, its plan for 2020 includes four broad innovation areas: re-engineering field operations, using administrative records, verifying addresses in-office, and developing an internet self-response option (see table 2). If they function as planned, the Bureau initially estimated that these innovations could result in savings of over $5 billion (in 2020 constant dollars) when compared to its estimates of the cost for conducting the census with traditional methods. However, in June 2016, we reported that the Bureau’s initial life-cycle cost estimate developed in October 2015 was not reliable and did not adequately account for risk. As discussed earlier in this statement, the Bureau has updated its estimate from $12.3 billion and now estimates a life-cycle cost of $15.6 billion, which would result in a smaller potential savings from the innovative design than the Bureau originally estimated. According to the Bureau, the goal of the cost estimate increase was to ensure quality was fully addressed. While the planned innovations could help control costs, they also introduce new risks, in part, because they include new procedures and technology that have not been used extensively in earlier decennials, if at all. Our prior work has shown the importance of the Bureau conducting a robust testing program, including the 2018 End-to-End test. Rigorous testing is a critical risk mitigation strategy because it provides information on the feasibility and performance of individual census-taking activities, their potential for achieving desired results, and the extent to which they are able to function together under full operational conditions. To address some of these challenges we have made numerous recommendations aimed at improving reengineered field operations, using administrative records, verifying the accuracy of the address list, and securing census responses via the internet. The Bureau has held a series of operational tests since 2012, but according to the Bureau, it scaled back its most recent field tests because of funding uncertainties. For example, the Bureau canceled the field components of the 2017 Census Test including non-response follow-up, a key census operation. In November 2016, we reported that the cancelation of the 2017 Census Test was a lost opportunity to test, refine, and integrate operations and systems, and that it put more pressure on the 2018 End-to-End test to demonstrate that enumeration activities will function under census-like conditions as needed for 2020. However, in May 2017, the Bureau scaled back the operational scope of the 2018 End-to-End test and, of the three planned test sites, only the Rhode Island site would fully implement the 2018 End-to-End test. The Washington and West Virginia sites would test just one field operation. In addition, due to budgetary concerns, the Bureau delayed ramp up and preparations for its coverage measurement operation (and the technology that supports it) from the scope of the test. However, removal of the coverage measurement operation did not affect testing of the delivery of apportionment or redistricting data. Without sufficient testing, operational problems can go undiscovered and the opportunity to improve operations will be lost, in part because the 2018 End-to-End test was the last opportunity to demonstrate census technology and procedures across a range of geographic locations, housing types, and demographic groups under decennial-like conditions prior to the 2020 Census. We reported on the 2018 End-to-End test in December 2018 and noted that the Bureau had made progress addressing prior test implementation issues but still faced challenges. As the Bureau studies the results of its testing to inform the 2020 Census, it will be important that it addresses key program management issues that arose during implementation of the test. Namely, by not aligning the skills, responsibilities, and information flows for the first-line supervisors during field data collection, the Bureau limited its role in support of enumerators within the re-engineered field operation. The Bureau also lacked mid-operation training or guidance, which, if implemented in a targeted, localized manner, could have further helped enumerators navigate procedural modifications and any commonly encountered problems when enumerating. It will be important for the Bureau to prioritize its mitigation strategies for these implementation issues so that it can maximize readiness for the 2020 Census. To manage risk to the 2020 Census the Bureau has developed hundreds of risk mitigation and contingency plans. Mitigation plans detail how an agency will reduce the likelihood of a risk event and its impacts, if it occurs. Contingency plans identify how an agency will reduce or recover from the impact of a risk after it has been realized. In May 2019, we reported that the Bureau had identified 360 active risks to the 2020 census as of December 2018—meaning the risk event could still occur and adversely impact the census. Of these, 242 met the Bureau’s criteria for requiring a mitigation plan and, according to the Bureau’s risk registers, 232 had one (see table 3). In addition, 146 risks met the Bureau’s criteria for requiring a contingency plan and, according to the Bureau’s risk registers, 102 had one. Bureau guidance states that these plans should be developed as soon as possible after a risk is added to the risk register, but it does not establish a clear time frame for doing so. Consequently, some risks may go without required plans for extended periods. We found that, as of December 2018, some of the risks without required plans had been added to the Bureau’s risk registers in recent months, but others had been added more than 3 years earlier. We reviewed the mitigation and contingency plans in detail for six risks which the Bureau identified as among the major concerns that could affect the 2020 Census. These included cybersecurity incidents, late operational design changes, and integration of the 52 systems and 35 operations supporting the 2020 Census. We found that the plans did not consistently include key information needed to manage the risk. For example, the Bureau’s contingency plan for late operational design changes did not include activities specific to the three most likely late operational design changes—including removal of the citizenship question as a result of litigation or congressional action—that the Bureau could carry out to lessen their adverse impact on the enumeration, should they occur. We found that gaps stemmed from either requirements missing from the Bureau’s decennial risk management plan, or that risk owners—the individuals assigned to manage each risk—were not fulfilling all of their risk management responsibilities. Bureau officials said that risk owners are aware of these responsibilities but do not always fulfill them given competing demands. Bureau officials also said that they are managing risks to the census, even if not always reflected in their mitigation and contingency plans. However, if such actions are reflected in disparate documents or are not documented at all, then decision makers are left without an integrated and comprehensive picture of how the Bureau is managing risks to the census. We made seven recommendations to improve the Bureau’s management of risks to the 2020 Census, including that the Bureau develop mitigation and contingency plans for all risks that require them, establish a clear time frame for plan development, and ensure that the plans have the information needed to manage the risk. Commerce agreed with our recommendations and said it would develop an action plan to address them. We have previously reported that the Bureau faces challenges in managing and overseeing IT programs, systems, and contractors supporting the 2020 Census. Specifically, we have noted challenges in the Bureau’s efforts to manage, among other things, the schedules and contracts for its systems. As a result of these challenges, the Bureau is at risk of being unable to fully implement the systems necessary to support the 2020 Census and conduct a cost-effective enumeration. To help improve its implementation of IT for the 2020 Census, the Bureau revised its systems development and testing schedule. Specifically, in October 2018, the Bureau organized the development and testing schedule for its 52 systems into 16 operational deliveries. Each of the 16 operational deliveries has milestone dates for, among other things, development, performance and scalability testing, and system deployment. According to Bureau officials in the Decennial Directorate, the schedule was revised, in part, due to schedule management challenges experienced, and lessons learned, while completing development and testing during the 2018 End-to-End test. The Bureau has made initial progress in executing work against its revised schedule. For example, the Bureau completed development of the systems in the first operational delivery—for 2020 Census early operations preparations—in July 2018, and deployed these systems into production in October 2018. However, our current work has determined that the Bureau is at risk of not meeting several near-term systems testing milestones. As of June 2019, 11 systems that are expected to be used in a total of five operational deliveries were at risk of not meeting key milestones for completing system development, performance and scalability testing, and/or integration testing. These 11 systems are needed for, among other things, data collection for operations, business and support automation, and customer support during self-response. Figure 4 presents an overview of the status for all 16 operational deliveries, as of June 2019. The at-risk systems previously discussed add uncertainty to a highly compressed time frame over the next 6 months. Importantly, between July and December 2019, the Bureau is expected to be in the process of integration testing the systems in 12 operational deliveries. Officials from the Bureau’s integration contractor noted concern that the current schedule leaves little room for any delays in completing the remaining development and testing activities. In addition to managing the compressed testing time frames, the Bureau also has to quickly finalize plans related to its IT infrastructure. For example, as of June 2019, the Bureau stated that it was still awaiting final approval for its Trusted Internet Connection. Given that these plans may impact systems being tested this summer or deployed into production for the address canvassing operation in August 2019, it is important that the Bureau quickly addresses this matter. Our past reporting noted that the Bureau faced significant challenges in managing its schedule for system development and testing that occurred in 2017 and 2018. We reported that, while the Bureau had continued to make progress in developing and testing IT systems for the 2020 Census, it had experienced delays in developing systems to support the 2018 End-to-End test. These delays compressed the time available for system and integration testing and for security assessments. In addition, several systems experienced problems during the test. We noted then, and reaffirm now, that continued schedule management challenges may compress the time available for the remaining system and integration testing and increase the risk that systems may not function or be as secure as intended. The Bureau has acknowledged that it faces risks to the implementation of its systems and technology. As of May 2019, the Bureau had identified 17 high risks related to IT implementation that may have substantial technical and schedule impacts if realized. Taken together, these risks represent a cross-section of issues, such as schedule delays for a fraud-detection system, the effects of late changes to technical requirements, the need to ensure adequate time for system development and performance and scalability testing, contracting issues, privacy risks, and skilled staffing shortages. Going forward, it will be important that the Bureau effectively manages these risks to better ensure that it meets near-term milestones for system development and testing, and is ready for the major operations of the 2020 Census. The risks to IT systems supporting the federal government and its functions, including conducting the 2020 Census, are increasing as security threats continue to evolve and become more sophisticated. These risks include insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Underscoring the importance of this issue, we have designated information security as a government-wide high-risk area since 1997 and, in our most recent biennial report to Congress, ensuring the cybersecurity of the nation was one of nine high-risk areas that we reported needing especially focused executive and congressional attention. Our prior and ongoing work has identified significant challenges that the Bureau faces in securing systems and data for the 2020 Census. Specifically, the Bureau has faced challenges related to completing security assessments, addressing security weaknesses, resolving cybersecurity recommendations from DHS, and addressing numerous other cybersecurity concerns (such as phishing). Federal law specifies requirements for protecting federal information and information systems, such as those systems to be used in the 2020 Census. Specifically, the Federal Information Security Management Act of 2002 and the Federal Information Security Modernization Act of 2014 (FISMA) require executive branch agencies to develop, document, and implement an agency-wide program to provide security for the information and information systems that support operations and assets of the agency. In accordance with FISMA, National Institute of Standards and Technology (NIST) guidance, and Office of Management and Budget (OMB) guidance, the Bureau’s Office of the Chief Information Officer (CIO) established a risk management framework. This framework requires system developers to ensure that each of the Bureau’s systems undergoes a full security assessment, and that system developers remediate critical deficiencies. According to the Bureau’s risk management framework, the systems expected to be used to conduct the 2020 Census will need to have complete security documentation (such as system security plans) and an approved authorization to operate prior to their use. As of June 2019, according to the Bureau’s Office of the CIO: Thirty-seven of the 52 systems have authorization to operate, and will not need to be reauthorized before they are used in the 2020 Census Nine of the 52 systems have authorization to operate, and will need to be reauthorized before they are used in the 2020 Census Five of the 52 systems do not have authorization to operate, and will need to be authorized before they are used in the 2020 Census One of the 52 systems does not need an authorization to operate. Figure 5 summarizes the authorization to operate status for the systems being used in the 2020 Census, as reported by the Bureau in June 2019. As we have previously reported, while large-scale technological changes (such as internet self-response) increase the likelihood of efficiency and effectiveness gains, they also introduce many cybersecurity challenges. The 2020 Census also involves collecting personally identifiable information (PII) on over a hundred million households across the country, which further increases the need to properly secure these systems. Thus, it will be important that the Bureau provides adequate time to perform these security assessments, completes them in a timely manner, and ensures that risks are at an acceptable level before the systems are deployed. We have ongoing work examining how the Bureau plans to address both internal and external cyber threats, including its efforts to complete system security assessments and resolve identified weaknesses. FISMA requires that agency-wide information security programs include a process for planning, implementing, evaluating, and documenting remedial actions (i.e., corrective actions) to address any deficiencies in the information security policies, procedures, and practices of the agency. Additionally, the Bureau’s framework requires it to track security assessment findings that need to be remediated as a plan of action and milestones (POA&M). These POA&Ms are expected to provide a description of the vulnerabilities identified during the security assessment that resulted from a control weakness. As of the end of May 2019, the Bureau had over 330 open POA&Ms to remediate for issues identified during security assessment activities, including ongoing continuous monitoring. Of these open POA&Ms, 217 (or about 65 percent) were considered “high-risk” or “very high-risk.” While the Bureau established POA&Ms for addressing these identified security control weaknesses, it did not always complete remedial actions in accordance with its established deadlines. For example, of the 217 open “high-risk” or “very high-risk” POA&Ms we reviewed, the Bureau identified 104 as being delayed. Further, 74 of the 104 had missed their scheduled completion dates by 60 or more days. According to the Bureau’s Office of Information Security, these POA&Ms were identified as delayed due to technical challenges or resource constraints to remediate and close them. We previously recommended that the Bureau take steps to ensure that identified corrective actions for cybersecurity weaknesses are implemented within prescribed time frames. As of late May 2019, the Bureau was working to address our recommendation. Until the Bureau resolves identified vulnerabilities in a timely manner, it faces an increased risk, as continuing opportunities exist for unauthorized individuals to exploit these weaknesses and gain access to sensitive information and systems. The Bureau is working with federal and industry partners, including DHS, to support the 2020 Census cybersecurity efforts. Specifically, the Bureau is working with DHS to ensure a scalable and secure network connection for the 2020 Census respondents (e.g., virtual Trusted Internet Connection with the cloud), improve its cybersecurity posture (e.g., risk management processes and procedures), and strengthen its response to potential cyber threats (e.g., federal cyber incident coordination). Federal law describes practices for strengthening cybersecurity by documenting or tracking corrective actions. As previously mentioned, FISMA requires executive branch agencies to establish a process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in their information security policies, procedures, and practices. Standards for Internal Control in the Federal Government calls for agencies to establish effective internal control monitoring that includes a process to promptly resolve the findings of audits and other reviews. Specifically, agencies should document and complete corrective actions to remediate identified deficiencies on a timely basis. This would include correcting identified deficiencies or demonstrating that the findings and recommendations do not warrant agency action. Since January 2017, DHS has been providing cybersecurity assistance (including issuing recommendations) to the Bureau in preparation for the 2020 Census. Specifically, DHS has been providing cybersecurity assistance to the Bureau in five areas: management coordination and executive support, including a cybersecurity threat intelligence and information sharing enhancement through, among other things, a DHS cyber threat briefing to the Bureau’s leadership; network and infrastructure security and resilience, including National Cybersecurity Protection System (also called EINSTEIN) support; incident response and management readiness through a Federal Incident Response Evaluation assessment; and risk management and vulnerability assessments for specific high value assets provided by the Bureau. In the last 2 years, DHS has provided 42 recommendations to assist the Bureau in strengthening its cybersecurity efforts. Among other things, the recommendations pertained to strengthening cyber incident management capabilities, penetration testing and web application assessments of select systems, and phishing assessments to gain access to sensitive PII. Of the 42 recommendations, 10 recommendations resulted from DHS’s mandatory services for the Bureau (e.g., risk management and vulnerability assessments for specific high value assets). The remaining 32 recommendations resulted from DHS’s voluntary services for the Bureau (e.g., Federal Incident Response Evaluation assessment). Due to the sensitive nature of the recommendations, we are not identifying the specific recommendations or specific findings associated with them in this statement. In April 2019, we reported that the Bureau had not established a formal process for documenting, tracking, and completing corrective actions for all of the recommendations provided by DHS. Accordingly, we recommended that the Bureau implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity findings identified by DHS. As of late May 2019, the Bureau was working to address our recommendation. Until the Bureau implements our recommendation, it faces an increased likelihood that findings identified by DHS will go uncorrected and may be exploited to cause harm to agency’s 2020 Census IT systems and gain access to sensitive respondent data. Implementing a formal process would also help to ensure that DHS’s efforts result in improvements to the Bureau’s cybersecurity posture. The Bureau faces other substantial cybersecurity challenges in addition to those previously discussed. More specifically, we previously reported that the extensive use of IT systems to support the 2020 Census redesign may help increase efficiency, but that this redesign introduces critical cybersecurity challenges. These challenges include those related to the following: Phishing. We have previously reported that advanced persistent threats may be targeted against social media web sites used by the federal government. In addition, attackers may use social media to collect information and launch attacks against federal information systems through social engineering, such as phishing. Phishing attacks could target respondents, as well as Bureau employees and contractors. The 2020 Census will be the first one in which respondents will be heavily encouraged to respond via the internet. This will likely increase the risk that cyber criminals will use phishing in an attempt to steal personal information. According to the Bureau, it plans to inform the public of the risks associated with phishing through its education and communication campaigns. Disinformation from social media. We previously reported that one of the Bureau’s key innovations for the 2020 Census is the large-scale implementation of an internet self-response option. The Bureau is encouraging the public to use the internet self-response option through expanded use of social media. However, the public perception of the Bureau’s ability to adequately safeguard the privacy and confidentiality of the 2020 Census internet self-responses could be influenced by disinformation spread through social media. According to the Bureau, if a substantial segment of the public is not convinced that the Bureau can safeguard public response data against data breaches and unauthorized use, then response rates may be lower than projected, leading to an increase in cases for follow-up and subsequent cost increases. To help address this challenge, the Bureau stated that it plans to inform the public of the risks associated with disinformation from social media through its education and communication campaigns. Ensuring that individuals gain only limited and appropriate access to 2020 Census data. The Bureau plans to enable a public- facing website and Bureau-issued mobile devices to collect PII (e.g., name, address, and date of birth) from the nation’s entire population— estimated to be over 300 million. In addition, the Bureau is planning to obtain and store administrative records containing PII from other government agencies to help augment information that enumerators did not collect. The number of reported security incidents involving PII at federal agencies has increased dramatically in recent years. Because of these challenges, we have recommended, among other things, that federal agencies improve their response to information security incidents and data breaches involving PII, and consistently develop and implement privacy policies and procedures. Accordingly, it will be important for the Bureau to ensure that only respondents and Bureau officials are able to gain access to this information, and enumerators and other employees only have access to the information needed to perform their jobs. Ensuring adequate control in a cloud environment. The Bureau has decided to use cloud solutions as a key component of the 2020 Census IT infrastructure. We have previously reported that cloud computing has both positive and negative information security implications and, thus, federal agencies should develop service-level agreements with cloud providers. These agreements should specify, among other things, the security performance requirements—including data reliability, preservation, privacy, and access rights—that the service provider is to meet. Without these safeguards, computer systems and networks, as well as the critical operations and key infrastructures they support, may be lost; information—including sensitive personal information—may be compromised; and the agency’s operations could be disrupted. Commerce’s Office of the Inspector General recently identified several challenges the Bureau may face using cloud-based systems to support the 2020 Census. Specifically, in June 2019, the Office of the Inspector General identified, among other things, unimplemented security system features that left critical 2020 Census systems vulnerable during the 2018 End-to-End Test and a lack of fully implemented security practices to protect certain data hosted in the 2020 Census cloud environment. Officials from the Bureau agreed with all eight of the Office of Inspector General’s recommendations regarding 2020 Census cloud-based systems and identified actions taken to address them. Ensuring contingency and incident response plans are in place to encompass all of the IT systems to be used to support the 2020 Census. Because of the brief time frame for collecting data during the 2020 Census, it is especially important that systems are available for respondents to ensure a high response rate. Contingency planning and incident response help ensure that, if normal operations are interrupted, network managers will be able to detect, mitigate, and recover from a service disruption while preserving access to vital information. Implementing important security controls, including policies, procedures, and techniques for contingency planning and incident response, helps to ensure the confidentiality, integrity, and availability of information and systems, even during disruptions of service. Without contingency and incident response plans, system availability might be impacted and result in a lower response rate. The Bureau’s CIO has acknowledged these cybersecurity challenges and is working to address them, according to Bureau documentation. In addition, we have ongoing work looking at many of these challenges, including the Bureau’s plans to protect PII, use a cloud-based infrastructure, and recover from security incidents and other disasters. Since 2015, the Bureau has made progress in improving its ability to develop a reliable cost estimate. We have reported on the reliability of the $12.3 billion life-cycle cost estimate released in October 2015 and the $15.6 billion revised cost estimate released in October 2017. In 2016 we reported that the October 2015 version of the Bureau’s life-cycle cost estimate for the 2020 Census was not reliable. Specifically, we found that the 2020 Census life-cycle cost estimate partially met two of the characteristics of a reliable cost estimate (comprehensive and accurate) and minimally met the other two (well-documented and credible). We recommended that the Bureau take specific steps to ensure its cost estimate meets the characteristics of a high-quality estimate. The Bureau agreed and has taken action to improve the reliability of the cost estimate. In August 2018 we reported that while improvements had been made, the Bureau’s October 2017 cost estimate for the 2020 Census did not fully reflect all the characteristics of a reliable estimate. (See figure 6.) In order for a cost estimate to be deemed reliable as described in GAO’s Cost Estimating and Assessment Guide and thus, to effectively inform 2020 Census annual budgetary figures, the cost estimate must meet or substantially meet the following four characteristics: Well-Documented. Cost estimates are considered valid if they are well-documented to the point they can be easily repeated or updated and can be traced to original sources through auditing, according to best practices. Accurate. Accurate estimates are unbiased and contain few mathematical mistakes. Credible. Credible cost estimates must clearly identify limitations due to uncertainty or bias surrounding the data or assumptions, according to best practices. Comprehensive. To be comprehensive an estimate should have enough detail to ensure that cost elements are neither omitted nor double-counted, and all cost-influencing assumptions are detailed in the estimate’s documentation, among other things, according to best practices. The 2017 cost estimate only partially met the characteristic of being well- documented. In general, some documentation was missing, inconsistent, or difficult to understand. Specifically, we found that source data did not always support the information described in the basis of estimate document or could not be found in the files provided for two of the Bureau’s largest field operations: Address Canvassing and Non- Response Follow-Up. We also found that some of the cost elements did not trace clearly to supporting spreadsheets and assumption documents. Failure to document an estimate in enough detail makes it more difficult to replicate calculations, or to detect possible errors in the estimate; reduces transparency of the estimation process; and can undermine the ability to use the information to improve future cost estimates or even to reconcile the estimate with another independent cost estimate. The Bureau told us it would continue to make improvements to ensure the estimate is well- documented. The 2017 life-cycle cost estimate includes much higher costs than those included in the 2015 estimate. The largest increases occurred in the Response, Managerial Contingency, and Census/Survey Engineering categories. For example, increased costs of $1.3 billion in the response category (costs related to collecting, maintaining, and processing survey response data) were in part due to reduced assumptions for self- response rates, leading to increases in the amount of data collected in the field, which is more costly to the Bureau. Contingency allocations increased overall from $1.35 billion in 2015 to $2.6 billion in 2017, as the Bureau gained a greater understanding of risks facing the 2020 Census. Increases of $838 million in the Census/Survey Engineering category were due mainly to the cost of an IT contract for integrating decennial survey systems that was not included in the 2015 cost estimate. Bureau officials attribute a decrease of $551 million in estimated costs for Program Management to changes in the categorization of costs associated with risks. Specifically, in the 2017 version of the estimate, estimated costs related to program risks were allocated to their corresponding work breakdown structure (WBS) element. Figure 7 shows the change in cost by WBS category for 2015 and 2017. More generally, factors that contributed to cost fluctuations between the 2015 and 2017 cost estimates include: Changes in assumptions. Among other changes, a decrease in the assumed rate for self-response from 63.5 percent in 2015 to 60.5 percent in 2017 increased the cost of collecting responses from nonresponding housing units. Improved ability to anticipate and quantify risk. In general, contingency allocations designed to address the effects of potential risks increased overall from $1.3 billion in 2015 to $2.6 billion in 2017. An overall increase in IT costs. IT cost increases, totaling $1.59 billion, represented almost 50 percent of the total cost increase from 2015 to 2017. More defined contract requirements. Bureau documents described an overall improvement in the Bureau’s ability to define and specify contract requirements. This resulted in updated estimates for several contracts, including for the Census Questionnaire Assistance contract. However, while the Bureau has been able to better quantify risk; in August 2018 we also reported that the Secretary of Commerce included a contingency amount of about $1.2 billion in the 2017 cost estimate to account for what the Bureau refers to as “unknown unknowns.” According to Bureau documentation these include such risks as natural disasters or cyber attacks. The Bureau provides a description of how the risk contingency for “unknown unknowns” is calculated; however, this description does not clearly link calculated amounts to the risks themselves. Thus, only $14.4 billion of the Bureau’s $15.6 billion cost estimate has justification. According to Bureau officials, the cost estimate remains at $15.6 billion; however, they stated that they are managing the 2020 Census at a lower level of funding—$14.1 billion. In addition, they said that, at this time, they do not plan to request funding for the $1.2 billion contingency fund for unknown unknowns or $369 million in funding for selected discrete program risks for what-if scenarios, such as an increase in the wage rate or additional supervisors needed to manage field operations. Instead of requesting funding for these contingencies upfront the Bureau plans to work with OMB and Commerce to request additional funds, if the need arises. According to Bureau officials they anticipate that the remaining $1.1 billion in contingency funding included in the $14.1 billion will be sufficient to carry out the 2020 Census. In June 2016 we recommended the Bureau improve control over how risk and uncertainty are accounted for. This prior recommendation remains valid given the life-cycle cost estimate still includes the $1.2 billion unjustified contingency fund for “unknown unknowns”. Moreover, given the cost growth between 2015 and 2017 it will be important for the Bureau to monitor cost in real-time, as well as, document, explain and review variances between planned and actual cost. In August 2018 we reported that the Bureau had not been tracking variances between estimated life-cycle costs and actual expenses. Tools to track variance enable management to measure progress against planned outcomes and will help inform the 2030 Census cost estimate. Bureau officials stated that they already have systems in place that can be adapted for tracking estimated and actual costs. We will continue to monitor the status of the tracking system. According to Bureau officials, the Bureau planned to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019; however, they had not done so as of June 28, 2019. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement our recommendation related to the cost estimate. The difficulties facing the Bureau’s preparation for the decennial census in such areas as planning and testing; managing and overseeing IT programs, systems, and contractors supporting the enumeration; developing reliable cost estimates; prioritizing decisions; managing schedules; and other challenges, are symptomatic of deeper organizational issues. Following the 2010 Census, a key lesson learned for 2020 that we identified was ensuring that the Bureau’s organizational culture and structure, as well as its approach to strategic planning, human capital management, internal collaboration, knowledge sharing, capital decision- making, risk and change management, and other internal functions are aligned toward delivering more cost-effective outcomes. The Bureau has made improvements over the last decade, and continued progress will depend in part on sustaining efforts to strengthen risk management activities, enhancing systems testing, bringing in experienced personnel to key positions, implementing our recommendations, and meeting regularly with officials from its parent agency, Commerce. Going forward, we have reported that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency officials to (1) leadership commitment, (2) ensuring capacity, (3) developing a corrective action plan, (4) regular monitoring, and (5) demonstrated progress. Although important steps have been taken in at least some of these areas, overall, far more work is needed. We discuss three of five areas below. The Secretary of Commerce has successfully demonstrated leadership commitment. For example, the Bureau and Commerce have strengthened this area with executive-level oversight of the 2020 Census by holding regular meetings on the status of IT systems and other risk areas. In addition, in 2017 Commerce designated a team to assist senior Bureau management with cost estimation challenges. Moreover, on January 2, 2019, a new Director of the Census Bureau took office, a position that had been vacant since June 2017. With regard to capacity, the Bureau has improved the cost estimation process of the decennial when it established guidance including: roles and responsibilities for oversight and approval of cost estimation processes, procedures requiring a detailed description of the steps taken to produce a high-quality cost estimate, and a process for updating the cost estimate and associated documents over the life of a project. However, the Bureau continues to experience skills gaps in the government program management office overseeing the $886 million contract for integrating the IT systems needed to conduct the 2020 Census. Specifically, as of June 2019, 14 of 44 positions in this office were vacant. For the monitoring element, we found to track performance of decennial census operations, the Bureau relied on reports to track progress against pre-set goals for a test conducted in 2018. According to the Bureau, these same reports will be used in 2020 to track progress. However, the Bureau’s schedule for developing IT systems during the 2018 End-to-End test experienced delays that compressed the time available for system testing, integration testing, and security assessments. These schedule delays contributed to systems experiencing problems after deployment, as well as cybersecurity challenges. In the months ahead, we will continue to monitor the Bureau’s progress in addressing each of the five elements essential for reducing the risk to a cost-effective enumeration. Over the past several years we have issued numerous reports that underscored the fact that, if the Bureau was to successfully meet its cost savings goal for the 2020 Census, the agency needed to take significant actions to improve its research, testing, planning, scheduling, cost estimation, system development, and IT security practices. As of June 2019, we have made 106 recommendations related to the 2020 Census. The Bureau has implemented 74 of these recommendations, 31 remain open, and one recommendation was closed as not implemented. Of the 31 open recommendations, 9 were directed at improving the implementation of the innovations for the 2020 Census. Commerce generally agreed with our recommendations and is taking steps to implement them. Moreover, in April 2019 we wrote to the Secretary of Commerce, providing a list of the 12 open 2020-Census-related recommendations that we designated as “priority.” Priority recommendations are those recommendations that we believe warrant priority attention from heads of key departments and agencies. We believe that attention to these recommendations is essential for a cost-effective enumeration. The recommendations included implementing reliable cost estimation and scheduling practices in order to establish better control over program costs, as well as taking steps to better position the Bureau to develop an internet response option for the 2020 Census. In addition to our recommendations, to better position the Bureau for a more cost-effective enumeration, on March 18, 2019, we met with OMB, Commerce, and Bureau officials to discuss the Bureau’s progress in reducing the risks facing the census. We also meet regularly with Bureau officials and managers to discuss the progress and status of open recommendations related to the 2020 Census, which has resulted in Bureau actions in recent months leading to closure of some recommendations. We are encouraged by this commitment by Commerce and the Bureau in addressing our recommendations. Implementing our recommendations in a complete and timely manner is important because it could improve the management of the 2020 Census and help to mitigate continued risks. In conclusion, while the Bureau has made progress in revamping its approach to the census, it faces considerable challenges and uncertainties in implementing key cost-saving innovations and ensuring they function under operational conditions; managing the development and testing of its IT systems; ensuring the cybersecurity of its systems and data; and developing a quality cost estimate for the 2020 Census and preventing further cost increases. For these reasons, the 2020 Census is a GAO high-risk area. Going forward, continued management attention and oversight will be vital for ensuring that risks are managed, preparations stay on track, and the Bureau is held accountable for implementing the enumeration, as planned. Without timely and appropriate actions, the challenges previously discussed could adversely affect the cost, accuracy, schedule, and security of the enumeration. We will continue to assess the Bureau’s efforts and look forward to keeping Congress informed of the Bureau’s progress. Chairman Johnson, Ranking Member Peters, and Members of the Committee, this completes our prepared statement. We would be pleased to respond to any questions that you may have. If you have any questions about this statement, please contact Robert Goldenkoff at (202) 512-2757 or by email at goldenkoffr@gao.gov or Nick Marinos at (202) 512-9342 or by email at marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other key contributors to this testimony include Ty Mitchell (Assistant Director); Lisa Pearson (Assistant Director); Jon Ticehurst (Assistant Director); Emmy Rhine Paule (Analyst in Charge); Christopher Businsky; Jackie Chapin; Jeff DeMarco; Rebecca Eyler; Adella Francis; Scott Pettis; Lindsey Pilver; Kayla Robinson; Robert Robinson; Cindy Saunders; Sejal Sheth; Kevin R. Smith; Andrea Starosciak; and Umesh Thakkar. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Bureau is responsible for conducting a complete and accurate decennial census of the U.S. population. The decennial census is mandated by the Constitution and provides vital data for the nation. A complete count of the nation's population is an enormous undertaking as the Bureau seeks to control the cost of the census, implement operational innovations, and use new and modified IT systems. In recent years, GAO has identified challenges that raise serious concerns about the Bureau's ability to conduct a cost-effective count. For these reasons, GAO added the 2020 Census to its High-Risk list in February 2017. GAO was asked to testify about the reasons the 2020 Census remains on the High-Risk List and the steps the Bureau needs to take to mitigate risks to a successful census. To do so, GAO summarized its prior work regarding the Bureau's planning efforts for the 2020 Census. GAO also included preliminary observations from its ongoing work examining the IT systems readiness and cybersecurity for the 2020 Census. This information is related to, among other things, the Bureau's progress in developing and testing key systems and the status of cybersecurity risks. The 2020 Decennial Census is on GAO's list of high-risk programs primarily because the Department of Commerce's Census Bureau (Bureau) (1) is using innovations that are not expected to be fully tested, (2) continues to face challenges in implementing information technology (IT) systems, and (3) faces significant cybersecurity risks to its systems and data. Although the Bureau has taken initial steps to address risk, additional actions are needed as these risks could adversely impact the cost, quality, schedule, and security of the enumeration. Innovations. The Bureau is planning several innovations for the 2020 Census, including allowing the public to respond using the internet. These innovations show promise for controlling costs, but they also introduce new risks, in part, because they have not been used extensively, if at all, in earlier enumerations. As a result, testing is essential to ensure that key IT systems and operations will function as planned. However, citing budgetary uncertainties, the Bureau scaled back operational tests in 2017 and 2018, missing an opportunity to fully demonstrate that the innovations and IT systems will function as intended during the 2020 Census. To manage risk to the census, the Bureau has developed hundreds of mitigation and contingency plans. To maximize readiness for the 2020 Census, it will also be important for the Bureau to prioritize among its mitigation and contingency strategies those that will deliver the most cost-effective outcomes for the census. Implementing IT systems. The Bureau plans to rely heavily on IT for the 2020 Census, including a total of 52 new and legacy IT systems and the infrastructure supporting them. To help improve its implementation of IT, in October 2018, the Bureau revised its systems development and testing schedule to reflect, among other things, lessons learned during its 2018 operational test. However, GAO's ongoing work has determined that the Bureau is at risk of not meeting near-term IT system development and testing schedule milestones for five upcoming 2020 Census operational deliveries, including self-response (e.g., the ability to respond to the 2020 Census through the internet). These schedule management challenges may compress the time available for the remaining system development and testing, and increase the risk that systems will not function as intended. It will be important that the Bureau effectively manages IT implementation risk to ensure that it meets near-term milestones for system development and testing, and that it is ready for the major operations of the 2020 Census. To its credit, the Bureau is also working with the Department of Homeland Security (DHS) to support its 2020 Census cybersecurity efforts. For example, DHS is helping the Bureau ensure a scalable and secure network connection for the 2020 Census respondents and to strengthen its response to potential cyber threats. During the last 2 years, as a result of these activities, the Bureau has received 42 recommendations from DHS to improve its cybersecurity posture. GAO recently recommended that the Bureau implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity findings identified by DHS. Implementing the recommendation would help better ensure that DHS's efforts result in improvements to the Bureau's cybersecurity posture. In addition to addressing risks which could affect innovations and the security of the enumeration, the Bureau has the opportunity to improve its cost estimating process for the 2020 Census, and ultimately the reliability of the estimate itself, by reflecting best practices. In October 2017, the 2020 Census life-cycle cost estimate was updated and is now projected to be $15.6 billion, a more than $3 billion (27 percent) increase over its earlier estimate. GAO reported in August 2018 that although the Bureau had taken steps to improve its cost estimation process for 2020, it needed to implement a system to track and report variances between actual and estimated cost elements. According to Bureau officials, they planned to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019; however, they had not done so as of June 28, 2019. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement GAO's recommendation related to the cost estimate. Over the past decade, GAO has made 106 recommendations specific to the 2020 Census to help address these risks and other concerns. The Department of Commerce has generally agreed with these recommendations and has taken action to address many of them. However, as of June 2019, 31 of the recommendations had not been fully implemented. While all 31 open recommendations are important for a high-quality and cost-effective enumeration, 9 are directed at managing the risks introduced by the Bureau's planned innovations for the 2020 Census. To ensure a high-quality and cost-effective enumeration, it will be important for the Bureau to address these recommendations. Over the past decade, GAO has made 106 recommendations specific to the 2020 Census to help address issues raised in this and other products. The Department of Commerce has generally agreed with the recommendations. As of June 2019, 31 of the recommendations had not been fully implemented.", "document_type": "gao"}
{"report": "For over 20 years, Congress has enacted various laws, and federal agencies have issued guidance, that call for agencies to perform workforce planning activities to help ensure the timely and effective acquisition of IT. These laws and guidance focus on the importance of (1) setting the strategic direction for workforce planning, (2) analyzing the workforce to identify skill gaps, (3) developing strategies to address skill gaps, and (4) monitoring and reporting on progress in addressing skill gaps. For example: The Clinger-Cohen Act of 1996 requires agency chief information officers (CIO) to annually (1) assess the requirements established for agency personnel regarding knowledge and skills in information resource management and the adequacy of such requirements for facilitating the achievement of performance goals; (2) assess the extent to which the positions and personnel at executive and management levels meet those requirements; (3) develop strategies and specific plans for hiring, training, and professional development to address any deficiencies; and (4) report to the head of the agency on the progress made in improving information resources management capability. The E-Government Act of 2002 requires the Director of OPM, in consultation with the Director of OMB, the CIO Council, and the Administrator of General Services to (1) analyze, on an ongoing basis, the personnel needs of the federal government related to IT and information resource management; and (2) identify where current IT and information resource management training do not satisfy personnel needs. In addition, the law requires the Director of OMB to ensure that agency heads collect and maintain standardized information on their IT and information resources management workforce. In 2010, OMB issued its 25-point plan for IT reform and outlined several action plans to build workforce capabilities, including capabilities for acquisition and program management. For example, the plan directed OPM to create a specialized career path for IT program managers. In addition, OMB stated that it would work with OPM to provide agencies with direct hiring authority for program managers. OMB also tasked agencies with identifying program management competency gaps and reporting to OMB on those gaps. Subsequent to the 25-point plan, in July 2011, OMB released guidance for agencies to develop specialized IT acquisition cadres. Among other things, this guidance required agencies to analyze current acquisition staffing challenges; determine if developing or expanding the use of cadres would improve program results; and outline a plan to pilot or expand cadres for an especially high-risk area, if the agency determined that such an effort would improve performance. Further, in November 2011, OPM issued guidance for developing career paths for IT program managers. OPM’s career path guide was to build upon its IT Program Management Competency Model released in July 2011 by serving as a roadmap for individuals interested in pursuing a career in this area. In addition, the roadmap was to provide employees and their supervisors with a single-source reference to determine appropriate training opportunities for career advancement. In December 2014, Congress enacted legislation commonly referred to as FITARA. Among other things, the law aims to ensure timely progress by federal agencies toward developing, strengthening, and deploying IT acquisition cadres consisting of personnel with highly specialized skills in IT acquisition, including program and project managers. Almost all of the 24 CFO Act agencies (other than the Department of Defense (Defense)) are required to update their annual acquisition human capital plans to address how they are meeting their human capital requirements to support timely and effective acquisitions. To assist agencies in implementing the provisions of FITARA and to build upon agency responsibilities under the Clinger-Cohen Act of 1996, OMB issued guidance to agencies in June 2015. In doing so, OMB directed agencies (other than Defense) to, among other things, (1) develop a set of competency requirements for staff, including leadership positions; and (2) develop and maintain a current workforce planning processes to ensure that agencies can anticipate and respond to changing mission requirements, maintain workforce skills in a rapidly developing environment, and recruit and retain the talent needed to accomplish their missions. Each agency is to conduct an annual self-assessment of its conformity with these requirements and develop an implementation plan describing the changes it will make. The Federal Cybersecurity Workforce Assessment Act of 2015 required OPM, with support from the National Institute of Standards and Technology, to establish a coding structure to be used in identifying all federal civilian and noncivilian positions that require the performance of IT, cybersecurity, or other cyber-related functions. The act also required agencies, in consultation with OPM, the National Institute of Standards and Technology, and the Department of Homeland Security (DHS), to then utilize this coding structure to annually assess, among other things, the IT, cybersecurity, and other cyber-related work roles of critical need in their workforce. In April 2016, OPM issued an update to agency chief human capital officers stating that it had recently revalidated the need to continue working to close skill gaps in certain government-wide high-risk mission critical occupations, including those in the cybersecurity and the science, technology, engineering and mathematics functional area. OMB released its Federal Cybersecurity Workforce Strategy in July 2016. Among other things, the strategy cited the need for agencies to examine specific IT, cybersecurity, and cyber-related work roles, and identify personnel skills gaps, rather than merely examining the number of vacancies by job series. The strategy identified several actions that agencies could take to identify workforce needs, expand the cybersecurity workforce through education and training, recruit and hire highly skilled talent, and retain and develop highly skilled talent. In July 2016, OMB issued updated policy for the planning, budgeting, governance, acquisition, and management of federal information, personnel, equipment, funds, IT resources, and supporting infrastructure and services. Among other things, OMB’s updated policy requires an agency’s chief human capital officer, CIO, chief acquisition officer, and senior agency official for privacy to develop a set of competency requirements for staff and develop and maintain a current workforce planning process. Further, in September 2016, OPM updated its guidance regarding the annual submission of agencies’ mission critical occupation resource charts. These charts are to identify current staffing levels, staffing targets, projected attrition, actual attrition, and retirement eligibility in government-wide and selected agency-specific mission critical occupations. While these laws and guidance focus on IT workforce planning, other broader initiatives have also been undertaken to improve federal human capital management. For example, we and OPM have developed human capital management models that call for implementing workforce planning practices that can facilitate the analysis of gaps between current skills and future needs. In addition, the models call for the development of strategies for filling the gaps, as well as planning for succession. Further, our Standards for Internal Control in the Federal Government stress that management should consider how best to retain valuable employees, plan for their eventual succession, and ensure continuity of needed skills and abilities. Based on the aforementioned laws, guidance, and initiatives, in November 2016, GAO issued an evaluation framework to support the assessment of whether selected federal agencies are adequately assessing and addressing gaps in IT knowledge and skills. The framework identifies four workforce planning steps and supporting activities that address (1) setting the strategic direction for IT workforce planning, (2) analyzing the IT workforce to identify competency and staffing gaps, (3) developing and implementing strategies to address the gaps, and (4) monitoring and reporting progress in addressing the gaps. We have previously reported that effectively addressing mission critical skill gaps in IT requires a multifaceted response from OPM and agencies. Specifically, our high-risk update in February 2013 noted that OPM and agencies would need to use a strategic approach that (1) involves top management, employees, and other stakeholders; (2) identifies the critical skills and competencies that will be needed to achieve current and future programmatic results; (3) develops strategies that are tailored to address skill gaps; (4) builds the internal capability needed to address administrative, training, and other requirements important to support workforce planning strategies; and (5) includes plans to monitor and evaluate progress toward closing skill gaps and meeting other human capital goals using a variety of appropriate metrics. In January 2015, we reported that the Chief Human Capital Officers Council had identified skill gaps in six government-wide occupations including IT/cybersecurity and contract specialist/acquisition. We noted, however, that the effort had shortcomings, and that it would be important for the council to use lessons learned from these initial efforts to inform subsequent ones to identify skill gaps. We also reported that key features of OPM’s efforts to predict emerging skill gaps beyond those already identified were in the early planning stages, and OPM and selected agencies could improve the manner in which they address skill gaps by strengthening their use of quarterly data-driven reviews. Further, we reported that individual agencies across the federal government have not always effectively planned for IT workforce challenges. For example, In May 2014, we concluded that the Social Security Administration’s (SSA) IT human capital program had identified skills and competencies to support certain workforce needs, but lacked adequate planning for the future. The agency had developed IT human capital planning documents, such as an Information Resources Management plan, and skills inventory gap reports that identified near-term needs, such as skill sets for the following 2 years. Nevertheless, SSA had not adequately planned for longer-term needs because its human capital planning and analysis were not aligned with long-term goals and objectives and the agency did not have a current succession plan for its IT efforts. Accordingly, we recommended that SSA identify long-term IT needs in its updated human capital operating plan. The agency agreed with, and subsequently implemented the recommendation. In August 2016, we determined that the Department of Veterans Affairs (VA) had performed key steps, such as documenting an IT human capital strategic plan and regularly analyzing workforce data. However, the agency had not tracked and reviewed historical and projected leadership retirements and had not identified gaps in future skill areas. We recommended that the agency track and review historical workforce data and projections related to leadership retirements, and identify IT skills needed beyond the current fiscal year, to assist in identifying future skills gaps. The agency concurred with our recommendations and has partially implemented them by identifying the IT skills it needed beyond the current fiscal year. In November 2016, as a part of the review in which we developed the IT workforce planning framework discussed previously, we assessed five agencies—the Departments of Commerce (Commerce), Defense, Transportation (Transportation), the Treasury (Treasury), and Health and Human Services (HHS)—against the eight key workforce planning activities. While all five agencies had demonstrated important progress in either partially or fully implementing key workforce planning activities, each had shortfalls. For example, only one agency (Defense) had implemented a workforce planning process, none had identified IT competency gaps for their entire workforce, and three (Defense, Transportation, and Treasury) were performing some level of monitoring toward the closure of identified skill gaps. We reported that, until the agencies fully implemented key workforce planning activities, they would have a limited ability to assess and address gaps in knowledge and skills that are critical to the success of major IT acquisitions. As a result, we recommended that the agencies implement the eight IT workforce planning activities to facilitate the analysis of gaps between current skills and future needs, the development of strategies for filling the gaps, and succession planning. Defense partially agreed with our recommendations and the other four agencies agreed with our recommendations. An updated assessment of actions to implement our recommendations is described in our evaluation of agencies’ implementation of key IT workforce planning activities in appendix II. In May 2018, as part of a review of the National Aeronautics and Space Administration’s (NASA) approach to overseeing and managing IT, we found that the agency had partially implemented five of the eight key IT workforce planning activities and had not implemented three. For example, NASA had not assessed competency and staffing needs regularly or reported progress to agency leadership. We reported that, until the agency implemented the key IT workforce planning activities, it would have difficulty anticipating and responding to changing staffing needs. As a result, we recommended that NASA fully implement the eight key IT workforce planning activities. The agency disagreed with our recommendation stating that its workforce improvement activities were already underway. Nevertheless, implementing the workforce planning activities discussed in this report could enhance and complement the agency’s ongoing and future efforts. In a June 2018 report on the progress of agencies’ efforts to implement the requirements of the Federal Cybersecurity Workforce Assessment Act of 2015, we noted that most CFO Act agencies had developed baseline assessments to identify cybersecurity personnel within their agencies that held certifications. However, because agencies had not consistently defined the workforce and the National Initiative for Cybersecurity Education had not developed a list of appropriate certifications, efforts such as conducting the baseline assessment to determine the percentage of cybersecurity personnel that hold appropriate certifications had yielded inconsistent and potentially unreliable results. Further, we reported that, while most CFO Act agencies had developed procedures for assigning cybersecurity codes to positions, several agencies had not addressed activities required by OPM to implement the requirements of the Federal Cybersecurity Workforce Assessment Act. As a result, we made 30 recommendations to 13 agencies to develop and submit their baseline assessments and to fully address the required activities in OPM’s guidance in their procedures for assigning employment codes to cybersecurity positions. Of the 13 agencies, seven agreed with the recommendations made to them, four did not state whether they agreed or disagreed, one agency agreed with one of the two recommendations made to it, and one did not provide comments on the report. As of July 2019, the agencies had implemented 20 of the recommendations. In August 2018, as part of a government-wide review of CIO responsibilities, we reported that CIOs are responsible for assessing agency IT workforce needs and developing strategies and plans for meeting those needs. However, we noted that the majority of the agencies minimally addressed or did not address the role of their CIOs in the area of IT workforce and reported major challenges related to their IT workforce. Specifically, 19 agencies’ policies had not addressed their CIOs’ role in conducting annual assessments of IT management and skill requirements and the remaining five agencies had only partially addressed this responsibility. We noted that the shortcomings in agencies’ policies were attributable, at least in part, to incomplete guidance from OMB. Consequently, we recommended that OMB issue guidance that addresses the IT workforce responsibilities of CIOs that were not included in existing guidance. OMB partially agreed with the recommendation and has not yet implemented it. We also recommended that 24 agencies ensure that their IT management policies address the role of their CIOs in the IT workforce management area. Of the 24 agencies, 14 agreed with the recommendations, five had no comments, five partially agreed, and one disagreed. We are monitoring the status of the agencies’ actions to implement our recommendations. In March 2019, as part of an update on the status of agencies’ progress in implementing the requirements of the Federal Cybersecurity Workforce Assessment Act, we reported, among other things, that most of the 24 CFO Act agencies had not completely or accurately categorized work roles for IT positions within the 2210 IT management occupational series (IT management). The agencies reported that this was, in part, because they may have assigned the associated codes in error or had not completed validating the accuracy of the assigned codes. We noted that, by assigning work roles that are inconsistent with the IT, cybersecurity, and cyber-related positions, the agencies were diminishing the reliability of the information they needed to improve workforce planning. We made recommendations to 22 agencies to take steps to address the inaccuracies. Of these agencies, 20 agreed with the recommendations, one partially agreed, and one did not agree with one of the two recommendations. As of August 2019, three of the agencies have implemented their recommendation, and two of the agencies have implemented one of their two recommendations. We continue to believe that all of the recommendations are warranted. As previously noted, GAO issued an IT workforce planning framework that includes eight key activities, based on federal laws, guidance, and best practices. Implementing these activities is critical to adequately assessing and addressing gaps in IT knowledge, skills, and abilities that are needed to execute a range of management functions that support agencies’ missions and goals. The eight key workforce planning activities are identified in table 1. None of the 24 agencies that we reviewed had fully implemented all eight IT workforce planning activities. In this regard, nearly all of the agencies had partially implemented, substantially implemented, or fully implemented three of the workforce planning activities (develop competency and staffing requirements, assess competency and staffing needs regularly, and assess gaps in competencies and staffing). However, most agencies had minimally implemented or did not implement the five other workforce planning activities (including efforts to establish a workforce planning process and address staffing gaps). Figure 1 shows the agencies’ overall implementation of each of the eight key IT workforce planning activities, as of May 2019. Further, some agencies had made more progress than others. Specifically, while five agencies (Defense, Department of State (State), VA, Small Business Administration (SBA), and SSA) fully implemented or substantially implemented three or more activities, 11 agencies did not fully implement any of the activities, and 15 agencies did not implement three or more activities. Figure 2 identifies the extent to which each of the 24 agencies had implemented the eight workforce planning activities. In addition, appendix II provides our assessment of each agency’s implementation of the activities. To fully implement the establish and maintain an IT workforce planning process activity, an agency should have a documented IT workforce planning process that describes how the agency will implement key IT workforce planning activities, including those identified in the IT workforce planning framework. The process should also define the CIO’s and others’ roles and responsibilities for implementing the activities; align with mission goals and objectives; and address both the agency-level and component-level workforce, including how the agency is to maintain visibility and oversight into component-level workforce planning efforts (as applicable). In addition, the agency should periodically update the process. Only one of the 24 CFO Act agencies had fully implemented this activity. Specifically, one agency had fully implemented the activity (Nuclear Regulatory Commission (NRC)); one agency had substantially implemented the activity (Defense); two agencies had partially implemented the activity (Department of Housing and Urban Development (HUD), and SBA); 12 agencies had minimally implemented the activity (U.S. Department of Agriculture (Agriculture), Commerce, Department of Energy (Energy), HHS, DHS, Department of the Interior (Interior), Department of Labor (Labor), State, Transportation, Treasury, VA, and SSA); and eight agencies did not implement the activity (Department of Education (Education), Department of Justice (Justice), Environmental Protection Agency (EPA), General Services Administration (GSA), NASA, National Science Foundation (NSF), OPM, and U.S. Agency for International Development (USAID)). NRC fully implemented the activity. In February 2016, NRC developed a strategic workforce plan that addressed all key IT workforce planning activities in our framework. In addition, the process was aligned with the agency’s goals and objectives. Further, the process included general roles and responsibilities, including for the Office of the Chief Human Capital Officer, Senior Management, and its component offices. Moreover, the agency’s Management Directive 9.22 further defined the Chief Information Officer’s roles and responsibilities with regards to IT workforce planning. In addition, NRC has periodically updated the process. For example, the agency updated the process in July 2017 to better integrate its workload projection, skills identification, human capital management, individual development, and workforce management activities. Defense substantially implemented the activity. The agency’s June 2018 Human Capital Operating Plan addressed how Defense plans to implement the workforce planning activities for its functional communities, including the IT functional community. In addition, the plan defined the CIO’s roles and responsibilities and was aligned with the agency’s goals and objectives. Further, the plan documented how the agency will maintain oversight of and visibility into functional community planning efforts. However, it called for the functional communities to develop strategic workforce plans to further define their workforce planning process and the IT functional community has not yet completed its plan or provided a time frame for completion. With respect to maintaining the process, Defense periodically updated its IT workforce process—the June 2018 plan replaced the process identified in the agency’s previous workforce plans. SBA partially implemented the activity. In April 2018, SBA released its IT Workforce Plan for fiscal years 2018 through 2020 that addressed how the agency intends to implement all of its IT workforce planning activities, and was aligned with the agency’s mission goals and objectives. In addition, in April 2018, the agency released its IT Change Management and Communication Plan that defined the CIO’s IT workforce planning roles and responsibilities and was aligned with the agency’s mission goals and objectives. However, as it is a new process, SBA had not updated it as of May 2019. Interior minimally implemented the activity. Interior issued a policy in 2016 that directed its bureaus to develop IT workforce plans, which the agency stated that it intends to use to develop an agency-wide IT workforce plan. The policy identified efforts that should be addressed in the plans, including most of the IT workforce planning activities. However, as of May 2019, the bureaus’ plans and the agency-wide plan had not been completed. Officials in the Office of the CIO stated that they expect to finalize all of the plans by the end of fiscal year 2019. GSA did not implement the activity. Officials in the Human Capital Strategic Planning Division stated that GSA followed the process described in OPM’s IT workforce planning guidance; however, the agency did not document this in policy and had not developed any other documentation to guide its implementation of workforce planning activities. To fully implement the develop competency and staffing requirements activity, an agency should develop a set of competency requirements for all or most of its IT workforce, including leadership positions. In addition, the agency should develop staffing requirements, which include projections over several years. Most of the agencies had fully or substantially developed competency and staffing requirements. Specifically, 12 agencies had fully implemented the activity (Defense, Education, HUD, State, Transportation, Treasury, VA, GSA, NASA, SBA, SSA, and USAID), four agencies had substantially implemented the activity (Agriculture, Commerce, HHS, and DHS), and eight agencies had partially implemented the activity (Energy, Interior, Justice, Labor, EPA, NSF, NRC, and OPM). State fully implemented the activity. State developed competency requirements for its IT workforce, including for both its foreign and civil services. In addition, State developed staffing requirements for its IT staff, including projections over several years. Specifically, it developed staffing requirements for its mission critical occupations, which include IT management, in response to OPM’s requirement to submit this information annually. DHS substantially implemented the activity. DHS developed competency requirements for two of the agency’s four IT functional groups. According to officials in the Office of the CIO, the agency expects to finalize competency requirements for the remaining two groups by the end of fiscal year 2019. In addition, DHS developed staffing requirements for its IT staff, including projections over several years. Specifically, it developed staffing requirements for its mission critical occupations, which include IT management, in response to OPM’s requirement to submit this information annually. OPM partially implemented the activity. OPM did not develop competency requirements. However, the agency developed staffing requirements for its IT staff, including projections over several years. Specifically, it developed staffing requirements for its mission critical occupations, which include IT management. To fully implement the assess competency and staffing needs regularly activity, an agency should periodically assess competency needs for all or most of its IT workforce. In addition, the agency should periodically assess staffing needs for all or most of its IT workforce. Most of the agencies periodically assessed staffing needs, but did not assess competency needs. Specifically, three agencies had fully implemented the activity (Defense, VA, and SSA); 20 agencies had partially implemented the activity by periodically assessing IT staffing needs; however, these agencies did not periodically assess competency needs (Agriculture, Commerce, Education, Energy, HHS, DHS, HUD, Interior, Justice, Labor, State, Transportation, Treasury, GSA, NASA, NSF, NRC, OPM, SBA, and USAID); and one agency did not implement the activity (EPA). VA fully implemented the activity. VA assessed competency needs annually as a part of its professional development planning process. For example, the agency performed an assessment in fiscal year 2017, which led it to add project management as a competency for all IT staff. In addition, in fiscal year 2018, VA’s assessment resulted in adding two new competencies—data analytics and risk management. Further, VA annually assessed staffing needs for its IT staff in response to the annual OPM reporting requirement to do so. Commerce partially implemented the activity. The agency initially developed its competency requirements in January 2016, but had not since updated its needs. On the other hand, Commerce annually assessed staffing needs for its IT staff in response to the OPM reporting requirement to do so. EPA did not implement the activity. EPA did not develop competency needs for its IT workforce. In addition, the agency could not provide documentation showing that it had regularly assessed staffing needs for its IT staff. To fully implement the assess gaps in competencies and staffing activity, an agency should periodically assess gaps in competencies for all or most of its IT workforce. Further, the assessment should be performed based on the agency’s current competency needs. In addition, the agency should periodically assess gaps in staffing for all or most of its IT workforce. Most agencies took steps to assess competency and staffing gaps. Specifically, two agencies had fully implemented the activity (VA and SSA); nine agencies had substantially implemented the activity (Agriculture, Defense, DHS, HUD, State, Transportation, GSA, NASA, and SBA); 12 agencies had partially implemented the activity by periodically assessing IT staffing gaps, but not periodically assessing competency gaps (Commerce, Education, Energy, HHS, Interior, Justice, Labor, Treasury, NSF, NRC, OPM, and USAID); and one agency had minimally implemented the activity (EPA). SSA fully implemented the activity. SSA assessed gaps in its competencies for its IT management staff biennially starting in fiscal year 2014. In addition, SSA annually assessed staffing gaps for its IT staff in response to the OPM reporting requirement. HUD substantially implemented the activity. HUD assessed competency gaps for its IT management staff biennially; it began doing so in fiscal year 2014. However, HUD did not assess competency needs regularly; thus, it could not ensure that the gap assessments reflect the agency’s current competency needs. HUD annually assessed staffing gaps for its IT staff in response to the OPM reporting requirement. Education partially implemented the activity. Education did not assess gaps in competencies for its IT staff. However, the agency annually assessed staffing gaps for its IT staff in response to the OPM reporting requirement. EPA minimally implemented the activity. EPA did not assess competency gaps because, as previously stated, the agency did not develop competency requirements. In addition, while EPA assessed staffing gaps in 2018, it did not provide documentation showing that it had assessed staffing gaps prior to or since then. To fully implement the develop strategies and plans to address gaps in competencies and staffing activity, an agency should develop strategies and plans, including specific actions and milestones, to address identified competency gaps. In addition, the agency should develop strategies and plans, including specific actions and milestones, to address identified staffing gaps. Most agencies did not develop strategies and plans to address competency and staffing gaps. Specifically, four agencies had substantially implemented the activity (Defense, State, VA, and SBA), one agency had partially implemented the activity (Agriculture), six agencies had minimally implemented the activity (HUD, Transportation, EPA, GSA, SSA, and USAID), and 13 agencies did not implement the activity (Commerce, Education, Energy, HHS, DHS, Interior, Justice, Labor, Treasury, NASA, NSF, NRC, and OPM). State substantially implemented the activity. State identified strategies to address high-priority IT competency gaps, including developing additional training, conducting quarterly reviews of IT workforce issues, and improving hiring processes; however, it had not developed plans, including actions and milestones, for how it would carry out the strategies. With respect to staffing, State identified strategies and plans to address them in its Five-Year Workforce and Leadership Success Plan for Fiscal Years 2016 through 2020. For example, State identified using special hiring initiatives, such as its Pathways Programs, to address staffing gaps. In addition, State developed the Foreign Affairs IT Fellowship Program, which is intended to recruit students by offering internships. Agriculture partially implemented the activity. In 2019, Agriculture developed strategies, which included providing training and developing career paths, to address competency gaps identified for two of 13 IT functional roles; however, the agency did not develop associated plans, including actions and milestones. Further, Agriculture did not develop strategies to address gaps for the other 11 IT functional roles because the agency had not assessed gaps for those roles. With respect to staffing, in 2019, Agriculture identified strategies to address staffing gaps identified for two of its IT functional roles, including collaborating with universities. However, it did not develop plans to carry out the strategies. In addition, Agriculture did not develop strategies and plans to address gaps in staffing for its other 11 IT functional roles. HUD minimally implemented the activity. HUD’s Office of the CIO developed a training plan for fiscal years 2017 through 2018, which identified training courses to address specific technical competency gaps. However, HUD has not updated its competency needs regularly to ensure that the plan and underlying gap assessment reflect the agency’s current competency needs. With respect to staffing, HUD did not develop strategies and plans to address gaps. DHS did not implement the activity. DHS did not develop strategies and plans to address either competency or staffing gaps. To fully implement the implement activities that address gaps activity, an agency should execute its strategies and plans to address identified gaps in competencies and staffing. In addition, the agency should implement other efforts to assist with addressing competency and staffing needs, including the following efforts identified in FITARA: IT acquisition cadres, cross-functional training of acquisition and program personnel, career paths for program managers, plans to strengthen program management, and the use of special hiring authorities. Most of the agencies minimally implemented strategies and plans to address competency and staffing gaps. Specifically, two agencies had substantially implemented this activity (Defense and VA), seven agencies had partially implemented the activity (HHS, DHS, State, Treasury, SBA, SSA, and USAID), and 15 agencies had minimally implemented the activity by implementing workforce efforts identified in FITARA, but not implementing strategies and plans to address its identified competency and staffing gaps primarily because they had not developed strategies and plans to address identified gaps (Agriculture, Commerce, Education, Energy, HUD, Interior, Justice, Labor, Transportation, EPA, GSA, NASA, NSF, NRC, and OPM). VA substantially implemented the activity. VA implemented strategies and plans to address gaps in competencies. For example, in its Office of Information and Technology Training Gap Analysis report, VA identified actions taken to address the prior year’s competency gaps. These actions included developing additional training courses, as well as providing on-the-job training activities. However, VA did not provide documentation showing that it had implemented strategies and plans to address identified staffing gaps. With respect to the efforts identified in FITARA that can assist with addressing competency and staffing needs, VA implemented an IT acquisition cadre, developed plans to strengthen program management, developed a career path for program managers, and used special hiring authorities to hire IT staff. SSA partially implemented the activity. SSA implemented strategies to address gaps in competencies. For example, according to its gap closure report, the agency closed competency gaps by providing training to existing staff, hiring new staff, and hiring contractors with needed skills. However, SSA did not implement strategies and plans to address staffing gaps because it had not yet developed them. With respect to the efforts identified in FITARA that can assist with addressing competency and staffing needs, SSA used special hiring authorities to hire eight IT specialists in fiscal year 2018. However, SSA did not implement others, including IT acquisition cadres, cross- functional training of acquisition and program personnel, career paths for program managers, and plans to strengthen program management. GSA minimally implemented the activity. GSA did not develop strategies and plans to address identified gaps in competencies or staffing. With respect to the efforts identified in FITARA that can assist with addressing competency and staffing needs, GSA implemented efforts to provide cross-functional training for acquisition and program personnel and used special hiring authorities to hire IT staff. However, the agency did not implement others, including plans to strengthen program management or career paths for program managers. To fully implement the monitor the agency’s progress in addressing competency and staffing gaps activity, an agency should track progress in implementing strategies and plans to address competency gaps. In addition, the agency should track progress in implementing strategies and plans to address staffing gaps. Most agencies did not establish processes for monitoring progress in addressing competency and staffing gaps. Specifically, three agencies had partially implemented the activity (Defense, VA, and SBA), five agencies had minimally implemented the activity (HUD, State, Transportation, SSA, and USAID), and 16 agencies did not implement the activity (Agriculture, Commerce, Education, Energy, HHS, DHS, Interior, Justice, Labor, Treasury, EPA, GSA, NASA, NSF, NRC, and OPM). SBA partially implemented the activity. SBA established an IT Workforce Steering Committee which monitored progress made in implementing, among other things, strategies and plans to address competency and staffing gaps. However, the agency did not monitor whether the strategies and plans led to a closure in gaps. State minimally implemented the activity. While State monitored its progress in implementing recommended actions to address competency gaps, the agency did not monitor whether the actions led to closing gaps. With respect to staffing, State did not monitor progress in addressing gaps because it did not develop strategies and plans to close staffing gaps. GSA did not implement the activity. GSA did not track progress in addressing competency gaps because the agency did not assess competencies to identify such gaps. Further, GSA did not monitor its progress in addressing staffing gaps because it did not develop strategies and plans to close the gaps. To fully implement the report to agency leadership on progress activity, an agency should periodically report to agency leadership on progress in implementing strategies and plans to address gaps in competencies. In addition, the agency should periodically report to leadership on progress in implementing strategies and plans to address gaps in staffing. However, most of the agencies did not establish processes for reporting their progress in addressing competency and staffing gaps. Specifically, three agencies had partially implemented the activity (Defense, VA, and SBA), three had minimally implemented the activity (HUD, SSA, and USAID), and 18 did not implement the activity (Agriculture, Commerce, Education, Energy, HHS, DHS, Interior, Justice, Labor, State, Transportation, Treasury, EPA, GSA, NASA, NSF, NRC, and OPM). VA partially implemented the activity. VA reported to agency leadership on its progress in addressing competency gaps, including the closure of gaps, and the actions planned and taken to address the gaps. However, VA did not report on progress in addressing staffing gaps because it did not implement strategies and plans to address such gaps. HUD minimally implemented the activity. HUD reported to agency leadership on the closure of competency gaps from fiscal year 2014 through fiscal year 2016. However, the agency did not monitor or report on its progress in implementing strategies and plans to address gaps in competencies. With respect to staffing, HUD did not report on its progress in addressing gaps because it did not implement strategies and plans to close staffing gaps. DHS did not implement the activity. DHS did not periodically report to agency leadership on its progress in addressing competency or staffing gaps. The agency did not do so because it did not develop strategies and plans to address competency and staffing gaps. Agency officials cited various factors that limited their progress in implementing the key IT workforce planning activities. For example, six agencies, including DHS and NRC, reported that they had not completed key activities because they were reliant on finishing other prerequisite activities. For example, officials in DHS’s Office of the CIO stated that they had not updated their IT competency needs because they had not yet finished identifying competency requirements for all of the agency’s role-based groups; four agencies, including HHS and NASA, reported that they had other workforce related priorities, including those related to the Cybersecurity Workforce Assessment Act; three agencies, including GSA and USAID, reported that they lacked resources to perform the activities; and two agencies (OPM and Interior) reported that leadership turnover affected their implementation of workforce planning activities. Until agencies make it a priority to implement all of the key IT workforce planning activities, they will likely have a limited ability to assess and address gaps in the knowledge and skills that are critical to the success of major acquisitions. As a result, it will be difficult for agencies to anticipate and respond to changing staffing needs and control human capital risks when developing, implementing, and operating critical IT systems. The majority of the agencies made significant progress implementing three activities—develop competency and staffing requirements, assess competency and staffing needs regularly, and assess gaps in competencies and staffing—and in doing so took important steps towards identifying the workforce they need to help them achieve their mission, and the gaps that need to be addressed. In contrast, most agencies only minimally implemented or did not implement the remaining five activities, increasing the risk that they will not address the gaps. Agencies’ limited implementation of the IT workforce planning activities has been due, in part, to not making IT workforce planning a priority, despite the laws and guidance which have called for them to do so for over 20 years. Until this occurs, agencies will likely not have the staff with the necessary knowledge, skills, and abilities to support the agency’s mission and goals. We are making a total of 18 recommendations to federal agencies—one recommendation to 18 agencies. The Secretary of Agriculture should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 1) The Secretary of Education should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 2) The Secretary of Energy should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 3) The Secretary of Homeland Security should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 4) The Secretary of Housing and Urban Development should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 5) The Secretary of the Interior should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 6) The Attorney General should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 7) The Secretary of Labor should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 8) The Secretary of State should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 9) The Secretary of Veterans Affairs should ensure that the agency fully implements each of the five key IT workforce planning activities it did not fully implement. (Recommendation 10) The Administrator of the Environmental Protection Agency should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 11) The Administrator of the General Services Administration should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 12) The Director of the National Science Foundation should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 13) The Chairman of the Nuclear Regulatory Commission should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 14) The Director of the Office of Personnel Management should ensure that the agency fully implements each of the eight key IT workforce planning activities it did not fully implement. (Recommendation 15) The Administrator of the Small Business Administration should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 16) The Commissioner of the Social Security Administration should ensure that the agency fully implements each of the five key IT workforce planning activities it did not fully implement. (Recommendation 17) The Administrator of the U.S. Agency for International Development should ensure that the agency fully implements each of the seven key IT workforce planning activities it did not fully implement. (Recommendation 18) We are not making new recommendations to six agencies—Commerce, Defense, HHS, Transportation, Treasury, and NASA—because we previously made recommendations to these agencies to address the key IT workforce planning activities. We provided a draft of the report to the 24 CFO Act agencies for their review and comment. Of the 18 agencies to which we made a recommendation in this report, 13 agencies (Energy, DHS, HUD, Interior, Labor, State, VA, GSA, NSF, OPM, SBA, SSA, and USAID) agreed with the recommendation; one agency (Education) partially agreed with the recommendation; three agencies (Agriculture, Justice, EPA) neither agreed nor disagreed with the recommendation; and one agency (NRC) did not agree with our findings. We also received technical comments from a number of the agencies, which we have incorporated into the report, as appropriate. In addition, of the six agencies to which we did not make recommendations in this report, two (Defense and the Treasury) provided comments on the report and the remaining four (Commerce, HHS, Transportation, and NASA) responded that they did not have any comments on the report. The following 13 agencies agreed with our recommendations: In written comments (reprinted in appendix III), Energy concurred with our recommendation. The agency stated that it plans to fully implement all of the IT workforce planning activities, and described recently completed and intended efforts to do so. For example, the agency stated that it completed the development of competency and staffing requirements in May 2019. In addition, the agency said it expects to finish developing an IT workforce planning process in December 2020. While the efforts described represent positive steps toward fully implementing the IT workforce planning activities, Energy did not provide supporting documentation for the activities it said were completed. As a result, we did not change our ratings for these activities. In its written comments (reprinted in appendix IV), DHS concurred with our recommendation and stated that it remains committed to fully implementing all of the IT workforce planning activities. Further, the agency stated that it had completed developing competency requirements and assessing gaps for its two remaining IT role based groups. However, the agency did not provide documentation to support its completion of these activities. As a result, we did not change our ratings for the activities. DHS also stated that the Office of the Chief of Staff Workforce Engagement Division, within the Office of the CIO, plans to work with the agency’s Chief Information Officer Council and the Office of Chief Human Capital Officer to form an integrated project team by January 30, 2020. According to DHS, this project team will be charged with discussing the agency’s IT workforce planning strategy and outlining an action plan to ensure the strategy addresses all of the key IT workforce planning activities. DHS also provided technical comments which we incorporated, as appropriate. In written comments (reprinted in appendix V), HUD concurred with our recommendation and stated that it plans to fully implement the remaining workforce planning activities. In its written comments (reprinted in appendix VI), Interior agreed with our recommendation. The agency stated that it has begun taking steps to implement the IT workforce planning activities and plans to fully implement the remaining activities. In its written comments (reprinted in appendix VII), Labor concurred with our recommendation. The agency stated that it had made significant progress since the completion of our review and had fully implemented seven of the eight IT workforce planning activities. For example, the agency described efforts to review position descriptions, including identifying key IT competency areas. In addition, the agency stated that it assessed competency and skills needs, and critical IT skill gaps, as part of an IT workforce supply analysis. Further, Labor stated that, in June 2019, it developed hiring approval and prioritization templates, which require a current workforce and competency assessment, and identified IT competencies with each hiring request. The agency added that hiring managers perform a job analysis prior to posting open positions, and that this includes identifying key IT competencies for each position. Moreover, Labor stated that, in June 2019, the Secretary approved the use of direct hire authority for IT Specialists. In addition, the agency said that the Office of the CIO and the Chief Human Capital Officer finalized an action plan in March 2019 that identified strategies to address IT workforce gaps. Further, it stated that progress had been monitored in weekly discussions with and oversight from the Chief Information Officer and Chief Human Capital Officer. However, while the actions described indicate progress toward fully implementing the workforce planning activities, the agency did not provide evidence to support the actions it said it had taken. As a result, we did not change our ratings for the activities. In written comments (reprinted in appendix VIII), State agreed with our recommendation and described steps it said the agency is taking to implement the IT workforce planning activities. These steps included developing an IT strategic workforce plan that it expected to finalize by the end of fiscal year 2019. Further, the agency stated that it had substantially implemented the report to agency leadership on progress in addressing the competency and staffing gaps activity, which we assessed as not implemented. As evidence, the agency stated that departmental leadership is briefed regularly on efforts made to address IT competency gaps. However, State did not provide supporting documentation for these activities. As a result, we did not change our rating for the activities. In written comments (reprinted in appendix IX), VA concurred with our recommendation. However, the agency said it believed that it had fully implemented each of the five IT workforce planning activities we rated as less than fully implemented. Specifically, With regard to establishing and maintaining an IT workforce planning process, VA stated that its Office of Information and Technology had fully implemented a workforce planning process, including developing and implementing strategies to address gaps in competencies and staffing. The agency submitted two documents as supporting evidence: the Office of Information and Technology’s Human Capital Management Recruitment Strategy, which we reviewed during our engagement and determined did not sufficiently address the criteria; and the Office of Information and Technology’s Human Capital Strategic Plan for fiscal years 2014 through 2020, a document that it had not previously provided to us. We reviewed this document but have questions we need to follow up on with VA to determine whether the agency has fully implemented the activity. As a result, we did not change our rating for this activity. With regard to developing strategies and plans to address gaps in competencies and staffing, VA stated that, for projected staffing gaps, it has developed initial plans for deploying internal employee growth mechanisms. In addition, the agency stated that, because it anticipates no authorized staffing growth for fiscal years 2020 and 2021, the primary focus of its workforce strategies will be on delivering IT services in a growing environment while experiencing no authorized staff growth. Further, the agency stated that, due to its low vacancy rate, its emphasis will change from filling gaps to sustaining services while controlling workforce attrition. While the actions described may be sufficient to fully implement the activity, VA did not provide documented plans to address projected staffing gaps; as a result, we did not change our rating for this activity. With regard to implementing activities that address gaps, the agency stated that its Office of Information and Technology Human Capital Management Recruitment Strategy outlines talent acquisition approaches leveraged within the office to address staffing gaps. We analyzed this document during our review and, as noted in our report, found that it identified actions taken to address the prior year’s gaps, but it did not provide documentation showing that VA had implemented strategies and plans to address projected staffing gaps. As a result, we did not change our rating for this activity. With regard to monitoring the agency’s progress in addressing competency and staffing gaps, the agency stated that it has fully implemented the activity because it believes it has fully implemented the aforementioned dependent activities. However, as previously stated, we did not change our ratings for the other activities based on information that VA provided. Accordingly, we did not change our rating for this activity. With regard to reporting to agency leadership on progress in addressing competency and staffing gaps, VA stated that, in June 2019, its Office of Information and Technology briefed the agency’s Chief Information Officer and senior leadership on the preliminary results of data collection that is expected to ultimately result in a staffing model which accurately depicts the current array of the office’s workforce, requirements to perform the mission, functions, task assigned, and the associated staffing gap. However, the agency did not provide documentation supporting this activity. As a result, we did not change our partially implemented rating designation for the activity. In written comments (reprinted in appendix X), GSA agreed with our recommendation and stated that it has established a project team to implement the remaining workforce planning activities. In comments provided via email on September 12, 2019, the Liaison to GAO in NSF’s Office of the Director, Office of Integrative Activities, stated that the agency agreed with our recommendation. The liaison added that NSF had recently completed an iteration of an IT workforce plan that is to inform its processes going forward, and address many of the IT workforce planning activities. The liaison also stated that NSF recognizes the importance of IT workforce planning and will continue to implement improvements to its processes in this area. OPM provided written comments (reprinted in appendix XI) in which the agency stated that it concurred with the recommendation. In addition, the agency stated that, to address its shortcomings, it has partnered with GSA’s IT Modernization Center of Excellence to assess the current state of its IT workforce planning activities. The agency stated that this effort is intended to assist with identifying and addressing gaps. In its written comments (reprinted in appendix XII), SBA agreed with the recommendation. The agency stated that its Office of Human Resource Solutions and the Office of the CIO will continue unified efforts to fully implement the remaining seven key IT workforce planning activities noted in our report. SBA added that it expects to complete the efforts by the end of fiscal year 2021. SBA also provided technical comments which we incorporated, as appropriate. SSA provided written comments (reprinted in appendix XIII) in which it agreed with the recommendation. The agency stated that it planned to finish developing an IT Workforce Strategy by the end of fiscal year 2019, which is to provide a framework to address its future IT workforce needs. In addition, the agency stated that, in fiscal year 2020, it expects to begin implementation of activities to address our findings. SSA also provided technical comments which we incorporated, as appropriate. In written comments (reprinted in appendix XIV), USAID stated that it concurred with the recommendation. The agency said that it was taking actions to fully implement each of the seven IT workforce planning activities that we identified as not fully implemented. USAID added that it expects to complete these actions by the end of the first quarter of fiscal year 2021. One agency—Education—partially agreed with the recommendation. Specifically, in written comments (reprinted in appendix XV), Education stated that it has taken actions to address the workforce planning activities. For example, with regard to the assess competency and staffing needs regularly activity, the agency stated that, in fiscal years 2018 and 2019, it conducted assessments of competency and staffing needs for employees coded as cybersecurity employees. However, the agency did not provide supporting documentation, including documentation showing that it had assessed or updated competency needs since they were originally developed. As a result, we did not change our rating for the activity. For the assess gaps in competencies and staffing activity, Education stated that it conducted a two-part competency assessment of all employees with cybersecurity responsibilities in March 2019. However, the agency did not provide documentation of the assessment. As a result, we did not change our rating for the activity. With regard to developing strategies and plans to address gaps in competencies and staffing, Education stated that, in April 2019, it submitted to OPM its action plan to address competency and staffing gaps identified in its Cybersecurity Work Roles of Critical Need report. However, the agency did not provide documentation of the plan. As a result, we did not change our rating for the activity. In addition, the agency described its planned efforts to fully implement the remaining IT workforce planning activities, including developing an IT workforce planning process and monitoring and reporting on progress in addressing competency and staffing gaps. Three agencies commented on our findings but did not state whether they agreed or disagreed with our recommendations: In comments provided via email on September 6, 2019, the Director of Strategic Planning, Policy, E-government and Audits in Agriculture’s Office of the CIO stated that the agency concurred with our findings. In addition, the agency provided technical comments, which we have incorporated in the report as appropriate. In comments provided via email on August 26, 2019, an official from Justice’s Office of the CIO stated that the agency concurred with our findings. In comments provided via email on September 5, 2019, the GAO liaison coordinator for EPA’s Office of Mission Support provided comments on the findings. The agency stated that, in April 2019, it submitted two action plans to address Cybersecurity Work Roles of Critical Need to OPM which it believes address the eight IT workforce planning activities. For example, with regard to the establish and maintain a workforce planning process activity, the agency stated that the workforce action plans present a model on how the agency plans to fill critical needs related to IT and application project management, and information systems security. While the action plans describe efforts to be performed to address gaps for specific work roles of critical need, they do not describe an overall IT workforce planning process for the agency, to include how the agency will continue to develop its competency and staffing requirements, assess for gaps, and develop strategies and plans to address the gaps. As a result, we did not change our rating for the activity. Further, with regard to the remaining workforce planning activities, the agency stated that the action plans, which it had not previously provided during the course of our review, include actions and milestones focusing on evaluating skill gaps and assessing current training and development opportunities. However, the agency did not provide documentation of the underlying IT competency requirements or competency gap assessments used to identify the gaps. As noted in our report, if an agency has not developed competency requirements, it is not able to implement the subsequent activities relating to competencies. On the other hand, the agency has developed staffing requirements, and as a result we have updated our rating for the staffing evaluation criteria within the develop strategies and plans to address gaps in competencies and staffing activity. However, EPA did not provide documentation showing that it had implemented the strategies and plans to address staffing gaps, or monitored and reported on progress in addressing staff gaps. As a result, we did not change our ratings for these activities. One agency did not agree with our findings. Specifically, in its written comments (reprinted in appendix XVI), NRC stated that it did not agree with the findings that it had not developed an IT workforce planning process or IT competency requirements. With regard to the IT workforce planning process, we noted in our report that NRC had developed a workforce planning process that addressed all the key IT workforce planning activities; however, we stated that the process did not define the Chief Information Officer’s roles and responsibilities for implementing the activities or how the plan aligns with mission goals and objectives. In its response, the agency stated that its Management Directive 9.22, which was not provided to us during our review, defines the Chief Information Officer’s roles and responsibilities for implementing activities, including workforce planning by developing and maintaining the agency’s IT/Information Management Strategic Plan and enterprise IT/Information Management roadmap in alignment with the NRC Strategic Plan, and reviewing all positions with IT responsibilities requested in the budget request to ensure the positions meet the ongoing requirements of the agency. We reviewed the directive and determined that it addresses the Chief Information Officer’s roles and responsibilities. In addition, NRC identified parts of its workforce planning process, that it believes addresses alignment with mission and goals. We reviewed these parts, and agree with NRC that the plan addresses alignment with mission and goals. We have incorporated the change into this report, including changing the rating from partially implemented to fully implemented for this activity. As a result, we modified the recommendation from fully implementing eight activities NRC did not implement to fully implementing seven activities it did not fully implement. With regard to developing competency requirements, the agency stated that it specifies competencies for all IT positions in its position descriptions. However, NRC did not provide documentation of the position descriptions or the related competencies. As a result, we are not changing our not implemented rating for this activity. NRC also noted that it has joined other federal agencies to develop career paths and competency models for 64 IT security roles across the federal government, and that this effort is scheduled to be completed in October, at which time the agency will decide which of the models to adopt. In addition, the following two agencies to which we made recommendations in prior reports provided comments. In its written comments (reprinted in appendix XVII), Defense stated that it concurred with the overall contents of the report. In comments provided via email on September 5, 2019, an official from Treasury’s Office of the CIO stated that the agency agreed with all but two of our findings in this report, associated with three of the activities. First, the agency disagreed with our finding that it minimally implemented the establish and maintain a workforce planning process activity, stating that it has a department-wide workforce planning process that includes the IT workforce. However, while the agency issued a policy in 2013, which we reviewed during our engagement, that directs bureaus to annually conduct workforce planning, it did not define a process for doing so. In addition as we further note, in 2018, the agency issued guidance addressing workforce planning issues for bureaus to consider in developing their own processes. However, this does not constitute an IT workforce planning process. Since Treasury did not provide any additional evidence of an IT workforce process, we are not changing our rating for this activity. Second, Treasury disagreed with our finding that it did not implement the activities associated with monitoring and reporting on its progress in addressing competency and staffing gaps. Specifically the agency stated that it has designed and begun implementing a new governance structure for workforce management that reinforces the monitoring and reporting of workforce related issues to agency leadership during quarterly performance reviews. However, as we note in our report, the monitoring and reporting activities are dependent on the developing strategies and plans to address competency and staffing gaps activity which Treasury has yet to implement. Until Treasury develops such strategies and plans, it cannot monitor and report on their progress. We are sending copies of this report to interested congressional committees, the Director of the Office of Management and Budget, the secretaries and agency heads of the departments and agencies addressed in this report, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. Should you or your staffs have any questions on information discussed in this report, please contact me at (202) 512-4456 or HarrisCC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix XVIII. Our objective was to examine the extent to which federal agencies are effectively implementing information technology (IT) workforce planning activities. To address this objective, we relied on practices from GAO’s IT workforce planning framework as criteria. The framework identifies eight key IT workforce planning activities that, when effectively implemented, can facilitate the success of major acquisitions. These activities are listed in table 2. To ensure consistent understanding and application of the activities in our evaluations, we reviewed the supporting laws, policy, and guidance for each activity and identified specific evaluation criteria. The criteria are listed in table 3. We reviewed IT workforce planning policies and other workforce planning documentation for each of the 24 Chief Financial Officers Act of 1990 agencies, including workforce planning processes; competency requirements; annual mission critical occupation resource charts required by the Office of Personnel Management (OPM) which document staffing requirements and gap assessments; strategies and plans to address gaps; and reports on progress in addressing gaps. For the six agencies for which we previously performed IT workforce planning assessments, we reviewed the previously reported information and obtained and analyzed updates, as appropriate. We compared the information obtained to our evaluation criteria and identified gaps and their causes. We also interviewed cognizant officials from each of the 24 agencies, to discuss their implementation of the IT workforce planning activities and causes for any gaps. Our review focused on the agency’s IT workforce planning efforts at the agency level, including the extent to which the agency maintained visibility and oversight into component-level IT workforce planning. Based on our assessment of the documentation and discussions with agency officials, we assessed each agency’s implementation of our evaluation criteria as: fully implemented—the agency provided evidence which showed that it fully or largely addressed the elements of the criteria. partially implemented—the agency provided evidence that showed it had addressed at least part of the criteria. not implemented—the agency did not provide evidence that it had addressed any part of the criteria. To determine an overall rating for each of the eight key workforce planning activities, we summarized the results of our assessments of the evaluation criteria. Specifically, we assessed each activity as: fully implemented—the agency fully implemented both of an activity’s evaluation criteria. substantially implemented—the agency fully implemented one of an activity’s evaluation criteria and partially implemented the other evaluation criteria. partially implemented—the agency fully implemented one of an activity’s evaluation criteria and did not implement the other criteria, or partially implemented both of an activity’s evaluation criteria. minimally implemented—the agency partially implemented one of an activity’s evaluation criteria and did not implement the other evaluation criteria. not implemented—the agency did not implement either of an activity’s evaluation criteria. We assessed the staffing evaluation criteria for the develop competency and staffing requirements, assess competency and staffing needs regularly, and assess gaps in competencies and staffing activities as fully implemented if agencies provided evidence of a complete mission critical occupation resource chart to meet OPM reporting requirements and were able to demonstrate that the mission critical staff represented most or all of their IT workforce. In addition, we assessed the competency evaluation criteria for these activities as fully implemented if agencies provided evidence that they performed them for most or all of their IT workforce. For the implement activities that address gaps activity, we assessed agencies as having fully implemented the evaluation criteria on other efforts if they provided evidence as having implemented at least four of the efforts identified in the Federal Information Technology Acquisition Reform Act (FITARA). We rated this evaluation criteria as partially implemented if agencies provided evidence of having implemented fewer than four of the efforts. Finally, in making our assessments, we also considered the extent to which an agency had implemented prerequisite activities. For example, to implement the competency evaluation criteria for the develop strategies and plans to address gaps activity, the agency needed to have also implemented the competency evaluation criteria for the assess gaps in competencies and staffing activity. We did not assess any activity higher than the prerequisite activity. We also determined if there was a common factor which led to the rating for a particular activity. For example, we noted whether most agencies partially implemented an activity because they had fully implemented one of the evaluation criteria, but had not implemented the other criteria. To determine the reliability of staffing data in the mission critical occupation resource charts, we reviewed the charts for obvious errors and for completeness and obtained clarification from agencies on identified errors. We determined that the data were sufficiently reliable for the purpose of this report, which was to determine the extent to which agencies had implemented the key activities. We conducted this performance audit from January 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix contains assessments of the extent to which the 24 Chief Financial Officers Act of 1990 agencies implemented each of the eight key IT workforce planning activities identified in GAO’s information technology (IT) workforce planning framework. In addition to the individual named above, the following staff made key contributions to this report: Sabine Paul (Assistant Director), Scott Borre (Analyst in Charge), Rebecca Eyler, Cassaundra Pham, Thomas B. Rackliff, and Marshall Williams, Jr.", "summary": "The federal government annually spends over $90 billion on IT. Despite this large investment, projects too frequently fail or incur cost overruns and schedule slippages while contributing little to mission-related outcomes. Effectively implementing workforce planning activities can facilitate the success of major acquisitions. GAO was asked to conduct a government-wide review of IT workforce planning. The objective was to determine the extent to which federal agencies effectively implemented IT workforce planning practices. To do so, GAO compared IT workforce policies and related documentation from each of the 24 Chief Financial Officers Act of 1990 agencies to activities from an IT workforce planning framework GAO issued. GAO rated each agency as having fully, substantially, partially, minimally, or not implemented for each activity. GAO supplemented its reviews of agency documentation by interviewing agency officials. Federal agencies varied widely in their efforts to implement key information technology (IT) workforce planning activities that are critical to ensuring that agencies have the staff they need to support their missions. Specifically, at least 23 of the 24 agencies GAO reviewed partially implemented, substantially implemented, or fully implemented three activities, including assessing gaps in competencies and staffing. However, most agencies minimally implemented or did not implement five other workforce planning activities (see figure). Agencies provided various reasons for their limited progress in implementing workforce planning activities, including competing priorities (six agencies), and limited resources (three agencies). Until agencies make it a priority to fully implement all key IT workforce planning activities, they will likely have difficulty anticipating and responding to changing staffing needs and controlling human capital risks when developing, implementing, and operating critical IT systems. GAO is making recommendations to 18 of the 24 federal agencies to fully implement the eight key IT workforce planning activities. Of the 18 agencies, 13 agreed with the recommendations, one partially agreed, three neither agreed nor disagreed, and one disagreed with the findings and provided evidence which led to a modification to its recommendation, as discussed in this report. For all of the remaining recommendations, GAO continues to believe that they are all warranted.", "document_type": "gao"}
{"report": "Space systems generally involve one of four types of interrelated segments that are needed to make a space capability fully functional. As illustrated in figure 1, they include (1) space components—namely the satellites, (2) ground components, including satellite control systems and data processing subsystems and facilities, (3) user equipment, such as radios/terminals, needed by the warfighter to use the capability, and (4) launch vehicles and facilities. DOD space systems are acquired under the same acquisition policies as other weapons systems. However, as we found in July 2016, space systems are different from other acquisitions in some ways. For example, space has more programs of joint interest than other areas, and includes varied stakeholders, such as civil agencies and multiple services. According to officials, in developing space systems once a satellite is launched, if there are problems it is essentially impossible to change the hardware, and software changes may not be an option. In addition, space programs typically use cutting-edge technologies that have to withstand the harsh space environment. Such technologies are rarely available as off-the-shelf systems from the commercial market and must be developed following a specific process overseen by specially- trained DOD acquisition personnel. Data from the Under Secretary of Defense for Acquisition and Sustainment’s Office of Human Capital Initiatives show that, as of June 2018, DOD employed about 170,000 military and civilian personnel who are designated as acquisition personnel and are responsible for acquiring weapon systems, such as aircraft, ships, tanks, and space systems. DOD tracks the characteristics, education, training, and experience of these acquisition personnel in DOD’s acquisition workforce data system—Data Mart—where they are tracked as belonging to 1 of 15 acquisition career fields. Table 1 shows a list of these acquisition career fields. Contractor and FFRDC personnel often support DOD acquisition efforts. For the purpose of this report, “contractor” refers to support service contractors who provide technical and administrative support rather than prime contractors who develop and produce weapon systems or products. FFRDCs are not-for-profit entities sponsored and funded primarily by DOD to fulfill research and development, engineering, and analytic needs that cannot be met as effectively by existing government or contractor personnel. Nonprofit, university-affiliated, or private industry organizations operate the FFRDCs through contracts or other agreements with federal agencies. DOD procures FFRDC services by staff years of technical effort. The total amount of FFRDC services time that DOD is permitted to obtain is set annually by Congress. For fiscal year 2018, DOD was authorized to use available funds for FFRDCs for not more than 6,030 staff years of technical effort. Authorized staff years of technical effort are allocated among the military services’ organizations that act as the primary sponsors for each FFRDC, which then prioritize what work the FFRDC will perform according to the allocation level received. In general, managers in the contractor and FFRDC organizations direct the daily activities of their respective personnel, while DOD military and civilian personnel oversee their work. Over the years, GAO has highlighted the importance of workforce management. Since 2001, GAO has included strategic human capital management as a government-wide high-risk area. More recently, we found that having the right workforce mix with the right skill sets is critical to achieving DOD’s mission, and that it is important for DOD, as part of its strategic workforce planning, to conduct gap analyses of its critical skills and competencies. Strategic workforce planning—an integral part of human capital management—is an iterative, systematic process that helps organizations determine if they have staff with the necessary skills and competencies to accomplish their strategic goals. As shown in table 2, many DOD offices play key roles in strategic workforce planning activities. DOD does not have comprehensive information about its space acquisition workforce—including the size, mix, and location of this workforce. DOD does not have this information because, among other things, DOD has not clearly identified its space programs, and its workforce data systems are not configured to identify space acquisition personnel. In the absence of comprehensive DOD data, we sought to obtain an understanding of the extent of this workforce. We aggregated data from individual DOD organizations and estimate that at least 8,000 military, civilian, contractor, and FFRDC personnel were working on space acquisitions in multiple locations across the United States at the end of 2017. While this information represents only a snapshot in time, it provides insight into the extent of the space acquisition workforce. Given DOD’s recent decision to stand up a United States Space Command and to establish a consolidated Space Development Agency in 2019, along with the President’s directive for DOD to submit a legislative proposal for a United States Space Force, having knowledge about which personnel are involved with military space acquisitions and where these personnel are located will be important to DOD’s planning efforts. DOD collects data on its acquisition workforce, but does not collect and maintain comprehensive and complete data on the size, mix, and location of the military, civilian, contractor, and FFRDC personnel working on space acquisitions. According to the military services’ Directors of Acquisition Career Management, DOD manages its acquisition workforce by career field, such as program management and engineering, and not by the type of product being acquired, such as space systems. They told us that, in their view, the acquisition skills needed for an acquisition program—such as those for program management, engineering, and contracting—are largely the same regardless of the product type. However, officials acknowledged that it takes some time for personnel to learn the nuances of acquiring a specific type of product. We identified three factors that hinder DOD’s ability to collect comprehensive data on its space acquisition workforce. Together, they impede DOD from maintaining a complete and accurate understanding of the size, mix, and location of its space acquisition workforce. DOD does not maintain a complete list of its space acquisition programs. Officials from the office of the Assistant Secretary of the Air Force for Acquisition and the service-level acquisition career managers told us that DOD does not maintain a list of the universe of space acquisition programs. In addition, the budget document that DOD submits to Congress specific to space programs, which could possibly serve as an alternative source of such information, identifies programs that have large amounts of funding by name, but aggregates information for smaller programs without identifying them individually. While DOD does not maintain a complete list of space acquisition programs, during the course of our review we found that the military services were generally able to identify space acquisition programs. DOD does have a definition of space systems. Specifically, according to a DOD Directive, space systems include all systems related to making a space capability operational—that is programs acquiring satellites, satellite ground systems (including satellite control and data processing), receivers/user segments (including terminals and radios), and launch systems—but specifies that terminals that are embedded as part of a platform (i.e. aircraft, ship, or tank) are excluded. However, DOD officials had difficulty identifying some programs, particularly those in the user segment. For example, the Air Force’s Space Fence program, which is developing ground radar as a part of the space surveillance network that detects and tracks space objects, is included as a space program in DOD’s budget documents. Officials from the Program Executive Office that staffs personnel to the program initially told us they did not consider it a space program since it is a series of ground-based radars. They subsequently determined that it is a space program since the radar will track space objects and provide data for space situational awareness. DOD data systems are not currently configured to identify space acquisition personnel. We examined three data sources that have information on the different personnel groups in the acquisition workforce, and found that none of them can identify space acquisition personnel. The Office of Human Capital Initiatives within the Office of the Under Secretary of Defense for Acquisition and Sustainment uses the Data Mart system to track the education, experience, and training of military and civilian acquisition-coded personnel working in the 15 acquisition functional career fields shown in table 1. DOD has taken periodic steps to enhance the data captured in this system. For example, in 2009 DOD began tracking whether acquisition personnel in the business career field were working on financial management or cost estimating. In 2014, DOD started to track personnel with expertise in contracting with small businesses, and expanded its efforts to track personnel with expertise in international acquisitions. However, this system does not currently identify personnel staffed to or supporting space acquisitions or any other type of product acquisition. The Office of the Under Secretary of Defense for Personnel and Readiness tracks contractor data using the Enterprise-wide Contractor Manpower Reporting Application system to provide DOD management information on contracted services obtained by each military service and defense agency. The system includes data on the number of hours of service each contractor provides to the government, which could be used to approximate the number of contractor personnel used to perform the work. However, the system does not track the type of acquisition programs being supported, such as space acquisition programs. In addition, the data are self-reported by service contractors and concerns exist regarding potential underreporting. For example, we reported in March 2018 that the military services estimated that the Enterprise-wide Contractor Manpower Reporting Application included fiscal year 2016 contractor data for 80 percent of Army contracts and 75 percent of Navy contracts; the percentage of Air Force contracts was unknown. The Director of Laboratories and Personnel within the Office of the Under Secretary of Defense for Research and Engineering tracks information on FFRDCs, such as the staff years of technical effort provided each year, to ensure that DOD stays within its congressionally mandated limit. Each FFRDC sponsor organization provides an annual report of their staff years of technical effort and funding to DOD. However, DOD officials told us that sponsoring organizations do not identify what type of acquisition program their respective FFRDC personnel support, such as space acquisition programs. Personnel supporting space acquisitions are dispersed across a variety of organizations and may also support non-space programs. Each of the military services we reviewed has program executive offices, research labs, or other organizations that support both space and non- space acquisitions. DOD officials told us that functional career field leaders in each of the organizations, such as the engineering or the contracting directorates, assign personnel to space or non-space programs on an as-needed basis, which could make it difficult for DOD to determine which and how many personnel should be included in the space acquisition workforce. Five of the 10 space acquisition programs we reviewed—1 Air Force, 1 Navy, and 3 Army—were managed by organizations that were primarily responsible for developing and acquiring non-space programs. Air Force—The Space Fence program is staffed by the Air Force Life Cycle Management Center’s Program Executive Office for Battle Management. The Center primarily supports non-space programs, such as fighters, bombers, tankers, and presidential aircraft. Navy—The Mobile User Objective System is managed by the Space and Naval Warfare Systems Command, which primarily manages non-space programs that provide enterprise information system and command, control, communications, computers, and intelligence capabilities. Army—The Joint Tactical Ground Station program is managed by the Army’s Program Executive Office for Missiles and Space. The office primarily manages a variety of missile programs—such as close combat, cruise, and integrated air and missile defense programs—that are non-space programs. Similarly, the Secure, Mobile, Anti-Jam, Reliable, Tactical-Terminal and the Transportable Tactical Command Communications programs are managed by the Army’s Program Executive Office for Command, Control, Communications-Tactical. This office primarily manages a variety of information systems to provide tactical communication for the service, which may or may not be space programs. Officials told us that the three Army programs we reviewed were also supported by other, separate Army organizations, such as the Army Contracting Command for contracting support; the Army’s Aviation and Missile Research, Development, and Engineering Center for engineering support; and the Army Materiel Command for logistics support. These organizations provide support to space and non-space programs on an as-needed basis. The Administration, Congress, and DOD are discussing a variety of approaches for strengthening the government’s space operations, including the establishment of one or more new organizations. In June 2018 the President directed DOD to begin the process of establishing a new military branch focused on space that is separate from and equal to the other military departments, Army, Navy, and Air Force. In an August 2018 report to the Congress on the organizational and management structure needed for the national space components, DOD described the immediate steps that it plans to take to implement the President’s direction while waiting for Congressional authorization to create the new military branch. These steps include establishing a new United States Space Command to further its space warfighting capabilities, as well as developing plans to establish a consolidated Space Development Agency to rapidly develop and field next generation space capabilities. DOD has described the general areas of focus planned for these new organizations; however, many specifics are still to be determined. DOD has announced that a committee of senior DOD leaders is expected to identify which of the current space activities will be consolidated into these new space organizations. In addition, the President’s February 2019 Space Policy Directive now requires DOD to submit a legislative proposal to establish a United States Space Force as a new armed service within the Air Force. DOD announced it delivered a legislative proposal to Congress on March 1, 2019. The lack of comprehensive information about DOD’s space programs and the acquisition personnel supporting those programs affects DOD’s ability to assess gaps in the overall capabilities of its space acquisition workforce and determine whether it has sufficient internal capability and critical knowledge or skills for its space acquisitions. Moreover, it hampers DOD’s ability to make decisions related to establishing the United States Space Command, a new Space Development Agency, or potentially the United States Space Force. This includes determining the appropriate number and mix of acquisition personnel that are needed for the new organizations, as well as which military and civilian personnel should be assigned to them. According to federal internal control standards, an agency, such as DOD, should have relevant, reliable, and timely information in order to run and control operations, including managing the workforce. Air Force Director of Acquisition Career Management officials stated that having a process for identifying space acquisitions personnel would be beneficial. As we reported in July 2003, the success of merging personnel during organizational transformations is more likely when the best individuals are selected to meet the skills and competencies needed for the new organization’s goals. In the absence of readily available comprehensive data from DOD, we collected and aggregated data from multiple DOD space organizations and found that at least 8,000 personnel were in the space acquisition workforce at the end of 2017. However, our data set is not complete. For example, the National Reconnaissance Office, which DOD officials told us has a significant number of personnel working on space acquisitions, is not included in our analysis. In addition, our count only includes personnel that spent 50 percent or more of their time working on space acquisitions; therefore any personnel who spent less than 50 percent of their time on space acquisitions was not included. Furthermore, it is important to note that our data provide a snapshot of the workforce as of December 31, 2017. According to DOD officials, the size and mix of the workforce can change based on the number of programs and where programs are in the acquisition process. The military and civilian personnel data we collected are expressed as number of people. The contractor and FFRDC personnel data are expressed as full-time equivalents and staff-years of technical effort equivalents, respectively. Size of Workforce: Based on data we collected from multiple DOD space acquisition organizations, at least 8,000 military, civilian, contractor, and FFRDC personnel supported DOD’s space acquisitions as of December 31, 2017 (see figure 2). Military and civilian personnel comprised about 64 percent of the total space acquisition workforce, the vast majority of which support Air Force acquisitions. The remaining 36 percent of the workforce is contractor and FFRDC personnel that support DOD’s space acquisition activities. The Air Force has the largest number of military and civilian personnel because the Air Force has primarily been responsible for DOD’s space acquisitions and develops programs for all four segments of space capability, including launch services for the most critical national security space satellites. The Navy is responsible for systems that provide satellite communications across DOD as well as its user segments, while the Army and other DOD components primarily focus their efforts on developing their user segment systems or other space-related projects. Workforce Mix: Based on data we collected from multiple DOD space acquisition organizations, the mix of military, civilian, contractor, and FFRDC personnel that each military service and agency had supporting their respective space acquisition programs varied considerably (see figure 3). Military and civilian personnel comprised between 54 and 63 percent of the Air Force’s, Army’s, and Navy’s space acquisition workforce and 94 percent of the other DOD components’ workforces. Contractors and FFRDC personnel made up the remainder of the workforce. The Air Force relies more heavily on FFRDC personnel as a percentage of its workforce than the Army, Navy, and other DOD components. According to Air Force officials, the Space and Missile Systems Center—the Air Force’s major space acquisition organization—has relied heavily on FFRDC support for space engineering and technical expertise since its founding in the 1950s. The Army and Navy primarily rely on contractors for their remaining support. These contractors mainly provide technical expertise, such as engineering services, to support military and civilian personnel. Some contractors also support program management and business and administration activities, such as cost estimating. Figure 4 provides detailed examples of how personnel support two space acquisition programs included in our review. Locations of Workforce: Based on data we collected from multiple DOD space acquisition organizations, space acquisition personnel work at over 20 organizations located across the United States. Figure 5 shows the primary locations of DOD’s space acquisition organizations. About 45 percent of the overall space acquisition workforce is located at the Air Force Space and Missile Systems Center in Los Angeles, California. The Army space acquisition workforce is located primarily at Redstone Arsenal in Huntsville, Alabama, and Aberdeen Proving Ground, Maryland. The Navy space acquisition workforce is located at the Space and Naval Warfare Systems Command in San Diego, California, and a few other locations. DOD faces several challenges related to hiring, assigning, and retaining qualified personnel to work on space acquisition programs, similar to the challenges it faces more generally with the acquisition workforce. However, some of the challenges are magnified because almost half of the military and civilian space acquisition workforce is concentrated in Los Angeles, California, which has a higher cost of living than many other areas in the United States, and where competition with private industry for personnel with space acquisition experience is high. DOD is taking steps to address these challenges where possible. DOD officials told us that one of the primary workforce challenges DOD faces is its ability to hire qualified people to work on space acquisitions. They said that DOD is competing with private industry and other federal agencies for top talent in several acquisition career fields. Attracting Candidates with Technical Expertise. DOD officials stated that it is particularly difficult to attract people with certain technical expertise, such as cybersecurity and systems engineering, because they are in high demand in both government and private industry. Air Force officials said the government cannot match the salaries offered by industry. For example, the Launch and Test Range System program office told us that a shortage of trained and qualified cybersecurity personnel exists both within the government and industry. Our prior work has described how maintaining cybersecurity personnel is a challenge government-wide, and that, according to DOD officials, even when DOD cybersecurity positions are filled, it may not necessarily be with the right expertise since it is a specialized area. Hiring in Areas with Higher Costs of Living. Air Force officials at the Space and Missile Systems Center said that hiring challenges are further exacerbated for space acquisition organizations that are located in areas with higher costs of living. They said, for example, that prospective employees often visit the center in Los Angeles, California, and, after assessing the local cost of living, decide not to accept a job offer. DOD is taking steps to address its hiring challenges. To address difficulties in obtaining personnel with sufficient technical experience, some officials told us that they typically hire the best candidate available—who may lack some of the desired technical skills— and provide them with on-the-job and formal training to increase their technical knowledge and skills. To better compete with higher salaries offered by other potential employers, several officials told us they offer tuition reimbursement as a recruiting incentive. Air Force officials told us that in areas with higher costs of living they focus their recruiting efforts on the local area because local candidates already understand the higher costs of living challenges for the area and are more likely to have support systems in place to manage such costs. Beyond the concerns expressed about hiring personnel, Air Force Space and Missile Systems Center officials expressed concerns that some functional areas within the space acquisition workforce face challenges assigning experienced personnel—personnel with the appropriate knowledge and skill set to perform the work—that are already hired to space acquisition programs. For example, contracting career field officials at the center noted that the space acquisition workforce does not have enough mid-level personnel who understand the detailed steps and documentation required in the acquisition process. In particular, the Air Force Space and Missile Systems Center reported that at the end of January 2018, the number of mid-level civilian and military personnel working in the contracting functional career field was 50 less than the number authorized. According to contracting career field officials at the center, a large number of mid-level procurement contracting officer positions were vacant, and senior procurement managers were picking up the corresponding workloads rather than performing their staff development and strategic planning tasks. Furthermore, officials from the Air Force’s Space and Missile Systems Center program management functional office also expressed concern that the bulk of the military personnel assigned to the program management positions were more junior in rank than the Center was authorized by the Air Force to obtain. Figure 6 shows the level of the Air Force Space and Missile Systems Center personnel that filled its program management positions as of January 2018. Junior officers typically have less experience managing acquisition programs than more senior officers. The military services are taking steps to manage the effects of military and civilian personnel skills and experience gaps, to some degree, by having contractor personnel perform the work. For example, the Air Force Space and Missile Systems Center’s contracting functional office used four contractor personnel to support its pricing work. DOD has also experienced challenges with retaining some space acquisition personnel, especially those within their first few years of joining federal government service that had obtained certain acquisition- related experience or authorities. For example, contracting career field officials at the Air Force Space and Missile Systems Center said that they have difficulty retaining contracting officers once they receive their contract warrant authority because they can obtain a higher compensation package from private industry companies. Receiving contract warrant authority is considered an indication that the individual gained sufficient skills and experience to be able to perform the work involved in writing, awarding, and managing contracts. Officials also stated that some personnel leave after obtaining security clearances required to perform their work because private companies working on government contracts pay more to qualified individuals with clearances. Officials from the Air Force Space and Missile Systems Center and Army Space and Missile Defense Command also told us that they have difficulty retaining engineers. They said some engineers have left because they were not satisfied with being used as generalists to oversee the work of FFRDC or contractor personnel, rather than being used to perform hands-on engineering work. Officials also stated that this situation is not unique to space acquisitions—government engineers seldom get to design, develop, or build systems as the hands-on engineering work is primarily performed by prime contractors. Air Force Space and Missile Systems Center officials said they are trying to help the government engineers understand how to influence decisions and be more effective in working as part of the space engineering acquisition team, which would include military, civilian, contractor, and FFRDC personnel. Officials from various functional career fields at these Air Force and Army locations noted that limited promotion opportunities for civilian personnel in space acquisitions also cause retention challenges. For example, the Air Force Space and Missile System Center has 53 management (General Schedule 15) positions; however, Center officials told us that the turnover rate for these higher-level positions is low. Officials reported that some mid-level program management personnel seek and accept promotions at other non-space acquisition offices or in other geographical locations that have more promotion opportunities. Some Air Force Space and Missile Systems Center and Army officials noted that retention incentives are used to help retain staff. This includes student loan repayments, and recognition incentives, such as monetary or time-off awards tied to performance. Air Force Space and Missile Systems Center officials also said that they are working to realign current civilian acquisition personnel at the center under the Civilian Acquisition Workforce Demonstration project, which they believe will help attract, retain, and motivate high-quality civilian personnel for the acquisition workforce. DOD space systems and the personnel who work to acquire them remain critical components of national security and key resources. As DOD takes steps toward establishing the United States Space Command, its Space Development Agency, and potentially the United States Space Force, it will be essential to understand the size, mix, and location of the space acquisition workforce. However, DOD does not collect and maintain this type of comprehensive data on its space acquisition workforce. Although we were able to pull together information on the space acquisition workforce, the data represent a snapshot of the workforce at one point in time, and are not complete since acquisition personnel working on National Reconnaissance Office space programs and those who spent less than 50 percent of their time working on space acquisitions were not included. Taking steps to identify and routinely track accurate information on space acquisition programs and the organizations and personnel that support those programs would provide several benefits to DOD. In particular, it would better position DOD to assess whether it has the appropriate number and mix of military, civilian, contractor, and FFRDC personnel working on space acquisitions and to make adjustments if necessary. Further, it would better position DOD to make decisions on which acquisition personnel will support or transition into the United States Space Command or the new Space Development Agency, since DOD has not clearly defined what acquisition functions may or may not be handled by these new organizations. Finally, comprehensive data on the space acquisition workforce would also be beneficial to support DOD’s development of its legislative proposal regarding the establishment of the United States Space Force. We are making the following two recommendations to DOD: The Secretary of Defense should direct the military services and other DOD components to identify the universe of space acquisition programs, as well as the various organizations that support these programs, and report this information to Congress. In doing so, DOD should implement procedures to maintain and periodically update the list. (Recommendation 1) The Under Secretary of Defense for Acquisition and Sustainment, in conjunction with the Under Secretaries of Defense for Research and Development and for Personnel and Readiness, should collect and maintain data on acquisition-coded military and civilian personnel that support space acquisition programs and related activities—including those that may do so less than full time—as well as track the contractor and FFRDC workforce general levels of effort supporting space acquisition programs and related activities and the total resources annually committed to perform that work. (Recommendation 2) We provided a draft of this report to DOD for review and comment. DOD provided written comments (reproduced in appendix II) on our draft report. In those comments, DOD concurred with our first recommendation to identify the universe of space acquisition programs, as well as the various organizations that support these programs, and report this information to Congress. DOD did not concur with our draft second recommendation to collect and maintain data on the space acquisition workforce. DOD stated that the manner in which personnel data are captured in its human resource and development systems makes it difficult to identify, collect, and maintain data on the military and civilian personnel working on space acquisition programs. Further, DOD raised concerns over contractual limitations on collecting and maintaining data on contractor and FFRDC personnel supporting space acquisitions. In light of these concerns, we made changes to the draft recommendation. We believe the language of our final recommendation will better facilitate implementation by DOD. With regard to our second recommendation, we continue to believe that taking steps to identify military and civilian personnel supporting space acquisition programs would support DOD’s strategic workforce planning, particularly considering DOD’s recent legislative proposal for establishing the United States Space Force. For example, we acknowledge that the current personnel data system used to track military and civilian acquisition personnel has limitations, but we believe taking steps to make minor modifications to the system to facilitate identifying and routinely tracking accurate information on these two segments of the space acquisition workforce would provide several benefits to DOD. Most importantly, it would help DOD make decisions on how many and which military and civilian acquisition personnel should be assigned to the new space organizations—namely the Space Development Agency, the United States Space Command, and the United States Space Force. With regard to DOD’s comment that our recommendations do not recognize that DOD personnel have been shifted into and out of space acquisition programs, we recognize that acquisition personnel have been moved across programs and support space and non-space acquisitions. However, we continue to believe that DOD should have better information on military and civilian acquisition personnel. In particular, knowing which personnel have space acquisition backgrounds could enhance the productivity and effectiveness of DOD’s space acquisition efforts. As a result, we did not make a change to our second recommendation as it relates to military and civilian space acquisition personnel. However, in consideration of the concerns raised by DOD about tracking data on contractor and FFRDC personnel who are supporting space acquisition activities, we modified our second recommendation. It was not our intention to have DOD undertake significant modifications to the relevant contracts to obtain data on these segments of the space acquisition workforce. However, understanding the extent to which space acquisition programs rely on contractor and FFRDC personnel for support could be useful in helping DOD determine the right number and mix of military and civilian personnel needed in the new space organizations. As a result, we modified the language of our second recommendation to focus on tracking the contractor and FFRDC workforce general levels of effort supporting space acquisition activities and the resources spent to obtain this assistance, rather than—as we stated in our draft recommendation—tracking the individuals who perform such work. However, we continue to believe that collecting and maintaining more robust data on that workforce will support DOD’s planning efforts and better inform Congress. DOD also expressed concern that our report may be equating statements of officials at the staff- and operational-level to military service- and DOD- level officials. We reviewed statements attributed to DOD officials throughout our report. Where necessary, we clarified attributions to better reflect the appropriate level of the officials with whom we discussed the corresponding information during our review. DOD also provided technical comments on our draft report, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees; the Acting Secretary of Defense; and the Secretaries of the Air Force, Army, and Navy. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or ludwigsonj@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. A House Report related to the National Defense Authorization Act of Fiscal Year 2017 contained a provision for GAO to review the current state of the Department of Defense’s (DOD) space systems acquisition workforce. This report examines (1) what DOD knows about the size, mix, and location of its space acquisition workforce, and (2) the challenges, if any, DOD faces in hiring, staffing, and retaining space acquisition workforce personnel. For the purpose of this report, we defined the space acquisition workforce broadly to include military, civilian, contractor, and Federally Funded Research and Development Center (FFRDC) personnel working on space acquisition programs and related efforts. To determine what DOD knows about the size, mix, and location of the space acquisition workforce, we met with officials from DOD’s Office of Human Capital Initiatives, the Air Force, the Army, the Navy, and 4th Estate’s Director of Acquisition Career Management to obtain information that is collected on the space acquisition workforce. We were told by each of these officials that DOD does not have a group of personnel officially designated as the space acquisition workforce. They stated that DOD has separate mechanisms for collecting military, civilian, contractor, and FFRDC workforce data and that none of these systems contained the level of granularity we would need to identify all personnel working on space acquisitions. Specifically, the sources we discussed were DOD’s Data Mart system, a central repository for military and civilian acquisition workforce data, as well as workforce data systems maintained by DOD components that feed into the Data Mart system; the Enterprise-wide Contractor Manpower Reporting Application system for contractor services data; and FFRDC data maintained by military components. We collected data on the size, mix, and location of the space acquisition workforce from the space organizations performing space acquisition activities. The Directors of Acquisition Career Management for the military services and the 4th Estate defense agencies provided a list of organizations that could be working on space acquisitions based on DOD’s 2017 space system definition, which states that a space system includes all areas related to making a space capability operational—that is programs acquiring satellites, satellite ground systems (including satellite control and data processing), receivers/user segments (including terminals and radios), and launch systems. It also specifies that terminals are included unless they are embedded as part of a platform (i.e., aircraft, ship, or tank). We contacted each of the identified space organizations to verify that they had personnel working on space acquisitions based on this definition. Three of the organizations we originally contacted stated their organizations did not work on any space acquisition programs based on the definition. We did not include these organizations in our data gathering efforts. We also identified other organizations that worked on space acquisitions through discussions with acquisition management officials from the Army and included these organizations in our data gathering efforts. We asked each space organization to identify the number of military and civilian personnel working on space acquisition activities for 50 percent or more of their work time as of December 31, 2017. We used the threshold of 50 percent or more of the time to be consistent with the DOD definition of the acquisition workforce, which requires personnel to work 50 percent or more of their work time on acquisition activities to be counted as part of that workforce. DOD officials could not identify the number of contractor and FFRDC personnel working on space acquisitions. Therefore, for contractor and FFRDC personnel, we asked for the number of full-time equivalencies and staff-years of technical effort equivalencies, respectively, provided as support to space acquisitions. We requested that the personnel data be categorized by acquisition career field. We collected data from each DOD component as follows: The Air Force Director of Acquisition Career Management provided military and civilian workforce data from the Air Force’s Acquisition Career Management System that feeds into Data Mart for all Air Force organizations where the entire organization works on space acquisitions. These organizations were the Air Force Space Command and the Networks Family of Advanced Beyond Line of Sight Terminals Division within the Air Force Life Cycle Management Center’s Program Executive Office for Command, Control, Communications, Intelligence and Networks. The Deputy Director identified other space programs that are managed by the Air Force Life Cycle Management Center, but could not identify which military and civilian personnel were supporting those programs because the workforce data system is not configured to identify personnel by product types. In addition, the Deputy Director could not provide data on the number of contractor or FFRDC personnel working on any space acquisition program. We contacted these organizations directly to collect additional military, civilian, contractor and FFRDC workforce data: Air Force Space Command; Air Force Space and Missile Systems Center; Program Executive Office Command, Control, Communications, Program Executive Office Battle Management; and Air Force Research Laboratory. These organizations provided personnel data from their respective manpower sources, such as personnel data systems or manning documents. To assess the reliability of the data, we discussed the data and sources used to compile the data with Air Force officials; reviewed the data for logical inconsistencies; compared the data received from the Air Force workforce data system to data from Air Force Space and Missile Systems Center briefing documents; and compared relevant data received from individual space organizations with data from the Air Force Research Laboratory Space Vehicle Directorate. We collected military, civilian, contractor and FFRDC workforce data directly from the following Army organizations performing space acquisition activities: Army Space and Missile Defense Command; Program Executive Office Missiles and Space; Program Executive Office Command, Control and Program Executive Office Intelligence, Electronic Warfare and Sensors; Communications-Electronics Research, Development and U.S. Army Aviation and Missile Research Development and Army Contracting Command. These organizations provided personnel data from their respective manpower sources, such as personnel data systems or manning documents. To assess data reliability, we discussed the data and sources used to compile the data with Army officials, and reviewed the data for logical inconsistencies. We collected military, civilian, contractor and FFRDC workforce data directly from the following Navy organizations: Space and Naval Warfare Systems Command; Program Executive Office Space Systems; Space and Naval Warfare Systems Center Pacific; and Space and Naval Warfare Systems Center Atlantic. These organizations provided personnel data from their respective manpower sources, such as personnel data systems or manning documents. The Naval Research Laboratory and the Navy’s Program Executive Office for Command, Control, Communications, Computers and Intelligence were originally identified as performing space acquisition activities; however, officials stated they did not have any personnel working on space acquisition activities for at least 50 percent of their time. To assess data reliability, we discussed the data and sources used to compile the data with Navy officials, and reviewed the data for logical inconsistencies. We collected military, civilian, contractor, and FFRDC workforce data directly from: Defense Contract Management Agency; and Missile Defense Agency. To assess data reliability, we obtained information on the data and sources used to compile the data with the agencies’ officials and reviewed the data for logical inconsistencies. The Defense Advanced Research Projects Agency was originally identified as performing space acquisition activities; however, officials stated they did not have any personnel working on space acquisition activities for at least 50 percent of their time. We determined the workforce data were sufficiently reliable to provide estimates of the general size and mix of the space acquisition workforce. To assess any challenges DOD faces in hiring, staffing, and retaining its space acquisition workforce, we interviewed officials from multiple levels within DOD and the Air Force, Army and Navy. In addition to discussing the challenges with the majority of the military service space organizations listed above, we also met with the following DOD organizations: Office of Cost Assessment and Program Evaluation; and Defense Acquisition University. To gather additional insight into the challenges faced at the program office level, we also interviewed officials from a non-generalizable sample of 10 space acquisition programs from the Air Force, Army, and Navy. The selected programs included different types of space acquisitions— such as satellites and launch systems—with a range of dollar values and phases of acquisition. During our review, the Air Force and Army had other space acquisition programs in addition to the ones we selected, whereas the Navy had one space acquisition program according to service officials. The selected programs from each military service included: Advanced Extremely High Frequency (space segment) Evolved Expendable Launch Vehicle (launch segment) Launch and Test Range System (launch segment) Protected Tactical Enterprise Service (ground segment) Space Fence (ground segment) United States Nuclear Detonation Detection System (ground segment) Joint Tactical Ground Station (ground system) Secure, Mobile, Anti-Jam, Reliable, Tactical–Terminal (user segment) Transportable Tactical Command Communications (user segment) Mobile User Objective System (space segment) We also reviewed prior DOD and other space acquisition studies, including reports from the Defense Science Board, Institute for Defense Analyses, Office of Management and Budget, and the RAND Corporation. We conducted this performance audit from November 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Jon Ludwigson (202) 512-4841 or ludwigsonj@gao.gov. In addition to the contact named above, Cheryl K. Andrew (Assistant Director), Peter W. Anderson, R. Eli DeVan, Lorraine R. Ettaro, Lisa L. Fisher, Miranda Riemer, Anne Louise Taylor, and Lauren M. Wright made key contributions to this report.", "summary": "DOD plans to spend about $65 billion from fiscal year 2019 to 2023 on space acquisition programs—including satellites, launch vehicles, ground components, and user equipment. DOD's space acquisition personnel perform a variety of activities, such as preparing and reviewing acquisition documents, to manage or oversee programs that develop or procure space capabilities. DOD recently announced it plans to establish a new Space Development Agency and a United States Space Command. A House Report accompanying a bill for the 2017 National Defense Authorization Act contained a provision for GAO to review DOD's space acquisition workforce. This report examines, among other things, what is known about the size, mix, and location of that workforce. GAO collected data from DOD's acquisition workforce data systems and multiple space acquisition organizations. GAO interviewed officials from these organizations and from a non-generalizable sample of 10 space acquisition programs, representing a range of dollar values and stages in the acquisition process. The Department of Defense (DOD) does not routinely monitor the size, mix, and location of its space acquisition workforce. However, data GAO collected and aggregated from multiple DOD space acquisition organizations show that at least 8,000 personnel in multiple locations nationwide were working on space acquisition activities at the end of 2017 (see figure). Also as shown, military and civilian personnel comprise the majority of the overall workforce, while contractor and Federally Funded Research and Development Center personnel also provide support. Several factors hinder DOD's ability to collect data needed for a comprehensive view of its space acquisition workforce: DOD does not maintain a complete list of its space acquisition programs; DOD's workforce data systems are not configured to identify personnel working on space acquisition activities; and DOD space acquisition personnel are dispersed across organizations and some personnel support both space and non-space programs. Without complete and accurate data, DOD cannot assess gaps in the overall capabilities of the space acquisition workforce. Identifying space programs and collecting such data would also better position DOD to ensure that the appropriate space acquisition personnel are assigned to the new Space Development Agency and the United States Space Command. Finally, comprehensive data on the space acquisition workforce would also be beneficial to support DOD's efforts related to its recent legislative proposal regarding the establishment of the United States Space Force. GAO recommends that DOD (1) identifies the universe of its space acquisition programs and the organizations that support them and (2) collects and maintains data on the workforce that supports these programs. DOD agreed with the first recommendation, but not the second. GAO revised the second recommendation to address DOD's concerns.", "document_type": "gao"}
{"report": "In 1992, the Prescription Drug User Fee Act (PDUFA) was enacted, in part, to provide additional funds for FDA to support the process of reviewing NDAs. PDUFA authorized FDA to collect user fees from drug sponsors to supplement its annual appropriation for salaries and expenses. PDUFA has been reauthorized every 5 years since 1992; most recently PDUFA VI reauthorized the prescription drug user fee program from fiscal year 2018 through fiscal year 2022. As part of each reauthorization process, FDA identifies goals in a commitment letter to Congress. In general, these goals identify a percentage of certain types of applications that FDA is expected to review within specified time frames, including goals for the time the agency takes to complete reviews of different types of NDAs upon initial submission and resubmission. For example, in its commitment letters for PDUFA V and VI, FDA committed to completing its initial review of 90 percent of priority NDAs that involve previously marketed or approved active ingredients within 6 months of receipt. As previously noted, four key features of NDAs are linked to drug development and review processes. For initial NDA reviews, the time frames for FDA’s review that would meet its PDUFA V and VI commitments—its PDUFA goals—vary and are linked to three key features of the NDA. (See table 1.) The target time frame for the initial review of any specific NDA under these user fee commitments reflects the goals associated with all three of the key features. The fourth key feature of NDAs is whether they qualify for one of FDA’s expedited programs. Whether designated as priority or standard, FDA may determine that NDAs for drugs intended to treat serious or life- threatening conditions qualify for development and review under one or more expedited programs. These programs confer specific benefits with the potential to help reduce the development or review time needed to bring a drug to market. For example, some expedited programs provide for more intensive drug development guidance from FDA officials or allow the applicant to submit completed sections of the NDA for review before submitting the entire application. FDA’s expedited programs include accelerated approval, breakthrough therapy designation, and fast track designation. (See table 2.) NDAs must include substantial evidence of a drug’s effectiveness, which is typically drawn from clinical trials. In traditional clinical trials, patients receiving a new drug are often compared with patients receiving a placebo or a different drug. To maximize data quality, these clinical trials are usually randomized (patients are randomly assigned to either the group receiving the new drug or a comparison group) and double-blinded (neither the patients nor the investigators know who is receiving a particular treatment). According to FDA, although this type of study design is often the most powerful tool for evaluating the safety and effectiveness of new drugs, many traditional clinical trials are becoming more costly and complex to administer. Additionally, according to FDA, many new drugs are not easily evaluated using traditional approaches. For example, drugs intended for patients with rare diseases are difficult to evaluate due to the limited number of patients affected by the disease and available for study. The Cures Act was enacted on December 13, 2016, to accelerate the discovery, development and delivery of new treatments—including drugs—for patients. Among other things, the Cures Act includes provisions for FDA to evaluate and facilitate the use of evidence from sources other than traditional clinical trials to support safety and effectiveness determinations for new drugs. For example, FDA was directed to evaluate the potential use of evidence based on data that is routinely collected outside of traditional clinical trials from sources such as electronic health records, medical claims data, and disease registries; evidence from such data sources is referred to as real-world evidence. In the commitment letter associated with PDUFA VI, which was enacted on August 18, 2017, the agency agreed to certain goals relating to the use of real-world evidence in regulatory decision-making and also agreed to certain activities intended to facilitate the development and application of an additional source of evidence known as model-informed drug development. Although these nontraditional sources of evidence were included in NDAs prior to the enactment of the Cures Act and PDUFA VI, at the time this legislation was enacted, most of them were not widely used. For example, according to FDA officials, the NDAs that included real-world evidence were generally for drugs to treat oncology diseases or rare diseases. Our analysis of the 637 original NDAs submitted from fiscal years 2014 through 2018 indicates that divisions differed in the proportions of NDAs they reviewed that had any one of three key features that are linked to time frames for initial review under FDA’s PDUFA goals. As examples: 6 percent of the NDAs reviewed by the dermatology and dental division had a priority review designation, while 56 percent of the NDAs reviewed by the anti-infective division had a priority review designation; 4 percent of the NDAs reviewed by the anesthesia, analgesia, and addiction division involved a new molecular entity, while 52 percent of the NDAs reviewed by the neurology division involved one; and None of the NDAs reviewed by the transplant and ophthalmology division involved a major amendment, while 36 percent of the applications reviewed by the gastroenterology and inborn errors division involved one. (See fig. 1. App. IV provides more detailed information about differences between divisions in the number and proportion of NDAs with these key features.) We also found differences between divisions in the proportion of NDAs that they reviewed under an expedited program—the fourth key feature of NDAs. For example, none of the NDAs reviewed by the metabolism and endocrinology division qualified for one or more expedited programs, while 52 percent of the NDAs reviewed by the antiviral division qualified for one or more expedited programs. (See fig. 2. App. V provides more detailed information about differences between divisions in the number and proportion of NDAs that qualified for one or more expedited programs.) It is not unexpected that divisions differ in the proportion of their applications with key features linked to FDA’s time frames for review or qualification for expedited programs because the divisions are responsible for different products. For example, some divisions, such as the oncology divisions, regulate products for conditions that are more likely to be serious or life-threatening, and therefore the NDAs reviewed by these divisions are more likely to qualify for priority review designation and expedited programs, compared with other divisions, such as the dermatology and dental division. Our analysis of review times for the 637 original NDAs submitted from fiscal years 2014 through 2018 shows that FDA divisions differed in the number of days they took to complete their initial reviews. For example, the median time taken to complete an initial review of an NDA by the anti- infective division was about 2 months faster than the median time taken by the gastroenterology and inborn errors division. (For more information about initial review times, see app. VI.) We found, however, that these differences in initial review times largely reflected key features of the NDAs reviewed by the divisions, particularly those features linked to FDA’s time frames for review under its PDUFA goals. We analyzed initial review times using a statistical regression with two variables reflecting key features of the NDAs—target time frame for review of the application under FDA’s PDUFA goals (in days, from FDA’s receipt of the NDA to FDA’s targeted date for completion of the initial review) and number of expedited programs (0, 1, or 2 or more)—along with division as independent variables. We found that each of these variables was a significant determinant of initial review times. Specifically, our regression analysis shows that on average The shorter the target time frame for initial review of the NDA under FDA’s PDUFA goals, the shorter the initial review, and this target time frame was responsible for the majority of variation in initial review times. The greater the number of expedited programs for which the NDA qualified, the shorter the time FDA took to complete the initial review. Controlling for the effects of these key NDA features, however, we found that most of the divisions’ average review times were similar to (within 2 weeks of) each other. In contrast, the hematology and oncology divisions reviewed applications a bit more rapidly—about 2 or 3 weeks faster—than other divisions. Figure 3 illustrates the results of our analyses. The panel on the left shows the variation in the divisions’ actual average review times. The panel on the right shows the estimated average review times, after accounting for key application features, that is, what the review times would have been if each division had reviewed equal numbers of applications with these key features. We asked FDA officials what might contribute to somewhat faster review times by the hematology and oncology divisions, and FDA officials told us that a number of variables could have contributed to these differences. For example, the officials told us that applicants differ in their level of experience, which can affect the quality of the NDA or the speed of response to FDA’s requests for information; applications differ in complexity; and the oncology and hematology divisions could differ from others in their risk/benefit considerations. As previously noted, some divisions, such as the oncology divisions, regulate products for conditions that are more likely to be serious or life-threatening compared with other divisions, such as the dermatology and dental division, and risk/benefit considerations can differ across conditions that vary in how serious or life- threatening they are. For example, the potential benefits of drugs that carry substantial risks for dangerous side effects would likely be weighed differently if the drug is intended to address a life-threatening illness for which there is no other treatment than if the drug is intended to address an illness that is not life-threatening or for which there is an alternative treatment. FDA has several initiatives underway to evaluate and facilitate FDA review divisions’ and drug sponsors’ use of evidence derived from sources other than traditional clinical trials to support NDAs. (See table 3 for a description of these different evidence sources and each initiative.) According to FDA officials, implementing these initiatives can help ensure that when drug sponsors utilize these sources of evidence in NDAs, the evidence is of sufficient quality to be used in regulatory decision-making and that there is consistency across FDA review divisions in their evaluation of the evidence. FDA officials also said that although complex innovative trial designs might replace traditional clinical trials as evidence in NDAs, real-world evidence is more likely to be used to supplement clinical trial data. Although the initiatives are not restricted to any particular type of disease or patient population, according to FDA officials, some initiatives may be more relevant for certain types of diseases or patient populations than others. For example, according to FDA officials: real-world evidence may be most relevant for diseases that have outcomes that are consistently collected in the health care system. clinical outcome assessments (one aspect of patient-focused drug development) may be most relevant for diseases that are chronic, symptomatic, or affect functioning and activities of daily living. complex innovative trial designs may be most relevant for situations in which the population size is small or limited, such as pediatric populations, or where there is an unmet medical need, such as rare diseases. Our review of FDA documentation and interviews with FDA officials show that FDA has taken steps to implement each of these five initiatives. These steps include conducting public workshops with key stakeholders, issuing guidance for industry and FDA staff, initiating pilot programs, and developing FDA staff capacity, including by providing training and other educational resources. (See table 4 for examples of key activities by initiative.) These and future planned activities—including issuing additional guidance and revising relevant FDA policies and procedures— are intended to address deliverables for FDA to accomplish through 2021 that are outlined in the Cures Act and the PDUFA VI commitment letter. According to FDA officials, the agency intends to meet these deliverables, though, according to these officials, some of the activities implemented under the initiatives, such as certain pilot programs, will likely extend beyond 2021. Although implementation is still in progress for all of the initiatives, FDA officials reported some outcomes. For example, since the launch of the model-informed drug development pilot program, the agency has received two NDA supplements that incorporated model-informed drug development concepts discussed during pilot program meetings. Additionally, officials told us there has been a recent increase in investigational new drug submissions utilizing complex innovative trial designs. FDA officials also reported an increase in biomarker submissions under the drug development tool qualification program, and continued growth of the clinical outcome assessment qualification program. FDA expects that fully implementing the initiatives will lead to further increases in the use of evidence from sources other than traditional clinical trials. We provided a draft of this report to the Department of Health and Human Services for review and comment. The department provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of the Department of Health and Human Services, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or dickenj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. To determine (1) how Food and Drug Administration (FDA) divisions differ in the proportion of new drug applications (NDA) they review with key features linked to review time goals and expedited programs and (2) how FDA review divisions differ in the time taken to complete initial reviews and the extent to which key features of NDAs contribute to those differences, we analyzed data from FDA. We also interviewed FDA officials about the data and their review processes. We obtained data regarding all NDAs submitted to FDA’s Center for Drug Evaluation and Research (CDER) from fiscal years 2014 through 2018. These data included information about features that distinguish NDAs from one another, including which division was responsible for the review. The data also included information through March 31, 2019, about the dates when FDA received and completed a review of each NDA, along with the target dates for completion of review under FDA’s goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI). To ensure meaningful analysis of review times, we excluded NDAs for which FDA had not completed an initial cycle of review. Of 686 NDAs submitted in fiscal years 2014 through 2018, the applicant withdrew 10 NDAs prior to completion of FDA’s initial review and 39 NDAs were still under FDA review as of March 31, 2019, leaving 637 NDAs for which FDA had completed an initial review. To assess the reliability of these data, we conducted a series of electronic and logic tests to identify missing data or other anomalies. These analyses were informed by our review of relevant documentation and interviews with knowledgeable FDA officials. As part of our assessment of reliability, we worked with FDA to identify and correct information about certain NDAs in a small number of instances in which we identified discrepancies. Using these methods, we determined that the remaining data were sufficiently reliable for our purposes. Unless otherwise specified, the results we present are statistically significant at the 0.05 level. To determine how FDA divisions differ in the proportion of NDAs they review with key features linked to FDA’s time frames for initial reviews and expedited programs, we conducted a series of chi-square tests comparing the distributions of the 637 NDAs with and without specific features across divisions. These key features included: whether the NDA had a priority review designation (a designation applied by FDA if the product would provide a significant therapeutic improvement in the safety and effectiveness of the prevention, diagnosis, or treatment of a serious condition when compared to available drugs) or instead had a standard designation; whether the NDA did or did not involve a new molecular entity—an active ingredient that had not previously been marketed or approved for use as a drug in the United States, whether the NDA did or did not involve a major amendment (a submission, while a pending NDA is under FDA review, of additional information that may include a major new clinical safety or efficacy study report or major new analyses of studies, among other things); and whether the NDA did or did not qualify for an expedited program (accelerated approval, breakthrough therapy designation, or fast track designation), programs intended to help reduce the time involved in developing or reviewing certain drugs that have the potential to treat serious or life-threatening conditions. (See table 5 for relevant statistics from these chi-square tests.) To determine how FDA review divisions differ in the time taken to complete initial reviews, we conducted a preliminary regression analysis of 637 NDAs with the number of days an FDA division took to complete its initial review as the dependent variable and division as a single independent variable. We defined the time to complete a review as the number of days from FDA’s receipt of the NDA to the agency’s completion of the initial review by taking regulatory action. To determine the extent to which key NDA features contributed to differences between divisions in the time taken to complete initial reviews, we conducted a multiple regression analysis of the number of days FDA took to complete its initial review with division as an independent variable, along with two other independent variables to control for the key NDA features: Target time frame for initial review of the NDA under FDA’s PDUFA goals. Three key NDA features are linked to time frames for FDA’s initial review under its PDUFA goals—whether the NDA was priority or standard, did or did not involve a new molecular entity, and did or did not involve a major amendment. To control for these three features simultaneously, we counted the number of days from FDA’s receipt of the NDA until FDA’s target date for completion of the initial review under FDA’s PDUFA goals, and used that variable—the target time frame for review under FDA’s PDUFA goals—as an independent variable. We identified five NDAs for which FDA’s review time was exceptionally long in comparison to the target time frame for review under its PDUFA goals, and we asked FDA officials about them. FDA officials stated that these reviews were substantially delayed because of complicated manufacturing site issues, complicated legal and regulatory issues, or emerging public health issues requiring last minute advisory committee meetings—conditions that we deemed sufficiently unusual to exclude these five NDAs from further statistical analyses of review times. Number of expedited programs for which the NDA qualified. Another key NDA feature is whether it qualified for one or more expedited programs, programs with the potential to help reduce the development or review time needed to bring a drug to market. We controlled for this feature by including number of expedited programs (0, 1, or 2 or more) as an independent variable in our multiple regression analysis. Thus, we tested the effect of division on initial review times for 632 NDAs while controlling for the target time frame for review under FDA’s PDUFA goals and qualification for expedited programs. (See tables 6 and 7 for relevant statistics from this multiple regression analysis.) Our multiple regression analysis allowed us to test a specific hypothesis about the effect of division on review times, namely, whether divisions differed in their review times after controlling for the key features of NDAs. This regression analysis did not test a model of review times—that is, we did not attempt to identify all variables that affect review times, nor did we seek to identify the specific set or combination of variables within our data that had maximum explanatory power. Our analyses indicated that variation remained in initial review times, even after we controlled for these variables. It is important to note that an array of factors might be expected to influence review times, including not just those factors that were captured in our analysis, but also factors such as state of the science and quality of the application. With data from 632 NDAs distributed unevenly across 15 divisions, meaningful tests of additional variables or their interactions were not possible. Nonetheless, we conducted exploratory analyses that included other potentially relevant variables in addition to the target time frame for review under FDA’s PDUFA goals, number of expedited programs, and division. In separate regression analyses, we examined (a) the fiscal year in which FDA received the NDA and (b) whether the application was a BLA, an NDA based on information from studies conducted by the applicant, or an NDA based on at least some information from studies not conducted by or for the applicant. We did not find evidence of a consistent effect of either of these additional factors on review times, but in light of the number of NDAs, we cannot exclude the possibility that one or more of these factors affects review times. In a third exploratory analysis, we examined the outcome of the initial review—(a) approval; (b) tentative approval, which FDA grants if the NDA meets requirements for approval, but cannot be approved due to a patent or exclusivity period for a listed drug; or (c) issuance of a letter to the applicant called a complete response letter, in which FDA describes the specific deficiencies the agency identified and recommends ways to make the application viable for approval. This analysis suggested that NDAs that were approved for marketing at the end of the initial cycle of review were reviewed slightly faster on average than other NDAs, but this result should be viewed with caution because a small number of NDAs with certain initial review outcomes were distributed unequally. For example, very few of the NDAs (11) reviewed through one or more expedited programs resulted in tentative approval. The Food and Drug Administration’s (FDA) Center for Drug Evaluation and Research (CDER) divisions differed in the total number of days they took to complete reviews of 637 new drug applications (NDA) submitted from fiscal years 2014 through 2018 and completed by March 31, 2019. (See fig. 4.) Importantly, these times reflect differences associated with the number of completed review cycles, FDA’s target time frames for review under its goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI), and number of expedited programs. Number of review cycles. The number of cycles of review to which the NDAs we examined were subject was largely dependent on factors that were not under FDA’s control, namely, the applicant’s actions and timing. When a cycle of review ends with an FDA action, that action can be (a) approval, which allows the applicant to market the drug, (b) tentative approval, which FDA grants if the NDA meets requirements for approval, but cannot be approved due to a patent or exclusivity period for a listed drug, or (c) issuance of a letter to the applicant called a complete response letter, in which FDA describes the specific deficiencies the agency identified and recommends ways to make the application viable for approval. The applicant may respond to either tentative approval or a complete response letter by resubmitting a revised application, triggering a new cycle of review; it is up to the applicant to decide whether to resubmit the application. In addition, NDAs that were submitted earlier in time would have a greater chance of being resubmitted and reviewed by March 31, 2019, than applications submitted later in time. The number of completed review cycles ranged from one to four cycles: 637 NDAs went through a completed first (initial) cycle review; 99 of those 637 NDAs went through a completed second cycle review; 20 of those 99 NDAs went through a completed third cycle review; 3 of those 20 NDAs went through a completed fourth cycle review. Target time frames for review. Review times reflect differences in time frames for review under FDA’s PDUFA goals. The target time frames for review ranged from less than 6 months to 15 months for the first cycle and from less than 2 months to 9 months for later cycles of review. Number of expedited programs. These review times also reflect differences associated with the number of FDA’s expedited programs for which NDAs qualified. In general, these expedited programs are designed to help reduce the development or review time needed for drugs intended to treat serious or life-threatening conditions. Two of the Food and Drug Administration’s (FDA) expedited programs for new drugs intended to treat serious or life-threatening conditions— breakthrough therapy designation and fast track designation—must be requested by the drug sponsor. These programs are intended to help reduce the development or review time needed to bring a drug to market by offering benefits such as more intensive drug development guidance from FDA officials or by allowing the applicant to submit completed sections of the NDA for review before submitting the entire application. The request is normally made while the drug sponsor is conducting clinical trials or when seeking FDA’s permission to collect clinical trial data, although the request may also be made when submitting a new drug application (NDA) or while the NDA is under review. FDA’s Center for Drug Evaluation and Research (CDER) divisions are responsible for determining whether requests qualify for these expedited programs based on evidence the drug sponsors provide in support of the requests. To qualify for breakthrough therapy designation, the drug sponsor must present preliminary clinical evidence involving one or more clinically significant endpoints that indicate that the drug may demonstrate substantial improvement over available therapies. To qualify for fast track designation, the drug sponsor must either provide evidence demonstrating the drug’s potential to address unmet need or document that the drug is designated as a qualified infectious disease product. FDA may grant or deny the request, or the drug sponsor may withdraw the request before FDA renders a decision. If FDA grants the designation, the drug sponsor may subsequently withdraw from the designation, or FDA may rescind either designation if the drug no longer meets the qualifying criteria. We obtained data regarding all requests for breakthrough therapy and fast track designations submitted to CDER from fiscal years 2013 through 2018. These data included information about which division was responsible for the review and the outcome of the request—whether it was granted or denied or whether the drug sponsor withdrew the request before FDA reached a decision. To assess the reliability of these data, we conducted a series of electronic and logic tests to identify missing data or other anomalies. These analyses were informed by our review of relevant documentation and interviews with knowledgeable FDA officials. Using these methods, we determined that the data were sufficiently reliable for our purposes. We examined these data to determine whether there were any material differences between divisions in the frequency of possible outcomes. Our analyses focused on the outcomes and did not allow us to determine whether divisions differed in their application of the stated criteria. Breakthrough therapy designation. We found few differences across divisions in the frequency of the possible outcomes of requests for breakthrough therapy designation: Of 634 requests for breakthrough therapy designation (including nine requests submitted with or after the NDA submission), 39 percent were granted, 48 percent were denied, and 13 percent were withdrawn by the drug sponsor before FDA reached a decision. Divisions differed widely in the number of requests for breakthrough therapy designation they received, from 0 for the nonprescription drug division to 102 for one of FDA’s two oncology divisions. With two exceptions, the numbers of these requests that were granted, denied, or withdrawn for each division were similar to what would be expected based on the overall frequency of the possible outcomes. Requests to the hematology division were withdrawn more frequently than requests to other divisions (32 percent) and that division denied requests less frequently (17 percent) than other divisions. The neurology division denied more (81 percent), and granted fewer (13 percent), requests for breakthrough therapy designation than other divisions. Within the time period we studied, the drug sponsor withdrew from breakthrough therapy designation after it was granted in six cases and FDA rescinded the designation in 14 cases. Fast track designation. Similarly, we found few differences across divisions in the frequency of the possible outcomes of requests for fast track designation: Of 965 requests for fast track designation (including 35 requests submitted with or after the NDA submission), 71 percent were granted, 24 percent were denied, and 5 percent were withdrawn by the drug sponsor before FDA reached a decision. Again, divisions differed widely in the number of requests for fast track designation they received, from 2 for the nonprescription drug division to 133 for the neurology division. The numbers of these requests that were granted, denied, or withdrawn for each division were generally similar to what would be expected based on the overall frequency of the possible outcomes, although the anti-infective division granted more (91 percent), and denied fewer (6 percent), requests for fast track designation than other divisions. Within the time period we studied, no drug sponsor withdrew from fast track designation after it was granted, nor did FDA rescind any such designation. Pursuant to the Prescription Drug User Fee Act (PDUFA) and its subsequent reauthorizations, the Food and Drug Administration (FDA) collects user fees from drug sponsors to supplement its annual appropriation for salaries and expenses. As part of each reauthorization process, FDA identifies goals in a commitment letter to Congress, including goals for the time the agency takes to complete reviews of different types of drug applications upon initial submission and resubmission. In general, these goals identify a percentage of certain types applications that FDA is expected to review within specified target time frames. For initial NDA reviews—reviews of the NDA as originally submitted—FDA’s target time frames for review that would meet its PDUFA goals vary and are linked to three key NDA features that reflect the drug or the applicant’s action: (1) whether or not the application receives priority review designation, which indicates that the drug could provide significant therapeutic improvements in the safety and effectiveness of the prevention, diagnosis, or treatment of a serious condition when compared to available drugs; (2) whether or not the application involves a new molecular entity—an active ingredient that has not been previously marketed or approved for use in the United States; and (3) whether or not the applicant submitted a major amendment while the NDA was pending, that is, while under FDA’s review. The target time frame for review for any specific NDA reflects all three of these features. Reviews are conducted by one of the agency’s Center for Drug Evaluation and Research (CDER) divisions, each of which specialize in a specific group of drug products, such as hematology or neurology. As shown in table 8, divisions differed in the numbers and proportions of NDAs they reviewed that had the features linked to time frames for review under FDA’s PDUFA goals. The Food and Drug Administration (FDA) may determine that NDAs for drugs intended to treat serious or life-threatening conditions qualify for one or more expedited programs. These programs confer specific benefits with the potential to help reduce the development or review time needed to bring a drug to market, for example, some expedited programs provide for more intensive drug development guidance from FDA officials or allow the applicant to submit completed sections of the NDA for review before submitting the entire application. FDA’s expedited programs include accelerated approval, breakthrough therapy designation, and fast track designation. Reviews are conducted by one of the agency’s Center for Drug Evaluation and Research (CDER) divisions, each of which specialize in a specific group of drug products, such as hematology or neurology. As shown in table 9, divisions differed in the proportions of NDAs they reviewed that qualified for expedited programs. The Food and Drug Administration’s (FDA) Center for Drug Evaluation and Research (CDER) divisions differed in the total number of days they took to complete initial reviews of new drug applications (NDA) received from fiscal years 2014 through 2018 and completed by March 31, 2019. (See fig. 5.) These review times reflect differences associated with FDA’s target time frames for initial review under its goals in commitment letters associated with the Prescription Drug User Fee Act (PDUFA) reauthorizations for fiscal years 2013 through 2017 (PDUFA V) and fiscal years 2018 through 2022 (PDUFA VI). These target time frames for review are linked to specific features of the NDA and ranged from less than 6 months to 15 months for the initial review. These review times also reflect differences associated with the number of expedited programs for which NDAs qualified. John E. Dicken, (202) 512-7114 or dickenj@gao.gov. In addition to the contact named above, William Hadley (Assistant Director), Geri Redican-Bigott (Assistant Director), Aubrey Naffis (Analyst- in-Charge), and Kristen Joan Anderson made key contributions to this report. Also contributing were Sam Amrhein, Todd D. Anderson, Leia Dickerson, Kaitlin Farquharson, Rich Lipinski, and Ethiene Salgado- Rodriguez.", "summary": "Before a drug can be marketed in the United States, FDA must determine that the drug is safe and effective for its intended use through a review of evidence that a drug sponsor—the entity seeking to market the drug—submits in an NDA. The review is conducted by one of FDA's divisions (17, at the time of GAO's review) that each specialize in a specific group of drug products, such as hematology products. NDA reviews are complex, and may involve not only an initial review, but also reviews of resubmissions if the initial review does not result in approval. Under FDA's PDUFA commitments, FDA's goal is to complete reviews of 90 percent of NDAs within specific time frames linked to key features of the NDAs. GAO was asked to examine NDA review times across FDA's divisions. In this report, GAO examines (among other things) differences between FDA divisions in the key features of the NDAs they review and initial review times, as well as the extent to which key NDA features contribute to these differences. GAO analyzed data from FDA's Center for Drug Evaluation and Research regarding 637 NDAs submitted from fiscal years 2014 through 2018. These data also included biologic license applications submitted to the center. GAO excluded NDAs that were withdrawn by the applicant before FDA completed a review, as well as NDAs for which FDA had not completed a review by March 31, 2019. GAO also interviewed FDA officials about the agency's review process and these review times. Four key features of new drug applications (NDA) are linked to the time the Food and Drug Administration (FDA) takes to complete initial reviews of NDAs. Three key NDA features determine the time frames for initial review that would meet FDA's goals under the Prescription Drug User Fee Act (PDUFA) and its reauthorizations, which authorize FDA to collect user fees from drug sponsors: Whether or not the NDA qualifies for the priority review program, which is generally an expedited program for drugs that provide significant therapeutic improvements in the prevention, diagnosis, or treatment of a serious condition when compared to available drugs. The PDUFA goal for review of a priority NDA is 4 months less than for an otherwise similar standard NDA, for which the goal is to complete the review in 10 months. Whether or not the NDA involves a new molecular entity (an active ingredient that has not been previously marketed or approved in the United States). The PDUFA goal for review of an NDA with a new molecular entity is 2 months longer than for an NDA without one. Whether or not the applicant submits a major amendment (additional or new information, such as a major new clinical study) while the NDA is under review. The PDUFA goal for a review of an NDA may be extended by 3 months if the applicant submits a major amendment. The fourth key NDA feature is whether or not it qualified for one or more of three other expedited programs for drugs intended to treat serious or life-threatening conditions. GAO's analysis of 637 NDAs submitted from fiscal years 2014 through 2018 indicated that the proportion of NDAs with these key features differed among FDA review divisions. For example, 6 percent of the NDAs reviewed by the dermatology and dental division had a priority designation, compared to 56 percent for the anti-infective division. FDA has reported that some divisions, such as the oncology divisions, generally regulate products for conditions that are more likely to be serious or life-threatening, and, therefore, those products may be more likely to qualify for priority designation and other expedited programs. GAO found that FDA's divisions differed in the average number of days they took to complete an initial review of NDAs, and these differences largely reflected the key features of the NDAs they reviewed. GAO's analysis shows that the time FDA took to complete an initial review of NDAs was affected by (1) the target time frame for completion of the review under the agency's PDUFA goals, (2) the number of expedited programs for which the NDA qualified, and (3) the division performing the review. GAO also found that the target time frame for review was largely responsible for differences in initial review times. Specifically, NDAs with key features that resulted in shorter target time frames for review under FDA's PDUFA goals had shorter initial review times. Controlling for the effects of these target time frames and the number of expedited programs for which the NDA qualified, GAO found that most of the divisions' average review times were similar to (within 2 weeks of) each other.", "document_type": "gao"}
{"report": "In the United States, HHS is the lead federal agency responsible for public health. Its responsibilities include preparing for, mitigating, responding to, and recovering from public health emergencies. Within HHS, ASPR and CDC prepare for and respond to infectious disease outbreaks. ASPR leads and coordinates national preparedness and response to outbreaks in the United States. It also coordinates and supports advanced research and development, manufacturing, and procurement and deployment of medical countermeasures, such as vaccines, drugs, therapies, and diagnostic tools that can be used in the event of a potential public health emergency to protect the public from harm. CDC monitors and responds to outbreaks by, among other things, studying the link between infection and health; monitoring and reporting cases of infection; and providing guidance to the public, travelers, and health care providers. During public health emergencies, CDC may operate an Emergency Operations Center (EOC) for monitoring and coordinating its response to emergencies—including infectious disease outbreaks of Ebola, Zika, and pandemic influenza—in the United States and abroad. The EOC staff helps with directing specific incident operations; acquiring, coordinating, and delivering resources to incident sites; and sharing incident information with the public. Other agencies perform additional work related to infectious diseases. For example, FDA monitors and protects the blood supply, and NIH makes grant awards that support research related to diseases and modeling. ASPR, CDC, and FDA have different approaches to modeling. In the cases of Zika, Ebola, and pandemic influenza, CDC and ASPR are two key agencies that conduct federal infectious disease modeling efforts. As of February 2020, ASPR had a centralized modeling unit staffed by about nine people, who are a mix of federal and contract employees, according to ASPR officials. At CDC, however, modeling is decentralized and integrated into the individual centers that make up the agency. Some staff work full time on modeling, while others spend part of their time on other tasks. In addition, some of CDC’s modeling efforts are conducted externally. According to CDC, approximately 70 staff members participated in modeling studies, as of October 2018. Of those staff, CDC’s Health Economics and Modeling Unit employed about 10 modelers who have worked on Ebola and other diseases. For Zika, CDC officials responding to Zika said most modeling work was done by one modeler in CDC’s Division of Vector-Borne Diseases, a part of the National Center for Emerging and Zoonotic Infectious Diseases. CDC influenza officials said influenza modeling is conducted by six or seven members of CDC’s Influenza Division. Agency infectious disease modeling activities are not limited to Ebola, Zika, or pandemic influenza. Agency efforts to protect the nation from disasters and emergencies can be organized into two elements: preparedness and response. Infectious disease modeling is one tool used to inform a wide range of decisions related to outbreak preparedness and in response to an outbreak. In the context of infectious disease outbreaks, ASPR and CDC perform work on preparedness and response. For example, ASPR leads the Public Health Emergency Medical Countermeasures Enterprise (PHEMCE), an interagency group that helps develop medical countermeasures—FDA- regulated products including drugs, or devices that may be used in the event of a potential public health emergency to protect the public from harm. CDC may activate its EOC to assist with the response during an outbreak. For example, during the 2014-2016 West Africa Ebola outbreak, CDC activated its EOC in July 2014 to help coordinate activities. CDC personnel were deployed to West Africa to assist with response efforts, including surveillance, data management, and laboratory testing. Since the 1980’s, emerging infectious diseases have resulted in more recurrent disease outbreaks, causing an increasing number of human infections. Emerging infectious diseases have at least one of the following characteristics: they are newly recognized, have emerged in new areas, are newly affecting many more individuals, or have developed new attributes. Some of these diseases—including Ebola and Zika—are zoonotic pathogens, meaning they spread from animals to humans. Zoonotic pathogens can be carried from an animal to a human by another animal, such as a mosquito, chicken, or bat, which is known as a vector. Such pathogens sicken approximately 1 billion people annually. According to the World Health Organization, Ebola causes an acute, serious illness, which is often fatal if untreated. Ebola is introduced into human populations through close contact with the blood and other bodily fluids of infected animals. Humans spread Ebola through direct contact with the bodily fluids of infected individuals or objects contaminated with these fluids. Ebola symptoms include fever, muscle pain, vomiting, diarrhea, impaired kidney and liver functioning, and, in some cases, internal and external bleeding. There have been five Ebola outbreaks since 2014, including the 2014-2016 West Africa outbreak which caused more than 28,600 cases and 11,325 deaths. Since 2018, there has been an ongoing outbreak in the Democratic Republic of the Congo. Figure 1 provides a timeline of Ebola outbreaks since 2014. Zika is a virus that is primarily transmitted through mosquito bites. It can cause symptoms such as fever, rash, conjunctivitis (red eyes), and joint and muscle pain. It can also be transmitted from mother to child during pregnancy, or around the time of birth, or from person to person through sexual contact or blood transfusion. Many infected people do not have symptoms or will only experience mild symptoms. The Zika outbreak that began in 2015 affected individuals infected with the virus in ways that had not been seen with previous outbreaks of the disease. Specifically, during the 2015-2016 outbreak, Zika infection in pregnant women was linked to microcephaly and other severe brain defects, according to CDC. CDC officials said this was the first time in more than 50 years that an infectious pathogen has been identified as the cause of birth defects. Zika was also linked to other problems, such as miscarriage, stillbirth, and Guillain-Barré syndrome, an uncommon disorder affecting the nervous system. In the Western Hemisphere, the first cases of locally- transmitted Zika were confirmed in Brazil in May 2015. In December 2015, locally-transmitted Zika was reported in Puerto Rico. On January 22, 2016, CDC activated its Emergency Operations Center to respond to outbreaks of Zika occurring in the Americas and to increased reports of birth defects and Guillain-Barré syndrome in areas affected by Zika. Within the continental United States, the first locally-transmitted cases were confirmed in Florida in June 2016. The World Health Organization declared Zika a Public Health Emergency of International Concern from February to November 2016. In the spring of 2009, a novel influenza virus emerged, known as influenza A (H1N1)pdm09. According to CDC, it was detected first in the United States and quickly spread across the world, causing a pandemic or global outbreak of a new influenza A virus. This new virus contained a combination of influenza genes not previously identified in animals or people. The virus was very different from other H1N1 viruses circulating at the time, so seasonal influenza vaccines offered little cross-protection against infection with the new H1N1 virus, according to CDC. A vaccine against the new virus was produced, but it was not available in large quantities until late November—after the peak of illnesses during the second wave in the United States. CDC activated its EOC on April 22, 2009, to manage the H1N1 response. From April 12, 2009, to April 10, 2010, CDC estimated there were about 60.8 million cases, 274,304 hospitalizations, and 12,469 deaths in the United States due to the new H1N1 virus. According to CDC, few young people had any existing immunity—as detected by antibody response—to the virus, but nearly one-third of people over 60 years old had antibodies against it, likely from exposure to an older H1N1 virus. Multiple strains of influenza can infect humans, including strains that originate in animals. According to CDC, human infections with an Asian lineage avian influenza A (H7N9) virus were first reported in China in March 2013. During an epidemic that lasted from October 1, 2016, through September 30, 2017, the World Health Organization reported 766 human infections with H7N9 virus, making it the largest H7N9 epidemic. From 2013 to December 7, 2017, there were 1,565 humans infected with Asian lineage H7N9 reported by the World Health Organization. According to CDC, while the risk posed by H7N9 virus to the public’s health was low, the agency was concerned about its pandemic potential. Agencies use infectious disease models to answer a variety of public health questions, including those related to outbreak preparedness and response. A model is a physical, mathematical, or logical representation of a system, phenomenon, or process that allows a researcher to investigate that system, phenomenon, or process in a controlled way. For example, the classic Susceptible-Infected-Recovered or “SIR” model divides a population into three categories: 1) susceptible to the disease, S; 2) infected and infectious, I; and 3) recovered or removed from the infected or susceptible population, R. This model uses equations to determine how many people move between these three categories. The equations contain parameters—numerical descriptors of the disease based, for example, on experiment, expert opinion, or statistics of an ongoing or past outbreak. The equations allow the researcher to estimate how many people are or could be affected by the disease. For example, for past Ebola outbreaks, models estimated that after 40 days, about 44 percent of the population in close contact with infected individuals was susceptible to infection, 31 percent was infected, and 22 percent was recovered. Based on these parameters, equations for transfer between categories, and underlying demographics of the community, an epidemiologist could use the model to estimate how many people within a given town could be susceptible, infected, or removed from the categories of susceptible or infected (due to death or recovery and immunity). Based on model estimates and if a vaccine was available, CDC officials said the decision maker could plan for a specific number of vaccine kits and additional medical staff and supplies to treat infected patients. Models can also help agency officials anticipate future outbreaks, forecast the spread or severity of a disease, and predict the effects and costs of different intervention options. After an outbreak, models can help sort out what happened, what drove the outbreak, and how it compared to past outbreaks. Other tools are available to accomplish some of these tasks, but models are particularly useful when existing data are not sufficient to answer a given question, or when agencies need to integrate data from disparate sources. Infectious disease models can be put into two broad categories: Statistical models. This type of model identifies relationships or patterns that can be used to describe what is occurring or predicts what may occur in the future based on what has occurred in the past. Statistical models tend to use a large amount of data, such as past observed events, to forecast future events, such as disease occurrence, but do not require a fundamental understanding of biological processes or human behavior. They can predict outcomes when causes are not known or understood and when scientific understanding of a disease is limited. They tend to use large amounts of data on past events to forecast future events. Statistical models do not provide full explanations about an infectious disease but may be used when epidemiologists have all or most of the data needed to test a hypothesis. Several benefits can be derived from statistical modeling, including the ability to control for multiple factors that might impact the outcome reviewed, and the ability to isolate the potential effect of infectious disease factors on a particular outcome. Mechanistic models. Mechanistic models rely heavily on scientific evidence and theory related to infectious diseases, and the understanding of disease dynamics or human behavior from prior knowledge—such as biological processes or interactions between people—to represent known processes. They use basic infectious disease science to inform public health guidance and provide insights into outbreak emergence, spread, and control. For example, population-based models can simulate the course of an epidemic by dividing the population into different categories, such as susceptible, infected, and recovered. Mechanistic models can project the likely course of disease transmission, calculate and predict the effect of proposed interventions, and take into account variable conditions, such as human behavior. Both statistical and mechanistic models can range from simpler to more complex. A simpler model may, for example, have fewer parameters (inputs) or equations than a more complex model. According to CDC modelers and an expert, a simpler model may be run with a variety of software, ranging from spreadsheet software to more sophisticated software, whereas more complex models are usually run using sophisticated statistical or mathematical programming languages. As a model becomes more complex, it can become harder to describe, recreate, and understand its internal functioning. Modeling is identified as a beneficial tool in various national plans for disease response and biodefense. These plans do not define the extent to which modeling should occur or how models should be developed for policy, resource allocation, or planning purposes. See table 1 for examples of relevant national plans. CDC and ASPR use models primarily to answer questions from decision makers. CDC and ASPR officials told us, and documents show, that modeling is one source of information that may inform such decisions, along with sources such as expert opinion, surveillance, other prior work on the disease, and an official’s own knowledge. CDC modelers and officials said there is no “rule” as to when to use models, and in some situations, it may not be considered useful. For example, CDC did not use modeling when issuing a travel notice for an Ebola outbreak in specific provinces in the Democratic Republic of the Congo, officials said. Instead, CDC based the travel order on an analysis that considered disease incidence and prevalence, public health infrastructure, and the availability of therapeutics, among other things. Similarly, CDC officials responding to Ebola said modeling may be undesirable when it would take too long to engage the necessary external subject matter experts or when modeling would detract from responding to a disease. CDC and ASPR modelers use models for a variety of purposes. CDC officials said modeling is done differently for each disease, and the amount and type of modeling varies across CDC centers, in part because some centers have less capacity to conduct modeling than others. According to a CDC internal report, the most frequent uses of infectious disease modeling at CDC are: guiding preparedness and response efforts; conducting economic analyses to evaluate the benefits of public health actions, thereby reducing illness and deaths from infectious diseases; understanding pathogen biology, disease transmission, and estimating disease burden; and assessing the effect of interventions and prevention strategies. ASPR modelers and officials said models have provided information about topics such as: resources, including protective equipment, needed to help respond to an Ebola outbreak; the number of therapeutics and vaccine doses needed to respond to Ebola, both in Africa and domestically; expected U.S. demand for Zika diagnostics; and the number of vaccine doses needed to mitigate the spread of pandemic influenza. ASPR modelers and officials said modelers tend to serve in a broad role that can include modeling, data analysis, or other tasks. For example, officials said a modeler could provide a team with day-to-day analytic support and not necessarily spend time developing models or use them. Additionally, ASPR maintains a Visualization Hub that can be used for outbreak planning and response, including outbreaks of pandemic influenza and other emerging infectious diseases (see fig. 2). CDC and ASPR modelers and officials said they generally initiate modeling in response to questions from decision makers. The modelers then work closely with epidemiologists and other subject matter experts to answer the questions. Modeling, according to CDC officials, may be used by individuals or groups within centers, such as division directors, branches, or teams to influence decisions. Who answers a particular question depends, according to ASPR modelers and officials, on the decision maker. Sometimes questions asked will not be within their mission—modelers may suggest such questions be sent to a more relevant agency or part of HHS. CDC and ASPR have modeled to answer a variety of public health questions relevant to Ebola, Zika, and pandemic influenza, and, at times, the results helped inform policy and planning decisions. Modelers and officials provided the following examples: Planning: ASPR modelers and officials said the bulk of the agency’s modeling is related to the planning, development, and deployment of medical countermeasures. For example, these modelers and officials said many clinical trials for vaccines and therapeutics were planned during the 2014-2016 Ebola outbreak response. As a part of these planning activities, ASPR modelers said modelers developed forecasts of future trajectories of disease incidence under a variety of conditions. These forecasts indicated a significant likelihood the disease incidence in Sierra Leone could decrease to a level that would significantly reduce the success of the trials, according to modelers. Additionally, at the beginning of the 2014-2016 Ebola outbreak response, CDC modelers received modeling questions related to the resources needed to effectively limit the spread of the disease, according to CDC documentation. CDC used models to predict the number of Ebola cases that could be expected over time with and without disease interventions such as Ebola treatment units, community care centers, and safe burials. On the basis of this information and other factors, including a United Nations document on Ebola needs, CDC leadership and other U.S. government officials recommended a rapid increase in Ebola response aid, according to CDC documentation. According to CDC documentation, later analyses demonstrated that this increase helped to greatly reduce the actual number of cases, compared to the likely number if prompt action had not been taken. Additionally, in response to the H7N9 influenza outbreak in 2017, ASPR modeled to determine when doses of influenza vaccine should be delivered and how many doses should be administered in order to mitigate a domestic outbreak. This model found that having a vaccine stockpile could be helpful in preventing disease and that a slow effort to administer an H7N9 vaccine could reduce the vaccine’s usefulness. Policy: During the Zika outbreak, CDC modelers and officials said they modeled to determine the potential effectiveness of using pesticides to remove insects from aircraft, trains, or ships. According to modelers and agency officials, the issue arose as concern about Zika virus grew, including from other countries and U.S. agencies, like the Department of Transportation and Department of Defense. The model indicated that humans are more likely than insects to transport Zika on airplanes, and officials therefore concluded that the use of pesticides on airplanes would not be an effective intervention. According to CDC modelers and officials, this modeling resulted in an additional sentence being added to World Health Organization policy, which stated that pesticide use was not expected to be effective. The extent of modeling conducted for Ebola, Zika, and pandemic influenza varied according to the question being asked, along with other factors as follows: Type of question: CDC and ASPR have used models to answer such questions as who should be prioritized for vaccination or treatment, how transmissible a disease is, and how effective certain interventions are likely to be, according to modelers and agency officials. For example, ASPR modelers and officials said they modeled to help estimate the resources needed to respond to an Ebola outbreak; the number of therapeutics and vaccine doses needed to respond to Ebola, both in Africa and the U.S; and the expected U.S. demand for Zika diagnostics. One ASPR official said that, during the 2009 pandemic influenza outbreak, modeling questions were used to provide decision makers with information on what might happen in a given situation. For example, models were used to provide information related to decisions on early vaccine distribution and how this intervention could affect the potential mortality rate. Time to model: How soon decision makers needed information also influenced the extent to which CDC and ASPR modeled. For example, if decision makers needed an answer in a week, modelers would inform the decision makers about how much of the answer they could provide within that time frame, ASPR modelers said. Similarly, CDC modelers and officials said that, in one instance, modelers had only 12 hours to provide decision makers with information. Even estimating the time needed to develop and conduct modeling could represent an additional challenge, according to CDC modelers responding to Zika. According to a CDC article on modeling to inform responses to novel influenza viruses, the amount of time required to develop and execute a model can vary from less than a week to more than a month. Agency officials concurred with these time frames. Personnel and data availability: The availability of qualified personnel was also a factor that affected how much modeling agencies conducted for the selected diseases. For example, CDC modelers and officials said the agency’s Division of Vector-Borne Diseases has focused its resources in other areas, such as building the capacity of states to address vector-borne diseases, and therefore had not invested in individuals with the right skill sets to conduct modeling for the Zika outbreak response. As a result, the division had to call on the three or four CDC modelers from outside of the division who were available to assist with the Zika outbreak response, which limited the amount of modeling that could be performed. Data challenges can also limit the types of modeling conducted. For example, when modeling for Zika, ASPR modelers said they used available information, but data quality and availability limited their ability to model. More data typically become available as an outbreak progresses, but models may be most helpful at the beginning of an outbreak when critical decisions need to be made (see fig. 3). CDC and ASPR do not keep a list of all modeling conducted, and we therefore cannot quantify the extent of their efforts in terms of a number of models. ASPR modelers and officials said modeling is typically one small aspect of the way the agency carries out its mission. One ASPR official said models are never the sole source of information for decision-making. According to NIH officials, NIH does not conduct or fund internal modeling for decision-making purposes. NIH’s Fogarty International Center has conducted self-initiated, internal modeling to answer questions generated from research, and from ideas from Center-held workshops. Two NIH institutes—the National Institute of General Medical Sciences and the National Institute of Allergy and Infectious Diseases—along with NIH’s Fogarty International Center have awarded grants for external modeling research for our selected diseases. However, NIH officials said these efforts were intended to advance science, not for policy or outbreak response. CDC and ASPR modelers and officials said they considered modeling results to a limited extent when making decisions about resource allocation. While modeling can help determine the amount of particular resources needed during an infectious disease outbreak, CDC modelers and officials said it is not central to their resource allocation planning. For example, CDC modelers and officials noted that while a model could inform a decision maker about how many diagnostic testing supplies would be needed based on the range of predicted cases, this would be one input among many into the decision. Decision makers would also consider whether there are other diagnostic test supplies for similar diseases that could be used, the extent of laboratory testing capacity, or the longevity of those supplies. Models can be used to help plan for the cost of interventions by determining the numbers or types of interventions that can be used during a response to an infectious disease outbreak, according to CDC modelers and officials. It can also help decision makers recognize gaps in their ability to implement resource allocation decisions, according to CDC officials. For example, CDC leadership described how modeling input requirements spurred analysis of the factors limiting hospitals’ use of ventilators during a pandemic influenza outbreak. This work, according to CDC officials, helped determine the number of ventilators that should be included in the national stockpile. While modeling results are important to consider during a public health event, ASPR officials and modelers said it is also important to consider concrete financial estimates based on prior experience and whether recommended medical interventions or countermeasures are available or effective. For example, ASPR modelers and officials have occasionally been asked to analyze costs for medical countermeasures, but modelers and officials said that few medical countermeasures typically meet the requirements of decision makers, and existing medical countermeasures are typically unavailable for use in a response. ASPR modelers and officials noted that the usefulness of modeling to the decision maker in these instances is limited. In the event that they were asked to model for such questions, ASPR modelers and officials said time would also be a limiting factor in their analysis. CDC has also developed models to inform decision-making at the state level, specifically to assist state and local public health agencies in developing outbreak response plans. A professional organization of epidemiologists we contacted expressed some concerns with limitations of CDC models, specifically noting that state and local officials viewed CDC models as lacking the level of refinement needed for their state- and local-level planning needs. To follow up, we interviewed officials from a non-generalizable selection of five states based on their reported use of CDC models, the level of selected disease activity in the state, and geographic variation. Two of the five state health departments we contacted reported using one of CDC’s models for Ebola, Zika, or pandemic influenza. These two states confirmed that the usefulness of the CDC FluSurge pandemic influenza model was limited by unrealistic assumptions or a lack of predictive capability, but added that the models were useful to them when considering how to allocate resources or otherwise prepare for a severe pandemic. Officials from one state health department told us they had similar concerns with the CDC Ebola model regarding an unrealistic overestimate of the potential cases, but added that it was useful for informing staff allocation planning as part of their overall response. Officials from another state health department told us they used CDC’s Zika modeling results that indicated how many emergency room visits they could expect and what symptoms it would take to confirm a Zika infection. At the time, state officials said, commercial testing for Zika was not available, so this modeling was very helpful to health officials looking to recommend who hospitals should test based on the presence of Zika symptoms. State health department officials added that many other factors are considered when deciding on resource allocation, such as local leadership and willingness to embrace the public health response. The four HHS agencies that work on infectious disease modeling reported using multiple mechanisms to coordinate their efforts. However, they do not routinely monitor these efforts, evaluate their effectiveness, or report on them to identify areas for improvement. The four HHS agencies that work on infectious disease modeling—ASPR, CDC, FDA, and NIH—reported using multiple mechanisms to varying extents to coordinate such efforts. For example: Emergency Operations Center (EOC). During the response to an outbreak, CDC activates its EOC—a temporary, formal organizational structure for coordinating expertise within CDC and among agencies. The four HHS agencies—ASPR, CDC, FDA, and NIH—used EOCs to coordinate modeling efforts during responses to Ebola, Zika, and pandemic influenza outbreaks. For example, during the 2015-2016 Zika outbreak, CDC’s EOC served as the command center for monitoring and coordinating the response by bringing together CDC scientists with expertise in areas such as arboviruses (the category that includes Zika), reproductive health, birth defects, and developmental disabilities. CDC modelers and officials told us that they had weekly strategy meetings and briefings with response leadership within the EOC where they discussed which modeling questions to prioritize. In general, CDC modelers in the EOC were expected to coordinate with modelers from other agencies within and outside of HHS—such as ASPR, FDA, NIH, and the Department of Homeland Security—to produce timely estimates of cases, hospitalizations, and deaths. These estimates can inform response leadership and enable them to assess the speed and impact of the geographic spread of the pandemic. Modelers in the EOC also provide support to decision makers as they examine the potential effects of various response options. These options include when and how to deploy Strategic National Stockpile assets, such as influenza antiviral drugs and mechanical ventilators. We found the use of EOCs to be consistent with leading collaboration practices we have previously identified, such as defining and articulating a common outcome. Public Health Emergency Medical Countermeasures Enterprise (PHEMCE). The four HHS agencies also participated in PHEMCE, a federal interagency body formed by HHS in 2006 that coordinates the development, acquisition, stockpiling, and recommendations for use of medical products that are needed to effectively respond to a variety of high-consequence public health emergencies. PHEMCE is led by ASPR and also includes partners at the Departments of Defense, Veterans Affairs, Homeland Security, and Agriculture. PHEMCE’s 2017-2018 strategy and implementation plan, its most recent, identified Ebola, pandemic influenza, and emerging infectious diseases more broadly as high-priority threats. PHEMCE leadership could ask modelers to address questions related to these infectious diseases, according to ASPR modelers and officials. According to ASPR officials, such questions tend to support larger response- related efforts, and modeling results are often incorporated into final reports and products. According to ASPR officials, as of February 2020, the PHEMCE structure has been updated and it is unclear how modeling fits into the new structure. We found that coordination through PHEMCE is consistent with leading collaboration practices such as establishing mutually-reinforcing or joint strategies. Working groups. Modelers with the four HHS agencies have participated in working groups related to infectious disease modeling (see table 2). The use of working groups and similar bodies is consistent with leading collaboration practices that we have previously reported as useful for enhancing and sustaining interagency collaboration, such as identifying and addressing needs by leveraging resources. For example, CDC and ASPR modelers participated in the National Science and Technology Council’s Pandemic Prediction Forecasting Science and Technology Working Group, which facilitates coordination among numerous federal agencies. In 2016, this group produced a report that identified challenges in outbreak prediction and modeling for federal agencies and offered recommendations for federal actions to advance the development and effective application of outbreak prediction capabilities. Description This interagency working group, directed by the National Science and Technology Council, is responsible for analyzing the state of infectious disease modeling and prediction, and facilitating coordination among numerous federal agencies. According to CDC modelers and officials, as of October 2018, the charter for this group is no longer active, and it meets on a voluntary, ad hoc basis. According to CDC officials, this group connects modelers by holding seminars, managing an email list, and arranging for members to peer review one another’s models. This group had over 160 participants from various centers across CDC, as of June 2019. During the 2014-2016 Ebola and 2015-2016 Zika outbreaks, the Department of Health and Human Services’ (HHS) Office of the Assistant Secretary for Preparedness and Response (ASPR) established temporary modeling coordination groups that brought together government agencies and academics to share early modeling results and discuss pressing questions that could be answered through modeling, according to ASPR modelers and officials. A wide range of entities participated in these groups, including the four HHS agencies, other federal agencies such as the Departments of Defense and Homeland Security, universities, and foreign entities, such as the World Health Organization and the United Kingdom. According to ASPR modelers and officials, there are no plans to convene modeling coordination groups unless there is an ongoing infectious disease outbreak. Joint model development. ASPR and CDC modelers jointly developed some modeling products during outbreak responses. For example, during the 2014-2016 Ebola response, ASPR and CDC developed a model to estimate future numbers of Ebola patients needing treatment at any one time in the United States. According to a publication describing the model, policymakers have used it to evaluate responses to the risk for arrival of Ebola-infected travelers, and it can be used in future infectious disease outbreaks of international origin to plan for persons requiring treatment within the United States. Building these positive working relationships can help bridge organizational cultures by building trust and fostering communication, which facilitates collaboration and is vital in responding to emergencies. For example, in our 2011 report, we found that, through interagency planning efforts, federal officials built relationships that helped facilitate the federal response to the H1N1 influenza pandemic. Similarly, HHS officials said that federal coordination during the H1N1 pandemic was much easier because of these formal networks and informal relationships built during pandemic planning activities and exercises. Memoranda of understanding. The four HHS agencies have entered into various agreements through memoranda of understanding in order to define their relationships for coordinating infectious disease modeling (see table 3). Generally these memoranda were between individual agencies rather than department-wide. We found that the use of memoranda of understanding was consistent with leading collaboration practices, such as agreeing on roles and responsibilities. Our prior work found that agencies that articulate their agreements in formal documents can strengthen their commitment to working collaboratively. Similarly, CDC modelers and officials said that written agreements can reduce the possibility of misunderstandings or disagreements and help ensure that participants have a mutual understanding of collaboration goals. For example, in the absence of such written agreements, the potential for duplication is increased because agencies could be working on similar types of models without one another’s knowledge. Table 3. Selected Examples of Memoranda of Understanding for Coordinating on Infectious Disease Modeling Collaborating agencies The Office of the Assistant Secretary for Preparedness and Response (ASPR) and Centers for Disease Control and Prevention (CDC) ASPR and the Food and Drug Administration (FDA) Description From 2013 to 2018, CDC and ASPR had a memorandum of understanding to promote collaboration, provide expertise, and facilitate data and information exchange related to infectious disease modeling. This agreement expired in 2018. ASPR modelers and officials told us that, as of August 2019, it had not been updated, and there were no plans to do so. Despite this, according to CDC modelers and officials, the substance of the agreement is still being followed. CDC modelers and officials told us they continue to collaborate with ASPR modelers on the development of models that address questions of mutual interest. For example, for the ongoing Ebola response, CDC modelers and officials said they have kept ASPR informed on modeling efforts, and ASPR shares data on vaccine production that is included in one of the models. ASPR and FDA have a memorandum of understanding to promote collaboration and enhance knowledge and efficiency by providing for the sharing of information and expertise. This memorandum was in place from 2012 to 2017, and was then renewed in 2019. It remains valid unless modified by consent of both parties or terminated by either party immediately upon written notice in the event that a federal statute is enacted or a regulation is issued by a federal partner that materially affects the memorandum. According to FDA modelers and officials, the agreement facilitates collaboration related to FDA’s Medical Countermeasure Initiative and FDA’s role in supporting the HHS-led Public Health Emergency Medical Countermeasures Enterprise (PHEMCE). FDA modelers and officials told us that the agreement supports the frequent, ongoing collaborations between FDA and ASPR, including collaboration related to preparedness for emerging infectious diseases. However, FDA modelers and officials said, while no specific steps have been taken with regards to collaborating on infectious disease modeling under the agreement, modeling assistance could be provided in the future, if needed. Description From 2013-2018, ASPR had a memorandum of understanding with NIH’s Models of Infectious Disease Agent Study program to (1) enable Models of Infectious Disease Agent Study program researchers to work with ASPR as part of public health preparedness and response activities, (2) share data and information, and (3) support model development and use in the HHS modeling hub. This agreement has expired. ASPR modelers and officials told us that, as of August 2019, it has not been updated, and there were no plans to do so. Since 2015, CDC has had a memorandum of understanding with NIH’s Models of Infectious Disease Agent Study program, to promote collaboration and facilitate the exchange of data, tools (models), methods, and information. It was set to expire in February 2020. From 2013 to 2018, ASPR had separate memoranda of understanding with the Departments of Defense and Homeland Security to promote collaboration, provide expertise, and facilitate data and information exchange. The goals of the collaboration in both agreements were to explore ways to, among other things: share analytical approaches and efforts, such as modeling and simulation tools, in support of public health preparedness and response activities; provide personnel as needed to facilitate analytical efforts; and share data and information. These goals were similar to those laid out in the agreement between CDC and ASPR. These agreements expired in 2018. ASPR modelers and officials told us that, as of October 2019, they have not been updated, and there were no plans to do so. Forecasting competitions. CDC and NIH have sponsored formal forecasting competitions to improve modeling for Ebola, Zika, and seasonal influenza. According to a report from the National Science and Technology Council, controlled, multi‐center modeling contests and projects generate valuable insights. For example, they often show that simpler models perform as well as more complex models and that ensemble models, which combine the results of multiple models to predict an outcome, perform better than an individual model. Such competitions are consistent with a leading collaboration practice we previously reported: identifying and addressing needs by leveraging resources. In this case, such leveraging allowed CDC and NIH to obtain additional benefits and insights on models that may not otherwise be available. These modeling competitions can therefore help the HHS agencies better prepare for future outbreaks through coordination with participants. The following are examples of forecasting competitions sponsored by CDC or NIH: Ebola competition. NIH’s Fogarty International Center held an Ebola forecasting competition from August to December 2015, related to the 2014-2016 West African Ebola outbreak, to compare the accuracy of predictions from different Ebola models, among other things. According to NIH modelers and officials, lessons learned from the challenge were that (1) with regard to short-term incidence predictions, ensemble estimates were more consistently accurate than predictions by any individual participating model; (2) as expected, more accurate and granular epidemiological data improved forecasting accuracy; (3) the availability of contextual information, including patient-level data and situational reports, is important for accurate predictions; (4) the accuracy of forecasting was not positively associated with more complex models; and (5) coordination of modeling teams and comparison of different models is important to ensure robustness of predictions. According to NIH officials, based on these lessons and in response to the most recent Ebola outbreak, NIH has established a coordination group to share information about modeling and data sharing for this particular outbreak and a formal model comparison is underway under World Health Organization leadership. Aedes (Zika) competition. In 2019, CDC hosted a forecasting competition related to using models to predict the presence of Aedes mosquitoes, which is a vector for the Zika virus. Evaluating these models can, according to CDC, help clarify model accuracy and utility, the seasonal and geographical dynamics of these mosquitoes, and key directions for future research. According to CDC documentation, these advances can contribute to improved preparedness for arboviral invasion in the United States and in other regions where Aedes suitability may be limited and changing. CDC plans to evaluate forecasts for this competition in early 2020, as soon as final surveillance data for 2019 are available. FluSight (seasonal influenza) competition. CDC holds an annual seasonal influenza forecasting competition—known as FluSight—to facilitate efforts to engage external researchers to improve the science and usability of seasonal influenza forecasts. The results of the competition are evaluated by the CDC Influenza Division, which works with state and local partners to determine whether the results are useful to them and if there are other metrics, milestones, or targets that would be more helpful in making public health decisions. According to CDC officials in February 2020, the results from the FluSight competition are not directly incorporated into pandemic influenza forecasting because the most accurate seasonal influenza forecasts would not necessarily be the most accurate pandemic influenza forecasts. According to these officials, the overall lessons learned from the FluSight competition relate to how to quantify, visualize, and communicate model results and model accuracy, as well as the value of forecast ensembles to summarize multiple models. CDC officials said these lessons are incorporated into pandemic influenza forecasting plans. Coordination with academic and other modelers. CDC coordinated infectious disease modeling efforts with academic and other modelers through various means, including the following: Intergovernmental Personnel Act agreements. CDC has used agreements under the Intergovernmental Personnel Act of 1970 to collaborate with external experts on modeling efforts. For example CDC’s Division of Vector-Borne Diseases had an agreement from 2014 to 2017 to assign a CDC official to the Harvard T.H. Chan School of Public Health. The agreement was to help CDC integrate with a larger modeling community and provide the Harvard School of Public Health with expertise in arboviral diseases and applied public health. Vector-Borne Disease Centers of Excellence. CDC has funded the Vector-Borne Disease Centers of Excellence, which are engaged in modeling-specific projects. In 2017, CDC established five universities as regional centers of excellence to help prevent and rapidly respond to emerging vector-borne diseases across the United States. According to CDC, the goals of the centers are to build effective collaboration between academic communities and public health organizations at federal, state, and local levels for surveillance, prevention, and response, among other things. Support for other governmental entities. CDC has coordinated with other entities—such as state and local officials—to provide modeling tools, estimates of case counts, or effects of interventions during the Ebola, Zika, and pandemic influenza outbreaks. For example, CDC developed pandemic influenza models for state and local health departments to use in influenza pandemic planning activities. The tools are available on the CDC pandemic influenza website and from ASPR’s emergency preparedness information portal. As previously discussed, officials from two of the states we spoke with said they generally were unaware of the availability of the models. According to CDC modelers and officials, these models were developed in the mid- 2000s for pandemic influenza planning and remain useful but had not been a priority to update because they have not received a request to do so. Informal collaboration. CDC has engaged in a range of informal collaborations related to infectious disease modeling. According to CDC modelers and officials, modelers often develop relationships through conferences or other contacts. For example, CDC modelers and officials said they informally collaborated on Ebola modeling needs with academic institutions, as well as modelers and analysts in the World Health Organization and other U.S. government agencies, such as the Federal Emergency Management Agency. For example, CDC modelers and officials told us that model estimates produced under collaboration with academics helped inform decisions about how many beds to be ordered and delivered on the ground in West Africa during the 2014-2016 Ebola Outbreak. Similar to the forecasting competitions described above, such informal coordination mechanisms are consistent with the best practice of identifying and addressing needs by leveraging resources, thus obtaining additional benefits that may not be available if they were working separately. For example, we have previously reported that informal collaboration mechanisms—such as building relationships between key personnel and soliciting input for research projects—can provide the opportunity to leverage expertise. CDC and ASPR modelers and officials did not routinely monitor, evaluate, and report on coordination efforts for infectious disease modeling. While CDC did conduct after-action reviews for Ebola and Zika, which included a review of modeling efforts, such reviews are not routine outside of a response and do not examine modeling coordination between agencies. ASPR modelers and officials told us they saw no reason to monitor coordination efforts under the memorandum of understanding with CDC because such memoranda outline expectations rather than requirements. However, we have found that agencies that create a means to monitor, evaluate, and report the results of collaborative efforts can better identify areas for improvement. We have previously reported that progress reviews or after action reviews can be useful mechanisms for monitoring, evaluating, and reporting on collaborative efforts. For example, we previously reported that, to monitor, evaluate, and report on the status of achieving the Healthy People 2010 objectives, HHS held progress reviews in which the federal agencies with lead responsibilities for a focus area reported on the progress towards achieving the objectives. During these reviews, the participating agencies discussed the data trends, barriers to achieving the objectives, strategies undertaken to overcome barriers, and alternative approaches to attain further progress. By holding similar progress reviews in which CDC and ASPR evaluate and report on coordination efforts for infectious disease modeling, these agencies could be better positioned to identify and address challenges prior to infectious disease outbreaks occurring, which could lead to improved responses. Further, there is the potential for overlap and duplication of modeling efforts across agencies, which may not be identified if coordination efforts are not effectively being monitored, and which could lead to inefficiencies. The memorandum of understanding between CDC and ASPR had expired in 2018. Agency officials told us they had no plans to review or update the agreement. According to ASPR modelers and officials, the agreement has not been updated because it was not a priority and the substance of the expired agreement is being followed. However, without an active agreement in place that clearly defines the goals of the collaborative effort and the roles and responsibilities of participants, a lack of understanding and agreement becomes more likely, particularly as agencies’ priorities evolve over time. Our prior work on leading collaboration practices found that agencies that articulate their agreements in formal documents can strengthen their commitments to working collaboratively, and that such agreements are most effective when they are regularly reviewed and updated. Further, we found that the memorandum of understanding between ASPR and CDC was not fully implemented when it was active. For example, according to this agreement, CDC was to appoint a designee to participate in a steering committee related to modeling within HHS. However, ASPR modelers and officials told us that this steering committee was never formed because of changing leadership and priorities. They told us that HHS does not have any intention to form such a steering committee in the future. However, our past work shows creating a steering committee or other similar coordination mechanism could help facilitate monitoring of coordination efforts. We similarly found that other memoranda of understanding related to infectious disease modeling were not fully implemented. For example, although ASPR had a 2013-2018 memorandum of understanding with NIH’s Models of Infectious Disease Agency Study program, ASPR modelers and officials said they rarely use models funded by NIH, including those funded through the program. In particular, ASPR modelers and officials recalled only using one such model in recent years. That model, known as “FluTE,” is an influenza model that was used as part of a larger study on vaccine availability. However, ASPR modelers faced challenges in using this model. Specifically, these ASPR modelers and officials said the FluTE model initially was not compatible with ASPR’s computer system, so software engineers had to modify the source code to resolve the compatibility issue. The model did not have documentation describing its parameters, according to ASPR modelers and officials, so they had to read through the model’s source code to understand them. Similarly, regarding a separate agreement between ASPR and FDA, FDA modelers and officials said that, while there is ongoing information sharing, no specific steps have been taken with regard to collaborating on infectious disease modeling under the agreement. However, these modelers and agency officials said that modeling assistance could be provided in the future, if needed. We identified four elements of practices for developing and assessing models: (1) communication between decision maker and modeler, (2) description of the model, (3) verification, and (4) validation. We determined that CDC and ASPR generally followed these GAO-identified practices for 10 models we reviewed. However, for four of the 10 models, CDC modelers did not provide all of the details needed in the verification steps to reproduce their model results, which is inconsistent with HHS guidelines on transparency and reproducibility. According to our interviews with agency modelers and experts, along with our review of selected literature, there are no documented standards that prescribe the steps agencies must or should follow when developing and assessing models. However, based on our interviews and review, we identified four broad elements of the modeling process that modelers generally consider. They are: 1 communication between modelers and officials to refine questions to be addressed by the model, such as geographic spread of the disease and total cases of the disease; 2 description of the model, including detailed descriptions of assumptions and data sources used; 4 validation. Figure 4 outlines the model development and assessment process. Based on our assessment of 10 selected models, we found that CDC and ASPR generally took steps that corresponded to our four elements, and agency modelers generally agreed with our assessment of each model. See table 4 for more information on the elements. See appendix III for a list of models we reviewed and a complete list of the steps we identified that make up each element. Communication between modeler and decision maker. In all 10 agency models we reviewed, we found that agencies took all the steps we identified for communication between decision maker and modeler. In some cases, these steps were formalized, while in others they were informal. For example, CDC modelers responding to Ebola ensured communication with decision makers by following a memo template they developed, which has a section requiring modelers to communicate key aspects of their model. These modelers noted, however, that they would not follow all the steps in their memo template for models developed during an outbreak because of time constraints. CDC modelers responding to pandemic influenza noted they do not have formal best practices for communication about key model aspects to decision makers, and a CDC modeler responding to Zika highlighted the role of CDC’s Emergency Operations Center (EOC) in communication between decision makers and modelers, which is activated only during a response. ASPR modelers noted that—as a best practice—they hold a discussion for all new models, in which decision makers describe what they are looking for and modelers describe what they can provide. Description of the model. In nine of the 10 models we reviewed, modelers took all steps we identified for describing their model type, inputs, outputs, assumptions, and limitations. In one case, ASPR’s “flumodels” package, the agency did not carry out the step of describing the model’s limitations. ASPR modelers told us they did not do so because they expected the model’s intended users—primarily federal public health modeling experts—would understand the limitations of their model, an assumption we find reasonable. Verification. In six of 10 models reviewed, we found agency modelers followed most of the steps we identified for model verification. However, in four of the seven CDC models reviewed, CDC did not publish the model’s code, a part of model reproducibility and a model verification step. We examine CDC’s policy and efforts on reproducibility in more detail below. Validation. For four of the 10 models we reviewed, agencies performed few validation steps. In all three CDC pandemic influenza models we reviewed, and the ASPR Zika model, sensitivity analysis was the only validation step performed. CDC influenza modelers said they did not perform other validation steps because of a lack of comparable external models or applicable data which could be used for other types of model validation. For example, they said they could not validate their models using real-world data because they made projections for scenarios that did not come to pass (e.g., an unmitigated pandemic influenza outbreak). They said they have continued to look for comparable models that could be used to cross-validate their model estimates. ASPR modelers responding to the Zika outbreak also did not have access to comparable external models or applicable data to confirm their model projections, but have since attempted to validate their model. For the other six models we reviewed, agencies carried out most but not all validation steps. For example, CDC modelers responding to Zika also said they did not perform cross-validation (comparison of different model results to each other) for their Zika model because of a lack of comparable models. However, these ASPR and CDC Zika modelers said they have attempted to validate their model since its publication as new data emerges, and we found this occurred. Assessing Model Validity Assessing model validity means determining whether a model is sufficiently accurate for its purpose. Several methods are available, including the following: Modelers can compare the results of the model against real-world data the model was designed to predict. If there are no such data, another method is to determine how much the model projections change in response to changes in input data. This is known as model sensitivity analysis. Modelers can also withhold a part of the available data in building the model and then confirm the model can reproduce the withheld data. real-world data is to run the model along with a separate, independent model using the same input data, and comparing the outputs. CDC modelers and ASPR modelers responding to Zika followed identified practices and validated their model projections for the Zika outbreak, although their efforts yielded mixed results for model performance. CDC modelers responding to Zika attempted to estimate whether there was an enhanced risk of microcephaly in infants born to expectant mothers infected with Zika. Using data available during the initial stage of the outbreak, they calculated the enhanced risk to be between 0.88 and 13.2 percent if the mother was infected in the first trimester. In two subsequent studies using later data on the actual incidence of microcephaly as a result of the outbreak, other researchers found the enhanced risk was within the bounds of CDC modelers’ earlier projections: a 10 percent enhanced risk in one study and an 8.3 percent enhanced risk in the other. In the second case, ASPR modelers attempted to estimate potential new cases of Guillain-Barré syndrome, a rare disorder in which the body’s immune system attacks part of its own nervous system, in places burdened by Zika infection. Their initial projections were that there would be between 191 and 305 new cases in Puerto Rico, a three- to five-fold increase above the number normally expected. ASPR modelers attempted to verify these results themselves and found that the incidence did increase, but only two-fold, to 123 new cases. through independent performance evaluations. For example, agencies sometimes host modeling competitions, in which independent modelers compare the predictive performance of multiple models under controlled conditions using standardized data. The National Institutes of Health hosted an Ebola forecasting competition in 2015, and the Centers for Disease Control and Prevention (CDC) launched its FluSight competition in 2013. The Challenge of Modeling During an Outbreak. Early in the 2014-2016 Ebola outbreak, Centers for Disease Control and Prevention (CDC) officials faced the challenge of answering questions with limited data and time. In order to estimate the potential number of future cases and to aid in planning for additional disease-control efforts, CDC developed EbolaResponse, an Excel spreadsheet-based model that could forecast how interventions would impact the outbreak. Using EbolaResponse, CDC predicted in early September 2014 that 1.4 million cases of Ebola could occur in Liberia and Sierra Leone by January 2015, if the world health community did not increase interventions. These estimates included a correction factor intended to account for the underreporting of cases and that, according to officials, was to represent model uncertainty. Partly because of these estimates of rapidly increasing cases, CDC and others increased intervention by sending more treatment units, personnel, and medical supplies in late 2014. EbolaResponse was created to model the effects of intervention, and it later turned out to be unreliable for the 4-month forecast that CDC used to support its request for increased intervention. Independent analysis found that the model could forecast cases up to a month ahead well but could not provide any measure of uncertainty. Furthermore, the model was unable to make accurate forecasts much beyond 3 months, a limitation that was common among the models used during the outbreak. CDC later reported that roughly 8,500 cases, or 34 percent of the corrected EbolaResponse prediction of 25,000 cases, occurred in Liberia by the end of January 2015. We also found that CDC and ASPR modeling approaches varied somewhat, while generally remaining within the bounds of our identified practices. For example, all the agency modeling groups reviewed their model assumptions, but they also varied in whether this review was formal or informal and internal or external. CDC modelers responding to Ebola use a formal internal peer review process during non-outbreak periods, as well as a detailed checklist to ensure communication with decision makers, full consideration of model inputs and outputs, quantification of model uncertainty, and validation of the model. By contrast, CDC modelers responding to Zika told us they do not have a formal system for evaluating their models, and instead rely on their own review of model assumptions. ASPR and CDC pandemic influenza modelers told us their modeling approach also relied on peer review, but the review was done by external experts; informally for ASPR and formally for CDC pandemic influenza modelers. There are several reasons agency modeling approaches can vary. According to agency modelers, agency modeling practices can be influenced by the availability of time, data, and comparable models. For example, CDC pandemic influenza modelers and officials said they follow a shortened process when facing time constraints by documenting model development in a journal publication after the model has already been put to use. Similarly, CDC modelers responding to Ebola noted that, during a response, a lack of time may mean models are not reviewed through CDC’s formal clearance process; instead, a more informal review of model results may occur. CDC and ASPR modelers also described variation in the complexity of the models they use. They said they sometimes use both simple and complex models for the same disease and during the same outbreak. CDC modelers and officials responding to Ebola said that they preferred models run in spreadsheet programs for their transparency and communicability, whereas CDC influenza modelers mostly use dedicated statistical software programs to run models and spreadsheets for communicating with state and local health departments. ASPR modelers develop more complex prediction models so that they can be reused to answer more than one question, as opposed to models run in spreadsheet programs that are designed to answer one question. Experts and agency modelers generally agreed that infectious disease models should not be more complex than is necessary to answer the questions they were developed to address. A simpler model may be run on a variety of software programs, ranging from spreadsheet programs to specialized programming languages that can do statistical analysis. One downside of models run in spreadsheet programs, according to CDC influenza modelers, is that it is harder to conduct quality control measures. Two experts we spoke to, along with CDC Zika modelers, also expressed concerns with reliability and reproducibility of models run in spreadsheet programs. Since 2002, HHS agencies responsible for disseminating influential scientific, financial, or statistical information have been required to ensure methods used to develop this information are “reproducible.” A 2019 report from the National Academies of Sciences, Engineering, and Medicine noted that the scientific enterprise depends on the ability of the scientific community to scrutinize scientific claims and to gain confidence over time in results and inferences that have stood up to repeated testing. As part of this process of scrutiny, a study’s data and code should be made available so that the study is reproducible by others. The National Academies report defines reproducibility as obtaining consistent computational results using the same input data, computational steps, methods, code, and conditions of analysis. Reproducibility is specifically addressed earlier in this section in our discussion of model verification, a step that requires making code available for independent review. HHS requires its component agencies to either follow HHS department guidelines on reproducibility or to ensure their own guidelines include a high degree of transparency about the data and methods used to generate scientific information. HHS guidelines require that, in a scientific context, agencies identify the supporting data and models for their published scientific information and provide sufficient transparency about data and methods that an independent reanalysis could be undertaken by a qualified member of the public. When asked whether CDC has specific policies related to reproducibility that would have applied to provision of model code in their published scientific research, CDC referred to its guidelines developed in response to the 2002 HHS Guidelines. However, CDC guidelines do not contain any reference to reproducibility, models, or provision of model code. CDC guidelines for review of scientific information provided to the public focus on completeness, accuracy and timeliness, data management and analysis, clarity and accuracy of presentation, and validity of interpretation of findings. CDC’s policy on public health research and non-research data management and access does not make any reference to reproducibility or model code. This lack of reference to reproducibility in CDC’s guidelines and policies is not in accordance with HHS guidelines. Our review found four instances in which CDC modelers did not provide model code when they published their models. CDC modelers said in some instances, issues with publication formats made the code difficult to share, they did not have time to produce a user-friendly version of the code, or they would share the code upon request. By contrast, ASPR modelers provided code for every model within our review when they published their models. While neither agency cited a specific HHS policy that required them to share model code, ASPR modelers noted that their internal peer review process typically includes sharing model source code with other modelers within PHEMCE. In our review of HHS guidelines and agency-specific guidance for these HHS guidelines, we found that, of three published agency guidance, two require reproducibility, or transparency for the methods used in the reports they issue to the public. Of these agencies, CDC was the only one that did not explicitly require transparency or reproducibility. The National Academies report noted that researchers have to be able to understand others’ research in order to build on it. This report also notes that the ability of qualified third parties to reproduce a model using published code is important because it can reveal mistakes in model code, which can lead to serious errors in interpretation and reported results. If researchers do not share an important aspect of their study, such as their model code, it is difficult to confirm the results of their research and ultimately produce new knowledge. One agency official acknowledged the importance of releasing model code, noting that HHS could benefit by ensuring policies across the agency are consistent regarding reproducibility and transparency in modeling. By not specifically addressing reproducibility in their policy on dissemination of scientific information, CDC risks undermining the reliability of the scientific information they disseminate to the public. Based on our review of documents and reports from agencies, as well as expert and agency interviews, we identified three categories of challenges that CDC modelers and officials and ASPR modelers faced when modeling for Ebola, Zika, and pandemic influenza, along with steps they took to address the challenges. The categories are data, resources, and communicating results. According to a 2016 report from the National Science and Technology Council (NSTC), obtaining timely and accurate data and information has long been a major challenge to an effective response during an infectious disease outbreak. One expert described reliable data as a modeler’s most limited resource. Until data of sufficient quality and quantity are available and usable, the predictive value of models will be limited. Agency modelers and officials provided examples of data-related challenges, which we categorize as follows: Data Access. Public health data, according to one expert, often has access restrictions. For example, ASPR modelers said their ability to access data during the 2014-2016 Ebola outbreak was reduced by a need to enter into agreements with data-owning countries in order to obtain patient data. Modelers said there were agreements between CDC and data owners, but further agreements would have been required for ASPR to obtain data because the agreements did not authorize CDC to share data with its partners. In addition to the example above, the lack of data sharing agreements during the 2014- 2016 Ebola outbreak response led to modeling projects being delayed, according to a CDC publication. ASPR modelers said their inability to obtain data without a data-sharing agreement made it challenging for them to developing a current, reliable estimate of Ebola incidence before modelers could start creating future estimates of disease incidence. They said that, as a result, they instead developed a statistical model, which provided less reliable estimates of future numbers of disease cases than they would have preferred. Modelers said they worked to address this challenge by obtaining data and indirect information through personal relationships with other modelers. In addition to the example provided above, CDC modelers and officials responding to Ebola described experiencing data access challenges. Data availability. Without sufficient data, models may be unable to identify an epidemic’s key drivers, which could result in misdirected intervention efforts. For example, ASPR modelers noted that during the 2015-2016 Zika outbreak response, there were substantial limits on available data, and data that were available could be unreliable and delayed. They said it was very difficult, and in many cases effectively impossible, to determine the accuracy of forecasting models for the evolving Zika outbreak. In addition, CDC officials and modelers responding to Ebola, Zika, and influenza described encountering limits on available data as an ongoing challenge. Steps that modelers said they have taken to address data availability challenges include designing models to use a minimum amount of data, building trust and communication with stakeholders who might be able to provide additional data, and updating data systems to provide all available information. According to CDC modelers, data availability will likely continue to pose a challenge to public health responses. Data collection. There is limited manpower during an infectious disease outbreak response, which can limit the health care system’s ability to collect data, according to CDC modelers and officials responding to Ebola and ASPR modelers. ASPR modelers said if a provider has to fill out a time-consuming form, then they will be delayed in treating the next patient. In order to address this challenge, CDC modelers and officials and ASPR modelers said data requesters should ask for the minimum amount of data needed. For example, CDC modelers and officials said they focus on understanding what data are essential, how they are collected, and the policy implications of reporting those data. A 2016 NSTC report recommended the federal government address this challenge by identifying questions likely to arise during an outbreak response, in order to help define and prioritize data collection and modeling goals. Data quality. Experts said creating models with low-quality data can result in inaccurate models that may not provide clear answers to decision maker questions. For example, CDC modelers and officials responding to the 2015-2016 Zika outbreak said the data quality varied, based on many factors such as surveillance systems that were doing different things and defining reporting Zika cases differently, and the availability of diagnostic testing. Because of data quality concerns, there were questions about whether modeling could be conducted, but through discussions modelers and agency officials said they were able to address challenges. To address such challenges, CDC modelers and officials responding to Zika said they worked to improve public data sharing, sent an official to the Pan- American Health Organization to help interpret data and understand the outbreak from an international perspective, and used modeling methods appropriate for data with high levels of uncertainty. In addition to the example provided above, CDC modelers and officials responding to Ebola, ASPR modelers, and experts described experiencing data quality challenges. Data integration. CDC modelers and officials responding to Ebola and Zika also faced the challenge of integrating multiple data sets, which may not be standardized or in a readily usable form. For example, CDC modelers and officials responding to Zika found it challenging to integrate data as the definition of the disease was refined over time. As the definition got more specific and monitoring systems became available, it was hard to establish data trends, these officials said. Further, there were variations in who would be tested, with all people who exhibited symptoms being tested in some areas, and only pregnant women in others, and also when data would be placed into a combined form and reported to state, national, or international officials, according to these officials. This integration issue may have complicated efforts to conduct modeling such as determining the risk of microcephaly in infants over time. In order to address this challenge, Zika modelers said they set up an online data repository to, among other things, standardize shared data. CDC modelers and officials responding to Ebola and Zika, along with experts, said finding staff with sufficient training to support modeling during an infectious disease outbreak represented an ongoing challenge. For example, CDC modelers responding to Zika said it can be difficult to find modelers with both an epidemiological background and skills in coding and mathematics. Modelers and agency officials said those who had the correct skills were in high demand, and it was difficult to fully engage them in the Zika outbreak response. They said they could have conducted more modeling or completed modeling efforts more rapidly if they had had access to more modelers with the right skills. To address this challenge, modelers participate in trainings on how to communicate what models can and cannot do, participate in working groups that support modeling efforts, employ the Intergovernmental Personnel Mobility Act Program, maintain collaborations with external partners, and host students and researchers. ASPR modelers said they faced personnel challenges in their modeling efforts but that they were wide-ranging and not specific to Ebola, Zika, or pandemic influenza. According to a 2016 NSTC report, time constraints make it challenging for researchers to keep up with scientific literature during an outbreak. CDC influenza modelers said they faced this challenge and that they conduct weekly searches for new influenza publications, which normally identify about 150 publications each week. To address this challenge, modelers said they conduct literature searches, share the responsibility of reviewing publications and informing others of their content, talk to experts, and attend conferences. Modelers said this challenge was more easily addressed than others. Communicating model results can be difficult and, as modelers and agency officials pointed out, decision makers will not give credence to results from a model they do not understand. Model results, according to CDC influenza modelers, are often nuanced and complicated, and officials have to think about what pieces of information are the most important to convey to a decision maker, the public, or health officials. Furthermore, as one expert noted, the complexities of modeling can get lost in translation, especially with the media, which may focus on only a worst-case scenario. When modeling for infectious diseases, appropriately communicating complex information has been described as a constant challenge, and CDC influenza modelers described it as their biggest challenge. CDC influenza modelers particularly noted the challenge of communicating uncertainty. CDC influenza and ASPR modelers said if decision makers did not understand the models, they could misunderstand the results, which, according to ASPR modelers, could lead to errors in decision making. CDC modelers and officials responding to Ebola and Zika, CDC influenza modelers, ASPR modelers, and experts described experiencing challenges communicating model results to decision makers. Clear communication may help prevent misunderstandings. For example, one review article said officials may not understand what models can and cannot do before an epidemic, and modelers may not be fully aware of a decision maker’s needs. An expert said there is a need to constrain the use of models intended to inform decisions so that the model does not over- or under-influence a decision maker. And, according to ASPR modelers, decision makers sometimes want a model to make a decision for them, although models can only inform the decision making process. They said this is less of a problem during an outbreak response, when decision makers know they have to act based on incomplete information. Some steps officials described taking to address communication challenges were similar across CDC and ASPR officials. For example, CDC modelers and officials and ASPR modelers said they took steps to improve communication, such as working to develop relationships outside of an outbreak and to improve how data are visualized. For example, ASPR modelers and officials said they provided decision makers with a website that displays an interactive influenza model known as ShinyFlu. The website lets users adjust a model to see how its results could change based on its inputs used. However, modelers said this only works if the decision maker is willing to engage with data. Other steps to address communication challenges were not discussed by all modelers we spoke to. For example, ASPR modelers said that, when they use models with high uncertainty, they do additional research to assess and communicate how a model could be misrepresenting a real- world problem. Additionally, CDC modelers responding to Zika and CDC influenza modelers said they sometimes use the language of weather forecasting—which provides information on the risk of an event occurring over a specified period of time—to help communicate model outcomes. For all 10 of the models we reviewed, modelers communicated all the information they had agreed to provide to decision makers, including information about model uncertainty. Agency modelers and officials said they provided this information through discussions with decision makers and by showing decision makers the results of multiple modeling situations to convey uncertainty. Infectious disease modeling is one tool that can provide decision makers with valuable information to support outbreak preparedness and response. In particular, modeling can help answer questions that are difficult to address in other ways because of practical, ethical, or financial reasons. Federal agencies have recognized the importance of modeling. CDC and ASPR reported using it to inform policy and planning questions and, to a more limited extent, to inform planning and the use of resources. HHS agencies that work on infectious disease modeling—ASPR, CDC, FDA, and NIH—reported using multiple mechanisms to coordinate their modeling efforts, including working groups, memoranda of understanding, and coordination with academic and other external modelers. The use of these mechanisms was consistent with many leading collaboration practices, such as defining and articulating a common outcome and addressing needs by leveraging resources. However, HHS does not routinely monitor and evaluate its coordination efforts, as called for by another leading collaboration practice, which limits the department’s ability to identify areas for improvement. Further, there is the potential for overlap and duplication of modeling efforts across agencies, which may not be identified if coordination efforts are not effectively being monitored, and could lead to inefficiencies. By holding progress reviews in which CDC and ASPR evaluate and report on coordination efforts for infectious disease modeling, these agencies could be better positioned to identify and address challenges prior to infectious disease outbreaks, which could lead to improved response efforts. CDC and ASPR modelers generally followed GAO-identified modeling practices, with the notable exception of model verification. Specifically, CDC did not make model code available to others for four of the seven CDC models we reviewed. HHS does not have a policy that requires its agencies to share model code, but it does require its component agencies to either follow its guidelines or ensure that their own guidelines include a high degree of transparency to facilitate reproducibility by qualified third parties. Without sharing code and other important information, CDC cannot ensure that its models are reproducible, a key characteristic of reliable, high-quality scientific research. In order to facilitate HHS infectious disease modeling efforts, we are making two recommendations. The Secretary of Health and Human Services should develop a mechanism to routinely monitor, evaluate, and report on coordination efforts for infectious disease modeling across multiple agencies. (Recommendation 1) The Secretary of Health and Human Services should direct CDC to establish guidelines that ensure full reproducibility of CDC’s research by sharing with the public all permissible and appropriate information needed to reproduce research results, including, but not limited to, model code. (Recommendation 2) We provided a draft of this report to the Department of Health and Human Services (HHS) for review and comment. In its comments, reproduced in appendix IV, HHS agreed with our recommendations and noted that it was developing a process to coordinate its infectious disease modeling efforts across its components. With regard to our second recommendation—that HHS should direct CDC to establish guidelines that ensure the full reproducibility of CDC’s research by sharing all permissible and appropriate information needed to reproduce research results, including, but not limited to, model code— HHS’s comments indicated that CDC believes it has already completed actions to implement this recommendation. For example, the HHS comments state that CDC has established policies such as “Public Access to CDC Funded Publications” and “Policy on Public Health Research and Nonresearch Data Management and Access” that ensure that results are made available to the public, as appropriate. However, as we state in our report, these policies do not contain any reference to reproducibility, models, or provision of model code and therefore do not fully address our recommendation. CDC also said in the HHS comments that its methods—including its practice of providing a copy of model code upon request—are in line with standard practice in the scientific community and peer- reviewed journals. However, in the four instances we identified where CDC modelers did not share code, code being available upon request was only one of the reasons cited. Further, this practice is inconsistent with those of the other HHS agencies we reviewed, and may limit the ability of external researchers to confirm the results of CDC’s research and ultimately produce new knowledge. As noted in our report, by not specifically addressing reproducibility in its policies on access to data and publications, CDC risks undermining the reliability of scientific information disseminated to the public. Therefore, we did not change our recommendation in response to HHS’s comments. We did, however, revise our report to include information on other HHS agency policies related to reproducibility. HHS also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, and to other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you are your staff have questions about this report, please contact Timothy M. Persons, Chief Scientist, at (202) 512-6888 or personst@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix V. In conducting our review of infectious disease modeling by the Department of Health and Human Services (HHS) agencies, our objectives were to (1) examine the extent to which HHS has used various types of models to inform policy, planning, and resource allocation for public health decisions for selected infectious diseases, (2) examine the extent to which HHS coordinated their modeling efforts for selected infectious diseases, (3) examine the steps HHS generally took to develop and assess the performance of its models for the selected diseases and steps it applied to a selection of infectious disease models, and (4) describe the extent to which HHS has addressed challenges related to modeling for selected infectious diseases. For purposes of this review, we focused on HHS because of its focus on scientific and technical issues related to disease modeling, role in infectious disease outbreak preparedness and response activities, and use of modeling for policy and regulatory issues related to disease. Within HHS, we identified four agencies—HHS’s Office of the Assistant Secretary for Preparedness and Response (ASPR), the Centers for Disease Control and Prevention (CDC), National Institutes of Health (NIH), and Food and Drug Administration (FDA)—which may develop or use infectious disease models. To inform all four objectives, we selected three naturally-occurring infectious diseases that have pandemic or epidemic potential—Ebola virus disease (Ebola), Zika virus disease (Zika), and pandemic influenza—to use as examples of broader infectious disease modeling efforts. We selected these diseases based on document review, their inclusion on NIH’s pathogen priority list, modeling being conducted by HHS agencies, and interviews with experts that we selected based on their experience with infectious disease. Based on these steps, the team selected diseases that fit into one of the three categories on NIH’s pathogen priority list: the disease (1) can be transmitted easily from person to person, resulted in a high mortality rate and had the potential for major public health impact, might cause social disruption, and may require special action for public health preparedness (Ebola), (2) was moderately easy to disseminate, and required specific enhancements for diagnostic capacity and enhanced disease surveillance (Zika), or (3) was an emerging pathogen that could be engineered for mass dissemination in the future because of availability, ease of production and dissemination, and have the potential for high morbidity and mortality rates and major health impacts (pandemic influenza). To examine the types of models developed by HHS agencies to inform policy, planning, and resource allocation decisions, we reviewed documents from 2009—the year of the last pandemic influenza outbreak in the United States—to April 2019 to identify examples of models developed by the agencies for the three selected diseases. For context on and examples of the types of modeling that CDC and ASPR have conducted, we reviewed published articles that CDC and ASPR officials and experts provided to us or cited during the course of our review, such as articles identified during interviews which we later obtained. We also obtained selected internal memoranda, when available, that described models used in the Ebola virus outbreak. We did not include FDA and NIH in this review because FDA has a limited role in modeling, and NIH generally funds, rather than conducts, modeling. This review yielded articles and memoranda describing about 60 CDC and ASPR models. See appendix II for a bibliography of model publications reviewed. We then categorized the models using categories derived from a federal working group report to characterize the types of modeling conducted and the purpose of the modeling, when that purpose was identified. To analyze each study, one analyst initially coded each study, and each classification was then independently reviewed to verify that it had been correctly classified and to resolve any categorization discrepancies. We used these categories to describe types of modeling efforts undertaken by HHS agencies. Because we focused on studies published between 2009 and 2019, our findings are not generalizable to models that were developed outside of that time period. Additionally, because we relied on agency officials or reviews of relevant agency documents and publications to identify studies, we may not have captured all studies relevant to our scope. Further, because CDC and ASPR modelers and officials said that they do not publish every model they conduct, our review was not intended to develop an inventory of the modeling conducted during the time period. Therefore, we were unable to determine the extent to which the models we identified represented agency modeling efforts as a whole. To describe the extent of model use for public health decision making, we interviewed officials from HHS agencies identified as decision makers for conducting the response to these selected diseases—CDC, ASPR, and FDA—and officials who conducted the modeling. We also interviewed two NIH institutes and one center about funding for research related to modeling for the selected diseases. Additionally, we conducted semi- structured interviews of officials from five states concerning their use of models prepared by HHS agencies for decision making, among other topics. We selected these states based on a review of a CDC draft report on states’ use of CDC models, on the level of influenza activity experienced by states, and consideration of geographic variation by U.S. region. During our review, we sought to identify the common types of decisions that could be informed by models, as well as the considerations that could impact the extent to which a decision maker requests and uses models for specific types of decisions. Based on interviews with agency officials and our review of HHS models we identified examples of models that were used to make specific decisions during response and non- response times. Because we relied on officials to describe the extent to which models inform decision making, we may not have captured all relevant instances when models for the selected infectious diseases informed decision makers. To examine coordination and collaboration across HHS agencies, we reviewed documents describing HHS agencies’ collaboration and coordination mechanisms such as Memoranda of Understanding, descriptions of Emergency Operations Center procedures, and after- action reports following infectious disease outbreaks. We also conducted interviews with and requested information from HHS officials, asking them to provide information on their efforts to coordinate their infectious disease modeling activities. In this report, and in our past work, we define coordination broadly as any joint activity that is intended to produce more public value than could be produced when organizations act alone. We compared these actions to relevant selected collaboration leading practices: define and articulate a common outcome; establish mutually reinforcing or joint strategies; identify and address needs by leveraging resources; agree on roles and responsibilities; establish compatible policies, procedures, and other means to operate across agency boundaries; and develop mechanisms to monitor, evaluate, and report on results. Because we judgmentally selected a group of experts and diseases, the results of our review cannot be generalized to HHS coordination efforts for other infectious diseases. However, our assessment of collaboration and coordination activities did cover modeling efforts for the three selected diseases. To identify steps that are generally considered when modelers develop infectious disease models and assess their performance, we conducted semi-structured interviews with relevant experts from academia and other organizations and CDC and ASPR officials, and reviewed literature identified by experts. We used a snowball sampling approach to identify relevant experts and groups. We initially identified five infectious disease modeling experts through informal conversation with individuals working in the field, infectious disease modeling experts known through GAO work, as well as a review of websites, publications, and grants funded by NIH. Using a snowball sampling approach, we reviewed key literature related to the steps generally taken to develop models and assess their performance, consulted with infectious disease modeling experts, and interviewed agency officials to identify relevant groups, as well as individual experts, who could convey to us the steps generally taken during infectious disease modeling. Through literature searches, the team identified literature from public health journals or other major sources. The team applied personal background and knowledge in public health, infectious disease modeling, and statistics to help identify key sources. For the selected literature, we reviewed references and used a snowball approach to identify further relevant studies. Finally, we reviewed CDC guidance on decision making for data access and long-term preservation as it related to documentation standards. Based on our review of identified literature, we developed a data collection instrument to assess the extent to which CDC and ASPR used the steps for infectious disease model development identified by experts and in the literature. Through this data collection instrument, we gathered information about the elements of developing and assessing model performance and the steps that could be taken within each element. In order to develop the data collection instrument, based on our review of literature, we mapped out steps to develop and assess model performance, and developed broad categories of assessment elements. Within each assessment element, we included steps modelers could take as a part of each assessment element. For example, the data collection instrument included items that recorded model verification steps that might have been taken by modeler(s) within the broader model verification element. The instrument was reviewed by internal stakeholders, who provided feedback on its content. Prior to sending the data collection instrument to the agency, we filled in information on verification steps taken for each of the 10 selected models, based on provided model documentation to reflect steps we determined modelers took as a part of the model development and assessment process. In order to provide officials with this information, two analysts reviewed each model’s documentation, with one analyst providing an initial coding of the model and the other reviewing and verifying the first analyst’s findings. This method was first tested on one of the 10 selected models by two analysts independently coding information from the model’s documentation into the data collection instrument and then reviewing coding choices to reconcile any differences found. We then sent the instruments with filled-in information to CDC and ASPR modelers to receive their feedback concerning the steps taken to develop models and assess their performance, provide any missing information, and resolve any ambiguities. See Appendix III for a list of the 10 selected models reviewed and steps to develop and assess model performance included in the data collection instrument. The data collection instrument was intended to record whether a specific step had been taken, but did not assess the quality of the modeling steps. In order to determine steps CDC and ASPR took to develop and assess its models, we selected a non-generalizable sample of 10 models for review in our data collection instrument that demonstrated steps that HHS agencies took to develop models and assess their performance. The model selection process described above informed our selection of infectious disease models. To be selected for inclusion in our non- generalizable sample, the model had to be (1) developed by CDC, or ASPR officials or contractors; (2) developed to answer a question about Ebola, Zika, or pandemic influenza; and (3) used to inform public health decision makers during an outbreak or for preparedness activities. We selected 10 models that differed in form and answered different types of questions, which included studies prepared during both outbreak preparedness and response times, and covered topics such as the impact of vaccination programs on deaths and hospitalization. For Ebola and Zika, we focused on review of selected papers or memos produced since 2014 in order to capture the time period following the 2014-2016 Ebola and 2015-2016 Zika outbreaks. For pandemic influenza, we focused on papers and memos produced since 2009, when the H1N1 pandemic occurred in the United States. Because we selected from a group of models identified by HHS modelers and officials for Ebola, Zika, and pandemic influenza, the results of our review cannot be generalized to other diseases outside of the scope of this report. Furthermore, we requested models that informed public health decision making, and did not consider models that were not used for this purpose. Because we reviewed a non-generalizable sample of 10 models, the results of our review cannot be generalized to a larger population of models prepared by HHS agencies. To identify challenges associated with modeling for the selected infectious diseases, we reviewed documents and reports to identify modeling challenges and steps to address those challenges, and interviewed agency officials and modelers, and experts identified through the previously-described snowball sampling methodology. We used semi- structured interview protocols that included open-ended questions about challenges associated with infectious disease modeling and limitations associated with model development. Not all officials and experts we interviewed provided comments on every challenge or limitation. In addition, because we judgmentally selected a group of experts and diseases, the results of our review cannot be generalized to all infectious disease modeling efforts. We conducted this performance audit from May 2018 to May 2020, in accordance with generally accepted government auditing standards. These standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Carias, Cristina, et al. “Preventive Malaria Treatment for Contacts of Patients with Ebola Virus Disease in the Context of the West Africa 2014- 15 Ebola Virus Disease Response: An Economic Analysis.” The Lancet Infectious Diseases, vol. 16, no. 4 (April 2016): pp. 449-458. Christie, Athalia, et al. “Possible Sexual Transmission of Ebola Virus— Liberia, 2015.” Morbidity and Mortality Weekly Report, vol. 64, no. 17 (May 8, 2015): pp. 479-481. Martin I. Meltzer, et al. “Estimating the Future Number of Cases in the Ebola Epidemic - Liberia and Sierra Leone, 2014-2015.” Morbidity and Mortality Weekly Report, vol. 63, no. 3 suppl. (September 26, 2014): pp. 1-14. Meltzer, Martin I., et al. “Modeling in Real Time during the Ebola Response.” Morbidity and Mortality Weekly Report, vol. 65, no. 3 suppl. (July 8, 2016): pp. 85-89. Rainisch, Gabriel, et al. “Estimating Ebola Treatment Needs, United States.” Emerging Infectious Diseases, vol. 21, no. 7 (July 2015): pp. 1273-1275. Rainisch, Gabriel, et al. “Regional Spread of Ebola Virus, West Africa, 2014.” Emerging Infectious Diseases, vol. 21, no. 3 (March 2015): pp. 444-447. Undurraga, Eduardo A., Cristina Carias, Martin I. Meltzer, Emily B. Kahn. “Potential for Broad-Scale Transmission of Ebola Virus Disease during the West Africa Crisis: Lessons for the Global Health Security Agenda.” Infectious Diseases of Poverty, vol. 6, no. 159 (2017). Washington, Michael L., Martin I. Meltzer. “Effectiveness of Ebola Treatment Units and Community Care Centers Liberia, September 23- October 31, 2014.” Morbidity and Mortality Weekly Report, vol. 64, no. 3 (January 30, 2015): pp. 67-69. Adamski, Alys, et al. “Estimating the Numbers of Pregnant Women Infected with Zika Virus and Infants with Congenital Microcephaly in Colombia, 2015–2017.” Journal of Infection, vol. 76 (2018): pp. 529-535. Dirlikov, Emilio, et al. “Guillain-Barré Syndrome and Healthcare Needs during Zika Virus Transmission, Puerto Rico, 2016.” Emerging Infectious Diseases, vol. 23, no. 1 (January 2017): pp.134-136. Ellington, Sascha R., et al. “Estimating the Number of Pregnant Women Infected With Zika Virus and Expected Infants With Microcephaly Following the Zika Virus Outbreak in Puerto Rico, 2016.” JAMA Pediatrics, vol. 170, no. 10 (2016): pp. 940-945. Grills, Ardath, et al. “Projected Zika Virus Importation and Subsequent Ongoing Transmission after Travel to the 2016 Olympic and Paralympic Games—Country-Specific Assessment, July 2016.” Morbidity and Mortality Weekly Report, vol. 65, no. 28 (July 22, 2016): pp.711-715. Johansson, Michael A., et al. “Zika and the Risk of Microcephaly.” The New England Journal of Medicine, vol. 375 (July 7, 2016): pp.1-4. Johnson, Tammi L., et al. “Modeling the Environmental Suitability for Aedes (Stegomyia) aegypti and Aedes (Stegomyia) albopictus (Diptera: Culicidae) in the Contiguous United States.” Journal of Medical Entomology, vol. 54, no. 6 (November 7, 2017): pp. 1605-1614. Mitchell, Patrick K. et al., “Reassessing Serosurvey-Based Estimates of the Symptomatic Proportion of Zika Virus Infections.” American Journal of Epidemiology, vol. 188, no. 1 (January 2019): pp. 206-213. Mier-y-Teran-Romero, Luis, Mark J. Delorey, James J. Sejvar, Michael A. Johansson. “Guillain-Barré Syndrome Risk Among Individuals Infected with Zika Virus: a Multi-Country Assessment.” BMC Medicine, vol. 16, no. 67 (2018). Mier-y-Teran-Romero, Luis, Andrew J. Tatem, Michael A. Johansson. “Mosquitoes on a Plane: Disinsection Will Not Stop the Spread of Vector- Borne Pathogens, a Simulation Study.” PLoS Neglected Tropical Diseases, vol. 11, no. 7 (July 3, 2017). Reefhuis, Jennita, et al. “Projecting Month of Birth for At-Risk Infants after Zika Virus Disease Outbreaks.” Emerging Infectious Diseases, vol. 22, no. 5 (May 2016): pp. 828-832. Russell, Steven, et al. “Detecting Local Zika Virus Transmission in the Continental United States: A Comparison of Surveillance Strategies.” PLoS Currents Outbreaks (November 22, 2017). Watts. Alexander G., et al. “Elevation as a Proxy for Mosquito-Borne Zika Virus Transmission in the Americas.” PLoS ONE, vol. 12, no. 5 (May 24, 2017). Atkins, Charisma Y., et al. “Estimating Effect of Antiviral Drug Use during Pandemic (H1N1) 2009 Outbreak, United States.” Emerging Infectious Diseases, vol. 17. no. 9 (September 2011): pp. 1591-1598. Biggerstaff, Matthew, et al. “Estimates of the Number of Human Infections With Influenza A(H3N2) Variant Virus, United States, August 2011–April 2012.” Clinical Infectious Diseases, vol. 57, suppl. 1 (2013): pp. S12-S15. Biggerstaff, Matthew, et al. “Estimating the Potential Effects of a Vaccine Program Against an Emerging Influenza Pandemic—United States.” Clinical Infectious Diseases, vol. 60, suppl. 1 (2015): pp. S20-S29. Carias, Cristina, et al. “Potential Demand for Respirators and Surgical Masks during a Hypothetical Influenza Pandemic in the United States.” Clinical Infectious Diseases, vol. 60, suppl. 1 (2015): pp. S42-S51. Cauchemez, Simon, et al. “Role of Social Networks in Shaping Disease Transmission during a Community Outbreak of 2009 H1N1 Pandemic Influenza.” Proceedings of the National Academy of Sciences of the United States, vol. 108, no. 7 (February 15, 2011): pp. 2825-2830. Dawood, Fatimah S., et al. “Estimated Global Mortality Associated with the First 12 Months of 2009 Pandemic Influenza A H1N1 Virus Circulation: a Modelling Study.” The Lancet Infectious Diseases, vol. 12 (September 2012): pp. 687-695. Fung, Isaac Chun-Hai, et al. “Modeling the Effect of School Closures in a Pandemic Scenario: Exploring Two Different Contact Matrices.” Clinical Infectious Diseases, vol. 60, suppl. 1 (2015): pp. S58-S63. Iuliano, A. Danielle, et al. “Estimates of Global Seasonal Influenza- Associated Respiratory Mortality: a Modelling Study.” The Lancet, vol. 391, no. 10127 (March 31, 2018): pp. 1285-1300. Jain, Seema, et al. “Hospitalized Patients with 2009 H1N1 Influenza in the United States, April–June 2009.” The New England Journal of Medicine, vol. 361, no. 20 (November 12, 2009): pp. 1935-1944. Kostova, Deliana, et al. “Influenza Illness and Hospitalizations Averted by Influenza Vaccination in the United States, 2005–2011.” PLoS ONE, vol. 8, no. 6 (June 19, 2013). Lafond, Kathryn E., et al. “Global Role and Burden of Influenza in Pediatric Respiratory Hospitalizations, 1982–2012: A Systematic Analysis.” PLoS Medicine, vol. 13, no. 3 (March 24, 2016). Meltzer, Martin I., Nancy J. Cox, Keiji Fukuda. “The Economic Impact of Pandemic Influenza in the United States: Priorities for Intervention.” Emerging Infectious Diseases, vol. 5, no. 5 (September-October 1999): pp. 659-671. Meltzer, Martin I., et al. “Estimates of the Demand for Mechanical Ventilation in the United States during an Influenza Pandemic.” Clinical Infectious Diseases, vol. 60, suppl. 1 (2015): pp. S52-S57. O’Hagan, Justin J., et al. “Estimating the United States Demand for Influenza Antivirals and the Effect on Severe Influenza Disease during a Potential Pandemic.” Clinical Infectious Diseases, vol. 60, suppl. 1 (2015): pp. S30-S41. Presanis, Anne M., et al. “The Severity of Pandemic H1N1 Influenza in the United States, from April to July 2009: A Bayesian Analysis.” PLoS Medicine, vol. 6, no. 12 (December 8, 2009). Reed, Carrie, et al. “Estimates of the Prevalence of Pandemic (H1N1) 2009, United States, April-July 2009.” Emerging Infectious Diseases, vol. 15, no. 12 (December 2009): pp. 2004-2007. Reed, Carrie, Martin I. Meltzer, Lyn Finelli, Anthony Fiore. “Public Health Impact of Including Two Lineages of Influenza B in a Quadrivalent Seasonal Influenza Vaccine.” Vaccine, vol. 30 (2012): pp. 1993-1998. Reed, Carrie, et al. “Estimating Influenza Disease Burden from Population-Based Surveillance Data in the United States.” PLoS ONE, vol. 10, no. 3 (March 4, 2015). Rolfes, Melissa A., et al. “Annual Estimates of the Burden of Seasonal Influenza in the United States: A Tool for Strengthening Influenza Surveillance and Preparedness.” Influenza and Other Respiratory Viruses, vol. 12 (2018): pp. 132-137. Russell, K., et al. “Utility of State-Level Influenza Disease Burden and Severity Estimates to Investigate an Apparent Increase in Reported Severe Cases of Influenza A(H1N1) pdm09 – Arizona, 2015–2016.” Epidemiology and Infection, vol. 146 (June 14, 2018): pp. 1359-1365. Shrestha, Sundar S., et al. “Estimating the Burden of 2009 Pandemic Influenza A (H1N1) in the United States (April 2009–April 2010).” Clinical Infectious Diseases, vol. 52, suppl. 1 (2011): pp. S75-S82. Tokars, Jerome I., Melissa A. Rolfes, Ivo M. Foppa, Carrie Reed. “An Evaluation and Update of Methods for Estimating the Number of Influenza Cases Averted by Vaccination in the United States.” Vaccine, vol. 36 (2018): pp. 7331-7337. Appendix III: Ten Selected Infectious Disease Models and Questions from Data Collection Instrument Document describing model Meltzer, Martin I., Charisma Y. Atkins, Scott Santibanez, Barbara Knust, Brett W. Petersen, Elizabeth D. Ervin, Stuart T. Nichol, Inger K. Damon, Michael L. Washington. Estimating the Future Number of Cases in the Ebola Epidemic–Liberia and Sierra Leone, 2014-2015, MMWR. Volume 63, Number 3, September 26, 2014. Rainisch, Gabriel, Manjunath Shankar, Michael Wellman, Toby Merlin, and Martin I. Meltzer. Regional Spread of Ebola Virus, West Africa, 2014. Emerging Infectious Diseases. Volume 21, Number 3, March 2015. Asher, Jason. Forecasting Ebola with a Regression Transmission Model. Epidemics. Volume 22, 2018. Ellington, Sascha R., Owen Devine, Jeanne Bertolli, Alma Martinez Quiñones, Carrie K. Shapiro-Mendoza, Janice Perez-Padilla, Brenda Rivera-Garcia, Regina M. Simeone, Denise J. Jamieson, Miguel Valencia-Prado, Suzanne M. Gilboa, Margaret A. Honein, Michael A. Johansson. Estimating the Number of Pregnant Women Infected With Zika Virus and Expected Infants With Microcephaly Following the Zika Virus Outbreak in Puerto Rico, 2016. JAMA Pediatrics. Volume 170, Number 10, October 2016. Johansson, Michael A., Luis Mier-y‐Teran-Romero, Jennita Reefhuis, Suzanne M. Gilboa, and Susan L. Hills. Zika and the Risk of Microcephaly. New England Journal of Medicine. Volume 375, Number 1, July 7, 2016. Dirlikov, Emilio, Krista Kniss, Chelsea Major, Dana Thomas, Cesar A. Virgen, Marrielle Mayshack, Jason Asher, Luis Mier-y-Teran-Romero, Jorge L. Salinas, Daniel M. Pastula, Tyler M. Sharp, James Sejvar, Michael A. Johansson, Brenda Rivera-Garcia. Guillain-Barré Syndrome and Healthcare Needs during Zika Virus Transmission, Puerto Rico, 2016. Emerging Infectious Diseases. Volume 23, Number 1, January 2017. Biggerstaff, Matthew, Carrie Reed, David L. Swerdlow, Manoj Gambhir, Samuel Graitcer, Lyn Finelli, Rebekah H. Borse, Sonja A. Rasmussen, Martin I. Meltzer, Carolyn B. Bridges. Estimating the Potential Effects of a Vaccine Program against an Emerging Influenza Pandemic—United States, Clinical Infectious Diseases. Volume 60, Issue Supplement 1, 2015. Carias, Cristina, Gabriel Rainisch, Manjunath Shankar, Bishwa B. Adhikari, David L. Swerdlow, William A. Bower, Satish K. Pillai, Martin I. Meltzer, Lisa M. Koonin. Potential Demand for Respirators and Surgical Masks during a Hypothetical Influenza Pandemic in the United States. Clinical Infectious Disease. Volume 60, Issue Supplement 1, 2015. Reed, Carrie, Frederick J. Angulo, David L. Swerdlow, Marc Lipsitch, Martin I. Meltzer, Daniel Jernigan, and Lyn Finelli. Estimates of the Prevalence of Pandemic (H1N1) 2009, United States, April–July 2009, Emerging Infectious Diseases. Volume 15, Number 12, December 2009. Asher, Jason, Matthew Clay. Deterministic compartmental models for influenza with mitigations. R: “flumodels” package. Version: 1.0.7, April 24, 2017. Purpose: The Government Accountability Office has been asked by the Congress to review the Department of Health and Human Services’ agency efforts to model infectious disease. As part of our methodology, we selected and reviewed published papers and internal memoranda from the sources provided to us. We reviewed these sources to describe the steps taken to describe, verify, validate, and communicate results of these modeling efforts. The purpose of this inquiry is to provide the authors of the selected papers the opportunity to confirm, clarify, or provide additional information in the table below. Instructions: In the table below, we have two sets of columns: one set indicating GAO’s assessment of whether the document contained information about a step being taken. The second set of columns is for the authors of the selected paper to fill out. If you agree with information in the GAO columns, please indicate your concurrence in the Reviewer Comments column. Otherwise, please provide information accordingly. If a step is marked “Step taken” please review the entries we have made in the GAO Reviewer Comments column for accuracy and completeness and indicate your concurrence in the Reviewer Comments column. Please also provide additional supporting documentation if available. For any steps that were taken, but where we indicated either “not taken” or “not enough information to determine” in our review, please provide a description of the actual steps and any documentation you may have. If a step was not taken, please provide an indication as to why that step was not taken and, if possible, please provide supporting documentation. For example, if limited data availability impacted the ability to conduct a model validation step(s), then please include this information in the appropriate table cells. 10 Independent expert (internal or external) review of key programming 11 Debugging tests and checks for coding accuracy 12 Model’s code or Excel spreadsheet is available 13 Test model assumptions (i.e. confirming model assumptions are reasonable and appropriate for question), for example: Distributional assumptions about model residuals Form of the model 14 Model handling of input data/parameters is verified as correct (i.e. as intended by developers) 16 Sensitivity analysis (assessing impact of assumption/parameter uncertainty on output or model form) 17 Cross validation or between model comparisons: Compare results to other models that address the same problem 18 External validation: Compare model results to actual event data 19 Predictive validation: Compare model predictions for future events to actual outcomes. 21 Modelers supply customer with agreed upon information, which may vary depending on the model 22 Modeler provides customer with clear information on uncertainty in model results, such as inclusion of standard errors or confidence intervals, or qualitative explanations of uncertainty in the model results Assessment Steps Question: Do you think that the assessment elements identified in the table above sufficiently reflect the steps that should generally be taken to develop and assess the performance of models? Would you remove any steps, add any steps, or make any other adjustments to these steps in order to consider them best practices in assessing performance of models, generally? Please explain. In addition to the contact named above, the following individuals made contributions to this report: Sushil Sharma (Assistant Director), Charlotte E. Hinkle (Analyst-in-Charge), Sam Amrhein, Breanne Cave, Jehan Chase, Carol A. Gotway Crawford, Justin Cubilo, Karen Doran, Nancy Fasciano, Douglas G. Hunker, Dennis Mayo, Anika McMillon, Sarah Resavy, Edward Rice, Ben Shouse, Amber Sinclair, Walter Vance, Sarah Veale, and Richard Zarrella.", "summary": "Outbreaks of infectious diseases—such as Ebola, Zika, and pandemic influenza—have raised concerns from Congress about how federal agencies use modeling to, among other things, predict disease distribution and potential impacts. In general, a model is a representation of reality expressed through mathematical or logical relationships. Models of infectious diseases can help decision makers set policies for disease control and may help to allocate resources. GAO was asked to review federal modeling for selected infectious diseases. This report examines (1) the extent to which HHS used models to inform policy, planning, and resource allocation for public health decisions; (2) the extent to which HHS coordinated modeling efforts; (3) steps HHS generally takes to assess model development and performance; and (4) the extent to which HHS has addressed challenges related to modeling. GAO reviewed documents and interviewed HHS officials, state officials, and subject matter experts. GAO identified practices commonly used to assess infectious disease model performance and reviewed 10 selected modeling efforts to see if they followed these practices. Within the Department of Health and Human Services (HHS), the Centers for Disease Control and Prevention (CDC) and the Office of the Assistant Secretary for Preparedness and Response (ASPR) used models to inform decision-making during and after outbreaks of Ebola, Zika, and pandemic influenza. These agencies' modeling efforts informed public health planning, outbreak response, and, to a limited extent, resource allocation. Four CDC centers perform modeling. HHS agencies reported using multiple mechanisms to coordinate modeling efforts across agencies, but they do not routinely monitor, evaluate, or report on the extent and success of coordination. Consequently, they risk missing opportunities to identify and address modeling challenges—such as communicating clearly, and obtaining adequate data and resources—before and during an outbreak. As a result, agencies may be limiting their ability to identify improvements in those and other areas. Further, there is potential for overlap and duplication of cross-agency modeling efforts, which could lead to inefficiencies. CDC and ASPR generally developed and assessed their models in accordance with four steps GAO identified as commonly-recognized modeling practices: (1) communication between modeler and decision maker, (2) model description, (3) verification, and (4) validation. However, for four of the 10 models reviewed, CDC did not provide all details needed to reproduce model results, a key step that lets other scientists confirm those results. GAO found that CDC's guidelines and policy do not address reproducibility of models or their code. This is inconsistent with HHS guidelines and may jeopardize the reliability of CDC's research. This report also identifies several modeling-related challenges, along with steps agencies have taken to address them. GAO recommends that HHS (1) develop a way to routinely monitor, evaluate, and report on modeling coordination efforts across multiple agencies and (2) direct CDC to establish guidelines to ensure full reproducibility of its models. HHS agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "U.S. international trade agreements that cover USG procurement include the GPA and bilateral and regional FTAs. The revised GPA has 20 parties (including the EU) covering 48 WTO member countries (including the 28 EU member countries). Another 33 WTO members are observers; of these, 10 are in the process of acceding to the agreement. In addition to the GPA, the United States has 14 FTAs with 20 countries, four of which (Canada, Israel, Singapore, and South Korea) are also parties to the GPA. Almost all of the FTAs to which the United States is a party include provisions covering government procurement. The GPA aims to mutually open government procurement markets for goods, services, and construction services among its parties, according to the WTO. Under the GPA, foreign suppliers are able to compete alongside with U.S. suppliers for USG contracts covered by the agreement, and U.S. suppliers are able to compete for covered foreign government contracts in accordance with the framework established by the GPA. According to the office of the United States Trade Representative (USTR), to implement U.S. obligations under the international agreements that cover government procurement, the United States—generally (and not always) — waives preferential purchasing requirements for goods and suppliers from other countries that are parties to the agreements in covered procurements over a certain threshold. For example, USTR has waived the Buy American Act and other preferential provisions for eligible products in acquisitions covered by various trade agreements. However, Commerce officials noted that small business set-aside requirements are not waived nor are the provisions of the Berry Amendment. As part of our body of work on international government procurement, we have previously reported the following: The U.S. and EU government procurement markets are comparable in size, and each is larger than those of all other GPA and U.S. FTA partner countries combined. Some other parties to the agreements also have large government procurement markets, including Japan, South Korea, Canada, Mexico, and Norway. The government procurement chapters of the GPA and selected U.S. FTAs that we reviewed generally have similarities in text and commitments, possibly because key parties negotiated multiple agreements concurrently. However, the revised GPA generally provides more comprehensive market access than the selected FTAs we reviewed. The United States reported opening more procurement opportunities covered by the GPA to foreign firms than had other parties to the agreement. Data for 2010 showed that the United States reported $837 billion in GPA covered procurement. This amount is about twice as large as the approximately $381 billion reported by the next five largest GPA parties combined—the EU, Japan, South Korea, Norway, and Canada—even though total U.S. procurement is less than that of the other five parties combined. Previously, we reported on the opportunities available to U.S. and foreign firms seeking to compete for covered government procurement contracts in the countries that are parties to the agreements. In the current report, we analyze the value and number of actual contract awards, reported in procurement databases, including contracts covered under the GPA and NAFTA and those not covered. Covered contracts can be awarded to domestic firms, to firms from countries that are parties to the GPA and U.S. FTAs, or to other non-U.S. firms. Additionally, the Buy American Act does not apply to products that are purchased for use outside the United States, nor to the acquisition of services. Therefore, such contracts can be awarded without the application of Buy American Act domestic preference conditions to bids from any firm, including firms from non-GPA and non-FTA countries. To estimate foreign source procurement, we looked for information about where the goods and services that governments purchase are produced and the characteristics of the firms supplying those goods and services. We identified two types of primary data sources that could be analyzed to estimate foreign sourcing in government procurement: (1) government procurement databases to estimate direct cross-border central government procurement and (2) input-output tables merged with international trade data to estimate total procurement by all levels of government and the portion comprising imported goods and services. Government procurement databases collect information on contracts awarded by government entities to firms supplying goods and services. Except for Japan, all the countries in our analysis maintain online government procurement databases that can serve as a primary data source to generate statistics on their foreign source central government procurement. The USG and the other six main parties to the GPA and NAFTA use these databases to report to the WTO their required procurement statistics under the GPA. While Japan does not have a government procurement database, Japan’s central government collects procurement data from various ministry sources and reports the aggregated data to the WTO. As table 1 shows, the U.S. Federal Procurement Data System-Next Generation (FPDS-NG) provides more data fields that can be used as proxies for measuring foreign source procurement than the non-U.S. databases provide. FPDS-NG contains data on four potential proxy measures of foreign sourcing—firm location, firm ownership, product and service origin, and place of performance. The database for the EU and Norway and the databases for Canada and Mexico all contain contract award data related to firm location. South Korea’s database and Japan’s WTO submission on its 2013 procurement contain data on source country of goods and services. Therefore, two data fields, one reflecting firm location and the other reflecting country of product and service origin, appear to provide reasonable proxy measures of foreign source procurement, although neither is available across all data sources. (For more information on the characteristics of each government procurement database, see app. II.) Information about how much goods and services a country imports provides the basis for another approach to estimating what portion of all government procurement in that country is imported. The WIOD provides such information, giving us a second type of data and an alternative analytical approach for estimating foreign source government procurement. The WIOD links data on an economy’s supply chain interdependencies to data on its import and export flows, thus providing a proxy estimate of the share of imports in procurement by all levels of government. We based our method for analyzing linked input-output tables on an approach used by the European Commission which examines import penetration of government procurement within Europe. Unlike the contract data we analyzed from government procurement databases, the WIOD data capture procurement by all levels of government. However, the input-output tables are organized by industry, which requires a decision as to which industries make up the government sector in any given country’s economy. Some industries, like “public administration”, can safely be assumed to be part of the governmental sector in every country. Other industries, like education or health care, vary across countries in the degree to which they are part of the government sector, if at all. While this analytical method based on input-output tables can provide broad estimates of how much governments are purchasing imported goods and services, it relies on some important assumptions that may affect the reliability of the results. For example, it assumes that the goods and services purchased by all levels of government are imported to the same extent as they are when purchased by other industries in the same country. This assumption, known as the “proportionality assumption”, recognizes that results from this method may overestimate the share of imports in government procurement to the extent that the analysis does not capture attempts by the government sector to limit foreign sourcing in its procurement. On the other hand, other aspects of this method may underestimate the share of imports in government procurement. For example, the input-output data include intermediate inputs but do not include purchases for investment, such as some government assets because, according to the authors of the European Commission study, input-output tables do not have the data to distinguish between investments by the private and public sectors. Thus, the input-output data could exclude investment made through construction services like those purchased to build highways, schools, or other assets that have long-term use, services that are included in covered procurement under both the GPA and NAFTA. The value of U.S. government (USG) contracts awarded to firms located in the other six main parties to the GPA and NAFTA likely exceeds twice the estimated value of contracts from those parties to U.S. firms, but exact comparisons are not possible. The USG awarded contracts valued at about $12 billion to foreign-located firms in fiscal year 2015, of which less than half went to firms located in the other six main parties. Conversely, the government procurement data we analyzed indicated the central governments of these parties awarded almost $7 billion to foreign sources, of which less than a third were awarded to firms located in the United States or for goods or services from the United States. Over three- quarters of these U.S.-sourced contracts were awarded by Canada and Mexico. Only the USG’s procurement database contains data on firm ownership. Analyzing these data, we found that the USG awarded more, by reported contract value, to foreign-owned firms located abroad, than it awarded to U.S.-based subsidiaries of foreign-owned firms. This was mostly U.S. Department of Defense (DOD) contracts in support of the U.S. military presence in those countries. Overall, while available contract data enable broad cross-country comparisons, these data allow only limited insight into the effects on the U.S. economy of foreign sourcing of USG procurement. This is principally because the contract data do not capture the economic roles of firms awarded contracts and thus do not allow for a definitive assessment of the economic implications of foreign sourcing, as we discuss later in this report. In 2015 the USG awarded about 511,000 contracts valued at about $290.9 billion. Out of this total, about 47,000 contracts valued at about $12.1 billion were awarded to firms located outside the United States (as shown in the data by firm location). Similarly, the USG awarded about 50,000 contracts valued at about $16.5 billion for foreign goods and services (as shown by country of product and service origin). See table 2. Of the USG foreign source procurement awarded to firms in the other six main parties to the GPA and NAFTA, firms located in the EU received more than half in terms of contract value and slightly less than half by number. In 2015 the USG awarded about 10,000 contracts valued at about $5.3 billion to firms located in the other six main parties to the GPA and NAFTA (see table 2 above). This $5.3 billion is about 40 percent of the total value of USG contracts awarded to foreign-located firms. Firms located in the EU received almost 5,000 USG contracts valued at $2.8 billion. Firms located in Japan, South Korea, and Canada were awarded most of the remaining aggregate USG contract value ($1.1, $0.8, and $0.6 billion, respectively) and number of contracts (about 1,500, 600, and 2,900, respectively) awarded to firms in the other six main parties to the GPA and NAFTA. Firms located in Mexico and Norway received less than 1 percent of the aggregate USG contract value and number of contracts awarded to firms in the other six main parties. However, as table 2 also shows, the majority of foreign-sourced USG procurement, in terms of both value and number of contracts, went to firms located in countries that are not among the other six main parties to the GPA and NAFTA. Germany, Japan, and South Korea are among the top five countries whose firms received the most USG contract value in fiscal year 2015. However, countries in the Middle East, including Afghanistan, United Arab Emirates, and Saudi Arabia, were also among the countries whose firms were main recipients of USG procurement in terms of aggregate contract value (see app. III for additional information on USG foreign source procurement by country). Finally, table 2 shows that FPDS-NG data are similar when we use, instead of firm location, the alternative measure of foreign sourcing based on country of product and service origin. For example, the aggregate value of contracts awarded by the USG for goods and services originating in countries of the other six main parties was about 43 percent of the overall value of USG foreign source procurement—the same proportion we found when using firm location as proxy measure of foreign sourcing. In addition, as with the results based on firm location, most of the USG’s foreign source procurement as measured by country of product and service origin went to countries outside the other six main parties to international procurement agreements. Foreign-located firms can be either foreign-owned or U.S.-owned, just as U.S.-located firms can be either foreign-owned or U.S.-owned. Among the government procurement databases we used, only the FPDS-NG includes data on firm ownership. Some research on foreign sourcing in government procurement differentiates between direct and indirect cross- border procurement based on knowledge about both the location and ownership of the successful bidder: In direct cross-border procurement, the successful bidder is both foreign-owned and foreign-located. In indirect cross-border procurement, the successful bidder is a U.S.- based domestic subsidiary of a foreign-owned firm. According to a recent EU Commission study, between 2009 and 2015, the EU’s indirect cross-border government procurement was more than 5 times greater in terms of both value and number of contract awards than its direct cross-border government procurement. The study notes that indirect cross-border procurement is often high when direct cross-border procurement is low and suggests that may reflect actual or perceived barriers to cross-border bidding, which lead firms to rely on their locally based subsidiaries for cross-border sales. The study reported that indirect cross-border government procurement (foreign-owned, domestically located vendor) accounted for 21.9 percent of the number and 20.4 percent of the value of certain contract awards in the EU’s 28 countries, while direct cross-border government procurement (foreign-owned, foreign-located vendor) accounted for 1.7 percent of the number of contracts and 3 percent of contract value. In contrast to the findings of that EU Commission study, our analysis of FPDS-NG data shows that indirect cross-border procurement by the USG was smaller in terms of total award value and number of contracts than direct cross-border procurement. This indicates that foreign firms selling to the USG generally do not establish a local presence in the United States. Specifically, foreign-owned firms located in the United States (indirect cross-border procurement) received contracts valued at about $3.6 billion, or less than 1 percent of the value of all USG contracts. By contrast, firms that were both foreign-owned and foreign-located (direct cross-border procurement) received contracts valued at about $11.8 billion, or about 4 percent of the value of all USG contracts ($290.9 billion). Therefore, USG direct cross-border procurement was about three times greater than indirect cross border procurement for contracts awarded in fiscal year 2015. A possible explanation for this finding could be that foreign-owned and foreign-located firms are awarded more USG contracts in terms of value and number than U.S. subsidiaries of foreign-owned firms because those contracts are covered by international procurement agreements. Foreign- owned and foreign-located firms are awarded more USG contracts because they may bid for large-value GPA covered USG contracts at a higher rate than their U.S.-located counterparts, or they may generally be more competitive for such contracts. However, for contracts not covered under the GPA and NAFTA, the relative difference between the two groups of foreign-owned firms becomes smaller in terms of aggregate contract value. Therefore, the difference between direct and indirect cross-border procurement is likely not due to agreement coverage as one might expect. To better understand why the USG’s direct cross-border procurement was larger than its indirect cross-border procurement, we further analyzed the FPDS-NG data on firm location, firm ownership, and place of performance—where the services were performed or where the goods were produced. Based on firm location, as stated earlier, foreign-located firms were awarded about $12.1 billion in USG contracts. Measured by aggregate contract value, almost all of the USG contracts awarded to those firms were performed abroad (i.e., outside the United States)—$11.9 out of $12.1 billion or 98 percent. USG contracts performed abroad are commonly awarded to U.S.-located as well as to foreign-located firms. In 2015, the USG awarded contracts performed abroad valued at about $23.3 billion, of which about half was awarded to U.S.-located firms. In particular, as figure 1 suggests, while U.S.-located firms received contracts performed abroad valued at $11.4 billion, foreign-located firms were awarded USG contracts valued at $11.9 billion. Almost all of those USG contracts—$11.7 out of $11.9 billion or 98 percent—were awarded to firms that were foreign-owned as well as foreign-located (i.e., direct cross-border government procurement). The vast majority of the value of these USG contracts to foreign-owned, foreign-located firms was for DOD contracts performed abroad. In particular, DOD awarded about 84 percent of the value of USG contracts—$9.8 billion out of $11.7 billion— that were performed abroad and awarded to foreign-owned, foreign-located firms. The vast majority of those contracts ($7.5 billion or 77 percent) were covered under the GPA and NAFTA. (See app. III for a breakdown by agency of all USG contracts performed abroad and awarded in fiscal year 2015 to foreign-owned, foreign-located firms.) Foreign-owned firms located in six countries received the majority (57 percent) of DOD’s $9.8 billion in aggregate award value of contracts performed abroad. Specifically, firms located in three countries in the Middle East—Afghanistan, Saudi Arabia, and United Arab Emirates— together received 28 percent of that award value; firms in Japan and South Korea together received 18 percent; and firms in Germany received 11 percent. About a quarter of DOD’s $9.8 billion in aggregate award value were for purchases of fuel, oil, lubricant, and wax. About 9 percent were for education and training services, and about 7 to 8 percent each were for construction of buildings and housekeeping services. For example, fuel was the main product procured by DOD in United Arab Emirates, while in Saudi Arabia most DOD procurement was for education and training services. (See app. III for a breakdown of DOD contracts performed abroad and awarded to foreign-owned and foreign- located firms, by country.) Our analysis of available procurement contract data from 2015 shows that the central governments of the other six main parties to the GPA and NAFTA, apart from the USG, awarded contracts valued at about $170.5 billion. About 4,000 out of a total of 245,000 of these contracts with an estimated total value of about $6.5 billion were awarded to foreign sources, that is, to foreign-located firms or for imported products and services. Some of these contracts awarded by the other six main parties were covered by the GPA and NAFTA, while others were not. Furthermore, the central governments of the other six main parties awarded about 2,000 U.S.-sourced contracts worth about $1.8 billion (see fig. 2). U.S.-sourced contracts are contracts awarded to U.S.-located firms or for products made in the United States. Canada and Mexico awarded most of the U.S.-sourced contracts. Specifically, central government contracts awarded to U.S.-located firms by Canada and Mexico accounted for almost 80 percent of the value and number of all U.S.-sourced contracts. Over 60 percent of the value and number of U.S.-sourced contracts awarded by the central governments of the other six main parties were for the procurement of goods. In particular, Canada awarded more than 20 times more in contract value to purchase goods than it did to purchase services from U.S.-located firms. However, for contracts covered under trade agreements, the other six main parties collectively awarded more U.S.-sourced contracts for services than for goods; these contracts were awarded primarily by the EU and Mexico. U.S.-located firms were awarded virtually no construction services contracts. This result is consistent with our findings for procurement flows among all countries among the other six main parties to GPA and NAFTA and may be explained by the proxy measure used—firm location, which accounts only for direct cross-border procurement. For example, the EU commission paper cited previously finds that for construction works the share of direct cross-border procurement in the total value of awards was 1.7 percent compared with 12.3 percent for indirect cross-border procurement. The data available from the government procurement databases we analyzed provide relevant and useful information for assessing foreign sourcing in government procurement, but these data do not allow for precise cross-country comparisons based on the GPA provisions on rules of origin. Data and reporting on country of origin for goods and services is limited for a number of reasons. Most of the databases we analyzed contain fields on contract award value and type of contract, as well as fields on firm location or country of product or service origin—proxy measures of foreign sourcing that, as we have found, allow for broad cross-country comparisons. However, precise estimates from the available data are not possible because no single internationally accepted definition exists to distinguish procured goods and services that are “foreign” from those that are “domestic” and the information in government procurement databases is not uniform. There is no agreed- upon definition of the country of origin for goods and services for statistical reporting purposes in the GPA even though a similar term— country of production—is used in the 1994 GPA’s general principles on nondiscrimination. Instead, the GPA generally expresses that a party shall apply the rules of origin that it applies in the normal course of trade when determining the country of origin for goods and services in covered procurement. Another factor that limits cross-country comparisons of country of origin data by parties to the GPA is the recent revision to the GPA itself, which no longer requires the parties to provide country of origin statistics, as we previously reported. According to the 1994 GPA, parties were to provide statistics on the country of origin for products and services purchased by its entities, to the extent that such information is available. However, the revised GPA, which went into effect in 2014, does not require parties to report available information on the country of origin of purchased products or services. While all the GPA members included in our scope reported the amount of covered procurement to the WTO, only Japan (until 2013) reported statistics on the “nationality of the winning tenderer”. The WTO Committee on Government Procurement’s Work Programme on the Collection and Reporting of Statistical Data is currently examining the issues surrounding how countries define country of origin for the procurement of goods and services. Finally, while the United States collects a variety of relevant data on foreign sourcing, those data have certain limitations for cross-country comparisons since the data are collected for different purposes. While U.S. agencies collect country data on successful bidders and the country of origin of goods and services in response to the Buy American Act and report these in FPDS-NG, the agencies do not collect data on country of origin determinations in response to relevant provisions of the GPA or NAFTA. For example, the U.S. Federal Acquisitions Regulation (FAR), in implementing statutes including the Buy American Act, applies different tests to determine the country of origin of an end product and defines end products to include “domestic”, “foreign”, or “U.S.-made”. The test to determine country of origin for an end product under the Buy American Act is different from the test to determine country of origin in the procurement of an end product under trade agreements. According to the FAR, for manufactured products, the Buy American Act uses a two-part test to define a domestic end product: (1) the article must be manufactured in the United States, and (2) the cost of domestic components must exceed 50 percent of the cost of all the components. According to the FAR, for procurement under trade agreements, the test to determine “country of origin” is “substantial transformation”, (i.e., transforming an article into a new and different article of commerce, with a name, character, or use distinct from the original article). The substantial transformation test can also be used to determine whether a product is a U.S.-made end product. The FAR also defines a foreign end product as an end product other than a domestic end product. Therefore, under the FAR, contracting officers use different tests and different descriptors to designate country of origin. Since corresponding data fields for these descriptors are not available in FPDS-NG, the data do not allow for exact cross-country comparisons of foreign sourcing under the GPA and NAFTA. In all countries included in this report, available contract data do not allow for a definitive assessment of the economic implications of foreign sourcing in government procurement, such as impacts on wages and profits. As figure 3 shows, using the United States for illustrative purposes, foreign versus domestic sourcing in government procurement could be viewed in four different ways —firm location, firm ownership, product and service origin, and place of contract performance. For example, FPDS-NG data shows that a task order under a DOD contract for facilities support performed in Iraq reports the United Arab Emirates as the country of product and service origin for safety and rescue equipment, while also reporting the firm location and ownership as the United States. FPDS-NG data showed that another task order under the same contract, for housekeeping services, reports the place of performance as Kuwait but reports the United States as the country of product and service origin, the firm location, and the country of firm ownership. As another example from FPDS-NG data, a contract awarded by the U.S. Agency for International Development for internet services performed in Malawi and awarded to a foreign-owned business reports the United States as the country of service origin but the United Kingdom as the firm location. Each of the various different ways relevant to the sourcing of USG contracts can be viewed on a continuum based on the extent of foreign involvement associated with the production and service delivery processes. Country of firm location. As found in the procurement databases, suppliers can be located, for example, domestically in the United States or abroad. However, the economic effects related to the country of firm location depend on what is produced in the country relative to what is produced elsewhere. For example, the supplier may be an end product manufacturer doing less skill-intensive assembly and packaging, a high technology and skill-intensive manufacturing firm that substantially transforms a product that is subsequently used as an input in the production process, or a broker providing unskilled labor for product distribution. In each of these examples, the country of firm location could experience different economic effects from the awarded contract. Country of firm ownership. Suppliers could be domestically or foreign owned, and who owns the firm determines who accrues the firm’s profits. However, determining ownership is challenging because a supplier awarded a contract may have various ownership structures. For example, the supplier may be a sole proprietor or a corporation with shareholdings, subsidiaries, ultimate owners, or may be a participant in a corporate group. The supplier may have established a presence in the United States through a foreign-owned subsidiary or may participate in a partnership such as a joint venture with a U.S. firm. Country of product or service origin. Goods and services purchased under government procurement contracts may be domestically produced or imported. In this case, the effects can be analyzed in the same way as trade flows in general. However, the country of product or service origin is more challenging to determine for government procurement contracts compared with general trade in goods and services, since government contracts typically cover more than one good or service. Therefore, the country of origin for certain goods included in a contract may be different from the country of origin for other goods under the same contract. Country of contract performance. USG contracts can be executed within the United States or outside the United States. For example, the country of contract performance may determine where the service is delivered as opposed to the location or ownership of the firm that delivers the service. The place of performance may lead to benefits and costs accruing to the location where the contract is performed. For example, if a service is delivered or the products are produced outside the United States, the contract likely employs local labor and therefore benefits the local labor market. Because available data in government procurement databases do not specify the supplier firm’s economic role, the economic effects of the awarded contract remain uncertain. The potential effects of the awarded contract on other firms, workers, the government, or consumers in the domestic and foreign economies may vary depending on the supplier firm’s economic role. We estimate that foreign sourcing is generally a small share of government procurement for the United States and the other six parties to the GPA and NAFTA. Foreign sourcing by the USG and the other parties’ central governments, estimated by government procurement databases, varied in value from about 2 to 19 percent of overall central government procurement. Foreign sourcing by all levels of government, estimated by data on trade and public sector purchases by the United States and the other six main parties, shows that government imports ranged from about 7 to 18 percent of the goods and services purchased by these countries’ governments. In addition, our analysis of central government contract data found that foreign sourcing is sometimes but not always greater, in terms of value and number of contracts, for contracts covered by procurement agreements than for contracts not covered by those agreements. Our analysis of available data on firm location from government procurement databases shows that foreign sourcing in 2015 ranged in value from 2 to 19 percent of overall central government procurement (see fig. 4). The central governments of the EU, Mexico, and the United States awarded less than 5 percent of the aggregate value of their procurement contracts to foreign-located firms. The proportions for Canada and Norway were about 11 and 19 percent, respectively. Both Canada and Norway can be characterized as small, open economies bordering much larger, open trading partners, which may contribute to their relatively larger shares of foreign sourcing in central government procurement. Canada’s central government awarded about 10 percent of the value of all its contracts to firms located in the United States. Similarly, Norway’s central government awarded about 19 percent of the value of all its contracts to firms located in the EU. Our analysis of available data on country of product and service origin shows that Japan procured less from foreign sources (2 percent) than both the United States (6 percent) and South Korea (3 percent). See figure 5. We obtained similar results in terms of number of foreign-sourced contracts. Less than 5 percent of the number of central government contracts was sourced from abroad in the EU, Japan, South Korea, and Mexico. For the United States, Norway, and Canada, the numbers of foreign-sourced contracts based on firm location comprise higher percentages (9, 8, and 13 percent, respectively). Canada’s central government awarded about 9 percent of the total number of contracts it awarded to firms located in the United States. Similarly, Norway’s central government awarded about 7 percent of the total number of contracts it awarded to firms located in the EU. Except for the United States, most of the central governments of the other six main parties to the GPA and NAFTA awarded few construction services contracts to foreign-located firms. One possible explanation is that, given the higher dollar value threshold of contracts in this sector, foreign-owned firms may have a greater incentive to establish a local presence through subsidiaries in the host countries. The data in the non- U.S. databases do not provide enough information to explore that hypothesis. However, FPDS-NG data show that construction services contracts are the main contract type awarded to foreign-located firms by the USG, which awarded about 3,090 construction services contracts worth $1.8 billion (or about 20 percent and 8 percent of all construction services contracts, respectively) to foreign-located firms. Less than 1 percent of these contracts’ award value was for contracts performed in the United States and over 70 percent of these contracts’ award value was for contracts covered by the GPA and NAFTA. In addition, the USG awarded a roughly equal share (about 4 percent of all contracts in terms of value) of goods and services contracts to the other six parties to the GPA and NAFTA. Canada, on the other hand, awarded a relatively large percentage of the value of all goods contracts (30 percent) to firms located abroad. We also assessed the degree of foreign sourcing in terms of government import percentages to identify patterns in government procurement that may differ from those based on the location of the supplier and origin of goods and services. Using linked input-output tables and an alternative analytical approach, we were able to broadly estimate the domestic and foreign sources of inputs to the government sector for the United States and the six main parties to the GPA and NAFTA. This alternative approach to estimating foreign source government procurement is based on macroeconomic data on trade flows of goods and services between countries and the types of goods and services purchased by the public sector. Unlike the approach above based on government procurement contract data, this approach allows us to calculate broad estimates of domestic and foreign sourcing in procurement by all levels of government—central, state, and local. Table 3 shows our broad estimates based on a narrow definition of the government sector, which includes only “public administration”. In the table, the columns are the purchasing countries or the EU. The rows indicate where the goods or services are being purchased from. As the table shows, for all the countries and the EU, foreign sourcing generally accounts for a small portion of all governmental purchases. For example: Out of the estimated $1.2 trillion that the central, state, and local governments in the United States purchased, $100 billion was imported from outside the United States—a total foreign source percentage of about 9 percent, including $26 billion (2 percent) from the EU. Out of the $460 billion that the EU governments at every level purchased, $36 billion was imported from outside the EU—a total foreign source percentage of about 8 percent, including $10 billion (2 percent) from the United States. Out of the $178 billion that governments in Japan purchased, $12 billion was imported from outside Japan—a total foreign source percentage of about 7 percent. In general, the smaller economies in terms of government purchases— Canada, South Korea, Mexico, and Norway—imported a relatively larger percentage of such purchases than the United States, EU, and Japan. Specifically, Canada, South Korea, and Norway imported about 9 to 13 percent of their governments’ purchases. Mexico imported a notably large share of about 18 percent. Of the estimated $24 billion in purchases by Mexico’s government sector, about 6 percent was from the United States and about 3 percent from the EU. This inverse relationship between the size of an economy and the relative percentage import share of government purchases has been noted by others that have used the input-output methodology. Basing estimates of foreign source government procurement on the narrow definition of the government sector may not be as appropriate in countries where the government plays a large role in various additional sectors. Figure 6 shows the size of the government sector under the narrow definition as well as two broader definitions which add additional industries. The “typical definition” as defined in the EU study also includes the education and health care sectors. The “broad definition” also includes a portion of the energy and the telecommunications sectors. The relative sizes of the parties change under the different definitions, as shown in the figure. For example, while the EU government sector is less than half the size of the U.S. government sector under the narrow definition ($460 billion for the EU compared with $1,159 billion for the United States), under the broad definition they are comparable in size ($2.4 trillion for the EU and $2.6 trillion for the United States). Figure 7 shows the estimated percentages of each country’s and the EU’s government sector purchases that are imported under the narrow, typical, and broad definitions as described above. Under all three definitions, the United States and EU have some of the smallest percentages of imported government purchases, between 8 and 10 percent. Mexico has one of the largest percentages, between 17 and 22 percent. Canada and Norway are in the middle, from about 12 to 16 percent. For South Korea and Japan, the estimated percentages of government sector purchases that are imported increased under the broad definition—from 7 percent to 17 percent for Japan, and from 9 percent to 22 percent for South Korea. Our analysis of 2015 data from central government procurement databases finds evidence that foreign sourcing was sometimes, but not always, greater for contracts covered by the GPA and NAFTA than for contracts not covered by those agreements. Given the goals promoted by the GPA and NAFTA, one might expect that procurement covered by such agreements would likely result in a higher number or larger aggregate value of contracts awarded to foreign-located firms or for the purchase of foreign goods and services. For the United States and two of the other six main parties to the GPA and NAFTA—Mexico and South Korea—the results bore out that expectation: for all three, more central government foreign sourcing in terms of contract value occurred when procurement was covered by the agreements. However, our analysis also shows that for two other parties, Canada and Norway, the opposite was true; for the remaining two parties, the EU and Japan, we found little difference or could not calculate an estimate. Our previous work showed that only about a third of the estimated average annual government procurement at all levels of government from 2008 through 2012 was covered by the GPA and NAFTA ($1.5 out of $4.4 trillion). The available data from the government procurement databases that we analyzed show that the USG and the central governments of Mexico and South Korea awarded at least twice as much to foreign sources for contracts covered by international agreements—ranging from 2 to 6 percent of the value of covered contracts compared with less than 1 to 2 percent for non-covered contracts (see table 4). In particular, for contracts awarded by the USG, foreign-located firms received more than twice the value of covered compared with non-covered contracts—about $8.8 billion compared to $3.4 billion, respectively. Results for the USG are similar when looking at the amount of foreign source procurement based on product and service origin. Conversely, U.S.-located firms were awarded a higher aggregate value of non-covered contracts from the USG, compared with covered contracts. (See table 4.) For Canada and Norway, more central government foreign sourcing in terms of contract value occurred when procurement was not covered by trade agreements than when it was. For covered contracts, Canada’s central government awarded 1 percent of the value of all contracts to foreign-located firms compared with 10 percent of the value for non- covered contracts. Similarly, Norway awarded foreign-located firms more than 5 times more in non-covered than covered contracts as measured by aggregate contract value. For the EU and Japan, data on the value of foreign sourced contracts and their agreement coverage are either not available or incomplete. The available EU data have a significant number of foreign unclassified contracts and do not include contracts below the GPA threshold values, which limits the reliability of any comparison for covered versus non- covered contracts. In addition, Japan’s 2015 GPA submission of 2013 procurement data did not report on the amount of foreign source procurement broken out by covered and non-covered contracts, because, according to Japanese officials, this is not a GPA statistical reporting requirement. Therefore, we could not calculate a similar comparison of the value of covered versus non-covered procurement for Japan. Finally, with regard to the number of contracts awarded, our analysis of available data from country databases does not show a consistent relationship with international procurement agreement covered awards to foreign-located firms or for foreign-sourced goods or services. In South Korea and the United States, the number of contracts not covered by trade agreements and awarded for foreign sourced products was greater compared with covered contracts. Conversely, in Canada, EU, Mexico, and Norway, the number and share of contracts covered by trade agreements and awarded to foreign-located firms was greater compared with non-covered contracts. In percentage terms, foreign-located firms received the same share (9 percent) of covered and non-covered contracts awarded by the USG. We provided a draft of this product to USTR, Commerce, OMB, and GSA for comment. Commerce provided technical comments on this report, which we incorporated, as appropriate. USTR, OMB, and GSA did not comment on our draft report. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the U.S. Trade Representative, the Secretary of Commerce, the Director of the Office of Management and Budget, the Administrator of the General Services Administration, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report examines the extent of foreign sourcing in government procurement by the United States and the other six main parties to selected international procurement agreements. Under the World Trade Organization (WTO) Agreement on Government Procurement (GPA), the other main parties, besides the United States, are the European Union (EU), Japan, Canada, South Korea, and Norway. Under the North American Free Trade Agreement (NAFTA), the other main parties are Mexico and Canada. The report (1) provides alternative broad estimates of foreign sourcing by the U.S. government (USG) and the central governments of the other six main parties to the GPA and NAFTA, and (2) assesses foreign sourcing as a share of estimated central government procurement and of estimated procurement by all levels of government, and the extent to which central government contracts that are covered under the GPA and NAFTA are foreign-sourced. We analyzed data from two types of sources: (1) government procurement databases in Canada, the EU, South Korea, Mexico, Norway, and the United States, for 2015, and (2) 2014 trade data merged with data on the types of goods and services purchased by the public sector. Since Japan does not have a national procurement database, data for Japan were based on its WTO GPA submission for 2013, which is the last submission that contains information on its foreign sourcing in government procurement. We also interviewed cognizant government officials in Washington, D.C.; Ottawa, Canada; Mexico City, Mexico; Seoul, South Korea; and Tokyo, Japan, and reviewed available research literature to identify potential methods, sources, and data limitations. We also interviewed government officials at the EU mission in Washington, D.C. and exchanged information with officials knowledgeable of the EU government procurement database. We collected and analyzed data from the following five databases: for the United States, the Federal Procurement Data System-Next Generation (FPDS-NG); for the EU and Norway, Tenders Electronic Daily (TED); for Canada, Contract History; for Mexico, the Government of Mexico e-Procurement System CompraNet; and for South Korea, the South Korea ON-line E-Procurement System (KONEPS). Several of these government procurement databases included data on procurement at all levels of government—national, state, and local— while others did not. Therefore, we limited our analysis to data on central government procurement. For a detailed discussion of the characteristics of each database, see appendix II. To identify data fields that could be reasonably compared across databases, we followed a number of methodological steps: First, we looked for fields that capture the total award value of the contract at the time of award (2015); the type of contract in terms of goods, services, and construction services; the contract award date; the contract duration; and the type of tendering procedure. We took into account the following considerations: Units of analysis. We established appropriate units of analysis across databases. Several databases contained a number of fields that were potentially relevant to our work. Specifically, in FPDS-NG the unit of analysis is the contract award. The database contains data at the contract action level (contracts, task orders, and their modifications). We used contract awards for the number of reported contracts, but for certain data on indefinite delivery vehicles (IDVs) such as government-wide acquisition contracts, indefinite delivery contracts, and blanket purchase agreements, we relied on data for task orders awarded in fiscal years 2015 through July 2018 (see discussion of contract valuation and multiple-year, multiple-award contracts below) because they contained information on place of performance, country of product and service origin, and place of manufacture, which were the relevant fields for foreign sourcing. The TED database contains information on contract notices, contract award notices, and contract awards above certain thresholds set by relevant EU legislation. While the EU and Norway use contract award notices to estimate the value of covered procurement in their GPA statistical notifications, we used contract awards because they allowed us to estimate actual foreign sourcing. The databases for Canada, Mexico, and South Korea contain a contract identifier, which is the sole and unique unit of analysis that is available. Contract valuation. We established comparable fields across databases that represented the estimated maximum total value of a procurement awarded in 2015 over its entire duration. For FPDS-NG, we developed a methodology that is consistent with the methodology laid out in the revised GPA and avoids the inconsistencies of the revised U.S. methodology, which we previously reported. In particular, in October 2015, the Office of the U.S. Trade Representative (USTR) notified the WTO that the United States had revised its methodology for preparing GPA statistical reports on U.S. federal procurement. To more precisely reflect the value of the federal procurement market at the time of each report, the revised methodology presented the total amounts obligated under GPA covered contracts over a 6-year period—that is, the year the contract was awarded plus 5 years after the award. As we previously reported, the revised methodology has both advantages and disadvantages. It improves the accuracy of reporting but introduces a 6-year delay, whereas the revised GPA requires reporting within 2 years of the end of the reporting period. In addition, the revised valuation methodology is not consistent with the one used by other countries and creates an internal inconsistency: In measuring actual obligations for procurement contracts rather than the value at the time of award, the revised U.S. methodology is inconsistent with the methodology used by other large GPA members, such as the EU, Norway, Canada, and Mexico, which report contract values at the time of award rather than actual obligations or expenditures. The United States continues to report the number of covered contracts to the WTO based on their award value, which leads to an inconsistency between the reported numbers and values of reported U.S. government procurement contracts. The contracts comprising the reported value of covered procurement are determined at a later time under the revised methodology and can result in a different set of contracts being used to determine the reported value. Our current methodology uses base and all options value for all contracts awarded in fiscal year 2015 unless the contract was an IDV. For IDVs we used the base and all options value of task orders awarded in fiscal years 2015 through July 2018 under those IDVs to avoid overestimating the total value. We used the aggregate base and all options value for task orders under those contracts because the alternative—using the base and all options value on the base IDVs—is inflated due to problematic data entries for multiple awards. As a result, our methodology produces an estimate that is consistent with methods used by other parties, internally consistent, and in accordance with the methodology for valuation in the revised GPA. As we noted earlier, the result is close to the obligations value currently reported in the Trade Agreements Report used by USTR to report to the WTO. In TED, we used the contact award value field, because it captures the appropriate measure and according to EU documentation was corrected for errors in the data. For the EU and Norway, we found that for above-threshold procurement approximately 15 percent and 12 percent of the contract award values were missing, respectively. We took additional steps to address these missing values to generate estimates of the total contract award values. Specifically, we implemented a Predictive Mean Matching (PMM) multiple imputation methodology for the EU and used post-stratification estimation techniques for Norway. (See app. IV for more details on both methods.) However, we excluded the value of below-threshold procurement for the EU and Norway because it is reported on voluntary basis and suffers from missing and implausible values. In particular, for the EU, about 42 percent of the contract award values below threshold are missing and another 10 percent are below €1,000. For Norway, 80 percent of the contract award values below threshold are missing. Nevertheless, as a robustness check of the results from our analysis, we applied our imputation methodology discussed in appendix IV to the entire TED dataset and found that once those values are estimated, the amount of procurement awarded by the EU to U.S.- located firms increases by less than 10 percent. However, we do not consider the estimate sufficiently reliable to be included in our aggregate analysis. In Contract History, we used the contract value field because, according to Canadian officials, it includes the original total value of the contract at the time of the award. In addition, those officials noted that this field was used by Canada in its reporting of covered procurement for its WTO statistical notifications. In CompraNet, we used the contract amount field since, according to Mexican officials, this field reflects the total value of the contract award. In KONEPS, we used the total awarded value field, since it was the only field available for our analysis and contained the value awarded for a given year (see adjustments we made for multiple-year contracts below). Currency denomination. We converted contract values reported in different currencies in the databases into dollars using the period average exchange rate for 2015 as provided by the International Monetary Fund’s International Financial Statistics. Contract modifications or amendments. Since we defined the value of the award at the time of award, we selected contracts awarded in 2015 and excluded any subsequent modifications or amendments in all the databases. Contract types. We used the product and service classifications that each database used to group contracts by type. Different databases used different classification schemes, and we did not independently reclassify any contracts to a uniform classification system, since such a system does not exist and a concordance among all schemes is not possible. In FPDS-NG, we used the U.S. product and service codes to classify federal government contracts in product groups and categorized reported procurement as either goods, services, or construction services. In TED, we used the type of contract field, which categorized reported procurement as supplies, services, and works based on the EU common procurement vocabulary in TED. In Contract History, we used the grouping of goods, services, and construction, which Canadian officials provided to us based on the global shipment identification number codes and description in the database. In CompraNet, we used the type of contract field, which indicates if the contract is for goods, services, or public works. In KONEPS, the data on foreign procurement included goods only, and no classification scheme was available for foreign procurement contracts. Multiple-year, multiple-award contracts. Some countries’ procurement practices include contracts awarded for multiple years, and we accounted for the valuation of those contracts by estimating their total cumulative value over multiple years at the time of award in 2015. In FPDS-NG, we accounted for the value of multiple-award contracts by using the base and all options value of task orders awarded in fiscal years 2015 through 2018 for IDVs initially awarded in fiscal year 2015. In TED, available documents noted that member states can use alternative multiple-year tools such as framework agreements and dynamic purchasing systems for a certain time period or for repeat purchases, respectively. While the indicator field for these data in TED was not sufficiently populated for further analysis of those types of contracts, the contract valuation field we used had already accounted for the total value of the contract, and thus no further adjustment was warranted. Officials in Canada provided data on multiple-year contracts, including call-ups and standing offers. However, since the contract value field we used accounted for the total value of the contract, no further adjustment was needed. For Mexico, CompraNet contains information on framework agreements and multiple-year contracts, but since the contract value field indicated the total value of the contract award, no adjustment was needed. South Korea also uses multiple-year contracts, and we made several adjustments to estimate South Korea’s total value of 2015 awards. We identified multiple-year contracts in KONEPS in 2015; based on solicitation numbers, we then removed the value of contracts originally awarded in prior years, while adding the value of multiple year contracts with solicitations in 2015 and awards in 2016 and 2017. Type of tendering procedure. In all databases we included in our analysis contracts under open and limited tendering procedures. Second, we identified data fields among the five databases that could potentially be used as proxy measures of foreign sourcing in government procurement: contractor data related to firm location contractor data related to firm ownership data on country of product and service origin However, we did not identify a data field common to all five databases that could be used as a proxy measure of foreign sourcing. FPDS-NG contained data on all four measures listed above. TED, CompraNet, and Contract History contained contractor data related to firm location. KONEPS and Japan’s WTO submission on its 2013 procurement contained data on country of product and service origin. Therefore, two data fields—firm location and country of product and service origin—were available in two groups of countries as reasonable proxy measures of foreign source procurement. Finally, we analyzed the contract data from the government procurement databases by GPA coverage. Some databases contain a field for GPA coverage, the data for which we deemed to be reliable for our purposes; for the databases that did not, we developed a proxy measure for GPA coverage. FPDS-NG contains a field on trade agreement coverage, but we found it to be unreliable as reported in previous work; therefore, we constructed a method to identify GPA covered procurement using an approach that USTR confirmed is consistent with the steps applied by the USG in developing its GPA statistical notifications. TED contains an identifier for GPA covered procurement, and we used this field to estimate GPA covered procurement for Norway and the EU after taking steps to address missing values for this identifier using other information in the dataset. Contract History contains a field that lists all internal and international agreements applicable to a contract in Canada. Therefore, covered procurement includes all contracts covered under the GPA, NAFTA, and other Canadian international procurement agreements. For Mexico, CompraNet contains a data field on type of procedure, which indicates the eligible firms that can bid on a contract. The data in this field indicate that the contract is (1) open to national firms only; or (2) international procurement under trade agreements, that is, open to both national (Mexican) firms and foreign firms from FTA partner countries; or (3) international procurement open to national firms, foreign firms from FTA partners, and all other foreign bidders. We treated international procurement in CompraNet as a proxy for GPA covered procurement. We grouped all contracts awarded in 2015 into two categories: non-covered procurement, which includes contracts open to national firms only, and covered procurement, which includes contracts open to foreign bidders (i.e. all contracts in categories 2 and 3 described above). KONEPS does not have a data field that specifically identifies covered procurement. Therefore, we defined a proxy for covered procurement as procurement above the revised GPA thresholds by covered entities. However, we were unable to make an adjustment for goods and services excluded from the agreement, since KONEPS does not classify foreign procurement by product service codes. To analyze the extent to which central government contracts that are covered under the GPA and NAFTA are foreign-sourced, we compared the proportion of foreign-sourced award values for contracts covered under the GPA and NAFTA to the same proportion of foreign-sourced contracts, which are not covered by those agreements. Our analysis describing the relationships between trade agreement coverage and procurement award values did not account for additional factors and was limited due to the data available. As we previously reported, the countries within our scope represent over 90 percent of the GPA countries’ total government procurement. Moreover, we previously performed consistency checks across time periods for these countries and determined that covered procurement out of total central government procurement appeared relatively stable over time. However, a more robust test of the relationship between foreign sourcing and selected international agreement coverage would use a larger cross-section of data over time and control for factors such as types of goods and services procured, size of the economy, type of tendering procedure, and other specific details of each agreement, among others. To determine whether the procurement contract data from the five databases were reliable for our purposes, we identified in relevant countries the appropriate data sources used to prepare the countries’ and the EU’s submissions of statistical notifications to WTO and other government procurement reports. To ensure consistency between our methods for estimating foreign sourcing with the methods used by the countries and the EU in their estimates of covered procurement for their GPA statistical notifications, we discussed with government officials in Canada, Japan, Mexico, and South Korea their process and data used to create their statistical notifications and other WTO reports, and we took steps to replicate existing report totals of EU covered procurement. We performed a sensitivity check for the U.S. data in FPDS-NG, where more than one relevant data field was available, to determine whether the definitional differences in the data fields were likely to materially affect our results about foreign sourcing. The results were similar across all six fields that could be used as alternative proxy measures of foreign source procurement in FPDS-NG data (see app. III, tables 11 and 12). In addition, we conducted electronic tests of all five procurement databases to identify whether the data were complete and internally consistent. We determined that the country procurement databases were sufficiently complete and internally consistent after taking the additional steps for the EU and Norway as described earlier, related to missing contract award values (see app. IV). We also shared our analyses of the data with cognizant officials from the corresponding countries who were willing to verify our methodology and replicate our analysis. Procurement and trade officials and researchers in Canada, Mexico, South Korea and Japan answered our questions relevant to data quality including data collection, cross checks of data entries, access controls, internal reviews, primary users, completeness and updates to the data, missing values, reporting mistakes, electronic safeguards and procedures for follow-up if errors are found. In Canada and Mexico officials replicated and confirmed our methodology and results. Results for South Korea and Japan were consistent with alternative available official publications. The various limitations in the procurement contract data that we identified and addressed, to the extent possible, affected our ability to obtain precise estimates of foreign sourcing in government procurement, but they were not an impediment to using the data for broad comparisons of orders of magnitude. Such comparisons include the amount of foreign sourcing, measured using firm location and country of product and service origin, by the USG and central governments of the other six main parties to the GPA and NAFTA. The data also allowed broad comparisons of bilateral procurement flows among the parties, as well as comparisons by type of contract and agreement coverage, as available, for the seven parties to the GPA and NAFTA within our scope. To obtain information on the aggregate levels and percentages of procurement by all levels of government that are imported, we relied on input-output tables from the World Input Output Database (WIOD) for 2014. The input-output tables have an industry by industry format, with each country’s industries listed separately. The data in each table are derived from publically available data from both national statistics agencies and international organizations such as the United Nations and the Organisation for Economic Co-operation and Development. We relied on the WIOD to ensure that the combined data from different countries was collected to be consistent. These data do not allow for distinctions between different levels of government. To assess the reliability of estimates based on the WIOD data, we first reviewed available documentation for the database. In cases where we had questions, we received written responses from WIOD officials. In addition, we compared estimates based on the WIOD to estimates based on other databases and found similar results. In general, we found that the data were sufficiently reliable for our purposes. To estimate the level and percent of procurement from the database, we took the following steps. First, we identified the industries associated with the governmental sector. Then, for that industry (or combination of industries), we obtained both the total level of purchases (or inputs), and the inputs that came from within that country, or other countries of interest. To obtain an estimate for the EU, we combined the purchases over the 28 member countries then in the EU. In general, we followed a procedure outlined in a 2017 paper produced by the European Commission. In this paper, the authors describe how input-output tables can be used to measure cross-border penetration in public sector procurement. An essential step in our method is defining which industries make up the government sector. Moreover, because the composition of the government sector and the patterns of government purchases vary by country, different measures of the government sector are more appropriate for different countries—since what goods and services the government provides or performs affects what it procures from the private sector. For example, for the EU, the government funds the majority of services in the area of public administration, defense, social security, education, and health care. In contrast, the USG funds a smaller share of health care services. We followed the model laid out in the European Commission paper and defined the government sector in three ways: 1. Narrowly Defined – (O84) Public administration and defense; compulsory social security 2. Typically Defined – (O84) Public administration and defense; compulsory social security (Q) Human health and social work activities 3. Broadly Defined – (O84) Public administration and defense; compulsory social security (Q) Human health and social work activities (D35) Electricity, gas, steam and air conditioning supply (E36) Water collection, treatment and supply (E37-E39) Sewerage; waste collection, treatment and disposal activities; materials recovery; remediation activities and other waste management services (1/3) * (H49) Land transport and transport via pipelines (1/2) * (H53) Postal and courier activities (1/2) * (J61) Telecommunications However, our procedure deviated from the European Commission report with regard to an additional category of expenditure in the report, final consumption by government. As in our prior reports, we did not include this category. This category includes both spending on social benefits, health care, and education as well as spending on collective items such as defense. We did not include this category in prior reports partly due to data reliability concerns about consistency in measurement of spending on social benefits across countries. However, if we had included it, that would have caused our estimates of import penetration to be smaller, because the WIOD tables do not include any cross-border expenditures for this category. For example, the percentage for the United States would have changed from about 8 percent to about 4 percent. To construct consistent data from different countries over time, certain assumptions were made by the WIOD. An assumption that has important implications for our analysis is known as a “proportionality assumption,” which is typical in the construction of input-output tables. This assumption requires that the percentage of a product that is imported is constant across all industries. In the example provided by the WIOD: “If 20 percent of Czech absorption of electronics is sourced from Germany, then 20 percent of any Czech final or intermediate use of electronics is assumed to originate from Germany.” The WIOD has attempted to improve on the proportionality assumption by making it at a more disaggregated level, but according to the WIOD, the proportionality assumption remains a limitation of the data set and consequently of our analysis. Importantly for our analysis, the proportionality assumption implies that the results we obtained from this method may not capture attempts by the government sector to award a larger share of its procurement to domestic firms relative to other industries. Another important limitation for our analysis is the scope of the industry data reported by the WIOD. Specifically, the input-output data include intermediate inputs but exclude purchases by government for investment. Such purchases could include some government assets that would be considered procurement covered by the GPA and NAFTA. For example, the input-output data could exclude construction services like those government purchases to build highways or schools that have long-term use, which are procurements potentially covered by the GPA and NAFTA. Finally, while we followed a method described above that has been used to study procurement, there are alternative methods that could have also been used based on input-output data. For example, according to industry officials at the U.S. Bureau of Economic Analysis, the “Trade in Value Added” methodology is such a method, and such data are maintained by the Organisation for Economic Co-operation and Development. We conducted this performance audit from March 2017 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The following appendix contains descriptive comparative information about the five databases included in our review: for the United States, the Federal Procurement Data System-Next Generation (FPDS-NG); for the EU and Norway, Tenders Electronic Daily (TED); for South Korea, the South Korea ON-line E-Procurement System (KONEPS); for Mexico, the Government of Mexico e-Procurement System CompraNet; and for Canada, Contract History. For each database, we provide its formal name and function, contract and/or agency coverage, and data field(s) related to firm location, firm ownership, source country of goods or services, location of contract execution, contract valuation, trade agreement coverage, and type of contract in terms of goods, services or construction services. The following appendix provides supplemental information from our analysis of foreign sourcing by the United States in fiscal year 2015 based on data from the Federal Procurement Data System-Next Generation (FPDS-NG). FPDS-NG contains data on four potential proxy measures of foreign sourcing—firm location, firm ownership, product and service origin, and place of performance. The database contains six fields that correspond to these four proxy measures. See tables 11 and 12. For cross-country comparisons, we use two of the six measures—vendor country code (13QQ) and country of product and service origin (9E). We disaggregate the data by country and list the top 20 countries, which are recipients of USG contracts based on firm location. See tables 13 and 14. Since about 10 percent of USG contracts are performed outside the United States, we also provide a breakdown of those contracts that are awarded to foreign-owned and –located firms by agency. See table 15. Finally, since most of these contracts by contract value are awarded by the Department of Defense (DOD), we also provide a country breakdown of DOD contracts performed outside the United States and awarded to foreign-owned and –located firms. See table 16. To report on European Union (EU) procurement data in the Tenders Electronic Daily (TED) database for 2015, we took steps to address missing contract award values, which amounted to approximately 15.2 percent of the 38,233 in-scope contract award values. To address these missing contract award values, we implemented a multiple imputation methodology that imputes a range of values for each missing contract award value and allows for estimation of additional uncertainty induced by the imputation methodology. After determining that the data were likely to be conditionally missing at random, we used predictive mean matching (PMM) to address missing values as described below. We determined that using PMM was appropriate because it can provide more robust results when the relevant variable is not normally distributed; PMM, as a form of multiple imputation, allows us to assess the variability introduced through the process of addressing missing data; and PMM, when properly specified, does not distort averages or variance in the underlying data. As we discuss below, the method for addressing missing values used by the EU has none of these features. In PMM, a regression model is first fit to complete cases in the dataset to predict values for the variable of interest for the entire dataset (i.e., including complete and incomplete cases). These predicted values are used to identify complete observations (“donors”) that are close (a “match”) to a given observation that is missing a value for the variable of interest. The PMM model draws matches using the posterior predicted distribution of the regression model. When PMM is used in conjunction with multiple imputations, this process is repeated multiple (m) times for each missing value. As a result, each of m imputations may match to a different donor. The donor’s observed value for this variable is donated to fill the blank data cell—not the predicted value used to match to this donor. The strength of the predictive model used to identify these matches will affect variation in the set of m imputed values because a better predictive model will identify donors that have observed values more consistently close to their predicted values. In order to specify our PMM model, we first explicitly tested the Ordinary Least Squares regression model used to match donors as part of the process discussed above. We performed standard regression diagnostics, including an examination of the included variables and residuals to avoid overfitting. We found that our model was able to explain 86 percent of variation in contract award values and appeared to have well-behaved (homoscedastic) residuals. We drew m=30 imputed values for each missing observation using the PMM process described above, which allowed us to generate estimates of the total contract value amounts and measure the uncertainty induced in those estimates by the imputation methodology. We used these measures of uncertainty to construct 95 percent confidence intervals and express these values as a percentage relative to the estimate itself. To assess the quality and reliability of the multiple imputations that followed from this predictive model, we performed four main sensitivity checks, which are included in tables 17 and 18. 1. We examined the proportion imputed for each subset of the data that we planned to report. The column headed “Percent imputed contract awards” shows the proportion of the count of contracts in a given data subset that were imputed using the methodology described above. We looked to avoid any individual subset being substantially greater than the overall average of 15 percent imputed. In practice, we individually checked any subset exceeding 30 percent imputed. 2. We evaluated the level of uncertainty induced by the imputation methodology across important subgroups of the data. The column headed “95 percent confidence interval +/-” indicates the percent of the “Contract award value estimate” that, when added and subtracted to this estimate, forms the 95 percent confidence interval. The level of uncertainty expressed in the relative confidence interval results from between-imputation variance, which could indicate extreme or inconsistent matches. We looked for confidence intervals that were, in our judgment, narrow as a proportion of point estimates. In practice, nearly all of the subgroups we are choosing to report have confidence intervals smaller than plus or minus 3.5 percent of point estimates. 3. We evaluated the percent of imputed values across important subgroups of the data. “Percent of imputed value duplicates” is a diagnostic column to test for sparseness of imputation matches among the 30 imputed values for each imputed contract award. We determined the number of duplicate imputation draws among the 30 imputed values for each observation, which could indicate sparseness in the number of suitable matches or overfitting of the model. We intended to inspect any finding with more than about 5 out of 30 (17 percent) duplicated imputation draws; in practice, however, this threshold was not reached for any subsets of the data that we have chosen to report. 4. We compared estimates resulting from our imputation methodology to published EU reports across important subgroups of the data. “Alternative estimate (EU’s missing value methodology)” shows the results of replicating a methodology for correcting missing data described in EU documents and used for some EU reports. The EU methodology is based primarily on the average value of contracts that are present in the dataset. This provides a general point of comparison, allowing us to determine which subsets of the data are likely to be responsible for estimation differences with prior EU publications. This comparison methodology therefore provides a benchmark but not a diagnostic for the imputation models. There are several important differences between our imputation methodology and the EU’s methodology. a. Calculation of confidence intervals: The EU’s methodology results in the same value substituted for every contract award of a given type (construction goods, and services). As such, it is not possible to estimate confidence intervals for a given observation or group of observations using this methodology. In contrast, the multiple imputation models include estimates of uncertainty. b. Distortion of subgroup averages: The EU’s methodology is not sensitive to differences in group averages apart from contract type. As a result, it may distort subgroup averages. For example, if hypothetical Country A has services contracts that average $100 but the overall average for services contracts is $1,000, substituting the overall average into missing values for Country A as the EU methodology would have the effect of significantly distorting Country A’s characteristics. In contrast, the imputation models we used are designed to be sensitive to all significant reported differences in contract awards because we included all reported variables in our imputation models. To report on Norway procurement data in the TED database for 2015, we needed to take steps to address missing contract award values (153 of 1,319 missing, or about 11.5 percent). The scale of the missing values is thus smaller than for the EU data, while the dataset as a whole is too small, in our judgment, to support correction through an imputation model. Our statistical tests found no evidence that contract award values were conditionally missing at random. Thus, we assume that the data are missing completely at random and corrected the missing data using post- stratification estimation techniques. To do so, we treated the database of contract awards as the full population of such contract awards, which provides the full joint distribution of contract attributes. We treated the complete observations (88.5 percent of the total) as our sample of this population. Post-stratification adjusts the sampling weights for this sample so that the joint distribution of post-stratifying variables, which we selected based on our reporting needs, matches the known population joint distribution. Based on the resulting confidence intervals, we determined that the post- stratification sampling results in data are sufficiently reliable for subsets defined by foreign status and contract type (see table 20) or by foreign status and GPA coverage (see table 21). Kimberly Gianopoulos, (202) 512-8612 or gianopoulosk@gao.gov. In addition to the contact named above, Adam R. Cowles (Assistant Director), Marisela Perez (Analyst-in-Charge), Gergana T. Danailova- Trainor, Ben Bolitzer, Andrew Kurtzman, and Julia Kennon made major contributions to this report. James Ashley, Peter Choi, David Dayton, Christopher Keblitis, Grace P. Lui, John Yee, and Timothy Young provided technical assistance.", "summary": "Globally, government procurement constitutes about a $4 trillion market for international trade. However, little is known about foreign sourcing in government procurement—how much governments procure from foreign-located suppliers or how much they acquire in foreign-made goods. GAO was asked to review the extent of foreign sourcing in government procurement across countries. GAO focused on the United States and the other six main parties to the GPA and NAFTA, selected international agreements that open procurement markets on a reciprocal basis. This report, the fourth of a related series, (1) provides broad estimates of foreign sourcing by the U.S. government and central governments of the other six main parties, and (2) assesses foreign sourcing as a share of estimated central government procurement and of estimated procurement by all levels of government, and the extent to which central government contracts that are covered under selected international procurement agreements are foreign-sourced. GAO analyzed the most recent comparable data available from two sources: (1) government procurement databases used in Canada, the European Union, South Korea, Mexico, Norway, and the United States, for 2015, and (2) 2014 trade data merged with data on the types of goods and services purchased by the public sector. Since Japan does not have a government procurement database, data for Japan were based on its 2015 GPA submission of 2013 data. GAO also interviewed cognizant government officials in Washington, D.C.; Ottawa, Canada; Mexico City, Mexico; Seoul, South Korea; and Tokyo, Japan. The U.S. government awarded contracts valued at about $12 billion to foreign-located firms, of which about $5 billion went to firms with reported locations in the other six main parties to the World Trade Organization Agreement on Government Procurement (GPA) and the North American Free Trade Agreement (NAFTA) (see figure). Conversely, government procurement databases indicated the central governments of these parties awarded an estimated $7 billion to foreign sources, out of which about $2 billion was U.S.-sourced. Canada and Mexico awarded most of the U.S.-sourced contracts. GAO was able to determine that the U.S. government awarded more, by contract value, to foreign-owned firms located abroad than to foreign-owned, U.S.-located firms. Moreover, more than 80 percent of U.S. government contracts awarded to foreign-owned firms located abroad were Department of Defense contracts performed abroad. Overall, while available contract data enable broad cross-country comparisons, they do not necessarily show where the goods are produced, where the services are delivered, or where the profits go, among other economic effects. Foreign sourcing by the seven GPA and NAFTA parties within the scope of the study, using two alternative methods, is less than 20 percent of overall central government procurement. Foreign sourcing by central governments, estimated from government procurement databases of the United States and the other six main parties, varied in value by party from about 2 to 19 percent of overall central government procurement. Foreign sourcing by all levels of government, estimated from data on trade and public sector purchases, showed that the governments' imports likely ranged from about 7 to 18 percent of the goods and services the governments purchased. In addition, contract data show that U.S., South Korean, and Mexican central government foreign sourcing was greater in value under contracts covered by GPA and NAFTA than under noncovered contracts, but the opposite was true for Canada and Norway. For the European Union and Japan, GAO found little difference or could not calculate an estimate.", "document_type": "gao"}
{"report": "The Air Force operates several types of RPAs: the MQ-9 Reaper; RQ-4 Global Hawk; and RQ-170 Sentinel. The MQ-9 Reaper RPA community has about four times the number of pilots and eight times the number of sensor operators assigned as compared to the next largest RPA community (the RQ-4 Global Hawk). Additionally, the MQ-9 Reaper RPA provides persistent intelligence, surveillance, and reconnaissance and strike capabilities against high-value, fleeting, and time-sensitive targets. It is operated by an aircrew that includes an officer pilot and enlisted sensor operator. See figure 1. The Air Force RPAs operate remote split operations, which divides the control of the RPA among geographically separated units. Remote split operations employ a launch and recovery ground control station unit aircrew who controls the RPA’s take-off and landing at an overseas operating location while a crew based in the continental United States (i.e., the Mission Control Element unit) flies the RPA the remainder of the mission via electronic links. Remote split operations result in fewer personnel deployed overseas, consolidates flying multiple aircraft from one location, and as such, simplifies command and control functions as well as the logistical supply challenges for the weapon system. RPA operations include Active Duty and Air National Guard personnel and locations. Figure 2 shows the location of bases involved in RPA training and MQ-9 Reaper RPA operational locations with the active-duty sites bolded. Over nearly two decades, the number of combat lines and flying hours for RPAs has grown substantially. Specifically, in 2008, the Air Force flew 33 RPA combat lines but in 2015, the number had increased to 60 RPA combat lines. A combat line is the measure of the capability to provide near-continuous 24-hour flight presence of an RPA over a specific region on Earth, to include time flying to and from a specific target area. In doing so, the RPA can provide air action against hostile targets that are in close proximity to friendly forces, gather intelligence, or, if necessary, employ its weapons to strike identified targets. Additionally, the number of combat flying hours has also increased from calendar year 2000, as shown in figure 3 below, and reached 4 million cumulative combat hours in March 2019. In March 2016, General Herbert J. Carlisle, then-commander of Air Combat Command, testified to the Senate Armed Services Committee’s Subcommittee on Airland that the RPA enterprise has been “a victim of its own success” with “an insatiable demand for RPA forces” that was taxing the capability of the community. To meet the demand for RPA pilots, the Air Force has pursued efforts to increase the number of RPA pilots. For example, the Air Force trained traditional manned-aircraft pilots to fly RPAs and placed graduates of manned-aircraft pilot training into RPA training rather than in advanced manned-aircraft training. In 2010, the Air Force created a dedicated RPA pilot career field (i.e., 18X specialty code) and developed a training program for pilots who specialize in flying RPAs. In December 2013, there were 1,366 Air Force RPA pilots, of which 249 were dedicated RPA pilots (18 percent). Six years later, in December 2019, the number of total Air Force RPA pilots had grown to 1,768, with 1,127 of those being dedicated RPA pilots (64 percent). MQ-9 Reaper RPA pilots and sensor operators complete multiple phases of training designed to generate combat mission capable aircrews within approximately a year of starting training. First, the pilots initially attend RPA Flight Training in Pueblo, Colorado, and then Undergraduate RPA Training at Randolph Air Force Base, Texas, which includes instrument qualification in simulators and an RPA fundamentals course. Second, they complete MQ-9 Initial Qualification Training at the formal training unit at either Holloman Air Force Base in New Mexico, March Air Reserve Base in California, or Hancock Field Air National Guard Base near Syracuse, New York. Finally, they are assigned to an operational squadron, where they complete unit-specific Mission Qualification Training that can vary in length. According to officials at two RPA bases, their respective Mission Qualification Training was taking between six to 10 weeks or as much as 17 weeks to complete. MQ-9 Reaper RPA sensor operators go through a similar pipeline. They complete courses on aircrew fundamentals and the basics of being a sensor operator at Lackland Air Force Base, Texas, and Randolph Air Force Base, Texas, respectively. Then, they complete training at the MQ- 9 Reaper RPA formal training unit at Holloman Air Force Base, New Mexico; March Air Reserve Base, California; or Hancock Field, Syracuse, New York. Finally, they complete unit-specific Mission Qualification Training in the operational unit at which they are assigned after graduation. Figure 4 shows the MQ-9 Reaper RPA aircrew training pipeline. The Air Force does not have enough RPA pilots and sensor operators to meet its staffing targets, and it does not track its overall progress to access and retain sufficient quantities of RPA personnel that is needed to implement its combat-to-dwell policy as planned. More specifically, the Air Force has not consistently met its accession targets for RPA pilots and sensor operators and has had fewer RPA pilots and sensor operators than it has needed for most years between fiscal years 2016 through 2019. The Air Force has offered financial retention incentives to RPA pilots and sensor operators; however, it does not directly measure RPA pilot and sensor operator retention rates and retention concerns exist. Moreover, the Air Force does not track the overall progress being made from its accession and retention efforts to maintain a sufficient quantity of RPA pilots and sensor operators needed to implement as planned its combat-to-dwell policy—a policy intended to better balance RPA units’ time in combat operations with time spent away from those operations to accomplish other activities such as training. The Air Force met its accession targets for its RPA pilots in only one year during fiscal years 2015 through 2019 and it did not meet any of its sensor operator accession targets during those years. However, this is not a new trend. In 2014, we reported that the Air Force did not achieve its accession targets for RPA pilots in fiscal years 2012 and 2013 and recommended that the Air Force develop a tailored accession strategy for RPA pilots to help ensure that it can meet and maintain required staffing levels to meet its mission. The Air Force concurred with the recommendation and took steps to address accession issues for RPA pilots, such as having officers with RPA pilot experience serve at the U.S. Air Force Academy as instructors and as ROTC detachment commanders and instructors at several large, nationally recognized universities, thus giving attention to the career field among future Airmen. Because of these actions to address RPA accessions, the Air Force met the intent of our recommendation. Since then, however, the Air Force has not consistently met its annual accession targets from fiscal years 2015 through 2019, as shown in figure 5. As shown in figure 5, for the 5-year period between fiscal years 2015 and 2019, the average accession target fill rates for pilots and sensor operators were 95 and 88 percent, respectively. Air Force officials told us that they do not believe the RPA pilot career field is facing an accessions problem and thus there is no need to offer an accession bonus because the overall population of RPA pilots has been steadily growing year after year. These officials attribute the trend to the appealing RPA mission. Participants in 12 of 14 focus groups we conducted agreed that the ability to affect front line combat operations and missions every day was a positive aspect of the job. For sensor operators, Air Force officials told us that the number entering active-duty service reflects the number who had finished Basic Military Training and their first RPA-specific training course. These numbers would have been higher but Air Force officials stated they have determined that about 11 percent are disqualified during Basic Military Training sensitive skills screening. This screening involves identifying individuals upon entry into the service with behavioral or mental health issues and is used for, among other things, determining a trainee’s job classification and qualification for sensitive occupations. According to Headquarters Air Force officials, the 711th Human Performance Wing at Wright Patterson Air Force Base, Ohio, has ongoing research to help better identify the right types of airmen for RPA positions beyond the vocational aptitude battery test given to determine how qualified an enlistee is for certain occupations. They said that they expect the results of that research to be disseminated in early fiscal year 2021. According to Air Force data, the service has had fewer RPA pilots and sensor operators as compared to both their respective requirements and authorizations for almost the entire time between fiscal years 2016 through 2019. More specifically, the number of RPA pilot and sensor operator requirements has increased every year in support of the Air Force’s plan to create a new wing by 2024 that is needed to implement the combat-to-dwell policy. These Air Force requirements represent minimum essential resources needed to accomplish approved missions and functions that are valid, unconstrained, and realistic. After establishing the number of required positions, the Air Force fills these required positions to the extent possible based first on the number of those positions funded by Congress (i.e., authorizations) and then the number of trained and qualified personnel available to assign to those positions. Since fiscal year 2016, the overall number of authorized and assigned Air Force RPA pilots and sensor operators has increased. However, for a majority of the time in fiscal years 2016 through 2019, the Air Force’s number of assigned RPA pilots and sensor operators were less than both of their respective authorizations and requirements, as shown in figures 6 and 7. The overall number of assigned RPA pilots has increased; however, this trend has not been enough to meet the increased number of authorized positions in this RPA career field. For example, for RPA pilots, there was a 22-percent gap between authorizations (1,168) and assigned (908) in August 2015 which was similar to the 20-percent gap between authorizations (1,652) and assigned (1,320) in September 2019. The Air Force’s Rated Officer Retention Analysis report for fiscal year 2019 states that each of the four rated groups (pilots, combat system officers, air battle managers and RPA pilots) ended fiscal year 2019 in a deficit. Current projections indicate that the pilot deficit will continue into the near future. The report went on to say that while the number of assigned RPA pilots actually grew in fiscal year 2019, increases in the requirements for this career field reduced or negated the effect of the increase. Additionally, there was less than a 10 percent gap between the number authorized and assigned sensor operators during fiscal year 2016. However, by September 2019, a gap of 28 percent had developed (1,277 authorizations versus 919 assigned). To encourage the retention of RPA pilots and sensor operators, the Air Force has provided financial incentives for many years. For example, the National Defense Authorization Act for Fiscal Year 2017 authorized RPA pilots to receive aviation incentive pay up to $1,000 a month and an aviation retention bonus up to $35,000 to those who are willing to extend their service. In addition, the Air Force has offered a number of financial incentives to RPA sensor operators. At various times in January 2010 through November 2019, RPA sensor operators were eligible for monthly aviation incentive pay, critical skills incentive pay, or special duty assignment pay to address retention issues and have occasionally been eligible for Selective Retention Bonuses. In November 2019, the Air Force offered a Selective Retention Bonus to RPA sensor operators who were eligible to reenlist and had between 17 months to 6 years of military service. To measure long-term retention trends among pilots other than RPA pilots, the Air Force calculates two retention metrics—the Cumulative Continuation Rate and the Total Active Rated Service rate. However, the number of RPA pilots (i.e., Air Force Specialty Code 18X pilots) is still too few to have enough data to calculate reliably these standard retention metrics since the career field was not established until 2010. Officials at Headquarters Air Force and Air Combat Command told us that to calculate the Total Active Rated Service metric, the Air Force would need about 20 years of data; however, the RPA pilot career field is too new to have that amount of data. These RPA pilots have a 6 year Active Duty Service Commitment, which begins at the end of their undergraduate RPA training at Randolph Air Force Base. According to Air Force officials, the first group of 18X pilots’ service commitments ended in fiscal year 2019. Senior leaders at an RPA base we visited said that due to the newness of the RPA pilot 18X career field, the Air Force does not currently have enough historical data to help predict retention trends going forward. They also noted that until the combat-to-dwell policy is implemented, it is unknown what effect it will have on RPA personnel retention. According to Air Force officials, the Air Force tries to retain about 60 to 65 percent of those who have completed their initial service commitment and are eligible to be retained. However, this target is based on the average aviation retention bonus acceptance rates (i.e., the percentage of pilots accepting the retention bonuses) for healthy and established career fields where the number of required positions are not substantially increasing and which are able to meet between 95 to 100 percent of their staffing requirements. However, as previously discussed, RPA pilot requirements have increased about 74 percent in the 5 years from fiscal years 2015 through 2019. Therefore, these Headquarters Air Force officials stated that use of the 60 to 65 percent target may not be an appropriate target for RPA pilot retention. In the case of RPA pilots, if the Air Force met that target, Air Force officials said the service would still be understaffed due to the growing requirements, so the retention target would need to be higher. Further, they stated that while aviation retention bonus acceptance rates are leading indicators of retention, they are not measures of actual retention rates and there are limitations to using this approach. For example, one limitation is that pilots may choose to stay in the Air Force but not take the aviation retention bonus to exercise more control and flexibility over their career. In these cases, actual retention would be higher than the aviation retention bonus acceptance rate suggests. According to the Air Force’s annual Rated Officer Retention Analysis reports we reviewed, the combined aviation retention bonus acceptance rates for RPA pilots both with and without previous manned aircraft experience completing their initial service commitment were approximately 55 percent in fiscal year 2016, 64 percent in fiscal year 2017, and 60 percent in fiscal years 2018 and 2019. Our comparison of the aviation retention bonus acceptance rates for RPA pilots with previous manned aircraft experience to those without that experience suggests that the pilots without that experience have consistently had lower bonus acceptance rates, as shown in table 1. As far back as April 2014, we reported that there were indications the Air Force could be facing challenges retaining RPA pilots in the future. Despite the existence of incentive payments, pilots in seven of the 10 focus groups we conducted at that time indicated that retention of RPA pilots was or would be a challenge. We recommended that the Air Force develop a retention strategy that was tailored to the needs and challenges of the RPA pilots to help ensure the Air Force could meet and retain required staffing levels to meet its mission. The Air Force took some steps to address RPA pilot retention, such as expanding RPA operations to an additional base to increase assignment choices and decreasing the number of combat lines that RPA aircrews were flying to reduce their workload. Further, in July 2018, officials said that the Air Force established a new division at Headquarters to serve as a focal point for overseeing RPA personnel matters for the service. Because of these actions to address RPA retention, the Air Force met the intent of our recommendation. However, in our current review, we found indicators of concern regarding RPA pilot retention. For example, officials in varying leadership positions in the Air Force raised concerns about RPA pilot retention. Air Combat Command officials stated that they assume that about 30 percent of RPA pilots each year will have to be replaced due to attrition. Senior leaders at one RPA base that we visited told us that not having dwell time as a break from constant combat operations negatively impacts RPA personnel resiliency and retention. They said that to get a break from combat operations, RPA personnel turn to the Air National Guard or separate. They noted that people join the Air Force to see and do things, not to be exposed to constant combat operations in less than appealing locations. Further, according to RPA officials, personnel stated in exit interviews that they wanted more temporary duty opportunities, deployments, exercises, and other opportunities for better career development. Similarly, senior leaders at another location we visited said that the lack of training and leadership opportunities affects retention. They noted that there are hundreds of pilots at Creech Air Force Base, but only one wing commander, and this has a chilling effect given the limited leadership opportunities available. With regard to RPA sensor operators, Headquarters Air Force officials stated that the Air Force does not have an RPA-specific sensor operator retention goal, but rather it generally aims to retain about the same amount as other career enlisted aviator career fields have historically retained, which is about 70 percent. However, according to a February 2017 memorandum, the RPA sensor operators experienced a steady decline in retention since 2012. This memorandum requested Special Duty Assignment Pay for RPA sensor operators stating that airmen in this career field were placed under enormous personal and professional demands. It also stated that in a 2-year sample, 2014-2016, the Air Force Personnel Center reported a 31 percent reenlistment decrease for first term RPA sensor operators, a 7 percent decrease for second term RPA sensor operators, and a 16 percent decrease for career RPA sensor operators. Specifically, the memorandum said that in 2016 the reenlistment rates for RPA sensor operators were 44 percent, 54 percent, and 74 percent for first-term, second-term, and career RPA sensor operators, respectively. In comparison, these rates were 19 percent, 22 percent, and 16 percent lower than the average rate across all Air Force Career Enlisted Aviators. The Air Force approved this Special Duty Assignment Pay for RPA sensor operators effective in November 2017. Additionally, effective October 2018 and again in July 2019 and November 2019, RPA sensor operators were eligible to receive Selective Retention Bonuses. Coinciding with the start of these financial incentives in fiscal year 2018, Air Force data showed increases in RPA sensor operator reenlistment rates as compared to fiscal year 2017 reenlistment rates (see table 2). While Air Force data show improvements in RPA sensor operator reenlistment rates, officials we spoke with shared concerns about retention-related issues specifically regarding sensor operators. For example, a senior leader at one RPA base we visited said that there is an acknowledged retention problem within the sensor operator community citing one of the factors being the perception among sensor operators that private contractors pay more than the Air Force. An Air Force document justifying the Selective Retention Bonus states that contractors are targeting experienced RPA sensor operators for six-figure salaries of greater than $100,000 per year. Similarly, a senior leader at one RPA base we visited stated that contractors are paying sensor operators 2 to 4 times as much as the Air Force does, essentially making the Air Force a pipeline for RPA personnel to become government contractors. Moreover, participants in each of the senior RPA sensor operators (i.e., E5-E9) focus groups that we conducted told us that they thought the retention bonuses and financial incentives were too small to matter in their retention decision- making. In a questionnaire we administered to the 105 participants across the 14 focus groups, nearly half (19 of 41) of the sensor operators responded they were “somewhat dissatisfied” or “very dissatisfied” with their total compensation versus 20 percent (13 of 64) of pilots who responded they were “somewhat dissatisfied” or “very dissatisfied.” The Air Force does not track its overall progress of accessing and retaining sufficient quantities of RPA pilots and sensor operators needed to achieve its goal of implementing the combat-to-dwell policy in fiscal year 2024. Specifically, in a February 2018 briefing to Congress, the Air Force stated it planned to fully implement the combat-to-dwell policy in fiscal year 2024. Headquarters Air Force officials stated that in order to meet this 2024 goal, the Air Force is working to increase the number of trained RPA pilots and sensor operators through its accession, training, and retention efforts because they said it cannot implement the combat- to-dwell policy if it lacks sufficient quantities of available personnel. Several senior leaders at each of the locations we visited discussed the importance of achieving and sustaining a sufficient level of staffing that is needed to implement the dwell policy. One senior leader emphasized that the Air Force made “getting to dwell” its cornerstone promise. Officials stated that pilots and sensor operators are currently only able to accomplish training that can be done while completing combat missions because the RPA personnel are currently flying 24/7 combat missions. The January 2017 combat-to-dwell policy emphasized the need for the implementation of dwell time within the RPA community to allow these units to focus on either combat operations or training, but not both at the same time. This policy states that it is essential for preventing future risk to the mission and preserving the combat capability of the RPA force. Headquarters Air Force officials stated that they were hopeful that implementing the combat-to-dwell policy would improve quality of life and reduce burnout among RPA personnel by allowing them to take a break from combat operations to give them time to rest and train. Officials acknowledged that poor quality of life conditions for RPA personnel negatively affects retention. According to an Air Force instruction related to the RPA community, it is important to build a sustainable and healthy force and retention affects virtually all aspects of the Air Force’s effort to meet its goal of attaining the proper number of aircrew personnel. Further, it states that understanding the connection between the accession of new recruits, the training and production requirements of new aircrew members, and the ability of units to absorb newly trained aircrews into the structure and operations of the forces is critical to maintaining a healthy aircrew force and to achieve Air Force goals. However, the Air Force does not know its overall progress toward achieving its goal of having sufficient quantities of RPA pilots and sensor operators to implement the combat-to-dwell policy in fiscal year 2024 as planned. Thus far, Headquarters Air Force officials said that the Air Force has been focused on retaining as many RPA pilots and sensor operators as possible in an effort to meet the increasing staffing authorizations. The Standards for Internal Control in the Federal Government states that management should track achievements and actual performance, compare to plans, goals and objectives and analyze significant differences. Specifically, officials explained that it does not have a comprehensive metric (or set of metrics) which allows them to track changes in the number of its RPA pilots and sensor operators from its combined accession and retention efforts over a projected timeline. This prevents the Air Force from being able to compare its progress against its goal of having sufficient numbers of RPA pilots and sensor operators to fully implement the policy as planned by fiscal year 2024. The Air Force RPA officials stated that the Air Force does not have a metric (or set of metrics) that measures a “glide path to health and stability of the RPA workforce” by balancing both accessions and retention of RPA personnel in order to know when changes might be needed over time to achieve the goal of implementing the combat-to-dwell policy. Without such a metric (or a set of metrics), it is unclear whether the Air Force is on track to have enough RPA pilots and sensor operators to achieve implementation of its combat-to-dwell policy or to know if adjustments are needed to its accession and retention efforts or to the policy’s implementation timeframe. Taking such action is critical for the Air Force to be able to position itself to address long-standing RPA pilot and sensor operator shortages and documented challenges in the management of these communities through its combat-to-dwell policy. Absent such action, a key component of the Air Force’s workforce will not be well-positioned to meet its mission for the nation. The number of active-duty RPA pilot and sensor operator instructor positions required at the Holloman formal training unit are understated and do not reflect the current training instructor needs. More specifically, the number of instructor positions needed were developed using a 2009 program of instruction with a length of 49 training days and were never updated to reflect changes to the syllabus length, which as of July 2019, was 83 training days. Air Force documentation showed that if 100 percent of the formal training unit’s currently identified active-duty instructor positions were filled, they could provide only 47 percent of the total course instruction currently identified. To provide the rest of the course instruction, the formal training unit relies heavily on contractors. Air Force information shows that, as of July 2019, contractors provided 53 percent of instruction, active-duty personnel provided 27 percent, and 20 percent remained unaccomplished (i.e., not provided). The Standards for Internal Control in the Federal Government states that management should use quality information to make informed decisions to achieve its objectives. Quality information is, among other things, current, complete, and accurate. Further, a 2017 report to Congress on the implementation progress of the Air Force’s actions to ensure a sustainable RPA operational force stated having maximum instructor staffing was critical to generating new RPA pilots. However, the Air Force continues to use the out-of-date, inaccurate, and incomplete number of active-duty RPA pilot and sensor operator instructor position requirements that were originally developed based on the 2009 program of instruction. Without using quality information, the Air Force does not fully know the number of active-duty RPA pilot and sensor operator instructor positions necessary for sufficiently training RPA aircrews. As such, it may not be fully addressing the challenges affecting the training unit’s staffing and ability to produce the needed number of aircrews to support the continued demand for RPAs and the implementation of its combat-to-dwell policy as planned. Since fiscal year 2016, the Holloman formal training unit has been unable to meet the authorized instructor position staffing levels even though the numbers of those positions are based on an out-of-date number of training days from the 2009 program of instruction that underestimates actual instructor requirements. In 2015, top senior Air Force leaders developed the Get Well Plan, and the Secretary of the Air Force and other top senior leadership helped develop the plan’s two goals to staff 100 percent of the positions for (1) instructors at the RPA pilot school and (2) combat RPA pilots. In the March 2017 report to Congress, the Air Force again emphasized that maximum instructor staffing was critical to generating new RPA pilots and that it had achieved this goal as planned and it would stabilize and sustain the Get Well Plan’s goals into the future. We found that both the number of RPA pilot and sensor operator instructors assigned peaked at the end of 2016 and early 2017 in accordance with this Air Force goal. However, the assigned numbers of both RPA pilot and sensor operator instructors have not stabilized or been sustained and have fallen since that time as shown in figures 8 and 9. Specifically, authorized RPA pilot instructor positions within the three RPA training squadrons at Holloman Air Force Base (i.e., the 6th, 9th, and the 29th squadrons) were filled at 75 percent (110 of 147) as of September 2019. That fill rate is almost 20 percent less than the highest fill rate for these positions in March 2017 (137 of 147, or 93 percent). Similarly, authorized RPA sensor operator instructor positions within these same training squadrons as of September 2019 were filled at 58 percent (82 of 141), down from the highest fill rate of 91 percent (128 of 141) in November 2016. A training official explained that the inability to maintain the level of staffing, even when considering it was an underestimation of the true requirement, is an example of the issues experienced in the RPA community. He stated that when RPA pilots and sensor operators at squadrons leave the Air Force that means there are fewer of them overall available to conduct the missions and to be sent to the formal training unit to serve as instructors. Fewer instructors at the training unit means a greater workload on the instructors already there, which affects the morale of the instructors and may result in those individuals leaving the Air Force. It also limits the ability of the formal training unit to meet the expectations of producing newly trained aircrews that are supposed to fill the staffing need at the squadrons. Overall, this cycle contributes to the challenge the Air Force faces in being able to retain and produce RPA pilots and sensor operators. Moreover, the gap in instructor staffing is compounded by a majority of instructors arriving at the Holloman formal training unit not having prior operational squadron-level instructor experience, according to training officials. According to an Air Force instruction regarding RPA training, any aircrew member designated for instructor duties at a formal training unit should already be an instructor in the applicable aircraft. However, for example, at Holloman’s formal training unit, officials told us that for the training session from August 2019 to May 2020, 17 of 25 of the new incoming instructors did not have previous squadron-level instructor or evaluator experience. In these instances, they said the new instructors would need additional training to qualify them fully to teach certain classes. According to training officials, being an instructor at a formal training unit is not the same as being an instructor at an operational squadron. For example, in an operational squadron, an instructor is expected to take an individual that is fully qualified in the aircraft and get them up to speed on the squadron’s specific mission and to assist in increasing the squadron’s overall level of efficiency through continued supervised training. At the formal training unit, however, instructors are laying the foundation for new aircrew students that are not familiar with the aircraft, its operation, or its various mission sets. Officials stated that because the formal training unit is receiving inexperienced instructors rather than fully qualified ones, the training unit must provide more upgrade training to these student instructors to qualify them to teach any classes. While the instructors are going through the upgrade and any other training needed to become fully qualified, they are filling an instructor staff position but not fully contributing to the development of new RPA pilots or sensor operators. Air Force training officials acknowledge that staffing at its Holloman formal training unit is a concern and that they need more instructors. They said that shortening the length of training was one approach to addressing the instructor gap and, in June 2019, the commander of the 19th Air Force (Air Education and Training Command) directed syllabus modifications. According to training officials, the modifications suspended about 15 percent of the training and thereby, shortened the length of the course. These modifications are scheduled until the end of October 2020 unless deemed necessary to extend them into fiscal year 2021. In 2015, the Air Force developed over 140 initiatives to address quality of life challenges facing its RPA units but has not fully implemented them. While the Air Force has been aware that the RPA community faces such issues as work-related physical and mental ailments, lack of base services, and other challenges to its quality of life, long-standing concerns we have identified previously, as well as others, remain. The Air Force’s Air Combat Command established the Culture and Process Improvement Program (CPIP) in 2015 to identify and address stress and quality of life issues within the Air Force’s MQ-1 Predator and MQ-9 Reaper RPA communities. This effort collected nearly 2,500 inputs from the RPA community through surveys and in-person engagement. Following this input, the Air Force developed over 140 initiatives to address concerns in eight different areas, such as missions, quality of life, locations and basing options, and training. These initiatives varied widely in scope and specificity and they addressed the RPA enterprise, such as pilots, sensor operators, intelligence personnel, and maintainers across active-duty personnel and the Reserve component. In February 2018, the Air Force briefed Congress, reporting that 57 percent of CPIP initiatives were complete and 43 percent were ongoing. According to Air Force officials, examples of initiatives completed include: expanding RPA combat operations to Shaw Air Force Base, South Carolina, to provide additional assignment options; establishing an advanced weapons instructor course specifically for redesignating MQ-9 Reaper RPA squadrons from “Reconnaissance” to “Attack;” establishing a medal to specifically recognize the contributions of personnel that operate and support the RPA enterprise; and, authorizing RPA aircrews to log combat time when flying an aircraft within designated hostile airspace, regardless of the aircrew’s physical locations. The CPIP report finalized just over a year later in June 2019 states that the Air Force had achieved “an almost 90 percent solution” and the most significant of the initiatives had been accomplished. It went on to say that there were 17 initiatives remaining open at that time and that the Air Force would no longer track those initiatives because they had reached the point of diminishing returns. Additionally, the office established to track the CPIP initiatives was closed because Air Combat Command officials told us that the office is no longer needed and all remaining initiatives have been staffed to other offices of primary responsibility. However, in our review, we found examples of quality of life initiatives labeled complete where the objective had not yet been fully achieved. Examples we found include: an initiative to create a new MQ-9 RPA wing to be led by an RPA pilot was labeled with a status of “complete” even though Headquarters Air Force officials confirmed that no new MQ-9 Reaper RPA wing has yet been created; an initiative to have aircrews’ shiftwork schedules rotate every 4 to 6 months; however, each of the squadrons at the RPA operational bases we visited had a shift work schedule that rotated for 5 to 8 weeks; an initiative to grant appropriate clearances to allow medical and chaplain personnel into all RPA operational areas; however, at one location we visited, medical officials and a chaplain we spoke with said that they do not have the required clearance levels to meet with RPA personnel within their secured facilities; two initiatives to improve spousal opportunities, although one vaguely stated that the “Air Force should think big and think flexible as it needs to consider society’s shift to the two-income family” and the other called for providing better family services and support. However, we found that while these services may exist at RPA bases, they are not always accessible to RPA personnel or their families for a variety of reasons, as we discuss below; an initiative to provide childcare support for workers performing 24/7 operations, although we found childcare was not available at certain facilities we visited; and, an initiative to make Creech Air Force Base its own installation, add a Missions Support Group, and improve base infrastructure and services. Creech did receive its own command authority and is no longer an auxiliary facility under Nellis Air Force Base and a Mission Support Group was established in July 2019. However, its plans to create officer and non-commissioned officer housing and an additionally medical facility are not expected to be completed until between fall 2021 and fall 2022, according to a Creech official. According to Air Force officials, an initiative marked as “complete” means that the Air Combat Command CPIP office had completed its portion of the initiative and another Air Force entity had taken it over for further action as necessary and may still be in process. Therefore, the 57 percent of initiatives that the Air Force reported to Congress in February 2018 as completed and the “almost 90 percent solution” discussed in the June 2019 CPIP final report may not present a transparent account of what has been completed and what remains to be accomplished. Reporting planned tasks as “complete” as the Air Force did could create perception gaps regarding the effects of CPIP. Interviews we had with senior leaders at multiple bases yielded concerns that CPIP is effectively over without accomplishing key objectives and that CPIP is going to be perceived as a failed promise by the Air Force. Along with the CPIP initiatives developed in 2015 as discussed above, academic studies published since 2010 and our previous 2014 report on RPA job dissatisfaction identified challenges facing the RPA community. For example, in April 2011, a study by researchers at the U.S. Air Force School of Aerospace Medicine found that there are several important operational stressors to consider when assessing the health and well- being of RPA operators. More specifically, the researchers noted, for many operators that participated in the study, the most commonly cited stressors associated with occupational stress included, but not limited to, the following: (1) long hours and low manning; (2) frequently changing shift work and shift changes; (3) geographically undesirable locations; (4) limited base resources and rural settings; and (5) human-machine interface difficulties such as poor ergonomics and temperature control of work stations. The study concluded that it stood to reason such stressors could lead to both physical and psychological distress when faced on an unending basis. Three years after the issuance of that study, in April 2014, we reported that RPA pilots faced multiple, challenging working conditions, including work shifts that frequently rotate, long hours, and increased workloads. More specifically, we reported in 2014 that In seven of the 10 focus groups conducted at that time, RPA pilots said continuously rotating to new shifts disrupted their ability to spend time with their family and friends and caused sleep problems. They said that these changes to their sleep schedules resulted in significant fatigue both at home and when they returned to work. In seven of the 10 focus groups conducted at that time, RPA pilots described working long hours because, for example, they had to perform administrative duties and attend briefings in addition to flying their combat shifts. High work demands on RPA pilots limit the time they have available for training and development and negatively affects their work-life balance. During the course of our current review, we heard various positive comments about how RPA pilots or sensor operators like the RPA mission and being able to contribute on a daily basis to combat operations. However, as discussed below, we also found examples of how long-standing challenges that others and we reported about years ago regarding the physical and mental health of RPA personnel and the availability of base support services continue to exist. Shift Work and Sleep Issues In 12 of the 14 focus groups we conducted, participants stated that the frequent rotations are a key challenge of shift work and that their schedules rotated approximately every 5 to 8 weeks. However, members of the Human Performance Team at Creech Air Force Base stated studies have shown that it is better for individuals to stay on shifts for longer periods of time, such as 3 to 4 months, to allow their circadian rhythms to adjust. Additionally, focus group participants told us that rotating shift work is difficult for RPA personnel’s relationships. Participants in 13 of the 14 focus groups indicated that shift work has negatively affected their family or social life. Additionally, rotating shifts and the limited time with family creates a dilemma on weekends for personnel, especially for those on the midnight shift that covers roughly midnight to 8 a.m. These individuals must decide whether to maintain their work sleep schedule which limits time with family, or instead to align with their family’s sleep schedule which limits their ability to adapt to the work schedule. Some comments from participants include “I destroy my circadian rhythm to spend time with my kids” and “Shift work is disruptive to lives. It is hard to be tied into the community. Shift work can be really isolating.” Crew rest is compulsory for aircrew members prior to performing any aircraft operations. Aircrew members are individually responsible to ensure they obtain sufficient rest during a crew rest period. If crew rest is interrupted, individuals should immediately inform appropriate leadership and will either begin a new crew rest period or not perform flight duties. According to health officials at one of the bases, though, it is well known that RPA aircrew members often do not accurately report how much rest they get. Participants in one focus group agreed with this statement and said that they do not want to be restricted from flying and affect the mission and cause the work to fall on other squadron members. Participants in 12 of our 14 focus groups that we conducted stated that it is difficult to get adequate sleep. Sample participant comments include: “I can’t sleep anymore. Before the military, I could get 10 hours of sleep. Now it’s like 2-4. You’re physically and mentally exhausted.” “I feel perpetually tired. I haven’t felt healthy in years.” “We did an internal survey of how much sleep people on nights for months at a time were getting, and it was like 3-4 hours. And they are flying combat for 8-12 hours at a time.” Back, Eyes, and Other Physical Issues In 12 of 14 focus groups, participants said the working environment is harmful to health in areas such as the neck, back, eye, and hearing. Participant comments included: “I’ve been losing hearing …over the last 6 years from computer fans, air conditioning units, the use of multiple communication devices, etc.” “Just sitting in the seat for 8, 10, or 12 hours affects our posture. It is bad on our backs. I didn’t have lower back problems, and I work out a lot, but I started having lower back problems.” “My eyesight has been getting worse.” See figure 10 for an example of a pilot flying a simulated mission in an RPA cockpit. During our site visits for this review, participants in 14 focus groups that we conducted said that maintaining fitness was difficult. They said they are not motivated to work out as they are frequently exhausted after flying long shifts and then completing other extra duties as well. Further, participants in 11 of 14 focus groups told us that nutrition is difficult for RPA crews. For example, participants said that they consume energy drinks, soda, and sugary foods to stay awake during the midnight shift. Studies have shown negative psychological effects on RPA aircrews. An Air Force study from 2010 of the psychological attributes critical to the performance of RPA sensor operators noted it is important that RPA sensor operators be aware prior to training that they would be targeting and destroying enemy combatants. It stated that it was likely that some candidates might choose not to become sensor operators once they fully understand their role in precision-strike operations. These motivational attributes were not deemed critical to performance, but were deemed critical to retention and job satisfaction. Participants in 10 of our 14 focus groups we conducted said that some crew members—either themselves or others—did not initially understand what the job entails, such as killing. One focus group participant noted “the first time you know what you’re getting into emotionally is the first day of training at Holloman, which is too late because you already have wings.” Participants in 13 of 14 focus groups we conducted stated that witnessing or causing violence has a negative psychological impact but two-thirds of our survey respondents (66 of 105) said that the Air Force has not assessed their level of stress and fatigue related to their role as an RPA pilot or sensor operator. A study published in 2018 described how RPA aircrew members are affected by their own actions in combat as well as by connections with either people who they target or support on the ground regardless of the physical distance separating them. One focus group participant commented “F-16s drop and then go. For RPA aircrews, we get in and we are there for 20 hours. We watch who we employ weapons on, then get the battle damage assessment, including seeing body parts…on the ground.” RPA personnel stated that their base’s services are not consistently available to RPA aircrews rotating shifts to conduct missions 24 hours every day or to their families as they live in remote locations. Collectively, participants in all 14 focus groups we conducted expressed concerns about the availability of services such as medical services, childcare, spouse and family support services, and base locations and housing. Some level of health care is provided at each RPA base we visited, but the extent to which these services are available varies. For example, the Cannon Air Force Base mission briefing we received in June 2019 noted some “sustainability challenges” such as the base’s inadequate availability of specialty medical care. The briefing noted that the base had made over 2,000 referrals related to 10 areas of specialty medical care. Additionally, because these referrals were to facilities outside the local area, the base had incurred about $500,000 in travel reimbursements for this medical care—the highest of all Air Force locations—and about $21 million in TRICARE expenses per year, according to officials. Further, we found examples during our site visits of health services without adequate staffing. For example, during our visit to Shaw Air Force Base in May 2019, a medical technician stated that Shaw had two medical technicians for the RPA community though staffing documents state they are supposed to have six medical technicians and two doctors. At Creech Air Force Base, we visited the medical and dental facility and learned that a psychologist position had been unfilled for 9 months as of our visit in August 2019. We also found that the hours of available medical services are limited and not convenient for shift workers such as RPA aircrews. For example, officials at Creech stated occupational therapy is offered only once a month, optometry twice a month, and nutrition on an as-needed basis. In addition, Creech has two family health personnel, a behavioral health officer who is available every Wednesday and Friday, and one flight surgeon who comes over from Nellis Air Force Base is available twice a week. A 2018 internal assessment done for Creech leadership estimated that 20,714 man-hours are wasted each year due to personnel needing to obtain medical services, the equivalent of losing 11.5 people in a given year. To address health issues, Creech Air Force Base has a Human Performance Team that includes chaplains, religious affairs airmen, a psychologist, a mental health tech, and a physiologist. While team members are physically located at Creech, they told us that they are also responsible for RPA units at all the bases under the same wing, including Creech, Ellsworth Air Force Base, South Dakota; Whiteman Air Force Base, Missouri; and Shaw Air Force Base, South Carolina. Further, at Shaw Air Force Base, a religious affairs airman made similar comments about serving a large variety of military personnel, not just the RPA community and a chaplain at Cannon Air Force Base said that he can be assigned responsibility for up to as many as 2,000 to 3,000 people at a time. Childcare is not limited for 24/7 shift workers at certain facilities although a CPIP initiative called for childcare support for workers performing 24/7 operations, citing the Missile Care childcare program offered at Minot Air Force Base. To this end, the Air Force established two programs, RPA Care and RPA 2 Care. The RPA Care program provides additional care outside the normal work hours at no additional cost to members who are already purchasing full-time care from the Child Development Center. However, in 12 of 14 focus groups we conducted, participants said that they found childcare services were of low quality or limited for 24/7 shift workers. For example, Cannon Air Force Base has two Child Development Centers, but they operate Monday through Friday from 6 a.m.to 6 p.m., and focus group participants noted a long waiting list for admission. At Creech Air Force Base, there is no childcare on base and at Shaw Air Force Base, participants said it was difficult finding available childcare to aid RPA personnel working shiftwork. For example, one RPA aircrew member was permanently assigned to the day shift because of childcare issues. Spouse and Family Support Issues RPA personnel have complained about the issues associated with working at remote location, such as the Creech Air Force Base, Nevada, and Cannon Air Force Base, New Mexico, locations. In 9 of 14 focus groups, participants made various comments regarding the limited spousal opportunities and family support issues such as the following: “I got orders to Cannon…. The problem is I’ll be bringing my wife there who has no job opportunities. There will be a lot of military spouses competing for jobs. I’ve already decided I’ll leave at the end of my contract and then will go to the Guard. I’ve told my wife I’ll get out because I don’t want to hurt her quality of life.” “I loved the mission at Cannon, but the facilities and area and schools are absolutely terrible.” “I’m fed up with Cannon and this area in general.” RPA bases vary in housing available for personnel with Cannon and Creech Air Force Bases reporting inadequate housing situations. At Cannon, officials stated that lack of dormitory space was forcing first-term Airmen off base. During our visit in June 2019, Cannon housing officials provided a report that stated that the shortfall in dormitory space continues to put Airmen and the Air Force Special Operations Command mission at risk. The report said that the locations off base where first-term Airmen can afford to live are usually in the worst crime-ridden parts where there is a far greater propensity for trouble. This can create morale issues and a distraction from the mission, according to the report. Additionally, Creech Air Force Base does not have any permanent on- base housing. At Creech, unaccompanied first-term Airmen must live in the dormitories on Nellis Air Force Base, which is approximately 50 miles away. The remoteness of Creech Air Force Base and the lack of basic services offered only at Nellis Air Force Base creates an unusual level of stress brought on by the added time, effort, and expense Creech Airmen experience that those at almost every other continental United States installation do not. In fact, a 2018 internal assessment for Creech leadership calculated that a junior airman who must live at Nellis Air Force Base would have a one-way commuting time of 63 minutes if they drive a personal vehicle or 105 minutes if they take the shuttle. To help address the housing and access to medical facilities, Creech Air Force Base senior officials said that a plan to create officer and non- commissioned officer housing and a medical facility on the northwest side of Las Vegas has been approved, but it is not expected to be completed until between fall 2021 and fall 2022. Many of the RPA workforce issues we identified at the time of our 2014 review continue to exist today. These workforce issues include the challenges to the RPA workforce’s quality of life due to stressful working conditions, including work shifts that frequently rotate, long hours, and increased workloads. In 2017, we recommended that the Air Force should monitor the extent to which its RPA human capital efforts are achieving the Air Force’s overall programmatic goals. The Air Force had not implemented this recommendation as of February 2020. Because long- standing RPA quality of life and workforce management issues affecting RPA personnel continue to exist, we believe that this recommendation is still valid and would aid the Air Force in its efforts to address many of the challenges facing this career field. Therefore, we are not making any additional quality of life related recommendations. A healthy RPA workforce is one that balances supply with demand and addresses quality of life conditions to motivate and sustain performance and retention. Successful efforts to assess, train and retain RPA pilots and sensor operators would allow the Air Force to grow sufficient quantities of its RPA workforce to meet its goal of implementing its combat-to-dwell policy. While the total number of Air Force RPA pilots and sensor operators has increased between 2015 and 2019, the number of positions required to meet the constant demand is increasing at a faster pace. Additionally, the Air Force has not achieved its accession targets for pilots and sensor operators for most of those years. Moreover, the inability to use standard retention metrics due to the newness of the RPA pilot career field is hindering the Air Force’s ability to determine accurately if sufficient quantities of RPA personnel are remaining in the service to grow its RPA workforce. Further, the Air Force currently does not have a comprehensive metric (or set of metrics) to track the overall progress toward having sufficient numbers of RPA personnel through its accessions and retention of RPA personnel to meet its prescribed timeline for implementing its combat-to-dwell policy. This policy is intended to balance the time RPA units spend in combat with non-combat activities, to provide relief from those combat operations that it has conducted constantly for many years, to improve the quality of life of these RPA aircrew members. Without a metric, it is unclear whether the Air Force is on course to achieve implementation of its combat-to-dwell policy. As such, the Air Force cannot know if adjustments are needed specifically to that policy and its implementation timeline or to its overall personnel management efforts to access, train and retain sufficient numbers of RPA personnel. Further, the Air Force previously prioritized having maximum instructor staffing at the training units to help increase the production of new RPA aircrews. However, the number of instructor positions required at the RPA formal training unit at Holloman Air Force Base is out-of-date and does not reflect what is needed to teach the current training curriculum. Additionally, this formal training unit has consistently experienced staffing shortages since fiscal year 2016. As such, without updated information, the Air Force does not know the number of instructor positions necessary for sufficiently training RPA aircrews and it may not fully address the challenges affecting the training unit’s staffing and ability to produce the needed number of aircrews to support the continued demand for RPAs and the implementation of the combat-to-dwell policy as planned. The Air Force developed initiatives with its 2015 Culture and Process Improvement Program to address quality of life issues and other challenges affecting the RPA community, but has not fully implemented them. We also identified workforce management challenges in our previous work. We believe that our prior recommendation that the Air Force monitor its human capital efforts would help address these challenges. We believe the Air Force should implement our prior recommendation to aid the Air Force in its attempts to improve the quality of life issues that still exist within the RPA community. We are making the following two recommendations to the Secretary of the Air Force. The Secretary of the Air Force should ensure that a comprehensive metric (or set of metrics) is established to track the progress of its combined accession and retention efforts to obtain sufficient quantities of RPA pilots and sensor operators needed to achieve its objective of implementing the combat-to-dwell policy as planned. (Recommendation 1) The Secretary of the Air Force should ensure that the number of instructor positions needed at the RPA training unit at Holloman Air Force Base is updated by applying more complete, accurate and timely information to better reflect the training curriculum and instructor needs. (Recommendation 2) We provided a draft of this report to DOD for review and comment. In written comments reproduced in appendix III, the Department of the Air Force partially concurred with our first recommendation and concurred with our second recommendation. In concurring with our second recommendation to ensure the number of instructor positions needed at the RPA training unit at Holloman Air Force Base is updated, the Air Force noted that it has requested an updated study to determine the appropriate number of instructor positions. With regard to our first recommendation—to establish a comprehensive metric (or set of metrics) to track the progress of its combined accession and retention efforts—the Air Force noted that it already has efforts to monitor accession, production, and retention for RPA pilots and sensor operators. Additionally, it expects that standard retention metrics used in other rated career fields will provide increased utility as the RPA career field matures. The Air Force acknowledges in its comments, however, that these efforts could be better integrated to allow for greater analysis, to include tracking progress in meeting the combat-to-dwell policy by 2024. We continue to believe that in developing a specific metric (or set of metrics) the Air Force would be in a better position to evaluate the status of its combined accession and retention efforts to obtain the proper number of RPA personnel to achieve its combat-to-dwell implementation goal. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Secretary of the Air Force. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov . If you or your staff have any questions regarding this report, please contact me at (202) 512-3604 or farrellb@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. To obtain the perspectives of Air Force remotely piloted aircraft (RPA) pilots and sensor operators regarding training, availability of services and support to RPA personnel and their families; quality of life issues; retention issues; and other challenges facing the RPA career field, we analyzed participants’ comments from 14 focus groups at three different RPA operational locations. These locations were: Shaw Air Force Base, South Carolina; Cannon Air Force Base, New Mexico; and Creech Air Force Base, Nevada. We selected Cannon and Creech Air Force Bases because they have the largest population of RPA operators in Air Force Special Operations Command and Air Combat Command, respectively. In addition, we selected Shaw Air Force Base to obtain the perspectives of RPA pilots and sensor operators working at a base with newly established RPA operations since 2018. To obtain a balance of perspectives from RPA pilots and sensor operators with varying levels of experience and responsibilities, we conducted focus group sessions with active-duty MQ-9 Reaper RPA pilots and sensor operators who were divided by their occupation, Air Force Specialty Code, and rank at the selected locations. Specifically, we used the following categories as shown in table 3 for the formation of the focus groups. The 14 focus groups we held ranged in size from five to 11 participants across the three sites with 105 total participants. We conducted five focus groups at Shaw Air Force Base; four focus groups at Cannon Air Force Base; and five focus groups at Creech Air Force Base. Of the 14 focus groups, eight focus groups were with RPA pilots and six focus groups were with RPA sensor operators. These sessions involved structured small-group discussions designed to gather in-depth information that is not easily obtained from other methods. We requested that our point of contact at each location gather approximately 8 to 12 participants to attend the five pre-defined focus groups. We conducted focus groups with RPA pilots and sensor operators separately because they have different roles and responsibilities and to encourage active participation and minimize the risk of participants being the same group as immediate supervisors. We segmented our groups by this characteristic in order to compare and contrast their perspectives on training, retention, and quality of life issues and to identify meaningful similarities and differences. Participants in the focus groups were not randomly selected by using a probability sampling method, but recruited by unit leadership based on shift availability and correspondence with the characteristics we requested. Because scheduling availability was the primary factor affecting participation, coupled with the fact that questions for focus group sessions were not shared in advance, we considered the risk of leadership selectively picking participants to be minimal. Methodologically, focus groups are not designed to (1) demonstrate the extent of a problem or to generalize results to a larger population, (2) develop a consensus to arrive at an agreed-upon plan or make decisions about what actions to take, or (3) provide statistically representative samples or reliable quantitative estimates. Instead, they are intended to generate in-depth information about the reasons for the focus group participants’ attitudes on specific topics and to offer insights into their concerns about and support for an issue. A facilitator who used a standard script and list of questions to guide the discussion and encourage participants guided the focus group participants to share their thoughts and experiences. We confirmed at the start of each session that participants met the inclusion criteria for the respective group. Due to the low numbers of 18X pilot participants at the O3-O5 rank and 11U/12U pilot participants at Cannon Air Force Base, we conducted a focus group of the available participants together instead of separately. Additionally, at Creech Air Force Base, we encountered three situations where participants were currently full-time Reserve pilots, but because all had former active-duty experience and dismissing them would result in too few participants in the group, we allowed them to stay in the focus groups in order to have a sufficient number of participants. This situation occurred in the O1-O2 18X pilot focus group, the O3-O5 18X pilot focus group, and the E5-E9 1U0XX sensor operator focus group. The core questions that the GAO facilitator asked during each of the focus groups are listed in table 4. During the focus group meetings, three GAO members independently took separate sets of detailed notes to document the participants’ comments. Afterward, each member’s notes were compiled into one final official record documenting the comments made in each of the focus groups we conducted. Then, these records were consolidated into one database to be used for coding each comment and to facilitate the team’s content analysis of all the comments. To identify common categories and themes from the participants’ comments across all focus groups, the team met, reviewed and discussed the official record of each of the 14 focus groups. From that meeting, the team identified 43 categories across seven areas of inquiry; see table 5 for a list of the categories and themes. Using the categories and themes identified, the team conducted a pre- test by having two groups of two coders independently code an identical subset of the comments to determine their levels of coding consistency and accuracy before attempting to code all 1,848 individual recorded comments. After the pretest, the two groups split the list of comments in half and each coder independently coded the comments contained in their list into the categories and themes under which the coder believed the comment fell. Once completed, the coders within each group met to discuss any discrepancies in each of their coding and to make any necessary adjustments in the coding. Where discrepancies could not be resolved between coders, an independent third team member determined which code would be used. Once the coding of all 1,848 comments was finalized, the team’s methodologist prepared a report that presented all comments that fell within each of the categories and themes. The team used this information as the basis for frequency tabulation and qualitative analysis of focus group comments. In addition to discussing the RPA pilots’ and sensor operators’ perspectives in a focus group setting, we administered a questionnaire to each participant at the end of each session before the participants were dismissed. All participants completed the questionnaire. A GAO methodologist with a social science background and knowledge of small group methods and survey administrations reviewed the focus group script and the questionnaire. In addition, we pre-tested both the focus group protocol and the questionnaire on our first site visit to Shaw Air Force Base and both were used again at the remaining RPA locations, Cannon and Creech Air Force Bases, without any changes. The Department of Defense (DOD), the military services, and organizations outside DOD have produced reports and studies that addressed issues associated with Air Force remotely piloted aircraft (RPA) personnel, including the following: Armour, Cherie, and Jana Ross. “The Health and Well-Being of Military Drone Operators and Intelligence Analysts: A Systematic Review.” Military Psychology, 2017. Bryan, Craig J., Tanya Goodman, Wayne Chappelle, Lillian Prince, and William Thompson. “Subtypes of severe psychological distress among US Air Force remote warriors: A latent class analysis.” Military Psychology, 2018. Campo, Joseph L. “Distance in War: The Experience of MQ-1 and MQ-9 Aircrew.” Air and Space Power Journal, 2015. Chappelle, Wayne L., Kent McDonald, Lillian Prince, Tanya Goodman, Bobbie N. Ray-Sannerud, and William Thompson. “Symptoms of Psychological Distress and Post-Traumatic Stress Disorder in United States Air Force “Drone” Operators.” Military Medicine, 2014. Chappelle, Wayne, Emily Skinner, Tanya Goodman, Julie Swearingen, and Lillian Prince. “Emotional reactions to killing in remotely piloted aircraft crewmembers during and following weapon strikes.” Military Behavioral Health, 2018. Chappelle, Wayne, Julie Swearingen, Tanya Goodman, Sara Cowper, Lillian Prince, and William Thompson. Occupational Health Screenings of U.S. Air Force Remotely Piloted Aircraft (Drone) Operators. Report, Wright-Patterson Air Force Base, OH: Air Force Research Laboratory, 2014. Chappelle, Wayne, Kent McDonald, and Raymond King. Psychological Attributes Critical to the Performance of MQ-1 Predator and MQ-9 Reaper U.S. Air Force Sensor Operators. Report, Brooks City-Base, TX: Air Force Research Laboratory, 2010. Chappelle, Wayne, Kent McDonald, Billy Thompson, and Julie Swearangen. Prevalence of High Emotional Distress and Symptoms of Post-Traumatic Stress Disorder in U.S. Air Force Active Duty Remotely Piloted Aircraft Operators (2010 USAFSAM Survey Results). Report, Wright-Patterson Air Force Base, OH: Air Force Research Laboratory, 2012. Chappelle, Wayne, Kent McDonald, Lillian Prince, Tanya Goodman, Bobbie N. Ray-Sannerud, and William Thompson. “Assessment of Occupational Burnout in United States Air Force Predator/Reaper “Drone” Operators.” Military Psychology, 2014. Chappelle, Wayne, Tanya Goodman, Laura Reardon, and Lillian Prince. “Combat and operational risk factors for post-traumatic stress disorder symptom criteria among United States Air Force remotely piloted aircraft “Drone” warfighters.” Journal of Anxiety Disorders, 2019. Chappelle, Wayne, Tanya Goodman, Laura Reardon, and William Thompson. “An analysis of post-traumatic stress symptoms in United States Air Force drone operators.” Journal of Anxiety Disorders, 2014. Cooke, Nancy J., Kristen Barrera, Howard Weiss, and Claude Ezzell. “Psychosocial Effects of Remote Operations.” In Remotely Piloted Aircraft Systems: A Human Systems Integration Perspective, by Nancy J. Cooke, Leah J. Rowe, Winston Bennett, Jr. and DeForest Q. Joralmon. West Sussex: John Wiley & Sons, 2017. Goodman, Tanya, Lillian Prince, Wayne Chappelle, and Craig Bryan. A Reassessment of Risk Factors and Frequency of Suicide Ideation Among U.S. Air Force Remote Warriors. Report, Wright-Patterson AFB, OH: Air Force Research Laboratory, 2018. Hardison, Chaitra M., Eyal Aharoni, Christopher Larson, Steven Trochlil, and Alexander C. Hou. Stress and Dissatisfaction in the Air Force’s Remotely Piloted Aircraft Community. Santa Monica, CA: RAND Corporation, 2017. Hijazi, Alaa, Christopher J. Ferguson, Harold Hall, Mark Hovee, F. Richard Ferraro, and Sherrie Wilcox. “Psychological Dimensions of Drone Warfare.” Current Psychology, 2017. Martin, Kiel M., Daniel J. Richmond, and John G. Swisher. “Sustaining the Drone Enterprise: How Manpower Analysis Engendered Policy Reform in the United States Air Force.” INFORMS Journal on Applied Analytics, 2017. Martin, Matt. “Remote-Split Operations and Virtual Presence: Why the Air Force Uses Officer Pilots to Fly RPAs.” 18th International Symposium on Aviation Psychology. Dayton, 2015. Ouma, Joseph A., Wayne L. Chappelle, and Amber Salinas. Facets of Occupational Burnout Among U.S. Air Force Active Duty and National Guard/Reserve MQ-1 Predator and MQ-9 Reaper Operators. Report, Wright-Patterson Air Force Base, OH: Air Force Research Laboratory, 2011. Terry, Tara L., Chaitra M. Hardison, David Schulker, Alexander C. Hou, and Leslie Adrienne Payne. Building a Healthy MQ-1/9 RPA Pilot Community: Designing a Career Field Planning Tool. Santa Monica, CA: RAND Corporation, 2018. Wood, III, Joe, et al. Prevalence of Posttraumatic Stress Disorder in Remotely Piloted Aircraft Operators in the United States Air Force. Report, Wright-Patterson Air Force Base, OH: Air Force Research Laboratory, 2016. Wood, III, Joe D, et al. “Relationship Between Spiritual Well-being and Post-traumatic Stress Disorder Symptoms in United States Air Force Remotely Piloted Aircraft and Intelligence Personnel.” Military Medicine, 2018. Brenda S. Farrell, (202) 512-3604 or farrellb@gao.gov In addition to the contact named above, key contributors to this report were Lori Atkinson, Assistant Director; Rebecca Beale, Brad Crofford, Caitlin Cusati, Felicia Lopez, Terry Richardson, Ophelia Robinson, Pamela Snedden, and John Van Schaik. Unmanned Aerial Systems: Air Force Pilot Promotion Rates Have Increased but Oversight Process of Some Positions Could Be Enhanced. GAO-19-155. Washington D.C.: February 7, 2019. Unmanned Aerial Systems: Air Force and Army Should Improve Strategic Human Capital Planning for Pilot Workforces. GAO-17-53. Washington D.C.: January 31, 2017. Unmanned Aerial Systems: Actions Needed to Improve DOD Pilot Training. GAO-15-461. Washington, D.C.: May 14, 2015. Air Force: Actions Needed to Strengthen Management of Unmanned Aerial System Pilots. GAO-14-316. Washington, D.C.: April 10, 2014.", "summary": "High demand and constant combat operations have created challenges for Air Force RPA pilots and sensor operators who conduct missions across the world. In January 2017, the Air Force approved a combat-to-dwell policy to better balance RPA units' time in combat with non-combat activities. It plans to fully implement the policy in 2024. Senate Report 115-262 included a provision that GAO review ongoing challenges in the Air Force RPA community. This report assesses, among other things, the extent to which the Air Force (1) met overall RPA pilot and sensor operator staffing targets and tracked its progress in implementing its combat-to-dwell policy and (2) identified and met instructor staffing levels at its RPA formal training unit. GAO analyzed selected Air Force accession, retention, and instructor staffing data; held non-generalizable focus groups at three RPA military bases; and interviewed officials at various levels of the RPA enterprise. The Air Force does not have enough pilots and sensor operators to meet its staffing targets for its unmanned aircraft—also called remotely piloted aircraft (RPA). It also does not track its overall progress in accessing and retaining enough RPA personnel needed to implement its combat-to-dwell policy, which is intended to balance RPA units' time spent in combat with non-combat activities. Officials stated that to fully implement combat-to-dwell the Air Force needs to access and retain more RPA personnel because since fiscal year 2016 it has had fewer RPA personnel than authorized (see figure for RPA sensor operator example). The Air Force has provided financial incentives to address retention of RPA personnel, but it does not yet have enough historical data to help predict RPA pilot retention trends going forward given the newness of the career field. Officials additionally expressed specific concerns about sensor operator retention particularly due to the possibility of lucrative private-sector jobs. Further, the Air Force does not have a comprehensive metric (or set of metrics) to know whether its accession and retention efforts are on track to generate the additional RPA personnel needed to implement its combat-to-dwell policy by 2024. Without a metric (or set of metrics), it is unclear whether any adjustments are needed to meet its implementation timeframes. The Air Force has not fully identified the number of RPA pilot and sensor operator instructor positions needed at its formal training unit and since 2016 has experienced instructor staffing shortages. Specifically, the number of instructor positions required is understated because they are based on a 2009 program of instruction with 49 training days while the current program of instruction is 83 training days. Moreover, since fiscal year 2016, the formal training unit has had fewer assigned instructors than authorized positions even though those numbers of instructor positions are underestimates of actual needs. To help address the effect of the instructor gap, officials temporarily reduced the length of training. Without updated information to inform the number of required instructors, the Air Force does not know the correct number of instructor positions necessary to train RPA aircrews to be ready to complete their mission. GAO recommends that the Air Force establish a comprehensive metric (or set of metrics) to track the progress of its efforts to access and retain enough RPA personnel needed to implement its combat-to-dwell policy, and update the number of required RPA instructor positions. The Air Force partially concurred with the first recommendation and concurred with the second one. GAO continues to believe the first recommendation is valid, as discussed in the report.", "document_type": "gao"}
{"report": "Effective communication is vital for first responders’ ability to respond to emergencies, ensure the safety of both their personnel and the public, and protect public and private property. For example, first responders use public safety communications systems to gather information, coordinate a response, and, if needed, request resources and assistance from neighboring jurisdictions and the federal government. First responders use several types of communications systems, such as LMR systems, commercial wireless services, and the FirstNet network. LMR systems. These systems are the primary means for first responders to use voice communications to gather and share information while conducting their daily operations and coordinating their emergency response efforts. LMR systems are intended to provide secure, reliable voice communications in a variety of environments, scenarios, and emergencies. Commercial wireless services. Public safety entities often pay for commercial wireless services to send data transmissions such as location information, images, and video. FirstNet network. FirstNet is working to establish a nationwide, dedicated broadband network for public safety use that is intended to foster greater interoperability among first responders, support important voice and data transmissions, and meet public safety officials’ reliability needs on a priority basis, including call “preemption.” FirstNet’s network is intended to complement LMR systems with broadband capabilities and does not serve as a substitute for mission-critical voice needs. Communications systems must work together, or be interoperable, to ensure effective communication. Emergency communications interoperability refers to the ability of first responders and public safety officials to use their radios and other equipment to communicate with each other across agencies and jurisdictions when needed and as authorized. First responders’ LMR systems operate by transmitting voice communications through radio waves at specific frequencies and channels within the electromagnetic spectrum. FCC is responsible for allocating spectrum for various purposes and assigning spectrum licenses in a specific area and to a specific entity such as a police department or a telecommunications company. As previously noted, an auction is one mechanism that FCC may use to assign spectrum licenses. According to FCC officials, due to certain restrictions in the Communications Act, FCC has used administrative procedures, not auctions, to assign licenses for public safety and non-commercial educational broadcast stations. Over the years, spectrum for public safety has expanded to new frequency bands, as previously available frequencies became congested and public safety needs for spectrum increased. As we have previously reported, congestion results from growth in the overall number of users and demand for spectrum dependent technologies and services. Because of the increased demand for spectrum, in 1971 FCC authorized public safety and business-industrial users to share a portion of the T- Band spectrum (470 to 512 megahertz) with television broadcast stations in 11 metropolitan areas. The 11 metropolitan areas, which are identified in figure 1, include almost all the most populous metropolitan areas in the United States. The entire T-Band is not available for public safety and business users in these 11 metropolitan areas to build and operate LMR systems, and the amount of spectrum varies in each area. FCC rules allow “base station transmitters”—the equipment that emits radio signals to communicate with mobile units—to be located within 50 miles from the geographic center of each metropolitan area, as shown in figure 1. In 2012, as part of the Middle Class Tax Relief and Job Creation Act of 2012 (the Act), FCC was required by statute to reallocate the T-Band spectrum currently used by public safety and commence the process for an auction by February 22, 2021. As part of the reallocation of the T- Band for the 11 metropolitan areas listed above, the proceeds from the required auction shall be available to NTIA to make grants to cover relocation costs for the relocation of public safety entities. The grants are to be funded by the auction proceeds for the purpose of helping cover these users’ relocation costs. According to FCC officials, the Act does not address the hundreds of business-industrial users also using the T- Band and does not set aside or identify replacement spectrum for public safety users. DHS officials told us that the Act does not provide a formal role for DHS in the T-Band spectrum auction or relocation of public safety users. While one purpose of spectrum auctions is to recover the public portion of the value of spectrum, FCC officials told us that the Act and its legislative history do not explain the purpose of the T-Band auction and relocation, and we confirmed the absence of legislative history for the auction mandate. According to FCC officials, there are approximately 925 public safety entities with licenses in the T-Band. Each of these entities holds at least one license, but in some cases may hold many licenses. For example, the State of Texas holds one public safety license in the T-Band in the Houston metropolitan area, while the New York City Police Department has 180 licenses in the New York City metropolitan area. The number of licenses held by each entity depends on the demand for the spectrum for LMR systems and the availability of spectrum in other bands allocated for public safety use. FCC estimates that public safety entities have approximately 3,000 stations within the T-Band. Additionally, FCC said that the T-Band also contains approximately 700 business-industrial users that occupy about 1,700 stations. Public safety officials in three of our four selected metropolitan areas— Boston, Los Angeles, and New York City—told us that they have not been able to identify alternative spectrum to relocate from the T-Band, a situation that raises questions about the feasibility of the auction and relocation. For example, all of the officials we interviewed from New York City police, fire, and emergency management departments said there is no spectrum available for them to relocate to. The officials noted that the New York City Police Department is the largest municipal police department in the country and that it relies on the T-Band to dispatch police for 911 calls. Additionally an official from Pasadena in the Los Angeles metropolitan area said that the spectrum allocated for public safety in the region is already crowded and that officials are unsure of where to relocate their emergency communication operations. Public safety officials from Boston, Los Angeles, and New York City metropolitan areas also said that FCC has not provided a plan or identified alternative spectrum for relocation. In 2013, in anticipation of the mandatory T-Band auction, FCC published a notice and solicited public comment to gather information on when, how, and under what circumstances to relocate public safety and business-industrial users of the T-Band. At that time, FCC asked commenters what alternative spectrum bands were potentially available for relocation of T-Band’s public safety users, and whether these users could relocate to other public safety bands including the 700 and 800 MHz bands. In response to FCC’s request for comment, NPSTC conducted an analysis and reported in 2013 that the 11 different metropolitan areas would face different likelihoods of relocating to alternative spectrum. NPSTC analyzed FCC data on T-Band licenses to determine the number of public safety licenses that would need to be relocated, and then compared the need for licenses to the available licenses in other spectrum bands that FCC has allocated for public safety use. Based on that analysis NPSTC concluded the following. In five of the 11 metropolitan areas, relocating public safety users from the T-Band would not be possible. Specifically, in addition to identifying the three metropolitan areas we discuss above (Boston, Los Angeles and New York City), NPSTC concluded that at least two other metropolitan areas (Chicago and Philadelphia) lacked sufficient spectrum in any band to relocate public safety’s existing T-Band operations. For the other six metropolitan areas (Pittsburgh, San Francisco, Washington, D.C., Dallas-Fort Worth, Houston, and Miami) NPSTC’s analysis found that these areas might have sufficient spectrum to relocate T-Band users, with the 700 MHz narrowband offering the greatest potential. These metropolitan areas have fewer public safety T-Band licensees needing to relocate. Representatives from a trade organization that represents business-industrial users of the T-Band told us that in five of these six metropolitan areas, business-industrial users hold more than half of T-Band licenses. Specifically, the representatives noted that approximately 95 percent of T-Band users in the Houston metropolitan area are business-industrial users and that in Pittsburgh, Washington, D.C., Dallas-Fort Worth, and Miami metropolitan areas more than 50 percent of the T-Band users are business-industrial users. Our interviews with selected local officials confirmed that public safety users in Dallas-Fort Worth (our fourth selected metropolitan area) have had success transitioning off the T-Band. Two of the three public safety licensees we talked with told us they had already transitioned off the T- Band and noted that it was unrelated to the required T-Band auction. For example, an official from the City of Dallas, which holds one public safety license in the T-Band, told us that in 2012 the city began replacing existing radios with new radios that did not operate on the T-Band. The official said the city stopped operating on the T-Band in 2013 and relocated operations onto another spectrum band where most of the city’s public safety communications operated. Another T-Band public-safety licensee from the Dallas-Fort Worth metropolitan area told us that although it has active licenses they were unaware of the required auction or need to relocate from the T-Band. FCC and DHS officials told us the analysis conducted by NPSTC was a good source of information about the potential negative effects of the T- Band auction on public safety users, including numbers related to licensing and potential cost. DHS officials told us that NPSTC has broad expertise in emergency communications, noting that it is a member of two federally supported organizations that promote the interoperability of emergency communications—the Public Safety Advisory Committee and SAFECOM. Additionally, SAFECOM worked with another federally supported emergency communications advisory group—the National Council of Statewide Interoperability Coordinators—to create a publicly available document on the T-Band auction and the potential effects on public safety and cited the NPSTC’s report in the assessment. The document, notes that insufficient spectrum alternatives leave few options for identifying replacement spectrum in several major metropolitan areas. Selected representatives from industry groups whose members are business-industrial T-Band users in the 11 T-Band metropolitan areas, such as the American Petroleum Institute and the Utilities Technology Council, also said they anticipate that there would not be alternative spectrum available if required to relocate. For example, representatives with the American Petroleum Institute said that there are staff at major refineries that use the T-Band on a daily basis for all plant operations including emergency response (firefighters and hazardous materials), control room, engineering, and maintenance, and that relocating to new spectrum would be challenging given the lack of available spectrum. These representatives noted that most of the refineries that use the T- Band are located in Houston, but there are also some facilities in the San Francisco, Los Angeles, and Philadelphia metropolitan areas. Public safety officials in Boston, Los Angeles, and New York City agreed that relocating LMR operations from one spectrum band to another can be costly, complicated, and time intensive given infrastructure and equipment needs. These officials told us that transitioning from the T- Band requires identifying and acquiring new sites to build towers, purchasing new radios, testing new systems, building other infrastructure, and training personnel on the new systems. NPSTC calculated in its 2013 report that the cost to relocate public safety operations in the 11 metropolitan areas would be approximately $5.9 billion. Their calculation includes the costs for the total estimated number of new towers, cables, antennas, and mobile, portable, and vehicular radios. In 2016, after updating its analysis, NPSTC’s second report confirmed that the conclusions from the 2013 report remain valid. According to FCC officials, in early 2019 they analyzed the costs for relocating public safety users from the T-Band and estimated the total cost would be between $5 and $6 billion. Officials from nearly all of the public safety entities we interviewed in the Boston and New York City metropolitan areas cited the NPSTC reports as the best source of publicly available cost calculations for relocating public safety users from the T-Band. Officials from nearly all of the public safety entities we interviewed in Boston, Los Angeles, and New York City told us that estimating relocation costs is and will remain difficult until alternative spectrum is identified. However a few selected public safety users provided us with high-level cost estimates for replacing LMR system components. For example, an official in Pasadena said a conservative estimate for those components would be $13 to $14 million; while public safety officials in New York City estimated component costs would be at least $1.8 billion. According to public safety officials in Morris County, New Jersey, and Yonkers, New York, the financial burden may be greater for less populated areas, despite the higher anticipated actual cost for more populated areas. For instance, public safety officials in Morris County, New Jersey, told us they estimated $30 million in relocation costs, which exceeds the county’s total annual capital project budgets (approximately $20 to 25 million). According to public safety users in the Boston, Los Angeles, and New York City metropolitan areas, costs for relocating LMR systems from the T-Band depend on a variety of factors including (1) equipment, (2) infrastructure, and (3) real estate. 1. Equipment. Transitioning to another spectrum band could require public safety users to purchase new equipment such as radios. Some radios can only operate on one spectrum band, so moving to a new band requires purchasing new radios that can operate on that band. Alternatively, users could purchase multi- band radios, which can operate on more than one radio frequency band. According to public safety officials we spoke with, multi-band radios might be the best option since it is not clear which frequencies they will ultimately be relocated to. However, they also noted that multi-band radios are substantially more expensive than single band radios. For example, officials with the Boston Fire Department told us a regular radio costs approximately $5,000 each while multi-band radios cost up to $8,000. These officials told us that relocating from the T-Band would mean replacing approximately 1,800 radios with multi-band units, meaning that just replacing the Boston Fire Department’s handheld and portable radios could cost more than $14 million. Additionally, public safety officials in Boston and New York City added that local building codes in those areas require buildings of a certain size to install equipment that amplifies wireless signals throughout a building and improves coverage. These systems help first responders, such as police and firefighters, communicate with each other in large buildings. 2. Infrastructure. Infrastructure costs could include new radio towers and antennas and fiber-optic cable systems. Because different radio frequencies have different characteristics and can cover different distances, depending on to which spectrum band public safety users are relocated, circumstances may require more radio towers and antennas. For example, officials with the Boston Fire Department told us that if space were available and they were to relocate from the T- Band to the 800 MHz public safety band, they would need additional radio towers. Specifically, these officials said their current system consists of 42 receivers and five transmitting sites and estimated that a system in the 800 MHz band would likely require up to 60 receivers and five-to-nine transmit sites. FCC officials told us that based on the characteristics of other spectrum bands allocated to public safety, users may need to build between two and three times as much infrastructure to provide the same coverage. The officials noted this would substantially increase relocation costs. Additionally, public safety officials in Boston and New York City told us they are able to use the T-Band to communicate in the tunnels beneath each city because of infrastructure investments like the T-Band specific radiating cables, which allow first responder’s radios to work underground. Officials from New York City police, fire, emergency- management department and the mayor’s office said that relocating to a new spectrum would require installing a new radiating cable system in hundreds of miles of subway, train, and vehicle tunnels. These officials estimated that replacing the radiating cable infrastructure alone would take at least a decade and cost over $1 billion. Officials added that replacing the infrastructure would involve closing subway lines for extended periods of time as the new cables are installed. 3. Real estate. Costs associated with buying or leasing new real-estate sites for towers and other radio equipment will also affect the cost estimate for public safety users. Officials from Boston, Los Angeles, and New York City told us that because of the characteristics of different spectrum bands, building a replacement system might require additional sites. Additionally, officials with New York City told us that identifying locations and negotiating leases for radio towers and spaces for other equipment including radio cabinets would likely be difficult due to the scarcity of and high costs of appropriate sites in New York City. Public safety officials in Boston, Los Angeles, and New York City added that relocating from the T-Band would require building and operating parallel systems to avoid disrupting emergency communications. This project would require some duplication of investments—for example, radio towers, radio cabinets, and antennas, among other equipment and infrastructure—during the transition. For example, officials in New York City police, fire, and emergency-management departments told us they would need to build a dual system that could require at least twice as much space for equipment. They also noted that the current sites are rent free because of existing arrangements, but they believe that it is unlikely that landlords will provide additional space rent free. These officials told us that even if FCC identified available spectrum for them to relocate to, they would be unable to build and test the systems in the 2-year time frame required by statute. For example, New York City officials estimated buildout and testing could take over a decade, which they indicated would also substantially increase the city’s cost. Public safety stakeholders in the Boston, Los Angeles, and New York City metropolitan areas told us that it is difficult to estimate the time needed to build new LMR systems, but estimates ranged from 2 to more than 10 years from the time that alternative spectrum was identified. They noted that these time frames would also depend on the availability of funding and on the complexity of the new systems to be designed, built, and tested. FCC officials also told us that the time and expense of relocating hundreds of licensees at thousands of sites is difficult to predict due to many local factors. For instance, FCC officials cited their ongoing experience relocating public safety licensees within the 800 MHz band which was originally estimated to take 3 years. However, based on certain factors such as the geographic location and interdependencies of communications systems, this relocation effort remains incomplete after 14 years. Public safety stakeholders we talked to told us that the T-Band is important for the interoperability of public safety equipment and said that maintaining interoperability on alternative spectrum would be a challenge. Boston officials told us interoperability is vital for public safety and the T- Band is the key for their interoperability capabilities. For example, these officials said the LMR systems that allow almost 170 local, county, state, and federal law enforcement agencies to communicate with each other use the T-Band. The officials said this network of LMR systems is the only way for all these entities to communicate on a daily basis and is also used for command and control for crisis response at major events such as the Boston Marathon. These officials credited this system on the T-Band for the successful response to the 2013 Boston Marathon bombing. Officials said the LMR system allowed first responders in neighboring jurisdictions to provide additional communication equipment and personnel during the ensuing manhunt. Similarly, officials from New York City told us the T- Band now provides the foundation for all first responder communications in the area. Officials said the September 11, 2001, terrorist attacks demonstrated the loss of life that can occur when first responders are unable to communicate with each other because there was no system in place to allow police, fire, and emergency medical services to easily communicate. As a result, officials said New York City has spent countless hours and millions of dollars to improve interoperability, and that the interoperable system currently in place is based on the T-Band. In December 2018, we reported that it is vital for first responders—such as police officers and firefighters—to have (1) timely communications; (2) sufficient capacity to handle the communications; and (3) interoperable communications systems that enable first responders to connect with their counterparts in other agencies and jurisdictions, even if their counterparts’ systems or equipment vendors differ. As noted previously, public safety users rely on LMR systems as their primary means to gather and share information. For public safety users that rely on the T-Band for interoperable communications and that lack alternative spectrum to build new interoperable systems, losing access to the T-Band would mean public safety officials in multiple large metropolitan areas would be unable to communicate with first responders within their community, neighboring jurisdictions, and the federal government. Public safety officials in Boston, Los Angeles, and New York City told us that the characteristics of the T-Band spectrum are ideal for reliable emergency communications and that moving to another spectrum band may present a challenge to reliability. Since different frequencies of radio waves have different characteristics, jurisdictions typically use the spectrum that is best suited for their particular location. The officials told us that the T-Band’s characteristics allow radio signals to penetrate buildings and across varied terrain and require less infrastructure investments, such as radio towers, than other frequency bands assigned for public safety use. Los Angeles County officials cited the characteristics of the T-Band as the primary advantage the current radio system has over other systems operating on other spectrum bands. They explained that the characteristics make it more suitable for challenging terrain on the forested, mountainous, and coastal areas of the county, than similarly equipped radio systems operating in other frequency bands. FCC has taken some preliminary steps to help facilitate the mandated relocation of public safety users from the T-band, such as imposing a T- Band license freeze, requesting public comments, and creating a fact sheet to notify stakeholders of the spectrum auction and prepare for the auction. In April 2012, FCC froze the processing of applications for new or expanded T-Band radio operations in an effort to avoid adding to the cost and complexity of the mandated public safety relocation. Affected applications included those seeking: (1) new T-Band licenses; (2) modifications to existing licenses by adding or changing frequencies or locations within the T-Band; (3) modifications to existing licenses by changing technical parameters—such as increases in bandwidth, power level, antenna height, or area of operation—in a manner that expands the station’s spectral or geographic footprint; and (4) any other modification that could increase the degree to which the 470–512 MHz band currently is licensed. Both public safety and business-industrial users we interviewed expressed concerns about the license freeze and said it has caused some uncertainty and in limited cases has affected their ability to maintain existing systems. For example, public safety officials from one department we interviewed in the Boston metropolitan area said the freeze has affected users’ ability to replace aging equipment, which has led to poor communications in the area. Additionally, representatives from one business-industrial user told us that Hurricane Harvey destroyed one of its LMR sites and that the entity was having trouble rebuilding a site elsewhere since FCC considers this action a major change and thus affected by the license freeze. FCC staff told us that the public notice announcing the license freeze specifically advised affected parties that they could request a waiver in unusual circumstances where the public interest so warrants, and that that no such request appears to have been filed in this instance. In addition, as discussed earlier, FCC sought public comment in February 2013 to gather information and specific proposals for reallocating and auctioning the T-Band. FCC officials said they continue to evaluate auction proposals from these comments. In October 2014, FCC released a report and order making 24 channels in the 700 MHz narrowband, previously held in reserve, available for public safety users. FCC concluded that given the significant increase in demand for 700 MHz narrowband spectrum, particularly in urban areas, these channels should be made available for use. Public safety users of the T-Band were given priority to these new channels if they committed to return an equal amount of T-Band channels and obtained the concurrence of the relevant regional-planning committees. According to NPSTC’s 2016 report, these 24 additional channels are beneficial but insufficient to relocate all current users of the T-Band. The report notes that channel insufficiency is particularly challenging in the five metropolitan areas where T-Band usage is the highest—Boston, Chicago, Los Angeles, New York City, and Philadelphia. Furthermore, one public safety official in the Los Angeles metropolitan area raised concerns about potential radio interference if relocated to another frequency. The official said that currently, because the T-Band is not used by neighboring jurisdictions, the city does not currently have to worry about frequency interference. By contrast, the 700 and 800 MHz band is currently occupied by public safety in neighboring Riverside and San Diego Counties. This means, according to the official, that building a new system operating in the 700-800 MHz band could potentially introduce interference issues. FCC also created a fact sheet in July 2016 with basic information on the statutory relocation requirement. The T-Band fact sheet states that the relocation shall be completed within 2 years of the auction’s completion date: the exact timing of the relocation deadline will depend on when the auction concludes. FCC officials told us the T-Band fact sheet is the only formal T-band auction guidance that they have provided. However, officials said that they have also met with several licensees to discuss T- Band issues. For example, according to officials, FCC has met with public safety entities from areas such as Los Angeles, Chicago, Boston, and New York City. DHS officials told us that while they have no formal role in the T-Band auction and relocation of public safety users, they provide this fact sheet when they are asked for details about the T-Band auction as a way to help raise awareness about the auction and relocation requirements. Although FCC has made efforts to provide guidance and information to T-band users regarding the mandated auction, as we discuss earlier in the report, we found that not all T-Band users we interviewed are aware of the upcoming auction or the need to relocate from the T-Band. FCC has not set a timeline for initiating the auction but has stated that it is committed under any scenario to ensure the continuity of T-Band licensee’s public safety mission-critical communications. According to FCC officials, as of March 2019, almost all T-Band licensees continue to operate on the T-Band spectrum, and FCC officials cited multiple factors for the limited progress in preparing for the T-Band auction: FCC has not determined how to address challenges stakeholders identified in response to FCC’s 2013 request for public comment, including the lack of available spectrum to relocate and the cost. For example, officials told us that they are taking a wait-and-see approach to see how many T-Band licensees relocate prior to the auction. However, as noted previously, FCC officials told us their analysis of other spectrum bands shows insufficient spectrum for relocating public safety entities from the T-Band. The officials told us that public safety operates on the T-Band in large metropolitan areas where other public safety spectrum is heavily used and that this reason is why the T-Band was allocated for LMR in these areas in the first place. The T-Band auction has raised complicated relocation questions. For example, select industry groups we spoke to whose members are business-industrial T-Band users expressed concern about the uncertainty of the spectrum auction requirements, since the Act was silent on business-industrial users, but they are constrained by the license freeze from replacing aging equipment. FCC previously told us that it had not determined whether business-industrial users would be required to relocate. However, in April 2019, FCC officials told us that it intends to implement the auction following the statute’s language. FCC officials stated that the Act does not expressly require it to auction spectrum licensed to business-industrial users, but officials also stated that FCC may decide that it has the authority to auction that spectrum under a different statutory provision. Before conducting the auction, FCC must issue a notice, which includes a public comment period, to determine the auction procedures and requirements. FCC officials told us they have not progressed beyond the preliminary conceptual stages and do not have a precise timeline for the pre-auction process or auction. The officials explained that if business-industrial users relocate, they would face similar relocation challenges to that of public safety users and the Act does not mention them as eligible for relocation grants. According to FCC officials, licenses for business-industrial users outnumber those of public safety users on the T-Band in some areas. According to FCC officials and a FirstNet official, public safety users on the T-Band may subscribe to services on FirstNet’s nationwide public safety broadband network, which offers some voice functionality. However, officials said the network currently does not accommodate the need of public safety users for mission-critical voice functionality. For example, FCC officials told us that FirstNet’s network is not a substitute for mission critical voice systems operated by public safety licensees in the T-Band because the network does not support such capabilities and because there is no plan or schedule in place for the network to begin offering such services. According to an official at FirstNet, this network is intended to complement LMR systems with broadband capabilities, not replace LMR systems in the near future. In the interim, public safety users electing to use FirstNet’s broadband network will need to continue to use LMR networks for their mission critical voice needs while evaluating whether their future voice needs require continued maintenance of their LMR networks or whether FirstNet broadband services could fulfill their wireless communications requirements. The amount of proceeds that may be generated from the T-Band auction—which are, according to FCC, expected to be the sole source of federal funding to help cover the relocation costs incurred by public safety entities—is likely to be less than the total relocation costs. FCC officials told us the T-Band has potentially low value because of limited demand by potential bidders in the auction. For example, FCC officials estimated that revenue for the entire T-Band would not exceed $2 billion. To reach this amount would require public safety and business-industrial users to relocate from the T-Band, which according to FCC estimates could cost between $9 and $10 billion. As discussed previously, representatives from a trade organization told us that in five of 11 metropolitan areas where public safety uses the T-Band, business-industrial users hold more than half of T-Band licenses. Because of the high numbers of business- industrial users in the T-Band, there may be less spectrum to auction than perhaps initially contemplated when the Act was passed, which would ultimately affect auction proceeds. If FCC were to decide that it has the authority to auction spectrum utilized by business industrial users under a different statutory provision, as explained above, proceeds would be higher. As discussed above, NTIA is to make grants to cover relocation costs for the relocation of public safety entities in accordance with the Middle Class Tax Relief Act. However, NTIA officials told us that the agency has no dedicated funding to administer such a program and must wait for auction proceeds to stand one up. The officials also said that only when the auction concludes will NTIA know the total amount available and how best to disburse those funds for relocating agencies. Thus, designing a grant program, notifying eligible parties of available grants, evaluating applications, and issuing awards must all take place during the statutory 2-year relocation period. If agencies require the funds before they can move to other frequencies, it is unlikely that this migration can meet the two-year deadline. NTIA officials also stated that until they design the grant program, they do not have any relevant information to provide public safety stakeholders. NTIA officials said they would provide information on the grant program and begin making grants as soon as possible given the statutory requirement for public safety users to relocate within 2 years of the auction’s conclusion. According to NTIA officials, because the requirements for NTIA’s grant program for public safety relocation costs have not yet been specified, it is unclear what expenses will be covered. As previously discussed, FCC and NPSTC each calculated the cost for relocating public safety users in the 11 metropolitan areas and each arrived at an estimate between $5 and $6 billion. FCC officials said because of the high relocation costs and likely low value of the T-Band’s being auctioned, there is a strong likelihood auction proceeds would not cover public safety relocation costs. Although the Act stipulates that auction proceeds shall be made available through grants in such sums necessary to cover costs for the relocation of public safety entities from the T-Band spectrum, FCC officials said the Act did not address what would happen if the auction generated insufficient funds to cover relocation costs. Consequently, public safety stakeholders from Boston, Los Angeles, and New York City expressed concern about moving forward with relocating. These stakeholders identified the uncertainty of what spectrum would ultimately be auctioned as one of the main reasons they were concerned they would be unable to fully cover their relocation costs. FCC officials stated that they recognize that the T-Band auction and relocation requirement present challenges for FCC and public safety entities—and potentially business-industrial users—particularly since spectrum for relocating all public safety users is limited to non-existent. However, these officials said they will design and conduct the spectrum auction, as required, unless the law is changed. In this case, FCC officials told us they provided Congress with information on the challenges associated with the auction. While FCC provided information to Congress, it did not suggest changes to law in this instance. As such, officials told us in March 2019 they were in the process of briefing key congressional committees on the challenges associated with the T-Band auction based on FCC analysis. According to this analysis, all T-Band auction scenarios would fail. FCC ran auction scenarios that looked at different options for relocating users and auctioning the T-Band used by public safety. These scenarios included relocating only public safety users, relocating public safety and business-industrial users, relocating public safety users, and reorganizing business-industrial users within the T-Band. In 2018, bills were introduced in both the House of Representatives and the Senate to repeal the requirement for FCC to reallocate and auction the T-Band. These bills were not enacted and expired at the end of the 115th Congress. However, in January 2019, a bill was introduced—and subsequently referred to a House subcommittee—to repeal the T-Band relocation and auction requirements. As of June 2019, no further action has taken place on the legislation. According to FCC’s strategic plan, one of FCC’s priorities is to protect public safety, and in particular, take steps to assist and safeguard the communications of our nation’s law enforcement officers and first responders. However, auctioning the T-Band spectrum, as FCC has been mandated to do, could hamper its ability to safeguard these communications. As mentioned above, the Act and its legislative history do not discuss the purpose of the T-Band auction. Public safety stakeholders in Boston, Los Angeles, and New York City told us they believe that there may have been an assumption the FirstNet network could absorb public safety users, but at this time the network does not support mission-critical voice capabilities first responders need. According to stakeholders in the Boston and New York City metropolitan areas, if the provision requiring the auction of public safety users’ T-band spectrum remains in effect and if the auction takes place, they could experience substantial harmful effects on their ability to maintain continuous and effective communications during an emergency. Officials representing seven public safety entities told us they favored Congress’ repealing the required T- Band auction for this very reason. For example, public safety officials in New York City said they believe the T-Band auction would severely negatively affect their ability to respond to emergencies and could lead to the loss of lives. In addition, officials with the Boston police department told us the T-Band is the lifeblood of police communications and the only way for almost 170 law enforcement departments in the Boston metropolitan area to communicate with one another on a daily basis and during major events. These officials said that auctioning the T-Band and forcing them to relocate and build a new system over several years would disrupt critical public safety communications and be disastrous. Since the passage of legislation requiring the relocation of public safety users from, and auction of, the T-band radio spectrum, the potential consequences of these actions have become far more apparent. If FCC conducts such an auction, it is unclear that all public safety users in the affected areas will be able to relocate. If alternative spectrum is not available, public safety would be jeopardized in some of the nation’s largest metropolitan areas. Even if alternate available spectrum can be found, public safety users are likely to bear significant costs associated with relocating and reestablishing interoperability. These costs could go well beyond the revenue produced by such an auction. Congress should consider legislation allowing public safety users continued use of the T-Band radio spectrum. (Matter for Consideration 1) We provided a draft of this report to the Department of Commerce, DHS, and FCC for review and comment. DHS and FCC provided technical comments, which we incorporated as appropriate. The Department of Commerce indicated that it did not have comments. We are sending copies of this report to the appropriate congressional committees, the Secretaries of Commerce and Homeland Security, and the Chairman of FCC. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or members of your staff have any questions about this report, please contact me at (202) 512-2834 or goldsteinm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix II. In addition to the individual named above, David Sausville (Assistant Director); Aaron Kaminsky (Analyst in Charge); Camilo Flores; Ray Griffith; Delwen Jones; Josh Ormond; Kelly Rubin; and Jessica Walker made key contributions to this report.", "summary": "First responders and others in 11 large metropolitan areas use radio systems operating in the T-Band since spectrum is limited in other bands. In 2012, FCC was required by statute to begin an auction of this T-Band public safety spectrum by February 2021 and to make the proceeds available to the National Telecommunications and Information Administration (NTIA) to develop and administer a grant program to help cover costs associated with relocating public safety users' radio systems. GAO was asked to review issues related to the required T-Band auction. This report examines, among other things: (1) the challenges selected first responders and local governments anticipate facing in relocating public safety communications from the T-Band and (2) the actions FCC has taken both to help facilitate the required T-Band relocation and to address identified challenges. GAO reviewed FCC's March 2019 congressional briefing and analysis on T-Band spectrum and conducted case studies in four cities selected based on the number of public safety licenses in each area, among other things. GAO reviewed relevant statutes and regulations, FCC documents, and T-Band studies conducted by a public safety organization. GAO interviewed FCC officials and other stakeholders, including first responders in case study cities. Public safety officials, such as police and fire fighters, in 11 metropolitan areas rely on radio systems that use the portion of spectrum known as the T-Band for mission critical voice communications. Selected stakeholders GAO interviewed, including first responders and officials in three of four areas selected as case studies, anticipate significant challenges in relocating public safety communications from the T-Band. For example, stakeholders in Boston, Los Angeles, and New York said the Federal Communications Commission (FCC) has not identified sufficient alternative spectrum. Additionally, two studies conducted by a public safety organization concluded these three areas and others may also have insufficient alternative spectrum (see figure below). Moreover, a recent FCC analysis showed that relocation options for public safety users are limited or nonexistent. Further, costs for relocating public safety users from the T-Band were calculated by FCC to be $5-to-$6 billion. Selected stakeholders said relocating their communication systems would require such things as new towers and radios as well as other infrastructure. FCC has taken limited actions to address challenges and assist public safety users of the T-Band with the mandatory relocation. For example, FCC has taken steps to notify stakeholders, but officials told GAO they have not begun planning the auction. FCC officials acknowledged challenges the auction and relocation requirements present. FCC officials explained that public safety entities were licensed to operate on the T-Band in large metropolitan areas because other public safety spectrum was already heavily used. In March 2019, FCC briefed Congress on the auction's challenges and concluded that all T-Band auction scenarios would fail. Nonetheless, FCC officials said the agency will conduct the auction unless the law is amended. While FCC provided information to Congress, it did not suggest changes to law in this instance. Stakeholders in two metropolitan areas said the auction could result in substantial harmful effects on their ability to maintain continuous and effective communications during an emergency. Congress should consider legislation allowing public safety users continued use of the T-Band spectrum.", "document_type": "gao"}
{"report": "The FAR, among other things, sets forth requirements that must be met before agencies can award contracts to prospective contractors. Beginning February 26, 2016, contracting officers are required to include a provision in all contract solicitations that require contractors to report information about unpaid federal taxes regardless of the contract value. Specifically, FAR § 52.209-11 incorporates the language from the fiscal years 2015 and 2016 appropriations acts that prohibits the government from entering into contracts with corporations with unpaid federal taxes that have been assessed, for which all judicial and administrative remedies have been exhausted or have lapsed, and that are not being paid in a timely manner pursuant to an agreement with the authority responsible for collecting the tax liability, where the awarding agency is aware of the unpaid tax liability, unless an agency has considered suspension or debarment of the corporation and made a determination such action is not necessary to protect the interests of the government. If the prospective contractor reports having unpaid federal taxes under this provision, the contracting officer must request additional information from the prospective contractor; in accordance with agency procedures, notify the officials responsible for debarment and suspension actions, commonly referred to as the suspension and debarment officials (SDO); and not award to the corporation unless an agency SDO has considered suspension or debarment of the corporation and has made a determination that suspension or debarment is not necessary to protect the interests of the government. Additionally, the FAR requires that contracting officers include in certain contract solicitations another provision for prospective contractors to report delinquent taxes. Specifically, contracting officers are also required to include FAR § 52.209-5 in contract solicitations in which the contract value is expected to exceed the simplified acquisition threshold, which was generally $150,000 at the time of our review, under which prospective contractors report delinquent federal taxes owed. This requirement has been in place since 2008. Under this provision, the prospective contractor must report whether it or any of its principals have, within the preceding 3-year period, been notified of “delinquent federal taxes” in an amount that exceeds $3,500. For purposes of this provision, “delinquent federal taxes” are those for which the tax liability is finally determined and assessed, with no pending administrative or judicial challenge, and all judicial appeal rights are exhausted; and the taxpayer is delinquent in making payment, unless enforced collection action is precluded (the taxpayer is not delinquent if the taxpayer has entered into an installment agreement and is making timely payments in compliance with the agreement terms). If the prospective contractor reports having federal tax debt under this provision, the contracting officer must (1) request additional information from the prospective contractor and (2) in accordance with agency procedures notify the officials responsible for debarment and suspension actions. Further, the contracting officer is not required to receive a suspension and debarment determination before contract award for tax debt reported under this certification. In addition, the FAR generally requires prospective contractors to register in SAM before a contract can be awarded. As part of registering in SAM, prospective contractors must make up to 54 representations and certifications, which must be updated as necessary but at least annually. Included among these is the federal tax debt FAR § 52.209-11 representation and § 52.209-5 certification. The representations and certifications in SAM must be kept current, accurate, and complete. Unpaid federal tax debts reported under FAR § 52.209-11 and delinquent federal taxes reported under § 52.209-5 do not automatically disqualify the prospective contractor from receiving a contract, but rather are used as part of the contracting officer’s responsibility determination of the prospective contractor. Contracting officers rely on the contractors’ representations and certifications in SAM to identify qualifying federal tax debts. Federal tax law generally prohibits the IRS from disclosing taxpayer data to other federal agencies for the purpose of determining whether potential contractors owe qualifying federal tax debt. As a result, contracting officers cannot verify a contractor’s tax-debt status by obtaining taxpayer information directly from the IRS without the contractor’s prior consent. In general, the federal pre–contract award process consists of the agency identifying its needs for goods and services, creating an acquisition plan, posting a solicitation that allows interested contractors to submit bids or proposals, and assessing and selecting a prospective contractor to meet its needs. Agency contracting personnel have a variety of pre–contract award responsibilities. As one of these responsibilities, the contracting officer is to identify the FAR provisions and clauses required to be included in contract solicitations based on various criteria, such as the contract type and contract value. For example, contracts expected to be above the simplified acquisition threshold are required to include § 52.209-5 in the solicitation. After the solicitation is issued and prospective contractors’ offers are obtained, the contracting officer, among other tasks, generally must verify that the prospective contractor is registered in SAM, and that the contractor is not suspended or excluded from doing business with the federal government prior to contract award. The contracting officer must also determine whether the prospective contractor is “responsible.” FAR § 9.104-1 requires that to be determined responsible, prospective contractors must have adequate financial resources to perform the contract, or the ability to obtain them; have a satisfactory record of integrity and business ethics; and be otherwise qualified and eligible to receive an award under applicable laws and regulations, among other things. As part of the responsibility determination, the contracting officer must also access, review, and document the prospective contractor’s applicable representations and certifications, including qualifying federal tax debt reported under § 52.209-11 and § 52.209-5. See figure 1 for an overview of the pre– contract award requirements related to tax debt. The IRS, which is located in the Department of the Treasury (Treasury) and led by a commissioner, may collect assets or payments, including federal contract payments to collect unpaid taxes, and these collections are referred to as a “levy.” The IRS will usually levy only after notifying the taxpayer in writing of the amount of the unpaid tax and the right of the taxpayer to request a hearing within a 30-day period before the levy occurs. However, if the taxpayer is a federal contractor, the taxpayer is given the opportunity for the hearing within a reasonable period after the levy. One way the IRS levies federal contractor payments is through the FPLP, which is an automated program that can collect overdue taxes through a continuous levy on certain federal payments processed by Treasury’s Bureau of the Fiscal Service (Fiscal Service). In addition to the FPLP, the IRS can also levy federal contractors manually. Specifically, the IRS may levy federal contractor payments directly from federal agencies to collect unpaid taxes. The five selected agencies we examined have established control activities to varying degrees to help contracting officers comply with federal laws and regulations related to identifying prospective contractors’ reported qualifying federal tax debt. These control activities include the following: Class Deviations: The five agencies issued class deviations from the FAR to implement the tax debt–related appropriations restriction prior to February 26, 2016. These class deviations generally required contracting officers to include an alternative provision in solicitations and, if a contractor reported having qualifying tax debt, to not award the contract without a written suspension and debarment determination from an agency SDO. For example, the Department of Defense, DOE, HHS, and VA issued class deviations as early as 2012 that required contracting officers to take two actions: (1) insert an alternate provision when issuing solicitations using appropriated funds and (2) obtain an SDO determination that suspension or debarment is not necessary to protect the interests of the government before awarding a contract to a contractor who reported qualifying tax debts. Policies and Procedures: VA, DOE, and HHS issued policies and procedures to varying degrees that generally direct contracting officers to the relevant sections of the FAR when assessing contractor responsibility. For example, both VA and DOE issued policies or guidance on determining contractor responsibility and including § 52.209-5 in solicitations where the value was expected to exceed the simplified acquisition threshold. In addition, agency officials who supervise contracting officers told us that contracting officers use contractors’ representations and certifications in SAM to identify qualifying federal tax debts and document their review of the information when determining contractor responsibility before contract award. For example, one of the Navy’s responsibility-determination templates requires contracting officers to notate that they verified, in SAM, that the prospective contractor did not report qualifying federal tax debts under FAR § 52.209-5. Further, the five agencies have also issued procedures outlining the SDO suspension and debarment referral and review process, as required by federal regulations. For example, HHS issued guidance on suspension and debarment that includes (1) relevant contact information, (2) required or optional documentation to include, and (3) potential causes for suspension or debarment, such as the contractor reported qualifying federal tax debt. Both the Army and Navy issued policy alerts informing contracting officers of the February 26, 2016, effective date of FAR § 52.209-11 and the requirement that an SDO determine that suspension or debarment is not necessary to protect the interests of the government before awarding a contract to a contractor who reported having tax debts under this provision. Contract-File Compliance Tools: The five agencies told us that contracting officers have tools available that help ensure required information, including information related to federal tax debt, is reviewed and documented in contract files. For example, contracting officer supervisors and policy officials at these agencies told us that contracting officers use agency contract-writing systems to assist with identifying and inserting required FAR provisions and clauses in the contract solicitation. HHS and VA contracting officer supervisors also told us contracting officers use contract-file checklists to ensure required FAR provisions and clauses are included in the contract solicitation. In addition, some of the five selected agencies’ contract- file checklists or memorandums we reviewed generally document that the contracting officer verified the prospective contractor’s SAM registration, and suspension and debarment status, and retrieved the relevant SAM representations and certifications before contract award. Further, some VA and DOE contract checklists we reviewed also document that the contracting officer considered tax debts reported under § 52.209-5 or federal tax debt in general (see fig. 2). Periodic Compliance Reviews of Samples of Contracts: The five agencies’ policy officials and contracting officer supervisors we interviewed told us they generally conduct compliance reviews on a sample of contract files before and after contract award to ensure that the required FAR provisions and clauses are inserted in contract solicitations, including peer-to-peer, management, and legal compliance reviews. Agency officials also told us this includes verifying that the contracting officer considered and documented the prospective contractors’ SAM representations and certifications before contract award. For example, the Army’s procurement management review program is designed to ensure regulatory and policy compliance, among other things, via oversight by a multilevel program that reviews each contracting activity every 3 years. Training: DOE and VA provide training that generally discusses contractor responsibility determinations and references the requirement that contracting officers inform the SDO when prospective contractors report that they have qualifying federal tax debt before contract award. The Department of Defense provides training on the causes for suspension, and the Navy SDO also provides training discussing the requirement to notify the SDO when prospective contractors report qualifying federal tax debt. HHS suspension and debarment staff we interviewed told us that they provide general suspension and debarment training that includes causes for suspension and debarment referrals, such as tax debt. Further, one Navy contracting office also provides training on inserting the tax-debt provision in all contract solicitations. We identified 1,849 contracts awarded by the five selected agencies in 2015 and 2016 to contractors that reported qualifying federal tax debt that potentially should have resulted in these agencies taking required follow- up actions before contract award, such as notifying the agency SDO of these tax debts. Specifically, according to our analysis of FPDS-NG and SAM data for this period, the five selected agencies potentially should have notified an SDO prior to awarding 1,849 contracts to contractors that reported having qualifying federal tax debt under their § 52.209-11 representation or § 52.209-5 certification, which we discuss further below. However, none of the five selected agencies’ SDOs we interviewed were notified of any instances in which a contracting officer identified a prospective contractor with these reported qualifying federal tax debts, and they did not receive any tax debt-related referrals within this period. Agency officials we interviewed were unable to explain why the SDOs were not notified without reviewing each of the 1,849 contract files. Because referrals were not made to an SDO before awarding the contract, agencies’ control activities do not appear to have operated effectively to identify contractors’ reported tax debt and to consider suspension and debarment when required. As a result, these contracts may have been awarded without required actions being taken—a potential violation of federal regulations and, in some cases, the Antideficiency Act. In addition, we reviewed a nongeneralizable sample of seven contracts where prospective contractors reported qualifying tax debts before receiving contract awards and identified two illustrative examples where agency control activities did not ensure regulatory compliance. The tax debts for these contractors were collectively more than $250,000, and historical IRS tax records include instances where the IRS had assessed a Trust Fund Recovery Penalty (TFRP), indicating willful failure to collect, account for, or pay taxes owed. Nonetheless, the contracting officers awarded these two contracts without taking required follow-up actions for these awards. These contractors were awarded more than $510,000 in contract obligations in total, in 2015 and 2016. In our analysis of the five selected agencies, we identified 143 contracts at four of the agencies that were awarded to contractors who reported qualifying federal tax debt in SAM under § 52.209-11 from February 26, 2016, through December 31, 2016. Table 1 shows the number of contract awards to contractors who reported qualifying federal tax debt under § 52.209-11 from February 26, 2016, through December 31, 2016, by selected agency. We did not identify contracts awarded by DOE during this period to similar contractors, and thus did not assess the operational effectiveness of the agency’s controls activities for compliance with its relevant class deviation. However, none of the four agencies that awarded these 143 contracts took required follow-up actions that potentially should have resulted from the contractor’s reporting qualifying tax debt before contract award. As mentioned earlier, when prospective contractors report having qualifying federal tax debt under § 52.209-11, the FAR requires that contracting officers (1) request that the contractor provide such additional information as the contractor deems necessary in order to demonstrate responsibility; (2) notify, in accordance with agency procedures, the SDO of the contractor’s reported qualifying federal tax debt, before award, for suspension and debarment review; and (3) not award the contract unless an SDO determines that further action is not required to protect the interest of the government. The FAR also requires that contracting officers possess or obtain information sufficient to determine whether the prospective contractor is responsible. As mentioned above, qualifying federal tax debts reported under this representation do not automatically disqualify the prospective contractor from receiving a contract, but rather are used as part of the contracting officer’s responsibility determination of the prospective contractor. In our review of contract-file documentation for seven contract awards to contractors that reported they had qualifying tax debt under either provision, we could determine for one case under this representation that the contracting officer did not take required follow-up actions to ensure compliance with federal regulations. We highlight this example in the sidebar to the left. Agency contracting officer supervisors we interviewed from the four selected agencies that awarded the 143 contracts discussed earlier told us that they were not aware of any instances in which a contracting officer identified a prospective contractor’s reported qualifying federal tax debt under § 52.209-11 and notified the SDO during this period. As mentioned, the SDOs we interviewed at these four agencies told us that they did not receive, nor were they aware of, any notifications to review prospective contractors that reported having qualifying federal tax debt during this period. All four of these SDOs told us that they track notifications to the SDO manually or via a case-management tracking system. Further, none of the agency officials we interviewed at the selected agencies were able to identify specific reasons a contracting officer would not notify an SDO of reported qualifying federal tax debt as required. Our analysis of the five selected agencies also identified 1,706 contracts awarded in 2015 and 2016 to contractors that reported having qualifying federal tax debt in SAM under § 52.209-5. Table 2 shows the number of contract awards to contractors that reported having qualifying tax debt under § 52.209-5 in 2015 and 2016, by selected agency. However, none of the five agencies that awarded these 1,706 contracts took required follow-up actions that potentially should have resulted from the contractor’s reporting qualifying tax debt before contract award. As mentioned above, as early as 2008, contractors were required to certify whether they had qualifying federal tax debt if, within the preceding 3-year period, they or any of their principals had been notified of “delinquent federal taxes” in an amount that exceeds $3,500 for which the liability remained unsatisfied. Also as previously mentioned, tax debts must only be reported under this provision if the tax liability is finally determined with no pending administrative or judicial challenge, all judicial appeal rights have been exhausted, enforcement action is not precluded, and the taxpayer is not in compliance with an installment repayment agreement. Qualifying federal tax debts reported under this certification do not automatically disqualify the prospective contractor from receiving a contract, but rather are used as part of the contracting officer’s responsibility determination. Further, contracting officers are to insert this FAR provision in solicitations where the value of the contract is expected to be greater than the simplified acquisition threshold. If a prospective contractor reports qualifying tax debt, contracting officers must request such additional information as the contractor deems necessary in order to demonstrate responsibility, and, prior to proceeding with the award, notify the agency’s SDO in accordance with agency procedures. While we cannot readily determine whether all 1,706 contract awards were out of compliance with federal regulations due to limitations in the data, as discussed earlier, our review of seven contract awards with reported qualifying tax debt under either provision identified an instance under this certification where we confirmed that the solicitation was above the simplified acquisition threshold and the contracting officer did not take follow-up actions to ensure compliance with federal regulations (see sidebar to the left). As mentioned, agency contracting officer supervisors we interviewed from the five agencies told us that they were not aware of any instances in which a contracting officer identified a prospective contractor’s reporting qualifying federal tax debt under § 52.209-5 and notified the SDO during this period. Further, SDOs we interviewed at these five agencies told us that they did not receive, nor were they aware of, any notifications identifying prospective contractors that reported qualifying federal tax debt under this FAR provision during this period. As mentioned earlier, four out of the five SDOs told us that they track SDO notifications, and none of the agency officials we interviewed identified specific reasons a contracting officer would not notify an SDO as required. When discussing these 1,849 contracts with agency officials, they were unable to explain whether or why their control activities did not operate effectively to ensure compliance with applicable federal laws and regulations. To do so, some of these officials told us that they would need to review the contract files for each of the 1,849 instances of potential noncompliance we identified. Specifically, the agency must confirm that (1) a solicitation was issued, and (2) the estimated value of the contract award was above the simplified acquisition threshold, when applicable, to determine whether the regulatory requirements applied. If the regulatory requirement applied to the contract award, the agency must then determine why their control activities did not operate effectively to ensure compliance. We plan to refer these contract awards to the appropriate agency’s Inspector General for review, and share them with the agencies at that time as well. Understanding why existing control activities potentially did not operate effectively will help these agencies ensure they are taking necessary steps to protect the interests of the government and avoid the misuse of appropriated funds in the future. The five selected agencies told us, in response to our review, they plan to take actions to improve control activities to identify contractors’ federal tax debts reported under § 52.209-11 and § 52.209-5. These planned actions include issuing new guidance, providing additional training, verifying that contracting officers considered reported tax debts in postaward compliance reviews, and updating preaward contract-file checklists to ensure compliance with federal laws and regulations. Some of the selected agencies also noted that the FAR requirements apply to all executive agencies and that a broader solution to accessing, identifying, and reviewing qualifying federal tax debt reported in SAM representations and certifications could be useful. Agency officials explained that contracting officers have to individually identify and review each relevant representation and certification—up to 54 representations and certifications—to become aware of the prospective contractor’s response before contract award. Further, agency officials told us that contractors’ responses are not easily identifiable in SAM and contracting officers can miss the contractor’s reported qualifying federal tax debt under § 52.209-11 and § 52.209-5. As mentioned earlier, accessing, reviewing and documenting the SAM representations and certifications is one part of the preaward contracting process and is one of the actions contracting officers are required to take as part of the contract award process. The SAM tax-related representations and certifications that must be reviewed before contract award are determined by various factors, including contract award value. See figure 3 for an overview of the general process to access, review, and identify prospective contractors’ qualifying tax debts reported in SAM. As mentioned earlier, GSA manages SAM, and while the GSA official we interviewed acknowledged the challenges raised by the selected agencies, this official noted that SAM representation and certification data are accessible to contracting officers for the purpose of reviewing qualifying federal tax debt reported by prospective contractors and taking any required follow-up actions. Nevertheless, this official noted that GSA is in the process of upgrading SAM, which may include changes to the representations and certifications. Standards for Internal Control in the Federal Government state that management should use high-quality information to achieve its objectives and that management should consider the accessibility of information and make revisions when necessary so that the necessary information is accessible. As GSA makes planned upgrades to SAM, it is in a position to consider improvements to SAM users’ experience with representations and certifications that may help executive-branch agency contracting officers more easily identify contractors’ reported qualifying federal tax debt under § 52.209-11 and § 52.209-5. Of the 120,000 federal contractors that were awarded contracts in 2015 and 2016, our analysis found that over 4,600 of them had unpaid taxes at the time they received the award. These contractors collectively owed $1.8 billion in unpaid taxes as of December 15, 2016, and received contract award obligations totaling $17 billion. We could not confirm, however, whether at the time of the contract awards these contractors’ unpaid taxes met the relevant legal definitions of qualifying federal tax debt under § 52.209-11 and § 52.209-5 due to limitations in the data. However, we were able to determine which debts likely met the definition of qualifying tax debt, and to determine those that did not meet the definition, as of December 15, 2016—a date after the contract award. Specifically, over 2,700 of these contractors had unpaid taxes that were all likely qualifying federal tax debt as of December 15, 2016. In addition, about 1,900 had unpaid taxes that were not qualifying federal tax debt. As previously noted, agencies are required by the FAR to consider contractors’ reported qualifying federal tax debt before awarding contracts. Generally, as mentioned earlier, agencies are not restricted from awarding contracts to contractors that report having qualifying federal tax debt if an agency SDO determines suspension and debarment of the contractor is not necessary to protect the interests of the government. We describe characteristics of the unpaid taxes and contract awards for these 4,600 contractors with unpaid taxes below. (See fig. 4.) We identified over 4,600 federal contractors that had unpaid taxes at the time they received a contract award in 2015 and 2016. However, we could not confirm whether these contractors’ unpaid taxes met the relevant legal definitions under § 52.209-11 and § 52.209-5 at the time of the contract award due to limitations in the data we obtained, as previously described. These 4,600 contractors received about $17 billion in contract awards and owed $1.8 billion in unpaid taxes as of December 15, 2016. The characteristics of these 4,600 federal contractors with unpaid taxes in December 15, 2016, are discussed below: Average and Total Debt Associated with Contractors with Unpaid Taxes: About 1,000 contractors had unpaid taxes of at least $51,000 each. These contractors collectively owed about 98 percent of the $1.8 billion in unpaid taxes we identified. About 1,900 contractors each had unpaid taxes between $3,500 and $51,000. They collectively owed about $30 million in taxes. About 1,700 contractors each had unpaid taxes over $100 but less than $3,500. They collectively owed about $2 million in taxes. Chief Financial Officers (CFO) Act Agencies Associated with Contractors with Unpaid Taxes: The 4,600 contractors with unpaid taxes as of December 15, 2016, received contract awards in our 2- year period from one or more of all 24 CFO Act agencies. Almost 1,500 contractors received contract awards from more than one agency. These contractors owed almost $600 million in unpaid taxes as of December 15, 2016 (see sidebar to the left). Although, as discussed above, we reviewed the control activities of five agencies, all executive-branch agencies are required by the FAR to consider the qualifying federal tax debt of prospective contractors before making an award. If a contractor is receiving awards from multiple federal agencies, the suspension and debarment determination of any agency SDO is relevant to other agencies considering the same contractor for an award. For example, as discussed earlier, we identified 1,849 contract awards by five selected agencies to contractors that reported qualifying tax debt before contract award, and none of these agency SDOs were notified. There were some instances where more than one agency made a contract award to the same contractor that reported having qualifying tax debts. These obligations might not have been made by multiple agencies if one of these agencies’ SDOs had been notified of the reported tax debt as required. Contractors with Unpaid Taxes and Associated with TFRP: We also identified about 600 contractors whose tax records indicate the IRS assessed a TFRP to the owner or officers associated with the contractor, as shown in the sidebar to the left. As mentioned previously, a TFRP indicates willful failure to collect, account for, or pay certain taxes owed. These 600 contractors had $200 million in unpaid taxes in December 2016. Having a TFRP does not disqualify a contractor from obtaining a contract, but it can be considered when the agency determines a prospective contractor’s responsibility under the FAR, according to agency contracting and suspension and debarment officials (SDO) we spoke with. We found that over 2,700 contractors owed about $350 million in unpaid taxes that likely met the relevant legal criteria for qualifying federal tax debt on December 15, 2016. However, few of those contractors reported having qualifying tax debts in SAM. Because the contracts were awarded before December 2016, we cannot determine whether these unpaid taxes met the relevant legal criteria under § 52.209-11 and § 52.209-5 for qualifying federal tax debt at the time of the contract award. However, because these tax debts were unpaid as of December 15, 2016, we determined they were likely qualifying tax debts because they were not being timely paid consistent with a collection agreement and appeared to be finally determined. These tax debts amounted to about 20 percent of the $1.8 billion in unpaid taxes we identified. The 2,700 contractors received almost $5 billion of the $17 billion in federal contract obligations for awards made to contractors with unpaid taxes. We examined the SAM § 52.209-11 representations and § 52.209-5 certifications for these over 2,700 contractors to determine whether they reported this debt as qualifying federal tax debt. We identified about 2,000 contractors that had completed a representation or certification, and, when applicable, met the tax-debt threshold for § 52.209-5. Of those 2,000, 93 percent (1,848) did not report their debt as qualifying federal tax debt, compared to fewer than 150 who did report qualifying federal tax debt under one or both tax-debt provisions (see sidebar to the left). Specifically: Over 1,300 contractors completed the § 52.209-11 representation in SAM (which took effect on Feb. 26, 2016), and less than two dozen of these contractors reported having qualifying federal tax debt under § 52.209-11 before receiving contract awards. Nearly 1,400 contractors completed the § 52.209-5 certification in SAM and as of December 15, 2016, had unpaid taxes over the certification threshold. Fewer than 140 of these contractors reported under § 52.209-5 that they had been notified of qualifying federal tax debt above $3,500 before receiving a contract award. The accuracy of contractors’ reported tax-debt status in SAM is critical to federal agencies’ ability to identify reported qualifying federal tax debt owed by prospective contractors. As described earlier, contracting officers generally rely on the contractors’ representations and certifications in SAM to identify qualifying federal tax debts. Contracting officers generally cannot verify a contractor’s tax-debt status by obtaining taxpayer information directly from the IRS without the contractor’s prior consent, because federal tax law generally prohibits the IRS from disclosing taxpayer data for this purpose. While contracting officers cannot independently verify whether federal contractors accurately report qualifying federal tax debt, any qualifying federal tax debt may be available for levy by the IRS, as discussed further below. We found that about 1,900 contractors had about $1.4 billion in unpaid taxes that did not meet the relevant criteria for qualifying federal tax debt on December 15, 2016, a date after which their contracts were awarded. Specifically, these unpaid taxes were not finally determined or were being paid in a timely manner consistent with a collection agreement as of December 15, 2016. If the status of these debts was the same at the time of contract award, then the contractors did not need to report them during the contracting process and agencies were not required to consider the debts before awarding the contract. Although we were able to determine that these unpaid taxes did not meet the legal definitions of qualifying federal tax debt as of December 15, 2016, we could not determine whether this was also the case at the time of the contract award. Federal agencies obligated $12 billion to these 1,900 contractors between 2015 and 2016, for awards made while the contractors owed taxes. Of these 1,900 contractors, about 1,400 owed $1.3 billion in unpaid taxes that were not finally determined on December 15, 2016. About 700 contractors owed $90 million in unpaid taxes that were being timely paid consistent with a collection agreement in December 15, 2016, due to installment agreements or offers-in-compromise accepted by the IRS. Through its FPLP, the IRS identified for levy most contractors we found to have likely qualifying federal tax debt, according to our analysis of IRS data. Specifically, of the over 2,700 executive-branch agency contractors with likely qualifying federal tax debt as of December 15, 2016, discussed above, the IRS identified over 2,000 for levy through the FPLP, a program administered by Treasury’s Fiscal Service. These 2,000 contractors collectively owed about $300 million of the roughly $350 million in likely qualifying federal tax debt. According to IRS data, the FPLP did not identify almost 700 of the 2,700 contractors we found to have likely qualifying federal tax debt as of December 15, 2016. These 700 contractors owed about $50 million in likely qualifying federal taxes. IRS officials responsible for the FPLP told us that they would need to review these instances to determine whether the contractors were eligible for levy as of December 15, 2016, and if so why they were not identified by the FPLP. We plan to share these cases with the IRS to determine whether the contractors were eligible for levy at that time and take any appropriate enforcement action. It is possible that the IRS did not identify these 700 contractors for levy through the FPLP because the IRS did not have access to their payments. The FPLP was developed as an automatic and efficient means for the IRS to collect delinquent taxes as payments were processed through the Fiscal Service. Accordingly, the FPLP can only levy federal agency payments processed by the Fiscal Service, but not all federal agencies process their payments through the Fiscal Service. As a result, payments disbursed by other means—such as payments that agencies make directly to contractors—are not included in the FPLP, although they can be levied by the IRS through other manual methods (see fig. 5). The IRS cannot readily identify which payments are made outside of the Fiscal Service, and such payments cannot be levied through the FPLP. While the IRS receives some information about contractor payments from agencies, it does not receive information that would allow it to comprehensively determine which payments are processed by the Fiscal Service and can be levied through the FPLP and which payments are not and must be levied manually. Specifically, executive-branch agencies, including those that do and do not process payments through the Fiscal Service, are required to report information to the IRS about some federal contracts through the IRS Form 8596 information return. Reporting agencies identify themselves on the Form 8596, and the IRS uses data from this form to identify federal contractors for potential levy. However, the Form 8596 information return lacks information on whether payments to federal contractors are processed by the Fiscal Service or through some other means. Without visibility into the payments made outside the Fiscal Service, the IRS is limited in its ability to identify nonparticipating agencies for outreach about the efficiencies of leveraging the FPLP to collect contractors’ unpaid taxes, as opposed to manual levies. Further, without information on agencies’ payment methods, the IRS cannot quickly identify payments that must be levied through manual methods. Expanding Form 8596 to include payment-method information could help the IRS identify which agencies to target for outreach and avoid delays in identifying contractor payments requiring manual levy. IRS officials told us the IRS has the legal authority to expand Form 8596 reporting requirements and would have to determine whether a change to add information on Fiscal Service processing of agency payments was warranted. In addition, we found the IRS is missing an opportunity to further enhance the FPLP levy process for certain contractor payments. Within the FPLP, the IRS has an expedited process to levy federal contractors and, as noted above, the IRS uses data from Form 8596 to identify federal contractors for potential levy. However, Form 8596 reporting requirements do not apply to federal contracts for which the amount obligated is $25,000 or less. When Form 8596 reporting requirements were initially established, this threshold was consistent with Federal Procurement Data System (FPDS) contract reporting requirements for agencies at the time. However, subsequent FAR amendments revised the reporting threshold from contracts over $25,000 to contracts over the micropurchase amount, which is currently set at $10,000. Because the Form 8596 reporting threshold is higher than FPDS reporting requirements, information about contracts in the $10,000 to $25,000 range is available in FPDS, but is not required to be shared with the IRS. Such information could help the IRS identify and use expedited levy procedures on federal contractors with contract obligations in the $10,000–$25,000 range. According to the IRS, an amendment to its regulations would be needed to align the Form 8596 reporting threshold with FPDS reporting requirements. Standards for Internal Control in the Federal Government state that management should use high-quality information to achieve the entity’s objectives. To do this, management obtains relevant data from reliable internal and external sources, processes the obtained data into high- quality information, and uses high-quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives. Without additional information about and from the agencies making these payments, the IRS may be missing opportunities to identify federal contractors for levy to enhance tax collections. Considering prospective contractors’ reported qualifying federal tax debt—in accordance with federal regulations—helps ensure federal agencies comply with federal appropriations law, supports the integrity of the contracting process, and protects the interests of the government. The five federal agencies we reviewed had control activities, such as policies, procedures, and training, to help ensure contracting officers consider prospective contractors’ reported qualifying federal tax debt before making an award. However, these controls were not always effective in ensuring that potentially required actions were taken. Determining the reasons the contracts we identified were awarded without appropriate consideration of contractors’ reported qualifying federal tax debt and taking additional steps to ensure tax debts are appropriately considered in future contract award decisions is necessary to ensure contracting opportunities are appropriately awarded. Improving accessibility of SAM representation and certification data to allow contracting officers to more easily identify and consider reported qualifying federal tax debt before contract award can help contracting officers meet required steps, such as referring them to the SDO. Federal tax law generally prohibits the IRS from disclosing taxpayer data to other federal agencies for the purpose of determining whether potential contractors owe qualifying federal tax debt. Consequently, federal agencies generally rely on contractors’ reported qualifying federal tax debt to detect any tax debt owed by their potential contractors. However, agencies cannot independently verify the accuracy of contractors’ reported qualifying federal tax debts when awarding contracts. This limitation heightens the importance of the IRS’s levy process for recouping revenue from businesses that have failed to pay their taxes in a timely way but are receiving federal contract dollars, and the recoupment of revenue can help reduce the tax gap. Accordingly, the IRS has opportunities to use available data to improve its detection and collection of qualifying federal tax debts owed by federal contractors, which can help enhance revenue collection and compliance. We are making 12 recommendations—two each to the Army, HHS, the Navy, and VA; one each to DOE and GSA; and two to the IRS. The Senior Procurement Executive for the Department of the Army should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-11 and (1) determine whether the contracting officer was required to consider the contractor’s reported tax debt; if so, (2) determine the reasons controls to identify and refer these contractors to the SDO before contract award did not operate effectively; and (3) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 1) The Senior Procurement Executive for HHS should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-11 and (1) determine whether the contracting officer was required to consider the contractor’s reported tax debt; if so, (2) determine the reasons controls to identify and refer these contractors to the SDO before contract award did not operate effectively; and (3) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 2) The Senior Procurement Executive for the Department of the Navy should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-11 and (1) determine whether the contracting officer was required to consider the contractor’s reported tax debt; if so, (2) determine the reasons controls to identify and refer these contractors to the SDO before contract award did not operate effectively; and (3) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 3) The Senior Procurement Executive for VA should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-11 and (1) determine whether the contracting officer was required to consider the contractor’s reported tax debt; if so, (2) determine the reasons controls to identify and refer these contractors to the SDO before contract award did not operate effectively; and (3) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 4) The Senior Procurement Executive for the Department of the Army should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-5. Specifically, the Senior Procurement Executive should determine whether each contract value was expected to exceed the simplified acquisition threshold when the solicitation was issued and, if so, (1) determine the reasons controls to identify and notify the SDO of these contractors before contract award did not operate effectively and (2) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 5) The Senior Procurement Executive for DOE should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-5. Specifically, the Senior Procurement Executive should determine whether each contract value was expected to exceed the simplified acquisition threshold when the solicitation was issued and, if so, (1) determine the reasons controls to identify and notify the SDO of these contractors before contract award did not operate effectively and (2) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 6) The Senior Procurement Executive for HHS should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-5. Specifically, the Senior Procurement Executive should determine whether each contract value was expected to exceed the simplified acquisition threshold when the solicitation was issued and, if so, (1) determine the reasons controls to identify and notify the SDO of these contractors before contract award did not operate effectively and (2) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 7) The Senior Procurement Executive for the Department of the Navy should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-5. Specifically, the Senior Procurement Executive should determine whether each contract value was expected to exceed the simplified acquisition threshold when the solicitation was issued and, if so, (1) determine the reasons controls to identify and notify the SDO of these contractors before contract award did not operate effectively and (2) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 8) The Senior Procurement Executive for VA should review the contracts we identified as being awarded to contractors that reported qualifying federal tax debt under FAR § 52.209-5. Specifically, the Senior Procurement Executive should determine whether each contract value was expected to exceed the simplified acquisition threshold when the solicitation was issued and, if so, (1) determine the reasons controls to identify and notify the SDO of these contractors before contract award did not operate effectively and (2) design or modify controls to help ensure compliance with applicable regulations. (Recommendation 9) The Administrator of GSA should coordinate with the appropriate SAM users, such as agency procurement officials, to identify potential updates to facilitate contracting officers’ identification of contractors that report qualifying federal tax debt under the § 52.209-11 representation and § 52.209-5 certification. (Recommendation 10) The Commissioner of the IRS should evaluate options to identify which contract payments federal agencies expect to be processed by the Fiscal Service, including amending the reporting requirements for Form 8596 to require federal agencies to include information about whether contractor payments are expected to be processed by the Fiscal Service. If the IRS amends Form 8596 reporting requirements, the IRS should (1) systematically note this information on taxpayer accounts to help the IRS identify which payments may be available for levy through the FPLP and which payments may be available for other (i.e., manual) levies and (2) analyze these data to help identify agencies that do not participate in the FPLP and inform its efforts to expand the number of agencies participating in the FPLP. (Recommendation 11) The Commissioner of the IRS should evaluate options to obtain comprehensive contract payment data above the existing FPDS-NG reporting threshold of $10,000, including assessing the costs and benefits of changing the current threshold for contracts that agencies are required to report to the IRS through Form 8596 information returns to be consistent with the existing reporting threshold for FPDS-NG, determine whether regulatory revisions are necessary, and change the reporting threshold, if appropriate. (Recommendation 12) We provided a draft of this report to the Department of Defense (for the Army and Navy), HHS, VA, DOE, GSA, the IRS and the Office of Management and Budget for review and comment. In written comments (reproduced in appendixes II–VI), the Department of Defense, HHS, VA, DOE, and GSA agreed with our recommendations. The IRS generally agreed with our recommendations (see appendix VII). The Office of Management and Budget had no comments. HHS and the Navy provided technical comments, which we incorporated as appropriate. The Department of Defense, HHS, VA, and DOE noted that they plan to review the contract awards identified in our review. In addition, several agencies described steps they will be taking to address our recommendations. For example, the Department of Defense noted that it plans to take corrective actions or add controls as necessary. HHS noted that it will assess internal controls and take appropriate action. VA noted that it will provide an action plan. DOE noted that it will design or modify controls for regulatory compliance, if necessary. GSA noted that it will work with the procurement community through established governance channels to identify potential approaches for drawing contracting officers’ attention to qualifying federal tax-debt information reported in SAM. The IRS noted its commitment to obtaining accurate information on potential levy sources and, accordingly, indicated it will review the benefits of expanding the information included on its Form 8596, along with other alternatives, to determine their feasibility, effectiveness, and relative burden. The IRS further noted that it will review the potential benefits and costs that would result from changing the current reporting threshold for contract payments, and submit its findings to the Office of IRS Chief Counsel to consider this addition to the IRS Priority Guidance Plan. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Health and Human Services, the Secretary of Veterans Affairs, the Secretary of Defense, the Secretary of the Navy, the Secretary of the Army, the Secretary of Energy, the Administrator of GSA, the Commissioner of Internal Revenue, the Director of the Office of Management and Budget, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6722 or shear@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. This report first examines the extent to which, in calendar years 2015 and 2016, (1) selected federal agencies had control activities that ensured contractors’ reported federal tax debts were considered before contract award. The remainder of the report assesses the same period; however, it focuses on all executive-branch agencies and examines the extent to which (2) federal contracts were awarded to contractors with federal tax debt, including the characteristics of those contracts and contractors, and (3) the Internal Revenue Service (IRS) identified selected federal contractors’ payments for levy. To identify the extent to which selected federal agencies had control activities that ensured contractors’ reported federal tax debts were considered before contract award (including task orders), we analyzed contract obligation information from the Federal Procurement Data System–Next Generation (FPDS-NG) and selected for our review the five agencies with the highest contract obligations associated with contract awards for 2015 and 2016, which is the period when contract award data were available at the time of our review. In addition, the revised FAR tax-debt provision went into effect during this period. Specifically, we selected the three civilian agencies with the highest obligations—the Departments of Energy (DOE), Health and Human Services (HHS), and Veterans Affairs (VA)—and, within the Department of Defense, the two agencies with the highest obligations—the Departments of the Army and Navy. The results of our review of these five selected agencies are not generalizable to all federal agencies. However, these five selected agencies awarded about 51 percent of contract obligations associated with contract awards for 2015 and 2016, which were the most-recent contract award data available at the time of our review, and during this period the newest Federal Acquisition Regulation (FAR) tax-debt provision was implemented. We reviewed selected agencies’ policies and procedures related to awarding contracts to prospective contractors that report they owe certain tax debts and met with agency officials to discuss how their agencies consider contractors’ reported federal tax debt before awarding a federal contract. Specifically, we met with agency officials who supervise contracting officers, such as the Head of Contracting Activity, Director of Contracts, or other contracting managers, policy and procurement officials, and suspension and debarment officials from the selected agencies. Additionally, we reviewed and analyzed applicable laws and regulations, as well as applicable policies and procedures from DOE, HHS, VA, the Navy, and the Army for considering contractors’ reported federal tax debt when awarding federal contracts. In addition, we interviewed staff from the Office of Management and Budget’s Office of Federal Procurement Policy and officials from the Interagency Suspension and Debarment Committee, and the Civilian Agency Acquisition Council to obtain an understanding of how the law is implemented through the FAR. We also met with the General Services Administration (GSA) to obtain an understanding of the System for Award Management (SAM), including the registration of prospective contractors and their reporting of certain federal tax debt to the representation requirement of FAR § 52.209-11 and the certification of § 52.209-5. As part of this work, we analyzed FPDS-NG contract award and SAM contractor registration data to identify instances where contractors reported having certain qualifying federal tax debt and received a contract award (including task orders). Specifically, we electronically matched FPDS-NG contract award data from 2015 and 2016 to the relevant contractors’ SAM registration. We then analyzed the relevant contractors’ representations and certifications most recently updated in SAM before the relevant contract award to identify all instances where contractors reported that they had a federal tax debt as defined in FAR § 52.209-11 or § 52.209-5 within our time frame. From the resulting list, we identified the contracts that selected agencies awarded to contractors that reported these qualifying federal tax debts. In addition, we reviewed a nongeneralizable sample of 15 contract awards selected from the five selected agencies to provide illustrative examples of the extent to which these agencies’ control activities ensured required actions were taken before contract award. These 15 contract awards were selected based on numerous criteria, including the prospective contractors’ (1) responses under FAR § 52.209-11 or § 52.209-5 in SAM before the new contract award, and (2) having tax debts as of December 15, 2016, that were not in a repayment agreement with the IRS. Further, when selecting contract awards that had a § 52.209-5 certification, we considered only contractors having at least $3,500 in tax debts as of December 15, 2016. We identified the relevant contractor population and then considered the following factors simultaneously to select the 15 case examples: unique contractor Taxpayer Identification Number across selected agency contracting office locations, the amount of tax debt owed by the prospective contractor, the amount of award obligations, and IRS assessment of a Trust Fund Recovery Penalty (TFRP). We selected case examples that represent a variety of these factors. We reviewed seven contract awards made to contractors that reported that they had certain tax debts and eight contract awards made to contractors that reported that they did not have certain tax debts as part of their § 52.209-11 representations and § 52.209-5 certifications in SAM. For these 15 contract awards, we reviewed pre–contract award documentation, which included tax debt–related representations and certifications retrieved by the selected agencies from SAM, and copies of historical tax transcripts and other records, such as revenue officers’ notes obtained from the IRS. For the case examples presented in this report, we rounded tax debt and contract obligation amounts, did not identify the awarding agency, and did not meet with awarding agency officials to discuss each contract award to protect sensitive taxpayer information. To determine the extent to which executive-branch agency contracts were awarded in 2015 and 2016 to federal contractors with federal tax debt, and characteristics of those contract awards and contractors, we electronically matched data from FPDS-NG on contract awards (including task orders) for all executive agencies with (1) data from SAM on contractors’ representations and certifications of their tax debt, and (2) data from the IRS on tax debts owed by these contractors. Specifically, we used the Data Universal Numbering System number to match data from FPDS-NG with contractor registration data from SAM to obtain additional information on these contractors, such as the contractors’ Taxpayer Identification Numbers and their representations and certifications of tax debt. Using the contractor Taxpayer Identification Number from SAM, we then matched our list of contractors with IRS data to identify our population of contractors that received a contract award and had unpaid federal tax debts. Our analysis included all of the executive-branch agencies. Further, our analysis describes some of characteristics of these debts, including the total amount of unpaid taxes, whether the contractors had a TFRP, and whether or not contractors had unpaid taxes that were timely paid or appeared to be finally determined, as of December 15, 2016, which was the time of our data extract. We also analyzed whether contractors that were assessed unpaid taxes in the IRS data reported having certain tax debts as part of their § 52.209- 11 representations and § 52.209-5 certifications in SAM. We reviewed the most-recent § 52.209-11 representation and § 52.209-5 certification prior to the relevant contract award. Our analysis may understate the population of contractors with tax debt to the extent that contractors repaid their tax debts before the timing of our data extract. Specifically, our analysis does not include any contractors that may have owed federal taxes at the time of a new contract award during this period, but that paid or otherwise resolved their tax debts before December 15, 2016. Additionally, our analysis focuses on contract awards made in 2015 and 2016, and not contract modifications made during this period. In 2015 and 2016, federal agencies obligated $400 billion in modifications to contracts made in 2014 or earlier, almost half of all federal contract obligations in this period. We identify contractors who potentially may have had federal tax debt meeting the definitions of tax debt under FAR § 52.209-11 and § 52.209-5 before the contract award, but cannot verify whether that was the case. To determine the extent to which the IRS identified selected federal contractors’ payments made for levy in 2015 and 2016, we identified the population of contractors that owed taxes at the same time they received a contract award during our period by matching FPDS-NG, SAM, and IRS Unpaid Assessment data, as described above. We then determined whether the tax debt had ever been levied or blocked by the Federal Payment Levy Program (FPLP) as of December 15, 2016, according to IRS data. We also interviewed IRS officials about levying federal contractor payments and reviewed Internal Revenue Manual sections and other relevant documents from the IRS. We assessed the reliability of FPDS-NG, SAM, and IRS Unpaid Assessment data by reviewing relevant documentation, interviewing knowledgeable agency officials, and performing electronic testing to determine the validity of specific data elements in the databases. We determined that these databases were sufficiently reliable for the purposes of our reporting objectives. In additional to the individual named above, Jonathon Oldmixon (Assistant Director), Gloria Proa (Analyst-in-Charge), Jennifer Felder, and Albert Sim made significant contributions to this report. Also contributing to this report were Scott Hiromoto, Barbara Lewis, Heather Miller, James Murphy, and Elizabeth Wood.", "summary": "The federal government obligated approximately $507 billion on contracts in fiscal year 2017. Businesses, including federal contractors, pay billions of dollars in taxes each year. Some businesses, however, do not pay owed taxes, contributing to what is known as the tax gap. Federal contractors owe some of the taxes that contribute to the tax gap, and, since 2015, federal law prohibits agencies, under certain circumstances, from using appropriated funds to contract with those who have qualifying tax debt. The IRS also has authority to levy certain payments of contractors with qualifying federal tax debt. GAO was asked to review issues related to federal contractors and tax debt. Among other things, GAO examined whether, in calendar years 2015 and 2016, (1) selected federal agencies had control activities that ensured contractors' reported federal tax debts were considered before contract award and (2) the IRS levied selected federal contractors' payments. GAO analyzed contract and IRS data from 2015 and 2016 (the most-recent data available), reviewed five agencies that represent 51 percent of contract obligations, and reviewed seven awards to contractors reporting tax debt. The five selected agencies GAO reviewed have control activities—such as policies and procedures—to help ensure they consider qualifying federal tax debts as defined by Federal Acquisition Regulation (FAR) § 52.209-11 and § 52.209-5 before awarding contracts. However, these controls were potentially ineffective in ensuring compliance with relevant laws and regulations. According to GAO's analysis, in 2015 and 2016 the Departments of Energy, Health and Human Services, and Veterans Affairs, and the Army and Navy, awarded 1,849 contracts to contractors that reported qualifying federal tax debts, such as delinquent debts over $3,500 (see table). When a contractor reports qualifying tax debts under these regulations, the contracting officer must take several actions, including notifying the agency suspension and debarment official (SDO). However, SDOs at all five agencies told GAO they did not receive any notifications of contractors reporting tax debt in this period. As a result, these contracts may have been awarded without potential required actions, indicating potential violations of federal regulations and, in some cases, appropriations law. GAO's nongeneralizable review of seven contracts illustrate two cases where contractors were collectively awarded more than $510,000 in contract obligations while having more than $250,000 in tax debt, including tax penalties for willful noncompliance with tax laws. Officials from the selected agencies were unable to explain why their control activities were potentially ineffective without reviewing each contract to determine whether FAR requirements were applicable and whether control activities were applied. Understanding why existing control activities did not operate effectively will help these agencies enhance controls to avoid future misuses of appropriated funds. GAO plans to provide information on the instances of potential noncompliance GAO identified to the selected agencies. Of the over 2,700 executive-branch contractors GAO found to have likely qualifying federal tax debt as of December 2016, the Internal Revenue Service (IRS) had identified over 2,000 for levy through its automated Federal Payment Levy Program (FPLP). However, the FPLP cannot levy all contractors because not all payments are processed by the system the FPLP uses. The data the IRS receives from agencies does not allow it to readily identify payments made using other systems—information the IRS needs for agency outreach about inclusion in the FPLP and to more quickly initiate a manual levy. With this information, the IRS may be able to improve its levy capacity and enhance tax collections. GAO is making 12 recommendations, including that selected agencies enhance controls for considering contactors' qualifying federal tax debt before awarding contracts and that the IRS evaluate options to obtain comprehensive contract-payment information. All the agencies generally agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "The federal government faces long-standing challenges in strategically managing its workforce. We first added federal strategic human capital management to our list of high-risk government programs and operations in 2001. Because skills gaps within individual federal agencies—as well as across the federal workforce—can lead to costly, less-efficient government, the issue has been identified as the focus of the Strategic Human Capital Management GAO high-risk area since February 2011. Our experience has shown that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency leaders grounded in the five criteria for removal from the High-Risk List, as well as any needed congressional action. The five criteria for removal are: (1) leadership commitment, (2) agency capacity, (3) existence of a corrective action plan, (4) program monitoring, and (5) demonstrated progress. Although Congress, OPM, and individual agencies have made improvements since 2001, federal human capital management remains a high-risk area because mission-critical skills gaps within the federal workforce pose a high risk to the nation. GAO, along with OPM and individual agencies, has identified mission critical skills gaps in numerous government-wide occupations. These skills gaps both within federal agencies and across the federal workforce impede the government from cost-effectively serving the public and achieving results. For example, the difficulties in recruiting and retaining skilled health care providers and human resource staff at Veterans Health Administration’s (VHA) medical centers make it difficult to meet the health care needs of more than 9 million veterans. As a result, VHA’s 168 medical centers have large staffing shortages, including physicians, registered nurses, physician assistants, psychologists, physical therapists, as well as human resource specialists and assistants. In October 2017, we reported that the VHA, within the Department of Veterans Affairs (VA), has opportunities to improve staffing, recruitment, and retention strategies for physicians that it identified as a priority for staffing, or mission-critical. For 2016, the top five physician mission- critical occupations were primary care, mental health, gastroenterology, orthopedic surgery, and emergency medicine. However, VHA was unable to accurately count the total number of physicians who provide care in its VA medical centers (VAMC). Additionally, VHA lacked data on the number of contract physicians and physician trainees. Five of the six VAMCs in our review used contract physicians or physician trainees to meet their staffing needs, but VHA had no information on the extent to which VAMCs nationwide use these arrangements. We also reported that VHA had not evaluated the effectiveness of its physician recruitment and retention strategies. One such strategy—hiring physician trainees—was weakened by ineffectual hiring practices, such as delaying employment offers until graduation. In February 2018, we reported that the Department of Homeland Security (DHS) had taken actions to identify, categorize, and assign employment codes to its cybersecurity positions, as required by the Homeland Security Cybersecurity Workforce Assessment Act of 2014; however, its actions were not timely and complete. While DHS has implemented four of our six recommendations from this report, two recommendations remain open. For example, DHS has not yet completed its efforts to identify all of the department’s cybersecurity positions and accurately assign codes to all filled and vacant cybersecurity positions. Further, it has not yet fully developed guidance to assist DHS components in identifying their cybersecurity work categories and specialty areas of critical need that align to the National Initiative for Cybersecurity Education framework. Without ensuring that its progress in identifying and assigning codes to its positions is accurately reported and it has guidance to fully assist components, DHS will not be positioned to effectively examine its cybersecurity workforce, identify its critical skill gaps, or improve its workforce planning. In March 2019, we reported that 24 federal agencies generally assigned work roles to filled and vacant positions that performed information technology, cybersecurity, or cyber-related functions as required by the Federal Cybersecurity Workforce Assessment Act of 2015. However, most agencies had likely miscategorized the work roles of many IT positions. Until agencies accurately categorize their positions, the agencies may not have reliable information to form a basis for effectively examining their cybersecurity workforce, improving workforce planning, and identifying their workforce roles of critical need. Skills gaps caused by insufficient number of staff, inadequate workforce planning, and a lack of training in critical skills are contributing to our designating strategic human capital management and other areas as high risk. (See table 1.) Skills gaps affect individual agencies but also cut across the entire federal workforce in areas such as cybersecurity and acquisition management. As our 2019 analysis of federal high-risk areas shows, in addition to Strategic Human Capital Management, skills gaps played a role in 16 of the other 34 high-risk areas we have identified. Insufficient numbers of staff with critical skills can be related to staff retirements as well as to inadequate recruitment and hiring. Moreover, if not carefully managed, anticipated retirements could widen skills gaps or open new ones, adversely affecting agencies’ capabilities. As shown in figure 1, more than 31 percent of federal employees on board by the end of fiscal year 2017 will be eligible to retire in the next 5 years. In March 2019, we reported on key talent management strategies that can help agencies better manage the current and future workforce. Below we focus on nine selected practices we identified related to recruiting, incentivizing, and engaging the federal workforce: Cultivate a diverse talent pipeline. In our prior work, we have noted the importance of active campus recruiting that goes beyond infrequent outreach to college campuses. Active campus recruiting includes developing long-term institutional relationships with faculty, administrators, and students. In addition, OPM guidance emphasizes that agencies should develop an inclusive approach to their talent acquisition strategies. This includes developing strategic partnerships with a diverse range of colleges and universities, trade schools, apprentice programs, and affinity organizations from across the country. Recruit continuously and start the hiring process early in the school year. The ability to hire students is critical to ensuring that agencies have a range of experience levels for succession planning and a talent pipeline to meet mission requirements. One of the key challenges agencies face in recruiting students is managing the timing of recruitment. The federal fiscal year begins on October 1—about when private sector firms we interviewed start recruiting on campus. Frequently, however, federal agencies have been unable to hire at this time of year because of the limitations of budget uncertainty. Yet if agencies wait to start the recruiting and hiring process until they receive funding, many graduates will have taken other job opportunities. Agencies can overcome these timing challenges by recruiting continuously and starting the hiring process early in the school year. To recruit continuously, Chief Human Capital Officers (CHCOs) from the U.S. Departments of Agriculture and Homeland Security said that they advertise funding-conditional positions throughout the year. Write user-friendly vacancy announcements. We previously reported that some federal job announcements were unclear. This can confuse applicants and delay hiring. In July 2018, OPM officials stated that agencies can develop more effective vacancy announcements when hiring managers partner with human resource (HR) staff. According to OPM, hiring managers can work with HR staff to identify the critical competencies needed in the job, develop a recruiting strategy, and ensure the job announcement accurately and clearly describes the required competencies and experience. To promote collaboration between hiring managers and HR staff, OPM is training agencies on the role of hiring managers in writing vacancy announcements, according to OPM officials. Strategically leverage available hiring and pay flexibilities. To help ensure agencies have the talent they need to meet their missions, we have found that federal agencies should have a hiring process that is simultaneously applicant friendly, sufficiently flexible to enable agencies to meet their needs, and consistent with statutory requirements, such as hiring on the basis of merit. Key to achieving this is the hiring authority used to bring applicants onboard. In March 2019, we reported that CHCOs cited the complex competitive examining process as a cause of the lengthy hiring time. This has been a long-standing concern. In our 2002 report on human capital flexibilities, we noted that for many years prior, federal managers had complained that competitive examining procedures were rigid and complex. Agencies can use a number of additional hiring authorities beyond competitive examining. These authorities can add flexibility to the process and CHCOs have expressed a desire for more. However, we previously found that agencies relied on only a small number of available authorities. In fiscal year 2014, of the 105 hiring authority codes used in total, agencies relied on 20 hiring authority codes to make around 90 percent of the new appointments. We recommended in 2016 that OPM use information from its reviews of agencies’ use of certain hiring authorities to determine whether opportunities exist to refine, consolidate, or expand agency-specific authorities, and implement changes where OPM is authorized, including seeking presidential authorization or developing legislative proposals if necessary. OPM agreed with our recommendation and has made progress in these areas, although more work is needed to follow through on planned actions to streamline authorities. For example, in December 2018, OPM said that it continues to research and examine streamlining opportunities, such as those identified in its July 2018 study on excepted service hiring authorities. However, OPM did not provide a time frame for implementation. In addition, in its March 2019 Congressional Justification for the Fiscal Year 2020 Budget Request, OPM included legislative proposals for new hiring authorities, such as authority for short-term appointments to allow agencies to appoint and compensate highly qualified experts to help agencies meet critical needs as well as a change to the criteria for granting direct hire authority. A variety of special pay authorities can help agencies compete in the labor market for top talent, but agencies only use them for a small number of employees. In fiscal year 2016, these incentives were used for less than 6 percent of employees. In December 2017, we reported that agencies can tap an array of special payments when they need to recruit or retain experts in engineering, cybersecurity, or other in-demand fields. These payments include, for example, incentives for recruitment or retention, or higher rates of pay for critical positions. We found that agencies reported that these payments were helpful, but few documented their effects, and OPM had not assessed their effectiveness. Further, in our March 2019 report, we found that less than 5 percent of employees received payments for recruitment or retention annually in the past 10 years. In December 2017, we made three recommendations to OPM, including for it to track the effectiveness of special payment authorities. OPM partially concurred with this recommendation, saying that agencies are in the best position to take this action. In December 2018, OPM stated that it established a baseline to measure changes in the use of special payment authorities over time, and that it is focused on government-wide, mission- critical occupations to help identify trends where there may be recruitment and retention difficulties. However, documents OPM provided gave no information on actions taken on this recommendation. We will continue to monitor OPM’s actions to implement this recommendation. This is one of 18 priority recommendations in GAO’s Priority Recommendations letter to OPM. Use relevant assessment methods and share hiring lists. In March 2019, we reported that CHCOs and OPM officials we interviewed stated that roadblocks to hiring the right skills include issues with assessment methods. Specifically, agencies may use methods that are less relevant for assessing the desired skills or agencies may experience issues incorporating multiple assessments in the hiring process. For example, one CHCO we interviewed said that her agency uses multiple-choice questions to assess candidates, but essay questions more effectively assess the skills she seeks. OPM issued guidance to agencies on how to use additional assessment methods, including how to rank applicants. Additionally, federal employee and management group representatives we spoke with said agencies could reduce the time of the assessment process by sharing hiring lists. The Competitive Service Act of 2015 allows agencies to share hiring lists, but agencies have only started to pilot the practice within departments, according to OPM officials we spoke with for our March 2019 report. OPM and agencies discussed sharing hiring certificates with the CHCO Council, and OPM is planning virtual training sessions on this topic. However, one federal employee group representative noted that to be consistent with merit principles, agencies may need to refresh the list every 2 to 3 months to give new candidates the opportunity to enter the application pool. Highlight agency mission and link to employees’ work. Agencies can help counter negative perceptions of federal work by promoting their missions and innovative work, according to experts and CHCOs we interviewed for our March 2019 report. For example, DHS’s CHCO told us that DHS provides “Day in the Life” information on its work to promote public awareness of how its everyday tasks tie in with its mission of protecting the United States. In addition, we have previously reported that high-performing organizations create a “line of sight” between individual performance and organizational results by aligning employees’ daily activities with broader results. Agencies can motivate and retain employees by connecting them to their agency’s mission, according to human capital experts and federal employee and management group representatives we interviewed. Employee responses to Federal Employee Viewpoint Survey (FEVS) indicate the federal government appears to be performing well in this area. In 2017, 84 percent of employees knew how their work related to the agency goals and priorities. Increase awareness of benefits and incentives, such as work-life programs. As shown in figure 2, the majority of federal employees were satisfied with compensation, and employees who participated in work-life programs were satisfied with those incentives. However, OPM’s 2018 Federal Work-Life Survey Governmentwide Report found that one of the most commonly reported reasons employees do not participate in work- life programs is lack of program awareness among employees and supervisors. Increase support for an inclusive work environment. An increasingly diverse workforce can help provide agencies with the requisite talent and multidisciplinary knowledge to accomplish their missions. In January 2005, we reported fostering a diverse and inclusive workplace could help organizations reduce costs by reducing turnover, increasing employee retention across demographic groups, and improving morale. We also reported that top management commitment is a fundamental element in the implementation of diversity management initiatives. Encourage details, rotations, and other mobility opportunities. In March 2019, we stated that CHCOs, human capital experts, and federal management groups said upward and lateral mobility opportunities are important for retaining employees. CHCOs also said that in some cases, lateral mobility opportunities such as rotations, details, and opportunities to gain experience in other sectors can help employees gain new skills more cost-effectively than training, particularly for rapidly changing skill sets such as those related to the sciences. Further, we previously reported that effective interagency rotational assignments can develop participants’ collaboration skills and build interagency networks. However, according to OPM data, few employees in 2017 moved horizontally because, according to federal manager group representatives and our previous work, managers are sometimes reluctant to lose employees. (See table 2.) We have previously made recommendations that could help address these challenges. For example in 2015, we recommended that OPM determine if promising practices, such as providing detail opportunities or rotational assignments to managerial candidates prior to promotion, should be more widely used across government. OPM partially concurred with this recommendation and agreed to work with the CHCO Council to explore more government-wide use of rotational assignments. However, OPM noted that agencies already have authority to take these actions. In June 2019, OPM officials told us they had discussed the scalability of promising practices for supervisors—specifically, details and rotational assignments and a dual career ladder—with members of the CHCO Council. OPM found these practices were being used at some agencies, but has not determined if these practices may be beneficial to other agencies. In conclusion, OPM has instituted numerous efforts to assist agencies’ in addressing mission-critical skills gaps within their workforces. This includes providing guidance, training and on-going support for agencies on the use of comprehensive data analytic methods for identifying skills gaps and the development of strategies to address these gaps. However, as of December 2018, OPM had not fully implemented 29 of our recommendations made since 2012 relating to this high-risk area. We will continue to monitor OPM’s efforts to implement our recommendations. Further, we have reported on numerous talent management strategies that can help agencies better manage the current and future workforce. Without these measures, the federal government’s ability to address the complex social, economic, and security challenges facing the country may be compromised. Chairman Lankford, Ranking Member Sinema, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Yvonne D. Jones, Director, Strategic Issues, at (202) 512-6806 or jonesy@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Clifton Douglas, Jr., Assistant Director; Christopher Falcone; Karin Fangman; Cindy Saunders, Alan Rozzi and Katherine Wulff. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Strategic human capital management plays a critical role in maximizing the government's performance and assuring its accountability to Congress and to the nation as a whole. GAO designated strategic human capital management as a government-wide, high-risk area in 2001. Since then, important progress has been made. However, retirements and the potential loss of leadership and institutional knowledge, coupled with fiscal pressures, underscore the importance of a strategic and efficient approach to acquiring and retaining individuals with critical skills. As a result, strategic human capital management remains on GAO's High-Risk List. This testimony is based on a large body of GAO work issued from May 2008 through May 2019. This testimony, among other things, focuses on key human capital areas where some actions have been taken but attention is still needed by OPM and federal agencies on issues including: (1) addressing critical skills gaps and (2) recruiting and hiring talented employees. GAO, along with the Office of Personnel Management (OPM) and individual agencies, has identified skills gaps in numerous government-wide occupations. According to GAO's 2019 analysis of federal high-risk areas, skills gaps played a role in 17 of the 35 high-risk areas. Causes vary but these skills gaps often occur due to shortfalls in one or more talent management activities such as robust workforce planning. Staffing shortages and the lack of skills among current staff not only affect individual agencies but also cut across the entire federal workforce in areas such as cybersecurity and acquisition management. Additionally, the changing nature of federal work and the high percentage of employees eligible for retirement could produce gaps in leadership and institutional knowledge, and threatens to aggravate the problems created from existing skills gaps. For example, 31.6 percent of permanent federal employees who were on board as of September 30, 2017, will be eligible to retire in the next 5 years with some agencies having particularly high levels of employees eligible to retire. GAO's work has identified a range of problems and challenges with federal recruitment and hiring efforts. Some of these problems and challenges include unclear job announcements and a lengthy hiring process. Further, the federal workforce has changed since the government's system of current employment policies and practices were designed. Strategies that can help agencies better manage the current and future workforces include: Manage the timing of recruitment . To address issues of funding uncertainty at the beginning of the fiscal year, agencies should recruit continuously, starting the hiring process early in the school year. Write user-friendly vacancy announcements . GAO has reported that some federal job announcements were unclear. This can confuse applicants and delay hiring. OPM stated that when hiring managers partner with human resources staff, agencies can develop more effective vacancy announcements. Leverage available hiring and pay flexibilities . To help ensure agencies have the talent they need, they should explore and use all existing hiring authorities. A variety of special pay authorities can help agencies compete in the labor market for top talent, but GAO has found that agencies only use them for a small number of employees. Increase support for an inclusive work environment . An increasingly diverse workforce can help provide agencies with the requisite talent and multidisciplinary knowledge to accomplish their missions. Encourage rotations and other mobility opportunities. Upward and lateral mobility opportunities are important for retaining employees, but few employees move horizontally because managers are sometimes reluctant to lose employees. Without these measures, the federal government's ability to address the complex social, economic, and security challenges facing the country may be compromised. Over the years, GAO has made numerous recommendations to agencies and OPM to improve their strategic human capital management efforts. Agencies have taken actions to implement some of these recommendations, but many remain open. GAO encourages OPM and the agencies to fully implement the recommendations.", "document_type": "gao"}
{"report": "VA has taken several steps in recent years to reduce health care disparities for minority veterans and advance health equity, but lacks mechanisms to ensure accountability for advancing health equity using these or other actions. In particular, VA established a program office and a dedicated steering committee to draft VA’s first action plan designed to achieve health equity. However, this initial action plan lacked performance measures and clear lines of accountability; as such, the extent to which it has been implemented and the progress made in achieving its goals is unknown. In 2012, VA established OHE to lead the department’s efforts to advance health equity and reduce health disparities throughout VA’s health care system. At that time, the Principal Deputy Under Secretary for Health— who reports to the Under Secretary for Health—identified health equity as a cross-cutting issue of the highest priority, and as such, he required the Director of OHE to report directly to him. OHE is responsible for several efforts, including providing education, training, research, communications and information; promoting common awareness about health care disparities and working to improve health care outcomes; and representing VA and serving as a liaison to other governmental and non- governmental organizations working to achieve health equity. OHE was also tasked with developing and maintaining a comprehensive action plan to achieve health equity in VA medical centers and improve VA’s overall quality of care. Also in 2012, VA’s Principal Deputy Under Secretary for Health created the Health Equity Coalition (HEC). Chaired by the Director of OHE, the HEC is a VA-wide steering committee that is comprised of officials from several VA program offices dedicated to areas such as patient care services, communications, research and development, and minority veteran issues. The HEC advises and assists OHE in developing and implementing plans, sets milestones to review progress to ensure timely completion of initiatives, and ensures that program offices commit appropriate organizational resources needed to meet these goals. Since its establishment, OHE has experienced changes in budget and staff levels from year to year. OHE’s core budget, which VA officials told us is spent on salaries, travel, and supplies, fluctuated between 2013 and 2019; staffing levels began decreasing in 2014 and subsequently increased in 2019. (See fig. 1.) VA officials told us that staff reductions were due to transfers and reassignments of OHE staff to other offices and positions, which coincided with a shifted focus from equity issues to other issues such as veteran wait times and modernization efforts. In addition, OHE was also repositioned to a lower level within the organization from VHA’s Office of the Principal Deputy Under Secretary for Health to the Office of the Deputy Under Secretary for Health for Organizational Excellence. In February 2014, VA released its first Health Equity Action Plan (action plan), drafted by OHE and the HEC to document VA’s approach for eliminating health disparities and achieving health equity. The action plan included five focus areas, or goals, in which VA intended to direct its efforts to improve the overall quality of care for all veterans, including minority veterans: Awareness: increase awareness of the significance of health disparities, their impact on the nation, and the actions necessary to improve health care outcomes for racial, ethnic, and underserved populations. Leadership: strengthen and broaden leadership for addressing health disparities at all levels. Health system and life experience: improve health and health care outcomes for racial, ethnic, and underserved populations. Cultural and linguistic competency: improve cultural and linguistic competency, and the diversity of the health-related workforce. Data, research, and evaluation: improve data availability; and coordination, utilization, and diffusion of research and evaluation outcomes. OHE and the HEC included between two to 14 “implementation activities” in each of the five focus areas to describe specific plans and tasks VA could undertake to advance health equity. For example, under the “data, research, and evaluation” focus area, examples of implementation activities included, “identify limitations of existing data, barriers to access to data, and data collection methodologies that affect VA’s ability to describe disparities,” and “develop a strategy for prioritizing identified disparities.” In addition, all five focus areas also included “success criteria” to measure success, a list of resources needed in order implement the activities, and identified stakeholders. However, despite documenting elements needed to make improvements in the five focus areas, the extent of VA’s progress in implementing the action plan and advancing health equity is unknown because the action plan lacks performance measures and clear lines of accountability. Performance measures and clear lines of accountability are among the criteria identified in GAO’s body of work on effectively managing performance under GPRA. Without such mechanisms, VA cannot be assured that the plan has been implemented or will ultimately be effective in addressing health equity. In particular, we found that VA’s plan did not include the following mechanisms: Performance measures. Our past work on effectively managing performance shows that performance measures should demonstrate how well the organization is meeting its goals and should be linked directly to offices that have responsibility for the program or activity. As previously noted, although VA’s action plan included a list of “success criteria”, such criteria were not measurable, and were not directly linked to the specific implementation activities or to the responsible lead office for any of the five focus areas. For example, under the “leadership” focus area, the action plan identified “development of process tools for monitoring in FY 2014” as one of the success criteria, but it was not clearly linked to one of this focus area’s specific implementation activities and did not identify who among the list of lead offices and stakeholders was responsible for it. under the “data, research, and evaluation” focus area, the action plan identified “developed standards for collecting data used to understand disparities” and “improved on-going data sharing between programs” as two of the success criteria, but they were not linked to one of this focus area’s implementation activities, nor were they specifically assigned to one or more of the lead offices and stakeholders listed as responsible for achieving them. Clear lines of accountability: Our past work on effectively managing performance also shows that designating a lead official or office to be responsible for coordinating efforts to achieve results for each goal or action creates clear lines of accountability. This is critical to implementing change to achieve goals and marshaling resources needed to improve management. In contrast, VA’s action plan listed for each of the five focus areas: a broad group of lead offices and stakeholders responsible for the entire focus area, in general, (for example, HEC members and their respective offices, VISN officials, and VA medical center directors) but did not designate specific offices or officials responsible for coordinating efforts to complete specific implementation activities. vaguely described resources—such as leadership support, time, money, and travel—needed to execute all of the implementation activities under each of the five focus areas, but did not designate specific lead offices or stakeholders responsible for committing specific resources needed to implement each activity. Without such performance measures or lines of accountability, VA lacked the means to measure specific progress in implementing and achieving the action plan’s goals. Moreover, according to VA officials, following the release of the action plan and the reduction in number of OHE staff, the frequency of HEC meetings decreased and the last regular meeting before it reconvened in January 2019 occurred in early 2015. As such, VA officials told us that there was no formal involvement or oversight following the release of the action plan to ensure that coalition members were meeting their responsibilities, including committing the organizational resources needed to ensure implementation. In recent years, there have been several recommendations from stakeholders, urging VA to provide OHE with the resources needed to fully implement its action plan. Specifically, the 2016 Commission on Care report recommended that VA commit additional resources to address the causes of the problem and ensure the action plan is fully implemented. The Secretary of VA at the time concurred with the Commission’s recommendation and said that VA would identify health equity leaders and clinical champions in each VISN and VA medical center who could catalyze and monitor actions to implement the action plan and further advance the elimination of health disparities. More recently, VA has signaled renewed interest in supporting the advancement of health equity by increasing OHE’s budget and staffing levels in fiscal year 2019, and reconvening the HEC in January 2019. According to OHE officials, the reconvened HEC has held regular meetings and approved an updated action plan in September 2019. In October 2019, OHE officials told us that the action plan had been sent to VHA leadership for review, which they anticipated would be completed within the first fiscal quarter of 2020. Both OHE and other VA programs fund research conducted by VA clinicians and staff to identify disparities in health care outcomes. However, VA officials and researchers have noted problems with the completeness and accuracy of the data on veterans’ race and ethnicity. These weaknesses, in turn, limit VA’s ability to assess and address health care disparities at the VA medical center level. VA funds research aimed at identifying health care outcome disparities involving minority veterans. According to OHE officials, annually OHE receives a research budget separate from its core budget, and can apply monies from this separate budget to any appropriate research activities it wishes to support. As an example, in fiscal year 2019, OHE officials told us it provided funds to the Quality Enhancement Research Initiative, VA’s Center for Health Equity, Research, and Promotion, and two VISNs. In addition to OHE-funded research, VA’s Health Services Research & Development (HSR&D) has spent about $12 million to fund research studies related to identifying and reducing disparities in health care outcomes between minority and other veterans since 2014. This research has identified disparities in health care outcomes for minority veterans. Research funded by HSR&D includes the following studies: A 2017 report focused on whether changes in the way VA delivered primary care were effective in addressing racial and ethnic disparities in health care outcomes. Using VA data from 2009 and 2014, the study found lower rates of control of hypertension and diabetes among veterans who were African American, Hispanic, American Indian/Alaska Native, and Native Hawaiian and other Pacific Islanders compared with White veterans. A 2016 report examined why minority veterans with mental health and substance abuse disorders are less likely to use mental health and substance abuse services, and to complete mental health and substance abuse treatment. The study, which used 2013 data, found health disparities between White veterans and Black, Hispanic, and American Indian or Alaskan Native veterans with mental health and substance abuse disorders on several quality measures, including access to care. The study also found disparities by race and ethnicity in patients’ experiences communicating with providers and office staff. A 2017 systematic review of 351 studies published between 2006 and February 2016 examined the prevalence of disparities in health care outcomes experienced by veterans, including health disparities based on race and ethnicity. This systematic review concluded that a large proportion of the research conducted has focused on differences between Black or African American and White veterans and suggested that future targeted research is needed to capture the unique characteristics of American Indian or Alaska Natives and Native Hawaiian or other Pacific Islanders. Despite VA’s funding of numerous studies to identify health disparities and to explore interventions to potentially reduce or eliminate them, health disparities continue to persist among VA’s patient population. HSR&D officials told us that VA has faced difficulties translating research into practice in clinical settings, including their research findings about disparities in health care outcomes. HSR&D officials told us that they have recently undertaken new efforts aimed at implementing research findings, including those focused on disparities in health care outcomes. Among these efforts is the development of a new program to provide additional funding (for up to two years) for research projects that are completed or close to completion so that researchers can: 1) develop tool kits that others can adopt, and 2) implement research in additional VA medical centers in order to facilitate the sharing of information about successes and failures to make the impact of research more effective. Generally, VA collects and records race and ethnicity information in veterans’ EHRs when they enroll in VA health care online, by mail, fax, or telephone applications, or through self-service touch-screen kiosks at VA medical centers. Intake clerks may also collect and record race and ethnicity information when assisting veterans with enrollment, as well as when checking a veteran in at a clinic for an outpatient appointment, or registering a veteran for an inpatient hospital admission. However, VA researchers and officials have identified weaknesses in the completeness and accuracy of VA’s patient data on race and ethnicity, which has raised data reliability concerns. (See fig. 2) VA cannot ensure that race and ethnicity information labeled in the EHR as self-reported is accurate. VA follows standards outlined by the Office of Management Budget, which state that self-reported information is the preferred method for obtaining an individual’s race and ethnicity, because it is more accurate than data collected by observation of a third party. However, a VA data expert with HSR&D’s Center for Health Equity Research and Promotion, and officials at one of the VISNs in our review told us that they are aware that intake clerks sometimes enter information based on observation, which may be inaccurate, because they feel uncomfortable asking veterans for their race and ethnicity information in case the veterans find it offensive. Adding further to potential inaccuracies, because VA’s EHR default setting automatically records all race and ethnicity information as self-reported, observational data are only accurately labeled as such if a clerk manually changes the default setting to ‘observational’. The VA data expert from HSR&D’s Center for Health Equity Research and Promotion told us that, based on her research, almost all of the information collected electronically in the EHR is automatically assigned as self-reported, the default setting, even when it is collected by observation of VA staff. This expert also told us that research efforts at VA medical centers have indicated that the default setting is rarely changed and that some clerks had never changed the setting because they do not know how. VA research has indicated that observational data is more accurate for Blacks or African Americans and Whites than other racial groups, and that studies focused on other racial groups may be especially vulnerable to misclassification bias. As such, VA lacks reasonable assurance that the identification of race and ethnicity as “self-reported” is accurate. Data on veterans’ race are often incomplete. Race and ethnicity information is collected as two separate categories in the EHR, and as previously stated, is generally obtained when a patient enrolls in VA health care, or seeks care at a VA medical center or clinic. Two VA researchers told us that ethnicity data—based on veterans’ designation of whether they are Hispanic or non-Hispanic—are often more complete than race data. They said that one reason for this is that the order in which the questions are asked may be problematic; specifically, the ethnicity question is asked first, followed by a second question to request a race designation. Veterans may self-report that they are “Hispanic” upon enrollment or check-in for an inpatient admission or outpatient medical visit, and then leave the race field empty because they believe that they have already provided this information. Missing data on race impedes VA’s ability to identify potential disparities in health care outcomes. Conflicting race and ethnicity information in a veteran’s medical records makes it difficult to determine which information is accurate. According to VA researchers we spoke with, because a patient’s race and ethnicity information is uploaded from his or her EHR after each inpatient admission and outpatient appointment, there can be multiple records for each patient’s race and ethnicity data in VA databases. These patient records often conflict with one another, and may result from the use of both observational and self-reported data. As such, officials stated that it can be difficult to determine which of the multiple race or ethnicity records are accurate. To account for the issues with completeness and accuracy, VA researchers have used various approaches. VA researchers we spoke with told us that while they use data entered into VA’s EHR, which are then uploaded into various databases, they also must use a variety of methods, often time-intensive, to enable the use of race and ethnicity data due to concerns about its completeness and accuracy. These methods include using veterans’ patient records that may be several years old and from multiple VA health care settings, and looking at patient race and ethnicity information captured across multiple years and VA facilities. In addition, researchers also described using multiple non-VA data sources to supplement VA’s race and ethnicity information, such as Medicare data, and data from the Department of Defense’s roster of veterans from recent military operations. VA officials and other stakeholders representing veterans’ interests have recognized the weaknesses in VA’s race and ethnicity data and the importance of improving those data in order to address disparities and improve health equity. For example, VA’s first action plan included a goal to improve data availability, supported by implementation activities to “identify limitations of existing data, barriers to access to data, and data collection methodologies that affect VA’s ability to describe disparities” and “identify strategies for capturing data on race, ethnicity, language…needed to stratify the results for all quality measures and to address disparities.” in 2016, the Commission on Care recommended that VA increase the availability, quality, and use of race, ethnicity, and language data to improve the health of minority veterans, as well as utilize systems that monitor trends in health status, patient satisfaction, and quality measures. in its 2015 annual report, the Advisory Committee on Minority Veterans recommended that VA enhance its existing data collection processes to include the reporting of race and ethnicity data for all benefits and utilization programs to ensure the identification of delivery gaps and potential disparate levels of service. Furthermore, in its 2017 annual report, the Committee again highlighted ongoing concerns with VA’s inconsistency in collecting race and ethnicity data and stated that it impedes VA’s ability to adequately identify health disparities and to ensure minority veterans are receiving quality care and services throughout VA’s system. VA is currently collaborating with the Department of Defense to implement a new EHR system. As yet, they have not yet addressed how the EHR will store race and ethnicity information. The new EHR system is to provide both departments with a common EHR platform that is intended to support the provision of seamless care and create a single health record for service members and veterans. VA officials from the Office of EHR Modernization told us that this collaboration is still in the very early stages and that while race and ethnicity information will be included in the new EHR system, the new EHR will take 10 years to fully implement. Data weaknesses, including incomplete and inaccurate data have limited VA’s ability to advance health equity and patient care in its medical centers, according to VA officials. Unlike VA researchers, who report being able to account for missing and inaccurate race and ethnicity data, most VA medical centers do not have the research staff and data specialists needed for these efforts, according to a VA researcher from HSR&D’s Center for Health Equity Research and Promotion and officials from a VISN included in our review. As a result, the inaccurate and missing data have limited the ability of VISN and VA medical center staff to identify and address disparities in health care outcomes by race and ethnicity at the medical center level. VISN officials we spoke to discussed the challenges they encountered when trying to obtain complete and accurate data on health care outcomes by race and ethnicity to identify disparities involving their minority veteran populations. For example, one VISN official told us that she began an effort to analyze disparities in health care outcomes by race and ethnicity in fiscal year 2018, but encountered challenges in obtaining complete and accurate data for minority veterans. She said she contacted OHE officials for assistance, who provided data for diabetes and hypertension by race and ethnicity, but these data were 2 years old and available only at the national level. According to the VISN official, complete and accurate health care outcomes data by race and ethnicity were not available for minority veterans that received care in her region. The official told us that she subsequently contacted both VISN-level and national data specialists, but was still unable to obtain the data to assess health care outcomes by veterans’ race and ethnicity at the regional or local level. other VISN officials we spoke to explained that they had a similar experience when they explored using race and ethnicity data to design a dashboard for a VISN-funded project to track efforts to address disparities in ambulatory care readmissions involving minority veterans. They also told us they too contacted regional and national data specialists, but were told that the readmissions data were missing and inaccurate by race and ethnicity and therefore not useable for their efforts. VA officials told us they are taking steps to provide VA medical centers with data on health care outcomes at their facilities. These officials told us that they are currently developing two health equity dashboards that will use VA’s data on race and ethnicity to provide information on health care outcomes, which would allow VA staff to identify any disparities in these outcomes at the VISN and VA medical center levels. The two health equity dashboards are in different stages of development and, as of September 2019, VA did not have a timeline for completion and implementation across VA medical centers for either dashboard. According to VA officials, the development of these dashboards will not address the accuracy and completeness of the race and ethnicity data in the VA’s EHR. In order to maximize the effectiveness of these dashboards, VA needs to ensure that underlying data weaknesses are addressed by ensuring that race and ethnicity data in the EHR are complete and accurate. VA collects patient experience feedback from veterans, including minority veterans, through the following surveys: The Survey of Healthcare Experiences of Patients (SHEP) is VA’s national, standardized, and publically reported patient experience survey that comprises up to 83 questions that are used to collect information about patients’ experiences in various inpatient care settings. The SHEP covers topics to assess patients’ perceptions of their experience using the Consumer Assessment of Health Providers and Systems Survey, which is the health care industry standard. According to VA officials, the response rate for the SHEP is just under 40 percent, and on average, 95 percent of respondents complete survey questions about their race and ethnicity. SHEP survey results are reported publically at the national, VISN, and VA medical center level. VA does not report survey data for specific racial and ethnic groups because, according to VA officials, the number of minority veterans responding to the SHEP is too small to report. In 2012, a memo establishing the OHE recommended that VA send the SHEP survey to a higher number of veterans from racial and ethnic minority groups so there are enough responses to report survey results by those minority groups. However, VA officials told us that they were not aware of this recommendation and had not addressed it. Currently, VA officials told us that VA staff can access SHEP data by race and ethnicity in four broad categories: Hispanic, White, African American or Black, and other, which includes American Indian or Alaskan Native, Asian, and Native Hawaiian or other Pacific Islander racial groups. VA officials told us these data can be accessed on VA’s intranet and are updated on a monthly basis. The Survey of Veteran Enrollees’ Health and Use of Health Care comprises questions about a range of issues, such as enrollee’s health status, insurance, VA and community health care use, and attitudes and perceptions of VA services. The survey is generally conducted on an annual basis, and achieved a 32 percent response rate in 2018. VA publically reports these survey results by race and ethnicity at the national level, and also provides survey results by race and ethnicity for each VISN. For example, one indicator in the 2018 survey results showed that Native Hawaiians were far less satisfied with their ability to get referrals compared to other minority groups. According to VA survey documentation, VA requires a minimum number of survey responses to draw conclusions across the VA enrollee population; the number of survey responses must be aggregated at the VISN level to meet this minimum number. Veterans Signals is a VA survey intended to collect immediate targeted feedback on veterans’ experiences with outpatient services on an ongoing basis. VA officials told us that about one to two million survey invitations are sent out via email each week to veterans who recently received outpatient services, and have provided their email addresses to VA. These short surveys include eight to nine questions and focus on a particular area related to veterans’ recent experiences with VA health care services, such as scheduling appointments, pharmacy wait times, and proficiency of provider communication about veteran concerns during appointments. VA officials told us that the surveys have a response rate of about 20 percent, and of the responses received, 44 percent of respondents provide their race and ethnicity information. VA officials told us that VA medical center staff have access to survey results in real-time and can review results by race and ethnicity for their individual medical centers. In addition to these surveys, VA collects patient experience feedback from veterans, including minority veterans, through its patient advocates located at its medical centers. Each of VA’s 172 VA medical centers is responsible for making at least one patient advocate available to respond to veterans’ feedback and for ensuring feedback is recorded in its Patient Advocate Tracking System (PATS)—an electronic system used to describe and track the resolution of veterans’ feedback across VA medical centers. Patient advocates enter veterans’ feedback in PATS and assign one or more issue codes that generally describe the nature of the feedback. Of the 21 patient advocates we interviewed across 12 VA medical centers, most said they generally do not include race and ethnicity information in PATS when filing a veteran’s complaint, but a few patient advocates said they will include such information if it pertains directly to the complaint. For example, a patient advocate told us she may include race and ethnicity information in PATS in the case of a concern that discrimination occurred. We found that some veteran complaints may not be consistently coded and reported under the correct PATS issue codes in a manner similar to inconsistencies we have identified in prior work. According to VA officials from the Office of Patient Advocacy, two PATS codes were created in 2017 that, in particular, may specifically apply to issues affecting minority veterans: (1) discrimination concerns, and (2) diversity concerns. Of the 21 patient advocates we interviewed about these two specific issue codes, nine were not familiar with or had never used them. VA officials told us that they expected to see patient advocates use these codes more often in 2019 as a result of updates to their patient advocate training curriculum, required for newly hired patient advocates and available to all others. Patient advocates that we interviewed often told us that they review PATS data to report systemic issues to their VA medical center leadership, and a few said they report on a weekly or monthly basis. Additionally, VISN patient advocate coordinators use the PATS data to determine whether there are any trends in PATS data across the medical centers in their networks. As one of the nation’s largest health care systems, VA has a unique opportunity to gain a better understanding of the reasons that disparities in health care outcomes occur. VA signaled its commitment to reducing disparities for racial and ethnic minorities and achieving health equity by establishing a responsible program office, creating an action plan, and funding research toward this goal. As the number of minority veterans receiving VA health care services continues to increase, it is important that VA enhances and strengthens its efforts to identify and address disparities in health care outcomes to ensure that all veterans receive equitable care. Despite these efforts, however, without including performance measures or lines of accountability, VA lacks the means to ensure any action plan will be fully implemented to achieve its goals. Further, weaknesses in race and ethnicity data due to problems with the completeness and accuracy continue to limit VA’s ability to identify and address disparities in health care outcomes at the VA medical center level. Although VA is developing equity dashboards to provide health care outcomes data by race and ethnicity at the VA medical center level, these efforts will not improve the completeness and accuracy of the race and ethnicity data in VA’s EHR. Until VA resolves known weaknesses with the completeness and accuracy of its race and ethnicity data, it will be limited in its ability to assess health equity for veterans receiving care at its facilities. We make the following two recommendations to VA: The Under Secretary for Health should ensure that any action plan for achieving health equity includes key elements for successful implementation by consistently applying criteria identified in GAO’s past work on effectively managing performance, including developing performance measures to assess progress and creating clear lines of accountability by designating specific offices or officials with responsibility for coordinating efforts to implement actions and committing resources necessary for achieving its goals and objectives. (Recommendation 1) To ensure the availability of information on health care outcomes by race and ethnicity throughout the VA health care system, the Secretary of Veterans Affairs should conduct an assessment to determine the completeness and accuracy of race and ethnicity data captured in VA’s electronic health record, and implement corrective actions as necessary to resolve any identified deficiencies. (Recommendation 2) We provided a draft of this report to the Department of Veterans Affairs and the Department of Defense for review and comment. The Department of Defense did not have comments. VA provided written comments, which are reprinted in appendix I. VA concurred with both of our recommendations—that any health equity action plan should include performance measures to assess progress and that VA should resolve weaknesses identified with the completeness and accuracy of race and ethnicity data. VA further provided information on how the agency intends to address our recommendations, with targeted completion dates of December 2020 and June 2021, respectively. We are sending copies of this report to the appropriate congressional committees, the Secretary of Veterans Affairs and the Under Secretary for Health, and the Secretary of the Department of Defense. In addition, the report is also available at no charge on GAO’s website at http://www.gao.gov. If you or your staff has any questions regarding this report, please contact me at (202) 512-7114 or draperd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Ann Tynan, Assistant Director; Michelle Paluga, Analyst-in-Charge; Jennie Apter, Romonda McKinney Bumpus, and Phil Steinberg made key contributions to this report. Also contributing were Kaitlin Farquharson and Ethiene Salgado-Rodriguez.", "summary": "According to VA, in 2016, racial and ethnic minority veterans represented about 22 percent of the total veteran population of 18.6 million. VA projects racial and ethnic minority veterans will make up 36 percent of its total veteran population by 2040. VA has identified racial and ethnic disparities in its health care outcomes, mirroring trends seen across the United States. House Report 115-188 included a provision for GAO to review whether VHA provides quality, equitable care for minority veterans. GAO's report examines, among other issues, (1) the extent to which VA has taken steps to advance health equity for racial and ethnic minority veterans, and (2) VA's efforts to use race and ethnicity data to identify and address disparities in health care outcomes involving minority veterans. GAO reviewed relevant documents, such as strategic and operational plans and peer-reviewed research studies; assessed VA's health equity action plan against criteria identified in GAO's body of work on effectively managing performance; and interviewed VA officials familiar with VA's health equity efforts, as well as race and ethnicity data. The Department of Veterans Affairs (VA) has taken steps to reduce disparities in health care outcomes linked to race and ethnicity, but lacks mechanisms to measure progress and ensure accountability for results. In 2012, VA established the Office of Health Equity to identify and address health care outcome disparities and to develop an action plan to achieve health equity. This office issued an action plan in 2014 that identified activities to make improvements in five focus areas, such as increasing awareness of the significance of disparities and strengthening leadership for addressing them. However, GAO found that the extent of VA's progress in implementing the action plan and advancing health equity is unknown because the action plan lacked performance measures and clear lines of accountability for specific offices. For example, although VA's action plan included a list of “success criteria” for each of the five focus areas, these criteria were not measurable, and were not linked to specific activities or to offices responsible for implementation. VA funds research efforts that have identified disparities in health care outcomes involving minority veterans, but rely on data that VA officials and researchers noted have weaknesses in completeness and accuracy. One concern is that race and ethnicity information can be labeled incorrectly in VA patients' electronic health records as ”self-reported”, a highly reliable method of collection, when data were actually collected based on the less reliable method of VA staff observation. Other reported concerns include missing values on patients' race and conflicting race and ethnicity information. VA researchers told GAO they account for some of these concerns by using data from other sources, such as Medicare, but such work-arounds are time intensive. Further, VA officials reported that data weaknesses limit their ability to identify and address disparities in health care outcomes in their medical centers. Despite recognizing weaknesses related to the quality of race and ethnicity data, VA has not implemented corrective actions to address them. Without doing so, VA medical center officials cannot readily identify and address disparities in health care outcomes by race and ethnicity. Note: Concerns about the completeness and accuracy of race and ethnicity information were raised by officials from VA's Office of Health Equity, Veterans Experience Office, and Health Services Research & Development. GAO is making two recommendations to VA to (1) ensure that any health equity action plan includes performance measures to assess progress, and clear lines of accountability designating responsibility to specific offices, and (2) conduct an assessment to determine how to address weaknesses identified with the completeness and accuracy of race and ethnicity data in the electronic health record, and implement corrective actions as necessary. VA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "AOC is responsible for the maintenance, operation, and preservation of the buildings that comprise the U.S. Capitol complex, as shown in figure 1. AOC is organized into the following 10 jurisdictions, each of which is funded by a separate appropriation: (1) Capitol Building, (2) Capitol Grounds and Arboretum (hereafter the Capitol Grounds), (3) Capitol Police Buildings, Grounds, and Security (hereafter the Capitol Police), (4) Capitol Power Plant, (5) House Office Buildings (hereafter the House), (6) Library Buildings and Grounds (hereafter the Library), (7) Planning and Project Management (PPM), (8) Senate Office Buildings (hereafter the Senate), (9) Supreme Court Building and Grounds, and (10) U.S. Botanic Garden (hereafter the Botanic Garden). PPM provides consolidated services to all of AOC’s jurisdictions, such as long-range facility planning, historic preservation, and architectural and engineering design services. In addition, PPM manages systems that span jurisdictions including electrical distribution and emergency generators. PPM is also the parent organization of the Division, which provides construction and facility management support to all of AOC’s jurisdictions. Established in the 1970s, the Division’s mission is to “support AOC jurisdictions serving their Congressional and Supreme Court clients by providing high quality construction and craftsmanship with seamless flexibility, best value, and extraordinary customer service, while protecting our national treasures.” The Division’s operations are funded through a mix of appropriations and project funding from the jurisdictions. Specifically, according to AOC officials, the agency’s appropriation for Capital Construction and Operations provides the salaries and expenses of up to 13 permanent staff. The salaries and expenses of the remaining staff, as well as other costs (such as materials) are covered by the project funding the Division receives from the jurisdictions. According to AOC officials, essentially, the jurisdictions hire the Division to execute work on their behalf, and the Division charges the jurisdictions for its expenses. As a result, the number and type of temporary employees the Division employs at any given time is directly related to the projects it is performing for the jurisdictions. As of October 2018, of the Division’s 162 employees, 12 were permanent employees responsible for executive management and administrative functions. The remaining 150 were temporary employees—124 trade workers and 26 construction support employees—that it hired under temporary (e.g., 13- or 24-month) appointments. The trade workers include electricians, plumbers, masons, woodcrafters and carpenters, cement finishers, sheet metal mechanics, painters and plasterers, hazardous material abaters and insulators, laborers, and warehouse and material handlers. The construction support employees include personnel who perform activities such as construction management, purchasing, and timekeeping. The Division’s temporary employees are eligible for benefits. By law, AOC is generally required to provide all temporary employees with “the same eligibility for life insurance, health insurance and other benefits” to temporary employees who are hired for periods exceeding one year. The benefits AOC’s temporary employees receive may differ from what other federal temporary employees in the executive branch receive since these benefits vary depending on the type of temporary appointment and the employing agency, among other things. For example, employees serving under an appointment limited to 1 year or less are generally not eligible for the Federal Employees’ Group Life Insurance program. As previously stated, the Division pays for the salaries and expenses of its temporary employees with project funding from the jurisdictions. That project funding covers both the Division’s direct and indirect costs. Direct costs are those directly attributed to and expended on a project, such as labor (i.e., trade workers) and materials. In contrast, indirect costs are necessary costs that are not directly attributable to a specific project, such as employee leave and training, as well as salaries for construction support employees, such as supervisors and purchasing agents. To pay for its indirect costs, the Division charges the jurisdictions what it calls an “indirect rate.” As of October 2018, the Division’s indirect rate was 0.85. The Division applies this rate to every direct labor-hour associated with a project it executes for the jurisdictions. For example, for a trade worker with a hypothetical hourly cost of $45, the Division charges the jurisdictions about $83, as shown in figure 2. For more information on the Division’s direct and indirect costs, see appendix II. Based on our analysis of the Division’s data for projects completed during fiscal years 2014 through 2018, the jurisdictions used the Division to varying degrees for projects that ranged widely in terms of cost, complexity, and duration. Cost: There was a wide range in the nominal cost of individual projects the Division completed during fiscal years 2014 through 2018. The smallest individual project cost about $1,100 in 2017 dollars to perform hazardous materials testing in the Ford Office Building for the House jurisdiction in fiscal year 2016. Larger projects may be done in phases and when combined can cost millions of dollars. For example, in 2015 the Division completed a lighting project at the James Madison Building for the Library jurisdiction in two phases at a total cost of about $9.8 million in 2017 dollars. Complexity: During this period, the Division’s projects ranged from work involving one type of activity or trade to work involving several phases or many trades. For example, the Capitol Power Plant jurisdiction used the Division for paint projects and a door replacement. Other projects included the construction of a lactation suite at the Ford House Office Building. For this 4-month project, the Division performed carpentry, electrical work, hazardous materials abatement, and other tasks in order to demolish an existing women’s restroom and build a lactation suite with an adjacent, smaller women’s restroom (see fig. 3). Duration: During this period, the jurisdictions used the Division for projects that varied from quick turnaround projects that took a few days to complete to longer, multi-year projects. Most (about 88 percent) of the projects were completed within one year, while about 4 percent were completed between 1 and 2 years, and about 8 percent took 2 or more years to complete. For example, the Senate jurisdiction used the Division for an elevator repair project in 2016 at the Russell Office Building that took one day to complete while smoke detector upgrades in the James Madison Building for the Library jurisdiction took over 5 years and were completed in 2014. We also identified several examples of projects that the Division did for jurisdictions in phases. Sometimes the duration of the phases were less than one year but when combined the work spanned multiple years. For example, the Division built additional office spaces for staff displaced by the House jurisdiction’s renovation of the Cannon Office Building. Each phase of the work was completed within one year, but the work spanned almost 2 years from November 2014 to August 2016. The extent to which each of the jurisdictions used the Division also varied. Based on our analysis of the Division’s data and discussions with the jurisdictions, the Library, House, and Senate jurisdictions were the primary users of the Division during fiscal years 2014 through 2018, comprising more than 90 percent of the total work by cost for completed projects, as shown in figure 4. The Division completed projects exceeding $1 million for each of these jurisdictions. While jurisdictions have the option to use their own staff or a contractor for projects, jurisdiction officials said they consider a range of factors when determining whether to use the Division. They most frequently cited the Division’s flexibility in responding to scheduling and scoping changes and the jurisdictions’ own internal capacity to execute a project. They less frequently cited other factors, such as the availability of appropriations. Schedule: Jurisdiction officials said the Division provided scheduling flexibility at no extra charge compared to using outside contractors. According to jurisdiction officials, when projects require a great deal of flexibility, the jurisdictions may be more likely to choose the Division over a contractor because the Division can start and stop work as needed and can work nights or on weekends if necessary to keep a project on schedule without charging extra fees. For example, work on projects may need to be stopped or delayed for a variety of reasons, such as for security purposes if there is a protest near the worksite, or during a presidential visit. Jurisdiction officials also noted that the Division can typically mobilize faster than a contractor, a consideration that can be an important factor in determining whether to use the Division. For example, jurisdiction officials noted that the Division’s employees can begin work faster than an outside contractor because they have employee identification badges that authorize access to most buildings across the Capitol complex without an escort. 'Contractors must obtain a badge prior to accessing a work site and require escorts in instances when they do not have an AOC or site- specific badge, and the process of obtaining a badge adds time to when a contractor can begin work. As another example, jurisdiction officials also told us that using a contractor requires that AOC develop full design specifications for a project, a process that takes time and resources. In contrast, the Division can execute work without full design specifications. For example, Capitol Power Plant officials told us they used the Division for renovations to their Administration Building because, according to the officials, the Division started the work sooner, without design specifications and thereby completed the project faster than a contractor likely could have. Capitol Power Plant officials explained that the work— which included new carpet and painting—was agreed upon with the Division without spending time developing detailed design specifications that would have been required to obtain a contractor for the work. Scope Changes: According to jurisdiction officials, the Division is typically more flexible than a contractor when dealing with issues that arise from unforeseen site conditions or changes to a project’s scope. For example, during the construction of the lactation suite discussed above, the Division uncovered lead paint in the walls, requiring the work to stop until the lead paint was removed. According to officials, contractors typically charge for making changes to a project’s scope, such as removing hazardous materials uncovered during construction or associated delays. The Division does not charge for making changes or associated delays. This flexibility is because the Division charges based on direct labor hours spent on a project, meaning its expenses are charged as they are incurred. Accordingly, while a project’s costs may increase if more labor is charged to a project, the Division also has the option of having its employees work on other projects if work on a particular project has to stop. Jurisdiction officials told us that the Division also works with the jurisdictions to save money on projects. According to officials, such savings were the case during a 2-year project that the Division completed at the Library jurisdiction’s Jefferson Building in 2018 with a cost of $3.5 million in 2017 dollars. The project involved reversing the direction of doors in high-occupancy areas to allow for more orderly evacuation of occupants in the event of an emergency, as shown in figure 5. It also involved replacing some of the building’s historic doors and associated hardware with replicas that meet modern safety standards. Officials told us the Division helped the jurisdiction save about $1.2 million (in current dollars) during the course of the project by identifying less expensive materials for the project than originally planned for. Internal staff: Jurisdiction officials also told us that they use the Division for projects when they lack the internal capacity to do so. Most of the jurisdictions have some trade workers, such as electricians and plumbers, on staff to handle their daily operations and maintenance needs. Jurisdictions may execute smaller projects with their own employees but may use the Division for projects beyond routine maintenance work that their own employees cannot fit into their schedules. For example, officials with the Senate jurisdiction told us that they have staff capable of performing cabinetry work but have used the Division in the past for cabinetry work so that their staff could focus on more routine maintenance work. Senate jurisdiction officials also told us that they primarily use their own staff for construction work, but will use the Division as an option to supplement their staff when the volume of the Senate jurisdiction’s own workload is higher than what can be handled internally. Skill and equipment: Jurisdictions may use the Division if they lack the skills or equipment to execute a particular project. Officials from five of the jurisdictions told us that they have staff within their jurisdiction who can execute small projects involving hazardous materials, such as lead paint abatement under 2 square feet in size. Larger projects have additional abatement requirements, and the jurisdictions have used the Division for these projects. As another example, the Capitol Grounds jurisdiction used the Division in 2016 to install the annual Christmas tree on the Capitol lawn because the jurisdiction lacked the necessary equipment to do so. The Botanic Garden jurisdiction, which does not employ any masons, used the Division for a project at its Conservatory in 2016 because of the Division’s masonry expertise. Officials with the Senate jurisdiction also cited the Division’s masonry expertise among other factors, such as the Division’s familiarity with the jurisdiction’s buildings, in selecting the Division to repair the steps at the Russell Senate Office Building in 2017, as shown in figure 6. Availability of appropriations: Jurisdiction officials told us that they might not use the Division if the work cannot be completed by the time the jurisdiction’s appropriations expire. Specifically, because the jurisdictions pay for the Division’s services as work is executed rather than upfront when the work is initiated, the jurisdictions must ensure that work by the Division can be completed before their appropriations expire. Jurisdiction officials told us that as a result, the Division may not be a realistic option when using 1-year appropriations near the end of the fiscal year. In contrast, when using a contractor, jurisdictions may obligate fixed period appropriations prior to the end of the fiscal year for work that will continue into the following fiscal year. Cost: Most jurisdiction officials said that a project’s cost was not a key factor they considered when determining whether to use the Division for a project. When the jurisdictions are considering using a contractor they are not required to obtain cost estimates from the Division first and generally do not do so. As a result, comprehensive information on the relative costs of using the Division compared to a contractor was not available. However, in cases where the jurisdictions told us they did obtain estimates from both the Division and a contractor, they said the cost to use the Division was sometimes more expensive than a contractor and sometimes less expensive, as illustrated in the following examples. Officials with the Supreme Court Building and Grounds jurisdiction told us they used the Division to install a new heating, ventilation, and air-conditioning system in one of its buildings after it obtained an estimate from a contractor. According to officials, the project required specialized skills that the Division’s trade workers did not have. However, once they received the contractor’s estimate, the jurisdiction officials determined it was cheaper to pay for the Division’s employees to get trained to do the project than using a contractor. Officials with the Senate jurisdiction told us they obtained cost estimates for lead abatement work from both the Division and a contractor several years ago. According to officials, the contractor’s estimate was less than that of the Division because the contractor proposed using different equipment for the project than the Division, and the jurisdiction used the contractor for the abatement. The jurisdiction officials we interviewed said they were generally satisfied with the Division’s services, including the quality of its work, and were particularly satisfied with the flexibility the Division offers. Officials from seven of the nine jurisdictions we interviewed also told us they would not suggest making changes to how the Division currently operates. Officials from two of the jurisdictions suggested the organizational and cost-allocation changes discussed below. According to Division officials, implementing those suggestions would have implications for its operations and structure, and would require additional research and evaluation to determine if they are feasible. Transfer positions from the Division to its parent organization, PPM: Officials from one jurisdiction suggested that the Division could lower its indirect rate by transferring payroll responsibility for some supervisory positions, such as its construction or safety managers, from the Division to PPM. As discussed above, because the Division does not receive an appropriation for the salaries and expenses of its temporary construction support employees, it pays for those costs by charging the jurisdictions for direct labor hours and also an “indirect rate.” Division officials told us that payroll responsibility for some construction support positions could be transferred to PPM and that this transfer would reduce the Division’s indirect rate because that rate increases by about 1.1 percent for each employee captured in the rate. Because PPM is the parent organization of the Division, this step would not reduce the total costs of projects to AOC as an organization; rather, it would transfer the responsibility for paying certain costs from the jurisdictions to PPM. According to AOC officials, this could have several effects. First, PPM would need to find a way to fund those positions, which would likely require an increase in its appropriations to cover additional positions. Second, transferring supervisory positions to PPM could mean those personnel could be tasked to support other AOC-wide efforts, rather than supervising and managing the day-to-day execution of the Division’s projects. Similarly, Division officials told us that transferring supervisory positions or support personnel such as purchasing agents to PPM could reduce the Division’s flexibility, such as its ability to hire additional supervisors or support personnel if its workload increases in the future. Make the Division’s indirect rate variable: Officials with that same jurisdiction suggested that the Division consider making its indirect rate (which as of October 2018 was a fixed rate of 0.85) a variable rate. Under a variable rate approach, projects would have different rates depending on their needs. For example, a project requiring only labor would be charged one rate, but a project requiring labor and additional services, such as the purchasing of materials, would be charged a higher rate. According to Division officials, charging the jurisdictions varying rates depending on the extent to which a project utilizes the Division’s resources could reduce the cost for some jurisdictions but increase it for others since the Division must charge enough to recover all of its costs. Division officials told us AOC evaluated this option in 2017 but decided against it. AOC determined that making the Division’s indirect rate variable would result in increased administrative burden because the Division would have to determine which projects and workhours would be variable and which would not. It would then need to track and assess them differently for each project. Provide additional on-site supervisors for complex multi-trade projects: For most projects, the Division provides supervisors who manage the day-to-day execution of multiple projects. However, jurisdictions have the option to pay, as a direct cost, for dedicated, on- site supervisors to oversee and manage their projects exclusively. Officials with one jurisdiction suggested that the Division make it standard practice for complex, multi-trade projects to have a dedicated, on-site supervisor. Division officials told us that having a dedicated, on-site supervisor works best for complex, multi-trade projects such as the East Phase of the House jurisdiction’s 13-month, $15 million child care center project that the Division completed in December 2018 (see fig. 7). According to Division officials, having dedicated, on-site supervisors day and night during construction enabled the project to remain on schedule and below budget because the supervisors were responsible for overseeing all construction activities and could immediately address questions or concerns that arose, thereby resulting in increased efficiency and cost savings. Division officials told us that while the project’s scope increased during execution, the Division was able to work additional nights and weekends to meet the project’s deadline. Even with additional scope, Division officials estimated that they have saved the House jurisdiction about $500,000 (in current dollars) on the project through increased oversight and by identifying areas of cost savings, such as purchasing less expensive lighting fixtures than called for in the design. The variability of the Division’s workload makes anticipating the necessary size (number of employees) and composition (mix of trades and number of employees within each trade) of its workforce challenging. AOC has reported to Congress that the primary drivers behind the size and composition of the Division’s workforce have been project demand and the availability of funding. As previously discussed, the Division’s workload is driven by projects the jurisdictions hire it to perform. Without projects to execute for the jurisdictions, the Division does not have funding to pay the salaries and expenses of most of its employees. Accordingly, the size of the Division’s workforce expands and contracts in response to the jurisdictions’ demand for work. For example, over the last 5 fiscal years, the size of the Division’s trade workforce has fluctuated between a high of 191 in fiscal year 2016 and a low of 121 in fiscal year 2018. During that period, the number of employees the Division employed within each trade also fluctuated. Several factors contribute to the variability of the Division’s workload and make determining its future workforce needs challenging. First, officials told us that the Division has no control over whether the jurisdictions use the Division for their projects. Second, even if a jurisdiction decides to use the Division, Division officials told us that projects are notional or uncertain until that jurisdiction signs a project agreement, among other things. Third, even with a signed agreement, jurisdictions can reduce a project’s scope or cancel it all together, a situation that can leave the Division searching to find work for the trade workers it planned to use for the project. Finally, differing project priorities also come into play, as both Division officials and representatives from three of the jurisdictions acknowledged that some projects and work for certain jurisdictions are a higher priority than others. According to officials, when priority or emergency projects arise, the timing and work for ongoing projects can be affected as trade workers are shifted to the priority or emergency. In some cases, the on-going project may continue at a slower pace with fewer workers and in other cases all work might be stopped for a period of time. Over the last several years the Division has made efforts to strategically manage its workforce to help ensure that it has the right number and composition of employees to meet the jurisdictions’ needs. Our prior work has identified certain practices that, when implemented, can help federal agencies strategically manage their human capital. These practices include: (1) involving managers and stakeholders in decision-making, (2) basing workforce decisions on current needs and future projections, (3) having strategies to address workforce gaps, and (4) monitoring progress. As discussed below, we found that the Division has taken steps that generally align with those practices. However, it does not have a formalized process for collecting information that it uses to project future workforce needs, and we note that several of the steps it has taken date to the time of the March 2017 layoffs or more recently. Involve managers and stakeholders in decision-making: The Division has taken steps to involve AOC’s management, including the superintendents of the jurisdictions, in managing its workforce given the variability of its workload. According to Division officials, its staff are in frequent contact with the jurisdictions and meet periodically with the jurisdictions to discuss the status of ongoing and future projects. The officials said that Division staff meet bi-weekly with the larger jurisdictions—such as the Senate, House, and Library—and monthly or as needed with others as well as with PPM on a weekly basis to discuss the status of projects and workforce needs. According to Division officials, this regular communication with the jurisdictions is their primary and most important method of identifying and addressing workload issues or concerns. Jurisdiction officials echoed the Division’s comments, noting that they are in frequent contact with staff from the Division or as needed. Base workforce decisions on current needs and future projections: Over the last several years, the Division has taken steps to improve how it collects and tracks information from the jurisdictions upon which to base its future workforce projections. Prior to 2015, the Division used a paper- based process to collect information on the jurisdictions’ work requests and tracked information on a spreadsheet. In 2015, the Division implemented a software tool called the Construction Division Management System (CDMS) to streamline that process, making it easier for the jurisdictions to submit requests for work. For example, using CDMS, the Division can now electronically collect information for ongoing projects from the jurisdictions, such as change orders and schedule updates, and the jurisdictions can electronically submit requests for cost or schedule information for future projects. According to Division officials, Construction Managers, who are familiar with the resource needs of individual projects, are responsible for updating and validating the information in CDMS—typically bi-weekly—and the information in CDMS is available to the jurisdictions to review and verify. More recently, in July 2017, the Division hired a scheduler to develop resource-loaded schedules for ongoing projects. This involves assigning labor, materials, equipment, and other resources to a project’s schedule. According to Division officials, currently, the Division develops resource- loaded schedules for about 70 percent of its workload as the projects that comprise its remaining workload are too small or short-term for such schedules. In addition, in October 2017, the Division began collecting additional information on the jurisdictions’ construction priorities through a monthly data call. As part of this data call, which the Division performs via email, the Division requests updated information from the jurisdictions on their current projects, such as the expected start date or whether minor tasks remain, and the status of potential future projects. Using the information the Division collects from the jurisdictions, officials told us it then forecasts its workload and workforce needs out over the succeeding 12 months. According to officials, those projections are an “art, not a science,” because of the uncertainties surrounding the Division’s workload. However, the Division has not formalized the process it uses to collect information about the jurisdictions’ construction priorities. Specifically, we found that the Division lacks a written set of procedures for the monthly data call discussed above to help ensure that staff understand who is responsible for collecting information, what information should be collected, and when that information should be collected. This lack of procedures led to a situation in July 2018 where, according to officials, the Division did not conduct that data call but has since set calendar reminders for key staff in an effort to help ensure they do not miss it again. While setting such reminders may have some benefit now, it does not ensure that others within AOC will execute that data call in the future. Formalized processes, such as written procedures, can help ensure that steps an agency is taking can be implemented in a predictable, repeatable, and accountable way. Such procedures are also a key component of internal control designed to provide reasonable assurance that an organization’s operations are effective and efficient. AOC officials agreed that a more formalized process for collecting information about the jurisdictions’ construction priorities could help ensure the data is collected consistently. It would also better position AOC management to ensure that the Division’s process will be implemented consistently and that the jurisdictions understand what information is expected of them. It could also provide reasonable assurance to AOC management and Congress that the Division is taking the steps necessary to manage its workload and basing its workforce projections on the most current information available. Have strategies to address workforce gaps: The Division has a number of strategies it can employ if the size and composition of its workforce are not aligned with its workload requirements. For example, officials told us the Division can utilize direct-hire authority to quickly fill positions if there is a shortage of employees with specific skillsets to meet the jurisdictions’ needs. Officials told us employees may also work overtime to meet the jurisdictions’ needs if the Division’s workload projections do not show a need to hire additional employees. In instances where there is a lack of work, officials told us the Division has the options of not renewing the appointments of its temporary employees; helping affected employees in finding positions in jurisdictions to the extent practicable; or, if necessary, lay off affected employees, as it did in March 2017. Division officials told us they are also exploring additional strategies to help address potential instances where the size and composition of its workforce are not aligned with its workload requirements moving forward. One potential strategy involves using the Division to help address AOC’s backlog of deferred maintenance and capital renewal, which AOC estimated in 2017 was about $1.4 billion. Another potential strategy involves working with the jurisdictions to establish more large projects that provide a stable amount of work over a period of time. An example of a recent such project is the East Phase of the O’Neill Child Care Center project. According to Division officials, around 25–30 trade workers worked at the site at any given time, providing stability and work for multiple trades. When work on other projects was delayed or did not materialize, the Division was able to move the trade workers to the child care project. Monitor progress: Over the last several years the Division has taken steps to monitor the accuracy of its workload and workforce projections by discussing its projections with AOC management, including the Architect of the Capitol and the superintendents of the jurisdictions, each month. According to officials, the Division began these monthly briefings for AOC’s management in December 2016, when its workload decreased due to the completion of work related to the renovation of the Cannon Office Building. During these briefings, Division staff provide the Architect of the Capitol and the superintendents with information on the Division’s active, committed, and potential projects over the next several months. According to Division officials, these briefings provide an opportunity to discuss with AOC’s management any issues or concerns they have with the Division’s workload. The Division employed the practices described above in the months leading up to the March 2017 layoff of the 30 temporary employees. Division officials told us that 5 to 6 months prior to March 2017, they anticipated a potential decline in the Division’s workload and worked with the jurisdictions to identify potential projects that the Division could execute, but sufficient additional projects did not materialize. During this process, the Division involved PPM, the jurisdictions, and AOC’s management, among others. The efforts to minimize the number of employees affected by any layoffs included identifying job openings within the jurisdictions that employees could apply for. According to officials, one employee was hired by the Senate jurisdiction, another by the Capitol Grounds jurisdiction, and a third by the Office of the Chief Administrative Officer in the House, prior to the layoff. During the course of our review, we observed that the Division employed these strategies. Specifically, Division officials told us that they anticipated there might be a potential decline in the Division’s workload in early 2019. The Division raised this potential with AOC’s management during the summer of 2018, and officials told us the issue was resolved once the House and Library jurisdictions identified several projects that the Division could execute beginning in 2019. AOC’s authority to appoint and remove its employees is governed by title 2 of the U.S. Code and AOC has established various practices and policy related to their terms of employment. We found that AOC generally followed its practices when it appointed 30 temporary employees and adhered to its policy when it subsequently laid them off in March 2017. Our review of the appointment letters for 27 of the 30 temporary employees laid off in March 2017 found that the letters specified that the position was temporary and was for a term not-to-exceed 13-months. We also found that 10 of the 27 appointment letters included language stating that the position was dependent on the availability of work or funding. As part of our review, we met with five of the nine employees that AOC rehired following the March 2017 layoffs, all five employees told us that they were aware of the temporary nature of their positions and of the fact that they could be laid off at any time due to lack of work. Human capital officials told us that in April 2017, they developed a standard appointment letter to communicate the terms of employment for temporary employees more consistently. This letter includes language explaining that temporary appointments may be terminated at any time due to a lack of work, lack of funds, or failure to meet management’s expectations. For a copy of AOC’s standard appointment letter for temporary employees, see appendix III. AOC may renew the employment of temporary employees at the end of their 13-month appointment based on project needs and the availability of funding, according to human capital officials. We found that the 13 month appointments for 26 of the 30 temporary employees were routinely renewed prior to their March 2017 layoff. Of the 26 temporary employees, 12 had been employed from 13 months to 5 years, 9 had been employed from 6 to 10 years, and 5 had been employed for more than 10 years. The remaining four had been employed for less than 13 months. Human capital officials told us that there is no limitation on the number of times an employee’s appointment may be renewed. To ensure that employees serving under temporary appointments understand the terms of their employment, human capital officials told us that since March 2014 employees who have had their appointments renewed sign a standard Extension of Temporary Appointment form. This form states the position is temporary, may be shorter or longer than 13 months, and may end at any time. For a copy of this extension form, see appendix IV. AOC’s layoff policy allows the Director of PPM, as delegated by the Architect of the Capitol, to lay off the Division’s temporary employees for lack of work, lack of funds, or failure to meet management’s expectations. The policy does not specify which factors AOC should consider in selecting employees to be laid off, thereby allowing the agency discretion in this area. Our review of the layoff letters for the 30 temporary employees laid off in March 2017 confirmed that AOC communicated to the employees that the layoff was due to a lack of work. In this particular situation, the Division officials said they determined the number of temporary employees needed to carry out its projected workload and considered two factors equally: (1) the employees’ performance and skillset and (2) the employees’ ability to work independently and as part of a team. Human capital officials told us that AOC’s offices of Employee and Labor Relations and its General Counsel reviewed the Division’s request, and found no human-capital or legal concerns. The human capital officials drafted letters notifying the 30 employees of their layoff, effective upon receipt. Division supervisors provided the letters to employees at the start of their shifts on March 21, 2017. Figure 8 provides summary information by trade on the 30 temporary employees that AOC laid off in March 2017. At the time of the March 2017 layoff, AOC did not have a policy that required the Division to notify the Division’s temporary employees of an impending layoff. Human capital officials told us that they did not provide the Division’s temporary employees with advance notice of their layoff because of concerns that such advance notice could result in an unproductive and disruptive work environment. In terms of notifying relevant employee unions, human capital officials said they provided 12- hour advance notification of the layoff to one employee union, in accordance with that union’s collective-bargaining agreement. The five rehired employees we interviewed told us they were caught off guard by the March 2017 layoffs. None of the 30 temporary employees filed grievances related to the layoff, according to human capital officials. Since the layoff, human capital officials told us they recognized that AOC did not have a consistent policy for providing advance notice of layoffs to temporary employees across AOC’s 10 jurisdictions. According to AOC’s Chief Human Capital Officer, some jurisdictions provided advance notice of layoffs to temporary employees while others did not. To provide consistency with such notification and in response to our inquiries, in October 2018 AOC issued guidance standardizing the notification period for temporary employees laid off due to lack of work or lack of funds across all jurisdictions. This guidance directs jurisdictions to provide all temporary employees with a notification period of 2-weeks prior to the effective date of being laid off for these reasons. It also provides jurisdictions the option to request administrative leave so that the temporary employee may stop work immediately and be paid during the two week notification period. The Division was created to serve as a flexible option that the jurisdictions can use to meet the facility needs of their congressional and Supreme Court clients. By design, the Division can hire employees if there is demand for its services and lay off employees, as it did in March 2017, if there is insufficient demand or project funding to pay them. In recent years, the Division has taken steps to more strategically manage its workforce and minimize disruptions to that workforce in part by increasing its communication with the jurisdictions. However, formalizing the process the Division uses to collect information on the jurisdictions’ construction priorities, such as by providing staff with a written set of procedures, which specifies what is required of staff and when, could help ensure that those staff consistently collect and use the best information to make decisions about the appropriate number of employees and the mix of trades. Formalizing that process in this manner could also help the Division provide reasonable assurance to AOC management and Congress that it is taking the steps necessary to manage its workload and basing its workforce projections on the most current information available. The Architect of the Capitol should formalize the process the Construction Division uses to collect information on the jurisdictions’ construction priorities each month, such as through developing written procedures. (Recommendation 1) We provided AOC with a draft of this report for review and comment. AOC responded with a letter in which it concurred with our recommendation and said it intended to address our recommendation later this year. AOC’s letter is reprinted in appendix V. AOC also provided technical comments, which we incorporated in the report as appropriate. We are sending copies of this report to the appropriate congressional committees and the Architect of the Capitol. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact us at (202) 512-2834 or rectanusl@gao.gov or (202) 512-7215 or gurkinc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Our objectives were to: (1) describe how the Architect of the Capitol’s (AOC) jurisdictions use the Construction Division (hereafter the Division) and the factors they reported considering when deciding whether to use the Division, (2) assess how the Division manages its workforce given the variability of its workload, and (3) assess whether AOC’s appointment and subsequent March 2017 layoff of temporary employees from the Division complied with applicable policy. To describe how the jurisdictions use the Division and the factors affecting this use, we obtained and analyzed data on projects the Division completed for the jurisdictions during fiscal years 2014 through 2018. We focused our discussion of these data to the cost, scope, and duration of projects and do not present information on the number of completed projects because of differences in how the jurisdictions identify projects. To assess the reliability of the Division’s data, we reviewed available documentation and interviewed agency officials. We determined that the Division’s project data were sufficiently reliable for the purposes of this report, which includes describing the type and cost of projects the Division completed for the jurisdictions over the last 5 fiscal years and identifying illustrative examples of those projects. For appropriate comparison, the costs of completed projects we present in our report have been adjusted for inflation and converted to 2017 dollars using the fiscal-year gross domestic product index, which is compiled by the U.S. Department of Commerce, Bureau of Economic Analysis. We attempted to obtain comparable data for projects where the jurisdictions used their own employees or a contractor, but these data were not readily available. With respect to the jurisdictions’ use of their own employees, the Capitol Building jurisdiction attempted to obtain this data for us, but the data that were available did not include the cost of all labor spent on projects. Further, according to AOC, the jurisdictions do not capture data on employees’ time spent on construction work so this data also included projects that were considered routine maintenance. With respect to the jurisdictions’ use of contractors, the data that were available also included purchase card transactions, among other unrelated costs. According to AOC, identifying just the contract costs of the jurisdictions’ construction projects would require that AOC conduct significant research and review every transaction associated with its contracts. To provide illustrative examples, we visited the sites of six projects that the Division was executing at the time of our review. To select these projects, we asked the agency to provide us with projects that would enable us to understand the nature of the work the Division performs for the jurisdictions. In addition to the 4 projects the agency provided, we selected 2 additional sites based on projects that were discussed during our interviews. During our visits, we met with Division officials and representatives from the jurisdictions to discuss the projects in detail. We visited the following projects: an abatement and insulation project at the Russell Senate Office repairs to the drainage system at the Russell Senate Office Building, the replacement of doors at the Library of Congress, demolition and construction activities associated with the construction of a new lactation suite at the Ford House Office Building, demolition and construction activities associated with the construction of a new child care center at the O’Neill House Office Building, and the replacement of light poles across the U.S. Capitol complex. We also interviewed officials from the Division and AOC’s 10 jurisdictions, including their respective superintendents. Except Planning and Project Management, we asked the jurisdictions if they had any suggestions for changing the Division’s operations. We did not ask Planning and Project Management because the Division is a component of that jurisdiction. We then discussed with Division officials the potential implications of making those changes. We did not independently evaluate the implications of implementing the superintendents’ suggestions as part of this review. To assess how the Division manages its workforce, we reviewed pertinent documents, such as AOC’s August 2017 report to Congress on the Division, the Division’s Organization and Operating Plan, user guides for the Construction Division Management System, and prior GAO reports. We also obtained and analyzed payroll data for the Division for fiscal years 2014 to 2018 and interviewed Division officials. To assess the reliability of the Division’s data, we interviewed agency officials. We determined that the Division’s payroll data were sufficiently reliable for the purposes of this report, which includes describing the size and composition of the Division’s workforce over the last 5 fiscal years. We compared the Division’s efforts to manage its workforce to strategic human capital-management activities or practices identified in our prior work and standards for internal control in the federal government. To assess whether AOC’s layoff of temporary employees from the Division in March 2017 complied with applicable policy, we reviewed relevant federal laws and agency policy, such as the Separation of Non- Permanent Employees Policy Memorandum (AOC Order 316-1). We also reviewed pertinent personnel documents, such as appointment letters, layoff letters, and Standard Form 50 personnel documentation. We compared AOC’s policy with AOC’s implementation during the March 2017 layoff of 30 temporary employees. We did not independently verify AOC’s application of the criteria used to determine which employees to lay off in March 2017. In addition, we interviewed officials from both AOC’s Human Capital Management Division and the Division. As part of our work, we requested interviews with the nine temporary employees that AOC subsequently rehired and interviewed the five who responded in order to obtain their perspective on AOC’s processes for laying off temporary employees. This information is not generalizable to all rehired temporary employees. We conducted this performance audit from March 2018 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Construction Division’s (hereafter the Division) costs include both direct and indirect costs. Direct costs are costs directly attributed to and expended on a project, such as labor (i.e., trade workers) and materials. Indirect costs are costs that cannot be directly attributed to a single project, such as costs associated with employee leave and training. Table 1 shows the components of the Division’s direct and indirect costs. To pay for its indirect costs, the Division charges the jurisdictions what it calls an “indirect rate” as part of the work it performs. As of October 2018, the Division’s indirect rate was 0.85. The Division applies this rate to every direct labor-hour associated with a project it performs for the jurisdictions. For example, a trade worker that the Division employs who has a hypothetical hourly cost of $45 also has an indirect cost of about $38. Accordingly, that trade worker’s total hourly cost, which the Division charges the jurisdictions, is about $83. The Division developed the methodology for its indirect rate in 2012, in consultation with the Architect of the Capitol’s (AOC) Chief Financial Officer and the jurisdictions, after it determined that its funding model at that time did not adequately recover costs that were not directly attributable to projects. According to the Division, the primary driver for developing this indirect rate was employee leave. Specifically, the Division’s employees earn about 11 hours of leave per pay period, and funds to cover that leave need to be recovered because they cannot be obligated and charged to a project at the time the leave is earned but prior to its being taken by the employee. The Division allocates its indirect costs among the jurisdictions, using statutory authorities available to the Architect of the Capitol. According to AOC officials, historically, the Division’s indirect rate was determined by staff within the Division. The rate was determined by looking at historical cost and project data over the two prior fiscal years. As of fiscal year 2019, AOC established a steering committee to determine the Division’s indirect rate. This committee is comprised of five members: AOC’s Chief Financial Officer, the Director of the Division, the superintendent of the House Office Buildings jurisdiction, and a superintendent from another large jurisdiction and a small jurisdiction. According to AOC officials, the Division’s indirect rate is now based on projected costs and projects for the current fiscal year, and this rate will be monitored and may be adjusted throughout the year to address potential gaps or overages in funding for the Division’s annual indirect costs. In addition to the contact above, key contributors to this report included Mary Crenshaw (Assistant Director); Maria Edelstein (Assistant Director); Melissa Bodeau; Sarah Cornetto; Patrick Dibattista; Camille M. Henley; Wesley A. Johnson; Efrain Magallan; Josh Ormond; Cheryl Peterson; Kelly Rubin; and Laurel Voloder.", "summary": "AOC is organized into 10 jurisdictions that operate and maintain the buildings and grounds of the U.S. Capitol complex. For projects such as renovations and repairs, the jurisdictions can use their own employees, a contractor, or AOC's Construction Division, which is staffed with trade workers such as electricians and plumbers. Most of the Division's staff are employed on a temporary basis and paid with funds the Division receives from the jurisdictions for projects it executes on their behalf. In March 2017, AOC laid off 30 of the Division's approximately 190 temporary employees, citing a lack of work from the jurisdictions. GAO was asked to review the Division's operations. This report examines the jurisdictions' use of the Division and the Division's management of its workforce, among other issues. GAO analyzed information on projects the Division completed during fiscal years 2014 through 2018, reviewed AOC policies, visited the sites of six projects that are illustrative of the work the Division performs for the jurisdictions, and interviewed AOC staff, including officials from AOC's 10 jurisdictions and five of the employees AOC laid off in 2017. The Architect of the Capitol's (AOC) Construction Division (hereafter the Division) is designed to serve as a flexible option that the 10 operational jurisdictions that comprise AOC can use to meet their facility needs. In their efforts to manage the buildings and grounds of the U.S. Capitol complex, AOC's jurisdictions have used the Division for projects that vary widely in cost, complexity, and duration (see figure). For example, over the last 5 fiscal years, the jurisdictions have used the Division for projects ranging in cost from about $1,000 to about $10 million and in scope from hazardous material testing to multiyear lighting-system upgrades. Jurisdiction officials cited the Division's flexibility in adjusting to scope and other changes to keep a project on schedule as one of the reasons they may decide to use the Division instead of an outside contractor. While jurisdiction officials said they were generally satisfied with the Division's services, officials from two jurisdictions suggested that the Division consider changing how it operates—for example, by transferring some positions to its parent organization in an effort to lower what it charges the jurisdictions. According to AOC officials, making changes such as this one to the Division's operations could have varying effects, such as increasing how much funding AOC would require from other sources beyond the jurisdictions. The Division has taken steps to strategically manage its workforce to help ensure that it has the right number and composition of staff to meet the jurisdictions' needs but has not formalized the process it uses for collecting information on the jurisdictions' construction priorities each month. Because the Division's workload is driven by projects the jurisdictions hire it to perform, such things as changes in projects' priorities and work to be performed make determining future workforce needs challenging. The Division's approach to managing its workforce generally aligns with practices that GAO has previously identified that help agencies strategically manage their human capital. This approach includes having strategies to address gaps if the size and composition of an agency's workforce are not aligned with its workload requirements. However, because the Division has not formalized the process it uses to collect information each month on the jurisdictions' construction priorities it may miss opportunities to obtain information that is critical to making informed decisions. The Division also cannot provide reasonable assurance to AOC management and Congress that it is taking the steps necessary to manage its workload and that it is basing its workforce projections on the most current information available. GAO recommends that AOC formalize the process the Division uses for collecting information on the jurisdictions' construction priorities each month, such as through developing written procedures. AOC concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Private companies are generally prohibited by federal law from discriminating in employment on the basis of race, color, religion, sex, national origin, age, and disability status. Additionally, federal contractors and subcontractors are generally required to take affirmative action to ensure that all applicants and employees are treated without regard to race, sex, color, religion, national origin, sexual orientation, and gender identity, and to employ or advance in employment qualified individuals with disabilities and qualified covered veterans. EEOC enforces federal antidiscrimination laws, and OFCCP enforces affirmative action and nondiscrimination requirements for federal contractors. EEOC and OFCCP share some enforcement activities and have established a memorandum of understanding (MOU) to minimize any duplication of effort. The EEOC enforces Title VII of the Civil Rights Act of 1964, as amended, which prohibits employment discrimination on the basis of race, color, religion, sex, or national origin. EEOC also is responsible for enforcing other federal laws that prohibit discrimination in employment based on age and disability, among other characteristics. EEOC investigates charges of employment discrimination from the public, litigates major cases, and conducts outreach to prevent discrimination by educating employers and workers. EEOC also pursues a limited number of cases each year designed to combat systemic discrimination, defined by the agency as patterns or practices where the alleged discrimination presented by a complainant has a broad impact on an industry, profession, company, or geographic location. EEOC can also initiate a systemic investigation under Title VII with the approval of an EEOC commissioner provided the commissioner finds there is a reasonable basis for the investigation. In fiscal year 2018, EEOC resolved about 90,558 charges of discrimination, secured more than $505 million for victims of discrimination, and filed 199 lawsuits. The OFCCP within DOL is responsible for ensuring that about 200,000 federal contractor establishments comply with federal nondiscrimination and affirmative action requirements. Under Executive Order 11246 and other federal laws and regulations, covered federal contractors and subcontractors are prohibited from discriminating in employment on the basis of race, color, religion, sex, sexual orientation, gender identity, or national origin and are required to take affirmative action to help ensure that all applicants and employees are treated without regard to these factors. OFCCP also enforces Section 503, and the affirmative action provisions of VEVRAA, which require covered contractors to take affirmative action to employ and advance in employment qualified individuals with disabilities and covered veterans, respectively. OFCCP uses two approaches to ensure compliance with federal equal employment and affirmative action requirements—enforcement and compliance assistance. OFCCP’s enforcement program primarily involves conducting evaluations of contractors’ compliance with federal requirements and these evaluations represent the preponderance of agency activity. In 2015, OFCCP compliance officers conducted 2,345 compliance evaluations, which represented about 2 percent of federal contractor establishments in its jurisdiction. OFCCP has since significantly decreased the number of compliance evaluations it conducts. In fiscal year 2018, OFCCP completed 812 compliance evaluations, which is 65 percent fewer than in fiscal year 2015. Since fiscal year 2016, OFCCP has adopted a strategy of conducting fewer compliance evaluations and prioritizing larger systemic cases. Since OFCCP can only evaluate a small fraction of federal contractors each year, the agency also carries out compliance assistance efforts, including issuing guidance, conducting outreach concerning nondiscrimination requirements, and providing compliance assistance to contractors. OFCCP’s regulations generally require that covered contractors prepare and maintain an affirmative action program (AAP). Contractors must also comply with certain recordkeeping requirements; for example, under Executive Order 11246, covered contractors are required to maintain records pertaining to hiring, promotion, layoff or termination, rates of pay, and applications, among other records. Under OFCCP’s Executive Order 11246 regulations, an AAP is a management tool that is designed to ensure equal employment opportunity, with an underlying premise that the gender, racial, and ethnic makeup of a contractor’s workforce should be representative of the labor pools from which the contractor recruits and selects. An AAP must also include practical steps to address underrepresentation of women and minorities, such as goals for expanding employment opportunities to these groups in instances in which they are underrepresented. Companies must create an AAP for each business establishment—generally, a physical facility or unit that produces goods or services, such as a factory, office, or store for the federal contractor. Each year the federal government provides billions of dollars to organizations that provide social services to needy families and individuals. Some of these funds are provided through competitive grants to faith-based organizations (FBO), which may include religious groups, like churches, mosques, synagogues, and temples, or charitable organizations affiliated with religious groups. In some instances, FBOs believe it is necessary to hire only individuals who share their religious beliefs in order to carry out their mission. Title VII of the Civil Rights Act of 1964 generally prohibits employment discrimination based on religion. However, section 702(a) of the Act exempts FBOs with respect to basing employment decisions on religion, thereby permitting FBOs to intentionally, and exclusively, hire individuals who share their religious beliefs. In light of this exemption, FBOs that receive federal grant funding or that contract with the federal government have also generally been permitted to make employment decisions based on religion. OFCCP is responsible for ensuring that federal contractors comply with federal nondiscrimination requirements and provides compliance assistance to the entities it oversees, including guidance related to this exemption. There are, however, certain federal grant programs that are subject to statutory restrictions that prohibit recipients from using grant funding, in whole or in part, to discriminate or deny employment on the basis of religion, among other factors. In June 2007, the Department of Justice’s Office of Legal Counsel issued an opinion in a particular case stating that the Religious Freedom Restoration Act of 1993 (RFRA) could be reasonably construed to require an agency to exempt FBOs from statutory requirements that restrict federal grantees from hiring on the basis of religion. Pursuant to that opinion, and the RFRA, certain federal agencies have permitted FBOs that receive funding under a program that is subject to a statutory restriction on religious-based hiring to certify that they are exempt from such restrictions, allowing these FBOs to engage in religious-based hiring, provided that they do not discriminate on other bases. OFCCP and EEOC face challenges in conducting oversight efforts to ensure that employers meet applicable federal equal employment opportunity requirements. For example, in our September 2016 report, we found several shortcomings that limited OFCCP’s oversight efforts, including weaknesses in OFCCP’s compliance evaluation selection process, its reliance on voluntary compliance, and the lack of staff training. Also, in our November 2017 report, we found that OFCCP’s planned methodology for identifying equal employment disparities by industry, such as the technology sector, might not accurately identify industries at greatest risk of potential noncompliance with affirmative action and nondiscrimination requirements. Additionally, we reported that while EEOC had identified barriers to recruitment and hiring in the technology sector as a strategic priority, it had not consistently captured information identifying specific industries when conducting investigations. EEOC’s inability to capture this information using standard industry codes impeded its ability to conduct related analysis that could be used to more effectively focus its limited enforcement resources and outreach activities. In September 2016, we reported that about 22 percent of OFCCP’s compliance evaluations of supply and service contractors found violations of some type and about 2 percent had discrimination findings, since 2010 (see figure 1). When OFCCP found violations during compliance evaluations, it often resolved those violations with conciliation agreements that outlined remedial action that contractors agreed to take. As a result of our work, we made six recommendations (see table 1). The agency has taken action to fully implement three of our recommendations: (1) to address the risk geographic imbalances in compliance evaluation assignments; (2) to review outreach and compliance assistance efforts and identify options for improving information provided to federal contractors; and (3) assess existing contractor guidance for clarity. However, the agency has not taken action to fully implement our other three recommendations that focus on improving enforcement and compliance. With regard to the recommendations that have not been fully implemented, OFCCP has taken action to date as described below. Focus compliance evaluations on greatest violation risk. We found the process OFCCP used to select contractors for compliance evaluations could not ensure that contractors with the highest risk of noncompliance were being selected. OFCCP’s selection process was nonrandom and did not produce a generalizable sample of contractors for evaluation. As a result, OFCCP was unable to draw conclusions about noncompliance risk in the overall federal contractor population. While the selection process included consideration of a number of neutrally applied factors, such as alphabetical order, employee count at the establishment, contract value, or contract expiration date, OFCCP was not able to identify which of these factors, or any factors, are associated with risk of noncompliance. Thus, OFCCP was unable to quantify the extent to which federal contractors in its jurisdiction are noncompliant, and did not have reasonable assurance that it was focusing its efforts on those contractors at greatest risk of not following equal employment opportunity or affirmative action requirements. Because OFCCP only conducts evaluations about 2 percent of federal contractor establishments in its jurisdiction, without an effective risk-based contractor selection process, OFCCP may be missing opportunities to evaluate whether there is a significant segment of contractors who may be more likely to violate nondiscrimination and affirmative action requirements, leaving workers potentially vulnerable. OFCCP has taken steps to improve its contractor selection process, but has not fully implemented either this 2016 recommendation or a related recommendation we made in 2017 that it assess the quality of its proposed methods to incorporate consideration of disparities by industry before selecting contractors for compliance evaluation. Beginning in fiscal year 2020, contractors will be able to apply to the Voluntary Enterprise- wide Review Program (VERP), which aims to remove top-performing contractor participants from the pool of contractors scheduled for compliance evaluations. OFCCP also recently implemented a new scheduling list (the list of contractor establishments selected for evaluation) methodology based on research on closed cases from the previous five years (2014-2018). Thirty-three percent of the new scheduling list was comprised entirely of contractor establishments from the three industries with the highest rates of violation based on this sample of closed cases. However, the scheduling lists of the previous 5 years included nonrandom selections of contractor establishments that included a number of neutrally applied factors. If OFCCP’s goal is to prioritize contractors at highest risk of noncompliance, this new scheduling methodology may not achieve this, because contractors selected will be weighted towards prior neutrally applied selection factors, such as employee count, in addition to violation risk. Further, while VERP may remove some compliant contractors from the scheduling list pool, without overwhelming volunteer participation, it will do little to help identify those most likely to violate. Consequently, it remains unclear whether contractors with the highest risk of not following equal employment opportunity and affirmative action requirements will be selected for compliance reviews. Monitor affirmative action programs. In 2016 OFCCP relied significantly on voluntary compliance by federal contractors, and this approach could not ensure that contractors were complying with basic requirements like developing and maintaining an AAP. By signing a qualifying federal contract, covered contractors are required to develop an AAP within 120 days of contract commencement and update it annually. However, OFCCP had no process for ensuring that the tens of thousands of establishments that had signed a qualifying federal contract do so. OFCCP has taken steps towards implementing a mechanism to monitor AAPs but has not fully implemented this recommendation. In 2018 OFCCP contracted with an information technology vendor to develop a web-based portal to allow contractors to upload their AAPs electronically for convenience, increased compliance, and for OFCCP review and resource prioritization. Officials anticipate delivery of the portal by the close of fiscal year 2019. Simultaneously, according to officials, OFCCP has developed the necessary information collection request to obtain approval from OMB to collect all contractors’ AAPs annually. The agency anticipates that OMB approval will be timely to align with completion of the AAP portal. Facilitate timely compliance officer training. In 2016, we found that OFCCP may not be providing timely training for new compliance officers. According to OFCCP officials, budget constraints had made it difficult to hold timely centralized training for new compliance officers. In half of the regions we visited, compliance officers or management officials we spoke with noted that this training was not provided in a timely manner after new officers are hired. For example, one compliance officer told us they worked for 8 months before receiving formal training. In one district office, compliance officers we spoke with explained that the lack of uniform, timely training made compliance officers feel unprepared when they began their job. Further, without providing timely training to new compliance officers, OFCCP cannot ensure consistency in its enforcement efforts across its offices. OFCCP has taken steps to improve its training program, but has not fully implemented this recommendation. In 2018, OFCCP retained an expert consultant to assess its national training program and standardize its training development and evaluation process. The assessment was completed in 2019 and a plan of action was created to address any program gaps, according to agency officials. Officials reported that the plan of action was fully implemented in fiscal year 2019 and OFCCP obtained a 5 year International Association for Continuing Education and Training (IACET) accreditation for its program. OFCCP officials told us they are developing a learning management system that will allow new compliance officers easy access to training soon after the hiring. OFCCP plans for the system to include the development of course requirements by level of competence— basic, intermediate, and advanced. OFCCP officials told us they plan to roll out the new system in January 2020. In November 2017, we reported that the estimated percentage of minority technology workers had increased from 2005 to 2015, however, while we found statistically significant increases in the numbers of Asian and Hispanic workers, no growth had occurred for either female or Black workers (see figure 2). Further, female, Black, and Hispanic workers remain a smaller proportion of the technology workforce—mathematics, computing, and engineering occupations—compared to their representation in the general workforce. These groups have also been less represented among technology workers inside the technology sector—those companies that have the highest concentration of technology workers in such industries as computer systems design and software publishing—than outside the technology sector such as retail or finance companies. In contrast, Asian workers were more represented in these occupations than in the general workforce. As a result of our work, we made one recommendation to EEOC and five recommendations to OFCCP (see table 2). EEOC has taken action, but not fully implemented our recommendation on identifying missing standard industry classification data from its handling of charges. By providing guidance to contractors regarding the option to include more specific goals in their AAPs, OFCCP has taken actions to implement one of our six recommendations—to take steps toward requiring contractors to disaggregate demographic data for the purpose of setting placement goals in the AAP. The agency has not taken action to fully implement our other four recommendations that focus on improving oversight, as shown in table 2 and discussed below. With regard to the recommendations that have not been fully implemented, EEOC and OFCCP have taken action to date as described below. Capture standard industry classifications on charges. In our November 2017 report, we found that EEOC could not analyze charge data by industry to help identify investigation and outreach priorities. This was inconsistent with EEOC strategic planning documents and EEOC Inspector General reports which, had emphasized the importance of analyzing charge data by industry. EEOC’s inability to analyze charge data by industry limits EEOC’s ability to identify trends by industry sector and conduct sector-related analyses that could be used to more effectively to focus its limited enforcement resources and outreach activities. EEOC has taken some action towards addressing missing industry code data, but has not taken actions sufficient to fully implement this recommendation. As part of an effort to overhaul its data system, EEOC has begun developing an Employer Master List that will provide a source of employer information, including industry codes, but EEOC told us that it has not yet completed this effort. It anticipates this system will be more fully developed by spring 2020. Use data on closed evaluations to address delays. In our November 2017 report, we found that OFCCP did not analyze data on closed evaluations to understand the root causes of delays in its compliance review process that may be straining its resources and inhibiting OFCCP’s efforts to identify potential discrimination. This evaluation could help OFCCP determine whether changes are needed in its own internal policies and processes, as well as guide OFCCP’s selection of improved methods for obtaining complete, accurate, and timely documentation from federal contractors. OFCCP has taken actions but it does not fully address this recommendation. In June 2019, OFCCP officials reported that OFCCP’s procedures outlined in the Active Case Enforcement Directive (DIR 2011-01) caused delays in case closures, but it does not indicate that this conclusion resulted from the recommended analysis of internal process data from closed evaluations. OFCCP officials reported that the agency’s aged case rate—defined as a case which is open for more than 730 days and has not been referred for further enforcement— has dropped from 27.7 percent in fiscal year 2017 to 20.9 percent in fiscal year 2019, though they did not report any corresponding change in case outcomes. In September 2019, OFCCP officials told us they continue to study causes and how to address delays with effective policies that make the agency more efficient. Assess the methods used to consider industry disparities in compliance. In our November 2017 report, we found that OFCCP’s current methodology for identifying disparities by industry—using data from the American Community Survey—may not have accurately identified industries at greatest risk of potential noncompliance with nondiscrimination and affirmative action requirements. In its agency response to our November 2017 report, OFCCP officials reported that the agency was exploring the use of U.S. Census Bureau and administrative data to refine its selection process to focus on industries with a greater likelihood of noncompliance. OFCCP has taken some action, but has not fully implemented this recommendation. In January 2019, DOL officials reported that DOL had revised its scheduling methodology to include industries with the highest rates of violations. OFCCP published the scheduling list in March 2019 and its field offices started scheduling cases in May 2019. OFCCP stated it will continue to monitor results from this revised scheduling methodology to determine its effectiveness. It will be important for OFCCP to refine these methods based on its experiences with them. This new process is a step toward focusing efforts on industries at greater risk of potential noncompliance with nondiscrimination or affirmative action requirements. Evaluate establishment-based approach to compliance evaluations. In our November 2017 report, we found that OFCCP had made no changes to its establishment-based approach since OFCCP was founded in 1965. However, OFCCP officials acknowledged the changing nature of a company’s work can involve multiple locations and corresponding changes in the scope of hiring and recruitment. OFCCP has taken some action, but has not fully addressed this recommendation. In fiscal year 2019, OFCCP evaluated its current approach for identifying subcontractors for review. OFCCP stated that the current approach does not reliably include subcontractors in the pool from which contractors are scheduled because there is no government or public database that captures the complete universe of subcontractors and other important data. In June 2019, OFCCP submitted revisions to its process to the Office of Management and Budget (OMB) for approval. Evaluate the Functional Affirmative Action Program. In November 2017, we found that OFCCP had not evaluated its Functional Affirmative Action Program (FAAP)—an alternative affirmative action program for a business function or unit that may exist at multiple establishments or multi-establishment contractors. OFCCP offered the FAAP so that companies could move away from establishment-based reviews, which may be more appropriate for some multi-establishment contractors. However, few contractors participate in this program and the agency has not conducted an evaluation of it. OFCCP has taken some action, but has not fully implemented this recommendation. OFCCP has taken steps to encourage contractors to use the FAAP program without fully evaluating it as an alternative to the establishment-based program. Evaluating the FAAP could help OFCCP improve its ability to achieve its objectives and may provide broader insight for OFCCP’s overall enforcement approach. In our October 2017 report, we found that from fiscal years 2007 through 2015, 9 of the 117 potential FBOs we identified across HHS, DOJ, and DOL, certified that they were exempt based on RFRA from nondiscrimination laws related to religious-based hiring (see fig. 3). As a result, the nine FBOs were allowed to consider a prospective employees’ religious faith when making employment decisions. All nine of the FBOs were awarded funding by DOJ primarily through the agency’s Justice Programs, and collectively received approximately $3.2 million, which is less than 1 percent of the $804 million in grants that DOJ awarded that were subject to statutory restrictions from fiscal years 2007 to 2015. HHS, DOJ, and DOL awarded funding to at least 2,586 grantees through 53 grant programs that were subject to statutory restrictions on religious- based hiring. The number of relevant grant programs could be higher because GAO could not identify all such programs due to data limitations. We interviewed six of the nine faith-based grantees that certified that they were exempt from religious-based hiring restrictions. Each of the six grantees emphasized the importance of hiring someone of the same religious faith to assist with grant activities. For example, the grantees said that hiring someone with the same religious faith was critical to their mission and organizational success, and if the RFRA exemption were not available, they may not have sought the grant. We also interviewed grantees from five of 35 potential FBOs that did not certify that they were exempt from statutory restrictions based on religious-based hiring to see if they were aware of the potential for an exemption. The five grantees said that they did not recall seeing information about the exemption option in the grant application or grant award documentation. They said that they also may not have been looking for the information because they were not considering religion in their hiring decisions. HHS, DOJ, and DOL used various methods for informing grant applicants and recipients of the statutory restrictions on religious-based hiring and their processes for obtaining an exemption from such restrictions. Specifically: DOJ had made this information available on agency web pages as well as in the documentation that is provided to grant recipients. DOL had a web page dedicated specifically to explaining statutory restrictions on religious-based hiring to faith-based grant applicants and recipients, which also covers the process for seeking exemptions from the restrictions. In addition to providing information in grant announcements, HHS provided all Substance Abuse and Mental Health Services grant applicants seeking funds for substance abuse prevention and treatment services with a form that cites laws and regulations governing religious organizations that receive grant funding, including the regulation that outlines the exemption process. As we reported in 2016, DOJ, DOL, and HHS all required grantees that seek to make employment decisions based on religion to self-certify that they met requirements to be eligible for an exemption from statutory restrictions on religious-based hiring, but varied in how they reviewed and approved requests for approval. All three agencies required that faith- based grantees complete a form or some written request to demonstrate their eligibility for the exemption, but DOL is the only agency that reviewed and approved the requests. For example, DOL required that faith-based grantees submit their requests for the exemption for review and approval by the Assistant Secretary responsible for issuing or administering the grant. Conversely, while DOJ and HHS required that faith-based grantees submit a form or written request, respectively, neither reviewed nor approved the requests. On August 15, 2019, OFCCP proposed regulations intended to clarify the scope and application of the religious exemption to help religious employers with federal contracts and subcontracts and federally assisted construction contracts and subcontracts better understand their obligations. OFCCP proposes to add definitions of the following terms: exercise of religion; particular religion; religion; religious corporation, association, educational institution, or society; and sincere. In addition, the proposed rule states that the religious exemption should be construed to provide the broadest protection of religious exercise permitted under the Constitution and related laws, consistent with the administration policy to protect religious freedom. The stated intent of the proposed rule is to make clear that religious employers who contract with the federal government can condition employment on acceptance of or adherence to religious tenets, provided that they do not discriminate on other bases. Chairwoman Bonamici, Senior Republican Comer, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Cindy Brown Barnes, Director, Education, Workforce and Income Security Team at (202) 512-7215 or brownbarnesc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Blake Ainsworth, Amber Yancey- Carroll, Melinda Bowman, Sheranda Campbell, Sarah Cornetto, Mary Crenshaw, Helen Desaulniers, Holly Dye, Michael Erb, Monika Gomez, LaToya King, Joel Marus, Diana Maurer, Heidi Neilson, James Rebbe, Katrina Taylor, Rosemary Torres Lerma, Kathleen van Gelder, and Betty Ward Zukerman. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Several federal laws, executive orders, and regulations seek to promote equal employment opportunity by prohibiting employers from discriminating in employment on the basis of race and gender, among other things, and generally require companies contracting with the federal government to comply with affirmative action and other equal employment opportunity provisions. The EEOC and OFCCP are the primary federal agencies that enforce these requirements. Although federal law also generally prohibits employment discrimination based on religion, faith-based organizations may hire based on religion. Some federal grant programs contain statutory restrictions prohibiting this practice; however, since a 2007 DOJ legal opinion, federal agencies have allowed faith-based grantees to use RFRA as a basis for seeking an exemption to allow religious-based hiring. GAO has issued three reports since September 2016 that address equal employment opportunity ( GAO-16-750 , GAO-18-69 , and GAO-18-164 ). This testimony is based on these three reports and discusses 1) OFCCP and EEOC's progress in addressing prior GAO recommendations and 2) equal employment opportunity exemptions for faith-based organizations. To update the status of prior recommendations, GAO reviewed agency guidance and documentation and interviewed agency officials. The Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) and the Equal Employment Opportunity Commission (EEOC) face challenges in overseeing compliance by employers and federal contractors with applicable federal equal employment opportunity requirements. In its 2016 report, GAO made six recommendations to OFCCP and in its 2017 report made five additional recommendations to OFCCP and one to EEOC to strengthen program oversight. OFCCP has implemented four recommendations, but seven require additional agency action to be fully implemented, as does the one to EEOC. For example: In 2016, GAO found that OFCCP's oversight was limited by reliance on contractors' voluntary compliance with affirmative action plan requirements. OFCCP has taken steps to develop a new web portal for collecting those plans annually, but has not yet obtained Office of Management and Budget approval for the collection or launched the portal. GAO also found OFCCP's oversight was limited by a lack of timely staff training. OFCCP has taken steps to implement a new training curriculum, but has not yet implemented its new learning management system that will help ensure timely and regular training. In 2017, GAO found that EEOC had not consistently captured information on industry codes, which limits EEOC's ability to identify trends by industry sector and conduct sector-related analyses. EEOC has not yet completed development of its Employer Master List that will include industry codes. GAO also found that OFCCP's methodology for identifying equal employment disparities by industry might not accurately identify industries at greatest risk of noncompliance with affirmative action and nondiscrimination requirements. OFCCP has taken steps to develop a new methodology, but needs to further refine it to ensure that it will identify industries at greatest risk. From fiscal years 2007 through 2015, few faith-based grantees sought an exemption from nondiscrimination laws related to religious-based hiring under the Religious Freedom Restoration Act of 1993. In October 2017, GAO found that the Departments of Justice (DOJ), Health and Human Services (HHS), and Labor (DOL) had awarded funding to at least 2,586 grantees through at least 53 grant programs that restricted grantees from making employment decisions based on religion. The number of relevant grant programs could be higher because GAO could not identify all such programs due to data limitations. Across the three agencies, GAO identified 117 grantees that were potentially faith-based organizations (FBO). Of the 117 potential FBOs, nine DOJ grantees were FBOs certified as being exempt from statutory restrictions on religious-based hiring. All three agencies required grantees seeking an exemption to self-certify that they were eligible for the exemption, but the agencies' processes for reviewing and approving exemption requests varied. In August 2019, OFCCP issued a proposed rule to clarify the scope and application of the religious exemption to help organizations with federal contracts and subcontracts and federally assisted construction contracts and subcontracts better understand their obligations.", "document_type": "gao"}
{"report": "The size and complexity of states’ Medicaid programs have implications for program administration and oversight, including provider screening and enrollment. States have flexibility, within broad federal guidelines, in how they design, administer, and oversee their Medicaid programs. For example, states have the option to pay for care through fee-for-service (FFS) payments to participating providers, contract with managed care organizations (MCO) to deliver services based on a fixed amount per beneficiary, or a combination of both. In fiscal year 2018, total Medicaid spending was $629 billion, about half of which was estimated to be spent for services delivered under managed care. CMS and states each have a role to play in protecting the integrity of the Medicaid program and preventing fraud, waste, and abuse. States administer their Medicaid programs, including implementing federal requirements for screening and enrolling Medicaid providers. CMS has a role overseeing states’ compliance with federal requirements. CMS’s oversight activities include measuring improper payments in the Medicaid program, and conducting focused program integrity and desk reviews. Other federal and state entities also have a role in oversight of the Medicaid program. For example, state auditors—state agencies that typically conduct the annual single state audit of federal programs—may also conduct program integrity reviews and identify Medicaid improper payments. We have previously testified that state auditors are uniquely qualified to partner with CMS in its oversight of Medicaid. In our testimony, we noted that CMS could help improve program integrity by providing state auditors with a substantive and ongoing role in auditing state Medicaid programs. To limit payments to ineligible providers—such as those convicted of program-related fraud and abuse, or with a suspended or revoked medical license for reasons of bearing on professional competence or performance—federal regulations require states to screen and enroll all providers, whether the provider furnished, ordered, or referred services to an eligible beneficiary or whether the service was paid for under FFS or Medicaid managed care contracts. Providers subject to these requirements include individual practitioners—such as physicians, nurse practitioners, and physical therapists—as well as any physicians and other professionals who may only order or refer beneficiaries to services, but do not render services; for example, providers who only prescribe medications or order imaging services, such as an x-ray. Providers also include provider organizations—such as hospitals, group practices, and skilled nursing facilities—and providers and suppliers of medical equipment or goods. All providers must be screened when they (1) initially apply for and submit an application, and (2) upon reenrollment in a state’s Medicaid program. Further, states must screen all providers at least once every 5 years to revalidate their enrollment. States may rely on the results of providers’ screenings performed by the Medicare program or another state’s Medicaid program. States may also choose to delegate screening activities to vendors that screen providers on the states’ behalf or MCOs. If a state chooses to delegate screening activities, it must ensure that the screenings are conducted in accordance with the Medicaid program requirements. States must also collect certain information from providers to enroll them into their Medicaid programs, such as their Social Security numbers, dates of birth, and National Provider Identifiers, if applicable. States must also collect disclosure information for owners, managing employees, and others with controlling interests in provider organizations meeting certain criteria. For example, states must collect disclosure information for those with direct or indirect ownership totaling 5 percent or more, or who are agents or managing employees of a provider organization. These owners and others with controlling interests who are subject to disclosure requirements must undergo certain required screening activities, such as federal database checks, and states must perform these screening activities to enroll the provider organization. Federal regulations require states to perform several screening activities prior to enrolling providers. The provider’s categorical risk level for fraud, waste, and abuse determine the required screening activities. The screening activities may include conducting checks in federal databases; verifying licensure; and performing site visits and fingerprint-based background checks. In addition to required activities, states may also choose to conduct other screening activities in order to identify providers ineligible for participating in Medicaid. See figure 1 for an overview of Medicaid provider screening activities and appendix II for a full list of provider screening requirements. Risk-based screening. States must screen providers according to the provider’s categorical risk level for fraud, waste, and abuse. The regulations establish screening requirements for three risk levels—limited, moderate, and high risk—and each risk level includes a range of provider types. (See table 1.) In addition, providers’ risk levels can change. For example, limited- or moderate-risk providers may be categorized as high risk if the state Medicaid agency imposes a payment suspension based on a credible allegation of fraud, waste, or abuse. Federal database checks. States must confirm the identity of prospective providers, providers seeking revalidation, and individuals subject to disclosure requirements to determine if they have been excluded from participating in Medicaid by checking four federal databases: 1. the Social Security Administrations’ Death Master File (DMF); 2. the National Plan and Provider Enumeration System (NPPES); 3. the List of Excluded Individuals/Entities (LEIE); and 4. the General Services Administration’s System for Award Management (SAM). In addition, states must conduct at least monthly checks in the LEIE and SAM. States may also check other federal and state databases. For example, states may check CMS’s database containing Medicare provider enrollment data—the Provider Enrollment, Chain and Ownership System (PECOS)—prior to conducting their own database checks to determine if a provider is enrolled in Medicare and was previously screened. For providers enrolled in Medicare, states may choose to rely on the results of the screening conducted for the Medicare program and enroll the provider without conducting any further screening activities. For providers not enrolled in Medicare, states must screen the provider prior to enrolling them. (See table 2.) Licensure verification. States must verify that providers have a current, valid medical license in the states in which they are licensed. Further, states must confirm that the providers’ license does not have any limitations, such as a suspension or probation. Site visits and fingerprint-based criminal background checks. States must conduct on-site visits for moderate- and high-risk providers to verify that the information submitted is accurate and to determine providers’ compliance with federal and state enrollment requirements. Further, states must collect fingerprints from high-risk providers, and these providers must consent to a criminal background check. CMS developed the PERM to estimate the national Medicaid improper payment rate, including improper payments due to states’ non- compliance with provider screening and enrollment requirements. CMS computes the national improper payment rate as the weighted average of states’ improper payment rate estimates from the PERM using three key components of the Medicaid program: FFS, managed care, and beneficiary eligibility determinations. Each component of the PERM is estimated differently, and only the FFS component is used to oversee states’ compliance with provider screening and enrollment requirements. When calculating the FFS component, CMS measures improper payments in a sample of FFS claims, which record services provided. Specifically, CMS reviews the sample of FFS claims and examines related state documents to identify any errors resulting from a failure to meet federal and state policies, including provider screening and enrollment requirements. For example, CMS verifies the provider was eligible to render and bill for the services by reviewing provider information, including the provider’s name and license, and whether the provider was screened in accordance with risk-based screening requirements. Any FFS claims paid for services furnished, ordered, referred, or prescribed by a provider who was not screened in compliance with requirements or not enrolled with the state is considered an improper payment. The managed care component of the PERM measures any improper payments in the capitated payments that state Medicaid agencies make to MCOs on behalf of enrollees. It does not examine whether providers in managed care were appropriately screened and enrolled within a state. The eligibility component focuses solely on measuring improper payments related to state determinations of whether Medicaid enrollees meet categorical and financial criteria for Medicaid benefits. CMS conducts the PERM across all states on a 17-state, 3-year rotation cycle and computes an annual rolling average of improper payment rates from the 3 years of data. At the conclusion of each PERM cycle, CMS develops reports for each state, which include any findings related to provider screening and enrollment. Following each PERM cycle, states must prepare a corrective action plan to address errors found. CMS also conducts other oversight activities to protect the integrity of the Medicaid program and assess states’ compliance with Medicaid provider screening and enrollment requirements. These activities include the following: Focused program integrity reviews. CMS conducts these reviews to examine specific areas of Medicaid, including provider screening and enrollment and managed care. These reviews may include a full or partial review of states’ compliance with provider screening and enrollment requirements. Desk reviews. CMS conducts these off-site reviews on specific aspects of states’ program integrity activities, such as a state’s progress toward implementing corrective action plans in response to PERM findings and payments made to providers terminated from Medicaid. Officials from all seven selected states told us they faced challenges building the capacity and establishing the administrative processes needed to implement the new and expanded provider screening and enrollment requirements under PPACA and the 21st Century Cures Act. These challenges included establishing procedures for risk-based screenings, using federal databases and collecting information from providers, and screening and enrolling an increased volume of providers. Due, in part, to these challenges, officials from five selected states told us they have not yet implemented some of the requirements. Officials from all seven selected states described challenges building their capacity to conduct risk-based provider screenings prior to enrollment into their Medicaid programs. To incorporate database checks, site visits, fingerprint-based background checks, and other risk-based screening activities into state screening procedures; state Medicaid officials said they needed financial resources, leadership support, and time. Specifically, officials from the selected states told us they used one of the following three approaches to build capacity to implement the screening and enrollment requirements. 1. Developing new information technology systems. Officials from two of the seven selected states told us they developed new state information technology systems that automated screening and enrollment activities. For example, officials from one state told us they spent $5.9 million from 2015 through 2018 to develop a new provider screening and enrollment system that included an online provider application portal and automated screening activities, such as conducting database checks and flagging high-risk providers for site visits and fingerprint-based background checks. According to state officials, this new system helped the state implement provider screening and enrollment requirements, yielding efficiencies by allowing staff to focus on analyzing provider screening results rather than clarifying data entry errors and manually checking each database. (See fig. 2.) 2. Contracting with vendors. Officials from four other selected states told us they initiated or modified existing contracts with vendors to screen new provider applications and conduct revalidations on their behalf. For example, officials from one state told us their contract with a vendor resulted in screening and enrolling about 10,000 providers in 2018, more than five times the number the state had processed in the previous year. Another state used a vendor to revalidate more than 9,000 providers in 2016; about 12 percent of the state’s enrolled provider population. 3. Modifying existing procedures. Officials from our seventh selected state told us that they modified their existing state information technology system and procedures to manually screen and enroll providers. However, according to state officials, this approach has put pressure on their resources. Officials said that they were working to automate some database checks as much as possible without requiring services from a contractor. Officials from six of the seven selected states told us they experienced challenges using federal databases, and all seven of the states described challenges collecting required information for screening and enrollment. To mitigate challenges using federal databases, the state Medicaid agencies took actions including accessing data from alternate sources, manually verifying information, and collecting information from providers. (See table 3.) Recent CMS actions could also improve states’ ability to search databases. In April 2019, CMS officials told us they have partnered with the Treasury Department, which is conducting a pilot that will offer states access to its Do Not Pay Business Center services. Do Not Pay is a resource developed by the Treasury Department to detect and prevent improper payments. This resource allows federal agencies to automate screenings by searching for excluded parties using common identification numbers, such as Social Security numbers. Do Not Pay also allows users to search DMF, LEIE, and SAM from a single portal. CMS referred seven states, including two of our selected states, to take part in Treasury’s pilot. Officials from all seven selected states told us that they faced challenges collecting required information from providers for screening and enrollment, such as Social Security numbers or fingerprints. These states took steps—such as educating providers and developing or updating forms, procedures, and statutory provisions—to address some of the challenges associated with collecting the information necessary to screen and enroll providers. For example, one state told us that some providers have been hesitant to disclose Social Security numbers and their date of birth on applications, as well as other information that states are required to collect for enrollment. In response, the state has offered provider education on the requirements to facilitate collecting this information. State Medicaid officials also noted that their agencies worked with CMS, state legislatures, and state law enforcement agencies to implement fingerprint-based background check requirements to, for example, collect fingerprints and check them against Federal Bureau of Investigation records. Officials from two selected states told us their agencies did not have the authority under state law to collect fingerprints from providers or submit them to the Federal Bureau of Investigation prior to PPACA, and officials from one of these states told us changes to state statute were needed before they could implement this requirement. Officials from five of the seven selected states described challenges having sufficient capacity to screen an increased volume of providers and enroll certain provider types. Officials from one state told us that the new requirement to screen managed care providers more than doubled the number of providers the state needed to screen and enroll. Further, officials from three states told us about challenges obtaining information needed to conduct screenings from prescribers and other professionals who only order and refer services. Previously, such providers were not required to enroll in Medicaid and some were not responsive to the state Medicaid agency’s requests for information. Officials from the five selected states that faced these challenges told us they had taken steps to address these challenges. Yet, four of the five selected states that faced these challenges continued to make payments to these types of providers even though they were not enrolled in their Medicaid programs, because they wanted to maintain beneficiary access to the services. Managed care providers. Officials from three of the selected states told us they faced challenges enrolling managed care providers. For example, officials from one state told us that they could not process the large number of applications they needed to screen before enrolling these providers, and attempted to delegate some required database checks for managed care providers to its MCOs. However, officials told us these MCOs do not have state-level access to all required databases; therefore, the managed care providers have not been screened as required and are not all enrolled with the state. The officials told us the state has about 80,000 managed care providers to screen and enroll as part of implementing the 21st Century Cures Act requirements. However, officials said they have chosen to wait until the state launches a new information technology system that automates screenings before screening and enrolling these providers. Prescribers and other professionals who may only order and refer services to beneficiaries. Officials from three selected states told us they had not enrolled all prescribers and other professionals who may only order and refer services, but do not render them. These states have taken steps to address this challenge. Officials from one state told us they took steps to screen and enroll medical residents— hospital providers who are not providing services to Medicaid beneficiaries, but may prescribe medication during a beneficiary’s hospital stay. These officials told us they did not screen and enroll medical residents prior to PPACA, because of differences in licensure. Officials from all three states said they continue to pay for prescriptions written by these providers who are not enrolled in their Medicaid programs. CMS offers optional consultations that are tailored to support states’ implementation of the Medicaid provider screening and enrollment requirements. However, these consultations are optional, regardless of whether states have implemented the federal requirements. CMS also conducts several oversight activities—the PERM, focused program integrity reviews, and other activities—to oversee states’ compliance with provider screening and enrollment requirements. Collectively, these activities do not ensure CMS has comprehensive and timely information on the extent of states’ compliance with the requirements. In 2016, CMS began offering optional consultations tailored to support states’ implementation of Medicaid screening and enrollment requirements. Optional consultations include CMS contractor site visits to states that examine the extent to which states have implemented the requirements, and the data compare service to assist states with screening providers. While most states (38) have used one or more of these consultations, 13 states have not used any. Because some states do not avail themselves of the optional consultations, these consultations do not provide CMS with information on all states’ progress in implementing the requirements. Officials from some of the seven selected states reported limitations affecting their use of the consultations. CMS contractor site visits. One-third of states (17), including three of the seven selected states, participated in at least one multi-day CMS contractor site visit, as of June 2019. Officials from CMS and its contractor told us that during the site visit, the state completes a self- assessment, followed by the contractor’s assessment on the implementation status of all provider screening and enrollment requirements to identify requirements that have not been implemented and opportunities for improving the states’ screening and enrollment procedures. (See fig. 3 for a map of states that participated in the CMS contractor site visit.) After the visit, the contractor provided a report that summarizes the state’s status toward implementing each requirement, such as full, partial, nearly complete, and not started. (See fig. 4.) CMS officials consider any requirements that are not fully implemented as “opportunities for improvement.” CMS contractor site visits are not required and are not considered audits; the agency does not track states’ progress on implementing requirements and opportunities for improvement unless the state engages CMS in follow-up. At the time of their contractor site visit, 16 of the 17 states that opted for this service had not fully implemented all provider screening and enrollment requirements. Officials from the three selected states that received a CMS contractor site visit told us that the visit helped (1) accurately identify requirements that their state had not fully implemented, or (2) establish priorities for making changes. Two of these states found it helpful to learn from the contractor about other states’ best practices and requested a return visit. Officials from another state told us they were able to make positive changes to their screening and enrollment procedures immediately after the visit, such as improving documentation of database checks through the use of screenshots to record search results. Data compare service. About half of all states (25), including four of the seven selected states, used the data compare service as of June 2019— a process by which states submit a list of all their active providers, and CMS provides a full report of the state’s providers who were previously screened by Medicare, as well as identify providers the state may need to take action on, because, among other reasons, they were terminated from Medicaid. For the states that have used the data compare service, CMS officials reported being able to screen between 40 to 80 percent of their providers. Officials from the four selected states said it was also useful for testing their provider screening and enrollment procedures to see whether the service would identify any providers they should have excluded in their screening, and three of these states said it was useful for streamlining their provider revalidations. Additionally, officials from one state that had not yet used the service told us they would consider using it in the future for both of these purposes. For example, officials from one state reported that CMS’s data compare service screened half of the approximately 80,000 providers they needed to revalidate. (See fig. 5 for a map of states that opted for the data compare service.) However, officials from all seven selected states identified limitations of the data compare service that led some states to use the service less frequently and three states to not use the service at all. CMS officials acknowledged the three limitations reported by state officials: 1. Time for receiving results. The results from the data compare service were not timely enough to help states with screening newly enrolling providers. Officials from one state explained that some provider information may become outdated by the time the results are received 6 to 8 weeks later, which makes the service less useful than it could be. 2. Different Medicare and Medicaid address entries. The data compare service’s addresses reflected Medicare practice or billing locations that may be different from providers’ Medicaid addresses. Because these addresses do not match, they could not be relied upon for updating the state’s provider records or to help states conduct site visits required for screening and enrolling moderate- and high-risk providers. 3. Additional burden for manual enrollment systems. Officials from two selected states told us that manually extracting provider data from their system—including names, addresses, Social Security numbers, and National Provider Identifiers—and manually re-entering the results from CMS for each provider into their system was burdensome and resource-intensive, leading one of these states to stop using the service. CMS offers guidance and other supports to states on a regular and periodic basis, including monthly calls with states, and assigning states to a CMS contact (see sidebar). These services also assist states with implementing the Medicaid provider screening and enrollment requirements. Officials from all of our selected states told us the guidance and other supports were helpful. According to CMS officials, the extent to which states participate in these other supports varies, because the level of participation is optional. CMS officials also told us that they use these other supports, including monthly calls and ad hoc emails, to discuss progress and keep a record of information provided; however, the agency does not revisit or require corrective actions unless the state initiates it. The PERM and other methods CMS uses to oversee states’ efforts to screen and enroll Medicaid providers do not provide CMS with comprehensive and timely information on states’ compliance with the requirements. Some methods do not fully track whether states have enrolled all types of providers and are in compliance with all the requirements; other program integrity oversight methods have not been conducted on all states. Further, these methods do not ensure timely follow-up to address identified concerns. The PERM’s components—FFS, managed care, and beneficiary eligibility determinations—measure improper payments across all states; as previously noted, the FFS component is the only component CMS uses to assess states’ compliance with provider screening and enrollment requirements. However, using the PERM to oversee states’ compliance with the requirements has limitations, including the following: The PERM does not examine whether providers under contract with MCOs are appropriately screened and enrolled. The PERM assesses states’ compliance with the provider screening and enrollment requirements by reviewing provider information for claims paid under FFS; it does not review such information for services financed under managed care. Currently, the PERM does not examine ownership disclosure and certain other provider screening and enrollment requirements. CMS officials told us the agency plans to assess the feasibility of including ownership disclosure requirements in the PERM over the next 3 years. The PERM does not ensure that CMS identifies areas of non- compliance in a timely manner. CMS conducts the PERM in each state every 3 years, and states develop corrective action plans in response to findings from the PERM; thus, it may be years before CMS identifies—and states resolve—areas of non-compliance with the provider screening and enrollment requirements. (See fig. 6.) Although CMS follows up annually with states regarding their corrective action plans, it does not fully assess states’ progress toward implementing their plans until the next PERM cycle, which is 3 years later. Further, while four of our selected states had implemented all their corrective action plans regarding provider screening and enrollment requirements within 1 year of PERM findings, the other three states had not fully implemented their plans about 2 years after PERM findings. CMS officials emphasized that developing and tracking corrective action plans was a collaborative process and that states may change corrective action plans in response to competing priorities. CMS uses other methods to oversee states’ compliance with the provider screening and enrollment requirements—focused program integrity reviews and desk reviews—that are not optional and have resulted in findings. However, these methods do not provide the agency with comprehensive and timely information on states’ compliance with the requirements. Specifically, these methods have not been conducted in all states, performed in a timely manner, or included a systematic review of states’ compliance with all the provider screening and enrollment requirements. For example: Focused program integrity reviews. CMS has not conducted focused program integrity reviews examining specific areas in Medicaid for all states. Most of the reviews performed did not include a comprehensive or timely examination of states’ compliance with provider screening and enrollment requirements. Overall, CMS has conducted 42 focused program integrity reviews in fiscal years 2014 through 2018 in 39 states. Among these reviews, nine of the 42 focused program integrity reviews examined states’ compliance with provider screening and enrollment requirements, the last of which was completed in fiscal year 2015. CMS also conducted focused program integrity reviews on managed care for 34 of the 41 states with managed care expenditures in fiscal year 2017. However, nearly all of these reviews (33) were conducted prior to January 2018 when states were required to screen and enroll all managed care providers, as required by the 21st Century Cures Act. CMS also conducted seven focused reviews examining personal care services in seven states— which include examining screening and enrollment requirements for providers of these services. Desk reviews. Off-site desk reviews that examine specific aspects of states’ program integrity activities do not include a comprehensive or timely examination of states’ compliance with the provider screening and enrollment requirements. CMS has conducted desk reviews examining activities related to provider screening and enrollment, such as corrective actions states have taken in response to PERM findings. However, desk reviews on corrective action plans are limited to examining findings on provider screening and enrollment identified during the PERM and are not conducted until 3 years after the PERM has occurred. For example, CMS told us that in 2018 the agency conducted desk reviews on the 17 states that underwent the PERM in fiscal year 2015. CMS also conducted 35 desk reviews on potential payments to terminated providers since fiscal year 2014. The PERM and CMS’s other oversight methods do not provide CMS with sufficient or timely information about states’ screening and enrollment procedures for all Medicaid provider types, and most states with managed care expenditures have not undergone a managed care-focused program integrity review since the 21st Century Cures Act screening and enrollment provisions went into effect. The lack of complete information on whether states are screening and enrolling all providers according to requirements is inconsistent with federal internal controls on assessing risk, which note that management should consider the potential for fraud when identifying, analyzing, and responding to risks. Without complete information, CMS cannot ensure that only eligible providers are participating in the Medicaid program, leaving the program vulnerable to improper payments. Further, CMS does not obtain timely information on all states’ actions to address areas of non-compliance or track progress toward addressing these areas. The length of the PERM cycle—3 years—and time for performing corrective actions to address PERM findings, limits CMS’s awareness of states’ progress, or lack thereof, toward implementing requirements. As a result, CMS lacks assurance that states are addressing areas of non-compliance or if such actions are being taken in a timely manner. This is inconsistent with federal internal controls on monitoring, which note that management should remediate deficiencies in the internal control system on a timely basis. CMS has a range of activities that provide the agency with some knowledge of states’ implementation of required provider screening and enrollment under PPACA and the 21st Century Cures Act; however, the agency’s oversight activities are not designed to systematically examine compliance with all the requirements for all providers in a timely manner. Notably, the PERM does not examine managed care providers, and CMS’s assessment of compliance and monitoring of corrective actions are not timely, because they are based on the 3-year PERM cycle. Also, focused program integrity reviews—which may examine states’ oversight of MCOs and their compliance with provider screening and enrollment requirements for providers participating in managed care—have not been conducted on all states. The one activity that can provide CMS and states with a complete and timely assessment of states’ implementation with provider screening and enrollment requirements is optional. While CMS does some tracking of state-reported information on the status of states’ implementation of the requirements, this oversight does not include states that have not availed themselves of the support CMS provides. Since states are not required to participate in these optional consultations, the states that may face the greatest challenges with implementing the provider screening and enrollment requirements might not volunteer to participate in the consultations. Without a thorough review of states’ implementation of the provider screening and enrollment requirements, as well as processes to monitor states to ensure timely remediation of deficiencies, the agency lacks assurance that only eligible providers are participating in the Medicaid program, leaving the program at risk for improper payments. We are making the following two recommendations to CMS: The Administrator of CMS should expand its review of states’ implementation of the provider screening and enrollment requirements to include states that have not made use of CMS’s optional consultations. Similar to CMS’s contractor site visits, such reviews should include any necessary steps to address areas of noncompliance for all types of enrolled providers, including those under contract with MCOs. (Recommendation 1) The Administrator of CMS should annually monitor progress toward addressing any areas of noncompliance related to the provider screening and enrollment requirements for any state with one or more corrective action plans. (Recommendation 2) We provided a draft of this report to HHS for review and comment. In its written comments, HHS concurred with our recommendations; the full text of which are reproduced in appendix I. Regarding our first recommendation, HHS stated that it will reach out to states that have not yet participated in optional consultations to discuss their progress and outline steps that the states should take to come into full compliance with the provider screening and enrollment requirements. Regarding our second recommendation, HHS stated that it is in the process of instituting more frequent reviews of corrective action plans resulting from one of CMS’s oversight activities—the PERM—stating that such reviews will now be performed quarterly. However, HHS’s comments did not discuss monitoring areas of noncompliance that are identified through other oversight activities, such as focused program integrity reviews, which include reviews of states’ screening and enrollment of providers who are under contract with MCOs. We recommend that CMS annually monitor progress toward addressing any areas of noncompliance related to the provider screening and enrollment requirements, which would include areas of noncompliance identified through the PERM, optional consultations, and other oversight activities. HHS also provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the Administrator of CMS, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7114 or at yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to this report are listed in appendix III. Appendix II: Summary of Medicaid Provider Screening and Enrollment Requirements Description The state Medicaid agency must require all enrolled providers to be screened in accordance with applicable requirements. The state Medicaid agency must have a method for verifying that a provider is licensed without restrictions in accordance with the laws of that state. The state Medicaid agency must complete revalidation of enrollment for all providers, regardless of provider type, at least every 5 years. The state Medicaid agency must deny enrollment to any provider and disclosing entity that does not successfully pass or comply with the screening process, and the agency must terminate providers who no longer meet the requirements for enrollment. The state Medicaid agency must rescreen a provider who has been deactivated for any reason prior to the provider’s reactivation. The state Medicaid agency must share with providers who are terminated or denied enrollment the process for appealing the decision. The state Medicaid agency must conduct site visits for providers who are designated as moderate or high-risk levels. Fingerprint criminal background checks The state Medicaid agency must complete fingerprint-based criminal background checks for providers and disclosing entities in the high-risk category. The state Medicaid agency must confirm the identity and determine the exclusion status of providers, any person with an ownership or control interest, and any agent or managing employee of the provider. The state Medicaid agency must require all claims for payment for items and services that were ordered or referred to contain the National Provider Identifier of the physician or other professional who ordered or referred such items or services. Screening levels for Medicaid providers The state Medicaid agency must screen all initial applications based on a categorical risk level of “limited,” “moderate,” or “high.” The state Medicaid agency must collect an application fee from institutional providers during a new enrollment or revalidation, unless Medicare or another Medicaid agency has already collected an application fee. Allows CMS and states to implement temporary moratoria pausing the enrollment of new provider types in a given location. In addition to the contact named above, Leslie V. Gordon (Assistant Director), Kristin Ekelund (Analyst-in-Charge), Manuel Buentello, Drew Long, Giao N. Nguyen, and Chris Zakroff made key contributions to this report. Also contributing were Marissa Coloske, Vikki Porter, and Jennifer Whitworth.", "summary": "A crucial component of protecting the integrity of the Medicaid program is ensuring that only eligible providers participate in Medicaid. States' non-compliance with provider screening and enrollment requirements contributed to over a third of the $36.3 billion estimated improper payments in Medicaid in 2018. To improve the integrity of the Medicaid program, PPACA and the 21st Century Cures Act established new requirements for screening and enrolling providers and expanded enrollment to include additional provider types. In this report, GAO (1) describes challenges states faced implementing provider screening and enrollment requirements; and (2) examines CMS support for and oversight of states' implementation of these requirements. GAO reviewed federal laws and CMS guidance. GAO also reviewed CMS documents, including reports resulting from CMS oversight activities published from 2014 through 2018 for seven states. These states were selected based on their use of CMS's contractor site visits, among other things. GAO also interviewed officials from CMS and the seven selected states. Officials from seven selected states that GAO interviewed described challenges they faced implementing new Medicaid provider screening and enrollment requirements, established by the Patient Protection and Affordable Care Act (PPACA) in 2010 and the 21st Century Cures Act in 2016. These challenges included establishing procedures for risk-based screenings, using federal databases and collecting required information, and screening an increased volume of providers. Due in part to these challenges, officials from five of the seven selected states told GAO they had not implemented certain requirements. For example, one state plans to launch its new information technology system, which automates screenings, before it will enroll providers under contract with managed care organizations, as required under these laws. The Centers for Medicare & Medicaid Services (CMS)—the federal agency that oversees Medicaid—supports states' implementation of new requirements with tailored optional consultations, such as CMS contractor site visits that examine the extent of states' implementation. Yet, because these are optional, states that need support might not participate, and CMS would not have information on those states. CMS uses other methods to oversee states' compliance, such as, the Payment Error Rate Measurement (PERM) process for estimating improper payments, and focused program integrity reviews. PERM. This process assesses states' compliance with provider screening and enrollment requirements, but does not assess compliance for all providers and all requirements, and occurs once every 3 years. Focused program integrity reviews. These reviews examine specific areas in Medicaid, like state compliance with provider screening and enrollment requirements, but have not been done in all states. CMS conducted reviews in 39 states in fiscal years 2014 through 2018. Collectively, CMS's oversight methods do not provide it with comprehensive and timely reviews of states' implementation of the provider screening and enrollment requirements or the remediation of deficiences. As a result, CMS lacks assurance that only eligible providers are participating in the Medicaid program. GAO recommends that CMS (1) expand its review of states' implementation of provider screening and enrollment requirements to include states that have not participated in optional consultations; and (2) for states not fully compliant with the requirements, annually monitor the progress of those states' implementation. The Department of Health and Human Services, the department that houses CMS, concurred with both recommendations.", "document_type": "gao"}
{"report": "While there is no statutory definition for virtual currency, IRS guidance has described virtual currency as a digital representation of value that functions as a medium of exchange, a unit of account, or a store of value. Some virtual currencies can be used to buy real goods and services and can be exchanged for U.S. dollars or other currencies. A cryptocurrency is a type of virtual currency that employs encryption technology and operates on distributed ledger technology, such as blockchain. Distributed ledger technology allows for users across a computer network to verify the validity of transactions potentially without a central authority. For example, a blockchain is made up of digital information (blocks) recorded in a public or private database in the format of a distributed ledger (chain). The ledger permanently records, in a chain of cryptographically secured blocks, the history of transactions that take place among the participants in the network. For the purposes of this report, we use the term virtual currency as a broad term that includes both cryptocurrencies, which use distributed ledger technology, and digital units of exchange that do not use that technology but still meet IRS’s definition of a convertible virtual currency, as defined in Notice 2014-21. Figure 1 shows a simplified representation of how distributed ledger technology is used to circulate virtual currencies. Bitcoin, which emerged in 2009, is the first and most widely circulated blockchain-based cryptocurrency. Bitcoins are created through a process called mining. Bitcoin miners download software to solve complex equations to verify the validity of transactions taking place on the network, and the first miner to solve a problem is awarded coins in return. Once a problem is solved, the transactions are added as a new block to the distributed ledger. Users transact in virtual currencies electronically through a network, and may use virtual wallets to manage their virtual currency. Some virtual currencies can be used as investments and to purchase goods and services in the real economy. For example, some retailers accept virtual currency as a form of payment. Virtual currency exchanges provide a platform where users can transact in different types of virtual currencies or exchange them for government-issued currencies or other virtual currencies. The fair market value of some virtual currencies has changed dramatically over time. For example, according to one index, the average value of one bitcoin was just under $20,000 in mid-December 2017. By early February 2018, one bitcoin was valued at about $7,000, before falling below $4,000 in December 2018, and again rising to over $9,000 in November 2019. The size of the virtual currency market is unknown due to limitations in available data. For example, one recent analysis concluded that a widely cited source for data about bitcoin trading included exaggerated data that gave an inflated impression of the size of the actual market. Nonetheless, there are data that may provide some context for the size of this market: As of April 2019, 10 major virtual currency exchanges collectively handled an average daily trading volume in bitcoin of more than $500 million, according to Bitwise. For comparison, the Federal Reserve Banks’ Automated Clearing House (a traditional payment processor) processed $103 billion in payment transactions on average per day in 2018. According to one index, the total market capitalization of bitcoin, the most widely circulated virtual currency, is estimated to have ranged between $60 billion and $225 billion between December 2018 and October 2019. As of November 2019, Coinbase, a large U.S.-based cryptocurrency exchange, reports a user base of more than 30 million. According to economists at the Federal Reserve Bank of New York, a 2018 survey they conducted found that 85 percent of respondents had heard of cryptocurrencies, 5 percent currently or previously owned cryptocurrency, and 15 percent reported that they were considering buying cryptocurrency. Federal agencies, including CFTC, FinCEN, and SEC, have jurisdiction over various aspects of virtual currency markets and market participants. In May 2014, we reported on the federal financial regulatory and law enforcement agency responsibilities related to the use of virtual currencies and their associated challenges. These challenges include money laundering, transfers of funds across borders, and consumer and investor protection issues. We also reported on the regulatory complexity for virtual currencies and the approaches that federal and state regulators have taken to their regulation and oversight. For example, CFTC has taken the position that bitcoin and ether, another virtual currency, meet the definition of a commodity provided in the Commodity Exchange Act. SEC has determined that some virtual currencies may be designated as securities, based on the characteristics of how they are offered and sold. FinCEN determined that certain virtual currency businesses would be money transmitters under the Bank Secrecy Act, subject to regulation as money services businesses. According to IRS guidance, convertible virtual currencies—which have an equivalent value in real currency or act as a substitute for real currency— are to be treated as property for tax purposes. Among other things, this classification means that income, including gains, from virtual currency transactions is reportable on taxpayers’ income tax returns. Therefore, a payment for goods or services made using virtual currency may be subject to tax to the same extent as any other payment made in property. Figure 2 illustrates examples of how virtual currency transactions can affect taxes. Taxpayers using virtual currency must keep track of transaction-level information, such as the fair market value of the virtual currency at the time it was obtained, to determine tax basis and calculate gains or losses. The gain or loss from the sale or exchange of virtual currency is characterized as either a capital gain or loss or an ordinary gain or loss, depending on whether the virtual currency is held as a capital asset. Taxpayers are required to report their gains or losses from virtual currency on their tax returns, including Form 1040, U.S. Individual Income Tax Return, and Form 8949, Sales and Other Dispositions of Capital Assets, for capital gains or losses. Figure 3 shows one example of how using virtual currencies could result in a capital gain or loss. IRS has limited data on tax compliance for virtual currency use, partly because the forms taxpayers use to report their taxable income do not require them to identify whether the source of their income is from virtual currency use. Likewise, information returns that third parties, such as employers, financial institutions, or other entities, file to report taxpayer income or transactions do not include space for, or direction to, indicate if the income or transactions reported involved a virtual currency. In 2016, the Treasury Inspector General for Tax Administration (TIGTA) found that IRS had not developed a methodology for gathering data on virtual currency use in taxable transactions that would help to analyze the risk of noncompliance and to estimate its significance. TIGTA recommended that IRS revise third-party information returns to identify the amounts of virtual currency used in taxable transactions. IRS agreed with the recommendation, but stated that it faced other higher priority funding needs, and did not consider modifying information reporting forms to be a priority at the time. As of February 5, 2020, IRS has not implemented any changes to these information returns to include information about virtual currency use. However, IRS added a question about virtual currency to Schedule 1, Additional Income and Adjustments to Income, of Form 1040 for tax year 2019. Individual taxpayers use Schedule 1 to report additional income, such as capital gains, unemployment compensation, prize or award money, and gambling winnings. IRS added a question asking if taxpayers received, sold, sent, exchanged, or otherwise acquired any financial interest in any virtual currency during the tax year. Only taxpayers who are otherwise required to file Schedule 1 or who would answer “yes” to the question need to file this schedule. According to IRS officials responsible for examining tax returns, IRS’s focus is on ensuring taxpayers are reporting all of their taxable income and it is not necessary to distinguish between virtual currency transactions and other property transactions being reported. Because IRS forms have not required taxpayers to explicitly identify income from virtual currency, IRS uses data from other sources to inform compliance decisions and research. These sources include: Searches of tax return databases. For tax years 2013 to 2015, IRS searched electronically filed Forms 8949 to identify how often taxpayers included language in the property description to indicate the transaction likely involved bitcoin, the most widely traded virtual currency at the time. For the 3 years, IRS identified fewer than 900 taxpayers who reported virtual currency activity each year. IRS officials said that due to the time and resources required to generate these data, IRS did not generate these filing statistics for tax years 2016 or later. By comparing these data to the size of the bitcoin market, IRS concluded that many taxpayers were likely not reporting income from virtual currency use. Third party information reports. To address tax noncompliance risks for virtual currencies, in December 2016, IRS served a John Doe summons to Coinbase, a U.S.-based cryptocurrency exchange. After IRS later narrowed the scope of the summons, it requested identifying and transactional data for all Coinbase users with a U.S. address, U.S. telephone number, U.S. email domain, or U.S. bank account that transacted with Coinbase between January 1, 2013, and December 31, 2015 that had the equivalent of $20,000 in any one transaction type (a buy, sell, send, or receive) in any year during that period. According to an announcement posted on Coinbase’s website, on February 23, 2018, Coinbase notified approximately 13,000 customers that it expected to deliver information about their accounts to IRS within 21 days. In addition, IRS officials stated that IRS had received information returns from a small number of virtual currency exchanges for tax year 2017. Third-party reports of potential fraud. IRS also has access to information on potential fraud reported to IRS and FinCEN by third parties. Financial institutions and money services businesses, which could include virtual currency exchanges, are to file a Suspicious Activity Report (SAR) if they observe or identify suspicious financial activity. SAR reporting can help IRS in identifying potential income underreporting, money laundering, and other potential tax-related violations and crimes. IRS may also receive information about tax noncompliance involving virtual currencies from whistleblowers and other referral programs. Voluntary disclosures by taxpayers. In March 2019, IRS updated Form 14457, Voluntary Disclosure Practice Preclearance Request and Application, to include a space specifically for taxpayers to disclose that they have unreported virtual currency income. IRS’s Criminal Investigation division (CI) reviews the forms IRS receives to ensure they meet criteria of eligibility and timeliness, and that the disclosure does not apply to illegal sources of income. CI sends forms that meet the criteria to two of IRS’s civil operating divisions—Large Business & International (LB&I) and Small Business/Self-Employed (SB/SE)—for review. According to IRS officials, the addition of virtual currency to the form was made to assist IRS employees in routing the forms to the correct subject matter experts in the civil operating divisions. According to officials with IRS’s Research, Applied Analytics, and Statistics (RAAS) division, RAAS had begun some virtual currency research projects to better understand virtual currency tax compliance. One project, which RAAS completed, was to develop compliance profiles for taxpayers that LB&I had identified through its compliance efforts as having virtual currency activity. RAAS officials also said that they are enhancing their use of a range of third-party information reporting, including reporting of virtual currency activity, to improve IRS’s ability to assess compliance risks. These efforts focus on use of data from multiple sources to better understand evolving risks and improve estimates of compliance risk. These projects support LB&I, SB/SE, CI, and IRS’s broader research, analysis, and statistical reporting needs. Virtual currency has not been included in past National Research Programs (NRP)—IRS’s detailed study of voluntary tax compliance used as the basis for tax gap estimates. The most recent NRP study of individual tax returns was tax years 2011-2013, before virtual currencies became more widely used. RAAS officials said the time frame for the next NRP study of individual tax returns has not yet been determined, but virtual currency may be included in future NRP projects. In December 2013, IRS established the Virtual Currency Issue Team (VCIT) to study virtual currencies and related compliance issues. According to IRS officials, the VCIT aimed to learn about virtual currencies, educate examiners about them, and develop examination techniques to identify and address virtual currency tax compliance risks. In 2015, the VCIT provided two training lessons for examiners on the terminology, technology, and audit issues related to virtual currencies. The VCIT is made up of about 30 individuals and continues to meet periodically to discuss virtual currency issues. In July 2018, IRS announced the launch of a virtual currency compliance campaign within LB&I to address noncompliance related to individual taxpayers’ use of virtual currency through multiple education and enforcement actions, including outreach and examinations. The goals of the compliance campaign include identifying causes of noncompliance using feedback from examination results, using information to identify additional enforcement approaches to increase compliance and decrease taxpayer burden, and improving examiner knowledge and skills as related to virtual currency transactions. According to IRS officials, the compliance campaign was initiated, in part, to analyze large amounts of data received from third-party sources. As part of the campaign, IRS developed and delivered several online and in-person training classes on blockchain technology and virtual currencies to its examiners and other staff. The trainings included details on how to identify and understand blockchain transactions and provide examiners with information on how to seek additional information from taxpayers about possible virtual currency use. According to LB&I officials, as examiners provide feedback on what new issues they are seeing in cases involving virtual currency, they will schedule follow-up training sessions to address these new issues. LB&I has also reached out to a number of external stakeholder groups to gather information and better understand the tax concerns within the virtual currency community. For example, LB&I and the IRS Office of Chief Counsel have spoken to tax practitioner groups, state tax authorities, IRS Nationwide Tax Forum participants, and tax preparation software companies. According to IRS officials, the discussions they had with tax preparation software companies led to some adding questions to their programs asking taxpayers to enter virtual currency income when preparing their tax returns. The compliance campaign also aims to assist in developing a comprehensive IRS virtual currency strategy. In addition to leading the compliance campaign, LB&I is also leading a working group focused on cryptocurrency that includes members from across IRS, including LB&I, SB/SE, CI, and the Office of Chief Counsel. This working group reports to the IRS Enforcement Committee, which includes the Deputy Commissioner for Services and Enforcement and the commissioners for each of the operating divisions and CI. CI has been assisting in analyzing data received from third-party sources to look for potential investigative leads. According to CI officials, CI first reviews the data to identify any taxpayers who are already targets of CI investigations so that LB&I does not use the information in its civil enforcement efforts. The officials also said that they were reviewing information from large virtual currency users to identify any ties to criminal activity. However, according to IRS officials, since some of the data IRS has received predate a major uptick in virtual currency activity in 2017, the data that predate these developments are less valuable than more recent data would be, other than to understand the history of an individual’s virtual currency usage. IRS has also begun civil enforcement activities to address virtual currency noncompliance as part of the compliance campaign. In April 2019, LB&I was forwarding cases identified as likely involving virtual currency for examination classification, the process IRS uses to determine which returns to select to examine. Due to the time needed to complete examinations and to allow taxpayers time to exercise their rights, IRS officials said they do not have outcome data from these efforts yet. In July 2019, IRS began sending out more than 10,000 letters to taxpayers with virtual currency transactions. These letters stated that IRS is aware that the taxpayer may have a virtual currency account. They instructed the taxpayer to ensure that virtual currency income, gains, and losses have been reported appropriately and to file or amend returns as necessary. The letters also provide taxpayers with information on where they can find resources to help them understand their reporting obligations. According to IRS officials, CI works with a number of federal partners, including FinCEN and the Federal Bureau of Investigation (FBI), among others, in the routine course of its work, which may involve virtual currency issues. According to CI officials, virtual currency does not constitute a new program area that would require a new specific set of policies and procedures. Instead, traditional crimes that CI might investigate may be intertwined with virtual currency use. CI participates in virtual currency issue information sharing efforts through a number of groups. For example, CI is a monthly participant in the FBI’s National Cyber Investigative Joint Task Force, which brings agencies together to share intelligence and work large-scale cases jointly. CI also has agents on site at the National Cyber-Forensics and Training Alliance, a public-private partnership, and at the European Union Agency for Law Enforcement Cooperation. Both entities work on a variety of issues, including virtual currency issues. CI also participates in some multinational information sharing groups to address virtual currency issues as part of its broader criminal enforcement goals. For example, CI participates in the Joint Chiefs of Global Tax Enforcement (J5), a group of criminal intelligence and tax officials from Australia, Canada, the Netherlands, the United Kingdom, and the United States that launched in mid-2018 to focus on shared cross-national tax risks, including cybercrimes and virtual currency. Among the goals of the J5 are to lead the international community in developing a strategic understanding of offshore tax crimes and cybercrimes, and raise international awareness that the J5 are working together to address international and transnational tax crimes. Within the Department of the Treasury (Treasury), IRS works with Treasury’s Office of Tax Policy when developing any guidance or regulation, including for virtual currency. IRS also works with FinCEN with regard to IRS’s delegated authority to administer parts of the Bank Secrecy Act, including Report of Foreign Bank and Financial Accounts (FBAR) filings. For example, FinCEN provides training materials to SB/SE examination staff who may come across virtual currency issues in the performance of a Bank Secrecy Act examination. IRS and FinCEN officials also periodically discuss how to apply the Bank Secrecy Act and its implementing regulations to virtual currency transactions. Given IRS’s unique role in administering the federal tax system, it generally does not need to coordinate with other agencies outside of Treasury in developing or issuing virtual currency guidance or taking civil enforcement actions. According to IRS officials, the work of the virtual currency compliance campaign does not involve any other federal agencies. IRS first issued virtual currency guidance in 2014, in response to our recommendation. In 2013, we found that IRS had not issued guidance specific to virtual currencies and that taxpayers may be unaware that income from transactions using virtual currencies could be taxable. We recommended that IRS provide taxpayers with information on the basic tax reporting requirements for transactions using virtual currencies. In response to this recommendation, IRS issued Notice 2014-21 in March 2014 and published it in the Internal Revenue Bulletin (IRB) in the form of answers to frequently asked questions (FAQs). IRS solicited public input on Notice 2014-21 through several means. Within the notice, IRS requested comments from the public regarding other aspects of virtual currency transactions that should be addressed in future guidance by providing a physical and email address to which comments could be submitted. IRS reviewed more than 200 public comments it received to identify topics that were in need of further guidance. Our analysis of the public comments found that the most common topics concerned tax forms and reporting (64 comments), realization of income (45 comments), cost basis (33 comments), and general tax liability (29 comments). Other topics included the tax implications of hard forks and airdrops, mining, and foreign reporting. Virtual currency stakeholders we spoke with, such as tax practitioners, executives at virtual currency exchanges, advocacy groups, and industry representatives also identified these topics as in need of further guidance. Additionally, LB&I officials said they held several sessions to gather information from external stakeholders, such as tax practitioner groups and state tax authorities, to develop a better understanding of what was happening in taxpayer communities. In October 2019, IRS issued two forms of additional virtual currency guidance, which answered some questions previously raised by the public comments and virtual currency stakeholders. According to IRS, these guidance documents were intended to supplement and expand upon Notice 2014-21. Revenue Ruling 2019-24 addresses the tax treatment of hard forks and airdrops following hard forks. Specifically, the guidance discusses whether taxpayers have gross income as a result of (1) a hard fork, if they do not receive units of a new virtual currency; or (2) an airdrop of a new virtual currency following a hard fork if they receive units of new virtual currency. Additional FAQs provide further examples of how tax principles apply to virtual currency held as a capital asset. Topics addressed include what tax forms to use when reporting ordinary income and capital gains or losses from virtual currency; how to determine fair market value of virtual currencies; when virtual currency use results in taxable income; how to determine cost basis in several scenarios; and when a taxpayer may use the First-In-First-Out accounting method, known as FIFO, to calculate their gains. However, some virtual currency and tax stakeholders with whom we spoke expressed concern that the 2019 revenue ruling and FAQs leave many questions unanswered and provide confusing responses to others. Their concerns include the following: Clarity: According to some stakeholders, Revenue Ruling 2019-24 is unclear, mostly due to confusion surrounding IRS’s usage of technical virtual currency terminology and the situations meant to illustrate IRS’s application of the law to hard forks and airdrops. Several tax and virtual currency stakeholders we spoke with said these examples do not accurately explain how virtual currency technology works and therefore may not be helpful to taxpayers looking for guidance on the tax implications of income received as a result of hard forks or airdrops. In public remarks on the new guidance in October 2019, IRS’s Chief Counsel stated that terms are not used in a uniform way in the virtual currency industry, but IRS is interested in receiving comments on how virtual currency technology should be described. Additional topics in need of guidance: The revenue ruling and additional FAQs do not address several topics raised in the public comments and by stakeholders. For example, the guidance does not clarify foreign asset reporting requirements for virtual currency. The statutory provisions commonly known as the Foreign Account Tax Compliance Act (FATCA) require taxpayers and foreign financial institutions to report on certain financial assets held outside the United States. Regulations implementing the Bank Secrecy Act separately require taxpayers to report certain foreign financial accounts to FinCEN on the FBAR form. Some practitioners told us that it is unclear whether these requirements apply to virtual currency wallets and exchanges, as we discuss later in this report. Other topics not addressed in the 2019 guidance include mining, like-kind exchanges, and retirement accounts. According to an official from the IRS Office of Chief Counsel, IRS’s focus when developing the 2019 guidance was to assist individual taxpayers. Therefore, the topics addressed by the revenue ruling and FAQs were limited to the most common issues that would be applicable to most individual taxpayers. The official told us that if IRS were to develop additional virtual currency guidance in the future, it may focus on a different audience, such as taxpayers involved in virtual currency businesses or exchanges that could be subject to third-party information reporting. Another official stated that issuing guidance on certain topics, including like-kind exchanges, would have taken additional time, and these topics were therefore left unaddressed. IRS issues thousands of publications in a variety of different forms to help taxpayers and their advisors understand the law; however, IRS has stated that only guidance published in the IRB contains IRS’s authoritative interpretation of the law. Unlike with the virtual currency FAQs IRS issued in 2014 in the form of a notice, the 2019 FAQs were not published in the IRB. Therefore, the 2019 FAQs are not binding on IRS, are subject to change, and cannot be relied upon by taxpayers as authoritative or as precedent for their individual facts and circumstances. For FAQs not published in the IRB, tax practitioners have noted that sometimes IRS has included a disclaimer noting that the FAQs do not constitute legal authority and may not be relied upon. The new virtual currency FAQs do not include such a disclaimer. According to IRS officials, they did not include a disclaimer along with the new FAQs because the FAQs do not contain any substantial new interpretation of the law. IRS officials did not feel that a disclaimer about the limitations of the FAQs was necessary or that it would be helpful to taxpayers. However, the FAQs provide new information, such as a definition of the term “cryptocurrency” and an explanation of how taxpayers can track cost basis for virtual currency. As we have previously reported, clarity about the authoritativeness of certain IRS publications could be improved by noting any limitations, especially when FAQs provide information to help taxpayers comply with tax law. Additional explanatory language would help taxpayers understand what type of IRS information is considered authoritative and reliable as precedent for a taxpayer’s individual facts and circumstances. The first article in IRS’s Taxpayer Bill of Rights—“The Right to Be Informed”—states that taxpayers have the right to know what they need to do to comply with tax laws. The article further states that taxpayers are entitled to clear explanations of the laws and IRS procedures in all forms, instructions, publications, notices, and correspondence. As we have previously reported, just as taxpayers have the right to clear explanations in IRS instructions and publications, taxpayers should be alerted to any limitations that could make some IRS information less authoritative than others. Failing to note any limitations associated with particular guidance could lead to misinterpretation of nonauthoritative information from IRS. If taxpayers make decisions based on guidance that is nonauthoritative, including FAQs, those taxpayers’ confidence in IRS and the tax system could be undermined if the content is later updated and IRS challenges taxpayers’ positions. As we have noted in prior reports, taxpayers’ perception that IRS is fairly and uniformly administering the tax system helps further overall voluntary compliance and lowers IRS’s administrative costs. IRS does not receive information returns on some potentially taxable transactions involving virtual currency, which limits its ability to detect noncompliance. Some virtual currency exchanges send information returns to IRS and to customers that provide information about customers’ trading activity, but others do not. Financial institutions and other third parties are to report interest payments, property sales, and other transactions to both taxpayers and IRS using forms known as information returns. Form 1099-K, Payment Card and Third Party Network Transactions. Third parties that contract with a substantial number of unrelated merchants to settle payments between the merchants and their customers are required to issue a Form 1099-K for each merchant that meets the threshold of having more than 200 transactions totaling more than $20,000 in a year. Form 1099-B, Proceeds from Broker and Barter Exchange Transactions. Brokers use Form 1099-B to report transactions such as sales or redemptions of securities, regulated futures contracts, and commodities. For certain types of property, brokers must also report cost basis information on Form 1099-B if the information is required. Form 1099-MISC, Miscellaneous Income. Certain payments made in the course of a trade or business—including rents, prizes, and various other types of income—must be reported by the payer on Form 1099-MISC. For most types of income subject to reporting on Form 1099-MISC, payers must file the form only if they made payments totaling at least $600. According to our review of websites for nine major U.S.-based virtual currency exchanges, as of November 2019, two exchanges have policies posted online stating that they report information for some of their customers’ virtual currency transactions to IRS on Form 1099-K. One exchange states that it reports customers’ transactions on Form 1099-B, a more detailed information return that provides a breakdown of individual virtual currency transactions. Another exchange’s website states that it provides Forms 1099, but does not identify the form more specifically. Three exchanges’ websites have policies stating that the exchanges do not report customers’ transactions on tax forms. The remaining two exchanges do not state on their websites whether or not they file information returns or provide customers with tax forms. When transactions handled by third parties, such as virtual currency exchanges, go unreported on information returns, it is difficult for IRS to identify and address compliance risks. According to IRS officials and tax practitioners we interviewed, it is difficult for IRS to find out when taxable transactions involving virtual currency are occurring. As discussed earlier in this report, IRS’s virtual currency compliance campaign has identified more than 10,000 taxpayers who may not have properly reported virtual currency transactions on tax returns. However, the campaign likely has not identified all taxpayers with underreported virtual currency income. In addition, according to IRS officials, examining tax returns is more resource intensive than the automated processes IRS uses to match tax returns against information returns. For taxpayers, limited information reporting by third parties can make it difficult to complete tax returns. Tax practitioners told us that recordkeeping is a challenge for taxpayers who buy and sell virtual currencies. To report virtual currency income accurately under IRS guidance, taxpayers need to report information about each transaction, including cost basis and fair market value at the time virtual currency is disposed of, such as by selling it for cash or another virtual currency on an exchange. Some taxpayers may not keep their own records of virtual currency transactions, and as a result may lack easy access to the information that would be provided in third-party information returns. When taxpayers do keep these records, they may not know how to report virtual currency transactions on tax forms. As discussed earlier in this report, 64 of the public comments IRS received on Notice 2014-21 were about forms and reporting. For example, some of these 64 comments expressed uncertainty about how to calculate the fair market value of virtual currency at the time of sale; others requested assistance in determining which tax forms to use to report income from virtual currency transactions. Some virtual currency transactions are not subject to third-party reporting requirements. For example, unless owned by a U.S. payor (including a controlled foreign corporation), virtual currency exchanges operating outside the United States are not required to file information returns such as Forms 1099-K or 1099-B unless the customer or transaction has certain connections to the United States. Some transactions, such as transferring virtual currency directly to a merchant in exchange for goods, generally create no obligation to file any information returns. Other virtual currency transactions, such as sales of virtual currency for cash through virtual currency exchanges, may be subject to third-party reporting requirements. However, those requirements are not entirely clear, and people have interpreted them differently. Tax practitioners we spoke with generally stated that it is not clear whether current regulations require virtual currency exchanges to report customers’ trading activity on Forms 1099-K or 1099-B. According to IRS officials, virtual currency exchanges may be subject to the 1099-K reporting requirement if they fall into the legal category of “third party settlement organizations.” Exchanges are subject to the 1099-B requirement only if they are brokers or barter exchanges. IRS does not have an official position on whether virtual currency exchanges are required to report customers’ trading activity on Form 1099-B. There may also be ambiguity regarding when, if at all, reporting on virtual currency sales is required on Form 1099-MISC. Furthermore, even if exchanges are subject to the 1099-K, 1099-B, or 1099-MISC reporting requirements, these requirements do not cover all taxable transactions. Third-party settlement organizations are required to file Form 1099-K only for customers who make more than 200 transactions in a year that total more than $20,000. Taxable transactions below that threshold may not be reported. Separately, some transactions carried out by brokers do not need to be reported on Form 1099-B unless they involve cash. For example, taxpayers must report trades between different virtual currencies on tax returns, but brokers may not be required to report such trades on Form 1099-B. According to IRS, a virtual currency exchange would be required to file Form 1099-MISC if it has sufficient information, such as the recipient’s basis in the virtual currency, to determine whether a payment made to a recipient in exchange for virtual currency gives rise to income for that recipient. In addition, Forms 1099-K, 1099-B, and 1099-MISC do not always contain all the information that taxpayers need to file accurate tax returns or that IRS needs to monitor compliance. Form 1099-K provides information on the number and gross amount of payments made to the recipient, but does not provide information about individual transactions. Some tax practitioners we interviewed stated that taxpayers who receive Form 1099-K for virtual currency transactions may find the form unhelpful or confusing. Because the form does not identify specific transactions, it may be difficult to match the aggregate amounts reported on the form with taxpayers’ own records of virtual currency transactions. Form 1099-B does provide information about individual transactions, but does not always include or require cost basis information. According to IRS, a Form 1099-MISC that reports a payee’s gain does not provide information about that payee’s gross proceeds and basis. Some stakeholders we interviewed mentioned challenges that could make it difficult to implement information reporting at the individual transaction level. For example, it could be difficult to distinguish between taxable dispositions of virtual currency—such as the sale of virtual currency for U.S. dollars—and nontaxable events such as the transfer of virtual currency from a taxpayer’s account on an exchange to a personal wallet controlled directly by the same taxpayer. These stakeholders also told us that if exchanges were required to report cost basis information, additional challenges could include tracking the cost basis of virtual currency transferred between exchanges. However, as we have previously reported, cost basis reporting can be particularly valuable for tax compliance. IRS officials told us that they are studying the issue of third-party information reporting, and it is included in IRS’s priority guidance plan as of October 2019. We have reported that, in general, the extent to which taxpayers accurately report their income is closely aligned with the amount of income that third parties report to them and to IRS. For example, according to IRS data for tax years 2011-2013, taxpayers misreported more than half of their income for types of income subject to little or no third-party information reporting (see figure 4). Taxpayers misreported a much lower percentage of their income for types of income subject to at least some information reporting. Information returns that include details about individual transactions can assist taxpayers by providing information about how to report virtual currency income correctly. For example, in addition to providing transaction details, Form 1099-B instructs recipients where to report transactions on Form 8949 or Schedule D, which are forms used to report capital gains. By contrast, Form 1099-K does not include similar instructions. One of IRS’s strategic goals is to protect the integrity of the tax system by encouraging compliance through administering and enforcing the tax code. This goal includes identifying and planning for compliance risks proactively, including risks associated with the increasing complexity of the tax base. Further, internal control standards state that management should use quality information to achieve the entity’s objectives. Using quality information requires identifying information requirements and obtaining relevant data from reliable sources. As discussed above, IRS does not have quality information on many potentially taxable transactions involving virtual currency, in part because information reporting requirements for virtual currency exchanges are unclear, and in part because some information reporting does not include detailed information about specific transactions. As a result, some taxpayers may not be reporting virtual currency transactions properly on their tax returns or paying the full amount of tax owed on those transactions, contributing to the tax gap. As previously discussed, two overlapping reporting requirements apply to taxpayers who have foreign financial assets. These two requirements are the Report of Foreign Bank and Financial Accounts (FBAR) filings required under the Bank Secrecy Act and the separate reports required by the statutory provisions commonly known as the Foreign Account Tax Compliance Act (FATCA). The federal agencies that administer these requirements have not clarified how taxpayers who hold virtual currency should interpret them. Under FATCA, taxpayers have an obligation to report certain foreign financial accounts and other assets on IRS Form 8938, Statement of Specified Foreign Financial Assets, if the value of those assets exceeds a certain amount. FATCA was enacted in 2010 to reduce offshore tax evasion, and it also requires foreign financial institutions to report detailed information to IRS about their U.S. customers. Tax practitioners we interviewed told us that there is no generally accepted view about whether FATCA filing requirements apply to virtual currency holdings, and IRS has not publicly stated a position on how, if at all, FATCA requirements apply to virtual currency holdings for either taxpayers or institutions. Some practitioners stated that in the absence of guidance or information from IRS specifically addressing virtual currency and FATCA, some of their clients report foreign virtual currency accounts because the potential penalties for failing to report, if deemed to be required, are high. Additionally, several public comments on IRS Notice 2014-21 requested clarification from IRS about whether virtual currency holdings must be reported under FATCA. The FATCA filing requirements can be difficult for individual taxpayers to interpret, in part because FATCA was enacted before the use of virtual currency became more widespread, and it was not designed to cover nontraditional assets such as virtual currencies. For example, under FATCA, taxpayers must report accounts at foreign financial institutions. A taxpayer who holds virtual currency with an exchange based outside the United States may not know whether the exchange counts as a foreign financial institution under FATCA because this determination involves applying legal criteria to specific facts about how the exchange operates. Taxpayers must also report foreign nonaccount assets held for investment (as opposed to held for use in a trade or business), such as foreign stock and securities, foreign financial instruments, contracts with non-U.S. persons, and interests in foreign entities. IRS officials told us that in some situations, virtual currencies could be foreign nonaccount assets, depending on specific facts about how an individual taxpayer holds the virtual currency. However, a taxpayer holding virtual currency may not know whether the virtual currency is considered a specified foreign financial asset because this determination involves applying legal criteria to specific facts such as whether the virtual currency has a foreign issuer, which the taxpayer may not have sufficient information to determine. According to IRS officials, they have not issued guidance about virtual currency and FATCA because the instructions for Form 8938 clearly explain how taxpayers are to interpret FATCA requirements. However, those instructions do not mention virtual currency and do not provide information needed to determine whether virtual currency holdings must be reported. For example, the instructions state that a financial account is any depository or custodial account maintained by a foreign financial institution, but do not explain under what circumstances, if any, an account that holds virtual currency could be considered a depository or custodial account. IRS’s Taxpayer Bill of Rights states that taxpayers are entitled to clear explanations of the laws and IRS procedures in all tax forms, instructions, publications, notices, and correspondence. Furthermore, one of IRS’s strategic goals is to empower taxpayers by making it easier for them to understand and meet their filing, reporting, and payment obligations. Without information about how to interpret and apply FATCA requirements to situations involving virtual currency, taxpayers will not know whether they are required to report virtual currency held outside the United States. As a result, they may be underreporting, depriving IRS of data needed to address offshore tax evasion, or overreporting by filing forms that are not required. As we have previously reported, such overreporting creates unnecessary burdens, including financial costs, for taxpayers. Separate from the requirement to file Form 8938 under FATCA, regulations implementing the Bank Secrecy Act require reporting of financial accounts maintained with financial institutions located outside the United States on the FBAR form. FinCEN’s FBAR regulations predate the widespread use of virtual currency and do not specifically mention virtual currency. Consequently, tax practitioners have raised questions about whether taxpayers are required to include virtual currency holdings in FBAR filings. In correspondence and interviews, FinCEN officials have stated that, based on their understanding of the regulations, virtual currency does not need to be reported on the FBAR. For example, FinCEN officials told us that FinCEN provides a standard response when members of the public ask FinCEN’s Resource Center about reporting virtual currency on the FBAR. The response states, in part, “as of right now, reporting [virtual currency exchange accounts] on the FBAR is not required.” Likewise, in March 2019, FinCEN responded in writing to a question from the American Institute of Certified Public Accountants by stating that the FBAR regulations do not define virtual currency held in an offshore account as a type of reportable account. While FinCEN has provided responses to direct questions, it has not made information about whether foreign virtual currency accounts are subject to the FBAR requirement readily available, such as by posting this information on its website. FinCEN officials stated that FinCEN and IRS had issued a statement on IRS’s website in 2014 informing the public that virtual currencies did not need to be reported on the FBAR. However, the officials noted that the statement was no longer available on the website, but they did not say when it may have been removed or why. Neither IRS’s FBAR Reference Guide nor FinCEN’s instructions for filing the FBAR mention virtual currencies. Internal control standards state that management should externally communicate the necessary quality information to achieve the entity’s objectives. As part of this standard, management should communicate information that allows external parties, including the general public, to assist the entity in achieving its objectives. In the absence of a readily available official statement from FinCEN that virtual currencies are not reportable on the FBAR, users of virtual currency may be filing reports that are not legally required. According to some tax practitioners we interviewed, some individuals may report foreign virtual currency accounts on the FBAR even if they believe it is unlikely that they are required to report, because of the high penalties for failing to file required FBARs. Such filings can create financial costs and unnecessary recordkeeping and other burdens for these individuals. Virtual currencies can present challenges for enforcement of tax laws, both because they can be circulated without a central authority and because complying with current tax requirements can be confusing and burdensome. IRS has taken important steps to address these challenges, including issuing multiple sets of guidance to clarify how virtual currencies would be treated for tax purposes and carrying out a range of enforcement activities to address noncompliance. Although IRS’s 2019 virtual currency guidance addressed some issues left unresolved by its 2014 guidance, it did not address others, and it has also prompted new concerns among virtual currency stakeholders. Additionally, including information that the 2019 FAQs are not legally binding would enhance taxpayer understanding and could ultimately help enhance taxpayers’ confidence in IRS and the tax system. Currently, much trading activity in virtual currency goes unreported on information returns. In part, this lack of reporting may be because third parties are unclear about whether they are required to report. Limitations in what information returns report related to virtual currencies also constrain the utility of reported information. In general, information reporting is associated with high levels of compliance. Additionally, the rules for foreign asset reporting—specifically, the FBARs required by the Bank Secrecy Act and the separate reports required by FATCA—do not clearly address virtual currency, and tax professionals have raised questions about the applicability of these requirements to virtual currency. Clarifying the FATCA requirements and making a statement about the FBAR requirements readily available to the public would help reduce uncertainty about these rules and may result in reduced burden for some taxpayers who may be filing reports that are not required. We are making a total of four recommendations, including three to IRS and one to FinCEN. Specifically, The Commissioner of Internal Revenue should update the FAQs issued in 2019 to include a statement that the FAQs may serve as a source of general information but cannot be relied upon by taxpayers as authoritative since they are not binding on IRS. (Recommendation 1) The Commissioner of Internal Revenue should take steps to increase third-party reporting on taxable transactions involving virtual currency, which could include clarifying IRS’s interpretation of existing third-party reporting requirements under the Internal Revenue Code and Treasury Regulations, or pursuing statutory or regulatory changes. (Recommendation 2) The Commissioner of Internal Revenue should clarify the application of reporting requirements under FATCA to virtual currency. (Recommendation 3) The Director of FinCEN, in coordination with IRS as appropriate, should make a statement about the application of foreign account reporting requirements under the Bank Secrecy Act to virtual currency readily available to the public. (Recommendation 4) We provided a draft of this report to IRS, FinCEN, Treasury, SEC, and CFTC for review and comment. In its written comments, which are summarized below and reproduced in appendix II, IRS agreed with one and disagreed with two of the recommendations directed to it. In its written comments, which are summarized below and reproduced in appendix III, FinCEN agreed with the recommendation directed to it. IRS, Treasury, SEC, and CFTC provided technical comments, which we incorporated as appropriate. IRS agreed with the recommendation to take steps to increase third-party reporting on taxable transactions involving virtual currency (recommendation 2). IRS stated that it is working with Treasury to develop guidance on third-party reporting under section 6045 of the Internal Revenue Code for certain taxable transactions involving virtual currency. Such guidance, if it aims to increase third-party reporting, would address the intent of the recommendation. IRS disagreed with the recommendation to add a statement to the 2019 FAQs on virtual currency informing taxpayers that the FAQs provide general information but are not binding on IRS (recommendation 1). IRS stated that the FAQs are illustrative of how longstanding tax principles apply to property transactions. IRS also stated that IRS does not take positions contrary to public FAQs. We continue to believe that including such a statement would provide more transparency and help taxpayers understand the nature of the information provided in the FAQs. As we state earlier in this report, IRS has included disclaimer statements in other informal FAQs posted on its website. IRS could include a similar statement in the virtual currency FAQs at minimal cost. Alternatively, if IRS intends to be bound by the positions it takes in the current version of the virtual currency FAQs, as the response to this recommendation suggests, it could publish the FAQs in the Internal Revenue Bulletin. Doing so would render a disclaimer statement unnecessary and would satisfy the intent of the recommendation. IRS disagreed with the recommendation to clarify the application of FATCA reporting requirements to virtual currency (recommendation 3). IRS stated that U.S. exchanges and other U.S. businesses play a significant role in virtual currency transactions carried out by U.S. taxpayers, and therefore it is appropriate for IRS to focus on developing guidance for third-party reporting under section 6045, as discussed above. IRS also stated that guidance on FATCA may be appropriate in the future when the workings of foreign virtual currency exchanges become more transparent. We believe that, given the widespread uncertainty about the FATCA requirements among virtual currency stakeholders, it would benefit taxpayers for IRS to clarify these requirements to the extent possible with the information currently available. It may be appropriate to wait for future developments in the foreign virtual currency exchange industry before issuing detailed, thorough guidance on this issue. However, IRS could address the uncertainty about the FATCA requirements by clarifying in general terms how it believes they should be interpreted in situations involving virtual currency. In its comments, FinCEN agreed with the recommendation to make a public statement about whether virtual currency must be reported on the FBAR (recommendation 4). FinCEN confirmed in its letter that as of January 2020, its regulations do not require virtual currency held in an offshore account to be reported on the FBAR. Additionally, FinCEN stated that it will coordinate with IRS to determine the best approach to provide clarity to the public regarding the FBAR requirement. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of the Treasury, the Commissioner of Internal Revenue, the Director of the Financial Crimes Enforcement Network, the Chairman of the Securities and Exchange Commission, the Chairman of the Commodity Futures Trading Commission, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9110 or mctiguej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives were to (1) describe what is known about virtual currency tax compliance; (2) describe the steps the Internal Revenue Service (IRS) has taken to address virtual currency tax compliance risks; (3) evaluate the extent to which IRS’s virtual currency guidance meets taxpayer needs; and (4) evaluate whether additional information reporting could assist IRS in ensuring compliance. To describe what is known about virtual currency tax compliance and the steps IRS has taken to address virtual currency tax compliance risks, we reviewed IRS documentation on the agency’s virtual currency tax enforcement efforts, including information about the legal summons IRS issued to Coinbase and the Large Business and International (LB&I) division’s virtual currency compliance campaign. We interviewed IRS officials in the Small Business/Self Employed (SB/SE) and LB&I operating divisions, as well as the Research, Applied Analytics, and Statistics division about any data the agency had on virtual currency tax compliance, challenges in collecting such data, and plans for data analyses. We also reviewed IRS forms that taxpayers may use to report virtual currency use. We interviewed officials from the Financial Crimes Enforcement Network, Commodity Futures Trading Commission, and Securities and Exchange Commission about coordination efforts that have been made across agencies regulating virtual currencies. We also interviewed tax practitioners, tax attorneys, virtual currency industry advocates, and virtual currency exchange executives about virtual currency tax compliance issues. We took a snowball sampling approach to identify the outside stakeholders we interviewed, which involved asking stakeholders we interviewed for recommendations of others we should contact to gain additional insight into virtual currency tax compliance, and we assessed their qualifications and independence. In total, we interviewed five individual stakeholders in addition to representatives of 10 entities with expertise in tax issues related to virtual currency. Although results from these interviews are not generalizable, they provide insight into what is known about tax compliance and the steps IRS has taken to address virtual currency tax compliance risks. To evaluate the extent to which IRS’s virtual currency guidance meets taxpayer needs, we identified and analyzed all of the guidance and statements IRS has published about tax compliance for virtual currencies. To identify these documents, we searched IRS’s website and interviewed IRS officials. According to IRS officials, Notice 2014-21, issued in March 2014, and Revenue Ruling 2019-24 and Frequently Asked Questions (FAQs), issued in October 2019, are the only IRS guidance specific to virtual currencies. We also reviewed and analyzed all of the public comments IRS had received on Notice 2014-21 as of August 19, 2019, to determine the concerns raised about virtual currency tax compliance. IRS sent us 229 public comments. We identified 25 of the comments as not applicable because they were not related to Notice 2014-21, were duplicate comments, or were otherwise not relevant. Two reviewers coded the content of the 204 applicable public comments and grouped them into 13 different thematic categories. We developed these categories based on the topics or issues that commenters identified. We assigned each separate issue raised by a comment to an existing category unless it did not relate to any of the existing categories, in which case we created a new category. We also recorded the date the comment was submitted and the occupation of the commenter, if specified in the comment. To assess the reliability of these data, we reviewed relevant documentation and consulted knowledgeable IRS officials. Specifically, we requested information from IRS’s Office of Chief Counsel to identify the quality controls in place to help ensure all comments are processed. We determined that the data were sufficiently reliable for our purposes. The information we obtained from these comments may not be representative of the viewpoints of the entire U.S. public. In addition, we interviewed the stakeholders mentioned above before IRS released new guidance in October 2019 to identify any taxpayer concerns, any compliance challenges with virtual currency tax obligations, and the extent to which the guidance provided in IRS’s Notice 2014-21 was meeting taxpayer needs. We reached out to these same stakeholders in October 2019, after IRS issued a new set of FAQs and Revenue Ruling 2019-24, to determine how these new guidance documents addressed taxpayers’ concerns. Of the five individuals and 10 groups we initially interviewed, we received responses regarding the new IRS guidance from four individuals and six groups. The information we obtained from these practitioners and exchanges is not generalizable to all practitioners and exchanges because we took a snowball sampling approach, but the information provides insight into the extent to which IRS’s virtual currency guidance is meeting the needs of taxpayers. To evaluate whether additional information reporting could assist IRS in ensuring compliance, we reviewed IRS’s requirements for information reporting for virtual currency transactions, including the laws and regulations for foreign asset reporting. We interviewed IRS officials in the SB/SE and LB&I operating divisions about how IRS’s third-party and taxpayer information reporting processes and current forms assist in IRS’s work to detect noncompliance for virtual currencies. We reviewed the websites of a judgmental selection of nine virtual currency exchanges for policies or statements about tax reporting, including whether the exchanges file Forms 1099-B or 1099-K. For the website review, we selected virtual currency exchanges that were based in the United States and that were likely, because of their size or public profile within the virtual currency industry, to have established policies regarding information reporting. For each exchange, we identified and categorized any statements on the exchange’s website regarding tax or information reporting, such as a statement that the exchange does not provide any tax forms to customers or a statement that the exchange provides information on a specific form to customers and IRS. We also interviewed the stakeholders mentioned above to determine what information is being reported to IRS and whether additional information reporting would help IRS and taxpayers with ensuring tax compliance. We interviewed executives from two exchanges to determine what burden, if any, information reporting does or could impose on exchanges and virtual currency users. We attempted to contact four additional exchanges but did not receive a response. Because we used a snowball sampling approach, the information we obtained from these virtual currency industry participants is not generalizable to all virtual currency industry participants. We conducted this performance audit from October 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jeff Arkin (Assistant Director), Danielle Novak (Analyst-in-Charge), Theodore Alexander, Michael Bechetti, David Blanding, Jacqueline Chapin, Ed Nannenhorn, Bruna Oliveira, Kayla Robinson, and Andrew J. Stephens made key contributions to this report.", "summary": "Virtual currencies, such as bitcoin, have grown in popularity in recent years. Individuals and businesses use virtual currencies as investments and to pay for goods and services. GAO was asked to review IRS's efforts to ensure compliance with tax obligations for virtual currencies. This report examines (1) what is known about virtual currency tax compliance; (2) what IRS has done to address virtual currency tax compliance risks; (3) the extent to which IRS's virtual currency guidance meets taxpayer needs; and (4) whether additional information reporting on virtual currency income could assist IRS in ensuring compliance. GAO reviewed IRS forms and guidance and interviewed officials at IRS, FinCEN, and other federal agencies, as well as tax and virtual currency stakeholders. Taxpayers are required to report and pay taxes on income from virtual currency use, but the Internal Revenue Service (IRS) has limited data on tax compliance for virtual currencies. Tax forms, including the information returns filed by third parties such as financial institutions, generally do not require filers to indicate whether the income or transactions they report involved virtual currency. IRS also has taken some steps to address virtual currency compliance risks, including launching a virtual currency compliance campaign in 2018 and working with other agencies on criminal investigations. In July 2019, IRS began sending out more than 10,000 letters to taxpayers with virtual currency activity informing them about their potential tax obligations. IRS's virtual currency guidance, issued in 2014 and 2019, addresses some questions taxpayers and practitioners have raised. For example, it states that virtual currency is treated as property for tax purposes and that using virtual currency can produce taxable capital gains. However, part of the 2019 guidance is not authoritative because it was not published in the Internal Revenue Bulletin (IRB). IRS has stated that only guidance published in the IRB is IRS's authoritative interpretation of the law. IRS did not make clear to taxpayers that this part of the guidance is not authoritative and is subject to change. Information reporting by third parties, such as financial institutions, on virtual currency is limited, making it difficult for taxpayers to comply and for IRS to address tax compliance risks. Many virtual currency transactions likely go unreported to IRS on information returns, due in part to unclear requirements and reporting thresholds that limit the number of virtual currency users subject to third-party reporting. Taking steps to increase reporting could help IRS provide taxpayers useful information for completing tax returns and give IRS an additional tool to address noncompliance. Further, IRS and the Financial Crimes Enforcement Network (FinCEN) have not clearly and publicly explained when, if at all, requirements for reporting financial assets held in foreign countries apply to virtual currencies. Clarifying and providing publicly available information about those requirements could improve the data available for tax enforcement and make it less likely that taxpayers will file reports that are not legally required. GAO is recommending that IRS clarify that part of the 2019 guidance is not authoritative and take steps to increase information reporting, and that FinCEN and IRS address how foreign asset reporting laws apply to virtual currency. IRS agreed with the recommendation on information reporting and disagreed with the other two, stating that a disclaimer statement is unnecessary and that it is premature to address virtual currency foreign reporting. GAO believes a disclaimer would increase transparency and that IRS can clarify foreign reporting without waiting for future developments in the industry. FinCEN agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "Under T-2017, DHA reduced the number of TRICARE regions by merging the North and South regions to form the East region, which has approximately 6 million beneficiaries, while the West region remained the same with approximately 3.4 million beneficiaries (see figure 1). In July 2016, DHA awarded the East region contract to Humana Government Business, the incumbent South region contractor, and the West region contract to Health Net Federal Services, the incumbent North region contractor. The T-2017 contracts include five 1-year performance periods and are scheduled to expire on December 31, 2022. As a result of the changes in regional structure, the T-2017 contract transition included a transition from Health Net Federal Services (North region) and Humana Government Business (South region) to Humana Government Business in the East region as well as a transition from UnitedHealth Military & Veterans to Health Net Federal Services in the West Region. The start of the T-2017 transition was initially planned for August 2016, with a health care delivery start date of August 2017. However, due to bid protests filed against each contract, the transition start date was pushed out to January 1, 2017 with a health care delivery start date of October 1, 2017. To manage the T-2017 transition, DHA assigned individuals to lead the transition in each region, who were responsible for coordinating all major transition activities. The transition leads were supported by other staff, including contracting officers, contracting officer representatives, and subject matter experts. In addition, DHA established an organizational structure comprised of several groups to oversee the T-2017 transition from day-to-day oversight to leadership updates. The TRICARE Operations Manual, which is part of the managed care support contract, establishes transition guidance that includes requirements for both the incoming and outgoing contractors. The T- 2017 transition guidance focused on the incoming contractors’ readiness to perform in seven critical areas: (1) provider network, (2) referral management, (3) enrollment, (4) medical management, (5) claims processing, (6) customer service, and (7) management. For the T-2017 transition, DHA introduced two new oversight methods to ensure contractors’ readiness in the seven critical areas prior to the start of health care delivery. These methods and other guidance are outlined in the TRICARE Operations Manual and T-2017 contracts. The performance readiness validation (PRV) and performance readiness assessment and verification (PRAV)—referred to as PRV/PRAV—tested contractors’ functionality in the seven critical areas outlined in the TRICARE Operations Manual. For the PRV, contractors validated their own readiness for specific requirements within each area. For example, the contractor had to validate that it had a complete provider directory online and operational 60 days prior to the start of health care delivery at a 95 percent accuracy rate. The number of requirements varied by critical area. For the PRAV, DHA subsequently assessed and verified contractors’ validation prior to the start of health care delivery. DHA also established financial penalties—referred to as transition performance guarantees—for five of the seven critical areas. The T- 2017 contracts specify that if a contractor does not meet a transition- in requirement in any one of these five areas, DHA will assess a financial penalty (see table 1). In December 2016—prior to the start of the transition—DHA held transition specification meetings with the incoming and outgoing contractors to begin planning critical T-2017 transition activities. The incoming contractors were also required to provide DHA with an integrated master plan and an integrated master schedule outlining processes and specific steps for the transition as well as a risk management plan that identified risks to the successful execution of the contractor’s schedule. Contractors were required to provide weekly updates to DHA on the status of their transition schedule progress. In April 2018—several months after the transition had ended—DHA produced an “after action” report to identify best practices, lessons learned, and recommendations to improve future TRICARE contract transitions. DHA is currently in the process of developing its fifth generation of contracts, referred to as the T-5 contracts. As required by the NDAA 2017, DHA established a new preferred provider benefit option called TRICARE Select and terminated the TRICARE Standard and Extra benefit options by January 1, 2018. Prior to 2018, beneficiaries primarily had a choice between three basic options— TRICARE Prime (a managed care option), TRICARE Standard (a fee-for- service option), or TRICARE Extra (a preferred provider organization option). The TRICARE Standard and Extra options did not require beneficiaries to enroll. However, beneficiaries who choose the TRICARE Select option must enroll during an annual open enrollment period or within 90 days of experiencing a qualifying life event. Beneficiary cost sharing responsibilities were also modified for the new benefit option. The implementation of TRICARE Select delayed timeframes for the T- 2017 transition and was the primary challenge of the T-2017 transition, according to DHA and contractor officials. Because the T-2017 contracts were awarded prior to the enactment of the NDAA 2017, DHA had to incorporate TRICARE Select requirements into the ongoing T-2017 transition process, including developing updated guidance for contractors. As a result of the time needed to plan for and implement a new benefit, DHA delayed timeframes for the following key transition activities. DHA postponed the start of health care delivery by 3 months. DHA moved the start of health care delivery from October 1, 2017 to January 1, 2018 (see fig. 2). According to DHA officials, DHA made this change to align the start of health care delivery with the implementation of TRICARE Select to minimize the impact that two, successive changes could have had on the continuity of care for beneficiaries. On March 30, 2017—three months into the transition— DHA sent a letter to the contractors informing them of this decision. DHA also directed its incoming contractors to submit modified transition schedules and risk management plans. DHA had to delay the start of a planned enrollment freeze and lengthen its duration. According to DHA officials, in a typical transition, DMDC requires 3 to 4 days to make adjustments to beneficiaries’ records in the Defense Enrollment Eligibility Reporting System, including assigning beneficiaries to incoming contractors and regions for the T-2017 contracts. During this time, which is referred to as an enrollment freeze, contractors cannot access this system to process any enrollments. For the T-2017 transition, DHA and DMDC officials stated that, given the termination of two benefit options and the new enrollment requirements for TRICARE Select, DMDC needed additional time to adjust every beneficiary enrollment record (over 9 million). Therefore, DHA delayed the start of the T-2017 enrollment freeze from August to December 2017 and increased its duration from 3 to 4 days to 19 days—December 1-19, 2017 (see fig. 2). Contractors had less time to process enrollments and make other system changes. Once an enrollment freeze has ended, incoming and outgoing contractors have a designated period of time, referred to as a dual operations period, to process beneficiaries’ enrollments and make other systems changes, such as assigning Prime beneficiaries to a primary care manager (PCM). Due to the extended enrollment freeze, contractors had a shorter dual operations period—less than 2 weeks in December 2017 rather than 6 to 8 weeks beginning in August 2017 (see fig. 2). According to contractors, the shorter dual operations period for T-2017 transition contributed to a backlog of enrollment requests and PCM assignments that they were unable to process prior to the start of health care delivery. To mitigate the financial effect on beneficiaries, DHA issued point of service waivers and waived referral requirements for TRICARE Prime enrollees for both regions and provided an enrollment grace period for beneficiaries so they did not have to pay higher copayments for receiving care from non-network providers or care that was not referred by a PCM. DHA’s communications to TRICARE beneficiaries were delayed. TRICARE Select complicated and delayed DHA’s communications to beneficiaries about TRICARE program changes, which led to customer service problems after the start of health care delivery. DHA engaged in various efforts to inform beneficiaries of the new changes, such as through website updates, blog posts, and direct mailings. However, DHA’s “after action” report acknowledged that on multiple occasions its communication division posted incorrect information on its website because of changing policy language. In addition, DHA planned to send a direct mailing to beneficiaries to inform them of TRICARE program changes in October 2017. However, DHA and DMDC officials told us that this date was delayed due to the additional time needed to prepare for TRICARE Select. As a result, DHA mailed information to beneficiaries starting in December 2017, and some beneficiaries did not receive this mailing until after the start of health care delivery, according to DHA. An organization representing TRICARE beneficiaries told us that some beneficiaries were unaware of the various benefit changes that went into effect on January 1, 2018 because of inadequate communication from DHA. Contractors also told us that the delayed communication to beneficiaries contributed to the high volume of customer service calls they received after the start of health care delivery. DHA officials told us that they took several steps to minimize the risks these delays and the implementation of TRICARE Select created, including the use of various transition oversight meetings to discuss and track related challenges. For example, the regional transition management staff participated in a monthly Risk Review Board meeting to discuss concerns related to the schedule of transition activities, such as the impact of TRICARE Select on the time needed for performance testing in critical areas. DHA also discussed transition risks related to TRICARE Select during weekly meetings with contractors throughout the transition. Furthermore, in August 2017, DHA hosted an Enrollment Summit for all stakeholders involved with the transition and implementation of TRICARE Select, where they discussed the schedule of transition steps and the coordination needed to implement the interrelated T-2017 and NDAA 2017 requirements. In addition, DHA kept contractors informed about TRICARE Select as they developed the related policies. Beginning in June 2017, DHA provided contractors with draft guidance on the new benefit to keep them informed of potential changes and obtain their feedback. According to DHA, this also allowed contractors to plan for and begin implementing the program changes they would be required to make once the policies were finalized. DHA issued the final TRICARE Select policies to its contractors in late October 2017, which left contractors with less than 3 months to implement the finalized changes prior to the start of health care delivery on January 1, 2018. According to DHA officials and contractors, contractors ideally would have had the final TRICARE policies at the start of the 9-to-12 month transition period. During the T-2017 transition, outgoing and incoming contractors had disagreements over data transfers. According to DHA officials and contractors, DHA’s transition guidance to contractors was not always specific or accurate regarding the amount and type of data to be shared, as well as how these data should be transferred. Furthermore, according to contractors, DHA did not always resolve contractors’ guidance-related disagreements in a timely manner. Contractors said this contributed to delays in implementing some transition steps and problems after the start of health care delivery. DHA faced challenges related to the following data transfer issues: Referral and authorization data. The contractors in the West region disagreed on how many years of historical referral and authorization data the outgoing contractor would provide the incoming contractor because this was not specified in the guidance, according to the contractors and DHA’s contracting officers. While the contractors in the East region mutually agreed on the years of data to transfer, the West region contractors did not. As a result, the incoming West region contractor reached out to DHA for resolution on August 2, 2017 by letter, and continued to discuss it with DHA officials during weekly meetings, as documented in meeting minutes we reviewed. However, DHA did not address the issue until December 12, 2017, at which point DHA rejected the incoming contractor’s request for additional historical data because the outgoing contractor would not have enough time to provide it by the start of health care delivery on January 1, 2018. The incoming contractor reported that not receiving the anticipated historical referral information contributed to several problems related to referrals after the start of health care delivery. First, it contributed to delays in processing referrals within timeliness standards. Second, the lack of data made it difficult for contractors to help MTFs address customer referral inquiries, which negatively affected the contractor’s relationship with MTFs. Finally, the contractor had limited ability to resolve beneficiaries’ customer service questions related to referrals and had to reissue authorizations for some referrals. Claims data. The incoming and outgoing West region contractors also disagreed on which elements of claims data needed to be transferred. For example, the incoming contractor requested information from the claims notes section, which the outgoing contractor stated contained some proprietary information. According to the incoming contractor, this section typically contains information important for claims processing, such as medical necessity reviews— medical record reviews to determine that health care services are appropriate for payment. When the outgoing contractor refused to provide the claims notes, the incoming contractor raised the issue several times to DHA during weekly meetings and through letters, as documented in meeting minutes and correspondence we reviewed. However, DHA determined that the outgoing contractor did not need to provide the information requested, as the non-proprietary information was available in other claims data sections. According to the incoming contractor, without access to more detailed historical information from the claims notes, there were instances in which they were unable to adjust payment determinations for certain claims paid prior to transition, which resulted in provider and beneficiary dissatisfaction. Beneficiary payment information. The incoming contractors faced challenges obtaining payment information for TRICARE beneficiaries who paid their health insurance premiums using credit cards or electronic funds transfers. According to a contracting officer, DHA initially directed the outgoing contractor to transfer beneficiary payment data to the incoming contractor. However, the outgoing contractors told us that they were unable to transfer this data due to banking laws and proprietary information security standards. DHA agreed that the outgoing contractors could not legally transfer this information and resolved the problem by requiring incoming contractors to reach out directly to beneficiaries to obtain the payment information. According to incoming contractor officials, this created additional, unanticipated effort, since they had to contact beneficiaries for this information directly, which diverted transition resources, such as enrollment staff, away from ongoing transition activities. In addition, contractors reported that this put certain TRICARE plan beneficiaries at risk since those who did not resubmit their payment information risked disenrollment and gaps in health care coverage. The contractors and DHA made attempts to notify affected beneficiaries that they needed to contact the contractor to reestablish their automated premium payments. However, approximately 224,000 beneficiaries’ credit card or electronic funds transfer enrollments for premium payments did not continue after January 1, 2018. To give beneficiaries more time to provide this information, DHA provided a 150-day grace period for premium payments. Still, certain beneficiaries were disenrolled from TRICARE plans for failure to establish a recurring form of payment. For example, more than 15,000 beneficiaries were disenrolled in the East region. In its “after action” report, DHA acknowledged that it did not always provide specific and accurate requirements for data transfers in its transition guidance and that this should be addressed for the next transition. However, the report did not address the difficulties related to resolving contractors’ questions and disagreements on these issues. For example, DHA officials told us that they followed an informal process for tracking and handling issues raised by contractors during the transition, which was explained in the initial transition specifications meeting in December 2016. However, the outgoing and incoming contractors in the West region expressed concerns about this process, explaining that it was difficult to resolve issues, particularly with the amount of time it took for DHA to provide a response, such as with the referral and authorization disagreement. Federal standards for internal control note that an agency should implement control activities through policies, such as by providing guidance with greater specificity for data transfers. These standards also indicate that agencies should remediate deficiencies in a timely manner, such as the prompt resolution of contractors’ guidance-related disputes so as to not disrupt the transition schedule. Without more specific guidance and a process that ensures timely dispute resolution, DHA risks disagreements and delays for future contract transitions, which could hinder health care delivery. DHA experienced challenges executing its new T-2017 transition oversight methods—PRV/PRAV and performance guarantees—as planned because of fundamental problems with how some requirements were written and the implementation of TRICARE Select. As a result, some of the requirements were not feasible or effective in assessing contractors’ readiness for health care delivery. 1. Certain PRV/PRAV requirements were not feasible as originally written or were not aligned with the corresponding performance guarantee, according to DHA officials. For example, one of the PRV requirements in the critical area of medical management focused on testing the contractors’ web-based systems for exchanging information electronically with the government and providers, but this was not always possible as some information continues to be transferred in hard copy, such as by fax. In addition, the performance guarantee related to provider network development did not align with the corresponding PRV/PRAV requirements. A DHA official told us that aligning the performance guarantee and PRV/PRAV requirements would have resulted in a higher financial penalty for one of the contractors. 2. Contractors noted that some PRV/PRAV requirements were not complete or effective measures of readiness. For example, contractors told us that requirements for claims and referrals did not effectively test the actual volume of administrative tasks that they would have to process after the start of health care delivery. According to the West region contractor, one of the referral PRAV tests required contractors to demonstrate that they could process 300 referrals during DHA’s onsite review, whereas they typically need to process 9,000 referrals a day after the start of health care delivery. 3. The original PRV/PRAV requirements did not account for TRICARE Select, since the contracts were awarded prior to the enactment of the NDAA 2017. Furthermore, due to the delayed and extended enrollment freeze that ended on December 19, 2017, DHA determined that contractors could not demonstrate a fully operational enrollment system sixty days prior to the start of health care delivery as originally required. Additionally, the contractors had limited access to DHA’s information technology systems for testing scenarios that included TRICARE Select. As a result, contractors had to test the majority of the critical areas (claims, enrollment, customer service, and referral management) with information technology systems that did not include TRICARE Select, which was not a true test of their readiness. To address issues with feasibility and TRICARE Select, DHA modified the PRV requirements for four of the seven critical areas during transition. Specifically, DHA modified all of the PRV requirements for enrollment, referral management, and claims processing as well as one PRV requirement for medical management. DHA also waived the corresponding performance guarantees for the three of these critical areas that had such guarantees (enrollment, referral management, and claims processing). As a result, the contractors were not subjected to financial penalties for not meeting the requirements for these critical areas. According to DHA officials, the problems with the PRV/PRAV requirements experienced during the T-2017 transition occurred in part because DHA subject matter experts did not review the requirements prior to the release of the final request for proposal. As a result, officials said that it was not until after the contracts were awarded that subject matter experts determined that some of the requirements could not be performed as written. Nonetheless, DHA officials and contractors agreed that the PRV/PRAV processes are good conceptual measures, and should continue to be used for the next transition with improvements to their feasibility and effectiveness. Having subject matter experts review contractors’ readiness requirements for feasibility and contract alignment could help ensure that these requirements are appropriate measures of contractor readiness. In addition, DHA’s “after action” report included feedback and lessons learned from officials and contractors on the PRV/PRAV requirements, which DHA could incorporate for future transitions. Federal standards for internal control state that an agency should internally communicate quality information to enable personnel to perform key roles in achieving objectives. By considering lessons learned from this transition and having subject matter experts review the requirements, DHA would be able to better ensure their metrics are appropriate to prepare contractors for health care delivery. DHA reported that the T-2017 contractors had overall better performance meeting contract requirements after the start of health care delivery than the two previous generations of TRICARE contracts. Nonetheless, DHA has acknowledged that both T-2017 contractors did experience some problems meeting certain contract requirements. DHA addressed most of these problems through the issuance of corrective action requests, which require the contractors to submit and implement a corrective action plan (see table 2). One exception where DHA did not issue formal corrective action requests was for problems both contractors experienced with processing enrollment backlogs after the start of health care delivery due to the extended TRICARE Select enrollment freeze during transition. Although most of the problems have been resolved, some problems have persisted into the second year of health care delivery, which DHA and contractors reported they are continuing to address. Provider directory accuracy. Both contractors have continued to fall short of the requirement for 95 percent accuracy of their online provider directories—problems they also experienced during the transition. As of June 2019, the West region contractor’s directory was 76 percent accurate and the East region’s was 64 percent accurate, according to DHA officials. Both contractors expressed concern about the methodology used to assess their performance against this requirement and stated that the 95 percent standard is too high. DHA officials acknowledged that the 95 percent standard is high and that the provider directory corrective action requests may remain open indefinitely because of the high standard, though they continue to monitor the corrective action requests. Claims processing timeliness and accuracy. The East region contractor has struggled to meet timeliness and accuracy standards for processing claims. The contract requires contractors to process 98 percent of claims within 30 calendar days of receipt and 100 percent of claims within 90 days with a 98 percent accuracy rate. As of June 2019, the contractor was meeting the 30 day timeliness requirement and was close to meeting the 90 day timeliness requirement (99.99 percent within 90 days). However, the contractor continued to miss the performance standard for claims processing accuracy, according to DHA officials. DHA officials told us that the department had completed multiple on-site reviews and continues to monitor this issue to ensure the contractor improves its ability to meet claims processing standards. Contractor officials acknowledged that they needed to improve their oversight of claims functions and improve training and job aids with their claims processing subcontractor, which was a new partner for their T-2017 contract. A smooth transition of health care delivery between outgoing and incoming managed care support contractors helps ensure continuity of care for TRICARE beneficiaries. In the most recent transition, the need to concurrently implement a new benefit option—TRICARE Select— presented some unique challenges that delayed the transition timeline and limited DHA’s ability to ensure contractors’ readiness in certain areas. While the implementation of a new benefit option during the T-2017 contract transition was a one-time occurrence, our review highlighted weaknesses in DHA’s transition guidance and oversight that could pose challenges to future contract transitions. By improving the specificity of its transition guidance, revising its process for resolving contractors’ issues, and ensuring review of PRV/PRAV requirements for feasibility and effectiveness, DOD could mitigate these challenges and thus improve future transitions. We are making the following three recommendations to DHA: The Director of DHA should define data sharing requirements with more specificity in its transition guidance for outgoing and incoming contractors, including the time period covered and the types of data that must be shared. (Recommendation 1) The Director of DHA should revise the process the agency has in place for resolving issues raised between contractors during transition to ensure such issues are resolved within time frames that will not adversely affect the transition schedule. (Recommendation 2) The Director of DHA should incorporate lessons learned from this transition and ensure that subject matter experts review PRV/PRAV requirements and performance guarantees prior to the issuance of the request for proposal for the next transition. These requirements should be reviewed to ensure their feasibility and effectiveness for assessing contractor readiness. (Recommendation 3) We provided a draft of this report to DOD for comment. In its written comments, reproduced in appendix I, DOD generally agreed with our findings and concurred with our recommendations. DOD outlined steps the department will take to improve the next TRICARE contract transition, including revising the TRICARE Operations Manual to better define data sharing requirements, developing a process to ensure that all contractor questions are answered appropriately and in a timely manner, and ensuring SMEs are involved in writing the PRV/PRAV requirements. DOD also provided technical comments, which we incorporated as appropriate We are sending copies of this report to the Secretary of Defense and appropriate congressional committees. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix II. In addition to the contact named above, Bonnie Anderson, Assistant Director; Rebecca Abela, Analyst-in-Charge; Cathleen Hamann; Jacquelyn Hamilton; Rianna Jansen; and Vikki Porter made contributions to this report.", "summary": "DOD contracts with private sector companies—referred to as managed care support contractors—to deliver health care services to its TRICARE program beneficiaries through networks of civilian providers. In July 2016, DOD awarded its fourth generation of TRICARE contracts, referred to as T-2017, for management of civilian providers in its two regions (East and West). For new TRICARE contracts, DOD provides a transition period—usually 9 to 12 months—for the incoming and outgoing contractors. During this time, the incoming contractors must take specific steps to prepare for health care delivery. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review the T-2017 transition. This report examines (1) how the requirement to implement TRICARE Select affected the transition, (2) challenges DOD experienced executing the T-2017 transition process, and (3) how DOD addressed problems after the start of health care delivery. GAO reviewed and analyzed DOD guidance, contract requirements, and other relevant documentation, and interviewed DOD officials, TRICARE contractors, and other stakeholders. The implementation of a required new health care benefit option delayed aspects of the transition to the Department of Defense's (DOD) fourth generation of TRICARE managed care support contracts (T-2017). The National Defense Authorization Act for Fiscal Year 2017 required DOD to implement TRICARE Select, a new preferred provider benefit option. As a result, DOD delayed the start of health care delivery—the date the incoming T-2017 contractors would assume responsibility for managing health care—from October 1, 2017, to January 1, 2018, to align with the mandated implementation date for TRICARE Select. DOD also delayed and lengthened a planned period for the department to make changes to beneficiary information in TRICARE's eligibility system. According to DOD and its contractors, this delay contributed to problems with enrollment processing backlogs that were not addressed until several months after health care delivery began. DOD experienced challenges during the T-2017 transition that resulted from weaknesses with its transition guidance and oversight. Specifically, DOD's guidance does not always specify the amount and types of data outgoing contractors have to share with incoming contractors. This led to contractor disagreements over data transfers, which DOD did not always resolve in a timely manner. Contractors reported that these issues contributed to problems after health care delivery began for the T-2017 contracts, such as with processing referrals. DHA also determined that some of DHA's oversight requirements, such as for specialty care referrals, were not feasible or effective, which limited some testing of contractors' readiness for health care delivery. This occurred in part because DOD's relevant subject matter experts did not review the requirements. DOD addressed most of the problems that occurred after health care delivery began by requiring the contractors to develop and implement corrective action plans. DOD and contractors are addressing some problems that have persisted, including problems with the contractors' provider directory accuracy in both regions and claims processing in one region. DOD has an opportunity to avoid similar problems in the future by improving the specificity of its transition guidance and effectiveness of its oversight requirements. GAO is making three recommendations to improve future contract transitions, including that DOD improve the specificity of its transition guidance and have subject matter experts review oversight requirements. DOD concurred with GAO's recommendations and identified steps the department is taking to address them.", "document_type": "gao"}
{"report": "The Aviation and Transportation Security Act designated TSA as the primary federal agency responsible for security in all modes of transportation, which includes physical security and cybersecurity. Passenger rail operators, however, have the day to day responsibility for carrying out safety and security measures for their systems. Unlike the aviation environment, where TSA has operational responsibility for screening passengers and baggage for prohibited items prior to boarding a commercial aircraft, the agency has a limited operational role for securing mass transit (including rail). To secure passenger rail, TSA primarily partners with public and private transportation operators to address their security needs by conducting vulnerability assessments and sharing intelligence information and key practices, among other measures. The agency also engages with the passenger rail industry through associations, such as APTA and Association of American Railroads. Additionally, TSA is responsible for assessing the risk from terrorism and cyber threats to passenger rail, as well as other transportation modes. In addition to engaging with domestic passenger rail stakeholders, TSA’s Office of Policy, Plans, and Engagement is responsible for coordinating domestic and international multimodal transportation security polices, programs, directives, strategies, and initiatives, including conducting outreach to foreign stakeholders. TSA also engages with foreign stakeholders through TSARs. TSARs are primarily located in posts overseas and communicate with foreign government officials to address transportation security matters involving all modes of transportation, including aviation, rail, mass transit, highways, and pipelines. The TSAR role was originally created in response to the 1988 bombing of Pan Am Flight 103 over Lockerbie, Scotland, when the Aviation Security Improvement Act of 1990 was enacted, which provided that foreign security liaison officers were to serve as liaisons to foreign governments in carrying out U.S. government security requirements at specific airports. TSARs are responsible for ensuring the implementation of TSA’s requirements primarily as they relate to passenger and cargo air transportation departing the specific country en route to the United States. The primary focus of the role remains on aviation; however it has evolved over time to include maritime and land transportation. According to TSA, recent attacks overseas and online terrorist messaging point to public transportation systems, which include passenger rail systems, as continued high-value targets for terrorists. In general, passenger rail systems are open and designed to expedite the free flowing movement of large numbers of passengers through multiple stations. As such, these systems are inherently vulnerable to physical attacks (such as improvised explosive devices, active shooters, and chemical or biological attacks) due in part to factors such as high ridership, open access points, limited exit lanes, and fixed, publically available schedules. In addition, TSA has reported that risks increase in urban areas where multiple transportation systems and high volumes of travelers merge at intermodal stations. Transportation systems, including passenger rail systems, rely on technology and internet-connected devices to manage and secure certain business/enterprise functions, such as the operation’s website, communications, and reservations and ticketing mechanisms. They also increasingly rely on computer-networked systems for tracking, signals, and operational controls of transportation equipment and services. As dependence on these systems increases, so does risk to the system. Cyberattacks have the potential to significantly affect both business/enterprise systems and operational control systems. Business/Enterprise systems. Cybersecurity threats include ransomware, malware, phishing, and website attacks that may compromise sensitive information and affect an operator’s ability to communicate with passengers or engage in day-to-day business functions. Operational control systems. Cybersecurity threats, which may include malware or physical manipulation of a system, such as jamming signals or damaging equipment, include threats to the systems that control signaling and train speed. For example, attackers could attempt to access positive train control systems, a computer-based system designed to automatically slow or stop a train that is not being operated safely, to disrupt services. Unintentional cybersecurity threat sources may include failures in equipment or software due to aging or user errors, such as unintentionally inserting a flash drive infected with malware or clicking on a phishing email. Intentional cybersecurity threats may include corrupt employees, criminal groups, terrorists, and nations and may be used, for example, to achieve monetary gain, or for political or military purposes. Figure 1 shows examples of the types of physical and cyber threats passenger rail systems face. The NIPP outlines a risk management framework for critical infrastructure protection. In accordance with the Homeland Security Act of 2002, as amended, DHS created the NIPP in 2006 to guide the national effort to manage security risk to the nation’s critical infrastructure, including through coordination of agencies and 16 various critical infrastructure sectors, including transportation systems. Most recently updated in 2013, the NIPP uses a risk management framework as a planning methodology intended to inform how decision makers take actions to manage risk. The framework calls for public and private partners to conduct risk assessments. The NIPP defines risk as a function of three elements: threat, vulnerability, and consequence, as shown in Figure 2. Threat is an indication of the likelihood that a specific type of attack will be initiated against a specific target or class of targets. Vulnerability is the probability that a particular attempted attack will succeed against a particular target or class of targets. Consequence is the effect of a successful attack. In 2010, DHS, through TSA and the U.S. Coast Guard, developed the Transportation Systems Sector-Specific Plan to conform to requirements in the NIPP. Most recently updated in 2015, this plan describes shared goals, priorities, and activities to mitigate critical infrastructure risks, and acknowledges the increasing dependence of transportation companies on cyber systems for business, security, and operational functions. Regarding cybersecurity risks, DHS produced the Cybersecurity Strategy in 2018 to help execute its cybersecurity responsibilities during the next 5 years. In order to meet one of its objectives, DHS is to encourage the adoption of applicable cybersecurity best practices, including the NIST Framework for Improving Critical Infrastructure Cybersecurity (referred to as the NIST Cybersecurity Framework). The framework is a set of voluntary industry standards and best practices to help organizations manage security risks specific to cybersecurity. The framework consists of five functions: Identify, Protect, Detect, Respond, and Recover. When considered together, these functions provide a high-level view of an organization’s management of cybersecurity risk. NIST issued the framework in 2014 and updated it in April 2018. CISA, formerly DHS’s National Protection and Programs Directorate, manages the national effort to secure and protect against critical infrastructure risks, including cybersecurity risk, for all 16 critical infrastructure sectors, including transportation. CISA’s responsibilities include coordinating with sector-specific agencies to carry out its cybersecurity and critical infrastructure activities. According to TSA officials, TSA uses the TSSRA, the BASE, and threat assessments to assess risk elements for physical and cyber security in passenger rail. Such assessments may address different elements of risk—threat, vulnerability, or consequence—or the total risk for specific assets, such as airport perimeters and pipeline critical facilities. Table 1 below shows the type of risk element each assessment addresses, and whether the assessment addresses risks to intermodal stations or cybersecurity risk. TSSRA. TSA uses the TSSRA, a periodic risk assessment, to assess threat, vulnerability, and consequence for various attack scenarios across the five transportation modes for which TSA is responsible. The scenarios define a type of threat actor—including homegrown violent extremists and transnational extremists, such as Al Qaeda and its affiliates—a target, and an attack mode. For example, a scenario might assess the risk of attacks using varying types of weapons on passenger rail system assets. As part of the assessment process, TSA engages with subject matter experts from TSA and industry stakeholder representatives to compile vulnerabilities for each mode, and TSA analyzes both direct and indirect consequences of the various attack scenarios. According to TSA, the agency uses the TSSRA to provide strategic insights to inform the administration’s risk mitigation strategies, policy considerations, security countermeasures and programs, and resource allocation decisions. Our analysis of the TSSRAs issued during calendar years 2015 through 2017 indicates that TSA included intermodal station attack scenarios, but did not include cybersecurity scenarios. Specifically, the assessments featured various scenarios that targeted intermodal stations, which could include rail systems. For example, a scenario might describe attacks using various numbers of improvised explosive devices on an intermodal station. TSA did not include cybersecurity attack scenarios in the calendar year 2015, 2016, or 2017 assessments. According to the 2016 assessment and TSA officials we interviewed, threat experts have indicated that cyber threats, due to their unique nature and other factors, do not lend themselves to traditional TSSRA attack scenarios. However, as discussed below, the agency does conduct cyber threat assessments. Further, TSA’s Cybersecurity Roadmap 2018, states that, as one objective, the agency will include cybersecurity in its risk assessments for all modes. According to TSA officials, the implementation plan for the Roadmap, which was approved in September 2019, provides guidance and direction for meeting this objective. TSA officials confirmed that they plan to include basic cybersecurity scenarios for all modes in the 2020 TSSRA, and that they plan to engage with TSA mass transit experts and consult with industry experts as needed to inform future cyberattack scenarios. BASE. The BASE is a voluntary security assessment of national mass transit, passenger rail, and highway systems conducted by TSA surface transportation inspectors that addresses potential vulnerabilities, among other things. It consists of an assessment template with 17 security action items developed by TSA and the Federal Transit Administration that address, among other best practices, security training programs, risk information sharing, and cybersecurity. TSA developed this assessment in 2006 to increase domain awareness, enhance prevention and protection capabilities, and further response preparedness of passenger transit systems nationwide. The agency uses the BASE assessments to track progress in implementing specific security measures over time, offer technical assistance and share best practices to help improve the overall security posture of agencies, and inform transportation security grant funding by, among other things, identifying actions agencies have taken to reduce vulnerability. TSA officials stated that the most recent formal update to the assessment template began in 2014 and was fully implemented in 2015. The update included, among other changes, revised guidance for TSA surface inspectors and the addition of questions concerning active shooter events. In fiscal year 2016, the agency also developed a more targeted BASE assessment that focuses the assessment on an entity’s areas of concern as identified by surface inspectors in a previous BASE review of that operator. As of 2017, TSA had completed initial and follow-up assessments for the top 100 mass transit agencies in the country, which comprise approximately 80 percent of the ridership in the United States. TSA officials told us that their goal is to conduct follow-up assessments every one to three years. As previously shown in table 1, our analysis of the BASE template for mass transit and passenger rail indicates that it includes questions that address selected rail agency concerns about intermodal station security, and questions related to cybersecurity issues. Specifically, we found that while the template does not contain security action items or questions that directly refer to intermodal stations, questions in the template do correspond to topics that domestic rail agencies we interviewed identified as significant to intermodal station security, such as coordination among security forces, visible security measures, and establishing roles and responsibilities. For example, one BASE question asks if the agency’s system security plan has procedures or protocols for responding to security events with external agencies such as law enforcement or fire departments. This question corresponds to the challenge of coordination among security forces in intermodal stations identified by six of the seven agencies we interviewed. Cybersecurity is the focus of one of the security action items, which includes a series of general questions related to whether the transit agency has developed a comprehensive cybersecurity strategy. According to TSA officials, the agency added cybersecurity questions to the BASE in 2013 and the questions are intended to be a high level review. For example, the BASE addresses whether the transit agency has conducted a cybersecurity risk assessment, ensured employee training covers cybersecurity roles and threats, and established a protocol for reporting cyber incidents. It also provides a list of available cybersecurity resources for agencies to consult. Threat Assessments. TSA’s Intelligence and Analysis Office identifies security threats to mass transit and passenger rail systems through various threat assessments, including annual and semiannual Mass Transit and Passenger Rail Terrorism Threat Assessments and annual Cyber Modal Threat Assessments. TSA’s Mass Transit and Passenger Rail Terrorism Threat Assessment is produced annually and establishes the current mass transit passenger rail threat level and reviews terrorist threats against mass transit passenger rail for the past year. Threat information includes terrorist attacks on passenger rail trains, train tracks, buses, bus stops, and various stations. Additionally, the threat assessment analyzes intelligence gaps for the mass transit mode. TSA supplements the annual assessment with a semiannual threat assessment that reviews terrorist threats against mass transit and passenger rail for a 6-month period. Our analysis of threat assessments TSA issued for calendar years 2015 through 2019 indicates that they addressed stations, in general, and intermodal stations specifically, when they are the subject of an attack. For example, an attack on Manchester, England’s Victoria station, an intermodal station, was included in the 2018 Mass Transit and Passenger Rail Terrorism Threat Assessment. TSA’s Cyber Modal Threat Assessment reviews cyber threats to transportation over the course of the previous year, establishes cyber threat levels for the transportation modes for which TSA is responsible, and evaluates the threat through the next year or two. This annual assessment examines cyber threats to business and industrial control systems from state and non-state actors, including terrorist groups, pro-terrorist hacker groups, and hacktivists. Moreover, it analyzes incidents of cyberattacks and cyber espionage against U.S. and foreign transportation. Both assessments analyze threat actors and their capabilities, intent, and activities—including attacks occurring internationally—as well as tactics, techniques, and procedures that could be employed in future attacks. TSA calculates threat levels for transportation and cyber modes based on assessments of threat actor intent and capability. It may also issue additional situation-based products on emerging threats. TSA routinely shares these threat assessments with rail agencies and other stakeholders, such as industry security professionals. In addition to TSA’s risk assessment efforts, the agency coordinates with CISA, which conducts voluntary cybersecurity assessments as needed and requested by TSA and industry stakeholders. Specifically, CISA offers eight different voluntary cyber assessment options for public and private sector stakeholders, including mass transit and passenger rail agencies. Because CISA provides services to all 16 critical infrastructure sectors, including the transportation systems sector, officials noted that it must balance the resources it devotes to each sector. For example, CISA officials stated that they have conducted six Validated Architecture Design Review assessments on rail agencies since 2015, and currently have four pending requests from transportation agencies. The Validated Architecture Design Review evaluates systems, networks, and security services to determine if they are designed, built, and operated in a reliable and resilient manner. CISA officials also stated that they have conducted weekly vulnerability scans for one rail agency since 2015. While CISA coordinates with federal and private sector stakeholders to identify and address significant risks to critical infrastructure through its assessments, agency officials stated that they defer to TSA (as the co- sector specific agency for transportation) to take the lead in broader cyber initiatives and outreach to the transportation sector. For example, TSA officials stated that the agency included CISA in planning its cybersecurity workshops, a series of half-day workshops for surface transportation agencies to learn about cybersecurity resources from DHS and discuss nontechnical cybersecurity actions to improve their cybersecurity posture. According to TSA’s Cybersecurity Roadmap 2018, the agency plans to assess the resilience of the transportation modes to malicious cyber activity in conjunction with CISA, among other things. According to officials, TSA and CISA are collaborating or planning to collaborate on several cybersecurity assessments for passenger rail systems, including a cyber risk assessment for passenger rail cars and a cyber assessment of the mass transit and passenger rail mode. CISA officials told us that TSA, DHS’s Science and Technology Directorate, and CISA’s National Risk Management Center are in early phases of developing a cyber risk assessment for select passenger rail cars that they plan to produce in fiscal year 2020. CISA officials stated that they intend to address cyber vulnerability in the rail car assessments and plan to reach out to operators to discuss results. TSA officials told us that TSA and CISA also are considering a mass transit and passenger rail cyber assessment similar to one being developed for the pipeline mode. CISA officials stated that the planned pipeline assessment effort will include a total of 10 Validated Architecture Design Review assessments, in which TSA will help make arrangements with industry and will observe the process. TSA officials explained that expanding this effort to include passenger rail would depend on CISA’s availability to conduct assessments and balance demands in other sectors. CISA officials noted that they currently do not have the resources to support a similar plan for rail. TSA participates in APTA working groups that review and develop standards and recommended practices for passenger rail security, including those that apply to intermodal station security and cybersecurity. Specifically, from 2009 through 2019, APTA produced 45 documents related to security and emergency management standards and recommended practices, among other things. TSA is listed as a participant in 37 of the 45 documents. TSA officials noted that APTA working groups regularly review documents and issues related to security topics, including through monthly phone calls in some cases, and update them as needed. According to APTA’s Manual for the Standards Development Program, standards address safety-critical subjects and establish requirements that must be met by industry; recommended practices describe an established or generally recommended approach that does not rise to the level of a standard; and white papers are intended to provide information about complex issues that present the industry’s prevailing philosophy on the subject matter. For example: APTA offers a series of general standards, recommended practices, and white papers targeted at physical infrastructure protection at passenger facilities. These documents are not specifically directed at intermodal stations, but, according to our analysis and APTA officials, apply to such facilities as well as others. The documents address factors such as exterior door and window security, as well as securing mailrooms and utility openings, among other issues. Another APTA standard addresses security and emergency management considerations during planned special events, such as identifying transit hubs that are likely to be inundated with passengers going to and from the event. APTA offers cybersecurity recommended practices that are targeted at transit agencies in the early stages of starting a cybersecurity program, including how to obtain executive-level awareness and support and how to develop a cybersecurity awareness and training program. APTA also offers recommended practices for securing control and communications systems in transit environments, such as train control systems and fare collection systems. Table 2 provides additional examples of industry standards and key practice documents, as they relate to threats identified by domestic passenger rail stakeholders we interviewed. In addition to working with industry through APTA to develop standards and practices, TSA officials stated that the Surface Transportation Security Advisory Committee, which was established in 2019 to provide advice and recommendations to the TSA Administrator on transportation security matters, may serve as a mechanism for discussing or recommending key practices as the Committee develops. Officials noted that the Committee, which includes industry and community groups, could serve as a source for identifying forward looking best practices for rail security. The Committee held initial meetings in July 2019, October 2019, and January 2020, and proposed establishing subcommittees on topics such as cybersecurity and insider threats. None of the seven domestic rail agencies we contacted identified any security areas in which they felt recommended practices were missing. Officials from five agencies specifically commented on the usefulness of APTA publications. Officials from three agencies however, noted that many transit and rail agencies are still in the early stages of starting a cybersecurity program and that cybersecurity recommended practices are generally targeted at those agencies, as compared to agencies that already have a more sophisticated approach to cybersecurity. Officials from one agency further noted that publications related to the more technical aspects of cybersecurity (such as industrial control systems) can become outdated quickly as industry outpaces the development of security standards. TSA, CISA, and passenger rail agency officials we interviewed identified the NIST Cybersecurity Framework as the primary key practices document they reference for cybersecurity. Domestic and foreign rail agency, and industry association officials, as well as academic experts we interviewed noted that the possibility or likelihood of a cyberattack causing physical damage or harm to rail passengers or infrastructure is unlikely and largely hypothetical at this time. Academic experts we interviewed pointed to an incident in Poland in 2008 as one of the few, if only, known incidents in which a cyber-related attack on rail resulted in physical harm. In this incident, according to news reports, a Polish teenager modified a television remote control so that it could be used to control signals and switch points in a local tram system. Four vehicles derailed and 12 people were injured in the incident. Several rail agency officials and stakeholders we spoke with noted that successfully hacking into train control systems would require a highly sophisticated knowledge of the system. Officials further noted that train systems are designed to fail to safe mode and stop a train in the event of an abnormal signal, and that train operators have the ability to take over controls and manually stop trains if necessary. Officials from three rail agencies, however, stated that as agencies continue to adopt new technologies and systems become more interconnected, the potential for a cyberattack increases. Additionally, CISA officials and officials from one rail agency stated that, despite the lack of many incidents to date, protecting control systems is critical given the potential catastrophic impact of a successful attack. According to TSA officials, TSA identifies foreign passenger rail security standards and key practices through engagement in multilateral groups and by leveraging bilateral relationships. Examples of multilateral groups include the International Working Group on Land Transport Security and the European Association of Railway Police Forces (RAILPOL). The working group, established in 2006, consists of 19 member states, including the United States. It is intended as a framework for members to openly share best practices, exchange information, and contribute to the development of surface transportation security initiatives. For example, TSA and members of the working group developed a searchable database of international surface transportation security measures (known as the SMARTbox) as a resource for surface transportation professionals to gain insights into security practices used by their peers. RAILPOL, founded in 2004, is an international association of government railway police organizations. It has 22 members, including TSA and the Amtrak Police Department. Information about intermodal stations and cybersecurity can be identified and exchanged through both of these mechanisms. For example, representatives from the United Kingdom delivered a presentation on securing intermodal stations at a 2016 working group meeting, and both working group and RAILPOL meetings have included cybersecurity discussions. Figure 3 provides an image of St. Pancras International Station in London, an intermodal station where international, local, and long distance trains converge with the London Underground. Regarding bilateral engagement, TSA identifies foreign rail security standards and practices through one-on-one relationships with other countries. TSA officials noted that their level of engagement with other countries can depend on a variety of factors, including how much the countries have in common regarding transportation systems and threats, and whether or not there are formal agreements in place that allow for regular, detailed information sharing. While some relationships are ongoing, officials stated that TSA interactions with other countries are often situational or transactional—countries may reach out either directly to TSA or through the TSAR for information about a specific issue, such as perimeter protection for surface transportation. For example: TSA holds biannual meetings with Transport Canada, the Canadian government department responsible for transportation policies and programs. Discussion topics from the meetings in 2017 and 2018 included Canadian efforts to develop passenger rail regulations, results from TSA derailment device testing, and opportunities for collaboration. According to TSA officials, TSARs in several countries have facilitated engagement with foreign surface transportation officials, including passenger rail officials. For example, officials stated that one TSAR facilitated the use of TSA’s Exercise Information System for an exercise on the metro system in a foreign city, as well as joint rail security training at TSA facilities in the United States. Officials further noted that another TSAR has taken initiative to facilitate quarterly meetings between foreign government and TSA surface transportation officials, including research and development and passenger rail officials. In addition to quarterly meetings facilitated by the TSAR, TSA officials stated that they are in regular contact with research and development officials in one country to share testing information, such as the results of derailment device testing and explosives testing on railcars, and to discuss security issues related to unmanned aircraft systems. TSA officials also reported that representatives attended an APTA- sponsored study trip to Brussels and London after the 2016 and 2017 rail attacks in those cities, in part, to observe lessons learned from the attacks. Foreign governments and international rail associations also produce a variety of passenger rail security standards and key practice documents. Table 3 below provides examples of these documents and the types of threats they address. TSA officials noted that while multilateral forums provide valuable opportunities to communicate with other countries about evolving threats, emerging security technologies, and potential key practices, interest in forums such as the International Working Group on Land Transport Security has been in decline. For example, while the working group charter calls for annual meetings and quarterly conference calls, the full group has not met since 2016. TSA and foreign government officials we spoke with stated that interest in the working group may be in decline due to factors such as retirements of key officials and lack of engagement from certain countries. These officials also noted that, as leaders in rail security, they typically provide more information about key practices to other countries in large forums than they receive. Additionally, TSA officials noted that other countries frequently used the working group- developed SMARTbox initially, but that use declined in recent years in part due to its location on the Homeland Security Information Network because users may find it difficult to navigate. Further, eight of the 10 domestic and foreign rail agencies we interviewed said they were either unfamiliar with the application or did not use it. For example, officials from one domestic agency said that there was little incentive to contribute and that they found informal networks to be more useful for sharing information. In contrast, TSA and other officials we spoke to stated that bilateral relationships with trusted partners with similar sophisticated rail operations may allow for more detailed exchanges of current and emerging key security practices. TSA has provided limited guidance to TSARs on engagement with foreign passenger rail stakeholders through the TSAR Toolkit (or handbook), which states that TSARs should engage with officials involved in multiple modes of transit, including rail; however, the primary focus of the document is engagement with aviation stakeholders. TSA further provides comprehensive and specific guidance for TSAR aviation engagement as part of its foreign airport assessments and air carrier inspections, but does not do so for surface transportation. As discussed above, according to TSA officials, some TSARs have taken the initiative to facilitate meetings and share testing and training information related to surface transportation, including passenger rail. Passenger rail officials we talked to in one country stated that these TSAR-led initiatives served as a valuable source of information and communication with TSA. In addition, one TSA official cited the value of discussing preliminary testing findings, as well as new guidelines on topics such as security in station designs, which address concerns about security in public spaces. These efforts, however, are dependent on the individual initiative of each TSAR and are not universal. For example, one TSAR we interviewed stated that TSA’s expectations and priorities for surface transportation engagement were unclear and, as a result, he focused almost exclusively on aviation. TSA officials stated that they have focused TSAR guidance on aviation engagement because of the agency’s regulatory role in this area, which, as discussed above, includes foreign airport assessments and air carrier inspections. In lieu of detailed guidance on surface transportation, officials noted they defer to the individual TSARs on how or whether to engage foreign surface transportation stakeholders. Officials emphasized this individual approach and stated that in some countries, TSAR engagement on passenger rail security issues may be limited by legal or cultural barriers. Because rail (unlike aviation) does not directly connect to the United States in most cases, officials noted that there may be less incentive for some host countries to engage. Further, some countries may not have a rail system, or may not be as advanced in rail security policies and procedures, and therefore may be less able to offer key practices. In November 2019, TSA officials noted that they were considering adding guidance for engaging with surface transportation officials and addressing intermodal concerns to TSAR Regional Operational Implementation Plans. According to officials, these plans provide targeted guidance to TSARs for engagement within their specific regions. As of February 2020, officials stated that draft plans for two regions (Western Hemisphere and Africa/Middle East) were under review at TSA. Officials further stated that these drafts, and drafts for the remaining regions currently in development, would include surface transportation-related guidance. TSA officials stated that they hoped to complete all regions’ plans by the end of calendar year 2020, but they did not provide documentation for us to verify that the final plans would contain surface transportation guidance for TSARs. The 2018 TSA Administrator’s Intent document includes a goal to promote security partnerships across surface transportation systems by, in part, identifying and communicating best practices and lessons learned to stakeholders and international partners. In addition, the NIPP states that officials should share actionable and relevant information across the critical infrastructure community to build awareness and enable risk informed decision making. The TSAR Toolkit further states that, even in locations without modal connections to the United States, there is still great value in establishing key points of contact who can share best practices or facilitate the exchange of information in the event of an emergency in modes of transit outside of aviation. As the primary overseas point of contact for security matters involving all modes of transportation, TSARs are responsible for developing bilateral relationships and facilitating information sharing with foreign stakeholders, among other things. Further leveraging formal or informal bilateral relationships could allow TSA to obtain additional passenger rail security information. While several TSARs have individually taken initiative with regard to rail, without additional guidance from TSA, there is no assurance that they will engage in these exchanges with modes outside of aviation. As a result, TSA is less likely to be fully aware of key passenger rail security practices in other countries, such as those listed in table 3 above, among others. Moreover, specific guidance will also provide TSARs with clear expectations for engaging with stakeholders, and provide TSA with greater assurance that they are engaging in a consistent manner. TSA’s new Regional Operational Implementation Plans provide an opportunity for TSA to more clearly incorporate targeted guidance to encourage TSAR outreach and information sharing in specific areas. Recent efforts by TSARs in several countries demonstrate practices, such as opening lines of regular communication on surface transportation, including passenger rail, which could be replicated in other countries. According to TSA officials and domestic rail stakeholders we interviewed, TSA uses various mechanisms such as the Transit Policing and Security Peer Advisory Group, monthly conference calls with rail stakeholders, and the annual APTA roundtable meeting to share and discuss a range of security information with stakeholders, including information about standards and key practices. These mechanisms provide opportunities to discuss issues related to intermodal stations and cybersecurity key practices. TSA also shares information about key practices with domestic stakeholders through voluntary TSA programs such as BASE, the Intermodal Security Training and Exercise Program, and the Visible Intermodal Prevention and Response program. TSA officials provided information about how they incorporate information from foreign threats and attacks into these programs. Specifically: TSA officials noted that TSA initially developed the BASE program around standards that were produced by APTA and other industry partners following the 2004 terrorist attacks on commuter trains in Madrid and the 2005 terrorist attacks on the London subway system. According to TSA officials, the APTA standards and recommended practices, which evolve based on threats and lessons learned, form the basis for the BASE assessment template. One way in which TSA helps communicates these standards and practices to agencies is through the questions in the template. Officials noted that lessons learned from foreign rail security incidents have been used to further support certain security concepts in the BASE, such as assessment questions related to whether agencies engage in public outreach for security awareness (e.g. “If You See Something, Say Something”) and report suspicious activity. TSA officials reported that they consider overseas and domestic attack methods and tactics when planning Intermodal Security Training and Exercise Program exercises to raise awareness of emerging tactics and threats. These exercises are intended to share best practices and lessons learned, among other things. Officials noted that they recently incorporated cyber, chemical, and vehicle- ramming attacks into the program’s objectives based on recent domestic and overseas incidents, and that they shared resources, information, and best practices for security solutions. For example, officials reported conducting two regional exercises that focused on chemical threat elements as the result of a 2017 plot in Australia. TSA further reported hosting a series of vehicle ramming program workshops in the wake of attacks in New York City and Europe. According to TSA officials, TSA has not made any recent changes to the Visible Intermodal Prevention and Response program directly as a result of lessons learned or key practices resulting from a foreign rail security incident; however, officials said they regularly integrate information about foreign incidents and threats when planning program deployments. Officials also noted that the majority of current deployments are for surface transportation, which includes rail. Regarding cybersecurity, TSA has shared information about cybersecurity key practices, including the NIST Cybersecurity Framework, through a series of regional cybersecurity Intermodal Security Training and Exercise Program workshops since 2017. These “5N5” workshops listed five nontechnical cybersecurity actions an agency could take in 5 days, including: (1) develop familiarity with the NIST Cybersecurity Framework; (2) implement a unique password change policy; (3) understand the latest phishing and spam trends and how to message awareness; (4) differentiate access control among staff; and (5) report cybersecurity incidents. Six of the seven domestic rail agencies we spoke with were generally satisfied with TSA’s efforts to share security and key practice information; however officials from two of these six agencies also expressed concerns about timeliness and quality of cybersecurity information provided by TSA. For example, officials from one agency stated that they received limited cybersecurity information from TSA and that the information they did receive was of limited use because it was targeted at agencies without a sophisticated cybersecurity program. An official from another agency noted that while there were opportunities to discuss cybersecurity, the information provided was often general in nature and there was limited time for discussion in certain mechanisms because of the large number of people involved. This official also noted that while the information TSA provides is valuable and there are mechanisms available to share information about a range topics, discussions are typically related to security incidents and threats, as opposed to key practices. TSA officials acknowledged that the agency’s cybersecurity efforts were still in the early stages. They further noted that the implementation plan for the 2018 Cybersecurity Roadmap, which, among things, calls for improving information sharing and partnering with stakeholders to promote the adoption of best practices and industry and/or international standards, was only recently signed in September 2019. In addition to TSA’s information sharing mechanisms, domestic rail agency officials we spoke to reported learning about foreign key practices through personal experience and direct engagement with foreign rail counterparts. For example, officials from two agencies we spoke to hosted visits from foreign rail officials to study security measures, among other things. Officials from one agency noted they provided information to Hong Kong through APTA on key practices for managing large protest crowds in an urban transit environment. Officials from another agency noted that they participate in international information sharing surveys and research to learn about cybersecurity practices by foreign rail operators, and sent representatives to an international mass transit training forum on the development of threat, vulnerability, and risk assessments. Domestic rail agencies also identified several changes they have made to their physical security systems as a result of key practices or lessons learned from foreign rail incidents. For example: increasing random patrols and high visibility deployments of security officers, changing security camera placement to better capture station exits, and increasing security awareness messaging to employees and passengers. Additionally, officials from one agency noted that they revised subway evacuation plans to direct people towards areas less vulnerable to an attack after reviewing lessons learned from recent vehicle-based attacks in Europe. With regard to cybersecurity, one domestic agency we spoke to noted that recent wide-spread global cyberattacks reinforced challenges they have securing legacy Information Technology systems against threats such as ransomware threats. As a result, the agency is focused on identifying expiring technologies and replacing those that can no longer be patched or updated. Officials from another agency noted that they have increased the number of firewalls they use to further segment and protect systems. Table 4 below provides information on mechanisms that can be used to identify and share rail security key practice information, as identified by TSA and domestic stakeholders. While TSA has taken initial steps to share cybersecurity key practices and other information with passenger rail stakeholders, the BASE assessment, does not fully reflect the updated cyber key practices presented in the NIST Cybersecurity Framework, nor does it include the framework in a list of available cyber resources. As discussed above, TSA uses the BASE assessment to share security best practices with transit agencies, among other things. Our review of the BASE cybersecurity questions in the template found that they cover selected activities associated with three of the five functions outlined in the framework– Identify, Protect, and Respond. For example, the BASE asks agencies if they ensure training reinforces cybersecurity roles and responsibilities, which corresponds to the awareness and training category of the NIST Protect function. However, the remaining two functions—Detect and Recover—are not represented in the BASE. According to the framework, when considered together, these functions provide a high-level, strategic view of the life cycle of an organization’s management of cybersecurity risk. TSA officials stated that they regularly review the BASE and noted that the questions are intended to reflect both industry key practices and agency policy; however, they also stated that the agency has not updated the BASE cybersecurity questions since NIST released its Cybersecurity Framework in 2014. In January 2020, officials responsible for the BASE acknowledged that the cybersecurity questions should be updated to reflect the framework. TSA officials also noted that they would want to align changes to the BASE cybersecurity questions with any new guidance or direction provided by the newly established Surface Transportation Security Advisory Committee. As of January 2020, the Committee is in its initial start-up phase, and has not yet provided any reports or recommendations or published a timeline or project plan. Further, because the framework functions organize basic cybersecurity activities at their highest level, incorporating elements of all five functions into the BASE template should not require additional guidance from the Committee. The 2015 TSA Transportation Systems Sector-Specific Plan states that encouraging the adoption of the NIST Cybersecurity Framework across all transportation modes supports the plan’s goal to manage the security risks to the physical, human, and cyber elements of critical transportation infrastructure. The plan also states that encouraging the adoption of the framework contributes to several of the NIPP’s calls to action related to sharing actionable and relevant information. TSA considers the framework a best practice document. By updating the BASE cybersecurity questions to align more closely with the core functions in the NIST Cybersecurity Framework, TSA could better assist passenger rail and other operators in identifying current key practices and improving their cybersecurity posture. As a result, transit operators would be more aware of cybersecurity vulnerabilities and better prepared to reduce the impact from a cybersecurity incident. In addition, this would create a more consistent cybersecurity approach from TSA, since the agency promotes the framework through other mechanisms, such as the series of cybersecurity workshops, as noted above. Recent physical and cyberattacks in U.S. cities and Europe demonstrate the evolving nature of the threats to passenger rail and highlight the importance of working with both domestic stakeholders and foreign rail security partners. As such, TSA actively engages with domestic passenger rail stakeholders, but could do more to engage with foreign stakeholders. TSARs stationed abroad are well positioned to further leverage bilateral relationships with foreign passenger rail stakeholders, and several TSARs have taken initiative to do so. However, TSA provides only limited guidance to TSARs on surface transportation engagement. Without specific guidance, there is no assurance that TSARs will engage in these exchanges with modes outside of aviation. TSA’s new Regional Operational Implementation Plans provide an opportunity to more clearly incorporate targeted guidance to encourage TSAR outreach and information sharing in specific areas. Additionally, such guidance will provide TSA with greater assurance that TSARs are engaging with foreign stakeholders in a consistent manner. TSA uses various mechanisms to share security standards and key practice information with rail stakeholders, including through BASE assessments. The cybersecurity questions in the BASE template, however, do not fully reflect two of the five core areas identified in the NIST Cybersecurity Framework. By updating the BASE cybersecurity questions to align more closely with current key practices such as the framework, TSA could better assist passenger rail and other operators in improving their cybersecurity posture. As a result, transit operators would be more aware of cybersecurity vulnerabilities and better prepared to reduce the impact from a cybersecurity incident. We are making two recommendations to TSA. The TSA Administrator should ensure that the TSAR Regional Operational Implementation Plans include guidance on how TSARs are to engage with foreign surface transportation stakeholders, including passenger rail stakeholders. (Recommendation 1) The TSA Administrator should update the BASE cybersecurity template to ensure it reflects cybersecurity key practices, including the Detect and Recover functions outlined in the NIST Cybersecurity Framework. (Recommendation 2) We provided a draft of this report to DHS for review and comment. DHS provided written comments, which are reprinted in appendix II, and also provided technical comments, which we incorporated as appropriate. DHS concurred with both recommendations and described actions TSA plans to take to address them. Specifically, to address recommendation 1, TSA plans to draft an Operational Implementation Plan, which will provide guidance to TSARs for engaging with foreign surface transportation stakeholders, including in passenger rail security. According to TSA, this plan will also serve as the outline for the development of Regional Operational Implementation Plans, which will help align resources worldwide. To address recommendation 2, TSA plans to update the BASE Cybersecurity Security Action Item section to ensure it reflects the NIST Cybersecurity Framework Detect and Recover functions. These actions, if fully implemented by TSA, should address the intent of both recommendations. We are sending copies of this report to the appropriate congressional committees and the acting Secretary of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact Triana McNeil at (202) 512-8777 or McNeilT@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributors to this report are listed in appendix III. We asked domestic and foreign passenger rail agencies and foreign passenger rail stakeholders we interviewed to identify some security related key practices or lessons learned that they employ, including, but not limited to, intermodal stations and cybersecurity. Table 5 below provides examples of common security practices both domestic and foreign officials identified; table 6 shows several additional key practices foreign rail stakeholders cited. These tables are not intended to be a comprehensive list, but provide examples of key security practices utilized by selected domestic and foreign rail agencies. Figure 4 below shows an example of a Project Servator poster displayed during an exercise at St. Pancras International Station in London. As noted in table 6 above, foreign passenger rail stakeholders cited Project Servator as a key rail security practice. In additional to the contact named above, Christopher Ferencik (Assistant Director), Sarah Turpin (Analyst in Charge), Chuck Bausell, Benjamin Crossley, Suzanne Kaasa, Tracey King, Ronald La Due Lake, William Reed, and Adam Vogt made key contributions to this report.", "summary": "Recent physical and cyberattacks on rail systems in U.S. and foreign cities highlight the importance of strengthening and securing passenger rail systems around the world. TSA is the primary federal agency responsible for securing transportation in the United States. GAO was asked to review TSA's efforts to assess passenger rail risk, as well as its role in identifying and sharing security standards and key practices. This report addresses (1) TSA's efforts to assess risk; (2) the extent to which TSA works with U.S. and foreign passenger rail stakeholders to identify security standards and key practices; and (3) the extent to which TSA shares passenger rail security standards and key practices with stakeholders. GAO analyzed TSA risk assessments from fiscal years 2015 through 2019 and reviewed TSA program documents and guidance. GAO interviewed officials from TSA, and from seven domestic rail agencies, three foreign rail agencies, and two foreign government agencies. The results from these interviews are not generalizable but provide perspectives on topics in this review. The Transportation Security Administration (TSA) assesses passenger rail risks through the Transportation Sector Security Risk Assessment, the Baseline Assessment for Security Enhancement (BASE), and threat assessments. TSA uses the risk assessment to evaluate threat, vulnerability, and consequence for attack scenarios across various transportation modes. TSA surface inspectors use the baseline assessment, a voluntary security review for mass transit, passenger rail, and highway systems, to address potential vulnerabilities and share best practices, among other things. TSA works with U.S. stakeholders to identify security standards and key practices and identifies foreign standards and practices through multilateral and bilateral exchanges. However, TSA Representatives (TSARs), the primary overseas point of contact for transportation security matters, lack specific guidance on foreign rail stakeholder engagement. As a result, TSA is less likely to be fully aware of key practices in other countries, such as station security guidance. Specific guidance would provide TSARs with clear expectations and encourage more consistent engagement with foreign rail stakeholders. Public Awareness Campaign Canine Units Emphasize security awareness Detection of vapor from explosives TSA shares standards and key practices with stakeholders, including those related to cybersecurity, through various mechanisms including BASE reviews; however, this assessment does not fully reflect current industry cybersecurity standards and key practices. For example, it does not include any questions related to two of the five functions outlined in the National Institute of Standards and Technology's Cybersecurity Framework—specifically the Detect and Recover functions. Updating the BASE questions to align more closely with this framework would better assist passenger rail operators in identifying current key practices for detecting intrusion and recovering from incidents. GAO is making two recommendations: (1) that TSA update TSAR guidance to include engaging with foreign passenger rail stakeholders; and (2) that TSA update the BASE cybersecurity questions to ensure they reflect key practices. DHS concurred with both recommendations.", "document_type": "gao"}
{"report": "Historically, the federal government has had difficulties acquiring, developing, and managing IT investments. Further, federal agencies have struggled with appropriately planning and budgeting for modernizing legacy systems; upgrading underlying infrastructure; and investing in high quality, lower cost service delivery technology. The consequences of not updating legacy systems has contributed to, among other things, security risks, unmet mission needs, staffing issues, and increased costs. Security risks. Legacy systems may operate with known security vulnerabilities that are either technically difficult or prohibitively expensive to address. In some cases, vendors no longer provide support for hardware or software, creating security vulnerabilities and additional costs. For example, in November 2017, the Department of Education’s (Education) Inspector General identified security weaknesses that included the department’s use of unsupported operating systems, databases, and applications. By using unsupported software, the department put its sensitive information at risk, including the personal records and financial information of millions of federal student aid applicants. Unmet mission needs. Legacy systems may not be able to reliably meet mission needs because they are outdated or obsolete. For instance, in 2016, the Department of State’s (State) Inspector General reported on the unreliability of the Bureau of Consular Affairs’ legacy systems. Specifically, during the summers of 2014 and 2015, outages in the legacy systems slowed and, at times, stopped the processing of routine consular services such as visa processing. For example, in June 2015, system outages caused by a hardware failure halted visa processing for 13 days, creating a backlog of 650,000 visas. Staffing issues. In order to operate and maintain legacy systems, staff may need experience with older technology and programming languages, such as the Common Business Oriented Language (COBOL). Agencies have had difficulty finding employees with such knowledge and may have to pay a premium to hire specialized staff or contractors. For example, we reported in May 2016 that the Social Security Administration (SSA) had to rehire retired employees to maintain its COBOL systems. Further, having a shortage of expert personnel available to maintain a critical system creates significant risk to an agency’s mission. For instance, we reported in June 2018 that the Internal Revenue Service (IRS) was experiencing shortages of staff with the skills to support key tax processing systems that used legacy programming languages. These staff shortages not only posed risks to the operation of the key tax processing systems, but they also hindered the agency’s efforts to modernize its core tax processing system. Increased costs. The cost of operating and maintaining legacy systems increases over time. The issue of cost is linked to the three previously described consequences—either because the other issues directly raise costs or, as in the case of not meeting mission needs, the agency is not receiving a favorable return on investment. Further, in an era of constrained budgets, the high costs of maintaining legacy systems could limit agencies’ ability to modernize and develop new or replacement systems. During the course of our review, agencies reported that they consider several factors prior to deciding whether to modernize a legacy system. In particular, agencies evaluate factors, such as the inherent risks, the criticality of the system, the associated costs, and the system’s operational performance. Risks. Agencies consider the risks associated with maintaining the legacy system as well as modernizing the legacy system. For instance, agencies may prioritize the modernization of legacy systems that have security vulnerabilities or software that is unsupported by the vendor. However, limited system accessibility may also reduce the need to modernize a legacy system. For example, air-gapped systems, which are systems that are isolated from the internet, may mitigate a legacy system’s cybersecurity risk by preventing remote hackers from having system access. Conversely, we have also reported that air-gapped systems are not necessarily secure: they could potentially be accessed by other means than the internet, such as through Universal Serial Bus devices. Even so, removing the threat of remote access is a mitigation technique used by agencies such as the Nuclear Regulatory Commission (NRC). According to NRC, the agency reduced the riskiness of using computers with unsupported operating systems by putting these computers on isolated networks or by disconnecting them from networks entirely. Criticality. Agencies consider how critical the system is to the agency’s mission. Several agencies stated that they would consider how essential a legacy system is to their agencies’ missions before deciding to modernize it. For example, the Department of Health and Human Services (HHS) stated that, when deciding to modernize a legacy system, it considers the degree to which core mission functions of the agency or other agencies are dependent on the system. Similarly, Department of Energy (Energy) officials noted that the department is required to maintain several legacy systems associated with the storage of its nuclear waste. Costs. Agencies consider the costs of maintaining a legacy system and modernizing the system. For example, according to the Department of Veterans Affairs (VA), there are systems for which a life-cycle cost analysis of the legacy system may show that the cost to modernize exceeds the projected costs to maintain the system. Similarly, the Department of Defense (DOD) noted that, before deciding on a modernization solution, it is important to assess the costs of the transition to a new or replacement solution. An agency also may decide to modernize a system when there is potential for cost savings to be realized with a modernization effort. For example, HHS stated that it may pursue the modernization of a legacy system if the department anticipates reductions in operations and maintenance costs due to efficiencies gained through the modernization. Performance. Before making the decision to modernize, agencies consider the legacy system’s operational performance. Specifically, if the legacy system is performing poorly, the agency may decide to modernize it. For example, the Department of Transportation (Transportation) stated that, if a legacy system is no longer functioning properly, it should be modernized. In addition, HHS noted that the ability to improve the functionality of the legacy system could be a reason to modernize it. As previously mentioned, in May 2016, we reported that federal legacy IT investments were becoming increasingly obsolete. In this regard, agencies had reported operating systems that used outdated languages and old parts, which were difficult to replace. Further, we noted that each of the 12 selected agencies had reported using unsupported operating systems and components, which could create security vulnerabilities and additional costs. At the time, five of the selected agencies reported using 1980s and 1990s Microsoft operating systems that stopped being supported by the vendor more than a decade ago. We concluded that agencies were, in part, maintaining obsolete investments because they were not required to identify, evaluate, and prioritize investments to determine whether the investments should be kept as-is, modernized, replaced, or retired. We pointed out that the Office of Management and Budget (OMB) had created draft guidance that would require agencies to do so, but OMB had not committed to a firm time frame for when the guidance would be issued. As such, we made 16 recommendations to OMB and the selected federal agencies to better manage legacy systems and investments. Most agencies agreed with the recommendations or had no comment. However, as of May 2019, 13 recommendations had not been implemented. In particular, OMB has not finalized and issued its draft guidance on legacy systems. Until this guidance is finalized and issued, the federal government will continue to run the risk of maintaining investments that have outlived their effectiveness and are increasingly difficult to protect from cybersecurity vulnerabilities. Congress and the executive branch have initiated several efforts to modernize federal IT, including: Identification of High Value Assets. In a December 2016 memorandum, OMB observed that continued increases in computing power combined with declining computing and storage costs and increased network connectivity had expanded the government’s capacity to store and process data. However, OMB noted that this rise in technology and interconnectivity also meant that the federal government’s critical networks, systems, and data were more exposed to cyber risks. As a result, OMB issued guidance to assist federal agencies covered by the Chief Financial Officers Act in managing the risks to these assets, which it designated as High Value Assets. Subsequently, in December 2018, OMB issued a memorandum that provided further guidance regarding the establishment and enhancement of the High Value Asset program. It stated that the program is to be operated by DHS in coordination with OMB. Further, the new guidance expanded the program to apply to all agencies (i.e., agencies covered by the Chief Financial Officers Act, as well as those not covered by the act) and expanded the definition of High Value Assets. The guidance required agencies to identify and report these assets (which may include legacy systems), assess them for security risks, and remediate any weaknesses identified, including those associated with obsolete or unsupported technology. Assessment of federal IT modernization. On May 11, 2017, the President signed Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. This executive order outlined actions to enhance cybersecurity across federal agencies and critical infrastructure to improve the nation’s cyber posture and capabilities against cybersecurity threats. Among other things, the order tasked the Director of the American Technology Council to coordinate a report to the President from the Secretary of DHS, the Director of OMB, and the Administrator of the General Services Administration (GSA), in consultation with the Secretary of Commerce, regarding modernizing federal IT. As a result, the Report to the President on Federal IT Modernization was issued on December 13, 2017, and outlined the current and envisioned state of federal IT. The report focused on modernization efforts to improve the security posture of federal IT and recognized that agencies have attempted to modernize systems but have been stymied by a variety of factors, including resource prioritization, ability to procure services quickly, and technical issues. The report provided multiple recommendations intended to address these issues through the modernization and consolidation of networks and the use of shared services. In particular, the report recommended that the federal government prioritize the modernization of legacy IT by focusing on enhancing security and privacy controls for those assets that are essential for agencies to serve the American people and whose security posture is most vulnerable (i.e., High Value Assets). Enactment of the Modernizing Government Technology (MGT) Act. To help further agencies’ efforts to modernize IT, in December 2017, Congress and the President enacted a law to authorize the availability of funding mechanisms to improve, retire, or replace existing IT systems to enhance cybersecurity and to improve efficiency and effectiveness. The law, known as the MGT Act, authorizes agencies to establish working capital funds for use in transitioning from legacy systems, as well as for addressing evolving threats to information security. The law also created the Technology Modernization Fund, within the Department of the Treasury (Treasury), from which agencies can “borrow” money to retire and replace legacy systems, as well as acquire or develop systems. Subsequently, in February 2018, OMB issued guidance for agencies to implement the MGT Act. The guidance was intended to provide agencies additional information regarding the Technology Modernization Fund, and the administration and funding of the related IT working capital funds. Specifically, the guidance allowed agencies to begin submitting initial project proposals for modernization on February 27, 2018. In addition, in accordance with the MGT Act, the guidance provides details regarding a Technology Modernization Board, which is to consist of (1) the Federal CIO; (2) a senior official with IT technical expertise from GSA; (3) a member of DHS’s National Protection and Program Directorate; and (4) four federal employees with technical expertise in IT development, financial management, cybersecurity and privacy, and acquisition, appointed by the Director of OMB. As of February 2019, the Technology Management Fund Board had approved funds for seven IT modernization projects across five agencies: the Department of Agriculture, Energy, the Department of Housing and Urban Development (HUD), the Department of Labor, and GSA. For example, the board approved $20 million for HUD to modernize a mainframe and five COBOL-based applications that are expensive to maintain. According to the board’s website, without these funds, HUD would not have been able to pursue this project for several years. Issuance of the President’s Management Agenda. In March 2018, the Administration issued the President’s Management Agenda, which lays out a long-term vision for modernizing the federal government. The agenda identifies three related drivers of transformation—IT modernization; data, accountability, and transparency; and the workforce of the future—that are intended to push change across the federal government. The President’s Management Agenda identifies 14 related Cross- Agency Priority goals, many of which have elements that involve IT. In particular, the Cross-Agency Priority goal on IT modernization states that modern technology must function as the backbone of how government serves the public in the digital age. Further, the goal on IT modernization provides three priorities that are to guide the Administration’s efforts to modernize federal IT: (1) enhancing mission effectiveness by improving the quality and efficiency of critical services, including the increased utilization of cloud-based solutions; (2) reducing cybersecurity risks to the federal mission by leveraging current commercial capabilities and implementing cutting edge cybersecurity capabilities; and (3) building a modern IT workforce by recruiting, reskilling, and retaining professionals able to help drive modernization with up-to-date technology. As determined by our review of 65 critical federal legacy systems (see appendix II), the 10 most critical legacy systems in need of modernization are maintained by 10 different federal agencies whose missions are essential to government operations, such as emergency management, health care, and wartime readiness. These legacy systems provide vital support to the agencies’ missions. According to the agencies, these legacy systems range from about 8 to 51 years old and, collectively, cost approximately $337 million annually to operate and maintain. Several of the systems use older languages, such as COBOL and assembly language code. However, as we reported in June 2018, reliance on assembly language code and COBOL has risks, such as a rise in procurement and operating costs, and a decrease in the availability of individuals with the proper skill sets. Further, several of these legacy systems are also operating with known security vulnerabilities and unsupported hardware and software. For example, DHS’s Federal Emergency Management Agency performed a security assessment on its selected legacy system in September 2018. This review found 249 reported vulnerabilities, of which 168 were considered high or critical risk to the network. With regard to unsupported hardware and software, Interior’s system contains obsolete hardware that is not supported by the manufacturers. Moreover, the system’s original hardware and software installation did not include any long-term vendor support. Thus, any original components that remain operational may have had long-term exposure to security and performance weaknesses. Table 1 provides a generalized list of each of the 10 most critical legacy systems that we identified, as well as agency-reported system attributes, including the system’s age, hardware’s age, system criticality, and security risk. (Due to sensitivity concerns, we substituted a numeric identifier for the system names and are not providing detailed descriptions). Appendix III provides additional generalized agency- reported details on each of these 10 legacy systems. Given the age of the hardware and software in legacy systems, the systems’ criticality to agency missions, and the security risks posed by operating aging systems, it is imperative that agencies carefully plan for their successful modernization. Documenting modernization plans in sufficient detail increases the likelihood that modernization initiatives will succeed. According to our review of government and industry best practices for the modernization of federal IT, agencies should have documented modernization plans for legacy systems that, at a minimum, include three key elements: (1) milestones to complete the modernization, (2) a description of the work necessary to modernize the legacy system, and (3) details regarding the disposition of the legacy system. Of the 10 identified agencies with critical systems most in need of modernization, seven (DOD, DHS, Interior, Treasury, the Office of Personnel Management (OPM), the Small Business Administration (SBA), and SSA) had documented modernization plans for their respective critical legacy systems and three did not have documented plans. The three agencies that did not have documented modernization plans for their critical legacy systems were: (1) Education, (2) HHS, and (3) Transportation. Of the seven agencies with documented plans, DOD and Interior had modernization plans that addressed each of the three key elements. For example, Interior submitted documentation of both completed and forthcoming milestones leading to the deployment of the modernized system. The department also provided a list of the mandatory requirements for the updated system, as well as the work that needed to be performed at each stage of the project, including the disposition of the legacy system. Likewise, DOD provided documentation of the milestones and the work needed to complete the modernization of its legacy system. In addition, the documentation discussed the department’s plans for the disposition of the legacy system. While the other five agencies—Treasury, DHS, OPM, SBA, and SSA— had developed modernization plans for their respective legacy systems, their plans did not fully address one or more of the three key elements. For instance, DHS’s Federal Emergency Management Agency’s modernization plan for its selected legacy system described the work that the department needed to accomplish, but did not include the associated milestones or the disposition of the legacy system. Similarly, SBA included milestones and a plan for the disposition of the legacy system, but did not include a description of the work necessary to accomplish the modernization. Treasury, OPM, and SSA partially included one or more of the key elements in their modernization plans. For instance, OPM’s and SSA’s plans included upcoming milestones for one part of the initiative, but not the entire effort. Similarly, OPM’s modernization plans only described a portion of the work necessary to complete each modernization initiative. Further, none of these four agencies’ modernization plans included considerations for the disposition of legacy system components following the completion of the modernization initiatives. While agencies may be using development practices that minimize initial planning, such as agile, agencies should have high-level information on cost, scope, and timing. Table 2 identifies the seven agencies with documented modernization plans for their critical systems, as well as the extent to which the plans were sufficiently detailed to include the three key elements. (Due to sensitivity concerns, we substituted a numeric identifier for the system names.) The agencies provided a variety of explanations for the missing modernization plans. For example, according to the three agencies without documented modernization plans: Education’s modernization plans were pending the results of a comprehensive IT visualization and engineering project that would determine which IT systems and services could be feasibly modernized, consolidated, or eliminated; HHS had entered into a contract to begin a modernization initiative but had not yet completed its plans; and Transportation had solicited information from industry to determine whether the agency’s ideas for modernization were feasible. Of the five agencies which had plans that lacked key elements, officials within SSA’s office of the CIO stated that the agency has yet to complete its modernization planning, even though modernization efforts are currently underway. The officials said that they will update the planning documentation and make further decisions as the modernization effort progresses. Officials within DHS’s Federal Emergency Management Agency’s Office of the CIO stated that its plans for modernizing the system we reviewed (System 4) are contingent on receiving funding and being able to allocate staffing resources to planning activities. According to the officials, the agency is also integrating its plans for modernizing System 4 with the management of the rest of the agency’s systems. Similarly, Treasury officials stated that IRS’s efforts to complete planning for the remaining modernization activities have been delayed due to budget constraints. In addition, officials within OPM’s Office of the CIO stated that its modernization plan did not extend to fiscal year 2019 because there were changes in leadership during the creation of the plan, and because of uncertainty in funding amounts. While we recognize that system modernizations are dependent on funding, it is important for agencies to prioritize funding for the modernization of these critical legacy systems. In addition, Congress provided increased authority for agencies to fund such modernization efforts through the MGT Act’s Technology Modernization Fund and the related IT working capital funds. Until the agencies establish complete legacy system modernization plans that include milestones, describe the work necessary to modernize the system, and detail the disposition of the legacy system, the agencies’ modernization initiatives will have an increased likelihood of cost overruns, schedule delays, and overall project failure. Project failure would be particularly detrimental in these 10 cases, not only because of wasted resources, but also because it would prolong the lifespan of increasingly vulnerable and obsolete systems, exposing the agency and system clients to security threats and potentially significant performance issues. Further, agencies may not be effectively planning for the modernization of legacy systems, in part, because they are not required to. As we reported in May 2016, agencies are not required to identify, evaluate, and prioritize existing IT investments to determine whether they should be kept as-is, modernized, replaced, or retired. We recommended that OMB direct agencies to identify legacy systems needing to be replaced or modernized. As of April 2019, OMB had not implemented this recommendation. OMB staff stated that agencies were directed to manage the risk to High Value Assets associated with legacy systems in OMB’s December 2018 guidance. While OMB’s guidance does direct agencies to identify, report, assess, and remediate issues associated with High Value Assets, it does not require agencies to do so for all legacy systems. Until OMB requires agencies to do so, the federal government will continue to run the risk of continuing to maintain investments that have outlived their effectiveness. The 24 Chief Financial Officers Act agencies in our review identified a total of 94 examples of successful modernizations of legacy systems undertaken in the last 5 years. The initiatives were of several types, including those aimed at transforming legacy code into a more modern programming language, migrating legacy services (e.g., email) to the cloud, and re-designing a legacy mainframe to a cloud-based application. Among these examples, the five that we selected reflect a mix of different agencies, types of system modernization initiatives, and types of benefits realized from the initiatives. Table 3 provides details on the five examples of successful IT modernization initiatives, as reported by their respective agencies, as well as the reported benefits related to those initiatives. The five agencies attributed the success of their modernization initiatives to various factors, including: using automated technologies to examine programming code and perform testing (DOD and Treasury); testing the system thoroughly (SSA and Treasury); actively engaging the end users and stakeholders throughout the modernization process (SSA and Treasury); cultivating a partnership between industry and government (DOD); following management practices on change and life cycle management (Education); developing and implementing an enterprise-wide cost collection and data analysis process for commodity IT to track and measure progress against consolidation, optimization, and savings targets (DHS); creating an interface that was consistent across systems (SSA); having strong executive leadership and support (Treasury); and using agile principles to facilitate the team’s ownership of the project (Treasury). These factors are largely consistent with government and industry best practices. For example, we reported in 2011 on critical success factors associated with major acquisitions, including engaging stakeholders and having the support of senior executives. Similarly, OMB’s guidance on High Value Assets calls for agencies’ plans to address change management and life cycle management. Likewise, the Software Engineering Institute’s Capability Maturity Model® Integration for Development recommends that organizations engage stakeholders, practice effective change and life cycle management, and thoroughly test systems, among other practices. Further, our Information Technology Investment Management framework recommends involving end users, implementing change and life cycle management processes, and obtaining the support of executive leadership. Agencies that follow such practices are better positioned to modernize their legacy systems. Doing so will also allow the agencies to leverage IT to successfully address their missions. The 10 most critical federal legacy systems in need of modernization are becoming increasingly obsolete. Several agencies are using outdated computer languages, which can be difficult to maintain and increase costs. Further, several of these legacy systems are also operating with unsupported hardware and software and known security vulnerabilities. Most agencies did not have complete plans to modernize these legacy systems. Due to the criticality and possible cybersecurity risks posed by operating aging systems, having a plan that includes how and when the agency plans to modernize is vital. In the absence of such plans, the agencies increase the likelihood of cost overruns, schedule delays, and overall project failure. Such outcomes would be particularly detrimental because of the importance of these systems to agency missions. Successfully modernizing legacy systems is possible, as demonstrated by the five highlighted examples. Agencies attributed the success of their modernization initiatives to a variety of management and technical factors that were consistent with best practices. In the LOUO report that we are issuing concurrently with this report, we are making a total of eight recommendations to eight federal agencies to identify and document modernization plans for their respective legacy systems, including milestones, a description of the work necessary, and details on the disposition of the legacy system. We requested comments on a draft of this report from OMB and the 24 agencies included in our review. The eight agencies to which we made recommendations in the LOUO report agreed with our findings and recommendations. In addition, OMB and the 16 agencies to which we did not make recommendations either agreed with our findings, did not agree or disagree with the findings, or stated that they had no comments. Further, multiple agencies provided technical comments, which we have incorporated, as appropriate. The following eight agencies agreed with our recommendations: In written comments from Education, the agency stated that it concurred with the recommendation and indicated its intent to address it. Education’s comments are reprinted in appendix IV. In written comments from HHS on the LOUO version of this report, the agency stated that it concurred with the recommendation and intends to evaluate ways to provide its modernization plan, including milestones and a description of the work necessary to modernize the system. HHS also provided technical comments that we incorporated, as appropriate. HHS deemed some of the information in its original agency comment letter pertaining to particular legacy systems to be sensitive, which must be protected from public disclosure. Therefore, we have omitted the sensitive information from the version of the agency comment letter that is reprinted in appendix V of this report. In written comments, DHS stated that it concurred with our recommendation. DHS’s comments are reprinted in appendix VI. In comments received via email from Transportation’s Director of Audit Relations and Program Improvement on May 9, 2019, the agency stated that it agreed with our recommendation. In comments from Treasury’s Supervisory IT Specialist/Performance and Governance Analyst, received via email on May 17, 2019, the department stated that it agreed with our recommendation. In addition, Treasury’s component agency, IRS, provided written comments which stated that it agreed with the recommendation. The agency said it intends to develop a multiyear retirement strategy for its system to address the recommendation. In its written comments, IRS also stated that our draft report did not accurately convey that the legacy system replacement project is intended to only replace core components of its selected legacy system. The agency said that, even when the entire replacement project is completed, it will only address a portion of the work required to retire the legacy system. In response, we modified our discussion of this project in the report. IRS’s comments are reprinted in appendix VII. In written comments from OPM on the LOUO version of this report, the agency stated that it concurred with the recommendation and indicated its plans to address the recommendation. OPM also provided technical comments that we incorporated, as appropriate. OPM deemed some of the information in its original agency comment letter pertaining to particular legacy systems to be sensitive, which must be protected from public disclosure. Therefore, we have omitted the sensitive information in the version of the agency comment letter that is reprinted in appendix VIII. In written comments, SBA concurred with our recommendation and stated that it intends to include a description of the work necessary to modernize the legacy system in the initiative’s project plan. The agency estimated that it will address the recommendation by July 31, 2019. SBA deemed some of the information in its original agency comment letter pertaining to particular legacy systems to be sensitive, which must be protected from public disclosure. Therefore, we have omitted the sensitive information from the version of the agency comment letter that is reprinted in appendix IX. In written comments from SSA, the agency stated that it agreed with our recommendation. The agency added that it is modernizing its legacy system using agile software methods and a multiyear roadmap of development activities. The agency further stated that, as it completes its modernization work, it expects to retire most of the legacy software associated with System 10. SSA also provided technical comments that we incorporated, as appropriate. SSA’s comments are reprinted in appendix X. In addition, we received responses via email from 14 agencies to which we did not make recommendations. Of these agencies, three agreed with our findings and 11 stated that they did not have comments on the report. Two other agencies—HUD and the U.S. Agency for International Development—provided written comments in which they expressed appreciation for the opportunity to review the report, but did not state whether they agreed or disagreed with our findings. These agencies’ comments are reprinted in appendixes XI and XII, respectively. Further, in an email from OMB staff on May 22, 2019, the agency did not state whether it agreed or disagreed with our findings, but provided technical comments that we incorporated, as appropriate. We are sending copies of this report to the appropriate congressional committees; the Secretaries of the Departments of Agriculture, Commerce, Defense, Education, Energy, Health and Human Services, Homeland Security, Housing and Urban Development, Labor, State, the Interior, the Treasury, Transportation, and Veterans Affairs; the U.S. Attorney General (Department of Justice); the Administrators of the Environmental Protection Agency, General Services Administration, National Aeronautics and Space Administration, Small Business Administration, and the U.S. Agency for International Development; the Commissioner of the Social Security Administration; the Directors of the National Science Foundation and the Office of Personnel Management; and the Chairman of the Nuclear Regulatory Commission; and other interested parties. This report is also available at no charge on the GAO website at http://www.gao.gov. Should you or your staffs have any questions on information discussed in this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix XIII. Our objectives were to (1) identify the most critical federal legacy systems in need of modernization and evaluate plans for modernizing them, and (2) identify examples of information technology (IT) legacy system modernization initiatives in the last 5 years that agencies considered successful. The scope of our review included the 24 agencies covered by the Chief Financial Officers Act of 1990. This report presents a public version of a “limited official use only” (LOUO) report that we are also issuing today. The Department of Homeland Security and the Department of the Interior determined that certain information in our original report should be protected from public disclosure. Therefore, we will not release the LOUO report to the general public because of the sensitive information it contains. The LOUO report includes eight recommendations that we made to eight agencies to document modernization plans for particular legacy systems, including milestones, a description of the work necessary, and details on the disposition of the legacy system. In this public version of the report, we have omitted sensitive information regarding particular legacy systems. Specifically, we have deleted systems’ names and other information that would identify the particular system, such as specific descriptions of the systems’ purposes and vulnerabilities. Although the information provided in this report is more limited, the report addresses the same objectives as the LOUO report and is based on the same audit methodology. We provided a draft of this report to agency officials to obtain their review and comments on the sensitivity of the information contained herein. We confirmed with the agency officials that this report can be made available to the public without jeopardizing the security of federal agencies’ legacy systems. To identify the most critical legacy systems in need of modernization, we first reviewed the agencies’ 2017 responses to congressional committees’ requests for information that identified the agencies’ top three legacy systems in need of modernization. We then asked the agencies to either confirm that those systems were still considered their top systems in need of modernization or update their lists to include the three systems most in need of modernization. All 24 agencies either confirmed or updated their lists of legacy systems most in need of modernization. This resulted in a collective list of 65 systems. However, due to sensitivity concerns, we are not disclosing the names of the systems in this report. Appendix II provides a generalized list of the systems. To develop a set of attributes for determining systems’ obsolescence and their need for modernization, we reviewed available technical literature, such as: General Services Administration’s Unified Shared Services Management’s Modernization and Migration Management (M3) Playbook and M3 Playbook Guidance, American Technology Council’s Report to the President on Federal IT Modernization, Office of Management and Budget’s Management of Federal High IBM Center for The Business of Government’s A Roadmap for IT Modernization in Government, and American Council for Technology-Industry Advisory Council’s Legacy System Modernization: Addressing Challenges on the Path to Success. We also consulted with system development experts within GAO and reviewed our prior report on federal legacy systems. Using these sources, we developed a set of 14 total attributes for determining systems’ obsolescence and their need for modernization. We then asked the agencies in our review to provide the associated details for the selected systems. We considered these details to rank the systems against the attributes that we compiled. We assigned point values to each system based on the systems’ agency-reported attributes. Table 4 details the nine attributes and associated point values and ranges we used to initially rank the legacy systems. We then totaled the assigned points for each legacy system and ranked the results from highest to lowest number of assigned points. While we had planned to select the top 20 systems with the most points for more detailed analysis, three systems were ranked in nineteenth place. As a result, we selected 21 systems for our review. We collected additional information on the 21 selected systems and performed a second round of analysis, scoring, and ranking. Based on the second set of scores, we identified the 10 systems with the highest scores as being the most critical legacy systems in need of modernization. We also supplemented our review with interviews of officials in the agencies’ offices of the Chief Information Officer and program offices for the selected legacy systems. Table 5 details the five attributes and associated point values and ranges we used to rank the legacy systems in the subsequent round of analysis. Table 6 lists these 10 selected systems according to their designated identifiers. However, due to sensitivity concerns, we substituted a numeric identifier for the name of each system. To evaluate agencies’ plans for modernizing the 10 federal legacy systems most in need of modernization, we requested that agencies provide us with the relevant plans. These modernization plans could have been contained within several types of documentation, since a system modernization could be a new system development, a system acquisition, or a renovation of the legacy system. For example, if an agency was acquiring a new system from a vendor, the plans for modernization could have been contained within an acquisition plan or a statement of work in a contract. Likewise, if an agency was developing a new system on its own, the modernization plans could have been within a project plan or design document. We reviewed government and industry best practice documentation on the identification and modernization of legacy systems, including: General Services Administration’s Unified Shared Services Management’s Modernization and Migration Management (M3) Playbook and M3 Playbook Guidance, American Technology Council’s Report to the President on Federal Office of Management and Budget’s Management of Federal High IBM Center for The Business of Government’s A Roadmap for IT Modernization in Government, and American Council for Technology-Industry Advisory Council’s Legacy System Modernization: Addressing Challenges on the Path to Success. Based on our reviews of these sources, we determined that agencies’ documented plans for system modernization should include, at a minimum, (1) milestones to complete the modernization, (2) a description of the work necessary to modernize the system, and (3) details regarding the disposition of the legacy system. We then analyzed agencies’ documented modernization plans for the selected systems to determine whether the plans included these elements. If an agency’s plans included milestones for only a portion of the initiative or only described a portion of the work necessary to complete the modernization, we assigned the agency a partial rating. Appendix III provides details on each of the selected systems and the agencies’ plans for modernizing them. To identify examples of successful IT legacy system modernization initiatives, we first asked each of the 24 agencies to provide us with examples of their successful modernization initiatives completed between 2014 and 2018. The agencies reported 94 examples of successful modernization initiatives. We also reviewed the agencies’ responses to congressional committees’ requests for information to determine other possible successful modernization initiatives at these agencies. Using the examples discovered in this process and the agency-provided examples, we then collected and reviewed documentation describing the modernization initiatives, such as case studies and the agencies’ written responses to our questions about the initiatives. We used our professional judgment to select examples that reflected a mix of different agencies, types of system modernization initiatives, and types of benefits realized from the initiatives. We ultimately included in our review those modernization initiatives that two or more members of our audit team selected as examples that reflected a mix of different agencies, types of system modernization initiatives, and types of benefits realized from the initiatives. We also coordinated with the selected agencies’ Offices of Inspector General to determine whether those offices had any past or current audit work that would contradict the agencies’ determination that the selected initiatives were successful. We conducted this performance audit from January 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Each of the 24 Chief Financial Officers Act agencies identified their agency’s most critical legacy systems in need of modernization. The agencies identified a total of 65 such systems. The agencies also identified various attributes of the legacy systems, including the systems’ age, hardware age, system criticality, and security risk. Table 7 provides a generalized list of the most critical legacy systems in need of modernization, as identified by the agencies, as well as selected factors related to each system’s age and criticality. (Due to sensitivity concerns, we substituted alphanumeric identifiers for the names of the agencies’ systems. Specifically, we assigned a number to identify each of the 10 most critical legacy systems in need of modernization that we discuss in this report and we assigned a letter or letters to identify the remaining 55 systems.) This appendix describes the 10 most critical legacy systems in need of modernization, as identified during our review. The profiles of each system describe (1) the system’s purpose, (2) the reason that the system needs to be modernized, (3) the agency’s plans for modernization, and (4) possible benefits to be realized once the system is modernized. The Department of Defense (DOD)—U.S. Air Force’s System 1 provides configuration control and management to support wartime readiness and operational support of aircraft, among other things. See figure 1 for a photograph of airmen maintaining an aircraft. The Department of Education’s (Education) System 2 processes and stores student information and supports the processing of federal student aid applications. Education first implemented System 2 in 1973. Agency officials stated that the system runs approximately 1 million lines of Common Business Oriented Language (COBOL) on an IBM mainframe. COBOL is a legacy language that can be costly to maintain. The department noted that 18 contractors are employed to maintain the COBOL programming language for this and another system. Education officials stated that the agency would like to modernize System 2 to eliminate reliance on COBOL, simplify user interactions, improve integration with other applications, respond to changing business requirements more quickly, and decrease development and operational costs. Education officials stated that the agency intends to modernize System 2 as part of its Next Generation Financial Services Environment initiative. This initiative is to modernize Federal Student Aid’s technical and operational architecture and improve the customer experience. The agency expects to consolidate all customer-facing websites and implement a new loan servicing platform to benefit federal student loans. Education has not developed a plan for the modernization of System 2. According to agency officials, these plans are pending the results of a comprehensive information technology (IT) visualization and engineering project that will determine which IT systems and services could be feasibly modernized, consolidated, or eliminated. While Education has not calculated the specific cost savings associated with modernizing System 2, the department anticipates potential cost savings, including decreased hardware and software licensing costs and decreased costs associated with changes to business rules. According to the agency, other potential benefits of modernizing this system include integration across the enterprise, improved cybersecurity and data protection, reduced system complexity, and improved system efficiency. The Department of Health and Human Services’ (HHS) System 3 is a clinical and patient administrative information system. HHS’s component, Indian Health Service’s (IHS) uses the system to gather, store, and display clinical, administrative, and financial information on patients seen in a clinic, hospital, or remotely through the use of telehealth and home visit practices. HHS officials stated that the modernization of System 3 is imperative. Specifically, the agency noted that the system’s technical architecture and infrastructure were outdated. This has resulted in challenges in developing new capabilities in response to business and regulatory requirements. Further, System 3 is coded in C++ and MUMPS. MUMPS is a programming language that HHS considers to be a legacy language. The agency noted that it has become increasingly difficult to find programmers proficient in writing code for MUMPS. Lastly, the system’s more than 50 modules were added over time to address new business requirements. The software is installed on hundreds of separate computers, which has led to variations in the configurations at each site. According to IHS, this type of add-on development becomes detrimental over time and eventually requires a complete redesign to improve database design efficiency, process efficiency, workflow integration, and graphical user interfaces. While the agency does not yet have modernization plans, in September 2018, HHS awarded a contract to conduct research for modernizing IHS’s health information technology (IT) infrastructure, applications, and capabilities. According to the department, the research will be conducted in several stages over the next year, and a substantial part of the research will be an evaluation of the current state of health IT across IHS’s health facilities. Once the research is conducted, in consultation with IHS and its stakeholders, the contractor will use the findings and recommendations to propose a prioritized roadmap for modernization. According to HHS, the agency will be completing the modernization initiative over the next 5 years, but anticipated that it may be able to begin to execute an implementation plan as early as 2020. With regards to potential cost savings, HHS noted that the modernization will take significant capital investment to complete and it is unknown whether the modernization will lead to cost savings. HHS officials stated that this modernization could improve interoperability with its health care partners, the Department of Veterans Affairs and the Department of Defense, and significantly enhance direct patient care. The Department of Homeland Security—Federal Emergency Management Agency’s (FEMA) System 4 consists of routers, switches, firewalls, and other network appliances (all referred to as devices) to support the connectivity of FEMA sites. According to the agency, System 4 needs to be modernized because there are significant cyber and network vulnerability risks associated with its end of life (i.e., no longer supported or manufactured by the vendor) devices. In particular, the system’s devices typically require replacement every 3 to 5 years from the date of purchase. Despite this, the majority of the hardware was purchased between 8 and 11 years ago. As of December 2018, about 545 of these devices were at the end of life. In a security assessment report performed in September 2018, System 4 received 249 security findings, of which 168 were high or critical risk to the system. Further compounding this issue, the agency is not certain exactly how many devices make up the system. In particular, FEMA officials stated that the vendor completed an inventory of devices in May 2018, but that inventory did not align with other inventory counts. As a result, the agency plans to develop an inventory reconciliation strategy and process to address this issue. FEMA intends to replace System 4’s devices in two phases. The first phase will target the agency’s smaller facilities, while the second phase is to address the larger facilities, which may require more complex installations. FEMA’s Office of the Chief Information Officer is conducting site surveys to better define requirements and cost estimates. While the agency has yet to develop finalized modernization plans for this initiative with milestones, DHS officials and contract information technology staff developed a list of future recommended activities that would help modernize the system as part of their November 2018 quarterly business review. Despite the lack of finalized plans, FEMA intends to replace 240 of the 545 devices that are at the end of support, if funds are available. The agency also intends to upgrade the remaining 305 devices in the future, if funds are available. The agency has not calculated the exact amount of cost savings. Once the system is completely updated and a lifecycle replacement operations and maintenance support plan is in place and funded, FEMA and DHS expect to realize cost savings based on new technology and increased throughput. Further, the agency stated that with new equipment, it would be able to meet mission requirements and take advantage of new technologies. In addition, replacing these unsupported devices would significantly reduce downtime and increase network availability. The Department of the Interior’s (Interior) System 5 is an Industrial Control System (ICS) Supervisory Control and Data Acquisition (SCADA) System that supports the general operation of dams and power plants on a particular river and its tributaries. The system serves its customers by, among other things, starting and stopping the generators, adjusting the output of electricity to assure electric grid stability, and monitoring the operating conditions of dam and power plant equipment. Figure 2 shows an example of an Interior dam. The system is approximately 18 years old and contains obsolete hardware that is not supported by the manufacturers. Further, according to a program official, the system’s original hardware and software installation did not include any long-term vendor support. Thus, any original components that remain operational may have had long-term exposure to security and performance weaknesses. In January 2014, the Director of National Intelligence testified that ICS and SCADA systems used in electrical power distribution provided an enticing target to malicious actors and that, although newer architectures provide flexibility, functionality, and resilience, large segments of the systems remain vulnerable to attack, potentially causing significant economic or human impact. Further, according to Interior’s system modernization plans, the agency needs to modernize the system in order to increase data collection capabilities and security. Specifically, the system is expected to interface with more plant equipment and collect and report on more data than it has in the past. According to Interior’s plans, the modernized system is expected to accommodate future growth requirements. The plans also support the complete replacement of the system’s obsolete hardware and software. The modernization plans also outline goals, milestones, and the work to be accomplished. The agency plans to complete the modernization by January 2020. By replacing the legacy system, Interior plans to realize a number of potential benefits, including annual cost savings of $152,000. In addition, the system will no longer run on obsolete, unsupported hardware. Furthermore, newer software and hardware are expected to allow for the automation of compliance tasks, increase system security, and expand system availability. According to the system’s fiscal year 2017 operational analysis, these benefits should create a more reliable system for both the agency and the customers of the networked hydroelectric dams. The Department of the Treasury’s Internal Revenue Service’s (IRS) System 6 contains taxpayer data. Many IRS processes depend on output, directly or indirectly, from this data source. System 6 was written in a now outdated assembly language code and Common Business Oriented Language (COBOL). The department and we have raised a number of concerns related to this system’s reliance on assembly language code and COBOL, the maintainability of the system, and staff attrition. For example, in May 2016, we reported that legacy systems using outdated languages may become increasingly more expensive and agencies may pay a premium to hire staff or contractors with the knowledge to maintain these systems. IRS plans to address these concerns by modernizing core components of System 6. The new system is intended to provide improved functionality. However, IRS is having trouble fully staffing the modernization effort, resulting in significant delays. While the agency has developed modernization plans, they are incomplete. For example, the plans’ milestones do not go past the current project and their descriptions of the work necessary to complete the project are at a higher level when outlining the goals of future stages. In May 2019, the agency stated that even when the current modernization effort is fully implemented, only a portion of the work required to retire the legacy system will have been completed. The agency has not provided a target date for decommissioning the legacy system. While IRS does not anticipate cost savings associated with the modernization of this system, it anticipates many internal and external benefits for both the taxpayer and the agency. In particular, according to the IRS’s Fiscal Year 2019 Capital Investment Plan, the benefits of modernizing this system include: (1) increased agility of agency response to changing taxpayer priorities and legislation; (2) reduced IT costs and complexity; (3) enhanced analytics and reporting to greatly improve compliance and issue resolution; and (4) reduced burden of manually intensive processes on IRS employees, by enabling automated calculations that currently are not possible. The Department of Transportation’s (Transportation) Federal Aviation Administration’s (FAA) System 7 contains information on aircraft and pilots. The system also provides information to other government agencies, including those responsible for homeland security and investigations of aviation accidents. According to Transportation, the system is DOS-based and needs to be updated to continue to efficiently meet its mission. Specifically, some of the core system components are mainframe applications that have been in operation since 1984. In addition, the system is running unsupported software, including one operating system that was last supported by the vendor in 2010. FAA is planning to implement a new system to streamline processes, allow for the submission of electronic applications and forms, automate registration processes, improve data availability, and implement additional security controls. However, the agency does not currently have a documented modernization plan. Officials stated that the agency is seeking alternatives to modernize the system and meet legislative requirements. FAA has asked interested vendors to respond to a request for information. According to the agency, the responses to this request are intended to inform strategic decisions about the modernization, and are planned to ultimately lead to proposed solutions from industry. While FAA has not calculated the specific cost savings associated with modernizing the system, the agency stated that it anticipates potential cost savings. Agency officials stated that they plan to have information on the anticipated cost savings in November 2019. The agency also expects that the modernized system will provide enhanced security. The Office of Personnel Management’s (OPM) System 8 consists of the hardware, software, and service components that support OPM’s information technology (IT) applications and services. This system supports the agency’s business functions and supports the agency in providing investigative products and services for more than 100 federal agencies. Modernizing this system is especially important due to past security incidents and persistent security concerns. Specifically, according to OPM, segments of the agency’s infrastructure were allowed to age beyond end of life and now pose a significant risk in performance and security to IT operations. Further, in October 2017, OPM’s Office of the Inspector General (OIG) reported that the agency’s IT environment contained many instances of unsupported software and hardware, where the vendor no longer provided patches, security fixes, or updates for the software. As a result, the OIG noted that there was increased risk that OPM’s IT environment contained known vulnerabilities that would never be patched, and could have been exploited to allow unauthorized access to data. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. At a June 2015 Congressional hearing, OPM’s Director stated that the modernization of the IT infrastructure was critical to protecting the agency’s data from adversaries. The Director also stated that it was not feasible to implement encryption on networks that were too old, but noted that OPM was taking other steps to secure the networks. OPM plans to modernize System 8 by upgrading hardware at the end of life, migrating off of legacy operating systems and support software, and augmenting the agency’s established policies and procedures. In fiscal year 2018, OPM completed software and hardware upgrades, including replacement of core switches, network end points, and laptops. In fiscal year 2019, the agency plans to continue its focus on refreshing aged IT infrastructure, so that its hardware components will have the proper vendor support. OPM developed multiple documents related to the planning of this modernization effort, including a modernization schedule, and its fiscal year 2019 budget justification. However, the modernization plans contained in these documents did not include details for the entire modernization effort. The milestones in these documents, for instance, were either no longer current or only contained milestones regarding one part of the project. While the budget justification did outline what it planned to accomplish in fiscal years 2018 and 2019, it did not mention the rest of the work needed to complete the infrastructure modernization. Similarly, the OIG has reported concerns regarding the agency’s plans to modernize its infrastructure. Most recently, in June 2018, the OIG reported that OPM was generally continuing in the right direction toward modernizing its IT environment, but the OIG had concerns with the agency’s plan for modernization and its overall approach to IT modernization. For example, the OIG was concerned that OPM’s planning documents did not identify the full scope of the modernization effort or contain cost estimates for the individual initiatives or the effort as a whole. The OIG planned to monitor and continue to report on the agency’s progress in modernizing its infrastructure. OPM anticipates realizing both financial and nonfinancial benefits with the modernization of its infrastructure. For example, as a part of its overall infrastructure modernization, the agency avoided approximately $16 million in costs as part of its data center consolidation efforts for fiscal year 2018. The agency also expects that cybersecurity and operational risks associated with end of life hardware will be reduced. To that end, the agency stated that remediating end of life hardware also should allow OPM the ability to address identified security vulnerabilities and avoid operational downtime, as support is more readily available. The Small Business Administration’s (SBA) System 9 is a system that, according to the agency, provides identification, authentication, and authorization services for several of the agency’s applications. According to the agency, the system was developed by SBA and originally implemented in 2002. Agency officials stated that System 9’s hardware and software are no longer supported by the associated vendors. Consequently, according to the agency, it is paying for extended support contracts that have increased operating costs for the system. Further, agency officials stated that the system resides on a platform that is scheduled to be decommissioned within the next year. In addition, the system is coded using a programing language that the agency considers to be a legacy programming language (among others). The agency’s documented modernization plan includes milestones to complete the modernization and plans for the disposition of the legacy system following system modernization; however, the plan does not include a description of the work necessary to complete the modernization. However, agency officials stated that it intends to replace the system’s functionality with login.gov. Login.gov was developed and is maintained by the General Services Administration as a single sign-on trusted identity platform. Login.gov provides identification and authentication for applications and is intended to offer the public secure and private online access to participating government programs. However, according to the agency, since login.gov does not provide authorization controls, SBA intends to develop additional software to provide authorization controls beginning in March 2019. According to the agency, it does not anticipate any cost benefits from modernizing System 9. However, the agency expects that the security and stability of the system will increase. The Social Security Administration’s (SSA) System 10 supports the provision of particular Social Security benefits to eligible people. Currently, SSA collects detailed information from the recipients in person, by telephone, and via the internet on multiple platforms (e.g., desktops and hand-held devices), and from internal and external interface methods. System 10 is comprised of many applications that collect information, make payments, and communicate with SSA’s clients. According to SSA’s October 2017 information technology modernization plan, the agency needed to modernize its core systems, including System 10, because of complications related to their age and original system design. SSA’s modernization plan indicates that, since implementation, these systems had been subjected to constant modifications to incorporate changes in legislation, regulations, and policy. Through the years, new technologies and capabilities had been integrated into the core systems and delivering new capabilities was becoming exorbitantly expensive. Further, most of the agency’s systems, including System 10, are generally unconnected to each other, creating functional silos servicing independent lines of business. According to the agency, navigating these systems is challenging, and copying beneficiary data from system to system can result in data becoming out of sync. According to the agency’s modernization plan, SSA intends to replace its core systems, including System 10, with new components and platforms, engineered for usability, interoperability, and future adaptability. Work accomplished over several years of incremental modernization has already resulted in moving a substantial portion of System 10 away from old technologies. For instance, according to SSA officials in the Office of the Deputy Commissioner, Systems, SSA moved System 10 to a modern, relational database platform and modernized aspects of the user interface. According to an SSA 5-year modernization roadmap, the agency is currently working to modernize and create web services as a part of the effort to consolidate SSA’s initial claims processes; however, the roadmap does not offer specific information about these efforts. As for its modernization planning efforts, SSA’s plans include overall modernization goals, a high-level overview of the planned system architecture, milestones for fiscal year 2018, and a description of the work that it had planned to accomplish in fiscal year 2018. However, the plans do not include either System 10-specific milestones or a description of the work necessary to modernize the legacy system beyond fiscal year 2018. Further, the document does not include plans for the disposition of the legacy system after modernization. According to officials in the Office of the Deputy Commissioner, Systems, the agency will update the planning documentation and make further decisions as the modernization effort progresses. SSA expects that modernizing System 10 will result in cost savings in addition to many other benefits. For instance, the agency expects that it will be able to save approximately $38 million from modernizing System 10 and other systems running in the agency’s mainframe environment. In addition, increased staff access to benefit recipients’ data will enable staff to review medical evidence faster and process claims more accurately, among other things. According to the agency’s modernization plan, the improvements to the system should improve productivity and service to the public, as well as reduce the number of improper payments due to technician error. Error! No text of specified style in document. Appendix VIII: Comments from the Office of Personnel Management Error! No text of specified style in document. Appendix IX: Comments from the Small Business Administration Error! No text of specified style in document. Error! No text of specified style in document. Error! No text of specified style in document. Error! No text of specified style in document. Appendix XIII: GAO Contact and Staff Acknowledgments Error! No text of specified style in document. In addition to the contact name above, the following staff made key contributions to this report: Dave Powner (Director), Kevin Walsh (Assistant Director), Jessica Waselkow (Assistant Director), Chris Businsky, Rebecca Eyler, Angel Ip, and Meredith Raymond.", "summary": "The federal government plans to spend over $90 billion in fiscal year 2019 on IT. About 80 percent of this amount is used to operate and maintain existing IT investments, including aging (also called legacy) systems. As they age, legacy systems can be more costly to maintain, more exposed to cybersecurity risks, and less effective in meeting their intended purpose. GAO was asked to review federal agencies' legacy systems. This report (1) identifies the most critical federal legacy systems in need of modernization and evaluates agency plans for modernizing them, and (2) identifies examples of legacy system modernization initiatives that agencies considered successful. To do so, GAO analyzed a total of 65 legacy systems in need of modernization that 24 agencies had identified. Of these 65, GAO identified the 10 most in need of modernization based on attributes such as age, criticality, and risk. GAO then analyzed agencies' modernization plans for the 10 selected legacy systems against key IT modernization best practices. The 24 agencies also provided 94 examples of successful IT modernizations from the last 5 years. In addition, GAO identified other examples of modernization successes at these agencies. GAO then selected a total of five examples to highlight a mix of system modernization types and a range of benefits realized. This is a public version of a sensitive report that is being issued concurrently. Information that agencies deemed sensitive has been omitted. Among the 10 most critical legacy systems that GAO identified as in need of modernization (see table 1), several use outdated languages, have unsupported hardware and software, and are operating with known security vulnerabilities. For example, the selected legacy system at the Department of Education runs on Common Business Oriented Language (COBOL)—a programming language that has a dwindling number of people available with the skills needed to support it. In addition, the Department of the Interior's system contains obsolete hardware that is not supported by the manufacturers. Regarding cybersecurity, the Department of Homeland Security's system had a large number of reported vulnerabilities, of which 168 were considered high or critical risk to the network as of September 2018. Of the 10 agencies responsible for these legacy systems, seven agencies (the Departments of Defense, Homeland Security, the Interior, the Treasury; as well as the Office of Personnel Management; Small Business Administration; and Social Security Administration) had documented plans for modernizing the systems (see table 2). The Departments of Education, Health and Human Services, and Transportation did not have documented modernization plans. Of the seven agencies with plans, only the Departments of the Interior and Defense's modernization plans included the key elements identified in best practices (milestones, a description of the work necessary to complete the modernization, and a plan for the disposition of the legacy system). Until the other eight agencies establish complete modernization plans, they will have an increased risk of cost overruns, schedule delays, and project failure. In the sensitive report, GAO is making a total of eight recommendations—one to each of eight agencies—to ensure that they document modernization plans for the selected legacy systems. The eight agencies agreed with GAO's findings and recommendations, and seven of the agencies described plans to address the recommendations.", "document_type": "gao"}
{"report": "As we reported in October 2019, the federal government has invested in projects that may enhance climate resilience but does not have a strategic approach for investing in high-priority climate resilience projects. Some federal agencies have made individual efforts to manage climate change risk within existing programs and operations, and these efforts may convey climate resilience benefits. For example, the U.S. Army Corps of Engineers’ civil works program constructs flood control projects, such as sea walls, that could convey climate resilience benefits by protecting communities from storms that may be exacerbated by climate change. However, even with individual agency efforts, federal investment in projects specifically designed to enhance climate resilience to date has been limited. As we stated in our Disaster Resilience Framework, most of the federal government’s efforts to reduce disaster risk are reactive, and many revolve around disaster recovery. As a result, we reported in October 2019 that additional strategic federal investments may be needed to manage some of the nation’s most significant climate risks because climate change cuts across agency missions and presents fiscal exposures larger than any one agency can manage. Our analysis shows the federal government does not strategically identify and prioritize projects to ensure they address the nation’s most significant climate risks. In addition, our October 2019 report discusses our past work that shows an absence of government-wide strategic planning for climate change. For example, in our March 2019 update to our high-risk list, we reported that one area of government-wide action needed to reduce federal fiscal exposure is in the federal government’s role as the leader of a strategic plan that coordinates federal efforts and informs state, local, and private- sector action. For this 2019 update, we assessed the federal government’s progress since 2017 related to climate change strategic planning against five criteria and found that the federal government had not met any of the criteria for removal from the high-risk list. Specifically, since our 2017 high-risk update, four ratings regressed to “not met” and one remained unchanged as “not met.” Also, although we have made 17 recommendations that address improving federal climate change strategic planning, as of August 2019, no action had been taken toward implementing 14 of those recommendations—including one dating from 2003. Our enterprise risk management framework calls for reviewing risks and selecting the most appropriate strategy to manage them. However, no federal agency, interagency collaborative effort, or other organizational arrangement has been established to implement a strategic approach to climate resilience investment that includes periodically identifying and prioritizing projects. Such an approach could supplement individual agency climate resilience efforts and help target federal resources toward high-priority projects. Six key steps provide an opportunity for the federal government to strategically identify and prioritize climate resilience projects for investment, based on our review of reports (including a National Academies report and the U.S. Global Change Research Program’s Fourth National Climate Assessment) that discuss adaptation as a risk management process, as well as on international standards, our past work (including our enterprise risk management criteria), and interviews with stakeholders. The six key steps are (1) defining the strategic goals of the climate resilience investment effort and how the effort will be carried out, (2) identifying and assessing high-risk areas for targeted resilience investment, (3) identifying potential project ideas, (4) prioritizing projects, (5) implementing high-priority projects, and (6) monitoring projects and climate risks. (See fig. 1.) In our October 2019 report, we used one domestic and one international example to illustrate these key steps: Louisiana’s Coastal Protection and Restoration Authority (CPRA) coastal master planning effort and Canada’s Disaster Mitigation and Adaptation Fund (DMAF). In the domestic example, to address the lack of strategic coordination, in 2005 the state of Louisiana consolidated coastal planning efforts previously carried out by multiple state entities into a single effort, led by CPRA. CPRA periodically identifies high-priority coastal resilience projects designed to address two primary risks: flooding and coastal land loss. To identify potential projects, CPRA sought project proposals from citizens, nongovernmental organizations, and others. To prioritize projects, CPRA used quantitative modeling to estimate project outcomes under multiple future scenarios of varied climate and other conditions and coordinated with stakeholders to understand potential project impacts. CPRA has published three coastal master plans in which it identified and evaluated potential projects. For example, in its 2017 Comprehensive Master Plan for a Sustainable Coast, CPRA identified $50 billion in high- priority projects to be implemented as funding becomes available. In the international example, in 2018 the Canadian government launched the DMAF, a financial assistance program, to provide $1.5 billion (in U.S. dollars) over 10 years for large-scale, nationally significant projects to manage natural hazard risks, including those triggered by climate change. Infrastructure Canada, the entity responsible for administering the DMAF, seeks project ideas from provinces and territories, municipal and regional governments, indigenous groups, and others. These entities apply directly to Infrastructure Canada for funding. According to Canadian officials, two committees of experts—one composed of experts from other federal departments and the other composed of nonfederal experts (e.g., urban planners and individuals with regional expertise)—provide feedback on potential projects. These projects are prioritized based on multiple criteria such as the extent to which they reduce the impacts of natural disasters. As we reported in October 2019, on the basis of our review of relevant reports and our past work, interviews with stakeholders, and illustrative examples, we identified two options—each with strengths and limitations—for focusing federal funding on high-priority climate resilience projects. The options are (1) coordinating funding provided through multiple existing programs with varied purposes and (2) creating a new federal funding source specifically for investment in climate resilience. In addition, our analysis of these sources identified opportunities to increase the climate resilience impact of these two funding options. A strength of coordinating funding from existing sources is access to multiple funding sources for a project. For example, one stakeholder we interviewed whose community used federal funding to implement large- scale resilience projects said that having multiple programs is advantageous because when funding from one program is not available— such as when the project does not match that program’s purpose or when there are insufficient funds—funds could be sought from another program. The state of Louisiana’s coastal master planning effort also uses multi-program coordination to fund projects. Specifically, funding for high-priority resilience projects identified in the master plan is provided via several federal and nonfederal programs designed for wetlands restoration, hurricane risk reduction, oil spill recovery, and community development, among other purposes. A limitation of that option, according to CPRA officials, is that coordinating funding from multiple sources could be administratively challenging and could require dedicated staff to identify programs, assess whether projects meet program funding criteria, apply for funds, and ensure program requirements are met. Alternatively, one strength of creating a new federal funding source, such as a federal financial assistance program that could provide loans or grants or a climate infrastructure bank, is that it could encourage cross- sector projects designed to achieve benefits in multiple sectors. For example, according to one stakeholder, such a funding source could allow experts from multiple sectors—such as infrastructure, housing, transportation, and health—to collaborate on projects, leading to more creative, comprehensive approaches to enhance community resilience. However, such a new funding source would have to be created, which would require congressional authorization. In addition, we identified opportunities to increase the climate resilience impact of federal funding options based on our review of our past work, related reports, an international standard, and the Louisiana and Canadian examples, as well as interviews with stakeholders: Using both existing and new funding options. Several stakeholders told us that using both funding options—multiple, existing federal programs with varied purposes and a new funding source for high-priority climate resilience projects—in a strategic, coordinated way could help increase the impact of federal investment. Two stakeholders told us that in practice, multiple, existing federal funding sources that are not specific to climate resilience could be coordinated to fund projects when their purposes and rules align and adequate funding is available. A funding source specifically for climate resilience could be used to fund proposed projects when no related program exists or when existing programs do not have sufficient funding available, according to these and other stakeholders. Helping ensure adequate and consistent funding. Several stakeholders we interviewed identified the need for adequate and consistent funding to implement high-priority climate resilience projects. For example, according to one stakeholder we interviewed, inconsistent, inadequate funding makes it difficult to complete large- scale projects and can lead to additional costs if significant delays occur during which existing work deteriorates. In addition to adequate and consistent funding, funding options should be designed to accommodate long-term projects since high-priority climate resilience projects can take multiple years to design and implement, according to two stakeholders we interviewed. Encouraging nonfederal investment. Several stakeholders we interviewed told us that the federal government could use a federal climate resilience investment effort to encourage nonfederal investment in high-priority climate resilience projects, thereby increasing the impact of federal investment. For example, several stakeholders identified the importance of a cost-share component so that funding recipients are invested in a project’s success. Canada’s DMAF encourages nonfederal investment by partially funding projects of national significance and requiring different levels of cost-share from funding recipients, ranging from 25 percent for indigenous recipients to 75 percent for private-sector and other for-profit recipients. Several stakeholders also identified potential funding mechanisms—for example, public-private partnerships and loan guarantees—that could leverage federal dollars to encourage additional investment in climate resilience projects by nonfederal entities, including the private sector. Encouraging complementary resilience activities. To increase the impact of federal investment in climate resilience, a federal investment effort presents an opportunity to encourage complementary resilience activities by nonfederal actors such as states, localities, and private- sector partners, based on interviews with several stakeholders, the Canadian example, and reports we reviewed. For example, this could include establishing conditions that funding recipients must meet in exchange for receiving federal funding. Alternatively, the federal government could use incentives (e.g., providing greater federal cost- share or giving additional preference in the project prioritization process) to encourage complementary resilience activities by nonfederal actors. Our Disaster Resilience Framework states that incentives can make long-term, forward-looking risk reduction investments more viable and attractive among competing priorities. The federal government could use these conditions and incentives to encourage several types of complementary resilience activities by nonfederal actors. For example, the federal government could encourage the use and enforcement of building codes that require stronger risk-reduction measures. In addition, a federal investment effort could provide an opportunity to encourage communities to limit or prohibit development in high-risk areas to minimize risks to people and assets exposed to future climate hazards. One example of this would be through zoning regulations. Another stakeholder suggested that communities receiving federal funding for resilience projects should be adequately insured against future climate risks so they have a potential source of funding for rebuilding in the event of a disaster. Allowing funds to be used at various stages of project development. Several stakeholders suggested that federal funds be used for multiple stages of project development—such as project design, implementation, or monitoring—to increase the impact of federal funds. For example, two stakeholders we interviewed told us that resilience projects can require significant amounts of design work to develop an implementable and effective project concept and that making funds available for project design could improve the quality of project proposals, thereby maximizing the impact of federal funds. In addition to providing federal funds for project design, one stakeholder suggested making federal funding available to measure project outcomes (e.g., how effectively projects increased resilience) to improve future decisions by both the federal government and others making resilience investments. Based on the findings of our October 2019 report, we recommended that Congress consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. Such an arrangement could be designed using the six key steps for prioritizing climate resilience investments and the opportunities to increase the climate resilience impact of federal funding options that we identified in our report. Chairwoman Castor, Ranking Member Graves, and Members of the Select Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Mark Gaffigan at (202) 512-3841 or gaffiganm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff members who made key contributions to this testimony and the underlying report are Joseph “Joe” Thompson (Assistant Director), Celia R. Mendive (Analyst in Charge),Taiyshawna Battle and Paige Gilbreath. Also contributing to this report were Alicia Puente Cackley, Colleen M. Candrl, Kendall Childers, Steven Cohen, Christopher Curry, Cindy Gilbert, Kathryn Godfrey, Holly Halifax, Carol Henn, Susan Irving, Richard Johnson, Gwendolyn Kirby, Joe Maher, Gregory Marchand, Diana Maurer, Kirk Menard, Tim Persons, Caroline N. Prado, William Reinsberg, Oliver Richard, Danny Royer, Jeanette Soares, Kiki Theodoropoulos, Sarah Veale, Patrick Ward, Jarrod West, Kristy Williams, Eugene Wisnoski, and Melissa Wolf. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Since 2005, federal funding for disaster assistance has totaled at least $450 billion, including a 2019 supplemental appropriation of $19.1 billion for recent disasters. In 2018 alone, 14 separate billion-dollar weather and climate disaster events occurred across the United States, with total costs of at least $91 billion, including the loss of public and private property, according to the National Oceanic and Atmospheric Administration. Disaster costs likely will increase as certain extreme weather events become more frequent and intense due to climate change, according to the U.S. Global Change Research Program, a global change research coordinating body that spans 13 federal agencies. In 2013, GAO included “Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks” on its high-risk list. The cost of recent weather disasters has illustrated the need to plan for climate change risks and invest in climate resilience, which can reduce the need for far more costly steps in the decades to come. This statement summarizes GAO’s findings from its October 2019 report on climate resilience and federal investment (GAO-20-127). Specifically, it focuses on (1) the extent to which the federal government has a strategic approach for investing in climate resilience projects; (2) key steps that provide an opportunity to strategically prioritize projects for investment; and (3) the strengths and limitations of options for focusing federal funding on these projects. To perform this work, GAO reviewed about 50 relevant reports and interviewed 35 stakeholders with expertise in climate resilience and related fields, including federal officials, researchers, and consultants. GAO also identified domestic and international examples of governments that invest in climate resilience and related projects. The federal government has invested in individual projects that may enhance climate resilience, but it does not have a strategic approach to guide its investments in high-priority climate resilience projects. In GAO’s March 2019 update to its list of federal programs at high risk for fraud, waste, abuse, and mismanagement, or most in need of transformation, GAO reported that one area of government-wide action needed to reduce federal fiscal exposure is in the federal government’s role as the leader of a strategic plan that coordinates federal efforts and informs state, local, and private-sector action. For this 2019 update, GAO assessed the federal government’s progress since 2017 related to climate change strategic planning against five criteria and found that the federal government had not met any of the criteria for removal from the high-risk list. Further, as of August 2019, no action had been taken to implement 14 of GAO’s 17 recommendations to improve federal climate change strategic planning. Additionally, no federal agency, interagency collaborative effort, or other organizational arrangement has been established to implement a strategic approach to climate resilience investment that includes periodically identifying and prioritizing projects. Such an approach could supplement individual agency climate resilience efforts and help target federal resources toward high-priority projects. Based on its review of prior GAO work, relevant reports, and stakeholder interviews, GAO found six key steps that provide an opportunity for the federal government to strategically identify and prioritize climate resilience projects for investment. These are (1) defining the strategic goals of the climate resilience investment effort and how the effort will be carried out, (2) identifying and assessing high-risk areas for targeted resilience investment, (3) identifying potential project ideas, (4) prioritizing projects, (5) implementing high-priority projects, and (6) monitoring projects and climate risks. GAO also identified two options—each with strengths and limitations—for focusing federal funding on high-priority climate resilience projects. The options are (1) coordinating funding provided through multiple existing programs with varied purposes and (2) creating a new federal funding source specifically for investment in climate resilience. In addition, GAO identified opportunities to increase the impact of federal funding options on climate resilience, including ensuring adequate and consistent funding and encouraging nonfederal investment in climate resilience. Congress should consider establishing a federal organizational arrangement to periodically identify and prioritize climate resilience projects for federal investment. Such an arrangement could be designed using the six key steps for prioritizing climate resilience investments and the opportunities to increase the climate resilience impact of federal funding options that GAO identified in its October 2019 report.", "document_type": "gao"}
{"report": "The Secretary of Defense may enter into ACSAs with authorized countries and international organizations for the reciprocal provision of logistic support, supplies, and services with the military forces of that country or international organization. DOD describes ACSAs as bilateral agreements that allow exchanges of logistic support, supplies, and services between the United States and partners in return for reimbursement in the form of cash or the reciprocal provision of support. As of February 2020, DOD had signed 125 ACSAs, including five that had expired, which span DOD’s six geographic areas of responsibility identified in table 1. For a full list of past and present ACSA partners, see appendix II. According to DOD, it uses ACSAs primarily during wartime, combined exercises, training, deployments, contingency operations, humanitarian or foreign disaster relief operations, certain peace operations under the United Nations Charter, or for unforeseen or exigent circumstances. For example, ACSAs can give a commander increased flexibility to address logistical shortfalls in a contingency environment. DOD officials noted that the agreements provide DOD with flexibility, enhanced readiness at minimal cost, and increased military effectiveness by allowing partners and allies to access U.S. logistics capabilities and practice mutual support procedures, which is particularly valuable in planning international exercises and coalition operations. For example, DOD established ACSAs with 70 new partners during Operations Enduring Freedom and Iraqi Freedom, which together covered the 14 years from 2001 through 2014. DOD signed an additional 15 ACSAs from 2015 through February 2020. Figure 1 shows the cumulative growth in the number of ACSAs over time. Under 10 U.S.C. §2342, DOD is authorized to enter into ACSAs with governments of NATO countries, subsidiary bodies of NATO, and international organizations. DOD can also enter into ACSAs with governments of non-NATO countries, but must first designate the country eligible for an ACSA by following a process that includes consulting with State, determining that the designation is in the interests of national security, and notifying Congress of its intent to make the designation. Within DOD, the OUSD (A&S) is the focal point for establishing ACSAs, as of December 2019, and officials from that office request State’s authority to negotiate an ACSA and coordinate designees with DOD— typically Combatant Command staff—to negotiate and sign ACSAs. DOD officials told us that the amount of time it takes to negotiate and sign an ACSA varies because of a number of factors. For example, a lack of urgency or the complicated legal context of a potential partner can extend negotiations. As a result, the amount of time it takes to negotiate and sign an ACSA has varied greatly, from less than 1 year to more than 25 years. After an agreement is signed, State is required to notify Congress about international agreements that enter into force, including ACSAs. Although, according to agency documentation, most ACSAs enter into force at the time they are signed, an ACSA may enter into force on a later date, depending on the conditions outlined in each agreement. According to State officials, ACSAs, like some other international agreements, may be applied provisionally (the agreement has been signed and transactions may be executed) prior to entering into force. Figure 2 illustrates the process by which DOD and State generally establish new ACSAs. The Secretary of Defense generally delegates the responsibilities of managing ACSA implementation to various components including the OUSD (A&S), Chairman of the Joint Chiefs of Staff (CJCS), defense agencies, military departments and service components, Combatant Commands, and subordinate unified commands. Responsibilities and procedures for implementing ACSA transactions are set forth in DOD guidance and regulations including CJCS Instruction (CJCSI) 2120.01D, DOD Directive 2010.9, and DOD’s Financial Management Regulation. For example, CJCSI 2120.01D calls for military departments and defense agencies to appoint primary ACSA program managers charged with maintaining financial and program records of all ACSA transactions. In addition to the primary guidance documents, DOD policy and legislation have modified ACSA implementation over time. For example, DOD issued memorandums in 2017, 2018, and 2019 to update or clarify requirements for managing ACSAs, and in October 2018, officials noted that DOD had begun a process to update each of the three primary guidance documents listed above. In addition, the NDAA for Fiscal Year 2020 was enacted on December 20, 2019, and Section 1203 modified the authorities related to ACSAs. The law includes a number of new requirements, including a requirement for the Secretary of Defense to designate an official who will have primary responsibility for overseeing and monitoring the implementation of ACSAs in coordination with the Under Secretary of Defense for Policy. Further, the law requires that, among other things, the Secretary of Defense shall prescribe regulations to ensure that adequate processes and controls are in place to provide for the accurate accounting of logistic support, supplies, and services received or provided under ACSAs. The legislation also instituted a new congressional notification requirement that DOD may not enter into an ACSA without notifying the appropriate congressional committees of its intent to do so at least 30 days in advance. DOD uses AGATRS as its system of record to create, track, and manage transactions executed under ACSAs. CJCSI 2120.01D requires the use of AGATRS to fully document all ACSA transfers of logistic support, supplies, and services. DLA has managed AGATRS since 2013, when, according to DLA officials, an updated version of the system was launched and historical data archived. As of November 2019, AGATRS included records of more than 31,000 ACSA sales and acquisitions orders authorized from fiscal years 2014 through 2019. According to DOD officials, AGATRS is the best source of automated information on ACSA transactions. According to DOD, it authorized more than 22,000 ACSA sale orders from October 2013 through September 2019 that provided approximately $5 billion of logistic support, supplies, and services for items ranging from water and fuel to bullets and munitions. Figure 3 shows examples of the types of support provided through ACSAs. According to AGATRS, more than 70 different DOD components executed ACSA order sales or acquisitions from October 2013 through September 2019. However, the seven components shown in table 2 accounted for about 92 percent of the reported total value and about 79 percent of the reported order volume. In addition to direct transactions, the retransfer of support may also occur under ACSAs. CJCSI 2120.01D describes these retransfers as transfers from the original recipient to another foreign government or international organization, or to any entity other than the officers, employees, or agents of the foreign country or international organization whose military originally received the logistic support, supplies, or services. DOD Directive 2010.9 prohibits the retransfer of ACSA support without the prior written consent of the U.S. government. DOD records indicate that it approved 11 ACSA retransfers with six different partners from 2003 through 2019. These approvals, listed in appendix III, involved at least 15 final foreign recipients. Eight of these recipients did not have an ACSA at the time of DOD’s authorization for a retransfer. For example, before DOD signed an ACSA with Saudi Arabia in 2016, DOD authorized a retransfer of general purpose bombs from the United Arab Emirates to Saudi Arabia to support its activities in Yemen. In August 2018, Congress amended 10 U.S.C. §2342 to prohibit DOD from using an ACSA to facilitate the transfer of logistic support, supplies, and services to a final recipient that has not signed an ACSA with DOD. DOD is responsible for providing information to Congress regarding its intent to designate non-NATO countries for an ACSA. Specifically, under 10 U.S.C. §2342, DOD must notify Congress of its intent to designate the government of a non-NATO country for an ACSA at least 30 days before making the designation. Of the 125 ACSAs DOD had signed as of February 2020, 21 were agreements with NATO countries and international organizations, which do not require congressional notification. For the remaining 104 agreements signed with the governments of non-NATO countries, DOD should have notified Congress at least 30 days before designating each country eligible for an ACSA. DOD records indicate that DOD transmitted notifications of its intent to designate at least 78 of the 104 countries as eligible for ACSAs. For these 78 ACSAs, we confirmed that notifications to Congress were dated on time, that is, at least 30 days before DOD signed the relevant agreements. However, as shown in figure 4, DOD did not have records of 26 of the 104 agreements for which DOD should have notified Congress, so we could not confirm whether the notifications had occurred. DOD estimates that these 26 notifications would have occurred between 1993 and 2009, with 20 being before or during 1996. According to DOD officials, DOD’s ACSA recordkeeping procedures are not documented and have changed over time, which contributes to gaps in DOD notification records. DOD officials told us that while they had endeavored to save notifications and signed agreements, they had not systematically tracked notifications for each partner. Neither DOD Directive 2010.9 nor CJCSI 2120.01D specifically call for DOD to track ACSA signature or congressional notification transmittal dates, but DOD officials noted that recordkeeping procedures such as scanning and maintaining documents should be part of commonly understood proper administration practices. In addition, several different DOD offices have been responsible for various aspects of ACSA management over the years. Each office, according to DOD officials, may have had different recordkeeping practices, including some that predated electronic records. Further, DOD officials had difficulties finding paperwork from offices not currently involved with ACSAs and those that no longer exist. Poor recordkeeping has affected DOD’s ability to provide Congress with full and accurate information about ACSAs. For example, DOD’s January 2019 report to Congress on ACSA activities included inaccurate and incomplete information on notification and signature dates, including some for which DOD did not have documentation. DOD included estimated Congressional notification transmittal dates for the agreements for which it could not locate supporting documentation. Moreover, DOD included incorrect ACSA signature dates in the report for 16 other agreements. DOD officials responsible for compiling the report told us that they made some of these errors because they used the inaccurate data available at the time. In November 2019, DOD officials told us that they intended to create a consolidated list of ACSA partners including the date of eligibility designations and agreement signatures for each partner to be kept updated through a joint effort by OUSD (A&S) and the Joint Staff. As of January 2020, DOD had not formalized these intentions in written guidance. Documenting and implementing recordkeeping procedures would help ensure that DOD can report accurate and complete information to Congress. While DOD is required to notify Congress about non-NATO partner eligibility for ACSAs, under 1 U.S.C. §112b (commonly referred to as “the Case-Zablocki Act”), State is required to notify Congress when any international agreement to which the United States is a party, other than a treaty, enters into force. Under the Case-Zablocki Act, State is required to provide this notification as soon as practicable after the agreement has entered into force, but in no event later than 60 days thereafter. In addition, the law requires any department or agency of the U.S. government that enters into any international agreement on behalf of the United States to transmit the text of such an agreement to State no later than 20 days after such agreement has been signed. Of the 125 signed ACSAs, State and DOD officials confirmed that, as of February 2020, 118 had entered into force and, as such, required State notification to Congress. State’s Office of the Assistant Legal Advisor’s Office of Treaty Affairs is responsible for receiving texts of signed international agreements from the agencies that signed them, for recordkeeping associated with such agreements, and for transmitting the texts of such agreements to Congress in accordance with the Case-Zablocki Act. As of February 2020, records for the 118 ACSAs that had entered into force indicate that State’s notifications to Congress for 68 (or 58 percent) were dated within 60 days, as required. However, 48 (or 41 percent) of the 118 notifications were late, that is, dated more than 60 days after entry into force, as shown in figure 5. According to agency records, these 48 agreements entered into force between 1995 and 2019. For two agreements that entered into force in 1983 and 2002, State records are insufficient to determine whether or not State notified Congress. For most of the 48 State notifications dated after the 60-day deadline, State attributed the delays to untimely DOD delivery of required information to State. Specifically, 32 (or 74 percent) of the 43 late notifications that included a reason for delayed transmittal attributed the cause to DOD elements having provided late or incomplete agreement information to State’s Treaty Office. As described above, because DOD enters into ACSAs on behalf of the United States, it must provide State the text of the agreements no later than 20 days after signing or otherwise concluding such an agreement, to facilitate State’s required notifications to Congress. However, DOD officials confirmed that they provided information on some ACSAs to State more than 20 days after signature. DOD officials and our analysis identified multiple causes that contributed to DOD’s providing information on newly signed ACSAs to State after the 20-day deadline: Procedural complications. Procedural complications can affect DOD’s ability to provide information to State within 20 days. For example, DOD officials noted that the standard DOD process to send a memo to State sometimes takes more than 20 days to complete. Further, for some agreements, DOD provided some information to State within 20 days, but did not include one or more necessary elements—such as a language certification if the agreement was signed in a language other than English—to determine whether such an agreement had been concluded. DOD officials told us that a significant amount of time can pass before they compile all the information State needs from DOD, resulting in State’s inability to send notifications within 60 days of entry into force, as required. Lack of experience. DOD officials told us that the relevant DOD officials had overlooked the responsibility to send information to State about newly signed ACSAs, at times because of a lack of experience. For example, they explained that DOD missed the 20-day deadline to send information to State about the 2017 ACSA signing with Mexico because it had been 10 years since officials from DOD’s Northern Command had negotiated an ACSA, and the officials had overlooked the requirement. Regarding two ACSAs about which State had not notified Congress as of September 2019, State officials told us they did not know those agreements had entered into force until we asked about their status. Subsequently, State notified Congress about one of these agreements in October 2019. For the second, as of February 2020, DOD had begun providing related information to State, and State was continuing to review related documentation to confirm that the agreement had entered into force. Inconsistent guidance. Our review of DOD’s guidance found inconsistent language describing when DOD should provide information to State about new ACSAs that could affect DOD’s transfer of such information. Specifically, the CJCSIs on international agreements and ACSAs note that DOD should provide State with information on new ACSAs no later than 20 days after an agreement is signed. However, DOD Directives on international agreements and ACSAs indicate that the relevant deadline is no later than 20 days after an agreement enters into force, which can be days or years after an ACSA is signed. DOD officials noted that the officials who drafted the guidance may not have understood the difference between the signing and entry into force of international agreements. Limitations in training. As of December 2019, DOD’s standard online training on ACSAs did not address responsibilities to share information about newly signed agreements with State. Specifically, while DOD’s two required training courses on ACSAs include some aspects of negotiation and signing new agreements, neither mentions DOD’s responsibility to report signed ACSAs to State. According to DOD officials, the requirement may be included during in-person training conducted by personnel from DOD’s Office of General Counsel for DOD’s combatant command officials. Congress depends on State and DOD for information to oversee the use of ACSAs, which DOD officials have cited as important tools for furthering national security interests, particularly involving activities with broad coalitions. Without timely notification of entry into force, Congress will not have full information about countries and international organizations to and from which DOD can and may already be using ACSAs to transfer logistic support, supplies, and services. CJCS Instruction 2120.01D contains policy and procedural guidance concerning the use of ACSA authorities, and addresses, among other things, maintenance of ACSA transaction orders. Specifically, the instruction establishes AGATRS as DOD’s system of record for the Joint Staff, Combatant Commands, and the Military Services to manage ACSA orders; describes processes to execute an ACSA order; and notes that AGATRS will be used to fully record all transfers of ACSA support, including documentation such as invoices. Additionally, federal standards for internal control state that management should use quality information to make informed decisions and achieve agency objectives. Quality information is defined as information that is accurate, complete, and provided on a timely basis, among other attributes, and should include relevant data obtained from reliable sources. However, based on our analysis of a generalizable sample of orders, we found that DOD’s ACSA system of record lacked quality data to track the status of ACSA order reimbursement. First, we found that DOD incorrectly recorded the reimbursement status in AGATRS of an estimated 7.3 percent of ACSA orders authorized from October 2013 through March 2018. For example, DOD recorded three of the 227 orders in our sample as completed, even though it had not received full reimbursement for them—including at least one order that it had ceased processing. DOD records included five orders recorded as incomplete despite having received full reimbursement. We also identified six orders that DOD either improperly categorized as ACSA transactions or orders that DOD should have cancelled because the related transaction never took place or was a duplicate. Second, DOD could not determine the reimbursement status of an estimated 12.2 percent of ACSA orders authorized from October 2013 through March 2018 in AGATRS. Based on our generalizable sample, DOD would not be able to locate records to verify the status of reimbursement for an estimated 1,100 ACSA orders with authorization dates ranging from this time period. With regard to the reimbursement status of these orders, a DOD official noted that DOD could not determine the status based on available information. As a result, DOD does not know if the orders have been reimbursed, were processed for reimbursement, or even took place. According to DOD officials, data quality lapses occur because DOD does not have a process in place to reconcile reimbursement information with data recorded in AGATRS. Although AGATRS is DOD’s system of record for ACSA transactions, DOD officials told us that the database does not have financial processing capabilities and is not integrated with DOD’s financial processing systems. As a result, ACSA personnel must manually update information in AGATRS as orders are processed in other financial systems, but do not always do so, according to DOD officials. A DOD official told us that the military services vary greatly in the extent to which they regularly populate AGATRS, and even within a service, some personnel are better than others at including complete information. DOD officials explained that personnel may delay or fail to update information in AGATRS for multiple reasons. First, personnel may be on temporary duty in an operational environment where they do not have a secure internet connection and thus cannot upload information into AGATRS. Second, short-term rotations of personnel in the field can result in delays as new personnel learn how to use AGATRS and process transactions. Third, after negotiating the transfer of support, drafting the order, and receiving a unique order number assignment in AGATRS, ACSA orders change frequently. These changes can include price adjustments that result in DOD or the partner deciding not to move forward with the transaction, or significantly revising it. In such situations, DOD officials told us that DOD should cancel orders in AGATRS, but does not always do so. Further, DOD does not have quality data to track the extent to which DOD processes ACSA transactions in accordance with statutory requirements. Under 10 U.S.C. §2345, payment-in-kind or exchange entitlements through ACSA transactions shall be satisfied within 12 months of the date of the delivery of logistic support, supplies, or services. However, DOD officials told us that they did not have the information necessary to track such compliance because AGATRS lacks a mechanism to track these data. DOD officials explained that AGATRS has a field to record the “delivery time” for an order, but that field does not require users to enter data in a standard format. Our review of AGATRS data found instances in which users left the field blank, entered date ranges as opposed to a single date, or entered text information about the delivery, such as how quickly it should occur. DOD officials noted that they could not use the information in this field to determine the extent to which orders were reimbursed within 12 months of delivery, as outlined in the statute. Instead of using the date of delivery, DOD officials stated, and our analysis confirmed, that DOD used an order’s date of authorization as an alternate metric to indicate whether an order was reimbursed within 12 months. However, DOD has transactions in which it delivers the support weeks or months after the order is authorized, according to DOD officials. When asked about such transactions, DOD officials acknowledged that the authorization date was not an appropriate alternate date to use to determine if ACSA orders were completed within 12 months of delivery. DOD has taken some steps—including several since we began our review—to improve tracking of ACSA orders in AGATRS, such as issuing memos reiterating requirements for personnel to use AGATRS, improving the system’s functionality, and updating relevant training. For example, in October 2018, DOD introduced additional categories of order status in AGATRS to track an order’s progress through the transaction process and in June 2019, DOD updated the AGATRS training course to reflect this and other updates to the system. Additionally, in October 2019, DOD updated AGATRS to help ensure that orders are assigned to appropriate DOD organizations and personnel in the system. According to DOD officials, as of October 2019, three military services were discussing processes that could improve record keeping and tracking for ACSA orders. For instance, U.S. Army officials told us that the Army had begun reconciling data from the service’s financial accounting system with information recorded in AGATRS to address data quality issues. However, DOD has not finalized or fully implemented most of these steps, which, even if implemented, would not address historical inaccuracies in DOD’s recorded data, according to DOD officials. According to DOD, from fiscal years 2014 through 2019, DOD used ACSAs to provide support valued at about $5 billion to foreign partners. Without a process to ensure that ACSA order data are accurate and without data to track the timeliness of transactions, DOD does not have sufficient information to oversee ACSA reimbursement. Section 2344(a) of Title 10 of the United States Code provides that the United States can use ACSAs to transfer logistic support, supplies, and services to partners in return for cash reimbursement or by replacement- in-kind or exchange of supplies or services of an equal value. DOD guidance and financial management regulations outline procedures for DOD to carry out these transactions and seek timely reimbursement. Additionally, federal standards for internal control state that management should perform ongoing monitoring as part of the normal course of operations to obtain reasonable assurance about the effectiveness of its internal controls. On the basis of a generalizable sample of ACSA orders recorded in AGATRS, we estimate that DOD received reimbursement for approximately 64 percent of ACSA orders recorded in AGATRS that it authorized from October 2013 through March 2018 (about 6,000), but did not receive full reimbursement for approximately 24 percent (about 2,300), as shown in figure 6. Some orders for which DOD did not receive full reimbursement included basic life support such as food, water, housing, and fuel, authorized in 2017. Further, DOD could not verify the accuracy of the reimbursement status for an estimated 12.2 percent of orders (about 1,100) recorded in AGATRS during this time period—meaning that for these orders, DOD could not verify whether it had requested or received reimbursement, or whether the transaction had occurred. The orders in this category included, for example, helicopter transportation authorized for a partner in 2015 and valued by DOD at almost $150,000. DOD officials identified several factors that contributed to unreimbursed ACSA orders, including: Lack of invoicing. DOD officials said that DOD had not received reimbursement for 39 of the 221 ACSA orders in our sample, valued by DOD at more than $700,000, because it had not sent invoices to request reimbursement from partners. According to the officials, DOD had not processed these orders for invoicing in part because it had not assigned the orders to the appropriate officials who manage financial processing. Officials from two military services told us that while they aim to have strong communication between the personnel who manage logistics and finance processes for ACSA orders, factors such as staff rotations, contingency environments, and delayed training may affect the efficiency of order processing. DOD officials also noted that missing or incorrect order information, such as an incorrect billing address for a partner nation, may delay invoicing. Delays from partner countries. For some unreimbursed orders in our sample, DOD officials explained that DOD had sent invoices to partner countries but, as of August 2019, had not received reimbursement. The average time from the date of invoice to the date of reimbursement was 208 days for reimbursed cash transactions in our sample of 221 orders authorized from October 2013 through March 2018, and the longest amount of time was 751 days. Lack of a monitoring process. According to DOD officials, DOD did not appropriately monitor the reimbursement status of some orders in our sample and does not have a process to monitor delinquent debt. For example, DOD officials explained that they could not verify reimbursement for some orders recorded as overdue in our sample because personnel had not closely monitored the status of these orders. Additionally, in response to our inquiries, DOD acknowledged that it would need to reassign certain overdue orders to appropriate officials for processing. Although AGATRS produces reports that identify overdue orders, DOD does not have an agency-wide process to monitor and take action on unreimbursed orders that become delinquent. DOD officials told us that the Defense Finance and Accounting Service (DFAS), responsible for some ACSA billing, sends letters to partners for delinquent ACSA bills 30, 60, and 90 days after the end of the billing period outlined under the terms of the ACSA. However, after 90 days, DOD does not have a standardized approach to continue seeking delinquent ACSA debt according to DOD officials. In 2018, DOD updated the section of its Financial Management Regulation that addresses the collection of debt owed by foreign entities, but according to DOD officials, DOD had not implemented the updated policy as of October 2019. Officials from DFAS explained that the policy had not been implemented because they were working with officials from the military services to evaluate possible debt collection procedures. Unless it takes steps to ensure that it processes and invoices ACSA orders as required, and seeks unpaid debt, DOD may not receive reimbursement for thousands of orders for which it has provided support. As of November 2019, DOD indicated that the department had authorized more than $1 billion in ACSA sale orders for which reimbursement is now overdue. Seeking reimbursement for these ACSA orders and implementing oversight processes will help ensure that the United States receives reimbursement for current and future orders under the terms of these agreements. In the past 5 years, DOD has exchanged billions of dollars in reimbursable ACSA support with military forces from more than 100 partner nations and international organizations through ACSA transactions. DOD uses ACSAs to exchange logistic support, supplies, and services with partners in a variety of circumstances, including international coalition efforts, such as those combating terrorist groups in Iraq and Syria. However, weaknesses in recordkeeping and management processes limit the extent to which agencies can (1) provide Congress with information requested for oversight and (2) monitor and secure reimbursement. First, DOD could not locate records related to required congressional notifications about designating 26 countries for an ACSA. Further, State transmitted almost half of its congressional notifications on ACSA entry into force after required deadlines, largely because DOD did not provide State with information about new agreements. Without full and timely information about new partners that DOD intends to designate for an ACSA or agreements that have entered into force, Congress will not be sufficiently informed to effectively oversee DOD’s use of ACSAs as an element of security cooperation. Second, DOD lacks quality data necessary for tracking ACSA orders and has not received reimbursement for thousands of orders. Our review of 227 transactions confirmed at least $26 million of unreimbursed overdue transactions, but, as of November 2019, DOD records include additional overdue ACSA transactions for support provided to partners dating back to 2011, which DOD values at more than $1 billion. By establishing procedures to improve ACSA recordkeeping and processes to seek reimbursement, DOD can help ensure that reliable information is available for reporting and oversight of activities to secure reimbursement of hundreds of millions of dollars of support provided to our partners. We are making a total of seven recommendations to DOD: The Secretary of Defense should ensure that written ACSA guidance includes recordkeeping procedures related to ACSA congressional notifications and signature dates to help enable the provision of complete information for Congress. (Recommendation 1) The Secretary of Defense should take steps, such as updating guidance, to help ensure the implementation of requirements related to providing information to State about newly signed ACSAs. (Recommendation 2) The Secretary of Defense should take steps to verify the accuracy of ACSA order statuses recorded in DOD’s system of record, and make corrections as appropriate. (Recommendation 3) The Secretary of Defense should implement a process to reconcile data in financial systems with the data and associated documents collected and stored in DOD’s ACSA system of record on a periodic basis. (Recommendation 4) The Secretary of Defense should develop and implement a mechanism to record and track the extent to which it is meeting required time frames to receive reimbursement for ACSA orders. (Recommendation 5). The Secretary of Defense should take steps to improve invoicing of ACSA orders, such as identifying ACSA orders recorded in DOD’s system of record that have not been invoiced and sending invoices to partner countries. (Recommendation 6) The Secretary of Defense should implement a process to monitor ACSA orders recorded as overdue in DOD’s system of record, and take steps to resolve outstanding reimbursements, as appropriate. (Recommendation 7) We provided a draft of this report to DOD and State for comment. In its comments, reproduced in appendix V, DOD concurred with the seven recommendations directed to it. DOD also provided information about actions it has taken to address recommendations 1 and 2. With respect to recommendation 1, DOD provided a copy of a February 2020 memorandum that outlines procedures to capture and preserve information about ACSA establishment, including the dates of DOD’s congressional notifications of intent to designate countries for ACSAs and agreement signature dates. With respect to recommendation 2, DOD provided a copy of a February 2020 memorandum that issued guidance related to DOD’s provision of ACSA information to State for State’s congressional notifications under the Case-Zablocki Act. We plan to follow up with DOD to learn about the distribution of these memoranda. State provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretaries of Defense and State, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or bairj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Senate Report 115-262, accompanying a bill for the National Defense Authorization Act (NDAA) for Fiscal Year 2019, includes a provision for us to review several aspects of Acquisition and Cross-Servicing Agreement (ACSA) management, including information provided to Congress and Department of Defense (DOD) tracking of support and receipt of reimbursement. In this report, we examine the extent to which (1) agencies have provided information to Congress about ACSAs, and (2) DOD has tracked and received reimbursement for ACSA orders. To address these objectives, we reviewed legal authorities related to ACSAs in sections 2341-2350 of Title 10 of the United States Code, DOD policy and guidance on ACSA management and implementation, and DOD Inspector General (IG) reporting on DOD’s management of ACSAs. We analyzed DOD and Department of State (State) documentation related to congressional notifications and the establishment of ACSAs, DOD ACSA transaction data, and DOD’s Report to Congress Concerning Acquisition and Cross-servicing Activities for Fiscal Year 2018. We also discussed ACSA management, order tracking, and transactions, including for the Saudi-led Coalition, with DOD officials from the Air Force Central Command (AFCENT); Defense Finance and Accounting Services; Defense Logistics Agency (DLA), including DLA Energy; Office of the Chairman of the Joint Chiefs of Staff (OCJCS); Office of the Undersecretary of Defense for Acquisition and Sustainment (OUSD (A&S)); U.S. Air Force; U.S. Marine Corps; U.S. Army; and U.S. Central Command. With State officials from the Bureau of Political-Military Affairs and the Office of the Legal Adviser’s Office of Treaty Affairs, we discussed the process to establish international agreements, State’s notifications to Congress on ACSA entry into force, and recordkeeping for those notifications. We conducted fieldwork at AFCENT Headquarters at Shaw Air Force Base in Sumter, South Carolina, to discuss ACSA transactions related to support provided to the Saudi-led Coalition. To determine the extent to which agencies have provided information to Congress about ACSAs, we analyzed agency activities related to (1) DOD’s requirement to notify Congress of its intent to designate a country eligible for an ACSA and (2) State’s requirement to notify Congress no later than 60 days after the entry into force of international agreements, which includes ACSAs. First we reviewed DOD’s congressional notification requirements under 10 U.S.C. §2342. The law authorizes the Secretary of Defense to sign ACSAs with the governments of North Atlantic Treaty Organization (NATO) countries, subsidiary bodies of NATO, and the United Nations Organization or any regional international organizations without an official designation of eligibility. However, for countries that are not members of NATO, DOD must notify Congress of its intent to designate the government of a country eligible for an ACSA at least 30 days before making the designation. Agency records indicate that DOD had signed 125 ACSAs as of February 2020. We included these 125 agreements in our analysis because, according to DOD, each agreement is considered to be an ACSA although some are named as other types of mutual logistics support agreements. To determine the extent to which DOD addressed requirements for notifying Congress of its intent to designate a non-NATO country for the purposes of entering into an ACSA, we conducted a content review of ACSA documents to identify signature and notification dates for each relevant ACSA, calculated the number of days between them, and compared our results to DOD’s requirement to notify Congress of its intent to make a designation not less than 30 days before a country is designated. Although DOD is required to notify Congress at least 30 days before designating non-NATO countries for the purposes of entering into an ACSA, DOD officials told us that ACSA records do not include a precise designation date for each country. Therefore, we used ACSA signature dates as a proxy for designation dates. In addition, because some ACSAs are revised and re-signed over time, we planned to compare the date on which DOD transmitted notifications to Congress with the signature date of the first ACSA signed with each partner. However, DOD officials explained that they could not readily provide the signature dates of the first ACSA signed with each partner because they purposefully expunged electronic records related to expired or replaced agreements—which would have noted signature dates—to help ensure that officials planning ACSA transactions referenced the current version of the agreement. Although DOD did not systematically track the signature dates for agreements that had been revised and re-signed, we reviewed documents related to each ACSA partner, historical treaty records, and other agency documents and found the signature date for the first agreement DOD signed with each ACSA partner. We compared NATO accession dates with these first ACSA signature dates and determined that 19 ACSA partners were members or elements of NATO at the time the relevant ACSA was signed. An additional two ACSA partners were elements of other international organizations. Therefore, we determined that DOD had signed 21 of its 125 ACSAs with governments of NATO countries, subsidiary bodies of NATO, and other international organizations, which do not require an official designation of eligibility. Under the law, DOD was required to notify Congress at least 30 days prior to designating the remaining 104 countries for an ACSA. The Secretary of Defense typically submits these notifications to the Senate Committees on Armed Services and Foreign Relations and the House Committees on Armed Services and Foreign Affairs. We included in our analysis the 78 of these 104 countries for which DOD records included a copy of a dated notification letter addressed to at least one of these four committees. For these 78 countries, we compared DOD notification dates with the signature date of the initial agreement with each partner. DOD could not provide documentation of congressional notifications for the remaining 26 partners, which we excluded from our analysis. We also interviewed DOD officials from the OCJCS and the OUSD (A&S) to discuss DOD’s congressional notification process. Second, we analyzed State’s requirement under 1 U.S.C. §112b to notify Congress no later than 60 days after the entry into force of international agreements, which includes ACSAs. Under the law, often referred to as “the Case-Zablocki Act,” State is required to notify Congress of any international agreement to which the United States is a party, other than a treaty, as soon as practicable after the agreement has entered into force, but in no event later than 60 days thereafter. To determine the extent to which State had transmitted notifications about ACSA entry into force on or before the statutory 60-day deadline, we conducted a content analysis of DOD ACSA documents and State notification records to identify relevant entry into force and State notification dates. We then calculated the number of days between them and compared our results to State’s reporting requirement under 1 U.S.C. §112b. Of the 125 ACSAs that DOD had signed, State officials confirmed that, as of February 2020, 118 had entered into force and, as such, required notification to Congress of entry into force under the Case-Zablocki Act. We excluded the remaining seven signed ACSAs from our analysis as follows. First, we excluded three agreements DOD signed with Benin, Iraq, and Uruguay that, according to State and DOD officials, had not entered into force as of February 2020, and therefore did not yet require notification under the Case-Zablocki Act. Second, we excluded two ACSAs signed with Canada and the United Kingdom, for which State officials explained that the legal arrangements governing acquisition and cross-servicing transactions are contained in government-to government “chapeau agreements” regarding defense cooperation rather than in agency-level ACSA agreements more commonly used with other partners. According to officials, these chapeau agreements are supplemented by nonbinding, agency-level implementing procedures that are not separately subject to Case-Zablocki Act reporting to Congress. Third, we excluded two agreement for which, as of February 2020, State officials were reviewing agreement documentation to confirm potential entry into force prior to notifying Congress. For one of these two agreements, if State determines the agreement to be entered into force, the date of entry into force will be retroactively dated to the date of signature, per the terms of the agreement. The retroactive entry into force date for the agreement is more than 60 days before February 2020, so if the entry into force date is confirmed, the related notification to Congress under the Case-Zablocki Act would be late as compared to the 60-day deadline. The second of these two agreements was signed on January 31, 2020. For the 118 ACSAs that had entered into force and thus required State’s notification to Congress, we compared entry into force dates with notification dates to determine the extent to which State had provided notifications on or before its 60-day deadline. State provided documentation on entry into force notifications for all but two of the 118 relevant ACSAs. For these two agreements, signed in 1983 and 2002, State had no record of related notifications, so we were unable to conclude whether or not they had occurred. For the remaining 116 agreements, State provided copies of dated congressional notifications for 113 and notification dates from its Treaty Information Management System for three notifications for which copies of the letters were unavailable. We included in our analysis notifications that were transmitted to either the President of the Senate, the Speaker of the House, or both. We compared the date of these notifications with ACSA entry into force dates we verified using ACSA agreement documentation and State notification documents. We also analyzed information in State’s notification documents to determine the causes for late transmittals. We interviewed DOD officials from the OCJCS and the OUSD (A&S), and State officials from the Bureau of Political-Military Affairs and the Office of the Legal Adviser’s Office of Treaty Affairs to discuss State’s congressional notification process. To determine the extent to which DOD has tracked and received reimbursement for support provided through ACSA orders, we analyzed a generalizable sample of ACSA orders that DOD had authorized from October 2013 through March 2018 in the ACSA Global Automated Tracking and Reporting System (AGATRS). AGATRS is DOD’s system of record for management of ACSA transactions and designates orders as overdue if reimbursement is not completed within 12 months of the order authorization date. We selected a stratified random sample of 227 orders, which were sampled from a population of 9,761 orders within the population groups in table 3. Strata in table 3 are based on a combination of four features: order total (dollar amount); order status (completed versus incomplete); document upload requirement (required versus not required); and military service. With this probability sample, each order of the study population had a nonzero probability of being included, and that probability could be computed for any order. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95-percent confidence interval (e.g., the margin of error is plus or minus 7 percentage points). This interval would contain the actual population value for 95 percent of the samples we could have drawn. We calculated our sample analysis with survey software that accounts for the sample design (stratification and weights) and appropriate subpopulation reporting group statements. We designed stratification and sample sizes based on order status and document upload requirements to ensure that the 95-percent confidence intervals of attribute estimates (e.g., percentage of orders that have proper support) had margins of error within around +/- 10 percentage points for each of the following four reporting groups, which collapse over the following strata: complete orders, incomplete orders, document upload required, and document upload not required. We also designed stratification based on military service to ensure proportionate representation of each military service in our sample within each combination of order status and document upload requirement. All of the orders in our population had been authorized for 14 months, and thus should have been repaid according to DOD’s 12-month system requirement, at the time we conducted our review of the sample from May 2019 through June 2019. For this sample, we analyzed order information and coordinated with DOD to validate the reimbursement status recorded in AGATRS. On the basis of (1) reporting from the DOD Inspector General, (2) interviews with DOD officials, (3) DOD’s use of manual entry to populate the system, and (4) our review of DOD’s use of ACSA orders to process reimbursement for unpaid transactions with members of the Saudi-led Coalition, we determined that DOD’s data in AGATRS may not be fully reliable. DOD officials explained that although AGATRS was the single repository for global ACSA transaction data, the system was not integrated with any other DOD systems and thus relied on manual entry from personnel to populate ACSA order information. As a result, we took additional steps to determine the reliability of information reported in the system. Specifically, we requested a data report from DOD of all ACSA transactions recorded in AGATRS as of May 8, 2019. We reviewed supporting documentation and information recorded in AGATRS for each ACSA order in our sample to determine whether the data in the “order status” field were accurate. For the order status “completed,” which indicates that the ACSA order has been fully reimbursed, we reviewed available information to determine whether financial collection documentation had been recorded and compared the information in these documents to the information in AGATRS. We then took steps to verify with DOD the status of orders that (1) were recorded as “completed,” but for which we had not identified any financial documentation or the documentation did not contain sufficient information to verify reimbursement, and (2) were not recorded as “completed” as of the time of our review. Of the 227 orders in our sample, 138 fit into one of these two categories. For orders that were recorded as completed but did not have sufficient supporting documentation, we requested that DOD provide additional support. For orders that were recorded as incomplete, we requested that DOD verify whether the orders had been reimbursed, given that they had been in the system longer than 12 months and were categorized as overdue in the data report provided by DOD. DOD provided feedback on and validated the reimbursement status for 101 of the 138 orders sent for follow-up. DOD did not provide a response for the remaining 37 orders. DOD identified whether orders recorded as overdue in AGATRS had been partially reimbursed, which we incorporated into our calculation of unreimbursed dollar amounts for the orders in our sample. On the basis of this validation process, we report on whether ACSA orders authorized from October 2013 through March 2018 in AGATRS had been reimbursed or not fully reimbursed as of July 10, 2019, or whether DOD did not know the reimbursement status as of October 2019. We found that approximately 7 percent of the order status information recorded in AGATRS was inaccurate. For example, three of the 227 orders in our sample that DOD had recorded as “completed” were not fully reimbursed. Five of the 227 orders in our sample that DOD had recorded as incomplete were actually reimbursed; DOD uploaded supporting documents and closed these orders in AGATRS in response to our inquiry. Additionally, as described above, six of the 227 orders should not have been included in our scope but were misclassified in DOD’s system. We also found orders under the purview of DLA Energy that were partially or fully settled (i.e., reimbursed or reconciled by netting sales and purchases between the United States and the partner nation), but whose status had not been updated in AGATRS. DLA Energy officials told us that AGATRS does not have sufficient functions to capture DLA Energy’s fuel reconciliation process, in which sales and purchases with partners may be offset through specific implementing arrangements with the partners. In some cases DLA Energy provided us with the actual amounts, including unpaid amounts, but we were unable to verify this information further. In response to our verification questions, DOD took steps to correct some of the AGATRS data inaccuracies we identified. For instance, DOD reopened (i.e., redesignated as incomplete) some orders it had recorded as completed in AGATRS but for which it had not received full reimbursement. Similarly, DOD uploaded reimbursement information for orders that it had recorded in the system as incomplete, but for which it had received reimbursement. DOD also uploaded reimbursement information in AGATRS for ACSA orders from our sample that it had recorded as completed, but for which it lacked documentation to support that it had received reimbursement. Finally, DOD settled or requested and received reimbursement for five of the ACSA orders in our sample. We found that DOD data on ACSA transactions contained weaknesses that we describe in this report. Because of these weaknesses, we only used data from our sample in developing estimates on data quality and reimbursement. We checked all of the orders in our sample, and either verified or corrected them as needed, and report any data that could not be verified. Since our probability sample with verified and corrected information is generalizable to all in-scope orders, we were able to estimate population values based on the corrected sample information. We conducted this performance audit from September 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. As of February 2020, DOD had 120 signed ACSAs that span DOD’s geographic areas of responsibility. (See table 4.) The Department of Defense (DOD) describes the retransfer of logistic support, supplies, and services provided under Acquisition and Cross- Servicing Agreements (ACSA) as a transfer from the original recipient to another foreign government or international organization, or to any entity other than the officers, employees, or agents of the foreign country or international organization whose military originally received the support. DOD Directive 2010.9 prohibits the retransfer of ACSA support without the prior written consent of the U.S. government, obtained through applicable DOD channels. As of November 2019, DOD had information related to 11 ACSA transactions made with six different ACSA partners between 2003 and 2019 for which the United States approved retransfer of ACSA support, as detailed in table 5. In 2019, we presented preliminary observations to Congress about the extent to which the Department of Defense (DOD) had provided support to and requested reimbursement from the Saudi-led Coalition (SLC), and DOD’s use of Acquisition and Cross-Servicing Agreements (ACSA) to do so. This appendix describes those observations and provides updates as appropriate with information obtained during the course of our review. In March 2018, DOD received a congressional inquiry regarding DOD’s use of ACSAs to provide support to the SLC activities in Yemen. In November 2018, DOD informed Congress about (1) the legal justification for the provision of aerial refueling assistance to the SLC, since March 2015, and (2) the status of reimbursement. DOD reported that it had failed to process and seek reimbursement for some fuel and all aerial refueling support provided to members of the SLC from March 2015 through November 2018, and that it would use the ACSA authority to request retroactive reimbursement. Additionally, as of August 2019, DOD had not received full reimbursement for general purpose bombs provided through ACSA in April 2015. According to DOD officials, a Joint Staff Execute Order signed on March 27, 2015, directed DOD to provide aerial refueling support to the SLC, if requested, and stated that the support would be provided on a reimbursable basis either through foreign military sales (FMS) or an ACSA. The order also stated that, as of March 2015, Saudi Arabia had not signed an ACSA. Further, according to DOD officials, there was no FMS case through which DOD might have provided aerial refueling to Saudi Arabia in March 2015. Aerial refueling support includes flying hours to conduct refueling and the fuel exchanged. According to DOD officials, air crews recorded aerial refueling flight hours for members of the SLC at the time they occurred, but did not record them as related to SLC activities in Yemen or process them as reimbursable FMS or ACSA transactions. For fuel provided to SLC members during aerial refueling flights at this time, DOD documented and processed some, but not all, as ACSA transactions. DOD officials identified multiple factors, including inadequate planning and insufficient understanding of guidance in the Joint Staff order, that led to a process breakdown in which DOD did not invoice and request reimbursement. Following the congressional inquiry, DOD began a review of air tanker flight hours, Air Force fuel purchases, and data from Saudi Arabia to determine aerial refueling reimbursement charges for flying hours and fuel. Based on this review, DOD identified reimbursable amounts of more than $261 million for flying hours and $37 million for fuel provided to coalition members. Using this information, DOD requested retroactive reimbursement through the ACSA authority from the United Arab Emirates (UAE) and Saudi Arabia for the flight hours and fuel not previously reimbursed. According to DOD officials, DOD is treating these transactions as third-party transfers. According to DOD documents and officials, because Saudi Arabia did not have a signed ACSA prior to June 2016, UAE agreed to reimburse the United States for transactions supporting the SLC before this date. Saudi Arabia agreed to reimburse the United States for transactions after this date. As of February 28, 2019, UAE had submitted $103.7 million in retroactive reimbursement for air tanker flight hours and $15 million for fuel. In May 2019, DOD signed an agreement with Saudi Arabia for repayment of $151 million for aerial refueling support provided from June 2016 through September 2018. DOD and Saudi Arabia agreed that Saudi Arabia would submit payments in increments over the course of 12 months, after receiving approval from the crown prince, Mohammad bin Salman, and additional leadership in Saudi Arabia. As of February 2020, Saudi Arabia had submitted payment of approximately $114 million, according to DOD documents. A balance of about $37 million for flight hours remains unreimbursed as well as $22 million for fuel. In addition to aerial refueling support, in 2015 DOD provided about $2 million of general purpose bombs to UAE for which UAE had received U.S. approval for an ACSA retransfer to Saudi Arabia for operations in Yemen. However, DOD did not record this order in the ACSA system of record as required until August 2019 and, as of September 2019, had received reimbursement in the form of reciprocal support for only two- thirds of the value of the bombs initially provided. DOD officials told us that UAE planned to provide the remaining in-kind reimbursement in September 2020. In addition to the contact named above, Biza Repko (Assistant Director), Kathryn Bolduc and Jasmine Senior (Analysts-in-Charge), Joe Carney, Debbie Chung, Martin de Alteriis, Neil Doherty, Adrian Good, Sally Newman, Cary Russell, Sonya Vartivarian, and Nicole Willems made key contributions to this report.", "summary": "According to DOD, from fiscal years 2014 through 2019, it used ACSAs to provide billions of dollars of logistic support, supplies, and services to more than 100 partner countries. For example, this support included fuel and ammunition to assist international exercises and coalition operations, among other efforts. Senate Report 115-262 included a provision for GAO to review ACSA management. This report examines the extent to which (1) agencies have provided information to Congress about ACSAs, and (2) DOD has tracked and received reimbursement for ACSA orders. GAO conducted content analysis of DOD and State ACSA documents, and analyzed a generalizable sample of ACSA orders authorized from October 2013 through March 2018 and recorded in DOD's system of record for ACSA orders. An ACSA order, also referred to as a transaction, documents an exchange of support between the United States and a foreign partner. In addition, GAO interviewed agency officials and conducted fieldwork at Shaw Air Force Base in Sumter, South Carolina. While generally providing required information to Congress, poor recordkeeping by the Department of Defense (DOD) and late notifications by the Department of State (State) have limited the accuracy and timeliness of information provided to Congress on acquisition and cross-servicing agreements (ACSA). DOD and State have Congressional notification requirements pertaining to ACSAs—agreements through which DOD exchanges logistic support, supplies, and services with foreign partners in return for cash or in-kind reimbursement. Documents indicate that DOD provided notice to Congress before designating 78 of 104 countries eligible for an ACSA. However, DOD did not have records for the remaining 26, in part because it lacks documented recordkeeping procedures. While State generally notified Congress about ACSAs' entry into force, it transmitted 41 percent of them after the statutory deadline, largely because DOD did not provide required information to State. These gaps and issues have reduced the accuracy and timeliness of information provided to Congress about ACSAs. DOD has not maintained quality data to track ACSA orders and has not received reimbursement for thousands of orders. First, DOD does not have complete and accurate ACSA data. For example, for an estimated 12 percent of ACSA orders authorized from October 2013 through March 2018 in DOD's system of record, DOD could not determine whether it had received reimbursement for support provided to partners. According to DOD officials, such inaccuracies occur in part because DOD does not have a process to validate data in its system. Second, GAO estimates that DOD received full reimbursement for 64 percent of ACSA orders authorized from October 2013 through March 2018 (about 6,000 orders), but did not receive full reimbursement for 24 percent. Orders remain unpaid in part because DOD has not requested timely repayment or monitored reimbursement. These management weaknesses limit DOD's ability to obtain reimbursement for overdue ACSA orders, which, according to DOD, were valued at more than $1 billion as of November 2019. Note: These estimates are based on a generalizable sample of orders in which the United States provided support to foreign partners; have a margin of error of up to plus or minus 5.1 percentage points at the 95-percent confidence level; and represent the percentage of the number of orders, not the dollar value of orders. GAO is making seven recommendations to DOD to improve ACSA recordkeeping and reimbursement, through steps such as better monitoring, periodic data reconciliation, and timely invoicing. DOD agreed with all seven recommendations.", "document_type": "gao"}
{"report": "DHS, DOJ, and the federal judiciary have different roles in the federal criminal process for immigration-related prosecutions, as shown in table 1. For this report, we define immigration-related offenses as the offenses listed in the Attorney General’s April 2017 memorandum (see table 2). Criminal prosecution process. DHS and DOJ officials told us that DHS’s practices for referring cases for prosecution, and DOJ’s practices for prioritizing immigration-related prosecutions, vary by location along the southwest border. In general, individuals are prosecuted in the judicial district that corresponds with the location of their alleged criminal offenses. Each USAO prosecutes cases in one or more courts. USAOs coordinate with DHS and DOJ components, as well as the federal courts, to determine the types and number of cases, including immigration- related cases, each office will prosecute, according to DOJ officials. In particular, according to DOJ’s Principles of Federal Prosecution, the prosecutor has wide latitude in determining when, whom, how, and whether to prosecute for apparent violations of federal criminal law, and this broad discretion has been recognized on numerous occasions by the courts. Border Patrol officials on the southwest border told us that they receive training from the USAOs about the criminal prosecution process and that they use the prosecution priorities established by the USAO to determine whether to refer a case for criminal prosecution. In general, immigration-related cases referred to the USAO by Border Patrol follow the process described in figure 2. One-day prosecutions. In three federal judicial districts on the southwest border—Arizona, Texas Southern, and Texas Western—DOJ prosecutes defendants for improper entry in criminal proceedings that generally last one day or less, or one-day prosecutions (see figure 2). The volume of defendants prosecuted for improper entry per day in these districts varies depending on the volume of Border Patrol apprehensions and capacity limitations, among other things. Since 2017, there have been several federal directives related to DOJ’s prioritization of immigration-related prosecutions. They are summarized in table 3. Prosecutors in all five southwest border USAOs told us that, in response to the Attorney General’s 2017 directive and in coordination with DHS and other stakeholders, they took steps to prioritize immigration-related prosecutions in their respective jurisdictions. According to officials from the Office of the Attorney General, each USAO exercised its discretion in implementing the priorities identified in the memorandum. For example, some USAOs changed the threshold at which they would accept a prosecution referral for alien smuggling or illegal reentry. Officials in one USAO told us that, before the April 2017 memorandum, their office generally declined to prosecute alien smuggling cases involving fewer than six smuggled aliens. However, in response to the April 2017 memorandum, the office lowered its threshold to two smuggled aliens. Officials in another USAO said that in light of the April 2017 memorandum, they began accepting all referred illegal reentry cases that met the evidentiary standard. Previously, this office did not accept more than 150 illegal reentry defendants without a prior felony conviction per month. In particular, in response to the memoranda, all five USAOs along the southwest border prioritized improper entry referrals for prosecution. Some districts that were already prosecuting some improper entry cases, such as Arizona, were able to quickly increase such prosecutions by scaling their existing systems, according to USAO officials. Specifically, USAO officials in Arizona stated that their office began accepting referrals for first time improper entrants without aggravating circumstances in May 2017, in response to the April 2017 memorandum. In comparison, other USAOs created new processes to prosecute more improper entry cases because they were not previously accepting a significant number of such referrals. For example, prior to the Attorney General’s April 2017 memorandum, the USAO in the California Southern district did not prioritize the prosecution of improper entry cases. USAO officials in San Diego stated that in the spring of 2017, the USAO formed an immigration enforcement working group comprised of certain federal law enforcement entities in San Diego, including USMS, Border Patrol, and CBP OFO, to discuss potential actions the district might take to prioritize immigration enforcement. In May 2018, the Chief Judge in California Southern convened a criminal case management committee comprised of district and magistrate judges, court officials, USAO officials, USMS officials, and federal defenders, among others, to “identify and resolve problems” related to the increased prosecution of improper entry cases. These working groups collaborated to make decisions on issues such as the volume of improper entry cases the court could hear each day, how defendants in improper entry cases would meet with their attorneys, and how many defendants a public defender would represent in court each day. In July 2018, the San Diego court initiated a daily docket for misdemeanor improper entry cases. Regarding DOJ’s coordination with DHS, in four of the five southwest border districts, USAO officials told us that they informed local DHS partners, including local Border Patrol and OFO leadership, that their prosecution guidelines had changed in light of the 2017 memorandum and that they would accept more immigration-related cases for prosecution. As a result, Border Patrol and OFO referred more immigration-related cases to DOJ. Further, in response to the April 2018 zero-tolerance memorandum, Border Patrol issued guidance to all southwest border sectors instructing each sector to develop phased plans to refer all amenable apprehended adults to the USAO for improper entry prosecution, based on capacities of the USAO and the federal courts, and the sectors developed and implemented these plans. In general, these plans prioritized referrals of those individuals with a criminal history first, followed by those with no criminal history. For example, the plan for the Rio Grande Valley Border Patrol Sector stated that, incrementally, the Sector would increase prosecution referrals until attaining 100 percent prosecution on a timeline consistent with DOJ partners’ capacity. Regarding DOJ’s coordination with other stakeholders in the federal criminal process, including the federal courts, USMS, and public defenders, USAO officials told us that they coordinated at the local level to be able to increase immigration-related prosecutions, to the extent practicable. In particular, the federal judiciary held a border court conference in June 2018 and established a task force—including judges, public defenders, and DHS and DOJ representatives—to discuss issues related to changing prosecution priorities in southwest border districts. The task force met three times between July 2018 and April 2019. In addition, stakeholders told us they took other steps to accommodate the USAOs’ prioritization of such prosecutions. For example, Some courts added additional daily dockets or court sessions, or adjusted their use of facilities to accommodate the higher volume of cases being prosecuted. Court officials and magistrate judges we spoke with in all five southwest border districts told us that magistrate judges spent more time presiding over improper entry cases as the number of those cases increased. In McAllen, Texas, for example, court and USAO officials told us that the court added a second daily docket for misdemeanor improper entry cases in May 2018, and doubled the court’s capacity to hear such cases. In Las Cruces, New Mexico, court officials told us that there is one magistrate judge on duty each day for the docket that includes improper entry cases. Federal defenders in Las Cruces told us that stakeholders in Las Cruces, including the court, federal defenders, and USMS, met in spring 2018 and decided to use a second courtroom for magistrate judge duty—including improper entry cases—each day. One courtroom is used for an active proceeding while the other is used to meet and counsel defendants prior to their active court proceeding. In some locations, FDO told us that they developed new practices to provide representation to each defendant appearing in court. For example, the Federal Defender office in McAllen developed an “all hands on deck” process in May 2018, in which all available defenders meet individually with defendants in the courtroom before their initial appearance in court each day. In October 2018, we observed 14 Assistant Federal Public Defenders in McAllen meet with about 72 defendants during the hour before court; federal defenders we spoke with in McAllen said that the process we observed is their daily routine. In San Diego, federal defenders told us that in July 2018, they assigned a team to work full-time on improper entry cases. The team included six trial attorneys, two appellate attorneys, two legal assistants, two investigators, and one interpreter. The courts also increased their use of private defense attorneys appointed under the Criminal Justice Act and interpretation services due to the increased number of immigration-related cases. Several USAO districts were able to quickly increase the number of improper entry prosecutions in response to the Attorney General’s 2017 and 2018 memoranda, to the extent practicable, because such misdemeanor cases are less resource-intensive and less complicated to prosecute than felonies such as illegal reentry or alien smuggling, according to USAO officials in all five southwest border districts. Specifically, many improper entry cases were completed in one-day court proceedings in fiscal year 2018, and in some locations, the cases of 75 or more improper entry defendants were completed each day during a single court proceeding. In three of the five USAO districts—Arizona, Texas Southern, and Texas Western—improper entry prosecutions in fiscal year 2018 generally took place in one-day court proceedings. Based on our analysis of DOJ data, about 84 percent of the 62,000 improper entry cases filed in fiscal year 2018, or about 52,000 improper entry cases, took place in these three districts. We observed proceedings in Arizona and Texas Southern in July and October of 2018, respectively. These proceedings lasted approximately two hours, during which time 50 to 75 improper entry prosecutions were completed. In these proceedings, the initial hearing, presentation of evidence, plea, and sentencing took place during a single day—or a single morning or afternoon—in court. On the basis of our observations in Arizona and Texas Southern, as well as interviews with agency officials in Arizona, Texas Southern, and Texas Western between July 2018 and November 2018, first-time offenders without a prior criminal history typically pled guilty to the improper entry offense and were sentenced to time served. Those defendants remained in the custody of the arresting agency for the duration of the criminal court proceeding, according to Border Patrol and USMS officials at headquarters and agency officials in these three districts. At the time of our visits to the Arizona and Texas Southern districts, we observed judges sentence some defendants with a prior improper entry conviction to terms of imprisonment ranging from 10 to 180 days. The judge remanded these defendants to USMS custody to serve their sentence. In the other two USAO districts—California Southern and New Mexico— most improper entry prosecutions took place over the course of approximately one week, based on our observations of such prosecutions in California Southern and interviews with agency officials in California Southern and New Mexico in October and November 2018. Based on our analysis of DOJ data, about 16 percent of improper entry cases filed in fiscal year 2018, or about 10,000 cases, took place in these districts. After an initial appearance in court, the judge remanded the defendant to USMS custody and set a subsequent hearing for three to four days later. At the second hearing, the defendant typically pled guilty to the improper entry offense and the judge sentenced them. First-time offenders typically pled guilty to the improper entry offense and were sentenced to time served. The USAOs’ ability to increase improper entry prosecutions was also affected by different practices in the federal criminal process for improper entry cases in each of the five southwest border districts, as shown in table 4. In some locations, these practices affected the extent to which prosecutors could accept all improper entry cases referred for prosecution. According to officials from the Offices of the Attorney General and the Deputy Attorney General, DOJ contemplated such variation in its directives to federal prosecutors. Further, according to agency officials, practices for improper entry cases may change over time, depending on the priorities of various stakeholders in the federal criminal process, physical space limitations, or availability of resources such as interpreters, among other reasons. As of November 2018, Border Patrol referred nearly all single adults who could be charged with improper entry to the USAOs for prosecution in some districts, according to Border Patrol officials and Border Patrol’s operational guidance in those districts. In these locations, officials from Border Patrol, USAO, and the federal judiciary told us that they had sufficient capacity to process all such cases. In other districts, Border Patrol referred a lower percentage of single adults for prosecution for improper entry based on the ability of the USAO to accept such referrals or other factors, consistent with DHS’s May 2018 memorandum. For example, in Tucson, Arizona, the court generally allowed 75 improper entry cases per day at the time of our July 2018 visit. However, in McAllen, Texas, court officials told us that the court would hear as many improper entry cases as the USAO accepted for prosecution, which was as many as 200 cases per day, as of our October 2018 visit. At the time of our visits in July and October 2018, other considerations affecting the number of improper entry prosecutions included Border Patrol’s capacity to process case referrals (Texas Southern), restrictions on the number of daily defendants that the court could accommodate (Arizona, California Southern), and physical constraints, such as the number of seats for defendants in the courtroom (Texas Southern). In addition, public defense practices for misdemeanor improper entry cases varied across districts and, in some locations, affected the number of improper entry cases that the USAO could file each day. In California Southern and Arizona, each public defender represented a maximum of 4 or 6 defendants in court each day, respectively, in October 2018 and July 2018. In Texas Southern, one public defender may represent up to 100 defendants in court at a time, as of October 2018, according to defender office staff. Furthermore, local court rules or practices in some locations affected the number of improper entry cases that Border Patrol could refer or the USAO could file each day. For example, in California Southern, as of October 2018, the court required defendants to appear in court the next court day after their arrest. In addition, all defendants were required to undergo a medical screening for tuberculosis before their initial appearance in court. Border Patrol data indicate that the number of single adults referred to USAOs for prosecution more than doubled from fiscal year 2017 (about 49,700) to fiscal year 2018 (about 101,000), and was higher in fiscal year 2018 than in each of the four prior fiscal years. The total number of single adults Border Patrol apprehended varied from year to year over this time and Border Patrol data indicate that fewer single adults were apprehended in both fiscal years 2017 and 2018 than in each of the three prior fiscal years. However, the proportion of apprehended single adults that Border Patrol referred for prosecution was higher in fiscal year 2018 (38 percent) than in each of the four prior fiscal years (ranging from 20 to 24 percent) (see fig. 3). On the basis of our analysis of Border Patrol data, USAOs declined approximately 8 percent of Border Patrol’s criminal prosecution referrals in fiscal year 2018. In the four prior fiscal years, USAOs declined between 2 and 4 percent of such Border Patrol referrals. However, in fiscal year 2018, the number of cases Border Patrol referred for prosecution—and the number of cases that were accepted and prosecuted by USAOs—was also substantially higher compared to prior years, which was consistent with DHS and Border Patrol guidance to increase prosecution referrals to the extent practicable and consistent with DOJ partners’ and federal court capacity. The reasons for declinations varied and included timing and capacity-related reasons, according to Border Patrol’s data and officials. For example, defendants must generally appear before a judge within 48 hours of their Border Patrol apprehension and, according to Border Patrol officials, the remote locations of some apprehensions can make it difficult for Border Patrol to process, transport, and present defendants in court within the required timeframe. Border Patrol data indicate that apprehensions of single adults in fiscal year 2018 varied by U.S. Attorney district and, in general, Border Patrol referred a greater proportion of those apprehended for prosecution in districts with a relatively low number of apprehensions. Specifically, in the two districts with the fewest apprehensions (New Mexico and Texas Western, with about 10,000 and about 26,000 apprehensions, respectively), Border Patrol referred 80 and 75 percent of those apprehended for prosecution in fiscal year 2018. In the remaining three districts (Arizona, California Southern, and Texas Southern), each of which had more than 53,000 single adult apprehensions in fiscal year 2018, Border Patrol referred between 14 and 45 percent of those apprehended for prosecution in fiscal year 2018. According to Border Patrol officials in these three districts, various factors influenced the number of referrals to USAOs, including court capacity, availability of Border Patrol agents to prepare cases for referral, and USAO capacity to accept and prosecute cases, consistent with the Attorney General’s guidance to prioritize such prosecutions to the extent practicable. DOJ prosecuted more immigration-related cases—including improper entry, illegal reentry, and alien smuggling cases—in fiscal year 2018 than in each of the prior four fiscal years. Specifically, southwest border USAOs filed about 91,000 improper entry, illegal reentry, and alien smuggling cases in fiscal year 2018, compared to a prior four-year high of about 78,000 immigration-related cases filed in 2014. On the basis of our analysis of DOJ data, cases with a lead charge of improper entry comprised more than half of DOJ’s immigration-related cases filed each year from fiscal years 2014 through 2018. Further, the total number of cases filed with a lead charge of improper entry, illegal reentry, or alien smuggling increased between fiscal year 2017 and fiscal year 2018 in the five southwest border districts, consistent with the priorities in the April 2017 and April 2018 memoranda, although the magnitude of the increases varied. Figure 4 illustrates the number of cases filed by USAOs with a lead charge of improper entry, illegal reentry, or alien smuggling along the southwest border, as well as trends in such cases from fiscal years 2014 through 2018. From fiscal year 2014 through 2018, more than 95 percent of improper entry, more than 90 percent of illegal reentry, and more than 80 percent of alien smuggling cases ended in convictions. The majority of defendants for improper entry and illegal reentry cases from fiscal years 2014 through 2018 were Mexican nationals, although the proportion of defendants with nationalities other than Mexican increased in fiscal year 2018 relative to the prior four fiscal years. The majority of defendants for alien smuggling cases from fiscal years 2014 through 2018 were U.S. nationals. See appendices II and III for more detailed information on case dispositions and nationalities of defendants. Improper entry. DOJ data indicate that the total number of cases filed with a lead charge of improper entry in southwest border districts more than doubled between fiscal year 2017 and 2018, as illustrated in table 5. Figure 5 illustrates the number of improper entry cases filed by southwest border USAOs each month in fiscal years 2017 and 2018. In New Mexico and Arizona, the number of improper entry cases filed increased notably in June 2017. These districts generally did not prosecute first-time entrants for these misdemeanor offenses from 2014 until 2017, and changed their prosecution practices in response to the Attorney General’s April 2017 memorandum, according to USAO officials we spoke with in those districts. In Texas Southern, the number of improper entry cases filed increased notably in April 2018. Prior to April 2018, the USAO in McAllen allowed 40 to 50 improper entry prosecutions per day, according to USAO officials. The USAO removed this limitation in response to the Attorney General’s April 2018 memorandum. As of October 2018, this USAO accepts all prosecution referrals with sufficient evidence (on average, 100 to 200 improper entry prosecutions per day), according to officials. From fiscal year 2017 through 2018, improper entry cases filed in Texas Southern nearly tripled, from about 10,800 to about 30,100 cases. In Texas Western, the number of improper entry cases filed began to increase in March 2018, but to a lesser extent than other districts, and then decreased from July through September 2018. USAO officials attributed the increase to increased Border Patrol apprehensions and said that they accept all Border Patrol prosecution referrals, but the number of cases that the USAO receives depends on fluctuating Border Patrol apprehension numbers. In California Southern, the number of improper entry cases filed began to increase in May 2018. Prior to July 2018, California Southern did not have a court docket dedicated to prosecuting improper entry misdemeanor offenses. According to officials, following the Attorney General’s April 2018 memorandum, the San Diego district court, in coordination with the USAO, agreed to establish a daily improper entry docket with the capacity to hear initial appearances for 40 to 52 improper entry cases each day. Illegal reentry. DOJ data indicate that the number of cases USAOs filed with a lead charge of felony illegal reentry along the southwest border declined from fiscal years 2015 through 2017 before increasing by 2,669 cases from fiscal year 2017 through 2018. However, the number of illegal reentry cases filed in fiscal year 2018 (25,112) was lower than in fiscal year 2014 (31,670) or 2015 (28,480), and the magnitude of the increase in illegal reentry cases filed from fiscal year 2017 through 2018 (12 percent) was smaller than the increase in improper entry cases during the same period (130 percent). The number of cases filed with a lead charge of illegal reentry declined in Arizona each year between fiscal years 2015 and 2018, but increased or varied in other districts. Between fiscal year 2017 and 2018, illegal reentry cases filed increased most notably in Texas Western, where there were 69 percent more illegal reentry cases filed in fiscal year 2018 than in fiscal year 2017. Federal court and USAO officials in Texas Western attributed this increase in illegal reentry prosecutions to increased Border Patrol apprehensions and referrals for prosecution in fiscal year 2018. Table 6 illustrates illegal reentry cases filed, by fiscal year, from fiscal years 2014 through 2018. USAO officials attributed the changes in illegal reentry cases filed from fiscal year 2014 through 2018 to changes in prosecution practices as well as changes in the number of apprehensions. For instance, the New Mexico USAO removed a monthly limitation originally enacted in fiscal year 2016 on the number of illegal reentry cases filed they would accept following the April 2017 memorandum, according to Border Patrol and USAO officials. Other locations have varying thresholds and practices regarding accepting, charging, and prosecuting illegal reentry cases. USAO officials in New Mexico and Texas Western told us that they charge defendants with illegal reentry if the defendant has one prior deportation or one prior conviction for improper entry. Officials in three other districts told us that they generally require a more extensive criminal history—for instance, they might require multiple prior improper entry convictions—to charge illegal reentry. USAO officials in Arizona and California said that they file cases with a lead charge of illegal reentry that might ultimately end with improper entry convictions. For example, our analysis of EOUSA data indicates that of almost 12,000 illegal reentry cases filed in Arizona in fiscal year 2017, approximately 77 percent ended with an improper entry conviction and approximately 18 percent ended with an illegal reentry conviction. Figure 6 illustrates the number of cases filed with a lead charge of illegal reentry filed each month in fiscal years 2017 and 2018. Alien smuggling. DOJ data indicate that the number of cases filed with a lead charge of alien smuggling increased in four of the five southwest border districts from fiscal year 2017 through 2018. Officials from two USAO locations along the southwest border told us that they changed their thresholds for how many material witnesses (individuals being smuggled) must be present to accept an alien smuggling referral in response to the Attorney General’s April 2017 memorandum. For instance, the USAO in San Diego lowered the threshold for accepting alien smuggling referrals and, following the April 2017 memorandum, places equal priority on all alien smuggling referrals. Prior to the April 2017 memorandum, the USAO would have considered several factors when deciding whether to accept the referral, such as if there was a risk of harm to the material witnesses or whether the conviction could result in a significant term of imprisonment for the smuggler. Figure 7 illustrates the number of cases filed with a lead charge of alien smuggling each month over fiscal years 2017 and 2018. DOJ, DHS, and the federal judiciary realigned resources to support the prosecution priorities outlined in the April 2017 and April 2018 memoranda. Officials from USAOs, USMS, Border Patrol, federal courts, and federal defenders along the southwest border told us that they are using more personnel, physical space, or both to support increased immigration-related prosecutions than they were prior to DOJ’s prioritization of immigration enforcement in April 2017. When USAOs along the southwest border changed their prosecutorial priorities and realigned resources in response to the April 2017 and April 2018 memoranda, other agencies, such as USMS and the federal judiciary, also realigned resources to respond to and support increased immigration-related prosecutions. In some cases, these realignments affected their ability to conduct other activities. Officials from USMS and the courts told us that, as stakeholders in the federal criminal process, they are accustomed to reacting to changing conditions that may affect their operations. For example, these officials’ operations could be affected by changes in the number of Border Patrol apprehensions, changes in Border Patrol’s prosecution referral priorities, changes in the location of drug or human smuggling activity, and changing USAO prosecutorial priorities, among other things. USAOs. USAO officials in three locations stated that the more time prosecutors spend on reactive work—such as misdemeanor or felony immigration-related cases—the less time Assistant U.S. Attorneys (AUSA) have to work on other issue areas, including proactive cases that may take months or years of work to build, or civil cases. For instance, USAO officials from Texas Southern said that the high immigration caseload in McAllen affects AUSAs’ ability to prosecute other types of cases, such as Organized Crime Drug Enforcement Task Force cases, which tend to be long-term cases. According to USAO officials in San Diego, when prosecutors began accepting improper entry referrals in July 2018, there was a short-term decline in the number of prosecutions that were initiated for other cases. This decline mainly affected drug and alien smuggling cases, some of which were referred to state or local prosecutors, according to USAO officials in San Diego. As of October 2018, USAO officials in San Diego said that improper entry prosecutions were not affecting their ability to accept referrals for new felony prosecutions. USMS. According to USMS officials, each additional court docket, courtroom in use, or immigration-related defendant who appears in court requires judicial security support. USMS officials in all five southwest border locations told us that they took actions to meet the judicial security mission need, but that the increased prosecutions have strained their staff. USMS officials we spoke with in all five southwest border districts said that they reassigned deputies in fiscal year 2018 from proactive task forces (such as task forces dedicated to arresting individuals with active federal warrants) to judicial security court duty and detention security to support increased immigration-related prosecutions. In particular, USMS officials said that they assigned more deputies to judicial security court duty because of the increase in improper entry prosecutions. USMS officials we spoke with in several locations on the southwest border said that the increased judicial security duty has made it difficult for their deputies to meet their training requirements. They are concerned that the high demand for judicial security in southwest border districts may affect their ability to retain deputies. Officials from USMS in multiple locations along the southwest border told us that the increase in immigration-related prosecutions strained their existing detention space. For instance, California Southern required additional detention space for defendants in improper entry cases, and could not locate additional detention space nearby or within the judicial district. As a result, USMS officials told us in October 2018 that deputies may drive defendants to neighboring judicial districts, including California Central, Nevada, and Arizona, to detain them before and between court appearances. According to USMS officials, providing transportation for such defendants can comprise deputies’ entire shifts. Additionally, officials in the Texas Western district told us in November 2018 that due to the increase in immigration-related prosecutions in fiscal year 2018, detention facilities in Del Rio reached capacity. USMS transports prisoners up to seven hours one way to other detention facilities. Further, USMS received permission to triple-bunk prisoners (using three stacked beds, rather than two stacked beds) in Del Rio and El Paso, and to use additional temporary beds, such as cots, to house additional prisoners close to courthouses. As we have previously reported, the average daily population of USMS prisoners is directly influenced by, among other things, the activities and decisions of federal law enforcement, USAOs, and the federal judiciary. According to USMS data, the average daily population of immigration- related prisoners on the southwest border increased from 7,796 in May 2017 (a five-year low) to 11,668 in September 2018 (a five-year high). According to USMS officials with whom we spoke and documents we reviewed, in 2018, USMS sought additional detention space. In May 2018, USMS issued a public request for information to determine the availability of contractor owned and operated secure detention facilities on the southwest border. In October 2018, USMS signed intragovernmental agreements with two local detention facilities in Texas, adding approximately 655 available beds to its inventory. Additionally, USMS officials in Las Cruces told us that they had more detention space than they required for prisoners in New Mexico and that, following the April 2018 memorandum, USMS began to accept prisoners from other districts. Prior to the April 2018 memorandum, USMS in New Mexico had approximately 1,300-1,400 of their own prisoners in custody. As of November 2018, USMS in Las Cruces had approximately 1,800 prisoners in custody from New Mexico and approximately 500 prisoners in custody from neighboring districts. Border Patrol. Border Patrol agents support, and in some cases supplement, DOJ components in both prosecution and judicial security work. As of March 2019, in nine of nine southwest border sectors, Border Patrol reported that it had detailed agents to USAOs to assist with tasks like data entry and preparing court documents for immigration-related prosecutions. In addition, in seven of nine sectors, Border Patrol detailed agents to USMS locations to assist with judicial and detention security. The number of agents from Border Patrol that are detailed to assist DOJ components with immigration-related prosecutions generally varies based on the volume of prosecutions that the USAO receives and accepts and, in some sectors, based on available Border Patrol agent resources, according to Border Patrol officials. Following the Attorney General’s memoranda, Border Patrol increased the number of agents that it detailed to certain USAOs and USMS locations along the southwest border, both temporarily and on an ongoing basis, because of the increased volume of immigration-related prosecutions, according to Border Patrol officials. As of March 2019, Border Patrol sectors across the southwest border detailed from zero to four agents to perform USMS functions, and zero to five agents to perform USAO functions. The length of detail and duties assigned to Border Patrol agents detailed to USAOs and USMS vary by location, according to officials. Generally, when an assignment ends, Border Patrol agents return to their regular Border Patrol duties. Federal courts. Federal court officials we spoke with in five locations stated that they faced challenges resulting from the increased immigration caseload. For instance, court officials in Las Cruces said that, as of November 2018, staff in the clerk’s office often work on weekends to keep up with court scheduling and paperwork resulting from increased improper entry prosecutions. The Las Cruces court also implemented telework options for clerk staff to give them the option of working additional hours from home. Additionally, officials we spoke with from several courts reported that they had existing needs for judgeships, and the increasing immigration caseload placed additional strain on district and magistrate judges. For instance, the district court in Del Rio has one district judge and the number of illegal reentry prosecutions in fiscal year 2018 increased by almost 70 percent compared to fiscal year 2017. Court officials we spoke with in two locations told us that sentencing dates have been pushed out because of the increase in district judges’ caseloads. According to federal court officials in Del Rio, the district judge’s calendar is so full that, in some cases, a defendant’s sentencing might be pushed back far enough that the defendant has already served more jail time than the federal sentencing guidelines recommend by the time the defendant is sentenced. In addition, multiple court officials in multiple locations across the southwest border told us that increased immigration-related prosecutions, and particularly improper entry cases, increases strain on courtroom facilities and equipment and, in some instances, courts have to replace equipment and furniture more often. For example, in Tucson, Arizona, the improper entry courtroom can hold up to 75 improper entry defendants in restraints, such as handcuffs and/or leg restraints, at a time during morning improper entry proceedings, and court officials told us that the restraints worn by defendants cause damage to the chairs and benches in the courtroom. Defender services. FDO staff we spoke with in several southwest border districts told us that they dedicated more staff or staff time towards defendants in immigration-related cases and accommodated increased prosecutions within existing resources as of December 2018. For instance, defenders in Las Cruces stated that the court added a new docket for improper entry cases, and defense attorneys are at times scheduled to be in two courtrooms at once, and must cover for each other. Defenders in Las Cruces also told us that they have run out of physical office space for their staff. Federal defenders in McAllen said that the amount of time defense attorneys spend on improper entry interviews affects the time they can spend on felony cases. In addition, these defenders described the process of preparing 100 or more defendants for criminal proceedings each day as draining. Defenders in McAllen noted that they filed more continuances in fiscal year 2018 than in prior years as a result of the increased workload caused by the expanded improper entry docket. EOUSA, USMS, Border Patrol, and the federal judiciary temporarily surged personnel from locations across the United States to the southwest border to support increased immigration-related prosecutions. These agencies tracked some costs associated with those temporarily detailed personnel, among other costs associated with increased immigration-related prosecutions. Additionally, EOUSA announced plans to hire new attorneys to prosecute immigration-related offenses in May 2018, both on the southwest border and in the interior of the United States. EOUSA. In May and June 2018, DOJ announced plans to permanently hire 70 new AUSAs to prosecute immigration-related offenses both at the southwest border and in the interior of the U.S. Additionally, EOUSA officials told us that they subsequently received DOJ approval to hire 13 more AUSAs to work on immigration and border security issues on the southwest border. In fiscal year 2018, EOUSA expended about $9.8 million on personnel costs associated with these prosecutors—including 35 immigration crimes prosecutors in the interior of the United States, 42 immigration crimes prosecutors in the five southwest border districts, and 6 civil condemnation AUSAs working on the southwest border. EOUSA estimated that the fiscal year 2019 continuing personnel costs associated with these prosecutors would be about $17 million. In its fiscal year 2020 Congressional Budget Justification, EOUSA requested a $23.3 million increase in funding from Congress to sustain hiring and program operations that were initially funded in fiscal year 2018, including the immigration prosecutors. EOUSA also intends to allocate a portion of these 2020 funds to USAOs around the country with demonstrable workload challenges. EOUSA and USAO officials said that these permanent AUSA positions would support immigration prosecutions on the southwest border in the long-term. USAO officials we spoke with in all five southwest border districts between July and November 2018 said that they were in the process of hiring these immigration AUSAs. While EOUSA was in the process of permanently hiring new AUSAs, EOUSA temporarily surged Special Assistant U.S. Attorneys (SAUSAs) to southwest border districts that needed more prosecutors to handle the increased immigration caseload. Some of these SAUSAs prosecuted improper entry offenses specifically and others prosecuted any immigration-related case. Specifically, EOUSA solicited attorneys from other DOJ components, the Department of Defense (DOD), and CBP to serve as SAUSAs for immigration-related offenses along the southwest border. Beginning in June 2017, DOJ detailed 12 attorneys from non- southwest border USAOs and other DOJ components to prosecute immigration-related cases in all five districts on the southwest border. In fiscal years 2017 and 2018, EOUSA expended approximately $440,000 on travel and lodging for these 12 SAUSAs. In June 2018, DOD agreed to provide military attorneys to act as SAUSAs and support immigration-related prosecutions on the southwest border. DOD detailed a total of 21 military attorneys to the southwest border for approximately six months each between June 2018 and January 2019, according to EOUSA. According to USAO officials in New Mexico, which received five military SAUSAs, and California Southern, which received five, these SAUSAs provided key support that allowed these districts to increase improper entry and illegal reentry prosecutions beginning in June 2018. In fiscal year 2018, EOUSA estimated that it expended approximately $1,186,000 on salaries, travel, and lodging for these 21 SAUSAs. In some southwest border locations, CBP regularly provides SAUSAs to add prosecutor capacity to USAOs. For example, in four locations, CBP SAUSAs are the federal prosecutors for misdemeanor improper entry cases and appear daily in court to prosecute these cases. In San Diego, CBP SAUSAs began supporting the misdemeanor improper entry docket in July 2018, when the docket began. In New Mexico, 10 part-time CBP SAUSAs supported the improper entry docket temporarily between January and July 2018, which allowed New Mexico to begin prosecuting improper entry cases with no effect to the workload of its full-time AUSAs. CBP officials also said that CBP has provided full-time SAUSAs for a six or 12-month term to some USAOs on an ongoing basis, depending on USAO request and CBP workload. USAO officials have asked CBP for additional SAUSAs in San Diego and Yuma; as of April 2019, CBP officials said that due to CBP’s workload in these locations, they have not agreed to additional SAUSAs in these locations. USMS. From June through November 2018, USMS detailed deputies from non-southwest border locations to southwest border courts to support judicial security operations. Approximately 96 deputies participated in these temporary detail rotations, which lasted two to three weeks each, over the six month period. USMS established a budget code to track additional expenditures that USMS headquarters incurred related to implementing the April 2018 memorandum. These additional expenditures included travel and lodging costs for the detailed USMS deputies and transportation costs, among others. USMS reported approximately $1,149,000 in expenditures from May through December 2018 under this budget code. In its 2020 Congressional Budget Justification, USMS requested nearly $8 million from Congress for 35 positions to address departmental priorities and initiatives, including immigration enforcement. USMS officials said that their workload, including immigration prosecutions in fiscal year 2018 surpassed previous peak levels. For instance, USMS reported more immigration-related “prisoners received” in 2018 than in each of the prior five fiscal years. Border Patrol. Border Patrol established a budget code in April 2018 to track additional expenditures directly associated with implementing the April 2018 memorandum. In particular, according to Border Patrol budget officials and documentation, Border Patrol officials were to use the budget code to track expenditures related to detainee food, supplies, and transportation. In addition, the code was to be used for Border Patrol agent overtime expenditures and any travel expenditures that could be attributed to the April 2018 memorandum. From April 2018 through December 2018, Border Patrol reported approximately $2,316,000 in expenditures under this budget code. Federal judiciary. The federal judiciary sends visiting judges from other parts of the United States to southwest border districts to assist with judge caseloads, including immigration cases. For instance, the federal judiciary approved 67 visiting judge assignments from other parts of the U.S. to New Mexico and Texas Western in fiscal years 2017 and 2018; AOUSC reported expending approximately $114,000 on travel costs for these visiting judges. Federal courts along the southwest border also expended more funds on contracted interpreter services in fiscal year 2018 than in any of the prior four fiscal years. When a defendant does not speak English, courts may have interpreters on staff and courts may use contracted interpreter services. Court officials from multiple locations along the southwest border told us that contracted interpreter services became increasingly difficult to obtain following the increase in immigration-related prosecutions. According to federal judiciary documentation, there were 100,000 more court events, or defendant appearances before a judge, in southwest border courts requiring court interpreter services in fiscal year 2018 than there were in fiscal year 2017. Expenditures for contracted court interpreters increased by over $450,000 from fiscal year 2017 to fiscal year 2018 for southwest border courts. We provided a draft of the sensitive report to DOJ, DHS, and AOUSC for their review and comment. DOJ, DHS, and AOUSC provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Attorney General of the United States, the Acting Secretary of the Department of Homeland Security, the Administrative Office of the U.S. Courts, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or goodwing@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix V. This appendix provides additional details on our objectives, scope, and methodology. Specifically, our objectives were to provide information on the following: 1. how the Department of Justice (DOJ) prioritized criminal prosecutions of immigration-related offenses in response to the Attorney General’s 2017 and 2018 memoranda; 2. what Department of Homeland Security (DHS) and DOJ data from fiscal years 2014 through 2018 indicate about criminal prosecutions of immigration-related offenses; and 3. resources that DOJ, DHS, and the federal judiciary used to implement increased immigration-related prosecutions. This report is a public version of the prior sensitive report that we provided to you in August 2019. DHS, DOJ, and the Administrative Office of U.S. Courts (AOUSC) deemed some of the information in the prior report as Law Enforcement Sensitive or For Official Use Only, which must be protected from public disclosure. Therefore, this report omits sensitive information about specific law enforcement, prosecutorial, and judicial practices along the southwest border, including certain courtroom security and agency staffing information. Although the information provided in this report is more limited, the report addresses the same objectives as the sensitive report and uses the same methodology. For all three objectives, we generally focused our review on the five U.S. Attorney Office (USAO) districts along the southwest border—Arizona, California Southern, New Mexico, Texas Southern, and Texas Western— because the Attorney General’s 2017 and 2018 memoranda specifically directed officials in these districts to prioritize improper entry prosecutions. Further, approximately 93 percent of all immigration-related prosecutions from fiscal years 2014 through 2018 took place in these districts. USAO districts and federal judicial districts have the same boundaries. U.S. Border Patrol (Border Patrol) sectors along the border are generally not contiguous with USAO districts. We visited three of the five districts and interviewed officials by telephone from the other two southwest border districts. Specifically, we conducted in-person site visits to Arizona in July 2018 and to California Southern and Texas Southern in October 2018. We selected these locations on the basis of several factors, including Border Patrol apprehension characteristics and DOJ prosecution practices. Specifically, to select the locations for our site visits, we considered DOJ’s history of prosecuting improper entry offenses in different locations, including whether districts implemented changes to their practices for prosecuting improper entry offenses in response to the Attorney General’s memoranda. For instance, we considered districts’ practices for prosecuting improper entry offenses and whether those practices changed in response to the April 2017 or April 2018 memoranda. In addition, we considered the number of Border Patrol apprehensions in each USAO district and changes in the number of apprehensions from fiscal years 2014 through 2018. We also considered factors such as whether DOJ, DHS, and federal court facilities are in close proximity, among other things. In the three districts we visited, we met with DOJ and federal court officials, including magistrate and district judges, to understand and observe their roles in the criminal prosecution process. We met with USAO, U.S. Marshals Service (USMS), Federal Defender Organizations (FDO), and federal court officials and observed federal criminal court proceedings in Tucson, Arizona; San Diego, California; McAllen, Texas; and Brownsville, Texas. We observed the criminal prosecution process from arrest to conviction and sentencing, including observations of district and magistrate court proceedings and USMS intake and holding facilities in federal courthouses. In addition, we observed U.S. Customs and Border Protection’s Border Patrol agents and Office of Field Operations (OFO) officers processing apprehended individuals and referring them for prosecution. We met with Border Patrol officials in Tucson, Arizona; McAllen, Texas; and San Diego, California. We met with OFO officials at ports of entry in Nogales, Arizona; San Ysidro, California; Hidalgo, Texas; and Brownsville, Texas. We also interviewed USAO, USMS, federal court, Border Patrol, and OFO officials who are involved in immigration prosecutions in Las Cruces, New Mexico in November 2018 (New Mexico district) and Del Rio, Texas in November 2018 (Texas Western district). Although the information we obtained from these site visits and interviews cannot be generalized to all locations along the southwest border, these interviews provided important insights and perspectives about immigration-related prosecutions and any process, volume, or resource changes in immigration-related prosecutions following the April 2017 and 2018 memoranda. To determine how DOJ prioritized immigration-related prosecutions, we obtained and reviewed operational guidance, policies, and memoranda describing how DOJ, DHS, and the federal judiciary implement such prosecutions along the southwest border. We also reviewed documentation to identify any changes to such practices associated with implementing the Attorney General’s April 2017 and the April 2018 memoranda. We reviewed training materials from the Executive Office of U.S. Attorneys (EOUSA) provided to some federal prosecutors regarding prosecuting immigration-related cases at a 2018 Border Security Coordinator conference and relevant U.S. Attorneys’ Bulletins from DOJ’s Journal of Federal Law and Practice, such as the July 2017 bulletin, Prosecuting Criminal Immigration Offenses, and the Justice Manual, which contains publicly available DOJ policies and procedures, including criminal prosecution procedures. In addition, we interviewed headquarters and district officials from DOJ, DHS, and the federal courts to obtain their perspectives on the Attorney General’s prioritization of immigration-related prosecutions and any changes in practices as a result of the two memoranda. Specifically, from DOJ, we interviewed officials from the Offices of the Attorney General and the Deputy Attorney General about the development and implementation of the April 2017 and April 2018 memoranda. We also interviewed officials from EOUSA about headquarters-level support to USAOs. We interviewed headquarters officials from USMS about how the Attorney General’s prioritization of immigration offenses affected USMS operations and about available data measuring such effects. from DHS, we interviewed Border Patrol and OFO headquarters officials about actions CBP components took in response to the Attorney General’s prioritization of immigration prosecutions and reviewed DHS, CBP, and Border Patrol memoranda and Border Patrol operational guidance related to the prioritization of immigration prosecutions. We also interviewed officials from U.S. Immigration and Customs Enforcement (ICE) about the effect of the Attorney General’s prioritization on ICE’s operations. from the Administrative Office of the U.S. Courts (AOUSC)—the federal judiciary agency that provides legislative, administrative, management, and program support to federal courts, among other functions—we interviewed officials in Washington, D.C. about the federal judiciary’s roles and responsibilities related to criminal immigration-related cases, including the roles of magistrate and district judges and public defenders. To determine what DHS and DOJ data indicate about prosecutions of immigration-related offenses, we analyzed record-level apprehension and prosecution referral data from Border Patrol’s Enforcement Integrated Database/e3 (e3), as well as record-level prosecution data from EOUSA’s CaseView from fiscal years 2014 through fiscal year 2018, the most recent data available at the time of our analysis. Border Patrol data. In reviewing the Border Patrol data, we determined that the majority of Border Patrol apprehensions (about 97 percent) from fiscal years 2014 through fiscal year 2018 took place along the southwest border. We excluded the small percentage of apprehensions nationwide that did not take place along the southwest border from our primary analysis, meaning that we excluded apprehensions in all districts but Arizona, California Southern, New Mexico, Texas Southern, or Texas Western from our primary analysis. We assigned each Border Patrol sector apprehension to its corresponding judicial district to maintain the judicial district as our unit of analysis for the apprehension and prosecution referrals data. For instance, if the El Paso Border Patrol sector referred a prosecution to the USAO in Las Cruces, New Mexico, we report that referral as occurring in the district of New Mexico. We matched data from e3’s apprehensions module with data from e3’s prosecutions module using an identifier that Border Patrol officials told us was unique to each apprehended individual to analyze those individuals that were and were not referred for criminal prosecution. Border Patrol’s apprehensions and prosecution referrals include individuals who are deportable and non-deportable, as determined by Border Patrol. According to Border Patrol officials, non-deportable individuals may be U.S. citizens, foreign nationals who have a valid visa, or individuals who otherwise may not be amenable to removal from the United States. We have included non-deportable individuals in our analysis because they may be referred for prosecution for immigration-related crimes, including alien smuggling. Appendix II includes information on Border Patrol apprehensions and prosecution referrals in each judicial district from fiscal years 2014 through 2018 and information on apprehensions and prosecution referrals by nationality, including U.S. citizens. We restricted our Border Patrol data analysis to apprehensions of non-juveniles who Border Patrol did not process as members of family units. In other words, we analyzed apprehensions and prosecution referrals of single adults. According to Border Patrol guidance and agency officials, e3 has system checks in place that do not allow members of family units to be referred for criminal prosecution. Prior to April 2018, Border Patrol officials said that individuals who were to be referred for prosecution were generally processed by Border Patrol as single adults whether or not they were apprehended with their minor children. In April 2018, an update to e3 allowed Border Patrol agents to separate one or more members of a family unit from that family unit and refer those individuals for prosecution. As stated previously, we included individuals that Border Patrol processed as single adults in our analysis of Border Patrol apprehensions. EOUSA data. In reviewing EOUSA record-level prosecution data from fiscal years 2014 through 2018, we determined that the majority of cases filed with an immigration-related lead charge (over 90 percent of cases with an immigration-related lead charge) took place along the southwest border. We excluded prosecutions that did not take place along the southwest border from our primary analysis; we report on them in an appendix. Additionally, we determined that improper entry, illegal reentry, and alien smuggling charges comprised approximately 99 percent of immigration-related cases filed on the southwest border from fiscal years 2014 through 2018. We excluded the other charges that the Attorney General listed in the April 2017 memorandum from our primary analysis. We analyzed EOUSA data based on the lead charge of the prosecution record. The lead charge is typically the most serious provable offense for which a defendant can be prosecuted, as determined by the USAO. We analyzed EOUSA data by fiscal year from fiscal years 2014 through 2018 to determine overall trends in immigration-related prosecutions over time. We also analyzed data by month in fiscal year 2017 and fiscal year 2018 to identify any changes in immigration-related prosecutions following the April 2017 and April 2018 memoranda. We interviewed knowledgeable USAO officials in southwest border districts level to understand how practices that they changed in response to the April 2017 and April 2018 memoranda were reflected in the data. We also analyzed the nationality of defendants based on lead charge for fiscal years 2014 through 2018, and for fiscal year 2018, to determine any changes in nationality of those prosecuted in the most recent fiscal year compared to prior fiscal years. We identified a population of defendants whose nationalities were listed as ‘unknown,’ in the EOUSA data. When USAOs are unable to determine the nationality of a defendant, officials entering the case data will list that nationality as ‘unknown.’ In appendix III, we report on the proportion of defendants with a nationality that is ‘unknown’ for alien smuggling cases because ‘unknown’ nationalities were relatively common for alien smuggling cases. We grouped the lead charges into offense categories based on the statute of the offense. We analyzed EOUSA data at the statutory level rather than by the individual charged offenses because EOUSA officials told us that USAOs may have differing data entry practices related to the level of specificity at which they enter lead charge data into CaseView. Additionally, EOUSA directed USAOs to ensure that improper entry, illegal reentry, and alien smuggling cases are entered into EOUSA’s data system on a monthly basis at the statute level in August 2017. Table 8 lists the specific offenses that we combined under their shared statute for our analysis. We assessed the reliability of Border Patrol and EOUSA data by testing for missing data and obvious errors, reviewing related documentation such as data dictionaries and guidance for entering data, and interviewing knowledgeable agency officials both at the headquarters level and in the three districts that we visited. We determined that the Border Patrol and the EOUSA data are sufficiently reliable for reporting on immigration- related prosecutions and individuals that Border Patrol apprehended and referred for criminal prosecution. To determine the resources used to implement increased immigration- related prosecutions, we obtained and reviewed DOJ, DHS, and federal judiciary documentation focused on any existing resources that agencies realigned to implement or support increased immigration prosecutions, as well as expenditures or additional personnel used to support the implementation of increased immigration-related prosecutions. For example, we reviewed memoranda of understanding between EOUSA and the Department of Defense (DOD) regarding DOD detailing attorneys to EOUSA to prosecute immigration-related offenses, as well as USMS intergovernmental agreements used to expand detention space. We also reviewed data from USMS on the unique prisoners received, average daily prisoner population, and total prisoner appearances in court to determine any changes in the volume of USMS prisoners from fiscal year 2014 through fiscal year 2018. We reviewed documentation from southwest Border Patrol sectors specifying the number of Border Patrol agents that those sectors detailed to USMS and USAO locations, as well as any changes in the number and duration of agents detailed to those locations following the April 2017 and April 2018 memoranda. To specifically identify expenditures or personnel for implementing increased immigration-related prosecutions, we reviewed agency documentation, such as documentation from expenditure tracking systems from USMS and Border Patrol. We interviewed agency budget and program officials from USMS’ Offices of Budget Formulation, Forecasting and Analysis, and General Counsel; EOUSA’s Office of Resource Management and Planning; AOUSC’s Office of the Financial Liaison and Analysis Staff; Border Patrol’s Office of Budget Execution; OFO’s Office of Budget Formulation; CBP’s Budget Office; and CBP’s Office of Chief Counsel. In instances where there was no explicit distinction between expenditures or personnel for specifically supporting immigration-related prosecutions and expenditures or personnel used to support other prosecutions, we identified the general account within which immigration-related prosecution costs would be included, and noted that those expenditures include costs for other prosecutions as well. In addition, where agencies identified that they used personnel resources to implement immigration- related prosecutions, we collected related documentation, such as expenditures for temporary details from other parts of the United States to the southwest border, as available, and spoke with district officials by telephone and during our site visits to better understand the use of these personnel resources. We also reviewed Congressional Budget Justifications for fiscal year 2020 to identify expenditures that agencies requested from Congress to support increased immigration-related prosecutions. We conducted this performance audit from May 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides additional detail on and characteristics of immigration-related prosecutions in the five U.S. southwest border districts: Arizona, California Southern, New Mexico, Texas Southern, and Texas Western. Each enclosure contains the following information: Description of the district. In this section, we provide a narrative description of the district, including prosecution practices in the district for improper entry, illegal reentry, and alien smuggling cases. We also provide information on the location of the federal courts in the district, U.S. Border Patrol (Border Patrol) sectors in the district, and the federal court circuit in which the district falls. Descriptions of the district reflect practices that were in place as of the date we observed prosecution practices or interviewed knowledgeable officials in the district, which generally ranged from July through November 2018. Cases filed. In this table, we show cases filed by the U.S. Attorney’s Office in the district with a lead charge of alien smuggling, improper entry, or illegal reentry from fiscal years 2014 through 2018. The lead charge is typically the most serious of the charged offenses at the time the U.S. Attorney’s Office files the case, according to Executive Office for U.S. Attorneys (EOUSA) officials. Table 9 describes these offenses. Dispositions. In this table, we show the dispositions of those cases with a lead charge of alien smuggling, improper entry, or illegal reentry from fiscal years 2014 through 2018, as of September 30, 2018, based on the year the case was filed by the U.S. Attorney’s Office. We have included a “pending” column for those cases that did not have a disposition, as of September 30, 2018. Apprehensions and prosecution referrals. In this table, we show prosecution referrals and declinations for those single adults that Border Patrol apprehended from fiscal years 2014 through 2018. In particular, this table includes single adults that Border Patrol apprehended and processed as an individual apprehension, not as a member of a family unit. The U.S. Attorney’s Office decides whether to accept or decline each case that Border Patrol refers for prosecution. We show those cases (each apprehended individual is one case) that Border Patrol referred to the U.S. Attorney’s Office for prosecution and the number of such cases that the U.S. Attorney’s Office declined to prosecute. Individuals whose immigration-related criminal cases are declined by a U.S. Attorney’s Office may be processed in administrative removal proceedings. Nationality and prosecution referrals. In this table, we show the number of prosecution referrals from Border Patrol to U.S. Attorneys’ Offices, by country of nationality. These include both referrals that U.S. Attorneys’ Offices accepted and those that U.S. Attorneys’ Offices declined. We also show, by country of nationality, the percent of individuals who were apprehended and referred for prosecution compared to all those apprehended. For example, if 100 Mexican nationals were apprehended and 50 were referred for prosecution, 50 percent of Mexican nationals apprehended were referred for prosecution. Cases filed by month. In this figure, we show the cases filed with lead charges of alien smuggling, improper entry, or illegal reentry each month from October 2016 through September 2018. We also show the timing of the Attorney General’s April 2017 memorandum, which prioritized immigration enforcement, and the Attorney General’s April 2018 memorandum, which instructed prosecutors on the southwest border to accept all improper entry referrals, to the extent practicable. Volume constraints: Yes; generally 75 improper entry cases per day in Tucson and 30 in Yuma. Percentages may not add to 100 due to rounding. Percentages may not add to 100 due to rounding. Percentages may not add to 100 due to rounding. This appendix provides additional detail on the nationality of defendants for improper entry, illegal reentry, and alien smuggling cases filed in U.S. southwest border federal judicial districts from fiscal years 2014 through 2018. We analyzed the nationality of defendants in cases filed with a lead charge of 8 U.S.C. § 1325 (improper entry), 8 U.S.C. § 1326 (illegal reentry after removal, or illegal reentry), and 8 U.S.C. § 1324 (alien smuggling) from fiscal year 2014 through fiscal year 2018 and for fiscal year 2018. Our analysis of Executive Office for U.S. Attorneys (EOUSA) data indicates that the majority of defendants for cases filed with a lead charge of improper entry and illegal reentry from fiscal year 2014 through 2018 were Mexican nationals. The majority of defendants in cases filed with a lead charge of alien smuggling over this time period were U.S. nationals. Improper entry (8 U.S.C. § 1325): From fiscal years 2014 through 2018, the majority of defendants in cases filed with a lead charge of improper entry were Mexican nationals. Our analysis of EOUSA data indicates that, in fiscal year 2018, the proportion of improper entry defendants who were Mexican nationals was lower than the fiscal year 2014 through 2018 time period, and the proportion of improper entry defendants who were Honduran or Guatemalan nationals was higher than the fiscal year 2014 through 2018 time period. The number of improper entry defendants who were Nicaraguan nationals increased substantially from fiscal year 2017 to 2018—from fewer than 70 defendants in fiscal year 2017 to more than 900 in fiscal year 2018. Figure 13 illustrates the nationalities of defendants with cases filed with a lead charge of improper entry, both from fiscal years 2014 through fiscal year 2018, and in fiscal year 2018. Illegal reentry (8 U.S.C. § 1326): The majority of defendants with cases filed with a lead charge of illegal reentry after removal from fiscal years 2014 through 2018 were Mexican nationals. Our analysis of EOUSA data indicates that, in fiscal year 2018, the proportion of illegal reentry defendants who were Mexican nationals was lower than in the fiscal year 2014 through 2018 time period, and the proportion of illegal reentry defendants who were Honduran or Guatemalan nationals was higher than in the fiscal year 2014 through 2018 time period. Figure 14 illustrates the nationalities of defendants with cases filed with a lead charge of illegal reentry, both from fiscal years 2014 through fiscal year 2018, and in fiscal year 2018. Alien smuggling (8 U.S.C. § 1324): The majority of defendants in cases filed with a lead charge of alien smuggling from fiscal year 2014 through fiscal year 2018 were U.S. nationals. Our analysis of EOUSA data indicates that, in fiscal year 2018, the proportion of defendants for alien smuggling who were U.S. nationals was lower than in the fiscal year 2014 through 2018 time period. Figure 15 illustrates the nationalities of defendants with cases filed with a lead charge of alien smuggling, both from fiscal years 2014 through fiscal year 2018, and in fiscal year 2018. This appendix provides additional detail on cases filed in the 89 non- southwest border judicial districts with a lead charge of 8 U.S.C. § 1325 (improper entry), 8 U.S.C. § 1326 (illegal reentry after removal), or 8 U.S.C. § 1324 (alien smuggling) from fiscal year 2014 through fiscal year 2018. Specifically, this appendix analyzes the number of cases filed with one of these lead charges in every district but Arizona, California Southern, New Mexico, Texas Southern, and Texas Western. Our analysis of Executive Office for U.S. Attorneys (EOUSA) data indicates that illegal reentry cases comprised the majority of immigration-related offenses in non-southwest border districts. From fiscal year 2014 through fiscal year 2018, about 14 percent of cases filed with a lead charge of illegal reentry were filed in non-southwest border districts. Figure 16 illustrates the number and trends in cases filed with a lead charge of improper entry, alien smuggling, or illegal reentry in non-southwest border districts from fiscal years 2014 through 2018. Our analysis of EOUSA data indicates that cases filed with a lead charge of illegal reentry in non-southwest border districts increased by approximately 26 percent between fiscal year 2017 and fiscal year 2018. Illegal reentry cases comprised approximately 91 percent of immigration- related cases filed in non-southwest border districts from fiscal years 2014 through 2018. Table 30 illustrates the number of illegal reentry cases filed by non-southwest border district and fiscal year. In addition to the contact named above, Kathryn Bernet (Assistant Director), Mary Pitts (Analyst-in-Charge), Isabel Band, Dominick Dale, Jan Montgomery, Heidi Nielson, Hiwotte Amare, Michele Fejfar, and Eric Hauswirth made key contributions to this work.", "summary": "In 2017 and 2018, the Attorney General directed federal prosecutors to prioritize prosecutions of immigration-related offenses, including improper entry into the United States, illegal reentry after a prior removal from the country, and alien smuggling, among other offenses. Most individuals prosecuted for such offenses are arrested by DHS's U.S. Border Patrol and referred to DOJ's USAOs for prosecution in federal court. GAO was asked to review the actions DOJ, DHS, and the federal judiciary took in response to the 2017 and 2018 memoranda. GAO reviewed (1) how DOJ prioritized prosecutions of immigration-related offenses in response to the Attorney General's memoranda, (2) what DHS and DOJ data from fiscal years 2014 through 2018 indicate about such prosecutions, and (3) resources that DOJ, DHS, and the federal judiciary used to support increased immigration-related prosecutions. GAO visited three of the five southwest border USAO districts and interviewed DOJ, DHS, and federal judiciary officials by phone from the other two districts. GAO also analyzed U.S. Border Patrol data on its arrests and prosecution referrals from fiscal years 2014 through 2018; analyzed Executive Office for U.S. Attorneys data on its prosecutions from fiscal years 2014 through 2018; and reviewed relevant laws and DOJ, DHS, and federal judiciary policies, operational guidance, and budget data. This is a public version of a sensitive report that GAO issued in August 2019. Information that DOJ, DHS, or the federal judiciary deemed sensitive has been removed. Department of Justice (DOJ) U.S. Attorney's Offices (USAO) in all five districts along the southwest border—Arizona, California Southern, New Mexico, Texas Southern, and Texas Western—have adopted prosecution priorities aligned with the Attorney General's prioritization of criminal immigration enforcement. In particular, all five USAOs prioritized misdemeanor improper entry cases in response to the Attorney General's 2017 and 2018 memoranda. Some USAOs, such as Arizona, were able to quickly increase such prosecutions using existing practices. In other districts, such as California Southern, USAOs had to establish new practices in coordination with other stakeholders in the federal criminal prosecution process—including the Department of Homeland Security (DHS), other DOJ components such as the U.S. Marshals Service (USMS), and the federal judiciary—before they could begin accepting a significant number of improper entry cases. Note: The lead charge is typically the most serious charged offense at the time the case is filed. The number of improper entry cases more than doubled from fiscal year 2017 (about 27,000) to fiscal year 2018 (about 62,000). In fiscal year 2018, about 84 percent of all improper entry cases filed were completed in districts with one-day improper entry court proceedings. In these proceedings, the initial hearing, presentation of evidence, plea, and sentencing took place in one day or less. DOJ, DHS, and the federal judiciary realigned resources to support the prosecution priorities outlined in the 2017 and 2018 memoranda, including personnel and physical space. In addition, agencies temporarily surged personnel to the southwest border. For example, USMS reassigned personnel from other enforcement areas to judicial security duties to support increased immigration-related prosecutions.", "document_type": "gao"}
{"report": "Table 1 provides an overview of tax-time financial products based on information gathered during our review. The tax-time financial products industry consists of four main groups of participants: banks, paid providers of tax preparation services, settlement service providers, and software developers. Providers of tax preparation services include paid tax return preparers or electronic return originators (ERO). Not all tax preparers are EROs, but because IRS generally requires returns to be filed electronically for tax preparers filing more than 10 returns, tax preparers generally work with or for an ERO that also may be a tax preparer. Paid preparers and EROs offer their services in-person, on the Internet, or through software sold to taxpayers. They generally offer different refund disbursement options to taxpayers and may partner with banks to offer tax-time financial products. Software developers provide software needed to file tax returns electronically and offer tax-time financial products through their software to taxpayers. The largest tax preparation companies have their own software that allows them to prepare returns as well as offer tax-time financial products. Applications for the products generally can be completed through the same software used to file the return. Banks provide tax-time financial products. They also may approve and process product applications and perform settlement services (discussed below). Settlement service providers serve as intermediaries in transactions to deliver tax-time products. They work with banks to accept and process applications for tax products; allocate payments due to paid preparers, other providers, banks, and taxpayers; and provide distribution instructions to banks. Some banks have affiliates that perform settlement services, and some banks perform these functions themselves. Figure 1 illustrates the roles of these groups, using the example of a refund transfer transaction. The purpose of federal banking supervision is to help ensure that banks throughout the financial system operate in a safe and sound manner and comply with banking laws and regulations in the provision of financial services. At the federal level, banks are supervised by one of the following three prudential regulators and CFPB: The Federal Reserve supervises state-chartered banks that opt to be members of the Federal Reserve System, bank holding companies and savings and loan holding companies (and the nondepository institution subsidiaries of those organizations), and nonbank financial companies designated for Federal Reserve supervision by the Financial Stability Oversight Council. FDIC supervises all FDIC-insured state-chartered banks that are not members of the Federal Reserve System as well as state savings associations and insures the deposits of all banks and thrifts approved for federal deposit insurance. OCC supervises federally chartered national banks, federal savings associations (federal thrifts), and federally chartered branches and agencies of foreign banks. CFPB has rulemaking authority to implement provisions of federal consumer financial law and enforces various federal laws and regulations governing consumer financial protection. CFPB also examines banks with more than $10 billion in assets and their affiliates and certain nonbanks for compliance with federal consumer financial laws, accepts consumer complaints on topics such as debt collection and other consumer financial products or services, and educates consumers about their rights under federal consumer financial laws. FDIC, the Federal Reserve, and OCC are required to conduct a full- scope, on-site risk-management examination of each of their supervised banks at least once during each 12-month period. The regulators may extend the examination interval to 18 months, generally for banks and thrifts that have less than $3 billion in total assets and that meet certain conditions (for example, if they have satisfactory ratings, are well capitalized, and are not subject to a formal enforcement action). The prudential regulators generally conduct consumer compliance examinations every 12–36 months and Community Reinvestment Act examinations every 12–72 months. The specific timing depends on a bank’s size and its previous consumer compliance and Community Reinvestment Act rating. But the Dodd-Frank Wall Street Reform and Consumer Protection Act transferred consumer protection oversight and other authorities over certain consumer financial protection laws from multiple federal regulators to CFPB. Additionally, for the transferred laws such as Truth in Lending Act (TILA) and Equal Credit Opportunity Act, CFPB has examination and primary enforcement authority for banks with assets of more than $10 billion and any affiliates of such institutions. The three prudential regulators also are responsible for supervising for compliance with federal consumer financial laws for insured depository institutions with total assets of $10 billion or less. For example, they examine depository institutions for compliance with consumer financial laws including the Fair Housing Act, the Servicemembers Civil Relief Act, and Section 5 of the Federal Trade Commission Act. FTC can enforce Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive acts or practices affecting commerce, and TILA, which seeks to promote the informed use of consumer credit. TILA requires disclosures about the terms and cost of credit and standardizes the manner in which costs associated with borrowing are calculated and disclosed. FTC can enforce a number of additional statutes against certain entities; they include portions of the Gramm-Leach-Bliley Act, which requires financial institutions, including those providing tax-time financial products, to protect consumer data; the Telemarketing and Consumer Fraud and Abuse Prevention Act, which prohibits telemarketers from making misrepresentations in the sale of goods or services, which could include tax-time financial products; and the Military Lending Act, which provides important protections for servicemembers and their dependents seeking and obtaining certain types of consumer credit, including refund anticipation loans. The Office of Professional Responsibility within IRS is responsible for ensuring all tax practitioners (defined as certified public accountants, attorneys, enrolled agents, enrolled actuaries, appraisers, and enrolled retirement plan agents) and other individuals authorized to practice before IRS adhere to regulations relating to Circular 230, which governs practice before IRS. According to IRS, IRS is neither involved in offering, nor responsible for, tax-time financial products. Nonetheless, IRS stated that it addresses these types of products on its website because it is important for taxpayers to understand the terms of the loan products, which constitute an agreement between them and the third-party lender. Although IRS is not statutorily required to collect data on tax-time products, according to IRS officials, the agency retains information on use of the products. Specifically, IRS compiles information from tax returns that indicates whether the taxpayer also applied for a financial product. IRS also issues guidance to EROs on reporting these data through its Handbook for Authorized IRS e-File Providers of Individual Income Tax Returns (Pub. 1345). IRS makes the usage data publicly available on its website, and provides it on a biweekly basis to industry participants that are members of an IRS working group on security issues. In addition to researchers and consumer advocacy groups, federal entities also use these data, including the National Taxpayer Advocate, who leads IRS’s Taxpayer Advocate Service—an independent office in IRS whose objectives include mitigating systemic problems that affect large groups of taxpayers. As industry data on product use are generally limited, agencies and researchers rely on IRS for this information. Refundable tax credits include the Earned Income Tax Credit (EITC) and the Additional Child Tax Credit (ACTC). The credits are termed refundable because, in addition to offsetting tax liability, any excess credit over the tax liability is refunded to the taxpayer. EITC provides tax benefits to eligible workers earning relatively low wages. For tax year 2018, the maximum EITC amount available was $6,431 for taxpayers filing jointly with three or more qualifying children, and $519 for individuals without children. In 2017, EITC provided more than $65 billion to about 27 million taxpayers. ACTC is the refundable portion of the Child Tax Credit and provides tax relief to low-income families with children. The Protecting Americans from Tax Hikes Act of 2015 (PATH Act) made several changes to the tax law. One of its provisions stipulates that funds owed taxpayers claiming EITC or ACTC refunds for a tax year cannot be released before February 15 to allow IRS time to review these returns for potential fraudulent activity. This change became effective on January 1, 2017. For the 2018 tax filing season (January through April 2018), refunds for taxpayers who claimed these tax credits were not available in bank accounts or prepaid cards until February 27, 2018. IRS data on tax-time financial products for 2016–2018 do not accurately reflect product use and IRS has not updated reporting guidance to tax preparers. IRS data for 2008–2016 and information from industry participants and a consumer advocacy group’s reports suggest that trends in the market for tax-time financial products include the decline of refund anticipation loans and that refund transfers became the most used product. Industry data also indicate that product fees for refund transfers increased in 2018; multiple other fees can be associated with tax-time products. New tax-time products and product features continue to be introduced. Data collected by IRS are the primary source of information on the use of tax-time financial products and are used by federal entities, policymakers, regulators, researchers, and consumer groups. However, we identified some limitations in the IRS data related to use of refund anticipation loans, refund advances, and refund transfers. Despite limitations with IRS data on product use by tax year, our analysis of multiyear trends from these data, supplemented with data collected by the National Consumer Law Center and from Securities and Exchange Commission filings, suggests that use of refund anticipation loans declined, the refund advance was introduced while refund transfers have become the most used tax-time product. Applications for refund anticipation loans declined sharply from 2010 to 2012, according to IRS data and consumer groups reports. According to a 2010 study, the volume of refund anticipation loans peaked in 2002 with 12.7 million taxpayers. Volume began to decline at a faster rate between 2010 and 2011. According to a report by the National Consumer Law Center and the Consumer Federation of America, banks stopped offering the products in 2012 after the loans came under the scrutiny of federal banking regulators. IRS data continued to show use of refund anticipation loans after 2012 but with banks out of the market for refund anticipation loans, it is unclear what types of financial institutions were offering the loans. Consumer advocates with whom we spoke agree that nonbank lenders such as payday lenders likely offered the loans; however, we were not able to identify any. The consumer advocates, researchers, and industry participants with whom we spoke also were not able to provide us with any current information about these lenders. The IRS Taxpayer Advocate Office, the Financial Crimes Enforcement Network, and consumer advocates have long raised concerns about refund anticipation loans. For example, in 2007 the National Taxpayer Advocate expressed concerns about how the loans were offered to consumers and whether consumers adequately understood the product. Consumer advocates questioned the high interest rates the loans could carry, how loan fees reduced EITC benefits taxpayers received, and the ramifications of borrower default. In a 2008 advance notice of proposed rulemaking, IRS and the Department of the Treasury also shared concerns that refund anticipation loans offered tax preparers an incentive to fraudulently inflate refund claims and to market the loans to taxpayers who might not understand the full cost of the product. Banking regulators raised concerns as well. OCC and FDIC noted consumer protection and safety and soundness risks to banks that offered refund anticipation loans. FDIC encouraged consumers to have tax refunds directly deposited into their own bank accounts and raised concerns about other options that claimed to speed up a refund for a sizable cost, according to FDIC officials. The Office of Thrift Supervision, which had supervisory authority over federal thrifts at the time, ordered a medium-sized thrift to cease making refund anticipation loans in 2010. In part due to concerns expressed by OCC, national banks stopped offering the loans by 2010 and FDIC-supervised banks stopped offering them by 2012. An IRS decision also contributed to FDIC enforcement actions on refund anticipation loans. Before 2011, IRS used a tool called the debt indicator that acknowledged whether any of a taxpayer’s refund could be used to pay certain outstanding debts. IRS provided the debt indicator to tax preparers at the time the taxpayer’s return was filed electronically. Banks used the debt indicator in their underwriting tools to help determine a borrower’s likelihood of loan repayment. FDIC determined that without the debt indicator, a bank would have to develop and adopt a more robust underwriting process to make these loans in a safe and sound manner. According to FDIC, IRS’s elimination of the debt indicator created a safety and soundness concern because it removed a key data element used for determining a borrower’s ability to repay. Losing this information increased the risk of loss for lenders and at that time helped inform FDIC’s consent orders with two banks under its supervision to stop offering refund anticipation loans. In 2011 (the first tax season without the debt indicator), the number of returns with a refund anticipation loan indicator reported by IRS decreased to 1.17 million from 6.9 million in the prior year. IRS data continue to show use of refund anticipation loans after 2012, albeit at a much lower volume. For example, in 2016, IRS data show about 468,500 returns with a refund anticipation loan indicator and in 2017 the number appeared to spike to about 1.7 million. However, as discussed earlier, the data for these two years may be misleading because they likely conflate refund anticipation loans with refund advances. In 2018, IRS created a separate reporting category for refund advances and the 2018 data show about 356,000 returns with a refund anticipation loan indicator as of October 2018. Use of refund transfers—which allow for direct deposit of refund checks through temporary accounts that banks open for taxpayers—far exceeded use of refund anticipation loans and refund advances since 2008, according to IRS data. The number of taxpayers who used a refund transfer more than doubled from 2008 through October 2018 to exceed 21 million. As banks stopped offering refund anticipation loans in 2012, refund transfers (also known as refund anticipation checks) began to increase. Unlike other tax-time financial products generally only available early in the tax season (which generally runs through mid-April), refund transfers are usually available after April. However, IRS data on refund transfers since 2016 have limitations. Although a refund transfer is not required to get a refund advance, a number of industry experts told us that almost all taxpayers who apply for a refund advance also apply for a refund transfer. But because tax preparers could select only one product indicator when reporting use of tax-time financial products, they could report a refund advance or a refund transfer, but not both. As discussed previously, IRS made changes in 2018 to allow preparers to add information about other product use but has not issued explanatory material about the changes. In 2016, a few banks began offering refund advances to taxpayers. Refund advances are no-fee, nonrecourse loans. It is difficult to determine usage trends for this product, although available data indicate an increase in use from 2016 to 2017. First, accurate IRS data on refund advances are not available for 2016 and 2017 because IRS did not provide an option for tax preparers to report refund advance products. As previously discussed, IRS added a separate reporting category for refund advances in 2018. As of October 17, 2018, IRS data show about 1.65 million returns with a refund advance indicator. Second, publicly available data from industry and other sources (consumer advocacy and research organizations) are limited. According to data reported by the National Consumer Law Center, major tax preparation companies facilitated the sale of about 365,000 refund advances in 2016. According to industry sources, use increased to about 1.63 million in 2017, when one of the largest tax preparation companies began offering refund advances. Industry data for 2018 were not yet publicly available at the time of this report. Third, taxpayers often obtain refund advances and refund transfers in tandem. But as discussed previously, IRS reporting indicators did not include an option for reporting use of multiple products until 2018. Use of refund advances also may have increased in 2017 because tax preparers increased the size of the advances. One lender that offers refund advances to tax preparers told us that the driving factor in demand for refund advances was the available loan amount. The maximum advance amount that tax preparers offered taxpayers in 2016 was $750. In 2017, the maximum increased to $1,300. Most industry participants and consumer groups told us that they believe that provisions of the PATH Act requiring IRS to delay issuance of EITC or ACTC returns and associated refunds until after February 15 led to an increase in demand for refund advances. They said that the delay puts pressure on taxpayers eligible for EITC or ACTC who depend on getting their refund early in the tax season (a refund advance can help mitigate the impact of this delay). Others stated that an increase in demand due to the PATH Act is possible, but the correlation between the two cannot be determined. One industry provider suggested that increased demand for refund advances also could be the result of marketing by tax preparation companies. Our analysis of publicly available data about product fees for refund transfers showed that fees increased in 2018. In particular, our analysis of fee data collected by the National Consumer Law Center shows that in 2014–2017 refund transfer fees charged by paid tax preparers remained generally unchanged at between $32.95 and $34.95. According to fee information we were given during our undercover visits, paid tax preparers generally charged their customers $39.95 or $49.95 during the 2018 tax filing season for a refund transfer that sometimes included both federal and state tax refunds. In one case the fee was $65, which included a paper check disbursement. Also in 2018, we found that online providers of tax filing services and software charged online filers who prepared their own returns between $12 and $39.99 for a refund transfer. According to our analysis, factors that can affect the fee a taxpayer pays for a refund transfer include the following: Filing method. Our review of providers’ websites shows that taxpayers who filed their own returns online using preparer software paid an average fee of $31.13 in 2018, which was lower than the $39.95 or $49.95 that paid preparers charged their customers. Disbursement method. The manner in which the taxpayer chooses to receive a tax refund may affect the fee. For example, our review of industry literature indicates that one bank set the fee at $29.95 if the refund was disbursed to a prepaid card offered by an affiliate vendor or at $39.95 if the refund was directly deposited or disbursed as a check. Another bank gave tax preparers the option to offer a free refund transfer for disbursement onto a prepaid card, $15 for a direct deposit, or $20 for a paper check. Incentives offered to tax preparers by banks. Incentives from banks for tax preparers can increase fees for taxpayers. Our review of banks’ promotional materials for tax preparers also indicates that some bank providers offer tax preparers different fee structures for a product—that is, the preparers can charge a higher fee to earn a rebate. For example, one bank offered a tax preparer the option to provide a refund transfer to clients for $39 (which includes an $8 incentive paid to the tax preparer) or for $29 (no incentive payment). On their websites, two banks marketed the no-incentive option to tax preparers as a way to be competitive (by offering low-cost options to their customers). Using a refund advance. According to a report by the National Consumer Law Center, one bank set a higher fee for a refund transfer if taxpayers also applied for a refund advance. When taxpayers used only a refund transfer, the fee was $29.95 for the federal refund and an additional $9.95 for the state refund, for a total of $39.90. If the taxpayer also applied for a refund advance (a no-fee product), the refund transfer fee was $44.95. Thus, taxpayers paid $5.05 more for a refund transfer if they also received a refund advance. Our analysis found that, in addition to the product fee, taxpayers may be charged other fees when they use a refund transfer. State refund transfer. In some cases, the refund transfer fee covered the deposit of a federal and a state refund. In other cases, the fee only covered the federal refund. In these cases, if the taxpayer received a state refund, the tax preparer charged an additional fee of $10 or $12. Disbursement services. According to documentation we reviewed, a tax preparer may charge an additional fee of $25 if taxpayers choose to get their refund as a paper check or $7 for a cash transfer to a third party. Prepaid card use. The long-term use of prepaid cards used to disburse a refund may add to the overall cost of getting a tax product. We reviewed cardholder agreements and fee schedules for several prepaid cards commonly used to disburse funds from a tax refund and found they generally carry monthly fees of about $5. The issuer of the prepaid cards also may charge consumers a fee every time they access cash at automated teller machines, deposit more money onto the card, or do not use the card for a certain period of time. Software fees. Companies that design tax preparation software may charge a fee or fees associated with the tax product. Taxpayers may pay one or more of these fees when they use a refund transfer to receive their tax refund. The bank deducts these fees from the taxpayer’s refund after receiving funds from IRS or the state taxing authority. The fee categories are technology fee (up to $18 in our review), a transmission fee that may be a fixed amount (such as $2) or a variable amount, and a processing fee of $6. To determine how the fees associated with a refund transfer can affect the total tax preparation fees a provider may charge a taxpayer, we reviewed fee data we collected. We then identified the types and totals of fees generally associated with tax products and created four possible scenarios based on this analysis (see fig. 2). We designed two scenarios with online self-filers (taxpayer uses a refund transfer and taxpayer does not use a refund transfer) and two scenarios with paid preparers performing the filing (taxpayer uses a refund transfer and taxpayer does not use a refund transfer). Recent and emerging developments in the market for tax-time financial products include higher loan amounts and new products, according to our analysis of selected tax preparers’ websites and marketing materials, and information we were given during our undercover visits. For example, in 2018 refund advances became available to online filers. They previously were offered only to taxpayers who obtained paid tax preparation services in person (at a “storefront”). The maximum amount for a refund advance has continued to increase. In 2016, the maximum loan amount available to a taxpayer was $750. In 2018, the maximum loan amount available was $3,250 and for 2019, one preparer has offered an advance of up to $3,500. One industry participant told us that the industry in general is in a race to increase borrowing limits to remain competitive and attract more customers. In 2018, banks offered a new product that combines the features of a refund anticipation loan and a refund advance. The product allows the taxpayer to apply for a refund advance (up to a fixed amount) with no fee or finance charges, the option to apply for an additional loan with a fee (similar to a refund anticipation loan), or a combination of the two products known as a hybrid. For 2018, two banks offered this additional loan (not to exceed $1,000) at an annual percentage rate of 29.9 percent. For 2019, one bank offered taxpayers the option of a no-fee advance of up to $1,000, or an interest-bearing loan of $2,000, $3,000, or $5,000 based on the expected refund. The interest-bearing loans would carry an annual percentage rate of 26.07 percent in addition to a fee of $30–$75, depending on the loan amount. Also for 2019, one national tax preparation company has offered the option of a no-fee advance of up to $3,500 or a fee-based advance of up to $7,000, which would carry an annual percentage rate of 35.9 percent. In addition, demand for refund transfers has increased among online self- filers. As more people file their own tax returns by using web-based software, the number of refund transfers used by self-filers may continue to increase. Because few tax preparers offer refund advances to online self-filers, taxpayers are still more likely to get a refund advance from a paid tax preparer. Finally, issues relating to the applicability of TILA disclosure requirements to refund transfers could affect the market for tax-time products. According to representatives of two consumer advocacy organizations, deferment of tax preparation fees until the refund is received constitutes an extension of credit; therefore, refund transfers should be treated as loan products. Tax preparers and a policy research and education organization with whom we met do not believe that refund transfer fees meet the definition of a loan. Should regulators decide that a refund transfer constitutes an extension of credit, and would therefore be a credit transaction with a finance charge, refund transfers would become subject to provisions of TILA. These changes could affect taxpayers’ access to this product as well as product pricing. According to Securities and Exchange Commission filings of some tax preparers, if refund transfers were successfully characterized as such, the additional requirements and costs could limit their ability to offer these products to clients. Refund advances were promoted by providers as a fee-free, interest-free credit product, and thus TILA disclosure requirements are generally not considered applicable for them. However, new interest-bearing credit products announced for 2019 may be subject to consumer protection regulations. Using FDIC data, we conducted a multivariate regression analysis to examine the relationship between economic and demographic variables and tax-time financial product use. This approach allowed us to test the significance of the relationships between each variable and the likelihood of using tax-time financial products, while controlling for other factors. Lower-income households were more likely to use tax-time financial products than higher-income households, particularly when they used paid tax preparers to file their taxes, according to our analysis of 2017 FDIC data. More specifically, we estimated that households with incomes between $20,000 and $39,999 were more likely to use tax-time financial products to receive their tax refunds more quickly through paid tax preparers than households with incomes of $60,000 or more. For example, we estimated that households with incomes between $20,000 and $29,999 were 34 percent more likely to use tax-time financial products than households with incomes of $60,000 or more; and households with incomes between $30,000 and $39,999 were 61 percent more likely to use the products than households with income of $60,000 or more. Moreover, our analysis of FDIC data suggests that households that received EITC were more likely to use tax-time financial products, compared to households that did not receive EITC. Our results also suggest that wealth, as measured by homeownership, was associated with the household decision whether to use tax-time financial products. Homeowners were 34 percent less likely to use tax- time financial products than non-homeowners, controlling for other factors. Households of some minority groups were more likely to use tax-time financial products when filing tax returns than white households. For example, using FDIC data, we estimated that African-American households were 36 percent more likely to use tax-time financial products than white households after controlling for other factors. Other research (a 2013 study) found that African Americans were more likely to use refund anticipation loans than white individuals. According to our analysis of 2016 IRS data, which included information about tax-time financial product use and locality, use of tax-time financial products was more concentrated in some areas of the South and the West (see fig. 3). Our analysis of FDIC data further suggests that other characteristics associated with use of tax-time financial products include age and household type. For example, households headed by younger persons (15–39 years old) were more than twice as likely to use the products as households headed by older persons (60 or older), controlling for other factors. Households headed by single adults with families were more likely to use tax-time financial products than households headed by married couples. For example, according to our analysis of FDIC data, we estimated that households headed by unmarried females with families were 76 percent more likely to use tax-time financial products than households headed by married couples, controlling for other factors. Using IRS data from 2016, we found that a higher proportion of product users filed as unmarried heads of household, compared to the general tax filing population. Among those who used tax-time financial products, about 39 percent filed as single, 22 percent filed as married, and 37 percent as unmarried heads of household. Reasons to use tax-time financial products include more quickly obtaining cash from the expected tax refund, not having to pay tax preparation fees out of pocket, and obtaining cash more cheaply than with alternative short-term funding options, according to our review of federal and industry reports. Taxpayers generally might have to wait weeks for refunds from IRS: Taxpayers who file paper returns can expect to receive their refund about 6–8 weeks after the date on which IRS receives their return, according to IRS guidance. Taxpayers who file electronically generally can expect to receive their refunds within 21 days, or faster if they opt to have refunds deposited directly into their bank accounts. As previously discussed, IRS must delay payments of refunds on which EITC, ACTC, or both are claimed until at least February 15 of each year. Effectively, the refunds might not be disbursed to bank accounts (or prepaid cards) of tax filers until the end of the month. In contrast, users of tax-time products can obtain cash very quickly. For example, refund advance recipients generally receive loan funds within 24 hours of applying, and in some instances within the same hour they apply, according to selected tax preparer documents and websites that we reviewed. Refund transfer products also allow those who do not have the option of directly depositing refunds into a temporary account instead of waiting longer to receive a paper check. According to our analysis of IRS data from 2016, tax-time financial product users were more likely than other taxpayers to receive their tax refunds by direct deposit. Taxpayers may use tax-time financial products because they need cash quickly. Studies we reviewed found that product recipients tend to have pressing financial obligations. One study’s review of available literature from 2010 found that product recipients tend to live paycheck-to- paycheck or lack sufficient savings to cover prior, current, or future spending. Another study published in 2010 found that recipients use the products to pay for pressing financial obligations, both expected and unexpected, and for their tax preparation. According to the study, many users of tax-time products become delinquent on rent, utilities, and other expenses during the winter with the expectation that they will be able to pay obligations after receiving tax refunds. As one study found, the annual tax refund represents the largest single cash infusion received all year by about 40 percent of checking account holders. Lower-income taxpayers also use tax-time financial products to defer payment of fees related to tax return preparation, according to federal government and industry reports that we reviewed. Tax preparation fees vary greatly based on the tax forms used, including the EITC worksheet. One of the largest national tax preparation chains reported that its average tax preparation fee was between $205 and $240 in 2017. Free Filing Services The Internal Revenue Service (IRS) offers the following free filing services: Fillable forms. IRS offers forms that can be completed online and electronically submitted to IRS. The forms are available without age, income, or residency restrictions. Free file software. IRS, in partnership with the Free File Alliance (members of the tax software industry), provides free online filing options to eligible taxpayers. Twelve leading tax software providers make a version of their products available exclusively at IRS.gov for taxpayers with an adjusted gross income up to $66,000 (in 2018). Volunteer Income Tax Assistance. The program provides free basic income tax preparation with electronic filing by IRS- certified volunteers to qualified individuals, including to persons who earn $55,000 or less, have disabilities, or have limited proficiency in English. Tax Counseling for the Elderly. The program provides free tax preparation by IRS- certified volunteers to all taxpayers, particularly those 60 or older. Program volunteers specialize in pension and retirement-related issues unique to seniors. Consumers may perceive any costs associated with tax-time financial products and tax return preparation as lower than they actually may be because the costs are not paid out of pocket. Fees for the products and tax return preparation are deducted from the refund before it reaches the consumer. In general, studies have found that the transparency of a payment method affected the payer’s willingness to spend. One consumer advocacy organization representative posited that paying for tax-time financial products and tax preparation from a refund makes consumers less sensitive to the real cost of tax-time products and preparation services. Instead of using tax-time financial products to defer payment of tax preparation fees, lower-income taxpayers can access free filing services through several IRS programs (see sidebar). However, these options do not allow taxpayers to use tax-time financial products to access refunds faster. IRS estimates that about 70 percent of taxpayers are eligible to access its free filing software, and we estimated about 3 percent of taxpayers use this service. According to IRS officials, while IRS does not have a marketing budget to promote the free file programs, the predominant reason so few taxpayers use them is because there are many free tax preparation options on the market, such as tax preparation software. Taxpayers also may use paid tax preparers because they do not think they can fill out tax returns on their own, believe that preparers will help them receive higher refunds, or both, according to federal government and industry reports we reviewed. For taxpayers who did not use tax-time financial products, we did not find a clear association between paid tax preparation and higher average refunds. On the other hand, for taxpayers who used tax-time financial products, we found that average tax refunds were higher for taxpayers who filed through paid tax preparers than for taxpayers who self-filed online (see table 2). According to IRS data, nearly all taxpayers who used refund loan products filed their taxes through paid tax preparers, as refund advances were not available online until the 2018 tax filing season. There may be various reasons for the association between higher refunds, paid tax preparation, and product use. Those who use tax-time financial products tend to be eligible for tax credits such as EITC, which can increase the size of tax refunds. Fifty- four percent of EITC claimants used a paid preparer. However, a 2017 study found that the combination of paid tax preparation and tax-time financial product use was associated with relatively high incorrect tax payments (specifically, overpayments of EITC compared to online self- filing and product use or no product use). Furthermore, our analysis of IRS data found that taxpayers who used tax- time financial products received higher refunds on average than those who did not use tax-time financial products, regardless of tax filing method—although other factors might explain this association. For example, taxpayers who have high refunds have a greater incentive to use the products than taxpayers who have relatively small refunds or owe taxes. For lower-income taxpayers, tax-time products generally provide more cash at a lower cost than other small-dollar loan alternatives such as payday loans, auto title loans, and pawnshop loans, according to our review of federal government and industry reports. The amounts of alternative loan products are based on the value of the collateral the consumer provides. Average loan amounts are $150 for pawnshops, about $500 for payday loans, and under $1,000 for automobile title loans, according to industry statistics and CFPB and other studies. In contrast, refund advances were offered for up to $3,250 for the 2018 tax filing season. Furthermore, the alternative products generally include fees, unlike refund advances. For example, fees for payday loans generally range from $10 to $30 per $100 borrowed. Automobile title lenders generally charge a fixed price per $100 borrowed, with a common fee limit of 25 percent of the loan per month. In contrast, refund advances are offered at no cost to the consumer. Tax-time financial products also may be easier to access because, unlike alternative loans, they generally can be obtained without regard to credit history. However, tax-time financial products generally are only available during tax season. Loans provided by nonfinancial companies (often called fintech firms) are another source of short-term financing. However, fintech firms generally provide much larger loan amounts than tax-time financial products, and include fees, unlike refund advances. The federal banking regulators oversee banks that offer tax-time financial products and IRS sets standards of practice for certain service providers (including some tax preparers). While our nongeneralizeable review found that selected banks and tax preparers generally followed existing OCC and IRS disclosure requirements, some tax preparers’ disclosure practices may present challenges for consumers trying to compare product options. FDIC, the Federal Reserve, or OCC are responsible for the safety and soundness supervision of banks within their authority (which offer tax-time financial products) and may have supervisory authority over third-party service providers (which provide settlement services). We identified five banks that partnered with several national tax preparation chains in recent years to offer tax-time financial products (refund transfers and refund advances). Of the five banks, FDIC supervised one medium-sized and one small bank, OCC supervised two medium-sized banks, and Federal Reserve supervised one medium-sized bank. As previously discussed, FDIC, the Federal Reserve, and OCC are to conduct full-scope, on-site risk-management examinations of each of their supervised banks at least once in each 12–18 month period. FDIC officials told us that its regular safety and soundness examinations may include an examination of the bank’s tax-time financial product offerings. OCC officials told us that they examine tax-time financial products in every annual examination of the banks they supervise that offer these products. Because the five banks each has total assets of less than $10 billion, the three regulators also are responsible for enforcing compliance with federal consumer financial laws (such as TILA and the Electronic Fund Transfer Act) that govern disclosure requirements for certain tax-time financial products. Officials from the regulators told us that they received few complaints about tax-time financial products offered by their supervised banks. We discuss the disclosure requirements and compliance with the requirements in more detail later in this section. The regulators’ consumer compliance examiners also may review a bank’s tax-time financial products—if, for example, a bank offers a new product or there are a number of consumer complaints about a current product. Examiners employ a risk-focused approach with a focus on consumer harm in selecting products to evaluate for compliance with applicable consumer laws and regulations. Furthermore, compliance examiners may decide, based on the potential for consumer harm and a bank’s compliance management system, that there is enough residual risk to scope the product into the examination. FDIC officials said that a bank with a lot of activity in the market for tax-time financial products would have to assure examiners that it had performed appropriate due diligence. Regulators also can take other oversight actions, ranging from enforcement to raising awareness among consumers. In 2015, CFPB took an enforcement action, along with the Navajo Nation, to ban an owner of four tax preparation franchises from the market and levy civil penalties for understating refund anticipation loan rates and deceiving customers about the status of their tax refunds. Our search of CFPB’s complaint database did not identify any consumer complaints on tax-time financial products. CFPB published a blog post in February 2018 that describes the different tax-time financial product options and the process for obtaining them, and cautions consumers to consider all fees, charges, and timing associated with the products. FTC staff we interviewed told us that supervision authority over many financial services providers has been given to CFPB, but that FTC still has the authority to enforce many financial statutes and rules, including rules administered by CFPB. FTC brought an enforcement action in 2017 against an online tax preparation provider alleging that it failed to secure consumer accounts. FTC officials also told us that, while they received numerous complaints on tax-related issues, FTC’s complaint database does not separately classify complaints based exclusively on tax-time financial products. FTC also has issued guidance to educate consumers regarding tax- related scams and other consumer protection issues that arise during tax time, and to businesses, including tax professionals, to help them detect cyber threats. FTC also co-sponsors a series of educational events for consumers and businesses surrounding tax identity theft awareness week. Software companies we interviewed stated that they are subject to IRS regulations relating to electronic filing of tax returns. Software developers provide tax software to tax preparers so that they may file tax returns electronically and assist taxpayers in obtaining tax-time financial products. One software company told us that this involves working with IRS to ensure that returns can be electronically submitted, IRS can receive data, and the software is in compliance with IRS’s required data schemas. IRS officials said that IRS does not monitor or have direct oversight authority over tax-time financial products, but requires some paid tax preparers to meet standards of practice or other requirements. The extent to which IRS has oversight over paid preparers depends partly on whether the preparer is a tax practitioner or unenrolled preparer. Tax practitioners are subject to regulations (Circular 230) that establish standards of practice. For example, practitioners must return tax records to clients, exercise due diligence in preparing tax returns, and submit records and requested information to IRS in a timely manner. IRS officials told us that they monitor the suitability of these practitioners and their adherence to the rules. Additionally, certain tax practitioners known as enrolled agents generally are required to pass a three-part examination and complete annual continuing education, while attorneys and certified public accountants are licensed by states but are still subject to Circular 230 standards of practice if they represent taxpayers before IRS. Alternatively, unenrolled preparers—the remainder of the paid preparer population and the majority of paid preparers—generally are not subject to these requirements. In 2011, IRS issued final regulations to establish a new class of registered tax return preparers to support tax professionals, increase confidence in the tax system, and increase taxpayer compliance. However, the U.S. District Court for the District of Columbia ruled in 2013 and the U.S. Court of Appeals for the District of Columbia Circuit affirmed in 2014 that IRS lacked sufficient authority to regulate all tax preparers. IRS officials also told us that all authorized IRS e-file providers have to follow certain requirements to be able to file tax returns electronically. We found selected authorized IRS e-file providers generally followed the requirements established by IRS on the disclosure of product fees, and banks generally followed the disclosure guidance relating to tax-time financial products issued by OCC. (We conducted nongeneralizeable reviews of website content, industry documents, and disclosures made during our undercover visits.) Two of the five banks we reviewed are regulated by OCC. One of the two FDIC-supervised bank and the Federal Reserve-supervised bank told us that they voluntarily follow OCC guidance. More specifically, IRS established the following disclosure requirements for authorized IRS e-file providers, generally known as EROs, that relate to tax-time financial products: EROs must obtain taxpayers’ written consent before disclosing any tax return information to other parties in relation to an application for a tax product. EROs must ensure taxpayers understand that if they use a tax product, the refund will be sent to the bank and not to them. If taxpayers choose to use a fee-based loan, EROs must advise that the product is an interest-bearing loan and not an expedited refund. EROs must advise taxpayers that the bank may charge them interest, fees, or both, in the case of any shortages on the refund. EROs also must disclose all deductions to be made from the expected refund and the net amount of the refund. In 2015, OCC issued risk-management guidance for national banks that offer tax refund-related products. This guidance advises that banks should specify to customers, as applicable, the total cost of the tax product, separately from the tax preparation cost; that total costs will be deducted from and reduce the refund amount; that tax refunds can be sent directly to the taxpayer without the additional costs of a tax product; that customers with deposit accounts can receive their refund without incurring fees through direct deposit in about the same time as it would take to receive a tax refund-related product; and the ongoing periodic maintenance and transaction fees related to any product intended for long-term use. In addition, OCC’s guidance establishes that banks should clearly disclose all material aspects of the product in writing before the consumer applies or pays any fees for a tax-time financial product. Also, representatives of the American Coalition for Taxpayer Rights, a group representing the leading tax preparation, tax software, and bank providers, told us that its members signed a joint statement with attorneys general from six states on disclosure practices for refund transfers. The member providers agreed to explain to taxpayers the different options for filing and receiving a tax refund, including no-cost options, and the associated costs and features of each option. The providers also agreed to disclose the optional nature of the products, the timing of the refund, and to present the disclosures in a clear and conspicuous manner understandable by a reasonable consumer. Our nongeneralizeable review of documents received from selected banks and tax preparers found disclosures generally followed OCC guidance or IRS requirements, respectively. However, our review of these documents and selected tax preparer websites also found—and our undercover visits of selected tax preparers suggested—that the level of transparency on product fees varied and product fees and information were not always clearly disclosed. Bank documents were more likely than information provided by paid preparers (in person or online) to include more disclosures about the fees and terms of tax-time financial products. For example, of the 12 bank documents we reviewed, all disclosed that funds would be sent to the bank if the taxpayer used a tax product. Almost all the bank documents disclosed the fees associated with the product and all disclosed that the fees would be deducted from the refund. In contrast, while written disclosure is not required, less than one third of ERO documents disclosed that the taxpayer using a tax-time financial product would receive funds from the bank instead of IRS. However, almost all the documents are presented to taxpayers after returns have been prepared and preparers have determined that taxpayers qualified for a product. The timing of when a tax preparer makes these disclosures would pose a challenge for taxpayers looking to compare prices for different providers. That is, they would not learn of the total fees—partly because the paid preparer could not determine the amount of some tax preparation fees until well into the preparation of the tax return. A taxpayer trying to determine the cost of using a tax refund to pay for online tax preparation services only would be able to compare the prices of two of the eight online providers we reviewed. The remaining six did not disclose this fee in a prominent way—with some disclosures made in small print or requiring navigation through several pages after the product page—or at all. A taxpayer choosing to file taxes using the services of a paid tax preparer in a brick-and mortar-location, and opting to use the refund to pay for tax preparation fees, would be unlikely to be able to compare prices among different providers. For example, during six of our undercover visits, our investigators explicitly requested literature on product fees. However, the preparers stated that they did not have the literature available or only provided us with business cards and other promotional material. Our analysis shows that providers do not consistently explain products or disclose fees to taxpayers. For example, providers told us, and industry documents show, that a refund transfer is not required to get a refund advance. However, during our site visits, tax preparers tied the use of a refund transfer to a refund advance four out of five times. In two of these cases, the tax preparer included the fee for a refund transfer as part of processing an advance product, while in another two cases the tax preparer said that a refund transfer was required with the advance. Also, during our site visits, three of the nine tax preparers did not disclose the cost of a refund transfer. Appendix III provides more information on our analysis of bank and tax preparer disclosure practices. According to industry participants, only taxpayers expecting a refund can qualify for a tax product; consequently, the tax preparer generally cannot determine whether the taxpayer qualifies until after the tax return is completed. Once this is determined, the tax preparer must request the taxpayer’s consent to offer a tax product. EROs with whom we met told us they may disclose fee information at various points throughout the process of tax preparation, and do so verbally or through their in-store computer interface. Bank disclosures are provided to the taxpayer before the product application has been submitted. Some researchers and representatives from consumer advocacy organizations with whom we met were concerned about the timing of disclosures of tax-time financial product fees. Consumer advocates said disclosures given to taxpayers were inadequate, unhelpful, or timed in such a way as to prevent meaningful comparison shopping. Specifically, one consumer advocacy organization said that taxpayers they serve do not understand the fees associated with filing through preparers. Representatives from another consumer advocacy organization said that taxpayers do not know the total cost for tax-related financial products and services until they already have taken steps to file their returns. In its 2017 Report to Congress, the National Taxpayer Advocate recommended that IRS require all e-file participants offering tax-refund financial products to provide a standard “truth-in-lending” statement to help taxpayers better understand the terms of the refund anticipation loan product. IRS did not adopt the National Taxpayer Advocate’s recommendation but agreed that e-file providers should be transparent about the costs associated with the loan products offered to taxpayers as part of the return preparation process. As previously discussed, courts have determined that IRS does not have sufficient authority to regulate individuals who are solely tax preparers and not licensed by IRS—in effect, the majority of the paid preparer population. Previously, we asked Congress to consider legislation granting IRS the authority to regulate paid tax preparers, if it agreed that significant paid preparer errors existed. As of March 2019, this Congressional action we have recommended remains open. The lack of consistency about the timing of fee disclosures for tax-time financial products may add to the rationale for Congress to consider regulating preparers. Such statutory authority could allow IRS to require that tax preparers make tax-time financial product disclosures or ensure meaningful transparency in the sale of the products. For lower-income taxpayers with pressing financial obligations, tax-time financial products can offer an alternative to higher-cost short-term products such as payday loans. Taxpayers can purchase tax-time financial products from many tax preparers; however, according to our review of selected tax preparers and banks, the price and associated fees of these products can vary. And disclosure practices by some paid tax preparers may pose challenges for consumers looking to compare prices for different providers. IRS is an essential source for data on tax-time financial products, but to date IRS has offered limited options to tax preparers for accurately reporting usage of all available tax-time products. Furthermore, IRS has not informed tax preparers about changes made in reporting options and has not informed users of IRS’s product data about known issues with the data. Consequently, data on product usage are not reliable. Improving the quality of data collected on these products would help ensure that federal agencies, policymakers, regulators, consumer advocacy groups, and researchers have quality information to report on tax policy and consumer protection issues and inform their decision-making. We are making a total of two recommendations to IRS. The Commissioner of Internal Revenue Service should communicate data issues regarding the refund anticipation loan indicators for tax years 2016 and 2017 and the refund transfer indicators since tax year 2016—for example, by attaching explanatory material to the dataset. (Recommendation 1) The Commissioner of Internal Revenue Service should improve the quality of tax-time financial product data collected; for example, by allowing authorized e-file providers to indicate more than one type of tax- time financial product for each return or by informing tax preparers of the addition of new product definitions and instructions on how to accurately code the products. (Recommendation 2) We provided a draft of this report to IRS, FDIC, Federal Reserve, OCC, CFPB, and FTC for review and comment. IRS provided written comments, which are reproduced in appendix IV and discussed below. FDIC, Federal Reserve, OCC, CFPB, and FTC provided technical comments, which we incorporated as appropriate. In its comments, IRS concurred with both recommendations, and described how it planned to address them. In response to our first recommendation, IRS stated that it plans to provide the appropriate notations with the datasets. In response to our second recommendation, IRS stated that it plans to pursue programming changes and clarify instructions for tax return preparers to promote accurate coding of refund- related products. We believe that these actions, if implemented, would address our recommendations and improve the quality of data IRS reports on these products. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees and IRS, FDIC, Federal Reserve, OCC, and FTC. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. This report (1) describes trends in the market for tax-time financial products and product fees and examines the reliability of IRS data on these trends, (2) describes characteristics of those who use tax-time financial products and factors that influence the decision to obtain the products, and (3) describes regulatory oversight of industry participants and the disclosure of information on product fees and terms. To examine trends in the use of tax-time financial products, we used 2008–2018 Internal Revenue Service (IRS) data compiled from tax filings to determine the types and use of these products. We assessed the reliability of these data by interviewing IRS officials about the controls and quality assurance practices they used to compile these data. We determined the data alone did not provide a reliable count of refund transfers, refund anticipation loans, or refund advances in 2016, 2017, and 2018, but were adequate to suggest general trends when supplemented with other information. To supplement the IRS data, we collected information from reports issued by the National Consumer Law Center, reviewed Securities and Exchange Commission filings for two selected tax preparers, and interviewed representatives from National Consumer Law Center and both tax preparers on the offerings of tax-time financial products. We selected these preparers because they are major providers of tax preparation services and tax products. To identify and review trends in product offerings, we reviewed the websites, promotional materials, and other industry literature including Securities and Exchange Commission filings of a nongeneralizeable selection of four providers of online tax preparation services, three tax preparers with physical locations that also offer services online, and four banks. We also discussed changes in the market and product offerings with nine of the industry providers with whom we met. We accessed provider websites before and during the 2018 tax season. The tax preparation firms were selected because they are national tax preparation chains, and the five banks were selected because they partnered with the national tax preparation chains and major developers of tax preparation software. In addition, we reviewed studies related to these products published by GAO, federal agencies, four consumer advocacy and research groups, and two academic researchers. We used these studies primarily to corroborate findings from our data analysis. We focused on studies from 2010 and later; however, we also reviewed an older report to gain a greater understanding of how the market for tax-time financial products evolved. We identified these studies through expert recommendations and citations in studies. To examine trends in fees for tax-time financial products, we collected fee-related information from several different sources (because of limited publicly available industry data). All of the information cannot be used to generalize our findings to the retail tax preparation industry. Product fees. For 2018, we collected information on product fees from six paid tax preparers and four banks. For tax years 2014 to 2017, we used product fee information as reported by the National Consumer Law Center. For 2018, we also reviewed fee data from six providers of online tax preparation software, two that provide services in person and online, and four that only provide services online. We selected these providers after conducting internet searches and reviewing reports by consumer advocates and federal agencies. Data elements included fees for refund transfers and refund advances. For 2018, data elements also included the dollar amount for the incentives banks offered tax preparers for each refund transfer sold. Ancillary product fees. We collected information on ancillary product fees from four tax preparers, four banks, and three software developers for tax years 2017 and 2018. Data elements included fees for disbursement methods such as prepaid cards and paper checks and other charges related to the use of a tax-time financial product such as technology and transmission fees. Tax preparation fees. We collected information on tax preparation fees from eight tax preparers with physical locations and eight online providers of tax preparation services for 2018. Data elements included fees for federal and state filing. Aggregate fees. We collected aggregate tax-time financial product, ancillary product, and tax preparation fee information from studies issued by consumer protection advocates. We collected the above information from websites, advertising materials, and public filings with the Securities and Exchange Commission of tax preparers, banks, and software developers. To identify some of the demographic and economic characteristics of product users, we used data from the Bureau of the Census and the Federal Deposit Insurance Corporation (FDIC) from 2011, 2013, 2015, and 2017 to conduct a multivariate regression analysis to determine the influence of individual characteristics on the decision to obtain a product. We statistically controlled for various income, education, and demographic factors. While the FDIC data contain a rich set of demographic and economic variables, they include limited data on characteristics specifically related to tax filing. To identify specific tax-filing characteristics associated with product use, we also used a probability sample of data from IRS from the 2014, 2015, and 2016 tax years to calculate the percentages of taxpayers who used tax-time financial products according to various tax-filing characteristics, including tax filing status and tax filing method. We also used the sample data to calculate the percentage of taxpayers who used free filing services, including free file software, programs, and fillable forms. We reviewed documentation on and conducted testing of the data we used and determined they were sufficiently reliable for reporting economic, demographic, and tax-filing characteristics associated with product use. For more detailed information on our analysis of characteristics associated with tax-time financial product use, see appendix II. To better understand user characteristics associated with the decision to obtain a tax-time financial product identified by our analysis, we reviewed relevant federal and industry reports on the financial needs of individuals with characteristics similar to taxpayers who obtained these products. We focused on reports from 2010 and later. We also reviewed our prior studies and studies from the Consumer Financial Protection Bureau (CFPB) on alternative credit products and compared their features and fees to those of tax-time financial products. In addition, we interviewed representatives from consumer groups, four Low-Income Taxpayer Clinics, and IRS’s Taxpayer Advocate Service to obtain their perspectives on characteristics associated with tax-time financial product users. To describe the regulatory oversight of industry participants associated with tax-time financial products, we reviewed relevant federal laws and regulations, and reports and guidance documents from IRS and federal regulators, including the CFPB, FDIC, the Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency (OCC), and Federal Trade Commission. We inquired about consumer complaint data related to tax-time financial products at the federal regulators and interviewed officials from the federal agencies and representatives from five tax preparation providers, five banks and bank affiliates such as settlement service providers, four consumer advocacy organizations, three software developers, two researchers, one provider of alternative financial services, and one industry group to gain their perspectives on the benefits and risks of the tax-time financial products and how any related concerns were being addressed. The tax preparation firms were selected because they are national tax preparation chains, and the five banks and three software developers were selected because they partnered with the national tax preparation chains. The four consumer advocacy organizations, two researchers, alternative financial service provider, and industry group were selected for their experience and to provide a range of perspectives. To review how product terms and fees are disclosed by tax preparers, in February 2018 GAO investigators acting in an undercover capacity visited a nongeneralizeable sample of nine randomly selected tax preparers in Washington, D.C., Maryland, and Virginia to inquire about tax-time financial products. We selected the two states and Washington, D.C. to ensure a mixture of state and local laws governing the products and providers. From the two states and Washington, D.C., we selected one metropolitan statistical area based on the concentration of product users and the proximity to lower-income households. We randomly selected three individual tax preparers in each of the three metropolitan statistical areas to visit, based on proximity to taxpayers in lower-income households and to ensure a mixture of urban and rural communities and company sizes. We visited offices of large tax preparation chains and single-office tax preparation businesses. Results cannot be used to generalize our findings to the retail tax preparation industry. Our investigators posed as taxpayers seeking tax preparation services who wanted to pay for the tax preparation fees with the expected refund or obtain an advance based on their anticipated tax refund. They requested available documents associated with tax preparation, refund advance and refund transfer products, and different disbursement options and fees. Because GAO investigators did not experience the tax preparation or the product application process, we were not able to assess the timing of any disclosures typically made after the tax return preparation process would begin. In addition, we received some consumer-facing disclosures and product agreements that were typically provided during the product application process from two tax preparers and two banks. We also conducted a content analysis of websites of eight selected tax preparers that offer tax-time financial products. The tax preparers were selected as national providers of tax preparation services with an online presence, and the results are not generalizeable to the retail tax preparation industry. Three of the providers offer tax preparation services online and through physical retail locations and five of the providers offer their services online only. We reviewed these websites to understand the extent to which they disclose fees to the taxpayer for tax preparation services, tax-time financial products, disbursement, and additional products or services, and to review the ease with which these disclosures are accessible. In addition to consumer-facing disclosures we received from providers with whom we met, we searched online for additional disclosures provided by the tax preparers and banks in our review and reviewed seven disclosures from two national tax preparation chains and 12 disclosures from five banks offering tax-time financial products. We then compared the disclosures against IRS and OCC requirements for disclosure for product terms and conditions. IRS established certain disclosure requirements for authorized IRS e-file providers. OCC instructs banks it supervises to make certain disclosures to product consumers. More specifically, we analyzed tax products and fee disclosures obtained from our undercover visits of selected tax preparers, online reviews, and directly from tax preparers and banks to determine the type and timing of disclosures made in these instances and whether they were consistent with IRS disclosure requirements and followed OCC guidance. We conducted this performance audit from July 2017 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We conducted our related investigative work in accordance with standards prescribed by the Council of the Inspectors General on Integrity and Efficiency. This technical appendix outlines the development, estimation, results, and limitations of the econometric model and other data analysis we described in the report. We undertook this analysis to better understand the characteristics associated with the decision to obtain a tax-time financial product. Federal Deposit Insurance Corporation. To assess the characteristics associated with tax-time financial product use, we used data from the Federal Deposit Insurance Corporation’s (FDIC) National Survey of Unbanked and Underbanked Households for 2011, 2013, 2015, and 2017, which is a supplement of the Current Population Survey. We used the following variables on households and heads of households to examine how various demographic and economic characteristics are related to the use of tax-time financial products: Household income. Household type. Homeownership status. Race and ethnicity of the head of household. Educational attainment of the head of household. Age of the head of household. Head of household has children. Household used refund anticipation loan or a tax preparation service to receive a tax refund faster than the Internal Revenue Service (IRS) would provide it in the past 12 months. This is a dummy variable, which equals 1 if the household used products and 0 otherwise. A refund anticipation loan is a tax-time financial product. Based on our interviews and other research reports, refund anticipation loans and other tax-time financial products (including refund anticipation checks) may be used by consumers to get their tax return faster than IRS could provide it. We refer to this variable as “used tax-time financial product” for simplicity in the report, and we explain the relevant caveats and limitations below. This variable is the basis for the sample used for this analysis. See table 3 for the estimated distributions of these variables for all households, as well as households that used tax-time financial products in 2017. We also examined the relationship between the use of tax-time financial products and being unbanked, as well as the association between using tax-time financial products and alternative financial services (those offered outside the banking system). We used additional data from FDIC’s National Survey of Unbanked and Underbanked Households on the following variables: Household used other alternative financial services in the past 12 months, including nonbank check cashing, nonbank money orders, payday loans, and pawn shops. Household used prepaid card(s) in the past 12 months. Household was unbanked in the past 12 months. See table 4 for estimated distributions of household responses to questions related to unbanked status and usage of other alternative financial services for all households, as well as households that used tax- time financial products in 2017. IRS. To further identify tax-filing characteristics associated with tax-time financial product use and trends, we also used data from a probability sample of 2 percent of all electronically filed tax returns from IRS for tax years 2014, 2015, and 2016. In 2016, the sample size was 2,952,418, representing a population of 147,625,598 tax returns. According to IRS, the sample is representative of all electronically filed tax returns for the relevant tax years. In this sample, IRS provided data on the following variables: Tax filing method, including online (self-filed using tax software) or through a paid practitioner (including tax preparers with physical storefronts). Taxpayer used free filing services from IRS, including the Free File program and free fillable forms. Tax filing status, including single, married, and head of household. Disbursement options for tax refunds (direct deposit or paper check) or tax balance due. Tax refund amount. Tax year. Tax-time financial product use, including refund anticipation loans, refund anticipation checks, or no tax-time financial products. In tax year 2016, we estimated that about 18 percent of taxpayers used a tax-time financial product, plus or minus less than 1 percentage point. We also used IRS data from the Statistics of Income division for tax year 2016 to assess the geographical concentration of product use at the zip- code level. Zip code data from the IRS Statistics of Income division are based on population data that was filed and process by IRS in tax year 2016. Due to some data suppression from IRS for privacy purposes, zip codes with less than 100 tax returns are excluded from the data. As a result, in 2016 the total returns represented in the IRS zip code data are 145,302,140 and the number of tax returns with a tax-time financial product was 21,654,760, meaning about 15 percent of tax filing units in these data used a tax-time financial product. Regression analysis using FDIC data. Using FDIC data, we conducted a multivariate regression analysis to examine the relationship between each explanatory variable and tax-time financial product use. Specifically, we estimated multivariate logistic regression models. Regression models allow us to test significant relationships between economic and demographic variables and the likelihood of using tax-time financial products, while controlling for other factors. We used logistic regression models because our dependent variable is binary. The dependent variable represents whether a household used tax-time financial products. We collapsed “no” and “did not know/refused” into a single category for our regression analysis, so that the dependent variable is equal to 1 if the household used tax-time financial products and 0 otherwise. Logistic regressions allow the relationships between various characteristics and tax-time financial product usage to be described as odds ratios. Odds ratios that are statistically significant and greater than 1.00 indicate that households or heads of households with those characteristics are more likely to use tax-time financial products. Odds ratios that are less than 1.00 indicate that households or heads of households with those characteristics are less likely to use tax-time financial products. For categorical variables, this increase or decrease in the likelihood of product use is in comparison to an omitted category, or reference group. For example, the odds ratio for households headed by African Americans is statistically significant and 1.36. This implies that the odds of tax-time financial product use for households headed by African Americans are 1.36 times the odds of use for households headed by whites, holding other factors constant. Put another way, households headed by African Americans are about 36 percent more likely to use tax- time financial products than households headed by white individuals, if other conditions remain constant. This result and others are discussed further in the results section below. We also present 95 percent confidence intervals, which helps clarify the statistical significance of the odds ratios. Our baseline estimates were derived from logistic regressions that accounted for the survey features of the FDIC data. Our main regression results used data from the 2017 survey year. We also estimated logistic regressions using data from the 2015, 2013, and 2011 survey years, using the same variables when possible. Our baseline specification includes explanatory variables for race and ethnicity, education, age, household type, income, and homeownership. We used groups of indicator variables or categorical variables to control for all characteristics. In other specifications, we included controls for children, unbanked status, use of alternative financial services other than tax-time financial products, state indicators, and region indicators to check the robustness of our results. We also assessed the sensitivity of our analyses by restricting the analysis to households that only answered “yes” or “no” to tax-time financial product use. We excluded answers of “did not know/refused,” so that the dependent variable is equal to 1 if the household used tax-time financial products and 0 if the household did not use tax-time financial products. In a more limited analysis, we merged data from the 2017 FDIC data, which is the June 2017 supplement of the Current Population Survey, with the 2017 Annual Social and Economic Supplement, which is the March 2017 supplement of the Current Population Survey. We performed the additional analysis because the March 2017 supplement has data on tax-filing characteristics, including tax credits used by households. Given the structure of the Current Population Survey, some households were surveyed in both the March and June 2017 supplements, and those households comprise the sample used in this part of the analysis. We identified those represented in both supplements using household and person identifiers, as well as data on sex, race and ethnicity, and age. Using this merged sample, we estimated logistic regressions that both did and did not account for the survey features of the data. We included the same explanatory variables as our baseline estimates, along with indicators for use of the Earned Income Tax Credit, Additional Child Tax Credit, and Child Tax Credit. Analysis of IRS data. Using the 2 percent sample of IRS data, we estimated the percentages of tax filers with varying tax-filing characteristics by year and average refund amounts by year. All estimates are weighted at the tax filing unit level. Using the IRS’s zip code data from the Statistics of Income division for 2016, we calculated the number of total tax filing units and tax filing units who used tax-time financial product at the zip code level. Regression analysis using FDIC data. Our results have limitations and should be interpreted with caution. For example, our analysis identifies correlations between characteristics and tax-time financial product use and not causal relationships. Moreover, there may be variables that are correlated with tax-time financial product use that are not included in our models. For example, we are not able to account for community characteristics that may influence the decision to use the products due to data limitations. We used statistical tests for multicollinearity (high intercorrelations among two or more independent variables) and goodness of fit to check the validity of the model to the extent possible, given the use of complex survey data. Our analysis of the characteristics associated with the use of tax-time financial products uses a relatively small number of observations. For example, we observe 798 households that used these products in the 2017 survey year, representing about 2.4 percent of households (plus or minus 0.2 percentage points), and that is the benchmark utilization rate against which the results should be interpreted. Moreover, IRS data indicate that more than 20 million tax filers used tax-time financial products in 2016, representing about 20 percent of tax filers who filed their taxes electronically. These data sets use different units of analysis, and there can be multiple tax filers in one household, especially for those who use Earned Income Tax Credit. However, comparing the two suggests that the survey data may not include all users of tax-time financial products. Given the question used to measure the dependent variable, our analysis focuses on those who use tax-time financial products to get their tax refund more quickly. While a key reason people use tax-time financial products is to meet cash needs, there may be other reasons people use the products, including covering the cost of tax preparation. Our results may not generalize to other time periods. There have been a number of changes in the market for tax-time financial products in recent years. Our results may not generalize to all products currently available in the market. However, our results from 2017 are generally similar with the 2015, 2013, and 2011 survey years, despite a number of changes to the tax-time financial product market during these years. Our findings suggest that similar types of households have utilized tax-time financial products regardless of industry and market changes, particularly if households used paid preparers and tax-time financial products to expedite their tax refunds. Our analysis focuses on households that used tax-time financial products and accessed them through paid preparers. However, taxpayers also may have accessed specific types of tax-time financial products when they used online software to file their own taxes. For example, individuals who file their own taxes online may use the products to cover the cost of the software that helps them prepare their taxes. The characteristics of people who use products for these reasons may be different than what we found in our analysis. Analysis of IRS data. The IRS data are representative of tax returns filed electronically and not of tax returns filed by other means, including by paper. The results may not generalize to years for which we do not have data. The indicators in the data for specific types of tax-time financial products, including the indicators for refund anticipation loans and refund anticipation checks have some significant limitations. In tax years 2014– 2016, IRS only allowed tax-time financial products to be coded as refund anticipation loans or refund anticipation checks (that is, there was no code to indicate that two or more products were used together). However, there were some major changes in the industry during this period, particularly with regards to refund anticipation loans, that suggest that these indicators do not measure the same types of products over time. Given the limitations of the definitions of specific tax-time financial products, most of our analysis focuses on the universe of tax-time financial products in the IRS data and not on differences by specific types of products. Regression analysis using FDIC data. Our analysis suggests a number of economic and demographic characteristics are associated with tax- time financial product use, particularly when purchased through a tax preparer to expedite the tax refund, after controlling for other factors. In 2017, relatively lower-income households were more likely to use the products than higher-income households. Households headed by single women with families were more likely to use tax-time financial products than households headed by married couples. Furthermore, householders who owned their homes were less likely to use tax-time financial products. African American households were more likely to use the products compared to white households. Finally, relatively younger households were more likely to use the products than older ones. The results of the main specification of our logistic regression are presented in table 5. Our results for other specifications using 2017 data were generally similar. For example, adding an additional control for unbanked status did not substantively change the results. In alternative specifications that included an indicator for use of other alternative financial services, we found a significant and positive correlation between using tax-time financial products and other alternative financial services, including nonbank check cashing, nonbank money orders, payday loans, and pawn shops. Moreover, including state and region indicators did not substantively affect the results. Using the sample restricted to just “yes” and “no” responses also did not substantively change the results. Our results for other years were generally similar, with some exceptions. For example, in other survey years prior to 2017, we found that in addition to African American households, Native American households also were more likely to use tax-time financial products than white households. Moreover, education and children were significant correlates in prior survey years. Analysis of IRS data. We found that nearly 1 in 5 taxpayers who filed their taxes electronically used tax-time financial products each year from 2014 to 2016, while less than 3 percent of filers used free filing services available through IRS during the same period. We also found that in 2016, tax-time financial product use was associated with receiving tax refunds through direct deposit, which is a faster way to receive a tax refund than paper check. Users of tax-time financial products also were more likely to file as heads of household (tax filing status) than taxpayers who did not use tax-time financial products. Moreover, taxpayers who used the products received higher tax refunds on average than taxpayers who did not use the products, especially when they used paid tax preparers to file their taxes. Finally, analyzing the zip code of the filers, we found that use of tax-time financial product was concentrated in some areas of the South and the West. Our limited nongeneralizeable review of documents received from selected banks and tax preparers found disclosures generally followed Office of the Comptroller of the Currency (OCC) guidance or Internal Revenue Service (IRS) requirements for fees disclosure, respectively. However, we noted from our undercover visits of selected tax preparers that the extent and clarity of the disclosures offered to customers varied. Furthermore, in our review of selected tax preparers’ websites, we found that fees and information about products were not always clearly disclosed. All nine tax preparers we visited offered the option to pay for the tax preparation fees with the tax refund by using a refund transfer, but they did not always clearly communicate how these options work. For example, three preparers did not disclose the refund transfer fee, and in a few instances, the refund transfer was provided alongside a refund advance and we were not given the option to pay for the tax preparation fees out of pocket. In other cases, the refund transfer fee was disclosed, but the product was not always identified as optional (that is, not required for tax preparation). During six of our undercover visits, our investigators explicitly requested literature on product fees. However, the preparers either stated they did not have the literature available or only provided us with business cards and promotional material. The other three times we did not ask for, and were not offered literature on product fees, features, or terms. In two of our visits, the tax preparers offered our investigators a refund advance after we expressed an interest in getting the refund quickly. In another two visits, we were offered unsolicited refund advances. When offering the product, these four tax preparers bundled the refund advance with a refund transfer (an optional product). By adding a refund transfer, the tax preparer effectively added a fee-based product to the refund advance, a product that otherwise is free to the taxpayer. During one of the visits, we were offered a refund advance only after we specifically asked for it. We reviewed the websites of eight selected providers of tax preparation services. We found that while these providers generally disclosed product fees, these disclosures were not made in a consistent manner. For example, all eight of the websites we reviewed offered taxpayers the option to use the expected refund to pay for tax preparation fees. Most of the time, the fee associated with this option was not clearly disclosed on the website. Only two of the eight providers clearly disclosed this fee on the products page; the other six did not disclose the fee in a prominent way or at all. In addition, all five providers that offered refund advances fully disclosed fee information for this product. Three of the eight online tax preparation service providers had physical locations in addition to their online presence. Of these three, only one disclosed on its website the refund transfer fee for taxpayers who filed a return in-person at one of their offices. For the second preparer with a physical presence, the refund transfer fee quoted for the online service was significantly lower than the fee we were quoted for in-person services at an office. The third preparer with a physical and online presence did not disclose the refund transfer fee for either the in-person service or online filing. We received and reviewed seven disclosure documents originated by two national tax preparation companies both of which are electronic return originators (ERO) and 12 bank documents from five banks in the industry. We compared the disclosure documents against IRS requirements for disclosure of fees for tax products and we compared the bank documents to OCC guidance related to disclosure of product, disbursement, and additional fees. Both sets of documents in our nongeneralizeable review generally disclosed the product fees in accordance with IRS requirements or OCC guidance as appropriate. Bank forms, including disclosures, are presented to taxpayers once they have decided to apply for a tax product. This practice is consistent with OCC’s guidance, which states that the details of a product should be provided to consumers before they apply for it. However, our analysis found that almost all of these documents are presented to taxpayers after returns have been prepared and tax preparers have determined the taxpayers were qualified for a tax-time financial product. The timing of when a tax preparer make these disclosures would make it challenging for a taxpayer to compare product prices from different providers or make more informed purchasing decisions. Moreover, all the ERO documents we reviewed with information on refund advances disclosed that the taxpayer would be receiving a loan and not a refund. However, of the six ERO disclosure documents that disclosed fees, four disclosed additional fees that might be associated with tax refund products, such as disbursement fees. Of the 12 bank documents we reviewed, all disclosed that funds would be sent to the bank if taxpayers used a tax product. Almost all the documents disclosed the fees associated with the tax product and that the fees would be deducted from the refund. And four of five documents related to a loan product disclosed that the taxpayer would be receiving a loan and not a tax refund. The majority of the documents also disclosed that the taxpayer may receive the refund directly from the taxing authority without incurring additional costs and within the same time frame without using a tax product. All the tax preparer documents and the banks’ disclosure documents were brief and written in plain language. However, almost all the bank application documents were longer than four pages and included technical and industry language. Based on our document reviews of selected tax preparers and banks and as suggested by our undercover visits of nine selected tax preparers, the disclosure of fees for disbursing funds was inconsistent, particularly around prepaid cards. Prepaid cards are often used to disburse funds from a tax-time product. Based on our analysis of providers’ promotional content, in some cases a tax preparer will offer prepaid cards as the only disbursement option. The cards generally carry additional fees for long- term use (such as monthly, withdrawal, reload, and inactivity fees). Prepaid cards usually are reloadable and can be used to pay bills and make retail purchases. IRS does not have guidelines for disclosing fees for the long-term use of prepaid card. However, OCC requires that banks disclose if a tax product may be used on a long-term basis and disclose fees associated with extended use of the product. During our visits, seven of the nine tax preparers provided the option to have the tax refund deposited on a prepaid card. However, only two of the seven preparers noted any potential fee information associated with the short or long-term use of prepaid cards. These two preparers said that there was no additional charge to have the taxpayer’s refund deposited on a prepaid card, and the other five did not explain whether any fees would be charged for this transaction. Five of the seven preparers that offered a prepaid card explained that the card could be used for transactions other than receiving the tax refund. However, only two of the five disclosed any fee information associated with long-term use of the card. Another two of the five preparers referred our undercover agents to the issuer of the card for additional information. The remaining preparer did not disclose that additional fees would apply to long-term use of the card. Four of the eight tax preparation websites we reviewed disclosed partial information about fees related to the disbursement of funds to the taxpayer. Three of the eight websites only disclosed disbursement fee information related to use of prepaid cards. We found fee information in one of the eight websites only after doing a word search. Fees associated with the long-term use of prepaid card fees were not disclosed by three of the six preparers that offered this disbursement option. Two websites disclosed partial fee information and only one disclosed all the fees and terms associated with the long-term use of a prepaid card. Six of these websites advised the taxpayer to see the terms and conditions of the card, four included a link to the terms and conditions of the card, and two did not include a link. Bank documents generally disclosed the fees associated with different disbursement methods such as paper checks and prepaid cards; however, fees related to the long-term use of prepaid cards were not always disclosed. Almost half of the documents we reviewed that include the use of a prepaid card did not acknowledge that fees were associated with the long-term use of prepaid cards, while others included only partial information or a general statement that “fees may apply.” In addition to the contact named above, Karen Tremba (Assistant Director), Nathan Gottfried (Analyst in Charge), Jessica Artis, Maurice Belding, Evelyn Calderón, Farrah Stone, Kathleen McQueeney, Marc Molino, Neil Pinney, Barbara Roesmann, Jessica Sandler, Erinn Sauer, Erin Saunders-Rath, Michael Walton, and Helina Wong made significant contributions to this report.", "summary": "American taxpayers spent at least half a billion dollars in 2017 on financial products—issued by banks, through paid tax return preparers—to help them file taxes and get advances or loans against tax refunds. GAO was asked to review tax-time financial products. Among other things, GAO (1) described market trends and examined IRS data, (2) described characteristics of product users and factors that influence product use, and (3) described product disclosure practices. GAO reviewed fee and product usage data; conducted a multivariate regression analysis to determine user characteristics; and analyzed disclosures of selected providers that are national chains and those of their bank partners. GAO conducted nongeneralizeable undercover visits of nine randomly selected tax preparers in the Washington, D.C. area to understand how they communicate fees and terms to taxpayers. Preparers were selected to ensure a mixture of regulatory jurisdictions, among other factors. GAO reviewed laws, regulations, and guidance on the products, and interviewed IRS and other government officials and a nongeneralizeable selection of product and service providers, tax preparation companies, consumer groups, and academics. Trends in the market for tax-time financial products since 2012 include the decline of refund anticipation loans (short-term loans subject to finance charges and fees), the rise in use of refund transfers (temporary bank accounts in which to receive funds), and the introduction of refund advances (loans with no fees or finance charges). More recent product developments include increased online access to products for self-filers, higher refund advance amounts, the introduction of new products, and for tax year 2019, the reintroduction of fee-based loans. However, GAO identified some limitations in Internal Revenue Service (IRS) data on product use, including over- or under-counting of certain types of products. IRS has not communicated these data issues to users and has not updated guidance to tax preparers on how to report new product use. As a result, data users (including federal agencies and policymakers) have inaccurate information to inform their findings and decision-making. Lower-income and some minority taxpayers were more likely to use tax-time financial products, according to GAO analysis of 2017 data from IRS, the Bureau of the Census, and the Federal Deposit Insurance Corporation. Specifically, taxpayers who made less than $40,000 were significantly more likely to use the products than those who made more. African-American households were 36 percent more likely to use the products than white households. Product users tend to have immediate cash needs, according to studies GAO reviewed. For these users, tax-time financial products generally provide easier access to cash and more cash at a lower cost than alternatives such as payday, pawnshop, or car title loans. GAO's undercover visits with nine tax preparers, its review of selected provider websites, and review of documents obtained from selected banks and tax preparers found disclosures generally followed requirements for disclosing fees. However, disclosure practices by some paid tax preparers may pose challenges for consumers. For example: Preparers in GAO's review generally indicated that they present taxpayers with almost all of the documents with fee information after their tax returns have been prepared and the preparers determined the taxpayers qualified for a tax-time financial product. The timing of these disclosures would pose a challenge for taxpayers looking to compare prices for different providers. During six of nine undercover visits, GAO investigators explicitly requested literature on product fees but were not provided such information. Refund transfer fee information on websites GAO reviewed sometimes was presented only after the tax preparation process started, was in small print, or could be found only after navigating several pages. As a result, taxpayers may face challenges comparing prices. GAO is making two recommendations to IRS to make the collection of product use data more accurate and make data limitations known to users of the data. IRS concurred with both recommendations.", "document_type": "gao"}
{"report": "According to FCC, caller ID services became commonplace due to technology developed in the 1980s, and caller ID information transmitted with the call could generally be trusted by the call recipient. However, FCC found as voice service providers migrated to Internet Protocol (IP) networks, these technologies lessened the overall accuracy and reliability of the information presented to the call recipient. Caller ID allows the recipient of an incoming call to determine the telephone number of the caller and, in some cases, the name. This information helps the recipient make informed decisions about which calls to accept or ignore. While the number and name displayed on the caller ID may be associated with the caller, a caller can also deliberately falsify or “spoof” the information transmitted to the caller ID display to disguise the source of the call. Under the current telephone system, this information, true or false, is conveyed to the call recipient unless the caller requests that such information not be conveyed. Caller ID spoofing is widespread. Many instances of spoofing are legal. For example, spoofing is legally used by professionals such as doctors who want to use their cell phones to return calls to patients but choose to transmit their office number instead. Spoofing also often accompanies robocalls—an automated telephone call which delivers a recorded message. Certain types of robocalls are illegal, such as robocalls for sales pitches unless companies have consumers’ express written permission to call. In addition, telemarketers may not call home or mobile numbers that consumers have registered in the National Do Not Call Registry, which was established through legislation and is maintained by FTC—and they must transmit their telephone number and, if possible, their name, to the call recipient’s caller ID. According to FCC, advancements in technology have made it inexpensive and easy to make robocalls. As telecommunications systems have transitioned from traditional wireline services, to IP networks, the cost of making phone calls has dramatically decreased. IP-based voice services use existing internet connections to send phone calls, which may be cheaper than long distance phone charges associated with traditional phone service. Autodialers can be programmed to dial a long list of phone numbers in order to deliver millions of calls in a short period of time. These dialing systems, coupled with IP-based voice services, such as Voice over Internet Protocol (VoIP), enable telemarketers and scammers to make high volumes of calls from anywhere in the world. IP-based voice services have also made it inexpensive and easy to spoof caller IDs. According to an industry stakeholder, historically, the router systems used to spoof calls were physical devices located on site, which could be prohibitively expensive. However, software that is available for free can now be downloaded to enable a computer to function as a router. According to stakeholders, telemarketers and scammers can, with minimal cost, configure a router to display either a single spoofed number or a constantly changing set of numbers, making it appear as though calls originated in the United States even if they did not. (See fig. 1.) FCC, FTC, and DOJ each enforce different rules or laws related to caller ID spoofing. FCC enforces rules prohibiting anyone from causing the transmission of misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value. FCC also enforces rules requiring telemarketers to transmit caller ID information. FTC protects consumers against unfair or deceptive business acts or practices. FTC, similar to FCC, enforces rules requiring telemarketers to transmit their telephone number, and when available, the name of the telemarketer to a consumer’s caller ID service. DOJ enforces federal fraud statutes under which fines or imprisonment can be imposed against anyone who uses interstate telecommunications as part of a fraud scheme. DOJ can also take civil enforcement actions on FTC’s behalf. FCC and FTC each manage consumer complaint databases where consumers can file complaints about unwanted calls, robocalls, and violations of the Do Not Call Registry. In addition to government efforts, the telecommunications industry, including voice service providers and third party companies, have taken steps to counteract illegal spoofing. For example, some of these companies have developed or deployed applications (i.e., software programs, often referred to as apps) to defend against robocalls and other unwanted calls. This includes call blocking devices for landline telephones and various mobile applications that can label and block robocalls and other unwanted calls based on call patterns, consumer complaints or other means. While some carriers provide these services free, others may charge a fee. In addition, some carriers also work with analytics providers to analyze traffic on their networks. Beginning in 2017, FCC authorized voice service providers to block certain categories of unwanted calls before they reach consumers’ phones. Recently, FCC clarified that service providers can also, as a default, block calls identified as likely unwanted based on the provider’s reasonable analysis of call data unless consumers opt out of this service. Scammers use caller ID spoofing to facilitate a variety of financial fraud and other schemes, often in combination with robocalling. Based on our analysis of FCC, FTC, and DOJ enforcement cases and alerts from federal and state government agencies, as well as interviews with stakeholders, we identified three types of caller ID spoofing schemes. To Obtain Money or Information: Scammers have used caller ID spoofing to trick consumers into providing their financial or personal information or sending money such as via a debit or gift card. These scammers may spoof a name and phone number that looks familiar and trustworthy, such as that of a government agency, a company you do business with, or local number. Scams include telling call recipients they may be arrested or they owe money. For example, spoofed robocalls have been used as part of a wide-reaching scam in which callers spoofed IRS phone numbers and impersonated IRS staff to trick people into sending the scammers money for supposed unpaid taxes. IRS reported that from October 2013 through March 2019, the agency was contacted more than 2.4 million times by taxpayers who reported such calls, and more than 15,453 taxpayers reported losing about $75.1 million. (See fig. 2.) To Generate Telemarketing Leads: Unscrupulous telemarketers have used spoofing as part of an attempt to sell goods or services. In this scheme, consumers may receive a pre-recorded robocall with a sales pitch and be instructed to “press 1” to indicate interest, at which point the call recipient is transferred to a live operator. In one such scheme, more than 96-million spoofed robocalls were made over a 3- month period. These calls included pre-recorded messages falsely claiming to be from Hilton and other well-known travel companies; once consumers were transferred, live operators attempted to sell vacations not affiliated with the brands presented during the prerecorded message. To Harass: People have used spoofing to harass others. In some of these cases, people have used spoofing to cause another person’s caller ID to display a familiar or trusted phone number. In one case, an individual apparently placed 31 spoofed calls as part of a personal campaign to harass and stalk another person. These spoofed numbers appeared to be from the victim’s child’s school, among others. Spoofing is also one of several techniques used to place false calls to emergency response centers to elicit a police response to an address where no emergency exists. Callers have used spoofing to make it appear as if their call originated at or near the reported address. This practice, known as swatting, has resulted in death. For example, in one swatting case, a man was shot and killed by police who believed he was holding others at the address hostage. FCC and FTC consumer complaint data both show dramatic increases in recent years in the number of unwanted call complaints that specifically mention the term spoofing. According to our analysis of FCC and FTC complaint data, from 2015 through 2018, complaints to FCC that specifically referred to spoofing more than doubled and those received by FTC increased by more than four times. (See fig. 3). Several industry stakeholders we spoke with noted a growing trend in one particular type of spoofing, neighbor spoofing. Neighbor spoofing occurs when the caller ID is manipulated to display a phone number matching the area code and prefix (the first six digits) of the consumer’s phone number. Consumers may be more inclined to answer these calls because they appear to be local—perhaps from someone they know. Among FCC’s complaints that included both the caller’s and the call recipient’s phone numbers, the percentage that were indicative of 6-digit neighbor spoofing increased from 10 percent in 2015 to 15 percent in 2018; for similar FTC complaints, the percentage increased from 2 percent in 2015 to 16 percent in 2018; and a call blocking provider told us that its percentage of neighbor-spoofed robocalls increased from 2 percent in January 2016 to 23 percent in December 2018. One analytics provider told us there has been a shift recently from spoofing the first six digits to spoofing the first four and five, which the provider believed to be a reflection of scammers adjusting their methods as more people become aware of the original six-digit form of neighbor spoofing. From 2015 to 2018, FCC and FTC data show substantial increases in complaints indicative of four and five digit neighbor spoofing, with FCC complaints nearly doubling and FTC complaints increasing more than 10 times during this time period. FCC and prior GAO work have described several limitations with using complaint data as a means of measuring the extent of unwanted calls. For example, complaints might increase following consumer outreach regarding how to file a complaint or after news media coverage of a particular scam. In addition, not all consumers who experience problems file complaints, and not all complaints are necessarily legitimate or categorized appropriately. Further, a consumer could submit a complaint more than once, or to more than one agency, potentially resulting in duplicate submissions. Finally, while some consumers may use the term “spoof” when describing the complaint, others may not, either because they do not know they have been spoofed or are not familiar with the term. According to our analysis of FCC data, in 2018, 66 percent of all complaints that were indicative of neighbor spoofing did not include the term “spoof” in the complaint description. Nonetheless, FCC, FTC, and DOJ officials told us they use this complaint data to identify specific trends in types of scams that may help the agencies’ enforcement and public education efforts, which we discuss later in this report. Although we could not find industry data that estimated the total number of spoofed calls, available industry data suggest that the volume of unwanted calls and robocalls (of which illegally spoofed calls are a subset) has increased over the past several years. Using call patterns on their own networks or other means, voice service providers, call blocking applications and analytics providers track data on unwanted calls and robocalls. According to one company, these companies may have limited ability to detect or isolate spoofed calls, in part, because scammers may frequently change the numbers they use. In addition, stakeholders told us, because each of these companies analyzes their specific user base and may use different methods to identify and label robocalls and other unwanted calls, the number of unwanted calls each company estimated may be substantially different. For example, while one analytics company estimated 26.3 billion robocalls nationwide in 2018, another company estimated the number at nearly 48 billion. Similarly, one company estimated a 46 percent increase in robocalls from 2017 to 2018, while another estimated a 57 percent increase for the same time period. Despite these differences, all analytics and call blocking companies we interviewed reported that their estimates of the number of unwanted calls and robocalls have increased in recent years. Because there is no comprehensive data source on unwanted calls, robocalls, or spoofed calls, it is not possible to reliably estimate national trends. FCC has taken steps to seek input from industry and other stakeholders on how to better measure the extent of the unwanted call and spoofing problem. In a November 2017 Further Notice of Proposed Rulemaking, FCC sought comment on, among other things, what information should be collected to evaluate the effectiveness of efforts to combat these calls and whether FCC should adopt a reporting obligation for providers. FCC received numerous comments from voice service providers, their associations, and other stakeholders in response to this notice. One commenter expressed concern that a reporting obligation would be burdensome to providers or of little benefit to FCC, and other commenters stated the agency should instead continue to monitor trends in consumer complaints. More recently, in a June 2019 Declaratory Ruling, FCC adopted a recommendation from 2017 to prepare two reports—one in 2020 and a second in 2021—to measure the effectiveness of efforts to combat illegal robocalls. The ruling explicitly delegates authority to FCC staff to collect any and all relevant information and data from voice service providers necessary to complete these reports and states that the report should include authoritative data about the number of illegal robocalls. FCC, FTC, and DOJ officials all said that their agencies must prioritize which illegal spoofing activity to investigate and take enforcement action against because they do not have sufficient resources to pursue all such activities. FCC and FTC officials stated that while they review complaint data and other information, it would not be practical to open investigations related to every complaint. According to officials at all three agencies, given their limited resources, the agencies prioritize investigations based on the level of harm being perpetrated and the likelihood of being able to effectively bring an enforcement case. Such prioritization is consistent with standards for internal control in the federal government. Those standards call for agencies to estimate the significance of risks to achieving agency objectives—in this case objectives related to protecting the public from harm—and to use those estimates as a basis for responding to the risks. More specifically: In a 2015 letter to several members of Congress, the Chairman of the FCC stated that the agency is more likely to pursue enforcement action when a problem appears to be pervasive, represents a trend, involves an agency priority, affects many consumers, reflects particularly egregious abuse, or presents a security or safety concern. Focusing specifically on investigations and enforcement action related to caller ID spoofing, FCC officials told us that the agency’s three highest priorities are events that (1) threaten public safety; (2) involve very large numbers of spoofed calls; or (3) involve malicious scams or threats. FTC’s strategic plan for fiscal years 2018 to 2022 calls for the agency to target its enforcement efforts on those areas that cause the greatest amount of consumer harm. In line with this objective, FTC officials told us that the agency decides which consumer complaints to investigate based on the level of harm being perpetrated, as well as the likelihood of being able to effectively bring an enforcement case. DOJ’s Justice Manual states that serious violations of federal law must be prosecuted. DOJ officials told us that for fraud schemes that employ caller ID spoofing, the agency is more likely to charge a violation of one of the fraud statutes, such as mail fraud, wire fraud, computer fraud, or conspiracy, as well as the money laundering and identity theft statutes. Specifically with regard to wire and mail fraud cases, the Justice Manual states that serious consideration should be given to the prosecution of any scheme which in its nature is directed to defrauding a class of persons or the general public with a substantial pattern of conduct. FCC and FTC officials stated that there are significant challenges related to investigating spoofing cases that can affect which investigations they choose to pursue and limit the number of enforcement cases they are able to bring. For example, FTC officials stated that the use of VoIP technology enables fraudsters to easily change both their physical locations and the numbers they spoof, making it harder for FTC and other law enforcement agencies to track them down. An industry stakeholder said that the use of VoIP technology makes it difficult to determine even whether the call originated domestically or from overseas. Moreover, FCC officials stated that when spoofed calls originate wholly from a foreign jurisdiction, a lack of foreign cooperation can make it exceptionally difficult to follow a trail back to either the service provider that originated the call or the person or company making the calls. The officials explained that foreign cooperation may be lacking when the calls come from countries with which the United States does not have strong diplomatic relationships. The officials stated that because of this challenge, they are less likely to bring an enforcement case when calls originate wholly from a foreign jurisdiction, due to the low likelihood of successfully resolving such cases and the heightened use of limited staff resources required by such cases. Regardless of these challenges, FCC and FTC officials stated that their agencies have taken steps to improve their ability to investigate cases based overseas. For example, both agencies cited their outreach to the Indian government and the U.S.-India Business Council as well as their participation in the Unsolicited Communications Enforcement Network, a global network of law enforcement authorities and regulatory agencies that works to combat unsolicited communications. FCC, FTC, and DOJ officials identified 62 enforcement cases that they said involved spoofing or blocking of caller ID information, though DOJ officials stated that their list of enforcement cases was not comprehensive because DOJ’s enforcement database does not include an indicator for whether spoofing was employed as part of a fraud scheme. (For a description of these 62 cases, see app. II.) As noted below, these 62 cases are not representative of all of the cases the agencies have brought related to illegal robocalling. FCC officials provided us information on six cases—each of which the officials said involved spoofing or a caller’s blocking of their caller ID information—that the agency brought from April 2011 to September 2018. For example, one case involved a company that used spoofed robocalls to target elderly and low-income individuals to generate sales of health insurance coverage. The company’s high numbers of robocalls also disrupted an emergency medical paging service. FCC issued fines in five of these cases, and one pending case includes a proposed fine. FCC officials told us that since January 2004, the agency has initiated approximately 20 additional enforcement cases and has issued approximately 1,000 warnings, all for robocalling or Do-Not-Call violations under the Telephone Consumer Protection Act of 1991. FTC officials provided us information on 31 cases—each of which the officials said involved spoofing—that FTC brought—or that DOJ brought on FTC’s behalf—from April 2006 to June 2019. Examples of cases include several involving numerous calls to numbers on the National Do Not Call Registry and an incident in which a company impersonated government officials and help centers to make a sales pitch with false and misleading claims about an English-language learning course to Spanish-speaking U.S. consumers. Monetary judgments were issued in all but one of these cases. FTC officials told us that as of November 2019 the agency had brought 147 enforcement cases against Do Not Call and robocall violators. FTC officials also stated that FTC obtains injunctive relief in their Do Not Call, robocall, and spoofing cases, including court orders prohibiting the defendants from engaging in similar conduct, and in some cases, banning defendants from any telemarketing activity. Further, they stated the injunctive relief also includes reporting and compliance requirements to help FTC monitor defendants. FTC officials told us that the agency has obtained injunctive relief in all of its completed spoofing cases and that these injunctions provide strong deterrence and help stop illegal spoofing. DOJ officials provided us information on 25 cases—each of which the officials said involved spoofing—that the agency brought from May 2010 to August 2018. Several of these cases involved companies or individuals that used spoofing as part of a scheme to swindle money from people. For example, in one case, defendants used spoofing as part of a scheme to defraud and extort money from victims who were falsely told they had failed to accept and pay for products they had never ordered. Twenty cases had judgments that included prison time; 18 cases had monetary judgements. FCC and FTC have collected far less than has been assessed in fines or monetary judgements, but officials at both agencies stated that the amounts they have collected still serve both punitive and deterrent purposes. Specifically, FCC officials stated that thus far, FCC has collected $25,970 of the approximately $205 million in fines it assessed. This mostly represents full payment of a $25,000 fine FCC issued in January 2017, but FCC has yet to collect any portion of the more recent fines it has issued: a fine of $120 million it issued in May 2018 and a fine of approximately $82 million it issued in September 2018. FCC has referred both of these cases to DOJ for collection action. FCC officials noted that these large fines may not represent the amount that the defendants are able to pay, and that even payment of a fairly small fraction of a large fine could be enough to put a scammer out of business and serve as a substantial deterrent. FTC officials said that FTC has obtained a total of about $363 million in monetary judgments in its 31 spoofing cases. The officials said that many of these judgements were partially suspended based on the defendants’ ability to pay determined by a defendant’s net worth and assets. Further, the officials said if the defendant misrepresents his or her financial position, the entire judgment can become due under a clause that is part of the judgement. The officials said that as of August 14, 2019, FTC had collected about $31 million in its spoofing cases, and that this amount represents all or substantially all of the unsuspended judgments in those cases. Officials with DOJ’s Consumer Protection Branch said that the branch views monetary judgments as one piece of the deterrence equation for caller-ID-spoofing offenses. The officials stated that the low amounts collected suggest that other preventative measures, such as injunctive relief and imprisonment, must be employed to deter continued unlawful activity. FCC and FTC both favor some changes to law to enhance the effectiveness of their enforcement efforts. Specifically: In May 2019, FTC officials testified that the agency’s enforcement efforts are hindered by a statutory provision that prohibits the agency from taking action against telecommunications carriers, to the extent they are engaged in common carriage activities. FTC further testified that it would like this provision removed so that the agency could take enforcement action against carriers engaged in illegal telemarketing activities. In 2018, an FCC official publicly stated that a longer statute of limitations for enforcement of the Telephone Consumer Protection Act of 1991 would improve the agency’s enforcement efforts against knowing and willful violators of the act. Currently, that act has a 1-year statute of limitations, while the Truth in Caller ID Act of 2009 has a 2-year statute of limitations. FCC officials told us that harmonizing the two acts’ statutes of limitations to 2 years would help FCC’s enforcement efforts since spoofing often occurs with robocalling and the agency often uses the two statutes in tandem. A February 2019 FCC staff report on robocalls notes that FCC’s enforcement efforts can be hindered by the requirement that in many instances FCC must warn a party of apparent robocalling violations and can only proceed with a monetary penalty if the party subsequently commits the same type of violation, a requirement in the Communications Act that applies to the Telephone Consumer Protection Act of 1991. According to the report, this requirement enables a warned offender to incorporate under a new name to evade further detection and begin illegal activity anew. In contrast, the report notes, the Truth in Caller ID Act of 2009 allows FCC to directly issue a proposed monetary penalty without first issuing a warning. Similar to the statutes of limitations just discussed, FCC officials told us that since spoofing often occurs with robocalling and the agency often uses the two statutes in tandem, their enforcement efforts would benefit from the elimination of this statutory requirement. In 2019, bills were introduced in Congress that, if passed, would implement the changes in law that FCC and FTC have recommended and could potentially help address other challenges faced by FCC and FTC. For example, in July 2019, a bill was introduced in the Senate that would remove the provision prohibiting FTC from taking action against common carriers. Also in 2019, two different bills were introduced, one in the House and one in the Senate, that would, among other things, address issues with harmonization of the FCC statute of limitations and eliminate the FCC pre-penalty warning requirement with respect to illegal robocalling. In addition, one of these bills, the Telephone Robocall Abuse Criminal Enforcement and Deterrence Act (TRACED Act), would require DOJ, in consultation with FCC, to assemble an interagency working group to study and report to Congress on how to enhance enforcement against robocalls by examining issues like the types of laws, policies, or constraints that could be inhibiting enforcement of the Truth in Caller ID Act of 2009. The interagency working group would also be tasked with identifying existing and potential international policies and programs that could encourage and improve coordination between countries. We have reported in past work that collaborative mechanisms such as interagency working groups can help the federal government achieve many of the meaningful results it seeks to achieve, and that such mechanisms all benefit from certain key features, which raise issues to consider when implementing these mechanisms. As of November 2019, no federal legislation had been enacted on these issues. We found that FCC’s and FTC’s efforts to collaborate on spoofing investigations and enforcement actions align with seven key practices we have previously identified to enhance and sustain interagency collaboration. FCC and FTC officials explained that their close collaboration helps ensure that they share relevant information and avoid duplicating efforts. In addition, we found that DOJ’s collaboration with FCC and FTC aligns with five of the seven key practices. Although we did not find evidence that DOJ had taken steps in line with the other two key practices, officials at all three agencies stated that DOJ’s collaborative efforts were appropriate given its broader jurisdiction and wider focus. More specifically, we found that all three agencies have incorporated five key practices. Our prior work has found that one way agencies can incorporate three of these practices — (1) defining and articulating a common outcome, (2) establishing mutually reinforcing or joint strategies, and (3) agreeing on roles and responsibilities—is through a memorandum of understanding. In 2003, FCC and FTC agreed to a memorandum of understanding that calls for the agencies to cooperate and coordinate to implement consistent, comprehensive, efficient, and non-redundant enforcement of federal telemarketing statutes and rules. The memorandum also calls for the agencies to meet quarterly to discuss matters of mutual interest, share consumer complaints, and engage in joint enforcement actions when necessary. Consistent with the memorandum, FTC officials told us that FTC and FCC hold quarterly meetings to discuss how they are targeting robocalls and spoofing investigations and enforcement cases to avoid duplication. FTC and FCC officials stated that in addition, their collaboration with DOJ is enhanced through the participation of all three agencies in a monthly conference call hosted by the National Association of Attorneys General to coordinate efforts to combat illegal robocalls across the government. Although DOJ officials told us that DOJ does not have a memorandum of understanding with FCC or FTC regarding spoofing or robocall-related enforcement, officials we interviewed at all three agencies identified collaborative efforts that DOJ engages in that are consistent with the three key practices cited above. FCC and DOJ officials stated they are developing procedures to share information on a particular enforcement case, and that these procedures could be used on other cases as needed in the future. In addition, officials from all three agencies stated that DOJ’s participation in the monthly conference calls and additional informal outreach as needed was sufficient to ensure effective collaboration. With regard to the fourth and fifth key practices (4) identifying and addressing needs by leveraging resources, and (5) establishing compatible policies, procedures, and other means to operate across agency boundaries, FCC and FTC officials described regularly sharing information from their complaint databases, which is in line with these practices. FTC officials stated they regularly review FCC’s complaint information to help their enforcement efforts. Moreover, FTC has established policies and procedures whereby DOJ and FCC and other law enforcement entities have access to FTC’s complaint database, and FCC and DOJ officials stated that they frequently analyze FTC’s complaint database to inform their investigative decisions. Furthermore, DOJ officials stated that DOJ recently contributed funds to FTC to enhance capabilities to analyze the database. FCC and FTC have also leveraged resources by co-hosting a public event in 2018 on reducing robocalls and spoofing that included discussions of recent policy changes and enforcement actions to stop illegal robocalls. We found that FCC and FTC follow two additional key practices for collaborating on spoofing-related investigations and enforcement actions that DOJ does not: (1) developing mechanisms to monitor, evaluate, and report the results of collaborative efforts, and (2) reinforcing agency accountability for collaborative efforts through agency plans and reports. For example, FCC and FTC collaborated on a robocall report published by FCC in 2019 that discussed both agencies’ enforcement actions related to robocalls and spoofing, and each discussed their collaborative efforts related to robocalls in key agency documents related to accountability and performance. DOJ officials stated that they would be unlikely to have such materials specifically related to spoofing given the agency’s focus on fraud itself rather than spoofing or robocalling, which it views as a means to fraud. DOJ officials stated that DOJ’s general commitment to interagency collaboration is emphasized in its fiscal year 2020 budget submission to Congress and many press releases related to its enforcement cases. We reviewed DOJ’s budget submission and several DOJ press releases and found that they mention collaboration between DOJ and other agencies. FCC and FTC use a number of methods to educate consumers on ways to protect themselves against spoofed and other unwanted calls. According to FCC documentation, the agency has made combatting illegal robocalls and caller ID spoofing its top consumer protection priority and uses consumer education as a means to address this priority. Similarly, according to FTC’s chairman, consumer education is a critical element of FTC’s efforts to fulfill its consumer protection mission. The methods that FCC and FTC use—both independently and collaboratively—to educate consumers on ways to combat caller ID spoofing and unwanted calls include the following. Posting online consumer alerts, videos, blog posts, and other informative materials: Both FTC and FCC post information and warnings about caller ID spoofing scams on their websites. FTC, for example, developed Pass It On, a print- and web-based campaign to educate seniors about various types of scams that target seniors, including spoofing. FCC launched an animated video initiative on how to avoid spoofing scams and also posted a consumer alert about neighbor spoofing scams. The alert explains that scammers use such spoofing to increase the likelihood that consumers pick up the phone and provides tips such as to not answer calls from unknown numbers and to not provide any personal information to such callers. Additionally, FCC and FTC post other information, including tip cards and graphics such as those illustrated in figure 4. Visiting vulnerable communities: FCC has conducted speaking tours, such as tours through rural Appalachia and the Pacific Northwest in 2018 to educate communities about spoofing, and to build partnerships to help improve the effectiveness of future outreach efforts. Similarly, FTC has hosted briefings in underserved communities with law enforcement, consumers, and community advocates to place more attention on consumer protection issues such as spoofing and other types of fraud. We found that FCC’s and FTC’s consumer education efforts related to spoofing and other unwanted calls aligned with nine key practices for consumer education that we identified in our prior work (see table 1). For example, FCC and FTC have developed consistent and clear consumer education messages related to spoofing and unwanted calls: specifically, consumers: should not answer unknown calls; should not push any numbers if directed to do so; and should hang up immediately once it is clear that the caller is unknown. In addition, FCC and FTC officials have worked with credible messengers to help disseminate consumer education messages, including to potentially vulnerable populations. For example, since 2017, FCC has worked with the National Asian American Coalition to train grassroots volunteers to engage local community members and distribute educational tip cards printed by FCC in languages such as Mandarin Chinese, Korean, Vietnamese, and Tagalog. In addition, FTC has collaborated with AARP to develop three videos for Asian American and Pacific Islander communities on robocall, IRS, and Medicare scams. In addition, we found that, similar to their enforcement efforts, FTC and FCC’s efforts to collaborate on public education in this area are consistent with the seven key collaboration practices we discussed earlier in this report. For example, FCC and FTC agreed to a second memorandum of understanding in 2015 that states that the agencies will collaborate with each other on consumer and industry outreach and education efforts, as appropriate. FCC and FTC also collaborate with other entities, including federal, local, and private entities, to educate consumers on ways to combat spoofing. For example, FCC officials told us that beginning in October 2018, they collaborated with Department of Veterans Affairs officials to send out three joint emails (from November 2018 through March 2019) to veterans and veterans’ organizations on ways to protect themselves against illegal robocalls, including spoofed calls. These officials also noted that each email reached approximately 5.5 million targeted recipients. According to officials with industry groups, voice service providers, and FCC, the voice service provider industry has taken key steps towards successfully putting in place a caller ID verification system throughout much of the IP-based U.S. telephone network by the end of 2019. As discussed previously, the system is commonly referred to as STIR/SHAKEN or SHAKEN/STIR. According to the Alliance for Telecommunications Industry Solutions (ATIS), which spearheaded this industry-led effort along with the Session Initiation Protocol (SIP) Forum, the system is intended to enable voice service providers to verify that a caller has a right to use the caller ID transmitted with the call. Under the system, the voice service provider that first initiates the call onto the network (originating service provider) generates a digital signature that attaches to the phone call indicating that the caller has this right. This occurs only when the originating provider knows this information and is considered the highest level of verification, referred to by the industry as “attestation.” The signature is transmitted along with the call as it is routed from one service provider to another. The terminating service provider, which passes the call onto the call recipient, can verify that the signature was not tampered with before sending the call to the call recipient (see fig. 5). According to an FCC Notice of Proposed Rulemaking, as of June 2019, several major providers had deployed or were in the process of deploying the system on their own networks, and a few had started exchanging signed calls with a second provider. In addition, ATIS has announced a number of key steps taken to fully implement the system’s framework. For example, in September 2018, ATIS launched the system’s governance authority, whose board consists of representatives from a variety of U.S. voice service providers and relevant industry associations, and which, according to ATIS, is overseeing the system to ensure that it is effective and secure. In August 2019, ATIS issued a press release stating that the governance authority board had determined the requirements service providers must meet in order to get certificates to digitally sign calls and had contracted a private firm tasked with ensuring that only authorized service providers get these certificates. According to an industry official who worked on this effort, once most U.S. carriers deploy the system and are sharing information across their networks, the technical experts who developed the standards will be able to see how it works and improve and enhance the system through additional technical developments. Because it is not always possible for the originating service provider to determine whether the caller has a right to use the phone number that will be displayed, in addition to the top level of verification, the system was designed with a middle level and a lowest level of verification. The originating service provider digitally signs the call with the middle level of attestation when the provider has an established relationship with the caller but does not know whether the caller has the right to use the phone number it will display. According to ATIS officials, the originating service provider may use this level of attestation, for example, when a call comes from a corporate call center, which displays all outbound calls as originating from a central number or set of numbers. The originating service provider signs the call with the lowest level of attestation when it is responsible for originating the call onto its network but it does not have a relationship with the caller (such as when the call comes in from another country). When using either the middle or lowest level of attestation, the provider cannot determine if the call is spoofed. However, according to ATIS officials, the information that provided the basis for the attestation level is still likely to be helpful. For example, this information may better position the terminating service provider or call blocking and analytics apps to determine, in combination with other data the terminating service provider or such apps may have analyzed, whether to block or warn the consumer about the call. According to officials from several carrier associations or voice service providers, the new system should substantially improve the industry’s ability to combat spoofing and block unwanted calls by providing carriers with immediate verification information. These stakeholders, as well as FCC officials, also stated that enabling voice service providers to instantly identify the provider that initiated the call onto the network—through the digital signature attached to the call— could help facilitate federal investigations by accomplishing in an instant what can now take significant time and effort as the call must be traced back from provider to provider. One stakeholder who played a key role in the development of the system stated that as some U.S. service providers deploy this system and more calls are able to be verified, it is likely to incentivize other U.S. providers to deploy verification systems so that their calls will not stand out as unverified. This stakeholder said that the hope is that other countries, including those with many legitimate call centers that send calls to the United States, such as India, will also implement verification systems that eventually can be integrated with the U.S. system. And as more calls are able to be verified, the stakeholder explained that the system will become more valuable and useful. An ATIS representative and other stakeholders identified other examples of ongoing technical challenges and open issues: Information provided to consumers: The industry has not reached agreement about what, if any, information should be presented to call recipients to inform them that the call has or has not been verified. Stakeholders we spoke with noted that it is important to educate consumers on the limitations of any such information. For example, although a call may be verified, the provider cannot guarantee that the caller is not trying to defraud the call recipient—just that the caller is not using a spoofed phone number to do so. Further, if a provider is unable to verify the caller ID information, it does not necessarily mean the call is fraudulent or the caller has malicious intent. For these reasons, several industry stakeholders we spoke with emphasized that the information provided by this system can be most useful when combined with other methods service providers use to analyze call traffic to identify unwanted or illegal calls. IP-only system: Several stakeholders also emphasized that the system only works for calls carried entirely over IP networks, not those using traditional wireline networks. One industry group representing smaller providers that may use traditional wireline networks expressed concerns that its members may need more time to deploy the caller ID verification system because of the resources needed to transition to an IP network. This issue was discussed by industry stakeholders at FCC’s July 2019 summit on the caller ID verification system. One industry stakeholder stated that when calls that begin on a traditional wireline network are uploaded to an IP network, the originating service provider on that IP network will sign the call with the lowest level of verification, and that that information, in combination with analytics, will help providers to know whether these calls can be trusted. Verification of certain calls: As of June 2019, ATIS and industry stakeholders were also working to determine how to ensure that calls from 911 operators or video relay service calls for deaf and hard of hearing users are not blocked if providers are unable to verify the caller is authorized to use the phone number. Since 2013, FCC has taken several steps to encourage the industry’s caller ID verification initiative. In doing so, FCC’s efforts have aligned with federal guidance for agency participation in private-sector standards activities to help address national priorities. That guidance states that federal engagement in standards activities should aim to produce timely, effective standards that address legitimate regulatory, procurement, and policy objectives. The guidance also states that the federal government should assume an active role where necessary to ensure a rapid, coherent response to national challenges. Key steps FCC took to initiate and accelerate industry efforts—in line with the OMB guidance to produce timely and effective standards— are summarized below. In March 2013, FCC’s Chief Technology Officer presented a vision of developing a caller ID verification system to combat spoofing at an Internet Engineering Task Force meeting, later referred to as a “call to action” by a technology stakeholder who played a key role in developing this system. In July 2016, FCC’s Chairman issued a call to action for providers to accelerate their efforts to develop this system. FCC also called for responses detailing provider efforts. In December 2017, FCC directed one of its advisory bodies to, among other things, define criteria for selecting the system’s governance authority and recommend milestones for system deployment. Consistent with the guidance that federal engagement should aim to produce timely, effective standards, FCC’s Chairman urged service providers and standards groups to accelerate the development and deployment of these technical standards. In November 2018, the FCC Chairman sent letters to 14 U.S. providers and publicly demanded that that they adopt the caller ID verification system by the end of 2019. While the demand did not legally require providers to deploy the system, the Chairman stated that if industry’s progress lagged in 2019, FCC would take action to ensure widespread deployment. This demand and warning represent preliminary steps consistent with the guidance’s call for the federal government to assume an active role where necessary to ensure a rapid, coherent response to national challenges. In June 2019, FCC issued a notice of proposed rulemaking that would require all providers to implement the technical system if major providers fail to do so by the end of 2019. The notice also requested comments on how FCC should determine whether it is necessary to mandate implementation of the technical system and how to evaluate whether major voice service providers have met the FCC’s end of 2019 deadline for implementation. According to FCC officials and consistent with the federal guidance, FCC has engaged with ATIS, providers, and relevant technical stakeholders throughout their caller ID verification efforts. For example, FCC officials attended key meetings, and an FCC official submitted technical suggestions on standards development related to the caller ID verification system. ATIS representatives told us that FCC’s engagement in these technical efforts was helpful, as FCC was able to ask questions and prompt those working on the standards to consider some of the broader issues that various stakeholders would be concerned about and needed to be addressed. Furthermore, FCC is considering how, if at all, its role should evolve in the future. Notably, FCC’s June 2019 notice also requested comments on what role FCC should have in the governance of the caller ID verification system, how to encourage carriers that maintain some portion of their network on legacy technology to implement elements of the system, and how FCC and industry can best leverage this system to combat illegal calls originating outside of the United States. FCC also directed staff to develop two reports over the next 2 years that, among other things, provide information on the state of deployment of this caller ID verification system. FCC officials stated that their efforts related to these issues encompass more than what is in the proposed regulations, as FCC will continue to monitor the work of the governance authority, the progress of service providers’ implementation of the system, and industry’s efforts to improve the effectiveness of the system and address remaining technical issues. Moreover, at FCC’s July 2019 summit on the caller ID verification system, FCC’s Chairman stated that FCC is prepared to issue rules in 2020 mandating that major providers implement the caller ID verification system if these major providers do not meet the 2019 deadline. We provided a draft of this report to FCC, FTC, and DOJ for review and comment. Each agency provided technical and editorial comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Chairman of the FCC, the Chairman of the FTC, the Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff any have questions about this report, please contact me at (202) 512-2834 or VonahA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Appendix II: Summary of Federal Agencies’ Enforcement Actions Involving Telephone Calls that Allegedly Used Spoofed Caller ID alleged conduct. We selectively mention spoofing in this column to provide additional context for some of these cases. Andrew Von Ah, (202) 512-2834 or VonahA@gao.gov. In addition to the individual named above, other key contributors to this report were Alwynne Wilbur, Assistant Director; David Goldstein, Analyst- in-Charge; Mark Canter; Joshua Cicala; Jennifer Clayborne; Kristen Farole; Jeffery Haywood; Gina Hoover; Delwen Jones; Jenna Lada; Hannah Laufe; Harold Podell; Cheryl Peterson; and Malika Rice.", "summary": "Unwanted phone calls, which may also involve spoofing, consistently rank among the top consumer complaints to FCC and FTC. In recent years, consumers have lost millions of dollars—and been deceived into providing financial or other sensitive information or purchasing falsely advertised products—due to schemes using these calls. FCC, FTC, and DOJ have efforts aimed at combatting the fraudulent use of caller ID spoofing. Recently enacted federal legislation included a statutory provision for GAO to review federal efforts to combat the fraudulent use of caller ID spoofing. This report examines (1) what is known about caller ID spoofing schemes, including any recent trends; (2) federal agency enforcement and consumer education efforts; and (3) the status of industry efforts to develop technologies to combat spoofing, and FCC's role in these efforts. To address these objectives, GAO reviewed consumer complaint data from FCC and FTC from 2015 through 2018; reviewed investigation and enforcement information from FCC, FTC, and DOJ; and interviewed agency officials and representatives from 23 nonfederal stakeholders, including industry associations, voice service providers, call blocking and analytics services, mobile phone manufacturers, consumer groups, and a standards body. GAO also reviewed relevant agency documentation and assessed agency efforts against key practices for consumer education and interagency collaboration identified in GAO reports. Transmitting fake caller ID information with a phone call, also referred to as “spoofing,” is in many cases illegal—and is used in schemes to obtain money and personal information or generate telemarketing leads. Complaints submitted to the Federal Communications Commission (FCC) and the Federal Trade Commission (FTC), both of which work to protect consumers from spoofing, suggest that spoofing is a growing issue. FCC, FTC, and the Department of Justice (DOJ) identified 62 enforcement cases they have brought since 2006 involving spoofing. Enforcement can be challenging, as it can be difficult to identify the source of spoofed calls, and scammers may be based overseas. Nevertheless, GAO found that the agencies prioritize their spoofing-related enforcement actions based in part on the level of harm perpetrated against the public and generally follow key practices identified by GAO for effective collaboration. Additionally, FCC and FTC have proposed changes to law to enhance the effectiveness of their enforcement efforts, such as a change that would allow FCC more time to bring certain enforcement actions. Furthermore, FCC's and FTC's consumer education efforts related to spoofing align with key practices for collaboration and consumer education. For example, FCC and FTC have developed consistent and clear messages related to spoofing. Several major telecommunications carriers are taking key steps to put an industry-developed technical system in place designed to reduce spoofing by December 2019, which FCC has encouraged in line with federal guidance. This system is intended to enable carriers to verify whether a caller has a right to use the caller ID being transmitted with the call. Carriers can use this information to better determine whether to block or warn consumers about the incoming call. Stakeholders cautioned that the system cannot determine whether a caller has fraudulent intentions but only whether the caller is using a spoofed number. FCC has followed relevant federal guidance in participating in the development of this system by, for example, encouraging industry to accelerate deployment of the system, monitoring industry's progress, and providing input into the process.", "document_type": "gao"}
{"report": "Medicare beneficiaries with behavioral health conditions have a diverse range of conditions, of different severity, requiring different types of care. Beneficiaries with mild behavioral health conditions—such as mild depression—may require less complex care than beneficiaries with serious behavioral health conditions—such as schizophrenia—or with multiple interacting behavioral or physical health conditions. Subpopulations of Medicare beneficiaries also may face different behavioral health challenges. For example, dual-eligible beneficiaries— individuals eligible for both Medicare and Medicaid—are three times more likely to have been diagnosed with a major psychiatric disorder than non- dual beneficiaries. Medicare covers services for the diagnosis and treatment of behavioral health conditions, which includes the inpatient care covered by Part A and the physician services and outpatient care covered by Part B. Key behavioral health services in Medicare Part B include visits with a physician or other covered provider, partial hospitalization program services, annual depression screening, alcohol misuse screening and counseling, psychotherapy, screening, brief intervention, and referral to treatment services, and behavioral health integration services. Dual-eligible beneficiaries may be able to access additional behavioral health services through Medicaid that are not available through Medicare. Medicare covers behavioral health services delivered by a range of providers, including psychiatrists and physicians, clinical psychologists, licensed clinical social workers (LCSW), nurse practitioners, physician assistants, and clinical nurse specialists. In order to bill for services provided to Medicare beneficiaries, providers must enroll with CMS. Providers who do not want to enroll in the Medicare program may “opt out” of Medicare. Behavioral health providers have among the highest opt-out rates, with over 7,000 psychiatrists, psychologists, and LCSWs opting out of Medicare, representing nearly one-third of all providers who opted out of Medicare in 2017. Beneficiaries may still see these providers but must enter into a private contract with them. Medicare will not pay for any services furnished by providers who have opted out, so in these cases, beneficiaries must pay the provider’s entire charge out of pocket. According to researchers, psychiatrists have low participation rates across all forms of insurance, including Medicare, which may be explained, in part, by the reimbursement rates for time intensive treatments, low supply and high demand for psychiatry services, and high administrative burdens for solo practitioners to participate in insurance programs. CMS is required by law to provide information annually to Medicare beneficiaries about their coverage, including benefits and limitations on payment. Various factors affect how beneficiaries receive and process information about behavioral health conditions and their coverage options for behavioral health services. According to HHS, low health literacy is a key barrier that impacts individuals’ ability to comprehend health-related information. Moreover, researchers have found that low health literacy is associated with poor physical and mental health. More specific challenges facing individuals with behavioral health conditions include the stigma surrounding behavioral health conditions that may discourage individuals from seeking help or treatment. According to advocates for Medicare beneficiaries and individuals with behavioral health conditions, some individuals may have caregivers or other support for finding information and engaging in decision-making about their behavioral health care. According to CMS, one-third (36 percent) of Medicare beneficiaries in 2019 were enrolled in MA plans, which CMS pays on a monthly capitated basis to deliver all covered services needed by an enrollee. MA plans contract with provider networks to deliver care to Medicare beneficiaries and must meet CMS’s network adequacy standards. MA plans may employ care management and utilization management strategies. Care management may include case managers or care coordinators who work with enrollees and providers to manage the care of complex or high-risk enrollees, including those with behavioral health conditions. According to the MA plan officials we interviewed, prior authorization—a utilization management strategy—may be employed for high-cost treatments. Officials from all five MA plans told us that they may have difficultly recruiting behavioral health providers to participate in their network. One study found access to psychiatrists to be more limited than any other physician specialty in MA plan networks, with 23 percent of psychiatrists in a county included in network on average, compared to 46 percent of physicians in a county across all physician specialties in 2015. Our analysis of Medicare claims data shows that in 2018 approximately 5 million beneficiaries used behavioral health services through Medicare Part B. This represented about 14 percent of the more than 36 million fee- for-service (traditional) Medicare beneficiaries, and CMS paid providers about $3.3 billion for approximately 39.3 million behavioral health services in 2018. (See fig. 1.) Our analysis of claims data also shows that among Medicare beneficiaries who used behavioral health services in 2018, utilization of the services varied significantly. (See fig. 2.) The average number of services used by Medicare beneficiaries who used behavioral health services in 2018 was eight, while the median was three. Nearly half of all such beneficiaries used between two and seven behavioral health services during the year. Nearly one-third (30 percent) of beneficiaries using behavioral health services used one behavioral health service during the year. The 11 percent of beneficiaries who were the highest behavioral health service users used 19 or more behavioral health services (the 90th percentile) during 2018, and accounted for about half of all Medicare expenditures on behavioral health services. Our analysis also found that the services beneficiaries received largely fell into two broad categories in 2018: general patient consultations (53 percent of services) and psychiatry services, including psychotherapy (43 percent of services). Other services, such as central nervous system assessments and drugs administered by providers, accounted for about 5 percent of services. Beneficiaries receiving behavioral health care were largely diagnosed with a condition in at least one of five diagnostic behavioral health conditions categories, each of which contain multiple specific diagnoses. In 2018, 96 percent of all behavioral health services were for a primary diagnosis within one of these five categories. For example, the mood disorder category, which includes diagnoses such as depression and bipolar disorder, accounted for 42 percent of services provided. (See fig. 3.) Medicare claims data for 2018 show that some Medicare beneficiaries used behavioral health services to obtain treatment for SUDs. Seven percent of the behavioral health services in 2018 were for SUDs. Moreover, Medicare beneficiaries with SUDs represented 11 percent of beneficiaries using behavioral health services. On average, Medicare beneficiaries with SUDs used five behavioral health services in 2018, which is less than the number of behavioral health services used on average by all beneficiaries with a behavioral health diagnosis. Overall, beneficiaries under age 65 and dual-eligible beneficiaries were disproportionately represented among users of behavioral health services compared to the Medicare population. (See fig. 4.) In 2018, while beneficiaries under age 65 constituted 16 percent of all Medicare beneficiaries, they represented 34 percent of the Medicare beneficiaries who used behavioral health services and accounted for 42 percent of all behavioral health services paid for by Medicare that year. Similarly, while dual-eligible beneficiaries, many of whom are under age 65, constituted 20 percent of all Medicare beneficiaries, they represented 39 percent of the Medicare beneficiaries who used behavioral health services in 2018 and accounted for 45 percent of all behavioral health services paid for by Medicare. Finally, women constituted about 55 percent of all Medicare beneficiaries in 2018 and represented 62 percent of the beneficiaries who used behavioral health services that year. Our analysis of Medicare Part B claims shows that in 2018 two-thirds of behavioral health services (67 percent) were delivered to Medicare beneficiaries by behavioral health specialists: psychiatrists, psychologists, and licensed clinical social workers (LCSW). (See fig. 5.) Psychiatrists provided the most behavioral health services (31 percent), followed by LCSWs (19 percent), and psychologists (17 percent). A range of other providers delivered the remaining one-third of behavioral health services, including advanced practice providers (16 percent), primary care physicians (11 percent), other physicians (5 percent), and other providers (1 percent). As figure 5 shows, beneficiaries who were relatively high users of behavioral health services received a greater share of services from behavioral health specialists compared to all Medicare beneficiaries who used behavioral health services. Approximately three-quarters of services (78 percent) provided to the highest service users (those in the 90th percentile with 19 or more services per year) were delivered by behavioral health specialists: psychiatrists (31 percent), LCSWs (25 percent), and psychologists (22 percent). However, this pattern did not hold for Medicare beneficiaries with SUDs. Our analysis showed that beneficiaries with SUDs received 20 percent of their behavioral health services from a behavioral health specialist, and the other 80 percent of services were delivered by providers who did not specialize in behavioral health. See appendix I for additional information on Medicare behavioral health utilization. According to CMS officials, the agency’s overall strategy for providing information to beneficiaries about coverage of behavioral health services involves a variety of communication and outreach approaches. For example, CMS disseminates information to beneficiaries through written and online publications, Medicare.gov, scripted answers to questions through 1-800-MEDICARE, and social media. CMS is required by law to provide information to beneficiaries about coverage under Medicare. CMS annually mails out the Medicare & You handbook to all beneficiaries, and according to CMS officials, it mailed the handbook to 42.6 million households in 2018. The information provided in the publication includes descriptions of benefits and services, a summary of cost sharing, and the types of providers Medicare covers. According to CMS officials, Medicare.gov also includes information about covered benefits and a provider directory, although some may not be accepting new Medicare patients. According to CMS officials, the most comprehensive source of information on coverage for behavioral health services is contained in the publication Medicare & Your Mental Health Benefits, which is also available at Medicare.gov. We obtained statistics from CMS officials on the frequency with which Medicare beneficiaries requested copies of Medicare & You or the agency’s other publications or accessed the agency’s web-based tools to obtain information on Medicare coverage, including coverage for behavioral health services. The most frequently accessed in 2018 were Medicare & You, Medicare.gov, and the “What’s Covered?” smartphone application. (See table 1.) These sources of information cover Medicare more broadly and provide information about Medicare benefits in general, rather than those dealing specifically with behavioral health. Like CMS, MA plans use different approaches to provide information to the beneficiaries enrolled in MA plans, including publications, phone calls, and websites. According to officials from the five MA plans in our review, MA plans use multiple modes of communication to meet the preferences of their enrolled populations. MA plans are required to provide information to each enrollee at the time of enrollment and annually thereafter; for example, MA plans must share information about providers reasonably available to enrollees. MA plans are also required to provide marketing materials to CMS for review to ensure the adequacy and accuracy of the information in the materials. Two of the MA plans in our review offer digital health tools to their enrollees. One plan offers a tool that allows enrollees to communicate with case managers, and another plan provides enrollees access to test results, the ability to refill prescriptions and schedule appointments, as well as resources for patient education. According to CMS officials, the agency also uses other strategies for providing information to beneficiaries about coverage of behavioral health benefits. CMS officials stated that it partners with stakeholders to assist beneficiaries and caregivers seeking help with behavioral health conditions. For example, CMS officials described webinars and workshops it conducts to educate partners and stakeholders who educate and counsel Medicare beneficiaries. According to agency officials, the webinars cover a range of topics related to Medicare benefits and coverage, including behavioral health. The officials also told us that CMS partners with state health insurance programs to provide information about Medicare, including information to help Medicare beneficiaries understand their coverage. CMS officials also stated that the agency conducts public awareness and outreach campaigns to provide information to beneficiaries. Medicare & You—the most widely disseminated source of information on Medicare benefits and coverage—does not provide explicit information about coverage of services for beneficiaries with SUDs, although HHS and CMS have identified addressing SUDs as a top priority. We reviewed the fall 2019 edition of the Medicare & You publication and found that, while it does provide information on Medicare coverage for behavioral health services, it does not contain an explicit description of the services that may be covered for treatment of SUDs. CMS officials noted that printing the almost 43 million hard copies of the fall 2019 edition of Medicare & You started in July 2019, several months before the rule implementing expanded OUD coverage under Medicare was finalized. In December 2019, CMS officials updated the 2020 edition of Medicare & You to include information on the expanded OUD treatment authorized by the SUPPORT Act, which were finalized in November 2019, and became effective in January 2020. According to CMS officials, as of December 2019, this updated version was available on Medicare.gov, and CMS officials told us it will be sent to all individuals who become eligible for Medicare throughout calendar year 2020. We reviewed the updated 2020 web version of Medicare & You and found that a reference to opioid treatment was included; however, explicit information about Medicare’s coverage for other SUDs was not added. Although information on Medicare’s coverage for treating OUD is important, OUD represents only a subset of the SUDs for which Medicare beneficiaries may need treatment. Further, several of the advocates we interviewed noted that Medicare beneficiaries would benefit from clearer and more specific information about SUD coverage. According to data from SAMSHA, about one in 10 SUD cases is related to an OUD, while the rest are related to non-opioid substances. We asked CMS officials why the additions to Medicare & You relate only to OUDs, and they explained that it is the only distinct Medicare benefit category for substance abuse treatment. Officials also stated that while there is no category in Medicare & You for other SUDs specifically, the publication does note some related benefits, such as for counseling and services for behavioral issues, alcohol misuse screening, and behavioral health integrative services. However, the alcohol misuse screening benefit is specifically for beneficiaries who do not meet the criteria for alcohol dependency and covers brief counseling in a primary care setting. The description of behavioral health does not specify that SUDs are a behavioral health condition. The absence of information on Medicare’s coverage for SUDs in Medicare & You is inconsistent with HHS and CMS strategic priorities related to treatment for SUDs. The Department of Health and Human Services’ Fiscal Year 2018-2022 Strategic Plan includes among its strategic objectives reducing the impact of SUDs through treatment. Additionally, CMS has made addressing SUDs a top priority and has a stated commitment to treat SUDs, including OUDs. Beneficiaries lacking information on coverage of SUDs may be less likely to seek treatment. HHS and CMS have made addressing SUDs a priority. However, in its most widely disseminated publication on Medicare coverage and benefits, CMS does not provide explicit information about the program’s coverage for SUD treatment services. As a result, beneficiaries with SUDs may not be aware of this coverage and may not seek needed treatment. We are making the following recommendation to CMS: The Administrator of CMS should ensure that the Medicare & You publication includes explicit information on the services covered by the Medicare program for beneficiaries with a SUD. (Recommendation 1) We provided a draft of this report to HHS for review. HHS concurred with our recommendation, and provided written comments that are reproduced in app. II, and technical comments, which we have incorporated as appropriate. In its written comments, HHS stated it would explore opportunities to modify the Medicare & You handbook to ensure beneficiaries with substance use disorders are aware of the services covered by Medicare. HHS also reiterated some of the situations under which substance use disorder may be covered under Medicare, as well as its communication strategies and tools to ensure that beneficiaries and providers are aware of all of the services available under Medicare. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, the Administrator of CMS, and other interested parties. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at CosgroveJ@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix III. To produce the tables below describing the utilization of behavioral health services by Medicare beneficiaries and the providers furnishing these services, we analyzed the 2018 Medicare Part B claims file, the most recent data available at the time of analysis. Our analysis only includes Medicare beneficiaries in fee-for-service Medicare because similar reliable information was not available for beneficiaries enrolled in Medicare Advantage. In addition to the contact named above, Lori Achman (Assistant Director), N. Rotimi Adebonojo (Analyst in Charge), Todd Anderson, Sauravi Chakrabarty, Kelly Krinn, Rich Lipinski, Drew Long, Diona Martyn, Vikki Porter, and Caitlin Scoville made key contributions to this report.", "summary": "Behavioral health disorders often go untreated, potentially leading to negative health consequences. Behavioral health disorders include substance use or mental health disorders. Medicare provides coverage for behavioral health services. The Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act enacted in 2018 included a provision for GAO to examine Medicare behavioral health services and how beneficiaries are informed of coverage and treatment options. This report (1) describes the utilization of behavioral health services by Medicare beneficiaries and the types of providers furnishing these services, and (2) examines how CMS provides information to beneficiaries about their coverage for behavioral health services. To describe service utilization and provider types, GAO analyzed 2018 Medicare claims data, the most recent data available. To examine how CMS shares information with beneficiaries, GAO reviewed CMS requirements for providing coverage information to beneficiaries, reviewed CMS publications, and interviewed CMS officials. GAO's analysis of Medicare claims data shows that in 2018 almost 5 million beneficiaries used behavioral health services—services for mental and substance use disorders. This represented about 14 percent of the more than 36 million fee-for-service (traditional) Medicare beneficiaries and reflects about $3.3 billion in spending. Additionally, about 96 percent of all behavioral health services accessed by Medicare beneficiaries in 2018, the latest data available, were for a primary diagnosis in one of five behavioral health disorder categories. (See figure.) Mood disorders, such as depression and bipolar disorders, accounted for 42 percent of services. SUD services accounted for about 7 percent of all services accessed by beneficiaries. Further, two-thirds of behavioral health services were provided by psychiatrists, licensed clinical social workers, and psychologists in 2018. The Centers for Medicare & Medicaid Services (CMS), the Department of Health and Human Services' (HHS) agency that administers Medicare, uses various approaches to disseminate information to Medicare beneficiaries about coverage for behavioral health services. As part of these efforts, CMS mails out Medicare & You —the most widely disseminated source of information on Medicare benefits—to all Medicare beneficiaries every year. GAO reviewed the fall 2019 and January 2020 editions of Medicare & You. While the January 2020 edition describes a new coverage benefit for beneficiaries with opioid use disorders, neither edition includes an explicit and broader description of the covered services available for substance use disorders. Both HHS and CMS have stated that addressing substance use disorders is a top priority. Given that coverage for substance use disorders is not explicitly outlined in Medicare's most widely disseminated communication, Medicare beneficiaries may be unaware of this coverage and may not seek needed treatment as a result.", "document_type": "gao"}
{"report": "The DOD nuclear enterprise includes strategic and nonstrategic nuclear forces and the supporting infrastructure and personnel to build, maintain, and control these assets. The strategic nuclear forces include a triad of Air Force ICBMs; Air Force nuclear-capable bomber aircraft; and Navy submarine-launched ballistic missiles carried by SSBNs; as well as associated nuclear munitions; air refueling; and NC3 capabilities. NC3 capabilities are a key part of the defense nuclear enterprise, used to support planning, situation monitoring, and communication of force direction between the President and nuclear forces. Consistent with the New Strategic Arms Reduction Treaty (New START), the United States has limited the number of deployed delivery systems for each of the three legs of the strategic nuclear triad (see fig. 1). The 2018 Nuclear Posture Review states that the triad’s synergy and overlapping attributes help ensure the enduring survivability of deterrence capabilities against attack and the capacity to hold at risk a range of adversary targets throughout a crisis or conflict. In addition to the strategic nuclear triad, the defense nuclear enterprise includes nonstrategic nuclear forces: forward-deployed fighters—referred to as dual-capable fighter aircraft―that are able to deliver conventional or nuclear munitions; their associated nuclear weapons; and the supporting infrastructure and personnel to build, maintain, and control nuclear assets. NC3 capabilities are fielded through a large and complex system comprising numerous land-, air-, and space-based components used to ensure connectivity between the President and nuclear forces. Responsibilities for managing NC3 are distributed among many DOD components including military departments, combatant commands, defense agencies, the Joint Staff, and the Office of the Secretary of Defense. NC3 capabilities provide the President with the means to authorize the use of nuclear weapons in a crisis. NC3 capabilities support five important functions: Force management: assignment, training, deployment, maintenance, and logistics support of nuclear forces and weapons before, during, and after any crisis. Planning: development and modification of plans for the employment of nuclear weapons and other operations in support of nuclear employment. Situation monitoring: collection, maintenance, assessment, and dissemination of information on friendly forces, adversary forces and possible targets, emerging nuclear powers, and worldwide events of interest. Decision making: assessment, review, and consultation that occur when the employment or movement of nuclear weapons is considered. Force direction: implementation of decisions regarding the execution, termination, destruction, and disablement of nuclear weapons. The NDERG is the principle integrated civilian–military governance body for the DOD nuclear enterprise. It was established in 2014 by the Secretary of Defense to ensure the long-term health of the nuclear enterprise by addressing resourcing, personnel, organizational, and enterprise policy issues identified in the 2014 nuclear enterprise reviews. The NDERG also maintains senior-leader awareness of ongoing issues of importance in the nuclear enterprise, ensures effective sustainment of these critical nuclear capabilities, and provides a forum for strategic-level coordination and integration of issues arising from other oversight committees and councils related to the nuclear enterprise. The NDERG consists of a group of senior officials chaired by the Deputy Secretary of Defense with the Vice Chairman of the Joint Chiefs of Staff as vice chair. The NDERG is supported by a Nuclear Deterrent Working Group, which meets biweekly and reviews the status of the implementation of the recommendations of the nuclear enterprise reviews, and a Nuclear Deterrent Senior Oversight Group, which meets quarterly and reviews any recommendations that the Working Group believes are ready for the NDERG to close. The Nuclear Deterrent Senior Oversight Group―co- chaired by the Deputy Assistant Secretary of Defense for Nuclear Matters, the Deputy Assistant Secretary of Defense for Nuclear and Missile Defense Policy, the Joint Staff Deputy Director for Strategic Stability, and a senior-level representative of the Director of CAPE―also receives annual briefings on DOD components’ assessments of their progress, reviews organizational changes, and discusses other issues related to the management, operations, and health of the nuclear enterprise—including human resources and culture, operational availability, sustainment, and modernization and recapitalization issues not directly addressed in other forums. The Deputy Secretary of Defense updates the Secretary of Defense on the NDERG’s progress as requested. In November 2014, the Secretary of Defense directed DOD to address the recommendations from the 2014 nuclear enterprise reviews and directed CAPE to track and assess implementation efforts. The Joint Staff, the Navy, the Air Force, offices within the Office of the Secretary of Defense, and U.S. Strategic Command support CAPE’s efforts. CAPE compiled the recommendations from the 2014 nuclear enterprise reviews. In total, CAPE identified 175 distinct recommendations from the three documents associated with the reviews. CAPE then identified 247 sub- recommendations within those recommendations, which were directed to multiple military services or other DOD components. For example, if a recommendation was directed to both the Air Force and the Navy, then one sub-recommendation was made to the Air Force and one to the Navy. CAPE then worked with the military services to identify offices of primary responsibility for implementing actions to address the recommendations, any offices with coordinating responsibility, and any resources necessary to implement each recommendation. CAPE has developed a centralized tracking tool to collect information on progress in meeting milestones and metrics. As shown in figure 2, the tracking tool includes fields for the underlying problem statement, or root cause, and for the recommendation and time frames with milestones for implementing the recommendation. The tracking tool also includes performance measures (referred to as metrics in the tracking tool) to assess both the progress (through “process metrics”) and the effectiveness of the implementation actions (through “outcome metrics”). The outcome metrics aid DOD in determining whether implemented recommendations have addressed the underlying problem that was the impetus for the original recommendation. The tracking tool contains hundreds of unique milestones and metrics, and additional milestones and metrics may be added as they are identified. The Air Force and the Navy also have developed their own methods of tracking their service-specific recommendations. In December 2016, the Deputy Secretary of Defense issued a memorandum that directed the transition of the tracking and analysis responsibilities related to implementing the recommendations of the 2014 nuclear enterprise reviews from CAPE to the military departments and other DOD components. However, CAPE remains responsible for providing guidance to inform the analyses conducted by the military departments and other DOD components, overseeing these analyses, and assessing recommendations for closure. The aim of these changes was to enhance ownership and embed the principles of robust analysis, continuous monitoring, and responsibility throughout the department. In January 2018, in response to a GAO recommendation, CAPE issued additional guidance to aid the military departments and other DOD components in identifying, assessing, and documenting risks associated with the 2014 recommendations. The guidance instructs components to document key risks, defined by CAPE as a risk that requires mitigation by the leadership of the DOD components or a risk that cannot be mitigated within a component’s existing authorities and resources—for example, one that cannot be mitigated within the Air Force or Navy and must be raised to a higher authority. As we reported in November 2018, in response to the January 2018 guidance for tracking risks, the Air Force and the Navy included in the centralized tracking tool information on key risks for the recommendations they were responsible for or an indication of the absence of any key risk. The Council on Oversight of the National Leadership Command, Control, and Communications System (NLC3S Council) was established by statute and is responsible for oversight of the command, control, and communications system for the national leadership of the United States. Additionally, as recommended in the 2015 NC3 report, the NLC3S Council reviews the recommendations from the report and assesses them for closure. The NLC3S Council is supported by the National Leadership Command Capabilities Executive Management Board, which comprises a Senior Steering Group and four working groups—Stakeholders, Resources, Assessments, and Nuclear Command and Control Issues. The Executive Management Board ensures that the council is informed of and presents issues that require senior leadership–level decisions. In 2018, the Secretary of Defense approved the designation of the Commander of U.S. Strategic Command as the NC3 enterprise lead with increased responsibilities for operations, requirements, and systems engineering and integration. At that time, the Secretary of Defense also approved the designation of the Under Secretary of Defense for Acquisition and Sustainment as the NC3 enterprise capability portfolio manager with increased responsibilities for resources and acquisition. In November 2018, we recommended that DOD update applicable guidance (such as the NLC3S Council’s and Executive Management Board’s charters) and identify whether there is a need to request changes to statutory or presidential guidance in order to clarify changes to roles and responsibilities for oversight of NC3. According to DOD officials, DOD is in the process of implementing these recommendations, with the intent of having the Commander of U.S. Strategic Command and the Under Secretary of Defense for Acquisition and Sustainment provide leadership with respect to NC3 capabilities, while the Executive Management Board maintains its role for those systems that primarily relate to non-NC3 systems, with all three entities reporting on their respective issues to the NLC3S Council. The NLC3S Council is co-chaired by the Under Secretary of Defense for Acquisition and Sustainment and the Vice Chairman of the Joint Chiefs of Staff. Members of the council include the Under Secretary of Defense for Policy; the Under Secretary of Defense for Research and Engineering; the Under Secretary of Defense for Intelligence; the Commander, U.S. Strategic Command; the Commander, North American Aerospace Defense Command/U.S. Northern Command; the Director, National Security Agency; and the DOD CIO. The DOD CIO also serves as the Secretariat for the NLC3S Council and tracks the implementation of recommendations from the 2015 NC3 report, among other activities. Additional organizations may participate in the NLC3S Council’s meetings to provide subject-matter expertise. Regular participants in the NLC3S Council include the Office of the Under Secretary of Defense (Comptroller); senior leaders from the Army, the Navy, and the Air Force; the Director, Defense Information Systems Agency; the Director, White House Military Office; and Director, CAPE. The 2014 nuclear enterprise reviews included Operations and Maintenance as 1 of 11 categories. Recommendations within this category are primarily related to the sustainment and maintenance of nuclear weapon systems. The reviews identified several Operations and Maintenance core issues related to, among other things, maintenance infrastructure, lack of leadership visibility into sustainment issues, fragmented logistics support, and aging systems and support equipment leading to parts obsolescence issues. Of the 175 recommendations included in the 2014 nuclear enterprise reviews, 30 were categorized as Operations and Maintenance. Other categories in the 2014 reviews, such as Investment and Personnel, also include some recommendations that are related to sustainment and maintenance. DOD conducts sustainment and maintenance on nuclear enterprise weapon systems to ensure that these systems are available to support current military operations and maintain the capability to meet future requirements. Sustainment of weapon systems comprises logistics and personnel services required to maintain and prolong operations of the weapon system. DOD conducts maintenance at two levels: field level and depot level. Field-level maintenance is performed at the unit level on the unit’s own equipment, requires a relatively fewer number of skill sets, and occurs more frequently. Depot-level maintenance includes the overhaul, upgrade, or rebuilding of equipment, occurs less frequently, and requires a greater number of skill sets. Depot maintenance includes inspection, repair, overhaul, or the modification or rebuild of end items, assemblies, subassemblies, and parts that, among other things, require extensive industrial facilities, specialized tools and equipment, or uniquely experienced and trained personnel that are not available in other maintenance activities. A number of DOD organizations are involved in the sustainment and maintenance of nuclear weapon systems. Some key organizations include the following: Defense Logistics Agency. The Defense Logistics Agency manages approximately one-fifth of the value of DOD’s overall inventory and provides billions of dollars in consumable items on an annual basis for depot maintenance conducted at defense industrial sites—Army and Marine Corps depots, Navy Fleet Readiness Centers and Navy shipyards, and Air Force Air Logistics Complexes—where combat vehicles, planes, helicopters, and ships are repaired and overhauled. Air Force Materiel Command. Air Force Materiel Command conducts research, development, test, and evaluation, and provides acquisition management services and logistics support necessary to keep Air Force weapon systems ready for war. One of six centers within Air Force Materiel Command, the Air Force Nuclear Weapons Center is the nuclear-focused center synchronizing all aspects of nuclear materiel management on behalf of the Air Force Materiel Command commander. Naval Sea Systems Command and Naval Air Systems Command. Naval Sea Systems Command’s affiliated Program Executive Offices—including the Program Executive Office for submarines and the Program Executive Office for the Ohio-class SSBN and its replacement, the Columbia-class SSBN—are responsible for life-cycle management of their assigned programs. Similarly, Naval Air Systems Command provides full life-cycle support of naval aviation aircraft, weapons, and systems. DOD continues to make progress in implementing the recommendations from the 2014 nuclear enterprise reviews and the 2015 NC3 report, but the key tracking tools used to provide visibility on the status of the recommendations from these reviews do not provide current and complete information. For example, expected completion dates for key metrics and milestones—key methods of evaluating the department’s progress—are not up to date. Additionally, the NDERG is working to develop an additional approach for tracking long-term risks and opportunities to monitor the health of the defense nuclear enterprise. Current and complete information regarding the status and metrics for enduring recommendations from the 2014 and 2015 studies would help inform this effort. DOD continues to make progress in implementing the recommendations of the 2014 nuclear enterprise reviews. As of our last report, in November 2018, DOD had closed 151 sub-recommendations. Based on our review of CAPE’s centralized tracking tool, the NDERG has closed five additional sub-recommendations since then. As a result, as of August 2019, the NDERG has closed 156 of the 247 sub-recommendations (see fig. 3). DOD continues to make progress in implementing the recommendations of the 2015 NC3 report. Since we last reported, in November 2018, DOD has closed two additional recommendations. As of August 2019, the NLC3S Council has closed seven of the 13 recommendations from the NC3 report (see fig. 4). The DOD CIO has provided guidance to improve the tracking and evaluation of DOD’s progress in implementing the recommendations of the 2015 NC3 report, in response to our second October 2017 recommendation. The military services and other DOD components have not kept information on the implementation status of the 2014 nuclear enterprise reviews’ recommendations and 2015 NC3 report’s recommendations current and complete. As we have previously reported, CAPE developed a centralized tracking tool to aid in evaluating the actions that have been taken to implement the recommendations from the 2014 nuclear enterprise reviews and inform senior leaders across the defense nuclear enterprise. DOD CIO collects information on the status of the 2015 NC3 report’s recommendations in a layout similar to that used for the 2014 recommendations. The military departments and other DOD components are responsible for tracking and evaluating the implementation status of the 2014 nuclear enterprise reviews’ recommendations; CAPE provides guidance to aid in these efforts. CAPE’s 2016 guidance indicates that the military departments and DOD components should, as appropriate, use metrics and milestones to analyze progress. The guidance also states that existing data should be used, where possible, to minimize the workload of this effort. The centralized tracking tool developed by CAPE is the primary means by which progress is tracked. For each of the hundreds of metrics and milestones identified, the tracking tool includes expected completion dates and indicates which have been met and which are behind schedule. The tool identifies both process metrics, to aid in assessing the progress of implementation efforts, and outcome metrics, to aid in determining whether implemented recommendations have addressed the underlying problem that was the impetus for the original recommendation. However our review has found, for those metrics and milestones that are behind schedule, many of the completion dates have not been updated to reflect when they are expected to be completed, even if years have passed since the original completion date lapsed. According to officials from CAPE, the original dates were left in the tracking tool to maintain visibility on how far past their initial expected completion dates these metrics and milestones had gone without being resolved. We previously found that the Air Force and Navy used their own tracking tools in addition to DOD’s centralized tracking tool. According to Air Force officials, they still are using their internal tracking tool to help them note progress within the Air Force before providing inputs to DOD’s centralized tracking tool. However, according to Navy officials, they are no longer maintaining their internal tracking tool, because they determined that those efforts were unnecessary and redundant with providing inputs to the centralized tracking tool for the relatively few recommendations that the Navy still has open. CAPE’s 2016 guidance indicates that the goals of monitoring the implementation of the 2014 nuclear enterprise reviews’ recommendations are to track progress toward addressing systemic issues and to assess changes in the overall health of the enterprise. This information provides stakeholders within the defense nuclear enterprise with key means of monitoring progress and evaluating the outcomes of these efforts. DOD’s approach has been to measure the effectiveness of actions taken by gathering supporting data and measuring the effectiveness of each recommendation separately. However, DOD officials have noted that some enduring recommendations—including recommendations associated with changing a service’s culture or morale—will take time to evaluate. In some cases, data related to outcome metrics may not be available to evaluate the effectiveness of actions taken until years after a service has taken key actions to address the recommendation. According to DOD officials, this framework was established to avoid prematurely assuming that actions taken have successfully addressed underlying problems. The need for the military departments and other DOD components to keep information current, particularly estimated dates for the completion of activities, has been emphasized at meetings of the Nuclear Deterrent Working Group. Further, a July 2018 memorandum from the Deputy Secretary of Defense reiterated that the components of the nuclear enterprise, which includes the Air Force and the Navy, will continue to track progress in implementing the recommendations from the 2014 nuclear enterprise reviews through 2020. According to officials from the Office of the Deputy Assistant Secretary of Defense for Nuclear Matters and CAPE, the use of the centralized tracking tool is likely to extend beyond 2020, and the Nuclear Deterrent Working Group—which supports the NDERG and its Nuclear Deterrent Senior Oversight Group—is using information from the centralized tracking tool to support additional work. In the context of transitioning from the current centralized tracking tool— which tracks the recommendations of the 2014 nuclear enterprise reviews—to enduring metrics used to characterize the health of the nuclear enterprise, as discussed later in this report, the Deputy Assistant Secretary of Defense for Nuclear Matters stated that it was not a good use of limited personnel resources to request that all metrics and milestones be updated. This is because many of the 2014 recommendations were minor and quickly closed. He noted that improved information about critical recommendations transitioning to enduring recommendations would be of use. The approach that the DOD CIO has established to track the recommendations from the 2015 NC3 report largely mirrors the approach developed for tracking the 2014 nuclear enterprise reviews’ recommendations. However, DOD CIO officials have noted that the 2015 NC3 report recommendations are more narrowly scoped than some of the recommendations from the 2014 reviews and therefore their tracking is less extensive. DOD CIO has issued guidance that requests that DOD components provide quarterly updates on the progress of implementing the recommendations. It specifies that the components should provide current metrics used to track progress, as well as key milestones, at a minimum by quarter, for the next year. The guidance further states that, as appropriate, both process metrics—to measure whether actions taken address a recommendation—and outcome metrics—to measure end results of interest—should be used. However, metric and milestone information for many of the recommendations in the tracking tool is out of date or incomplete. In particular, many of the recommendations do not have outcome metrics identified. DOD CIO’s guidance does request quarterly updates from the components and provides some information on content for those updates, but it does not specify that the information should be kept current and complete in the tracking tool. Therefore, information like process and outcome metrics may not be complete and kept current beyond the next year. Standards for Internal Control in the Federal Government states that an organization’s management should use high-quality information, which is defined as information from relevant and reliable data that is appropriate, current, complete, accurate, accessible, and provided on a timely basis. CAPE’s guidance provides a framework for information that DOD components should consider as they evaluate and track progress made for the 2014 recommendations. The guidance notes that, although the intent of the recommendations is enduring and the systemic issues identified by the 2014 nuclear enterprise reviews should be addressed, the specific approaches to the recommendations can be revised to address the recommendations more effectively. Similarly, the DOD CIO’s guidance provides a framework for information that DOD components should consider as they evaluate and track progress made for the 2015 NC3 report recommendations. For tracking both the 2014 nuclear enterprise reviews’ and 2015 NC3 report’s recommendations, DOD’s approaches are limited by the quality and completeness of the data collected and tracked in the centralized tracking tools. Specifically, CAPE’s general guidance for tracking the 2014 nuclear enterprise reviews’ recommendations does not include a specific requirement to periodically update the information to keep it current. DOD CIO’s guidance for tracking the 2015 NC3 report recommendations does request quarterly updates but does not specifically require information included in the tracking tool be complete. Without current and complete information—including revised dates for when metrics and milestones will be complete—the tracking tools used to track the 2014 and 2015 recommendations do not provide a complete and accurate picture of when tasks are expected to be completed, whether progress is still being made to address the many issues the department has identified, whether any efforts have stalled, or any additional challenges. Additionally, without an accurate picture of the department’s progress in addressing these recommendations, the Nuclear Deterrent Working Group has less information to leverage to support additional work to track enduring issues on behalf of the NDERG. In addition to tracking the 2014 recommendations, the July 2018 memorandum from the Deputy Secretary of Defense stated that stakeholders will develop metrics to capture long-term risks and identify opportunities for regular reporting to the NDERG. The NDERG Charter, issued in early June 2019, provides further direction to the Nuclear Deterrent Senior Oversight Group and its Nuclear Deterrent Working Group, including that members should develop metrics, data, tools, and briefing materials to support the NDERG efforts to identify, track, and address issues, risks, and opportunities across the nuclear enterprise. The charter further directs the Nuclear Deterrent Senior Oversight Group and Nuclear Deterrent Working Group members to recommend disposition of the long-term recommendations from the 2014 nuclear enterprise reviews and of the long-term efforts to achieve management, operations, and health outcomes directed by the 2018 Nuclear Posture Review. In order to address the direction from the July 2018 Deputy Secretary of Defense memorandum and the June 2019 NDERG Charter, DOD officials stated that the co-chairs of the Nuclear Deterrent Senior Oversight Group have been working with defense nuclear enterprise stakeholders to identify long-term issues that should be tracked to monitor the health of the enterprise. According to agency officials, they would like to adjust how long-term issues that relate to the enduring recommendations from the 2014 nuclear enterprise reviews are monitored. Examples include the need to sustain the current weapon systems until they are replaced, providing adequate funding for the acquisition of new systems, and improving the morale of nuclear forces. Since these recommendations are not expected to be closed as completed within the next few years, the Nuclear Deterrent Senior Oversight Group wants to find ways to improve how the recommendations can be tracked to monitor the health of the enterprise. According to DOD officials, they are currently working to identify relevant metrics from the existing tracking tool as well as existing data sources that might be leveraged to support the long-term monitoring of the health of the enterprise. This may be particularly helpful if the use of the existing tool is discontinued at some point after the 2020 time frame. The efforts of the military services and other DOD components to maintain current and complete information using the existing tracking tools for the 2014 and 2015 recommendations has the potential to aid the department. In particular, existing tools can be helpful for tracking and assessing both enduring recommendations from those reviews as well as additional efforts by the NDERG to assess and monitor the health of the nuclear enterprise. For example, existing outcome metrics can aid in the assessment of whether completed actions have addressed underlying issues that affect the health of the enterprise, identified risks can aid the department in addressing issues as they arise, and the use of the tools themselves can help maintain visibility across the DOD nuclear enterprise, including aiding the communication of timely information to senior leaders. DOD and the military services are experiencing challenges related to sustainment and maintenance of nuclear weapon systems—including challenges identified in recommendations from the 2014 nuclear enterprise reviews—and have ongoing and planned initiatives intended to mitigate these challenges. The military services face challenges related to operating weapon systems beyond their initial design life, parts availability and parts obsolescence, small fleet size, and the maintenance workforce. DOD and the services are mitigating sustainment and maintenance challenges through initiatives to increase parts availability and to improve depot-level maintenance, and through increased tracking of sustainment and maintenance problems. We reviewed sustainment and maintenance for the following nuclear weapon systems: Minuteman III. The Minuteman III ICBM is a strategic weapon system using a ballistic missile of intercontinental range. Missiles are dispersed in hardened silos to protect against attack and connected to an underground launch control center through a system of hardened cables. B-2 Spirit. The B-2 Spirit is a multirole bomber capable of delivering both conventional and nuclear munitions. B-52 Stratofortress. The B-52 Stratofortress is a long-range, heavy bomber that can perform a variety of missions. AGM-86B ALCM. The AGM-86B ALCM is a long-range, self-guided missile with a nuclear warhead that is carried by the B-52H bomber. E-4B NAOC. The E-4B NAOC is the primary survivable element of the National Military Command System through which the President, as Commander in Chief, and Secretary of Defense exercise national and nuclear command and control of military forces in day-to-day and crisis operations. In case of national emergency or destruction of ground command and control centers, the aircraft provides a highly survivable NC3 center to direct U.S. forces, execute emergency war orders, and coordinate actions by civil authorities. E-6B Mercury. The E-6B Mercury is a communications relay and, when manned, a strategic airborne command post aircraft. It provides survivable, reliable, and endurable airborne NC3 capabilities needed to direct, command, and control U.S. strategic nuclear forces. Ohio-class SSBN. The Ohio-class SSBNs are the most survivable leg of the strategic triad, serving as launch platforms for submarine- launched ballistic missiles. They are designed specifically for stealth and the precise delivery of nuclear warheads. Table 1 shows examples of sustainment challenges affecting these systems. According to DOD and service officials, while there are acquisition programs under way to replace most of these systems, the current nuclear enterprise systems remain necessary for years to come. The 2014 nuclear enterprise reviews included recommendations to sustain and maintain these systems until they are replaced, such as a recommendation to “fully fund increasing maintenance needs as the triad ages.” See appendixes II–VI for additional information and specific sustainment and maintenance challenges and initiatives for select systems. Almost all of the nuclear weapon systems we reviewed are experiencing challenges related to aging. Specifically, these weapon systems are being deployed beyond their originally intended service lives, which adds to the challenges of sustaining these systems. DOD, along with the Department of Energy, has undertaken an extensive, multifaceted effort to sustain and modernize U.S. nuclear weapons capabilities, including the nuclear weapons stockpile; the research and production infrastructure; and the NC3 system. Some of these sustainment efforts are directly linked to recommendations from the nuclear enterprise reviews of 2014 and the 2015 NC3 report. For example, the 2014 nuclear enterprise reviews recommended that the Air Force establish bomber and ICBM sustainment plans for aging platforms. The 2014 nuclear enterprise reviews also resulted in a recommendation to fully fund increasing maintenance needs as the nuclear triad ages. Table 2 provides additional examples of related recommendations from the 2014 reviews. According to DOD officials, as these nuclear weapon systems have aged they have required more maintenance in order to sustain them through their extended service lives, and they will continue to do so until they are replaced by new systems. For example, Air Force officials cited aircraft age as the major factor leading to corrosion and other airframe issues that the B-52 is experiencing. The first B-52 model was initially deployed in 1952, and the B-52H—the model currently in use—became operational in 1962. The Air Force now plans to sustain the B-52 until at least 2050, which will require increased maintenance and a series of modernization programs in the 2020s. The E-4B, first deployed in 1980, is also experiencing significant corrosion in the galley area, necessitating a fleet- wide galley replacement program. Neither the B-52 nor the E-4B have replacement programs identified. According to Air Force officials, aging components have also led to structural problems with the Minuteman III ICBM. The Minuteman III was deployed in 1970 with an original planned service life of 10 years. The Minuteman III is now expected to last until the 2030s, when it will be replaced by the Ground Based Strategic Deterrent system. In addition to the weapon systems, support components and support infrastructure are also experiencing age-related challenges. For example, according to Air Force officials, the support infrastructure for the Minuteman III in use today, known as the real property installed equipment, is the original infrastructure that was fielded with the Minuteman I weapon system in 1960, which reached operational capability in 1962. These officials stated that challenges at these facilities include corrosion, water intrusion, collapsed conduits, misaligned doors, and bulging walls. The need to sustain nuclear support equipment is reflected in a nuclear enterprise review recommendation to prioritize nuclear support and test equipment. Parts availability issues and parts obsolescence also affect maintenance on existing weapon systems across the nuclear enterprise. In many cases, the industrial base that produced specific parts for a weapon system is no longer active or is no longer producing the part, so when parts break there are no replacements available. For example, Air Force officials working to maintain the B-52 fleet told us that they have trouble finding suppliers who will produce the necessary parts for such an old airframe. Similarly, the Ohio-class SSBN program is experiencing challenges in sustaining submarines through their planned 42-year service life. The Ohio-class was initially intended to be operational for 30 years. Since it will be in service longer than expected, the Navy is finding that parts not originally intended to be replaced now need replacement. Navy officials stated that obsolescence has a greater impact for these parts that were never expected to fail and therefore do not have an industrial base to support replacements than for parts that the Navy has always planned to replace at some point during the Ohio-class service life. In certain scenarios, maintainers across several weapon systems have had to reengineer parts, because the original blueprints do not exist. Maintainers we spoke to reported long lead times to have parts fabricated and delivered, which extends the time that a system is offline for maintenance. The 2014 nuclear enterprise reviews included multiple recommendations to address parts obsolescence and availability problems in both the Air Force and the Navy, including the examples shown in table 3. Additionally, maintainers may cannibalize parts, a process by which parts are taken from one asset for use in another. This process is conducted during maintenance for both Air Force and Navy nuclear weapon systems. For example, according to Air Force officials, parts are routinely cannibalized from B-2 aircraft that are undergoing modifications so that they can be used on the operational B-2 aircraft. Similarly, Navy officials stated that parts are cannibalized from other classes of submarines to sustain Ohio-class SSBNs when replacement parts are not available elsewhere. Parts cannibalization has also occurred during engineered refueling overhauls. According to Navy officials, in the past, SSBNs completing refueling overhauls have cannibalized parts from SSBNs that are beginning to be overhauled. The final Ohio-class SSBN to undergo an overhaul, the USS Louisiana, will not have that option, because there will be no other SSBNs from which to cannibalize parts; all SSBNs except the USS Louisiana and USS Wyoming have already completed their overhauls. According to officials from the Office of the Chief of Naval Operations, they are not concerned about not being able to cannibalize parts for the remaining overhauls. Several legacy nuclear systems have a limited number of assets, which can create challenges for meeting operational requirements while at the same time conducting maintenance. In particular, the size of a fleet can create challenges when it becomes difficult or impossible to meet operational requirements. According to Air Force and Navy officials, maintenance challenges stemming from small fleet sizes particularly affect the B-2, E-4B, and E-6B weapon systems. Scheduling maintenance is one such challenge, because taking one aircraft down for maintenance will have a proportionally greater effect on the number of aircraft available for operations than it would for a larger fleet. For example, according to Air Force officials, the B-2 is experiencing challenges related to maintaining aircraft availability during the extensive modernizations that are being conducted, including integration of a new weapon and upgrades to its radar system. Scheduling this modernization process, part of the effort to sustain the B-2, is challenging given that there are only 20 aircraft in the fleet. Taking an aircraft down for maintenance limits the number of aircraft available for operational use by U.S. Strategic Command. Similarly, Air Force officials told us that the time needed for maintenance and modernization efforts on the E-4B was a primary factor leading to decreased aircraft availability of the E-4B, because of the small number of aircraft in the fleet—four in total. Having only four aircraft means that delays currently experienced during depot maintenance and installation of modifications have larger effects on the overall availability of the fleet. One aircraft unavailable as it undergoes these actions results in one quarter of the fleet being unavailable for operations. Additionally, unscheduled maintenance could exacerbate the issue of scheduling challenges and conflict with operational requirements. Having a small fleet with some systems in maintenance could also impede the force’s ability to surge if needed. The B-52 fleet has experienced a unique challenge, because it has recently been used extensively in conventional operations. According to Air Force officials, it takes time to change a B-52 configuration from conventional to nuclear to ready the aircraft for a nuclear mission, which may affect aircraft availability. According to officials from the Office of the Deputy Assistant Secretary of Defense for Nuclear Matters, reduced availability also negatively affects readiness through the reduction of training opportunities. Security-clearance backlogs for the maintenance workforce are a challenge with respect to certain nuclear weapon systems. Without at least a secret security clearance, maintainers may be limited in the activities they can perform on a nuclear system. For example, an Air Force official explained that without a clearance maintainers are not only limited in the activities they can perform on the B-2, but they cannot complete some of the training they need. To mitigate this challenge, the Air Force sometimes chooses to issue interim clearances. But in so doing unit commanders must accept additional risk. Specifically, since background investigations may not be complete at the time these interim clearances are issued, it is possible that someone who has been issued an interim clearance will ultimately be found ineligible for that security clearance due to information discovered during their background investigation. Similarly, there is a backlog of top secret clearances for missile-wing personnel working with the Minuteman III, including maintainers. Again, the services sometimes choose to issue interim clearances, but leadership must accept that risk, and interim clearances may have limitations. For example, according to officials from one of the missile wings we spoke with, a missileer in that wing with an interim top secret clearance can complete training for the Minuteman III but cannot be certified to be on a two-person alert team. The 2014 nuclear enterprise reviews included several recommendations to improve various issues related to workforce, including the examples shown in table 4. We have previously found that problems related to security-clearance backlogs and the resulting delays in determining clearance eligibility and issuing initial clearances can result in millions of dollars of additional costs to the federal government. We have also found that the backlogs can result in longer periods needed to complete national security–related contracts and lost opportunity costs if prospective employees decide to work elsewhere rather than wait to get a clearance. Further, we have found that the backlogs can result in diminishing quality of the work because industrial contractors may be performing government contracts with personnel who have the necessary security clearances but are not the most experienced and best-qualified personnel for the positions involved. Additionally, we identified the personnel security-clearance process as a high-risk area in March 2019 and we continue to monitor progress addressing the weaknesses in this area. The services have taken steps to ease the effect of parts availability issues and obsolescence. For example, partly in response to nuclear enterprise review recommendations, the Air Force has broadened the definition of the Minuteman III weapon system—a process the Air Force refers to as demarcation—and instituted programmed depot maintenance for the weapon system. The Air Force’s demarcation effort centralized parts funding and inventory management for all of the essential components of the Minuteman III and integrated the entire weapon system into a standard Air Force supply process. According to Air Force officials, the Air Force is also working with the Defense Logistics Agency to identify and catalog parts that previously had no identification numbers associated with them. Officials said that programmed depot maintenance is expected to result in a steady, predictive demand level for parts, which will help the Air Force ensure that parts are available and incentivize vendors to manufacture parts, including previously obsolete parts for which there was no steady source of supply. Additionally, both of these efforts are expected to reduce the likelihood that parts will be unavailable when needed. Navy officials explained that for the Ohio-class SSBN, when an industrial base supplier is not able to meet the need for certain obsolete parts, the Navy purchases enough parts to “stock the shelf” by including in one contract enough quantities of the part to last for the life of the SSBNs. Additionally, the Navy has developed programs such as the Trident Planned Equipment Replacement Program, which has identified over 300 critical parts and has them manufactured and ready to be used for replacement when SSBNs are undergoing planned maintenance. The Defense Logistics Agency has increased its support to the nuclear enterprise to help ensure that parts are available when they are needed. In 2015, the Defense Logistics Agency established a Nuclear Support Office from its headquarters staff to synchronize resources to ensure responsive support to the DOD nuclear enterprise. According to Defense Logistics Agency officials, the office has 13 people, three of whom are embedded at U.S. Strategic Command, Air Force Space Command, and Air Force Global Strike Command. In the Defense Logistics Agency’s 2018–2026 strategic plan, supporting the nuclear enterprise is the top objective. According to Defense Logistics Agency officials, they also have a series of new initiatives to increase materiel availability and accomplish activities such as paying for the cost of reverse engineering to fill in voids that exist in technical data for nuclear enterprise systems; working in additive manufacturing to set the standard for 3D printing and polymers across DOD and subsequently printing parts on demand; and identifying weaknesses in the industrial base and focusing investments in those areas. The focus of the material availability effort is presently to find out how to help the services when they cannot find a part and to address it in one of the initiatives. The Air Force and Navy have taken steps to improve depot-level maintenance across the nuclear enterprise. For example, the Air Force introduced programmed depot maintenance for the Minuteman III weapon system in 2014 and transformed ICBM weapon system sustainment processes into a standardized, integrated planning and support model. For the E-4B, according to E-4B program officials, the Air Force has initiated incentivized programmed depot maintenance gates that provide contractors additional financial incentive to complete increments of depot maintenance, as well as the entire depot maintenance process, on time or early. The E-4B program office is implementing this incentive structure in an effort to decrease the E-4B’s time spent in depot maintenance. Additionally, the Air Force has several initiatives under way to mitigate B- 2 sustainment and maintenance challenges, including increasing the intervals between depot-level maintenance and merging modernization and depot maintenance efforts so that the aircraft is down less and available more. In addition, there are multiple ongoing initiatives to improve the B-2’s supply chain, including using predictive analysis and forecasting tools to help determine how many spare parts to keep in stock. To sustain the Ohio-class SSBN fleet, the Navy has conducted engineered refueling overhauls on all SSBNs except for the USS Wyoming and USS Louisiana, the last two SSBNs to enter service. This major maintenance is intended to help sustain the Ohio-class SSBN fleet until its service life reaches 42 years and it is replaced by the Columbia- class SSBN. These engineered refueling overhauls have taken longer than originally anticipated. Navy officials attribute these delays to the submarines requiring more maintenance work than expected as well as some delays in acquiring parts. Over the past several years, DOD and the services have increased their attention to and tracking of nuclear weapon systems maintenance and sustainment issues. As we have previously found, DOD and the military services have taken steps to improve oversight of the nuclear enterprise in response to the 2014 reviews. For example, DOD has established or participated in a number of oversight organizations that aid in the management of the defense nuclear enterprise, including the NDERG, which was established in 2014 by the Secretary of Defense to ensure the long-term health of the nuclear enterprise by addressing issues identified in the 2014 nuclear enterprise reviews, including sustainment and maintenance-related issues. The Air Force and Navy have also taken actions to improve oversight of sustainment and maintenance. For example, the Air Force, through its Nuclear Mission Assessment effort, uses independent analyses of various data sources to recognize challenges within the Air Force nuclear enterprise, including sustainment and maintenance problems. Additionally, the Air Force implemented the Nuclear Weapon System Enterprise Review, which was developed in 2016 by the Air Force Nuclear Weapons Center with support from Air Force Materiel Command. According to Air Force documentation, the review provided timely insight into the comprehensive health of individual nuclear weapon systems and provided an assessment of how well the enterprise is performing. Nuclear weapon systems that were specifically reported on in the Nuclear Weapon System Enterprise Review included ALCM, Minuteman III, and NC3 systems. The Air Force modeled its Nuclear Weapon System Enterprise Review in part on assessment and reporting already completed for all aircraft, including the B-2 and B-52 bombers, through its Weapon System Enterprise Review briefings. Weapon System Enterprise Review metrics are tailored to each weapon system and have details on data such as cost, schedule, performance, and funding. These data are compiled into a quarterly briefing report for Air Force major commands and Air Force headquarters. According to Air Force officials, information included in the Nuclear Weapon System Enterprise Review was related to 10 recommendations from the 2014 nuclear enterprise reviews and the 2015 NC3 report. Tracking this information helped the Air Force to close out the recommendations assigned to Air Force Materiel Command. According to Air Force officials, as of July 2019 the Air Force had discontinued the use of the Nuclear Weapon System Enterprise Review. The officials said that Air Force Nuclear Weapons Center and Air Force Global Strike Command are currently collaborating on a replacement presentation focused on weapon system availability; however, this effort is not finalized. The officials further stated that the Air Force has transitioned to an Aircraft Availability Improvement Program construct with an aircraft readiness focus and is working to establish an equivalent for the nonflying weapon systems (i.e., Minuteman III and NC3). The Navy oversees its leg of the nuclear triad using the Navy Nuclear Deterrent Mission Oversight Council. The council is a senior Department of the Navy forum that is responsible for coordinating the Navy’s nuclear weapon activities (safety, security, reliability, and nuclear weapons incident response), operations, personnel, policy, material support, and oversight functions. According to Navy officials, the Navy Nuclear Deterrent Mission Oversight Council addresses long-term issues affecting the Navy’s nuclear enterprise and identifies and monitors risks associated with those issues, including the actions taken in response to sustainment and maintenance-related recommendations from the 2014 nuclear enterprise reviews. According to Navy officials, the Navy has also established an SSBN Sustainment Working Group and a Trident Planned Equipment Replacement Program Working Group to address Ohio-class sustainment and maintenance-related issues. DOD and the military services have made progress in addressing the recommendations from the 2014 nuclear enterprise reviews and the 2015 NC3 report. They have done so partially by establishing and improving a number of processes to aid in the sustainment of defense nuclear enterprise systems. The department is modifying the NDERG’s focus from monitoring the status of the 2014 recommendations to monitoring the long-term health of the enterprise. This shift in focus should position the NDERG to better perform its oversight functions as the principal integrated civilian–military governance body for the defense nuclear enterprise. This is important because many of the recommendations that remain open are focused on long-term sustainment of the enterprise or are designed to be closed only after progress in addressing the issues can be meaningfully evaluated. It is important that the department and the military services continue to use the successful tools they have created to monitor these efforts and leverage these tools (and the premises behind them) as they create new mechanisms to maintain senior-leader visibility of the defense nuclear enterprise. Providing current, complete, and relevant information on the status of service and DOD component actions to address recommendations and an understanding of metrics, milestones, and risks will allow senior leadership to maintain oversight of the department’s progress. In particular, such visibility will help senior leaders maintain awareness of the progress of efforts to address past failings, determine whether efforts are having the intended effects and achieving the desired outcomes of addressing root problems, and achieve the desired end states of a healthy defense nuclear enterprise. These existing processes can help inform additional processes the department develops to monitor the health of the nuclear enterprise. The collection and assessment of information to maintain the currency and completeness of information in existing tools may also allow the department to identify potential emerging issues that may negatively affect the vital programs, infrastructure, and personnel essential to the maintenance of an effective nuclear deterrent. We are making the following two recommendations to DOD: The Secretary of Defense should ensure that the Director of CAPE, in coordination with the Deputy Assistant Secretary of Defense for Nuclear Matters, the Deputy Assistant Secretary of Defense for Nuclear and Missile Defense Policy, and the Joint Staff Deputy Director for Strategic Stability, as co-chairs of the Nuclear Deterrent Senior Oversight Group, update the applicable guidance for methods of tracking and evaluating progress on implementation of the recommendations from the 2014 nuclear enterprise reviews, requiring DOD components to keep information—including any revised time frames—current. (Recommendation 1) The Secretary of Defense should ensure that the Under Secretary of Defense for Acquisition and Sustainment updates the applicable guidance for methods of tracking and evaluating progress on implementation of the recommendations of the 2015 NC3 report, requiring DOD components to keep information—including metrics for measuring progress and outcomes as well as any revised time frames that may extend out more than 1 year—complete and current. (Recommendation 2) We provided a draft of the classified report to DOD for review and comment. The department’s comments on the classified report are reprinted in appendix VII. In its comments, DOD concurred with both of our recommendations. DOD also provided technical comments on the classified report, which we incorporated as appropriate. In concurring with our first recommendation, DOD stated that the Nuclear Deterrent Senior Oversight Group co-chairs or, as necessary, the Deputy Secretary of Defense as the chair of the NDERG, will update the applicable guidance to ensure that time frames and other information associated with planned actions are kept up to date. In concurring with our second recommendation, DOD stated that the DOD CIO and, as appropriate, the Under Secretary of Defense for Acquisition and Sustainment as the NC3 capability portfolio manager, will update the applicable guidance to ensure that metrics, time frames, and other information associated with planned actions are kept up to date and complete. We are encouraged that DOD is planning to take these actions to address our two recommendations. We believe that providing current, complete, and relevant information on the status of service and other DOD component actions to address recommendations and an understanding of metrics, milestones, and risks will allow senior leadership to maintain oversight of the department’s progress. This may also allow DOD to identify potential emerging issues that may negatively affect the vital programs, infrastructure, and personnel essential to the maintenance of an effective nuclear deterrent. We are sending copies of this report to the appropriate congressional committees, and to the Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; the Chairman of the Joint Chiefs of Staff; the Secretaries of the Army, of the Navy, and of the Air Force; the Commander, U.S. Strategic Command; the Department of Defense Chief Information Officer; and the Director of the Office of Cost Assessment and Program Evaluation. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9971 or kirschbaumj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. Minuteman III is a strategic intercontinental ballistic missile (ICBM) weapon system that represents one leg of the nation’s nuclear triad. First deployed in 1970 with a planned service life of 10 years, the Minuteman III weapon system consists of missiles as well as 450 launch facilities and 45 launch control centers. The Minuteman III service life was extended since its deployment by various service-life extension programs. Launch facilities are connected to underground launch control centers through a system of hardened cables. A launch facility is an unmanned site that houses the missile and all equipment required to maintain the missile in a launch-ready configuration. These underground facilities have been considered part of the Minuteman III weapon system since 2014. Missile alert facilities are manned compounds that encompass the launch control center, a launch control support building, and a launch control equipment building. Missile alert facilities are crewed by security personnel, a cook, a facilities manager, and a launch crew. Launch crews, consisting of two officers, perform around-the-clock alert in the underground launch control center. See figure 5 for components of the Minuteman III weapon system. Nuclear command, control, and communications (NC3) systems and related procedures ensure launch crews in the launch control centers can receive and authenticate the President’s authorization for the use of nuclear weapons. In the event that connectivity is lost between a launch control center and an associated launch facility, other NC3 capabilities are available to carry out the direction of the President. For example, launch control centers aside from the one that lost connectivity can communicate with that launch facility as well as numerous other launch facilities. Further, an E-6B aircraft configured as an Airborne Command Post can transmit a launch command to the ICBM force through the Airborne Launch Control System capability. Minuteman III has undergone many life extension sustainment efforts to maintain its warfighting capabilities. The Air Force plans to sustain Minuteman III through 2030—50 years past its initial planned service life—and gradually draw down the weapon system before it is finally retired in 2036, as it is replaced by the Ground Based Strategic Deterrent ICBM weapon system. The Ground Based Strategic Deterrent has a planned initial operating capability date of 2029 and is to be fully deployed by 2036. Figure 6 provides a timeline of the expected service life of the Minuteman III ICBM weapon system. According to Air Force officials, Minuteman III is experiencing challenges related to aging facilities, aging infrastructure, and parts obsolescence. Aging facilities and infrastructure continue to affect the weapon system. According to Air Force officials, most of the real property installed equipment in use today is the original infrastructure that was fielded with the Minuteman I weapon system in 1960, achieving operational capability in 1962, and only slight modifications have been made over the years. Additionally, challenges with critical subsystems also exist, and while there are short-term mitigation strategies for each subsystem, there are no long-term replacements planned for the Minuteman III weapon system except by the fielding of its replacement program: the Ground Based Strategic Deterrent. Examples of facilities and infrastructure challenges include corrosion, water intrusion, collapsed conduits, misaligned doors, and bulging walls. According to Air Force officials, even attempting to replace small items can be difficult, because multiple subsystems must be replaced to support the modification. Diminishing manufacturing sources, material shortages, and obsolescence issues are additional contributing factors, because they cause difficulties in maintaining a credible supply chain for Minuteman III parts. Additionally, officials said that depot maintenance, interim maintenance, and organizational maintenance have all been affected by parts obsolescence, diminishing manufacturing sources, and material shortages, as has NC3 equipment. The Minuteman III weapon system is facing continued asset attrition. According to Air Force officials, as a result of the expected attrition of current field assets, the Minuteman III weapon system will be unable to meet full mission requirements after 2026 should full deployment be required. The Air Force expends four Minuteman III ICBMs per year on testing. According to the officials, continued asset attrition is also affecting the Minuteman III retirement schedule. Additionally, the Air Force Minuteman III program has experienced personnel challenges. According to Air Force officials, the Air Force has a backlog for top secret clearances for missile wing personnel, including maintainers, and it can take up to 2 years of a missileer’s 5-year commitment for a top secret clearance to come through. The officials told us a missileer can complete training with an interim top secret clearance but cannot be certified under the Personnel Reliability Program and therefore cannot be assigned to a two-person alert team. This makes it a challenge for missileers with interim clearances to keep up with their peers. Additionally, since commanders cannot assign them to alert duty, it puts additional burden on those missileers who are cleared to perform more alert-duty assignments. According to Air Force officials, they have also identified challenges associated with scheduling maintenance activities, including the need to balance longer working days with the additional risks that maintainers face as a result of these longer days. Officials also said that as launch control centers, launch facilities, and other elements of the Minuteman III weapon system are dispersed over large areas that make up the missile fields, maintainers may need to travel several hours from their base to arrive at the location of the maintenance activity. These increased travel times have resulted in extended workdays for maintainers and security forces or the need to split maintenance jobs between two shifts, which results in decreasing the number of personnel available to work at other locations. To mitigate challenges associated with the Minuteman III weapon system—including limitations in the availability of parts—the Air Force has broadened the definition of the Minuteman III weapon system, which is a process the Air Force calls demarcation. It was broadened to include some additional facilities related to the Minuteman III weapon system, and programmed depot maintenance was instituted for it. According to Air Force officials, demarcation centralized parts funding and inventory management for all of the essential parts of the Minuteman III and integrated the entire weapon system into the standard Air Force supply process. Additionally, according to the officials, the ICBM System Directorate has established a Weapon System Supply Chain Management office to oversee the commodity and organic support required to meet the daily needs of the warfighter and to sustain Minuteman Ill throughout Ground Based Strategic Deterrent deployment. The officials said the Weapon System Supply Chain Management office conducts predictive forecasting of the demand for parts through predictive data analysis, which tracks the potential demand for parts as well as parts supportability as an ongoing analysis process. Additionally, the Weapon System Supply Chain Management office does this through an analysis tool that draws on information from multiple supply databases to identify rising request levels in maintenance data systems and mission-capable conditions reported from the field. This tool uses data to identify parts that will be needed. Additionally, Air Force Global Strike Command conducted an end-to-end review of Minuteman III weapon system maintenance to determine whether ICBM maintenance organizations are organized, trained, and equipped to meet the current and future needs of the weapon system. The review noted that a questionable manpower standard, aging resources and equipment, and organizational inefficiencies have reduced the effectiveness of maintenance and the health of the Minuteman III. Subject-matter experts from various Air Force organizations and the Navy assessed maintenance and provided recommendations on methods, training, resources (supply and equipment), infrastructure, manpower, support, culture, and leadership. For example, the review observed that parts and equipment availability challenges continue to affect the mission. From this observation the review offered several recommendations, including that the Air Force Nuclear Weapons Center set aside all parts for weapon system testing so that they are available when the tests occur, every 5 years. This is intended to ensure that the parts that are set aside are not used at the missile wings. The review also recommended a number of efforts to improve the management of maintenance schedules, including increased coordination and planning of maintenance schedules in advance. According to Air Force officials, this allows maintenance commanders to make informed decisions, in advance, regarding when longer working days are appropriate. A number of service-life extension programs are under way to sustain the Minuteman III until the Ground Based Strategic Deterrent arrives. Additionally, ICBM programmed depot maintenance was introduced in 2014 and transformed processes for ICBM weapon system sustainment into a standardized, integrated planning and support model that performs maintenance to refurbish portions of the weapon system. According to Air Force officials, the idea was to have the Minuteman III weapon system undergoing depot maintenance in ways similar to the periodic depot maintenance that aircraft undergo. However, the depot team would have to conduct portions of the maintenance in the missile fields instead of bringing the weapon system to a depot. This new programmed depot maintenance takes individual Minuteman III launch facilities offline to conduct major maintenance. Air Force Nuclear Weapons Center works with the Defense Logistics Agency to procure parts as part of programmed depot maintenance planning. According to Air Force officials, the plan is to have 57 launch facilities go through the programmed depot maintenance process each year, with a plan to refurbish all launch facilities over an 8-year period. Additionally, the current programmed depot maintenance efforts are implementing a standard set of maintenance efforts across all facilities, but some additional issues are also being addressed on a case-by-case basis. To track the health of the Minuteman III, the Air Force Nuclear Weapon Center assigns predictive health measures to the systems. These predictive health measures estimate when there will be a specific maintenance activity needed for each weapon system part―for example, when a part will likely fail and need to be replaced—based on assessments of historic data and engineering analysis. It emphasizes ICBM sustainment through reliability-centered maintenance, which allows for the continuous evaluation of system performance. Additionally, the predictive health measures, based on data from Air Force maintenance data-collection systems, are analyzed monthly for all launch facilities and launch control centers across the three missile wings. According to Air Force officials, predictive health measures enable the Air Force to identify early indications of when systems may need additional maintenance as well as to analyze health trends to identify issues―such as parts failures―across all of the Minuteman III force. Additionally, the use of predictive health measures and reliability-centered maintenance allows the Air Force to better plan for when maintenance activities, and related resources, will be needed to address issues prior to when they arise. According to Air Force officials, Air Force Global Strike Command also collects and reports on metrics monthly, based on Integrated Maintenance Data System write-ups and predictive health metrics. Officials told us that the Integrated Maintenance Data System is a difficult system to learn and no formal training on the system is available. The data quality in the Integrated Maintenance Data System is highly dependent on the individual expertise of whoever enters it. The B-2 Spirit is a multirole, dual-capable heavy bomber. The B-2 is the only U.S. aircraft that combines a long-range capability, a large payload, and stealth into a single platform, giving it the ability to project air power globally. The B-2 became operational in 1997, and the current B-2 operational fleet consists of a total of 20 aircraft. The 509th Bomb Wing, located at Whiteman Air Force Base, Missouri, is the sole operational unit for the B-2. The 509th Bomb Wing usually maintains 15 operationally available B-2s. At any one time, there are two aircraft undergoing sustainment and modernization upgrades, two in programmed depot maintenance, and one designated as a test aircraft. The Air Force plans to sustain the B-2 into the 2030s (see fig. 7). The B-2 will eventually be replaced by the B-21, which will assume the penetrating strike role of the B-2. The B-21 is expected to become operational in the mid-2020s, but no replacement schedule for the B-2 has been identified. The B-2 is undergoing multiple modernization programs, while maintaining existing capabilities through form, fit, and function replacements for components that are obsolete or no longer supportable. B-2 modernization efforts are ongoing for communications, navigation, defensive management, weapons, and the airframe. Because the B-2 is aging and the fleet is small, parts obsolescence is a challenge. A unique sustainment aspect of the B-2 is the focus on managing its low-observable stealth capability. The B-2 Low Observable Integrated Product Team manages the Low Observable Signature and Supportability Modifications portfolio of projects, which is aimed at maintaining the stealth capability of the B-2 by monitoring, maintaining, and enhancing the radar cross section (or “signature”) of the aircraft. In addition to specific efforts to sustain the low-observable stealth capability, every other sustainment and modernization activity for the B-2 must be assessed early in the planning stages for any effects on this capability. According to Air Force officials, in addition to maintaining readiness for its nuclear mission, the B-2 platform is also in high demand to support conventional bomber missions. However, the Air Force has a limited number of aircraft to meet this demand. Consequently, the Air Force’s B-2 Division, along with Air Force Global Strike Command and the 509th Bomb Wing, must carefully manage the timing of maintenance activities, aircraft modifications, programmed depot maintenance, assignment of a flight test aircraft, and the flying-hour program. This requires an intricate schedule of availability of aircraft for each effort, while trying to maintain overall operational availability for the B-2 fleet. According to Air Force officials, small-fleet dynamics have led to high costs, diminishing vendor and parts availability, and readiness concerns. Various initiatives are under way to improve the availability of B-2s. A cumulative increase of one additional aircraft available for operations is anticipated by fiscal year 2022. Several of these initiatives are directly related to improving sustainment of the B-2 and maintenance processes and procedures. Examples of sustainment and maintenance-related initiatives include the following: The B-2 Programmed Depot Maintenance Process Improvement initiative is a collaborative effort between the B-2 program office and Northrop Grumman to increase capacity during the depot maintenance process in order to incorporate modifications during depot maintenance. This initiative is expected to result in reduced downtime at the 509th Bomb Wing by allowing modifications that would normally occur at the wing―making an aircraft unavailable for operations―to occur during planned depot maintenance. The B-2 program office increased the interval between programmed depot maintenance periods from 7 years to 9 years. The original B-2 programmed depot maintenance interval of 7 years was driven by the expected life of low-observable coatings. According to B-2 program officials, they have since determined that the expected life of these coatings is 9 years. Additionally, the Air Force’s B-2 Division established the B-2 Obsolescence Integrated Product Team in 2018 to address management oversight of obsolescence. The team convenes monthly to develop a strategic plan to enhance processes, communications, and consolidation of obsolescence issues affecting B-2 modernization and sustainment. A list of obsolete parts, currently totaling over 100, as well as planned mitigation strategies, is consolidated and reviewed quarterly. The integrated product team is also developing a Diminishing Manufacturing and Materiel Shortages Management Plan to define the structure, process, management, and oversight of obsolescence for the life cycle of the B-2. Further, according to Air Force documentation, for each B-2 sustainment and modernization program, the government and prime contractor establish a joint Obsolescence Working Group that is responsible for reviewing the program’s strategy to mitigate diminishing manufacturing and materiel shortages. The B-52 Stratofortress is a dual-capable heavy bomber used to meet the United States’ airborne strategic nuclear deterrence and global precision attack mission and objectives. The B-52 began operations in 1952. Eight models were produced, with a total production quantity of 742. The final version of the B-52, the “H” model, was the last model produced and became operational in 1961. The current B-52 operational fleet consists of a total of 76 aircraft, 46 of which are designated as nuclear capable. B- 52 operational units consist of the 2nd Bomb Wing, located at Barksdale Air Force Base, Louisiana, and the 5th Bomb Wing, located at Minot Air Force Base, North Dakota. The B-52 originally had a planned service life of approximately 20 years. However, the Air Force now plans to sustain the B-52 until at least 2050 (see fig. 8). An eventual replacement for the B-52 has not yet been identified. The B-52 is undergoing several modernization programs planned for completion in the 2020s. The B-52 Commercial Engine Replacement Program will replace the aging TF33-PW-103 engine with new commercial-off-the-shelf engines capable of meeting the needs of the B- 52 platform to keep the B-52 viable until 2050 and beyond. The engine replacement program was scheduled to begin in fiscal year 2019 and to be completed in fiscal year 2023. Additional modernization programs include installation of a Global Positioning System Interface Unit and a radar modernization program. According to B-52 maintainers, the biggest maintenance limitation they are experiencing is with the engine. In 2017, an engine fan disk failure on one of eight engines on a B-52 caused the engine to detach from the aircraft while in flight. The Air Force has identified the resulting fan disk inspection and replacement as a serious risk due to the time it will take to complete and expects the inspection, removal, and replacement to have an effect on the fleet into the 2020s. Further, the current TF33 engines are unsupportable beyond 2030. According to Air Force officials, the engine replacement program is expected to negatively affect aircraft availability rates until it is completed in 2023. Air Force officials also expressed concern that, because the new commercial engines have many digital components, their installation could increase the B-52’s cybersecurity risk. At 60 years old, the B-52 is experiencing structural issues typical of aging aircraft. The extension of the B-52’s service life into the 2050s likely imposes additional unforeseen sustainment and modernization challenges. The aging airframe has required increased depot-level maintenance to correct, for example, problems related to stress corrosion and cracking on the airframe. Further, industry is no longer able to support these aging systems, and the systems have experienced declining performance and system failure. According to Air Force officials, it is difficult to maintain suppliers who will produce the necessary parts for such an old airframe. According to officials at both B-52 wings, a security-clearance backlog limits the number of trained and available B-52 maintainers. Both B-52 wings also have shortages of experienced maintainers. Additionally, the demands of the B-52’s conventional mission create challenges to ensuring that they are available for their nuclear mission. The B-52 has been used in operations against the Islamic State in Syria. According to officials at both B-52 wings, the conventional mission is the day-to-day focus of most B-52 operators and maintainers. These officials said that it is sometimes challenging to shift their collective mindset to focus on the nuclear mission. Further, the B-52 requires different configurations for its conventional and nuclear missions. According to B-52 maintenance officials, the time it takes to change the configurations affects how quickly the aircraft can be ready for a nuclear mission. An official from one B-52 operations group expressed concern that if the B-52 continues to be used heavily in conventional operations, it will begin to experience airframe and personnel problems similar to those that have affected the B-1, which has been used extensively in recent conventional bombing operations. The B-52 engine replacement program is expected to allow the engines to be sustained until the 2050s, when the B-52 is expected to retire. In addition, the modern engines being installed will increase the B-52’s range by approximately 30 percent, significantly decrease maintenance costs and downtime, provide the additional electrical power required for follow-on systems, and decrease the B-52’s dependency on refueling tankers for both conventional and nuclear long-range strike sorties because it will be able to fly longer without being refueled. The B-52 program office is leading a B-52 Aircraft Availability Improvement Plan, which is an enterprise-wide effort to increase the number of B-52s available to operational units. According to officials, the program office is leading an initiative to reduce the number of aircraft that are at the depot at any given time from 11 to 9. This would increase the availability of aircraft to meet operational requirements. This effort is in the early implementation stages, and the program office has not yet evaluated the results. The B-52 program office mitigates parts obsolescence issues through active vendor management, selection of vendors who use an open systems approach, use of predictive database tools to identify diminishing manufacturing and materiel shortages, and leveraging industry and government reporting systems that track diminishing manufacturing and materiel shortages. The AGM-86B ALCM is a long-range self-guided missile with a nuclear warhead that is carried by the B-52H Stratofortress bomber. ALCM complements the B-52 heavy bomber in its strategic mission; its primary missions are strategic attack, interdiction, and suppression of enemy air defenses. It is designed to be carried on the internal B-52 common strategic rotary launcher or externally on pylons located underneath each wing (see fig. 9). The ALCM air vehicle is powered by a low-thrust turbofan engine and flies at subsonic speeds. After release from the carrier aircraft, the ALCM proceeds autonomously to its target. ALCM became operational in 1982 and, according to Air Force officials, had an original planned service life of 10 years; it is on average 25 years beyond its planned service life (see fig. 10). Additionally, ALCM has experienced aging issues with multiple subsystems. For example, the officials told us the Bomber Weapons Integration Equipment, pylons, launcher, common support equipment, ALCM-peculiar support equipment, and automated test equipment all have aging and supportability issues that require assessment and actions that must be taken going forward. Air Force officials stated that because of ALCM’s age, diminishing manufacturing sources and material shortage issues occasionally arise that have required requalification of a product line or qualifying a new source. Additionally, they said that ALCM maintenance and analysis trends have highlighted that electrical components and bearings are wearing out. According to Air Force officials, the ALCM fleet, made up of approximately 535 missiles in active inventory as of May 2019, is affected by attrition resulting from testing. The ALCM is operationally tested with six force development evaluations and two functional ground tests each year. According to Air Force officials, the testing employs ALCM fleet inventory missiles that are consumed during live launch and destructive testing, thereby reducing the fleet by eight missiles per year. The officials noted that the fleet would be sustainable longer if the decision was made to stop testing. However, this would mean that fewer data—collected during the annual tests—would be available to predict the life of the missile, and the Air Force would lose full confidence that it could execute ALCM’s mission. According to Air Force officials, the ALCM will be sustained through 2030. Service-life extension programs have been implemented to sustain the weapon system, and maintenance is performed every 6 years to exchange the missile’s engine. In order to extend the ALCM’s service life until a replacement system is fielded, service-life extension programs were developed through surveillance, studies, and analysis programs that identified numerous components for replacement as a result of aging and obsolescence issues. Officials said these programs address replacement of aged brittle components, bearings, and circuitry and electronic components within navigation and guidance systems. According to Air Force officials, maintainers are being proactive in identifying parts on the ALCM system that will experience issues in the future. Additionally, continued monitoring through flight tests and aging surveillance programs will enable them to identify new aging issues, which may drive additional service-life extension efforts. To mitigate challenges that arise, there is ongoing coordination between the ALCM and Long-Range Stand Off program offices to develop plans to retire ALCMs as Long-Range Stand Off production is executed through full operational capability and complete deployment. To mitigate challenges with support equipment, supportability trades are being conducted for the launcher and pylon service-life extension, and a gap analysis is being conducted to identify components, processes, and procedures that need to be modified to ensure service life through 2030. According to Air Force officials, maintainers are looking for ways to be proactive in maintaining support equipment and identifying future issues before parts break, as they are doing for the missile itself. Through the Automatic Test Systems program office, the Electronic System Test Set is also encountering aging and supportability issues that are being addressed through multiyear technical insertion projects. Additionally, predicting new effects of aging on service life grows increasingly challenging as 2030 approaches. The Ohio-class SSBNs constitute the sea-based leg of the strategic triad. Each SSBN is capable of carrying and launching 20 D-5 Trident submarine-launched ballistic missiles, which can deliver multiple nuclear warheads. The first Ohio-class SSBN, the USS Ohio, entered service in 1981. The last Ohio-class SSBN, the USS Louisiana, entered service in 1997. The Navy maintains a fleet of 14 Ohio-class SSBNs. Eight of the SSBNs are deployed in the Pacific Ocean, homeported in Bangor, Washington, and six are deployed in the Atlantic, homeported in Kings Bay, Georgia. According to a DOD Inspector General report, in a 1998 memorandum from the Commander of the Naval Sea Systems Command to the Chief of Naval Operations, the Navy documented its decision to extend the original 30-year service life of the Ohio-class SSBNs to 42 years. The report noted that this decision was supported by a Navy- directed study led by the manufacturer of the Ohio-class, General Dynamics Electric Boat Division, which determined that extending the service life of the Ohio-class SSBNs to 42 years was technically feasible. Subsequently, in a 2017 memorandum from the Commander of the Naval Sea Systems Command to the Program Executive Office for Submarines, the Commander stated that extensions beyond 2042 were not technically feasible. However, Navy officials said that they are beginning to consider options in case the replacement program, the Columbia-class SSBN, is delayed. As we previously reported, Navy officials noted that the service has never operated a nuclear-powered submarine for as long as 42 years. The Navy plans to replace the 14 Ohio-class SSBNs with 12 Columbia- class SSBNs. The first of the Ohio-class SSBNs is scheduled to be retired from active service in 2027. The remaining Ohio-class SSBNs will be retired at a rate of one per year, with the last one exiting service in 2040 (see fig. 11). According to Navy officials, they do not have a contingency plan in case the Columbia-class SSBN acquisition dates are delayed. However, they said that the fact that 14 Ohio-class SSBNs are being replaced by 12 Columbia-class SSBNs provides some extra time for replacement in case Columbia is delayed. Specifically, there will be an estimated 2 years between when the last Columbia-class SSBN is delivered and the last Ohio-class SSBN is retired. Navy officials also said that they are trying to gather the necessary data to lay the ground work now to be able to make engineering decisions in 10 years about the feasibility of sustaining the Ohio-class SSBNs in the event that the Columbia-class is delayed. The Navy is experiencing challenges in sustaining the Ohio-class SSBN through its planned 42-year service life. According to Navy officials, since the Ohio will be in service longer than expected, the Navy is encountering parts that need replacement that were not originally intended to be replaced. There is no industrial base of suppliers to support the replacement of some of these parts. In addition, the overall amount of maintenance required for the SSBNs increases as they age. According to Navy officials, both of these issues contribute to diminishing manufacturing sources and material shortages for the Ohio-class SSBNs. According to May 2019 congressional testimony by the Director of the Navy’s Strategic Systems Programs, the D-5 Trident submarine-launched ballistic missile has also been deployed for longer than its original planned service life. Specifically, it has been deployed for over 25 years, and the Navy now plans to operate the D-5 for over 50 years total. It has undergone service-life extension programs and is operating on new rocket motors. However, according to the Director’s testimony, this will be more than double the historical service life of any previous sea-based strategic deterrent system. Engineered refueling overhauls—major maintenance periods that occur once during an SSBN’s life—have been completed for all except the last two Ohio-class SSBNs to enter service, the USS Wyoming and the USS Louisiana. The USS Wyoming is currently undergoing its overhaul and is scheduled to complete it in July 2020. The USS Louisiana was scheduled to begin its overhaul in September 2019 and complete it in April 2022. According to Navy officials, in the past SSBNs completing refueling overhauls have cannibalized parts from SSBNs that are beginning to be overhauled. The final Ohio-class SSBN to undergo an overhaul, the USS Louisiana, will not have that option, because there will be no other SSBNs from which to cannibalize parts. However, these officials noted that they have not encountered any insurmountable issues thus far in planning the Louisiana’s overhaul. The DOD Inspector General reported in June 2018 that the Navy did not have a contingency plan in the event that the Columbia-class is delivered late. The Navy has identified a number of efforts under way to ensure that it reduces risks in both the maintenance of the current Ohio-class SSBN and the acquisition schedule of the Columbia-class SSBN. However, as we reported in December 2017 and again in March 2019, the Columbia-class program is facing more risks than its predecessors from its aggressive and concurrent schedule as a result of the continued and pressing need for it to meet the Navy nuclear deterrent requirements. The first Ohio-class SSBN is scheduled to be retired in 2027, and another is to follow each year until 2040. The first Columbia-class SSBN is scheduled to enter service in fiscal year 2031, and another is to follow each year thereafter. We have previously reported that the Navy also plans to increase investment in its SSBN maintenance facilities, equipment, and workforce to improve the execution of SSBN maintenance. According to Navy officials, they have several strategies to combat diminishing manufacturing sources and material shortages. For example, the Ohio program office has made “life of type” purchases for some parts for which the industrial base cannot meet the demand. In other words, according to program officials, the program office purchases in one contract enough of that part to last for the entire life of the SSBN—a large enough order to make it worth the time and cost for a manufacturer to produce the parts. According to the officials, another solution is to retrofit the pieces being used to build the Columbia-class SSBNs to support the needs for the Ohio-class SSBNs. For example, the Navigation Process Unit was retrofitted from the Columbia to use on the Ohio. This allows the Navy to purchase these components from manufacturers who will already be making them for the Columbia. The Navy has initiated major modernizations on a number of systems on the Ohio to upgrade those systems with new capabilities. According to Navy officials, modernization efforts are being planned for navigation, radio, and electronic communications systems, among others. The Navy has also initiated a program to refurbish and extend the service lives of D- 5 Trident submarine-launched ballistic missiles to about 2040. As Columbia-class SSBNs begin to replace Ohio-class SSBNs, refurbished D-5s carried by retiring Ohio-class SSBNs will be transferred to new Columbia-class SSBNs. Columbia-class SSBNs will continue to be armed with these refurbished D-5s until about 2040, at which time the D-5s are to be replaced by a successor submarine-launched ballistic missile. According to Navy officials, maintaining one strategic weapon system configuration during the transition to Columbia is beneficial from a cost, performance, and risk-reduction standpoint. In 2018, the DOD Office of Inspector General reported that the Secretary of the Navy and the Chief of Naval Operations have formally designated strategic nuclear deterrence as the Navy’s top priority. According to the report, as a result, the Navy has reduced the time required for engineered refueling overhauls of SSBNs, increased workforce size at shipyards, accelerated and improved shipyard workforce training, and improved SSBN maintenance procedures and schedules. However, while the Navy was able to reduce the time required for its last two engineered refueling overhauls, it has not hit the target of 27 months since 2010. In addition, according to officials the Navy has created two working groups—the SSBN/Guided Missile Nuclear Submarine Working Group and the Trident Coordination Group—to monitor and mitigate Ohio-class sustainment and maintenance challenges. Joseph W. Kirschbaum, (202) 512-9971 or kirschbaumj@gao.gov In addition to the contact named above, key contributors to this report were Penney Harwell Caramia, Assistant Director; R. Scott Fletcher; Jonathan Gill; Susannah Hawthorne; Brent Helt; Joanne Landesman; Amie Lesser; K. Ryan Lester; Ned Malone; Gabrielle Matuzsan; and Michael Shaughnessy. Nuclear Weapons Sustainment: Fiscal Year 2018 Nuclear Forces Budget Estimates. GAO-19-127R. Washington, D.C.: November 2, 2018. Defense Nuclear Enterprise: DOD Continues to Address Challenges but Needs to Better Define Roles and Responsibilities and Approaches to Collaboration. GAO-19-29. Washington, D.C.: November 1, 2018. Defense Nuclear Enterprise: Processes to Monitor Progress on Implementing Recommendations and Managing Risks Could Be Improved. GAO-18-144. Washington, D.C.: October 5, 2017. Nuclear Weapons: DOD Assessed the Need for Each Leg of the Strategic Triad and Considered Other Reductions to Nuclear Force. GAO-16-740. Washington, D.C.: September 22, 2016. Defense Nuclear Enterprise: DOD Has Established Processes for Implementing and Tracking Recommendations to Improve Leadership, Morale, and Operations. GAO-16-597R. Washington, D.C.: July 14, 2016. Nuclear Weapons Council: Enhancing Interagency Collaboration Could Help with Implementation of Expanded Responsibilities. GAO-15-446. Washington, D.C.: May 21, 2015.", "summary": "In 2014, the Secretary of Defense directed two reviews of DOD's nuclear enterprise. These reviews made recommendations to address problems with leadership, organization, investment, morale, policy, and procedures, as well as other shortcomings that adversely affected the nuclear deterrence mission. In 2015, DOD conducted a review focused on NC3 systems, which resulted in additional recommendations to improve NC3. The National Defense Authorization Act for Fiscal Year 2017 includes a provision for GAO to review DOD's processes for addressing these recommendations. This report addresses the extent to which DOD has made progress in (1) the implementation and tracking of the recommendations from the 2014 and 2015 nuclear enterprise reviews and (2) addressing sustainment and maintenance-related challenges and planning for the continued sustainment and maintenance of existing defense nuclear enterprise systems. GAO reviewed documents and interviewed DOD officials. This is a public version of a classified report that GAO issued in October 2019. Information that DOD deemed classified has been omitted. The Department of Defense (DOD) continues to make progress in implementing recommendations to improve the nuclear enterprise. These recommendations stemmed from DOD's 2014 internal and independent nuclear enterprise reviews, a U.S. Strategic Command 2014 memorandum, and an internal DOD 2015 report on nuclear command, control, and communications (NC3). Since GAO last reported—in November 2018—an additional five of the 247 sub-recommendations from the 2014 reviews have been closed; 91 remain open. In that time, DOD has also closed two more of the 13 recommendations from the 2015 review; six remain open. However, the key tracking tools DOD uses to provide visibility on the status of the recommendations do not provide current and complete information. For example, for those items that are behind schedule, many of the expected completion dates have not been updated to reflect when the items are now expected to be completed. The current DOD guidance for tracking the recommendations' status does not include a specific requirement to keep the information current in the tracking tools. Until DOD addresses these issues, it will not have a complete and accurate picture of when tasks are expected to be finished, whether progress is being made, whether efforts have stalled, or if there are other challenges. Ensuring that there is current and complete information regarding enduring recommendations would also help inform DOD's effort to monitor the health of the defense nuclear enterprise. DOD and the military services are experiencing challenges related to sustainment and maintenance of nuclear weapon systems and have ongoing and planned initiatives intended to mitigate these challenges. All of the systems we reviewed have been operational since before 1998, making these systems at least 22 years old (see figure). The age of the systems has resulted in maintenance and supply issues. For example, the Ohio -class submarine has experienced the failure of parts that were not originally intended to be replaced. DOD and the services have ongoing and planned efforts to mitigate these challenges, such as improving maintenance processes and sources of supply. GAO is making two recommendations for DOD to update guidance to require DOD components to keep information on recommendations current and complete. In written comments on the classified report, DOD concurred with these recommendations.", "document_type": "gao"}
{"report": "Drugs sold in the United States—including active pharmaceutical ingredients (APIs) and finished dosage forms—are manufactured throughout the world. According to FDA, as of August 2019 about 70 percent of establishments manufacturing APIs and more than 50 percent of establishments manufacturing finished drugs for the U.S. market were located overseas. As of March 2019, FDA data showed that India and China had the most manufacturing establishments shipping drugs to the United States, with about 40 percent of all foreign establishments in these two countries. (See fig. 1.) FDA is responsible for overseeing the safety and effectiveness of all drugs marketed in the United States, regardless of where they are manufactured. Drugs manufactured overseas must meet the same statutory and regulatory requirements as those manufactured in the United States. FDA’s Center for Drug Evaluation and Research (CDER) establishes standards for the safety, quality, and effectiveness of, and manufacturing processes for, over-the-counter and prescription drugs. CDER requests that FDA’s Office of Regulatory Affairs (ORA) inspect both domestic and foreign establishments to ensure that drugs are produced in conformance with applicable laws of the United States, including current good manufacturing practice (CGMP) regulations. FDA investigators generally conduct three main types of drug manufacturing establishment inspections: preapproval inspections, surveillance inspections, and for-cause inspections, as described in table 1. At times, FDA may conduct an inspection that combines both preapproval and surveillance inspection components in a single visit to an establishment. FDA uses multiple databases to select foreign and domestic establishments for surveillance inspections, including its registration database and inspection database. Because the establishments are continuously changing as they begin, stop, or resume marketing products in the United States, CDER creates a monthly catalog of establishments. The establishments in the catalog are prioritized for inspection twice each year. In our 2008 report we found that, because of inaccurate information in FDA’s databases, the agency did not know how many foreign drug establishments were subject to inspection. For example, some establishments included in FDA’s registration database may have gone out of business and did not inform FDA that they had done so, or they did not actually manufacture drugs for the U.S. market. In our report, we noted that some foreign establishments may register because, in foreign markets, registration may erroneously convey an “approval” or endorsement by FDA, when in fact the establishment may never have been inspected by FDA. We recommended that FDA take steps to improve the accuracy of this registration information. In our 2010 and 2016 reports we found that FDA had taken steps to improve the accuracy and completeness of information in its catalog of drug establishments subject to inspection, such as using contractors to conduct site visits to verify the existence of registered foreign establishments and confirm that they manufacture the products that are recorded in U.S. import records. To prioritize establishments for surveillance inspections, CDER applies a risk-based site selection model to its catalog of establishments to identify those establishments (both domestic and foreign) that, based on the characteristics of the drugs being manufactured, pose the greatest potential public health risk should they experience a manufacturing defect. This model analyzes several factors, including inherent product risk, establishment type, inspection history, and time since last inspection, to develop a list of establishments that FDA considers to be a priority for inspection. Through this process, CDER develops a ranked list of foreign and domestic establishments selected for inspection that is submitted to ORA. To be efficient with its resources, ORA staff may shift the order of establishments to be inspected on CDER’s prioritized list based on geographic proximity to other planned inspection trips, according to FDA officials. Investigators from ORA and, as needed, ORA laboratory analysts with certain expertise are responsible for inspecting drug manufacturing establishments. FDA primarily relies on three groups of investigators to conduct foreign inspections: ORA investigators based in the United States, who primarily conduct domestic drug establishment inspections but may sometimes conduct foreign inspections. Members of ORA’s dedicated foreign drug cadre, a group of domestically based investigators, who exclusively conduct foreign inspections. Investigators assigned to and living in the countries where FDA has foreign offices, who include both staff based in the foreign offices full time and those on temporary duty assignment to the foreign offices. FDA began opening offices around the world in 2008 to obtain better information on the increasing number of products coming into the United States from overseas, to build relationships with foreign stakeholders, and to perform inspections. FDA full-time foreign office staff are posted overseas for 2-year assignments. FDA staff can also be assigned to the foreign offices on temporary duty assignments for up to 120 days. In fiscal year 2019, there were full-time and temporary duty drug investigators assigned to FDA foreign offices in China and India. FDA’s process for determining whether a foreign establishment complies with CGMPs involves both CDER and ORA. During an inspection, ORA investigators are responsible for identifying any significant objectionable conditions and practices and reporting these to the establishment’s management. Investigators suggest that the establishment respond to FDA in writing concerning all actions taken to address the issues identified during the inspection. Once ORA investigators complete an inspection, they are responsible for preparing an establishment inspection report to document their inspection findings. Inspection reports describe the manufacturing operations observed during the inspection and any conditions that may violate U.S. statutes and regulations. Based on their inspection findings, ORA investigators make an initial recommendation regarding whether regulatory actions are needed to address identified deficiencies using one of three classifications: no action indicated (NAI); voluntary action indicated (VAI); or official action indicated (OAI). Inspection reports and initial classification recommendations for regulatory action are to be reviewed within ORA. For inspections classified as OAI—where ORA identified serious deficiencies—such inspection reports and classification recommendations are to be reviewed within CDER. CDER is to review the ORA recommendations and determine whether regulatory action is necessary. CDER also is to review inspection reports and initial classification recommendations for all for-cause inspections, regardless of whether regulatory action is recommended by ORA. According to FDA policy, inspections classified as OAI may result in regulatory action, such as the issuance of a warning letter. FDA issues warning letters to those establishments manufacturing drugs for the U.S. market that are in violation of applicable U.S. laws and regulations and may be subject to enforcement action if the violations are not promptly and adequately corrected. In addition, warning letters may notify foreign establishments that FDA may refuse entry of their drugs at the border or recommend disapproval of any new drug applications listing the establishment until sufficient corrections are made. FDA may take other regulatory actions if it identifies serious deficiencies during the inspection of a foreign establishment. For example, FDA may issue an import alert, which instructs FDA staff that they may detain drugs manufactured by the violative establishment that have been offered for entry into the United States. In addition, FDA may conduct regulatory meetings with the violative establishment. Regulatory meetings may be held in a variety of situations, such as a follow-up to the issuance of a warning letter to emphasize the significance of the deficiencies or to communicate documented deficiencies that do not warrant the issuance of a warning letter. In December 2019, we found that from fiscal year 2012 through fiscal year 2016, the number of FDA foreign drug manufacturing establishment inspections increased but then began to decline after fiscal year 2016. In fiscal year 2015, the total number of foreign inspections surpassed the number of domestic inspections for the first time. However, from fiscal year 2016 through 2018, both foreign and domestic inspections decreased—by about 10 percent and 13 percent, respectively. FDA officials attributed this decrease to vacancies in the number of investigators available to conduct inspections (which we discuss later in this testimony statement) and to inaccurate data used to select establishments for inspection in fiscal years 2017 and 2018. Despite steps taken to improve the accuracy and completeness of FDA data on foreign establishments, in December 2019, we found that the data challenges we identified in our 2008 report continue to make it difficult for FDA to accurately identify establishments subject to inspection. Specifically, since 2017, FDA had pursued an initiative to inspect approximately 1,000 foreign establishments that lacked an inspection history. As of November 2019, officials said all of these establishments had either been inspected or were determined not to be subject to inspection because it was determined they did not actually manufacture drugs for the U.S. market, or had not recently shipped drugs to the United States. However, officials told us that this effort contributed to the decline in the number of foreign inspections conducted because of how data inaccuracies affected the process for selecting establishments for inspection. Specifically, after selecting uninspected foreign establishments for inspection, FDA determined that a sizeable percentage of these establishments were not actually subject to inspection (e.g., about 40 percent of those assigned to the China Office in fiscal years 2017 and 2018). These foreign establishments were thus removed from the list for inspection for the given year. FDA officials told us that the next highest priority establishments identified through the risk- based model to replace those establishments were domestic establishments. As a result, the number of foreign establishments actually inspected decreased. As part of our ongoing work, we plan to examine the accuracy and completeness of information FDA maintains about foreign establishments and the application of its risk-based site selection process. We further found that FDA continued to conduct the largest number of foreign inspections in India and China, with inspections in these two countries representing about 40 percent of all foreign drug inspections from fiscal year 2016 through 2018. (See table 2.) In addition to India and China, the rest of the countries in which FDA most frequently conducted inspections has generally been the same since our 2008 report. Since we last reported on this issue, FDA announced in March 2020 that, due to COVID-19, it was postponing most inspections of foreign manufacturing establishments. Only inspections deemed mission-critical would still be considered on a case-by-case basis. According to the announcement, while the pandemic has added new complexities, FDA has other tools to ensure the safety of the U.S. drug supply. For example, FDA announced that it was evaluating additional ways to conduct its inspectional work that would not jeopardize public safety and would protect both the establishments and the FDA staff. Such ways, according to FDA, could include reviewing the compliance histories of establishments, using information shared by foreign regulatory partners, and evaluating establishment records in lieu of an onsite inspection. In addition, the FDA Commissioner’s May 11, 2020 press statement stated that while FDA’s regulatory oversight is vital to the long-term health of America, product safety and quality are ultimately the establishment’s responsibility. Most firms, according to FDA, strive to reliably provide quality products and maintain the integrity of the supply chain. However, the lack of foreign inspections removes a critical source of information about the quality of drugs manufactured for the U.S. market. It is not clear when FDA will resume regular inspections. The agency originally announced the postponement would last through April 2020. However, on May 11, 2020, it stated that the postponement would continue. According to FDA, the agency continues to closely monitor the global situation. FDA stated that it remains in contact with its foreign regulatory counterparts and would work with the Centers for Disease Control and Prevention to develop a process that would govern how and where to return to on-site facility inspections as conditions improve. In December 2019, we found that each year from fiscal year 2012 through 2018 at least 50 percent of FDA’s foreign inspections were surveillance inspections. In contrast to preapproval inspections, surveillance inspections are used to ensure drugs already on the market are manufactured in compliance with FDA regulations. In recent years, the proportion of foreign surveillance inspections has increased. As figure 2 shows, in fiscal year 2012, 56 percent of foreign inspections were surveillance-only inspections; in contrast, from fiscal year 2016 through 2018, about 70 percent of foreign inspections were surveillance-only, which was comparable to the percentage for domestic inspections during that period. This is a significant increase from the 13 percent of foreign inspections that were surveillance-only when we made our 2008 recommendation that FDA inspect foreign establishments at a comparable frequency to their domestic counterparts (85 percent of which were surveillance-only at that time). In our December 2019 testimony, we also reported that FDA implemented changes to its foreign drug inspection program since our 2008 report that may have contributed to the increase in surveillance inspections. Prior to 2012, FDA was required to inspect domestic establishments that manufacture drugs marketed in the United States every 2 years, but there was no similar requirement for foreign establishments. As a result, and as we reported in 2008, foreign inspections were often preapproval inspections driven by pending applications for new drugs. FDA thus conducted relatively few surveillance-only inspections to monitor the ongoing compliance of establishments manufacturing drugs that were already on the market, with just 13 percent of foreign inspections conducted for surveillance purposes at the time of our 2008 report. However, in 2012, the Food and Drug Administration Safety and Innovation Act eliminated the 2-year requirement for domestic inspections, directing FDA to inspect both domestic and foreign establishments on a risk-based schedule determined by an establishment’s known safety risks, which was consistent with our 2008 recommendation. In December 2019, we found that from fiscal year 2012 through 2018, FDA identified deficiencies in approximately 64 percent of foreign drug manufacturing establishment inspections (3,742 of 5,844 inspections). This includes deficiencies necessitating a classification of VAI, or the more serious OAI, as described in the text box. Based on their inspection findings, FDA investigators make an initial recommendation regarding the classification of each inspection: No action indicated (NAI) means that insignificant or no deficiencies were identified during the inspection. Voluntary action indicated (VAI) means that deficiencies were identified during the inspection, but the agency is not prepared to take regulatory action, so any corrective actions are left to the establishment to take voluntarily. Official action indicated (OAI) means that serious deficiencies were found that warrant regulatory action. About 59 percent of domestic inspections (3,702 out of 6,291) identified deficiencies during this time period. (See fig. 3.) This proportion is similar to what we found when we last looked at this issue in 2008, when FDA identified deficiencies in about 62 percent of foreign inspections and 51 percent of domestic inspections from fiscal years 2002 through 2006. Our December 2019 analysis showed that serious deficiencies identified during foreign drug inspections classified as OAI—which represented 8 percent of inspections from fiscal year 2012 through 2018—include CGMP violations such as those related to production and process controls, equipment, records and reports, and buildings and facilities. For example: Failure to maintain the sanitation of the buildings used in the manufacturing processing, packing, or holding of a drug product (21 C.F.R. § 211.56(a) (2019)). At an establishment in India producing finished drug products, the investigator reported observing a live moth floating in raw material used in the drug production, and that the facility staff continued to manufacture the drug products using the raw material contaminated by the moth, despite the investigator pointing out its presence. Failure to perform operations relating to the manufacture, processing, and packing of penicillin in facilities separate from those used for other drug products (21 C.F.R. § 211.42 (d) (2019)). At an establishment in Turkey that manufactured penicillin and other drugs, the investigator reported that the manufacturer had detected penicillin outside the penicillin manufacturing area of the establishment multiple times. According to FDA, penicillin contamination of other drugs presents great risk to patient safety, including potential anaphylaxis (even at extremely low levels of exposure) and death. Some investigators who conduct foreign inspections expressed concern with instances in which ORA or CDER reviewers reclassified the investigator’s initial inspection classification recommendations of OAI to the less serious classification of VAI. In December 2019, we found that FDA’s foreign inspection workforce had staff vacancies, which FDA officials said contributed to the recent decline in inspections. As previously mentioned, FDA used multiple types of staff resources to conduct foreign drug inspections—including ORA investigators based in the United States, members of ORA’s dedicated foreign drug cadre based in the United States, and investigators assigned to FDA’s foreign offices. However, we found that each of these groups had current vacancies. At the time of our December testimony, FDA officials told us that the agency was trying to fill vacancies in each of these groups, but the lower staff numbers may limit FDA’s ability to conduct more foreign inspections. ORA investigators based in the United States. This group of investigators conducted the majority of foreign inspections; about 76 percent of foreign inspections in fiscal year 2018 involved an ORA investigator based in the United States who conducts both foreign and domestic inspections. FDA officials said that the more experienced investigators from this group are expected to conduct three to six foreign inspections per year, and investigators hired using generic drug user fees are expected to inspect nine to 12 foreign establishments per year. As of June 2019, there were 190 investigators eligible to conduct foreign drug inspections, but officials said that as of November 2019, the agency had an additional 58 vacancies in this group. At the time of our December 2019 testimony, officials said that the agency was in the process of hiring 26 ORA investigators based in the United States to fill these vacancies, with 32 vacancies remaining. FDA officials attributed the vacancies to multiple factors: investigator retirements, investigator movement to other parts of FDA, and the need to hire to additional investigator positions using generic drug user fees. Officials also said that a reorganization within ORA led to a reduced number of investigators who conduct drug manufacturing establishment inspections. While FDA had recently filled several of the vacancies, officials told us that new investigators are not typically used for foreign inspections until they have been with the agency for 2 to 3 years. ORA dedicated foreign drug cadre. About 15 percent of foreign inspections in fiscal year 2018 involved an investigator from ORA’s dedicated foreign drug cadre—a group of ORA investigators based in the United States who exclusively conduct foreign inspections. FDA officials said that members of the cadre are expected to conduct 16 to 18 foreign inspections each year. According to FDA, the cadre had 20 investigators in 2012 and 15 investigators in 2016. However, the cadre had only 12 investigators as of November 2019, out of 20 available slots. At the time of our December 2019 testimony, FDA officials told us that the agency was attempting to fill these positions from the current ORA investigator pool, but officials were not confident that all 20 slots would be filled. Investigators assigned to FDA’s foreign offices. Approximately 7 percent of foreign inspections in fiscal year 2018 involved investigators from FDA’s foreign offices. The investigators conducting these inspections were those based in the China and India foreign offices—the countries where most drug inspections occur—and also included those investigators on temporary duty assignment to these offices. According to FDA officials, these investigators are expected to conduct 15 foreign inspections each year. We have noted high vacancy rates for these foreign offices in past reports. While these vacancy rates have decreased over time, vacancies persist. As of November 2019, FDA’s China office had three of 10 drug investigator positions vacant (a 30 percent vacancy rate), while FDA’s India office had two of six drug investigator positions vacant (a 33 percent vacancy rate). In our December 2019 testimony, we reported that FDA had taken steps to address vacancies in the foreign offices but continued to face challenges. In our 2010 report, we recommended that FDA develop a strategic workforce plan to help recruit and retain foreign office staff. FDA agreed with our recommendation and released such a plan in March 2016, but the long-standing vacancies in the foreign offices raise questions about its implementation. FDA officials told us that one challenge in recruiting investigators for the foreign offices is that well- qualified investigators for those positions need foreign inspection experience. For example, an official in FDA’s India office told us that foreign inspections can be challenging, and the India office does not have the resources to develop or train new investigators. Therefore, it is important to recruit investigators who have experience conducting foreign inspections, and such investigators are recruited from ORA. Thus, vacancies in the other two groups of investigators can influence the number of staff available to apply for positions in the foreign offices. Further, according to FDA officials, after employees have accepted an in- country position, the agency can experience significant delays before they are staffed in the office due to delays in processing assignments. For example, an official in FDA’s India office said that investigators need to complete a week-long security training program and must obtain the security clearance needed to work at the U.S. Embassy, which is where FDA’s foreign office is located. However, the official told us that there are limited availabilities for that training, and background checks for security clearances can take time. According to this official, FDA investigators did not usually receive first priority for the training. FDA estimated that it can take as little as 1 month to over 2 years for an investigator to clear background and medical checks and arrive at a foreign office. For example, an investigator in FDA’s China office told us that as a result of these requirements and other issues, it took nearly 2 years for the investigator to arrive at the office after FDA had accepted the investigator’s application. According to FDA’s own strategic workforce plan for the foreign offices, these types of delays have resulted in staff changing their decision after accepting a position in the foreign offices. In December 2019, we found that FDA continues to face unique challenges when inspecting foreign drug establishments that raise questions about whether these inspections are equivalent to domestic inspections. Specifically, based on our interviews with drug investigators in the dedicated foreign drug cadre and in FDA’s foreign offices in China and India, we identified four challenge areas related to conducting foreign inspections, which are described below. Of the four challenge areas identified, three areas—preannouncing inspections, language barriers, and lack of flexibility—were also raised in our 2008 report. Preannouncing Inspections. As we reported in 2008, the amount of notice FDA generally gives to foreign drug establishments in advance of an inspection is different than for domestic establishments. Drug establishment inspections performed in the United States are almost always unannounced, whereas foreign establishments generally receive advance notice of an FDA inspection. According to FDA officials, FDA is not required to preannounce foreign inspections. However, they said the agency generally does so to avoid wasting agency resources, obtain the establishment’s assistance to make travel arrangements, and ensure the safety of investigators when traveling in country. In our December 2019 testimony, we found that FDA does conduct some unannounced foreign inspections, particularly if the investigators conducting the inspection are based in FDA’s foreign offices. However, FDA officials told us that FDA does not have data on the frequency with which foreign drug inspections are unannounced, nor the extent to which the amount of notice provided to foreign establishments varies. According to FDA officials, this is because FDA does not have a data field in its database to systematically track this information. However, the officials estimated that the agency generally gives 12 weeks of notice to establishments that investigators are coming when investigators are traveling from the United States. While investigators in FDA’s China and India offices do conduct unannounced or short-notice inspections, these staff do not perform most of the inspections in these countries. (See table 3.) Our work indicated that preannouncing foreign inspections can create challenges and raises questions about the equivalence to domestic inspections. Of the 18 investigators we interviewed, 14 said that there are downsides to preannouncing foreign inspections, particularly that providing advance notice gives foreign establishments the opportunity to fix problems before the investigator arrives. For example, when an inspection is preannounced, it gives establishments time to clean up their facility and update or generate new operating procedures ahead of the inspection. However, establishments are expected to be in a constant state of compliance and always ready for an FDA inspection, and several investigators told us seeing the true day-to-day operating environment for an establishment is more likely during an unannounced inspection. Of the 18 investigators we interviewed for our December 2019 testimony, 12 said that unannounced inspections are generally preferable to preannounced inspections. One investigator told us that, although they believed the best way to ensure industry compliance to CGMPs was for establishments to not know when FDA is coming for an inspection, there was no data that would allow the agency to evaluate whether unannounced inspections were better than preannounced inspections. In addition, some investigators told us that it was still possible to identify serious deficiencies during preannounced inspections. For example, investigators could still identify issues by looking at the firm’s electronic records, including time-stamped data relating to the creation, modification, or deletion of a record. Three investigators also told us that in some cases there could be benefits to announcing inspections in advance. For example, for preapproval inspections, announcing the inspection in advance gives the establishment time to organize the documentation and staff needed to conduct the inspection. Language Barriers. Work for our December 2019 testimony indicated that language barriers—which we first reported as a challenge to conducting foreign inspections in our 2008 report—can add time to inspections and raise questions about the accuracy of information FDA investigators collect and thus about the equivalence to domestic inspections. FDA generally does not send translators on inspections in foreign countries. Rather, investigators rely on the drug establishment to provide translation services, which can be an English-speaking employee of the establishment being inspected, an external translator hired by the establishment, or an English-speaking consultant hired by the establishment. Of the 18 investigators that we interviewed, 14 said that language barriers can be a challenge to conducting foreign inspections and were especially challenging in parts of Asia, including China and Japan. Seven investigators told us this issue was less of a challenge for inspections conducted in other foreign countries, including India and countries in Europe, because workers at establishments in these countries were more likely to speak English, and documentation was also more likely to be in English. Investigators told us that compared to domestic inspections, it can be more challenging and take longer to complete typical inspection- related activities, such as reviewing documentation or interviewing employees, if the investigator needed to rely on translation. Fourteen of the 18 investigators we interviewed said that there can be concerns related to relying on establishment staff and independent translators. Specifically, 11 investigators told us there can be uncertainties regarding the accuracy of the information being translated, particularly when investigators rely on the translation provided by an employee of the establishment being inspected. For instance, one investigator said that there was more risk of conflict of interest if the establishment used its own employees to translate. Another investigator said that they went to a drug establishment in China that told FDA it had English-speaking employees to translate the inspection, but that was not the case, and the investigator had to use an application on their phone to translate the interviews. In addition, the firm representative providing the translation may be someone who does not have the technical language needed, which can make it harder to communicate with firm staff and facilitate the inspection. One investigator told us that the independent translators hired by firms were sometimes consultants and, in those instances, it can seem like the consultants are coaching the firm during the inspection. FDA officials told us that when they conduct unannounced for-cause inspections in China, investigators bring locally employed staff who work in FDA’s China office to act as translators. The investigators we interviewed said that in such instances, they valued knowing that the translation they were getting was accurate. However, FDA does not have the resources to provide locally employed staff on every inspection, according to an FDA official. Lack of Flexibility. Work for our December 2019 testimony indicated that, as we first reported in 2008, the overseas travel schedule can present unique challenges for FDA’s domestically based investigators— including both ORA investigators and members of the dedicated foreign dug cadre—who conduct the majority of foreign inspections. Eight of the 12 dedicated foreign drug cadre investigators that we interviewed for our December 2019 testimony told us that there is little flexibility to extend foreign inspections conducted by domestically based investigators, because the inspections they conduct on an overseas trip are scheduled back-to-back in 3-week trips that may involve three different countries. This raises questions about their equivalence to domestic inspections. For instance, extending one inspection would limit the amount of time the investigator has to complete their other scheduled inspections, some investigators told us. In addition, eight investigators told us that domestically based staff are generally unable to extend the total amount of time spent on an overseas trip—one investigator told us that an investigator would have to find something really bad to justify an extension. In contrast, FDA officials told us that inspections conducted by in-country investigators in China or India, and domestic inspections in the United States, are generally scheduled one at a time and can thus more easily be extended if the investigator needs additional time to pursue potential deficiencies. However, in-country investigators are not involved in the majority of inspections conducted in China or India. Three investigators from the dedicated foreign drug cadre told us that when they travel overseas, they adjust their inspection approach to help ensure they finish foreign inspections on time. For example, one investigator told us that an investigator may start the inspection in an area of the establishment that was noted as having issues during the last inspection. However, one investigator said that sometimes it is not possible to cover everything in depth during a foreign inspection. Another investigator told us that they focus on identifying the most serious issues during a foreign inspection, and that less serious issues can be identified in the establishment inspection report for reference in the next inspection. Five investigators also noted that they work long hours during their inspection to ensure they can complete the needed work. While FDA may assign more than one investigator to an inspection to complete needed work, one investigator said that FDA does not usually assign more than one person to an inspection because investigators are expected to have the experience to conduct inspections by themselves. FDA data show that from fiscal years 2012 through 2018, the majority of both foreign and domestic inspections were conducted by one person— 77 percent and 66 percent, respectively. Post-Inspection Classification Process. According to FDA officials, starting in fiscal year 2018, FDA implemented a new post-inspection classification process: when an ORA investigator recommends an OAI classification following an inspection, ORA compliance is required to send that inspection report to CDER for review within 45 calendar days from the inspection closeout. Among other things, the process was intended to help ensure FDA can communicate inspection results to domestic and foreign establishments within 90 days of the inspection closeout, as committed to under the Generic Drug User Fee Amendments of 2017(GDUFA II). FDA officials told us that the changes also required an additional ORA review for foreign inspection reports to align that process with the process for domestic inspection reports. Although the 45-day reporting time frame for potential OAI classifications is a requirement for both domestic and foreign inspections, adding the additional level of review within ORA effectively shortened the amount of time investigators have to document findings for foreign inspections. Our work indicated that the post-inspection reporting time frames can create challenges for domestic investigators who conduct foreign inspections and raise questions about the equivalence to domestic inspections. Eight of the 18 investigators we interviewed for our December 2019 testimony said shortening the time for completing reports and adding a level of review has made it more challenging to meet reporting requirements, especially if serious deficiencies are identified during the inspection. Investigators told us that for a potential OAI inspection, they now need to send the inspection report to their supervisor for endorsement within 10 days of the closeout of a foreign inspection, regardless of when the investigator’s next inspection is scheduled for, or whether the investigator has to travel from overseas back to the United States after the inspection. For example, if a domestic investigator finds serious deficiencies on the first inspection of an overseas trip—thus indicating an initial OAI classification—the investigator needs to write and send the related inspection report to the ORA supervisor for endorsement before returning home from the 3-week overseas trip to meet the required time frame. One investigator told us that, as a result of the time pressures, post-inspection reports may be less thorough, and that some inspection observations could be better supported if investigators had more time to write the reports. In conclusion, foreign manufacturing establishments continue to be a critical source of drugs for millions of Americans, and FDA inspections are a key tool to ensure the quality of these drugs. Over the years since we first examined this issue, FDA has made significant changes to adapt to the globalization of the pharmaceutical supply chain and has greatly increased the number of inspections it conducts of foreign establishments. However, we found in December 2019 that the agency faced many of the same challenges overseeing foreign establishments that we identified over the last two decades. These included inspector vacancies and unique challenges when inspecting foreign drug establishments that raised questions about the equivalence of those inspections to domestic inspections. Since then, the outbreak of COVID- 19 has added a layer of complexity. It also further highlights the global nature of our pharmaceutical supply chain. Chairman Grassley, Ranking Member Wyden, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Mary Denigan-Macauley, Director, Health Care at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are William Hadley (Assistant Director); Derry Henrick (Analyst-in- Charge); Katherine L. Amoroso; George Bogart; Zhi Boon; Rebecca Hendrickson; John Lalomio; Gail-Lynn Michel; Laurie Pachter; and Vikki Porter. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The outbreak of COVID-19 has called greater attention to the United States' reliance on foreign drug manufacturers and further highlighted the importance of ensuring a safe pharmaceutical supply chain. Much of the manufacturing of drugs for treating COVID-19 occurs overseas, which is also true of the majority of other drugs marketed in the United States. While the volume of drugs manufactured overseas for the U.S. market is not fully known, FDA reports that about 70 percent of establishments manufacturing active ingredients and more than 50 percent of establishments manufacturing finished drugs for the U.S. market were located overseas, as of August 2019. FDA is responsible for overseeing the safety and effectiveness of all drugs marketed in the United States, regardless of where they are produced, and conducts inspections of both foreign and domestic drug manufacturing establishments. GAO has had long-standing concerns about FDA's ability to oversee the increasingly global pharmaceutical supply chain, an issue highlighted in GAO's High Risk Series since 2009. In particular: GAO recommended in 2008 ( GAO-08-970 ) that FDA increase the number of inspections of foreign drug establishments. GAO found in 2010 ( GAO-10-961 ) that FDA continued to conduct relatively few foreign inspections than domestic inspections. GAO found in 2016 ( GAO-17-143 ) that FDA was conducting more of these foreign drug inspections, and GAO closed its 2008 recommendation to conduct more foreign inspections. However, GAO also reported that FDA may have never inspected many foreign establishments manufacturing drugs for the U.S. market. In addition, in the summer of 2018, FDA began announcing recalls of blood pressure medications manufactured overseas that were tainted with a potential carcinogen, raising further questions about FDA’s oversight of foreign-manufactured drugs. This statement is largely based on GAO’s December 2019 testimony ( GAO-20-262T ) and discusses 1. the number of foreign inspections FDA has conducted, 2. inspection staffing levels, and 3. challenges unique to foreign inspections. For that testimony, GAO examined FDA data from fiscal years 2012 through 2018 and interviewed investigators from FDA’s 2019 cadre of investigators (who are based in the United States but exclusively conduct foreign drug inspections) and from FDA’s foreign offices in China and India. In December 2019, GAO found that a growing number of foreign drug manufacturing inspections conducted by the Food and Drug Administration (FDA) were in China and India (43 percent in 2018), where most establishments that manufacture drugs for the United States were located. In fiscal year 2015, FDA, for the first time, conducted more foreign inspections than domestic inspections. However, from fiscal year 2016 through 2018, both foreign and domestic inspections decreased—by about 10 percent and 13 percent, respectively. FDA officials attributed the decline, in part, to vacancies among investigators available to conduct inspections. In March 2020, FDA announced that, due to Coronavirus Disease 2019 (COVID-19), it was postponing almost all inspections of foreign manufacturing establishments. While FDA has indicated it has other tools to ensure the safety of the U.S. drug supply, the lack of foreign inspections removes a critical source of information about the quality of drugs manufactured for the U.S. market. GAO also found that FDA had vacancies among each of the groups of investigators who conduct foreign inspections. FDA had 190 investigators in the United States who conduct the majority of foreign inspections, but an additional 58 positions were vacant. At the time of GAO's December 2019 testimony, FDA was in the process filling 26 of these vacancies, with 32 remaining. However, according to FDA officials, it could be 2 to 3 years before new staff are experienced enough to conduct foreign inspections. FDA also faced persistent vacancies among investigators in its foreign offices. GAO further found in December 2019 that FDA investigators identified persistent challenges conducting foreign inspections, raising questions about the equivalence of foreign to domestic inspections. Specifically, GAO found: While FDA inspections performed in the United States were almost always unannounced, FDA's practice of preannouncing foreign inspections up to 12 weeks in advance may have given manufacturers the opportunity to fix problems ahead of the inspection. Investigators from FDA's China and India offices had conducted some unannounced inspections, but these staff do not perform most of the inspections in these countries (27 percent and 10 percent, respectively). FDA was not generally providing translators on foreign inspections. Rather, FDA continued to rely on translators provided by the foreign establishments being inspected, which investigators said raised questions about the accuracy of information FDA investigators collected. For example, one investigator said there was more risk of conflict of interest if the establishment used its own employees to translate. In addition, the establishment representative providing the translation may be someone who does not have the technical language needed, which can make it harder to communicate with establishment staff and facilitate the inspection. The overseas travel schedule can present challenges for FDA's domestically based investigators, who conduct the majority of foreign inspections. Domestically based investigators told us there is little flexibility for them to extend foreign inspections during an overseas trip. The inspections they conduct on an overseas trip are scheduled back-to-back in 3-week trips and may involve three different countries. Therefore, extending one inspection would limit the amount of time the investigator has to complete their other scheduled inspections. FDA officials said that inspections conducted by investigators based in China or India (and domestic inspections in the United States) are generally scheduled one at a time and can thus more easily be extended if the investigator needs additional time to pursue potential deficiencies. However, these in-country investigators are not involved in the majority of FDA inspections conducted in China or India.", "document_type": "gao"}
{"report": "We previously found that there are more than 80 federal programs that provide aid to people with low incomes, which are administered by several federal agencies as well as state and local providers. We reported that the low-income programs were created at various times, to serve different populations, and in response to different policy issues. We also found that many of these programs provide assistance such as cash aid, food, shelter, and health care for those who have limited means or are disadvantaged in other ways, while other programs are designed to help low-income people move toward self-sufficiency through education, training, and employment services. In their current strategic plans, some agencies include goals related to supporting individuals or families to help them move towards self- sufficiency. For example, HHS has a strategic objective to “encourage self-sufficiency and personal responsibility, and eliminate barriers to economic opportunity.” Officials from HHS’s Administration for Children and Families (ACF) said they are currently updating ACF’s strategic plan and it will likely include a vision of ending multigenerational poverty through primary prevention by using a whole family—or two-generation— approach that proactively connects families to services before they are in crisis. Two-generation approaches are different from individual low-income programs because these approaches simultaneously address multiple areas, such as child and family economic supports, education, employment, health, well-being, and social capital, according to HHS. These approaches are based on findings that connect the well-being of parents to their children’s social, emotional, physical, and economic well- being. For example, research indicates that parents’ improved economic security is linked to improvements in children’s home environment, greater parental engagement in their children’s schooling, and stronger parenting skills, which may lead to improved child outcomes. Similarly, children’s well-being directly affects their parents’ ability to succeed in both school and the workplace. For example, if parents participate in a workforce training program, but cannot access safe and affordable child care, they may not be able to accept or keep the job for which they trained. Research developed by an ACF-sponsored project states that two-generation approaches are hypothesized to result in parents experiencing stronger labor force attachment or increased earnings, children improving their school readiness and academic achievement, and families increasing family functioning, community connectedness, goal-directed behavior, and executive functioning, among other potential outcomes. This approach is not a new idea. For example, Head Start programs, which started in 1965, provide early education services to low-income children while offering support to families, such as services that promote housing stability, continued education, and financial security. In addition, federal programs have supported past efforts to improve service coordination for low-income families, such as the use of one-stop centers that deliver workforce, education, and other support services at a single location. These previous efforts, however, often prioritized one generation over the other, according to researchers. Researchers also found that these previous efforts tended to not provide the intensity or duration of services needed to create change for low-income families. More recent two-generation approaches are intentionally meant to provide services for parents, children, and families in innovative ways by equally addressing the needs of children and parents using quality programs and interventions. For example, ACF is using a human- centered design approach to work across its programs to help families achieve economic independence. Human-centered design aims to create solutions from the point-of-view of families that are in need and the states that serve them and to design systems and service delivery to fit families instead of the other way around, according to ACF. These newer two- generation approaches, which aim to be higher quality and more intensive than previous efforts, are still being tested. ACF and others are currently evaluating the effectiveness of these two-generation approaches. Ten federal programs were most commonly cited by selected state and local entities as being used to serve whole families and reduce poverty (see table 1). These programs are administered by USDA, HHS, and DOL. Federal officials have reported that the 10 programs have characteristics—including the target populations, purposes, and services provided—that allow state and local entities to address multiple aspects of child and parent well-being, and these have implications for their two- generation approaches. (See appendix I for the target population, purpose, and services provided by the 10 federal programs.) Specifically: Target Populations. Consistent with two-generation approaches, many of the federal programs target low-income, needy, or at-risk families. However, we previously reported that eligibility requirements for some low-income programs vary significantly with regard to who may obtain benefits and services, how income is counted, and the maximum income applicants may have. As a result, state and local officials told us that some families who they would like to engage in two-generation approaches are not eligible for some of the federally- funded programs they use for these approaches. Purpose. The purposes of Temporary Assistance for Needy Families (TANF) and the Community Services Block Grant (CSBG) are broad and can be used to support families in multiple ways. For example, CSBG’s purposes are, among other things, to reduce poverty, revitalize low-income communities, and empower low-income individuals and families to become fully self-sufficient. In addition, according to HHS, these two broad programs allow state and local agencies to cover costs that other programs do not allow, such as salaries for staff to design the two-generation approach. Among the 23 state and local entities, officials from the three entities that reported using CSBG and seven of the 11 that reported using TANF said that they used the programs in combination with other federal programs that have more limited purposes. The other programs can be used to provide more specific supports, such as developing child care programs, increasing employment and earnings, alleviating hunger, or improving maternal and child health. Benefits or Services Provided. A range of benefits and services for both children and parents are available across the 10 federal programs, such as child care, food assistance, and job skills training. To create their two-generation approach, state and local entities can, to the extent permitted by law, combine services from multiple programs to provide a coordinated approach to addressing the needs of the entire family. In fact, according to HHS, combining services from multiple programs is common in two-generation approaches because single programs tend to cover only one type of service or may be for parents or children instead of both. In addition to the 10 most commonly cited federal programs, state and local entities reported using over 40 other federal programs to support their two-generation approaches (see appendix II). For example, one entity has a housing complex for single parents and their children. The families receive HUD Section 8 Project-Based Rental Assistance, and the entity also provides support services such as child care, parenting classes, and financial counseling. Two entities reported using Medicaid— one of the nation’s largest sources of funding for medical and other health-related services for low-income individuals. There may be additional federal programs beyond those cited that could be used for two-generation approaches that selected state and local entities did not report using. For example, HHS officials told us that the Social Services Block Grant could be used for two-generation approaches because it is one of the most flexible sources of social services funding. HUD officials said the Family Self-Sufficiency Program provides case management services and could be used for two-generation approaches. However, none of the 23 selected state and local entities reported using either program. We found that selected entities leveraged the 10 most commonly cited federal programs in different ways to meet the unique needs of their individual communities. Officials from some entities reported using only one of the 10 programs, while one entity reported using as many as seven of the programs. In addition, all of the 23 selected entities reported using other resources, including state, local, and/or philanthropic funds, to create their two-generation approaches (see fig. 1). Some state and local officials said these additional resources were needed to provide flexibility in meeting the needs of families. For example, officials from one agency told us they used additional resources to provide services to families with incomes that exceeded the eligibility limits for federal programs, noting that some with higher incomes were still in need of assistance. To create their unique two-generation poverty reduction approaches and address the needs of their communities, selected entities reported the significance of involving leadership, changing policies, expanding services, modifying service delivery practices, and/or serving specific populations. Specifically: Involving Leadership. In some states, the governor or state legislature encouraged state agencies to adopt two-generation approaches and/or staff were hired to lead the state’s efforts in implementing two-generation approaches, according to officials. For example, officials told us that Maryland’s governor and Connecticut’s state legislature created commissions with membership from state agencies, local organizations, and the public. The commissions made recommendations related to mitigating multigenerational poverty and developing local programs to pilot two-generation approaches. In addition, Colorado, Connecticut, Maryland, and Minnesota officials reported hiring a two-generation approach program manager within state government to coordinate the state’s efforts across agencies and programs to implement such approaches. Changing Policies. Officials from some states said they changed policies to better support families as part of their two-generation approaches, such as modifying eligibility requirements for certain services. For example, officials from a Colorado state agency said they changed policies across a range of programs to be more family friendly, such as providing transitional food assistance to families no longer eligible for TANF. Officials from a Georgia state agency said they made a number of policy changes, such as increasing the income eligibility threshold for child care subsidies to help families retain this care as their income increases. Expanding Services. Some officials also reported providing additional services to families that they had not provided in the past. For example, a Colorado state agency is piloting an expansion of its maternal and child home visiting program that adds employment, education, and child care to the supports the program already provides in order to improve family economic self-sufficiency. A Colorado local department now provides short-term housing with support services, in addition to its existing emergency shelters, for some families experiencing homelessness. Modifying Service Delivery Practices. Selected state and local entities sometimes changed the methods they used to deliver services to families, according to officials. For example, families served by a local agency in Maryland complete an intake form and a strengths and needs assessment. A trained coach then helps the family complete a pathway plan with family goals and action steps. A Minnesota local department is implementing new tools to assess the health, nutrition, education, and employment needs of families and connect them to supports across the department. A Connecticut state agency is employing a family centered coaching model in its Jobs First Employment Services Program. The coaching goes beyond traditional job search assistance by identifying the needs of children and parents and providing financial literacy training. Serving Specific Populations. Two-generation approaches by selected non-governmental organizations generally provided services to more specific populations, such as single parents or the families of children in certain schools. For example, a non-governmental organization in Minnesota serves single mothers and their young children by providing housing, on-site early childhood education, and weekly life skills training while mothers earn post-secondary credentials. Another non-governmental organization in Minnesota serves families of children in Minneapolis schools and assists families in accessing a variety of services, such as housing stabilization, health, career, and financial counseling. A non-governmental organization in Connecticut provides support services for the parents of children attending its preschool, including helping parents become certified child care workers and obtain full-time employment in a preschool program. Officials from 14 of 23 state and local entities reported challenges related to sharing data across low-income programs. We found that some state and local entities have data sharing practices in place, while others are in the midst of designing or creating related systems. Sharing data across systems and programs serving low-income families could enhance state and local two-generation approaches. For example, officials in one county said that if more robust data sharing occurred across agencies and systems, they would have access to information that would help them make decisions based on the needs of the families they serve. Additionally, officials from one non-governmental organization said they wanted to share data with other relevant organizations in order to be able to measure the impact of their two-generation approach. We previously found that states and localities used data sharing to improve case management by helping caseworkers obtain client information more quickly and make more informed decisions. Yet, state and local officials said that data sharing is difficult due to issues with linking data across low-income programs and concerns about how to protect participant privacy. Specifically, officials from five state and local entities reported issues related to linking data, including that a lack of common data fields across low-income programs made it difficult for the entities to share data. For example, officials at one state agency said they wanted to link mental health and substance abuse data systems. However, the officials have spent 6 years creating matching fields across these systems to allow the data to be shared, and the process is not yet complete. In addition, officials from seven entities said concerns about protecting participant privacy contributed to their data sharing challenges. For example, an official at a state agency noted it can be difficult to balance protecting an individual’s privacy while sharing enough data to be helpful to entities using two-generation approaches. Federal agencies have taken steps to assist state and local entities interested in data sharing by providing related resources and guidance (see fig. 2). Although this information may not be specific to two- generation approaches, federal officials reported that it could be useful to entities utilizing these approaches. Officials from 11 of 23 state and local entities reported a lack of information on two-generation approaches to be challenging. Specifically, they wanted more examples of successful two-generation approaches, opportunities to learn from peers, and information on federal funding sources that can be used to implement these approaches. For example, officials at one state agency said they had difficulties learning about federal funding sources that do not directly relate to the agency, but could be used to support two-generation approaches. In addition, officials at a non-governmental organization said they would benefit from federally sponsored peer learning so that they could gain knowledge from states and localities to build into their two-generation work. We found that HHS has developed information memorandums and policy statements on two-generation approaches that address the topics desired by state and local entities. HHS also has hosted webinars and communities of learning to assist state and local entities that were interested in adopting two-generation approaches. For some of these efforts, HHS partnered with other federal agencies. Specifically, within HHS/ACF, at least seven offices have developed information related to two-generation approaches (see fig. 3 for examples). This information discusses a range of topics, from funding flexibility to options for building service models, that could assist state and local agencies in creating two- generation approaches. According to federal internal control standards, managers should externally communicate the information needed to achieve their organizational goals. To help to ensure effective external communication, managers may want to consider whether the information is readily available to the intended audience when needed. While HHS has created resources relevant to two-generation approaches, it has not made this information readily available to all entities using two-generation approaches. HHS officials said that they disseminate guidance and other resources through existing program or office-specific mechanisms, such as separate email lists and websites for each office. Other federal agencies in our review also created information relevant to two- generation approaches that they distributed through existing program mechanisms. For example, DOL officials said information related to two- generation approaches is woven into technical assistance as relevant to various grant programs. Similarly, Education officials said they published guidance on its website and sent it to state educational agencies and other stakeholders through program specific email lists. Given these current approaches to distribution, state and local entities using two-generation approaches may not have access to or be aware of all relevant resources if these resources are only available to recipients of certain federal programs or entities in contact with certain federal offices. Without access to all pertinent information, state and local agencies may be unaware of the breadth of information available on two-generation approaches and related topics and may be unable to use it to address challenges they face while designing and implementing such approaches. HHS recently identified an interagency effort that officials said should address challenges faced by state and local entities, including their desire for information on two-generation approaches. The interagency Council on Economic Mobility was recently established and is led by HHS with participation from USDA, Education, HUD, DOL, Department of the Treasury, Social Security Administration, Office of Management and Budget, Council of Economic Advisers, and Domestic Policy Council. Its tentative mission is to “create an accountable and effective structure for federal interagency collaboration encouraging economic mobility and to use federal levers and tools to promote family-sustaining careers and economic mobility for low-income Americans.” Since the Council on Economic Mobility was only recently established, it is too early to determine whether it will make information readily available across federal programs that is relevant to state and local entities using two-generation approaches. Poverty negatively affects many aspects of a family’s life, including a child’s education and a parent’s ability to participate in the labor force. Previous attempts to provide better service coordination for low-income families lacked the intensity and quality of services needed for parents and children to create effective change, according to researchers. Some state and local entities are attempting to use two-generation approaches to help families move towards economic self-sufficiency and alleviate the impact of poverty on children, adults, and families through quality programs that address the needs of both generations. State and local officials that we interviewed have implemented a variety of two-generation approaches, but some said they do not have sufficient information on these approaches to most effectively serve families. HHS and other agencies have taken steps to address these challenges, including providing webinars, information memorandums, and other assistance. However, most of these resources are shared through individual program and office mechanisms, potentially making them difficult to access by those not directly connected to certain programs and offices. Moving forward, readily available information and assistance could more effectively help state and local officials learn how to better serve families and help break the cycle of multi-generational poverty. We are making the following recommendation to HHS: The Secretary of HHS, in consultation with the Council on Economic Mobility, should make information that would assist state and local entities in developing and implementing two-generation poverty reduction approaches readily available across federal programs and offices. (Recommendation 1) We provided a draft of this report to USDA, Education, HHS, HUD, and DOL for comment. We received written comments from HHS, which are reproduced in Appendix III. HHS concurred with our recommendation. The agency stated that through its coordination of the Council on Economic Mobility it will promote poverty reduction approaches that aim to provide more integrated, person-centered service delivery. In addition, HHS stated that it will work to identify opportunities for collaboration, promising practices, and successful models that promote economic mobility and will develop strategies for promoting them, such as through technical assistance. HHS also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretaries of the Departments of Agriculture, Education, Health and Human Services, Housing and Urban Development, and Labor, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Appendix I: Characteristics of Federal Programs Most Commonly Cited by Selected Entities Implementing Two-Generation Approaches To develop child care programs that best suit the needs of children and parents in each state, to empower working parents to make their own decisions on the child care that best suits their family’s needs, to provide consumer education to help parents make informed decisions, to provide child care to parents trying to achieve independence from public assistance, and to help states implement their child care regulatory standards. To enforce the support obligations owed by noncustodial parents for the support of their children through locating noncustodial parents, establishing paternity, obtaining child support, and assuring that assistance in obtaining support or order modifications will be available to all who request such assistance. Community Services Block Grant (CSBG) To reduce poverty, revitalize low-income communities, and empower low-income individuals and families in rural and urban areas to become fully self-sufficient. Noncustodial parent location, paternity establishment, establishment of child support orders, review and modification of child support orders, collection of child support payments, distribution of child support payments, and establishment and enforcement of medical support. A wide range of locally determined services and strategies may be supported to help low-income individuals and families become self- sufficient; address the needs of youth in low-income communities; and effectively use and coordinate with related programs. Comprehensive child development services, including educational, dental, medical, nutritional, and social services to children and their families. Services may be center based, home-based, family child care, or a combination, and may be full- or part-day or full- or part- year. To provide two-generation child development, family engagement, and family support services to pregnant women and young children from birth to age 5 and their families. The purpose of the program is to promote children’s school readiness by enhancing social and cognitive development and by providing educational, health, nutritional, social and other services for children and families. To improve maternal and child health, prevent child abuse and neglect, encourage positive parenting, and promote child development and school readiness. Regular home visits and support services from a nurse, social worker, or other professional. Families are provided services that are tailored to their specific needs, such as teaching parenting skills, promoting early learning in the home, or conducting screenings and providing referrals to address caregiver depression, substance abuse, and family violence. Program Supplemental Nutrition Assistance Program (SNAP) To alleviate hunger and malnutrition and permit low-income households to obtain a more nutritious diet by increasing their food purchasing power. Temporary Assistance for Needy Families (TANF) To accomplish one or more of the following: (1) provide assistance to needy families so that children may be cared for in their own homes or in the homes of relatives; (2) end the dependence of needy parents on government benefits by promoting job preparation, work, and marriage; (3) prevent and reduce the incidence of out-of-wedlock pregnancies; and (4) encourage the formation and maintenance of two-parent families. To provide a combination of education and training services that help job seekers obtain employment and advance in the labor market, to emphasize the alignment and integration of Workforce Innovation and Opportunity Act (WIOA) programs, to emphasize that employers are also customers of the workforce system, and to involve employers in helping the system provide the skilled workers they need. To provide a combination of education and training services that help job seekers obtain employment and advance in the labor market, to emphasize the alignment and integration of WIOA programs, to emphasize that employers are also customers of the workforce system, and to involve employers in helping the system provide the skilled workers they need. To provide a combination of education and training services that help job seekers obtain employment and advance in the labor market, to emphasize the alignment and integration of WIOA programs, to emphasize that employers are also customers of the workforce system, and to involve employers in helping the system provide the skilled workers they need. Benefit or service provided Benefits are provided through an electronic benefit transfer card to purchase food from authorized retailers. Allotments are determined on the basis of the thrifty food plan. TANF-funded services include: cash assistance (benefit levels and eligibility criteria defined by individual states); noncash services, including child care, work activities, work supports, and some child welfare services; and various other social services directed toward the statutory goals of family formation and reduced non-marital pregnancies. Employment services, including job searches and placement assistance, and referrals to employers. Training and services, such as occupational skills training, career counseling, and job searches. Educational supports, occupational skills training, counseling, and paid and unpaid work experiences. In addition to the 10 most commonly cited federal programs, state and local entities reported using over 40 other federal programs to support their two-generation approaches to poverty reduction. These programs are administered by the Corporation for National and Community Service and the Departments of Agriculture, Education, Health and Human Services, Housing and Urban Development, Justice, Labor, Transportation, and Treasury. See tables 3 through 11 below. In addition to the contact named above, the following individuals made key contributions to this report: Rachel Frisk and Danielle Giese (Assistant Directors), Andrea Dawson (Analyst-in-Charge), Gretel Clarke, Kelsey Kreider, and Kelly Snow. Also contributing to this report were Alex Galuten, Melissa Jaynes, Joy Solmonson, Almeta Spencer, Curtia Taylor, and Walter Vance.", "summary": "In 2018, nearly one in six children in the United States lived in families with incomes below the federal poverty thresholds, or about $26,000 annually for a family of four. Research has shown that poverty is associated with negative outcomes for the entire family. State and local entities are currently using two-generation, or whole family, approaches to reduce poverty and move families towards economic self-sufficiency. Senate Committee Report 115-150 included a provision for GAO to review two-generation approaches. GAO examined (1) the primary federal programs that support two-generation approaches and how these programs were leveraged by selected state and local entities, and (2) the challenges selected state and local entities faced implementing two-generation approaches and steps federal agencies have taken to address those challenges. GAO reviewed relevant federal, state, and local agency documentation; and interviewed officials from five federal agencies, and from 23 state and local entities in five states. States were selected to achieve variation in approaches used and percentage of families with children in poverty, among other factors. To reduce poverty through a two-generation approach, which involves working simultaneously with adults and children in a family, selected state and local entities most commonly reported leveraging resources from 10 federal programs. Among the 10 programs were the Department of Health and Human Services' (HHS) Temporary Assistance for Needy Families and Head Start; the Department of Agriculture's Supplemental Nutrition Assistance Program; and three Department of Labor Workforce Innovation and Opportunity Act core programs. Some of these entities also reported using state, local, and/or philanthropic resources to enhance their flexibility to provide services. State and local officials told GAO that difficulties with data sharing and limited information on successful two-generation approaches made it challenging to implement them, and some federal agencies have taken steps to address these challenges. State and local officials said that data sharing is difficult due to various concerns, including protecting participant privacy. Multiple federal agencies have resources on data sharing that may be useful to entities implementing two-generation approaches. State and local officials also said they wanted more examples of successful two-generation approaches and information on federal funding to implement them. To help address this challenge, various federal offices provided information and technical assistance, but the information is distributed via separate email lists and websites, thereby limiting cross-programmatic access and availability. HHS officials said the interagency Council on Economic Mobility—led by HHS—may help address information sharing. Given its recent establishment, related efforts are yet to be seen. Without readily available information, state and local entities may lack useful resources when designing programs to serve families. GAO recommends that HHS, in consultation with the Council on Economic Mobility, make information on two-generation approaches readily available. HHS agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "The purpose of STEP is to help small businesses develop their export capacity. Congress initially established STEP in the Small Business Jobs Act of 2010, and later reauthorized the program through fiscal year 2020 and renamed it the State Trade Expansion Program in TFTEA. According to SBA officials, the goals of the program include increasing the number of small businesses exporting, the number of small businesses exploring significant new trade opportunities, and the value of exports for small businesses already engaged in international trade. SBA implements STEP and has other key roles in efforts to promote U.S. exports, including providing training, counseling, and export financing for small businesses. Within SBA, OIT has responsibility for managing export promotion programs, including STEP. OGM has responsibility for administering grants across the agency according to SBA’s standard operating procedure for grants management. This responsibility includes oversight of financial and compliance-related aspects of issuing awards, and recording and tracking relevant information in SBA’s grants management system. According to OIT officials, each state that receives a STEP grant submits quarterly reports to OIT that provide information on the amount of the grant expended and progress made toward the performance targets. Program managers within OIT then review the quarterly reports and provide feedback to each state, including with respect to progress toward performance targets. OIT officials and states that we interviewed told us that if a state reports not meeting its performance targets in a particular quarter, OIT program managers then work with the state to establish an action plan to meet targets in future quarters. At the end of each grant performance period, OIT program managers work with OGM to finalize and close the state’s grant file. This procedure includes saving information on final performance data, the total amount expended, and the use rate, which is determined by dividing the amount expended by the amount awarded. Beginning in fiscal year 2011 and through fiscal year 2018, Congress has appropriated a total of $139.4 million for STEP, and SBA has awarded about $139.1 million, or almost 99.8 percent of the appropriated total. Table 1 shows the amounts appropriated and awarded, and the number of awards for each grant cycle from fiscal years 2011 to 2018. Every state government conducts some export promotion activities. State trade offices, which conduct these activities, can be housed in various state entities, including governors’ offices, state departments of commerce, universities, world trade centers, and state departments of economic development. As we have previously reported, state trade offices often offer export promotion services similar to those offered by certain federal agencies; in addition to SBA, these include the Department of Commerce and the Export-Import Bank. State trade offices often have both domestic and international staff; domestic staff are typically state employees. According to data from the 2017 SIDO survey, state trade offices had a median size of six employees, with a minimum of one and a maximum of 18. SBA awards STEP funds annually to state governments through a competitive application process. According to SBA, the annual STEP cycle begins with the funding opportunity announcement that SBA posts on www.grants.gov. This announcement, which usually occurs in the spring, indicates that the grant application is open and provides official information (e.g., objectives, deadlines, eligibility, and reporting requirements) about STEP. Once the announcement is posted, eligible states and territories may apply for a STEP grant during the application period. When a state trade office applies for a STEP grant, its application outlines any intended activities and establishes performance targets within each of the activities for the fiscal year or period of the grant. For example, the performance targets detailed in the application can include the state’s estimate of the number of businesses that will apply for and receive funding to attend various international trade show exhibitions. Currently, all 50 states, the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, the Commonwealth of the Northern Mariana Islands, and American Samoa are eligible to apply for STEP grants. Independent technical experts and OIT program managers score states’ applications, generally during late spring and summer. OIT then selects grant recipients and notifies states of their award status in September. If a state receives a STEP grant, its trade office provides the funds to local small businesses through an application process. The funds are intended to support the businesses’ export activities. Figure 1 shows the process for awarding and distributing STEP grant funds. Once small businesses receive the STEP funding, they can use the money for a variety of export-related purposes. These purposes are outlined in TFTEA. Figure 2 shows the allowable uses of STEP grant funds. In fiscal years 2015-2017, SBA awarded a total of about $54.1 million; 40 to 44 states received a STEP grant each year. Over this time period, the median grant amount was $373,000, with a minimum of about $115,000 and a maximum of $900,000. Figure 3 shows the total award amounts by state for fiscal years 2015-2017. The SIDO survey, conducted annually, also asks member states about the STEP grant and how important it is to their export promotion activities. In recent years, most states responding to this question have indicated that the grant plays a key role in supporting such activities, even though the grant does not typically constitute a majority of the budget. In the three surveys conducted between 2015 and 2017, more than 80 percent of responding states, on average, said that the grant was “extremely” or “very” important each year. In these same surveys, about 60 percent of responding states, on average, said that the grant constituted less than half of their budget. SBA’s STEP grants management processes do not provide reasonable assurance that STEP grant recipients meet some TFTEA requirements before the grant is closed out. OIT does have a process in place to comply with the “proportion of amounts” clause of STEP’s authorizing statute, which caps at 40 percent the amount of grant funds distributed to the 10 states with the largest numbers of eligible small businesses. However, we found that OIT does not have processes sufficient to ensure that states met TFTEA’s total and cash match requirements. TFTEA contains specific requirements for STEP that SBA is responsible for meeting. These requirements include the following: Proportional distribution requirement. SBA must distribute grant funds in a way that caps the amount of grant funds distributed to the 10 states with the largest numbers of eligible small businesses at 40 percent of the total amount awarded each year. This requirement ensures that states with fewer eligible small businesses receive funding, and is known as the “proportion of amounts” clause in the law. Total match requirement. States must provide a 25 percent or 35 percent non-federal total match to the federal grant amount. Cash match requirement. A state’s match cannot be less than 50 percent cash. OIT has established a process for ensuring compliance with the TFTEA requirement outlined in the “proportion of amounts” section of the law. As discussed above, TFTEA requires that OIT determine the 10 states with the highest percentage of eligible small businesses using the most recent data from the Department of Commerce. OIT officials told us they review data from Commerce’s Census Bureau that show the number of exporting small and medium-sized businesses in each state, and then use these data to determine the top 10 states. According to OIT officials, they use the most recent data available, with an approximately 2- to 3-year lag in the data. For example, to assess the top 10 states for the fiscal year 2017 cycle, OIT used data from 2014. Based on these data, the 10 states that SBA identified for the fiscal year 2017 cycle received about 32 percent of the total amount appropriated—which was below the 40 percent threshold and therefore in compliance with the proportional distribution requirement. OIT officials told us that they planned to use available 2016 Census data to determine the top 10 states for the fiscal year 2018 award cycle and then, after receiving applications, determine award amounts that would comply with this requirement. TFTEA requires that states receiving a STEP grant provide matching funds. The total match amount is typically 25 percent of the combined state-federal total amount; as noted above, in a limited number of cases, the state’s total match is 35 percent of this amount. Within either a 25 percent or 35 percent match amount, at least half of the total match must be provided in the form of cash. Matching share requirements are often intended to ensure local interest and involvement through financial participation, and may also serve to hold down federal costs. If SBA determines that a state is not providing sufficient matching funds, it can withhold future reimbursement for expenses incurred under the grant. Figure 4 illustrates the STEP funding proportions described above. OIT’s process for reviewing the quarterly reporting that states provide on STEP grants does not effectively document whether each state has met the total match requirement outlined in TFTEA. To determine whether each state is meeting the total match requirement, OIT program managers monitor state spending over the grant period through quarterly reporting that they require of the state grant recipients. At the end of each grant period, OIT officials told us they review the information collected through the quarterly reporting to determine whether the state met the total match requirement based on the amount of federal dollars expended. According to OIT data and officials, most states provide a greater match than is required; for example, according to OIT calculations, 75 percent of fiscal year 2015 states receiving the grant provided more matching funds than required. However, we identified four instances where, according to OIT’s documentation, one state reported an insufficient total match in fiscal year 2015 and three states reported an insufficient total match in fiscal year 2016. OIT’s documentation showed that these four states failed to meet the required total matching funds by about $76,000 combined over these 2 years of the program. SBA told us they nevertheless closed these grants. OIT officials provided several explanations for their actions. First, OIT officials told us that of these four states, two submitted additional information after the grant had closed, indicating that the states had met the matching requirement. OIT officials stated that they did not verify the accuracy of the total match information before grant closure because of OIT staff error. With respect to the other two states, OIT initially stated that it was working with OGM to verify that the total match requirement had not been met, and how best to recover the funds. Subsequently, OIT reported OGM’s determination that one state had in fact met the match requirement, but that the other had not. In the case of the state that did not meet the requirement, OGM determined that SBA had overpaid federal funds to that state by about $19,600. However, after contacting the state and looking into the matter further, OGM conducted a review of quarterly reporting documentation for this state, and determined that the state had in fact exceeded its required match by about $3,800. Though all four of the states initially identified were eventually determined to have met the total match requirement, SBA did not have an adequate process in place to ensure documentation of a full match before grant closeout. OIT officials stated in July 2018 that, as a result of our review, they planned to implement a new quarterly process to focus on match information specifically, which would ensure documentation of whether a state meets its total match requirement before the grant is closed at the end of each fiscal year program cycle. However, officials were unsure what this process would entail. Standards for Internal Control in the Federal Government states that management should design control activities. By designing and executing appropriate control activities, management helps fulfill its responsibilities and address identified risks in the internal control system. This responsibility applies to the entire process or life cycle of a transaction or event from its initiation and authorization through its final classification in summary records. In addition, management should design control activities so that all transactions are completely and accurately recorded. Such control activities can be preventive for agencies, meaning that the activities prevent an agency from failing to achieve an objective or address a risk. Without a process for effectively documenting that the total match requirement has been met and reviewing this documentation before grant closeout, SBA does not have reasonable assurance that states have complied with TFTEA’s total match requirement, and risks overpayment of federal funds. OIT’s processes do not provide reasonable assurance that states have complied with the TFTEA cash match requirement. As previously noted, TFTEA requires that states provide at least half of the total match requirement in the form of cash. TFTEA allows for the remaining half to be any mixture of cash, in-kind contributions, and indirect costs. OIT collects information about the types of expended matching funds, including the proportion provided in cash; however, OIT does not have a process in place to use this information to address risks to the program. As part of their reporting, states submit on a quarterly basis a detailed expenditure worksheet that contains information on the types of expended matching funds, including cash and other types of allowed contributions. OIT documents show that while proposed cash match amounts are recorded, OIT does not track or analyze states’ expended cash matching funds during or at the close of the grant cycle. OIT officials told us that this information is included in the states’ quarterly detailed expenditure worksheets, and therefore can be reviewed for compliance on a case-by-case basis. However, OIT program officials told us that they do not regularly analyze this information to determine what proportion of the total match the cash portion constitutes. As such, SBA cannot consistently determine whether states are meeting the TFTEA cash match requirement, and risk closing out grants for which states have not met the cash match requirement. OIT does not have a process to monitor whether states are misusing federal funds to offset the cash match requirement. The Uniform Guidance defines matching funds as the portion of project costs not paid by federal funds. Matching funds must be accepted when they are not included as contributions for any other federal award, meaning that federal funds cannot generally be used to meet the state match requirement. The program’s authorizing legislation does not define “cash,” and neither does the Uniform Guidance. OIT considers the salaries of state trade office staff who work on administering the grant to be a form of cash and, according to OIT officials, most states use state staff salaries as their total match, including the required cash portion. OIT does not have a process for ensuring that states reporting staff salaries as their required cash match are not also using grant funds from STEP to pay for portions of these same salaries. In our discussions with officials from 12 states that received STEP grants in fiscal year 2015, 2 states reported using the grant to pay for portions of state staff salaries. Both of these states told us that they also reported staff salaries to OIT as their cash matching funds. Using part of the grant to pay for staff salaries in this way could have the effect of reducing the match below the thresholds mandated by TFTEA. When we asked OIT officials what process they had in place to determine whether states were using staff salaries paid for with STEP funds as part of their match amount, OIT officials told us that they were not aware that STEP grantees had engaged in this practice, and therefore did not monitor for it. In order to determine whether this was happening, officials stated that they would need to inspect each state’s grant files on a case-by-case basis. In previous years, OIT has hired a contractor to select samples of and examine individual state grant files, and this contractor worked with states as needed to improve reporting. OIT officials told us that the last grant year reviewed in this way was fiscal year 2015, and they expect to be able to conduct some examinations for the closed fiscal year 2016 grants. SBA’s grants management standard operating procedure states that the agency should monitor grantees for compliance with the terms and conditions of the awards, which includes compliance with applicable federal law. Further, according to Standards for Internal Control in the Federal Government, management should design and execute control activities, and use quality information to achieve the entity’s objectives. Management should process reliable data into quality information to make informed decisions and evaluate the entity’s performance in achieving key objectives and addressing risks. Without processes to review whether states are meeting the cash match requirement, OIT is not implementing its responsibilities under SBA’s standard operating procedure because it cannot consistently determine whether states are meeting this requirement. Without making such a determination, SBA does not have reasonable assurance that states are contributing to the program as required by STEP’s authorizing statute. According to agency officials, OIT made some changes to the program in response to feedback from states, including addressing some types of challenges that states say affect their ability to use all their grant funds. However, officials of some states said that continuing challenges with the program impeded their ability to use all awarded grant funds within the permitted time period. While the challenges they described cover a variety of topics, most relate to compressed program timelines, administrative burden, or poor communication with and within OIT. OIT officials told us that they made some changes to STEP for the fiscal year 2017 program cycle in response to informal feedback from states, including changes to address concerns about use of funds and the administrative burden of the application. Of the 12 states that we interviewed, officials from 11 agreed that SBA’s changes would improve the program. Changes included: Extending funds usage period to 2 years. OIT officials told us that, beginning with the fiscal year 2017 cycle, they converted the program from a 1-year award to a 2-year award. This change allows an additional 4 quarters to conduct program activities, which, in turn, may help enable states to use the full amount of their grant funding and achieve performance targets. Some state officials that we interviewed said that this change improves the program. Eliminating travel preauthorization requirement. OIT officials also told us that, during the fiscal year 2017 cycle, they eliminated a requirement that any travel funded by STEP grants be approved at least 30 days in advance of each trip. Instead, states now report all travel to OIT as part of STEP’s quarterly reporting. According to some officials from the states that we interviewed, this change reduced the administrative burden on state trade office staff and allows greater flexibility to use grant funds when opportunities that require travel arise with limited notice. Reducing page length of technical proposal. For the fiscal year 2017 cycle, OIT reduced the length of the application’s required technical proposal by nearly half, from 18 pages to 10 pages. According to some state officials that we interviewed, this change helped to streamline the program’s application paperwork. State officials that we interviewed described a variety of ongoing concerns with STEP, including some challenges that reduced their ability to use all of their grant funds. We developed a nongeneralizable sample of the 12 states that did not use 25 percent or more of their grant funds in fiscal year 2015, and interviewed officials from those states in order to gain insight into their experiences with the program, including the challenges that they faced using the full award amount. These 12 low- use states represent almost 70 percent of funds that remained unused during that cycle. As shown in figure 5, we grouped the most commonly reported challenges into the following categories: (1) timing of the application and award processes, (2) administrative burden, and (3) communication. OIT’s recent changes to STEP could help increase future use rates; however, the effect is yet unknown because the changes were introduced for the fiscal year 2017 cycle. Further, nearly all of the concerns expressed by the 12 low-use states relate to aspects of the program outside the changes made by OIT. Our analysis of data from the program’s fiscal year 2015 and 2016 cycles found nearly 20 percent of grant funds unused each year, despite OIT officials stating that they seek 100 percent use of grant funds, as described below: 2015. Across all 40 recipient states, combined grant use was 81 percent, leaving 19 percent, or nearly $3.4 million, unused. This included one state that left 77 percent, or over $432,000, of its funds unused that year. 2016. Across 41 of the 43 recipient states, combined grant use was 82 percent, leaving 18 percent, or nearly $3.2 million, unused. This included one state that left nearly 95 percent, or nearly $184,000, of its funds unused that year. In addition, although officials from several states told us that they have made changes to their STEP grant applications or activities to increase their ability to use grant funds, use problems have persisted. Our interviews, conducted in March and April 2018, indicated that states continue to face obstacles using the full award amount. Officials we interviewed from each of the 12 low-use states cited challenges related to the timeline of the application and award processes. These challenges were a variable application period, a short application window, a short application rewrite period, and award announcements occurring close to the start of the grant period. The exact timing of the STEP application period varies from year to year, which officials from some states that we spoke with cited as a challenge to applying for the grant. In fiscal years 2015, 2016, and 2017, SBA opened the STEP application process at different points between February and May. Officials from five low-use states reported that they had difficulty planning staff resources for completing the application because of the variable time frames. For example, one state official told us that not knowing when the application period would open was one of his office’s biggest planning challenges because spring is a busy time for trade activities and coincides with when his state hosts its largest annual trade event. At some point during this busy season, the application period typically opens. The state official said that, as a result of competing priorities for his office during this season, he might have only 2 weeks to complete the STEP application within the allotted time. He said that if the grant application periods were opened at the same time each year, he would be better able to plan for it. Officials from five low-use states told us that the window for completing the initial STEP application was insufficient because, for instance, of the amount of work the application requires and competing demands on their staff. For fiscal years 2015, 2016, and 2017, SBA announced application windows of between 30 and 42 days. For fiscal year 2016, SBA later extended the window to 50 days. Some state officials said that the variable and short application window creates challenges to writing quality applications. Without quality applications, it may be more difficult for states to develop good plans for using grant funds, which can facilitate the full use of funds. We discussed states’ concerns about when the grant applications opened, and how long they remained open, with SBA officials. These officials said that they were unable to open the application at the same time and for the same length of time each year because of factors beyond their control, such as the federal budgeting process and the involvement of other offices within SBA. In response to states’ concerns regarding the length of time that the STEP application is open, we observed that under OMB’s Uniform Guidance the federal awarding agency must generally make all funding opportunities available for application for at least 60 calendar days; however, the guidance does allow agency officials to make a determination to allow for as few as 30 days. Officials from three of the 12 low-use states told us that the window for rewriting applications is insufficient to adequately consider and implement the changes needed, given that states must rewrite their technical proposals, including updating all supporting financial information as well as proposed performance targets within that time. Once states’ applications have been scored and recipients selected, OIT may require certain states to rewrite their applications to request smaller amounts of federal funds. SBA officials told us that in the fiscal year 2015, 2016, and 2017 cycles, states were given 21 days to rewrite their proposals, but that the rewrite period has been as short as 48 hours. OIT officials told us that they reduce states’ grant requests each year because SBA receives applications for more grant funds than are available. Such rewrites require reducing or removing intended activities and establishing new performance targets within each of the remaining activities. State officials told us that the window for rewriting the grant impacts their ability to write their program proposals, which serve as the basis for states’ performance metrics and measurement of outcomes. SBA announces final STEP award amounts in September, just prior to the beginning of the fiscal year. Officials from nine of the 12 low-use states told us that because the award notifications occur so close to the beginning of the fiscal year, using funds during the first quarter is difficult. For instance, most of these officials said that they cannot plan activities until they know whether they will receive an award and, if so, the amount. Furthermore, officials from four states attributed their low grant use to this issue. For example, officials from one state told us that September award announcements do not allow them enough time to recruit companies to participate and use funds in the first quarter of the federal fiscal year, forcing them to compress their activities into the remaining quarters of the program cycle. One state official referred to the first quarter as a “lost” quarter. Officials from two states reported reducing or eliminating programmatic activities in the first quarter to avoid pressure caused by OIT’s award timeline. OIT officials told us that they notify states of their awards before the start of each fiscal year and in compliance with federal government policy. Figure 6 compares the timelines for the application process, notification of awards, recipients’ grant use period, and closeout activities for the fiscal year 2015, 2016, and 2017 program cycles, as well as associated challenges to grant use that states reported. Challenges related to administrative burden were cited by officials from all 12 of the states that we interviewed. These included challenges related to completing the application, the process for moving funds from one use to another (known as “repurposing”), and the required reporting on the grant. Officials from eight low-use states told us that the STEP application requirements are unrealistic or burdensome because, for instance, the level of detail required about performance targets conflicts with the reality of promoting exports in a fluid international business environment. As discussed above, OIT requires states’ STEP applications to detail their projected use of grant funds. For example, when submitting their applications, states project which trade shows they will attend and the number of small businesses they will take to these trade shows. Further required details include projecting the costs and number of companies that will attend events in particular foreign locations, for example. In the past, the application required performance targets that were based on estimates of business interest and export opportunities up to 18 months in advance. Today, with the aforementioned transition to 2-year awards, STEP applications must project such activities and performance targets up to 30 months in advance of their execution. In the event of differences between planned and actual performance during the course of the program cycle, OIT requires states to explain the differences and their plans for aligning their future performance with the targets established in their applications. Officials from eight low-use states said they attributed their low use of grant funds to challenges with program rules or regulations. Difficulty in repurposing funds was the most common example that they cited. Some officials said that OIT’s difficult repurposing process limits states’ ability to move funds from one purpose to another when participating small businesses’ plans change or don’t align with the original program proposal, leaving funds unused. Several state officials described difficulty adapting to changing business plans or opportunities. For instance, one official said that when unanticipated opportunities appear, such as follow- up trade missions, OIT’s restrictive repurposing process limits states’ ability to move funds from one purpose to another. Officials from two states reported applying for smaller grant amounts than in previous years in order to have a more manageable amount to spend, thereby avoiding the need to repurpose funds. In order for states to use STEP funds in ways that differ from the plans in their approved program applications, SBA requires that states request agency permission to repurpose the funds. According to the Uniform Guidance, the federal awarding agency may restrict grant recipients’ repurposing of funds in excess of 10 percent of the total grant amount, and determine the level of detail required for requests to repurpose funds. OIT officials told us that in cases of repurposing more than 10 percent of total funds, the documentation required is determined on a case-by-case basis depending on the amount of funds involved and the degree of difference between the original approved use and the proposed new use. These OIT officials said that in some cases, states may only need to submit a written request via email; in other cases, states may be required to revise and resubmit their STEP applications. To compensate for the difficulty in repurposing funds, officials from two states told us that in subsequent years they had proposed more general programs that allowed for greater flexibility, such as by increasing the use of stipends, which provide small businesses with a predetermined amount of funds for a range of allowed activities. When a state applies for a STEP grant using this approach, the state is typically less specific in its performance targets, such as which trade shows will be attended and by how many small businesses. One state official said that this approach can increase use rates by providing states with more flexibility in distributing the funds. OIT officials agreed that where a state is less prescriptive in its application performance targets it is easier for the state to repurpose funds, such as when federal trade missions are cancelled or small businesses express interest in activities that were not originally proposed. However, the OIT officials noted that the lack of specificity may result in lower grant application scores. Officials from 11 of the 12 low-use states described challenges related to burdensome or changing reporting requirements, such as the number of forms required for quarterly reporting, or the level of detail required on certain forms, as well as challenges related to changes that SBA makes to reporting requirements during the grant period. Two state officials told us that, because they often have few people working on the grant, complying with these reporting requirements takes undue amounts of time, and thus have the effect of reducing use. For example, one state official described having to divide the cost of shared taxis and hotel rooms for a trade show, reporting the per-person cost for each company that was part of the state’s delegation. Officials from two states also pointed out that the reporting requirements for STEP were much more detailed and burdensome than grants they administered from other federal agencies, such as the Department of Commerce. In addition, officials from six states expressed concern that OIT occasionally makes changes to program requirements, such as reporting requirements, after the grants have been awarded and the grant cycle has begun. Some state officials said that these mid-year changes increase the administrative burden on their limited staff. During our discussion of states’ concerns with OIT, officials said that they are limited in their ability to address certain concerns described by the states. For example, OIT officials told us that the quantity and type of forms and level of detail required in states’ reporting are imposed by federal guidelines, determined by OGM, or based on agency leadership’s expectations. In addition, OIT officials said that sometimes requirements are changed outside of their office and are beyond their control. The officials stated that, for some changes, they are not in a position to wait until the following program cycle for implementation. They said that they do, however, postpone less urgent changes until the following program cycle rather than making them mid-cycle. Communication between OIT and states was a frequently cited area of concern in our interviews with officials from the 12 low-use states. Officials from nine states raised concerns related to the quality of communication with OIT. For instance, some state officials described issues such as sometimes waiting weeks or months for responses to emails that they had sent to OIT, resulting in administrative delays or preventing states from executing some activities as planned. In one example, state officials said that SBA recently waited months to notify the state of a problem opening its emailed quarterly report file, causing the state to wait months to receive its STEP grant funds. The officials said that such delays bring their program to a halt. Communication within OIT was also cited as an issue that hindered states’ fund use. Officials from 10 states noted that program rules, regulations, or requirements are inconsistently communicated. Further, several state officials described witnessing OIT program managers disagree regarding the interpretation of program rules during discussions with state representatives at a SIDO conference. When we discussed states’ concerns with OIT officials, they told us that they maintain open lines of communication with the states and that STEP program managers are required to retain logs of their communication with the states. The officials described making an effort to listen to states’ concerns, adding that they had modified the program in certain ways as a result of state input, as noted above. States can provide feedback about STEP to their respective OIT program managers, who then discuss states’ comments during weekly meetings with OIT management and other program managers. In addition, OIT officials said that they make themselves available for informal conversations with states at SIDO’s annual conference. According to OIT officials, communication with the states is usually channeled through each program manager, even when the content is pertinent to all grant recipients and could be communicated from one source. At the time of our review, OIT had not assessed and fully addressed the risk posed by some states’ low use of funds. OIT officials told us that while they informally collect feedback from states, there is no systematic process to collect states’ perspectives on challenges with the program, including obstacles to their ability to use funds. In addition to the goals of the program outlined earlier, OIT officials told us that one program performance metric is the use rate for STEP funds. Officials said that they seek 100 percent use for each state that receives an award, as well as for the program as a whole. Standards for Internal Control in the Federal Government specify that agency leadership should define program objectives clearly to enable the identification of risks and define risk tolerances in order to meet the goals of the program’s authorizing legislation. These standards for internal control include assessing the risks facing the agency as it seeks to achieve its objectives, with the assessment providing the basis for developing appropriate responses to risks from external and internal sources. Therefore, agency management should set its risk tolerance with regard to STEP at a level that appropriately mitigates risk while enabling the achievement of program objectives. Without assessing and addressing this risk to the program, OIT may continue to fall short of 100 percent grant fund use. Low grant fund use could negatively affect OIT’s ability to achieve program goals in supporting state export promotion activities. In addition, OIT has no systematic process to share best practices with sufficient detail that states struggling to use their STEP funds might apply those practices to improve their own programs. TFTEA requires SBA to publish an annual report regarding STEP, including the best practices of those states that achieve the highest returns on investment and significant progress in helping eligible small businesses. While 12 states did not use 25 percent or more of their grant funds in the fiscal year 2015 cycle, 19 states used all or almost all of their funds, as shown in appendix I. SBA publishes high-level information on what it deems to be notable state activities in its annual report to Congress. OIT officials told us that, when possible, they share best practices with states that may have difficulty accessing external markets. However, OIT officials told us that they do not formally facilitate the sharing of best practices among the states, saying that best practices for promoting exports in one state might not be transferable to another state because each state is unique in terms of the characteristics of its economy. According to the Uniform Guidance, grant recipients’ performance should be measured in a way that helps the federal awarding agency and other non-federal entities to improve program outcomes, share lessons learned, and spread the adoption of promising practices. Further, under federal standards for internal control, management should externally communicate the necessary quality information so that external parties, such as grant recipients, can help to achieve the entity’s objectives. We have also previously reported on the importance of collecting and sharing best practices, as well as the processes for doing so. By sharing detailed information with all participating states about the approaches that some grant recipients are using to successfully achieve STEP’s goals, SBA could encourage all grant recipients to improve the effectiveness of their state STEP programs, including increasing fund use rates in pursuit of OIT’s stated aim of 100 percent grant fund use. The STEP program has provided about $139 million of federal support to assist small businesses in finding export opportunities, and Congress has authorized STEP through 2020. SBA has a process in place to ensure compliance with the program’s legal requirement to cap the total grant amount to the 10 states with the largest number of eligible small businesses at 40 percent—thereby ensuring that states with fewer small businesses benefit from the program. However, SBA has not taken some necessary steps to manage the program’s total and cash matching requirements according to applicable law or federal internal control standards. SBA does not document that states are meeting the total match requirement, and has not developed a process to determine whether states are meeting the cash match requirement. As a result, SBA does not have reasonable assurance that the states are meeting these requirements. Matching requirements directly engage states, augment federal funds, and ensure further support to small businesses that export. As such, meeting the matching requirements is a key aspect of the program’s success. Although not every state has problems using the full federal award amount, about a quarter of the states do, which may hinder the program’s ability to fully achieve its goals of increasing the number of small businesses exporting, increasing the number of small businesses exploring significant new trade opportunities, and increasing the value of exports for small businesses already engaged in international trade. While SBA has taken some steps to improve the program based on feedback from states, it could do more in this regard, including finding ways to assess and address the specific concerns raised by states that have experienced difficulty using grant funds. SBA could also take further steps to collect and disseminate best practices among states to strengthen their ability to fully use grant funds. Higher grant fund use could enhance SBA’s ability to assist as many exporting small businesses as possible, leading to a fuller realization of the program’s goals. We are making the following four recommendations to SBA: The SBA Administrator should establish a process that ensures documentation of states’ compliance with the total match requirement before grant closeout. (Recommendation 1) The SBA Administrator should develop a process to determine states’ compliance with the cash match requirement. (Recommendation 2) The SBA Administrator should assess the risk to achieving program goals posed by some states’ low grant fund use rates. Assessing this risk could include examining the challenges that states reported related to the program’s application and award processes, administrative burden, and communication. (Recommendation 3) The SBA Administrator should enhance collection and sharing of best practices among states that receive STEP grant funds. (Recommendation 4) We provided a draft of this report to SBA for review and comment. In written comments (reproduced in appendix II), SBA generally agreed with our findings and concurred with our recommendations. SBA observed that the states we did not interview may have had different experiences with the program than the states in our sample. As we note in the report, our sample is nongeneralizable, and so the experiences these states reported to us may not be common to all states receiving the grant. As we stated in our report, we selected the 12 states that had the lowest grant use rates in fiscal year 2015 in order to understand the challenges they faced. We are sending copies of this report to the Administrator of SBA and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8612 or gianopoulosk@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix III. The objectives of this report were to examine the extent to which (1) the Small Business Administration’s (SBA) State Trade Expansion Program (STEP) grants management process provides reasonable assurance of compliance with selected requirements of applicable law, and (2) SBA has taken steps to address challenges states report in using grant funds to achieve program goals. To address these objectives, we did the following: Legal and regulatory review. We reviewed the Small Business Jobs Act of 2010 and the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA), the statutes that established and reauthorized STEP, respectively. We focused on SBA’s compliance with the proportional distribution, total match, and cash match requirements because these requirements are consistent across both of the program’s laws, and to avoid duplication with ongoing Office of Inspector General (OIG) work on the program. In addition, we reviewed the Office of Management and Budget’s (OMB) federal grant guidance, Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (Uniform Guidance), and Standards for Internal Control in the Federal Government to identify relevant guidance and practices in managing grants to non-federal entities and in designing and executing effective control processes. We also reviewed these documents and previous GAO work for information about the collecting and sharing of best practices. Program data review. We analyzed data on award amounts, matching funds required, and matching funds provided for the fiscal years 2015 and 2016 program cycles, as well as information about the sources of matching funds in selected cases for the fiscal year 2015 program cycle. We focused on these program cycles because these were the most recent years for which the most complete information was available. We also reviewed the data the Office of International Trade (OIT) used to comply with the legal requirement for proportional distribution for the fiscal year 2017 cycle. We assessed the reliability of these data by interviewing OIT officials about the sources of the data, how the data are stored and maintained, and by tracing data from relevant sample documents back to their sources. We found these data sufficiently reliable for the purpose of understanding OIT’s processes for complying with the proportional distribution and matching requirements. Program management review. We reviewed SBA’s standard operating procedure for managing grants and cooperative agreements in order to understand the agency’s requirements for this. We reviewed relevant documentation, including sample grant files, application forms, application scoring forms, grant reporting forms. To examine the relationship that states’ past use rates have on the award process, we reviewed OIT’s forms for scoring the grant applications in fiscal years 2017 and 2018. We interviewed officials from OIT and OGM to understand how SBA monitors STEP grants, including the steps they take to comply with the proportional distribution, total match, and cash match requirements. We examined SBA’s calculations of the total match amounts required for states, and we identified 4 instances in which SBA’s documentation showed an insufficient match in fiscal years 2015 and 2016. We spoke to OIT officials to gain insight into why the scoring procedures for the grants changed for the fiscal year 2018 program cycle. In addition, we reviewed TFTEA, previous GAO work, and the most recent STEP best practices reports for information relating to SBA’s communication to states about best practices in applying for and managing STEP grants. We interviewed officials from OIT to learn about steps they had taken to address concerns raised by states that participate in the program and to facilitate the sharing of best practices among states receiving the grant. Review of grant use rates. We analyzed SBA data on award amounts and amounts used for the fiscal years 2015 and 2016 cycles. We assessed these data by interviewing OIT officials about the sources of the data and how the data are stored and maintained. In discussing the fiscal year 2016 cycle with OIT officials, we learned that South Dakota and Texas had been granted extensions and therefore had not yet completed reporting on their use of these grants. As a result, we dropped these states from our calculation of the fiscal year 2016 cycle use rate. With the exclusions of South Dakota and Texas, we found these data sufficiently reliable for the purpose of calculating use rates for STEP for the fiscal years 2015 and 2016 cycles. In comparing the available grant use data from these years, we found the following: (1) some states that were in the low-use (less than 75 percent utilization) category in fiscal year 2015 were also in this category in fiscal year 2016, (2) some states that were in the low-use category in fiscal year 2015 were not in this category in fiscal year 2016, and (3) some states that were not in the low-use category or did not participate in STEP in fiscal year 2015 were in this category in fiscal year 2016. In our interviews, we asked officials from states in the low-use category in the fiscal year 2015 cycle about their experiences in subsequent years, including whether they intended to apply for the grant in the fiscal year 2018 cycle. Tables 2 and 3 below display data on fund use across participating states in fiscal years 2015-2016, including the percentage of federal award funds unused, amount of federal award funds unused, and percentage of total federal funds unused for each year. We used the data in table 2 to identify our population of low-use states. The 12 states that we interviewed used less than 75 percent of their award funds in the fiscal year 2015 cycle. They represent almost 70 percent of funds that remained unused during that cycle, representing a large proportion of the total unused funds that year. In table 2, the first three rows show data on the 12 states included in our sample. We used the data in table 3 to determine whether our population of low-use states achieved different use rates the following year. Interviews with low-use states. We conducted semi-structured interviews with officials from the 12 states that did not use at least 25 percent of their federal award in the fiscal year 2015 grant cycle. In these interviews, we discussed the states’ practices and reporting with respect to the total and cash match requirements, and inquired about the practice of using the federal award to offset state staff salaries while reporting these salaries as a cash match. These 12 interviews do not constitute a generalizable sample of STEP grantees, because we selected these states on the basis of their low use of grant funds in order to understand challenges faced by those states. As such, the practices reported by states we interviewed may not be common to all states receiving STEP grants. State challenges. In our semi-structured interviews with officials from the 12 states that did not use 25 percent or more of their award in fiscal year 2015, we gathered information about continuing challenges in fully using the grant funds. These states were: Maine We conducted these interviews in March and April 2018. However, our 12 interviews represent a nongeneralizable sample of the population of states that have received the 301 awards made through the STEP grant cycles since fiscal year 2011. As such, challenges reported by these states may not be common to all states receiving this grant. We asked officials from these 12 states questions about their experiences participating in the program, about challenges they had experienced, and about their views on how the program could be improved. To describe the themes that emerged from these 12 interviews with respect to challenges in fully using the funds, we identified categories based on an analysis of the responses that we received. Two GAO analysts independently coded the content of these interviews according to these categories. We conducted further analysis of the results of our coding to identify the three major groupings of challenges that we present in this report: (1) the timing of the application and award periods; (2) administrative burden; and (3) communication. The coders had an initial agreement rate of about 90 percent. Disagreements were resolved through discussion between the coders and, occasionally, through arbitration by a knowledgeable third party. SIDO survey data review. We analyzed 2015, 2016, and 2017 survey data provided by State International Development Organizations (SIDO), a national group that supports state trade offices. We reviewed data from their annual member survey conducted in those years. This survey asks SIDO member states about, among other things, top advocacy priorities, the number of staff in each state’s international trade office, and the location of these trade offices within the state government. The survey also asks states to describe the importance of STEP to each state, and provide the estimated proportion of each state’s export promotion budget that the grant constitutes. To assess these data, we interviewed a SIDO official about the organization’s methods for developing the survey each year, as well as their processes for collecting and storing the data, and reviewed the response rates in each year. We reviewed the survey instrument and data, and conducted testing for missing data, obvious errors, and outliers, and determined that these data were sufficiently reliable for the descriptive purposes for which they are used in this report. However, we noted that the number of respondents by year varied. According to SIDO 36, 38, and 41 states fully or substantially completed the survey in 2015, 2016, and 2017, respectively. We are presenting the results as general proportions or rounded percentages. We did not independently audit the survey results. We conducted this performance audit from September 2017 to March 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Adam Cowles (Assistant Director), Cristina Ruggiero (Analyst in Charge), Jesse Elrod, and Peter Kramer made key contributions to this report. The team also benefitted from contributions made by Martin de Alteriis, Mark Dowling, John Hussey, Jeff Isaacs, Christopher Keblitis, and Kimberly McGatlin.", "summary": "Congress established STEP in 2010 to increase small business exports. Through STEP, SBA has awarded about $139 million in grants to state trade offices, which in turn facilitate small business export activities, including participation in trade missions and attendance at trade shows. Congress reauthorized STEP in 2016. GAO was asked to review SBA's management of the program. This report examines the extent to which (1) SBA's STEP grants management process provides reasonable assurance of compliance with selected requirements of applicable law, and (2) SBA has taken steps to address challenges states report in using grant funds to achieve program goals. GAO reviewed the program's authorizing legislation and federal and agency guidance on grants management, analyzed SBA program data, and interviewed SBA officials. GAO also conducted semi-structured interviews with a non-generalizable sample of 12 of the 40 states that received STEP grants in fiscal year 2015, the most recent year for which complete data were available. GAO selected these states on the basis of their low grant fund use rates. The Small Business Administration's (SBA) management of the State Trade Expansion Program (STEP) does not provide reasonable assurance of compliance with some legal requirements. Specifically, the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) requirements for STEP include: Proportional distribution requirement. SBA's Office of International Trade (OIT) must distribute grant funds so that the total amount awarded to the 10 states with the highest percentage of eligible small businesses does not exceed 40 percent of the program's appropriation that year. Total match requirement. States must provide a 25 or 35 percent non-federal match to the federal grant amount. Cash match requirement. A state's match cannot be less than 50 percent cash. GAO found that, while OIT has a process to meet the distribution requirement, it does not have a process for documenting that states have met the total match requirement before grant closeout, and does not have a process to determine whether states are meeting the cash match requirement. Without such processes, SBA cannot be reasonably assured that states are contributing per the law's requirements. GAO found that, while OIT has made changes to STEP in response to states' feedback, officials from states with low grant use described ongoing challenges with the program that affect their ability to fully use funds. These challenges include compressed application and award timelines, administrative burden, and poor communication. SBA has not adequately assessed risks to the program, including the risk to achieving program goals posed by some states' low grant fund use rates. Without such an assessment, OIT's ability to support U.S. exporters may be diminished. Further, SBA has not effectively facilitated sharing best practices among states. By doing this, SBA could help states make full use of funds to achieve the program's goals. GAO is recommending that SBA develop processes to ensure compliance with legal grant matching fund requirements, take steps to assess risks to program goals from low grant fund use rates, and enhance the sharing of best practices among states receiving the grant. SBA concurred with all of the recommendations.", "document_type": "gao"}
{"report": "The decennial census produces data vital to the nation. The data are used to apportion the seats of the U.S. House of Representatives; realign the boundaries of the legislative districts of each state; allocate billions of dollars each year in federal financial assistance; and provide a social, demographic, and economic profile of the nation’s people to guide policy decisions at each level of government. Furthermore, businesses, nonprofit organizations, universities, and others regularly rely on census data to support their work. Given the importance of the decennial census to the nation, it is important for the Bureau to manage risks that could jeopardize a complete, accurate, and cost-effective enumeration. To assist federal government leaders in managing such complex and inherently risky missions across their organizations, in prior work we developed an ERM framework that, among other things, identifies essential elements for federal ERM and good practices that illustrate those essential elements. Notably, these elements and practices apply at all levels of an organization and across all functions—such as those related to managing risks to the 2020 Census. Furthermore, Office of Management and Budget (OMB) Circulars No. A-11 and A-123 require federal agencies to implement ERM to ensure their managers are effectively managing risks that could affect the achievement of agency strategic objectives. As discussed in our ERM Framework, ERM is a decision-making tool that allows leadership to view risks as an interrelated portfolio rather than addressing risks only within silos. Fundamental to ERM is the development of risk mitigation and contingency plans. Mitigation plans detail how an agency will reduce the likelihood of a risk event and its impacts, should it occur. Contingency plans identify how an agency will reduce or recover from the impact of a risk after it has been realized. Among other things, these plans provide the roadmap for implementing the agency’s selected risk response and the vehicle for monitoring, communicating, and reporting on the success of that response. In developing these plans, it is important that agencies keep in mind the interaction of risks and risk responses, as the response to one risk may affect the response to another or create a new risk entirely. We also developed a Fraud Risk Framework to provide a comprehensive set of leading practices that serves as a guide for agency managers developing and enhancing efforts to combat fraud in a strategic, risk- based manner. The framework is designed to focus on preventive activities, which generally offer the most cost-efficient use of resources since they enable managers to avoid a costly and inefficient pay-and- chase model of recovering funds from fraudulent transactions after payments have been made. Consistent with our ERM framework, the Bureau developed a decennial risk management plan which, among other things, requires that it identify risks to the 2020 Census at the portfolio and program levels. Portfolio risks are those that could jeopardize the success of the 2020 Census as a whole, and they typically span several years with many potential risk events over the period. Program risks are narrower—they could jeopardize the success of an individual program, including the 35 operations that support the 2020 Census as well as the 2018 End-to-End Test. As of December 2018, the Bureau had identified 360 active risks to the 2020 Census—meaning the risk event could still occur and adversely impact the census. Of these, 30 were at the portfolio level and 330 were at the program level. As shown in figure 1, the greatest number of active program risks was to the Systems Engineering and Integration operation which manages the Bureau’s delivery of an IT “System of Systems” to meet 2020 Census business and capability requirements. For example, the Bureau’s description of one of the risks to this operation indicated that if certain key system test plans and schedules are not clearly communicated among and collaborated on by relevant Bureau teams, then the 2020 Census systems are at risk of not meeting performance, cost, and schedule goals and objectives. The Bureau’s decennial risk management plan requires that it classify risks by priority level. These classifications are intended to highlight the most critical risks and identify where to allocate additional resources. Figure 2 shows how the Bureau had classified the 360 active risks as of December 2018. To determine risk priority, the Bureau’s decennial risk management plan requires that it assign each risk numerical ratings for likelihood of occurrence and potential impact. When multiplied, the result is a numerical priority rating, which the Bureau divides into three classifications for high priority, medium priority, and low priority (see figure 3). According to the Bureau’s decennial risk management plan, all portfolio- level risks must be mitigated to reduce the likelihood of the risk event and its impacts, should it occur. In contrast, when a program-level risk is identified, risk owners—the individuals assigned to manage each risk— are to select from the following risk responses. Mitigate. This may be an appropriate response where there are actions or techniques that will reduce the likelihood of the risk event and its impact, should it occur. Watch. This may be an appropriate response where a trigger event can be identified far enough in advance so that mitigation activities can be delayed until then. Accept. This may be an appropriate response where the probability and potential impact of the risk is so low that mitigation actions do not appear necessary or the impact can be absorbed if the risk occurs. As of December 2018, the Bureau planned to mitigate 67 percent of the active risks it had identified (see table 1). Notably, this signifies that the Bureau determined there were actions it could take or techniques it could employ to reduce the likelihood of the majority of risks to the enumeration or their impact, should they occur. The Bureau’s decennial risk management plan sets out the following requirements for developing mitigation and contingency plans: Mitigation plans are required for all active portfolio risks and for all active program risks with a mitigate risk response. Contingency plans are required for all active portfolio risks with a high- or medium-priority rating, and a moderate or higher likelihood of occurrence. Contingency plans are also required for active program risks with a high- or medium-priority rating, a moderate or higher likelihood of occurrence, and a risk response of mitigate or accept. Of the 360 active risks to the census as of December 2018, 242 (67 percent) met the Bureau’s criteria for requiring a mitigation plan (see table 2). According to the Bureau’s risk registers, 232 of these risks (96 percent) had a mitigation plan. In addition, 146 of the active risks (41 percent) met the Bureau’s criteria for requiring a contingency plan. According to the Bureau’s risk registers, 102 of these risks (70 percent) had a contingency plan. Our prior reporting similarly found that earlier in the decennial cycle, the Bureau did not have mitigation and contingency plans for all risks that required them. In November 2012, we found that the Bureau had mitigation and contingency plans for each of the portfolio risks it had identified at the time, but none for the program risks. We reported that such plans were needed to help the Bureau fully manage associated risks, and we recommended that the Bureau develop risk mitigation and contingency plans for all program risks. In April 2014, the Bureau provided us with program-level risk registers that contained both risk mitigation and contingency plans where appropriate, and we closed the recommendation as implemented. However, as of December 2018, the Bureau is missing required mitigation and contingency plan for both portfolio and program risks. Example of 2020 Census Risk Without Required Contingency Plan In July 2016, the Bureau added a risk titled, Major Disasters, to its portfolio risk register. The Bureau’s description of the risk stated that if a major disaster—such as an earthquake—occurs during final preparations for or implementation of the 2020 Census, then census operations may not be executed as planned, leading to increased costs, schedule delays, or lower quality data. Leading up to the 2010 Census, Hurricane Katrina devastated the coastal communities of Louisiana, Mississippi, and Alabama; a few weeks later, Hurricane Rita cut across Texas and Louisiana. Damage was widespread. Among other things, in the aftermath of Katrina, the Red Cross estimated that nearly 525,000 people were displaced and their homes were declared uninhabitable. If a major disaster, such as a hurricane, occurs leading up to or during the 2020 Census, having a contingency plan would help ensure that housing units and their residents are accurately counted, particularly when hundreds of thousands of people— temporarily or permanently—may migrate to other areas of the country. As of December 2018, however, the Bureau had neither a draft nor approved contingency plan for this risk, although it required one since first added to the risk register nearly 2.5 years earlier. According to the Bureau, though not documented in a contingency plan, it is taking actions to respond if this risk is realized. However, if such actions are reflected in disparate documents or no documents at all, then decision makers are left without a comprehensive picture of how the Bureau is managing this risk to the 2020 Census. Some of the risks that were missing required plans had been added to the risk registers in recent months, but others had been added more than 3 years earlier. Specifically, the 10 risks without mitigation plans were added from June to December 2018, and the 44 risks without contingency plans were added from June 2015 to December 2018. The one portfolio risk without a required mitigation plan was added in December 2018, and the five portfolio risks without required contingency plans were added in July 2015, July 2016, October 2017, August 2018, and December 2018, respectively. In some instances, a risk may not meet the Bureau’s criteria for requiring a mitigation or contingency plan when first added to the risk register. However, we found that all 10 risks without required mitigation plans and 37 of the 44 risks without required contingency plans met the Bureau’s criteria for requiring such plans within a month of being added to the register (of the 37 risks without a required contingency plan, five were at the portfolio level and 32 were at the program level). The Bureau’s decennial risk management plan states that mitigation and contingency plans should be developed as soon as possible after risks requiring such plans are added to the risk registers, but it does not include a clear time frame for doing so. According to the Bureau’s 2020 Census Portfolio Risk and Issue Process Manager—responsible for developing, maintaining, and administering the risk management process for both portfolio and program risks to the 2020 Census—no time frame is included because risk owners are aware of their responsibility and a specific time frame would not speed up the process given competing demands on their time. However, the official said the Bureau would consider adding a specific time frame when it updates the decennial risk management plan in 2019. Standards for Internal Control in the Federal Government (Standards for Internal Control) states that management should define objectives in specific terms—including the time frames for achievement—so that they are understood at all levels of the entity. In addition, OMB Circular No. A-123 states that effective risk management is systematic, structured, and timely. Without setting a clear time frame for developing mitigation and contingency plans, some risks may go without them for extended periods, potentially leaving the 2020 Census open to the impact of unmanaged risks. The Bureau’s decennial risk management plan requires that both portfolio and program risk registers include the word “draft” or “approved” alongside each contingency plan. As of December 2018, this status showed that 41 percent of contingency plans in the Bureau’s risk registers were still in draft form and had not been approved by management (29 percent at the portfolio level and 42 percent at the program level). Specifically, management had approved 60 of the 102 contingency plans (five at the portfolio level and 55 at the program level) but not the remaining 42 (two at the portfolio level and 40 at the program level). On the other hand, the Bureau’s decennial risk management plan includes no requirements for indicating the status of either portfolio or program risk mitigation plans in the risk registers. Our review of the risk registers found that some of the portfolio risk mitigation plans included the word “draft” alongside the plan, but none included any indication of whether the plan had been approved by management. In addition, none of the program risk mitigation plans indicated whether the plan was in draft or had been approved by management, but we found that at least some appeared to be in draft. For example, one program risk mitigation plan stated that the Risk Review Board had recommended contacting three individuals for next steps; however, the plan did not appear finalized because it did not discuss any next steps and it is not clear that further action had been taken. Although the Bureau had mitigation plans in place for 96 percent of risks that required them, without a clear indication of the status of these plans in the risk registers, we were unable to determine how many had been approved by management. According to Bureau officials, the risk registers are Bureau management’s primary source of information regarding risks to the census. Standards for Internal Control states that management should use quality information from reliable sources and clearly document internal controls to achieve the entity’s objectives and respond to risks. Including a clear indication of the status of both mitigation and contingency plans in the risk registers would help to support Bureau officials’ management of risks to the census; in addition, it would help to ensure that those plans are finalized and that the census is not left open to unmanaged risks. Of the 42 contingency plans awaiting approval, many had been added to the risk registers in recent months, but others had been added more than 4 years earlier. Specifically, the two portfolio risks were added in September 2014 and August 2017, and the 40 program risks were added from October 2015 to December 2018. Moreover, we found that both of the portfolio risks and 34 of the 40 program risks without finalized contingency plans met the Bureau’s criteria for requiring such a plan within a month of being added to the register. The Bureau’s decennial risk management plan requires risk owners to present mitigation and contingency plans to management for approval as soon as possible after risks requiring such plans are added to the risk registers. However, as with development of the mitigation and contingency plans, the Bureau’s decennial risk management plan does not include a clear time frame for doing so because, according to the Bureau’s 2020 Census Portfolio Risk and Issue Process Manager, a specific time frame would not speed up the process given competing demands on risk owners’ time. As previously noted, Standards for Internal Control states that management should define objectives in specific terms—including the time frames for achievement—so that they are understood at all levels of the entity. In addition, OMB Circular No. A- 123 states that effective risk management is systematic, structured, and timely. Without setting a clear time frame for approving draft mitigation and contingency plans, some risks may not be finalized. Mitigation and contingency plans assist agencies in managing and communicating to agency stakeholders the status of risks. We reviewed the mitigation and contingency plans for six portfolio-level risks to the 2020 Census which the Bureau identified as among the “major concerns that could affect the design or successful implementation of the 2020 Census” (see table 3). We found that the Bureau’s mitigation and contingency plans for these risks did not consistently include key information needed to manage them. These six risks, if not properly managed, could adversely affect the cost and quality of the 2020 Census. According to the Bureau’s decennial risk management plan, for each portfolio-level risk the risk owner must develop mitigation and contingency plans using the Bureau’s mitigation and contingency plan templates (see appendixes III and IV for the Bureau’s templates). Those templates require, among other things, that the Bureau specify key activities for reducing the likelihood of the risk and its impacts. We found that the Bureau’s decennial risk management plan generally aligns with our ERM framework which is designed to help agencies, among other actions, identify, assess, monitor, and communicate risks. However, we also found some instances where the Bureau’s risk management plan did not require mitigation and contingency plans to include certain key attributes we identified, which we discuss below. See figure 4 for a list of key attributes that we used when reviewing mitigation and contingency plans. As indicated in the attribute descriptions, six of the seven attributes are applicable to mitigation plans. Clearly defined trigger events do not apply to mitigation plans because they signal when a risk has been realized and contingency activities must begin. Each of the seven attributes are applicable to contingency plans, although two attributes—activity start and completion dates and activity implementation status—are only applicable if the risk has been realized. As of December 2018, the results of our review of the Bureau’s mitigation and contingency plans for the six portfolio-level risks we selected were in most cases mixed: some mitigation and contingency plans aligned with a particular key attribute, while others did not (see table 4). For two attributes—activity start and completion dates and activity implementation status—we found the Bureau generally included the relevant information across the six selected mitigation plans, which should help ensure that activities are carried out in a timely manner and that agency officials and stakeholders are informed and assured that the risks are being effectively managed. On the other hand, none of the mitigation or contingency plans included a monitoring plan, which would help the Bureau to track whether plans are working as intended. We found that where attributes are required but not consistently implemented, the gap stems from the Bureau not always holding risk owners accountable for fulfilling all of their risk management responsibilities, such as keeping plans up to date. Bureau officials responsible for overseeing risk management for the 2020 Census stated that they encourage risk owners to complete all of their risk management responsibilities; however, risk owners do not always do so because they have competing demands on their time. Therefore, the officials said they are generally satisfied if the risk owners have completed at least some of their risk management responsibilities. However, they also agreed that risk management should be among the Bureau’s top priorities and that risk owners should fulfill all of their risk management responsibilities. Bureau officials also stated that the Bureau is managing risks to the census, even if not always reflected in the mitigation and contingency plans. We acknowledge that the Bureau is taking actions to manage risks to the 2020 Census beyond those reflected in its mitigation and contingency plans. However, if these actions are reflected in disparate documents or are not documented at all, then Bureau officials, program managers, and other decision makers are left without an integrated and comprehensive picture of how the Bureau is managing risks to the 2020 Census. Consequently, the Bureau’s risk management efforts are neither clear nor transparent, which may create challenges for decision makers’ ability to quickly and accurately identify essential information to set priorities, allocate resources, and restructure their efforts, as needed, to ensure an accurate and cost-effective enumeration. In addition, where mitigation and contingency plans are not clearly documented and only certain individuals know about them, there is potential for the loss of organizational knowledge, particularly as key personnel change roles or leave the agency altogether. Below we provide examples of gaps, by attribute, in the Bureau’s mitigation and contingency plans for the six risks we reviewed. For each portfolio and program risk mitigation and contingency plan, the Bureau’s decennial risk management plan requires risk owners to enter a description of the plan in the relevant risk register. However, our review of risk register entries for both mitigation and contingency plans across all active risks as of December 2018 found they were missing some key attributes, including monitoring plans, activity start and completion dates for most activities, the implementation status for some activities, individuals responsible for activity completion, and clearly defined trigger events. In some instances, the missing attributes were a result of the Bureau not requiring them in the risk register descriptions. In other instances, where the Bureau’s decennial risk management plan does require the attribute in the risk register descriptions, the gap was due to the Bureau not holding risk owners accountable for them. Some of the attributes missing from the registers were included in the separate mitigation and contingency plans. However, at the program level there are no separate mitigation plans, making the risk registers the only source of information for program-level mitigation activities. According to Bureau officials, after the 2020 Census they plan to require separate mitigation plans for program risks as well. At the same time, Bureau officials noted that they primarily rely on the risk registers to monitor risks to the census and usually do not refer to the separate mitigation and contingency plans. Standards for Internal Control states that management should use quality information from reliable sources that is appropriate, current, complete, accurate, accessible, and provided on a timely basis to achieve the entity’s objectives. Similarly, OMB Circular No. A-123 states that effective risk management is based on the best available information. Because the risk registers are Bureau management’s primary source of information regarding risks to the census—and currently their only source of information on program-level risk mitigation—including this information in the risk registers would help to support Bureau officials’ ability to manage risks to the 2020 Census. The Bureau has designed an approach for managing fraud risk for responses to the 2020 Census. We found that the approach generally aligns with leading practices in the commit, assess, and design and implement components of the Fraud Risk Framework. Specifically, the Bureau demonstrated commitment to combating fraud by creating a dedicated entity to lead antifraud efforts for the 2020 Census, conducted a fraud risk assessment, and developed a risk response plan, among other actions, consistent with leading practices from the selected components. However, the Bureau has not yet determined the program’s fraud risk tolerance or outlined plans for referring potential fraud to the Department of Commerce Office of Inspector General (OIG) to investigate. Bureau officials described plans and milestones to address these steps but not for updating the antifraud strategy to include them. Standards for Internal Control states that management should clearly document internal controls to achieve the entity’s objectives and respond to risks. In addition, management should use quality information that is current and complete. Updating the antifraud strategy to include the Bureau’s fraud risk tolerance and plan for OIG referral will help to ensure that the strategy is current, complete, and conforms to leading practices. Appendix IV presents additional details of our review of applicable leading practices. Managers of federal programs maintain the primary responsibility for enhancing program integrity and managing fraud risks. Those who are effective at managing their fraud risks collect and analyze data, identify fraud trends, and use the information to improve fraud risk management activities. Implementing effective fraud risk management processes is important to help ensure that federal programs fulfill their intended purpose, funds are spent effectively, and assets are safeguarded. The Fraud Risk Framework provides a comprehensive set of leading practices that serve as a guide for agency managers developing and enhancing efforts to combat fraud in a strategic, risk-based manner. The Fraud Risk Framework is also aligned with Principle 8 (“Assess Fraud Risk”) of Standards for Internal Control. It is designed to focus on preventive activities, which generally offer the most cost-efficient use of resources. The leading practices in the Fraud Risk Framework are organized into four components—commit, assess, design and implement, and evaluate and adapt—as depicted in figure 5. The commit component of the Fraud Risk Framework calls for an agency to commit to combating fraud by creating an organizational culture and structure conducive to fraud risk management. This component includes demonstrating a senior-level commitment to integrity and combating fraud, and establishing a dedicated entity to lead fraud risk management activities. The Bureau has taken steps that align with all applicable leading practices in this component, according to our review. Specifically, senior- level commitment to combating fraud helps create an organizational culture to combat fraud. The Bureau showed this commitment by creating an antifraud group, made up of multiple operational divisions within the Bureau—the Decennial Census Management Division, Decennial Information Technology Division, and Decennial Contracts Execution Office—and staff from the Bureau’s technical integration contractor. Staff from these divisions make up the Self-Response Quality Assurance (SRQA) group with the primary purpose of identifying and responding to potentially fraudulent responses received in the 2020 Census. SRQA members were assigned roles and responsibilities to combat fraud in the 2020 Census. According to the framework, antifraud entities should understand the program and its operations; have defined responsibilities and the necessary authority across the program; and have a direct reporting line to senior-level managers within the agency. We found that SRQA met these leading practices through our interviews with knowledgeable officials who discussed the Bureau’s strategy for managing fraud risk for the 2020 Census, and our review of documentation such as the fraud risk assessment, which listed roles and responsibilities for staff from the divisions in the antifraud group and the technical integration contractor. The group also directly reports to senior-level managers within the agency through weekly status reports that include milestones, activities, and challenges. According to the Fraud Risk Framework, the antifraud entity, among other things, serves as the repository of knowledge on fraud risks and controls; manages the fraud risk-assessment process; leads or assists with trainings and other fraud-awareness activities; and coordinates antifraud initiatives across the program. The Bureau staffed the antifraud entity with members knowledgeable of the program and tasked them with managing the fraud risk assessment process. Also, the members facilitated communication with management and among stakeholders on fraud- related issues through weekly status reports. According to SRQA officials, issues and concerns are escalated to senior-level managers on an as- needed basis so they can be coordinated across the program. The assess component of the Fraud Risk Framework calls for federal managers to plan regular fraud risk assessments and to assess risks to determine a fraud risk profile. This includes assessing the likelihood and effect of fraud risks and determining a risk tolerance. Risk tolerance is the acceptable level of variation in performance relative to the achievement of objectives. In the context of fraud risk management, if the objective is to mitigate fraud risks—in general, to have a low level of fraud—the risk tolerance reflects managers’ willingness to accept a higher level of fraud risks. Risk tolerance can be either qualitative or quantitative, but regardless of the approach, Standards for Internal Control states that managers should consider defining risk tolerances that are specific and measurable. The first part of the fraud risk assessment process includes leading practices on tailoring the assessment to the program; planning to conduct assessments both at regular intervals and when there are changes to the program or operating environment; identifying specific tools, methods, and sources for gathering information about fraud risks; and involving relevant stakeholders in the assessment process. The Bureau has met all the leading practices in the first part of the assess component, according to our review. Specifically, the Bureau tailored the fraud risk assessment to the 2020 Census as this is the first time an internet-response option will be available for a decennial census in the United States. To identify specific tools, methods, and sources for gathering information about fraud risks, the Bureau met with relevant stakeholders, along with subject- matter experts, and conducted focus groups to develop various fraud scenarios that became a key part of the assessment. The Bureau also involved relevant stakeholders in the assessment process by outlining their roles and responsibilities for the 2020 Census. For example, the Decennial Census Management Division serves as the fraud lead and oversees managing risks such as operational implementation, methodology, and workload demands with support from the other operational divisions in the antifraud group. According to the Fraud Risk Framework while the timing can vary, effective antifraud entities plan to conduct fraud risk assessments at regular intervals and when there are changes to the program or operating environment, as fraud risk assessments are iterative and not meant to be onetime exercises. The Bureau’s assessment takes this into account by acknowledging that risk assessment is an ongoing process. The assessment also states that the SRQA team will continue to evaluate and develop modeling techniques to train against existing fraud scenarios, and SRQA welcomes input from all stakeholders to ensure the Bureau identifies fraud risks, and works to implement controls and mitigation plans throughout the 2020 Census. The second part of the fraud risk assessment process includes identifying inherent fraud risks affecting the program; assessing the likelihood and effect of inherent fraud risks; determining a fraud risk tolerance; examining the suitability of existing fraud controls and prioritizing residual fraud risks; and documenting the program’s fraud risk profile (see figure 6). The Bureau met three out of these five leading practices, including identifying inherent fraud risk; assigning numeric rankings for likelihood and impact of various fraud scenarios; and documenting the 2020 Census fraud risk profile, which outlines the strengths and weaknesses of the program. We concluded that one leading practice, examining the suitability of existing fraud controls and prioritizing residual fraud risks, was not applicable since the fraud detection system is new to the 2020 Census and changes the way the Bureau will detect different fraud scenarios. As a result, all fraud risks for the 2020 Census are residual risks. In reviewing the remaining leading practice in the fraud assessment processes, we found that after identifying inherent fraud risk and assigning numeric rankings for likelihood and impact of various fraud scenarios, the Bureau did not take the next step to determine a fraud risk tolerance. Some of the steps the Bureau took to develop a risk response plan are similar to steps for developing a fraud risk tolerance. Specifically, the Bureau developed a process that classifies self-responses into risk categories of low, medium, or high. Bureau officials stated that they plan to use the classification to determine appropriate follow-up steps based on risk scores generated by its Fraud Detection Analytics Model that was develop by SRQA for the 2020 Census. However, the Bureau did not define thresholds for the low-, medium-, and high-risk categories. These thresholds, if defined, would meet the intent of a fraud risk tolerance by indicating the acceptable level of variation in self-responses. SRQA officials stated that they are developing these thresholds, and therefore its fraud risk tolerance, and plan to have them completed in August 2019. This includes reviewing available information collected through the 2018 End-to-End Test, running simulations, defining thresholds, and then evaluating the results to make adjustments. Responses will receive a score, but until the Bureau defines fraud risk tolerance thresholds for the low-, medium-, and high-risk categories, it cannot effectively implement its antifraud strategy to allocate responses for follow-up or inclusion. This may also affect the Bureau’s ability to evaluate and adapt its antifraud strategy if initial benchmarks are not in place to use for monitoring, with subsequent adjustments potentially requiring additional time and resources. While officials described steps and time frames to develop a fraud risk tolerance, they did not do so for updating the antifraud strategy to include the tolerance. Updating the antifraud strategy to include the Bureau’s fraud risk tolerance will help to ensure that the strategy is current, complete, and conforms to leading practices. The design and implement component of the Fraud Risk Framework calls for federal managers to design and implement a strategy with specific control activities to mitigate assessed fraud risks and collaborate to help ensure effective implementation. This includes determining risk responses and documenting an antifraud strategy; designing and implementing specific control activities; developing a plan outlining how the program will respond to identified instances of fraud; and establishing collaborative relationships and creating incentives to help ensure effective implementation of the antifraud strategy. For determining risk responses and documenting an antifraud strategy, the framework states that managers should (a) use the fraud risk profile to help decide how to allocate resources to respond to residual fraud risks; (b) develop, document, and communicate an antifraud strategy to employees and stakeholders that describes the program’s activities for preventing, detecting, and responding to fraud, as well as monitoring and evaluation; (c) establish roles and responsibilities of those involved in fraud risk management activities, such as the antifraud entity and external parties responsible for fraud controls, and communicate the role of the Office of Inspector General (OIG) to investigate potential fraud; (d) create timelines for implementing fraud risk management activities, as appropriate, including monitoring and evaluations; (e) demonstrate links to the highest internal and external residual fraud risks outlined in the fraud risk profile; and (f) link antifraud efforts to other risk management activities, if any. The Bureau developed and documented an antifraud strategy (the fraud risk assessment and the risk response plan) and communicated it to applicable employees. Bureau officials provided final versions of the antifraud strategy in October 2018 and stated that all stakeholders were provided with excerpts applicable to their area. The antifraud strategy outlines the beginning and end dates for fraud detection operations, and links to the highest residual fraud risks. The risk response includes links to other risk management activities such as a security layer that is designed, created, and maintained by the technical integration contractor security group in coordination with the Office of Information Security and Decennial Information Technology Division. According to the risk response plan, this group protects the fraud detection system and its associated systems from outside attacks such as hacks and distributed denial of service attacks. However, we found that the Bureau’s approach to managing fraud risk did not fully align with two leading practices in this component. First, until the Bureau defines its fraud risk tolerances, such as defining low-, medium-, or high-risk thresholds, it will not be able to effectively allocate resources to respond to residual fraud risks consistent with the Fraud Risk Framework’s leading practices. Second, the Bureau did not initially coordinate with the Department of Commerce (Commerce) OIG about its antifraud strategy, which is not consistent with the leading practices. Such lack of coordination could have precluded the OIG from determining if potentially fraudulent activities should be investigated. After discussing the results of our review with the Bureau, the Bureau contacted and met with the Commerce OIG in February 2019. Based on the Bureau’s notes from this meeting, the Bureau is on track to addressing the leading practice regarding coordination. The framework states that to design and implement specific control activities to prevent and detect fraud, managers should (a) focus on fraud prevention over detection; (b) consider the benefits and costs of control activities to address identified residual risks; and (c) design and implement the control activities such as data-analytics to prevent and detect fraud. The 2020 Census antifraud control activities focus on detecting potentially fraudulent responses. The Bureaus plans to use a combination of data analytics and follow up to review response data before they are added to the Bureau’s overall Census counts. The Bureau’s efforts for the 2020 Census also focus on minimizing costs. Specifically, if the Bureau’s fraud detection can minimize the amount of cases that require manual investigation or work by field operations staff to collect the information again, it can reduce the cost and workload to the Bureau. The framework states the antifraud strategy should also ensure that responses to identified instances of fraud are prompt and consistent. In addition, effective managers of fraud risks are to refer instances of potential fraud to the OIG or other appropriate parties, such as law- enforcement entities or the Department of Justice, for further investigation. The Bureau’s plan describes its process for scoring responses using its Fraud Detection Analytics Model and then sorting responses into a low-, medium-, or high-risk category. The plan also outlines risk responses that depend on the risk category. For example, medium-risk responses are reviewed internally and could be incorporated into the census count or sent for additional follow up. However, the Bureau’s antifraud strategy does not call for instances of potential fraud to be referred to the Commerce OIG. Specifically, the Bureau’s fraud risk assessment and risk response plan do not mention the Commerce OIG. Bureau officials stated that the Commerce OIG did not participate in the development of these documents. In February 2019, after we discussed the results of our review with the Bureau, the Bureau met with the Commerce OIG to discuss potential referrals. As a result, the Bureau agreed to develop and share with the Commerce OIG a plan that outlines a potential referral process by summer 2019. Managers who effectively manage fraud risks collaborate and communicate with stakeholders to share information on fraud schemes and the lessons learned from fraud control activities. The framework describes collaborative relationships as including other offices within the agency; federal, state, and local agencies; private-sector partners; law- enforcement entities; and entities responsible for control activities. In addition, managers should collaborate and communicate with the OIG to improve their understanding of fraud risks and align their efforts to address fraud. The Bureau collaborated internally with groups such as the Security Operations Center that maintain the security layer that protects Bureau systems and the nonresponse follow-up groups that visit households to collect information again. The Bureau also provided contractors with guidance by finalizing the antifraud strategy and incentives by entering into an agreement with the technical integrator contractor, which allows the Bureau to exercise an option to continue the contract for another year. However, the Bureau did not begin to collaborate and communicate with the Commerce OIG to improve its understanding of fraud risks and align efforts to address fraud until after we discussed the results of our review with the Bureau. Bureau officials viewed the primary purpose of the fraud detection system as a way to improve data reliability, according to interviews. As a result, in 2018, the Bureau changed the name of the operation from Fraud Detection to SRQA. According to Bureau officials, the change better reflects the operation’s focus on detecting potential falsification in decennial census response data and referring suspected responses to a field resolution operation to collect the data again. Bureau officials initially stated that SRQA would not conduct investigations that lead to the kind of law enforcement activities traditionally associated with fraud detection. As mentioned above, the Bureau met with the Commerce OIG in February 2019 to discuss the potential for referrals and, according to the Bureau, initiate a process for doing so. However, officials did not discuss steps and a time frame for updating the antifraud strategy to include this process. Doing so will help to ensure that the strategy is current, complete, and conforms to leading practices. Adequately addressing risks to the census is critical for ensuring a cost- effective and high-quality enumeration. The Bureau has taken important steps to address risks to the 2020 Census, but with less than a year until Census Day, the Bureau has not developed mitigation and contingency plans for all risks that require them. In addition, the Bureau does not have clear time frames for developing and obtaining management approval of mitigation and contingency plans, and some risks have gone without required plans for months and years. Moreover, the status of some plans is unclear and not all plans have received management approval. Some of the plans the Bureau has developed are missing key attributes we identified for helping to ensure the plans contain the information needed to manage risks. For example, none of the Bureau’s plans described how the Bureau will monitor the risk response, so the Bureau may not be able to track whether the plans are working as intended. These issues have arisen in some instances because the Bureau’s decennial risk management plan does not require mitigation and contingency plans to have each of the seven key attributes we identified; in other instances, the issues have arisen because Bureau officials do not always hold risk owners accountable for fulfilling all their risk management responsibilities. Consistently documenting risk management activities would support management’s ability to more quickly make informed decisions in response to risks confronting the 2020 Census. It would also help protect the Bureau from losing institutional knowledge in the event risk owners change roles or leave the agency. The Bureau’s fraud risk strategy generally aligned with our Fraud Risk Framework, including developing response plans and collaborating internally to address risks. However, the Bureau has not yet determined the program’s fraud risk tolerance or outlined a plan for referring potential fraud to the Commerce OIG to investigate, but plans to do so later this year. Setting a tolerance would help the Bureau monitor risks, and referring potential fraud to the Commerce OIG would allow it to determine if further investigation is appropriate. In addition to taking these actions, updating the antifraud strategy to include the Bureau’s fraud risk tolerance and plan for OIG referral will help to ensure that the strategy is current, complete, and conforms to leading practices. We are making the following seven recommendations to the Department of Commerce and the Census Bureau: The Secretary of Commerce should ensure that the Director of the Census Bureau develops and obtains management approval of mitigation and contingency plans for all risks that require them. (Recommendation 1) The Secretary of Commerce should ensure that the Director of the Census Bureau updates the Bureau’s decennial risk management plan to include clear time frames for developing and obtaining management approval of mitigation and contingency plans. (Recommendation 2) The Secretary of Commerce should ensure that the Director of the Census Bureau updates the Bureau’s decennial risk management plan to require that portfolio and program risk registers include a clear indication of the status of mitigation plans. (Recommendation 3) The Secretary of Commerce should ensure that the Director of the Census Bureau updates the Bureau’s decennial risk management plan to require that risk mitigation and contingency plans, including the risk register descriptions and separate plans, have the seven key attributes for helping to ensure they contain the information needed to manage risk. (Recommendation 4) The Secretary of Commerce should ensure that the Director of the Census Bureau holds risk owners accountable for carrying out their risk management responsibilities. (Recommendation 5) The Secretary of Commerce should ensure that the Director of the Census Bureau updates the Bureau’s antifraud strategy to include a fraud risk tolerance prior to beginning the 2020 Census and adjust as needed. (Recommendation 6) The Secretary of Commerce should ensure that the Director of the Census Bureau updates the Bureau’s antifraud strategy to include the Bureau’s plans for referring instances of potential fraud to the Department of Commerce Office of Inspector General for further investigation. (Recommendation 7) We provided a draft of this report to the Secretary of Commerce. In its written comments, reproduced in appendix V, the Department of Commerce agreed with our findings and recommendations and said it would develop an action plan to address them. The Census Bureau also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the Secretary of Commerce, the Director of the U.S. Census Bureau, and the appropriate congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report please contact Robert Goldenkoff at (202) 512-2757 or goldenkoffr@gao.gov or Rebecca Shea at (202) 512-6722 or shear@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. The objectives of this study were to examine (1) what risks to the 2020 Census the Census Bureau (Bureau) has identified, (2) the risks for which the Bureau has mitigation and contingency plans, (3) the extent to which the Bureau’s mitigation and contingency plans included information needed to manage risk, and (4) the extent to which the Bureau’s approach to managing fraud risks to the 2020 Census aligns with leading practices outlined in our Fraud Risk Framework. To answer the first three objectives, we reviewed Bureau documentation regarding its approach to managing risks facing the 2020 Census, including its decennial risk management plan, operational plan, governance management plan, Risk Review Board meeting minutes and agendas, and guidance and training documents. In addition, we interviewed Bureau officials responsible for overseeing risk management for the 2020 Census. To describe what risks to the 2020 Census the Bureau has identified and the risks for which the Bureau has mitigation and contingency plans, we also reviewed the Bureau’s portfolio- and program-level decennial risk registers. To assess the extent to which the Bureau’s mitigation and contingency plans included information needed to manage risk, we selected a nongeneralizable sample of six risks from the Bureau’s risk registers based on factors such as likelihood of occurrence and potential impact (see table 3). To select these risks, we began with the 12 risks identified by the Bureau in its 2020 Census Operational Plan as the “major concerns that could affect the design or successful implementation of the 2020 Census.” Next, we sorted the risks by numerical priority rating as of June 2018, a Bureau-assigned figure calculated by multiplying numerical scores for likelihood of occurrence and potential impact (see figure 3). We then selected the six risks with the highest priority ratings. For each selected risk, we reviewed relevant Bureau documentation—including risk mitigation and contingency plans—and we conducted semistructured interviews with the Bureau officials responsible for managing the risk. In addition, drawing principally from our Enterprise Risk Management (ERM) framework as well as secondary sources, we identified seven key attributes for risk mitigation and contingency plans to help ensure they contain the information needed to manage risks (see figure 4). Specifically, we reviewed our ERM framework and other relevant prior work on risk management, as well as commonly used risk management publications from sources including the Office of Management and Budget, the Project Management Institute, and the Chief Financial Officers Council and Performance Improvement Council. We analyzed these publications to identify portions relevant to risk mitigation and contingency planning. Next, we synthesized the information and derived attributes that appeared most important for effective risk mitigation and contingency plans. We assessed the attributes against the essential elements laid out in our ERM framework and found that each attribute aligned with one or more of the elements. Six of the seven attributes—all but clearly defined trigger events—are applicable to mitigation plans. Each of the seven attributes are applicable to contingency plans, although two attributes—activity start and completion dates and activity implementation status—are only applicable if the risk has been realized. We assessed the risk mitigation and contingency plans entered in the Bureau’s risk registers as of December 2018, as well as the separate mitigation and contingency plans for the six selected risks, against the seven key attributes. To evaluate the extent to which the Bureau’s approach to managing fraud risks to the 2020 Census aligns with leading practices outlined in our Fraud Risk Framework, we reviewed Bureau documentation related to the 2020 Census antifraud strategy. This strategy includes a fraud risk assessment that identifies and evaluates scenarios in which fraudulent activity could impact the 2020 Census results. It also includes a concept of operations that uses the fraud risk assessment to develop risk responses and its fraud detection systems. In addition, we interviewed Bureau officials responsible for antifraud efforts for the 2020 Census. We evaluated the information gathered based on the commit, assess, and design and implement components of our Fraud Risk Framework. Our assessment was limited to a review of the presence or absence of leading practices from the framework, not whether they were sufficient. We also did not review the leading practices for the “evaluate and adapt” component of the framework. This component focuses on evaluating outcomes using a risk-based approach and then adapting activities established in the other components to improve fraud risk management. Because the census is not scheduled to start until 2020, the Bureau will not be able to implement leading practices such as: monitoring and evaluating the effectiveness of preventive activities; measuring outcomes, in addition to outputs, of fraud risk management or using the results of monitoring and evaluations to improve the design and implementation of fraud risk management activities. We conducted this performance audit from May 2018 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: U.S. Census Bureau Operations Supporting the 2020 Census Purpose Define and implement program management policies, processes, and the control functions for planning and implementing the 2020 Census to ensure an efficient and well- managed program. Manage the delivery of an Information Technology (IT) “System of Systems” to meet 2020 Census business and capability requirements. Ensure all 2020 Census operations and systems adhere to laws, policies, and regulations that ensure appropriate systems and data security, and protect respondent and employee privacy and confidentiality. Identify and finalize content and design of questionnaires and other associated nonquestionnaire materials. Ensure consistency across data collection modes and operations. Provide optimal design and content of the questionnaires to encourage high response rates. Assess and support language needs of non-English speaking populations. Determine the number of non-English languages and level of support for the 2020 Census. Optimize the non-English content of questionnaires and associated nonquestionnaire materials across data collection modes and operations. Ensure cultural relevancy and meaningful translation of 2020 Census questionnaires and associated nonquestionnaire materials. Provide the geographic foundation to support 2020 Census data collection and tabulation activities within the Master Address File/Topologically Integrated Geographic Encoding and Referencing System. This system serves as the national repository for all spatial, geographic, and residential address data needed for census and survey data collection, data tabulation, data dissemination, geocoding services, and map production. Provide an opportunity for tribal, federal, state, and local governments to review and improve the address lists and maps used to conduct the 2020 Census as required by Public Law 103-430. Deliver a complete and accurate address list and spatial database for enumeration and determining the type and address characteristics for each living quarter. Print and distribute internet invitation letters, reminder cards or letters or both, questionnaire mailing packages, and materials for other special operations, as required. Other materials required to support field operations are handled in the Decennial Logistics Management operation. Capture and convert data from the 2020 Census paper questionnaires, including mail receipt, document preparation, scanning, optical character and mark recognition, data delivery, checkout, and form destruction. Communicate the importance of participating in the 2020 Census to the entire population of the 50 states, the District of Columbia, and Puerto Rico to support field recruitment efforts, engage and motivate people to self-respond (preferably via the internet), raise and keep awareness high throughout the entire 2020 Census to encourage response, and effectively support dissemination of Census data to stakeholders and the public. Internet Self-Response Maximize online response to the 2020 Census via contact strategies and improved access for respondents. Collect response data via the internet to reduce paper and nonresponse follow-up. Purpose Make it easy for people to respond anytime and anywhere to increase self-response rates by providing response options that do not require a unique Census ID. Maximize real-time matching of non-ID respondent addresses to the census living quarters address inventory, assigning nonmatching addresses to census blocks. Update the address and feature data and enumerate respondents in person. Designated to occur in areas where the initial visit requires enumerating while updating the address frame, particularly in remote geographic areas that have unique challenges associated with accessibility. Update the address and feature data and leave a choice questionnaire package at every housing unit identified to allow the household to self-respond. Designed to occur in areas where the majority of housing units do not have a city-style address to receive mail. Enumerate people living or staying in group quarters and provide an opportunity for people experiencing homelessness and receiving service at service-based locations, such as soup kitchens, to be counted in the census. Enumerate individuals in occupied units at transitory locations who do not have a usual home elsewhere, such as recreational vehicle parks, campgrounds, racetracks, circuses, carnivals, marinas, hotels, and motels. Provide questionnaire assistance for respondents by answering questions about specific items on the census form or other frequently asked questions about the 2020 Census, and provide an option for respondents to complete a census interview over the telephone. Also provide outbound calling support of nonresponse follow-up reinterview and coverage improvement. Determine housing unit status for nonresponding addresses that do not self-respond to the 2020 Census and enumerate households that are determined to have a housing unit status of occupied. Create and distribute the initial 2020 Census enumeration universe, assign the specific enumeration strategy for each living quarter based on case status and associated paradata, create and distribute workload files required for enumeration operations, track case enumeration status, run postdata collection processing actions in preparation for producing the final 2020 Census results, and check for fraudulent returns. Obtain counts by home state of U.S. military and federal civilian employees stationed or deployed overseas and their dependents living with them. Prepare and deliver the 2020 Census population counts to the President of the United States for congressional apportionment, tabulate and disseminate 2020 Census data products for use by the states for redistricting, and tabulate and disseminate 2020 Census data for use by the public. Provide to each state the legally required Public Law 94-171 redistricting data tabulations by the mandated deadline of 1 year from Census Day (April 1, 2021). Enhance the accuracy of the 2020 Census through remediating potential gaps in coverage by implementing an efficient and equitable process to identify and correct missing or geographically misallocated large group quarters and their population, and positioning remaining count issues for a smooth transition to the Count Question Resolution Operation. Provide a mechanism for governmental units to challenge their official 2020 Census results. Purpose Coordinate storage of the materials and data and provide 2020 Census records deemed permanent, including files containing individual responses, to the National Archives and Records Administration and to the National Processing Center to use as source materials to conduct the Age Search Service. Also store data to cover in-house needs. Island Areas Censuses Enumerate all residents of American Samoa, the Commonwealth of the Northern Mariana Islands, Guam, and the U.S. Virgin Islands; process and tabulate the collected data; and disseminate data products to the public. Develop the survey design and sample for the Post-Enumeration Survey of the 2020 Census and produce estimates of census coverage based on the Post-Enumeration Survey. Identify matches, nonmatches, and discrepancies between the 2020 Census and the Post-Enumeration Survey for both housing units and people in the same areas. Both computer and clerical components of matching are conducted. Collect person and housing unit information (independent from the 2020 Census operations) for the sample of housing units in the Post-Enumeration Survey to help understand census coverage and to detect erroneous enumerations. Document how well the 2020 Census was conducted, and analyze, interpret, and synthesize the effectiveness of census components and their impact on data quality or coverage or both. Measure the success of critical 2020 Census operations. Formulate and execute an experimentation program to support early planning and inform the transition and design of the 2030 Census and produce an independent assessment of population and housing unit coverage. Support 2020 Census field operations for decennial staff (i.e., headquarters, PDC, Regional Census Center, Area Census Office, Island Areas Censuses, remote workers, and listers/enumerators.) Provide the administrative infrastructure for data collection operations covering the 50 states, the District of Columbia, and Puerto Rico. Coordinate space acquisition and lease management for the regional census centers, area census offices, and the Puerto Rico area office; and provide logistics management support services (e.g., kit assembly, supplies to field staff). Provide the IT-related Infrastructure support to the 2020 Census, including enterprise systems and applications, 2020 Census-specific applications, Field IT infrastructure, mobile computing, and cloud computing. For the 2020 Census, the Census Bureau (Bureau) is trying to increase participation and reduce costs by offering more self-response options to households. This includes self-responses received via internet, phone, or mail. In 2018, the Self-Response Quality Assurance group finalized its antifraud strategy that includes a fraud risk assessment and risk response plan that focuses specifically on these responses. We developed a data collection instrument to structure our review of the antifraud strategy as it related to the commit, assess, and design and implement components of our Fraud Risk Framework. Our assessment was limited to a review of the presence or absence of leading practices from the framework, not whether they were sufficient. We also did not assess the Bureau’s approach against leading practices in the “evaluate and adapt” component of the framework because the Bureau will not be able to implement practices in this component until the 2020 Census begins. The following table summarizes our comparison of the Bureau’s antifraud strategy to leading practices in the fraud risk framework. In addition to the contacts named above, Lisa Pearson and Philip Reiff (Assistant Directors), Emmy Rhine Paule and Ariel Vega (Analysts-in- Charge), Carole Cimitile, Ann Czapiewski, Robert Gebhart, Maria McMullen, Ty Mitchell, James Murphy, Carl Ramirez, Kayla Robinson, Kate Sharkey, Andrea Starosciak, Michael Steinberg, Umesh Thakkar, and Jon Ticehurst made significant contributions to this report.", "summary": "With less than 1 year until Census Day, many risks remain. For example, the Bureau has had challenges developing critical information technology systems, and new innovations—such as the ability to respond via the internet—have raised questions about potential security and fraud risks. Fundamental to risk management is the development of risk mitigation and contingency plans to reduce the likelihood of risks and their impacts, should they occur. GAO was asked to review the Bureau's management of risks to the 2020 Census. This report examines (1) what risks the Bureau has identified, (2) the risks for which the Bureau has mitigation and contingency plans, (3) the extent to which the plans included information needed to manage risk, and (4) the extent to which the Bureau's fraud risk approach aligns with leading practices in GAO's Fraud Risk Framework. GAO interviewed officials, assessed selected mitigation and contingency plans against key attributes, and assessed the Bureau's approach to managing fraud risk against GAO's Fraud Risk Framework. As of December 2018, the Census Bureau (Bureau) had identified 360 active risks to the 2020 Census. Of these, 242 required a mitigation plan and 232 had one; 146 required a contingency plan and 102 had one (see table). Mitigation plans detail how an agency will reduce the likelihood of a risk event and its impacts, if it occurs. Contingency plans identify how an agency will reduce or recover from the impact of a risk after it has been realized. Bureau guidance states that these plans should be developed as soon as possible after a risk is added to the risk register, but it does not establish clear time frames for doing so. Consequently, some risks may go without required plans for extended periods. GAO reviewed the mitigation and contingency plans in detail for six risks which the Bureau identified as among the major concerns that could affect the 2020 Census. These included cybersecurity incidents and integration of the 52 systems and 35 operations supporting the census. GAO found that the plans did not consistently include key information needed to manage the risk. For example, three of the mitigation plans and five of the contingency plans did not include all key activities. Among these was the Bureau's cybersecurity mitigation plan. During an August 2018 public meeting, the Bureau's Chief Information Officer discussed key strategies for mitigating cybersecurity risks to the census—such as reliance on other federal agencies to help resolve threats—not all of which were included in the mitigation plan. GAO found that gaps stemmed from either requirements missing from the Bureau's decennial risk management plan, or that risk owners were not fulfilling all of their risk management responsibilities. Bureau officials said that risk owners are aware of these responsibilities but do not always fulfill them given competing demands. Bureau officials also said that they are managing risks to the census, even if not always reflected in their mitigation and contingency plans. However, if such actions are reflected in disparate documents or are not documented at all, then decision makers are left without an integrated and comprehensive picture of how the Bureau is managing risks to the census. The Bureau has designed an approach for managing fraud risk to the 2020 Census that generally aligns with leading practices in the commit, assess, and design and implement components of GAO's Fraud Risk Framework. However, the Bureau has not yet determined the program's fraud risk tolerance or outlined plans for referring potential fraud to the Department of Commerce Office of Inspector General (OIG) to investigate. Bureau officials described plans to take these actions later this year, but not for updating the antifraud strategy. Updating this strategy to include the Bureau's fraud risk tolerance and OIG referral plan will help ensure the strategy is current, complete, and conforms to leading practices. GAO is making seven recommendations, including that the Bureau set clear time frames for developing mitigation and contingency plans, require that mitigation and contingency plans include all key attributes, hold risk owners accountable for carrying out their risk management responsibilities, and update its antifraud strategy to include a fraud risk tolerance and OIG referral plan. The Department of Commerce agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "We reported in September 2017 that, while estimates of the economic effects of climate change are imprecise due to modeling and information limitations, they can convey useful insight into broad themes about potential damages in the United States. We reported that, according to the two national-scale studies available at the time that examined the economic effects of climate change across U.S. sectors, potential economic effects could be significant and these effects will likely increase over time for most of the sectors analyzed. For example, for 2020 through 2039, one of the studies estimated from $4 billion to $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms. In addition, the national-scale studies we reviewed and several experts we interviewed for the September 2017 report suggested that potential economic effects could be unevenly distributed across sectors and regions. For example, one of the studies estimated that the Southeast, Midwest, and Great Plains regions will likely experience greater combined economic effects than other regions, largely because of coastal property damage in the Southeast and changes in crop yields in the Midwest and Great Plains (see figure 1). This is consistent with the findings of the Fourth National Climate Assessment. For example, according to that assessment, the continued increase in the frequency and extent of high-tide flooding due to sea level rise threatens America’s trillion-dollar coastal property market and public infrastructure sector. As we reported in September 2017, information on the potential economic effects of climate change could help federal decision makers better manage climate risks, according to leading practices for climate risk management, economic analysis we reviewed, and the views of several experts we interviewed. For example, such information could inform decision makers about significant potential damages in different U.S. sectors or regions. According to several experts and our prior work, this information could help federal decision makers identify significant climate priorities as an initial step toward managing climate risks. Such a first step is consistent with leading practices for climate risk management and federal standards for internal control. For example, leading practices from the National Academies call for climate change risk management efforts that focus on where immediate attention is needed. As noted in our September 2017 report, according to a 2010 National Academies report, other literature we reviewed, and several experts we interviewed, to make informed choices, decision makers need more comprehensive information on economic effects to better understand the potential costs of climate change to society and begin to develop an understanding of the benefits and costs of different options for managing climate risks. The federal government faces fiscal exposure from climate change risks in a number of areas, and this exposure will likely increase over time, as we concluded in September 2017. In the March 2019 update to our High-Risk List, we summarized our previous work that identified several of these areas across the federal government, including programs related to the following: Disaster aid. The rising number of natural disasters and increasing reliance on federal assistance are a key source of federal fiscal exposure, and this exposure will likely continue to rise. Since 2005, federal funding for disaster assistance is at least $450 billion. In September 2018, we reported that four hurricane and wildfire disasters in 2017 created an unprecedented demand for federal disaster resources and that hurricanes Harvey, Irma, and Maria ranked among the top five costliest hurricanes on record. Subsequently, the fall of 2018 brought additional catastrophic disasters such as Hurricanes Florence and Michael and devastating California wildfires, with further needs for federal disaster assistance. Disaster costs are projected to increase as certain extreme weather events become more frequent and intense due to climate change—as observed and projected by USGCRP. In July 2015, we reported that the federal government does not adequately plan for disaster resilience and that most federal funding for hazard mitigation is available after a disaster. In addition, our prior work found that the Federal Emergency Management Agency’s (FEMA) indicator for determining whether to recommend that a jurisdiction receive disaster assistance—which was set in 1986—is artificially low because it does not accurately reflect the ability of state and local governments to respond to disasters. Without an accurate assessment of a jurisdiction’s capability to respond to a disaster without federal assistance, we found that FEMA runs the risk of recommending that the President award federal assistance to jurisdictions that have the capability to respond and recover on their own. Federal insurance for property and crops. The National Flood Insurance Program (NFIP) and the Federal Crop Insurance Corporation are sources of federal fiscal exposure due, in part, to the vulnerability of the insured property and crops to climate change. These programs provide coverage where private markets for insurance do not exist, typically because the risk associated with the property or crops is too great to privately insure at a cost that buyers are willing to accept. From 2013 to 2017, losses paid under NFIP and the federal crop insurance program totaled $51.3 billion. Federal flood and crop insurance programs were not designed to generate sufficient funds to fully cover all losses and expenses, which means the programs need budget authority from Congress to operate. The NFIP, for example, was about $21 billion in debt to the Treasury as of April 2019. Further, the Congressional Budget Office estimated in May 2019 that federal crop insurance would cost the federal government an average of about $8 billion annually from 2019 through 2029. Operation and management of federal property and lands. The federal government owns and operates hundreds of thousands of facilities and manages millions of acres of land that could be affected by a changing climate and represent a significant federal fiscal exposure. For example, the Department of Defense (DOD) owns and operates domestic and overseas infrastructure with an estimated replacement value of about $1 trillion. In September 2018, Hurricane Florence damaged Camp Lejeune and other Marine Corps facilities in North Carolina, resulting in a preliminary Marine Corps repair estimate of $3.6 billion. One month later, Hurricane Michael devastated Tyndall Air Force Base in Florida, resulting in a preliminary Air Force repair estimate of $3 billion and upwards of 5 years to complete the work. In addition, we recently reported that the federal government manages about 650 million acres of land in the United States that could be vulnerable to climate change, including the possibility of more frequent and severe droughts and wildfires. Appropriations for federal wildland fire management activities have increased considerably since the 1990s, as we and the Congressional Research Service have reported. Although the federal government faces fiscal exposure from climate change across the nation, it does not have certain information needed by policymakers to help understand the budgetary impacts of such exposure. We have previously reported that the federal budget generally does not account for disaster assistance provided by Congress—which can reach tens of billions of dollars for some disasters—or the long-term impacts of climate change on existing federal infrastructure and programs. For Example, as we reported in April 2018, the Office of Management and Budget’s (OMB) climate change funding reports we reviewed did not include funding information on federal programs with significant fiscal exposures to climate change identified by OMB and others—such as domestic disaster assistance, flood insurance, and crop insurance. A more complete understanding of climate change fiscal exposures can help policymakers anticipate changes in future spending and enhance control and oversight over federal resources, as we reported in October 2013. For budget decisions for federal programs with fiscal exposure to climate change, we found in the April 2018 report that information that could help provide a more complete understanding would include: (1) costs to repair, replace, and improve the weather- related resilience of federally-funded property and resources; (2) costs for federal flood and crop insurance programs; and (3) costs for disaster assistance programs, among other identified areas of fiscal exposure to climate change. To help policymakers better understand the trade-offs when making spending decisions, we recommended in the April 2018 report that OMB provide information on fiscal exposures related to climate change in conjunction with future reports on climate change funding. Although the federal government faces fiscal exposure to climate change, its investments in resilience to climate change impacts have been limited. One way to reduce federal fiscal exposure is to enhance resilience by reducing or eliminating long-term risk to people and property from natural hazards. For example, in September 2018 we reported that elevating homes and strengthened building codes in Texas and Florida prevented greater damages during the 2017 hurricane season. In addition, one company participating in a 2014 forum we held on preparing for climate- related risks noted that for every dollar it invested in resilience efforts, the company could prevent $5 in potential losses. Finally, a 2018 interim report by the National Institute of Building Sciences examined a sample of federal grants for hazard mitigation. The report estimated approximate benefits to society (i.e., homeowners, communities, etc.) in excess of costs for several types of resilience projects through the protection of lives and property, and prevention of other losses. For example, while precise benefits are uncertain, the report estimated that for every grant dollar the federal government spent on resilience projects, over time, society could accrue benefits amounting to the following: About $3 on average from projects addressing fire at the wildland urban interface, with most benefits (69 percent) coming from the protection of property (i.e., avoiding property losses). About $5 on average from projects to address hurricane and tornado force winds, with most benefits (89 percent) coming from the protection of lives. This includes avoiding deaths, nonfatal injuries, and causes of post-traumatic stress. About $7 on average from projects that buy out buildings prone to riverine flooding, with most benefits (65 percent) coming from the protection of property. The interim report also estimated that society could accrue benefits amounting to about $11 on average for every dollar invested in designing new buildings to meet the 2018 International Building Code and the 2018 International Residential Code—the model building codes developed by the International Code Council—with most benefits (46 percent) coming from the protection of property. We reported in October 2009 that the federal government’s activities to build resilience to climate change were carried out in an ad hoc manner and were not well coordinated across federal agencies. Federal agencies have included some of these activities within existing programs and operations—a concept known as mainstreaming. For example, the Fourth National Climate Assessment reported that the U.S. military integrates climate risks into its analysis, plans and programs, with particular attention paid to climate effects on force readiness, military bases, and training ranges. However, according to the Fourth National Climate Assessment, while a significant portion of climate risk can be addressed by mainstreaming, the practice may reduce the visibility of climate resilience relative to dedicated, stand-alone approaches and may prove insufficient to address the full range of climate risks. In addition, as we reported in March 2019, the Disaster Recovery Reform Act of 2018 (DRRA) was enacted in October 2018, which could improve state and local resilience to disasters. DRRA, among other things, allows the President to set aside, with respect to each major disaster, a percentage of the estimated aggregate amount of certain grants to use for pre-disaster hazard mitigation and makes federal assistance available to state and local governments for building code administration and enforcement. However, it is too early to tell what impact the implementation of the act will have on state and local resilience. The federal government has made some limited investments in resilience and DRRA could enable additional improvements at the state and local level. However, we reported in September 2017 that the federal government had not undertaken strategic government-wide planning to manage significant climate risks before they become fiscal exposures. We also reported in July 2015 that the federal government had no comprehensive strategic approach for identifying, prioritizing, and implementing investments for disaster resilience. As an initial step in managing climate risks, most of the experts we interviewed for the September 2017 report told us that federal decision makers should prioritize risk management efforts on significant climate risks that create the greatest fiscal exposure. However, as we reported in our March 2019 High-Risk List, the federal government had not made measurable progress since 2017 to reduce fiscal exposure in several key areas that we have identified. The High-Risk List identified Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks as an area needing significant attention because the federal government has regressed in progress toward one of our criterion for removal from the list. As we reported in March 2019, the federal government could reduce its fiscal exposure to climate change by focusing and coordinating federal efforts. However, the federal government is currently not well organized to address the fiscal exposure presented by climate change, partly because of the inherently complicated and crosscutting nature of the issue. We have made a total of 62 recommendations related to limiting the federal government’s fiscal exposure to climate change over the years, 12 of which have been made since February 2017. As of December 2018, 25 of these recommendations remained open. In describing what needs to be done to reduce federal fiscal exposure to climate change, our March 2019 High-Risk report discusses many of the open recommendations. Implementing these recommendations could help reduce federal fiscal exposure. Several of them, including those highlighted below, identify key government-wide efforts needed to help plan for and manage climate risks and direct federal efforts toward common goals, such as improving resilience: Develop a national strategic plan: In May 2011, we recommended that appropriate entities within the Executive Office of the President (EOP), including OMB, work with agencies and interagency coordinating bodies to establish federal strategic climate change priorities that reflect the full range of climate-related federal activities, including roles and responsibilities of key federal entities. Use economic information to identify and respond to significant climate risks: In September 2017, we recommended that the appropriate entities within EOP use information on the potential economic effects of climate change to help identify significant climate risks facing the federal government and craft appropriate federal responses. Such federal responses could include establishing a strategy to identify, prioritize, and guide federal investments to enhance resilience against future disasters. Provide decision makers with the best available climate information: In November 2015, we reported that federal efforts to provide information about climate change impacts did not fully meet the climate information needs of federal, state, local, and private sector decision makers, which hindered their efforts to plan for climate change risks. We reported that these decision makers would benefit from a national climate information system that would develop and update authoritative climate observations and projections specifically for use in decision-making. As a result, we recommended that EOP (1) designate a federal entity to develop and periodically update a set of authoritative climate observations and projections for use in federal decision-making, which other decision makers could also access; and (2) designate a federal entity to create a national climate information system with defined roles for federal agencies and nonfederal entities with existing statutory authority. Consider climate information in design standards: In November 2016, we reported that design standards, building codes, and voluntary certifications established by standards-developing organizations play a role in ensuring the resilience of infrastructure to the effects of natural disasters. However, we reported that these organizations faced challenges to using forward-looking climate information that could help enhance the resilience of infrastructure. As a result, we recommended in the November 2016 report that the Department of Commerce, acting through the National Institute of Standards and Technology—which is responsible for coordinating federal participation in standards organizations—convene federal agencies for an ongoing government-wide effort to provide the best available forward-looking climate information to standards-developing organizations for their consideration in the development of design standards, building codes, and voluntary certifications. In conclusion, the effects of climate change have already and will continue to pose risks that can create fiscal exposure across the federal government and this exposure will continue to increase. The federal government does not generally account for such fiscal exposure to programs in the budget process nor has it undertaken strategic efforts to manage significant climate risks that could reduce the need for far more costly steps in the decades to come. To reduce its fiscal exposure, the federal government needs a cohesive strategic approach with strong leadership and the authority to manage risks across the entire range of related federal activities. The federal government could make further progress toward reducing fiscal exposure by implementing the recommendations we have made. Chairman Yarmuth, Ranking Member Womack, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact me at (202) 512-3841or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are J. Alfredo Gómez (Director), Joseph Dean Thompson (Assistant Director), Anne Hobson (Analyst in Charge), Celia Mendive, Kiki Theodoropoulos, Reed Van Beveren, and Michelle R. Wong. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Since 2005, federal funding for disaster assistance is at least $450 billion, including approximately $19.1 billion in supplemental appropriations signed into law on June 6, 2019. In 2018 alone, there were 14 separate billion-dollar weather and climate disaster events across the United States, with a total cost of at least $91 billion, according to the National Oceanic and Atmospheric Administration. The U.S. Global Change Research Program projects that disaster costs will likely increase as certain extreme weather events become more frequent and intense due to climate change. The costs of recent weather disasters have illustrated the need for planning for climate change risks and investing in resilience. Resilience is the ability to prepare and plan for, absorb, recover from, and more successfully adapt to adverse events, according to the National Academies of Science, Engineering, and Medicine. Investing in resilience can reduce the need for far more costly steps in the decades to come. Since February 2013, GAO has included Limiting the Federal Government's Fiscal Exposure by Better Managing Climate Change Risks on its list of federal program areas at high risk of vulnerabilities to fraud, waste, abuse, and mismanagement or most in need of transformation. GAO updates this list every 2 years. In March 2019, GAO reported that the federal government had not made measurable progress since 2017 to reduce fiscal exposure to climate change. This testimony—based on reports GAO issued from October 2009 to March 2019—discusses (1) what is known about the potential economic effects of climate change in the United States and the extent to which this information could help federal decision makers manage climate risks across the federal government, (2) the potential impacts of climate change on the federal budget, (3) the extent to which the federal government has invested in resilience, and (4) how the federal government could reduce fiscal exposure to the effects of climate change. GAO has made 62 recommendations related to the Limiting the Federal Government’s Fiscal Exposure by Better Managing Climate Change Risks high-risk area. As of December 2018, 25 of those recommendations remained open. The estimated economic effects of climate change, while imprecise, can convey useful insight about potential damages in the United States. In September 2017, GAO reported that the potential economic effects of climate change could be significant and unevenly distributed across sectors and regions (see figure). This is consistent with the recent findings of the U.S. Global Change Research Program's Fourth National Climate Assessment, which concluded, among other things, that the continued increase in the frequency and extent of high-tide flooding due to sea level rise threatens America's trillion-dollar coastal infrastructure. Information about the potential economic effects of climate change could inform decision makers about significant potential damages in different U.S. sectors or regions. According to prior GAO work, this information could help decision makers identify significant climate risks as an initial step toward managing them. The federal government faces fiscal exposure from climate change risks in several areas, including: Disaster aid: due to the rising number of natural disasters and increasing reliance on federal assistance. GAO has previously reported that the federal government does not adequately plan for disaster resilience. GAO has also reported that, due to an artifically low indicator for determining a jursidiction's ability to respond to disasters that was set in 1986, the Federal Emergency Management Agency risks recommending federal assistance for juridisctions that could recover on their own. Federal insurance for property and crops: due, in part, to the vulnerability of insured property and crops to climate change impacts. Federal flood and crop insurance programs were not designed to generate sufficient funds to fully cover all losses and expenses. The flood insurance program, for example, was about $21 billion in debt to the Treasury as of April 2019. Further, the Congressional Budget Office estimated in May 2019 that federal crop insurance would cost the federal government an average of about $8 billion annually from 2019 through 2029. Operation and management of federal property and lands: due to the hundreds of thousands of federal facilities and millions of acres of land that could be affected by a changing climate and more frequent extreme events. For example, in 2018, Hurricane Michael devastated Tyndall Air Force Base in Florida, with a preliminary repair estimate of $3 billion. The federal budget, however, does not generally account for disaster assistance provided by Congress or the long-term impacts of climate change on existing federal infrastructure and programs. GAO has reported that more complete information about fiscal exposure could help policymakers better understand the trade-offs when making spending decisions. Further, federal investments in resilience to reduce fiscal exposures have been limited. As GAO has reported, enhancing resilience can reduce fiscal exposure by reducing or eliminating long-term risk to people and property from natural hazards. For example, a 2018 interim report by the National Institute of Building Sciences estimated approximate benefits to society in excess of costs for several types of resilience projects. While precise benefits are uncertain, the report estimated that for every dollar invested in designing new buildings to particular design standards, society could accrue benefits amounting to about $11 on average. The federal government has invested in individual agency efforts that could help build resilience within existing programs or projects. For example, the National Climate Assessment reported that the U.S. military integrates climate risks into its analysis, plans, and programs. In additon, as GAO reported in March 2019, the Disaster Recovery Reform Act of 2018 could improve resilience by allowing the President to set aside a portion of certain grants for pre-disaster mitigation. However, the federal government has not undertaken strategic government-wide planning to manage climate risks. GAO's March 2019 High-Risk report identified a number of recommendations GAO has made related to fiscal exposure to climate change. The federal government could reduce its fiscal exposure by implementing these recommendations. Among GAO's key government-wide recommendations are: Entities within the Executive Office of the President (EOP) should work with partners to establish federal strategic climate change priorities that reflect the full range of climate-related federal activities; Entities within EOP should use information on potential economic effects from climate change to help identify significant climate risks and craft appropriate federal responses; Entities within EOP should designate a federal entity to develop and update a set of authoritative climate observations and projections for use in federal decision making, and create a national climate information system with defined roles for federal agencies and certain nonfederal entities; and The Department of Commerce should convene federal agencies to provide the best-available forward-looking climate information to organizations that develop design standards and building codes to enhance infrastructure resilience.", "document_type": "gao"}
{"report": "In the Telecommunications Act of 1996 (the 1996 Act), Congress specified that consumers in “rural, insular, and high-cost areas” should have access to telecommunication rates and services that are “reasonably comparable” to consumers in urban areas. The 1996 Act altered the federal mechanism for funding universal service by requiring telecommunications carriers and other entities providing interstate telecommunications service to contribute to the USF, unless exempted by FCC. The carriers generally pass these costs on to customers, sometimes in the form of a line item on customers’ telephone bills. USF provides financial support to carriers through four different programs, each targeting a particular group of telecommunications carriers or consumers. The high-cost program provides support to both wireline and wireless carriers that provide telecommunications services in areas that carriers would otherwise not serve and where there is no competition from other providers. These are typically rural or remote areas where the customer base is relatively small and the cost of installing infrastructure is high. The high-cost program has been the largest USF program based on disbursements and has been particularly important to rural areas. High- cost support is intended to offset the carriers’ higher costs, thereby allowing them to provide services and rates that are reasonably comparable to those that consumers in lower-cost—generally urban— areas receive. In 2009, Congress required FCC to develop a broadband plan to ensure that every American has access to broadband capability, including a detailed plan for providing this service at affordable rates. In response, an FCC task force issued the National Broadband Plan in 2010, which recommended reforming USF so it could support both telephone and broadband service. FCC’s USF Transformation Order of 2011 emerged in response to this recommendation and provided USF support to carriers for broadband capable networks. The order required carriers that receive support to meet broadband-speed and quality-deployment requirements. Through the USF Transformation Order, FCC adopted a framework to transition high-cost carriers from traditional cost-accounting support to incentive-based support mechanisms, using forward-looking broadband cost models and competitive bidding. FCC’s forward-looking cost models use historical data to project the future financial needs of carriers providing telecommunications services. According to FCC, rate-of-return carriers receive about $2.5 billion in annual support from the high-cost program to support service deployments in these carriers’ 1,078 rate-of- return service areas, which FCC refers to as “study areas.” FCC has allowed rate-of-return carriers to choose, on a voluntarily basis, one the following mechanisms to receive USF support: Traditional cost-accounting support mechanism. This method retroactively provides support to carriers for costs already incurred, based on cost studies, including financial statements these companies provide each year. At the time of our review, according to FCC officials, FCC guaranteed these companies recovery of eligible deployment costs, plus a return of 10.25 percent on regulated investment costs. According to FCC’s OIG officials we interviewed, many carriers contract with telecommunications accountants to navigate the complicated process of determining which costs are reimbursable by the high-cost program and file the associated documentation with USAC. According to FCC, as of September 2019, there were approximately 437 study areas served by rate-of- return carriers receiving support through this mechanism. Model-based support mechanism. This method is aimed at providing a level of support to carriers based on modeled forward- looking costs and revenues of an efficient carrier to serve an area with voice and broadband Internet. According to FCC officials, in developing the model, FCC: had experts peer-review the model’s methodology; demonstrated how different inputs affect model support and sought stakeholder feedback on the reasonableness of how these inputs affected support levels; publicly released the model’s methodology; and used historical deployment cost and revenue data to develop the model’s inputs and assumptions. As of September 2019, FCC officials told us that rate-of-return companies serving 641 study areas were receiving support through this mechanism (or almost 60 percent of all 1,078 rate-of-return carriers’ study areas). FCC determines overall policy and issues the regulations that govern the high-cost program, while FCC’s Wireline Competition Bureau in particular implements FCC’s policies and programs regarding rate-of-return carriers. State governments play a role in implementing the federal high- cost program, as do a not-for-profit corporation (USAC) and an association (NECA). As shown in table 1, FCC, USAC, and NECA have responsibilities for the high-cost program to ensure payments to rate-of- return carriers are made properly. FCC has the following audit and oversight procedures for the high-cost program: Carrier self-certification. Carriers submit cost and line count data directly to NECA. Carrier self-certification is the primary tool for ensuring that carriers use high-cost program support consistent with program rules. USAC uses these data to qualify carriers for the program and also to calculate the amount of support carriers are eligible to receive. Carrier audits. Audits of carriers receiving high-cost program support are the primary tool used to oversee carrier activities, and audits may be conducted by USAC, state regulators, or FCC’s OIG. USAC primarily relies on assessments from the Payment Quality Assurance Program and Beneficiary and Contributor Audit Program that occur after disbursements have been made to detect improper payments, which may include fraud. Carrier data validation process. All cost data that the carriers submit to NECA for purposes of high-cost support are subject to several electronic validations, which focus on ensuring that all required data are reported and that the data ranges are consistent with information reported in previous years. In addition, NECA compares the reported cost data with financial records supporting carriers’ audited financial statements to identify any discrepancies and to require corrections when discrepancies are discovered. Carriers’ broadband deployment verification. Since 2018, USAC has performed carrier broadband deployment verifications by obtaining broadband location data to monitor whether a carrier’s broadband deployment meets FCC requirements. Carriers receive verification reports from USAC that reflect the results of the verification process. Whistleblower process. USAC maintains a whistleblower log that is shared with FCC. Through whistleblower complaints, USAC may identify instances of potentially fraudulent activity. FCC has identified three rate-of-return carriers that received at least $34 million in improper payments from the high-cost program in prior years. Two such cases were described above. In the third case, a rate-of-return carrier self-reported to NECA and USAC what it represented to be the costs and revenues of providing its telecommunications service; as discussed previously, NECA and USAC rely upon the accuracy and completeness of the carrier’s reporting to calculate the carrier’s support. An FCC OIG investigation later revealed that the carrier had manipulated FCC’s accounting rules by including the costs of a nonregulated, commercial mobile radio service in the information it submitted to NECA, thus inflating the amount of high-cost program support the carrier received. FCC eventually determined that the carrier owed the federal government almost $7 million in support overpayments received between 2005 and 2010. A petition for reconsideration is pending. As there is a finite amount of funding for the high-cost program, compensating carriers for improper, ineligible, and inflated costs they claim means less program funds are available for deploying service to the areas the program was designed to serve. Federal internal control standards, along with GAO’s fraud risk framework, OMB guidance, and the Fraud Reduction and Data Analytics Act of 2015 have placed an increased focus on the need for federal program managers to take a strategic approach to managing improper payments and risks, including the risk of fraud. GAO’s fraud risk framework provides comprehensive guidance for conducting fraud-risk assessments and using the results to develop a robust fraud risk management strategy. This framework also describes overarching concepts and leading practices for establishing an organizational structure and culture that are conducive to fraud risk management, designing and implementing controls to prevent and detect potential fraud, and monitoring and evaluating fraud risk management activities. The leading practices in the fraud risk framework are organized into four components—commit, assess, design and implement, and evaluate and adapt—as depicted in figure 1. FCC, in various orders, has adopted several funding and other reforms specific to rate-of-return carriers. As described below, the reforms we reviewed were designed to (1) control the carrier and high-cost program expenditures, (2) incentivize efficient broadband deployment, and (3) ensure carriers’ compliance with the high-cost program. Prior to the 2011 USF Transformation Order, rate-of-return carriers primarily received high-cost support based on their actual costs. Under the old rules, carriers faced no FCC-imposed limits and, according to FCC, had no incentive to be more efficient. FCC adopted the reforms described in figure 2 to control the program’s expenditures. As shown in figure 2 above, FCC’s reform effort related to eliminating support to areas with competition has been ongoing since 2011. According to FCC officials, FCC relied on its broadband deployment data to identify competitively served areas, but we have previously reported that FCC’s broadband deployment data are not always accurate. In August 2017, FCC initiated a proceeding to review the Form 477—the principal tool FCC uses to gather data on communications services, including broadband services—to help inform its policy making. According to FCC, a goal of this proceeding was to enable FCC to collect better and more accurate information on the Form 477. In August 2019, FCC adopted an order based on the proceeding that, among other things, established requirements for collecting geospatial broadband-coverage maps from internet service providers. According to the order, FCC will require the service providers to submit granular maps of the areas where they have broadband-capable networks; FCC intends that these broadband-deployment maps will enable FCC to precisely target scarce universal service dollars to where broadband service is lacking. According to FCC, one of the USF’s core principles since 2011 has been to ensure that support is provided in the most efficient manner possible, recognizing that ultimately American consumers contribute to programs like the high-cost program. FCC adopted the reforms described in figure 3 to advance its long-standing objective of adopting incentive-based policies to spur additional broadband deployment, while preserving additional funding in the high-cost program for other reforms. According to FCC, the prior cases of carriers’ abuses of USF support for unrelated purposes prompted FCC to issue more specific rules for compliance and reporting obligations. Accordingly, FCC adopted reforms described in figure 4 to improve accountability and transparency of the high-cost program. Of the reforms we reviewed, one reform in particular—the development of a model-based support mechanism—shows promise in reducing fraud risk, according to stakeholders from federal and state government, industry, and accounting firms we contacted. Stakeholders said the model-based support mechanism is less prone to fraud risks and is a more efficient support mechanism than traditional cost-accounting support. In particular, unlike the traditional cost-accounting-support mechanism, model-based support does not rely on carrier-submitted data to determine support amounts. Instead, the model uses, among other things, a combination of historical cost data and other data, such as expected customer revenue, to determine support amounts. Since there are no data provided by carriers in the process of determining support amounts, there is no means by which carriers can provide falsified information to fraudulently receive excess support. The carriers involved in the previously described improper payments cases were receiving support from the traditional cost-accounting support mechanism. On the other hand, stakeholders told us FCC’s traditional cost-accounting support mechanism is complex and difficult to audit, and that such weaknesses make it prone to fraud risks. For example, USAC officials told us it is time consuming to detect inflated costs associated with carriers’ affiliate company transactions. The traditional cost-accounting support mechanism also requires that carriers separate costs based upon the type of service with which the cost was associated. According to FCC’s OIG officials and representatives from accounting firms we contacted, determining whether a carrier has overly attributed costs to eligible services is difficult. For instance, determining if labor costs are properly being allocated between eligible and ineligible services requires looking at each employee’s timesheet. According to USAC, it also faces challenges auditing traditional cost-accounting support payments due to limited expertise and capacity to address the complexity of the audits. USAC officials noted that this issue has been exacerbated by audit staff turnover. According to USAC officials and some stakeholders we contacted, auditing carriers receiving traditional cost-accounting support is also difficult due to the extensive documentation requirements for this type of support, requirements that often entails hundreds of pages of financial information per carrier. USAC officials told us that a single audit can take over 1,000 hours to complete, and USAC officials told us they only completed 10 audits of carriers that received support on a traditional cost-accounting basis in fiscal year 2018. As previously noted, FCC allows carriers to choose which funding mechanism is best suited for their company. FCC officials told us they developed the model-based funding mechanism in consultation with carriers and industry stakeholders. However, according to FCC officials, the model’s use is not mandatory because some carriers do not believe that the model would accurately reflect their specific costs. FCC officials said the agency does not have plans to assess the accuracy of the model’s cost estimates or require carriers to receive model-based support. FCC officials told us they did not have plans to assess the model. FCC officials told us they had not planned to do so because in May 2019 FCC had just made available model-based support to the remaining legacy carriers, and FCC was still in the process of evaluating next steps. Planning for and conducting such an assessment would enable FCC to demonstrate the validity of the model and its reliability in accounting for the costs of broadband deployment. Federal internal- control standards state that management should use quality information to make informed decisions and evaluate program performance in achieving key objectives. Furthermore, according to FCC’s strategic plan, FCC must ensure its USF programs, including those for the high- cost program, are well managed, efficient, and fiscally responsible, and the National Broadband Plan says that FCC should move rate-of-return carriers to incentive-based regulation mechanisms, such as model-based support. Yet because a substantial number of rate-of-return study areas— 437—continue to receive traditional cost-accounting support, and the carriers that provide service in these areas cannot be effectively audited, significant fraud risks remain for the high-cost program. By assessing the model, FCC would have greater assurance that it is producing reliable cost estimates and be better positioned to determine whether to make its use mandatory. Managers of federal programs are responsible for managing fraud risks. Implementing effective fraud risk-management processes is important to help ensure that federal programs fulfill their intended purpose and funds are spent effectively. GAO’s fraud risk framework is aligned with federal internal-control standards related to assessing fraud risk. It focuses on preventive activities, which generally offer the most cost-efficient use of resources since they enable managers to avoid a costly and inefficient “pay-and-chase” model, which refers to the practice of detecting fraudulent transactions and recovering funds after fraudulent payments have been made. As discussed previously, our fraud risk framework consists of four components—commit, assess, design and implement, and evaluate and adapt—each of which includes overarching concepts and leading practices for carrying them out. We found that FCC has implemented some policies and procedures related to managing fraud risk for the high-cost program. For example, according to a memorandum of understanding between FCC and USAC, FCC requires USAC to alert, as appropriate, FCC’s OIG and Enforcement Bureau about potential instances of fraud. However, as detailed in appendix II, FCC’s efforts do not fully align with some elements of the fraud risk framework. In particular, we found deficiencies in FCC’s efforts related to the following three overarching concepts and one high-level component: creating a structure with a dedicated entity to manage fraud risk activities (overarching concept within the commit component); planning regular fraud-risk assessments tailored to the program and assessing these risks to determine the program’s fraud risk profile (two overarching concepts within the assess component); and designing and implementing an antifraud strategy for the program (the design and implement component). Creating a structure with a dedicated entity to lead fraud risk- management activities. Leading practices for managing fraud risk include demonstrating management’s commitment to combating fraud and designating an entity to design and oversee fraud risk-management activities. According to GAO’s fraud risk framework, an entity should lead these activities by serving as the repository of knowledge on fraud risks and controls, managing the fraud-risk assessment process, leading fraud- awareness activities, and coordinating antifraud initiatives. According to FCC officials, FCC has steering committees for each of the four USF programs, including the high-cost program. According to FCC officials, the steering committees allow in-depth discussions about each program, including on operational issues such as current spending levels and information technology systems, as well as improper payments and other issues. However, fraud risk is but one of many responsibilities of these steering committees, and they do not fill the role of a dedicated fraud risk- management entity, as called for by the fraud risk framework. In August 2019, FCC officially launched a Fraud Division—comprising existing FCC staff who investigate and prosecute fraud—within its Enforcement Bureau. However, FCC told us the scope of the new division’s operations is limited to investigations, so the Fraud Division does not fill the role of a dedicated fraud risk-management entity. Planning regular fraud-risk assessments tailored to the program and determining the fraud risk profile. An effective antifraud entity tailors the approach for carrying out regular fraud-risk assessments of its programs. According to GAO’s fraud risk framework, the approach should, among other things: fully consider the specific fraud risks the agency or program faces, analyze the potential likelihood and effects of fraud schemes, and document prioritized fraud risks. According to FCC officials, FCC has annually worked with USAC high- cost program staff to identify and assess some risks facing the high-cost program, some of which are fraud risks, but has not planned regular fraud-risk assessments that are tailored to the high-cost program in accordance with GAO’s fraud risk framework. FCC officials also told us that they adopted a tool originally developed by another agency that was used to evaluate risks facing that agency’s loan and grant programs, not just fraud risks. Using that tool as a model, FCC created a risk assessment document that included fraud risk as one of nine categories of risks across the high-cost program. Based on our discussions with FCC officials, however, the document does not constitute a fraud-risk assessment that takes into account changes to the program or operating environment. Furthermore, the risk assessment document does not constitute a fully tailored risk assessment because it does not identify and assess the fraud risks stakeholders we interviewed described as inherent to the high-cost program, detailed below. Risk caused by the complexity of the high-cost program’s cost- allocation rules. Officials from three out of four accounting firms, FCC’s OIG, and a state utility commission we contacted singled out the specific fraud risk caused by what they described as confusing and subjective rules governing the process carriers use to separate eligible and ineligible costs. Risks related to oversight challenges. Stakeholders identified several oversight challenges as significant in that they could contribute to fraud risks for the program, such as: financial mismanagement within carriers that allowed companies to submit potentially fraudulent information to USAC and NECA, and that a telecommunications accountant told us contributed to previous instances of alleged fraud; USAC’s audit personnel challenges that were due to attrition and limited resources and expertise and that were identified by officials from FCC, USAC, FCC’s OIG, and an accounting firm; and deficiencies identified by FCC’s OIG in NECA’s internal controls over payments to carriers, data validation, and the appropriateness of NECA’s role validating carriers’ cost information. In addition, FCC’s OIG officials told us of oversight challenges related to carriers’ reporting, including that it is difficult for USAC to detect when carriers improperly report rates billed for services provided by an affiliate of the company or report incorrect labor rates. Furthermore, we found FCC had not identified and assessed risks to determine the fraud risk profile for the high-cost program, as called for in the fraud risk framework. A fraud risk profile is the summation of key findings and conclusions from a fraud-risk assessment, including the analysis of the types of internal and external fraud risks, their perceived likelihood and effects, managers’ risk tolerance, and the prioritization of risks. FCC officials said they consider the risk of fraud to be low in the high-cost program, and FCC includes fraud risk in its current risk assessment process. Since FCC believes the fraud risk is low for the high-cost program, FCC has not deemed it necessary to conduct a separate fraud-risk assessment of the program. For example, FCC provided us with documentation related to its Enterprise Risk Management activities that identifies risks USAC faces to achieving its corporate objectives. However, while FCC considers fraud risks as part of these activities, the document does not specify the fraud risk tolerance for the program or constitute a fraud risk profile. Without conducting regular fraud-risk assessments to gauge the likelihood and effects of the inherent fraud risks described above, and potentially others, FCC cannot determine or document the program’s fraud risk profile. Furthermore, FCC has no assurance that it has fully considered important fraud risks, determined its tolerance for risks that could be lower priorities, or made sound decisions on how to allocate resources to respond to fraud risks. Not doing so could result in FCC compensating carriers for improper, ineligible, and inflated costs, such as in the previously discussed cases of identified fraud. By regularly assessing fraud risks to determine a fraud risk profile, FCC could better determine the extent to which it has designed and implemented adequate fraud-prevention controls. Designing and implementing an antifraud strategy for the program. Managers who effectively manage fraud risk develop and document an antifraud strategy that describes the program’s activities for preventing, detecting, and responding to the fraud risks identified during the fraud-risk assessment. FCC and USAC have established mechanisms to enhance the oversight of USF programs, mechanisms that can also help mitigate fraud risks for the high-cost program, including: In fiscal year 2016, USAC implemented a risk-based selection method for conducting audits to identify the entities with the greatest risk. USAC forwards potential fraud, waste, and abuse cases to FCC. FCC’s OIG established a hotline that can be used to report potential fraud, and USAC established a Whistleblower Alert mechanism to inform USAC of possible instances of universal service support being misapplied or mismanaged, or when carriers are potentially violating laws, rules, or regulations. USAC shares this information with FCC. FCC and USAC formed a working group tasked with developing a data-analytics tool designed to share USAC high-cost program data with FCC. FCC’s documentation of the tool states that once developed, the tool will help FCC’s Enforcement Bureau in its fraud detection activities across all USF programs. FCC officials described the development of the tool as technically challenging and said there is no established timeline for implementing the tool. FCC officials said that FCC has regular, informal interactions concerning fraud risk with USAC and, to a lesser degree, with NECA and that FCC has confidence that USAC’s improved audit processes are identifying issues appropriately. However, FCC has not specifically designed or implemented an overall strategy to mitigate fraud risks across the high-cost program. An FCC official said FCC believes its existing antifraud activities are adequate. The FCC official said FCC considers the risk of fraud in the high-cost program to be low because USAC audits have revealed that carriers’ financial reporting errors occur at a low rate and therefore do not indicate that a large amount of fraud is occurring. The official said FCC’s fraud risk-management practices are based on federal internal-control standards and are woven into existing FCC mechanisms. Given that FCC has not conducted a fraud-risk assessment that is tailored to the high-cost program and that the deceptive nature of fraud makes it difficult to measure in a reliable way, it is unclear how FCC officials reached the conclusion that the program’s risk of fraud is low. Also, in the absence of an antifraud strategy, FCC has little assurance that it has the specific control activities to prevent and detect high-cost program fraud and that the types of misconduct that previously occurred are not widespread. The improper payment activity discussed previously was caught after USAC provided support to these carriers, and it was not prevented or detected through any strategic fraud risk-management effort on FCC’s part. Furthermore, the FCC’s OIG has expressed significant concerns about such abuses by rate-of-return carriers and about the effectiveness of USAC’s auditing processes in helping prevent improper payments to these carriers. As noted above, USAC’s high-cost program audits can take over 1,000 hours and USAC faces human capital challenges that have diminished its audit capacity. In addition, while NECA’s data validations and reviews of high-cost support provide opportunities to identify input and data-reporting errors, they do not specifically address whether or not the data provided by carriers are reasonable or if the money carriers spent addresses the intended purposes of the high-cost program. Designing and implementing an antifraud strategy that conforms to leading practices would help FCC effectively manage and respond to the fraud risks identified during the fraud-risk assessments. Given the continuing importance of deploying telecommunications services in difficult-to-serve areas, effective oversight for rate-of-return carriers is an important component for helping ensure that the high-cost program’s finite funds are used properly to meet the intent of the program. Overall, the traditional cost-accounting mechanism that FCC uses to provide support to a substantial number of rate-of-return carriers is complex, prone to fraud risks, and presents auditing challenges that FCC has not fully addressed. By following leading practices from GAO’s fraud risk framework, FCC could better ensure that it is addressing and strategically targeting the most significant fraud risks facing the high-cost program. Furthermore, FCC’s model-based support mechanism has now been in use by some rate-of-return carriers for several years and stakeholders agree that it is less prone to fraud risks. However, FCC has not assessed the extent to which the model is producing reliable cost estimates. By conducting such an assessment, FCC would have greater assurance that it is producing reliable cost estimates and be better positioned to determine whether to make its use mandatory. We are making the following five recommendations to FCC: The Chairman of FCC should ensure that FCC’s Office of Managing Director follows the leading practices in GAO’s fraud risk framework related to a dedicated entity’s management of its antifraud activities, such as serving as the repository of knowledge on fraud risks and coordinating antifraud initiatives. (Recommendation 1) The Chairman of FCC should plan regular fraud-risk assessments tailored to the high-cost program and assess these risks to determine the program’s fraud risk profile, as provided in GAO’s fraud risk framework. (Recommendation 2) The Chairman of FCC should design and implement an antifraud strategy for the high-cost program with specific control activities, based upon the results of fraud-risk assessments and a corresponding fraud risk profile, as provided in GAO’s fraud risk framework. (Recommendation 3) The Chairman of FCC should assess the model-based support mechanism to determine the extent to which it produces reliable cost estimates. (Recommendation 4) The Chairman of FCC should consider whether to make use of the model-based support mechanism mandatory depending on the results of the assessment. (Recommendation 5) We provided a draft of this report to FCC for review and comment. In FCC’s written comments, reprinted in appendix III, FCC described actions it would take to implement our recommendations. FCC also provided technical comments, which we incorporated as appropriate. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Chairman of the FCC, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. To help managers combat fraud and preserve integrity in government agencies and programs, we identified leading practices for managing fraud risks and organized them into a conceptual framework called the Fraud Risk Management Framework (the framework). As described in the background section of this report and depicted visually in figure 1, the framework encompasses control activities to prevent, detect, and respond to fraud, with an emphasis on prevention, to help managers achieve the objective of mitigating fraud risks. The second of four framework components—Assess—calls for specific actions managers should take to achieve the objective of mitigating fraud risks. Specifically, managers should plan regular fraud-risk assessments and assess these risks to determine a fraud risk profile. Figure 5 illustrates the key elements of the fraud-risk assessment process that lead to the creation of a program’s fraud risk profile. We developed a data collection instrument to structure our assessment of the Federal Communications Commission’s (FCC) antifraud efforts for the high-cost program related to the commit, assess, and design and implement components of GAO’s fraud risk framework. For our assessment, we determined the extent to which FCC had implemented the leading practices within each component, as summarized in table 2. We did not assess FCC’s approach against leading practices in the “evaluate and adapt” component of the framework because we determined that FCC had not adopted fraud risk management leading practices within the first three components, and therefore it was premature for us to assess whether FCC was evaluating and adapting its use of these practices. In addition to the individual named above, Sally Moino (Assistant Director); Sean Standley (Analyst in Charge); Philip Farah; Camilo Flores; Mark Goldstein; Gary Guggolz; Hannah Hubbard; Josh Ormond; Ben Licht; Rebecca Shea; Andrew Stavisky; and Michelle Weathers made key contributions to this report.", "summary": "The Universal Service Fund's high-cost program provides financial support to telecommunications carriers in areas where the cost to provide broadband is high. Through this program, FCC provides about $2.5 billion in annual support payments to rate-of-return carriers. The manner in which FCC currently provides the support payments to some of these carriers is prone to fraud risks. A prior case involved a rate-of-return carrier that received at least $27 million in improper payments from the program. GAO was asked to review funding reforms and fraud controls FCC has implemented for rate-of-return carriers. This report examines the extent to which FCC: (1) has implemented funding reforms specific to rate-of-return carriers, and (2) is managing fraud risks for the high-cost program in accordance with leading practices. GAO reviewed FCC's and USAC's procedures, relevant regulations, and guidance, and assessed these documents against applicable criteria, including federal internal-control standards, FCC's strategic plan, and GAO's fraud risk framework. GAO interviewed FCC and USAC officials, in addition to industry and other stakeholders representing a variety of non-generalizable viewpoints. The Federal Communications Commission (FCC) has implemented several funding reforms for small, rural telecommunications carriers—referred to as “rate-of-return carriers”—receiving high-cost program support. These reforms are aimed at controlling the program's expenditures and incentivizing efficient broadband deployment. According to FCC's strategic plan, FCC must ensure the high-cost program is well managed, efficient, and fiscally responsible. One of the reforms that GAO reviewed established a funding mechanism for the carriers whereby FCC determines the level of financial support to provide the carriers based on cost and revenue estimates produced by a model. Stakeholders told GAO that this model-based funding mechanism is less prone to fraud risks than the traditional cost-accounting funding mechanism, which reimburses carriers for their reported costs. However, FCC did not make use of this reform mandatory and a substantial number of rate-of-return carriers continue to receive support from the traditional funding mechanism. FCC officials said they developed the model-based funding mechanism in consultation with industry stakeholders. However, FCC officials said they did not have plans to assess the accuracy of cost estimates from the model, which has been in use for several years, or require carriers to receive model-based support as a way to reduce fraud risks. By assessing the model, FCC would have greater assurance that it is producing reliable cost estimates and be better positioned to determine whether to make its use mandatory. FCC has some policies and processes in place to manage fraud risks for the high-cost program. For example, the Universal Service Administrative Company (USAC)—the not-for-profit corporation that administers the program—reviews and audits rate-of-return support payments and forwards potential fraud cases to FCC's Office of Inspector General and Enforcement Bureau for further investigation. FCC is also developing a data-analytics tool to help detect fraud, and in August 2019 launched a new Fraud Division to focus on investigating fraud in the Universal Service Fund's programs. However, FCC's efforts do not fully align with some elements of GAO's fraud risk framework, including: designing and implementing an antifraud strategy for the program. Without regular fraud-risk assessments of the high-cost program, FCC has no assurance that it has fully considered important fraud risks, determined its tolerance for risks that could be lower priorities, or made sound decisions on how to allocate resources to respond to fraud risks. Not doing so could result in FCC compensating carriers for improper, ineligible, or inflated costs. Furthermore, in the absence of an antifraud strategy, FCC has little assurance that it can prevent or detect the types of documented rate-of-return carrier misconduct that have previously occurred. Designing and implementing an antifraud strategy that conforms to leading practices would help FCC effectively manage and respond to the fraud risks identified during the fraud-risk assessments. GAO is making five recommendations, including that FCC should assess the model-based support mechanism and consider making its use mandatory, and implement an antifraud strategy for the high-cost program. FCC stated it would take steps to implement these recommendations.", "document_type": "gao"}
{"report": "Drugs sold in the United States—including active pharmaceutical ingredients and finished dosage forms—are manufactured throughout the world. According to a May 2019 FDA report, in fiscal year 2018 about 40 percent of establishments manufacturing drugs for the U.S. market were located domestically and more than 60 percent of establishments manufacturing for the U.S. market were located overseas. As of March 2019, FDA data show that India and China had the most manufacturing establishments shipping drugs to the United States, with about 40 percent of all foreign establishments in these two countries. (See fig. 1.) Drugs manufactured overseas must meet the same statutory and regulatory requirements as those manufactured in the United States. FDA’s Center for Drug Evaluation and Research (CDER) establishes standards for the safety, quality, and effectiveness of, and manufacturing processes for, over-the-counter and prescription drugs. CDER requests that FDA’s Office of Regulatory Affairs (ORA) inspect both domestic and foreign establishments to ensure that drugs are produced in conformance with applicable laws of the United States, including current good manufacturing practice (CGMP) regulations. FDA investigators generally conduct three main types of drug manufacturing establishment inspections: preapproval inspections, surveillance inspections, and for-cause inspections, as described in table 1. At times, FDA may conduct an inspection that combines both preapproval and surveillance inspection components in a single visit to an establishment. FDA uses multiple databases to select foreign and domestic establishments for surveillance inspections, including its registration database and inspection database. Because the establishments are continuously changing as they begin, stop, or resume marketing products in the United States, CDER creates an establishment catalog monthly. The catalog is prioritized for inspection twice each year. In our 2008 report we found that, because of inaccurate information in FDA’s databases, the agency did not know how many foreign drug establishments were subject to inspection. For example, some establishments included in FDA’s registration database may have gone out of business and did not inform FDA that they had done so or did not actually manufacture drugs for the U.S. market. In our report, we noted that some foreign establishments may register because, in foreign markets, registration may erroneously convey an “approval” or endorsement by FDA, when in fact the establishment may never have been inspected by FDA. We recommended that FDA take steps to improve the accuracy of this registration information. In our 2010 and 2016 reports we found that FDA had taken steps to improve the accuracy and completeness of information in its catalog of drug establishments subject to inspection, such as using contractors to conduct site visits to verify the existence of registered foreign establishments and confirm that they manufacture the products that are recorded in U.S. import records. To prioritize establishments for surveillance inspections, CDER applies a risk-based site selection model to its catalog of establishments to identify those establishments (both domestic and foreign) that, based on the characteristics of the drugs being manufactured, pose the greatest potential public health risk should they experience a manufacturing defect. This model analyzes several factors, including inherent product risk, establishment type, inspection history, and time since last inspection, to develop a list of establishments that FDA considers to be a priority for inspection. Through this process, CDER develops a ranked list of foreign and domestic establishments selected for inspection that is submitted to ORA. To be efficient with its resources, according to FDA officials, ORA staff may shift the order of establishments to be inspected on CDER’s prioritized list based on geographic proximity to other planned inspection trips. Investigators from ORA and, as needed, ORA laboratory analysts with certain expertise are responsible for inspecting drug manufacturing establishments. FDA primarily relies on three groups of investigators to conduct foreign inspections: ORA investigators based in the United States, who primarily conduct domestic drug establishment inspections but may sometimes conduct foreign inspections. Members of ORA’s dedicated foreign drug cadre, a group of domestically based investigators, who exclusively conduct foreign inspections. Investigators assigned to and living in the countries where FDA has foreign offices, including staff based in the foreign offices full time and those on temporary duty assignment to the foreign offices. FDA began opening offices around the world in 2008 to obtain better information on the increasing number of products coming into the United States from overseas, to build relationships with foreign stakeholders, and to perform inspections. FDA full-time foreign office staff are posted overseas for 2-year assignments. FDA staff can also be assigned to the foreign offices on temporary duty assignments for up to 120 days. In fiscal year 2019, there were full-time and temporary duty drug investigators assigned to FDA foreign offices in China and India. FDA’s process for determining whether a foreign establishment complies with CGMPs involves both CDER and ORA. During an inspection, ORA investigators are responsible for identifying any significant objectionable conditions and practices and reporting these to the establishment’s management. Investigators suggest that the establishment respond to FDA in writing concerning all actions taken to address the issues identified during the inspection. Once ORA investigators complete an inspection, they are responsible for preparing an establishment inspection report to document their inspection findings. Inspection reports describe the manufacturing operations observed during the inspection and any conditions that may violate U.S. statutes and regulations. Based on their inspection findings, ORA investigators make an initial recommendation regarding whether regulatory actions are needed to address identified deficiencies using one of three classifications: no action indicated (NAI); voluntary action indicated (VAI); or official action indicated (OAI). Inspection reports and initial classification recommendations for regulatory action are to be reviewed within ORA. For inspections classified as OAI—where ORA identified serious deficiencies—such inspection reports and classification recommendations are to be reviewed within CDER. CDER is to review the ORA recommendations and determine whether regulatory action is necessary. CDER also is to review inspection reports and initial classification recommendations for all for-cause inspections, regardless of whether regulatory action is recommended by ORA. According to FDA policy, inspections classified as OAI may result in regulatory action, such as the issuance of a warning letter. FDA issues warning letters to those establishments manufacturing drugs for the U.S. market that are in violation of applicable U.S. laws and regulations and may be subject to enforcement action if the violations are not promptly and adequately corrected. In addition, warning letters may notify foreign establishments that FDA may refuse entry of their drugs at the border or recommend disapproval of any new drug applications listing the establishment until sufficient corrections are made. FDA may take other regulatory actions if it identifies serious deficiencies during the inspection of a foreign establishment. For example, FDA may issue an import alert, which instructs FDA staff that they may detain drugs manufactured by the violative establishment that have been offered for entry into the United States. In addition, FDA may conduct regulatory meetings with the violative establishment. Regulatory meetings may be held in a variety of situations, such as a follow-up to the issuance of a warning letter to emphasize the significance of the deficiencies or to communicate documented deficiencies that do not warrant the issuance of a warning letter. Our preliminary analysis of FDA data shows that from fiscal year 2012 through fiscal year 2016, the number of FDA foreign drug manufacturing establishment inspections increased but then began to decline after fiscal year 2016 (see fig. 2). In fiscal year 2015, the total number of foreign inspections surpassed the number of domestic inspections. From fiscal year 2016 to 2018, both foreign and domestic inspections decreased—by about 10 percent and 13 percent, respectively. FDA officials attributed this decrease to vacancies in the number of investigators available to conduct inspections (which we discuss later in this testimony statement) and to inaccurate data used to select establishments for inspection in fiscal years 2017 and 2018. Despite steps taken to improve the accuracy and completeness of FDA data on foreign establishments, data challenges we identified in our 2008 report continue to make it difficult for FDA to accurately identify establishments subject to inspection. Specifically, since 2017, FDA has pursued an initiative to inspect approximately 1,000 foreign establishments that lacked an inspection history and, as of November 2019, officials said all of these establishments had either been inspected or were determined to not be subject to inspection. However, officials told us that this effort contributed to the decline in the number of foreign inspections conducted because of how data inaccuracies affected the process for selecting establishments for inspection. Specifically, after selecting uninspected foreign establishments for inspection, FDA determined that a sizeable percentage of these establishments were not actually subject to inspection (e.g., about 40 percent of those assigned to the China Office in fiscal years 2017 and 2018). These foreign establishments were thus removed from the list for inspection for the given year. FDA officials told us that the next highest priority establishments identified through the risk- based model to replace those establishments were domestic. As a result, the number of foreign establishments actually inspected decreased. As part of our ongoing work, we plan to examine the accuracy and completeness of information FDA maintains about foreign establishments and the application of its risk-based site selection process. FDA continues to conduct the largest number of foreign inspections in India and China, with inspections in these two countries representing about 40 percent of all foreign drug inspections from fiscal year 2016 (when we last reported on this issue) through 2018. (See table 2.) In addition to India and China, the rest of the countries in which FDA most frequently conducted inspections has generally been the same since our 2008 report. Our preliminary analysis of FDA data shows that each year from fiscal year 2012 through 2018, at least 50 percent of FDA’s foreign inspections were surveillance inspections. In contrast to preapproval inspections, surveillance inspections are used to ensure drugs already on the market are manufactured in compliance with FDA regulations. In recent years, the proportion of foreign surveillance inspections has increased. As figure 3 shows, in fiscal year 2012, 56 percent of foreign inspections were surveillance-only inspections; in contrast, from fiscal year 2016 through 2018, about 70 percent of foreign inspections were surveillance-only, which was comparable to the percentage for domestic inspections during that period. This is a significant increase from the 13 percent of foreign inspections that were surveillance-only when we made our 2008 recommendation that FDA inspect foreign establishments at a comparable frequency to their domestic counterparts (85 percent of which were surveillance-only at that time). FDA has implemented changes to its foreign drug inspection program since our 2008 report that may have contributed to the increase in surveillance inspections. Prior to 2012, FDA was required to inspect domestic establishments that manufacture drugs marketed in the United States every 2 years, but there was no similar requirement for foreign establishments. As a result, and as we reported in 2008, foreign inspections were often preapproval inspections driven by pending applications for new drugs. FDA thus conducted relatively few surveillance-only inspections to monitor the ongoing compliance of establishments manufacturing drugs that were already on the market, with just 13 percent of foreign inspections conducted for surveillance purposes at the time of our 2008 report. However, in 2012, the Food and Drug Administration Safety and Innovation Act eliminated the 2-year requirement for domestic inspections, directing FDA to inspect both domestic and foreign establishments on a risk-based schedule determined by an establishment’s known safety risks, which was consistent with our 2008 recommendation. Our preliminary analysis of FDA data shows that from fiscal year 2012 through 2018, FDA identified deficiencies in approximately 64 percent of foreign drug manufacturing establishment inspections (3,742 of 5,844 inspections). This includes deficiencies necessitating a classification of VAI or the more serious OAI, as described in the text box. Inspection Classifications Based on their inspection findings, FDA investigators make an initial recommendation regarding the classification of each inspection: No action indicated (NAI) means that insignificant or no deficiencies were identified during the inspection. Voluntary action indicated (VAI) means that deficiencies were identified during the inspection, but the agency is not prepared to take regulatory action, so any corrective actions are left to the establishment to take voluntarily. Official action indicated (OAI) means that serious deficiencies were found that warrant regulatory action. About 59 percent of domestic inspections (3,702 out of 6,291) identified deficiencies during this time period. (See fig. 4.) This proportion is similar to what we found when we last looked at this issue in 2008, when FDA identified deficiencies in about 62 percent of foreign inspections and 51 percent of domestic inspections from fiscal years 2002 through 2006. Our preliminary analysis showed that serious deficiencies identified during foreign drug inspections classified as OAI—which represented 8 percent of inspections from fiscal year 2012 through 2018—include CGMP violations such as those related to production and process controls, equipment, records and reports, and buildings and facilities. For example: Failure to maintain the sanitation of the buildings used in the manufacturing processing, packing, or holding of a drug product (21 C.F.R. § 211.56(a) (2019)). At an establishment in India producing finished drug products, the investigator reported observing a live moth floating in raw material used in the drug production, and that the facility staff continued to manufacture the drug products using the raw material contaminated by the moth, despite the investigator pointing out its presence. Failure to perform operations relating to the manufacture, processing, and packing of penicillin in facilities separate from those used for other drug products (21 C.F.R. § 211.42 (d) (2019)). At an establishment in Turkey that manufactured penicillin and other drugs, the investigator reported that the manufacturer had detected penicillin outside the penicillin manufacturing area of the establishment multiple times. According to FDA, penicillin contamination of other drugs presents great risk to patient safety, including potential anaphylaxis (even at extremely low levels of exposure) and death. The identification of serious deficiencies is not unique to foreign inspections. For example, at a domestic establishment producing finished drug products, the investigator observed brown stains, white residues, and brown stagnant water in manufacturing equipment. Some investigators who conduct foreign inspections expressed concern with instances in which ORA or CDER reviewers reclassify the investigator’s initial inspection classification recommendations of OAI to the less serious classification of VAI. We plan to examine this issue as part of our ongoing work. Our ongoing work showed FDA’s foreign inspection workforce has staff vacancies, which FDA officials said contributed to the recent decline in inspections. As previously mentioned, FDA uses multiple types of staff resources to conduct foreign drug inspections—including ORA investigators based in the United States, members of ORA’s dedicated foreign drug cadre based in the United States, and investigators assigned to FDA’s foreign offices. However, each of these groups has current vacancies. According to FDA officials, the agency is trying to fill vacancies in each of these groups, but the lower staff numbers may limit FDA’s ability to conduct more foreign inspections. ORA investigators based in the United States. This group of investigators conducts the majority of foreign inspections; about 76 percent of foreign inspections in fiscal year 2018 involved an ORA investigator based in the United States who conducts both foreign and domestic inspections. FDA officials said that the more experienced investigators from this group are expected to conduct three to six foreign inspections per year, and investigators hired using generic drug user fees are expected to inspect nine to 12 foreign establishments per year. As of June 2019, there were 190 investigators eligible to conduct foreign drug inspections, but officials said that as of November 2019, the agency had an additional 58 vacancies in this group. Officials said that the agency was in the process of hiring 26 ORA investigators based in the United States to fill these vacancies, with 32 vacancies remaining. FDA officials attributed the vacancies to multiple factors: investigator retirements, investigator movement to other parts of FDA, and the need to hire to additional investigator positions using generic drug user fees. Officials also said that a reorganization within ORA led to a reduced number of investigators who conduct drug manufacturing establishment inspections. While FDA recently filled several of the vacancies, officials told us that new investigators are not typically used for foreign inspections until they have been with the agency for 2 to 3 years. ORA dedicated foreign drug cadre. About 15 percent of foreign inspections in fiscal year 2018 involved an investigator from ORA’s dedicated foreign drug cadre—a group of ORA investigators based in the United States who exclusively conduct foreign inspections. FDA officials said that members of the cadre are expected to conduct 16 to 18 foreign inspections each year. According to FDA, the cadre had 20 investigators in 2012 and 15 investigators in 2016. However, the cadre had only 12 investigators as of November 2019, out of 20 available slots. According to FDA officials, the agency is attempting to fill these positions from the current ORA investigator pool, but officials are not confident that all 20 slots will be filled. Investigators assigned to FDA’s foreign offices. Approximately 7 percent of foreign inspections in fiscal year 2018 involved investigators from FDA’s foreign offices. The investigators conducting these inspections are those based in the China and India foreign offices—the countries where most drug inspections occur— and also include those on temporary duty assignment to these offices. According to FDA officials, these investigators are expected to conduct 15 foreign inspections each year. We have noted high vacancy rates for these foreign offices in past reports. While these vacancy rates have decreased over time, vacancies persist. As of November 2019, FDA’s China office had three of 10 drug investigator positions vacant (a 30 percent vacancy rate), while FDA’s India office had two of six drug investigator positions vacant (a 33 percent vacancy rate). FDA has taken steps to address vacancies in the foreign offices, but continues to face challenges. In our 2010 report, we recommended that FDA develop a strategic workforce plan to help recruit and retain foreign office staff. FDA released such a plan in March 2016, but the long- standing vacancies in the foreign offices raise questions about its implementation. FDA officials told us that one challenge in recruiting investigators for the foreign offices is that well-qualified investigators for those positions need foreign inspection experience. For example, an official in FDA’s India office told us that foreign inspections can be challenging and the India office does not have the resources to develop or train new investigators. Therefore, it is important to recruit investigators who have experience conducting foreign inspections, and such investigators are recruited from ORA. Thus, vacancies in the other two groups of investigators can influence the number of staff available to apply for positions in the foreign offices. Further, according to FDA officials, after employees have accepted an in-country position, the agency can experience significant delays before they are staffed in the office due to delays in processing assignments. For example, an official in FDA’s India office said that investigators need to complete a week-long security training program and must obtain the security clearance needed to work at the U.S. Embassy, which is where FDA’s foreign office is located. However, the official told us that there are limited availabilities for that training and background checks for security clearances can take time. According to this official, FDA investigators do not usually receive first priority for the training. FDA estimates that it can take as little as 1 year to over 2 years to clear background and medical checks and arrive at a foreign office. For example, an investigator in FDA’s China office told us that as a result of these requirements and other issues, it took nearly 2 years for the investigator to arrive at the office after FDA had accepted the investigator’s application. According to FDA’s own strategic workforce plan for the foreign offices, these types of delays have resulted in staff changing their decision after accepting a position in the foreign offices. Our preliminary analysis indicates that FDA continues to face unique challenges when inspecting foreign drug establishments—as compared to domestic establishments—that raise questions about the equivalence of these inspections. Specifically, based on our interviews with drug investigators in the dedicated foreign drug cadre and FDA’s foreign offices in China and India, we identified four challenge areas related to conducting foreign inspections, which are described below. Of the four challenge areas identified, three areas—preannouncing inspections, language barriers, and lack of flexibility—were also raised in our 2008 report. Preannouncing Inspections. As we reported in 2008, the amount of notice FDA generally gives to foreign drug establishments in advance of an inspection is different than for domestic establishments. Domestic drug establishment inspections are almost always unannounced, whereas foreign establishments generally receive advance notice of an FDA inspection. According to FDA officials, FDA is not required to preannounce foreign inspections. However, they said the agency generally does so to avoid wasting agency resources, obtain the establishment’s assistance to make travel arrangements, and ensure the safety of investigators when traveling in country. FDA does conduct some unannounced foreign inspections, particularly if the investigators conducting the inspection are based in FDA’s foreign offices. However, FDA officials told us that FDA does not have data on the frequency with which foreign drug inspections are unannounced, nor the extent to which the amount of notice provided to foreign establishments varies. According to FDA officials, this is because FDA does not have a data field in its database to systematically track this information. However, the officials estimated that the agency generally gives 12 weeks of notice to establishments that investigators are coming when investigators are traveling from the United States. While investigators in FDA’s China and India offices do conduct unannounced or short-notice inspections, these staff do not perform most of the inspections in these countries. (See table 3). Our preliminary work indicates that preannouncing foreign inspections can create challenges and raises questions about the equivalence to domestic inspections. Of the 18 investigators we interviewed, 14 said that there are downsides to preannouncing foreign inspections, particularly that providing advance notice gives foreign establishments the opportunity to fix problems before the investigator arrives. For example, when an inspection is preannounced, it gives establishments time to clean up their facility and update or generate new operating procedures. However, establishments are expected to be in a constant state of compliance and always ready for an FDA inspection, and several investigators told us seeing the true day-to-day operating environment for an establishment is more likely during an unannounced inspection. Of the 18 investigators we interviewed, 12 said that unannounced inspections are generally preferable to preannounced inspections. One investigator told us that, although they believe the best way to ensure industry compliance to CGMPs is for establishments to not know when FDA is coming for an inspection, there is no data that would allow the agency to evaluate whether unannounced inspections are better than preannounced inspections. In addition, some investigators told us that it is still possible to identify serious deficiencies during preannounced inspections. For example, investigators can still identify issues by looking at the firm’s electronic records, including time-stamped data relating to the creation, modification, or deletion of a record. Three investigators also told us that in some cases there can be benefits to announcing inspections in advance. For example, for preapproval inspections, announcing the inspection in advance gives the establishment time to organize the documentation and staff needed to conduct the inspection. Language Barriers. Our preliminary work indicates that language barriers—which we first reported as a challenge to conducting foreign inspections in our 2008 report—can add time to inspections and raise questions about the accuracy of information FDA investigators collect and thus about the equivalence to domestic inspections. FDA generally does not send translators on inspections in foreign countries. Rather, investigators rely on the drug establishment to provide translation services, which can be an English-speaking employee of the establishment being inspected, an external translator hired by the establishment, or an English-speaking consultant hired by the establishment. Of the 18 investigators that we interviewed, 14 said that language barriers can be a challenge to conducting foreign inspections and were especially challenging in parts of Asia, including China and Japan. Seven investigators told us this is less of a challenge for inspections conducted in other foreign countries, including India and countries in Europe, because workers at establishments in these countries are more likely to speak English, and documentation is also more likely to be in English. Investigators told us that compared to domestic inspections, it can be more challenging and take longer to complete typical inspection-related activities, such as reviewing documentation or interviewing employees, if the investigator needs to rely on translation. Fourteen of the 18 investigators we interviewed said that there can be concerns related to relying on establishment staff and independent translators. Specifically, 11 investigators told us there can be uncertainties regarding the accuracy of the information being translated, particularly when investigators rely on the translation provided by an employee of the establishment being inspected. For instance, one investigator said that there is more risk of conflict of interest if the establishment uses its own employees to translate. Another investigator said that they went to a drug establishment in China that told FDA it had English-speaking employees to translate the inspection, but that this was not the case, and the investigator had to use an application on their phone to translate the interviews. In addition, the firm representative providing the translation may be someone that does not have the technical language needed, which can make it harder to communicate with firm staff and facilitate the inspection. One investigator told us that the independent translators hired by firms are sometimes consultants and, in those instances, it can seem like the consultants are coaching the firm during the inspection. FDA officials told us that when they conduct unannounced for-cause inspections in China, investigators bring locally employed staff who work in FDA’s China office to act as translators. The investigators we interviewed said that in such instances, they valued knowing that the translation they were getting was accurate. However, FDA does not have the resources to provide locally employed staff on every inspection, according to an FDA official. We will continue to examine this issue with FDA as part of our ongoing work. Lack of Flexibility. Our preliminary work indicates that, as we first reported in 2008, the overseas travel schedule can present unique challenges for FDA’s domestically based investigators—including both ORA investigators and members of the dedicated foreign dug cadre— who conduct the majority of foreign inspections. Eight of the 12 dedicated foreign drug cadre investigators that we interviewed told us that there is little flexibility to extend foreign inspections conducted by domestically based investigators because the inspections they conduct on an overseas trip are scheduled back-to-back in 3-week trips that may involve three different countries. This raises questions about their equivalence to domestic inspections. For instance, extending one inspection would limit the amount of time the investigator has to complete their other scheduled inspections, some investigators told us. In addition, eight investigators told us that domestically based staff are generally unable to extend the total amount of time spent on an overseas trip—one investigator told us that an investigator would have to find something really bad to justify an extension. In contrast, FDA officials told us that inspections conducted by in-country investigators in China or India, and domestic inspections in the United States, are generally scheduled one at a time and can thus more easily be extended if the investigator needs additional time to pursue potential deficiencies. However, in-country investigators are not involved in the majority of inspections conducted in China or India. Three investigators from the dedicated foreign drug cadre told us that when they travel overseas, they adjust their inspection approach to help ensure they finish foreign inspections on time. For example, one investigator told us an investigator may start the inspection in an area of the establishment that was noted as having issues during the last inspection. However, one investigator said that sometimes it is not possible to cover everything in depth during a foreign inspection. Another investigator told us that they focus on identifying the most serious issues during a foreign inspection, and that less serious issues can be identified in the establishment inspection report for reference in the next inspection. Five investigators also noted that they work long hours during their inspection to ensure they can complete the needed work. While FDA may assign more than one investigator to an inspection to complete needed work, one investigator said that FDA does not usually assign more than one person to an inspection because investigators are expected to have the experience to conduct inspections by themselves. From fiscal years 2012 to 2018, the majority of both foreign and domestic inspections were conducted by one person—77 percent and 66 percent, respectively. Post-Inspection Classification Process. According to FDA officials, starting in fiscal year 2018, FDA implemented a new post-inspection classification process: when an ORA investigator recommends an OAI classification following an inspection, ORA compliance is required to send that inspection report to CDER for review within 45 calendar days from the inspection closeout. Among other things, the process was intended to help ensure FDA can communicate inspection results to domestic and foreign establishments within 90 days of the inspection closeout, as committed to under the Generic Drug User Fee Amendments of 2017(GDUFA II). FDA officials told us that the changes also required an additional ORA review for foreign inspection reports to align that process with the process for domestic inspection reports. Although the 45-day reporting time frame for potential OAI classifications is a requirement for both domestic and foreign inspections, adding the additional level of review within ORA effectively shortened the amount of time investigators have to document findings for foreign inspections. Our preliminary work indicates that the post-inspection reporting time frames can create challenges for domestic investigators that conduct foreign inspections and raise questions about the equivalence to domestic inspections. Eight of the 18 investigators that we interviewed said shortening the time for completing reports and adding a level of review has made it more challenging to meet reporting requirements, especially if serious deficiencies are identified during the inspection. Investigators told us that for a potential OAI inspection, they now need to send the inspection report to their supervisor for endorsement within 10 days of the closeout of a foreign inspection, regardless of when the investigator’s next inspection is scheduled for, or whether the investigator has to travel from overseas back to the United States after the inspection. For example, if a domestic investigator finds serious deficiencies on the first inspection, thus indicating an initial OAI classification, the investigator needs to write and send the related inspection report to the ORA supervisor for endorsement before returning home from the 3-week overseas trip to meet the required time frame. One investigator told us that, as a result of the time pressures, post-inspection reports may be less thorough, and that some inspection observations could be better supported if investigators had more time to write the reports. In conclusion, foreign manufacturing establishments continue to be a critical source of drugs for millions of Americans, and FDA inspections are a key tool to ensure the quality of these drugs. Over the years since we first examined this issue, FDA has made significant changes to adapt to the globalization of the drug supply chain and has greatly increased the number of inspections that it conducts of foreign establishments. Notably, it has markedly increased the percentage of foreign inspections conducted to monitor drugs already on the market, which we previously noted were vital to FDA oversight of foreign establishments. However, the agency continues to be faced with many of the same challenges in the oversight of foreign establishments that we identified in our 2008 report. Our preliminary work has identified inspection decreases, related in part to FDA challenges filling investigator vacancies. We have also identified a variety of unique challenges that investigators face in foreign inspections. As we continue to conduct our work, we will further examine the cumulative effect of these challenges that raise questions about FDA’s ability to conduct equivalent inspections in foreign establishments. We will examine the extent to which FDA has assessed its oversight of drugs manufactured overseas and the steps it is taking to mitigate any risks, and make recommendations as appropriate. Chair DeGette, Ranking Member Guthrie, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Mary Denigan-Macauley, Director, Health Care at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are William Hadley (Assistant Director); John Lalomio (Analyst-in- Charge); Katherine L. Amoroso; George Bogart; Zhi Boon; Derry Henrick; Laurie Pachter; and Vikki Porter. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "More than 60 percent of establishments manufacturing drugs for the U.S. market were located overseas in fiscal year 2018. FDA has estimated that about 40 percent of finished drugs and 80 percent of active drug ingredients are manufactured overseas. FDA is responsible for overseeing the safety and effectiveness of all drugs marketed in the United States, regardless of where they are produced and conducts inspections of both foreign and domestic drug manufacturing establishments. GAO has had long-standing concerns about FDA's ability to oversee the increasingly global supply chain, an issue highlighted in GAO's High Risk Series for the last 10 years. GAO recommended in 2008 (GAO-08-970) that FDA increase the number of inspections of foreign drug establishments. GAO found in 2010 (GAO-10-961) and 2016 (GAO-17-143) that FDA was conducting more of these foreign drug inspections, but GAO also reported that FDA may have never inspected many establishments manufacturing drugs for the U.S. market. This statement is based on ongoing work and provides preliminary GAO observations on 1) the number of foreign inspections FDA has conducted, 2) inspection staffing levels, and 3) challenges unique to foreign inspections. For this work, GAO examined FDA data, visited FDA foreign offices in China and India, and interviewed drug investigators based in these offices and in the United States. GAO's preliminary analysis of Food and Drug Administration (FDA) data shows that from fiscal year 2012 through 2016, the number of foreign drug manufacturing establishment inspections increased. From fiscal year 2016 through 2018, both foreign and domestic inspections decreased—by about 10 percent and 13 percent, respectively. Howevever, the total number of foreign inspections surpassed the number of domestic inspections in 2015, and a growing percentage of FDA's foreign inspections (43 percent in 2018) were conducted in China and India, where most establishments that ship drugs to the United States were located. FDA officials attributed the decline, in part, to vacancies among investigators available to conduct inspections. GAO previously noted the vital role that inspections play in FDA's oversight of foreign establishments. FDA has vacancies among each of the groups of investigators who conduct foreign inspections. FDA had 190 investigators in the United States who conduct the majority of foreign inspections, but an additional 58 positions were vacant. FDA was in the process of filling 26 of these vacancies, with 32 remaining. However, according to FDA officials, it could be 2 to 3 years before new staff are experienced enough to conduct foreign inspections. FDA also faces persistent vacancies among investigators in its foreign offices. FDA investigators identified persistent challenges conducting foreign inspections, raising questions about the equivalence of foreign to domestic inspections. For example, while domestic inspections are almost always unannounced, FDA's practice of preannouncing foreign inspections up to 12 weeks in advance may give manufacturers the opportunity to fix problems. Investigators from FDA's China and India offices do conduct some unannounced inspections, but they are involved in a small percentage of inspections in these countries (27 percent and 10 percent, respectively). Further, FDA continues to rely on translators provided by the foreign establishments being inspected, which investigators said can raise questions about the accuracy of information FDA investigators collect. GAO will continue to assess these issues as part of ongoing work, and make recommendations as appropriate.", "document_type": "gao"}
{"report": "A total of 43 states operated at least part of their Medicaid programs under demonstrations, as of November 2018. State demonstrations can vary in size and scope, and many are comprehensive in nature, affecting multiple aspects of a state’s Medicaid program. Nationally, federal spending under demonstrations represented over 30 percent of all federal Medicaid spending in fiscal year 2016. (See app. II.) Demonstrations are typically approved by CMS for an initial 5-year period, but some states have operated portions of their Medicaid programs under a demonstration for decades. This can be achieved by a state requesting approval by CMS for one or more 3- to 5-year extensions of an existing demonstration (referred to as an extension). States often make changes to their demonstrations, either through the extension process or by requesting to amend a demonstration during the approval period (referred to as an amendment). From January 2017 through May 2018, CMS approved applications for a new demonstration, extension, amendment, or a combination of these in 23 states. (See fig. 1.) Each demonstration is governed by special terms and conditions (STCs), which reflect the agreement reached between CMS and the state, and describe the parameters of the authority granted to the state. For example, the STCs may define for what populations and services funds can be spent under the demonstration, as well as specify various state reporting requirements. The STCs also include a spending limit for the demonstration that is meant to ensure the demonstration is budget neutral to the federal government; that is, the federal government should spend no more under a state’s demonstration than it would have spent without the demonstration. Requirements for new demonstrations and extensions. As required under PPACA, HHS issued regulations in 2012 to address transparency in the approval of applications for new demonstrations and extensions. The regulations include requirements for states to seek public input on their proposals prior to submitting an application to CMS, requirements for information states must include in their public notices and applications, and procedures that CMS would follow upon receiving the application. CMS reviews the submitted application to check for compliance with these regulations, before seeking additional public input through a 30-day comment period at the federal level. (See fig. 2.) The regulations also provide CMS discretion to engage in additional transparency activities on a case-by-case basis. Requirements for amendments. The 2012 regulations do not apply to states seeking to amend existing demonstrations. Instead, the transparency requirements for amendments are set by guidance HHS issued in 1994 and in the individual STCs that govern each demonstration. The requirements from the guidance and STCs include, for example, that the state seek public input prior to submitting its application and provide in its application an explanation of its process for notifying the public and a detailed description of what is being amended, including the impact on beneficiaries. CMS’s regulations also include monitoring and evaluation requirements to ensure that the outcomes of demonstrations are transparent. Monitoring. States must perform periodic reviews of the implementation of their demonstrations, and the STCs typically require states to report those outcomes to CMS periodically. The regulations also require states to conduct a public forum within 6 months after the implementation date of the demonstration, and annually thereafter, to solicit public comments on the progress of the demonstration project and summarize issues raised in monitoring reports submitted to CMS. The regulations require that states submit the annual monitoring reports to CMS. Evaluation. States are required to conduct evaluations to assess whether their demonstrations are achieving the state’s goals and objectives. After a demonstration is approved, states are required to submit an evaluation design to CMS for review and approval. The evaluation design must discuss the hypotheses that will be tested, the data that will be used, and other items outlined in the STCs. In the event that a state wishes to extend its demonstration, the state’s extension application must include, among other things, a report presenting the evaluation’s findings to date, referred to as an interim evaluation report. States are also required to submit final evaluation reports at the demonstration’s end. All evaluation designs and reports are to be made public. Transparency Requirements for New Demonstrations and Extensions The transparency requirements for new Medicaid section 1115 demonstrations and extensions of existing demonstrations are established in federal regulations at 42 C.F.R. part 431, subpart G. We found that CMS has developed procedures for assessing states’ applications for new demonstrations and extensions against the transparency requirements established in 2012 (see sidebar). Specifically, CMS’s procedures involve reviewing incoming applications for new demonstrations or extensions against detailed checklists the agency designed to align with transparency requirements in the regulations. (CMS refers to these as completeness checks.) For example, the checklist for new demonstrations includes checks for whether the application included a description of the demonstration; any proposed changes to the benefits, delivery system, or eligibility requirements; information on the public hearing(s) and public comment process the state conducted; and a summary of the issues raised in the state public comment process. (See fig. 3.) We found that CMS completed checklist reviews for each of the 11 applications for new demonstrations or extensions that CMS approved from January 2017 through May 2018. CMS has also developed and implemented procedures for seeking public input at the federal level and making that input publicly available. This includes CMS sending email notifications to individuals who have registered on the agency’s website when demonstration applications are open for public comment; posting the application on the website where the public can post comments during the 30-day comment period; and maintaining the public comments on the website, which are maintained indefinitely, according to CMS officials. We found that CMS conducted a federal comment period for all 11 of the new and extension applications in our review period. In addition to storing the federal public comments, CMS’s website contains a record of key decisions and documents for each demonstration (referred to as the administrative record). The administrative record includes states’ applications, as well as CMS’s approvals, denials, and decisions about the completeness of applications—a requirement under the 2012 regulations. CMS officials told us that they include additional documents as standard practice, though they are not required to be posted, such as a fact sheet on the demonstration and other official communication between the agency and the state, to support transparency. CMS first launched this section of its website in December 2011 with an aim to improve access to Medicaid program information, including information on demonstrations, and redesigned the website in 2013 to improve functionality. The administrative record provides a history, dating as far back as 2011, of what a state has tested, how the approach has evolved over time, and what has been learned from the approach. We identified several areas of weakness in CMS’s policies or procedures for ensuring transparency in approvals of new demonstrations and extensions of existing demonstrations. These weaknesses related to the transparency of major changes made to pending applications, the transparency of changes to approved spending limits, and inconsistency in CMS’s review of applications for compliance with transparency requirements for new demonstrations and extensions. CMS did not apply a consistent approach to ensuring transparency in two states that made major changes to their demonstration applications mid- review. Indiana and Kentucky submitted changes to pending applications, the first for an extension and the latter for a new demonstration that had substantial potential effects for some beneficiaries. Indiana’s changes included adding new eligibility requirements for some beneficiaries, and Kentucky’s changes included accelerating the effective dates of new requirements to maintain eligibility (see sidebar). CMS did not require either state to solicit public input, though both states opted to hold a public comment period on the proposed changes concurrent with CMS’s review. Further, CMS reviewed Indiana’s proposed changes against limited transparency requirements but did not do so for Kentucky. Indiana submitted a final version of its application summarizing public input and the state’s response, while Kentucky did not. Thus, the extent to which these comments were considered at the state and federal levels was not transparent to the public. Figure 4 shows a timeline of the events surrounding Indiana’s and Kentucky’s requests to make changes to their pending demonstration applications. Kentucky: In July 2017, Kentucky submitted changes to its pending application for a new demonstration, including: replacing a provision for a year-long phase-in of a proposed 20-hour per week work and community engagement requirement for beneficiaries with a 3- month phase-in of the requirement; and disenrolled for 6 months for failing to timely report changes in income or other circumstances affecting eligibility. CMS approved a significant increase in the spending limit for a portion of Florida’s demonstration—which appeared to reflect a change in the agency’s position on the allowable use of the funds—without making transparent the basis for this decision. Specifically, CMS increased the spending limit for a pool of funds for payments to offset providers’ uncompensated care costs by close to $1 billion in 2017 after having reduced the limit 2 years earlier. In its approval letter, CMS provided limited information on the basis for this change. CMS stated that the limit was based on the state’s most recent data on uncompensated care costs, but did not disclose a significant change in its methodology for setting these limits. In unpublished correspondence to Congress, CMS indicated that the calculation of the spending limit was broadly consistent with previous policy with one significant change. Specifically, the letter indicated that whether the state had opted to expand Medicaid coverage to low-income, childless adults as provided for under PPACA would no longer factor into the limit, thus allowing CMS to include uncompensated care costs for this population in setting the limit. This change led to increasing the state’s spending limit to $1.5 billion annually. (See text box.) Moreover, CMS noted plans to apply this change across all states going forward. CMS officials, however, did not indicate that they had publicly communicated this policy change to all states. In past reports, we have recommended that HHS make public the basis for demonstration approvals including the basis for elements used to set spending limits, and in 2008, we raised the issue as a matter for Congress to consider. CMS has taken a number of steps in the last several years to update and make public its policies for setting spending limits, but has not yet taken action to make public the basis of spending limits. CMS Decision to Increase Spending Limit for a Funding Pool in Florida’s Medicaid Section 1115 Demonstration In letters to Florida, CMS wrote: April 14, 2015: “…over time, CMS has had a number of concerns about the LIP , including its lack of transparency, encouragement toward overreliance on supplemental payments, and distribution of funds based on providers’ access to local revenue instead of service to Medicaid patients. Last year, CMS made clear that LIP would not continue in its current form….We will approach review of a LIP proposal from Florida based on several key principles. First, coverage rather than uncompensated care pools is the best way to secure affordable access to health care for low-income individuals, and uncompensated care pool funding should not pay for costs that would be covered in a Medicaid expansion.…” October 15, 2015: “…Pursuant to our June 23, 2015 agreement in principle, establishing the size, duration, and distribution methodology for the Low Income Pool (LIP)…The total computable dollar limit in demonstration year 10 (2015-2016) will be $1 billion. In demonstration year 11 (2016-2017) the total computable dollar limit will be $607,825,452…” August 3, 2017: “For the extension, CMS has established an amount for the low-income pool’s (LIP) uncompensated care pool to be approximately $1.5 billion annually, based on the most recent available data on hospitals’ charity care costs.” Finally, we observed some inconsistencies in CMS’s reviews of states’ applications for their compliance with the transparency requirements for new demonstrations and extensions. Expected changes in enrollment were not always included in state public notices. In two of the four applications for new demonstrations and extensions for which we conducted in-depth reviews (Florida’s extension and Washington’s new demonstration), estimates for the expected increase or decrease in enrollment were not included in the state’s public notice documents as required. CMS officials told us that they are revising procedures to resolve such inconsistencies, including making additions to written standard operating procedures. Evaluation information was not always included in state applications. Although states seeking extensions are required to submit an interim evaluation report, Florida only included a statement in its application that it had recently executed an evaluation contract and had no findings to report. According to CMS, Florida’s evaluation design was not approved until weeks before the extension application was due. Despite not having information on whether Florida’s demonstration was meeting its goals, CMS officials considered the state’s application complete, stating that Florida had met the intent of the regulation by providing its findings to date. In 2018, we reported that there were limitations in state evaluations of demonstrations, in part, due to how CMS sets requirements for evaluations, and we made a recommendation to improve CMS’s procedures. In line with our recommendation, CMS has since developed an enhanced set of STCs that specify when evaluation reports are due, and reported in November 2018 that it is in the process of developing protocols to ensure that these requirements are consistently included in the STCs. Transparency Requirements for Amendments Applications for amendments to Medicaid section 1115 demonstrations are subject to requirements for seeking public input outlined in guidance the Department of Health and Human Services (HHS) issued in 1994 and those included in the special terms and conditions governing each demonstration. CMS applies limited transparency requirements to states’ applications to amend existing demonstrations, despite the fact that states may propose significant changes to demonstrations through amendments (see sidebar). CMS does not place limits on what changes can be made through amendments. From January 2017 through May 2018, CMS approved 21 amendments in 17 states, and we found that at least 17 amendment applications were pending CMS approval as of January 2019. These 17 states made a wide range of changes to their demonstrations through amendments. For example, one state amended its demonstration to cover dental services for adults with disabilities, while other amendments included such changes as requiring beneficiaries to work or participate in community engagement activities as a condition of maintaining Medicaid eligibility, as was done through amendments in Arkansas and New Hampshire during the period we reviewed. As it does with applications for new demonstrations and extensions, CMS reviews amendment applications by using a checklist, conducting a federal public comment period, and posting state demonstration documentation on the CMS website. However, the transparency requirements for amendments applied during the checklist review are more limited than the requirements for new demonstrations and extensions. (See fig. 5.) The transparency requirements for amendment applications are more limited than those for new demonstrations and extensions in the following key areas, potentially limiting CMS’s ability to ensure public transparency for the approvals of amendments. No requirement to hold a state public comment process or provide CMS a summary of public input received. For amendments, states have a range of options for seeking public input and, unlike for new and extension applications, states are not required to submit a summary of the public input received on their applications and how they responded. Instead, in amendment applications, states are only required to describe the process the state used to solicit public input. Among the three amendment approvals for which we conducted an in-depth review, California did not hold a formal public comment period and did not provide CMS information on any public input it received, neither of which is required under the transparency requirements for amendments. No requirement to include expected changes in enrollment and costs. In contrast with requirements for new demonstrations and extensions, CMS does not require states to include in amendment applications the expected increase or decrease in enrollment, and the amendment applications we reviewed included limited or no information on changes to enrollment. (See text box.) CMS also does not require information on expected changes in costs for all amendments, and we found variation in the information included in amendment applications, including limited or no information on costs. No minimum requirements for information to be included in the public notice. Unlike the transparency requirements for new demonstrations and extensions, there are no requirements specifying what information states must include in their public notices for amendments. For example, Arkansas did not include in its public notice information on the changes to enrollment estimated from any of the amendment provisions. In addition to the differences in the transparency requirements for amendment applications, we identified inconsistencies in how CMS applied the transparency requirements for amendment applications across states, particularly the requirements related to describing changes to the demonstration evaluations. For amendments, as is similar to extensions, states are required to describe how the demonstration’s evaluation will be revised to incorporate amendment provisions. The following are examples of the inconsistencies: CMS determined that Massachusetts’s amendment application, which proposed to waive non-emergency medical transport, eliminate provisional eligibility for most populations, and cover former foster care youth, was determined to be incomplete (that is, not in compliance with the transparency requirements), partially due to the state not submitting a revised evaluation design plan. In contrast, CMS determined that Arkansas’s application, which did not include a revised evaluation design plan, was complete. Arkansas noted in its application that the state planned to revise its evaluation to test two additional hypotheses. However, the added hypotheses did not address, for example, the waiver for retroactive eligibility proposed in the application. Among the 18 other demonstration amendment applications CMS approved during our review period, there was variation in the information the states included about the changes to the demonstration’s evaluation hypotheses or design. For example: Iowa submitted an amendment application, which CMS determined to be in compliance with transparency requirements, to waive retroactive eligibility for all beneficiaries, and said that it was not changing the evaluation design based on the amendment provisions. In at least two other states’ amendments—Florida and Utah—the applications, which CMS determined to be in compliance with transparency requirements, did not include any information on the changes to the evaluation due to the amendment or indicated that the state would be making changes at a later date. The potential effects of policy changes states make through amendments can be comparable to effects of new demonstrations and extensions. CMS has considered taking further steps to ensure transparency for amendments, but has not done so. Specifically, in both its response to comments in the 2012 final rule and a subsequent letter to state Medicaid directors in 2012, CMS indicated that the agency intended to evaluate the types of amendments submitted by states and issue further guidance on how the notice and comment provisions would be applied to amendments that have a significant impact. However, CMS did not issue such guidance and officials told us that they had no plans to do so. CMS officials told us that including standard requirements in demonstration STCs for submitting amendment applications helps improve the transparency of amendments. However, the standard requirements that CMS has included do not ensure that states provide information to the public or CMS on the effect of an amendment on enrollment and costs, key pieces of information for amendments that have and may continue to have a significant impact. According to federal standards for internal controls related to risk assessment, federal agencies should identify and manage risks related to achieving agency objectives. Without a policy with robust transparency requirements for amendment applications with significant impacts, there is the potential that states and CMS will fail to receive meaningful public input on the amendment and thereby lack complete understanding of the impact. As a result, CMS may not be positioned to mitigate any potential risks in the demonstrations being amended or when other states request to test similar policies in the future. CMS reviewed state descriptions of issues raised during the state public input process and the state’s response as part of its application review. Applications for six of the seven approvals for which we conducted in- depth reviews summarized themes from the comments that were received and included the states’ responses to these comments. State responses included laying out changes the state made to the proposal in response to the comments, clarifying certain aspects of the proposed demonstration, or providing justification for not making a change. However, the level of detail in state summaries of their responses to these comments varied considerably. For example: Washington application for new demonstration. Washington provided an extensive summary of the comments received, categorized by themes, along with the state’s responses to each of them. One commenter suggested a 1-year implementation period to ensure that sufficient planning and preparations were undertaken before the new demonstration officially went into effect. The state agreed that this was “essential to assure operational readiness and critical success of this demonstration,” and revised its proposal to include a 9-month implementation period. Florida application to extend demonstration. In contrast to Washington, Florida’s application to extend its managed care program provided a long list of state comments and nearly all were addressed with a standard response from the state that the comments were taken into consideration, but no changes to the existing STCs were being requested. These included concerns about access and choice under current pharmacy networks, and other access issues such as difficulties in obtaining referrals to specialists. Florida officials told us that they addressed stakeholder concerns through the state public comment process, which includes public forums, and that they are not necessarily required to provide any additional explanation in the state’s application to CMS. Florida officials also stated that some demonstration elements stem from state legislation, which limits their ability to make changes in response to comments. According to CMS officials, historically, the agency has not requested the full set of comments that are submitted to the states. None of the states that we reviewed attached the actual comments that were received to the application—only summaries—though some posted them on their website or had them available upon request, according to state officials. CMS officials told us the agency has not consistently requested that states provide the actual comments received; however, in the last year and a half the agency has been making more of an effort to request the full set of comments instead of solely relying on the summaries provided in the applications. Officials said they anticipate that this will be the agency’s standard practice going forward. In making demonstration decisions, CMS reviews and summarizes all input received during the federal comment period. CMS created a summary of comments received for all seven of the demonstrations we reviewed. Officials said that these summaries are used to brief CMS leadership as part of the decision-making process. We found that the level of detail in the summaries we reviewed varied, ranging from bulleted lists identifying and detailing common themes in support, opposition, or both, to a few brief sentences covering all comments. This variation often reflected the differences in the number of comments received and the significance of the concerns raised. For example: CMS received about 100 comments on Washington’s application during the federal comment period that were predominantly supportive of the new demonstration, and CMS’s summary was a brief overview. In contrast, CMS received thousands of comments on Kentucky’s application for each of the three federal comment periods held for that new demonstration, with many opposed to or concerned with certain aspects of the application. CMS’s summaries of comments received on the Kentucky application provided an overview of the issues raised, along with counts of how many fell within different themes and how many were in support, opposition, or unrelated to what was being proposed. CMS officials explained that there are unique circumstances surrounding each demonstration—a comment period with many concerns raised or conflicting viewpoints will necessitate a longer and more detailed summary than one that has broad support and few, if any, areas of disagreement. We found instances where CMS approved changes to certain aspects of the demonstrations that were in line with concerns raised by the comments. Among the seven demonstrations we reviewed in-depth, CMS received comments for four demonstrations that included concerns about the state’s proposal: Arkansas, Indiana, Kentucky, and Massachusetts. For Arkansas and Kentucky, CMS either approved more limited changes than what the state initially proposed or required that certain beneficiary protections be in place. Arkansas: In its amendment application, Arkansas requested a waiver of the requirement to provide retroactive eligibility, among other things. Commenters were concerned that the state’s proposal to eliminate retroactive eligibility would result in gaps in coverage, adverse health outcomes, and medical debt for members. In CMS’s approval, the agency acknowledged these concerns and allowed the state to reduce the period for retroactive eligibility from 90 days to 30 days but not eliminate it completely. (See fig. 6.) Kentucky: In Kentucky, some commenters were concerned about the state’s proposal to implement a work and community engagement requirement as a condition of Medicaid eligibility, noting that individuals need to be healthy to work or look for a job. CMS said in its January 2018 approval that Kentucky was exempting medically frail individuals from this requirement, but CMS would also be requiring that the state add certain protections for vulnerable individuals, including maintaining a system that identifies, validates, and provides reasonable accommodations. We also found there were instances where CMS approved certain aspects of the demonstrations despite concerns raised by the comments. CMS’s rationale for those decisions varied across demonstrations. For example, CMS noted in one instance that sufficient controls were planned to address the concerns raised, and in another instance noted that the potential benefits of the demonstrations outweighed the risks. The following are examples of when CMS approved aspects of states’ demonstrations without changes. Arkansas: In Arkansas, some commenters were opposed to the enforcement mechanism for the state’s proposal to institute a work and community engagement requirement as a condition of maintaining eligibility. The state proposed to disenroll beneficiaries who fail to fulfill these requirements for any 3 months during a calendar year and lock them out from coverage until the start of the next calendar year. CMS approved this proposal and provided an explanation of the circumstances under which it would happen, underscoring that individuals have three opportunities (each of the months they fail to fulfill the requirements) to rectify the situation or seek an exemption before they would ultimately lose coverage. CMS indicated in the approval letter to Arkansas that it believed the health benefits of community engagement outweigh the health risks with respect to those who fail to respond. Indiana: In Indiana, some commenters were opposed to the state’s proposal to institute a work and community engagement requirement as a condition of maintaining eligibility. They argued, in part, that beneficiaries who are able to work are already doing so and the requirement is unnecessarily burdensome. CMS responded that employment is positively correlated with health outcomes and imposing these requirements serves the purposes of the Medicaid statute. (See fig. 7.) In an effort to improve transparency around its approvals, CMS began providing a high-level summary and response to public comments in the demonstration approval letters beginning in January 2018. Agency officials said this will be their standard practice going forward. Our review of the approval letters sent between January 1, 2018, and July 31, 2018, confirmed that CMS included a discussion of some of the issues that were raised in 10 of 11 letters. For example, the approval letters explained the decision to reduce the period of retroactive eligibility in Arkansas instead of eliminating it completely, as well as the decision to approve Indiana’s proposal to implement work and community engagement requirements. However, the approval letters do not respond to every concern raised. For example, a number of commenters were concerned with a request in Arkansas’s amendment application to no longer offer presumptive eligibility, but CMS did not respond to these concerns in the approval letter. CMS officials told us that the agency is striking a balance between transparency and processing applications in a timely manner. Among the four demonstration approvals for which we conducted in-depth reviews and where public comments raised concerns—approvals for Arkansas, Indiana, Kentucky, and Massachusetts—we observed instances where CMS added specific monitoring requirements to the STCs that aligned with these concerns and other cases where the agency did not. For example: The STCs required Arkansas to submit a monitoring plan for its work and community engagement requirement in order to monitor eligibility operations and the impact on beneficiaries reapplying for coverage after being disenrolled for noncompliance. In contrast, CMS did not require a monitoring plan for the Indiana and Kentucky demonstrations, which also included work and community engagement requirements where the public raised concerns about the effects on beneficiaries. This remains the case for Indiana; however, CMS’s new approval of Kentucky’s demonstration in November 2018 included additional monitoring requirements. Specifically, the November 2018 STCs required Kentucky to submit a monitoring protocol that includes measures for monitoring enrollment, disenrollment, and eligibility suspension, among other things. In other cases where public comments raised concerns about the impact of demonstrations on beneficiaries, including changes in eligibility requirements (e.g., retroactive eligibility), we did not observe specific monitoring requirements included in the STCs. Though CMS did not provide any specific examples, officials told us that they consider public input when making decisions about monitoring requirements. Officials also said they were developing monitoring metrics and tools that they plan to use consistently going forward for states implementing work and community engagement requirements. As of January 2019, officials said these materials were in draft form and under review. Regarding evaluations, the extent to which CMS considered concerns raised through public comments for the four demonstration approvals was also not always clear, including how input informed the evaluation requirements in the STCs. For example, commenters on the applications submitted by Indiana and Kentucky raised concerns about aspects of the work and community engagement requirements proposed by each state, such as the requirements for reporting work or other activities and the circumstances under which beneficiaries would lose coverage. In the STCs for Indiana, CMS did not include specific hypotheses that the state would be required to test related to its work and community engagement policies. Instead, CMS noted that the state’s goals should inform the evaluation, subject to CMS approval. For example, Indiana’s goals included determining whether implementing work and community engagement requirements will lead to sustainable employment and improved health outcomes among beneficiaries. In the STCs for Kentucky’s initial approval in January 2018, CMS included the same language as in Indiana—that the goals should inform the state’s evaluation. However, in the STCs approved for Kentucky in November 2018, CMS added some broad guidance for Kentucky’s draft evaluation design. Specifically, CMS included a variety of hypotheses that the state must evaluate, such as the effect of work requirements on enrollment and the impact of the demonstration on uncompensated care costs. When approving evaluation designs, the extent to which CMS considers areas of risk identified through public input is also unclear at this time. As of January 2019, evaluation designs for the Arkansas and Indiana demonstrations were under review at CMS and Kentucky had not yet submitted one. Regarding Arkansas’s evaluation design, CMS sent a letter to the state providing comments and feedback that seem to align with some of the concerns raised about the demonstration through public input. Specifically, the November 2018 letter from CMS raised concerns with the state’s “broadly defined” expected outcomes of the demonstration, which included culture of work and personal life stability. CMS recommended that the state revise the design to include a list of quantifiable outcomes and measures that capture the important features, such as increased employment (e.g., hours worked, wages) and improved health (e.g., health care utilization). For Massachusetts, the one demonstration with an approved evaluation design, the extent to which CMS considered public input during approval was unclear. For example, with regard to Massachusetts’s proposal to discontinue provisional eligibility for most adults, commenters raised concerns about the potential effects on beneficiaries’ timely access to coverage and care; however, the evaluation design did not include plans to examine the effects of the policy on beneficiaries. Though CMS did not provide specific examples of how public input had informed evaluation designs, CMS officials said requirements for evaluations have been evolving as they have gained experience in understanding the public’s concerns. Officials also said they were developing robust evaluation guidance that they plan to use consistently going forward for states implementing work and community engagement requirements. As of January 2019, officials said this guidance was in draft form and under review. While CMS has long recognized the importance of public input in the demonstration approval process, the agency has developed more robust procedures for ensuring transparency since the beginning of 2012. Despite this progress, CMS’s approach to ensuring transparency when states propose major changes to their demonstrations has significant gaps. The lack of policies for ensuring transparency when states make major changes to pending applications and limited transparency requirements applied for amendments—which are being used by some states to make major changes to their demonstrations—puts CMS’s goal of transparency at risk. These gaps may leave the agency and the public without key information to fully understand the potential impact of the changes being proposed, including on beneficiaries and costs. These risks take on increased importance given that CMS is encouraging states to use the flexibility provided under demonstrations to test changes to their Medicaid programs that could have significant effects for beneficiaries and other stakeholders. We are making the following two recommendations to CMS: The Administrator of CMS should develop and communicate a policy that defines when changes to a pending section 1115 demonstration application are considered major and should prompt a new review of the application against the transparency requirements applicable to the pending application. (Recommendation 1) The Administrator of CMS should develop and communicate a policy whereby applications for section 1115 demonstration amendments that may have significant impact are subject to transparency requirements comparable to those for new demonstrations and extensions. (Recommendation 2) We provided a draft of this report to HHS for review and comment. HHS concurred with both recommendations. HHS’s comments are reproduced in appendix III. Regarding our first recommendation concerning when states submit major changes to pending demonstration applications, HHS stated that it will develop (1) standards for determining when such changes are so substantial that it would be appropriate for HHS to solicit additional public input, and (2) a process for informing states and the public about the additional comment period. These steps appear to formalize the approach CMS has already been taking as demonstrated by the agency’s response to the changes submitted by Indiana and Kentucky to their applications. Our recommendation, however, requires additional actions. In particular, we recommended that CMS develop and communicate a policy that includes standards for when changes are substantial enough to warrant a new review of the application against the transparency requirements. The transparency requirements, among other things, call for states to provide for public notice and input at the state level before they submit their applications. As such, holding an additional federal comment period would not be sufficient to meet our concerns. Regarding our second recommendation—concerning transparency requirements for amendment applications that may have significant impacts—HHS said that it has implemented enhanced processes to improve transparency and will review its current processes and develop additional policies and processes, as needed, to enhance the transparency of such applications. However, the enhanced processes HHS referred to do not apply to amendments. Thus, HHS’s planned review of its policies alone would not be sufficient to meet our concerns. HHS’s efforts should also result in actions to develop and communicate a policy that ensures amendments with significant impacts meet transparency requirements comparable to those for other applications, namely new demonstrations and extensions. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Secretary of Health and Human Services, the appropriate congressional committees, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have any questions about this report, please contact me at (202) 512-7144 or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix IV. Total Medicaid expenditures (dollars in millions) Total Medicaid expenditures (dollars in millions) In addition to the contact named above, Susan Barnidge (Assistant Director), Linda McIver (Analyst-in-Charge), Michael Moran, and Jessica L. Preston made key contributions to this report. Also contributing were Drew Long, Vikki Porter, and Emily Wilson.", "summary": "Section 1115 demonstrations are a significant component of Medicaid spending and affect the care of millions of beneficiaries. The Patient Protection and Affordable Care Act required the Department of Health and Human Services (HHS) to establish procedures to ensure transparency in approvals of new demonstrations and extensions to existing demonstrations. The act did not address amendments, which are subject to long-standing guidance on public input. GAO was asked to examine the transparency of demonstration approvals. Among other things, this report examines CMS's transparency policies and procedures for new demonstrations and extensions, and amendments to existing demonstrations. To review a variety of approval types across a large number of states, GAO examined all approvals of new demonstrations and extensions of and amendments to existing demonstrations granted from January 2017 through May 2018. GAO also conducted in-depth reviews of one approval in each of seven states, selected to include at least two approvals of each type. GAO reviewed demonstration documentation for these states, and interviewed state and federal Medicaid officials. GAO also assessed CMS's procedures against federal internal control standards. Medicaid demonstrations allow states flexibility to test new approaches for providing coverage and delivering Medicaid services. Since 2012, the Centers for Medicare & Medicaid Services (CMS), which oversees demonstrations, has developed procedures to improve the transparency of the approval process. For example, CMS reviews demonstration applications (including for new demonstrations, extensions, and amendments to existing demonstrations) for their compliance with applicable transparency requirements, including that states seek public input on their applications. However, GAO found weaknesses in CMS's policies for ensuring transparency. Changes to pending applications for new demonstrations or extensions. CMS lacks policies for ensuring transparency when states submit major changes to pending applications. For two of the four approvals of new demonstrations or extensions GAO reviewed in-depth, states submitted changes to their applications that could have significant effects on beneficiaries (such as disenrollment or other penalties) without first obtaining public comment on these changes at the state level. Amendments to existing demonstrations. CMS's transparency requirements for amendments are limited. For example, CMS does not require amendment applications to include how the changes may affect beneficiary enrollment or report on concerns raised in state public comments. However, states have proposed major changes—such as work and community engagement requirements—through amendments, raising concerns that major changes to states' demonstrations are being approved without a complete understanding of their impact. CMS should develop policies for ensuring transparency when states (1) submit major changes to pending demonstration applications and (2) propose amendments to existing demonstrations. HHS concurred with these recommendations.", "document_type": "gao"}
{"report": "Water scarcity occurs when the demand for water in a given area approaches or exceeds available water supplies. In April 2016, we reported that drinkable water has traditionally been assumed to be reliable, cheap, and abundant. However, with parts of the United States—especially the Southwest—facing recurring drought and persistent water scarcity, that view has been challenged. Water is also not always available when and where it is needed, in the amount or quality desired, or in a cost-effective manner. In times of water scarcity, there are often competing demands for water—such as irrigation, power production, municipal water supplies, and supporting aquatic life. As we reported in May 2014, state water managers expect freshwater shortages to continue into the future. According to the United States Global Change Research Program’s Fourth National Climate Assessment, significant changes in water availability are evident across the country and are expected to persist in the future due to changes in precipitation and rising temperatures. For example, droughts occurring from deficits in precipitation, soil moisture, and snow runoff will likely occur more frequently. Further, since a warmer atmosphere holds more water, when rain does fall high-intensity events can occur more frequently. These sudden downpours will increase the mobility of pollutants, such as sediments and nutrients, and of algae, which can reduce the quality and quantity of available drinking water. The assessment noted that in some regions of the United States, the supplies of water are already stressed by increasing consumption, and continued warming will add to this stress, adversely affecting the availability of water in parts of the United States and increasing the risk of water scarcity. The military departments rely on water at installations to conduct and support their missions. For example, according to military department officials, water is necessary to operate missions such as rocket launches for cooling and for noise and fire suppression (see sidebar), to maintain temperatures to properly store equipment such as parachutes, and for firefighting training (see fig. 1). Rocket Launch at Vandenberg Air Force Base, California According to Vandenberg Air Force Base officials, water is used in multiple ways during rocket launch activities. For example, water is necessary for noise and vibration suppression, heat reduction, and fire suppression as needed. The officials stated that between 60,000 to 100,000 gallons of water are needed for each launch. In 2018, there were nine launches. With an anticipated increase in launches in the future, they expect the demand for water to increase as well. OSD officially reorganized its acquisition organization on January 31, 2018, in response to Section 901of the National Defense Authorization Act for Fiscal Year 2017. Under the reorganization, responsibilities of the former Under Secretary of Defense for Acquisition, Technology and Logistics were divided between two new offices—the Under Secretary of Defense for Research and Engineering and the Under Secretary of Defense for Acquisition and Sustainment. According to DOD, responsibilities for energy, installations, and environment were transferred from the Office of the Undersecretary of Defense for Acquisition, Technology and Logistics to the newly created Office of the Under Secretary of Defense for Acquisition and Sustainment in 2018. According to an OSD official, within this office, responsibilities for water management at military installations are delegated to two deputy assistant secretaries under the Office of the Assistant Secretary of Defense for Sustainment—the Office of the Deputy Assistant Secretary of Defense for Environment, who is responsible for water resources management in general, and the Office of the Deputy Assistant Secretary of Defense for Energy, who is responsible for overseeing planning for water at the installation level. Each of the military departments has designated an office or multiple offices with responsibilities for water policy and implementing programs to support that policy at installations. Specifically: Air Force: The Assistant Secretary of the Air Force for Installations, Environment, and Energy is responsible for procedures to manage the Air Force’s water consumption, throughput, and requirements, in alignment with policies and strategic direction. Within this office, the Deputy Assistant Secretary of the Air Force for Environment, Safety and Infrastructure provides strategic direction, policy, and oversight for water management. Navy: The Office of the Assistant Secretary of the Navy for Energy, Installations, and Environment is responsible for establishing policy and overseeing water resource management. This office, along with the Office of the Chief of Naval Operations Shore Readiness Division, and the Commander, Navy Installations Command, makes policy, guidance, and many major investment decisions related to installations’ water departments. Within the Department of the Navy, the Marine Corps also has its own offices responsible for water policy. Specifically, the Deputy Commandant for Installations and Logistics is responsible for establishing energy and water management policy for Marine Corps installations in accordance with the Commandant’s direction. The Commander, Marine Corps Installations Command, is responsible for water management, such as overseeing program planning and execution, and serving as the Marine Corps Installations Energy Program Manager. Army: The Assistant Secretary of the Army for Installations, Energy, and Environment establishes policy, provides strategic direction, and supervises all matters pertaining to energy and environmental programs, among other responsibilities. Within this office, the Deputy Assistant Secretary of the Army for Energy and Sustainability provides strategic leadership, policy guidance, program oversight, and outreach for energy, water, and sustainability throughout the Army enterprise. OSD-level entities and the three military departments conducted six assessments between April 2017 and January 2019 that, despite having varied focus areas, all included at least one component focused on vulnerability to water scarcity. The Office of the Under Secretary of Defense for Acquisition and Sustainment conducted the most recently reported (January 2019) OSD-level assessment, in response to a congressional reporting requirement. OSD-level entities in place before OSD’s 2018 reorganization conducted the other two assessments, reporting their results in January 2018 and July 2018—also responses to congressional reporting requirements. The Air Force’s, Navy’s, and Army’s three assessments span different time frames, encompass different scopes, and respond to different internal reporting requirements. The Air Force reported its results in November 2018; the Navy’s assessment conducted by CNA reported its results in December 2017; and the Army reported in April 2017. Table 1 provides a summary of these assessments, including responsible offices and focus areas. We found that DOD does not have assurance that it is using accurate and reliable information regarding which installations are at risk for water scarcity. When we compared the results of the OSD assessments and the military department assessments, we found that they varied markedly, raising questions about their quality and about which source of information DOD is using to determine which installations are vulnerable to water scarcity. An OSD official told us that the OSD assessments constitute the best DOD information available on installations at risk of water scarcity, but we found that the assessments do not align with leading practices for identifying and analyzing water scarcity—practices that contribute to a reliable assessment of water availability. In contrast, we found that the military department assessments do align with these leading practices, but OSD officials disagree as to whether these assessments can and should be used to identify installations at risk of water scarcity across the defense enterprise. As a result, DOD cannot be assured that it is using reliable information for water resource management. The three OSD assessments and the three military department assessments varied markedly in their results regarding which installations are vulnerable to water scarcity. Collectively, the six assessments identified a total of 102 individual installations at risk of water scarcity, as shown in figure 2. Only one installation, Vandenberg Air Force Base in California, was identified in all three OSD assessments and the applicable military department (Air Force) assessment. Of the 102 individual installations identified in the six assessments as vulnerable to water scarcity, 42 (41 percent) were included in multiple assessments. OSD identified more installations for each military department as at risk than did the military departments themselves. Specifically, across its three assessments, OSD identified 95 installations as being at risk—48 Air Force installations, 29 Navy or Marine Corps installations, and 18 Army installations. The military departments collectively identified a total of 27 installations as being at risk—14 Air Force installations, nine Navy or Marine Corps installations, and four Army installations. Below is a more detailed description of the installations identified as being at risk of water scarcity in the six assessments, by the military departments. Air Force: Of the 48 Air Force installations identified across the OSD assessments, only three—Kirtland Air Force Base, New Mexico; McConnell Air Force Base, Kansas; and Vandenberg Air Force Base, California—appeared in all of them. In addition, as noted above, only one Air Force installation was identified both in all three OSD assessments and the Air Force assessment—Vandenberg Air Force Base, California. Of the 14 Air Force installations identified within the Air Force assessment, 13 appeared in at least one of the OSD assessments. Navy: Of the 29 Navy or Marine Corps installations identified across the OSD assessments, three installations—Marine Corps Air Station Yuma, Arizona; Naval Base Coronado, California; and Naval Weapons Station Seal Beach, California—appeared in at least two of the OSD assessments. Of the nine Navy installations, including the Marine Corps installations identified within the Navy assessment, four appeared in at least one of the OSD assessments. Army: Of the 18 total Army installations identified across the OSD assessments, only one—White Sands Missile Range, New Mexico— appeared in all three. However, the Army’s assessment did not identify that installation as being at risk. In addition, one of the OSD assessments—the climate vulnerability survey—identified more than three times as many Army installations as being at risk as the Army’s own assessment. Of the four Army installations identified within the Army assessment, three appeared in at least one of the OSD assessments. Given the different scopes of these assessments, it is understandable that they would produce different results. However, the substantial differences in results raise questions about whether the assessments that produced them were methodologically sound and about which source of information DOD is using to identify installations at risk of water scarcity— information needed for water resource management. Although an OSD official told us that the OSD assessments constitute the best DOD information available on installations at risk of water scarcity, we found that they did not incorporate four of five leading practices for identifying and analyzing water scarcity. Specifically, our analysis shows that, in conducting their assessments, OSD officials did not always (1) identify current water availability, (2) identify future water availability, (3) take into account all sources of water, or (4) precisely identify locations, as shown in table 2. Below is a detailed comparison of each OSD assessment against the five leading practices. OSD’s climate vulnerability survey. Of the three OSD assessments, the climate vulnerability survey reflects the most (3 out of 5) leading practices. Specifically, we found that the methodology used in the climate vulnerability survey followed the leading practice for identifying current water availability. The survey collected and analyzed drought-related information in a timely and systematic manner by having a question about current drought conditions on its web-based self-reporting survey. did not follow the leading practice for identifying future water availability. The survey focused only on current and past water availability. did not follow the leading practice for taking into account all sources of water. The survey did not account for all sources of water (e.g., precipitation, soil moisture, streamflow, groundwater levels, reservoir and lake levels, and snowpack) because it did not include a question about the sources of the water. followed the leading practice for precisely identifying locations. The survey went directly to all DOD installations and inquired about drought conditions at sites owned or managed by the installation, in addition to the installation itself. This enabled DOD to know the precise location of installations and their associated sites relative to identified drought-prone areas of the state or region and vulnerable economic sectors, individuals, or environments. followed the leading practice for comprehensively including all locations. The survey was completed for all primary installations and associated sites worldwide. OSD’s energy report and climate change report. OSD used the U.S. Drought Monitor map to conduct its assessments for both OSD’s energy report and climate change report. According to an OSD official, use of the U.S. Drought Monitor map constitutes DOD’s best approach for identifying military installations vulnerable to water scarcity. However, we determined that, in doing so, OSD did not follow four of the five leading practices. Specifically, using the U.S. Drought Monitor Map to produce the energy report and climate change report, OSD did not follow the leading practice for identifying current water availability and did not follow the leading practice for identifying future water availability. According to the cofounder of the U.S. Drought Monitor, the conditions reflected on the U.S. Drought Monitor maps are retrospective—weekly assessments of drought conditions based on how much, if any, precipitation occurred from 1 week to several years before the day the map was issued. This is problematic because drought conditions can change from month to month (see fig. 3), and the months chosen may not be representative of the annual drought condition. An OSD official stated that OSD used data from the U.S. Drought Monitor map as of April 2018 for the energy report and only the summer months of 2018 for the climate change report, which is unlikely to reflect current water availability for an entire year. According to the cofounder of the U.S. Drought Monitor, the U.S. Drought Monitor maps also do not show projections of future water scarcity, which would be necessary to fully assess an installation’s vulnerability to water scarcity. did not follow the leading practice for taking into account all sources of water. According to the cofounder of the U.S. Drought Monitor, U.S. Drought Monitor maps do not take into account all sources of water that might be available to a specific installation. The U.S. Drought Monitor maps do not fully assess the availability of water from groundwater sources (e.g., aquifers) or nonlocal sources (e.g., reservoir water delivered by canals). did not follow the leading practice for precisely identifying locations. According to the co-founder of the U.S. Drought Monitor, U.S. Drought Monitor maps only display regional drought conditions, not drought information applicable to precise locations. For this reason, the Drought Monitor Portal warns that the large-scale maps generated should not supersede locally provided information about water availability conditions. Therefore, OSD may have inaccurately identified installations as being at risk of water scarcity. followed the leading practice for comprehensively including all locations. Since the energy report used a map of all installations within the contiguous U.S. to conduct its analysis, and the climate change report included all 79 mission-assurance locations within its scope, these assessments constituted a comprehensive approach. The information we collected from installations identified by OSD as being at risk of water scarcity also indicates weaknesses in OSD’s approach. Of the 17 installations that were identified in OSD’s assessments as being at risk of water scarcity and that we contacted or visited, officials from 12 stated that they did not anticipate water scarcity affecting their future mission-related activities, disagreeing with the conclusions of OSD’s assessments. For example: Officials at Naval Weapons Station Seal Beach, California, told us the installation does not expect water scarcity to affect its mission-related activities because none of its water-using facilities (i.e., administrative facilities) on the installation are particularly water-intensive. They stated the installation’s water is provided by the City of Seal Beach, which in turn is supplied by a larger water company. According to the officials, there are proposed plans to construct a nearby desalination plant, which would prevent water scarcity issues. Officials at Moody Air Force Base, Georgia, stated that the installation is not vulnerable to water scarcity now or over the next 20 years because the base has its own water-treatment plant with wells that draw water from the Floridan aquifer, which spans an area of 100,000 square miles in the southeastern United States, underlying the entire state of Florida and parts of Alabama, Georgia, Mississippi, and South Carolina. According to the officials, use of the aquifer is unconstrained; in addition, Moody Air Force Base holds water permits that create a 64 percent surplus capacity of daily water availability to support current or new mission growth. Officials at Fort Bragg, North Carolina, stated that the installation is in the Southeast region of the United States, which is not known as a region with water scarcity issues. They stated that the region’s primary threats, from a water scarcity perspective, are pollution and population growth. In addition, the officials said that the two public utilities from which it purchases its water are not expected to hit a critical demand for water until the year 2060 or later. When we informed an OSD official of the results of our analysis, the official stated that OSD did not have any concerns about the information it provided to the Congress in its three assessments. Specifically, the official said the climate vulnerability survey might have had different responses depending on the perspective of the responder, but it provided useful qualitative data. The official also maintained that the U.S. Drought Monitor was the best source of information, and is a resource produced by the federal government. However, as outlined above, while the drought monitor is a useful source of information, it is not intended to be used in the manner in which DOD has employed it. Unlike the OSD level assessments, we found that the assessments produced by the military departments are aligned with all five leading practices (see table 3). Below are detailed examples of how the military department assessments were compared against the five leading practices. Specifically, we found that the military department assessments: followed the leading practice for identifying current water availability. For example, the Navy contacted installation staff directly and analyzed water use and billing data directly from departmental water- system databases to assess the extent to which the Navy was facing water-related challenges (which included water availability and quality). followed the leading practice for identifying future water availability. For example, the Air Force assessment considered future water availability by considering long-term effects from climate change, future water restrictions, and changes in water access rights. In addition, the Navy assessment considered future water availability by considering sea-level rise, water rights, diminishing groundwater supplies, and emerging water pollutants. followed the leading practice for taking into account all sources of water. For example, the Army assessment considered alternate water sources by requiring installations to identify and enumerate their potable sources of water as a measure of redundancy. followed the leading practice for precisely identifying locations. For example, the Navy assessment used geospatial data on hazards to water as well as data published by Naval Facilities Command. This enabled the Navy to precisely identify installation and site locations for water and sewer infrastructure, including pumps, storage, sewer lines, and water-treatment plants relative to those hazards. followed the leading practice for comprehensively including all locations. According to service officials and an agency document, the scope of each military department assessment included all respective installations within each military department. Installations we contacted that were identified in the military department assessments as being at risk of water scarcity generally agreed with the assessments. Of the seven installations that were identified in military department assessments as being at risk of water scarcity and that we contacted or visited, officials from six (86 percent) agreed that they anticipated water scarcity may affect their future mission activities or otherwise noted risks of water scarcity that could affect their installations. For example: Officials at Mountain Home Air Force Base, Idaho, stated that water use on the installation was significantly curtailed in 2017 and 2018 (and was anticipated to be curtailed in 2019) due to the inability to produce sufficient quantities of water to meet demand. Officials from F. E. Warren Air Force Base, Wyoming, stated that drought is a continual threat to the area. The officials stated that if the area does not receive adequate precipitation or snowmelt, the city may place a water restriction for the installation. Officials from Marine Corps Air Station Yuma, Arizona, stated that future mission activities could be impacted by water scarcity, especially as the population of the installation continues to grow with the arrival of additional air squadrons. As noted earlier in this report, the Office of the Assistant Secretary of Defense for Sustainment is responsible for water management at all military installations. Individuals from this office with whom we spoke agreed that having accurate information about water scarcity data across DOD is important to help fulfill these responsibilities and inform senior decision-making, including budget development, resourcing, and risk management. However, these officials disagree about whether it would be feasible to rely on the military department assessments, which we found align with leading practices, to identify installations at risk of water scarcity across DOD. According to one OSD official, the military department assessments should not be used to consider water scarcity across DOD as a whole because their methodologies differed and therefore are not comparable to one another. The assessments do not reflect a coordinated, department- wide assessment. For example, the Air Force assessment reported vulnerability to water scarcity as four distinct qualitative ratings, each combining likelihood and severity, without any numerical data. The Army’s assessment, in contrast, reported vulnerability using 34 distinct numerical scores for each installation, averaged into four distinct categories. While both assessments were aligned with leading practices, this OSD official believes that the differences in their specific approaches and subsequent results make it difficult to compare vulnerability to water scarcity across military departments. According to another OSD official, it would be appropriate for DOD to rely on the results of the military department assessments because responsibilities for prioritizing projects and for allocating funds to those projects lie with the military departments. As such, there is not a concern that the departments assessed vulnerability differently. According to this official, were the department to issue a new DOD-wide report on water scarcity, it would simply be a “rollup” of the military department assessments, with an update of current status. According to Standards for Internal Control in the Federal Government, management should use quality information—information that is, among other things, appropriate, current, complete, and accurate—to achieve the entity’s objectives. In identifying information requirements, management should consider the expectations of both internal and external users, as well as the entity’s objectives and related risks. Because the OSD-level assessments do not align with leading practices for identifying and analyzing water availability, OSD lacks assurance that it has quality information and risks potentially using or providing to Congress unreliable information. Further, while the military department assessments are aligned with leading practices, the Office of the Assistant Secretary of Defense for Sustainment has not determined whether they are sufficient for meeting its policy-making and oversight objectives and whether the risk presented by combining results from assessments that used varying methodologies is an acceptable level of risk. Until this question is resolved, the department will not have assurance that it is using accurate and reliable information to assess water scarcity. DOD’s installations rely on billions of gallons of water to operate and conduct their missions, but critical installations are at risk of water scarcity, and the risks are only projected to increase. The substantial differences in results of DOD’s assessments to identify installations at risk of water scarcity raise questions about whether the assessments were methodologically sound and about which source of information OSD is using for water resource management. OSD’s approach to assessing installations at risk of water scarcity did not consistently apply leading practices for identifying current and future water availability, taking into account all sources of water, and precisely identifying locations—yet an OSD official told us that the OSD assessments constitute the best DOD information available on installations at risk of water scarcity. In contrast, the military departments did apply all leading practices in their assessments on installations at risk of water scarcity; however, OSD officials were not in agreement as to whether these assessments could be used at a departmental level. By assessing and documenting whether OSD should conduct a coordinated, department-wide assessment aligned with leading practices or should rely on the military department assessments for identifying and analyzing water availability, OSD would have greater assurance that it has the information that it needs to manage water scarcity across the department and that Congress needs to better understand the threat of water scarcity to DOD’s mission. The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment (1) assesses whether DOD should conduct a coordinated, department-wide assessment aligned with leading practices for identifying and analyzing water availability or rely on military department assessments to determine which DOD installations are at risk of water scarcity and (2) documents this decision. (Recommendation 1) We provided a draft of this report for review and comment to DOD. In written comments, DOD concurred with our recommendation. DOD comments are reprinted in their entirety in appendix III. DOD also provided technical comments, which we incorporated as appropriated. We are sending copies of this report to the appropriate congressional addressees; the Secretary of Defense; and the Secretaries of the Air Force, the Navy, and the Army. In addition, this report will be available at no charge on the GAO website at www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. In this report, we evaluate the extent to which the Department of Defense (DOD) has assurance that it is using reliable information to identify installations at risk of water scarcity. We reviewed statutes and congressional committee reports that directed DOD to conduct assessments for climate-related purposes, including for identifying installations at risk of water scarcity. We also analyzed information contained in the six DOD assessments conducted from April 2017 through January 2019 that identify installations at risk of water scarcity—three Office of the Secretary of Defense (OSD) assessments and three military department assessments—to determine the extent to which the assessments identified the same or different installations. Specifically, we analyzed the following DOD assessments: two OSD assessments that focused on climate-related risks to installations: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics, Department of Defense Climate- Related Risk to DOD Infrastructure Initial Vulnerability Assessment Survey (SLVAS) Report (January 2018). We analyzed information on military installations vulnerable to drought in this assessment. Office of the Under Secretary of Defense for Acquisition and Sustainment, Report on Effects of a Changing Climate to the Department of Defense (January 2019). We analyzed information on military installations vulnerable to drought in this assessment. one OSD assessment that focused on installation energy performance, which included an appendix with information on military installations vulnerable to water scarcity: Office of the Assistant Secretary of Defense for Energy, Installations, and Environment, Department of Defense Annual Energy Management and Resilience Report (AEMRR) Fiscal Year 2017 (July 2018). We analyzed the information on military installations vulnerable to water scarcity in this assessment. three military department assessments that contained information on water-related risks: U.S. Air Force, Summary Information on Installations with Water Hazards (Provided November 2018). We analyzed information on military installations with catastrophic and critical water hazards in this assessment. U.S. Navy, including the Marine Corps, CNA, Assessing Water Risk at DON Installations—Identifying Hazards and Water Management Challenges (December 2017). We analyzed information on military installations with water availability risk in this assessment. U.S. Army, FY17 Installation Status Report (Mission Capacity) Water Data Analysis (April 2017). We analyzed information on military installations with minor and severe potable water risk. In analyzing these six assessments, we focused on active-duty military installations in the contiguous United States at risk of water scarcity. Further, to discuss the methodologies used in the six assessments, we interviewed officials who were knowledgeable about the various assessments: officials from the OSD’s Office of the Assistant Secretary of Defense for Sustainment, each of the military departments with responsibilities for water management at military installations, CNA, which completed the Department of the Navy’s assessment, and the University of Nebraska–Lincoln’s National Drought Mitigation Center, which hosts the U.S. Drought Monitor map that shows parts of the United States in drought. We compared the methodologies used to develop OSD’s three assessments and the military departments’ three assessments with five leading practices for identifying and analyzing risks of water scarcity. We derived the five leading practices from the Department of Energy’s and the United States Environmental Protection Agency’s compilation of 14 water efficiency best management practices, and principles published in the University of Nebraska–Lincoln’s National Drought Mitigation Center’s 10-Step Drought Planning Process. These leading practices are: (1) identify current water availability, (2) identify future water availability, (3) take into account all sources of water, (4) precisely identify locations, and (5) comprehensively include all locations. According to the 10-Step Drought Planning Process, data and information derived from these leading practices contribute to a reliable assessment of water availability. We discussed these five leading practices we identified with officials from the Office of the Assistant Secretary of Defense for Sustainment and the military departments and gained their agreement about using these practices for determining installations at risk of water scarcity. We then determined whether, in their respective methodologies, OSD’s and the military departments’ assessments had followed each of these five leading practices. Specifically, we considered the “identify current water availability” leading practice as “followed” if OSD’s and the military departments’ assessment was annually reporting water use or status of water supply, and the leading practice as “not followed” if the assessment was not annually reporting water use or status of water supply; “identify future water availability” leading practice as “followed” if OSD’s and the military departments’ assessment noted whether climate change was a factor in their assessment or considered future water availability from non-climate-change-related factors and the leading practice as “not followed” if the assessment did not note whether climate-change was a factor in their assessment or consider future water availability from non-climate-change-related factors; “take into account all sources of water” leading practice as “followed” if OSD’s and the military departments’ assessment noted consideration of alternate water sources (such as groundwater, purchase agreements, additional reservoirs, etc.) and the leading practice as “not followed” if the assessment did not note consideration of alternate water sources (such as groundwater, purchase agreements, additional reservoirs, etc.); “precisely identify locations” leading practice as “followed” if OSD’s and the military departments’ assessment noted the specific location of the installation they were reviewing and provided data specifically from that installation, and the leading practice as “not followed” if the assessment did not note the specific location of the installation they were reviewing and provide data specifically from that installation; and “comprehensively include all locations” leading practice as “followed” if OSD’s and the military departments’ assessment considered all the locations at potential risk of water scarcity within the scope of their assessment, and the leading practice as “not followed” if the assessment did not consider all the locations at potential risk of water scarcity within the scope of their assessment. Specifically, for OSD’s Department of Defense Climate-Related Risk to DOD Infrastructure Initial Vulnerability Assessment Survey (SLVAS) Report and its Department of Defense Annual Energy Management and Resilience Report (AEMRR) Fiscal Year 2017, the scope of the assessments included all DOD installations; for OSD’s Report on Effects of a Changing Climate to the Department of Defense, the scope of the assessment included 79 mission-assurance priority installations; and for the military department assessments, the scope included all respective installations within each military department. To obtain information about water scarcity at individual installations, we selected a nongeneralizable sample of active-duty military installations in the contiguous United States. To develop this sample, we included installations that were identified by DOD assessments as having water- related vulnerabilities and by military department officials in interviews as having ongoing pilot studies or issues related to water scarcity. We also included installations that had (1) historically experienced water scarcity (prior to 2014); (2) recently experienced water scarcity (from 2014 to 2019); and (3) are projected to experience severe water scarcity (over the next 20 years or longer). From these criteria, we selected a nongeneralizable sample of 17 installations that were identified in OSD’s three assessments that reflected diversity in military service, mission, and water scarcity (see table 4). We visited five of these installations in person and contacted the remaining 12 installations by email. We selected the five installations to visit because three installations (Naval Air Facility El Centro, California; Marine Corps Air Station Yuma, Arizona; and Luke Air Force Base, Arizona) provided diversity among military services and were in close proximity to each other, which allowed us to visit multiple locations in one trip; one installation (Vandenberg Air Force Base, California) had been identified in all three OSD assessments and the applicable military department assessment as being at risk of water scarcity; and one installation (Fort Bragg, North Carolina) provided geographic diversity and inclusion of at least one installation per military service in our sample. For the remaining 12 installations, we developed and sent by email a list of similar questions and document requests that we used during our site visits. We received responses from all 12 installations. Results from our nongeneralizable sample cannot be used to make inferences about all DOD installations. However, the information from these installations provides valuable insights about how water is being used by these installations for their mission-related activities and whether water scarcity had affected or was expected to affect their mission-related activities. To determine the extent to which DOD has assurance it is using accurate and reliable information about installations at risk of water scarcity to manage water resources across the department, we compared the information DOD has from the various assessments with Standards for Internal Control in the Federal Government on using quality information to achieve agency objectives. We conducted this performance audit from September 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 5 provides a list of the 102 individual active-duty military installations in the contiguous United States that were identified in at least one of six DOD assessments—three Office of the Secretary of Defense assessments and three military department assessments—as being at risk of water scarcity. In addition to the contact named above, Brian Lepore (Director), Jodie Sandel (Assistant Director), Barbara Wooten (Analyst-In-Charge), Tracy Barnes, Chaneé Gaskin, Gina Hoover, Mae Jones, Mary Jo LaCasse, Amie Lesser, Shahrzad Nikoo, Paulina Reaves, and Edward Rice made key contributions to this report.", "summary": "DOD reported in January 2019 that critical installations are at risk of water scarcity—that is, of not having sufficient water available to meet their mission needs. According to military department officials, installations depend on water for activities such as training, weapons testing, fire suppression, and sanitation. In its 2018 Fourth National Climate Assessment , the U.S. Global Change Research Program reported that warming temperatures will continue to cause worsening droughts and the decline of surface water quality. Senate Report 115-262 included a provision for GAO to review DOD's identified or potential effects of water scarcity. For this report, GAO evaluated the extent to which DOD has assurance that it is using reliable information to identify installations at risk of water scarcity. GAO analyzed DOD's six assessments conducted from April 2017 through January 2019 to identify installations at risk of water scarcity and compared the assessments with five leading practices for identifying and analyzing water scarcity. GAO also interviewed officials from OSD and the military departments and contacted a nongeneralizable sample of 17 installations identified in OSD's assessments to reflect diversity in military service, mission, and water scarcity. GAO found that the Department of Defense (DOD) does not have assurance that it is using reliable information regarding which installations are at risk for water scarcity. When comparing the results of six Office of the Secretary of Defense (OSD) and military department assessments on installations vulnerable to water scarcity, GAO found that they varied markedly, raising questions about their quality and about which source of information DOD is using to determine which installations are vulnerable to water scarcity (see figure). An OSD official stated that the three OSD-produced assessments provided the best information available on which installations are at risk of water scarcity. However, GAO found that these assessments did not reflect four of five leading practices for identifying and analyzing water scarcity—practices that contribute to a reliable assessment of water availability. Specifically, OSD did not always (1) identify current water availability, (2) identify future water availability, (3) take into account all sources of water, or (4) precisely identify locations. Further, although GAO found that the three military department assessments aligned with all leading practices, OSD officials disagreed as to whether these assessments can and should be used to identify installations at risk of water scarcity across the defense enterprise. Until OSD resolves the question as to whether it should conduct a department-wide assessment of installations that aligns with leading practices or whether it should rely on the military department assessments, the department will not have assurance that it is using reliable information to assess water scarcity. GAO recommends that the Office of the Secretary of Defense assess whether it should conduct a coordinated, department-wide assessment aligned with leading practices or rely on military department assessments to determine which DOD installations are at risk of water scarcity. DOD concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "Funding for university STEM research. The five federal agencies included in our analysis provide billions of dollars annually for university research in STEM fields, with HHS-NIH providing more than the other four agencies combined. Figure 1 details the total amount of basic and applied STEM research funding provided to universities by each agency in fiscal year 2018, these data are preliminary and the most current data available during our review. Sexual harassment. While sexual harassment is not a defined term in Title IX, it can constitute sex discrimination under Title IX in some circumstances if, among other things, the harassment is “so severe, pervasive, and objectively offensive that it effectively bars the victim’s access to an educational opportunity or benefit.” Some federal agencies and NASEM define sexual harassment based on specific behaviors. Specifically, according to NASEM, sexual harassment encompasses three types of behavior: Sexual coercion: Favorable treatment conditioned on sexual activity. Unwanted sexual attention: Verbal or physical sexual advances that are unwelcome, including sexual assault. Gender harassment: Sexist hostility and crude behavior. The most common form of sexual harassment is gender harassment, which generally involves behavior that conveys hostility, objectification, exclusion, or second-class status about a person’s gender. According to the Consultant Report on the University of Texas System Campus Climate Survey for NASEM, female medical and engineering students enrolled in the University of Texas System were more likely to experience sexual harassment by faculty or staff compared with students enrolled in other majors. Title IX enforcement responsibilities. Title IX of the Education Amendments of 1972 is the primary federal law that addresses sex discrimination under education programs or activities receiving federal financial assistance, including federally funded grant programs at educational institutions, such as universities. Under Title IX, federal agencies that award grants to educational institutions, including universities, have enforcement responsibilities to ensure such institutions do not discriminate based on sex. Enforcement responsibilities fall under four main areas: 1. Issuing regulations. Title IX requires that agencies promulgate regulations to provide guidance on Title IX enforcement to recipients of federal financial assistance who administer education programs or activities. 2. Obtaining assurance from university grantees that they are in compliance with Title IX. Most of the agencies we reviewed require grantees to submit an “assurance of compliance” form as part of their grant application or award to attest compliance with anti-discrimination laws, including Title IX. 3. Conducting periodic compliance reviews of funding recipients. Grant funding agencies are required to conduct periodic Title IX compliance reviews of university grantees. A Title IX compliance review is an agency’s assessment of whether a grantee is complying with the law. According to DOJ’s Title IX legal manual, federal agencies have broad discretion in determining which grantees to review for compliance. Federal agencies may conduct these reviews on-site at a university (grantee) or via a desk audit. In both types of review, agency officials, among other things, review documentation that indicates compliance, such as the universities’ policies and procedures for receiving, investigating, and resolving Title IX complaints. During on-site reviews, officials interview staff, faculty, and students about their awareness of Title IX and any issues of potential sex discrimination that they have encountered. 4. Investigating written complaints of sex discrimination against recipients in a timely way. Federal agencies are required to establish and publish procedures for the prompt processing and disposition of complaints. An individual alleging discrimination on the basis of sex by a university can file a discrimination complaint with multiple entities, including the university or one of the federal agencies that provides funding to the university, which could include Education or another funding agency. In 2015, we reported on six federal agencies’ grant making to women in STEM research, including their Title IX compliance activities. We found that the Departments of Defense, and Health and Human Services were not conducting required Title IX compliance reviews at universities they funded and recommended that they periodically do so. In response to our recommendation, HHS conducted three Title IX compliance reviews in 2018 and according to officials, the agency initiated additional Title IX compliance reviews in 2019 and 2020. Education and DOJ also have responsibilities for administering Title IX. Education plays a key role in ensuring compliance with Title IX as it provides funding to most universities in the United States. DOJ’s Civil Rights Division is responsible for enforcing federal statutes prohibiting discrimination of protected classes, including Title IX. Under Executive Order 12250, DOJ also has the responsibility for playing a leadership role in coordinating the “consistent and effective implementation” of several civil rights laws, including Title IX. In 2015, we reported that DOJ had no formal information-sharing process for federal agencies to exchange best practices on Title IX compliance activities, and we recommended that it establish such a process. In response to our recommendation, DOJ reconstituted the Quarterly Title IX STEM discussion group in February 2016 to facilitate information sharing across the six major STEM grant-making federal agencies. Recipients of federal assistance—in this case, university grantees—also have Title IX compliance responsibilities. Specifically, universities are responsible for ensuring Title IX compliance, designating an employee to coordinate compliance (e.g., a Title IX coordinator), establishing procedures to promptly and equitably resolve student and employee complaints of sex discrimination made against the university, and publishing a notice stating that they do not discriminate on the basis of sex. Figure 2 outlines the various compliance activities required under Title IX and the entity responsible for carrying out each activity. Offices and their responsibilities for Title IX and grant management. Among the federal agencies we reviewed, different offices handle various aspects of Title IX and grant compliance activities. Generally, each agency’s civil rights or diversity office conducts Title IX compliance reviews, develops policies and procedures for grantees, and investigates allegations and complaints involving university researchers supported by their agency’s federal STEM grants. All five agencies (DOE, HHS, NASA, NSF, and USDA-NIFA) primarily address Title IX complaints, including sexual harassment complaints, through their civil rights or diversity offices. However, these offices are responsible for more than just addressing complaints and preventing sexual harassment at grantees, including universities; these offices oversee a number of civil rights, diversity, and inclusion efforts for the entire agency. Moreover, most of these offices also address internal employee sexual harassment complaints and other discrimination issues. The agency office that awards grants generally creates and modifies grant terms and conditions for universities receiving funding from the agency. Table 1 outlines each agency’s Title IX and grant management responsibilities by office. All five agencies conducted periodic Title IX compliance reviews, as required by federal laws and regulations, from fiscal years 2015 through 2019, and three completed joint compliance reviews. Two agencies publicized promising practices from Title IX compliance reviews on their websites and did so to assist all grantees with Title IX compliance. The other three agencies have not clearly publicized such practices from their Title IX reviews on their websites. The five agencies we reviewed conducted periodic Title IX compliance reviews, as required by federal laws and regulations. From fiscal year 2015 through 2019, DOE, HHS, NASA, NSF, and USDA-NIFA officials reported that their agencies met the requirement for conducting periodic reviews. During this period, the agencies conducted between 4 and 11 Title IX compliance reviews among hundreds of grantees. No agency completed more than three reviews in a fiscal year. Two agencies— DOE and NASA—have requirements to conduct a minimum of two Title IX compliance reviews annually. DOE and NASA meet their statutory requirements by starting at least two Title IX compliance reviews each year, according to officials. HHS, NSF, and USDA do not have an annual minimum requirement and are not required to have one, according to officials. Agencies conducted visits to universities to assess compliance and developed written compliance reports. In the compliance report, agencies can recommend a grantee take action to improve existing compliance efforts to prevent sex discrimination and may highlight promising practices by grantees. For example, NASA recommended in a written compliance report that a grantee provide more targeted Title IX training geared toward STEM students and faculty, noting that such training should focus on subtle forms of gender bias that pervade STEM programs as well as on more egregious examples of sexual harassment. Similarly, HHS made recommendations in three of its compliance reviews for grantees to notify students and faculty of their right to file a Title IX complaint with the HHS Office for Civil Rights. University grantees are not required to implement the agency’s recommendations, but they must take corrective actions to resolve findings of Title IX noncompliance, according to DOE, HHS-OCR, NASA, and NSF officials. Agencies are required by law to seek voluntary compliance for Title IX violations. If an agency finds that a grantee has violated Title IX (noncompliance), it first seeks to establish voluntary compliance through a resolution agreement—an agreement with the agency and grantee outlining corrective actions for the grantee. If the agency is unable to achieve voluntary compliance in a Title IX case, it may initiate proceedings to suspend or terminate federal funding, or refer the case to DOJ for possible litigation. According to officials, the five agencies we reviewed have not suspended or terminated funding to enforce Title IX, including sexual harassment. Instead, according to agency officials, their reviews have found that most grantees are in compliance with Title IX from fiscal year 2015 through 2019, except for one grantee, where the agency worked with the grantee to achieve voluntary compliance. To leverage limited resources, three of the five agencies—DOE, NASA, and NSF—conducted joint Title IX compliance reviews. These reviews occur when two agencies providing funding to the same grantee jointly assess whether the grantee is complying with the law. DOE and NSF conducted three joint compliance reviews in fiscal years 2015 and 2016, while NASA and NSF conducted a joint review in fiscal year 2019. These joint reviews helped agencies leverage resources. NASA and NSF publicized on their websites a list of promising practices identified as part of their compliance reviews to assist grantees with Title IX compliance. Promising practices—grantee actions that have the potential to advance equal opportunities, diversity, and inclusiveness for program participants regardless of sex—may be considered, adopted, and replicated by other grantees, according to NASA and NSF officials. Some actions may go beyond meeting Title IX compliance requirements. NASA identifies promising practices to provide grantees with information and examples on practices they may wish to consider replicating to help enhance or supplement their equal opportunity efforts, according to officials. For example, NASA noted a promising practice in which a grantee presents campus training sessions on Title IX at which participants develop bystander behavior skills, discuss consent and sexual respect, and learn how to encourage and support reporting of sexual misconduct. In addition, this university grantee facilitates the workshop using clickers to allow real-time, anonymous audience response, enabling the facilitators to measure learning progress and see attitudinal shifts in real time. According to NASA, since the inception of its Title IX compliance program, the agency has followed a philosophy of providing meaningful technical assistance to universities, including identifying and reporting on promising practices of the universities that the agency reviews. NASA officials told us this approach mitigates the fact that the agency only has the resources to conduct compliance reviews at a few of its hundreds of grantees annually. NSF takes a similar approach. For example, NSF’s webpage for promising practices has a link to a university’s complaint resolution flow chart as an example for others to draw on. According to NSF officials, the agency values opportunities to learn about practices that have the potential to make significant and meaningful impacts on grantees’ efforts to create and maintain research environments that are safe and free from sexual and gender-based harassment. Moreover, according to officials, NSF grantees have expressed gratitude to the agency for sharing what other universities are doing that is working well. In contrast, while DOE, HHS, and USDA identified promising practices in some of their Title IX compliance reviews, they have not clearly publicized a list of these practices to the broader grantee community. DOE has posted reports of Title IX compliance reviews, but no list of promising practices. As a result, grantees who want to learn from other universities would need to review individual compliance reports and search for promising practices. DOE does plan to develop a publication that identifies promising practices and lessons learned from its Title IX compliance reviews in fiscal year 2020, according to officials. The agency did not provide any plans or timeframes because officials stated that DOE’s Office of Civil Rights is determining the best approach for this project. USDA-NIFA is planning to create mechanisms to publicize best practices, according to officials, but it has not yet done so. According to USDA officials, the agency is discussing and determining the best promising practices from compliance reviews to publicize; however, recent staff changes have delayed this effort. As a result, USDA did not provide further details about how and when it will publicize promising practices. In October 2019, HHS’s Office for Civil Rights (HHS-OCR) updated its Title IX webpage to include a section dedicated to sexual harassment, including links to resources, guidance, and effective practices (also called promising practices) from other agencies, as well as a written resolution agreement between HHS and a university grantee that resolved findings of sex-based harassment. While a dedicated webpage for sexual harassment is a positive step, HHS’s webpage includes promising practices from other federal agencies—Equal Employment Opportunity Commission and NSF—but not HHS. HHS- OCR officials told us that promising practices are similar across federal agencies. However, HHS Title IX compliance reviews cover grantees that may be different from other federal agencies, such as medical colleges, and these grantees may face unique challenges in complying with Title IX. For example, according to the 2018 NASEM report, women students, trainees, and faculty in academic medical centers experience sexual harassment by patients and patients’ families, in addition to the harassment they experience from colleagues and those in leadership positions. HHS-OCR officials told us that the resolution agreement lists corrective actions that may be considered promising practices. However, a grantee who wanted to learn about these practices would need to know that they exist in the agreement and then review the document to find them. The agency has already identified potential promising practices in some its completed Title IX reviews. Therefore, publishing a separate list of these practices and corrective actions from resolution agreements on its website would require few resources and could benefit grantees. According to Standards for Internal Control in the Federal Government, management should use quality information to achieve its objectives and externally communicate such information to achieve objectives. The vast majority of grantees are reviewed for Title IX compliance infrequently by the five agencies and therefore receive little to no information on such compliance from these agencies. Moreover, while grantees can access completed Title IX reviews on some agencies’ websites, this endeavor would still require grantees to review the written reports in detail to uncover any promising practices. Without clearly publicizing promising practices to the broader grantee community, such as a stand-alone list of practices, DOE, HHS-OCR, and USDA are missing an opportunity to provide quality information to grantees about how best to ensure compliance with Title IX requirements and reduce the likelihood of sexual harassment. The five agencies we reviewed received Title IX complaints, but varied in their efforts to address sexual harassment allegations, including: 1) finalizing procedures for processing Title IX complaints, 2) communicating complete information about the complaint process to grantees, and 3) addressing allegations outside of the Title IX process. Four agencies received three or fewer formal Title IX complaints total from fiscal year 2015 through 2019. Two of the five agencies do not have written procedures for the prompt processing and disposition of Title IX complaints—including allegations of sexual harassment—as required by federal regulations. According to agency officials, all five agencies use their websites as the primary means of communicating Title IX complaint information to grantees and individuals at universities; however, one of the five agencies’ websites does not provide clear guidance for grantees on the basics of the complaint filing processes—such as who can file. Additionally, two agencies have gone beyond the formal Title IX complaint process and also review sex discrimination concerns—including sexual harassment—as a means of improving agency Title IX oversight of university grantees. Title IX affords individuals the ability to file formal complaints of Title IX violations directly to the federal agency providing funding for the program. According to agency officials, the five agencies generally define formal complaints as those that: Are submitted in writing; Are filed within 180 days of the incident—or if ongoing, within 180 days of the last incident—to be considered timely; Provide the name and contact information of the person who is Provide a general description of the person or people injured by the alleged discriminatory act(s) (names of those injured are not required); and Provide a description of the alleged discriminatory act(s) in sufficient detail to enable the agency to understand what occurred, when it occurred, and the basis for the alleged discrimination (sex discrimination in the case of Title IX). All five agencies accept formal Title IX complaints in multiple ways— including at minimum through email and postal mail. From fiscal year 2015 through 2019, four agencies received three or fewer formal complaints (see table 2). Agency officials provided several reasons why they believe agencies receive few formal Title IX complaints: Complaints are more commonly filed with the university or with Education and are rarely directly reported to the agency; Individuals may be unaware of their right to file complaints directly with the agency or how to file such a complaint; and Individuals may fear retaliation or a negative impact on their scientific career (see sidebar). Retaliation At a state university, a graduate student reported her advisor for sexual harassment. The university substantiated her claim and the professor left the university. According to the victim, fellow students upset at the impact of the professor’s departure on their own research and academic careers, retaliated against her. Student-centered retaliation included taking her lab equipment without permission, ostracizing her from social events, and withholding critical information and resources necessary for her research. This retaliation caused her to move her workspace and lose progress on her own work. Officials from DOE, NASA, HHS-NIH, and NSF stated they usually learn about instances of sexual harassment from other sources (e.g. media reports) and rarely from voluntary reporting from universities or other federal agencies. Title IX officials at two universities we interviewed agreed with agency officials about why few formal complaints are filed with agencies. For example, one Title IX official stated that concerns about retaliation for filing a complaint are amplified when there is an agency involved due to concerns over risk to the funding. Officials from NSF, which received the most formal Title IX complaints of the five agencies from fiscal year 2015 through 2019, stated that complaints to their agency have increased in recent years. They could not state definitively the reason for the recent increases, but said it may stem from the increased publicity of sexual harassment cases in STEM—including a Twitter movement known as #MeTooSTEM—along with NSF’s revised grant terms and conditions. DOJ’s regulations provide that federal agencies must establish and publish procedures for the prompt processing and disposition of complaints. While all five agencies specify general requirements for a formal complaint, two do not have clear or updated written procedures for processing and disposing of formal Title IX complaints. Specifically: While DOE’s agency regulations stipulate that the agency will investigate allegations of discrimination under Title IX, agency officials stated that DOE does not currently have written Title IX complaint procedures. In November 2019, the agency provided a preliminary draft outline of its procedures, but officials stated that the agency does not have a timeline for when they may be finished. This is because the agency is devoting its resources to investigating current complaints, according to DOE officials. The website for USDA’s Assistant Secretary for Civil Rights—the office handling complaints across the agency—contains a summary of procedures used to process and investigate discrimination complaints, but a USDA official stated that the procedures need more clarity with regard to the university and research environment. In November 2019, USDA officials highlighted a 1999 USDA Departmental Regulation that addresses processing administrative complaints of discrimination filed against any program or activity receiving financial assistance from USDA. Officials stated that this regulation was revised in fiscal year 2019 and is currently under review for approval. The Departmental Regulations as they stand are outdated, referencing out-of-date organizational responsibilities and department names. Despite the absence of formal complaint procedures for DOE and outdated procedures for USDA, both agencies have evaluated formal Title IX complaints to determine if they meet the necessary criteria for investigation. Specifically, according to agency officials, USDA evaluated and investigated a formal Title IX complaint in fiscal year 2017, and DOE is currently evaluating a complaint to determine if it meets the criteria for a formal complaint. However, without clear and specific guidance for the processing and disposition of complaints, DOE is not complying with DOJ’s regulations—which require federal agencies to establish and publish complaint procedures—and may not be able to consistently and efficiently handle formal Title IX complaints. Moreover, under Standards for Internal Control in the Federal Government, management should implement control activities through policies. For example, management should periodically review procedures for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. Without updated complaint procedures, USDA does not have procedures that are aligned with the current structure and oversight responsibilities of the agency. In contrast, NASA, NSF, and HHS-OCR have developed written procedures for how the agency receives, investigates, and resolves formal Title IX complaints. As seen in appendix I, the formal complaint process is extensive and complex, with evaluative benchmarks to be met prior to investigation. According to officials, all five agencies use websites as the main mechanism for communicating information about Title IX complaints to individuals at university grantees. However, USDA’s website is not clear about who can file a Title IX complaint. NASA, HHS-OCR, NSF, and DOE each have a website intended to provide information about filing complaints specifically to individuals involved with agency-funded grants. On these websites, the agencies state that they accept Title IX complaints or sex discrimination complaints, among other types. In contrast, USDA communicates information on its complaints process via a general discrimination website that is not specific to Title IX complaints or to individuals on agency-funded grants, making it unclear who can file Title IX complaints. Specifically, USDA provides information about complaint resolution through its Office of Assistant Secretary for Civil Rights website, but grantees wishing to file a formal complaint would need to do so as a “customer,” a term that is not defined on the agency’s website and that individuals on agency-funded grants may not recognize as including them. A USDA official acknowledged that such individuals may not realize that they can file through the website. USDA officials told us that the agency would consider revising its website to make clear that individuals on USDA grants can file a formal discrimination complaint with the agency. If USDA does not revise its website, the lack of clarity about who is a customer that can submit a complaint may inhibit its ability to obtain information necessary for Title IX oversight. Under Standards for Internal Control in the Federal Government, management should externally communicate the necessary quality information to achieve the entity’s objectives. For example, management may communicate and receive information through established reporting lines, such as websites, from external parties that can help the agency achieve its objectives, such as oversight of Title IX. The lack of clear communication of quality information may reduce the effectiveness of USDA’s Title IX enforcement. Unlike USDA, both HHS-OCR and DOE recently took action to improve website clarity on who can file a Title IX complaint. Specifically: HHS-OCR’s website provides information on filing formal complaints for multiple forms of discrimination—such as race, age, and sex discrimination—and allows formal complaints from all who feel they have been discriminated against by a program or activity that receives funding from any part of HHS. In part due to issues raised during the course of our study, HHS-OCR published several new or updated websites in October 2019—including a Title IX page with university- based examples of entities covered under Title IX and a website on sex-based harassment outlining definitions and examples of what constitutes sex discrimination under Title IX. Before this update, it was not clear if individuals working on HHS-funded grants could file formal Title IX complaints via HHS-OCR’s website. In October 2019, DOE updated its Title IX website to include clear information on the multiple ways individuals can file a formal Title IX complaint with the agency, after we pointed out that this information was missing from DOE’s website, according to officials. The updated website specifies that individuals can notify the agency of a Title IX complaint in person, by email, fax, or mail. Prior to this update, the website only provided information on how to mail the agency a Title IX complaint. In addition to investigating Title IX complaints as required by Title IX, two agencies—HHS-NIH and NSF—go beyond this requirement by also reviewing concerns of sex discrimination—including sexual harassment— and publicly communicating the option for individuals to notify the agency of such concerns outside of the formal Title IX complaint process. “Concerns” are generally defined as information from individuals seeking to inform or notify the agency that sex discrimination has occurred or is occurring, but information is not intended to be a formal Title IX complaint. For example, HHS-NIH established a website, email, and online portal specifically for concerns of sexual harassment, publicly communicating this effort not only on the website, but also in public presentations and official statements. NIH officials stated the agency began reviewing concerns to provide clear channels of communication to NIH. HHS-NIH also developed internal guidance, which is still evolving, for agency staff on how to process concerns from individuals at university grantees through coordination with the grantee. While formal Title IX complaint investigations are agency-led, investigations of sex discrimination concerns, including sexual harassment, filed with HHS-NIH are university-led, with HHS-NIH assessing the university grantee’s response to the allegation to ensure appropriate action is taken to ensure a safe research environment (see appendix II for more details). NSF also publicly communicates the option to notify the agency of concerns of sex discrimination via their Awardee Civil Rights website. In addition to providing details on who should file a formal complaint and how, NSF also provides information on how to notify the agency of concerns and what is done with this information. For example, NSF has initiated a Title IX compliance review for fiscal year 2020 based in part on information contained in a concern it received, according to officials. In fiscal year 2019, HHS-NIH received 93 concerns of sex discrimination and NSF received 47, according to officials from each respective agency (see table 3). In contrast, the remaining agencies—NASA, USDA, DOE, and HHS- OCR—do not publicly communicate the option to notify the agency of concerns of sex discrimination or sexual harassment. Although these agencies stated that they do review all information received—including information from those seeking to notify the agency of concerns—the review is primarily to determine if the information provided meets the agency’s criteria for a formal complaint. Those complaints meeting the criteria for a formal complaint are processed by the agency following the legally required Title IX complaint process. According to officials, the agencies may use the information from concerns to help select a site for a Title IX compliance review. As shown in table 3 above, officials from DOE, USDA, and NASA stated their respective agencies received no concerns of sex discrimination in fiscal year 2019, and HHS-OCR does not track concerns—referred to as communications—that the agency cannot investigate under Title IX, according to HHS-OCR officials. DOE officials stated that the agency received its first sex discrimination concern in fiscal year 2020 and therefore DOE was not aware individuals were looking to notify the agency of concerns. While these agencies accept concerns, they have received few or no concerns and have not publicly communicated that individuals may send concerns to them. The 2018 NASEM report, agency officials, and stakeholders we interviewed all noted the importance of informal ways for individuals to report concerns outside of formal complaint processes. The NASEM report states that formal reporting procedures can re-victimize targets of harassment, and informal procedures—including the acceptance of anonymous complaints—may let them bring concerns forward without fear of retaliation. A stakeholder we interviewed pointed out the arduous nature of agencies’ formal complaint processes, and multiple stakeholders highlighted the difficulty of meeting the federal standard for a Title IX violation. All five agencies agreed that informal information— such as concerns—is helpful in providing the agency with additional information about the research environment on campus. Of the 140 total concerns of sex discrimination received in fiscal year 2019 by the agencies in our study, all were filed with either NSF or NIH. A comparison of the number of concerns and formal complaints received by the agencies shows that the five agencies as a whole received more than three times as many concerns in 1 year as they did formal complaints in 5 years. Title IX specifies federal agencies’ Title IX oversight responsibilities— including enforcing Title IX compliance at the universities they fund. Under Standards for Internal Control in the Federal Government, management should externally communicate the necessary quality information to achieve the entity’s objectives. For example, management may communicate and receive information through established reporting lines from external parties—in this case, through formal complaints and concerns—which can help the agency achieve its objectives, such as oversight of Title IX. By publicly communicating to individuals that they may notify the agency of a concern of sex discrimination outside of the formal Title IX complaint process, NASA, USDA, DOE, and HHS-OCR could receive additional information necessary for appropriate Title IX oversight. According to NSF officials, concerns not only reveal potential issues with the climate at an awardee university, they also aid in Title IX oversight by alerting the agency to possible Title IX violations a university may need to notify the agency of under the grant terms and conditions. In addition to reviewing concerns of sex discrimination from individuals at university grantees, NSF receives notifications directly from university grantees. In 2018, NSF modified its grant terms and conditions to require university grantees to notify the agency if there is a finding of sexual harassment against a principal investigator (PI) or co-PI on an NSF-funded grant, or if administrative action was taken against a PI or co-PI due to an allegation or complaint of sexual harassment. In 2019, NSF established written procedures to review these notifications from university grantees to determine if the university handled the matter adequately and appropriately, and if further action is needed by NSF. NSF received 13 notifications from university grantees through the new grant terms and conditions in fiscal year 2019, according to agency officials. NASA, similar to NSF, proposed changes to its grant terms and conditions. NASA published its notice of the proposed change in July 2019. However, according to NASA officials, the Office of Science and Technology Policy requested that NASA consult with the National Science and Technology Council’s joint committee’s subcommittees— Safe and Inclusive Research Environments Subcommittee and Coordinating Administrative Requirements for Research Subcommittee— prior to moving forward with finalizing the terms and conditions. NASA consulted with the Office of Science and Technology Policy in December 2019 and received concurrence to move forward with finalizing the change to its terms and conditions, according to NASA officials. On March 10, 2020, NASA published a final notice of its new terms and conditions for grants. Upon implementation, the new terms and conditions requires, among other things, grantees to report to NASA any findings or determinations of sexual harassment, other forms of harassment, or sexual assault regarding a NASA funded PI or co-PI. The reporting requirement will be applied to all new NASA awards and funding amendments to existing awards made on or after the effective date—30 days from the date of the publicized notice. HHS differs from the other four agencies in that formal complaints and concerns are handled by two different components, which do not communicate with each other regarding information on sexual harassment, according to officials from both HHS-OCR and HHS-NIH. HHS-OCR—the enforcement authority of the agency—has the authority to conduct Title IX compliance reviews and investigate formal Title IX complaints. However, as previously mentioned, HHS-NIH—the grant- making component—has independently developed its own avenue for receiving concerns of sex discrimination, including sexual harassment. The Standards for Internal Control in the Federal Government state that management should internally communicate the necessary quality information to achieve its objectives. This communication includes conveying information down and across reporting lines to allow staff to perform key roles in achieving objectives and addressing risks. There are no formal procedures within HHS for communicating information across the agency components regarding Title IX complaints, concerns of sex discrimination including sexual harassment, or Title IX compliance, according to officials from both HHS-NIH and the HHS-OCR. An official from HHS-OCR stated that the department already shares broad information about findings of Title IX violations and completed Title IX compliance reviews via a listserv to HHS employees and stakeholders who subscribe, but HHS-NIH officials stated they were not aware of this information. HHS-NIH officials also stated they do not share information with HHS-OCR regarding concerns of sex discrimination, including sexual harassment, received by HHS-NIH or actions taken in response to these concerns. According to HHS-NIH officials, grantees are expected to provide safe and healthy working conditions—a term and condition of the grant—and therefore if harassment threatens the research environment, this is a potential violation of grant terms and conditions and officials stated that HHS-NIH has the authority to handle it. Establishing procedures for communicating grantee sexual harassment findings could improve efforts by both HHS-NIH and HHS-OCR to prevent sexual harassment at universities. For example, HHS-OCR could use HHS-NIH data to aid in selecting grantees for Title IX compliance reviews. Additionally, HHS-NIH could use HHS-OCR’s compliance review findings to inform oversight of NIH grants—including modifying university grantees’ grant terms and conditions if there were findings of non- compliance. Officials from HHS-OCR agreed that information on concerns of sex discrimination, including sexual harassment, from HHS-NIH would be helpful. HHS-NIH officials also agreed that information sharing may be useful for cross agency awareness, but HHS-NIH officials asserted that a formal agreement would be necessary to ensure privacy when sharing information. HHS-NIH officials did not provide any further details on what should be included in a formal agreement for sharing information on sex discrimination concerns, including sexual harassment. All five agencies have taken additional steps beyond Title IX compliance requirements to address sexual harassment by university grantees. As we reported in June 2019, all five agencies have developed and communicated grantee sexual harassment prevention policies, with some providing more detailed guidance than others. All five agencies have also established grantee sexual harassment prevention efforts beyond those required by Title IX, to varying degrees. For example, as we noted above, HHS-NIH launched a website to receive concerns of sex discrimination including sexual harassment, and NSF and NASA have modified grant terms and conditions that require universities to report findings of sexual harassment. All of the agencies we reviewed established and communicated their sexual harassment prevention efforts to grantees within the last 3 fiscal years, and most of them have continued to update and communicate them since we last reported on their efforts in June 2019 (see sidebar for an agency example and appendix III for more information on agencies’ efforts). Agencies have taken steps to create goals for and evaluate some of their individual grantee sexual harassment prevention efforts. However, four of the five agencies have not created goals for all prevention efforts. In addition, none of the five agencies have a plan designed to assess progress toward achieving those goals, including methods to regularly monitor and evaluate their various grantee sexual harassment prevention efforts together—both those that are required by Title IX and those that go beyond these requirements. USDA created a poster for grantees that describes how the agency prohibits discrimination in all forms, including discrimination on the basis of sex. The poster also provides information on how to file a discrimination complaint with USDA by phone, mail, fax or email. USDA requires all grantees to prominently display the poster in all offices where there is a USDA presence and where it may be read by customers. USDA also requires that the poster be a specific size. NSF and USDA-NIFA do not have goals for all of their grantee sexual harassment prevention efforts, according to officials. In addition, NASA and DOE have or are in the process of establishing goals for some prevention efforts related to Title IX requirements, while HHS-NIH has created goals for all of their grantee sexual harassment prevention efforts. NASA and DOE have goals or plan to establish goals for sexual harassment prevention efforts required by Title IX—such as compliance reviews—but they lack goals that include all other sexual harassment prevention efforts for university grantees. For example, according to NASA officials, NASA’s strategic plan has goals for equal opportunity and diversity and inclusion for the NASA workforce and grantees, and it includes a goal for the agency to promote equal opportunity for grantees and to encourage them to use best practices identified by NASA. To measure progress toward this goal, NASA officials told us that the agency plans to establish a timeline to track the percentage of Title IX compliance activities completed by grantees. However, NASA has not established goals for its other grantee sexual harassment prevention initiatives. In addition, DOE officials told us that they are in the process of establishing a goal for the number of Title IX compliance reviews they conduct each year, but DOE does not have goals or a plan for evaluating other DOE grantee sexual harassment prevention initiatives. In contrast, HHS-NIH’s Working Group of the Advisory Committee to the NIH Director has created goals for HHS-NIH’s various grantee sexual harassment prevention efforts and steps to achieve them. These goals include assessing the current state of sexual harassment allegation investigation, reporting, remediation, and disciplinary procedures at NIH- funded organizations; advising grantees on oversight, accountability, and reporting measures that will encourage a reduction in, and prevention of sexual harassment; and developing strategies for encouraging research on anti-harassment policies, procedures and training, and measures and evaluations of their effectiveness. HHS-NIH developed recommendations for the steps needed to achieve these goals, including immediate, actionable efforts and longer-term efforts to change the culture within NIH and at universities to end sexual harassment. HHS-NIH officials published a final report and recommendations in December 2019. The report recommended that HHS-NIH establish a hotline and a web- based form for reporting sexual harassment and inappropriate behavior by any principal investigator or key personnel funded by HHS-NIH, and that HHS-NIH also conduct an analysis of the prevalence and antecedents of sexual and gender harassment in order to develop interventions that address goal-specified gaps, among others. In addition to most of the agencies not having goals for all of their grantee sexual harassment prevention efforts, none of the five agencies have a plan to measure progress toward achieving those goals, including methods to regularly monitor and evaluate them all. Some of the agencies have taken steps toward conducting evaluations of some—but not all—of their grantee sexual harassment prevention efforts: Evaluations of policies and procedures. Three agencies—NASA, NSF, and DOE—have evaluated or are beginning to evaluate some of their sexual harassment policies and procedures for university grantees. NASA officials said they conduct evaluations every five years for all of their agency’s civil rights compliance and complaints procedures, including their Title IX compliance review procedures. NSF is also developing an evaluation plan for its new sexual harassment reporting requirements and how they have affected grantees. NSF officials said that they have an evaluation team in place, which has outlined an approach for evaluating the new grant terms and conditions and has begun gathering information from universities. In addition, DOE officials told us that they are currently reviewing other agencies’ policies and using them as a benchmark as they draft their own grantee policies. However, agencies have not periodically evaluated all of their own sexual harassment policies and procedures related to university grantees. Agencies provided examples of evaluations of grantee or employee prevention policies, rather than an evaluation of their own policies created for university grantees. It is unclear why agencies have not yet established methods to evaluate all of their sexual harassment prevention efforts for university grantees, and we recognize the challenge in doing so. Yet agencies have found ways to evaluate the policies of other entities. For example, officials from HHS-OCR told us that they use information from past compliance reviews to improve their compliance review and resolution requirements for grantees. However, compliance reviews are an evaluation of the university grantee’s sexual harassment prevention policies and procedures, not HHS’s. In addition, when asked whether HHS-NIH evaluates its grantee sexual harassment policies, HHS-NIH officials did not give any examples of evaluations of their own policies created for university grantees. Instead, they gave an example of a climate survey they administered to their employees for work-life climate and harassment. Title IX officials from two universities and one university system all said none of the five agencies had asked for their opinions on how effective the agencies’ sexual harassment prevention policies for grantees are. Nor had they requested suggestions for improvement, even though at least one of the five agencies had been in direct contact with two of these officials for a recent compliance review. Evaluations of communication mechanisms. None of the five agencies periodically evaluate the mechanisms for how they communicate their sexual harassment prevention policies and procedures to individuals at universities receiving federal grants. Instead, agencies rely on general efforts to evaluate their website or are developing plans for such an evaluation. As a result, the agencies do not know the extent to which their various communication mechanisms are working and whether students, researchers, faculty, and university officials are getting the information they need from these mechanisms. For example, as previously stated, all five agencies use their website as the main mechanism to communicate information about Title IX complaint procedures to individuals at universities receiving federal grants. While agencies have taken steps to add more information to their websites for individuals at universities receiving federal grants, we found some of the agencies’ websites difficult to navigate. Even when key content existed, it was sometimes spread across multiple sections of the website or buried in supplemental materials, or in one case, associated with an incorrect destination page. For example, NSF officials stated that they prefer formal Title IX complaints be filed via their online complaint portal. However, this tool is not linked to the tab of the website discussing how to file complaints. Additionally, HHS-OCR’s newly-developed Title IX and sex-based harassment websites are not referenced or linked to the information on laws and regulations enforced by HHS-OCR or the complaints page. Rather, from the HHS-OCR home page, one would have to know to click on the “Special Topics” link to find links to the two new websites or find the link to the “Sex-based Harassment” page embedded within the new Title IX website. All of the agencies acknowledged issues with their websites. For example, NSF officials acknowledged that their agency’s website may not be user-friendly to individuals at universities—such as students—and is in the process of revising the website to increase ease of use. None of the five agencies have periodically evaluated this key communication tool at this time. NASA officials said that they evaluate their website for grantees, but these evaluations are not systematic and have not specifically focused on their sexual harassment prevention efforts for grantees. HHS-NIH officials said that they receive some feedback on the agency’s webpages, and the agency keeps track of website user satisfaction to improve their quality in general, but this effort is not specific to evaluating how HHS-NIH communicates information on sexual harassment prevention to grantees. NSF officials said they are planning to conduct an evaluation on the effectiveness of their communication efforts with their grantee community and will include actions that result from that evaluation in NSF’s corrective action plan. As previously mentioned, HHS-OCR and DOE recently took action to improve website clarity on who can file a Title IX complaint, in part due to issues raised during the course of our study. Evaluating the effectiveness of their communication mechanisms is important, as agencies may not be clearly communicating their sexual harassment prevention policies and procedures to their intended audiences. Nor can they be sure these policies and procedures are reaching the right university officials. For example, Title IX officials from two universities and one university system said that they had not received any information from the five agencies on their sexual harassment prevention policies for grantees. Two Title IX officials stated that, even if this information is already provided to the university departments or offices conducting scientific research, it should also be given to the university’s Title IX office, with one official noting they are the part of the university responsible for overseeing compliance with sexual harassment policies and procedures under Title IX. Title IX university officials also told us that the federal agencies providing their grants had never provided them with information on agencies’ policies and procedures for how individuals at their institutions could file sexual harassment complaints. One Title IX university official described how they would not know how to tell someone to proceed if they wanted to file a complaint with the agency funding their research project. Officials from all five agencies acknowledged the value of evaluating their grantee sexual harassment prevention efforts and noted that they may be able to conduct such evaluations in the future. In addition, four of the agencies have a general goal to prevent sexual harassment by their university grantees, and all have recognized the need to move beyond their current grantee sexual harassment policies and procedures. As we reported in June 2019, their completed or planned actions include modifying current department- level or agency-wide policy statements to include more specific definitions and examples of sexual harassment and strengthening requirements for their university grantees to report on findings of sexual harassment. The 2018 NASEM report also noted that, while it is clear that the agencies are concerned about sexual harassment in STEM, it is not yet apparent whether and how actions such as their new policy statements will translate into meaningful action. Standards for Internal Control in the Federal Government state that management should define objectives clearly to enable the identification of risks and define risk tolerances; for example, in defining objectives, management may clearly define what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. Standards for Internal Control in the Federal Government also state that federal agencies should establish and operate monitoring activities to evaluate results, select and periodically evaluate methods of communication, and define objectives in specific and measurable terms. We recognize that the agencies’ civil rights or diversity offices are responsible for enforcing and overseeing a number of other civil rights laws, Executive Orders, regulations, and policy directives for grantees and their own employees, and that sexual harassment prevention efforts for grantees are just some of their many discrimination prevention initiatives. We also recognize that most agencies’ grantee sexual harassment prevention efforts are new, and in some cases, still under development. However, establishing goals and an overall plan to assess progress toward achieving those goals—including methods to regularly monitor and evaluate sexual harassment prevention policies and communication mechanisms— would better position the agencies to effectively coordinate and integrate such activities. It would also help them holistically evaluate all their efforts—both those that are required by Title IX and those that go beyond these requirements—to help grantees prevent sexual harassment at universities, determine whether their policies and procedures are reaching the populations they intend to receive the information, and allow them to more effectively target outreach if they find that there are deficiencies. DOJ’s Quarterly Title IX STEM discussion group provides a forum for the five agencies to collaborate and share information on Title IX compliance. While DOJ has implemented four of the six relevant leading practices on federal interagency collaboration, it has not fully implemented two key practices—agreeing on agency roles and responsibilities and developing mechanisms for monitoring, evaluating, and reporting collaborative efforts. Outside of the discussion group, the five agencies have taken collaborative steps to address the culture and climate for women in STEM. DOJ’s Quarterly Title IX STEM discussion group facilitates collaboration and shares best practices on Title IX enforcement across the five agencies. Collaboration can be broadly defined as any joint activity that is intended to produce more public value than could be produced when organizations act separately. Since February 2016, after reconstituting the Quarterly Title IX STEM discussion group, DOJ has held quarterly group meetings to share information on Title IX enforcement. According to DOJ officials, the agencies discuss several topics, including: Strategies for conducting Title IX compliance reviews, including joint Strategies for investigating Title IX complaints General discussion of Title IX complaints, including sexual Title IX court cases and case history Officials at the five agencies agreed the group is useful to coordinate and share information on Title IX, for example, by avoiding duplication in compliance reviews and complaint investigations. Indeed, when multiple agencies received the same Title IX complaint, the three agencies collaborated with DOJ to determine which one would handle the complaint, according to officials. DOJ also provides technical assistance and training on Title IX enforcement, according to officials. Some agency officials identified steps that could potentially improve collaboration within the group, including: Clarifying and documenting the group’s purpose, scope, and roles and responsibilities to ease transition of new agency staff and leadership Incorporating more specific topics related to sexual harassment in meeting agendas Involving all federal agencies that fund STEM research at universities. Although agencies are not required to follow leading practices for interagency collaboration, doing so can enhance and sustain such collaboration, thereby improving performance and results. DOJ officials told us the agency has adopted leading practices for interagency collaboration as part of the group. Based on information from DOJ, we found the agency’s actions were consistent with four out of six of the relevant leading practices we have identified for collaborating across agencies. We also found that DOJ could take additional steps to fully adopt the remaining two leading practices, as shown in table 4. Without implementing the two interagency collaboration leading practices, DOJ is missing an opportunity to enhance and sustain collaboration among the five agencies we reviewed as they continue to address the problem of sexual harassment at universities. All five agencies reported taking collaborative steps with universities and federal agencies to address the culture and climate for women in STEM. For example, in 2019, HHS-NIH established a working group with university experts to collaboratively assess the current state of procedures for sexual harassment allegation investigation, reporting, remediation, and discipline at NIH-funded organizations. In December 2019, the working group made several recommendations. For example, it recommended that NIH require each principal investigator and key personnel on an NIH grant attest that they have not been found to have violated their institution’s code of professional conduct, including having a finding of sexual harassment, for a determined period of time. The working group also recommended that NIH create a parallel process to treat professional misconduct, including sexual harassment, as seriously as research misconduct. In addition, DOE, NASA, NSF, and USDA collaborated with universities at conferences and meetings. According to DOE officials, the agency attends the annual conference of university Title IX administrators, where participants discuss issues related to Title IX, sexual harassment, and sexual assault. In 2016, NASA held a conference to help universities address sexual harassment and share best practices to increase participation of underrepresented populations in STEM education (see sidebar). According to NASA officials, attendees included university presidents, deans, and provosts, as well as NASA leaders. The agency is planning another conference in 2020, according to NASA officials. NSF presented information on Title IX and their policies and procedures at numerous conferences and meetings in 2018 and 2019, according to officials. USDA-NIFA served on the planning committee and participated in a conference with public land grant universities to discuss diversity and inclusion in 2018. According to officials, USDA is considering participation in future events. Such efforts to go beyond compliance reviews and to address the larger culture and climate of STEM research are consistent with the 2018 NASEM report, which states that “adherence to legal requirements is necessary but not sufficient to drive the change needed to address sexual harassment.” increase participation in NASA business and grant opportunities, and education programs. address important issues related to America’s research environment. The joint committee also established the Safe and Inclusive Research Environments Subcommittee, in which DOE, HHS (including NIH), NASA, and NSF participate, along with other federal agencies and offices. USDA-NIFA is a member of the joint committee but does not participate in the Safe and Inclusive Research Environments Subcommittee; instead, USDA’s Agricultural Research Service participates in the subcommittee. The goals and planned actions of the joint committee and subcommittee have not been determined yet, according to Office of Science and Technology Policy officials. Office of Science and Technology Policy officials told us in December 2019 that its work plan is complete, but there are no plans to release it publicly since it is a deliberative document. The subcommittee is broadly focused on preventing harassment in research environments. Sexual harassment in higher education is degrading and illegal. In 2017 alone, the media covered over 97 allegations of sexual harassment at institutions of higher education with some of the most high-profile cases occurring in the fields of science, engineering and medicine, according to the National Academies of Sciences, Engineering, and Medicine. Federal agencies, in connection with the billions of dollars in research funding they provide to universities and other institutions each year, are required to enforce Title IX—prohibiting sex discrimination, including sexual harassment—at these universities. As part of their enforcement responsibilities, all five agencies have conducted the required Title IX compliance reviews, but three agencies—DOE, HHS-OCR, and USDA— are missing an opportunity to share promising practices from their Title IX compliance reviews with the broader grantee community. Given that these agencies conduct compliance reviews at only a handful of the hundreds of grantees they fund in any given year, the vast majority of grantees receive little to no information on Title IX compliance reviews from these agencies. Another tool federal agencies can use to address sexual harassment is the prompt processing and disposition of Title IX complaints from students and employees. Although all five selected agencies received Title IX complaints, DOE and USDA have not finalized and published complaint procedures, as required by DOJ’s regulations. Furthermore, USDA does not provide clear information about the complaint process on its website—its primary means of communicating information to individuals and grantees. As a result, the agency may be missing the opportunity to better serve individuals seeking relief from sexual harassment at universities. Federal agencies can also review information from individuals seeking to notify the agency of a concern related to sex discrimination—including sexual harassment—in an informal manner outside of the Title IX complaint process. However, only HHS-NIH and NSF communicate the option to submit concerns, and only HHS-NIH has a written process for reviewing such concerns. In a single year, these concerns outnumbered formal Title IX complaints received by all the agencies over 5 years. The 2018 NASEM report, agency officials, and stakeholders we interviewed noted the importance of informal ways for individuals to report concerns outside of formal complaint processes, which can protect an individual from retaliation, alert agencies to possible Title IX violations, and help agencies select sites for Title IX compliance reviews. Two HHS components—NIH and OCR—do not share sexual harassment complaint information with each other. This poses the risk that HHS-NIH will be unaware of situations in which HHS-OCR finds non-compliance with Title IX and may approve a STEM research grant for that university. It also raises the possibility that NIH will receive concerns about a university that may warrant a Title IX compliance review, but the Office for Civil Rights may be unaware of these concerns. Establishing clear goals and an overall plan can help agencies assess progress and manage change, including, in this case, the creation of new sexual harassment prevention efforts for grantees. Although all five agencies have established a variety of prevention efforts, they have done so without a plan, and without methods to evaluate their policies and how they communicate them. As a result, agencies do not have a way to measure progress toward preventing sexual harassment at their university grantees, including how or whether these efforts are helping university grantees and individuals who have been subject to harassment. Finally, interagency coordination can help improve the results of agency activities. DOJ has not fully adopted two key interagency collaboration leading practices for its interagency working group. Without doing so, the agency is missing an opportunity to enhance and sustain collaboration among agencies as they continue to address the problem of sexual harassment at universities. We are making 17 recommendations, including four to DOE, one to DOJ, four to HHS, two to NASA, one to NSF, and five to USDA. Specifically: The Secretary of the Department of Agriculture should direct the Assistant Secretary for Civil Rights to publicize promising practices for Title IX compliance on its websites for their university grantees. (Recommendation 1) The Secretary of Energy should direct the Director of the Office of Economic Impact and Diversity to publicize promising practices for Title IX compliance on its websites for their university grantees. (Recommendation 2) The Secretary of the Department of Health and Human Services should direct the Director for the Office for Civil Rights to publicize a stand-alone list of promising practices for Title IX compliance on its websites for their university grantees. (Recommendation 3) The Secretary of Energy should direct the Director of the Office of Economic Impact and Diversity to finalize and publish Title IX complaint procedures, consistent with DOJ’s regulations. (Recommendation 4) The Secretary of the Department of Agriculture should direct the Assistant Secretary for Civil Rights to finalize and publish revised Title IX complaint procedures. (Recommendation 5) The Secretary of the Department of Agriculture should direct the Assistant Secretary for Civil Rights to clarify on its website that individuals on USDA-funded grants can file Title IX complaints through the Assistant Secretary for Civil Rights—including clarifying who is considered “customers.” (Recommendation 6) The Secretary of the Department of Health and Human Services should direct the Director for the Office for Civil Rights to assess the feasibility of receiving and reviewing concerns of sex discrimination— including sexual harassment—and communicating to individuals on agency-funded grants the option to notify the agency of these concerns, outside of the Title IX complaint process. (Recommendation 7) The Secretary of Energy should direct the Director of the Office of Economic Impact and Diversity to assess the feasibility of receiving and reviewing concerns of sex discrimination—including sexual harassment—and communicating to individuals on agency-funded grants the option to notify the agency of these concerns, outside of the Title IX complaint process. (Recommendation 8) The Administrator of NASA should assess the feasibility of receiving and reviewing concerns of sex discrimination—including sexual harassment—and communicating to individuals on agency-funded grants the option to notify the agency of these concerns, outside of the Title IX complaint process. (Recommendation 9) The Secretary of the Department of Agriculture should direct the Assistant Secretary for Civil Rights to assess the feasibility of receiving and reviewing concerns of sex discrimination—including sexual harassment—and communicating to individuals on agency- funded grants the option to notify the agency of these concerns, outside of the Title IX complaint process. (Recommendation 10) The Secretary of the Department of Health and Human Services should direct the Director for the Office for Civil Rights and the Director of NIH to develop and implement formal procedures for sharing relevant information about Title IX (compliance reviews, violations, and complaints) and sex discrimination concerns, including sexual harassment. For example, HHS components should internally share information regarding findings of Title IX violations, concerns of sex discrimination, including sexual harassment, and Title IX compliance review reports. (Recommendation 11) The Secretary of Energy should establish goals and an overall plan to assess all of the agency’s sexual harassment prevention efforts for their university grantees, including methods to regularly monitor and evaluate its sexual harassment prevention policies and communication mechanisms (e.g. Title IX or sex discrimination websites). (Recommendation 12) The Secretary of the Department of Health and Human Services should establish goals and an overall plan to assess all of the agency’s sexual harassment prevention efforts for their university grantees, including methods to regularly monitor and evaluate its sexual harassment prevention policies and communication mechanisms (e.g. Title IX or sex discrimination websites). (Recommendation 13) The Administrator of NASA should establish goals and an overall plan to assess all of the agency’s sexual harassment prevention efforts for their university grantees, including methods to regularly monitor and evaluate its sexual harassment prevention policies and communication mechanisms (e.g. Title IX or sex discrimination websites). (Recommendation 14) The Director of NSF should establish goals and an overall plan to assess all of the agency’s sexual harassment prevention efforts for their university grantees, including methods to regularly monitor and evaluate its sexual harassment prevention policies and communication mechanisms (e.g. Title IX or sex discrimination websites). (Recommendation 15) The Secretary of the Department of Agriculture should establish goals and an overall plan to assess all of the agency’s sexual harassment prevention efforts for their university grantees, including methods to regularly monitor and evaluate its sexual harassment prevention policies and communication mechanisms (e.g. Title IX or sex discrimination websites). (Recommendation 16) In consultation with DOE, HHS, NASA, NSF, and USDA, the Assistant Attorney General for the Department of Justice should direct the responsible Civil Rights Division sections to fully adopt two federal interagency leading practices—agree on agency’s roles and responsibilities and develop mechanisms to monitor, evaluate, and report results of collaborative efforts, for its Quarterly Title IX STEM discussion group. (Recommendation 17) We provided a draft this report to DOE, DOJ, Education, HHS, NASA, NSF, the Office of Science and Technology Policy, and USDA for review and comment. We received written comments from the Departments of Agriculture, Energy, Health and Human Services, Justice, as well as NASA and NSF that are reprinted in appendixes IV through IX, and summarized below. Education did not have comments on the draft report, but it provided technical comments, which we incorporated as appropriate. The Office of Science and Technology Policy stated that it did not have comments on the draft report. All six of the agencies and departments to which we made recommendations stated that they agreed with the recommendations and most provided technical comments, which we incorporated as appropriate. The agencies’ comments are summarized below: In the Department of Agriculture's written comments, reproduced in appendix IV, the department agreed with all five recommendations. USDA outlined actions for improving the complaint process and communication with university grantees. For example, the department stated that its regulation for processing complaints is currently in the clearance process for publication. In addition, USDA will reach out to other agencies within the quarterly Title IX STEM discussion group to assess best practices for monitoring and evaluating sexual harassment prevention policies and communication mechanisms. In DOE's written comments, reproduced in appendix V, the department agreed with all four recommendations. DOE plans to publicize a promising practice guide on its website, publish complaint procedures, and evaluate the feasibility of receiving and reviewing concerns of sex discrimination, including sexual harassment. The department estimates completion by the end of calendar year 2020. DOE will establish goals for prevention efforts and an overall plan by the end of January 2021 and August 2021, respectively. In HHS's comments, reproduced in appendix VI, the department agreed with all four recommendations. In response to one recommendation, HHS stated that HHS-OCR and HHS-NIH would review the current procedure, and develop and implement, as necessary, formal procedures for sharing relevant information about Title IX and sexual harassment concerns. However, the department also noted that it did not \"share GAO's supposition that coordination of Title IX enforcement between HHS-OCR and HHS-NIH raises privacy concerns.\" Therefore, we removed this portion of our recommendation. As stated in the report, it was HHS-NIH officials who asserted that a formal agreement is needed to ensure privacy when sharing information, in particular sexual harassment concerns. For another recommendation, the department stated that HHS-NIH has established goals and will develop a plan to assess progress towards achieving these goals, and that HHS-OCR will also develop a plan for its Title IX enforcement and outreach efforts. In DOJ's written comments, reproduced in appendix VII, the department generally agreed with our recommendation. DOJ stated that the department is prepared to delineate the agencies' roles and responsibilities within the interagency group (quarterly Title IX STEM discussion group), as recommended. DOJ also plans to develop an enhanced process for evaluating, monitoring, and reporting on the group's collaborations in enforcing Title IX that is achievable within its current resource allocation, or if more resources become available. In NASA's comments, reproduced in appendix VIII, the agency concurred with our two recommendations. NASA stated that the agency plans to assess the feasibility of receiving and reviewing concerns of sex discrimination and harassment and estimates completion by September 20, 2020. Through the interagency process, NASA will also adopt the policies and procedures developed by the National Science and Technology Council, overseen by the Office of Science and Technology Policy. In NSF's written comments, reproduced in appendix IX, the agency agreed with our recommendation for goals and an overall plan to assess sexual harassment prevention efforts. NSF is embarking on an assessment process to improve its policies and practices continually in order to achieve the goal of safe and inclusive research environments. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Agriculture, Education, Energy, and Health and Human Services; the Directors of the National Science Foundation and the Office of Science and Technology Policy; the Administrator of the National Aeronautics and Space Administration; the Attorney General for the Department of Justice; and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6888 or neumannj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix X. While Department of Justice (DOJ) regulations require federal agencies to establish and publish complaint procedures, according to the DOJ Title IX Legal Manual, agency regulations with respect to procedures for the investigation of complaints of discriminatory practices are typically brief and lack details as to the manner or timetable for such an inquiry. The National Science Foundation (NSF) and the National Aeronautics and Space Administration (NASA) have developed complaint manuals in addition to the agencies’ Title IX regulations. According to NSF and NASA officials, both agencies follow the same general processes as those published in DOJ guidance or the Department of Education’s Investigative Manual for the prompt processing and disposition of complaints. Figure 3 is a visualization of the general Title IX complaint process described in NASA’s and NSF’s complaint manuals. Formal complaints can conclude in one of four ways: 1) dismissed for a variety of reasons—such as untimeliness or lack of information; 2) referred to another agency based on jurisdiction or authority; 3) resolved through a voluntary resolution process; or 4) resolved via an investigation and formal finding—either supporting the allegation or not. While the formal complaint may be alleging a discriminatory act against an individual, agency investigations focus on the university grantee’s compliance or non-compliance with Title IX. According to NASA and NSF officials, if there is a finding of non-compliance with Title IX, the onus is on the university grantee to take actions to come into compliance—which may include disciplinary action against the harasser. In recent years, the National Institutes of Health within the Department of Health and Human Services (HHS-NIH) has publicly addressed the agency’s efforts to prevent sexual harassment in science and elevate the seriousness with which the agency takes this issue through action. While already receiving information of sex discrimination concerns, including sexual harassment, from relationships built with institutions—including universities, in March 2019, HHS-NIH launched an email address to receive concerns about sexual harassment directly from individuals involved in HHS-NIH funded projects at universities. Shortly after, in June 2019, HHS-NIH also created an online portal in response to user feedback requesting a method of anonymous reporting. HHS-NIH developed preliminary internal guidance for staff regarding the process for handling concerns (see figure 4). According to officials, in order to review a concern, HHS-NIH needs basic information about the allegation, including: First and last name of the person who may have committed Institution that employs that person Brief description of the incident HHS-NIH notifies universities of the concern and may request details on the allegation and the university’s response to the allegations, according to officials. As part of this process, HHS-NIH assesses the university grantee’s response to ensure it is taking appropriate actions to ensure a safe research environment—altering the grant terms and conditions if needed to remove or replace key grant personnel. For example, in 2018, HHS-NIH followed up on sexual harassment-related concerns at more than 20 universities. According to a 2019 HHS-NIH Director Statement, this follow-up resulted in the replacement of 14 principal investigators named on NIH grant awards, disciplinary actions taken by awardee universities against 21 principal investigators—including termination of employment—and removal of 14 individuals from peer review. According to HHS-NIH officials, in fiscal year 2019 HHS-NIH received 93 concerns regarding sexual harassment. HHS-NIH does not just review allegations against personnel already funded by HHS-NIH, but also assesses if the allegations are against applicants for HHS-NIH funding. If a principal investigator or co-principal investigator listed on an application for an HHS-NIH grant is named in an allegation, HHS-NIH works with the institution to gather more information about the allegation in the context of HHS-NIH funded research. While the institution is conducting an internal investigation into the allegations, they may request to change the principal investigator or remove a co-principal investigator listed on the application. This may be a temporary or permanent action depending on the circumstances and the institution’s findings. This appendix contains a summary of the five agencies’ sexual harassment prevention efforts for university grantees or individuals at universities receiving federal grants as of December 2019. This summary indicates the implementation status for each agency’s efforts, and whether they were complete, in progress or partially implemented, or not reported. These efforts are grouped in three categories: 1) activities required by Title IX, 2) activities beyond those required by Title IX, and 3) evaluation activities (see figures 5, 6, and 7, respectively). John Neumann, (202) 512-6888 or neumannj@gao.gov In addition to the individual named above, Mark Gaffigan (Managing Director), Melissa Emrey-Arras (Director), Robert Marek (Assistant Director), Michelle St. Pierre (Assistant Director), Nkenge Gibson (Analyst-in-Charge), Nora Adkins, Caitlin Cusati, Cindy Gilbert, Kristy Kennedy, Anika McMillon, Kristen Pinnock, Amanda Postiglione, Janay Sam, and Benjamin Shouse made key contributions to this report.", "summary": "Sexual harassment is degrading and illegal. Studies show it has a negative effect on the ability of women to engage in research at the same level as men. Title IX prohibits sexual harassment and other forms of sex discrimination in education programs that receive federal funding, and federal agencies are required to enforce the law at universities they fund. In fiscal year 2018, the most recent year for which data were available during GAO's review, U.S. universities were awarded about $27 billion in federal grants for STEM research. GAO was asked to review federal efforts to help prevent sexual harassment at universities that receive such grants. This report examines, among other things, (1) how selected federal agencies receive, investigate, and resolve Title IX complaints; (2) the extent to which selected agencies have established an overall plan for their sexual harassment prevention efforts for university grantees, including for communicating and evaluating these efforts and (3) the extent to which selected agencies collaborate on efforts to prevent sexual harassment at universities they fund for STEM research. GAO reviewed agencies' relevant regulations and documentation and interviewed agency officials. The five agencies GAO reviewed provided approximately 80 percent of federal science, technology, engineering, and mathematics (STEM) research grants since fiscal year 2015. From fiscal year 2015 through 2019, four of the five agencies received few complaints—including sexual harassment—under Title IX from individuals at universities. Inconsistent with federal regulations implementing Title IX, two of the agencies—the Departments of Energy (DOE) and Agriculture (USDA)—lack finalized procedures for complaints and thus cannot ensure they are consistently handling complaints. Sex-discrimination concerns—including sexual harassment—can also be raised by individuals outside of the Title IX complaint process (see table). However, only two agencies—the National Science Foundation (NSF) and Department of Health and Human Services (HHS)—publicly communicate the option to notify them of concerns. The other three—DOE, the National Aeronautics and Space Administration (NASA), and USDA—received no concerns in fiscal year 2019 and may be missing opportunities to obtain information for Title IX oversight. All five agencies have established grantee sexual harassment prevention efforts beyond those required by Title IX. However, none of the agencies have goals and plans for all of their efforts, and thus they lack clear ways to evaluate how well these efforts are working and to identify any needed improvements. They may also be missing opportunities to coordinate and integrate prevention activities. Additionally, the Department of Justice (DOJ) reconstituted an interagency discussion group on Title IX in 2016, where all five agencies share information about their activities. However, DOJ has not fully adopted two leading practices for collaboration: agreeing on agency roles and responsibilities and developing mechanisms to monitor, evaluate, and report collaborative efforts. Officials at one agency said clarifying agencies' roles and responsibilities would improve the group. Adopting leading practices would help enhance and sustain collaboration. GAO is making 17 recommendations to the five agencies funding STEM research and DOJ, including to finalize and publish complaint procedures, establish goals and an overall plan for prevention efforts, and fully adopt two collaboration leading practices. The agencies agreed with GAO's recommendations and identified actions they plan to take to address them.", "document_type": "gao"}
{"report": "DOD has reported that more than a decade of conflict, budget uncertainty, and reductions in force structure have degraded military readiness. In response, DOD has made rebuilding the readiness of the military forces a top priority. The 2018 National Defense Strategy states that the central challenge to U.S. prosperity and security is the reemergence of long-term, strategic competition with China and Russia. Further, the strategy stresses that restoring and retaining readiness for large-scale combat is critical to success in this emerging security environment. Nevertheless, DOD reported that readiness of the total military force remains low and has remained so since 2013. In June 2017, we found that Army readiness goals and timelines for rebuilding readiness are not clear for all portions of the force, especially for the reserve component, although the Army is making progress in these areas. Across the department, DOD has made progress in developing a plan to rebuild the readiness of the military force, with the military services providing regular input on the status of their readiness recovery efforts. In August 2018, we reported that the Office of the Secretary of Defense developed a Readiness Recovery Framework that the department is using to guide the services’ efforts, and plans and to regularly assess, validate, and monitor readiness recovery. The Office of the Secretary of Defense and the services have recently revised readiness goals and accompanying recovery strategies, metrics, and milestones to align with the 2018 National Defense Strategy and Defense Planning Guidance. According to The Army Strategy, the Army projects that it will reach its readiness goals by 2022, at which point its priority is expected to shift to modernization. We have ongoing work assessing DOD’s progress in achieving its overall readiness goals in each of five warfighting domains: ground, sea, air, space, and cyberspace. The number one stated goal of Army leadership is readiness, including recovering the readiness lost from years of sustained conflict while preparing for potential large-scale combat operations against a global competitor such as Russia or China. These efforts are occurring in a challenging context that requires DOD to make difficult decisions regarding how best to address continuing operational demands while preparing for future challenges. An important aspect of this, across all of the military services, is determining an appropriate balance between maintaining and upgrading legacy weapon systems currently in operational use, and modernizing to ensure the ability to outpace advancing competitors. Our work has shown that the Army has improved ground force readiness in recent years; however, the Army has also identified capability shortcomings in its weapon systems and platforms that have yet to be addressed through its modernization efforts. In an effort to achieve higher, more consistent levels of readiness over longer time periods, the Army is implementing a redesigned way to generate forces called the sustainable readiness concept. A key part of the concept includes determining readiness objectives by unit type, which are developed by comparing the numbers of key unit types against planned and potential warfighting demands. In addition, since 2014 the Army has invested significantly in stocks of warfighting equipment that are being stored in Europe, and has begun deploying armored formations to the continent on a continuous basis for training and exercises to enhance its readiness against potential Russian aggression. As the Army works to rebuild and sustain higher readiness of its current force, the service is moving to update its doctrine, equipment, and formations to conduct operations in a more complex warfighting environment. The Army believes that it must be able to operate not only on land against potential adversaries, but also have the capability to act against them in other domains, namely air, sea, cyber, and space. The new Army Operating Concept, published in December 2018, describes how the Army would operate in a “multi-domain” environment. It identifies readiness as being key to deterring aggression from potential adversaries and, should conflict occur, addresses how Army forces would operate in multiple domains to penetrate anti-access and area denial systems. To support this concept, the Army’s modernization strategy aims to build the next generation of weapon systems and platforms that are more agile, lethal, resilient, and sustainable on the future battlefield. We have ongoing work reviewing the Army’s efforts to develop its multi-domain operations concept and to field capabilities to support such operations. The Army is growing slightly from a previously-planned size of 980,000 uniformed personnel to just over 1 million personnel. The Army is also adjusting its force structure to address increasing operational risks as it prepares for potential combat operations against a major adversary. However, our work shows that the Army faces challenges in filling and maintaining key skills in a number of areas, and in managing the time Army personnel spend away from their home station. In 2016, we reported that the Army was planning to reduce its end strength from a high of about 1.11 million uniformed personnel in fiscal year 2011 to an end strength of 980,000 by fiscal year 2018. The Army stated that at this level it could execute the National Defense Strategy, but at significant risk. Army leadership testified in March 2015 that if there were further end strength reductions, the Army would not be able to execute the defense strategic guidance. We reported in 2016 that the Army needed to assess the risks associated with the planned reductions and better document its force-planning process. The Army concurred with both of our recommendations, changed the way it assessed risk, and made adjustments to its force structure based on these assessments. After our 2016 report, Congress partly reversed these planned reductions by authorizing end-strength increases in fiscal years 2017 through 2019. The principal increase occurred in 2017, when Congress authorized an end strength of 1.018 million uniformed personnel, or 28,000 more than the Army had planned for that year. The Army’s authorized end strength since 2011, including planned end strength in 2017 and 2018, are summarized in figure 1. Additionally, as we found since our 2016 report was published, the Army has added or plans to add capacity, including converting two infantry brigades into armored brigades and activating two new Mobile Short Range Air Defense battalions by fiscal year 2022, to better prepare the force for large-scale combat against major adversaries. Also, to support combat forces during a conflict, the Army is activating additional combat sustainment formations that are responsible for supply, distribution, and transportation. Our ongoing work has found that over the next few years the Army is building or plans to build several new cyber and electronic warfare units to operate at various levels within the force to make the Army more effective in contested environments. According to the Chief of Staff of the Army, in a January 2019 speech, the Army has used its end strength increases to increase the manning of combat units. The goal of Army leadership is to fill operational units to 100 percent by the end of fiscal year 2019, and 105 percent by the end of fiscal year 2020. However, in preparing this statement we found that, in three of the past four years, the Army has fallen short of meeting its overall end strength authorizations. Army officials told us that these differences from the authorized end strength fall under the Secretary of Defense’s authority to reduce the end strengths by a certain amount. Moreover, these officials added that in 2015 and 2016, the Army was drawing down end strength and planning further reductions. However, the Army fell short of its end strength authorization by 0.38 percent in 2017, and fell short again by 2.56 percent in 2018. The percentage differences between authorized and actual end strength for the total Army, from 2015 through 2018, are summarized in figure 2. As we prepared this statement, Army officials told us that the primary reason why it has struggled to meet its authorized end strength is because it has had difficulty meeting recruiting goals, which have negatively affected the Army’s ability to expand the force. For example, Army officials told us the Army was short of its goal for 2018 by 6,500 new recruits for the regular Army. Army officials told us that the Army does not expect to be able to achieve its authorized end strength for fiscal year 2019. Looking ahead, the Army is considering revisions to its expansion plans and now expects to reach a new end strength goal by 2025. In addition to challenges in meeting authorized end strength, our past and ongoing work indicates that the Army faces challenges in filling and maintaining key skills in a number of areas, and in managing the time Army personnel spend away from their home station. Both of these challenges can negatively affect readiness. For example: Accelerated activation of Security Force Assistance Brigades led to manning challenges. In December 2018, we reported that the Army’s decision to deploy the first security force assistance brigade 8 months earlier than planned posed challenges to manning the unit. The Army currently plans to activate up to six of these brigades (one in the U.S. Army National Guard) by the end of fiscal year 2019. The Army views the Security Force Assistance Brigades to be critical to restoring the readiness of its combat forces. Prior to their formation, the Army met security force assistance missions by, among other things, pulling senior leaders and other personnel with specific ranks and skills from active-duty brigades, which compromised their readiness for large-scale combat. The Army has had difficulty filling new cyber and electronic warfare units. During our ongoing work, we have found that the Army has had difficulty filling new formations with personnel to conduct operations in the cyber domain, including electronic warfare. In October 2018, the Army activated part of a Multi-Domain Task Force, which is focused on intelligence, information, cyber, electronic warfare, and space missions and is being used in major exercises in the Pacific region. However, Army headquarters officials told us that the Army activated the unit as a pilot, or a test, unit and with an accelerated timeline to learn how the new formation should be structured, equipped, and trained. Based on our ongoing work, filling the unit with personnel with the right skills has been a slow process. Near the end of January 2019 the unit was staffed at 50 percent, and the Army projects it will reach 75 percent by August 2019, according to Army headquarters officials. The officials added that many of the shortages are in senior level and cyber positions. Meanwhile, Army documentation obtained during our ongoing work shows that the service is considering options for creating more task forces for other regions. Additionally, there are plans for new cyber and electronic warfare force structure supporting Brigade Combat Teams. Army officials stated that these will be fielded in an accelerated manner as well, adding that filling these units could be challenging because cyber personnel are in high demand. Army headquarters officials said they are exploring options to address the challenges. Army depots have had difficulty filling and maintaining critical skills in their workforces. For our December 2018 report, officials told us that Army depots experienced consistent challenges in hiring critical personnel. Also, we reported that workload fluctuations usually resulted in too little workload to maintain proficiency in certain skills. For example, we reported that a hiring freeze at Corpus Christi Army Depot in 2017 caused shortages of civilian flight test pilots, who are responsible for test flights before returning aircraft to service after maintenance. The Army, however, had not assessed how effective the depots have been at hiring, training, and retaining the critical skills of their workforce. We recommended that the Army do this, as personnel challenges such as these have affected depots’ ability to meet mission requirements and created maintenance delays for some equipment. The Army concurred with our recommendation and stated that it would assess the effectiveness of the depots’ hiring, training, and retention programs to ensure Army requirements are met and critical skills are maintained. The Army has had difficulty manning ballistic missile defense units. As we reported in October 2017, the Army’s Patriot and Terminal High Altitude Area Defense (THAAD) ballistic missile defense forces have been in high demand for many years. Army officials told us at the time that with reductions in end strength, the Army in 2016 stopped its practice of assigning extra personnel to these units to ensure operational requirements would be met. Army officials stated that the high aptitude standards and specialized nature of operating Patriot and THAAD systems reduced the number of eligible recruits. Officials also stated that enlistment shortfalls could have long-term effects on these forces’ operations and career development. Since we issued our report, Army officials told us that fewer-than-expected new recruits had advanced into Patriot and THAAD career fields in 2018, but the Army was forecasting improvements. High personnel tempos can negatively affect personnel. In 2018, we reported that the pace of operations has had a negative effect on Army readiness, including Brigade Combat Teams and Combat Aviation Brigades. We also reported that managing personnel tempo—the amount of time that individual service members spend away from home on official duties—had been a persistent challenge for the Army. In 2015, the Army issued a regulation identifying a personnel tempo threshold for its service members, but officials told us that the threshold is not enforced and stated the regulation was published only to emphasize that personnel tempo data was a priority. We found that personnel tempo data collected by DOD was incomplete. However, we estimated from the data that at least 41 percent of Army service members who were away from their home station in fiscal year 2016 were away for more than 7 months. Because time away from home can stress the force, we recommended that DOD or the Army take steps to clarify and follow personnel tempo guidance on thresholds, and also take steps to emphasize the collection of complete and reliable personnel tempo data to allow monitoring. DOD concurred with both recommendations. The Army is in the process of updating and developing new concepts and equipment to deal with a future environment that will be increasingly lethal, competitive, complex, and dynamic. The Army anticipates that it will have to contend with a resurgent Russia and a rising China, as well as regional challenges from North Korea and Iran. According to the Army, these adversaries have improved their military capabilities, in particular their ability to prevent U.S. forces from massing close to the potential battlefield, thereby eroding advantages that the Army has enjoyed for decades. Once deployed, the Army stated it expects that its forces will be constantly under surveillance and potentially under attack. To counter the adversaries’ threats, the Army is focusing on updating warfighting concepts and modernizing the force. In December 2018, the Army published a new Army Operating Concept that is specifically designed to deter and defeat China and Russia, and addresses large- scale ground combat. The concept emphasizes that the Army must demonstrate its readiness to conduct multi-domain operations—such as ground, air, and cyber—as a key part of deterring adversaries from escalation. To support its readiness for future missions in this complex environment, the Army has begun to update or upgrade multiple weapon systems. In April 2018, the Army published its Army Modernization Strategy, which identified six priorities that are key to operationalizing multi-domain operations, including long-range precision fires and next generation combat vehicles, as shown in table 1. All six of these priorities involve modernizing equipment and/or acquiring new equipment with improved capabilities. The Army has identified the need to make changes to how it develops and acquires new weapons systems. To that end, the Army established the Army Futures Command to provide unity of command, accountability, and modernization at the speed and scale required to prevail in future conflicts. Our prior work has found that the Army has faced challenges with managing maintenance efforts and developing requirements for future weapon systems. Some of the challenges include the following: The Army lacks an implementation plan to guide its retrograde and reset activities, which could lead to inconsistent reset efforts. As we reported in May 2016, officials from different Army entities disagreed about which documents constituted their guidance for implementing retrograde and reset, suggesting that there was confusion about the Army’s strategies for these activities. We recommended that the Army develop an implementation plan for its retrograde and reset efforts. In August 2018, however, we reported that the Army did not have plans to act on this recommendation. According to one official, this was because guidance and plans are adjusted based on the unique circumstances of each situation. Given the Army’s drawdown of equipment used during operations in Iraq and Afghanistan is coming to a close, we continue to believe that an implementation plan for retrograde and reset of equipment used during any future operations would help ensure that the Army more consistently and effectively budgets for and distributes resources. The Army has not comprehensively assessed the causes of reset maintenance delays for Patriot equipment, which can limit unit training time. In June 2018, we reported that of seven Patriot battalions undergoing reset in fiscal years 2014 through 2017, only one received all of its equipment back from depot maintenance within the Army’s policy of 180 days, as shown in figure 3. Since delays in returning equipment to units can reduce units’ training time, we recommended that the Army analyze the various factors affecting reset delays—such as equipment arriving late to the depot, supply chain delays, and worker errors—to identify their relative importance and inform corrective actions. The Army concurred with our recommendation, stating that it will identify and address factors that may affect reset timeliness. The Army’s near-term modernization efforts face management challenges. In September 2018, we reported that the Army had not established processes for evaluating its modernization efforts against its overarching objective of outpacing rapidly advancing competitors, such as Russia or China. Also, we found that the Army had not fully estimated the costs of its near-term modernization efforts. Further, we found that the Army’s April 2018 modernization strategy report set near-term goals for closing critical capability gaps and a longer term, overarching objective of being able to decisively defeat major adversaries. The strategy also identified the cost of key modernization investments through fiscal year 2023, but did not discuss tens of billions in already-programmed modernization-related investments, or describe how the funding would support upgrades for existing weapon systems. Moreover, the strategy did not disclose the extent to which the Army had relied on Overseas Contingency Operations (OCO) appropriations for upgrading weapon systems. Army officials told us at the time that the Army had been preparing to analyze its efforts to address specific warfighting capability gaps, but had not decided on an overall evaluation approach. Additionally, officials told us that the Army planned to reflect its analysis of near-term modernization investments in the fiscal year 2020 budget submission. We recommended that the Army (1) develop a plan to finalize the processes for evaluating how its near-term investments contribute to the Army’s ability to decisively defeat a major adversary, and (2) finalize its cost analysis of near-term investments and report those costs to Congress. The Army concurred with our recommendations. The Army has been unable to ensure that requirements for new warfighting capabilities are feasible. In June 2017, we reported that the Army had prioritized combat readiness and rebuilding force structure over resourcing its requirements development process to meet future readiness needs. We reported that even though the Army made some improvements in this area, officials were unable to ensure requirements for major defense acquisition programs were well-informed and feasible because of workforce constraints. For example, we found that the Army’s requirements development workforce declined by 22 percent from 2008 to 2017, with some requirements development centers reporting more significant reductions. In that report, we recommended that the Army assess the resources necessary for the requirements development process and determine whether shortfalls can be addressed given other funding priorities. The Army concurred with our recommendation. In 2018, Army officials told us that the Army plans to implement this recommendation once Army Futures Command is fully operational and key Army development entities are reorganized under its command. The Army has not fully applied leading practices for technology development in its modernization efforts. We reported in January 2019 that while the Army has generally applied leading practices identified by GAO to its modernization efforts, it may be beginning weapon systems development at a lower level of maturity than what leading practices recommend. As we concluded in that report, establishing Army Futures Command creates unique opportunities for the Army to improve its modernization efforts. However, proceeding into weapon systems development before technology is sufficiently mature raises the risk that the resulting systems could experience cost increases, delivery delays, or failure to deliver desired capabilities. The Army concurred with our four recommendations to apply leading practices and lessons learned as it moves forward with its modernization efforts. In its response to our January 2019 report, the Army stated that it would conduct operational technology demonstrations and was exploring a train-the-trainer program, among other actions. Our prior work has shown that the Army has made progress in preparing the force for large-scale combat operations by increasing training exercises and reducing mandatory training requirements. It also has addressed past issues we reported on, including making better use of virtual training devices and accounting for the training needs of supporting units in its Pacific Pathways exercises. Moreover, our prior and ongoing work has shown that the Army faces implementation challenges in training new units that the Army plans to field on shortened schedules. Army units are receiving more frequent training for large-scale combat. Our prior work has shown that the Army has made progress in preparing the force for large-scale combat by increasing training exercises. After a decade of focusing its training on counterinsurgency operations, the Army assessed that opportunities to train thousands of company commanders, field-grade officers, and battalion commanders on tasks related to large-scale combat were lost. However, in August 2016, we reported that the Army increased the number of brigades that had completed a decisive-action exercise from one brigade combat team in fiscal year 2011 to 14 brigade combat teams in fiscal year 2015, while at the same time decreasing training for counterinsurgency. We noted in a September 2016 report that a key part of the Army’s plan to rebuild readiness was to ensure that soldiers have repeated training experience on their core competencies. Since we completed our work, the Army is funding up to 26 brigade combat teams to go through a decisive-action training event at its combat training centers in fiscal year 2019. Mandatory training and directed tasks have been reduced. In August 2016, we also reported that the Army had determined that mandatory training requirements and directed tasks were too numerous and were creating challenges for commanders in balancing their units’ training time with these other requirements. Additionally, we identified steps the Army had taken to make these requirements less burdensome. We reported, for example, that the Army had delegated authority to two-star commanders to exempt units, as needed, from certain mandatory training. We reported that the Army had begun to lock in a unit’s planned training six weeks in advance, in an effort to protect units from external tasks that could affect training schedules of brigades and their subordinate units. The early setting of training schedules was intended to prevent an external task from interfering with that training. We did not make any recommendations related to reducing mandatory training; however; since we completed our work, the Secretary of the Army has directed the elimination of numerous individual training requirements, such as eliminating certain requirements to train in avoiding accidents, and other administrative tasks, such as maintaining a physical reference library of corrosion prevention and control publications. The Army is making better use of virtual devices to train and prepare units. In the same 2016 report, we identified a number of challenges the Army faced in using virtual training devices to help units prepare for major conflict. Using such devices is important because of the challenges of training for combat in a live environment, such as limited range availability and resource constraints. We reported that the Army had taken some steps to improve the integration of virtual training devices into its operational training. However, our work identified several factors that limited the Army’s ability to conduct training with virtual training devices, including outdated virtual training policies, a lack of guidance for analyzing the effectiveness of virtual training devices, and the need to better integrate devices in training strategies. As of January 2019, the Army has implemented two of the three recommendations we made in our report. Specifically, the Army published a training analysis best- practices guide, analyzed virtual training devices’ effectiveness, and analyzed regular Army formations’ readiness training models, among other steps to implement these recommendations. Additionally, the Army further plans to modify its policy on virtual training devices in 2021, which would require that training developers consider the amount of time available to train with or expected usage rates of new virtual training devices. Further, in preparing this statement, Army officials told us that the Army has used acquisition authorities provided by Congress to prototype new technologies to replace existing simulators. It is investing in these prototypes based on the usage rates of the older training equipment, and at the same time involving operational forces in the prototyping for their feedback and to help inform requirements. The Army is taking some steps to improve its Pacific Pathways initiative. In November 2016, we reported on an initiative, known as Pacific Pathways, intended to strengthen relationships with allies and build readiness by combining certain exercises with partner nations. The Army began the Pacific Pathways initiative—which deploys a battalion-size task force to the Asia-Pacific region to conduct multiple exercises over 90 days—as a way of building the readiness of its participating units. We found that the size and complexity of the operations under Pacific Pathways created potentially unique training opportunities for supporting units—such as transportation units—to exercise the capabilities they would be required to provide in a contingency. However, we found that the Army could improve its approach by fully synchronizing Army plans, stakeholders, and objectives into the exercises. The Army has implemented two of the recommendations that we made in our report to modify processes and guidance so that stakeholders are integrated into the planning, and also to seek and incorporate the training objectives of supporting units. U.S. Army Pacific officials have stated that they do not plan to implement the recommendation to perform a cost-benefit analysis of Pacific Pathways because it is not required. Our prior and ongoing work has identified some challenges that the Army faces in training personnel in particular specialties, especially as it stands up new units on shortened schedules. These include: A lack of training facilities and airspace creates challenges for UAS pilot training and further steps could be taken to enhance pilot candidate selection. In January 2017, we reported that the Army’s UAS pilot training strategy did not account for some challenges the Army faced, such as a lack of adequate training facilities and limited available airspace. The Army used flexibilities to overcome some of these challenges, but at the time of our report it was too early to tell whether these flexibilities would be enough to overcome training shortfalls. In addition, we found that the way the Army assessed whether service members were good candidates for UAS pilot training could have been improved. For example, we reported that the Army used only 3 of the 78 identified competencies that an Army-Air Force research team identified as “moderately,” “highly,” or “extremely important” for UAS pilots. We made recommendations on these issues, and DOD partially concurred, stating that although the actions we recommended were prudent or already an integral part of workforce management, additional Army guidance would be unnecessary. Fielding and deploying new types of units can pose challenges to training. The accelerated pace at which the Army is creating new units can pose challenges to training and readiness. As previously discussed, the Army is activating new units to sustain readiness and to operate in a more complex environment. However, the Army’s approach can pose training challenges, and negatively affect readiness. Also, our ongoing work indicates that the Army is fielding new cyber units at an accelerated pace, resulting in the units not having either fully trained personnel or the equipment to conduct training, according to Army officials. For example, the Army is planning to add uniformed personnel who specialize in cyber operations to its combat units and as part of newly established Multi- Domain Task Forces, but there is not yet a clear understanding of the tasks they will have to perform or an updated training strategy to support them, according to Army officials. Army officials stated that this will affect the readiness of the units to perform their missions, but they are taking steps to clarify and update these issues. - - - - - In sum, while the Army has made progress in rebuilding readiness, it continues to face challenges meeting its goals. Moreover, the Army will need to balance the readiness of its existing force with plans to grow and modernize. We have made 44 recommendations that the Army has generally concurred with; the Army has implemented 7 of them, and taken actions to begin implementing many others. These recommendations provide a partial roadmap to address important readiness challenges, and implementing our recommendations to improve the management of personnel, equipment maintenance, and training would help the Army meet current threats and assist it as it refocuses on readiness for large- scale combat operations. In addition, sustained management attention and continued congressional oversight will be needed to ensure that the Army demonstrates progress in addressing its personnel, equipment, and training challenges. Chairman Sullivan, Ranking Member Kaine, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have questions about this testimony, please contact John H. Pendleton, Director, Defense Capabilities and Management at (202) 512-3489 or pendletonj@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kevin O’Neill (Assistant Director), Matthew Spiers (Analyst In Charge), Steven Bagley, Rebecca Beale, Cynthia Grant, Kris Keener, Alberto Leff, Amie Lesser, Jon R. Ludwigson, Shahrzad Nikoo, Marcus Oliver, Richard Powelson, James A. Reynolds, Cary Russell, Michael Silver, Matthew Ullengren, Nicole Volchko, Erik Wilkins-McKee, Matthew Young, and Delia Zee. Over the past 4 years, we issued several reports related to Army readiness that are cited in this statement. Table 2 summarizes the status of key GAO recommendations related to Army and DOD components in coordination with the Army since 2016, which include a total of 44 recommendations. The Department of Defense has implemented 7 of these recommendations to date. For each of the reports, the specific recommendations and their implementation status are summarized in tables 3 through 19. Army Modernization: Steps Needed to Ensure Army Futures Command Fully Applies Leading Practices, GAO-19-132. Washington, D.C.: January 23, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiative to Maintain Critical Skills [Reissued with revisions on December 26, 2018.], GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention, GAO-19-225T. Washington, D.C.: December 12, 2018. Air Force Readiness: Actions Needed to Rebuild Readiness and Prepare for the Future, GAO-19-120T. Washington, D.C.: October 10, 2018. Army Modernization: Actions Needed to Measure Progress and to Fully Identify Near-Term Costs, GAO-18-604SU. Washington, D.C.: September 28, 2018. Military Readiness: Analysis of Maintenance Delays Needed to Improve Availability of Patriot Equipment for Training, GAO-18-447. Washington, D.C.: June 20, 2018. Military Readiness: Clear Policy and Reliable Data Would Help DOD Better Manage Service Members’ Time Away from Home, GAO-18-253. Washington, D.C.: April 25, 2018. European Reassurance Initiative: DOD Needs to Prioritize Posture Initiatives and Plan for and Report their Future Cost, GAO-18-128. Washington, D.C.: December 8, 2017. Military Readiness: Personnel Shortfalls and Persistent Operational Demands Strain Army Missile Defense Units and Personnel, GAO-18-168SU. Washington, D.C.: October 5, 2017. Army Weapon Systems Requirements: Need to Address Workforce Shortfalls to Make Necessary Improvements, GAO-17-568. Washington, D.C.: June 22, 2017. Supply Chain Management: DOD Could More Efficiently Use Its Distribution Centers, GAO-17-449. Washington, D.C.: June 21, 2017. Army Readiness: Progress Made Implementing New Concept, but Actions Needed to Improve Results, GAO-17-458SU. Washington, D.C.: June 8, 2017. Unmanned Aerial Systems: Air Force and Army Should Improve Strategic Human Capital Planning for Pilot Workforces, GAO-17-53. Washington, D.C.: January 31, 2017. Comprehensive Assessment and Planning Needed to Capture Benefits Relative to Costs and Enhance Value for Participating Units [Reissued on November 30, 2016], GAO-17-126. Washington, D.C.: November 14, 2016. Military Readiness: DOD’s Readiness Rebuilding Efforts May Be at Risk without a Comprehensive Plan, GAO-16-841. Washington, D.C.: September 7, 2016. Patriot Modernization: Oversight Mechanism Needed to Track Progress and Provide Accountability, GAO-16-488. Washington, D.C.: August 25, 2016. Army Training: Efforts to Adjust Training Requirements Should Consider the Use of Virtual Training Devices, GAO-16-636. Washington, D.C.: August 16, 2016. Military Readiness: DOD Needs to Incorporate Elements of a Strategic Management Planning Framework into Retrograde and Reset Guidance, GAO-16-414. Washington, D.C.: May 13, 2016. Army Planning: Comprehensive Risk Assessment Needed for Planned Changes to the Army’s Force Structure, GAO-16-327. Washington, D.C.: April 13, 2016. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The 2018 National Defense Strategy emphasizes that restoring and retaining readiness across the entire spectrum of conflict is critical to success in the emerging security environment. The top priority for Army leadership is readiness. The Army has undertaken a variety of efforts since 2016 to prepare for potential large-scale combat operations against major adversaries. This statement provides information on the Army's progress and challenges in readiness rebuilding in the areas of (1) force structure and personnel, (2) equipment repair and modernization, and (3) training for potential large-scale conflict. Also, GAO summarizes recommendations to address these challenges and actions taken by the Army to address them. This statement is based on previously published GAO work since 2016. This prior work related to, among other things, Army readiness, skills shortages, equipment maintenance and modernization, acquisition, training, force structure. GAO also updated information and incorporated preliminary observations from ongoing work related to warfighting concepts. In GAO's prior and ongoing work, GAO found that the Army has made progress in rebuilding readiness and projects that it will reach its readiness goals by 2022. While the Army continues to make progress, it faces challenges in staffing its evolving force structure, repairing and modernizing its equipment, and training its forces for potential large-scale conflicts (see table). Looking to the future, the Army plans to grow its forces, provide them with modernized equipment, and train units to conduct large-scale, decisive-action operations. All of these efforts are underway as the Army contemplates the implications of future warfare—which it reports is likely to require operations in multiple domains, especially cyber. As a result, it is important for the Army to balance its efforts to rebuild and sustain the operational readiness of its existing force with its preparations for future threats. GAO has made 44 recommendations in prior unclassified work described in this statement. DOD and the Army have generally concurred with them, have implemented seven, and have actions underway to address others. Continued attention to these recommendations can assist and guide the Army moving forward as it seeks to rebuild the readiness of its force and transforms for the future.", "document_type": "gao"}
{"report": "GSA’s existing government-wide telecommunications program is called Networx. As part of this program, in 2007 GSA awarded two sets of Networx contracts—called Networx Universal and Networx Enterprise— which had an estimated combined value of $20 billion. These contracts provide similar services, such as voice and data services, wireless services, video and audio conferencing, as well as mobile and fixed satellite services. One differing characteristic between the contracts is that Networx Enterprise contracts have a focus on internet-based services. The Networx Enterprise contracts also require telecommunications services to be available in a smaller geographic area than Networx Universal. Networx Universal contracts were set to expire in March 2017 and Networx Enterprise contracts were set to expire in May 2017; however, GSA has twice extended these Networx contracts. According to GSA officials, the most recent extension, which GSA announced in November 2018, is to include one base year and two 1-year options, plus an additional option for the number of months required for the contracts to reach May 31, 2023. If the extension is executed and all options are exercised, the Networx contracts will expire in May 2023. In addition, GSA provides telecommunications services through programs called Washington Interagency Telecommunications System 3 and Regional Local Service Agreements: Washington Interagency Telecommunications System 3: These contracts support a variety of telecommunications services available to all federal agencies in Washington, D.C., and surrounding Maryland and Virginia counties. For example, among other things, these contracts provide data and voice services, as well as cloud services. These contracts were set to expire on or before May 2020. As of December 2019, GSA planned to extend these contracts. GSA officials stated that the extension is to include one base year and two 1-year options, plus an additional option for the number of months required for the contracts to reach May 31, 2023. If the extension is executed and all options are exercised, the contracts will expire in May 2023. Regional Local Service Agreements: These contracts provide local telecommunications services in every state and major city in the United States. According to GSA officials, the expiration dates for these contracts ranged from October 2019 through March 2023. As of December 2019, GSA was in the process of extending these contracts. Specifically, GSA officials reported that certain contracts had already been extended to May 2023, and the officials planned to extend the remaining contracts through May 2023, as well. According to data provided by GSA officials, in fiscal year 2019, federal agencies spent approximately $2.5 billion on services acquired through Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements contracts. About $2 billion of this spending was on services acquired through Networx alone. GSA’s EIS program is the replacement for the agency’s Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements telecommunications contracts. GSA intends for EIS to address federal agencies’ global telecommunications and IT infrastructure requirements. GSA plans for EIS to provide agencies with traditional and emerging services to meet current and future requirements by, among other things: simplifying the government’s process of acquiring IT and telecommunications products and services; providing cost savings to each agency through aggregated volume buying and pricing (with generally lower costs for services on EIS compared to the costs for similar services on Networx), and spending visibility; and providing updated and expanded security services to meet current and future government cybersecurity requirements. In addition, GSA has identified several benefits that EIS is expected to provide to the agencies that participate in its telecommunications programs. These projected benefits include streamlined contract administration, a possible 15-year period of performance, simplified pricing, and enhanced management and operations support. On August 1, 2017, GSA announced that it had awarded EIS contracts to 10 vendors. These contracts have a combined value of up to $50 billion and are for a possible period of up to 15 years (one 5-year base period and two 5-year option periods). According to GSA’s plans as of November 2019, the transition to EIS is expected to be completed by May 2023, when the current Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements telecommunications contracts are expected to expire (if all contract options are exercised, as discussed earlier). To help ensure that agencies’ services are fully transitioned to EIS before the current contracts expire, GSA issued guidance that identified several critical milestones that agencies should meet. These milestones include: (1) releasing all planned fair opportunity solicitations to EIS vendors by March 31, 2019; (2) issuing all planned task orders by September 30, 2019; and (3) achieving 100 percent transition of services by September 30, 2022. Figure 1 provides a timeline of the planned transition to EIS, including GSA’s critical milestones, as of November 2019. Central to the successful transition from GSA’s current telecommunications services contracts to EIS are transition planning and execution activities that involve GSA, federal agencies, the incumbent telecommunications contractors, and EIS contractors. GSA serves as the facilitator for all transition management activities. The agency is using contractors to assist in tracking transition activities, in order to avoid delays and other problems that can arise throughout the process. In particular, GSA’s primary responsibility is to provide program management for the current telecommunications programs (Networx, Washington Interagency Telecommunications System 3, and Regional Local Service Agreements) and EIS. As part of this, GSA is responsible for conducting government-wide strategy and project management; providing tailored assistance to agencies for transition planning and help with contractor selection and ordering; tracking and reporting the use of metrics that convey the relative complexity and transition progress; and providing customer support, training, and self-help tools and templates. GSA developed two contracting vehicles to provide transition assistance to agencies: (1) a Transition Coordination Center vehicle that includes assistance with inventory validation, transition planning, and solicitation development; and (2) a Transition Ordering Assistance vehicle that addresses tasks including requirements development and source selection assistance, and proposal evaluation. The Coordination Center vehicle was put in place in January 2016 and the Ordering Assistance vehicle was initially awarded in September 2016, but was not finalized until March 2017, after the conclusion of a bid protest. Agencies have principal responsibility for the transition. They are responsible for coordinating transition efforts with the incumbent contractors and EIS contractors to ensure that existing telecommunications services are disconnected and that new services are ordered under EIS. According to GSA, agencies’ responsibilities under EIS include, among other things: identifying key personnel, chiefly a Senior Transition Sponsor, Lead Transition Manager, and Transition Ordering Contracting Officer; engaging expertise from Chief Information Officers, Chief Acquisition Officers, and Chief Financial Officers to build an integrated transition team of telecommunications managers, acquisition experts, and financial staff; analyzing and confirming the accuracy of the inventory of active services that must be transitioned; developing a transition plan that describes technological goals, a transition schedule that includes GSA’s major transition milestones (e.g., releasing all fair opportunity solicitations by March 31, 2019, and issuing all task orders by September 30, 2019), strategy for issuing task orders on EIS, and any constraints or risks; preparing solicitations for task orders; placing task and service orders; and reviewing, accepting or rejecting, and paying for services. At the agencies we reviewed, the staff responsible for the transition were part of their agencies’ offices that were headed by the Chief Information Officers. Finally, the incumbent and EIS contractors are responsible for disconnecting existing services under the current contracts and installing new services that agencies order under EIS. They are also to collaborate with GSA and agencies to (1) share transition planning and execution best practices and (2) help resolve issues. We have previously reported on efforts by GSA and agencies to transition from one telecommunications program to another. In a June 2006 report, we identified a range of transition planning practices that can help agencies reduce the risk of experiencing adverse effects of moving from one broad telecommunications contract to another. These planning practices were to: (1) develop an accurate inventory of telecommunications assets and services, (2) perform a strategic analysis of telecommunications requirements, (3) develop a structured transition management approach, (4) identify the resources needed for the transition, and (5) develop a transition plan. Since that June 2006 report, we have reported multiple times on the extent to which selected agencies were following the transition planning practices. We have generally found that the selected agencies in our reviews had not fully implemented some of the key activities of the practices. For example, in 2008, we noted that one agency was not planning to clearly define all key transition roles and responsibilities and another agency was not planning to identify local and regional points of contact. In addition, in 2017, we reported that, among other things, the five agencies we selected had yet to fully apply most of the five planning practices. In each of our reports we made recommendations to the selected agencies focused on addressing the gaps in transition planning. All five agencies in our 2017 review undertook efforts to address our recommendations, but had not yet fully implemented them as of November 2019. Based on our ongoing work, our preliminary results indicated that the 19 selected agencies have varied plans for transitioning from their current telecommunications contracts to EIS program contracts. As of October 2019, these agencies were also in different stages of their EIS transitions. All of the selected agencies reported that they plan to fully transition their telecommunications services to EIS before the current contracts are set to expire in May 2023. However, over half of the selected agencies did not plan to complete the transition by GSA’s September 30, 2022, milestone. In addition, the majority of selected agencies did not meet GSA’s two critical EIS transition milestones in 2019—to (1) release all fair opportunity solicitations by March 31, 2019, and (2) issue all task orders by September 30, 2019. As of November 2019, the 19 selected agencies had various plans for completing their transitions to EIS. Specifically, Eight of the selected agencies reported that they planned to finish their transitions to EIS by GSA’s September 30, 2022, milestone. The 11 remaining agencies did not plan to complete their transitions by that date. Officials from the 11 agencies that did not plan to finish their transitions to EIS by GSA’s September 30, 2022, milestone reported that they planned to complete the transitions before the current telecommunications contracts are set to expire in May 2023. However, four of these 11 agencies planned to complete their transitions in May 2023, just before the current telecommunications contracts are set to expire. In addition, the planned scope and amount of effort that is expected to be required to fully transition to EIS varied among the selected agencies. Specifically, agencies varied in the scope of their planned efforts related to two of GSA’s critical transition milestones—to release EIS fair opportunity solicitations and issue EIS task orders: One selected agency planned to release 54 EIS fair opportunity solicitations. The eighteen other selected agencies planned to release between one and six solicitations. Six agencies planned to issue more than five task orders. The other thirteen agencies planned to issue between one and five EIS task orders. Further, the selected agencies had different plans for the types of transitions that they would implement. Specifically, Four of the selected agencies planned to implement primarily a like- for-like transition of their services. The remaining 15 agencies planned to conduct a combination of a like-for-like transition and upgrading or transforming services. As of October 2019, the 19 selected agencies were in different stages of their EIS transitions. Eighteen of the agencies were in the acquisition planning and/or acquisition decision phases, during which the agencies release fair opportunity solicitations for vendor proposals and issue task orders to selected vendors, respectively. GSA established two critical milestones for agencies to complete these acquisition activities: (1) release all fair opportunity solicitations by March 31, 2019, and (2) issue all task orders by September 30, 2019. Regarding the first milestone—to release all EIS fair opportunity solicitations by March 31, 2019: Five of the 19 selected agencies reported that they released all of their solicitations by this date. The 14 remaining selected agencies reported that they did not release all of their solicitations by this date. Officials from each of the five agencies that met GSA’s milestone to finish releasing all of their planned EIS solicitations by March 31, 2019, reported that their agencies released either one or two solicitations. We asked officials from the 14 selected agencies that did not release all of their planned EIS solicitations by March 31, 2019, to identify the key factors that contributed to their agencies’ delays in releasing these solicitations. In response, agency officials cited numerous key factors for the delays, including the complexity of their telecommunications requirements, changes to the agency’s or GSA’s contracting strategy, and insufficient staff availability. Figure 2 identifies the key factors that contributed to delays in releasing all EIS solicitations by GSA’s March 31, 2019, milestone, as identified by agency officials. In addition, regarding GSA’s second milestone—to issue all EIS task orders by September 30, 2019—one of the selected agencies reported that it issued all of its task orders by this date. The 18 other agencies reported that they did not issue all of their EIS task orders by this date. We asked officials from the 18 agencies that did not issue all of their EIS task orders by September 30, 2019, to identify the key factors that contributed to their agencies’ delays in issuing these task orders. In response, agency officials cited 19 key factors that led to the delays. Nine of the identified factors were the same factors that officials cited for their agencies’ delays in releasing EIS solicitations, including the complexity of requirements and having insufficient staff available. The officials also identified 10 other factors unique to their delays in issuing EIS task orders. For example, officials from two agencies reported that the EIS vendors needed clarification on the agencies’ requests for proposals. In addition, officials from three agencies reported that they needed clarification from the EIS vendors on the proposals that the agencies received. Figure 3 identifies the key factors that contributed to delays in issuing all EIS task orders by GSA’s September 30, 2019, milestone, as identified by agency officials. Several of the identified factors, such as the partial government shutdown and the need for vendors to receive authorities to operate, have subsequently been resolved. For other factors, agencies can leverage GSA’s available EIS training and customer support to help minimize delays in meeting GSA’s transition milestones. Nevertheless, given that the majority of the selected agencies did not meet these transition milestones in 2019, it will be important for agencies to meet the remaining transition milestones to ensure that they complete the transition before the current telecommunications contracts expire in May 2023. In a June 2006 report, we identified five transition planning practices that can help agencies reduce the risk of experiencing adverse effects of moving from one broad telecommunications contract to another. Implementing these transition planning practices represents a comprehensive and rigorous management approach that can help agencies make the most of the opportunity for change that such a major telecommunications transition provides. Each of the five transition planning practices that we identified consists of various activities that should be implemented to fully address the planning practices. Table 1 identifies the five established transition planning practices and their associated activities. Based on our ongoing work, our preliminary results indicated that all five selected agencies had taken steps to implement the five established transition planning practices. However, consistent with our prior reviews of selected agencies’ efforts to implement these planning practices, none of the selected agencies had fully implemented any of the practices. The five selected agencies had all partially implemented the first established transition planning practice—to develop an accurate inventory of telecommunications assets and services. In particular, all of the selected agencies had partially implemented the two activities associated with this practice. Table 2 summarizes the extent to which the selected agencies had implemented the transition practice to develop an accurate inventory of telecommunications services. Identify a complete telecommunications inventory at every site, facility, and component. The five selected agencies had all partially implemented this activity. While all of these agencies had developed inventories of their telecommunications assets and services, none of the inventories were complete. Establish a documented process for updating and maintaining the inventories. All five selected agencies partially implemented this activity by taking steps to document their inventory update and maintenance processes. However, none of the agencies had fully documented these processes. Agency officials cited various reasons for partially implementing this first planning practice. For example, officials from three of the selected agencies—all of whom were responsible for their agencies’ transitions to EIS—stated that they did not track all of the assets and services ordered by the agencies. The officials added that they were not responsible for maintaining inventories of all of their agencies’ assets and services. Officials from another agency attributed their agency’s lack of a complete telecommunications inventory and associated maintenance procedures to the agency’s decentralized structure. Specifically, the officials stated that the agency’s components were responsible for managing the services that are unique to them. However, the officials stated that the agency did not have a policy that required its components to maintain an inventory of telecommunications assets and services that they acquired independently. Without complete and accurate telecommunications inventories, the selected agencies may be unable to avoid unnecessary transition delays related to an inability to plan for services not identified in the inventory. In addition, without documented processes for maintaining their telecommunications inventories, the agencies may not be able to consistently and accurately incorporate into these inventories any changes made during and after the transition (e.g., adding new services or removing disconnected services), thus hindering their ability to ensure that they are billed appropriately by the vendor. All of the selected agencies had partially implemented the second established transition planning practice—to perform a strategic analysis of telecommunications requirements. In particular, at least four agencies had partially, but not fully, implemented two of the four activities associated with this practice. For the other two activities, at least one agency had partially implemented each activity. Table 3 summarizes the extent to which the selected agencies had conducted strategic analyses of their telecommunications requirements. Identify current and future telecommunications needs using an inventory of existing services. All of the selected agencies had partially implemented this activity by identifying certain current and future telecommunications needs. However, as discussed earlier, none of the agencies had a complete inventory of current services. As a result, the agencies could not use such an inventory to fully identify their needs. Identify areas for optimization or sharing of telecommunications and IT resources. Three agencies had fully implemented this activity by completing strategic analyses to identify areas for optimization or sharing of telecommunications resources. The two remaining agencies had partially implemented this activity. For example, one of the two agencies had developed a draft analysis to justify the potential optimization and sharing across the agency of a telecommunications service for how hardware devices connect to the internet, but it had not yet finalized this analysis. Officials from the other agency had identified potential areas for the sharing of resources across the agency. However, the agency did not provide a documented analysis to justify the sharing of those resources. Evaluate the costs and benefits of any new technology and alternative options. Four agencies had fully implemented this activity by evaluating the costs and benefits of various technologies and alternative options for telecommunications services that they could implement as part of the transition. The one remaining agency had partially implemented this activity by evaluating the costs and benefits of upgrading one service by which hardware devices connect to the internet. While two of this agency’s components had also analyzed the costs and benefits of implementing another type of service for connecting to networks, the agency’s remaining components had not conducted such analyses. Determine that identified telecommunications needs and opportunities are aligned with the agency’s mission, long-term IT plans, and enterprise architecture plans. One agency had fully implemented this activity by determining that its telecommunications needs aligned with its mission and plans. The four remaining agencies partially implemented this activity and did not demonstrate that they had fully aligned their telecommunications needs with their agency’s mission, long-term IT plans, or enterprise architecture plans. Agency officials cited several reasons for not fully implementing the activities associated with this practice. For example, officials from one agency explained that they had not conducted and documented an analysis to identify areas for the sharing of telecommunications resources because they did not believe that there were any additional agency telecommunications resources that could be shared. The officials attributed this to the agency’s security requirements and regulations, and noted that services on the agency’s classified network may not be shared with services on its unclassified network. However, the agency did not provide documentation that demonstrated that it had determined that there were no additional resources that could be shared on its unclassified network. Officials from another agency stated that they thought their telecommunications needs were aligned with the agency’s long-term IT plans. However, the officials did not provide documentation demonstrating this alignment. Agencies that do not use complete inventories of their current telecommunications services to identify their future needs are likely not fully identifying these needs. They may also miss out on opportunities to optimize or share services by consolidating them on EIS. In addition, without aligning their telecommunications needs and opportunities with their missions and plans, agencies risk missing opportunities to use the new contract to address their highest priorities, or may make decisions that are not aligned with their long-term goals. All of the selected agencies had partially implemented the third transition planning practice—to develop a structured management approach for the telecommunications transition. Specifically, four of the agencies had partially, but not fully, implemented two of the three activities associated with this practice. Three agencies had partially implemented the other activity. Table 4 summarizes the extent to which the selected agencies had established a structured management approach. Establish a transition management team and clearly define responsibilities for key transition roles. One agency had fully implemented this activity by establishing a transition management team and defining all key transition responsibilities for the planning and execution phases of the transition, including for project, asset, human capital, and information security management; and contract and legal expertise. The remaining four agencies had partially implemented this activity by establishing transition management teams, but none of these agencies had defined all key roles and responsibilities for their transitions. Develop transition communications plans in order to facilitate information sharing during transition planning and execution. Two agencies had fully implemented this activity by developing transition communications plans and identifying all key parties that need to be involved during the agency’s transition effort. The remaining three agencies partially implemented this activity by identifying stakeholders responsible for communicating transition information to other stakeholders. However, these three agencies had not identified the key local and regional agency transition officials responsible for disseminating information about the transition to employees and working with the vendor to facilitate transition activities. Use established project, configuration, and change management processes in the agency’s transition planning efforts. One agency had fully implemented this activity by demonstrating the use of all established management processes called for in the activity. The four remaining agencies had partially implemented this activity by demonstrating the use of project management processes for their transitions, such as tracking transition costs and developing schedules and risk logs. However, one of these four agencies did not demonstrate that it was applying approved cost and schedule management processes to its transition. The three remaining agencies did not demonstrate that they were applying established configuration management processes to their transitions, and two of the three also did not demonstrate that they had implemented change management processes for their transitions. Officials from the selected agencies generally attributed their lack of full implementation of this practice to the fact that, at the time of our review, the agencies were early in their transition planning processes. For example, officials from one agency stated that they had not defined a role or responsibilities related to human capital management because their human capital needs for the transition will depend on the vendors selected (at the time of our review, the agency had not yet selected all of the vendors for its EIS task orders). Officials from another agency also explained that they planned to work with their selected EIS vendors to implement all of the key management processes for the transition. While the selected agencies were early in their transition planning processes at the time of our review, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information that is available. Agencies that do not define all key roles and related responsibilities for their transition management teams risk extending their transition period as they attempt to assign appropriate personnel and update them on transition progress and issues. Further, without identifying all of the key officials that need to be involved with the transition, including the local and regional agency points of contact, agencies may lack the information that is necessary for comprehensive understanding, accountability, and shared expectations among all those with transition responsibilities. All of the selected agencies had partially implemented the fourth established transition planning practice—to identify their transition resource needs. In particular, all of the agencies had partially implemented three of the four activities associated with this practice. For the remaining activity, four of the agencies had partially implemented it and one agency had fully implemented it. Table 5 summarizes the extent to which the selected agencies had identified their transition resource needs. Identify the level of funding needed to support transition planning. One of the selected agencies had fully implemented this activity by identifying the costs needed to support its transition management team and all years of its transition planning efforts. The four other agencies partially implemented this activity by developing partial cost estimates for the transition, but none of these estimates were complete. Identify the organizational need for investments and justify resource requests. The five selected agencies had all partially implemented this activity by identifying the need for investments, including funding to obtain GSA transition assistance; however, none of the agencies had fully justified their resource requests for the transition. For example, four agencies had not justified their resource requests related to transition program management staff and one agency lacked justification for its requests for hardware and software upgrades. Identify human capital needs for the entire transition effort. All of the selected agencies had partially implemented this activity by identifying the need for certain staff to work on the transition, including government and contractor staff. However, none of the agencies had conducted and documented analyses of their human capital needs, to determine the total number of staff required to support their entire transition efforts. Identify and require training for the transition. All of the agencies had partially implemented this activity by identifying training needed by certain transition management staff. However, four agencies had not conducted and documented analyses to identify all of the training needed for their transitions, including training for staff carrying out the transition or operating and maintaining new equipment or services. The final agency had developed a draft analysis to identify training needed by staff carrying out the transition, but it had not finalized this analysis. Officials from the selected agencies generally explained that they were too early in their transition efforts to identify all of the funding, human capital, and training needed for their transitions. However, there is limited time remaining to complete the transition before the current telecommunications contracts expire. If the agencies do not conduct early planning to identify and justify all of their resources needed for the transition, they may underestimate the complexity and demands of their transition efforts. In addition, without using a rigorous management approach to analyze and document the total number of staff required to support the transition and to identify all of the required training for transition staff, agencies risk having insufficient staff available or may experience gaps in staff competencies. Such gaps may lead to delays and unexpected costs as the agencies try to quickly address the lack of resources during the transition’s limited time frame. All of the selected agencies had partially implemented the fifth established transition planning practice—to develop transition plans. Specifically, all of the agencies had fully implemented one of the three activities associated with this practice and partially implemented another of the activities. For the remaining activity, three agencies had fully implemented it and two had partially implemented it. Table 6 summarizes the extent to which the selected agencies had developed transition plans. Identify agency-specific transition objectives and measures of success. Three agencies had fully implemented this activity by identifying transition objectives and associated measures of success that were based on the transition objectives. The remaining two agencies had partially implemented this activity by identifying transition objectives and measures of success. However, their measures were unable to be used to assess transition progress. In particular, the identified measures could be used to determine success at the completion of the transition (e.g., all planned services have been transitioned to EIS). However, the measures did not enable the agencies to compare expected performance with actual results in order to track progress during the course of the transition (e.g., identifying the expected number of services that would be moved to EIS during each year of the transition). Identify risks that could affect transition success, including information security risks, and evaluate the importance of these risks relative to the agency’s mission critical systems and continuity of operations plans. All of the selected agencies had fully implemented this activity. Specifically, each of the agencies had identified transition risks and evaluated the importance of those risks relative to the agencies’ mission critical priorities. Clearly define transition preparation tasks and develop a time line that takes into account the agency’s mission critical systems, contingency plans, and identified risks. All of the selected agencies partially implemented this activity by developing time lines with clearly defined transition preparation tasks. However, none of these time lines accounted for all key priorities identified in the activity. Officials from all of the selected agencies generally said that they had not yet developed complete transition time lines because they were focused on activities associated with the acquisition planning phase of the transition, including developing their EIS solicitations. Officials from all of the agencies said that they planned to develop complete transition time lines after they issue their EIS task orders. While agencies’ lack of issued EIS task orders contributed to delays in developing complete transition plans, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information that is available. In summary, although the 19 selected agencies reported that they plan to fully transition to EIS before the current telecommunications contracts expire in May 2023, over half of the agencies do not plan to complete the transition by GSA’s September 30, 2022, milestone to do so. By waiting until close to the end of the current contracts to finish the transition, these agencies are at risk of experiencing disruptions in service if any issues arise that result in transition delays, such as inadequate human capital resources or the need to transition previously unidentified services. Agencies also face a financial risk. During the last transition, significant delays in moving to Networx—which offered generally lower rates than its predecessor—led to hundreds of millions of dollars in missed savings. Should agencies experience similar delays in the current transition, the missed savings could also be significant. In addition, five agencies we reviewed had taken steps to prepare for the transition of their telecommunications services to EIS contracts. However, these agencies’ lack of full implementation of established planning practices increases the risk that they will experience adverse effects— such as schedule delays or cost increases—while transitioning to the new contracts. Several agencies stated that they intend to implement the planning practices after they have issued their EIS task orders. However, limited time remains to complete the transition before the current telecommunications contracts expire. Further, inadequate project planning was a key factor that contributed to delays during the prior transition to Networx. Thus, it is critical for agencies to apply a rigorous management approach from the start of the current transition using the information that is currently available, even though changes may be necessary as conditions evolve. Agencies that do not fully adopt the comprehensive approach captured in these planning practices may not make the most of the opportunity for change, and the potential to save costs, that such a major telecommunications transition provides. Accordingly, our draft report contains 25 planned recommendations to the five selected agencies. By implementing our recommendations, the agencies should be better positioned to reduce their risk of experiencing the types of delays that occurred during previous transition efforts. Because of the generally lower rates available on EIS, significant delays would lead to agencies being unable to take advantage of readily available cost savings. Chairman Connolly, Ranking Member Meadows, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have. If you have any questions concerning this statement, please contact Carol C. Harris, Director, Information Technology Acquisition Management Issues, at (202) 512-4456 or HarrisCC@gao.gov. Other individuals who made key contributions include James R. Sweetman, Jr. (Assistant Director); Emily Kuhn (Analyst-in-Charge); Christopher Businsky; Rebecca Eyler; and Javier Irizarry. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "GSA is responsible for contracts that provide telecommunications services for federal agencies. In preparation for the expiration of current telecommunications programs, GSA has developed a successor program, called EIS. GSA and agencies now must carry out the task of successfully transitioning to EIS. Previous contract transitions experienced significant delays. Those delays during the last transition resulted in hundreds of millions of dollars in missed savings. GAO was asked to summarize its draft report currently out for comment at selected agencies. The draft discusses (1) selected agencies' plans for, and status in, transitioning to EIS; and (2) the extent to which selected agencies were implementing established transition planning practices. In preparing the report on which this testimony is based, GAO administered a survey to 19 selected agencies that spent at least $10 million on telecommunications in fiscal year 2018 regarding their plans for and status in transitioning to EIS. GAO also selected five of these agencies for further review based on, among other things, agency size and structure. For these agencies, GAO evaluated documentation to determine the extent to which they had implemented five planning practices identified in a previous GAO report. GAO's preliminary results show that, as of October 2019, the 19 selected agencies reviewed were in different stages of transitioning from their soon-to-be-expiring telecommunications contracts to the new Enterprise Infrastructure Solutions (EIS) program, which has generally lower rates for services. All of these agencies reported that they plan to fully transition to EIS program contracts before the current contracts expire in May 2023. However, 11 agencies did not plan to fully transition by the General Services Administration's (GSA) September 30, 2022, milestone. The majority of the selected agencies also did not meet GSA's milestones for completing critical contracting actions in 2019 (see table). While transitioning to EIS is a complex undertaking, delays in making this transition will cause agencies to miss out on potential cost savings that would result from the generally lower rates for services on the EIS program contracts. Dates GAO's preliminary results indicate that five of the 19 agencies that were selected for further review had partially implemented established planning practices that can help agencies successfully transition their telecommunications services to new contracts. These practices are to: (1) develop an accurate inventory of telecommunications services, (2) perform a strategic analysis of telecommunications requirements, (3) develop a structured transition management approach, (4) identify the resources needed for the transition, and (5) develop a transition plan. The agencies provided several reasons for partially implementing the practices. For example, transition officials at three agencies said that they were not responsible for tracking all of the telecommunications services in use at their agencies; as such, they were unable to provide complete telecommunications inventories. The agencies also planned to implement certain practices after they issue their EIS task orders. However, the limited time remaining to complete the transition makes it critical that agencies conduct early planning with the information available and fully implement these transition planning practices to reduce the risk that the agencies experience the types of delays and missed savings that occurred in previous transitions. GAO's draft report contains 25 recommendations to the five agencies to fully implement the transition planning practices.", "document_type": "gao"}
{"report": "Our March 2019 report identified a number of areas in which HUD needs to improve its physical inspection process and its oversight of inspectors, which could help better ensure the health and safety of households that live in HUD-assisted properties. These areas include conducting a comprehensive review of the inspection process; incorporating sampling error as part of determining inspection frequency and enforcement actions; tracking whether inspections are conducted by their expected date; enhancing the process and practices related to selecting, training, and evaluating inspectors; and ensuring that new quality control policies and procedures are implemented. We found that REAC had not conducted a comprehensive review of its inspection process since 2001, although new risks to its process have emerged since then. For example, REAC staff have raised concerns that some property owners have taken advantage of the scoring system and others have misrepresented the conditions of their properties. Specifically, because more points are deducted for deficiencies on the property site than for deficiencies in a dwelling unit, some property owners prioritize site repairs over unit repairs. Additionally, some property owners attempt to cover up, rather than address, deficiencies—such as by using mulch on a building exterior to hide erosion. REAC staff also have raised concerns about property owners employing current or former REAC contract inspectors to help prepare for an inspection, sometimes by guiding owners to repair just enough to pass inspection rather than comprehensively addressing deficiencies. REAC also continues to find that some contract inspectors conduct inspections that do not meet REAC’s quality standards. Furthermore, REAC fundamentally changed the entities that conduct inspections. In 1998, REAC employed a few large inspection companies to conduct the inspections. However, in 2005, REAC introduced the reverse auction program and opened up the inspection process to a larger number of small businesses, which resulted in a change in the composition of inspectors. We found that without a comprehensive review, REAC cannot determine if it has been meeting the goal of producing inspections that are reliable, replicable, and reasonable. We recommended that REAC conduct a comprehensive review of the physical inspection process, and HUD agreed with this recommendation. In November 2019, HUD officials told us that they recently completed a comprehensive review of the physical inspection process. In supporting documentation, HUD stated that the current model was insufficient for evaluating HUD-assisted housing when compared to modern expectations of housing quality, and that there is now a need to focus more on health and safety of residents and less on asset preservation and condition and appearance items. We have been assessing HUD’s recent review to determine whether it is has fully addressed our recommendation. We also found that REAC may not be identifying all properties in need of more frequent inspections or enforcement actions because it does not consider sampling errors of the inspection scores. For large properties, REAC inspects a statistical sample of the property’s units and buildings rather than all of them. The results for the sample are then used to estimate a score that represents the condition of the entire property. HUD takes enforcement action for multifamily properties with a score below 60. However, sampling introduces a degree of uncertainty, called sampling error, which statisticians commonly express as a range associated with numerical results. For example, for a property that scored 62 on its physical inspection, due to sampling error, the range associated with this score could be between 56 on the lower bound and 68 on the upper bound. REAC would consider this a passing score that requires an annual inspection and no enforcement action, although the lower bound fell below 60. REAC previously calculated sampling errors but ceased doing so in 2013, according to REAC officials, in part because of a lack of resources and also because they believed there was no need to calculate them. Based on our analysis of REAC inspection data, HUD could have taken enforcement actions against more properties if REAC had taken sampling errors in inspection scores into account. For example, from fiscal years 2002 through 2013, about 4.3 percent of inspections of multifamily and public housing properties had an inspection score of 60 or slightly above 60 but had a lower bound score under 60. Without considering sampling errors when determining whether enforcement action is needed, REAC will not identify some properties that may require more frequent inspections or enforcement actions. We recommended in our March 2019 report that REAC resume calculating the sampling error associated with the physical inspection score for each property, identify what changes may be needed for HUD to use sampling error results, and consider those results when determining whether more frequent inspections or enforcement actions would be needed. HUD neither agreed nor disagreed with this recommendation. However, since our report was issued, HUD said that by September 30, 2020, REAC planned to include the standard error calculations in the next version of its scoring software for physical inspections. REAC officials also stated that a task team concluded that the use of sampling error likely would have no impact on any individual enforcement action. However, REAC’s statement appears to contradict its own policies because inspection scores alone are used to determine whether some properties are referred for potential enforcement actions. We will continue to monitor REAC’s actions regarding this recommendation, including how it uses sampling error results to make decisions about properties. In our March 2019 report, we also found that REAC lacked formal mechanisms to assess the effectiveness of its training program for contractors hired to inspect properties (contract inspectors) and for HUD employees responsible for monitoring and overseeing contract inspectors (quality assurance inspectors). Unlike professional inspection organizations, REAC does not have continuing education requirements. Formal mechanisms to assess the effectiveness of its training program could help REAC ensure that its program supports the development needs of inspectors. Furthermore, requiring continuing education could help REAC ensure that inspectors are current on any changes in REAC’s policies or industry standards. We also found weaknesses in REAC’s process for evaluating the performance of inspectors, which could hinder its ability to ensure the quality of inspections. We made a number of recommendations related to the selection, training, and performance evaluation of inspectors. Specifically, we recommended that HUD take the following actions: Follow through on REAC’s plan to create a process to verify candidate qualifications for contract inspectors—for example, by calling references and requesting documentation from candidates that supports their completion of 250 residential or commercial inspections. Develop a process to evaluate the effectiveness of REAC’s training program—for example, by reviewing the results of tests or soliciting participant feedback. Revise training for quality assurance inspectors to better reflect their job duties. Develop continuing education requirements for contract and quality assurance inspectors. Review performance standards for quality assurance inspectors and revise them to better reflect the skills and supporting behaviors that quality assurance inspectors need to effectively contribute to REAC’s mission. HUD agreed with these recommendations, and we have been evaluating actions it has taken in response to them since our report was issued. For example, in November 2019, HUD officials said that they were moving toward a model of contracting with larger firms to conduct physical inspections of properties. In this model, HUD plans to put the first level of responsibility on the contractor to do its own due diligence on inspector candidates, and the contractor would be required to review 25 verifiable prior inspections completed by each inspector candidate. A REAC official then would be expected to select a sample of the candidate’s inspections to review. In response to our recommendation about revising training for quality assurance inspectors, REAC said that it recently began requiring a minimum of 8 hours of continuing education annually for all quality assurance staff. As of November 2019, REAC had not yet provided us with information about the subject matter of that training. Since our report was issued, REAC also developed continuing education requirements for contract and quality assurance inspectors, which it said will be required beginning in January 2020. In addition, REAC has developed updated performance standards for quality assurance inspectors, which REAC officials said were under review. REAC considers the new standards to be more aligned with the job responsibilities of quality assurance inspectors. We also found that REAC did not always meet its schedule for inspecting multifamily properties or track progress toward meeting scheduling requirements. REAC did not meet its schedule for about 20 percent of multifamily property inspections from calendar years 2013 through 2017. On average, REAC conducted inspections for these properties about 6 months past the targeted date. REAC staff told us that there may be legitimate reasons for not conducting an inspection according to the targeted date. For example, the Office of Multifamily Housing, which oversees the performance of properties that receive project-based assistance, can delay an inspection for reasons such as natural disasters or major rehabilitation to the property. However, REAC maintains limited data on the reasons why inspections have been rescheduled or cancelled. In addition, these data are not readily available to understand retrospectively why an inspection did not occur on schedule. REAC also does not track its progress toward meeting its requirement for inspecting multifamily properties within prescribed time frames. REAC’s inability to adhere to the inspection schedule could hinder the Office of Multifamily Housing’s ability to monitor the physical condition of properties on a timely basis and take enforcement actions when warranted. Furthermore, the lack of a mechanism to track REAC’s progress toward meeting its requirement for inspecting multifamily properties hinders its ability to determine what factors have contributed to delays in conducting the inspections. In our March 2019 report, we recommended that REAC track on a routine basis whether it conducts inspections of multifamily housing properties in accordance with federal guidelines for scheduling, as well as coordinate with the Office of Multifamily Housing to minimize the number of properties that can cancel or reschedule their physical inspections. HUD partially agreed with this recommendation. Since our report was issued, REAC officials told us that REAC developed an electronic spreadsheet to better track information about its inspections, and they expect information technology enhancements that would automate the tracking of information about these inspections to be deployed by September 1, 2020. HUD’s Office of Multifamily Housing also issued a memorandum in March 2019 that provides guidance on when a field office may approve an owner’s request to delay an inspection. We will continue to monitor HUD’s actions related to this recommendation. In our March 2019 report, we found that REAC had yet to implement policies and procedures for its Quality Control group, which was formed in 2017. REAC created the Quality Control group to standardize quality assurance inspector reviews by conducting more frequent oversight and looking for trends across all quality assurance inspectors, according to a Quality Control official. In November 2018, Quality Control developed a mission statement that says that the primary goal of the group is to improve the consistency of inspections. Also in November 2018, Quality Control developed procedures for reviewing quality assurance inspectors, which include processes for conducting field reviews of completed inspections, criteria for acceptable inspections, and processes for providing feedback. An official from the group told us both its mission and procedures have not been implemented, in part because Quality Control staff repeatedly have been occupied with other special projects. Without finalizing and implementing its policies and procedures for reviewing quality assurance inspectors, Quality Control may not be able to provide consistent reviews of quality assurance inspectors, which could affect the quality of inspections and the feedback and coaching that quality assurance inspectors provide to contract inspectors. We recommended that REAC ensure that Quality Control’s policies and procedures for overseeing quality assurance inspectors are implemented, and HUD agreed with this recommendation. Since our report was issued, REAC has begun to implement this recommendation by clarifying in writing the roles, responsibilities, and objectives of the Quality Control group, including how the group plans to support changes in REAC’s inspection program. In determining the status of our recommendation, we will look for evidence that the group has been consistently implementing its policies and procedures. In addition, our March 2019 report made several other recommendations regarding the physical inspection process and oversight of inspectors. These recommendations addressed documenting the sampling methodology for the inspection process, designing and implementing an evaluation plan for assessing the effectiveness of REAC’s pilot program for staffing inspections in hard- to-staff geographic areas, implementing internal HUD recommendations, implementing a plan for meeting management targets for reviews by quality assurance inspectors, and reporting to Congress on why the agency has not complied with a Consolidated Appropriations Act requirement. HUD generally agreed with these recommendations. While HUD has taken some steps, it had not fully addressed them as of November 2019. We have been assessing the actions HUD has taken and will continue to monitor HUD’s progress toward implementing these recommendations. HUD has been undertaking significant changes to the REAC physical inspection program. In a Federal Register notice published on August 21, 2019, HUD said it was soliciting comments on a proposed voluntary demonstration of a new physical inspection process, called the “National Standards for the Physical Inspection of Real Estate.” According to HUD officials, the new inspection model is intended to address issues of inspections not always identifying health and safety conditions and properties with poor unit conditions passing inspections, among other things. HUD officials have said that a transition to the new model may take 2 years or more. HUD also has been taking steps to replace its reverse auction program with a program in which large contractors will be responsible for conducting physical inspections. We will continue to monitor HUD’s actions regarding the recommendations, as well as HUD’s activities more broadly related to implementing a new inspection model. Full implementation of the recommendations, even as the inspection program undergoes changes, can help REAC to ensure that properties are decent, safe, sanitary, and in good repair. Our June 2018 report identified a number of areas in which HUD needs to improve its efforts to identify and address lead paint hazards and protect children in low-income housing from lifelong health problems. Among other issues, we identified shortcomings in compliance monitoring and enforcement, inspection standards, and performance assessment and reporting. Our June 2018 report noted that HUD began taking steps in 2016 to monitor how PHAs comply with lead paint regulations. These steps included tracking the status of lead inspection reports for public housing properties and PHA-reported information about cases of children with elevated blood lead levels living in voucher and public housing units. However, we also identified several limitations with HUD’s monitoring efforts. For example, HUD relies in part on PHAs self-certifying their compliance with lead paint regulations, but investigations found that some PHA officials may have falsely certified that they were in compliance. Also, on-site compliance reviews performed by HUD staff can be used to determine if PHAs are in compliance with these regulations, but HUD performs a limited number of these reviews annually. In fiscal year 2017, HUD conducted these reviews at less than 2 percent of the roughly 4,000 PHAs. Finally, HUD does not have data readily available on the physical condition of the roughly 2.5 million voucher units or these units’ compliance with lead paint regulations because the individual PHAs keep these data. These limitations in HUD’s monitoring suggest that HUD may not be fully aware of the extent to which children may live in unsafe units. As a result, we recommended that HUD establish a plan to mitigate and address risks in its lead paint compliance monitoring processes. These actions could further strengthen HUD’s oversight and keep PHAs accountable for ensuring that housing units are lead-safe. HUD agreed with the recommendation. As of November 2019, HUD officials told us the agency had taken steps to implement the recommendation, including requiring PHAs to submit appropriate documentation regarding public housing units’ compliance with lead paint regulations and updating an internal checklist for on-site compliance reviews that HUD staff conduct. We will continue to monitor HUD’s progress in response to our recommendation. Our 2018 report also found that HUD did not have detailed procedures to address PHA noncompliance with lead paint regulations or to determine when enforcement decisions might be needed. HUD staff stated that they address PHA noncompliance through ongoing communication and technical assistance. However, HUD has not documented specific actions staff should perform when deficiencies are identified. Furthermore, in response to our requests for information on enforcement actions taken, HUD was able to provide information on only one enforcement action, which dated from 2013. As a result, we recommended that HUD develop and document procedures to ensure staff take consistent and timely steps to address issues of PHA noncompliance with lead paint regulations. HUD generally agreed with the recommendation. As of November 2019, HUD officials told us procedures were in draft form and under internal review and were not expected to be finalized until spring 2020. HUD officials noted that the draft procedures could help HUD staff decide when an enforcement action might be appropriate, including determining how long PHAs have to resolve noncompliance. We also found that HUD’s Lead Safe Housing Rule requires a stricter lead inspection standard for public housing than for voucher units. For public housing, inspectors must conduct a risk assessment that includes testing paint chips and dust for the presence of lead paint. For voucher units, inspectors conduct a visual assessment that includes looking for deteriorated paint or visible surface dust but does not include any testing of paint chips or samples. As a result of the different inspection standards in the two programs, children living in voucher units may receive less protection from lead paint hazards than children living in public housing. According to agency officials, HUD does not have the statutory authority to require the more stringent inspection in the voucher program. In our June 2018 report, we recommended that HUD request authority from Congress to use the stricter lead inspection standard in the voucher program as indicated by analysis of health effects for children, the impact on landlord participation in the program, and other relevant factors. In August 2018, HUD officials told us that they planned to convene a working group to design and conduct a statistically rigorous study on the impact of risk assessments to help decide whether to support statutory change for greater flexibility in strengthening inspection standards for pre- 1978 units under the voucher program. Such an analysis could be useful in evaluating the potential benefits and risks of a change in the voucher program, and we will continue to monitor the progress made by the working group. As of November 2019, HUD officials told us they were working on a demonstration proposal to test an alternative inspection standard in the voucher program. The officials noted that details of the demonstration proposal were not currently available. Separately, we have ongoing work reviewing possible changes in the inspection standard for the voucher program. This work started in September 2019 and will include an in-depth review of the impact a change in the inspection standard may have on the cost and length of time of inspections, as well as the impact on landlords and families participating in the voucher program. Our June 2018 report also identified weaknesses in HUD’s performance assessment of and reporting on its lead-safety efforts. We found that HUD had taken limited steps to measure, evaluate, and report on the performance of its programmatic efforts to ensure that housing is lead- safe. First, HUD lacked comprehensive goals and performance measures for its lead-reduction efforts. We found that HUD did not track the number of housing units in the voucher or public housing programs that were lead-safe. At the time of our report, HUD officials told us that the agency did not have systems to count the number of housing units made lead- safe in these two programs. HUD had begun discussing whether existing databases could be used to count lead-safe housing units but did not provided us with details at that time. Second, HUD had not formalized plans and did not have a time frame for evaluating the effectiveness of its lead paint regulations. Third, it had not complied with annual statutory reporting requirements and last reported on its lead efforts in 1997. We noted that by improving its measurement of whether its housing is lead- safe and evaluating and reporting on its efforts, HUD will be better positioned to inform Congress and the public about its progress toward ensuring that housing is lead-safe for residents. As a result of these findings, we recommended that HUD develop performance goals and measures, including a measure to track its efforts to ensure that housing units in its rental assistance programs were lead- safe. Additionally, we recommended that HUD finalize plans for evaluating the effectiveness of its lead paint regulations. Finally, we recommended that HUD complete statutory reporting requirements and make the reports publicly available. HUD generally agreed with these recommendations. In August 2018, HUD told us that it would use existing data systems to begin to establish a baseline for reporting lead-safe housing units in its rental assistance programs. As of November 2019, HUD officials told us they still were exploring whether current data systems could be used to count the number of lead-safe housing units in HUD’s rental assistance programs. According to HUD officials, for public housing, HUD has made progress in counting housing units that have been made lead-safe using funds from the Lead-Based Paint Capital Fund Program. However, officials told us data will not be available until spring 2020. To evaluate the effectiveness of lead paint regulations, in November 2019 HUD officials told us they planned to use data from the forthcoming update to the American Healthy Homes Survey to better estimate the prevalence of lead paint hazards in federally assisted housing. However, officials told us the findings from the updated survey likely would not be available until summer 2020. With respect to complying with statutory reporting requirements, in November 2019, HUD officials told us they planned to issue a report to Congress on the agency’s lead efforts in early 2020. We will continue to monitor HUD’s efforts to implement these recommendations. In summary, it is essential to strengthen HUD’s oversight and keep PHAs accountable for ensuring that housing units are lead-safe because children continue to test positive for lead while living in HUD-assisted housing. As of November 2019, HUD officials told us they continue to learn of confirmed cases of children testing positive for lead while living in HUD-assisted housing because PHAs are required to record the cases in a HUD database. We maintain that improvements to the areas noted in this statement today will help HUD better protect children from lifelong health problems. Chairman Clay, Ranking Member Stivers, and Members of the Subcommittee, this concludes my statement for the record. If you or your staff have any questions about this statement, please contact Daniel Garcia-Diaz, Director, Financial Markets and Community Investment, at (202) 512-8678 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this statement are Beth Faraguna and Andy Pauline (Assistant Directors), Cory Marzullo (Analyst in Charge), Rachel Batkins, Carl Barden, Charlene Calhoon, Rudy Chatlos, Jeff Harner, Jill Lacey, Lisa Moore, Marc Molino, José Peña, Rhonda Rose, Jessica Sandler, Jennifer Schwartz, Tyler Spunaugle, and Nina Thomas-Diggs. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "As of the end of 2018, roughly 4.4 million low-income households were served by HUD's three largest rental assistance programs. HUD has responsibilities for ensuring that housing units provided under these programs are decent, safe, sanitary, and in good repair, as well as for identifying and addressing lead paint hazards in these units. GAO issued reports in March 2019 ( GAO-19-254 ) on HUD's physical inspections of HUD-assisted properties and in June 2018 on lead paint hazards in the public housing and voucher programs ( GAO-18-394 ). This statement is based on these two reports and discusses prior GAO findings on (1) REAC inspections and inspector oversight and (2) lead paint hazards. For the March 2019 report, GAO reviewed HUD documents and data related to REAC's physical inspection process. For the June 2018 report, GAO reviewed HUD documents and information related to its compliance efforts, performance measures, and reporting. In March 2019, GAO made 14 recommendations to HUD to improve the physical inspections process and oversight of inspectors. In June 2018, GAO made six recommendations to HUD to improve compliance monitoring processes, inspection standards, and performance assessment and reporting on lead reduction efforts in federally assisted properties. HUD generally agreed with these recommendations. As of November 2019, HUD officials had identified planned steps to implement most of these recommendations but had not fully addressed them. The Department of Housing and Urban Development (HUD) plays an important role in providing decent and safe housing for households receiving federal rental assistance. However, HUD needs to improve its physical inspection program and its efforts to identify and address lead paint hazards in federally assisted housing. To that end, GAO made 20 recommendations on these issues in its March 2019 and June 2018 reports. Physical inspections of properties. HUD's Real Estate Assessment Center (REAC) is responsible for conducting physical inspections of HUD-assisted properties. Despite longstanding processes to inspect properties and take action against owners who do not address physical deficiencies, HUD continues to find some properties in poor physical condition and with life-threatening health and safety issues. In a March 2019 report, GAO identified a number of areas in which HUD needed to improve its physical inspection process and oversight of inspectors, which could help ensure the health and safety of those who live in HUD-assisted properties. For example, REAC had not conducted a comprehensive review of its inspection process since 2001, although new risks to the process have emerged since then. A comprehensive review could help REAC identify risks and ensure it meets the goal of producing reliable inspections. In addition, REAC uses contractors to inspect properties; these contract inspectors are trained and overseen by HUD staff known as quality assurance inspectors. However, GAO found REAC lacked formal mechanisms to assess the effectiveness of its training program for contractor inspectors and for HUD employees responsible for monitoring and overseeing contract inspectors. And, unlike professional inspection organizations, REAC does not have continuing education requirements. Formal mechanisms to assess the effectiveness of its training program and requirements for continuing education could help REAC ensure its program supports development needs of inspectors and that inspectors are current on any changes in policy or industry standards. Lead paint hazards. GAO also identified a number of areas in which HUD could improve its efforts to identify and address lead paint hazards to protect children from lifelong health problems. Lead paint hazards (such as dust containing lead and chips from deteriorated lead-based paint) are the most common source of lead exposure for U.S. children. In a June 2018 report, GAO identified shortcomings in HUD's compliance monitoring and enforcement, inspection standards, and performance assessment and reporting for lead-reduction efforts. For example, HUD's monitoring efforts relied in part on public housing agencies to self-certify compliance with lead paint regulations. Additionally, the lead inspection standard for the voucher program is less strict than that for the public housing program. As a result, children living in voucher units may receive less protection from lead paint hazards than children living in public housing. Furthermore, GAO found that HUD did not track the number of lead-safe housing units in the voucher or public housing programs. Therefore, HUD may not be fully aware of the extent to which children have been living in unsafe units.", "document_type": "gao"}
{"report": "Several State and DHS components have roles and responsibilities in the E-2 adjudication process, as shown in Table 1. Depending on which agency (State or USCIS) is conducting the E-2 adjudication, as well as the foreign national’s role in relation to the E-2 business, foreign nationals are described using various terms, as shown in table 2. Both the business and foreign national seeking E-2 status must meet specific eligibility requirements, as shown in table 3. The E-2 eligibility requirements for nationals of treaty countries and their qualified family members (i.e., dependents) are defined in the INA, as amended, as well as in federal regulation. Foreign nationals seeking E-2 status must provide evidence and supporting documentation to State’s consular officers or USCIS’s immigration officers showing that they and their related business meet these requirements. There are two pathways for an individual seeking E-2 status: (1) applying for an E-2 visa through State at a post abroad, and then being inspected and admitted at a U.S. port of entry by CBP, or (2) filing with USCIS to extend, or change to E-2 status if already in the United States in E-2 or other nonimmigrant status, as shown in figure 1. Prior to the expiration of the 2-year period typical for E-2 nonimmigrants, a foreign national seeking to remain in E-2 status must either petition USCIS for an E-2 extension; or depart the country, reapply for an E-2 visa with State at a U.S. embassy or consulate, and seek entry at a U.S. port of entry. However, if the E-2 visa is still valid after having departed, the foreign national may present that visa to apply for admission again at a U.S. port of entry. If applying through State, consular officers are responsible for adjudicating E-2 visa applications at one of State’s 220 posts. Although all posts can adjudicate E-2 visas, approximately 140 posts adjudicated at least one E-2 visa in fiscal year 2018. Taken together, State and USCIS adjudicated an annual volume of E-2 visa applications or petitions of more than 50,000 from fiscal years 2014 through 2018. State accounted for over 80 percent of these adjudications. About 90 percent of State’s E-2 visa applications were issued, and about 83 percent of USCIS’s E-2 petitions were approved. See appendix III for additional State and USCIS data on the characteristics of foreign nationals seeking E-2 status, including annual statistics, the relatively low number of E-2 nonimmigrants who remain in the United States beyond the conclusion of their authorized period of stay (i.e., overstay), and other post-adjudication outcomes. The volume of State’s E-2 visa adjudications increased from fiscal years 2014 through 2017, and decreased slightly in fiscal year 2018, as shown in figure 2. During this time period, State consular officers adjudicated an average of about 45,000 E-2 visas per year. Also during this time period, 44 percent of adjudications were for dependents, and a combined 53 percent were for principals, including 14 percent for the investor, 20 percent for managers, and 19 percent for essential employees. From fiscal years 2014 through 2017, the average E-2 visa refusal rate— that is, the number of refused visas divided by the total number of visas adjudicated during that time period—was about 8 percent, which is generally lower than for other types of nonimmigrant visas (see sidebar). We do not present the fiscal year 2018 refusal rate in figure 3 because that rate is subject to change until the end of fiscal year 2019. Specifically, an application adjudicated in fiscal year 2018 may require the applicant to submit additional information to demonstrate eligibility for an E-2 visa. In such cases, the application is refused under INA § 221(g). The applicant has one year after the date of refusal to overcome the refusal by, for example, providing missing or supplemental information. After one year, the applicant must reapply. As of November 2018, 8,184 of the 11,255 refusals in fiscal year 2018 were refused under INA § 221(g). Depending on the extent to which applicants refused in fiscal year 2018 under INA § 221(g) are able to overcome their refusals, State officials stated that they expected the fiscal year 2018 refusal rate to be similar to prior fiscal years. In addition to analyzing State data on adjudications and refusals, we also analyzed data to identify trends in refusal rates by applicant type, refusal reasons, nationality of applicants, and business sectors, and level of investment, as described below. Refusal Rates by Applicant Type. Our analysis showed that for fiscal years 2014 through 2018, average refusal rates were highest for investors (24 percent), followed by dependents (12 percent), managers (9 percent), and essential employees (6 percent). Figure 4 shows the refusal rates by fiscal year for each applicant type, and appendix III includes additional information on refusal rates for fiscal year 2018. According to State officials, refusal rates may be higher for investors because such applicants are typically the first in their company applying for an E-2 visa; if denied, then future E-2 applicants (e.g., manager or essential employee) would need to wait until such investor is approved or find another individual or business investor to form the basis for their E-2 employment status. Refusal Reasons. Our analysis showed that approximately 10 percent of E-2 visa adjudications from fiscal years 2014 through 2017 were refused. The majority of E-2 visa refusals for fiscal years 2014 through 2017 (75 percent) were because the applicant did not meet eligibility requirements. The next largest reason for refusal (22 percent) was INA § 221(g) for inadequate documentation. Few E-2 visa applicants are refused for other reasons, such as prior immigration violations, fraud, or terrorist activities. For example, in total, less than 4 percent of all E-2 visa adjudications during this time period were refused for other reasons, such as security or criminal-related ineligibilities, fraud or misrepresentation, and immigration violations, among others. Nationality. Our analysis showed that about 80 percent of E-2 visa adjudications from fiscal years 2014 through 2018 were for nationals from nine countries: five European countries (Germany, France, United Kingdom, Italy, and Spain), two Asian countries (Japan and South Korea), and two North American countries (Canada and Mexico). Japan was the largest country of nationality, with 29 percent, followed by Germany (10 percent), Canada (7 percent), and France (7 percent). Figure 5 shows the top ten countries by percentage of E-2 visa adjudications from fiscal years 2014 through 2018. Business Sectors. To obtain information on additional characteristics of E-2 visa principal applicants (i.e., investor, manager, and essential employee), such as their business sector and investment amounts, we reviewed a generalizable sample of 120 fiscal year 2018 E-2 visa applications. Based on our analysis, we estimate that about three- fourths of principal E-2 visa applicants were associated with 4 business sectors: manufacturing (44 percent), food services (13 percent), retail (11 percent), and professional services (10 percent). Figure 6 includes examples of the businesses we found within each of these sectors. Investment. Based on information reported by fiscal year 2018 principal applicants in our generalizable sample of issued visas, we estimate 64 percent of applications were for principal applicants associated with investments reportedly over $10 million, as shown in figure 7. Of these, 30 of 40 applications were for those in the manufacturing sector, particularly for the automotive sector, such as large automobile manufacturers. From fiscal year 2014 through 2018, USCIS adjudicated an average of about 9,400 E-2 petitions per year. During this time period, USCIS adjudicated petitions to extend E-2 status for an average of about 5,900 beneficiaries per year, about 60 percent of which were for E-2 dependents (i.e., an E-2 principal’s spouse or children). Also during the same time period, USCIS adjudicated petitions for an average of about 3,500 beneficiaries per year who were seeking to change to E-2 status from another nonimmigrant category. Of these, about 47 percent of which were E-2 principal beneficiaries (i.e., investors, managers, and essential employees). Figure 8 shows the number of petitions to extend or change to E-2 status from fiscal years 2014 through 2018. The average denial rate for E-2 petitions for fiscal years 2014 through 2018 was about 17 percent. Denial rates were higher for petitions to change status from another nonimmigrant category to E-2 (27 percent) than for petitions to extend E-2 status (11 percent), as shown in figure 9. Further, the denial rate for both extension and change of status petitions increased from fiscal years 2014 through 2017, but fell by several points in 2018. In addition to analyzing USCIS data on adjudications and denials, we also analyzed data to identify trends in country of birth, prior status, date of last U.S. entry, reasons for denial, business sectors, and level of investment, as described below. Country of Birth. Our analysis showed that the top countries of birth for individuals seeking to extend their E-2 status from fiscal years 2014 through 2018 were South Korea, Mexico, and Japan, and the top countries of birth for those seeking to change to E-2 status from another nonimmigrant category were South Korea, Pakistan, and Turkey, as shown in table 4. Although there are similarities with the top countries of nationality for State E-2 visas (see previous figure 5), there are some differences as well. For example, both Pakistan and Thailand are among the top countries of birth for petitioning with USCIS to extend or change to E-2 status, but are not among the top countries of nationality for State E-2 visas. Prior status. Our analysis showed that individuals seeking to change to E-2 status from another nonimmigrant category from fiscal years 2014 through 2018 were most often changing status from a tourist, business, or student visa, as shown in figure 10. For example, more than half (53 percent) of all petitions to change to E-2 status were for beneficiaries that were tourists (B-2) or business visitors (B-1). In addition, about 4 percent of beneficiaries were seeking to change status within the E-2 classification. For example, a child or spouse of an E-2 investor may later work at the company as a manager and therefore would need to petition to change from dependent to principal E-2 status as a manager. Date of last entry into the United States. On the basis of our review of a generalizable sample of petitions of E-2 principals (i.e., investors, managers, and essential employees), we estimate that one third of principal beneficiaries had been in the United States since 2014 or earlier at the time they sought to change to or extend E-2 status in 2018, some as long as 18 years, as shown in figure 11. Such beneficiaries may have changed status from other kinds of nonimmigrant status, or may have requested to extend their E-2 status multiple times. There is no limit on the number of times a foreign national may request to extend their E-2 status. Reason for denial. On the basis of our review of a generalizable sample of fiscal year 2018 denied petitions for E-2 principals, we estimate that the top reasons petitions were denied included (1) the enterprise was not real and operating, and (2) the investment was not substantial, as shown in table 5. Of the denied petitions in fiscal year 2018, about one-third were either withdrawn by petitioner or abandoned, meaning that the petitioner did not respond to USCIS requests for additional evidence. Business Sectors. On the basis of our review, we estimate that the majority of E-2 principal beneficiaries were associated with 4 business sectors, as shown in figure 12: food services (38 percent), retail (18 percent), manufacturing (9 percent), and professional services (13 percent). Comparing our two generalizable samples, a smaller percentage of USCIS’s E-2 principal beneficiaries were associated with manufacturing (44 versus 9 percent) and more with food services (13 versus 38 percent) than State’s E-2 principal visa applicants. Investment. We estimate that about two-thirds of the approved petitions were for principal beneficiaries associated with investments of $200,000 or less, as shown in figure 13. We found that about 30 percent of USCIS’s E-2 principal beneficiaries were associated with investment amounts of $100,000 or less and 7 percent were associated with investments over $10 million. State and USCIS have agency-specific guidance, procedures, and training intended to ensure E-2 applicants and petitioners, respectively, meet E-2 eligibility requirements. However, officials from both agencies identified challenges in the E-2 adjudication process. Some of State’s posts have developed E-2 company registration programs to help streamline the E-2 adjudication process, but there are no minimum standards for these programs, which may result in different processing of companies and applicants across posts. Further, State and USCIS require that consular and immigration officers retain certain documentation for all E-2 applications and petitions; however, during our case file review of E-2 applications and petitions adjudicated in fiscal year 2018, we found that State did not consistently retain all required documents. State and USCIS have guidance and resources to help officers adjudicate E-2 applications and petitions. Both agencies have similar high-level procedures for adjudicating E-2 applications and petitions, but there are some key differences in how each agency implements these procedures based on their specific roles and responsibilities. Further, both agencies provide their staff with some training on E-2 eligibility requirements. Guidance and resources. State and USCIS have guidance and resources available to staff who adjudicate E-2 visas and petitions to help ensure that applicants and petitioners meet E-2 eligibility requirements. Although the guidance documents have some minor differences, they are based on the same eligibility requirements. For example, the main guidance documents for State and USCIS—State’s Foreign Affairs Manual (FAM) and USCIS’s national E-visa standard operating procedures—both include the same eligibility criteria and provide additional explanation on each of the eligibility requirements. State also provides supplementary resources for consular officers on its intranet, such as E-2 adjudication best practices, an adjudication guide, and case studies. State and USCIS both provide headquarters-based legal advisors and attorneys with whom officers can consult for case-specific guidance. For example, a State consular officer at one post we visited told us that he requested such assistance for an application from an investor whose company had a particularly complex ownership structure that made it difficult to determine if at least 50 percent of the company was owned by nationals of a treaty country. Adjudication procedures. State and USCIS high-level procedures for adjudicating E-2 applications and petitions are generally similar, but there are some key differences based on their specific roles and responsibilities. As shown in figure 14, both agencies require foreign nationals to submit an E-2 application or petition, and pay any relevant fees. Additionally, both agencies vet individuals by conducting security checks and reviewing submitted information to ensure that all E-2 eligibility requirements are met. There are four key differences in State and USCIS procedures for adjudicating E-2 visa applications and petitions: Interviews. State requires in-person interviews of most E-2 applicants. According to USCIS officials, USCIS does not conduct interviews of beneficiaries and petitioners because they do not have the resources or facilities to do so. In any case, USCIS’s process for adjudicating nonimmigrant visa petitions for foreign nationals who have already been lawfully admitted into the United States, in E-2 or other nonimmigrant status does not include an interview requirement. Locally Employed Staff (LES) and E-2 Visa Adjudication Consular officers and managers stated that LES play an important role in E-2 visa processing and adjudication. LES are employees hired under the local compensation plan at a U.S. post overseas. LES include foreign service nationals, U.S. citizens residing abroad, third country nationals, and eligible family members of State employees. LES can provide the institutional knowledge and expertise in E-2 visa issues, as consular officers rotate posts every 2 years but LES do not rotate. Consular managers at 4 of the 14 posts we interviewed or visited stated that their post specifically hired LES to work on E-2 visas because of their specialized knowledge and backgrounds in business or law. For example, a consular officer may consult with LES on an application to better understand the legal relationship between two companies, as some LES have a background or developed expertise in financial law. Locally Employed Staff (LES) initial processing and prescreening. In addition to consular officers, State employs local residents in its host country to help with consular services (see sidebar). For example, at some posts State’s LES prescreen visa applications before consular officers adjudicate the application. Procedures for LES varied at the posts we interviewed and visited. For example, LES at some posts provide administrative help and processing—such as scanning application documents, checking applications for completeness, and scheduling interviews. LES at other posts provide additional analytical support—such as by summarizing applications, completing eligibility checklists, and maintaining databases on previously issued E-2 visas. Regardless of the kind of help LES may provide at post, only consular officers adjudicate E-2 visa applications and make decisions on whether or not the visa is issued. The number of LES supporting E-2 visa applications at the 14 posts we visited or interviewed ranged from one part-time position to five full-time LES. Consular managers and officers at all four of the posts we visited described the role of LES in processing E-2 visas as critical (see sidebar). Although USCIS’ California Service Center has staff who assist with processing petitions, such as by organizing folders with the petition materials, immigration officers generally perform the analytical tasks themselves. Staffing model. Depending on E-2 visa application volume, staffing considerations, and workload arrangements, the number of consular officers adjudicating E-2 visas at the 14 posts abroad we interviewed ranged from one to six per post. Further, on the basis of our observations and interviews with consular officials at 14 posts, we found that State’s posts have generally developed three different staffing models for adjudicating E-2 visa applications, as shown in table 6. Consular managers stated that the kind of model used at a post may depend on E-2 visa volume, as well as other factors. For example, a consular manager at a post we visited explained that the specialist model worked well at his post because it had a relatively low volume of E-2 adjudications each year, which meant that a single officer could focus on such visas. In contrast, a consular manager at a post we visited that was staffed with a hybrid of generalists and specialists had higher E-2 visa volume and stated that their model allowed them to balance efficiency and specialization. For USCIS, a specialized office of five immigration officers review and adjudicate all E-petitions (including E-1 and E-2) at one location –USCIS’ California Service Center, as of July 2018. Training. State and USCIS provide training to their respective E-2 processing and adjudication staff on E-2 eligibility requirements. State’s consular officers assigned to adjudicate E-2 visas receive the majority of their adjudication training at post, with a brief introduction to E-2 visas during a mandatory 6-week Foreign Service Institute training course taken prior to serving as a consular officer overseas. According to Foreign Service Institute officials, the course provides consular officers with an overview of the various visa classes they may adjudicate, but focuses on visas that all consular officers will address at post. Because E-2 visas are not adjudicated at every post, and consular officers typically cannot specialize in only one particular classification like USCIS counterparts who have a dedicated E-2 unit, the course does not concentrate on that visa classification. Instead, State relies on the individual posts to provide training to prepare consular officers to adjudicate E-2 visas on an “as needed” basis. On the basis of our interviews and observations, we found that E-2 training programs for consular officers at post generally consist of three components. First, consular managers and senior consular officers at post provide the consular officer who will be adjudicating E-2 visa applications for the first time with an overview of the E-2 eligibility requirements along with any supplementary E-2 training resources, such as illustrative examples of challenging E-2 visa cases the post has previously adjudicated. Second, new consular officers are to observe senior consular officers adjudicate E-2 visas for 1 to 3 weeks, which helps the new officer to learn how the requirements are applied. Finally, new officers adjudicate E-2 visas under the supervision of a senior consular officer with experience adjudicating E-2 visa applications, with 100 percent of their adjudications reviewed by consular managers until management determines that the new officer is proficient. As needed, supervisors will meet with new officers to discuss specific adjudications, including whether the officer properly documented their decision. State’s E-2 training for LES is entirely at post. According to consular managers and LES, LES training generally consists of a review of eligibility requirements and supervision. First, new LES assigned to E-2 visa processing and prescreening receive an overview of the E-2 eligibility requirements from a senior LES. According to LES we interviewed, the overview of the eligibility requirements helps them to identify the types of documents E-2 applicants typically submit to establish E-2 eligibility. Second, new LES are observed by senior LES until management determines that the LES is proficient at processing and prescreening. As noted above, USCIS has staff dedicated to E-2 petitions and USCIS provides training to new E-2 immigration officers that include the same basic components as State, such as a review of eligibility requirements and job shadowing. First, immigration officers who will work on E-2 adjudications receive 3 weeks of classroom training during which they review the E-2 eligibility requirements. The classroom training is followed by a 1-week practicum session where USCIS immigration officers apply the classroom training to sample E-2 petitions. Specifically, immigration officers explained to us that during the practicum they are given example cases to which they are to apply their classroom training. After each officer has adjudicated the example case, they discuss how each applied the various E-2 eligibility requirements and reconcile any differences with the assistance of the immigration supervisor facilitating the training. Second, after the 4 weeks of training, USCIS immigration officers begin to adjudicate E-2 petitions under the guidance of an E-2 immigration supervisor. Third, new E-2 immigration officers have 100 percent of their cases reviewed by their supervisor until they are deemed proficient. State’s consular officers and LES, as well as USCIS officials, stated that given the complexity of adjudicating E-2 applications and petitions, and the level of documentation and time required, the E-2 adjudication process can present challenges with respect to the analysis of the E-2 eligibility requirements. Consular officers and LES we spoke with stated that additional training on E-2 eligibility requirements would be beneficial. USCIS officials said that while E-2 petitions can be challenging to adjudicate, additional training was not necessary. Consular officers we spoke with noted that E-2 visa adjudications are particularly complicated and resource-intensive, involving potentially complex business issues, and often requiring more documentation and time to adjudicate than is typically needed to adjudicate other visas. Specifically, consular officers at 10 of 14 posts we interviewed stated that E-2 visas are among the most difficult nonimmigrant visas to adjudicate because of the amount of supporting documentation that is required to demonstrate that both the business and applicant meet all eligibility requirements, as well as the time required to prescreen and adjudicate the application package. For example, E-2 application packages can include 200 pages or more of supporting documentation, and include a range of detailed business and financial documents (see sidebar). Further, consular officers told us that it can take between 45 minutes to 4 hours to review a single E-2 application with its supporting documents. Consular officers explained that, in contrast, other nonimmigrant visa categories do not require the same amount of time or number of documents to adjudicate. For example, business and tourism nonimmigrant visas typically take less than 10 minutes to adjudicate and do not require that any documentation be submitted by the applicant prior to the adjudication. Consular officers at the 14 posts we visited or interviewed identified challenges with respect to the analysis of the E-2 eligibility requirements. Table 7 provides examples of some of these challenges, as identified by consular officers at the 14 posts. Substantial investment requirement: No prescribed minimum amount of capital, although it must be substantial in proportion to the cost of the business. Sufficient to ensure the investor’s financial commitment to the successful operation of the business. Large enough to ensure the likelihood of success of the business. Determining substantial investment. Consular officers at 10 of 14 posts indicated that it can be challenging to determine substantiality of capital investment amounts. According to the FAM, there is no set amount of capital which is considered substantial; instead, various factors must be considered to ensure there is a large enough investment to support the business. Consular officers noted that it can be difficult to determine how much capital is needed to support the many types of businesses that consular officers see in E-2 applications, which can range from small restaurants to technology start-ups to large automobile manufacturers. For example, a consular officer may be presented with an application for an investor seeking an E-2 visa to open a business that the consular officer has never seen before in an E-2 visa application, such as an airport internet café that rents hourly sleeping pods to travelers on long layovers. The consular officer may be initially unfamiliar with what is considered to be a more unique type of business, and may not know immediately how much investment would be sufficient to ensure the successful operation of the business. In such cases, the officer might gather additional information from the applicant on similar businesses, which the officer could use to inform their determination as to the amount of capital that would be needed to support successful operation of the business in the United States. Real and operating business requirement: The business is a real and active commercial or entrepreneurial undertaking that produces goods (i.e. commodities) or services for profit, and meets applicable legal requirements for doing business in the particular jurisdiction of the United States. Determining real and operating business. Consular officers at 7 of 14 posts indicated that it can be challenging to determine whether the business is real and operating. Consular officers explained that particularly difficult issues may arise for new businesses, which may not be operational yet at the time of the interview. Consular officers stated that it can be very clear when a business is not yet operating, but that additional analysis is required for newly-formed businesses that do not yet have customers or revenue but may have taken other actions to start the business. Consular officers at one post explained it is sometimes very clear that a business is not operating because, for example, the business has not yet made any contracts with clients, does not have a website advertising its services, and has no evidence of any expenses made on behalf of the business. As for newly-formed businesses, consular officers at another post we visited provided a hypothetical example of a restaurant whose owner had a lease for the restaurant space, bought equipment, and hired employees, but had not opened to customers yet because it was waiting for the chef to receive an E-2 visa as an essential employee. The officers indicated that in such a hypothetical scenario in which a business’s qualification as an E-2 business depends on E-2 visa issuance of a key worker, it may not be immediately clear without further analysis, whether such business would be considered real and operating. Manager requirement: The individual is an employee in an executive or supervisory position. Determining manager qualifications. Consular officers at 6 of 14 posts indicated that it can be challenging to determine whether a prospective manager had or will have sufficient executive or supervisory duties to meet the E-2 managerial requirement. Consular officers provided a hypothetical example in which a consular officer may interview an applicant seeking an E-2 visa to become a manager at a restaurant, but the applicant may not have any prior management experience nor will she have any subordinates in the restaurant. Such a situation may pose challenges to the consular officer to determine if the applicant would be eligible for an E-2 visa as a manager. Officers noted that the FAM requirements did not specifically state that the applicant must have prior experience or subordinates to qualify as a manager. In such situations, consular officers said they might request additional information from the applicant about the restaurant, her skills and experience, and the nature of her managerial role in the business. Essential employee requirement: The individual is employed in a lesser capacity than a manager, but possesses special qualifications (i.e. skills and/or aptitudes) essential to the business’ successful or efficient operations in the United States. Determining essential employee qualifications. Consular officers at 6 of 14 posts indicated that it can be challenging to determine whether a prospective essential employee has special qualifications (i.e. essential skills or aptitudes). Consular officers noted that they can ask questions and obtain information about the applicant’s specialized skills, but that often further research is needed to determine if those skills are essential to the business’ operations in the United States. For example, an officer at one post we interviewed provided a hypothetical example of a pet groomer seeking an E-2 visa as an essential employee for a pet grooming service. Although one might be skeptical that pet grooming is a specialized skill and that such an employee would be considered essential, in such a situation, the officer noted that he would likely conduct further research. In doing so, he might determine that the applicant is a well-known expert who specializes in grooming certain breeds of exotic or show animals, and that the grooming service is planning to target that type of animal. Other requirements. Consular officers told us that some of the other E-2 eligibility requirements are not particularly challenging. For example, consular officers at all 14 posts told us that it is relatively straightforward to determine if the applicant has a clear intent to depart the United States upon termination of E-2 status because applicants typically provide an affidavit attesting to their nonimmigrant intent. Further, consular officers stated that it is easy to determine if the applicant is an eligible dependent because consular officers are familiar with local identity information (e.g., birth and marriage certificates) and there are no nationality requirements for dependents. In addition to potential challenges with respect to the analysis of the eligibility requirements, consular officers at 4 of 14 posts also identified challenges in understanding business and financial documents that are provided in support of an E-2 application. For example, at one post we visited, a consular officer explained the challenges he faced in understanding U.S. tax documentation and the differences between various types of corporations. Further, consular managers at two posts stated that officers without prior knowledge in basic business concepts can find E-2 visa adjudication challenging when they first arrive at post. A manager from a third post stated that the complexity of some E-2 visa cases requires knowledge of business and finance acquired through substantial experience or education. More than marginal business requirement: The investment must be made in a business that has the capacity to generate more than enough income to provide a minimal living for the treaty investor or employee and family, or has the present or future capacity (generally within five years) to make a significant economic contribution. Although LES do not adjudicate visas, LES at 6 of 14 posts also indicated that they had encountered challenges with respect to the analysis of the E-2 eligibility requirements. For example, LES at one post indicated that it can be challenging to determine whether a company is more than marginal (see sidebar) because the size, type or investment sector of each E-2 company presents unique facts and circumstances. LES at one post told us that they needed additional examples of how applicants can meet the various criteria, which would help the LES flag potential areas of concern for the consular officer. Further, LES also expressed challenges in understanding some business and financial aspects of prescreening. For example, LES at two posts stated that determining the nationality of large companies can be difficult because they need to trace back ownership to the original, parent company, and that corporate structures can be very complicated. Given the complexity of adjudicating E-2 visas, the majority of consular officers and consular managers we spoke with stated that additional training and resources would be beneficial, such as online training, conferences to share best practices, or documents clarifying eligibility requirements. Specifically, consular officers at 9 of 14 posts and consular managers at 8 of the 14 posts stated that additional E-2 training or resources would be beneficial to consular officers. For example, a consular manager at one post noted that the additional resources provided on State’s intranet, such as the adjudication guide and case studies, have already helped to improve clarity on the eligibility requirements, but more resources and training are needed. Further, consular managers at 4 posts stated that additional training related to tax and business concepts would be useful. For example, one manager stated that additional training on how to read and analyze U.S. tax returns could be helpful to accurately evaluate a company’s overall financial health and make a determination that a business meets the requirement to be “more than marginal.” Further, LES at all 14 posts in our review also stated that additional training or resources would help them perform their responsibilities. For example, LES at one post we visited stated that additional training and resources that clarify the eligibility standards would allow them to better prepare application packages for the consular officers to adjudicate. Further, consular managers at 9 of the 14 posts in our review also stated that additional training and guidance for LES would be helpful. For example, one consular manager suggested that State develop an online training course for both E-2 adjudicating officers and LES that reviews common business documents. Another manager stated that a training or workshop would provide opportunities to LES and E-2 adjudicating officers to learn best practices from other posts that adjudicate E-2 visas. Although State provides guidance and training on adjudicating E-2 visas, consular officers, managers, and LES identified challenges in the E-2 adjudication process, such as ensuring adjudicators adequately understand supporting financial and business documents. Many of these officials indicated that given the complexity of E-2 adjudications, additional training and resources would help them in making E-2 eligibility determinations. State officials noted that eligibility requirements are broadly defined so as to cover various business types and investment amounts. According to the Standards for Internal Control in the Federal Government, management establishes expectations of competence for key roles to help the entity achieve its objectives, which requires that staff have the relevant knowledge, skills, and abilities, needed to carry out their responsibility. Such knowledge, skills, and abilities can be obtained by on-the-job training, formal training, and other training resources, which should be available to all staff performing such roles, regardless of their post. Providing additional E-2 training or related resources would help better ensure that all consular officers and LES prescreening and adjudicating these visas have the necessary knowledge, skills, and abilities to carry out their responsibilities effectively. Such training or other resources should cover topics that include information on E-2 eligibility requirements and how to understand business- and tax-related documents. USCIS Immigration Officers Identified Challenges in Adjudicating Petitions and Noted Ways in Which They Address Them USCIS immigration officers we spoke with communicated challenges with respect to the analysis of E-2 eligibility requirements, but explained that they are able to overcome these challenges with local resources. For example, USCIS immigration officers indicated that it is sometimes challenging to determine whether a prospective “essential employee” has requisite special qualifications, or a business is “more than marginal.” For example, immigration officers indicated that determining if an employee is considered essential depends on the relevant facts and circumstances. Further, immigration officers noted that the non-marginality eligibility requirement can be difficult to determine in some cases because the officer may have to project how successful the business will be in the future. However, the immigration officers explained that their colocation with all of the other immigration officers who adjudicate E-2 petitions helps to mitigate the challenges because the officers can coordinate with each other to determine how USCIS has typically adjudicated such cases. Generally, the USCIS immigration officers stated that additional training or resources for E-2 adjudication was not needed. As of April 2019, 7 of the top 10 E-2 adjudicating posts worldwide have implemented E-2 company registration programs. An E-2 company registration program is a process by which posts assess companies against applicable E-2 eligibility requirements. Companies that meet eligibility requirements are placed on an approved or registered companies list. Companies on the registered list do not have to be reassessed for eligibility each time one of their employees seeks an E-2 visa, which creates processing efficiencies for these posts. Consular managers stated that E-2 company registration programs are intended to give consular officers reasonable assurance that a company meets the minimum E-2 business and investment eligibility requirements, allowing the adjudicating officer to focus the majority of their effort on evaluating the applicant ‘s E-2 eligibility. In fact, we found that at posts with E-2 company registration programs, the consular officer may not need to collect or review any supporting documentation related to the company prior to adjudicating the visa. In contrast, E-2 adjudicating posts without an E-2 company registration program would assess both the company and the applicant against the E-2 eligibility criteria each time they review and adjudicate an E-2 visa application. While State has identified E-2 company registration programs as a potential best practice, these programs are not mentioned in the FAM and State has not developed guidance or minimum standards for how these programs should be implemented. Instead, State has permitted posts to develop and implement their own registration programs, which has led to variation in how the programs are implemented depending on post- specific factors. Specifically, we found that posts with E-2 company registration programs varied in three ways: Registration criteria: Three of the 7 posts with E-2 registration programs require all companies to register, while the remaining 4 posts established criteria so that only certain companies can register, such as large companies or companies with multiple E-2 visa issuances. For example, at one post, only companies with more than 500 employees in the United States are allowed to register. At posts that require all companies to register, the number of registered companies ranged from approximately 2,200 to 4,000. At posts that allow only certain companies to register, the number of registered companies ranged from about 100 to 200. Documentation requirements: Employees of E-2 registered companies seeking to obtain an E-2 visa provide different types of documentation during their E-2 adjudication, depending on the requirements of the post. For example, at two posts, applicants of registered E-2 companies must provide their resume and a company letter that outlines the applicant’s specific role within the company, and do not need to provide any other supporting documentation regarding the company or underlying investment. At these posts, consular officers review their E-2 company registration database to ensure that the company in question is registered with the post’s E-2 company registration program. Revetting policy: Two of 7 posts with E-2 company registration programs vet registered companies annually while the remaining five posts vet companies every 5 years. Consular managers added that if changes, such as changes in ownership, occur without the post knowing it, prospective applicants may no longer be eligible for the visa. However, according to consular managers, companies on the list are required to contact their post sooner than the 5- or 1- year renewal period if there are any changes in the company that would impact visa eligibility for company investors or employees. Although such programs may allow posts to more efficiently adjudicate E- 2 visas, the variation in these programs may result in different processing of companies and applicants across posts, as well as acceptance of varying levels of risk by posts. The more time a post allows companies before reassessing the company’s eligibility for registration, the more risk that post is assuming, as the companies may no longer meet the eligibility requirements and continue to send or keep employees in the United States on E-2 visas for which they are not eligible. According to Standards for Internal Control in the Federal Government, management should design and implement policies and procedures that enforce management’s directives to achieve the entity’s objectives and address related risks. However, State’s Bureau of Consular Affairs has not provided posts with minimum standards governing the implementation of E-2 company registration programs, and thus, it is unclear whether the variations among these programs are consistent with the agency’s requirements and objectives. Establishing minimum standards for posts that choose to implement such programs would better ensure that all posts’ E-2 visa adjudication processes are aligned with State’s policies, objectives, and risk tolerance. State and USCIS require certain information and documents be retained for all E-2 applications and petitions; however, during our file review of State and USCIS E-2 adjudications, we identified that some required documents were missing from State files; USCIS was able to provide copies of all the documents required to be retained for each file we reviewed. State. State’s FAM includes requirements related to the collection of E-2 visa application information for all E-2 principals (i.e. investors, managers, and essential employees). Principal investors provide their information when they complete their application online, which is automatically uploaded to State’s consular database system. However, managers and essential employees provide some information by completing a paper form DS-156E, and the FAM requires officials to scan the forms each applicant’s record. On the basis of our file review, we estimate that about 20 percent of fiscal year 2018 E-2 application files for managers and essential employees were missing required documentation, either in part or in full. Specifically, 14 percent of E-2 applications were missing the entire DS- 156E, and 8 percent (6 of 80) were missing pages of the DS-156E. According the Standards for Internal Control in the Federal Government, management performs ongoing monitoring of the design and operating effectiveness of the internal control system as part of the normal course of operations. Ongoing monitoring includes regular management and supervisory activities. According to State officials, the responsibility for ensuring that document retention is consistent with standards rests with posts, and consular managers are responsible for ensuring compliance. State officials noted that the Bureau of Consular Affairs does not have an ongoing monitoring process in place to ensure that posts are complying with the FAM requirement. Developing a process to ensure that posts are retaining all required E-2 visa documentation by monitoring implementation of the requirement could better position State to be able to access applicant information, should it be needed for law enforcement, anti-fraud, or security purposes later. USCIS. According to USCIS officials, USCIS requires the I-129 petition, supporting documentation, and decision letters for refused petitions to be retained for all petitioners. As part of our review of petition files, we requested 124 randomly selected fiscal year 2018 petition files for investors, managers, and essential employees. In response, USCIS was able to provide us with all of the required elements for each of the petition files. State has resources to help combat nonimmigrant visa fraud, including for E-2 visas. State officials said that the resources available and the steps they take if E-2 fraud is suspected are similar for all types of visa fraud. If a consular officer reviewing an E-2 visa application suspects fraud— either during prescreening or after the interview—the officer is to make a fraud referral to the post’s fraud prevention manager or to diplomatic security officials. According to State officials, not every case with potential fraud concerns will be referred for additional investigation. If a consular officer does not find the applicant to be qualified or overcome immigrant intent, officers may refuse the case without additional fraud assessments. Fraud prevention managers, who are part of State’s Bureau of Consular Affairs, investigate fraud cases and provide information on fraud trends to consular officers. At some posts, State’s Bureau of Diplomatic Security’s ARSO-Is specialize in criminal investigations of visa fraud and coordinate with local law enforcement. Both fraud prevention managers and ARSO-Is are to conduct additional research to determine if fraud exists, such as through open source searches, interviews, and coordination with other U.S. and local government entities. State officials we spoke with stated that they take fraud in all visa fraud categories seriously, but generally consider E-2 visa fraud to be lower risk relative to other visa categories because they believe the large amount of complex paperwork required for the visa would discourage malicious actors. For example, consular officers at 12 of the 14 posts we interviewed stated that E-2 visas were a low fraud risk. Similarly, consular managers at 10 of the 14 posts stated that E-2 visa fraud was generally not a concern at their post. State headquarters officials attributed the low fraud risk to the large amount of paperwork that is required, which includes complex financial documents and U.S. government produced tax forms. For example, State headquarters officials indicated that, given the documentation burden for both the applicant and the company, the E-2 nonimmigrant classification may be less susceptible to fraud than other nonimmigrant classifications. According to State’s E-2 fraud data, the number of E-2 fraud referrals has decreased since fiscal year 2015, but the number of confirmed fraud cases was consistent from fiscal years 2014 through 2018, as shown in figure 15. There was an initial increase in referrals from fiscal year 2014 to 2015, which State officials attributed to consular staff more consistently making such requests through the official system of record rather than by email. From fiscal years 2015 through 2018 the number of E-2 visa fraud referrals decreased each year, from 664 in fiscal year 2015 to 280 in fiscal year 2018. Throughout this time period, the number of confirmed fraud cases stayed about the same, ranging from 39 to 59 cases per year. Although consular officials at 12 of the 14 posts considered E-2 visas to be low fraud risk, consular officers also identified country-specific E-2 fraud trends and indicators that they monitored at their post, as appropriate, such as the type of business, the location of the business, or the nationality of the applicant. Some of the posts in our review have taken additional actions to address E-2 fraud, such as additional fraud reviews and conducting validation studies: Additional fraud review: Consular managers at one post told us that the post has devoted additional resources to ensure that all E-2 visa applications undergo an additional fraud review, given that E-2 visas can have a relatively long validity period than most nonimmigrant visas. At this post, all E-2 visa applications are sent to the fraud prevention manager and the ARSO-I, both of whom conduct additional research and look for fraud indicators. Validation study: Validation studies determine the extent to which foreign nationals who were issued visas later overstayed or misused their visa, and can be conducted by post officials for any visa classification. One post in our review conducted a validation study that focused on E-2 visas that post had issued to foreign nationals associated with food service companies (e.g., restaurants) to determine how many remained in business and how many E-2 visa holders continued to travel or stay in the United States after the business failed. According to this 2016 validation study, the post had concluded that almost one-quarter of food service companies in its study had failed within about three years, and nearly half of E-2 visa holders for those companies did not depart after the company had failed or continued to travel to the United States on their E-2 visa. According to the post’s fraud team, the study showed that even prospective E-2 visa enterprises that meet the applicable requirements at the time of application can become unqualified over time, and that adjudicators should take long-term viability into account when determining the marginality of a business. The post’s fraud team also stated that other posts may wish to consider standardized follow- ups for approved E-2 enterprises and routine confirmations of vetted E companies as the E-2 visa category continues to grow in popularity. USCIS officials stated they consider E-2 fraud to be a significant issue and take several steps to identify fraud, including fraud referrals, fraud assessment technology, and site visits. First, according to USCIS officials, immigration officers reviewing the E-2 petition look for anomalies and other indicators of fraud and send a fraud referral for any potential fraud cases by forwarding the case to the service center’s fraud detection office. Immigration officers in the fraud detection office then are to conduct further research, such as reviewing open sources (e.g., company website) or may request a site visit to the business. Second, USCIS uses a fraud assessment technology on all petitions to determine if an E-2 company exists and is financially viable. Specifically, the Validation Instrument for Business Enterprises (VIBE) is a technology that helps immigration officers to determine if a business is operating, financially strong and viable, has good credit, and has not been involved in past fraud. According to USCIS officials, VIBE reviews existing business-related information on an enterprise, such as an office supply store account or utility bills, to determine if it is real and operating. Finally, immigration officers may request site visits based on their review of the application or VIBE results. During such site visits, immigration officers visit the business location to determine if the business is performing as stated in the petition and in compliance with the E-2 visa eligibility requirements. The results of the site visit are sent back to the originating location for adjudication. According to USCIS officials, if a larger conspiracy is uncovered, such as fraud involving multiple beneficiaries, the immigration officer may make a referral to U.S. Immigration and Customs Enforcement for further criminal investigation and potential prosecution, but added that this is very rare. USCIS immigration officers made 252 requests for site visits based on VIBE results from fiscal year 2014 through 2018 for E-2s. Of these site visits, USCIS determined there was confirmed fraud for 25 percent (63), as shown in figure 16. Of the 63 confirmed fraud cases, 42 enterprises were not located at the site provided in the petition and 14 enterprises had provided fraudulent documents or otherwise mispresented the facts. For example, in one case, the beneficiary paid a dental laboratory to assign her in a fictitious position of office manager so that she could obtain E-2 status, but the beneficiary had never worked there. In another example, an investor seeking E-2 status in May 2015 submitted a petition based on a discount store that had gone out of business in January 2013. According to USCIS officials, when fraud is confirmed, the immigration officer will deny the petition, review any pending or previously approved petitions from the petitioner, and fraud finding will be entered into VIBE, which affects the applicant’s ability to obtain future immigration benefits, including visa application or petition approvals from the United States government. State consular officers can also request that USCIS conduct site visits to help in its adjudication of E-2 visa applications, but USCIS data indicate that such requests are rare. According to USCIS, the agency received 10 external site visit requests from State from fiscal years 2014 through 2018. Of the 10 requests, USCIS conducted site visits to seven businesses and found one incidence of fraud involving a restaurant. According to State officials, site visits are considered to be resource intensive for the USCIS and can take several weeks or months to complete. The officials added that if a consular officer determines that an applicant is unqualified for the visa, it would not be considered an effective use of the post’s resources to conduct additional investigations or request a U.S.-based site visit from USCIS. Based on the results of the site visits and other factors, USCIS officials stated that they have prioritized E-2 fraud, and initiated a site visit pilot program in February 2018 to better determine the extent to which fraud exists. This pilot program focuses on businesses associated with individuals approved for an E-2 status extension and certain eligibility criteria. According to USCIS officials in July 2019, the most commonly encountered fraud or noncompliance issues thus far have involved enterprises that were not operational, not engaged in any business activities, or were not operating as stated in the petition. USCIS plans to continue the E-2 pilot into fiscal year 2020 and to share the results with State. State’s and USCIS’s respective roles in the E-2 process, along with a current lack of coordination on E-2 anti-fraud efforts, may contribute to the differences in the way the agencies view and prioritize the risks of E-2 fraud. Drawing on the results of its site visit pilot project, USCIS has said it views E-2 fraud as a significant issue and plans to prioritize efforts to combat E-2 fraud moving forward. While State has taken some steps to examine and combat E-2 visa fraud, officials we spoke with at posts and at headquarters told us that E-2 fraud is rare and generally low risk. The E-2 validation study that one post conducted, noted earlier, also provided evidence that E-2 fraud occurred, at least in that business sector from that particular country. While it is possible that additional validation studies across different posts and business sectors would uncover fraud trends, State officials noted that validation studies are resource intensive, and that E-2 visas represent only a small fraction of the total visas they adjudicate each year. Therefore, State officials stated that such studies are likely to be focused on more common visa types, such as tourist and business visitor visas. Although some factors may explain why USCIS and State view the risk of E-2 fraud differently, both agencies encounter foreign nationals seeking the E-2 status in the United States. Officials from both agencies stated that USCIS may be more likely to uncover fraud than State because USCIS processes E-2 status extensions for individuals already in the United States. E-2 principals (i.e., investors, managers, and essential employees) would have had up to 2 years to try to run, manage, or work for their business, with the intention to depart at the conclusion of their authorized period of stay. If they failed, gave up, or ended employment, but still sought an E-2 status extension, any materially false representations made as to their eligibility could be considered fraudulent. Officials from both agencies suggested that State may be adjudicating visas for more new businesses, which may qualify at the time of initial adjudication but could ultimately fail. However, during our observations and file reviews, we found that USCIS also adjudicates petitions for new businesses for beneficiaries seeking to change to E-2 status, and State also adjudicates E-2 visa applications for existing businesses that have previously been associated with E-2 visa holders. Further, neither State nor USCIS collect data that track the number of new businesses seeking E-2 status for their employees. As such, we cannot verify the accuracy of this reason for explaining why or if USCIS is more likely to encounter fraud among individuals seeking E-2 status than State. Both State and USCIS collect information that could potentially be useful to each other’s activities to identify and address E-2 fraud, but the agencies do not have a mechanism for regular coordination on fraud. For example, as previously noted, consular officers adjudicating E-2 visas overseas learn to identify country-based fraud trends as well as trends specific to E-2 visas. USCIS immigration officers can identify similar trends, and the results of USCIS’s site visits may further identify potential fraud trends that would be useful for State consular officers. However, interagency coordination is ad hoc, generally among headquarters officials only, and relatively rare. For example, both State and USCIS officials stated that the main formal mechanism of coordination on all E-2 visa issues is a quarterly teleconference. However, such meetings were cancelled 7 out of 8 times in fiscal years 2017 and 2018 because officials did not identify agenda topics to discuss, according to State and USCIS officials. Further, such meetings have not included discussions of E-2 fraud issues. State officials stated that they share country fraud summaries with USCIS. However, these fraud summaries do not focus on E-2 visas, but fraud trends more generally. According to A Framework for Managing Fraud Risks in Federal Programs, agencies should establish collaborative relationships with stakeholders to share information on fraud risks and emerging fraud schemes, as well as lessons learned related to fraud control activities. Managers can collaborate and communicate through a variety of means, including task forces, working groups, or communities of practice. Although State and USCIS have some informal mechanisms in place to share fraud-related information, such as emails among headquarters officials and by sharing high-level country fraud reports, formal information sharing mechanisms have not been regularly operating. Although the two entities view the risk of E-2 fraud visa differently, both State’s and USCIS’ E-2 antifraud efforts would benefit from ensuring that they regularly share information on fraud risks. Doing so will help both entities to better identify emerging fraud trends, prevent foreign nationals from fraudulently obtaining E-2 status, and identify areas for potential collaboration and resource sharing. The E-2 nonimmigrant classification helps to facilitate foreign investment in the United States, which contributes to the U.S. economy each year. State and USCIS share the responsibility for adjudicating thousands of E- 2 visa applications and petitions annually for foreign nationals seeking E- 2 status. Both State and USCIS officials stated that given the complexity of adjudicating E-2 applications and petitions, and the level of documentation and time required, the E-2 adjudication process can present challenges with respect to the analysis of E-2 eligibility requirements. State consular officers, managers, and LES noted that additional training and resources are needed to help them better understand the eligibility requirements and supporting financial and business documents. Enhancing E-2 training and providing additional resources such as documents clarifying E-2 eligibility requirements would help better ensure that consular officers and LES prescreening and adjudicating these visas have the necessary knowledge, skills, and abilities to carry out their responsibilities effectively across posts worldwide. Additionally, some overseas State posts have developed E-2 company registration programs to more efficiently process and adjudicate E-2 visa applications. Although there are benefits to such programs, the variation in the standards of these programs may result in different processing of companies and applicants across posts, as well as acceptance of varying levels of risk by posts. Establishing guidance or minimum standards for posts that choose to implement such programs would better ensure that all posts’ E-2 visa adjudication processes are consistent with State’s policies, objectives, and risk tolerance. Further, State and USCIS require certain information and documents be retained for all E-2 applications and petitions; however, during our file review of State and USCIS E-2 adjudications, we identified that some required documents were missing from State files. Ensuring that posts retain all required E-2 documentation would better position State to be able access applicant information, which could be needed for law enforcement, anti-fraud, or security purposes later. Finally, although State and USCIS collect information that could potentially be useful to each other’s activities to address E-2 fraud, coordination between State and USCIS on E-2 fraud has been ad hoc, generally among headquarters officials only, and relatively rare. Developing regular coordination mechanisms would help both entities to better identify emerging fraud trends and prevent foreign nationals from fraudulently obtaining E-2 status. We are making the following five recommendations to State and USCIS: The Assistant Secretary of State for Consular Affairs should provide additional training or related resources to consular officers and locally employed staff on adjudicating E-2 visas, to cover topics that include the E-2 eligibility requirements and understanding business- and tax- related documents. (Recommendation 1) The Assistant Secretary of State for Consular Affairs should develop minimum standards for E-2 company registration programs, such as standards for how often companies are to be re-vetted. (Recommendation 2) The Assistant Secretary of State for Consular Affairs should develop and implement a process to ensure that posts maintain required E-2 visa application documentation. (Recommendation 3) The Secretary of State, in coordination with the Director of USCIS, should establish regular coordination mechanisms to share information on E-2 fraud risks. (Recommendation 4) The Director of USCIS, in coordination with the Secretary of State, should establish regular coordination mechanisms to share information on E-2 fraud risks. (Recommendation 5) We provided a draft of this report to State and DHS for their review and comment. State and DHS provided written comments, which are reproduced in appendices IV and V, respectively. Both State and DHS concurred with our recommendations. State and DHS also provided technical comments, which we incorporated as appropriate. State concurred with all four recommendations addressed to it in the report (recommendations 1, 2, 3, and 4), and described actions it plans to take in response. To address recommendation 1, State plans to increase the frequency and specificity of E-2 content through webinars, workshops, and guidance, and by developing subject matter experts domestically who can provide consultative services on an as-needed basis for business and tax-related documents. To address recommendation 2, State plans to require a minimum 5-year mandatory review of companies registered at any post using a company registration program. To address recommendation 3, State plans to reinforce its E-2 visa documentation retention policy in regular policy guidance to consular managers. To address recommendation 4, State plans to hold regular, high-level coordination meetings with USCIS to include coordination on E visa adjudication standards. DHS concurred with recommendation 5, and stated that the department plans to share the results of its site visits during quarterly coordination meetings with State. These actions, if effectively implemented, should address the intent of our recommendations. We are sending copies of the report to the Acting Secretary of Homeland Security, Secretary of State, and appropriate congressional committees. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Rebecca Gambler at (202) 512-8777 or gamblerr@gao.gov or Jason Bair at (202) 512-6881 or bairj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report reviews the Department of State’s (State) and Homeland Security’s (DHS) U.S. Citizenship and Immigration Services’ (USCIS) oversight and implementation of E-2 adjudications. Specifically, this report examines (1) the outcomes and characteristics of foreign nationals who have sought or received E-2 status during fiscal years 2014 through 2018, (2) State’s and USCIS’s policies and procedures to ensure that individuals meet E-2 eligibility requirements, and (3) State’s and USCIS’s efforts to assess and address potential fraud in the E-2 adjudication process. To determine the outcomes and characteristics of foreign nationals who have sought or received E-2 status, we analyzed data from State’s Bureau of Consular Affairs and USCIS on E-2 visa applications and petitions adjudicated from fiscal years 2014 through 2018. For example, the data we analyzed included E-2 role (e.g., investor, manager, essential employee, and dependents), adjudication outcome (i.e., issued or refused), and nationality, among other data points. To assess the reliability of the E-2 data, we interviewed State and USCIS officials that maintain the data and checked the data for missing information, outliers, and obvious errors, among other actions. For example, we identified and removed duplicate entries in State’s data. On the basis of these steps, we determined that the data were sufficiently reliable for the purposes of our reporting objectives, including providing summary statistics on E-2 adjudications, outcomes, and the characteristics of those seeking E-2 status. To obtain additional data points, such as types of business and investment amount, we analyzed generalizable stratified random samples of E-2 visa applications and petitions adjudicated in fiscal year 2018. Specifically, we reviewed 124 E-2 petitions from USCIS and 120 State applications for E-2 investors, managers, and essential employees. The documents in our file review included, for example, State’s DS-160 online nonimmigrant visa application and DS-156E supplemental application, USCIS’s I-129 petition for nonimmigrant workers, and supporting documents, when available. To collect information from the applications and petitions, we created a data collection instrument and established standard procedures to ensure that we accurately collected the information from the original forms. We chose sample sizes to achieve precision levels for a percentage estimate of plus or minus 10 percentage points for important sub-populations, such as denied petitions and role (e.g., investor, manager, and essential employee). As a result, all percentage estimates presented in this report have a precision of plus or minus 10 percentage points or fewer, unless otherwise noted. Further, we classified the types of businesses in the applications and petitions using the North American Industry Classification System by conducting a content analysis of the business description field in the applications and petitions to group related business types into larger groups, such a food service and manufacturing. Further, we also collected and analyzed data and information from USCIS and U.S. Customs and Border Protection on post E-2 adjudication outcomes, including changing status from E-2 to another nonimmigrant category, adjusting from E-2 status to lawful permanent residency, and E- 2 nonimmigrants who remain in the United States beyond the expiration of their authorized period of stay, known as overstays. We present the results of this analysis in Appendix III. To assess the reliability of these data, we interviewed officials that maintain the data and checked the data for missing information, outliers, and obvious errors, among other actions. On the basis of these steps, we determined that the data were sufficiently reliable for the purpose of providing summary statistics on E-2 post adjudication outcomes. To assess State and USCIS policies and procedures to ensure that individuals meet E-2 eligibility requirements, we reviewed relevant State and USCIS guidance documentation, including State’s Foreign Affairs Manual and USCIS’s E-2 standard operating procedures. We also reviewed relevant provisions of the Immigration and Nationality Act and implementing regulations, which set forth the E-2 eligibility requirements. We interviewed officials from State’s Bureau of Consular Affairs and Foreign Service Institute, and USCIS on their respective agencies’ E-2 processes and procedures, as well as training provided to State’s consular officers and USCIS’s immigration officers. Further, we assessed State’s and USCIS’s policies and procedures to ensure that individuals meet E-2 eligibility requirements against control environment, control activities, and monitoring internal control standards in Standards for Internal Control in the Federal Government, as well as documentation retention requirements in agency guidance. We conducted site visits to State and USCIS locations that adjudicate E-2 visas and petitions, respectively. For State, we conducted site visits to four posts abroad—London, United Kingdom; Seoul, South Korea; Tokyo, Japan; and Toronto, Canada from October through December 2018. For our site visits, we selected posts that (1) were among the 10 highest E-2 adjudicating posts by volume in fiscal year 2017, (2) had different staffing models for processing E-2 visa adjudications, such as posts that had a single officer specializing in E-2 visas or posts that had all consular officers adjudicate E-2 visas, and (3) were geographically dispersed. During these visits, we observed the prescreening and adjudication of E-2 applications and used a data collection instrument to collect information on the cases we observed, such as adjudication outcome and other non- personally identifiable information about the case. We interviewed consular officers and managers, locally employed staff (LES), fraud prevention managers, and the assistant regional security officer- investigators (ARSO-I), where available, about topics such as E-2 visa adjudication policies, procedures, resources and training available at post. Our observations from these site visits provided useful insights into State’s E-2 adjudication procedures, but are not generalizable to all posts that adjudicate E-2 visas. For USCIS, in November 2018, we visited the California Service Center in Laguna Niguel, California—which is the only USCIS service center that adjudicates E-2 petitions—to observe E-2 petition adjudications and interview USCIS officials. In addition to our site visits, we conducted telephonic interviews with consular officers and LES who are responsible for prescreening and adjudicating E-2 visa applications at the remaining six of the top 10 posts in terms of E-2 annual adjudications, as well as four randomly selected low-volume posts. The 4 low-volume posts were selected at random from a list of posts that had adjudicated at least 100 E-2 visa applications in fiscal year 2017. We collected copies of post-specific standard operating procedures and local E-2 visa adjudication tools (e.g., checklists), as available, from the 14 posts we visited or interviewed. Further, we reviewed written responses from the consular managers responsible for supervising E-2 visa adjudications at these 14 posts to a set of questions regarding E-2 adjudication processes and procedures, challenges, E-2 company registration programs, and E-2 training. To determine the efforts that State and USCIS take to assess and address E-2 fraud, we reviewed relevant State and USCIS standard operating procedures and guidance. We interviewed headquarters officials from State and USCIS, such as State’s Office of Fraud Prevention Program and USCIS’s Fraud Detection and National Security Directorate, on how both agencies identify and address potential E-2 fraud and what, if any, coordination or information sharing occur between State and USCIS. During our 4 site visits abroad, we interviewed officials, such as fraud prevention managers and ARSO-Is, on anti-fraud efforts for E-2 visas at their posts, including potential fraud trends. Similarly, we interviewed immigration officers at USCIS’s California Service Center on their anti-fraud efforts for E-2 petitions. We obtained data from State and USCIS on fraud referrals—that is, cases sent to fraud experts for additional research and review—and the results of fraud site visits from fiscal year 2014 through 2018. To assess the reliability of these data, we interviewed State and USCIS officials that maintain the data and checked the data for missing information, outliers, and obvious errors, among other actions. On the basis of these steps, we determined that the data were sufficiently reliable for the purposes of our reporting objectives, including providing summary statistics on fraud referrals and the results of fraud site visits. Further, we assessed State’s and USCIS’s anti-fraud efforts against best practices found in A Framework for Managing Fraud Risks in Federal Programs. We conducted this performance audit from July 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Immigration and Nationality Act requires the existence of a qualifying treaty of commerce and navigation between the United States and a foreign state in order for E-2 visa classification to be accorded to nationals of that foreign state. According to Department of State guidance, such qualifying treaties may include treaties of friendship, commerce and navigation, and bilateral investment treaties. As of June 2019, nationals of the 82 countries listed in Table 7 may be accorded E-2 status pursuant to a qualifying treaty, or pursuant to legislation enacted to extend that same privilege. This appendix presents various statistics on adjudications by State for E-2 visas as well as those by U.S. Citizenship and Immigration Services (USCIS) for E-2 petitions for fiscal years 2014 through 2018. We present these data broken out by fiscal year, outcome (e.g., issued or refused), type (e.g., investor, manager, essential employee, dependent), country of nationality or birth, reason for refusal, and prior nonimmigrant status, if available. Further, we also provide statistics on some post-adjudication outcomes—that is, data on characteristics of those who obtained E-2 status. These outcomes include changes to another nonimmigrant status or lawful permanent residency, or the extent to which E-2 status holders remained in the United States beyond their authorized period of stay, known as overstaying. For the purposes of this appendix, there are four potential roles for foreign nationals seeking E-2 status. First, a foreign national who has committed funds to a U.S. enterprise and is in a position to develop and direct the operations of the enterprise in which he or she has invested substantial capital is known as an investor. Second, a foreign national employee in an executive or supervisory position is known as a manager. Third, a foreign national employee, in a lesser capacity than a manager, but having special qualifications essential to successful or efficient business operations, is known as an essential employee. Finally, the spouse or qualifying child of an investor, manager, or essential employee is known as a dependent. State consular officers will adjudicate the visa application as either issued or refused. A foreign national seeking E-2 status as an investor, manager, or essential employee is known as a principal, and a spouse or qualifying child of a principal is known as a dependent. Foreign nationals seeking E- 2 status through USCIS use different forms based on whether they are a principal or a dependent. USCIS immigration officers will generally adjudicate the petition as either approved or denied. Change of Status From E-2 to Another Nonimmigrant Category. From fiscal years 2014 through 2018, about 5,000 foreign nationals sought to change from E-2 status to another nonimmigrant status. As shown in figure 17 and table 16, most of these requests were to change to academic student status (F-1, 31 percent), temporary workers in specialty occupation status (H-1B, 10 percent), tourist status (B-2, 9 percent), and intracompany transferee executive or manager status (L-1A, 7 percent), as well as dependents of these statuses. Further, about 11 percent of these foreign nationals were requesting to change from one role within E- 2 status to another. As previously noted, this could include, for example, a spouse of an E-2 investor later seeking to work at the company as a manager. Adjusting from E-2 Status to Lawful Permanent Resident. From fiscal years 2014 through 2018, over 22,000 foreign nationals changed from E- 2 status to lawful permanent residents. The large majority of these (73.1 percent) were employment-based (i.e., sponsored by a U.S. employer), as shown in figure 18 and table 17. Overstays. According to DHS data, a relatively low percentage of foreign nationals with E-2 status—obtained either through an E-2 visa from State or an approval to change to, or extend, their E-2 status from USCIS— overstayed their authorized period of admission compared to other nonimmigrant statuses. From fiscal years 2016 through 2018, DHS reported that the total overstay rate decreased slightly from 1.5 percent to 1.2 percent. Similarly, the overstay rate for E-2 status for the same years decreased from 0.8 percent from 0.6 percent, as shown in table 18. As we previously reported, U.S. Customs and Border Protection (CBP) implemented system changes in 2015 that allowed CBP to identify E-2 overstays, along with other nonimmigrant categories beginning in fiscal year 2016. DHS officials stated that the process to track E-2 visa overstays is the same as with other visa categories. They noted that specific visa categories are not prioritized; CBP and U.S. Immigration and Customs Enforcement focus on those overstays where the individual is identified as a national security or public safety risk. In addition to the individuals named above, Adam Hoffman (Assistant Director), Kim Frankena (Assistant Director), Erin O’Brien (Analyst-in- Charge), Juan Pablo Avila-Tournut, Kristen E. Farole, James Ashley, Caitlin Cusati, Eric Hauswirth, Amanda Miller, Sasan J. “Jon” Najmi, Adam Vogt, and K. Nicole Willems made significant contributions to this report.", "summary": "Foreign nationals from 82 countries may obtain E-2 nonimmigrant investor status in the United States. The E-2 nonimmigrant classification allows an eligible foreign national to be temporarily admitted to the United States to direct the operations of a business in which they have invested a substantial amount of capital, or to work in an approved position (e.g., manager or essential employee). To obtain E-2 status, a foreign national can apply through State for an E-2 visa abroad, or if already in the United States, by petitioning USCIS to extend or change to E-2 status. GAO was asked to review State's and USCIS' E-2 adjudication process. This report addresses: (1) outcomes and characteristics of foreign nationals who sought or received E-2 status from fiscal years 2014 through 2018, (2) policies and procedures for ensuring that individuals meet E-2 eligibility requirements, and (3) efforts to assess and address potential E-2 fraud. GAO analyzed State and USCIS data on E-2 adjudications, generalizable samples of E-2 visa applications and petitions, and relevant documents. GAO interviewed officials at 14 State posts abroad, selected based on E-2 application volume and other factors, and observed E-2 adjudications at four of these posts and USCIS's California Service Center. The Department of State (State) and U.S. Citizenship and Immigration Services (USCIS) annually adjudicated about 54,000 visa applications or petitions from fiscal years 2014 through 2018 for foreign nationals seeking E-2 nonimmigrant status, over 80 percent of which were approved. About eighty percent of E-2 adjudications were for State visa applications, and the remaining 20 percent were for USCIS petitions to extend or change to E-2 status. Generally, about half of the foreign nationals seeking E-2 status were investors, managers, or essential employees of an E-2 business, and the other half were their spouses or children. State and USCIS have guidance, procedures, and training intended to help consular and immigration officers ensure foreign nationals meet E-2 eligibility requirements; however, officials GAO interviewed from both agencies identified challenges in the E-2 adjudication process. State. Consular officers noted that E-2 visa adjudications are complicated and resource-intensive, often requiring more documentation and time to complete than other visas. For example, the requirement that the investment in the business be substantial does not prescribe a minimum capital amount. Rather, the investment must be large enough to support the likely success of the business, among other criteria. Consular officers at 10 of 14 posts GAO interviewed indicated that determining the investment's substantiality is difficult for newly encountered business types. Providing additional E-2 training or related resources would help ensure that consular officers and locally employed staff have the necessary knowledge and abilities to carry out their responsibilities. USCIS. Officials identified similar challenges with respect to E-2 adjudications. However, officials stated that colocating immigration officers who adjudicate E-2 petitions helps to mitigate the challenges because the officers can communicate with each other on how USCIS has typically adjudicated such cases. State and USCIS have resources to address E-2 fraud, which includes submitting falsified documents or making false statements material to the adjudication; however, coordination on E-2 anti-fraud efforts is limited. State has anti-fraud efforts in place for all nonimmigrant visa types, but State officials stated that they consider E-2 visa fraud to be lower risk compared to other visas because the large amount of complex paperwork required for the E-2 visa discourages malicious actors. USCIS officials consider E-2 fraud to be a significant issue and have taken steps to identify fraud, such as using fraud assessment technology to determine if a business is financially viable and conducting site visits if fraud is suspected. Both State and USCIS collect information that could be useful to each other's anti-fraud efforts, but interagency coordination on E-2 fraud issues is ad hoc and relatively rare. For example, the main formal mechanism of coordination on E-2 visa issues—a quarterly teleconference—was cancelled 7 out of 8 times in fiscal years 2017 and 2018. Coordinating regularly on fraud issues, which is a best practice from GAO's Fraud Risk Framework, will help both entities to better identify emerging E-2 fraud trends and areas for potential resource sharing. GAO is making five recommendations, including that State provide more E-2 training or resources to consular officers, and that State and USCIS establish a regular coordination mechanism to share information on E-2 fraud risks. State and USCIS concurred with all five recommendations.", "document_type": "gao"}
{"report": "For the T-2017 contracts, DHA consolidated its TRICARE regions from three regions (North, South, and West) to two regions (East and West). Humana Government Business is the managed care support contractor for the East Region, and Health Net Federal Services is the managed care support contractor for the West Region. Health care delivery under the T-2017 contracts began on January 1, 2018. DHA expects the costs of the two contracts to total approximately $58 billion over a 5-year performance period, which is scheduled to end on December 31, 2022. The primary responsibilities of the managed care support contractors include the following: developing civilian provider networks, which include hospitals and processing referrals and authorizations for beneficiaries to receive processing health care claims; providing comprehensive, readily accessible customer services for beneficiaries and providers; and establishing and maintaining a medical management program that includes requirements in the TRICARE Operations Manual. In addition, DHA officials told us that they have begun their planning activities for the fifth generation of TRICARE contracts, referred to as the T-5 contracts. If DHA exercises all option years for the T-2017 contracts, health care delivery under the T-5 contracts is expected to begin in 2023. DHA’s acquisition process for the T-2017 contracts consisted of four steps: (1) planning the acquisition, (2) issuing the Request for Proposals (RFP) and soliciting responses, (3) awarding the contracts, and (4) post award activities (see figure 1). 1. Acquisition planning. DHA defined the contract requirements—the work to be performed by the contractor—and developed an acquisition plan to meet those requirements. The T-2017 program manager and contracting officer developed key acquisition documents—including the T-2017 Acquisition Strategy and the Acquisition Plan—and conducted market research. The T-2017 Acquisition Strategy provides a high-level description of the milestones in the acquisition process and how those milestones will be achieved. The T-2017 Acquisition Plan outlines the specific actions necessary to execute the approach outlined in the approved acquisition strategy. 2. Request for proposals. DHA issued an RFP that documented the requirements for T-2017—including the contract type, significant contract dates, pricing arrangements, and the criteria to be used to assess offerors’ proposals. 3. Award. DHA established a source selection team to evaluate the proposals received in response to the RFP. The source selection authority selects the winning proposals using a best value tradeoff process after considering reports written by other members of the source selection team. 4. Post-Award Activities. DHA provides a 12-month transition period between its outgoing and incoming contractors to ensure that its incoming contractors are prepared for their new responsibilities. The transition period for the T-2017 contracts began on January 1, 2017, and ended on December 31, 2017. The incoming contractors assumed full responsibility for health care delivery on January 1, 2018. The NDAA 2017 required a number of changes to the TRICARE program through its contracts. Specifically, section 705(a) of the NDAA 2017 required DOD to develop and implement value-based incentive programs in its contracts to help improve the quality of health care services provided to eligible TRICARE beneficiaries by rewarding civilian providers with additional payments for improved performance based on certain metrics. In addition, section 705(c) of the NDAA 2017 directed the department to develop and implement a strategy—by January 1, 2018— for its TRICARE contracts that includes 13 specific elements, such as telehealth services and beneficiary referrals, among others (see table 1). The act required DOD to modify its TRICARE contracts to ensure consistency with the required strategy providing for the 13 elements. DHA made selective changes between the T-3 and T-2017 contracts and acquisition strategy. According to DHA officials, the contracts are generally the same, and changes were made to clarify or streamline TRICARE requirements and administrative processes. The T-2017 Acquisition Strategy states that the T-2017 performance work statement, which identifies the TRICARE requirements to be implemented by the contractors, is essentially unchanged from the T-3 contracts. DHA officials explained that their leadership prioritized the continuation of beneficiary services during the T-2017 planning process over making significant changes to contract requirements that could potentially be disruptive. We found that some of the changes that were made to the T- 2017 contracts are consistent with specific provisions and themes we identified in prior NDAA legislation. Although the NDAA 2017 was enacted after the T-2017 contracts had been awarded, some of the contract changes for T-2017 may be consistent with specific provisions outlined in section 705(c)(1), such as provisions related to improving access to care, health outcomes, health care quality, beneficiaries’ experience, as well as lowering health care costs. However, DHA officials stated that because health care delivery under the T-2017 contracts began in 2018, it is too early to measure any benefits from these changes. These contract changes include (1) the consolidation of contract regions, (2) the combining of administrative costs, and (3) the introduction of new contract incentives. 1. Consolidation of contract regions. While DHA awarded the T-3 contracts for three regions (West, South, and North), it consolidated two of the regions (North and South) for the T-2017 contracts (see figure 2). By eliminating the additional regional contract, DHA anticipates a savings of approximately $25 million a year in overhead and management costs. In addition, beneficiaries are less likely to have a disruption in care when moving. For example, beneficiaries who moved between the former North and South regions would now stay enrolled with the same contractor in the larger East region. 2. Combined administrative costs. For T-2017, DHA combined all administrative costs in one contract line item in order to lower total cost of care. For example, under the T-3 contracts, DHA reimbursed the contractors for processing individual claims with a higher rate for paper claims and a lower rate for electronic claims. Without a difference in costs for T-2017, contractors are incentivized to lower their costs and prioritize electronic claims, which DHA officials say are more efficient. 3. Contract incentives. DHA incorporated incentives into the T-2017 contracts to encourage contractors to negotiate reimbursement rate discounts with network providers in order to reduce health care costs. The T-2017 contracts state that the contractor must meet a required discount rate on care provided by network providers. If this discount rate is not met, DOD will offset the discount deficit amount from the next payment due to the contractor. DHA expects that negative incentive will reduce health care costs and result in government savings. We also found examples of changes to the contract or acquisition process for T-2017 that are consistent with selected acquisition themes we identified in prior NDAA legislation. These acquisition themes are 1) leveraging commercial best practices, 2) promoting competition, and 3) focusing on value. We previously reported that the identified acquisition themes can reduce costs and increase value for the government. 1. Leveraging commercial best practices: T-2017 required contractors to increase utilization of commercial best practices, including the use of automation technology to process referrals and authorizations, episodes of care, and procedure diagnosis coding. As we have previously reported, federal agencies can leverage commercial best practices to lower costs and maximize the value of the services they buy. According to DHA officials, adapting automation technology already in use in the health care industry should improve the quality of services, beneficiary satisfaction, and result in cost savings to the government. In addition, officials from one of the current TRICARE contractors stated that the T-2017 RFP was structured to incentivize contractors to innovate and bring best practices from their industry experience in both the commercial sector and other government programs, such as Medicare. For example, the T-2017 contract included a new requirement for contractors to use industry best practices when collecting health care data, in order to identify and reduce gaps in care and enhance quality of care for beneficiaries. 2. Promoting competition: We found that DHA made an effort to promote competition for the T-2017 RFP. Competitive contracts can result in cost savings for the federal government and promote accountability for results. In the acquisition planning phase, DHA identified an increased number of interested contractors through market research, from eight for T-3 to 22 for T-2017. In addition, DHA officials stated that they took steps during the acquisition planning process to ensure that the incumbent contractors did not have a significant advantage over prospective contractors. For example, the T-2017 contracting officer was assigned early in the planning process and did not participate in management of the T-3 contracts or in interactions with the incumbent contractors. DHA officials stated that they expected greater contractor interest in the East region because the larger beneficiary population of that region would result in a more valuable contract. However, DHA received a total of seven proposals each for T-3 and T-2017, including one new company that participated in T-2017 but had not previously submitted a proposal for T-3. 3. Focusing on value: We found that DHA’s approach for T-2017 emphasizes value and quality, not just lower costs. Specifically, DHA focused on the value of improving health care by considering the total cost of care over time, rather than the cost of individual health care. This is reflected in the T-2017 Acquisition Strategy, which prioritizes quality and delivery of health care above lowest cost. For example, the T-2017 contracts required additional preventive screenings and diseases covered under a chronic care program to achieve improved quality of care despite the cost of screenings. We have previously reported that these preventive health services are determined to be cost-effective when they improve the benefit (e.g., health outcomes) in a less costly way than a given alternative care option. Some preventive services may also result in cost savings, where the cost of implementing the service is less than the expected future costs to treat a disease or condition. As of October 2019, DHA had implemented two of the three value-based pilots described in its January 2018 report to Congress, which outlines the department’s plans for addressing the NDAA 2017’s requirement for developing value-based incentive programs. Specifically, in this report, DHA described its intent to implement three value-based pilots in response to section 705(a) of the NDAA 2017—(1) the Performance- Based Maternity Payments Pilot, (2) the Medication Adherence Pilot, and (3) the High-Value Primary Care Provider Pilot—through modifications to its TRICARE contracts over the next 6 to 18 months. 1. Performance-Based Maternity Payments Pilot. DHA modified its T- 2017 contracts to begin implementing the Performance-Based Maternity Payments Pilot in April 2018. This pilot was designed to provide both non-financial and financial incentives to hospitals that achieve and maintain excellence in maternity care quality. The first phase of this pilot focused on non-financial incentives by promoting greater transparency about the quality of maternity care delivered by hospitals in the TRICARE network. Specifically, DHA implemented a “steerage model” that identifies higher-performing hospitals in the managed care support contractors’ provider directories using specific visual prompts in order to encourage beneficiaries to seek care from those institutions. The second phase of the pilot began in October 2018 and incorporated performance-based payments, or financial incentives, for network hospitals that achieve a certain level of performance on specified maternity care quality measures. The anticipated end date for the pilot is March 2021. 2. Medication Adherence Pilot. DHA modified its TRICARE pharmacy contracts to begin implementing the Medication Adherence Pilot in February 2018. This pilot is designed to incentivize beneficiaries’ adherence to medication regimens by reducing or eliminating copayments for two medications (one for diabetes and another for cardiovascular-related illnesses). 3. High-Value Primary Care Provider Pilot. As of October 2019, DHA officials told us they were still assessing the feasibility of implementing the High-Value Primary Care Provider Pilot, which would provide financial incentives (such as additional payments or reduced network discounts) to primary care providers who exceed certain quality thresholds, as well as financial incentives (such as reduced co-shares and copayments) for beneficiaries who use these providers. DHA officials said other value-based efforts are being planned to address section 705(a) of the NDAA 2017, such as value-based pilots and demonstrations that aim to incentivize providers to provide quality care— including hospital, home health, and episode-based bundled payments pilots, among others. DHA has reported that these projects will offer DHA the opportunity to test value-based payment models and incorporate innovative ideas and solutions into its TRICARE contracts. As of January 2020, we found that DOD had partially implemented six of the 13 elements required by sections 705(c)(5) and (c)(6) in the NDAA 2017, in its T-2017 contracts. DHA leadership explained that they had decided that the department would separately address each of the 13 elements through modifications to the TRICARE contracts rather than developing a single strategy that would address all of the elements. According to DHA officials, some of the 13 elements would be implemented through modifications to the T-2017 contracts while other elements would be addressed in the T-5 contracts as certain elements would require more time to develop. Section 705(c)(5): This section includes nine elements that focus on various aspects of health care delivery. We found that DHA had partially implemented six of the nine elements—including provider networks, medical management, telehealth services, beneficiary enrollment, value-based methodologies, and prevention and wellness incentives (see table 2). Although DHA officials generally described their approach for addressing the three other elements, they were not able to provide documentation, such as implementation plans, with specific time frames or actions needed to fully implement each of them. Specifically, when asked about time frames for complete implementation, DHA officials told us that many of the elements should be addressed through the T-5 contracts. DHA officials also told us the department’s approach to addressing these elements—such as provider networks—will be informed by ongoing and future value- based pilots and demonstrations; however, data from these pilots and demonstrations are not expected to be available until they have concluded. Section 705(c)(6): This section included four required elements that focus on the delivery of health care in rural, remote, and isolated areas. DHA has not implemented any of these requirements. DHA officials told us they are considering requirements for T-5 that will address the four elements, but did not provide documentation with specific time frames and actions needed to fully implement each of them (see table 3). Without plans that include specific time frames and actions needed, it is unclear exactly how and when DHA will fully implement all 13 elements into its TRICARE contracts. As we have previously reported, sound planning calls for results-oriented organizations to develop plans that (1) provide tools to ensure accountability, such as time frames, and (2) identify specific activities to obtain desired results, among other things. Developing and implementing plans with time frames and actions needed can help to ensure that DHA fully implements all 13 required elements, which is particularly important since it is in the process of developing its T-5 contracts. The NDAA 2017 required DHA to make numerous changes to its TRICARE program—some of which impact its T-2017 managed care support contracts. In particular, the act required DHA to modify these contracts to ensure consistency with 13 specific elements related to improving health care delivery, such as with provider network flexibility, increased use of telehealth services, and prevention and wellness incentives, among others. While DHA has taken steps to begin implementing some of these elements in its current T-2017 contracts, it has not developed implementation plans with time frames and specific actions needed to guide its efforts, which could help ensure that DHA successfully implements all of the required elements. Until these elements are fully implemented, the department may not achieve the TRICARE program improvements Congress intended related to access to care, health outcomes, quality of care, beneficiaries’ experience, and cost efficiency. We are making the following recommendation to DHA: The Director of DHA should develop and implement plans with timeframes and specific actions needed for all 13 required elements to be reflected in the TRICARE contracts. (Recommendation 1) We provided a draft of this report to DOD for comment. In its written comments, reproduced in appendix I, DOD generally agreed with our findings and concurred with our recommendation. The department reiterated its plans to address each of the elements required by sections 705(c)(5) and (c)(6) in the NDAA 2017 as part of its T-5 contracts. DOD also provided technical comments, which we incorporated as appropriate. In addition, DOD provided updated information on the status of its efforts to address certain elements required by section 705(c)(5). As a result of this information, we updated the status of the following two elements from “not implemented” to “partially implemented” in our overall assessment for the following reasons: 1) Provider Networks: The department provided evidence that the Accountable Care Organization demonstration was implemented on January 1, 2020, and that beneficiaries were enrolled in the program. 2) Medical Management: The department provided evidence that it awarded a contract for the TRICARE Select Patient Navigator Pilot on December 27, 2019, and that the contractor began work on January 1, 2020. The department also provided updates on the status of two additional elements—Financial Incentives and Medical and Lifestyle Incentives. However, while we updated the department’s plans for these elements in the report, we determined that their status should remain “not implemented” in our overall assessment for the following reasons: 1) Financial Incentives: The department provided evidence that it plans to provide financial incentives to Kaiser Permanente providers on an annual basis under the Accountable Care Organization demonstration. These incentives are expected to begin in 2021. 2) Medical and Lifestyle Incentives: According to department officials, these incentives for beneficiaries may be provided by Kaiser Permanente on an annual basis under the Accountable Care Organization demonstration, at no cost to the government. These officials told us they were unsure whether and how such incentives may be more broadly applied to the TRICARE program. We are sending copies of this report to the Department of Defense, appropriate congressional committees, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Sharon Silas, Director, Health Care at (202) 512-7114 or silass@gao.gov or William T. Woods, Director, Contracting and National Security Acquisitions at (202) 512-4841 or woodsw@gao.gov. Contact points for our Office of Congressional Relations and Office of Public Affairs can be found on the last page of this report. Other major contributors to this report are listed in appendix II. In addition to the contact named above, Bonnie Anderson, Assistant Director; La Sherri Bush, Analyst-in-Charge; LaKendra Beard, Jacquelyn Hamilton, Jessica Karnis, Miranda Riemer, and Lauren Wright made contributions to this report. Also contributing were Sam Amrhein and Vikki Porter.", "summary": "In fiscal year 2018, DOD provided health care services to more than 9 million eligible beneficiaries through TRICARE, its regionally structured health care program. In each of its two regions (East and West), DOD uses contractors to manage health care delivery through civilian providers. The NDAA 2017 required a number of changes to the TRICARE program through its contracts. Specifically, it required DOD to implement a strategy with 13 specific elements—related to provider networks, telehealth services, and referrals, among other areas—for its contracts. The NDAA 2017 and the accompanying Senate Report 114-255 included provisions for GAO to examine DOD's managed care support contract acquisition process and requirements. This report (1) describes changes DOD made to its TRICARE contracts and acquisition process between its T-3 and T-2017 contracts and (2) examines the extent to which DOD implemented the 13 elements as required by the NDAA 2017, among other things. GAO reviewed and analyzed relevant federal statutes, T-3 and T-2017 planning and contracting documents, and interviewed DOD officials and TRICARE contractors. The Department of Defense (DOD) made selective changes to its TRICARE managed care support contracts and acquisition process from the third generation of contracts (T-3) to the fourth generation (T-2017) of contracts. According to DOD officials, the contracts are generally the same, and changes were made to clarify or streamline TRICARE requirements and administrative processes. Officials told GAO they prioritized the continuation of beneficiary services, rather than implement significant contract changes that could potentially be disruptive. Some of the T-2017 changes include a reduction from three to two contract regions and a different method for paying the contractors. GAO found that DOD has partially implemented six of the 13 elements required by the National Defense Authorization Act for Fiscal Year 2017 (NDAA 2017), in its T-2017 contracts. DOD leadership explained that they decided to implement each of the 13 elements separately rather than by developing a single strategy that addressed all of the elements. DOD officials explained that some of the 13 elements will be implemented through modifications to the T-2017 contracts, while others will be addressed in the fifth generation of managed care support contracts (T-5), which are expected to be awarded in 2021. While DOD has taken steps to begin implementing some of the required elements, GAO found that DOD lacks plans with specific time frames and actions needed to fully implement all of the elements. As a result, it is unclear exactly how and when all 13 elements will be implemented. GAO recommends that DOD develop and implement plans with time frames and specific actions needed for all 13 required elements in the TRICARE contracts. DOD concurred with GAO's recommendation and noted its plans to address each of the required elements in the T-5 contracts.", "document_type": "gao"}
{"report": "Historically, unmanned aircraft have been known by many names including: “drones,” remotely piloted vehicles, unmanned aerial vehicles, and models. Today, the term UAS is generally used to emphasize the fact that separate system components are required to support airborne operations without a pilot onboard the aircraft. Recreational users have flown UAS—largely model aircraft—for years with minimal FAA interaction. Increasingly though, more technically advanced UAS are being used in a variety of ways by different types of users. Certain industries are interested in expanding the allowable uses for UAS, such as expanding use of UAS in controlled airspace. Expanding allowable uses would likely require more FAA involvement and regulatory action. UAS operators generally fall into the following categories: Recreational users operate UAS primarily for recreational or educational purposes, such as operating UAS to take photographs or video for personal use. To operate UAS recreationally, a user must obtain a certificate of registration from the FAA. The certification constitutes registration for all unmanned aircraft owned by the individual and operated recreationally. Commercial users operate UAS in connection with a business. Examples of commercial uses include: selling photos or videos taken from UAS (such as wedding or real estate photography); conducting mapping or land surveys; or conducting factory or equipment inspections. Commercial users must register each UAS used for commercial purposes with the FAA. Public safety/government users operate UAS in a variety of ways to support key activities of their mission. For example, firefighters use UAS to help put out fires and the Department of the Interior uses UAS to survey national parks. Public safety and government users must either register each UAS or receive an FAA certificate of authorization to function as a public aircraft operator. FAA is the primary agency responsible for facilitating the safe integration of UAS into the national airspace. All airspace is regulated, and FAA’s rules regarding access to the airspace apply to the entire national- airspace system, from the ground up, though there are different rules for different types of airspace. As UAS increasingly enter and operate within the national airspace system—a complex network of airports, aircraft, air- traffic-control facilities, employees, and pilots—it is FAA’s responsibility to plan for and oversee the integration of UAS into both low-altitude airspace (below 400 feet) and, eventually, higher altitude airspace that will be shared with other aircraft. According to FAA’s Fiscal Year 2019 Implementation Plan, the ultimate goal of integration is for UAS to operate harmoniously with manned aircraft, in the same airspace, while ensuring the safety of people and property both in the air and on the ground. Within FAA’s Office of Aviation Safety, the UAS Integration Office is responsible for facilitating the safe, efficient, and timely integration of UAS into the national airspace system; aligning UAS international activities with foreign civil-aviation authorities; supporting standards and policy development related to UAS projects; and providing strategic planning and support for continuous UAS research and development. The Office was established in fiscal year 2017 and, in fiscal year 2018, had 39 full- time equivalent employees. Other offices within FAA coordinate with the UAS Integration Office on UAS-related activities. For example, FAA’s Office of Rulemaking (also under the Office of Aviation Safety) oversees the rulemaking process, including issuing notices of proposed rulemaking and administering the public comment process, in addition to providing general rule information on published regulatory documents. Other offices are also involved in the development of proposed rules, certification of aircraft, compliance and enforcement, and other activities related to UAS integration according to their subject-matter expertise. For example, the Flight Standards Service is responsible for setting standards for unmanned aircraft, and the Aircraft Certification Service is responsible for certifying new UAS designs and approving UAS for advanced operations. Additionally, the Air Traffic Organization is responsible for providing data and information to facilitate the operation of approved UAS near airports. Figure 1 shows FAA offices that are involved in UAS integration efforts. FAA’s activities are primarily funded through revenues to the Airport and Airway Trust Fund (Trust Fund), which is funded through a variety of excise taxes paid by users of manned aircraft as well as interest revenue accrued on the balance of the Trust Fund. These excise taxes are levied on the purchase of airline tickets and aviation fuel, as well as the shipment of cargo, though, as we have previously found, they are generally not closely linked to FAA’s costs for the services received. Trust fund revenues are available to FAA subject to appropriations. In addition to these revenues, a portion of FAA’s funding is often appropriated from general revenues. The Trust Fund provides funding for FAA’s three capital accounts: 1. the Facilities and Equipment account, which funds technological improvements to the air-traffic-control system, including the modernization of the air-traffic-control system called the Next Generation Air Transportation System (NextGen); 2. the Research, Engineering, and Development account, which funds research on issues related to aviation safety, mobility, and NextGen technologies; and 3. the Airport Improvement Program, which provides grants for airport planning and development. The Trust Fund also provides much of the funding for FAA’s Operations account, which funds the operation of the air traffic control system and the UAS Integration Office, among other activities. In general, a user fee is related to some voluntary transaction or request for government goods or services above and beyond what is normally available to the public, such as entrance into national parks, a request that a public agency permit an applicant to practice law or run a broadcast station, or the purchase of maps or other government publications. User fees are normally related to the cost of the goods or services provided. User fees’ designs can vary widely. We have previously reported that the way user fees are set and collected can affect the extent to which the goals of implementing user fees—equity, efficiency, revenue adequacy, and minimal administrative burden—are achieved. In 2017 the Drone Advisory Committee (DAC)—an industry stakeholder group established by FAA to provide advice on key UAS integration issues—created Task Group 3 to make recommendations related to funding the integration of UAS into the national airspace system. The group completed an interim report on short-term funding options in July 2017 and a final report on longer-term funding options in March 2018. The final report identifies various funding mechanisms for further study and recommends that industry, the FAA, and Congress work together to identify long-term funding sources for FAA’s UAS activities. In 2019, the FAA reconvened the DAC and plans to continue to form task groups to study emerging issues in the UAS industry, though no new task groups have been formed related to UAS funding. FAA has leveraged its existing regulatory and oversight framework for UAS integration, with the goal of allowing UAS operators to achieve increasingly complex operational capabilities. For example, FAA is applying existing regulations and standards developed for manned aviation to allow for more complex UAS operations. FAA has also initiated rulemaking efforts to allow operations of small UAS at night and over people in certain conditions and has identified additional areas for potential future UAS integration activities. For some capabilities, FAA has also identified a need for research and development, including for systems that would enable UAS to detect and avoid other aircraft and hazards. To help address these needs, FAA has established programs to draw on private industry’s resources and state and local governments, including the provision of air navigation services. Longer term, however, the extent of activities needed to carry out FAA’s statutory role in the operation, oversight, and enforcement of established rules and systems related to UAS is still unclear. According to FAA officials, just as the ultimate vision for UAS integration is for manned and unmanned aircraft to operate in the same airspace, FAA’s overarching strategy is to integrate UAS into its existing regulatory structure. This strategy is based in an incremental, risk-based approach to developing rules, policies, and procedures for UAS and leverages standards and regulations established for manned aviation as well as existing FAA resources such as rulemaking, flight standards, and aircraft certification personnel. To organize and track UAS integration activities across the agency, FAA has published internal annual-implementation plans for fiscal years 2017– 2019. FAA adjusts the plans annually to reflect changes in policy. These plans describe the range of objectives related to expanding the use and types of UAS in the national airspace that FAA has identified and its plan for achieving these objectives. For instance, the implementation plan includes identification of the steps needed to achieve each operational capability, including development of related regulations, policies, and standards. In recent years, FAA has implemented regulations that allow for routine UAS operations of gradually increasing risk and complexity. To date, FAA has established requirements for aircraft and operator registration as well as regulations to allow for limited operations of small UAS, including the June 2016 Small UAS rulemaking (commonly called Part 107), which established conditions under which small UAS operators are allowed to routinely fly for largely commercial purposes (see fig. 2). Additionally, for those operations not allowed under established regulations, FAA may grant waivers on a case-by-case basis. According to FAA, nearly 14,000 requests for waivers were received as of December 2018, with just over 2,000 of those requests approved. The Flight Standards Service has issued waivers for some UAS operators— including commercial and government users—to operate beyond-visual- line-of-sight or at night for purposes including inspection of hurricane damage and aerial photography. As FAA develops and implements regulations for more and more complex operations, fewer types of operations will require these waivers. Since issuance of the Part 107 rule, FAA has continued its efforts to increasingly allow for routine operations (that is, operations within established regulations that do not require waivers) of more types of UAS (including large UAS) under more conditions, as well as more complex UAS operations. Figure 3 illustrates some of the ongoing and potential future operational capabilities included in FAA’s phased approach for UAS integration, which are detailed below. FAA’s current efforts to allow for more complex UAS operations include the following ongoing rulemaking efforts: Operation of small unmanned aircraft systems over people: FAA issued a proposed rule in February 2019 to expand the operations permitted under the Part 107 rulemaking to allow operations over people and at night in certain conditions. Safe and secure operations of UAS advance notice of proposed rulemaking: FAA released this advance notice in February 2019 to seek public comment on whether FAA should promulgate new rulemaking related to, for instance, additional operating and performance requirements for UAS. Remote identification of unmanned aircraft systems (UAS): Both FAA and stakeholders have identified the ability for FAA, law enforcement agencies, and other UAS users to remotely identify UAS while in flight as foundational to most other rules and system development. FAA currently expects to issue a proposed rulemaking on remote identification in December 2019. With respect to the operation of UAS over people rulemaking, FAA expressly stated that it does not intend to finalize proposed rules in that area until it has issued a final rule on remote identification. In its internal Fiscal Year 2019 Implementation Plan, FAA identified a variety of new types of operations that could be enabled in the next few years. Examples include: Beyond visual-line-of-sight operations: Future integration efforts in this area could allow for low-altitude UAS operations beyond-visual- line-of-sight, such as infrastructure and agricultural inspections primarily below 400 feet. Small-cargo delivery operations: Future integration efforts in this area could allow for delivery of small cargo by networks of small UAS flying at low altitudes in rural and urban areas predominantly below 400 feet. Currently, FAA certifies some UAS operators to enable them to conduct cargo delivery operations under existing air carrier certification regulations. Urban air-mobility passenger operations: Future integration efforts in this area could allow for on-demand, highly automated, passenger air transportation services within and around a metropolitan environment with no pilot physically in the cockpit of the aircraft. These operations are expected to use UAS weighing thousands of pounds that would fly at higher altitudes (500-5,000 feet). UAS operators are currently developing UAS for future passenger transport operations both in the United States and abroad. Large cargo and inspection operations: Future integration efforts in this area could allow for cargo and inspection operations using significantly larger UAS (up to tens of thousands of pounds) operating in controlled airspace at higher altitudes. These UAS are expected to operate similarly to large commercial manned aircraft. These larger UAS may allow the transportation of larger volumes of cargo or execution of inspections over a longer range. Currently, FAA has approved—on a case-by-case basis—limited experimental operation of large UAS to conduct inspections by waiver. FAA’s annual UAS implementation plans reflect the ever-changing nature of the UAS industry, the regulatory environment, and concerns identified by stakeholders from within and outside of government related to public safety and national security. According to FAA, as UAS technology and the industry continue to evolve, additional operational capabilities and associated integration needs will be identified. FAA expects efforts to allow increasingly complex operations to build on lessons learned and technology improvements gained from preceding integration efforts. Until new regulations can be issued for these operations, FAA plans to extend and adjust existing safety standards and requirements—originally designed for manned aircraft—to UAS through waivers and exemptions. For example, in April 2019, FAA awarded the first air carrier certification to a UAS delivery company, Wing Aviation. This certification—under existing regulations for manned air carriers—allows the company to begin commercial package delivery in Blacksburg, Virginia. As discussed in its internal implementation plan, FAA has identified research and development needed to inform the safe expansion of UAS operational capabilities. According to FAA officials, this research focuses on the assessment of risks that UAS integration poses to the national airspace as well as the characteristics required for technology and systems to sufficiently mitigate these risks to achieve the safe implementation of more complex UAS operations. Such systems and technology would enable, for example, detection and avoidance of other aircraft and hazards, reliable navigation capability, and reliable data linkage between the UAS aircraft and the operator for controlling the flight. To that end, FAA coordinates UAS-related research activities being conducted by FAA, other government agencies, and FAA’s partners in industry and academia. For example, FAA has coordinated with NASA to develop a traffic management concept for UAS. Additionally, FAA has implemented two programs—the Test Sites program and Integration Pilot Program—to leverage private industry resources and state and local governments to conduct research and development activities needed to achieve full UAS integration. Test Sites Program: FAA authorized seven test site locations between 2013 and 2016 as directed by statute, at which industry stakeholders can test UAS technologies to further UAS integration. According to a test site participant, these sites have been used, for example, to test technologies such as vertical take-off and landing technology for large UAS, which may be relevant for large-cargo and passenger operations. Integration Pilot Program: This pilot was established in 2017 to enable testing of UAS integration technologies in state, local, and tribal jurisdictions. Through this program, for example, the North Carolina Department of Transportation has partnered with private industry to provide UAS medical-package delivery services (such as the transport of medical test samples). The program’s objectives include: testing and evaluating models of state, local, and tribal government involvement in the development and enforcement of federal UAS regulations, encouraging the development and testing of new UAS concepts of informing further FAA regulation of UAS. As these research efforts make headway, FAA plans to leverage the results to develop a system to provide UAS traffic management services. As stated in FAA’s Fiscal Year 2019 Implementation Plan, on any given day, 60,000 commercial aircraft fly through the national airspace into the 30 biggest airports in the United States and—given current trends—the same number of UAS flights could originate from just one delivery fulfilment center in a major city in a single day. According to FAA, in order to fully integrate commercial UAS into the national airspace, a traffic- management ecosystem complementary to—but separate from—FAA’s air-traffic-management system for manned aviation will likely be needed to control access and flight operations in low-altitude airspace. FAA has identified capabilities required for low-altitude UAS air navigation. One system—the Low Altitude Authorization and Notification Capability (LAANC)—has been implemented, while a UAS traffic management system is still under development. According to FAA and stakeholders we spoke to, LAANC was the first step towards a UAS traffic management system. LAANC: Through 2017 and 2018, FAA established technical and regulatory requirements for private partners to provide LAANC services, which enable UAS to access controlled airspace near approved airports. After deploying a system prototype in November 2017, FAA launched LAANC in April 2018 and then expanded the program to include additional partners in October 2018. Under LAANC, FAA provides data on temporary flight restrictions, notices, and airspace maps of participating facilities through a UAS data exchange. Private companies that have been approved by FAA to provide UAS air navigation services (called UAS service suppliers) develop and maintain—with private funding—automated applications or portals. Approved service suppliers provide differing services, with varying infrastructure and associated costs to provide the service. For example, some suppliers provide LAANC services to UAS operators among the general public, while others process applications for airspace access only for certain UAS operators. Prior to operating in controlled airspace near airports, UAS operators use these applications or portals to apply for airspace authorizations. These requests are checked against the data provided through the UAS data exchange, and if approved, UAS operators receive authorization to fly in the area—within minutes, in some cases. LAANC services were previously available only to commercial operators, but in July 2019, LAANC access was extended to recreational operators. UAS traffic management capability: In 2013, NASA began developing a concept of operations for a UAS traffic management system, which is the proposed system for providing UAS air navigation services in low-altitude airspace. As envisioned by FAA, these services will be separate, but complementary, to those provided by the Air Traffic Control system used for manned aviation. FAA established a pilot program in 2017 to develop and demonstrate early versions of UAS traffic management operations. Much like LAANC, the component applications and infrastructure supporting the traffic management system would be almost entirely developed, owned, and operated by private UAS service suppliers; only the Flight Information Management System—a data exchange gateway—is planned to be built and operated by FAA. The current UAS Traffic Management Concept of Operations envisions that UAS operators will share the timing and destination of a planned flight through a UAS service supplier. FAA envisions that these service suppliers will provide near real-time advisories to affected UAS operators regarding traffic (aircraft in the area), weather and winds, and other hazards pertinent to low-altitude flight (such as cranes or power-line construction or local UAS restrictions). Figure 4 illustrates the UAS traffic management system as outlined in the concept of operations. FAA has not identified an implementation date for the traffic management system. Rather, FAA proposes a “spiral development,” in which low complexity operations would be implemented first, with higher complexity operations and requirements built in incrementally. FAA intends to allow each new development to gradually mature the UAS traffic management system to ultimately support the full range of UAS operations at low altitude. Among other FAA activities, remote identification rules will be key to implementation of traffic management capabilities. Once FAA has developed the foundational UAS rules and systems such that operational capabilities of UAS integration have been substantially achieved, the specific nature of FAA’s role in the operation, oversight, and enforcement of established rules and systems depends on the nature of the established regulations and systems. FAA’s mission to ensure the safety of the national airspace, however, makes it clear that FAA will continue to play a role in each of these areas, given its responsibility for maintaining the safety of the national airspace. For example, FAA will need to continue conducting oversight to ensure compliance with established regulations, policies, and standards to maintain the safety of the national airspace, but the precise nature of the oversight needed in the future will depend on the regulations and systems established. We recently found that local law enforcement agencies may be unclear about their role in UAS enforcement and that most FAA inspectors and local law enforcement agencies GAO met with said that officers may not know how to respond to UAS incidents or what information to share with FAA. Similarly, a recent industry task force commissioned to address the issue of unauthorized UAS near airports found that the role of state and local law enforcement in addressing that threat is unclear, and recommended that federal agencies clearly define related roles, responsibilities, and authorities. As such, FAA’s activities related to enforcement for UAS will likely evolve as UAS become more integrated in the national airspace. Further, according to our interviews with stakeholders, facilities designated for the take-off and landing of UAS for the transport of passengers and cargo as well as other infrastructure to support UAS air navigation services may be needed. FAA’s role in operating or overseeing this infrastructure will likely hinge on the nature of the infrastructure. For example, while FAA’s Office of Airports has responsibility for airport safety and inspections as well as establishing standards for airport design, construction, and operation, the extent to which this type of oversight will be needed for infrastructure to facilitate drone operations is not yet known. FAA receives annual appropriations in four accounts, and since 2016, conference reports accompanying appropriations have directed FAA to allocate some funding from these accounts specifically for UAS-related activities. Table 1 depicts appropriations FAA has allocated to UAS- related activities from these four accounts since 2016 at the direction of Congress. FAA allocates portions of its appropriations for the UAS Integration Office and some other UAS-specific activities based on congressional direction, but FAA may obligate funding that has not specifically been allocated for UAS activities to support UAS activities as well. The vast majority of FAA’s appropriation comes from the Airport and Airway Trust Fund (which is funded through revenues of taxes and fees on manned aviation airline tickets, aviation fuel, and cargo shipments), including all of the appropriations for the facilities and equipment; research, engineering, and development; and grants-in-aid for airports accounts. In fiscal year 2018, about 92 percent of FAA’s approximately $17 billion in total funding was appropriated from the Trust Fund. The remainder of FAA’s funding is appropriated from general revenues. For fiscal year 2018, in accordance with congressional direction, FAA allocated a total of $104.8 million for UAS-related activities and, according to FAA financial data, obligated approximately $69.7 million for these activities. Table 2 provides an overview of the UAS-related activities for which FAA determined it had obligated funds in fiscal year 2018; a more detailed list of UAS-related activities for which FAA identified fiscal year 2018 obligations is provided in appendix 2. Individual activities may be funded through more than one account, depending on their scope. According to officials, and as discussed below, FAA staff outside of the Office of Aviation Safety and Air Traffic Organization may not consistently track their UAS-related obligations. As such, the obligation amounts identified in table 2 may be incomplete and may not represent FAA’s total fiscal year 2018 UAS costs. Within the categories above, specific examples of activities funded in fiscal year 2018 include: About $3.7 million from both the Operations ($2.07 million) and Facilities and Equipment ($1.65 million) accounts for the development of LAANC systems and requirements. Of the about $33 million obligated by the Office of Aviation Safety in fiscal year 2018 for UAS-related activities, about $28 million was obligated by the UAS Integration Office and $166,000 by the Office of Rulemaking. $4.5 million obligated under facilities and equipment for the development of a UAS traffic management system and the associated Flight Information Management System. Since 2017, FAA has been tracking costs associated with many of its UAS activities including time spent by staff as well as other costs, as shown in table 2. A December 2017 internal memorandum instructed FAA offices to track UAS-related activities and costs using project codes. According to FAA officials, the codes are used to identify travel, procurement, time and attendance, and costs related to special events, among other UAS-related activities. The effort was intended to address the administration’s and Congress’ interest in greater cost visibility. According to FAA officials, the project codes to track UAS costs have been implemented in the Office of Aviation Safety—including the UAS Integration Office, Flight Standards Service, and Office of Rulemaking— and staff within the Air Traffic Organization (not including air traffic controllers). According to FAA officials and as demonstrated by the obligations shown in Table 2, the Office of Aviation Safety and the Air Traffic Organization represent the majority of UAS costs for fiscal year 2018 within the Operations account. In addition, according to FAA, because Conference Reports have outlined how activities in the Research, Engineering and Development and Facilities and Equipment accounts should be funded by line item, FAA is able to track these costs without using the project code method. While FAA has started tracking UAS-related costs for some offices, FAA does not know the extent to which UAS costs are tracked throughout the agency, resulting in data that may be incomplete. Many—if not all—FAA offices are doing work related to both manned aviation and UAS, but FAA officials stated that they do not know or plan to assess the extent to which staff in other offices—such as the Office of the Chief Counsel—that spend time on both UAS-activities and other responsibilities are using the project codes to track their UAS-activities. FAA officials stated that, because the bulk of the UAS-related work is being conducted within the Office of Aviation Safety and the Air Traffic Organization, it is not a priority to try to identify the time spent by other offices working on UAS-related activities, which they believe would be time consuming. However, with no way to assess the extent to which the project codes have been implemented, FAA is unable to tell whether it has met the intent of using the codes: greater visibility into UAS-related costs. For instance, FAA does not currently have visibility via the project codes into time spent on UAS activities outside of the Office of Aviation Safety and the Air Traffic Organization. According to OMB instructions to agencies on financial-reporting requirements and standards for federal financial accounting, agencies should report the full cost of each program—to include both direct and indirect costs and the costs of identifiable supporting services provided by other offices within the agency. Further, federal standards for internal control note that agencies should use quality information—that is, data that are complete and accurate—to achieve objectives, make informed decisions, and manage risks. With no assurance that the project codes are resulting in information that is complete, FAA risks making decisions based on information that is unreliable for the purpose of understanding the full costs of its UAS activities. Efforts to track costs need not be overly complex: federal financial-accounting standards note that agencies should consider the precision desired and needed in cost information and the practicality of data collection and processing, among other considerations, when designing cost-accounting processes. For example, FAA could build on its existing project codes for UAS-related activities by monitoring the extent to which the project codes have been used agency- wide. Alternatively, FAA may identify other methods of accounting for UAS-related costs, if there are some costs not easily tracked using the project codes. Further, indirect costs associated with FAA management and facilities could be assigned to the UAS mission based on more complete information on the direct costs identified through use of the project codes. Additionally, as discussed below, many of FAA’s future costs related to UAS are unknown. Ensuring the project code information is complete and accurate now could put FAA in a better position to identify those costs as they are realized in the future. Further, federal standards for internal control state that management should identify, analyze, and respond to significant changes that could affect an agency’s ability to report reliable information and achieve objectives—such as a change in mission that influences costs. Without reliable information on FAA’s UAS-related costs, the administration and FAA may be less equipped to make informed policy decisions regarding resources needed as UAS become further integrated into the national airspace and as UAS oversight becomes an increasing part of FAA’s mission. Because the UAS industry, as well as key systems and technological developments, continue to evolve, it is too early to know what costs related to UAS that FAA is likely to incur in the future . This holds true for future operational costs as well as the costs to develop future systems and regulations and indirect costs. According to FAA and stakeholders we spoke to, in addition to costs to continue regulatory activities and safety oversight, FAA’s future costs will depend on the extent of FAA’s involvement in the everyday operation and oversight of systems, such as those related to UAS traffic management, and the extent to which FAA becomes a provider of UAS-related services. Examples of how FAA’s costs could evolve and possibly expand in each of these areas include: Regulatory development costs: Current costs for activities such as the development of new UAS regulations by the UAS Integration Office could change as UAS become more integrated into the national airspace. As previously discussed, the industry is changing rapidly and new uses for UAS are being developed, uses that will require additional FAA regulation and oversight. FAA cannot know the extent to which additional rulemaking activities will be required for UAS technologies and uses that the industry has not yet contemplated or developed. Costs to develop regulations involve input from offices across FAA, such as the Office of the Chief Counsel, where FAA officials are unsure if staff are consistently using the project codes to track their costs for UAS-related activities. As such, FAA may not have visibility into the extent to which these UAS-related costs may change over time. Safety oversight costs: As part of its safety mandate, FAA is responsible for enforcing compliance with established regulations for both manned aircraft and UAS. Several offices within FAA have a role in UAS compliance and enforcement, including the Flight Standards Service and the Office of Security and Hazardous Materials Safety. As we have recently reported, while FAA has sole responsibility for enforcement of UAS regulations, the agency has focused on engaging and educating law enforcement and public safety agencies at all levels—federal, state, and local—and, to a lesser extent, conducting surveillance to ensure compliance with UAS regulations. While local law enforcement agencies may often be in the best position to deter or respond to UAS incidents, they may not have information on how to respond or what information to share with FAA. According to FAA officials, the Office of Security and Hazardous Materials Safety is one of the offices in which FAA officials do not know if staff are tracking their activities and costs related to UAS through use of the project codes discussed above. Given the uncertainty about the division of responsibilities between federal, state, and local law enforcement, it is unclear how costs for safety oversight and enforcement will evolve and possibly expand in the future. Provision and oversight of UAS services and facilities: FAA will eventually incur costs related to providing air navigation and other services to UAS operators, oversight of UAS service providers, and potential infrastructure, but the extent of FAA’s eventual role in the provision of these services and related oversight is not yet understood, in part, because the industry is still evolving and it is unclear what FAA services will be provided in the future. Some stakeholders believe that an increased industry role in providing air navigation services could keep FAA’s costs for these activities relatively low. For example, the UAS Traffic Management Concept of Operations envisions that leveraging private entities to provide a variety of UAS traffic management services will reduce the infrastructure and manpower burden on FAA and, thus, reduce associated costs. FAA envisions that the Flight Information Management System—a system through which FAA can provide directives and enable information exchange between UAS service suppliers, UAS operators, and FAA—is the component of the UAS traffic management system that FAA will build and manage. FAA has not yet estimated the costs of developing or implementing this system because, according to FAA officials, the agency is still many steps away from developing the core infrastructure and regulatory requirements. As UAS integration progresses and as more UAS are operating in the same airspace as manned aircraft, additional solutions may be needed to manage UAS traffic at higher altitudes, which will also incur costs. For instance, FAA anticipates that air traffic controllers will have a role in de- conflicting manned aircraft and unmanned aircraft and could provide air-traffic-control services to UAS in controlled airspace. FAA officials stated it will be necessary to collect data on the direct and indirect costs of UAS for air-traffic-control services in the future. According to FAA, a new air-traffic-control-cost-allocation study is underway, but FAA does not currently have the information on UAS operations that would be necessary to assign air traffic control costs to UAS users. Beyond system development, once traffic management systems are designed and operational, FAA will incur costs related to its role in overseeing providers of UAS traffic management services as well as operating and maintaining the Flight Information Management System. FAA currently provides UAS operators with services related to registration, aircraft certification, and waivers for operation that fall outside existing regulations, but those services may change depending on future rulemaking. When it becomes clearer what services FAA will likely provide and how it will provide those services, FAA will be better positioned to estimate its costs to inform its budget requests and plan for the future, as it has done for systems that have already been implemented. For example, FAA has estimated future costs associated with the LAANC program, which was implemented in 2018. FAA anticipates obligating approximately $35.64 million from the facilities and equipment account and $26.6 million from the operations account to further develop and operate the LAANC system from fiscal years 2019 through 2023, as shown in table 3. Indirect Costs: In addition to direct costs related to rulemaking, oversight, and provision of services, FAA will continue to incur indirect costs such as those associated with the operation and maintenance of FAA facilities and systems. FAA officials said they do not plan to conduct analysis through which they could allocate indirect costs for UAS, because FAA’s appropriations and funding structure do not require them to track costs in this way. However, as previously discussed, OMB instructions to agencies on financial-reporting requirements state that agencies should report the full cost of each program including indirect costs. As discussed, FAA’s efforts to track costs related to UAS activities may result in incomplete data, and as the UAS industry evolves and becomes more integrated, tracking costs may become even more complex. Generally, FAA officials stated that differentiating between costs related to UAS and manned aviation will not be necessary as UAS become further integrated into the national airspace and FAA’s mission because the agency does not track costs in this way for any other mission areas. However, as discussed later in this report, there is widespread consensus among manned and unmanned aviation industry stakeholders that UAS costs should be borne by the UAS industry rather than the manned aviation industry, and policy makers may opt to recover these costs through user fees or some other mechanism in the future. As discussed below, should FAA and Congress decide that certain fee mechanisms should be pursued, a reliable accounting of total program cost—including indirect costs—is important to setting effective fees, as our prior work related to designing user fees has shown. In the tasking statement to the Drone Advisory Committee’s Task Group 3, FAA asked the committee to recommend options for funding the activities and services required by both government and industry to safely integrate UAS into the national airspace system. The Task Group concluded in its final report that the aviation industry, FAA, and Congress should coordinate to identify one or more revenue streams that are separate and segregated from the Airport and Airway Trust Fund to help fund FAA’s UAS-related activities. The Task Group also identified five different fee mechanisms through which FAA could recover some of the costs of its activities from UAS users, a topic we discuss in this section. The extent to which costs are recovered from UAS users and the methods by which costs are recovered are policy decisions for the administration and Congress. Since 2015, FAA has used one fee mechanism—a $5 registration fee, the same as the fee to register a manned aircraft—to recover some of the costs associated with administering the UAS registration requirement. Most of FAA’s UAS- related costs are in areas unrelated to UAS registration. As such, policy makers may, at some point, consider additional ways to recover the costs of UAS activities, including implementing user fees for additional services and activities, subject to congressional authority to implement fees and use resulting revenue. Our prior work on designing user fees, combined with policies established by the Office of Management and Budget, can provide a framework for designing user fees that reduce the burden on taxpayers to finance FAA’s UAS activities, which benefit specific users. The goals of establishing user fees—efficiency, equity, revenue adequacy, and reducing administrative burden—can be in conflict with each other and necessitate trade-offs depending on policy priorities. Table 4 describes these goals. Our prior work illustrates that four key design elements—namely how fees are (1) set, (2) collected, (3) used, and (4) reviewed—require careful consideration and planning to achieve the desired goals. Based on the prospective nature of user fees to recover FAA’s UAS-related costs, we will focus on how user fees are set and collected. It is important to note that given the tradeoffs involved in establishing user fees, different users and stakeholders may have varying perspectives and opinions on what would be an appropriate fee structure. As these are policy decisions, this report does not recommend any specific fee mechanism. Instead, the considerations and examples we present are intended to inform decision- making by laying out issues to take into account when designing user fees. As discussed in our User Fee Design Guide, determining how UAS user fees should be set and collected involves a number of steps. These steps include: identifying the costs associated with each activity and which costs should be recovered, identifying the beneficiaries of each activity, determining how to set fees for various types of beneficiaries, determining how fees should be collected, and determining when it is appropriate to begin collecting fees. OMB instructions on designing user fees state that user fees should be sufficient to recover the full cost of providing each service or resource, including indirect costs, except to the extent that agencies determine that exceptions should be made. Identifying the full costs of providing a UAS service or resource—such as providing access to maps and air-traffic management services like LAANC—could enable policy makers to determine, consistent with their policy goals, which of those costs should be recovered through user fees. Identify the costs of each activity: Our prior work has found that, to set fees so that total collections cover the intended share of program costs, a reliable accounting of total program cost is important. As previously discussed, while the costs of some current regulatory and operational activities related to UAS are known, some current and most future costs are unclear. Recognizing that generating and maintaining reliable cost data can be expensive, OMB instructions note that program cost should be determined or estimated from the best available records of the agency. Accordingly, policy makers could opt to implement fees to recover the estimated costs of each activity as regulations, services, and systems are established, and adjust fees periodically based on actual costs. Determine which costs to recover: The next step is to determine the extent of the costs for each activity that should be recovered through user fees based on policy goals. For example, as discussed, many of FAA’s current costs relate to the “setup” or integration of UAS into the national airspace, including the costs to develop and promulgate UAS operational rules. Policy makers may or may not decide to recover these current costs from future users. For example, policy makers may decide not to recover these costs based on the idea that the goal of promulgating UAS-related regulations may be related to the general safety of the airspace, rather than providing benefits to specific users. Additionally, some stakeholders we interviewed stated that the costs of startup activities (like rulemaking) and safety oversight activities (like enforcing existing regulations) should not be recovered through user fees because these activities are core government functions. Rather, these stakeholders advocated funding such activities through appropriations from general revenues. However, as we have discussed in prior work, fees have frequently been used to support agencies’ regulatory programs. For example, fees assessed by financial regulatory agencies and the Nuclear Regulatory Commission on their respective regulated industries are used to support those agencies’ regulatory activities. Our prior work has found that the extent to which a program is funded by user fees should generally be guided by who primarily benefits from the program, though the extent to which a program benefits specific users or the general public is not usually clear cut. The beneficiaries of FAA’s UAS-related activities will include both direct users (UAS operators) as well as indirect beneficiaries such as the general public. Direct beneficiaries will accrue benefits from their use of UAS, whether recreational, governmental, or commercial. In contrast, indirect beneficiaries would benefit from maintaining a safe national airspace system and preventing disruption of commercial flights and other manned aviation. Policy makers may decide that, to account for benefits to those who don’t directly engage in UAS activities, a percentage of FAA’s UAS- related costs should be funded with general revenues. For instance, as the Congressional Research Service has reported, there has been general acceptance that appropriations to the FAA from general revenues account for the public benefits of FAA’s regulation of the national airspace. Additionally, while the manned aviation industry will benefit from regulations and oversight that reduce the potential for disruption in the airspace caused by UAS, UAS operators benefit from the regulation and safety oversight of the manned aviation industry as well. Policy makers may choose to account for these benefits in any number of different ways, depending on the perceived extent of the benefit enjoyed by each group. Direct beneficiaries—including recreational, commercial, and governmental UAS operators—will benefit in different ways based on both the type of user and the type of use or activities they engage in. For example, recreational users may experience the joy and excitement of flying UAS, but are not authorized to accrue any economic benefits. In contrast, commercial users are operating UAS with the explicit goal of earning revenue or benefiting business interests in some other way as a result of their UAS operations. As outlined in our prior work, policy makers may set fees for different types of users and activities based on a variety of factors including (1) costs imposed on the system by each user or type of use, (2) the extent of benefits received by different types of users, (3) the ability of each user to pay, and (4) identified policy goals. Figure 5 presents a simplified, hypothetical example of setting fees for various activities and users. The following examples illustrate how these various factors could play out: Considering costs imposed: Policy makers may set fees to recover the costs imposed by UAS users requiring air navigation services—for example, those operating in controlled airspace (such as around airports) or in high traffic areas. Policy makers may set fees to account for the different costs imposed by providing different UAS users access to air traffic services, such as charging per flight for air navigation services or basing the fee on distance traveled in controlled airspace. Policy makers may decide that recreational UAS users should pay lower fees than commercial users because they may generally impose fewer costs on FAA. Considering Benefits Received: Policy makers may set fees for some services that account for the extent of the benefit received, such as charging for air navigation services based on value of cargo or number of passengers transported. Considering ability to pay: Policy makers may decide to allocate a larger share of FAA’s UAS-related indirect costs to commercial users, based on their ability to pay and the monetary benefits they receive. Considering policy goals: Policy makers may decide that public safety agencies (government users), such as local police departments, should be exempt from fees or pay reduced fees because their use of UAS may provide a public benefit. Policy makers may seek to increase safety by reducing or eliminating fees for certain services in order to reduce the probability that users may not comply with requirements to avoid paying an associated fee. This determination would require balancing the potential revenue associated with the fee against (1) the potential costs of ensuring compliance with operational requirements and fees through enforcement activities and (2) the safety risks associated with the portion of operators who may try to avoid fees through not complying with operational requirements. Most stakeholders we spoke to agreed that UAS users should pay a fee when they receive a service from FAA but that fees should be related to the costs incurred by use. In discussing whether distinctions should be made in setting fees based on factors like commercial or recreational status, cargo or passenger flights, size and weight of the aircraft, and intended use of airspace, most stakeholders agreed that fees should be charged based on these distinctions only insofar as they are associated with different costs imposed on UAS-related systems or FAA. Based on the evolving nature of the industry, it is unclear whether distinctions like those above would be related to differences in costs imposed on FAA. Some other countries have implemented user fees to recover the costs associated with UAS-integration and air navigation services, though integration is still in progress. For example, Transport Canada (the Canadian agency responsible for developing transportation regulations, policies, and programs) has established a regulatory structure requiring UAS pilot certification and UAS registration. It set fees to recover Transport Canada’s costs for administering those requirements: $5 Canadian dollars (CAD) for registration (similar to FAA’s registration requirement), $10 CAD for a basic pilot certification, and $25 CAD for certification to perform advanced operations, such as flying in controlled airspace. NAV CANADA (Canada’s private, non-profit air navigation service provider) is in the process of establishing a LAANC-like service through a third-party but has not yet determined whether or how NAV CANADA may seek to recover these costs. In another example, officials told us that the Swiss Federal Office of Civil Aviation is required to recover its costs, so their general philosophy will be to charge a fee whenever costs are incurred. The regulatory structure is still under development, but the office currently charges UAS users for the time required to issue waivers for UAS operations. For example: For certain operations, such as those within visual-line-of-sight and not over people, no authorization is required, and thus no fee is required. For advanced operations—such as those beyond visual line of sight or over people—fees are charged based on the time required to conduct analysis and risk assessment up to a maximum of 5000 Swiss Francs. Policy makers can identify opportunities to collect fees based on the characteristics and requirements of relevant aviation navigation and other systems as these systems are developed. OMB instructions to agencies related to user fees state that fees should be collected prior to or at the time a service is provided unless agencies are legally authorized to collect fees after the service has been provided. Our prior work has found that collecting fees at the time a service is provided may reduce the administrative burden. Here, for example, the UAS traffic management system may include points in the process when users are required to obtain an FAA authorization or notify FAA or UAS traffic-management service providers of operation requirements. Those points may provide an opportunity for fee collection. Similarly, as FAA does for current UAS registration fees, online systems for other services could provide an opportunity for FAA to collect fees associated with those activities. Alternatively, fees could be collected through a third party to reduce the administrative burden on FAA. For example, if UAS passengers are subject to fees, flight operators could collect those fees on behalf of FAA, as occurs with current passenger excise taxes for manned aviation. Similarly, UAS service suppliers could collect fees from UAS operators on behalf of FAA for air navigation services. Decisions about when to implement user fees depend on both practical and policy considerations. For example, user fees could be put in place as soon as FAA implements each UAS-related regulation, service, or system—that is, once FAA’s costs related to a given activity can be estimated and beneficiaries identified. Alternatively, policy makers may decide not to implement user fees, or to implement some fees but not others, for a period of time in order to allow the nascent UAS industry to develop and to increase commercial viability. FAA’s tasking statement for Task Group 3 noted that one option is to consider the UAS industry an “infant industry” in need of special protections, in which case FAA could need to ask Congress for additional appropriations from the general fund to support UAS-related activities in the interim. Our prior work notes that while it may advance a particular policy goal to, for example, waive fees for a nascent industry for a period of time, such provisions might create unfair competitive advantages among users or industries. In discussing what level of system development should be achieved prior to imposing fees, stakeholders we spoke to had a wide range of divergent opinions, including the following: Some fees, like the existing registration fee, can be imposed now—as users are receiving value and FAA is incurring costs—and adjusted as the industry develops. Designing fees for UAS should take place only after the infrastructure and regulatory environments have been established. FAA and other policy makers should start considering user fees and an accompanying cost accounting and allocation system as soon as possible, but implementation should wait until a UAS traffic management system has been implemented. Fees for FAA services should be implemented when commercial operations over people and beyond-visual-line-of-sight are routine (that is, when advanced, revenue-generating UAS operations are being conducted without need for a waiver). The Drone Advisory Committee’s Task Group 3 concluded that funding for integration efforts would be shared across government and industry and that user fee mechanisms should be considered to recover FAA’s costs related to a range of activities including rulemaking, development of policies and standards, and research and development. While the task group did not make a specific recommendation on a particular fee mechanism, its final report identified five possible fee mechanisms with the intention of providing policy makers with ideas: Filing and licensing fees: Similar to the already-implemented UAS registration fee, FAA could impose fees to recover the costs of other FAA services such as reviewing applications for waivers and certifications. Point-of-sale-tax: Legislation could be passed to impose a federal tax on UAS and ensure that the proceeds are used to offset the costs of FAA’s UAS-related activities. Business use fee or tax: A business use or transaction tax could be imposed on the purchase of a UAS-related service: Commercial businesses that use UAS on behalf of a customer or as part of their customer service could be responsible for a “pay as you go” model fee for use of the airspace, which would be added to the invoice. This concept could include, for example, fees for passengers using urban air-mobility services or fees for the transport of cargo by UAS, similar to the existing excise taxes that fund the Airport and Airway Trust Fund for manned aviation. Airspace access fee: FAA could recover some or all of the costs associated with UAS traffic management services by requiring that UAS operators filing flight plans or other requests to operate UAS pay a fee to FAA. For instance, the report proposes that operators could remit a fee online when they request access to airspace near airports using LAANC. Auction or lease of airspace: FAA could recover costs or receive revenue for use of a public resource (navigable airspace) by conducting auctions to grant a license to UAS traffic management service suppliers, similar to granting radio spectrum licenses, which have been used or proposed to address overcrowding of spectrum and have resulted in significant revenue. Stakeholders noted that there is not currently a problem with capacity of the national airspace with respect to the operation of UAS and that there is no need for auctions of airspace on the basis of scarcity. According to FAA, each of these options would generally require additional authority from Congress to enable FAA to collect and use revenue. The Task Group 3 report and most stakeholders we spoke to (many of whom participated in the Task Group) agreed that the fee mechanisms identified generally covered the range of potential options and stated that it is too early to know which fee mechanisms would be appropriate to recover the costs of any one activity. Nonetheless, stakeholders described their overall impressions of how each mechanism could work, including the following considerations: If fees are burdensome for casual users, fees could lead to non- compliance with requirements. Fees that rely on self-reporting by users might be difficult to enforce or might create a disincentive for users to operate within the system (that is, operators might find ways to operate without FAA’s knowledge to avoid paying a fee), an outcome that could decrease compliance with rules meant to increase safety. A point-of-sale tax (generally a percentage of the cost of the products) on UAS would not necessarily be in proportion to the cost of services or benefits being provided by FAA and might be complicated to implement and administer. For example, stakeholders noted that a point-of-sale tax would not apply to home-built or second-hand UAS users and the tax would not be linked to actual use of the UAS (that is, the UAS activities that might impose costs on FAA). FAA officials told us that they have not yet identified or studied potential UAS fee mechanisms or analyzed the findings included in the Task Group 3 report because they have been waiting for the results of our work to inform their decision-making and planning. OMB instructions to agencies related to user fees establish that—to increase efficiency of resource allocation and reduce burden on taxpayers—agencies should recover costs when special benefits are delivered to specific users and that agencies must review all agency programs on a biennial basis to determine whether fees should be assessed. Similarly, federal internal control standards note that management should identify, analyze, and respond to significant change—such as increasing costs related to a change in mission like the integration of UAS to the national airspace— using a forward-looking process. Given the evolving nature of the UAS industry, it is unclear how UAS users and associated government activities and services fit into FAA’s existing funding structure. As the balance of FAA’s activities gradually shifts to include increased focus on UAS-related activities, those activities continue to be funded by a combination of manned aviation users (through revenue to the Airport and Airway Trust Fund) and taxpayers (through general revenues). The revenues to the Airport and Airway Trust Fund are from taxes on airline tickets, cargo, and fuel, but are not closely linked to the costs to FAA of providing specific services. In 2007, FAA and the administration proposed a new funding system that would rely more on cost-based fees for specific manned aviation activities. This proposal, however, was never implemented. We previously testified regarding this proposal, noting that such fees could allow FAA to better identify funding options that link revenues and costs and improve transparency by showing how much is being spent on specific FAA activities, but that achieving these goals would depend on the soundness of FAA’s cost allocation methodology and extent to which revenues are linked to costs. The provision in the FAA Reauthorization Act of 2018 for GAO to conduct this review, FAA’s tasking statement for Task Group 3, and statements made by Task Group 3 in its final report suggest an interest among Congress, FAA, and industry stakeholders, respectively, in considering user fees as an option for recovering the costs of FAA’s UAS activities. Implementation of cost-based user fees for UAS would be different from FAA’s longstanding funding structure for manned aviation, but may not necessitate a change in that existing structure for areas of FAA’s mission other than UAS. Indeed, the Task Group 3 report expresses a consensus that options for UAS funding should not be constrained by the current traditional aviation funding structure, and any recommended funding structure should not alter the current structure of funding for traditional, manned aviation. As UAS integration continues to evolve, FAA may identify ways that the current aviation funding structure can be adjusted to recover costs related to UAS operations. For instance, FAA officials noted that, once large UAS cargo and passenger operations have been established, those operations could become subject to the same excise taxes on fuel, cargo, and passengers as are manned operations. As we have discussed, fees to recover FAA’s costs for its UAS activities need not be assessed on a program-wide basis. That is, fees to recover the costs of individual UAS activities can be implemented separately either as new rules or systems are developed or as FAA reviews its activities and identifies areas in which services to UAS users are incurring costs that could be recovered. Further, fees based on costs to FAA estimated as each rule or system is developed can be periodically adjusted as needed. As explained in our User Fee Design Guide, periodic reviews of user fees can help ensure that Congress, stakeholders, and agencies have complete information about changing program costs and that fees remain aligned with program costs. As UAS integration continues, ongoing conversations between Congress, FAA, and stakeholders may provide additional insight into how fees can be implemented to accomplish goals. To date, FAA has not incorporated steps into its existing UAS planning efforts to identify potential fee mechanisms. Considering potential user fees as part of these efforts—such as FAA’s annual UAS implementation planning—could better position FAA to design effective user fees should policy makers task FAA with implementing them. For instance, collecting information on costs and beneficiaries as new UAS-related services are developed and implemented could ensure that data needed to design effective user fees are available. Similarly, considering ways to collect revenue—such as through third parties or online systems—as services and systems are being developed or adapted for UAS users, could facilitate future implementation of fees. As an example of the type of planning that may be needed, FAA officials said that identifying the costs of UAS traffic management services for the purpose of setting fees would involve (1) tracking which UAS are using the national airspace and (2) tracking and categorizing the type of operations conducted. Incorporating a means of collecting these data during the planning and development of traffic management systems would be useful to future fee-design considerations in this area. This is not to say that cost recovery considerations should drive the development of regulations or systems at the expense of mission goals. Rather, such planning would offer opportunities for FAA to examine systems, policies, and regulations that have been designed to accomplish the goals of UAS integration in order to assess (1) how each system, policy, or regulation will affect FAA’s costs; (2) the need for additional resources; and (3) potential options for collecting revenue. FAA is tasked with managing the integration of UAS into the national airspace within the context of many competing priorities and limited resources. Without a process to ensure information on UAS-related costs is complete for either current or future efforts, neither FAA, nor the administration, or Congress have reliable information about the total costs of FAA’s UAS-related activities and therefore may lack the information needed to effectively prioritize resources. Further, this information could inform the design of effective user fees, should policy makers decide that such fees are appropriate. FAA’s UAS integration-planning efforts offer an opportunity for FAA to build the collection of relevant data, and consideration of user fee options, into ongoing activities. We are making the following two recommendations to the FAA: The Administrator of the Federal Aviation Administration should develop and implement a process to ensure that information on UAS-related costs is complete and reliable as capabilities and related regulations evolve. (Recommendation 1) The Administrator of the Federal Aviation Administration, as part of UAS integration-planning efforts, should use available guidance on effective fee design to incorporate steps that will inform future fee-design considerations. For example, FAA may choose to incorporate these additional steps into its annual UAS implementation plan so that—as existing activities are adapted for UAS users or new regulations, services, or systems are introduced—costs and fee design options are considered. (Recommendation 2) We provided a draft of this report to the Department of Transportation (DOT) for comment. In its comments, reproduced in appendix III, DOT agreed that there are likely opportunities to better track and recover UAS- related costs and concurred with our recommendations. We will be sending copies of this report to appropriate congressional committees and the Secretary of Transportation. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or KrauseH@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this report are listed in appendix IV. Heather Krause, (202) 512-2834 or KrauseH@gao.gov. In addition to the contact named above, the following individuals made important contributions to this report: David Sausville, Assistant Director; Katie Hamer, Analyst-In-Charge; Alexandra Jeszeck; Amy Abramowitz; Camilo Flores; Richard Hung; Delwen Jones; Heather Keister; Hannah Laufe; Susan Murphy; Joshua Ormond; Pamela Snedden; and Elizabeth Wood.", "summary": "UAS have the potential to provide significant social and economic benefits in the United States. FAA is tasked with safely integrating UAS into the national airspace. As the UAS sector grows, so do demands on FAA's staffing and other resources to develop, oversee, and enforce rules and systems needed to safely integrate UAS into the national airspace. The FAA Reauthorization Act of 2018 provides for GAO to review issues related to establishing fee mechanisms for FAA to recover its costs related to UAS. This report discusses, among other things, 1) FAA efforts to track the costs of current and planned activities related to UAS and 2) key considerations and options for designing user fee mechanisms that could recover FAA's costs. GAO reviewed FAA documents and financial data for fiscal years 2017 through 2019 and industry reports on drone integration funding. GAO interviewed a non-generalizable sample of 22 UAS industry stakeholders, selected based on participation in FAA advisory groups or prior GAO knowledge to achieve a range of perspectives. GAO reviewed its guidance on designing effective fee mechanisms and OMB instructions to agencies about implementing user fees. The Federal Aviation Administration (FAA) has undertaken actions to integrate unmanned aircraft systems (UAS or “drones”) into the national airspace and has developed plans to allow for increasingly complex operations, including operations over people and beyond visual-line-of-sight and—eventually—passenger operations (see figure). However, FAA efforts to track related costs may result in incomplete information. FAA established a means of tracking the costs associated with some UAS-activities in certain offices, but many, if not all, FAA offices are doing work related to both manned aviation and UAS. FAA officials stated that they do not know or plan to assess the extent to which staff who split their time between UAS-activities and other responsibilities are tracking those costs. Furthermore, FAA's future costs to conduct oversight and provide air navigation services are largely unknown due to the changing nature of the industry and its early stage of development. Ensuring that information on UAS-related costs is complete and reliable now could put FAA in a better position to identify those costs as they evolve and possibly expand in the future. The extent to which FAA should recover costs for its UAS-related activities, and what fees are appropriate, are policy decisions for the administration and Congress. Accordingly, this report does not recommend any specific fee mechanism. Nonetheless, planning and consideration of policy goals, using available guidance on user fee design, could better position FAA to inform future decision-making on these issues as it proceeds with UAS integration. Since 2015, FAA has collected a registration fee from UAS operators, but most of FAA's UAS costs are not related to registration or covered by this fee. A stakeholder group established by FAA identified potential fee mechanisms and concluded in 2018 that the aviation industry, FAA, and Congress should identify revenue streams to help fund FAA's UAS activities. Further, GAO guidance and Office of Management and Budget instructions provide a framework, including information requirements, for designing effective user fees. FAA officials said that they have not considered user fee mechanisms as part of their planning because they have been awaiting this report to inform their decision-making. By using available guidance as part of its planning, FAA could incorporate steps, such as identifying costs and beneficiaries, which would benefit future fee design considerations. GAO is recommending that FAA (1) implement a process to ensure UAS-related cost information is complete and (2) use available guidance on effective fee design to incorporate steps, as part of UAS integration planning, that will inform future fee design considerations. FAA concurred with the recommendations.", "document_type": "gao"}
{"report": "Together, Executive Order 12898 and the 2011 MOU include eight areas that agencies’ environmental justice efforts should address, as appropriate, including promoting enforcement of all health and environmental statutes in areas with minority populations and low-income populations and ensuring public participation. Executive Order 12898 did not create new authorities or programs to carry out federal environmental justice efforts. As a result, federal environmental justice efforts seek to use existing federal laws, programs, and funding to address environmental and health problems that disproportionately burden minority and low-income communities, such as exposure to environmental pollutants. Such existing laws include the following: Environmental laws. Several environmental laws regulate pollutants in the air, water, or soil and generally require a regulated facility to obtain permits from EPA or a state. For example, under the Clean Air Act, EPA, along with state and local government units and other entities, regulates air emissions of various substances that harm human health. These laws also authorize the issuance of administrative orders, among other things, to require cleanup of contamination. NEPA. Under NEPA, federal agencies must evaluate the environmental impacts of their proposed major federal actions using an environmental assessment or a more detailed environmental impact statement, with some exceptions. Civil Rights Act of 1964. Title VI of the Civil Rights Act of 1964, as amended, prohibits discrimination based on race, color, or national origin in programs or activities that receive federal financial assistance. To carry out and enforce the provisions of the act, federal agencies have developed programs to receive and investigate allegations of discriminatory actions taken by recipients of federal funding. Most working group member agencies reported planning and implementing some actions to identify and address environmental justice issues. Some examples of key activities include the following: EPA mapping tool. In 2015, EPA released its Environmental Justice Mapping and Screening Tool (EJSCREEN), a web-based mapping tool that includes environmental and demographic data at a local level. Users can identify potential exposure to environmental pollutants and related health risks across different communities. Officials from the Department of Justice told us they regularly use EJSCREEN to help determine whether cases involve environmental justice issues. Incorporating environmental justice in NEPA analyses. At least 13 agencies provided examples of efforts to consider environmental justice in their NEPA analyses. At the Department of the Interior (DOI), departmental policy requires all bureaus to include consideration of environmental justice in the NEPA process, and some bureaus have developed their own guidance for doing so. For example, DOI’s 2015 National Park Service NEPA Handbook requires that the agency’s environmental analyses discuss and evaluate the impact of proposals on minority and low-income populations and communities. The Department of Homeland Security also issued an agency-wide directive on NEPA implementation in 2014, and the accompanying 2014 NEPA instruction manual included public involvement requirements for populations with environmental justice issues. Data initiative and reports on chemical exposure. At the Department of Health and Human Services (HHS), the Centers for Disease Control and Prevention (CDC) built a National Environmental Public Health Tracking Network, which brings together health and environmental data from national, state, and city sources. The CDC also developed a National Report on Human Exposure to Environmental Chemicals—a series of reports that uses biomonitoring to assess the U.S. population’s exposure to environmental chemicals. As we reported in September 2019, for fiscal years 2015 through 2018, 11 of the 16 member agencies of the working group reported supporting environmental justice efforts through existing related program funding and staffing resources (i.e., resources not specifically dedicated to environmental justice, such as for civil rights or environmental programs). EPA and the Department of Energy (DOE) dedicated resources specifically for environmental justice efforts in their budgets. In fiscal year 2018, EPA provided about $6.7 million and DOE provided about $1.6 million. Agencies’ progress in identifying and addressing environmental justice issues related to their missions is difficult to gauge because most of the agencies do not have updated strategic plans and have not reported annually on their progress or developed methods to assess progress. As we reported in September 2019, 14 of the 16 agencies issued environmental justice strategic plans after they signed the 2011 MOU agreeing to develop or update such plans. Of the 14 agencies that issued their plans, 12 established strategic goals in these plans. Six of the 14 agencies further updated their plans in 2016 or 2017, and another agency published updated priority areas on its website. The Department of Defense (DOD), which issued a plan in 1995, has not updated it since, and the Small Business Administration (SBA) has never issued a plan. DOD officials said that the agency has not prioritized environmental justice efforts. SBA officials said the agency is uncertain whether it has a role in implementing environmental justice and they were reviewing whether SBA should continue its membership in the working group. The 2011 MOU directs agencies to update their strategic plans periodically, and leading practices for strategic planning suggest that strategic plans should be updated every 4 years. We have previously reported that strategic planning serves as the starting point and foundation for defining what an agency seeks to accomplish, identifying the strategies it will use to achieve desired results, and then determining how well it succeeds in achieving goals and objectives. In our September 2019 report, we recommended that eight agencies update their environmental justice strategic plans. Four agencies agreed, three did not state if they agreed or disagreed, and one disagreed. Education stated that it does not believe this is the most appropriate course of action for the department or an efficient use of resources, but we continue to believe they should implement the recommendation. As we reported in September 2019, 12 of the 16 agencies developed environmental justice strategic plans with strategic goals, but most of the agencies have not shown clear progress toward achieving these goals and the purpose of the executive order. It is difficult to gauge the agencies’ progress for three primary reasons: 1. The agencies have not comprehensively assessed how environmental justice fits with their overall missions. Seven of the 14 agencies that developed environmental justice strategic plans assessed and discussed how their environmental justice efforts aligned with their overall missions after 2011. However, the other seven agencies did not clearly show how their efforts aligned with their missions. We recommended that EPA, as chair of the working group, should develop guidance for the agencies on what they should include in their environmental justice strategic plans. EPA agreed with this recommendation. 2. The agencies have not consistently issued annual progress reports. Fourteen agencies issued at least one progress report after 2011, but most have not issued such reports every year, as they agreed to do in the 2011 MOU. The departments of Homeland Security and Justice issued progress reports every year from 2012 through 2017. The General Services Administration issued progress reports every year through 2015 and then issued one progress report covering fiscal years 2016 through 2018. Several other agencies consistently reported in the first few years after 2011 but then stopped issuing reports. DOD and SBA have not issued any progress reports. We have found that annual program performance reports can provide essential information needed to assess federal agencies’ performance and hold agencies accountable for achieving results. We recommended that 11 agencies report on their progress annually. Five of the agencies agreed with this recommendation, one partially agreed, three did not state if they agreed or disagreed, and two said they did not agree. Education stated that it does not believe this is the most appropriate course of action for the department or an efficient use of resources, and DOD stated that it did not see a tangible benefit to additional reporting. We continue to believe that they should implement the recommendation. 3. Most agencies have not established methods for assessing progress toward goals. The agencies’ progress reports generally describe the environmental justice activities they conducted but do not include any methods to assess progress (e.g., performance measures). For the 14 agencies that issued at least one progress report since 2011, we reviewed the most recent report and found that each report contained information on activities that agency undertook over the previous year. However, our analysis showed that most of the agencies had not established a method that would allow them to assess their progress toward their environmental justice goals, such as tracking performance measures or milestones. Of the 16 agencies that signed the 2011 MOU, four—the Departments of Agriculture (USDA), Health and Human Services (HHS), and DOI and EPA—have established performance measures or milestones for their environmental justice efforts. Of these four, HHS and EPA have reported on their progress toward achieving their performance measures or milestones. The other 12 agencies have not established any performance measures or milestones. The executive order directs the working group to provide guidance to agencies in developing their environmental justice strategies. However, the working group has not provided such guidance on methods to assess and report on environmental justice progress, according to EPA officials. According to these officials, EPA is still pursuing its own agency-wide performance measures. We recommended that EPA, as chair of the working group, develop guidance or create a committee of the working group to develop guidance on methods the agencies could use to assess progress toward their environmental goals. EPA agreed with this recommendation. We found that the interagency working group has coordinated to some extent but does not have a strategic focus or full participation by all the federal agencies. Executive Order 12898 directed the working group to coordinate in seven functions, including to assist in coordinating data collection and examine existing data and studies on environmental justice. In 2016, the working group released its Framework for Collaboration, which describes how it planned to provide guidance, leadership, and support to federal agencies in carrying out environmental justice efforts. The working group has collaborated to develop and issue guidance on several topics, participated in a variety of public meetings to provide information and opportunities for communities to discuss environmental justice issues, and coordinated ways in which the 16 member agencies and the Council on Environmental Quality (CEQ) could assist communities. For example, the working group created nine committees, including on Native American and Indigenous Peoples, Rural Communities, and Climate Change, based on the seven functions in the executive order and on public input, to help carry out its environmental justice responsibilities under the executive order. Officials from 13 member agencies agreed to either chair or become members of one or more committees. Through these committees, among other things, the working group has released a number of documents to help guide federal efforts: A compendium on publicly available federal resources to assist communities impacted by goods movement activities, released in 2017. Guidance to help federal agencies incorporate environmental justice during their NEPA reviews, issued in March 2016, and guidance to communities about NEPA methods, issued in March 2019. A web page, which USDA compiled and launched in fiscal year 2017 with input and vetting from the Rural Communities committee, that provides links to community tools, funding opportunities, educational and training assistance, and case studies to support rural communities, according to USDA officials. However, we found that the working group’s organizational documents— the 2011 MOU, the working group’s 2011 charter, and the 2016-2018 Framework for Collaboration—do not provide strategic goals with clear direction for the committees to carry out the functions as laid out in the executive order. In September 2012, based on a government-wide study, we reported that collaborative mechanisms such as working groups benefit from clear goals to establish organizational outcomes and accountability. We reported that participants may not have the same overall interests or may even have conflicting interests, but by establishing a goal based on common interests, a collaborative group can shape its own vision and define its purpose. The working group has developed some documents with agreed-upon goals, which is beneficial to collaboration, but none of these documents address all seven functions of the executive order. In our September 2019 report, we compared the functions of the executive order to documented working group roles and responsibilities and found that coordinated data collection and examination of research and studies on environmental justice are not included in these documents or committee purposes and have not been a focus of the interagency working group since at least 2011. EPA officials said some agencies, such as HHS and EPA, have done work in environmental justice data collection and research. EPA officials told us that the 2011 MOU, committee groups, and Framework for Collaboration reflect the current priorities of the working group, based on public input. The officials were unsure whether a coordinated effort in the data collection, research, and studies areas was needed, but they said such an effort could be useful. They said that the most useful role of the working group in research might be as a forum for sharing information and providing training opportunities. In our September 2019 report, we recommended that EPA, as chair of the working group and in consultation with the working group, should clearly establish in its organizational documents strategic goals for the federal government’s efforts to carry out the 1994 executive order. EPA disagreed with this recommendation because it believes that the recommendation should be combined with a different recommendation we made about updating the MOU. We believe that EPA misunderstood our recommendation and therefore did not combine it with our other recommendation. We also found that member agencies’ participation in working group activities has been mixed. In the 2011 MOU, the 16 signing agencies and CEQ agreed to participate as members of the working group, such as by chairing, co-chairing, or participating in committees. Eleven of the 16 agencies have not chaired or co-chaired one of the working group’s committees, and four have not participated in any. Our government-wide work has shown that it is important to ensure the relevant participants have been included in a collaborative effort. EPA officials said it is difficult to characterize what specific opportunities are missed because of an agency’s lack of representation. However, they said that nonparticipation limits the working group’s ability to fulfill its mandates in a strategic, methodical way across the entire federal government. EPA officials also said that the limiting factor in the working group’s efforts to address the executive order has always been the will of leadership across the federal government to make clear, measurable commitments to those priorities and ensure adequate resources. We recommended that EPA, as chair of the working group and in consultation with the other working group members, update the 2011 MOU and renew the agencies’ commitments to participate in the interagency collaborative effort and the working group. EPA disagreed and said this recommendation could be combined with the recommendation to provide strategic direction for the working group. We continue to believe that EPA needs to update the MOU to address the matter of participation by the members who signed it but do not participate. In conclusion, incorporating environmental justice into federal agencies’ policies, programs, and activities is a long-term and wide-ranging effort. Federal agencies, led by EPA, have made some headway in developing tools and coordinated policies and have identified others that they need to pursue. Strategic planning and reporting, with meaningful measures, and collaboration across all agencies can help them make and track progress. Chairman Tonko, Ranking Member Shimkus, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Alfredo Gómez, Director, Natural Resources and Environment, at (202) 512-3841or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact named above, Susan Iott (Assistant Director), Allen Chan (Analyst in Charge), and Elise Vaughan Winfrey made key contributions to the testimony. Other staff who made contributions to this testimony or the report cited in the testimony were Peter Beck, Tara Congdon, Hannah Dodd, Juan Garay, Cindy Gilbert, Rich Johnson, Matthew Levie, Ben Licht, Cynthia Norris, Amber Sinclair, and Kiki Theodoropoulos. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Environmental justice seeks to address the disproportionately high distribution of health and environmental risks among low-income and minority communities by seeking their fair treatment and meaningful involvement in environmental policy. In 1994, Executive Order 12898 directed 11 federal agencies to incorporate environmental justice into their programs, policies, and activities. The executive order also directed the agencies to each establish an environmental justice strategy and created a working group of federal agencies, chaired by EPA, to coordinate federal environmental justice efforts. In 2011, these 11 agencies and five additional federal agencies signed a MOU agreeing to participate in federal efforts in this area as members of the Interagency Working Group on Environmental Justice and to issue annual progress reports on their efforts. This statement summarizes GAO’s findings from its September 2019 report on federal environmental justice efforts (GAO-19-543). Specifically, it focuses on (1) actions the working group agencies have taken to address environmental justice issues related to their missions, (2) the agencies’ progress in identifying and addressing environmental justice issues related to their missions, and (3) interagency working group efforts to help agencies coordinate federal environmental justice efforts under the executive order. To perform this work, GAO reviewed agency environmental justice plans, reports, and funding data; interviewed agency officials; and compared working group collaboration to leading collaborative practices. As GAO reported in September 2019, most of the 16 member agencies of the Interagency Working Group on Environmental Justice reported planning and implementing some actions to identify and address environmental justice issues, such as creating data tools, developing policies or guidance, and building community capacity through small grants and training. For example, the Environmental Protection Agency (EPA) created a mapping tool that can help identify low-income and minority communities exposed to health or environmental risks. Most of the agencies supported their efforts with funds and staff from related programs, but EPA and the Department of Energy provided funds (totaling $8.3 million in fiscal year 2018) and staff specifically for environmental justice. Agencies’ progress in identifying and addressing environmental justice issues related to their missions is difficult to gauge. Most of the agencies do not have updated strategic plans and have not reported annually on their progress or developed methods to assess progress, as they agreed to do by signing a 2011 memorandum of understanding (MOU). Of the 16 agencies that signed the MOU, 14 have issued strategic plans. However, although the MOU directs the agencies to update their strategic plans periodically, only six of these 14 agencies have done so since 2011. Furthermore, most of these 14 agencies have not consistently issued annual progress reports. In September 2019, GAO recommended that nine agencies develop or update their strategic plans and that 11 develop annual progress reports. Eight agencies agreed and one partially agreed, one agreed with one recommendation but disagreed with another, one disagreed, and three did not state if they agreed or disagreed. GAO also found that while four agencies, including EPA, have established performance measures or milestones for assessing progress toward goals, the other 12 have not done so. Agency officials said guidance from the working group on how to do so would be helpful. The 1994 executive order directs the working group to provide guidance to agencies in developing their environmental justice strategies, but the group has not provided specific guidance on what agencies should include in their strategic plans or on methods to assess and report on environmental justice progress. In September 2019, GAO recommended EPA develop such guidance or create a working group committee to do so, and EPA agreed. The interagency working group has coordinated to some extent but does not have a strategic approach, and member agencies are not fully participating. Specifically, the group’s organizational documents do not provide strategic goals with clear direction for the committees. Furthermore, 11 of the 16 signatory agencies have not chaired or co-chaired one of the committees, and four have not participated in any. In September 2019, GAO recommended EPA update the 2011 MOU and clearly establish strategic goals for federal efforts to carry out the executive order. EPA disagreed, but GAO continues to believe these actions are necessary. GAO made 24 recommendations in its September 2019 report, including that agencies update their environmental justice strategic plans and report on their progress annually. GAO recommended that EPA, as chair of the working group, develop guidance on assessing progress and what agencies should include in their strategic plans; coordinate with working group members to develop strategic goals for the group; and update the group’s memorandum of understanding. Of the 15 agencies with recommendations, eight agreed. Other agencies partially agreed, disagreed, or had no comment. GAO continues to support its recommendations.", "document_type": "gao"}
{"report": "In September 2003, the United States and other nations endorsed IAEA’s Code of Conduct, which established basic principles and guidance to promote the safe and secure use of radioactive material. The Code of Conduct applies to category 1, 2, and 3 quantities of radioactive material—all of which are potentially dangerous to human health and could, if not properly controlled, cause permanent injuries or death to a person who handled or was otherwise in contact with them. IAEA’s system considers radioactive material dangerous when gathered in close proximity to people in sufficient quantity and for a sufficient time to cause direct human health effects. NRC, working with the Department of Energy, developed a list of 16 radionuclides of concern that, if gathered in category 1 or 2 quantities, pose the greatest risk of being used by terrorists to make an RDD. Of these 16 radionuclides of concern, 4 are most prevalent in the U.S. economy: americium-241, cobalt-60, cesium- 137, and iridium-192. Since the terrorist attacks in September 2001, concerns have grown that terrorists could obtain and use radioactive material and build an RDD. The risk of an RDD is determined by the function of three components: threat, vulnerability, and consequence. Threat is generally defined as entities or actions with the potential to cause harm—including terrorist attacks. According to NRC officials, there is a general credible threat of malevolent use of radioactive materials. The second component of RDD risk, vulnerability, includes physical features or operational attributes that render an asset open to exploitation, including gaps in security measures such as gates, locks, perimeter fences, and computer networks. Finally, the third component of RDD risk, consequence, includes the effects of terrorist attacks or natural disasters that result in losses to public health and safety and the economy. Taken together, the three components make up a “risk triplet,” which is shown in figure 1. The consequences of detonating an RDD would depend on the quantity and type of radioactive material used and the size and characteristics of the area in which the material was dispersed. An example of the consequence of an RDD occurred in 1987 when two people in Goiânia, Brazil, found an abandoned medical machine containing 1,400 curies of cesium-137. The individuals, who were unaware of the nature of the radioactive material, extracted it from the machine and distributed the material to several families, causing 20 people to be hospitalized and four deaths. The very high internal and external contamination was caused by the way they handled the cesium-137, including rubbing their skin with the material and eating with contaminated hands. In addition, 112,000 people in the surrounding area were monitored for exposure to radiation, of which 249 were found to be internally or externally contaminated. The accident also contaminated 85 houses and required the demolition of homes and other buildings, generating 3,500 cubic meters of radioactive waste. This example shows the range of consequences from the dispersal of radioactive material, from fatalities to socioeconomic effects. Potential consequences of an RDD are outlined in figure 2. Depending on the size and radioactivity of an RDD, the affected population could be evacuated and possibly relocated. EPA’s Protective Action Guide (PAG) presents radiation dose guidelines that are used by federal agencies to protect people from unhealthy levels of radiation. According to the PAG, evacuation is recommended when there is enough radiation to reach 5.0 rem over the first 4 days. The PAG also outlines actions that can be taken in response to projected radiation dose rates, including evacuation, shelter in place, relocation, and avoidance of drinking water or food supplies. The PAG does not consider a specific geographic area, such as a square kilometer, when recommending evacuation. Domestically, the Atomic Energy Act of 1954, as amended, gives NRC primary responsibility for regulating most domestic industrial, medical, and research uses of radioactive material to protect public health and safety, among other things. NRC is composed of five Commissioners (the Commission) appointed by the President and confirmed by the Senate for 5-year terms. One of the Commissioners is designated by the President to be the Chairman and official spokesperson of the Commission. According to NRC’s website, the Commission formulates policies, develops regulations governing nuclear reactor and nuclear and radioactive material safety, issues orders to licensees, and adjudicates legal matters. Issues before the Commission are decided by majority vote, and the Commission directs subsequent actions be implemented by NRC staff. When establishing security requirements for radioactive material, since 2004, NRC has assessed the risks of such material based on the potential of that material to cause prompt fatalities and the deterministic health effects from its radiation; it has not used socioeconomic consequences as a basis for establishing regulations related to the security of radioactive material. Moreover, in response to the recommendations we made in 2016 that NRC should better track category 3 quantities of radioactive material, NRC staff assessed whether they should require additional security measures for category 3 radioactive material and determined that such material did not merit additional security measures. Since 2004, NRC has assessed the risks of radioactive material based on the potential of that material to cause prompt fatalities and deterministic health effects from radiation. NRC on several occasions reassessed and repeatedly reaffirmed its use of the occurrence of prompt fatalities and deterministic health effects as its primary criteria for measuring the consequences of an RDD, including when developing its decision-making framework in 2004, reviewing its regulatory framework after the Fukushima nuclear disaster in 2011, and in its 2014 response to recommendations from the Radiation Source Protection and Security Task Force (the Task Force). NRC first considered prompt fatalities from radiation as criteria for measuring consequences in November 2004 when developing its decision-making framework for evaluating vulnerabilities for theft of radioactive material. Specifically, in 2004 NRC staff recommended that the Commission approve a decision-making framework that assessed risk based on prompt fatalities from radiation. In the Commission Paper, NRC staff stated that the framework would employ the consequence criteria of preventing prompt fatalities from radiation exposure, but they also recognized that including additional consequence criteria, such as land contamination, might be warranted. They also pointed out that DHS’s Risk Analysis and Management for Criteria Asset Protection framework used criteria including economic, environmental, and loss of output of production capability, among other things. In January 2005, the Commission approved using prompt fatalities from radiation for measuring consequence. In its decision, the Commission also said that NRC staff should not independently develop criteria and standards for other consequences, such as land contamination and economic impacts. After the Fukushima nuclear disaster in 2011, NRC staff again considered broadening the criteria for assessing risk to include socioeconomic impacts. Specifically, in an August 2012 analysis presented to NRC commissioners in response to Fukushima that addressed whether NRC’s regulatory framework should be modified to consider economic consequences, NRC staff noted that NRC’s existing requirements have the effect of minimizing economic consequences by preventing or mitigating events that could lead to a radioactive release. The analysis prepared by NRC staff recommended improving guidance for estimating offsite economic costs based on up-to-date data. In March 2013, the Commission approved the staff’s recommendation to provide enhanced guidance but found that socioeconomic consequences should not be considered. at 2 rem for the first year. socioeconomic consequences to the Commission in January 2014, reiterating the staff’s view that Part 37 provides adequate security protection against a significant RDD. The NRC staff also concluded that the current protection and security framework and posture adequately protects against contamination and resulting economic consequences. In 2016, NRC established the Category 3 Source Security and Accountability Working Group (the Working Group) in response to our 2016 recommendations to NRC to better track dangerous quantities of radioactive material. This group issued a report in 2017 assessing whether NRC should require additional security measures for category 3 material and determined that such material did not meet the threshold of prompt fatalities and deterministic health effects set by NRC, and therefore, did not require additional security measures. As part of its analysis, the Working Group stated that a category 2 quantity of a certain radioactive material would not be sufficient to achieve an RDD of consequence that would cause deterministic health effects. NRC officials also told us that there is not enough of this same radioactive material in the United States to create an RDD of consequence even if all of it was used in an RDD. The Working Group also concluded that there is no evidence of adversarial interest in acquiring category 3 quantities of material by theft, that security weaknesses at facilities that contain category 3 quantities of radioactive material had not increased since first evaluated by NRC, and the consequences of an RDD using category 3 material are not significant enough to require additional security measures. Based on the findings of the working group’s report, NRC staff recommended that the Commission not amend regulations to require license verification of category 3 radioactive material or impose security requirements to prevent the aggregating of category 3 material to a category 2 quantity. The report did recommend that the Commission approve the pursuit of rulemaking to require safety and security equipment be in place before granting a license for an unknown entity and clarify license verification methods for transfers involving quantities of radioactive material below the category 2 threshold. The experts we convened with assistance from the National Academies generally agreed that NRC’s assessment of risk does not include the all relevant criteria for establishing security requirements. The experts at our meeting generally agreed that prompt fatalities from radiation and deterministic health effects are not the only relevant criteria for determining the consequences of an RDD, which recent studies we reviewed support. These experts and studies generally agreed that socioeconomic effects and fatalities from subsequent evacuations are relevant criteria for assessing the consequences of an RDD. The experts at our meeting generally agreed that using prompt fatalities and deterministic health effects from radiation as the basis for analyzing consequence have limited value to NRC as criteria for determining the consequences of an RDD, as they are unlikely to occur in the event of an RDD. Experts generally said at our meeting expressed the opinion that NRC is not focusing on all relevant criteria for assessing consequence. For example, one expert from the regulatory community said that prompt fatalities are an unlikely consequence of an RDD. Another expert affiliated with users of radioactive material noted that deterministic health effects from an RDD are limited. Finally, a security expert said that it would be difficult to kill large numbers of people with an RDD, and therefore prompt fatalities are not a good measure of consequence. Another expert pointed out that NRC’s current criteria would be unlikely to support regulating category 1 and 2 materials since an RDD with these materials is unlikely to cause prompt fatalities. He added that this creates a disconnect where category 3 material is ignored, but NRC regulates category 1 and 2 material even though category 1 and 2 materials do not meet NRC’s criteria of causing prompt fatalities and deterministic health effects. Recent studies from Sandia also show that prompt fatalities and deterministic health effects are unlikely to result from an RDD. Specifically, Sandia completed two studies in 2017 and 2018 that modeled an RDD blast and evaluated the potential consequences in New York City. The 2017 study modeled the potential consequences of a category 1 quantity of radioactive material detonated in an RDD and estimated that there would likely be no prompt fatalities from radiation. The 2018 study undertook the same analysis with a category 3 quantity of radioactive material and estimated that it would also produce no prompt fatalities from radiation. The experts who participated in our meeting discussed what type of consequences should be considered and generally agreed that socioeconomic effects and fatalities from subsequent evacuations, rather than prompt fatalities and deterministic health effects, are relevant criteria for NRC to consider when assessing the consequences of an RDD, which recent studies we reviewed support. For example, one expert said that while deterministic health effects from an RDD are limited, socioeconomic impacts are significant. Another expert said that the main point of a terrorist detonating an RDD is to create economic effects, not deterministic health effects. This expert added that the dispersal of radioactive material would result in low-level radiation scattered across an area, leading to socioeconomic consequences. A participating expert from the regulatory community said that it is difficult to quantify socioeconomic effects. Furthermore, the expert said that any model used to determine regulation by predicting consequence must be reproducible. The federal government has recently taken steps to better understand the socioeconomic costs associated with an RDD. For example, Sandia studies completed in 2017 and 2018 estimated socioeconomic costs for RDDs with category 1 and category 3 quantities of radioactive material. The 2017 study that modeled a category 1 quantity of radioactive material estimated that the socioeconomic impact on the national gross domestic product would be approximately $30 billion. The 2018 study, which substituted a category 3 quantity of radioactive material, estimated the socioeconomic impact on gross domestic product at $24 billion. One expert noted that the estimates may be understated. Specifically, the 2017 Sandia study took into account that the facades of some buildings in New York City could be replaced, which would aid cleanup and reduce socioeconomic costs. However, one expert who attended our meeting said that New York City may be a best-case example of an urban target because the city has solid response plans and modern buildings with facades that can be removed more easily than those in other cities. This expert said these factors likely lead to an optimistic calculation of socioeconomic consequence in the study, due to the preparation and resilience posture of New York City, creating a best-case scenario regarding cleanup that may not accurately quantify costs in other cities. In this expert’s view, the federal government may also be underestimating the economic consequences of an RDD by not accounting for the potential that local cleanup standards may be more stringent than the federal government standards assumed in the study. The expert said that locals will always want to clean up to a higher standard than federal government guidance recommends, largely due to a desire to protect economic assets such as trade, brand, and image. In addition to socioeconomic concerns, experts who attended our meeting generally noted that an assessment of the consequence of an RDD should consider fatalities resulting from the evacuation of homes and business. For example, one expert from our meeting said that there were few deaths from radiation during the incident at the Fukushima nuclear complex in 2011, but there were many deaths from the evacuation. Another expert agreed and said that there is evidence from Chernobyl and Fukushima linking health effects to evacuations and that, therefore, fatalities from evacuations should be included on the list of consequences from an RDD. A third expert said that panic cannot be underestimated in the event of an RDD, and the consequences of evacuation and relocation would exceed prompt fatalities and deterministic health effects. Finally, one expert said that many people outside of the evacuation area will also choose to relocate after an RDD rather than wait for direction from the government, which could increase the number of evacuees and lead to additional fatalities. The 2017 and 2018 Sandia studies support these concerns, estimating that these evacuations could cause hundreds to thousands of deaths and that fatalities during evacuations are similar for RDDs using category 1 and category 3 quantities of the same material. Specifically, the 2017 Sandia study examined the number of fatalities that occurred during the evacuation from the disaster at the Fukushima nuclear complex. Using that event as a baseline, the Sandia study estimated that approximately 1,500 people could die from the evacuation associated with the detonation of an RDD containing a category 1 quantity of radioactive material in New York City. The 2018 Sandia study of a detonation of an RDD containing a category 3 quantity of radioactive material estimated that approximately 800 people could die from the evacuation. NRC does not consider socioeconomic consequences or fatalities from evacuations when assessing the consequence of an RDD. Agency officials told us that, under the authority of the Atomic Energy Act, NRC staff has discretion to consider other criteria, including socioeconomic effects, if so directed by the Commission. However, NRC staff told us that they do not currently consider socioeconomic consequences as criteria because they have been specifically directed not to do so by the Commission. In discussions with agency officials, it is unclear why the Commission has directed the NRC staff not to consider other criteria for evaluating the impact of an RDD. NRC’s own guidance states that RDDs would cause few deaths from radiation but result in significant socioeconomic impacts. Specifically, NRC guidance issued in May 2014 states: “RDDs are considered weapons of mass disruption; few deaths would occur due to the radioactive nature of the event; however, significant social and socioeconomic impacts could result from public panic, decontamination costs, and the denial of access to infrastructure and property for extended periods of time.” NRC’s decision to not consider other criteria has limited its assessments of risk presented by the use of radioactive material in an RDD. By considering socioeconomic impacts and fatalities resulting from evacuations in its criteria, NRC would have better assurance that it was considering the more likely and more significant consequences of an RDD when establishing its security requirements for this material. In 2016, NRC evaluated the effectiveness of Part 37, as required by Public Law 113-235, and concluded that the rule is effective for ensuring category 1 and 2 radioactive materials are secure from theft or diversion. However, experts who attended our meeting stated, and recent studies support, that if category 3 quantities of radioactive materials were used in an RDD, the consequences could be comparable to a category 1 or 2 quantity of the same material, which are protected from theft by additional security measures. In addition, experts who participated in our meeting generally said that NRC’s current requirements permit collocation at the same facility of multiple category 3 quantities of americium-241 that in total reach or surpass the threshold for a category 2 quantity without the enhanced security required for category 1 and 2 materials. Furthermore, experts generally agreed that there are security weaknesses in the current trustworthiness and reliability process to protect against an insider threat. In December 2016, NRC issued a report evaluating the effectiveness of Part 37, as required by Public Law 113-235. NRC’s evaluation included an analysis of events and inspection findings related to the security of category 1 and 2 materials, including an analysis of 189 violations issued to NRC State licensees from March 2014 through March 2016. The report found that almost all of the violations were related to conducting background investigations, controlling access to radioactive material, and physical security measures. The violations mainly occurred when licensees had not yet implemented Part 37 or failed to fully document how their security program complied with Part 37. The report noted that there were no Severity Level I or Severity Level II violations. The NRC report looked at the theft of six category 2 quantities of radioactive material since the introduction of the Increased Controls security requirements in 2003 and concluded that carelessness or human error, rather than any gaps in the requirements of Part 37, contributed to the thefts. As we reported in 2014, the thefts included industrial radiography cameras with category 2 quantities of iridium-192 sources stolen from radiography trucks parked outside a company facility, in hotel parking lots, and at a gas station. NRC concluded that in all the events, carelessness or human error contributed to the thefts and had the licensees followed existing regulatory requirements, the thefts could have been prevented. NRC’s 2016 report concluded that better outreach and communication would help improve compliance with Part 37. NRC’s report also documents NRC staff’s determination that the requirements in Part 37 are effective in preventing the theft or diversion of category 1 and 2 quantities of radioactive material. NRC determined that potential rule clarifications and guidance initiatives could help to enhance the clarity and effectiveness of the rule, ensure better understanding of security expectations, and allow for more complete and adequate implementation. NRC’s overall assessment is that Part 37 provides reasonable assurance for the security of category 1 and 2 quantities of radioactive material by protecting the material from theft or diversion. In conducting its evaluation, NRC examined past security incidents and inspection reports, but its report did not review the security requirements for category 3, 4, or 5 quantities of radioactive material because NRC does not consider these categories to be a significant risk. NRC chose to define high-risk radioactive material as only category 1 and 2. NRC does not further elaborate why it took this approach. NRC’s reliance on prompt fatalities and deterministic health effects and its exclusion of socioeconomic consequences and deaths from evacuations as criteria for determining the consequences of an RDD, as discussed earlier, has resulted in security requirements that do not include all high- risk quantities of some radioactive materials. Experts who participated in our meeting generally agreed that some category 3 quantities of radioactive material should be considered high risk based on their potential consequences if used in an RDD. For example, one international expert pointed out that IAEA guidance includes security measures for category 3 quantities of material and expressed surprise that U.S. guidelines do not include additional security measures for category 3 quantities. Another expert suggested that NRC include category 3 quantities of radioactive material in the National Source Tracking System, which would allow for license verification during purchases. In this expert’s opinion, the main vulnerability for category 3 quantities of radioactive material is that they can be purchased with a license that has not been verified as legitimate by the NRC or an agreement state. The experts also generally said that some category 3 radioactive material should be considered high risk and should be subject to additional security measures. For example, one expert suggested that some types of category 3 radioactive material may need additional oversight. However, this expert said that NRC should consider a more nuanced approach to increasing the security for some, but not all, quantities of category 3 radioactive material. Another expert agreed and said that the ability to disperse material is a primary factor in determining if something is high risk. For this reason, this expert said, category 3 quantities of some types of radioactive material should be considered high risk, and there may be need for an additional category of materials that falls below category 2 but that includes the most dangerous high-risk materials in category 3 quantities. An expert who attended our meeting stated that certain radioactive materials pose a unique decontamination challenge because those materials bind to materials like asphalt and concrete, making decontamination difficult and expensive. One expert said that the consequences listed in the 2018 Sandia report were enough to justify requiring additional security measures for category 3 quantities of certain radioactive materials. As shown in table 1, the 2018 Sandia study found that a category 3 quantity of radioactive material could result in socioeconomic consequences and fatalities from evacuations similar to an RDD with a category 1 quantity of radioactive material. The experts also generally said that there could be long-term socioeconomic consequences unique to the risk posed by an RDD that used a category 3 quantity of radioactive material, and certain radioactive materials in smaller quantities should be considered high risk. As we described earlier, NRC reported in a 2017 Threat, Consequence, and Vulnerability Assessment that even if several hundred category 3 quantities of a certain radioactive material were used in an RDD, it would not create an RDD of consequence. In our discussions with NRC staff, they expanded on this point and stated that there may not be enough of this material in the United States to build an RDD of consequence. However, new research from Sandia found that a category 3 quantity of the same material could trigger an evacuation and result in significant socioeconomic consequences. According to an expert from the regulatory community, while the Commission has considered requiring additional security measures for category 3 quantities of material, NRC staff recommended against doing so because the costs of providing additional security would outweigh the benefits. For example, one expert who attended our meeting said that the choice is between the difference in costs of absolute security and adequate security, and the cost/benefit analysis does not support including category 3 quantities of radioactive materials in Part 37. The expert pointed out that there have been relatively few thefts of category 3 sources in the United States and suggested that providing additional security should be weighed against the low likelihood that the radioactive materials would be stolen. While there were differing views in our expert meeting between the regulatory community and other experts, the experts generally agreed, and the Sandia studies support, that the consequences of category 3 quantities of certain types of material could be significant. By requiring additional security measures for these high-risk quantities of category 3 material, and assessing whether other category 3 radioactive materials should also be safeguarded with additional security measures, NRC could have better assurance that its requirements are sufficient to help ensure all high-risk radioactive material is protected from theft and use in an RDD. NRC’s 2016 report looked at the risks posed by the collocation of category 3 quantities of material and insider threats. NRC concluded that rule clarifications and additional guidance could help enhance clarity and effectives of the rule, but its report does not fully address how these risks should be managed. For example, experts who participated in our meeting generally agreed that weaknesses continue to exist in how Part 37 regulates the collocation of multiple category 3 quantities of americium-241 at a single facility. Specifically, NRC requirements permit collocation of multiple category 3 quantities of material that in total reach a category 1 or 2 quantity of material, without applying Part 37. Experts told us that well logging companies, which use americium-241 to inspect wells for oil and natural gas, are storing multiple category 3 quantities, each just below the threshold for category 2, of americium-241 at the same facility; thus, the total quantity does not trigger additional security requirements under Part 37. Figure 3 shows a well logging storage facility containing multiple category 3 quantities of americium-241. Experts at our meeting generally said that collocation of multiple quantities of category 3 americium-241 at well logging facilities creates specific security weaknesses that should be addressed. For example, one expert who attended our meeting from the regulatory community said that NRC has no formal definition for collocation, but Part 37 considers it acceptable to store multiple category 3 quantities of radioactive material in separate, locked containers that, together, add up to a category 2 quantity. Another expert pointed out that when NNSA evaluates threats to materials, it totals up the quantity of materials located at the same facility to determine the total amount of material at risk. A third expert noted that licensees are required to inventory category 3 quantities of material only twice per year. Furthermore, the experts pointed out that these types of facilities are not subject to stricter security requirements, and therefore, do not undertake trustworthiness and reliability evaluations for their employees with unescorted access to radioactive material. By requiring that all licensees implement additional security measures when they collocate multiple quantities of category 3 americium-241—that in total reach a category 1 or 2 quantity—at a single facility, NRC could have better assurance that the material is protected from theft and use in an RDD. Furthermore, experts who participated in our meeting generally agreed that there continue to be security weaknesses in the current trustworthiness and reliability process for securing radioactive material from theft and use in an RDD. For example, one expert from the licensee community who attended our meeting said that NRC’s Part 37 does not go far enough in ensuring the trustworthiness and reliability of individuals given unescorted access. Specifically, the expert said that, based on the Part 37 requirements, licensees make all trustworthiness and reliability determinations for granting unescorted access to employees, which leads to inconsistencies across licensees. The experts generally said that NRC should give licensees more guidance on acceptable criteria for granting unescorted access, which is consistent with recommendations included in past GAO reports. NRC is currently in the process of making revisions to its trustworthiness and reliability guidance. Experts who attended our meeting said that licensees face challenges in making trustworthiness and reliability determinations, including the fear of being sued if they deny employment to an individual with a criminal record, difficulty conducting background investigations for foreign nationals, and the potential for individuals to be radicalized more quickly than the current trustworthiness and reliability process protects against. One expert from the regulatory community who attended our meeting said that trustworthiness and reliability decisions are a “judgment call,” and when an applicant has a criminal record or has committed a felony, a company may not want to give them unescorted access to radioactive material. However, the expert added that denial of unescorted access without backup from NRC guidance may leave the company open to lawsuits. In addition, another expert who attended our meeting said institutions that often employ foreign nationals as researchers, such as hospitals, struggle with verifying limited background information for these individuals. Finally, an expert who attended our meeting said that perception of trustworthiness and reliability has recently changed, and there is now greater concern that people can be radicalized quickly, rendering background investigations insufficient to identify potential issues with an employee’s trustworthiness and reliability during their employment. The expert told the group that there is evidence that individuals can be radicalized in a matter of months. The expert said that current trustworthiness and reliability procedures should take into account that people’s beliefs can change rapidly. Radioactive material is used in thousands of locations throughout the United States for medical, industrial, and research purposes. On several occasions over the past 20 years, NRC has examined and revised the security requirements for these materials in order to prevent terrorists from acquiring radioactive material and constructing an RDD, or “dirty bomb.” When assessing the risk posed by an RDD, NRC has repeatedly looked at different criteria for measuring consequences and chose to base its decisions primarily on preventing prompt fatalities and deterministic health effects from radiation. However, the experts who participated in our meeting generally agreed, and Sandia studies support, that socioeconomic effects and fatalities from subsequent evacuations are relevant criteria for assessing the consequences of an RDD. NRC’s decision to not consider other criteria to assess the consequence of an RDD has resulted in security requirements that do not address the full risks presented by the danger that category 3 quantities of some radioactive material could be used in an RDD to cause significant socioeconomic consequences comparable to what could be caused by category 2 or category 1 quantities of material. By considering socioeconomic impacts and fatalities resulting from evacuations in its criteria, NRC would have better assurance that it was considering more likely and more significant consequences of an RDD when establishing its security requirements for this material. Furthermore, Part 37 requires enhanced security measures for categories 1 and 2 quantities of radioactive material and does not require additional security for category 3, 4, and 5 quantities of material beyond existing safety requirements. Although NRC chose to limit its 2016 evaluation of Part 37 to only category 1 and 2 quantities of material, experts who participated in our meeting generally said that they consider certain category 3 quantities of radioactive material high risk based on their potential consequences if used in an RDD, and data from recent studies support this determination. By requiring additional security measures for these high-risk quantities of category 3 material, and assessing whether other category 3 radioactive materials should be safeguarded with additional security measures, NRC can have better assurance that its requirements are sufficient to help ensure all high-risk radioactive material are protected from theft and use in an RDD. In addition, NRC’s 2016 report looked at the risk posed by the collocation of category 3 quantities of material and concluded that rule clarifications and additional guidance could help enhance the clarity and effectiveness of the rule. However, the report does not fully address how this risk should be resolved. Current NRC security requirements permit the collocation of multiple category 3 quantities of material that in total reach a category 2 quantity of material or higher, without triggering additional security requirements under Part 37. By requiring that all licensees implement additional security measures when they collocate multiple quantities of category 3 americium-241—that in total reach a category 1 or 2 quantity—at a single facility, NRC could have better assurance that the material is protected from theft and use in an RDD. We are making the following three recommendations to the Nuclear Regulatory Commission: The Chairman of NRC should direct NRC staff to consider socioeconomic consequences and fatalities from evacuations in the criteria for determining what security measures should be required for radioactive materials that could be used in an RDD. (Recommendation 1) The Chairman of NRC should require additional security measures for high-risk quantities of certain category 3 radioactive material, and assess whether other category 3 materials should also be safeguarded with additional security measures. (Recommendation 2) The Chairman of NRC should require all licensees to implement additional security measures when they have multiple quantities of category 3 americium-241 at a single facility that in total reach a category 1 or 2 quantity of material. (Recommendation 3) We provided a draft of this report to the Chairman of NRC, the Administrator of NNSA, the Secretary of the Department of Homeland Security, and the Attorney General of the United States. NRC provided written comments on the draft report, which are presented in appendix III. In addition, NRC provided technical comments, which we incorporated as appropriate. NNSA, DHS, and FBI did not provide written comments. NRC disagreed with two of our recommendations and neither agreed nor disagreed with an additional recommendation. Specifically, it disagreed with our recommendations that it (1) consider socioeconomic consequences and fatalities from evacuations when determining security measures for radioactive materials; and (2) require licensees to implement additional security measures when they have multiple quantities of category 3 americium-241 at a single facility that in total reach a category 1 or 2 quantity. NRC stated that it is considering an additional recommendation that it require additional security measures for high-risk quantities of category 3 materials. Regarding the first recommendation with which NRC disagreed, the agency stated that its current regulatory requirements provide for the safe and secure use of radioactive materials, and that we only focused on potential consequences of an RDD without consideration of the two other elements of risk—threat and vulnerability. We disagree. NRC agrees that a general threat exists, and this report, in combination with our previous reports, demonstrate that there are vulnerabilities in current NRC security requirements and that the potential consequences of misusing these materials could be significant. Furthermore, the report discusses new evidence related to the consequence of an RDD that NRC has not yet considered. For the second recommendation with which it disagreed, NRC stated that it has already considered the issue of aggregation of radioactive material and has taken or is in the process of taking actions to clarify relevant guidance and procedures. Again, we disagree. We acknowledge that NRC is taking action to better educate licensees on how to comply with requirements related to aggregation. However, these actions do not address the issue of licensees taking advantage of NRC’s security requirements which permit the storing of multiple category 3 quantities that are just below the threshold for category 2 at the same facility. Finally, for the NRC recommendation to consider additional security measures for high-risk quantities of category 3 materials, the agency said that it has been considering our recommendation in connection with its response to the recommendations in GAO-16-330. However, after we issued GAO-16-330, NRC staff subsequently recommended that the NRC Commission not implement the recommendations from that report. NRC stated that our report and recommendations lack important context in that we did not consider all aspects of risk—threat, vulnerability, and consequences. We disagree. First, as the report states, NRC agrees that a general threat exists for the theft and misuse of radiological materials. Second, the report also states that we have addressed vulnerability in several past GAO reports that provide examples of how the controls that NRC and others have put in place to prevent the theft or misuse of these materials are not always implemented correctly. In fact, we found gaps in these controls each time we reviewed the security of radioactive materials. These gaps in controls create vulnerabilities. Having discussed threat and vulnerability, this report adds important new information concerning the consequences of an RDD. In this regard, both the Sandia studies and the results from our National Academy of Sciences expert meeting show that prompt fatalities from radiation are unlikely to occur if an RDD is detonated, while the same event could result in tens of billions of dollars in economic damage and potentially hundreds to thousands of deaths from evacuations. NRC also stated that our evidence was insufficient for recommending regulatory and policy changes. Specifically, they said that the Sandia studies (1) were based on scenarios that were not probable, (2) did not credit existing protective measures to prevent an RDD, and (3) were not subjected to a formal review and endorsement process. In addition, they said that the views expressed by experts who attended our National Academy of Sciences meeting resulted in conclusions that were not fully supported. We disagree with these characterizations of the studies and our expert meeting. Specifically, the Sandia studies did not attempt to assess existing security measures for radioactive material or the probability or likelihood of an RDD. These Sandia studies examined the consequences of an RDD and represent the most recent research on RDD consequences from an independent and reliable source. In addition, NRC’s claim that the Sandia studies were conducted without a formal review and endorsement process is misleading. Specifically, according to NNSA officials, Sandia and NNSA officials met with officials from NRC, DHS, and EPA, among others, to discuss and gather input on the assumptions to be used in the 2017 Sandia study. During this meeting, according to NNSA officials, NRC staff provided input on key assumptions and subsequently provided data to help support the Sandia study. In addition, NNSA and Sandia briefed their interagency partners, including NRC, about the findings in the study before publishing and received generally positive feedback on their results. Furthermore, we partnered with the National Academies to identify and select a broad range of experts in the field of radioactive material security, including federal agency and agreement state officials; academics; representatives of nonprofit organizations, licensees, and industry; international regulators; and national laboratory specialists. For additional information on how we developed, held, and analyzed data from our National Academy of Sciences expert meeting, please refer to appendix 2. NRC’s comments also state that GAO does not account for the work of the 2014 Radiation Source Protection and Security Task Force (the Task Force), which considered economic consequences related to an RDD. However, as noted in our report, NRC’s response to the Task Force’s recommendations said that NRC staff would need additional direction from the Commission to consider examining alternative consequences. In addition, in 2014, NRC staff recommended that NRC not consider changing the policy to include consideration of socioeconomic consequences to the Commission, reiterating the staff’s view that Part 37 provides adequate security protection against a significant RDD. Today, NRC staff still does not have direction from the Commission to consider socioeconomic effects when setting security requirements. We think that needs to change in order for NRC to conduct a complete analysis of the consequences of an RDD. Finally, NRC stated that a significant gap related to the security of category 3 sources has not been identified. We disagree. As noted in the report, requirements for the security of category 3 quantities of radioactive materials are significantly less stringent than those required for category 1 and 2 quantities of material. Nevertheless, our report shows that the use of category 3 quantities of certain radioactive materials in an RDD may have comparable socioeconomic consequences. Furthermore, previous GAO reports have repeatedly shown that gaps exist related to the security of category 3 and higher radioactive material. We are sending copies of this report to the appropriate congressional committees, the Chairman of the U.S. Nuclear Regulatory Commission, the Secretary of Energy, the Secretary of Homeland Security, the Administrator of the Environmental Protection Agency, and the Attorney General of the United States, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs are on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. We focused our review primarily on the Nuclear Regulatory Commission (NRC) because it is the principal federal agency with responsibility for licensing the commercial use of and regulating the security of radioactive materials in the United States. Additionally, Public Law 113-235 specifically directs us to review NRC’s security requirements for radioactive material. We also interviewed officials at various agencies that play a role in radioactive material security, including the National Nuclear Security Administration (NNSA), the Department of Homeland Security (DHS), the Environmental Protection Agency (EPA), and the Federal Bureau of Investigation (FBI). We interviewed officials at NNSA because NNSA’s Office of Radiological Security provides upgrades and enhancements to NRC licensees and removes and disposes of disused radioactive material. We also spoke to DHS officials because DHS is the primary federal agency for implementing domestic nuclear detection efforts for a managed and coordinated response to radioactive and nuclear threats. Additionally, we interviewed officials at EPA, because the agency developed the Protective Action Guide (PAG) manual, which contains radiation dose guidelines that would trigger public safety measures. Finally, we interviewed the FBI, which offered us information on the potential threat related to radioactive material security. In addition to federal agencies, we were contacted by and spoke to a working group that represents the commercial radioactive source industry and received a briefing from a company, which is also a member of the working group that utilizes large panoramic irradiators. We received a series of risk briefings from federal agencies to collect information on current risks related to radioactive material security. NRC officials provided us with information about how the agency evaluates risks associated with radioactive material, including the threat, vulnerability, and consequence of an adversary acquiring and using radioactive material in a radioactive dispersal device (RDD). DHS officials provided us with a risk briefing on current threats to radioactive material and potential consequences of an RDD attack. Specifically, those officials briefed us on historical terrorist interest in using radioactive materials in attacks. NNSA officials and Sandia National Laboratory experts in radioactive security and consequence modeling briefed us on potential economic consequences from an RDD, which they based on an economic impact study completed by Sandia in 2018. Finally, FBI officials gave us a threat briefing focused on current radioactive material security threats, including interest by adversaries in conducting an RDD attack. These briefings were held at a classified level. In order to fulfill the Public Law 113-235 requirement to work with an independent group of experts, we partnered with the National Academies of Sciences to convene a group of experts on radioactive material security on July 26 and 27, 2018. We determined that this method offered the best means of gathering a balanced group of leading experts in the field of radioactive security to discuss issues in a moderated setting. In addition, this method allowed us to implement a structured and systematic approach when gathering evidence. Specifically, our methodology for the meeting included selecting a broad range of experts to participate in the meeting, administering a written questionnaire to the experts before the meeting, designing specific scenarios used during the moderated discussion, and performing a thematic analysis upon completion of the meeting. To describe how NRC assesses risk when establishing security requirements for high-risk radioactive materials and how it chose to primarily consider prompt fatalities as criteria for measuring consequences of an RDD, we reviewed NRC documents addressing how NRC evaluates an RDD, NRC’s study evaluating the effectiveness of Part 37 in response to Public Law 113-235, and NRC’s analysis of the risks posed by high-risk radioactive materials. Specifically, we reviewed NRC Commission Papers and NRC responses to actions taken by the Radiation Source Protection and Security Task Force. We also conducted interviews with agency officials at NRC, NNSA, DHS, EPA, and FBI, as well as academics, agreement state officials, and security managers from industry about the risks associated with different categories of radioactive materials and how NRC regulates these materials. We selected interviewees based on their expertise, but the results of these interviews are not generalizable. To examine the extent to which radioactive security experts agreed that NRC’s assessment of risk includes all relevant criteria for establishing security requirements, we partnered with the National Academies to identify and select a broad range of experts in the field of radioactive material security, including federal agency and agreement state officials; academics; representatives of nonprofit organizations, licensees, and industry; international regulators; and national laboratory specialists. In choosing the group of 18 experts, we specifically chose individuals with a diversity of backgrounds on topics. This ensured a balanced range of opinions and specific expertise on given topics but did not represent a generalizable sample of experts on a specific topic. For example, some individuals had specific expertise in certain topics and could provide a more insightful perspective than others in the group. In advance of the meeting, we developed a written questionnaire to obtain the experts’ views on the key threats, vulnerabilities and consequences of materials regulated under Part 37 and those not regulated under Part 37. We administered the questionnaire to the experts via email and obtained completed questionnaires from all of them. We analyzed their responses to focus the topics we discussed during our two-day meeting. During the meeting, we introduced the threat of malevolent use of radioactive material, and we asked the experts to focus their discussion the potential consequences of an RDD, the vulnerabilities of radiological materials under current security requirements and whether current security requirements were sufficient given these consequences and vulnerabilities. We asked them to discuss the reasons to account for the consequence in the regulation of radioactive material, the reasons not to account for the consequence, and whether the consequence should be accounted for. In addition, we asked the experts the reasons various radionuclides should be considered high risk, the reasons these radionuclides should not be considered high risk, and on balance, whether these radionuclides should be considered high risk. Our meeting agenda and moderator guide also included detailed scenarios designed to probe issues related to radioactive security and provide clear parameters within which the experts could make observations. In particular, we presented the experts with four scenarios of differing quantities of radioactive material used for particular medical and industrial purposes and stored under particular circumstances. The four scenarios presented different types of radioactive materials stored under particular circumstances. For these scenarios, we asked experts about the primary vulnerabilities of these materials in terms of access, monitoring and detection and response, and given the consequences and vulnerabilities, whether the Part 37 security requirements were sufficient. We based these scenarios on situations we observed during our prior work on the security of radioactive material. For each of these scenarios, we asked experts to assess two key elements of the risk triplet—vulnerability to being used and consequences if used. For example, we included a presentation on threat associated with radioactive materials. Additionally, for each scenario we moderated discussions on scenarios focused on vulnerabilities of category 1 and category 3 radioactive materials or scenarios focused on the consequences of category 1 and category 3 RDDs. Furthermore, a GAO methodologist and a National Academies of Sciences official guided discussions, following the structured moderator guide to ensure the discussions addressed all topics. The moderators ensured that experts from all sides had the opportunity to voice their opinions, but time constraints and the nature of an expert meeting may have limited some experts from contributing. Because of this structure, we had no expectation of reaching outright consensus on any specific topic. After the expert meeting, we conducted a structured and systematic thematic analysis of the information gathered to better understand the potential vulnerabilities of radioactive materials to theft and the consequences of an RDD using various radioactive materials. We also worked with GAO methodologists to sort the content in the meeting transcript, identify themes from the sorted information for additional analysis, and evaluate the credibility of expert statements. GAO internally reviewed our analysis for completeness and accuracy and it was found to be sufficient for our purposes. The meeting transcript write-up allowed us to focus on strengths and weaknesses in current security requirements, how the federal government evaluates the consequences of an RDD, what materials should be considered high risk, and whether additional security measures are necessary for these materials. Experts did not speak on every topic, did not have the same level of expertise on every topic, and the meeting format was not designed to quantify experts’ comments. Therefore, we do not report the number of the 18 experts who agreed or disagreed with various statements. Instead, through our thematic analysis, we determined that during the expert meeting experts generally made two types of statements on topics with varying degrees of agreement or corroboration, which we refer to as either “strong evidence” or “evidence of varying viewpoints.” GAO, Government Auditing Standards, 2018 Revision, GAO-18-568G (Washington, D.C.: July 2018). According to government auditing standards, testimonial evidence obtained from an individual who is not biased and has direct knowledge about the area is generally more reliable than testimonial evidence obtained from an individual who is biased or has indirect or partial knowledge about the area. In addition to the individual named above, Ned Woodward (Assistant Director), Jeffrey Barron (Analyst in Charge), Kevin Bray, Mark Braza, Kendall Childers, Tara Congdon, Gabrielle Matuzsan, Amanda Miller, Danny Royer, and Kiki Theodoropoulos made key contributions to this report.", "summary": "NRC is responsible for regulating the security of radioactive material in the U.S. Failure to secure this material could result in an RDD causing socioeconomic damage. The Consolidated and Further Continuing Appropriations Act, 2015 (Public Law 113-235) includes a provision for GAO to review NRC's security requirements for high-risk radioactive material. This report examines, among other things, (1) the extent to which radioactive security experts agreed that NRC's assessment of risk includes all relevant criteria, and (2) NRC's 2016 evaluation of its security requirements for high-risk radioactive material. GAO reviewed NRC policies and procedures, worked with the National Academies of Sciences to convene a meeting with 18 experts in radioactive security, and reviewed 3 recent Sandia studies. GAO used the views of security experts to define high risk, and they generally agreed that high risk includes both larger and some smaller quantities of radioactive materials. The 18 experts at a meeting GAO convened with the National Academies of Sciences generally agreed that the Nuclear Regulatory Commission (NRC) assessment of risks of radioactive material does not include all relevant criteria. NRC limits its criteria to prompt fatalities and deterministic health effects from radiation, which, according to the experts and recent studies, are unlikely to result from a radiological dispersal device (RDD). Two studies from Sandia National Laboratories (Sandia) measuring consequences of RDDs, released in 2017 and 2018, found that there would be no immediate fatalities from radiation. The experts at the meeting generally agreed that socioeconomic effects (e.g., relocations and clean-up costs) and fatalities that could result from evacuations are the most relevant criteria for evaluating the risks of radioactive material. The two Sandia studies found that a large RDD could cause about $30 billion in damage and 1,500 fatalities from the evacuation, and a considerably smaller RDD could cause $24 billion in damage and 800 fatalities from the evacuation. By considering socioeconomic impacts and fatalities resulting from evacuations in its criteria, NRC would have better assurance it was considering the more likely and more significant consequences of an RDD. NRC's 2016 report evaluating its security requirements for high-risk radioactive material, required by Public Law 113-235, considered only the security of larger quantities of such material and not smaller quantities. Experts who attended GAO's meeting stated, and two 2018 Sandia studies agree, that if smaller quantities of certain radioactive material were used in an RDD, the impacts would be comparable to an RDD with a considerably larger amount of such material. For example, a 2018 study from Sandia found that malicious use of certain radioactive materials in smaller quantities could cause significant socioeconomic consequences. By requiring additional security measures for these smaller quantities of high-risk material, NRC can have better assurance that its security requirements are sufficient to secure all high-risk radioactive material from theft and use in an RDD. Example of a Radiological Dispersal Device (RDD) GAO is making three recommendations to NRC, including that it consider socioeconomic consequences and fatalities from evacuations as criteria for determining security measures and require additional security measures for smaller quantities of high-risk material. NRC generally disagreed with the recommendations, stating that GAO's evidence does not provide a sufficient basis for recommended changes. GAO continues to believe these recommendations are important.", "document_type": "gao"}
{"report": "We have previously reported on the extent to which FEMA programs encourage disaster resilience during recovery efforts and our prior and ongoing work also highlight opportunities to improve disaster resilience nationwide. Specifically, we reported on (1) federal efforts to strengthen disaster resilience, (2) FEMA’s efforts to promote hazard mitigation through the Public Assistance program, and (3) crafting appropriate federal responses to the effects of climate change. First, in July 2015, we found that states and localities experienced challenges when trying to use federal funds to maximize resilient rebuilding in the wake of a disaster. In particular, they had difficulty navigating multiple federal grant programs and applying federal resources toward their most salient risks because of the fragmented and reactive nature of the funding. In our 2015 report, we recommended that the Mitigation Framework Leadership Group—an interagency body chaired by FEMA—create a National Mitigation Investment Strategy to help federal, state, and local officials plan for and prioritize disaster resilience efforts. In August 2019, FEMA took action to fully implement our recommendation by publishing this strategy. Second, in November 2017, we found that FEMA had taken some actions to better promote hazard mitigation as part of its Public Assistance grant program, which provides grant funding for cost-effective hazard mitigation measures to reduce or eliminate the long-term risk to people and property from future disasters and their effects. However, we also reported that more consistent planning for, and more specific performance measures related to, hazard mitigation could help ensure that mitigation is incorporated into recovery efforts. We recommended, among other things, that FEMA (1) standardize planning efforts for hazard mitigation after a disaster and (2) develop performance measures for the Public Assistance grant program to better align with FEMA’s strategic goal for hazard mitigation in the recovery process. The Department of Homeland Security (DHS) concurred with our recommendations, and officials reported taking steps to increase coordination across its Public Assistance, mitigation, and field operations to ensure hazard mitigation efforts are standardized and integrated into the recovery process. Additionally, FEMA officials reported taking actions to begin developing disaster-specific mitigation performance measures. However, FEMA has yet to finalize these actions, such as by proposing performance measures to FEMA senior leadership. As such, we are continuing to monitor FEMA’s efforts to address these recommendations. Third, in September 2017, we reported that the methods used to estimate the potential economic effects of climate change in the United States— using linked climate science and economics models—could inform decision makers about significant potential damages in different U.S. sectors or regions, despite the limitations. For example, for 2020 through 2039, one study estimated between $4 billion and $6 billion in annual coastal property damages from sea level rise and more frequent and intense storms. We found that the federal government has not undertaken strategic government-wide planning on the potential economic effects of climate change to identify significant risks and craft appropriate federal responses. As a result, we recommended the Executive Office of the President, among others, should use information on the potential economic effects of climate change to help identify significant climate risks facing the federal government and craft appropriate federal responses, such as establishing a strategy to identify, prioritize, and guide federal investments to enhance resilience against future disasters. However, as of June 2019, officials had not yet taken action to address this recommendation. FEMA and other federal agencies provide multiple forms of disaster recovery assistance after a major disaster has been declared, including through FEMA’s Public Assistance and Individual Assistance programs, HUD’s Community Development Block Grant Disaster Recovery (CDBG- DR) program, and other efforts. Through these programs, the federal government obligates billions of dollars to state, tribal, territorial, and local governments, certain nonprofit organizations, and individuals that have suffered injury or damages from major disaster or emergency incidents, such as hurricanes, tornados, or wildfires. In September 2016, we reported that, from fiscal years 2005 through 2014, FEMA obligated almost $46 billion for the Public Assistance program and over $25 billion for the Individual Assistance program. According to FEMA’s September 2019 Disaster Relief Fund report, total projected obligations through fiscal year 2019 for the Public Assistance and Individual Assistance programs since August 1, 2017, are approximately $19 billion and $9 billion, respectively. Further, in March 2019, we reported that in response to the 2017 disasters, HUD had awarded approximately $32.9 billion in CDBG- DR funds to four grantees as of February 2019—$19.9 billion to Puerto Rico, $9.8 billion to Texas, $1.9 billion to the USVI, and $1.3 billion to Florida. As of September 2019, much of these awarded funds had been allocated to the grantees via Federal Register notices with the exception of Puerto Rico. HUD had not allocated the remaining $10.2 billion it awarded to Puerto Rico as of September 10, 2019, due to recent concerns about the territory’s governance and financial management challenges. Given the high cost of these programs, it is imperative that FEMA and HUD continue to make progress on the challenges we have identified in our prior and ongoing work regarding recovery efforts. FEMA’s Public Assistance program provides grants to state, tribal, territorial, and local governments, as well as certain types of private nonprofit organizations, for debris removal; emergency protective measures; and the repair, replacement, or restoration of disaster- damaged, publicly owned facilities. It is a complex and multistep program administered through a partnership among FEMA, state, and local officials. Prior to implementing the Public Assistance program, FEMA determines a state, territorial or tribal government’s eligibility for the program using primarily the per capita damage indicator. In our September 2018 report on federal response and recovery efforts for the 2017 hurricanes and wildfires, we reported on FEMA’s implementation of the Public Assistance program, which has recently undergone significant changes as a result of federal legislation and agency initiatives. Specifically, we reported on FEMA’s use of its redesigned delivery model for providing grants under the Public Assistance program, as well as the alternative procedures for administering or receiving such grant funds that FEMA allows states, territories, and local governments to use for their recovery. Our prior and ongoing work highlight both progress and challenges with FEMA’s Public Assistance program, including the agency’s methodology for determining program eligibility, the redesigned delivery model, and the program’s alternative procedures. In September 2012, we found that FEMA primarily relied on a single criterion, the per capita damage indicator, to determine a jurisdiction’s eligibility for Public Assistance funding. However, because FEMA’s per capita indicator, set at $1 in 1986, does not reflect the rise in (1) per capita personal income since it was created in 1986 or (2) inflation from 1986 to 1999, the indicator is artificially low. Our analysis of actual and projected obligations for 508 disaster declarations in which Public Assistance was awarded during fiscal years 2004 through 2011 showed that fewer disasters would have met either the personal income-adjusted or the inflation-adjusted Public Assistance per capita indicators for the years in which the disaster was declared. Thus, had the indicator been adjusted annually since 1986 for personal income or inflation, fewer jurisdictions would have met the eligibility criteria that FEMA primarily used to determine whether federal assistance should be provided, which would have likely resulted in fewer federal disaster declarations and lower federal costs. We recommended, among other things, that FEMA develop and implement a methodology that more comprehensively assesses a jurisdiction’s capacity to respond to and recover from a disaster without federal assistance, including fiscal capacity and consideration of response and recovery capabilities. DHS concurred with our recommendation and, in January 2016, FEMA was considering establishing a disaster deductible, which would have required a predetermined level of financial or other commitment before FEMA would have provided assistance under the Public Assistance program. In September 2019, FEMA told us that it was considering options for alternative methodologies for, among other things, assessing a jurisdiction’s independent capacity to respond to and recover from disasters. In addition, the DRRA includes a provision directing the FEMA Administrator to initiate rulemaking to update the factors considered when evaluating requests for major disaster declarations. According to FEMA documentation, as of September 2019, the agency was working to implement this provision through rulemaking proposals, including increasing the per capita indicator to account for inflation. Until FEMA implements a new methodology, the agency will not have an accurate assessment of a jurisdiction’s capabilities and runs the risk of recommending that the President award Public Assistance to jurisdictions that have the capacity to respond and recover on their own. In November 2017, we reported that FEMA redesigned its delivery model for providing grants under the Public Assistance program. As part of the redesign effort, FEMA developed a new, web-based case management system to address past challenges, such as difficulties in sharing grant documentation among FEMA, state, and local officials and tracking the status of Public Assistance projects. Both FEMA and state officials involved in testing the redesigned delivery model stated that the new case management system’s capabilities could lead to greater transparency and efficiencies in the program. However, we found that FEMA had not fully addressed two key information technology management controls that are necessary to ensure systems work effectively and meet user needs. We recommended, among other things, that FEMA (1) establish controls for tracking the development of system requirements, and (2) establish system testing criteria, roles and responsibilities, and the sequence and schedule for integration of other relevant systems. DHS concurred with these recommendations and, as of October 2019, has fully implemented both. FEMA’s original intention was to implement the redesigned delivery model for all future disasters beginning in January 2018. However, in September 2017, FEMA expedited full implementation of the redesigned model shortly after Hurricane Harvey made landfall. In September 2018, we reported that local officials continued to experience challenges with using the new Public Assistance web-based, case management system following the 2017 disasters, such as not having sufficient guidance on how to use the new system and delays with FEMA’s processing of their projects. Our prior and ongoing work highlight the challenges with implementing the Public Assistance program, including the alternative procedures, in Puerto Rico and the USVI. In particular, our work has identified challenges related to (1) developing fixed-cost estimates and (2) implementing flexibilities provided by the Bipartisan Budget Act of 2018. This Act allows FEMA, Puerto Rico, and the USVI to repair and rebuild critical services infrastructure—such as medical and education facilities— so it meets industry standards without regard to pre-disaster condition (see fig. 1). Unlike in the standard Public Assistance program where FEMA will fund the actual cost of a project, the Public Assistance alternative procedures allow awards for permanent work projects to be made on the basis of fixed-cost estimates to provide financial incentives for the timely and cost- effective completion of work. FEMA officials in Puerto Rico and the USVI stated that the development of a “cost factor” for use in the fixed-cost estimating process had slowed the pace of FEMA obligations for permanent work projects. Specifically, these factors are intended to ensure that the costs associated with implementing projects in Puerto Rico and the USVI are sufficiently captured when developing the fixed- cost estimates for alternative procedures projects. Since incorporating the cost factor into the fixed-cost estimating process will increase the amount of funding obligated for any given permanent work project, FEMA officials explained that Puerto Rico and the USVI had an incentive to delay the obligation of individual projects until this factor was finalized. For example, FEMA officials in the USVI told us in May 2019 that obligations for permanent work projects in the territory had been mostly on hold since October 2018 while an independent contractor worked to develop the USVI-specific cost factor. FEMA officials told us that USVI officials disagreed with the initial USVI- specific cost factors the independent contractor proposed. USVI officials contended that the cost factors were insufficient in accurately capturing the unique circumstances that influence construction costs in the territory, such as the limited availability of local resources and the need to import materials and labor. In May 2019, the contractor proposed a new cost factor, which FEMA approved on an interim basis pending further analysis. In July 2019, FEMA officials told us that while additional analyses are required to ensure its final process for developing fixed-cost estimates in the USVI accurately captures construction costs, using this interim cost factor in the meantime allows FEMA and USVI officials to move forward with the development and final approval of alternative procedures projects. In August 2019, a senior USVI official told us the territory plans to begin using the interim cost factor, where appropriate, to keep projects progressing forward. However, this official stated that the USVI questioned whether the interim cost factor did, in fact, sufficiently capture the actual costs of construction in the USVI. Given the uncertainty around these fixed-cost estimates, USVI officials told us the territory will need to balance the potential flexibilities provided by the alternative procedures program with the financial risk posed by cost overruns when deciding whether to use the alternative procedures or the standard Public Assistance program for any given permanent work project. Specifically, these officials stated that the USVI plans to pursue alternative procedures projects that do not include high levels of complexity or uncertainty to reduce the risk of cost overruns, especially given its already difficult financial situation. In addition, according to FEMA guidance, the Puerto Rico-specific cost factor was developed by a third-party center of excellence comprising personnel selected by FEMA and Puerto Rico. Through our ongoing work we learned that FEMA convened a panel of FEMA engineers to assess the cost factor methodologies proposed by the center of excellence. In July 2019, FEMA approved the use of a cost factor designed to account for location-specific construction costs in Puerto Rico to ensure that fixed-cost estimates for alternative procedures projects are accurate. This cost factor consists of cost indices to apply to urban, rural, and insular (the islands of Vieques and Culebra) areas of Puerto Rico. According to FEMA officials, these cost indices will compile location- specific construction costs for each of these three areas. We are currently assessing FEMA’s process for developing cost estimates for projects under both the standard and alternative procedures programs, and plan to report our results in early 2020. As of September 2019, FEMA officials told us the agency had obligated funding for 14 alternative procedures projects in Puerto Rico out of approximately 9,000 projects FEMA and Puerto Rico are working to develop for inclusion in the program. According to FEMA guidance, Puerto Rico must use the alternative procedures for all large permanent work projects and its deadline for finalizing the fixed-cost estimates for these projects was October 11, 2019. However, on October 8, 2019, Puerto Rico requested that FEMA extend this deadline. In response, FEMA acknowledged that Puerto Rico and FEMA have significant work remaining to develop and finalize the fixed-cost estimates for alternative procedures projects. As a result, FEMA authorized all parties to continue developing these projects while FEMA works to establish a new deadline for finalizing fixed-cost estimates in Puerto Rico. Unlike Puerto Rico, the USVI has the flexibility to pursue either the alternative procedures or the standard procedures on a project-by-project basis. As of September 2019, FEMA had obligated funding for two alternative procedures projects in the USVI. As the USVI’s deadline for finalizing these projects is in March 2020, it is too early to gauge the extent to which the alternative procedures will play a role in the USVI’s long-term recovery strategy. In addition, our preliminary observations indicate that FEMA, Puerto Rico, and USVI officials have reported challenges with the implementation of the flexibilities authorized by section 20601 of the Bipartisan Budget Act. This section of the Act allows for the provision of assistance under the Public Assistance alternative procedures to restore disaster-damaged facilities or systems that provide critical services to an industry standard without regard to pre-disaster condition. Officials from Puerto Rico’s central government stated that they disagreed with FEMA’s interpretation of the types of damages covered by section 20601 of the Bipartisan Budget Act of 2018. In response, FEMA officials in Puerto Rico stated they held several briefings with Puerto Rico’s central recovery office to explain FEMA’s interpretation of the section. Further, FEMA officials in the USVI told us that initially, they had difficulty obtaining clarification from FEMA headquarters regarding how to implement key components of section 20601 of the Act. In June 2019, the Additional Supplemental Appropriations for Disaster Relief Act of 2019 was signed into law and provides additional direction to FEMA regarding the implementation of section 20601. Among other things, this legislation includes a provision directing FEMA to change its process for determining whether a disaster- damaged facility is eligible for repair or replacement. FEMA evaluated this and other provisions of the Act and, in September 2019, issued an updated policy to provide clear guidance moving forward, according to agency officials. We will continue to evaluate these identified challenges and any efforts to address them, as well as other aspects of recovery efforts in the USVI and Puerto Rico, and plan to report our findings in November 2019 and January 2020, respectively. The Individual Assistance program provides financial and direct assistance to disaster victims for expenses and needs that cannot be met through other means, such as insurance. In May 2019, we reported on FEMA’s efforts to provide disaster assistance under the Individual Assistance program to older adults and people with disabilities following the 2017 hurricanes. We found that aspects of the application process for FEMA assistance were challenging for older individuals and those with disabilities. Further, according to stakeholders and FEMA officials, disability-related questions in the Individual Assistance registration materials were confusing and easily misinterpreted. While FEMA had made some efforts to help registrants interpret the questions, we recommended, among other things, that FEMA (1) implement new registration-intake questions that improve FEMA’s ability to identify and address survivors’ disability-related needs, and (2) improve communication of registrants’ disability-related information across FEMA programs. DHS concurred with the first recommendation, and officials reported that in May 2019 the agency updated the questions to directly ask individuals if they have a disability. The agency has taken actions to fully implement this recommendation and, according to FEMA’s analysis of applications for assistance following recent disasters—which used the updated questions—the percentage of registrants who reported having a disability increased. However, DHS did not concur with the second recommendation, noting that it lacks specific funding to augment its legacy data systems. FEMA officials stated that they began a long-term data management improvement initiative in April 2017, which they expect will ease efforts to share and flag specific disability-related data. While we acknowledge FEMA’s concerns about changing legacy systems when it has existing plans to replace those systems, we continue to believe there are other cost-effective ways that are likely to improve communication of registrants’ disability-related information prior to implementing the system upgrades. For example, FEMA could revise its guidance to remind program officials to review the survivor case file notes to identify whether there is a record of any disability-related needs. We also have work underway to assess FEMA’s Individuals and Households Program, a component program of Individual Assistance. Through this program, as of April 2019, FEMA had awarded roughly $4.7 billion in assistance to almost 1.8 million individuals and households for federally-declared disasters occurring in 2017 and 2018. Specifically, we are analyzing Individuals and Households Program expenditures and registration data for recent years; reviewing FEMA’s processes, policies, and procedures for making eligibility and award determinations; and examining survivors’ reported experiences with this program, including any challenges, for major disaster declarations occurring in recent years. We plan to report our findings in early 2020. FEMA’s Individuals and Households Program provides individuals with financial assistance, such as grants to help repair or replace damaged homes, and temporary direct housing assistance, such as recreational vehicles. HUD CDBG-DR grants provide funding that disaster-affected communities may use to address unmet needs for housing, infrastructure, and economic revitalization. In March 2019, we reported on the status of CDBG-DR grants following the 2017 disasters, plans for monitoring the program, and challenges HUD and grantees faced in administering these grants. We found that HUD lacked adequate guidance for staff reviewing key information, such as the quality of grantees’ financial processes and procedures and assessments of grantees’ capacity and unmet needs. Further, we found HUD had not completed monitoring or workforce plans that identify key risk factors and critical skills and competencies required for program implementation, among other things. In addition, we found that Congress has not established permanent statutory authority for CDBG-DR but rather has used supplemental appropriation legislation to authorize HUD to establish requirements via Federal Register notices. Without such permanent statutory authority, HUD must customize grantee requirements for each disaster. The ad hoc nature of CDBG-DR has created challenges for CDBG-DR grantees, such as lags in accessing funding and coordinating these funds with other disaster recovery programs. For example, it took 154 days (or 5 months) for HUD to issue the requisite Federal Register notice after the first appropriation for the 2017 hurricanes. According to HUD officials, they delayed issuance of the first notice for the 2017 hurricanes because they expected a second appropriation and wanted to allocate those funds in the same notice. However, because the second appropriation took longer than HUD expected, the first notice allocated only the first appropriation. We recommended that Congress consider permanently authorizing a disaster assistance program to address unmet needs in a timely manner. In addition, we made five recommendations to HUD. Specifically, we made two recommendations to HUD regarding developing additional guidance for staff to use when reviewing grantees’ planning documentation. HUD partially agreed with these two recommendations, stating that some of this guidance was already in place. Because HUD acknowledged that providing additional guidance would improve its review process, we revised these two recommendations accordingly to reflect the need for additional guidance. We also made three additional recommendations to HUD, including that the agency should develop a monitoring plan for grants and conduct workforce training. HUD generally agreed with these recommendations and indicated it planned to develop monitoring strategies. HUD also stated that it had developed a staffing plan, but we noted the agency still needed to conduct workforce planning to determine if the number of staff the agency planned to hire was sufficient. We are continuing to monitor HUD’s efforts to address these recommendations. In addition to those described above, we reported on challenges FEMA faced in (1) providing mass care to disaster survivors, (2) assisting jurisdictions affected by wildfires, and (3) supporting electricity grid recovery efforts in Puerto Rico. In September 2019, we reported on FEMA’s and the American Red Cross’ efforts to coordinate mass care—which includes sheltering, feeding, and distributing emergency supplies—following the 2017 hurricanes. We found that some needs related to mass care were unmet. For example, local officials in Texas said flooded roads prevented trucks from delivering supplies. Further, mass care providers encountered challenges in part because state and local agreements with voluntary organizations that help to provide mass care to disaster survivors did not always clearly detail what services these organizations were capable of providing. Among other things, we also found that while state, territorial, and local grantees of federal disaster preparedness grants are required to regularly submit information on their capabilities to FEMA, the mass care information some grantees provided to FEMA was not specific enough to aid its response in 2017. Moreover, as FEMA does not require grantees to specify the organizations providing mass care services in their capabilities assessments, grantees and FEMA may not be collecting reliable information on capabilities. As a result of our findings in this report, we made one recommendation to DHS, four recommendations to FEMA, and one recommendation to the American Red Cross. Specifically, among other things, we recommended that FEMA should emphasize the importance of defining roles and responsibilities in its guidance to grantees in states and localities and require them to solicit key capabilities information from mass care providers. DHS concurred with four recommendations, but did not concur with our recommendation requiring grantees to solicit key information from organizations providing mass care services and to specify these organizations in capability assessments. Specifically, DHS and FEMA stated that requiring grantees to include this information is not the most effective approach and would increase their burden. We modified our recommendation to address this concern and continue to believe that grantees should make an effort to include mass care providers in assessing capabilities. We will continue to monitor FEMA’s progress in fully addressing these recommendations. Further, in October 2019, we reported on the assistance FEMA provided to jurisdictions in response to major disaster declarations stemming from wildfires from 2015 through 2018 (see fig. 2). We found that FEMA helped state and local officials obtain and coordinate federal resources to provide for the needs of wildfire survivors and provided more than $2.4 billion in federal assistance. However, state and county officials also described challenges in responding to wildfire disasters. For example, onerous documentation requirements for FEMA’s Public Assistance grant program, a shortage of temporary housing for survivors, and the unique challenge of removing wildfire debris led to over-excavation on some homeowners’ lots and lengthened the rebuilding process. We also found that while FEMA had developed an after-action report identifying lessons learned from the October and December 2017 wildfires, the agency could still benefit from a more comprehensive assessment of its operations to determine if any changes are needed to better respond to the threat posed by increased wildfire activity. We recommended that FEMA assess operations to identify any additional updates to its management controls—such as policies, procedures, or training—that could enhance future response and recovery from large- scale and severe wildfires. DHS agreed with our recommendation and described a number of ongoing and planned actions it would take to address it, including supporting states’ efforts to house disaster survivors, developing guidance for housing grants authorized by the DRRA, and taking steps to identify areas of innovation in response to wildfire disasters. DHS anticipates that these efforts will be put into effect by December 2020 and we will continue to monitor DHS and FEMA’s progress in addressing this recommendation. In October 2019, we reported on federal efforts to support electricity grid recovery in Puerto Rico. We found that FEMA and other federal agencies can support long-term electricity grid recovery efforts and incorporate resilience through three primary roles—providing funding and technical assistance and coordinating among local and federal agencies. However, we found that zero permanent, long-term grid recovery projects in Puerto Rico had received funding as of July 2019 as Puerto Rico was still establishing priorities for permanent work. Further, we found that certain challenges are hindering progress on electricity grid recovery efforts in Puerto Rico, including uncertainty about the kinds of projects that may be eligible for federal funding, local capacity constraints, uncertainty about available federal funding, and the need for coordination among local and federal stakeholders. As a result of our findings, we made three recommendations to FEMA and one recommendation to HUD. Specifically, we recommended that FEMA should provide clear written policies, guidance, or regulations to clarify its plans for implementing new authorities provided by the Bipartisan Budget Act of 2018 and take steps to enhance coordination among local and federal entities. DHS concurred with these recommendations and stated it is working to address them. In addition, we recommended that HUD establish timeframes and a plan for publication of the grant process and requirements specifically for CDBG- DR funding for improvements to Puerto Rico’s electricity grid. In its response to this recommendation, HUD stated that it is closely working with its federal partners on the requirements for this funding in Puerto Rico, but did not specifically state whether it would establish the timeframes and a plan for publication of the grant process and requirements as we recommended. We continue to believe that this action is needed since without this information, local entities will continue to be uncertain regarding what is eligible for CDBG-DR funding. We will continue to monitor FEMA’s and HUD’s progress in addressing these recommendations. FEMA’s experiences during the 2017 disasters highlight the importance of continuing to make progress on addressing the long-standing workforce management challenges we have previously reported on and continue to observe in our ongoing work. In particular, our work has identified challenges related to (1) recruiting, maintaining, and deploying a trained workforce, (2) the Incident Management Assistance Team program, (3) Public Assistance program staffing, (4) contracting workforce shortages, (5) assistance to older adults and people with disabilities, and (6) workforce capacity and training. Recruiting, maintaining, and deploying a trained workforce. In September 2018, we reported that the 2017 disasters—hurricanes Harvey, Irma, and Maria, as well as the California wildfires—resulted in unprecedented FEMA workforce management challenges, including recruiting, maintaining, and deploying a sufficient and adequately-trained FEMA disaster workforce. FEMA’s available workforce was overwhelmed by the response needs caused by the sequential and overlapping timing of the three hurricanes. For example, at the height of FEMA workforce deployments in October 2017, 54 percent of staff were serving in a capacity in which they did not hold the title of “Qualified”— according to FEMA’s qualification system standards—a past challenge we identified. FEMA officials noted that staff shortages and lack of trained personnel with program expertise led to complications in its response efforts, particularly after Hurricane Maria. FEMA’s Incident Management Assistance Team program. In February 2016, we reported on, among other things, FEMA’s efforts to implement, assess, and improve its Incident Management Assistance Team program. We found that while FEMA used some leading practices in managing the program, it lacked a standardized plan to ensure that all national and regional Incident Management Assistance Team members received required training. Further, we found that the program had experienced high attrition since its implementation in fiscal year 2013. We recommended, among other things, that FEMA develop (1) a plan to ensure that Incident Management Assistance Teams receive required training, and (2) a workforce strategy for retaining Incident Management Assistance Team staff. DHS concurred with the recommendations. FEMA implemented our first recommendation by developing an Incident Management Assistance Team Training and Readiness Manual and providing a training schedule for fiscal year 2017. In response to the second recommendation, FEMA officials stated in July 2018 that they plan to develop policies that will provide guidance on a new workforce structure, incentives for Incident Management Assistance Team personnel, and pay-for-performance and all other human resource actions. We are continuing to monitor FEMA’s efforts to address this recommendation. Public Assistance program staffing. In November and December 2017, we reported on staffing challenges in FEMA’s Public Assistance program. In November 2017, we reported on FEMA’s efforts to address past workforce management challenges through its redesigned Public Assistance delivery model. As part of the redesign effort, FEMA created consolidated resource centers to standardize and centralize Public Assistance staff responsible for managing grant applications, and new specialized positions to ensure more consistent guidance to applicants. However, we found that FEMA had not assessed the workforce needed to fully implement the redesigned model, such as the number of staff needed to fill certain new positions, or to achieve staffing goals. Further, in December 2017, we reported on FEMA’s management of its Public Assistance appeals process, including that FEMA increased staffing levels for the appeals process from 2015 to 2017. However, we found that FEMA continued to face a number of workforce challenges, such as staff vacancies, turnover, and delays in training, which contributed to processing delays. Based on our findings from our November and December 2017 reports, we recommended, among other things, that FEMA (1) complete workforce staffing assessments that identify the appropriate number of staff needed to implement the redesigned Public Assistance delivery model, and (2) document steps for hiring, training, and retaining key appeals staff, and address staff transitions resulting from deployments to disasters. DHS concurred with our recommendations to address workforce management challenges in the Public Assistance program and have reported taking some actions in response. For example, to address the first recommendation, FEMA officials have developed preliminary models and estimates of staffing needs across various programs, including Public Assistance. However, as of October 2019, the agency has not yet taken actions to implement this recommendation. To address the second recommendation, FEMA has collected information on the amount of time regional appeals analysts spend on appeals, and the inventory and timeliness of different types of appeals. FEMA officials stated in September 2018 that they plan to assess this information to prepare a detailed regional workforce plan. In May 2019, FEMA sent us additional information and documentation involving its analysis of appeal inventory and timeliness. As of October 2019, we are evaluating the information provided by FEMA to determine if they have addressed this recommendation. Contracting workforce shortages. In April 2019, we reported on the federal government’s contracting efforts for preparedness, response, and recovery efforts related to the 2017 hurricanes and California wildfires. We found, among other things, that contracting workforce shortages continue to be a challenge for disaster response and recovery. Further, although FEMA’s 2017 after-action report recommended increasing contract support capacities, it did not provide a specific plan to do so. We also found that while FEMA evaluated its contracting workforce needs in a 2014 workforce analysis, it did not specifically consider contracting workforce needs in the regional offices or address Disaster Acquisition Response Team employees. In our April 2019 report, we recommended, among other things, that FEMA assess its workforce needs—including staffing levels, mission needs, and skill gaps—for contracting staff, to include regional offices and Disaster Acquisition Response Teams, and develop a plan, including timelines, to address any gaps. DHS concurred with this recommendation and estimates that it plans to implement it in the fall of 2019. Assistance to older adults and people with disabilities. In our May 2019 report on FEMA disaster assistance to older adults and people with disabilities following the 2017 hurricanes, we found that FEMA began implementing a new approach to assist individuals with disabilities in June 2018, which shifted the responsibility for directly assisting individuals with disabilities from Disability Integration Advisors—which are staff FEMA deploys specifically to identify and recommend actions needed to support survivors with disabilities—to all FEMA staff. To implement this new approach, FEMA planned to train all of the agency’s deployable staff and staff in programmatic offices on disability issues during response and recovery deployments. According to FEMA, a number of Disability Integration Advisors would also deploy to advise FEMA leadership in the field during disaster response and recovery. We found that while FEMA has taken some initial steps to provide training on the changes, it had not established a plan for delivering comprehensive disability-related training to all staff who will be directly interacting with individuals with disabilities. We recommended, among other things, that FEMA develop a plan for delivering training to FEMA staff that promotes competency in disability awareness and includes milestones and performance measures, and outlines how performance will be monitored. DHS concurred with this recommendation and reported plans to update FEMA’s position task books for all deployable staff with information that promotes competency in disability awareness. In July 2019, officials told us FEMA plans to hire new staff to focus on integrating the disability competency FEMA-wide and work with FEMA’s training components to ensure that disability- related training is consistent with the content of the position task books. We will continue to monitor FEMA’s efforts to address our recommendation. FEMA’s workforce capacity and training. In addition to our prior work on FEMA’s workforce management challenges related to specific programs and functions, we are continuing to evaluate FEMA’s workforce capacity and training efforts during the 2017 and 2018 disaster seasons. Our preliminary observations indicate that there were challenges in FEMA’s ability to deploy staff with the right kinds of skills and training at the right time to best meet the needs of various disaster events. For example, according to FEMA field leadership we interviewed, for some of the functions FEMA performs in the field, FEMA had too few staff with the right technical skills to perform their missions—such as inspections of damaged properties—efficiently and effectively. For other functions, these managers also reported that they had too many staff in the early stages of the disaster, which created challenges with assigning duties and providing on-the-job training. For example, some managers reported that they were allocated more staff than needed in the initial phases of the disaster, but many lacked experience and were without someone to provide direction and mentoring to ensure they used their time efficiently and gained competence more quickly. In focus group discussions and interviews with field managers, FEMA officials told us that difficulties deploying the right mix of staff with the right skills led to challenges such as delays in making purchases to support FEMA operations, problems with properly registering applicants for FEMA programs, or poor communication with nonfederal partners. Nonetheless, FEMA staff have noted that, despite any suboptimal circumstances during disaster response, they aimed to and have been able to find a way to deliver the mission. As part of this ongoing work, FEMA field leadership and managers also reported challenges using agency systems to ensure the availability of the right staff with the right skills in the right place and time. FEMA uses a system called the Deployment Tracking System to, among other things, help identify staff available to be deployed and activate and track deployments. To help gauge the experience level and training needs of its staff, the agency established the FEMA Qualification System (FQS), which is a set of processes and criteria to monitor staff experience in competently performing tasks and completing training that correspond to their job titles. According to the FQS guidance, staff who have been able to demonstrate proficient performance of all the relevant tasks and complete required training receive the designation “qualified,” and are expected to be ready and able to competently fulfill their responsibilities. Those who have not, receive the designation “trainee,” and can be expected to need additional guidance and on-the-job training. FQS designations feed into the Deployment Tracking System as one key variable in how the tracking system deploys staff. Among other challenges with FEMA’s Deployment Tracking System and Qualification System, FEMA managers and staff in the field told us in focus group discussions that an employee’s recorded qualification status was not a reliable indicator of the level at which deployed personnel would be capable of performing specific duties and responsibilities or their general proficiency in their positions, making it more difficult for managers to know the specialized skills or experience of staff and effectively build teams. We are continuing to assess these and other reported workforce challenges and plan to report our findings in spring 2020. Thank you, Chairwoman Titus, Ranking Member Meadows, and Members of the Subcommittee. This concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff have any questions concerning this statement, please contact Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement were Joel Aldape (Assistant Director), Bryan Bourgault (Analyst-in-Charge), Amanda Miller, and Heidi Nielson. In addition, Aditi Archer, Anthony Bova, Janice Ceperich, James Cook, Adam Couvillion, Lorraine Ettaro, Eric Hauswirth, Tracey King, Caryn Kuebler, Amy Moran Lowe, Amanda Parker, Sara Pelton, Josephine Perez, Amanda Prichard, Paige Smith, and Johanna Wong made contributions to this statement. Key contributors to the previous work discussed in this statement are listed in each of the cited reports. Highway Emergency Relief: Federal Highway Administration Should Enhance Accountability over Project Decisions. GAO-20-32 (Washington, D.C.: October 17, 2019). Wildfire Disasters: FEMA Could Take Additional Actions to Address Unique Response and Recovery Challenges. GAO-20-5 (Washington, D.C.: October 9, 2019). Puerto Rico Electricity Grid Recovery: Better Information and Enhanced Coordination Is Needed to Address Challenges. GAO-20-141 (Washington, D.C.: October 8, 2019). Disaster Response: HHS Should Address Deficiencies Highlighted by Recent Hurricanes in the U.S. Virgin Islands and Puerto Rico. GAO-19-592 (Washington, D.C.: September 20, 2019). Disaster Response: FEMA and the American Red Cross Need to Ensure Key Mass Care Organizations are Included in Coordination and Planning. GAO-19-526 (Washington, D.C.: September 19, 2019). Disaster Response: Federal Assistance and Selected States and Territory Efforts to Identify Deaths from 2017 Hurricanes. GAO-19-486 (Washington, D.C.: September 13, 2019). Emergency Management: FEMA’s Disaster Recovery Efforts in Puerto Rico and the U.S. Virgin Islands. GAO-19-662T (Washington, D.C.: July 11, 2019). 2017 Disaster Relief Oversight: Strategy Needed to Ensure Agencies’ Internal Control Plans Provide Sufficient Information. GAO-19-479 (Washington, D.C.: June 28, 2019). Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight Imperative for Further Improvements GAO-19-617T (Washington, D.C.: June 25, 2019). Emergency Management: FEMA Has Made Progress, but Challenges and Future Risks Highlight the Imperative for Further Improvements GAO-19-594T (Washington, D.C.: June 12, 2019). Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318 (Washington, D.C.: May 14, 2019). Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery. GAO-19-281 (Washington, D.C.: April 24, 2019). 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296 (Washington, D.C.: April 18, 2019). FEMA Grants Modernization: Improvements Needed to Strengthen Program Management and Cybersecurity. GAO-19-164 (Washington, D.C.: April 9, 2019). Disaster Recovery: Better Monitoring of Block Grant Funds Is Needed. GAO-19-232 (Washington, D.C.: March 25, 2019). Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256 (Washington, D.C.: March 14, 2019). Huracanes de Puerto Rico: Estado de Financiamiento de FEMA, Supervisión y Desafíos de Recuperación. GAO-19-331 (Washington, D.C.: March 14, 2019). High-Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High-Risk Areas. GAO-19-157SP (Washington, D.C.: March 6, 2019). U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253 (Washington, D.C.: February 25, 2019). 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93 (Washington, D.C.: December 6, 2018). Continuity of Operations: Actions Needed to Strengthen FEMA’s Oversight and Coordination of Executive Branch Readiness. GAO-19-18SU (Washington, D.C.: November 26, 2018). Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354 (Washington, D.C.: September 6, 2018). 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472 (Washington, D.C.: September 4, 2018). Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18-366 (Washington, D.C.: May 31, 2018). 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335 (Washington, D.C.: February 28, 2018). Disaster Recovery: Additional Actions Would Improve Data Quality and Timeliness of FEMA’s Public Assistance Appeals Processing. GAO-18-143 (Washington, D.C.: December 15, 2017). Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30 (Washington, D.C.: November 8, 2017). Climate Change: Information on Potential Economic Effects Could Help Guide Federal Efforts to Reduce Fiscal Exposure. GAO-17-720 (Washington, D.C.: September 28, 2017). Federal Disaster Assistance: Federal Departments and Agencies Obligated at Least $277.6 Billion during Fiscal Years 2005 through 2014. GAO-16-797 (Washington, D.C.: September 22, 2016). Disaster Recovery: FEMA Needs to Assess Its Effectiveness in Implementing the National Disaster Recovery Framework. GAO-16-476 (Washington, D.C.: May 26, 2016). Disaster Response: FEMA Has Made Progress Implementing Key Programs, but Opportunities for Improvement Exist. GAO-16-87 (Washington, D.C.: February 5, 2016). Hurricane Sandy: An Investment Strategy Could Help the Federal Government Enhance National Resilience for Future Disasters. GAO-15-515 (Washington, D.C.: July 30, 2015). Budgeting for Disasters: Approaches to Budgeting for Disasters in Selected States. GAO-15-424 (Washington, D.C.: March 26, 2015). High-Risk Series: An Update. GAO-15-290 (Washington, D.C.: February 11, 2015). Emergency Preparedness: Opportunities Exist to Strengthen Interagency Assessments and Accountability for Closing Capability Gaps. GAO-15-20 (Washington, D.C.: December 4, 2014). Fiscal Exposures: Improving Cost Recognition in the Federal Budget. GAO-14-28 (Washington, D.C.: October 29, 2013). Federal Disaster Assistance: Improved Criteria Needed to Assess a Jurisdiction’s Capability to Respond and Recover on Its Own. GAO-12-838 (Washington, D.C.: September 12, 2012). Opportunities to Reduce Potential Duplication in Government Programs, Save Tax Dollars, and Enhance Revenue. GAO-11-318SP (Washington, D.C.: March 1, 2011). 1. Review of U.S. Virgin Islands recovery planning and progress; 2. Puerto Rico disaster recovery planning and progress; 3. Drinking water and wastewater utility resilience; 4. Disaster and climate change impacts on Superfund sites; 5. FEMA Public Assistance program fraud risk management efforts; 6. Wildland fire collaboration on fuel reduction efforts; 7. Preparedness challenges and lessons learned from the 2017 8. FEMA workforce management and challenges; 9. Small Business Administration response to 2017 disasters; 10. Development of the GAO disaster resilience framework; 11. FEMA Individuals and Households Program operations and 12. National Flood Insurance Program post-flood enforcement; 13. Emergency alerting capabilities and progress; 14. National Flood Insurance Program buyouts and property acquisitions; 15. Economic costs of large-scale natural disasters and impacts on 16. Community Development Block Grants – disaster recovery; 17. Disaster Housing Assistance Program; 18. Contracting workforce and purchase card use for disaster response 19. Power grid and water projects; 20. National Earthquake Hazards Reduction Program (NEHRP); and 21. Disaster resilience and hazard mitigation. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Recent hurricanes, wildfires, and flooding have highlighted the challenges the federal government faces in responding effectively to natural disasters. The 2017 and 2018 hurricanes and wildfires affected millions of individuals and caused billions of dollars in damages. In March 2019, the Midwest experienced historic flooding that affected millions of acres of agriculture and damaged infrastructure. Since 2005, federal funding for disaster assistance is at least $450 billion. Increasing reliance on federal help to address natural disasters is a key source of federal fiscal exposure, particularly as certain extreme weather events become more frequent and intense. This statement discusses, among other things, FEMA's and other federal agencies' progress and challenges related to disaster resilience, recovery programs, and workforce management. This statement is based on GAO reports issued from September 2012 through October 2019, and also includes preliminary observations from ongoing GAO reviews. GAO examined federal laws and documents; interviewed agency officials; and visited disaster damaged areas in California, Florida, South Carolina, North Carolina, Puerto Rico, Texas, and the U.S. Virgin Islands, where GAO also interviewed federal and local officials. GAO's issued and ongoing work has identified progress and challenges in the Federal Emergency Management Agency's (FEMA) and other federal agencies' disaster recovery efforts, as discussed below. Disaster resilience. GAO found that federal and local efforts to improve resilience can reduce the effects and costs of future disasters. FEMA has made progress in this area, but in November 2017, GAO found that more consistent planning could help ensure that rebuilding efforts incorporate hazard mitigation, which would increase the resilience of infrastructure during future disasters. GAO recommended that FEMA take steps to consistently integrate hazard mitigation into its recovery process. FEMA is working to address these recommendations. Managing long-term recovery. GAO's work has shown that federal recovery programs are complicated and can be slow to provide assistance. For example, in October 2019, GAO reported that local officials described onerous documentation requirements in FEMA's Public Assistance program and the unique challenge of removing debris following the 2017 wildfires. GAO recommended that FEMA assess its operations to identify actions to enhance future recovery from severe wildfires. In March 2019, GAO reported that the ad hoc nature of disaster recovery block grants from the Department of Housing and Urban Development delayed the availability of funding. GAO recommended, among other things, that Congress consider permanently authorizing this grant program to meet the needs of disaster survivors in a timely manner. FEMA workforce management. GAO has previously reported on long-standing workforce management challenges, such as ensuring an adequately-staffed and trained workforce to provide effective assistance. For example, GAO reported in September 2018 that the 2017 disasters overwhelmed FEMA's workforce and a lack of trained staff with program expertise led to complications in its response efforts, particularly after Hurricane Maria. While FEMA has taken actions to address several of GAO's workforce management-related recommendations since 2016, a number of recommendations have not yet been implemented. GAO is currently reviewing FEMA's workforce management efforts and lessons learned from the 2017 disasters and will report its findings early next year. GAO has made numerous recommendations in prior reports designed to address the challenges discussed in this statement. Federal agencies have taken steps to address these recommendations and GAO is monitoring agencies' ongoing efforts.", "document_type": "gao"}
{"report": "Our simulations suggest that the sector will likely continue to face a difference between revenues and expenditures during the next 50 years, as measured by its operating balance. We simulated the state and local government sector’s operating balance—a measure of the sector’s ability to cover its current expenditures out of current revenues—to understand the sector’s long-term fiscal outlook based on historical revenue patterns and other assumptions. Because a great majority of states and many local governments are required to balance or nearly balance their operating budgets, the operating balance illustrates the magnitude of fiscal pressures they face. Expenditures and revenues are both simulated to increase as a percentage of gross domestic product (GDP) during the simulation period. However, expenditures are generally expected to grow at a faster rate than revenues, resulting in a declining operating balance (see figure 1). One way of measuring the long-term fiscal challenges faced by the state and local government sector is through an indicator known as the “fiscal gap.” The fiscal gap is an estimate of annual changes in expenditures and in revenues our simulations suggest would be needed to maintain the operating balance equal to zero during the 50-year simulation period. The sector could close the fiscal gap through an increase in revenues, a reduction in expenditures, or a combination of the two of sufficient magnitude. Our simulations suggest that the fiscal gap is about 3.6 percent of GDP over the next 50 years. The sector will need to take actions in annually reducing its expenditures or raising revenues, to achieve fiscal balance. Assuming no change in simulated expenditures, the sector would need to take actions equivalent to increasing its total revenues by 4.2 percent each year to achieve fiscal balance. Alternatively, assuming no change in its simulated revenues, the sector would need to take actions equivalent to decreasing its noninterest expenditures by an amount equal to 3.2 percent of its total expenditures each year. Total expenditure reductions required by the sector are 20.7 percent each year, which includes interest payments on debt that are simulated to be 17.4 percent of annual spending. To eliminate the fiscal gap, the sector would most likely take actions that include a combination of expenditure reductions and revenue increases. Our simulations suggest that growth in the sector’s overall expenditures is largely driven by health care expenditures. Medicaid will likely constitute a growing expenditure for state and local governments. In 2018, Medicaid spending was 2.9 percent of GDP compared to 0.85 percent of GDP for other kinds of health care spending such as non-Medicaid social benefit payments and employee health benefit contributions. At the end of our simulations, Medicaid is simulated to be 4.6 percent of GDP and the other kinds of health care spending are 1.3 percent of GDP. After 2029, Medicaid spending in our simulations is derived from Centers for Medicare & Medicaid Services’ (CMS) projections. On average, Medicaid expenditures are expected to rise by 1 percentage point more than GDP each year over the simulation period. Breaking this down, Medicaid expenditures per capita are expected to increase, on average, about 0.6 percent faster than GDP per capita—referred to as excess cost growth. Excess Cost Growth The extent to which health care costs per capita outpace gross domestic product (GDP) growth per person. As shown in figure 4, health care expenditures are simulated to increase from about 3.94 percent of GDP in 2019 to 5.9 percent of GDP in 2068. In comparison, nonhealth, noninterest expenditures, which include all other operational expenditures other than debt interest payments, will decrease as a share of GDP by 2.74 percentage points over the simulation period. Per capita, national health expenditures, which make up part of the health care expenditures in the figure below, are expected to grow on average 0.8 percent faster than GDP each year during the simulation period, according to CMS. Employee compensation is the largest expenditure for the state and local government sector. It declines from 6.8 percent of GDP in 2018 to 6.1 percent of GDP in 2068. All spending components, including employee compensation, are simulated to increase in actual dollar amounts during our simulation period. Of the spending components included in employee compensation, only health benefits for employees and retirees increase as a share of employee compensation. In contrast, wages and salaries, pension contributions, and other forms of compensation decrease as a share of employee compensation (see figure 5). These percentages reflect a simulated decrease in state and local government employees’ compensation as a share of GDP. Our simulations suggest that spending on health benefits for state and local government employees and retirees is likely to rise, on average, by 0.9 percentage points more than GDP each year. Similar to the growth in Medicaid spending, growth in spending for these health benefits is due to an increase in the simulated number of employees and retirees enrolled as well as an increase in the simulated amount of health benefits for each employee and retiree. According to our simulations, if employee and retiree health benefits follow trends in overall national health spending, they will likely make up an increasingly larger share of total employee compensation going forward. Our simulations suggest that annual contributions to state and local government employee pension plans will need to remain at their historical 10-year average of 12.9 percent of wages and salaries for state and local governments to meet their long-term pension obligations. Prior to the last decade, from 1999 to 2008 the state and local government sector averaged about an 8 percent contribution rate, which was lower than what our current simulations show is necessary for meeting pension obligations. State and local government contributions to employee pension plans are simulated to decline as a share of GDP, as are wages and salaries of state and local government employees. Our simulations suggest that federal grants will increase slightly as a share of GDP. The largest grant receipts are for Medicaid which will likely grow more quickly than other types of federal grants making up an increasing share of revenues in the future (see figure 6). The increase in Medicaid expenditures simulated during this period will likely put increasing pressure on both federal and state governments. As a matching formula grant program, the simulated increase in federal Medicaid grants implies an expected increase in Medicaid expenditures that will be shared by state governments. Federal investment grants (i.e., grants intended to finance capital infrastructure investments) and other federal grants unrelated to Medicaid (i.e., grants intended to finance education, social services, housing, and community investment) are simulated to decline as a share of GDP. Further, our simulations suggest that if historical relationships between state and local governments’ tax revenues and tax bases persist, total tax revenues for the state and local government sector will increase from 8.7 percent of GDP in 2019 to 9.1 percent of GDP by the end of the simulation period. As shown in figure 7, the different components of total tax revenues are simulated to remain fairly consistent or slightly increase. The simulations suggest that personal income tax revenues will increase as a share of GDP by about 0.5 percentage points during the simulation period. Sales tax is expected to decrease by approximately 0.2 percentage points and property taxes are simulated to slightly increase as a share of GDP through 2068 from 2.73 percent to 2.86 percent. Sensitivity Analysis An analysis using alternative assumptions of one variable to determine the uncertainty, or sensitivity, of another variable. Several factors, or key model variables, could affect the state and local government sector’s long-term fiscal outlook, including economic growth, health care excess cost growth, and the rate of return on pension assets. To see how the outlook changes in response to them, we developed sensitivity analyses—simulations that use alternative assumptions about their growth. For each of these key variables we use a baseline assumption, a higher-than-baseline assumption, and a lower-than- baseline assumption. We determined that these alternative assumptions highlighted the operating balance’s sensitivity to changes, shifting the future fiscal outcomes for the sector. Future trends in GDP growth could affect the state and local government sector’s fiscal outlook. In our simulations, GDP growth is based on the most recent data from the Congressional Budget Office (CBO) and the Board of Trustees of the Federal Old-Age and Survivors Insurance and Federal Disability Insurance Trust Funds (OASDI Trustees) which project real GDP (adjusted for inflation) to grow by 1.9 percent per year on average from 2018 through 2029, and by 2 percent per year on average after 2029. Using these projections, our simulations suggest that maintaining current policies would cause the sector’s operating balance to become increasingly negative. Using the OASDI Trustees’ alternative assumptions of real GDP growth at a faster rate—2.7 percent—suggests that the operating balance, while remaining negative, would have an improved outlook compared to the baseline. While growth in revenue and health care spending is largely tied to GDP in our simulations, spending for other components is tied to inflation and population growth and grows more slowly than GDP. As such, increases in GDP growth improve the sector’s outlook. Our simulations, using the OASDI Trustees’ alternative assumptions also show that if GDP were to grow at a slower rate—1.4 percent—the difference between revenues and expenditures would expand, resulting in an increasingly negative operating balance (see figure 8). Excess cost growth in health care is another key determinant of the sector’s fiscal balance. In our simulations Medicaid spending per capita grows about 1.8 percent faster than GDP per capita on average for the period from 2020 through 2029. Medicaid spending per capita grows about 0.6 percent faster on average from the period from 2030 through 2068. Other health expenditures per capita grow about 0.8 percent faster than GDP per capita for the period from 2019 through 2068. Using these projections, our simulations suggest that maintaining current policies will cause the sector’s expenditures to exceed its revenues and this difference will become increasingly negative during the next several decades. The simulations developed assuming zero excess cost growth in Medicaid and national health expenditures suggest that spending would be lower as a share of GDP. The difference between revenues and expenditures would be significantly less negative than the baseline simulations around the middle of the simulation period before stabilizing, but remain negative over the simulation period. In the scenario using the alternative projections from CMS where excess cost growth rises faster— 0.6 percent on average for Medicaid for the period from 2030 through 2068 and 0.9 percent for national health expenditures for the period between 2019 through 2068—our simulations show that the difference between revenues and expenditures would persist for the remainder of the simulation period (see figure 9). The rate of return on pension assets could also affect the state and local government sector’s fiscal outlook. Based on an inflation-adjusted rate of return on pension assets of 5 percent, our simulations suggest that state and local governments would need to make pension contributions equivalent to about 13 percent of employees’ wages and salaries to meet their long-term pension obligations. The simulations we developed using a higher rate of return—7.5 percent—suggest that pension contributions would be about 3 percent of state and local government employees’ wages and salaries to meet pension obligations. Under this scenario, spending would need to be a lower share of GDP and the sector’s outlook would improve. The difference between revenues and expenditures would briefly narrow early on before becoming increasingly negative through the remainder of the simulation period. Alternatively, we estimated that if the rate of return on pension assets is relatively low—2.5 percent—required pension contributions would need to be about 24 percent of state and local government employees’ wages and salaries. Under this scenario our simulations show that spending would be a higher share of GDP and the sector’s outlook would worsen as the sector’s negative operating balance would continue to grow larger (see figure 10). This report was prepared under the direction of Michelle A. Sager, Director, Strategic Issues, who can be reached at 202-512-6806 or sagerm@gao.gov, and Oliver M. Richard, Director, Center for Economics, who can be reached at 202-512-8424 or richardo@gao.gov if there are any questions. GAO staff who made key contributions are listed in appendix II. This update of the state and local government fiscal model used aggregate data on the state and local government sector and national data on other variables from the following sources: the Agency for Healthcare Research and Quality, Bloomberg, the Board of Governors of the Federal Reserve System, the Board of Trustees of the Federal Old- Age, Survivors, and Disability Insurance Program (OASDI Trustees), BEA, the Bureau of Labor Statistics, the Census Bureau, the Centers for Medicare & Medicaid Services (CMS), the Congressional Budget Office (CBO), and the Social Security Administration. These data sources are generally the same data sources we used for our prior update. We used annual observations on historical data through 2018 where available. This report updates GAO’s state and local fiscal model to simulate the fiscal outlook for the state and local government sector. This includes identifying the factors that are likely to contribute to the state and local sector’s fiscal imbalance. The level of receipts and expenditures for the state and local government sector as a whole in future years is based on current and historical spending and revenue patterns. We used Table 3.3 of the National Income and Product Accounts (NIPA)—State and Local Government Current Receipts and Expenditures—prepared by BEA as an organizing framework for developing our model, and we simulated state and local government receipts and expenditures using methods similar to those we have used in prior updates. Our simulations of real U.S. gross domestic product (GDP) were consistent with the growth path developed by CBO for the period from 2019 through 2029 and by the OASDI Trustees for the period thereafter. Our simulations of U.S. population was consistent with the growth path developed by the OASDI Trustees, and our simulations of excess cost growth for national health expenditures and for Medicaid were consistent with CMS projections, all for the entire simulation period. Our simulations of other variables, such as the GDP price index, personal income, and 3-month U.S. Department of the Treasury (Treasury) rates, were consistent with the growth paths for these variables developed by CBO for as much of the simulation period as possible. Otherwise, we developed our own assumptions about the likely future growth path of the variables in our model. In general, we assumed that current policies remain in place and that all levels of government continue to provide services at current per capita levels. A detailed description of the model is in appendix I of GAO, State and Local Governments’ Fiscal Outlook: 2018 Update, GAO-19-208SP (Washington, D.C.: December 2018). We describe below where we updated equations or added equations to the model. Otherwise our approach is the same as the approach we used in that update. We simulated the future growth paths of the following types of state and local government revenues: current tax receipts, contributions to government social insurance, income on financial assets, current transfer receipts, the surplus from government enterprises, and capital transfer receipts. We also simulated the future growth path of state and local government long-term debt issuance. We updated some of the equations we used to simulate tax receipts(see table 1). We also added equations to simulate current transfers from the rest of the world to state and local governments, disaster-related insurance benefits to state and local governments, and other capital transfers to state and local governments, which we had not included in prior updates. The equations we used to simulate the other types of receipts are the same as the equations we used in GAO-19-208SP. We simulated the future growth paths of the following types of state and local government expenditures: consumption expenditures, current transfer payments, interest paid on outstanding state and local government debt, subsidies, capital outlays, and consumption of fixed assets (depreciation). We also simulated the future growth path of the state and local government sector’s net social insurance fund balance. We updated some of the equations we used to simulate the interest paid on outstanding state and local government debt (see table 1 above). We also added equations to simulate current transfer payments to the rest of the world, which we had not included in prior updates. Otherwise, the approach we used to simulate expenditures is the same as the approach we used in GAO-19-208SP. Our main indicator of the sector’s fiscal balance is its operating balance net of funds for capital expenditures (henceforth, operating balance), which is a measure of the sector’s ability to cover its current expenditures out of current receipts. Operating balance is defined as total receipts minus (1) capital outlays not financed by long-term debt issuance, (2) current expenditures less depreciation, (3) current surplus of state and local government enterprises, and (4) net social insurance fund balance. We also estimated the annual changes in spending and in receipts that our simulations suggest would be needed to maintain the operating balance equal to zero during the 50-year simulation period, which we refer to as the “fiscal gap.” As discussed above, our baseline simulations assume that current policies remain in place and that all levels of government continue to provide services at current per capita levels. We then simulated the change in total expenditures needed to maintain the operating balance equal to zero. To estimate the annual change in spending needed to maintain balance we calculated the present value of that change as a percentage of the present value of baseline total expenditures and as a percentage of the present value of U.S. GDP, all for a 50-year period. We also calculated the interest and non-interest expenditure components of the change in total expenditures needed to maintain balance. We used a similar approach to estimate the annual change in total receipts needed to maintain balance. We assessed the sensitivity of our baseline results to alternative projections of real U.S. GDP growth, health care excess cost growth, and the real rate of return on state and local government pension fund assets. Following the same approach we used in GAO-19-208SP, for each of these variables, we selected an alternative projection associated with faster growth or rate of return and one associated with slower growth or rate of return. Real U.S. GDP. For our baseline simulations, we used CBO projections of real GDP for the period from 2019 through 2029 and the OASDI Trustees’ intermediate projections of real U.S. GDP growth for the years thereafter. For our sensitivity analysis, we used the OASDI Trustees’ high-cost and low-cost projections. Health care excess cost growth. For our baseline simulations, we used CMS’s baseline projection of national health expenditures excess cost growth and we estimated Medicaid excess cost growth based on CMS’s baseline projections. For our sensitivity analysis, we used CMS’s alternative projection of national health expenditures excess cost growth and we estimated Medicaid excess cost growth based on CMS’s alternative projections. As another alternative, we simulated the model assuming both zero excess cost growth for national health expenditures and Medicaid. Our simulations used CBO’s projection of federal spending on Medicaid, CHIP, and exchange subsidies as a fraction of GDP to simulate certain variables related to state and local government spending on Medicaid and other health spending. This projection incorporates excess cost growth for the period from 2019 through 2029 but assumes zero excess cost growth starting in 2030, so we could only vary Medicaid excess cost growth in the alternative simulations for 2030 and later. Real rate of return on state and local government pension assets. For our baseline simulations, we assumed a 5 percent real rate of return on state and local government pension assets. For our sensitivity analysis, we used 2.5 percent and 7.5 percent. Table 2 shows the growth rates or rates of return associated with the baseline and alternative projections of each variable for the simulation period. We simulated the model changing either real U.S. GDP growth, health care excess cost growth, or the real rate of return on pension assets, leaving the other variables fixed at their baseline values. Thus, our sensitivity analysis is in the spirit of a partial equilibrium comparative statics analysis that sheds light on how each of the individual variables may affect the state and local government sector’s fiscal outlook. However, these variables are likely to be correlated, so future changes in one would likely be associated with changes in others. Our approach has a number of limitations and the results should be interpreted with caution. First, the state and local fiscal model is not designed for certain types of analyses. The simulations are not intended to provide precise predictions. Even though we know that these governments regularly make changes in tax laws and expenditures, the model essentially holds current policies in place and analyzes the fiscal future for the sector as if those policies were maintained because it would be highly speculative to make any assumptions about future policy adjustments. In addition, fiscal outcomes related to the sector’s financial position and solvency may not reflect all aspects of the sector’s “health.” Other indicators include economic indicators that go beyond the sector’s financial position to include economic growth, income, or distributional equity, as well as indicators of the quality of services provided by the sector, including education, health care, infrastructure, and other public goods and services. Finally, our unit of analysis is the state and local government sector as a whole, so our results provide an assessment of the sector’s fiscal outlook. However, individual state and local governments likely exhibit significant heterogeneity in their expenditure and revenue patterns and their fiscal outlooks will likely differ from the sector as a whole. Nevertheless, it is informative to assess the overall fiscal outlook because doing so reveals the outlook for state and local governments as a sector. In addition, aggregate data on the sector is available on a more timely basis than data for individual state and local governments, allowing for a better assessment of the sector’s current fiscal outlook. Our results for the sector also provide a baseline from which to view the experiences of individual state and local governments. Finally, assessing the fiscal outlook of the sector as a whole can help mitigate the tendency to extrapolate from the most visible, but potentially not representative, experiences of individual states or localities. In addition to the contact named above, Peter Del Toro, Courtney LaFountain, Melissa Wolf (Assistant Directors), Silvia Symber (Analyst-in- Charge), Shelby Clark, Amalia Konstas, Dylan Stagner, Frank Todisco, Walter Vance, and Alicia White made significant contributions to this report. State and Local Governments’ Fiscal Outlook: December 2018 Update, GAO-19-208SP. Washington, D.C.: Dec. 12, 2018. State and Local Governments’ Fiscal Outlook: December 2016 Update, GAO-17-213SP. Washington, D.C.: Dec. 8, 2016. State and Local Governments’ Fiscal Outlook: December 2015 Update, GAO-16-260SP. Washington, D.C.: Dec. 16, 2015. State and Local Governments’ Fiscal Outlook: December 2014 Update, GAO-15-224SP. Washington, D.C.: Dec. 17, 2014. State and Local Governments’ Fiscal Outlook: April 2013 Update, GAO-13-546SP. Washington, D.C.: Apr. 29, 2013. State and Local Governments’ Fiscal Outlook: April 2012 Update, GAO-12-523SP. Washington, D.C.: Apr. 5, 2012. State and Local Government Pension Plans: Economic Downturn Spurs Efforts to Address Costs and Sustainability, GAO-12-322. Washington, D.C.: Mar. 2, 2012. State and Local Governments’ Fiscal Outlook: April 2011 Update, GAO-11-495SP. Washington, D.C.: Apr. 6, 2011. State and Local Governments: Knowledge of Past Recessions Can Inform Future Federal Fiscal Assistance, GAO-11-401. Washington, D.C.: Mar. 31, 2011. State and Local Governments: Fiscal Pressures Could Have Implications for Future Delivery of Intergovernmental Programs, GAO-10-899. Washington, D.C.: July 30, 2010. State and Local Governments’ Fiscal Outlook: March 2010 Update, GAO-10-358. Washington, D.C.: Mar. 2, 2010. Update of State and Local Government Fiscal Pressures, GAO-09-320R. Washington, D.C.: Jan. 26, 2009. State and Local Fiscal Challenges: Rising Health Care Costs Drive Long- term and Immediate Pressures, GAO-09-210T. Washington, D.C.: Nov. 19, 2008. State and Local Governments: Growing Fiscal Challenges Will Emerge during the Next 10 Years, GAO-08-317. Washington, D.C.: Jan. 22, 2008. Our Nation’s Long-Term Fiscal Challenge: State and Local Governments Will Likely Face Persistent Fiscal Challenges in the Next Decade, GAO-07-1113CG. Washington, D.C.: July 18, 2007. State and Local Governments: Persistent Fiscal Challenges Will Likely Emerge within the Next Decade, GAO-07-1080SP. Washington, D.C.: July 18, 2007.", "summary": "Fiscal sustainability presents a national challenge shared by all levels of government. Since 2007, GAO has published simulations of long-term fiscal trends in the state and local government sector, which have consistently shown that the sector faces long-term fiscal pressures. While a great majority of states have requirements related to balancing their budgets, deficits can arise for reasons including planned annual revenues are not generated at the expected rate, demand for services exceeds planned expenditures, or both, resulting in a near-term operating deficit. This report updates GAO's state and local fiscal model to simulate the fiscal outlook for the state and local government sector. This includes identifying the components of state and local expenditures likely to contribute to the sector's fiscal pressures as well as the effects of revenue changes on the sector's outlook. GAO's model uses the Bureau of Economic Analysis's National Income and Product Accounts as the primary data source and presents the results in the aggregate for the state and local government sector as a whole. The model shows the expected level of receipts and expenditures for the sector until 2068, based on historical spending and revenue patterns. In addition, the model assumes that the current set of policies in place across state and local governments remains constant to show a simulated long-term outlook. Because the model covers the sector in the aggregate, the fiscal outcomes for individual states and localities cannot be identified. GAO's simulations suggest that state and local governments will likely face an increasing difference between expenditures and revenues during the next 50 years as reflected by the operating balance—a measure of the sector's ability to cover its current expenditures out of its current revenues. While both expenditures and revenues are projected to increase as a percentage of United States' gross domestic product (GDP), a difference between the two is projected to persist because expenditures are expected to grow faster than revenues throughout the simulation period. The sector would need to make changes to avoid fiscal imbalance and assure that revenues are at least equal to expenditures. GAO's simulations suggest that growth in the sector's overall expenditures is largely driven by health care, with states' share of Medicaid spending as the primary driver. These expenditures are projected to grow more than GDP each year. Employee compensation, the largest share of operating expenditures, decreases as a share of GDP during the simulation period. Health benefits are the only component of employee compensation that increase as a percentage of GDP. Revenues from federal grants to states and localities are also expected to increase during the simulation period, in part because of Medicaid grants to states. GAO also conducts sensitivity analyses to see how the sector's outlook changes when using alternative assumptions of key model variables – economic growth, health care excess cost growth, and the real rate of return on pension assets. Using these alternative assumptions highlights the operating balance's sensitivity to changes and possible shifts in the future fiscal outcomes for the sector.", "document_type": "gao"}
{"report": "Private student loans are not guaranteed by the federal government. Generally, private lenders underwrite the loans based on the borrower’s credit history and ability to repay, and they often require a cosigner. Private student loans generally carry a market interest rate, which can be a variable rate that is higher than that of federal student loans. As of September 30, 2018, five banks held almost half of all private student loan balances. Other private student loan lenders include credit unions and nonbanks: Credit unions originate private student loans either directly or indirectly through a third party. Nonbanks include both for-profit nonbank lenders and nonbank state lenders. For-profit nonbank lenders can originate, service, refinance, and purchase loans. Nonbank state lenders promote affordable access to education by generally offering low, fixed-rate interest rates and low or no origination fees on student loans. As of September 2018, outstanding private student loan balances made up about 8 percent of the $1.56 trillion in total outstanding student loans (see fig. 1). The volume of new private student loans originated has fluctuated, representing about 25 percent of all student loans originated in academic year 2007–2008, 7 percent in 2010–2011 (after the financial crisis), and 11 percent in 2017–2018. FCRA, the primary federal statute that governs consumer reporting, is designed to promote the accuracy, fairness, and privacy of information in the files of CRAs. FCRA, and its implementing regulation, Regulation V, govern the compilation, maintenance, furnishing, use, and disclosure of consumer report information for credit, insurance, employment, and other eligibility decisions made about consumers. The consumer reporting market includes the following entities: CRAs assemble or evaluate consumer credit information or other consumer information for the purpose of producing consumer reports (commonly known as credit reports). Equifax, Experian, and TransUnion are the three nationwide CRAs. Data furnishers report information about consumers’ financial behavior, such as repayment histories, to CRAs. Data furnishers include credit providers (such as private student loan lenders), utilities, and debt collection agencies. Credit report users include banks, employers, and others that use credit reports to make decisions on an individual’s eligibility for products and services such as credit, employment, housing, and insurance. FCRA imposes duties on data furnishers with respect to the accuracy of the data they furnish. Data furnishers are required to, among other things, refrain from providing CRAs with information they know or have reasonable cause to believe is inaccurate and develop reasonable written policies and procedures regarding the accuracy of the information they furnish. The Act entitles financial institutions that choose to offer a private student loan rehabilitation program that meets the Act’s requirements a safe harbor from potential inaccurate information claims under FCRA related to the removal of the private student loan default from a credit report. To assist data furnishers in complying with their responsibilities under FCRA, the credit reporting industry has adopted a standard electronic data-reporting format called the Metro 2® Format. This format includes standards on how and what information furnishers should report to CRAs on private student loans. The information that private student loan lenders furnish to CRAs on their borrowers includes consumer identification; account number; date of last payment; account status, such as in deferment, current, or delinquent (including how many days past due); and, if appropriate, information indicating defaults. An account becomes delinquent on the day after the due date of a payment when the borrower fails to make a full payment. Private student loan lenders’ policies and terms of loan contracts generally determine when a private student loan is in default. While private student loan lenders may differ in their definitions of what constitutes a default, federal banking regulator policy states that closed- end retail loans (which include private student loans) that become past due 120 cumulative days from the contractual due date should be classified as a loss and “charged off.” Private student loan lenders can indicate that a loan is in default and they do not anticipate being able to recover losses on it by reporting to CRAs one of a number of Metro 2® Format status codes. Participation in a private student loan rehabilitation program entitles borrowers who successfully complete the program to request that the indicator of a student loan default be removed from their credit report, but the delinquencies leading up to the default would remain on the credit report. Figure 2 shows an example of credit reporting for a borrower who defaults on a private student loan and completes a rehabilitation program. A credit score is a measure that credit providers use to predict financial behaviors and is typically computed using information from consumer credit reports. Credit scores can help predict the likelihood that a borrower may default on a loan, file an insurance claim, overdraw a bank account, or not pay a utility bill. FICO and VantageScore are the two firms that develop credit score models with nationwide coverage. FICO develops credit score models for distribution by each of the three nationwide CRAs, whereas VantageScore’s models are developed across the three CRAs resulting in a single consistent algorithm to assess risk. FICO and VantageScore each have their own proprietary statistical credit score models that choose which consumer information to include in calculations and how to weigh that information. The three nationwide CRAs also develop credit score models derived from their own data. There are different types of credit scores, including generic, industry- specific, and custom. Generic scores are based on a representative sample of all individuals in a CRA’s records, and the information used to predict repayment is limited to the information in consumer credit records. Generic scores are designed to predict the likelihood of a borrower not paying as agreed in the future on any type of credit obligation. Both FICO and VantageScore develop generic credit scores. FICO and VantageScore generic scores generally use a range from 300 to 850, with higher numbers representing lower credit risk. For example, VantageScore classifies borrowers in the following categories: subprime (those with a VantageScore of 300–600), near prime (601–660), prime (661–780), and super prime (781–850). A prime borrower is someone who is considered a low-risk borrower and likely to make loan payments on time and repay the loan in full, whereas a subprime borrower has a tarnished or limited credit history. FICO and VantageScore generic scores generally use similar elements in determining a borrower’s credit score, including a borrower’s payment history, the amounts owed on credit accounts, the length of credit history and types of credit, and the number of recently opened credit accounts and credit inquiries. FICO has developed industry-specific scores for the mortgage, automobile finance, and credit card industries. These scores are designed to predict the likelihood of not paying as agreed in the future on these specific types of credit. In addition, credit providers sometimes use custom credit scores instead of, or in addition to, generic credit scores. Credit providers derive custom scores from credit reports and other information, such as account history, from the lender’s own portfolio. The scores can be developed internally by credit providers or with the assistance of external parties such as FICO or the three nationwide CRAs. CFPB has supervisory authority over certain private student loan lenders, including banks and credit unions with over $10 billion in assets and all nonbanks, for compliance with Federal consumer financial laws. CFPB also has supervisory authority over the largest CRAs and many of the entities that furnish information about consumers’ financial behavior to CRAs. To assess compliance with Federal consumer financial laws, CFPB conducts compliance examinations. According to CFPB, because of its mission and statutory requirement regarding nonbank supervision, it prioritizes its examinations by focusing on risks to consumers rather than risks to institutions. Given the large number, size, and complexity of the entities under its authority, CFPB prioritizes its examinations by focusing on individual product lines rather than all of an institution’s products and services. CFPB also has enforcement authority under FCRA regarding certain banks, credit unions, and nonbanks and broad authority to promulgate rules to carry out the purposes of FCRA. The prudential regulators—FDIC, Federal Reserve, NCUA, and OCC— oversee all banks and most credit unions that offer private student loans. Their oversight includes routine safety and soundness examinations for all regulated entities. These examinations may include a review of operations, including policies, procedures, and practices, to ensure that private student loans are not posing a risk to the entities’ safety and soundness. Prudential regulators also have supervisory authority for FCRA compliance for banks and certain credit unions with $10 billion or less in assets. As of January 2019, none of the five banks with the largest private student loan portfolios that we contacted offered rehabilitation programs for defaulted private student loans. In addition, officials from the federal banking regulators told us that as of March 2019, no banks had submitted applications to have rehabilitation programs approved. Representatives from three of the five banks we contacted told us they had decided not to offer a rehabilitation program, and the other two had not yet made a final determination. Representatives from these five banks provided several reasons they were not offering rehabilitation programs for private student loans. Low delinquency and default rates. All five banks’ representatives stated that they had low default rates for private student loans, so the demand for these programs would be low for each bank. Availability of predefault payment programs. Representatives of all five banks said they already offer alternative payment programs, such as forbearance, to help prevent defaults, and two of them explicitly noted this as a reason that a rehabilitation program was unnecessary. Operational uncertainties. Most of the banks’ representatives were not sure how they would operationalize rehabilitation programs. One bank’s representatives said that they sell defaulted loans to debt purchasers and that it would be difficult to offer rehabilitation programs for loans that had been sold. Representatives of two other banks said that the banks’ systems are not able to change the status of a loan once it has defaulted, so they were not certain how their systems would track rehabilitated loans. Another bank’s representatives said that they did not know how rehabilitated loans would be included for accounting purposes in developing their financial statements. Reduced borrower incentives to avoid default. Representatives from two banks said they believed the option to rehabilitate a defaulted loan might reduce borrowers’ incentives to avoid default or to enter a repayment program before default. Risk of compliance violations. One bank representative said a rehabilitation program could put the bank at risk for violations of unfair and deceptive acts and practices if borrowers misunderstood or misinterpreted how much the program would improve their credit scores. Representatives from this bank and another explained that they did not know how much the program would improve credit scores, limiting their ability to describe the program’s benefit to borrowers. Representatives from three of these banks and other organizations, however, noted that there could be advantages for banks to offer private student loan rehabilitation programs. Representatives from the banks said these programs could help banks recover some nonperforming debt, and one of these representatives stated the program could be marketed to borrowers as a benefit offered by the bank. A representative of a consumer advocacy group said a rehabilitation program could improve a bank’s reputation by distinguishing the bank from peer institutions that do not offer rehabilitation for private student loans. Because NCUA is not one of the federal banking regulators by statutory definition, officials said the Act does not require credit unions to seek approval from the agency before offering a rehabilitation program. NCUA officials told us examiners would likely review private student loan rehabilitation programs for the credit unions that choose to offer them as part of normal safety and soundness examinations. The two credit unions we spoke with—which are among the largest credit union providers of private student loans—told us they do not plan to offer rehabilitation programs. One of these credit unions cited reasons similar to those offered by banks, including a low private student loan default rate that suggested there would be a lack of demand for a rehabilitation program. The other credit union explained that it was worried about the effect of removing defaults from credit reports on its ability to make sound lending decisions. NCUA officials also noted that as of January 2019, they had not received any inquiries from credit unions about these programs. OCC, FDIC, and the Federal Reserve have issued information regarding the availability of private student loan rehabilitation programs to their regulated entities, including how they would review applications. In doing so, the agencies informally coordinated to ensure that the statements issued would contain similar information on rehabilitation programs. The three agencies’ statements explained that their regulated entities must receive written approval to begin a program and that the relevant agency would provide feedback or notify them of its decision within 120 days of receiving a written application. The agencies will review the proposed program to ensure that it requires borrowers to make a minimum number of consecutive, on-time, monthly payments that demonstrate renewed ability and willingness to repay the loan. Uncertainty exists regarding two issues with private student loan rehabilitation programs. First, some nonbank private student loan lenders are not certain that they have the authority to implement these programs. Second, the Act does not explain what constitutes a “default” for the purposes of removing information from credit reports. With regard to nonbank state lenders, uncertainty exists about their authority under FCRA to offer private student loan rehabilitation programs that include removing information from credit reports. As discussed previously, for financial institutions such as banks and credit unions, the Act provides an explicit safe harbor to request removal of a private student loan default from a borrower’s credit report and remain in compliance with FCRA. However, the Act does not specify that for-profit nonbank lenders and nonbank state lenders have this same authority. Representatives of the five nonbank state lenders we spoke with had different interpretations of their authority to offer rehabilitation programs. At least two nonbank state lenders currently offer rehabilitation programs, and their representatives told us they believed they have the authority to do so. Another nonbank state lender told us its state has legislation pending to implement such a program. In contrast, representatives of two other nonbank state lenders told us they were interested in offering a rehabilitation program but did not think that they had the authority to do so. In addition, representatives from a trade association that represents nonbank state lenders noted that confusion exists among some of their members and they are seeking a way to obtain explicit authority for nonbank lenders to offer rehabilitation programs for their private student loans. Two trade associations that represent nonbank state lenders also told us that some of their members would be interested in offering these programs if it was made explicit that they were allowed to do so. CFPB officials told us the agency has not made any determination on whether it plans to clarify for nonbanks—including for-profit nonbank lenders and nonbank state lenders—if they have the authority under FCRA to have private student loan defaults removed from credit reports for borrowers who have completed a rehabilitation program. CFPB officials said that the agency does not approve or prevent its regulated entities from offering any type of program or product. Unlike for the federal banking regulators, the Act did not require CFPB to approve rehabilitation programs offered by the entities it regulates. However, CFPB does have general FCRA rulemaking authority. It generally also has FCRA enforcement and supervisory responsibilities over its regulated entities, which includes certain entities that originate private student loans. This authority allows the agency to provide written clarification of provisions or define terms as needed. As a result, CFPB could play a role in clarifying for nonbanks whether they are authorized under FCRA to offer private student loan rehabilitation programs. Federal internal control standards state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Without clarification from CFPB on nonbanks’ authority to offer private student loan rehabilitation programs that allow them to delete information from the borrower’s credit report, there will continue to be a lack of clarity on this issue among these entities. Providing such clarity could—depending on CFPB’s interpretation—result in additional lenders offering rehabilitation programs that would allow more borrowers the opportunity to participate, or it could help ensure that only those entities CFPB has interpreted as being eligible to offer programs are doing so. Statutory changes made to FCRA by the Act do not explain what information on a consumer’s credit report constitutes a private student loan “default” that may be removed when a borrower successfully completes a rehabilitation program. According to the three nationwide CRAs and a credit reporting trade association, the term “default” is not used in credit reporting for private student loans. As discussed previously, private student loan lenders use one of a number of Metro 2® Format status codes to indicate that a loan is in default (i.e., they do not anticipate being able to recover losses on the loan). Representatives of the CRAs and a credit reporting trade association said that private student loan lenders will need to make their own interpretation of what information constitutes a default for the purposes of removing information from a credit report following successful completion of a private student loan rehabilitation program. The statements issued by FDIC, the Federal Reserve, and OCC on rehabilitation programs do not explain what information constitutes a private student loan “default” that may be removed from borrowers’ credit reports upon successful completion of a rehabilitation program. Officials from FDIC, the Federal Reserve, and OCC explained that they do not have the authority to interpret what constitutes a private student loan default on credit reports because the responsibilities for interpreting FCRA fall under CFPB. CFPB officials told us they are monitoring the issue but have not yet determined if there is a need to address it. Given CFPB’s rulemaking authority for FCRA, it could clarify the term “default” for private student loan lenders. In doing so, CFPB could obtain insight from the prudential regulators and relevant industry groups on how private student loan lenders currently report private student loan defaults on credit reports and on how to develop a consistent standard for what information may be removed. According to federal internal control standards, management should externally communicate the necessary quality information to achieve objectives. This can include obtaining quality information from external parties, such as other regulators and relevant industry groups. Without clarification from CFPB, there may be differences among private student loan lenders in what information they determine constitutes a “default” and may be removed from a credit report. Variations in lenders’ interpretations could have different effects on borrowers’ credit scores and credit records, resulting in different treatment of borrowers by credit providers. This could affect borrowers’ access to credit or the terms of credit offered, such as interest rates or the size of down payments required on a variety of consumer loans. In addition, as mentioned previously, the credit reporting industry follows a standard reporting format to help ensure the most accurate credit reporting information possible. Without clarification on what information may be removed from credit reports following successful completion of rehabilitation programs, differences in lenders’ interpretation could introduce inconsistencies in credit reporting data that may affect their accuracy. Rehabilitation programs for private student loans are expected to pose minimal additional risk to banks’ and credit unions’ safety and soundness. Prudential regulators require that banks and credit unions underwrite student loans to mitigate risks and ensure sound lending practices, and OCC guidance specifies that underwriting practices should minimize the occurrence of defaults and the need for repayment assistance. Lenders generally use underwriting criteria based on borrowers’ credit information to recognize and account for risks associated with private student loans. According to officials from OCC, FDIC, and the Federal Reserve and representatives from the major bank and credit union private student loan lenders we spoke with, lenders participating in private student loan rehabilitation programs would face minimal additional risks for several reasons: Loans are already classified as a loss. Loans entering a rehabilitation program are likely to be 120 days past due and to have been charged off, and thus they would have already been classified as a loss by banks and credit unions. OCC officials told us a program to rehabilitate these loans would, therefore, pose no additional risks to the safety and soundness of institutions that offer them. Default rates are low, and loans typically use cosigners. Representatives from the five major banks and two credit unions told us that private student loans generally perform well and have low rates of delinquencies and defaults. Aggregate data on the majority of outstanding loan balances show that the default rate for private student loans was below 3 percent from the second quarter of 2014 through the third quarter of 2018. Lenders also generally require borrowers of private student loans to have cosigners—someone who is liable to make payments on the loan should the student borrower default—which helps reduce the risk of the loan not being repaid. Since the academic year 2010–2011, the rate of undergraduate private student loan borrowers with cosigners has exceeded 90 percent. Private student loan portfolios are generally small. Private student loans make up a small portion of the overall loan portfolios for most of the banks and credit unions we spoke with. For four of the five major banks with the largest portfolios of private student loans, these constituted between about 2 percent to 11 percent of their total loan portfolio in 2017. The fifth bank’s entire portfolio was education financing, with private student loans accounting for about 93 percent of its 2017 portfolio. For the two credit unions we contacted, private student loans constituted about 2 percent and 6 percent of their total assets in 2018. Private student loan rehabilitation programs may create certain operational costs for banks or credit unions that offer them. However, no representatives of the five banks and two credit unions with whom we spoke were able to provide a cost estimate since none had yet designed or implemented such a program. Representatives from four banks and one credit union we spoke with said that potential costs to implement a rehabilitation program would be associated with information technology systems, designing and developing new systems to manage the program, increased human resource needs, additional communications with borrowers, credit reporting, compliance, monitoring, risk management, and any related legal fees. In addition, like any other type of consumer loan, banks and credit unions could face potential risks with private student loan rehabilitation programs, including operational, compliance, or reputational risks. For example, a representative of one bank cited operational risks such as those that could stem from errors in credit reporting or inadequate collection practices for rehabilitated private student loans. One concern about removing information from credit reports—as authorized in connection with the Act’s loan rehabilitation programs—is that it could degrade the quality of the credit information that credit providers use to assess the creditworthiness of potential borrowers. However, the removal of defaults from credit reports resulting from loan rehabilitation programs is unlikely to affect financial institutions’ ability to make sound lending decisions, according to prudential regulator officials and representatives from three private student lenders and three other credit providers with whom we spoke. OCC and FDIC officials and representatives from two of these private student lenders noted that because rehabilitation programs leave the delinquencies leading up to the default on borrowers’ credit reports, lenders would still be able to adequately assess borrower risk. In addition, representatives from one automobile lender and one mortgage lender said that over time, the methods they use to assess creditworthiness would be able to detect whether rehabilitated private student loans were affecting their ability to identify risk patterns in credit information and they could adjust the methods accordingly. Representatives from the Federal Reserve provided three additional reasons why they expected that rehabilitation programs would have little effect on banks’ and credit unions’ lending decisions. First, under the statutory requirement for private student loan rehabilitation, removal of a default from a borrower’s credit report can only occur once per loan. A single default removal would be unlikely to distort the accuracy of credit reporting in general. Second, they said that borrowers who have successfully completed a rehabilitation program by making consecutive on-time payments have demonstrated a proven repayment record, and therefore they likely represent a better credit risk. Finally, because participation in the private student loan rehabilitation program is expected to be low, its effect on the soundness of financial institutions’ lending decisions is expected to be minimal. The effects of private student loan rehabilitation programs on most borrowers’ access to credit would likely be minimal. A simulation conducted by VantageScore found that removing a student loan default increased a borrower’s credit score by 8 points, on average. An 8 point rise in a borrower’s credit score within VantageScore’s range of 300 to 850 represents only a very small improvement to that borrower’s creditworthiness. Therefore, most borrowers who successfully completed a private student loan rehabilitation program would likely see minimal improvement in their access to credit, particularly for credit where the decision-making is based solely on generic credit scores. Factors Credit Providers Consider Prior to Lending Credit providers assess a borrower’s creditworthiness based on several factors, including the following: Generic credit scores: Credit providers can rely solely on generic credit scores, such as those developed by Fair Isaac Corporation and VantageScore Solutions, LLC, to make lending decisions. Credit providers generally do not provide credit to borrowers whose scores do not meet a minimum threshold. Industry-specific credit scores: Certain types of credit providers, such as mortgage lenders, automobile loan lenders, and credit card issuers, may use industry-specific credit scores rather than generic credit scores to make lending decisions. This is because these scores may help them better predict lending risks specific to their industry. Internal credit reviews: Credit providers can customize methods unique to their institution that review different aspects of borrowers’ credit information, such as debt-to-income ratios, employment history, and borrowers’ existing relationships with the institution. Credit providers may also develop custom credit scores that are tailored to their specific needs and include factors they have deemed important in predicting risks of nonpayment. Credit providers incorporate their own internal data in these scores as well as information contained in borrowers’ credit reports. The effect of a rehabilitation program on credit scores will likely be somewhat greater for borrowers with lower credit scores, and smaller for borrowers with higher credit scores. For example, the VantageScore simulation suggests that borrowers in the subprime range (with scores of 300–600) could see score increases of 11 points, on average, while borrowers in the prime (661–780) and super prime (781–850) ranges could see increases of less than 1 point, on average (see fig. 3). The effect of removing a default from a credit report varies among borrowers because a credit score is influenced by other information in a borrower’s credit report, such as other outstanding derogatory credit markers, the length of time since the default, and other types of outstanding loans. Reasons that removing a student loan default may improve a borrower’s credit score and access to credit only minimally include the following: Delinquencies remain in the credit report. A key reason that removing a student loan default has a small effect on a credit score, according to VantageScore officials, is that the delinquencies leading to that default remain in the credit report for borrowers who successfully complete rehabilitation programs. Adding a delinquency in the simulation decreased a credit score by 61 points, on average. Thus, the simulation suggests that the increase in a credit score from removing a student loan default is not as substantial as the decrease from adding the initial delinquency. Credit scoring treats student loans differently. Some credit score models place less emphasis on student loans than on other types of consumer loans in predicting the risk of nonpayment. One credit scoring firm and two CRAs we spoke with said that student loans have a lower weight than other types of consumer loans in their generic credit scoring algorithms. They explained that there are fewer student loans than other types of consumer loans in the sample they use to develop the score, and student debt has proved to be less important statistically at predicting credit risk in their models. Student loans also may have less weight in predicting defaults in industry- specific or custom models of scores. A representative of one credit scoring firm said the algorithm for an industry-specific credit score that predicts the risk of nonpayment on a credit card may place less emphasis on a student loan than the algorithm for a generic credit score that is meant to predict risk more broadly. Further, CRA officials we spoke with said that because their custom credit scoring models are specific to clients’ needs, the models may not include student loans as a predictor of default at all, or they may place greater emphasis on student loans, depending on the clients’ needs. Borrowers in default typically already have poor credit. Borrowers who complete a rehabilitation program have a high likelihood of having other derogatory credit items in their credit report, in addition to the student loan delinquencies that led to the default, according to a study conducted by a research organization, several CRAs, and one credit provider with whom we spoke. The VantageScore simulation also showed that borrowers who had at least one student loan delinquency or default in their credit profile had an average of five derogatory credit items in their profile. Because student loan defaults and student loan delinquencies are both negative credit events that affect credit providers’ credit assessment methods, the removal of one student loan default from a borrower’s credit report likely will not make a large difference in how credit providers evaluate the borrower. Consumer advocates and academic studies cited potential benefits of rehabilitation programs apart from their effect on credit scores and access to credit: Borrowers defaulting on private student loans issued by nonbank state lenders could have wage garnishments stopped after successfully completing a rehabilitation program. Rehabilitation would stop debt collection efforts against a private student loan borrower. Participating in a loan modification program for one loan may help borrowers better meet their other loan obligations, according to studies we reviewed. For example, one study found that participation in mortgage modification programs was associated with lower delinquency rates on nonmortgage loans. However, programs may also have some disadvantages or pose challenges to borrowers, according to representatives from consumer advocacy groups and academic sources: A rehabilitation program may restart the statute of limitations on loan collections, according to representatives of consumer advocacy groups. Borrowers who redefault following entry into a rehabilitation program near the end of the statute of limitations on their debt could have collection efforts extended on these loans. Programs may extend adverse credit reporting. Generally, negative credit information stays on consumer reports for 7 or 10 years; therefore, depending on when a borrower enters into a rehabilitation program, a payment on the loan might prolong the adverse credit reporting for that account. The lack of income-driven repayment programs offered to borrowers in the private student loan market means that borrowers who complete rehabilitation programs may have a high likelihood of redefaulting on their loans. Because removing adverse information from credit reports does not change a borrower’s underlying creditworthiness, improved credit scores and access to credit may cause borrowers to borrow too much relative to their ability and willingness to pay. For example, one study found that for consumers who had filed for bankruptcy, their FICO scores and credit lines increased within the first year after the bankruptcy was removed from their credit report. However, the study found the initial credit score increase had disappeared by about 18 months after the bankruptcy was removed and that debt and delinquency were higher than expected, increasing the probability of a future default. Private student loan rehabilitation programs can provide an opportunity for private student loan borrowers to help repair their credit reports. However, some nonbank state lenders have different interpretations of whether FCRA authorizes them to offer such programs. During our review, CFPB had not determined if it would clarify these uncertainties for nonbank state lenders and other nonbank private student loan lenders. Providing such clarity could—depending on CFPB’s interpretation—result in additional lenders offering rehabilitation (allowing more borrowers the opportunity to participate), or help to ensure that only entities deemed eligible by CFPB to offer programs are doing so. In addition, the Act does not explain what information on a consumer’s credit report constitutes a private student loan “default” that may be removed following the successful completion of a private student loan rehabilitation program. Without clarification from CFPB—after consulting with the prudential regulators and relevant industry groups—on what information in a credit report constitutes a private student loan default that may be removed, lenders may be inconsistent in the credit report information they remove. As a result, variations in lenders’ interpretations could have different effects on borrowers’ credit scores and credit records, which could affect how they are treated by credit providers and could also result in inconsistencies that affect the accuracy of credit reporting data. We are making the following two recommendations to CFPB: The Director of CFPB should provide written clarification to nonbank private student loan lenders on their authorities under FCRA to offer private student loan rehabilitation programs that include removing information from credit reports. (Recommendation 1) The Director of CFPB, after consulting with the prudential regulators and relevant industry groups, should provide written clarification on what information in a consumer’s credit report constitutes a private student loan reported “default” that may be removed after successful completion of a private student loan rehabilitation program. (Recommendation 2) We provided a draft copy of this report to CFPB, the Department of Education, FDIC, the Federal Reserve, the Federal Trade Commission, NCUA, OCC, and the Department of the Treasury for review and comment. We also provided FICO and VantageScore excerpts of the draft report for review and comment. CFPB and NCUA provided written comments, which have been reproduced in appendixes II and III, respectively. FDIC, the Federal Trade Commission, OCC, and the Department of the Treasury provided technical comments on the draft report, which we have incorporated, as appropriate. The Department of Education and the Federal Reserve did not provide any comments on the draft of this report. FICO and VantageScore provided technical comments, which we have incorporated, as appropriate. In its written response, CFPB stated that it does not plan to act on our first recommendation to provide written clarification to nonbank private student loan lenders on their authorities under FCRA to offer private student loan rehabilitation programs. CFPB stated—and we agree—that the Act does not regulate the authority of private student loan lenders that are not included in FCRA’s definition of a “financial institution,” nor direct financial institutions that are not supervised by a federal banking agency to seek CFPB’s approval concerning the terms and conditions of rehabilitation programs. However, CFPB’s written response does not discuss the authority of private student loan lenders that potentially fall outside FCRA’s definition of a financial institution to offer rehabilitation programs that include removing information from credit reports. As we discuss in the report, uncertainty exists among nonbank private student loan lenders regarding their authority to implement such programs. We maintain that although the Act does not require CFPB to act on this issue, CFPB could play a role in clarifying whether FCRA authorizes nonbanks to offer rehabilitation programs that enable the lender to obtain legal protection for removal of default information from a credit report. CFPB intervention is warranted given the lack of clarity in the private student lending industry and is consistent with CFPB’s supervisory authority over nonbank financial institutions and its FCRA enforcement and rulemaking authorities. We do not suggest that CFPB play a role in approving rehabilitation programs. As we note in the report, clarification of nonbanks’ authorities could result in additional lenders offering rehabilitation programs and providing more consistent opportunities for private student loan borrowers, or it could help ensure that only those entities authorized to offer programs are doing so. With respect to our second recommendation on providing written clarification on what information in a consumer’s credit report constitutes a private student loan reported default that may be removed after successful completion of a private student loan rehabilitation program, CFPB’s letter states that such clarification is premature because of ongoing work by the Consumer Data Industry Association. The letter states that after that work is completed, CFPB will consult with the relevant regulators and other interested parties to determine if additional guidance or clarification is needed. As we stated in the report, we are aware of the work of the Consumer Data Industry Association to update the credit reporting guidelines for private student loans. We maintain that this work presents a good opportunity for CFPB to participate in these discussions and to work in conjunction with the industry and other relevant regulators to help alleviate any contradiction between what CFPB would determine in isolation from any determination made by industry. Further, such participation would allow CFPB to weigh in on legal and policy issues from the start, potentially avoiding any need for future rulemaking. In addition, CFPB’s involvement in this determination and issuance of clarification would help ensure more consistent treatment among borrowers participating in private student loan rehabilitation programs, as well as consistency in credit reporting information. NCUA’s written response stated that federal credit unions were authorized to offer rehabilitation programs for private student loan borrowers prior to the Act and that federal credit unions are not required to obtain review and approval from NCUA to offer such programs. The letter notes, however, that the Act requires federal credit unions that offer such programs to remove private student loan defaults from consumer credit reports if borrowers successfully complete a rehabilitation program. NCUA noted that even though removal of the default may result in a relatively small credit score increase, this can benefit credit union members. NCUA stated that it stands ready to assist CFPB in implementing the report’s two recommendations. We are sending copies of this report to CFPB, the Department of Education, FDIC, the Federal Reserve, the Federal Trade Commission, NCUA, OCC, the Department of the Treasury, the appropriate congressional committees and members, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or cackleya@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Our objectives were to examine (1) the factors affecting financial institutions’ participation in private student loan rehabilitation programs, (2) the risks that these programs may pose to financial institutions, and (3) the effects that these programs may have on student loan borrowers’ access to future credit. To examine the factors that affect financial institutions’ participation in private student loan rehabilitation programs and how the federal banking regulators are implementing the Economic Growth, Regulatory Relief, and Consumer Protection Act’s (the Act) provisions on private student loan rehabilitation programs, we reviewed the statements issued by the three regulators tasked with approving the loan rehabilitation programs of their regulated entities—the Board of Governors of the Federal Reserve System (Federal Reserve), Federal Deposit Insurance Corporation (FDIC), and Office of the Comptroller of the Currency (OCC)—as well as OCC’s examiner guidance. We also interviewed officials from these regulators about their time frames for issuing statements, what topics the statements cover, and how they coordinated in issuing the statements. We reviewed the legal authorities of the Consumer Financial Protection Bureau (CFPB) and National Credit Union Administration (NCUA)—which oversee nonbank private student loan lenders and most credit unions that issue private student loans, respectively—concerning private student loan rehabilitation programs and the legislative history of the Act’s provisions on the programs. Finally, we interviewed officials from NCUA and CFPB about their authorities related to implementing the Act’s provisions on private student loan rehabilitation programs and whether they planned to take any actions related to the provisions. In addition, we interviewed representatives from a nongeneralizable sample of 15 private student loan lenders: the five largest bank lenders, two of the largest credit union lenders, and eight nonbank financial institutions (nonbank). The eight nonbank lenders included three for-profit nonbank lenders and five nonprofit state-affiliated lenders (nonbank state lenders). We asked these lenders about their decisions to offer private student loan rehabilitation programs, risks and costs associated with the programs, and the effects that such programs could have on their lending decisions. We identified the five largest bank lenders by reviewing data from MeasureOne—a private data analytics company that studies the private student loan market—and discussions with officials from the Federal Reserve, FDIC, OCC, and CFPB. We assessed the reliability of data from MeasureOne through discussions with representatives from the company on the methodology used to develop its estimates and its internal controls. We determined that this data source was sufficiently reliable for selecting a sample of private student lenders to interview about participation in rehabilitation programs. We reviewed these five banks’ 2017 10-K reports (annual financial filings with the Securities and Exchange Commission) to verify the size of their student loan portfolios. We selected the two credit unions to interview by reviewing 2018 NCUA data on credit unions’ portfolios to identify two credit unions that were among the largest credit union private student loan lenders. To select the for-profit nonbank lenders, we used suggestions from officials at CFPB, OCC, and the Department of Education, as well as reports from private sources that contained information on nonbank private student loan lenders. We selected nonbank state lenders based on information that indicated they were operating or interested in offering rehabilitation programs. Sources of this information included the Education Finance Council’s 2018–2019 NonProfit & State-Based Education Loan Handbook, an interview with the Education Finance Council, and information received from a 2013 CFPB Request for Information Regarding an Initiative to Promote Student Loan Affordability. Because this sample is nongeneralizable, our results cannot be generalized to all private student loan lenders. To examine the risks, if any, that private student loan rehabilitation programs pose to financial institutions, we reviewed bank and credit union regulator policies and guidance on private student lending. We also analyzed data on delinquency and default rates of private student loans. To do this, we reviewed industry data from MeasureOne and the 2017 10- K filings for the five banks whose representatives we interviewed. We assessed the reliability of MeasureOne’s performance data through discussions with representatives from the company on the methodology it uses to develop these metrics and its internal controls. We determined that this data source was sufficiently reliable for assessing the performance of banks’ portfolios of private student loans. For these five banks, we also used the 10-K filings to estimate the volume of the portion of their portfolios that was composed of private student loans. We also compared private student loan default rates to default rates of other types of consumer loans, including mortgages, credit cards, and automobile loans. To do this, we used data from FDIC’s Statistics on Depository Institutions database to analyze indicators of asset quality for mortgages, credit cards, and automobile loans from 2013 through 2017. We assessed the reliability of FDIC’s Statistics on Depository Institutions database by reviewing related documentation and conducting testing for missing data, outliers, or any obvious errors. We determined that this data source was sufficiently reliable for assessing the performance and risk of banks’ portfolios of private student loans and other types of consumer loans. We also interviewed officials from the Federal Reserve, FDIC, NCUA, and OCC about the types of costs and risks that could be associated with private student loan rehabilitation programs. In addition, we interviewed representatives of our nongeneralizable sample of 15 private student loan lenders about the potential risks and costs of offering rehabilitation programs. To assess potential risks of private student loan rehabilitation programs for other types of financial institutions, we interviewed a nongeneralizable sample of seven credit providers about how these programs could affect their ability to make sound lending decisions. We focused on financial institutions that offer mortgage loans, automobile loans, and credit cards. According to data from the 2016 Survey of Consumer Finances, these are the most common types of debt consumers hold. We selected a nongeneralizable sample of banks and nonbank financial institutions that provide these types of credit. We selected the bank credit providers using data from FDIC’s Statistics on Depository Institutions by identifying the mortgage and automobile loan lenders and credit card issuers that were among the largest holders of assets in these lending categories as of the fourth quarter 2017. To identify nonbank financial institution lenders, we reviewed an industry report to identify some of the larger nonbank mortgage lenders, and we reviewed a list prepared by CFPB of larger industry participants in the automobile finance market industry. We judgmentally selected the final sample of these credit providers based on their size and, to the extent applicable, their federal regulator to obtain a diversity of opinions. We determined that industry reports, CFPB’s list of larger industry participants, and 10-K filings were sufficiently reliable for selecting a sample of nonbank financial institutions to interview about risks posed by rehabilitation programs. Because this sample is nongeneralizable, our results cannot be generalized to all credit providers. We also interviewed representatives of four industry groups and two trade associations that work with these credit providers and student loan borrowers on the types of risks and costs that rehabilitation programs could create for lenders. To examine the effects that private student loan rehabilitation programs may have on student loan borrowers’ access to future credit, we conducted a literature search for studies that empirically analyzed the effects on credit scores and access to credit of adverse credit events, such as foreclosures or bankruptcies; loan modifications, broadly defined; and removal of accurate but adverse information from credit reports, such as a bankruptcy. We identified these studies through our initial background search, targeted searches of the EconLit database, and a search of the Federal Reserve Bank of New York Center for Microeconomic Data publications, and through bibliographies of studies we reviewed. We also asked VantageScore Solutions, LLC (VantageScore)—a credit scoring firm—to conduct a quantitative analysis simulating the effect of adding a student loan delinquency to and removing a student loan default from a borrower’s credit profile on its VantageScore 3.0 credit score. The analysis was conducted using a sample of VantageScore’s data that it obtained from the three nationwide CRAs and that represents actual credit profiles of borrowers. VantageScore analyzed data for borrowers with at least one outstanding student loan with a balance greater than $0. Table 1 contains the results of the simulation and information on the number and characteristics of borrowers whose credit profiles were analyzed. The results of the simulation are specific to changes in the VantageScore 3.0 credit score. The simulated results represent averages for borrowers whose credit profiles were analyzed and are meant to be illustrative. Additionally, because this was a simulation, it is unlikely that any one borrower’s credit profile exactly matches the average profiles used in the simulations. The results of the VantageScore analysis only apply to VantageScore 3.0 credit scores in the 2014–2016, 2015–2017, and 2016–2018 cohorts of borrowers and may not be generalized to other VantageScore credit scores, to Fair Isaac Corporation (FICO) credit scores, or for different cohorts in different years. While we present only the results of the most recent cohort (2016–2018) in our report, VantageScore simulated the analysis across three cohorts to determine whether the results varied substantially over time. The results for all three cohorts were similar. Through reviewing documentation and conducting interviews, we determined that the data used by VantageScore to conduct this analysis were sufficiently reliable for simulating the effects of derogatory credit marks on borrowers’ credit scores. FICO declined our request to develop a similar analysis. To examine how a rehabilitation program may affect borrowers’ future access to credit, we interviewed officials from CFPB, the Department of Education, FDIC, the Federal Reserve, Federal Trade Commission, NCUA, OCC, and the Department of the Treasury. We also interviewed representatives of the four consumer reporting agencies that collect and report information on student loans (Equifax, Experian, Innovis, and TransUnion) and the two credit scoring firms that develop credit score models with nationwide coverage (FICO and VantageScore). We also interviewed representatives from the 15 private student loan lenders and seven credit providers described above, as well as banking, credit reporting, and student loan lending and servicing industry groups and consumer advocacy organizations. We conducted this performance audit from July 2018 to May 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jill Naamane (Assistant Director), Christine McGinty (Analyst-in-Charge), Jill Lacey, Courtney LaFountain, Jon D. Menaster, Tovah Rom, Jessica Sandler, Eric Schwab, and Aisha Shafi made key contributions to this report. Also contributing to this report were Melissa Emrey-Arras, Debra Prescott, and Jena Sinkfield.", "summary": "The Economic Growth, Regulatory Relief, and Consumer Protection Act enabled lenders to offer a rehabilitation program to private student loan borrowers who have a reported default on their credit report. The lender may remove the reported default from credit reports if the borrower meets certain conditions. Congress included a provision in statute for GAO to review the implementation and effects of these programs. This report examines (1) the factors affecting financial institutions' participation in private student loan rehabilitation programs, (2) the risks the programs may pose to financial institutions, and (3) the effects the programs may have on student loan borrowers' access to credit. GAO reviewed applicable statutes and agency guidance. GAO also asked a credit scoring firm to simulate the effect on borrowers' credit scores of removing student loan defaults. GAO also interviewed representatives of regulators, some of the largest private student loan lenders, other credit providers, credit bureaus, credit scoring firms, and industry and consumer advocacy organizations. The five largest banks that provide private student loans—student loans that are not guaranteed by the federal government—told GAO that they do not offer private student loan rehabilitation programs because few private student loan borrowers are in default, and because they already offer existing repayment programs to assist distressed borrowers. (Loan rehabilitation programs described in the Economic Growth, Regulatory Relief, and Consumer Protection Act (the Act) enable financial institutions to remove reported defaults from credit reports after borrowers make a number of consecutive, on-time payments.) Some nonbank private student loan lenders offer rehabilitation programs, but others do not, because they believe the Act does not authorize them to do so. Clarification of this matter by the Consumer Financial Protection Bureau (CFPB)—which oversees credit reporting and nonbank lenders—could enable more borrowers to participate in these programs or ensure that only eligible entities offer them. Private student loan rehabilitation programs are expected to pose minimal additional risks to financial institutions. Private student loans compose a small portion of most banks' portfolios and have consistently low default rates. Banks mitigate credit risks by requiring cosigners for almost all private student loans. Rehabilitation programs are also unlikely to affect financial institutions' ability to make sound lending decisions, in part because the programs leave some derogatory credit information—such as delinquencies leading to the default—in the credit reports. Borrowers completing private student loan rehabilitation programs would likely experience minimal improvement in their access to credit. Removing a student loan default from a credit profile would increase the borrower's credit score by only about 8 points, on average, according to a simulation that a credit scoring firm conducted for GAO. The effect of removing the default was greater for borrowers with lower credit scores and smaller for borrowers with higher credit scores (see figure). Reasons that removing a student loan default could have little effect on a credit score include that the delinquencies leading to that default—which also negatively affect credit scores—remain in the credit report and borrowers in default may already have poor credit. GAO is making two recommendations, including that CFPB provide written clarification to nonbank private student loan lenders on their authority to offer private student loan rehabilitation programs. CFPB does not plan to take action on this recommendation and stated that it was premature to take action on the second recommendation. GAO maintains that both recommendations are valid, as discussed in this report.", "document_type": "gao"}
{"report": "Federal agencies are dependent on information systems and electronic data to process, maintain, and report essential information. Virtually all federal operations are supported by computer systems and electronic data, and agencies would find it difficult, if not impossible, to carry out their missions and account for their resources without these information assets. Federal agencies exchange personally identifiable and other sensitive information with state agencies in the implementation of key federal and state programs. The security of systems and data involved in this exchange of information is vital to public confidence and the nation’s safety, prosperity, and well-being. Since federal agencies face computerized (cyber) threats that continue to grow in number and sophistication, it is imperative that such information is protected. In recognition of this growing threat, we designated information security as a government-wide high-risk area in 1997. We further expanded this area in 2015 to include protecting the privacy of personally identifiable information. Several federal laws and policies establish requirements for protecting federal systems and managing cybersecurity risks. Specifically, FISMA is intended to provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets, as well as the effective oversight of information security risks. The act requires each agency to develop, document, and implement an agency-wide information security program to provide risk-based protections for the information and information systems that support the operations and assets of the agency, including those provided or managed by another entity. FISMA also assigns government-wide responsibilities to key agencies. For example, OMB is responsible for developing and overseeing implementation of policies, principles, standards, and guidelines on information security in federal agencies, except with regard to national security systems. NIST is also responsible for developing standards for categorizing information and information systems, security requirements for information and systems, and guidelines for detection and handling of security incidents. For example, NIST Special Publication 800-53 provides guidance to agencies on the selection and implementation of information security and privacy controls for systems. Further, OMB Circular A-130, Managing Information as a Strategic Resource, establishes minimum requirements for federal information security programs and assigns federal agency responsibilities for the security of information and information systems. It requires agencies to implement a risk management framework to guide and inform the categorization of federal information and information systems; the selection, implementation, and assessment of security and privacy controls; the authorization of information systems and common controls; and the continuous monitoring of information systems. Circular A-130 also requires federal agencies to provide oversight of nonfederal entities—such as state agencies—that use or operate federal information systems, as well as nonfederal entities’ information systems that collect or maintain federal information. In doing so, federal agencies are to ensure that security and privacy controls for such information systems are effectively implemented and comply with NIST standards and guidelines and agency requirements. Federal agencies may share data with one or more individual component agencies within a state, such as agencies that execute a state’s tax administration, law enforcement, or human services functions. The state’s responsibility for protecting data shared by federal agencies may reside within an individual state agency or it may be a shared responsibility with the state’s chief information officer and CISO. For example, a state CISO may help to manage the protections over centralized information technology (IT) resources that store, process, and transmit federal data for multiple component agencies within the state. To protect federal data that are shared with state agencies in the implementation of key federal and state programs, federal agencies have developed cybersecurity requirements for state agencies to follow when accessing, storing, and transmitting federal data. Federal agencies are to obtain assurance that state agencies’ security and privacy controls are effectively implemented through independent evaluations. These evaluations include tests and assessments of the effectiveness of state agencies’ information security policies, procedures, and practices. Such assessments are important inputs to decisions by federal officials to authorize or reauthorize a state agency’s use of information systems that create, collect, use, process, store, maintain, disseminate, disclose, and dispose of federal information. To protect federal data that are shared with state agencies, each of the federal agencies in our review have established their own policies that articulate cybersecurity requirements, as well as related compliance assessment programs, based in part on guidance from NIST. Table 1 identifies the types of data that the four selected federal agencies share with state agencies and the cybersecurity policies that they have established to protect that data. The selected federal agencies’ had a significant number of variances in the cybersecurity requirements that they had established for protecting data exchanged with state agencies. Specifically, our review identified hundreds of instances in which the four agencies either had (1) included a requirement in its cybersecurity policy that was not a requirement of the other three agencies (unique requirement); (2) established a requirement with specific, organization-defined technical thresholds that differed from at least one of the other three agencies for a related control (conflicting parameters); or (3) did not fully address in its requirements the guidelines from NIST for associated controls and control enhancements (did not fully address NIST guidelines). Table 2 summarizes the total number of requirements that each agency had included in its security policy and the extent to which the four agencies’ requirements varied from each other and from the NIST guidance. Collectively, the four selected federal agencies’ policies included 86 unique cybersecurity requirements for state agencies with which they exchange data. Specifically, CMS’s policy included 54 requirements that the other three agencies did not include. FBI’s CJIS’s policy included 24 unique requirements, IRS’s policy included five unique requirements, and SSA’s policy included three unique requirements. For example, CMS’s security policy included a requirement that state agencies review their organization-wide information security program plan annually; however, the other three agencies did not have such a requirement in their security policies. As another example, IRS had a requirement for state agencies to employ automated mechanisms to alert security personnel of inappropriate activities, while the other agencies did not have this requirement. Because each agency is addressing different legal requirements and risk management approaches for protecting information shared with states, certain requirements that are unique to an agency may be necessary. Nevertheless, agencies need to ensure that such requirements are necessary by documenting their decisions during the control selection process. Table 3 provides examples of the unique requirements that each agency included in its cybersecurity policies. In total, the four federal agencies had identified 390 requirements for state agencies in their policies, where the parameters conflicted with at least one of the other federal agencies. Across the four agencies, CMS had the largest number of requirements that had conflicting parameters, with 139 such requirements. This was followed by IRS with 131, FBI’s CJIS with 72 requirements, and SSA with 48 requirements with conflicting parameters. For example, each of the selected agencies identified a different time frame for the retention of audit logs related to audited events. As another example, CMS required state agencies to annually review and update their access control policies, whereas IRS required this review every 3 years. FBI’s CJIS and SSA did not have this requirement in their policies. Table 4 provides additional examples of cybersecurity requirements for state agencies that the four federal agencies identified in their policies, where the parameters conflicted with those of at least one other of the federal agencies. The four selected federal agencies did not always fully address guidelines in NIST Special Publication 800-53 (Revision 4) when establishing cybersecurity requirements for related controls, leading to additional differences among the four agencies’ cybersecurity policies. In total, the four agencies did not fully address guidelines from NIST in 141 instances. FBI’s CJIS had the most variances, with 63 requirements that did not fully address NIST guidelines, followed by SSA with 30 variances, CMS with 26 variances, and IRS with 22 variances. For example, FBI’s CJIS’s requirement did not identify the time period to retain individual training records, as called for by NIST guidance. In addition, SSA did not define the frequency of how often agencies should assess the security controls in the information system and its environment of operation. Table 5 provides examples of the cybersecurity requirements for state agencies in which selected federal agencies did not fully address NIST guidelines. The perspectives of state CISOs who responded to our survey reflected the variation we found among the selected federal agencies’ cybersecurity requirements. The majority (at least 29 out of 50) of the state CISOs that responded to our survey question regarding the ways in which federal cybersecurity requirements vary and the extent of the variation reported moderate to very great variation in the selected federal agencies’ cybersecurity requirements. Specifically, of the 50 state CISOs that responded to this question, 34 reported that the federal agencies had moderate to very great variation with respect to unique requirements, 38 reported that the federal agencies had moderate to very great variation due to conflicting parameters that were established, and 29 reported that the federal agencies had moderate to very great variation with respect to addressing NIST guidelines for security controls and control enhancements. Figure 1 represents state CISOs’ perspectives on the extent of variation among selected federal cybersecurity requirements. State agency officials that must comply with multiple federal agencies’ cybersecurity requirements (and related compliance assessments) viewed variances as problematic and burdensome. For example, in responding to a survey question about challenges or impacts that state officials experienced regarding federal requirements and assessment processes, an official from one state agency explained that addressing variances in cybersecurity requirements reduced the ability of state officials to focus on their primary mission of securing data across their state enterprise. In response to the same survey question, another state official said that addressing the variances in federal agencies’ cybersecurity requirements increased the complexity of automating the state’s monitoring and reporting processes. In addition, the same state official commented that staff were burdened by reports and reviews to ensure that the full range of federal agencies’ requirements were met. In responding to our survey, 46 state CISOs reported the extent to which they had experienced a very great, great, moderate, slight, or no increase in calendar time; staff hours; and costs of acquiring additional materials, software, and equipment to address variances in selected federal agencies’ cybersecurity requirements. The majority (at least 34 out of 46) of the state CISOs that responded to this question in our survey reported moderate to very great increases in these types of impacts. Figure 2 represents the extent of impacts that state CISOs reported as a result of variances in selected federal cybersecurity requirements. OMB Circular A-130 requires federal agencies to coordinate with nonfederal entities, such as state agencies, as well as other federal agencies as appropriate, to ensure that security and privacy requirements pertaining to these nonfederal entities are consistent to the greatest extent possible. In addition, GAO and NIST have identified practices that can help federal agencies limit potential variation in security control selection and requirements, such as coordinating to develop compatible policies, procedures, and other means to operate across agency boundaries. For example, according to NIST, agencies can establish a tailored set of baseline requirements to satisfy common security objectives. In addition, by applying practices recommended by GAO for enhancing and sustaining coordination and collaboration, federal agencies could work towards establishing shared requirements with consistent terminology and parameters. However, the four selected federal agencies have not ensured that their cybersecurity requirements for state agencies are consistent to the maximum extent possible through coordination with each other. Officials from IRS, FBI, and SSA acknowledged that they had not coordinated with other federal agencies in establishing their current cybersecurity requirements for state agencies. The agencies had not coordinated, in part, because they have prioritized addressing agency-specific responsibilities from relevant laws and agency policies as well as the needs of relevant communities of interest. CMS officials stated that the agency coordinated with other federal agencies in 2015 when CMS originally established requirements for its security policy, the Minimum Acceptable Risk Standards for Exchanges Document Suite 2.0, Volume III: Minimum Acceptable Risk Standards for Exchanges. CMS officials noted that the agency added controls that IRS and SSA deemed essential to protecting data for which these agencies were responsible. Nevertheless, we found variances between CMS’s requirements and those established by IRS and SSA. Further, CMS last updated its security policy in September 2015 and IRS, SSA, and FBI’s CJIS have each since updated their policies. In addition to the insufficient coordination, the selected federal agencies identified two additional explanations for variances in their cybersecurity requirements for state agencies: (1) agencies’ determination that selected requirements were necessary and therefore, that resulting variances are warranted and (2) agencies’ requirements review processes that resulted in deviations from NIST guidance. Each of the selected agencies noted that they determined the unique controls and competing parameters in their requirements were necessary and warranted. For example, SSA noted that it has been conducting data exchanges with states since the late 1970s, predating NIST Special Publication 800-53. According to SSA officials, the agency’s security requirements retained certain legacy language that state agencies were already familiar with to reduce disruption to them. IRS officials also noted that their security controls incorporate disclosure restrictions from the Internal Revenue Code and internal IRS directives. Agency processes for reviewing their cybersecurity requirements have resulted in deviations from NIST guidance. For example, FBI’s CJIS officials stated that they started with NIST terminology when developing their policy. However, CJIS’s Advisory Policy Board— which recommends the final CJIS policy to the FBI Director— suggested modifications to the wording of requirements during subsequent reviews. As another example, CMS noted that during the review process for its requirements, in certain instances it deviated from NIST guidance to use terminology that would be more familiar to state agency users. Federal agencies may have legitimate reasons for having variances in their cybersecurity requirements. For instance, agencies may need to apply different information security controls, a greater number of controls, or more stringent technical parameters to protect data for which they are responsible in a manner consistent with various security requirements originating in federal laws, executive orders, directives, policies, regulations, standards, or guidelines as well as the agency’s risk assessments. However, according to NIST, organizations should document the relevant decisions taken during the control selection process, and provide a sound rationale for those decisions that is based on agency mission and business needs. Both FBI’s CJIS and IRS had documented the agency’s rationale for unique requirements. SSA stated that their controls were developed before NIST standards were created and they have mapped their current controls to NIST. However, SSA was unable to produce this documentation. CMS officials noted that the rationale for the requirements identified in the agency’s Minimum Acceptable Risk Standards for Exchanges security policy was documented in CMS’s Acceptable Risk Standards. However, the Acceptable Risk Standards did not include all requirements that were included in CMS’s security policy. For example, CMS’s requirements for organizations to review and re-evaluate privileges at least quarterly and for the information system to allocate resources by priority and/or quota were included in the security policy without a defined rationale and were also not included in CMS’s Acceptable Risk Standards. While agencies have identified various reasons for not coordinating on their cybersecurity requirements for state agencies, OMB has not taken steps to evaluate whether agencies are coordinating. OMB officials acknowledged that they could encourage additional coordination among the selected agencies, but said that it is ultimately up to the agencies to set their requirements and determine how best to assess states’ compliance with those requirements. However, without OMB’s involvement and encouragement that federal agencies collaborate to make their cybersecurity requirements for state agencies consistent to the greatest extent possible, federal agencies are less likely to prioritize such efforts. The selected federal agencies will soon have an opportunity to harmonize to the extent possible their requirements as they revisit and potentially update their existing security policies based on anticipated changes in NIST guidance. Until these agencies coordinate, where feasible, to address the variances in their cybersecurity requirements, officials from state agencies may continue to experience cost, time, and other burdens resulting from these variances. Further, without documentation of the rationale for having requirements that are unique or parameters that conflict in comparison to other agencies, it will be more difficult for these agencies to achieve consistent requirements. As previously discussed, OMB Circular A-130 requires federal agencies to assess whether state agencies have implemented effective security and privacy controls on information systems that create, collect, use, process, store, maintain, disseminate, disclose, or dispose of federal information. The circular also encourages federal agencies to coordinate on their approaches to authorizing the use of such systems whenever practicable. For example, the circular notes that multiple agencies are encouraged to jointly plan and execute tasks in NIST’s Risk Management Framework, which includes conducting security assessments. According to the circular, agencies can also leverage information generated by another agency based on the need to use the same information resources (e.g., information system or services provided by the system) by choosing to accept some or all of the information in an existing authorization package, including completed security assessments. As previously stated, NIST and GAO have recommended practices that federal agencies can implement to help with their coordination on cybersecurity assessments, such as assessments of state agencies’ compliance with federal cybersecurity requirements. Those practices fall in two broad areas: (1) coordination with state agencies when assessing states’ cybersecurity and (2) coordination with other federal agencies on the assessment of state agencies’ cybersecurity. In addition, based on the guidance from NIST that pertained to coordination on assessments of cybersecurity and practices recommended by GAO for enhancing coordination among federal agencies, four supporting activities are common to each of these two areas of federal agencies’ coordination on cybersecurity assessments: assessment schedules and time frames; meeting and document requests; security test plans—including testing techniques, location, and tools; and the use of findings from prior assessments. With regard to coordinating with state agencies when assessing their cybersecurity, two of the selected federal agencies—CMS and IRS—had policies that addressed all four of the activities supporting this area of coordination. The two other agencies—FBI’s CJIS and SSA—had policies that addressed some, but not all, of the supporting activities for such coordination. With regard to coordinating with other federal agencies on the assessment of state agencies’ cybersecurity, none of the four federal agencies had policies that addressed the activities supporting this area of coordination. Table 6 summarizes the extent to which selected agencies established policies for coordinating with state agencies and other federal agencies when assessing cybersecurity. See appendix II for details on the extent to which selected agencies addressed individual activities supporting the two areas of coordination. Each of the selected federal agencies addressed at least three of the four activities for coordinating with state agencies when assessing cybersecurity. CMS and IRS fully established policies for coordinating with state agencies by addressing all of the activities supporting such coordination. However, FBI’s CJIS and SSA partially established policies for coordinating with state agencies by addressing some—but not all—of the supporting activities. Specifically, FBI’s CJIS and SSA fully addressed three of the activities: coordinating (1) assessment schedules and time frames, (2) meeting and document requests, and (3) security test plans. For example, FBI’s CJIS policy included instructions for providing the date and time of assessment along with a schedule for the assessment process. Further, the policy stated that assessors should lay out the meetings that need to occur and documentation that state agencies need to provide CJIS, including specifics about the state’s network. SSA’s policy laid out each step of the assessment process, including the anticipated time frames. Further, SSA’s policy identified certain meetings that should be held during the process and documentation to be provided before the assessment. However, FBI’s CJIS and SSA did not fully establish policies for coordinating with state agencies because they did not address the activity associated with coordinating the use of findings from prior assessments. Specifically, while these two agencies’ policies addressed using findings from prior assessments conducted by their individual agency, their policies did not address whether or how assessors should use findings from other security assessments conducted within the state. Officials from FBI stated that in practice they consider findings from independent security assessments conducted within a state, but had not documented this practice in their assessment policies due to the limited instances in which this information is available. Officials from SSA believed that their policy addressed how its assessors were to consider findings from other security assessments that are conducted within a state. However, based on our review of SSA’s policy, this information was not yet addressed. None of the four agencies established policies for coordinating with other federal agencies when assessing state agencies’ cybersecurity. Officials from the four selected agencies reported that this is because their priority is to assess compliance with their own security requirements and they are not comfortable relying solely on other federal agencies’ assessments. Officials from each of the selected agencies provided additional perspectives on coordination with other federal agencies. Specifically: CMS officials stated that while they do not coordinate with other federal agencies in conducting compliance assessments, they did coordinate with other federal agencies when establishing their cybersecurity requirements. In addition, CMS officials stated that they do not conduct assessments of compliance with their security policy and that states engage contractors to perform the assessments. Therefore, CMS officials believed that the agency does not have a need to coordinate with other federal agencies. However, CMS did not include, where feasible, additional and detailed guidance to the state that it could use to inform its assessment contractors about coordination with other federal agencies. CMS guidance to the states could encourage additional coordination with other federal agencies such as planning the assessment, leveraging related efforts by other federal agencies, and sharing the state’s documentation and findings with other federal agencies, as appropriate. By not doing so, CMS is not maximizing coordination with other federal agencies to the greatest extent practicable. FBI’s CJIS officials stated that they schedule their security assessments 6 months ahead of time, but would be willing to reschedule the assessment if the state was unavailable due to another assessment being conducted. In addition, CJIS officials noted that while they test for security controls that other federal agencies are testing, they are not assessing the same information as other agencies because the FBI specifically requires criminal justice data to be logically separated from other data. Further, CJIS officials stated their assessment results and audit findings cannot be shared and that other federal agencies would need to refer to a state’s criminal justice agency for such information. IRS officials stated that they previously attempted to review assessment findings from other agencies, but since IRS was not looking at the same systems, the findings were not helpful. IRS officials stated that they would be willing to review recent assessments conducted by other federal agencies to see if information can be leveraged. SSA officials noted that it is their practice to reschedule an assessment if another federal agency has an assessment scheduled around the same time, but acknowledged that this was not in their policies. Further, according to SSA officials, they do not currently examine or consider findings from independent security assessments conducted within a state. While agencies cited various reasons for not coordinating when assessing state agencies’ cybersecurity, taking steps to coordinate, such as leveraging other agencies’ assessments or conducting joint assessments whenever practicable, would be consistent with practices encouraged by OMB. However, OMB has not taken steps to ensure that they do so. OMB officials noted that they believed several of the agencies had begun to coordinate on their own and acknowledged that they could take additional steps to encourage and promote coordination among the agencies. OMB officials further noted that it is ultimately the responsibility of the agencies to determine how they conduct their assessments. Nevertheless, federal agencies may be placing unnecessary burdens on state officials’ time and resources in responding to similar requests and inquiries. Several state CISOs told us that they have identified various instances in which multiple federal agencies’ lack of coordination resulted in requests for similar documentation and interviews with IT officials. For example, according to three state CISOs, the selected federal agencies have asked them to address similar questions regarding physical security controls, network configurations, and password policies in separate interviews. Three state CISOs also noted that they have provided to multiple federal agencies documentation—such as network diagrams and incident response policies—related to the same IT environment and have facilitated multiple federal assessments of the same physical environment. State CISOs identified additional opportunities for further coordination among federal agencies and impacts in dealing with federal cybersecurity assessments. For instance, in response to our survey, 16 states’ officials commented that the four federal agencies in our review could leverage additional opportunities to coordinate on their assessments within their states, particularly where the states had a consolidated data center or other centrally managed IT infrastructure. Further, four state CISOs noted that federal agencies could potentially leverage security compliance assessments and internal audits performed at the state or local level because they included reviews of controls from NIST Special Publication 800-53. In addition, 11 states mentioned “duplication” in their response to a survey question about challenges or impacts related to federal cybersecurity requirements and assessment processes, while two states mentioned “overlap,” and one state mentioned “fragmentation.” For example: One state identified that assessors from different federal agencies generally ask for the same items from the state, requiring state agency officials to reproduce the same response. Another state identified that multiple federal agencies have been assessing the same state agencies with different scope, tools, and documentation requests. In another example, a state concluded that federal assessors’ interpretation of many technical controls was inconsistent and varied from one federal agency to another and across audit cycles. The state noted that there were opportunities for the federal government to streamline how each agency applied different interpretations. State CISOs also identified impacts on their time and costs from responding to federal agencies’ assessments. Seventeen respondents reported impacts to their time and six reported cost impacts. Further, in responding to questions in our survey and an in-depth interview, state CISOs provided additional insights regarding impacts. For example: One state mentioned that, due to the varying requirements from the selected federal agencies, the state is required to stand up multiple virtual and physical environments. In doing so, the state is required to purchase additional software and hardware to maintain such environments. Another state explained that staff manage various state agencies’ data in one central location and spend a considerable amount of time responding to each of the four selected federal agencies’ assessments. Twenty-four states estimated that the four selected federal agencies conducted at least 188 assessments between calendar years 2016 and 2018 and that the states’ best estimates of the total expenditures associated with those assessments ranged from $43.8 million to $67 million. Of 164 instances where states reported an average time spent on assessments by one of the four selected agencies between calendar years 2016 and 2018, in 97 instances the average time expenditure per assessment was reported to be 301 staff hours or more, and in 67 instances it was less than 301 staff hours. Additionally, there were 34 instances in which the state did not know what its average staff hour expenditure was for a particular agency’s assessment or said that it was not applicable to the state. Figure 3 represents the responses from 50 state CISOs on the average state staff hours expended per assessment from across the four selected federal agencies as reported by state CISOs. While state agencies could benefit from additional coordination among federal agencies in conducting their security assessments, increasing coordination may also save the federal government money. For instance, federal agencies may be able to reduce the number of assessments or the scope of the assessment conducted by each agency, the amount of time multiple federal agencies must spend reviewing state systems, and contractor services acquired to assist in performing assessments. The selected federal agencies reported spending close to $45 million in fiscal years 2016 through 2018 on assessments of state agencies’ cybersecurity. Figure 4, an interactive figure, provides the selected federal agencies’ reported spending for fiscal years 2016 through 2018 for assessing state compliance with cybersecurity requirements. (See appendix III for the cost breakdown of selected federal agencies’ reported spending). Until FBI’s CJIS and SSA fully develop policies for coordinating with state agencies and all of the selected agencies develop policies for coordinating with other federal agencies when assessing state agencies’ cybersecurity, as appropriate, they run the risk of spending more than necessary to assess the security of state systems and networks. Further, federal agencies may be placing unnecessary burdens on state officials’ time and resources in responding to overlapping or duplicative requests and inquiries, retesting controls that have already been evaluated, or reporting similar findings multiple times throughout a state. In addition, until OMB takes steps to ensure agencies coordinate on assessments of state agencies’ cybersecurity, it will not have reasonable assurance federal agencies are leveraging compatible assessments where practicable. Given that the federal government exchanges personally identifiable and other sensitive information with state agencies, it is critical to have effective coordination across the federal and state agencies to protect this information. While the selected federal agencies have taken steps to secure information exchanged between federal and state agencies, they have not coordinated with each other in establishing cybersecurity requirements for state agencies. The selected agencies’ insufficient coordination has contributed to variances in the agencies’ control selection, terminology, and technical parameters across hundreds of cybersecurity requirements imposed on states. Further, OMB requires agencies to coordinate to ensure consistency among cybersecurity requirements for state entities, but it has not ensured that agencies have done so. While federal agencies may have legitimate reasons for having variances in their cybersecurity requirements, states’ compliance with multiple federal agencies’ cybersecurity requirements has resulted in increased costs. Coordinating to address variances in federal agencies’ cybersecurity requirements could help to significantly reduce these costs. The selected agencies will soon have an opportunity to coordinate on any planned updates of their security policies that affect state agencies when reviewing their security policies against expected revisions in NIST guidance. Accordingly, it is important that OMB ensures that selected federal agencies coordinate with state agencies and each other to establish cybersecurity requirements that are consistent to the greatest extent possible. Selected federal agencies had partially established policies to coordinate with state agencies when assessing their cybersecurity, but did not have policies for coordinating with other federal agencies. Federal agencies have not been coordinating with each other on assessments of state agencies’ cybersecurity, in part, because this has not been a priority for them. Further, federal agencies have been less likely to coordinate in their assessments of state agencies’ cybersecurity without additional involvement from OMB. The lack of coordination among federal agencies has been a concern among state CISOs who described instances of duplication and overlap in their cybersecurity assessments. As with the cybersecurity requirements, coordinating with both state and federal agencies when assessing state agencies’ cybersecurity may help to minimize additional cost and time impacts on state agencies, and reduce federal resources associated with implementing state-based cybersecurity assessments. Until OMB takes steps to ensure federal agencies coordinate on assessments of state agencies’ cybersecurity, it will not have reasonable assurance federal agencies are leveraging compatible assessments to the greatest extent possible. We are making a total of 12 recommendations, including two to OMB, two to CMS, three to FBI, two to IRS, and three to SSA. The Director of OMB should ensure that CMS, FBI, IRS, and SSA are collaborating on their cybersecurity requirements pertaining to state agencies to the greatest extent possible and direct further coordination where needed. (Recommendation 1) The Director of OMB should take steps to ensure that CMS, FBI, IRS, and SSA coordinate, where feasible, on assessments of state agencies’ cybersecurity, which may include steps such as leveraging other agencies’ security assessments or conducting assessments jointly. (Recommendation 2) The Administrator of CMS should, in collaboration with OMB, solicit input from FBI, IRS, SSA, and state agency stakeholders on revisions to its security policy to ensure that cybersecurity requirements for state agencies are consistent with other federal agencies and NIST guidance to the greatest extent possible and document CMS’s rationale for maintaining any requirements variances. (Recommendation 3) The Administrator of CMS should revise its assessment policies to maximize coordination with other federal agencies to the greatest extent practicable. (Recommendation 4) The FBI Director should, in collaboration with OMB, solicit input from CMS, IRS, SSA, and state agency stakeholders on revisions to its security policy to ensure that cybersecurity requirements for state agencies are consistent with other federal agencies and NIST guidance to the greatest extent possible. (Recommendation 5) The FBI Director should fully develop policies for coordinating with state agencies on the use of prior findings from relevant cybersecurity assessments conducted by other organizations. (Recommendation 6) The FBI Director should revise its assessment policies to maximize coordination with other federal agencies to the greatest extent practicable. (Recommendation 7) The IRS Commissioner should, in collaboration with OMB, solicit input from CMS, FBI, SSA, and state agency stakeholders on revisions to its security policy to ensure that cybersecurity requirements for state agencies are consistent with other federal agencies and NIST guidance to the greatest extent possible. (Recommendation 8) The IRS Commissioner should revise its assessment policies to maximize coordination with other federal agencies to the greatest extent practicable. (Recommendation 9) The Commissioner of SSA should, in collaboration with OMB, solicit input from CMS, FBI, IRS, and state agency stakeholders on revisions to its security policy to ensure that cybersecurity requirements for state agencies are consistent with other federal agencies and NIST guidance to the greatest extent possible and document the SSA’s rationale for maintaining any requirements variances. (Recommendation 10) The Commissioner of SSA should fully develop policies for coordinating with state agencies on the use of prior findings from relevant cybersecurity assessments conducted by other organizations. (Recommendation 11) The Commissioner of SSA should revise its assessment policies to maximize coordination with other federal agencies to the greatest extent practicable. (Recommendation 12) We provided a draft of this report to OMB and the four other selected federal agencies for their review and comment. In response, three of the agencies (Department of Health and Human Services, FBI, and SSA) stated that they agreed with the recommendations; and one agency (IRS) stated that it partially agreed with one recommendation and disagreed with one recommendation. OMB did not provide comments on our report. The following three agencies agreed with the recommendations. The Department of Health and Human Services provided written comments, in which it agreed with our recommendations and identified steps it said CMS had taken or intends to take to address them. For example, the department stated that CMS intends to solicit input from the other federal agencies identified in this report and from state agency stakeholders when making updates to its MARS-E security policy and when updating its assessment guidance to states on how to maximize coordination with other federal entities. The department noted that CMS had developed and implemented its suite of guidance and requirements, known as MARS-E, based on the Patient Protection and Affordable Care Act, FISMA, and NIST. According to the department, variances in security requirements are to be expected because of the flexibility that NIST allows in its guidance. The department added that CMS tailored some of the controls to allow flexibilities for states while keeping the overall intent of the NIST guidance. The department stated that it collaborated with federal agencies, including FBI's CJIS, in developing MARS-E and during subsequent updates of that security policy. However, CMS did not provide us with documentation as evidence of its collaboration with FBI's CJIS on the development of MARS-E. In addition, as noted in this report, CMS had not collaborated with the other agencies included in our review after the development of the most recent version of MARS-E. It is important that federal agencies collaborate to address variances in their cybersecurity requirements; doing so could help to significantly reduce state agencies’ costs in complying with multiple federal agencies’ requirements. The department's comments are reprinted in appendix IV. The department also provided technical comments, which we incorporated as appropriate. In written comments, FBI's CJIS agreed with our three recommendations to the agency. Among other things, the agency stated that it would, to the greatest extent possible, collaborate with OMB and solicit input from the other federal agencies identified in this report, as well as from state agency stakeholders, on revisions to its security policy. With regard to our recommendation that FBI’s CJIS develop policies for coordinating with state agencies on the use of prior findings, the agency stated that it had implemented this recommendation and updated its security policy to include coordinating with state agencies on the use of prior findings from relevant cybersecurity assessments conducted by other organizations. However, the agency did not provide documentation showing that it had updated the security policy. As a result, we did not change our assessment of this practice. We will continue to monitor the agency’s progress in implementing the recommendation. The agency's comments are reprinted in appendix V. The agency also provided technical comments, which we incorporated as appropriate. In its written comments, SSA stated that it agreed with our recommendations. SSA's comments are reprinted in appendix VI. The agency also provided technical comments, which we incorporated as appropriate. One agency partially agreed with one recommendation and disagreed with one recommendation. Specifically, IRS partially agreed with our recommendation to, in collaboration with OMB, solicit input from the four federal agencies identified in this report and state agency stakeholders on revisions to its security policy. Specifically, the agency agreed to participate in collaborative working sessions with OMB and interested stakeholders to discuss the impact of inconsistent standards and the extent to which the standards might be harmonized. However, IRS stated that it must follow Treasury Directives and internal standards for systems that process tax data and, as a result, its ability to harmonize requirements may be limited. As noted in this report, federal agencies may have legitimate reasons for variances in their cybersecurity requirements, such as applying different information security controls and more stringent technical parameters to protect data for which the agencies are responsible in a manner consistent with various security requirements originating in federal laws, directives, and regulations. Nevertheless, we continue to believe that it is important for all of the agencies in our review to identify opportunities where requirements can be streamlined or made more consistent while still achieving each agency's desired security outcomes because doing so may reduce potential burdens on state agencies, as discussed in this report. Thus, we maintain that our recommendation is still warranted. IRS disagreed with our recommendation to revise its assessment policies to maximize coordination with other federal agencies to the greatest extent possible. Specifically, IRS stated that it has sole statutory oversight authority and enforces requirements for agencies subject to Internal Revenue Code § 6103. As such, IRS cannot solely rely on an assessment conducted by another agency. However, as noted in this report, OMB encourages federal agencies to coordinate on their assessments whenever practicable. Doing so would not necessarily require IRS to solely rely on another agency’s assessment nor conflict with its authority to conduct statutory oversight because IRS could leverage and share relevant information and artifacts with other federal agencies while continuing to conduct its own required assessments and oversight. Further, as discussed in this report, state chief information officers identified a number of areas where federal agencies requested similar information through documentation requests and interviews, such as network configurations, password policies, and incident response policies. Leveraging and sharing relevant information that is collected by federal agencies could help those agencies, including IRS, reduce some of their data collection needs while also helping to minimize burdens on state officials’ time and resources. We acknowledge that complete alignment of assessment policies may not be feasible in light of unique statutory responsibilities and requirements; however, agency coordination and simplification of certain assessment logistics may be possible and could result in gained efficiencies from the perspective of the federal government. Thus, we maintain that our recommendation is still warranted. IRS's comments are reprinted in appendix VII. We are sending copies of this report to the appropriate congressional requesters, the Director of OMB, the Administrator of CMS, the Assistant Attorney General for Administration for the Department of Justice, the FBI Director, the IRS Commissioner, and the Commissioner of SSA. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6240 or at dsouzav@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIlI. We administered a survey to the offices of the Chief Information Officer and Chief Information Security Officer (CISO) in the 50 states, District of Columbia, American Samoa, Guam, Puerto Rico, and the U.S. Virgin Islands. To administer the survey, we emailed each state a fillable PDF questionnaire. We fielded the survey from February 19, 2019, through April 24, 2019. We received usable survey responses from 50 of the 55 states and territories, for a response rate of 91 percent. In developing, administering, and analyzing the survey, we took steps to minimize the five types of errors that may affect survey results— population coverage, sampling, measurement, nonresponse, and data processing. Our results are not subject to either of the first two types of errors—population coverage (under- or over-coverage) error of the study population or sampling error—because we defined all states and five territories as our study population, and sent each a questionnaire. To minimize the third type of error (measurement error), we pretested the questionnaire with CISOs (or their delegates) in four states that varied over two characteristics related to our questions: whether or not the state took a “federated” or “consolidated” management approach to data center and other information technology (IT) infrastructure, and the relative size of the state’s IT budget. Using cognitive interviewing techniques, such as nondirective probing of answers and asking respondents to think aloud when formulating answers, we determined whether (1) the questions were clear and unambiguous, (2) terminology was used correctly, (3) the questionnaire did not place an undue burden on state officials, (4) the information could feasibly be obtained, and (5) the survey was comprehensive and unbiased. Based on the pretests and interviews with external subject matter experts on questionnaire subjects, we modified the questionnaire. During the survey, we also followed up by email or phone with some respondents to clarify unclear answers and edit them if necessary. Additionally, after the survey, our in-depth interviews with four responding states confirmed their answers to selected questions, or resulted in edits to those answers. To minimize the potential for the fourth type of error (nonresponse error), we emailed or called states that did not respond to the initial notice multiple times to encourage survey participation or provide technical assistance, as appropriate. Also, the follow up contacts made to clarify answers resulted in obtaining some answers to questions that had been left blank in returned questionnaires. While the four states and one territory not returning questionnaires may have differed to an unknown extent in what their answers would have been, compared to the aggregate answers of those who did respond, the overall impact on our results from only five missing members of the population is unlikely to be material. To minimize the possibility for the fifth type of error (data processing error), all data entry, edits, and analysis were verified by a second, independent analyst on the engagement team. To further understand the states’ experiences with and views of selected federal agencies’ cybersecurity assessments, we conducted in-depth interviews with four states. In selecting the four states for in-depth interviews, we considered responses from 44 states that had submitted surveys prior to April 11, 2019. From these states, we analyzed responses to survey questions 4, 7, 9, 10, 11, 12, 13, 14, 15, 16, and 17, and identified whether states’ responses reflected a generally favorable opinion or a generally unfavorable opinion of federal cybersecurity requirements and assessments. Based on this information, we selected two states to interview that had a generally favorable opinion and two states that had a generally unfavorable opinion toward federal cybersecurity assessments and requirements. In selecting states to interview from states that had favorable and unfavorable opinions, we chose to interview states that provided different responses about increases in costs and/or coordination with federal and nonfederal agencies. We sent an email to each of the four states to ask for their participation and conducted follow up interviews with officials from the offices of the state CIO and state CISO, state audit entities, and mission agencies from four states. Our interview questions concerned topics such as challenges states may have faced in complying with federal cybersecurity requirements, the impacts federal requirements and assessments may have had on states, the efficiency and effectiveness of assessments performed by each federal agency, and the nature and extent of any duplication in federal agencies’ cybersecurity requirements. Although the results of these in-depth interviews are not generalizable to all of the states and territories that responded to our survey, they provide richer insight into some of the information we collected through our survey, such as the reasons for certain questionnaire responses or the sources of variation in states’ perspectives. The following identifies the survey questionnaire that we administered and the aggregated results from the responses are below under each question. Not all state CISOs who completed the survey responded to all questions, and some questions were not discussed in the body of our report. These questions ask about the federal agency cybersecurity requirements that set standards in any of the related general security control categories, and your experiences with those applicable to your state. 1. For how long has the current CISO of your state been in that role? (check one box) 2. Please provide some background on your state’s governance model for cybersecurity. Specifically, how is the responsibility for managing the following aspects of cybersecurity primarily assigned within your state? (check the one box in each row which best represents your answer) 3. Is your state currently required to meet any security requirements by any of the following federal agencies in order to obtain and use federal data? Federal Bureau of Investigation (FBI) (Criminal Justice Information Services (CJIS) Security Policy CJISD-ITS-DOC-08140-5.7, Version 5.7) Centers for Medicare & Medicaid Services (CMS) (Minimum Acceptable Risk Standards for Exchanges, Version 2.0) Internal Revenue Service (IRS) (IRS Publication 1075, Tax Information Security Guidelines For Federal, State, and Local Agencies, September 2016) Social Security Administration (SSA) (Electronic Information Exchange Security Requirements and Procedures for State and Local Agencies Exchanging Electronic Information, Version 8.0) 4. Federal security requirements applicable to states may vary in a number of ways. Considering as a whole all of the federal agencies’ requirements that your state is currently required to meet, how much do you think they vary from each other in each of the following ways? 5. Consider again all the applicable federal cybersecurity requirements required of your state. Do one or more federal agencies have any requirements that most vary from other agencies? Within each of the following families of security controls, check all boxes that apply to tell us in what ways requirements vary, and which agency(s) vary the most from others. (If “Other(s)” varying agencies selected, list in Question 6.) NIST Control Family Access Control (AC) Awareness and Training (AT) Audit and Accountability (AU) Security Assessment and Authorization (CA) Configuration and Management (CM) Contingency Planning (CP) Identification and Authentication (IA) Incident Response (IR) Media Protection (MP) Physical and Environmental Protection (PE) Planning (PL) Personnel Security (PS) Risk Assessment (RA) System and Services Acquisition (SA) System and Communications Protection (SC) System and Information Integrity (SI) Program management (PM) 6. If you indicated above that any other federal agencies have requirements that most vary from others, what are those other agencies and the control categories and way(s) they vary? (Narrative answers not displayed) 7. If you identified any variation in the requirements of multiple Federal agencies in question 5 above, what is your overall estimation of the degree of that variation in each of the following families of controls? Families of controls (Based on NIST 800-53) Access control (AC) Awareness and training (AT) Audit and accountability (AU) Security assessment and authorization (CA) Configuration management (CM) Contingency planning (CP) Identification and authentication (IA) Incident response (IR) Maintenance (MA) Media protection (MP) Physical and environmental protection (PE) Planning (PL) Personnel security (PS) Risk assessment (RA) System and services acquisition (SA) System and communications protection (SC) System and information integrity (SI) 8. Do you have any comments on or explanations of your answers to the question above that would help us appropriately interpret those answers? (itemize your comments by the row letters above, to the extent possible, in the box below) (Narrative answers not displayed) 9. Has your state taken any of the following actions specifically to address variation(s) across agency requirements? Increased coordination with NASCIO and other non-federal agencies outside your state Increased coordination with other agencies within your state Any other action(s) 10. Have the variations increased any of the following types of costs and/or challenges? The following questions ask about assessments performed by federal agencies on your state on its compliance with the federal cybersecurity requirements covered above. For the purposes of this survey, an “assessment” includes only the activities in the period between the date the state is notified of the assessment and the date the federal agency or entity carrying out the assessment (e.g., contractor) completes its on-site work. 11. Approximately how many assessments did each of the following federal agencies perform on your state’s efforts to comply with its requirements in calendar years 2016-2018? (When counting assessments performed by one federal agency on more than one state mission agency or operational entity at the same time, please count each assessment individually.) Any other federal agency(s) 12. Considering up to the last 3 assessments a federal agency performed in 2016-2018, approximately how long in calendar time was taken per assessment, on average, to perform? Any other federal agency(s) 13. Considering up to the last 3 assessments a federal agency performed in 2016-2018, approximately how many of your state’s staff hours were expended per assessment, on average, to comply? Any other federal agency(s) 14. And considering up to the last 3 assessments a federal agency performed in 2016-2018, what is your best estimate of the range of cost in dollars (including staff hour labor, travel, materials, and contract costs) your state expended per assessment, on average, to comply? Estimated lower end of dollar cost (mean value) $77,103 (17 responses) Estimated upper end of dollar cost (mean value) Don’t know 28 (17 responses) $623,650 19 responses) $840,472 (19 responses) $211,574 (21 responses) $418,238 (21 responses) $33,822 (16 responses) $61,719 (16 responses) 15. Considering all the federal assessments performed on your state’s implementation of requirements in 2016-2018, how would you rate those assessments, overall, on the following factors? 16. In summary, how would you rate the efficiency of assessments performed by each federal agency on your state’s implementation of requirements? Any other agency(s) 17. In summary, how would you rate the effectiveness of assessments performed by federal agencies on your state’s implementation of requirements? Any other agency(s) 18. Considering the issues covered in this questionnaire, what challenges or impacts, if any, has your state experienced regarding the federal requirements and assessment processes? (list and describe up to 5) (Narrative answers not displayed) 19. Do you have any additional explanations of your answers or comments on any of the issues in this questionnaire? (Narrative answers not displayed) 20. Who is the person primarily responsible for completing this questionnaire whom we can contact in case we need to clarify a response? If the state CISO did not complete this questionnaire, we recommend that the CISO review these answers. The tables below identify the extent to which each of the four selected federal agencies established policies that addressed individual activities supporting two areas of coordination: (1) coordination with state agencies when assessing states’ cybersecurity and (2) coordination with other federal agencies on the assessment of state agencies’ cybersecurity. In addition to the individual named above, Josh Leiling (assistant director), Lori Martinez (analyst in charge), Gerard Aflague, Joseph Andrews, David Blanding, Chris Businsky, Rebecca Eyler, Torrey Hardee, Andrea Harvey, Keith Kim, Monica Perez-Nelson, and Carl Ramirez made significant contributions to this report.", "summary": "To protect data that are shared with state government agencies, federal agencies have established cybersecurity requirements and related compliance assessment programs. Specifically, they have numerous cybersecurity requirements for states to follow when accessing, storing, and transmitting federal data. GAO was asked to evaluate federal agencies' cybersecurity requirements and related assessment programs for state agencies. The objectives were to determine the extent to which (1) selected federal agencies' cybersecurity requirements for state agencies varied with each other and federal guidance, and (2) federal agencies had policies for coordinating their assessments of state agencies' cybersecurity. GAO reviewed four federal agencies that shared data with states and had assessment programs: CMS, FBI, IRS, and SSA. GAO compared, among other things, each agency's cybersecurity requirements to federal guidance and to other selected agencies' requirements; and reviewed federal agencies' policies for conducting assessments. In addition, GAO examined OMB's efforts to foster coordination among federal agencies. GAO also surveyed and received responses from chief information security officers in 50 out of 55 U.S. states, territories, and the District of Columbia to obtain their perspectives. Although the Centers for Medicare and Medicaid Services (CMS), Federal Bureau of Investigation (FBI), Internal Revenue Service (IRS), and Social Security Administration (SSA) each established requirements to secure data that states receive, these requirements often had conflicting parameters. Such parameters involve agencies defining specific values like the number of consecutive unsuccessful logon attempts prior to locking out the user. Among the four federal agencies, the percentage of total requirements with conflicting parameters ranged from 49 percent to 79 percent. Regarding variance with National Institute of Standards and Technology guidance, GAO found that the extent to which the four agencies did not fully address guidance varied from 9 percent to 53 percent of total requirements. The variances were due in part to the federal agencies' insufficient coordination in establishing requirements. Although the Office of Management and Budget's (OMB) Circular A-130 requires agencies to coordinate, OMB has not ensured that agencies have done so. Further, while federal agencies' variance among requirements may be justified in some cases because of particular agency mission needs, the resulting impact on states is significant, according to state chief information security officers (see figure). The four federal agencies that GAO reviewed either fully or partially had policies for coordinating assessments with states, but none of them had policies for coordinating assessments with each other. State chief information security officers that GAO surveyed reinforced the need to coordinate assessments by identifying impacts on state agencies' costs, including multiple federal agencies that requested the same documentation. Coordinating with state and federal agencies when assessing state agencies' cybersecurity may help to minimize states' cost and time impacts and reduce associated federal costs. Federal agencies reported spending about $45 million for fiscal years 2016 through 2018 on assessments of state agencies' cybersecurity. GAO is making 12 recommendations to the four selected agencies and to OMB. Three agencies agreed with the recommendations and one agency (IRS) partially agreed or disagreed with them. OMB did not provide comments. GAO continues to believe all recommendations are warranted.", "document_type": "gao"}
{"report": "The federal government plans to invest over $90 billion for IT in fiscal year 2019. Nevertheless, we have previously reported that investments in federal IT too often resulted in failed projects that incurred cost overruns and schedule slippages, while contributing little to the desired mission- related outcomes. For example: The United States Coast Guard (Coast Guard) decided to terminate its Integrated Health Information System project in 2015. As reported by the agency in August 2017, the Coast Guard spent approximately $60 million over 7 years on this project, which resulted in no equipment or software that could be used for future efforts. The Department of Veterans Affairs’ Financial and Logistics Integrated Technology Enterprise program was intended to be delivered by 2014 at a total estimated cost of $609 million, but was terminated in October 2011. The Department of Defense’s Expeditionary Combat Support System was canceled in December 2012 after spending more than a billion dollars and failing to deploy within 5 years of initially obligating funds. The Department of Homeland Security’s (DHS) Secure Border Initiative Network program was ended in January 2011, after the department obligated more than $1 billion for the program. Our past work has found that these and other failed IT projects often suffered from a lack of disciplined and effective management, such as project planning, requirements definition, and program oversight and governance. In many instances, agencies had not consistently applied best practices that are critical to successfully acquiring IT. Federal IT projects have also failed due to a lack of oversight and governance. Executive-level governance and oversight across the government has often been ineffective, specifically from CIOs. For example, we have reported that some CIOs’ roles were limited because they did not have the authority to review and approve the entire agency IT portfolio. In addition to failures when acquiring IT, our cybersecurity work at federal agencies continues to highlight information security deficiencies. The following examples describe the types of risks we have found at federal agencies. In September 2018, we reported that the Department of Education’s Office of Federal Student Aid exercised minimal oversight of lenders’ protection of student data and lacked assurance that appropriate risk- based safeguards were being effectively implemented, tested, and monitored. In August 2017, we issued a report stating that, since the 2015 data breaches, the Office of Personnel Management (OPM) had taken actions to prevent, mitigate, and respond to data breaches involving sensitive personal and background investigation information. However, we noted that the agency had not fully implemented recommendations that DHS’s United States Computer Emergency Readiness Team made to OPM to help the agency improve its overall security posture and improve its ability to protect its systems and information from security breaches. We reported in July 2017 that information security at the Internal Revenue Service had weaknesses that limited its effectiveness in protecting the confidentiality, integrity, and availability of financial and sensitive taxpayer data. An underlying reason for these weaknesses was that the Internal Revenue Service had not effectively implemented elements of its information security program. We reported in August 2016 that the information security of the Food and Drug Administration had significant weaknesses that jeopardized the confidentiality, integrity, and availability of its information systems and industry and public health data. In May 2016, we found that the National Aeronautics and Space Administration, the Nuclear Regulatory Commission, OPM, and the Department of Veteran Affairs did not always control access to selected high-impact systems, patch known software vulnerabilities, or plan for contingencies. An underlying reason for these weaknesses was that the agencies had not fully implemented key elements of their information security programs. Congress and the President have enacted various key pieces of reform legislation to address IT management issues. These include the federal IT acquisition reform legislation commonly referred to as the Federal Information Technology Acquisition Reform Act (FITARA). This legislation was intended to improve covered agencies’ acquisitions of IT and enable Congress to monitor agencies’ progress and hold them accountable for reducing duplication and achieving cost savings. The law includes specific requirements related to seven areas: Agency CIO authority enhancements. CIOs at covered agencies have the authority to, among other things, (1) approve the IT budget requests of their respective agencies and (2) review and approve IT contracts. Federal data center consolidation initiative (FDCCI). Agencies covered by FITARA are required, among other things, to provide a strategy for consolidating and optimizing their data centers and issue quarterly updates on the progress made. Enhanced transparency and improved risk management. The Office of Management and Budget (OMB) and covered agencies are to make detailed information on federal IT investments publicly available, and agency CIOs are to categorize their investments by level of risk. Portfolio review. Covered agencies are to annually review IT investment portfolios in order to, among other things, increase efficiency and effectiveness and identify potential waste and duplication. Expansion of training and use of IT acquisition cadres. Covered agencies are to update their acquisition human capital plans to support timely and effective IT acquisitions. In doing so, the law calls for agencies to consider, among other things, establishing IT acquisition cadres (i.e., multi-functional groups of professionals to acquire and manage complex programs), or developing agreements with other agencies that have such cadres. Government-wide software purchasing program. The General Services Administration is to develop a strategic sourcing initiative to enhance government-wide acquisition and management of software. In doing so, the law requires that, to the maximum extent practicable, the General Services Administration should allow for the purchase of a software license agreement that is available for use by all executive branch agencies as a single user. Maximizing the benefit of the Federal Strategic Sourcing Initiative. Federal agencies are required to compare their purchases of services and supplies to what is offered under the Federal Strategic Sourcing Initiative. In June 2015, OMB released guidance describing how agencies are to implement FITARA. This guidance was intended to, among other things: assist agencies in aligning their IT resources with statutory requirements; establish government-wide IT management controls to meet the law’s requirements, while providing agencies with flexibility to adapt to unique agency processes and requirements; strengthen the relationship between agency CIOs and bureau CIOs; and strengthen CIO accountability for IT costs, schedules, performance, and security. The guidance identifies a number of actions that agencies are to take to establish a basic set of roles and responsibilities (referred to as the common baseline) for CIOs and other senior agency officials and, thus, to implement the authorities described in the law. For example, agencies are to conduct a self-assessment and submit a plan describing the changes they intend to make to ensure that common baseline responsibilities are implemented. In addition, in August 2016, OMB released guidance intended to, among other things, define a framework for achieving the data center consolidation and optimization requirements of FITARA. The guidance directed agencies to develop a data center consolidation and optimization strategic plan that defined the agency’s data center strategy for fiscal years 2016, 2017, and 2018. This strategy was to include, among other things, a statement from the agency CIO indicating whether the agency had complied with all data center reporting requirements in FITARA. Further, the guidance states that OMB is to maintain a public dashboard to display consolidation-related costs savings and optimization performance information for the agencies. In June 2019, OMB issued Memorandum M-19-19, which updated the data center optimization initiative and redefined a data center as a purpose-built, physically separate, dedicated space that meets certain criteria. It also revised the priorities for consolidating and optimizing federal data centers. Specifically, OMB directed agencies to report on spaces designed to be data centers (i.e., tiered data centers) as part of their inventories and to focus efforts on data centers that host business applications, rather than special purpose data centers. According to OMB’s August 2019 quarterly reporting instructions, non-tiered data centers may be flagged for removal in one reporting period and removed in the next unless OMB provides a written denial within a specified time frame. In addition, OMB described criteria for designating certain data centers as mission critical facilities, and would therefore not be taken into consideration when setting new agency-specific closure targets. Those mission critical designations are also assumed to be granted unless OMB specifically overturns them. Regarding cost savings, OMB’s new memorandum, M-19-19, noted that agency-specific targets would be set in collaboration with each agency and appropriately aligned to that agency’s mission and budget. OMB’s new memorandum also replaced the previous optimization metrics with new measures that focus on reporting the numbers of agencies’ virtualized hosts, underutilized servers, data centers with advanced energy metering, and the percentage of time that data centers were expected to be available to provide services. In contrast to the previous guidance, the new memorandum does not specify government-wide performance targets for the optimization metrics. Instead, OMB worked with agencies to establish agency-specific targets. In addition, the guidance describes how agencies could apply for an optimization performance exemption for data centers where typical optimization activities (consolidation of data collection, storage, and processing to a central location) are technically possible but increase the response time for systems beyond a reasonable limit. Congress has recognized the importance of agencies’ continued implementation of FITARA provisions, and has taken legislative action to extend selected provisions beyond their original dates of expiration. Specifically, Congress and the President enacted laws to: remove the expiration dates for the enhanced transparency and improved risk management provisions, which were set to expire in 2019; remove the expiration date for portfolio review, which was set to expire in 2019; and extend the expiration date for FDCCI from 2018 to 2020. In addition, Congress and the President enacted a law to authorize the availability of funding mechanisms to help further agencies’ efforts to modernize IT. The law, known as the Modernizing Government Technology (MGT) Act, authorizes agencies to establish working capital funds for use in transitioning away from legacy IT systems, as well as for addressing evolving threats to information security. The law also creates the Technology Modernization Fund within the Department of the Treasury, from which agencies can “borrow” money to retire and replace legacy systems, as well as to acquire or develop systems. Further, in February 2018, OMB issued guidance for agencies on implementing the MGT Act. The guidance was intended to provide agencies additional information regarding the Technology Modernization Fund, as well as the administration and funding of the related IT working capital funds. Specifically, the guidance encouraged agencies to begin submitting initial project proposals for modernization on February 27, 2018. In addition, in accordance with the MGT Act, the guidance provided details regarding a Technology Modernization Board, which is to consist of (1) the Federal CIO; (2) a senior IT official from the General Services Administration; (3) a member of DHS’s National Protection and Program Directorate; and (4) four federal employees with technical expertise in IT development, financial management, cybersecurity and privacy, and acquisition that were appointed by the Director of OMB. Congress and the President enacted the Federal Information Security Modernization Act of 2014 (FISMA) to improve federal cybersecurity and clarify government-wide responsibilities. The act highlights the increasing sophistication of cybersecurity attacks, promotes the use of automated security tools with the ability to continuously monitor and diagnose the security posture of federal agencies, and provides for improved oversight of federal agencies’ information security programs. To this end, the act clarifies and assigns specific responsibilities to entities such as OMB, DHS, and the federal agencies. Table 1 describes a selection of the OMB, DHS, and agency responsibilities. Beyond the implementation of FITARA, FISMA, and related actions, the administration has also initiated other efforts intended to improve federal IT and the nation’s cybersecurity. Specifically, in March 2017, the administration established the Office of American Innovation, which has a mission to, among other things, make recommendations to the President on policies and plans aimed at improving federal government operations and services. In doing so, the office is to consult with both OMB and the Office of Science and Technology Policy on policies and plans intended to improve government operations and services, improve the quality of life for Americans, and spur job creation. In May 2017, the Administration also established the American Technology Council, which has a goal of helping to transform and modernize federal agency IT and how the federal government uses and delivers digital services. The President is the chairman of this council, and the Federal CIO and the United States Digital Service Administrator are among the members. In addition, in May 2017, the President signed Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. This executive order outlined actions to enhance cybersecurity across federal agencies and critical infrastructure to improve the nation’s cyber posture and capabilities against cybersecurity threats. Among other things, the order tasked the Director of the American Technology Council to coordinate a report to the President from the Secretary of DHS, the Director of OMB, and the Administrator of the General Services Administration, in consultation with the Secretary of Commerce, regarding the modernization of federal IT. In response, the Report to the President on Federal IT Modernization was issued in December 2017 and outlined the current and envisioned state of federal IT. The report focused on modernization efforts to improve the security posture of federal IT. Further, it recognized that agencies have attempted to modernize systems but have been stymied by a variety of factors, including resource prioritization, ability to procure services quickly, and technical issues. The report provided multiple recommendations intended to address these issues through the modernization and consolidation of networks and the use of shared services to enable future network architectures. Further, in March 2018, the Administration issued the President’s Management Agenda, which laid out a long-term vision for modernizing the federal government. The agenda identified three related drivers of transformation—IT modernization; data, accountability, and transparency; and the workforce of the future—that are intended to push change across the federal government. The Administration also established 14 related Cross-Agency Priority goals, many of which have elements that involve IT. In particular, the Cross-Agency Priority goal on IT modernization stated that modern IT must function as the backbone of how government serves the public in the digital age. This goal established three priorities that are to guide the Administration’s efforts to modernize federal IT: (1) enhancing mission effectiveness by improving the quality and efficiency of critical services, including the increased utilization of cloud-based solutions; (2) reducing cybersecurity risks to the federal mission by leveraging current commercial capabilities and implementing cutting edge cybersecurity capabilities; and (3) building a modern IT workforce by recruiting, reskilling, and retaining professionals able to help drive modernization with up-to-date technology. On May 15, 2018, the President signed Executive Order 13833: Enhancing the Effectiveness of Agency Chief Information Officers. Among other things, this executive order was intended to better position agencies to modernize their IT systems, execute IT programs more efficiently, and reduce cybersecurity risks. The order pertains to 22 of the 24 Chief Financial Officers (CFO) Act agencies; the Department of Defense and the Nuclear Regulatory Commission are exempt. For the covered agencies, the executive order strengthened the role of agency CIOs by, among other things, requiring them to report directly to their agency head; serve as their agency head’s primary IT strategic advisor; and have a significant role in all management, governance, and oversight processes related to IT. In addition, one of the cybersecurity requirements directed agencies to ensure that the CIO works closely with an integrated team of senior executives, including those with expertise in IT, security, and privacy, to implement appropriate risk management measures. In the March 2019 update to our high-risk series, we reported that agencies still needed to complete significant work related to the management of IT acquisitions and operations. As government-wide spending on IT increases every year, the need for appropriate stewardship of that investment increases as well. However, we pointed out that OMB and federal agencies have not made significant progress since 2017 in taking the steps needed to improve how these financial resources are budgeted and realized. To address this issue, we highlighted the need for OMB and federal agencies to further implement the requirements of federal IT acquisition reforms, including the enhancement of CIO authority. Our update to the IT acquisitions and operations high-risk area also stressed that OMB and agencies needed to continue to implement our prior recommendations in order to improve their ability to effectively and efficiently invest in IT. Specifically, since fiscal year 2010, we have made 1,320 recommendations and one matter for Congressional consideration to address shortcomings in IT acquisitions and operations. As stated in our 2019 high-risk update, OMB and agencies should demonstrate government-wide progress by, among other things, implementing at least 80 percent of our recommendations related to managing IT acquisitions and operations. As of November 2019, OMB and agencies had fully implemented 807 (or 61 percent) of their 1,320 recommendations. In addition, the matter for Congressional consideration had also been implemented. Figure 1 summarizes the progress that OMB and agencies have made in addressing our recommendations compared to the 80 percent target. Overall, federal agencies would be better positioned to realize billions in cost savings and additional management improvements if they address these recommendations, including those aimed at implementing CIO responsibilities, reviewing IT acquisitions, improving data center consolidation, and managing software licenses. In all, various laws, such as FITARA and related guidance, assign 35 IT management responsibilities to CIOs in six key areas. These areas are: leadership and accountability, budgeting, information security, investment management, workforce, and strategic planning. In August 2018, we reported that none of the 24 agencies we reviewed had policies that fully addressed the role of their CIO, as called for by federal laws and guidance. In this regard, a majority of the agencies had fully or substantially addressed the role of their CIOs for the area of leadership and accountability. In addition, a majority of the agencies had substantially or partially addressed the role of their CIOs for two areas: information security and IT budgeting. However, most agencies had partially or minimally addressed the role of their CIOs for two areas: investment management and strategic planning. Further, the majority of the agencies minimally addressed or did not address the role of their CIOs for the remaining area: IT workforce. Figure 2 depicts the extent to which the 24 agencies had policies that addressed the role of their CIOs for the six areas. Notwithstanding the shortfalls in agencies’ policies addressing the roles of their CIOs, most agency officials stated that their CIOs are implementing the responsibilities even if the agencies do not have policies requiring implementation. Nevertheless, in their responses to our survey, the CIOs of the 24 selected agencies acknowledged that they were not always very effective in implementing the six IT management areas. Specifically, at least 10 of the CIOs indicated that they were less than very effective for each of the six areas of responsibility. We believe that until agencies fully address the role of CIOs in their policies, they will be limited in addressing longstanding IT management challenges. Figure 3 depicts the extent to which the CIOs reported their effectiveness in implementing the six areas of responsibility. Beyond the actions of the agencies, however, shortcomings in agencies’ policies were also partially attributable to two weaknesses in OMB’s guidance. First, the guidance did not comprehensively address all CIO responsibilities, such as those related to assessing the extent to which personnel meet IT management knowledge and skill requirements and ensuring that personnel are held accountable for complying with the information security program. Correspondingly, the majority of the agencies’ policies did not fully address nearly all of the responsibilities that were not included in OMB’s guidance. Second, OMB’s guidance did not ensure that CIOs had a significant role in (1) IT planning, programming, and budgeting decisions; and (2) execution decisions and the management, governance, and oversight processes related to IT, as required by federal law and guidance. In the absence of comprehensive guidance, CIOs would not be positioned to effectively acquire, maintain, and secure their IT systems. In response to the survey conducted for our August 2018 report, the 24 agency CIOs also identified a number of factors that enabled and challenged their ability to effectively manage IT. Specifically, most agency CIOs cited five factors as being enablers to effectively carrying out their responsibilities: (1) NIST guidance, (2) the CIO’s position within the agency hierarchy, (3) OMB guidance, (4) coordination with the Chief Acquisition Officer (CAO), and (5) legal authority. Further, the CIOs cited three factors as major challenges to their ability to effectively carry out responsibilities: (1) processes for hiring, recruiting, and retaining IT personnel; (2) financial resources; and (3) the availability of personnel/staff resources. As shown in figure 4, the five enabling factors were identified by at least half of the 24 CIOs and the three factors cited as major challenges were identified by at least half of the CIOs. Although OMB issued guidance aimed at addressing the three factors identified by a majority of the CIOs as major challenges, the guidance did not fully do so. Further, regarding the financial resources challenge, OMB recently required agencies to provide data on CIO authority over IT spending; however, its guidance did not provide a complete definition of that authority. In the absence of such guidance, agencies created varying definitions of CIO authority. Until OMB updates its guidance to include a complete definition of the authority that CIOs are to have over IT spending, it will be difficult for OMB to identify any deficiencies in this area and to help agencies make any needed improvements. In order to address challenges in implementing CIO responsibilities, we made three recommendations to OMB and one recommendation to each of the selected 24 federal agencies for each of the six IT management areas. Most agencies agreed with or had no comments on the recommendations. However, as of November 2019, none of the 27 recommendations had been implemented. We will continue to monitor the implementation of these recommendations. FITARA includes a provision to enhance covered agency CIOs’ authority through, among other things, requiring agency heads to ensure that CIOs review and approve IT contracts. OMB’s FITARA implementation guidance expanded upon this aspect of the legislation in a number of ways. Specifically, according to the guidance: CIOs may review and approve IT acquisition strategies and plans, rather than individual IT contracts; CIOs can designate other agency officials to act as their representatives, but the CIOs must retain accountability; CAOs are responsible for ensuring that all IT contract actions are consistent with CIO-approved acquisition strategies and plans; and CAOs are to indicate to the CIOs when acquisition strategies and acquisition plans include IT. In January 2018, we reported that most of the CIOs at 22 selected agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. For instance, most of the 22 agencies did not identify all of their IT contracts. In this regard, the agencies identified 78,249 IT- related contracts, to which they obligated $14.7 billion in fiscal year 2016. However, we identified 31,493 additional IT contracts with combined obligations totaling $4.5 billion, raising the total amount obligated to IT contracts by these agencies in fiscal year 2016 to at least $19.2 billion. Figure 5 reflects the obligations that the 22 selected agencies reported to us relative to the obligations we identified. The percentage of additional IT contract obligations we identified varied among the selected agencies. For example, the Department of State did not identify 1 percent of its IT contract obligations. Conversely, eight agencies did not identify over 40 percent of their IT contract obligations. Many of the selected agencies that did not identify these IT contract obligations also did not follow OMB guidance. Specifically, 14 of the 22 agencies did not involve the acquisition office in their process to identify IT acquisitions for CIO review, as required by OMB. In addition, seven agencies did not establish guidance to aid officials in recognizing IT. We concluded that, until these agencies involve the acquisition office in their IT acquisition identification processes and establish supporting guidance, they cannot ensure that they will identify all such acquisitions. Without proper identification of IT acquisitions, these agencies and their CIOs cannot effectively provide oversight of the acquisitions. In addition to not identifying all IT contracts, 14 of the 22 selected agencies did not fully satisfy OMB’s requirement that the CIO review and approve IT acquisition plans or strategies. Further, only 11 of 96 randomly selected IT contracts at 10 of the 22 agencies were CIO-reviewed and approved as required by OMB’s guidance. The 85 contracts that were not reviewed had a total possible value of approximately $23.8 billion. Until agencies ensure that CIOs are able to review and approve all IT acquisitions, CIOs will continue to have limited visibility and input into their agencies’ planned IT expenditures and will not be able to effectively use the increased authority that FITARA’s contract approval provision is intended to provide. Further, agencies will likely miss an opportunity to strengthen their CIOs’ authority and the oversight of acquisitions. As a result, agencies may award IT contracts that are duplicative, wasteful, or poorly conceived. As a result of these findings, we made 39 recommendations in our January 2018 report. Among these, we recommended that agencies ensure that their acquisition offices are involved in identifying IT acquisitions and issuing related guidance, and that IT acquisitions are reviewed in accordance with OMB guidance. OMB and the majority of the agencies generally agreed with or did not comment on the recommendations. As of November 2019, 23 of the 39 recommendations had been implemented. We will continue to monitor the implementation of the remaining recommendations. Data center consolidation efforts are key to implementing FITARA. Specifically, OMB established the FDCCI in February 2010 to improve the efficiency, performance, and environmental footprint of federal data center activities. The enactment of FITARA in 2014 codified and expanded the initiative. In addition, OMB’s August 2016 memorandum that established the Data Center Optimization Initiative (DCOI) included guidance on how to implement the data center consolidation and optimization provisions of FITARA. Among other things, the guidance required agencies to consolidate inefficient infrastructure, optimize existing facilities, improve their security posture, and achieve cost savings. According to the 24 agencies covered by the initiative, data center consolidation and optimization efforts had resulted in approximately $4.7 billion in cost savings through August 2018. Even so, additional work remains to fully carry out the initiative. Specifically, in a series of reports that we issued from July 2011 through April 2019, we noted that, while data center consolidation could potentially save the federal government billions of dollars, weaknesses existed in several areas, including agencies’ data center consolidation plans, data center optimization, and OMB’s tracking and reporting on related cost savings. In April 2019, we reported that agencies continued to report mixed progress toward achieving OMB’s goals for closing data centers and realizing the associated savings by September 2018. Specifically, as of August 2018, over half of the agencies reported that they had met, or planned to meet, all of their OMB-assigned closure goals for tiered data centers by the deadline. Six agencies reported that they did not plan to meet their goals for tiered data centers. In addition, as of August 2018, 11 agencies reported that they had already met the goal for closing 60 percent of their non-tiered centers, three agencies reported that they planned to meet the goal by the end of fiscal year 2018, and nine agencies reported that they did not plan to meet the goal by the end of fiscal year 2018. In all, the 24 agencies reported a total of 6,250 data center closures as of August 2018, which represented about half of the total reported number of federal data centers. In addition, the agencies reported 1,009 planned closures by the end of fiscal year 2018, with an additional 191 closures planned through fiscal year 2023, for a total of 1,200 further closures. Further, in August 2018, 22 agencies reported that they had achieved $1.94 billion in cost savings for fiscal years 2016 through 2018, while two agencies reported that they had not achieved any savings. In addition to that amount, 21 agencies identified an additional $0.42 billion in planned savings through fiscal year 2018—for a total of $2.36 billion in planned cost savings from fiscal years 2016 through 2018. Nevertheless, this total is about $0.37 billion less than OMB’s goal of $2.7 billion for overall DCOI savings. From July 2011 through April 2019, we made a total of 196 recommendations to OMB and 24 agencies to improve the execution and oversight of the initiative. Most agencies and OMB agreed with our recommendations or had no comments. As of November 2019, 121 of these 196 recommendations had been implemented. We also have ongoing work to review and verify the quality and completeness of federal data center inventories and strategies for consolidation submitted by the agencies covered by the law. We expect to issue the report related to this work in early 2020. In our 2015 high-risk report’s discussion of IT acquisitions and operations, we identified the management of software licenses as a focus area, in part because of the potential for cost savings. Federal agencies engage in thousands of software licensing agreements annually. The objective of software license management is to manage, control, and protect an organization’s software assets. Effective management of these licenses can help avoid purchasing too many licenses, which can result in unused software, as well as too few licenses, which can result in noncompliance with license terms and cause the imposition of additional fees. As part of its PortfolioStat initiative, OMB has developed a policy that addresses software licenses. This policy requires agencies to conduct an annual, agency-wide IT portfolio review to, among other things, reduce commodity IT spending. Such areas of spending could include software licenses. In May 2014, we reported on federal agencies’ management of software licenses and determined that better management was needed to achieve significant savings government-wide. Of the 24 selected agencies we reviewed, only two had comprehensive policies that included the establishment of clear roles and central oversight authority for managing enterprise software license agreements, among other things. Of the remaining 22 agencies, 18 had policies that were not comprehensive, and four had not developed any policies. Further, we found that only two of the 24 selected agencies had established comprehensive software license inventories, a leading practice that would help them to adequately manage their software licenses. The inadequate implementation of this and other leading practices in software license management was partially due to weaknesses in agencies’ policies. As a result, we concluded that agencies’ oversight of software license spending was limited or lacking, thus, potentially leading to missed savings. However, the potential savings could be significant considering that, in fiscal year 2012, one major federal agency reported saving approximately $181 million by consolidating its enterprise license agreements, even when its oversight process was ad hoc. Accordingly, we recommended that OMB issue a directive to help guide agencies in managing software licenses. We also made 135 recommendations to the 24 agencies to improve their policies and practices for managing licenses. Among other things, we recommended that the agencies (1) regularly track and maintain a comprehensive inventory of software licenses and (2) analyze the inventory to identify opportunities to reduce costs and better inform investment decision making. Most agencies generally agreed with the recommendations or had no comments. As of November 2019, all but 19 of the 135 recommendations had been implemented. In particular, for our recommendations on maintaining and analyzing a comprehensive inventory of software licenses, agencies had fully implemented 42 out of 48 recommendations. Table 2 reflects the extent to which the 24 agencies implemented the recommendations in these two areas. Safeguarding federal computer systems has been a longstanding concern. This year marks the 22nd anniversary of GAO’s first designation of information security as a government-wide high-risk area in 1997. We expanded this high-risk area to include safeguarding the systems supporting our nation’s critical infrastructure in 2003, protecting the privacy of personally identifiable information in 2015, and establishing a comprehensive cybersecurity strategy and performing effective oversight in 2018. Most recently, we identified federal information security as a government-wide high-risk area in our March 2019 high-risk update. As we have previously noted, in order to strengthen the federal government’s cybersecurity posture, agencies should fully implement the information security programs required by FISMA. In this regard, FISMA provides a framework for ensuring the effectiveness of information security controls for federal information resources. The law requires each agency to develop, document, and implement an agency-wide information security program. Such a program should include risk assessments; the development and implementation of policies and procedures to cost- effectively reduce risks; plans for providing adequate information security for networks, facilities, and systems; security awareness and specialized training; the testing and evaluation of the effectiveness of controls; the planning, implementation, evaluation, and documentation of remedial actions to address information security deficiencies; procedures for detecting, reporting, and responding to security incidents; and plans and procedures to ensure continuity of operations. Since fiscal year 2010, we have made 3,323 recommendations to agencies aimed at addressing the four cybersecurity challenges. These recommendations have identified actions for agencies to take to strengthen technical security controls over their computer networks and systems. They also have included recommendations for agencies to fully implement aspects of their information security programs, as mandated by FISMA. Nevertheless, many agencies continue to be challenged in safeguarding their information systems and information, in part, because many of these recommendations have not been implemented. Of the 3,323 recommendations made since 2010, 2,511 (or 76 percent) had been implemented as of November 2019, leaving 812 recommendations (or 24 percent) not implemented. In order to determine the effectiveness of the agencies’ information security programs and practices, FISMA requires federal agencies’ inspectors general to conduct annual independent evaluations. The agencies are to report the results of these evaluations to OMB, and OMB is to summarize the results in annual reports to Congress. In these evaluations, the inspectors general are to frame the scope of their analyses, identify key findings, and detail recommendations to address the findings. The evaluations also are to capture maturity model ratings for their respective agencies. Toward this end, in fiscal year 2017, the inspector general community, in partnership with OMB and DHS, finalized a 3-year effort to create a maturity model for FISMA metrics. The maturity model aligns with the five function areas in the NIST Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework): identify, protect, detect, respond, and recover. This alignment is intended to help promote consistent and comparable metrics and criteria and provide agencies with a meaningful independent assessment of their information security programs. The maturity model is designed to summarize the status of agencies’ information security programs on a five-level capability maturity scale. The five maturity levels are defined as follows: Level 1 (Ad hoc): Policies, procedures, and strategy are not formalized; activities are performed in an ad-hoc, reactive manner. Level 2 (Defined): Policies, procedures, and strategy are formalized and documented but not consistently implemented. Level 3 (Consistently Implemented): Policies, procedures, and strategy are consistently implemented, but quantitative and qualitative effectiveness measures are lacking. Level 4 (Managed and Measurable): Quantitative and qualitative measures on the effectiveness of policies, procedures, and strategy are collected across the organizations and used to assess them and make necessary changes. Level 5 (Optimized): Policies, procedures, and strategy are fully institutionalized, repeatable, self-generating, consistently implemented and regularly updated based on a changing threat and technology landscape and business/mission needs. According to this maturity model, Level 4 (managed and measurable) represents an effective level of security. Therefore, if an inspector general rates an agency’s information security program at Level 4 or Level 5, then that agency is considered to have an effective information security program. For fiscal year 2018, most of the 23 civilian CFO Act agencies’ inspectors general reported that their agencies were at Level 2 (defined) for the detect function; Level 3 (consistently implemented) for the identify, protect, and recover functions; and at Level 4 (managed and measurable) for the respond function. Table 3 shows the individual maturity ratings for each covered agency. In its efforts toward strengthening the federal government’s cybersecurity, OMB also requires agencies to submit related cybersecurity metrics as part of its Cross-Agency Priority goals. In particular, OMB developed a goal so that federal agencies will be able to build and maintain more modern, secure, and resilient IT. A key part of this goal is to reduce cybersecurity risks to the federal mission through three strategies: manage asset security, protect networks and data, and limit personnel access. The key targets supporting each of these strategies correspond to areas within the FISMA metrics. Table 4 outlines the strategies, their associated targets, and the 23 civilian CFO Act agencies’ progress in meeting those targets, as of June 2019. In conclusion, by addressing the high-risk areas on improving the management of IT acquisitions and operations and ensuring the cybersecurity of the nation, the government has the opportunity to both save billions of dollars and advance the efficiency and effectiveness of government services. Most agencies have taken steps to execute key IT management and cybersecurity requirements and initiatives, including implementing CIO responsibilities, requiring CIO reviews of IT acquisitions, realizing data center consolidation cost savings, managing software assets, and complying with FISMA requirements. The agencies have also continued to address the recommendations that we have made over the past several years. Nevertheless, further efforts by OMB and federal agencies to implement our previous recommendations would better position them to improve the management and security of federal IT. To help ensure that these efforts succeed, we will continue to monitor agencies’ efforts toward implementing the recommendations. Chairman Connolly, Ranking Member Meadows, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staff have any questions about this testimony, please contact Carol C. Harris, Director of Information Technology Acquisition Management Issues, at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kevin Walsh (Assistant Director), Jessica Waselkow (Assistant Director), Chris Businsky, and Rebecca Eyler. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal government plans to spend over $90 billion in fiscal year 2019 on IT. Even so, IT investments have too often failed or contributed little to mission-related outcomes. Further, increasingly sophisticated threats and frequent cyber incidents underscore the need for effective information security. To focus attention on these concerns, GAO has included both the management of IT acquisitions and operations and cybersecurity on its high-risk list. For this statement, GAO summarized its key related reports and assessed agencies' progress in implementing the reports' recommendations. Specifically, GAO reviewed the implementation of recommendations on (1) CIO responsibilities, (2) IT acquisition review requirements, (3) data center consolidation, (4) the management of software licenses, and (5) cybersecurity. Federal agencies and the Office of Management and Budget (OMB) have taken steps to improve the management of information technology (IT) acquisitions and operations and ensure the nation's cybersecurity through a series of initiatives. As of November 2019, federal agencies had fully implemented 61 percent of the 1,320 IT management-related recommendations that GAO has made to them since fiscal year 2010. Likewise, agencies had implemented 76 percent of the 3,323 security-related recommendations that GAO has made since fiscal year 2010. Significant actions remain to be completed to build on this progress. Chief Information Officer (CIO) responsibilities . Laws such as the Federal Information Technology Acquisition Reform Act (FITARA) and related guidance assign 35 key responsibilities to agency CIOs to help address longstanding IT management challenges. In August 2018, GAO reported that none of the 24 selected agencies had established policies that fully addressed the role of their CIO. GAO recommended that OMB and the 24 agencies take actions to improve the effectiveness of CIOs' implementation of their responsibilities. Although most agencies agreed or did not comment, none of the 27 recommendations have yet been implemented. CIO IT acquisition review . According to FITARA, covered agencies' CIOs are required to review and approve IT contracts. Nevertheless, in January 2018, GAO reported that most of the CIOs at 22 covered agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. Consequently, GAO made 39 recommendations to improve CIO oversight for these acquisitions. Since then, 23 of the recommendations have been implemented. Consolidating data centers . OMB launched an initiative in 2010 to reduce data centers. In August 2018, 22 agencies reported that they had achieved $1.94 billion in cost savings for fiscal years 2016 through 2018, while two agencies reported that they had not achieved any savings. GAO has made 196 recommendations to OMB and agencies to improve the reporting of related cost savings and to achieve optimization targets. As of November 2019, 121 of the recommendations have been implemented. Managing software licenses . Effective management of software licenses can help avoid purchasing too many licenses that result in unused software. In May 2014, GAO reported that better management of licenses was needed to achieve savings, and made 135 recommendations to improve such management. As of November 2019, all but 19 of the recommendations had been implemented. Ensuring the nation's cybersecurity . While the government has acted to protect federal information systems, GAO has consistently identified shortcomings in the federal government's approach to cybersecurity. The 3,323 recommendations that GAO made to agencies since 2010 have been aimed at addressing cybersecurity challenges. These recommendations have identified actions for agencies to take to fully implement aspects of their information security programs and strengthen technical security controls over their computer networks and systems. As of November 2019, 76 percent of the recommendations had been implemented. Since fiscal year 2010, GAO has made about 1,300 recommendations to OMB and agencies to address shortcomings in IT acquisitions and operations, as well as approximately 3,300 recommendations to agencies to improve the security of federal systems. These recommendations addressed, among other things, implementation of CIO responsibilities, oversight of the data center consolidation initiative, management of software licenses, and the efficacy of security programs. Implementation of these recommendations is essential to strengthening federal agencies' acquisitions, operations, and cybersecurity efforts.", "document_type": "gao"}
{"report": "In September 2018, we found the Coast Guard did not have a sound business case when it established the acquisition baselines for its polar icebreaker program in March 2018 due to risks in four main areas— design, technology, cost, and schedule. Our prior work has found that successful acquisition programs start with solid, executable business cases before setting program baselines and committing resources. A sound business case requires balance between the concept selected to satisfy operator requirements and the resources—design knowledge, technologies, funding, and time—needed to transform the concept into a product, which in this case is a ship with polar icebreaking capabilities. Without a sound business case, acquisition programs are at risk of breaching the cost, schedule, and performance baselines set when the program was initiated—in other words, experiencing cost growth, schedule delays, and reduced capabilities. At the heart of a business case is a knowledge-based approach. We have found that successful shipbuilding programs build on attaining critical levels of knowledge at key points in the shipbuilding process before significant investments are made (see figure 1). We provide additional information below on each of the four main risks that affect the soundness of the polar icebreaker program’s business case. The Coast Guard expressed a commitment to having a stable design for the polar icebreaker program prior to the start of lead ship construction, but it set the program’s baselines before conducting a preliminary design review—a systems engineering event that is intended to verify that the contractor’s design meets the requirement of the ship specifications and is producible. Shipbuilding best practices we identified in 2009 found that design stability on a ship is achieved upon completion of the basic and functional designs. The basic design includes fixing the ship steel structure; routing all major distributive systems, including electricity, water, and other utilities; and ensuring the ship will meet the performance specifications. The functional design includes further iteration of the basic design, such as providing information on the exact position of piping and other outfitting in each block, and completing a 3D product model. At this point of design stability, the shipbuilder has a clear understanding of the ship structure as well as how every system is set up and routed throughout the ship. Consistent with our best practices, prior to the start of construction on the lead ship, the Coast Guard plans to require the shipbuilder to complete basic and functional designs, develop a 3D model output, and provide at least 6 months of production information to support the start of construction. Although the Coast Guard plans to have a stable design prior to ship construction, it set the program’s acquisition program baselines prior to gaining knowledge on the feasibility of the selected shipbuilder’s design. Program baselines inform DHS’s and the Coast Guard’s decisions to commit resources. Our best practices for knowledge-based acquisitions state that before program baselines are set, programs should hold key systems engineering events, such as a preliminary design review, to help ensure that requirements are defined and feasible and that the proposed design can be met within cost, schedule, and other system constraints. The Coast Guard has yet to conduct a preliminary design review for the program because DHS’s current acquisition policy does not require programs to do so until after setting program baselines. However, in April 2017, we found that DHS’s sequencing of the preliminary design review is not consistent with our acquisition best practices, which state that programs should pursue a knowledge-based acquisition approach that ensures program needs are matched with available resources—such as technical and engineering knowledge, time, and funding—prior to setting baselines. As a result, we recommended that DHS update its acquisition policy to require key technical reviews, including the preliminary design review, to be conducted prior to approving programs’ baselines. DHS concurred with this recommendation and stated that it planned to initiate a study to assess how to better align its processes for technical reviews and acquisition decisions. Upon completion of the study, DHS plans to update its acquisition policies, as appropriate. As of June 2018, DHS indicated that it had completed its study and was in the process of updating its acquisition policies. GAO will review the policies once complete to determine if the updates meet the intent of this recommendation. By setting the polar icebreaker program’s baselines prior to gaining knowledge on the shipbuilder’s design, the Coast Guard has established cost, schedule, and performance baselines without a stable or mature design. Although completing the preliminary design review after setting program baselines is consistent with DHS policy, this puts the Coast Guard at risk of breaching its established baselines and having to revise them later in the acquisition process, after a contract has been signed and significant resources have been committed to the program. At that point, the program will be well underway and it will be too late for decision makers to make appropriate tradeoff decisions between requirements and resources without causing disruptions to the program. The Coast Guard intends to use what it refers to as “state-of-the-market” or “proven” technologies for the polar icebreaker program, but it has not yet conducted a technology readiness assessment to determine the maturity of key technologies prior to setting program baselines. This approach is inconsistent with our best practices for technology readiness. A technology readiness assessment is a systematic, evidence-based process that evaluates the maturity of critical technologies—hardware and software technologies critical to the fulfillment of the key objectives of an acquisition program. According to our best practices, a technology readiness assessment should be conducted prior to program initiation. At the time of our earlier review, Coast Guard officials told us the polar icebreaker program does not have any critical technologies and thus, does not need to conduct a technology readiness assessment. From design studies and industry engagement, Coast Guard officials determined that the key technologies required for the polar icebreakers, such as the integrated power plant and azimuthing propulsors, are available commercially and do not need to be developed. Figure 2 provides additional information on the risks for these key technologies, as well as design risks for an icebreaker’s hull form. Coast Guard officials stated that the integrated power plant is the standard power plant used on domestic and foreign icebreakers. Coast Guard officials told us that similarly, market survey data on azimuthing propulsors show that ice-qualified azimuthing propulsors in the power range required have been used on foreign icebreakers. However, according to our best practices, critical technologies are not just technologies that are new or novel. Technologies used on prior systems can also become critical if they are being used in a different form, fit, or function. Based on our analysis of available Coast Guard information, we believe the polar icebreaker program’s planned integrated power plant and azimuthing propulsors should be considered critical technologies given their criticality in meeting key performance parameters, how the technologies are being reapplied to a different operational environment from prior uses of the technologies, and the extent to which they pose major cost risks. By not conducting a technology readiness assessment and identifying, assessing, and maturing its critical technologies prior to setting the program’s program baselines, the Coast Guard is potentially underrepresenting technical risk and understating its cost, schedule, and performance risks. We found that the Navy’s lifecycle cost estimate used to inform the polar icebreaker program’s $9.827 billion cost baseline substantially adheres to most of our cost estimating best practices; however, the estimate is not fully reliable. The cost estimate is not fully reliable because it only partially met best practices for being credible. Highlights from our assessment of the polar icebreaker program’s lifecycle cost estimate are detailed below: Comprehensive: substantially met. The estimate includes government and contractor costs over the full lifecycle of all three ships and documents detailed ground rules and assumptions, such as the learning curve used to capture expected labor efficiencies for follow-on ships. However, the costs for disposal of the three ships were not at a level of detail to ensure that all costs were considered and not all assumptions, particularly regarding operating and support costs, were varied to reflect the impact on cost should these assumptions change. Well-documented: substantially met. The estimate’s documentation mostly captured the source data used as well as the primary methods, calculations, results, rationales, and assumptions used to generate each cost element. However, the documentation alone did not provide enough information for someone unfamiliar with the cost estimate to replicate what was done and arrive at the same results. Accurate: substantially met. The estimate was properly adjusted for inflation, and we did not find any mathematical errors in the estimate calculations we inspected. Officials stated that labor and material cost data from recent, analogous programs were used in the estimate. While the documentation does not discuss the reliability, age, or relevance of the cost data, Navy officials provided us with additional information regarding those data characteristics. Credible: partially met. The Navy only modeled cost variation in the detail design and construction portion of the program and excluded from its analyses any risk impacts related to the remainder of the acquisition, operating and support, and disposal phases, which altogether comprise about 75 percent of the lifecycle cost. Without performing a sensitivity analysis on the entire life cycle cost of the three ships, it is not possible for the Navy to identify key elements affecting the overall cost estimate. Further, without performing a risk and uncertainty analysis on the entire life cycle cost of the three ships, it is not possible for the Navy to determine a level of confidence associated with the overall cost estimate. By not quantifying important risks, the Navy may have underestimated the range of possible costs for about three-quarters of the entire program. The estimate provides an overly optimistic assessment of the program’s vulnerability to cost growth should risks be realized or current assumptions change. This, in turn, may underestimate the lifecycle cost of the program. The Coast Guard’s planned delivery dates of 2023, 2025, and 2026 for the three ships were not informed by a realistic assessment of shipbuilding activities, but rather were primarily driven by the potential gap in icebreaking capabilities once the Polar Star reaches the end of its service life (see figure 3). The Polar Star’s service life is estimated to end between fiscal years 2020 and 2023. This creates a potential heavy polar icebreaker capability gap of about 3 years, if the Polar Star’s service life were to end in 2020 and the lead polar icebreaker were to be delivered by the end of fiscal year 2023 as planned. If the lead ship is delivered later than planned in this scenario, the potential gap could be more than 3 years. The Coast Guard is planning to recapitalize the Polar Star’s key systems starting in 2020 to extend the service life of the ship until the planned delivery of the second polar icebreaker (see figure 4). Further, we compared the program’s planned construction schedule to the construction schedules of delivered lead ships for major Coast Guard and Navy shipbuilding programs active in the last 10 years as well as the Healy, the Coast Guard’s only medium polar icebreaker. We found that the polar icebreaker’s lead ship construction cycle time of 2.5 to 3 years is optimistic, as only 3 of the 10 ships in our analysis were constructed in 3 years or less. Further, as another point of comparison, the Healy was constructed in just under 4.5 years. An unrealistic schedule puts the Coast Guard at risk of not delivering the icebreakers when promised and the potential gap in icebreaking capabilities could widen. Just as importantly, our prior work on shipbuilding programs has shown that establishing optimistic program schedules based on insufficient knowledge can create pressure for programs to make sacrifices elsewhere, which can lead to work being performed concurrently, costly rework, and further delays. To address the risks we identified and establish a sound business case, we made a number of recommendations in our September 2018 report to DHS, Coast Guard, and the Navy, including: Conducting a technology readiness assessment in accordance with best practices, identifying critical technologies, and developing a plan to mature any technologies not designated to be mature before detail design of the lead ship begins; Updating the program’s cost estimate in accordance with best practices before the contract option for construction of the lead ship is awarded; Developing a program schedule in accordance with best practices to set realistic schedule goals for all three ships before the contract option for construction of the lead ship is awarded; and Updating the program’s acquisition program baselines prior to authorizing lead ship construction, after completion of the preliminary design review, and after it has gained the requisite knowledge on its technologies, cost, and schedule. DHS concurred with all of our recommendations and identified actions it planned to take to address them. For example, earlier this month, the Coast Guard indicated that it has identified a preliminary list of potential critical technologies and is in the process of developing a technology readiness assessment plan. The Coast Guard also plans to update the program’s cost estimate within 8 months of the contract award and update the program schedule within 3 months of the contract award. Of the $9.827 billion estimated for the lifecycle costs of the polar icebreaker program, about $3 billion is for acquisition costs. From 2013 through 2018, the polar icebreaker program has received $360 million in funding—$60 million in Coast Guard appropriations and $300 million in Navy appropriations. In addition, according to Coast Guard officials, in fiscal year 2017, Coast Guard reprogrammed $30 million in fiscal year 2016 appropriations for the polar icebreaker program from another program (see figure 5). According to Coast Guard and Navy officials, the Navy plans to use the $300 million in Navy appropriations in fiscal year 2019 to fund the advanced planning, design, engineering, and long lead time materials for the first polar icebreaker. As part of the polar icebreaker program’s acquisition strategy and reflected in the March 2018 request for proposals, the Navy plans to establish options for the subsequent detail design and construction of each of the three ships. The request for proposals specified that the options will be priced as fixed-price incentive type (see table 1). The Navy did not request any funding in fiscal year 2019 for the polar icebreaker program, while Coast Guard requested $30 million. Subsequently, after discretionary budget caps were relaxed by Congress, the administration’s fiscal year 2019 budget addendum requested an additional $720 million in fiscal year 2019 Coast Guard appropriations for the program. As the program prepares to award a contract in fiscal year 2019 worth billions of dollars if all the options are exercised, it is unclear to what extent the program will be funded using Coast Guard or Navy appropriations or how much total funding will be provided. In conclusion, as the Coast Guard embarks on the acquisition of its new polar icebreakers to address capability gaps in the Arctic and Antarctic regions, it faces a number of key acquisition and funding risks. DHS, the Coast Guard, and the Navy must gain key acquisition knowledge before committing significant resources to the program while Congress faces key funding and tradeoff considerations. To put the polar icebreaker program in a position to succeed, Congress and the agencies must remain committed to establishing and executing a sound business case for the program. Chairman Mast, Ranking Member Garamendi, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions. If you or your staff have any questions about this statement, please contact Marie A. Mak, (202) 512-4841 or makm@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony include Rick Cederholm, Assistant Director; Peter Anderson; Kurt Gurka; Claire Li; and Roxanna Sun. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "To maintain heavy polar icebreaking capability, the Coast Guard, in collaboration with the Navy, plans to acquire up to three new heavy polar icebreakers. The Navy plans to award a contract in 2019 for the polar icebreaker program. GAO has found that before committing resources, successful acquisition programs begin with sound business cases, which include plans for a stable design, mature technologies, a reliable cost estimate, and a realistic schedule. This statement addresses, among other things, the key acquisition risks facing the polar icebreaker program. This statement is primarily based on GAO's April 2018 and September 2018 reports examining the Coast Guard's polar icebreaker acquisition, and also draws from GAO's extensive body of published work examining the Coast Guard's and the Navy's shipbuilding efforts. In its prior work, GAO analyzed Coast Guard and Navy guidance, data, and documentation, and interviewed Coast Guard and Navy officials. The Coast Guard—a component of the Department of Homeland Security (DHS)—did not have a sound business case in March 2018, when it established the cost, schedule, and performance baselines for its heavy polar icebreaker acquisition program, because of risks in four key areas: Design. The Coast Guard set program baselines before conducting a preliminary design review, which puts the program at risk of having an unstable design, thereby increasing the program's cost and schedule risks. While setting baselines without a preliminary design review is consistent with DHS's current acquisition policy, it is inconsistent with acquisition best practices. Based on a prior GAO recommendation, DHS is currently evaluating its policy to better align technical reviews and acquisition decisions. Technology. The Coast Guard intends to use proven technologies for the program, but did not conduct a technology readiness assessment to determine the maturity of key technologies prior to setting baselines. Coast Guard officials indicated such an assessment was not necessary because the technologies the program plans to employ have been proven on other icebreaker ships. However, according to best practices, such technologies can still pose risks when applied to a different program or operational environment, as in this case. Without such an assessment, the program's technical risk is underrepresented. Cost. The lifecycle cost estimate that informed the program's $9.8 billion cost baseline was not fully reliable because it only partially met GAO's best practices for being credible. It did not quantify the range of possible costs over the entire life of the program. As a result, the cost estimate may underestimate the total funding needed for the program. However, the estimate substantially met GAO's best practices for being comprehensive, well-documented, and accurate. Schedule. The Coast Guard's planned delivery dates were not informed by a realistic assessment of shipbuilding activities, but rather driven by the potential gap in icebreaking capabilities once the Coast Guard's only operating heavy polar icebreaker—the Polar Star —reaches the end of its service life (see figure). GAO's analysis of selected lead ships for other shipbuilding programs found the icebreaker program's estimated construction time of 3 years is optimistic. As a result, the Coast Guard is at risk of not delivering the icebreakers when promised and the potential gap in icebreaking capabilities could widen. In September 2018, GAO recommended, among other things, that the polar icebreaker program update program baselines following a preliminary design review, conduct a technology readiness assessment, re-evaluate its cost estimate, and develop a schedule according to best practices. DHS concurred with all of GAO's recommendations and identified actions it plans to take to address them.", "document_type": "gao"}
{"report": "Since 9/11, the Coast Guard has made a series of organizational changes to realign its functions. First, from 2004 through 2006, under an effort known as “Sectorization,” the Coast Guard revised its field structure by consolidating field activities under individual commands, known as sectors. The Coast Guard’s 37 sectors report to nine districts, and each district reports to one of two area commands. District commanders are responsible for regional operations and execute operations and missions within their area of responsibility. Sector commanders are responsible for local operations within each district. Each of the Coast Guard area commands, districts, and sectors is responsible for managing its assets and accomplishing missions within its geographic area of responsibility and, for the purposes of this report, are referred to as field units. Figure 1 shows the Coast Guard’s field structure. In June 2006, the Coast Guard implemented another organizational change effort known as modernization. The goal of modernization was to realign its mission planning and mission support functions, among other things. According to Coast Guard documents, the effort was intended to address challenges the Coast Guard faced in aligning its operations with Coast Guard-wide priorities, and delivering mission support in a more cost effective manner. It was also intended to realign the Coast Guard’s operations and policies across multiple headquarters program offices. For example, the Coast Guard has six operational mission programs overseeing its statutory missions, and before modernization the leadership of each of them developed separate action plans and policies to execute their missions, while independently making resource decisions. Through modernization, the Coast Guard also sought to improve delivery of mission support services throughout the field, particularly with respect to maintenance of the Coast Guard’s assets, including its vessels, aircraft, and shore infrastructure. The Coast Guard uses three analytical tools to determine its workforce requirements: manpower requirements determinations, the Sector Staffing Model, and the Activity-Based Staffing Model for boat stations. Manpower requirements determinations, which begin with a manpower requirements analysis (MRA), are the Coast Guard’s preferred tool for determining the number of personnel and mix of skills its units require to meet mission needs, according to Coast Guard documents. The analysis identifies both the number of personnel required, and their necessary competencies, while also taking into account the effect of existing, new, or modified requirements on Coast Guard’s workforce. The Coast Guard considers the manpower requirements determination process to be its preferred method to determine workforce requirements for its assets and field units. The Coast Guard’s other two analytical tools—the Sector Staffing Model and Activity-Based Staffing Model—use historic levels of activity to determine workforce requirements. The Sector Staffing Model assesses workforce requirements for shore force units, while the Activity-Based Staffing Model assesses boat stations. For comparison, while activity models may identify the workforce needed based on the activities previously conducted by a unit, determinations identify the workforce needed to conduct the activities required by a unit to accomplish its planned mission, based on documented requirements. For this reason, the Coast Guard considers activity models to be less reliable for determining workforce needs than manpower requirements. Table 1 summarizes these three Coast Guard analytical tools for determining workforce requirements. In a 2018 report to Congress, the Coast Guard stated that under the modernization effort, it realigned its operations and mission support functions to address deficiencies that affected its ability to fulfill missions. Between 2009 and 2015, the effort focused on establishing headquarters organizations and business processes to manage operations and mission support. Central to the effort was the Coast Guard’s establishment of three new headquarters organizations. Deputy Commandant for Operations. Created to manage operational strategy and policy. The Deputy Commandant for Operations is responsible for the strategic management of the Coast Guard’s mission programs. This includes assessing and monitoring the performance of the Coast Guard’s missions and developing Coast Guard-wide strategy and operational policy. The Deputy Commandant for Operations also provides support for issues that affect multiple Coast Guard missions, such as managing intelligence activities, coordinating interaction with external stakeholders, and identifying new and emerging issues that threaten operations, such as cyberattacks. According to the Coast Guard’s 2018 report to Congress, consolidating these functions under a single organization has enhanced operational effectiveness and efficiency and aligned national priorities with Coast Guard-wide planning efforts. In 2019, the Coast Guard placed its reserve component under the Deputy Commandant for Operations to better incorporate the Coast Guard’s reserves into its plans for meeting mission needs. Deputy Commandant for Mission Support. Created to manage mission support delivery and business processes. The Deputy Commandant for Mission Support is responsible for managing mission support policy, strategy, planning, and resourcing to meet mission needs for human resources, engineering and logistics, information systems, and acquisitions. At the field level, through the Director of Operational Logistics, this organization assists with maintenance of assets and logistics planning through a network of bases. The Director of Operational Logistics manages Coast Guard bases which deliver operations level support to specific assets and oversees the functions of each Coast Guard base. In addition, the Deputy Commandant for Mission Support organization manages Coast Guard Logistic and Service Centers. Each logistic or service center exercises authority over its functions and the delivery of mission support to the Coast Guard’s fleet of aircraft and vessels. For example, the Aviation Logistics Center, located in Elizabeth City, North Carolina, is the lead entity for ensuring aviation asset services, such as maintenance and supply, for Coast Guard’s aircraft, while the Surface Forces Logistics Center, in Baltimore, Maryland, is responsible for ensuring these services for its vessels. Coast Guard officials told us that the modernized mission support structure enabled the Coast Guard to standardize delivery of products and service. For example, they told us that this structure helped them ensure that the materials and parts provided remained consistent across the Coast Guard’s field units. Force Readiness Command (FORCECOM). Created as an organization within the Deputy Commandant for Mission Support to prepare the Coast Guard workforce to properly perform and execute missions. FORCECOM is responsible for overseeing Coast Guard’s training plans and policies. This includes developing and delivering training courses, and conducting performance and compliance assessments of units, to determine whether each mission has the necessary equipment and personnel skills to ensure operational readiness. Figure 2 provides an overview of the Coast Guard’s modernized organizational structure and the responsibilities of the headquarters organizations known as the Deputy Commandant for Operations and Deputy Commandant for Mission Support. In 2018, the Coast Guard reported to Congress that while it completed its primary organizational changes, it continued to modernize its business processes. For example, it reported that it continued making improvements to its risk management process, organizational structure, and mission support functions, including human resources utilization and asset acquisition. In October 2019, Coast Guard officials told us that some of these adjustments continue in smaller, incremental efforts within the Deputy Commandant offices and individual Coast Guard programs. For example, Coast Guard officials from the Office of Mission Support Integration within the Deputy Commandant for Mission Support told us that efforts to modernize its mission support functions were ongoing. Officials told us that they were centralizing management of certain support delivery functions. Officials told us that centralization would help to ensure consistency in how functions are performed across the organization, as well as provide access to timely and complete information about the status of assets, personnel, and equipment. They told us that the Deputy Commandant for Mission Support had largely centralized such functions for one directorate—engineering and logistics—and expected to apply them for another directorate responsible for information systems in fiscal year 2020. According to officials, the Coast Guard has faced difficulty applying these same mission business practices to human resources since these practices focus on a specific capability and are geared more towards assets, such as vessels and aircraft, rather than personnel. Specifically, while information about the status of asset availability is generally static, there are more variables to determining the Coast Guard’s human resources needs. For example, in addition to identifying the size of the workforce necessary to perform missions, the Coast Guard must also consider how to retain personnel and develop a workforce that can adapt to changes such as addressing emerging threats like cyber-attacks. In 1995, the Coast Guard integrated the reserve and active duty workforce at the field level; however, the component did not have headquarters representation. In 2006, the Coast Guard issued a modernization goal to optimize the use of the reserve component by ensuring the workforce had the necessary training and support. In 2018, the Coast Guard chartered a project team to evaluate the state of the reserve component’s governance. The team found that the structure under the Deputy Commandant for Mission Support did not take into account the difference between the reserves workforce and Coast Guard programs. In 2019, the Coast Guard established a new reserve component organization under the Deputy Commandant for Operations. Changes stemming from modernization continued with the Coast Guard’s reorganization of its reserve component (see sidebar). In June 2019, the Coast Guard moved its reserve component from the Deputy Commandant for Mission Support to the Deputy Commandant for Operations. Coast Guard officials stated that the change was meant to address longstanding issues, such as not incorporating the reserve component into Coast Guard-wide policymaking. Coast Guard officials stated that when the reserve component was under the mission support organization, it was not strategically managed to align with Coast Guard- wide mission needs. For example, when reserve components were dispatched, there was no plan to support all of the operational needs of the mission, such as by providing additional equipment needed by the reserve workforce. Figure 3 provides a timeline of key actions the Coast Guard took from 2004 through 2019 to modernize its organizational structure. The Coast Guard has not consistently applied selected key reform practices to its modernization effort. Specifically, the Coast Guard did not apply or partially applied 5 of 7 selected key practices. We have previously reported that an agency must closely and carefully manage organizational reforms, since fully implementing major transformations can span several years. This is particularly important when the transformations include several major changes to the organization. The Coast Guard’s 2018 report to Congress on its modernization effort acknowledged that the risk of complications increases significantly with large-scale reorganization efforts, such as modernization, and noted that such changes require formal processes to look for complications as they arise and to fully assess their impact on the organization, including its workforce. To this end, we assessed the Coast Guard’s implementation of its modernization effort against selected key reform practices in three subcategories—Leadership focus and attention; Managing and monitoring; and Strategic workforce planning—and found the Coast Guard did not consistently apply these practices. Additionally, we assessed the extent to which the Coast Guard’s reorganization of its reserve component applied key reform practices under the Leadership focus and attention, Managing and monitoring and Strategic workforce planning subcategories. Figure 4 shows our assessment of the extent to which the Coast Guard’s actions to implement the modernization effort applied selected key reform practices. We found that the Coast Guard generally applied two key practices under this subcategory, including identifying a case for change and dedicating a team to lead the initial implementation effort, and it partially applied the key practice of holding leadership accountable for its success. Identify case for change. The Coast Guard generally applied this key practice because it identified a case for change to continue to drive the need for the modernization effort. Our prior work shows that key elements of successful initiatives are the demonstrated commitment of top leaders and accountability for change. Further, top leadership involvement and clear lines of accountability for making improvements are critical to overcoming organizations’ natural resistance to change. According to Coast Guard documents, in 2006, when the modernization effort started, Coast Guard leadership promoted the changes outlined in the Coast Guard’s 10 modernization initiatives through internal memos and action plans. Coast Guard documentation highlighted the benefits of the change and identified the next steps to be taken in order to complete the change. Additionally, commandants issued their strategic priorities highlighting plans for the modernization effort. More recently, the Coast Guard’s 2018 report to Congress reiterated the importance of the modernization effort, noting that the challenges that initially drove the need for organizational changes continue to challenge the Coast Guard. Dedicated implementation team. The Coast Guard generally applied this key practice because it established a team to implement its modernization changes. In 2007, Coast Guard created the Strategic Transformation Team to coordinate the early implementation of the modernization effort. According to Coast Guard officials from the Office of Resource, Organizational Analysis, and Workforce Management, as the effort moved from the planning stages to implementation, the team consolidated the goals in the Coast Guard’s 10 modernization initiatives into five main reorganization efforts. The team was responsible for ensuring that the implementation of these five efforts was consistent with the initial goals of modernization. This included facilitating the use of the Coast Guard’s existing organizational review and approval processes for organizational changes and leading the measurement processes for ensuring that the goals of modernization were met. Hold leaders accountable. The Coast Guard partially applied this key practice because it initially established an office to oversee its modernization but did not continue these efforts to ensure leadership accountability for modernization implementation. In 2009, the Coast Guard created a permanent oversight office under the Office of the Vice Commandant to transition the coordination responsibilities of the Strategic Transformation Team to monitor implementation of the modernization effort. The office was given an expanded role of managing change efforts across the Coast Guard, including overseeing the development of metrics related to organizational change efforts to ensure that these changes achieved goals. However, in 2015 the Coast Guard disestablished this oversight office and did not specify any office responsible for ensuring organizational change efforts met intended goals. According to Coast Guard officials from the Office of Resource, Organizational Analysis, and Workforce Management, the Coast Guard redistributed some of the oversight office’s responsibilities among other offices within the established headquarters organizations. The officials told us they did so since they determined the initial goals of modernization—to create the new headquarters organizations—had been met and oversight was no longer needed. These officials stated that the individual headquarters organizations could manage any necessary planning moving forward for their specific organization. As such, the Coast Guard’s shifting leadership priorities affected what parts of the modernization effort were implemented and, in some cases, resulted in years spent working towards a change that was later terminated. For example, in 2012, the Commandant stated that the original modernization initiative to establish a single operations command to manage field operations was not near completion, taking up institutional energy, and impacting operations. As a result, he decided to discontinue the effort and retain the two area field command structure. However, according to Coast Guard officials from the Office of Resource, Organizational Analysis, and Workforce Management, planning for the effort was close to completion, and ending it led to the reassignment of staff. During this time, the Coast Guard also reduced FORCECOM’s role from managing and measuring the overall readiness capabilities of the service to focusing on workforce training, and moved the organization under the Deputy Commandant for Mission Support. At that point, the Coast Guard had already prepared and issued a business plan for FORCECOM outlining the initial primary mission, goals and metrics for evaluating effectiveness. We also assessed the Coast Guard’s application of key reform practices against its reorganization of the reserve component and found, similar to our determinations of the modernization effort, it partially applied key practices under Leadership focus and attention. For example, while the Coast Guard identified key leadership and stakeholders currently responsible for implementing the effort, it could not demonstrate that there is a process to ensure leaders are held accountable for this implementation. The Coast Guard did not apply the two key practices of tracking implementation progress or collecting data to measure progress of the effort, and partially applied the other key practice of measuring employee satisfaction with the modernization effort. We have previously found that organizational transformations must be carefully and closely managed in order to monitor progress towards achieving intended goals, since fully implementing major transformations can span several years. This is particularly important for the modernization effort which the Coast Guard reported in 2018 had fundamentally altered how it conducts business across the organization, for every mission and at every level. Managing and monitoring organizational reforms includes applying key practices such as tracking and measuring progress and developing mechanisms to seek and monitor employee satisfaction with changes resulting from reforms. Track implementation progress. The Coast Guard did not apply this key practice because it did not track its progress in implementing the modernization effort on an ongoing basis. Officials told us that during the early stages of modernization, the Coast Guard developed implementation plans and engaged in a significant planning effort to finalize the organizational realignment. These plans provided a method to track the Coast Guard’s progress as they implemented each phase of modernization; however, as the effort matured, the Coast Guard determined that the effort did not require the same amount of planning as initial implementation. In 2009, during the early stages of modernization, the Coast Guard reported that it had efforts planned or underway to monitor the implementation progress of the modernization effort, including developing implementation plans, goals, and performance metrics. As the modernization effort matured and the Deputy Commandant for Mission Support and Deputy Commandant for Operations were created, Coast Guard officials determined that they did not need the same amount of planning, and the Coast Guard stopped updating its implementation plans. Additionally, for the reorganization of the reserve component, the Coast Guard has minimally applied practices under the Managing and monitoring category. In particular, the Coast Guard did not track implementation progress of the reorganization. For example, the Coast Guard established the new reserve component without finalized plans or milestones and metrics against which it could track implementation progress. Collect data to measure progress. The Coast Guard did not apply this key practice because it did not collect data to measure the extent to which the modernization effort achieved its goals. In 2009, the Coast Guard reported that it had plans underway to identify existing metrics and gather data that would enable evaluation of the performance and effectiveness of its modernized processes and facilitate continued improvements. This was to include indicators that could be applied across the modernization efforts’ multiple goals and priorities such as quality, timeliness, cost, and outcomes. At the time, the Coast Guard reported that this would take approximately 6 months to 1 year to complete. However, according to officials from the Office of Resource, Organizational Analysis, and Workforce Management, its plans were discontinued due to the disestablishment of the oversight office and changing leadership priorities. Further, they stated that the Coast Guard no longer felt the need to monitor the effort since it determined the initial goals had been achieved with the establishment of the new headquarters organizations. In 2018, the Coast Guard reported to Congress that changes to mission support systems and business processes were significant changes and demonstrated the success of the modernization effort by developing a more effective and efficient organization. However, while officials from multiple offices told us that these changes resulted in better data and greater efficiency, the Coast Guard could not identify metrics or a data collection system that could demonstrate that the Coast Guard’s implementation of the modernization effort had improved effectiveness or efficiency. Moreover, in our review of the Coast Guard’s organizational change process, we found no metrics, time frames, or milestones to track whether, and to what extent, its organizational changes were achieving the goals of the effort. Similarly, for the reorganization of the reserve component, the Coast Guard did not collect data to measure progress. For example, the Coast Guard established no milestones or metrics against which to measure the reserve components’ progress in achieving its intended goal of improved mission performance. Measure employee satisfaction. The Coast Guard partially applied this key practice because it sought employee feedback during the early stages of the modernization effort, but did not continue to measure employee satisfaction with the effort. During the initial implementation of modernization, the Coast Guard used a combination of informal and formal mechanisms to seek employee satisfaction. For example, according to a 2009 National Academy of Public Administration report, the Commandant reached out to personnel through informal means, such as social media, to communicate and obtain real time feedback from staff affected by the organizational changes. Formally, the Coast Guard obtained anecdotal information through surveys of staff through the Organizational Assessment Survey and the Office of Personnel Management’s Federal Employee Viewpoint Survey; however, these methods do not include specific questions related to the impact of organizational change efforts. Specifically for modernization, beyond efforts during the early stages of modernization, there has been no sustained Coast Guard-wide effort to monitor the impact of the change on employees. According to a senior Coast Guard official from the Office of Resource, Organizational Analysis, and Workforce Management, the Coast Guard is not required to conduct such assessments as changes are implemented. Specifically, the document governing the Coast Guard’s organizational change process does not specify measuring employee satisfaction as part of the organizational change request process. Additionally, though the Coast Guard currently has formal mechanisms in place that would enable it to seek employee satisfaction, our review of recent surveys found that these instruments do not include questions specific to the impact of organizational change efforts; nor do they capture employee perspective in a timely manner. We found that the Coast Guard partially applied the key practice of assessing effects of modernization on its workforce by engaging in some activities that assess its impact on its current and future workforce and planning to determine whether needed resources and capacity were in place. We have previously reported that people are at the heart of any serious reform effort because people define the organization’s culture, drive its performance, and embody its knowledge base. This is echoed in the Coast Guard’s large-scale enterprise-wide change management guidance, which stresses the need for a formal, structured approach to manage the people side of change to increase likelihood of success. One of the goals of the modernization effort was to create a Coast Guard- wide human resources strategy to better support mission execution. The Commandant reiterated this commitment in September 2018 testimony to Congress by stating that the Coast Guard’s strategic plan would incorporate its 2016 Human Capital Strategy, a 10-year plan to ensure that the Coast Guard develops the workforce necessary to meet mission demands. In addition, the Coast Guard has taken steps to build a Force Planning Construct model to inform leadership on the forces and capabilities needed to execute its steady state and contingency operations. In its April 2018 Manpower Requirements Plan to Congress, the Coast Guard stated that it envisioned using the model to assess future workforce needs. According to developers of the model, the foundation of the tool was the completion of manpower requirements determinations for all 158 Coast Guard unit types. However, the Coast Guard has completed such determinations for a small fraction of its workforce, as we discuss later in this report. Finally, for the reorganization of the reserve component, we found that the Coast Guard had minimally applied the key practice under Strategic workforce planning. In particular, officials from the new reserve component told us that even though the reserve force is not covered by existing workforce planning tools, the Coast Guard continued to proceed with reorganizing the reserve force structure. For each of the key reform practices that were not fully implemented, we found that the Coast Guard’s organizational change request process and associated guidance documents did not require such practices to be followed, nor did they require tracking implementation of changes, collecting data to measure progress, or assessing employee satisfaction. By not fully implementing each of these key practices, the Coast Guard may miss opportunities to demonstrate that its investment in the modernization effort meets its ultimate goals to enhance efficiency and effectiveness and to improve the overall performance of the Coast Guard. Systematically tracking progress of organizational change efforts and measuring their effects, including employee satisfaction, would better position the Coast Guard to identify challenges, if any, to meeting the goals of the organizational change in a timely manner. Further, the Coast Guard noted that metrics used to show the effect on its efficiency, mission effectiveness, and operations may be used to measure and influence future modernization efforts. The Coast Guard’s manpower requirements determination process is its preferred method for determining workforce needs because it identifies the workforce needed to conduct required mission activities; however, since it began implementing the process in 2003, the Coast Guard has completed it for only 6 percent of its workforce. Further, for those positions with which the Coast Guard has used the manpower requirements determination process, it has not consistently done so in accordance with Coast Guard guidance. For example, while required by Coast Guard guidance, the Coast Guard has not tracked the number of MRAs and manpower requirements determinations completed. In its April 2018 Manpower Requirements Plan to Congress, the Coast Guard set a goal for using the manpower requirements determination process to identify staffing needs for all positions in all units, but does not have information on the resources it would need to do so. The Coast Guard has completed workforce assessments for a small portion of its 58,000 personnel across its 158 unit types. From calendar years 2014 through 2019, the Coast Guard used its three analytical tools—manpower requirements determinations, the Sector Staffing Model, and the Activity-Based Staffing Model—to complete workforce assessments for approximately 21 percent of its 58,000 position workforce. According to Coast Guard guidance, manpower requirements determinations are to be updated every 5 years. However, the Coast Guard completed the manpower requirements determination process, its primary workforce analysis tool, for only about 2 percent of positions during this 5-year span. In 2019, the Coast Guard used the Sector Staffing Model to assess workforce requirements for about 9 percent of positions. Finally, in 2019 the Coast Guard used the Activity-Based Staffing Model for boat stations to assess workforce requirements for about 9 percent of positions, according to officials. According to its 2016 Human Capital Strategy, the manpower requirements determination process is the Coast Guard’s primary tool for defining the human capital its units require to meet mission needs. To this end, the Coast Guard’s goal is to use this process to establish manpower requirements for all positions in all units. Coast Guard guidance for implementing the manpower requirements determination process includes three key steps as noted in the service’s 2015 Staffing Logic and Manpower Requirements Manual. MRA. The manpower requirements determination process begins with programs or Coast Guard leadership, such as the Commandant or Vice Commandant, requesting an MRA, which is a comprehensive review of workforce needs as determined from a wide range of factors. These factors include regulations, training, and competencies needed to effectively perform each mission. The MRA assesses the information necessary to adjust personnel, resources, mission, or risk, depending on availability of resources. Officials from the manpower requirements determination program, contractors, or in some cases, other Coast Guard programs, may conduct MRAs. After Action Report. MRA requesters are to submit an after action report within 6 months after the MRA is completed. The after action report is to outline actions to be taken based on an MRA. These actions could include adding resources, adjusting requirements, or assuming additional risk. Manpower Requirements Determination. The process is to conclude with a manpower requirements determination. The determination identifies the number and type of positions a unit type requires to meet mission-based capability requirements. In developing the determination, stakeholders are to review MRA results and develop the determination, while documenting any changes from the initial MRA. These stakeholders typically include representatives from the program assessed in the MRA and experts from around the Coast Guard in areas such as personnel assignments, workforce forecasting, training availability and capacity, and resource oversight, among others. The manpower requirements determination program then submits the determination to be signed by the Assistant Commandant for Human Resources. This signed memorandum, known as the determination, formalizes the final manpower requirement. Figure 5 summarizes the Coast Guard’s manpower requirements determination process, according to Coast Guard guidance. We found that the Coast Guard has not ensured that all three key steps of the manpower requirements determination process are completed since it began implementing it in 2003. Since 2003, the Coast Guard conducted MRAs for 28 percent of its workforce. However, the Coast Guard completed manpower requirements determinations for only 6 percent of its workforce. Moreover, we found that this trend continued with MRAs that the Coast Guard completed within the past 5 years. For example, according to our analysis of Coast Guard documentation, from calendar years 2014 through 2019, the Coast Guard conducted MRAs for 13 percent of its workforce, but completed determinations for 2 percent. Further, Coast Guard officials reported they did not have documentation of having conducted after action reports for any MRAs. Figure 6 shows the share of the Coast Guard’s workforce that is supported by the manpower requirements determination process. The top row shows the share of workforce supported by this process since its inception in 2003. The bottom row shows the workforce supported by up to date MRAs and determinations—completed between 2014 and 2019— according to guidance. The Coast Guard’s 2018 Manpower Requirements Plan to Congress states that the Coast Guard’s goal is to have updated manpower requirements determinations for all authorized positions in all units. When it reaches that goal, the manpower requirements determination process will allow the Coast Guard to know which units are the most understaffed, and to make service-wide decisions based on where the most urgent needs are. Only when determinations have been completed for its entire workforce can Coast Guard leadership allocate personnel in the most effective and efficient manner. Notably, Coast Guard documents emphasize the importance of an enterprise-wide approach to track and manage resources because it enables leadership to compare needs and make informed trade-offs across programs. In 2019, officials in the manpower requirements determination program told us that MRAs were to be updated every 5 years. Officials stated that this is a best practice that aligns with the Department of Homeland Security’s workforce strategy. Pacific Area Command officials we spoke with also told us that they view the guidance as requiring that MRAs should not be older than 5 years. Additionally, the Coast Guard’s 2015 Staffing Logic and Manpower Requirements Manual states that the Manpower Requirements Determination Program Division Chief is responsible for ensuring that each unit type has undergone an MRA within the past 5 years. Nevertheless, in November 2019, Coast Guard officials in the manpower requirements determination program told us that they view it as a goal to update MRAs every 5 years, not a requirement. We found that the Coast Guard does not have current guidance explaining the process steps for Coast Guard officials to follow to systematically execute the manpower requirements determination process. Coast Guard officials told us they were using a combination of two documents to guide its manpower requirements determination process, and neither document was both current and comprehensive in terms of detailing the steps to follow. For example, the 2015 Staffing Logic and Manpower Requirements Manual contains individual process step requirements, but has been rescinded. In contrast, the 2018 Manpower Requirements Manual provides current policy, but does not include guidance on process steps that program officials are to follow. In its 2018 manual, the Coast Guard rescinded the 2015 manual without replacing or affirming its process steps. Officials stated that analysts in the manpower requirements determination program use the rescinded 2015 guidance in executing the process because they have no other guidance to follow. Officials in the manpower requirements determination program provided several reasons for why the program has not consistently ensured that all steps are completed. First, officials told us that completing a determination for each MRA had not always been a priority for the Coast Guard. Officials said that in some cases manpower requirements determinations were not completed due to disagreement among stakeholders about how to apply the results of the MRA. Officials said, for example, that while an MRA may find that a program is significantly understaffed, some stakeholders may argue against including the full scale of the shortfall in the determination due to limited resources and competing needs. Second, officials stated that some determinations were not completed because some programs requesting MRAs were not interested in obtaining the final determination upon receiving the MRA. Specifically, they explained that sometimes the program that requested to initiate the manpower requirements determination process is most interested in the staffing data contained in the MRA, rather than the final determination, which formalizes the trade-offs and results proposed in the MRA. Officials in the manpower requirements determination program told us that both the 2015 and 2018 manpower requirements determination guidance did not identify circumstances when a manpower requirements determination was not required to be completed for an MRA. Further, program officials told us that they were not aware that the process guidance they reported using required after-action reports. Coast Guard officials also stated that having the process guidance in a rescinded document had made their ability to implement and oversee the process a challenge due to the possibility of officials applying the guidance inconsistently. They further said they recognized the manpower requirements determination process was not clear and needed to be revised, and that doing so may help ensure officials consistently implement the process. In June 2019, officials said they planned to issue updated guidance, but had not established a timeframe for doing so. By issuing updated guidance for conducting manpower requirements determinations that outlines required process steps, and any circumstances in which the process steps do not need to be performed, the Coast Guard can better ensure that those responsible for implementing the process do so consistently. In addition to requiring MRAs to be conducted every 5 years, the rescinded 2015 Coast Guard guidance, which officials reported using to execute the manpower requirements determination process, states that the manpower requirements determination program is to maintain and update a master list of MRAs conducted to enable the program to track and organize its workload. However, the Coast Guard has not tracked the extent to which it has assessed Coast Guard unit types through the manpower requirements determination process, as required in the 2015 process guidance, which officials report is still in use. For example, in March 2019 Coast Guard officials stated that they did not maintain a list of MRAs or manpower requirements determinations completed since the program began in 2003, and they were not aware that maintaining a list was a requirement. Officials prepared a list to respond to our request, and in April 2019, provided us with a list of MRAs and determinations the Coast Guard had completed since 2003. However, we found that the list was not accurate. The Coast Guard’s list underrepresented the number of MRAs completed by almost half. Specifically, it showed the Coast Guard had completed MRAs for 34 unit types since 2003, whereas our review of Coast Guard documents found that the Coast Guard had completed MRAs for 63 unit types during this span. We also found that the Coast Guard had not accurately reported to Congress about its progress in assessing workforce requirements. While the list the Coast Guard compiled for us underrepresented the number of MRAs completed, the information it provided to Congress in its April 2018 report overrepresented the extent to which it has assessed its workforce needs. Specifically, in April 2018 the Coast Guard reported to Congress that it had recently analyzed workforce needs for 54 percent of its workforce using the manpower requirements determination process and its activity models. However, more than half of the MRAs it had completed had not been updated in the past 5 years, as Coast Guard guidance requires. We found that less than half of the Coast Guard’s reported figure—21 percent of its workforce—is supported by a workforce analysis that has been updated in the last 5 years. The Coast Guard’s manpower requirements plan does not have time frames or milestones outlining how it plans to reach its manpower requirements determination goal of completing MRAs and determinations for its entire workforce. Coast Guard officials stated that their April 2018 Manpower Requirements Plan to Congress lays out their goal with respect to conducting manpower requirements determinations. However, this plan does not include time frames or milestones for completing determinations for all unit types, nor does it signal that the Coast Guard will track MRAs and determinations it has completed. Coast Guard officials stated that they were using a multi-year program to prioritize manpower studies and complete them as resources allowed. When asked for further information about this plan, officials stated that there was no specific document outlining the plan; rather, the intent of the 2018 Manpower Requirements Plan was to indicate their manpower analysis goal involves a multi-year journey. By updating its manpower requirements plan to include time frames and milestones for completing MRAs and determinations for all positions in all units, the Coast Guard can track progress toward its goal and make necessary adjustments in its planning, as needed. The Coast Guard has reported on the importance of tracking and completing manpower requirements determinations to justify its resource allocation decisions. For example, its 2018 Manpower Requirements Manual states that methods to determine workforce requirements have historically varied from program to program. This variability prevented the Coast Guard from compiling reliable workforce data and comparing workforce needs across the Coast Guard. According to the 2018 manual, manpower requirements determinations enable key decision-makers to effectively manage workforce needs because they provide the data needed to objectively predict future manpower requirements and compare staffing needs across the entire workforce. By tracking and documenting the extent to which it has completed MRAs and determinations for its workforce, the Coast Guard will be better positioned to know which unit types have a defensible basis for the number and type of personnel needed to meet mission demands and to prioritize which MRAs to conduct. The Coast Guard has not determined the resources—both staff and funding—it needs to meet its goal for its manpower requirements determination program to complete determinations for all units. Program officials told us that they have used the manpower requirements determination process for a limited share of its workforce because of resource limitations. Coast Guard documents show that it has been almost 10 years since the Coast Guard last performed an MRA for the manpower requirements determination program to determine its own workforce needs. The 2010 analysis found that the program would require at least 30 full-time equivalent positions to accomplish the Coast Guard’s goal of completing about 25 MRAs each year, which would enable it to assess the Coast Guard’s 158 unit types roughly every 5 years. As of January 2020, the program had six analysts dedicated to conducting manpower analyses and, according to officials, may only be able to produce one MRA each year. Program officials estimated that the cost of conducting an MRA may vary widely, from $170,000 to more than $5 million for more complex unit types. Nevertheless, program officials told us they generally did not track information on the costs of conducting MRAs. According to officials, the manpower requirements determination program cannot track all such costs because cost data is spread across different program offices. For example, officials stated that for contracted MRAs, contracting fees are easier to identify, but the manpower requirements determination program does not have access to other major costs, such as travel by officials conducting the analysis. While the manpower requirements determination program oversees the MRA process, and is tasked with ensuring manpower requirements determinations are completed for every unit in the Coast Guard, officials said that generally the program that is the subject of the MRA provides funding for the study, and only that program maintains access to travel costs associated with the MRA. They said the manpower requirements determination program does not request cost information from the programs requesting MRAs. Additionally, the manpower requirements determination program does not collect cost information from programs that conduct their own MRAs. The Coast Guard has increasingly used contractors to complete MRAs. While the Coast Guard has not tracked the costs of conducting MRAs, Coast Guard analysis has shown that having MRAs completed by contractors is more costly than completing them in-house. Program officials said they have increasingly used contractors because of staffing limitations. For example, from calendar years 2010 through 2019, contractors completed nearly half of the Coast Guard’s 54 MRAs. Figure 7 shows the MRAs and manpower requirements determinations completed by the Coast Guard and contractors from 2003 through 2019. Coast Guard guidance states that in a resource constrained environment, leaders need to make risk-based decisions to prioritize tasks and optimally allocate resources to execute its missions. In addition, our work in the area of strategic human capital management has shown that reassessing resource requirements helps organizations to achieve their missions and match resources to their needs. Developing information on the resources needed for staffing and funding the manpower requirements determination program to achieve its manpower goal would better position the Coast Guard to make informed trade-off decisions and allocate its limited resources to those units most in need of manpower requirements determinations. The Coast Guard’s roles and responsibilities have grown over the past two decades following the terrorist attacks of 9/11. Among other things, increased national security roles, first response duties during natural disasters, and compliance duties for ensuring the safety of increased commercial maritime activity have underscored the importance of the Coast Guard’s multiple missions. Organizational changes it made through the modernization effort were intended to realign operations and support functions. To that end, the creation of headquarters organizations achieved modernization’s initial goals. However, the Coast Guard continues to change as a result of modernization, and it has placed less effort on ensuring achievement of the longer-term goals of creating a more efficient and effective organization. Establishing a process for tracking and measuring the effectiveness of the organizational changes brought on by modernization, including measuring employee satisfaction, would better position Coast Guard to understand whether its goals have been achieved. The Coast Guard reported to Congress in April 2018 that it faced challenges in meeting its daily mission demands because it was operating below the workforce necessary to meet its mission demands. However, the service does not have a complete picture of the workforce necessary to meet its mission demands or whether its existing mix of personnel is efficiently and effectively allocated across units. The Coast Guard considers its manpower requirements determination process instrumental in determining the workforce needed to perform its duties, and the foundation of models the Coast Guard uses to determine workforce size in times of contingency or heightened security. Updated guidance for its staff tasked with conducting such assessments would enable the Coast Guard to better ensure that the process is fully implemented. Further, as of January 2020, the Coast Guard had updated analyses for a small fraction of its workforce, and had not updated its Manpower Requirements Plan with time frames and milestones for achieving its goal of assessing its entire workforce. Additionally, it does not have information on the extent to which analyses have been completed over the years or the resources it needs to complete assessments for its entire workforce. By tracking and updating the completion of MRAs and determinations, updating its plan to complete manpower requirements determinations, and obtaining information on the resources needed to implement such a plan, the Coast Guard will better ensure that it has the right number of people with the right set of skills to meet its mission demands. In this way, the Coast Guard will be better positioned to inform Congress of its workforce and associated resource needs. We are making the following six recommendations to the Coast Guard: The Commandant of the Coast Guard should establish a systematic mechanism to track implementation and measure the Coast Guard’s progress in achieving organizational change goals. (Recommendation 1) The Commandant of the Coast Guard should establish a mechanism to periodically seek and monitor employee satisfaction with organizational change efforts. (Recommendation 2) The Commandant of the Coast Guard should update its Manpower Requirements Manual with guidance for how to execute its manpower requirements determination process, and take steps to ensure the process is implemented. (Recommendation 3) The Commandant of the Coast Guard should track and document the extent to which it has completed manpower requirements analyses and determinations for each unit type. (Recommendation 4) The Commandant of the Coast Guard should update its April 2018 Manpower Requirements Plan to include time frames and milestones for completing manpower requirements analyses and determinations for all positions and units. (Recommendation 5) The Commandant of the Coast Guard should determine the resources its manpower requirements determination program needs, both staff and funding, to achieve its goal of completing manpower requirements determinations for all positions and units. (Recommendation 6) We provided a draft of this report to DHS for review and comment. DHS provided comments, reproduced in appendix V. DHS concurred with our six recommendations and described actions planned to address them. DHS also provided technical comments, which we incorporated into the report, as appropriate. With regard to our first recommendation, DHS stated that the Coast Guard’s Office of Resources, Organizational Analysis, and Workforce Management will update the Coast Guard Organizational Manual to establish policy requiring that requests to change organizational structure include a plan, and establish a mechanism to track implementation and measure progress in achieving organizational change goals. The Coast Guard estimated completing the effort by December 31, 2020. With regard to our second recommendation, DHS stated that Coast Guard leadership agrees that mechanisms to periodically seek and monitor employee satisfaction with organizational change efforts are valuable. DHS stated that the Coast Guard already conducts periodic surveys and each of these instruments provide opportunities for the workforce to provide feedback, including on organizational issues, and that it seems preferable for survey owners to add questions to existing surveys, as opposed to implementing new survey instruments. DHS requested GAO consider the recommendation as implemented because such feedback mechanisms were already in place, and therefore establishing new mechanisms was unnecessary. As we note in our report, it is important that the Coast Guard identify challenges, if any, to meeting the goals of organizational change in a timely manner. We found the Coast Guard’s current surveys do not capture employee perspectives as organizational changes are implemented. In determining whether to close this recommendation, we will review Coast Guard documentation demonstrating that the Coast Guard has modified its existing surveys with added questions that monitor employee satisfaction with organizational changes, and that it has plans for implementing the surveys in a timely manner. With regard to our third recommendation, DHS stated that the Coast Guard’s Office of Human Resources Strategy and Capability is developing a Tactics, Techniques and Procedures document to provide guidance for executing the manpower requirements determination process. The document will provide additional guidance on the overall MRD process, including explicit directions for the collection and analysis of manpower data, and will establish Coast Guard enterprise standards for key factors and allowances used when conducting manpower analysis. The Coast Guard estimated completing the effort by September 30, 2020. With regard to our fourth recommendation, DHS stated that in December 2019 the Coast Guard’s Office of Human Resources Strategy and Capability initiated the process to document and track manpower requirements in the Coast Guard’s system of record. The Coast Guard estimated completing the effort by December 31, 2020. With regard to our fifth recommendation, DHS stated that the Coast Guard’s Assistant Commandant for Human Resources Directorate would update its Manpower Requirements Plan during the next periodic report submitted to Congress, due in fiscal year 2022. The Coast Guard estimated completing the effort by March 31, 2022. With regard to our sixth recommendation, DHS stated that the Coast Guard’s Office of Human Resources Strategy and Capability will review its September 2010 MRA, revalidate the inputs, and update the findings of the MRA to reflect the current needs of the manpower requirements determination program. The Coast Guard estimated completing the effort by September 30, 2020. We are sending copies of this report to the appropriate congressional requesters, the Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or AndersonN@gao.gov. GAO staff who made key contributions to this report are listed in appendix VI. This appendix provides additional information on our objectives, scope and methodology. This report examines (1) how the Coast Guard modernized its organization and the extent to which it has applied key reform practices to its organizational change efforts and (2) the extent to which the Coast Guard has assessed its workforce needs. To address our first objective we analyzed Coast Guard documents related to the modernization effort. The documents included policies and guidance regarding how the effort was to be implemented, as well as descriptions of the status of these efforts. To evaluate the extent to which the Coast Guard applied key reform practices and considerations for evaluating organizational change efforts we assessed Coast Guard policies and procedures related to Coast Guard operations against the key practices we outlined in our June 2018 report on government reorganization. We collected and analyzed documentation related to Coast Guard’s actions taken to implement organizational change efforts such as the modernization effort and the integration of the Coast Guard’s reserve component into the headquarters governance structure. We assessed these reports, data and documents against selected criteria for key practices and considerations for agency reorganization identified in our June 2018 report. We selected relevant key practices by examining each of the potential four categories and 12 subcategories identified in our June 2018 report to determine the extent to which the practices under each applied to the Coast Guard’s modernization and reserve component integration efforts. The four categories are Goals and outcomes,” “Process for developing reforms,” “Implementing the reforms,” and “Strategically managing the federal workforce.” We deemed two subcategories under the category of “Implementing the reform”, “Leadership focus and attention” and” Managing and monitoring” and one subcategory “Strategic workforce planning” under the “Strategic planning for the federal workforce” category as relevant criteria for assessing the Coast Guard’s modernization efforts. We deemed the remaining nine subcategories not relevant to the Coast Guard’s modernization efforts since modernization was implemented in 2006 and retrospective analysis of these criteria would not result in the agency being able to make changes. For the three subcategories included in our assessment, we determined seven key practices from these subcategories that were most relevant to the Coast Guard’s modernization efforts and applied those practices to our assessment. We reviewed Coast Guard documentation and then made qualitative determinations about the extent to which the Coast Guard’s implementation of its modernization efforts addressed these criteria. A second analyst independently reviewed and validated each determination. We evaluated the Coast Guard’s actions against key reform practices to determine if they were generally, partially, or not at all applied. Generally applied. Agency documentation demonstrated that Coast Guard officials substantially applied applicable key practices. Partially applied. Agency documentation demonstrated that Coast Guard officials applied some key practices but not to a significant degree. Not at all applied. Agency documentation did not demonstrate that Coast Guard officials applied key practices. We deemed the following seven subcategories under the four categories as relevant criteria for assessing the Coast Guard’s reserve component Integration efforts: “Establishing goals and outcomes,” “Involving employees and key stakeholders,” “Using data and evidence,” “Addressing high risk and Longstanding management challenges,” “Leadership focus and attention,” “Managing and monitoring,” and “Strategic workforce planning.” We determined that the remaining three subcategories were not relevant to the Coast Guard’s reserve component integration efforts because we deemed the key practice more applicable to a government-wide effort or determined that it was too early to consider as the reserve integration effort was in its initial implementation stage. For the seven subcategories included in our assessment, we determined 19 key practices from these subcategories were most relevant to the Coast Guard’s reserve component integration efforts and applied those practices to our assessment. We reviewed Coast Guard documentation and made qualitative determinations about the extent to which the Coast Guard’s reserve component Integration actions addressed these criteria. A second analyst independently reviewed and validated each determination. We assessed the Coast Guard’s actions using the modernization effort scale: (1) Generally applied; (2) Partially applied; (3) Not applied; and (4) Minimally applied. Minimally applied. Agency documentation demonstrated that Coast Guard officials applied a limited number of key practices with significant gaps associated with each key practice. Our determinations are preliminary observations of the effort because Coast Guard’s reserve component organizational effort was in its nascent stages during our review. This presented several challenges in determining the point at which Coast Guard actions justify a rating of generally applied and partially applied. We applied the following decision rules to resolve these discrepancies: If one practice of the subcategory was rated partially applied, then we concluded that the subcategory as a whole partially applied. If one practice of the subcategory was rated generally applied, but one or more other key practices as either partially applied or not at all applied, then we concluded that the subcategory as a whole partially applied. If one practice of the subcategory was rated partially applied, but one or more other key practices rated either minimally applied or not at all applied, then we concluded that the subcategory as a whole minimally applied. We interviewed cognizant officials at Coast Guard headquarters, and field units, including the Atlantic and Pacific Area commands, and two Coast Guard districts and two Coast Guard sectors collocated with them. We interviewed officials from the two area commands because of their role in implementing organizational changes, and the districts and sectors for their perspectives on the Coast Guard workforce assessment process. Headquarters and field officials interviewed were responsible for the overall management of their organization in addition to officials responsible for facilitating the implementation of organizational change efforts. We reviewed prior GAO reports on organizational realignment, Coast Guard organizational changes, and high-risk issues in the federal government. In addition, we reviewed other reports evaluating long- standing agency management challenges. Finally, we reviewed documents and information on these organizational change efforts and compared them against Coast Guard guidance on organizational changes. To address our second objective, we analyzed Coast Guard documents related to management tools the Coast Guard has developed to determine its workforce requirements and identify personnel needs. Documentation included guidance and analysis related to developing workforce staffing needs, and strategies that set out the Coast Guard’s stated human capital principles. As with the first objective, we interviewed cognizant officials at Coast Guard headquarters, its Atlantic and Pacific area commands, and the two Coast Guard districts and two sectors collocated with them. Headquarters officials we interviewed were responsible for the development of manpower requirements and overseeing implementation of workforce assessments for Coast Guard units. We also reviewed prior GAO reports on workforce planning and Coast Guard personnel issues. Finally, we reviewed documents and information on these efforts to assess workforce requirements, and compared them against Coast Guard guidance on organizational changes for conducting the manpower requirements determination process, and our prior work related to strategic human capital management. To assess the extent to which the Coast Guard has supported its workforce with manpower requirements analyses and determinations, we analyzed all manpower requirements analysis (MRA) and determination documents the Coast Guard completed from 2003, when it began implementing the manpower requirements determination process, through calendar year 2019, the last full year of data available at the time of our review. Specifically, we requested the entire collection of MRA and determination documents from the Coast Guard. We then requested the number of positions that make up each unit type with a completed MRA. We assessed the reliability of the Coast Guard’s data through electronic testing, reviewing documentation, and interviewing Coast Guard headquarters and field unit officials regarding how these data were collected and used. We determined that these data were sufficiently reliable for determining the number of positions within each type of Coast Guard unit. With this information, for every MRA and determination completed, we calculated the number of positions in the Coast Guard’s workforce supported by available data. We conducted this performance audit from December 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In 2006, the Commandant of the Coast Guard issued 10 Commandant Intent Action Orders intended to address elements of the Coast Guard’s command and control structure, mission support systems, and business processes that were identified as detracting from mission execution. Table 2 provides an overview of the issues that drove the Coast Guard’s modernization effort, the intended goals for the effort as outlined in the 2006 Commandant Intent Action Orders, and examples of key actions the Coast Guard has taken to address the goals. The Coast Guard’s reserve component is its only workforce dedicated to respond to contingency operations such as natural and manmade disasters. The Coast Guard found that demand for reserve forces to augment its active duty workforce had grown as the service was called to respond to more contingencies. In 2006, under its organizational modernization effort, the Coast Guard issued a goal to optimize the use of the reserve component by ensuring the reserve workforce had the necessary training and support. The Coast Guard shifted governance of the reserve component under the Deputy Commandant for Mission Support; however under this structure, the Coast Guard did not take into account the difference between the reserves workforce being considered a program as opposed to a distinct component of the United States military. As such, in 2018, the Coast Guard chartered a project team to evaluate the state of the reserve component’s governance and develop alternate options to better integrate the reserves into the Deputy Commandant for Operations. In 2019, the Coast Guard integrated its reserve component into its Deputy Commandant for Operations governance structure. Officials told us that the goals for the new reserve component organization are to provide headquarters decision-makers enhanced visibility of operational readiness, competencies assigned and attained, and to use predictive modeling to look 2 or 3 years ahead to anticipate readiness posture and administrative readiness. They noted that achieving these goals relies on better data collection and developing metrics that can capture Coast Guard-wide information. Officials told us that, as of June 2019, the new organization was at initial operational capacity using existing staff. Table 3 provides our assessment of the extent to which the Coast Guard’s actions to reorganize its reserve component governance structure had applied key reform practices and examples of actions and deficiencies. From calendar years 2014 through 2019, the Coast Guard implemented the manpower requirements determination process for 30 of its 158 unit types. The Coast Guard completed manpower requirements analyses for 30 unit types. Of these 30 manpower requirements analyses, the Coast Guard completed required manpower requirements determinations— establishing a manpower requirement—for only four of these 30 unit types. Table 4 shows the most recent manpower requirements analyses, and corresponding determinations, completed from calendar years 2014 through 2019. In addition to the above contacts, Jason Berman (Assistant Director), Jennifer Kamara (Analyst-in Charge), Ben Atwater, Susan Czachor, Elizabeth Dretsch, Eric Hauswirth, Tracey King, Daniel Kuhn, and Kevin Reeves made key contributions to this report.", "summary": "The Coast Guard is a multi-mission maritime military service responsible for maritime safety, security, and environmental protection, among other things. Since 2006 the Coast Guard has implemented organizational changes to improve its effectiveness and efficiency. During this time, the Coast Guard also created a workforce assessments process to determine the number of personnel and skills required to meet mission needs. In April 2018, the Coast Guard reported to Congress that it was operating below the workforce necessary to meet its mission needs. GAO was asked to review the status of the Coast Guard's modernization and workforce assessment efforts. Among other things, this report examines the extent to which the Coast Guard (1) applied key practices for agency reorganization and (2) has assessed its workforce needs. GAO analyzed Coast Guard documents used to plan and implement its modernization effort against GAO key practices for agency reorganization. GAO also analyzed Coast Guard workforce assessments and data from 2003 through 2019. GAO also reviewed policy and planning documents and interviewed Coast Guard officials. The U.S. Coast Guard (Coast Guard) realigned its mission planning and mission support functions through an effort known as “modernization,” but did not consistently apply key practices for agency reorganization in implementing the effort. Of seven key practices, the Coast Guard did not apply two and partially applied three. For example, the Coast Guard did not measure its progress in achieving the goal of modernization, as key practices recommend. Coast Guard documents for organizational change and associated guidance do not require such practices to be followed. By ensuring such practices are implemented, the Coast Guard will be better positioned to determine the extent to which its investments meet modernization's goal of improving effectiveness and efficiency. Although the Coast Guard has informed Congress that it needs to increase its workforce, it has assessed a small portion of its workforce needs. Its preferred tool for assessing workforce needs is its manpower requirements determination process, which includes manpower requirements analyses (MRA) and is completed with a manpower requirements determination (MRD). Coast Guard guidance states that MRAs are to be updated every 5 years, and according to its April 2018 Manpower Requirements Plan, the Coast Guard's goal is to complete MRDs for all of its 58,000 personnel and 158 unit types. However, the Coast Guard had completed MRAs for 13 percent of its workforce and MRDs for 2 percent over the past 5 calendar years (see figure). The Coast Guard's plan does not include time frames and milestones for how it will achieve its workforce assessment goal, and information on the resources it needs to complete MRDs for all positions and units has not been updated in 10 years. By updating its plan to complete manpower requirements determinations and obtaining information on the resources needed to achieve its workforce assessment goal, the Coast Guard will be better positioned to ensure that it has the right number of people with requisite skills in the right units to meet its mission demands and to inform Congress of its manpower needs. GAO is making six recommendations, including that the Coast Guard measure progress in achieving the goal of modernization, update a plan with time frames and milestones for completing its workforce assessment goal, and obtain information on the resources needed to meet its goal. DHS concurred with our recommendations.", "document_type": "gao"}
{"report": "The federal government is the largest real property owner in the United States with a vast inventory costing billions of dollars annually to operate and maintain. Federally owned buildings include courthouses, offices, warehouses, hospitals, housing, data centers, and laboratories. GSA acts as the federal government’s landlord and is responsible for designing, constructing, and managing federal buildings that are occupied by federal agencies and the judiciary. Each year, GSA spends hundreds of millions of dollars on major construction projects, which include both new construction and repairs and alterations (R&A) to existing federal buildings. R&A projects can range from building system replacements and security upgrades to full building renovations. GSA manages its major construction projects through its central office in Washington, D.C., and its 11 regional offices. GSA’s central office establishes programming, design, and construction standards and guidance, and provides technical assistance, as needed, to the regional offices that are responsible for project implementation. To obtain authorization for projects above a defined threshold, GSA must submit to certain congressional committees a project prospectus that, among other items, describes the project and provides its estimated cost. Upon approving a project’s prospectus, Congress provides funding, either through an appropriation from the Federal Buildings Fund or appropriating funding to an agency. GSA posts approved project prospectuses on GSA’s public website. In general, GSA develops and implements projects through a sequential process that includes the following steps: Identification. Federal agencies submit a facility or space need to GSA; GSA prepares a feasibility analysis to determine the best way to fulfill the need, which could be through new construction, an R&A project, or a lease. Some R&A projects—limited to building system replacements—may be by identified by GSA based on building age and condition, and not originate from agencies’ space needs. Initiation. GSA assigns a project manager to define the project’s scope, develop cost and schedule estimates, and draft a project management plan (PMP). If a prospectus has not been previously submitted, GSA submits a prospectus to certain congressional committees for authorization. Planning. GSA’s project manager updates the PMP; the project’s baseline scope, schedule, and budget are finalized. Execution. For authorized and funded projects, GSA awards contracts for design and construction; the project’s baseline scope, schedule, and budget are revised, as needed, based on awarded contracts; GSA’s project manager monitors design and construction progress and manages changes to the project’s scope, cost, or schedule. Close-out. GSA’s project manager completes construction close-out activities and turns the project over for tenants’ use. GSA project managers perform key steps in the process that include overseeing contractors, monitoring and reporting on the progress of projects, managing changes to the project, and coordinating with tenant agencies. Additionally, GSA project managers are responsible for ensuring that “commissioning” is performed during the project. “Commissioning” generally requires that an independent commissioning agent oversee the construction contractor’s testing of installed building components to determine if they are performing as designed. According to GSA data, GSA substantially completed 36 major construction projects in the 5-year period from fiscal year 2014 through fiscal year 2018. The total cost of those 36 projects was approximately $3.2 billion. Listed below are some characteristics of those projects. Cost: Project costs ranged between $21 million and $343 million, with an average cost of about $89.3 million. Schedule: Project durations ranged between about 12 months and 79 months, with an average of about 43 months. Project Type: R&A projects made up the majority of projects (64 percent), with an average cost of about $74.2 million and an average duration of about 47 months. New construction projects accounted for 36 percent, with an average cost of about $116 million and an average duration of about 35 months. On average, R&A projects cost about $42 million less than new construction projects but took about 13 months longer to complete. See figure 1 for summary information on the cost and duration of these projects, by project type. Location: The National Capital Region (GSA Region 11) had the most projects with nine (25 percent), and all but one of the 11 GSA Regions had at least one project. Project Delivery Method: GSA utilized four delivery methods for 35 of the 36 projects in our 5-year time frame. Construction Manager as Constructor, whereby GSA contracts separately with a design firm and a construction contractor. The construction contractor is involved early-on to consult on the design as it is being developed; upon the design’s completion, GSA negotiates with the construction contractor on a price to undertake the construction. GSA used this method for 12 of the 36 projects (average cost of about $99.8 million). Design-Bid-Build, whereby GSA contracts with a design firm to develop a project’s design. After the design is completed, GSA contracts separately with a construction contractor. GSA used this method for 11 of the 36 projects (average cost of about $81.3 million). Design/Build-Bridging, whereby GSA contracts with a construction contractor to finish a partially completed design— termed a “bridging design”—begun by a separately contracted design firm. GSA used this method for 8 of the 36 projects (average cost of about $77.4 million). Design/Build, whereby GSA contracts with a contractor to provide both design and construction services under a single contract. GSA used this method for 4 of the 36 projects (average cost of about $120.4 million). See appendix I for more detailed information on each of the 36 projects. According to GSA officials and GSA’s internal construction-cost study prepared for GSA by the National Institute of Building Sciences (NIBS) in March 2016, several factors can result in higher costs for GSA’s construction projects compared to other similar private sector construction projects. For example, cost models in the 2016 NIBS study indicate that R&A projects cost roughly 15 to 25 percent more than R&A projects for a comparable Class A private sector building. Although the study was based on construction of R&A projects, both GSA and NIBS officials agreed that these same factors can contribute to similar cost premiums for GSA’s new construction projects compared to private sector projects. However, the NIBS staff who conducted the study told us that GSA’s more recent adoption of performance-based design standards, as compared to previously prescriptive standards, likely lowers the federal construction cost’s premium relative to private sector projects but some premium still exists. The performance-based design standards, for example, provide contractors greater latitude in selecting construction materials, which can have cost implications. According to the GSA’s internal construction-cost study, the factors that contribute to higher estimated costs for GSA construction projects when compared to similar private sector projects primarily include design and procurement requirements specific to federal projects that private sector counterparts may not have to comply with. Those requirements are specified in GSA’s design standards, as well as federal statutes and guidelines. Table 1 provides illustrative examples of factors cited by the study and GSA officials. In addition to the factors identified in the GSA’s internal construction-cost study, GSA officials said that meeting other statutory requirements, for example, the Buy American Act and the Federal Information Security Modernization Act of 2014 (FISMA), can contribute to higher costs for federal projects compared to private sector projects. GSA officials said that the cost of making information technology systems FISMA-compliant leads to federal projects costing more than private sector projects. FISMA-compliant systems, among other uses, are needed to enable the sharing of design and construction documents among GSA and contractor staff and the installation of control systems that are integral to the operation of building systems. GSA uses three principal tools—(1) project management plans (PMP), (2) peer reviews, and (3) “earned value management” (EVM)—to monitor its construction projects, including cost and schedule performance. The PMP is the overarching tool GSA and its contractors use to guide projects’ implementation. According to GSA policy, a PMP primarily defines the parameters of a project, to include scope, schedule, cost, implementation strategy, and risks, among other items. GSA policy also indicates that the PMP—which is an industry recognized tool—is to be updated during a project’s execution and reflect notable changes affecting the project’s scope, cost, and schedule. The PMP is to also establish stakeholder roles and responsibilities, project goals, and tenant expectations. In all of the five case-study projects we reviewed, we found the associated PMPs generally: outlined the project’s scope, cost, and schedule information; identified GSA’s project stakeholders—such as GSA’s project manager and GSA’s contracting officer—and representatives for the tenant agencies that the project will benefit; and identified potential risks posed to the delivery of the project. Four of the five PMPs included a “revision history” table that demonstrated that GSA generally used and updated the PMPs over the course of the projects’ execution. The fifth project’s PMP was developed prior to GSA’s 2012 update to its PMP standard format, which then required the use of a revision history log. More information pertaining to our case-study projects, including some information from the GSA PMPs we reviewed can be found in appendix II. The second tool GSA utilizes to monitor its construction projects is peer reviews. GSA policy requires that external peer reviews be conducted on projects with a construction cost over $25 million. Per GSA guidance, these on-site peer reviews typically occur twice during construction— when projects are about 15 percent and 60 percent complete. External peers—typically, construction industry experts who were not involved with the project—assess whether a project is progressing as planned and identify for GSA managers and project stakeholders any issues they observe that may affect its timely completion or cost. In general, peers also assess stakeholders’ working relationships and make recommendations for improvement or identify opportunities for greater consistency in the performance of GSA’s construction program or greater efficiency among project stakeholders. We found that four of our case-study projects utilized external peer reviews during construction, as required. For example, one peer review report included the following observations: The project team showed great progress toward completing the project on time, and potentially ahead of schedule; the implementation of the recommendations made during the initial external peer review resolved potential unknowns and cost issues that would have put the project at high financial risk; the safety record was exceptional; tenants were better informed; and security issues had been streamlined, allowing the contractor to staff the project in a timely manner. Most of the GSA’s project managers and construction contractors we interviewed for these four case study projects said they generally believed the external peer reviews were fair and added value. Our fifth case-study project did not utilize an external peer review because it was not required at the time GSA awarded the construction contract. The third tool GSA uses is EVM, which is an industry-recognized project management tool and is required for major federal acquisitions, such as construction projects, to help project managers monitor cost and schedule during project execution. According to the Office of Management and Budget’s (OMB) guidance and GAO’s cost-estimating guide, EVM measures the value of work accomplished in a given period and compares it with the planned value of work scheduled for that period and the actual cost of work accomplished in that period. The differences between the estimated and actual costs and schedule are used to determine, for example, whether less or more work had been completed than had been planned. By tracking these differences, EVM can provide warning signs of impending cost overruns or schedule delays and provide estimates of anticipated costs at completion. Consistent with our previous findings related to GSA’s use of EVM, we found that GSA continues to use EVM to assess its construction project delivery performance on two dimensions—on-schedule and on-budget: On schedule: GSA considers a construction project to be on- schedule if its construction duration is within 10 percent of the planned duration, from the construction start date to the substantial completion date (i.e., GSA considers a project to be substantially complete on the date the project space is suitable for tenant occupancy; however, the project’s cost could change prior to the actual contract close-out). On budget: GSA considers a construction project to be on budget if its actual cost is within the planned construction cost (as measured by the construction contract’s value at award or the contract value as adjusted based on post-award contract modifications) and the additional 7 to 10 percent construction contingency. According to GSA guidance, a project’s construction contingency is intended to cover unforeseen conditions and design deficiencies; it does not apply to additional scope. According to GSA officials, GSA’s central office uses EVM to conduct monthly performance reviews of GSA’s major construction projects. At these reviews, GSA’s central office considers certain proposed project changes forwarded for approval by GSA regional offices. We have previously reported that federal construction projects typically involve some degree of change as the project progresses and that contract changes, made through contract modifications, can occur for a variety of reasons, including design errors and unforeseen site conditions. In addition, GSA officials said that funding delays, tenant-caused delays, and site acquisition issues can also be factors that cause project delays. According to GSA guidance, while GSA regional offices have some latitude to make contract changes, the regional offices and their project managers must get central office approval if a proposed change is anticipated to exceed the approved contract cost, construction contingency, or schedule contingency. If such a change is approved, GSA will then revise—commonly referred to as “rebaseline”—either the construction contract cost, the planned schedule duration, or both. GSA will then use that new value to measure and report on the project’s budget and schedule performance. According to GSA officials and summary data on its rebaselining decisions, the majority of GSA’s major construction projects within our 5- year scope were rebaselined, within its policy, to account for changes to projects’ costs and schedules. Specifically, GSA officials told us they rebaselined 25 of the 36 projects (about 70 percent). Of those projects, 18 (50 percent) were driven, at least in part, by tenant-requested changes, which GSA officials said were the most prevalent reasons for rebaselining a project. According to GSA policy, if a tenant agency requests a project change that falls outside the original scope, the project manager is to ensure that the tenant agency provides all the associated design-related requirements and funding necessary to perform this additional scope. For example, for one of our case study projects, the tenant provided $17.7 million in additional funding as part of the final phase of its headquarters building’s multi-year modernization. The tenant’s funds paid for, among other things, the tenant-requested change to convert part of the multi-story library into offices to increase the building’s space efficiency and allow more staff to move into the building. Based on our review of GSA’s internal data, we found that four of our five case-study projects were rebaselined; GSA rebaselined the cost of two projects, the schedule of one project, and both the cost and schedule of one project. For example, concerning costs, GSA rebaselined one project to account for a $2.7 million increase to the contract—initially awarded for $21.8 million—upon realizing that the tenant’s plan to increase the number of occupants in the building required another stairwell be added for fire safety purposes. With regard to schedule, GSA rebaselined one project, as previously discussed, to address a tenant-requested change to convert parts of the library into offices; this change extended the schedule by about 1 year. Given GSA’s methodology that allows for rebaselining and GSA’s cost and schedule contingencies, GSA’s EVM performance data showed that all five case-study projects were completed on budget and on schedule, if not early. See appendix II for a summary of the cost and schedule performance of our five case-study projects. Federal agencies should report pertinent and reliable information to the Congress, so that Congress can adequately assess agencies’ progress in meeting established performance goals, ensure accountability for results, and understand how individual programs and activities fit within a broader portfolio of federal efforts to aid in federal funding decisions. GSA has publicly reported high-level information on its construction project performance in its Annual Performance Reports, which GSA provides to Congress and publishes on GSA’s website. For example, GSA’s fiscal year 2014 through 2018 Annual Performance Reports show that GSA met or exceeded its stated performance targets for project delivery (see fig. 2). Over this period (fiscal year 2014 through 2018), GSA took steps to improve the content and usefulness of its annual reports. For example, in fiscal year 2014, GSA included R&A projects in its performance measure to fully encompass all GSA capital construction projects. Prior to fiscal year 2014, GSA’s performance measure was calculated solely on the performance of GSA’s new construction projects. Also, starting in fiscal year 2017, GSA included additional summary-level information in its reports that identified the total number of projects and total contract value of both completed and ongoing projects that fiscal year. In fiscal year 2018, as shown in figure 2, GSA again revised its performance measure to reflect both the budget and schedule performance of projects. Prior to fiscal year 2018, GSA’s performance measure reflected only projects’ schedule performance. Further, in its fiscal year 2018 report, GSA listed the specific costs of its seven largest projects completed on-schedule and on-budget of the 24 projects completed that year. While GSA has taken some actions to improve the usefulness of its external reporting, neither GSA’s Annual Performance Reports nor its public prospectus website provide information on the extent to which projects have been rebaselined or the final costs of projects. Standards for Internal Control in the Federal Government state that agencies should provide necessary quality information to external stakeholders so that the external parties can help the agency achieve its mission and address related risks. As noted above, GSA regularly rebaselines projects, within policy, to account for changes to projects that affect construction contract costs and schedules due to a variety of reasons. GSA officials told us that they manage total project costs to be within the original prospectus estimate provided to Congress adjusted, as applicable, by funds it receives for tenant-requested changes; the officials do not believe that it is critical to report final costs or if projects have been rebaselined. However, we have found that simply measuring and reporting performance based on the most recent baseline may obscure how projects have performed over their entire construction time frame. Being more transparent about which projects or how many projects were rebaselined, as well as reporting cost and schedule growth from original baselines, can provide stakeholders with a more accurate view of project performance and enhance accountability. Reporting on such cost information, for example, would allow GSA to communicate to Congress actual construction costs at a project’s completion that may be different than the estimated costs on the prospectus approved by Congress at the project’s initiation which likely did not account for items to be funded by tenants. Without that information, it is not possible for Congress to know how projects performed against approved estimated costs and whether final project costs are consistently above, below, or meeting estimated costs. Having this information could benefit Congress in its oversight role and in making future funding decisions. Key Challenges Identified during Commissioning of Case Study Projects Issues with State-of-the-Art Building Systems State-of-the-art building systems and the automation systems that monitor and control them were not optimally operating for at least two of our case-study projects at substantial completion. For example, stakeholders for one project reported that it was very challenging to get all the integrated systems to work properly, in part, because the design was very technologically advanced. One GSA official said the biggest challenge was coordinating the operations sequence of the various building systems to function as the design team intended. As such, it took well over a year after the building was completed to resolve these issues. Limited Capabilities of Building Contractors to Maintain Complex Systems In three of the five case-study projects, stakeholders said maintenance service contractors were either not prepared to assume or had not yet been contracted to provide for the higher technical maintenance and operation responsibilities for all the building systems. For example, one construction contractor said there seemed to be a knowledge gap between the technical capabilities needed to effectively manage the more advanced building systems and the skills possessed by the existing maintenance contractor. A GSA official said that GSA plans to solicit a new contract for the building’s maintenance. agencies, and others. The Guide identifies its primary audience to be: GSA’s project managers, their construction management agents who help GSA manage the project, and the commissioning agent who oversees the commissioning process. The Guide’s secondary audience includes the many other stakeholders in the commissioning process, including tenant agencies. According to the Guide, the commissioning process is intended to assist in preparing maintenance personnel to operate and maintain any newly installed building systems. We found that GSA conducted commissioning largely in alignment with the Guide on our five case-study projects based on our review of project documentation and interviews with GSA’s project managers, facilities managers, and contractors. Further, we identified two key challenges in regard to state-of-the-art building systems’ and building contractors’ capabilities. See sidebar for additional information on the two challenges. While GSA generally conducted commissioning according to its Guide on the five case-study projects we reviewed, we found that the 2005 Guide is outdated. For example, the Guide references dated industry practices and some outdated external guidance, both of which were in existence at the time the Guide was developed. Specifically, it references the 2003 Leadership in Energy and Environmental Design (LEED), Green Building Rating System, Version 2.1; however, the LEED rating system for projects since 2016 was Version 4.0, and Version 4.1 was recently issued in 2019. We also found disconnects between the 2005 Guide and GSA’s current design standards or industry practices. For example: While the Guide states that GSA buildings should be LEED certified and strive for a Silver certification, GSA now requires buildings to achieve a higher certification, LEED Gold. The Guide states that GSA “strongly recommends” that GSA regions—and agencies to which GSA has delegated the operations of federal buildings—recommission buildings every 3 to 5 years. The current LEED standards call for “periodic commissioning requirements, ongoing commissioning tasks, and continuous tasks for critical facilities.” In general, over the past decade, federal statutes, guidance, executive orders, and changes to industry building certifications have moved the federal government and the industry toward more real- time, continuous monitoring and commissioning in cases where advanced building-automation systems, energy information- management systems, and advanced meters (e.g., electrical, water, gas, temperature, and light meters) have been installed. The continuous data provided by these systems can help building owners make real-time adjustments to optimize building operations. However, the Guide does not mention continuous monitoring-based commissioning as a possible option to, or in addition to, recommissioning buildings. Standards for Internal Control in the Federal Government state that management should periodically review policies, procedures, and related control activities for continued relevance and effectiveness in achieving the entity’s objectives or addressing related risks. Those standards also indicate that if there is a significant change in an entity’s process, management should review this process in a timely manner after the change to determine that the control activities are designed and implemented appropriately. Without updated guidance, GSA’s commissioning activities may be limited in their effectiveness in assuring building systems are operating optimally. Two of the five GSA contractors we interviewed expressed frustration that the commissioning process on their projects did not run smoothly. GSA’s external peer reviews for those same two projects also found that the roles of the various stakeholders in the commissioning process were not clear. In addition, three stakeholders on one of those projects said that some stakeholders—especially GSA’s contracted design team—were not fully involved during part of building’s commissioning. In light of our review, GSA is planning to evaluate its commissioning guidance to determine an appropriate update. GSA officials stated that this update may result in revising the existing commissioning guide or replacing it with industry-recognized guidance. However, GSA is still in the process of identifying the scope of the update, including a timeline and resources required to do so. According to OMB guidance, Post Occupancy Evaluations (POE) are tools to evaluate the effectiveness of an agency’s overall capital acquisition process. The primary objectives of a POE include (1) identifying how accurately a project meets its objectives, expected benefits, and strategic goals of the agency and (2) ensuring the continual improvement of an agency’s capital-programming process based on lessons learned. The guidance also states that agencies should have a documented methodology for conducting POEs to ensure that each asset is evaluated consistently. The guidance identifies 17 factors to be considered for evaluation in conducting a POE, such as a project’s performance, compliance with design standards, maintenance issues and building workforce competences, use of advanced building technologies, tenant satisfaction, and cost savings. The guidance also notes that a POE should generally be conducted 12 months after the project has been occupied to allow time for the tenant to evaluate the building’s performance and the delivery of the project. However, the guidance allows agencies some flexibility in the timing of a POE to meet their unique needs if 12 months is not the optimal timing to conduct the evaluation. We found GSA did not conduct any POEs on its completed major construction projects in the 4-year period from 2014 to 2017, as called for by OMB guidance. In fiscal year 2018, GSA contracted with the National Institute of Building Sciences (NIBS) to conduct six POEs and seven additional POEs in fiscal year 2019. GSA officials told us that while they understand the value POEs can provide, they are only able to conduct them when funding is available. They explained that POEs are funded through general program funding (not project funding based on the approved prospectus) within GSA’s Office of Facilities Management, and the available resources to conduct such efforts are limited given other GSA portfolio-wide maintenance and operations priorities. GSA acknowledged that it did not have a specific policy for conducting POEs or selecting completed projects for POEs. Instead, GSA officials said when selecting which buildings should undergo a POE, they ensure there is a representation of different building types (i.e., federal buildings, U.S. courthouses, and land ports of entry) and a mix of new and R&A projects. Because GSA does not have a policy for POEs, NIBS developed a general methodology, which it used for conducting each of those POEs. While GSA tries to ensure there is a mix of projects represented when selecting POEs, it is not clear that its selection factors help ensure GSA makes the best use of its limited resources. To balance OMB’s guidance to agencies that POEs should be conducted on agencies’ completed capital-construction projects, and given its resource constraints, GSA could benefit from a more strategic approach to select the projects for POEs. For example, GSA could use a risk-based approach to select for POEs (e.g., more expensive projects or those that include the integration of advanced, state-of-the-art building systems) to help improve the design and construction of future projects. Such an approach is consistent with the Standards for Internal Control in the Federal Government, which states that management should design control activities to achieve objectives and respond to risks and implement those control activities through policies. Control activities could include establishing criteria for selecting projects for POEs and formalizing it through policy. GSA officials also noted that GSA has conducted multi-building studies— which share some similarities with individual building POEs—that GSA officials broadly consider to be POEs. However, while the studies assessed some of the factors described in OMB guidance (e.g., project performance, maintenance, or advanced technology use), none of them comprehensively reviewed the 36 projects in our 5-year time frame. Accordingly, while these broader studies can provide some useful information to GSA, they are limited in their ability to provide GSA with timely information that meets the POE goal stated in OMB’s guidance: “to evaluate the overall effectiveness of the agency’s capital planning and acquisition process” and to “solicit customer feedback and incorporate that feedback into improvements to the performance and delivery of the capital investment process.” OMB guidance states that agencies should establish mechanisms to use lessons learned from POEs to minimize risks of repeating past mistakes on future projects. Along these lines, NIBS produced a summary report for GSA of the six 2018 POEs it conducted; the report identified design, construction, commissioning, and operational maintenance issues and lessons learned. From these lessons learned, NIBS also offered some recommendations to GSA. For example, NIBS said that GSA should establish a POE review committee to examine GSA’s building designs to highlight and offer solutions to previously identified problems in other buildings and develop and distribute a checklist describing the identified problems to teams that are responsible for designing new buildings. GSA developed an operational guide to synopsize the lessons learned from the NIBS report and expects that future building projects will benefit through its efforts to incorporate these lessons in the design of future projects. Further, NIBS reported that improvements to future projects in response to the issues identified in the six 2018 POE projects would result in reductions to GSA’s future operational costs. However, it is unclear whether the extent of these issues and lessons learned are unique to the 2018 POE projects reviewed by NIBS, or may be occurring across more of GSA’s construction projects. According to NIBS officials, they have observed some recurring project issues among the six POEs conducted in fiscal year 2018 and two of the seven conducted in fiscal year 2019. GSA officials said that they plan to implement lessons learned from these POEs into GSA’s design standards by the end of 2019 and expect to later update these design standards based on future POEs. According to GSA officials, they made NIBS’s individual POE reports and the 2018 POE summary report available to their project managers through a shared folder on GSA’s internal intranet site, which can be accessed by over 120 staff. In addition, one GSA project manager told us that GSA periodically holds knowledge-sharing webinars with its project managers where lessons learned from specific projects may be presented. This official indicated that the knowledge-sharing presentations are heavy on photos and that there is no real prescribed format or requirements for content. Accordingly, the presentations are an informal way for project teams to share project knowledge across GSA’s regions. Further, this official said the lessons-learned presentations from those webinars are also posted for a period of time on GSA’s internal website. However, communicating information via such means provides ad-hoc benefits to only the select individuals who know about the availability of the reports or webinars, and choose to access them. This approach may not effectively expand the broader knowledge base of the organization or best position GSA to, as OMB guidance indicates, ensure continual improvement of an agency’s capital-programming process based on lessons learned. Standards for Internal Control in the Federal Government also indicate that management should communicate necessary quality information to all relevant internal stakeholders to achieve the entity’s objectives. Without a sustained effort to consistently conduct POEs on its completed projects, GSA may miss opportunities to gather valuable tenant feedback and to identify marked successes or notable problems, including any issues that are recurring. Such information could inform future improvements to GSA’s major construction projects and increase tenant satisfaction. Further, such information may also help identify the need to change or update some of GSA’s policies, standards, guidance, or practices, such as those recommended by NIBS or other project stakeholders. However, even if GSA undertakes a more systematic approach to conducting POEs, the benefits of doing so can only fully materialize if GSA takes steps to effectively communicate POE lessons learned to all staff who may be at risk of repeating previously identified project mistakes. GSA annually spends hundreds of millions of dollars on major construction projects to provide tenant agencies with new buildings and modernized spaces that help support agencies’ missions and enable the effective delivery of government services. GSA has improved its public reporting on major construction projects to depict project schedule and budget performance over time. However, GSA’s public reporting does not include information about the extent to which projects’ schedule or costs were rebaselined, or on projects’ final costs, which may differ from GSA’s estimates in the initial prospectuses approved by Congress. Providing the additional information on projects’ schedule and cost rebaselining, and projects’ final costs could further benefit Congress in its oversight role and improve public knowledge about the full costs of major federal construction projects. In addition, given the significant fiscal exposure for the government to maintain these buildings for the long term, having updated guidance on commissioning would enable GSA to better ensure that completed projects are meeting GSA’s design standards. Finally, given resource constraints, identifying and communicating information about when and how POEs are to be conducted could help GSA maximize opportunities to capture lessons learned from completed projects. Knowledge gained from POEs could also ensure tenant agencies are satisfied with completed projects and improve the design and construction of major projects in the future. We are making the following three recommendations to GSA: The Administrator of the GSA should report for Congress and the public— for example, on GSA’s prospectus website—the extent to which completed projects’ construction costs and schedules were rebaselined and final construction costs, to include any additional funding tenant agencies may have provided to GSA for changes. (Recommendation 1) The Administrator of the GSA should update its 2005 Commissioning Guide—or replace it with appropriate industry-recognized standards and guidance—to be consistent with GSA’s current design standards and industry practices. (Recommendation 2) The Administrator of the GSA should identify and communicate—such as through policy, guidance, or other appropriate mechanism—(a) when and how Post Occupancy Evaluations should be conducted for completed projects considering resource constraints and (b) how recommendations or lessons learned from those evaluations are effectively communicated to future project teams. (Recommendation 3) We provided a draft of this report to GSA for review and comment. In written comments, reproduced in appendix III, GSA stated that it partially concurred with recommendation 1 and concurred with recommendations 2 and 3, and provided related comments. In response to recommendation 1, GSA agreed to publish key information that would be helpful, such as GSA’s total construction costs at project completion. However, GSA said it would be misleading to publish information on additional funds provided to GSA from tenant agencies— that lead to contract changes and rebaselining—because these funds come from different appropriations. GSA believes this would not accurately reflect how GSA managed its original budget and schedule. However, we believe that reporting total project costs in a way that clearly identifies both GSA and tenant agency costs is possible, and would not be misleading. We continue to believe that such additional transparency in reporting can benefit Congress in its oversight role and improve public knowledge about the full costs of major federal construction projects. Related to recommendation two that GSA concurred with, the agency noted that it has other commissioning documents and processes outside of its Building Commissioning Guide (Guide) that it uses to ensure building systems are operating optimally. We believe GSA’s use of other documents and processes is a good practice in light of the outdated nature of its current Guide, which serves as a key document in its commissioning process. Nevertheless, we continue to believe that it is important for GSA to update its outdated Guide, or replace it with appropriate industry-recognized standards and guidance to be consistent with GSA’s current design standards and industry practices, as we recommended. Finally, regarding recommendation three, after a discussion with GSA officials during the comment period, we modified the wording of the recommendation to recognize the range of administrative tools (e.g., policy, guidance, or other appropriate mechanism) that GSA could use to identify when and how Post Occupancy Evaluations (POEs) should be conducted and how lessons learned from those evaluations are communicated. As we noted in the report, under its current process, GSA selects the number of facilities evaluated as its annual budget allows based on several selection factors. We continue to believe that GSA could benefit from a more formalized and strategic approach to identifying and communicating when and how POEs should be conducted to make best use of its limited resources. GSA also mentioned its Design Guide for Operational Excellence as a tool to communicate lessons learned from POEs. We agree that such a guide is a good example of how POEs can be used to inform the design of future projects. However, because the guide was based on a limited number of POEs from 2018, we believe that there is more GSA can do to maximize opportunities to communicate lessons learned to future project teams. The draft report had included a fourth recommendation for the Administrator of the GSA to improve the transparency of what is being measured and reported in GSA’s Annual Performance Reports, including noting any key limitations, such as comparing results from year to year if the measure changed. While GSA was reviewing the draft, the agency provided clarifications on the structure and content of its annual reports that mitigated our concerns about the transparency of the information being presented. As a result, we made changes to the body of the report and removed that recommendation from our final report. GSA also provided technical and clarifying comments, which we incorporated, where appropriate. We are sending copies of this report to the appropriate congressional committees and the Administrator of the General Services Administration. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or rectanusl@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. Appendix I: General Services Administration’s (GSA) Completed Major Construction Projects, Fiscal Years 2014 to 2018 Case study project. This appendix contains information on five General Services Administration (GSA) case-study projects that we included in our review. We judgmentally selected these five major construction projects that were substantially completed between fiscal years 2014 through 2018 representing diversity in project type, geographic area, building-type, and range in cost and scope. Although not generalizable to all GSA major construction projects, information gathered from our case studies provides illustrative examples of GSA’s monitoring and construction efforts. For each case study, GSA provided us with extensive project documentation. We reviewed this documentation to obtain key information such as on contract award amounts and modifications that resulted in changes to the project’s original budget or schedule. The contract modifications we discuss for each project are examples of modifications that added cost or credit to the final contract value or that changed the delivery schedule; however, these modifications do not necessarily include all the modifications to the construction contract. In addition, we interviewed relevant stakeholders, such as GSA project managers, contractors, and facility managers who were involved with the projects. All information in the case study narratives is attributable to GSA based on our review of project documentation and interviews with GSA project officials and stakeholders. The Charles F. Prevedel building was constructed in 1990. For fiscal year 2014, GSA proposed alterations and renovations to the building’s interior and upgrades to the building’s systems such that the Veterans’ Benefits Administration could consolidate into the building. The building was nearly two-thirds vacant at the time, as two federal tenants had moved out of the building. The Veterans’ Benefits Administration had been dispersed in both a nearby federal building and leased space. GSA estimated that the Veterans’ Benefits Administration’s move into the consolidated space would save $3.3 million annually in lease costs. The building is five stories above-grade and two-stories below-grade. The project scope included renovating the building’s central atrium; reconfiguring and increasing the building’s useable space; replacing obsolete heating, ventilation, and air-conditioning (HVAC) systems; and, installing an energy-management control system to automate the HVAC and lighting systems and reduce energy consumption. The HVAC upgrades also included replacing and relocating the outdoor air intakes on the roof in order to meet current security requirements. Minor seismic upgrades were also implemented. The design/build-bridging construction contract was awarded in January 2015 for $21.8 million. The construction contract cost was rebaselined to $25.4 million, in part, to provide an additional stairwell to meet life-safety egress requirements as required by GSA’s design guide. GSA reported that change required GSA’s Public Buildings Commissioner to approve an overall project budget escalation of $2.7 million in June 2015. GSA reported the final construction cost was $25 million (roughly a 14.5 percent increase from the initial construction contract award). Construction of the repair and alteration project started in May 2015 and was substantially completed after a year and a half in November 2016, approximately 2 months earlier than originally projected. Figure 3 shows before and after views of the building’s main lobby and newly installed stairwell. Figure 4 shows views of meeting and training room spaces renovated during the project. Location (GSA Region): Bangor, Maine (Region 1) Original Construction Completion Year: 1967 Project Type: Repair and Alteration Project Delivery Method: Construction Manager as Constructor (CMc) The 3-story Margaret Chase-Smith Federal Building and Courthouse was built in 1967 and had not had a major renovation since its construction. The project was funded by the American Recovery and Reinvestment Act of 2009 (Recovery Act). GSA proposed the project be funded to recapture the vacant space in the building, which in part increased to approximately 33 percent after the U.S. Postal Service vacated. The proposed project would renovate and provide alterations to the building that would expand space for its existing tenants—including the U.S. Courts and the Social Security Administration, among others—and provide space for new tenant agencies. GSA officials reported that in order to get the project started quickly using Recovery Act funds, GSA made the decision to deliver the project under the Construction Manager as Constructor (CMc) delivery method. Under CMc method, the contractor was brought in to advise on the design as it was being completed. In addition to space renovations and alterations, the project repaired and replaced HVAC systems, improved energy efficiency, and provided exterior structural improvements including the replacement of windows. New secure elevators were also added to improve court safety. Other components of the project included repairs and replacements of electrical systems, hazardous materials mitigation, elevator improvements, upgrades to the fire protection system, installing sprinklers, and correcting code deficiencies including bringing the building into compliance with accessibility standards. The CMc construction contract was initially awarded in March 2010 for $33.9 million. In September 2010 (6 months later), two contract modifications totaling roughly $4.6 million were issued to increase the contract price to reflect changes made in completing the design. GSA and the contractor reported that the baseline construction contract—after the design was completed—was $38.5 million. While GSA had provided some funding allowances within the initial construction contract to address some project requirements that were not yet fully designed— such as the building’s entry pavilion—another $1.9 million contract modification was issued in March 2011 (a year after the initial contract award), in part, to increase the funding allowances for the front entry pavilion and to provide additional glass that was to be installed in the lobby area. The entry pavilion was added to improve the security screening process and adhere to the U.S. Marshalls Service and U.S. Courts screening station requirements. That $1.9 million cost modification also addressed increased requirements associated with the geothermal heating system and below grade wells. Also, the contract costs increased, in part, due to tenant-requested changes. For example, an $802,000 contract modification was issued, in part, for requested millwork (e.g., judge’s bench and cabinet work) and the Court’s audiovisual equipment, telecommunications, and data-related requirements. GSA reported the final construction cost was approximately $41.3 million (about a 7.5 percent increase above the $38.5 baseline). Construction of the repair and alteration project started in October 2010 and was substantially completed approximately one month early in November 2013. Figure 5 shows the exterior of the building including its new entry pavilion. Figure 6 shows an exterior side view of the new entry pavilion and an interior view of the lobby. As part of the Recovery Act, the Social Security Administration received an appropriation to construct a new National Support Center to replace an older data center whose systems were approaching the end of their useful lives. The new National Support Center provides a state-of-the-art data center, added reliability, and the ability to expand to meet future needs. For example, the data center’s flexible, scalable design allows for a smooth transition to future information technology upgrades and new, emerging technology. The new 300,000 gross square foot data center complexbuilt on a 63 acre siteincludes the data center, warehouse, and office building; the facility was built to accommodate 200 employees. The constructed facility—supporting 24 hours a day, 7 day a week operations—is Leadership in Energy and Environmental Design (LEED) Gold Certified, even though data centers traditionally rank among the largest power users in modern facilities. GSA’s estimated construction cost for the project was adjusted down in August 2012 from $334 million to $262 million. GSA awarded the design- build construction contract in January 2012 for $191.6 million. The project’s construction contract cost was later rebaselined to $207.4 million due in part to the Social Security Administration requesting GSA have the contractor provide operations and maintenance transition services for 6 months. That contract change was made in March 2014—approximately 4 months before substantial completion—for roughly $2.1 million. GSA reported to us that the final construction cost was $208.1 million (roughly an 8.5 percent increase from the base contract award). Because the construction cost was well below GSA’s original construction estimate of $334 million, GSA reported to us the remaining project funds were returned to the Social Security Administration in accordance with the Recovery Act appropriation. GSA issued a notice to proceed (i.e., contract start date) to the design-build contractor in January 2012 and the project was substantially completed on-schedule roughly two and a half years later in July 2014. Figure 7 shows an exterior view of the main entrance to the data center. Figure 8 shows an interior view of the data center’s server space prior to occupancy. Figure 9 shows an exterior view of the on-site solar panel array with the data center in the background. The Department of the Interior (Interior) headquarters building— occupying two city blocks—was initially completed in 1936; upgrades to the building’s systems were required to extend the useful life of the building, support Interior’s operations, and meet current building codes and standards. In 2000, GSA began the construction of its multi-year, six- phase modernization plan, where each of the building’s six wings was to be modernized during one of the six phases. Phase 6 (Wing 1)—the final phase of the building’s modernization— included upgrading the mechanical and electrical systems, replacing the lights and ceiling systems, installing fire safety upgrades and emergency egress stairs, upgrading restrooms, improving accessibility, and restoring historic spaces to include the auditorium, library, and the Undersecretary’s and Secretary’s suites. In 2001, GSA originally negotiated with the contractor the costs to execute Phase 6, which was structured as a contract option. The option could be exercised at GSA’s discretion upon receiving funding but allowed for future, economic price escalation, for inflation. The contract price in 2001 for the Phase 6 scope was approximately $19.3 million. Because appropriated funding was not received until fiscal year 2014, that earlier contract pricing was contractually updated by GSA in 2014 to roughly $38 million; however, that figure included roughly $4.5 million in additional scope that GSA added into the project. The additional scope included, among other items, that the Phase 6 space was to be certified under the Leadership in Energy and Environmental Design criteria and that lessons learned from the earlier completed phases—implemented over nearly 15 years—would be incorporated into the Phase 6 project. Additionally, Interior asked GSA that parts of the library be converted into office spaces to increase the building’s space efficiency and allow Interior to move more personnel into the building. That contract change, for about $6.2 million, was made in May 2016 and also resulted in the schedule’s being rebaselined, adding about one year to the project’s duration. GSA reported that Interior provided $17.7 million in additional funding, inclusive of the costs for converting the library space. GSA reported that the construction contract cost for Phase 6 was $51.7 million (about a 36 percent increase above the 2014 adjusted, base contract cost of $38 million). Phase 6’s construction started in May 2014 and was completed approximately 3 years later in June 2017. Figure 10 shows the exterior of the Department of Interior headquarters building with its six wings. Figure 11 shows interior view of historic spaces that were restored during Phase 6. The primary driver for the project was to address the long term housing needs of the United States Courts and related agencies. The District Court required additional space that the adjacent existing John A. Campbell Courthouse could not provide, and GSA determined that a new courthouse was necessary to accommodate the Courts’ projected 10 to 30 year space needs. The Campbell Courthouse renovation followed the new courthouse construction to allow for the relocation of the Bankruptcy and Probation Courts from leased space, and allow for the full Court family to be co-located between the two adjacent buildings. The new courthouse building, adjacent to the existing Campbell Courthouse, was designed to provide 155,600 gross square feet of space, including parking. The building houses six courtrooms, nine judges’ chambers, the United States Marshalls Service, 38 below-grade parking spaces, and the capability to expand and accommodate eight additional courtrooms in the future. In fiscal year 2010, the new construction project received partial funding in an appropriation in the amount of $50 million, for construction. However, the project was not awarded at that time. The U.S. Courts and GSA had to revisit the long-term space needs for the U.S. Courts, which was later done as part of GSA’s 2013 feasibility study. In fiscal year 2014, an additional $69.5 million was appropriated for a new approach that would involve repairs and alterations to the existing Campbell Courthouse, as well as the construction of a new federal courthouse (which was to be smaller than originally designed), adjacent to the Campbell Courthouse. GSA fiscal year 2014 documentation for the new courthouse project estimated the total design cost at $8.5 million and the total construction cost at $71.1 million, which excluded any prior funding spent on site acquisition costs and the project’s earlier design. In April 2015, GSA awarded a single design-build contract for both the design and construction of the new courthouse and for the repairs and alteration of the existing Campbell Courthouse. GSA baselined the construction cost for the new courthouseexclusive of the costs for the Campbell Courthouse alterationsat $70 million. GSA data showed that the final construction cost for the new courthouse was $72.6 million (an increase of about 4 percent over the baseline cost of $70 million; roughly 9 percent less than the $79.6 million total estimated costs for both the design and construction). Construction started in Spring 2016 and was completed in just over 2 years, in June 2018. The schedule was rebaselined by roughly a month for severe weather delays during the construction. Figure 12 shows the exterior of the new U.S Courthouse and two interior spaces. In addition to the contact named above, Mike Armes (Assistant Director); Catherine Kim (Analyst-in-Charge); John Bauckman; Delwen Jones; Timothy Kinoshita; Ying Long; Malika Rice; Rachel Stoiko; and Crystal Wesco made key contributions to this report.", "summary": "As the federal government's landlord, GSA spends hundreds of millions of dollars to construct or modernize federal buildings. By delivering these major construction projects, GSA supports tenant agencies' missions and facilitates the delivery of government services. GAO was asked to review GSA's major construction projects. This report: (1) identifies costs of these projects in the last 5 years and factors that contribute to those costs; (2) examines how GSA monitors and publicly communicates cost and schedule information; and (3) assesses GSA's efforts to confirm that projects meet GSA's requirements and that tenants are satisfied with completed projects. GAO analyzed GSA's performance data from fiscal years 2014 to 2018 for 36 projects with a minimum cost each of $20 million (i.e., a major construction project); selected five case-study projects representing diversity in project type, geographic area, building type, and range in cost and scope; reviewed applicable GSA policies, procedures, guidance, and reports; and interviewed GSA officials and project stakeholders. In fiscal years 2014 through 2018, the General Services Administration (GSA) completed 36 major construction projects—projects with a minimum cost of $20 million to construct new buildings or modernize existing buildings—with a total cost of $3.2 billion. According to a GSA consultant, factors specific to federal construction projects may result in GSA's projects costing roughly 15 to 25 percent more than comparable private sector projects. For example, GSA uses more durable but more expensive materials to achieve a longer building service life compared to private owners who may plan for a shorter service life. GSA's Annual Performance Reports to Congress do not indicate how much GSA “rebaselined” projects' schedules and costs. Rebaslining reestablishes the point at which GSA measures on-schedule and on-budget performance. In accordance with agency policy, GSA rebaselined 25 of 36 projects GAO reviewed to account for issues such as design changes and tenant-funded requests. For example, GSA rebaselined one of its modernization projects for a $2.7 million increase to the construction contract initially awarded for $21.8 million. The increase resulted from a design change to add a stairwell for fire safety purposes to accomodate the tenant's plan to increase the building's occupants (see figure). After GSA rebaselines a project, costs may differ from the project estimates approved by Congress. Because GSA does not report the extent that it has rebaselined projects or projects' final costs, Congress lacks information about GSA's performance: such as whether final costs are consistently above, below, or meeting estimated costs. Reporting such information could benefit Congress' ability to carry out its oversight role and improve transparency about the full costs of major federal construction projects. GSA assesses whether projects meet requirements and tenants' needs but does not fully capture or share lessons learned. For example, GSA uses “commissioning”—testing installed building systems—to validate that the buildings' systems function as designed. However, because GSA's 2005 commissioning guide references outdated guidance, the effectiveness of its activities may be limited in assuring buildings are operating optimally. GSA also uses post occupany evaluations (POE) to assess projects' performance and tenants' satisfaction. However, in the last 5 years, GSA has not regularly conducted POEs, due in part to resource constraints, and lacks a policy for selecting projects for POEs and communicating findings from completed POEs. As a result, GSA may be missing opportunities to fully utilize POEs to gather tenants' feedback and inform the design and construction of future projects. GAO is recommending that GSA (1) report the extent projects were rebaselined and their final costs; (2) update GSA's commissioning guidance; and (3) identify and communicate when and how to conduct POEs and share lessons learned. GSA concurred with two recommendations and partially concurred with the other, which GAO believes should be fully implemented as discussed in the report.", "document_type": "gao"}
{"report": "In April 2016, IRS released its most recent tax gap estimate, stating that taxpayers should have paid an average of about $2.5 trillion dollars per year in federal taxes for tax years 2008 to 2010. Of this amount, IRS estimated that taxpayers voluntarily and timely paid about 81.7 percent, or $2.04 trillion, leaving $458 billion in unpaid taxes per year, as shown in figure 1. The tax gap estimate is an aggregate estimate of the five types of taxes that IRS administers—individual income, corporation income, employment, estate, and excise taxes. For each tax type, IRS attempts to estimate the tax gap based on three types of noncompliance: (1) underreporting of tax liabilities on timely-filed tax returns; (2) underpayment of taxes due from timely-filed returns; and (3) nonfiling, when a taxpayer fails to file a required tax return altogether or on time. Underreporting of tax liabilities accounted for most of the tax gap estimate for tax years 2008 to 2010, making up 84 percent of the entire estimated gross tax gap, as shown in figure 2. Individual income taxes made up the largest portion ($264 billion) of underreporting. Underreporting of business income accounted for nearly half ($125 billion) of that amount, as shown in table 1. Business income underreporting includes income from sole proprietors, which accounted for the largest share ($78 billion) of individual income tax underreporting. IRS uses various approaches to estimate the different components of the tax gap. A primary source of information IRS uses is its National Research Program (NRP) study of individual tax returns. Through NRP, IRS examines a stratified, random sample of tax returns, and uses statistical modeling to produce estimates of noncompliance for the population of individual income tax return filers. Other areas of the tax gap are estimated using payment data or other statistical models. In 2016, IRS completed examinations for an NRP study on employment tax returns filed from tax years 2008 to 2010. IRS employees reported that they plan to start analyzing the results by June 2019. However, IRS has not provided plans for how it will use the results to update the current state of the employment tax gap estimate, as we previously recommended. The tax gap includes unintentional errors as well as intentional evasion, such as intentionally underreporting income, intentionally overreporting expenses, and engaging in abusive tax shelters or frivolous tax schemes. As we have previously reported, completely closing the tax gap is not feasible, as it would entail more intrusive enforcement and more burdensome recordkeeping or reporting than the public is willing to accept, and more resources than IRS is able to commit. However, even modest reductions would yield significant financial benefits and help improve the government’s fiscal position. Tax noncompliance, even when unintentional, could discourage compliant taxpayers and undermines the integrity of the tax system and the public’s confidence in it. For example, consider two groups of taxpayers with similar tax situations—those who pay the full amount of tax due and those who do not. Those who do not pay taxes are not meeting their obligation to fund government services, which, in effect, shifts the fiscal burden to those who do pay. Further, IRS devotes resources to attempt to collect taxes due from noncompliant taxpayers—resources that could be used for other purposes. In addition, noncompliance can create an unfair competitive advantage among businesses because those that do not pay tax debts are avoiding costs that tax-compliant businesses are incurring. For example, our past investigations identified instances in which federal contractors with tax debts won awards based on price differentials over tax compliant contractors. Our past work has found that three important factors contributing to the tax gap are the extent to which income is reported to IRS by third parties, IRS’s resource trade-offs, and tax code complexity. As we have previously reported, the extent to which individual income tax taxpayers accurately report their income is closely aligned with the amount of income that third parties report to them and to IRS. For example, according to 2008–2010 IRS data, taxpayers misreported more than half of the types of income for which there is little or no third-party information reporting, such as business income (see figure 3). In contrast, when employers both withheld taxes from, and reported information on, wages and salaries to employees and IRS (through Form W-2, Wage and Tax Statement), taxpayers misreported on only 1 percent of such income. Similarly, taxpayers misreported less than 10 percent of investment income that banks and other financial institutions reported to account holders and IRS (through Forms 1099). For items subject to substantial third-party information reporting, IRS is able to use automated processes to address noncompliance. The automated underreporter program, through which IRS matches amounts reported on tax returns with amounts reported on information returns submitted by third parties, is one such process. This computer matching program allows IRS to identify discrepancies between tax returns and information returns, and propose automatic changes to taxpayers. For items with little to no third-party information reporting, IRS must rely on more resource-intensive methods, such as correspondence or face-to- face examinations, to address noncompliance. While these examinations may be started by reviewing specific tax return line items, they may also be expanded to cover other areas of the tax returns if there are indications of misreporting in areas of the return not previously identified. However, it is harder for IRS to detect noncompliance in areas with little third-party information reporting. IRS’s budget declined by about $2.6 billion (18.8 percent) from fiscal years 2011 through 2019, and IRS’s budget for fiscal year 2019 is less than its fiscal year 2000 budget, after adjusting for inflation (see figure 4). Since fiscal year 2011, IRS staffing has fallen from 95,544 full-time equivalent employees to an estimated 75,676 in fiscal year 2019, a 20.8 percent reduction. At the same time, IRS faces increasing responsibilities, such as implementing relevant aspects of Public Law 115-97, which included significant changes to corporate and individual tax law. IRS also faces ever-evolving and significant challenges protecting taxpayer information, preventing identity theft and fraud, and modernizing an aging technology infrastructure. We previously reported that available staff has been a key factor in IRS decisions to scale back a number of program activities, such as examining tax returns, according to IRS officials. Our analysis of IRS data shows the rate of individual returns audited has declined between fiscal years 2011 and 2018 (see figure 5). Reducing examinations can reduce revenues collected through such enforcement action, and may indirectly reduce voluntary compliance. The federal tax system contains complex rules that may be necessary to appropriately target tax policy goals, such as providing benefits to specific groups of taxpayers. However, this complexity imposes a wide range of recordkeeping, planning, computing, and filing requirements upon taxpayers. For example, taxpayers who receive income from rents, self- employment, and other sources may be required to make complicated calculations and keep detailed records. This complexity can lead to errors and underpaid or overpaid taxes. Complexity, and the lack of transparency that it can create, can also exacerbate doubts about the tax system’s integrity. Tax expenditures—tax credits, deductions, exclusions, exemptions, deferrals, and preferential tax rates estimated by the Department of the Treasury to reduce tax revenue by about $1.38 trillion in fiscal year 2018—can add to tax code complexity. In part, this is because taxpayers must learn about, determine their eligibility for, and choose between tax expenditures that may have similar purposes. For example, as we reported in 2012, about 14 percent of filers in 2009 (1.5 million of almost 11 million eligible returns) did not claim an education credit or deduction for which they appeared eligible. The complexity involved with tax expenditures may be acceptable if they achieve their intended purposes. However, in many cases, their effectiveness is questionable or unknown. With some exceptions, tax expenditures generally are not subject to reauthorization and the annual congressional budget processes. We have recommended greater scrutiny of tax expenditures since 1994, as periodic reviews could help determine how well specific tax expenditures achieve their goals, and how their benefits and costs (including complexity) compare to those of other programs with similar goals. Such actions would help facilitate oversight and accountability of tax expenditures more in line with the performance management and reporting requirements of other federal programs. Paid tax return preparers and tax software developers help taxpayers navigate the complexities of the tax code. However, some paid preparers may introduce their own mistakes. For example, in a limited study in 2014, we found that seven of 19 preparers who completed returns for our undercover investigators made errors with substantial tax consequences while, only two preparers calculated the correct refund amount. Likewise, using NRP data, which are statistically representative, we estimated that 60 percent of returns prepared by preparers contained errors. IRS’s overall approach to reducing the tax gap consists of improving services to taxpayers, and enhancing enforcement of the tax laws. In spite of these efforts, the percentage at which taxpayers pay their taxes voluntarily and on time has remained relatively constant over the past three decades. Our past work has demonstrated that no single approach will fully and cost effectively address noncompliance since the problem has multiple causes and spans different types of taxes and taxpayers. In light of these challenges, we have made numerous recommendations to IRS that have not yet been implemented, as well as matters for congressional consideration. For example, in our most recent high-risk update, we highlighted various actions IRS should take to improve enforcement of tax laws and reduce the tax gap. Strategy for using compliance data. Developing and documenting a strategy that outlines how IRS will use data to update compliance strategies could help address the tax gap. For example, a strategy that outlines how IRS plans to use NRP data to update compliance programs and approaches would help IRS determine resource trade- offs and more fully leverage the investment it makes in compliance research, while providing Congress with a better understanding of the merits of the research it is being asked to fund. Voluntary compliance goal. A long-term, quantitative goal for improving voluntary compliance may provide IRS with a concrete target the agency can use in fulfilling its mission. Without a quantitative goal, it will be more difficult for IRS to determine the success of its strategies, adjust its approach when necessary, and remain focused on results, especially since factors that affect compliance change over time. Analyzing employment tax NRP study results. Developing and documenting plans to assess its NRP employment tax study results would help IRS (1) identify areas of noncompliance, (2) devise actions to address such noncompliance, and (3) update its employment tax gap estimate. Without completed analysis of the NRP employment tax study results, IRS risks using outdated data to make decisions about compliance and areas of the tax gap to pursue. Leveraging the Return Review Program. IRS’s Return Review Program (RRP) is a tool to detect and select potentially fraudulent returns to prevent the issuance of invalid refunds. Evaluating the costs and benefits of expanding RRP to analyze individual returns not claiming refunds could support other enforcement activities by streamlining the detection and treatment of other types of noncompliance and fraud. Given that the tax gap has been a persistent issue, reducing it will also require targeted legislative actions, such as those we highlighted in our 2019 high-risk update. Additional third-party information reporting. Expanding third-party information reporting to IRS could increase voluntary tax compliance. For example, reporting could be required for certain payments that rental real estate owners make to service providers, such as contractors who perform repairs on their rental properties, and for payments that businesses make to corporations for services. Enhanced electronic filing. Requiring additional taxpayers to electronically file tax and information returns could help IRS improve compliance in a resource-efficient way. For example, expanding the mandate for corporations to electronically file their tax returns could help IRS reduce return processing costs, select the most productive tax returns to examine, and examine fewer compliant taxpayers. Math error authority. Providing IRS with authority—with appropriate safeguards—to correct math errors and to correct errors in cases where information provided by a taxpayer does not match information in government databases, among other things, could help IRS correct errors and avoid burdensome audits and taxpayer penalties. Paid preparer regulation. Providing IRS with the authority to regulate paid tax return preparers could improve the accuracy of the tax returns they prepare. Chairman Neal, Ranking Member Brady, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact James R. McTigue, Jr. at (202) 512-9110 or mctiguej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this testimony include Jeff Arkin, Assistant Director; Robyn Trotter, Analyst-in-Charge; A.J. Stephens; and Alicia White. Other staff who made key contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The tax gap—the difference between tax amounts that taxpayers should have paid and what they actually paid voluntarily and on time—has been a persistent problem for decades. The tax gap estimate is an aggregate estimate of the five types of taxes that IRS administers—individual income, corporation income, employment, estate, and excise taxes. For each tax type, IRS attempts to estimate the tax gap based on three types of noncompliance: (1) underreporting of tax liabilities on timely filed tax returns; (2) underpayment of taxes due from timely filed returns; and (3) nonfiling, when a taxpayer fails to file a required tax return on time or altogether. This testimony discusses factors contributing to the tax gap and strategies to reduce it. This testimony is based on prior GAO reports on the tax gap and enforcement of tax laws, including those with open recommendations or matters for congressional consideration that could help reduce the tax gap. Enforcement of tax laws has been on GAO's High Risk List since its inception in 1990, and GAO has made various recommendations to IRS and suggestions to Congress to reduce the tax gap that have resulted in improvements. For example, GAO recommended that IRS consider comparing individuals' tax returns with the information educational institutions report to verify taxpayers' education tax benefits claims and suggested that Congress require brokers to report to both taxpayers and IRS the adjusted cost of the securities sold by taxpayers. These actions resulted in billions of dollars in additional revenue. The Internal Revenue Service's (IRS) latest tax gap estimate (2016) found that taxpayers voluntarily and timely paid about 81.7 percent of owed taxes for tax years 2008-2010, leaving an annual gross tax gap of $458 billion. IRS estimated a net tax gap—after late payments and enforcement actions—of $406 billion. GAO's work has found that three important factors contribute to the tax gap. Limited third party information reporting. The extent to which individual taxpayers accurately report their income is closely aligned with whether third parties (e.g., employers) report income (e.g., wages) to them and to IRS. IRS resource tradeoffs. IRS's budget and staffing levels have fallen over the past decade, and IRS faces increasing responsibilities, such as implementing Public Law 115-97—commonly known as the Tax Cuts and Jobs Act—which involved significant changes to tax law. Tax code complexity. The federal tax system contains complex rules that may be necessary to appropriately target tax policy goals; however, this can engender errors and lead to underpaid taxes. GAO's work has demonstrated that no single approach will fully and cost-effectively address noncompliance since the problem has multiple causes and spans different types of taxes and taxpayers. In light of these challenges, GAO has made numerous recommendations to IRS—some of which have not yet been implemented—such as developing and documenting a strategy that outlines how IRS will use data to update compliance approaches to help address the tax gap. Reducing the tax gap will also require targeted legislative actions. For example, expanding third-party information reporting could increase voluntary compliance and providing IRS with the authority to regulate paid tax return preparers could improve the accuracy of the tax returns they prepare.", "document_type": "gao"}
{"report": "Within DHS, ICE is responsible for immigration enforcement and removal operations. This entails, among other duties, identifying, arresting, and detaining foreign nationals for the administrative purpose of facilitating their appearance during removal proceedings, and for processing, and preparing them for removal from the United States, among other things. As such, ICE manages the nation’s immigration detention system, which houses foreign nationals detained while their immigration cases are pending or after being ordered removed from the country. ICE generally has broad discretion in determining whether to detain removable foreign nationals or release them under various conditions, unless the law specifies that detention is mandatory. Additionally, foreign nationals arriving at the U.S. border or a port of entry without valid entry documents and placed into expedited removal proceedings are required to be detained while awaiting an inadmissibility determination and, as applicable, any subsequent credible fear decision. Except in cases where detention is mandatory, ICE may release an individual pending the outcome of removal proceedings and has various release options for doing so, including the Alternatives to Detention program. While foreign nationals are detained, ICE is responsible for providing accommodations and medical care to individuals in detention with special needs or vulnerabilities, such as those who are pregnant. ICE’s December 2017 memo, Identification and Monitoring of Pregnant Detainees, sets forth policy and procedures to ensure pregnant detainees in ICE custody are identified, monitored, tracked, and housed in an appropriate facility. CBP is a component within DHS and the lead federal agency charged with a dual mission of facilitating the flow of legitimate travel and trade at our nation’s borders while also keeping terrorists and their weapons, criminals and their contraband, and inadmissible foreign nationals out of the country. CBP temporarily holds individuals to complete general processing and determine the appropriate course of action, such as transferring them to a court, jail, prison, or another agency; relocating them into ICE detention facilities; removing them from the country; or releasing them—as CBP has discretion to release individuals with a notice to appear in court. Within CBP, individuals, including pregnant women, could be held by Border Patrol or OFO. ICE detains individuals in both under-72-hour and over-72-hour detention facilities. Detention facilities may be for male only, female only, or both; and some are specifically reserved for family units (also known as family residential centers). ICE uses various types of detention facilities to hold detainees for more than 72-hours. These include ICE owned and operated detention facilities, also known as service processing centers, as well as facilities that ICE oversees but the day-to-day operations are generally run by another entity, as follows: contract detention facilities owned and operated by a private company under direct ICE contract that exclusively houses ICE detainees, facilities owned by state or local government or private entity, operating under an intergovernmental service agreement (IGSA), that exclusively houses ICE detainees or houses ICE detainees and other confined populations, and facilities owned by state or local government or private entity, operating under an intergovernmental agreement (IGA), or contract, with U.S. Marshals Service (USMS), that exclusively houses ICE detainees or houses ICE detainees and other confined populations. ICE detention facilities are generally required to adhere to one of four sets of detention standards. The detention standards vary depending on the contract or agreement. As we have previously reported, ICE’s detention standards are based on the American Correctional Association’s expected practices and have been updated when ICE identified issues of heightened concern or gaps in agency procedures. Some detention facilities used by ICE are not obligated to adhere to ICE’s detention standards—because, for example, ICE is a rider on the contract and the facility may be held to other standards. Further, on-site medical care may be directly provided by ICE Health Service Corps (IHSC) or other entities at these detention facilities. IHSC provides direct on-site medical services in 20 ICE facilities authorized to house detainees for over 72 hours. In addition to any applicable detention standards, IHSC staff must also adhere to IHSC policies. At detention facilities that are not staffed with IHSC personnel (non-IHSC facilities), medical care is provided onsite by local government staff or private contractors and overseen by IHSC. ICE inspects “authorized” detention facilities against detention standards and any applicable IHSC policies. Table 1 details information on each of the detention standards, the number of authorized facilities contractually obligated to each standard, the percent of the average daily population at each, and the presence of IHSC staff. CBP operates all of its short-term holding facilities and hold rooms, and does not utilize contract services for the management of individuals in CBP custody. In October 2015, CBP issued its first nationwide standards, which govern CBP’s interaction with detained individuals. The standards include requirements regarding transport, escort, detention, and search provisions, as well as care for “at-risk individuals”, which includes pregnant women. Given that CBP short-term facilities are intended to hold individuals for no more than 72 hours, CBP historically did not have on-site medical professionals at most of its facilities. However, as a result of surges in unaccompanied minors and families crossing the border, CBP issued a directive in January 2019 titled Interim Enhanced Medical Efforts (January 2019). According to the directive, enhanced medical services were needed to address growing public health concerns and mitigate risk to, and improve care for, individuals in CBP custody along the southwest border. The January 2019 directive was superseded by a December 2019 directive, Enhanced Medical Support Efforts, which also calls for medical support to mitigate risk to, and sustain enhanced medical efforts for persons in CBP custody along the southwest border. A related memo issued by the CBP Commissioner, titled CBP’s Expansion of Existing Medical Services Contracts and Expedited Deployment of Additional Contracted Medical Services Personnel to the Southwest Border, called for the expansion of CBP’s medical services contract to numerous Border Patrol facilities and OFO ports of entry along the southwest border. This effort is discussed later in our report. Number of pregnant women detentions. From calendar year 2016 through 2018, ICE had over 4,600 detentions of pregnant women. The number of detentions decreased from 1,380 in calendar year 2016 to 1,160 in 2017, and then increased to 2,098 in calendar year 2018 (see figure 1). Of the more than 4,600 detentions of pregnant women from calendar year 2016 through 2018, 32 percent involved pregnant women who were expedited removal cases and were subject to mandatory detention, including those that awaited a credible fear determination. Of the remaining detentions, 49 percent involved pregnant women who were deemed inadmissible and were either awaiting their hearing or an adjudication by an immigration judge, 11 percent involved pregnant women who had a final order of removal, and the remaining detentions (8 percent) involved various other immigration-related circumstances, such as those for which ICE was unable to obtain travel documents. Further, as we reported in December 2019, detentions of non-criminal pregnant women accounted for most of the total detentions of pregnant women each year (ranging from 91 to 97 percent). Length of detention. From calendar years 2016 through 2018, 68 percent of ICE detentions of pregnant women were for 7 days or less, 22 percent for 8 to 30 days, and 10 percent for more than 30 days, as shown in table 2. According to ICE officials, individual circumstances of each case dictate how long they detain a pregnant woman. For example, ICE may determine not to release a pregnant woman from ICE custody if her case is adjudicated quickly, she is ordered removed, and she is cleared to travel by a medical professional. Pregnancy outcomes. Our analysis of ICE data shows that from January 2015 through July 2019, 58 pregnant women in ICE custody experienced a miscarriage, two had an abortion, and one gave birth. Of those, 37 miscarriages and one birth involved women detained at IHSC-staffed facilities at the time of the outcome. Some of these women were in our study population of over 4,600 detentions from calendar years 2016 through 2018, but some were pregnant women detained in 2019. Detention facility. Our analyses of ICE data found that of the over 4,600 detentions of pregnant women, 78 percent of detentions of pregnant women were initially detained at an IHSC-staffed facility. See appendix II for more details on these data. According to ICE officials, pregnant women may first learn about their pregnancy when a test is performed during their intake into a detention facility. These over 4,600 detentions of pregnant women resulted in approximately 50,300 detention days with more than 66 percent of total detention days spent at IHSC-staffed facilities (see App. II). Some facilities may have a large number of detention days associated with the intake of pregnant women, but may not detain women for a long period of time before releasing or transferring them. For example, at a facility that had one of the largest number of detention days for pregnant women, officials stated that they generally release women once the pregnancy is confirmed. Further, according to ICE officials, ICE will try to transfer pregnant women from their initial detention facility to an IHSC- staffed detention facility or a family residential center—if she is part of a family unit—to ensure they are provided the appropriate accommodations and care. For example, ICE may transfer a pregnant woman awaiting a credible fear determination, as these cases may take longer to process and result in longer detention stays. However, an IHSC official also stated that ICE may detain pregnant women at non-IHSC facilities if ICE believes that the facility can provide the appropriate level of care. Nearly 70 percent of pregnant women’s detention days were spent at an IHSC- staffed facility or a family residential center. Contract detention facilities— both IHSC-staffed and non-IHSC—had the highest average number of days for the detention of pregnant women, as shown in table 3. Gestation of pregnancy. Of the 1,450 detentions of pregnant women for which gestation data were available, 49 percent were for women in their first trimester and 41 percent were for women in their second trimester at the time of intake. Ten percent were for women in their third trimester at the time of intake. Of the detentions involving pregnant women in their third trimester, 75 percent were released within one week or less, 9 percent between 8 and 15 days, and the remaining 16 percent between 16 and 90 days. According to ICE officials, ICE does not detain pregnant woman in their third trimester or a pregnant woman who is unlikely to be removed. However, officials stated that there are instances when it takes ICE time to gather information prior to making a custody determination— such as when it needs to collect criminal conviction data to making a custody determination—which could result in detained pregnant women who are nearing or in their third trimester. This is consistent with what ICE officials told us during our visits to facilities in all four locations—that they generally do not detain pregnant women in their third trimester. However, some explained, that pregnant women in their third trimester may be detained if, for example, they are subject to mandatory detention. Number of pregnant women. Because of CBP facilities’ short-term nature and limited on-site medical care, CBP does not routinely conduct pregnancy tests of women in their custody, and as such, has limited data on pregnancy. However, ICE data provide insight into CBP encounters with pregnant women. Specifically, our analysis of ICE data from calendar years 2016 through 2018 indicated that nearly 4,400 of ICE’s over 4,600 detentions of pregnant women resulted from CBP arrests. In addition, OFO and Border Patrol collected some data on women in their custody who reported being pregnant. OFO reported holding over 3,900 pregnant women from March 2018 through September 2019 at its ports of entry. At the two sectors where Border Patrol is required to collect such data, Border Patrol reported holding over 750 pregnant women in its facilities from March 2017 through March 2019. As shown in table 4, most of these women reported being in their second or third trimester. These women may have been transferred to ICE and may also be included in the count of pregnant women detained by ICE. In accordance with its January 2019 directive, Interim Enhanced Medical Efforts (January 2019), CBP developed a standardized health interview form that can be used by Border Patrol and OFO. The form includes a question about pregnancy and nursing which could allow for additional data on the number of women in CBP custody that report being pregnant. In December 2019, CBP officials told us that they distributed the form to its field locations. Pregnancy Outcomes. In addition, we reviewed CBP significant incident reports to determine if any pregnant woman encountered or held by CBP had experienced a birth, stillbirth, or miscarriage during calendar year 2015 through February 2019. Our analysis of CBP reports during this time frame found that pregnant women encountered or apprehended by CBP experienced 43 births, three miscarriages, and six stillbirths after being taken to the hospital by CBP. In some of these incidents, Border Patrol agents encountered pregnant women in the field and took them directly to the hospital. In these cases, the pregnant woman was not in a Border Patrol facility directly prior to being taken to the hospital. ICE has policies and detention standards that address a variety of pregnancy-related topics regarding the care of pregnant women, such as pregnancy testing requirements, the use of restraints, and prenatal care. However, we identified certain facility types that did not address all pregnancy-related topics in their policies or detention standards as of December 2019, which ICE is taking actions to address. Appendix III details ICE’s policies and detention standards related to the care of pregnant women in detention. For the purpose of our analysis, the facility type is based on contractually obligated detention standards and the presence of IHSC staff, as these factors dictate which detention standards the facility type is required to adhere to and whether IHSC policies apply. Specifically, we identified 16 topics related to the care of pregnant women and found that in most facility types, ICE had at least one policy or detention standard that addressed many of these topics. Further, we found that if the facility type had policies or detention standards in place regarding a specific topic on the care of pregnant women, at least one of the policies or detention standards generally aligned with recommended guidance from professional associations, NGOs, and federal agencies, (see app. IV for our summary of recommended guidance and associated examples). In addition, we found that from calendar years 2016 through 2018, 64 percent of the detentions of pregnant women were initially detained at the two facility types that had the most policies or detention standards related to each of the pregnancy topics, as of December 2019. Table 5 shows whether policies or detention standards at the various facility types addressed each of the 16 topics, as well as the associated number of detentions of pregnant women—based on the facility in which they were first detained and number of detention days from calendar years 2016 through 2018. ICE is taking numerous actions to address these gaps in its policies and detention standards. For example, according to ICE officials, ICE has updated, or is in the process of updating, its policies and detention standards, and these updates will address many of the gaps that we identified for the pregnancy-related topics. Specifically, ICE revised its 2000 NDS in December 2019 and the 2007 Family Residential Standards are under revision and will be sent to management for review in February 2020. According to IHSC officials, the revised standards will address all of the gaps we identified for 2007 Family Residential Standards and 2000 NDS facility types. Further, IHSC officials stated that they are revising IHSC’s Women’s Health Directive and guidance on care for chronic conditions to include required and recommended vaccines for pregnant women and HIV care, respectively—which will address these gaps at IHSC-staffed facilities. Finally, according to ICE officials, facility types operating under the 2008 PBNDS will be modified to either the 2019 NDS 2019 or 2011 PBNDS. In addition to these updates, in accordance with ICE’s December 2017 memo on Identification and Monitoring of Pregnant Detainees, ICE is to ensure pregnant detainees receive appropriate medical care, and ensure detention facilities are aware of their obligations regarding directives and detention standards that apply to pregnant detainees, among other things. ICE has mechanisms for maintaining oversight of pregnant detainees, as required by policy. Specifically, ICE collects data to monitor the condition of pregnant women in its custody, and according to ICE officials, ensures that the facility can accommodate the woman. In addition, IHSC conducts weekly reviews that focus on high-risk pregnancies, pregnancies in the third trimester, and recent miscarriages. According to an IHSC official, ICE inspections can contribute to IHSC’s understanding of the care of pregnant women at a given facility. Further, although ICE officials stated that it does not have training dedicated to the care of pregnant women in ICE detention specifically, its basic training includes instruction on pregnant detainees. This training is in addition to the professional qualifications of medical staff onsite. CBP has some policies and standards regarding the care of pregnant women held in their short-term facilities. Specifically, CBP has national standards on the transport, escort, detention, and search of detainees, with specific requirements for pregnant women. For example, these standards state that barring exigent circumstances, CBP must not use restraints on pregnant detainees unless they have demonstrated or threatened violent behavior, have a history of criminal or violent activity or an articulable likelihood of escape exists. Further, Border Patrol and OFO have policies that address nutrition and special accommodations for pregnant women. See appendix V for more details on CBP policies related to pregnant women. Although these policies and national standards do not cover the full range of the 16 pregnancy-related care topics we identified, CBP facilities are designed for holding individuals for no more than 72 hours; therefore, CBP’s facilities are not equipped to provide long-term care. Specifically, CBP does not routinely conduct pregnancy testing and historically it did not have on-site medical care at all its facilities. For the policies and standards that CBP does have in place regarding pregnant women, we found that they generally aligned with the recommended guidance from expert and professional organizations. In addition to policies that direct the care of pregnant women, although CBP does not have training dedicated to the care of pregnant women specifically, CBP provides initial and annual refresher training on its national standards for the transport, escort, detention, and search of detainees, which includes requirements for pregnant women. ICE uses various inspections for accessing facilities’ compliance with policies and detention standards—the frequency and focus of which vary. Some inspections also include pregnancy-related performance measures, such as a measure assessing whether a pregnancy test was performed at intake. We reviewed results from the five ICE inspections that address compliance with pregnancy-related policies and detention standards from 2015 through June 2019. These inspections vary in their scope and targeted facility types (see app. I for more details on each of these inspections). These inspections—along with available medical data—offer insight into the care of pregnant women. Two inspections include pregnancy-related performance measures, and compliance with these measures ranged from 53 to 100 percent, with most indicating 79 percent or more compliance. Specifically, one inspection of 129 ICE detention facilities—that included inspections of both IHSC-staffed and non-IHSC facilities—found that compliance was 91 percent or more for each of the six performance measures from December 2016 through March 2019, as shown below. Pregnancy testing performed at intake: 93 percent Pregnancy testing performed prior to x-rays or initiating medication: 100 percent Obstetrician-gynecologist (OB-GYN) consult ordered within 7 days of pregnancy confirmation: 98 percent Patient seen by OB-GYN within 30 days of pregnancy confirmation: Prenatal vitamins prescribed: 100 percent Screened for HIV, sexually transmitted infections, and viral hepatitis: Instances of non-compliance—which were 9 percent or less for each measure—occurred at 16 detention facilities subject to a range of detention standards. Three of these facilities were IHSC-staffed facilities, and 13 were non-IHSC facilities. IHSC documentation indicates that corrective actions are to be implemented to help address inspection findings. See appendix VI for details on the number of records reviewed during the inspections, and the compliance rates. Our analysis of available medical data and interviews with pregnant detainees showed similar findings regarding pregnancy testing at intake. Specifically, from calendar year 2016 through 2018, 92 percent of women in ICE detention facilities received a pregnancy test either the same day as intake to the facility or the next day. This could include women who arrived at a detention facility in the evening and are tested the next day. Of the remaining, 3 percent were tested within 2 to 3 days of intake, 4 percent were tested between 4 days and 2 weeks, and 2 percent were tested after 2 weeks of being detained. According to the 10 pregnant women we interviewed who were detained at 3 ICE detention facilities we visited, all 10 stated that they received a pregnancy test when they arrived at the facility or within the same day. For the second inspection that included performance measures related to the care of pregnant women at IHSC-staffed facilities, overall compliance was 79 percent or more for most of the nine performance measures from fiscal years 2015 through 2018. The following shows the minimum level of overall compliance for all facilities during this timeframe. OB-GYN consult ordered and documented within 7 days of pregnancy Patient seen by OB-GYN within 30 days: 92 percent Prenatal vitamins prescribed: 95 percent Detainee education documented at each encounter: 79 percent Records reviewed by provider after OB appointment: 79 percent Proper diet ordered: 86 percent Appropriate labs ordered if not obtained from OB-GYN: 79 percent Pregnant patient screened for HIV, sexually transmitted infections, and viral hepatitis: 81 percent Hepatitis B vaccine offered: 53 percent However, for one measure—whether the Hepatitis B vaccine was offered—compliance was 53 percent. ICE officials stated that this performance measure reflects recommended practices but is not specifically required by policy or detention standards. According to ICE officials, any issues identified during IHSC inspections are handled locally at the field level through facilities’ quality improvement processes, which includes developing corrective action plans. See appendix VI for the average annual compliance for each measure from fiscal years 2015 through 2018. Our analysis of available medical data for IHSC-staffed facilities and interviews with pregnant detainees and NGOs provides additional perspectives regarding these issues on the care of pregnant women. Specifically, our analysis of ICE data showed 422 detentions in which a pregnant woman was in an IHSC-staffed facility at some point received at least one referral to an OB or OB-GYN between calendar year 2016 and 2018. Based on ICE’s performance measures, pregnant women are to receive an OB-GYN referral within 7 days of pregnancy confirmation— although available data showed that most pregnant women were being released from detention within 7 days. In addition, our analysis of ICE data showed that detentions in which a pregnant woman was in an IHSC- staffed facility at some point were assigned certain special needs, such as a special diet (1,245), lower bunk (113), no heavy lifting (87), and limitations on the use of restraints (316). In addition, all 7 of the pregnant women we spoke with in IHSC-staffed detention facilities said that they received appropriate accommodations, such as a lower bunk and blankets. Similarly, 6 of the 7 pregnant women we spoke with at IHSC-staffed facilities said that they were provided proper nutrition and snacks. The other pregnant woman did not discuss the adequacy of the nutrition she was provided. In addition, both of these two inspections provided insights into OB-GYN referrals and prenatal vitamins that were generally similar to the information we obtained from pregnant detainees at the locations we visited. Specifically, the above inspections indicated 75 to 98 percent compliance on performance measures related to access to OB-GYN care. Eight of the 10 pregnant women we spoke with in ICE detention did not express concerns about access to OB-GYN when asked about the sufficiency of medical care. However, two stated that they would like more timely access to an OB-GYN, and they did not know when their appointments would occur. In addition, representatives from three NGOs stated that they heard concerns about pregnant women not having access to OB-GYN care or prenatal vitamins. Further, the above inspections indicated 95 to 100 percent compliance on performance measures related to prescribing prenatal vitamins, and all 10 of the pregnant women we spoke with in ICE detention said that they were provided prenatal vitamins. Although they did not have specific performance measures, three additional inspections identified 19 findings related to the care of pregnant women. All of the findings occurred at non-IHSC facilities. Three of the 19 findings indicated that medical care was not provided or offered. For example, one pregnant woman was not offered a mental health assessment after reporting that she had a miscarriage at a prior facility. Seven included a recommendation to provide additional medical care, such as pregnancy testing. Four indicated insufficient documentation, such as medical records that were not transferred between facilities, or no documentation that pregnancy testing had occurred. Five indicated that a required policy did not exist or did not specify the required standards of care. All but one of the facilities inspected took corrective actions to address the findings. For example, one inspection found that the facility’s initial health assessment form did not address pregnancy testing. In response, the facility updated its intake screening form to include pregnancy testing. ICE determined that the facility that did not implement corrective actions to address deficiencies identified during the inspection would not be used for the detention of ICE detainees. See appendix VI for additional information on each deficiency, recommendation, and corrective action. Additionally, our review of available data and interviews with pregnant detainees and officials at the locations we visited provided insight into issues related to segregation and the use of restraints—generally finding that these were rarely used. Specifically, our review of ICE data identified two pregnant women who were initially detained from 2015 through 2018, and segregated at some point during their detention—one for 8 days and one for over 4 months. In both cases, ICE reported the reason for the segregation was that the detainee was a threat to the facility’s security. Further, all 10 of the pregnant women we interviewed stated that they had not been segregated, and all the detention officials we interviewed at the four locations we visited stated that they were not aware of any instances of pregnant women being segregated. Similarly, none of the 10 pregnant detainees reported being placed in restraints, and the officials we interviewed at the four locations generally stated that pregnant women are not to be restrained except in extreme circumstances, such as risk of violence or escape—which is consistent with ICE policies and standards. One official said that he was aware of an incident where a pregnant woman was restrained when she attempted to harm herself and her child. In addition, officials from five local organizations or coalitions we spoke with stated that they had not heard concerns about instances of the use of restraints or segregation. CBP generally relies on offsite care for pregnant women, and as a result, has limited available information on care CBP provided to pregnant women. However, they have efforts underway to enhance its medical support at selected facilities. As previously discussed, CBP facilities are designed for short-term care, and CBP does not routinely administer pregnancy tests and generally did not have on-site medical personnel. According to CBP officials, they typically refer individuals to local medical providers in their area, as appropriate and for all emergent or serious issues—including concerns presented by pregnant women. In addition, if CBP needed to provide a pregnancy test to a woman in its custody, it would take the woman to an offsite medical provider. Our analyses of available data indicate that CBP took pregnant women for a hospital visit or admission at least 168 times from 2015 through 2018. See table 6 for additional information. Ninety-nine percent of these hospital trips involved Border Patrol, while the remaining 4 percent involved OFO. Although CBP generally relies on offsite care for pregnant women, CBP established some on-site medical care and has efforts underway to enhance its medical support at additional Border Patrol facilities and OFO ports of entry. Specifically, one port of entry and three Border Patrol facilities established on-site medical care in 2013 and 2015, respectively. CBP officials at one of these locations told us that they developed on-site medical care based on the volume of crossings, as well as the operational costs for transporting individuals to offsite medical facilities and performing hospital watches. Subsequently, CBP’s January 2019 memo regarding enhanced medical efforts at CBP facilities included efforts to expand medical support. According to a senior CBP official, the agency had staffed more than 40 Border Patrol facilities and OFO ports of entry along the southwest border with on-site contracted medical care, as of January 2020. According to CBP officials, contracted medical staff provide enhanced medical support through initial health intake interviews, medical assessments, diagnosis, treatment, referral, and follow up for persons in custody, including pregnant women. CBP officials stated that they will continue to rely on offsite care to provide emergency or advanced care. DHS has various processes to obtain and address the hundreds of medical care complaints it receives annually. Specifically, an individual can file a complaint directly to facilities, ICE, CBP, and other DHS entities, including the Office of Inspector General and Office for Civil Rights and Civil Liberties (CRCL). We identified 107 unique complaints that detainees, family members, NGOs, or other parties submitted to various entities from January 2015 through April 2019—54 that involved ICE’s care of pregnant women, 50 that involved CBP, and 3 that involved both. As shown in figure 2, some of these complaints were under investigation as of August 2019, and some were substantiated; however, in most cases there was not enough information for the investigating agency to determine if proper care had been provided, among other things. Regarding the complaints against ICE, the most common type was that ICE allegedly did not provide medical care, or that the medical care was not quality or timely. See appendix VIII for additional information about the number and types of complaints submitted. Eleven of the 54 complaints against ICE remained open as part of an on- going investigation, while the remaining 43 were closed. Of the 43 complaints that were closed: An investigation substantiated one complaint that prenatal vitamins had not been provided at an IHSC-staffed facility. In response, ICE reported taking actions to address the complaint. Investigations partially substantiated one complaint regarding delays in medical care being provided. According to ICE, the delays had resulted from the time required to get medication approved. In response to the complaint, ICE reported coordinating with the facility to address the issues identified. Investigations found that 18 complaints were unsubstantiated. For example, ICE’s review of medical records found that appropriate care had been provided. For the remaining 23 closed complaints, the complaint was not substantiated or unsubstantiated for a variety of reasons. For 11 complaints, the investigating agency determined that it did not have enough information to conduct an investigation, or the agency investigated the complaint but did not have enough information to establish whether the complaint was substantiated or unsubstantiated. For example, the allegation did not contain detailed biographical information, medical records did not contain enough information, or the detainee had been released and the agency could not follow-up. For the remaining 12 complaints, agency documentation did not clearly specify whether the complaint was substantiated or unsubstantiated. Regarding complaints against CBP, the most common type was that pregnant women had allegedly been physically, verbally, or otherwise mistreated. See appendix VIII for additional information about the number and types of complaints submitted. Of the 50 complaints against CBP, four remained open as part of an on- going investigation, while the remaining 46 were closed. Of the 46 complaints that were closed: An investigation substantiated one complaint that a Border Patrol agent violated social media policy by posting a picture and information about a pregnant woman in custody. In response, CBP reported that the employee was suspended for two days. Investigations found that five complaints were unsubstantiated, and one was partially unsubstantiated. For example, an investigation included a review of video footage at a port of entry, among other things, and found that excessive force had not been used. Eight complaints described an event that occurred, such as a miscarriage, but the complaint did not allege that mistreatment or improper care occurred. For the remaining 31 closed complaints, the complaint was not substantiated or unsubstantiated—for a variety of reasons. For 10 complaints, the investigating agency determined that it did not have enough information to conduct an investigation, or the agency investigated the complaint but did not have enough information to establish whether the complaint was substantiated or unsubstantiated. For the remaining 21 complaints, agency documentation did not clearly specify whether the complaint was substantiated or unsubstantiated. With regard to the three complaints that involved allegations against both ICE and CBP, one remained open as part of an on-going investigation, while the other two complaints were found to be unsubstantiated. We provided a draft of this report to DHS for review and comment. DHS provided comments, which are reproduced in appendix IX. DHS also provided technical comments, which we incorporated as appropriate. In addition, we provided relevant excerpts of the report to American College of Obstetricians and Gynecologists, American Correctional Association, and National Commission on Correctional Health Care for review. Officials from these entities provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees and the Acting Secretary of the Department of Homeland Security. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or goodwing@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix X. This appendix provides additional details on selected methodologies used to address our questions. Specifically, this includes information on our analyses of U.S. Immigration and Customs Enforcement (ICE) data and inspection findings and Department of Homeland Security (DHS) complaints used to address these questions: 1. What do available data indicate about pregnant women detained or held in DHS facilities? 2. What policies and standards does DHS have to address the care of pregnant women, and to what extent are they applicable across all facilities? 3. What is known about the care provided to pregnant women in DHS facilities? To address our first and third objectives, and provide context for our second objective, we reviewed data sources that ICE uses to track pregnant women in detention from calendar years 2016 through 2018 and matched these data with various ICE databases. We selected these years since ICE first collected data on all pregnant women beginning in June 2015, and 2018 was the last full year of available data for our audit. Specifically, we matched ICE Health Service Corps (IHSC) records for pregnant women detained during calendar years 2016 through 2018 with individual-level detention dataset the ICE Integrated Decision Support (IIDS) database to determine the total number of detentions of pregnant women, as well as the length of detention, facility location, case category status, arresting agency, gestation of pregnancy, when the pregnancy test was conducted, and whether there is an associated criminal conviction (criminality). To conduct our analyses, we matched pregnancy data to the IIDS detention data using alien number and excluded additional records we were unable to match. Because individuals may have multiple detentions, we compared the admission or book-in date from each data source with the book-in dates from the IIDS detention data, and excluded additional records with dates more than 30 days apart. ICE collected data for 1,437 pregnant detainees in 2016; 1,170 in 2017; and 2,126 in 2018. We excluded 60 of the unique pregnant detainee records for 2016; 20 for 2017; and 32 for 2018 because we were unable to match these records to the IIDS individual-level detention data using alien number and book-in date combinations. According to ICE officials, this may be due to data entry errors. As a result, our analyses are based on over 4,600 detainee records we were able to match: 1,377 for 2016; 1,150 for 2017; and 2,094 for 2018. In general, this was our study population, unless otherwise noted in the report. We also merged the detention data with data from ICE’s weekly facility list report, as of February 2019, to determine who owned and operated the facility, whether it was staffed by IHSC officials, and in what state the facility was located. Further, we merged additional IHSC data with our study population to determine the number of obstetrician-gynecologist referrals and numbers that were assigned certain special needs, such as a special diet, lower bunk, no heavy lifting, and limitations on the use of restraints. We also obtained and analyzed data from ICE’s Segregation Review Management System to determine if any of the pregnant women had been segregated. Finally, we analyzed ICE IHSC data on pregnancy outcomes—abortions, births, stillbirths, and miscarriages. These women who experienced such outcomes while detained may include the same women reported in our study population of more than 4,600 pregnant women detentions from calendar years 2016 through 2018, as well as pregnant women detained in calendar year 2015 and January through June 2019. We did not merge the outcome data with our other data sets, but were able to confirm that most of the outcomes were associated with alien numbers from the over 4,600 detentions in our study population. We assessed the reliability of the data used in each of our analyses by analyzing available documentation, such as related data dictionaries; interviewing ICE officials knowledgeable about the data; conducting electronic tests to identify missing data, anomalies, or potentially erroneous values; and following up with officials, as appropriate. We determined the data were sufficiently reliable for describing general information on pregnant women detained by ICE, as well as the care provided to them. To address our third objective, we analyzed reports and data from five ICE inspections that address compliance with pregnancy-related policies and detention standards from 2015 through July 2019—the most recent information available at the time of our review. We selected these inspections because they review some aspect of the care provided to pregnant women. Table 7 provides additional information on these inspections. As noted in the table, two of these inspections contained pregnancy- related performance measures. The remaining three inspections assess compliance and identified findings related to the care of pregnant women, but did not have specific performance measures. For the three inspections that did not contain performance measures, we categorized the nature of each finding, such as a recommendation to provide additional medical care. We developed these categories based on a content analysis of the inspection findings, which involved one analyst categorizing the finding and a second person verifying the categories. If there were differences in analyses, these were reconciled through discussion between the two analysts and a final determination of the appropriate category was made. We also analyzed ICE documentation on corrective actions that facilities reported taking to address inspection findings, and used ICE facility data to determine who provided medical care at these facilities. To determine the scope and any limitations of inspection reports and data, we spoke with agency officials responsible for managing these inspections and the data systems used for documenting results. We also reviewed relevant documentation, such as data dictionaries and inspection worksheets. We determined that these data were sufficiently reliable for our purposes of describing the results of inspections regarding the care of pregnant women in ICE custody. We reviewed and categorized complaints that detainees, family members, non-governmental organizations, or other parties submitted to various entities from January 2015 through April 2019—the latest available complaints at the time of our review—regarding ICE and CBP’s care of pregnant women. Specifically, we reviewed complaint data from DHS’s Office for Civil Rights and Civil Liberties (CRCL), DHS’s Office of Inspector General, and IHSC. We selected these complaint systems because, according to DHS officials, they contained relevant information on the care of pregnant women, could be queried in an electronic format, and minimized duplicate complaints across systems. We categorized each complaint based on a content analysis of the complaint narrative, which involved one analyst categorizing the complaint and a second person verifying the category. If there were differences in analyses, these were reconciled through discussion between the two analysts and a final determination of the appropriate category was made. We developed categories for 10 pregnancy outcomes, including births or miscarriages at a DHS facility or hospital, as well as 20 categories to describe the nature of the concerns, including physical mistreatment, use of restraints, or medical care not provided. The total number of concerns identified in our analysis exceeds the number of unique complaints filed because each unique complaint may identify more than one area of concern. We also used ICE facility data to determine, for example, who provides medical care at the facilities where the alleged events occurred. In addition, we analyzed agency documentation on the extent to which complaints could be substantiated, and any corrective actions that agencies and facilities reported taking to address complaints. To determine the scope and any limitations of the complaint information we received, we spoke with agency officials responsible for managing these complaint processes and the data systems used for documenting results. We also reviewed relevant documentation, such as user manuals for complaint systems. This appendix provides additional details on our analyses of U.S. Immigration and Customs Enforcement (ICE) data from calendar years 2016 through 2018 on (a) where pregnant women were initially detained and (b) facilities that had the largest number of detention days involving pregnant women. In particular, these analyses describe whether the facility has ICE Health Service Corps (IHSC) staff and who owns and operates the facility, based on contracts or agreements. Initial detention facility. Our analyses of ICE data found that of the over 4,600 detentions of pregnant women, in regards to IHSC presence, almost 78 percent of detentions of pregnant women were initially detained at an IHSC-staffed facility. Further, 51 percent were at service processing centers that are owned and primarily operated by ICE, all of which were also staffed by IHSC, as shown in table 8. According to ICE officials, many pregnant women first learn about their pregnancy when a test is performed during their intake into a detention facility. Although pregnant women were initially detained in various facility types—based on IHSC presence and who owns and operates the facility, most occurred in eight specific detention facilities located in three states. Specifically, of ICE’s over 4,600 pregnant women detentions from calendar year 2016 through 2018, 86 percent were initially detained in one of eight of these detention facilities—with one facility having 45 percent of the intakes of pregnant women. Facilities with the most number of detention days. For these over 4,600 detentions of pregnant women, ICE detained them for a total of almost 50,300 days from calendar year 2016 through 2018. Our analyses of ICE data found that of the 50,300 detention days of pregnant women, in regards to IHSC presence, 66 percent of these days were at an IHSC-staffed facility. Further, over half were at intergovernmental service agreement facilities—including family residential centers, as shown in table 9. Some facilities may have a large number of detention days associated with the intake of pregnant women, but these facilities may not detain women for a long period of time before releasing or transferring them. For example, at a facility that had one of the largest number of detention days for pregnant women, officials stated that they generally release women once the pregnancy is confirmed. Although pregnant women spent their detention days in various facility types—based on IHSC presence and who owns and operates the facility, most occurred in 19 specific detention facilities located in seven states. Specifically, of those days that pregnant women were detained by ICE, 89 percent of these days were in one of these 19 detention facilities. U.S. Immigration and Customs Enforcement (ICE) detention facilities and staff are subject to a variety of policies, including ICE-wide policy directives and memoranda, ICE Health Service Corps (IHSC) policies, and detention standards, as of December 2019. We categorized and summarized these policies and standards, as shown below. ICE-wide policies are directed at ICE staff and officers, and not to contractors or facility staff. The following ICE policies address pregnant detainees and ICE supervision of pregnant detainees: ICE Directive 11032.3: Identification and Monitoring of Pregnant Detainees (2017) ICE Directive 11065.1: Review of the Use of Segregation for ICE Detainees (2013) ICE Directive 11002.1: Parole of Arriving Aliens found to Have a Credible Fear of Persecution or Torture (2010) ICE Memorandum: Use of GPS Monitoring Devices on Persons who are Pregnant or Diagnosed with a Severe Medical Condition (2009) ICE ERO Policy 11155.1: Use of Restraints (2012) Enforcement and Removal Operations National Detainee Handbook (2016) These ICE-wide policies do not apply to contract or facility staff unless ICE modified the facility’s contract or if these are already included in the facility’s detention standards to which they are obligated. However, the National Detainee Handbook is a resource for detainees at detention facilities operating under ICE detention standards, excluding family residential centers. We categorized these policies and summarized them accordingly. Intake health screening inquiries about pregnancy. The policy refers to ICE’s responsibility to monitor detention facilities and ensure they meet national detention standard requirements to provide all newly admitted detainees an initial medical screening including pregnancy screening. ICE Directive 11032.3: Identification and Monitoring of Pregnant Detainees (2017) Provision of prenatal care. ICE supervisory staff have responsibilities to ensure that pregnant detainees receive appropriate medical care, including transfer to a different facility if necessary. ICE medical staff also have a responsibility to monitor the condition of pregnant detainees and communicate any concerns to supervisory staff. ICE Directive 11032.3: Identification and Monitoring of Pregnant Detainees (2017) Enforcement and Removal Operations National Detainee Handbook (2016) Segregation of pregnant women. ICE has a responsibility to monitor the use of segregation at detention facilities to ensure that they are adhering to detention standards. ICE Directive 11065.1: Review of the Use of Segregation for ICE Detainees (2013) Use of restraints on pregnant women. Officers should take reasonable precautions to avoid causing discomfort when transporting a restrained detainee. At processing sites or non-ICE detention facilities, ICE personnel shall follow local policies and procedures. ICE ERO Policy 11155.1: Use of Restraints (2012) Record keeping on pregnant women actions. ICE supervisors should ensure that ICE staff and contracted medical staff have processes to notify them of the arrival of a pregnant woman to a detention facility and ensure staff and facilities are aware of their obligations regarding pregnant detainees. IHSC staff are responsible for monitoring the condition of pregnant women while detained, as well as maintaining their medical records. Any instance of segregation of a pregnant woman must be documented in writing. ICE Directive 11032.3: Identification and Monitoring of Pregnant Detainees (2017) ICE Directive 11065.1: Review of the Use of Segregation for ICE Detainees (2013) IHSC policies are directed specifically toward IHSC staff at detention facilities where IHSC provides medical services. The following IHSC policies address pregnant detainees: ICE Directive 11772.2: Women’s Health Services (2017) ICE Directive 11741.4: Health Assessment (2016) ICE Directive 11742.2: Pre-Screening (2015) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) We categorized these policies and summarized them accordingly. Intake health screening inquiries about pregnancy. Intake screening includes pregnancy testing of women 10 to 56 years of age as well as questioning of pregnancy status. ICE Directive 11772.2: Women’s Health Services (2017) ICE Directive 11742.2: Pre-Screening (2015) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) Pregnancy testing at intake. Intake screening includes pregnancy testing of women 10 to 56 years of age and inquiry of reproductive health including previous pregnancies. ICE Directive 11772.2: Women’s Health Services (2017) ICE Directive 11741.4: Health Assessment (2016) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) Access to abortion. In the event of a threat to a woman’s life from carrying a pregnancy to term, or else in cases of rape or incest, ICE must bear the cost of a detainee’s decision to terminate a pregnancy; otherwise the woman must bear the cost. ICE should offer medical resources to support effective recovery and follow-up care. ICE Directive 11772.2: Women’s Health Services (2017) Provision of prenatal care. Pregnant women should be seen by medical providers at least once a month while detained. They should also be referred to an obstetric specialist, and their medical records shared with the specialist to facilitate care. ICE Directive 11772.2: Women’s Health Services (2017) ICE Directive 11741.4: Health Assessment (2016) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) Provision of postnatal care. A postpartum detainee must receive postnatal care from a medical provider, in consultation with an obstetric specialist, at least once a month. ICE Directive 11772.2: Women’s Health Services (2017) Mental health services and counseling for pregnant women. Any female detainee who gave birth, miscarried, or terminated a pregnancy within the last 30 days must receive a mental health evaluation, with the evaluation to occur no later than 72 hours after initial referral. ICE Directive 11772.2: Women’s Health Services (2017) Care for pregnant women with substance use disorder. Chemically dependent pregnant women are considered high-risk and should be referred to an obstetrician or other appropriate medical provider as soon as they are identified. ICE Directive 11772.2: Women’s Health Service (2017) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) Use of restraints on pregnant women. Pregnant detainees or those in postdelivery recuperation should not be restrained except in extraordinary circumstances that are documented by a supervisor or directed by a medical authority, whether in an ICE detention facility, in transport, or at a medical facility. Detainees in active labor or delivery can never be restrained. Even if restraints are used, a pregnant woman should never be restrained face down or on her back, or restrained with a belt that constricts the abdomen or pelvis. ICE Directive 11772.2: Women’s Health Service (2017) Record keeping on pregnant women actions. Intake screenings and assessments including pregnancy test results must be documented, as are risk factors for high risk pregnancies. Any use of restraints or request for abortion services must be documented. ICE supervisory staff must be notified within 72 hours of the arrival at a detention facility of a pregnant woman. ICE Directive 11772.2: Women’s Health Service (2017) ICE Directive 11741.4: Health Assessment (2016) ICE Directive 11744.2: Intake Screening and Intake Reviews (2016) Entities that have a contract or agreement with ICE to hold immigration detainees are generally contractually obligated to one of four sets of detention standards. These standards address a range of our pregnancy- related categories of care and vary by standard. 2000 ICE National Detention Standards (NDS) 2007 ICE Family Residential Standards (FRS) 2008 ICE Performance-Based National Detention Standards 2008 (2008 PBNDS) 2011 ICE Performance-Based National Detention Standards 2011 (2011 PBNDS) We categorized these standards and summarized them accordingly. The 2011 PBNDS standards received revision in 2016. Whether a 2011 PBNDS facility is contractually required to adhere to the 2016 revision is dependent upon the contract language negotiated in each agreement. Where appropriate, the summaries below note changes to policy as a result of those revisions. Intake health screening inquiries about pregnancy. 2008 PBNDS: Initial screening should be done within 12 hours of arrival and should inquire about the possibility of pregnancy. 2011 PBNDS: Initial screening should be done within 12 hours of arrival and should inquire about the possibility of pregnancy. In the 2016 revisions, the evaluation also includes a pregnancy test for women aged 18 to 56. Pregnancy testing at intake. 2008 PBNDS: Initial screening should be done within 12 hours of arrival and should inquire about the possibility of pregnancy. 2011 PBNDS: In the 2016 revisions, initial screening includes pregnancy testing of women 18 to 56. Access to abortion. 2011 PBNDS: If the life of the mother is endangered by carrying the fetus to term, or in the case of rape or incest, ICE will assume the costs to terminate the pregnancy. ICE shall arrange the transportation for the medical appointment, and to counseling services if requested in all cases, including those where rape, incest, or risk to life do not apply. Every facility, either directly or via contractor, must provide female detainees with access to counseling for pregnancy planning if the detainee wishes to receive an abortion. Provision of prenatal care. FRS: Female residents will have access to pregnancy management services including routine prenatal care 2008 PBNDS: Female detainees will have access to pregnancy management services including routine prenatal care 2011 PBNDS: Pregnant detainees will have access to pregnancy management services including routine prenatal care. They will also receive access to a specialist and receive a health assessment. The 2016 revisions note those actions should occur as soon as appropriate or within two working days. The 2016 revisions also give the medical provider authority to identify pregnant detainees’ special needs such as diet or housing requirements and inform all necessary staff and authorities. Provision of postnatal care. FRS: Female residents will have access to pregnancy management services including postpartum follow-up care. 2008 PBNDS: Female detainees will have access to pregnancy management services including postpartum follow-up care. 2011 PBNDS: Pregnant detainees will have access to pregnancy management services including postpartum follow-up care. After giving birth, receiving an abortion or miscarrying, mental health assessments should also be offered. Provision of perinatal/labor care. 2011 PBNDS: Pregnant detainees will have access to specialized care including labor and delivery. Mental health services and counseling for pregnant women. FRS: Pregnant females will have access to pregnancy management services that include counseling and assistance. 2008 PBNDS: Pregnant females will have access to pregnancy management services that include counseling and assistance. 2011 PBNDS: Pregnant detainees will have access to care including counseling and assistance. Detainees can also request transportation to religious, medical and social counseling when considering termination of a pregnancy. In 2016 revisions, intake screening should include education to female detainees about mental health services related to pregnancy and women’s health. Care for pregnant women with substance use disorder. 2008 PBNDS: Female detainees will have access to pregnancy management services that include addiction management. 2011 PBNDS: In 2016 revisions, all chemically dependent pregnant detainees are to be considered high risk and referred to an obstetrician or other provider capable of addressing their needs immediately. HIV care for pregnant women. 2011 PBNDS: Medical personnel shall provide all detainees diagnosed with HIV/AIDS medical care consistent with national recommendations and guidelines disseminated through the U.S. Department of Health and Human Services, the Center for Disease Control, and the Infectious Diseases Society of America. Prenatal vitamins. 2011 PBNDS: Pregnant detainees will have access to prenatal care including prenatal vitamins. Nutrition for pregnant women. NDS: Physicians may order snacks or supplemental feedings to increase protein or calories for reasons including pregnancy. In hold rooms, pregnant women should have regular access to snacks, milk, and juice. FRS: Physicians may order snacks or supplemental feedings to increase protein or calories for reasons including pregnancy. Pregnant women will have access to pregnancy management services that include nutrition. 2008 PBNDS: Physicians may order snacks or supplemental feedings to increase protein or calories for reasons including pregnancy. In hold rooms, pregnant women should have regular access to snacks, milk, and juice. Pregnant women will have access to pregnancy management services that include nutrition. 2011 PBNDS: Physicians may order snacks or supplemental feedings to increase protein or calories for reasons including pregnancy. In hold rooms, pregnant women should have regular access to snacks, milk, and juice. Pregnant women will have access to pregnancy management services that include nutrition. Special consideration is given to pregnant women when providing meals and snacks during transportation. In the 2016 revisions, the medical provider is responsible for identifying special needs of pregnant detainees, including diet, and notifying all necessary staff. Special accommodations for pregnant women. 2008 PBNDS: In hold rooms, pregnant women will have access to temperature appropriate clothing and blankets and may, depending on facility, have access to bunks, cots, or beds, normally not kept in hold rooms. 2011 PBNDS: In hold rooms, pregnant women will have access to temperature appropriate clothing and blankets and may, depending on facility, have access to bunks, cots, or beds, normally not kept in hold rooms. Pregnant detainees should also have access to lactation services in the facility. In the 2016 revisions, the medical provider is responsible for identifying special needs of pregnant detainees and notifying all necessary staff. Segregation of pregnant women. 2011 PBNDS: In the 2016 revisions, it is stated that women who are pregnant, post-partum, recently had a miscarriage, or recently had a terminated pregnancy should as a general matter not be placed in a Special Management Unit. In very rare situations, a woman who is pregnant, postpartum, recently had a miscarriage, or recently had a terminated pregnancy may be placed in a Special Management Unit as a response to behavior that poses a serious and immediate risk of physical harm, or if the detainee has requested to be placed in protective custody administrative segregation and there are no more appropriate alternatives available. Also in the 2016 revisions, a facility administrator must notify the appropriate field office director in writing as soon as possible, but no later than 72 hours any time a pregnant woman or one who recently had a miscarriage is placed in segregation. In all cases, in the 2016 revisions, this decision must be approved by a representative of the detention facility administration, in consultation with a medical professional, and must be reviewed every 48 hours. Use of restraints on pregnant women. NDS: Pregnant detainees should be given special consideration if restrained as a result of a physical encounter. A medical professional should be consulted immediately in the aftermath, and the detainee examined. Pregnant detainees should be restrained in such a way as to avoid harming the fetus such as not restraining face down. FRS: Medical staff will advise on the necessary precautions to take when restraining a pregnant detainee and restraint should be done only when other methods have been tried or are impracticable. 2008 PBNDS: Medical staff will advise on the necessary precautions to take when restraining a pregnant detainee. Pregnant detainees should be restrained in such a way as to avoid harming the fetus such as not restraining face down. 2011 PBNDS: A pregnant detainee is not to be restrained except in truly extraordinary circumstances. Even then, it must be documented by a supervisor and directed by a medical authority. Women in active labor or delivery can never be restrained, and if restrained, the detainee should never be face down, on her back, or restrained with a belt that constricts the area of pregnancy. Record keeping on pregnant women actions. NDS: The medical provider of a facility will notify the ICE officer in charge whenever a pregnant detainee is identified and any use of force or application of restraints on a detainee should be followed by a medical examination, and its results documented. FRS: The medical provider of a facility will notify the ICE facility administrator whenever a pregnant detainee is identified. A treatment plan should be developed for any detainee requiring close medical supervision, and approved by the appropriate physician or other medical provider. 2011 PBNDS: When a detainee is pregnant, an alert is notified in their medical record and the facility administrator will receive notice. If a detainee is transferred, it is the administrator’s responsibility to inform ICE of the medical alert. Any use of restraints requires documented approval, including in the detainee’s detention and medical files and guidance from the on-site medical authority. A request to terminate a pregnancy must be documented in the medical file and signed by the detainee. In the 2016 revisions, ICE supervisory staff must be informed within 72 hours when a pregnant detainee is identified. Numerous professional associations, non-governmental organizations, and federal agencies have issued guidance on care to be provided to pregnant women. Specifically, we reviewed the following guidance: American Civil Liberties Union: Worse than Second-Class: Solitary Confinement of Women in the United States (2014) American College of Obstetricians and Gynecologists: Committee Opinion: Health Care for Pregnant and Postpartum Incarcerated Women and Adolescent Females (2016) Guidelines for Perinatal Care, Eighth Edition (2017) American Correctional Association Performance-Based Standards and Expected Practices for Adult Correctional Institution, 5th Edition Joint Public Correctional Policy on the Treatment of Opioid Use Disorders for Justice Involved Individuals (2018) Joint Statement on the Federal Role in Restricting the Use of Restraints on Incarcerated Women and Girls during Pregnancy, Labor, and Postpartum Recovery National Commission on Correctional Health Care (NCCHC): Position Statement: Restraint of Pregnant Inmates (2015) Position Statement on Solitary Confinement (Isolation) (2016) Position Statement on Breastfeeding in Correctional Settings (2018) Standards for Health Services in Jails (2018) Sufrin C., Pregnancy and Postpartum Care in Correctional Settings, National Commission on Correctional Health Care, Clinical Resources Series. (2018) National Women’s Law Center: Women Behind Bars: A state-by-state report card and analysis of federal policies on conditions of confinement for pregnant and parenting women and the effect on their children (2010) United Nations Rules for the Treatment of Women Prisoners and Non- custodial Measures for Women Offenders (the Bangkok Rules) (2010) U.S. Department of Homeland Security (DHS): Report of the DHS Advisory Committee on Family Residential Centers (2016) U.S. Department of Justice, Bureau of Justice Assistance: Best Practices in the Use of Restraints with Pregnant Women and Girls Under Correctional Custody (2014) U.S Department of Justice Report and Recommendations Concerning the Use of Restrictive Housing (2016) Because the specificity of the guidance varies across entities, we summarized the recommended guidance for our report purposes. For example, guidance on nutrition may range from calling for additional meals for pregnant women to more specifically outlining extra caloric and dietary needs. Our summary statement for each of the pregnancy-related topics is included below, along with examples from relevant recommended guidance. Intake health screening inquiries about pregnancy. Summary of recommended guidance: The sources that have guidance generally agree that intake health screenings should include inquiry regarding pregnancy and related conditions. Example: “Screening is performed on all inmates upon arrival at the intake facility…The receiving screening form…inquires as to the inmate’s…possible, current, or recent pregnancy…” – NCCHC Standards for Health Services in Jails (2018) Pregnancy testing at intake. Summary of recommended guidance: Sources that have guidance generally agree that pregnancy testing should be conducted on newly detained women of childbearing age, but some provide additional guidance on when this should be done, and this may vary. Example: “All women at risk for pregnancy should be offered a pregnancy test within 48 hours of admission…A simple approach would be to offer pregnancy testing to all women under the age of 55.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Example: “…medical providers should continue to offer pregnancy tests to every female of child-bearing age who is newly detained…” – Report of the DHS Advisory Committee on Family Residential Centers (2016) Access to abortion. Summary of recommended guidance: Sources that have guidance generally agree abortion services should be offered to detained pregnant women, with one source providing additional details, including swift facilitation of a woman’s choice of termination and non- interference of outside bodies in the decision. Example: “Pregnancy termination is generally to be performed as safely and as early in pregnancy as possible…Termination of pregnancy should not depend on whether or not the specific procedure is available on site. Each woman will decide what option to choose…this decision is to be made without undue interference by outside bodies, including governmental bodies.” – Report of the DHS Advisory Committee on Family Residential Centers (2016) Provision of prenatal care. Summary of recommended guidance: Sources that have guidance generally agree that some form of prenatal care should be provided to detained pregnant women, but differ on the level of specificity for the standard of care, from stating simply that prenatal care be provided to specifying requirements including regularly scheduled obstetric care and access to 24-hour emergency care. Example: “Incarcerated women who wish to continue their pregnancies should have access to readily available and regularly scheduled obstetric care, beginning in early pregnancy and continuing through the postpartum period. Incarcerated pregnant women also should have access to unscheduled or emergency obstetric visits on a 24-hour basis.” – American College of Obstetricians and Gynecologists Committee Opinion: Health Care for Pregnant and Postpartum Incarcerated Women and Adolescent Females (2016) Example: “Prenatal care in correctional facilities must reflect national standards, including visit frequency with a qualified prenatal care provider, screening and diagnostic tests, and referrals for complications.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Provision of postnatal care. Summary of recommended guidance: Sources that have guidance generally agree that the provision of postnatal care be provided to women who give birth. However, they vary in their specifics. For example, some specifically state that lactation service or postnatal birth control should be provided. One source also recommends specific forms of accommodation to aid postnatal recovery. Example: “…appropriate accommodations should be made, such as allowing women to rest when needed…Discharge instructions from the hospital, which may include postpartum blood pressure monitoring or diabetes screening, should be adhered to.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Example: “Allow immediately postpartum women to breastfeed their babies and have lactation support services from the hospital.” – NCCHC Position Statement on Breastfeeding in Correctional Settings (2018) Provision of perinatal/labor care. Summary of recommended guidance: Sources that have guidance generally agree a pregnant woman should be transported to a hospital if there are signs of labor. Some sources state that detention staff be trained in emergency delivery in the event of a delivery occurring in the facility, away from professional care. Example: “Due to the time necessary to arrange transport to a nearby hospital, there is a low threshold to send pregnant inmates out for evaluation of a labor when signs or symptoms of labor or ruptured membranes are present… Any facility that houses pregnant women should have an emergency delivery kit available on-site, and health staff should be trained in its use in the event that a delivery occurs in the facility.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Example: “Having a preexisting arrangement to have the babies of incarcerated women delivered at a local hospital reduces confusion and uncertainty when a woman goes into labor.” – National Women’s Law Center Women Behind Bars: A state-by-state report card and analysis of federal policies on conditions of confinement for pregnant and parenting women and the effect on their children (2010) Mental health services and counseling for pregnant women. Summary of recommended guidance: Sources that have guidance generally agree that pregnant and postpartum women should have access to mental health/counseling services. Example: “Pregnant inmates are given comprehensive counseling and care in accordance with national standards and their expressed desires regarding their pregnancy.” – NCCHC Standards for Health Services in Jails (2018) Care for pregnant women with substance use disorder. Summary of recommended guidance: Sources that have guidance generally agree that addicted pregnant women should have access to screening and specialized addiction-treatment programs. Example: “Screening for drug and alcohol use is a first step and is followed with referral to treatment. For women who report opiate use, the standard of care is not to detoxify from opiates during pregnancy due to the fetal risks of withdrawal. Rather the standard of care is to provide…methadone or buprenorphine…” – Pregnancy and Postpartum Care in Correctional Settings (2018) Example: “The standard of care for pregnant women with [opioid use disorder] is and should therefore be offered/continued for all pregnant detainees and incarcerated individuals.” – Joint Public Correctional Policy on the Treatment of Opioid Use (2018) HIV care for pregnant women. Summary of recommended guidance: Sources that have guidance generally agree that pregnant women should have access to testing and treatment of HIV for the benefit of both the mother and child. Example: “The Centers for Disease Control and Prevention recommends universal opt-out HIV screening for pregnant women; with early detection, prevention of mother-to-child transmission can be accomplished…” – Pregnancy and Postpartum Care in Correctional Settings (2018) Vaccinations for pregnant women. Summary of recommended guidance: Sources that have guidance generally agree that vaccines recommended for pregnant women be provided to detainees in accordance with accepted medical guidelines. Example: “Current recommendations are that all pregnant women should be vaccinated with the flu vaccine during flu season and tetanus, diphtheria, and pertussis during the third trimester, regardless of whether they were vaccinated outside of pregnancy.” – NCCHC Standards for Health Services in Jails (2018) Example: “Vaccines related to pregnancy should be offered pursuant to CDC guidelines…” – Report of the DHS Advisory Committee on Family Residential Centers (2016) Prenatal vitamins. Summary of recommended guidance: The sources that have guidance generally agree that prenatal vitamins should be provided to pregnant women, and some sources state that prenatal vitamins should be provided to breastfeeding women. Example: “Pregnant women must also receive prenatal vitamins that contain, among other essential vitamins and minerals, 400mcg to 800mcg of folic acid... Women with documented anemia (hemoglobin<11) should receive additional iron supplementation.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Example: “Appropriate nutrition and prenatal vitamins should be given to lactating women…” – NCCHC Standards for Health Services in Jails (2018) Nutrition for pregnant women. Summary of recommended guidance: Sources that have guidance generally recommend special nutrition regimens for pregnant women, with varying degrees of specificity, ranging from recommending the use of supplements broadly to specifying required nutrients such as folic acid and calcium and extra calories in the form of additional meals, larger meals, or food between meals, and in some cases specifying that these requirements also apply for postpartum women. Example: “Pregnant and postpartum women have additional nutritional needs and should be counseled on the importance of adequate nutrition. Diets provided by correctional institutions should be specialized to the women’s needs and be rich in whole grains, calcium, and fruits and vegetables. In the second and third trimesters, women require an additional 300 calories per day…” – Pregnancy and Postpartum Care in Correctional Settings (2018) Special accommodations for pregnant women. Summary of recommended guidance: Sources that have guidance generally agree that accommodations should be provided to pregnant women. Some sources specify accommodations such as appropriate programming and hygiene for pregnant women and nursing mothers, appropriately adjusted work assignments and exercise, and bottom bunks. Example: “Activity for pregnant women must take into account the physical constraints of being in a correctional facility. All pregnant women must have a bottom bunk so that they do not risk falling from a top bunk. Certain work assignments may be inappropriate…Work assignments should be adjusted accordingly. In the absence of medical or obstetric complications, 30 minutes or more of moderate exercise a day on most, if not all, days of the week is recommended.” – Pregnancy and Postpartum Care in Correctional Settings (2018) Segregation of Pregnant Women. Summary of recommended guidance: Sources that have guidance generally agree that pregnant women should not be placed in segregation, though some suggests this could be necessary in certain cases. Example: “Women who are pregnant, who are postpartum, who recently had a miscarriage, or who recently had a terminated pregnancy should not be placed in restrictive housing…In very rare situations, a woman who is pregnant, is postpartum, recently had a miscarriage, or recently had a terminated pregnancy may be placed in restrictive housing as a temporary response to behavior that poses a serious and immediate risk of physical harm…” – U.S Department of Justice Report and Recommendations Concerning the Use of Restrictive Housing (2017) Use of Restraints on Pregnant Women. Summary of recommended guidance: Sources that have guidance generally agree that restraints generally should not be used on a pregnant woman, except when necessary. Some sources indicate that if restraints are necessary, it should be well documented and require approval and assessment from a senior official and/or medical professional. Some sources specify the types of restraints that should never be used including abdominal restraints, handcuffs behind the back, and leg and ankle restraints. Example: “Restraint of pregnant inmates during labor and delivery should not be used. The application of restraints during all other pre- and postpartum periods should be restricted as much as possible and, when used, done so with consultation from medical staff and in the least restrictive means possible. All uses of restraints in pregnant inmates must be documented and reviewed.” – NCCHC Position Statement: Restraint of Pregnant Inmates (2015) Example: “Policies and procedures on the use of restraints on pregnant women and girls under correctional custody should be developed collaboratively by correctional leaders and medical staff who have knowledge about the potential health risks…The use of restraints on pregnant women and girls under correctional custody should be limited to absolute necessity.” - U.S. Department of Justice, Bureau of Justice Assistance: Best Practices in the Use of Restraints with Pregnant Women and Girls Under Correctional Custody (2014) Record Keeping on Pregnant Women Actions. Summary of recommended guidance: Sources that have guidance generally agree that accurate records of detention regarding pregnant women should be kept, with varying levels of specificity ranging from noting that records should be kept for incidents of restraint to specifying how documentation is kept and reviewed. One source notes that medical records should also be easily accessible for offsite care providers. Example: “If detention continues ICE should ensure…reporting of detention to ICE Headquarters and continued review of the need to detain.” – Report of the DHS Advisory Committee on Family Residential Centers (2016) Example: “Obstetrician-gynecologists and other obstetric care providers of antepartum care should be able to either primarily provide or easily refer to others to provide a wide array of services. These services include… imely transmittal of prenatal records to the site of the woman’s planned delivery so that her records are readily accessible at the time of delivery.” – American College of Obstetricians and Gynecologists Guidelines for Perinatal Care, Eighth Edition (2017) U.S. Customs and Border Protection (CBP) and its components, Border Patrol and the Office of Field Operations (OFO), have several policies and standards that address the care and treatment of pregnant women in their custody. Specifically, these include the following: CBP: National Standards on Transport, Escort, Detention, and Search (2015) OFO: Personal Search Handbook (2004) OFO: Directive: Secure Detention, Transport and Escort Procedures at Ports of Entry, CBP Directive No. 3340-030B (2008) Border Patrol: U.S. Border Patrol Policy: Hold Rooms and Short Term Custody (2008) Summaries of these policies and standards are provided below, along with the titles of the policies or standards on which each summary is based. Processing and holding. Officers and agents will consider pregnancy when expediting processing of vulnerable detained persons and when placing detained persons with others in hold rooms and holding facilities. Secure Detention, Transport and Escort Procedures at Ports of Entry (2008) and U.S. Border Patrol Policy: Hold Rooms and Short Term Custody (2008) Mental health services and counseling for pregnant women. If an agent or officer observes signs of mental illness, it should be reported to a supervisor and appropriate medical care be provided or sought, including calling emergency services in the event of an emergency. Transport, Escort, Detention, and Search (2015) Nutrition for pregnant women. Pregnant detainees should be offered a meal every six hours they are in detention and have access to snacks, milk, or juice at all times. Transport, Escort, Detention, and Search (2015); Secure Detention, Transport and Escort Procedures at Ports of Entry (2008); and U.S. Border Patrol Policy: Hold Rooms and Short Term Custody (2008) Special accommodations for pregnant women. Reasonable accommodations should be made for pregnant women, including placement in the least restrictive appropriate setting. If circumstances permit, pregnant women should not be placed in hold rooms or other secure areas, but instead in an open area under supervision. Transport, Escort, Detention, and Search (2015); Secure Detention, Transport and Escort Procedures at Ports of Entry (2008); and U.S. Border Patrol Policy: Hold Rooms and Short Term Custody (2008) Use of restraints on pregnant women. Officers and agents should not use restraints on pregnant women unless they demonstrate or threaten violence, have a criminal and/or violent history, or there is an articulable escape risk. Even if restraints are used, pregnant detainees are not to be restrained face-down, on their backs, or with a belt that constricts the area of her pregnancy. Pregnant women can never be restrained while in active labor or delivery. All use of restraints must be documented. Transport, Escort, Detention, and Search (2015) Record keeping on pregnant women actions. All physical interactions with pregnant women must be recorded after they occur. Any medical emergency must be recorded as soon as practical after emergency services have been contacted. Further, Border Patrol agents must create a booking record for persons detained and the record must include a medical annotation for conditions requiring care, including pregnancy. Transport, Escort, Detention, and Search (2015) and U.S. Border Patrol Policy: Hold Rooms and Short Term Custody (2008) U.S. Immigration and Customs Enforcement (ICE) uses various inspections for accessing facilities’ compliance with policies and detention standards—the frequency and focus of which vary. Some inspections also include pregnancy-related performance measures, such as a measure assessing whether a pregnancy test was performed at intake. We analyzed reports and data from five ICE inspections that address compliance with pregnancy-related policies and detention standards from 2015 through June 2019—the most recent data available at the time of our review. We selected these inspections because they review some aspect of the care provided to pregnant women. These inspections address compliance at ICE detention facilities where on-site medical care is provided by both ICE Health Service Corps (IHSC) as well as other entities (non-IHSC facilities). We reviewed results from IHSC’s inspections of IHSC-staffed and non- IHSC facilities, which includes pregnancy-related performance measures. We found that instances of non-compliance occurred at 16 facilities subject to a range of detention standards. Three of these facilities were IHSC-staffed, and 13 were non-IHSC. Table 10 shows results from December 2016 through March 2019. We reviewed information on pregnancy-related performance measures reported by facilities staffed by IHSC. Table 11 shows results from fiscal years 2015 through 2018. Although the table shows average annual compliance across all IHSC- staffed facilities, variation exists between facilities, and over time. For example, in fiscal year 2018, one facility improved its performance on the measure of whether prenatal vitamins were prescribed from 33 percent compliance in the first quarter to 100 percent compliance in the second quarter. In addition, in fiscal year 2018, facilities’ compliance with each measure ranged as follows: Obstetrician-gynecologist consult ordered is documented within 7 business days of identification: 50 to 100 percent (average 80 percent) Obstetrician-gynecologist scheduled appointment time documented within 7 business days of identification: 15 to 100 percent (average 75 percent) Detainee education documented at each encounter: 0 to 100 percent (average 79 percent) Records reviewed by provider after obstetrician appointment: 0 to 100 percent (average 79 percent) Appropriate labs ordered if not obtained from obstetrician- gynecologist: 50 to 100 percent (average 79 percent) Three additional ICE inspections identified 19 findings at 13 facilities related to the care of pregnant women. All of the findings occurred at non- IHSC facilities. Table 12 provides additional information on the findings and corrective actions that facilities reported taking. We interviewed ten pregnant women who were detained at three of the four U.S. Immigration and Customs Enforcement (ICE) facilities we visited, including facilities staffed by ICE Health Service Corps (IHSC- staffed) and non-IHSC facilities. We interviewed an additional four pregnant women at a local shelter in Texas which provides temporary accommodations to those in need of housing after their release from DHS custody. These four women may not have known which agency they had been detained or held by prior to entering the shelter. As a result, their perspectives are listed separately in the table below from the 10 women with whom we spoke at ICE detention facilities. Table 13 summarizes the perspectives of these 14 pregnant women. Although these interviews are not generalizable and may not be indicative of the care provided at all detention facilities, they provided us with perspectives on the care provided to pregnant women. We did not independently verify statements made by these 14 women we interviewed. We analyzed and categorized complaints that detainees, family members, non-governmental organizations, or other parties submitted to various entities from January 2015 through April 2019 regarding U.S. Immigration and Customs Enforcement’s (ICE) and U.S. Customs and Border Protection’s (CBP) care of pregnant women. Specifically, we reviewed complaints from Department of Homeland Security’s (DHS) Office for Civil Rights and Civil Liberties (CRCL), DHS’s Office of Inspector General, and ICE Health Service Corps (IHSC). We identified a total of 107 complaints—54 regarding ICE, 50 regarding CBP, and three regarding both ICE and CBP. We identified 54 unique complaints submitted from January 2015 through April 2019 regarding ICE’s care of pregnant women. Each of the 54 complaints may identify more than one area of concern, and as such we identified 104 concerns. The most common concern was that ICE allegedly did not provide medical care or the medical care was not quality or timely. As previously described in this report, the investigating agency determined that one complaint was substantiated and one complaint was partially substantiated. The remaining complaints were either still open as part of an on-going investigation, unsubstantiated by the investigating agency, or the complaint was not substantiated or unsubstantiated for a variety of reasons. Table 14 provides additional information on the number and types of concerns identified in the 54 complaints regarding ICE’s care of pregnant women. We identified 50 unique complaints submitted from January 2015 through April 2019 regarding CBP’s care of pregnant women. Each of the 50 complaints may identify more than one area of concern, and as such we identified 81 concerns. The most common concern was that pregnant women had allegedly been physically, verbally, or otherwise mistreated. As previously described in this report, the investigating agency determined that one complaint was substantiated. The remaining complaints were either still open as part of an on-going investigation, unsubstantiated or partially unsubstantiated by the investigating agency, the complaint was not substantiated or unsubstantiated for a variety of reasons, or the complaint described an event that occurred, such as a miscarriage, but did not allege that mistreatment or improper care occurred. Table 15 provides additional information on the number and types of issues identified in the 50 complaints regarding CBP’s care of pregnant women. In addition to the contact named above, Dawn Locke (Assistant Director), Tracey Cross (Analyst-in-Charge), Hiwotte Amare, David Bieler, Christine Davis, Elizabeth Dretsch, Kelsey Griffiths, Eric Hauswirth, Sasan J. “Jon” Najmi, Sean Sannwaldt, and Adam Vogt made key contributions to this report.", "summary": "In December 2017, the Department of Homeland Security (DHS) updated its policy on pregnant women, removing language that stated that pregnant women would generally not be detained except in extraordinary circumstances or as mandated by law. Within DHS, CBP temporarily holds individuals in its facilities and processes them for further action, such as release or transfer to ICE. ICE manages the nation's immigration detention system. ICE utilizes various facility types to detain individuals, such as those owned and operated by ICE and contract facilities. GAO was asked to review issues related to the care of pregnant women in DHS facilities. This report examines (1) what available data indicate about pregnant women detained or held in DHS facilities, (2) DHS policies and standards that address the care of pregnant women, and (3) what is known about the care provided to pregnant women in DHS facilities. GAO analyzed available DHS data and documents from calendar years 2015 through 2019, including detention data, inspection reports and data, and complaints; reviewed policies related to the care of pregnant women; and interviewed agency officials and three national non-governmental organizations. GAO also interviewed a non-generalizable sample of 14 pregnant women detained or released by DHS and five non-governmental organizations in four field locations that had the greatest number of detentions of pregnant women, among other things. GAO's analyses of U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP) data on pregnant women found: ICE detained pregnant women over 4,600 times from calendar year 2016 through 2018, with more than 90 percent resulting from CBP arrests. Sixty-eight percent of these detentions were for 1 week or less, while 10 percent were for more than 30 days. Seventy-eight percent of these initial detentions occurred at facilities staffed with ICE medical personnel. ICE has policies and detention standards that address a variety of topics regarding the care of pregnant women, such as pregnancy testing requirements, for which non-governmental organizations, professional associations, and federal agencies have issued recommended guidance. However, some facility types—which vary based on who owns, operates, and provides medical care at the facility—did not address all these pregnancy-related topics in their policies and standards, such as prenatal vitamins, as of December 2019. ICE has plans to address the gaps GAO identified in these facility types, including updating some of its policies and detention standards in February 2020. In regards to CBP, its facilities are designed for holding individuals for no more than 72 hours, and therefore are not equipped to provide long-term care. Nonetheless, CBP has some policies and standards regarding pregnant women for its short-term facilities, including those related to nutrition and the circumstances in which restraints could be used. GAO's analyses of inspections and complaint mechanisms offered the following insights into the care provided to pregnant women: ICE inspections found 79 percent or greater compliance with most of its pregnancy-related performance measures. For example, inspections found 91 percent of pregnant woman were seen by an obstetrician-gynecologist within 30 days of pregnancy confirmation, from December 2016 through March 2019. According to ICE officials and agency documentation, ICE has processes in place to address non-compliance. Additional inspections identified pregnancy-related issues at 13 facilities from January 2015 through July 2019. The facilities or ICE have taken actions to address the issues. CBP generally relies on offsite care for pregnant women, and as a result has limited information on care CBP provided. However, CBP has efforts underway to enhance medical support at selected facilities. Over 100 complaints were filed about ICE's and CBP's care of pregnant women from January 2015 through April 2019. Of these complaints, 3 were substantiated or partially substantiated, and 24 were unsubstantiated or partially unsubstantiated. In most cases there was not enough information for the investigating agency to determine whether proper care had been provided.", "document_type": "gao"}
{"report": "As sales of cigarettes generally decreased over the past 10 years, combined sales of roll-your-own tobacco, pipe tobacco, small cigars, and large cigars have increased as a percentage of the total market. Figure 1 shows a sample of these smoking tobacco products. As shown in figure 2, while the cigarette share of the smoking tobacco market has decreased, cigarette sales continue to dominate the market for smoking tobacco products. Cigarette sales fell from 350.3 billion cigarettes in fiscal year 2008 to 236.9 billion cigarettes in fiscal year 2018, and its percentage of the smoking tobacco market declined from 93.5 percent to 87.3 percent. During this same period, the combined sales of roll-your-own tobacco, pipe tobacco, small cigars, and large cigars increased from the equivalent of 24.5 billion sticks in fiscal year 2008 to 34.6 billion sticks in fiscal year 2018, an increase from 6.5 percent to 12.8 percent of the total market for smoking tobacco products. Although electronic cigarettes are growing in popularity among U.S. youth according to the FDA, they are not included in the sales data on smoking tobacco products represented in figure 2. Electronic cigarettes are not currently taxed under the Internal Revenue Code as a tobacco product. Accordingly, corresponding data on electronic cigarettes sales are not available. Federal excise tax rates on different tobacco products are calculated in different ways. Cigarettes and small cigars are taxed on a per unit basis— the number of sticks. Roll-your-own and pipe tobacco are taxed by weight. Before CHIPRA, the federal excise tax rate on cigarettes was higher than the rates on roll-your-own tobacco, pipe tobacco, and small cigars. In 2009, Congress passed CHIPRA and significantly raised the tax rates on these four products, equalizing the rates for cigarettes, roll-your- own tobacco, and small cigars. CHIPRA also increased the tax rate for pipe tobacco, among other products, but not to the level of the other three products mentioned. Table 1 shows the increases in federal excise tax rates under CHIPRA for these four products. As shown in figure 3, CHIPRA equalized—on a comparable per stick basis—federal excise tax rates for cigarettes, roll-your-own tobacco, and small cigars but not for pipe tobacco. As a result, of the three cigarette products shown previously in figure 1, the cigarette made with pipe tobacco (marked as number 2) is taxed at a much lower rate than either the factory-made cigarette (number 3) or the cigarette made with roll- your-own tobacco (number 1). CHIPRA also increased the federal excise tax rate on large cigars. Large cigars are unique among tobacco products in that the tax rate is ad valorem—calculated as a percentage of the manufacturer’s or importer’s sale price—up to a maximum tax (currently $402.60) per thousand sticks. CHIPRA increased the ad valorem rate for large cigars from 20.72 percent to 52.75 percent of the manufacturer’s or importer’s sale price, up to a maximum of $402.60 per thousand sticks (see table 2). To reduce federal excise taxes, manufacturers of inexpensive small cigars have an incentive to modify their product to qualify for the lower- taxed large cigar category by adding weight. For example, manufacturers of cigars with a sale price of $50 per thousand would pay $26.38 per thousand in federal excise taxes if the cigar qualified as large cigars compared to $50.33 per thousand if they qualified as small cigars. Consequently, a manufacturer of small cigars would experience a tax savings of $23.95 per thousand if it changed the product to qualify as a large cigar. In figure 1, although the small cigar (marked as number 4) and the large cigar (number 5) are similar in appearance, they are likely taxed at significantly different rates, depending on the price of the large cigar. Domestic manufacturers and importers of tobacco products must obtain a permit from TTB before engaging in business. TTB collects federal excise taxes on domestic tobacco products when these products leave manufacturing facilities. CBP, within the Department of Homeland Security, collects the federal excise taxes on imported tobacco products after those products are released from Customs custody. Tobacco products—including roll-your-own tobacco, pipe tobacco, small cigars, and large cigars—are broadly defined in the Internal Revenue Code (see table 3). Roll-your-own tobacco and pipe tobacco are defined by such factors as the use for which the product is suited and how the product is offered for sale, as indicated by its appearance, type, packaging, and labeling. These definitions do not specify any physical characteristics that would differentiate pipe tobacco from roll-your-own tobacco, and TTB faces challenges in distinguishing these two products for tax collection purposes. We reported in 2014 that according to government officials, representatives of nongovernmental organizations, and industry, the new pipe tobacco products introduced after CHIPRA had minimal, if any, differences from roll-your-own tobacco products. We further reported in 2014 that TTB took rulemaking actions intended to more clearly differentiate the two products. As of May 2019, TTB was still finalizing its regulatory approach for distinguishing between the two products. According to TTB officials, TTB continues to face the challenges inherent in identifying specific physical characteristics that clearly distinguish pipe tobacco from roll-your-own tobacco. TTB officials have discussed the complexity of administering the federal excise tax on large cigars because it is calculated as a percentage of the manufacturer’s or importer’s sale price, up to a maximum tax per thousand sticks. We reported in 2014 that TTB’s efforts to monitor and enforce tax payments on large cigars became more complex after CHIPRA as more manufacturers and importers determined their tax liability based on the sale price per stick rather than simply paying the set maximum tax. In addition, we reported that according to TTB officials some large cigar manufacturers and importers began to restructure their market transactions to lower the sale price for large cigars and obtain tax savings based on a lower ad valorem rate. According to TTB officials, some manufacturers and importers, for example, were “layering” sales transactions by including an additional transaction at a low price before the sale to the wholesaler or distributor and using this low initial price to calculate the tax. According to TTB officials, such transactions are conducted with an intermediary that may have a special contract arrangement with the manufacturer or importer. The intermediary may then add a large markup to the subsequent sale price to the wholesaler or distributor. This added transaction effectively lowers the manufacturer’s or importer’s sale price and thus reduces the taxes collected. TTB officials stated that these types of transactions have continued since 2014, and that taking enforcement actions to counter them is challenging and resource intensive due to their complexity. TTB officials also noted that these activities can range from legal tax avoidance to illegal tax evasion, requiring a case-specific analysis of each transaction. Large tax disparities among similar tobacco products created opportunities for tax avoidance and led to immediate market shifts to the lower-taxed products. Specifically, since CHIPRA took effect in 2009, pipe tobacco consumption increased significantly—steeply at first and then leveling off. Over the same period, roll-your-own tobacco consumption fell sharply and then more gradually declined. Similarly, large cigar consumption rose sharply after CHIPRA took effect, while sales of small cigars dramatically decreased and now make up very little of the combined market share for cigars. Following CHIPRA’s passage, pipe tobacco sales rose steeply, peaking in July 2013 and leveling off since then (see fig. 4). Pipe tobacco sales grew from 5.2 million pounds in fiscal year 2008, the fiscal year before CHIPRA came into effect, to 40.7 million pounds in fiscal year 2018. Pipe tobacco sales reached a high in fiscal year 2013, with consumption exceeding 42.4 million pounds and spiking in July 2013 for a monthly high of over 4.9 million pounds. After this spike, the pipe tobacco market leveled off with monthly sales fluctuating from 2.8 million to 4.1 million pounds. Despite this leveling off, pipe tobacco’s share of the combined roll-your- own and pipe tobacco market continued to increase, reaching approximately 95 percent in fiscal year 2018, which is the highest it had been since CHIPRA took effect. Figure 4 also shows that as pipe tobacco sales increased significantly after the passage of CHIPRA, roll-your-own tobacco experienced an immediate drop in sales. Annual sales of roll-your-own tobacco dropped from 17.0 million pounds in fiscal year 2009 to 6.4 million pounds in fiscal year 2010, before declining further to 2.2 million pounds in fiscal year 2018. The lowest annual sales for roll-your-own tobacco since CHIPRA occurred in fiscal year 2018. Over the 11 fiscal years from 2008 through 2018, roll-your-own tobacco’s share of the combined roll-your-own and pipe tobacco market decreased from approximately 78 percent to approximately 5 percent. Figure 5 shows that the overall combined sales of pipe tobacco and roll- your-own tobacco were higher after CHIPRA than before CHIPRA. However, the growth rate declined from 0.69 percent before CHIPRA to 0.33 percent after CHIPRA took effect. In April 2012, we reported that the rise in pipe tobacco sales after CHIPRA coincided with the growing availability of commercial roll-your- own machines that enabled customers to produce a carton of roll-your- own cigarettes with pipe tobacco in less than 10 minutes. Not only were customers able to save money through lower taxes on pipe tobacco, but the commercial roll-your-own machines also provided significant time savings compared with rolling cigarettes by hand. The market shift from roll-your-own to pipe tobacco has persisted in recent years despite a change in the legal status of businesses making commercial roll-your-own machines available to consumers, resulting in these machines being less readily available. Following the growth in the availability of commercial roll-your-own machines, Congress passed a law in July 2012 that included a provision adding “any person who for commercial purposes makes available for consumer use…a machine capable of making cigarettes, cigars, or other tobacco products” to the definition of “manufacturer of tobacco products” for tax purposes. As a result, businesses meeting this definition faced increased tax liability and regulatory requirements. According to TTB officials and industry observers, the number of businesses making commercial roll-your-own machines available to customers declined after the 2012 law’s passage. Nevertheless, combined annual sales of pipe tobacco and roll-your-own tobacco generally have not decreased since the 2012 law was passed. Besides its lower federal excise tax, which creates financial incentives, pipe tobacco has other advantages over roll-your-own tobacco that may also contribute to its sustaining an overwhelming share of the combined roll-your-own and pipe tobacco market. For example, according to the Food and Drug Administration (FDA), pipe tobacco is not covered by the Federal Food, Drug, and Cosmetic Act restriction, such as the ban on flavor additives, imposed on roll-your-own tobacco and cigarettes. Also, according to FDA, pipe tobacco does not currently have the warning label requirements that are imposed on roll-your-own tobacco and cigarettes. Finally, while makers of roll-your-own tobacco are required to make payments under the Tobacco Master Settlement Agreement, makers of pipe tobacco do not make these payments. This increases the incentive for roll-your-own tobacco users to switch to the cheaper pipe tobacco. After CHIPRA, sales of lower-taxed large cigars rose sharply, while sales of small cigars plunged (see fig. 6). From fiscal year 2008 through fiscal year 2018, annual sales of large cigars increased from 5.8 billion sticks to 13.1 billion sticks. This increase included a significant spike in demand immediately after CHIPRA’s passage in 2009. The increase in annual sales then largely leveled off after fiscal year 2010, with sales ranging between 11.9 and 13.2 billion large cigars. As a share of the combined market for small and large cigars, large cigar sales have continued to expand. Large cigar sales increased from approximately 50 percent of the combined market in fiscal year 2008 (before CHIPRA) to approximately 92 percent in fiscal year 2010 and reached approximately 97 percent by the end of fiscal year 2018. Figure 6 also shows that just as large cigar sales increased immediately following CHIPRA, sales of small cigars declined substantially. Annual small cigar sales dropped from 3.6 billion to 1.0 billion sticks between fiscal years 2009 and 2010, and declined further to 0.4 billion sticks by fiscal year 2018. Over the 10-year period between 2008 and 2018, the market share held by small cigars decreased from a high of approximately 50 percent of the combined small and large cigar market in 2008 to approximately 3 percent in fiscal year 2018. Figure 7 shows that the overall combined sales of small and large cigars were higher after CHIPRA than before CHIPRA, although the growth rate for small and large cigars leveled off after CHIPRA took effect in 2009. The growth rate before CHIPRA was 0.78 percent and the growth rate after CHIPRA was 0.03 percent. The makeup of large cigar sales also changed after CHIPRA, with imports replacing domestic cigars as the main contributor to the large cigar market (see fig. 8). When CHIPRA took effect in April 2009, domestic large cigars made up 93.5 percent of the large cigar market. After CHIPRA, the large cigar market began to shift in favor of imports and, by February 2017, imported large cigars consistently became the majority product in the large cigar market. As of September 2018, imported cigars made up 65.6 percent of the large cigar market compared to 93.5 percent held by domestic large cigars in April 2009. Market shifts to avoid increased tobacco taxes following CHIPRA have continued to reduce federal revenue. We estimate that federal revenue losses due to market shifts from roll-your-own to pipe tobacco and from small to large cigars range from approximately $2.5 to $3.9 billion from April 2009 through September 2018, depending on assumptions about how consumers would respond to a tax increase. In contrast, total tax revenue collected for smoking tobacco products, including cigarettes, amounted to about $138 billion over the same time period. We previously reported in 2014 on the estimated federal revenue losses resulting from these market shifts, reporting that estimated federal revenue losses due to the market shifts from roll-your-own tobacco to pipe tobacco and from small to large cigars ranged from approximately $2.6 billion to $3.7 billion from April 2009 through February 2014. Estimated tax revenue losses in the combined roll-your-own and pipe tobacco markets. TTB and CBP collected approximately $2.0 billion in federal excise tax revenue from domestic and imported roll- your-own and pipe tobacco from April 2009 through September 2018. We estimate that during the same period the market shift from roll- your-own to pipe tobacco reduced federal excise tax revenue by an amount ranging from $499 million to $1.2 billion (see fig. 9). Estimated tax revenue losses in the combined small and large cigar markets. TTB and CBP collected about $7.2 billion in federal excise tax revenue from domestic and imported small and large cigars from April 2009 through September 2018. We estimate that during the same period the market shift from small to large cigars reduced federal excise tax revenue by an amount ranging from $2.0 billion to $2.7 billion (see fig. 10). Federal revenue would likely increase if Congress were to equalize the tax rate for pipe tobacco with the rates currently in effect for roll-your-own tobacco and cigarettes. We estimate that federal revenue would increase by a total of approximately $1.3 billion from fiscal year 2019 through fiscal year 2023 if the pipe tobacco tax rate were equalized to the higher rate for roll-your-own tobacco and cigarettes. While equalizing federal excise taxes on small and large cigars should raise revenue based on past experience, the specific revenue effect is unknown because the data needed for conducting that analysis are not available. See appendix 1 for information on our methodology for estimating the effect on tobacco tax revenue if Congress were to eliminate current tax disparities among similar tobacco products and our assumptions about price sensitivity and other factors. We estimate that under current tax rates TTB and CBP would collect approximately $825 million in federal excise tax revenue from domestic and imported roll-your-own and pipe tobacco from October 2018 through September 2023. If Congress were to increase the federal excise tax rate on pipe tobacco of $2.83 per pound to the higher roll-your-own tobacco rate of $24.78 per pound, we estimate that $1.3 billion in additional federal revenue would be collected for these two products for the same time period (see fig. 11). The revenue effect if Congress were to equalize federal excise tax rates on small and large cigars is unknown because data for conducting this analysis are not available. Unlike roll-your-own and pipe tobacco, which are each taxed by weight, the tax rate on large cigars is based on an ad valorem rate and the tax rate on small cigars is based on number of sticks. Legislative proposals in the 115th and 116th Congress for changing the federal excise tax on large cigars have included replacing the ad valorem rate with a rate based on weight, together with a minimum tax per cigar. Shifting from an ad valorem tax to one based on weight could effectively equalize small and large cigar tax rates and address challenges that TTB currently faces in administering the large cigar tax; however, developing a reliable estimate of the revenue effect of such a change is not possible because the data needed on large cigars to conduct this analysis are not available. Specifically, data are not available on (1) large cigar weights or (2) the distribution of large cigars for which the federal excise tax now being paid is above or below the current rate for small cigars. These data on large cigars are not collected by TTB because such data are not needed to administer and collect large cigar taxes under the current tax structure. In the absence of these data, it is not possible to reliably calculate the potential effect on tax revenue of a counterfactual scenario for equalizing small and large cigar federal excise taxes. See appendix I for more information on the additional data needed for developing an estimate of the revenue effect of equalizing the federal excise tax rate on small and large cigars. As previously discussed, the number of imported large cigars has increased in recent years and the ratio of imported to domestic large cigars in the U.S. market has shifted toward imports. As part of this trend, there has also been an increase in the proportion of imported large cigars that are taxed at a lower rate than the small cigar tax rate of 5.03 cents per stick. From fiscal years 2013 through 2018, 72 percent of imported large cigars were taxed at a rate less than 5.03 cents per stick. As a result of this increase in inexpensive imported large cigars, annual large cigar revenue has begun to decline. Large cigar revenue has declined from a monthly average of $71.5 million over the period from April 2009 to December 2012 to a monthly average of $52.9 million over the period from January 2013 through September 2018. Large cigars account for approximately 95 percent of combined small and large cigar revenue. Figure 12 shows actual combined small and large cigar federal excise tax revenue from fiscal year 2008 through fiscal year 2018. The combined average monthly federal revenue for small and large cigars increased significantly after CHIPRA went into effect in 2009, from $21.3 million in fiscal year 2008 to $72.8 million in fiscal year 2010, and remains above the pre-CHIPRA level (see fig. 12). Based on this experience, if Congress were to equalize federal excise taxes through a tax increase for large cigars, revenue should increase. However, the magnitude of the revenue effect of equalizing taxes on small and large cigars is unknown because the data for conducting this analysis are not available. We provided a draft of this report for comments to the Departments of the Treasury, Homeland Security, and Labor. The Department of the Treasury generally concurred with the report’s findings and provided technical comments, which we have addressed as appropriate. The Department of Homeland Security also provided technical comments, which we have addressed as appropriate. The Department of Labor did not provide comments on the report. We are sending copies of this report to the appropriate congressional committees and the Secretary of the Treasury, the Secretary of Homeland Security, the Secretary of Labor, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Our objectives were to examine (1) market shifts among smoking tobacco products since the Children’s Health Insurance Program Reauthorization Act (CHIPRA) of 2009 went into effect, (2) the estimated effects on federal revenue if the market shifts following CHIPRA had not occurred, and (3) what is known about the effects on revenue if Congress were to eliminate current tax disparities between smoking tobacco products. Our analysis focuses on roll-your-own tobacco, pipe tobacco, small cigars, and large cigars. It covers sales and federal excise tax payments for these products from October 2001 through September 2018. To address the objectives in this study, we reviewed documents and interviewed agency officials from the Department of the Treasury’s Alcohol and Tobacco Tax and Trade Bureau (TTB), the Department of Homeland Security’s U.S. Customs and Border Protection (CBP), and the Department of Labor’s Bureau of Labor Statistics (BLS). We also interviewed representatives from other organizations working on tobacco and taxation issues to obtain background information on markets, industry, and consumption practices and trends for tobacco products. For objective one, we identified market shifts among smoking tobacco products by analyzing TTB domestic removals data and CBP imports data to identify sales trends across the different domestic and imported tobacco products before and after CHIPRA took effect. For objectives two and three, we estimated the federal revenue effects of differences in federal excise tax rates for tobacco products by analyzing TTB’s and CBP’s revenue data and BLS price data for smoking tobacco products. We estimated what the effect on tax revenue collection would have been if the sales trends for roll-your-own and pipe tobacco and for small and large cigars had not been affected by substitution between the products but had been affected by the increase in price due to the tax—in other words, if the market shifts resulting from the substitution of higher-taxed products with lower-taxed products had not occurred. In this report, we refer to this estimated effect on federal tax revenue collection as revenue losses. In addition, we analyzed what is known about the effects on federal revenue if Congress were to eliminate current tax disparities between smoking tobacco products. We assumed that the pipe tobacco federal excise tax was increased and equalized to the level of the roll- your-own tobacco tax as of October 1, 2018, and we calculated the cumulative revenue differential for five fiscal years through September 2023. We assessed the reliability of the data for these objectives by performing data checks for inconsistency errors and completeness and by interviewing relevant officials. We determined that the data used in this report were sufficiently reliable for our purposes. Our estimate of federal revenue losses resulting from differences in federal excise tax rates among smoking tobacco products includes combined tax revenue losses for the roll-your-own and pipe tobacco markets as well as the small and large cigar markets. Our analysis takes into account the expected fall in quantity demanded due to the price increases resulting from the higher federal excise tax rates that CHIPRA imposed on these smoking tobacco products, holding other variables constant. To calculate the range of federal revenue losses, we included high and low estimates based on assumptions about the effect of a price increase on projected sales. Economic theory shows that when the price of a product increases, the demand for the product will adjust downward, decreasing at an estimated rate based on demand for the product, i.e., price elasticity. On the basis of our prior work estimating revenue losses from tobacco taxes and a literature review, we determined that the price elasticity for the smoking tobacco products ranges from -0.6 to -0.3, respectively, for the low and high revenue estimates. Our projections also take into account the historic sales trends for these products, the sales trend of cigarettes after CHIPRA and the tax component of the price. We developed our revenue loss estimate by comparing the actual tobacco tax revenues collected by TTB with a counterfactual scenario. The counterfactual model draws from a model used by Dr. Frank Chaloupka, an economist and a leading scholar who has investigated the effect of prices and taxes on tobacco consumption in numerous publications. In particular, we based our methodology on Dr. Chaloupka’s model calculating the effect of raising cigarette taxes in the State of Illinois. This methodology projects the effect of a future tax increase based on the historic sales trend, the amount of the tax, and the price elasticity of demand. Under this model, when a tax increase is enacted, demand for the product is expected to decline based on the price elasticity and the effect on prices. Following this initial decline, demand for the product is expected to continue at the rate of its historic sales trend. We updated this model by assuming that tobacco products that incur a tax increase to match the tax rate on cigarettes will follow the cigarette sales trend after CHIPRA rather than the product’s historic trend. For example, the roll-your-own tax rate increased under CHIPRA to match the rate on cigarettes because it was viewed as a substitute for cigarettes. Projecting the pre-CHIPRA sales trend forward based on historical data could provide a misleading result as it includes the additional consumption from substitution. Under our assumption, the pre- CHIPRA sales trend is adjusted downward based on the actual sales trend for cigarettes, which has generally declined in recent years. The BLS price data used in our analysis are a subset of the data used for calculating the Consumer Price Index for tobacco products. The BLS data contain retail price information collected each month throughout the United States. These price data only include excise taxes from federal, state and local governments and exclude shipping, handling, sales tax, and fuel surcharges. Because the BLS data are at the retail level, there is an expected markup in addition to the charges mentioned above. To simplify the model, we assumed that the markup remains constant after CHIPRA was passed. We calculated an average price for the year before CHIPRA was enacted, and we calculated the post-CHIPRA price by adding the new tax to the pre-CHIPRA price. Therefore, we estimated only the effect of CHIPRA on taxes. We calculated large cigar revenues and developed a revenue loss estimate for large cigars using assumptions based on available data. As discussed earlier in the report, small cigars are currently taxed at $50.33 per thousand sticks, while, large cigars are taxed at 52.75 percent of the manufacturer’s sale price, up to a cap of $402.60 per thousand sticks. TTB collects revenue data for all cigars, but does not collect separate revenue data for small and large cigars. We calculated large cigar revenues by subtracting small cigar revenue from total cigar revenue. We calculated small cigar revenues by multiplying the number of sticks reported to TTB in each month by the tax rate. After calculating large cigar revenue, we estimated the average tax paid per cigar by dividing the large cigar revenue by the number of sticks for each month and calculating the average price. From March 2007 through March 2009, the average large cigar tax collected was 4.2 cents per stick. CHIPRA raised this cap from 4.9 cents to approximately 40 cents per stick. We calculated that the average taxable price for large cigars before CHIPRA was 20.12 cents. Since the tax is based on the price rate, the percentage change in price due to taxation is based on the percentage change of the price, plus tax, before and after CHIPRA. To calculate the potential effect on federal tax revenue from raising the tax rate for pipe tobacco to match the roll-your-own tax rate, we followed the model discussed above, but we adjusted the pipe tobacco tax to the roll-your-own rate of $24.78 per pound. The model assumes that taxes would have been equalized as of October 1, 2018, and calculates the cumulative revenue differential for 5 fiscal years through September 2023. The model takes into account the additional reduction in consumption due to the tax increase and estimates potential revenue differentials. A price elasticity of -0.8 is assumed to provide a conservative scenario. Our model assumes that there are no other smoking tobacco products that are close substitutes, an assumption we also made in our previous models; the higher elasticity of -0.8 accounts for a drop in consumption altogether. The magnitude is based on a literature review and interviews with the Joint Committee on Taxation. After the drop in demand due to the tax increase, demand is projected linearly using the most recent 5-year historic trend. The projection of actual sales is calculated by applying the same historic trend to the actual sales of roll-your-own and pipe tobacco. Actual revenue is calculated by multiplying the tax rate to the projected sales. An analysis projecting the impact of equal tax rates for small and large cigars requires a different set of assumptions. The reliability of any such model would be questionable, particularly for large cigars because the tax rate on them is calculated as a percentage of the price. Compared with determining the tax on all other tobacco products, according to TTB, determining the tax on large cigars is extremely complex. We concluded that modeling hypothetical consumption trends for smoking tobacco products after equalizing tax rates on small and large cigars would require a complex set of assumptions not sufficiently grounded in reliable data. These assumptions include the price distribution of large cigars since CHIPRA was enacted and assumptions about the proportion of the large cigar market captured by imported large cigars if large cigars were taxed similarly to small cigars. Rather than calculating a tax revenue estimate using assumptions not grounded in reliable data, we present actual cigar revenue and show how the large cigar market has changed from domestic cigars to cheaper imported cigars over time. While it is possible to develop a tax equalization model based only on applying a minimum tax rate per large cigar of 5.03 cents per stick—to ensure large cigars are not taxed below the small cigar tax rate of 5.03 cents per stick—this approach would not produce a reliable estimate of the full revenue effect of legislative proposals to equalize small and large cigar taxes. Applying only a minimum tax would have the effect of underestimating the federal excise tax collected from more expensive cigars because this would reduce the revenue estimates on large cigars that are currently taxed at between 5.03 cents per stick and the maximum rate of 40 cents per stick. In addition, the distribution of domestic large cigar sales that are taxed below the small cigar tax rate is unknown because TTB data on domestic large cigar sales are collected by manufacturers and reported monthly as a quantity aggregate. Without incorporating this information on the distribution of large cigars paying above and below the small cigar tax rate of 5.03 cents per cigar, an estimate of the revenue effects of equalizing small and large cigars would understate the potential revenue that could have been collected from large cigars. We conducted this performance audit from September 2018 to June 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Christine Broderick (Assistant Director), Jeremy Latimer (Analyst-in-Charge), Pedro Almoguera, David Dayton, Mark Dowling, Christopher Keblitis, and Ethan Kennedy made key contributions to this report.", "summary": "In 2009, CHIPRA increased and equalized federal excise tax rates for cigarettes, roll-your-own tobacco, and small cigars but did not equalize tax rates for pipe tobacco and large cigars—products that can be cigarette substitutes. GAO reported in 2012 and 2014 on the estimated federal revenue losses due to the market shifts from roll-your-own to pipe tobacco and from small to large cigars. This report updates GAO's prior products by examining (1) the market shifts among smoking tobacco products since CHIPRA, (2) the estimated effects on federal revenue if the market shifts had not occurred, and (3) what is known about the revenue effects if Congress were to eliminate current tax disparities between smoking tobacco products. GAO analyzed data from the Department of the Treasury and U.S. Customs and Border Protection to identify sales trends for domestic and imported smoking tobacco products, to estimate the effect on tax collection if market substitutions had not occurred, and to model the effects of equalizing tax rates for smoking tobacco products. Large federal excise tax disparities among similar tobacco products after enactment of the Children's Health Insurance Program Reauthorization Act (CHIPRA) of 2009 led to immediate market shifts (see figure). Specifically, CHIPRA created tax disparities between roll-your-own and pipe tobacco and between small and large cigars, creating opportunities for tax avoidance and leading manufacturers and consumers to shift to the lower-taxed products. Following the market shifts after CHIPRA, the lower-taxed products have sustained their dominant position in their respective markets. Market shifts to avoid increased tobacco taxes following CHIPRA have continued to reduce federal revenue. GAO estimates that federal revenue losses due to market shifts from roll-your-own to pipe tobacco and from small to large cigars range from a total of about $2.5 to $3.9 billion from April 2009 through September 2018, depending on assumptions about how consumers would respond to a tax increase. Federal revenue would likely increase if Congress were to equalize the tax rate for pipe tobacco with the rates currently in effect for roll-your-own tobacco and cigarettes. GAO estimates that federal revenue would increase by a total of approximately $1.3 billion from fiscal year 2019 through fiscal year 2023 if the pipe tobacco tax rate were equalized with the higher rate for roll-your-own tobacco and cigarettes. While equalizing federal excise taxes on small and large cigars should raise revenue based on past experience, the specific revenue effect is unknown because data for conducting this analysis are not available. These data are not collected by the Department of the Treasury because such data are not needed to administer and collect large cigar taxes under the current tax structure. In its 2012 report, GAO recommended Congress consider equalizing tax rates on roll-your-own and pipe tobacco and consider options for reducing tax avoidance due to tax differentials between small and large cigars. Treasury generally agreed with GAO's conclusions and observations. As of May 2019, Congress had not passed legislation to reduce or eliminate tax differentials between smoking tobacco products. Treasury also generally agreed with this report's findings.", "document_type": "gao"}
{"report": "After Border Patrol agents or OFO officers apprehend noncitizen family units, they are to interview each individual, using interpreters if needed, and collect personal information such as their names, countries of nationality, and age. Agents and officers also collect biometric information, such as photographs and fingerprints, from certain individuals, including those in family units. Border Patrol agents and OFO officers use fingerprints to run records checks against federal government databases to determine whether individuals have any previous immigration or criminal history. Agents and officers are to enter information about the individuals in the appropriate automated data system as soon as possible, in accordance with CBP policy. According to Border Patrol and OFO officials, if noncitizens are determined to be ineligible for admission into the United States, agents and officers must determine whether to place them, including those arriving in family units, into full or expedited immigration removal proceedings, consistent with the Immigration and Nationality Act. In full removal proceedings, individuals have the opportunity to present evidence to an immigration judge to challenge their removal from the country and apply for various forms of relief or protection, including asylum. In expedited removal proceedings, the government can order individuals removed without further hearing before an immigration judge unless they express the intent to apply for asylum or a fear of persecution or torture if returned to their home country. Most arriving family units are eligible to be placed into expedited removal proceedings, with certain exceptions, according to Border Patrol and OFO officials. A 2015 CBP policy requires CBP’s agents and officers to record such decisions for each family unit member in agency data systems. Further, Border Patrol agents and OFO officers print copies of the information they enter into data systems to create a paper file, known as an “A-file,” for each family unit member they apprehend. One of the key required DHS forms in the A-file is Form I-213, Record of Deportable/Inadmissible Alien (Form I-213). Among other things, this form captures biographic information and includes a narrative section for agents and officers to capture details about the circumstances of the apprehension. According to Border Patrol and OFO headquarters officials, each family unit member’s A-file is reviewed and approved by a supervisor. If CBP or ICE determines that a family separation is warranted, agents or officers process the child or children as UAC, according to Border Patrol, OFO, and ICE officials. ICE’s Office of Enforcement and Removal Operations is generally responsible for transferring these children, including those separated from a parent, as appropriate, to ORR. Under the Trafficking Victims Protection Reauthorization Act of 2008, children must be transferred to ORR within 72 hours after determining that they are UAC, except in exceptional circumstances. Table 1 provides additional details about DHS and HHS roles in processing family units. DHS officials told us that CBP typically holds family units together for a limited time before transferring them together to ICE, in accordance with CBP policy. During that time, agents and officers decide on a case-by- case basis whether to place each family unit in expedited or full immigration proceedings, according to Border Patrol and OFO officials. Individuals, including family unit members, placed in expedited removal proceedings and who express a fear of persecution or torture are generally subject to mandatory detention under the Immigration and Nationality Act pending a final credible fear determination. As a result, Border Patrol and OFO officials stated that its agents and officers typically determine whether ICE has space in its family residential centers before processing family units into expedited removal proceedings. From June 2014 through October 2019, ICE, during various periods, operated four family residential centers in Texas, Pennsylvania, and New Mexico for family units who may be subject to removal while they await the resolution of their immigration cases or who have been ordered removed from the United States. As of October 2019, ICE maintains three family residential centers—in Dilley, Texas; Karnes City, Texas; and Leesport, Pennsylvania—with a cumulative capacity of 3,326 beds. For information about these facilities, see table 2. CBP has historically separated children apprehended in family units from their parent(s) in specific circumstances, such as if the parental relationship could not be confirmed, if there was reason to believe the adult was participating in human trafficking, or if the parent was otherwise a threat to the safety of the child. As we reported in October 2018, ORR officials began observing an increase in the percentage of children in its care who were separated from their parents beginning in 2017. ORR officials stated they saw a continued increase in separated children in their care in the first few months of calendar year 2018. In April 2018, the U.S. Attorney General directed federal prosecutors to implement a zero-tolerance policy along the southwest border for immigration offenses and to accept all improper entry cases referred for prosecution to the extent practicable. According to DHS officials, after the Attorney General’s April 2018 memo, CBP began referring a greater number of adults apprehended at the border to the Department of Justice for criminal prosecution, including parents who were apprehended with minor children. CBP generally then separated the family unit, and after processing the children as UAC, CBP transferred them to ORR custody. According to CBP headquarters officials, the goal of the zero tolerance policy was to deliver a consequence to those crossing the border illegally by charging and convicting them of a crime, specifically a criminal conviction for improper entry, which is generally a misdemeanor. This could then lead to escalating criminal consequences for subsequent apprehensions, since noncitizens—in this case, adults in family units— entering the United States illegally for a second time could be charged with illegal reentry after removal from the United States, a felony offense. On June 20, 2018, the President issued an executive order directing that alien families generally be detained together. On June 26, 2018, a federal judge ruled in the Ms. L. v. ICE case, which was filed by the American Civil Liberties Union on behalf of certain parents (referred to as class members) who had been separated from their children. The June 2018 court order stated that certain separated parents must be reunited with their minor children, barring certain disqualifying criteria. On June 27, 2018, the CBP Commissioner issued a policy memorandum to provide direction on complying with the court order, to include potential reasons why a family separation may still be warranted. Figure 1 describes key actions since the Attorney General’s April 2018 memo that have influenced how DHS determines when family separations are warranted. On July 10, 2018, the court approved reunification procedures for the class members covered by the June 2018 court order. At that time the approved class included those adult parents separated from their children by DHS whose children were in ORR custody as of June 26, 2018, barring certain disqualifying criteria. Subsequently, on March 8, 2019, the court ordered an expansion of the class members to include all adult parents, subject to the same disqualifying criteria, who entered the United States at or between designated ports of entry on or after July 1, 2017, and were separated from their children by DHS. As of January 15, 2020, the government provided to the plaintiffs 11 lists identifying a total of 1,556 children of potential expanded class members. This brought the total number of possible separated children of potential class members to 4,370. CBP data indicate that the number of CBP apprehensions of family unit members was greater in the first two quarters of fiscal year 2019 than in all of fiscal year 2018. In addition, apprehensions of family unit members increased from approximately 22 percent of all southwest border apprehensions in fiscal year 2016 to approximately 51 percent of all such apprehensions in the second quarter of fiscal year 2019. The data also indicate that the majority of CBP apprehensions of family unit members were Central American nationals and the majority of apprehensions of children in family units were for children under the age of 12. Further, the data indicate that CBP placed family unit members in full removal proceedings before immigration courts at an increasing rate, and most were released into the United States to await their immigration court proceedings. Finally, CBP data indicate that CBP separated at least 2,700 children from their parents from April 2018 through March 2019. CBP data indicate that the number of apprehensions of family unit members along the southwest border increased from about 120,400 apprehensions in fiscal year 2016 to about 160,400 apprehensions in fiscal year 2018. Further, CBP apprehensions of family unit members reached about 213,400 during the first two quarters of fiscal year 2019 alone—approximately a 33 percent increase over the entire previous fiscal year. Cumulatively, along the southwest border, CBP apprehensions of family unit members reached about 599,000 apprehensions from fiscal year 2016 through the second quarter of fiscal year 2019 (see fig. 2). As shown in figure 3, CBP data indicate that apprehensions of family unit members grew from about 22 percent of total southwest border apprehensions in fiscal year 2016 to about 51 percent of such apprehensions during the first two quarters of fiscal year 2019. CBP data indicate that, during this period, OFO apprehensions of family unit members at U.S. ports of entry accounted for approximately 24 percent of all such CBP apprehensions. Border Patrol apprehensions of family unit members between ports of entry accounted for approximately 76 percent of all such CBP apprehensions. About 63 percent of CBP’s total family unit member apprehensions occurred in just three Border Patrol sectors in Texas and Arizona (see fig. 4). CBP data indicate that most apprehensions of family unit members from fiscal year 2016 through the second quarter of fiscal year 2019 were of Central American nationals and that the majority of children in family units were under the age of 12. Figure 5 shows that from fiscal year 2016 through the second quarter of fiscal year 2019, the vast majority of these apprehensions—about 82 percent—were nationals of Guatemala, Honduras, or El Salvador. Additionally, about 10 percent of apprehensions of family unit members were of Mexican nationals and approximately 7 percent were nationals of other countries. From fiscal year 2016 through the first two quarters of fiscal year 2019, CBP apprehensions of children in family units totaled approximately 327,600. About 72 percent of these apprehensions were of children under the age of 12 when apprehended by CBP, and about 32 percent were under age 5 (see table 3). Border Patrol also maintains information in its data system that allowed us to analyze the composition of family units, that is, whether the family unit was headed by a male or female and how many children were in the family unit. Most family units apprehended by Border Patrol—about 85 percent—consisted of a single parent travelling with a single child. Most family units were led by a single female in fiscal year 2016; however, the number of households led by single males increased and, for the first two quarters of fiscal year 2019, accounted for almost half of the family units Border Patrol apprehended. Appendix II contains additional information about the composition of family units, including the immigration history of adult family members. From fiscal year 2016 through the first two quarters of fiscal year 2019, CBP placed an increasing percentage of family unit members into full removal proceedings. Specifically, CBP data indicate that around 46 percent of all apprehensions of family unit members in fiscal year 2016 resulted in the family unit members receiving Notices to Appear before an immigration court, which initiate full removal proceedings; around 88 percent received Notices to Appear during the first two quarters of fiscal year 2019. Conversely, CBP data indicate that CBP placed a decreasing percentage of all apprehensions of family unit members into expedited removal proceedings during this period. Specifically, the percentage declined from about 42 percent of all apprehensions of family unit members in fiscal year 2016 to about 6 percent during the first two quarters of fiscal year 2019. CBP officials stated that, since the volume of family units apprehended at the border increased in 2018, they have placed fewer family unit members into expedited removal proceedings, for which detention is generally mandatory, due to limited space for family units in ICE’s family residential centers. Department of Homeland Security’s (DHS) Migrant Protection Protocols In January 2019, DHS introduced the Migrant Protection Protocols, also referred to as the “Remain in Mexico” program, at selected ports of entry and, as of March 2019, within certain Border Patrol sectors. Under this policy, CBP issues eligible individuals, including family unit members, Notices to Appear before an immigration court, thereby initiating full removal proceedings. After CBP agents and officers complete processing duties, DHS officials stated that CBP returns the individuals to Mexico to await their court proceedings, rather than releasing them into the interior of the United States. According to CBP officials, through the end of fiscal year 2019, CBP processed approximately 44,200 individuals—among which about 30,100 individuals, or 68 percent, were family unit members—using the Migrant Protection Protocols. While ICE generally has the authority to detain individuals for the duration of their full removal proceedings, CBP and ICE officials stated that ICE faces constraints that typically prevents it from doing so for family units. Specifically, the limited amount of space at family residential centers is reserved for those family units placed in expedited removal. Therefore, according to ICE and CBP officials, with few exceptions, during the period of our review, family units placed into full removal proceedings were released into the United States to await their court proceedings. According to ICE officials, even if there was more detention space for family units, there are other constraints that would prevent ICE from detaining family unit members (placed into full removal proceedings at any point) for the duration of their court proceedings. Specifically, children may generally only be held in federal immigration detention for 20 days pursuant to the Flores Agreement. Due to the duration of full removal proceedings, most full removal proceedings take longer than 20 days. According to Border Patrol and OFO data, CBP separated at least 2,700 children from April 19, 2018, through the second quarter of fiscal year 2019. As we discuss later in this report, CBP may have separated additional children from their parents during this period and not recorded this information in its data systems. As a result, we are reporting approximate, rounded figures on family separations. Specifically: Border Patrol updated its data system to track family unit separations on April 19, 2018, and issued written guidance to its agents about these changes on May 7, 2018, and August 2, 2018. From April 19, 2018, through March 31, 2019, Border Patrol data indicate that agents separated at least 2,670 children. OFO updated its data system to track family unit separations on June 26, 2018, and issued guidance on these changes to its officers on June 29, 2018. From June 30, 2018, through March 31, 2019, OFO data indicate officers separated at least 30 children. As shown in table 4, CBP data indicate that the number of family unit separations was highest between April 19, 2018 and June 27, 2018, due to DHS’s response to the U.S. Attorney General’s April 2018 zero tolerance policy (see table 4). CBP data also indicate that a small percentage of all children that arrived in family units—fewer than 2 percent—were separated from their parents during these time frames. Appendix II provides additional information about the characteristics of family units separated by CBP. Border Patrol and OFO data indicate that the reasons for these family unit separations varied. Regarding Border Patrol, as of April 19, 2018, agents were able to record a family separation and select from options to explain the reason for it in Border Patrol’s automated data system. Border Patrol data indicate that the reasons that 97 percent of the adults and children separated from April 19 through June 27, 2018, were because agents referred the parent to the Department of Justice for criminal prosecution on charges for criminal history or other reasons, or due to a prior immigration violation(s) and a removal order. Table 5 shows the reasons for family separations indicated in Border Patrol data from April 19, 2018 through March 31, 2019. Regarding OFO, as of June 30, 2018, officers were to record the reason for any family unit separation with the child’s record in OFO’s automated data system. From June 30, 2018 to March 31, 2019, OFO data indicate that about 50 percent of adults and children were separated due to the criminal history of the adult or a child safety concern. Table 6 shows the reasons for family separations indicated in OFO data from June 30, 2018 through March 31, 2019. Since 2015, Border Patrol and OFO have issued policies and updated procedures regarding the information to be collected about family units and family separations, increasing the amount of data collected for family units. For example, Border Patrol and OFO have updated their data systems to better track the number of individuals apprehended as part of family units and to record when and why family separations occur. Specifically, Border Patrol updated its data system in October 2015 to track whether individuals were apprehended as members of a family unit and again in 2018 to track family separations. On October 2, 2015, the Chief of the Border Patrol issued policy guidance requiring agents to process family units together in its data system with a unique identifier called a “family unit number,” which links the records of parents and children apprehended together. Border Patrol updated its system on April 19, 2018 and on August 2, 2018, to track the number of separated adults and children and the reasons for the separations, and issued guidance to its agents about these updates. New Border Patrol agents also receive mandatory training on, among other topics, recording information into agency data systems, including procedures specific to family units. OFO updated its data system to track whether children under the age of 18 arrived as part of a family unit and whether they were separated from a parent (or other family member) with whom they arrived. OFO headquarters officials stated the updates were made during fall 2015. On June 29, 2018, OFO issued a policy memorandum that, among other things, required officers to track family separations in OFO’s data system, and announced system updates to allow officers to select a separation reason. This and subsequent data system updates allowed officers to identify which separations were temporary (in which the family was reunited while still in OFO custody), and which were permanent (resulting in OFO referring a child to ORR), according to OFO officials. All OFO officers hired as of March 2011 receive mandatory training on certain processing procedures, including recording information into agency data systems. As of October 2019, OFO’s data system does not have the capability— such as by using a family unit number—to link the records of noncitizen parents and children apprehended together and thus cannot determine the total number of adults involved in family separations. OFO is implementing a new data system across all ports of entry that includes a function to link the records of parents and children in family units using a unique identifier. According to OFO officials, OFO began developing the new data system in August 2017 and, as of October 2019, has implemented it at 90 ports of entry, none of which are land ports of entry along the southwest border. In June 2019, OFO officials stated they planned to train OFO officers on the new data system at land ports of entry along the southwest border in late summer 2019, but as of October 2019 that timeline had been delayed due to the high volume of family units apprehended that summer. According to OFO headquarters officials, they expected to deploy the new system to locations along the southwest border on an ongoing basis as conditions allow. It is too soon to determine whether the new data system will enable OFO to link children apprehended at ports of entry to their parents and allow for OFO to track the total number of family members separated in its aggregated data. It is also too soon to determine whether the new system will provide OFO officers with more readily available information that could help reunify separated family units, if necessary. Since October 2015, some Border Patrol and OFO documents have included inconsistent guidance on how agents are to define a family unit for processing purposes. CBP’s 2015 policy defines a family unit to include one or more non-U.S. citizen juvenile(s) accompanied by his or her parent(s) or legal guardian(s), which Border Patrol agents confirmed is the agency’s official definition that should guide how its agents process family units. However, as shown in table 7, certain Border Patrol policy documents since October 2015 have also stated that “all members of the apprehended family unit must be non-criminal and/or non-delinquent and have no history of violence or substance abuse.” As a result, individuals in family units that Border Patrol considered criminal, delinquent, or to have a history of violence or substance abuse may not have been included in Border Patrol’s aggregated data on apprehended family units and family separations (once the agency began tracking separations in April 2018), because agents did not define and process them as family units. We raised these inconsistencies to Border Patrol headquarters officials in April 2019, and they acknowledged that certain policy and training documents contained inaccurate definitions and guidance, which could have led some agents to process certain parents and children separately, without a family unit number to link their records. Specifically, they stated that the language requiring that “all members of the family unit must be non-criminal and/or non-delinquent, and have no history of violence or substance abuse” should not be included in Border Patrol’s definition of a family unit. In addition, officials noted that any guidance directing agents to process a family unit separately in the data system, as a single adult and UAC rather than linked together with a family unit number, due to a planned prosecution referral is inconsistent with Border Patrol’s processing procedures. They stated this was an oversight and not an intentional change to the agency’s official definition as indicated in CBP’s 2015 policy. The Border Patrol headquarters officials were unsure of how often the inconsistent definitions and guidance may have led agents to incorrectly process family units. On the basis of our analysis of Border Patrol and ORR data, we found evidence that agents processed some family units separately, as single adults and UAC, without a family unit number or record of their separation. Specifically, for children apprehended from June 28, 2018 through March 31, 2019, we compared ORR numbers on UAC involved in family separations to Border Patrol apprehension data on separated children. During that period, ORR records indicated that DHS separated 396 children, while Border Patrol apprehensions data indicated that it separated 180 children. Border Patrol headquarters officials confirmed that the discrepancy we identified between Border Patrol data and ORR records may be attributable, in part, to the agents processing family units incorrectly and separately, without assigning them a family unit number. To better understand the discrepancy between the ORR and Border Patrol data, we selected a random, nongeneralizable sample of 40 ORR records for UAC involved in family separations from June 28, 2019 through March 31, 2019, and found matches for each of the children in Border Patrol apprehensions data. In 14 of the 40 selected ORR records, Border Patrol data indicated the agent had not recorded the child as a member of a family unit linked to a parent’s record with a family unit number. Thus, Border Patrol agents had not recorded the subsequent separation when agents referred the children to ORR as UAC. A Border Patrol headquarters official stated that it is also likely that some agents were processing family units separately, rather than linking them with a family unit number, from May to June 2018 when agents were referring parents for criminal prosecution in response to the April 2018 zero- tolerance policy. The official stated that agents may not have realized that assigning a family unit number was necessary to track the separation in the Border Patrol data. During the course of our audit, we discussed this issue with Border Patrol and, as a result, Border Patrol issued new guidance to its sectors in April 2019 with an updated definition of family units consistent with CBP policy. According to Border Patrol officials, Border Patrol also removed previous policy documents, with the incorrect definitions and guidance, from a website accessible to all Border Patrol agents. However, as of late November 2019, Border Patrol training materials still direct agents to process a parent and child separately, without a family unit number, if a family member has a history of criminality, delinquency, violence, or substance abuse, or if Border Patrol plans to prosecute the parent. This definition and guidance, inconsistent with CBP policy, has been included in training provided to all new agents at Border Patrol’s basic training program since at least October 2017. According to officials from the Border Patrol Academy, which is responsible for updating training materials in coordination with program officials, they plan to update the training materials in 2020. In the meantime, since September 2019, the Border Patrol Academy has been providing trainees with a handout that includes a definition of family units consistent with CBP policy. Regarding OFO, we also found that since 2012, training materials for new officers have included a definition of a family that is inconsistent with CBP and OFO policy. Specifically, OFO training materials issued in January 2012—and in use as of November 2019—define a “family group” as “a juvenile who is accompanied by closely related adults (parent, grandparent, brother, sister, or legal guardian)” and considers the juvenile to be UAC if “the juvenile is accompanied by relative(s) not closely related.” The training document does not include a definition for “family unit.” However, other key OFO policy documents issued subsequently define family units in a way that is consistent with CBP policy—namely, a February 2016 memo on processing family units in OFO’s data system and a June 2018 memo on tracking family separations. We raised the discrepancy in OFO’s training materials with OFO headquarters officials in June 2019. OFO officials were unsure whether this definition had led any officers to incorrectly process adults and children as family units when they did not meet CBP’s definition of a family. OFO headquarters officials stated the training materials were inconsistent with CBP and OFO policy, and officials from CBP’s Office of Training and Development stated they updated the training materials and provided them to OFO in late November 2019. However, as of December 2019, CBP had not provided us with the updated materials to verify that the revisions are consistent with CBP policy. Standards for Internal Control in the Federal Government states that management should design control activities, including by providing the right training tools to achieve operational success. In addition, in GAO’s Guide for Strategic Training and Development Efforts, we have reported that senior managers need to continually observe and assess how changes, such as in policies or practices, may affect the agency’s training needs. This is one way, among others, to help ensure that the agency has a framework to achieve its mission. Border Patrol and OFO officials acknowledged the need to update training materials with definitions and guidance, consistent with CBP policy; they explained that they had not yet done so due to the considerable time and coordination it requires. Issuing updated training materials that reflect CBP policy would help CBP ensure that Border Patrol agents and OFO officers are processing family units appropriately and tracking all separations. CBP has policies and procedures for assessing the validity of family units, but does not have written guidance to help ensure that these cases are well documented, as required by CBP policy. CBP has policies and procedures for assessing the validity of family unit relationships. During processing, Border Patrol and OFO officials said that it is standard practice for agents and officers to assess whether (1) adults and children apprehended together meet CBP’s definition of a family unit and (2) whether agents and officers deem the claimed family relationships to be potentially invalid. A CBP policy issued on June 27, 2018, states that “fraudulent claims of family relationships” should be processed under “current CBP policies and procedures.” In practice, this means that agents and officers are to consider the validity of family relationships on a case-by-case basis with the information they have available at that time, according to Border Patrol and OFO headquarters officials. For example, these officials stated that agents and officers review any available documentation, such as birth certificates, presented by individuals; monitor interactions between adults and children to assess whether interactions are typical of that of a parent and child; and generally use their law enforcement training, such as interviewing skills, to help assess the validity of family relationships. Border Patrol and OFO officials noted that, in some instances, individuals have admitted to falsely posing as a family, while other times agents and officers have to make an assessment based on the totality of the information available to them. In accordance with CBP policy, Border Patrol and OFO are to generally hold individuals no longer than 72 hours, so Border Patrol and OFO officials stated they must assess the validity of the family units based on available information during the time they have individuals in custody. According to Border Patrol and OFO officials and documents, they have observed cases in which (1) a family unit claims a child is under 18 years of age, but agents suspect the child is older, and thus they do not meet CBP’s definition of a family unit, or (2) the adult claims to be the parent, but Border Patrol has concerns that the adult is another family relation, such as an aunt or older sibling, or the adult is not related to the child at all. In June 2019, the Acting Secretary of Homeland Security testified that CBP identified “almost 4,800 migrants this year” in family units that CBP agents and officers determined to be “fraudulent” in nature. In cases when Border Patrol agents or OFO officers, with approval from their respective supervisors, assess that the relationship of a family unit may not be valid, the child is to be processed as a UAC and transferred to ORR. Specifically, according to Border Patrol and OFO officials and documents, agents and officers are to indicate in their data systems that the adult and child were separated and the reason why, and then refer the child to ORR as a UAC. For Border Patrol, this process involves removing the family unit number linking their records. Border Patrol and OFO do not consider these cases to be family separations, since CBP assessed that the individuals may not be part of a valid family unit. According to CBP’s June 2018 policy, if a child arrives with an adult claiming to be the child’s parent, a supervisory-level OFO or Border Patrol official must give approval before an agent or officer transfers a child to ORR as a UAC. According to Border Patrol and OFO headquarters officials, if an adult wishes to appeal CBP’s assessment, the adult may raise the issue with ICE officers when transferred to an ICE detention facility. Border Patrol headquarters officials told us that its agents generally explain to the adults that Border Patrol is processing them separately from the children they arrived with due to concerns about the validity of the family relationship. OFO headquarters officials told us that OFO does not generally notify adults when processing the adults and children in potentially invalid family units because they stated they do not want to jeopardize the safety of the child if they suspect fraud, smuggling, or trafficking. According to Border Patrol and OFO officials, they may separate adults and children who they are concerned might not be valid family units to ensure the safety of the child—for example, if agents and officers cannot be certain that the child has not been a victim of trafficking by the accompanying adult. Further, Border Patrol, OFO, and ICE officials stated that ICE and ORR are better positioned to further investigate these cases if an adult refutes CBP’s assessment that the family unit was invalid, because CBP must generally hold individuals for a short period. In addition, ICE and ORR are the agencies most involved in reunifying family units, when appropriate. CBP began tracking the number of potentially invalid family units in 2018. On April 19 and June 29, 2018, Border Patrol and OFO, respectively, issued guidance about updates to agency data systems and issued guidance to enable agents and officers to record potentially invalid family units. That is, if the appropriate Border Patrol and OFO managers give approval, agents and officers separate potentially invalid family units, and record the separation and the reason for it in agency data systems, according to Border Patrol and OFO officials and documents. More specifically: Border Patrol agents are to delete the family unit number from the parents’ and children’s records, and indicate the reason from options that include “child is over the age of 18,” “no family relationship,” or “no family relationship–prosecuted.” OFO officers are to indicate that a child was separated from the adult with whom they arrived, and are to indicate the reason as “fraudulent relationship.” Border Patrol and OFO officials noted observing cases of potentially invalid family units, and Border Patrol data indicate an increase in the number since Border Patrol began tracking the cases in April 2018. Specifically, during our fall 2018 visits to ports of entry and border stations in Texas and California, Border Patrol and OFO officials stated they have observed suspected or confirmed cases of adults falsely claiming to be a child’s parent, including occasional instances of seeing the same child apprehended multiple times, but with different adults claiming to be their parents. From April 19, 2018 through March 31, 2019, CBP data indicate that CBP referred at least 921 children to ORR (918 by Border Patrol and 3 by OFO) due to CBP’s concerns that the family relationships were potentially invalid. During the same period, Border Patrol data also indicated that 2,245 adults were processed separately from the children with whom they were apprehended due to concerns about the validity of the family relationships. By comparison, Border Patrol data indicated that agents processed 256,743 adults and children in valid family units during this period. However, from July 1, 2018 through March 31, 2019, the number of individuals Border Patrol assessed as part of potentially invalid family units grew at a faster rate than the number of individuals apprehended in valid family units. Specifically, the average monthly increase in adults and children Border Patrol assessed to be in potentially invalid family units rose by about 70 percent per month, on average, during this period. Meanwhile, Border Patrol data indicate the rate of increase for adults and children in valid family units was about 53 percent per month, on average. However, some of the family units that CBP assessed to be potentially invalid are subsequently found to be valid, according to ORR and ICE officials. According to ORR officials and records of UAC involved in family separations from June 28, 2018 through June 28, 2019, ORR was aware of only 46 cases in which CBP referred a child to ORR care because CBP had assessed the family unit to be invalid. In at least 10 of those cases, the family was later determined to be valid and the child reunited with his or her separated parent, according to ORR officials, as of June 2019. Anecdotally, ICE headquarters officials stated that there are occasionally cases in which CBP referred a child to ORR because agents or officers assessed the family to be an invalid family unit, but ICE or ORR later determined the family was valid and eligible to be reunified. For example, ORR’s records on family separations included instances in which the validity of family relationships was determined through DNA testing. ICE officials stated that its officers are able to conduct additional research about the validity of family relationships, as needed, once an adult has been transferred to its custody and the child to ORR. However, ICE does not track how often potentially invalid family units are later assessed to be valid and reunited, and, therefore, could not provide an exact number of how often this has occurred. DHS and ICE officials have tracked the outcomes of some deployments of ICE officers to help CBP assess the validity of family relationships. Specifically, the Acting Secretary of Homeland Security testified before the Committee on Oversight and Government Reform in the House of Representatives on July 18, 2019 that CBP agents and officers referred 2,475 family unit members they suspected had invalid family relationships to go through an additional assessment by ICE officers who, among other training and skills, have specialized forensic interviewing skills. The ICE officers assessed 352 of the 2,475 individuals—approximately 14 percent—to be invalid family members. Additionally, an ICE official also testified before the Senate Committee on Homeland Security and Governmental Affairs on June 26, 2019, and described a May 2019 pilot that involved voluntary rapid DNA testing for some individuals. According to this official, 16 of the 84 family units tested, around 19 percent, proved not to be the parent of the child with whom they arrived. According to ICE officials, those family units it determined to have valid family relationships while still in CBP custody, based on the available evidence, remained together as a family unit and were not separated. On June 27, 2018, the CBP Commissioner issued a policy memorandum requiring that “fraudulent claims of parental or legal guardianship relationship” should be “well-documented to support such claims”; however, CBP does not have guidance to clarify how agents and officers are to fulfill that requirement. Border Patrol and OFO headquarters officials indicated that taking the aforementioned steps to record information in agency data systems meets the CBP policy requirement for documentation. In addition, according to Border Patrol and OFO officials, agents and officers also record details of the apprehension on the Form I- 213, which is required for all individuals. However, neither Border Patrol nor OFO has guidance about whether or what details about a family unit being assessed as potentially invalid should be included on the Form I- 213. Learning about the details of these cases and why CBP made its assessment is important to ICE officials in the event an adult refutes the assessment and ICE must take additional steps to determine the validity of the family relationship. ICE officials can view the information CBP agents and officers record on the Form I-213, since ICE officers can access the form in a database it shares with CBP. However, the headquarters official responsible for coordinating ICE’s family and juvenile programs stated that the level of detail included in the forms varies by location and the narrative often does not include details about the reason why CBP considered a family unit potentially invalid. ORR officials also stated this information would be helpful to ORR because it may be relevant to the decisions ORR staff make for UAC, such as selecting sponsors. ORR intake staff told us that the documents they receive from CBP accompanying UAC referrals typically do not contain narrative information about agents’ or officers’ concerns about potentially invalid family relationships. While CBP tracks cases on potentially invalid family units in its data systems, this tracking does not (1) document the circumstances to support the assessment of invalidity or (2) provide complete and timely information for ORR and ICE to help them to fulfill their responsibilities, including to review cases in which CBP initially determined a family to be invalid but further investigation is needed. Rather, CBP’s data systems only track the assessment of invalidity by allowing agents to select that as a reason from a set of options, but do not track the circumstances to support that assessment. However, CBP policy directs that these cases be “well-documented to support such claims.” Standards for Internal Control in the Federal Government state that management should use quality information to achieve the entity’s objectives. In doing so, management should identify the information needed to achieve objectives and address risks, and should consider the expectations of both internal and external users. Providing guidance on what narrative information Border Patrol agents and OFO officers are to document on a child’s and the accompanying adult’s Forms I-213 about potentially invalid family units could help better ensure that the events are well-documented to support such assessments, in accordance with CBP policy. Further, this could help ensure that ICE and ORR officials have relevant details they need to make decisions for adults and children in their custody, including reuniting valid family units, where appropriate, before adults are removed from the United States. CBP, Border Patrol, and OFO have developed policies and procedures for those agents and officers responsible for recording and approving family separations; however, Border Patrol and OFO do not have sufficient controls to ensure (1) Border Patrol agents are accurately and consistently recording family separations in their data systems, (2) Border Patrol and OFO’s data systems accurately capture separation reasons that are consistent with CBP policy, and (3) required forms include sufficient details about the circumstances of the separations. Regarding policies and procedure for family separations, according to CBP’s June 2018 policy, a Border Patrol watch commander, or equivalent position, must approve every family separation. Border Patrol and OFO officials told us that higher-level officials, such as Border Patrol sector chiefs or Port Directors, are often involved in decisions to separate family units. A 2015 CBP policy requires that agents and officers record family separations in agency data systems. Further, after updating data systems to track family separations in 2018, as previously described, Border Patrol and OFO issued written guidance to agents and officers with specific instructions on how to record family separations in its data systems. For example, Border Patrol issued guidance about how to record family separations in its data system in May 2018, August 2018, and April 2019. In addition, Standards for Internal Control in the Federal Government state that management should use quality information to achieve the entity’s objectives, and identify the information needs to address risks. In doing so, managers should also consider the expectations of both internal and external users when collecting information. Further, changes in conditions affecting the entity and its environment often require managers to revise the internal control system, on a timely basis to maintain effectiveness. Our analysis of Border Patrol and ORR data indicates that Border Patrol agents have not accurately and consistently recorded family separations in the data systems. Specifically, we reviewed a random, nongeneralizable sample of 40 ORR records for UAC involved in family separations between June 28, 2018, and March 31, 2019 and found matches for all 40 of the children in Border Patrol apprehensions data. Among the 40 records, we identified cases in which agents had not documented the family separation in Border Patrol’s data system, as required by CBP and Border Patrol policy. Specifically, Border Patrol data indicated the agent had not processed the separation in the Border Patrol data system for 10 of the 40 UAC involved in family separations. That is, in these cases, Border Patrol agents processed the parents and children together with a family unit number, but did not take the necessary steps in the system to separate them and document the reason why the separation occurred. We shared the results of our analysis with Border Patrol officials, and these officials acknowledged that the discrepancy between Border Patrol and ORR data on family separations may be attributable, in part, to human error—that agents had not correctly recorded family separations in Border Patrol’s data system. However, the officials were unsure of the extent of the problem. Thus, it is unclear whether Border Patrol has accurate records of all separated parents and children in its automated data system. Border Patrol officials stated that data entry errors may have grown with increased processing demands and strained resources faced by Border Patrol as the volume of family units apprehended increased in fiscal years 2018 and 2019. However, as mentioned, federal internal control standards provide that changes in conditions—such as increased processing demands agents faced during periods of increased apprehensions of family units—often require managers to revise the internal control system. Developing and implementing additional controls to ensure that Border Patrol agents accurately record family separations in the data system, consistent with CBP and Border Patrol policies, would better enable Border Patrol to maintain complete and accurate information on all family separations. For example, an additional control could be to require Border Patrol or OFO managers conducting supervisory review of each apprehension to check that family separations have been accurately recorded in the data system. CBP, Border Patrol, and OFO have policies and procedures in place for those agents and officers responsible for approving family separations and recording the reasons in agency data systems. On June 27, 2018, the CBP Commissioner issued a memorandum to the Chief of the Border Patrol and to the Executive Assistant Commissioner of OFO to provide direction on complying with the June 26, 2018, federal court order in Ms. L. v. ICE that generally prohibits the government from separating parents from their children, to include potential reasons that may warrant continued family separations. Specifically, the memorandum states that separations may occur only for the following reasons: (1) the parent has criminal convictions for violent misdemeanors or felonies, (2) CBP plans to refer the parent for a felony prosecution, (3) the parent poses a danger to the child, or (4) the parent has a communicable disease. On June 29, 2018, OFO issued a policy memorandum reiterating the potential separation reasons included in CBP’s June 27, 2018 policy memorandum. According to Border Patrol headquarters officials, Border Patrol did not issue any further implementing guidance. Border Patrol and OFO officials stated that agents and officers are to use all available information to determine whether a family separation is warranted. Such information may include available birth certificates, personal observations of the family unit’s behavior, results of background checks for criminal and immigration history, and results from available medical assessments. In some instances, Border Patrol and OFO officials stated that agents and officers may not always have complete information, such as when a database indicates a parent’s arrest but does not indicate whether he or she was convicted of the charge, but that agents and officers are to weigh the totality of the circumstances. For situations in which agents and officers are unsure whether to separate a family, CBP’s policy states that agents and officers should contact their local Office of Chief Counsel for guidance. Although Border Patrol and OFO data systems allow agents and officers to select among options to indicate the reason for a family separation, the reasons available in the systems do not fully align with CBP policy. For example, Border Patrol’s data system does not include an option that indicates the parent poses a danger to the child—one of the reasons articulated in the Commissioner’s June 2018 memorandum. Table 8 shows how the separation reasons available in Border Patrol and OFO data systems compared with the potential separation reasons established in CBP’s June 2018 family separations policy. Border Patrol and OFO headquarters officials stated they were unsure why the separation reasons available in the data systems do not fully align with CBP policy on family separations, but stated that the data system reasons have an implicit link to CBP policy. They stated that Border Patrol and OFO officials review and approve each family separation to ensure it meets CBP policy. In addition, OFO headquarters officials stated that it issued guidance in June 2018 that reiterated CBP’s policy on potential reasons for family separations. However, as illustrated in table 8, it is sometimes not clear how separation reasons in Border Patrol’s and OFO’s data systems align with CBP policy. For example, Border Patrol’s option for “family member prosecuted for other reasons” does not provide enough information to determine whether Border Patrol is referring a parent for the prosecution of a felony, as required by CBP policy. Both Border Patrol and OFO have previously changed separation reasons in agency data systems, and in June 2019 Border Patrol officials stated they continue to analyze the need for updates. As of October 2019, these officials stated that Border Patrol and OFO do not have any current plans to update the separation reasons in their data system. CBP officials who conduct supervisory review of files and approve family separations rely, in part, on the information agents and officers record in Border Patrol and OFO data systems, in conducting reviews and sharing information, according to Border Patrol and OFO officials. Updating Border Patrol’s and OFO’s data systems to ensure that options for separation reasons clearly align with CBP policy could help ensure that CBP makes decisions about family separations in accordance with CBP policy and that data CBP collects reflects that. CBP’s policies related to family separations do not include written requirements that agents and officers record a description of the family separation. However, Border Patrol and OFO officials stated that they expect agents and officers to record the circumstances surrounding family separations on a narrative section of each family member’s Form I-213. Yet we found that Border Patrol agents are not consistently recording detailed information about family separations on the Form I-213—the official record of the apprehension. Specifically, we analyzed a nongeneralizable sample of Forms I-213 for family units whom Border Patrol separated and found that, for most of the family separation cases, one or more of the selected forms had missing or inconsistent information in the narrative descriptions. Specifically, we reviewed a sample of Forms I-213 for 23 family separation cases, involving 27 children and 25 parents. These separations occurred across each of the Border’s Patrol’s nine southwest border sectors between June 28, 2018 and March 30, 2019. In particular, we assessed (1) whether the forms included a reason for the separation, (2) whether the descriptions of the cases provided enough information to determine whether or not the reason met CBP policy, and (3) whether the information recorded for each separation case was consistent across the parents’ and children’s forms. On the basis of our review of the forms, we found there was missing or inconsistent information on one or more of the family members’ forms for 18 of the 23 separated family units. Specifically, we found for three of the 23 family separations, there was no indication that a separation had occurred on one or more of the family members’ forms; for 20 of the 23 family separations, all of the family members’ forms included some indication of a family separation; Seven of the 25 parents’ forms and seven of the 27 children’s forms did not contain a narrative description explaining why the separation occurred; and 17 of the 25 parents’ forms included sufficient narrative information to determine whether the separation met CBP policy; 12 of the 27 children’s forms included enough information to make that determination. In addition, even among those forms with sufficient information to determine whether the reason met CBP policy, we found inconsistencies. For example: Three parents’ and four children’s forms included information that implied that the parent could potentially present a danger to the child, but the actual separation reason noted on the form was something different, such as the parents’ criminal history. For example, the criminal history information provided on one parent’s Form I-213 included information about an arrest for kidnapping, but did not include evidence that the arrest resulted in a conviction, making it difficult to determine whether the separation aligned with CBP policy and, in particular, what reason the separation would fall under. For nine of the 23 family separations, the separation reason was listed as the parent’s criminal history on one of the family member’s forms, but there was missing or inconsistent information on the other family members’ forms. For example, in one instance, the father’s Form I- 213 indicated he had been convicted of sexually assaulting a 12-year- old child, but there was no separation reason and no information about the parent’s criminal history provided on the child’s form. According to ICE officials responsible for monitoring family separations, and reunifying family units where necessary, the narrative information on the Form I-213 is ICE officers’ primary source of information about the circumstances of a family separation. ICE officers need detailed information, according to officials, to help conduct additional research to confirm whether a separation was warranted or respond to requests for information from ORR. In addition, ORR officials told us that they would benefit from CBP recording certain information on a child’s Form I-213— such as the type and timing of a parent’s criminal conviction or whether the parent may pose a danger to the child—and sharing that information, to better inform ORR’s decisions about where and with whom to place UAC when they leave ORR custody. However, CBP has not issued guidance on what descriptive details surrounding family separations agents and officers are to record on the Form I-213, based on our review of CBP documents. In addition, Border Patrol officials stated that they do not have written guidance for agents about what information should be captured on the Form I-213. Conversely, OFO issued guidance stating that the Form I-213 must be annotated with the reason for the family separation, the name of the approving manager, and, at a minimum, the biographical information and “A-number”—a unique identifier for noncitizens apprehended by CBP—of the parent(s) and children. Border Patrol and OFO headquarters officials acknowledged that the level of detail documented on the Form I- 213 about separations may vary by agent or officer, and rely on their supervisory review process to ensure that family separations are consistent with CBP policy. Border Patrol headquarters officials attributed missing separation reasons or inconsistent information about the circumstances of the family separations on the Forms I-213 to multiple factors. Specifically, they acknowledged that Border Patrol has not issued guidance specifying what descriptive details agents should include on the forms, and does not have, for example, specific information that supervisors check for during their review of each individual’s file. In addition, Border Patrol headquarters officials noted that there have been great demands placed on Border Patrol agents to expedite processing during periods of high numbers of family units apprehended and crowding at Border Patrol facilities. However, as noted previously, federal internal control standards state that changes in conditions affecting the entity and its environment— like an increase of family units apprehended along the southwest border—often require management to change the entity’s internal control system, as existing controls may not be effective for meeting objectives or addressing risks under changed conditions. As of October 2019, Border Patrol and OFO had no plans to (1) implement additional controls to ensure that reasons for family separations are included on individuals’ Form I-213 or (2) issue guidance to agents and officers about what descriptive information about family separations they should record on the forms. Developing and implementing additional controls to ensure that Border Patrol agents and OFO officers include a reason for the family separations on the parent’s and child’s Forms I-213 could help CBP ensure its agents and officers are separating family units in accordance with CBP policy. For example, an additional control could be to require the Border Patrol or OFO manager reviewing the information recorded on the Form I-213 to check that certain information, such as the specific separation reason with relevant details, has been included. In addition, without additional guidance on what specific details Border Patrol agents and OFO officers are to include in the narrative information about the family separation events on the parent’s and child’s Forms I-213, ICE and ORR do not have complete or consistent information to use in determining when it may be necessary to reunify family units in accordance with the Ms. L. v. ICE court order. ICE has procedures for processing family units whom CBP apprehended and for releasing family units from ICE custody (see fig. 6). According to ICE field office officials, upon referral by CBP, ICE officers generally review the family unit’s files to ensure that CBP agents and officers completed the forms sufficiently and, if not, ICE officers can return the case to CBP. For example, ICE officers typically ensure that the appropriate family unit member signed his or her copies of paperwork provided by CBP. Additionally, according to ICE field office officials, ICE officers have the discretion to decline the transfer of a family unit that they determine is not suitable for detention in a family residential center or for release. When ICE accepts CBP’s referral of a family unit and receives custody from CBP, ICE officers are to enter information about each family unit member in ICE’s data system, both for family units that ICE plans to detain and those it plans to release. ICE’s data system pulls some information from CBP’s data systems. For example, ICE officers can find basic biographic information about individual family unit members apprehended by Border Patrol by searching for an individual by his or her “A-number,” a unique identifier. In addition, ICE officers are to enter new information, such as the location(s) where officers detained or released the individual family unit members and the documents officers served to them, among other things. For information about the family unit members that ICE detained at its family residential centers, see appendix II. Family units placed into expedited removal by CBP and detained in ICE family residential centers—who express an intention to apply for asylum, a fear of persecution or torture, or a fear of return—undergo screenings conducted by an asylum officer. These screenings occur during detention and are to determine whether one or more family unit members have a credible fear of persecution or torture. The outcome of the screening (and review by an immigration judge, if requested after the screening) determines whether ICE will remove the family unit from the United States or release the family unit into the interior of the country to pursue immigration relief or protection in full immigration proceedings. Additionally, as stated previously, children may generally only be held in federal immigration detention for 20 days pursuant to the Flores Agreement. Thus, if members of the family unit do not receive a credible fear determination within 20 days, ICE generally releases the family unit into the interior of the United States with a notice to appear before an immigration court, which initiates full immigration proceedings. From fiscal year 2015 through fiscal year 2018, ICE data indicate that 99 percent of family unit members who were detained in one of ICE’s family residential centers were subsequently released by ICE into the interior of the United States. For additional information about the outcomes for family unit members detained in ICE family residential centers, see appendix II. According to ICE headquarters and field office officials, while a family unit is at a family residential center, ICE officers typically assist family units with their post-release plans by asking heads-of-household to identify contacts in the United States, such as relatives, that the family unit can stay with after leaving ICE custody. These contacts pay for the family unit’s travel expenses if the family cannot purchase bus tickets, for example, and ICE officers help coordinate these plans and typically drive the family unit to the bus station upon release, according to ICE officials. For family units who are not placed in a family residential center, ICE’s procedures for assisting them with their post-release plans have varied based on local conditions. ICE headquarters and field office officials explained that, prior to October 2018, when the volume of family units arriving at the southwest border began to increase significantly, ICE officers sometimes coordinated post-release plans for family units that did not stay at a family residential center. However, officials stated ICE has not had the resources to help family units with post-release plans since that time and instead has generally relied on nongovernmental organizations for this assistance. When ICE releases family units from its custody to await immigration court proceedings, ICE officers generally enroll the family unit’s head-of- household in its Alternatives to Detention program. The program uses technology, such as ankle monitoring devices, to track the movement of the adult family unit members. ICE field office officials stated that the availability of ankle monitoring devices and the volume of family units arriving at the southwest border can impact whether or not ICE enrolls a family head-of-household in its Alternatives to Detention program. In addition to ankle monitoring devices, most family units are also released on orders that require heads-of-household to report telephonically or in- person to ICE officers once they reach their destination in the United States. ICE officials stated the level of continued supervision by ICE officers is at the discretion of the ICE officer in charge of the family unit’s case and may also be dependent on a variety of factors, such as whether the family unit entered the United States at or between ports of entry, whether the family unit received a positive credible fear determination, and the head-of-household’s prior criminal and immigration record. ICE relies on a manual process to track family unit separations that occur in ICE custody, but does not systematically record this information in its data system. ICE officers are to report all separations that occur in ICE custody to the headquarters office responsible for coordinating family and juvenile programs. ICE headquarters officials in that office compile the information received from the field offices to populate a spreadsheet, which they use to track all separations that occur in ICE custody. In addition, according to ICE officials at headquarters, officers are to include narrative information about the separation and the approving official’s name in a comments field in the parent’s and children’s records in the data system. According to ICE officials, the narrative information in the comment field is not searchable within ICE’s data system and ICE does not have a mechanism, such as a drop-down menu, to systematically record a family unit separation or the reasons for any separations that occur in ICE custody. Thus, ICE cannot pull data from its system to track such separations. ICE headquarters officials stated that these methods are not an efficient and effective means to have readily available data on family separations that occurred in ICE custody. According to ICE policy for detained parents, detained parents maintain their parental rights during removal proceedings. In particular, if ICE is removing a parent from the United States, field office directors or their designees are to accommodate, to the extent practicable, the detained parent’s efforts to make arrangements for his or her minor child or children, including for the children to be removed with the parent. As such, before removing an adult from the United States, ICE officers are to check the individual’s paper A-file, and specifically the individual’s Form I- 213, for any indication the adult arrived with a child, according to ICE headquarters officials. In addition, according to ICE officials, ICE officers are to review the individual’s record in ICE’s data system where ICE officers would be alerted to whether the individual had ever been separated from a child. Given the limitations in ICE’s data system, officers would need to know to review the narrative information in the comments field within the individual’s records to determine whether he or she had been separated from a child in ICE custody; however, none of ICE’s guidance documents explain that officers are to look for such information in the narrative comments field. Further, ICE officials told us that officers are not required to check the spreadsheet maintained at ICE headquarters or contact headquarters officials prior to removing adults from the United States. As of November 2019, ICE headquarters officials stated they are working with the ICE data unit to create a new module that would enhance ICE’s ability to link and track family units in its data system, including capturing information on families that ICE separates. According to ICE officials, ICE has established a project team for this effort and hopes to deploy the updates in the fourth quarter of fiscal year 2020. However, ICE did not provide documentation with details, such as a project plan with time frames for deploying these system updates, to verify these plans. Standards for Internal Control in the Federal Government states that management designs the entity’s information system and related control activities to achieve objectives and respond to risks. Further, management designs the entity’s information system and the use of information technology by considering the defined information requirements for each of the entity’s operational processes. Given that ICE did not provide documentation with details about planned changes to ICE’s data system, it is too early to determine whether and when ICE’s planned system enhancements will include a mechanism that allows ICE officers to systematically track family separations that occur in ICE custody. Without a mechanism in its data system to systematically track the family units it separates, ICE is unable to ensure that separated parents who are subject to removal are able to make arrangements for their minor child or children (including being removed with them), as provided in ICE policy . DHS and HHS have developed interagency agreements for the transfer and placement of UAC between the two departments; however, information sharing gaps remain. In 2015, we reported that the interagency process to refer UAC from DHS to HHS was inefficient and vulnerable to errors because it relied on emails and manual data entry. In addition, each DHS component (Border Patrol, OFO, and ICE) submitted referrals for UAC to HHS’s ORR in a different way. To increase the efficiency and improve the accuracy of the interagency referral and placement process for UAC, we recommended the Secretaries of Homeland Security and Health and Human Services jointly develop and implement a documented interagency process with clearly defined roles and responsibilities for all agencies involved in the referral and placement of UAC in HHS shelters. DHS and HHS concurred with our recommendation. Since our 2015 report, DHS and HHS developed two documents to guide interagency procedures related to the processing of UAC. Specifically, in April 2018, HHS and DHS established a memorandum of agreement regarding information sharing for UAC. In addition, on July 31, 2018, DHS and HHS issued a Joint Concept of Operations to memorialize interagency policies, procedures, and guidelines related to the processing of UAC. According to the April 2018 memorandum of agreement, among other things ICE and CBP are to provide ORR with information at the time of the referral and documents when the child is transferred to ORR, including whether the child was traveling with other individuals and the Form I-213, so that ORR can make informed decisions for the child. Specifically, once a child has been transferred to ORR, the agency begins the process of identifying a potential sponsor for the child and, when a potential sponsor is identified, ORR requests information about that sponsor. At this step, according to the memorandum of agreement, ICE is to conduct a screening of the potential sponsor that includes, at a minimum, a biographic criminal check of national databases, a check for warrants of arrest, and an immigration status check. DHS is to provide HHS with information necessary to conduct suitability assessments for sponsors, including that which HHS would not otherwise have access. In addition, to the extent permitted by law, and consistent with policy, DHS is to report to ORR the results of any investigations it conducts that are relevant to ORR’s determinations concerning the care and placement of UAC. According to the July 2018 Joint Concept of Operations, ICE or CBP should use ORR’s data system to refer UAC to ORR whenever feasible. If ORR’s data system is not available, DHS may email ORR a referral form along with any supporting documentation. DHS is also to provide ORR with specific documents, including the Form I-213, when the child is transferred to ORR. In the event a child is separated from a parent or legal guardian, CBP or ICE is to enter this information into ORR’s data system, according to the Joint Concept of Operations. CBP or ICE is also to include contact information for parents, legal guardians, or adult relatives, as this information can assist in ORR’s reunification process, if needed. ORR is to contact the child’s family to, among other things, determine whether the child has a potential sponsor who resides in the United States, and to facilitate visitation and contact with family members, regardless of their immigration status. Finally, DHS is to preserve the unity of families during repatriation, according to the Joint Concept of Operations. The memorandum of agreement and Joint Concept of Operations state the roles and responsibilities of DHS and HHS and their components and describe some of the information to be shared between the agencies regarding the placement of UAC, among other things. However, DHS and HHS officials’ statements indicate that, in practice, they have not resolved long-standing differences in opinion about whether and how agencies are to share information, and what type of information is needed to inform decisions about the care and placement of UAC, including those processed as UAC after separation from a parent. We found that DHS has not consistently provided information and documents to ORR as specified in the memorandum of understanding and the Joint Concept of Operations. Further, ORR officials identified additional information they believe ORR needs from DHS at the time of referral (or soon thereafter) to inform their decisions about placing children with sponsors and reunifying separated families, when necessary. With regard to information sharing expectations established in the interagency agreements, as of September 2019, we found that certain documents were not being shared or mechanisms for sharing information were not being used consistently. For example, Border Patrol has taken steps since our 2015 report to improve its referral process, so that Border Patrol’s referral information is uploaded directly into ORR’s data system, in keeping with Joint Concept of Operations requirements. However, the referral screens in Border Patrol and ORR data systems do not fully align, which has required ORR headquarters staff to manually enter some required information into the ORR data system. That is, Border Patrol’s referral screen does not include many of the fields—areas to input specific information—included in ORR’s referral screen. Border Patrol and ORR officials offered different perspectives on why the information on the referral screens in the data systems do not align. Specifically, ORR officials stated that Border Patrol has not updated its referral screen to match updates that ORR has made. For example, in July 2018, ORR added a checkbox in its data system for DHS agencies to indicate whether a UAC had been separated from a parent, as necessary. Border Patrol took steps in October 2018 to similarly update its referral screen, so the indication of a family separation would be automatically uploaded to ORR’s data system with the referral. However, additional steps must be taken by ORR for its data system to upload the information, according to Border Patrol officials. Meanwhile, if ORR staff see some indication of a family separation in the Border Patrol referral form, such as in a narrative text field, ORR staff will typically add that information to the records in their data system manually. Border Patrol has not taken additional steps to update other parts of its system’s referral screen to align with ORR’s data system because ORR’s data system does not comply with DHS security standards, according to Border Patrol officials. ORR officials said they had not been made aware of any security concerns. However, concern about system security standards is a long-standing issue that we noted in our 2015 report. As of October 2019, Border Patrol and ORR did not have any plans to collaborate further to improve automated referrals for UAC. Further, as of October 2019, ORR officials told us that ICE and OFO officials are not consistently accessing the ORR data system to submit a referral for a UAC. Specifically, ICE and OFO officers in certain locations use ORR’s data system to submit a referral infrequently and instead use a form, which ORR last updated in 2013, that they attach to emails to refer UAC. However, ORR officials stated their expectation is that email referrals are to be used only occasionally, such as if DHS officials encounter technical problems using ORR’s data system. ICE and OFO stated that their officers only rarely make referrals to ORR and sometimes face constraints that prohibit them from using ORR’s data system to submit the referral. For example, ICE officials stated that officers generally use ORR’s data system for referrals, but that, on some occasions, the officer’s password to access ORR’s data system has expired due to infrequent use, and they must email the referral. In addition, OFO and ICE officials stated that their officers who have access to the ORR data system to make referrals are not always available, so in those instances, other officers must email a referral form to ORR. OFO and ICE headquarters officials were unsure how often their officers used email to send ORR referrals, rather than directly accessing ORR’s data system. ORR officials also stated that even when ICE and OFO use ORR’s data system to submit the referral, consistent with the Joint Concept of Operations, the officers are not consistently marking the separations checkbox in ORR’s data system for those children involved in family separations. As a result of these challenges, ORR officials said they must often manually enter referral information from ICE or OFO into the ORR data system, including any indication of a family separation or that the child was apprehended with an adult. ORR officials also stated that DHS—CBP and ICE—is not routinely submitting the child’s Form I-213 to ORR, as specified by both interagency agreements. Border Patrol and OFO headquarters officials stated they have concerns about sharing sensitive information, including in referral forms or on the Form I-213, with ORR headquarters or contracted shelter staff because they are not law enforcement officers. ORR headquarters officials stated that they have worked with other federal partners to ensure that only ORR officials with the proper authorization receive sensitive materials. These officials said they are interested in working with DHS to set up a similar process so ORR can receive the information it needs to make decisions for UAC. For example, ORR headquarters officials stated that they would explore options for updating DHS and HHS data systems so the child’s Form I-213 could be shared directly between data systems. This would help ensure that only ORR staff who have the proper authorization will have access to them, according to HHS officials. In addition, DHS and HHS provided different perspectives on the expected information sharing procedures included in the interagency agreements. For example, ORR headquarters officials stated they interpret existing interagency agreements to apply to information sharing on all UAC, regardless of whether they were apprehended alone or with an adult. By contrast, Border Patrol headquarters officials stated that the interagency agreements apply to UAC involved in family separations, but not those children referred to ORR after Border Patrol assessed a family relationship to be invalid. In addition, ICE headquarters officials stated that the interagency agreements were drafted to reflect the circumstances of children apprehended alone, not separated children or those CBP assesses to have invalid family relationships. ICE officials also stated they no longer believe the April 2018 memorandum of agreement is valid for any UAC, because it was developed to address a process ORR no longer requires. ORR identified additional information sharing needs—some not covered by existing interagency agreements—to inform decisions regarding the care and placement of UAC. Specifically, this information includes details about the circumstances of family separations, and information about adults who were apprehended with children (who subsequently were designated as UAC). ORR officials stated that ORR and ICE require this information, collected by DHS, to (1) assess potential sponsors for placement of UAC and (2) to reunify eligible separated families. Assessing Potential Sponsors. ORR officials stated that ORR needs additional information about parents and other adults accompanying a child (who is later designated as a UAC) at the time of apprehension to assess all potential sponsors with whom UAC will be placed as they await immigration proceedings in the United States. However, the Joint Concept of Operations contains limited details about what information should be shared between DHS and HHS about relevant adults. For example, the agreement states that ICE and CBP will provide ORR with contact information for parents, legal guardians, or adult relatives. However, the agreement does not, for example, require DHS to share the details of an adult’s criminal history information to ORR. In addition, Border Patrol headquarters officials stated that agents typically would not alert ORR to any concerns about invalid family relationships, as they do not believe that information is relevant. ORR officials stated they need detailed information about an accompanying adult to assess whether they could potentially pose a danger to the child, and this is not addressed in the Joint Concept of Operations. However, ORR officials stated that this information is often not included in DHS’s referrals for UAC, and ORR sometimes learns about an accompanying adult from a child after placement in an ORR shelter. Reunifying Eligible Separated Family Units. To ensure compliance with the federal court injunction in the Ms. L. v. ICE litigation, ORR officials stated that they need to know enough details about (1) family separations or (2) situations in which CBP had concerns a family relationship was invalid, to determine whether there are any family units potentially eligible for reunification. If DHS and HHS determine that a parent will be reunified with a child, ORR is responsible for (1) verifying the validity of the family relationship and (2) determining whether the parent is fit or poses a danger to the child, according to ORR officials. For family unit reunifications, ORR has relied, in part, on the determinations made by DHS when the family was separated, according to these officials. However, ORR officials stated the information DHS provides about family separations is generally limited or provided inconsistently, often without enough detail for ORR to assess whether the family unit may be eligible for reunification. For example, the referral might state a family separation is due to the parent’s criminal history, but ORR must follow up with ICE to specify the charge, determine whether the adult was convicted, or learn the date of the event. In addition, ORR may conduct family reunifications in accordance with ORR policies and procedures in other situations. For example, there have been cases in which families were separated, but DHS later dropped criminal charges against a parent it planned to prosecute, or a parent has completed a hospitalization that required the parent to be separated from his or her child. According to ICE policy, when ICE is removing a parent from the United States, that parent has the right to determine whether a minor child will be removed with him or her. ORR officials stated that, according to ORR policies and procedures, if the child is to be removed with the parent, ORR must assess whether (1) the family relationship is valid and (2) whether the parent presents a danger to the child. However, ORR officials stated that if this information was not provided at the time of referral, they must reach out to ICE officials to collect it. Further, ORR headquarters officials stated that ICE has removed adults from the United States who wished to be removed with their child or children in ORR custody, before ORR could complete its assessment. However, neither ICE nor ORR could determine exactly how often that had occurred or in exactly what time frame these removals had occurred. DHS and HHS officials provided different perspectives on these information sharing challenges not covered within existing interagency agreements. ORR takes additional steps to collect information from ICE and CBP that ORR is not routinely receiving at the time of referral. This can extend the time that children spend in ORR custody, according to ORR officials. If ORR staff conducting intake duties have questions about UAC and any accompanying adults, ORR headquarters officials told us they typically first contact the local CBP officials who processed the apprehension. In April and August 2019, ORR officials said that some Border Patrol sectors are more responsive than others and that limited and inconsistent information sharing by DHS about separated children has led to delays in placement and release decisions for UAC. ORR staff also reach out to ICE’s field office juvenile coordinators or ICE headquarters officials responsible for juvenile and family management. For example, ORR and ICE headquarters coordinate on a weekly basis via email to assess whether family separations are in compliance with federal court orders in the ongoing Ms. L. v. ICE litigation. Specifically, since February 2019, ORR and ICE have shared a spreadsheet tracking UAC who may have been involved in a family separation, according to ORR and ICE headquarters officials. Further, ICE officials said they gather additional information, such as more details about the reason for a family separation from the Form I-213 or by reaching out to CBP officials. They provide some of this information to ORR, as ICE officials noted that they recognize ORR needs such information to assist in its decision-making for UAC. ICE headquarters officials noted that they have found ways to provide more detailed information to ORR without sharing sensitive law enforcement information. It is through this vetting process that ICE and ORR assess potential family separations to reach a confirmed number of cases and the reasons for them, according to ICE and ORR officials. ORR headquarters officials stated that, from their perspective, it would be more efficient if CBP or ICE provided this information directly into ORR’s data system at the time of referral, where possible, rather than sharing a spreadsheet via email. Specifically, ORR headquarters officials stated that they have experienced delays in releasing a child to a sponsor due to missing information about a parent or the inability to notify a parent in ICE detention about sponsorship decisions. By contrast, Border Patrol and OFO headquarters officials noted concerns about sharing sensitive information with ORR, particularly for adults apprehended with UAC. Border Patrol officials stated, for example, that Border Patrol does not share sensitive law enforcement information with a third party such as ORR. According to ICE headquarters officials, sometimes ICE officers conduct additional research after a child is referred to ORR, such as if CBP was unable to collect certain information before making a separation decision. ICE officials stated that, for their purposes, the current information sharing procedures in place are sufficient, but noted that ICE has added staff resources to keep up with the demands of current information sharing procedures. Specifically, until May 2019, there was one ICE headquarters official, 2in the juvenile and family management unit, responding to all of ORR’s requests, and that ICE added another staff person to assist in responding to ORR’s requests. As of October 2019, there were no plans to discuss further these information sharing concerns, according to ORR, CBP, and ICE officials. Leading practices of high-performing organizations include fostering collaboration both within and across organizational boundaries to achieve results. Further, agencies should work together to establish a shared purpose and goals; develop joint strategies or approaches that complement one another; and ensure the compatibility of policies, procedures, and other means to operate across agency boundaries. We have previously reported that written agreements, such as a memorandum of understanding or interagency agreements, can help facilitate collaboration by articulating roles and responsibilities, among other things. These types of written agreements are most effective when they are regularly updated and monitored, as we reported in 2012. While issuing the April 2018 memorandum of agreement and July 2018 Joint Concept of Operations were important steps toward addressing the weaknesses we identified in our 2015 report, additional actions are needed to fully address our recommendation and increase the efficiency and improve the accuracy of the interagency referral and placement process for all UAC. In addition, further DHS and HHS collaboration about information sharing methods and ways to enhance interagency agreements would better position ORR to make informed and timely decisions for UAC, including those separated from adults with whom they were apprehended. As the number of CBP apprehensions of family units has risen markedly in recent years, DHS has developed policies and procedures for processing family units. For example, since 2015 CBP has introduced policies and procedures for collecting information about family units, which has increased the data it collects, including on family separations. However, DHS continues to face challenges in ensuring that it accurately and consistently tracks information about family units, including those it separates. Specifically, CBP training includes definitions of and guidance for processing family units that are inconsistent with CBP policy. Issuing updated training materials with correct definitions of and guidance for processing family units would help CBP ensure that its agents and officers are accurately tracking family units and, where applicable, family separations. In addition, CBP has policies and procedures related to concerns about the validity of a family unit, but it does not have written requirements about what information on these cases Border Patrol agents and OFO officers are to record. Without additional guidance about what details CBP agents and officers are to record on the required Form I-213, these cases will not be well documented, as required by CBP policy. Further, ICE and ORR officials do not have sufficient information to make decisions for the adults and children involved, including determining when reuniting valid family units is necessary. CBP has developed policies and procedures related to family separations, but additional controls would help Border Patrol and OFO ensure that information about these cases is accurately and consistently captured. By developing and implementing additional controls for tracking family separations—such as requiring checks during supervisory review that separations were documented properly—Border Patrol could better ensure it has accurate information about these cases, consistent with CBP and Border Patrol policies. Further, some of the options for separation reasons in Border Patrol’s and OFO’s data systems do not fully align with CBP policy. Without updating the reasons agents and officers have available to select from, CBP is not well positioned to determine whether its officials are separating family units for reasons consistent with CBP policy. In addition, during our review of selected Forms I-213 for a sample of separated family units, we found that agents did not always include the reason for the separation or include a detailed description of the circumstances of the case. Developing and implementing additional controls to check that Border Patrol agents document family separations and why they occurred on family unit members’ Forms I-213 could help Border Patrol ensure its agents are separating family units in accordance with CBP policy. Additionally, without additional guidance on what specific information about the circumstances of the family separations Border Patrol agents and OFO officers are to include on the parent’s and child’s Forms I-213, ICE and ORR do not have sufficient information to determine, among other things, when family reunifications are required. During our review of ICE’s policies and procedures for processing family units, we found that it does not systematically track the family units it separates in its data system. By updating its data system to do so, ICE would be better able to ensure that separated parents, who are subject to removal, are able to make arrangements for their minor child or children, including being removed with them, consistent with ICE policy. While DHS and HHS have developed written interagency agreements related to the transfer and care of UAC, as we recommended in 2015, we found that information sharing gaps between the two agencies remain. As such, continuing their efforts to address our prior recommendation to jointly develop and implement a documented interagency process for all agencies involved in the referral and placement of UAC could help DHS and HHS increase the efficiency and improve the accuracy of these processes for UAC. Moreover, additional DHS and HHS collaboration about information sharing would help provide ORR with additional information, including about accompanying adults, to make informed and timely decisions for UAC. We are making a total of nine recommendations, including six to CBP and one each to ICE, DHS, and HHS. Specifically: The CBP Commissioner should issue updated Border Patrol and OFO training materials that reflect the correct definition of a family unit and guidance for recording that information. (Recommendation 1) The CBP Commissioner should provide written guidance to Border Patrol agents and OFO officers about what narrative information should be recorded on the child’s and the accompanying adult’s Forms I-213 to document cases in which CBP determines that a parent–child relationship may be invalid. (Recommendation 2) The CBP Commissioner should develop and implement additional controls to ensure that Border Patrol agents accurately record family unit separations in its data system. (Recommendation 3) The CBP Commissioner should update Border Patrol’s and OFO’s data systems to ensure data captured on family unit separation reasons clearly align with CBP policy. (Recommendation 4) The CBP Commissioner should develop and implement additional controls to ensure that Border Patrol agents include a narrative description of a family unit separation on the parent’s / legal guardian’s and child’s Forms I-213, including the reason for the separation. (Recommendation 5) The CBP Commissioner should provide guidance to Border Patrol agents and OFO officers on the narrative information they are to include about family unit separation events on the parent’s / legal guardian’s and child’s Forms I-213. (Recommendation 6) The ICE Director should develop and implement a mechanism to systematically track in its data system the family units ICE separates. (Recommendation 7) The Secretary of Homeland Security, jointly with the Secretary of Health and Human Services, should collaborate to address information sharing gaps identified in this report to ensure that ORR receives information needed to make decisions for UAC, including those apprehended with an adult. (Recommendation 8) The Secretary of Health and Human Services, jointly with the Secretary of Homeland Security, should collaborate to address information sharing gaps identified in this report to ensure that ORR receives information needed to make decisions for UAC, including those apprehended with an adult. (Recommendation 9) We provided a draft of this report to DHS and HHS for review and comment. DHS and HHS provided formal, written comments, which are reproduced in full in appendixes III and IV, respectively. DHS and HHS also provided technical comments on our draft report, which we incorporated, as appropriate. DHS concurred with our recommendations and described actions planned or underway to address them. For example, in response to several of our recommendations that CBP provide additional or revised guidance and training to agents and officers, DHS stated that Border Patrol issued a memo in January 2020 to clarify what information agents are to record for family unit members, potentially invalid family units, and subsequent separations, if applicable. DHS also described planned updates to OFO data systems to automatically record certain information in family unit members’ Form I-213, such as the names and identifying information of all family members apprehended together. Regarding our recommendation that CBP should update Border Patrol’s and OFO’s data systems to ensure the options for family separation reasons clearly align with CBP policy, DHS provided documentation of guidance that OFO and Border Patrol issued about data system updates. DHS requested that we consider the recommendation implemented. We will review the information and documents DHS provided to assess the extent to which CBP fully addressed this recommendation. Regarding our recommendation that ICE develop and implement a mechanism to track its separations in its data system, DHS stated that ICE has efforts underway to enable ICE officers to track separations and reunifications in its data system throughout ICE’s immigration enforcement process. DHS and HHS also both concurred with our recommendations that the agencies collaborate to address information sharing gaps identified in this report, and described plans to coordinate and reach agreement on information sharing practices. We will review the agencies’ actions and planned efforts, including any documentation provided by DHS and HHS, and the extent to which they address each of our nine recommendations. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from its issue date. At that time, we will send copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and the Secretary of Health and Human Services. In addition, the report is available at no charge on the GAO website at https://gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Key contributors to this report are listed in appendix V. The objectives of this report were to examine (1) what U.S. Customs and Border Protection (CBP) data indicate about the numbers and characteristics of family units who have been apprehended along the southwest border, (2) the extent to which CBP has developed and implemented policies and procedures for processing family units apprehended along the southwest border, (3) the extent to which U.S. Immigration and Customs Enforcement (ICE) has developed and implemented policies and procedures for processing family units apprehended along the southwest border, and (4) how the Department of Homeland Security (DHS) shares information with the Department of Health and Human Services (HHS) about unaccompanied alien children (UAC), including those children who initially arrived with and were separated from their parents or other adults. To address these objectives and to observe agents and officers processing families, we conducted site visits at U.S. Border Patrol stations and Office of Field Operations (OFO) ports of entry in Arizona, California, and Texas, from July 2018 to October 2018. We also visited ICE family detention facilities, known as family residential centers, in Dilley and Karnes City, Texas in February 2019. Specifically, in Tucson, Arizona we visited Border Patrol’s Tucson sector headquarters and OFO’s Tucson Field Office headquarters and the Nogales port of entry. In the San Diego, California region, we visited Border Patrol’s San Diego sector headquarters and Imperial Beach station and the San Ysidro port of entry. In the Rio Grande Valley, Texas region, we visited CBP’s Central Processing Center, Border Patrol’s McAllen station, and the Hidalgo and Brownsville ports of entry. In the San Antonio, Texas region, we visited ICE’s San Antonio field office headquarters, South Texas Family Residential Center, and Karnes County Residential Center. During these site visits, we interviewed Border Patrol, OFO, and ICE officials, observed agents and officers processing families, and toured CBP and ICE facilities, among other activities. To select these locations, we reviewed CBP data on Border Patrol and OFO apprehensions along the southwest border, including family unit apprehensions, and identified specific locations that had the greatest increase in the number of apprehensions of individuals from fiscal year 2016 to 2017. We also considered the geographical proximity of multiple CBP and ICE facilities to maximize observations. Our observations during site visits are not generalizable to all Border Patrol, OFO, and ICE operations along the southwest border, but provided us the opportunity to learn more about how policies and procedures for processing families are conducted and how CBP and ICE coordinate their efforts. In addition, to address all of our objectives, we interviewed DHS and HHS officials. Specifically, we met with DHS officials from CBP’s Office of the Commissioner and Office of Chief Counsel; Border Patrol’s Law Enforcement Operations Directorate and Strategic Planning and Analysis Directorate; OFO’s Admissibility and Passenger Programs office; ICE’s Enforcement and Removal Operations (including the Juvenile Family and Residential Management Unit, Field Operations, Alternatives to Detention, and Law Enforcement Systems and Analysis) and ICE’s Office of the Principal Legal Advisor. We also interviewed HHS officials from the offices of the Assistant Secretary for Preparedness and Response and Office of Refugee Resettlement (ORR). To address our first objective and describe what CBP data indicate about the numbers and characteristics of family units who have been apprehended along the southwest border, we reviewed record-level apprehensions data from CBP’s Border Patrol and OFO for individuals determined to be inadmissible or potentially subject to removal. We collected data for fiscal year 2016 through the second quarter of fiscal year 2019 because Border Patrol and OFO began to systematically collect data on individuals apprehended as part of a family unit in fiscal year 2016. The second quarter of fiscal year 2019 was the most current data available at the time of our review. We used “number of apprehensions” rather than the “number of individuals or family unit members” as the unit of analysis we reported because an individual may have been apprehended multiple times in the same year. The data we report on apprehensions of family unit members include individuals in family units CBP later separated (for reasons other than concerns about validity of the family relationship) from April 19, 2018, when Border Patrol and OFO began collecting data on family separations, through the first two quarters of fiscal year 2019. The record-level data we analyzed are current as of the date Border Patrol or OFO provided it to us. Specifically, Border Patrol data for fiscal years 2016 through 2018 are current as of January 2019; Border Patrol data for the first two quarters of fiscal year 2019 and selected fields for all fiscal years are current as of April 2019. OFO data for fiscal years 2016 through 2018 are current as of February 2019; OFO data for the first two quarters of fiscal year 2019 are current as of June 2019. We grouped the ages of apprehended children in family units (e.g. ages 0–4, 5–11, and 12–17) according to key agency and court documents. While most of our analysis was conducted on the apprehensions of individuals in family units, we were also able to analyze the composition of family units (i.e., as a group rather than individuals) apprehended by Border Patrol. Specifically, Border Patrol uses a “family unit number” to link the records of adult(s) and children processed as a family unit. As a result, we analyzed whether the family unit was headed by an adult male or adult female and how many children were in the family unit. We could not conduct a similar analysis for the family units apprehended by OFO, because OFO does not assign family units unique identifying numbers to link family members in its data system. As a result, we were unable to report on the composition of family units that OFO encountered. As part of our analysis of CBP data, we determined the number of family unit members Border Patrol and OFO data indicated as separated from April 19, 2018 through March 31, 2019. We selected this time frame because Border Patrol began to systematically collect data on family separations in its data systems on April 19, 2018, and the second quarter of fiscal year 2019 was the most current data available at the time of our review. Our analysis of the reasons for family separations is based on the data recorded by agents and officers in Border Patrol’s and OFO’s data systems. During the period of our review, Border Patrol’s and OFO’s data systems included options for agents and officers to choose from to explain the reason for the separation, including, for example, “family member prosecuted – criminal history” and “family member prosecuted – other reasons.” These reasons, and the numbers of separations for each reason, reflect CBP data and may not match the information about separations (including numbers of, reasons for, and timeframes of separations) that DHS reported to a federal court in response to related litigation, such as Ms. L. v. ICE. According to court filings, the information provided in response to that litigation was based on a manual review of multiple federal datasets and reflect categories as required by the litigation. We excluded family separations indicated in CBP data as temporary from our analysis. We also reported separately on the number of adults and children who were apprehended together, but whom CBP assessed to have potentially invalid family relationships and thus processed separately, as CBP does not consider these family separations. To assess the reliability of CBP data, we completed a number of steps, including (1) performing electronic testing for obvious errors in accuracy and completeness, such as running logic tests; (2) reviewing existing information about the data and the systems that produced them, such as relevant training materials for Border Patrol agents and OFO officers who use agency data systems; and (3) discussing data entry issues and data limitations with Border Patrol and OFO officials. We also received demonstrations on the data systems from Border Patrol and OFO officials at headquarters. The limitations and determinations of reliability for the Border Patrol and OFO data are discussed in more detail below. Border Patrol data. We identified a small number of Border Patrol apprehension records that had the same date of apprehension and unique identifier, known as the “A-number.” It is possible that these apprehension records represented one apprehended individual that Border Patrol agents processed as two apprehensions. These records constituted less than 1 percent of the almost 2.4 million apprehension records we analyzed. We included these apprehension records in our analysis because Border Patrol considers them unique apprehensions and because their small number does not materially affect our analysis. We did not include a small number of records (less than 1 percent of apprehensions of family unit members) that had a family unit number but did not meet CBP’s definition of a family unit in our analysis of records of family unit members. For example, a small number of family unit member records did not include a date of birth, so we could not determine whether the individual was an adult or child (i.e., under or over the age of 18 years). For our analysis of the reasons for family separations, we found a small number (18) of Border Patrol records that included more than one separation reason, so we could not distinguish which reason led to a permanent family separation. Thus, we excluded these records from our analysis of the reasons for family separations. According to Border Patrol headquarters officials and documents, in situations in which only one of the adults in a two-parent family was separated, the child or children would remain with the other adult as an intact family unit (and the child would not be designated a UAC and transferred to the custody of ORR). As such, in these situations, we included the separated adults in our reported numbers of separated family unit members, but did not include associated remaining family units in our analysis of separated family units. We found 18 records for family units that included one adult and one child, with one of the family unit members separated. According to Border Patrol’s procedures, in the event a family separation occurs, both family unit members are to be processed in the data system as “separated.” We included these records in the number of family unit members, but did not include them in our analysis of separated family unit members, as it was unclear from the records whether or not the family unit was separated. We identified data reliability issues with Border Patrol’s data on family separations, as described in our report. When reporting these data, we rounded down to the nearest increment of five, and described relevant data using modifiers such as “at least” because of possible missing information. This enabled us to report on the Border Patrol data that we determined were sufficiently reliable for our purposes. OFO data. For the OFO data, we excluded approximately 11 percent of all apprehension records (including single adults, UAC, and parents and children that arrived as part of a family unit) from our analyses because we could not confirm an A-number, for those apprehensions. Among the apprehension records missing an A-number, 44 percent were cases in which OFO officers paroled the individuals and, according to OFO officials, officers are not required to assign an A-number to these individuals. In addition, 47 percent of the records with a missing A- number were cases that involved individuals withdrawing their applications for admission into the United States, in which OFO officers have discretion whether or not to assign an A-number. According to OFO officials, additional records with missing A-numbers may be due to human error during data entry or problems with the data system saving this information in the database that OFO used to pull the data. Finally, we collapsed 153,025 apprehension records into 71,986 apprehension records because we determined that they were duplicate records for the same individual and the same apprehension, based on factors such as A- number, birth date, and date and time of apprehension. As a result, we determined that we could not present precise figures for analyses that include OFO data and instead provided approximations throughout the report. We rounded all data and figures on OFO apprehensions, including where OFO’s data inform CBP-data and figures, down to the hundreds place. As an exception, for the much-smaller number of OFO family separations, as compared with total apprehensions, we rounded the figures by increments of five, and described relevant data using modifiers such as “at least” because of possible missing information. This enabled us to report on the OFO data that we determined were sufficiently reliable for our purposes. With the previously described modifications, we determined that the Border Patrol and OFO data were sufficiently reliable to generally describe the number and demographic characteristics of family units apprehended by CBP along the southwest border. To address the second objective, on the extent to which CBP has developed and implemented policies and procedures for processing family units—including how CBP defines family units, assesses the validity of family relationships, and determines whether family separations are warranted—we reviewed CBP, Border Patrol, and OFO policy documents, training materials, and other guidance documents in effect from October 2015 through December 2019. For example, we reviewed CBP’s 2015 National Standards on Transport, Escort, Detention, and Search policy, as well as Border Patrol’s data system processing guidance and Border Patrol and OFO policies and procedures on how agents are to record family separations in agency data systems, among other documents. We compared CBP, Border Patrol and OFO policies and procedures to Standards for Internal Control in the Federal Government related to identifying, analyzing, and responding to change; designing control activities to achieve objectives and identify risks; and using quality information to achieve objectives. We also compared Border Patrol definitions for family units, and processes and guidance for tracking family units, invalid family units, and family unit separations against CBP and Border Patrol policy. To evaluate how Border Patrol recorded information for family units apprehended from June 28, 2018 through March 31, 2019, we also selected a sample of ORR records for UAC involved in family separations and compared them to Border Patrol apprehensions data for the same children. Specifically, we selected a small, random, nongeneralizable sample of 40 ORR records for UAC involved in family separations. We then matched all 40 selected records to Border Patrol apprehensions data, using unique identifiers. Our findings are not generalizable due to the size of our sample, so we cannot use our findings to assess the magnitude of the issues we identified in Border Patrol data. We limited the records from which we selected our sample to those ORR records that included an A-number, a unique identifier, for the adult separated from the child in ORR custody, since Border Patrol tracks its separation reasons in the adult’s records. Finally, we compared this information with CBP’s October 2015 National Standards on Transport, Escort, Detention, and Search policy, which states that family separations must be documented in the appropriate data systems. We also assessed information against federal internal control standards, which call for management to identify and use quality information to achieve the entity’s objectives and address risks, among other control activities. To describe how Border Patrol agents document the reasons for and circumstances of each family separation case, we reviewed a nongeneralizable sample of the DHS Form I-213, Record of Deportable/Inadmissible Alien (Form I-213), which is a form that agents are required to complete for each individual CBP apprehends. Specifically, Border Patrol provided us with Forms I-213 for the adults and children involved in the three most recent instances of family separation from June 28, 2018 through March 30, 2019, in each of Border Patrol’s nine sectors along the southwest border. Two of the sectors only had one family separation during that period, so we reviewed the forms for a total of 23 family separations. We reviewed a sample of Forms I-213 prepared by Border Patrol agents, as Border Patrol separated approximately 95 percent of the family separations indicated in CBP data during the period we reviewed. We did not review a sample of Forms I-213 prepared by OFO officers, given the relatively smaller number of families separated by OFO. In addition, we reviewed a sample of forms for cases of family separations only, and did not review forms for cases in which Border Patrol determined the family relationship was invalid because Border Patrol officials told us that they do not record information about assessments of invalid family relationships on the Form I-213. Finally, we compared this information with a 2015 CBP policy that states that family separations must be documented in the appropriate data systems; a June 2018 CBP policy that includes potential reasons to warrant family separations; and federal internal control standards, which call for management to identify and use quality information to achieve the entity’s objectives and address risks, among other control activities. To address the third objective, and examine the extent to which ICE has developed and implemented policies and procedures for processing families apprehended along the southwest border, we reviewed ICE policy documents, training materials, and other guidance documents. For example, we reviewed ICE’s Juvenile and Family Residential Management Unit Field Office Juvenile Coordinator Handbook, ICE’s Family Residential Standards, ICE’s data system training manual, and ICE’s detained parent policy. We compared ICE’s processes against ICE policies and procedures and federal internal control standards, which call for management to design the entity’s information system and related control activities to achieve objectives and respond to risks. ICE data. To report on family members apprehended by CBP and detained in ICE family residential centers, we reviewed ICE detention data from June 2014, when ICE opened its first family residential center on the southwest border, through fiscal year 2018, the most current data available at the time of our review. The data for all fiscal years is current as of May 2019, when ICE provided us with record-level data to analyze. To assess the reliability of ICE’s data, we completed a number of data reliability steps, including (1) performing electronic testing for obvious errors in accuracy and completeness, such as running logic tests; (2) reviewing existing information about the data and the systems that produced them, such as relevant training materials for the ICE officers who use them; and (3) discussing data entry issues and data limitations with ICE officials. We also received demonstrations on ICE’s data system from officials at headquarters. We determined that the data were sufficiently reliable to describe the numbers and demographic characteristics of family members who were apprehended by CBP and detained by ICE at one of its family detention facilities. Additionally, we collected and reviewed data on the families whom ICE separated from July 2018 through September 2019. We selected this time frame because July 2018 is when ICE began to require its field offices to report all instance of family separations to headquarters, which tracks the information on a spreadsheet, and September 30, 2019, the end of the fiscal year. We reported the total number of family separations from the spreadsheet, but could not independently verify the number of separations in ICE’s spreadsheet because ICE does not track family separations systematically in its data system. As a result, we reported the total number of family separations, according to ICE, for context to demonstrate that most family separations occur when family units are in CBP custody. To describe how DHS shares information with HHS about UAC, including those involved in family separations, we reviewed DHS and HHS interagency agreements, including the April 2018 information sharing memorandum of agreement and July 2018 Joint Concept of Operations. Additionally, we interviewed DHS and HHS officials at headquarters and DHS officials at locations along the southwest border. We compared the information we gathered with DHS and HHS interagency agreements, which provide expectations for interagency information sharing and procedures for the care and custody of UAC. We also compared DHS and HHS information sharing practices to leading practices for collaboration among federal agencies. We conducted this performance audit from July 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides additional information about apprehensions of noncitizen family units by CBP’s U.S. Border Patrol and Office of Field Operations (OFO) at or between U.S. ports of entry from fiscal year 2016 through the second quarter of fiscal year 2019. It also provides additional information about family unit members who were apprehended by CBP and subsequently detained by U.S. Immigration and Customs Enforcement (ICE) at a family residential center at some point from fiscal year 2015 through fiscal year 2018. The following tables contain information on the demographics of CBP apprehensions of noncitizen family units and family unit members and the processing decisions that CBP agents and officers made for them. CBP data indicate that Border Patrol was responsible for the majority of the overall number of family unit member apprehensions by CBP from fiscal year 2016 through the second quarter of fiscal year 2019 (see table 9). CBP data indicate that family unit member apprehensions grew as a percentage of total CBP apprehensions from fiscal year 2016 through the second quarter of fiscal year 2019 (see table 10). For example, CBP data indicate that apprehensions of family unit members grew from about 22 percent of total southwest border apprehensions in fiscal year 2016 to about 51 percent of such apprehensions during the first two quarters of fiscal year 2019. CBP data indicate that most apprehensions of family unit members from fiscal year 2016 through the second quarter of fiscal year 2019 were nationals of Central American countries (see table 11). CBP data indicate that the majority of apprehensions of adult family unit members by CBP were females, while the majority of children were male (see table 12). Border Patrol’s data system collects information about the family units it apprehends. Border Patrol’s data indicate that family units that agents apprehended were generally headed by females, although the number of family units headed by males and two-parent family units increased from fiscal year 2016 through the first two quarters of fiscal year 2019 (see table 13). Border Patrol’s data indicate that most Border Patrol apprehensions of family unit members occurred in just three sectors (Rio Grande Valley, Texas; El Paso, Texas; and Yuma, Arizona) from fiscal year 2016 through the second quarter of fiscal year 2019 (see table 14). OFO data indicate that most OFO apprehensions of family unit members occurred in just four ports of entry (San Ysidro, California; El Paso, Texas; Hidalgo, Texas; and Nogales, Arizona) from fiscal year 2016 through the second quarter of fiscal year 2019 (see table 15). CBP data indicate that the majority of apprehensions of family unit members resulted in the family unit members being released into the interior of the United States with a notice to appear before an immigration court, which became increasingly common from fiscal year 2016 through the second quarter of fiscal year 2019 (see table 16). The following tables contain information on family units that CBP separated at the border. CBP data indicate that the majority of children that CBP separated from their parents from April 19, 2018 through March 31, 2019 were male (see table 17). CBP data indicate that CBP separated children that ranged in age from less than 1 year old to 17 years old from their parents from April 19, 2018 through March 31, 2019, and the majority of separated children were age 12 and over (see table 18). CBP data indicate that the majority of children that CBP separated from April 19, 2018, through March 31, 2019, were nationals from Central American countries and that more than half were Guatemalan nationals (see table 19). Border Patrol data indicate that the majority of family units that Border Patrol separated from April 19, 2018 through March 31, 2019 were headed by males who were apprehended with a single child (see table 20). Border Patrol data indicate that most adults that were separated from their children by Border Patrol from April 19, 2018, through March 31, 2019, had not been previously apprehended by CBP (see table 21). The following tables and figures contain information about the noncitizen family unit members apprehended by CBP and detained by ICE at ICE’s family residential centers from fiscal year 2015 through fiscal year 2018. ICE data indicate that from fiscal year 2015 through fiscal year 2018, ICE detained 139,098 family unit members at its family residential centers (see table 22). ICE data indicate that most child family unit members (ages 0 to 17) detained in ICE detention facilities were under the age of 13 (see table 23). ICE data indicate that the majority of adults detained at ICE’s family residential centers were female, and the gender of children detained was relatively equal between male and female (see fig. 7). ICE data indicate that the majority of family unit members detained at ICE’s family residential centers were from El Salvador, Guatemala, and Honduras, as well as Mexico (see fig. 8). ICE data indicate that the vast majority of family unit members who were detained in one of ICE’s family residential centers were subsequently released by ICE into the interior of the United States (see table 24). In addition to the contact named above, Kathryn Bernet (Assistant Director), Leslie Sarapu (Analyst in Charge), Hiwotte Amare, James Ashley, Kathleen Donovan, Michele Fejfar, Cynthia Grant, Michael Harmond, Eric Hauswirth, Stephanie Heiken, Jan Montgomery, Heidi Nielson, Kevin Reeves, and Jonathan Still made key contributions to this report.", "summary": "In fiscal year 2019, CBP reported apprehending more than 527,000 noncitizen family unit members at or between U.S. ports of entry along the southwest border—a 227 percent increase over fiscal year 2018. In April 2018, the U.S. Attorney General issued a memo on criminal prosecutions of immigration offenses, which DHS officials said led to an increase in family separations. GAO was asked to review issues related to DHS's processing of family units. This report examines (1) CBP data on apprehended family unit members; the extent to which (2) CBP and (3) ICE developed and implemented policies and procedures for processing family units; and (4) how DHS and HHS share information about UAC. GAO analyzed record-level DHS and HHS data and documents; interviewed DHS and HHS officials; and visited DHS locations in California and Texas where CBP apprehensions of family units increased in 2017. Data from the Department of Homeland Security's (DHS) U.S. Customs and Border Protection (CBP) indicate that apprehensions of family unit members (noncitizen children under 18 and their parents or legal guardians) grew from about 22 percent of total southwest border apprehensions in fiscal year 2016 to about 51 percent of such apprehensions during the first two quarters of fiscal year 2019—the most current data available. During this period, CBP data indicated that most apprehensions of family units—about 76 percent—occurred between ports of entry by the U.S. Border Patrol (Border Patrol). With regard to family separations, from April 2018 through March 2019, CBP data indicate it separated at least 2,700 children from their parents, processing them as unaccompanied alien children (UAC) and transferring them to the Department of Health and Human Services (HHS). CBP developed some policies and procedures for processing family units but does not have sufficient controls to ensure effective implementation. For example, CBP policy requires that Border Patrol agents and officers track apprehended family unit members and, if applicable, subsequent family separations in agency data systems. GAO's analysis of Border Patrol documents and data indicates that its agents have not accurately and consistently recorded family units and separations. Specifically, GAO examined a nongeneralizable sample of 40 HHS records for children involved in family separations between June 2018 and March 2019 and matched them to Border Patrol apprehensions data for these children. GAO found Border Patrol did not initially record 14 of the 40 children as a member of a family unit (linked to a parent's record) per Border Patrol policy, and thus did not record their subsequent family separation. GAO found an additional 10 children among the 40 whose family separations were not documented in Border Patrol's data system as required by CBP policy during this period. Border Patrol officials were unsure of the extent of these problems, and stated that, among other things, data-entry errors may have arisen due to demands on agents as the number of family unit apprehensions increased. Thus, it is unclear the extent to which Border Patrol has accurate records of separated family unit members in its data system. Further, Border Patrol agents inconsistently recorded information about the reasons for and circumstances surrounding family separations on required forms. Developing and implementing additional controls would help Border Patrol maintain complete and accurate information on all family separations. DHS's U.S. Immigration and Customs Enforcement (ICE) is, among other things, responsible for detaining and removing those family units apprehended by CBP. ICE officers are to determine whether to accept or deny a referral of a family unit from CBP for detention in one of ICE's family residential centers, release family unit members into the interior of the United States, or remove family unit members (who are subject to final orders of removal) from the United States. ICE has procedures for processing and releasing family units from ICE custody. However, with regard to family unit separations, ICE relies on a manual process to track separations that occur in ICE custody (generally at one of ICE's family residential centers) and does not systematically record this information in its data system. Without a mechanism to do so, ICE does not have reasonable assurance that parents whom ICE separated from their children and are subject to removal are able to make arrangements for their children, including being removed with them, as provided in ICE's policy for detained parents. In 2018, DHS and HHS developed written interagency agreements regarding UAC. However, DHS and HHS officials stated they have not resolved long-standing differences in opinion about how and what information agencies are to share related to the care and placement of those children, including those referred to HHS after a family separation. GAO found that DHS has not consistently provided information and documents to HHS as specified in interagency agreements. HHS officials also identified additional information they need from DHS, about those adults apprehended with children and later separated, to inform their decisions about placing children with sponsors and reunifying separated families, when necessary. Increased collaboration between DHS and HHS about information sharing would better position HHS to make informed and timely decisions for UAC. GAO is making eight recommendations to DHS and one to HHS. Among them, CBP should develop and implement additional controls to ensure that Border Patrol agents accurately record family unit separations in data systems. GAO also recommends that ICE systematically track in its data system the family units ICE separates. Further, DHS and HHS should collaborate about information sharing for UAC. DHS and HHS concurred with the recommendations.", "document_type": "gao"}
{"report": "Interior has oversight responsibility for the development of federal oil and gas resources located under more than 260 million surface onshore acres, 700 million subsurface onshore acres, and 1.7 billion offshore acres in the waters of the Outer Continental Shelf. In this capacity, Interior is authorized to lease federal oil and gas resources and to collect the royalties associated with their production. BOEM has leasing authority in offshore waters, including the U.S. Gulf of Mexico. BOEM schedules lease sales on a 5-year planning basis. In January 2017, the Secretary of the Interior finalized BOEM’s 2017-2022 Outer Continental Shelf Oil and Gas Leasing Proposed Final Program, which included information for 10 planned lease sales in the Gulf of Mexico. BOEM has traditionally held two lease sales per year in the Gulf of Mexico region—one for the Central Planning Area and one for the Western Planning Area. However, beginning with Lease Sale 249 in August 2017, BOEM transitioned to offering all available tracts in the Gulf of Mexico at each of its twice-yearly lease sales. OCSLA, as amended, directs BOEM to establish minimum bid levels, rental fees, royalty rates, and other related fees to assure receipt of fair market value to the U.S. government for lands leased on the Outer Continental Shelf and the rights conveyed by the federal government. OCSLA directs BOEM to manage the leasing program in a manner that considers economic, social, and environmental value, including the potential impact of oil and gas exploration on other resource values of the Outer Continental Shelf. Subject to the requirement to assure receipt of fair market value, BOEM has the authority to change certain lease terms within the oil and gas fiscal system. Specifically, BOEM has broad authority to change bid terms for offshore leases, including the royalty rate, the bonus bid structure, minimum bid amounts, lease duration, and rental terms within parameters defined in OCSLA. Prior to each lease sale, BOEM publishes a Final Notice of Sale that contains the specific conditions and terms applicable to any leases sold at the lease sale, including rental rates, minimum bid amounts, and royalty rates, each of which may vary by water depth. In some cases, lease terms have been defined in law. For example, in 1995, Congress passed the Outer Continental Shelf Deep Water Royalty Relief Act, which waived or reduced the amount of royalties that companies would otherwise be obligated to pay on the initial volumes of production from certain deep water tracts leased from 1996 through 2000. In implementing the act for leases sold in 1996, 1997, and 2000, BOEM specified that royalty relief would be applicable only if oil and gas prices were below certain levels, known as “price thresholds,” with the intention of protecting the government’s royalty interests if oil and gas prices increased significantly. BOEM did not include these same price thresholds for leases it issued in 1998 and 1999. Figures 1 and 2 below show federal revenue from offshore oil and gas leases from 2006 through 2018. Annually and in aggregate, royalties constitute a majority of revenue from offshore oil and gas leases, followed by bonus bids. Industry develops oil and gas resources on federal lands within the context of broader energy markets. Conditions in those markets— including commodity prices, competition, and technological developments—can change rapidly. For example, the price of oil on the open market has been volatile, ranging from about $39 to $136 per barrel (in 2018 dollars) over the last decade. In addition, companies must weigh potential offshore oil and gas investments against other potential oil and gas investment options domestically and overseas. For example, some companies have expanded the sphere of their development activities to waters off Mexico, areas which now compete for investment against the remaining oil resources in the Gulf of Mexico. Furthermore, technological innovations—such as developments in seismic imaging and in drilling technology—have affected where companies are able to locate and develop resources in subsea areas. According to bureau documentation, BOEM is to evaluate the adequacy of bids in two phases of analysis—economic viability assessments and tract valuations—that incorporate departmental economic and geologic models. BOEM’s bid evaluations are intended to ensure that the bureau awards leases only when the associated bid amount represents at least fair market value to the federal government. According to bureau documentation, after each lease sale, BOEM evaluates the economic viability of tracts receiving bids to determine if they require additional analysis before BOEM decides whether to accept or reject the bids. To make these initial assessments, BOEM first develops thresholds of the minimum quantity of oil or gas that must be present to generate revenue that would offset exploration and development costs—known as the “break-even threshold”—at the given water depth, among other factors. Then, for each tract that receives a bid, BOEM estimates a range of how much oil or gas may be on the tract— known as the tract’s “resource potential”—using geological and geophysical data. This process incorporates collecting and analyzing the most recently available seismic exploration and well data and any information gathered from drilling in that geographical area. BOEM is then to categorize tracts as viable or nonviable by comparing the bureau’s estimated resource potential against the relevant break-even threshold. Nonviable tracts are those for which BOEM’s resource estimates are below the break-even threshold, meaning they are not likely to have enough oil and gas to be profitably explored, developed, and produced. For tracts that BOEM concludes are nonviable, BOEM accepts the highest bid received as long as that bid is higher than the minimum acceptable bid amount. Conversely, viable tracts are those that exceed BOEM’s economic viability threshold and that BOEM considers as having the potential to be profitably explored, developed, and produced. BOEM subjects these tracts to further economic analysis in its next phase, tract valuation. According to bureau documentation, for tracts determined to be economically viable, BOEM is then to conduct a more detailed economic analysis to determine if the high bids represent fair market value. Specifically, BOEM develops an acceptable bid threshold by modeling the likely monetary value of production from a tract less the costs to explore and develop it, including industry profit and payments to the government. BOEM’s Fair Market Value Review Committee oversees the development of tract-specific parameters—production potential, probability of geologic success, economic projections, and development costs and timeframes— that the bureau uses in its proprietary discounted cash flow analysis model. A discounted cash flow analysis is a valuation method used to estimate the present value of an investment—in this case a tract of land— based on estimated future cash flows. As inputs to its model, BOEM uses the oil and gas resource estimates it developed in its economic viability assessments to estimate how much oil and gas could be extracted from each tract, and it analyzes seismic and well data to determine the likelihood of discovering oil and gas. BOEM also develops economic projections for future oil and gas prices as well as projections for exploration and development costs and time frames for each tract, based on historical cost data, drilling equipment, technological innovation, and other factors. BOEM inputs these parameters into its proprietary discounted cash flow model to generate a distribution of potential tract values. BOEM uses the average of these potential values as representative of the present value of the tract. BOEM also develops an estimate of each tract’s value at the next scheduled lease sale—known as the delayed value. The delayed value for the next sale is computed as the present value associated with the delay in leasing under the projected economic, engineering, and geological conditions—for example, by accounting for depletion of resources due to extraction from a nearby tract that shares access to the reservoir. Based on its valuations, the bureau establishes acceptable bid thresholds for the tracts. The acceptable bid threshold for each tract is the higher of: (1) the lesser of the present value and the delayed value or (2) the minimum bid per acre in instances in which BOEM’s present and delayed valuations are below the minimum bid per acre. If the high bid exceeds the acceptable bid threshold, BOEM concludes that the bid represents fair market value and accepts it and awards a lease. Conversely, if the high bid does not exceed the acceptable bid threshold, BOEM rejects the bid as inadequate and the tract is made available for lease at the next lease sale. According to our empirical analysis of BOEM data and interviews with BOEM officials and industry representatives, changes in the price of oil and changes in royalty rates drive changes in the amount industry bids for offshore oil and gas leases. Specifically, the current and expected future price of oil are key factors determining bonus bid amounts, in the context of industry’s assessment of the expected presence of hydrocarbon reserves for a given tract, the likelihood of success in developing those reserves, and the uncertainties in geological and seismic information. Specifically, our econometric model suggests a strong positive correspondence between higher oil prices and higher bonus bids; that is, when oil prices are higher, bonus bids tend be higher and, conversely, when oil prices are lower, bonus bids tend to be lower. For example, from 2006 through 2008, oil prices rapidly rose to historic highs. This period corresponded with an increase in average bonus bids in deep water from an average of about $275 per acre in 2006 to an average of about $800 per acre in 2008. Figure 3 shows the relationship between oil prices and per acre average bonus bids. The results of our analysis are consistent with input from BOEM officials and industry representatives who told us that the price of oil is a key factor in industry bidding decisions. Specifically, these officials and representatives explained that they use the current price of oil as a baseline for expectations regarding future prices of oil—that is, the price at which industry can sell the oil it produces. Therefore, high current oil prices lead to higher projections of future oil prices, thereby driving up bids. Likewise, they told us that industry bidding activity increases in high- price environments because production from existing wells provides financial resources companies can use to invest in acquiring additional leases. Moreover, according to these officials and representatives, higher oil prices make some tracts economically viable to develop that had been viewed as unprofitable at lower prices. According to our analysis of BOEM data, changes in federal royalty rates also drive changes in the amount industry bids on offshore leases. Our econometric model indicates that increases in royalty rates lead to decreased bonus bids and, conversely, decreases in royalty rates lead to increased bonus bids. According to our model, during the royalty relief period from 1996 through 2000, when royalty rates were effectively zero, bonus bids increased between 34 percent and 60 percent over what bonus bids would have been expected to be had the royalty rate remained at the pre-1996 rate of 12.5 percent. Specifically, we found that industry bid approximately 34 percent higher for leases sold in 1996, 1997, and 2000, when leases contained no royalty obligation until oil prices rose above a certain threshold. Similarly, industry bid approximately 60 percent higher for leases sold in 1998 and 1999, when leases carried no royalties for the life of the lease. However, changes in oil prices can work to counter the effect of royalty rate changes on bonus bids. For example, between 2006 and 2008, royalty rates in water depths greater than 400 meters increased from 12.5 percent to 18.75 percent. Based on our model, this royalty rate increase would have a significant downward effect on bonus bids. However, the rapid increase in oil prices during this period resulted in the net effect of an increase in bonus bids for these tracts by more than 150 percent. Our findings are consistent with the views of BOEM officials and industry representatives, who told us that lower royalty rates increase industry bidding because lower royalties result in higher industry tract valuations. Specifically, the smaller financial commitments to the government associated with lower royalty rates increases the projected value of any oil or gas produced. BOEM officials and industry representatives told us that, in turn, the increased projected value of these tracts would lead to increases in the dollar value of individual bids as well as the number of bids submitted. For example, they cited the royalty relief period of 1996 through 2000 as responsible for a significant increase in bidding activity during that time. However, while decreases in royalty rates lead to higher bonus bids, they may still lead to lower overall federal offshore oil and gas revenues. Specifically, our model estimates and BOEM data show that eliminating royalties for tracts leased between 1996 and 2000 would have increased overall bonus bids for those tracts by at most about $1.98 billion over what they would have been had royalty rates remained at their pre-1996 rate of 12.5 percent. However, forgone royalty revenue was more than nine times greater. Specifically, Interior data show approximately $18.0 billion in forgone royalty payments on these leases through the end of 2018. Because most of these leases are still in production, this estimate does not represent the final total of forgone royalty payments. BOEM regularly assesses potential changes to fiscal terms in annual and supplementary lease sale-specific analyses. Additionally, BOEM has advertised its development of a progressive, priced-based royalty system for 6 years but has made little demonstrable progress toward developing this system. Based on our review of planning documents for lease sales held from March 2016 through August 2018, BOEM regularly assesses potential changes to fiscal terms in annual and supplementary lease sale-specific analyses. BOEM’s annual analyses consider various factors that can affect the fiscal system, and its lease sale-specific analyses build on those factors to inform fiscal terms for individual sales. BOEM conducts an annual analysis of various factors affecting the offshore fiscal system that informs its development of fiscal term options for all lease sales to be held in the subsequent year. According to our review of BOEM documentation and interviews with bureau officials, factors BOEM considers include the following: Resource potential. BOEM estimates the likely amount of undiscovered recoverable oil and gas resources remaining in the region based on the bureau’s most recent national assessment. Market conditions. BOEM assesses trends in oil and gas prices as well as forecasts from the Department of Energy’s Energy Information Administration, the World Bank, and the Office of Management and Budget. BOEM uses these assessments to estimate, under existing fiscal terms, results for the lease sales covered by the analysis— including the amount of bonus bids collected and the number of tracts sold—as well as resulting production and net economic value under various price scenarios. Leasing, drilling, development, and production activity. BOEM reviews industry activity over the previous several years, including leases purchased, companies participating in lease sales, exploration and development drilling, new facility installations, and oil and gas production trends. Industry news. BOEM considers industry perception of its fiscal terms by evaluating industry estimates of break-even thresholds (oil and gas market prices at which production from a given area is cost- effective at current costs of production) and announcements of new discoveries, projects, and production. International considerations. BOEM reviews the fiscal terms of international jurisdictions to assess how they compare with the U.S. system. Within this context, BOEM considers potential changes to its fiscal terms by estimating their effects on outcomes including leasing activity, production, and revenue at various oil and gas prices. For example, in its annual analysis for its August 2017 and March 2018 lease sales, BOEM analyzed the potential effect of five royalty rate changes from the 18.75 percent rate that had been in place since 2008. Two of the potential changes were targeted to specific types of production or water depths and three would apply to all production. For the targeted changes, BOEM considered (1) a lower natural gas royalty and (2) a lower shallow water royalty—both at the statutory minimum of 12.5 percent. The other potential changes were to lower royalty rates on all production to (1) 12.5 percent, (2) 15 percent, and (3) 16.67 percent. For each of these scenarios, BOEM modeled effects on overall production and revenue at various market prices. Based on our review of BOEM lease planning documents, BOEM conducts additional lease sale-specific analysis before finalizing the fiscal terms for each sale. For example, BOEM considered changes to each of the fiscal terms for its August 2018 lease sale—minimum bid, rental rates, and royalty rate—but recommended that they not change from the previous sale. Specifically: Minimum bid. BOEM evaluated lowering the minimum bid for tracts in water depths of greater than 400 meters to account for the effects of decreases in (1) oil prices since BOEM raised the minimum bid to $100 in 2011 and (2) corporate tax rates per the Tax Cuts and Jobs Act of 2017. BOEM found that, because of these changes, a $100 per acre minimum bid in 2018 was roughly equivalent to a $170 per acre minimum bid in 2011 and that maintaining the $100 per acre minimum bid in 2018 could reduce the number of tracts sold. However, BOEM assessed that industry has recently shown a preference for holding less acreage, evidenced by relinquishments and bidding on fewer blocks. Therefore, BOEM determined that lowering the minimum bid might not have the desired effect of increasing tracts leased; instead, it could lead to the same number of blocks being sold but with lower total bonus bid revenue. Rental rate. BOEM evaluated adjusting the rental rate to account for inflation since the last adjustment in 2009. It also evaluated increasing the rental rate in water depths greater than 400 meters to $20 per acre to provide additional financial incentive to explore leases. However, BOEM did not recommend this option since it reported that it expected the effects to be minor. Royalty rate. BOEM evaluated the effect of lowering the royalty rate to 12.5 percent for two scenarios: (1) tracts with water depths between 200 and 400 meters and (2) all tracts. BOEM recommended leaving the royalty rate at 18.75 percent for all tracts deeper than 200 meters. In doing so, the bureau cited little effect for lowering the rate for tracts with water depths between 200 to 400 meters—it projected less than a 0.1 percent increase in production and less than 0.1 percent decrease in revenue. BOEM also cited more substantial projected drops in overall revenue of 17 to 19 percent, paired with modest increases in production (1 to 2 percent increase in oil production and 2 to 5 percent increase in gas production) for lowering the royalty rate for all tracts. BOEM also found that these losses to the federal government could be even more substantial if oil prices rise in the future. BOEM officials told us that, in general, they prefer to make minor iterative changes to fiscal terms in order to better gauge their effects—that is, they find it easier to measure the effects of a change to one term at a time rather than the effects of reconfiguring multiple terms—as well as provide predictability for industry. In keeping with this approach, BOEM has made one change to its royalty rate since 2012 (see table 1 for details on the recent history of lease terms in the Gulf of Mexico). Specifically, in advance of its August 2017 lease sale, BOEM announced a reduction in royalty rate for tracts with water depths of less than 200 meters from 18.75 percent to the statutory minimum of 12.5 percent. According to BOEM documentation, the driving factor for this decision was that shallow water in the Gulf of Mexico has been largely explored, leaving generally marginal tracts that either are largely depleted of resources or more gas prone. In turn, the goal in reducing the royalty rate was to incentivize additional industry interest in these more marginal shallow water tracts. BOEM has publicized the development of a progressive royalty system since 2013 but has made little demonstrable headway toward developing such a system. Specifically, in its budget justifications for fiscal years 2014 through 2017, BOEM stated it was developing a package of legislative and administrative proposals to, among other things, improve the return to the federal government from the sale of these federal resources. Among these proposed reforms was a price-based tiered royalty rate to replace the fixed royalty rate structure that BOEM has used since 1983. Under a price-based royalty system, the royalty rate would depend on prevailing commodity prices, with lower prices having lower royalty rates. According to BOEM documents, the current flat-rate royalty system is regressive—that is, a fixed rate that does not adapt to market conditions or the relative success of a lease—but a price-based royalty would share more revenue risk with the lessee and reduce the regressive nature of the system. A more progressive system would provide an increased incentive to lessees to develop resources during times of low oil and gas prices through lower royalty rates, while also ensuring that the federal government receives a greater return for offshore resources when prices are high. BOEM officials we interviewed told us that this type of adaptive system could be more efficient and provide higher returns relative to the existing fixed-rate system. That is, if properly designed, a priced-based system could increase return to the federal government in high-price environments while incentivizing continued industry investment when prices are low. According to BOEM documentation, a progressive, price-based royalty rate could have the additional benefit of “future-proofing” the royalty system because it would adjust the rate for whatever prices prevail in the future and provide a stable, predictable market for industry. We reported in September 2008 that the regressive nature of the offshore fiscal system, among other factors, caused it to be unstable over time and added risk to oil and gas investments that may reduce the total amount industry is willing to pay for the rights to explore and develop federal leases. BOEM officials told us such a system that automatically adjusts could reduce the need for frequent revisiting and continual annual and lease sale-specific evaluations because it would automatically adapt to certain market conditions. According to these officials, a stable, long-lived system would also reduce political pressure to restructure it or rely on legislation—such as the Deep Water Royalty Relief Act—in the future. Additionally, long-term stability in the royalty system could benefit industry, according to a 2007 study. Specifically, industry may consider fiscal system stability more important than the attractiveness of fiscal terms, as the appeal of low government revenue—incorporating bids, rents, and royalties—is limited if there is a high probability the terms will change. In the context of the offshore fiscal system, this means that some companies might prefer a flexible rate that lowers their royalty obligations in low-price environments so long as BOEM clearly defines the specific market conditions under which royalty rates would increase or decrease. BOEM has continued to publicize its efforts to develop a price-based royalty system—though it did not complete them—as follows: July 2017: BOEM announced in a “note to stakeholders” that it was continuing to analyze a price-based royalty system and would subsequently engage stakeholders on this concept; however, it did not do so. January 2018: BOEM released the 2019-2024 National Outer Continental Shelf Leasing Draft Proposed Program, which states that the bureau was studying a priced-based royalty structure as an alternative to the existing fixed royalty rate. February 2018: BOEM’s memorandum documenting lease term decisions for its March 2018 lease sale stated that the bureau was evaluating a potential future option for a price-based mechanism that would lower royalty rates at current oil prices while increasing rates above the current 18.75 percent royalty rate as price conditions warrant. Spring 2018: In the Lease Term Reassessment Report covering its August 2018 and March 2019 lease sales, BOEM indicated that the statutory floor of 12.5 percent might not be low enough to encourage new exploration and development, particularly for smaller fields for which a lower royalty would have a reduced financial benefit and effect on early cost recovery than for larger fields. As a result, BOEM was considering incorporating into its price-based royalty the suspension of royalty collection for a certain initial volume of oil or gas produced to effectively lower the royalty rate below the statutory minimum and incentivize the development of smaller, marginal fields. However, BOEM has demonstrated little tangible progress in the 6 years since it began publicizing the development of a more progressive royalty system. BOEM officials told us that the general concept for a price-based royalty is robust, but the bureau has not determined optimal parameters for sharing risk when prices are low in return for a higher return when prices are higher. BOEM drafted a Federal Register notice and accompanying procedures for implementing a price-based royalty system that the bureau intended to publish to obtain public comment. These draft procedures include different permutations of royalty rates and price thresholds. However, BOEM officials told us that feedback from within the bureau included enough concerns about workability that the draft notice and procedures were not published and the draft no longer reflects bureau leadership’s position on the issue. According to BOEM officials, the main challenges to a price-based system are determining optimal rates and price thresholds for escalating royalties and quantifying the benefits to the government at lower price levels when government revenue would be lower than under the current regressive system. BOEM officials also cited additional challenges, including establishing price inflation parameters and developing mechanisms for assessing and collecting royalty payments on a sliding scale. After the development of the draft Federal Register notice and procedures, according to BOEM officials, they continued to work on a price-based royalty model. However, they did not provide us documentation of any progress made. BOEM officials told us that the concept is too immature to consider testing implementation on a pilot project basis and that there is not a time frame for when any decisions will be made, including whether to proceed with developing the system. According to federal standards for internal control, agency management should define objectives clearly to enable the identification of risks and define risk tolerances. This involves clearly defining what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. Developing a documented plan for assessing whether and how to implement a progressive royalty structure that defines these aspects would help position BOEM to better understand (1) the potential benefits such a structure could offer in terms of improving fair return to the taxpayer while fostering diligent offshore oil and gas development and (2) how to implement such a structure if it elects to do so. BOEM’s tract valuation process might not fully assure receipt of fair market value, according to our analysis of BOEM tract valuation data and documentation. BOEM’s valuations for tracts were generally low relative to industry bids, largely due to the cumulative effect of three aspects of its bid valuation process: (1) the bureau forecasts conservatively to account for uncertainties, (2) the bureau forecasts unreasonably high levels of depreciation, and (3) BOEM selectively further lowers many valuations from its model to justify accepting bids it otherwise would reject. In addition, BOEM conducts limited self-evaluations of its tract valuation process and does not have a systematic mechanism to address deficiencies, such as those described above. BOEM’s valuations for tracts it determined to be economically viable were generally low relative to industry bids. Specifically, from March 2000 through June 2018, BOEM’s acceptable bid threshold for the 2,035 tracts on which it conducted valuations was, on average, about one-third of industry’s high bid (about $2.26 million to $6.43 million, respectively, as shown in table 2). BOEM accepted the high bid on about 85 percent of tracts it determined to be viable (1,721 of 2,035), for a total of about $12.8 billion in bid revenue, and it rejected about 15 percent of high bids (314 of 2,035) totaling about $287 million. BOEM’s bid rejections generally resulted in higher bids for the same tracts in subsequent lease sales, significantly increasing bid revenue for these tracts and indicating that industry viewed those tracts as more valuable than the original rejected bid. Specifically, for the 314 bids worth about $287 million that BOEM rejected, BOEM subsequently accepted bids for almost 70 percent of the tracts (161 of 236) for about $667 million—more than twice (about 230 percent) the aggregate rejected value for those tracts. BOEM’s acceptable bid thresholds were generally low relative to industry bids due to three compounding aspects of its valuation process: (1) BOEM conservatively forecasts the key parameters used in its valuation model, (2) BOEM forecasts unreasonably high levels of depreciation between lease sales, which further lowers acceptable bid thresholds, and (3) BOEM alters many valuations—valuations that are already low due to the two preceding aspects of its process—downward further in order to justify accepting bids. BOEM officials told us that they forecast conservatively to account for uncertainties, which systemically lowers its tract valuations. Specifically, they told us that they face significant uncertainties associated with the key parameters that contribute to BOEM’s valuations: resource potential, probability of geologic success, price of oil and gas, and cost and scheduling estimates. They told us that they forecast each of these parameters conservatively—that is, being cautious against overestimating any factor that might unreasonably inflate the bureau’s valuation—so as to not reject bids that might represent fair market value. BOEM’s conservative approach is evidenced by its reluctance to reject bids of significant value. Specifically, from March 2000 through June 2018, BOEM rejected three bids of more than $5 million dollars—the highest was for approximately $11.2 million—while accepting 570 bids of more than $5 million. BOEM officials told us that this conservative approach represents fair market value because the objective of the bureau’s tract valuation process is to lease tracts and collect associated revenues except when BOEM determines a tract is worth significantly more than the highest bid received. That is, they told us that the bureau is more inclined to accept bids and collect revenue—and facilitate exploration and development via the award of leases—rather than reject bids. Moreover, they told us that this approach also provides the bureau with greater justification for rejecting the bids when it does so, which they said can drive up subsequent bids for the same tracts. BOEM forecasts unreasonably high levels of depreciation as compared to the government’s recommended discount rate, which further depresses acceptable bid thresholds that were already based on conservative forecasting. As discussed previously, BOEM’s acceptable bid threshold is generally determined by the lesser of BOEM’s present valuation and its delayed valuation. For the 1,412 tracts with a positive present valuation assessed from March 2000 through June 2018, BOEM forecast a median loss in value on these tracts would be about 23 percent (about $494,000) by the time of the next sale opportunity for those tracts. BOEM officials told us that expected lower future values are generally due to discounting the eventual collection of revenue. Specifically, BOEM officials explained that the bureau’s model considers the delayed collection of revenue—bonus bids and royalties—when developing its delayed values. However, because tracts that received a rejected bid would be available for sale during the next year—or, more recently, 6 months on average—the period of discounting is very short. Discounting seems an unreasonable explanation of BOEM’s forecasted depreciation rates for two additional reasons. First, BOEM’s forecasted depreciation rates do not align with industry bidding patterns for tracts that were leased more than once—where the lease for a tract either expired or the leaseholder relinquished it and the tract was therefore available at a subsequent lease sale. Specifically, for the 61 tracts that were leased more than once from March 2000 through June 2018, bids actually increased slightly over time (bids increased at a real average annual rate of 0.2 percent, or about $6,700). Second, since oil prices are generally forecast to rise, the underlying oil and gas resource values would be expected to increase over time rather than decrease, suggesting a smaller difference between present and delayed values should be observed than is reflected in BOEM’s tract valuations. Additionally, BOEM’s forecasted depreciation has increased even though tracts are now available twice as frequently. Until August 2017, BOEM held annual lease sales for each of two lease areas so that tracts were available once per year. On average during this time, BOEM forecast that the median loss in value for tracts with positive present valuations would be approximately 23 percent (about $481,000) of their value in the year between lease sales (see table 3). BOEM has since made tracts available twice per year. Having less time between lease sales should decrease the amount of forecasted depreciation, as there is less time for discounting. Yet the average difference between present and delayed value increased for biannual lease sales to about 27 percent (or about $1.03 million per tract) for tracts with a positive present valuation. BOEM’s depreciation for biannual lease sales is equivalent to an annual rate of approximately 47 percent (or about $1.78 million annually per tract), which is nearly seven times the Office of Management and Budget’s annual recommended discount rate of 7 percent. That BOEM’s forecasted depreciation has increased since moving to biannual lease sales is also at odds with the concept of how discounting should affect tract valuations, as shorter periods of time are generally associated with lower depreciation than longer periods of time. Under federal standards for internal control, management should use quality information to achieve the entity’s objective. Yet, according to our analysis of BOEM data, the bureau’s unreasonably large forecasts of depreciation have increasingly been the deciding factor in decisions to accept bids. Cumulatively, BOEM’s high forecasted level of depreciation resulted in the bureau accepting 205 bids for about $672 million that it would have rejected if its present valuations had been used as the acceptable bid threshold. Based on the return BOEM has realized on rejected bids, had BOEM rejected these 205 bids, it might have subsequently collected more than $873 million in additional bid revenue for these tracts, which would represent an increase in overall bid revenue of about 6.8 percent for tracts BOEM determined to be viable. BOEM officials told us that they were unaware that their model forecasts such high rates of depreciation and that the issue warrants further examination. However, BOEM officials did not indicate they had any plans to conduct such an examination. Though BOEM is not required to follow government auditing standards, these standards highlight that it can be beneficial to consult an independent third party to assess issues that are highly technical as a safeguard to eliminate threats to independence or reduce them to an acceptable level. As BOEM developed and has used its delayed valuations for at least 20 years, outside perspectives and expertise could be beneficial. Enlisting an independent third party to examine the extent to which the bureau’s use of delayed valuations assures receipt of fair market value, and making changes—such as terminating the use of delayed valuations as acceptable bid threshold criteria or amending its model’s assumptions to develop more justifiable depreciation rates—as appropriate, would help BOEM mitigate risks of continuing to accept bids based on poor information on tracts’ future values. Our analysis of BOEM data as well as BOEM testimony indicate that the bureau changed its forecasting parameters, thereby lowering many valuations and acceptable bid thresholds—which were already systematically low due to its conservative forecasting and excessive depreciation—in order to justify accepting bids. BOEM officials told us that when bids are slightly below the bureau’s initial valuations—and therefore would be rejected per BOEM’s procedures for ensuring receipt of fair market value—BOEM reviews and adjusts its forecasting parameters then reruns its model in order to produce new valuations, which they told us can—and which the data indicate generally do—result in lower valuations that justify accepting the bids. BOEM officials told us that they would rather accept bids offered by industry—as well as any associated rental and royalty revenue—than reject them and potentially never recoup the forgone bid revenue. We observed BOEM’s bias, or statistical anomalies, indicating BOEM lowered a portion of its valuations in order to accept bids in our analysis of BOEM tract valuation data from March 2000 through June 2018. Specifically, we found that BOEM never valued a tract as being worth slightly more than industry’s high bid (that is, instances in which BOEM’s valuation is between 100 and 125 percent of the high bid). In contrast, BOEM valued tracts at slightly less than the industry high bid (that is, instances in which the high bid is between 100 and 125 percent of BOEM’s valuation) about 10 percent of the time (117 of the 1,198 bids subjected to valuation for which the acceptable bid threshold was above the minimum bid level). This anomalous absence of any instances in which BOEM valued tracts slightly more than industry is consistent with BOEM officials’ statements that the bureau further lowered its initial valuations when these valuations were only slightly higher than bids. BOEM officials suggested that any pattern of adjusting valuations would be limited to lower-value bids whereby smaller dollar-value changes would represent greater percentage changes. However, the data do not support this, as we found that BOEM’s bias toward lowering valuations does not appear to be limited to those slightly above industry’s high bid, but is nearly systematic for valuations up to double industry’s high bid across all bid levels. Figures 4 and 5 show the distribution of BOEM’s valuations compared with industry’s high bids, with green data points reflecting accepted bids and blue data points reflecting rejected bids. In particular, the middle two bars in figure 4 and the areas between the dotted lines on figure 5 represent instances in which the relationship between BOEM’s valuation and industry’s high bid—and vice versa— were relatively close (that is, BOEM’s valuation was up to double industry’s bid for rejected bids, and industry’s bid was up to double BOEM’s valuation for accepted bids). Within this range, BOEM’s tendency to lower bid valuations to justify acceptance is clear due to the relative abundance of acceptances (359) and the relative scarcity of rejections (27)—a pattern of more than 13 acceptances for every rejection that is anomalous within the data. This disparity would be even greater if we had included in our analysis the 802 bids BOEM accepted because its valuations were below the minimum bid level which is then used as the acceptable bid threshold. BOEM officials told us that they occasionally change valuations to address the uncertainty inherent in the factors that comprise BOEM’s tract valuation process, though doing so in order to justify bid acceptance is inconsistent with BOEM’s fair market value procedures. Specifically, officials told us that the point valuation developed by its discounted cash flow model is not representative of the broadness of the distribution of potential values—though it does represent the average of the distribution. Additionally, these officials told us that the process is iterative—the bureau adjusts its forecasts multiple times before deciding on final valuations. Furthermore, officials said that valuations that are above, but near, the high bids are subject to more iterations. Moreover, BOEM officials told us that all forecasting parameters and valuations, including those that are revisited more frequently, are evaluated and approved through its Fair Market Value Review Committee, which is broadly responsible for ensuring consistency in the application of the bureau’s tract valuation process. Adjusting valuations comports with what BOEM officials told us is their conservative approach and promotes accepting bids unless the bureau has a high level of certainty that the tract is worth more than the high bid. However, BOEM officials told us they were not aware that their adjustments had effectively reduced the acceptable bid thresholds of nearly all valuations that were initially up to double industry’s high bid. Given that BOEM already starts with a conservative approach to valuation, which is compounded by its model generally forecasting high levels of depreciation, this practice of introducing more conservative assumptions in cases when initial valuations are above bids is not consistent with the bureau’s fair market value procedures prescribed in federal regulations, BOEM’s Bureau Manual for ensuring fair market value, and in BOEM’s bid adequacy procedures. These procedures call for BOEM to use the outputs of its discounted cash flow model as the thresholds for determining whether to accept bids. In situations where BOEM determines that its valuation results are not consistent with programmatic goals, BOEM’s procedures allow for the bureau to develop alternative bid evaluation protocols for a given lease sale, but BOEM has not done so. BOEM’s procedures do not explicitly allow for valuations to be adjusted based on how close they are to industry bids, nor is there an allowance for adjusting valuations in an ad hoc fashion for uncertainty. The practice of adjusting valuations this way undermines receipt of fair market value by holding industry to a lower and potentially inconsistent standard for purchasing leasing rights than those outlined in BOEM’s valuation procedures. The practice of lowering valuations also results in the potential loss of hundreds of millions of dollars in revenue. We do not know how many accepted bids would have been rejected based on their initial valuations because BOEM’s data do not indicate which valuations were further lowered. However, if BOEM had rejected 26 percent of the bids that were up to double its valuations—which appears reasonable to interpolate based on the distribution of the other bid-to-valuation relationships—the bureau potentially could have subsequently collected approximately $567 million additional dollars in bid revenue for tracts it determined to be viable (an increase of about 3.9 percent). Without taking steps to ensure that BOEM’s bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids, the bureau risks continuing to undermine the receipt of fair market value for the sale of public resources. BOEM conducts evaluations of some aspects of its tract valuation process but does not comprehensively evaluate the accuracy of its forecasting, the assumptions of its model, and their combined effect on assuring receipt of fair market value. Specifically, since 2004, BOEM has routinely conducted “lookback studies,” self-evaluations to identify opportunities to refine or improve BOEM tract evaluations and decisions. In these lookback studies, BOEM evaluates its performance by comparing the quantity of discovered hydrocarbon resources with BOEM’s pre-drill estimates of resource potential. However, the scope of BOEM’s lookback studies is limited, which reduces the studies’ effectiveness in helping the bureau improve its valuation process. We identified four main limitations, based on our review of the studies and interviews with BOEM officials, as follows: Resource discoveries are not updated. The lookback studies are not necessarily representative of the total resources on a tract because BOEM compares the forecast against the results of only the first exploratory well and does not update its studies with the results of further exploration. Therefore, BOEM officials told us, the studies are a snapshot in time and are not representative of the total resource that may ultimately be discovered and developed on a tract. Consequently, the studies provide limited insight regarding the total quantity of the resource discovered relative to pre-drill forecasts and identify the causes of any significant differences. BOEM does not assess certain factors. BOEM does not formally assess other forecasted factors that are important in its valuations, such as likelihood of success or cost and schedule estimates, or the underlying assumptions and workings of its discounted cash flow model. BOEM officials told us that the bureau periodically updates its cost and schedule estimates based on available data and that it makes adjustments to its model, but that these processes are generally ad hoc and not consistently documented. As previously discussed, BOEM’s model has produced unreasonably high projected levels of depreciation between lease sales—suggesting that BOEM could modify the model or its assumptions to be more consistent and accurate. For example, BOEM has not assessed how depreciation rates implied in its delayed valuations compare with actual depreciation observed in tracts that have been leased multiple times. BOEM does not systematically use the studies to improve processes. BOEM’s lookback studies do not include a systematic process for identifying and documenting steps the bureau plans to take to improve the bid valuation process. BOEM does not use these studies’ findings to systematically inform or document changes to policies, procedures, or processes related to BOEM’s tract evaluations. For example, BOEM officials told us that the lookback database and the studies are used as training aids, the data are not comprehensive, the studies are used as spot checks and to provide lessons learned, and these studies are not a comprehensive effort to assess BOEM’s valuation process (as BOEM conducts no such comprehensive effort). In its written comments on this report, Interior indicated that BOEM uses the results of its lookback studies to improve aspects of its valuation process. However, Interior did not provide documentation to support this claim. Data do not reflect initial valuations. BOEM’s ability to measure the accuracy of its tract valuation process—both its forecasting and the performance of its model—is hindered because some of its data do not reflect the bureau’s initial valuations but rather the adjusted valuations it used to justify bid acceptance. Specifically, BOEM is unable to observe the effect on revenues and sales bids when its initial valuations—which were already low due to conservative forecasting and generally high depreciation—indicated that bids should be rejected when bids are only slightly less than BOEM’s valuation. By altering the valuations to justify acceptance, BOEM is unable to assess how industry would have responded to those rejections in subsequent lease sales. What we observed indicates that BOEM bid rejections for tracts it values as less than double the high bid lead to almost the same average return in future sales as do rejections in which BOEM’s valuation is many multiples of the bid. By taking steps to ensure that BOEM’s bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids, BOEM could better evaluate how its valuations relate to actual outcomes, which would better inform the bureau as to the validity of its forecasting, modeling assumptions, and the extent to which it is assuring receipt of fair market value. According to standards for internal control in the federal government, management should establish and operate monitoring activities to monitor the internal control system and evaluate the results as well as remediate identified internal control deficiencies on a timely basis. Without implementing a systematic process for comprehensively evaluating its tract valuations, such as by expanding the scope of the bureau’s lookback studies effort and remediating any identified deficiencies, the bureau does not have reasonable assurance that its tract valuation process is working as intended, and that opportunities to refine or improve the bureau’s valuation process are identified and pursued to better assure the receipt of fair market value for the federal government for offshore oil and gas leases. Such a systematic process could provide BOEM a better understanding of how well the bureau is able to forecast key factors against actual results. BOEM has policies and practices intended to ensure the bureau receives fair market value for the hundreds of millions of dollars of offshore oil and gas leases sold each year. This includes a process to assess fiscal terms in advance of lease sales that has informed periodic changes to fiscal terms over the years. However, we found that BOEM has made limited progress in considering more fundamental changes. The bureau has publicized the development of a progressive royalty structure since 2013 that may better share the risks and rewards of offshore energy activities, but has made limited headway in developing one despite significant potential benefits of such a system. The bureau has not defined what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. Developing a documented plan for determining whether and how to develop a progressive royalty structure that defines these aspects would help position BOEM to better understand (1) the potential benefits such a structure offers in terms of improving fair return to the taxpayer while fostering diligent offshore oil and gas development and (2) how to implement such a structure if it elects to do so. After lease sales, BOEM has repeatedly rejected industry bids when they were lower than the bureau’s assessments of a tract’s value, generating significant additional revenue at subsequent lease sales. However, BOEM’s valuation process might not fully assure receipt of fair market value for sale of offshore oil and gas leases because it systematically reduces the thresholds for accepting bids even though rejecting them could lead to significantly increased revenue. We found that BOEM does so by using a conservative approach to estimating tract values, forecasting unreasonably high levels of depreciation in its delayed valuations, and further lowering valuations in order to justify accepting bids it otherwise would have rejected. Enlisting an independent third party to examine the tradeoffs and benefits of the bureau’s continued use of delayed valuations, and making changes—such as terminating the use of delayed valuations as acceptable bid threshold criteria or amending its model’s assumptions to develop more justifiable depreciation rates—as appropriate, would help BOEM mitigate risks of continuing to accept bids based on poor information on tracts’ future values. Furthermore, BOEM generally lowers its valuations and thereby accepts bids as long as the bid is at least half of BOEM’s initial valuation, which is inconsistent with bureau procedures for ensuring receipt of fair market value. Without taking steps to ensure that BOEM’s bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids, the bureau risks continuing to undermine the receipt of fair market value for the sale of public resources. Cumulatively, we calculate that taking these steps could result in BOEM collecting approximately 10.7 percent more in bid revenue for offshore tracts it determines to be economically viable, which would reflect hundreds of millions of dollars in additional bid revenue over the next decade. BOEM’s ability to assure receipt of fair market value is further hindered because it does not systematically assess its own performance and take steps to improve it. For example, BOEM does not (1) assess how its forecasts of key factors (e.g., reserves discovered, likelihood of success, and oil prices) compared to actual results, (2) assess the assumptions and accuracy of its discounted cash flow model results, such as how well the model accounts for depreciation, and (3) collect information about deviations between BOEM’s initial and final valuations that could provide management insights into the frequency and implication of lowering valuations. Without implementing a systematic process for comprehensively evaluating its tract valuations, such as by expanding the scope of the bureau’s lookback studies effort and remediating any identified deficiencies, the bureau does not have reasonable assurance that its tract valuation process is working as intended, and that opportunities to refine or improve the bureau’s valuation process are identified and pursued to better assure the receipt of fair market value for the federal government for offshore oil and gas leases. We are making the following four recommendations to BOEM: The BOEM director should develop a documented plan for determining whether and how to develop a progressive royalty structure that clearly defines what is to be achieved, who is to achieve it, how it will be achieved, and the time frames for achievement. (Recommendation 1) The BOEM director should enlist an independent third party to examine the extent to which the bureau’s use of delayed valuations assures the receipt of fair market value, and make changes—such as terminating the use of delayed valuations or amending its model’s assumptions—as appropriate. (Recommendation 2) The BOEM director should take steps to ensure that BOEM’s bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids. (Recommendation 3) The BOEM director should implement a systematic process for comprehensively evaluating its tract valuations, such as by expanding the scope of the bureau’s “lookback studies” effort, and remediating any identified deficiencies. (Recommendation 4) We provided a draft of this report to Interior for its review and comment. In its written comments, reproduced in appendix II, Interior agreed with one recommendation, partially agreed with two, and disagreed with one, as discussed below. Interior also stated that it is concerned that certain aspects of the draft report do not paint a representative picture of BOEM’s valuation process and efforts to ensure receipt of fair market value. Regarding the recommendation that BOEM should develop a documented plan for determining whether and how to develop a progressive royalty structure, the agency agreed and indicated that BOEM will develop such a plan. Specifically, the agency stated that BOEM would develop a plan to identify the theoretical and practical benefits and drawbacks of a progressive royalty structure based on existing research and prepare materials for management to determine whether implementation of a price-based royalty would be beneficial. Regarding the recommendation that BOEM enlist an independent third party to examine the extent to which the bureau’s use of delayed valuations assures the receipt of fair market value, the agency disagreed. The agency stated it did not agree with our characterization of BOEM’s delayed valuations and stated that BOEM believes it is neither necessary nor cost effective to enlist an independent third party. However, BOEM agreed to (1) examine its delayed value calculation, particularly as it relates to the impact of biannual lease sales, (2) develop a plan to perform a comprehensive internal review of delayed value calculations and make appropriate changes, and (3) institute a peer-review process for all potential changes. These actions may address some of the deficiencies we identified, but our concerns regarding BOEM’s use of delayed valuations are not limited to the move to biannual lease sales and the agency has not provided any reasonable explanations for its high levels of forecasted depreciation. BOEM forecast a median depreciation of about 23 percent. This implies we should observe significant declines in the actual value of tracts over long periods of time, which is impossible to reconcile with actual trends in bonus bids. The real average bonus bid per acre in 2018 was about the same as it was thirty years earlier in 1988. Alternatively, such a high forecast of depreciation implies either a long time frame between lease sales or a high discount rate. But the time between lease sales has been one year or 6 months, on average, and in our view, and the Office of Management and Budget’s annual recommended discount rate of 7 percent would be more appropriate. Recognizing that Interior’s view differs from ours in this regard, we continue to believe that enlisting an independent third party to examine all aspects of the bureau’s use of delayed valuations—not just proposed changes to address the move to biannual lease sales—would better assure the receipt of fair market value. Regarding the recommendation that BOEM take steps to ensure that its bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids, Interior partially agreed. Specifically, Interior stated it agreed with the recommendation, but did not agree with our characterization of BOEM’s bid valuation process. Interior stated that the apparent anomaly—the lack of instances when BOEM valued tracts up to double industry’s bid—is skewed because a very large percentage of the data set comprise relatively low bids, and BOEM-generated valuations relative to the bids are constrained by the minimum bid amount. That is, Interior stated that the minimum bid level created an artificial floor for BOEM’s acceptable bid threshold even in instances in which BOEM’s valuation is substantially lower, resulting in more bids being up to double BOEM’s valuation than would be the case if BOEM’s acceptable bid thresholds were not constrained by the minimum bid amount. However, as discussed above, we removed all valuations for which BOEM used the minimum bid level as its acceptable bid threshold from our analysis (that is, we did not include instances when BOEM’s actual valuation was below the minimum bid level). Had we included these valuations, the asymmetry in the relationship between bids representing 100 to 200 percent of BOEM’s acceptable bid threshold (acceptances) and BOEM’s acceptable bid threshold representing 100 to 200 percent of industry’s bid (rejections) would have nearly doubled (see figure 6). Moreover, even though we did not include these instances, the minimum bid level only affects the distribution of instances when BOEM’s valuation was less than industry’s high bid. As such, it does not explain why there are so few instances when BOEM valued tracts slightly more than industry. We continue to believe that taking steps to ensure that its bid valuation process is not biased toward adjusting valuations downward based on their proximity to bids would be beneficial and will monitor BOEM’s efforts as part of our regular recommendation follow-up. Regarding the recommendation that BOEM implement a systematic process for comprehensively evaluating its tract valuations, such as by expanding the scope of the bureau’s lookback studies effort, and remediating any identified deficiencies, Interior partially agreed. Specifically, Interior stated it agreed with the recommendation, but did not agree with our characterization of BOEM’s bid tract evaluation process and review procedures. The agency identified two areas where they did not agree with our characterization. First, the agency stated that our statement that “resource discoveries are not updated” is inaccurate. According to its comments, BOEM develops independent estimates of recoverable oil and gas contained within discovered fields by conducting field reserve studies. However, any updated estimates are not reflected in the lookback studies, which represent BOEM’s formal mechanism for self-evaluation. For the lookback studies, as noted above, BOEM compares their forecast against the results of only the first exploratory well and does not update its studies with the results of further exploration. Second, the agency stated that we were incorrect to state that BOEM does not use the studies to improve processes because it uses its lookback studies to improve its valuations. However, BOEM did not provide documentation to support this claim. We continue to believe that implementing a systematic process for comprehensively evaluating its tract valuations would be beneficial and will monitor BOEM’s efforts as part of our regular recommendation follow-up. In addition, Interior stated in its letter that it appeared that we did not account for industry assumptions regarding the applicability of price thresholds in comparing estimated increased bonus bid revenue and forgone royalties for leases subject to deep water royalty relief sold from 1996 through 2000. However, as stated above, we based our econometric modeling on the lease terms provided in Interior’s final notice of sale documents for those leases, which reflect the expectations for royalty relief that industry bid on at the time of sale. In addition, as described in appendix I, we used several alternative model specifications to test the sensitivity of our results to the possibility that industry had different understandings of royalty relief than those contained in the sale documents. Our results are robust across these alternative specifications. As noted above, leases sold in 1996, 1997, and 2000 included provisions for royalty relief subject to price thresholds (that is, lease terms indicated that royalties would only be owed if the price of oil exceeded certain thresholds). Leases sold in 1998 and 1999 did not contain price thresholds (that is, lease terms indicated that no royalties would be owed regardless of the price of oil). As evidenced by our econometric modeling results, during the 1996 through 2000 period, we observed higher bidding when no price threshold provisions were included in lease terms, suggesting that industry accounted for the expectation of no royalties when developing bids. As noted above, in 2007, a federal court ruled that Interior’s attempt to collect royalties through the application of price thresholds on production under leases subject to the 1996 through 2000 royalty suspension was unlawful. In its comments, Interior stated that industry bidding would have been different had companies known at the time of sale that the price thresholds would not apply, and as a result, the net amount of forgone revenue—the difference between collected bonus bids and forgone royalties—would have been lower. To account for this, we adjusted our calculation of estimated additional bonus bid revenues so that it is more comparable to BOEM estimated foregone revenues. This adjustment increased our estimate of additional bonus bid revenues to $1.98 billion (an increase of approximately $530 million), which is still subsumed by the $18 billion in foregone royalties collected through the end of 2018. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of the Interior, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. We developed an econometric model to analyze the effect of royalty rates and other key variables on bonus bids for offshore leases between 1985 and 2018. Specifically, we analyzed how changes in royalty rates affected the winning bids for offshore leases. Our analysis used data from 23,081 individual lease sales in the period from 1985 to 2018. Our model analyzes the winning bid for each lease auctioned by the Bureau of Ocean Energy Management (BOEM). We used the log of the inflation-adjusted winning bid per acre for this dependent variable: Where 𝑌𝑌𝑖𝑖𝑖𝑖 represents the inflation-adjusted (real) value of the winning bid per acre and 𝑦𝑦𝑖𝑖𝑖𝑖 is its log value. 𝑦𝑦𝑖𝑖𝑖𝑖=log (𝑌𝑌𝑖𝑖𝑖𝑖) . Our key set of explanatory variables was a set of indicator (dummy) variables that captured the different levels of royalty rates that pertained during our study period. We ran three alternative model specifications to capture the effects of royalty rates and royalty relief that occurred between 1996 and 2000. Each specification contained: A dummy variable for the 16.67 percent royalty rate. A dummy variable for the 18.75 percent royalty rate. In addition to a 16.67 and a 18.75 royalty rate dummy, model 1 included two additional dummy variables: one dummy variable for royalty relief that occurred in 1996, 1997 and 2000, which allowed a 0 percent royalty rate until the oil price reached a specified threshold; and a second dummy variable for royalty relief that occurred in 1998 and 1999, which allowed a 0 percent royalty rate in perpetuity. In addition to a 16.67 and a 18.75 royalty rate dummy, model 2 included five additional dummy variables for each year from 1996 to 2000. In addition to a 16.67 and an 18.75 royalty rate dummy, model 3 included a single dummy variable for the period 1996 to 2000. The omitted royalty rate dummy variable category was a rate of 12.5 percent. The estimates of the parameters for the other royalty rate dummies show the effect relative to this 12.5 percent royalty rate. Our model controlled for variables that were expected to be related to potential lease production and profitability. These variables included a dummy variable for whether the lease was determined by BOEM to be viable or nonviable; a set of dummy variables for different values of the number of bids, that is, 1 bidder, 2 bidders, 3 bidders, and so on; and a variable for the amount of oil production in the area (protraction area) of the lease’s location at the time of the lease auction. We also controlled for various administrative factors. We used a dummy variable to indicate when the winning bid was too low and was rejected; the value of the minimum bid allowed for the auction; and a set of dummies that captured the use of different royalty suspension provisions, variation in rents charged and different amounts of deep gas relief. To control for effects that vary over time, we included a set of time dummy variables for each date of sale. These dummies account for effects that vary over time but are fixed for any given date, such as technology changes and oil and gas market conditions including the price of oil and gas. Our objective was to control for as many time-varying factors as possible. Attempting to include separate effects of, for example, oil prices and exploration costs, would create problems of leaving out important effects that are difficult to measure or for which there are no data. Finally, we included a set of fixed-effect dummies for each protraction area-block combination that account for locational effects not measured by our other explanatory variables. These fixed effects assist in controlling for unobserved heterogeneity. The regression analysis employed an unbalanced panel model using data for offshore BOEM lease auction sales between 1985 and 2018 as follows: 𝑦𝑦𝑖𝑖𝑖𝑖𝑖𝑖=�𝑐𝑐𝑚𝑚𝐶𝐶𝑚𝑚 𝑦𝑦𝑖𝑖𝑖𝑖𝑖𝑖 is the dependent variable; namely, the log of the real winning auction bid for lease j at location (protraction area-block combination) i for sale date t. 𝑐𝑐𝑚𝑚 is a fixed effect parameter for its associated dummy variable 𝐶𝐶𝑚𝑚, 𝑔𝑔𝑖𝑖 is a fixed effect parameter for its associate dummy variable 𝐺𝐺𝑖𝑖 for for winning bidder, company m. 𝑓𝑓𝑖𝑖 is a fixed effect parameter for dummy variable 𝐹𝐹𝑖𝑖, for year t. location (protraction area-block number combination) i. 𝑋𝑋𝑖𝑖𝑖𝑖𝑖𝑖𝑘𝑘 is the kth characteristic associated with lease j at location i for discussed above and 𝛼𝛼𝑘𝑘 is the parameter associated with each of sale date t. There is one of these for each of the control variables these variables. 𝜀𝜀𝑖𝑖𝑖𝑖 are the error terms. We used xtreg in STATA to estimate our model. Our standard errors are heteroscedasticity-robust and are adjusted for clustering at the protraction area-block combination level. In some cases, our model showed that leases sold when royalty rates were lower had significantly higher winning bids. While not all the royalty rate dummy variables were statistically significant, those dummy variables that measured the largest differences compared to the omitted 12.5 percent royalty rate were statistically significant. Specifically, In model 1, the royalty exemption for 1996, 1997, and 2000, when producers expected zero royalties until oil prices rose above a given threshold, corresponded with an increase in bonus bids of about 34 percent. Similarly, the zero-in-perpetuity royalty rate relief for 1998 and 1999 corresponded with an increase in bonus bids of about 60 percent. In model 2, the royalty exemption dummy variables for each individual year, 1996 to 2000, when producers expected royalty relief, were all significant. The results for these parameter estimates range translate into about 19 to 64 percent increase in real bonus bids. In model 3, the royalty exemption dummy variable for 1996 to 2000 combined, when producers expected royalty relief, was significant. The result for this parameter estimate translates into about a 40 percent increase in real bonus bids. We tested for the restriction on the dummy variable parameters (all parameters equal) implied in model 3 versus model 2. Our test rejected equal parameters in favor of the specification in model 2. The 18.75 percent royalty rate dummy parameter was statistically significant and negative in all three models, which is to be expected since the base (comparison) case is 12.5 percent. The result for this effect translates to a drop in bonus bids of about 28 percent in all three models. However, the 16.67 percent dummy variable was not statistically significant in any of the models. We used a set of time-fixed effects for each sale date and, therefore, we could not separate out the individual effects of time-varying variables such as oil prices. These dummies show the effect on bonus bids of conditions pertaining on that particular sale date, where a larger positive value translates to higher bonus bids and a smaller or negative value translates to lower bonus bids. Figure 7 compares oil prices and the values of the sale date dummy variables over time and suggests a correspondence between higher oil prices and the size of these dummy variable estimates. This suggests that higher oil prices are likely to result in higher bonus bids. The set of dummy variables for the number of bids produced parameter estimates that were statistically significant and for the most part were of the expected size and sign. These suggest that greater interest (more bids) is associated with higher bonus bids (the exception was the slight deviation from this pattern for the 8 bids dummy). The number of bids may not represent market concentration because anyone is permitted to bid on a given lease, so potentially there are a large number of bidders. This set of dummies is more likely to represent perceived quality of the lease on the part of bidding firms. Other key factors were either significant with the expected direction of effect or else not statistically significant. Oil production in the protraction area at the time of the auction was positive and significant. Rejected bids were associated with smaller highest bids. Joint winning bids were associated with higher bonus bids. Leases designated as viable by Interior were associated with higher bids. Our model contains no explicit consideration of market concentration effects. Our use of the number of bidders in the model may capture some market concentration effects but possible endogeneity issues that may arise with the use of such measures are not addressed due to lack of reasonable instruments. Our model does not explicitly isolate the impact of oil prices because we needed to include time-fixed effects (dummies). However, we are able to evaluate the effect of oil prices indirectly by observing the correspondence between the estimated values of the time dummies and oil prices. Our tests for joint significance of the time dummies rejected the null hypothesis of non-significance in all cases. Our results showed a significant effect of royalty rates of 18.75 percent relative to 12.5 percent. However, our results did not show a significant effect of royalty rates of 16.67 percent relative to 12.5 percent, which may be due to a lack of statistical power and that relatively modest differences in royalty rates have only a small impact of bonus bids. The model has limited controls for geological conditions at the lease location. We control for location imperfectly using fixed effects for protraction area-block combinations, and by including the amount of oil production on the date of the lease sale in that protraction area. Our use of these protraction area-block fixed effects does not allow us to control for water depth explicitly. Our analysis used data from 1985 to 2018. Earlier data were available, beginning in 1983, but initial tests of our model suggested the 1983 and 1984 data were not well captured by the model’s specification. BOEM’s system of using competitive bidding for leases began in 1983 and there may have been an initial period during which market operators learned how to bid efficiently under the new system. Our model includes a control for the minimum bid but we did not account for any censoring effects that may have arisen from setting this threshold. Ideally, we would have liked to establish whether there were different responses of bonus bids to the control variables in deep versus shallow water. However, separate models for deep and shallow water leases produced mostly non-significant effects for royalty rates, which suggested that splitting the sample in this way resulted in insufficient statistical power to estimate these effects. In addition to the individual named above, Quindi Franco, Assistant Director; Matthew Tabbert, Analyst-in-Charge; Natalie Block; Tara Congdon; William Gerard; Cindy Gilbert; Michael Kendix; Michael Krafve; and Dan Royer made significant contributions to this report.", "summary": "Production of oil and natural gas from offshore leases is a significant source of federal revenue, totaling almost $90 billion from 2006 through 2018. BOEM is required to seek a fair return from offshore leasing and production activities in federal waters. Companies generally pay (1) bids for leases for the right to develop tracts, (2) rents on leased but undeveloped tracts, and (3) royalties on revenues from the sale of oil and gas produced from leases. BOEM holds auctions to award leases to the company offering the highest bid so long as the bureau determines the bid represents fair market value. GAO was asked to examine issues related to offshore federal oil and gas leasing. This report, among other objectives, (1) describes the effect of oil prices and royalty rates on industry bids for leases and (2) examines the extent to which BOEM's valuation process assures receipt of fair market value. GAO reviewed laws, policies, and regulations; interviewed BOEM officials; and developed an empirical model using BOEM data to analyze the effect of royalty rates and other factors on industry bidding. GAO's analysis indicates that changes in the price of oil and in royalty rates drive changes in the amount companies in the offshore oil and gas industry bid for leases (the amount paid upfront at auction for the right to explore and develop offshore tracts of land). Specifically, between May 1985 and June 2018, peaks in industry bidding coincided with higher oil prices. Additionally, when the Department of the Interior's (Interior) Bureau of Ocean Energy Management (BOEM) offered leases at lower royalty rates, industry bid somewhat higher amounts per acre. For example, certain leases were sold from 1996 through 2000 with no royalties on initial volumes of production, which GAO estimates resulted in BOEM collecting, at most, nearly $2 billion in additional bid revenue. However, bureau estimates indicate these leases resulted in about $18 billion in foregone royalties through 2018. BOEM's valuation process might not fully assure receipt of fair market value, based on GAO's analysis of BOEM data. BOEM develops valuations for offshore tracts it assesses to be economically viable—assessments of their fair market value—and awards leases so long as the bid is greater than or equal to BOEM's valuation. BOEM's valuations for tracts were generally low relative to industry bids because, according to BOEM officials, they conservatively forecast to account for inherent uncertainties in, among other things, the quantity of oil and gas present as well as exploration and development costs. In addition, GAO identified two ways BOEM's valuation process results in lowering its already conservative valuations that might not fully assure receipt of fair market value: Unreasonably high depreciation . BOEM forecast that tracts would lose a median of 23 percent of their value in between sales, leading the bureau to accept lower bids because it determined the tracts might be worth even less in the future. Bureau officials told GAO that lower future values are generally due to BOEM discounting the delayed collection of revenue. However, BOEM's forecasted depreciation increased even though tracts are now available twice as frequently as they were prior to August 2017, reducing the time for discounting. Officials said they were unaware of the high rates and the issue warrants further examination. Enlisting a third party to examine the extent to which the bureau's use of delayed valuations assures the receipt of fair market value, and making changes as appropriate, would help BOEM mitigate risks of continuing to accept bids based on poor information on tracts' future values. Lowered valuations . BOEM officials told GAO that they lower some initial valuations that are “slightly above” industry's bids and which would therefore be rejected per procedures to assure fair market value. Officials said they prefer to accept bids unless there is high certainty that the bids are inadequate. However, GAO identified bias, or statistical anomalies, where BOEM lowered many valuations that were initially higher than industry's bids. Specifically, from March 2000 through June 2018, BOEM rejected 27 bids for tracts that it ultimately valued at up to double industry's bid whereas it accepted 359 bids in which industry's bid was up to double BOEM's valuation. Tracts for rejected bids are, on average, subsequently sold for more than twice the initial rejected amount, suggesting that BOEM could be forgoing hundreds of millions of dollars in bid revenue by accepting bids that are too low. GAO is making four recommendations, including that BOEM (1) enlist an independent third party to examine whether the use of delayed valuations assures the receipt of fair market value and (2) take steps to ensure its bid valuation process is not biased toward lowering valuations. Interior disagreed with the first and partially agreed with the second, disagreeing with GAO's characterization of BOEM's process. GAO maintains the recommendations are valid as discussed in the report.", "document_type": "gao"}
{"report": "There are various statutes, regulations, and agency policies that set forth how DHS components are to make decisions about, or process, the family members they encounter. For the purposes of this report, we use the following key terms and definitions. Family. Federal immigration law does not specifically define the term “family” for the purposes of identifying family relationships that are to be documented at apprehension. DHS components and other federal agencies use the term “family” for individuals with a variety of relationships such as step-, half-, foster, or adoptive family members. Some family relationships, including parent-child, may be claimed upon apprehension, but CBP may determine that the relationship is invalid. For example, CBP may determine that (1) those claiming a familial relationship are not related or (2) their relationship does not meet the relevant component or agency’s operational definition of family. For the purposes of this report, “family” refers generally to noncitizens with claimed familial relationships. Unaccompanied alien child (UAC). The Homeland Security Act of 2002 defines a UAC as a child under the age of 18, who has no lawful immigration status in the United States and who has no parent or legal guardian present in the United States, or if present, no parent or legal guardian available to provide care and physical custody for that child. Family unit. Federal immigration law does not specifically define the term “family unit.” However, CBP and ICE policy and guidance documents generally define a family unit as the inverse of a UAC. In other words, a family unit includes a noncitizen child under the age of 18, who has no lawful immigration status in the United States, accompanied by a noncitizen parent or legal guardian who is able to provide care and physical custody. For the purposes of this report, “family unit” refers to this specific subset of family, as previously defined. Dependent. For a number of immigration benefit applications, including asylum, a spouse or child may be included as dependents on a principal’s application and derive lawful immigration status from the principal applicant if the applicant is granted relief. Similarly, consistent with regulation, USCIS policy is to include a spouse or child in a principal applicant’s positive credible fear determination if they arrived concurrently and the spouse or child wants to be included. In this context, “child” is generally defined in federal immigration law as an unmarried biological or legally adopted child under age 21. For the purposes of this report, we refer to principal applicants’ spouses and unmarried children under age 21 as “dependents.” Family members who are apprehended together may encounter multiple federal agencies and components during their immigration proceedings, including DHS components, HHS’s ORR, and the Department of Justice’s Executive Office for Immigration Review (EOIR), as shown in figure 1. CBP documents the circumstances of noncitizens’ apprehension. After Border Patrol agents or OFO officers apprehend noncitizens, including families, they are to interview each individual, using interpreters if needed, and collect personal information such as their names, countries of nationality, and age. Agents and officers also collect biometric information, such as photographs and fingerprints, from certain individuals. Border Patrol agents and OFO officers use fingerprints to run records checks against federal government databases to determine if individuals have any previous immigration or criminal history. Agents and officers are to enter information about the individuals in the appropriate automated data system as soon as possible, in accordance with CBP policy. Border Patrol agents and OFO officers print copies of the information they enter into their data systems to create a paper file, known as an “A-file,” for each noncitizen they apprehend. One of the key required DHS forms in the A-file is Form I-213, Record of Deportable/ Inadmissible Alien. Among other things, this form captures biographic information and includes a narrative section for agents and officers to document the circumstances of the apprehension. According to CBP policy, Border Patrol agents and OFO officers are to determine the validity of family relationships among individuals they apprehend. To do so, for example, they are to review any available documentation, such as birth certificates; monitor interactions between adults and children; and use their law enforcement training, such as interview skills, to help assess the validity of family relationships. After making decisions about the validity of familial relationships, agents and officers are to decide whether and how family members will be detained together while in CBP custody. According to CBP’s 2015 National Standards on Transport, Escort, Detention, and Search, CBP “will maintain family unity to the greatest extent operationally feasible, absent a legal requirement or articulable safety or security concern that requires separation.” According to CBP officials, if individuals are determined to be ineligible for admission into the United States, agents and officers must decide how to process them, which may include placing them into full or expedited immigration removal proceedings, consistent with the Immigration and Nationality Act. In full removal proceedings, individuals have the opportunity to present evidence to an immigration judge to challenge their removal from the United States and apply for various forms of relief or protection, including asylum. In expedited removal proceedings, the government can order individuals removed from the United States without further hearings before an immigration judge unless they indicate an intention to apply for asylum, a fear of persecution or torture, or a fear of return to their home country. Most arriving noncitizens are eligible to be placed into expedited removal proceedings, with certain exceptions, according to Border Patrol and OFO officials. Individuals placed in expedited removal proceedings and who express a fear of persecution or torture are generally subject to mandatory detention under the Immigration and Nationality Act pending a final determination of credible fear of persecution. Regarding family units, in particular, Border Patrol and OFO officials stated that Border Patrol agents and OFO officers typically determine whether ICE has available detention space in one of its family residential centers before placing family units into expedited removal proceedings. ICE and ORR detain or shelter noncitizens and share information about UAC. ICE, among other things, is responsible for detaining and removing noncitizens, including families, who are in the United States in violation of U.S. immigration law and subject to removal. ICE officers are to determine whether to detain, release, or remove such individuals based on a variety of factors, including statutory requirements, medical considerations, and the availability of detention space. ICE detains adults over age 18 in detention facilities that are segregated by gender. For family units placed in expedited removal, ICE officers have the authority to accept or deny a CBP referral for detention in one of ICE’s family residential centers—a decision that ICE officials stated is largely dependent upon available detention space. As of October 2019, ICE operated three family residential centers, with different population characteristics in each center: South Texas Family Residential Center (Dilley, TX), which has a maximum capacity of 2,400 beds for female adults and their male or female children. Karnes County Residential Center (Karnes, TX), which has a maximum capacity of 830 beds for male adults and their male children. Berks County Residential Center (Leesport, PA), which has a maximum capacity of 96 beds for male or female adults and their male or female children. When an individual is transferred from CBP to ICE custody, ICE officers are to enter information about that person in ICE’s data system. The paper A-file is also transferred from CBP to ICE and, according to ICE officials, ICE officers generally review the A-file upon transfer to ensure that it is sufficiently complete. ICE’s data system automatically pulls some information, such as basic biographic information, from CBP’s data systems. ICE officers are to enter new information into ICE’s data system, such as the location(s) where officers detained or released the individual and the documents officers served to the individual, among other things. If CBP or ICE officials determine that a child or children under the age of 18 and without lawful status in the United States arrived in the country without an accompanying parent or legal guardian, the child is classified as a UAC and is to be transferred to ORR custody. Additionally, if DHS determines that a child should be separated from their accompanying parent or parents, DHS then considers the child to be a UAC and transfers him or her to the custody of ORR. ORR provides interim care for UAC at its shelters and identifies qualified sponsors in the United States to take custody of the child while the child waits for his or her full immigration proceedings. CBP’s data systems can share some information about UAC automatically with ORR, including biographic information such as name, date of birth, and alien number; and information about related UAC, such as siblings, who were apprehended together. To assess the suitability of potential sponsors, ORR staff collects information from potential sponsors, which may include parents or other family members, to establish and identify their relationship to the child. For example, ORR screening of potential sponsors includes various background checks. According to ORR officials, they are required to attempt to contact a child’s parent, regardless of the parent’s location, any time they place a child with a sponsor. According to ORR officials, ORR is also responsible for coordinating reunification of separated family units if DHS and HHS determine it is appropriate, or if the adult is later determined by a federal court to be a class member in the ongoing Ms. L v. ICE litigation, related to family separations. ORR officials said that they rely on ICE to gather additional information, such as detailed information from an adult or UAC’s Form I-213, when that information is not available or shared at the time a UAC is transferred to ORR custody. USCIS and EOIR consider claims of relief from removal from the United States. USCIS screens individuals in expedited removal—most of whom are in ICE detention facilities—for credible fear if they indicate an intention to apply for asylum, a fear of persecution or torture, or a fear of returning to their home country. In this screening, an asylum officer is to review certain documentation from CBP and ICE; perform background checks using various automated databases; interview the individual to obtain more details on his or her fear claim, overall credibility, and the nature of any relationships with family members with whom he or she was apprehended; and determine whether there are any dependents who could potentially be included in the individual’s fear determination. The regulation governing the credible fear process allows dependents— specifically a spouse or unmarried child under the age of 21—of a principal applicant to be included in the applicant’s credible fear determination, if the dependent (1) arrived in the United States concurrently with the principal applicant and (2) desires to be included in the principal applicant’s determination. For cases in which USCIS concludes the screening with a positive determination, USCIS is to issue a Notice to Appear, thereby placing the individual into full removal proceedings before an immigration judge. Consistent with regulation, if a principal applicant receives a positive credible fear determination, it is USCIS policy that his or her dependents may be included in the positive determination—and be placed into full removal proceedings—if the dependent arrived concurrently with the principal applicant and wants to be included in the principal’s credible fear determination. For cases in which the asylum officer concludes the screening with a negative determination, USCIS is to refer the individual to ICE for removal from the United States, unless he or she requests a review of the negative determination by an immigration judge. Those in full removal proceedings who apply for asylum before an immigration judge may include a spouse and/or unmarried children under age 21 in their asylum application. If the judge grants asylum to the principal applicant, his or her dependents may also be granted asylum. In 2010, Public Law 111-139 included a provision for us to identify and report annually on programs, agencies, offices, and initiatives—either within departments or government-wide—with duplicative goals and activities. In our annual reports to Congress from 2011 through 2019 in fulfillment of this provision, we described areas in which we found evidence of fragmentation, overlap, and duplication among federal programs, including those managed by DHS. To supplement these reports, we developed a guide to identify options to reduce or better manage the negative effects of fragmentation, overlap, and duplication, and evaluate the potential trade-offs and unintended consequences of these options. In this report, we use the following definitions: Fragmentation occurs when more than one agency (or more than one organization within an agency) is involved in the same broad area of national interest and opportunities exist to improve service delivery. Overlap occurs when multiple programs have similar goals, engage in similar activities or strategies to achieve those goals, or target similar beneficiaries. Overlap may result from statutory or other limitations beyond the agency’s control. Duplication occurs when two or more agencies or programs are engaged in the same activities or provide the same services to the same beneficiaries. DHS has not identified the information about family members apprehended together that its components collectively need or communicated that information to relevant components across the department. Based on our analysis of agency documentation and interviews with agency officials, we determined that CBP, USCIS, and ICE require different information about family members who are apprehended together and each component collects such information that is relevant to its respective operational needs. Specifically, CBP, as the apprehending agency at the border, needs information about family members apprehended together for the purposes of, among other things, informing how family members are to be detained while in CBP custody. In addition, USCIS needs information on family members to identify individuals who may be eligible dependents for credible fear screening purposes. ICE needs information on family members to assist USCIS in identifying eligible dependents and to assist ORR in identifying individuals who may be eligible sponsors for UAC based on their family relationship. While each DHS component has identified the information needed to meet its own specific requirements regarding family members, DHS has not identified information needs regarding family members across its components, resulting in a lack of shared understanding of all components’ needs and fragmented information collection. For example, the information that CBP collects about family members is not aligned with the information that other components, or agencies that might subsequently encounter these family members, need to identify eligible dependents for credible fear purposes or suitable sponsors for UAC. CBP. Regarding family units, CBP (including Border Patrol and OFO) generally collects information about members of family units—including parents and their children under age 18—who are apprehended together. CBP components assign a unique identifier to a family unit that allows members’ records to be linked. CBP components use the information they collect about members of family units to inform how they are to be detained while in CBP custody and to determine how their immigration proceedings are to proceed. In addition, CBP may collect information about certain other relationships among family members apprehended together because CBP and its components—Border Patrol and OFO— have policies that allow certain family members who are not defined as family units to be detained together while in CBP custody. For example, with regard to Border Patrol, family groups composed exclusively of children under the age of 18—such as siblings or a parent under age 18 and his or her child—may be held together in CBP custody, according to Border Patrol guidance. As another example, family members who Border Patrol or OFO agents or officers determine need to be detained together, such as a parent and their child over age 18 with significant medical needs, may also be held together in CBP custody. Border Patrol and OFO have developed processes to collect information about the relationships between family members who are to be detained together, including Border Patrol assigning them a “family group” number in Border Patrol’s data system and OFO documenting the relationship between a juvenile accompanied by a non-parent family member, to facilitate their detention together while in CBP custody. However, CBP generally does not collect information about certain family members— such as spouses or children age 18 to 21—because CBP does not have a need to collect such information if, for example, those family members will not be detained together. Other components may require this information, as described below. USCIS. USCIS requires information about family members for credible fear screening and asylum eligibility purposes, consistent with immigration law. Based on our analysis of agency documentation and interviews with agency officials, this differs from the information that CBP collects about family members for its operational purposes. Specifically, spouses and unmarried children under age 21 may be included in their spouse or parent’s credible fear screening if the family members arrived in the United States together. At the credible fear screening interview, USCIS is to document the name, country of nationality, and alien number, if known, for the spouse and name, date of birth, country of nationality, and alien number, if known, for the child or children of all individuals being screened for credible fear. In addition, consistent with regulation, it is USCIS policy to include any dependents who arrived concurrently with the principal applicant, such as a spouse or unmarried child under the age 21, on a principal applicant’s positive credible fear determination if the dependent wants to be included. This results in both the principal applicant and any dependents being issued a Notice to Appear for full removal proceedings. In addition, USCIS’s training on screening families for credible fear states that families do not need to be detained together to be included in a positive determination. In other words, a principal applicant in a credible fear screening may be detained at one of ICE’s family residential centers and his or her dependent spouse or child between the ages of 18 and 21 may be detained separately at an adult detention facility. Specifically, since ICE’s adult detention facilities are segregated by gender, a female might be detained in a separate adult detention facility from her male spouse. If a parent or spouse receives a positive credible fear screening, his or her dependent’s case could be linked and both family members could receive a notice to appear in immigration court for full immigration proceedings. According to USCIS headquarters officials, USCIS relies on information obtained during the credible fear screening interview to identify family members because the information that USCIS receives from CBP about the circumstances of an apprehension generally does not include details about spouses or children age 18-21. Further, USCIS officials said that family members over age 18 who are apprehended together may be detained in separate ICE facilities and referred to USCIS for fear screenings at different times, which makes it difficult for USCIS and ICE to locate such family members. In addition, USCIS officials said that ICE is often not aware of the family relationship between family members if they are detained separately. Specifically, although ICE is responsible for detaining noncitizens who express fear of returning to their home country before they are screened for such fear by USCIS, ICE officials responsible for detention management told us that (1) they are often not aware of family relationships between family members detained separately and (2) they treat anyone over age 18 as an adult and do not consider that a child age 18 to 21 or a spouse could be a dependent on a credible fear claim. ICE. In addition to assisting USCIS in identifying eligible dependents for credible fear screening purposes, ICE assists ORR in identifying qualified sponsors for UAC. According to ORR, qualified sponsors include, among others, and in order of preference: parent or legal guardian; an immediate relative who previously served as a primary caretaker of the child; an immediate relative who did not previously serve as a primary caretaker of the child; and other distant relatives or unrelated adults with a pre- established relationship with the child. When a child apprehended by CBP is classified as a UAC and transferred to ORR’s custody, CBP is to provide ORR with information about family members with whom the UAC was apprehended. However, officials from ORR told us that they sometimes receive UAC referrals—either through an automated system or via email—from CBP with no information about family members with whom the child was apprehended, but subsequently learn from the child that the child was apprehended with a family member. According to ICE and ORR officials, when ORR has questions about potential sponsors for a child in their care, they coordinate with officials from ICE’s juvenile and family management program to obtain additional information about the circumstances of the child’s apprehension or family members with whom a child was traveling. ICE officials stated that CBP generally provides the information on family members traveling with UAC to ORR, if CBP is aware of such information; however, according to ICE officials, children may not share all relevant details about their family members with CBP agents and officers when they are apprehended, and they may be more comfortable sharing such details once they are in ORR custody. ICE officials said that they can search their data systems, including law enforcement records, for information about the circumstances of a child’s apprehension, which ORR uses when evaluating potential sponsors for the child. ORR cannot access such law enforcement records. For example, ICE can use Border Patrol’s “event” unique identifier to search for information about adults who Border Patrol apprehended at the same time as a child, and can use this information to attempt to identify if there are family relationships between an adult and unaccompanied child. ORR officials said that the lack of family member information they receive from CBP or ICE, or delays in receiving such information, can delay the release of a child from a shelter to a qualified sponsor. Our previous work on collaboration has shown that establishing compatible policies, procedures, and other means to operate across agency boundaries can enhance and sustain collaborative efforts and help ensure that fragmented efforts are being managed effectively. Further, leading practices of high-performing organizations include fostering collaboration both within and across organizational boundaries to achieve results. Moreover, federal programs contributing to the same or similar results should collaborate to ensure that program efforts are mutually reinforcing, and should clarify roles and responsibilities for their joint and individual efforts. Our interviews and analysis indicate that the information each DHS component collects about family members meets its own information needs, but does not consider the information needs of other components that might encounter those family members. Officials from CBP and ICE confirmed that they collect information about family members to meet their own operational needs. For example, CBP may not collect information about spouses apprehended together because CBP does not need such information for its operational purposes. Further, Border Patrol and OFO officials we spoke with told us that CBP components collect all relevant information needed for their operational purposes but that CBP is not responsible for collecting information that USCIS needs to identify eligible dependents, including spouses and children age 18 to 21. Without identifying and communicating department- wide information needs with respect to family members who have been apprehended together, DHS does not have reasonable assurance that its components are identifying all individuals who may be eligible for relief from removal from the United States based on their family relationships or that ICE can provide ORR with the information it needs to help evaluate the suitability of potential sponsors for UAC. CBP’s Border Patrol and OFO document the circumstances under which family members are apprehended at or between U.S. ports of entry and, as a result, are in the best position to collect information about their family relationships. However, our analysis of DHS documentation and interviews with officials indicate that CBP does not routinely collect all of the information about family members that is needed to (1) identify eligible dependents as part of the credible fear screening process and (2) evaluate family members for sponsorship placement for UAC. Further, Border Patrol agents and OFO officers do not routinely document that information on the record of apprehension. CBP’s Border Patrol agents and OFO officers are to document the circumstances of an apprehension using the required Form I-213, Record of Deportable/ Inadmissible Alien (record of apprehension). The record of apprehension is a key form in the paper A-file and is the official record of an apprehension. Among other things, the record of apprehension captures biographic information about the apprehended individual and includes a narrative section for agents and officers to document details about the circumstances of the apprehension. Border Patrol and OFO’s guidance indicates that the record of apprehension may be used as evidence in immigration or criminal courts and that omissions or mistakes on the form may have negative consequences. According to Border Patrol officials, the information captured on the record of apprehension varies and there is no requirement that it include information about family members apprehended together. However, USCIS, ICE, and ORR officials told us that they rely on the record of apprehension for such family information. As discussed below, since CBP does not routinely collect sufficient information about family members apprehended together or document such information on the record of apprehension, there are gaps in the information available to other DHS components about family members apprehended together. Information to identify eligible dependents as part of the credible fear screening process. CBP does not routinely collect sufficient information about relationships between family members apprehended together for USCIS and ICE to later identify if such individuals are eligible dependents as part of the credible fear screening process. As previously discussed, consistent with regulation, it is USCIS policy to include any dependents on a principal applicant’s positive credible fear determination if the dependents arrived concurrently with the principal applicant and want to be included on the principal applicant’s credible fear determination. However, CBP does not routinely collect information about relationships between all parents, children, and spouses apprehended together at the time of their apprehension or share that information with USCIS. Specifically, CBP does not require its agents and officers to collect information about or to document the relationships between certain family members apprehended together, such as spouses and children age 18 to 21. As a result, USCIS’s ability to identify eligible dependents is limited. Asylum officers are to ask all individuals they screen for credible fear if they arrived in the United States with other family members. Asylum officers told us that, when CBP does not collect information about potentially eligible dependents—especially spouses and children age 18 to 21—they face challenges in identifying and locating such dependents. Asylum officers also told us that when CBP agents and officers do not collect and document information about relationships at the time family members are apprehended, asylum officers must rely on the information that the applicant provides in the credible fear screening interview, rather than using the screening interview to corroborate family information already collected by CBP at the time of the apprehension. In addition, a USCIS official told us that it can be beneficial for USCIS to have information about relationships between all parents, children, and spouses who are apprehended together for other processes—such as if one family member placed into expedited removal proceedings is subject to the reasonable fear process—because information in one family member’s claim can impact other family members’ ability to meet the threshold for a positive fear determination. Border Patrol, OFO, and ICE officials stated that, due to the volume of apprehensions at the southwest border, Border Patrol and OFO collect information to meet CBP’s operational needs, but that the level of detail documented on the record of apprehension may vary. Specifically, according to one ICE official responsible for detention at a family residential center and an ICE headquarters official, information about family relationships, including that of spouses, is not consistently documented in the information ICE receives from CBP and shares with USCIS. Since USCIS does not receive consistent information about family members from CBP, USCIS officers must rely on the credible fear screening interview to identify potential eligible dependents. When asylum officers identify eligible dependents during the credible fear screening interview, officers attempt to locate these dependents to link them to their parent’s or spouse’s case. However, according to USCIS and ICE officials, it can be difficult to locate such dependents if they are not detained together. Specifically, because CBP officers and agents do not routinely collect information about the relationships between spouses or parents and children age 18 to 21 or document such information on the record of apprehension at the time they are apprehended, USCIS and ICE do not have the information about those family relationships that they need to locate and identify eligible dependents. Additionally, individuals may not know certain information—such as the alien number of their spouse or child—that would help USCIS or ICE locate them. ICE officials told us that they assist USCIS officials in locating spouses and children age 18 to 21 for the purposes of making them dependents on a spouse or parent’s credible fear application on a case by case basis, but that tracking down such dependents can be difficult. Further, ICE and USCIS officials told us that because they do not have sufficient information about eligible dependents, it is possible that ICE could remove an eligible dependent from the United States while their spouse or parents’ credible fear claim was pending, or after their spouse or parent received a positive credible fear determination. Information to assist ORR in making placement decisions for children transferred to its custody. CBP does not collect all information about family members at the time of apprehension that is needed to assist ORR in making placement decisions for UAC transferred to its custody, according to ICE and ORR headquarters officials. When CBP refers a child for placement at an ORR shelter, CBP is to share some information with ORR, including the name, age, and alien number of the child, as well as information about any family members with whom the child was apprehended. ORR officials stated they use this information to assist in making placement decisions for the child. However, ORR officials stated that the information CBP provides when the child is referred may not include information about family members with whom the child was apprehended. Further, according to ORR officials, they do not typically receive the child’s Form I-213—which documents the circumstances of the child’s apprehension—from CBP. ORR officials said that they sometimes receive UAC referrals from CBP without any information about other family members and they may subsequently learn from the child that he or she was apprehended with a family member. Additionally, if ORR officials have questions about a child in their custody, officials from ICE’s Juvenile and Family Residential Management Unit told us that they are the liaison between DHS and ORR. ICE officials told us that the level of detail that CBP agents and officers collect for UAC apprehended with family members varies. According to an ICE official in ICE’s Juvenile and Family Residential Management Unit, the more information that CBP agents and officers provide about the circumstances of a child’s apprehension, the better equipped ICE is to answer ORR’s questions about familial relationships and potential suitable sponsors for a particular child, as well as to investigate potentially fraudulent familial relationships or circumstances in which an adult apprehended with a child might not be a suitable sponsor. According to ORR officials, they also rely on ICE to provide information about the suitability of reunifying a parent and child where ORR determines that a UAC was separated from their parent or legal guardian with whom they arrived. As we reported in February 2020, DHS and HHS have developed interagency agreements for the transfer and placement of UAC between the two departments; however, information sharing gaps remain. Specifically, ORR headquarters officials stated that they have experienced delays in releasing a child to a sponsor due to missing information about a parent or the inability to notify a parent in ICE detention about sponsorship decisions. We recommended that DHS and HHS should collaborate to address information sharing gaps to ensure that ORR receives information needed to make decisions for UAC, including those apprehended with an adult. DHS and HHS concurred with the recommendations. Border Patrol and OFO developed their own requirements for what information they collect, if any, about family members apprehended together based on their operational needs. However, because CBP agents and officers collect information and document the circumstances of apprehensions when families first arrive in the United States, they are best positioned to identify those family members who were apprehended together and the relationships among them. Additionally, the information that CBP agents and officers collect may impact how family members are subsequently identified or processed by other federal agencies. CBP officials said that their components collect limited information about family members apprehended together because they do not have an operational need for such information and because collecting it is time intensive in an environment where agents and officers are managing a large volume of apprehensions. However, because CBP does not routinely collect sufficient information about family relationships at the time of apprehension, or document that information on the record of apprehension, DHS components do not have information necessary to identify potentially eligible dependents for credible fear purposes and ICE does not have sufficient information to assist ORR in making suitable sponsorship determinations. Further, while we recognize that the collection of additional information on family members can be time intensive for CBP, as the apprehending agency, CBP is best positioned to collect and document information on family members apprehended together. In addition, ICE, USCIS, and ORR may expend resources themselves trying to identify family relationships for their own operational purposes. As previously noted, our prior work on collaboration has shown that establishing compatible policies, procedures, and other means to operate across agency boundaries can enhance and sustain collaborative efforts and help ensure that fragmented efforts are being managed effectively. In October 2019, CBP officials acknowledged that it could be helpful to consider other agencies’ information needs when collecting information about apprehended families. Collecting information about the relationships between family members apprehended together and documenting that information on the Form I-213 could help address fragmentation among DHS components and improve the information available to other agencies, such as ORR, to ensure that relevant information is available to support decisions on individuals’ administrative immigration or other proceedings. DHS does not have a mechanism to link the records of family members apprehended together across its components. Specifically, CBP’s data systems can assign unique family identifiers to link records of certain family members together, as appropriate, upon apprehension. CBP uses these unique identifiers to facilitate the detention of family members together in CBP custody. They also provide a mechanism for CBP to search for and identify family members that share a unique identifier. However, those identifiers are not readily accessible and usable to USCIS and ICE, which also have operational needs to identify and review records of family members apprehended together. Further, USCIS and ICE’s data systems do not assign unique family identifiers. Because DHS’s data systems do not have shared family identifiers to link family members, DHS components may not have access to all the information about family members they need to make effective and efficient operational decisions. CBP’s data systems assign unique family identifiers. Regarding family units, CBP components have guidance on how Border Patrol agents and OFO officers are to enter information on family units in their respective data systems. CBP’s data systems assign a unique identifier to each family unit and link their records, and agents and officers are to collect the following information about family units: Border Patrol guidance indicates that agents are to process adult parents and their children under age 18 who are apprehended together as members of a family unit, and the data system assigns each family unit a unique family unit identifier. This identifier links the records of the family unit members together, and allows agents to search for family unit members using that number. OFO is deploying a new data system and, as of October 2019, OFO officials said that they planned for the new system to be deployed along the southwest border on an ongoing basis as conditions allow. OFO documentation on the new system indicates, and OFO officials told us, that the new system will allow OFO officers to assign a unique family identifier to members of a family unit and will allow officers to document the familial relationship between members of family units. Border Patrol’s data system can also assign a unique family group identifier to family members whom agents determine should be detained together for Border Patrol’s operational purposes. According to Border Patrol guidance and officials, family group numbers may be used to link family members during Border Patrol detention. Further, these numbers may be documented on the record of apprehension and may be shared with ORR to, for example, link the records of two related UAC when Border Patrol transfers them to ORR custody. However, Border Patrol agents have discretion to determine whether family members apprehended together are to be assigned a unique family group identifier, according to agency documentation and our interviews with agency officials. CBP components do not have a mechanism to share their unique family unit or family group identifiers with ICE or USCIS in a way that is readily accessible and usable. CBP’s data systems share limited information on apprehended family members with ICE’s data system. When ICE receives custody of a family unit from CBP, ICE officers create a record for each family member in ICE’s data system. ICE’s data system pulls some information about each family member automatically from CBP’s data systems. For example, ICE officers can find basic biographic information about individual family members apprehended by Border Patrol by searching using the individual’s alien number, a DHS unique identifier assigned to individuals. In addition, ICE identified a need for more information to help identify family units in ICE custody and developed a mechanism to receive that information from CBP. As of August 2018, ICE’s data system displays a family unit “banner” in the data records of those noncitizens CBP processed as a member of a family unit. This banner flags for ICE officers that the individual was identified by CBP as a family unit member, and ICE’s data system displays the Border Patrol or OFO unique family unit identifier. ICE’s family unit banner was a positive development and allows ICE to identify individuals in its custody that CBP processed as a member of a family unit. However, the family unit banner does not provide ICE all the information it needs to identify family members, according to ICE officials. Specifically, ICE can see that a particular individual was processed by CBP as a member of a family unit, but ICE cannot use the system to identify other members of that person’s family because ICE’s data system does not link or display alien numbers for individuals who share a family unit identifier. According to Border Patrol officials, because ICE and Border Patrol’s data systems are both housed within ICE’s Enforcement Integrated Database repository, ICE should have access to the family unit information collected by Border Patrol. However, ICE officials stated that ICE cannot use the information on family units that CBP’s data system shares with ICE’s data system to, for example, search for family unit members using Border Patrol’s unique family unit identifier. According to ICE officials, ICE officers must use a time consuming and manual process to research potential family associations or identify family unit members using the information CBP provides to ICE. Further, ICE’s data system cannot link the records of family unit members in its custody, although these family unit members are generally detained together in one of ICE’s family residential centers. According to ICE guidance and ICE officials, ICE’s data system only displays family unit information as entered by CBP and such information is not available for individuals identified as members of a family unit after entering ICE custody. As of November 2019, ICE headquarters officials stated that they are working with the ICE data unit to create a new module that would enhance ICE’s ability to link and track family units in its data system, including expanding ICE’s use of existing family unit information as entered by CBP. According to ICE officials, ICE has established a project team for this effort and hopes to deploy the updates in the fourth quarter of fiscal year 2020. However, ICE did not provide any documentation on this effort, such as a project plan with time frames for deploying these system updates, to verify these plans. Although ICE has taken steps to identify individuals in its custody that CBP documented as members of a family unit, ICE does not have a mechanism to link the records of family unit members together. In addition, ICE does not have a mechanism, such as a unique family group identifier, to link the records of other family members apprehended together. ICE needs information about these other family members to (1) assist USCIS in identifying eligible dependents for credible fear screening purposes and (2) assist ORR in identifying family members with whom a UAC was apprehended and assessing whether they might be suitable sponsors. According to ICE officials, ICE uses a manual process to identify family members apprehended together. Without a mechanism, such as a shared unique identifier, that ICE can use to access information CBP gathered about family members apprehended together, ICE cannot ensure that it has the information it needs to identify eligible dependents, or to answer ORR’s questions about UAC with the best available information. As of November 2019, ICE is enhancing its data system’s ability to link and track family unit members. However, it is too early to know if ICE’s planned system enhancements will include a mechanism that will allow ICE officers to identify family members apprehended together. CBP and ICE’s data systems do not share information on apprehended and detained family members with USCIS’s data system. USCIS’s data system does not receive information about family members (parents, spouses, and children) from CBP or ICE in an automated manner. According to USCIS officials, because CBP’s and ICE’s data systems do not have a mechanism—such as a linked unique family identifier—to share information about potential dependents with USCIS’s data system automatically, the credible fear interview may be the only way for USCIS to determine that an individual being screened for credible fear was apprehended with other family members, especially if any members of the family are detained separately. For family members detained separately, according to USCIS officials, USCIS asylum officers attempt to locate spouses and children age 18 to 21 when they are made aware of such family relationships as part of the credible fear screening process. However, due to limitations in data sharing between CBP, ICE, and USCIS, USCIS may not be able to locate such spouses and children age 18 to 21 in some circumstances. In particular, USCIS officials told us that, if the spouse or child did not make his or her own claim of credible fear while in CBP or ICE custody, USCIS asylum officers use a time consuming and manual process to attempt to identify family members apprehended together, using data that ICE makes available to USCIS. ICE officials told us that they assist USCIS officials in locating spouses and children age 18 to 21 for the purposes of making them dependents on a spouse or parent’s credible fear application on a case by case basis, but that tracking down such dependents can be difficult. USCIS has developed a mechanism to link family members in its own data system, but this linkage is for USCIS’s purposes and is unrelated to the unique family unit or family group identifier assigned by CBP components at the time family members are apprehended or to the “family unit” banner that ICE’s data system displays for certain family units. Additionally, USCIS’s data system does not assign a unique identifier to family members whose cases are linked for credible fear screening purposes and USCIS does not have access to CBP’s family identifiers. A shared family member unique identifier could allow USCIS, CBP, and ICE access to more complete information about family members who were apprehended together and could give USCIS and ICE, in particular, greater assurance that they have complete information about family members apprehended together that they require for their operational needs. Our previous work on collaboration has shown that identifying and addressing needs by leveraging resources, such as information technology resources, can enhance and sustain collaborative efforts, and help ensure that fragmented efforts are being managed effectively. Border Patrol, OFO, ICE, and USCIS data systems were developed to meet each component’s operational needs, leading to (1) data system integration limitations and (2) variation in the type of information that each component collects or requires. Components have implemented ways to share some information across their data systems—such as ICE’s “family unit” banner for members of family units processed by Border Patrol and USCIS’s ability to access some information in ICE’s data system to attempt to identify eligible dependents of individuals who have received a positive credible fear determination—but such information sharing is limited, and the components do not have a unique shared identifier to identify family members apprehended together. Moreover, DHS and its components have not considered options to share information on family members across components in an automated manner, as each component has been focused on its own operational needs for such information. Evaluating options for developing a shared unique family member identifier across CBP, ICE, and USCIS that would allow each component access to certain information about family members apprehended together would help bridge the information gaps about family relationships between components caused by DHS’s fragmented data systems. Further, it would give DHS greater assurance that its components can identify family members who were apprehended together, even after they leave CBP custody. It would also mitigate the risk that, lacking such information, DHS could remove individuals from the United States who may have been eligible for relief based on their family relationship. Although CBP’s apprehensions of family members have increased significantly in recent years, DHS has not taken steps to better manage fragmentation, including identifying, collecting, documenting, and sharing the information its components collectively need about family members apprehended together. The information each DHS component collects about family members apprehended together meets its own information needs. However, it does not consider the information needs of other components that might encounter those family members. Border Patrol and OFO officials we spoke with told us that CBP components collect all relevant information needed for their operational purposes but that CBP is not responsible for collecting information that USCIS needs to identify eligible dependents, including spouses and children age 18 to 21. Without identifying information needs with respect to family members who have been apprehended together—and without communicating that information department-wide to relevant components—DHS does not have reasonable assurance that its components are identifying all individuals who may be eligible for relief from removal from the United States based on their family relationships. In addition, as the component that apprehends individuals arriving at the border, CBP is best positioned to document the circumstances of an apprehension, including by collecting and documenting information about family members who arrive in the United States together. Collecting information about the relationships between family members apprehended together and documenting that information on the Form I- 213, the record of apprehension, would improve management of fragmentation among DHS components and improve the information available to other agencies, such as ORR, to ensure that relevant information is available to support decisions on individuals’ administrative immigration or other proceedings. Lastly, DHS components’ data systems were developed to meet each component’s operational needs, leading to data system integration limitations and variation in the type of information that each component collects or requires. Components have implemented ways to share some information across their data systems, but such information sharing is limited. Evaluating options for developing a shared unique family member identifier across CBP, ICE, and USCIS that would allow each component access to certain information about family members apprehended together would help bridge the information gaps about family relationships between components caused by DHS’s fragmented data systems. We are making the following four recommendations to DHS: The Secretary of Homeland Security should identify the information about family members apprehended together that its components collectively need to process those family members and communicate that information to its components. (Recommendation 1) The Secretary of Homeland Security should ensure that, at the time of apprehension, CBP collects the information that DHS components collectively need to process family members apprehended together. (Recommendation 2) The Secretary of Homeland Security should ensure that CBP documents the information that DHS components collectively need to process family members apprehended together on the Form I-213. (Recommendation 3) The Secretary of Homeland Security should evaluate options for developing a unique identifier shared across DHS components’ data systems to link family members apprehended together. (Recommendation 4) We provided a draft of this report to DHS and HHS for their review and comment. DHS provided formal, written comments, which are reproduced in full in appendix I. DHS and HHS also provided technical comments on our draft report, which we incorporated, as appropriate. DHS concurred with our recommendations and described actions planned or underway to address them. For example, in response to our recommendation that DHS identify the information its components need about family members apprehended together, DHS stated that the DHS Office of Immigration Statistics within the DHS Office of Strategy, Policy, and Plans will work with CBP, ICE, USCIS, and interagency partners to establish a comprehensive set of information to collect on family members apprehended at the border. Further, in response to our recommendations that DHS collect and document the information its components collectively need about family members apprehended at the border, DHS stated that after DHS identifies the information about families apprehended together that its components collectively need, CBP will work with DHS’s policy office to ensure all required information is collected at the time of apprehension on the Form I-213. In addition, Border Patrol and OFO will issue guidance to their agents and officers to ensure they document the information about family members apprehended together that DHS components collectively need. Regarding our recommendation that DHS evaluate options for developing a unique identifier shared across DHS components’ data systems to link family members apprehended together, DHS stated that its policy office will work with CBP, ICE, and USCIS to develop a unique shared identifier linking family members apprehended together. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Acting Secretary of Homeland Security, and the Secretary of Health and Human Services. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or gamblerr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In addition to the contact named above, Kathryn Bernet (Assistant Director), Mary Pitts (Analyst in Charge), Carissa Bryant, Miranda Cohen, Michael Harmond, Stephanie Heiken, Leslie Sarapu, Jessica Walker, Dominick Dale, Eric Hauswirth, Jan Montgomery, Heidi Nielson, and Michele Fejfar made key contributions to this work.", "summary": "In fiscal year 2019, CBP reported apprehending more than 527,000 noncitizen family unit members (children under 18 and their parents or legal guardians) at or between U.S. ports of entry along the southwest border—a 227 percent increase over fiscal year 2018. GAO was asked to review issues related to families—including family units—arriving at the southwest border. This report examines the extent to which DHS has identified, collected, documented, and shared information its components need to inform processes for family members apprehended at the border. GAO analyzed DHS documents; interviewed DHS officials; and visited DHS locations in Arizona, California and Texas, where CBP apprehensions of family units increased in 2017. GAO compared the information gathered with leading practices in collaboration to evaluate DHS components' processes for apprehended family members. The Department of Homeland Security's (DHS) processes to identify, collect, document, and share information about family members apprehended at the southwest border are fragmented. DHS's U.S. Customs and Border Protection (CBP) apprehends family members and determines how information about each individual—and his or her relationship to other family members—will be collected and documented. Other DHS components, such as U.S. Immigration and Customs Enforcement (ICE), use information collected at the time of apprehension to inform how those who are members of a family, including children, will proceed through immigration proceedings. Family members apprehended at the border and placed into expedited removal that indicate an intention to apply for asylum, or a fear of persecution or torture or fear of return to their home country, are referred to DHS's U.S. Citizenship and Immigration Services (USCIS) for a credible fear screening. However, DHS has not identified the information its components collectively need about apprehended family members. Each DHS component collects information to meet its own operational needs, and does not consider the information needs of other components. For example, the information about family members that CBP needs differs from the information about family members that USCIS needs. CBP officials told us they would not generally identify spouses and children age 18 to 21 apprehended with a parent as family members, although USCIS's definition of a dependent for credible fear screening purposes includes spouses and unmarried children under age 21. CBP collects information about certain family members for its operational purposes, but does not collect and document information at the time of apprehension that other DHS components may later need. Specifically, CBP collects and documents information about parents and their children under age 18 who are apprehended together. However, consistent with regulation, USCIS policy is to include any dependents who arrived concurrently with the principal applicant, such as a spouse or unmarried child under age 21, on a principal applicant's positive credible fear determination if the dependent wants to be included. According to USCIS and ICE officials, it can be difficult to identify spouses and children age 18 to 21 because CBP does not regularly document such family relationships. DHS does not have a mechanism to link the records of family members apprehended together across its components that need this information. As a result, DHS components may not have access to all the information about family members they need to make effective operational decisions. Because DHS has not identified the information all of its components collectively need to process family members apprehended at the border, collected and documented that information at the time of apprehension, and evaluated options to share that information across components, consistent with leading practices in collaboration, DHS risks removing individuals from the United States who may have been eligible for relief or protection based on their family relationship. GAO is making four recommendations to DHS, including that DHS identify the information its components collectively need to process family members apprehended together, collect and document that information at the time of apprehension, and evaluate options for developing a unique identifier shared across DHS's data systems to link family members apprehended together. DHS concurred with the recommendations.", "document_type": "gao"}
{"report": "Intergenerational economic mobility describes how people’s incomes in adulthood compare with their parents’ incomes in the past or at similar ages. Several measures are used to assess the degree of economic mobility, but fundamentally, a society exhibits more economic mobility when incomes are less related to parents’ income. By contrast, where economic mobility is lacking, individuals are more likely to remain at the economic position of their upbringing. Economists traditionally measure economic mobility in three ways: Absolute economic mobility - whether people make more money (in inflation-adjusted dollars) than their parents did at a similar age (see fig. 1). For example, in 1970, 92 percent of 30-year-olds made more money in inflation-adjusted terms than their parents did at similar ages, implying an absolute economic mobility rate of 92 percent. Relative economic mobility - whether people are at a higher income percentile compared to their parents’ income percentile in the past. For example, according to one estimate, there was an 8 percent chance that a person born in the United States from 1980-1982 to parents in the bottom 20 percent of the income distribution would move to the top 20 percent of the income distribution for their birth cohort by the time he or she was approximately 30 years old. Intergenerational income elasticity (IGE) - the strength of the relationship between a person’s income and their parents’ income. The higher the number, between zero and one, the greater the relationship between parental income and children’s adult income (see fig. 2). For example, if IGE is zero, there is complete mobility between generations; parents’ income does not influence their children’s future income at all. If IGE is 1, there is no mobility between generations, as everyone stays at the same income level in which they were born. IGE measures the “persistence of advantage” from one generation to the next at all points along the economic ladder and therefore captures how much inequality is passed down through generations. A single standard measure of intergenerational economic mobility does not exist, and some researchers use more than one. Each of the three measures provides some insight into the level of opportunity available for people to better their economic circumstances relative to the circumstances of their birth. Many factors may be related to the level of economic opportunity available to an individual, including but not limited to overall macroeconomic conditions (e.g., economic growth), education, race, gender, geography (the region, commuting zone, county, or neighborhood in which a person lives), health care, and neighborhood characteristics. Millennials have a number of unique characteristics that distinguish them from previous generations. According to data from SCF, Millennials are a more diverse group than previous generations—40 percent of Millennial households are headed by someone who belongs to a racial or ethnic minority group. Millennials are also the most educated generation to date in terms of college degree attainment (see fig. 3). An estimated 62 percent of Millennial households had someone with at least an associate’s degree in 2016. Not only did Millennial households have more college degrees overall, a greater percentage of Millennial households in 2016 had advanced degrees, including master’s, doctorate, and professional degrees, compared to previous generations at similar ages. Meanwhile, only 44 percent of Millennials 25-34 years old were married or living with a partner and had children in 2016, while 54 percent of Baby Boomers were partnered and had children by age 34. The 20 studies that we reviewed indicate that economic mobility has remained flat or declined in the United States over the last 40 years; none of the studies we reviewed found that economic mobility has increased (see text box). Additionally, estimates of intergenerational income elasticity (IGE) suggest that economic status persists across generations, particularly for the lowest and highest income groups. Studies identified parental income, race, and geography as key determinants of one’s economic mobility. These findings could have future implications for Millennials. money than their parents at the same age declined between 1970 and 2010 (see fig. 4). One study attributes this decline to an unequal distribution of economic growth, noting it has primarily benefited the highest earners. It remains to be seen if this downward trend will continue for the Millennial generation. The research we reviewed indicates that economic mobility varies by race. The findings on economic mobility and race suggest that not all groups of Millennials may experience the same levels of economic opportunity. Blacks experience less upward intergenerational mobility than whites. In particular, black men are less likely to be upwardly mobile and more likely to be downwardly mobile than white men, even with similar levels of education. Meanwhile, children of low-income white families have had higher rates of upward mobility over time than black children with similar socioeconomic characteristics. Some minority groups have higher economic mobility than others. One study that examined additional racial groups found high earnings among children of low-income Asian households, and found that Asians are likely to remain at income levels comparable to or above-white Americans, though these findings are largely driven by first-generation immigrants. Additionally, Hispanic Americans are moving up the income distribution across generations, although their overall economic mobility is somewhat lower than whites. Meanwhile, American Indians are more likely than whites to be downwardly mobile, even those in the wealthiest 1 percent. The research we reviewed indicates that the region, state, commuting zone, county, and most especially, the neighborhood in which one grows up affects economic mobility and future earnings, but these effects vary by demographic and income groups. Economic mobility varies by location. One study found that areas within the United States offer disparate opportunities, with some localities supporting higher rates of economic mobility than others (see fig. 5). In particular, counties in the southeastern United States were found to have lower levels of economic mobility than counties in the rural Midwest. Another study found that a child’s neighborhood has a statistically significant effect on life chances, and that growing up in a low-income, metropolitan neighborhood has a strong negative effect on future earnings. Conversely, growing up in an affluent neighborhood can have almost as large an impact on future earnings as completing a bachelor’s degree. Specific neighborhood characteristics drive differing rates of economic mobility. Several researchers linked economic mobility to certain area and neighborhood characteristics, including rates of poverty, racial segregation, economic inequality, the proportion of single-parent households, and school quality. Researchers identified racial segregation as a neighborhood characteristic broadly associated with lower mobility. One study found that economic segregation is also negatively associated with economic mobility. One study identified three neighborhood characteristics that are correlated with a weaker relationship between race and mobility: low poverty rates, a high percentage of low-income black fathers present, and low levels of racial bias among whites. According to this study, neighborhoods with these characteristics had higher mobility for black boys and a relatively small black-white mobility gap. The effects of geography on future earnings vary by race, socioeconomic status, and gender. The effects of race and neighborhood characteristics on economic mobility are related and hard to disentangle. For example, one study found that black boys have lower incomes in adulthood than white boys who grow up in the same neighborhood in 99 percent of Census tracts, even when accounting for income. This highlights the effect of race on economic mobility when children face the same neighborhood conditions. Conversely, the same study also found that 4.2 percent of black children grow up in neighborhoods with the characteristics associated with higher levels of mobility, compared to 62.5 percent of white children. This is in line with another study that found that neighborhoods can amplify racial inequality across generations. Another study notes that Hispanic and black children tend to live in neighborhoods with low mobility for those of their racial group, whereas white children tend to live in neighborhoods with higher mobility rates for whites. Neighborhood effects can also vary by socioeconomic status and gender. Regarding socioeconomic status, one study found that place may matter less for children from higher-income families, as they may be better able to insulate themselves from the effects of local conditions (e.g., by switching to private schools if public schools are weak.) Regarding gender, the same study finds that neighborhood matters more for boys than girls. Across studies, common themes emerged that suggest Millennials might not have the same level of economic mobility enjoyed by their parents’ generation. While the studies in our review varied in their estimates of key measures of economic mobility and its determinants, the studies were consistent in their findings that absolute economic mobility is declining, relative mobility is flat or declining, and economic status is somewhat rigid from one generation to the next. Moreover, the studies that examined drivers of mobility found that a child’s race and neighborhood have a significant effect on their economic mobility as adults. This is particularly relevant for Millennials because of their racial and ethnic diversity. It is not clear whether Millennials’ diversity and higher levels of education will lead to a reversal of these trends, or whether these trends will continue into the future. If economic mobility is flat or falling, knowing how a cohort is doing at the beginning of its members’ working lives sheds light on the potential challenges that lie ahead as the cohort ages and moves toward retirement. We analyzed data from the Survey of Consumer Finances (SCF) to provide a snapshot of how Millennials are faring economically as young adults. We compared the financial circumstances of Millennial households in 2016 to Generation X households in 2001 and Baby Boomer households in 1989; in each year, we estimated measures of financial well-being for households in which the head of household, or any spouse or partner, was 25-34 years old. We found that incomes across the three generations have remained relatively flat, which is consistent with our review of economic mobility studies. We also found that Millennials have lower net worth, which we define as assets minus debt. With respect to assets, we found that Millennials are saving for retirement, but the accumulation of wealth through homeownership has decreased as fewer Millennials are buying homes. In terms of debt, Millennials hold large amounts of student debt compared to previous generations, but are also more likely to be college educated. Millennial households in 2016 had similar average real incomes compared to previous generations at similar ages, according to our analysis of SCF data (see fig. 6). Our analysis showed that median incomes were also similar across young adult households in the Millennial and Baby Boomer generations and that Millennial households had slightly lower median incomes than Generation X households (see fig. 7). We also examined average and median incomes among households with college degrees and found similar results. These findings suggest that, on average, real income levels have been stagnant for young adult households across these three generations. As described in figure 3, Millennial households are more likely to be college-educated compared to previous generations. While college graduates generally have higher incomes than non-college graduates, the income of degree holders has remained flat over time. A recent study from the Federal Reserve Board of St. Louis found that the college income premium, the increase in earnings for college graduates compared to non-college graduates, does exist. According to this study, in the first quarter of 2018, college graduates received weekly wages that were 80 percent higher than high school graduates. However, college graduates in recent years have not made higher incomes than college graduates in the past, as they have had relatively flat inflation-adjusted wages since 2001. Overall, Millennial households in 2016 had significantly lower average and median net worth, defined as assets minus debt, than Generation X households at similar ages in 2001, according to our analysis of SCF data (see figs. 8 and 9). This may be explained by lower homeownership rates than previous generations, as well as larger amounts of student debt. Median net worth was much lower for Millennial households in the bottom 50 percent of the net worth distribution compared to previous generations. While median net worth for the lowest net worth quartile of Baby Boomers and Generation X was around zero, it was substantially negative for Millennials in the lowest quartile, indicating that debt was greater than assets (see fig. 10). The median net worth of those Millennial households in the highest 25 percent was also significantly lower than the median net worth of those at the top in previous generations. We analyzed both average and median net worth to examine how net worth was concentrated among young households. Our analysis showed that estimates of median net worth were much lower than estimates of average net worth across all three generations, suggesting that net worth was unevenly distributed among these households and that a relatively small number of households held a substantial percentage of total net worth. As a part of our analysis of net worth, we examined specific types of assets and debt, including homeownership, retirement resources, and student loans, and found the following: Millennials had lower rates of homeownership compared to previous generations. Our analysis of SCF data showed that a significantly lower percentage of Millennial households in 2016 were homeowners compared to previous generations in 2001 and 1989 (see fig. 11). We estimated that about 43 percent of Millennial households owned homes, compared to 51 percent of Generation X households and 49 percent of Baby Boomers. As a result of lower rates of homeownership, Millennial households had less mortgage debt, but also less home equity, compared to households in other generations at similar ages. Home equity has historically been an important source of retirement security as people age. It is unclear whether Millennial households will reach similar rates of homeownership as previous generations, but it is possible they may be more likely to buy homes at older ages compared to previous generations. Millennials were as likely to have retirement resources as previous generations. A similar percentage of Millennials had retirement resources in 2016 (either defined benefit pensions or retirement accounts, such as an IRA, 401(k), or other account-type pension), compared to Baby Boomers in 1989 and Generation X in 2001 (see fig. 12). Millennials have a similar average value of retirement accounts as Generation X (see fig. 13). This may be due, in part, to auto- enrollment policies, which create default retirement savings accounts for workers, and are relatively new. Millennials have a higher average value of defined contribution retirement accounts compared to Baby Boomers, likely because of the shift over time in the retirement system from defined benefit pensions to account-type pensions, such as 401(k)s. Student loans were the key source of debt that distinguished Millennials from previous generations. We found that Millennial households were significantly more likely to have student loans than previous generations at similar ages (see fig. 14). We measured the potential burden of student loan debt by estimating student loan-to-income ratios and found that this measure was significantly higher for Millennial households in 2016 compared to previous generations when they were young. On average, Millennial households in 2016 had a student loan-to-income ratio that exceeded 100 percent compared to ratios of under 50 percent in previous generations (see fig. 15). While the student loan-to-income ratio has increased over time for households of all incomes, it has most greatly affected lower-income households. For example, while we estimated that the average student loan-to-income ratio was about 100 percent for young households in the bottom income quartile in 2001, we estimated it was significantly higher for young households in the bottom income quartile in 2016 (see fig. 16). These findings suggest that, on average, it could take Millennials several more years’ worth of total income to pay back total household student loan debt (without interest). Although Millennial households have more student debt than previous generations, they may also benefit from federal student loan repayment plans and forgiveness programs. Households that qualify for these programs may not have to repay their student debt in full, though to date about half of student loans are still under standard repayment plans and few potentially qualified borrowers have been granted forgiveness (see textbox). Income-Driven Repayment (IDR) plans, available through the Department of Education for federal student loans, generally base student loan payment amounts on a borrower’s income and extend repayment periods from the standard 10 years to up to 25 years with any remaining balance forgiven at the end of the period. Some borrowers may qualify for very low payments and these payments count toward loan forgiveness at the end of the repayment period. As of September 2018, almost half ($414 billion) of the $859 billion in outstanding Direct Loans were being repaid by student loan borrowers using IDRs. The long-term effects of higher educational attainment, along with higher education loans, on Millennial households is unclear. It is possible that those with advanced degrees may be better situated over time to repay their student loans. However, while an estimated 18 percent of Millennial households in 2016 had advanced degrees (master’s degree or above), an estimated 45 percent had student loans, indicating that many Millennial households with student loans did not have an advanced degree. In addition, while the college income premium is real, high levels of student debt may affect the ability to accumulate wealth, which may be why average net worth levels have decreased for college graduates. (PSLF) program forgives federal student loan balances for eligible borrowers who have made 10 years of qualifying payments while in certain public service jobs. As of March 2019, the Department of Education reported that 1,089,846 borrowers had an approved Employment Certification Form, the first step in potentially qualifying for PSLF. However, 99 percent of applicants were denied PSLF, highlighting the confusion with respect to applying and ultimately getting debt relief from these programs. The Millennial generation is different from previous generations on several measures of financial well-being, so there is uncertainty about how they will do financially as they age. On one hand, they have higher levels of educational attainment, and college graduates earn substantially more than non-college graduates. On the other hand, despite Millennials completing college degrees at higher rates than previous generations, average and median income are not higher for Millennials overall, which is consistent with flat intergenerational economic mobility and persistence of economic status across generations. Millennials also have less home equity than past generations because they are buying homes at lower rates. Given relatively stagnant average income across generations, it is not clear whether Millennials will begin earning more and buying homes later in life or whether lower homeownership rates will persist over time. Millennials are saving for retirement at rates comparable to Generation X, and saving early in life should benefit Millennials in the long run. Yet, they have significantly higher levels of student loan debt than past generations. Some Millennials may ultimately qualify for programs that help them lower their federal student loan debt, but it remains to be seen how these factors will affect Millennials’ financial circumstances in the long run, including in retirement. We provided a draft of this report for review and comment to the Departments of Labor (DOL) and the Treasury and to the Social Security Administration (SSA). We received technical comments from DOL, which we incorporated as appropriate. Treasury and SSA provided no comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretaries of Labor and the Treasury as well as the Administrator of the Social Security Administration. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or jeszeckc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Our objectives were to examine (1) what is known about intergenerational income mobility, and (2) how the financial circumstances of Millennials compare to previous generations. In order to determine what is known about intergenerational income mobility (which we use interchangeably with “economic mobility”) in the United States, we conducted a literature review of relevant, recent economic studies. We identified the majority of the studies we reviewed through systematic searches of databases such as ProQuest, Scopus, and EBSCO using search terms such as “economic mobility,” “income mobility,” “intergenerational income mobility,” or “intergenerational income elasticity.” We searched for scholarly and peer-reviewed publications, working papers, government reports, and think tank reports. We also reviewed studies recommended during expert interviews as well as some included in the bibliographies of key studies on the topic of economic mobility. We used four criteria to target our literature search. In order to be included, studies had to: (1) include original estimates of at least one of three measures of intergenerational economic mobility: absolute economic mobility, relative economic mobility, and intergenerational income elasticity; (2) focus on the United States; (3) be published in the past 5 years (2014-2019), or 2 years if a working paper (2017-2019); and (4) be published in a U.S.-based publication. We then reviewed over 280 abstracts and further evaluated approximately 90 potentially appropriate studies, eliminating ones that did not meet our four criteria. A technical review of each study by at least two GAO economists included an assessment of key findings about economic mobility, methodology, data, assumptions, and limitations. Twenty studies met our four criteria and, based on our technical review, had sufficient methodological rigor for the purpose of providing information on economic mobility. Researchers attempting to estimate the degree of economic mobility in the United States face challenges in acquiring datasets with precise income measurements and that track incomes across generations with sufficient sample sizes. Potential reasons why researchers produce different estimates of economic mobility measures include: Differences in Datasets and Their Respective Limitations. Different datasets may not equally represent every segment of the population. For example, studies making use of the Panel Study of Income Dynamics (PSID) are not generalizable to populations not included in large numbers when the PSID began, such as recent immigrants and institutionalized populations. In addition, some studies rely on data that are not fully representative of the entire income distribution, either because they do not include a sufficient sample of households with very high income or, conversely, households with very low or zero earnings. Some datasets do not capture individuals who are not working or not filing taxes during the period of analysis. For instance, in one study making use of tax data, the authors noted that if parents never file a tax return, they cannot be linked to their child. In that study, parents of approximately 5 percent of children were not identified. In some cases, the data capture a limited age range, which leaves open the possibility of somewhat different results among different age ranges. In addition to different sampling strategies, datasets also capture different variables for each individual or household observed. Even the most comprehensive datasets currently available may lack the data to completely account for factors that may influence mobility, such as changes in family structure over time or detailed individual demographic characteristics for both parent and child households. Differences in Treatment or Construction of Variables. Estimates of intergenerational income mobility can be affected by choices the researcher makes, such as selecting a price deflator to inflation-adjust parents’ incomes; selecting the ages at which children and parents will be compared, accounting for changing trends in household size and composition; determining the value of non-cash benefits (e.g., employer-sponsored health insurance); and determining work-related costs associated with dual-earner households (e.g., child care). Some studies impute earnings for non-tax filers, and different methods of imputation may lead to slightly different results; in other studies, those with no reported income or observations with other missing variables (e.g., demographic characteristics) may simply be dropped from the dataset. How “parent” and “child” are defined may also differ across datasets (e.g., a parent could be the first adult to claim a child on their tax return, or could be an adult male living with a minor child in a household). Additionally, some studies required the researchers to construct datasets that matched parents and children at different points in time. Each researcher makes choices about how to handle the data, which can lead to different estimates. While we did not perform checks on these constructed data, the studies in our review generally included descriptions of the data and methodologies used as well as the difficulties and limitations associated with dataset construction, which we evaluated in our technical review. Differences in Choice of Economic Mobility Measure and Model Specification. Each measure of economic mobility provides a slightly different lens on mobility and has different interpretations. Absolute economic mobility, which compares the inflation-adjusted income of parents and children at similar ages, tends to reflect trends in overall economic growth and distribution of that growth. For instance, 92 percent of 30-year-olds in 1970 made more in inflation adjusted terms than their parents did at that age, while about half of children born in the 1980’s grew up to make more money than their parents by age 30. The difference may largely have been due to higher economic growth and a more equitable distribution of that growth along the income distribution from 1940-1970, whereas growth was slower and distributed differently between 1970 and the present. IGE offers a different metric with different limitations. Studies that estimate IGE regress log child income on log parent income. This conveniently yields a coefficient that can be interpreted as “the percent change in child income given a 1 percent change in parent income.” However, such estimates tend to be unstable because the relationship is non- linear and sensitive to the treatment of children with zero or very small incomes (because the log of zero is mathematically undefined). IGE is very sensitive to assumptions about the income of those with missing income data and typically does not include households with zero earnings, and so excludes some households with no income. Additionally, elasticities are sensitive to changes in cross-sectional income distributions (like during recessions). If children’s income distribution becomes more unequal, then the elasticity will become larger, all else equal. Despite these limitations, based on our technical review, all of the studies summarized in the report are of sufficient methodological rigor for the purpose of providing information on economic mobility. The authors of the studies we reviewed were generally aware of and transparent regarding the limitations of the datasets they worked with, and carried out analyses to test their results for robustness to different assumptions. Although there were differences in study datasets and methodologies, common themes emerge from the body of literature we reviewed. For example: None of the studies we reviewed found economic mobility to be increasing—all found it to be either flat or declining. While there was variation among studies regarding the exact degree to which parental income influences individuals’ income as adults, all studies we reviewed that examined parental income found it to be an important determinant of economic mobility. None of the studies that examined race found blacks to have higher mobility than whites. The studies we reviewed that examine geography agree that different locations have different economic mobility and that part of this variation is connected to the characteristics of a given place (such as school quality or level of segregation), not just to the characteristics of people who choose to live there. In other words, while the studies varied in their point estimates of various measures of economic mobility and its determinants, there was broad consensus among the studies regarding the sign (positive versus negative) and interpretation of the estimates. Additionally, these studies represent an advance in the data and analysis capabilities relative to past studies that examined economic mobility, largely because improved computing power has enabled more complex analyses of large datasets comprised of millions of records. See table 1 for the list of studies included in our review. After considering possible datasets, we chose the Survey of Consumer Finances (SCF) for this analysis because the data are appropriate for estimating measures of income and wealth across generations, including asset and debt categories of interest like homeownership and student debt. The SCF is a triennial survey of U.S. households sponsored by the Board of Governors of the Federal Reserve System in cooperation with the Department of the Treasury. Every 3 years, the SCF interviews a different sample of households and aims to be representative of households across economic strata, including the top of the wealth distribution. The SCF provides information on household balance sheets, including detailed information on assets and debts, as well as pensions, labor force participation, and demographic characteristics at the time of interview. We compared the financial circumstances of young households across 3 years of the SCF, as each year was representative of a generation (or birth cohort) when someone in the household (either the head of household or a spouse or partner) was 25-34 years old, following similar previous GAO work. Our analysis of SCF data allowed us to make intergenerational comparisons, but not to follow the same individuals over time, so we were not be able to compare children to their parents using these data. While our analysis allowed us to make comparisons, it did not allow us to make statements as to why Millennials are different or similar to other generations. Moreover, our data analysis focused on relatively older Millennials whose experiences may be different than those born later in the generation, especially due to the timing of the Great Recession. The SCF dataset is based on self-reported data and as a result, the data are subject to nonsampling error, including the ability to get information about all sample cases; difficulties of definition; differences in the interpretation of questions; and errors made in collecting, recording, coding, and processing data. Also, demographic analyses using these data may be limited based on the sample size needed to produce reliable estimates. Lastly, we cannot make predictions about the future financial circumstances of Millennials based on this snapshot in time. There are also limitations with the SCF with respect to making comparisons by gender. In a household headed by a single person, the head is taken to be the single core individual. However, in households headed by a central couple who is of mixed sex, the head is taken to be the male in the household. This assumption makes it difficult to make reliable comparisons by gender. Finally, the SCF generally asks questions of household heads and their spouses (and not others living in the household), so it likely underemphasizes young adults who were still living with their parents, which is more prevalent for the Millennial generation. Thus, there may be some selection bias in the SCF with respect to relatively more financially well-off Millennials. For the data used in our analysis, we reviewed documentation and tested the data for anomalies. We determined that these data were sufficiently reliable for the purposes of this report. We defined young households in each generation as those in which the household head or any spouse or partner was 25-34 years old. We compared Millennial households in 2016 to Generation X households in 2001 and Baby Boomer households in 1989. Baby Boomers were born from 1946 to 1964 and were 25-43 years old in 1989, so we used the 1989 SCF for Baby Boomer households when they were young adults. Generation X individuals were born from 1965 to 1981 and were 20- 36 years old in 2001, so we used the 2001 SCF for Generation X households when they were young adults. Millennials were born from 1982 to 2000 and were 16-34 years old in 2016, so we used the 2016 SCF for Millennial households when they were young adults. We used the SCF’s measures of income, net worth, assets, and debt from the summary extract data as measures of financial circumstances. We defined household income as the sum of income across all sources. Income includes a family’s cash income, before taxes, for the full calendar year preceding the survey. The components of income are wages, self-employment and business income, taxable and tax- exempt interest, dividends, realized capital gains, benefits from social safety net programs, pensions and withdrawals from retirement accounts, Social Security, alimony and other support payments, and miscellaneous sources of income for all members of the primary economic unit in the household. We defined household net worth as assets minus debt. Assets include financial assets, including liquid assets in bank accounts, certificates of deposit, money market accounts, stocks and bonds, cash value of life insurance, retirement accounts, and other financial assets. Assets also include nonfinancial assets, such as the value of vehicles, primary residences, other residential property, businesses, and other nonfinancial assets. Debt includes mortgages, home equity loans, credit card balances, education loans, vehicle loans, other installment loans, and other debt, including loans against pensions or life insurance. Households could have financial resources outside of net worth, including future income from defined benefit plans or Social Security; however, we did not attempt to estimate the actuarial present value of these financial resources in our net worth calculation given the long time horizon to retirement and the amount of uncertainty associated with such a measurement. In addition, in our professional judgment, the inclusion of these financial resources would not have altered our finding that Millennials have lower net worth compared to previous generations; the inclusion of these financial resources would likely have widened the gap further between Millennials and previous generations because previous generations had greater access to DB plans than the Millennial generation. We estimated means and medians for variables of interest, both overall and by quartile. We estimated the standard errors and constructed the confidence intervals taking into account the dual-frame sample design in order to estimate the sampling variance for these estimates. One part of the design is a standard, multistage area-probability design, while the second part is a special over-sample of relatively wealthy households. This is done in order to accurately capture financial information about the population at large as well as characteristics specific to the relatively wealthy. The two parts of the sample are adjusted for sample nonresponse and combined using weights to make estimates from the survey data nationally representative of households overall. Unless otherwise indicated, estimates in this report are statistically significant at the p<.05 level, and the error bars in the figures represent the 95 percent confidence intervals for the estimates. We conducted this performance audit from November 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Michael J. Collins (Assistant Director), Jessica K. Rider (Analyst-In-Charge), Jessica Mausner, Kathleen McQueeney, and Layla Y. Moughari made key contributions to this report. Also contributing to this report were James Bennett, Alicia Cackley, Pin-En Annie Chou, Justin Dunleavy, Sarah C. Gilliland, Gina M. Hoover, Susan J. Irving, Dan Luo, Sheila R. McCoy, John W. Mingus Jr., Corinna Nicolaou, Oliver M. Richard, Vernette G. Shaw, Joseph Silvestri, Almeta Spencer, Frank Todisco, and Adam Wendel.", "summary": "The idea that individuals should have the opportunity to economically advance beyond the circumstances of their birth is a familiar element of the American Dream. In an economically mobile society, it is possible for individuals to improve their economic circumstances through effort, education, investment, and talent. In addition to opportunities through the private, public, and nonprofit sectors, the federal government also promotes economic mobility through many efforts, including supporting education, job training, business incentives and development, and child health and well-being programs. However, a recent survey indicates that over approximately the last two decades fewer people report being satisfied with the opportunity to get ahead by working hard. According to recent studies, the Millennial generation, who comprise the largest portion of the American workforce, report feeling overwhelmed by their financial situation and concerned about their future financial security. GAO was asked to review trends in economic mobility and Millennials' economic situation compared to previous generations. This report examines (1) what is known about intergenerational income mobility, and (2) how the financial circumstances of Millennials compare to previous generations. To perform this work GAO conducted an extensive literature review and analyzed data from the nationally representative Survey of Consumer Finances. Recent research indicates that, across three key measures, economic mobility in the United States is limited. Specifically, the Millennial generation (those born between 1982 and 2000) might not have the same opportunity as previous generations had to fare better economically than their parents. According to studies GAO reviewed, the share of people making more money than their parents at the same age (absolute mobility) has declined over the last 40 years, and the chances of moving up the income distribution (relative mobility) have been flat over time. Using a third measure of economic mobility (intergenerational income elasticity), researchers have found that income in adulthood is linked to how much a person's parents made, and that between one-third and two-thirds of economic status is passed down from parents to children. This is especially true of the lowest and highest income groups. Researchers also identified race and geography as key determinants of an individual's economic mobility. Millennials have different financial circumstances than Generation X (born 1965-1981) and Baby Boomers (born 1946-1964), and in light of flat or declining economic mobility, there is uncertainty about how they will fare financially as they age. A snapshot of data that allowed GAO to compare Millennials aged 25-34 to the previous two generations at similar ages showed that Millennial households were more likely than other generations to be college educated; however, incomes have remained flat across the three generations, implying that Millennials have not yet benefited from the potential additional lifetime income earned by college graduates. Millennial households had significantly lower median and average net worth than Generation X households at similar ages (see figure), especially among those with low net worth. Median net worth for the lowest quartile of Baby Boomers and Generation X was around zero, but it was substantially negative for Millennials, indicating that debt was greater than assets for the median low net worth Millennial household. Regarding assets, a significantly lower percentage of Millennials owned homes compared to previous generations at similar ages, but had retirement resources at rates comparable to Generation X and Baby Boomers. Finally, Millennials were more likely to have student loan debt that exceeded their annual income. It remains to be seen how these factors will affect Millennials' financial circumstances in the long run, including retirement.", "document_type": "gao"}
{"report": "In fiscal year 2018, VHA data show that 518,570 veterans received any treatment (specialty or non-specialty services) from VHA’s health care systems for a diagnosed SUD, a 9.5 percent increase from fiscal year 2016 (see figure 1). Because these data include non-specialty services, the data do not indicate the extent to which the veteran received SUD services. For example, a provider briefly discussing the SUD of a veteran in long-term recovery during a primary care visit would be included in SUD treatment data. VHA data show that the majority of veterans who received any treatment from VHA’s health care systems for a diagnosed SUD had an alcohol use disorder. Veterans received any treatment from VHA for a diagnosed SUD at a higher rate than the general population. Data from the 2017 National Survey on Drug Use and Health indicate that 1.5 percent of individuals aged 18 or older nationwide received any SUD treatment in the past year. In comparison, 8 percent of veterans getting health care provided or purchased by VHA received any treatment for a diagnosed SUD in fiscal year 2017, including individuals who received specialty SUD services as well as individuals who received non-specialty services in, for example, primary care or general mental health clinics. VHA’s health care systems provide specialty SUD services in three settings increasing in intensity (see figure 2): Outpatient services. Individual and group therapy, either in person or via telehealth, among other services. VHA also offers intensive outpatient programs, which provide services for 3 or more hours per day, 3 days a week at a minimum. Residential rehabilitation treatment programs. Medically monitored, high-intensity care in a 24-hour supervised environment specifically dedicated to treating SUDs. These programs may also provide social services for community reintegration and treatment for other medical conditions during a veteran’s stay. Inpatient services. Acute in-hospital care, which may include detoxification services. For veterans with opioid use disorder—a subset of SUDs—VHA’s health care systems provide medication-assisted treatment. Medication- assisted treatment combines behavioral therapy and the use of certain medications, including methadone and buprenorphine. Medication- assisted treatment has proven to be clinically effective in reducing the need for inpatient detoxification services for individuals with opioid use disorder, according to SAMHSA. Methadone. This medication suppresses withdrawal symptoms during detoxification. It also controls the craving for opioids in maintenance therapy, which is ongoing therapy meant to prevent relapse and increase treatment retention. Methadone is a controlled substance and, when used to treat opioid use disorder, may generally be administered or dispensed only within a certified opioid treatment program to help prevent diversion. Buprenorphine. This medication eliminates opioid withdrawal symptoms, including drug cravings, and it may do so without producing the euphoria or dangerous side effects of other opioids. It can be used for detoxification and maintenance therapy. Buprenorphine is also a controlled substance, and when used to treat opioid use disorder, may be administered or dispensed within an opioid treatment program, or prescribed or dispensed by a qualifying provider who has received a waiver to do so. Providers who receive this waiver are limited in the number of patients they may treat for opioid use disorder. In addition to medication-assisted treatment, VHA has initiatives aimed at preventing opioid-related overdose deaths. For example, VHA’s Opioid Overdose Education and Naloxone Distribution program includes education and training regarding opioid overdose prevention as well as naloxone distribution. Naloxone is a medication that can reverse opioid overdoses. Veterans may receive services from community providers via local contracts or community care. For local contracts, individual VA medical centers establish contracts with local community providers. For example, a VA medical center may develop a contract with a community residential rehabilitation treatment program provider to set aside a number of beds specifically for veterans. For community care, veterans may be eligible if, for example, VHA does not offer the care or service the veteran requires or VHA cannot provide the care or services consistent with its access standards. In general, community care services must be authorized in advance of when veterans access the care. Prior to June 6, 2019, eligible veterans could receive community care via one of multiple VHA community care programs. In 2018, the VA MISSION Act required VA to implement a permanent community care program that consolidated several community care programs. On June 6, 2019, the consolidated community care program, the Veterans Community Care Program, went into effect. Among the 518,570 veterans who received SUD services in fiscal year 2018, VHA provided specialty SUD services to 152,482 veterans in fiscal year 2018. This number has increased slightly but remained relatively unchanged since fiscal year 2014, as shown in table 1 below. These veterans received care in VHA’s health care systems—that is, in VA medical centers or in one of the medical centers’ affiliated outpatient clinics and other medical facilities. During the same time period, VHA expenditures for these specialty SUD services increased from $552 million in fiscal year 2014 to $601 million in fiscal year 2018. Total specialty SUD expenditures per capita increased from $3,691 to $3,941 from fiscal years 2014 through 2018. Adjusted for inflation, however, per capita expenditures remained relatively unchanged between fiscal years 2014 and 2018. Our analysis of VHA data shows that veterans received specialty SUD services from VHA’s health care systems in multiple settings from fiscal years 2014 through 2018, with most veterans receiving these services in outpatient settings. Veterans may receive specialty SUD services across multiple settings within a year. Below, we provide information on utilization and expenditures for specialty SUD services in outpatient and residential treatment programs and for medication-assisted treatment for veterans with opioid use disorder. In fiscal year 2018, nearly all veterans who received specialty SUD services from VHA’s health care systems received this care in outpatient settings at some point during the year. Of those veterans who received outpatient specialty SUD services, 17 percent received intensive outpatient specialty SUD services, with little change from previous years. Expenditures for outpatient specialty SUD services increased from fiscal years 2014 through 2018, as shown in table 2 below. During this time period, outpatient specialty SUD expenditures per capita increased from $2,176 to $2,348. Adjusted for inflation, per capita expenditures grew 1.5 percent between fiscal years 2014 and 2018. In addition, we found little change in the number of full-time employee equivalents that actively provided outpatient specialty SUD services from fiscal years 2015 through 2018. VHA did not provide specialty outpatient wait-time data because, according to VHA officials, the data do not reliably capture veterans’ wait times to receive SUD services in outpatient settings. VHA officials explained that veterans may receive non-specialty SUD services in various outpatient settings, including primary care and general mental health clinics. Therefore, developing a wait-time measure for specialty SUD services would not accurately capture whether veterans are waiting for SUD services not previously provided or services that would continue ongoing treatment begun in a primary care or general mental health clinic. As a result, we did not analyze outpatient wait-time data. In prior work, we have made recommendations to VHA on ways it can improve its outpatient wait-time data (see sidebar). As of fiscal year 2018, VHA had residential rehabilitation treatment programs available for veterans with complex and long-term mental health needs at 113 facilities, and 67 of these programs were dedicated to SUD treatment. The number of residential rehabilitation treatment programs dedicated to SUD treatment increased from fiscal years 2014 through 2018, as did the number of beds available. Figure 3 shows the location of all 67 residential rehabilitation treatment programs specifically dedicated to SUDs with the corresponding number of beds in fiscal year 2018. See appendix III for more information on residential rehabilitation treatment programs dedicated to SUD treatment. The number of veterans participating in VHA’s specialty SUD residential rehabilitation treatment programs (that is, those dedicated to SUD treatment) remained relatively stable from fiscal years 2014 through 2018, as shown in table 3. Of the veterans who received specialty SUD services in fiscal year 2018, approximately 10 percent participated in one of VHA’s 67 residential rehabilitation treatment programs dedicated to SUD treatment, similar to previous years. Meanwhile, expenditures for VHA’s residential rehabilitation treatment programs dedicated to SUD decreased from fiscal years 2014 through 2016, but increased in fiscal years 2017 and 2018. Similarly, specialty SUD residential expenditures per capita decreased from $15,386 in fiscal year 2014 to $12,526 in fiscal year 2016 and increased again to $16,031 in fiscal year 2018. After adjusting for inflation, specialty SUD residential expenditures per capita in 2018 were about 2 percent less than what they were in 2014. From fiscal years 2014 to 2018, veterans’ average length of stay for VHA’s specialty residential rehabilitation treatment programs specifically dedicated to SUD generally decreased, while wait times varied across programs. Across VHA’s residential rehabilitation treatment programs dedicated to SUD treatment, veterans’ average length of stay generally decreased from fiscal years 2014 to 2018, from nearly 40 days to nearly 36 days. VHA officials said that average length of stay may have decreased as a result of multiple factors, such as programs with longer lengths of stay adjusting their treatment approaches. The median wait times to enter residential rehabilitation treatment programs dedicated to SUD treatment varied considerably, ranging from 0 days to 56 days across the programs in fiscal year 2018, although not all residential rehabilitation treatment programs had sufficient—and therefore reliable— data on wait times. Specifically, out of the 67 residential rehabilitation treatment programs dedicated to SUD, VHA officials identified 12 that did not have sufficient wait-time data, which we excluded from our analysis. VHA officials noted that some specialty residential rehabilitation treatment programs do not have sufficient wait-time data because the facilities do not consistently code whether a patient’s visit included a screening for admission to the program. As such, VHA cannot tell when patients were initially screened for admission. In fiscal year 2019, officials implemented changes to address the lack of reliable data from some facilities. However, it is too early to tell if the new changes will address the data reliability issues in wait-time data for residential rehabilitation treatment programs. VHA health care systems offer veterans medication-assisted treatment for opioid use disorder in a variety of settings, including outpatient specialty SUD settings and residential rehabilitation treatment programs dedicated to SUD treatment, as well as in non-specialty settings, such as primary care and general mental health clinics. Our analysis of VHA data shows the number and proportion of veterans with an opioid use disorder who received medication-assisted treatment from VHA’s health care systems has risen in recent years, as shown in table 4. In fiscal year 2018, 23,798 veterans received medication-assisted treatment, which was 33.6 percent of veterans diagnosed with an opioid use disorder. Veterans with an opioid use disorder may receive medication-assisted treatment through VHA at a lower rate than individuals who received care through private insurance. According to a study by the Department of Health and Human Services, 50.6 percent of individuals diagnosed with an opioid use disorder and enrolled in private insurance received medication-assisted treatment in 2014 to 2015. Some veterans may also have private insurance and may have received their medication-assisted treatment through that private insurance. In fiscal year 2018, 9,132 (38 percent) of the veterans who received medication-assisted treatment received their care at one of VHA’s 33 opioid treatment programs, which is the only setting where methadone can be administered to treat opioid use disorder. Expenditures for these opioid treatment programs increased from $35.9 million in fiscal year 2014 to $39.1 million in fiscal year 2018. In fiscal year 2018, VHA had 2,036 providers with a waiver to prescribe buprenorphine, a 17.6 percent increase from fiscal year 2017. According to VHA officials, VHA has encouraged its providers—including those who are not specialists in treating SUDs, such as primary care providers—to obtain the waiver required to prescribe buprenorphine to treat opioid use disorder. In fiscal year 2018, there were about 29 VHA providers with a waiver to prescribe buprenorphine for every 1,000 veterans with opioid use disorder, a 14 percent increase from fiscal year 2017. VHA’s naloxone kit distribution increased exponentially from 646 in fiscal year 2014 to 97,531 kits in fiscal year 2018. A total of 204,557 naloxone kits have been distributed through fiscal year 2018. VHA health care systems distributed naloxone kits to VA staff, including VA first responders and VA police officers, and veterans with opioid use disorder. Factors contributing to the increase may include: In 2014, VHA implemented the Opioid Overdose Education and Naloxone Distribution initiative to decrease opioid-related overdose deaths among veterans, with one of its key components focused on encouraging naloxone kit distribution. Since the program’s implementation, all VHA health care systems dispense naloxone kits. The Comprehensive Addiction and Recovery Act of 2016 directed VHA to maximize the availability of naloxone to veterans and to ensure that veterans who are considered at risk for opioid overdose have access to naloxone and training on its proper administration. Veterans Health Administration (VHA) Community Care Wait Times GAO has a body of work highlighting challenges VHA has with the reliability of its wait-time data. See below for recent reports about this issue. We have highlighted the importance of reliable community care wait-time data in a testimony regarding VHA’s efforts to address our previous recommendations on these issues. See GAO, Veterans Health Care: Opportunities Remain to Improve Appointment Scheduling within VA and through Community Care, GAO-19-687T (Washington, D.C.: July 24, 2019). We have designated our past recommendations related to community care wait-time data as priorities for the agency. See GAO, Priority Open Recommendations: Department of Veterans Affairs, GAO-19- 358SP (Washington, D.C.: Mar. 28, 2019). We have previously made recommendations to VHA to capture the necessary information and improve the reliability of wait-time data for community care. These recommendations remain outstanding as of October 2019. See GAO, Veterans Choice Program: Improvements Needed to Address Access- Related Challenges as VA Plans Consolidation of its Community Care Programs, GAO-18-281 (Washington, D.C.: June 4, 2018). Through its community care programs, VHA purchased SUD services (specialty and non-specialty) for 20,873 veterans in fiscal year 2018, a significant increase since fiscal year 2014 (see table 5). VHA officials noted that veterans can receive community care in addition to, or instead of, care at a VHA facility; therefore, the number of veterans served through community care cannot be combined with the number who received services within VHA to provide an overall number of veterans receiving care. Expenditures for these SUD services purchased by VHA also increased over time, from nearly $6 million in fiscal year 2014 to over $80 million in fiscal year 2018. Between fiscal years 2014 and 2018, on a per capita basis, SUD services purchased by VHA increased from $3,021 to $3,852. Per capita expenditures adjusted for inflation also increased during this time period. These increases coincided with the establishment of the Veterans Choice Program in early fiscal year 2015, which expanded eligibility for community care. Wait-time data for SUD services purchased through community care were not available because of data reliability issues, VHA officials told us. See sidebar for more information on our previous recommendations to VHA regarding community care wait-time data. While VHA is able to report on the overall number of veterans receiving SUD services through community care, data limitations prevent VHA officials from reliably determining whether veterans received this care in residential or outpatient settings. These issues are as follows: Residential rehabilitation treatment programs. VHA uses billing codes on paid claims to track the settings in which veterans receive community care; however, according to agency officials, there is no specific billing code for a residential setting. VHA officials told us that community residential rehabilitation treatment programs may record treatment provided using inpatient or outpatient billing codes—or a combination of the two—in submitting claims to VHA. As a result, VHA is unable to use claims data to reliably identify veterans who received residential rehabilitation treatment through community care. Outpatient settings. Because some residential care data are coded using outpatient billing codes, outpatient data may contain residential services counted as outpatient services. As a result, VHA is unable to reliably identify veterans who received SUD services in community care outpatient settings. Currently, VHA is taking steps to address these coding issues. VHA officials told us they are developing a payment code that will bundle together common residential program services, which will allow VHA to identify veterans receiving residential rehabilitation treatment for SUDs through community care. Officials explained that using this code for residential SUD services will allow VHA to better distinguish between residential and outpatient community care because residential care will no longer need to be identified using outpatient codes. In contrast to its community care programs, VHA does not centrally track SUD services provided via local contracts. Rather, the individual medical centers that established the contracts with local community providers are responsible for tracking and documenting SUD services provided to veterans. In fiscal year 2019, VHA began conducting market assessments, a broader agency initiative to better understand the supply and demand of all services at all VA medical centers, including both what is available within VHA as well as what is available in the local communities. We reviewed one of the data collection instruments the agency is using as a part of this work and found that it should allow VHA to identify, among other things, the number of community residential rehabilitation treatment beds contracted by individual medical centers to serve veterans with SUDs, as well as the number of veterans who received SUD services through local contracts or community care for SUDs. Agency officials said that they expect the market assessments to be completed in 2020. Although overall use of SUD services was similar among veterans in rural and urban areas, VHA data show the utilization rates of some specialty SUD services differed. The literature and agency documents we reviewed and VHA officials consistently cited several issues, such as recruiting SUD providers and accessing necessary prescriptions for SUDs, which affect the use of services by veterans with SUDs in rural areas. According to agency documents and officials, VHA is taking steps to address these issues. Overall, veterans’ use of SUD services was similar in rural areas compared to urban areas, but use of some specialty services differed. Our analysis of VHA data shows that across VHA’s 140 health care systems, there was relatively little difference in the overall utilization of SUD services (specialty and non-specialty) in rural and urban areas from fiscal years 2016 through 2018. In fiscal year 2018, for example, 7.5 percent of veterans in rural areas received any SUD services compared with 8.8 percent of veterans in urban areas. However, VHA data also show there were some types of specialty services, such as intensive outpatient specialty services, residential rehabilitation treatment programs, and medication-assisted treatment for opioid use disorder, that rural veterans with SUDs tended to use more or less of than their urban counterparts. Among veterans receiving specialty SUD services across all 140 VHA health care systems, those veterans in rural locations used intensive outpatient specialty SUD services at a slightly higher rate (19 percent) than veterans in urban locations (17 percent) in fiscal year 2018. While veterans’ utilization of these specialty SUD services has decreased in both rural and urban locations in recent years, the decreases have been larger in rural areas. In rural locations, the percentage of veterans using intensive outpatient specialty SUD services decreased from 25 percent in fiscal year 2015 to 19 percent in fiscal year 2018. In comparison, in urban areas, the percentage of veterans using these services decreased from 18 percent to 17 percent during this same time period. Officials from VHA health care systems in three urban locations and two rural locations we spoke with indicated that they offered intensive outpatient specialty SUD services in conjunction with either residential or outpatient services. According to officials from the rural VHA health care system that did not offer this service, the location did not have sufficient staff to provide the additional hours of intensive outpatient specialty SUD treatment each week. Veterans in rural locations using specialty SUD services participated in residential rehabilitation treatment programs dedicated to SUD treatment at a higher rate (17 percent) than veterans using these services in urban locations (10 percent) across all 140 VHA health care systems in fiscal year 2018. From fiscal years 2014 through 2018, there was a slight increase in the percentage of rural veterans using specialty SUD services who participated in residential rehabilitation treatment programs dedicated to SUD treatment, from 13 percent to 17 percent. VHA officials told us rural communities often face difficulties with transportation that may make residential programs more feasible than accessing intensive outpatient specialty SUD services, which are at least 3 days per week, at VHA health care systems. All six of the VHA health care systems we interviewed offered residential rehabilitation treatment programs. VHA reported the agency is currently conducting market assessments that may help determine gaps in services for veterans with SUDs, including residential rehabilitation treatment, once the assessments are complete. Across all 140 VHA health care systems, veterans with an opioid use disorder received medication-assisted treatment (in specialty and non- specialty settings) at a higher rate in urban locations (34 percent) than in rural locations (27 percent) in fiscal year 2018. We also found differences in the availability of medication-assisted treatment services between rural and urban areas: Methadone. The only setting in which methadone may be used to treat an opioid use disorder is an opioid treatment program. All of VHA’s opioid treatment programs are located in urban areas. Only one of the six selected VHA health care systems in our review had an opioid treatment program. Officials from the other five VHA health care systems we spoke with told us they typically referred out to community providers if a veteran needed methadone. Regional VHA officials indicated that some locations, especially rural ones, may not have the number of veterans with opioid use disorder needed to justify the resources required to run an opioid treatment program. Buprenorphine. The number of waivered providers per 1,000 veterans with opioid use disorder was slightly higher in rural areas (29.9 providers) than in urban areas (28.7 providers) in fiscal year 2018. Non-specialist rural providers, such as primary care providers, may feel a greater responsibility to obtain a waiver because there are fewer specialists for them to refer their patients to, according to VHA health care system officials. Despite the similar rates of waivered providers in rural and urban areas, as previously mentioned, rural veterans with opioid use disorder use medication-assisted treatment at a lower rate. VHA requires that all rural and urban health care systems offer the same range of SUD services (specialty or non-specialty). However, rural areas have historically faced difficulties delivering all types of health care, including SUD services, according to literature, agency documents, and VHA health care system officials we spoke with. VHA is taking steps to address several issues that affect the delivery of health care services generally, and SUD services in particular, in rural areas. Officials from three of the six VHA health care systems we interviewed noted a shortage of SUD specialists in their area, including addiction therapists and providers with a waiver to prescribe buprenorphine. According to one study and agency documents we reviewed, veterans may reside in mental health professional shortage areas at a higher rate than the general population, therefore they may have less access to providers qualified to offer medication-assisted treatment or other mental health treatment. One study found that efforts to improve access for veterans in rural areas by purchasing care from community providers may have limited effect, because these areas are relatively underserved generally. Officials from two of the three VHA health care systems in rural areas we selected expressed difficulty hiring and retaining providers to provide SUD services. Because of the shortages, recruiting and retaining providers to deliver care to rural veterans is critical. Based on the literature reviewed and half of VHA health care system officials interviewed, rural communities struggle with recruiting and retaining providers, including SUD providers. Some rural areas report provider shortages with ongoing, long-term vacancies. To respond to these provider shortages and hiring and retaining challenges, VHA has implemented new initiatives and practices to increase the supply of rural health professionals. A VHA official noted that these efforts include rural health training and education initiatives to provide rural health experience to health professions trainees, including those who provide SUD services. The agency also plans to use expanded recruitment tools, like greater access to an education debt reduction program, improved flexibility for bonuses for recruitment, relocation, and retention, as well as piloting a scholarship program authorized under the VA MISSION Act of 2018 to hire mental health professionals. However, recruiting health professionals in rural areas, including mental health providers and social workers, remains an issue for VHA and the community at large, and VHA officials noted that data are not yet available to understand the long-term effect of the newly trained providers on the availability of SUD services. Officials from two VHA health care systems we interviewed noted that providing services, such as medication-assisted treatment, through telehealth technology is difficult, especially when the SUD service requires monitoring for medication compliance. However, a VHA official told us the use of telehealth services overall has grown exponentially at VHA’s health care systems and goes beyond traditional video conference capabilities to include advanced technology that can be attached to computers or videoconference equipment like an exam camera to allow for an interactive examination. The official added that the provision of SUD services using telehealth can be supported by medical personnel located at the closest VA facility to complete necessary tests, such as urine screening, when the service is provided at a VHA location. VHA officials from one health care system we spoke with and literature noted that providing medication-assisted treatment via telehealth technologies requires a cultural change within the profession. Officials from one VHA health care system we spoke with told us that delivering medication-assisted treatment using technology is risky. For example, buprenorphine is a controlled substance with a risk of misuse. This official added that many providers may not be open to the idea of delivering this level of treatment using telehealth. One study we reviewed confirmed that acceptance within the profession appears to be the main barrier to the successful implementation of telehealth services. However, VHA’s budget and strategic plan show continued support for the use of telehealth for SUD treatment. Studies have shown that telephone services, a type of telehealth service, potentially have the same outcomes as in-person services. Officials from all six VHA health care systems we selected mentioned they had mental health telehealth services available to facilitate the delivery of care to veterans in both urban and rural areas for SUD services. To ensure adequate access to care, VHA has multiple telehealth initiatives underway. For example, between fiscal years 2017 and 2019, VHA allocated $28.5 million for mental health telehealth hubs at 11 sites. In another instance, VHA allocated more than $750,000 for rural facilities in fiscal years 2018 and 2019 toward a nationwide initiative to improve participation in a program that establishes video connections in the homes of rural veterans to receive mental health treatment, including for SUDs, with psychotherapy and psychopharmacology. While VHA has initiatives underway, the success of these efforts is contingent on rural areas having broadband and internet connectivity, which remains a challenge, according to agency documents and officials. VHA’s Clinical Practice Guidelines for SUDs recommends methadone and buprenorphine, among others drugs, to treat opioid use disorder. However, accessing these drugs in rural areas can be challenging, according to literature we reviewed and VHA officials we spoke with. For example, one national study found that opioid treatment programs providing methadone are generally absent from the treatment options in rural areas. Within VHA, all of the opioid treatment programs are in urban areas. In addition, in rural areas generally, a small percentage of providers nationwide have received waivers to prescribe buprenorphine. VHA officials told us they are steadily expanding the availability of medication-assisted treatment for veterans with opioid use disorder. VHA had an interdisciplinary team of VA staff from a single facility within each region receive training on implementing medication-assisted treatment for opioid use disorder. These teams were responsible for spreading information to other facilities. Thus far, VHA reported it has trained over 300 providers using this model. In a separate initiative, a VHA official reported that its Office of Rural Health provided over $300,000 in fiscal year 2019 for a pilot program that trains primary care and mental health providers in the Iowa City VHA health care system on how to provide medication-assisted treatment for opioid use disorder. The availability of transportation is vital for veterans receiving medication- assisted treatment due to the necessity for frequent travel to the VHA health care systems for treatment. When using methadone for opioid use disorder treatment, the medication generally needs to be administered through an opioid treatment program at a specific location on a daily basis. In addition, during the initial stages of buprenorphine treatment, patients must also come into a facility frequently. Veterans living in rural areas who need this level of care may have to travel long distances every day to receive this medication. Distance and lack of transportation impede access to care, including SUD services, for rural veterans. Specifically, the literature we reviewed noted distance, time, and access to transportation as barriers to care. Veterans may lack access to transportation or are no longer able to drive because of age, health status, or driving restrictions. Some rely on family, friends or vans available through community service organizations; however, they may have other difficulties like reaching pick-up locations or the organization not having vans that are wheelchair-equipped. Officials from all six VHA health care systems we selected noted the lack of transportation as a barrier to accessing SUD services. Officials from two rural locations of the six selected VHA health care systems mentioned that volunteers, including a local veteran service organization, assist with getting veterans from their homes to their appointments; however, they added that these services operate on an abbreviated schedule and veterans are sometimes subjected to riding in the vehicle for long periods of time (2 hours each way). Over the last 10 years, a VHA official told us that the agency has allocated between $10 and $12.9 million for its Veterans Transportation Service for new vehicles, drivers, and mobility managers to assist with rural transportation needs. The VA MISSION Act of 2018 includes provisions that specifically address the need to improve veterans’ access to health care in areas with shortages of health care providers, including those providing SUD and mental health services. Based on this legislation, in June 2019, VHA published a plan organized in three areas: increasing personnel, using technology to connect veterans to care through public and private partnerships, and expanding VHA’s infrastructure through the building or acquiring of space to address the problem of underserved facilities. For example, VHA has a pilot program with 11 Walmart sites and 15-20 additional sites planned with Philips Healthcare, the Veterans of Foreign Wars, and the American Legion to enable veterans who lack the necessary technology in their home and live far from a VHA facility to receive remote health care at a convenient location. VHA’s plan indicates that while all VHA health care systems can use any of the strategies covered under this legislation, they will provide specific additional technical assistance for underserved facilities, monitor the effectiveness of these strategies, and share the findings of this work throughout the broader VHA system. We provided a draft of this report to VA for review and comment. VA provided written comments, which are reprinted in appendix IV, and technical comments, which we incorporated as appropriate. VA’s comments note that the agency generally reports obligations and that the agency is unable to confirm some of our financial data. However, the data provided by VA during the course of this engagement were regarding expenditures, and thus we report them as such. VA’s comments also provide information on additional efforts to expand mental health telehealth and ways the agency recruits providers in rural areas. We are sending copies of this report to the appropriate congressional committees, the Secretary of Veterans Affairs, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or at deniganmacauleym@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. Figure 4, an interactive graphic, shows the location and rurality of the Veterans Health Administration’s health care systems, as well as information on veterans treated by these health care systems. For an accessible version of the data used in this map, see https://www.gao.gov/products/GAO-20-35. To describe any differences between veterans’ use of substance use disorder (SUD) services in rural and urban areas and the issues affecting access to those services in rural areas, we selected six Veterans Health Administration (VHA) health care systems and interviewed officials regarding their SUD services and issues serving veterans with SUDs. Because opioid use disorders may pose a greater risk to veterans than the general population, we selected the six VHA health care systems from among those with the highest percentages of veterans with an opioid use disorder diagnosis in fiscal year 2018. We also selected these six health care systems to achieve variation in representation among VHA’s five geographic regions and to include both urban and rural locations. See table 6. The Veterans Health Administration had 67 residential rehabilitation treatment programs dedicated to substance use disorder treatment in fiscal year 2018. See table 7. Mary Denigan-Macauley, (202) 512-7114 or deniganmacauleym@gao.gov. In addition to the contact named above, Lori Achman, Assistant Director; Hannah Marston Minter and Carolina Morgan, Analysts-in-Charge; Sam Amrhein; Amy Andresen; Shaunessye D. Curry; and John Tamariz made key contributions to this report. Also contributing were Giselle Hicks, Diona Martyn, Ethiene Salgado-Rodriguez, and Emily Wilson Schwark. Veterans Health Care: Opportunities Remain to Improve Appointment Scheduling within VA and through Community Care, GAO-19-687T. Washington, D.C.: July 24, 2019. VA Health Care: Estimating Resources Needed to Provide Community Care, GAO-19-478. Washington, D.C.: June 12, 2019. Drug Policy: Assessing Treatment Expansion Efforts and Drug Control Strategies and Programs, GAO-19-535T. Washington, D.C.: May 9, 2019. Priority Open Recommendations: Department of Veterans Affairs, GAO-19-358SP. Washington, D.C.: March 28, 2019. Behavioral Health: Research on Health Care Costs of Untreated Conditions is Limited, GAO-19-274. Washington, D.C.: Feb. 28, 2019. Veterans Choice Program: Improvements Needed to Address Access- Related Challenges as VA Plans Consolidation of its Community Care Programs, GAO-18-281. Washington, D.C.: June 4, 2018. VA Health Care: Progress Made Towards Improving Opioid Safety, but Further Efforts to Assess Progress and Reduce Risk Are Needed, GAO-18-380. Washington, D.C.: May 29, 2018. Opioid Use Disorders: HHS Needs Measures to Assess the Effectiveness of Efforts to Expand Access to Medication-Assisted Treatment, GAO-18-44. Washington, D.C.: October 31, 2017. Opioid Addiction: Laws, Regulations, and Other Factors Can Affect Medication-Assisted Treatment Access, GAO-16-833. Washington, D.C.: September 27, 2016. VA Health Care: Reliability of Reported Outpatient Medical Appointment Wait Times and Scheduling Oversight Need Improvement, GAO-13-130. Washington, D.C.: December 21, 2012.", "summary": "Substance use and illicit drug use are a growing problem in the United States. SUDs occur when the recurrent use of alcohol or drugs causes significant impairment, such as health problems. The veteran population has been particularly at risk. Veterans are 1.5 times more likely to die from opioid overdose than the general population, according to VA and Centers for Disease Control and Prevention data. Furthermore, veterans live in rural areas at a higher rate than the general population, which may affect their ability to access SUD services. VA is the largest integrated health care system in the United States, providing care to about 6.2 million veterans. VA provides SUD services through outpatient, inpatient, and residential care settings and offers various treatment options, including individual and group therapy, medication-assisted treatment, and naloxone kits to reverse overdoses. Senate Report 115-130 included a provision for GAO to study VA's capabilities to treat veterans with SUDs. This report describes (1) trends in the number of and expenditures for veterans receiving SUD services, including specialty SUD services; and (2) any differences between veterans' use of SUD services in rural and urban areas, and the issues affecting access to those services in rural areas. GAO reviewed VA policies and data from fiscal years 2014 through 2018. GAO also interviewed officials from six VA health care systems, selected for their high percentage of veterans with an opioid use disorder and to achieve variation in geography and locations VA has designated as urban and rural. VA provided technical comments, which GAO incorporated as appropriate. The Department of Veterans Affairs (VA) treated 518,570 veterans diagnosed with a substance use disorder (SUD) in fiscal year 2018, a 9.5 percent increase since fiscal year 2016. Of these, 152,482 veterans received specialty SUD services in fiscal year 2018, a number that has remained relatively unchanged since fiscal year 2014. Specialty SUD services are those provided through a clinic or program dedicated to SUD treatment. Expenditures for VA's specialty SUD services increased from about $552 million in fiscal year 2014 to more than $600 million in fiscal year 2018. In the same year, VA expended about $80 million to purchase SUD services from non-VA community providers for more than 20,000 veterans, an increase since fiscal year 2014. The number receiving this care from non-VA providers may include veterans who also received services in VA facilities. Note: Specialty SUD services are those provided through a clinic or program dedicated to substance use disorder treatment. SUD services include services provided by any type of provider. VA data show that overall there was little difference in the percentage of veterans using SUD services, including specialty services, in rural and urban areas in fiscal year 2018. However, there were differences for some specific services. For example, in rural areas, 27 percent of veterans with an opioid use disorder received medication-assisted treatment—an approach that combines behavioral therapy and the use of medications—compared to 34 percent in urban areas. In providing SUD services in rural areas, VA faces issues similar to those faced by the general population, including lack of transportation. The agency is taking steps to address these issues, such as using local service organizations to transport veterans for treatment.", "document_type": "gao"}
{"report": "The Navy bases the majority of its surface ships at homeports in the United States, and five regional maintenance centers manage their maintenance. At the time of our review, the Navy had 38 surface ships assigned to overseas homeports, as illustrated in figure 1. A homeport is where a ship is based and primarily managed and maintained. The Navy assigns all newly commissioned ships entering the fleet to a U.S. homeport, and the Navy may change a ship’s homeport throughout its service life. The Navy may move a ship to an overseas homeport to respond to strategic needs or to relieve another ship returning to a U.S. homeport. We found in May 2015 that basing ships at overseas homeports provides considerable additional time in strategic areas of operation and other benefits ranging from increased opportunities for collaboration with partners and allies to faster response time for emerging crises. However, we also found that the Navy’s high pace of operations for its overseas-homeported ships affected the material condition of these ships, and that they had experienced a worsening trend in overall ship readiness when compared to U.S.- homeported ships over the preceding 5 years. We also reported that the Navy generally intended ships to be homeported overseas for about 7 to 10 years, according to officials, but that some ships in Japan had been based there for longer than 10 years. In 2018 Congress instituted a 10- year cap on the length of time certain U.S. Navy ships may be based at overseas homeports. A number of organizations and commands within the Navy share responsibilities for setting maintenance policies and planning, scheduling, and executing ship maintenance, from the offices of the Secretary of the Navy and Chief of Naval Operations, to fleet commanders and ships’ crews. Key organizations include: Type Commanders. The Navy’s type commanders for surface ships— Commander, Naval Surface Force, U.S. Pacific Fleet, and Commander, Naval Surface Force, U.S. Atlantic Fleet—are responsible for maintaining, training, and ensuring the readiness of the surface ships assigned to each fleet. Naval Sea Systems Command (NAVSEA). NAVSEA, among other things, maintains surface ships to meet fleet requirements within defined cost and schedule parameters. These offices perform contract administration, program management, and planning for future maintenance periods informed by the historical maintenance needs of Navy ships. For example, the following NAVSEA organizations have certain responsibilities for overseas ship maintenance: NAVSEA’s Deputy Commander for Ship Maintenance and Modernization (NAVSEA 21). This office provides life-cycle management for surface ships and manages critical modernization, maintenance, training, and inactivation programs. NAVSEA’s Surface Maintenance Engineering Planning Program (SURFMEPP). SURFMEPP provides life-cycle management of maintenance requirements for surface ships, including providing centralized class maintenance and modernization planning and management of maintenance strategies. Commander, Navy Regional Maintenance Center (CNRMC). This office oversees the regional maintenance centers in the United States, as well as the Forward Deployed Regional Maintenance Center (FDRMC) headquarters in Italy, and its detachments in Rota, Spain, and Manama, Bahrain, that manage the maintenance for the U.S. Navy ships homeported there. NAVSEA’s Logistics, Maintenance, and Industrial Operations (NAVSEA 04). This office manages and oversees the naval shipyards and the Ship Repair Facility and Japan Regional Maintenance Center (SRF-JRMC) in Yokosuka, Japan, and its detachment in Sasebo, Japan. Surface Team One. This body of stakeholders from across the Navy’s surface ship maintenance, modernization, and sustainment organizations collaborates for the purpose of setting and developing surface ship maintenance and modernization priorities, conducting analyses, and improving surface ship maintenance performance. A Senior Flag Oversight Council comprised of Commander, Naval Surface Force Pacific, and Commander, NAVSEA, provides strategic vision and directs Surface Team One’s efforts, which may include knowledge-sharing networks, working groups, or deep-dive studies and business case analyses. The level of complexity of ship repair, maintenance, and modernization can affect the length of a maintenance period, which can range from a few weeks to 6 months or longer. The types of maintenance periods include the following: Chief of Naval Operations (CNO) maintenance. CNO maintenance periods are scheduled to accomplish industrial, depot-level maintenance and modernization—work that cannot be conducted by ship’s crews or goes beyond fleet capabilities. These depot-level maintenance periods can last 6 months or longer and the Navy generally schedules them every 2 to 3 years throughout a ship’s service life. This can include major repair, overhaul, or complete rebuilding of systems needed for ships to reach their expected service life, and involve complex structural, mechanical, and electrical repairs. For example, in certain types of depot-level maintenance, ships are taken out of the water and put into a dry dock to perform maintenance on below-water parts of the ship (see fig. 2 for a photo of a dry dock at SRF-JRMC in Yokosuka, Japan). To inform the planning of the work package for this maintenance period, Navy officials or contractor representatives typically perform one or more “ship checks” to assess the material condition of the ship in advance of the maintenance period. Continuous maintenance. Continuous maintenance periods are to conduct maintenance outside of the longer CNO maintenance periods that can be done in short periods typically scheduled to be 2 to 6 weeks in duration. According to Navy officials, the schedules of these periods can vary, and commanders can adjust, postpone, or cancel them based on operational demands. Voyage repair. Voyage repair maintenance periods are solely to accomplish corrective maintenance of a mission- or safety-essential nature necessary for a ship to deploy or continue its deployment. For example, ships based in the United States that are deployed overseas on a temporary basis schedule mid-deployment voyage repair to ensure they can continue their deployment. The process for planning surface ship depot-level maintenance periods (i.e., CNO maintenance periods), whether the ship is based overseas or in the United States, is contained in the Navy’s Joint Fleet Maintenance Manual. In general, the Navy begins planning for a ship’s depot-level maintenance period 720 days—or roughly 2 years—before the planned start of the maintenance period. During this time, a variety of organizations within the Navy plan what will be repaired, how long it will take, where the work will be done, as well as select the contractors to perform the work, among other things. This process also includes activities to close out the maintenance period once it is complete, which overlap with the start of the planning cycle for the next maintenance period. For example, certain milestones serve both planning and closeout purposes—such as the Life-cycle Planning Conference Meeting, which is to both closeout a ship’s completed maintenance period and to begin planning for the next one by reviewing the maintenance requirements, deferred work, and planned schedules (see figure 3). NAVSEA 21, including SURFMEPP, is generally responsible for the advanced planning of maintenance periods, which includes setting the baseline requirements and early estimates of how long maintenance might take. In general, regional maintenance centers have overall responsibilities for meeting milestones approximately a year prior to the start of maintenance through execution and closeout, as illustrated in figure 3 above. Overseas, the responsible regional maintenance centers are the SRF-JRMC at the homeport in Yokosuka, Japan, and its detachment at the homeport in Sasebo, Japan, and the FDRMC detachments at the homeports in Rota, Spain, and Manama, Bahrain. Naval Supply Systems Command’s Fleet Logistics Centers offices overseas are responsible for soliciting and awarding maintenance contracts, for ships based overseas, among other things. The Navy has developed different maintenance capacity and approaches to maintain the 38 surface ships based in Japan, Spain, and Bahrain. The Navy maintains these ships through a mix of Navy, host government, and contractor industrial base facilities and resources that are different at each location. The Navy has tailored the maintenance approaches it uses at each homeport considering the available Navy and contractor capacity, as well as the number and type of ships, according to Navy documents and officials. Table 1 provides an overview of the Navy and contractor industrial base capacity for depot-level maintenance of surface ships based at the four main overseas homeports. U.S. Naval Ship Repair Facility and Japan Regional Maintenance Center (SRF-JRMC), Yokosuka, Japan. The Navy’s largest overseas maintenance facility, SRF-JRMC is located in Yokosuka and is responsible for the maintenance of 12 surface ships homeported there— including the most destroyers and the only cruisers based outside of the United States. According to Navy officials, SRF-JRMC in Yokosuka operates as a public shipyard would in the United States, with three on- base dry docks that fit all sizes of ships based there, as well as other smaller dry docks. SRF-JRMC employs a Japanese workforce that conducts the majority of the maintenance workload through a cost- sharing agreement between the United States and Japan. For example, in fiscal year 2018, SRF-JRMC directly conducted about two-thirds of the total ship maintenance workload, with about one-third conducted by local contractors, according to SRF-JRMC workload reporting documentation. For the contracted work, SRF-JRMC relies on one main contractor, Sumitomo Heavy Industries, for ship maintenance in Yokosuka, though additional smaller contractors are also used. Most contracted work also takes place at Navy facilities on base, according to SRF-JRMC officials. Ships in Yokosuka are able to receive deeper, more complex maintenance than other ships based overseas because of the Navy maintenance capacity at SRF-JRMC, according to NAVSEA officials. SRF-JRMC in Yokosuka also conducts detailed planning for maintenance periods that other regional maintenance centers do not, according to NAVSEA officials. Specifically, it plans all the individual maintenance and repair tasks to be conducted in each maintenance period, while other U.S. and overseas maintenance centers can rely on the contractors to plan the work they do. For additional information on SRF-JRMC in Yokosuka, Japan, see appendix III. SRF-JRMC Detachment, Sasebo, Japan. The Navy also operates its own shipyard with a Japanese workforce at the SRF-JRMC detachment in Sasebo, though it primarily relies on the local contractor base to conduct maintenance work. In fiscal year 2018, the SRF-JRMC detachment directly conducted about one-third of the total maintenance workload, with nearly two-thirds performed by contractors according to SRF-JRMC workload reporting documentation. For the contracted work, the Navy relies on about 14 smaller contractors, and while the SRF- JRMC detachment coordinates the work of the multiple contractors that may contribute to a single maintenance period, the contractors directly plan and manage their portion of the work, according to Navy officials. The SRF-JRMC detachment in Sasebo includes two Navy dry docks, though only one is used for depot-level maintenance periods. As a result, dry-dock maintenance and modernization can be conducted on ships based in Sasebo, but it is generally limited to the four MCM and two LSD ships. The other amphibious ships based in Sasebo receive depot-level maintenance that has been planned from about 2 to as long as nearly 9 months, but this does not include dry-dock maintenance. A unique maintenance consideration in Sasebo is the deployment schedule of the amphibious ships based there. These ships typically deploy three at a time with U.S. Marines based in Okinawa on board. As a result, there are times when all ships are in port and require maintenance, so the detachment tries to stagger the work with the MCMs and closely coordinate with contractors there in an effort to manage workload, according to SRF-JRMC officials. For additional information on the SRF- JRMC detachment in Sasebo, Japan, see appendix IV. Forward Deployed Regional Maintenance Center (FDRMC) Detachment, Rota, Spain. The FDRMC detachment and four destroyers are based in Rota, Spain, where a single state-owned contractor, Navantia, performs all depot-level maintenance on the ships. Beginning in 2014, the Navy deployed four destroyers to Spain to support the U.S. ballistic missile defense mission to the North Atlantic Treaty Organization. The Navy designed the maintenance approach for these ships with the understanding that they would not require access to Navy- or contractor- operated dry docks during the time they are based in Spain, according to Navy officials. The Navy initially expected these destroyers to be in Spain for about 6 years and to receive maintenance every 2 years. However, in 2015 the Navy updated its maintenance strategy for these ships to provide shorter, but more frequent maintenance periods to support a longer time basing them in Spain. Under the updated approach, the Navy plans for each destroyer to receive six maintenance periods during a roughly 8-year time period based in Spain. For additional information on the FDRMC detachment in Rota, Spain, see appendix V. FDRMC Detachment, Manama, Bahrain. The FDRMC detachment in Bahrain is responsible for the depot-level maintenance of the 10 patrol coastal and 4 mine countermeasures ships based there—the most ships based at an overseas homeport. While the Navy does not operate any dry docks or depot-level repair facilities in Bahrain, it relies on two main contractors, Bahrain Ship Repairing and Engineering Company and Arab Shipbuilding and Repair Yard, to conduct ship maintenance in Bahrain. The ships in Bahrain receive depot-level maintenance at contractor facilities there. Both contractors in Bahrain have dry docks or similar capacity to fit the MCMs and PCs based there, as well as some larger Navy ships. A unique capacity consideration for ships visiting Bahrain, according to officials there, is that the Navy does not have dedicated pier space for ships when they come into port. As a result, the Navy must rely on contractor space for maintenance, and on other pier space when visiting ships are at the homeport—which they share with others, such as commercial cruise lines. For additional information on FDRMC detachment in Manama, Bahrain, see appendix VI. In addition to the depot-level maintenance periods for the surface ships we reviewed, the Navy maintenance centers in Japan, Spain, and Bahrain, also support additional maintenance functions, such as voyage repairs or technical assistance for visiting U.S. ships; coordinating intermediate-level maintenance that may be conducted there; and providing additional maintenance support to overseas ships outside of scheduled depot-level periods. The Navy did not complete the majority of the maintenance periods performed on ships based overseas on time during fiscal years 2014 through 2018. Navy officials identified a variety of factors that contribute to delays, such as the discovery of additional work requirements after maintenance has begun or staff shortages affecting management and oversight of maintenance. The Navy collects information on overseas maintenance at individual homeports, but its analysis of factors contributing to the delays is generally focused on the planning and execution of individual maintenance periods. The Navy underestimated the time needed to complete maintenance for 50 of the 71 maintenance periods—about 70 percent—started during fiscal years 2014 through 2018. Specifically, 21 maintenance periods ended early or on time and 50 maintenance periods ran beyond their planned schedules, as illustrated in figure 4. More than half of the maintenance periods that were completed late—29 of 50—went 31 or more days beyond the Navy’s planned schedule. As a result, from 2014 through 2018 there were 29 times when ships based overseas were unavailable for operational requirements, certain training, or other purposes for 31 or more unplanned days. During this time period, the Navy completed more maintenance periods a month or more later than planned than it completed early or on time. As a result of maintenance schedules not being completed on time, all four overseas Navy homeports with surface ships we analyzed— Yokosuka, Japan; Sasebo, Japan; Rota, Spain; and Manama, Bahrain— experienced a total of 3,475 days ships were in maintenance beyond their expected durations—referred to in this report as days of maintenance delay. As illustrated in figure 5, Manama, Bahrain, experienced the most days of maintenance delay during fiscal years 2014 through 2018, while Rota, Spain, experienced the least. We also analyzed delays at overseas homeports by calculating the days of delay experienced as a percentage of its total workload in terms of total days of maintenance conducted. Using this analysis, we found that ships in Bahrain experienced the highest rate of delay at 34 percent while ships based in Rota, Spain, experienced only a 2.2 percent rate of delay (as illustrated in figure 6). Taking workload into account illustrates some difference in the rate at which each of these homeports experiences ship maintenance delays. For example, ships in Sasebo and Yokosuka experienced a similar total number of days ship maintenance was delayed—1,001 days and 994 days over the 5-year time period, respectively. However, when port workload is taken into account, Sasebo’s rate of delay is higher. Specifically, ships based in Sasebo experienced a maintenance delay rate of 31.2 percent compared with 18.5 percent of the time for the surface ships in Yokosuka. According to Navy maintenance center officials and crewmembers from the ships we visited, and our analysis of Navy information, a number of interrelated factors and issues contribute to maintenance delays for the surface ships based overseas including: Discovery of additional, unplanned work after maintenance is underway. According to maintenance officials in Bahrain and Japan, the discovery of the need for additional maintenance and repair work after the work planned for the maintenance period has been finalized is a key driver of maintenance delays. This additional work can be in the form of growth in the magnitude of planned work, or identification of the need for new work that was not previously planned. For example, maintenance officials in Japan attributed maintenance delays they experienced on ships at both Yokosuka and Sasebo during fiscal years 2016 through 2018 to this growth in planned work or new work. Similarly, officials in Bahrain said that growth and new work is one of many contributing factors to maintenance delays for the aging MCMs and PCs based there. For example, officials from Commander, Naval Surface Squadron Five that track their ships’ depot maintenance identified that additional work to stern tubes on the USS Squall, which is homeported in Bahrain, resulted in the ship’s maintenance schedule being extended by 137 days. Navy officials also stated that the reason growth and new work is such a key driver of delays is that it can add further delays beyond that needed to complete the repair, due to time required for additional contract actions and ordering parts that are needed to conduct the added work. A number of factors can cause or further exacerbate growth and new work, according to Navy officials. For example, the Navy has made efforts to catch up on backlogs of deferred maintenance and improve the health and condition of the ship, so the Navy may decide to extend the maintenance period to ensure all identified maintenance has been completed rather than deferring it to a subsequent maintenance period. Additionally, officials pointed to ships’ complex propulsion, communication, and weapons systems that have complicated maintenance and modernization requirements that cannot always be fully anticipated. Missing or late maintenance planning milestones. The Joint Fleet Maintenance Manual emphasizes the importance of meeting planning milestones to identify, estimate, and schedule the work to be done in the maintenance period. These milestones include steps to guide advanced planning of initial maintenance requirements and schedules, and to further refine and develop the work, cost, and schedule estimates for each maintenance period. For example, these milestones include assessments of the ship’s condition and other ship checks to identify and validate planned work intended to minimize growth and new work; to identify and mitigate risks to planned schedules; and to provide deadlines for developing and awarding contracts to do the work. Adherence to these planning milestones becomes more critical as the planned start of the maintenance period approaches to ensure work can be contracted and begun on time. The final contract is awarded about 2 months prior to work beginning, and the Navy finalizes the planned duration and schedule of the maintenance period about a month before maintenance is scheduled to begin. According to Navy officials, missing or late planning milestones can contribute to maintenance delays. For example, NAVSEA and overseas maintenance officials emphasized that getting on board a ship at various points in the planning process to assess the ship’s condition and validate planned work is critical to developing accurate work scope, cost estimates, and schedules—otherwise, growth and new work or other issues can emerge once maintenance is underway. According to the Joint Fleet Maintenance Manual, ship checks are needed to inform specific planning milestones, to validate planned work, and should be done as early in the planning process as possible. The Navy requires this validation to ensure needed maintenance work is sufficiently defined, problems are accurately diagnosed, and feasible resolutions are recommended. However, even though ship condition assessments are important milestones to limit growth and new work, NAVSEA officials part of Surface Team One said that these assessments and other checks are regularly postponed, which can prevent work from being identified with sufficient time to plan for it. Similarly, maintenance officials in Japan said that, due to the operational tempo in Yokosuka and Sasebo, ships are often not available for required ship checks until the ship arrives in port at the start of its maintenance period. Though officials could not provide the frequency that such milestones are missed, they said missing assessments and other milestones can contribute to schedule delays and result in maintenance periods exceeding planned resources. For example, the Naval Inspector General found that the shortage of personnel at the FDRMC and Fleet Logistics Center in Bahrain resulted in contracting milestones being routinely missed for ships based there, and once these ships were in maintenance, the growth in work to be completed grew by an average of $830,000 for maintenance periods in fiscal years 2017 and 2018. Shortages of experienced and skilled personnel for planning, management, and oversight. According to NAVSEA and overseas maintenance center officials, shortages of U.S. personnel that perform maintenance planning, contracting, and oversight roles, particularly staff with critical skills and experience, can affect ship maintenance and contribute to delays. For example: Personnel shortages hinder staffing of project teams. FDRMC Bahrain officials said that due to personnel shortages, they are often unable to assign staff to the project teams until the maintenance period starts. According to the Joint Fleet Maintenance Manual, a project team is assigned to manage an individual maintenance period, and is composed of personnel with specific skills and responsibilities. Additionally, according to CNRMC Instruction 4790.4B, the project team is responsible for key maintenance planning and execution activities and related milestones from as early as a year before the maintenance begins. CNRMC Instruction 4790.4B also states that such maintenance planning milestones are to aid in developing project plans, identifying and mitigating risks, and tracking progress of planning. Project teams are also responsible for overseeing contracted maintenance work and ensuring it meets quality standards. For example, prior to the start of the maintenance period, project teams are responsible for identifying and mitigating risks to completing maintenance within the planned schedule and budget. However, officials in Bahrain stated that as a result of persistent staffing shortages, they have been unable to staff these project teams until the maintenance period begins, and have also been unable to provide sufficient oversight of the contractors’ performance during the maintenance period, which has resulted in maintenance delays. Shortages of personnel with relevant experience affect management and oversight of maintenance. Officials in Japan and Bahrain stated that insufficient numbers of personnel with ship maintenance experience can negatively affect maintenance timeliness. For example, the Fleet Logistics Center in Bahrain—which manages the contracting process for ships based there—had only eight of 18 authorized U.S. civilian contracting-related positions filled, as of March 2019, according to officials. Additionally, of the filled positions, only one contracting officer had prior experience with ship maintenance contracting, according to Fleet Logistics Center officials. Officials in Japan said that experience levels of U.S. civilians at SRF-JRMC have decreased as a result of high turnover in recent years with the average amount of work experience for U.S. civilians managing ship maintenance in Sasebo declining from over 5 years in 2014 to 3 years in 2017. Staff shortages on ships affect crews’ ability to conduct maintenance. Navy officials also emphasized the importance of ship crews in identifying and providing needed maintenance work, but noted that ship crew shortages negatively affect on-board ship maintenance. This can increase the amount of work required during depot-level maintenance periods. In May 2017, we reported that reduced crew sizes contributed to maintenance being deferred and increased maintenance costs, and Navy officials and ships’ crews we spoke to in Japan and Bahrain stated that ships there continue to experience manning shortages. For example, from September 2018 through February 2019, nearly 30 personnel from Bahrain-based Navy organizations were temporarily assigned to ships based in Bahrain to fill manning shortages, according to Navy officials and information, including for maintenance-specific positions. According to maintenance officials overseas and in the United States, other factors also can add to the complexity of maintenance planning and contribute to delays including the length of time it takes to obtain spare parts overseas, availability of obsolete parts, and other challenges associated with maintaining aging ships, such as the MCMs and PCs, which are at or beyond their original service lives. The Navy uses a number of mechanisms to monitor the planning and execution of individual maintenance periods to track progress and mitigate possible risks. According to Navy documentation and officials, these mechanisms include: Individual homeports identify technical reasons for delays on individual maintenance periods. Maintenance centers overseas and in the United States monitor the planning and progress of individual maintenance periods. SRF-JRMC officials in Yokosuka, Japan, monitor ongoing and recently completed maintenance periods and may identify technical causes for ship delays. For example, new work was identified on the main reduction gear of the USS Barry that was not in the planned work package and led to delays, according to officials. Additionally, Commander, Naval Surface Squadron Five in Bahrain tracks instances of growth and new work during the depot- level maintenance periods for the PCs and MCMs based there, including tracking the specific number of delayed days attributed to certain issues. NAVSEA conducts regular meetings to report status of upcoming and ongoing maintenance. NAVSEA collects information on and monitors the progress of individual maintenance periods, including at overseas homeports, through a variety of regular meetings and briefings. For example, NAVSEA 04 and CNRMC each conduct biweekly meetings with their respective maintenance centers to monitor advanced planning of upcoming maintenance periods and the progress of ongoing maintenance periods for the ships under their responsibilities, according to officials. Information shared during these briefings can include tracking whether certain planning milestones are met and identifying risks to the on-time completion of individual ships’ maintenance periods. This information is then compiled into monthly briefings to the NAVSEA commander providing a snapshot of upcoming and ongoing maintenance periods and seeking approval for adjustments, according to officials. Collecting and sharing lessons learned throughout the planning process. According to the Navy’s maintenance manual and related guidance, the collection and sharing of lessons learned from individual maintenance periods is to be part of certain planning milestones, including to inform the maintenance schedule and work estimates. For example, CNRMC Instruction 4790.4B directs that maintenance completion conferences with relevant stakeholders are to provide a detailed review of the maintenance period, including lessons learned that can be used to plan future maintenance periods, such as to revise specific work items. According to CNRMC and NAVSEA 04 officials, lessons learned are collected at the end of each maintenance period and can be shared with other project teams. The Joint Fleet Maintenance Manual also states that while the lessons learned process is owned by the type commanders—for surface ships, these are Commander, Naval Surface Force, U.S. Pacific Fleet for ships in Japan and the western United States, or Commander, Naval Surface Force, U.S. Atlantic Fleet, for ships in Spain, Bahrain, and the eastern United States—the lessons learned process is part of the Surface Team One structure. However, Surface Team One officials noted that each of the milestones that include them is led by other Navy organizations, and its role in the lessons learned process is managed by a part-time contracted position. CNRMC tracks overall days of maintenance delay by fiscal year. CNRMC tracks and monitors the overall number of days individual ship maintenance periods are delayed and can perform analysis of overall delays, such as the number of days experienced by ship class and fiscal year. Additionally, CNRMC analysis has also identified specific ships that experience the longest delays, though it did not regularly include maintenance periods in Japan until 2018, according to officials. CNRMC tracks costs associated with growth and new work for individual maintenance periods. CNRMC tracks the costs associated with growth and new work discovered during maintenance periods by the regional maintenance centers it manages, including at overseas detachments in Bahrain and Spain. The costs that are tracked do not include information on any related delays, however, and do not include these costs for the ships in Japan. Other recent Navy efforts have begun to examine issues related to delays. According to Navy officials, several Navy entities are beginning efforts to improve the execution of surface ship maintenance. For example, in fiscal year 2019 the Navy began a broad effort to improve Navy surface ship, submarine, and aviation readiness, as well as public shipyards. This effort, called Performance to Plan, designates Commander, Naval Surface Forces, and Commander, NAVSEA, to improve performance of ship maintenance in private and public shipyards. According to Navy officials, the effort to improve surface ship maintenance consists of a pilot program examining how to better execute maintenance periods for destroyers, improve forecasts of maintenance period duration and assessments of ship condition, planning for growth and new work, and adherence to planning milestones. However, officials said this effort is still in the early stage and does not specifically assess maintenance delays for ships based overseas. NAVSEA’s SURFMEPP and Surface Team One also have recently begun related efforts. For example, SURFMEPP officials said they recently began an effort to examine and correct causes of growth and new work by analyzing changes to contracts or work items that result in more than $100,000 of additional cost. However, while officials said in July 2019 that this effort has been underway for about 9 months, they could not provide additional information on how it relates to delays. According to NAVSEA officials that co-chair Surface Team One, it has begun an effort to improve how adherence to key planning milestones is tracked across surface ship maintenance periods. To support this effort, in October 2018 the Navy updated the Joint Fleet Maintenance Manual to include additional requirements for meeting maintenance milestones and to document any changes, including reasons for those changes. However, according to officials, these efforts are in their early stages, and the Navy has not used the information to analyze maintenance delays for overseas ships. Although a number of different Navy entities conduct a variety of activities through which information on maintenance delays is collected and analyzed, these efforts are limited as the existing analysis is not comprehensive and systematic in nature. Specifically, the Navy has not positioned itself well to address the factors contributing to the maintenance delays because it has not (1) designated an individual entity responsible for conducting a single, comprehensive systematic analysis of overseas surface ship maintenance delays; and (2) developed a plan based on that analysis to address these delays. First, this is in part because the responsibilities for managing surface ship maintenance overseas is shared among NAVSEA 21, CNRMC, and NAVSEA 04, which use somewhat different processes for their work, according to officials. For example, NAVSEA 04 has responsibility for the maintenance of aircraft carriers and submarines at naval shipyards, while CNRMC focuses on surface ships. In addition, until SRF-JRMC was brought under control of NAVSEA in October 2018, CNRMC was not regularly including maintenance periods in Japan as part of its tracking and monitoring of days of maintenance delay. According to officials, an operating instruction to align roles, responsibilities, and processes for surface ship maintenance in Japan between CNRMC and NAVSEA 04 is being developed, but as of September 2019, this instruction had not yet been finalized. Further, CNRMC and NAVSEA 04 officials pointed to NAVSEA 21 or Surface Team One as more appropriate entities to conduct a comprehensive systematic analysis of ship maintenance delays given their broad, enterprise-wide roles for managing and improving surface ship maintenance. Surface Team One officials said that it could be an appropriate entity to conduct such analysis, and according to its charter, one of the entity’s purposes is to measure performance of the planning and execution of surface ship maintenance periods and to manage and improve schedule, cost, and quality. However, officials said they have not conducted such a systematic analysis of maintenance period performance or developed a comprehensive plan to address them, in part due to inconsistent organizational leadership and personnel turnover. According to officials, since its founding in 2009, Surface Team One has been re-chartered twice and is in the process of further reorganizing under a fourth version of its charter. Part of the reason for this reorganization, according to officials, is to resource and structure Surface Team One to conduct more systematic, enterprise-wide analyses of issues affecting surface ship maintenance, for which they hope to develop a plan by the end of 2019. However, officials said these efforts did not specifically include analysis of maintenance delays for ships based overseas. Additionally, while Navy officials said that Performance to Plan efforts could help inform overseas maintenance delays, this effort is in the early stages of a pilot effort looking only at destroyer maintenance, and does not specifically analyze maintenance delays for ships based overseas. Second, as a result of there being no single, comprehensive analysis of overseas surface ship maintenance delays, there is no plan for the Navy to improve the timeliness of its maintenance in a holistic way. Instead, individual organizations and maintenance centers have identified improvements for individual ships’ maintenance or have undertaken efforts to address certain contributing factors to delays. While these efforts are important, given the interrelated challenges related to maintenance across the Navy, and that the Navy is dependent upon synchronized and timely maintenance to provide ships for operations to meet national security needs, the Navy would benefit from a plan of action that was comprehensive in nature. Standards for Internal Control in the Federal Government state that management should assign responsibility to achieve objectives and remediate deficiencies; compare actual performance against planned performance; and evaluate deficiencies on both an individual basis and in the aggregate. Further, OMB Circular No. A-123, Management’s Responsibility for Enterprise Risk Management and Internal Control, emphasizes that when developing corrective actions, agencies should perform a root-cause analysis of the deficiency and ensure that subsequent strategies and plans address the root of the problem and not just the symptoms. Additionally, our past work on results-oriented management cites a number of key practices that can strengthen the use of performance information for process improvements. These practices include aligning agency-wide goals and measures, and building analytic capacity to use the information. Our past work has further shown this information should then be incorporated into improvement plans that include identifying analytically based goals; results-oriented metrics to measure progress; required resources, risks, and stakeholders to achieve those goals; and regularly reporting on progress. While several different Navy entities have a variety of efforts underway related to issues associated with ship maintenance delays, without designating an entity to conduct a comprehensive, systematic analysis to identify and understand the underlying causes maintenance periods grow beyond planned schedules, the Navy risks continuing to underestimate maintenance needs and the time and resources required to address them. Further, without conducting such an analysis to understand the underlying, interrelated causes of these delays, and incorporating this analysis into a comprehensive results-oriented plan to address them, the Navy cannot effectively target corrective actions to improve timely completion of ship maintenance to ensure ships are available for the critical training crews need and operations to support U.S. military and national security goals. The Navy is in the process of updating the maintenance approach for cruisers, destroyers, and amphibious ships based in Japan, but it has not assessed and mitigated risks that several challenges may pose to its successful implementation. Additionally, the Navy has not included assessments of overseas maintenance requirements in its long-range plans to support fleet growth to 355 ships. The Navy has developed a new maintenance approach for the cruisers and destroyers in Yokosuka and the amphibious ships in Sasebo based on the approach developed for destroyers in Spain. Specifically, the Navy developed a new maintenance approach for the four destroyers it began to deploy to Rota, Spain, in 2014 and 2015 that includes generally shorter, but more frequent, maintenance periods. According to maintenance center and other Navy officials, the Navy developed this approach to avoid conducting dry-dock maintenance overseas so that the Navy could maximize the time the ships were available for operations. According to officials, the Navy tailored this approach to the specific ships, mission, and maintenance resources available in Rota. For example, the four destroyers in Rota conduct patrols two ships at a time with predictable patrol schedules. With such specific operational and maintenance schedules officials said there is little margin for changes, and adjustments or delays could affect the ships’ operational availability to support their ballistic missile defense mission. Under this approach, the Navy completed the majority of its maintenance on these four ships during fiscal years 2014 through 2018 on time—with only 20 total days of maintenance delay, equating to a relatively low overall delay rate of 2.2 percent. Navy officials said that the new maintenance approach in Rota has been successful because the Navy: selected four ships with a high degree of commonality; for example, the ships were of similar age, systems, and equipment configuration, which helped facilitate planning for and conducting maintenance; ensured the ships received all needed maintenance and modernization before being sent to Spain, and arrived from the United States in good condition, which reduced the likelihood that they would require unexpected maintenance while overseas; designed the maintenance center and its staffing around the maintenance approach for the four destroyers; and coordinated with the contractor in Spain to ensure it had sufficient workforce and resources, including capacity to surge resources if additional work is discovered so that it can be completed on time. Based on the performance of the maintenance approach for destroyers in Spain, officials stated that the Navy began to develop a similar approach in 2016 for its ships in Japan. NAVSEA officials identified that shorter, more frequent maintenance could help ensure that its ships based in Japan received the maintenance they need, while also meeting their high operational demands. The Navy finalized a new maintenance approach for cruisers and destroyers in Yokosuka in December 2018, and was in the process of finalizing the maintenance concept for the amphibious ships in Sasebo, according to NAVSEA officials in June 2019. For example, like in Spain, the Navy has adjusted the schedules for the planned periods in Yokosuka to be shorter, but more frequent. Planning documents show that under the new approach for the destroyers in Yokosuka, the Navy plans to provide them with eight maintenance periods over approximately 8 years overseas before rotating the ships back to the United States. Previously, the Navy planned for destroyers in Japan to receive eight maintenance periods over an estimated span of over 16 years overseas under the prior approach. Under the new approach, the surface ships in Japan are expected to receive all required maintenance, including completing most or all backlogged maintenance according to officials, in the United States before relocating the ships to Japan. Additionally, while officials expect ships in Yokosuka to receive some dry-dock maintenance during their rotation overseas, the amphibious ships in Sasebo generally will not—similar to the arrangement for destroyers in Spain. As a result, the new maintenance approach expects that ships in Sasebo will accrue maintenance backlogs that must be resolved upon return to the United States. The Navy has decided to apply its new maintenance approach for cruisers, destroyers, and amphibious ships in Japan and in 2018 began initial implementation on certain ships already based there, but a number of challenges may pose risks to successful implementation of the strategy. Based on information from planning documents and officials, successful implementation relies on several planning assumptions that may be optimistic when compared to actual experience maintaining surface ships overseas and in the United States. Specifically, the new approach in Japan assumes that: Ships will receive robust, deep maintenance and modernization in the U.S. and meet their life-cycle health requirements prior to overseas assignment. Ships will receive and complete planned maintenance on time while overseas to maximize operational availability. Ships will rotate back to receive full maintenance in the United States after no longer than 9 years of overseas assignment. However, Navy officials and our analysis identified several challenges: (1) U.S. industrial base maintenance capacity limitations, (2) maintenance delays in the United States and overseas, (3) the ability of the overseas contractor industrial base to support future workload in Japan, and (4) differences in the operating environments between Spain and Japan. These challenges, which are discussed below in more detail, could pose risks to the successful implementation of the new maintenance approach. U.S. industrial base maintenance capacity limitations. Implementing the new maintenance approach in Japan assumes that the ships identified for deployment will receive all required maintenance and modernization in the United States prior to being based overseas. However, the Navy has been challenged to do this in the past due to limited domestic maintenance capacity. For example, the Navy deferred maintenance assessments of the condition of the USS Barry and USS Milius that were to take place in the United States before moving the ships to Japan. As a result, Navy officials said these assessments had to be done in Japan. Additionally, upon arriving in Japan in November 2017, the USS Barry had to begin immediate unscheduled maintenance to correct various issues, and as of our visit in February 2019, was still undergoing maintenance. According to U.S. Pacific Fleet and maintenance center officials, in fiscal year 2014 the USS Curtis Wilbur received modernization in Japan due to lack of capacity in the United States. Further, Navy planning documents identified U.S. commercial dry-dock capacity shortfalls that may hinder the Navy’s ability to support the future maintenance workload in the United States. For example, the Navy’s Long-Range Plan for the Maintenance and Modernization of Naval Vessels for Fiscal Year 2020 identified limited U.S. dry-dock capacity in the United States as posing a significant challenge to maintenance of U.S.-homeported ships and that this situation reduces the margin for schedule changes. According to the Navy’s analysis, demand for surface ship maintenance in the United States will exceed available maintenance resources for fiscal years 2019 through 2026. During this time, the Navy will be rotating ships based in the United States to exchange with those currently based in Japan and Spain. Navy officials said the capacity shortfall in the United States negatively affects ship condition and maintenance of ships sent to Japan. However, the Navy’s analysis does not account for the need to perform deep maintenance and modernization on ships in the United States before and after sending them to overseas homeports, as required by the new maintenance approach for ships bound for Japan, as well as Spain. Maintenance delays in the United States and overseas. Maintenance delays at both U.S. and overseas homeports may also affect the Navy’s implementation of its new maintenance approach. Successful implementation of the new approach depends in part on ships receiving all required maintenance on time prior to moving overseas, as well as receiving timely maintenance during their time based abroad. Our analysis of Navy surface ship maintenance periods that started in fiscal years 2014 through 2018 found that about 60 percent of maintenance periods in the United States ran 31 or more days beyond schedule. Additionally, our analysis shows that ships homeported at both U.S. and overseas locations experienced an average rate of delay of about 25 percent (see fig. 7). Additionally, rates of delay in Sasebo, where the Navy plans to implement one of its new maintenance approaches, exceed 30 percent. According to Navy officials, the new maintenance approach for ships in Japan is intended to provide more frequent maintenance periods, in an effort to improve ship maintenance and to maximize ships’ availability for operations. However, the approach also relies on most of these maintenance periods being shorter—and being completed on time. Given the Navy’s history of persistent maintenance delays in Japan, this could be a challenge. Further, Navy officials said that maintenance delays experienced in the United States could also affect the maintenance that ships bound for and returning from overseas homeports may receive, and pose a risk that maintenance will be deferred to overseas homeports. Challenges with overseas contractor industrial base meeting future workload in Japan. Navy maintenance officials in Spain said that successful implementation of the new maintenance approach there relied on sufficient contractor capacity overseas, and that the Navy involved the contractor in the development of the maintenance approach to ensure they could implement it. In contrast, Navy officials in Japan stated that current contractor capacity may not meet expected future workload. For example, Navy documentation shows that contractors performed almost two-thirds of ship maintenance in Sasebo in fiscal year 2018. Additionally, the documentation shows that maintenance planned for fiscal year 2020 is expected to increase beyond existing Navy and contractor capacity. Maintenance in Sasebo relies on a number of smaller contractors, and these contractors have experienced challenges planning for the unpredictable maintenance workload there, according to officials. Specifically, the amphibious ships based in Sasebo typically deploy as a group of three. As a result, Navy officials said the workload in Sasebo can be uneven. When all three ships return to port, they require maintenance at the same time. The Navy found that contractors have difficulty planning for this uneven workload, among other issues, which can deter contractors from bidding on work. For example, in fiscal year 2015, the Navy found that they were unable to award over 25 percent of work planned for contractors in Sasebo because no contractor bid on the work. The Navy plans to add a fifth amphibious ship in Sasebo in fiscal year 2020, in part to provide a more stable workload there, according to officials. The Navy expects the additional ship will also result in a forecasted increase in overall maintenance workload there. Navy officials also expressed concerns about the continuity of the existing industrial base in Yokosuka to be able to support future Navy needs. According to Navy documentation, in fiscal year 2018, about one-third of ship maintenance in Yokosuka was conducted by contractors, and, according to officials, the Navy relied on one main contractor to conduct much of this work. However, Navy maintenance center officials in Japan stated they have concerns about the continuity of the contractor to support this workload. The Navy has begun efforts to consider conducting maintenance at contractor facilities outside the ships’ homeports of Yokosuka and Sasebo. Specifically, the Navy has begun to consider using contractor facilities located outside the Yokosuka area, as far as 2 hours away from where the ships are currently based. For example, Navy officials told us that they conducted market research and outreach to potential contractors, and have awarded a small contract for a short continuous maintenance period to a new contractor about 30 minutes outside the Yokosuka area. However, maintenance and contracting officials stated these efforts face their own challenges. For example, conducting weeks or months of maintenance on a ship as far as 2 hours outside a ship’s homeport—where crews and families live—could require additional travel, housing, and other costs. Additionally, maintenance and contracting officials in Yokosuka stated that the substantial regulatory, legal, and Navy requirements that private companies must adopt to contract with the U.S. government might serve as disincentives for prospective Japanese contractors, and developing these contractors will take time. Differences in the operating environments in Japan and Spain. According to NAVSEA officials, the decision to apply the approach in Japan was based on its timely performance in Spain, but the ships, missions, and operating environment in Yokosuka and Sasebo differ substantially from the environment in Spain. For example: Greater diversity and number of ships in Japan. Navy officials told us that the four destroyers sent to Rota in 2014 and 2015 were specifically chosen with similar age, configuration, and condition, which made it easier to sustain the maintenance approach, since issues and lessons from one ship could be easily applied to the next. The ships in Japan in fiscal year 2019 consisted of a more diverse set of ships—eight destroyers and three cruisers in Yokosuka, and various classes of amphibious ships in Sasebo. According to officials, these ships are of different configurations and capabilities. Greater workload and staffing challenges in Japan. Navy officials have attributed the persistent maintenance delays experienced in Japan to insufficient U.S. maintenance prior to deployment, insufficient estimation of the maintenance work package, missed planning milestones, staffing challenges, and other causes, that are not currently being experienced in Rota. Less predictability in operational tempo in Japan. According to Navy officials in Rota, the four ships based there have the same mission, regular and predictable patrol schedules, and do not go above Navy deployment limits. Additionally, officials said the patrol schedules allow for some additional maintenance to be conducted when ships are in port, if needed. As a result, Navy officials in Rota said that they are able to meet key maintenance planning milestones such as conducting ship checks and other assessments. In Japan, however, Navy officials and operational commanders described operational tempo as more unpredictable, and that ships can be unavailable due to the operational demands of the varied missions with different timeframes for ships in Seventh Fleet’s area of responsibility. For example, according to Seventh Fleet officials, the cruisers and destroyers in Yokosuka are expected to serve a number of different missions, including conducting patrols around Japan or Guam; providing ship presence in the East China Sea; or escorting the carrier as part of the strike group. Additionally, according to Navy officials, operational tempo in Japan continues to be high, and in 2015 we reported that to meet increasing demands overseas, the Navy has extended deployments and increased operational tempo. Standards for Internal Control in the Federal Government state that it is a key responsibility of management to analyze and respond to identified changes and related risks, and to monitor program effectiveness. These standards also note that changing conditions often result in new risks or changes to existing risks that need to be assessed. Additionally, the April 2011 DOD Product Support Business Case Analysis Guidebook further states that each risk should be reviewed and assessed, and that effective mitigation plans may involve making tradeoffs in capabilities, schedule, and performance. However, NAVSEA officials said the Navy has not assessed the risks posed by these challenges to implementing its new maintenance approach in Japan. Instead, officials based the decision to implement the approach in Japan on the performance of the approach in Rota, Spain. Without a full assessment of the risks these challenges may pose to successful implementation of its new maintenance approach, and without identifying ways to mitigate any risks posed by these challenges, the Navy cannot ensure its overseas homeported ships complete all required maintenance as planned in support of fleet readiness needs. The Navy’s timeline for growing the fleet from 290 total ships (as of September 2019) to 355 ships shows that the largest increase will be in the number of surface ships. Specifically, the Navy plans to increase the number of surface ships in the fleet by a total of 48 ships in the next 15 years, or by 2034. However, the Navy’s long-range plans to grow its fleet do not consider the maintenance these ships will require while based or traveling overseas. The Navy’s Report to Congress on the Annual Long- Range Plan for Maintenance and Modernization of Naval Vessels for Fiscal Year 2020, which is intended to assess the maintenance and modernization requirements for the fleet as it grows, only assesses maintenance provided by private and public shipyards in the United States, not overseas. It does not identify or assess the maintenance requirements needed overseas—including those provided by Navy facilities or the contractor industrial base. Moreover, it does not identify overseas requirements, such as any expected changes in the number of ships based there or growth in the number of ships visiting overseas locations from the United States. For example: As the number of ships in the overall fleet grows, NAVSEA officials said they expect the number of ships based overseas to grow proportionally, and the number of U.S.-based ships conducting operations and exercises overseas to increase, thereby increasing overseas maintenance requirements. However, the expected increase in the fleet and associated maintenance requirements for ships based and visiting overseas were not included in the recent long-range plans. For example, according to officials, the Navy plans to base an additional amphibious ship in Sasebo, Japan, by fiscal year 2020, and the Navy is examining a possible increase to the number of destroyers in Rota, Spain. According to maintenance center officials in Rota, increasing the number of ships based in Rota would require additional planning to meet the Navy’s needs, such as negotiating with the Government of Spain to request additional capacity, such as pier space, for such future requirements. The Navy projects the number and type of ships based in Japan and Bahrain to change in the next few years. Specifically, the Navy plans to decommission the mine countermeasures (MCM) ships currently homeported in Japan and Bahrain by 2023 and replace them with littoral combat ships to perform the mine countermeasures missions. However, maintenance center officials in Bahrain stated that as of March 2019, plans for the overseas maintenance of littoral combat ships remained uncertain, even though officials expect the initial deployments of littoral combat ships to Bahrain to begin as early as 2020. Additionally, the Navy has not developed deployment timelines and overseas maintenance requirements for littoral combat ships in the Middle East and Western Pacific areas of operation, even though the USS Montgomery arrived in Singapore to begin its overseas rotational deployment in July 2019. According to Navy officials, the Navy expects long-term deployments of littoral combat ships to both areas of operation as the MCMs are decommissioned. Ships based in the United States also rely on voyage repair at overseas shipyards while conducting missions or patrols. For example, according to the Navy’s annual report to Congress listing all repairs and maintenance performed on Navy ships, in fiscal year 2018, the maintenance center in Bahrain conducted voyage repairs for the USS Monterey and USS Arleigh Burke, both based in Norfolk, Virginia, and the USS The Sullivans, based in Mayport, Florida. Additionally, voyage repairs were conducted in Japan for visiting Navy ships and submarines based in Washington and Hawaii. Standards for Internal Control in the Federal Government state that it is a key responsibility of management to consider changes within the environment and other factors, and analyze and respond to identified changes and related risks through methods such as strategic planning and other assessments. These standards also note that conditions affecting the organization and its environment continually change, and management can anticipate and plan for significant changes by using a forward-looking process. NAVSEA officials said that when planning for future growth, they have focused on analyzing U.S. industrial base issues and potential mitigations to increase capacity for U.S.-based ship maintenance as demand grows beyond existing dry docks and pier space. Officials said the Navy did not analyze overseas maintenance requirements or projected growth overseas to include in the long-range plan. According to NAVSEA officials, future iterations of long-term maintenance planning are to include analysis of the Navy’s overseas maintenance capacity, which Navy officials said could begin in March 2020. As the Navy continues its long-term maintenance planning, it will be important for the Navy to conduct and include analysis of anticipated overseas maintenance requirements given that substantial growth of surface ships is expected through 2034—including destroyers and amphibious ships, two types of ships currently based overseas. Without analyzing maintenance needs and requirements for ships based overseas, including any projected growth or other force changes, in its long-range plans, the Navy cannot ensure it is sufficiently planning for the total needs—and resulting readiness and health—of the future fleet. The Navy bases and maintains 38 surface ships—such as destroyers, cruisers, and amphibious ships, among others—at homeports outside of the United States. The 2018 National Defense Strategy has prioritized military readiness, which depends in part on ships completing maintenance on time, to ensure that the United States is positioned to respond to events quickly all over the world. Ship maintenance is a complex process involving numerous Navy and private industry stakeholders that devote substantial time and effort to ensure that ships receive the maintenance they need. Yet we have previously reported on the persistent delays and other challenges the Navy faces in completing maintenance on time both for ships in the United States and overseas. While a number of entities in the Navy have different efforts underway to examine individual ship maintenance issues, a comprehensive, systematic understanding of the underlying and interrelated causes for these delays is essential to implementing corrective actions to ensure these strategically based ships are able and ready for operations when needed. The Navy has also taken steps to adjust its maintenance strategies to improve ship maintenance while balancing the high operational demands for ships based in Japan. Additionally, the Navy has begun planning to grow the fleet, but the expected increase in the fleet and associated maintenance requirements for ships based and visiting overseas were not included in the recent long-range plans. Also, the Navy’s plans to implement updated maintenance strategies overseas, as well as to grow the total fleet, were developed without accounting for risks that challenges may pose to these strategies, as well as analysis of the necessary overseas maintenance requirements to sustain the Navy’s strategically important ships homeported or visiting overseas locations. Ensuring the Navy’s maintenance plans and capacity for the total fleet align with its plans for substantial future fleet growth will enhance the Navy’s ability to conduct timely maintenance of its overseas surface fleet, which, in turn, is essential to the Navy achieving its strategic goals. We are making a total of five recommendations to DOD. The Secretary of the Navy should assign responsibility to an entity to conduct a single, comprehensive systematic analysis of overseas surface ship maintenance delays. (Recommendation 1) The Secretary of the Navy should ensure the designated entity conducts a comprehensive, systematic analysis to identify the underlying, interrelated causes of overseas surface ship maintenance delays. (Recommendation 2) The Secretary of the Navy should use the results of the analysis to develop a plan to address surface ship maintenance delays overseas. Such a plan should incorporate results-oriented elements, including analytically based goals, identification of risks to achieving those goals, identification of required resources and stakeholders, metrics to measure progress, and regular reporting on progress. (Recommendation 3) The Secretary of the Navy should ensure that Naval Sea Systems Command assesses and mitigates risks posed by any challenges, such as persistent delays and capacity limitations, to successful implementation of its new maintenance approach in Japan. (Recommendation 4) The Secretary of the Navy should ensure that Naval Sea Systems Command conducts analysis to include overseas maintenance requirements as part of its long-term maintenance plan to support the planned growth and readiness of the fleet. (Recommendation 5) We provided a draft of this report to DOD for review and comment. In written comments provided by the Navy (reproduced in appendix VII), DOD concurred with our recommendations. The Navy also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of the Navy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact me at maurerd@gao.gov or (202) 512-9627. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. This report (1) describes existing maintenance capacity and approaches the Navy uses for surface ships based overseas, (2) assesses the extent to which the Navy completed maintenance periods as scheduled in fiscal years 2014 through 2018 and analyzes factors contributing to any delays, and (3) evaluates the extent to which the Navy has assessed any challenges facing future overseas ship maintenance efforts. The scope of this review includes the regularly scheduled depot-level maintenance of surface ships based overseas, the maintenance of which is generally the responsibility of Naval Sea Systems Command (NAVSEA). These ships comprised 38 of the 40 ships based overseas during the time period we analyzed, and consisted of the following ship classes: guided-missile cruisers (CG 47 class), guided-missile destroyers (DDG 51 class), mine countermeasures ships (MCM 1 class), patrol coastal ships (PC 1 class), amphibious assault ships (LHD 1 class), amphibious transport dock ships (LPD 17 class), dock landing ships (LSD 41 class), and an amphibious command ship (LCC 19 class). These ships were based overseas at homeports located in Japan, Spain, and Bahrain as of the end of fiscal year 2018. For objective one, to describe existing capacity and maintenance approaches the Navy uses for the regularly scheduled depot-level maintenance periods for the 38 surface ships based overseas during the time of our review, we reviewed Navy documents and information on the Navy’s overseas maintenance centers’ physical capacity and authorized workforce, local contractor industrial base and capacity, and other Navy organizations and commands responsible for planning, managing, and overseeing the maintenance of these ships. To examine physical capacity, we analyzed Navy information on U.S. and contractor facilities and equipment such as dry docks and information on future planning or improvements. We reviewed NAVSEA information and data on ship maintenance periods, as well as information and documentation on historic and forecasted workloads at each homeport, including the number and type of ships that have received maintenance at those shipyards. We also reviewed Navy maintenance plans and guidance that document Navy maintenance approaches and organizations at overseas homeports. We conducted site visits to three overseas homeports— Yokosuka and Sasebo, Japan, and Manama, Bahrain—where the Navy bases a majority of the surface ships overseas. We observed the physical capacity and operations of the maintenance centers and shipyards there, as well as the Forward Deployed Regional Maintenance Center (FDRMC) headquarters in Naples, Italy. We interviewed cognizant officials at Navy commands, numbered fleets, and maintenance centers, including officials at all the overseas maintenance centers responsible for ships based overseas: the U.S. Naval Ship Repair Facility and Japan Regional Maintenance Center (SRF-JRMC) in Yokosuka, Japan, and its detachment in Sasebo, and the FDRMC headquarters in Naples, Italy, as well as its two detachments—in Rota, Spain, and Manama, Bahrain. For objective two, to assess the extent to which maintenance schedules are completed as planned, we analyzed Navy data on regularly scheduled, depot-level maintenance periods for surface ships—including those maintained at overseas homeports and in the United States. NAVSEA collects and manages data on these maintenance periods— known as Chief of Naval Operations maintenance availabilities—for surface ships, submarines, and aircraft carriers. We obtained the data on surface ship depot-level maintenance periods used by NAVSEA’s Surface Maintenance Engineering Planning Program and the Commander, Navy Regional Maintenance Center (SURFMEPP). We used Navy data to identify depot-level maintenance periods conducted at each homeport starting in fiscal years 2014 through 2018 and to assess the extent to which maintenance schedules for ships based overseas were executed as planned from fiscal year 2014 through 2018, and the delays experienced. To assess the reliability of this data, we interviewed cognizant NAVSEA officials to understand system operating procedures, organizational roles and responsibilities, and any data limitations. NAVSEA provided information based on our questions regarding data reliability, including an overview of the data, data-collection processes and procedures, data quality controls, and overall perceptions of data quality. NAVSEA also provided documentation of how the systems are structured and what written procedures are in place to help ensure that the appropriate information is collected and properly categorized. We interviewed officials from SURFMEPP and CNRMC to obtain further clarification on data reliability, discuss how the data were collected and reported, and explain how we planned to use the data. Some of these data were used in prior reports, and their reliability had previously been assessed. In addition, we also assessed the reliability of the data by checking: (1) for missing data entries, (2) for duplicate records, and (3) to ensure the data was formatted consistently. We determined that the data were sufficiently reliable for the purposes of summarizing surface ship maintenance periods and related information at homeports both overseas and in the United States, including reporting on the duration of maintenance periods and the number of days of maintenance delays. Because maintenance periods may cross over one or more fiscal years, to be able to report on days ships spent in maintenance periods from fiscal years 2014 through 2018, we analyzed data on maintenance periods that began in fiscal years 2012 through 2018 for all surface ships included in the data, including those based at overseas and U.S. homeports. Specifically, we used the dates of the planned and actual durations of the maintenance periods in our data set to determine the total number of days ships spent in maintenance in fiscal years 2014 through 2018 and by how many days the maintenance periods were extended beyond their planned number of days—which the Navy refers to “days of maintenance delay.” To determine the total number of days ships spent in maintenance in each fiscal year, we allocated the number of days spent in maintenance periods according to the fiscal year in which the maintenance days occurred. After we calculated the number of days each maintenance period went beyond the planned duration, we allocated these days of maintenance delay to the fiscal years in which they occurred. To compare ship maintenance delays experienced at different homeports while accounting for the varying workload at each, we calculated days of maintenance delay as a percentage of the total number of days ships spent in maintenance periods each location, which resulted in a rate of delay that we could compare across homeports. In addition, we analyzed the number of maintenance periods that were completed on or ahead of time or were completed later than planned, and we examined these maintenance durations by the fiscal year in which the maintenance periods started. We interviewed officials to understand the reasons they identified for delays. We reviewed the actions the Navy has taken to identify, evaluate, and resolve these delays, including information in Navy policies, guidance, and documentation on the planning, management, and oversight of overseas ship maintenance. This information included the Joint Fleet Maintenance Manual and related Navy instructions, documents establishing maintenance requirements. We also reviewed Navy guidance and documentation on the planning and execution of maintenance for ships based overseas and in the United States, including documentation such as status briefings, planning documents, and lessons learned information identifying certain reasons for maintenance delays of individual maintenance periods. We interviewed cognizant Navy officials responsible for planning, managing, and conducting oversight for surface ship maintenance in the United States and overseas to understand how they produce and use this information to improve maintenance planning and execution. We compared this information to standards for planning, scheduling, and monitoring events to correct deficiencies and identify process improvements, including Standards for Internal Control in the Federal Government, which includes principles pertaining to oversight responsibility, evaluating issues, and remediating deficiencies; our Schedule Assessment Guide; and OMB Circular No. A-123, Management’s Responsibility for Enterprise Risk Management and Internal Control, which includes guidance on conducting a root-cause analysis when developing corrective actions. We also compared this information with our past work identifying best practices for results- oriented performance management and planning. For objective three, to assess the extent to which the Navy has assessed and mitigated challenges that may affect overseas ship maintenance efforts, including new maintenance approaches and future maintenance requirements as the Navy seeks to grow the fleet, we analyzed Navy documentation, NAVSEA data, and available information documenting challenges that affect maintenance overseas, as well in the United States. We also analyzed Navy efforts to address these challenges, as well as Navy plans for future fleet growth and maintenance workload, including the long-range plans for shipbuilding and maintenance as the Navy seeks to grow its fleet, as well as other studies and analyses pertaining to these plans. We interviewed cognizant Navy officials who plan, execute, and oversee overseas shipyards and maintenance, as well as operational commanders, to obtain their perspectives on issues and challenges associated with execution of ship maintenance. We compared this information to government standards for planning and monitoring events to assess changes in risk, correct deficiencies, and identify process improvements, including Standards for Internal Control in the Federal Government and DOD Product Support Business Case Analysis Guidebook. Logistics, Maintenance, and Industrial Operations (NAVSEA 04) Deputy Commander for Ship Maintenance and Modernization (NAVSEA 21) Commander, Navy Regional Maintenance Center (CNRMC) Surface Maintenance Engineering Planning Program (SURFMEPP) U.S. Naval Ship Repair Facility and Japan Regional Maintenance Center (Yokosuka, Japan, and detachment in Sasebo, Japan) Forward Deployed Regional Maintenance Center in Naples, Italy, and its detachments in Rota, Spain, and Manama, Bahrain Naval Supply Systems Command Fleet Logistics Centers in Yokosuka, Japan, and Manama, Bahrain U.S. Naval Forces Central Command U.S. Naval Forces Europe-Africa Human Resources Office for Commander Navy Region Europe, Africa, Southwest Asia (CNREURAFSWA) We conducted this performance audit from August 2018 to February 2020 in accordance with generally accepted government auditing standards. Those standards require we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. History and Mission The Ship Repair Facility and Japan Regional Maintenance Center (SRF-JRMC) was originally created in 1947 as the Ship Repair Department, and in 1951 became the Ship Repair Facility. In 2004 it became the combined SRF-JRMC. Headquartered in Yokosuka, SRF- JRMC provides oversight and support to its detachment in Sasebo and is responsible for the maintenance for ships based in Yokosuka. SRF-JRMC also provides technical assistance and voyage repairs for Navy ships visiting Japan. U.S. Navy Surface Ship Maintenance Snapshot Surface Ships Maintained in Yokosuka as of Fiscal Year 2018 8 Guided-missile destroyers (DDG) 3 Guided-missile cruisers (CG) 1 Amphibious command ship (LCC) Fiscal Year 2018 Authorized SRF-JRMC Workforce U.S. Civilians: 272 U.S. Navy: 108 Japanese nationals: 2,341 (paid for by the Government of Japan) In 2018, the Navy finalized a new maintenance approach for cruisers and destroyers based in Yokosuka. This approach relies on deep maintenance in the United States prior to ships moving to Japan, and increases the frequency of maintenance periods while ships are in Japan. The Navy has begun efforts to identify additional private companies to conduct ship maintenance to meet future planned workload, according to Navy officials. History and Mission The Ship Repair Facility and Japan Regional Maintenance Center (SRF-JRMC) detachment in Sasebo was originally designated as the Sasebo Office to the Ship Repair Facility in Yokosuka in 1976, and made a detachment in 1984. The SRF-JRMC detachment is responsible for supporting the maintenance for the eight surface ships based in Sasebo, and can provide technical assistance and other maintenance to ships in and visiting Japan. U.S. Navy Surface Ship Maintenance Snapshot Surface Ships Maintained in Sasebo as of Fiscal Year 2018 1 Amphibious Assault Ship (LHD) 1 Amphibious Transport Dock (LPD) 2 Dock Landing Ships (LSD) 4 Mine Countermeasures Ships (MCM) Fiscal Year 2018 Authorized SRF-JRMC Workforce U.S. Civilians: 65 U.S. Navy: 40 Japanese nationals: 450 (paid for by the Government of Japan) U.S. Navy Surface Ship Maintenance Snapshot Surface Ships Maintained in Rota as of Fiscal Year 2018 4 Guided-missile destroyers (DDG) Fiscal Year 2018 Authorized FDRMC Workforce U.S. Civilians: 73 U.S. Navy: 8 Future Considerations The Navy plans to rotate the four current ships back to the United States beginning in 2020 through 2022. FDRMC officials said the next set of ships will not be as standardized as the first four. Additionally, the Senate Armed Services Committee has directed the Navy to assess the feasibility of increasing the number of guided-missile destroyers based in Rota from four to six. FDRMC officials said increasing the number of ships would require additional staff and physical infrastructure that would need to be negotiated with the Spanish government. History and Mission The Forward Deployed Regional Maintenance Center detachment in Bahrain (FDRMC Detachment Bahrain) was established in June 2014. FDRMC Detachment Bahrain manages the maintenance of ships based there, and can provide fleet technical assistance and coordinate voyage repairs for other ships in the U.S. Fifth Fleet area of operations including Military Sealift Command ships and visiting U.S. Navy ships. FDRMC Detachment Bahrain manages the maintenance for the most homeported ships of all overseas locations. U.S. Navy Surface Ship Maintenance Snapshot Surface Ships Maintained in Manama as of Fiscal Year 2018 10 Patrol Coastal Ships (PC) 4 Mine Countermeasures Ships (MCM) Fiscal Year 2018 Authorized FDRMC Workforce U.S. Civilians: 87 U.S. Navy: 29 Foreign nationals: 14 Future Considerations Beginning in fiscal year 2020, the Navy will decommission U.S.-based MCMs to provide spare parts to MCMs overseas. The Navy plans to decommission the MCMs and PCs in Bahrain in fiscal years 2023 and 2026, respectively. The Navy plans to replace the MCM mission with littoral combat ships but has not finalized plans for their deployment or maintenance, according to Navy officials. In addition the contact named above, the following staff members made key contributions to this report: Suzanne Wren (Assistant Director), Sally Williamson (Analyst in Charge), David Ballard, Martin De Alteriis, Alexandra Gonzalez, Amie Lesser, Shahrzad Nikoo, Carol Petersen, Clarice Ransom, Rachel Schultz, and Samuel Woo. Navy Maintenance: Persistent and Substantial Ship and Submarine Maintenance Delays Hinder Efforts to Rebuild Readiness. GAO-20-257T. Washington, D.C.: December 4, 2019. Naval Shipyards: Key Actions Remain to Improve Infrastructure to Better Support Navy Operations. GAO-20-64. Washington, D.C.: November 25, 2019. Navy Readiness: Actions Needed to Evaluate the Effectiveness of Changes to Surface Warfare Officer Training. GAO-20-154. Washington, D.C.: November 14, 2019. Military Depots: Actions Needed to Improve Poor Conditions of Facilities and Equipment that Affect Maintenance Timeliness and Efficiency. GAO- 19-242. Washington, D.C.: April 29, 2019. Military Personnel: Strategy Needed to Improve Retention for Experienced Air Force Aircraft Maintainers. GAO-19-160. Washington, D.C.: February 5, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Military Readiness: Analysis of Maintenance Delays Needed to Improve Availability of Patriot Equipment for Training. GAO-18-447. Washington, D.C.: June 20, 2018. Navy Shipbuilding: Past Performance Provides Valuable Lessons for Future Investments. GAO-18-238SP. Washington, D.C.: June 6, 2018. Weapon Systems Annual Assessment: Knowledge Gaps Pose Risks to Sustaining Recent Positive Trends. GAO-18-360SP. Washington, D.C.: April 25, 2018. Military Readiness: Clear Policy and Reliable Data Would Help DOD Better Manage Service Members’ Time Away from Home. GAO-18-253. Washington, D.C.: April 25, 2018. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Affecting the Fleet. GAO-17-809T. Washington, D.C.: September 19, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions that Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Facing the Fleet. GAO-17-798T. Washington, D.C.: September 7, 2017. Navy Shipbuilding: Policy Changes Needed to Improve the Post-Delivery Process and Ship Quality. GAO-17-418. Washington, D.C.: July 13, 2017. Department of Defense: Actions Needed to Address Five Key Mission Challenges. GAO-17-369. Washington, D.C.: June 13, 2017. Navy Force Structure: Actions Needed to Ensure Proper Size and Composition of Ship Crews. GAO-17-413. Washington, D.C.: May 18, 2017. Navy Ship Maintenance: Action Needed to Maximize New Contracting Strategy’s Potential Benefits. GAO-17-54. Washington, D.C.: November 21, 2016. Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Defensed Civilian Compensation: DOD and OPM Could Improve the Consistency of DOD’s Eligibility Determinations for Living Quarters Allowances. GAO-15-511. Washington, D.C.: June 16, 2015. Navy Force Structure: Sustainable Plan and Comprehensive Assessment Needed to Mitigate Long-Term Risks to Ships Assigned to Overseas Homeports. GAO-15-329. Washington, D.C.: May 29, 2015.", "summary": "To meet operational demands, the Navy has doubled the number of ships based overseas since 2006. Navy ships based abroad represent about 14 percent of the total fleet and are there to provide presence, deter threats, quickly respond to crises, and build partnerships. Effective and timely maintenance is essential to meet strategic objectives, fulfill operational requirements, and ensure ships reach their expected service lives. House Report 115-676 included a provision that GAO assess maintenance for ships based overseas. This report: (1) describes existing maintenance capacity and approaches the Navy uses for surface ships based overseas, (2) assesses the extent to which the Navy completed maintenance periods as scheduled in fiscal years 2014 through 2018 and analyzes factors contributing to any delays, and (3) evaluates the extent to which the Navy has assessed any challenges facing future overseas maintenance efforts. To address these objectives, GAO analyzed Navy policies and maintenance data from fiscal years 2012 through 2018, and interviewed officials, including from Naval Sea Systems Command and overseas fleets and maintenance centers. The Navy maintains the 38 surface ships based in Japan, Spain, and Bahrain through a mix of Navy-operated facilities and private contractors. The Navy uses different maintenance approaches at each location depending on the number and type of ships based there and the Navy and private contractor industrial base available to provide maintenance support. For example, to support the 12 surface ships based in Yokosuka, Japan, the Navy uses both private contractors and its Ship Repair Facility and Japan Regional Maintenance Center, which is subsidized by the government of Japan. In Rota, Spain, the Navy relies on one Spanish contractor to maintain the four ships based at that location. Maintenance on surface ships based overseas took longer than planned for 50 of the 71 maintenance periods—or about 70 percent—started during fiscal years 2014 through 2018. More than half of these maintenance delays lasted a month or longer, which reduced the ships' availability for training and operations. Various factors contribute to delays, such as discovery that unanticipated additional repairs are needed, missed planning milestones, or shortages of key staff. However, the Navy's efforts to understand delays often solely focus on individual maintenance periods and result in steps to improve specific issues related to maintenance timeliness. The Navy has not conducted a comprehensive analysis of maintenance delays to systematically identify and address their root causes. Without such an analysis, the Navy cannot effectively target corrective actions, and risks continuing to underestimate maintenance needs and the time and resources required to address them. The Navy has developed a new maintenance approach for ships in Japan, but has not assessed the risks associated with this approach or analyzed the overseas maintenance requirements for a growing fleet. The new maintenance approach calls for ships to obtain all required maintenance in the United States before and after going overseas, among other things. The Navy decided to implement this approach in Japan based on use of the approach in Spain—where ships have experienced few maintenance delays. However, the Navy has not assessed the risks posed by differences between the operating environments in Spain and Japan, or by shortfalls in maintenance capacity at U.S. facilities. The Navy also plans to replace aging ships in Bahrain as it grows the fleet to 355 ships, but it did not analyze or include overseas maintenance requirements in its long-range plan. Without assessing the risks challenges may pose to the success of its new maintenance approach in Japan or analyzing the requirements of a growing fleet, the Navy could be hindered in its ability to ensure these ships are ready and available for operations. GAO is making five recommendations, including that the Navy comprehensively analyze and address maintenance delays, and assess the risks and analyze requirements of future overseas maintenance efforts. The Navy concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The Direct Loan program provides financial assistance to students and their parents to help pay for postsecondary education. Under the Direct Loan program, Education issues several types of student loans (see sidebar). Current William D. Ford Federal Direct Loan Types Subsidized Stafford Loans: Available to undergraduate students with financial need (generally the difference between their cost of attendance and a measure of their ability to pay, known as expected family contribution). Borrowers are not responsible for paying interest on these loans while in school and during certain periods of deferment, an option that allows eligible borrowers to temporarily postpone loan payments. Unsubsidized Stafford Loans: Available to undergraduate and graduate school students irrespective of financial need. Borrowers must pay all interest on these loans. PLUS Loans: Available to graduate student borrowers and parents of dependent undergraduates. Borrowers must pay all interest on these loans. Consolidation Loans: Available to eligible borrowers wanting to combine multiple federal student loans (including those listed above) into one loan. Repayment periods are extended up to a maximum of 30 years, thereby lowering monthly payments. Interest rates for these loans are tied to the Department of the Treasury’s 10-year note rate and can vary by loan type. In addition, there are limits on the annual and aggregate amounts that can be borrowed for certain loan types. After a prospective borrower applies for and is awarded a Direct Loan, Education disburses it through the borrower’s school. Once the loan is disbursed, it is assigned to one of nine loan servicers under contract with Education. These loan servicers are responsible for such activities as communicating with borrowers about the status of their loans, providing information about and enrolling borrowers in repayment plans, and processing payments. Once borrowers leave school, they are responsible for making payments directly to their assigned loan servicer. A variety of repayment plans are available to eligible Direct Loan borrowers, including Standard, Graduated, Extended, and several IDR plans. Borrowers are automatically enrolled in the Standard plan if they do not choose another option, and generally make fixed monthly payments over a period of 10 years. IDR plans can ease repayment burden by setting monthly loan payments based on a borrower’s income and family size and extending the repayment period up to 20 or 25 years, depending on the plan. Unlike Standard, Graduated, and Extended repayment plans, IDR plans offer loan forgiveness at the end of the repayment period and monthly payments may be as low as $0 for some borrowers. There are a variety of IDR plans, and these plans have differences in eligibility requirements, how monthly payment amounts are calculated, and repayment periods before potential loan forgiveness (see table 1). To participate in an IDR plan, borrowers must submit an application to their loan servicer that, among other things, includes information about their income, marital status, and family size (see table 2). According to Education, Education’s loan servicers review the information borrowers submit on their IDR applications to determine if borrowers are eligible for IDR plans. If the servicer determines that a borrower is eligible, it enrolls the borrower in an IDR plan and calculates the borrower’s monthly payment amount. To continue making monthly payment amounts based on income and family size, IDR borrowers must annually submit the IDR application form certifying their income and family size, which servicers then use to update monthly payment amounts. If a borrower’s income changes significantly prior to the borrower’s annual recertification date, the borrower can use the same application form to request a recalculation of the monthly payment amount (see fig. 1). However, borrowers are not required to report any such changes before their annual recertification date. If IDR borrowers do not have any discretionary income, their scheduled monthly payment amount is zero dollars (meaning they will not have to make a monthly loan payment until their discretionary income is high enough to warrant one). Scheduled monthly payments of zero dollars count as qualifying payments towards eventual loan forgiveness at the end of the 20- to 25-year repayment period. Borrowers who make monthly payments on IDR plans that are much lower than they would be under the Standard 10-year repayment plan for a long period of time may end up paying less than their original loan amount because their remaining loan balances may be forgiven. However, some borrowers on IDR plans will fully repay their loans before qualifying for forgiveness. Extending the repayment period may also result in some borrowers paying more interest over the life of the loan than they would under the 10-year Standard repayment plan. Fraud in federal programs occurs when individuals or entities intentionally misrepresent themselves in order to benefit from the programs. Fraud poses a significant threat to the integrity of federal programs and erodes public trust in government. Federal programs are at risk for fraud when individuals have both the opportunity and incentive to commit fraud. Although the occurrence of one or more cases of fraud indicates there is a fraud risk, a fraud risk can exist even if fraud has not yet been identified or occurred. Proactive fraud risk management is meant to facilitate a program’s mission and strategic goals by ensuring that taxpayer dollars and government services serve their intended purposes. In July 2015, GAO issued the Fraud Risk Framework, which provides a comprehensive set of components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The Framework recommends that to effectively manage fraud risks, managers should design and implement specific control activities to prevent and detect potential fraud, such as data analytics. After issuance of the Fraud Risk Framework, the Fraud Reduction and Data Analytics Act of 2015 was enacted to improve federal agency controls and procedures to assess and mitigate fraud risks, and to improve agencies’ development and use of data analytics for the purpose of identifying, preventing, and responding to fraud. The act requires agencies to establish financial and administrative controls that incorporate the Fraud Risk Framework’s leading practices. We previously reported that Education identified itself as subject to the act. Error also poses a risk to the integrity of federal programs. According to federal internal control standards, to maintain an effective internal control system, managers should use quality information to achieve agency objectives. This includes obtaining information from reliable sources that is reasonably free from errors and communicating it externally to achieve objectives. Our analysis of Education’s IDR plan data and HHS’s NDNH wage data for borrowers who reported zero income found that about 95,100 approved IDR plans (11 percent of all IDR plans we analyzed) were held by borrowers who may have had sufficient wages to warrant a monthly student loan payment. These plans were held by about 76,200 unique borrowers who owed nearly $4 billion in outstanding Direct Loans as of September 2017. According to our analysis, 34 percent of these plans were held by borrowers who had estimated annual wages of $45,000 or more, including some with estimated annual wages of $100,000 or more (see fig. 2). Our results from matching the Education and HHS data indicate the possibility that some borrowers misrepresented or erroneously reported their income, highlighting the risk of potential fraud and errors in IDR plans. Borrowers may have a financial incentive to commit fraud to reduce their monthly payment amount and, by extension, possibly increase the amount of loan debt forgiven at the end of their repayment periods. However, we cannot determine whether fraud occurred through data matching alone. Where appropriate, we are referring these results to Education for further investigation. Among the 76,200 borrowers in our data matching results, it is possible that some accurately reported zero income even though they had wages reported in NDNH in the same quarter in which their IDR application was approved. For example, a borrower may have earned wages at the start or end of a quarter, but was not earning wages at the time of submitting the IDR application. Conversely, our analysis cannot identify borrowers who may have earned additional taxable income that is not part of NDNH data, but should be included on IDR applications, such as income for individuals who are self- employed or receiving alimony. Regarding the potential for error, officials from Education and all four loan servicers we spoke with stated that it is possible that borrowers could incorrectly report that they had no taxable income. Officials from Education said, for example, that borrowers may misunderstand the question about taxable income on the IDR application, and one loan servicer, echoing this perspective, stated that some borrowers may mistakenly think that some of their income is nontaxable when it is in fact taxable. To examine how borrowers’ failure to report their income could affect the amount repaid to Education over the course of a year, we used Education’s online repayment estimator to illustrate how much hypothetical borrowers with different annual adjusted gross incomes would expect to pay under each IDR plan (see fig. 3). If a borrower at one of these income levels instead reported zero income on the IDR application, Education could lose thousands of dollars per borrower each year in student loan payments. Such a situation could also potentially increase the ultimate cost to the federal government and taxpayers for loan forgiveness because scheduled monthly payments of zero dollars count toward the borrower’s 20- or 25-year repayment period. To examine the extent to which Education’s IDR plan data on family size may indicate potential fraud or error, we analyzed the family sizes for about 5 million IDR plans approved between January 1, 2016 and September 30, 2017. Of these plans, over 2.1 million (43 percent) were approved with a family size of one, meaning only the borrower was included (see fig. 4). In addition, over 2.6 million plans (52 percent) were approved with family sizes of two to five. At the high end of the spectrum, about 40,900 of the plans we analyzed (about 1 percent) were approved with family sizes of nine or more (see fig. 5). We consider IDR plans with family sizes of nine or more atypical or outliers because they comprise the top 1 percent of all family sizes in Education’s data. Of these plans, almost 1,200 had family sizes of 16 or more, including two plans held by different borrowers that were approved with a family size of 93. In total, the 40,900 plans approved with family sizes of nine or more corresponded to about 35,200 unique borrowers who owed almost $2.1 billion in outstanding Direct Loan debt as of September 2017. While IDR plans with family sizes of nine or more were atypical in our data and could indicate fraud or error, IDR plans with smaller or more typical family sizes could also pose problems. Borrowers may have a financial incentive to commit fraud because larger family sizes reported on the IDR application can reduce borrowers’ discretionary income and, by extension, their monthly payment amounts. Regarding the potential for error, officials from Education and all four loan servicers we spoke with said borrowers or loan servicers may inadvertently make mistakes related to family size. For example, officials from Education and one loan servicer said borrowers sometimes report inaccurate family sizes if they are confused about who to count as a member of their family. Officials from this loan servicer told us that a borrower initially applied for an IDR plan claiming a family size of five— himself and four other family members who were not his spouse or children. They said that during a subsequent phone call with loan servicer staff about the borrower’s loan, the borrower volunteered that the other members of his family did not live with him, meaning that for IDR purposes, he had a family size of one. It is unclear whether this borrower may have misrepresented his family size to receive a lower monthly payment or did not understand the definition and reported it in error. In regards to loan servicer error, Education officials said that servicers may make mistakes when entering family sizes from paper applications into their computer systems or when determining the total family size because borrowers provide information on family members in up to three places on the application. To examine the effect of family size on monthly payment amounts in IDR plans, we used Education’s online repayment estimator to illustrate how much hypothetical borrowers with the same income but different family sizes would be expected to pay each month under certain IDR plans. We found that a hypothetical borrower with a family size of one and an adjusted gross income of $40,000 who enrolls in one of three IDR plans that base monthly payment amounts on 10 percent of discretionary income would have a monthly payment amount of $182 (see fig. 6). If this borrower instead reported a family size of two people, the monthly payment amount would decrease by $54, to $128. For each additional person, the monthly payment would decrease by $54. At a family size of five people, the borrower would have no monthly payment. Education does not have procedures to verify borrower reports of zero income nor, for the most part, procedures to verify borrower reports of family size; although there are approaches it could use to do so. Because income and family size are the basis for calculating borrowers’ monthly payment amounts for IDR plans, it is important that this information is accurate on IDR applications. While Education instructs loan servicers to review tax returns and other documentation of taxable income that borrowers are required to provide, as previously discussed, borrowers are not required to provide documentation to support self-attestations of zero income or their family size on IDR applications. Officials from Education and all four loan servicers we spoke with said that servicers are generally instructed to take these self-attestations at face value. However, Education has limited, voluntary procedures for reviewing family size information submitted by borrowers. In 2016, Education implemented a voluntary procedure for loan servicers to contact borrowers who report changes in family size of four or more from one year to the next in order to verify the accuracy of the most recently reported family size. Education officials told us that servicers are not contractually required to follow this procedure. In addition, this procedure is not applicable to student loan borrowers when they initially apply for IDR plans. In October 2018, Education officials told us they began to follow up with loan servicers about family sizes of 20 or more in IDR program data to ensure these data match the family size information in the loan servicer systems from which they originated. Officials said that this process is to ensure that family size data were accurately transferred from servicers to Education. Borrowers are not contacted for verification of the information itself. Officials from Education and three of the four loan servicers we spoke with acknowledged that IDR plans are at risk for fraud or error because verification is generally not performed on borrower reports of zero income and borrower reports of family size. Officials from Education and two of the loan servicers also said that certain program requirements discourage borrowers from providing false information. For example, borrowers are required to sign the IDR form to certify that all provided information is true, complete, and correct, and the form warns borrowers that false statements or misrepresentations are subject to penalties including fines, imprisonment, or both. However, the extent to which this requirement may serve as a deterrent is unknown because Education has not assessed the risk of fraudulent reports on IDR applications. Moreover, Education officials told us that they were not aware of any IDR borrowers being investigated or facing penalties for providing false information on the IDR application. Officials from one loan servicer also said that borrowers may be deterred from falsely claiming zero income or misrepresenting their family size because they assume that servicers, acting on behalf of the government, can check the information on IDR applications. However, it is also possible that borrowers would assume that this self-reported information would not be routinely verified because the only documentation requirements discussed on the application relate to verifying taxable income. Education officials also said that the risk of borrowers providing inaccurate information on IDR applications must be balanced against the impact of adding verification procedures. They said additional procedures could make the already complex IDR application process more burdensome for borrowers to navigate and result in longer application processing times. While it is important to make IDR plans accessible to borrowers who could benefit from them, it is also important that Education design internal control activities to achieve program objectives and respond to risks, including addressing the risk of fraud and error in borrower self-reported information. GAO’s Fraud Risk Framework describes the importance of developing procedures for preventing, detecting, and responding to the risk of fraud in government programs. The risk of fraud exists when there is opportunity and incentive to commit it. The lack of verification of borrower reports of zero income and limited verification of borrower reports of family size on IDR applications creates the opportunity for borrowers to commit fraud. Because lower income and larger family sizes can reduce borrowers’ monthly payment amounts and, by extension, possibly increase the amount of loan debt forgiven at the end of their repayment periods, there is also an incentive for some borrowers to commit fraud. In regard to error, federal internal control standards state that agencies should obtain information from reliable sources that are reasonably free from error. Education officials and all four loan servicers told us that borrower-reports of family size or zero income can be susceptible to error if, for example, borrowers misunderstand the definitions of these items on IDR applications. Addressing the risk of fraud and error would also help to minimize the costs associated with IDR plans that are passed on to the government and taxpayers. As more borrowers enter IDR plans, the costs of these plans—including loan forgiveness—increase for the government and taxpayers. Using data underlying the President’s fiscal year 2017 budget request, GAO previously reported that Education estimated Direct Loans repaid with IDR plans would cost the federal government about $74 billon over their repayment periods. In its fiscal year 2015-2019 strategic plan for Federal Student Aid, Education acknowledged that as IDR plans continue to grow in popularity, the cost of loan forgiveness could be a major issue for the federal government. Education can minimize the costs associated with IDR plans by ensuring payment amounts are based on accurate income and family size information. Education has not fully leveraged available approaches to help detect and prevent fraud or error in IDR plans. Federal internal control standards call for agency management officials to identify, analyze, and respond to risks related to achieving program objectives, such as the risk of using potentially fraudulent or erroneous information about borrowers to calculate monthly payment amounts for student loans. Approaches, such as using data analytic practices and follow-up procedures, can help identify and address these risks. Two data analytic practices that can help identify such risks with respect to IDR plans are (1) anomaly detection to identify atypical or unusual information about borrowers and (2) data matching with outside data sources to verify information that borrowers provide. These practices, which can be used on their own or together, can help prevent fraud from occurring and detect potential fraud or error that may have occurred. Because data analytics alone may not be sufficient to determine whether fraud or error has occurred, follow-up procedures can then be used in the investigation and verification to make such determinations. A leading practice in data analytics in GAO’s Fraud Risk Framework is conducting data mining to identify suspicious activity or transactions, including anomalies, outliers, and other red flags in the data. Similar to our family size analysis, borrower-reported family sizes above a certain threshold on IDR applications could be flagged in loan servicers’ and Education’s data systems for further verification. Anomaly detection is used to a limited extent to identify errors in family size on IDR plans by one loan servicer and by Education. According to officials at Education and all four loan servicers we spoke with, anomaly detection is not used to systematically identify potentially fraudulent reports of family size. Anomaly detection can also identify deviations from expected patterns in data over time. Because IDR borrowers are required to fill out applications annually, it would be possible to develop automated queries to look for unusual patterns in borrower-reported income and family size from one year to the next. Officials from Education and servicers described several patterns across applications that could indicate potential fraud, specifically large swings in income from one year to the next, reporting zero income for multiple years, and having a large family size, but relatively low income. Another leading practice for data analytics in GAO’s Fraud Risk Framework is conducting data matching to verify key information, including self-reported data and information necessary to determine eligibility. The results of our analysis illustrate the usefulness of this technique to identify potential inconsistencies in the income information on IDR plans. Education does not have authority to access wage data from HHS’s NDNH or income data from the Internal Revenue Service (IRS) for the purpose of verifying IDR borrowers’ income information through data matching. However, private data sources are also available for data matching. We reported in 2016 on the benefits of government agencies using private data to address the risk of fraud. Moreover, some state agencies (such as those administering the Supplemental Nutrition Assistance Programs) use a private, commercial verification service known as The Work Number® to help determine eligibility for government assistance. We reported in 2016 that 45 states used income information from The Work Number to help determine eligibility for food assistance benefits under the Supplemental Nutrition Assistance Program. Education may also be able to draw on follow-up procedures it has in place for verifying information submitted by students and their families when applying for federal student aid using the Free Application for Federal Student Aid (FAFSA). Education uses a process called “verification” to help identify and correct erroneous or missing information on the application to aid the department’s efforts to reduce improper payments of federal student aid. Each award year, a portion of FAFSA applications are selected for verification, and schools are required to work with the selected applicants to obtain documentation and confirm the accuracy of information provided on these applications. When selecting FAFSAs for verification, Education aims to select those applications with the highest statistical probability of error and the greatest impact of such error on award amounts. FAFSA applicants who are selected to verify their income for the 2018-2019 or 2019-2020 award years may provide a signed copy of their prior years’ tax returns. FAFSA applicants may also obtain documentation from the IRS through the IRS Data Retrieval Tool, an IRS tax return transcript, or an IRS Verification of Non-filing Letter. FAFSA applicants selected to verify their household size must provide a signed statement that provides the name, age, and relationship to the student of each person in the household. For IDR plans, Education could implement follow-up procedures for IDR applications it identifies as at risk for fraud or error and seek additional documentation from borrowers. For example, to verify reports of no income, borrowers could be asked to provide an IRS Verification of Non- filing Letter, documentation that the borrower recently lost a job, or documentation that shows income the borrower receives is nontaxable, such as public assistance benefits. To verify family size, as is the case with FAFSA verification, borrowers could be asked to provide a signed statement with the names, ages, and relationship to the borrower of each family member. Another option might be to request that borrowers provide documentation showing that family members (other than the borrower’s spouse and children) receive mail at the borrower’s address as well as documentation of the financial support provided by the borrower. Such follow-up procedures would be consistent with federal internal control standards advising managers to design control activities to achieve program objectives and respond to risks. While Income-Driven Repayment plans can help borrowers with limited incomes afford their monthly student loan payments, these plans can also result in high costs to the federal government and taxpayers. To minimize these costs, it is important that Education accurately determine monthly payment amounts under its IDR plans. Because these determinations are based on income and family size information that borrowers self-report, there is risk for potential fraud or error. Our data matching analysis showed, for example, that tens of thousands of borrowers who were not making monthly loan payments because they reported zero income on IDR applications may have had enough income to do so. Where appropriate, we are referring these borrowers to Education for further investigation. In addition, an increase in family size can cause a borrower’s payments to decrease, creating a potential incentive for fraud, and our analysis found atypically large family sizes that are generally not verified by Education. The results of our analyses highlight the risk for fraud or error, as well as weaknesses in Education’s procedures. In turn, the weaknesses we identified raise questions about the strength of Education’s institutional oversight of a major program involving hundreds of billions of dollars. The fact that, cumulatively, the borrowers and their plans we reviewed owed over $6 billion in loans helps illustrate the risk of potential financial loss for the government from fraud or error absent comprehensive oversight. It is important for Education to take steps to obtain data to verify borrower reports of zero income and to implement other data analytic practices and follow-up procedures for verifying borrower-reported information. Such actions would help ensure that (1) IDR payment amounts are based on information that accurately represents a borrower’s situation and is free from fraud and error; and (2) the federal government’s fiscal exposure to IDR loans is safeguarded from the risk of loss. Implementing data analytic practices and follow-up procedures to review and verify borrower reports of zero income could help deter borrowers from inaccurately reporting zero income and detect those who have done so, either fraudulently or in error. Similarly, implementing practices and procedures to review and verify reported family sizes could further stem potential fraud or error. Without such changes, IDR plans will remain vulnerable to fraud and error, potentially raising program costs for the federal government and taxpayers. We are making the following three recommendations to Education’s Federal Student Aid office: The Chief Operating Officer of Federal Student Aid should obtain data in order to verify income information for borrowers reporting zero income on IDR applications. For example, Education could pursue access to federal data sources or obtain access to an appropriate private data source. (Recommendation 1) The Chief Operating Officer of Federal Student Aid should implement data analytic practices, such as data matching, and follow-up procedures to review and verify that borrowers reporting zero income on IDR applications do not have sources of taxable income at the time of their application. (Recommendation 2) The Chief Operating Officer of Federal Student Aid should implement data analytic practices, such as data mining, and follow-up procedures to review and verify family size entries in IDR borrower applications. For example, Education could review and verify all borrower reports of family size or a subset identified as being most susceptible to fraud or error. (Recommendation 3) We provided a draft of this report to the Departments of Education (Education) and Health and Human Services (HHS) for review and comment. HHS provided technical comments, which we incorporated as appropriate. We also provided relevant report sections to the Social Security Administration and the four loan servicers included in our review for technical comments. Loan servicers provided technical comments, which we addressed as appropriate. Education generally agreed with our recommendations, stating that it plans to implement significant additional verification policies to ensure that borrowers who participate in IDR plans do not misrepresent their income or family size to the department. While Education agreed with our recommendation to obtain data in order to verify income for borrowers reporting zero income, it suggested that GAO may wish to convert this recommendation to a Matter for Congressional Consideration to provide Education with access to IRS data. In its response, Education stated that the President’s fiscal year 2020 budget request includes a proposal that Congress pass legislation allowing the IRS to disclose tax return information directly to the department for the purpose of administering certain federal student financial aid programs. According to Education, such legislation, if enacted, would allow borrowers to more easily certify their income on an annual basis to maintain enrollment in IDR plans, and allow the department to use the information to mitigate improper payments to borrowers as a result of misreported income data. Education also stated that in the meantime, it would explore whether commercially available data are sufficient in terms of scope, reliability, and cost effectiveness. Given that there are existing actions Education can take to implement our recommendation, we believe our recommendation is appropriate. Moreover, we believe that Education is best positioned to determine whether the proposal, if enacted, would address our recommendation, or if it would need to be expanded or modified in order to do so. Regarding our second recommendation, Education stated that it would develop data analytic practices to verify borrower reports of zero income contingent upon the enactment of legislation providing the department with access to federal income data. However, implementing our recommendation does not necessarily require Education to wait for such legislation. Our draft report describes data analytic practices, such as anomaly detection, which Education could implement using its own data to identify deviations from expected patterns in data over time. Education also stated that it plans to develop additional follow-up procedures to verify borrower reports of zero income, such as requiring borrowers to substantiate reports of zero income with appropriate documentation. In addition, Education described plans to formalize procedures to make referrals to Education’s Office of Inspector General or the Department of Justice for suspected cases of IDR fraud. We encourage Education to combine its follow-up procedures with data analytic practices to satisfy the recommendation. Education agreed with our third recommendation to implement data analytic practices and follow-up procedures to verify family size, noting that this information could be subject to misrepresentation or erroneous reporting by borrowers. Education stated that it would review various data points that can be used to select IDR applications and certifications for additional review prior to approval, such as providing more scrutiny when borrowers report unusual increases in family size from one year to the next. Education also stated that it plans to formalize additional procedures to require certain borrowers to substantiate their family size. For example, Education will consider requiring IDR applicants to provide statements listing each household member and how they are related to the borrower. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to relevant congressional committees, the Secretary of Education, the Chief Operating Officer of Federal Student Aid, and other relevant parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact us at (617) 788-0534 or emreyarrasm@gao.gov or (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff that made key contributions to the report are listed in appendix III. This report examines (1) whether there are indicators of potential fraud or error in income and family size information provided by borrowers seeking to repay their loans with Income-Driven Repayment (IDR) plans and (2) the extent to which the Department of Education (Education) verifies this information. To address these questions, we reviewed relevant IDR policies and procedures from Education and its four largest loan servicers—Navient, Nelnet, Great Lakes Educational Loan Services, Inc., and the Pennsylvania Higher Education Assistance Agency. We selected these loan servicers because, at the time of our analysis, together they serviced 96 percent of the outstanding balance of loans being repaid with IDR plans as of September 2017. We also interviewed Education officials from Federal Student Aid, the office responsible for developing policies and procedures for administering IDR plans and overseeing how loan servicers carry them out, as well as the officials from the selected loan servicers. Additionally, we reviewed relevant federal laws and regulations and Education’s procedures for verifying information on the Free Application for Federal Student Aid. We assessed Education’s procedures against federal standards for internal control for developing sufficient control activities, risk assessment, and information and communication. We also assessed Education’s procedures against the leading practices for data analytics activities in GAO’s Framework for Managing Fraud Risks in Federal Programs. To determine whether there were indicators of potential fraud or error in borrowers’ income and family size information on IDR plans, we obtained data from Education’s Enterprise Data Warehouse and Analytics (EDWA) database on borrowers with William D. Ford Federal Direct Loans (Direct Loans) and IDR plans approved between January 1, 2016 and September 30, 2017, the most recent data available at the time of our analysis. EDWA is a centralized data warehouse that contains administrative data reported by loan servicers on IDR borrowers and their loans. Some borrowers had multiple approved IDR plans in the data we analyzed. We also obtained national quarterly wage data from the U.S. Department of Health and Human Services’ (HHS) National Directory of New Hires (NDNH) for the same time period. NDNH is a national repository of information reported by employers, states, and federal agencies. The NDNH is maintained and used by HHS for the federal child support enforcement program, which assists states in locating parents and enforcing child support orders. In addition to information on newly hired employees, NDNH contains (1) data on quarterly wages for existing employees, collected and reported by state workforce agencies and federal agencies; and (2) data on all individuals who apply for or received unemployment compensation, as maintained and reported by state workforce agencies. For our analysis of borrower-reported incomes, we matched approximately 656,600 Education borrowers to NDNH quarterly wage data to determine if any borrowers who reported zero income on their IDR applications had wages reported in the same quarter in which their IDR plans were approved. We took additional steps to further review and refine these matches and provide reasonable assurance that the NDNH wage data were associated with the correct borrower by comparing (1) the borrower’s state of residence as reported in the Education data to the state agency submitting the NDNH wage data and (2) the borrower’s name as reported in the Education data to the employee name reported in the NDNH data. For the refined matches, we then estimated whether the borrowers may have had sufficient annual wages based on wages reported in NDNH to potentially warrant monthly student loan payments greater than zero dollars on their associated IDR plan. Specifically, we aggregated all NDNH wages reported for the borrower in the quarter in which their IDR plan was approved to determine a total quarterly wage amount. We then multiplied the total quarterly wage amount by four—the number of quarters in a calendar year—to generate an estimate of annual wages for the borrower. Our approach was based on the methodology Education instructs loan servicers to use to calculate annual wages when borrowers provide an alternative to a tax return to document their income on IDR applications. This methodology may understate or overstate income given that borrowers may not have earned the same amount in each of the four quarters. Our estimates of annual wages are based on the wages reported in NDNH for each borrower and do not take into account any pre-tax deductions that may apply when determining IDR payments. Our estimates of annual wages also do not include borrowers’ spousal income or any other taxable income for the borrower that is not included in the NDNH quarterly wage data—such as unemployment compensation received or unearned income such as alimony. We did not independently verify the wages reported in NDNH or the actual total annual income earned by borrowers identified in our match, as this was outside the scope of our review. Using the estimated annual wage, we then determined whether a borrower would have had a monthly payment greater than zero by using Education’s IDR plan repayment calculations for each IDR plan. To calculate the monthly payment, we used (1) the estimated annual wage from our NDNH data analysis; (2) the family size reported on the borrower’s approved IDR plan; (3) the borrower’s approved IDR plan type; and (4) the relevant percentage of the HHS poverty guideline amount for the borrower’s family size, state of residence, IDR plan approval year, and IDR plan type. For borrowers on Income-Based Repayment, New Income-Based Repayment, Pay As You Earn, and Revised Pay As You Earn plans, we rounded all calculated monthly payments that were less than $5 down to zero, in accordance with Education’s repayment calculations. We then identified which borrowers had calculated payments that were greater than zero. We did not determine the actual repayment amount borrowers may have had, as this was outside the scope of our review. Finally, for borrowers for whom we had calculated a payment greater than zero, we determined the total outstanding Direct Loan balance (principal and accrued interest) as of September 2017, based on EDWA data. For our analysis of borrower-reported family sizes, we analyzed the overall distribution of family sizes reported on approximately 5 million approved IDR plans. We reviewed the percentile distribution for family size on all IDR plans in our analysis and identified those in the top 1 percent of the data—in this case, IDR plans that had a reported family size of nine or more. We defined these IDR plans as having atypical family sizes for the Education data. We did not independently verify the family size reported on the IDR plans. For the borrowers with family sizes of nine or more, we determined the total outstanding Direct Loan balance (principal and accrued interest) as of September 2017. To examine the effects of borrowers inaccurately reporting income and family size on loan payment amounts, we analyzed the estimated monthly loan payment amounts for various hypothetical repayment scenarios from Education’s online repayment estimator as of January 2019, which used the 2018 HHS poverty guidelines. To examine the effect of various family sizes on loan payment amounts, we assumed a hypothetical borrower lived in the continental United States; had an adjusted gross income of $40,000; an outstanding Direct Loan balance of $30,000 (close to the average outstanding Direct Loan balance of $33,600 as of September 2018); and an interest rate of 5.1 percent (the Direct Loan 2018-2019 interest rate for an undergraduate borrower). To examine the effect of various incomes on monthly payment amounts, we assumed hypothetical borrowers had adjusted gross incomes based on estimated annual wages common in our data matching analysis ($30,000, $45,000, and $60,000), a family size of one (meaning just the borrower), and lived in the continental United States. For this analysis, we also assumed hypothetical borrowers had an interest rate of 5.1 percent and an outstanding Direct Loan balance of $50,000, which we selected to be high enough to qualify these hypothetical borrowers for all IDR plans at each of the selected income levels. To assess the reliability of the EDWA data, we reviewed documents related to the database and Education loan data generally; interviewed knowledgeable Education officials; performed electronic testing to determine the validity of specific data elements that we used to perform our work; compared the data we received to published Education data on the number of IDR borrowers and amount of their outstanding loans; and compared borrowers’ personal information to the Social Security Administration’s Enumeration Verification System to identify borrowers whose information may not have been accurate. As part of our reliability assessment of the EDWA data, we selected a nongeneralizable sample of 16 borrowers and their IDR plan and loan information from the EDWA data to compare against four selected loan servicers’ records. Specifically, we stratified borrowers into two groups based on common and potentially outlying incomes and family sizes in the EDWA data. We then randomly selected two borrowers from each stratum for each of the four selected loan servicers (a total of four borrowers per loan servicer). We reviewed all IDR plan data in our scope for each selected borrower, including the plan type, family size, income, and total monthly payment. We did not review original documents, such as the IDR applications or documentation of income. We discussed the results of our review with knowledgeable Education and loan servicer officials to gain additional understanding of each selected borrower’s IDR plan information as well as any differences between EDWA and loan servicer data. We originally obtained EDWA data on approximately 6.5 million IDR plans approved between January 1, 2016 and September 30, 2017 that were held by almost 4.8 million Direct Loan borrowers. Based on data reliability issues we identified during our review, we had to limit the scope of our analysis to a subset of EDWA data that we determined were sufficiently reliable for our purposes. Education officials disclosed issues that impacted the IDR plan data reported to Education by one of its loan servicers. Specifically, Education and the loan servicer had identified instances where the loan servicer’s internal data were changed for valid reasons but the changes were not reported to Education correctly. As a result, we excluded data reported by this servicer from all analyses in our report. We also identified issues with monthly payment amounts for some borrowers in the EDWA data. Accordingly, we limited our borrower- reported income analysis to borrowers who reported zero income and had a scheduled monthly payment of zero dollars. Ultimately, we analyzed about 878,500 IDR plans held by about 656,600 borrowers for our income analysis and approximately 5 million IDR plans held by 3.5 million borrowers for our family size analysis. Consequently, our overall income and family size analyses results may be understated and are not generalizable to all IDR plans and borrowers. Consistent with our report scope, our analyses of borrower-reported income focused on identifying indications of potential fraud or error; however, our analyses do not show that fraud or error occurred. It is not possible to determine whether fraud or error occurred through data matching alone. As previously discussed, our estimates of annual wages are based on the NDNH quarterly wage data, and do not take into account any deductions that may be applicable for determining adjusted gross income, which is used to determine IDR plan payment amounts. As a result, our estimates could overstate borrowers’ incomes for IDR plan purposes. Additionally, wages are reported in NDNH quarterly, so we are not able to determine when in a quarter a borrower earned wages. For example, a borrower may have earned wages at the start or end of a quarter, but was not earning wages at the time of submitting the IDR application. Because borrowers are only required to certify their income annually, such a scenario would not constitute fraud or error even though it would result in a match in our analysis. In addition, our use of Education’s methodology to annualize wages based on quarterly wages may understate or overstate income if a borrower did not earn wages at the same level over the entire year. We are also not able to identify additional taxable income that is not reported to NDNH but should have been included on borrowers’ IDR applications, which could understate borrowers’ incomes. Consequently, our analysis may overstate or understate the number of borrowers who reported no income on their IDR application yet may have had sufficient wages to warrant a monthly student loan payment. To assess the reliability of the NDNH data, we reviewed documents related to the database, interviewed knowledgeable HHS officials, and performed electronic testing to determine the validity of specific data elements in the NDNH data that we used to perform our work. On the basis of our own reliability assessment results, we determined that the NDNH data were sufficiently reliable for the purposes of this report. We conducted this performance audit from June 2017 to June 2019, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contacts named above, Debra Prescott and Philip Reiff (Assistant Directors), Nancy Cosentino and Mariana Calderón (Analysts- in-Charge), Sarah Cornetto, Jeffrey G. Miller, and Rachel Stoiko made key contributions to this report. Additional assistance was provided by Susan Aschoff, David Ballard, Deborah Bland, Benjamin Bolitzer, Melinda Cordero, Vijay D’Souza, Kevin Daly, Angie Jacobs, Candace Silva-Martin, Sheila R. McCoy, Maria McMullen, Kevin Metcalfe, John Mingus, Drew Nelson, Mimi Nguyen, Matt Valenta, and Ariel Vega.", "summary": "As of September 2018, almost half of the $859 billion in outstanding federal Direct Loans was being repaid by borrowers using IDR plans. Prior GAO work found that while these plans may ease the burden of student loan debt, they can carry high costs for the federal government. This report examines (1) whether there are indicators of potential fraud or error in income and family size information provided by borrowers on IDR plans and (2) the extent to which Education verifies this information. GAO obtained Education data on borrowers with IDR plans approved from January 1, 2016 through September 30, 2017, the most recent data available, and assessed the risk for fraud or error in IDR plans for Direct Loans by (1) matching Education IDR plan data for a subset of borrowers who reported zero income with wage data from NDNH for the same time period and (2) analyzing Education IDR plan data on borrowers' family sizes. In addition, GAO reviewed relevant IDR policies and procedures from Education and interviewed officials from Education. GAO identified indicators of potential fraud or error in income and family size information for borrowers with approved Income-Driven Repayment (IDR) plans. IDR plans base monthly payments on a borrower's income and family size, extend repayment periods from the standard 10 years to up to 25 years, and forgive remaining balances at the end of that period. Zero income. About 95,100 IDR plans were held by borrowers who reported zero income yet potentially earned enough wages to make monthly student loan payments. This analysis is based on wage data from the National Directory of New Hires (NDNH), a federal dataset that contains quarterly wage data for newly hired and existing employees. According to GAO's analysis, 34 percent of these plans were held by borrowers who had estimated annual wages of $45,000 or more, including some with estimated annual wages of $100,000 or more. Borrowers with these 95,100 IDR plans owed nearly $4 billion in outstanding Direct Loans as of September 2017. Family size. About 40,900 IDR plans were approved based on family sizes of nine or more, which were atypical for IDR plans. Almost 1,200 of these 40,900 plans were approved based on family sizes of 16 or more, including two plans for different borrowers that were approved using a family size of 93. Borrowers with atypical family sizes of nine or more owed almost $2.1 billion in outstanding Direct Loans as of September 2017. These results indicate some borrowers may have misrepresented or erroneously reported their income or family size. Because income and family size are used to determine IDR monthly payments, fraud or errors in this information can result in the Department of Education (Education) losing thousands of dollars of loan repayments per borrower each year and potentially increasing the ultimate cost of loan forgiveness. Where appropriate, GAO is referring these results to Education for further investigation. Weaknesses in Education's processes to verify borrowers' income and family size information limit its ability to detect potential fraud or error in IDR plans. While borrowers applying for IDR plans must provide proof of taxable income, such as tax returns or pay stubs, Education generally accepts borrower reports of zero income and borrower reports of family size without verifying the information. Although Education does not currently have access to federal sources of data to verify borrower reports of zero income, the department could pursue such access or obtain private data sources for this purpose. In addition, Education has not systematically implemented other data analytic practices, such as using data it already has to detect anomalies in income and family size that may indicate potential fraud or error. Although data matching and analytic practices may not be sufficient to detect fraud or error, combining them with follow-up procedures to verify information on IDR applications could help Education reduce the risk of using fraudulent or erroneous information to calculate monthly loan payments, and better protect the federal investment in student loans. GAO recommends that Education (1) obtain data to verify income information for borrowers who report zero income on IDR plan applications, (2) implement data analytic practices and follow-up procedures to verify borrower reports of zero income, and (3) implement data analytic practices and follow-up procedures to verify borrowers' family size. Education generally agreed with our recommendations.", "document_type": "gao"}
{"report": "Lebanon is a small, religiously diverse country bordering the Mediterranean Sea (see fig. 1). Religious tensions among Lebanon’s Maronite Christians, Sunni Muslims, Shiite Muslims, and others, have for many years contributed to conflicts within Lebanon as well as with neighboring countries. According to State, Lebanon’s political system is characterized by sectarian divisions and pressures from external and internal forces that limit its ability to function. Upon gaining independence from France in 1943, Lebanese leaders adopted a power-sharing agreement, in which each of the country’s officially recognized religious groups were to be represented in the government according to their share of the population based on the 1932 census. This unwritten agreement established a status quo in which the president must be a Maronite Christian (the largest single denomination in 1932), the prime minister a Sunni Muslim, and the speaker of parliament a Shia Muslim. Tensions over the balance of power among these groups have provoked conflict. During the Lebanese Civil War from 1975 to 1990, both Syrian and Israeli forces occupied the country. In the midst of the civil war and Israel’s occupation of southern Lebanon, Hizballah emerged in Lebanon as a powerful Islamic militant group. In 2000, Israeli forces withdrew from southern Lebanon. In 2005, owing to pressure from the international community, Syrian forces withdrew from Lebanon following the assassination of Lebanon’s prime minister. Parliamentary elections in that year led to a member of Hizballah holding a cabinet position for the first time, and at least one member of Hizballah has held a cabinet position ever since. Instability arising from the Syrian civil war that began in 2011 has also exacerbated sectarian conflict and created new challenges within Lebanon. In particular, that war has caused an influx of over 1.3 million Syrian refugees into Lebanon, a country with a population of only 4.5 million. The Syrian civil war has also increased the risk of terrorist incidents in Lebanon, as foreign terrorist fighters have crossed Lebanese borders going to and from the conflict. Since 2013, the United States’ primary goal in providing security assistance to Lebanon has been to strengthen its state institutions to allow them to exert sovereign authority and enhance security. Since at least 2015, the primary objectives supporting this goal have focused on 1) building the capacity of Lebanese security forces to exert sovereign authority over Lebanese territory, including at the border and by maintaining internal security; and 2) enhancing the capacity of Lebanese security forces to respond to terrorist and criminal threats. Through both these objectives, the U.S. also seeks to delegitimize and marginalize Hizballah by helping to support legitimate state institutions. To achieve these objectives, a number of agencies and offices within State and DOD provide support to the LAF, which is generally responsible for providing border security, counterterrorism, and national defense, and to the ISF, or national police force, which is generally responsible for maintaining law and order within Lebanon. See table 1. U.S. support for Lebanese forces has included a variety of assistance, including training, equipment, and sustainment, as shown in figure 2. State and DOD reported that they obligated nearly $1.5 billion in security assistance funding for Lebanon in fiscal years 2013 through 2018. The largest security assistance programs were State’s Foreign Military Financing program, which provides grants and loans to foreign governments for the acquisition of U.S. defense equipment, services, and training, and DOD’s Global Train and Equip program, which funds training and equipment for foreign military forces to conduct counterterrorism operations and enhance maritime and border security. These two programs collectively accounted for nearly 80 percent of assistance. State provided about 56 percent of the overall funding and DOD contributed 44 percent, as shown in figure 3. DOD and State are required to conduct end-use monitoring (EUM) for some of the equipment provided to Lebanon. In 1996, Congress amended the Arms Export Control Act to require the President to establish a program for monitoring the end-use of defense articles and defense services sold, leased, or exported under the act, including through Foreign Military Sales, Foreign Military Financing, or the Foreign Assistance Act of 1961. The law requires that the program be designed to provide reasonable assurances that recipients are complying with restrictions imposed by the U.S. government on the use, transfer, and security of defense articles and defense services, and that such articles and services are being used for the purposes for which they are provided. DOD’s Defense Security Cooperation Agency (DSCA) is responsible for EUM for Foreign Military Sales. The President is also required to take all reasonable steps to ensure that equipment made available to foreign countries for international narcotics control under the Foreign Assistance Act are used only in ways consistent with the purposes for which such equipment was made available. State’s INL implements this requirement through its End-Use Monitoring Program. DSCA administers the Golden Sentry program, which DOD uses to comply with requirements related to the end-use of defense articles and services transferred to foreign governments. DOD officials at the Office of Defense Cooperation-Beirut conduct the EUM activities established and overseen by DSCA. DSCA’s policy manual for EUM, the Security Assistance Management Manual, and the associated standard operating procedures for Beirut require DOD officials to, among other things, conduct two levels of monitoring: routine EUM and enhanced EUM. Routine EUM: DOD conducts routine EUM for defense articles and services that do not have any unique conditions associated with their transfer. In conducting routine EUM, DOD personnel are required to observe and report any potential misuse or unapproved transfer of U.S.-origin defense articles. Routine EUM is to be conducted in conjunction with other required security-related duties, using any readily available information. For example, U.S. officials might observe how a host country’s military uses U.S. equipment when they visit a military installation on other business. DOD policy states that routine EUM must be documented at least quarterly. DOD policy does not require inventories and physical security checks as part of routine EUM. Enhanced EUM: DOD conducts enhanced EUM for defense services, technologies, or articles specifically identified as sensitive. Lebanon has five types of sensitive defense articles that require enhanced EUM—night vision devices, sniper rifles, light attack aircraft, unmanned aerial vehicles, and Hellfire missiles. DOD policy requires serial number inventories for defense articles needing enhanced EUM within 90 days of delivery of the articles and thereafter within one year of the last inventory performed. In addition, the purchase agreements authorizing the sale of an item may contain specialized notes directing the purchaser to adhere to certain physical security and accountability requirements. In addition to enhanced and routine EUM, DSCA is required to conduct periodic Compliance Assessment Visits to evaluate the Office of Defense Cooperation in Beirut’s compliance with DOD’s EUM policy and the Lebanese government’s compliance with physical security and accountability requirements. According to State and DOD assessments, reports, and interviews with State and DOD officials, the LAF’s border security and counterterrorism capabilities have demonstrated some notable improvements from 2013 to 2018. For example, a 2013 DOD assessment noted that the Lebanese government lacked effective control over its sovereign territory and indicated the LAF leadership was reluctant to engage aggressively in counterterrorism operations. By 2018, however, U.S. agencies reported that, following the expansion of LAF Land Border Regiments, Lebanon had established control of a large part of its borders for the first time in its history. In addition, U.S. agencies reported that the LAF had enhanced its capacity in counterterrorism and counter-narcoterrorism, resulting in more operations. In 2017, for example, the LAF undertook a successful operation to expel ISIS elements along the border with Syria, making Lebanon, DOD officials noted, the only country in the region to successfully expel ISIS from its territory without the involvement of U.S. ground forces. Similarly, State reported improvements in the ISF’s capabilities. For example, INL reported that its ISF training program has become increasingly specialized because of the force’s improved capabilities. According to State reporting, from 2008 through 2012, INL focused its training for the ISF on basic skills. As the ISF became more capable, however, INL reported that the ISF assumed responsibility for all basic training, allowing INL to focus its resources on providing specialized courses. Some examples of these specialized courses include advanced technical radio training and advanced interview and interrogation training. INL also reported that providing equipment and facilities to the ISF helped further to enhance ISF capabilities. For instance, INL reported that the ISF uses the academy INL constructed for it in 2015 in Aramoun for advanced forensics training. In addition, the ISF improved its overall investigative capacity and counterterrorism capabilities since 2013, as shown in a 2017 assessment of State’s Antiterrorism Assistance program. U.S. officials stated that the quality of the working relationship between the U.S. and Lebanon is an important component of success, and Lebanese officials said that U.S. assistance is critical to achieving their mission. U.S. officials noted that the LAF and ISF have been some of the most committed U.S. partners in the region. The LAF and ISF officials we met with also said that U.S. assistance enhances their capabilities and allows them to do their jobs more effectively. One ISF unit, for example, stated that buses purchased with U.S. assistance allow it to transport large numbers of personnel to mission locations. In addition, one LAF unit noted that U.S.-provided armored personnel carriers form the backbone of the LAF’s armored brigades. Despite reported progress, U.S. agencies indicated that some challenges remain for the ISF and the LAF. While the ISF’s capabilities have improved since 2013, U.S. officials said it continues to be more capable in and around Beirut than in other parts of the country. As a result, the LAF often provides internal security to supplement the ISF outside of the capital. Additionally, the ISF needs to improve its internal coordination of cybercrime cases and analyses of digital evidence, according to a 2017 assessment of State’s Antiterrorism Assistance program. For example, the ISF units handling digital investigations and processing, the assessment noted, were fractured and divided, resulting in overwhelming workloads for some units and underutilization of others. DOD assessments also noted that the LAF continues to have some capability gaps, including an ongoing need for equipment and challenges with operating and maintaining U.S.-provided equipment. For example, LAF personnel have expressed concerns about the complexity and sustainability of some U.S. systems, such as the M2 Bradley Fighting Vehicles and A-29 light attack aircraft. Additionally, while U.S. officials stressed they have no desire for direct confrontation between Lebanese security forces and Hizballah, U.S. agencies report that Hizballah’s presence within Lebanon remains a challenge for both the ISF and LAF. In 2018, for example, State reported that Hizballah was the most capable terrorist organization in Lebanon and that it continued to exert control over some areas of the country. In addition to periodically assessing long-term performance, State’s Foreign Affairs Manual and internal guidance outline a number of good practices for ICS management. First, the Foreign Affairs Manual says all missions, such as Embassy Beirut, should have an ICS with a hierarchy of goals, objectives, sub-objectives, and, as needed, key activities. Second, missions must assess progress against ICS strategic objectives at least annually. Third, State internal guidance says it is a good practice for missions to establish ICS performance indicators with targets to show the expected change over the course of each period of performance. Fourth, it is also a good practice for missions to practice regular, ongoing data collection against key performance indicators to gauge the direct and near-term effects of activities. The 2018 ICS for Lebanon includes a hierarchy of goals, objectives, and sub-objectives, in line with the guidance in State’s Foreign Affairs Manual. For instance, the Lebanon ICS has objectives with sub- objectives that include activities outlining how to accomplish those objectives. The 2018 ICS contains 19 security-related activities with corresponding performance indicators for State and DOD activities, such as training Lebanese security forces in counterterrorism or border security operations. The hierarchy included in the 2018 ICS represents an improvement from the previous ICS, developed in 2015, which included information on goals, objectives, and sub-objectives, but did not outline specific activities or performance indicators. State guidance notes the benefit of such a hierarchy is that it shows the individuals who work on such activities how their actions contribute to achieving mission objectives. According to State officials, Embassy Beirut conducted an annual review of the ICS in October 2019. The goals of the annual review, according to State officials, were to assess progress against the ICS objectives and to remove or add goals, objectives, and key activities as needed. In July 2019, Embassy Beirut officials told us that they planned to conduct a review of the ICS approximately one year after its approval, which was in August 2018. However, State officials told us that leadership turnover in the summer of 2019 resulted in Embassy Beirut delaying the review until October 2019. Embassy Beirut, however, has not established targets for all of the 19 security-related performance indicators in its 2018 ICS. The Foreign Affairs Manual emphasizes that having targets to indicate the expected change over the course of each period of performance is a good practice. Several of Embassy Beirut’s security-related ICS indicators lack such targets, making it difficult for State to use the indicators to assess progress because it cannot compare the actual results of activities to the expected results. For example, several of the embassy’s security-related performance indicators deal with the number of people trained or improvements in specific capabilities of the security forces. Because the embassy has not established targets for these particular indicators, State cannot quantify the results it expects to achieve or determine how the actual results compare to those expectations. State officials noted that some bureaus have established performance indicators that are the same as, or similar to, security-related performance indicators in the ICS and some of those indicators have targets. For example, INL officials noted that INL has a Country Plan for Lebanon that has performance indicators and targets similar to some of the security-related performance indicators found in the ICS. However, many of the security-related activities included in the ICS are implemented by more than one agency or bureau. Therefore, the performance indicators for these activities would require targets that account for all the implementers. Additionally, Embassy Beirut did not have complete performance data for its security-related ICS performance indicators. State’s Foreign Affairs Manual emphasizes that regular, ongoing data collection against performance indicators to gauge the direct and near-term effects of activities is a good practice. Federal standards for internal control also state that agencies should use quality information that is, among other things, complete. Information is complete if it includes relevant data needed by decision makers to assess performance or to allocate resources. When we requested information on progress made toward the security-related indicators in the 2018 ICS, Embassy Beirut provided incomplete data for 11 of the 15 security-related indicators we analyzed. Data for six of these 11 were incomplete because the indicator called for quantitative data that were not included. For example, three of the six quantitative indicators called for data on the number or percentage of people trained. Embassy Beirut provided information that stated training had occurred, but did not quantify the number or percentage of people trained, as called for by the indicators. Data for the other five of these 11 indicators were incomplete because the indicators called for qualitative data that were not included. For example, three of the five qualitative indicators dealt with improving the capacity or capabilities of Lebanese units, but the information Embassy Beirut provided did not include a description of whether or how Lebanese units improved in those areas. Embassy Beirut provided complete data for four of the 15 indicators we analyzed, as shown in table 2. For three of the four indicators, Embassy Beirut provided the quantitative data called for by the indicator. For the remaining indicator, which dealt with number of personnel trained and the completion of facility upgrades, the embassy provided data on the number of personnel trained and a description of the status of the upgrades. According to Embassy Beirut officials, individual programs have targets and collect performance data associated with the security-related ICS performance indicators, but the Embassy did not have such information consolidated in a centralized document covering the time period we reviewed. Officials further noted that the ICS contains performance indicators, but not specific targets, as the ICS was not a vehicle for establishing specific targets when it was drafted in 2018. Additionally, State officials at headquarters stated that they do collect performance data related to some of the Lebanon ICS security-related indicators, but they did not provide evidence that this data is available to or used by Embassy Beirut as part of its ICS review. To review targets and indicators as part of the annual ICS review, Embassy Beirut officials said they planned to use evaluations and assessments of programs conducted by State and DOD headquarters entities or third parties. However, these assessments and evaluations cannot provide complete data on Embassy Beirut’s security-related performance indicators because not all of the security assistance programs in Lebanon have conducted them. In addition, these assessments and evaluations do not take place annually, which limits Embassy Beirut’s ability to use them on an ongoing basis to monitor strategic activities. Without setting targets and collecting complete data on performance indicators, Embassy Beirut will be limited in its ability to monitor its progress toward achieving the expected results of its security-related activities. State documents indicate that sound program design and performance management serve as the basis for efficient and effective use of department resources to achieve strategic objectives. If Embassy Beirut does not address the gaps in its performance information, it will be limited in its ability to ensure the intended alignment of policy, planning, resources, and programs through its annual reviews of the ICS. State and DOD’s two primary safeguards to limit the risk that U.S. security assistance to Lebanon will benefit terrorist organizations are: 1) reviewing Lebanese security organizations for ties to terrorist organizations and 2) vetting individual recipients of assistance. For the first safeguard, State examines Lebanese security organizations for associations with foreign terrorist organizations (FTO) prior to providing support. Annual State, Foreign Operations, and Related Appropriations acts for fiscal years 2013 through 2018 included provisions to restrict funding for the ISF or the LAF if they are controlled by a U.S.-designated FTO. According to State officials, under these provisions, State regularly evaluates the LAF and ISF to determine if they have strong individual or organizational connections or alignment of purpose with Hizballah or any other FTO. State officials said they have determined that both the LAF and ISF are independent institutions that Hizballah does not control. State officials added that some longstanding divisions exist between Hizballah and the ISF, in particular. For example, one State official noted that Hizballah has assassinated ISF leaders in the past. Furthermore, members of the ISF are not allowed to be members of any political party, according to State officials. Second, State and DOD vet members of the Lebanese security forces who will receive U.S. assistance, such as training, for ties to terrorism. State and DOD vet by checking the names and other biographic or biometric information of potential recipients of assistance against information about known or suspected terrorists and their supporters. State and DOD officials conduct name-check vetting using one or more of three methods: In-country screening: State officials said they review a variety of sources in Lebanon to screen all potential recipients of State and DOD-funded training. Consular Affairs officials use State’s Independent Namecheck application to vet all potential trainees in country. This application allows overseas posts to screen names of individuals through State’s Consular Lookout and Support System (CLASS) database. CLASS contains records from numerous U.S. agencies on persons with immigration violations and terrorism connections, among other potential visa ineligibilities. In addition, officials said they may examine other sources, including local law enforcement or U.S. intelligence community sources. Terrorist Screening Center: State INL sends the names of potential ISF trainees to the Terrorist Screening Center, a multi-agency center administered by the Federal Bureau of Investigation, for further vetting. INL officials noted that this step does not result in many more exclusions beyond the initial in-country screening, but it serves as an additional check to ensure INL funding does not benefit FTOs. Nonimmigrant visa vetting: Any potential trainees who apply to come to the U.S. for training undergo vetting for a nonimmigrant visa, which includes interagency counterterrorism checks. According to DOD officials, a majority of their LAF trainees receive training in the United States. Some trainees under State programs also receive training in the United States. Officials said they believe these vetting procedures provide sufficient assurances that LAF and ISF trainees are not members of an FTO. They also stated they receive a relatively small number of “hits,” or indications that screening uncovered derogatory information. In these cases, officials said they remove the individual from the training roster and screen a substitute applicant instead. According to State officials, INL is in the process of moving its namecheck vetting from the Terrorist Screening Center to an internal State office. From 2012 to 2017, State piloted a counterterrorism vetting program for five countries, including Lebanon, through the Risk Analysis and Management (RAM) team in State’s Bureau of Administration. Vetting for Lebanon conducted through the pilot focused primarily on vetting contractors and grantees that would potentially implement U.S. assistance programs, including a security assistance program in 2015. RAM officials said that they resumed vetting in February 2019 for some programs in Lebanon, as determined by programming offices based on program-specific risk assessments that identify risks that can be mitigated through namecheck vetting. These officials said all the screening they conducted for Lebanon during the initial pilot phase was for programs determined to be of low or medium risk and, as of November 2019, they had not found derogatory information for any of the screened individuals. INL conducted annual inspections of equipment it provided to the ISF, as required by State policy. According to INL’s annual EUM reports, from 2013 through 2018, INL annually inspected 100 percent of the equipment valued at over $2,500 and defense articles regardless of value provided to the ISF, either by on-site inspection or host government verification. During our visit to an ISF site in Beirut, Lebanon, we found that all 16 items included in our random, non-generalizable sample were either physically present or accounted for through documentation. We observed 12 of the 16 items, such as police motorcycles and buses. The ISF provided documentation showing that the remaining four items, all trucks, were unavailable for inspection because the ISF had deployed them on missions. Figure 4 shows police motorcycles provided to the ISF that were inventoried by serial number. To provide reasonable assurance that recipients comply with U.S. government restrictions on the use and security of defense articles, DOD’s EUM standards require the Office of Defense Cooperation in Beirut to conduct enhanced EUM for designated sensitive defense articles, such as night vision devices provided to the LAF. U.S. officials must conduct an initial inventory of equipment requiring enhanced EUM within 90 days of delivery and must visually inventory 100 percent of enhanced EUM-designated defense articles within one year of the last inventory, or within 90 days of an acceptable reason for missing an inspection (such as the item was deployed), and enter inventory information into DOD’s SCIP database. DOD officials accounted for all of the 2,991 items subject to enhanced EUM from 2013 through 2018 at least once, according to our analysis of SCIP data. DOD officials in Beirut said they conducted serial number inventories of all items requiring enhanced EUM from 2013 through 2018, as required by DOD’s EUM program. During our visit to Lebanon in April 2019, DOD officials in Beirut physically observed nearly 100 percent (270 of 271) of the defense articles requiring enhanced EUM at the three LAF locations we visited. Only one of the 271 items was unavailable for inspection and the LAF provided documentation showing it was out for repair. Figure 5 shows night vision devices provided to the LAF that were inventoried by serial number. DOD reporting, including a 2017 DSCA Compliance Assessment Visit and U.S. Central Command Inspector General reports, indicates that the LAF has generally complied with DOD requirements to account for and secure equipment and conduct compliance checks of all required equipment. DOD officials said the LAF is transparent about the location of the equipment and goes out of its way to ensure DOD officials are able to account for it. The officials also said the LAF is rigorous about safeguarding all required equipment and consistently meets standards equivalent or similar to U.S. standards for equipment accountability. While our analysis showed that DOD generally accounted for items requiring enhanced EUM, we also found that DOD did not always conduct inspections consistent with its timeliness standards. If DOD does not inspect an item within the timeframes required by its standards, DOD considers the inspection delinquent. Our analysis of the duration between inspections from 2014 through 2018 showed delinquencies in each year and, in total, 32 percent (4,533) of the 14,287 recorded observations we analyzed for timeliness were delinquent. We found that 86 percent of the 2,874 items we analyzed for timeliness had at least one delinquent inspection during the 6 years we reviewed, and 61 percent had two or three delinquent inspections. While inspections were often delinquent, we found that the length of time items remained delinquent was not extensive, with the average length of each delinquency lasting 2.6 months. Only 1 percent of recorded observations showed a delinquency of 6 months or longer. Figure 6 shows the duration of delinquencies for those inspections that were delinquent. Officials from both the Office of Defense Cooperation in Beirut and DSCA stated that the method that DSCA uses to determine inspection due dates for annual inspection plans impedes the Office of Defense Cooperation’s ability to meet DOD’s timeliness standards. DSCA assigns due dates for items based on a general category code instead of an individual item’s serial number, which according to DOD officials, does not allow the Office of Defense Cooperation-Beirut to plan inspections in a way that meets DOD’s timeliness standards. For example, one type of night vision device represents 61 percent of the 2,991 items requiring enhanced EUM. Because these items all have the same general category code, DSCA designates all of them as due for inspection on the same day, regardless of when DOD officials last inspected each individual item. As a result, the inspection due dates DSCA establishes may be inconsistent with DOD’s guidance, which complicates planning and could result in some items having nearly 2 years between inspections before DCSA flags them as delinquent. Addressing how DSCA determines inspection due dates for items requiring enhanced EUM is important for ensuring the Office of Defense Cooperation has the information it needs to meet DOD’s timeliness standards for equipment accountability. According to DOD officials, as of April 2019, equipment on order for the LAF would double the number of items subject to enhanced EUM inspections. This increase underscores the importance of providing the Office of Defense Cooperation-Beirut accurate inspection due dates for the equipment provided to Lebanon. By not assigning inspection due dates consistent with DOD standards, DSCA hinders the Office of Defense Cooperation’s ability to plan effectively. It also increases the likelihood DOD will experience continued delays in conducting the required checks that ensure the proper safeguarding and usage of sensitive defense articles. Recognizing Lebanon’s importance to the security and stability of the Middle East, U.S. agencies invested nearly $1.5 billion in security assistance to the country from fiscal years 2013 through 2018. However, the prominent role of Hizballah in the Lebanese government complicates the U.S. relationship with Lebanon and heightens the importance of ensuring strong management controls over U.S. assistance. U.S. agencies report that the LAF and ISF have improved in their capabilities to secure Lebanon’s border and to combat terrorist activity. Embassy Beirut has also taken a number of steps to track progress toward meeting U.S. security-related objectives. Gaps in the embassy’s performance information, however, limit its ability to monitor the ongoing progress of specific activities and to make informed decisions about where to allocate resources and attention. State and DOD did conduct end-use checks of all required items and their reporting indicates the LAF and ISF have generally taken appropriate steps to safeguard equipment. DOD, however, did not meet its timeliness standards for nearly one-third of all observations of sensitive equipment from 2013 through 2018. DSCA does not assign inspection due dates in a way that is consistent with DOD standards, which may limit DOD’s ability to fully ensure items requiring enhanced end-use monitoring are safeguarded and used as intended in a timely manner. We are making a total of three recommendations, including two to State and one to DOD: The Secretary of State should direct the Department’s relevant bureaus to work with Embassy Beirut to establish, as appropriate, and consolidate targets for each of the security-related performance indicators. (Recommendation 1) The Secretary of State should direct the Department’s relevant bureaus to work with Embassy Beirut to collect and review performance data for key security-related performance indicators. (Recommendation 2) The Secretary of Defense should direct DSCA to revise the inspection due dates it establishes for items requiring enhanced EUM for the Office of Defense Cooperation in Beirut to align with DOD’s standards for EUM by considering the date of last inspection. (Recommendation 3) We provided a draft of this report to the Departments of State and Defense for comment. In its comments, reproduced in appendix II, State concurred with the recommendations that Embassy Beirut 1) establish, as appropriate, and consolidate targets for; and 2) collect and review performance data for its security-related performance indicators. State also provided technical comments, which we incorporated as appropriate. We requested comments on a draft of this product from DOD. The Director for Egypt, Israel, and the Levant in the Office of the Secretary of Defense for Policy provided us with the Department’s comments in an email stating that DOD concurs with the recommendation that DOD direct DSCA to revise the inspection due dates it establishes for items requiring enhanced EUM for the Office of Defense Cooperation in Beirut to align with DOD’s standards for EUM by considering the date of last inspection. The Director noted that the current SCIP EUM software complicates annual inventory planning and reporting and that DSCA’s EUM personnel have documented a software modification requirement that would allow them to implement the recommendation. Additionally, she stated that final design and budget decisions for fiscal year 2021 are not yet complete and the magnitude of this software modification is a major task that is core to EUM programming. We are sending copies of this report to the appropriate congressional committees and the Secretaries of State and Defense. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff has any questions about this report please contact me at (202) 512-2775 or fielde1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. For fiscal years 2013 through 2018, we (1) examined to what extent the Department of State (State) and the Department of Defense (DOD) assessed the progress of their efforts to meet strategic objectives related to security for Lebanon; (2) described what safeguards State and DOD have put in place to limit the risk of U.S. security assistance provided to Lebanon benefitting terrorist organizations; and (3) analyzed to what extent State and DOD conducted end-use monitoring (EUM) checks of equipment provided to Lebanese security forces. To determine to what extent State and DOD assessed the progress of their efforts, we reviewed agency documentation and interviewed State, DOD, and Lebanese government officials. We reviewed Embassy Beirut’s Integrated Country Strategies (ICS), for fiscal years 2015 through 2018 to determine agencies’ strategic objectives for security assistance. We compiled information from State and DOD assessments and performance reporting on security assistance programs operating in Lebanon from fiscal years 2013 through 2018, including assessments, evaluations, and surveys. While we did not independently evaluate the quality of these documents, we did review their methodologies and determined that the approaches taken generally appeared reasonable. We also reviewed State and DOD performance reporting, such as program annual reports and Embassy Beirut’s Performance Plans and Reports for fiscal years 2013 through 2018. We then reviewed the compiled evidence to determine what this reporting showed about to what extent agencies had made progress toward their strategic objectives from fiscal years 2013 through 2018. We reviewed Embassy Beirut’s process for monitoring progress on its 2018 ICS—including what information the embassy compiles and how it determines whether programs are achieving their intended results. We reviewed State’s Foreign Affairs Manual and federal standards for internal control to identify key practices for ICS management. We compared the 2018 ICS to these key practices and requested information on Embassy Beirut’s assessment of progress on 19 security-related activities and indicators included in its 2018 Lebanon ICS. Embassy Beirut provided information for each of the activities and indicators as of May 2019. We reviewed the information provided by Embassy Beirut to determine if it was complete. Four of the 19 performance indicators covered activities for which performance data was not yet available. We did not include these four indicators in our analysis. For the remaining 15 indicators, we determined that Embassy Beirut provided complete data if it included relevant data needed by decision makers to assess performance. According to federal internal control standards, relevant data have a logical connection with identified information requirements. For example, if the information required for an indicator was quantitative in nature (such as the number or percentage of people trained), then we considered the information provided to be relevant if it included quantitative data that directly addressed the indicator. To describe what safeguards U.S. agencies have put in place to prevent U.S. security assistance from benefitting terrorist organizations, we reviewed legislative requirements, State policy guidance, and agency documentation. We reviewed annual appropriations acts from fiscal years 2013 through 2018 to determine what, if any, restrictions were placed on funding for Lebanon to ensure assistance did not benefit terrorist organizations. We reviewed State policy guidance on counterterrorism vetting and interviewed State and DOD officials in Washington, D.C. and Beirut, Lebanon about the steps they take to prevent assistance from benefitting U.S.-designated foreign terrorist organizations, including Hizballah. We reviewed agency documentation, including a risk assessment, an interagency memo, and State memos requesting the release of funding. We reviewed what safeguards State and DOD use to limit the risk of U.S. security assistance benefitting terrorist organizations, but did not analyze how the agencies made determinations when applying these safeguards. To evaluate to what extent State and DOD conducted EUM checks of equipment provided to Lebanese security forces, we reviewed agency documentation and data and interviewed State and DOD officials in Washington, DC and Beirut, Lebanon. We also reviewed State and DOD EUM standards to determine what requirements the agencies established for their respective programs and conducted site visits in Lebanon. To evaluate to what extent State conducted EUM checks in accordance with its standards, we reviewed State’s Bureau of International Narcotics and Law Enforcement Affairs (INL) annual end-use monitoring reports for 2013 through 2018 and analyzed INL EUM data. We also interviewed State officials in Washington, D.C. and Beirut, Lebanon about their processes for conducting and recording EUM. Because INL officials told us its EUM annual reports are the agency’s official documents for tracking adherence to EUM requirements, we used the reports in our analysis of State’s compliance with its standards. We interviewed INL officials about any identified discrepancies within the annual reports or between the annual reports and INL’s EUM data and determined that the reports were sufficiently reliable for our purposes. In Beirut, Lebanon, we visited two Lebanese Internal Security Forces (ISF) sites to observe the ISF’s processes for safeguarding and inventorying equipment. At the ISF’s Mobile Forces site, we reviewed a random, nongeneralizable sample of 16 items requiring EUM—all of which were vehicles, including buses, motorcycles, and trucks. We reviewed the serial numbers of items that were available on-site and reviewed ISF documentation accounting for those items that were not immediately available. To evaluate to what extent DOD had conducted EUM checks in accordance with its standards, we analyzed data from DOD’s Security Cooperation Information Portal (SCIP) database for 2013 through 2018 and interviewed officials from DOD’s Defense Security Cooperation Agency (DSCA) in Washington, D.C. and the Office of Defense Cooperation in Beirut, Lebanon. To analyze SCIP data, we compared observations recorded in the database against DOD’s standards. DOD’s Security Assistance Management Manual standards for EUM state that Security Cooperation Offices, like the Office of Defense Cooperation in Beirut, must visually inventory 100 percent of in-country enhanced EUM- designated defense articles within one year from the last inventory performed, except for those enhanced EUM-designated defense articles not available for observation (such as deployed or returned to the United States for repair), or as stipulated otherwise in the SCIP-EUM database or by separate policy memo. According to DOD’s standards, enhanced EUM-designated items not available for inventory during their annual inventory cycle due to deployment, returned to the United States for repair, or other legitimate reason, must be inventoried within 90 days after returning from deployment or repair. Each observation in the SCIP database represented a single inspection or attempted inspection of an item and includes, among other things, the item’s serial number, equipment category type, location, status, and date observed. Because we analyzed multiple years of data, DOD recorded more than one observation for almost all items. To evaluate to what extent DOD met its standards, we used the following parameters in our analysis: We determined that an observation met the requirement for being inventoried within one year from the last inventory performed if it occurred within 12 months of the last observation of the same item. Using a standard of 12 months between visits provides a small amount of leeway to account for the fact that security conditions, Lebanese Armed Forces (LAF) scheduling, or other factors (such as the 365th day falling on a holiday or weekend) outside of the Office of Defense Cooperation’s control could impact the exact date on which inventories were scheduled. If, for example, an item was inspected in February 2017 and again in February 2018, our analysis would consider it timely regardless of the actual date of inspection. We considered items that were unavailable for inspection due to deployment, repair, and security conditions to be accounted for because they were unavailable for legitimate reasons. If the Office of Defense Cooperation recorded an observation showing that an item was unavailable for legitimate reasons within 12 months of the last observation, we considered that observation to be timely. Because the SCIP dataset we analyzed does not include the date an item was returned from deployment or repair, we determined that a reinspection was timely if it was conducted within 4 months of the observation indicating the item was unavailable for inspection. We used a 4-month standard by examining the average and median length of time for a reinspection, which were 3.7 months and 3 months, respectively. The 4-month standard provides some time for an item to be returned before triggering the 90-day reinspection requirement. After we applied the 4-month standard, 367 observations, or about 3 percent of all observations we analyzed for timeliness, were still considered delinquent because they had not been reinspected within 4 months. On average, the items that were considered delinquent under this standard were reinspected about 8 months after they were considered delinquent, or about 12 months after the last attempted visit, indicating, on average, that these items were not inspected again until the next annual cycle. Because we do not know the date on which an item was returned, however, our analysis may slightly over-count delinquencies resulting from an item being unavailable for inspection. Our analysis only examined the time between recorded observations. Therefore, it did not count any items that were delinquent as of the end of 2018 if no observation had been recorded. The SCIP dataset includes no observation for 609 items in 2018. Of these, 117 were disposed of, lost, or expended in combat prior to 2018, 476 were observed in 2017 but delinquent as of the end of 2018, and 16 items were last observed before 2017. Additionally, due to data limitations, we did not analyze whether the first observation for each item was timely. Because our data set started in 2013, we did not have data on the date of the last observation for items delivered prior to 2013. DOD’s standards also state that DOD officials must first inspect items requiring enhanced end-use monitoring within 90 days of the item’s delivery. However, the SCIP data we analyzed only included the date the item was entered into SCIP, rather than the item’s delivery date, so we could not analyze whether the first inspection for items delivered after 2013 was timely. We did not include these observations in our analysis of timeliness. We conducted logical tests of the SCIP data, interviewed knowledgeable DOD officials about the database, and discussed our analysis with DSCA and ODC officials. We determined the data were sufficiently reliable for our purposes. We traveled to Tripoli, Lebanon and visited three LAF facilities to observe DOD procedures for conducting end-use monitoring and to see how the LAF safeguarded the equipment provided to them. We observed DOD’s enhanced end-use monitoring process for the 271 items in these three locations. We conducted this performance audit from October 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Elizabeth Field, (202) 512-2775 or fielde1@gao.gov. In addition to the contact named above, Biza Repko (Assistant Director), Kara Marshall (Analyst-in-Charge), Adam Brooks, Lisa G. Shibata, Aldo Salerno, Neil Doherty, Martin de Alteriis, and Ashley Alley made key contributions to this report.", "summary": "Since 2013, State and DOD have obligated nearly $1.5 billion in assistance to support Lebanese security forces. U.S. support for Lebanon is complicated due to the prominent role in the country of Hizballah, an Iranian-backed terrorist organization, which retains considerable influence as a major political party and a militia. The U.S. support includes equipment and training to build the capacity of Lebanese security forces. The equipment provided is subject to end-use monitoring requirements, which seek to ensure items are properly accounted for in Lebanon's inventory. GAO was asked to review U.S. security assistance provided to Lebanon since 2013. For fiscal years 2013 through 2018, this report (1) examines to what extent State and DOD assessed progress toward achieving strategic objectives related to security; (2) describes safeguards to limit the risk of U.S. assistance benefitting terrorist organizations; and (3) evaluates State and DOD end-use monitoring checks of equipment provided to Lebanese security forces. GAO analyzed State and DOD reports, documents, and data; and interviewed officials in Washington, D.C. and Beirut, Lebanon. The Departments of State (State) and Defense (DOD) reported progress in meeting security objectives in Lebanon, but gaps in performance information limit their ability to fully assess the results of security-related activities. State and DOD report improvements in Lebanese security forces' capabilities in key areas, such as border security. As part of monitoring such improvements and assessing the performance of security activities in Lebanon, State created related indicators but has not established targets for all of these indicators. Furthermore, State's data were incomplete for 11 of the 15 indicators GAO analyzed. For example, performance data for three indicators did not identify the number or percentage of people who received security training, as called for by the indicator. Without addressing these gaps, State has limited ability to determine to what extent it is achieving the intended results of its security-related activities in Lebanon. State and DOD use two primary safeguards to limit the risk of terrorist organizations benefitting from U.S. assistance to Lebanon. First, State routinely reviews the leadership of the Lebanese military and police forces and has determined they are not controlled by a foreign terrorist organization. Second, State and DOD vet potential trainees to ensure they do not have known or suspected ties to terrorism. Consistent with end-use monitoring requirements, State and DOD conducted required inventory checks of equipment provided to Lebanese security forces, but DOD did not meet its timeliness standards for nearly one-third of its observations. According to DOD officials, the method DOD uses to determine when it should complete annual inspections does not consider the date of the equipment's last inspection, which results in some inspections taking longer than prescribed by DOD's timeliness standards. Without conducting checks in a timely manner, DOD cannot fully ensure the equipment is properly accounted for and safeguarded. GAO is making three recommendations: 1) State should establish, as appropriate, and consolidate targets for its security-related performance indicators; 2) State should collect complete performance data for security-related indicators; and 3) DOD should revise its approach for determining when end-use monitoring inspections are to be completed to consider the date of last inspection. State and DOD concurred with these recommendations.", "document_type": "gao"}
{"report": "SEC has five Commissioners who oversee its operations and provide final approval over staff interpretation of federal securities laws, proposals for new or amended rules to govern securities markets, and enforcement activities. Headed by the SEC Chairman, the Commissioners oversee five divisions, 24 offices, and 11 regional offices. As shown in figure 1, SEC has designated four offices and five divisions as mission-critical (i.e., primarily responsible for implementing SEC’s mission). Table 1 outlines the roles and responsibilities of these mission-critical offices and divisions. The mission-critical offices and divisions are supported by other offices, such as the Office of Human Resources and the Office of Financial Management. SEC’s Office of Human Resources provides overall responsibility for the strategic management of SEC’s personnel management and assesses compliance with federal regulations for areas such as recruitment, retention, leadership and staff development, and performance management. In addition, certain divisions have internal human resource coordinators that coordinate between the Office of Human Resources and their respective division heads. The Office of Human Resources reports to SEC’s Office of the Chief Operating Officer, which in turn reports to the Office of the Chairman. The Office of Financial Management administers the financial management and budget functions of SEC. The Office assists the Chief Operating Officer in formulating budget and authorization requests, monitors the use of agency resources, and develops, oversees, and maintains SEC financial systems. To carry out its mission, SEC employs staff with a range of skills and backgrounds throughout the United States. As of September 2019, SEC employed 4,369 staff. Of these, approximately 69 percent were designated as mission-critical, and the remaining 31 percent were other professional, technical, administrative, and clerical staff. As shown in figure 2, the largest mission-critical occupational category is attorneys, who make up over 50 percent of all mission-critical employees. In addition, over 40 percent of all mission-critical employees work in one of SEC’s 11 regional offices. The regional offices are responsible for investigating and litigating potential violations of securities laws. The regional offices also have enforcement and examination staff to inspect regulated entities. SEC staff are represented by the National Treasury Employees Union (which we refer to in this report as the SEC employees’ union). To help SEC attract and retain qualified employees, in 2002 Congress enacted the Investor and Capital Markets Fee Relief Act (Pay Parity Act), which allowed SEC to implement a new compensation system with higher pay scales, comparable to those of other federal financial regulators. To stay within its annual appropriation, SEC imposed a hiring freeze beginning on October 1, 2016, and lifted it on April 1, 2019. During the hiring freeze, SEC permitted some exceptions on a case-by-case basis to fill positions that it determined to be critical to meeting key agency objectives and maintaining critical programs. Based on SEC’s budget justification documents, from October 1, 2016, through September 30, 2018, SEC lost a net total of 476 positions agency-wide, including 363 positions across its mission-critical offices and divisions. Figure 3 shows the staffing levels in SEC’s mission-critical offices and divisions during fiscal years 2016, 2017, and 2018. The results of our 2019 survey of mission-critical nonexecutive SEC employees indicate that most employees had positive views on some aspects of SEC’s personnel management and organizational culture, such as the skills of their direct supervisors and colleagues. Our survey results also indicate that employees had concerns related to SEC’s performance management system, perceptions of a risk-averse culture, and perceptions of favoritism in hiring and promotions. Employees had mixed views in other areas, such as morale, communication, and training. Finally, employees’ responses to key questions on organizational culture in our 2019 survey generally remained consistent with the results from our 2016 survey. See appendix III for a comparison of our 2016 and 2019 survey results for selected questions. Based on the results of our survey of mission-critical nonexecutive employees, we estimate that more than 75 percent of employees had favorable views of their direct supervisors in areas such as their skills and expertise, how they share information, and their willingness to listen to differing approaches (see fig. 4). In addition, we estimate that 70 percent of employees agreed that supervisors and managers in their division or office tolerate honest mistakes as learning experiences, and 68 percent agreed that supervisors and managers in their division or office are genuinely interested in the opinions of their staff. Similarly, in OPM’s 2018 Federal Employee Viewpoint Survey (hereafter referred to as OPM’s 2018 survey), SEC employees expressed positive views about their supervisors. In that survey, more than 80 percent of SEC employees agreed that they have trust and confidence in their supervisor (83 percent) and that their supervisor listens to what they have to say (88 percent) and treats them with respect (90 percent). Our survey results also indicate that most employees had positive views about the people SEC hires. As shown in figure 5, we estimate that 79 percent of employees agreed that their division or office is able to attract talented and qualified employees. We also estimate that 75 percent agreed that SEC management usually hires employees who are a good fit for SEC’s mission. In addition, in OPM’s 2018 survey, an estimated 90 percent of all employees agreed that SEC’s workforce has the job- relevant knowledge and skills necessary to accomplish the organization’s goals. For OPM’s 2018 survey of SEC employees, employees responded positively to questions related to their satisfaction with SEC as a place to work. Based on that survey, SEC’s overall score on OPM’s Global Satisfaction Index—which measures employee satisfaction with job, pay, and their organization—was 82 percent, while the government-wide score was 64 percent. In addition, SEC’s score on OPM’s Employee Engagement Index—which measures employees’ perceptions of leadership, interpersonal relationships between workers and supervisors, and employees’ feelings of motivation and competency related to their roles in the workplace—was 78 percent (compared to 68 percent government-wide). Moreover, from OPM’s 2013 survey to the 2018 survey, SEC’s scores improved in both of these categories by more than 15 percentage points, indicating that employees’ views are improving over time. More than 40 percent of employees expressed dissatisfaction with key aspects of SEC’s performance management system. As discussed later in this report, at the time of our survey, SEC employees covered by the union’s bargaining unit were rated under a pilot performance management system in which they received an initial four-tier rating, which was converted into a final two-tier rating of acceptable or unacceptable. Our survey results indicated areas of dissatisfaction with this system, as shown in figure 6. For example, based on our survey, we estimate that 48 percent of employees disagreed that the performance management system created meaningful distinctions in performance among employees. Similarly, in OPM’s 2018 survey, employees also expressed concerns about various aspects of performance management. For example, an estimated 33 percent of employees disagreed that their work unit takes steps to deal with poor performers, and 35 percent disagreed that differences in performance are recognized in a meaningful way. Our survey indicated that more than 40 percent of SEC employees continued to have concerns about excessive risk aversion—the condition in which the agency’s ability to function effectively is hindered by the fear of taking on risk. We estimate that 47 percent of nonsupervisors and 48 percent of supervisors agreed that the fear of public scandal has made SEC overly cautious and risk averse. These results were similar to our 2016 survey (46 percent of nonsupervisors and 49 percent of supervisors agreed), which were an improvement from the results of our 2013 survey. In addition, as shown in figure 7, about 40 percent of SEC employees agreed that the fear of being wrong makes senior officers in their division or office reluctant to take a stand on important issues. As we reported in 2013, changes to organizational culture, including reducing excessive risk aversion, require sustained efforts by senior management. Responses to other questions on our survey suggest that managers support the types of activities that may help reduce excessive risk aversion. For example, an estimated 60 percent of employees agreed that innovative ideas are encouraged in their division or office. Also, as noted above, we estimate that 70 percent of employees agreed that their supervisors and managers tolerate honest mistakes as learning experiences. Our survey results suggest that a quarter of employees had concerns about favoritism in SEC’s hiring process, and more than a third had such concerns about its promotion process. With respect to hiring, we estimate that 25 percent of employees agreed that hiring is sometimes based more on personal connections than on substantive experience and qualifications. With respect to promotions, as shown in figure 8, we estimate that 35 percent of nonsupervisory staff disagreed that promotion to management is based more on substantive experience than on favoritism and that favoritism is not an issue in promotions. A lack of clarity in the hiring and promotion processes may have contributed to employees’ perceptions related to favoritism. Based on our survey results, an estimated 50 percent of employees disagreed that the criteria for rewarding and promoting staff are clearly defined. Later in this report we discuss the steps SEC has taken to improve its promotion and hiring policies. While OPM’s 2018 survey results indicated that SEC employees largely had positive views about SEC as a place to work, the results of our 2019 survey of mission-critical nonexecutive employees indicate that the recent hiring freeze may have negatively impacted their views on morale. Based on our survey, we estimate that 37 percent of employees disagreed that morale is generally high most of the time, as shown in figure 9. In addition, based on our survey, we estimate that 63 percent of employees believed the recent hiring freeze had a negative impact on morale, including 31 percent who believed the negative effect was large. Over 60 SEC employees provided written survey comments related to morale. Some employees who provided written comments cited other concerns that had a negative impact on morale. For example, some employees stated that low pay increases and the lack of merit pay have contributed to low morale among high-performing employees. Some employees also noted that the 2019 government shutdown had a negative impact on morale by implying that federal employees’ work is not valuable. Most employees expressed positive views on whether cross-divisional communication is encouraged, but employees in some offices and divisions had concerns about communication within their division or office. Specifically, an estimated 66 percent of employees agreed that communication with other divisions and offices on work-related matters is encouraged. These survey results are generally consistent with SEC’s results on OPM’s 2018 survey, in which an estimated 73 percent of employees agreed that managers support collaboration across work units to accomplish work objectives, and an estimated 69 percent agreed that managers promote communication among different work units. However, in our survey, we found that some employees had more negative views about communication within divisions and offices. For example, we estimate that 34 percent of employees disagreed that information and knowledge are openly shared at all levels within their division or office, and 27 percent of employees disagreed that SEC management ensures employees are included in the flow of relevant information. As shown in figure 10, these figures were highest for employees in the Division of Corporation Finance and the Office of Information Technology. Most SEC employees expressed positive views on SEC’s commitment to training and the extent to which their training provided the skills and experience to meet SEC’s needs (see fig. 11). However, our survey results indicated heightened concerns about the number of training opportunities with outside instructors in some divisions and offices. While we estimate that 76 percent of employees reported that there were opportunities to participate in training that provided the latest industry-specific knowledge with outside instructors, we estimate that more than 30 percent of employees in several offices and divisions indicated that the number of such opportunities was less than adequate (see fig. 12). These concerns were highest in the Office of Information Technology, where more than half of the staff viewed such training opportunities as less than adequate. We administered a separate survey to 80 SEC senior officers in mission- critical offices and divisions, and 50 provided responses. Respondents generally had favorable views on issues such as hiring and retaining talent, communication, training, and morale. For example, 90 percent of senior officers we surveyed said their division or office is able to attract talented and qualified employees and that information is adequately shared across groups in their division or office. In addition, 82 percent agreed that morale is generally high most of the time. However, similar to nonexecutive employees, senior officers expressed concern about SEC’s performance management system. For example, 70 percent disagreed that current performance incentives were effective tools to motivate employees to perform well, and 50 percent disagreed that SEC’s performance management system provides consistent standards for rewarding performance. Since 2013, SEC has twice redesigned its performance management system without periodically validating it, as we recommended in 2013. Validating the system typically refers to obtaining staff input and general agreement on the competencies, rating procedures, and other aspects of the system. In our 2013 report, we found that SEC’s performance management system reflected many elements of OPM’s guidance but that implementation of the system could be improved. Also, consistent with best practices, we recommended that SEC conduct periodic validations, with staff input, of the performance management system and make changes as appropriate based on these validations. SEC agreed with our recommendation. In fiscal year 2016, SEC began to pilot a new performance management system with a four-tier rating scale. According to SEC officials, the four- tier rating system for non-bargaining-unit employees was fully implemented in 2017 and continued as a pilot in fiscal years 2017, 2018, and 2019 for bargaining unit employees. However, SEC did not validate this system. In our 2016 report, we reiterated the importance of our 2013 recommendation and emphasized that SEC should only make changes to its performance management system based on validations and staff feedback. Despite plans to survey all employees to validate the agency’s pilot performance management system and obtain employee feedback in fiscal years 2017 and 2018, SEC officials said they have been unable to do so, in part because they could not reach agreement with the SEC employee union on the planned survey questions. SEC and the union agreed in November 2018 that SEC will implement another new performance management system, including a new incentive bonus program, in 2020. Because SEC did not validate the four-tier system it was piloting, it missed an opportunity to obtain employee input to inform the design of the new system. Under the new system, all SEC employees will be evaluated on a two-tier rating scale: “accomplished performer” and “unacceptable.” In addition, SEC plans to implement a new incentive bonus program that will provide opportunities for high- performing employees to earn a bonus of up to $10,000 once per fiscal year. According to SEC officials, SEC plans to work with OPM to validate the new performance management system by surveying staff on the new system at the conclusion of the 2020 appraisal period, after which OPM will submit a final assessment of the program with any recommended actions for SEC. These plans are consistent with our 2013 recommendation that SEC should conduct periodic validations of its performance management system. However, until SEC completes its planned activities, this recommendation remains unaddressed. The negative views expressed by many employees in our survey underscore the need for SEC to validate its performance management system. As discussed earlier, more than 40 percent of employees were dissatisfied with key aspects of SEC’s performance management system, such as the extent to which the performance management system created meaningful distinctions in performance among employees. In addition, based on our survey, we estimate that 30 percent of SEC employees disagreed that SEC’s performance management system uses relevant criteria to evaluate their performance. Validating the new performance management system with staff input should help SEC better ensure that it is achieving its goals and identify any changes needed to address employee dissatisfaction with performance management. In prior work, we reported that effective performance management requires that the organization’s leadership make meaningful distinctions between acceptable and outstanding performance of individuals and appropriately reward those who perform at the highest level. In addition, our prior work on strategies federal agencies can use to manage performance-oriented pay systems has shown the need for agencies to build in safeguards to enhance transparency and ensure the fairness of pay decisions. One such safeguard is to include multiple levels of review of performance ratings and pay decisions to ensure consistency and fairness in the process and the resulting decisions. Another safeguard is to publish aggregate data on the results of the performance cycle, which allows employees to compare results across various groups within the agency while protecting the confidentiality of individual ratings and pay decisions. SEC has not yet developed mechanisms for transparency and fairness for its new performance incentive bonus program. Under the program, a supervisor may nominate an employee who demonstrates exceptional performance according to certain criteria to receive a bonus payment of up to $10,000 once per fiscal year. SEC officials told us that specific policies and procedures for the bonus program were still being developed at the time of our review, but they could not provide details on how they planned to ensure transparency and fairness in implementing the program. Moreover, as of November 2019, SEC had not provided detailed policies and procedures, nor had it established a date by which such policies and procedures would be finalized, despite its goal of implementing the new program in January 2020. Developing and implementing adequate safeguards could increase employees’ confidence in the new performance incentive bonus program. Without adequate safeguards to enhance transparency and better ensure fairness, employee dissatisfaction with performance management may persist and could undermine the credibility of the new bonus program. SEC has taken action to fully implement the two recommendations from our 2013 report related to developing and implementing a comprehensive workforce and succession planning process that is consistent with OPM guidance. In our 2016 report, we found that SEC had developed a workforce and succession plan in response to these recommendations. However, we identified weaknesses with this plan, such as the lack of a comprehensive skills gap analysis to help ensure that employees across all occupations have the skills necessary to fulfill SEC’s mission. Since our 2016 review, SEC completed a more comprehensive skills gap analysis and began to implement new workforce and succession planning processes that address other weaknesses we had identified. In fiscal year 2019, SEC developed and began to implement a new workforce planning strategy that outlined new processes for workforce and succession planning. SEC’s previous process focused on creating a consolidated workforce plan in a single document that focused on five divisions and two offices, accounting for 67 percent of SEC employees. SEC officials told us that the new process is more dynamic and responsive because it provides more workforce data to officials in the divisions and offices. Specifically, SEC developed various human capital dashboards that provide the Office of Human Resources and agency leaders with up-to-date data on the state of the agency’s workforce, such as data on hiring, attrition, skill gaps, and other workforce demographics. Key components of SEC’s new workforce and succession planning processes address weaknesses identified in our prior work: Skills gap analysis. Our 2016 review found that SEC’s workforce plan lacked a comprehensive skills gap analysis covering all SEC occupations. In 2018, SEC conducted an agency-wide competency survey to identify skills gaps by position in each division and office. SEC incorporated the results of this survey into one of its human capital dashboards that allows users to interact with the data directly. Specifically, SEC’s Workforce Competency Dashboard provides competency data (including gaps) across offices and divisions, allowing users to explore critical skill gaps by competency. According to SEC’s workforce planning strategy, divisions and offices can use the data to address skill gaps through activities such as training, hiring, and knowledge sharing. For example, to address an identified gap in written communication and critical thinking for newly hired investigative attorneys, the Division of Enforcement and the Office of Human Resources developed interview questions to better screen for these skills during the hiring process. Human capital reviews. We also found in 2016 that SEC’s workforce plan was not clearly linked to its budget formulation and did not inform decision-making about the structure of the workforce. Under its new workforce planning process, SEC links its workforce planning to its budget through annual human capital reviews in which divisions and offices work with the Office of Human Resources to identify workforce needs and priorities to directly inform their operating plans and budget requests. These human capital reviews include discussions about the capacity and capability of the organization to meet current mission needs and whether areas of the workforce need to be reshaped to meet SEC’s mission. SEC officials told us that under SEC’s previous workforce planning process, these reviews were conducted concurrently with budget meetings, whereas under its new process these meetings are conducted prior to the budget meetings. This change allows divisions and offices to use the information from the review meetings to prepare for their budget meetings. In addition, the human capital review meetings are informed by data maintained in SEC’s new Workforce Supply Dashboard, which provides information on the composition and demographics of SEC divisions and offices and allows users to view data on hiring, attrition, and other workforce indicators. For example, through this process, SEC recently determined that it had an excess of certain positions, such as clerks and assistants responsible for data processing and management. This determination led SEC to request permission from OPM for a targeted early retirement authority and incentives for individuals in such positions. New succession planning processes. In 2016, we found that SEC’s succession planning lacked information on workforce attrition and a fair and accurate process for identifying future leaders. Under SEC’s new succession planning process, the Office of Human Resources tracks senior-level turnover to determine the level of attrition at senior leadership levels and to determine whether SEC is filling these positions internally or externally. In addition, the Office of Human Resources created a standardized template that managers in each division and office use to identify key leadership positions and candidate pools. According to SEC, this more standardized approach offers an extra level of precision and rigor to identify the specific leadership strengths and risks across the largest divisions and offices. In addition, since our 2016 report, SEC has improved processes for analyzing its talent pool for new leaders. In 2017, the Office of Human Resources surveyed employees to gauge their interest and intent in progressing to higher levels of management responsibility, including to the senior officer ranks. SEC is also developing a centralized program to screen and select a cohort of high-potential leaders who will be certified and available to fill senior officer positions as they become vacant. SEC officials said they anticipate the program will be launched in the second half of fiscal year 2020. The processes and tools described above are still new, and SEC is continuing to integrate and develop them fully. For example, 2019 was the first year SEC used its new workforce planning process, and SEC officials told us that senior officers are still learning how they can best use new tools, such as the new human capital dashboards. One SEC official told us that SEC is still refining this new approach and plans to consider additional enhancements to the dashboards, such as including more forward-looking data to inform discussions of future workforce needs. Although SEC continues to enhance its new process and practices, the actions it has taken fully implement our two 2013 recommendations. SEC has taken steps to improve certain practices related to hiring and promotions. For example, in 2016, we found that SEC had not identified skills gaps among its hiring specialists and that these staff received limited training. As a result, SEC lacked assurance that its hiring specialists had the necessary skills to hire and promote the most qualified applicants. We recommended that SEC develop and implement training for hiring specialists that is informed by a skills gap analysis. In response to our recommendation, SEC’s Talent Acquisition Group partnered with SEC’s training group to conduct a competency gap assessment for each of the Talent Acquisition Group’s five primary jobs. Based on the results of this competency assessment, in 2018 SEC developed and prioritized a 2-year training plan for hiring specialists to address the identified skills gaps and to better enable SEC to recruit, develop, and retain competent staff. This skills gap analysis and the new training curriculum for hiring specialists fully address our 2016 recommendation. SEC also made changes to policies for promotion announcements to improve perceptions of fairness and transparency. For example, since 2016, a promotion opportunity can be limited to applicants within a single division or office only if that division or office has at least 15 eligible candidates. If there are fewer than 15, the announcement must be opened more broadly to candidates in SEC beyond that particular office or division. In addition, SEC now requires that promotion announcements be open for a minimum of 10 business days. SEC has fully addressed recommendations we made in 2013 and 2016 to improve intra-agency communication and collaboration: Incentives for staff to communicate and collaborate. In 2013, we found that SEC had made efforts to improve communication and collaboration but had not fully addressed barriers to an environment of open communication. We recommended that the SEC Chief Operating Officer identify and implement incentives for all staff to support an environment of open communication and collaboration. We determined that this recommendation had been fully implemented in November 2017. Among other steps, in 2016 SEC revised its performance expectations for supervisors to encourage communication and collaboration and proactively share relevant information. Best practices for communication and collaboration. In 2013, we recommended that SEC explore communication and collaboration best practices and implement those that could benefit SEC. SEC has taken action to fully implement this recommendation. Specifically, SEC’s Office of the Chief Operating Officer engaged a third-party management consultant team to complete a study of best practices for communication and collaboration, which was completed in 2018. For the study, the consultants developed a framework of best practices recognized in the public and private sectors and assessed SEC’s practices against the framework. The consultants found that each of the best practices in its framework was met by at least one of SEC’s activities, tools, technologies, or initiatives. The report included eight recommendations to help address barriers to cross-division communication and collaboration, among other goals. In response to these recommendations, as of May 2019, SEC had taken action on six recommendations and developed planned actions for the remaining two. For example, to facilitate staff-to- staff communication and collaboration, SEC officials updated the intranet sites of each mission-critical office and division with main contact telephone numbers and staff directories. In addition, SEC plans to pilot an electronic communication tool for project execution among teams collaborating across divisions and offices that will provide more functionality than SEC’s current application. Cross-divisional committees and working groups. In 2016, we noted that the lack of a central position or office with authority over the daily operations of all divisions and offices made it difficult to address challenges related to communication and collaboration. We recommended that SEC enhance or expand the responsibilities and authority of the Chief Operating Officer or another official or office to help ensure that improvements to communication and collaboration across SEC were made. While SEC disagreed with this recommendation, it has taken actions that meet the intent of our recommendation. First, SEC created cross-divisional committees and working groups that help to enhance intra-agency communication and collaboration. For example, in 2018, SEC created an Operations Steering Committee, which consists of senior operational leaders throughout the agency who meet on a regular basis to discuss and collaborate on cross-agency operational issues, including those related to human capital. SEC also created other formal intra-agency committees and working groups, including an Information Technology Capital Planning Committee, an Emerging Risk Group, and a Data Management Board. Second, between 2009 and 2018, SEC established Managing Executive positions in the Office of the Chairman and in eight of its nine mission- critical offices and divisions. Managing Executives are responsible for working closely with one another, including serving together on intra- agency working groups, to facilitate effective internal collaboration on operations issues, including personnel management. The Managing Executive in the Office of the Chairman, established in 2017, acts as a liaison between the Chairman’s office and the various committees and working groups. According to an agency official, having a Managing Executive position in the Office of the Chairman helps ensure that someone from the Chairman’s office has the time to devote to operational issues. SEC has taken a number of actions since 2016 to strengthen its personnel management. It has implemented a more comprehensive approach to workforce planning and improved intra-agency communication and collaboration through new working groups and implementation of best practices. OPM’s 2018 employee survey also suggests that employee satisfaction at SEC has improved. Despite this progress, SEC has yet to validate its performance management system since we recommended it do so in 2013. Without such validation, SEC may lack information that could help it identify changes needed to address employee dissatisfaction and ensure its system achieves its goals. We therefore reiterate our 2013 recommendation that SEC conduct periodic validations, with staff input, of the performance management system and make changes as appropriate based on these validations. Consistent with our recommendation, SEC officials stated they plan to work with OPM to validate the new performance management system. However, until SEC completes its validation of the new system, which it plans to do at the conclusion of the 2020 appraisal period, this recommendation remains unaddressed. Finally, a key feature of SEC’s new performance management system will be a performance incentive bonus program through which SEC supervisors will be able to nominate individual employees for a bonus of up to $10,000 once per fiscal year. Our prior work on performance management has highlighted the importance of safeguards that can help ensure that agencies’ performance management systems—and particularly the systems affecting pay—are fair and transparent. At the time of our review, SEC was in the process of designing the performance incentive bonus program and did not provide us with detailed policies or procedures. As SEC works to finalize procedures for this bonus program, incorporating safeguards such as multiple levels of review of performance ratings and pay decisions can help to promote employee confidence in the integrity of the program. The Chair of the Securities and Exchange Commission should direct the Chief Operating Officer to develop and implement safeguards to better ensure transparency and fairness in SEC’s new performance incentive bonus program. Such safeguards could include multiple levels of review of performance ratings and pay decisions and publishing aggregate data on the results of the performance cycle that allow employees to compare results across various groups within the agency while protecting the confidentiality of individual ratings and pay decisions. (Recommendation 1) We provided SEC a draft of this report for its review and comment. SEC provided written comments that are reprinted in appendix VI. SEC also provided technical comments that we incorporated, as appropriate. In its written comments, SEC stated that it concurred with, and plans to implement, our recommendation to develop and implement safeguards to better ensure transparency and fairness in its new performance incentive bonus program. SEC stated that it appreciated our suggested practices, and that it will conduct research to consider additional safeguards. SEC also highlighted its implementation of eight of nine of our previous recommendations related to personnel management. SEC noted its progress in the areas of workforce planning and intra-agency communication and recognized that further work remains to be done. With respect to our 2013 recommendation that it conduct periodic validations of the performance management system, which SEC has not yet implemented, SEC stated that it expects to obtain feedback from employees and managers at the conclusion of the 2020 performance cycle to identify further improvements, and that it is committed to conducting periodic evaluations of its system in the future. We will continue to monitor SEC’s progress toward implementing this recommendation. We are sending copies of this report to the appropriate congressional committees, the Chairman of the Securities and Exchange Commission, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 202-512-8678 or clementsm@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VII. Table 2 provides the status of recommendations we made to the Securities and Exchange Commission in 2013 and 2016. This report examines (1) employees’ views on the Securities and Exchange Commission’s (SEC) personnel management and organizational culture, (2) SEC’s efforts to implement a performance management system, (3) SEC’s implementation of a workforce planning process, and (4) SEC’s steps to strengthen communication and collaboration within and across its divisions and offices. To examine employees’ views on SEC’s personnel management and organizational culture, we conducted two surveys of SEC staff, performed a content analysis of open-ended responses to our surveys, and conducted individual interviews. Surveys. To obtain employees’ views on SEC’s personnel management and organizational culture, we implemented two web-based surveys from March 2019 to May 2019. We administered the first survey to a stratified random sample of 877 nonexecutive employees in mission-critical occupations in mission-critical offices and divisions. We administered the second survey to all 80 senior officers in mission-critical offices and divisions. To determine our sample of nonexecutive employees, we stratified the population of mission-critical SEC employees into sampling strata by office and division to help mitigate the risk that a particular part of SEC could be over- or underrepresented by the respondents to our survey. We stratified the Division of Enforcement and the Office of Compliance Inspections and Examinations into two further categories (“headquarters” and “regional office”) because this division and office have a majority of their staff located in one of SEC’s 11 regional offices. Table 3 shows the total number of employees and the number of employees selected in our sample for each of the strata. Due to their small employee counts, we combined the Offices of the Chief Accountant and Credit Ratings into one stratum for the purpose of selecting the sample. Prior to selecting the sample, we sorted the sample frame by supervisory status within each stratum. We then selected the sample via systematic random sampling within each stratum. Our initial sample size allocation was designed to achieve a stratum-level margin of error no greater than plus or minus 8 percentage points at the 95 percent level of confidence. Based upon our prior surveys on SEC’s personnel management, we assumed a response rate of 70 percent to determine the sample size for the mission-critical employees. Because some employees left SEC between the time we obtained a list of SEC employees and the launch of the survey, the final sample size decreased from 884 to 877. Because we followed a probability procedure based on random selections, our sample is only one of a large number of samples that we might have drawn. Since each sample could have provided different estimates, we express our confidence in the precision of our particular sample’s results as a 95 percent confidence interval. This is the interval that would contain the actual population value for 95 percent of the samples we could have drawn. We provide confidence intervals along with each sample estimate in the report. All survey results presented in the body of this report are generalizable to the estimated population of 2,907 in-scope mission-critical employees at SEC as of September 30, 2018. For our survey of nonexecutive employees in the mission-critical offices and divisions, 563 nonsupervisors and supervisors responded to our survey, for a response rate of 64 percent. For our survey of all mission- critical senior officers, 50 responded to our survey, for a response rate of 63 percent. For the nonexecutive survey, we carried out a statistical nonresponse bias analysis using available administrative data and determined that the results are generalizable to SEC’s mission-critical employees. We do not attempt to extrapolate the findings of our senior officer survey to those who chose not to participate. Each GAO survey of SEC staff included questions on personnel management issues related to (1) recruitment, training, staff development, and resources; (2) communication among and within divisions and offices; (3) leadership and management; (4) performance management and promotions; and (5) organizational culture and climate. The separate survey of all mission-critical SEC senior officers (those at the SO-1, SO-2, and SO-3 pay grades) covered the same topic areas but omitted questions not relevant to senior officers and included additional questions specifically relevant to senior officers. Our surveys included both multiple-choice and open-ended questions. We analyzed the results of our 2019 survey of supervisory and nonsupervisory staff and senior officers, and we compared the results to results of similar surveys we conducted in 2013 and 2016. In addition, we reviewed the Office of Personnel Management’s (OPM) 2018 Federal Employee Viewpoint Survey results to obtain additional perspectives from SEC staff on issues related to the agency’s personnel management and to compare SEC’s results to government-wide responses. To minimize certain types of errors, commonly referred to as nonsampling errors, and enhance data quality, we employed recognized survey design practices in the development of the questionnaires and the collection, processing, and analysis of the survey data. To develop our survey questions, we drew on prior GAO SEC personnel management surveys. For both of our 2019 surveys, we took steps to ensure that survey questions from 2016 were still relevant and to determine if new issues warranted new questions. To do this, we reviewed information from individual interviews with current and former employees, met with five mission-critical employees to pretest the nonexecutive survey, and met with two senior officers to obtain their feedback on the senior officer survey. As a result of these meetings, for example, we added three questions related to the impact of SEC’s hiring freeze on personnel management. In addition, a GAO survey expert reviewed and provided feedback on our survey instrument. To reduce nonresponse, another source of nonsampling error, we sent multiple emails encouraging SEC employees to complete the surveys, and we made telephone calls to nonrespondents to encourage participation and troubleshoot any logistical issues in accessing the questionnaire. We also had respondents complete questionnaires online to eliminate errors associated with manual data entry. On the basis of our application of these practices and follow-up procedures, we determined that the survey data were of sufficient quality for the purpose of obtaining employees’ views on SEC’s personnel management and organizational culture. Content analysis. To analyze the information we obtained from the open-ended survey responses, we conducted a content analysis on the 633 responses to the six open-ended survey questions from the survey of the mission-critical offices and divisions. Five staff members developed coding categories based on our researchable objectives, information collected during our individual interviews, and the findings from our December 2016 report. Coding categories were as follows: (1) workforce management, (2) communication, (3) management, (4) promotions, (5) performance management, and (6) risk aversion. For each of the responses to the six open-ended questions, a GAO analyst categorized the response into the respective coding categories. A second GAO analyst reviewed the coding, and any disagreements in the coding were resolved through discussion or with a third analyst. Individual interviews. We interviewed 51 nonsupervisory and supervisory employees—in person at SEC headquarters and by telephone for those in headquarters and regional offices—in November and December 2018 to obtain their views on personnel management at SEC. Using information provided by SEC, we sent 577 letters to all employees who separated from SEC between March 2016 and November 2018, offering them an opportunity to schedule a meeting with us. We interviewed 15 of these former SEC employees by phone in January and February 2019. We asked certain questions of every person we interviewed related to (1) what personnel management practices were working well, (2) what challenges existed in personnel management, and (3) what initiatives, if any, SEC had taken to address these challenges. To maintain the confidentiality of individual responses, we did not record individual names in our transcripts. Instead, we collected and analyzed the information by division and rank only, and we aggregated our findings so that no individual comments could be identified. GAO analysts summarized themes that emerged from these individual interviews and used them to identify key issues related to SEC’s personnel management and inform the design of our surveys. To obtain information on SEC’s efforts related to performance management, workforce planning, and communication and collaboration, we reviewed relevant SEC documents and interviewed SEC officials in the Office of Human Resources and other divisions and offices. We reviewed changes SEC made to its personnel management practices since our 2016 review, including steps taken to address our recommendations in these areas. We interviewed SEC staff from the Office of Human Resources about the status of SEC’s efforts to pilot and implement a performance management system, including the status of SEC’s efforts to address our 2013 recommendation that SEC conduct periodic validations of its performance management system and make changes, as appropriate, based on these validations. We also reviewed documents describing changes to SEC’s performance management system. At the time of our review, SEC had plans to implement a new performance management system, including a new incentive bonus program, in January 2020 but had not yet completed detailed policies and procedures to implement this new system. However, we compared the system’s key features with criteria identified in prior GAO work, including work on strategies federal agencies can use for fair and transparent performance management. In addition, we reviewed the SEC Office of Inspector General’s 2018 report that described progress and challenges in the agency’s performance management efforts. To examine SEC’s workforce and succession planning practices, we obtained and reviewed a copy of SEC’s fiscal year 2019–2022 Workforce and Succession Planning Strategy, which outlines new approaches to workforce and succession planning that SEC began to implement in fiscal year 2019. We also obtained and reviewed documentation of SEC’s implementation of key steps in its workforce and succession planning processes, such as the survey instrument used to identify skill gaps for all SEC occupations, slide presentations of SEC divisions’ operating plans and budget requests that are informed by human capital review meetings, examples of action plans SEC divisions and offices developed to address identified skill gaps, SEC’s Succession Planning Tool Kit, and relevant training plans for SEC divisions. In addition, we attended an SEC-led demonstration of the agency’s new human capital dashboards, which are interactive software tools that provide the Office of Human Resources and agency leaders with up-to- date data on the state of the agency’s workforce, such as data on hiring, attrition, skill gaps, and other workforce demographics. We also interviewed staff from SEC’s Office of Human Resources and senior leaders from different SEC divisions. We compared SEC’s workforce planning process against key principles for effective workforce planning, and we assessed SEC’s efforts to strengthen its workforce and succession planning efforts to determine the extent to which they addressed our 2013 recommendations related to developing a more comprehensive approach to workforce and succession planning. This assessment included reviewing the extent to which key components of SEC’s workforce and succession planning processes aligned with OPM standards on workforce and succession planning. In addition, we reviewed the changes SEC made to its hiring and promotion policies since our last review, including the steps SEC took to address our 2016 recommendation related to developing and implementing training for hiring specialists that is informed by a skill gap analysis. To examine steps SEC has taken to strengthen intra-agency communication and collaboration, we assessed SEC’s efforts to address prior recommendations in this area. Specifically, we reviewed a report by a third-party vendor on communication and collaboration practices at the agency and met with the vendor’s program manager. We also obtained and reviewed documentation of SEC’s actions to implement recommendations included in the vendor’s report. In addition, we reviewed documentation related to SEC’s cross-divisional committees and working groups, including the charter of SEC’s Operations Steering Committee, a cross-agency group chaired by the Chief Operating Officer whose purpose is to facilitate predecisional communications on significant cross-agency operational issues. To obtain information on the effectiveness of SEC’s efforts to enhance communication and collaboration, we also met with senior leaders from SEC’s largest offices and divisions, as well as selected members of SEC’s Operations Steering Committee. We assessed the reliability of all of the data we used during this review and determined they were sufficiently reliable for the purposes of selecting our survey sample; developing summary tables on staffing ratios and turnover; and describing trends and views on personnel management practices at SEC. We used SEC data extracted from the Department of the Interior’s Federal Personnel/Payroll System to construct the sample frames for our two surveys and develop summary tables in our appendixes. To determine the reliability of these data, we reviewed related documentation, tested the data for missing data and errors, and obtained written responses from SEC employees about data quality and control. To assess the reliability of the Federal Employee Viewpoint Survey data, we reviewed technical documentation of the survey and conducted routine data checks. We conducted this performance audit from August 2018 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Figure 13 below shows the results of eight questions related to personnel management and organizational culture from our 2013, 2016, and 2019 surveys of Securities and Exchange Commission (SEC) employees in mission-critical occupations in mission-critical divisions and offices. However, there are important limitations in comparing the results of our 2019 survey to the previous surveys. First, while the results of our 2019 survey were generalizable to all mission-critical nonexecutive employees, the results of our 2013 and 2016 surveys were not. Second, while we present the results for mission-critical employees for each year, for our 2019 survey, we changed the definition of mission-critical to reflect changes SEC had made to its mission-critical designations. The divisions, offices, and occupational categories largely remained the same across the 3 survey years with the following exceptions: for our 2019 survey, the Offices of Information Technology, Credit Ratings, and the Chief Accountant were added to the category of mission-critical offices and divisions. In addition, financial analysts were removed and information technology specialists were added to our list of mission-critical occupations. Third, while we administered the 2019 survey to a representative sample of mission-critical employees, we administered our 2013 and 2016 surveys to all mission-critical employees. As such, we present our 2019 results as estimated percentages with bands representing the range of results within a 95 percent confidence interval. Finally, when comparing our 2019 results on these eight questions to the 2016 survey results, we found that employees’ views on these questions were generally within the confidence intervals of the 2019 results. In these cases, we cannot conclude whether the changes are statistically significant. Overall, employees’ views on whether there is an atmosphere of trust improved since our 2016 survey. Nonsupervisory employees’ views on whether the criteria for promotion are clearly defined and whether information is adequately shared across groups in their division or office also improved. However, for the remaining survey questions, we could not conclude whether employees’ views improved or worsened because changes in employees’ views were within the confidence intervals or were only seen on either the “agree” or “disagree” side of the survey scale, not both. Section 962 of the Dodd-Frank Wall Street Reform and Consumer Protection Act included a provision for us to review whether there is an “excessive number of low-level, mid-level, or senior-level managers” at the Securities and Exchange Commission (SEC). We did not identify any standards that have been established for evaluating excessive numbers of supervisors. Therefore, we are reporting on the ratio of SEC employees at the various levels for fiscal years 2008 through 2018 in mission-critical offices and divisions. Table 4 illustrates the ratio of nonsupervisors to supervisors at SEC. Table 5 illustrates the ratio of nonsupervisors to senior officers, and table 6 illustrates the ratio of supervisors to senior officers. Section 962 of the Dodd-Frank Wall Street Reform and Consumer Protection Act included a provision for us to review turnover rates within Securities and Exchange Commission (SEC) subunits. While staff turnover rates could be used to identify potential areas for improvement and further develop current supervisors, turnover may not be a good indicator of poor supervision for several reasons. For example, staff may leave to pursue opportunities with a different employer or a different career path, or for personal reasons. Tables 7 and 8 show the percentage of staff who left SEC from fiscal years 2008 through 2018 from headquarters and the 11 regional offices, respectively. Table 9 shows the total number of staff who left SEC during the same period. In addition to the contact above, John Fisher (Assistant Director), Charlene J. Lindsay (Analyst-in-Charge), Grzegorz (Greg) Borecki, Carl Barden, Pamela Davidson, Jill Lacey, Marc Molino, Kirsten Noethen, Shannon Smith, Jennifer Schwartz, Benjamin Wiener, and Jason Wildhagen made key contributions to this report.", "summary": "The Dodd-Frank Wall Street Reform and Consumer Protection Act contains a provision for GAO to report triennially on SEC's personnel management. GAO's first two reports ( GAO-13-621 and GAO-17-65 ) identified a number of challenges and included nine recommendations. This report examines (1) employees' views on SEC's personnel management, (2) SEC's performance management system, (3) SEC's steps to improve its workforce planning processes, and (4) SEC's efforts to improve communication and collaboration. GAO surveyed a representative sample of nonexecutive SEC employees in key occupations and all senior officers in nine key divisions and offices (with response rates of 64 and 63 percent, respectively). The results of the nonexecutive employee survey are generalizable to SEC's mission-critical employees. GAO also followed up on prior recommendations, reviewed SEC documents and personnel management practices, analyzed SEC workforce data, and interviewed SEC officials. Securities and Exchange Commission (SEC) employees in the five divisions and four offices GAO surveyed expressed positive views on some aspects of SEC's personnel management but reported concerns in other areas. For example, employees GAO surveyed generally had positive views on their direct supervisors and colleagues—81 percent of nonexecutive employees agreed that their direct supervisors had the skills and expertise to be effective managers. However, more than one-third of employees expressed concerns in areas such as performance management and favoritism. For example, 48 percent of nonexecutives disagreed that the performance management system in place at the time of GAO's review created meaningful distinctions in performance. SEC has implemented eight of GAO's nine recommendations related to personnel management. However, SEC has not yet implemented a 2013 GAO recommendation to validate its performance management system—that is, to obtain staff input and agreement on the competencies, rating procedures, and other key aspects of the system. SEC plans to implement a new system in 2020, and validating this system would help ensure that it achieves its goals and identify changes needed to address employee dissatisfaction with performance management. In addition, a key feature of SEC's new performance management system will be a bonus program through which supervisors can nominate high-performing employees for a bonus of up to $10,000 once per fiscal year. However, SEC has not yet developed mechanisms for transparency and fairness for this new bonus program. GAO has previously highlighted the need for safeguards to better ensure fairness and transparency in performance management, particularly around systems affecting pay. Incorporating safeguards into the new bonus program—such as including multiple levels of review and publishing aggregate data on award decisions—would promote transparency and could increase employee confidence in the program. Since GAO's most recent review in 2016, SEC has taken actions to implement a more comprehensive workforce planning process and strengthen intra-agency communication and collaboration. For example, SEC conducted a comprehensive analysis to identify skills gaps in its workforce. It also improved the link between its budget formulation process and annual meetings in which the Office of Human Resources consults with each division and office on its workforce needs and priorities. Additionally, to strengthen communication and collaboration, SEC commissioned a study to identify relevant best practices and created formal mechanisms, such as working groups, to enhance collaboration across divisions and offices. For example, in 2018, SEC created its Operations Steering Committee through which senior operational leaders throughout the agency periodically meet to coordinate on cross-agency operational issues, including those related to human capital. SEC should develop and implement safeguards to better ensure transparency and fairness in its new incentive bonus program. SEC agreed with this recommendation. GAO also reiterates its recommendation in GAO-13-621 that SEC conduct periodic validations (with staff input) of the performance management system and make changes, as appropriate, based on these validations. SEC stated that it expects to take action on this recommendation at the end of the 2020 performance cycle.", "document_type": "gao"}
{"report": "Federal agency IT systems provide essential services that are critical to the health, economy, and defense of the nation. However, federal agencies increasingly rely on aging legacy systems that can be costly to maintain. As we previously reported in May 2016, our review of federal legacy systems found that 26 federal agencies reported spending almost $61 billion on operations and maintenance costs in fiscal year 2015. In addition, many of the government’s IT investments used hardware parts that were unsupported and outdated software languages, such as the common business oriented language (COBOL). In some cases, this lack of vendor support created security vulnerabilities and additional costs because these known vulnerabilities were either technically difficult or prohibitively expensive to address. Congress enacted the MGT Act in December 2017 and established the TMF to help agencies improve, retire, or replace existing systems. Congress appropriates money to the TMF, which is used to fund projects approved by the board. As of August 2019, Congress had appropriated $125 million to the TMF—$100 million was appropriated in fiscal year 2018 and $25 million in fiscal year 2019. The MGT Act assigns specific responsibilities to OMB, GSA, and the Technology Modernization Board for the fund’s administration and also assigns responsibilities to federal agencies that received awarded funds. Among other things, OMB. The act requires the Director of OMB to issue guidance on the administration of the fund and report the status of the awarded projects on a public website. The information reported is to include a description of the project, project status (including any schedule delay and cost overruns), financial expenditure data related to the project, and the extent to which the project is using commercial products and services. GSA. The act designates the Administrator of General Services with responsibility for administering the fund. This includes, among other things: (1) providing direct technical support in the form of personnel services and other services; (2) assisting the Technology Modernization Board with the evaluation, prioritization, and development of agency modernization proposals; and (3) performing regular project oversight and monitoring of approved agency modernization projects. In March 2018, GSA established a TMF Program Management Office within the agency to manage these functions. An executive director leads the office and reports to the Office of the Deputy Administrator within GSA. The act requires the Administrator of General Services, in consultation with the Director of OMB, to establish administrative fees at levels sufficient to ensure the solvency of the fund in order to help offset GSA’s operating expenses for these functions. Agencies pay fees if they receive funding for a project. Technology Modernization Board. The board has responsibility for providing input to the Director of OMB for the development of processes for agencies to submit proposals, making recommendations to the Administrator of GSA to help agencies refine their submitted proposals, and reviewing and prioritizing submitted proposals. The board also is responsible for recommending the funding of modernization projects to the Administrator of GSA, and for monitoring the progress and performance of approved projects. In addition, the board is tasked with monitoring the operating costs of the fund. As part of its oversight of awarded projects, the board requires each project to present a quarterly update and report on the status of milestones achieved in order to ensure the project is on schedule. Other federal agencies. The act stated that any agency that submits an IT-related project proposal and receives TMF funding must repay the transferred amount as well as pay an administrative fee. After the board approves a project proposal, the respective agency is required to sign an interagency agreement with the TMF Program Management Office that specifies the terms of the TMF funding repayment, the administrative fee, and the repayment schedule before initial funds are disbursed and the project begins. Figure 1 provides an overview of key TMF activities that OMB, GSA, and the Technology Modernization Board have undertaken to meet the responsibilities outlined in the MGT Act. These include the establishment of TMF administrative processes and the Technology Modernization Board’s project award announcements, among other activities. These activities are also discussed in greater detail following the figure. In February 2018, OMB issued guidance on the implementation of the MGT Act that included instructions for agencies on submitting applications for TMF funding. Agencies were allowed to begin submitting initial application proposals on February 27, 2018. The guidance included an initial application template that agencies were required to complete. As part of the template, agencies were required to provide an estimate of the TMF funding request and the agency’s method used for cost estimation. Subsequently, in March 2018, OMB issued funding guidelines for projects receiving awards. The guidelines stated that project proposals must include a reliable estimate of any project-related cost savings or avoidance relative to pre-modernization activities using the templates provided. In addition, the guidelines stated that estimates must undergo appropriate due diligence and concurrence from the requesting agency’s Office of the Chief Financial Officer prior to submission to the board, in consultation with OMB’s Resource Management Office and GSA’s TMF Program Management Office. Further, the guidelines stated that the agency’s estimation process would be subject to GAO review, pursuant to the act. For agencies receiving a TMF award, the guidelines stated that agencies were required to repay all transferred funds as well as an administrative fee, which was determined based on the amount of awarded funding. As part of the process, agencies were required to establish a written agreement with GSA that set forth the terms for repaying the transferred funds and the administrative fee. Agencies were required to start making payments one year after the initial amount of award funding was transferred and complete all payments within five years, unless otherwise approved by OMB. While the guidelines noted that reimbursement was not contingent upon the achievement of project-related savings, agencies could use the project’s generated cost savings to repay the award. The TMF application process occurs in two phases, each of which requires agencies to submit specific documents. During Phase 1, agencies are required to submit an initial project proposal providing preliminary information about the project, its purpose, and its anticipated benefits. Within this documentation, agencies must confirm that funding for this project has never explicitly been denied or restricted by Congress or OMB, in accordance with the MGT Act. Also during this phase, the Technology Modernization Board evaluates proposals and makes recommendations for project funding based on how well the project documentation demonstrates a strong execution strategy, technical approach, and includes a strong team with a demonstrated history of successful modernization efforts. The board encourages agencies to consider the adoption of commercial technology solutions in their proposals and present a strong technical approach and acquisition strategy to implement those solutions. In addition, agencies are encouraged to provide information on the potential impact of the modernization effort on the agency’s mission, feasibility, opportunity enablement (e.g. cost savings), and common solutions. If the board approves the Phase 1 initial project proposal, the project team will move on to Phase 2. In Phase 2, the agency must submit a financial plan showing a cost estimate and estimated savings from the implementation of the proposed project. Agencies must provide a more comprehensive project description than that provided in Phase 1, including discrete milestones, funding schedule, project plan, and financial plan. These documents must be approved by the agencies’ chief financial officer and CIO. Phase 2 proposals must also address any other areas identified by the board in the initial project review. Further, the agency proposal team must also prepare an in-person presentation for the board. OMB’s Resource Management Office reviews the proposal documentation to ensure that the proposed project aligns with the requesting agency’s mission. The office’s review is intended to ensure that the proposal does not duplicate funding provided through existing appropriations, or previously has been expressly denied funding or restricted by Congress. The review includes an assessment of the proposed project’s information on the reimbursement of the awarded funds, the project’s planned schedule, and out-year budget impacts. OMB also reported that the agency sends information on the proposed projects to Congressional appropriation committees for their review prior to the Technology Modernization Board’s approval of a project. Agencies with projects that the board recommends for TMF funding are required to sign an interagency agreement outlining the repayment terms. In addition, projects receive incremental funding contingent on the successful execution of milestones outlined in the written agreement for the transfer of funds. Figure 2 describes the steps in both phases of the TMF proposal process. As of August 2019, the Technology Modernization Board had awarded $89.36 million to seven projects. Table 1 lists the projects that have received funding (in alphabetical order by agency), descriptions of the projects, and when the TMF funding awards were announced. For more details on each of the awarded projects, see appendix II. OMB Circular A-11 directs agencies to follow the guidelines outlined in its appendix on cost estimating for all IT investments and acquisitions within the federal government. Since OMB first introduced its cost estimate appendix in 2006, as noted in the circular, the cost estimating appendix has been based on the GAO Cost Estimating and Assessment Guide. The appendix outlines a number of major steps in the cost estimating process and references the practices in GAO’s cost guide. Specifically, these steps include preparing a high-level work breakdown structure, defining ground rules and assumptions, developing the data by collecting information on the cost drivers, developing the estimate using various risk factors, performing a sensitivity analysis, documenting the estimate, and updating it on a regular basis. According to the GAO guidance, a cost estimate is considered reliable if it meets four characteristics and the specific set of best practices associated with each characteristic. Those characteristics are: Comprehensive: An estimate should include all life cycle costs (from the program’s inception and design through operations and maintenance), reflect the current schedule, and have enough detail to ensure that cost elements are not omitted or double counted. Specifically, the cost estimate should be based on a product-oriented work breakdown structure that allows a program to track cost and schedule by defined deliverables, such as hardware or software components. In addition, all cost-influencing ground rules and assumptions should be detailed in the estimate’s documentation. Well-documented: An estimate should be thoroughly documented, describe how it was developed; and include source data, clearly detailed calculations and results, and explanations of why particular estimating methods and references were chosen. Data should be traced to their source documents. Accurate: An estimate should be based on historical data or actual experiences on other comparable programs and an assessment of most likely costs, and be adjusted properly for inflation. In addition, the estimate should be updated regularly to reflect significant changes in the program—such as when schedules or other assumptions change—and actual costs, so that it should always reflect the current status. Credible: An estimate should discuss any limitations of the analysis because of uncertainty surrounding data or assumptions. In addition, the estimate should incorporate the results of a sensitivity analysis (that examine the effects of changing assumptions on the estimate), and risk and uncertainty analysis (that identifies all of the potential project risks and assesses how these might affect the cost estimate). The estimate’s results should be cross-checked, and an independent cost estimate should be conducted to see whether other estimation methods produce similar results. If any of the characteristics is not met, minimally met, or partially met, then the cost estimate does not fully reflect the characteristics of a high- quality estimate and cannot be considered reliable. Federal agencies are generally required to use full and open competition to award contracts for the procurement of goods and services (including commercial IT products), with certain exceptions. The Competition in Contracting Act of 1984 requires agencies to obtain full and open competition through the use of competitive procedures in their procurement activities unless otherwise authorized by law. Using competitive procedures to award contracts means that all prospective contractors that meet certain criteria are permitted to submit proposals. While the Competition in Contracting Act generally requires federal agencies to award contracts using full and open competition, agencies are allowed to award contracts noncompetitively under certain circumstances. Generally, these awards must be supported by written justifications that address the specific exception to full and open competition that is being used in the procurement. An example of an allowable exception to full and open competition includes circumstances when the contractor is the only source and no other supplies or services will satisfy agency requirements. Federal agencies have the option to use a variety of contract types when purchasing IT products and services, including government-wide acquisition contracts, IT Schedule 70 contracts, and blanket purchase agreements. These contracts and agreements allow agencies to establish a group of prequalified contractors to compete for future orders under streamlined ordering procedures once agencies determine their specific needs. Agencies can then issue orders on these contracts and agreements, obligating funds and authorizing work to be performed. Agencies are required to publicly report their contract transactions in the FPDS-NG database. This contract transaction data includes information on the type of award made, the amount of the award, and whether competitive procedures were used. Specifically, agencies are required to identify the extent to which the contract was competed and what solicitation procedures were used. In addition, if an agency awards task orders on an existing contract, then the agency is required to identify whether competitive procedures were used. Further, if the contract did not use competitive procedures, then the agency is required to report the reason that the contract was not competed. As of August 31, 2019, GSA’s TMF Program Management Office had obligated about $1.2 million in operating costs for activities related to the establishment and oversight of the fund. While the office intended to assess administrative fees to fully recover its operating expenses, the actual amounts collected as of August 2019 had been less than planned. This was due to factors such as the office’s formulation of fee rates based on appropriations levels that were higher than what was ultimately received, along with changes to several projects’ scope and milestones. Further, cost savings have yet to be realized. Officials from the seven TMF-funded projects reported that they expect to begin realizing cost savings from their projects starting in fiscal year 2020 or later. According to the MGT Act, the TMF Program Management Office may obligate funds to cover its operating expenses out of the appropriations received for the fund (totaling $125 million as of August 2019) in order to provide support to the Technology Modernization Board in meeting its responsibilities. To help offset TMF operating expenses, the act required that the GSA administrator, in consultation with the OMB director, to establish administrative fees at levels sufficient to ensure the solvency of the fund (so that obligations or transfers of funds to awarded projects never exceed the amount available in the fund for these obligations or award transfers). Subsequent OMB guidance, issued in March 2018, required TMF- awarded projects to pay an administrative fee on awarded funds, beginning the first year after the initial incremental amount of award funding was transferred to the agency. The TMF Program Management Office issued further guidance in June 2018 that established administrative fee rates based on a percentage of the amount transferred to an agency project and the payment period. During the time of our review, the office’s current administrative rate was for the period from July 2018 through September 2019. The fee rates were set in June 2018 with the intent to operate the fund as a full cost recovery model, meaning that the Program Management Office planned to fully recover all operating expenses through administrative fee collection by fiscal year 2029 if the office’s assumptions regarding appropriation levels and project selections were met. The office’s reported intention is to help preserve the capital of the fund, which would maximize the amount of appropriations available for award. Table 2 outlines the rates for TMF administrative fees based on the number of years to repay the awarded funds and the percentage of the transferred amount, for the period of July 2018 through September 2019. The TMF Program Management Office sets new rates annually after review from the Technology Modernization Board and approval by GSA’s Deputy Administrator; these rates go into effect in October of each year. As of August 31, 2019, the TMF Program Management Office had obligated about $1.2 million to cover its operating expenses and had begun to collect administrative fees from agency projects, consistent with the MGT Act. Specifically, from March 2018 (when the office began operations) through August 31, 2019, the office obligated approximately $409,000 in fiscal year 2018 and $797,000 for the first 11 months of fiscal year 2019. During the same period, the office collected $33,165 in administrative fees as of August 31, 2019. Based on this amount, the fund was able to only offset approximately 3 percent of its obligated operating costs as of August 31, 2019. The TMF Program Management Office’s administrative fee collection has been limited due to a number of factors that have affected the amounts scheduled to be collected: (1) no fees were collected in the first year of operation; (2) projects chose longer periods to make payments; (3) projects make payments based on funds transferred; (4) fee rates were determined based on assumptions regarding appropriations that were not met; and (5) project changes may affect fee collection. No fees were collected during the first year of operation. OMB’s funding guidelines allowed agencies to start paying administrative fees one year after a project received an award. Since the Technology Modernization Board began awarding funding in June 2018 (within fiscal year 2018), no projects were required to start paying administrative fees until fiscal year 2019, which deferred the start of the TMF Program Management Office’s fee collection by one year. Projects chose longer periods to make payments. When the TMF Program Management Office set administrative fee rates, agencies receiving awards were allowed to determine what rate they would pay according to how many years they planned to make payments. The office reported that a lower administrative fee rate was offered to projects that chose to repay awarded funds over a shorter period (3 years) rather than 5 years. All seven projects that have been awarded funding as of August 31, 2019, chose the longer repayment period of 5 years with a 3 percent rate. The Executive Director of the TMF Program Management Office reported that the office offered a lower administrative rate with the intent of making repaid funds available more quickly to be awarded to new projects. In doing so, the Technology Modernization Board expected to be able to make additional awards, which would increase the collection of administrative fees. Further, according to the Executive Director, the office did not expect that the agencies’ selection of a 5-year repayment term instead of a 3-year term to significantly affect the performance of the fund. However, as the Executive Director noted, these longer repayment terms do affect the collection of administrative fee payments because a longer repayment term means that these funds are not as readily available to award to new projects and generate new fees. Projects make payments based on funds transferred. Agencies receiving awards were only required to make administrative fee payments based on the amount of the award funding that was transferred, rather than based on the full awarded amount. As such, this reduced the amount of fees that the TMF Program Management Office could collect in the initial years that agencies made fee payments. As of August 31, 2019, the Technology Modernization Board had authorized the transfer of $37.65 million (of the $89.36 million awarded) to the seven projects. Based on the amounts transferred, the office is scheduled to collect $1.2 million in administrative fees through 2025 from the seven projects. Table 3 shows the current scheduled administrative fee payments that will be collected from the seven projects based on the amount of awarded funding that the projects had received as of August 31, 2019. Going forward, as the seven projects receive all of the remaining awarded funds, the projects are planning to pay a total of $2.68 million in administrative fees through 2025. However, the Technology Modernization Board had not made awards to any additional projects as of August 2019, and, as a result, the office will not likely be able to collect any additional fees from new projects until at least fiscal year 2021. Any newly awarded projects would be eligible to delay paying administrative fees until 1 year after the initial award date in accordance with the funding guidelines. Fee rates were determined based on assumptions regarding appropriations that were not met. The TMF Program Management Office set its current administrative fee rates in June 2018 based on the assumption that the fund would receive higher levels of appropriations than what was ultimately received. In doing so, the office projected that it would transfer more funds to projects, which would result in larger administrative rates over the initial years of the fund. Specifically, GSA requested $438 million in its fiscal year 2018 and 2019 budget requests for the TMF, but actually received $125 million in appropriations. Table 4 lists the amounts that GSA requested in its budget requests and the amounts appropriated for fiscal years 2018 through 2020. In making its June 2018 assumptions about the appropriations, the office projected that it would distribute larger amounts of funds in the first 2 years of operation and collect more administrative fees through fiscal year 2025. However, the office’s projected collection of administrative fees is less than what was scheduled as of the end of August 2019. In particular, while the office exceeded its projections for distributing funds in fiscal year 2018 ($1.93 million more than projected), the office had not yet met its projection of distributing $75 million in fiscal year 2019—specifically, as of August 31, 2019, the office had distributed only $25.71 million to awarded projects. Consequently, these lower levels of distributed funds decreased the amount of administrative fees scheduled to be collected. Table 5 shows the TMF Program Management Office’s projections for fund distribution for fiscal years 2018 through 2019 and its projected fee collection, compared to the current scheduled distributions and administrative fee collection for fiscal years 2018 through 2025, as of August 31, 2019. Going forward, the office had projected that it would distribute $75 million in fiscal year 2020. However, based on our analysis, only approximately $35.6 million was available in the fund as of August 31, 2019, to award to new projects. The Executive Director of the TMF Program Management Office stated that the office had to make assumptions about the TMF appropriation levels in order to develop the rate model. In doing so, all of the underlying assumptions and parameters related to determining the administrative fee rates and ensuring the fund operated at full cost recovery were reviewed by GSA’s Office of the Chief Financial Officer and Office of General Counsel, OMB, and the Technology Modernization Board before the GSA Deputy Administrator approved the fee rates in June 2018. In addition, the Executive Director noted that, at the time the rate model was developed, the office did not yet have information on the fiscal year 2019 appropriations and made the assumption that the fund would receive the same level of appropriations as in fiscal year 2018 ($100 million). However, based on the wide gap between the budget requests and what funds were ultimately appropriated in fiscal years 2018 and 2019, these assumptions regarding fund appropriation levels did not materialize and impacted the amount of fees that could be collected from awarded projects in fiscal year 2019. Four projects’ changes will affect fee collection. As of August 31, 2019, officials responsible for the management of four of the seven TMF- funded projects reported that they were planning to make significant changes to their projects’ approved scope or scheduled milestones. Officials from two projects reported that they had received approval for these scope changes from the Technology Modernization Board (in June 2019 and August 2019, respectively) and are currently waiting on approval for the repayment schedule changes as of August 31, 2019. Officials from the other two projects reported in August 2019 that they planned to present their changes to the board for approval. Based on our analysis, these changes are expected to affect the four projects’ administrative fee repayment schedules and reduce two projects’ administrative fee collection by $369,117. Table 6 lists the changes to the four TMF-funded projects as of August 31, 2019, as reported by the agencies; the status of the Technology Modernization Board’s approval of the changes; and the potential impacts these changes are expected to have on administrative fee collection. In addition, more details on the changes reported by the four projects are included in appendix II. The Executive Director of the TMF Program Management Office stated that the four projects’ reduction or delay in administrative fee payments should not affect administrative fee collection. The Executive Director explained that the return of prior awarded funds will allow the Technology Modernization Board to have more funds available to award to new projects, which would generate new administrative fees. However, these proposed changes to the four projects’ scope and schedule likely will affect upcoming administrative fee collection because additional time will be needed to review new project proposals. In addition, the agencies may delay administrative fee payments for one year after award issuance. As a result of the five factors that we identified that had impacted administrative fee collection as of August 2019, there is likely to be a period of time between when the office’s current administrative fee collection occurs and when the office can recover its operating expenses from this collection. Specifically, based on our analysis, it will take the TMF Program Management Office at least 5 years (until 2024) to recover the operating costs expended as of August 31, 2019, (over $1.2 million) with the current collection of administrative fees. In addition, once the two projects’ proposed scope and schedule changes are approved by the Technology Modernization Board (decreasing fees collected by $369,117), it is likely that the office will take longer than 5 years to recover these operating costs. Further, it is not clear when the TMF Program Management Office will recover future operating expenses incurred in fiscal year 2020 and beyond. Moreover, these factors will most likely continue to be a challenge for OMB and the office going forward if newly awarded projects choose longer repayment periods or more awarded projects make changes that affect fee collection. Consequently, OMB and the TMF Program Management Office are not currently on track to operate the fund at full cost recovery, as intended. The Executive Director of the TMF Program Management Office stated that the office had reduced its fiscal year 2019 operating expenses by almost 50 percent from the original planned operating level (in the fiscal year 2019 President’s Budget). In particular, the Executive Director reported that the office used temporary staff internally to deliver administrative and support activities, such as website updates and the preparation of meeting agendas and minutes, rather than rely on contractors. The office added that, using internal temporary employees had provided the office with the flexibility to scale operations up and down as appropriate. As of August 2019, the office was not pursuing a staff increase. Further, the Executive Director stated that, as of August 2019, the office was reassessing the assumptions for the administrative fee rate model for the upcoming year, including assumptions for fiscal year 2020 appropriations. The Executive Director added that the office would like to have more information on its fiscal year 2020 appropriations in order to help determine the new rate. These assumptions would be used to develop a new rate model that is expected to go into effect on October 1, 2019, for fiscal year 2020. As for the office’s ability to manage the fund at full cost recovery, the Executive Director stated that all of the assumptions would have needed to be met in order to ensure the TMF operated with full cost recovery. The Executive Director added that the office still intends to pursue full cost recovery going forward, but noted that this may change if the new set of assumptions is not met. Further, the Executive Director reported that four project proposals were in draft stages or pending a Technology Modernization Board determination as of August 2019. Since the fund was established in December 2017, OMB, the Technology Modernization Board, and the TMF Program Management Office have provided oversight of the fund’s awarded projects by requiring the respective agencies to provide quarterly updates on the status of project milestones and transferring additional funds only when milestones were reached. However, the board had not made a corresponding effort to ensure that the TMF Program Management Office’s operating costs and administrative fee collection remained on track to achieve full cost recovery as intended. In addition, the office’s plan to take 12 years—from the start of operations in fiscal year 2018 until fiscal year 2029—to fully recover its operating costs hinders GSA’s ability to maximize the amount of appropriations available for award due to the length of time necessary to recover its costs. As a result, as of August 2019, OMB and the TMF Program Management Office were not on track to recover all operating expenses related to fund administration and oversight, thereby leaving less of the fund’s capital available for project awards. The TMF Program Management Office’s authorized collection of administrative fees is intended to allow the office to offset expenses, which maximizes the amount of funding that can be awarded to projects. However, given the lower-than-expected collection of these administrative fees and the office’s lengthy time frame for recovering all costs, it may be prudent to review those fees and determine whether their rates are set appropriately. Unless OMB and the TMF Program Management Office take steps to develop a plan that outlines the actions needed to fully recover TMF operating expenses with administrative fee collection in a timely manner, there will be fewer funds available to award to projects that are intended to improve the efficiency and effectiveness of government IT systems. The MGT Act established the TMF to help improve, retire, or replace federal IT systems with more efficient and effective systems that would cost less money to operate and maintain. As part of its selection criteria, the Technology Modernization Board stated that the agency would need to clearly demonstrate in its proposal how the proposed project would generate cost savings or how the modernization of the system would dramatically improve the quality of service provided. In addition, OMB’s funding guidelines stated that the project proposal must include a reliable estimate of any project-related cost savings or avoidance using the templates provided. Agencies were required to identify what year their project would start to realize cost savings in the TMF application after receiving an award (the earliest year savings could begin to be realized was fiscal year 2019). Further, the guidelines stated that the agency’s estimation process would be subject to GAO review, pursuant to the act. As of August 31, 2019, officials responsible for project management for each of the seven TMF-funded projects reported that their projects had not yet begun to realize cost savings because either the project was still currently being implemented or the project had experienced changes to prior projections. Specifically, officials for four of the seven projects reported that their projects were currently meeting targeted milestones for implementation and would begin to realize cost savings starting in fiscal year 2020 or later as planned. Officials for the other three projects reported that they had recently made changes to the projects’ scope and scheduled milestones that delayed when the projects would begin to realize savings. For more details on the changes reported by these three projects, see appendix II. Table 7 shows the year that each of the seven TMF-funded projects report that they would begin to realize cost savings. One of the three projects that experienced changes, Agriculture’s Infrastructure Optimization project, had originally planned to begin realizing cost savings starting in fiscal year 2020; however, project scope and milestone changes delayed the expected date for realization of this savings. Officials from Agriculture’s Infrastructure Optimization project reported in August 2019 that the new time frame for realizing cost savings remained to be determined. In addition, Energy’s Enterprise Cloud Email project had originally intended to begin realizing cost savings in 2021, but changes to the project’s scope have delayed the realization of savings until 2024. The third project, GSA’s NewPay, had originally planned to begin realizing savings in 2024, but changes to the project’s technological implementation have delayed the realization of savings. In particular, officials from GSA’s NewPay project reported that the project still anticipates realizing cost savings, but the date for these savings remains to be determined. Congress established the MGT Act and the TMF to help agencies transform their legacy IT systems to be more cost effective and efficient. As the awarded projects complete implementation efforts, it will be critical for agencies to realize cost savings from these modernization efforts in order to help ensure the fund is successful. OMB’s Circular A-11 directs agencies to follow the guidelines outlined in its appendix on cost estimating for all IT investments and acquisitions within the federal government. Since 2006, as noted in the circular, the cost estimating appendix has been based on the GAO Cost Estimating and Assessment Guide. As discussed earlier, the appendix outlines a number of major steps in the cost estimating process and references the practices in GAO’s cost guide. According to GAO’s guidance, a reliable estimate should meet the criteria for four characteristics and the specific set of best practices associated with each of the characteristics. The four characteristics and the specific best practices, among others, are: comprehensive – the estimate should include all life cycle costs, a work breakdown structure, and ground rules and assumptions; well-documented – the estimate documentation should describe how the source data were used, the calculations that were performed and their results, and the estimating methodology used; accurate – the estimate should be based on historical data or actual experiences on other comparable programs and be updated regularly to reflect changes in the program; and credible – the estimate should incorporate the results of sensitivity, and risk and uncertainty analyses. According to the GAO guidance, if the overall assessment rating for each of the four characteristics is not fully or substantially met, then the cost estimate cannot be considered reliable. Based on our analysis of the cost estimates for the seven TMF-funded projects, the reported savings estimates that were derived from those estimates cannot be considered reliable. Officials responsible for developing the cost estimates for each of the projects did not incorporate all of the best practices for a reliable cost estimate, as defined in the GAO guidance and OMB Circular A-11. Table 8 describes the four GAO cost estimating characteristics, key practices associated with each characteristic (and the major steps in OMB Circular A-11), and the results of our analysis of the seven TMF- funded projects’ cost estimates. In addition, appendix III provides more details on our individual assessments of the seven projects’ cost estimates. In assessing the reliability of the projects’ cost estimates, we found that the TMF Program Management Office did not provide written guidance for developing the cost estimates in a manner consistent with federal requirements outlined in Circular A-11 or our best practices. Specifically, the only guidance that the Technology Modernization Board provided on the TMF website was the instruction to submit a project cost estimate using a template developed by the Program Management Office, and approved by OMB and the Technology Modernization Board. While the template provided a means to report costs for the proposed projects, the template did not require agencies to follow any of the best practices outlined in GAO’s Cost Estimating and Assessment Guide, and which is referenced by Circular A-11. Further, there were no written instructions for the template regarding the data elements or the fields required to be completed. Agency officials responsible for developing the cost estimate for each of the seven projects all confirmed that they were instructed to use the project cost estimate template to report their projects’ cost and savings estimates. In addition, these officials acknowledged that they did not follow their own internal cost estimate development processes or GAO best practices when developing their estimates. The Executive Director of the TMF Program Management Office stated that the project teams were expected to follow their own internal investment management process for developing the cost estimates. Additionally, the agencies’ chief financial officers and CIOs were required to review and approve the project proposal applications, including the completed cost estimate templates, prior to the agencies’ submissions to the Technology Modernization Board. Further, the Executive Director acknowledged that written guidance had not been developed for completing the project proposal documentation. Instead, the Executive Director stated that the office had held meetings, as requested by each project team, to provide assistance on how to complete the cost estimate template. The Executive Director stated that these meetings enabled the project teams to ask targeted questions on how to complete the template for their individual projects, which enabled the office to provide specific assistance on completing the template for each project. Staff in OMB’s Office of E-Government and Information Technology stated that agencies are required to follow the requirements outlined in Circular A-11 regarding the development of a cost estimate for all IT investments. In addition, the staff noted that each proposal is required to be approved by the agency’s Chief Financial Officer and CIO before being submitted to the Technology Modernization Board. The staff added that the information regarding the guidance for completing the proposal documentation and cost estimates is available on the TMF website. However, our review of the documentation provided on the TMF website did not identify any guidance regarding the development of the cost estimate as part of the proposal—except a statement requiring the completion of the provided template. The website also did not include any guidance instructing the agencies to follow the requirements outlined in Circular A-11, which references GAO’s cost estimating guidance. As noted in GAO’s cost estimating guide, reliable cost estimates can provide management the data necessary to make informed investment decisions, measure program progress, proactively correct course when warranted, and ensure overall accountability for results. Having a realistic estimate of projected costs also helps to ensure that projected cost savings are reliable. Building such quality into a cost estimate is addressed by the steps described in Circular A-11 (that references the practices outlined in GAO’s cost guide). Regardless of whether or not agencies were told to do so, it is an agency’s responsibility to follow these steps. Ensuring agencies understand the requirements they are supposed to follow when developing a cost estimate for their TMF proposal is critical to the success of the proposal process. If OMB and GSA do not clarify the requirement that agencies follow Circular A-11’s cost estimating process (that references GAO’s cost estimating guidance discussed in this report), agencies are at risk of continuing to provide unreliable cost information in their proposals to the Technology Modernization Board. Further, absent detailed guidance from the TMF Program Management Office on how to complete the cost estimate template, including information on the data elements and the fields required to be completed, agencies are at risk of providing incomplete or insufficient information in their project proposals. As a result, the board may not have sufficiently reliable project cost and savings information with which to make decisions on potential awards and whether these projects offer appropriate value for the investment being requested. The MGT Act requires the Administrator of GSA to ensure that the use of commercial off-the-shelf products and services are incorporated to the greatest extent practicable in agency projects awarded funding through the TMF. As required under the Competition in Contracting Act of 1984, all procurements, with certain exceptions, must be competed as full and open so that any qualified entity can submit an offer. Agencies are also required to publicly report their contract transactions in the Federal Procurement Data System-Next Generation (FPDS-NG), including information on the type of award made and whether competitive procedures were used. In addition, if an agency issues task orders on an existing contract, then the agency is required to identify whether competitive procedures were used. Further, if the contract did not use competitive procedures, then the agency is required to report the reason that the contract was not competed. As of August 31, 2019, six of the seven TMF-funded projects had awarded 23 contracts or task orders for work on the projects. Agency officials responsible for management of the six funded projects reported that 22 of the 23 awards used full and open competitive procedures, which we confirmed using acquisition data from FPDS-NG. HUD officials reported that the remaining award was based on a sole source contract that was not competed and an exception was documented. One project had not yet made an award. Table 9 lists the seven TMF-funded projects and the agencies’ reported use of full and open competitive procedures in FPDS-NG for the related awards, as of August 31, 2019. In making the 22 awards, agency officials responsible for the management of the six funded projects reported that they had relied on existing IT service contracts and blanket purchase agreements, or had established new blanket purchase agreements for these projects. Specifically, 11 awards were based on task orders issued on existing contracts. 9 awards were based on orders from existing blanket purchase agreements. 2 awards were made on new blanket purchase agreements. In making these awards using existing contracts and blanket purchase agreements that had followed full and open competitive procedures, the agencies complied with the requirements for using competitive procedures. In those cases where the agencies used existing blanket purchase agreements, these orders were coded as competitive based on data reported in FPDS-NG. For the one award where competitive procedures were not used, HUD completed a justification and approval for other than full and open competition, indicating that only one responsible source and no other supplies or services would satisfy the agency’s requirements. HUD officials stated that they chose a sole source contract because they wanted to retain the expertise of the existing contractors and maintain cohesion between the different phases of project work. For the project that had not yet made an award, officials responsible for the management of Agriculture’s Infrastructure Optimization project reported that, due to a change in the scope of the project made in June 2019, no contracts had been awarded yet for work on the project. The officials reported that they anticipated making an award by the end of December 2019 and that the contract is to be awarded using competitive procedures. Agencies’ continued adherence to federal acquisition requirements for full and open competition should help ensure that their TMF-funded investments deliver the intended services to benefit both the agencies and the public. Since March 2018, when GSA established the TMF Program Management Office to administer fund operations, the office has obligated about $1.2 million to cover its expenses from managing the fund but has collected limited administrative fees to offset its expenses. As a result, the Technology Modernization Board has fewer funds than anticipated available to award to new projects. Going forward, OMB and the TMF Program Management Office are likely to face ongoing challenges in collecting administrative fees due to the factors that we have identified that affect fee collection and the office’s lengthy time frame for recovering all costs. While OMB and the TMF Program Management Office are not currently on track to recover all operating expenses in a timely manner, Program Management Office officials have expressed the intent to revisit their fee structure, in part to address the lower than anticipated amount of fiscal year 2019 appropriations. Because of the number of factors that are likely to affect fee collection, it will be critical that OMB and the TMF Program Management Office take steps to develop a plan that outlines the actions needed to fully recover TMF operating expenses with administrative fee collection in a timely manner in order to maximize the funds available for awards. By creating a new funding mechanism to help modernize federal IT systems, Congress intended that funds would be used to improve, retire, or replace existing federal IT systems to improve efficiency and effectiveness of these systems. However, since none of the seven TMF- funded projects’ cost savings estimates can be considered reliable, it is not clear whether the projects receiving funding to date will save the government as much money as was estimated. An important aspect to the success of the TMF will be clarifying the established requirement that agencies follow Circular A-11’s cost estimating process (that references GAO’s cost estimating guidance discussed in this report) in order to help ensure that the reliability of estimated savings for awarded projects is improved. We are making five recommendations: two to OMB and three to GSA. Specifically: The Director of OMB should develop and implement a plan with GSA that outlines the actions needed to fully recover the TMF Program Management Office’s operating expenses with administrative fee collection in a timely manner. (Recommendation 1) The Director of OMB should work with GSA to clarify the requirement in the TMF guidance that agencies follow the cost estimating process outlined in Circular A-11 (that references GAO’s cost estimating guidance discussed in this report), when developing the proposal cost estimate. (Recommendation 2) The Administrator of General Services should develop and implement a plan with OMB that outlines the actions needed to fully recover the TMF Program Management Office’s operating expenses with administrative fee collection in a timely manner. (Recommendation 3) The Administrator of General Services should work with OMB to clarify the requirement in the TMF guidance that agencies follow the cost estimating process outlined in Circular A-11 (that references GAO’s cost estimating guidance discussed in this report), when developing the proposal cost estimate. (Recommendation 4) The Administrator of General Services should develop detailed guidance for completing the Technology Modernization Fund project cost estimate template, including information on the data elements and the fields required to be completed, in order to help ensure the accuracy and completeness of the provided information. (Recommendation 5) We provided a draft of this report to OMB and the five agencies for their review and comment. In response, of the two agencies to which we made recommendations, GSA stated that it agreed with one recommendation and partially agreed with the remaining two recommendations; and OMB did not state whether it agreed or disagreed with the recommendations. In addition, of the four agencies to which we did not make recommendations, one agency stated that it concurred with information presented in the report, two other agencies stated that they had no comments on the report, and a fourth agency did not state whether it had comments on the report. Further, four agencies provided technical comments on the report, which we incorporated as appropriate. The following discusses the comments received from each agency to which we made recommendations. GSA provided written comments in which it agreed with our recommendation to develop detailed guidance for completing the TMF project cost estimate template. Additionally, the agency partially agreed with our recommendation to develop and implement a plan with OMB that outlines the actions needed to fully recover TMF operating costs with administrative fee collection, stating the agency had concerns with our discussion of this topic in the report. Among the concerns was that we clearly did not acknowledge that GSA is on track to meet the requirement codified in the statute to maintain the solvency of the fund. However, our report did not make a conclusion that the fund was insolvent, or that the fund was on track to being insolvent. Rather, we discussed the factors that have affected administrative fee collection to date. In our discussion, we noted that as a result of these factors, it will take the TMF Program Management Office at least 5 years (until 2024) to recover the operating expenses expended as of August 31, 2019 (over $1.2 million) with the current collection of administrative fees. Consequently, as of August 2019, OMB and the TMF Program Management Office were not on track to recovering all operating expenses in a timely manner, thereby hindering GSA’s ability to maximize the amount of appropriations available for award. As such, we continue to believe our assessment is accurate. GSA also had concerns that we did not state that the TMF Program Management Office’s goal of full cost recovery for operating expenses was over the lifetime of the fund. In our report, we discuss that the TMF Program Management Office planned to fully recover all operating expenses through administrative fee collection by fiscal year 2029. In doing so, we noted that the office’s plan to take 12 years to fully recover its costs hinders GSA’s ability to maximize the amount of appropriations available for award due to the length of time necessary to recover its costs. Therefore, we believe that we have sufficiently discussed the time frame GSA plans to take to fully recover its costs. Further, GSA stated that our discussion of the TMF Program Management Office’s operating costs would be improved if we noted the large percentage of fund administrative costs was devoted to salaries for a limited number of staff. In determining the cost of administering the TMF, we analyzed the costs of establishing and overseeing the TMF and evaluated the collection of administrative fees from projects awarded funding, consistent with the MGT Act. In doing so, we noted the steps taken by the TMF Program Management Office to reduce its operating expenses, including reducing costs by 50 percent for fiscal year 2019, and not pursuing a staff increase in fiscal year 2019. We did not analyze any individual operating expenses and therefore, have no basis to comment on current salary expenses and whether they could or could not be reduced. As such, we believe that we appropriately discuss the costs of establishing and overseeing the TMF and the relationship of those costs to the goal of fully recovering all operating expenses. Accordingly, we believe our recommendation to develop and implement a plan to fully recover office operating expenses with administrative fee collection is still warranted. The agency also partially agreed with our second recommendation to work with OMB to clarify the requirement in TMF guidance that agencies follow the federal cost estimating guidance discussed in this report. GSA stated that the agency does not set cost estimating policy requirements for agencies, as that is the responsibility of OMB and agency CIOs. In our report, we discuss the MGT Act’s requirement that the Administrator of GSA, in consultation with the CIO Council and with the approval of the Director of OMB, administer the TMF. Because the GSA Administrator has been designated responsibility for administering the fund, the agency has a role in clarifying what guidance agencies should follow when developing their cost estimates for the TMF proposal application. Further, we acknowledge GSA’s statement that the agency will commit to working with OMB and the Technology Modernization Board to identify necessary updates to the cost estimating guidance as a positive step towards addressing our recommendation. Consequently, we believe our recommendation for GSA to work with OMB to clarify the requirement in TMF guidance that agencies follow Circular A-11’s cost estimating process (that references GAO’s cost estimating guidance discussed in this report), when developing the proposal cost estimate, is still appropriate. GSA’s comments are reprinted in appendix IV. OMB provided written comments in which the agency did not state whether it agreed or disagreed with our recommendations; however, OMB stated that the agency remains concerned with the facts, characterizations, and opinions in the draft report. The agency further stated that the draft report contains many key assumptions and recommendations that are misleading and paints an incomplete picture of the TMF. OMB then stated that while we met with the agency twice during the course of the audit, we engaged with GSA multiple times in contrast. According to OMB, many of the questions we posed to GSA would have been better answered by OMB, whose authorities in the budget, apportionment, and approval process for TMF proposals could have enabled us to state items in the report with greater accuracy. In addition, the agency stated that many of its corrections and suggestions offered in its review of the statement of facts were rejected by us, although the agency offered no examples to support its comments. We disagree with OMB’s statements regarding our audit methodology for several reasons. First, in meetings with staff from OMB’s Office of E-Government and Information Technology, we obtained information from the staff in all of the areas noted by OMB in its letter. In our report, we discuss OMB’s role in the fund’s administration and the approval process for TMF proposals, as well as OMB’s guidance in these areas. Further, we made ourselves available to engage with OMB throughout the course of the audit. For example, we arranged a meeting with the Federal CIO and her staff to discuss the administration of the TMF and to present our preliminary observations, but the meeting was cancelled by the Federal CIO’s office due to scheduling constraints and not rescheduled. Second, we incorporated many of OMB’s comments on the statement of facts related to OMB’s role in fund administration and the approval process into our draft report. For example, although we had included information in the statement of facts regarding the requirement that agency CIOs and chief financial officers approve TMF proposals prior to submittal to the Technology Modernization Board, OMB requested that we include this information in other sections throughout the report. OMB also requested that we include language in the report to ensure that it was understood that TMF projects began after an interagency agreement was signed between the TMF Program Management Office and the agency and not when TMF awards were announced. We incorporated these changes into the background and other relevant report sections. However, in cases where OMB asked us to incorporate the entirety of language from the MGT Act—rather than summarizing the law’s key requirements—we chose not to do so for the purposes of conciseness. In addition, OMB also requested that we update the status information for the TMF awarded projects in our report to be closer to the report’s issuance. However, as we had told OMB staff during our review, we intended to report project information as of August 31, 2019, based on our audit methodology and reporting timeframes. Consequently, we believe that we have accurately characterized the facts related to OMB’s role in TMF administration and sufficiently incorporated OMB’s relevant comments into our report. OMB also disagreed with our characterization of the TMF repayment process and the assumptions about potential insolvency of the fund. As noted above in our response to GSA’s comments, our report did not make a conclusion that the fund was insolvent, or that the fund was on track to being insolvent. Rather, our report discusses the factors affecting administrative fee collection and the impact these ongoing challenges have on the TMF Program Management Office’s ability to pursue a full cost recovery model and recover all costs by fiscal year 2029, as GSA intended. In addition, we acknowledged the Program Management Office’s efforts to reduce its operating costs in fiscal year 2019 (to under $1 million). OMB also stated that the primary shortcoming has been the fact that the TMF has been underfunded by Congress, leading to slower than anticipated project volume. In our report, among the factors that we discussed as affecting TMF fee collection, we noted that the initial TMF fee rates were determined in June 2018 based on assumptions regarding appropriations that were not met. We also noted the impact that these assumptions had on the TMF Program Management Office’s projected collection of administrative fees in the first two years of operation and for fiscal year 2020. Specifically, we noted that the office projected it would distribute $75 million in fiscal year 2020 but had only approximately $35.6 million available in the fund as of August 31, 2019. We concluded that OMB and the TMF Program Management Office were not on track to recovering all operating expenses in a timely manner, thereby leaving less of the fund’s capital available for project awards. At no point did we assert the fund was insolvent, or was in danger of becoming so. As such, we continue to believe our assessment of the fund’s ongoing fee recovery is accurate and that our recommendation for OMB and GSA to work together to develop and implement a plan to use administrative fee collection to fully recover operating expenses is still warranted. OMB also challenged our analysis of agency projects’ cost estimates using our Cost Estimating and Assessment Guide because, according to the agency, we had asserted that federal agencies must follow the cost guide when developing cost estimates for federal projects. OMB stated that all projects, including those submitted for consideration, must follow OMB Circular A-11, not the GAO guide. Since OMB first introduced its cost estimating appendix to Circular A- 11 in 2006, the circular has stated that the appendix is based on the GAO cost estimating guide. Specifically, the circular stated that the appendix is based on GAO’s “guide to their auditors on how to evaluate an agency's cost estimating process, and the reliability and validity of the data used to develop the cost estimates. Following these guidelines will help agencies to meet most cost estimating requirements.” Further, we reported that OMB’s Circular A-11 cost estimating appendix outlined a number of major steps in the cost estimating process, and referenced the practices outlined in GAO’s cost guide. As our report states, OMB Circular A-11 directs agencies to follow the guidance outlined in the appendix on cost estimating for all IT investments and acquisitions within the federal government, and as mentioned above, is based on GAO’s cost estimating guidance. We noted that OMB’s guidance referenced GAO’s cost guide; however, we did not assert that agencies were required to follow GAO’s cost guide independent of Circular A-11. Further, our analysis of the cost estimates for the seven projects found that none of the projects incorporated all of the best practices for a reliable estimate cost estimate, as defined in either OMB Circular A-11 or GAO guidance. We noted that the TMF’s website did not include any guidance instructing agencies to follow the requirements outlined in Circular A-11; however, we stated that, regardless of whether or not agencies were told to do so, it was an agency’s responsibility to follow these steps. Further, we noted that ensuring agencies understand the requirements they are supposed to follow when developing a cost estimate for the TMF proposal process is critical to the success of the proposal process. Accordingly, we continue to believe our assessment of the seven projects’ cost estimates is accurate and based on appropriate and generally-accepted criteria, and that our recommendations to OMB and GSA in this area are still warranted. However, in the interest of ensuring that our recommendations are explicit about clarifying which requirements agencies are to follow when developing cost estimates, we have modified the language of our related recommendations to more directly address Circular A-11. OMB also noted the additional requirements—beyond those found in Circular A-11—imposed on agency submissions by the Technology Modernization Board, including authoritative signoff by the agency chief information officer and chief financial officer for schedule and repayment documentation. The agency further asserted that the characteristics of the TMF, including the ability to incrementally fund projects and to adjust project scope and timing of project transfers, means that projects funded by the TMF are more likely to succeed. We agree that agencies’ executive review of submissions to the board is an integral part of ensuring the quality of those submissions. Such reviews, coupled with more clear direction to agencies on what federal guidance they are required to follow, as discussed above, will further strengthen the quality of the supporting documentation submitted to the board. Further, OMB also stated that the board takes seriously its responsibilities to make sure approved projects meet the requirements of the MGT Act, the guiding principles established by the board, and to ensure that projects repay all required amounts while successfully delivering smarter, more secure commercial capabilities to improve citizen services. In addition, OMB stated that the board requires that all approved projects have requirements to provide information, best practices, playbooks, and other supporting documentation. OMB also stated that the board has managed the TMF both in alignment with industry-wide best practices for iterative, agile financing for technology projects, and has been judicious and discerning in how it invests TMF funds. We agree with the importance of ensuring approved projects meet the requirements of the MGT Act. In our report, we acknowledged OMB, the Technology Modernization Board, and the TMF Program Management Office’s efforts to provide oversight of the fund’s awarded projects. However, our report also identified ongoing challenges with the TMF Program Management Office’s fee collection, including the office’s plan to take 12 years to fully recover its operating costs—a plan that was reviewed by the Technology Modernization Board and OMB—that will hinder GSA’s ability to maximize the funds available for awards. We also agree that it is important that all approved projects have requirements in place related to providing information and supporting documentation. In our report, we discussed that OMB’s funding guidelines required projects to include a reliable estimate of project- related savings. However, as we also noted, none of the seven projects’ reported savings estimates were reliable because they did not incorporate all of the best practices for a reliable cost estimate as defined in OMB Circular A-11 and GAO’s cost estimating guide. Therefore, it was not certain whether the projects that we reviewed would save the government as much money as was estimated. While it is important that the board have requirements in place, it is equally vital that agencies clearly understand the requirements they are supposed to follow—and that these requirements are clearly articulated on the TMF website—for the proposal process to be successful. As such, we continue to believe our recommendations to OMB and GSA are appropriate. OMB’s comments are reprinted in appendix V. In addition to the aforementioned comments, the four agencies to which we did not make recommendations provided the following responses. In an email received on November 22, 2019, a Director of Strategic Planning, Policy, Egovernment and Audits in the Office of the CIO at Agriculture stated that the agency concurred with the information presented in the report. In an email received on November 7, 2019, an audit coordinator in Energy’s Office of the CIO did not state whether the agency had comments on the report and provided technical comments, which we incorporated as appropriate. In written comments provided on November 19, 2019, the department stated that it had no comments to provide on the written report. HUD’s comments are reprinted in appendix VI. In an email received on November 6, 2019, an economist in Labor’s Office of the Assistant Secretary for Policy stated that the agency had no comments on the report. We are sending copies of this report to the appropriate congressional committees; the Director of the Office of Management and Budget; the Secretaries of the Departments of Agriculture, Energy, HUD, and Labor; the Administrator of GSA; and other interested parties. This report will also be available at no charge on our website at http://www.gao.gov. If you or your staffs have any questions on matters discussed in this report, please contact me at (202) 512-4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VII. Our objectives were to: (1) determine the costs of establishing and overseeing the Technology Modernization Fund (TMF), as compared to the savings realized by projects that have received awards; (2) assess the extent to which cost savings estimates for awarded projects are reliable; and (3) determine the extent to which agencies have used full and open competition for any acquisitions related to the awarded projects. The scope of our review included the Office of Management and Budget (OMB) and the General Services Administration (GSA) TMF Program Management Office, the two organizations responsible for TMF administration, as well as the five agencies that had received the seven awards from the fund as of August 2019—the Department of Agriculture (Agriculture), Department of Energy (Energy), Department of Housing and Urban Development (HUD), Department of Labor (Labor), and GSA. For our first objective, we obtained and analyzed financial data from GSA related to actual and planned operating costs for establishing and overseeing the TMF for fiscal years 2018 through 2025 (fiscal year 2018 was the first year that the TMF was in operation). To ensure the accuracy and completeness of GSA’s financial data on the operating costs for TMF administration, we obtained information from officials within GSA’s Office of the Deputy Administrator on the controls in place for ensuring the reliability of the financial data. We also reviewed GAO, GSA Office of Inspector General, and GSA reports that discussed the results of prior reviews of internal controls for GSA financial systems. Based on discussions with agency officials and our reviews of these prior reports, we did not identify any specific findings that would affect our reporting of these data. In addition, we reviewed GSA-provided data for obvious errors and inconsistencies and identified no significant errors related to the accuracy or completeness of the data. Based on these steps, we determined that these data were sufficiently reliable for us to be able to report accurately on GSA’s operating costs for TMF administration. We also obtained and analyzed agency documentation from, and interviewed officials within, GSA’s TMF Program Management Office regarding the fund’s actual and planned operating expenses as of August 31, 2019. We assessed the collection of administrative fees used to ensure the solvency of the fund during the period from June 2018 (when projects first began to receive awards) through August 31, 2019. In addition, we interviewed staff in OMB’s Office of E-Government and Information Technology regarding OMB guidance and its administrative responsibilities for the fund. Further, we obtained and analyzed TMF project proposal documentation and signed interagency agreements and interviewed officials in charge of the TMF-funded projects within the Office of the CIO and other appropriate offices at each of the five agencies to determine the scheduled repayment transfers, administrative fee payments, and whether awarded projects had realized cost savings for fiscal year 2019. (Fiscal year 2019 was the first fiscal year that awarded projects could have realized cost savings as a result of receiving TMF funding.) In doing so, we confirmed that none of the seven projects had begun to realize cost savings; therefore, it was premature to compare the projects’ realized savings to TMF administrative costs. For the second objective, we analyzed TMF project proposals, including cost estimates and supporting documentation, from the five agencies that received the seven awards. In addition, we interviewed the agencies’ project officials responsible for developing the overall TMF cost savings estimate and associated cost estimates regarding their estimation processes. We compared each TMF-funded project team’s estimating methodologies and documentation to the best practices of a reliable cost estimate discussed in GAO’s Cost Estimating and Assessment Guide. Our analysis enabled us to determine whether each project’s cost estimate, used to determine the project’s cost savings estimate, was comprehensive, well-documented, accurate, and credible. The GAO Cost Estimating and Assessment Guide considers an estimate to be comprehensive if its level of detail ensures that all pertinent costs are included and no costs are double-counted or omitted; well- documented if the estimate can be easily repeated or updated and can be traced to original sources through auditing; accurate if it is not overly conservative, is based on an assessment of the most likely costs, and is adjusted properly for inflation; and credible if the estimate has been cross-checked with an independent cost estimate and a level of uncertainty associated with the estimate has been identified and quantified. For each characteristic, our analysis had five possible assessment categories: Not met. The estimate provided no evidence that satisfies any of the characteristic’s set of best practices. Minimally met. The estimate provided evidence that satisfies a small portion of the characteristic’s set of best practices. Partially met. The estimate provided evidence that satisfies about half of the characteristic’s set of best practices. Substantially met. The estimate provided evidence that satisfies a large portion of the characteristic’s set of best practices. Met. The estimate provided complete evidence that satisfies the characteristic’s entire set of best practices. A cost estimate is considered reliable if the overall assessment for each of the four characteristics are met or substantially met. We presented the results of our initial analysis of each TMF project cost estimate to its respective agency in July 2019. We asked the agencies to verify the information presented in the analysis and provide any updates or additional supporting documentation, as appropriate. Each of the agencies provided updated information, which we incorporated into this analysis, as appropriate. In addition, we interviewed staff in the Office of E-Government and Information Technology, as well as officials from the TMF Program Management Office, about the process for the review and approval of TMF-funded project cost savings estimates and cost estimate documentation. Because the Technology Modernization Board required agency project teams to use a template to submit the project cost savings estimates and because we learned from project officials at each of the five agencies that they did not rely on data from agency financial systems when completing the template, we took additional steps to assess the reliability of the data in the completed templates. First, we interviewed officials in the TMF Program Management Office responsible for developing the template in order to understand the purpose of each template data field and what information was required to be completed. We took this step because there were no written instructions for the template regarding the data elements or the fields required to be completed. We also interviewed officials in the Office of the CIO and other appropriate offices at each agency, who were in charge of completing the TMF cost estimate template. We discussed with these officials how the template was filled out and what sources of data were used. Because project teams did not rely on data from agency financial systems when completing the spreadsheet template, we reviewed agency responses and other supporting documentation to determine how the estimated costs and savings were derived and whether there were any qualifications of the provided data. This included whether certain costs were excluded from the program cost estimate, how up-to-date the data were, or whether there were other qualifications of the provided data. We followed up with agency officials regarding these qualifications as appropriate. Further, we reviewed the completed templates to identify missing data, or other errors, and consulted with our cost estimation specialists about these issues, as appropriate. Based on our assessment of each project’s cost estimate (used to derive the cost savings estimate) and the other measures we took to assess the reliability of the data included in the completed templates, we determined that the cost savings data for all seven TMF projects were not sufficiently reliable; thus, we did not include the estimated savings amounts in our report. In addition, we discuss the data’s shortcomings in the report. To accomplish the third objective, we obtained and analyzed contract documentation for each of the seven awarded projects. We also interviewed officials in charge of the TMF-funded projects within the Office of the CIO and other appropriate offices at each of the five agencies about acquisitions related to the awarded projects. Using the agency provided contract information, we obtained and analyzed data from the Federal Procurement Data System-Next Generation (FPDS- NG)—the government’s procurement database—for the period of June through August 2019. We assessed whether each awarded acquisition used full and open competition in accordance with the Competition in Contracting Act of 1984 and the federal acquisition regulation. To ensure the accuracy and completeness of the awarded projects’ contract information related to the use of full and open competition, we searched FPDS-NG data to confirm that all contracts and task orders related to the projects had been provided. We then presented the results of our analysis to officials in charge of project acquisitions at each agency and asked these officials to verify the completeness and accuracy of the FPDS-NG data and provide any updates, as appropriate. Officials in charge of all of the awarded projects confirmed the contract information related to the use of full and open competition and provided additional contract acquisition data, as appropriate. Based on these steps, we determined that these data were sufficiently reliable to report on the TMF-funded project acquisitions’ use of full and open competition. We conducted this performance audit from March 2019 to December 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. As of August 31, 2019, seven projects had been awarded funding from the Technology Modernization Fund (TMF). Once an award had been made, TMF funds were distributed to project teams incrementally based on each project’s performance against the milestones established in the project’s written agreement. These seven projects had received incremental funding of approximately $37.65 million and, of that amount, had obligated $18.05 million towards project implementation. The following description of each of the seven projects includes an overview of the awarded project, funding transfer, and project status information as of August 31, 2019, and how the project intends to repay the funds awarded. The Department of Agriculture’s (Agriculture) Farmers.Gov Portal project is intended to help update and modernize conservation financial assistance and payment operations within the department’s Farm Service Agency and National Resources Conservation Service. These two agencies provide financial and technical assistance to farmers and ranchers through related conservation programs. While separately authorized and appropriated, the programs share common customers and also share interconnected systems. The project is intended to work to reengineer related financial assistance business processes at these agencies and update the agencies’ legacy systems so that the systems can be properly connected with the department’s common financial system. Due to changes to the project’s schedule, an official responsible for the management of the Farmers.Gov Portal project reported that the agency plans to delay requesting the remaining balance of $6 million in awarded funds from the Technology Modernization Board until fiscal year 2020. Figure 3 provides a summary of the Farmers.Gov Portal project. Officials from the Farmers.Gov Portal project reported that the department intends to repay the TMF funds awarded using annual appropriations from each of the two agencies involved in the project. Agriculture’s Infrastructure Optimization project, managed by the Office of the Chief Information Officer (CIO), was originally intended to migrate 10 applications within the department to cloud services by the end of fiscal year 2019. However, officials responsible for the management of the project reported that they began working with the TMF Program Management Office to make changes to the project’s scope in June 2019, changing which applications would be migrated and reducing the number of applications to be migrated to one. Officials reported that the project now intends to migrate the Farm Production and Conservation’s Emergency Watershed Protection Program to cloud services but has not yet determined when the project will be completed. The program helps landowners, operators, and individuals to implement emergency measures after a natural disaster in order to help relieve imminent hazards to their life or property. Due to the change in scope for the project, officials responsible for the management of the Infrastructure Optimization project reported that planned to request a total of $500,000 for the project from the Technology Modernization Board ($4.5 million less than the original award amount). As a result of this change in scope, officials reported that the repayment period, administrative fee, and the time frames for repaying the transferred amount and associated fee, was being reevaluated by the agency. Project officials reported in August 2019 that they planned to present their revised project plan to the Technology Modernization Board for consideration and approval. If approved by the board, the project would likely reduce its administrative fee from $150,000 to $15,000. Figure 4 provides a summary of the Infrastructure Optimization project. Officials from the Infrastructure Optimization project reported that the department originally intended to repay the TMF awarded funds by using the planned cost savings and avoidances accrued from not having to pay the costs for the maintenance of these 10 applications. In fiscal year 2018, the department reported spending approximately $4 million to cover labor costs for maintaining these 10 on-premise applications. However, project officials reported that, with the change in scope to the project, the details for how they will repay the awarded funding are currently under reevaluation. The Department of Energy’s (Energy) Enterprise Cloud Email project, managed by the Office of the CIO, was originally intended to complete the consolidation, upgrade, and migration of 26 of the department’s on- premises email systems to cloud email software as a service by fiscal year 2021. However, the department made changes to the project’s scope in February 2019, reducing the number of mailboxes that would be migrated from approximately 47,080 to 24,531. Officials responsible for the management of the Enterprise Cloud Email project within Energy’s Office of the CIO reported that the department was able to migrate 22,549 mailboxes to cloud services using department funds prior to receiving TMF-awarded funds. Due to the change in scope for the project, officials from the Enterprise Cloud Email project reported that they planned to request a total of $7.41 million in funding for the project from the Technology Modernization Board ($7.80 million less than the original award amount). As a result of this change in scope, officials reported that the repayment period, administrative fee, and the time frames for repaying the transferred amount and associated fee, will change from what was originally approved by the Technology Modernization Board. Project officials reported in August 2019 that they intended to present their revised plan to the Technology Modernization Board for consideration and approval. If approved by the board, the project would reduce its administrative fee from $456,510 to $222,406 and would complete the fund repayment in 2024 rather than 2025. Figure 5 provides a summary of the Enterprise Cloud Email project. Officials from the Enterprise Cloud Email project reported that the department intends to repay the TMF funds awarded by using the planned cost savings and avoidances accrued from future operations and maintenance costs for these email systems. In fiscal year 2018, the department reported spending approximately $4.78 million to cover operations and maintenance costs for the 26 on-premise email systems originally in scope for the project. However, the department could not provide an update on the operations and maintenance costs for the current email systems that are to be migrated using TMF funds. The Department of Housing and Urban Development’s (HUD) Unisys Migration project managed by the Office of the Chief Technology Officer was originally intended to migrate five of the department’s most critical business systems from an on-premise mainframe database to cloud computing services by the end of fiscal year 2020. These systems help manage the Federal Housing Administration’s mortgage insurance program as well as over one hundred HUD grant, subsidy, and loan programs managed through the Office of the Chief Financial Officer. Due to delays in awarding contracts for the project, a HUD official reported that the department had submitted a request to the Technology Modernization Board in August 2019 for the project to be rebaselined. The official reported that the project planned to delay requesting the next disbursement of $5 million from fiscal year 2019 to fiscal year 2020 and the project is now intended to be completed by March 2021. Figure 6 provides a summary of the Unisys Migration project. Officials from the Unisys Migration project reported that the department intends to repay the TMF funds awarded by using the planned cost savings accrued from reducing the department’s overall operations and maintenance costs for these systems. In fiscal year 2018, the department reported spending approximately $11.6 million in operations and maintenance contract costs for maintaining these five legacy systems. The Department of Labor’s (Labor) Visa Application Transformation project, managed by the Office of the CIO, is intended to replace a paper- based labor certification process for certain types of work visas with an E-Certification process. The new system is intended to enable the department to issue a labor certification securely and electronically to employer applicants, similar to an electronic boarding pass issued by airlines. In addition, this project is expected to streamline and improve data accessibility and reporting capabilities by creating a data hub at Labor. This hub is expected to allow the department to securely transmit these labor certifications and other necessary documentation to the Department of Homeland Security’s U.S. Citizenship and Immigration Service, with an eventual linkage to the Department of Agriculture and the Department of State. Figure 7 provides a summary of the Visa Application Transformation project. Officials responsible for the management of the Visa Application Transformation project within the Office of the CIO reported that the department intends to repay the TMF funds awarded by using the planned cost savings accrued from eliminating the costs of procuring security paper and printers for printing the certifications as well as reduced costs for contractor and federal employee support of the paper process. In fiscal year 2019, the department reported spending approximately $1.9 million on these costs for the paper-based process. The General Services Administration’s (GSA) Application Modernization project, managed within the Office of the Chief Technology Officer, is intended to modernize 11 applications currently using proprietary vendor technology by converting them to use open source technologies. GSA currently has 88 applications that are in need of modernization and intends to use the lessons learned and new capabilities as a repeatable process that will be used for future migrations of other proprietary applications to open source technologies. Figure 8 provides a summary of the Application Modernization project. Officials responsible for managing the Application Modernization project reported that it intends to repay the TMF funds awarded through: (1) its existing working capital fund and (2) the planned cost savings and avoidances accrued from reducing operations and maintenance costs, and eliminating hardware and operating system software costs for these proprietary applications. In fiscal year 2018, the agency reported spending approximately $23.9 million to cover these costs. The NewPay project, managed within GSA’s Office of the CIO, is intended to modernize GSA’s payroll system for its 21,000 users and replace it with a cloud-based software as a service solution. This is expected to lay the foundation for modernizing federal legacy payroll systems to a cloud-based solution for approximately 2.1 million federal civilian employees. Currently, four federal agencies (Agriculture, Department of Defense, Department of the Interior, and GSA) serve as payroll providers for federal civilian employees. NewPay also is intended to encompass time and attendance solutions which are intended to be implemented in later project phases. Project officials reported that they originally planned to complete the migration to NewPay and shut down GSA’s legacy systems by 2023 and consolidate all other government legacy provider payroll operations into NewPay. However, officials reported that the strategy for transitioning other legacy payroll providers to NewPay was revised in mid-summer 2019. Going forward, GSA and the other federal payroll providers plan to focus on completing the migration of all systems to NewPay prior to transitioning and consolidating payroll operations within GSA. Project officials reported that GSA is working with OMB and the other agency payroll providers to identify funding available for these efforts so that a new schedule can be developed. Figure 9 provides a summary of the NewPay project. Officials responsible for managing the NewPay project within the Office of the CIO reported that the agency intends to repay the TMF funds awarded through subscriptions and fees that federal agencies are to pay to utilize the software as a service solution and through fees NewPay intends to collect for serving as a payroll operations provider. In fiscal year 2018, the four federal agency payroll providers spent approximately $300 million providing payroll services for approximately 2.1 million federal civilian employees. Agencies submitting full project proposals to the Technology Modernization Board during phase II of the proposal process for the Technology Modernization Fund (TMF) were required to submit information on the project’s cost estimate and cost savings estimate using a spreadsheet template (known as appendix B). We compared each TMF-funded project team’s estimating methodologies and documentation to the best practices of a reliable cost estimate discussed in the GAO Cost Estimating and Assessment Guide. According to GAO’s guidance, a reliable estimate should meet four characteristics and the specific set of best practices associated with each of the characteristics. Those four characteristics are: Comprehensive: An estimate should include all life cycle costs (from the program’s inception and design through operations and maintenance), reflect the current schedule, and have enough detail to ensure that cost elements are not omitted or double counted. Specifically, the cost estimate should be based on a product-oriented work breakdown structure that allows a program to track cost and schedule by defined deliverables, such as hardware or software components. In addition, all cost-influencing ground rules and assumptions should be detailed in the estimate’s documentation. Well-documented: An estimate should be thoroughly documented; describe how it was developed; and include source data, clearly detailed calculations and results, and explanations of why particular estimating methods and references were chosen. Data should be traced to their source documents. Accurate: An estimate should be based on historical data or actual experiences on other comparable programs and an assessment of most likely costs, and be adjusted properly for inflation. In addition, the estimate should be updated regularly to reflect significant changes in the program—such as when schedules or other assumptions change—and actual costs, so that it should always reflect the current status. Credible: An estimate should discuss any limitations of the analysis because of uncertainty surrounding data or assumptions. In addition, the estimate should incorporate the results of a sensitivity analysis (that examine the effects of changing assumptions on the estimate), and risk and uncertainty analysis (that identifies all of the potential project risks and assesses how these might affect the cost estimate). The estimate’s results should be cross-checked, and an independent cost estimate should be conducted to see whether other estimation methods produce similar results. In assessing each project’s estimate against the components of the four characteristics, we assigned one of five assessment categories: Not met. The estimate provided no evidence that satisfies any of the characteristic’s set of best practices. Minimally met. The estimate provided evidence that satisfies a small portion of the characteristic’s set of best practices. Partially met. The estimate provided evidence that satisfies about half of the characteristic’s set of best practices. Substantially met. The estimate provided evidence that satisfies a large portion of the characteristic’s set of best practices. Met. The estimate provided complete evidence that satisfies the characteristic’s entire set of best practices. A cost estimate is considered reliable if the overall assessment ratings for each of the four characteristics are met or substantially met. The following discusses in detail our assessment of the seven TMF awarded projects’ cost estimates. Table 10 includes our detailed assessment of the Department of Agriculture’s (Agriculture) Farmers.Gov Portal project. Based on the overall assessment ratings for each of the four characteristics, Agriculture’s project cost estimate is not considered reliable. Table 11 below includes our detailed assessment of Agriculture’s Infrastructure Optimization project. Based on the overall assessment ratings for each of the four characteristics, Agriculture’s project cost estimate is not considered reliable. Table 12 includes our detailed assessment of the Department of Energy’s (Energy) Enterprise Cloud Email project. Based on the overall assessment ratings for each of the four characteristics, Energy’s project cost estimate is not considered reliable. Table 13 includes our detailed assessment of the Department of Housing and Urban Development’s (HUD) Unisys Migration project. Based on the overall assessment ratings for each of the four characteristics, HUD’s project cost estimate is not considered reliable. Table 14 includes our detailed assessment of the Department of Labor’s (Labor) Visa Application Transformation project. Based on the overall assessment ratings for each of the four characteristics, Labor’s project cost estimate is not considered reliable. Table 15 includes our detailed assessment of the General Services Administration’s (GSA) Application Modernization project. Based on the overall assessment ratings for each of the four characteristics, GSA’s project cost estimate is not considered reliable. Table 16 includes our detailed assessment of GSA’s NewPay project. Based on the overall assessment ratings for each of the four characteristics, GSA’s project cost estimate is not considered reliable. In addition to the individual named above, the following staff made key contributions to this report: Dave Hinchman (Assistant Director), Jason Lee (Assistant Director), Jessica Waselkow (Assistant Director), Chris Businsky, Jennifer Echard, Emile Ettedgui, Valerie Hopkins (Analyst in Charge), Anna Irvine, Julia Kennon, Sandra Kerr, James MacAulay, Priscilla Smith, and Mary Weiland.", "summary": "In December 2017, the MGT Act was enacted, which established the TMF. OMB, the Technology Modernization Board, and GSA oversee the TMF. The board is responsible for approval of agency project proposals focused on replacing aging IT systems. Agencies receive incremental award funding and are required to repay the funds transferred and an administrative fee within five years. Agencies may use the project's generated cost savings to repay the award. GSA can use TMF appropriations to cover its operating expenses, and is required to collect administrative fees from awarded projects to offset these expenses. GSA's fee rate was established with the intent to fully recover its costs. As of August 2019, Congress had appropriated $125 million to the TMF. The act included a provision for GAO to report biannually on the TMF. For its first TMF report, among other things, GAO analyzed the TMF's operating costs and assessed the reliability of selected projects' cost savings estimates. To do so, GAO reviewed OMB and GSA's administrative fund processes, and GSA financial data on TMF operating costs. GAO also analyzed TMF project proposal and supporting cost estimate documentation from selected agencies. As of August 2019, the Technology Modernization Board had made seven Technology Modernization Fund (TMF) awards to five agencies, totaling about $89 million, and had transferred $37.65 million of this funding to the projects (see table). In addition, pursuant to the Modernizing Government Technology (MGT) Act, the General Services Administration (GSA) had obligated about $1.2 million to cover TMF operating expenses, but had recovered only about 3 percent of those expenses through fee payments. The seven projects are expected to make $1.2 million in scheduled fee payments by the end of fiscal year 2025; as of August, three projects have made fee payments totaling $33,165. Based on the current schedule, GSA will not fully recover these expenses until fiscal year 2025 at the earliest. GSA had collected fewer fees than planned to offset costs due to several factors. For example, the seven projects paid fees based on the amounts transferred, rather the total funds awarded, thereby reducing fee collections in the initial years. Two projects also proposed scope changes that are expected to reduce funding required and, thus, reduce total fees. Such factors raise doubts on whether GSA will be able to fully recover future operating expenses. Although GSA acknowledged this issue, the agency has not yet developed a plan outlining the actions needed to fully recover its TMF operating costs in a timely manner. The Office of Management and Budget's (OMB) funding guidelines require projects to include a reliable estimate of any project-related savings. However, the seven projects' reported savings estimates derived from cost estimates are not reliable. None of the projects incorporated all of the best practices for a reliable cost estimate, as defined in GAO and OMB guidance. Without clarifying the requirement that agencies follow Circular A-11's cost estimating process (that references GAO's cost estimating guidance discussed in this report), agencies are at risk of continuing to provide unreliable cost information in their proposals. GAO is making five recommendations—two to OMB and three to GSA, including developing a plan to fully recover operating costs and clarifying that agencies should follow required cost guidance. OMB raised a number of concerns that GAO addresses in the report. GSA agreed with one recommendation and partially agreed with the other two. GAO continues to believe all of its recommendations are appropriate.", "document_type": "gao"}
{"report": "NMB is headed by a three-member board, with each member appointed by the President and confirmed by the Senate for a term of 3 years. The board members provide overall leadership and strategic direction for NMB, and retain responsibility for key functions such as releasing parties from the mediation of major disputes if no agreement can be reached. In May 2018, NMB reorganized various agency components to improve its management and oversight of agency operations. This resulted in the creation of three mission areas and three mission support areas. The Offices of Fiscal Services and Information Services were newly created as a result of the delegation order (see fig. 1). In June 2019, NMB hired a Chief Financial Officer (CFO), who serves as the Director of the Office of Fiscal Services. The CFO has authority over NMB’s budget, accounting, and financial auditing functions. In January 2019, NMB hired a Chief Information Officer (CIO), who serves as the Director of the Office of Information Services. The CIO has authority over NMB’s information technology and related systems, including its electronic record keeping functions. All offices, along with NMB’s Designated Agency Ethics Official, report directly to the Board. Previously, the Offices of Administration, Mediation, and Arbitration reported to a Chief of Staff, a position that was eliminated in 2018. NMB’s overall mission is to provide for the independence of air and rail carriers and employees in matters of self-organization, help prevent interruption to commerce conducted through the operation of those carriers, administer adjustment boards, as well as develop complementary strategies to resolve disputes. NMB has three program areas to fulfill its mission: Representation. Rail or air carrier employees select unions for the purposes of collective bargaining through secret-ballot elections conducted by NMB. NMB is charged with resolving any questions concerning representation of a specific craft or class through the agency’s Office of Legal Affairs, and has sole jurisdiction to decide these disputes. Mediation and Alternative Dispute Resolution. The RLA provides for mediation to help resolve disputes between management and labor during collective bargaining negotiations. When rail or air carriers and unions cannot reach agreement on the terms of a new or revised collective bargaining agreement – such as working conditions or rates of pay – either party can apply for NMB’s mediation services to resolve their differences. Additionally, NMB may impose mediation if it finds that resolving the dispute is in the public’s interest. NMB also offers grievance mediation to parties as an alternative way to resolve disputes filed for grievance arbitration. Although mediation is voluntary, it is a less expensive approach to resolving grievances, using NMB’s existing mediation staff rather than outsourcing—and paying—external arbitrators. Arbitration. The RLA also offers grievance arbitration to help resolve disagreements between carriers and unions over how to interpret and apply provisions of existing collective bargaining agreements. NMB does not directly provide arbitration services, but rather maintains a list of registered arbitrators from which the parties can select someone to review and decide their case. In the airline industry, the parties pay the costs of arbitration. In the railroad industry, however, consistent with the requirements of the RLA, NMB pays the fee and travel expenses of the arbitrator. The Office of Management and Budget (OMB) and the Office of Personnel Management (OPM) have key oversight responsibilities for all federal agencies, including NMB. OMB is responsible for the oversight of NMB’s management and information technology. OPM is the central personnel management agency of the federal government charged with administering and enforcing civil service laws, regulations, and rules. OPM annually administers surveys to federal employees across the government, including NMB, to solicit their views on their agencies including agency leadership, collaboration, and other issues. OPM also offers various services to agencies to evaluate organizational climate. Federal law does not establish an Inspector General (IG) for NMB. However, the agency signed a Memorandum of Understanding (MOU) in 2018 with the National Labor Relations Board’s (NLRB) Office of Inspector General to provide independent audit and investigative oversight. In the MOU, the NLRB IG agreed to (1) operate a hotline for employees to anonymously submit information—via email or telephone messages—regarding fraud, waste, and abuse involving the NMB’s programs and operations, and (2) take action to address complaints, such as inform the appropriate law enforcement agency or the NMB Chairman or Board Members, as appropriate. FedRAMP is a government-wide program that provides authorizations for use of cloud services. As an executive agency that uses a cloud service approved through FedRAMP, NMB is subject to related requirements. Through a December 2011 memorandum, OMB established requirements for executive agencies to use FedRAMP when conducting security authorizations for agency use of cloud services. In addition, the FedRAMP Program Management Office issued guidance in 2017 that specifies authorization requirements, including that an agency should document the authorization of the agency system supported by a cloud service approved through FedRAMP and the related cloud service used by the agency. GAO has issued three prior reports on NMB and collectively had 13 recommendations. NMB had previously implemented six of those recommendations, and seven remained in our current review. We issued our first report in December 2013 with seven recommendations in key management areas, including strategic planning, performance measurement, and workforce planning. We also suggested that Congress consider authorizing an IG at an appropriate federal agency to provide independent audit and investigative oversight at NMB. We issued a second report in February 2016, which found that NMB needed to take additional actions to implement the seven recommendations from our December 2013 report. We also made one additional recommendation related to procurement. We issued our third report in March 2018, which found that NMB had taken action to implement four of the recommendations from our December 2013 report and the recommendation from our February 2016 report. However, additional actions were needed to close the remaining three recommendations. We also made five additional recommendations related to the backlog of arbitration cases, outside employment, organizational climate, and NMB’s travel and telework policies. NMB implemented a recommendation from GAO’s 2018 report to create and monitor requests for outside employment, but has not taken action to fully implement the remaining six recommendations from GAO’s past reviews (see table 1). By not fully implementing these recommendations, NMB remains at risk in several areas key to its mission, including information privacy and security and organizational climate, among others. GAO 2018 Recommendation: Develop and implement policies for approval and monitoring of employee requests for outside employment and other outside activities to prevent violations of ethics rules, consistent with Office of Government Ethics standards of conduct and federal internal control standards. Since our 2018 review, we found that NMB has developed and implemented policies for approving employee requests for outside employment and the agency monitors these requests. We reported in 2018 that NMB did not have a policy for approving and monitoring employee requests for outside employment consistent with the Office of Government Ethics (OGE) standards of conduct and federal internal controls. NMB also did not systematically track or monitor when managers or board members approved such activities for an employee. We recommended that establishing an outside employment policy and a system to monitor activities would help to prevent violations of ethics rules. In our current review, we found that NMB has implemented our recommendation. NMB worked with OGE to develop a policy on outside employment that details how employees should submit outside employment requests, consistent with OGE standards. NMB has incorporated the policy into annual and new employee ethics training. Once NMB approves an outside employment request, the agency monitors outside employment through employees’ annual financial disclosure forms. GAO 2018 Recommendation: Develop and execute a plan to address the rail arbitration case backlog. Since our 2018 review, we found that NMB has used several strategies to reduce its backlog by 57 percent; however, without a plan establishing specific goals and timeframes, it is difficult to track the agency’s progress against specific measures of success. We reported in 2018 that NMB’s rail grievance arbitration case backlog had more than tripled since 2011, and that NMB did not have a specific plan and related processes to address it. However, identifying and assessing the risks associated with the backlog and developing a plan to effectively manage it are key to implementing effective risk management. In our current review, we found that NMB has implemented several initiatives to reduce the rail grievance arbitration case backlog, including removing older cases, using lead cases—cases that have the same parties and similar fact patterns, allowing a decision from one case to settle others—and promoting an “Ambassador Program” to move cases from grievance arbitration to grievance mediation. NMB officials credit these strategies with reducing the backlog from a height of 8,550 cases at the end of fiscal year 2017 by 4,852 cases—about 57 percent—to 3,698 cases as of the end of fiscal year 2019 (see table 2). 1. Removing older cases. NMB officials said that NMB has removed older arbitration cases that were filed, but had not yet been moved forward to arbitration. Specifically, officials explained that, in late summer 2018, NMB removed 400 cases from the backlog that were 3 years or older. NMB officials said that the agency subsequently removed 1,025 cases that were 2 years or older. NMB officials told us that parties may choose to re-file a removed case. NMB has not received objections from unions and carriers regarding the removal of older cases. 2. Using lead cases: For lead cases, NMB and the parties agree that the decision for one case will be used to settle other cases with similar fact patterns. For example, officials said that a similar fact pattern would be cases that had the same union and carrier and dealt with the same underlying issue. In fiscal year 2017, NMB used the decisions for nine lead cases to settle 4,240 additional claims. In fiscal year 2018, NMB used the decisions for four lead cases to settle 600 additional claims. 3. Promoting the Ambassador Program. NMB’s Ambassador Program involves NMB reaching out to parties to encourage them to voluntarily move cases from arbitration to grievance mediation. NMB has assigned experienced mediators to carriers and unions as “ambassadors.” Unions that have disputes with a carrier can raise the issue through the ambassador in hopes of avoiding the formal arbitration process; in that way, the Ambassador Program may proactively decrease the number of arbitration cases filed. NMB is interested in using the Ambassador Program to resolve multiple claims regarding the same issue, policy, or employment action. NMB officials said in fiscal year 2018, NMB had seven cases in the Ambassador Program and closed six cases. NMB officials said in fiscal year 2019, NMB had four cases in the Ambassador Program; none are closed to date. NMB officials said that the Ambassador Program and the lead case program are related, in that many of the cases moved through the Ambassador Program are lead cases. For example, NMB reported that in fiscal year 2018, one grievance mediation case was used to settle 300 claims. In fiscal year 2017, NMB heard five cases in the Ambassador Program, and the decisions on these cases were applied to 1,951 remaining claims to resolve them. In addition, NMB officials told us a small number of railway carriers and unions file the largest percentage of the grievance arbitration cases (see fig. 2). In fiscal year 2019, four railway carriers represented 72 percent of the backlog, and four railway unions represented 87 percent of the backlog. The Office of Arbitration seeks to coordinate with the organizations with the most arbitration cases to help them move toward mediation or other techniques to decrease the arbitration backlog. Another method NMB reported using to reduce the backlog is to direct otherwise unobligated funding at the end of the fiscal year to fund arbitration cases, in addition to the amount of funds it had initially budgeted for arbitration. Specifically, NMB officials said that the agency allocated at least $1 million in additional funds in fiscal years 2017, 2018, and 2019 for arbitration cases at the end of each fiscal year, which allowed NMB to fund arbitration for approximately 4,200 more cases overall, closing nearly all of those cases. Officials said that these additional funds came from unfilled full-time equivalent staff position salaries and contracts that NMB did not award. Officials said they do not anticipate having similar amounts of funding available for arbitration in the future, once NMB hires staff and awards the contracts. While NMB has implemented various strategies to reduce the rail arbitration case backlog, it has not developed a plan to link the strategies to specific goals or timeframes. GAO’s Standards for Internal Control in the Federal Government state that management should define objectives in specific and measurable terms. Further, federal agencies are required to develop annual performance plans that measure performance to reinforce the connection between long-term strategic goals and day-to- day activities of its managers and staff. NMB’s 2018 Annual Performance and Accountability Report does not link NMB’s efforts to reduce the backlog to specific and measurable objectives to assess their effectiveness. By developing specific and measurable objectives to reduce the overall backlog or any component thereof, NMB and Congress would be able to more adequately assess NMB’s progress in reducing the backlog relative to its goals. GAO 2018 Recommendation: Complete and take actions on the organizational climate assessment and survey results as a means to address employee concerns. Since our 2018 review, we found NMB has completed an organizational climate assessment but has not taken actions to address the results of that assessment. We reported in 2018 that surveyed NMB employees expressed concerns about the organizational climate at NMB. In addition, NMB’s strategic plan called for an organizational climate assessment to be conducted by the end of calendar year 2015 and every 3 years thereafter. However, at the time of our 2018 report, NMB had not conducted such an assessment. In addition, NMB officials said that they did not take action in response to survey results, which had a 59 percent response rate, because they believed the negative responses were attributable to a few employees. GAO recommended that NMB conduct an organizational climate assessment and develop actions to address the results of that assessment. In our current review, we found that NMB conducted an organizational climate assessment and has taken some actions to address the elements identified in the assessment, but must take additional actions to address employee concerns. NMB worked with OPM to conduct an organizational climate assessment in April 2019. The assessment had a response rate of 95 percent. Several NMB officials said the agency achieved a higher response rate than prior surveys because the Board held an all staff meeting to emphasize the importance of taking the assessment. In May 2019, NMB received the results of the organizational climate assessment from OPM. NMB identified a lack of communication across departmental staff as an issue. To address this, NMB directed regular interdepartmental updates, where each quarter a department is given an opportunity to present the activities within that department. NMB officials said that NMB held its first interdepartmental update in October 2019, with the Office of Legal Affairs presenting. The next interdepartmental update is scheduled for February 2020. NMB has identified some additional potential actions to address issues raised by the organizational climate assessment, including directing NMB’s CFO to rewrite the travel policy and to work with OPM to identify recommended training for supervisors, among others. However, these potential actions are not finalized and are generally unlinked to timeframes for implementation. By not taking these actions, NMB employees may be less engaged, which may lead to absenteeism or turnover. GAO 2018 Recommendation: Revise NMB’s Travel Policy and develop appropriate internal controls to ensure compliance with federal regulations. Since our 2018 review, we found that NMB has not revised its travel policy to be consistent with the Federal Travel Regulation (FTR) issued by the General Services Administration. We reported in 2018 that NMB’s travel policy was, in some respects, not consistent with the FTR. NMB management had also granted NMB staff exceptions to the agency travel policy that were not consistent with the FTR. For example, the FTR requires employees to rent the least expensive car available, but a former NMB management official approved the use of a luxury rental car in some cases. Our 2018 report found that without greater oversight of employee travel expenses, NMB may be incurring unnecessary additional expenses for employee travel. In our current review, we found that NMB has not revised its travel policy to be consistent with the FTR. However, NMB’s Office of Fiscal Services plans to rewrite portions of the travel policy, including clarifying roles and responsibilities of NMB employees and adding a Frequently Asked Questions portion to the policy. NMB officials said the revised policy is expected to be completed in 2020, and will be reviewed by the CFO in consultation with the Office of Legal Affairs prior to its publication. It is unclear the extent to which these changes will make NMB’s travel policy consistent with the FTR. In addition, NMB has taken steps to strengthen its internal controls related to travel, including: 1. Replacing the Chief of Staff role in travel policy. In August 2018, NMB replaced references to the eliminated Chief of Staff position in its travel policy to make the Board the decision making body for travel- related issues. This clarification strengthened internal controls because no one individual is singularly responsible for approval. 2. Updating NMB’s travel charge card program. In 2019, NMB transitioned to a new travel charge card program run by the General Services Administration. Both NMB and the Department of Treasury’s Bureau of Fiscal Services, which provides accounting services to NMB, routinely monitor the program, including monitoring each employee’s use of the travel card to ensure only appropriate official government-related expenses are being charged to the card. The CFO receives reports from this new program. 3. Issuing an interim procedure. Separately, NMB has established an interim procedure for disputed claims that sets timeframes for when vouchers must be approved to avoid delays in returning vouchers to travelers. The interim procedure requires travelers to cite the specific regulatory authority to support their disputed claim. The NMB Board is determining whether this procedure should be established officially in the travel policy. While NMB has made these initial efforts to strengthen internal controls related to travel, such as increasing oversight from the Board, NMB has not revised its travel policy to be consistent with the FTR. For example, NMB has not updated its policy to clarify the use of personal credit cards as discussed in our 2018 review. Without an updated policy consistent with the FTR, NMB may be incurring needless additional expenses for employee travel. Since our 2018 review, we found that NMB has not yet revised its telework policy, but the agency has collected telework agreements and provided training for teleworking employees. We reported in 2018 that NMB’s telework policy is not consistent with the requirements of the Telework Enhancement Act of 2010, which requires employees to take telework training and have signed telework agreements prior to beginning telework, and NMB did not consistently enforce its policy. NMB’s telework policy, effective October 2015, did not mention employee telework training nor did management require employees to complete training before entering into a telework agreement, as required by federal law. In addition, management allowed employees to telework without a written telework agreement, even though this requirement is specified in NMB’s telework policy. NMB agreed to review its policy and make any revisions determined to be necessary. In our current review, we found that NMB now tracks telework training and agreements to ensure that teleworking employees have telework agreements and completed telework training prior to engaging in telework. However, NMB has not updated its telework policy to be consistent with the requirements of the Telework Enhancement Act of 2010, instead determining after reviewing its policy that a revision was unnecessary. Despite this determination, the telework policy, last updated in October 2015, does not reflect the current structure of NMB: for example, it includes responsibilities for the Chief of Staff, a position that no longer exists. Further, the policy does not mention employee telework training. Until NMB updates its policy, it will continue to be outdated regarding official responsibilities and inconsistent with relevant law. GAO 2013 Recommendation: Establish a privacy program that includes conducting privacy impact assessments and issuing system of record notices for systems that contain personally identifiable information. Since our 2018 review, we found that NMB has not always followed key information privacy practices to protect personal information federal agencies collect. In our 2018 review, we found that NMB did not establish a privacy program that included practices such as conducting privacy impact assessments and issuing system of records notices for systems that contain personally identifiable information. For example, in our 2018 review, we found that while NMB designated a privacy officer, the agency did not conduct privacy impact assessments for its systems and those of third-party providers containing the agency’s personally identifiable information. In our current review, we found that, of the four key information privacy practices described in our 2013 report, NMB is still following one, partially following two, and minimally following one practice. For example, NMB documented a privacy impact assessment dated July 2018. However, the assessment did not specify whether a system of records notice would be developed as required by OMB. For additional details on the extent to which NMB is following key information privacy practices, see appendix II. GAO 2013 Recommendation: Develop and fully implement key components of an information security program in accordance with the Federal Information Security Management Act of 2002. Since our 2018 review, we found that NMB continues to only partially follow the eight key information security practices in accordance with the Federal Information Security Management Act (FISMA). These practices include developing and implementing risk-based policies and procedures to ensure compliance with applicable standards and guidance, including system configuration requirements. For example, in our 2018 review, we found that, while NMB had its information security policy documented in its April 2016 Information Program Plan, which included risk assessment requirements, NMB had not developed agency- wide policies and procedures on the oversight of its third-party providers that support the operations and assets of the agency, as required by FISMA. In our current review, we found that, while NMB has created a policy to conduct periodic risk assessments of cyber threats and vulnerabilities, the agency did not provide risk assessment documentation of its enterprise network for fiscal year 2019. NMB officials said that the agency had not fully addressed information security practices due to a lack of resources. NMB officials stated the agency plans to address several of these practices with the targeted completion expected in fiscal year 2020. As a step to further focus on information technology challenges, NMB established the Office of Information Services and, as noted earlier, hired a CIO. While hiring a CIO does not directly address the practices described above, NMB officials said that these actions, along with hiring more staff and making key acquisitions through contracts, will enable NMB to fully follow the practices in the future. For additional details on the extent to which NMB is following key information security practices, including NMB’s recent engagement of contractors, see appendix II. In addition to the gaps in key information security practices discussed above, we found in our current review that NMB has not fully implemented federal requirements related to authorizing the cloud service approved through FedRAMP that the agency uses. OMB defines an authorization to operate as an official management decision where a federal official or officials authorize the operation of information system(s) and accept the risk to agency operations and assets, individuals, and other organizations based on the implementation of security and privacy controls. OMB requires agencies to use FedRAMP processes when granting authorizations to operate for their use of cloud services. The FedRAMP Program Management Office published guidance in 2017 to describe the process by which agencies can reuse existing authorizations. According to the FedRAMP guidance, agencies should document the authorization of 1) the agency system supported by the cloud service; and 2) the cloud service used by the agency. Additionally, the agency should provide a copy of its authorization letter for the cloud service to the FedRAMP Program Management Office so that the office can verify the agency’s use of the service and keep agencies informed of any changes to a provider’s authorization status. These steps ensure that federal agencies have made a determination of whether the cloud service provider’s risk posture is acceptable for use at that agency. According to NMB, the agency is using a cloud service that was approved through FedRAMP to support the agency’s enterprise network. NMB had documented the authorization of its enterprise network, but NMB had not documented its authorization of the cloud service to demonstrate that it had accepted the risk of using the service. In addition, NMB had not provided the authorization letter for the cloud service to the FedRAMP Program Management Office. NMB officials stated that the agency’s internal information security guidance did not include procedures to address FedRAMP requirements because the officials were unaware of those requirements. Without taking these steps, the FedRAMP Program Management Office may not be able to inform NMB, in a timely manner, if its cloud service provider has experienced a security incident. NMB has taken steps to improve its agency management and oversight, such as reorganizing some agency mission areas and filling key staff positions; however, it lacks effective internal controls to manage and oversee its annual appropriation and ensure that its audit policy is consistently followed. As a result, the agency did not use funding the Board said is needed to accomplish NMB goals. NMB had about $4 million in unobligated appropriations in expired accounts in the U.S. Treasury and unavailable to NMB for new obligations from fiscal years 2016 through 2019. In addition, NMB has not taken corrective actions to address management deficiencies identified during audits. NMB has not established effective internal controls to assist the agency in managing and overseeing its annual appropriations. NMB has had significant unobligated balances remaining for the last 4 fiscal years, even though officials said they could not accomplish some of the agency’s goals – such as hiring staff and information technology initiatives – due to a lack of financial resources (see table 3). For example, from fiscal years 2016 through 2019, NMB had unobligated balances ranging between approximately $600,000 to over $2 million. These are the remaining funds from its appropriations received each year from fiscal year 2016 through 2019. In total, over 8 percent of NMB’s appropriations for the last 4 fiscal years went unobligated. NMB officials noted that hiring challenges and uncertainty regarding the agency’s final appropriation as a result of continuing resolutions— legislation that continues to fund federal agencies until final agency appropriations for a fiscal year are made—kept the agency from obligating funds during those fiscal years to achieve its goals. For example, NMB officials said that the Board did not pursue certain planned hiring, as well as other contract actions and travel, because of uncertainty about the amount of final appropriations that would be available. GAO has reported that continuing resolutions present challenges for federal agencies, and that agencies may not have enough time to spend funding on high-priority needs such as hiring. However, given the frequency of continuing resolutions, it is even more important for NMB to develop an effective plan to use its appropriations to accomplish agency goals. During our review, we found that NMB struggled to plan effectively for contingencies such as funding under continuing resolutions, although NMB’s budget request and appropriations were generally consistent for several years. Additionally, NMB officials told us they lacked an effective process to reliably forecast the amount of funding the agency would have remaining at the end of a fiscal year, and we found NMB did not plan effectively to allow the agency to obligate its fiscal year appropriations. NMB officials said the agency waited until the end of the third quarter to assign unobligated funds to other priorities in order to allow for the option of retaining temporary services during periods of high demand. Although NMB was able to reassign at least $1 million to arbitration work in each of the fourth quarters in 2017, 2018, and 2019, there was insufficient time to use other available funding in additional areas of need. The Board has taken steps to improve its budget execution process. In particular, the Board has implemented new bi-weekly budget reviews with the CFO meant to help NMB better forecast the agency’s available funds, including more reliably predicting the amount of unobligated funds and how to use those funds to meet agency goals. However, these changes have not been incorporated into a formal, written process to help NMB manage its appropriations more effectively to achieve agency goals. One goal under NMB’s Strategic Plan is to provide timely, efficient, and responsible stewardship of agency fiscal resources. Federal internal control standards state that internal controls comprise the plans used to fulfill the goals of the agency, and we have reported that maintaining written policies and procedures can help ensure that adequate internal controls are in place. Further, those standards state that management should obtain reliable financial data on a timely basis to enable effective monitoring. Until NMB establishes and documents an effective plan to manage its appropriations, as well as timely, reliable financial data, it may miss opportunities to achieve its objectives as efficiently and effectively as possible. NMB lacks effective internal controls to ensure that it consistently addresses deficiencies identified from financial and other audits. For example, NMB did not follow its own requirements to create corrective action plans to address findings of financial audits or GAO recommendations. Under agency policy, those corrective action plans should detail major steps for NMB to take, estimated completion dates, and other related information. Although NMB provided its financial auditors and GAO with general plans to address findings and recommendations, those plans have not always included major steps or estimated completion dates, and NMB has not always followed through with the steps it agreed to take. For instance, NMB’s financial auditor noted a deficiency in NMB’s internal controls related to financial reporting in 2017, and noted a similar deficiency in 2018 because NMB still had not addressed the problem sufficiently. Effective remediation of internal control deficiencies, like those found by GAO and other audits, is essential to achieving the objectives of the Federal Managers’ Financial Integrity Act, as amended (FMFIA). Unless NMB follows its own policy and federal guidance on corrective action plans, it may not do what is needed to address the risks associated with any deficiency. Likewise, NMB did not follow its policy to circulate draft financial audit findings and provide a draft response to the Board. When NMB received notice of a 2018 draft management letter from its independent financial auditors, the letter was not circulated for over 5 months nor was the Board provided with any draft response to the findings. Moreover, although NMB’s Board was notified of the letter’s existence in November 2018, the Board did not ask for the letter prior to May 2019, and said instead that they relied on the official in charge of the audit to follow procedure. Federal internal control standards state that management should obtain relevant data, including compliance data, in a timely manner so that they can be used for monitoring, but NMB officials and the Board did not obtain such information, putting the agency at risk for missed opportunities to identify and address audit deficiencies. Additionally, NMB has not effectively monitored the sufficiency of its internal controls as required under FMFIA. NMB has also not conducted its planned fiscal year 2017 internal controls review of its Office of Mediation or its fiscal year 2018 internal controls review of its Office of Legal Affairs in order to complete its annual review and report under FMFIA. Monitoring the effectiveness of internal controls provides the basis for an agency’s annual assessment and report of internal control, as required by FMFIA. NMB officials said the agency had not completed those reviews in a timely manner due to the timing of multiple audits occurring at NMB. NMB recently scheduled those reviews for 2020. Without monitoring its internal controls, NMB may not identify and be able to address significant management problems that can impede the agency’s ability to achieve its goals. Although NMB has identified and taken steps to address some of these audit and internal control deficiencies, it has not established an effective process to consistently monitor adherence to its audit policy and federal standards, evaluate the results, and remediate any deficiencies. For example, NMB has revised its audit policy to assign responsibility for audits and related follow-up to the CFO, who is tasked with helping NMB develop appropriate corrective action plans. Additionally, the Board said it addressed the issue of not circulating the audit management letter with the responsible official and changed the protocols for circulating letters for audit findings to include the Board in addition to the CFO. However, these actions, by themselves, do not establish the monitoring activities required by NMB’s audit policy and federal internal control standards. Under NMB’s new audit policy, the Board has responsibility to provide top-level oversight of NMB’s management activities related to audit coordination and follow-up; federal internal control standards require management to establish and operate monitoring activities to monitor the internal control system, evaluate the results, and remediate identified deficiencies on a timely basis. Further, FMFIA requires regular evaluation of the sufficiency of an agency’s internal controls. The failure of NMB to conduct the necessary reviews to support its annual assertion under FMFIA hampers the agency’s ability to identify risks in its internal controls and to correct any associated material weaknesses, as well as deprives Congress of information necessary to oversee the agency. Further, by not following its own policies and federal internal control standards, NMB may miss opportunities to improve its ability to achieve objectives, address audit deficiencies, and improve management oversight. NMB has fully implemented one of the seven recommendations still open from prior GAO reports: creating standards on outside employment, which will help prevent employee violations of ethics rules. However, while making varying degrees of progress on the others, NMB still has more work to implement all six remaining recommendations. NMB has decreased its backlog of rail arbitration cases, but it has no specific goals against which to measure its progress toward reducing the backlog and ensuring NMB and Congress can adequately assess NMB’s resolution of disputes. Likewise, while the Board’s implementation of the climate assessment illustrated that it recognizes the need to understand employee concerns regarding communication across teams, agency travel, and training for management, among other things, it has not fully executed plans to address those concerns in order to benefit from that assessment. Finally, while NMB has improved certain aspects of how it implements its travel and telework policies, it has not sufficiently changed the policies themselves to ensure that NMB policies are consistent with the Federal Travel Regulation and the Telework Enhancement Act of 2010, respectively. Moreover, NMB established the Office of Information Services and hired a new CIO to assist NMB in addressing information security and privacy recommendations, but NMB still must change its underlying information policies and procedures, including updating its information privacy policy to reflect the current structure of NMB and perform a review of its system security plans. Additionally, until NMB complies with the recent FedRAMP requirements, its data may be at greater risk in the event of a security incident. Without fully implementing the remaining six recommendations and addressing the recent FedRAMP requirements, NMB is missing opportunities to mitigate information security risks and improve its own management and performance. Moreover, NMB faces challenges in managing and overseeing its annual appropriation and audit policy as a result of ineffective internal controls. Specifically, as a result of ineffective internal controls for managing and overseeing its annual appropriation, NMB has forgone several million dollars in funding that could have been used to accomplish agency goals. While continuing resolutions can make it difficult for agencies to achieve hiring and other goals, until NMB develops a written plan to document NMB’s process for reviewing and monitoring the agency’s annual appropriation to effectively manage its budgetary resources and spending, NMB will likely continue to miss opportunities to accomplish its goals. Similarly, until NMB establishes a specific process for the Board to monitor and evaluate NMB’s adherence to audit protocols, NMB will not be well positioned to address audit recommendations from its financial auditors and GAO, hindering efforts to improve its operations. While NMB officials have told us that they did not have the resources for certain changes that we recommended, such as information security and privacy improvements, they had more resources than they actually used, as evidenced by unused appropriations. Given the range of management issues that have remained unaddressed over the past 6 years, NMB should ensure their available resources are used effectively. We are making the following four recommendations to the National Mediation Board (NMB): 1. The Chairman of the NMB should document NMB’s authorizations for its use of cloud services approved through FedRAMP and submit the authorizations to the FedRAMP Program Management Office. (Recommendation 1) 2. The Chairman of the NMB should update NMB’s security policies and procedures to include FedRAMP’s authorization requirements. (Recommendation 2) 3. The Chairman of the NMB should develop a written plan to document NMB’s process for reviewing and monitoring the agency’s annual appropriation to ensure that funds are used effectively. (Recommendation 3) 4. The Chairman of the NMB should establish a process for the Board to effectively monitor and evaluate NMB’s adherence to audit protocols and implementation of actions to address audit recommendations. (Recommendation 4) We provided a draft of this report to the National Mediation Board (NMB) for review and comment. The agency provided written comments, which are reproduced in their entirety in appendix III. NMB also provided technical comments, which we incorporated as appropriate. NMB agreed with our four recommendations, and stated that it would take actions to address them. With regard to our first two recommendations concerning the Federal Risk and Authorization Management Program authorizations, NMB stated that it plans to complete the required actions by the end of fiscal year 2020. While NMB stated that it would take actions to address our third and fourth recommendations, concerning improvements to better monitor its annual appropriations and adhere to audit protocols to implement audit recommendations, respectively, NMB did not provide a timeframe for when these actions would be completed. NMB also said that it is taking actions to fully implement the remaining recommendations from our prior reports concerning its rail arbitration case backlog, organizational climate assessment, travel and telework policies, and information privacy and security. We are sending copies of this report to the appropriate congressional committees, NMB, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or nguyentt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. NMB appointed a senior agency official for privacy in April 2019 and documented the assignment through a memorandum. Partially following NMB established a privacy policy dated October 2017 that includes procedures for protecting sensitive information, including personally identifiable information. However, the policy reflects outdated roles and responsibilities. For example, the policy reflects the role of chief of staff that no longer exists in the agency. An NMB official stated the agency engaged a technical writer (contractor) to update the policy by the end of fiscal year 2020. Partially following The NMB documented a privacy impact assessment dated July 2018. assessments for systems containing personally identifiable information 4. However, the assessment did not specify whether a system of records notice would be developed as required by the Office of Management and Budget (OMB). An NMB official stated the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. NMB did not issue a system of records notice for its enterprise network and did not provide any documentation that this notice was not required in the agency’s privacy impact assessment. An NMB official stated the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. Partially following NMB developed an Information Program Plan dated April 2016 that states the agency annually conduct a risk analysis. NMB had assessments of its enterprise network conducted on May 2016 and November 2017. NMB also completed an information system risk assessment dated October 2017 that identifies and describes threats. However, NMB did not provide any assessment documentation for its network in fiscal year 2019. An NMB official stated the agency engaged a security assessor (contractor) to address this practice by the end of fiscal year 2020. Partially following NMB has developed an information security policy by documenting its based policies and procedures to ensure compliance with applicable standards and guidance including system configuration requirements existing April 2016 Information Program Plan. While the policy includes risk assessment requirements, it does not reflect oversight of NMB third- party providers. An NMB official stated that the agency engaged a technical writer (contractor) to address this practice by the end of fiscal year 2020. Partially following NMB’s current system security plan for its enterprise network has been in that cover networks, facilities, and systems or groups of systems, as appropriate place since March 2016. However, the plan does not include full implementation details on operational controls or a rationale on why controls are not applicable as recommended in National Institute of Standards and Technology guidance. An NMB official stated that the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. Extent NMB is following Partially following NMB has security awareness training guidelines signed April 2016 that specify agency employees and contractors will receive annual security awareness training. An NMB official stated that security awareness training is to be conducted each fiscal year. However, an NMB official stated the agency did not provide security awareness training in fiscal year 2018. NMB provided that training in fiscal year 2019, and an NMB official said the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. In May 2016, the NMB’s enterprise network was independently tested by the Department of the Treasury’s Bureau of Fiscal Service Division of Security Services. In addition, an NMB official documented a security assessment for the network signed November 2017. However, NMB did not provide us with any additional documentation to show the enterprise network was assessed in fiscal year 2019. According to an NMB official, the agency engaged a security assessor (contractor) to address this practice by the end of fiscal year 2020. Program Plan dated April 2016. In addition, the agency documented a plan of actions for its enterprise network dated January 2018. However, the plan of actions did not fully meet OMB requirements such as planned completion dates and changes to milestones, among other things. An NMB official stated that the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. Partially following NMB’s security-incident procedures dated June 2016 include information procedures for detecting, reporting, and responding to incidents on handling cyber incidents. However, the procedure did not include required actions specified by the Federal Information Security Modernization Act of 2014, such as notifying the federal information security incident center, law enforcement agencies, and relevant offices of inspector general and general counsel. An NMB official stated the agency engaged a technical writer (contractor) to address this practice by the end of fiscal year 2020. Partially following NMB documented a continuity of operations plan policy dated March 2016. However, the agency has not documented a contingency plan for its enterprise network. An NMB official stated the agency engaged an information system security officer (contractor) to address this practice by the end of fiscal year 2020. covered by information in a system of records, the category of records that are maintained about the individuals, and how the information is shared and routinely used by the agency. In addition to the contact named above, Mary Crenshaw (Assistant Director), Andrew Nelson (Analyst-In-Charge), Cindy Brown Barnes, Larry Crosland, Mikey Erb, Chelsa Gurkin, John Lack, and Dana Pon made significant contributions to this report. Also contributing to this report were Shirley Abel, Amy Anderson, Bill Anderson, J. Howard Arp, Gary Bianchi, Rachael Chamberlin, Vijay D’Souza, Robert Graves, Carol Henn, Janice Latimer, Barbara Lewis, Benjamin Licht, Jessica Orr, Monica Perez- Nelson, James Rebbe, Constance Satchell, Monica Savoy, Almeta Spencer, Sabrina Streagle, Barbara Steel, Amy Sweet, Curtia Taylor, Candice Wright, and Paul Wright.", "summary": "NMB was established under the Railway Labor Act to facilitate labor relations for airline and railway carriers by mediating and arbitrating labor disputes and overseeing union elections. The FAA Modernization and Reform Act of 2012 included a provision for GAO to evaluate NMB programs and activities every 2 years. GAO's previous reports, issued in December 2013, February 2016, and March 2018, included 13 recommendations for NMB based on assessments of policies and processes in several management and program areas. NMB had implemented six of those recommendations previously, leaving seven for our review. This fourth report examines the (1) extent to which NMB has taken actions to fully implement GAO's remaining recommendations, and (2) other challenges NMB faces in key management areas and in overseeing its operations. GAO reviewed relevant federal laws, regulations, and NMB documents, such as its travel and telework policies; examined arbitration caseload data and the results of NMB's 2019 Organizational Climate Assessment; and interviewed NMB officials. The National Mediation Board (NMB), which facilitates labor relations for airline and railway carriers, has implemented one of GAO's seven recommendations remaining from past reports (see table). Specifically, NMB has developed a policy to prevent violations of ethics rules regarding outside employment and monitors compliance with that policy. NMB has not yet fully implemented the other six recommendations. For example, NMB has developed some strategies to reduce its arbitration case backlog, but lacks a plan with goals and time frames to complete that work. Similarly, NMB has completed an organizational climate assessment, but still must take additional actions to address employee concerns. By not fully implementing these and other recommendations, NMB remains at risk of not fulfilling its mission in several key areas, including information security and organizational climate. In this review, GAO found that, in addition to the six unimplemented recommendations, NMB lacks internal controls to effectively manage and oversee its appropriations and consistently follow its audit policies. NMB officials said the agency needed its full funding to address various agency priorities, such as hiring information technology specialists, but NMB did not use all of its funding for fiscal years 2016 through 2019, leaving a total of more than $4 million unobligated from those years; those funds are not available to NMB for new obligations. Officials said that hiring challenges and uncertainty concerning the agency's final appropriations made managing its budget resources difficult. NMB has a new process to monitor its budget resources, but has not documented that process. Without documenting that process, NMB may not be certain it uses its funding effectively to achieve its hiring and other goals. Additionally, NMB has not consistently followed its audit policy to address deficiencies identified in financial and other audits. For example, NMB did not create specific corrective action plans to address findings from financial or GAO audits. The NMB Board said it relied on senior managers to follow procedures, but the Board is ultimately responsible for ensuring that its managers implement the internal control system. Without a process to effectively oversee and evaluate its adherence to internal controls and its own audit policies, NMB may miss opportunities to achieve objectives, address audit deficiencies, and improve management oversight. GAO is making four recommendations, including that NMB document its process for reviewing and monitoring the agency's annual appropriations to ensure effective use of funds, and establish a process for the Board to effectively monitor and evaluate NMB's adherence to audit policies. NMB agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "By the end of fiscal year 2019, the federal debt held by the public had climbed to 79 percent of GDP. By comparison, such debt has averaged 46 percent of GDP annually since 1946. If current trends continue, debt as a share of GDP will exceed the historic high 1946 level of 106 percent of GDP within 11 to 14 years. In 2050, it will be nearly twice that level and about four times its post-World War II average. Figure 1 shows that in GAO, CBO, and 2019 Financial Report projections, debt held by the public as a share of GDP grows substantially over time. Under GAO, CBO, and the 2019 Financial Report projections, spending for the major health and retirement programs grows more rapidly than GDP in coming decades. This is a consequence of both an aging population and projected continued increases in health care costs per beneficiary. Medicare spending is expected to exceed $1 trillion per year by fiscal year 2026, and Social Security spending already exceeds $1 trillion per year. However, according to the projections, these spending categories will eventually be overtaken by spending on net interest, which primarily consists of interest costs on the federal government’s debt held by the public. In recent years, persistently low interest rates have resulted in lower interest costs for the government than previously projected. Despite these low interest rates, spending on net interest grew from $263 billion in 2017 to $376 billion in 2019. That $376 billion is 8.4 percent of total federal spending, which exceeded combined spending on agriculture, transportation, and veterans’ benefits and services. Going forward, both interest rates and the debt are projected to grow, which means spending on net interest is projected to grow faster than any other component of the budget. In 2032, spending on net interest is projected to exceed $1 trillion annually. Over the past 50 years, net interest costs have averaged 2 percent of GDP but these costs are projected to increase to 7.2 percent by 2049. As figure 2 shows, we project that as a share of GDP, net interest spending will exceed Medicare spending in 2041, Social Security spending in 2044, and total Discretionary spending in 2049. Interest costs will also depend in part on the outstanding mix of Treasury securities. The Department of the Treasury issues securities in a wide range of maturities to appeal to a broad range of investors to support its goal of borrowing at the lowest cost over time. Treasury refinances maturing debt by issuing new debt in its place at the prevailing interest rate. At the end of fiscal year 2019, 61 percent of the outstanding amount of marketable Treasury securities held by the public (about $9.9 trillion) was scheduled to mature in the next 4 years. If interest rates are higher, Treasury will have to refinance these securities at the higher interest rates, adding to the interest costs of the growing federal debt. Impending financial challenges for major programs and fiscal risks are both straining the federal budget and contributing to the growing debt. Sustaining key programs will require changes (see fig. 3). The President’s Budget, CBO, and the Chair of the Board of Governors of the Federal Reserve System all make it clear that rising federal debt could have long-term consequences for the economy. For example it could: constrain Congress’s ability to support the economy or address other national priorities, restrain private investment and thereby reduce productivity and overall growth, and erode confidence in the U.S. dollar. In addition, it may increase the risk of a fiscal crisis, in which investors would lose confidence in the U.S. government’s financial position, and interest rates on Treasury securities would increase abruptly. To change the long-term fiscal path, policymakers will need to consider policy changes to the entire range of federal activities, both revenue (including tax expenditures) and spending (entitlement programs, other mandatory spending, and discretionary spending). As Congress considers changes in revenue and spending policies to improve the federal government’s long-term fiscal path, it will also need to consider other approaches for managing the level of debt. As currently structured, the debt limit is a legal limit on the total amount of federal debt that can be outstanding at one time. The debt limit does not restrict Congress’s ability to pass spending and revenue legislation that affects the level of debt, nor does it otherwise constrain fiscal policy. Without legislation to suspend or raise the debt limit, Treasury cannot continue issuing debt to finance the decisions already enacted by Congress and the President. We have reported on the negative impacts of uncertainty around the debt limit which include (1) increased Treasury borrowing costs, (2) decreased demand for Treasury securities, and (3) constrained Treasury cash management. We have reported numerous times that the full faith and credit of the United States must be preserved. We have also recommended that Congress consider other approaches to the current debt limit to avoid seriously disrupting the Treasury market and increasing borrowing costs and to allow it to better manage the federal government’s level of debt. A number of bills have been introduced in this Congress to address this issue. The Senate Budget Committee’s proposal to reform the Congressional budget process would automatically adjust the debt limit to conform to levels established in the budget resolution. In contrast to the debt limit, fiscal rules can support efforts to achieve fiscal sustainability by imposing numerical limits or targets on the budget to guide fiscal policy. Fiscal rules are intended to influence decisions about spending and revenue as they are made. The Senate Budget Committee’s proposal to reform the Congressional budget process is an example of one such approach. This legislation would specify target ratios for debt as a share of GDP and track legislation against that target. As Congress continues to consider options, two key points should be emphasized. An agreed-upon goal can help policymakers justify and frame their choices. With that in mind, a fiscal target that establishes a common goal for controlling the size of the federal debt relative to the economy—as well as well-designed rules that put the federal government on a path to achieve that target—could form part of a long-term fiscal plan to put the government on a sustainable fiscal path. The longer action is delayed, the greater and more drastic the changes will have to be, placing an additional burden on future generations. While changes in spending and revenue to ensure long-term fiscal sustainability require legislative actions to alter fiscal policies, executive agencies can also take actions to contribute toward a sustainable fiscal future. Although executive actions alone cannot put the U.S. government on a sustainable fiscal path, it is important for agencies to act as stewards of federal resources. These actions include reducing improper payments, which agencies estimate totaled $175 billion in fiscal year 2019; addressing the $381 billion annual net tax gap; better managing fragmentation, overlap, and duplication across the federal government; and improving information on federal programs and fiscal operations to aid agency decision-making. Chairman Enzi, Ranking Member Sanders, and Members of the Committee, this completes our prepared statement. We would be pleased to respond to any questions that you may have. For further information on this testimony, please contact Susan J. Irving, Senior Advisor to the Comptroller General, Debt and Fiscal Issues, who may be reached at (202) 512-6806 or IrvingS@gao.gov; Robert F. Dacey, Chief Accountant, who may be reached at (202) 512-3406 or daceyr@gao.gov; or Dawn B. Simpson, Director, Financial Management and Assurance, who may be reached at (202) 512-3406 or simpsondb@gao.gov. Contact points for our Congressional Relations and Public Affairs offices may be found on the last page of this statement. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "This testimony summarizes information contained in GAO's March 2020 report, entitled The Nation’s Fiscal Health: Action Is Needed to Address the Federal Government’s Fiscal Future ( GAO-20-403SP ). Long-term fiscal projections by GAO, the Congressional Budget Office (CBO), and in the 2019 Financial Report of the U.S. Government (2019 Financial Report) all show that, absent policy changes, the federal government continues to face an unsustainable long-term fiscal path. Although the assumptions in each of these projections vary somewhat, all result in the same conclusion: over the long term, the imbalance between spending and revenue that is built into current law and policy will lead to (1) deficits exceeding $1 trillion each year beginning in fiscal year 2020 and (2) both the annual deficit and the cumulative total debt held by the public continuing to grow as shares of gross domestic product (GDP). This situation—in which debt grows faster than GDP—means the current federal fiscal path is unsustainable. To change the long-term fiscal path, policymakers will need to consider policy changes to the entire range of federal activities, both revenue (including tax expenditures) and spending (entitlement programs, other mandatory spending, and discretionary spending). As Congress considers changes in revenue and spending policies to improve the federal government’s long-term fiscal path, it will also need to consider other approaches for managing the level of debt.", "document_type": "gao"}
{"report": "Congress first enacted Section 653(a) in the Foreign Assistance Act of 1971. According to Section 653(a), “not later than thirty days after the enactment of any law appropriating funds to carry out any provision of this Act (other than section 451 or 637) or the Arms Export Control Act, the President shall notify the Congress of each foreign country and international organization to which the United States Government intends to provide any portion of the funds under such law and of the amount of funds under that law, by category of assistance, that the United States Government intends to provide to each.” To provide Congress with the mandated data within the mandated time frame, State and USAID officials review the annual appropriations act and the accompanying joint explanatory statement to identify the congressional instructions contained within them. Although State has the delegated authority to approve the programming of foreign assistance funds and is charged with submitting the Section 653(a) report to Congress, State and USAID have shared responsibilities regarding the administration of certain foreign assistance accounts. Throughout this report we refer to the congressional instructions in the annual appropriations acts and those allocation tables within the joint explanatory statements that are incorporated by reference into the act as “requirements,” and we refer to Congress’s instructions to the agencies presented as additional language in the joint explanatory statement as “directives.” Congress funds foreign assistance by appropriating funds to 16 accounts, each of which has a distinct purpose and specific legal requirements, such as the number of years the funds are available for obligation. Table 1 provides a summary of these 16 accounts. These accounts are generally administered individually by State or USAID, or jointly by both agencies. In addition, the period of availability for obligation for these accounts ranges from 1 to 5 years, or in some cases, until funds are expended. The annual appropriations acts have hundreds of specific instructions— both requirements and directives—attached to many of the foreign assistance accounts that State and USAID address in the Section 653(a) report. According to State officials, the annual appropriations acts have become more detailed since the addition of the Section 653(a) mandates in the Foreign Assistance Act of 1971. For example, State officials said that when the Section 653(a) reporting mandate began the annual appropriations act contained fewer requirements and directives. The Foreign Assistance and Related Programs Appropriations Act, 1971, appropriated $2.2 billion in foreign assistance and was 18 pages in length. By contrast, the relevant portion of the annual appropriations act for fiscal year 2018 appropriated $33.7 billion in foreign assistance and was 138 pages in length. In addition, the accompanying joint explanatory statement was 9 pages in 1971 and 31 pages in 2018. As shown in table 2 below, during the 4 fiscal years covered by our review, the total number of requirements and directives addressed in the Section 653(a) reports has varied depending on congressional instructions within the annual appropriations acts and corresponding joint explanatory statements. For example, fiscal year 2016 had 1,056 total requirements and directives, while fiscal year 2018 had 657. The total number of requirements and directives has also varied by account. For instance, the Economic Support Fund, which was appropriated roughly $3.9 billion in fiscal year 2018, had 107 requirements and directives that instructed agencies how to allocate about $2.9 billion. Other accounts appropriated funds in fiscal year 2018 had fewer requirements and directives. For example, the International Disaster Assistance account, which was appropriated about $4 billion in fiscal year 2018, had three requirements and directives. The requirements and directives also vary in their specificity. For instance, of the $8.6 billion appropriated for Global Health Programs in fiscal year 2018, the joint explanatory statement required that $829.5 million be allocated toward maternal and child health. State and USAID were also required to make funds allocated for the Global Health Programs available in specific amounts, such as making $755 million available for activities addressing malaria in fiscal year 2018. State and USAID also balance the requirements and directives with administration priorities. For example, officials from OMB said that they review the Section 653(a) report to ensure that allocations for certain countries— such as Israel and Jordan—are consistent with the administration’s financial commitments to those countries. The text box below provides examples of the types of requirements and directives found in the fiscal year 2018 appropriations act. Foreign Assistance Requirements and Directives Congress includes a variety of instructions to the agencies managing foreign assistance funds in statutes, such as the annual appropriations acts, and in legislative history, such as the joint explanatory statements. These instructions come in two broad categories. Requirements: Congress’s instructions to agencies as contained in the annual appropriations act, including mandatory and non-mandatory spending, and tables within the joint explanatory statement that are required by statute. Directives: Congress’s instructions to agencies presented as additional language in the joint explanatory statement that are not required by statute. Examples Mandatory requirement detailed in law: “Of the funds appropriated by this Act, not less than $400,000,000 shall be made available for water supply and sanitation projects pursuant to the Senator Paul Simon Water for the Poor Act of 2005 (Public Law 109-121), of which not less than $145,000,000 shall be for programs in sub-Saharan Africa, and of which not less than $15,000,000 shall be made available to support initiatives by local communities in developing countries to build and maintain safe latrines.” Mandatory requirement referenced in law but detailed in the joint explanatory statement: Law: “For necessary expenses to carry out the provisions of chapter 4 of part II of the Foreign Assistance Act of 1961, $1,816,731,000, to remain available until September 30, 2019.” Joint explanatory statement: “Funds for certain programs under this heading are allocated according to the following table:” Ambassador-at-Large for Global Women’s Issues Conflict and Stabilization Operations Disability Programs Disability Programs Family Planning/Reproductive Health (U.S. Agency for International Development) House Democracy Partnership Organization of American States Polio Reconciliation Programs Trade Capacity Building 1,900,000 9,000,000 7,500,000 12,000,000 10,000,000 Nonmandatory requirement detailed in law: “Of the funds appropriated by this Act under the heading ‘Economic Support Fund,’ up to $112,500,000 may be made available for assistance for Egypt, of which not less than $35,000,000 should be made available for higher education programs including not less than $10,000,000 for scholarships for Egyptian students with high financial need to attend not-for-profit institutions of higher education.” Nonmandatory directive detailed in the joint explanatory statement: “The State Department Secretary and U.S. Agency for International Development Administrator are directed to provide no assistance to the central Government of the People’s Republic of China under Global Health Programs, Development Assistance, and Economic Support Fund, except for assistance to detect, prevent, and treat infectious diseases.” In addition, requirements and directives can be specific to a country or organization, specific to a sector, or be cross-cutting such that they may be applicable across multiple countries and accounts—as the examples above demonstrate. State submitted Section 653(a) reports that provided mandated data notifications on how foreign assistance funds are allocated by country and account; however, State did not submit the reports within the mandated time frame during fiscal years 2015 through 2018. During the years covered in our review, State’s Section 653(a) reports provided information to Congress on the tens of billions of dollars for foreign assistance accounts specified in the annual appropriations act. In addition to detailing the category of assistance by account, the Section 653(a) reports further delineated funding by the countries and international organizations to which the foreign assistance was directed. State also included supplemental spreadsheets with the reports that outlined how the various requirements and directives in the annual appropriations act were to be addressed. In fiscal years 2015 through 2018, State submitted Section 653(a) reports an average of 169 days after the enactment of the annual appropriations act (or 139 days late). During those 4 fiscal years, State submitted Section 653(a) reports from 80 to 230 days past the 30-day mandated time frame for reporting, as shown in figure 1. During the 4 fiscal years covered by our review, State took the longest amount of time to submit the Section 653(a) report in fiscal year 2015. State officials explained that in fiscal year 2015 and prior years it generally took them longer to submit the report because they first submitted a draft Section 653(a) report to the House and Senate appropriations committees. According to State officials, the appropriations committees’ majority and minority staff then engaged in negotiations with each other and with State on the draft to reach agreement on the final allocation of funds. In addition, the fiscal year 2015 appropriations act allowed State to propose deviations from the requirements in the joint explanatory statement. Thus, the agencies submitted the draft report to the appropriations committees with allocations that, in some cases, varied from the levels Congress included in the tables in the joint explanatory statement. State submitted the draft Section 653(a) report for the fiscal year 2015 appropriations act in April 2015 with the proposed deviations and engaged in a 5-month negotiation process to finalize the allocation of funds in September 2015. According to State, Congress changed the Section 653(a) reporting requirements in the fiscal year 2016 appropriations act to forestall the months-long negotiation process with the appropriations committees that had occurred in prior years. The fiscal year 2016 appropriations act authorized State and USAID to deviate in their allocations by up to 5 percent from the mandated amounts in the tables of the joint explanatory statement. This change allowed State to submit the report in a more timely fashion than in fiscal year 2015. By specifying how much leeway State and USAID were allowed in their allocations, the agencies were able to develop their plans without submitting a draft Section 653(a) report and seeking further agreement from the appropriations committees. As a result, officials submitted the 2016 report in 110 days, compared with 260 days in 2015. We found that delays in submitting the Section 653(a) report were primarily attributable to State’s complex process to address appropriation requirements and directives while also reflecting administration priorities, as well as to data collection weaknesses. Nevertheless, State has not reviewed its process to identify and address such issues and other potential inefficiencies. Absent such a review, State is not in a position to improve its process to meet the 30-day mandate. In fiscal year 2018, State officials noted that reaching agreement on priorities within the new administration and staff vacancies also adversely affected the timeliness of the Section 653(a) report submission. State has a multistep process to provide the mandated Section 653(a) report. Pre-appropriation preparatory work. According to State documentation, the process for responding to Section 653(a) mandates begins with State and USAID developing notional allocation estimates in a spreadsheet before the upcoming fiscal year’s annual appropriations act is passed. Allocation analysis and development. After the act is passed, USAID and State review their allocation estimates against the requirements and directives in the act and adjust their spreadsheet containing allocation estimates as necessary, taking into consideration policy direction from State and USAID leadership. According to State and USAID officials, detailed congressional instructions for particular accounts can limit the agencies’ ability to allocate funds according to the administration’s priorities and to consider country-specific foreign assistance needs. For example, Congress appropriated $876 million in fiscal year 2018 for the Nonproliferation, Anti-Terrorism, Demining, and Related Programs account and included 40 associated requirements and directives. State and USAID officials added that in order to satisfy all the requirements and directives they sometimes have to allocate appropriated amounts to address more than one requirement or directive. For instance, in the fiscal year 2018 Section 653(a) report, some of the funds allocated to meet an appropriation requirement for conventional weapons destruction were also designated as an allocation to satisfy a different requirement for humanitarian demining. Further, some amount of those funds satisfied a more specific requirement for humanitarian demining in Laos. State officials noted that by allocating appropriated amounts to more than one requirement or directive, they have greater flexibility to address administration priorities, while also meeting congressional instructions. Allocation negotiation, review, and agreement. State and USAID ensure that input from all the various parties is taken into consideration when further developing allocations. About 200 State and USAID bureaus and overseas posts review the allocations and propose changes in their copies of the spreadsheet that are then returned to State’s Office of U.S. Foreign Assistance Resources. According to State and USAID officials, they consider the proposed changes in light of emerging issues in selected foreign countries that may lead to the redirection of or changes to the proposed allocation of funds. State and USAID also review the proposed changes with agency leadership. OMB review and Section 653(a) report finalization and transmission. Once State and USAID agree on changes to the allocations, State submits the Section 653(a) report to OMB to be reviewed against the policy direction of the Executive Office of the President. State officials indicated that OMB feedback must be resolved before finalizing allocations. Concurrent with OMB’s review, State begins the process of finalizing allocation levels. Once State and USAID’s allocations are complete, State provides final allocation levels to bureaus and overseas posts and submits the Section 653(a) report to the relevant appropriations subcommittees. Given its complexity, State’s process is not designed to meet the mandated 30-day time frame. For example, in fiscal year 2018, State planned to complete the Section 653(a) process in 85 days. Figure 2 below outlines the stages of the Section 653(a) report development process and the targeted number of days for each stage during fiscal year 2018. The data developed for the Section 653(a) report plays a critical role in the obligation of tens of billions of dollars in foreign assistance funds appropriated annually. According to State and USAID officials, the agencies are constrained from obligating funds until the report is completed because a number of pre-obligation requirements are based on allocations in the Section 653(a) report. While the submission of the Section 653(a) report does not legally affect State’s ability to obligate foreign assistance funds, according to State and USAID officials, consultations, spend plans, and congressional notifications cannot be completed until allocation amounts are finalized through the Section 653(a) process. As a result, State and USAID officials said the amount of time it takes to submit the Section 653(a) report affects the obligation of funds. State officials indicated that their process for collecting appropriations- related feedback and information from various offices, bureaus, and overseas posts necessitates significant staff time to correct data entry errors. Throughout the Section 653(a) process, State officials use a spreadsheet to consolidate information. For example, after State develops its initial allocations in the spreadsheet, it sends the spreadsheet out to about 200 bureaus and overseas posts to review and make appeals related to account and country allocations, which State and USAID then take into consideration as they continue to modify the allocations. According to State officials, reviewing suggested changes to allocations from about 200 bureaus and overseas posts is time consuming. This process is further complicated when they sometimes find mistakes in the returned spreadsheets, such as incorrect formulas and currency formats. Occasionally, returned spreadsheets also include additional data columns that were not in the original documents. Such discrepancies make it difficult to merge and process all of the suggested changes and identify how the changes interact with the various requirements and directives. State officials said that these discrepancies occur because they do not have controls in place to prevent modification of the spreadsheet. For example, the formulas and format of the spreadsheet can be manipulated by the various individuals reviewing the document. In addition, the spreadsheet does not automatically verify that the changes proposed by the bureaus and overseas posts comply with the requirements and directives. Instead, officials have to individually compare the changes with the requirements and directives and ensure that they are in compliance. State officials indicated that it takes them time and resources to discover and correct the errors, merge all of the spreadsheets, and ensure compliance, which contributes to delays in developing the Section 653(a) report. According to State’s Foreign Affairs Manual, State must maintain effective systems of management control that are designed to provide reasonable assurance regarding the prevention of or prompt detection of errors and irregularities. State officials indicated that while they do correct errors and validate the data in the Section 653(a) report for accuracy before final submission, it takes time and resources to do so, which adds to the total amount of time it takes to produce the report. Given the individual account and country allocations, and number of stakeholders involved in providing feedback, State officials acknowledged that their spreadsheet-based system is inadequate for the complexity of the task. State officials said that their existing data information system—the Foreign Assistance Coordination and Tracking System Info Next Generation—could potentially be modified to automate the distribution and collection of appropriations-related feedback from their offices and overseas posts, as well as to ensure that the changes comply with the annual appropriations act’s requirements and directives. Currently, State uses this system during the last phase of the Section 653(a) process to input the final allocations and share the Section 653(a) report with bureaus and overseas posts and the appropriations committees. While State officials said that they are exploring options to improve this process, they have not yet decided how to address weaknesses in their data collection system. State officials said that the Section 653(a) process that they developed is necessary to address congressional instructions and administration priorities and because they use the allocations in the report as a basis for spend plans required for the obligation of funds. Federal standards for internal control state that management should set objectives to meet the requirements of applicable laws and regulations. State officials noted that it might be possible to meet the 30-day mandate but that doing so would be inefficient because the subsequent report would need major revisions before finalizing allocations. According to officials, that alternative process, while it would meet the 30-day mandate, would be likely to further delay the development of spend plans and obligation of funds. State officials told us that they have informally suggested to the congressional appropriations committees that the mandated time frame for delivering the report should be extended, but they said they have not formally requested that Congress amend the 30-day reporting mandate. State officials said that they would also need to engage in conversations with authorizing committees responsible for making changes to the reporting mandate in the Foreign Assistance Act. GAO’s guidance on business process reengineering states that agencies should model their processes to identify problem areas and non–value- added activities that need to be changed or eliminated, such as excessive reviews. State officials said that, while they have made adjustments to improve their Section 653(a) process, they have not conducted a systematic review of their process since it changed in fiscal year 2016. Such a review could identify changes to expedite the completion and submission of the mandated report. Given that State’s process is not designed to meet the Section 653(a) 30-day reporting mandate, absent changes to its processes or Section 653(a), State is unlikely to meet the 30-day reporting mandate in the future. According to State officials, reaching agreement on administration priorities affected the timeliness of their Section 653(a) report in fiscal year 2018. The current Secretary of State and USAID Administrator both had their first experience with the Section 653(a) process during fiscal year 2018, which led to more detailed review within both agencies than in previous years, according to State officials. In addition, State officials said that USAID recommended unanticipated and significant changes to the proposed allocations before OMB’s review. USAID officials said that significant changes were necessary since USAID disagreed with the allocations State proposed for USAID’s appropriations within the Global Health Programs, Development Assistance, and the Economic Support Fund accounts. In fiscal year 2018, it took State and USAID 110 days to complete the allocation negotiation, review, and agreement step of the Section 653(a) process. According to State and USAID officials, they used 46 of the 110 days to reach agreement on the changes that USAID proposed. OMB officials noted that they needed to resolve policy issues concerning the administration’s foreign assistance priorities, which also contributed to delays. Once State sent the report to OMB in August 2018, OMB officials said that they approved the report after 36 days. In previous years, OMB officials explained that they usually approved the report within 15 days. However, they said that they were working to resolve a policy issue with other offices in the Executive Office of the President, and were therefore delayed in approving the fiscal year 2018 report. In total, it took State and USAID 189 days to produce the Section 653(a) report in fiscal year 2018. In fiscal year 2018, State planned to complete the Section 653(a) process in about 85 days after the enactment of the appropriations act—which exceeds the 30-day reporting, as shown in figure 3. In 2018, staffing gaps in State’s Office of U.S. Foreign Assistance Resources also affected the development of the Section 653(a) report. State’s Office of U.S. Foreign Assistance Resources is staffed by State and USAID-funded personnel and provides supervision and direction of State and USAID’s foreign assistance funding and programs. While the development of the Section 653(a) report is a critical task for the Office of U.S. Foreign Assistance Resources, the office and its staff are also responsible for developing a U.S. foreign assistance strategy, annual country-specific assistance operational plans, consolidated strategic and program plans, and operational budgets. State’s Office of U.S. Foreign Assistance includes two subordinate offices involved in developing the Section 653(a) report, both of which had vacancies in 2018. Within the Office of U.S. Foreign Assistance, the Resources and Appropriations office has primary responsibility for reviewing and identifying the Section 653(a) requirements and directives, but in 2018, five of 13 full-time equivalent positions, or 38 percent, were vacant. In addition, 10 of 41 full-time equivalent positions within the Regional and Global Affairs office, or 24 percent, were vacant. This office provides geographic and functional expertise to help develop and adjudicate allocations for the report. According to State officials, these vacant positions affected the timeliness of the Section 653(a) report in 2018 because the staff in both these offices assist with developing the report throughout the Section 653(a) process. As previously shown in figure 3, most of the delays in the fiscal year 2018 process occurred during the allocation negotiation, review, and agreement phase—which relies heavily on officials from the offices experiencing staffing gaps. According to State officials, the staff shortfall affecting the development of the fiscal year 2018 Section 653(a) report was due to the State hiring freeze that affected the entire agency, as well as vacancies among USAID personnel assigned to State’s Office of U.S. Foreign Assistance Resources. State’s hiring freeze took effect in January 2017 and was lifted in May 2018. In addition, State officials said that USAID has not filled USAID-funded vacancies within State’s Office of U.S. Foreign Assistance Resources. In fiscal year 2018, nine of the 13 full-time equivalent positions in State’s Resources and Appropriations office were funded by USAID, of which four were vacant, and 21 of the 41 full-time positions in Regional and Global Affairs office were funded by USAID, of which six were vacant. Our 2019 High-Risk Series report calls for agencies to design and implement action plans for closing skills gaps, which can include when an agency has an insufficient number of people to complete its work. The report states that the action plan should define the root cause of all skills gaps within an agency and provide suggested corrective measures, including steps necessary to implement solutions. State officials said that they have received permission to fill the vacant State positions, and USAID has provided permission to advertise two vacant USAID positions within State’s Office of U.S. Foreign Assistance Resources. Thus, that office is requesting additional State full-time equivalent positions. Despite these efforts, State and USAID officials said that they do not have an action plan to address the vacancies. Without a plan to fill these vacancies, a lack of staff resources will likely continue to impact the timeliness of the Section 653(a) reports. Congress appropriates tens of billions of dollars for foreign assistance annually and mandates the President to report to Congress on how the U.S. government will allocate funds for foreign countries, by category of assistance, within 30 days of the enactment of the annual appropriations act. State and USAID have developed a complex process to balance how their allocations will meet the detailed requirements and directives within the annual appropriations acts, the administration’s priorities, and country-specific foreign assistance needs. However, State has been unable to meet the mandated time frame for submitting the Section 653(a) report for various reasons. Most importantly, State’s process for completing the various phases of the Section 653(a) process is not designed to meet the mandated 30-day deadline. Moreover, State officials have not systematically reviewed their process since it changed in fiscal year 2016, to identify areas that can be streamlined or eliminated to expedite the completion and submission of the report. Additionally, State’s system for collecting input on foreign assistance allocations from its various offices, bureaus, and overseas posts is prone to data entry errors that take extra time to correct, contributing to delays in submitting the Section 653(a) report. Further, State’s two offices primarily responsible for managing the Section 653(a) process had a substantial number of positions vacant in 2018 but did not have a formal plan to address the resulting skills gaps. Absent addressing these challenges, State and USAID will likely continue to be in violation of their legal mandate for submitting Section 653(a) reports to Congress within 30 days after the annual appropriations act is enacted. We are making a total of three recommendations to State. The Secretary of State should ensure that the Director of State’s Office of U.S. Foreign Assistance Resources conducts a review of the Section 653(a) process to identify process steps that can be streamlined or eliminated and determine the time frame needed to prepare the annual Section 653(a) report. If State determines that the time frame exceeds 30 days, the office should coordinate with other appropriate officials to submit a legislative proposal to Congress to extend the mandated time frame for submitting Section 653(a) reports. (Recommendation 1) The Secretary of State should ensure that the Director of State’s Office of U.S. Foreign Assistance Resources improves the data collection from the many sources contributing to the Section 653(a) reports, such as by enhancing their data information systems. (Recommendation 2) The Secretary of State should develop a plan to address vacancies within State’s Office of U.S. Foreign Assistance Resources, consulting with the USAID Administrator as appropriate. (Recommendation 3) We provided a draft of this report to State, USAID, and OMB for review and comment. State and USAID provided written comments about the draft, which are reprinted in appendix II and appendix III, respectively. State also provided technical comments about the draft report, which we incorporated as appropriate. OMB did not provide comments on the draft report. State concurred with our three recommendations. USAID concurred with our first two recommendations; however, USAID’s written comments indicate that they do not believe staffing shortages at State were responsible for the chronic delays in the submission of the Section 653(a) report. While we do not report that staffing gaps were the primary reason for State not meeting reporting deadlines, we did find them to be a contributing factor to the delays in fiscal year 2018. State officials indicated that staffing gaps in their Office of U.S. Foreign Assistance Resources affected the development of the Section 653(a) report, contributing to delays. We are sending copies of this report to the appropriate congressional committees, the Secretary of State, the Administrator of USAID, the Acting Director of OMB, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6881 or bairj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the extent to which the Department of State (State) met the data notification and timeliness mandates under Section 653(a) of the Foreign Assistance Act of 1961 (Foreign Assistance Act) for fiscal years 2015 through 2018, and (2) the factors that affected State’s ability to address Section 653(a) mandates for fiscal years 2015 through 2018. To examine the extent to which State has met the data notification and timeliness mandates under Section 653(a) of the Foreign Assistance Act, we reviewed State’s Section 653(a) reports for fiscal years 2015 through 2018 to assess whether they documented the amounts of U.S. foreign assistance to be provided to each foreign country and international organization, as well as the amounts provided by category of assistance. To determine the timeliness associated with the development and submission of State’s Section 653(a) reports for fiscal years 2015 through 2018, we also reviewed documentation to identify when the Department of State, Foreign Operations, and Related Programs Appropriations Acts were enacted, the mandated submission dates, and compared those dates with the dates that State submitted the reports to Congress. We used this information to generate a figure that shows the actual submission time frames for Section 653(a) reports during those years compared with the 30-day reporting mandate. We also interviewed officials from State, the U.S. Agency for International Development (USAID), and the Office of Management and Budget (OMB) to better understand how the agencies address the Section 653(a) mandates. To examine the factors that affected State’s ability to address Section 653(a) mandates for fiscal years 2015 through 2018, we reviewed State and USAID documents. We also interviewed State, USAID, and OMB officials to get their views on what factors, if any, affected the timeliness of the Section 653(a) reports. For those factors that we identified, we requested and analyzed additional information as described below. In reviewing State’s Section 653(a) process, we analyzed State and USAID guidance documents and reports developed to address Section 653(a) mandates. We reviewed State’s analyses that identified the requirements and directives in the annual appropriations acts and joint explanatory statements for fiscal years 2015 through 2018. These requirements and directives outline how the agencies should allocate the funding for programs and for countries and international organizations. In addition, we reviewed State’s and USAID’s guidance documents that outlined the Section 653(a) process. Based on this information, we summarized State’s process and developed a figure that shows the major steps of State’s process, as well as the amount of time that each step lasted during the development of the fiscal year 2018 Section 653(a) report. We assessed State’s process against federal standards for internal control, which state that management sets objectives to meet the requirements of applicable laws and regulations. We also assessed the process against GAO’s guidance on business process reengineering, which outlines best practices on how agencies should model their processes. To examine the quality of the data State collects during development of the Section 653(a) reports, we reviewed whether State’s analyses followed State’s Foreign Affairs Manual requirement that State must maintain effective systems of management control programs designed to provide reasonable assurance regarding the prevention of or prompt detection of errors and irregularities. We analyzed State’s reports on the requirements and directives in the annual appropriations acts from fiscal year 2015 through 2018. In addition, we validated a judgmental sample of the requirements and directives that State identified to ensure that they were in the applicable appropriations act, joint explanatory statement, and reports from the appropriations committees in the Senate and House of Representatives. Although we identified an error in the appropriated amount recorded for the fiscal year 2016 International Narcotics Control and Law Enforcement account, we did not find errors specific to the requirements and directives State identified. Therefore, we concluded that the analyses were sufficiently reliable for our purpose, and we used State’s analyses to determine the total number of requirements and directives. Moreover, we reviewed the fiscal year 2015 through 2018 appropriations acts to identify the amounts appropriated for the accounts included in the corresponding Section 653(a) reports. We also identified the purpose and the time frame during which the appropriations for each account were available for obligation in the fiscal year 2018 appropriations act. To examine the issue of staff vacancies in fiscal year 2018, we received data from State and USAID on staff vacancies in key offices involved in the development and submission of the Section 653(a) report. In addition, we interviewed State and USAID officials about vacancies and whether they had developed plans to address the vacancies. We assessed whether State had designed and implemented action plans for closing skills gaps, which could include gaps caused by having an insufficient number of people to complete its work—as described in our 2019 High- Risk Series report. We conducted this performance audit from December 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate, evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Thomas Costa (Assistant Director), Mason Thorpe Calhoun (Analyst in Charge), Katya E. Rodriguez, Ashley Alley, Faisal Amin, David Dayton, Neil Doherty, Justin Fisher, and Melissa Wolf made key contributions to this report.", "summary": "State and USAID were responsible for managing $33.7 billion in foreign assistance funds in fiscal year 2018. Section 653(a) of the Foreign Assistance Act of 1961 mandates the President to report to Congress, on an annual basis, funding allocations by foreign country and category of assistance within 30 days of Congress appropriating certain funds. State, in coordination with USAID, makes decisions on how to allocate the funds, taking into consideration congressional instructions, the administration's priorities, and country-specific foreign assistance needs. GAO was asked to review State and USAID's process to respond to Section 653(a). This report examines (1) the extent to which State met the mandates under Section 653(a) for fiscal years 2015 through 2018 and (2) factors that affected State's ability to address the mandates. GAO reviewed annual appropriations acts and Section 653(a) reports submitted during fiscal years 2015–2018, and met with State, USAID, and Office of Management and Budget officials in Washington, D.C. The Department of State (State), through its Section 653(a) report, has provided Congress with information on the allocation of U.S. foreign assistance funds to foreign countries and international organizations by category of assistance as mandated, but the reports were not submitted within the mandated time frame. Specifically, in fiscal years 2015 through 2018, State submitted Section 653(a) reports from 80 to 230 days past the 30-day mandate, as shown in the figure. Multiple factors contributed to delays in submitting the Section 653(a) report. First, State has developed a multistep process for responding to hundreds of congressional instructions each year, while also reflecting administration priorities, which is not designed to meet the mandated time frame. This process involves coordination with the U.S. Agency for International Development (USAID), about 200 bureaus and overseas posts, and the Office of Management and Budget. Even though State's process is complex and does not meet the mandated time frame, State has not systematically reviewed its process since it revised the process in fiscal year 2016. State officials said that the process is necessary to address congressional instructions and administration priorities and because they use the allocations in the report as a basis for spend plans required to obligate funds. Second, a key part of State's process, involving data collection, has weaknesses that lead to discrepancies and hinder efficiency. According to federal internal control standards, agency data systems should provide quality data that is free from errors. However, State's mechanism for collecting information is a spreadsheet-based system susceptible to human errors, and State does not have appropriate controls in place to ensure data consistency. Third, in fiscal year 2018, staffing gaps also affected the development of the Section 653(a) report. State's two offices primarily responsible for managing the Section 653(a) process had 15 of 54 full-time equivalent positions vacant, which contributed to delays in submitting the Section 653(a) report, according to State officials. GAO has identified the filling of staffing gaps as a high-risk area that agencies should address. Unless State and USAID take steps to address these factors, they will continue to face challenges meeting their Section 653(a) requirements within the currently mandated time frame. GAO is making three recommendations to State: (1) conduct a systematic review of the Section 653(a) process to identify inefficiencies and determine the amount of time needed to prepare the Section 653(a) report, and if it exceeds 30 days, request that Congress extend the mandated time frame; (2) improve data collection; and (3) develop a plan to address staff vacancies, in consultation with USAID as appropriate. State concurred with these recommendations.", "document_type": "gao"}
{"report": "Congress passed TRIA in 2002 to address some of the challenges the insurance industry and businesses faced after the September 11 terrorist attacks. For example, after the attacks, insurers left the market, excluded terrorism risk coverage from policies, or steeply increased premiums. The Real Estate Roundtable reported in 2002 that nearly $16 billion of real estate projects in 17 states were stalled or cancelled because of the lack of coverage for terrorism risk (because many businesses are required to have coverage for terrorism risk as a condition for a mortgage loan). The purpose of TRIA is to (1) protect consumers by addressing market disruptions and ensuring the continued widespread availability and affordability of commercial property/casualty insurance for terrorism risk; and (2) allow for a transitional period for private markets to stabilize, resume pricing of such insurance, and build capacity to absorb any future losses, while preserving state insurance regulation and consumer protections. By law, an insurer’s coverage for terrorism losses must not differ materially from the terms, amounts, and other coverage limitations applicable to losses arising from other events. For example, an insurer offering $100 million in commercial property coverage also must offer $100 million in commercial property coverage for certified acts of terrorism. Insurers may charge a separate premium to cover their terrorism risk. TRIA requires insurers to make terrorism coverage on certain lines of property/casualty insurance (such as coverage for fire, workers compensation, and liability) available to commercial policyholders (such as businesses), although TRIA does not require commercial policyholders to buy it. The federal government does not collect an up-front charge from insurers for the government’s coverage of terrorism risk under TRIA. In a 2019 report, we noted that the federal government has multiple programs that can provide compensation to specific third parties if they suffer certain losses from future adverse events, and the federal government may not always charge premiums for accepting this risk of loss. However, under TRIA, the government must recoup at least some of its losses following a certified act of terrorism, as discussed below. TRIA has not caused financial liabilities to the federal government, but it could require large, previously unbudgeted expenditures by the federal government if an event occurred. For insurers to start submitting claims and receiving payments to cover terrorism losses, Treasury must first certify an event as an act of terrorism under TRIA. Certification requires the Secretary of the Treasury to evaluate the event based on two criteria: 1. Did the event meet the nonmonetary definition established under TRIA? Defining an event as an act of terrorism includes determining whether it was “committed by an individual or individuals as part of an effort to coerce the civilian population of the United States or to influence the policy or affect the conduct of the United States Government by coercion.” It also includes determining whether it was a “violent act or an act that is dangerous” to human life, property, or infrastructure, and whether it resulted in damage within the United States or certain areas outside the United States. As part of this determination, the Secretary of the Treasury must consult with the Attorney General and Secretary of the Department of Homeland Security before certifying an event. 2. Did the event cause at least $5 million in insurance losses in TRIA-eligible lines? TRIA prohibits the Secretary of the Treasury from certifying acts of terrorism unless insurance losses exceed this threshold. In 2004 Treasury issued regulations to implement TRIA’s procedures for filing insurer claims for payment of the federal share of compensation for insured losses. Within 7 days after certification of an act of terrorism, a Treasury contractor is to activate a web-based system for receiving claims from insurers and responding to insurers that seek assistance. The Terrorism Risk Insurance Program provides for shared public and private compensation for insured losses resulting from certified acts of terrorism. Under the current program, if an event were to be certified as an act of terrorism and insured losses exceeded $200 million, an individual insurer that experienced losses first would have to satisfy a deductible before receiving federal coverage. An insurer’s deductible under TRIA is 20 percent of its previous year’s direct earned premiums in TRIA-eligible lines. After the insurer pays its deductible, the federal government would reimburse the insurer for 80 percent of its additional losses and the insurer would be responsible for the remaining 20 percent. Annual coverage for losses is capped––neither private insurers nor the federal government cover aggregate industry insured losses in excess of $100 billion. After an act of terrorism is certified and once claims are paid, TRIA requires Treasury to recoup part of the federal share of losses in some instances. Under this provision, when insurers’ uncompensated insured losses are less than a certain amount (up to $41 billion for 2020), Treasury must impose policyholder premium surcharges on commercial property/casualty insurance policies until total industry payments reach 140 percent of any mandatory recoupment amount. When the amount of federal assistance exceeds this mandatory recoupment amount, TRIA allows for discretionary recoupment. Prior TRIA reauthorizations decreased federal responsibility for losses and increased private-sector responsibility for losses, but the 2019 reauthorization of TRIA made few changes to the program. For instance, the 2015 reauthorization required incremental decreases in the federal share of losses over 5 years (to 2020). The 2019 reauthorization extended the program to December 31, 2027 and proportionately adjusted the dates by which the Secretary must recoup policyholder surcharges to the new reauthorized time frame, but it did not change the federal share of losses. TRIA covers insured losses in eligible lines that result from a certified act of terrorism (see table 1). Many lines of commercial property/casualty insurance are eligible for TRIA, such as workers’ compensation, fire, and commercial multiple peril (multiperil) lines. States generally require that workers’ compensation insurance covers terrorism risk and do not permit exclusions, including for terrorism, according to Treasury. Workers’ compensation covers an employer’s liability for medical care and physical rehabilitation of injured workers and helps to replace these workers’ lost wages. TRIA also excludes certain lines (such as personal property and casualty insurance and health and life insurance). Terrorism coverage typically is embedded in all-risk property policies but also may be available in stand-alone policies, according to Treasury: Embedded. Most policyholders have terrorism risk insurance coverage embedded in a policy that covers other risks. Embedded policies are subject to TRIA’s “make available” requirements. In the event of a certified act of terrorism, policyholders would be covered if they have not declined terrorism coverage. Stand-alone. Stand-alone terrorism policies provide coverage only for terrorism risks. Insurers may provide stand-alone terrorism coverage through “certified” policies that are subject to TRIA terms and conditions and provide coverage only in the event of a certified act of terrorism. Alternatively, insurers may provide terrorism coverage through “noncertified” policies that do not meet TRIA terms and conditions. Such noncertified policies cover terrorism-related losses regardless of whether Treasury certifies an event, but losses paid by insurers would not be eligible for reimbursement under TRIA. Nonconventional terrorism risks generally include nuclear, biological, chemical, or radiological (NBCR) weapons, as well as cyber risks. Predicting losses associated with nonconventional risks can be particularly challenging because of the difficulty in predicting terrorists’ intentions and the potentially catastrophic losses that could result. TRIA is silent on NBCR and cyber risks, but Treasury has clarified how these nonconventional risks are covered under TRIA. In 2004, Treasury issued an interpretive letter clarifying that the act’s definition of insured loss does not exclude losses resulting from nuclear, biological, or chemical attacks, and does not preclude Treasury from certifying a terrorist attack involving such weapons. According to Treasury’s interpretive letter, the program covers insured losses from NBCR events resulting from a certified act of terrorism. However, for TRIA provisions to apply, insurers must provide coverage for those perils. Most insurers are not required to provide NBCR coverage and generally have attempted to limit their exposure to NBCR risks by largely excluding NBCR events from property and casualty coverage. In December 2016, Treasury issued guidance clarifying that, to the extent that insurers write cyber insurance in TRIA-eligible lines, the TRIA provisions apply. We further discuss Treasury’s guidance on cyber risk later in this report. TRIA authorizes Treasury to administer the Terrorism Risk Insurance Program. The Secretary of the Treasury administers the program with the assistance of Treasury’s Federal Insurance Office, according to Treasury officials. TRIA requires Treasury to conduct a biennial study of the effectiveness of the program. The 2015 TRIA reauthorization added a requirement that insurers submit information to Treasury about the coverage they write for terrorism risk, including the lines of insurance with exposure to such risk, the premiums earned on such coverage, and the participation rate for such coverage. The 2019 reauthorization added a requirement that Treasury report on the availability and affordability of terrorism risk insurance, including an analysis specifically for places of worship. Since 2016, Treasury has completed annual assessments of the program, including a report on the effectiveness of the program in June 2018. Treasury’s reports focused specifically on small insurers in June 2017 and June 2019. Treasury conducts an annual data call to collect information for the required studies and for purposes of analysis and program administration. Participation in the data call is mandatory for all insurers that write commercial property and casualty policies in lines of insurance subject to TRIA, subject to two exceptions. Treasury collects data separately for the following four groups of insurers: Small insurers have both a policyholder surplus and prior-year TRIA- eligible direct earned premium of less than five times the program trigger. Nonsmall insurers have policyholder surplus or the specified premiums above the small threshold and are not classified as captive or alien surplus line insurers. Captive insurers are special-purpose insurance companies set up by commercial businesses to self-insure risks arising from the owners’ business activities. Alien surplus lines insurers are foreign insurers that are qualified to do business in the United States through a process administered by NAIC. The market for terrorism risk insurance has been stable in recent years, with coverage both available and generally affordable. According to our reviews of policy language, reports from and interviews with Treasury, researchers, insurers, and other industry stakeholders, the expiration of TRIA and the absence of an alternative backstop to terrorism risk insurance would cause disruptions to the market. Reports from Treasury and an industry risk-management firm generally suggest there has been a stable market for terrorism risk insurance in recent years, with the coverage available and generally affordable in the United States. According to Treasury’s reports analyzing industry data, the majority of commercial policyholders in the United States purchase terrorism risk insurance, and at a relatively small percentage of total premiums. The market for terrorism risk insurance in the United States continues to remain competitive for most buyers according to 2018 and 2019 reports by Marsh, an insurance risk-management firm. Marsh attributed the competitive market for buyers to a steady decline in the frequency of global terrorist incidents and minimal insurance claims. Since all insurers must offer terrorism risk insurance, the availability of such coverage can be measured in terms of take-up rates—the rates at which policyholders select terrorism risk insurance. These rates have remained stable in recent years, according to Treasury. However, take-up rates vary by line of insurance, industry sector of the policyholder, geographic location, and type of insurer writing the policies. Terrorism risk coverage is considered available when insurers offer coverage for losses resulting from a terrorism event, and take-up rates are an indication of how insurers are complying with TRIA’s “make available” requirement, according to Treasury. Treasury found take-up rates by insurer category ranged from 62 to 78 percent in its 2018 report, depending on how the rates were measured. According to Marsh’s 2019 report, the take-up rate for terrorism coverage embedded in policies that cover other risks has been around 60 percent for the past several years. Lines of insurance. According to Treasury’s 2018 report, take-up rates across lines of insurance ranged from 43 percent in the products liability line to 83 percent in the boiler and machinery line in 2017, as measured by direct earned premium (see fig. 1). The take-up rate for cyber insurance coverage is in the middle of the range, relative to other lines of coverage. Specifically, the take-up rate in 2018 for terrorism risk insurance under cyber policies (by TRIA-eligible direct earned premium) was 69 percent for stand-alone policies, up from 50 percent in 2017, as reported by Treasury. For coverage that is part of an embedded policy, the 2018 rate was 63 percent, up from 54 percent in the prior year. Industry sectors. Take-up rates across the industry sectors of the policyholders varied widely and ranged from 7 percent in the information sector to 76 percent in the finance and insurance sector in 2017, according to Treasury’s 2018 report (see fig. 2). Marsh found in its 2019 report that commercial policyholders in the education, media, financial, and real estate sectors were the most frequent buyers of terrorism risk insurance in 2018. Geographic location. Take-up rates varied by location, with the highest rates in the Northeast. In Treasury’s 2018 report, the rates ranged from 50 to 75 percent by state (see fig. 3). In its 2018 report, Marsh noted that the Northeast had both the highest rate of purchase and the most expensive coverage, and said that these trends were because of the presence of major metropolitan areas (such as New York and Boston) that have high-value targets for terrorism. According to Treasury’s 2018 report, premiums associated with terrorism coverage have remained relatively consistent in recent years and are a small part of overall premiums for embedded policies. According to that report, about 80 percent of the market (as measured by terrorism risk direct earned premium) comprises embedded policies and 20 percent stand-alone policies, and the price for each varies. Premiums for terrorism risk insurance embedded in a property/casualty policy are priced at a relatively small percentage of the total premium charged for the policy and typically range from 2.5 to 3.0 percent when a charge is made. In about 30 percent of policies, insurers do not charge for providing terrorism risk coverage. Stand-alone policies vary significantly in terms of cost because of differences in the relative size or nature of exposures covered under each policy, whether the policy was certified, and the type of insurer providing the coverage, according to Treasury’s data. Premiums also varied across lines covered and insurer types, with the most premium collected for workers’ compensation. According to Treasury’s 2018 report, about 36 percent of the total premium collected in TRIA-eligible insurance lines was for workers’ compensation. In stand- alone cyber policies an average 6.2 percent of the total premium was allocated to terrorism risk. See table 2 for more information on how premiums vary across lines of coverage. Trends for small and captive insurers in many instances are different from trends for nonsmall insurers. Small insurers. Total market share for small insurers within TRIA-eligible lines of coverage declined, relative to nonsmall insurers, over the past decade. The small insurer market share, as measured by direct earned premium, fell from 18.6 percent in 2009 to 12.6 percent in 2018. (Despite that overall decline, there was an increase from 2016 to 2018 as more insurers were defined as small because of the increased dollar amount of the program trigger). In addition, take-up rates tended to be lower for policies written by small insurers, compared to nonsmall insurers, both within most individual lines and across the overall market. Small insurers generally charged less premium for terrorism risk insurance overall than nonsmall insurers, although they may charge proportionally higher premiums in some lines of insurance, such as commercial multiple peril (liability). According to Treasury’s 2019 report, small insurers allocated a lower percentage of direct earned premium for terrorism risk than nonsmall insurers. Furthermore, small insurers also were more likely to offer terrorism risk insurance for free. In addition, small insurers earned a higher percentage of their total program direct earned premium in commercial multiple peril and workers’ compensation lines than did nonsmall insurers. The workers’ compensation market is subject to very high loss amounts with no defined limits of liability and significant potential aggregation risks. Captive insurers. Like small insurers, captive insurers often have premiums that are small, relative to other insurer categories. However, captive insurers generally can offer broader coverage than commercial policies, according to Marsh’s 2019 report. The report states that a captive insurer often offers policies that cost less than policies from commercial insurers, which also often restrict coverage for NBCR or cyber events. In addition, according to Treasury a highly concentrated event affecting only captive insurers (or small insurers) carries a higher likelihood that the affected insurers’ losses would not meet the program trigger, and therefore would not be reimbursed under the program. In this case, captive insurers could incur significant losses. There could be significant disruptions to the insurance market if no federal terrorism risk insurance program existed, according to our reviews of policy language, reports from and interviews with Treasury, researchers, insurers, and other industry stakeholders. As Marsh noted in its 2019 report, TRIA’s federal backstop remains crucial to the continued stability of the terrorism risk insurance market. In its 2018 report, Treasury concluded that TRIA had made the coverage available and affordable, supporting a relatively stable market over the past decade. According to NAIC, TRIA helps foster the existence of a broader market for risks that otherwise would be either largely uninsured or borne by taxpayers. In the absence of a loss-sharing program, insurers likely would limit coverage, exit certain markets, or attempt to increase capacity, according to our review of reports from the federal government, researchers, industry entities, and interviews with industry stakeholders. For example: Limiting coverage. Most insurers begin the process to limit their coverage more than a year before any TRIA expiration by filing conditional exclusions, which, in effect, limits terrorism risk coverage in the event TRIA expired. According to one industry association, insurers have filed conditional exclusions before each of TRIA’s reauthorizations, although they are not commonly used for policies more than a year away from a potential expiration of the law. Our analysis of several policy endorsements filed with conditional exclusions suggests that, in the event of TRIA’s expiration, insurers likely would limit the total losses associated with an attack, and exclude certain types of terrorist attacks. We reviewed a nongeneralizable sample of conditional exclusions provided by the Insurance Services Office, which representatives say are widely used in the industry, and several selected conditional exclusions from individual insurers. These policies suggest that insurers filing conditional exclusions cap coverage for losses associated with an attack at $25 million, and entirely exclude losses caused by NBCR weapons. One policyholder association said that TRIA’s potential expiration and the need to file conditional exclusions results in a chaotic process, with insurers needing to file exclusions in each state in which they operated. Exiting markets. In the absence of a loss-sharing program, some insurers likely would exit certain markets, no longer offering terrorism coverage in specific geographic locations or lines of insurance, according to federal and industry reports and interviews with stakeholders. Small and midsize insurers in particular may withdraw from providing terrorism risk coverage entirely, according to one industry association. Furthermore, insurers providing NBCR or workers’ compensation coverage may decide to limit the policy terms or stop providing coverage, because of the risk of increased losses and potential exposures, according to Treasury. In addition, workers’ compensation risks are greater in large, metropolitan, more densely populated areas, and there are higher aggregation risks for insurers in large metropolitan areas, particularly for events involving NBCR weapons. Small insurers tend to operate on a regional basis in a smaller number of states than nonsmall insurers, and thus have a significant presence in individual local markets, according to Treasury. Options for increasing capacity. Insurers told us that they also likely would increase their premiums and purchase additional reinsurance for terrorism coverage in the absence of a program, although their ability to do so may be limited. One insurer said that premiums likely would go up significantly, although rate increases are subject to state limits. According to another insurer, reinsurance coverage for terrorism risk likely would become more limited, and be provided at notably higher rates. Insurers that are public companies may be able to increase capital through the stock market to build loss-absorbing capacity to help mitigate their increased loss exposures if TRIA expired. However, mutual insurers are not owned by shareholders and therefore cannot raise capital through the sale of shares; instead, they would have to rely on other ways of building capital. Several industry stakeholders pointed to particular challenges for certain insurers and lines of coverage if TRIA expired and Congress did not establish another loss-sharing program. Small insurers. Small insurers may be particularly vulnerable, facing ratings downgrades or otherwise being forced to exit the market for terrorism risk coverage, according to industry stakeholders. In May 2019, AM Best, a credit rating agency that focuses on the insurance industry, said insurers that did not limit exposure to terrorism risk losses before TRIA’s potential expiration in 2020 could face negative ratings pressure. AM Best identified 30 insurers (of about 230 with significant terrorism risk exposure) that failed stress tests, but said in October 2019 that implementation of plans established by these insurers would mitigate concerns about insolvency in the event TRIA expired and a terrorist attack occurred. The 30 insurers generally were small or midsize insurers. Captive insurers. Captives (entities that businesses set up to self- insure) generally require private reinsurance to insure against terrorism risk, and it is unclear if there would be sufficient capacity in the reinsurance market to obtain this coverage without TRIA. Captives tend to insure against a broader range of risks, including NBCR and cyber risks, when that coverage is unavailable or unaffordable in the market. One industry association representing captive insurers noted that captive insurance likely would become a more common way to insure against terrorism risk without a federal loss-sharing program. However, it warned that captive insurers may lack the capacity to ramp up operations quickly enough or secure the necessary reinsurance to fully absorb the risk of increased losses. NBCR coverage. Coverage for terrorism attacks involving NBCR weapons, which is already limited, would be further limited without a federal loss-sharing program, according to industry stakeholders. One industry association of insurance agents said that insurers’ capacity to absorb losses from such an attack would be a challenge without a backstop, as it was during the aftermath of the September 11 attacks, when there was very little capital devoted to coverage for terrorism risk. The representatives said this capacity would be even more limited for an NBCR attack, as losses could be significantly greater and few insurers offer NBCR coverage. Workers’ compensation coverage. The cost of coverage for workers’ compensation likely would increase significantly and availability likely would decrease without a federal loss-sharing program, according to researchers. Insurers have less flexibility to control terrorism exposure in workers’ compensation coverage, relative to other TRIA-eligible lines, according to Treasury. As noted earlier, state laws require employers to have the coverage and prohibit insurers from excluding terrorism risk, including NBCR risks, from workers’ compensation policies, according to Treasury. Insurers might respond to the absence of a federal loss-sharing program by not providing workers’ compensation coverage to employers, particularly those near high-risk targets in major metropolitan areas, according to a 2014 RAND Corporation policy brief issued before TRIA’s 2014 expiration. The brief added that this would force high-risk employers in these areas to obtain the required coverage from the residual market (state-run insurers or mechanisms of last resort), in which premiums are higher. In addition, the absence of a loss-sharing program could disrupt policyholders and the greater economy by stalling new building projects. Some stakeholders noted concerns that new building projects might be stalled if the law expired, similar to concerns in the weeks and months following the September 11 terrorist attacks. At that time, policymakers were concerned that the reduction in coverage by insurers uncertain of future losses would render commercial developers in high-risk areas unable to finance their projects, according to a report by the Congressional Budget Office. An insurance industry association told us businesses might find it difficult to obtain terrorism risk insurance, particularly for high-value projects in cities considered high-risk, such as New York and Washington, D.C. Treasury has a process to certify acts of terrorism. However, industry stakeholders said Treasury does not publicly communicate information about the process and the lack of timely information might negatively affect the speed with which insurers respond to policyholder claims. Additionally, Treasury is to consult with DOJ and DHS but DHS’s understanding of its role during the certification process appears inconsistent with Treasury’s purpose, and no agreements document these roles. Treasury also has a process to pay insurer claims and has issued guidance concerning how cyber insurance is treated under TRIA. Treasury has established a process for certifying an event as an act of terrorism that provides the Secretary a flexible time period for gathering information after an event. Before insurers may submit claims under TRIA, the Secretary must certify an event as an act of terrorism. Congress directed Treasury to study the certification process in the 2015 reauthorization of TRIA, including the establishment of a “reasonable timeline” for a certification determination. In response, Treasury sought and received public comments on the process. Treasury issued its conclusions in an October 2015 report. According to this report, seven of the nine comments received recommended Treasury adopt a timeline governing the certification decision. But Treasury concluded the certification process must provide the Secretary with flexibility to gather information after an event, and thus a “rigid” timeline for certification would not be appropriate. Instead, Treasury concluded that “enhanced public communication” about the status of the Secretary’s assessment of an act may address commenters’ concerns. Treasury established an interim final rule for the certification process in December 2016. Treasury’s process for certification decisions includes an internal review phase and a public review phase before Treasury can make a determination (see fig. 4). Internal review phase. During this phase, Treasury establishes and convenes a certification management team and prepares a brief for the Secretary, according to interviews with agency officials and our review of Treasury documents. Treasury may conclude the internal review of an event without progressing to the public review phase. Public review phase. The public phase of the certification process includes communication requirements set by Treasury’s certification regulations. TRIA regulations direct that within 30 days of the Secretary commencing review of an event, Treasury must publish a notice in the Federal Register informing the public that an act is under review for certification. Treasury also may publish a notice that it is not reviewing an act for certification. The regulation does not establish a timeline by which the Secretary must begin reviewing an event, which leaves the timeline for certification flexible. Treasury’s public announcement that an event is under review begins a series of requirements for public notification and consultation with other agencies, according to TRIA regulations. As of March 2020, Treasury has not conducted the public review phase of its certification process. When the Secretary of the Treasury’s review concludes that an act satisfies the elements of certification, the Secretary then is to consult with the Attorney General and the Secretary of Homeland Security within 30 days, or as soon as practicable. According to our review of Treasury documents, this Secretary-level consultation is to occur immediately before Treasury issues a certification decision. According to interviews with officials and Treasury documents, Treasury engages with staff in specific offices in DHS and DOJ much earlier in the process, during the internal review phase. Coordination with officials in these offices continues throughout both phases of the certification process. For example, Treasury documents state it may hold conferences with DHS and DOJ to discuss factors relevant to making a recommendation to certify an event. No later than 5 business days after the certification determination, Treasury must publish a statement in the Federal Register notifying the public. By contrast, the UK’s terrorism risk insurance program publicly communicates clear timelines by which government entities must certify potential events. The UK Treasury has 21 days to certify an event once the program administrator requests a formal review. This deadline was extended from 10 days in 2015 to allow the police enough time to determine if an event met the definition of terrorism, according to UK Treasury officials. This timeline was chosen to balance providing time for certification with ensuring that businesses would see claims paid quickly. Regular communication with industry stakeholders after an event maintains confidence in the certification process, they said. Treasury’s procedures for certifying an event do not include public communication of its internal review phase. Steps Treasury is to take during this internal review stage include establishing and convening a certification management team and preparing a brief for the Secretary, according to interviews with agency officials and our review of Treasury documents. To date, Treasury has not communicated to industry stakeholders whether it was reviewing events as possible acts of terrorism. Treasury officials told us that after events have occurred, they have looked into the circumstances and the amount of insurance losses caused. These considerations did not progress past the internal review phase of the certification process, which meant Treasury did not publicly communicate that it was reviewing these events for certification. For example, Treasury conducted internal reviews after the Boston Marathon bombing in 2013, but Treasury did not publicly communicate that it was looking into the event or that it had decided not to formally review the event for certification. Treasury ultimately did not certify the event because insured losses from the bombing on TRIA-eligible lines of insurance totaled $2.1 million, which was under the $5 million certification threshold, according to Massachusetts state insurance officials. In interviews and formal public comments on Treasury’s proposed certification rule, some industry stakeholders said the Boston Marathon bombing raised questions about the certification process because they viewed the event as a clear terrorist attack. It was unclear to some industry stakeholders if the event was not certified because it did not reach the monetary loss threshold for certification, which was unknown at the time, or because it did not meet TRIA’s nonmonetary requirement for establishing intent. Insurers and industry stakeholders told us they were uncertain about the length of time Treasury would take after future events to communicate that it was considering certification. All five insurers we interviewed said they would like improved communication from Treasury after an event like the Boston Marathon bombing. Treasury officials said that in response to the Boston Marathon bombing, they documented procedures for certification. However, these procedures do not include steps to communicate publicly during the internal review phase, according to our review of Treasury documents. If a future event analogous to the Boston Marathon bombing were to occur, under Treasury’s current procedures it would not communicate the status of its internal review publicly, and public communication would not occur if it chose to conclude its review before the public review phase began. Implication of Certification of an Act of Terrorism for Terrorism Risk Insurance Act (TRIA) Coverage TRIA is designed to share losses from a certified act of terrorism between insurers and the government. For insurers to receive support from this federal backstop, they must offer insurance for “acts of terrorism” defined in a manner consistent with the law, which requires certification by the Secretary of the Treasury. A certification determination affects policyholders differently, depending on if they purchased or declined terrorism coverage. Specifically, insurers would pay claims from policyholders that purchased terrorism coverage in the event of a certified act of terrorism, whereas insurers would not pay claims from policyholders that declined terrorism coverage. Insurers could face uncertainty about whether to pay claims on both policy types, however, if the Secretary of the Treasury does not make a certification determination. This is because the definition of an act of terrorism in insurance policies for both policy types is often linked to certification. Industry stakeholders and insurers we interviewed said they need to know whether Treasury is considering certifying an event to help provide certainty in paying policyholder claims and receiving reinsurance payments (see sidebar). Policyholder claims. Industry stakeholders and four of five insurers we interviewed said Treasury’s lack of communication about an event’s potential certification can lead to uncertainty about whether to pay claims on policies—both those that include and exclude terrorism coverage. Delays in paying claims while waiting for communication about certification put them at risk of violating their agreements with policyholders and state laws, they said. Insurance policies typically have timeline requirements for the insurer to investigate and pay claims, and some state laws require insurers to pay claims by a certain date, according to NAIC. Treasury officials said state requirements to pay claims by a certain date may receive extensions under state regulation when uncertainty requires that a claim investigation continue. One insurer with which we met said that a statement from Treasury when it was considering an event would help them determine whether to pay claims or not. Reinsurance. Industry stakeholders said uncertainty would delay reinsurance coverage. If insurers delayed paying policyholder claims because of uncertainty about certification of a terrorist attack, reinsurers also might delay payments to insurers. Reinsurance payments are often triggered by the insurer’s payment of a claim to the policyholder. Additionally, some reinsurance contracts may define terrorism specifically as a Treasury-certified act of terrorism, and may be contingent on Treasury making a certification determination. The goals of TRIA are to foster market stability and to protect consumers by addressing market disruptions. In addition, according to federal standards for internal control, management should externally communicate the necessary quality information to achieve the entity’s objectives, including communicating with external parties. Treasury officials said they have not chosen to set a deadline for public communication after a potential terrorist event because they need flexibility to collect accurate information about events whose circumstances can vary widely. In the preamble to its interim final rule on certification, Treasury concluded that public communication about the certification process provides the public with necessary information while avoiding the problems Treasury raised with establishing a strict timeline. However, Treasury’s internal review phase includes no public communication. Additionally, Treasury may conclude its review of an event without progressing to the public review phase and therefore may not issue any public communications on the event. Without public communication about when it is considering certification, Treasury risks contributing to market uncertainty rather than stability after an attack. TRIA requires cabinet-level consultation with DOJ and DHS in the public review phase of the certification process, but Treasury officials also conduct staff-level consultations. Treasury officials consult with DOJ’s National Security Division and DHS’s Support Anti-terrorism by Fostering Effective Technologies (SAFETY) Act office during the internal review phase of the certification process and have identified a single point of contact in each office (see sidebar). Consultation Agencies The Department of the Treasury consults with two other federal offices in the Department of Homeland Security (DHS) and the Department of Justice (DOJ), respectively, that have the following responsibilities: The Support Anti-terrorism by Fostering Effective Technologies (SAFETY) Act Office in DHS provides liability protections to manufacturers and sellers of specified anti-terrorism technologies. The Office of SAFETY Act Implementation reviews if an attack meets the SAFETY Act definition of an act of terrorism and if terrorists use such technology in the course of an attack, according to DHS officials. The Secretary of Homeland Security then determines whether an act has met the size and intent definitions of the SAFETY Act. DOJ’s National Security Division also makes recommendations for the International Terrorism Victim Expense Reimbursement Program, which provides funds to compensate victims of international terrorism occurring outside the United States. The Assistant Attorney General for National Security, in consultation with the National Counterterrorism Center, then determines whether to certify an event for the program, according to DOJ officials. determine whether an event meets TRIA’s definition of an act of terrorism. Such information might include things like who claimed responsibility for the event or evidence of the motivation for the attack. Officials said they provide this information upon request within 24 hours after an event. DOJ officials said the process they use to review events for TRIA purposes is similar to that used for DOJ’s International Terrorism Victim Expense Reimbursement Program. In contrast, DHS officials said their office does not provide information about an event to Treasury for purposes of certification, and that they believed DOJ would have the majority of this information. They said DHS informs Treasury about whether the event is being reviewed for the purposes of the SAFETY Act and whether terrorists used SAFETY Act-qualified technology (see sidebar). DHS officials said this is the information Treasury has requested from them and they consult with Treasury because many applicants for SAFETY Act designations have insurance policies backed by TRIA. Treasury officials stated that that they expect these two DHS and DOJ offices to serve as a single point of contact and coordinate with other relevant offices in their agencies as needed. DOJ officials confirmed they see this as their role, and said they would work with other offices in DOJ, including the Federal Bureau of Investigation, to consult with Treasury on certifying an act of terrorism. However, DHS officials said they do not see this as their role. The Secretary of the Treasury must consider, along with monetary requirements, the nature and motivation behind a potential terrorist attack to determine if it meets TRIA’s definition of an act of terrorism, according to TRIA regulations. Coordination among Treasury, DOJ, and DHS allows the Secretary access to critical and timely information relevant to certification, according to Treasury. In addition, according to federal internal control standards, management should use quality information to achieve the entity’s objectives, which includes identifying information requirements and obtaining relevant data from reliable sources in a timely manner. The standards also state that agencies should use methods such as written documentation to internally and externally communicate the information needed to achieve their objectives. In addition, our 2009 report on disaster planning provides an example of the benefits of clearly defined roles among federal agencies. We reported that defining the roles and responsibilities of stakeholders prior to a disaster could help foster collaboration, and that effective recovery plans should identify specific roles and responsibilities among various stakeholders. However, Treasury has not documented DOJ’s and DHS’s roles in certification consultations and instead relies on informal relationships with agency staff. This may contribute to the different perspectives DHS officials had on their role in the process. Treasury officials said although they do not have a written agreement, each agency understands its obligation to consult with Treasury in light of TRIA’s provisions requiring it. Although each agency told us it understood the certification process, DHS officials and Treasury differed in their understanding of DHS’s role in certification. A documented agreement among the agencies would provide procedures on roles and information sharing to which to refer during the potentially chaotic aftermath of a terrorist attack. As agency staff change over time, documenting these roles and information sharing among Treasury, DOJ, and DHS could help ensure continuity of operations if future events occurred. Furthermore, a written agreement would help Treasury access quality information and help ensure a smooth and timely process for certifying events under TRIA. Treasury has a process for fulfilling claims that uses a web-based system developed and operated by a contractor. Once the Secretary certifies an act of terrorism, Treasury is to issue a task order to the contractor, which is to make the claims website operational within 7 business days, according to its contract. The claims process begins for insurers when their total insured losses exceed 50 percent of their deductible within a calendar year, at which point insurers must submit a form notifying Treasury. An insurer may claim the federal share of compensation when its total insured losses exceed its deductible for a calendar year, according to TRIA regulations. The responsibilities of Treasury’s contractor include reviewing and testing the web-based claims system; activating and providing ongoing operation of the claims system; receiving and reviewing insurers’ required documents for completeness and accuracy; obtaining information from insurers as needed and answering questions by email and telephone; and recommending Treasury pay claims. Treasury’s contractor has developed operating guidelines that detail work flows and controls for how it will begin processing claims. The operating guidelines include a plan to transfer existing staff from other responsibilities to operate the claims process, as needed. According to the contractor, staff responsible for processing claims in the event of a certified terrorist attack participate in an annual training session. Treasury’s contractor also built quality checks within its web-based system to automatically review submissions. Moreover, Treasury’s contractor has tested the web-based claims system. The contractor said it completed more than 40 rounds of readiness testing since 2004. The contractor must conduct readiness testing at least three times a year and test contingency plans and disaster recovery procedures at least annually, according to the contract. In addition, Treasury’s contractor developed a demonstration website that is publicly available (see fig. 5). Of the five insurers GAO interviewed, one said it used the demonstration website, two said they had not, and two were unsure if anyone in the company had used the website. The contractor said they previously have invited insurers to participate in testing. The website outlines the general claims process and includes the forms insurers would submit in the event of a certified terrorist attack. Most industry stakeholders who were familiar with the claims process told us they found it to be clear. Those stakeholders who were unfamiliar with the process said they had no concerns about it at present. Of the five insurers we interviewed, three said the only concern they had regarding the claims process is how quickly Treasury would certify an event and pay insurers’ claims. One insurer said the claims process was clear, and one said it was unable to comment because it had not tested the process. In December 2016 Treasury issued guidance clarifying that, to the extent that insurers write cyber insurance under an embedded or stand-alone policy in TRIA-eligible lines, the TRIA provisions apply. In our May 2014 report, we found insurers were uncertain about whether TRIA covered risks from a cyberterrorism attack, and recommended that Treasury clarify whether losses that may result from cyberterrorism were covered under TRIA. Treasury’s 2016 guidance included three elements: 1. Treasury considers cyber policies that are reported under the “cyber liability” line for state regulatory purposes to be “property and casualty” insurance under TRIA, and therefore eligible for payment of the federal share of compensation in the event of a certified terrorist attack. 2. Policies only would be eligible if insurers made the same required disclosures to policyholders about the program as other TRIA-eligible lines. 3. Treasury requires insurers to provide disclosures and offers that comply with TRIA and the program regulations on any new or renewal policies reported under the cyber line. Industry stakeholders said that Treasury’s guidance about cyber insurance coverage under TRIA was clear. Some industry stakeholders said that there was some initial confusion about the guidance because it indicated the NAIC created a new line for cyber liability on the property/casualty annual statement, although this was not the case. According to NAIC representatives, changes were made to how insurance products were coded for rate-filing purposes, and these changes did not affect the lines of business reported on the property/casualty annual statement state page. Treasury officials said there may have been some ambiguity in how they communicated the 2016 guidance. NAIC representatives said despite this initial confusion, the industry understood the guidance. Industry stakeholders said that questions remain about what type of cyberattack Treasury would certify as an act of terrorism. TRIA’s definition of an act of terrorism requires an act “to have been committed by an individual or individuals as part of an effort to coerce the civilian population of the United States or to influence the policy or affect the conduct of the United States government by coercion.” However, according to industry stakeholders and industry analysts, the nature of a cyberattack means that tracing and attributing the event to an individual is difficult. Additionally, generally the Secretary of the Treasury may not certify an act if it is committed as part of a war declared by Congress. The Advisory Committee on Risk-Sharing Mechanisms, which provides recommendations to the Federal Insurance Office about risk sharing for terrorism losses, has been researching issues related to cyberterrorism insurance. According to this advisory committee, this group will provide Treasury with recommendations regarding this and other issues in spring 2020. Since shortly after the attacks of September 11, 2001, the Terrorism Risk Insurance Program has helped to ensure stability in the market for terrorism risk insurance, with the coverage generally available and affordable. However, insurers and policyholders are not aware of whether, and through what process, Treasury considers certifying an event as a terrorism event. Without public communication about when it is considering certification, Treasury risks contributing to market uncertainty rather than stability after an attack. The purpose of Treasury’s required consultation with DHS and DOJ in certifying an event is to provide Treasury the necessary law enforcement, intelligence, and homeland security information within the two agencies’ authorities and jurisdictions. However, DHS’s understanding of its role in the internal review phase of the certification process appears to differ from this stated purpose. Treasury has established and maintained informal connections with both agencies, but it has not documented these roles. By documenting agreements between Treasury and the two consulting agencies, Treasury can obtain quality information to help ensure a smooth and timely certification process. We are making the following three recommendations to Treasury: The Director of the Federal Insurance Office should publicly communicate information about when it is considering certifying an event as an act of terrorism under TRIA. (Recommendation 1) The Director of the Federal Insurance Office should document an agreement with DHS about DHS’s role, and how the agencies share information, during the process of certifying an event as an act of terrorism under TRIA. (Recommendation 2) The Director of the Federal Insurance Office should document an agreement with DOJ about DOJ’s role, and how the agencies share information, during the process of certifying an event as an act of terrorism under TRIA. (Recommendation 3) We provided a draft of this report to Treasury, DOJ, DHS, and NAIC for review and comment. DOJ and NAIC did not have any comments. Treasury provided written comments through the Federal Insurance Office, which are reproduced in appendix II and discussed below. Treasury and DHS provided technical comments, which we incorporated as appropriate and discuss below. We also solicited and received technical comments from the UK Treasury and incorporated them as appropriate. In its written comments, Treasury agreed with our three recommendations and described how it would address them. In response to our first recommendation, Treasury stated that it will consider potential changes to the certification process in conjunction with the results of the review by the Advisory Committee on Risk-Sharing Mechanisms of certification procedures (due in spring 2020). In response to our second and third recommendations, Treasury said that it will further coordinate with DOJ and DHS on their respective roles and evaluate any additional steps to clarify their roles in investigating potential events. In technical comments, DHS questioned our characterization of its role during the certification process. DHS reiterated that it would provide Treasury with information on how DHS handles an incident in relation to the DHS SAFETY Act process, and not information regarding any possible investigation of a terrorist event. DHS stated that this is the information Treasury requested from the office for potential events in the past. However, we found that Treasury has not documented the type of information it expects from each agency during its internal review phase and maintain that information related to the DHS SAFETY Act process is inconsistent with Treasury’s purpose for consultation—to obtain law enforcement and intelligence information. We maintain that documenting the information Treasury expects from each agency would ensure that Treasury obtains the information it needs to make a certification decision. We are sending copies of this report to the Secretary of the Treasury, the Acting Secretary of Homeland Security, the Attorney General, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or garciadiazd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In this report, we use “TRIA” to refer to the Terrorism Risk Insurance Act of 2002 and its subsequent reauthorizations. The objectives of our report were to examine (1) the current market for terrorism risk insurance and TRIA’s role in the market; and (2) the Department of the Treasury’s (Treasury) certification and claims processes, and industry stakeholders’ views on these processes, including guidance on cyber risk coverage. To address these objectives, we reviewed the Terrorism Risk Insurance Act of 2002; Terrorism Risk Insurance Extension Act of 2005; the Terrorism Risk Insurance Program Reauthorization Acts of 2007, 2015, and 2019; and implementing regulations, and congressional records. We also reviewed prior GAO work on this topic. We interviewed officials from the Treasury, National Association of Insurance Commissioners (NAIC), and Congressional Research Service and reviewed relevant reports from these entities. We also interviewed and reviewed reports from an academic researcher and several industry participants to obtain information for all our objectives, including insurers, representatives from insurance trade associations (representing insurers, reinsurers, mutual insurers, and captive insurers), risk modeling firms, and a rating agency. Specifically, we obtained information from five insurers. In all interviews, we asked participants about the potential effects of TRIA’s expiration on terrorism risk coverage, the effect of changes to the program from 2015 to 2020, and their views on Treasury’s certification and claims process, and guidance on coverage for cyberterrorism. We initially contacted eight insurers—four from among the largest U.S. commercial property and casualty insurers in TRIA-eligible lines of business (according to SNL Financial) and four smaller insurers previously recommended by insurance brokers and trade associations during prior GAO work. Five of these eight insurers, all of whom provided terrorism coverage to businesses, responded to our request and agreed to meet with us. Among these five insurers, two were large, two were small, and one was a captive insurer; two provided workers’ compensation and one provided cyber risk coverage. We determined that the information we obtained from these five insurers was sufficient for the purposes of obtaining a range of views of the market, but it is not generalizable to the practices of other insurers not included. To describe the current status of the market for terrorism risk insurance and how the market might be affected if TRIA were to expire, we reviewed annual Treasury reports on the program from 2017, 2018, and 2019, as well as reports from Marsh, an insurance risk-management firm, and other industry stakeholders. We reviewed these reports for information on affordability and availability of terrorism risk insurance, including data on take-up rates, premiums, geographic coverage, and trends over time. We also reviewed language in insurance policies that excluded some terrorism coverage in the event that TRIA was not reauthorized. To assess Treasury’s certification and claims processes, we reviewed documentation on the certification process, including Treasury’s internal policies and websites. We interviewed agency officials and the contractor responsible for operating the claims process after a certified terrorist attack, and we reviewed Treasury’s contract with this operator and the contractor’s internal policies. We also interviewed officials from the Departments of Homeland Security and Justice regarding their role in consulting with the Secretary of the Treasury on certification decisions. We reviewed relevant documents from the Organisation for Economic Co- operation and Development and relevant industry reports from four foreign countries with terrorism risk insurance programs: Australia, Belgium, Israel, and the United Kingdom (UK). We selected these countries because their terrorism risk insurance programs require certification by a government entity to pay claims. We interviewed the terrorism risk insurance pool operator and the certification entity for the UK because this program includes a short (21-day) timeline for certifying terrorist events. Additionally, we interviewed and reviewed documentation from a U.S. company that provides loss estimates, primarily to the insurance-linked securities market, which investors use to determine if a catastrophe bond has been triggered by an event. We compared Treasury’s certification and consultation process against criteria in federal internal control standards on management communication. To determine how cyber terrorism is covered under TRIA and in commercial policies, we reviewed Treasury guidance. We also met with Treasury officials and representatives of the Insurance Services Office, a property/casualty insurance industry association that develops standardized policy language, and reviewed its standard policies for cyber insurance. We also reviewed Treasury reports on cyberterrorism coverage, including data on take-up rates and direct earned premiums for cyberterrorism risks. We conducted this performance audit from April 2019 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Jill Naamane (Assistant Director), Nathan Gottfried (Analyst in Charge), Anna Blasco, William R. Chatlos, Giselle Cubillos-Moraga, Kaitlan Doying, Karen Jarzynka-Hernandez, May Lee, Barbara Roesmann, Jessica Sandler, Jena Sinkfield, and Rachel Whitaker made significant contributions to this report. Terrorism Risk Insurance: Market Challenges May Exist for Current Structure and Alternative Approaches. GAO-17-62. Washington, D.C.: January 12, 2017. Terrorism Risk Insurance: Comparison of Selected Programs in the United States and Foreign Countries. GAO-16-316. Washington, D.C.: April 12, 2016. Terrorism Insurance: Treasury Needs to Collect and Analyze Data to Better Understand Fiscal Exposure and Clarify Guidance. GAO-14-445. Washington, D.C.: May 22, 2014. Terrorism Insurance: Status of Coverage Availability for Attacks Involving Nuclear, Biological, Chemical, or Radiological Weapons. GAO-09-39. Washington, D.C.: December 12, 2008. Terrorism Insurance: Status of Efforts by Policyholders to Obtain Coverage. GAO-08-1057. Washington, D.C.: September 15, 2008. Terrorism Insurance: Implementation of the Terrorism Risk Insurance Act of 2002. GAO-04-307. Washington, D.C.: April 23, 2004.", "summary": "TRIA created a federal program to help ensure the availability and affordability of terrorism risk insurance. Insurers must make terrorism risk coverage available to commercial policyholders. The federal government and insurers share losses on such policies resulting from a certified act of terrorism causing at least $5 million of insurance losses. Annual coverage for losses by insurers (who have met their insurer deductible) and the government is limited to $100 billion. The program is set to expire December 31, 2027. GAO was asked to review TRIA. This report examines (1) the current market for terrorism risk insurance and the program's role in the market, and (2) Treasury's processes to certify acts of terrorism and fulfill claims. GAO reviewed Treasury reports and related industry studies, Treasury's guidance and procedures for the program, and insurance policy language. GAO also interviewed Treasury officials and industry stakeholders, including a nongeneralizable sample of insurers of different sizes providing various types of insurance. With the support of a program established under the Terrorism Risk Insurance Act (TRIA) in which the federal government and insurers would share losses in the event of a certified act of terrorism, terrorism risk insurance is generally available and affordable in the United States. For example, the majority of commercial policyholders generally purchased terrorism risk insurance in recent years, according to Department of the Treasury (Treasury) data. The insurance market would be significantly disrupted without a loss-sharing program such as that established under TRIA. Specifically, insurers generally would not have to offer terrorism risk coverage and likely would charge higher premiums in the absence of a loss-sharing arrangement and cap on losses, according to GAO's review of policies and interviews with industry stakeholders, including insurers and insurer associations. Without access to affordable coverage, new building ventures could be delayed and employers could struggle to find affordable workers' compensation coverage. Treasury has processes for certifying terrorist events and fulfilling claims under the program, but a lack of communication about aspects of Treasury's certification process could pose challenges for insurers. Some industry stakeholders, such as insurers and representatives of insurer associations, raised issues about Treasury communications on certification. They cited confusion over why the 2013 Boston Marathon bombing was not certified when they clearly viewed it as a terrorist attack. These industry stakeholders also expressed concern that Treasury never communicated whether it was reviewing the event for certification or its reasons for not certifying it. Most insurers GAO interviewed said such lack of communication by Treasury again could lead to uncertainty about whether to pay claims, putting them at risk of violating state laws and their policyholder agreements. TRIA regulations on certifying acts of terrorism include some public notification requirements but do not require Treasury to communicate when it is considering reviewing an event for certification. One purpose of TRIA is to stabilize the insurance market after a terrorist attack. Public communication of when Treasury is considering an event for certification would reduce uncertainty about which claims insurers should pay and lessen potential disruptions to the market after an attack. One step in determining when to certify an event is Treasury's consultation with offices in the Department of Homeland Security (DHS) and Department of Justice (DOJ) to obtain law enforcement, intelligence, and homeland security information. However, GAO found that DHS had a different understanding of its role in this staff consultation process, and Treasury had not documented agreements with either agency. By documenting agreements between Treasury and the two consulting agencies, Treasury can better ensure a smooth and timely certification process. Once an event is certified as an act of terrorism, Treasury has a process for fulfilling claims that uses a web-based system developed and operated by a contractor. As of February 2020, the system had not yet been used because Treasury had not certified any acts of terrorism or paid claims under the program. GAO is making three recommendations, including that Treasury publicly communicate when it is considering reviewing an event for TRIA certification and document agreements with both DHS and DOJ on the agencies' roles in the process. Treasury agreed with the recommendations.", "document_type": "gao"}
{"report": "According to the President’s budget, the federal government planned to invest more than $96 billion for IT in fiscal year 2018—the largest amount ever budgeted. Despite such large IT expenditures, we have previously reported that investments in federal IT too often resulted in failed projects that incurred cost overruns and schedule slippages, while contributing little to the desired mission-related outcomes. For example: The tri-agency National Polar-orbiting Operational Environmental Satellite System was disbanded in February 2010 at the direction of the White House’s Office of Science and Technology Policy after the program spent 16 years and almost $5 billion. The Department of Homeland Security’s (DHS) Secure Border Initiative Network program was ended in January 2011, after the department obligated more than $1 billion for the program. The Department of Veterans Affairs’ Financial and Logistics Integrated Technology Enterprise program was intended to be delivered by 2014 at a total estimated cost of $609 million, but was terminated in October 2011. The Department of Defense’s Expeditionary Combat Support System was canceled in December 2012 after spending more than a billion dollars and failing to deploy within 5 years of initially obligating funds. The United States Coast Guard (Coast Guard) decided to terminate its Integrated Health Information System project in 2015. As reported by the agency in August 2017, the Coast Guard spent approximately $60 million over 7 years on this project, which resulted in no equipment or software that could be used for future efforts. Our past work has found that these and other failed IT projects often suffered from a lack of disciplined and effective management, such as project planning, requirements definition, and program oversight and governance. In many instances, agencies had not consistently applied best practices that are critical to successfully acquiring IT. Such projects have also failed due to a lack of oversight and governance. Executive-level governance and oversight across the government has often been ineffective, specifically from CIOs. For example, we have reported that some CIOs’ roles were limited because they did not have the authority to review and approve the entire agency IT portfolio. In addition to failures when acquiring IT, security deficiencies can threaten systems. As we previously reported, in order to counter security threats, the 23 civilian Chief Financial Officers (CFO) Act agencies spent a combined total of approximately $4 billion on IT security-related activities in fiscal year 2016. Even so, our cybersecurity work at federal agencies continues to highlight information security deficiencies. The following examples describe the types of risks we have found at federal agencies. In September 2018, we reported that the Department of Education’s Office of Federal Student Aid exercises minimal oversight of lenders’ protection of student data and lacks assurance that appropriate risk- based safeguards are being effectively implemented, tested, and monitored. In August 2017, we reported that, since the 2015 data breaches, the Office of Personnel Management (OPM) had taken actions to prevent, mitigate, and respond to data breaches involving sensitive personal and background investigation information. However, we noted that the agency had not fully implemented recommendations made to OPM by DHS’s United States Computer Emergency Readiness Team to help the agency improve its overall security posture and improve its ability to protect its systems and information from security breaches. In July 2017, we reported that information security at the Internal Revenue Service had weaknesses that limited its effectiveness in protecting the confidentiality, integrity, and availability of financial and sensitive taxpayer data. An underlying reason for these weaknesses was that the Internal Revenue Service had not effectively implemented elements of its information security program. In May 2016, we reported that the National Aeronautics and Space Administration, the Nuclear Regulatory Commission, OPM, and the Department of Veteran Affairs did not always control access to selected high-impact systems, patch known software vulnerabilities, and plan for contingencies. An underlying reason for these weaknesses was that the agencies had not fully implemented key elements of their information security programs. In August 2016, we reported that the information security of the Food and Drug Administration had significant weaknesses that jeopardized the confidentiality, integrity, and availability of its information systems and industry and public health data. Congress and the President have enacted various key pieces of reform legislation to address IT management issues. These include the federal IT acquisition reform legislation commonly referred to as the Federal Information Technology Acquisition Reform Act (FITARA). This legislation was intended to improve covered agencies’ acquisitions of IT and enable Congress to monitor agencies’ progress and hold them accountable for reducing duplication and achieving cost savings. The law includes specific requirements related to seven areas: Agency CIO authority enhancements. CIOs at covered agencies have the authority to, among other things, (1) approve the IT budget requests of their respective agencies and (2) review and approve IT contracts. Federal data center consolidation initiative (FDCCI). Agencies covered by FITARA are required, among other things, to provide a strategy for consolidating and optimizing their data centers and issue quarterly updates on the progress made. Enhanced transparency and improved risk management. The Office of Management and Budget (OMB) and covered agencies are to make detailed information on federal IT investments publicly available, and agency CIOs are to categorize their investments by level of risk. Portfolio review. Covered agencies are to annually review IT investment portfolios in order to, among other things, increase efficiency and effectiveness and identify potential waste and duplication. Expansion of training and use of IT acquisition cadres. Covered agencies are to update their acquisition human capital plans to support timely and effective IT acquisitions. In doing so, the law calls for agencies to consider, among other things, establishing IT acquisition cadres (i.e., multi-functional groups of professionals to acquire and manage complex programs), or developing agreements with other agencies that have such cadres. Government-wide software purchasing program. The General Services Administration is to develop a strategic sourcing initiative to enhance government-wide acquisition and management of software. In doing so, the law requires that, to the maximum extent practicable, the General Services Administration should allow for the purchase of a software license agreement that is available for use by all executive branch agencies as a single user. Maximizing the benefit of the Federal Strategic Sourcing Initiative. Federal agencies are required to compare their purchases of services and supplies to what is offered under the Federal Strategic Sourcing Initiative. In June 2015, OMB released guidance describing how agencies are to implement FITARA. This guidance is intended to, among other things: assist agencies in aligning their IT resources with statutory requirements; establish government-wide IT management controls to meet the law’s requirements, while providing agencies with flexibility to adapt to unique agency processes and requirements; strengthen the relationship between agency CIOs and bureau CIOs; and strengthen CIO accountability for IT costs, schedules, performance, and security. The guidance identifies a number of actions that agencies are to take to establish a basic set of roles and responsibilities (referred to as the common baseline) for CIOs and other senior agency officials and, thus, to implement the authorities described in the law. For example, agencies are to conduct a self-assessment and submit a plan describing the changes they intend to make to ensure that common baseline responsibilities are implemented. In addition, in August 2016, OMB released guidance intended to, among other things, define a framework for achieving the data center consolidation and optimization requirements of FITARA. The guidance directed agencies to develop a data center consolidation and optimization strategic plan that defined the agency’s data center strategy for fiscal years 2016, 2017, and 2018. This strategy was to include, among other things, a statement from the agency CIO indicating whether the agency had complied with all data center reporting requirements in FITARA. Further, the guidance states that OMB is to maintain a public dashboard to display consolidation-related costs savings and optimization performance information for the agencies. Congress has recognized the importance of agencies’ continued implementation of FITARA provisions, and has taken legislative action to extend selected provisions beyond their original dates of expiration. Specifically, Congress and the President enacted laws to: remove the expiration dates for the enhanced transparency and improved risk management provisions, which were set to expire in 2019; remove the expiration date for portfolio review, which was set to expire in 2019; and extend the expiration date for FDCCI from 2018 to 2020. In addition, Congress and the President enacted a law to authorize the availability of funding mechanisms to help further agencies’ efforts to modernize IT. The law, known as the Modernizing Government Technology (MGT) Act, authorizes agencies to establish working capital funds for use in transitioning from legacy IT systems, as well as for addressing evolving threats to information security. The law also creates the Technology Modernization Fund, within the Department of the Treasury, from which agencies can “borrow” money to retire and replace legacy systems, as well as acquire or develop systems. Further, in February 2018, OMB issued guidance for agencies on implementing the MGT Act. The guidance was intended to provide agencies additional information regarding the Technology Modernization Fund, and the administration and funding of the related IT working capital funds. Specifically, the guidance encouraged agencies to begin submitting initial project proposals for modernization on February 27, 2018. In addition, in accordance with the MGT Act, the guidance provides details regarding a Technology Modernization Board, which is to consist of (1) the Federal CIO; (2) a senior IT official from the General Services Administration; (3) a member of DHS’s National Protection and Program Directorate; and (4) four federal employees with technical expertise in IT development, financial management, cybersecurity and privacy, and acquisition, appointed by the Director of OMB. Congress and the President enacted the Federal Information Security Modernization Act of 2014 (FISMA) to improve federal cybersecurity and clarify government-wide responsibilities. The act addresses the increasing sophistication of cybersecurity attacks, promotes the use of automated security tools with the ability to continuously monitor and diagnose the security posture of federal agencies, and provides for improved oversight of federal agencies’ information security programs. Toward this end, the act clarifies and assigns specific responsibilities to entities such as OMB, DHS, and the federal agencies. Table 1 describes a selection of the OMB, DHS, and agency responsibilities. Beyond the implementation of FITARA, FISMA, and related actions, the administration has also initiated other efforts intended to improve federal IT. Specifically, in March 2017, the administration established the Office of American Innovation, which has a mission to, among other things, make recommendations to the President on policies and plans aimed at improving federal government operations and services. In doing so, the office is to consult with both OMB and the Office of Science and Technology Policy on policies and plans intended to improve government operations and services, improve the quality of life for Americans, and spur job creation. In May 2017, the Administration also established the American Technology Council, which has a goal of helping to transform and modernize federal agency IT and how the federal government uses and delivers digital services. The President is the chairman of this council, and the Federal CIO and the United States Digital Service Administrator are among the members. In addition, on May 11, 2017, the President signed Executive Order 13800, Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. This executive order outlined actions to enhance cybersecurity across federal agencies and critical infrastructure to improve the nation’s cyber posture and capabilities against cybersecurity threats. Among other things, the order tasked the Director of the American Technology Council to coordinate a report to the President from the Secretary of DHS, the Director of OMB, and the Administrator of the General Services Administration, in consultation with the Secretary of Commerce, regarding the modernization of federal IT. As a result, the Report to the President on Federal IT Modernization was issued on December 13, 2017, and outlined the current and envisioned state of federal IT. The report focused on modernization efforts to improve the security posture of federal IT and recognized that agencies have attempted to modernize systems but have been stymied by a variety of factors, including resource prioritization, ability to procure services quickly, and technical issues. The report provided multiple recommendations intended to address these issues through the modernization and consolidation of networks and the use of shared services to enable future network architectures. Further, in March 2018, the Administration issued the President’s Management Agenda, which lays out a long-term vision for modernizing the federal government. The agenda identifies three related drivers of transformation—IT modernization; data, accountability, and transparency; and the workforce of the future—that are intended to push change across the federal government. The Administration also established 14 related Cross-Agency Priority goals, many of which have elements that involve IT. In particular, the Cross-Agency Priority goal on IT modernization states that modern IT must function as the backbone of how government serves the public in the digital age. This goal establishes three priorities that are to guide the Administration’s efforts to modernize federal IT: (1) enhancing mission effectiveness by improving the quality and efficiency of critical services, including the increased utilization of cloud-based solutions; (2) reducing cybersecurity risks to the federal mission by leveraging current commercial capabilities and implementing cutting edge cybersecurity capabilities; and (3) building a modern IT workforce by recruiting, reskilling, and retaining professionals able to help drive modernization with up-to-date technology. More recently, on May 15, 2018, the President signed Executive Order 13833, Enhancing the Effectiveness of Agency Chief Information Officers. Among other things, this executive order is intended to better position agencies to modernize their IT systems, execute IT programs more efficiently, and reduce cybersecurity risks. The order pertains to 22 of the 24 CFO Act agencies: the Department of Defense and the Nuclear Regulatory Commission are exempt. For the covered agencies, the executive order strengthens the role of agency CIOs by, among other things, requiring them to report directly to their agency head; serve as their agency head’s primary IT strategic advisor; and have a significant role in all management, governance, and oversight processes related to IT. In addition, one of the cybersecurity requirements directs agencies to ensure that the CIO works closely with an integrated team of senior executives, including those with expertise in IT, security, and privacy, to implement appropriate risk management measures. In the February 2017 update to our high-risk series, we reported that agencies still needed to complete significant work related to the management of IT acquisitions and operations. We stressed that OMB and federal agencies should continue to expeditiously implement FITARA and OMB’s related guidance, which includes enhancing CIO authority, consolidating data centers, and acquiring and managing software licenses. Our update to this high-risk area also stressed that OMB and agencies needed to continue to implement our prior recommendations in order to improve their ability to effectively and efficiently invest in IT. Specifically, since fiscal year 2010, we have made 1,242 recommendations to OMB and federal agencies to address shortcomings in IT acquisitions and operations. As stated in the update, OMB and agencies should demonstrate government-wide progress in the management of IT investments by, among other things, implementing at least 80 percent of our recommendations related to managing IT acquisitions and operations. As of November 2018, OMB and agencies had fully implemented 732 (or about 59 percent) of the 1,242 recommendations. Figure 1 summarizes the progress that OMB and agencies have made in addressing our recommendations compared to the 80 percent target. Overall, federal agencies would be better positioned to realize billions in cost savings and additional management improvements if they address these recommendations, including those aimed at implementing CIO responsibilities, reviewing IT acquisitions; improving data center consolidation; and managing software licenses. In all, the various laws, such as FITARA, and related guidance assign 35 IT management responsibilities to CIOs in six key areas. These areas are: leadership and accountability, budgeting, information security, investment management, workforce, and strategic planning. In August 2018, we reported that none of the 24 agencies we reviewed had policies that fully addressed the role of their CIO, as called for by federal laws and guidance. In this regard, a majority of the agencies had fully or substantially addressed the role of their CIOs for the area of leadership and accountability. In addition, a majority of the agencies had substantially or partially addressed the role of their CIOs for two areas: information security and IT budgeting. However, most agencies partially or minimally addressed the role of their CIOs for two areas: investment management and strategic planning. Further, the majority of the agencies minimally addressed or did not address the role of their CIOs for the remaining area: IT workforce. Figure 2 depicts the extent to which the 24 agencies addressed the role of their CIOs for the six areas. Despite the shortfalls in agencies’ policies addressing the roles of their CIOs, most agency officials stated that their CIOs are implementing the responsibilities even if the agencies do not have policies requiring implementation. Nevertheless, the CIOs of the 24 selected agencies acknowledged in responses to a survey that we administered that they were not always very effective in implementing the six IT management areas. Specifically, at least 10 of the CIOs indicated that they were less than very effective for each of the six areas of responsibility. We believe that until agencies fully address the role of CIOs in their policies, agencies will be limited in addressing longstanding IT management challenges. Figure 3 depicts the extent to which the CIOs reported their effectiveness in implementing the six areas of responsibility. Beyond the actions of the agencies, however, shortcomings in agencies’ policies also are partially attributable to two weaknesses in OMB’s guidance. First, the guidance does not comprehensively address all CIO responsibilities, such as those related to assessing the extent to which personnel meet IT management knowledge and skill requirements, and ensuring that personnel are held accountable for complying with the information security program. Correspondingly, the majority of the agencies’ policies did not fully address nearly all of the responsibilities that were not included in OMB’s guidance. Second, OMB’s guidance does not ensure that CIOs have a significant role in (1) IT planning, programming, and budgeting decisions; and (2) execution decisions and the management, governance, and oversight processes related to IT, as required by federal law and guidance. In the absence of comprehensive guidance, CIOs will not be positioned to effectively acquire, maintain, and secure their IT systems. In response to the survey conducted for our August 2018 report, the 24 agency CIOs also identified a number of factors that enabled and challenged their ability to effectively manage IT. Specifically, most agency CIOs cited five factors as being enablers to effectively carry out their responsibilities: (1) NIST guidance, (2) the CIO’s position in the agency hierarchy, (3) OMB guidance, (4) coordination with the Chief Acquisition Officer (CAO), and (5) legal authority. Further, three factors were cited by CIOs as major factors that have challenged their ability to effectively carry out responsibilities: (1) processes for hiring, recruiting, and retaining IT personnel; (2) financial resources; and (3) the availability of personnel/staff resources. As shown in figure 4, the five enabling factors were identified by at least half of the 24 CIOs and the three factors cited as major challenges were identified by at least half of the CIOs. Although OMB has issued guidance aimed at addressing the three factors that were identified by at least half of the CIOs as major challenges, the guidance does not fully address those challenges. Further, regarding the financial resources challenge, OMB recently required agencies to provide data on CIO authority over IT spending; however, its guidance does not provide a complete definition of the authority. In the absence of such guidance, agencies have created varying definitions of CIO authority. Until OMB updates its guidance to include a complete definition of the authority that CIOs are to have over IT spending, it will be difficult for OMB to identify any deficiencies in this area and to help agencies make any needed improvements. In order to address challenges in implementing CIO responsibilities, we made three recommendations to OMB and one recommendation to each of the selected 24 federal agencies to improve the effectiveness of CIOs’ implementation of their responsibilities for each of the six IT management areas. Most agencies agreed with or had no comments on the recommendations. As of November 2018, all 27 of the recommendations had not been implemented. We will continue to monitor the implementation of these recommendations. FITARA includes a provision to enhance covered agency CIOs’ authority through, among other things, requiring agency heads to ensure that CIOs review and approve IT contracts. OMB’s FITARA implementation guidance expanded upon this aspect of the legislation in a number of ways. Specifically, according to the guidance: CIOs may review and approve IT acquisition strategies and plans, rather than individual IT contracts; CIOs can designate other agency officials to act as their representatives, but the CIOs must retain accountability; CAOs are responsible for ensuring that all IT contract actions are consistent with CIO-approved acquisition strategies and plans; and CAOs are to indicate to the CIOs when planned acquisition strategies and acquisition plans include IT. In January 2018, we reported that most of the CIOs at 22 selected agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. For instance, most of the 22 agencies did not identify all of their IT contracts. In this regard, the agencies identified 78,249 IT- related contracts, to which they obligated $14.7 billion in fiscal year 2016. However, we identified 31,493 additional contracts with $4.5 billion obligated, raising the total amount obligated to IT contracts by these agencies in fiscal year 2016 to at least $19.2 billion. Figure 5 reflects the obligations that the 22 selected agencies reported to us relative to the obligations we identified. The percentage of additional IT contract obligations we identified varied among the selected agencies. For example, the Department of State did not identify 1 percent of its IT contract obligations. Conversely, eight agencies did not identify over 40 percent of their IT contract obligations. Many of the selected agencies that did not identify these IT contract obligations also did not follow OMB guidance. Specifically, 14 of the 22 agencies did not involve the acquisition office in their process to identify IT acquisitions for CIO review, as required by OMB. In addition, 7 agencies did not establish guidance to aid officials in recognizing IT. We concluded that until these agencies involve the acquisitions office in their IT acquisition identification processes and establish supporting guidance, they cannot ensure that they will identify all such acquisitions. Without proper identification of IT acquisitions, these agencies and CIOs cannot effectively provide oversight of these acquisitions. In addition to not identifying all IT contracts, 14 of the 22 selected agencies did not fully satisfy OMB’s requirement that the CIO review and approve IT acquisition plans or strategies. Further, only 11 of 96 randomly selected IT contracts at 10 agencies that we evaluated were CIO- reviewed and approved as required by OMB’s guidance. The 85 contracts not reviewed had a total possible value of approximately $23.8 billion. Until agencies ensure that CIOs are able to review and approve all IT acquisitions, CIOs will continue to have limited visibility and input into their agencies’ planned IT expenditures and will not be able to effectively use the increased authority that FITARA’s contract approval provision is intended to provide. Further, agencies will likely miss an opportunity to strengthen their CIOs’ authority and the oversight of acquisitions. As a result, agencies may award IT contracts that are duplicative, wasteful, or poorly conceived. As a result of these findings, we made 39 recommendations in our January 2018 report. Among these, we recommended that agencies ensure that their acquisition offices are involved in identifying IT acquisitions and issuing related guidance, and that IT acquisitions are reviewed in accordance with OMB guidance. OMB and the majority of the agencies generally agreed with or did not comment on the recommendations. As of November 2018, 27 of the recommendations had not been implemented. In our February 2017 high-risk update, we stressed that OMB and agencies needed to demonstrate additional progress on achieving data center consolidation savings in order to improve the management of IT acquisitions and operations. Further, data center consolidation efforts are key to implementing FITARA. Specifically, OMB established the FDCCI in February 2010 to improve the efficiency, performance, and environmental footprint of federal data center activities. The enactment of FITARA in 2014 codified and expanded the initiative. In addition, in August 2016, OMB issued a memorandum which established the Data Center Optimization Initiative (DCOI) and included guidance on how to implement the data center consolidation and optimization provisions of FITARA. Among other things, the guidance required agencies to consolidate inefficient infrastructure, optimize existing facilities, improve their security posture, and achieve cost savings. According to agencies, data center consolidation and optimization efforts have resulted in approximately $4.5 billion in cost savings through 2018. However, additional work remains to fully carry out the initiative. Specifically, in a series of reports that we issued from July 2011 through May 2018, we noted that, while data center consolidation could potentially save the federal government billions of dollars, weaknesses existed in several areas, including agencies’ data center consolidation plans, data center optimization, and OMB’s tracking and reporting on related cost savings. In these reports, we made a total of 160 recommendations to OMB and 24 agencies to improve the execution and oversight of the initiative. Most agencies and OMB agreed with our recommendations or had no comments. As of November 2018, 47 of these 160 recommendations remained unimplemented. In addition, in a draft report on data center optimization that we have provided to the agencies for comment and plan to issue in early 2019, our preliminary results indicate that agencies continued to report mixed progress toward achieving OMB’s goals for closing data centers and realizing the associated savings by September 2018. Specifically, as of August 2018, over half of the agencies reported that they had met, or planned to meet, all of their OMB-assigned closure goals for tiered data centers by the deadline. However, 6 agencies reported that they did not plan to meet their goals for tiered data centers. In addition, as of August 2018, 11 agencies reported that they had already met the goal for closing 60 percent of their non-tiered centers, 3 agencies reported that they planned to meet the goal by the end of fiscal year 2018, and 9 agencies reported that they did not plan to meet the goal by the end of fiscal year 2018. In all, the 24 agencies reported a total of 6,250 data center closures as of August 2018, which represented about half of the total reported number of federal data centers. In addition, the agencies reported 1,009 planned closures by the end of fiscal year 2018, with an additional 191 closures planned through fiscal year 2023, for a total of 1,200 further closures. Further, in August 2018, 22 agencies reported that they had achieved $1.94 billion in cost savings for fiscal years 2016 through 2018, while 2 agencies reported that they had not achieved any savings. In addition to that amount, 21 agencies identified a further $0.42 billion in planned savings through fiscal year 2018—for a total of $2.36 billion in planned cost savings from fiscal years 2016 through 2018. Nevertheless, this total is about $0.38 billion less than OMB’s goal of $2.74 billion for overall DCOI savings. In our 2015 high-risk report’s discussion of IT acquisitions and operations, we identified the management of software licenses as an area of concern, in part because of the potential for cost savings. Federal agencies engage in thousands of software licensing agreements annually. The objective of software license management is to manage, control, and protect an organization’s software assets. Effective management of these licenses can help avoid purchasing too many licenses, which can result in unused software, as well as too few licenses, which can result in noncompliance with license terms and cause the imposition of additional fees. As part of its PortfolioStat initiative, OMB has developed a policy that addresses software licenses. This policy requires agencies to conduct an annual, agency-wide IT portfolio review to, among other things, reduce commodity IT spending. Such areas of spending could include software licenses. In May 2014, we reported on federal agencies’ management of software licenses and determined that better management was needed to achieve significant savings government-wide. Of the 24 selected agencies we reviewed, only 2 had comprehensive policies that included the establishment of clear roles and central oversight authority for managing enterprise software license agreements, among other things. Of the remaining 22 agencies, 18 had policies that were not comprehensive, and 4 had not developed any policies. Further, we found that only 2 of the 24 selected agencies had established comprehensive software license inventories, a leading practice that would help them to adequately manage their software licenses. The inadequate implementation of this and other leading practices in software license management was partially due to weaknesses in agencies’ policies. As a result, we concluded that agencies’ oversight of software license spending was limited or lacking, thus potentially leading to missed savings. However, the potential savings could be significant considering that, in fiscal year 2012, 1 major federal agency reported saving approximately $181 million by consolidating its enterprise license agreements, even when its oversight process was ad hoc. Accordingly, we recommended that OMB issue a directive to help guide agencies in managing software licenses. We also made 135 recommendations to the 24 agencies to improve their policies and practices for managing licenses. Among other things, we recommended that the agencies regularly track and maintain a comprehensive inventory of software licenses and analyze the inventory to identify opportunities to reduce costs and better inform investment decision making. Most agencies generally agreed with the recommendations or had no comments. As of December 2018, 27 of the 135 recommendations had not been implemented. Table 2 reflects the extent to which the 24 agencies implemented the recommendations in these two areas. Since information security was added to the high-risk list in 1997, we have consistently identified shortcomings in the federal government’s approach to cybersecurity. In particular, in a September 2018 report, we identified four major cybersecurity challenges: (1) establishing a comprehensive cybersecurity strategy and performing effective oversight, (2) securing federal systems and information, (3) protecting cyber critical infrastructure, and (4) protecting privacy and sensitive data. To address these challenges, we identified 10 critical actions that the federal government and other entities need to take. For example, in order to address the challenge of securing federal systems and information, we identified 3 actions that the agencies should take: (1) improve implementation of government-wide cybersecurity initiatives, (2) address weaknesses in federal information security programs, and (3) enhance the federal response to cyber incidents. Figure 6 depicts the 10 critical actions to address the four major cybersecurity challenges. As we have previously noted, in order to strengthen the federal government’s cybersecurity posture, agencies should fully implement the information security programs required by FISMA. In this regard, FISMA provides a framework for ensuring the effectiveness of information security controls for federal information resources. The law requires each agency to develop, document, and implement an agency-wide information security program. Such a program should include risk assessments; the development and implementation of policies and procedures to cost- effectively reduce risks; plans for providing adequate information security for networks, facilities, and systems; security awareness and specialized training; the testing and evaluation of the effectiveness of controls; the planning, implementation, evaluation, and documentation of remedial actions to address information security deficiencies; procedures for detecting, reporting, and responding to security incidents; and plans and procedures to ensure continuity of operations. Since fiscal year 2010, we have made over 3,000 recommendations to agencies aimed at addressing the four cybersecurity challenges. These recommendations have identified actions for agencies to take to strengthen technical security controls over their computer networks and systems. They also have included recommendations for agencies to fully implement aspects of their information security programs, as mandated by FISMA. Nevertheless, many agencies continue to be challenged in safeguarding their information systems and information, in part, because many of these recommendations have not been implemented. Of the roughly 3,000 recommendations made since 2010, 73 percent had been implemented as of November 2018; leaving 688 recommendations unimplemented. In order to determine the effectiveness of the agencies’ information security programs and practices, FISMA requires federal agencies’ inspectors general to conduct annual independent evaluations. The agencies are to report the results of these evaluations to OMB, and OMB is to summarize the results in annual reports to Congress. In these evaluations, the inspectors general are to frame the scope of their analyses, identify key findings, and detail recommendations to address the findings. The evaluations also are to capture maturity model ratings for their respective agencies. Toward this end, in fiscal year 2017, the inspector general community, in partnership with OMB and DHS, finalized a 3-year effort to create a maturity model for FISMA metrics. The maturity model aligns with the five function areas in the NIST Framework for Improving Critical Infrastructure Cybersecurity (Cybersecurity Framework): identify, protect, detect, respond, and recover. This alignment is intended to help promote consistent and comparable metrics and criteria and provide agencies with a meaningful independent assessment of their information security programs. The maturity model is designed to summarize the status of agencies’ information security programs on a five-level capability maturity scale. The five maturity levels are defined as follows: Level 1 Ad-hoc: Policies, procedures, and strategy are not formalized; activities are performed in an ad-hoc, reactive manner. Level 2 Defined: Policies, procedures, and strategy are formalized and documented but not consistently implemented. Level 3 Consistently Implemented: Policies, procedures, and strategy are consistently implemented, but quantitative and qualitative effectiveness measures are lacking. Level 4 Managed and Measurable: Quantitative and qualitative measures on the effectiveness of policies, procedures, and strategy are collected across the organizations and used to assess them and make necessary changes. Level 5 Optimized: Policies, procedures, and strategy are fully institutionalized, repeatable, self-generating, consistently implemented and regularly updated based on a changing threat and technology landscape and business/mission needs. In March 2018, OMB issued its annual FISMA report to Congress, which showed the combined results of the inspectors general’s fiscal year 2017 evaluations. Based on data from 76 agency inspector general and independent auditor assessments, OMB determined that the government-wide median maturity model ratings across the five NIST Cybersecurity Framework areas did not exceed a level 3 (consistently implemented). Table 3 shows the inspectors general’s median ratings for each of the NIST Cybersecurity Framework areas. In its efforts toward strengthening the federal government’s cybersecurity, OMB also requires agencies to submit related cybersecurity metrics as part of its Cross-Agency Priority goals. In particular, OMB developed the IT modernization goal so that federal agencies will be able to build and maintain more modern, secure, and resilient IT. A key part of this goal is to reduce cybersecurity risks to the federal mission through three strategies: manage asset security, protect networks and data, and limit personnel access. The key targets supporting each of these strategies correspond to areas within the FISMA metrics. Table 4 outlines the strategies, their associated targets, and the 23 civilian CFO Act agencies’ progress in meeting those targets, as of June 2018. In conclusion, FITARA and FISMA present opportunities for the federal government to address the high-risk areas on improving the management of IT acquisitions and operations and ensuring the security of federal IT, thereby saving billions of dollars. Most agencies have taken steps to execute key IT management and cybersecurity initiatives, including implementing CIO responsibilities, requiring CIO reviews of IT acquisitions, realizing data center consolidation cost savings, managing software assets, and complying with FISMA requirements. The agencies have also continued to address the recommendations that we have made over the past several years. However, further efforts by OMB and federal agencies to implement our previous recommendations would better position them to improve the management and security of federal IT. To help ensure that these efforts succeed, we will continue to monitor agencies’ efforts toward implementing the recommendations. Chairmen Meadows and Hurd, Ranking Members Connolly and Kelly, and Members of the Subcommittees, this completes my prepared statement. I would be pleased to respond to any questions that you may have. If you or your staff have any questions about this testimony, please contact Carol C. Harris, Director, Information Technology, at (202) 512- 4456 or harriscc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Kevin Walsh (Assistant Director), Chris Businsky, Rebecca Eyler, Meredith Raymond, and Jessica Waselkow (Analyst in Charge). This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The federal government planned to invest more than $96 billion in IT in fiscal year 2018. However, IT investments have often failed or contributed little to mission-related outcomes. Further, increasingly sophisticated threats and frequent cyber incidents underscore the need for effective information security. As a result, GAO added two areas to its high-risk list: cybersecurity in 1997 and the management of IT acquisitions and operations in 2015. This statement summarizes federal agencies' progress in improving the management, and ensuring the security, of federal IT. It is primarily based on GAO's reports issued between February 1997 and August 2018 (and an ongoing review) on (1) CIO responsibilities, (2) agency CIOs' involvement in approving IT contracts, (3) data center consolidation efforts, (4) the management of software licenses, and (5) compliance with cybersecurity requirements. The Office of Management and Budget (OMB) and federal agencies have taken steps to improve the management of information technology (IT) acquisitions and operations and ensure federal cybersecurity through a series of initiatives. As of November 2018, agencies had fully implemented about 59 percent of the 1,242 IT management-related recommendations that GAO has made since fiscal year 2010. Likewise, agencies had implemented about 73 percent of the approximately 3,000 security-related recommendations that GAO has made since 2010. Even with this progress, significant actions remain to be completed. Chief Information Officer (CIO) responsibilities . Laws such as the Federal Information Technology Acquisition Reform Act (FITARA) and related guidance assigned 35 key IT management responsibilities to CIOs to help address longstanding challenges. However, in August 2018, GAO reported that none of the 24 selected agencies had policies that fully addressed the role of their CIO, as called for by laws and guidance. GAO recommended that OMB and each of the 24 agencies take actions to improve the effectiveness of CIOs' implementation of their responsibilities. As of November 2018, none of the 27 recommendations had been implemented. IT contract approval . According to FITARA, covered agencies' CIOs are required to review and approve IT contracts. Nevertheless, in January 2018, GAO reported that most of the CIOs at 22 covered agencies were not adequately involved in reviewing billions of dollars of IT acquisitions. Consequently, GAO made 39 recommendations to improve CIO oversight over these acquisitions. As of November 2018, 27 of the recommendations had not been addressed. Consolidating data centers . OMB launched an initiative in 2010 to reduce data centers. According to agencies, data center consolidation and optimization efforts have resulted in approximately $4.5 billion in cost savings through 2018. Even so, additional work remains. GAO has made 160 recommendations to OMB and agencies to improve the reporting of related cost savings and to achieve optimization targets. However, as of November 2018, 47 of the recommendations had not been fully addressed. Managing software licenses . Effective management of software licenses can help avoid purchasing too many licenses that result in unused software. In May 2014, GAO reported that better management of licenses was needed to achieve savings, and made 135 recommendations to improve such management. As of December 2018, 27 of the recommendations had not been implemented. Improving the security of federal IT systems . While the government has acted to protect federal information systems, agencies need to improve security programs, cyber capabilities, and the protection of personally identifiable information. The approximately 3,000 recommendations that GAO has made to agencies since 2010 were aimed at improving the security of federal systems and information. Specifically, these recommendations identified actions for agencies to take to strengthen their information security programs and technical controls over their computer networks and systems. As of November 2018, 688 of the security-related recommendations had not been implemented. Since fiscal year 2010, GAO has made 1,242 recommendations to OMB and agencies to address shortcomings in IT acquisitions and operations. Since fiscal year 2010, GAO also has made over 3,000 recommendations to federal agencies to improve the security of federal systems. These recommendations include those to improve the implementation of CIO responsibilities, the oversight of the data center consolidation initiative, software license management efforts, and the strength of security programs and technical controls. Most agencies agreed with the recommendations, and GAO will continue to monitor their implementation.", "document_type": "gao"}
{"report": "Marine debris originates from multiple sources and types of materials, entering the marine environment in a variety of ways, as shown in figure 1. Most plastics do not biodegrade, that is, decay naturally and become absorbed by the environment. Instead, plastics slowly break down into smaller and smaller fragments, eventually becoming what are known as microplastics. Microplastics are very small pieces of plastic that are generally less than 5 millimeters in size (about the size of a sesame seed). The formation of microplastics occurs when plastic debris is exposed to sunlight and the plastic begins to weather and fragment. Microplastics have been found in the stomachs of numerous aquatic organisms including insects, worms, fish, and clams, according to a 2018 study. A study from 2011 showed that once animals ingest microplastics, they can be stored in tissues and cells, providing a possible pathway for the accumulation of contaminants and potentially harming the animals. pots, and other recreational or commercial fishing equipment that has been lost, neglected, or discarded in the marine environment. According to the Global Ghost Gear Initiative, at least 640,000 tons of derelict fishing gear enters the ocean each year, a weight equivalent to two Empire State Buildings. Derelict fishing gear may entrap sea life, adversely affect marine habitats, present hazards to navigation, and cause other harmful effects (see fig. 2). For example, according to a 2015 NOAA report, derelict fishing gear threatens a variety of fish, turtles, seabirds, whales, and seals, and may be especially problematic for endangered and protected marine species. Abandoned and derelict vessels. Abandoned and derelict vessels are vessels without identified ownership, in significant disrepair, or both. There are thousands of such vessels in ports, waterways, and estuaries around the United States that have been left to deteriorate by the owner or operator or are the result of a catastrophic weather event, according to NOAA documents. Abandoned and derelict vessels can impede marine transportation by blocking navigable waterways, and, if not visible or well-marked, could pose collision risks to vessel operators. These vessels may also become sources of pollution since they may contain fuel oil or other hazardous materials that can leak into the water as the vessels deteriorate, impacting the local community, marine life, and nearby habitat. Marine debris has garnered increasing interest from the international community. In September 2015, the United Nations General Assembly unanimously adopted an agenda with a set of global sustainable development goals through 2030. One of the goals (goal 14) calls for conservation and sustainable use of the oceans, seas, and marine resources, and includes a target for prevention and significant reduction of marine pollution of all kinds, including marine debris, by 2025. In June 2018, five members of the Group of Seven and the European Union endorsed the Group’s Ocean Plastics Charter, which committed them to accelerating implementation of the Group of Seven Leaders’ Action Plan to Combat Marine Litter, previously agreed to in 2015. The United States and Japan were the two members of the Group of Seven that did not endorse the charter. Also, in May 2019, the parties to the Basel Convention on the Control of Transboundary Movements of Hazardous Waste and Their Disposal adopted a decision that would, beginning January 1, 2021, require parties to take appropriate measures to ensure that certain plastic waste is reduced to a minimum, taking into account social, technological and economic aspects, among other things. The Marine Debris Act governs the activities of the interagency committee. For example, it required the interagency committee to issue a report to Congress that included recommendations to reduce marine debris domestically and internationally. In 2008, the committee submitted an interagency recommendation report that contained 25 recommendations intended to guide the federal government’s strategies for addressing marine debris (see appendix II for a list of the 25 recommendations). The recommendations were categorized by an overarching topic, such as education and outreach or cleanup. Within each category, the committee then identified specific recommendations. For example, within the education and outreach category, the committee specified three recommendations: Demonstrate leadership by distributing educational materials to personnel on the sources and impacts of marine debris as well as methods for prevention with the goal of reducing the federal contribution to marine debris. Support public awareness campaigns by providing technical expertise and educational materials and by encouraging private sector participation, when appropriate. Engage and partner with state, local, tribal and nongovernmental entities to support coordinated events, such as Earth Day, the International Coastal Cleanup, and other activities that have relevance to marine debris. The act also requires the interagency committee to submit biennial reports to Congress that evaluate progress in meeting the purposes of the Marine Debris Act. Specifically, these biennial reports are to include: the status of implementation of any recommendations and strategies of the committee and analysis of their effectiveness, and estimated federal and nonfederal funding provided for marine debris and recommendations for priority funding needs. Starting in 2010, the interagency committee has issued five biennial reports to Congress, issuing its most recent report in March 2019. The Marine Debris Act designates six federal agencies as interagency committee members. The six agencies are NOAA, EPA, U.S. Coast Guard, U.S. Navy, Department of State, and Department of the Interior. The act also specifies that the committee shall include senior officials from other federal agencies that have an interest in ocean issues or water pollution prevention and control as the Secretary of Commerce determines appropriate. The act designates the senior official from NOAA to serve as the chair. The interagency committee coordinates primarily through quarterly meetings where agencies share information about their individual activities related to addressing marine debris. Such activities range from education and outreach to research and technology development and are generally driven by the missions and authorities of the agencies. However, we found that NOAA has not established a process to determine the committee’s membership. In addition, the Marine Debris Act requires the interagency committee to include a “senior official” from member agencies, but NOAA has not determined the level of official it would consider senior. The interagency committee coordinates primarily through quarterly meetings where federal agencies share information about their individual marine debris-related activities. According to its charter, which was last revised in 2014, the committee is responsible for sharing information, assessing and implementing best management practices, and coordinating interagency responses to marine debris. The charter states that the interagency committee will ensure the coordination of federal agency marine debris activities nationally and internationally as well as recommend research priorities, monitoring techniques, educational programs, and regulatory action. The charter also states that the interagency committee will work to consider the interests of nongovernmental organizations, industry, state governments, Indian tribes, and other nations, as appropriate. NOAA officials said the main focus of the interagency committee has been to serve as an information-sharing body. The officials said they also seek opportunities to collaborate on individual projects, but the committee does not otherwise collaborate on activities, beyond compiling statutorily required biennial reports. NOAA officials explained that individual agencies each have a unique set of authorities and missions that largely determine their role and involvement in marine debris-related issues. For example, under its Marine Debris Program, NOAA conducts a variety of education, outreach, research, and other activities to identify sources of and address marine debris. In recent years, congressional committee reports accompanying NOAA’s annual appropriations have directed the agency to spend a certain amount of its appropriations on its marine debris program. Specifically, these reports directed NOAA to spend $7 million in fiscal year 2018 and $7.5 million in fiscal year 2019 for its Marine Debris Program. The program is also authorized to award grants to, and enter into cooperative agreements and contracts with, eligible entities to identify the sources of, prevent, reduce, and remove marine debris. In contrast, officials from other agencies on the interagency committee said their agencies have not received such direction or specific appropriations to address marine debris. Rather, the activities these agencies have conducted generally tie to their authority or agency mission. For example, EPA officials said they have relied on voluntary partnerships with states, industry, and other sources and leveraged existing funds from related programs, such as the agency’s stormwater and water quality programs, to support its Trash Free Waters Program. This is a program that encourages collaborative actions by public and private stakeholders to prevent trash from entering water. EPA officials said they also support a number of other activities related to education, outreach, and research, and these activities are a high priority for the agency, but EPA does not have a line item in its budget dedicated to marine debris activities. The interagency committee’s biennial reports describe general types of activities individual agencies reported conducting—often in coordination with nonfederal partners such as nongovernmental organizations, industry, states, Indian tribes, and other nations—to address marine debris, which include activities in the following categories: (1) education and outreach; (2) legislation, regulation, and policy; (3) cleanup; (4) research and technology development; and (5) coordination (see table 1 for descriptions of types of activities in each category; see app. III for specific examples of activities carried out by agencies). To help agencies share information, NOAA chairs quarterly meetings where agencies are invited to discuss their individual activities. In reviewing meeting minutes, we found that the meetings were generally well-attended by representatives from multiple agencies. During the meetings, officials discussed marine debris issues and some provided updates on their agencies’ activities. For example, at the April 2019 meeting, officials discussed ways in which different agencies may be meeting the sense of Congress on international engagement in the Save our Seas Act of 2018. At the May 2018 meeting, officials from NOAA and U.S. Coast Guard gave presentations on their agencies’ emergency response authorities and efforts. NOAA officials described their actions in response to Hurricanes Harvey, Irma, and Maria in 2017, which included coordinating debris removal activities across federal and state agencies, such as EPA and Florida State’s Department of Environmental Protection. U.S. Coast Guard officials also presented information on their marine debris removal activities in response to Hurricanes Irma and Maria. These activities included coordinating with multiple federal, state, and local agencies and contractors to remove or mitigate potential environmental impacts from 2,366 damaged or derelict vessels in Florida and the Florida Keys after Hurricane Irma and 377 vessels in Puerto Rico and the Island of Vieques after Hurricane Maria, according to U.S. Coast Guard officials. The interagency committee has also used its quarterly meetings to identify opportunities for collaboration among federal agencies and with nonfederal partners, according to NOAA officials. For example, during committee meetings in early 2018, NOAA, the National Park Service, and the Department of State identified an opportunity to collaborate with the German government to bring the Ocean Plastics Lab to the United States. This Lab is an international traveling exhibition that explains the role of science in helping to understand and address plastic pollution in the ocean. NOAA officials said that to collaborate on this effort, officials from three federal agencies served on a steering committee, leveraged volunteers, promoted the Ocean Plastics Lab through outreach efforts to the public and helped staff the exhibits while they were on display in Washington, D.C., during the summer of 2018. We found that NOAA has not established a process to determine interagency committee membership. The Marine Debris Act designates six federal agencies as members of the committee, and also specifies that committee members shall include senior officials from other federal agencies that have interests in ocean issues or water pollution prevention as the Secretary of Commerce determines appropriate. The committee’s 2014 charter lists five agencies as members in addition to the six identified in the act, for a total of 11 member agencies. The charter also states that the committee consists of representatives from “any other federal agency that has an interest in ocean issues and water pollution prevention and control,” but does not specify the process for documenting membership or how the Secretary of Commerce, or a delegate of the Secretary, will determine that such membership is appropriate, as required by the act. Various information sources, such as the committee’s biennial reports and minutes from quarterly meetings, have provided differing lists of committee member agencies. For example, the committee’s March 2019 biennial report and NOAA’s website as of July 2019 listed the 11 agencies identified in its charter as members. But, various meeting minutes from meetings held in fiscal year 2019 listed up to 13 members. One agency, the U.S. Agency for International Development (USAID), has regularly attended the committee’s quarterly meetings since early 2018 when USAID officials said they were invited to participate on the committee. USAID officials said that their understanding is that USAID is a member of the interagency committee and that this is especially important to recognize given their significant international development assistance related to marine debris over the last few years. However, USAID is not listed as a member on NOAA’s website and the agency’s marine debris-related activities are not included in the committee’s 2019 biennial report. As a result, some agencies may not be included in the required biennial reports on the committee members’ marine debris activities. In April 2019, NOAA officials told us that USAID was a contributing member to the interagency committee. The officials said that “official” member agencies are those six agencies designated by the Marine Debris Act and that they consider other participating agencies as “contributing” members. They said it has been the practice of the interagency committee to enable participation and coordination with other agencies, including those who may not be designated as official members. We found that NOAA does not have a documented process for determining membership on the interagency committee. NOAA officials were unable to locate records from 2006 or earlier documenting the addition of contributing agencies to the committee or the Secretary, or a delegate of the Secretary, making a determination of the appropriateness of such agencies being members. NOAA officials stated the need for the agency to establish a documented process to determine the appropriateness of federal agencies being committee members. The officials said they have started working with NOAA’s General Counsel to formalize and document the committee’s membership process, and that the process will include a step for the Secretary of Commerce, or a delegate of the Secretary to determine the appropriateness of additional agencies being members. However, NOAA officials did not have an estimated time frame for developing such a process. Our past work on interagency collaboration has identified the importance of ensuring that relevant participants have been included in the collaborative effort. By establishing a time frame for developing a documented membership process, NOAA and the interagency committee can benefit from capturing all members’ activities, and ensuring it provides Congress a complete picture of marine debris efforts across the federal government. In addition, the Marine Debris Act requires the interagency committee to include a “senior official” from member agencies, but NOAA has not determined the level of official it would consider senior. The interagency committee’s charter states that the committee will be composed of “federal agency managers and technical experts,” but does not define what is meant by senior official. NOAA officials said that the level of engagement from agency officials has varied over time and often depends on the specific officials participating. The officials said they have had difficulty in the past getting some member agency officials to engage during quarterly meetings and often those that do participate are not decision makers. Specifically, for some agencies, participating officials may not represent the entire agency, but rather a program within the agency, and they may not have decision-making authority, according to NOAA officials. As a result, the officials may not be able to commit agency resources, or they may be uncertain what activities their agency may be able to commit to. NOAA officials said that it may be helpful to specify the level of official needed to represent the agencies on the interagency committee. The officials said that they have been discussing potential revisions to the interagency committee’s charter, and within that broader discussion they are looking into whether the charter should specify what level of official is needed. However, NOAA officials did not have an estimated time frame for revising its charter or determining what those revisions may entail. Our past work on interagency collaboration has identified the importance of ensuring that participants have full knowledge of the relevant resources in the agency, including the ability to commit resources for their agency. By clarifying what is meant by “senior official” such as through revisions to its charter, NOAA would have greater assurance that it has the full engagement of member agency officials who can speak for their agency and commit to activities. While the interagency committee’s biennial reports provide information on marine debris-related activities of individual agencies, our review found that they do not contain certain required elements. As previously noted, the Marine Debris Act requires the biennial reports to include (1) the status of implementation of any recommendations and strategies of the committee and analysis of their effectiveness, and (2) estimated federal and nonfederal funding provided for marine debris and recommendations for priority funding needs. However, we found that the biennial reports did not include an analysis of the effectiveness of the recommendations implemented or recommendations for priority funding needs. The five biennial reports the interagency committee issued from 2010 to 2019 lay out the committee’s 2008 recommendations along with a description of activities taken by individual member agencies related to those recommendations. Specifically, each biennial report references the 25 recommendations the committee first adopted in its 2008 interagency recommendation report, organized into categories (see app. II). The reports then provide a description of activities taken by individual member agencies that fell within the recommendation categories for each preceding 2-year period. However, we found that the five biennial reports do not include an analysis of the effectiveness of the implementation of the committee’s recommendations and strategies as required by the Marine Debris Act. Some of the descriptions of agencies’ activities include information on the number of people reached through education or outreach efforts or other quantitative information related to specific activities, but the reports do not include an analysis of the effectiveness of those activities. NOAA and EPA officials confirmed that the interagency committee did not include an analysis of effectiveness in its biennial reports, stating that undertaking such an effort is beyond the scope of the information-sharing focus of the interagency committee. NOAA officials said that they have attempted to bring member agencies together to discuss how the committee could analyze the effectiveness of its collective efforts, but this has been a challenge because each member has its own priorities and legal authority related to addressing marine debris. Activities to implement the committee’s 25 recommendations occur at each individual agency, rather than at the committee level, according to the officials. As such, NOAA officials said each member agency may evaluate the effectiveness of its individual activities and pointed to measures NOAA has in place to evaluate its Marine Debris Program. For example, NOAA estimates the amount of debris removed annually and the number of students it reaches through education and outreach efforts. EPA officials said that determining a baseline and quantifying the results of specific marine debris efforts to determine effectiveness is challenging, as is the case for other broad, nonpoint sources of pollution. For example, trash enters water bodies through innumerable water and sewer system outfalls, so EPA may focus on strategies to change people’s behavior to minimize trash from entering the systems (see fig. 3). But unlike measuring emissions from a smokestack, it is difficult to determine a baseline and then measure and demonstrate progress in terms of trash reduction exiting through the system outfalls. EPA officials said they recognize the need to measure the effectiveness of their efforts related to marine debris—especially as addressing marine debris has become a high priority for the agency—but measuring progress has yet to be determined across all of its various offices and programs that carry out marine debris-related activities. Within the Trash Free Waters program specifically, EPA officials said they take steps to evaluate the effectiveness of the program through a variety of means, such as seeking feedback from stakeholders. Our past work has shown that collaborative entities—including those addressing complex, cross-cutting issues—can better demonstrate progress and identify areas for improvement if they develop a means to monitor, evaluate, and report the results of their collective efforts. Developing such a means would help the interagency committee ensure that its member agencies are using their authorities and aligning their priorities in the most effective manner possible. Moreover, developing and implementing a process to analyze the effectiveness of the interagency committee’s recommendations and strategies, and reporting the results in its biennial reports as required by the Marine Debris Act would better position the committee to determine the extent to which its efforts are making a difference in addressing the complex facets of marine debris. The five biennial reports include some estimates of funding for marine debris-related activities, but do not identify recommendations for priority funding needs as required by the Marine Debris Act. Specifically, we found that the reports included estimates for some member agencies’ spending related to their marine debris-related activities and estimated nonfederal spending for certain activities. The reports also state that several member agencies conduct activities within multiple programs, offices, and projects indirectly related to marine debris efforts. These agencies do not receive annual appropriations specifically for marine debris activities but instead receive appropriations to fulfill their missions or implement programs, making it difficult to estimate exact spending related to marine debris, according to the reports. The 2019 biennial report states that the interagency committee’s recommendations for priority funding needs are reflected in the President’s budget request and operating plan for each member agency in any given fiscal year. NOAA officials said that it would be difficult to identify and communicate priority funding needs outside of these documents, particularly given the complications associated with estimating each agency’s individual spending. For example, an EPA official said that EPA’s efforts to address marine debris are decentralized and the agency does not receive an appropriation specifically for marine debris-related activities, making it difficult to determine how much the agency spends—or may need to spend—on marine debris. Moreover, NOAA and EPA officials said that because the interagency committee serves primarily as an information-sharing body and each member agency operates independently in identifying resource needs, the interagency committee has not needed to develop a process to identify recommendations for priority funding needs. However, the Marine Debris Act requires the interagency committee to include recommendations for priority funding needs in its biennial reports, and without a process to identify such recommendations, the interagency committee cannot meet that requirement. Our past work on leading collaborative practices has shown the importance of identifying and leveraging resources, such as funding, in collaborative efforts. By developing a process to identify recommendations for priority funding needs in its biennial reports, the interagency committee could provide Congress with required information about priority funding needs across the federal government to address marine debris. The 14 experts we interviewed with expertise in marine debris-related issues suggested a range of actions that the federal government could take to most effectively address various types of marine debris. Their suggestions included increasing or improving actions already being taken by some federal agencies as well as taking new actions. The experts stressed that there is not one solution to the growing, multi-dimensional problem of marine debris. Rather, they said that a multitude of actions involving federal agencies and nonfederal partners—such as international, state and local governments, Indian tribes, industry, and environmental groups—will need to be taken to address the issue. Experts as well as agency officials we interviewed indicated that there would be a number of factors to consider in evaluating the suggested actions. Some of these factors are overarching, applying to most or all of the actions; others relate to specific actions. For example, several experts and agency officials said that competing priorities and limited resources would be important factors to consider related to all of the suggested actions. Several agency officials also said that their agencies may not have the authority to take some of the actions suggested by the experts, and therefore new legislation would need to be enacted before they could take those actions. Additionally, some actions could result in impacts or costs to particular industries, underserved communities, or consumer groups, and understanding and identifying ways to mitigate such impacts would be important. Moreover, several agency officials said some actions, such as those related to waste management, may be better suited for local or state governments and that those entities would be better- equipped to deal with particular aspects of marine debris. The following are examples of actions the experts suggested that the federal government could take. We organized the actions into the following five categories, which generally correspond to the categories laid out in the interagency committee’s reports: (1) education and outreach, (2) establishment of federal requirements or incentives, (3) cleanup, (4) research and technology development, and (5) coordination. Seven of the 14 experts suggested actions to educate or conduct outreach to the public or specific consumer or industry groups or international governments about ways to prevent, reduce, mitigate, or clean up waste that can become marine debris. A few experts emphasized that education and outreach efforts should be focused on ways to prevent trash from entering the marine environment. Examples of education and outreach actions suggested include: Domestic education and outreach. Five experts suggested different types of education or outreach campaigns the federal government could undertake to target certain domestic groups, such as consumers. One expert suggested that the federal government develop a national campaign to educate the public about marine debris. Such a campaign would develop a single message that various entities, including federal agencies and nonfederal stakeholders, could include in advertisements, social media, and other public awareness efforts. The expert pointed to similar state-led campaigns, such as “Nobody Trashes Tennessee,” a litter campaign developed by Tennessee’s Department of Transportation. This state campaign features celebrities, such as athletes and musicians, in advertisements and involves selling stickers, hats, and other items to help spread the message. However, the expert said that securing collaboration and agreement on a single message across federal agencies and nonfederal stakeholders could pose a challenge and that a national campaign would need a long-term commitment from all parties to be successful. NOAA officials said that national campaigns can be expensive and demonstrating results from such efforts can be difficult, especially when they are broad in nature. As a result, these officials said that NOAA’s Marine Debris Program targets its education and outreach efforts to a specific audience for a particular type of behavior change or type of debris, such as educating and training high school students to lead “Zero Litter Campaigns” in their schools and communities. International outreach. Two experts suggested actions the federal government could take to conduct outreach internationally to promote programs, policies, or technologies that can reduce marine debris. For example, one expert suggested the federal government conduct outreach to government officials in countries that have limited waste management infrastructure to demonstrate effective waste management technologies. The expert said that the federal government could partner with private sector companies to demonstrate waste-to-energy technologies, such as gasification and pyrolysis that can convert plastic waste to fuel. According to the expert, demonstrating such technologies would provide information on its benefits, including reducing sources of waste and creating a source of energy to either use or sell. Several agency officials we interviewed agreed that international outreach efforts are critical to successfully addressing marine debris and that emphasis should be placed on assisting countries with improving their waste management practices. However, these officials said there are many factors to consider with regard to waste-to-energy technologies. For instance, State Department officials said such technologies may not be supported by civil organizations because of environmental concerns. Waste-to-energy technologies could also entail high upfront capital investments, and waste-to-energy facilities should adhere to strict environmental standards with monitoring and enforcement to help ensure the technology is not causing negative effects, according to agency officials. As a result, they said it may not be practical for some countries to adopt such technologies. In addition, USAID officials said that promoting waste-to-energy technology presupposes that waste is already being collected in sufficient quantity and quality to serve as a fuel for such technology, but that in some countries waste is openly dumped or burned and therefore sufficient waste may not be available. They cautioned that waste-to-energy technologies can be a part of a response to address marine debris abroad, but would not be sufficient alone. Microfibers are a widespread type of microplastic; they have been found on the shorelines of six continents and in oceans, rivers, soils, table salt, and public drinking water, according to scientific studies. Microfibers enter the marine environment through various pathways. For example, microfibers are shed from synthetic clothing and other materials made of polyester and nylon. These microfibers pass through to waterways because washing machines and wastewater treatment plants typically do not have processes sufficiently refined to remove the fibers. Little is known about other potential sources of microfibers, such as carpet manufacturing; the rate of generation, such as how quickly materials break down and shed microfibers; and any health impacts to humans or wildlife. federal requirements for manufacturers to design certain products to minimize the chances of material becoming marine debris. For example, two experts suggested the federal government develop design standards for washing machine manufacturers to ensure filters are designed to prevent microfibers from entering wastewater systems and then the marine environment. Three experts suggested the federal government develop design standards to require or incentivize manufacturers to use specific amounts of post-consumer material in developing certain products. For example, one expert recommended requiring the manufacturers of plastic beverage bottles to produce bottles using at least a minimum amount of recycled plastic. According to the expert, this would increase the demand for recycled plastic as a raw material, which in turn would reduce the likelihood that such plastic would end up as waste. The expert said that requiring the use of recycled plastic would likely impose increased costs on manufacturers because virgin plastic—the raw material typically used in producing plastic beverage bottles—is currently less expensive than recycled plastic. Such increases would likely be short term, however, because the increased demand would decrease the price after more of the recycled material is used, according to another expert. Some federal agency officials said that establishing such proposed federal design standards could be difficult due to limited existing statutory authorities. Requirements for fishing gear. Three experts suggested the federal government establish requirements to mitigate the impact of lost or derelict fishing gear in federal waters. For example, one expert suggested requiring the use of modified fishing gear, such as crab traps with biodegradable escape mechanisms that allow entrapped marine life to escape if the trap is lost or abandoned (see fig. 4). Requiring the use of fishing gear with biodegradable escape mechanisms would likely impose increased costs to the fishing industry, according to the expert, but those costs could be minimized if the federal government offered a subsidy to help purchase required gear. NOAA officials said that it would be challenging to require the use of certain types of fishing gear in part because of the cost to the federal government in ensuring implementation of the requirement. On the other hand, NOAA officials said they promote innovation and voluntary use of certain types of fishing gear through various efforts such as their Fishing for Energy program. Restrictions on single-use plastics. Four experts suggested that the federal government establish restrictions on the manufacturing or sale of certain single-use plastics. For example, the federal government could establish restrictions on the manufacturing and distribution of plastic bags in the form of thickness or material composition requirements, or production volume limits. Two of these experts also said that the federal government could review existing local, state, and international efforts to restrict single-use plastics to identify best practices so that these types of actions could potentially be scaled appropriately at the federal level. According to the United Nations Environmental Programme, 127 countries and two states have placed various types of restrictions on the retail distribution of plastic bags as of 2018. One expert pointed to research that shows that plastic bags are one of the most abundant forms of marine debris and suggested that banning them would therefore significantly reduce the amount of debris entering the marine environment. NOAA officials agreed that restricting the sale of single-use plastic bags could help address the marine debris problem, but said that identifying an agency with sufficient legal authority to be responsible for implementing and enforcing any restriction would be important and could be a challenge at the federal level. NOAA and EPA officials said that it would be important to carefully determine and assess trade-offs or other potential impacts before considering these types of restrictions. Single-use plastics are any plastic items— such as plastic soda or water bottles—that are intended for use only once before they are thrown away or recycled as defined by the United Nations Environment Programme. Single-use plastics can have environmental impacts when they are left in the marine environment. For example, single-use plastics may be ingested by hundreds of species of marine wildlife, such as turtles and dolphins, who mistake them for food, potentially blocking their airways and stomachs, according to a 2018 report by the United Nations Environment Programme. Incentives for waste management. Four experts suggested actions the federal government could take to provide incentives to local governments to help them improve their waste management and recycling programs. The experts said that waste and water management is typically the responsibility of local governments, but that given the scope and scale of the marine debris problem, the federal government could use its resources to provide incentives to help local governments make improvements. For example, the federal government could provide grants or subsidies to help local governments implement best management practices, such as using trash traps to help remove debris from waterways and prevent it from becoming marine debris. In addition, the experts said that the federal government could provide local governments with resources to help purchase bins with lids to help prevent inadvertent loss of waste or to pay for infrastructure such as trucks and recycling facilities to improve the collection and recycling of waste. According to one expert, transporting materials from consumers to the appropriate waste management or recycling facilities is a significant barrier to achieving better waste management. EPA officials agreed with the importance of local waste management efforts. The officials emphasized that it is the agency’s mission, in part, to address management of waste to prevent trash, and management of water that carries the trash to the marine environment. The officials said that this is particularly critical for addressing marine debris since an estimated 80 percent of aquatic trash originates from land-based sources. The officials said the agency has provided some funding to local governments to implement mechanisms to capture trash before it enters waterways or to remove trash from water. They added that there is no one size fits all approach, however, to working with local governments. Rather, different localities may have differing needs—such as for funding, information, or technical assistance—and EPA tries to create a climate where localities can identify and best address those needs, according to the officials. Five of the 14 experts suggested the federal government support marine debris cleanup and removal activities by providing resources to organizations that coordinate cleanup projects (see fig. 5). Several agency officials said that preventing waste from entering the marine environment should be the primary focus of addressing marine debris, but cleaning up existing marine debris continues to be a critical part of the multi-faceted response to the problem, especially after severe weather events such as hurricanes. According to one expert, debris deposited into the marine environment around the Florida Keys after Hurricane Irma in 2017 included construction debris from demolished buildings, household items such as refrigerators and televisions, cars, and boats, among other types of debris. The expert suggested the federal government provide funding and technical assistance to state and local governments to help locate such debris. According to the expert, after a severe weather event, the distribution of debris can vary greatly with ocean and wind currents, and the debris can extend for miles into the ocean. As a result, the expert suggested that the federal government assist with conducting aerial flyovers to locate major concentrations of debris. The flyovers would employ mapping technology, such as global positioning system equipment and cameras, to locate and map the debris for removal. NOAA officials agreed with the importance of cleanup activities, particularly after severe weather events. In 2018, NOAA provided $18 million to states for the detection, removal, and disposal of debris after the 2017 hurricanes. Ten of the 14 experts suggested actions related to research or technology development. A few experts commended federal research efforts related to marine debris to date but stressed that additional research is needed in multiple areas. Examples of research and technology development actions suggested by experts include: Research on sources, pathways, and location of marine debris. Five experts suggested the federal government support research on identifying and understanding the various sources, pathways, and location of marine debris. For example, one expert suggested that the federal government conduct a national study to identify where waste is generated, through which types of major pathways it enters the marine environment (such as rivers or stormwater), and where the waste ends up. This study could include a focus on specific pathways, such as where illegal dumping occurs, which has not been researched at the national level, according to the expert. The expert said that federal agencies and others could use the results of such a study to help target education for the public, policy makers, and law enforcement officials on how to prevent and properly dispose of the types of waste that most commonly end up as marine debris. NOAA officials said that illegal dumping tends to be localized, so it may be difficult to carry out research on a national scale, but agreed with the need to better understand sources and types of marine debris since many factors contribute to the problem. Research on effects of marine debris. Four experts suggested the federal government support research to determine the effects of debris on wildlife and the marine environment as well as on human health. For example, one expert suggested that the federal government conduct or fund research to determine the effects of microplastics on human health to help the federal government and other stakeholders identify the most appropriate solutions. EPA officials said that this type of research is one among many competing areas related to marine debris research their agency has targeted. Development of technology to address marine debris. Five experts suggested actions that the federal government could take to develop new technology to help address marine debris. For example, one expert suggested that the federal government fund the development of new technology to recycle hard-to-recycle plastic materials so that these materials are less likely to end up as waste and become marine debris. The expert said that, in particular, plastic materials such as packaging used to preserve food products are not readily recyclable because the technology to recycle these types of plastics is not available or is not economically viable. EPA officials said that even when there is technology to recycle these types of plastics, food contamination is a problem that may prevent them from being recycled. In addition, an increased capacity for recycling may not result in a behavior change on the part of the consumer, which is another factor to consider in evaluating whether to pursue this type of action, according to the officials. Nine experts suggested that the federal government coordinate with local, state, federal, and international governments and other nonfederal partners to address marine debris. Experts emphasized that because marine debris is a complex issue with domestic and international impacts, it requires contributions from and coordination across these many groups. Examples of coordination suggested by experts include: Coordination with stakeholders on management of fishing gear. Two experts suggested the federal government coordinate to identify ways to prevent fishing gear from becoming a source of marine debris and causing harm to fish and other marine species. One expert suggested the federal government coordinate with stakeholders to identify and implement best management practices for responsible management and use of fishing gear. Specifically, the expert suggested that the federal government coordinate with state agencies, gear designers and manufacturers, fishermen, and other stakeholders to adopt best practices in particular locations such as in the Chesapeake Bay or Puget Sound where there are extensive commercial or recreational fisheries. The expert said it would be important to work with industry stakeholders to avoid the best practices being perceived as unnecessary government intervention. In addition, one of the experts said that adoption of best practices could incur additional costs for activities such as replacing gear, which could be minimized through government subsidies or other incentives. NOAA officials said these types of coordination activities align with current efforts within their Marine Debris Program. For example, in 2016 NOAA partnered with California State University and other stakeholders to encourage the adoption of best practices to prevent the loss of gear used to catch spiny lobster in the Channel Islands in California. Coordination with international governments. Four experts suggested the federal government increase its coordination internationally such as through developing international agreements and participating in multinational forums. For example, one expert suggested that the United States and other countries enter into an international agreement to prevent further release of plastic into the ocean. Under such an agreement, each country would set a target to reduce the amount of plastic released into the ocean, develop strategies and approaches to meet that target, and measure and report on progress in meeting the target. The expert said that taking actions to meet the target would incur costs and that securing commitments from countries could be difficult. However, the expert said that allowing countries the flexibility to develop their own strategies for meeting their targets could help overcome these difficulties. State Department officials said that in addition to coordination with international governments, coordination is needed with other key stakeholders such as waste management and marine debris experts, local leaders, private-sector industry and retail entities, and nongovernmental organizations. This is in part because so much of the international marine debris problem stems from waste management issues at the local level. In some countries, as in the United States, the government may not have the authority to work on waste management at the local level and as a result, understanding this complexity is an important factor to consider in coordinating internationally, according to the officials. USAID officials agreed that coordination with international stakeholders beyond international governments is needed and said that given the local nature of waste management issues that contribute to the international marine debris problem, stakeholders such as local and municipal governments are also important and should be a major focus for coordination and capacity building. Marine debris is a global, multi-faceted problem and multiple federal agencies, along with nonfederal stakeholders such as nongovernmental organizations, industry, states, Indian tribes, and others, have important roles to play in addressing the problem. The interagency committee’s sharing of information about its members’ activities is a good first step to ensure the agencies are aware of their respective marine debris-related efforts. NOAA, as chair of the committee, has recognized the need to develop a documented membership process, but has not established a time frame for doing so. By establishing a time frame for developing a documented membership process, NOAA and the interagency committee can benefit from capturing all members’ activities, and ensuring it provides Congress a complete picture of marine debris efforts across the federal government. NOAA also recognizes that it may be helpful to specify the level of the official needed to represent the agencies through revisions to its charter, but has not determined what those revisions may entail. By clarifying what is meant by “senior official” such as through revisions to its charter, NOAA would have greater assurance that it has the full engagement of member agency officials who can speak for their agency and commit to activities. The interagency committee’s biennial reports provide information on the committee’s recommendations and individual agencies’ activities to implement those recommendations, but the reports do not include an analysis of the effectiveness of the committee’s recommendations and strategies as required by the Marine Debris Act. By developing and implementing a process to analyze the effectiveness of the interagency committee’s recommendations and strategies, and reporting the results in its biennial reports as required, the interagency committee would be in a better position to determine the extent to which its efforts are making a difference in addressing the complex facets of marine debris. Additionally, the interagency committee has not identified required recommendations for priority funding needs. By developing a process to identify recommendations for priority funding needs and including such recommendations in its biennial reports, the interagency committee could provide the Congress with required information about priority funding needs across the federal government to address marine debris. We are making a total of four recommendations, including two recommendations to the NOAA Administrator and two recommendations to the chair of the interagency committee, specifically: The NOAA Administrator, in coordination with interagency committee member agencies, should establish a time frame for documenting the committee’s membership process. (Recommendation 1) The NOAA Administrator, in coordination with interagency committee member agencies, should clarify what is meant by “senior official” in the Marine Debris Act, such as through revisions to its charter. (Recommendation 2) The chair of the interagency committee, in coordination with member agencies, should develop and implement a process to analyze the effectiveness of the interagency committee’s recommendations and strategies, and include the results in its biennial reports. (Recommendation 3) The chair of the interagency committee, in coordination with member agencies, should develop a process to identify recommendations for priority funding needs to address marine debris, and include such recommendations in its biennial reports. (Recommendation 4) We provided the Departments of Commerce, Defense, Homeland Security, Interior, Justice, and State; EPA; the Marine Mammal Commission; and USAID a draft of this report for their review and comment. The Department of Commerce and USAID provided written comments, which are reprinted in appendixes IV and V respectively, and discussed below. We also received technical comments from the Departments of Commerce, Homeland Security, the Interior, and State; EPA; the Marine Mammal Commission; and USAID, which we incorporated into the report as appropriate. The Departments of Defense and Justice indicated that they had no comments. In written comments from the Department of Commerce, Commerce and NOAA agreed with our four recommendations. Regarding our first two recommendations, NOAA stated that its Administrator will establish a time frame for documenting the interagency committee’s membership process and, in coordination with the interagency committee, will define the term “senior official” through revisions to its charter so that the term can be consistently applied across all federal agency structures. In forming its definition of “senior official,” NOAA indicated that it would consider seniority requirements of similarly situated advisory committees, along with related factors such as the ability to make decisions on behalf of an agency. Regarding our third recommendation on developing and implementing a process to analyze the effectiveness of the interagency committee’s recommendations and strategies, NOAA stated that it agreed with this recommendation to the extent it can be implemented with available budgetary resources. It indicated that the interagency committee lacks the existing resources to require and routinely evaluate the effectiveness of agency activities. Instead, individual agencies are expected to work toward implementing the interagency committee’s 2008 recommendations in accordance with each agency’s legal and programmatic authorities, mission priorities, and resource limitations. Nevertheless, NOAA stated that to the extent possible it will work with interagency committee members to identify common or easily translatable metrics for evaluating the effectiveness of its 2008 recommendations and include these in the next biennial report to Congress. Regarding our fourth recommendation, NOAA stated that it agreed with our recommendation, but noted that it does not have the authority to control the implementation of a process for identifying priority funding needs of other member agencies. It stated that the interagency committee’s recommendations for priority funding needs are already reflected in the President’s annual budget request and operating plan for each member agency. However, NOAA stated that to the extent possible, it will work with interagency committee members to develop a process for identifying priority areas, which can be reflected in each agency’s respective budgeting process and shared in the committee’s biennial reports. We agree that NOAA does not have the authority to control the implementation of a process for identifying priority funding needs of other member agencies. However, as chair of the committee, NOAA can coordinate with member agencies to develop a process that each individual member agency—under its individual authority and budgetary processes—can use to identify recommendations for priority funding needs to address marine debris. We believe that coordinating such information and providing it in the committee’s biennial reports could provide Congress with required information about priority funding needs across the federal government to address marine debris. In addition, in written comments from USAID, the agency said it is committed to addressing the challenge of marine debris through its programs and in collaboration with interagency committee partners. USAID stated that it has significant opportunities to play an important role in the international response to address marine debris and, as the lead federal agency on foreign assistance, has several programs that target mismanaged municipal waste in the developing world. For example, USAID stated that the agency’s Municipal-Waste Recycling Program has helped reduce land-based sources of ocean plastic waste in four of the top five contributing countries—Indonesia, the Philippines, Sri Lanka, and Vietnam—by providing small grants and technical assistance to a variety of local actors in towns and cities. USAID also stated that it greatly appreciates the work of its interagency committee partners in addressing marine debris and looks forward to continued collaboration with them. We are sending copies of this report to the appropriate congressional committees; the Secretaries of Commerce, Defense, Homeland Security, Interior, Justice, and State; the Administrators of EPA and USAID; and the Commissioners of the Marine Mammal Commission. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report examines (1) how the interagency committee coordinates among federal agencies and the process for determining membership and agency representation, (2) the extent to which the interagency committee’s biennial reports contain required elements, and (3) experts’ suggestions on actions the federal government could take to most effectively address marine debris. To examine how the interagency committee has coordinated among federal agencies and the process for determining membership and agency representation, we reviewed the Marine Debris, Research, Prevention, and Reduction Act, as amended (Marine Debris Act), and interagency committee documents, including the committee’s 2008 report with recommendations, charter, and five biennial reports to Congress issued as of March 2019. Specifically, we reviewed meeting minutes from the interagency committee’s quarterly meetings from November 2012 through April 2019, to understand the topics and activities the committee has coordinated on and the federal agencies that have participated. We attended five of the interagency committee’s quarterly meetings (in May, September, and December of 2018, and April and July of 2019) to directly observe committee coordination among agencies during these meetings. We also reviewed documents from committee member agencies and interviewed and reviewed written responses from those agencies to obtain information on their coordination efforts. Agencies we included were those agencies designated as members in the Marine Debris Act as well as additional agencies identified as members in the committee’s charter (see table 2). In addition, we interviewed officials and reviewed documents from the National Science Foundation, Office of the U.S. Trade Representative, and the U.S. Agency for International Development, based on suggestions from interagency committee officials. From the committee’s 2008 report with recommendations, the five biennial reports, and other member agency documents, we summarized activities conducted by member agencies. For reporting purposes, we selected examples from the 2016 and 2019 biennial reports (those most recently available) of activities the agencies have taken to illustrate interagency committee member efforts to address marine debris, to reflect a range of activities across categories of activities and member agencies. In addition, we compared information we received about the interagency committee’s coordination to leading practices we identified in our past work on implementing interagency collaborative mechanisms. To examine the extent to which the interagency committee’s biennial reports contain required elements, we compared information contained in the committee’s five biennial reports to the statutory reporting requirements in the Marine Debris Act. Specifically, two analysts independently reviewed each of the five biennial reports to evaluate information the reports included about (1) the status of implementation of any recommendations and strategies of the committee, (2) analysis of the recommendations and strategies’ effectiveness, (3) estimated federal and nonfederal funding provided for marine debris, and (4) recommendations for priority funding needs. The analysts then compared and summarized the results of their analyses. We also interviewed and reviewed written responses from National Oceanic and Atmospheric Administration (NOAA) officials (in the agency’s capacity as chair of the interagency committee) and officials from other members of the committee about steps to develop the biennial reports, including the reports’ required elements. In addition, we compared information from the reports and the information we received from the officials to leading practices we identified in our past work on implementing interagency collaborative mechanisms. To obtain suggestions on actions the federal government could take to most effectively address marine debris, we conducted structured interviews with a nongeneralizable sample of 14 experts with expertise in marine debris-related issues. We selected the experts from a list of individuals we identified through interviews with agency officials and through a snowball approach, in which we reviewed relevant literature on marine debris, such as articles the experts authored, to identify other key experts and asked experts to identify other experts for including in this review. We also identified experts through our participation in key marine debris events, such as presenting at the Sixth International Marine Debris Conference. We considered factors such as the individual’s experience with different types of debris (e.g., abandoned fishing gear or consumer debris) or association with various sectors (e.g., academia or industry). Experts selected included: (1) academics with expertise in areas such as sources, prevalence, and transport of plastic marine debris; (2) officials representing the plastic manufacturing, food and beverage, and commercial fishing industries; (3) officials from nonprofit organizations with expertise in marine debris removal from coastal areas, litter prevention, and recycling management systems and strategies; and (4) state and local government officials from the District of Columbia, Florida, and Washington with expertise in local litter prevention efforts, derelict vessels, and lost and derelict fishing gear. We asked the 14 experts to suggest up to 5 to 10 actions the federal government could take to most effectively address different types of marine debris. We defined the term “actions” to mean any policy, program, effort, or intervention that could be taken by the federal government to prevent, remove, or dispose of marine debris. Actions could include new actions that the federal government may not have implemented or actions the federal government may already have taken. We did not limit experts’ suggestions to actions that agencies currently have authority to implement. We do not take a position on the merits of, the necessary legal authority for, or the most appropriate entity for the actions suggested by the 14 experts. Prior to the interview, we provided experts with background information about our review, the interview methodology, and definitions for key terms to ensure that terminology was used consistently throughout all the interviews. We also reviewed this information with each expert at the start of the interview. For each action, we asked that the expert identify: Name of action; Type(s) of debris: (Select any or all of the following types of marine debris that may be affected by the action: consumer-based, abandoned fishing gear, derelict vessels, and/or miscellaneous. If miscellaneous is selected, please explain); Describe this action: (Briefly describe this action and how it will address (i.e. prevent, remove, or dispose) marine debris and if it is currently being implemented by the federal agencies); Federal agency(ies) (Please briefly describe the federal agency(ies) that have implemented or could play a role in implementing the action); Nonfederal partners: (Please briefly describe the nonfederal partners the federal agencies may need to coordinate with when implementing the action (such as international, state and local governments, nonprofit groups, industry, and/or researchers); Advantages: (Briefly describe the advantages of the federal agencies implementing the action in terms of the ability of this action to address marine debris, the cost of the action, and the technical and administrative feasibility of implementing the action, or any other advantage that you believe may affect implementation); Disadvantages: (Briefly describe the disadvantages of the federal agencies implementing the action in terms of the ability of this action to address marine debris, the cost of the action, and the technical and administrative feasibility of implementing the action, or any other disadvantage that you believe may affect implementation); Challenges: (Describe any factors that may hinder this action from being successfully implemented by the federal agencies and how these factors may be overcome); Examples: (In instances where the federal agencies have previously implemented the action, please provide examples of how it helped address marine debris. If other entities that are not federal agencies have successfully implemented the action, please provide examples of how the action helped address marine debris); Authorities: (Briefly describe what legal authorities these actions would be implemented under. If new authorities are needed, please describe them); and Support: (Provide any studies, reports, or research you are basing your responses on). We conducted the interviews via teleconference between July 2018 and November 2018. The experts suggested over 70 actions that we organized into five categories based on common themes. Specifically, two analysts independently reviewed each expert’s description for individual actions and identified an appropriate category using decision rules the team developed. The analysts then discussed and compared their decisions. For actions the analysts categorized differently, they reviewed the decision rules together and came to agreement on the best category for a particular action. For reporting purposes, we selected several actions within each of the broader categories to provide illustrative examples of the types of actions experts suggested. Our selection of actions was based on a variety of factors, including our analysis of the number experts that suggested similar types of actions, the detail provided by the experts, and the availability of supporting information, such as instances where an action had been taken by state or local governments. Actions suggested by the 14 experts cannot be generalized to actions that might be suggested by other experts but provide examples of actions federal agencies could take to address marine debris. We also obtained written and oral responses to questions we asked of agency officials regarding factors their agencies would need to consider in potentially implementing any of the actions identified by the 14 experts. In addition, to corroborate statements from experts and agency officials and provide additional context on marine debris, we reviewed scientific studies and documents from international organizations, such as the United Nations; academic institutions and nonprofit organizations such as the Ocean Conservancy; and federal and state agencies to understand what is known about the types, sources, and effects of marine debris. We identified these studies and documents through various means, such as recommendations from experts and agency officials and authorship by experts. We also interviewed individuals from academia, environmental groups, and industry actively working on marine debris issues and attended the Sixth International Marine Debris Conference held in San Diego, California, in March 2018, to gain an understanding of areas of emphasis in the marine debris community. We conducted this performance audit from October 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Table 3 lists the 25 recommendations contained in the Interagency Marine Debris Coordinating Committee’s 2008 report entitled Interagency Report on Marine Debris Sources, Impacts, Strategies, and Recommendations. According to this report, these recommendations are intended to guide the federal government’s strategies with respect to addressing problems of persistent marine debris. Each of the five biennial reports the committee issued subsequent to its initial 2008 report reference the 25 recommendations; the committee has not revisited the recommendations to determine the extent to which any adjustments may be warranted. The following are examples of activities members of the Interagency Marine Debris Coordinating Committee (interagency committee) reported conducting—often in coordination with nonfederal partners such as nongovernmental organizations, industry, state governments, Indian tribes, and other nations—to address marine debris based on information from the committee’s 2016 and 2019 biennial reports and agency documents and interviews. These examples include activities from the categories outlined in the biennial reports: (1) education and outreach; (2) legislation, regulation, and policy; (3) cleanup; (4) research and technology development; and (5) coordination. The examples discussed below do not represent all activities conducted by member agencies, but rather illustrate the nature and type of activities the agencies reported conducting. In addition, the examples include activities from agencies that were identified in the interagency committee’s 2014 charter and were included in the committee’s most recent biennial reports. Nine of the 11 member agencies reported conducting activities to support education and outreach related to addressing marine debris, such as developing and distributing educational materials, supporting public awareness campaigns, or partnering with or funding state, local, tribal, or nongovernmental education efforts. For example: Online public education. The Trash Free Waters Program—a program established in the spring of 2013 by the Environmental Protection Agency (EPA) to encourage collaborative actions by public and private stakeholders to prevent trash from entering water— provides information to the public, including online information about actions that can be taken to reduce trash from entering waterways. For example, in 2017, the program produced a series of eight webinars with experts on microplastics with the goal of promoting increased knowledge of the sources, distribution, and impacts of plastics and microplastics in the environment. Additional topics included research on global waste management and mismanagement of plastics, potential replacements for plastic products, and ways to improve the design of materials and products to minimize their environmental impacts. Grants for public awareness projects. The National Oceanic and Atmospheric Administration’s (NOAA) Marine Debris Program awards grants to eligible entities to, among other things, develop projects to educate the public about various aspects of preventing marine debris. For example, in 2014, NOAA awarded one grant to Virginia State’s Department of Environmental Quality to develop and implement a social marketing approach to reduce balloon debris. Balloons can end up in streams, rivers, and the oceans where marine animals can ingest the balloons or become entangled by their attachments, causing injury or death. This project aimed to help educate the public about the importance of refraining from releasing balloons in parks or outside schools, churches, wedding venues, or other events where balloons may be common. Sea Partners Program. Through its Sea Partners Program established in 1994, the U.S. Coast Guard Auxiliary conducts education and outreach to waterway users such as boaters, fishermen, marina operators, marine industry, and the general public with information on protecting the marine environment. For example, its Sayreville, New Jersey unit reaches an annual average audience of about 10,000 people, according to a program document, including youth groups, primary and secondary education science classes, senior citizen groups, and others. Topics presented include an introduction to marine pollution and oil spills and environmental pollution and recreational boating. Nine member agencies reported conducting activities to identify noncompliance or help ensure compliance with laws and regulations and develop or encourage policies and programs to implement practices that address specific types of marine debris. For example: Notice for offshore oil and gas operators. In November 2018, the Bureau of Safety and Environmental Enforcement renewed a notice for offshore oil and gas lessees and operators in the Gulf of Mexico that clarifies and provides more detail about marine trash and debris awareness training. Specifically, the notice stated that all offshore employees and contractors active in offshore operations are to complete marine debris awareness training annually. The notice further specifies that lessees and operators are to provide the bureau with an annual report that describes their training process and certifies that the training process was followed. Criminal enforcement of environmental laws. The Department of Justice prosecuted two shipping companies in 2017 for, among other things, falsifying records regarding disposal of garbage from a ship, in violation of the Act to Prevent Pollution from Ships. Specifically, the ship’s crew was instructed to throw plastic garbage bags filled with metal and incinerator ash overboard without recording the incidents in the ship’s record book. The companies pled guilty and were, among other things, sentenced to pay a $1.5 million fine and make a $400,000 community service payment. Policies for financing waste management infrastructure in Asia. The Department of State helped convene a meeting in Japan in 2016, under the Asia-Pacific Economic Cooperation framework, to discuss policy changes needed to overcome barriers to financing waste management infrastructure in the Asia-Pacific region to prevent and reduce debris from entering the marine environment. The meeting brought together government officials from the economic cooperation, representatives from industry, international financial institutions, and experts. Ministers of the economic cooperation endorsed nine recommendations developed at the meeting. State Department officials said they have continued to work with Asian governments, industry, and nongovernmental organizations to encourage policy changes and spur financial support for increasing waste management infrastructure and addressing land-based sources of plastic and in Asian countries. For example, at a 2017 meeting on waste management, State Department officials informed Asia-Pacific Economic Cooperation officials of the social and economic impacts of marine debris resulting from mismanaged waste in the region. Officials also said they used the meeting to connect economic cooperation officials with private sector stakeholders to encourage policy changes intended to enable private investment in waste management. Eight of the 11 member agencies reported conducting a variety of activities to support the removal and disposal of marine debris, often in partnership with others, such as state governments. For example: Debris removal grants. In 2016 and 2017, NOAA’s Marine Debris Program awarded $2.4 million in grants to 25 entities such as state and tribal governments in 17 coastal states and U.S. territories for projects including community cleanups, crab trap recovery, and derelict vessel removal. For example, in September 2017, the program awarded a grant to the Makah Indian Tribe to remove three sunken vessels from the Makah Marina within the Makah Tribe Indian Reservation on Washington’s Olympic Peninsula. National Park cleanup. National Park Service staff conducted coastal cleanups across the various regions of the National Park System during 2016 and 2017. For example, in fiscal year 2017, park officials from Biscayne National Park, located off the coast of Southern Florida and comprised mostly of water, partnered with the Coastal Cleanup Corporation, a nonprofit organization, to organize 252 volunteers in removing 14,000 pounds of debris from the park. Maintaining navigation channels. The U.S. Army Corps of Engineers has authority to remove accumulated snags, obstructions, and other debris located in or adjacent to federally-maintained navigation channels. The Corps’ operations and maintenance appropriation is available to pay for the removal of obstructions to navigation, and the Corps is sometimes directed to use this appropriation for drift removal. For instance, in fiscal year 2018, the explanatory statement accompanying the Corps’ annual appropriation directed the Corps to use about $9.9 million of its appropriation for drift removal in New York Harbor. Debris the Corps removes typically consists of lumber, trees and branches, large waste items like tires, and large plastic items, according to Corps’ officials. Five of the 11 member agencies reported coordinating activities to conduct or sponsor research to monitor, understand the sources of, prevent, mitigate, or reduce the effects of marine debris or to support developing new technologies such as using more sustainable or recyclable types of materials. For example: Research grants. Since 2006, NOAA’s Marine Debris Program has supported at least two marine debris research projects that address questions such as monitoring marine debris, identifying fishing gear improvements and alternatives, or better understanding the environmental or economic impacts of marine debris. For example, in 2016, NOAA awarded a contract to a private research and consulting firm to conduct an economic study on how marine debris affects the economies of tourism-dependent coastal communities around the United States. The purpose of the project was to evaluate changes in tourism spending based on changes in the amount of marine debris to help prioritize areas of the United States where future prevention and removal efforts may be needed. NOAA officials said they expect the final report to be issued by the end of 2019. Microplastics workshop. In June 2017, EPA hosted a Microplastics Experts Workshop that convened experts from academia and other federal agencies, including NOAA, the U.S. Geological Survey, and the Food and Drug Administration, to identify microplastics research needs. The effort resulted in a 2018 report that identified four main areas where additional research is needed: (1) standardization of research methods, (2) debris sources and fate, (3) ecological risk assessment, and (4) human health risk assessment. EPA is using the report to consider how the agency can best address these high- priority microplastics research needs as it develops the agency’s larger environmental research agenda, according to EPA officials. Development of new fishing gear. In 2016, the Marine Mammal Commission awarded a grant to the New England Aquarium to test a ropeless fishing gear prototype intended to prevent whale entanglements in fishing gear. According to a document from the Commission, entanglement in fishing gear is the number one direct cause of marine mammal injury and death, including the endangered Northern Atlantic right whale. The Commission has used the results of this effort to emphasize the potential for ropeless gear to reduce and prevent entanglement in meetings with lobster and crab fishermen on the east and west coasts. Seven of the 11 member agencies reported conducting a variety of activities to foster coordination among member agencies and with nonfederal partners, such as international, state, and local government agencies. For example: Global Partnership on Marine Litter. In 2012, the United Nations launched the Global Partnership on Marine Litter, a voluntary network of international governments, nongovernmental organizations, academia, private sector companies, and others with the goal of protecting human health and the global environment primarily by reducing and managing marine debris. Interagency committee members, including NOAA and EPA, are partners to the global partnership. For example, from 2012 through 2017, the NOAA Marine Debris Program Director served as the Steering Committee chair of the global partnership. EPA has coordinated with the global partnership in Latin American and Caribbean countries to help develop a regional strategy for addressing marine debris in those regions and through in-person meetings and with other global partnership staff and NOAA colleagues through the steering committee. Sister Cities initiative. In 2015, the State Department announced the creation of a “Sister Cities” initiative with China to share best practices related to waste management and preventing marine debris. As part of the initiative, in November 2016, a Chinese delegation, comprised of central government officials and officials from Weihai and Xiamen, visited Chicago, New York City, and San Francisco to study U.S. practices in addressing marine debris. In November–December 2017, a U.S. delegation comprised of U.S. government officials and a New York City official, visited Xiamen, Weihai, and Beijing to learn about Chinese waste management practices. The partner city relationships were formalized with a memorandum of understanding between San Francisco and Xiamen in July 2016, and New York and Weihai in December 2017 to work together to address marine debris. State emergency response guides and regional action plans. NOAA’s Marine Debris Program has coordinated with coastal managers, nongovernmental organizations, industry, academia, and other groups to develop state marine debris emergency response guides. For example, in 2016 and 2017, NOAA coordinated with Florida, Georgia, Mississippi, North Carolina, and South Carolina to develop individual guides for those states. According to NOAA officials, federal, state, and local officials used the Florida response guide during the 2017 and 2018 hurricane seasons to inform responding agencies which agency has jurisdiction and to better coordinate marine debris removal efforts after an event. In addition, NOAA coordinated efforts to develop, enhance, and implement regional action plans for the Great Lakes, the Gulf of Maine, the Gulf of Mexico, the Mid-Atlantic, the Southeast, California, Florida, Hawaii, Oregon, and Washington regions. The purpose of the action plans is to bring stakeholders together to prevent and reduce marine debris throughout the United States, according to NOAA documents. For example, NOAA officials said that under the Hawaii action plan, several federal agencies and nongovernmental organizations worked together to purchase and maintain bins to collect used fishing line for recycling. In addition to the contact named above, Alyssa M. Hundrup (Assistant Director), Mark Braza, Jeanette Soares, Jason Trentacoste, and Lisa Vojta made key contributions to this report. Eric Charles; Kim Frankena; Ellen Fried; Karen Howard; Edward J. Rice, PhD.; Dan C. Royer; Anne Stevens; and Sarah Veale also contributed to the report.", "summary": "Marine debris—waste such as discarded plastic and abandoned fishing gear and vessels in the ocean—is a global problem that poses economic and environmental challenges. The Marine Debris Act, enacted in 2006, requires the committee to coordinate a program of marine debris research and activities among federal agencies. The act also requires the committee to submit biennial reports to Congress that include certain elements such as an analysis of the effectiveness of the committee's recommendations. GAO was asked to review federal efforts to address marine debris. This report examines (1) how the committee coordinates among federal agencies and the process for determining membership, (2) the extent to which the committee's biennial reports contain required elements, and (3) experts' suggestions on actions the federal government could take to most effectively address marine debris. GAO examined the Marine Debris Act and committee reports, compared committee practices with leading collaboration practices, interviewed federal agency officials, and interviewed a nongeneralizable sample of 14 marine debris experts selected to reflect various sectors and experiences with different types of marine debris. The Marine Debris Research, Prevention, and Reduction Act, as amended, (Marine Debris Act) designated six agencies as members of the Interagency Marine Debris Coordinating Committee and specifies that members shall include senior officials from certain other agencies as the Secretary of Commerce determines appropriate. Within Commerce, the National Oceanic and Atmospheric Administration (NOAA) serves as the committee chair. The committee coordinates through sharing information about members' activities to address marine debris, but GAO found that NOAA has not established a process for determining committee membership for agencies not specifically designated in the act. As a result, such agencies may not be included in the biennial reports required by the act which discuss committee members' marine debris activities. NOAA officials said they plan to develop a membership process but have not established a time frame to do so. By establishing a time frame, the committee can more fully benefit from capturing all members' activities. The committee's biennial reports provide information on members' activities such as education and cleanup, but they do not contain some information required by the Marine Debris Act. Specifically, the reports do not include (1) an analysis of the effectiveness of the committee's recommendations and strategies to address marine debris and (2) recommendations for priority funding needs. Our past work has shown that collaborative entities can better demonstrate progress if they develop a way to monitor and report the results of their collective efforts and identify and leverage resources. By doing so, the committee would be in a better position to know the extent to which it is effectively addressing marine debris and provide Congress with required information about priority funding needs. Experts suggested a range of actions—from research to cleanup—the federal government could take to most effectively address marine debris. They stressed that there is not one solution to the growing problem (see figure). Committee officials noted factors to consider, such as cost, when evaluating these actions. GAO is making four recommendations, including that NOAA establish a time frame for documenting membership and the committee develop processes to analyze the effectiveness of its efforts and identify priority funding. The agency agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Black lung benefits include both cash assistance and medical benefits. Maximum cash assistance payments ranged from about $660 to $1,320 per month in 2018, depending on a beneficiary’s number of dependents. Miners receiving cash assistance are also eligible for medical benefits that cover the treatment of their black lung-related conditions, which may include hospital and nursing care, rehabilitation services, and drug and equipment charges, according to DOL documentation. DOL estimates that the average annual cost for medical treatment in fiscal year 2018 was approximately $9,667 per miner. There were about 25,600 total beneficiaries (primary and dependents) receiving black lung benefits during fiscal year 2018 (see fig. 1). The number of beneficiaries has decreased over time as a result of declining coal mining employment and an aging beneficiary population, according to DOL officials. Black lung beneficiaries could increase in the near term due to the increased occurrence of black lung disease and its most severe form, progressive massive fibrosis, particularly among Appalachian coal miners, according to National Institute for Occupational Safety and Health (NIOSH) officials. Black lung claims are processed by the Division of Coal Mine Workers’ Compensation in the Office of Workers’ Compensation Programs (OWCP) within DOL. Contested claims are adjudicated by DOL’s Office of Administrative Law Judges (OALJ), which issues decisions that can be appealed to DOL’s Benefits Review Board (BRB). Claimants and mine operators may further appeal these agency decisions to the federal courts. If an award is contested, claimants can receive interim benefits, which are generally paid from the Trust Fund according to DOL officials. Final awards are either funded by mine operators—who are identified as the responsible employers of claimants—or the Trust Fund, when responsible employers cannot be identified or do not pay. In fiscal year 2018, black lung claims had an approval rate of about 34 percent, according to DOL data. In 2009, we reported on the benefits adjudication process and made several recommendations for DOL that could improve miners’ ability to pursue claims. An April 2015 DOL Inspector General (IG) report followed up on DOL’s progress on our recommendations and found continuing problems and raised new concerns about the black lung claims and appeals process. For instance, the IG reported that OALJ needed to address staff shortages, improve communication between its headquarters and district offices, and upgrade the training provided to judges and law clerks. To further expedite claim adjudication, the IG recommended, among other things, that OALJ begin hearing more cases remotely using video or telephone hearings to reduce judges’ travel costs and time. In fiscal year 2018, OWCP reported that it took about 335 days on average to issue a decision on a claim. This is an increase from the average of 235 days that OWCP had reported to the DOL IG for fiscal year 2014. Trust Fund revenue is primarily obtained from mine operators through the coal tax. The current coal tax rates, which took effect in 2019, are $0.50 per ton of underground-mined coal and $0.25 per ton of surface-mined coal, up to 2 percent of the sales price. Coal tax revenue is collected from mine operators by Treasury’s Internal Revenue Service and then transferred to the Trust Fund where it is then used by DOL to pay black lung benefits and the costs of administering the program. Trust Fund expenditures include, among other things, black lung benefit payments, certain administrative costs incurred by DOL and Treasury to administer the black lung benefits program, and debt repayments. When necessary for the Trust Fund to make relevant expenditures under federal law, the Trust Fund borrows from the Treasury’s general fund. When this occurs, the federal government is essentially borrowing from itself—and hence from the taxpayer—to fund its benefit payments and other expenditures. As we reported in 2018, Trust Fund expenditures have consistently exceeded revenue. The Trust Fund borrowed from Treasury’s general fund almost every year since 1979, its first complete fiscal year. We noted in our 2018 report that Trust Fund borrowing would continue to increase through 2050 due, in part, to the planned coal tax rate decrease of about 55 percent that took effect in 2019 and declining coal production. We simulated the effects of the tax rate decrease on Trust Fund finances through 2050, and reported the results of a moderate case set of assumptions related to future coal production and prices and the number of new black lung beneficiaries. These simulations were not predictions of what will happen, but rather models of what could happen given certain assumptions. Our moderate case simulation suggested that Trust Fund revenue may decrease from about $485 million in fiscal year 2018 to about $298 million in fiscal year 2019, due, in part, to the approximate 55 percent decrease in the coal tax rate. Our simulation, which incorporated EIA data on future expected coal production, also showed that annual Trust Fund revenue would likely continue to decrease beyond fiscal year 2019 due, in part, to declining coal production. Domestic coal production declined from about 1.2 billion tons in 2008 to about 775 million tons in 2017, according to EIA. Based on these projections, our moderate simulation showed that Trust Fund annual revenue may continue to decrease from about $298 million in fiscal year 2019 to about $197 million in fiscal year 2050. Future simulated Trust Fund revenue would likely be insufficient to cover combined black lung benefit payments and administrative costs, according to our moderate case simulation. Specifically, revenue may not be sufficient to cover beneficiary payments and administrative costs from fiscal years 2020 through 2050 (see fig. 2). For instance, in fiscal year 2029, simulated benefit payments and administrative costs would likely exceed simulated revenue by about $99 million. These annual deficits could decrease over time to about $4 million by fiscal year 2050 due, in part, to the assumed continued net decline in total black lung beneficiaries. If Trust Fund spending on benefit payments and administrative costs continues to exceed revenues each year, then the Trust Fund would need to continue borrowing from Treasury’s general fund to cover those costs, as well as borrowing to cover debt repayment. Our moderate simulation suggested that the Trust Fund’s outstanding debt could increase from about $4.2 billion in fiscal year 2019 to about $15.4 billion in fiscal year 2050 (see fig. 3). While our moderate case simulated a $15.4 billion Trust Fund debt in 2050, the amount could vary from about $6 billion to about $27 billion depending, in part, on future coal production and the number of new beneficiaries. Even if the Congress were to completely eliminate black lung benefits as of fiscal year 2019, the Trust Fund’s outstanding debt in fiscal year 2050 could still exceed $6.4 billion, according to our simulation. Eliminating black lung benefits, however, would generally mean that coal tax revenue would be collected solely to fund the repayment of Trust Fund debt. As we reported in 2018, other options such as adjusting the coal tax and forgiving interest or debt, could also reduce future borrowing and improve the Trust Fund’s financial position (see GAO-18-351). Federal law generally requires that coal operators secure their black lung benefit liability. Operators can purchase commercial insurance for this purpose or may self-insure if they meet certain DOL conditions. For example, self-insurers must obtain collateral in the form of an indemnity bond, deposit or trust, or letter of credit in an amount deemed necessary and sufficient by DOL to secure their liability. DOL officials said that the collateral they required from the five self- insured operators that filed for bankruptcy between 2014 and 2016 was inadequate to cover their benefit liabilities. For example, the collateral DOL required from Alpha Natural Resources was about 6 percent of its estimated benefit liability. As a result, approximately $185 million of estimated benefit liability was transferred to the Trust Fund, according to DOL data. We reviewed DOL documentation related to the five operator bankruptcies. Table 1 shows the bankrupt operators; the amount of collateral each operator had at the time of bankruptcy; estimated benefit liability at the time of bankruptcy; and estimated benefit liability and number of beneficiaries that transferred to the Trust Fund, if applicable. Overall, three of these bankruptcies affected the Trust Fund, and two did not according to DOL. DOL officials told us that the bankruptcies of Arch Coal and Peabody Energy did not affect the Trust Fund because their benefit liabilities were assumed by the reorganized companies after emerging from bankruptcy. As of June 2019, there are 22 operators that are self-insured and actively mining coal, according to DOL officials. To ensure that the collateral they required from these operators was adequate to protect the Trust Fund, DOL officials said that they periodically reauthorized them which entailed, among other things, reviewing their most recent audited financial statements and claims information. DOL officials said that they prepared memos documenting these reviews and communicated with coal operators about whether their financial circumstances warranted increasing or decreasing their collateral. Table 2 provides information on the 22 self-insured operators including the date of each operator’s most recent DOL reauthorization; the amount of DOL required collateral; and the operator’s most recent estimated black lung benefit liability. Should any of these operators file for bankruptcy, they could also affect the Trust Fund because the amount of an operators’ benefit liability that is not covered by collateral could also become the responsibility of the Trust Fund. Preliminary analysis from our ongoing work indicates that DOL did not regularly monitor self-insured operators. Agency regulations state that DOL may adjust the amount of collateral required from self-insured operators when experience or changed conditions warrant. We reviewed DOL’s most recent reauthorization memos for each of the 22 operators. While some of these operators had been reauthorized more recently, we found that others had not been reauthorized by DOL in decades. One operator in particular had not been reauthorized by DOL since 1988. Additionally, for most of these operators, DOL either did not have estimates of their benefit liabilities, or the estimates were out of date (see table 2). Beginning in summer 2015, DOL officials said that they stopped permitting any new coal mine operators to self-insure as the agency worked with auditors, economists, and actuaries to develop new procedures for self-insurance. At the same time, DOL generally stopped reauthorizing the 22 self-insured operators. Earlier this year, two of these operators have filed for bankruptcy—Westmoreland Coal Company and Cloud Peak Energy—according to DOL officials. Additionally, due to deteriorating financial conditions, DOL recommended revoking another operator’s self-insurance authority (Murray Energy). However, Murray appealed this decision and DOL postponed responding to the appeal until their new self-insurance procedures are implemented, according to DOL officials. DOL’s new self-insurance procedures are currently being reviewed by OMB, and DOL officials said they did not know when they would likely be implemented. Until such procedures are implemented, DOL cannot ensure that the collateral it has required from self-insured operators is adequate to protect the Trust Fund should these operators become insolvent. Chairwoman Adams, Ranking Member Byrne, and Members of the Subcommittee, this concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff has any questions concerning this testimony, please contact me at (202) 512-7215. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contact named above, Blake Ainsworth (Assistant Director), Justin Dunleavy (Analyst in Charge), Angeline Bickner, Alex Galuten, Courtney LaFountain, Rosemary Torres Lerma, Kate van Gelder, Catherine Roark, and Almeta Spencer made key contributions to the testimony. Other staff who made key contributions to the reports cited in the testimony are identified in the source products. Black Lung Benefits Program: Options to Improve Trust Fund Finances, GAO-18-351 (Washington D.C: May 30, 2018). Mine Safety: Basis for Proposed Exposure Limit on Respirable Coal Mine Dust and Possible Approaches for Lowering Dust Levels, GAO-14-345 (Washington, D.C.: April 9, 2014). Black Lung Benefits Program: Administrative and Structural Changes Could Improve Miners’ Ability to Pursue Claims, GAO-10-7 (Washington, D.C.: October 30, 2009). Federal Compensation Programs: Perspectives on Four Programs for Individuals Injured by Exposure to Harmful Substances, GAO-08-628T (Washington, D.C.: April 1, 2008). Mine Safety: Additional Guidance and Oversight of Mines’ Emergency Response Plans Would Improve the Safety of Underground Coal Miners, GAO-08-424 (Washington, D.C.: April 8, 2008). Mine Safety: Better Oversight and Coordination by MSHA and Other Federal Agencies Could Improve Safety for Underground Coal Miners, GAO-07-622 (Washington, D.C.: May 16, 2007). This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Since 2009, GAO has produced a body of work on the Black Lung Benefits Program. In 2018, for instance, GAO reported that the Trust Fund, which pays benefits to certain coal miners, faced financial challenges due, in part, to the coal tax rate decrease that took effect in 2019 and declining coal production. Trust Fund finances could be further strained by coal mine operator bankruptcies, as they can lead to benefit liabilities being transferred to the Trust Fund. This testimony describes Trust Fund finances through 2050 and provides preliminary observations from ongoing work for this committee regarding the Department of Labor's (DOL) oversight of coal mine operator insurance. To describe Trust Fund finances, in its 2018 report GAO developed simulations through 2050 based on various assumptions related to future coal production and the number of future black lung beneficiaries. To develop preliminary observations from its ongoing work, GAO analyzed DOL documentation and data on black lung beneficiaries and coal mine operators. GAO also reviewed relevant federal laws, regulations, policies, and guidance and interviewed DOL officials, insurance carriers, and coal mine operators, among others. GAO reported in 2018 that Black Lung Disability Trust Fund (Trust Fund) expenditures have consistently exceeded revenue. The Trust Fund borrowed from the Department of the Treasury's (Treasury) general fund and hence from the taxpayer almost every year since 1979, its first complete fiscal year, causing debt and interest to accumulate. Federal law does not limit the amount the Trust Fund may borrow as needed to cover its expenditures. Trust Fund revenue will be further limited by the coal tax rate decrease of about 55 percent that took effect in 2019, and declining coal production, according to GAO's simulation. Specifically, Trust Fund revenue may not be sufficient to cover beneficiary payments and administrative costs, from fiscal years 2020 through 2050. Therefore, the Trust Fund could need to continue borrowing to cover its expenditures—including the repayment of past debt and interest—and the Trust Fund's simulated outstanding debt could exceed $15 billion by 2050 (see figure). However, as GAO reported in 2018, various options, such as adjusting the coal tax and forgiving debt, could improve the Trust Fund's financial position. GAO's preliminary observations indicate that Trust Fund finances will be further strained by coal operator bankruptcies. Since 2014, an estimated black lung benefit liability of over $310 million has been transferred to the Trust Fund from insolvent self-insured coal mine operators, according to DOL data. Federal law generally requires that operators secure their black lung benefit liability. To do so, operators can self-insure if they meet certain DOL conditions. As of June 2019, there are 22 operators that are self-insured and actively mining coal, according to DOL officials. GAO's preliminary analysis indicates that DOL did not regularly review these operators so that it could adjust collateral as needed to protect the Trust Fund. As a result, the amount of collateral DOL required from some of these operators is tens of millions less than their most recent estimated black lung benefit liability. GAO will be considering recommendations, as appropriate, when ongoing work is finished.", "document_type": "gao"}
{"report": "DHS generally uses the information sources that EEOC guidance recommends to help identify potential barriers. As directed by EEOC guidance, DHS analyzes its workforce data to help identify triggers or indicators of potential EEO barriers by comparing the racial, national origin, gender, and disability profiles of its total workforce, and for various occupational categories to relevant civilian labor workforce data. In addition to analyzing workforce data, in each of the fiscal years 2014 through 2017, DHS utilized the U.S. Office of Personnel Management’s Federal Employee Viewpoint Survey and DHS’s employee exit survey results to help identify and address barriers. To further help identify barriers, EEOC guidance states that agencies must solicit input from agency employee and advocacy groups, and union officials. During our small group discussions, DHS employee groups told us that through the MD-715 report development process, they helped identify and address triggers and barriers. For example, Special Emphasis Program Managers we spoke with told us that DHS components conduct climate surveys to obtain input from employees on workforce practices every 1 or 2 years. Further, several DHS components’ MD-715 reports referenced soliciting employee input, such as obtaining Disability Employment Program Managers’ input via quarterly disability employment advisory council meetings where they share best practices and discuss issues and topics including barriers. DHS reports some improvements in employee engagement and representation of minorities and women. DHS’s employee engagement scores in the Federal Employee Viewpoint Survey increased from 54 percent in 2014 to 62 percent in 2019. In addition, our review of DHS’s workforce data from fiscal years 2014 through 2017 showed that every minority group as well as individuals with disabilities and individuals with targeted disabilities had been trending in a positive direction since fiscal year 2014. Further, DHS officials told us that minority representation was up 3 percent and female representation was up 2 percent from 2015 to February 2019. According to EEOC, one important tool in examining the fairness and inclusiveness of an agency’s recruitment efforts is applicant flow data. EEOC guidance states that having department-wide applicant flow data could aid in analyzing differences in selection rates among different groups for a particular job. In July 2017, EEOC informed DHS that the agency’s applicant flow data were incomplete, which makes it difficult to pinpoint barriers. DHS has reported challenges in collecting department- wide data because the department does not have a consolidated applicant flow data system. According to DHS, four of its components use one system (USA Staffing), while five other components use a different system (Monster Government Solutions). CRCL officials told us that DHS is developing a new system to integrate applicant flow data department-wide. However, the officials could not give us a time frame for when the system is expected to be completed. In its fiscal year 2018 MD-715 report, DHS reported that it continues to work towards developing a central repository for all applicant flow data. As a work-around, DHS officials said that it obtains these data directly from each component that uses Monster Government Solutions. In its fiscal year 2018 MD-715 report, DHS reported that it used applicant flow data to complete analyses, but it also reported a number of limitations, including that data were not available. In February 2020, CRCL officials told us that they plan to report complete applicant flow data in DHS’s fiscal year 2019 MD-715 report. DHS does not have complete performance metrics or mechanisms for tracking progress towards eliminating its identified EEO barriers, such as workplace satisfaction of white females or the retention rate of women in law enforcement positions. According to CRCL officials, they are not required to establish performance metrics or mechanisms for tracking progress towards eliminating barriers beyond what is included in the department-wide MD-715 report. However, Standards for Internal Control in the Federal Government states that management should establish specific and measureable objectives, and ways to assess progress including performance metrics and milestones. Further, EEOC guidance states that agencies are not prevented from establishing additional practices that exceed its requirements. Implementing performance metrics could help DHS assess its progress in eliminating EEO barriers. Accordingly, our July 2019 report included a recommendation that the Secretary of Homeland Security should develop performance metrics for the department’s EEO program including a mechanism for tracking progress towards eliminating barriers. DHS concurred with the recommendation and stated that it would implement it by April 30, 2020. In February 2020, CRCL officials told us they are working with DHS’s Management Directorate to develop a potential overarching performance metric that, if approved, would be implemented beginning in fiscal year 2021. Our analysis of DHS’s MD-715 reports found that the department-wide EEO program did not meet about a quarter of the compliance measures for a model EEO program for each fiscal year from 2014 through 2017. For example, in each of the fiscal years 2015 through 2018, DHS reported that senior managers at DHS components did not successfully implement EEO action plans and incorporate EEO action plan objectives into agency strategic plans. In addition, our analysis of components’ MD- 715 reports showed that component EEO programs did not meet 9 percent of the compliance measures for a model EEO program from fiscal years 2014 through 2017. DHS components did not have action plans to address nearly half (179 out of 369) of the deficiencies self-reported by all components from fiscal years 2014 through 2017. For example, in fiscal year 2017, four DHS components did not have action plans to ensure that their EEO directors report directly to their agency heads. EEOC guidance requires that for each deficient measure, agencies are to develop an action plan for correcting the deficiency. CRCL officials told us that DHS and its components’ MD-715 reports met EEOC requirements for action plans for fiscal years 2014 through 2017 by providing explanations for, or briefly stating plans to address, the majority of their deficiencies rather than developing action plans identifying how each deficiency would be addressed. Developing policies and procedures to help ensure components’ EEO programs have action plans for addressing deficiencies could help DHS components better comply with EEOC requirements. DHS and its components lack adequate staffing to address EEO program deficiencies, in part, because CRCL and component EEO officials told us that they do not have formal staffing models to assess appropriate staffing of their EEO program sections. CRCL officials said that each component EEO program section is unique with its own assessments and measures by the leaders in charge of their funding and staffing resources. However, EEOC MD-715 guidance states that an agency must provide its EEO program with sufficient budget and staffing to be able to successfully implement various activities. Developing and utilizing formal staffing models—a tool to determine the number of staff required—for their EEO programs could help DHS and its components to identify, request, and obtain the staff they need. Thus, in our recently issued report, we recommended that (1) DHS component EEO Directors, in consultation with the Deputy Officer for EEO and Diversity, should develop policies and procedures to help ensure that their component EEO programs have action plans for addressing deficiencies in their MD-715 reports, and (2) the Deputy Officer for EEO and Diversity should develop a formal staffing model for its EEO program. DHS concurred with the recommendations and stated that it would implement them by April 30, 2020. In February 2020, CRCL officials told us that they are developing policies and procedures for components to consider. They also told us that they are collaborating with the DHS Management Directorate to develop a formal staffing model for DHS’s department-wide EEO program. In addition, we recommended that DHS component EEO Directors, in collaboration with the Deputy Officer for EEO and Diversity, develop component formal staffing models. DHS concurred with the recommendation and stated that it would implement it by July 31, 2020. In February 2020, CRCL officials told us that the DHS Management Directorate plans to work with components to develop formal staffing models for their individual EEO programs after the agency develops a formal staffing model for the department-wide EEO program. DHS has plans to address the nine areas of noncompliance in its EEO program identified by EEOC. For example, in its July 2017 review of DHS compliance with EEOC requirements, EEOC identified that DHS did not provide complete demographic data on new hires and promotions in its fiscal year 2016 report to EEOC. In April 2019, DHS officials told us that the department plans to report the data by collecting complete data from DHS components in fiscal year 2019. In its fiscal year 2018 MD-715 report, which DHS sent to EEOC in July 2019, DHS stated that it had collected and analyzed demographic data on new hires and promotions. DHS’s EEO and human capital offices assist and support DHS components in identifying and addressing EEO barriers. For example, CRCL meets with each component to obtain updates on their EEO efforts and provide verbal feedback as they develop their MD-715 reports. DHS components told us that they are generally satisfied with CRCL’s collaboration practices to identify and address EEO barriers. For example, all nine components required to submit MD-715 reports told us that CRCL regularly meets with them and provides guidance on identifying and addressing barriers. From fiscal years 2014 through 2017, EEOC found areas of noncompliance in DHS and its components’ EEO programs. We found that DHS components had not responded timely and completely to areas of noncompliance identified in EEOC feedback letters. According to CRCL officials, CRCL does not have policies and procedures to ensure that components have addressed EEOC’s feedback letters in a complete and timely manner. However, EEOC MD-715 guidance states that an agency’s EEO Director ultimately is responsible for ensuring equal opportunity throughout the entire agency. In addition, Standards for Internal Control in the Federal Government states that management should implement control activities through policies. Developing policies and procedures for responding completely and timely to EEOC’s feedback letters may help the department comply with EEOC guidance. CRCL officials said they lack authority to ensure components’ compliance with EEOC requirements. Standards for Internal Control in the Federal Government states that an effective management practice includes periodically evaluating the agency’s organizational structure to ensure that it meets its objectives. DHS has not taken steps—in consultation with EEOC and other agencies as relevant—to analyze options to address EEO program management weaknesses. Specifically, it has not analyzed alternatives for granting additional authorities to the Deputy Officer for EEO and Diversity to ensure DHS components comply with MD-715 guidance, or assessed benefits and trade-offs of each alternative. Without addressing these issues, DHS may not be effectively positioned to manage its EEO program. In our report, we recommended that the (1) Deputy Officer for EEO and Diversity develop policies and procedures for responding in a complete and timely manner to EEOC’s feedback letters, and (2) the Secretary of Homeland Security—in consultation with CRCL and EEOC, and other agencies and components, as relevant—analyze options for granting additional authorities to the Deputy Officer for EEO and Diversity to ensure DHS components comply with MD-715 guidance, including the authority of the Deputy Officer for EEO and Diversity to certify components’ MD-715 reports. DHS concurred with the recommendations and stated that it plans to implement them by April 30, 2020. In February 2020, CRCL officials told us they are developing policies and procedures for responding in a complete and timely manner to EEOC’s feedback letters. They also told us that a cross-component working group, with input from EEOC subject- matter experts, is developing a report benchmarking best practices at similar federal agencies that it expects to complete by the end of March 2020. In conclusion, as the third largest U.S. government department, the challenges DHS has faced to fully implement effective EEO programs may result in widespread negative consequences such as (1) monetary expenses borne by the agency in connection with workplace disputes and (2) decreased morale and productivity resulting from ineffective and inefficient use of human capital resources. We found areas for improvement in DHS and its components’ EEO programs that could help ensure success and compliance with MD-715. The commitment of DHS’s leadership is essential to successfully addressing these issues. By focusing leadership attention on developing performance metrics, policies and procedures, and staffing models, DHS and its components can help improve their EEO programs by making progress towards eliminating barriers, obtaining sufficient staffing, and addressing areas of noncompliance. Madam Chairwoman Torres Small, Ranking Member Crenshaw, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions you may have at this time. If you or your staff have any questions about this testimony, please contact Yvonne D. Jones at (202) 512-6806 or jonesy@gao.gov, or Christopher P. Currie at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this testimony include Clifton G. Douglas, Jr. (Assistant Director), Luis E. Rodriguez (Analyst-in-Charge), Andrew Howard, Kate Lenane, Steven Putansu, and Rachel Whitaker. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "EEOC's Management Directive 715 requires that, to attract and retain top talent, federal agencies are to identify EEO barriers in their workforces and deficiencies in their EEO programs, execute plans to address them, and report annually to EEOC. GAO reported in 2009 on DHS's opportunities to address barriers to EEO in its workforce and in 2019 on DHS's challenges to ensuring EEO in its workforce. GAO was asked to testify on the steps DHS has taken to (1) identify and address barriers to EEO in its workforce, (2) identify and address EEO program deficiencies, (3) address areas of noncompliance in its EEO program identified by EEOC, and (4) oversee and support components' EEO programs. To do so, GAO summarized the findings discussed in its July 2019 report on DHS's EEO efforts and reported on DHS's actions taken to address recommendations. To obtain updates on actions taken by DHS, GAO reviewed relevant documentation and interviewed DHS EEO officials. The Department of Homeland Security (DHS) uses multiple information sources to identify potential barriers to equal employment opportunity (EEO), but lacks performance metrics for tracking its progress towards eliminating identified barriers. DHS generally uses the information sources that the Equal Employment Opportunity Commission (EEOC) guidance recommends, such as employee survey results, to help identify potential barriers. While DHS reports some improvements in employee engagement and representation of minorities and women from fiscal years 2014 through 2018, it does not have complete performance metrics, such as the retention rate of women in law enforcement positions. Using performance metrics could help DHS assess its progress in eliminating barriers. DHS and its components have identified various deficiencies in their EEO programs, but lack policies and procedures for developing action plans and formal staffing models to address deficiencies. For example, in each of the fiscal years 2015 through 2018, DHS reported that senior managers at DHS components did not successfully implement EEO action plans and incorporate EEO action plan objectives into agency strategic plans. Further, DHS components lacked action plans to address nearly half (179 out of 369) of the deficiencies self-reported by all components from fiscal years 2014 through 2017. For example, in fiscal year 2017, four DHS components did not have action plans to ensure that their EEO directors report directly to their agency heads, as required by EEOC guidance. Developing policies and procedures to help ensure components' EEO programs have action plans for addressing deficiencies could help DHS components better comply with EEOC requirements. In addition, developing and using formal staffing models—a tool to determine the number of staff required—for their EEO programs could help DHS and its components to identify, request, and obtain the staff they need. For example, DHS and its components reported that staffing challenges contributed to some of their program deficiencies, and acknowledged they did not have formal staffing models for their EEO programs. DHS has plans to address nine areas of noncompliance in its EEO program identified by EEOC. In its July 2017 review of DHS compliance with EEOC requirements, EEOC found that DHS did not provide complete demographic data on new hires and promotions in its fiscal year 2016 report to EEOC. DHS reported to EEOC that it had collected and analyzed such demographic data beginning in fiscal year 2019. DHS's EEO and human capital offices assist and support DHS components in identifying and addressing EEO barriers. However, DHS's EEO office lacks policies and procedures to ensure components respond timely and completely to areas of noncompliance identified in EEOC feedback letters. Additionally, DHS EEO officials said they lack authority to ensure components' compliance with EEOC requirements. Without addressing these issues, DHS may not be effectively positioned to manage its EEO program. In its July 2019 report, GAO recommended that DHS take six actions, including develop performance metrics for the department's EEO program; develop DHS and component formal staffing models; and analyze options for granting additional authorities to the most senior official for EEO and Diversity. DHS concurred with the six recommendations and described actions the department plans to take to address them.", "document_type": "gao"}
{"report": "Since the early 1980s, the Air Force has been working to modernize and consolidate its space command and control systems and improve its space situational awareness. Effective command and control systems are important because DOD space capabilities are globally distributed and operated from geographically diverse locations. With new threats against space assets, the ability to quickly respond or take action can mean the difference between mission success and failure. Space situational awareness is the current and predictive knowledge and characterization of space objects and the operational environment upon which space operations depend. Good space situational awareness data are the foundation of command and control systems because the data are critical for planning, operating, and protecting space assets and informing government and military operations. The Air Force’s last three space command and control programs over more than three decades have ended significantly over budget and schedule, and key capabilities have gone undelivered. Those programs were the Cheyenne Mountain Upgrade, the Combatant Commanders’ Integrated Command and Control System, and the Joint Space Operations Center Mission System. Some capabilities were deferred from one program to the next, making the true cost growth in each program significantly higher when compared to original program content. This deferral was due in part to the complicated nature of the planned work. Enabling a single system to command and control numerous assets in space and on the ground at multiple levels of information classification is a technically challenging task. In addition, as discussed below, we found that the Air Force made optimistic cost and schedule estimates for these programs, and thus did not assign adequate resources to their development. Begun in 1981, the Cheyenne Mountain Upgrade was intended to modernize systems that provide critical strategic surveillance and attack warning and assessment information. We issued 11 reports on the Cheyenne Mountain Upgrade program between 1988 and 1994. In 1991, we found that the program planned to complete only a portion of its requirements in an attempt to stay within budget and schedule constraints. We also found that the Air Force had adopted a strategy of deferring some requirements on the optimistic assumption that these requirements could be achieved during later stages of system development. We concluded that while such deferrals may have permitted the Air Force to meet revised short-term goals, they also masked the magnitude of problems the program experienced as it moved forward. We also found that DOD had not formally evaluated the performance risks related to deferring requirements and concluded that the strategy of deferral significantly raised the risk that system development would be more costly and take longer. DOD declared the program operational in 1998; however, some critical capabilities were not delivered. At that time, the program was nearly $1 billion over budget and 11 years late. That same year, DOD determined that some of the program’s components were not well integrated and would be unresponsive to future mission needs. DOD initiated the Combatant Commanders’ Integrated Command and Control System program in 2000 to modernize and integrate the Cheyenne Mountain Upgrade computer systems and to replace a space situational awareness data computer system called the Space Defense Operations Center (SPADOC). At that time, the SPADOC system was significantly overtaxed and in need of replacement by a system that could handle larger volumes of data. In 2006, we found that Combatant Commanders’ Integrated Command and Control System program costs had increased by approximately $240 million, 51 percent over initial estimates, and the program was at least 3 years behind schedule. In addition, we found that that some capabilities had been deferred indefinitely, resulting in increased risks to performing future operations. Further, we found that the Air Force did not effectively assess the appropriateness of the program’s requirements prior to initiating the program, leading to significant additions, deletions, and modifications to the program’s initial requirements. Consequently—similar to what transpired within the Cheyenne Mountain Upgrade program—significant amounts of work were deferred to address the cost increases associated with requirements changes. Ultimately, the Combatant Commanders’ Integrated Command and Control System program was not able to successfully replace SPADOC. Started in 2009, the Joint Space Operations Center Mission System (JMS) was the Air Force’s most recent effort to meet command and control capability and space situational awareness data needs and replace the SPADOC system. JMS was a software-intensive system and was supposed to be delivered in three increments. Increment 1 was to provide the foundational structure for the overall program. Increment 2 was to deliver numerous operational capabilities to users, including replacing SPADOC by the end of fiscal year 2014 with the ability to automatically determine if objects in space were likely to collide (called conjunction assessments), which was a key performance parameter for the program. Increment 3 was to provide additional command and control capabilities and the ability to incorporate data from highly classified special access programs. Of the three planned increments, Increment 1 is the only one that is fully operational today. JMS Increment 2 encountered significant challenges during development, and in 2016 the program experienced a critical change because of significant schedule delays and cost increases. Specifically, JMS Increment 2 planned to delay delivery by more than 1 year, in turn increasing total program costs by over 25 percent. According to the August 2016 JMS Critical Change Report, which the program office submitted to Congress in September 2016 as a result of the critical change, several issues contributed to Increment 2’s challenges. These included an overly aggressive schedule, inadequate staffing, underestimating the amount of work required to integrate various pieces of the system that were developed by different groups, and numerous concurrent development efforts. An independent program assessment team comprised of military, intelligence, and contractor staff determined that the JMS program had underestimated the complexity of developing the system. Further, the program reported that its organizational structure proved problematic. For example, the program reported that program- related contracts were awarded and administered outside the program office, which limited program flexibility and support and hampered effective oversight. As a result of the critical change, the program re- estimated its costs, established new schedule goals, and deferred a number of capabilities and requirements to Increment 3. Even after these changes, JMS Increment 2 was not successful at delivering its planned capabilities. Air Force operational testing in 2018 revealed significant issues with JMS Increment 2 performance. The Air Force’s test team determined that Increment 2 was not suitable for operations, as it was unable to provide conjunction assessments or maintain the catalog of space objects, another key performance parameter. In the wake of these findings and the numerous issues found in testing, the Air Force stopped further development on JMS Increment 2. When development ended, JMS was almost 3 years behind schedule and $139 million (42 percent) over budget. Air Force leadership placed the JMS Increment 2 program in sustainment and transferred three of the 12 planned Increment 2 capabilities into operations; the remaining nine capabilities were to be used for planning and analytic purposes only, as they were not reliable enough for operational use. Key requirements from Increment 2, including automated conjunction assessments and the ability to maintain a high-accuracy space catalog, as well as all of the requirements from Increment 3, were deferred to a subsequent effort, called the Space C2 program. Because JMS was unable to replace SPADOC, the system is still in use today. Since 2000, the Air Force has been addressing unique space surveillance requirements for follow-on systems to SPADOC. Air Force officials we spoke with stated that the system’s ability to continue operations is a growing concern. While work is underway to move SPADOC onto a more modernized platform and infrastructure, the Air Force has not established a schedule for that effort. In the meantime, Air Force officials told us that large amounts of data are going unprocessed as the volume of available sensor data today is greater than ever before—and is expected to increase exponentially in the next year as new DOD sensors come online. The Space C2 program is the Air Force’s latest software-intensive program to develop capabilities to anticipate and respond to emerging threats in space and ensure the uninterrupted availability of capabilities to the warfighter. SPADOC is expected to be retired as Space C2 capabilities become operational. The Air Force expects to spend between $72 million and $108 million per year on the Space C2 program, which is managed by the Air Force’s Space and Missile Systems Center, through fiscal year 2024. While it is still early in the planning and development stages, the Air Force’s Space C2 program office expects to deliver a consolidated space command and control system over the next few years using a new system design. The program also plans to use a modernized, iterative software development process called Agile development to more quickly and responsively provide capability to users. According to Air Force officials, this development approach is relatively new to DOD programs. Therefore, the Space C2 program and DOD officials are working to determine the appropriate level of detail needed for the program’s planning documents as well as the best way to provide oversight of a non-traditional development approach. The Space C2 program is intended to consolidate operational level command and control capabilities for DOD space assets into an integrated system, allowing operators and decision makers to have a single point of access to command and control space assets around the globe in a timely manner. A consolidated space command and control capability will: allow operators to comprehensively identify and monitor threats to identify possible courses of action to mitigate or eliminate threats, communicate courses of action to decision makers, and direct action to respond to threats. A consolidated space command and control capability is necessary, according to Air Force and DOD officials we met with, because the space domain has transitioned from a benign environment to one that—like ground, sea, and air domains—is contested by foreign adversaries. According to these officials, DOD needs the ability to respond to the increased threats to U.S. space assets in near real-time. Consequently, the Air Force is planning for Space C2 program capabilities to be significantly more automated than in the past, requiring high-quality software development and architecture planning. As shown in figure 1, the Space C2 program itself will consist of multiple layers. Program officials explained that the foundational layer is the computing infrastructure, which must be secure from vulnerabilities and have adequate processing power to accommodate the complexity of the system. On this infrastructure will run the software platform, which forms the backbone of the operating system. The Space C2 program plans to procure the platform commercially. The software platform will contain standards that developers will need to comply with to create applications that will work on the platform. Some applications may be targeted to a broad number of users, and some may be more niche capabilities for a particular group of users. Space C2 program officials told us they believe this structure will allow them to be flexible in meeting multiple user needs more responsively than has been possible in past DOD programs. Users include, for example, space system operators responsible for predicting and avoiding space object collisions, and other operators responsible for responding to conflicts in space. The program also expects applications from a variety of developers, both commercial and government, to run on the platform, thus presenting opportunities for companies that do not regularly do business with DOD to participate in the program. The work being done for the Space C2 program is spread out among multiple Air Force groups. For example, the Air Force Research Laboratory has been developing applications for the Space C2 program both internally and with commercial partners since 2016. The Laboratory is also working on some battlespace awareness capabilities that may eventually run on the Space C2 program’s platform. Additionally, officials from the Air Force Rapid Capabilities Office stated that they have been working on common interface standards for applications, and this work will feed into the Space C2 program. As the Enterprise Manager, the Space C2 program manager is responsible for integrating all of the development work selected for use in the Space C2 program, irrespective of its origin. A principal component of the Space C2 program is a data repository that will be populated with data from a wide variety of commercial, civil, military, and intelligence space sensors. Eventually the program plans for operators using the Space C2 program’s platform and applications to be able to retrieve data from the data repository. The data will be electronically tagged with its appropriate classification level and will be accessible to users according to their individual security clearances. The overall design of the Space C2 program is for data to be gathered from sensors, placed into the data repository, and then be available for various applications to process and provide timely information to space operators and commanders on threats to space assets and anomalies in the space environment. Operators and commanders will then be able to promptly direct actions, such as tasking sensors to collect additional data or respond to threats. Figure 2 shows the proposed construct of the Space C2 program, including the various actions that can be taken in response to the data collected by the sensors. The Space C2 program is planning to use an approach new to DOD in terms of software development, known as Agile. Agile development is a flexible, iterative way of developing software that delivers working capabilities to users earlier than the traditional, incremental DOD software development processes, known as the waterfall approach. Agile practices integrate planning, design, development, and testing into an iterative life cycle to deliver software early and often, such as every 60-90 days. The frequent iterations of Agile development are intended to effectively measure progress, reduce technical and programmatic risk, and be responsive to feedback from stakeholders and users. This is different from the way DOD has developed software in the past, in which requirements were solidified in advance of development and the software was delivered as a single completed program at the end of the development cycle—with no continual involvement or feedback from users or ability to modify requirements. Traditional software development mirrored the development of a hardware system. We have previously reported on past DOD software programs that experienced challenges due, in part, to that traditional development approach. The differences between the two approaches are illustrated in figure 3. The Space C2 program is one of the first DOD software-intensive programs to move away from the traditional approach and into the more modernized Agile development methodology. Program officials told us that many of the problems with JMS’s development stemmed from its more traditional approach, and that with the Space C2 program they wanted to avoid circumstances that did not lead to program success. Considering that past software development problems were caused, at least in part, by the traditional method of software development, utilizing a different approach could be a positive step. However, the current DOD acquisition instruction does not include guidance for Agile software programs. According to DOD officials, new software guidance is in development, and this guidance is expected to offer pathways for developing Agile programs. DOD has also developed a draft template to assist Agile programs with developing their acquisition strategies, though the template and associated software guidance are in the early stages of development. In the meantime, however, Space C2 program officials confirmed that they are currently operating without specific software acquisition guidance. Space C2 officials also clarified that while official Agile software acquisition guidance has not yet been formally published, the program office has been actively engaged with the Office of the Under Secretary of Defense for Acquisition and Sustainment on refining draft policy and guidance. The program office noted that its program activities over the past year have been informed by and are consistent with this draft guidance. The Space C2 program has submitted preliminary planning documents to the Under Secretary of Defense for Acquisition and Sustainment for approval. While officials in the Under Secretary’s office expect these documents to be modified and expanded upon in late 2019, the Under Secretary gave the program approval to begin its development under an Agile process, signifying her support for using alternative approaches. In addition, Air Force officials told us that the Commander of Air Force Space Command has requested frequent briefings on the program’s development process, and while he does not have approval authority over the program, he is monitoring the program closely. Plans show that the program is conducting 90-day development iterations with the goal of providing working software at the end of each cycle. As of August 2019, the program had completed three program development iterations, and reported delivering capabilities which included: expanding the commercial data available in the data repository; tasking various sensors; and providing a tool for visualization and analytics. The Air Force noted that these capabilities were deployed in a relatively short time; however, most capabilities delivered so far are considered to be available for use “at your own risk,” since they have not yet been fully approved for use in operations. Though the Air Force has not yet published a time frame for certifying these capabilities for operational use, the new development approach is underway and delivering some early capabilities. DOD officials noted that the foundational elements of the Space C2 system, including the infrastructure and software platform, should be completed prior to significant application development; however, at this early stage of the program, the schedule indicating the time frame in which these elements will be completed appears to be still in development. For government programs, some level of insight and oversight is essential when using public funds to develop a system. According to DOD officials, DOD is embracing Agile development because software can be delivered quickly and can be more responsive to user needs. However, according to GAO’s upcoming guide for assessing Agile development programs, known as the Agile Assessment Guide, sound engineering principles are still beneficial when employing this approach. For example, continuous attention to technical excellence and good design requires the developers to consider security requirements throughout development. This is particularly true with complex programs that process sensitive data with complex security requirements. In past work, we have found that teams overlooking security requirements may end up developing systems that do not comply with current federal requirements (for example cybersecurity requirements for information technology programs), resulting in the software not becoming operational until these components are addressed. In addition, the Agile Assessment Guide notes that transitioning to Agile software development can be challenging because Agile methods require organizations to do more than implement new tools, practices, or processes. Agile requires a re-evaluation of existing organizational structures, planning practices, business and program governance, and business measures, in addition to technical practices and tools. However, Agile does not mean eliminating the need for documentation, planning, oversight, architecture, risk analysis, or baseline schedule, for example. Leading practices for Agile software development—as described in GAO’s upcoming Agile Assessment Guide—state that, among other things, programs should have the following characteristics: a product owner who manages the requirements prioritization, communicates operational concepts, and provides continual feedback to the development team; staff who are appropriately trained in Agile methods; management that has established an Agile supportive environment; a program strategy that reflects the mission, architectural, safety- critical components, and dependencies; organization’s acquisition policy and guidance that require the contract type and the acquisition strategy to be aligned to support Agile implementation; an architecture that is planned upfront to enable flexibility and to provide support to Agile methods; and mission goals that drive the prioritization of the most advantageous requirements (e.g., security and privacy) that are well understood and reviewed throughout development. Recognizing the need to change traditional processes to accommodate more iterative software development, both the Air Force and Under Secretary of Defense for Acquisition and Sustainment have created software advisor positions. The Air Force Chief Software Officer and the Special Assistant for Software Acquisition are working to improve and modernize the way DOD acquires software. In addition, DOD is looking into how to use industry practices to modernize the way it develops software. For example, the Office of the Secretary of Defense has a Development Security Operations (DevSecOps) pathfinder program for software, which helps programs define and develop a technical digital roadmap and leverages industry and Office of the Secretary of Defense expertise in developing appropriate infrastructure for software programs. The DevSecOps concept emphasizes rapid prototyping, security, and continuous integration and delivery of software products. In a May 2019 Acquisition Decision Memorandum, the Under Secretary of Defense for Acquisition and Sustainment directed the Space C2 program to become a pathfinder program. This is a positive step, because it should increase input into the program’s acquisition planning by the Office of the Secretary of Defense software development experts. The Office of the Secretary of Defense has other groups that draw on private-sector software development expertise to help DOD programs, including the Defense Digital Service and the Defense Innovation Board. These groups’ missions include improving DOD’s technology and innovation, and the groups can be valuable DOD resources for helping the Space C2 program develop its plans and Agile processes. The Defense Innovation Board conducted a review of some of the Space C2 program’s software acquisition plans in December 2018. According to the Office of the Secretary of Defense officials we spoke with, this informal review was beneficial and resulted in real-time feedback on the approach the program was taking, as well as suggestions for areas to focus on. In the May 2019 memorandum, the Under Secretary of Defense for Acquisition and Sustainment noted that in October 2019 she will determine if an independent technical assessment of the Space C2 program is necessary. Considering the stated benefits of the prior Defense Innovation Board review of the Space C2 program, as well as the fact that using Agile processes for a DOD program is relatively new and includes many unknowns, independent reviews could help ensure the program is on a successful path. As the Office of the Secretary of Defense and the Air Force have made an effort to increase in-house Agile software development expertise, programs like the Space C2 program—especially in light of its early stage of development—could benefit from periodic attention from the experts at its disposal, including input from independent, external reviews to help ensure the necessary software development steps are taken to set programs up for success. DOD programs following traditional acquisition processes conduct internal reviews at major milestones, and GAO best practices for knowledge-based acquisitions also include conducting independent program reviews at these milestones. The draft GAO Agile Assessment Guide notes that while traditional DOD program milestone reviews are not used for Agile programs, Agile programs rely on other review methods such as stakeholder demonstrations and retrospective program reviews during each iteration of work. In addition, the GAO Schedule Assessment Guide, which identifies best practices for managing a program’s schedule, states that programs should conduct periodic reevaluations of risks, and that an independent view in this is valuable. Such reviews offer greater objectivity, as the reviewers are not responsible for the activities being evaluated, and programs benefit from the wide variety of expertise and experience represented by the external review team. In addition, in many cases, having these external reviews periodically can prove useful. The Space C2 program faces a number of management, technical, and workforce challenges. Some of these challenges may ultimately be overcome by time and experience, and the Air Force has efforts underway to mitigate others in the near-term. But it is too early to determine whether these efforts will be sufficient to achieve program success. The Space C2 program faces several management challenges. The Air Force has been working on developing various parts of the Space C2 program since 2016, but as previously noted, the program is working from a draft acquisition strategy and does not yet have an overall program architecture. These plans are important for providing direction for a program and facilitating effective oversight by establishing a business case for the effort. A business case establishes that the program is necessary and that it can be developed with the resources available, and typically includes: a requirements document, an acquisition strategy, sound cost estimates based on independent assessments, and a realistic assessment of risks, including those relating to technology and schedule. In addition, according to Air Force officials, the Space C2 Enterprise Manager has management responsibility—but not authority—over multiple development efforts included in the Space C2 enterprise. For example, technology maturation and risk reduction activities are divided across three program offices, managed by two program executive officers, and reliant upon multiple sources of information. This division of work is being done in part because the various organizations have areas of expertise that the program was hoping to leverage. However, such distribution of activities among many organizations can result in synchronization and coordination challenges. JMS’s development was hampered by similarly-split responsibilities for development contracts for various efforts. Because space is becoming an increasingly contested domain, DOD has noted that its ability to effectively respond to space threats has increased the importance of focused leadership in national security space, to include Space C2. See table 1 for additional details of management challenges facing the Space C2 program. According to officials from the Space C2 program and the Office of the Secretary of Defense, the Space C2 program was allowed to begin development work without an acquisition strategy, due to the program’s urgency. In May 2019, the Under Secretary of Defense for Acquisition and Sustainment tasked the Space C2 program office with revising its preliminary acquisition strategy to be consistent with DOD’s draft template for software acquisition. DOD’s draft template contains specific elements for ongoing planning and evaluation that are to be included in DOD software acquisition strategies moving forward, including acquisition and contracting approach; program management structure, including authorities and oversight plans for platform and infrastructure development; requirements management and development approach, and plans for prioritization; risk management plans, including how the program will identify and mitigate risks; metrics for measuring quality of software, and how those results will be shared with external stakeholders; manpower assessment identifying program workforce needs and state of expertise in Agile methods; requirements for reporting program progress to decision makers; and yearly funding levels. We have also noted these factors in our previous reports that identify the need to develop a sound, executable business case at the outset of a program, and the importance of using knowledge-based decision making in DOD acquisition programs. In addition, our work on best practices for knowledge-based acquisitions has emphasized that the success of any effort to develop a new product hinges on having the right knowledge at the right time, and that a better opportunity exists to meet program goals when the knowledge is available early. However, given that DOD’s draft template is still subject to change, including these elements in the finalized acquisition strategy would help position the program for success. The Space C2 program also faces significant technical challenges, as described in table 2. For example, the program is planning to meet previously deferred requirements that proved too complex for prior programs to achieve. It also plans to address new and emerging threats to space assets, for which requirements are not yet defined. In addition, the program plans to use an Agile software development approach, the processes of which DOD has yet to show proficiency in applying, as discussed above. Integration of the multiple types of software planned for Space C2 is also likely to present considerable technical challenges. Further, cybersecurity is a growing concern for DOD space programs, including Space C2. In addition to the management and technical risks we identified, limited availability of staff with expertise in Agile software development poses a challenge to the Space C2 program and to DOD in general. The Space C2 program manager stated that the program is undertaking an effort that is fast-paced in nature and needs to be rapidly fielded, and she expressed confidence in her staff’s abilities to meet the development demands. However, various DOD officials told us that a lack of qualified software developers within DOD, and within the Space C2 program, is an issue. Agile software development methods are different from the traditional approaches used by DOD, and according to DOD officials, proficiency in Agile methods requires specific training. Software developers with this training are in high demand in the private sector, and according to DOD officials, sufficient numbers may not be immediately available for the Space C2 program. One industry best practice for software development states that to be successful, programs should ensure that each development team has immediate access to people with specialized skills including contracting, architecture, database administration, development, quality assurance, operations (if applicable), information security, risk analysis, and business systems analysis. As early as March 2009, DOD acknowledged it had a top priority to establish a cadre of trained information technology professionals, and that the lack thereof was a significant impediment to successful implementation of any future software development process. Furthermore, a 2018 Defense Science Board report highlights the lack of Agile software expertise in DOD, citing no modern software expertise in program offices or the broader acquisition workforce. Moreover, the report states that DOD defense prime contractors need to build their own internal competencies in modern software methodologies. Similarly, we found in March 2019 that DOD faces several challenges related to hiring, assigning, and retaining qualified personnel to work on space acquisition programs, similar to the challenges it faces more generally with the acquisition workforce. We also noted that DOD is taking steps to address these challenges where possible. In May 2019, the DOD’s Defense Innovation Board issued a congressionally mandated study on software acquisition and practices. The report stated that numerous past studies have recognized the deficiencies in software acquisition and practices within DOD. The report also noted the importance of digital talent and stated that DOD’s current personnel processes and culture will not allow its military and civilian software capabilities to grow fast or deep enough to meet its mission needs. In addition, the report stated that new mechanisms are needed for attracting, educating, retaining, and promoting digital talent and for supporting the workforce to follow modern practices, including developing software in close coordination with users. Finally, the report emphasized that the military services and Office of the Secretary of Defense will need to create new paths for digital talent (especially internal DOD talent) by establishing software development as a high-visibility, high-priority career track and increasing the level of understanding of modern software within the acquisition workforce. This is the case for all DOD space programs, including Space C2. DOD’s ability to command and control U.S. space assets, as well as anticipate and respond to the threats these assets face, is critical. However, over more than three decades, DOD’s efforts to improve its space command and control capabilities—commensurate with the space threats that have continued to grow in frequency and type—have been fraught with development problems. The Air Force has again undertaken a program to meet the nation’s ongoing and future consolidated command and control needs, while trying to overcome past problems with a modern software development process. The Space C2 program is making a concerted effort to learn from past software development mistakes while forging a new path for Agile development. Though DOD is taking steps to ensure that the Space C2 program has a comprehensive approach in place for managing, identifying, and mitigating challenges associated with this approach, key program plans and agency-wide guidance are still in draft form, leaving uncertainty as to how program development and oversight will ultimately proceed. Finalizing a robust acquisition strategy containing the key elements for ongoing planning and evaluation would position the program for success. Striking the right balance between trying new development methods and working within DOD’s knowledge-based framework will be essential for meeting cost, schedule, and performance goals. Periodic assessments of the program’s approach to developing software, done by independent software development experts, could not only help ensure the reviews are balanced, but would also help ensure the Space C2 program effectively addresses the challenges it faces and is situated for success. Such reviews would also help the Space C2 program to identify potential roadblocks, and ultimately, potential solutions. Effectively addressing the challenges facing the Space C2 program will help ensure that needed space command and control capabilities are no longer deferred, but actually delivered. We are making two recommendations to the Department of Defense. The Under Secretary of Defense for Acquisition and Sustainment should ensure that the Air Force’s finalized Space C2 program’s acquisition strategy includes, at a minimum, the following elements: acquisition and contracting approach; program management structure, including authorities and oversight plans for platform and infrastructure development; requirements management and development approach, and plans for prioritization; risk management plans, including how the program will identify and mitigate risks; metrics for measuring quality of software, and how those results will be shared with external stakeholders; manpower assessment identifying program workforce needs and state of expertise in Agile methods; requirements for reporting program progress to decision makers; and yearly funding levels. (Recommendation 1) The Under Secretary of Defense for Acquisition and Sustainment should ensure that the Air Force’s Space C2 program conducts periodic independent reviews to assess the program’s approach to developing software and provide, as needed, advice to the program and recommendations for improving the program’s development and progress. Participants could include, but are not limited to, officials from the Defense Innovation Board, the Defense Digital Service, the office of the Air Force Chief Software Advisor, and the Under Secretary of Defense for Acquisition and Sustainment’s Special Assistant for Software Acquisition. (Recommendation 2) We provided a draft of this product to the Department of Defense for comment. In its comments, reproduced in appendix II, DOD concurred with our recommendations. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of the Air Force, and the Under Secretary of Defense for Acquisition and Sustainment. In addition, the report will be available at no charge on GAO’s website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or ChaplainC@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix III. The House Armed Services Committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 contained a provision for us to review the Department of Defense’s (DOD) efforts to develop space command and control capabilities. This report (1) assesses the status of and plans for ongoing Air Force efforts to develop advanced command and control capabilities for space, and (2) identifies challenges the Air Force faces in developing these capabilities. To assess the status of and plans for ongoing Air Force efforts to develop advanced command and control capabilities for space, we analyzed Air Force Space Command and Control (C2) Program Increment Demonstration and Planning Retrospective reports for the first three increments and examined acquisition strategies for relevant programs, including acquisition strategies and addenda for Joint Space Operations center (JSPOC) Mission System (JMS) Increments 1 and 2. We also examined the Air Force’s draft acquisition strategy for Space C2 and DOD’s draft acquisition strategy for Major Agile Software Programs; reviewed Space C2 document mapping planned capabilities to the specific requirements that will be met by program deliveries; and analyzed status updates from the Space C2 program and the Combined Space Operations Center and program update briefings prepared for congressional staff by the JMS and Space C2 programs and the National Space Defense Center. In addition, we analyzed Space C2 program plans in conjunction with interim DOD guidance for Agile Software Acquisition, the Joint Chiefs of Staff Cyber Survivability Endorsement Implementation Guide, the Office of the Secretary of Defense guidance on cybersecurity operational test and evaluation procedures in acquisition programs and DOD Enterprise Development, Security and Operations (DevSecOps) processes; and examined the Principal DOD Space Advisor’s Capabilities Based Assessment which included issues relating to Space C2. We also reviewed Air Force Broad Agency Announcements and Requests for Information for Space Battle Management Command and Control and Space Situational Awareness capability development. In addition, we obtained information from 12 of the 16 companies with whom the Air Force is working to obtain their perspectives of the Air Force’s approach to developing Space C2 capabilities. To identify challenges the Air Force faces as it develops advanced command and control capabilities for space, we analyzed the JMS Critical Change Certification; examined Joint Requirements Oversight Council memoranda pertaining to the JMS critical change management and certification; reviewed the Air Force’s Space and Missile Systems Center evaluation of commercial capability gaps and capabilities; reviewed the JMS Program Manager briefing on lessons learned; and examined the DOD test and evaluation report on JMS Increment 2 (Service Pack 9). We also reviewed a selected chapter of GAO’s draft Agile Assessment Guide (Version 13), which is intended to establish a consistent framework based on best practices that can be used across the federal government for developing, implementing, managing, and evaluating agencies’ information technology investments that rely on Agile methods. To develop this guide, GAO worked closely with Agile experts in the public and private sector; some chapters of the guide are considered more mature because they have been reviewed by the expert panel. We reviewed this chapter to ensure that our expectations for how the Air Force should apply best practices for development of software capabilities for space command and control are appropriate for an Agile program and are consistent with the draft guidance that is under development, and we compared Space C2 program plans to the practices outlined in the guide. Additionally, since Agile development programs may use different terminology to describe their software development processes, the Agile terms used in this report are specific to the Space C2 program. We also compared Air Force development plans with interim and established DOD guidelines for software development, and GAO best practices for knowledge-based decision-making in weapons system development. We also reviewed prior GAO reports on the Cheyenne Mountain Upgrade, the Combatant Commanders’ Integrated Command and Control System, software acquisition, and cybersecurity. Additionally, we interviewed DOD officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment; Joint Chiefs of Staff, Force Structure, Resources, and Assessment Directorate; U.S. Strategic Command; Air Force Combined Space Operations Center; Defense Advanced Research Projects Agency; Missile Defense Agency; Office of the former Principal DOD Space Advisor; Air Force Space Command; Air Force Research Laboratory; Defense Digital Service; Office of Cost Assessment and Program Evaluation; Air Force Rapid Capabilities Office; National Space Defense Center; and Air Force Space and Missile Systems Center. Finally, we interviewed officials from commercial companies that are known in the space community to have potential input into the development of space command and control capabilities to understand how the Space C2 program plans to integrate commercial capabilities into the program. We conducted this performance audit from January 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Rich Horiuchi, Assistant Director, Emily Bond, Claire Buck, Maricela Cherveny, Burns Eckert, Laura Hook, and Roxanna Sun made key contributions to this report. Assistance was also provided by Pamela Davidson, Kurt Gurka, Jennifer Leotta, Harold Podell, Marc Schwartz, James Tallon, Eric Winter, and Alyssa Weir.", "summary": "Since the early 1980s, the Air Force has been working to modernize and consolidate its space command and control systems into a single comprehensive platform. The past three programs to attempt this have ended up significantly behind schedule and over budget. They also left key capabilities undelivered, meeting the easier requirements first and deferring more difficult work to subsequent programs. At the same time, the need for a consolidated space command and control capability has been growing. The House Armed Services Committee report accompanying a bill for the National Defense Authorization Act for Fiscal Year 2018 contained a provision for GAO to review DOD's newest efforts to develop space command and control capabilities. This report describes the status of these efforts and identifies challenges the Air Force faces in bringing them to fruition. To conduct this work, GAO analyzed acquisition and strategy documentation, management directives, and lessons learned; and compared Air Force development plans with leading industry practices for software development, DOD guidelines, and best practices included in a draft GAO guide for assessing Agile software development programs. Given emerging and evolving threats in the space domain, as well as significant development problems in similar prior efforts, the Air Force is prioritizing the Space Command and Control (C2) program. Early prototype work on the program's software began in 2016. As of mid-2019, the program had delivered some initial capabilities; however, the capabilities delivered so far are not approved for use in operations. Because the program is still early in development, it has not yet established a time frame for certifying these capabilities for operational use. Further, the foundational elements of the program, including the infrastructure and software platform, are still being conceptualized. All Space C2 program capabilities will be significantly more automated than past development efforts and are being designed to allow operators to identify and monitor threats to U.S. space assets, identify courses of action to mitigate or eliminate those threats, communicate these actions to decision makers, and direct actions in response. To develop Space C2's technologically complex software, the Air Force is following a modernized, iterative process called Agile development—a relatively new approach for Department of Defense (DOD) programs (see figure). The Space C2 program is facing a number of challenges and unknowns, from management issues to technical complexity. Additionally, DOD officials have not yet determined what level of detail is appropriate for acquisition planning documentation for Agile software programs. They are also not certain about the best way to provide oversight of these programs but are considering using assessments by external experts. These knowledge gaps run counter to DOD and industry best practices for acquisition and put the program at risk of not meeting mission objectives. Additionally, software integration and cybersecurity challenges exist, further complicating program development. The Air Force has efforts underway to mitigate some of these challenges in the near term, but until the program develops a comprehensive acquisition strategy to more formally plan the program, it is too early to determine whether these efforts will help to ensure long-term program success. GAO is making two recommendations, including that DOD should ensure the Air Force develops a comprehensive acquisition strategy for the Space C2 program. DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "Under the National Response Framework, the Department of Homeland Security is the federal department with primary responsibility for coordinating disaster response, and within the department, FEMA has lead responsibility. Due to the massive response needed after Hurricanes Irma and Maria in the U.S. Virgin Islands and Puerto Rico, FEMA utilized the National Response Framework to activate all 14 ESFs, including ESF#8. The National Response Framework designates state, local, tribal, and territorial agencies as primarily responsible for response activities in their jurisdictions, including those related to public health and medical services. However, when effective disaster response is beyond the capabilities of the state, territorial, or tribal government and affected local governments, such as was the case for Hurricanes Irma and Maria, those governments can request federal assistance. The federal response for a specific ESF is designed to supplement the state, local, tribal, or territorial resources that respond to a disaster or other emergency. However, due to the physical destruction of the two hurricanes in the U.S. Virgin Islands and Puerto Rico, the territorial government agencies that were tasked with coordinating resources to respond to such disasters were largely incapacitated. This resulted in an unprecedented federal role in the response to these disasters. As the lead agency for an ESF#8 response, ASPR is responsible for coordinating the ESF#8 response core capabilities outlined in the National Response Framework. These core capabilities include assessment of public health and medical needs, patient evacuation, patient care, the provision of medical equipment and supplies, and public health communication, among others. ASPR coordinates these core capabilities through two main roles defined in the National Response Framework—the coordinator and the primary agency. As the coordinator, ASPR oversees and coordinates the preparedness activities for ESF#8 support agencies, nongovernmental organizations, and the private sector. For example, ASPR must maintain contact with support agencies through conference calls, training, and other activities, prior to events; monitor the ESF’s progress in being able to meet the outlined core capabilities; as well as coordinate planning and preparedness efforts with nongovernmental organizations and the private sector. As the primary agency, ASPR has significant authorities, roles, resources, and capabilities to fulfill during an ESF#8 response. Its responsibilities include notifying and requesting assistance from support agencies and coordinating resources, as well as working with all types of organizations, such as ESF#8 support agencies, territory officials, and other stakeholders to maximize the use of all available resources. As part of a response, ASPR may activate the National Disaster Medical System (NDMS)—an interagency partnership among HHS, DOD, VA, and the Department of Homeland Security to supplement health and medical systems and response capabilities during a public health emergency. Under NDMS, ASPR and its partner agencies provide medical response (by deploying medical personnel teams, for example), evacuate patients, and provide medical care in NDMS medical facilities when requested by state, local, tribal, and territorial governments or other federal agencies. For example, as part of NDMS, DOD and FEMA may provide transportation to evacuate seriously ill or injured inpatients. DOD and VA may operate and staff NDMS Federal Coordinating Centers, which are activated during an emergency to receive, triage, stage, track, and transport patients affected by a disaster or national emergency to a participating NDMS medical facility capable of providing the required care to manage the patient’s condition. After an ESF#8 response, ASPR evaluates HHS’s disaster response activities through an after-action review. According to the Department of Homeland Security’s Homeland Security Exercise and Evaluation Program guidance, which ASPR follows, this review should include collecting feedback about the response activities to identify strengths and areas for improvement, and developing corrective actions to address identified areas for improvement. This information is then documented in an after-action report and corrective action improvement plan. The populations in the U.S. Virgin Islands and Puerto Rico are older than the general U.S. population. Estimates indicate that the total population in the U.S. Virgin Islands in 2018 was approximately 107,000 and about 18 percent (or about 19,000 individuals) were age 65 or older. Estimates for Puerto Rico indicate that the total population in 2018 was approximately 3.3 million and about 20 percent (or about 666,000 individuals) were age 65 or older. In comparison, almost 16 percent of the general population in the 50 states and the District of Columbia, totaling approximately 329.3 million, were age 65 or older in 2018. To serve these populations, the U.S. Virgin Islands has two hospitals, one on St. Thomas and one on St. Croix, each with a capacity of 150 beds. Puerto Rico has 68 hospitals scattered throughout the island. The capacity of beds ranges from less than 10 to 515, with a total of almost 10,000 hospital beds to serve the territory. The 2017 Atlantic Hurricane season was one of the most active seasons in U.S. history, causing widespread damage and destruction to significant populations in the continental United States and the territories. In particular, two hurricanes—Irma and Maria—struck in quick succession and devastated the U.S. Virgin Islands and Puerto Rico. Hurricane Irma – a category 5 storm passed by the U.S. Virgin Islands—St. Thomas and St. John—on September 6, and continued by Puerto Rico. In the U.S. Virgin Islands, the storm caused high storm surge, flooding, extensive damage to buildings and infrastructure, and widespread power outages. It became one of the strongest Atlantic hurricanes on record. Hurricane Maria – a category 5 storm passed by the U.S. Virgin Islands—St. Croix—on September 20, and made landfall in Puerto Rico as a category 4 storm. Hurricane Maria compounded the damage caused by Hurricane Irma in the U.S. Virgin Islands, and devastated Puerto Rico. Heavy flooding and high winds led to the catastrophic damage to Puerto Rico’s power grid, as well as severe damage to the water, communications, transportation, and health care infrastructure. The majority of Puerto Rico’s power grid was down for nearly two months following Hurricane Maria, with outages continuing through 2018. Figure 1 depicts the paths of Hurricanes Irma and Maria. Figure 2 contains photographs of damage sustained in the U.S. Virgin Islands. Figure 3 contains photographs of damage sustained in Puerto Rico. At the same time ASPR was responding to the catastrophic hurricanes in the U.S. Virgin Islands and Puerto Rico, the agency was also responding, or had recently responded, to hurricanes in other areas. Specifically, ASPR led the ESF#8 response to Hurricane Harvey, a category 4 hurricane that made landfall in Texas on August 25, 2017. Further, in addition to responding to the effects of Hurricane Irma on the U.S. Virgin Islands, ASPR was leading the response to that hurricane in Florida. Also, while ASPR was still responding to Hurricanes Irma and Maria, Hurricane Nate, a category 1 hurricane, hit Louisiana and Mississippi on October 7 and 8, 2017, respectively. While not as severe as the prior hurricanes, Hurricane Nate resulted in wind damage, flooding, and storm surge, and required a public health and medical services response. (See figure 4 for a timeline of the 2017 hurricanes requiring ASPR to lead an ESF#8 response.) ASPR and support agencies evacuated critical care and dialysis patients and deployed medical staff and temporary medical facilities as part of the response to Hurricanes Irma and Maria. These activities centered on saving lives and preventing human suffering. During the response to Hurricanes Irma and Maria, ASPR led the NDMS evacuation of critical care and dialysis patients. According to ASPR officials, Hurricane Irma damaged critical health care infrastructure and created a deteriorating situation in St. Thomas that necessitated life-saving evacuations to Puerto Rico, particularly as St. Croix’s health care facilities could not support the needs of both islands. Specifically, after Hurricane Irma damaged the only hospital on St. Thomas, ASPR prioritized evacuating critical care patients to Puerto Rico. Once ASPR officials further determined that St. Thomas did not have the capacity to treat dialysis patients, ASPR also coordinated the movement of dialysis patients to Puerto Rico. This was the first time ASPR had coordinated the evacuation of such patients during an ESF#8 response. ASPR used HHS’s Centers for Medicare and Medicaid Services’ data to locate dialysis patients on St. Thomas who were unable to be reached by local authorities for evacuation. As the threat of Hurricane Maria making landfall in Puerto Rico became evident, ASPR began moving U.S. Virgin Islands patients previously evacuated to Puerto Rico to the continental United States, according to ASPR and Department of Interior documentation. See figure 5 for a timeline of patient evacuations conducted through NDMS from the U.S. Virgin Islands and Puerto Rico after Hurricanes Irma and Maria. ASPR worked with other agencies to evacuate NDMS patients. Specifically, ASPR relied on DOD to provide transportation because HHS did not have its own transportation capabilities. For example, DOD provided personnel and transportation to conduct aeromedical evacuations of patients from the U.S. Virgin Islands to Puerto Rico and the continental United States. In addition, DOD operated a Federal Coordinating Center in the continental United States, and VA operated Federal Coordinating Centers in Puerto Rico and the continental United States to receive evacuated patients and place them into NDMS medical facilities. For example, the day after Hurricane Irma passed the U.S. Virgin Islands, ASPR requested that VA operate the San Juan Federal Coordinating Center to begin receiving evacuated U.S. Virgin Islands patients. See figure 6 for a photograph of NDMS evacuation of U.S. Virgin Islands dialysis patients to the continental United States. During the response to Hurricanes Irma and Maria, ASPR and some of its ESF#8 support agencies—DOD and VA—deployed medical staff and temporary medical facilities to respond to the public health and medical needs in the U.S. Virgin Islands and Puerto Rico. Using these medical assets, ASPR and its support agencies served almost 16,000 patients in Puerto Rico and almost 2,000 patients in the U.S. Virgin Islands over the course of about four weeks after Hurricane Maria, according to ASPR reports. Examples of ASPR medical staff and facilities include, but are not limited to, the following: Disaster Medical Assistance Teams. ASPR placed Disaster Medical Assistance Teams in front of the major hospitals in the U.S. Virgin Islands and Puerto Rico to triage patients and to relieve the hospitals’ emergency departments by treating patients with acute care needs during the response to Hurricanes Irma and Maria. Disaster Medical Assistance Teams comprise about 35 medically trained personnel and equipment. In addition, Disaster Medical Assistance Teams were sometimes divided into six-person teams—known as Health Medical Taskforce Teams—that are more agile, according to ASPR officials. These smaller teams supported response operations in the U.S. Virgin Islands and Puerto Rico by traveling into hard–to-reach places to provide acute medical care, stabilize patients, and call for the transport of patients, when needed. According to ASPR officials, ASPR deployed a Disaster Medical Assistance Team to Puerto Rico prior to Hurricane Maria making landfall and then divided it into smaller teams to provide medical care around San Juan, Puerto Rico. According to these officials, HHS was one of the few federal agencies to have operational personnel available immediately post landfall. See figure 7 for photographs of Disaster Medical Assistance Teams setting up and providing services in Puerto Rico. Federal Medical Stations. ASPR placed Federal Medical Stations in tents in front of hospitals in Puerto Rico after Hurricane Maria made landfall to assist with relieving the hospitals’ emergency departments. Federal Medical Stations are to have a 3-day supply of medical and pharmaceutical resources to sustain up to 250 stable, primary, or chronic care patients. Because the entire island of Puerto Rico was affected by Hurricane Maria, ASPR implemented a “hub and spoke” strategy for the first time—a system to deliver medical care over affected areas’ population centers—according to ASPR officials. Under this strategy, ASPR designated San Juan’s Centro Medico hospital as the “hub” of activity with six “spokes” delivering care to the island’s population centers, and placed Federal Medical Stations in tents in front of each hospital, including the “hub.” USNS Comfort Deployed to Puerto Rico to Respond to Hurricane Maria The USNS Comfort is a seagoing medical treatment facility that had more than 850 medical and support staff embarked as part of the public health and medical services response to Hurricane Maria in Puerto Rico, according to Department of Defense (DOD) officials. DOD officials stated that approximately 2,000 patients in Puerto Rico were provided care on the USNS Comfort during the course of its 45-day relief mission that began in early October 2017. The USNS Comfort’s primary mission is to provide an afloat, mobile, medical–surgical facility to the U.S. military that is flexible, capable, and uniquely adaptable to support expeditionary warfare. The ship’s secondary mission is to provide full hospital services to support U.S. disaster relief and humanitarian operations worldwide. Medical Companies provided trauma, medical, and surgical care to populations in Puerto Rico after Hurricane Maria. Among other medical facilities, DOD also provided a Combat Support Hospital to Puerto Rico 3 weeks following Hurricane Maria—which consisted of 44 beds with emergency medical technicians; an operating room, laboratory, pharmacy, and X-ray machine; and primary care and intensive care capabilities. DOD also sent the USNS Comfort—a hospital ship maintained by the U.S. Navy that served as a mobile, floating hospital—to help relieve the hospitals in Puerto Rico. VA medical staff. VA deployed medical personnel through its Disaster Emergency Medical Personnel System—VA’s main deployment program for clinical and non-clinical staff to an emergency or disaster—to assist ASPR with staffing the Federal Medical Stations. According to VA officials, these personnel worked side by side with other federal personnel, such as Disaster Medical Assistance Teams, to provide medical assistance. Our review identified several key deficiencies with ASPR’s leadership of the federal public health and medical services response to Hurricanes Irma and Maria in the U.S. Virgin Islands and Puerto Rico that could adversely affect future large-scale responses unless they are addressed. Limited ASPR presence in the U.S. Virgin Islands. As the primary agency, ASPR is responsible for coordinating the ESF#8 response, including coordinating with support agencies and officials at operations centers. Further, FEMA’s ESF#8 statement of work for ASPR states that HHS should provide appropriate personnel at emergency operations centers near disaster sites to lead an ESF#8 response. HHS officials maintained that the Department is not required to address all capabilities in the ESF#8 statement of work, as the actual response provided by HHS depends on other factors, such as resource availability. Emergency Operations Center An emergency operations center is a physical location where responders, including federal and state/territory responders, as well as nongovernmental responders, can meet to coordinate information and resources to support incident management (on-scene operations) during a response. According to Department of Homeland Security documentation, decision makers gather at emergency operations centers to ensure they receive the most current information, which allows for improved communication and decision-making during a response. During the initial weeks after the hurricanes, ASPR liaison officers were not always stationed at the emergency operations centers in St. Thomas and St. Croix. Instead, the liaisons rotated between the emergency operations center, hospital, and airport on each island to manage patient evacuations, or stayed at the hospital, according to ASPR officials. This led to confusion with regard to the ESF#8 response status on the ground, according to FEMA, DOD, and territory health officials. For example, FEMA officials stated that when they needed information on patients’ health needs and evacuation status, they had to spend time trying to locate an ASPR liaison officer to obtain it. The FEMA officials then had to relay this information to DOD, territory health officials, and hospital representatives who were making numerous requests for this information to FEMA in ASPR’s absence at the centers. FEMA officials stated that relaying medical information was outside their areas of expertise as were other activities they conducted in ASPR’s absence, such as addressing public health issues at shelters. One FEMA official stated that he had to read handwritten notes from the hospital that contained patient information, such as vitals and prescription needs, and provide this information to other responders. Without a medical background, he did not know the meaning of a lot of the medical terms used. Furthermore, these FEMA officials stated that given communication systems were down on the islands, having a reliable, physical presence at the emergency operations centers in St. Thomas and St. Croix became even more critical. After a few weeks into the response, ASPR liaison officers were stationed at emergency operations centers, according to ASPR officials, but the officers generally rotated about every 2 weeks with limited time to hand off information and were often not from Region II. This limited ASPR’s leadership of the response and put undue resource strain on other responders, according to FEMA and territory health officials. For example, according to FEMA and U.S. Virgin Islands health officials, the liaison officer would not necessarily understand the big picture, the tasks to be done, or the players involved. Thus, FEMA and territory health officials would have to take time to bring the ASPR liaison officer up to speed on the pressing public health and medical services issues, and shortly thereafter the officer would leave to be replaced by someone else, who would also need to be brought up to speed. ASPR officials provided two different reasons for the staffing challenges encountered at the emergency operations centers in the U.S. Virgin Islands. First, some ASPR officials cited personnel resource constraints. Specifically, these officials stated that ASPR personnel had already been deployed multiple times, given the prior hurricane (Hurricane Harvey) and concurrent events that ASPR was responding to in multiple locations. As a result, officials said there was not enough time to educate rotating officials on issues faced in the U.S. Virgin Islands and deployments were shorter than ideal. Second, other ASPR officials stated that a lack of transportation from Puerto Rico to the U.S. Virgin Islands may have resulted in minimal overlap of liaison officers. According to these officials, they had to request such transportation from FEMA, and FEMA did not always prioritize their needs, since it was also managing transportation needs from other ESFs. However, FEMA officials contested this statement and stated there was ample opportunity for ASPR liaison officers to get to the U.S. Virgin Islands. In retrospect, ASPR officials acknowledged that staffing emergency operations centers, as well as other strategic locations is ideal. ASPR documentation after the response states that the officers’ presence at emergency operations centers is important because they need to be working at the operational and tactical levels on the ground. In addition to staffing emergency operations centers, ASPR officials agreed with statements from FEMA and DOD officials who told us that the ideal scenario would be to have at least one other liaison officer (if not more) to support the lead liaison officer at all strategic locations. The officials noted that the number of liaison officers may vary depending on the response needs. In the case of patient evacuations, for example, this would include having a liaison officer at the airport and one at the hospital, in addition to the lead at the emergency operations center. In contrast, DOD officials stated that after Hurricane Irma, one ASPR liaison was on St. Croix trying to manage all the ESF#8 activities, including patient evacuations and hospital assessments, which was too much for one person. In May 2019, ASPR officials told us they have a long-term goal of creating an incident response team that will comprise 17 full-time response personnel. If implemented, this strategy may allow ASPR to provide more liaisons on the ground during a response and address the staffing deficiency we identified. However, ASPR officials did not provide us with a draft strategy or a timeline for the creation of such a team. Until ASPR develops a response personnel strategy to ensure it has sufficient liaison officers available to consistently lead a response from emergency operations centers and other strategic locations, the agency risks repeating the challenge encountered in the U.S. Virgin Islands—notably, a situation with inadequate liaison officer presence to effectively lead a response on the ground. Delay in tracking evacuated patients. Tracking NDMS evacuated patients and ensuring their care is a critical component of the public health and medical services response. The ESF#8 Annex of the National Response Framework states that patients should be tracked from their point of entry into NDMS. However, our review found that ASPR did not track patients evacuated through NDMS from the U.S. Virgin Islands to Puerto Rico immediately after Hurricane Irma. This occurred because of delays in getting HHS tracking personnel to the territories, according to VA documentation, as well as ASPR, DOD, VA, FEMA, and U.S. Virgin Islands Department of Health officials. Specifically, HHS teams that track patients were not deployed to the region until about 5 days after patients were already being evacuated through NDMS. These teams are (1) Joint Patient Assessment and Tracking System (JPATS) teams, which enter patient information into JPATS—ASPR’s tracking system—and (2) service access teams, which track and monitor the status of evacuated patients, including facilitating movement to home or other final destination after being discharged from care. As a result of the delayed deployment of the tracking teams, ASPR officials did not initially know the locations of some NDMS evacuated patients in Puerto Rico. For example, once in Puerto Rico, the service access teams had to drive around the territory looking for evacuees, according to ASPR officials. ASPR officials explained that there was a delay in tracking patients after Hurricane Irma because it takes time for JPATS and service access teams to deploy to a region. ASPR officials told us that they did not pre-deploy the tracking teams before the hurricane, because the U.S. Virgin Islands officials did not request ASPR’s help with patient evacuations until after Hurricane Irma hit. ASPR officials also stated that at the time of the hurricanes, the agency had no policy for tracking patients from the start of NDMS evacuations; however, since the hurricanes, the agency has developed a federal patient movement framework that may help prevent future delays in patient tracking. This framework describes the pre-deployment of JPATS and service access teams, which would allow for tracking to start at the beginning of NDMS evacuations. ASPR officials told us this is the optimal solution. However, during an event such as a hurricane, sufficient notice for pre-deployment is not always possible. One option identified in ASPR’s federal patient movement framework is for FEMA to track patients initially and share these data with ASPR and for DOD to provide patient movement manifests to ASPR so that the data can be manually entered into JPATS once deployed, which will contain the overall dataset for patient tracking. By working with DOD and FEMA, ASPR may be able to consistently track patients from the start of evacuations even when there is a deployment delay in HHS’s own tracking capabilities. While ASPR’s development of the framework is an important step forward to address delays in patient tracking, ASPR has not exercised the framework with its NDMS partners to ensure it is sufficient and reliable. For example, given the potential need to manually enter information into JPATS, there could still be a delay in HHS knowing where patients are located and being able to inform family members. An exercise of the framework could help determine if this is indeed a concern that needs to be addressed. We have previously reported that exercises are a key tool for testing and evaluating preparedness. ASPR officials told us that exercising the framework prior to the next hurricane season had been discussed, but as of May 2019, nothing had been scheduled. Without a framework that has been exercised with the other agencies involved in federal patient movement and tracking, ASPR risks delays in patient tracking when conducting future NDMS patient evacuations. Final status of one-fourth of evacuated patients not readily available. The ESF#8 Annex of the National Response Framework states that NDMS evacuated patients should be tracked to their final disposition. Further, federal internal controls standards stress the importance of information controls to ensure quality information is used to achieve objectives, which includes information that is complete and accurate. However, we found that of the approximately 800 NDMS patient evacuations during the response to Hurricanes Irma and Maria, the agency could not readily provide us with the final status of approximately 200 of these patients. ASPR officials stated they did not have information indicating the final status of the 200 evacuated patients, because case workers are not required to report this information to ASPR. ASPR officials explained that the case workers on the service access teams deployed during the response are responsible for keeping track of patients’ final status. However, we found that without conducting a review of files in which the case workers recorded patients’ final status, ASPR officials could not determine if the patients were appropriately discharged and returned back to the U.S. Virgin Islands, left the system against medical advice, or were otherwise unaccounted for. Additionally, as of June 2019, ASPR did not provide documentation indicating the steps the agency takes to ensure the data held by case workers are accurate. Until ASPR has controls in place to ensure that data on NDMS evacuated patients are complete and accurate, the agency cannot ensure it is sufficiently tracking all NDMS evacuated patients and risks losing track of patients when conducting future patient evacuation efforts. Limited focus on chronic and primary care needs in isolated locations. As the coordinator, ASPR is responsible for ensuring that appropriate planning and preparedness activities are undertaken. This includes planning for the care of elderly and chronically ill patients in isolated areas. Our review found that at the time of the hurricanes, ASPR Region II’s response plans for the U.S. Virgin Islands and Puerto Rico—known as Incident Response Plans—did not account for the need for chronic and primary care in isolated communities. This type of care was greatly needed, given that many people, especially the elderly, could not easily access hospitals, according to officials from ASPR, DOD, the Puerto Rico Department of Health, and three stakeholders we interviewed. Consistent with the views of these officials, the HHS Deputy Inspector General reported that during Hurricane Maria, hundreds of patients across Puerto Rico sought access to urgent care, primary care, and pharmacy services at community-based health care centers, known as Federally Qualified Health Centers, because they could not travel to hospitals for treatment. Further, we reported in May 2019 and heard from two stakeholders that because of the widespread power outages and infrastructure damage in both territories, the chronically ill often did not have access to electricity to power their medical devices—such as ventilators—and gasoline to run generators was scarce. ASPR’s initial response activities—which generally focused on supporting the hospitals and patients with acute care needs—were based on response plans with assumptions that did not hold true given the unprecedented level of destruction in the areas. Specifically, according to ASPR officials, the agency focused its response planning on managing the surge of patients at hospitals, assuming that individuals would make their way to hospitals, and projecting that smaller communities could care for one another until further needs assessments could be conducted. For example, ASPR Region II and Puerto Rico health officials assumed in their planning that patients in the harder to reach areas, such as the mountainous areas, would make their way to the coast where hospital care was available, according to ASPR officials. ASPR officials also stated that preparedness planning for an immediate response is generally focused on managing the surge of patients at hospitals, with the assumption that after about a week into the response, assessments would be conducted to determine other needs, such as chronic care needs. However, ASPR officials told us that in retrospect, the planning and the assumptions used for planning for the U.S. Virgin Islands and Puerto Rico were not adequate given the unprecedented level of destruction in the areas, which affected communications and transportation. FEMA officials also said that given how difficult it was to assess the situation in Puerto Rico after Hurricane Maria, having prior knowledge of the situation on the ground that could affect the response (such as the general public health and medical needs in the territories during non-disaster times) was a lesson learned that applies to them, as well as ASPR. ASPR has taken steps to better account for the need for chronic and primary care in isolated communities in future public health and medical services responses. However, these efforts have not been finalized or incorporated into ASPR Region II Incident Response Plans for the territories, which according to a lead HHS Region II official, are internal agency plans that serve as a playbook for HHS officials during an ESF#8 response in these territories. Specifically, ASPR is working with the Puerto Rico Department of Health officials to map the locations of health care facilities in Puerto Rico—such as clinics, Federally Qualified Health Centers, urgent care centers, and hospitals—including their bed, generator, communication, and surge capacities. This is the first time all such information has been brought together, and ASPR continues to work on this effort as it helps the territory recover, according to agency documentation. ASPR officials also told us that moving forward they would like to involve Federally Qualified Health Centers in planning and response activities, including involving them in the provision of primary care during responses. We agree that these are important steps that ASPR can take to address this deficiency. However, until ASPR Region II Incident Response Plans for the territories include the provision of chronic and primary care in isolated communities, there is a risk that disaster survivors will not receive needed care. For example, this could include the incorporation of Federally Qualified Health Centers or other local health clinics into these plans. Misalignment of support agencies’ capabilities to response needs. As the coordinator, ASPR is responsible for ensuring that appropriate planning and preparedness activities are undertaken, including monitoring the progress in meeting the ESF#8 core capabilities. Further, FEMA guidance issued in June 2015 states that each ESF coordinator should maintain a capabilities inventory for the ESF. However, our review found that ASPR did not have a sufficient understanding of ESF#8 support agencies’ capabilities prior to the hurricanes. Consequently, ASPR’s resource needs for the response in the U.S. Virgin Islands and Puerto Rico were not always aligned with the resources its support agencies—DOD, VA, and FEMA—could provide. According to ASPR documentation and DOD officials, this resulted in some deployed resources not being properly and efficiently utilized. As an example of the misalignment of resources, DOD officials told us that, through FEMA, ASPR requested that DOD provide stand-alone medical assistance teams (i.e., teams of medical personnel and equipment, similar to ASPR’s Disaster Medical Assistance Teams) to deliver medical care to the hurricane survivors in the U.S. Virgin Islands and Puerto Rico. However, since DOD does not have stand-alone teams, it deployed Area Support Medical Companies, which included facilities, equipment, and supply packages. These teams are equipped to serve the military population—those approximately 18-60 years of age, wounded, and requiring trauma and medical-surgical care. However, trauma and medical surgical care was not the primary need in the islands, which, in general, have an older population with chronic and primary care needs. ASPR documentation also shows that ASPR had trouble defining how FEMA and DOD assets fit into the overarching ESF#8 response. For example, ASPR documentation states that it took the agency nearly a week to fully realize that the two Area Support Medical Companies provided by DOD were not equivalent to the five stand-alone medical assistance teams that HHS had requested. According to DOD officials, the misalignment of resources during the response was troublesome as the Department’s involvement in the ESF#8 response activities affected patient care for military health beneficiaries and potentially increased overseas contingency response risks for the Department. In another example, during the response, there were conflicting expectations about VA personnel’s role in supporting the Federal Medical Stations, with VA responders thinking they would run shelter operations and ASPR believing the VA staff would support medical operations, according to ASPR documentation. According to ASPR officials, the agency had never anticipated needing— and therefore did not plan for—certain ESF#8 agency support, such as teams similar to ASPR’s Disaster Medical Assistance Teams. ASPR’s role in a response has traditionally been to support states or territories; however, because of the catastrophic nature of the hurricanes, ASPR effectively led the territories in the response as opposed to playing a supporting role. ASPR’s response system was not designed to handle that large of a role, according to officials. Since the hurricanes, ASPR has taken steps to understand the resources available from its support agencies, but ASPR officials agreed that it is an activity that the agency needs to continue to undertake. Specifically, ASPR officials stated that the agency is currently working with its NDMS partners (FEMA, DOD, and VA) to develop memorandums of agreement that outline the roles and responsibilities of each organization; however, the discussions are in the preliminary stages as ASPR continues to collaborate with each organization to understand their resource gaps and capabilities. Continuing to understand each ESF#8 support agency’s potential capabilities and its limitations—knowing that the actual capacity of these capabilities may fluctuate—is important, as evidenced by the misalignment that occurred during the response. Until ASPR can better identify the capabilities and limitations of support agencies to meet ESF#8 core capabilities, ASPR cannot, as the coordinator, determine whether the ESF is prepared for future disasters. Reliance on DOD support. As the coordinator, ASPR is responsible for ensuring that appropriate planning and preparedness activities are undertaken. This includes planning for a scenario in which DOD assistance is unavailable. We have previously reported that DOD provided much of the ESF#8 support during the initial response to Hurricanes Irma and Maria, which may not always be available in future responses. DOD’s support included providing the core capabilities of patient care (through the provision of Area Support Medical Companies, among other medical facilities) and patient evacuations (through the provision of personnel and transportation to conduct aeromedical evacuations), as mentioned above. We found that ASPR does not have a response strategy that will account for the core capabilities needed to be filled by itself or other support agencies in a large or long-term ESF#8 response if DOD were unable to assist. For example, DOD’s 2017 hurricane after-action report included reliance on DOD as a concern and recommended that HHS and FEMA establish contracts with the commercial sector to ensure the federal government has other options available for larger ESF#8 responses should DOD not have the needed capability or available capacity. Similarly, in September 2018, we reported that ESF lead agencies’ (including ASPR for ESF#8) dependence on DOD capabilities was a challenge for DOD during the response to Hurricanes Irma and Maria. We reported that the increased reliance may create vulnerability, if in the future, DOD capabilities are needed to conduct its primary mission—to defend the nation from threats—at the same time its support is needed for a domestic disaster response. ASPR told us that it does not have a contingency plan for a response in DOD’s absence, because for large-scale events, such as Hurricanes Irma and Maria, ASPR has to rely on DOD, given ASPR’s own resource constraints. ASPR officials stated that, in general, ASPR’s resource response capacity—personnel and supplies—can support a response to two simultaneous events that occur in different areas in the Continental United States for 30 days. Beyond that, ASPR has to rely on other agencies, including DOD, which occurred with Hurricanes Irma and Maria. However, ASPR officials did state that the agency has recently taken some steps to reduce its reliance on DOD. Specifically, in September 2018, ASPR entered into a contract with a private company to provide medical personnel teams similar to Disaster Medical Assistance Teams that can be utilized to supplement ASPR response personnel, especially if DOD resources are not available. Similarly, to assist with future patient evacuations, in October 2018, the agency entered into contracts with private companies for commercial air ambulance transport. In addition, ASPR officials told us that through ASPR’s participation in the Whole of Government Logistics Council, the agency has begun to further discuss air transport options during major disasters with other agencies including FEMA, DOD, and VA. However, ASPR officials also stated there is a need to hold discussions with all agencies involved in the ESFs to prioritize and coordinate air transportation during a response in the event that DOD is not available. While these are important steps to potentially minimize reliance on DOD, ASPR’s own capacity constraints make it all the more important for ASPR to a develop response strategy that includes other support agencies in the event that DOD support is unavailable. For example, such a strategy could involve conducting an exercise to simulate a large-scale ESF#8 response without DOD capabilities. Until ASPR develops a strategy demonstrating how ESF#8 core capabilities can be provided through HHS and its support agencies without DOD’s assistance, it risks being unprepared to respond to a large-scale disaster or multiple disasters if they occur when DOD’s capabilities are limited due to other events, such as military missions. ASPR completed a draft after-action report in February 2018 after several months of collecting feedback from HHS staff on the strengths and areas for improvement in the agency’s 2017 ESF#8 response activities; however, the draft is missing the perspectives of key parties involved in the response. Not collecting the perspectives of key parties involved in the response is inconsistent with federal standards for information and communication, which state that management needs access to relevant information from external parties to help achieve objectives and address related risks. Further, the Standard for Program Management states that program managers should actively engage key stakeholders throughout the life cycle of a program, which would include any evaluation activities. Specifically, when collecting feedback, ASPR did not reach out directly to support agencies, territorial governments in the U.S. Virgin Islands and Puerto Rico, or other stakeholders intimately involved in the response. Instead, ASPR gathered observations through facilitated discussions, or “hotwashes,” with HHS personnel stationed at key response sites in headquarters and the field, such as personnel stationed at the HHS Secretary’s Operations Center and those stationed at medical sites in Puerto Rico. In addition, ASPR distributed an electronic feedback link to all personnel involved in the HHS ESF#8 response, both in the field and headquarters. ASPR officials stated they did not obtain feedback directly from outside parties, such as support agencies or territorial governments, during the after-action review because the review was focused on internal aspects of the HHS response. Instead, the officials said that FEMA—as the overall lead for the federal response—typically writes the overall after-action report for the whole federal government, and those perspectives would be captured there. However, FEMA’s after-action report was focused only on its response activities for the 2017 hurricanes and did not include any strengths or areas for improvement related to ESF#8. Because ASPR did not obtain feedback from its ESF#8 support agencies and other partners, its draft after-action report dated February 2018 has key gaps in its assessment. For example, three of the deficiencies we identified based on our review of documentation and interviews with agency and territory officials—the delay in tracking evacuated patients, the final status of some evacuated patients not readily available, and the reliance on DOD support—were not included in ASPR’s draft after-action report. This indicates that key perspectives, and related lessons learned, were missing from ASPR’s after-action review. Similarly, FEMA officials said that during the course of soliciting feedback on its own response actions, FEMA’s provider of NDMS medical evacuation transportation for Hurricanes Irma and Maria said that if ASPR had reached out, it would have identified challenges with the NDMS patient evacuations conducted. In particular, the provider told FEMA that patients were evacuated to an airport in the continental United States with limited hours of availability, and if patients had to be evacuated outside of those hours, they were sent to other airports with inadequate medical care, so the patients needed to be transported again as a result. Without an after-action report that includes the perspectives of all key parties—including ESF#8 support agencies—ASPR management is likely to lack the necessary information to comprehensively identify all strengths and areas for improvement of its ESF#8 response. The catastrophic destruction encountered as a result of Hurricanes Irma and Maria proved overwhelming to the U.S. Virgin Islands and Puerto Rican governments and resulted in a large federal disaster response, complicated by losses of power, communication, transportation, and health care infrastructure in the territories. ASPR and its support agencies, such as DOD, undertook numerous actions to address the public health and medical needs in the territories—including evacuating critical care and dialysis patients from the U.S. Virgin Islands and Puerto Rico. Nevertheless, key deficiencies with ASPR’s leadership of the response resulted in confusion and resource strain among responders from support agencies and territory health departments at emergency operations centers in the U.S. Virgin Islands. The deficiencies also resulted in service access teams having to search for evacuated patients, ASPR’s inability to readily and reliably identify the final status of all evacuated patients, and disaster survivors in isolated areas potentially not receiving needed health care. ASPR’s leadership also led to an inefficient use of federal resources. Many of the deficiencies were a function of ASPR policy and its preparedness planning, and as such, they could be repeated unless ASPR addresses them. Additionally, the agency remains unprepared to respond to future large-scale disasters if DOD is unavailable. Further, the likelihood that deficiencies will recur in future responses increases, because ASPR did not include feedback from the support agencies involved in the response in its after-action report. We are making the following seven recommendations to the Assistant Secretary for Preparedness and Response: ASPR should develop a response personnel strategy to ensure, at a minimum, a lead ASPR liaison officer is consistently at the local emergency operations center(s) during an ESF#8 response and another liaison, if not more, is at strategic location(s) in the area. (Recommendation 1) As ASPR finalizes its federal patient movement framework, the agency should exercise the framework with its NDMS partners to ensure that patients evacuated through NDMS will be consistently tracked from the start of their evacuation. (Recommendation 2) ASPR should put controls in place to ensure data on all NDMS evacuated patients are complete and accurate. (Recommendation 3) ASPR Region II should revise its Incident Response Plans for the territories to include strategies for providing chronic and primary care in isolated communities. These strategies could include the incorporation of Federally Qualified Health Centers and other local health clinics as part of a response. (Recommendation 4) ASPR should work with support agencies to develop and finalize memorandums of agreement that include information on the capabilities and limitations of these agencies to meet ESF#8 core capabilities. (Recommendation 5) ASPR should develop a strategy demonstrating how it ESF#8 core capabilities can be provided through HHS and ESF#8 support agencies if DOD’s capacity to respond is limited. (Recommendation 6) ASPR should take steps to ensure the perspectives of key external parties are incorporated in the development of HHS’s after-action reviews, following future ESF#8 activations. (Recommendation 7) We provided a draft of this report for advance review and comment to HHS, DOD, the Department of Homeland Security, VA, and the governments of the U.S. Virgin Islands and Puerto Rico. HHS and VA provided written comments, which we have reprinted in appendixes I and II, respectively. HHS concurred with five of our seven recommendations and stated that it had, or was in the process of, taking action. While we made no recommendations to VA, in its comments VA stated that it looks forward with working with HHS on matters we have presented in this report. HHS and DOD provided technical comments, which we incorporated as appropriate. U.S. Virgin Islands and Puerto Rican government officials stated they had no comments on the draft report. HHS did not concur with a recommendation in the draft report directing ASPR to develop and finalize ESF#8 response plans for the territories that include strategies for providing chronic and primary care in isolated communities. In its comments, HHS stated that while ASPR has federal plans in place that guide federal response, each state and locality is responsible for developing its own individual plans. We modified the language in our report and our recommendation to clarify we are referring to ASPR Region II’s Incident Response Plans for the U.S. Virgin Islands and Puerto Rico. According to a lead ASPR Region II official, these plans are internal agency plans that serve as a playbook for HHS officials during an ESF#8 response in these territories. However, as we reported, these plans do not account for the provision of chronic and primary care in isolated communities. Accordingly, we believe our recommendation is warranted. HHS also did not concur with a recommendation in the draft report that ASPR work with support agencies to develop an inventory to identify the capabilities and limitations of support agencies to meet ESF#8 core capabilities. According to HHS, such an inventory will be out of date immediately after development due to world events and changes in investments, technologies, and priorities. Instead, HHS proposed the continued use of interagency liaison officers at the HHS emergency operations center, as they can provide real-time updates on available resources during a response. We agree that HHS should continue this practice in future responses. However, as is evidenced by the misalignment that we identify in our report, this action was not adequate during the response to Hurricanes Irma and Maria in the U.S. Virgin Islands and Puerto Rico. Further, as we reported, ASPR officials acknowledged that more needs to be done to better understand the resources available from its support agencies. To clarify the intent of our recommendation—that is, that ASPR take steps to ensure it has a sufficient understanding of each ESF#8 support agency’s potential capabilities and its limitations—we modified language in our report and the recommendation. Specifically, we modified our recommendation to direct ASPR to include information on the capabilities of these agencies as it works to develop and finalize memorandums of agreement with support agencies. The memorandums of agreement that ASPR is beginning to draft with support agencies provide an opportunity to begin to address this issue. As we have reported, taking such action is needed to help ensure that future ESF#8 responses are more efficiently and effectively coordinated. We are sending copies of this report to the appropriate congressional committees, the Secretaries of the Health and Human Services, Defense, Homeland Security, Veterans Affairs, and Interior, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or DeniganMacauleyM@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Mary Denigan-Macauley, (202) 512-7114 or DeniganMacauleyM@gao.gov. In addition to the contact named above, Kelly DeMots (Assistant Director), Deirdre Gleeson Brown (Analyst-in-Charge), Kenisha Cantrell, Justin Cubilo, and Rebecca Hendrickson made key contributions to this report. Also contributing were Sam Amrhein, Kaitlin Farquharson, and Vikki Porter. Disaster Response: FEMA and the American Red Cross Need to Ensure Key Mass Care Organizations are Included in Coordination and Planning. GAO-19-526. Washington, D.C.: September 19, 2019. Disaster Response: Federal Assistance and Selected States and Territory Efforts to Identify Deaths from 2017 Hurricanes. GAO-19-486. Washington, D.C.: September 13, 2019. Disaster Assistance: FEMA Action Needed to Better Support Individuals Who Are Older or Have Disabilities. GAO-19-318. Washington, D.C.: May 14, 2019. 2017 Disaster Contracting: Actions Needed to Improve the Use of Post- Disaster Contracts to Support Response and Recovery. GAO-19-281. Washington, D.C.: April 24, 2019. 2017 Hurricane Season: Federal Support for Electricity Grid Restoration in the U.S. Virgin Islands and Puerto Rico. GAO-19-296. Washington, D.C.: April 18, 2019. Disaster Recovery: Better Monitoring of Block Grant Funds is Needed. GAO-19-232. Washington, D.C.: March 25, 2019. Puerto Rico Hurricanes: Status of FEMA Funding, Oversight, and Recovery Challenges. GAO-19-256. Washington, D.C.: March 14, 2019. U.S. Virgin Islands Recovery: Status of FEMA Public Assistance Funding and Implementation. GAO-19-253. Washington, D.C.: February 25, 2019. 2017 Disaster Contracting: Action Needed to Better Ensure More Effective Use and Management of Advance Contracts. GAO-19-93. Washington, D.C.: December 6, 2018. Homeland Security Grant Program: Additional Actions Could Further Enhance FEMA’s Risk-Based Grant Assessment Model. GAO-18-354. Washington, D.C.: September 6, 2018. 2017 Hurricanes and Wildfires: Initial Observations on the Federal Response and Key Recovery Challenges. GAO-18-472. Washington, D.C.: September 4, 2018. Federal Disaster Assistance: Individual Assistance Requests Often Granted but FEMA Could Better Document Factors Considered. GAO-18-366. Washington, D.C.: May 31, 2018. 2017 Disaster Contracting: Observations on Federal Contracting for Response and Recovery Efforts. GAO-18-335. Washington, D.C.: February 28, 2018. Disaster Assistance: Opportunities to Enhance Implementation of the Redesigned Public Assistance Grant Program. GAO-18-30. Washington, D.C.: November 8, 2017.", "summary": "Hurricanes Irma and Maria hit the U.S. Virgin Islands and Puerto Rico within two weeks of each other in September 2017, causing catastrophic damage. HHS is responsible for leading the federal public health and medical services response during a disaster, such as these hurricanes. As part of its lead federal role during these hurricanes, HHS called upon support agencies, including the Departments of Defense, Homeland Security, and Veterans Affairs, to assist with the public health and medical services response. GAO was asked to review the federal public health and medical services response to Hurricanes Irma and Maria in the U.S. Virgin Islands and Puerto Rico. This report examines HHS's actions and leadership of this response, among other things. GAO reviewed documentation on the preparedness for, and response to, the hurricanes. It also interviewed federal and territory officials and interviewed or received written responses from eight nonfederal stakeholders involved in the response, such as nongovernmental organizations. GAO identified these stakeholders through research and referrals. The catastrophic destruction encountered as a result of Hurricanes Irma and Maria proved overwhelming to the U.S. Virgin Islands and Puerto Rican governments and resulted in a large federal disaster response, complicated by losses of power, communication, and health care infrastructure. The Department of Health and Human Services (HHS) led the federal public health and medical services response and undertook numerous actions to address the needs in the territories—including evacuating critical care and dialysis patients from the U.S. Virgin Islands and Puerto Rico and providing medical personnel and facilities. However, GAO identified several shortcomings in HHS's leadership. While the scale, location, and timing of these storms complicated response efforts, the deficiencies GAO identified were in many cases a function of preparedness policies, or lack thereof. As a result, they could adversely affect future large-scale responses unless addressed. For example, as the lead agency, HHS is responsible for ensuring that appropriate planning activities are undertaken, including monitoring the federal ability to provide core public health and medical services response capabilities. However, GAO found that HHS did not have a full understanding of the capabilities and limitations of its support agencies, including the Departments of Defense, Homeland Security, and Veterans Affairs. Consequently, HHS's needs were not always aligned with the resources that its support agencies could provide, resulting in some deployed resources not being properly and efficiently utilized. For example, HHS requested Department of Defense medical teams, but these teams specialized in trauma and surgical care, not the chronic and primary care needed. HHS lacked plans for the territories that accounted for the chronic and primary care needs in isolated communities. This care was greatly needed, given that many, especially the elderly, could not easily access hospitals. GAO is making seven recommendations, including that HHS develop agreements with support agencies that include response capability and limitation information, and develop response plans for providing care in isolated communities. HHS disagreed with two of the seven citing, among other things, territory responsibility for plans. GAO clarified the intent of the two recommendations and believes that all seven are warranted.", "document_type": "gao"}
{"report": "FAA, within the U.S. Department of Transportation, provides air traffic services for the continental United States (domestic airspace) and over parts of the Atlantic, Pacific, and Arctic oceans (oceanic airspace). More than 24 million square miles of oceanic airspace are under U.S. control. This airspace is divided into flight information regions (flight regions): Anchorage Arctic, Anchorage Oceanic, New York Oceanic, and Oakland Oceanic. Air traffic service (ATS) route is a specified route designed to channel the flow of traffic as necessary for the provision of air traffic services. ATS routes are defined by predetermined geographical positions— waypoints. For example, ATS route G344 is published by FAA and is defined by waypoints. Organized Track System is a series of ATS routes. For example, A590, R591, and G344, along with other ATS routes, comprise the North Pacific Route System. In areas with high flight volume, such as between California and Hawaii, FAA publishes air traffic service (ATS) routes that allow air traffic controllers to handle large volumes of traffic. A set of ATS routes—an organized track system—functions as a freeway in the sky, with routes serving as lanes (see sidebar). ATS routes may be “fixed” or “flexible.” A fixed route does not change; whereas a flexible route changes daily depending on weather patterns, such as prevailing winds. As detailed in industry reports, multiple factors—including weather conditions, congestion, and airspace restrictions—affect whether aircraft operators plan to fly on ATS routes published by FAA or on routes they determine to be the most efficient for that flight (i.e., user-preferred routes). Figure 1 shows U.S. oceanic airspace and the location of various organized track systems. To fly through U.S. oceanic airspace, aircraft operators (e.g., airlines) file a flight plan, which includes the departure and arrival airports and the planned route (i.e., the path the aircraft plans to take to get to its destination). Air traffic control may clear the flight plan as filed—with no changes—and/or makes changes to an aircraft’s planned route during the flight. To manage air traffic, air traffic controllers must be able to monitor an aircraft’s position as it flies along its planned route. As we have previously reported, in domestic airspace, radar and ground-based Automatic Dependent Surveillance-Broadcast (ADS-B) technology provides this surveillance information. Radar is a ground-based system that provides information on an aircraft’s position to air traffic control facilities. Ground- based ADS-B uses equipment installed in aircraft (transmitters) to broadcast an aircraft’s position, altitude, and other information to ground stations, which transmit the data to air traffic control facilities. Surveillance information from radar and ADS-B is nearly instantaneous— allowing domestic air traffic controllers to effectively “see” where an aircraft is at all times. FAA manages radar and ground-based ADS-B infrastructure, in some cases through contracts. Through its contract with the provider of ADS-B services, FAA also pays for the cost of transmitting ADS-B messages from aircraft to air traffic control in domestic airspace. Future Air Navigation System (FANS) Equipage in U.S. Oceanic Airspace By 2020, FAA estimates that about 80 percent of aircraft flying in U.S. airspace above the Atlantic Ocean will be equipped with FANS as will 84 percent of aircraft flying in U.S. airspace above the Pacific Ocean. However, FANS equipage varies within these airspaces. In the New York flight region, specifically along the West Atlantic Route System, FAA estimates that by 2020 the FANS equipage rate will be 66 percent—lower than other sectors of Atlantic airspace. Similarly, in the Oakland flight region, along the Central East Pacific Route System, FAA estimates that by 2020 the FANS equipage rate will be 75 percent—lower than found in other sectors of Pacific airspace. controllers receive reports on an aircraft’s position from a radio operator who receives verbal updates from pilots using a high frequency radio or automatically through a technology called Future Air Navigation System (FANS): High frequency radio allows pilots to speak with a third-party radio operator and share surveillance information via spoken position reports at mandatory reporting points. The radio operator then relays position reports as a data message to air traffic controllers. FANS includes a communication system—Controller Pilot Data Link Communications (CPDLC)—and a surveillance system—Automatic Dependent Surveillance-Contract (ADS-C). CPDLC allows pilots and air traffic controllers to communicate directly by exchanging text- based messages. Through ADS-C, air traffic control can request position reports and specify their frequency as well as the information they should include. As we have previously reported, position reports sent through ADS-C can transmit at defined time intervals, when specific events occur such as pilot deviation from the planned route, or at the request of air traffic control. ADS-C reports sent at a defined time interval are called periodic reports—in U.S. oceanic airspace these are typically sent every 10 to 14 minutes. As detailed in an industry report, aircraft operators pay to use the satellite communication networks required to transmit communication and surveillance information to air traffic control in oceanic airspace. In addition, aircraft operators are responsible for the cost of equipping their aircraft with communication, navigation, and surveillance equipment. To help them manage oceanic airspace, U.S. air traffic controllers use a computer system called Advanced Technologies and Oceanic Procedures (ATOP). ATOP is a flight data processing system that controllers use at their workstations. It provides oceanic air traffic controllers with several automated tools to assist in maintaining aircraft at safe distances from one another, coordinate with air traffic controllers in other flight regions, and facilitate controller-pilot communication through CPDLC, among other things. ATOP incorporates information from aircraft flight plans and position reports allowing controllers to monitor an aircraft’s progress, ensure it is following the route cleared by air traffic control, and to continually check for any potential conflicts between aircraft flying through their area of control, i.e., aircraft that could get too close to one another. Separation standards—the minimum distances required between aircraft—help ensure that aircraft do not collide with one another. As illustrated in figure 2, separation standards dictate the minimum required longitudinal, lateral, and vertical distance between aircraft. The International Civil Aviation Organization (ICAO) publishes minimum separation standards for oceanic airspace. Using ICAO separation standards as the minimum, FAA sets the separation standards and aircraft requirements that are used in U.S. oceanic airspace. Currently, the minimum distance that must be maintained between aircraft in U.S. oceanic airspace is 30 nautical miles lateral and 30 nautical miles longitudinal. To be eligible for this U.S. oceanic minimum separation standard, an aircraft must be equipped with FANS, in addition to meeting other communication, navigation, and surveillance requirements. For aircraft without FANS, the minimum distance required between aircraft is larger, at least 50 nautical miles lateral and approximately 80 nautical miles longitudinal. While requiring more distance between aircraft helps ensure safety, it means less airspace capacity and may result in fewer direct and fuel- efficient routes. To maintain the required separation distance between aircraft, air traffic control may instruct an aircraft—either before or during flight—to fly at an altitude or along a route that is not the most efficient for that aircraft in terms of flight time or fuel usage. For example, aircraft spaced 50 nautical miles apart laterally and longitudinally are less likely to be able to fly at a fuel-efficient altitude (e.g., 38,000 feet) as fewer aircraft will fly at that altitude, especially in congested airspace. In contrast, when aircraft are spaced 30 nautical miles apart laterally and longitudinally, more aircraft can fly at fuel-efficient altitudes. FAA may adopt ICAO’s minimum separation standards for the oceanic airspace it manages or it can adopt standards that require aircraft to fly farther apart than ICAO’s minimum standards. For example, ICAO published the minimum separation standard for 30 nautical miles longitudinal in 2002. FAA began applying these minimum separation standards in the Oakland Oceanic flight region in 2007, in the Anchorage Oceanic flight region in 2012, and in the New York Oceanic flight region in 2013. In 2016, ICAO published a new minimum separation standard, which allows a minimum lateral distance of 23 nautical miles. FAA has not yet adopted the 23 nautical mile lateral standard. Since 2012, ICAO has worked to develop new minimum separation standards for oceanic airspace that require even less distance between properly equipped aircraft. These new minimum separation standards are based on improved surveillance capabilities, with aircraft using space-based ADS-B potentially eligible to use one set of reduced minimum separation standards (19 nautical miles lateral and 17 nautical miles longitudinal) and aircraft using enhanced ADS-C potentially eligible to use a different set of minimum separation standards (23 nautical miles lateral and 20 nautical miles longitudinal). These new minimum separation standards are undergoing review with final approval expected in 2020. FAA’s Advanced Surveillance Enhanced Procedural Separation (ASEPS) program, which is part of FAA’s Air Traffic Organization, was tasked with examining how to increase the efficiency and capacity of operations in U.S. oceanic airspace using enhanced surveillance technologies. In fiscal years 2015 through 2018, congressional committees directed FAA to accelerate its evaluation of space-based ADS-B and provided funding for that purpose. In response, the ASEPS program, among other things, evaluated and compared the costs and benefits of two technologies that could improve surveillance capabilities in U.S. oceanic airspace— enhanced ADS-C and space-based ADS-B. Following are descriptions of how these enhanced surveillance technologies work: Enhanced ADS-C. Uses the same ADS-C technology already installed on FANS-equipped aircraft, but ATOP would request that automatic position reports be sent more frequently to air traffic control. Aircraft equipped with ADS-C and transmitting position reports every 3.2 minutes would be eligible for ICAO’s proposed minimum separation standard of 20 nautical miles longitudinal. ICAO’s 23 nautical miles lateral separation standard, published in 2016, does not require more frequent ADS-C position reports. Space-based ADS-B. Uses low-earth orbiting satellites to capture automatic reports broadcast by ADS-B transmitters installed on aircraft, which will be required for aircraft flying at certain altitudes in domestic U.S. airspace by 2020. ADS-B messages are to be received by air traffic control about every 8 seconds. Aircraft equipped with ADS-B transmitters using the space-based ADS-B system and also equipped with required communication and navigation technologies, would meet the eligibility requirements for ICAO’s proposed minimum separation standards of 19 nautical miles lateral and 17 nautical miles longitudinal. As shown in figure 3, enhanced ADS-C and space-based ADS-B use similar transmission networks but relay different information at different time intervals to air traffic control. To compare these options, FAA prepared a business case analysis that estimated the costs to the agency and aircraft operators, identified safety benefits from enhanced surveillance, and identified and calculated the value of operational efficiency benefits from using reduced minimum separation standards enabled by enhanced ADS-C and space-based ADS-B. For more detail on the costs and benefits included in FAA’s business case analysis, see appendix IV. FAA used this business case analysis to inform its decision on which enhanced surveillance technology to use to support new minimum separation standards. FAA is implementing new minimum separation standards supported by enhanced ADS-C in U.S. oceanic airspace. FAA does not plan to use space-based ADS-B in U.S. oceanic airspace; instead, the agency intends to study how to use space-based ADS-B in other U.S. airspace over the next 5 years. According to FAA, this approach is driven by its analysis of the costs and benefits of each enhanced surveillance technology and the safety and operational challenges of using space- based ADS-B in U.S. oceanic airspace. According to FAA officials and based on project status reports, FAA is implementing new minimum separation standards in U.S. oceanic airspace that are supported by enhanced ADS-C. The agency plans to apply these standards in all sectors of U.S. oceanic airspace by 2022, as shown in figure 4. Specifically, FAA will begin operational use of the 23 nautical mile lateral separation standard in U.S. oceanic airspace in 2021 and the 20 nautical mile longitudinal separation standard in 2022. In April 2019, FAA executives approved a schedule and funding for the implementation of these new minimum separation standards (i.e., 23 nautical miles lateral and 20 nautical miles longitudinal) in U.S. oceanic airspace using enhanced ADS-C. To implement these new standards, FAA officials are upgrading ATOP and working through a review process required to change minimum separation standards in U.S. oceanic airspace. This review process involves 18 milestones, including safety assessments, coordinating with industry and international participants, and developing procedures and training materials for pilots and air traffic controllers. According to FAA officials, the costs and benefits of pursuing this approach—using enhanced ADS-C to support the adoption of new minimum separation standards, i.e., 23 nautical miles lateral and 20 nautical miles longitudinal—drove this decision. Specifically, FAA found that the benefits to airspace users of using enhanced ADS-C to enable new minimum separation standards, such as improved access to fuel- efficient altitudes, outweighed, by 2 to 1, the total costs, including FAA’s costs to upgrade ATOP and the aircraft operators’ data costs due to more ADS-C position reports. In addition, FAA officials said that although new minimum separation standards can provide benefits to airspace users overall, the current minimum separation standards support safe operations for current and anticipated levels of air traffic in U.S. oceanic airspace. Officials noted that the benefits to airspace users of new minimum standards are contingent on the communication, navigation, and surveillance capabilities of aircraft in an airspace and the frequency of disruptive weather patterns. According to FAA officials and air traffic controllers we spoke with, the current minimum separation standards (i.e., 30 nautical miles lateral and longitudinal) are rarely used as the density of aircraft traffic in U.S. oceanic airspace does not require such close spacing. In areas of U.S. oceanic airspace with higher traffic volumes, such as along the West Atlantic Route System and the Central East Pacific Route System, the number of aircraft without FANS and the frequency of disruptive weather patterns often prevent air traffic controllers from applying current minimum separation standards. Officials noted that they are also implementing the new minimum separation standards to harmonize with adjacent air navigation service providers. FAA’s ability to implement these new minimum separation standards (i.e., 23 nautical miles lateral and 20 nautical miles longitudinal) in their documented time frames depends on the success of planned ATOP upgrades. For example, FAA officials and air traffic controllers we spoke to told us that there is a current limitation in ATOP that under certain circumstances, air traffic controllers cannot rely on the system to ensure that minimum longitudinal separation distances are maintained. As a result, air traffic controllers cannot grant aircraft flying at the current minimum longitudinal separation distance their requests to deviate from their planned route for reasons such as avoiding disruptive weather or turbulence. Representatives of the union that represents FAA air traffic controllers told us this limitation must be resolved before new separation standards (i.e., 23 nautical miles lateral and 20 nautical miles longitudinal) can be safely applied. FAA officials told us that they have developed an ATOP software upgrade that could resolve this issue; the upgrade is scheduled to occur in 2021. However, if this upgrade does not resolve the issue or it takes longer to resolve than planned, implementation of the new minimum separation standards could be delayed. According to FAA officials, the cost of space-based ADS-B was a major factor in their decision not to use this technology in U.S. oceanic airspace. FAA’s initial business case analysis found that the costs of using space- based ADS-B to enable reduced separation outweighed the benefits. Specifically, the estimated subscription costs to access the data collected by space-based ADS-B and needed upgrades to ATOP outweighed the estimated benefits to airspace users by 6 to 1. As mentioned above, according to FAA officials, current minimum separation standards allow safe operations for current and anticipated levels of air traffic in U.S. oceanic airspace. Therefore, without a positive business case (i.e., benefits are larger than the costs), FAA officials decided they could not pursue this enhanced surveillance option for U.S. oceanic airspace. FAA officials we interviewed also had safety concerns about using space- based ADS-B to manage reduced separation in U.S. oceanic airspace at this time. Specifically, FAA officials told us the operational considerations for most of the U.S. oceanic airspace were not reflected in the data used by ICAO to model the safety of these standards—air traffic control response times and rates of approved and unapproved aircraft weather deviations. For example, the ICAO panel responsible for analyzing the safety of the proposed minimum separation standards enabled by space- based ADS-B used data from the North Atlantic on the number of times aircraft deviate without authorization from their expected flight plan due to weather conditions. According to FAA officials, other oceanic regions— especially in U.S. oceanic airspace—experience a higher frequency of these deviations. As a result, FAA officials do not plan to use the new minimum separation standards enabled by space-based ADS-B (i.e., 19 nautical miles lateral and 17 nautical miles longitudinal) until FAA can further address how to implement these standards in U.S. oceanic airspace. FAA officials we interviewed also had operational concerns about using space-based ADS-B with ATOP to manage separation between aircraft in U.S. oceanic airspace. Specifically, FAA officials told us that ATOP is designed to use information in ADS-C position reports—i.e., an aircraft’s current location, the next waypoint the aircraft will pass and at what time, and the subsequent waypoint the aircraft will pass—to determine potential conflicts in aircraft flight paths. Without this information, ATOP would not receive the data it uses to detect conflicts within the next 2 hours of a flight, according to FAA officials. ADS-B messages do not include this information and therefore, space-based ADS-B would not replace ADS-C in U.S. oceanic airspace. Due to these cost, safety, and operational concerns with using space- based ADS-B to enable reduced separation, the ASEPS program deferred a decision, originally scheduled for September 2018, on whether to invest in using space-based ADS-B in U.S. oceanic airspace. FAA officials said that while they have not yet found a positive business case for using space-based ADS-B in U.S. oceanic airspace, they will further study space-based ADS-B in U.S. offshore and oceanic airspace. According to FAA officials, they expect further study to identify additional benefits and resolve operational challenges to using space-based ADS-B. FAA officials and documents indicate that the agency has near-term, medium-term, and long-term plans with goals, milestones, and time frames to evaluate how to use space-based ADS-B in U.S. airspace over the next 5 or more years. These plans include an operational evaluation and other studies to assess the uses and benefits of space-based ADS-B in U.S. airspace. FAA officials told us they expect to use findings from the near-term operational evaluation to inform medium-term and long-term plans. According to FAA officials and documentation, the ASEPS program intends to conduct an operational evaluation of space-based ADS-B in U.S. offshore airspace managed by controllers based in Miami, as shown in figure 5. FAA officials told us that this operational evaluation will assess space- based ADS-B with the computer system used by domestic air traffic controllers—the En Route Automation Modernization (ERAM) system. The operational evaluation will also focus on how to use space-based ADS-B in the heavily travelled airspace between the U.S. East Coast and islands in the Caribbean and assess potential benefits. As detailed by FAA officials, a radar that is located on Grand Turk Island provides critical data to U.S. air traffic controllers and enables the use of domestic separation standards of 5 nautical miles in this airspace. When this radar is out of service, which happens on a regular basis, aircraft traversing the airspace between Florida and Puerto Rico must be spaced using oceanic separation standards (e.g., separation distances of 30 nautical miles or greater). According to an industry report and FAA officials, this situation leads to re-routes and delays, which negatively affect airline operations. Using space-based ADS-B as a back-up surveillance system would ensure that even when the Grand Turk radar fails, U.S. air traffic control can continue to manage air traffic using domestic separation standards. In 2021, once the operational evaluation is complete, the ASEPS program expects to make recommendations to FAA executives on how to use space-based ADS-B in the Miami oceanic flight region, in addition to other areas. FAA officials also said that this evaluation will allow the agency to test space-based ADS-B in an operational environment and that the findings can inform its medium-term and long-term plans for using space- based ADS-B. The use of space-based ADS-B in this airspace could also result in more direct routes between the U.S. East Coast and islands in the Caribbean. According to FAA officials and documentation, the ASEPS program expects to study additional potential benefits of space-based ADS-B over the next 3 to 5 years. These medium-term initiatives are expected to: Analyze the use of space-based ADS-B for contingency operations in U.S. airspace. This study would define where space- based ADS-B can be used to provide surveillance capabilities when ground-based infrastructure (e.g., radar) is unavailable, such as after a hurricane. As part of this plan, the ASEPS program would also identify upgrades that would be needed for air traffic control computer systems to support using space-based ADS-B. Analyze operational challenges in U.S. oceanic airspace and potential solutions. This study of U.S. oceanic airspace would include a data-driven analysis of the use and constraints on the use of user-preferred routes by aircraft in U.S. oceanic airspace. In addition to providing information on potential inefficiencies in oceanic airspace operations, the analysis will cover how to mitigate potential safety hazards related to the use of space-based ADS-B in the oceanic environment and the requirements for future upgrades to ATOP to support the use of space-based ADS-B. According to FAA officials, both medium-term initiatives would result in recommendations for consideration by FAA executives in 2021. Using space-based ADS-B for contingency operations could lead to updated air traffic control procedures and computer upgrades; however, this would depend on the results of the analysis and the approval of FAA executives. The analysis of user-preferred routes in oceanic airspace could lead to recommendations on how to optimize route systems and how to use space-based ADS-B to support the use of user-preferred routes. According to FAA officials and documentation, using space-based ADS-B to enable the use of new minimum separation standards in U.S. oceanic airspace will be reviewed and evaluated over the next 5 or more years. This long-term initiative will use information learned through the near-term and medium-term plans. As part of this initiative, the ASEPS program intends to investigate options for enhanced communication technologies and encourage industry development of these technologies. As with the medium-term initiatives, the ASEPS program expects to make recommendations to FAA executives on how to proceed with this plan in 2021. Based on the results of this initiative, program officials told us they could start preparing for an investment decision on using space-based ADS-B in oceanic airspace to enable the use of new minimum separation standards in 2025 or later. Most (11 of 14) of the selected airlines we interviewed and surveyed support FAA’s approach to enhance surveillance capabilities in U.S. oceanic airspace by pursuing enhanced ADS-C and adopting new minimum oceanic separation standards of 23 nautical miles lateral and 20 nautical miles longitudinal in the near term. Most (12 of 14) also support continuing to evaluate how to use space-based ADS-B in oceanic airspace. Of those selected airlines that did not support FAA’s approach, the reasons included concern that using enhanced surveillance technologies will increase operator costs with no clear benefits and that FAA is prioritizing enhanced ADS-C over space-based ADS-B despite the safety and technological advances the latter would enable. While most selected airlines (12 of 14) were satisfied or very satisfied with how FAA manages the safety of U.S. oceanic airspace, most noted the need to improve operational efficiency in this airspace. Specifically, many selected airlines (10 of 14) reported experiencing operational inefficiencies, including not being able to fly at fuel-efficient altitudes. Many of these airlines (9 of 10) view adopting new minimum separation standards as a way to address these inefficiencies. Other aviation stakeholders, including the unions representing FAA air traffic controllers and commercial airline pilots, also see the need to enhance surveillance and adopt new minimum separation standards to ensure that U.S. oceanic airspace remains efficient as international air traffic grows. Selected airlines identified several benefits they would expect to see from the implementation of new minimum oceanic separation standards, including improved access to fuel-efficient altitudes, redesigned organized track systems, and improved access to user-preferred routes. Most selected airlines (12 of 14) we surveyed view improved access to fuel-efficient altitudes as a benefit of reduced separation standards. Aircraft flying in controlled airspace cannot change altitudes (e.g., move from 36,000 feet to 38,000 feet) without air traffic control approval. With reduced minimum separation standards, air traffic control could grant more altitude change requests, allowing aircraft to more consistently fly at fuel-efficient altitudes. For example, representatives from one airline told us that an aircraft’s ability to climb and descend as needed provides both safety and operational benefits. Other airline representatives also told us that the ability to fly at fuel-efficient altitudes results in savings on fuel costs. Many selected airlines (9 of 14) think FAA should make changes to organized track systems once new minimum separation standards are adopted. These changes include reducing lateral separation between routes or removing the systems entirely to enable aircraft to fly user- preferred routes all the time. Reduce lateral separation between the routes in organized track systems. Currently, all organized track systems in U.S. oceanic airspace have routes spaced at least 50 nautical miles apart laterally. Several selected airlines (3) told us that they would expect FAA to take advantage of new reduced minimum separation standards by spacing routes more closely together. For example, representatives from one airline suggested spacing the routes in the West Atlantic Route System 30 nautical miles apart laterally—thus increasing the number of routes from 10 to 19 and significantly increasing airspace capacity. In a report prepared by the NextGen Advisory Committee’s Enhanced Surveillance Task Group at the request of FAA, there was also support for taking advantage of new minimum separation standards enabled by enhanced surveillance to reduce the lateral separation between routes in the Central East Pacific Route System. Remove all organized track systems. Several selected airlines (5 of 14) also viewed the adoption of new minimum separation standards as a step toward the removal of all organized track systems. Removing all organized track system routes would, by definition, mean aircraft operators could fly user-preferred routes optimized according to their preferences, such as fuel use and flight time. Air navigation service providers in Canada and the United Kingdom, which are responsible for managing the North Atlantic Organized Track System, told us that the use of space-based ADS-B and the proposed separation standards it supports (i.e., 19 nautical miles lateral and 17 nautical miles longitudinal), may lead to the end of published ATS routes for the North Atlantic Organized Track System. Many selected airlines indicated that current separation standards inhibit their ability to fly user-preferred routes (10 of 14) as well as their ability to fly the most efficient user-preferred routes (11 of 14). Many selected airlines (9 of 14) view more access to user-preferred routes or the ability to fly more efficient user-preferred routes as an expected benefit of new minimum separation standards. Several selected airlines (3 of 14) also told us that they no longer request to fly user-preferred routes in the airspace covered by the Central East Pacific Route System or along the West Atlantic Route System because these requests are denied or they are re-routed during the flight. Selected airlines also noted the importance of understanding the costs, benefits, and timelines associated with the implementation of enhanced surveillance technologies in making their own investment decisions. Specifically, most selected airlines (11 of 14) told us that their decision to use an enhanced surveillance technology is contingent upon how much it will cost them to implement the technology—which can involve equipping aircraft and potentially paying subscription costs for the service— compared to the benefits airlines receive from the technology. For example, representatives from one airline told us that they are interested in the benefits of space-based ADS-B and enhanced ADS-C, but before paying for new or additional surveillance services, they would need to have evidence that the benefits of these services would outweigh the costs. Specifically, the representatives would like to know to what extent enhanced surveillance, if at all, would result in the actual use of new minimum separation standards and the likelihood they would be able to fly the flight plan they filed. With this information, the airline representatives said the airline could determine whether they could realize cost savings or additional revenue, such as through adding flights to their schedules. Representatives from another airline told us they would like to know what FAA’s plan is for enhancing surveillance and enabling new minimum separation standards and to have assurance that FAA will stick to this plan. According to FAA officials and documents, the agency’s approach addresses some of the efficiency benefits expected by airspace users. Improved access to fuel-efficient altitudes. FAA officials and air traffic controllers we spoke to expect the adoption of new minimum separation standards to offer efficiency benefits to airspace users through more consistent access to fuel-efficient altitudes. In a business case analysis, FAA estimated that this benefit would result in over $280 million in cost-savings for aircraft operators. According to air traffic controllers we spoke to, with new minimum separation standards they would be able to more frequently grant aircraft requests to access these altitudes. Redesign of organized track systems. When considering changes to organized track systems, FAA officials said they must balance benefits to airspace users with workload demands that would be placed on air traffic controllers. FAA officials told us they are currently redesigning the North Pacific Route System to take advantage of the 23 nautical mile lateral separation standard by reducing the lateral separation between tracks. According to FAA officials, this redesign, which is planned to be complete by 2021, could offer benefits to aircraft operators flying between Japan and Alaska, such as allowing air traffic to move more efficiently and with fewer restrictions on user- preferred routes. FAA officials told us that redesigning the North Pacific Route System is possible because of high FANS-equipage rates (over 95 percent) and the absence of disruptive weather patterns. However, according to FAA officials, they do not plan any changes to other organized track systems, such as the Central East Pacific Route System and the West Atlantic Route System, at this time because of aircraft equipage rates and weather patterns. In such areas, moving the routes closer together would prevent air traffic controllers from approving aircraft requests to deviate due to bad weather. Access to user-preferred routes. FAA officials differ with selected airline representatives on whether reduced separation standards would lead to increased access to user-preferred routes. According to FAA officials and documents, improved access to user-preferred routes requires an increase in aircraft equipped with FANS, not changes to the airspace. FAA officials also said that airlines can fly user-preferred routes in the Central East Pacific Route System and the West Atlantic Route System but also acknowledged that air traffic controllers often cannot grant access to user-preferred routes in these airspaces because of the volume of air traffic or disruptive weather patterns. Given the differing perspectives and limited data on user- preferred routes, in April 2019, FAA decided to engage a third-party research company to study the use of and access to user-preferred routes in U.S. oceanic airspace, to be completed in late 2021. Based on this study, FAA may investigate changes to U.S. airspace to address problems identified. FAA identified venues to share and coordinate their enhanced surveillance plans, timelines, and expectations with aviation industry stakeholders. As previously noted, FAA’s process for implementing changes to separation standards requires the agency to coordinate with and brief domestic and international aviation industry stakeholders. FAA officials also pointed to other venues where they plan to share information on these plans with airlines, including formal and informal working groups. Given the relatively early stages of the implementation of the 23 nautical mile lateral and 20 nautical mile longitudinal separation standards enabled by enhanced ADS-C, FAA has not yet completed this industry outreach. The agency plans to coordinate with the aviation industry on the implementation of these separation standards by January 2021. Several selected airlines and other aviation stakeholders—representing pilots, commercial airlines, business aircraft operators, and general aviation—noted the importance of FAA taking advantage of technology advancements and benefits that space-based ADS-B can offer. For example, several (5) selected airlines view space-based ADS-B as a major advancement in oceanic surveillance. Representatives from one airline told us that FAA risks losing its position as a global leader if it does not move forward with space-based ADS-B and the reduced separation standards it enables. According to FAA officials, the agency is a leading air navigation service provider as demonstrated by its use of advanced computer systems to apply minimum separation standards when possible, its role in developing ICAO’s new minimum separation standards, and its plans to move forward with space-based ADS-B in a manner that best fits U.S. oceanic airspace needs. FAA officials also pointed to other air navigation service providers, such as the Japan Civil Aviation Bureau, that are not currently planning to use space-based ADS-B. Several selected airlines and other aviation stakeholders representing commercial and business airlines expressed concern that by not adopting enhanced surveillance and the minimum separation standards it enables, aircraft transitioning into and out of U.S. oceanic airspace could experience delays. Representatives of the Canadian and United Kingdom air navigation service providers, which began using space-based ADS-B and the new minimum separation standards it enables in 2019, told us that different separation standards between their oceanic airspace and U.S. oceanic airspace could lead to delays for aircraft as air traffic increases. Specifically, as air traffic grows and air traffic controllers apply separation distances closer to the minimum standards, those flight regions with lower minimum standards will have to space out aircraft crossing into flight regions with higher minimum separation standards prior to an aircraft crossing a flight region boundary. This situation could lead to delays crossing flight region boundaries and less access to efficient routes across oceanic airspace. FAA views other factors, such as the low volume of air traffic in some airspaces, the frequency of disruptive weather patterns, and the relatively low percentage of aircraft equipped with FANS in high volume airspaces, to contribute more to the operational efficiency of the oceanic airspace than the use of minimum standards. As previously noted, according to FAA officials and air traffic controllers, the current minimum separation standards for U.S. oceanic airspace (30 nautical miles lateral and longitudinal) are rarely used because of these factors. In addition, FAA officials told us that the difference between the separation standards FAA plans to adopt in U.S. oceanic airspace with enhanced ADS-C (23 nautical miles lateral and 20 nautical miles longitudinal) and the separation standards enabled by space-based ADS-B (19 nautical miles lateral and 17 nautical miles longitudinal) is unlikely to result in delays even as air traffic increases. Other air navigation service providers in the Atlantic and Pacific Oceans are still assessing the costs and benefits of space-based ADS-B. For example, the Portuguese air navigation service provider told us they are still considering whether to use space-based ADS-B. In the Pacific Ocean, the Japanese air navigation service provider has not decided whether to use space-based ADS-B and therefore will not be adopting the minimum separation standards (19 nautical miles lateral and 17 nautical miles longitudinal) enabled by this technology. While the Japanese plan to adopt the 23 nautical mile lateral separation standard supported by enhanced ADS-C, they do not plan to adopt the 20 nautical mile longitudinal separation standard at this time. We provided a draft of this report to the Department of Transportation (DOT) for review and comment. DOT responded by email and provided technical clarifications, which we incorporated into the report as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Transportation, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2834 or krauseh@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. This report examines (1) the Federal Aviation Administration’s (FAA) approach to enhancing surveillance capabilities to improve safety and efficiency in U.S. oceanic airspace and (2) selected aviation stakeholders’ perspectives on FAA’s approach to enhancing surveillance. To address both of our objectives, we reviewed FAA and other aviation stakeholders’ documents on the management and organization of U.S. oceanic airspace; the functionality and use of communication, navigation, and surveillance equipment in aircraft flying in U.S. oceanic airspace; and descriptions of the enhanced surveillance technologies that were being considered by FAA—space-based Automatic Dependent Surveillance- Broadcast (ADS-B) and enhanced Automatic Dependent Surveillance- Contract (ADS-C). Specifically, to understand how U.S. air traffic controllers manage oceanic airspace and the procedures aircraft operators must follow, we reviewed FAA Advisory Circulars on Oceanic and Remote Continental Airspace Operations (91-70B) and Data Link Communications (90-117) and FAA Order JO 7110.65X: Air Traffic Control. We also reviewed a NextGen Advisory Committee report, Enhanced Surveillance Capabilities in FAA Controlled Oceanic Airspace: Operational Need and Added Benefits, that was prepared at the request of FAA on this topic, to understand the industry perspective on the need for enhanced surveillance in U.S. oceanic airspace and the costs and benefits of using space-based ADS-B. To understand how space-based ADS-B and enhanced ADS-C would function, we interviewed representatives from Aireon, which offers the space-based ADS-B service, and Inmarsat, which provides the primary satellite communication network used by the providers of ADS-C services. We also interviewed other aviation industry stakeholders, including trade associations representing aircraft operators and unions representing pilots, including Airlines for America, International Air Transport Association, National Air Carrier Association, National Business Aviation Association, Aircraft Owners and Pilots Association, Coalition of Airline Pilots Associations, and Air Line Pilots Association. These organizations were selected based on several factors: their inclusion in prior GAO reports, their role in the aviation industry, and recommendations from other industry stakeholders or FAA. To examine FAA’s approach to enhancing surveillance capabilities in U.S. oceanic airspace, we reviewed FAA documents and interviewed FAA officials. The documents we reviewed included those related to FAA’s plans to modernize management of oceanic airspace, specifically The Future of the National Airspace System (June 2016) and National Airspace System Capital Investment Plan FY2018-2022. We also reviewed FAA’s policy guidance on acquisitions and investment documents related to the Advanced Surveillance Enhanced Procedural Separation (ASEPS) program’s planned investment decision on enhanced surveillance. These internal FAA documents included the ASEPS Concept of Operations, the Initial and Final Business Case Analyses, the Final Investment Decision Benefits Basis of Estimate, and a Safety Risk Management Assessment of space-based ADS-B and enhanced ADS-C. In reviewing the business case analysis, we did not independently evaluate the methodology or data sources used. We interviewed FAA officials and program managers that are working on different elements of FAA’s efforts to enhance surveillance in U.S. oceanic airspace. Within the Air Traffic Organization, we interviewed officials from several offices, including the ASEPS program, which managed the evaluation of surveillance technologies; the Oceanic/Offshore Standards and Procedures Branch, which oversees air traffic operations in oceanic airspace such as facilitating changes to air traffic procedures and systems to enable the use of new technologies and new standards; and the Advanced Technologies and Oceanic Procedures Program Office, which oversees changes to the air traffic control computer system used to manage oceanic air traffic. We also interviewed FAA officials with the Flight Standards Service, which works to improve flight operations, standardization, and aviation safety across U.S. and international airspace systems. In addition, we interviewed the contractor who prepared FAA’s business case analyses. We interviewed FAA air traffic controllers at the Anchorage, New York, and Oakland air route traffic control centers, which are responsible for managing the flight information regions that comprise U.S. oceanic airspace. In addition, we conducted site visits to the New York and Oakland air route traffic control centers, where we observed air traffic controllers providing oceanic air traffic services. We also interviewed representatives from the National Air Traffic Controllers Association, which is the union representing FAA air traffic controllers. We also interviewed or received written responses from representatives of the air navigation service providers for oceanic airspace adjacent or close to U.S. oceanic airspace—Canada, Japan, Portugal, and the United Kingdom—to understand their plans to enhance surveillance capabilities. To obtain selected aviation stakeholders’ perspectives on FAA’s approach to enhancing surveillance in U.S. oceanic airspace, we selected 10 U.S. and foreign commercial airlines using FAA data from fiscal year 2016 on the annual number of flights by airline in U.S. oceanic flight information regions–Anchorage Arctic and Oceanic, Oakland Oceanic, and New York Oceanic. Specifically, we selected the five airlines in each U.S. oceanic flight information region with the most annual flights. Some airlines were in the top five in more than one flight information region. All 10 airlines selected using this method were passenger airlines. We selected an additional passenger airline because it planned to begin service in U.S. oceanic airspace. We selected three large cargo airlines, based on tons of cargo transported, to ensure that the cargo airlines’ perspective was represented. Of the 14 airlines we selected, we conducted semi-structured interviews with or received written responses to our questions from 13. To obtain additional information from airline operators, we conducted a follow-up survey of the 14 selected airlines. The survey included questions on perceptions of the safety of FAA’s management of U.S. oceanic airspace, operational inefficiencies experienced by airlines in U.S. oceanic airspace, effect of current separation standards on airlines’ use of user-preferred routes, airlines’ expectations of the benefits of reduced separation standards, and airlines’ support for FAA’s planned approach to enhance surveillance in oceanic airspace. We developed the survey based on our objectives and included topics not covered in our initial interviews. We pre-tested our survey with representatives of three of the 14 selected airlines. We conducted the survey between December 2018 and January 2019, and all 14 selected airlines completed the survey. For the complete list of airlines we interviewed and/or surveyed, see table 1. In this report, we use the following conventions in reference to information obtained from the 14 selected airlines: “several” is three to seven, “many” is eight to 10, and “most” is 11 to 13. We conducted this performance audit from March 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The International Civil Aviation Organization (ICAO) publishes minimum separation standards and related eligibility requirements for oceanic airspace. Air navigation service providers, such as the Federal Aviation Administration (FAA), may adopt these standards or apply standards that are more conservative (e.g., require greater distances between aircraft). Table 1 lists selected ICAO current and proposed minimum separation standards for oceanic airspace that rely on either Automatic Dependent Surveillance-Contract (ADS-C) or space-based Automatic Dependent Surveillance-Broadcast (ADS-B). The lateral and longitudinal separation standards commonly applied by U.S. air traffic controllers in U.S. oceanic airspace—the Anchorage Arctic, Anchorage Oceanic, New York Oceanic, and Oakland Oceanic flight regions—are shown in table 2. Aircraft meeting these communication, navigation, and surveillance equipment and performance requirements are eligible for the separation standards detailed above. However, the actual standards applied by U.S. air traffic controllers depend on several factors, including the number of similarly eligible aircraft and air traffic volume. For example, while an aircraft may be eligible to use the 30 nautical mile lateral separation standard, nearby aircraft may not. When aircraft with differing communication, navigation, and/or surveillance capabilities are flying near one another, air traffic controllers must apply the larger separation standard based on the aircraft with the fewest capabilities. Air traffic controllers consider not just an aircraft’s current location but also where it is going when applying separation standards. Therefore, as aircraft approach the boundaries of U.S. oceanic airspace, U.S. air traffic controllers also consider the separation standards and eligibility requirements of the neighboring flight region. Based on our interviews, U.S. air traffic controllers hand off aircraft to their foreign counterparts (and vice versa) so that aircraft enter a new flight region in conformance with that flight region’s standards. For example, air traffic controllers managing aircraft in the Anchorage Oceanic flight region do not typically space aircraft heading towards Russian oceanic airspace (the Magadan Oceanic Flight Information Region) at the minimum separation—even if they are eligible. According to these air traffic controllers, any benefits that aircraft would gain from flying at the minimum separation distance in U.S. airspace would be lost when entering Russian airspace, where the separation standards are 10 minutes longitudinal (approximately 80 nautical miles). Therefore, aircraft must be spaced at least 10 minutes apart longitudinally upon entering Russian airspace. As shown in tables 1 and 2 above, FAA uses the 30 nautical mile longitudinal standard but does not use the 23 nautical mile lateral standard. According to interviews with FAA officials and FAA documentation, FAA plans to adopt and start using the 23 nautical mile lateral standard in U.S. oceanic airspace in 2021 and the 20 nautical mile longitudinal standard in this airspace in 2022. According to FAA officials, the agency does not plan to adopt the other ICAO proposed minimum standards (i.e., 19 or 15 nautical miles lateral and 17 or 14 nautical miles longitudinal) that depend on the use of space-based ADS-B at this time. The Federal Aviation Administration (FAA) Acquisition Management System (AMS) policy outlines a process for evaluating potential investments. This process includes the following milestones: 1. definition of the concept and requirements of a program; 2. investment analysis readiness decision; 3. initial investment decision (business case analysis to determine the 4. final investment decision (final business case and implementation 5. solution implementation (program implementation). FAA’s corporate-level acquisition decision-making body—the Joint Resources Council (JRC) —approves or disapproves at each AMS milestone. If the JRC approves the final investment decision, this commits FAA to funding the program segment and moving forward with the investment plan. From January 2014 to April 2019, FAA’s Advanced Surveillance Enhanced Procedural Separation (ASEPS) program—tasked with evaluating and comparing the costs and benefits of enhanced Automatic Dependent Surveillance–Contract (ADS-C) and space-based Automatic Dependent Surveillance–Broadcast (ADS-B)—progressed through the following steps in the AMS process to prepare for a final investment decision on enhancing surveillance and enabling new minimum separation standards in U.S. oceanic airspace. January 2014 (investment analysis readiness decision). JRC approved FAA to begin further analysis of options, including enhanced ADS-C and space-based ADS-B to support the adoption of reduced separation standards in U.S. oceanic airspace. As part of this analysis, FAA took the following actions. July 2015. JRC recommended that the ASEPS program continue evaluating the space-based ADS-B option to accommodate user (i.e., airline) preference. July 2016. FAA tasked the NextGen Advisory Committee with evaluating (1) the need and benefit of enhanced surveillance capabilities, including associated costs, funding mechanisms and funding models and (2) evaluate the business case, including insight regarding several operational factors impacting potential benefits from an investment. FAA requested input from the NextGen Advisory Committee to better understand industry’s assessment of (1) the quantified benefit that industry expects the investment will deliver and (2) how much industry would be willing to pay if it was responsible for the investment. However, according to FAA officials, the report did not address the quantified benefit industry expects the investment will deliver, determine how much industry would be willing to pay if it was responsible for the investment, or conduct an overall assessment of whether the investment is cost beneficial to industry. The report cited not having sufficient information, such as expected benefits and costs, to conduct an analysis of how much industry would be willing to invest. October 2017 (initial investment decision). ASEPS Program presented the initial business case analysis comparing the two enhanced surveillance options, enhanced ADS-C and space-based ADS-B, to the JRC. Given the negative return on investing in space- based ADS-B, the JRC directed the ASEPS program to evaluate the costs and benefits of space-based ADS-B within sub-sectors of U.S. oceanic flight regions, such as Oakland flight region north and New York east. March 2018. JRC directed the ASEPS Program to proceed with both enhanced surveillance options—enhanced ADS-C and space-based ADS-B—to a final investment decision, which was planned for September 2018. June 2018. ASEPS Program proposed a strategic shift, which involved delaying the final investment decision on enhanced ADS- C and deferring a final investment decision on space-based ADS- B to allow additional testing on how to use space-based ADS-B in oceanic and domestic airspace. Drivers of this shift in approach included the results of the business case analysis. September 2018 (strategy decision). JRC approved the ASEPS program’s strategic shift. The ASEPS Program asked the JRC to approve their plan to delay a final investment decision on enhanced ADS-C and to defer a final investment decision on space-based ADS-B. The JRC approved the ASEPS program’s proposal to merge the ASEPS enhanced ADS-C investment with a planned final investment decision on upgrades to the Advanced Technology and Oceanic Procedures (ATOP) system. The JRC also approved the ASEPS program’s proposal to continue studying space-based ADS-B through an operational evaluation in U.S. offshore airspace and longer-term studies concerning using space-based ADS-B for contingency operations and future use in U.S. oceanic airspace. April 2019 (final investment decision). JRC approved a final investment decision on the ASEPS Program’s plan to use enhanced ADS-C to enable new minimum separation standards in U.S. oceanic airspace. The ATOP program management office asked the JRC to approve investments in large-scale ATOP enhancements that include system changes that will enable the implementation of new minimum separation standards (i.e., 23 nautical miles lateral and 20 nautical miles longitudinal) with the use of enhanced ADS-C. As part of its acquisition process (outlined in app. III), the Federal Aviation Administration (FAA) contracted with a third-party to prepare a business case analysis for the Advanced Surveillance Enhanced Procedural Separation (ASEPS) program. This analysis estimated the costs to the agency and aircraft operators, identified safety benefits from enhanced surveillance, and identified and calculated the value of efficiency benefits from applying new minimum separation standards enabled by two technologies: enhanced Automatic Dependent Surveillance-Contract (ADS-C) and space-based Automatic Dependent Surveillance-Broadcast (ADS-B). The analysis described below was developed for FAA’s initial and final investment decision on the program: ASEPS Initial Business Case (August 2017). This business case analysis compared the costs and benefits of space-based ADS-B and enhanced ADS-C to a baseline scenario. ASEPS Final Business Case (August 2018). This business case analysis compared the costs and benefits of enhanced ADS-C to a baseline scenario. No final business case analysis was prepared for space-based ADS-B since FAA deferred a final investment decision on the use of space-based ADS-B. This appendix discusses the costs and benefits that were included in these business case analyses based on our review of FAA’s business case documentation and interviews with FAA officials. In the initial business case, a baseline scenario and two alternative scenarios were used to evaluate the costs and benefits of using enhanced ADS-C and space-based ADS-B as compared to not using these enhanced surveillance options: baseline with no change in current minimum separation standards of 30 nautical miles lateral and 30 nautical miles longitudinal, use enhanced ADS-C with minimum separation standards of 23 nautical miles lateral and 23 nautical miles longitudinal, and use space-based ADS-B with minimum separation standards of 15 nautical miles lateral and 15 nautical miles longitudinal. In the final business case analysis, only a baseline scenario and the enhanced ADS-C scenario were included. In the business case analysis, costs and benefits were modelled between 2020 and 2040 in the Atlantic and Pacific Oceans. To model these scenarios, researchers used projections on flight demand and aircraft equipage with the technology required to use these enhanced surveillance services: Future Air Navigation System (FANS) or ADS-B and FANS. In order to use enhanced ADS-C and space-based ADS-B to enable new minimum separation standards, FAA and airspace users will need to make certain investments. Based on our review of FAA’s business case documentation, we found that certain costs were factored into the business case analysis, including: upgrades to the Advanced Technologies and Oceanic Procedures additional ADS-C message traffic, and subscription fee for space-based ADS-B service The final business case analysis focused on enhanced ADS-C and included only those costs to FAA and users related to use of this service. The business case analysis focused on the costs of these enhanced surveillance services and did not include the cost of equipping aircraft with FANS and/or ADS-B equipment, which are required to use these enhanced surveillance technologies. According to FAA officials, these costs were not included because aircraft operators are equipping their aircraft for other reasons. Specifically, FAA regulations requiring ADS-B equipment for aircraft flying through U.S. domestic airspace by 2020 means most aircraft flying in U.S. oceanic airspace will be ADS-B equipped. In addition, mandates from other air navigation service providers requiring FANS will compel most aircraft crossing into non-U.S. oceanic airspace to equip with FANS. The business case considered the costs FAA would incur using the data from these enhanced surveillance technologies, including upgrades to ATOP software. The business case analysis also considered the costs airspace users would face in using these enhanced surveillance technologies. In the business case analysis, FAA assumed that aircraft operators would continue to pay for ADS-C services. Since enhanced ADS-C would involve more messages per flight hour than currently sent via ADS-C, FAA estimated that aircraft operators would see an increase in messaging costs per flight hour, according to our review of FAA documentation. FAA also made assumptions about how much a subscription fee for space-based ADS-B will cost. As a new service that FAA has not yet contracted for, the actual cost of space-based ADS-B subscription fees are not known. However, initial estimates of the cost per flight hour for space-based ADS-B are much greater than the estimated cost per flight hour of additional ADS-C messages, according to FAA. FAA’s business case analysis considered safety benefits and efficiency benefits. As detailed in the analysis, the size of these benefits depends on the participation of aircraft in each enhanced surveillance service (i.e., enhanced ADS-C and space-based ADS-B). The benefits presented in the business case represent the maximum benefit pool. Specifically, the analysis assumes that all properly equipped aircraft will use space-based ADS-B or enhanced ADS-C services. The business case analysis discussed safety benefits offered by improved surveillance, such as increased air traffic controller situational awareness and improved detection and resolution of aircraft on conflicting flight paths. According to oceanic air traffic controllers we interviewed at the three air route traffic control centers responsible for U.S. oceanic airspace, enhancing surveillance capabilities offers safety benefits, such as improved situational awareness and search and rescue capabilities. Enhanced ADS-C and space-based ADS-B both offer these safety benefits. However, space-based ADS-B also provides information to air traffic controllers to reduce the risk of a vertical collision between aircraft. This safety benefit was monetized by FAA. Enhanced surveillance can enable a reduction in the minimum required distance applied between aircraft, with potential efficiency benefits for airspace users. The three efficiency benefits included in FAA’s business case analysis that were monetized are: Improved accommodation of altitude requests. According to FAA’s analysis, a primary benefit of reduced separation standards is that aircraft will be more likely to fly at a fuel-efficient altitude. In oceanic airspace, aircraft must make a request to air traffic control to change their altitude. Despite the immensity of oceanic airspace, there is competition for the most fuel-efficient altitudes at certain times of day. For example, according to oceanic air traffic controllers in Oakland, the majority of the air traffic they handle is flights between Hawaii and the U.S. west coast, with most aircraft departing at the same time. Air traffic controllers we spoke with agreed that with enhanced surveillance and reduced separation standards, they should be able to grant more altitude requests and allow more aircraft to fly at optimal altitudes. Reduced need for aircraft to carry extra fuel. According to FAA’s analysis, aircraft operators typically carry more fuel on an aircraft than needed to fly their planned route. Aircraft carry extra fuel to hedge against the possibility that its actual flight path will be less fuel-efficient than its planned flight path. The cost of carrying extra fuel (i.e., the cost to carry) comes from the added weight of carrying extra fuel, weight that causes an aircraft to use more fuel and that reduces an aircraft’s ability to carry revenue-generating cargo. This benefit flows from the improved accommodation of altitude requests, discussed above. More efficient arrivals and departures at Pacific island airports. According to FAA’s analysis, some Pacific island airports do not have radar surveillance and require U.S. oceanic air traffic controllers in the Oakland air route traffic control center to manage aircraft arrivals and departures. As a result, oceanic separation standards are applied as aircraft arrive and depart these islands’ airports. FAA’s analysis shows that reducing oceanic separation minimums will allow air traffic controllers to allow more frequent arrivals and departures from these airports. According to this analysis, the benefit of more frequent arrivals and departures is measured in terms of the costs to aircraft operators (an aircraft’s direct operating costs) and the cost to passengers (a passenger’s value of time). FAA’s business case analysis also includes efficiency benefits of reduced separation that were not monetized, including emissions savings and improved air traffic control accommodation of aircraft requests for descents, routing changes, and speed changes. FAA policy does not currently allow programs to value carbon dioxide emissions avoided for investment decisions. Another efficiency benefit of reduced separation— giving air traffic controllers more flexibility to grant deviations from planned flight paths due to disruptive weather—was quantified and monetized, but not factored into the benefit calculation. To implement new separation standards in U.S. oceanic airspace, the Federal Aviation Administration (FAA) has a set of 18 critical milestones that it follows: 1. Determine the operational need. 2. Evaluate the benefits. 3. Establish an operational concept. 4. Assess the impact on air traffic control. 5. Conduct a safety assessment and record it with the appropriate safety risk management documentation. 6. Determine requirements. 7. Conduct a feasibility and economic analysis. 8. Establish requirements for aircraft and operator approval. 9. Conduct rulemaking. 10. Coordinate with industry and international participants. 11. Coordinate with air traffic control representatives and pilot groups. 12. Complete regional documentation. 13. Acquire approval for aircraft and operators. 14. Develop pilot and air traffic control procedures. 15. Design pilot and air traffic control training materials. 16. Confirm that the system works. 17. Employ the separation standard. 18. Monitor the performance of the system in accordance with safety risk management practices. In addition to the contact named above, Jonathan Carver (Assistant Director), Sarah Arnett (Analyst-in-Charge), Amy Abramowitz, Melissa Bodeau, Samuel Gaffigan; David Hooper, Richard Hung, Amanda Miller, Malika Rice, and Pamela Vines made key contributions to this report.", "summary": "Recent developments in surveillance technologies, which provide an aircraft's location to air traffic controllers, have the potential to improve air traffic operations over the oceans. FAA has explored how to improve surveillance capabilities in U.S. oceanic airspace to take advantage of new international separation standards that could lead to the more efficient use of this airspace. GAO was asked to review planned improvements to aircraft surveillance. This report examines: (1) FAA's approach to enhancing surveillance capabilities to improve safety and efficiency in U.S. oceanic airspace and (2) selected aviation stakeholders' perspectives on FAA's approach. GAO reviewed documents related to FAA's planned investment in enhanced oceanic surveillance and interviewed FAA officials working on this effort. Interviews included those with the Air Traffic Organization and air traffic controllers who manage U.S. oceanic airspace. GAO surveyed representatives of 14 commercial airlines, including 11 U.S. and foreign passenger airlines, which were selected based on factors such as flight volume; and 3 U.S. cargo airlines, which were selected based on tons of cargo shipped. GAO also interviewed other aviation stakeholders, including trade associations, unions representing pilots, and foreign air navigation service providers that manage airspace adjacent to U.S. oceanic airspace. The Federal Aviation Administration (FAA) evaluated two aircraft surveillance technologies that would allow aircraft to safely fly in closer proximity while in oceanic airspace. Based on its evaluation, FAA committed to using one in the near term and to continue to study another for future use. Specifically, in April 2019, FAA committed to implement by 2022 new international standards that allow reduced distances between aircraft, called minimum separation standards. These reduced distances would be enabled by a surveillance technology known as enhanced Automatic Dependent Surveillance-Contract (ADS-C). FAA also decided to continue studying the use of another enhanced surveillance technology known as space-based Automatic Dependent Surveillance-Broadcast (ADS-B)—to further improve surveillance in U.S. airspace. Both technologies offer increased frequency in reporting of an aircraft's location, which enhances safety, and can support new minimum separation standards. FAA decided to proceed with enhanced ADS-C in the near term because the efficiency benefits to airspace users exceeded the costs of more frequent location reporting and air traffic control system upgrades by 2 to 1. In contrast, FAA determined that the costs of using space-based ADS-B in U.S. oceanic airspace outweigh the efficiency benefits by 6 to 1. FAA officials added that operational challenges to using space-based ADS-B to manage air traffic in U.S. oceanic airspace have not yet been resolved. FAA plans to continue studying potential uses for space-based ADS-B in U.S. airspace to determine if benefits can outweigh the costs (see figure). GAO found that most selected airlines (11 of 14) support FAA's overall approach to enhance oceanic surveillance. Selected airlines also said they expect the new minimum separation standards to improve access to more direct and fuel-efficient routes. FAA is taking steps to provide these benefits by restructuring routes in one area of U.S. oceanic airspace and by applying new minimum standards to give aircraft better access to fuel-efficient altitudes. According to FAA officials, however, additional benefits, such as redesigning other U.S. oceanic airspace, expected by selected airlines are limited by (1) relatively low rates of aircraft equipage with the technology that enables reduced separation and (2) the frequency of disruptive weather patterns in parts of U.S. oceanic airspace.", "document_type": "gao"}
{"report": "Ensuring that there is adequate time to complete acquisition planning activities and identifying the contracting workforce required to execute mission needs can help agencies establish a strong foundation for successful acquisition outcomes. However, our prior work identified challenges FEMA faced in its acquisition and workforce planning efforts for disaster contracting. The Federal Acquisition Regulation (FAR) requires agencies to perform acquisition planning activities for all acquisitions to ensure that the government meets its needs in the most effective, economical, and timely manner possible. In our December 2018 report, we found that FEMA had guidance in place establishing timeframes for certain FEMA acquisitions following the completion of the acquisition package. Further, FEMA implemented an acquisition tracking tool in 2016—the 5-Year Master Acquisition Planning Schedule (MAPS)— which monitors the status of and provides acquisition planning timeframes for certain high value and mission-critical acquisitions, including advance contracts, regardless of dollar value. However, we found that FEMA had not established timeframes or released guidance for the pre-solicitation phase of the acquisition planning process, when program officials identify a need and develop key acquisition package documents (see figure 1). Not adhering to suggested timeframes can place a burden on contracting officers and increase the likelihood of not awarding a contract on schedule. This, in turn, may create a need for FEMA to non-competitively extend the existing contract—this extension may be considered a bridge contract. Given the lack of a government-wide definition, we defined bridge contracts in our prior work as: extensions to an existing contract beyond its period of performance (including base and options) and new, short-term contracts awarded on a sole-source basis to an incumbent contractor to avoid a lapse in service caused by a delay in awarding a follow-on contract. FEMA officials acknowledged that the use of non- competitive bridge contracts is not an ideal practice as they cannot ensure the government is paying what it should for goods and services. However, in December 2018, we found that FEMA used bridge contracts for at least 10 of its advance contracts used in response to the 2017 disasters—with some of these contracts lasting for several years. To decrease dependence on bridge contracts, FEMA established MAPS to help track and monitor the status of acquisition planning timeframes for certain acquisitions. However, most of the program office and contracting officials we spoke with during our December 2018 review had limited familiarity with the tool. In our December 2018 report, we recommended that FEMA update and implement existing guidance to identify acquisition planning timeframes and considerations across the entire acquisition planning process and clearly communicate the purpose and use of its acquisition planning tool to relevant personnel. DHS concurred, but in its response to our report stated it believed existing outreach and training on MAPS had resolved these challenges. We acknowledged FEMA’s training in our report, but noted that not all relevant staff we spoke with were familiar with MAPS, and that there was no formal guidance on the timeframes for the entirety of the acquisition planning process. Given these issues, we continue to believe FEMA needs to take additional steps to implement our recommendation. Without planning and guidance on its use of advance contracts, FEMA lacks reasonable assurance that it is maximizing their use to the extent practicable and cost-effective to quickly provide goods and services following a disaster. PKEMRA requires the FEMA Administrator to develop a contracting strategy that maximizes the use of advance contracts to the extent practical and cost effective, and FEMA contracting officials told us that advance contracts should be used before awarding new contracts. However, in December 2018, we found that FEMA’s advance contract strategy and guidance did not clearly identify the objectives of advance contracts or whether and how they should be prioritized for use in relation to new post-disaster contracts. For example, we reported that FEMA’s lack of an updated strategy and guidance contributed to confusion and challenges with the use of advance contracts for tarps, used to cover small areas of roof damage. Although FEMA had awarded advance contracts to provide tarps, a subsequent modification to these contracts limited the ability to use them for immediate disaster response needs—one of FEMA’s stated purposes. Furthermore, we found that FEMA awarded vendors new post-disaster contracts for tarps before using its existing advance contracts. According to FEMA officials at that time, neither of the post-disaster contract vendors was able to provide the required tarps when needed. We concluded that the timing and use of the existing tarp advance contracts raised questions about the ability of contracting officers to use these contracts to provide tarps immediately following disasters. Additionally, we concluded that an updated advance contracting strategy could have enabled FEMA to more quickly provide the needed tarps to survivors, considering the additional time and staff resources needed to award new post-disaster contracts. In our December 2018 report, we recommended that FEMA update its strategy to clearly define the objectives of advance contracts, how they contribute to FEMA’s disaster response operations, and whether and how they should be prioritized in relation to making new, post-disaster contract awards. We also recommended FEMA update its guidance accordingly. DHS concurred with these two recommendations and identified actions it plans to take to address them. Our prior work also showed that FEMA’s ability to adequately plan for and manage its disaster contracts is further complicated by persistent acquisition workforce challenges, including attrition and staffing shortages. In April 2019, we found that FEMA had identified workforce shortages as a continuing challenge for disaster response and recovery. But FEMA had not assessed its contracting workforce—including regional contracting workforce needs—since at least 2014. We recommended FEMA assess its workforce needs to address these shortcomings and develop a plan, including timelines. DHS agreed, identified steps FEMA has taken and plans to take to address the recommendation, and estimated addressing the recommendation by September 2019. Our prior reports found that FEMA experienced challenges coordinating with state, local, and federal partners over disaster preparation and response efforts. Coordination is critical to ensuring that states and localities have their own tools in place to facilitate disaster response, and that contracting needs are clearly communicated and considered among federal agencies. Yet FEMA faced continued challenges and inconsistencies in its coordination with states and localities over the use of advance contracts. In January 2017, FEMA updated guidance to include requirements for coordination with state and local governments on the use of federal advance contracts. This update was in response to our September 2015 finding that there were inconsistencies in whether and how staff in FEMA’s regional offices performed state and local outreach on advance contracting efforts. However, in December 2018, we reported on similar inconsistencies in state and local outreach. We found that FEMA’s guidance did not specify how often or what types of advance contract information should be shared with states and localities, or instruct FEMA contracting officers to encourage states and localities to establish their own advance contracts for the types of goods and services needed during a disaster. As a result, we found that while some FEMA regional officials regularly performed outreach with states and localities to assist them with establishing advance contracts for goods and services commonly needed during a disaster—like security, transportation, and office supplies—other FEMA regional officials did so less frequently. According to regional officials, coordinating more frequently with states and localities allows them to avoid overlap between state and federal contracting efforts, and helps FEMA officials know what resources the states have in place before a disaster occurs and how long states are capable of providing those resources following a disaster. We recommended in our December 2018 report that FEMA update its guidance to provide specific direction for contracting officers to perform outreach to states and localities on the use and establishment of advance contracts. DHS concurred and stated it would update guidance and continue efforts to establish resources for state and local governments on advance contracts. Information on FEMA’s advance contracts can be used to facilitate state and local coordination over the use and establishment of advance contracts. However, our work showed that this information was inconsistent and could further hinder FEMA’s information sharing and coordination efforts. In December 2018, we reviewed FEMA’s advance contract list and other resources FEMA contracting officials said they used to identify advance contracts—like biannual training documentation—and found differences in the advance contracts identified. For example, we reported that FEMA officials told us that the advance contract list available to contracting officers is updated on a monthly basis. However, our analysis found that 58 advance contracts identified on the June 2018 advance contract list had not been included in contracting officers’ May 2018 training documentation. The missing contracts included those for telecommunications services, generators, and manufactured housing units. Recognizing some of the shortcomings in communicating with state and local governments following the 2017 disasters, FEMA stated it would develop a toolkit to provide states and localities with recommendations for advance contracts, emergency acquisition guidance, and solicitation templates. However, at the time of our December 2018 review, FEMA officials were uncertain what information they would share with states and localities on advance contracts, and said they did not plan to provide the complete list of the advance contracts FEMA has in place to avoid being overly prescriptive. Yet without a centralized and up-to-date resource on advance contracts, FEMA contracting officers and their state and local counterparts may not be able to effectively communicate about advance contracts and use them to respond to future disasters. Given FEMA’s recent emphasis on the importance of states and localities having the capability to provide their own life-saving goods and services in the immediate aftermath of a disaster, we concluded that clearly communicating consistent and up-to-date information on the availability and limitations of federal advance contracts is imperative to informing state and local disaster response efforts. In our December 2018 report, we recommended that FEMA identify a single centralized resource listing its advance contracts and ensure that resource is updated regularly. Further, we recommended that FEMA should communicate information on advance contracts using that resource to states and localities to inform their advance contracting efforts. DHS concurred with these two recommendations and identified some steps it planned to take, but also stated it believes the existing advance contract list satisfies our recommendation for a single centralized resource. However, as our report noted, we found inconsistencies in this list that FEMA needs to address for advance contract information to be complete and up-to-date for the contracting officers who rely on it. In addition to challenges coordinating with state and local governments, we identified coordination and planning concerns between FEMA and other federal agencies. As the federal disaster coordinator, FEMA obtains requirements from states and localities. It then tasks the appropriate federal agencies with specific missions, based on their emergency support functions. Agencies assigned to specific missions are then responsible for fulfilling requirements, and may use contracts to do so. However, we reported in April 2019 that some federal agencies experienced challenges coordinating with FEMA and state and local partners. For example, USACE officials reported that, during their debris removal mission following the California wildfires, local officials believed that the soil removed would be replaced. However, this was not part of the mission assignment from USACE to FEMA. In these instances, agency officials told us they relied on FEMA to communicate information on their mission assignments to be able to administer contracts. According to a FEMA official during our April 2019 review, coordination and planning concerns related to mission assignments—like contracting considerations—should be worked out in advance between FEMA and agencies such as USACE. However, we found that FEMA policy and guidance lack details on how that coordination should take place. Further, a FEMA official told us that contracting considerations are not necessarily built into mission assignments. We recommended in April 2019 that FEMA revise its mission assignment policy and guidance to better incorporate consideration of contracting needs and ensure clear communication of coordination responsibilities related to contracting. DHS concurred and plans to develop tools and training within the next year to provide the necessary guidance. Limited transparency into disaster contracting obligations further complicates the challenges noted above. We found in April 2019 that the full extent of disaster contracting—for both advance and post-disaster contracts—related to the 2017 disasters was and continues to be unknown. This was due to changes in the criteria for establishing and closing a national interest action (NIA) code—a mechanism for government-wide tracking of emergency or contingency-related contracting—in FPDS-NG, and DHS’s inconsistent implementation of the updated criteria for closing codes. Specifically, the codes for Harvey and Irma closed on June 30, 2018, less than a full year after the hurricanes hit. The code for Maria is valid through June 15, 2019, about 21 months after that hurricane made landfall. This is in contrast to prior hurricanes, for which codes sometimes remained open more than 5 years after the disaster, with the code for Hurricane Katrina being open for 13 years after the disaster. The ability to identify disaster contracting for the 2018 hurricanes was similarly limited as the NIA codes for Hurricanes Florence and Michael expired on March 15, 2019 and April 12, 2019, respectively, about 6 months after those storms made landfall. Based on a memorandum of agreement, the General Services Administration (GSA), DHS, and the Department of Defense (DOD) are jointly responsible for determining when a NIA code should be established and closed. DHS delegated its role, on behalf of civilian agencies for disaster or emergency events, to its Office of the Chief Procurement Officer. The agreement outlines criteria DHS should consider in making determinations to establish and close a NIA code. For our April 2019 review, we identified changes in these criteria between June 2012 and June 2018. For example, the updated agreement does not include the national interest and visibility of an event as criteria for extending a NIA code, allowing a NIA code to expire regardless of the high visibility of the event and information needs of key users. DHS officials reported several rationales to support their decision to close the NIA codes for the 2017 hurricanes, but these were inconsistent with the criteria in the agreement and did not consider key user needs or fully explain the decisions to close the codes. Once a NIA code in FPDS-NG is closed, there is no other publicly available, government-wide system available to comprehensively track contract obligations for specific events. Our April 2019 report demonstrated the magnitude of contract dollars that are no longer easily trackable once a NIA code is closed. For example, using the description field in FPDS-NG, we found that between July 1 and September 30, 2018—after the NIA codes were closed—agencies obligated at least $259 million on contracts for Hurricanes Harvey and Irma. However, not all agencies put event-specific information in the description field, and we found for the 2017 hurricanes only 35 percent of contract obligations linked to a NIA code included this information. Moreover, as we have previously reported, and illustrate in figure 2, it can take years to fully account for federal contract obligations related to response and recovery after a hurricane. In our April 2019 report, we made two recommendations, including that GSA, in coordination with DOD and DHS, assess whether the criteria in the current NIA code agreement meets the long-term needs for high visibility events and account for the needs of users, such as FEMA, other agencies, and Congress; and in the interim, DHS, in coordination with DOD and GSA, should keep the existing NIA codes for disasters open, reopen the NIA codes for Hurricanes Harvey, Irma, Florence, and Michael, and request that agencies retroactively update applicable contract actions to reflect these codes, to the extent practicable. GSA and DOD indicated they would work jointly with DHS to assess the criteria in the agreement within the year. DHS did not comment on that recommendation. Given the high visibility and national interest in these events, assessing the criteria, keeping NIA codes open, and reopening closed codes for the recent disasters to the extent practicable would help ensure visibility over federal disaster contracts. In conclusion, given the circumstances surrounding the 2017 disasters, and the importance of preparedness for future disasters, it is critical to ensure that FEMA is well-positioned to respond through its use of contracts. Our work has shown that without effective planning on the use of contracts, FEMA may face challenges in quickly providing critical goods and services to survivors following a disaster. Further, without effective coordination, FEMA cannot ensure that local, state, and federal partners have the tools they need to assist in disaster response. Moreover, not tracking certain information on a government-wide basis in FPDS-NG may result in key users lacking the information necessary to provide oversight of FEMA’s and other agencies’ disaster contract actions. Implementing our recommendations to update its planning guidance and advance contract strategy; assess acquisition workforce needs; improve coordination with state, local, and federal partners; and improve tracking of disaster contracting actions will help FEMA overcome key challenges it faces in contracting during a disaster, and improve future response efforts. Chairman Payne, Chairwoman Torres Small, Ranking Members King and Crenshaw, and members of the subcommittees, this concludes my statement. I would be pleased to respond to any questions. If you or your staff have any questions about this statement, please contact me at (202) 512-4841 or makm@gao.gov. Contacts for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this statement include Janet McKelvey (Assistant Director); Caryn Kuebler and Meghan Perez (Analysts in Charge); Emily Bond; Erin Butkowski; Suellen Foth; Julia Kennon; Sylvia Schatz; Lindsay Taylor; and Robin Wilson. Key contributors for the previous work on which this statement is based are listed in the products cited. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "According to FEMA—a component within DHS—the 2017 disasters affected 47 million people, or about 15 percent of the nation's population. Federal contracts have played a key role in responding to these disasters and in long-term community recovery. So far, FEMA has obligated billions of dollars on these contracts. This testimony is based primarily on GAO's recent reports on disaster contracting—specifically advance contracting and post-disaster contracts related to the 2017 disasters—which detail much of FEMA's disaster contracting activities. It addresses key challenges FEMA faced contracting for goods and services in response to these disasters. To conduct this work, GAO analyzed data from the Federal Procurement Data System-Next Generation through June 30, 2018, the latest and most complete data available for the 2017 disasters. GAO also analyzed FEMA guidance and documentation and interviewed FEMA officials to discuss the use of contracts to respond to the 2017 disasters. Following Hurricanes Harvey, Irma, and Maria, and the 2017 California wildfires, federal agencies entered into disaster-related contracts worth about $9.5 billion, according to data as of June 30, 2018—the latest and most complete data at the time of GAO's review (see figure). The Federal Emergency Management Agency (FEMA) obligated about $2.9 billion of this total through advance contracts, which it establishes prior to a disaster to rapidly mobilize resources. FEMA obligated an additional $1.6 billion through post-disaster contracts, which are established after disasters hit. In its December 2018 and April 2019 reports, GAO made 10 recommendations to strengthen FEMA's ability to address challenges GAO identified in how FEMA plans, coordinates, and tracks its contracts: Planning: FEMA has an outdated strategy and unclear guidance on how contracting officers should use advance contracts and has not fully assessed its contracting workforce needs. Effectively planning its contract use is critical to FEMA quickly providing critical goods and services. Coordination: FEMA did not fully coordinate with states and localities on certain contracts and encountered communication and coordination challenges with other federal agencies. Effective coordination helps FEMA ensure stakeholders have the tools needed to facilitate their disaster response efforts. Tracking: The full extent of 2017 disaster contracting activities, for FEMA and other agencies, is unknown. GAO found that codes used to track obligations for these disasters in a federal procurement data system were closed without full consideration of user needs or due to inconsistent implementation of criteria established by the Department of Homeland Security (DHS) and other agencies, limiting visibility over federal disaster contracts. GAO has made a total of 19 recommendations—most of which were to FEMA—related to contracting activities in response to the 2017 disasters. Ten of these are described in this statement. DHS concurred with most of these recommendations, and has some actions underway, but it has not fully implemented them. Attention to these recommendations can assist FEMA as it uses contracts to respond to future disasters.", "document_type": "gao"}
{"report": "Medicaid expenditures are financed jointly by the federal government and the states. In order to receive federal matching funds for Medicaid expenditures, states must adhere to a broad set of federal requirements and administer their programs consistent with individual state plans approved by CMS. These plans are agreements between a state and the federal government that describe how states will administer their Medicaid programs, including how the state will administer Medicaid third- party liability procedures. When states make changes to their Medicaid programs or policies, including when necessary to comply with a change in federal law, they must submit a state plan amendment to CMS. CMS reviews and approves state Medicaid plans and state plan amendments. The federal government matches each state’s Medicaid expenditures for services according to a statutory formula called the Federal Medical Assistance Percentage. This formula provides for a match that is no lower than 50 percent of a state’s Medicaid expenditures and no higher than 83 percent. States can receive a 90 percent federal match for the costs associated with the development of each state’s Medicaid Management Information System (MMIS), a claims processing and retrieval system supporting the administration of the state’s Medicaid program. States also receive a 75 percent match for the costs associated with ongoing MMIS maintenance and operations. States use their MMIS systems to process provider claims, including claims for prenatal care services, pediatric preventive services, and services provided to CSE beneficiaries. The Medicaid program is administered at the state level and overseen at the federal level by CMS, which, among other things, ensures that funds are used appropriately and beneficiaries have access to covered services. Medicaid allows significant flexibility for states to design and implement their programs. Within broad federal parameters, states have discretion in, among other things, setting Medicaid eligibility standards and provider payment rates; determining the amount, scope, and duration of covered benefits; and developing their own administrative structures. States may also decide how Medicaid-covered services provided to beneficiaries will be delivered. For example, states may pay health care providers for each service they provide—fee-for-service—or contract with MCOs to provide a specific set of Medicaid-covered services to beneficiaries and pay them a set amount per beneficiary, typically per month. While most states use both delivery systems, the percentage of beneficiaries served through MCOs has grown in recent years, and represented nearly 70 percent of all Medicaid beneficiaries in 2016. Medicaid beneficiaries across various eligibility categories may have access to private health insurance or other sources of third-party coverage. For example, some adult beneficiaries may be covered by employer-sponsored private health insurance even though they also qualify for Medicaid. Children, similarly, may be eligible for Medicaid, while also being covered as a dependent on a parent’s private health plan. As such, federal law requires states to perform various activities to ensure that Medicaid is the payer of last resort, including taking all reasonable measures to identify Medicaid beneficiaries’ other potential sources of health coverage and their legal liability. Specifically, states must ensure that the following steps, among others, are taken. 1. Coverage identification. To identify beneficiaries with third-party health coverage, states are required to request coverage information from potential Medicaid beneficiaries at the time the agency makes any determination or redetermination of eligibility. States are also required to obtain and use information pertaining to third-party liability, for example, by conducting data matches with state wage information agencies, Social Security Administration wage and earning files, state motor vehicle accident report files, or state workers’ compensation files. 2. Coverage verification. When other health coverage is identified, states often verify the information, including the services covered through the other insurance and the dates of eligibility. 3. Cost avoidance payment procedures. As a general rule, federal law requires states to apply cost avoidance payment procedures to claims for most Medicaid items and services. Under cost avoidance procedures, the state must reject claims for which a third party is or is probably liable, and the agency instructs the provider to collect from the third party. Once the provider determines the amount of the third party’s liability, the provider submits a claim to the state Medicaid agency for any remaining balance, up to the maximum amount allowed under the state’s payment schedule. States are then required to make timely payment to the provider, generally within 30 days from the date the claim for the balance is filed. 4. Pay-and-chase payment procedures. The Consolidated Omnibus Budget Reconciliation Act of 1985 made an exception to cost avoidance procedures for three types of services: prenatal care services, pediatric preventive services, and services provided to CSE beneficiaries. It required states to pay such claims without regard to the liability of the third party, a procedure CMS calls “pay and chase.” Under the pay-and-chase payment procedure, the state Medicaid agency is generally required to make a timely payment to the provider within 30 days, and then the state, instead of the provider, will seek to recover payment from any potentially liable third parties within 60 days. According to CMS, cost avoidance does not apply to these claims because there is a risk some providers might not participate in Medicaid to avoid dealing with the administrative burden of cost avoidance. (See fig. 1.) The Bipartisan Budget Act of 2018 amended various sections of the Medicaid third-party liability statute, including the required processes states must follow when paying claims with probable third-party liability for the following three types of services: Prenatal care services. The Bipartisan Budget Act of 2018 eliminated, effective February 2018, the statutory exception for prenatal care services that had required states to apply pay-and- chase procedures to such claims. Thus, under the amended statute, states must apply cost avoidance procedures to claims for prenatal care services when it is apparent that a third party is or may be liable at the time the claim is filed. Additionally, to the extent states had opted under CMS regulations to apply pay-and-chase procedures to claims for labor, delivery, or postpartum care services—which CMS calls “pregnancy-related services”—states must now apply cost avoidance procedures to those as well. Pediatric preventive services. Beginning in October 2019, under federal law as amended by the Bipartisan Budget Act of 2018, states are no longer required to pay claims for pediatric preventive services immediately. While states will still have the option to apply pay-and- chase procedures to these claims, a state may instead choose—if it determines doing so is cost-effective and will not adversely affect access to care—to require the provider to first submit the claim to the third party and wait 90 days for payment by the third party before seeking Medicaid payment. For purposes of this report, we refer to such a 90-day period as a “wait-and-see period.” Services provided to CSE beneficiaries. Beginning in October 2019, states must make payment for a CSE beneficiary’s claim if the third party has not paid the provider’s claim within a 100-day wait-and- see period. However, the state may instead choose—if the state determines doing so is cost-effective and necessary to ensure access to care—to make payment within 30 days. (See table 1.) Once the third-party liability changes in the Bipartisan Budget Act of 2018 are fully implemented, states will have authority to require providers to wait longer to receive Medicaid payments in certain circumstances. For example, Prenatal care services claims, which were previously paid within 30 days under pay-and-chase procedures, are now subject to cost avoidance. This could potentially result in providers waiting indefinitely to receive payment, depending on whether the provider is able to resolve the third-party liability (i.e., submit a claim for payment to the third party and determine the amount of the third-party liability), which must occur before the state may make payment under cost avoidance. Pediatric preventive services claims, which are generally paid within 30 days under pay-and-chase procedures, could be subject to a 90-day wait-and-see period beginning in October 2019 if a state decides to implement one. This could result in providers waiting 120 days to receive payment (90 days to wait and see if the liable third party pays, and then another 30 days for the state to make timely payment on any remaining balance). Claims for services for CSE beneficiaries, which are currently subject to pay-and-chase procedures or a 30-day wait-and-see period at state option, may be subject to either a 30-day or 100-day wait-and- see period beginning in October 2019, depending on which option the state chooses. This could result in providers waiting 130 days to receive payment (up to 100 days to wait and see if the liable third party pays, and then another 30 days for the state to make timely payment on any remaining balance). Officials from four of the nine selected states we reviewed reported having implemented the required third-party liability changes for prenatal care services. The changes were required to be implemented in February 2018. For the third-party liability changes affecting pediatric preventive services and services provided to CSE beneficiaries, which are due to take effect October 2019, Medicaid officials from six of the nine selected states noted that they were in the very early stages of planning how they might implement the changes. Officials from four of the nine selected states we reviewed stated that their state Medicaid agency had implemented the mandated third-party liability changes for prenatal care services, which required states to implement cost avoidance payment procedures for claims for these services beginning in February 2018. Officials from three of the four states that have implemented the third-party liability changes for prenatal care services told us that changing from pay-and-chase to cost avoidance procedures involved identifying all the applicable service codes for prenatal care and making the necessary changes in their systems to ensure that any new claims were subject to cost avoidance procedures. They said it also involved communicating the need for such changes to the MCOs in their state. State Medicaid officials from the remaining five states generally noted that they were discussing the changes internally, researching how to implement the changes in their MMIS, assessing the likely impact of these changes on MMIS, or waiting for additional guidance from CMS. For example: Officials from several states noted that they were undertaking activities, such as identifying the prenatal care codes in their data systems that would need to be switched to cost avoidance payment procedures, or researching the best way to implement these changes. Officials from one state said they were in the process of assessing what the likely impact of these changes on beneficiaries and providers would be, and would only subject claims for prenatal care services to cost avoidance if they determined that doing so was the best course of action. Officials from one state indicated that they were waiting to determine whether it was more cost effective to implement these changes in their legacy MMIS, or wait and implement the changes in the new MMIS they are planning to roll out in the future. State Medicaid officials also described other efforts that they would need to undertake as they implemented these changes to third-party liability. These included staff retraining and communicating the changes to providers in their states. Beyond state Medicaid programs, officials from the five Medicaid MCOs we interviewed all stated that their organizations had not yet implemented the prenatal care third-party liability changes. The MCO officials stated that they were waiting for additional instructions on how to implement the third-party liability changes or for revised contract language from their state Medicaid agencies. Officials from one of the MCOs noted they were not aware of the third-party liability changes until we reached out to them for an interview. Officials from two MCOs we interviewed generally agreed that the third-party liability changes for prenatal care services would require changes to claims processing systems and internal processes, but would not be significant. Several MCO officials noted that these changes would likely result in some cost-savings to MCOs in the future. Medicaid officials from six of the nine selected states noted that they were in the very early stages of planning whether—or how—they would implement the wait-and-see periods for pediatric preventive services and services to CSE beneficiaries. For example, some Medicaid officials from these six states described how they were assessing what changes would need to be made to their MMIS, deciding whether to implement the wait-and-see periods, or exploring how to assess the potential impact of these changes. Some Medicaid officials also expressed uncertainty regarding how such changes would affect Medicaid beneficiaries or the amount of effort required by their agency to implement the third-party liability changes. Officials from one state noted that they had begun discussions about implementing the third-party liability changes for both pediatric preventive services and services for CSE beneficiaries in June 2018, and were in the process of identifying the necessary system changes needed to implement third-party liability changes by the October 2019 effective date. Officials from two of these states stated that they do not believe their state will implement the wait-and-see periods for pediatric preventive services or CSE beneficiaries when the changes go into effect. Officials from the remaining three states noted at the time of our interviews they had not yet developed plans for assessing implementation of these changes. Table 2 summarizes the status of selected states’ implementation of the third-party liability changes. For pediatric preventive services, state Medicaid officials generally noted that the third-party liability changes would involve identifying the relevant codes and making changes to their MMIS to ensure those claims were subject to a wait-and-see period, if implemented. Several state Medicaid officials characterized this effort as “significant” or “difficult.” For services delivered to CSE beneficiaries, officials from several state Medicaid agencies speculated that making the third-party liability changes to their MMIS would necessitate having some sort of indicator in their system to identify which claims were for the CSE beneficiaries and, therefore, should be subject to a wait-and-see period, if implemented. Some state Medicaid agency officials said that this would require obtaining the information from another state agency responsible for administering CSE agreements. Several of the state Medicaid officials we interviewed expressed concerns regarding how to implement the wait-and-see periods for pediatric preventive services and services for CSE beneficiaries. Specifically, these officials noted that—within their MMIS—it is not possible to capture on a Medicaid claim when a provider has billed a third party, waited a specified amount of time, and not received payment. As a result, officials from one state noted that additional guidance from CMS on how to implement and track provider billing of third parties—including wait-and-see periods and providers’ collection of payment—would be necessary before moving forward with implementing the third-party liability changes. Officials from two states said that the administrative burden associated with these changes would possibly make them not cost-effective to implement. However, MCO officials we interviewed generally acknowledged that while these changes would require changes to their claims processing systems and internal processes, they were not significant and could potentially result in some cost-savings to their MCO in the future. The third-party liability change affecting all Medicaid services provided to CSE beneficiaries was a particular concern for officials from three state Medicaid agencies and three MCOs. Specifically, these officials said there is currently no way to identify CSE beneficiaries in their MMIS or claims processing systems, which could potentially make this change difficult, if not impossible, to implement. Officials from one state described how setting up a system to receive this information would involve a significant effort, potentially necessitating new hardware and system modifications, as well as a data sharing agreement with the state entity maintaining the CSE information. Officials from one MCO noted that the third-party liability changes affecting CSE beneficiaries was a particular concern, because those changes would potentially require additional administrative work and changes to their processes in order for providers in their network to track down insurance information from a non-custodial parent. After enactment of the Bipartisan Budget Act of 2018 in February 2018, CMS issued guidance in the form of an informational bulletin to states on June 1, 2018, to facilitate states’ implementation of the key provisions of the Bipartisan Budget Act of 2018 related to third-party liability in Medicaid. However, CMS’s June informational bulletin is missing some key information and contains information that is inconsistent with the federal law. This is inconsistent with CMS’s responsibility for ensuring states’ compliance with federal requirements. In particular, Pregnancy-related claims. Under federal law, states must apply standard cost avoidance procedures to all non-pediatric claims, including claims for prenatal services beginning in February 2018. However, CMS guidance indicates that a state need not apply cost avoidance procedures to claims for labor and delivery services if those claims can be differentiated from prenatal services. The guidance also provides that, effective October 1, 2019, states will have 90 days to pay claims related to labor, delivery, and postpartum care claims. As a result, CMS’s guidance is inconsistent with federal law, which requires states to reject any such claim under cost avoidance procedures until the third-party liability is resolved, regardless of how many days that might take. Pediatric preventive claims. Under federal law, states must generally apply pay-and-chase procedures to pediatric preventive services. However, beginning in October 2019, states are permitted to implement a 90-day wait-and-see period before making payment for these services if the state determines that it would be cost-effective and would not adversely affect access to care to do so. However, CMS guidance simply provides that states will have 90 days to pay such claims, suggesting that states need not make the cost- effectiveness or access determinations required by statute. CSE beneficiary claims. Under federal law, beginning in October 2019, for claims for services to CSE beneficiaries, states may choose to make payment within 30 days (as opposed to implementing a 100- day wait-and-see period), if the state determines doing so is cost- effective and necessary to ensure access to care. If the state does not make such a determination, the statute would require the state to avoid making payment for such services for up to 100 days to allow third parties to make payment first. However, CMS guidance does not identify this as an option for states. Instead, CMS guidance simply provides states with the option of implementing the wait-and-see period, omitting the option for states to make payment within 30 days. CMS officials told us that the Bipartisan Budget Act of 2018 did not change state responsibilities related to cost-effectiveness and access to care, and CMS does not intend to issue additional guidance on this issue. However, prior to enactment of the Bipartisan Budget Act of 2018 in February 2018, federal third-party liability law did not authorize states to apply cost avoidance procedures to preventive pediatric claims or pediatric services provided to CSE beneficiaries. Furthermore, other CMS guidance documents, such as the third-party liability handbook and CMS regulations on third-party liability, are out of date and not a reliable source of information for states to use in implementing the new federal third-party liability requirements. In particular, the third-party liability handbook was last revised in 2016 and does not reflect the Bipartisan Budget Act of 2018 changes. Additionally, CMS regulations implementing federal requirements for state payment of claims for prenatal care, labor and delivery services, postpartum care, preventive pediatric services, and services to CSE beneficiaries were last amended in 1997 and, accordingly, do not reflect current statutory requirements, including the Bipartisan Budget Act of 2018 requirement to cost avoid prenatal and other non-pediatric claims beginning February 2018. CMS officials told us the agency is in the process of updating its third- party liability handbook and anticipates issuing the updated document in September 2019. Agency officials also told us they plan to revise the agency’s regulations regarding pay-and-chase and release the revised regulations in early 2020. However, federal law requires state Medicaid plans to provide for proper third-party liability procedures, which states often carry out through references to federal regulation, according to CMS officials. Without updated third-party liability guidance that is timely, complete, and consistent with federal law, states may lack the necessary information to update their state Medicaid plans so that they comply with these requirements. CMS has not taken steps to determine the extent to which state Medicaid agencies are meeting the third-party liability requirements, and therefore CMS officials were unaware of whether states were meeting the new requirements. In particular, CMS officials did not know the extent to which the selected states in our review had implemented the required third-party liability changes. In our interviews with nine selected state Medicaid agencies conducted between November 2018 and March 2019, we learned that five states continued to apply pay-and-chase procedures to prenatal care claims, despite the federal requirement to implement cost avoidance since February 2018. During our interviews, we also learned that CMS had not monitored state Medicaid agencies’ third-party liability approaches prior to the Bipartisan Budget Act of 2018. For example, officials from one of the selected states told us that they had been using cost avoidance for most claims for pediatric preventive care, rather than applying pay-and-chase procedures, as required by law. We also learned from an official from another selected state that the state had been applying cost avoidance procedures to claims for prenatal care services well in advance of the enactment of the Bipartisan Budget Act of 2018, despite the federal requirement to apply pay-and-chase procedures to such claims from 1986 to 2018. CMS’s failure to monitor the implementation of the third-party liability changes in the Bipartisan Budget Act of 2018 is inconsistent with the agency’s responsibilities for oversight of the Medicaid program, including ensuring that federal funds are appropriately spent. We have previously recommended that, given the significant federal Medicaid outlays, the federal government has a vested financial interest in further increasing states’ third-party liability cost savings, and that CMS should play a more active leadership role in monitoring, understanding, supporting, and promoting state third-party liability efforts. However, CMS officials stated that they expect states to comply with current law for Medicaid third-party liability, and that they do not verify whether states have implemented the required third-party liability changes unless the agency is made aware of non-compliance. When asked how CMS ensures that states apply pay-and-chase procedures required under federal law, such as for pediatric preventive claims, CMS officials stated that it is the agency’s expectation that states comply with current law. According to agency officials, if a state has difficulty complying and reaches out to CMS for technical assistance, the agency will work with that state to come into compliance. CMS officials told us that CMS plans to review all state Medicaid plans and provide technical assistance for any necessary action only after the agency has updated its regulations related to third-party liability. As of May 2019, CMS anticipated that it would release updated regulations in early 2020. Because CMS has not monitored states’ compliance with federal third- party liability requirements, the agency does not know whether states have applied the federally required third-party liability procedures to certain Medicaid claims as required by federal law. In the case of prenatal care services claims, the failure to implement cost avoidance payment procedures could result in unnecessary Medicaid expenditures, to the extent that Medicaid pays providers for services for which a third party is liable. To the extent that states are not properly applying pay-and-chase procedures to pediatric preventive service claims, children’s access to such services could be impacted. According to most of the stakeholders we interviewed, Medicaid providers—especially prenatal care and rural providers—could face increased administrative requirements or delays in payments for services as a result of the third-party liability payment changes to the three service categories in the Bipartisan Budget Act of 2018. Several stakeholders agreed that the tasks associated with identifying sources of third-party liability and attempting to collect from third parties would shift from state Medicaid agencies to providers as a result of the payment changes, although opinions differed on the extent to which this shift would affect providers. Several stakeholders said that the third-party liability changes could increase administrative requirements for providers, because obtaining accurate information on third-party liability sources for Medicaid beneficiaries and resubmitting claims that result from incorrect or outdated third-party liability information can be resource intensive and time consuming. One provider and officials from one state Medicaid agency noted that providers may lack the administrative resources or claims-processing expertise to deal with these changes. Officials from one state Medicaid agency, two state provider associations, and an organization advocating for Medicaid beneficiaries also noted that providers may encounter Medicaid beneficiaries who may be unaware or may not disclose that they have other insurance policies; for example, children who are covered under multiple insurance policies by custodial and non-custodial parents or experience insurance transitions following birth. These issues may increase the amount of time and resources providers spend on processing and resubmitting claims. Other stakeholders were less certain that the added requirements would cause difficulties for providers. Officials from one state Medicaid agency and one MCO said that the payment changes would not be difficult to implement, because providers were familiar with billing third parties for medical services for other beneficiaries. Officials from four state Medicaid agencies and two MCOs noted that providers may prefer to submit claims to commercial insurers, because these insurers pay at a higher rate compared with state Medicaid programs. Several stakeholders we interviewed agreed that providers could wait longer periods of time for payment as they track down third-party insurers or wait up to 100 days for potential payment from these insurers before seeking payment from the state Medicaid agency. According to one provider and officials from two provider associations and one MCO, these delays could put providers at risk of not receiving payments for services or not having enough cash on hand to sustain operations. Additionally, officials from three provider associations noted that payment delays would affect pediatric providers in particular, because the majority of the services that pediatricians provide are preventive care—which would be affected by the third-party liability changes. According to several stakeholders we interviewed, smaller or independent providers and those located in rural areas could be more affected by the third-party liability changes compared with providers affiliated with managed care systems or those located in urban areas. Officials from one state Medicaid agency, two provider associations, and one MCO noted that smaller or rural-based providers generally have fewer staff and resources to deal with the larger volume of administrative paperwork and delays in payment for services that could result from the payment changes. Most of the stakeholders we interviewed said that providers might be less willing to serve Medicaid beneficiaries due to the administrative and payment issues, potentially reducing access to care or delaying services for children and pregnant women. However, some other stakeholders said that the third-party liability changes would have little to no effect on Medicaid beneficiaries. Officials from one state Medicaid agency and one MCO noted that third-party liability payment practices for other Medicaid populations and services have been in place for many years, and providers would already be familiar with processing claims with third-party liability. Several stakeholders said that providers may opt to reduce or eliminate the number of Medicaid beneficiaries they serve, because of actual or perceived increase in administrative requirements or payment delays. Officials from three state provider associations speculated that the potential for additional delays in payment for services could be the “final straw” in providers’ decision to stop serving Medicaid beneficiaries. Other stakeholders, including a Medicaid expert, one provider, and officials from one state provider association noted that providers may decide to see fewer Medicaid beneficiaries, but are unlikely to stop seeing them entirely, because some providers are reluctant to deny care to these beneficiaries. Payment delays could also lead to delays in beneficiaries receiving time- sensitive services, such as immunizations, as well as reduced access to specialists, such as midwives or mental health professionals, according to several stakeholders. Officials from one national provider association and an organization advocating for Medicaid beneficiaries noted that providers may seek to identify sources of third-party liability before providing services to beneficiaries. In addition, officials from one state Medicaid agency, a state provider association, and an organization advocating for Medicaid beneficiaries expressed concern that the third-party liability changes had the potential to reduce access to care for populations, such as children and pregnant women, that already faced challenges in accessing adequate, timely, or quality health care. Medicaid officials we interviewed from seven of the nine selected states said that their agencies will—or could—use existing methods to assess the effects of the third-party liability changes on provider availability and beneficiary access to prenatal care services, pediatric preventive services, and services for CSE beneficiaries. Officials from the remaining two states did not discuss or provide information on how they could assess the effects of the changes. Medicaid officials provided examples of existing methods that could be used to assess the effects of payment changes: Tracking beneficiary access by comparing a set of access-to-care measures for a state’s Medicaid population with its non-Medicaid, commercially insured population, as well as carrying out customer satisfaction surveys with Medicaid beneficiaries, Using a third-party liability hotline to track patient issues and conducting secret shopper calls to monitor if providers are accepting new patients, Contracting with a state university to evaluate Medicaid beneficiary access for prenatal and pediatric services. In addition, one state has an independent health advocacy agency that monitors and seeks to resolve provider availability and beneficiary access issues on behalf of the state’s Medicaid population. However, one state Medicaid official and a Medicaid expert agreed that measuring any possible effects of the third-party liability changes—such as a decline in provider availability or beneficiary access—would be difficult without baseline data. According to officials from two state Medicaid agencies and a Medicaid expert, many other factors could potentially affect provider availability and beneficiary access, making it difficult or impossible to pinpoint if a decline in provider availability or beneficiary utilization of services was the result of the third-party liability changes or something else—such as changes in the managed care market or levels of private coverage among beneficiaries. We found other evidence suggesting that it might be challenging for some states to assess the effects of the third-party liability changes. Specifically, Medicaid officials from eight of the nine selected states did not readily identify the number of beneficiaries in their state that had third- party liability and would be affected by the changes. Moreover, officials from two states noted that obtaining this data would require a “significant” effort. Officials from five states shared information on the number of children, pregnant women, or births covered by Medicaid in their state, but did not specify how many of these beneficiaries had other insurance coverage. Seven of the nine selected states had no data readily available on CSE beneficiaries who were also covered by Medicaid. In several cases, officials noted that their MMIS or other data systems had no way to track whether a child was a CSE beneficiary. Omissions and inaccuracies in CMS’s guidance to states on third-party liability changes from the Bipartisan Budget Act of 2018 have the potential to adversely affect the extent to which Medicaid expenditures are being used to pay for services for which a third party is liable, as well as states’ compliance with federal requirements. Furthermore, CMS has not assessed whether state Medicaid agencies are complying with federal third-party liability requirements, under which states must change how they pay claims for certain services as a result of the Bipartisan Budget Act of 2018 and subsequently enacted legislation. In the absence of CMS overseeing states’ compliance, the agency cannot ensure that federal funds are being spent properly and that states are complying with current federal statute. We are making the following two recommendations to CMS: The Administrator of CMS should ensure the agency’s Medicaid third- party liability guidance is consistent with federal law related to the requirement for states to apply cost avoidance procedures to claims for labor, delivery, and postpartum care services, the requirement for states to make payments without regard to potential third-party liability for pediatric preventive services unless the state has made a determination related to cost-effectiveness and access to care that warrants cost avoidance for 90 days, and state flexibility to make payments without regard to potential third- party liability for pediatric services provided to child support enforcement beneficiaries. (Recommendation 1) The Administrator of CMS should determine the extent to which state Medicaid programs are meeting federal third-party liability requirements and take actions to ensure compliance as appropriate. Such actions can include ensuring that state plans reflect the law. (Recommendation 2) We provided a draft of this report to the Department of Health and Human Services for comment. In its written comments, which are reprinted in appendix I, HHS concurred with our recommendations and indicated a commitment to providing states with accurate guidance on the third-party liability changes in the Bipartisan Budget Act of 2018. The agency noted that it is in the process of updating its guidance and third-party liability handbook to reflect the changes and ensure that such guidance is consistent with federal law. The agency also noted that it will determine the extent to which state Medicaid programs are meeting federal third- party liability requirements and will take actions to ensure compliance. We are sending copies of this report to the appropriate congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs can be found on the last page of this report. Major contributors to this report are listed in appendix II. In addition to the contact named above, Tom Conahan (Assistant Director), Andrea E. Richardson (Analyst-in-Charge), Marybeth Acac, Drew Long, Corinne Quinones, Jennifer Rudisill, and Ethiene Salgado- Rodriguez made key contributions to this report.", "summary": "The Medicaid program is typically the payer of last resort. The Bipartisan Budget Act of 2018 changed the Medicaid third-party liability payment requirements for prenatal care services, pediatric preventive services, and services provided to CSE beneficiaries. Before the act, in the case of these three services, states were generally required to pay providers for services delivered to Medicaid beneficiaries and then obtain any payments from liable third parties. The Bipartisan Budget Act of 2018 also included a provision for GAO to study the potential effects of these changes. In this report, GAO (1) describes the status of selected states' implementation of Medicaid third-party liability changes; (2) evaluates CMS's implementation and oversight of the Medicaid third-party liability changes; and (3) describes stakeholders' views of the possible effects of these changes on providers and beneficiaries. GAO conducted interviews with state Medicaid agencies and provider associations in nine selected states, which were selected by taking into consideration Medicaid spending and stakeholder recommendations, among other factors. GAO also conducted interviews with national experts in Medicaid, national organizations representing beneficiaries and providers, and officials from CMS. Medicaid officials in the nine selected states GAO reviewed described being in various stages of implementing third-party liability changes as required by law. These changes affect whether health care providers must seek payment from a liable third party, such as private insurance, before the state Medicaid agency pays for services. The changes apply to prenatal care services, pediatric preventive services, and services for children subject to child support enforcement (CSE beneficiaries). At the time of GAO's review, Officials from four of the nine selected states reported having fully implemented the changes for prenatal care services, which were required to be implemented starting in February 2018. Officials from the remaining five states were discussing the changes internally, researching how to implement the changes in their Medicaid payment systems, or waiting for additional guidance from the Centers for Medicare & Medicaid Services (CMS), the federal agency responsible for overseeing states' Medicaid programs. None of the nine states had implemented the changes to pediatric preventive services and services for CSE beneficiaries, which must be implemented starting in October 2019. Officials from six states told GAO that they were in the early stages of exploring how they would make the changes, while the remaining three states had not developed such plans. GAO found that guidance issued by CMS in June 2018 to assist states in implementing the third-party liability changes contains information inconsistent with the law. For example, CMS's guidance incorrectly informs states that providers do not need to seek third-party payments before the state pays for some prenatal services. In addition, CMS has not determined the extent to which states are meeting third-party liability requirements. CMS officials stated that they expect states to comply with current law for Medicaid third-party liability and that they do not verify whether states have implemented the required third-party liability changes unless the agency is made aware of non-compliance. However, this approach is inconsistent with CMS's Medicaid oversight responsibilities, including its responsibility to ensure federal funds are appropriately spent. Medicaid experts and other stakeholders told GAO that the third-party liability changes could affect some health care providers in ways that could result in decreased beneficiary access to care, because some providers might be less willing to see Medicaid patients. According to stakeholders, this could occur for two primary reasons. 1. The changes may increase administrative requirements for providers by requiring them to identify sources of coverage, obtain insurance information, and submit claims to third-party insurers before submitting them to Medicaid. 2. The changes may result in providers waiting longer to receive Medicaid payment for certain services to the extent that states require providers to seek third-party payments before paying the providers' claims. GAO is recommending that CMS (1) ensure that its guidance to states on third-party liability requirements reflects current law, and (2) determine the extent to which state Medicaid programs are meeting federal third-party liability requirements. The Department of Health and Human Services concurred with these recommendations.", "document_type": "gao"}
{"report": "The internet is a worldwide network of networks comprised of backbone networks, servers, and routers. Network addresses are used to help send information from one internet-connected device, such as a computer, to another by routing the information to its final destination. The protocol that enables the administration of these addresses is the IP. IP addresses provide a numerical description of the location of networked devices such as computers, routers, and smartphones. These numerical descriptions allow devices to be distinguished from each other over the internet. In some ways, an IP address is like a physical street address. For example, in the physical world, if you want to send a letter from one location to another, the contents of the letter must be placed in an envelope that lists both the sender’s and the recipient’s addresses. Similarly, if data is transmitted across the internet from one device to another, IP addresses must be placed in an IP header with sender and recipient information. In addition to containing the addresses of the sender and the receiver, the header also contains a series of fields that provide information about what is being transmitted. Figure 1 provides a simplified illustration of this concept. The Internet Engineering Task Force, the principal body engaged in the development of internet standards, developed IPv6 in the 1990s to address IPv4’s limited address space, among other things. Although IPv6 has been available for over 20 years, IPv4, the older IP, is still more widely deployed. Nevertheless, IPv6 deployment is rising worldwide amidst the exhaustion of available IPv4 addresses. However, IPv6 is not backwards compatible with IPv4, which means that organizations such as DOD have to change their network infrastructure and systems in order to deploy IPv6. DOD relies on its current IPv4 networks to fulfill its mission to provide the military forces needed to deter war and ensure our nation’s security. According to DOD officials leading the transition to IPv6, the department utilizes IPv4 for enterprise-wide and mission partner wired and wireless communications, including infrastructure, technologies, and devices supporting large-scale globally dispersed command and control systems, naval vessels, aircraft, satellites, and ground operations. Figure 2 presents a simplified depiction of the department’s use of IPv4. DOD’s mission requires considerable IP address space. The department currently has 300,149,760 IPv4 addresses—more than any other organization in the world. These approximately 300 million addresses are divided into blocks; each block contains a series of multiple addresses. DOD has 13 particularly large blocks of addresses, each containing 16,777,216 addresses. Also included in the approximately 300 million addresses are 59,767,040 IPv4 addresses that currently are unused. These addresses are reserved for future use by DOD and its components. DOD has stated that it expects to exhaust its reserve of unused IPv4 addresses by 2030. According to the officials leading the IPv6 transition effort, the department expects to have to support IPv4 after it exhausts its IPv4 address space in 2030 due to mission system modernization and replacement timelines, as well as new emerging technologies that may require IPv4 resources while the department transitions to IPv6. According to prior government reports and DOD documentation, IPv6’s improved functionality would benefit the department in many ways. In addition to the general benefits of eliminating IPv4 address space limitations, enhancing mobility features, and integrating IP security, IPv6 has the potential to enhance DOD battlefield operations, improve decision-making with the increased reliance on the Internet of Things (IoT), support U.S. global technological competitiveness, and enhance mission partner interoperability. IPv6 eliminates address space limitations. As previously mentioned, IPv6 dramatically increases the amount of possible address space from 4.3 billion addresses in IPv4 to approximately 340 undecillion (3.4 × 10In contrast to IPv4, the massive address space available in IPv6 will allow almost any device to be assigned a unique IP address. This change fosters greater end-to-end communication abilities between devices with unique IP addresses and can better support the delivery of data-rich content such as voice and video. Enhanced mobility improves connectivity. IPv6 improves mobility features by allowing each device to have a unique IP address independent of its current network or connection point to the internet. This enables mobile IPv6 users to move from network to network while keeping the same unique IP address. The ability to maintain a constant IP address while switching networks is cited as a key factor for the success of a number of evolving capabilities, such as telephone technologies, laptop computers, and internet connected automobiles. Added IP security helps to protect data. IP security—a means of authenticating the sender and encrypting the transmitted data—is better integrated into IPv6 than it is in IPv4. This improved integration, which helps make IP security easier to implement, can help support broader data protection efforts. This extra security is accomplished through the use of two header extensions that can be used together or separately to improve the authentication and confidentiality of data being sent via the internet. These headers serve to provide the receiver with a greater assurance of the sender’s identity and provide encryption protection for the transmitted data. Enhanced capabilities could improve DOD battlefield operations. According to the 2014 DOD IG report on DOD’s IPv6 transition efforts, use of IPv6 could provide DOD with several potential benefits related to battlefield operations, such as improved communication, warfighter mobility, situational awareness, and quality of service. IPv6 auto- configuration capabilities provide secure ad hoc networking and mobility, as well as improved end-to-end security and simplified network management capabilities. This could potentially enable individuals and entire units to disconnect from military base networks, travel into theater, and quickly establish communications. Additionally, IPv6 capabilities could allow warfighters and commanders to improve situational awareness and mission execution during deployment and battle operations, allowing units to securely move from one wireless network to another. Increased use of the IoT may improve decision-making. The increased address space available with IPv6 enables the increased connectivity necessitated by the proliferation of the IoT. DOD’s IoT could include any object for which remote communication, data collection, or control might be useful, such as vehicles, appliances, medical devices, electric grids, transportation infrastructure, manufacturing equipment, or building systems. According to DOD’s Digital Modernization Strategy from July 2019, IoT could be significant to the department’s decision-making processes because the assortment of connected objects that comprise IoT could enable technology to gain the ability to sense, predict, and respond to DOD’s needs. The department could use computers to track, count, and analyze data from these objects in order to reduce waste, loss, and cost. DOD managers could also know whether these objects were running well or needed replacing, repairing, or recalling. IPv6 could support U.S. global technological competitiveness. According to a DOD presentation, the transition to IPv6 could allow the department to remain technologically competitive globally. Interest in IPv6 is gaining momentum around the world, particularly in parts of the world that have limited IPv4 address space to meet their industry and consumer communications needs. Regions that have limited IPv4 address space, such as Asia and Europe, have undertaken efforts to develop, test, and implement IPv6. For example, China has been aggressive at deploying IPv6. Japan has set up an IPv6 Promotion Council, using tax incentives to encourage research and adoption of IPv6 by its private sector. Europe has a task force that has the dual mandate of initiating country and regional IPv6 task forces across European states and seeking global cooperation around the world. Transitioning to IPv6 may preserve mission partner interoperability. According to an August 2017 report from DOD’s CIO, deploying IPv6 capabilities is essential to preserve interoperability with mission partners in the private sector and in other countries and to assure future access to technology. Since the pools of unassigned IPv4 addresses are exhausted, DOD’s mission partners may increasingly rely on IPv6 addresses in the future, furthering the department’s need to increase its IPv6 capabilities. Along with the potential benefits, the National Institute of Standards and Technology (NIST) has indicated that transitioning to IPv6 also could present challenges for organizations such as DOD. These challenges include the complexity added by dual IPv4 and IPv6 operations and the immaturity of IPv6 security products and processes. Complexity added by dual IPv4/IPv6 operations. DOD plans to deploy IPv6 while still supporting IPv4 for legacy applications, services, and clients. This will result in a dual protocol environment and increased complexity. With two protocols, DOD would have to ensure the proper functioning of two separate, but interrelated, networks instead of only one network. Further, hackers and other online adversaries could exploit either the department’s IPv4 or IPv6 network connections when launching cyberattacks. Immaturity of IPv6 security processes. While IPv6 could offer enhanced security, NIST states that its deployment could also lead to new challenges with respect to the types of threats facing an organization such as DOD. For example, organizations in the process of transitioning to IPv6 may lack robust IPv6 security controls and may have security staff members who lack an overall understanding of IPv6. This could allow attackers to exploit IPv6 assets or leverage IPv6 access to exploit IPv4 assets. While general security concepts are the same for both IPv4 and IPv6 protocols, it may take time and effort for transitioning organizations such as DOD to acquire the level of operational experience and practical deployment solutions that have been developed for IPv4 over the years. In August 2005, OMB issued a memorandum to federal CIOs specifying a series of IPv6 transition planning and implementation requirements and associated due dates for federal agencies to enable the use of IPv6. Specific to planning for the transition, the memorandum required agencies to assign an official to lead and coordinate IPv6 transition planning efforts, complete an inventory of IP-compliant devices and technologies, and complete an impact analysis comprised of a cost estimate and a risk analysis by specific due dates during fiscal year 2006. Table 1 lists the transition planning requirements and due dates defined in the OMB memorandum. Aware of the limitations of IPv4, DOD first began planning for the implementation of IPv6 in June 2003. At that time, the department’s CIO issued the memorandum, “Internet Protocol Version 6 (IPv6).” According to this memorandum, the department’s initial goal was to complete its transition to IPv6 by fiscal year 2008. Within a month of the issuance of DOD’s June 2003 memorandum, the department designated the Defense Research and Engineering Network (DREN) as the first DOD IPv6 pilot network. DREN, being a research and development network, is not connected to DOD’s operational networks, such as the department’s nonclassified IP router network, which transmits nonclassified operations traffic. According to a DOD report about the DREN pilot, the entire DREN wide-area network was routinely supporting end-to-end IPv6 traffic by July 2005. According to the department, DREN remains DOD’s only IPv6-enabled network. Further, DOD’s IG reported that the department had undertaken an initial transition effort that temporarily satisfied OMB’s August 2005 implementation requirement to demonstrate IPv6 on its infrastructure by the end of June 2008. Specifically, DOD was able to demonstrate IPv6 within the department’s Defense Information Systems Network. However, according to the report, the department’s IPv6 transition manager said DOD disabled IPv6 functionality due to a lack of trained personnel and potential security risks. We received additional information about why DOD disabled the IPv6 functionality, but we are not including it in the report due to the information being marked as for official use only. DOD began its next effort to plan and implement IPv6 in response to OMB’s subsequent 2010 guidance. In this guidance, OMB gave agencies—including DOD—requirements intended to further their transitions to IPv6. Two of these requirements stated that agencies were to: upgrade their public-facing IT servers and services (e.g., web and email) to IPv6 by the end of September 2012; and upgrade internal client applications that communicate with public internet servers and supporting enterprise networks to IPv6 by the end of September 2014. According to DOD, the department originally planned to meet the 2010 OMB requirements; however, it decided not to complete the upgrades due to security concerns. Again, we received additional information about the department’s security concerns; however, we are not including those details in this report because they were marked as for official use only. OMB’s IPv6 transition guidance requires federal agencies, such as DOD, to perform specific tasks as part of their IPv6 planning efforts. These tasks include: (1) assigning an official to lead and coordinate agency planning, (2) completing an inventory of existing IP-compliant devices and technologies, (3) developing a cost estimate (as part of an impact analysis), and (4) developing a risk analysis (as part of an impact analysis). Although these requirements were originally due in 2005 or 2006, they are still applicable; OMB has not replaced or rescinded them. Assigning an official to lead and coordinate agency planning can help agencies better manage their transition to IPv6. Specifically, a senior- level focal point to lead IPv6 transition efforts can provide assurance that the program is based on a coherent strategy and is well coordinated. A lead official may also help an agency avoid duplicative, overlapping, and fragmented efforts, which can result in avoidable additional costs. According to NIST, having an inventory of IP-compliant assets is crucial to IPv6 transition planning because it helps determine transition requirements and give an agency a clear understanding of the IP capabilities of the devices on the network. Specifically, an inventory helps determine which assets will transition to IPv6, the order in which assets will transition, the transition methods selected, and the security controls that would need to be implemented. Further, cost estimates are critical to decision-makers not only because they help establish budgets, but also because they are integral to determining and communicating a realistic view of likely cost and schedule outcomes that could be used to plan the work necessary to develop, produce, install, and support a program. As we have previously reported, without the ability to generate reliable cost estimates, agencies are at risk of experiencing cost overruns, missed deadlines, and performance shortfalls. In addition, a risk analysis enables an agency to assess the significance of potential threats to the success of its transition to IPv6, as well as assess how those threats could be mitigated or avoided. Further, without a risk analysis to help the agency understand the potential threats and obstacles facing the IPv6 transition initiative, agencies run the risk of creating goals and plans that are too optimistic. According to DOD, the department began its most recent effort to transition to IPv6 in April 2017. As part of this effort, in November 2019, the department released its IPv6 implementation strategy, which articulates DOD’s overarching vision for its IPv6 transition initiative: to provide secure and reliable IPv6 services that enable innovation for competitive advantage. According to the strategy, DOD’s goals for the effort include implementing an interim solution of using both IPv4 and IPv6 and then planning for an eventual IPv6-only environment. As of March 2020, DOD had not yet completed three of the four selected transition planning requirements. Specifically, the department had completed the requirement of appointing an agency lead for its IPv6 transition efforts. However, it had not yet completed the three other requirements: complete an inventory, develop a cost estimate, and develop a risk analysis. Table 2 summarizes the status of DOD’s completion of the four selected OMB IPv6 transition planning requirements. DOD completed OMB’s requirement to have an official lead the IPv6 planning efforts by first assigning its Joint Information Environment Executive Committee responsibility for overseeing the department’s transition to IPv6 in August 2017. The committee, in turn, established the DOD IPv6 Working Group in November 2017 to coordinate and manage department-wide IPv6 planning, implementation, and testing. An official in the Office of the CIO serves as the chair of the working group, and, according to the group’s charter, is responsible for leading meetings, soliciting and prioritizing issue topics for review, and overseeing the coordination of working group activities supporting the department-wide transition to IPv6. However, DOD did not complete the requirement to develop an inventory of existing IP-compliant devices and technologies. In November 2005, DOD provided a memorandum to OMB that indicated that the department would not complete the inventory of IP-compliant devices and technologies; instead, DOD would continue following its existing transition plan, which did not require an inventory. Further, the DOD officials leading the IPv6 transition effort informed us that the department had not developed such an inventory and that it still does not plan to do so. The officials said that conducting a task of this size would be impractical given DOD’s size and the number of IP-compliant devices in the department. The officials leading the IPv6 transition also said that DOD has been mitigating the risk of not having an inventory by ensuring that the department has only been acquiring IPv6-capable IT devices since December 2009. However, while only acquiring IPv6-capable devices and applications could help the transition move forward, it would not be as complete as an inventory, given that an inventory would include technology purchased before December 2009. DOD also did not complete a cost estimate or a risk analysis. According to the DOD officials leading the IPv6 transition effort, the initiative was not a top priority until the CIO released the “Internet Protocol Version 6 Implementation Direction and Guidance” memorandum in February 2019. This memorandum, which was developed to guide the department’s IPv6 transition planning and implementation efforts, gave the transition initiative greater attention in the department. Prior to the issuance of the memorandum, the officials stated that they did not have sufficient resources to conduct the cost estimate and did not have enough understanding to complete the risk analysis. DOD officials leading the IPv6 transition effort explained that the department plans to develop these requirements by the end of May 2020; however, we have not received any documentation confirming this deadline. Until DOD develops an inventory of IP-compliant technologies and devices, a cost estimate, and a risk analysis, the department’s IPv6 transition initiative may have an increased likelihood of cost overruns, schedule delays, and security vulnerabilities. Specifically, not having an inventory of IP-compliant devices and technologies may lead to the department developing plans without being aware of all the system and infrastructure requirements necessary to successfully transition a large organization such as DOD to IPv6. Further, without a cost estimate, DOD may be making decisions without the benefit of relevant information on the initiative’s potential cost and schedule outcomes, thereby introducing unnecessary risk into the implementation process. Finally, by moving forward without a risk analysis, DOD increases the probability that it is not proactively managing potential threats that could disrupt the transition or introduce new IT security vulnerabilities. DOD’s February 2019 memorandum lists 35 required activities for transitioning to IPv6 that DOD’s various components or offices, such as the Office of the CIO, are to complete or work on during fiscal years 2019 through 2021. Of these 35 activities, 18 were to be completed prior to March 2020. However, DOD had not completed most of the required activities. Specifically, of the 18 activities that were to be completed by March 2020, the department had completed six and had not completed 12. In addition, the department had completed one of eight other activities that did not have specific due dates. Table 3 outlines the department’s seven IPv6 transition activities that had been completed as of March 2020. (See appendix I for a full list of DOD’s transition activities and their completion status.) One notable required activity that DOD completed was to develop a CIO- approved strategy to implement its transition to IPv6. DOD’s strategy outlines, among other things, the overall goals for the IPv6 transition initiative. These goals include implementing a network that is both IPv4 and IPv6 capable; planning for an IPv6-only environment; and establishing and optimizing training for IPv6. In addition, DOD’s Defense Information Systems Agency leveraged online training providers to offer on demand IPv6 training courses for network engineers and cybersecurity personnel. In addition to basic familiarization training for those new to IPv6, select training courses are labeled as being at the advanced level. However, the department had not completed 12 of 18 activities that were due prior to March 2020. Notably, DOD missed its original September 2019 deadline to enable IPv6 on all commercially hosted public facing unrestricted services. According to the department officials leading the IPv6 transition, DOD expects to be able to complete this task by the end of July 2021. The department also missed its original June 2019 deadline for identifying the public facing unrestricted services hosted by DOD. The officials leading the IPv6 transition initiative stated that DOD currently plans to complete this activity by May 2020. Other activities that were past due in March 2020 include: developing supplemental guidance for the acquisition of IPv6-capable products, updating and maintaining IPv6 standards and implementation profiles, and determining DOD’s cybersecurity architecture and posture impacts, among others. DOD officials leading the IPv6 transition effort stated that the department had not yet completed its required activities because the original time frames that the department had established were unrealistic. Although the activities were initially thought to have been reasonable, DOD adjusted the activities’ due dates after the department began executing the tasks and realized that it would take a large amount of work to accomplish their goals and complete the activities. One contributing factor for the unrealistic due dates is that DOD developed this list of required activities without the benefit of an inventory of IP-compliant devices and technologies, a cost estimate, or a risk analysis. Without completing these basic planning requirements, DOD significantly reduced the probability that it could have developed a realistic transition schedule. Addressing requirements would supply DOD with sources of meaningful information that would enable the department to develop realistic, detailed, and informed transition plans and time frames. While DOD’s current IPv6 transition effort is showing progress, the department has not completed most of OMB’s planning requirements. Notable signs of progress include the appointment of an official to lead the initiative and the development of an overarching strategy document that outlines the transition’s scope and goals. Nevertheless, DOD had not completed an inventory of IP-compliant technologies, a cost estimate, or a risk analysis before moving ahead with developing its February 2019 guidance and working against the guidance’s list of transition activities. The lack of an inventory is problematic due to the role that it should play in developing transition requirements. In addition, without a cost estimate to guide decision-makers, DOD’s current IPv6 transition plans could be based on unrealistic assumptions about costs and resource demands. Further, by moving forward without a risk analysis, DOD increases the probability that it is not proactively managing potential threats that could either disrupt the transition or introduce new IT security vulnerabilities. Completing these longstanding planning requirements would enable DOD to develop realistic plans with accurate transition requirements and proactive risk mitigation strategies, among other things. We are making three recommendations to DOD. The Secretary of Defense should direct the DOD CIO to complete a department-wide inventory of existing IP-compliant devices and technologies to help with planning efforts and requirements development for the transition to IPv6. (Recommendation 1) The Secretary of Defense should direct the DOD CIO to develop a cost estimate as described in OMB memorandum M-05-22 for the department’s transition to IPv6. (Recommendation 2) The Secretary of Defense should direct the DOD CIO to develop a risk analysis as described in OMB memorandum M-05-22 for the department’s transition to IPv6. (Recommendation 3) We provided a draft of this report to DOD and OMB for review and comment. In response, DOD agreed with two recommendations and disagreed with one recommendation that we made to the department. OMB did not state whether it agreed or disagreed with the report’s findings. In written comments, DOD stated that it agreed with our recommendations to develop a cost estimate and risk analysis for the department’s transition to IPv6 (Recommendations 2 and 3). The department said that it plans to complete both the cost estimate and the risk analysis by the end of May 2020. However, DOD stated that it did not agree with our recommendation to complete a department-wide inventory of existing IP-compliant devices and technologies (Recommendation 1). Specifically, the department referred to the draft IPv6 guidance that OMB developed in March 2020, stating that the draft guidance will rescind OMB’s fiscal year 2005 IPv6 guidance, which includes the inventory requirement. DOD also said that creating such an inventory would be impractical given the department’s size. It added that it has been mitigating the risk of not having an inventory by only acquiring IPv6-capable devices since December 2009. We acknowledge that OMB’s March 2020 draft IPv6 guidance, once finalized, would rescind its fiscal year 2005 IPv6 guidance. However, the draft guidance focuses on completing the operational deployments of IPv6, not on the initial key transition step of completing an inventory, as required in the 2005 guidance. The draft guidance also requests information on agencies’ completion of certain milestones using the percentage of IP-enabled devices that are IPv6-only as the metric. DOD’s completed inventory would be essential to accurately responding to OMB’s draft requirement. In addition, NIST’s current IPv6 transition guidance cites an inventory of IP devices as a key step in transitioning to IPv6 since such information would help identify requirements for transitioning, including which assets would transition and what security controls would be needed. As DOD has acknowledged, however, it has not yet completed an inventory. Accordingly, we believe that our recommendation that DOD complete a department-wide inventory of its existing IP-compliant devices and technologies is warranted. In addition, DOD provided a technical comment, which we incorporated as appropriate. DOD’s comments are reprinted in appendix II. In comments provided via email on May 8, 2020, an Associate General Counsel in OMB’s Office of General Counsel expressed OMB’s appreciation for the opportunity to review and comment on our draft report. The official did not state whether OMB agreed or disagreed with the report’s findings. OMB also provided a technical comment, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of DOD, and the Acting Director of OMB. In addition, the report is available at no change on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6240 or dsouzav@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In February 2019, the Department of Defense’s (DOD) Chief Information Officer (CIO) released “Internet Protocol Version 6 Implementation Direction and Guidance,” a memorandum containing guidance and a list of required implementation and planning activities for the department’s transition to Internet Protocol version 6 (IPv6). For each activity, the memorandum included information such as the component or office responsible for completing the work and a description of the work to be completed. Out of 35 total activities, seven were completed and 12 were past due as of March 2020. One key contributing factor behind the activities’ unrealistic deadlines was that the department developed this list of required activities without having completed key planning efforts, such as an inventory of IP-compliant devices and technologies, a cost estimate, or a risk analysis. Table 4 shows the status of the completion of the required transition activities as called for in the department’s guidance. In addition to the contact named above, Larry Crosland (Assistant Director), Meredith Raymond (Analyst in Charge), Amy Apostol, Chris Businsky, West Coile, Kristi Dorsey, Vernetta Marquis, and Evan Rapson made key contributions to this report.", "summary": "An internet protocol provides the addressing mechanism that defines how and where information moves across interconnected networks. Increased use of the internet has exhausted available IPv4 address space, spurring the adoption of its successor protocol, IPv6. OMB has required that agencies plan for transitioning from IPv4 to IPv6. Senate and House reports accompanying the 2020 National Defense Authorization Act included provisions for GAO to review DOD's IPv6 transition planning efforts. This report (1) identifies past DOD attempts to transition to IPv6, (2) examines the extent to which DOD has completed OMB's planning requirements for its current transition effort, and (3) identifies DOD's progress in completing its own IPv6 transition activities. To do so, GAO assessed DOD's IPv6 transition plans and documentation against OMB's requirements, reviewed DOD's planned IPv6 transition activities, and interviewed agency officials. The Department of Defense's (DOD) current initiative to transition to Internet Protocol version 6 (IPv6), which began in April 2017, follows at least two prior attempts to implement IPv6 that were halted by DOD. In one effort that began in approximately 2003, DOD initially did make progress implementing IPv6 on its systems, but then the department ended the effort due to security risks and a lack of personnel trained in IPv6. DOD initiated another attempt in response to 2010 OMB guidance. However, this initiative was terminated shortly thereafter, again due to security concerns. For its current initiative, DOD has not completed three of four longstanding OMB requirements (see table). Without an inventory, a cost estimate, or a risk analysis, DOD's plans have a high degree of uncertainty about the magnitude of work involved, the level of resources required, and the extent and nature of threats, including cybersecurity risks. In February 2019, DOD released its own IPv6 planning and implementation guidance that listed 35 required transition activities, 18 of which were due to be completed before March 2020. DOD completed six of the 18 activities as of March 2020. DOD officials acknowledged that the department's transition time frames were optimistic; they added that they had thought that the activities' deadlines were reasonable until they started performing the work. Without an inventory, a cost estimate, or a risk analysis, DOD significantly reduced the probability that it could have developed a realistic transition schedule. Addressing these basic planning requirements would supply DOD with needed information that would enable the department to develop realistic, detailed, and informed transition plans and time frames. GAO is making three recommendations to DOD to develop an inventory of IP compliant devices, an estimate of the IPv6 transition costs, and an analysis of IPv6 transition risk. DOD agreed with the recommendations to develop a cost estimate and risk analysis, but disagreed with the recommendation to develop an inventory of IP-compliant devices. Nevertheless, GAO believes the recommendation to develop an inventory is warranted.", "document_type": "gao"}
{"report": "As shown in table 1 the cost of counting the nation’s population has been escalating with each decade. The 2010 Census was the most expensive in U.S. history at about $12.3 billion, and was about 31 percent more costly than the $9.4 billion 2000 Census (in 2020 dollars). According to the Bureau, the total cost of the 2020 Census in October 2015 was estimated at $12.3 billion and in October 2017 that cost estimate grew to approximately $15.6 billion, approximately a $3 billion increase. Additionally, Bureau officials told us that while the estimated cost of the census had increased to $15.6 billion, it was nevertheless managing the 2020 Census to a lower cost of $14.1 billion. Bureau officials explained that the $14.1 billion includes all program costs and contingency funds to cover risks and general estimating uncertainty. The remaining $1.5 billion estimated cost is additional contingency for “unknown unknowns”—that is, low probability events that could cause massive disruptions—and several what-if scenarios such as an increase in the wage rate or additional supervisors needed to manage field operations. Moreover, as shown in figure 1, the average cost for counting a housing unit increased from about $16 in 1970 to around $92 in 2010 (in 2020 constant dollars). At the same time, the return of census questionnaires by mail (the primary mode of data collection) declined over this period from 78 percent in 1970 to 63 percent in 2010. Declining mail response rates has led to higher costs because the Bureau sends temporary workers to each non-responding household to obtain census data. Achieving a complete and accurate census has become an increasingly daunting task, in part, because the population is growing larger, more diverse, and more reluctant to participate in the enumeration. In many ways, the Bureau has had to invest substantially more resources each decade to conduct the enumeration. In addition to these external societal challenges that make achieving a complete count a daunting task, the Bureau also faces a number of internal management challenges that affect its capacity and readiness to conduct a cost-effective enumeration. Some of these issues—such as acquiring and developing IT systems and preparing reliable cost estimates—are long-standing in nature. At the same time, as the Bureau looks toward 2020, it also faces newly emerging and evolving uncertainties. For example, on March 26, 2018, the Secretary of Commerce announced his decision to add a question to the decennial census on citizenship status. On January 15, 2019, the U.S. District Court for the Southern District of New York ruled on one of a number of legal challenges to the Secretary’s decision. That ruling is being appealed, thus, leaving the use of the question uncertain. The U.S. Supreme Court is scheduled to begin hearing arguments in April 2019 regarding the addition of the citizenship question to the census form. In our prior work we have noted the risks associated with late changes of any nature to the design of the census if the Bureau is unable to fully test those changes under operational conditions. The Bureau also faced budgetary uncertainties that, according to the Bureau, led to the curtailment of testing in 2017 and 2018. However, the Consolidated Appropriations Act, 2018 appropriated for the Periodic Censuses and Programs account $2.544 billion, which more than doubles the Bureau’s request in the President’s Fiscal Year 2018 Budget of $1.251 billion. According to the explanatory statement accompanying the act, the appropriation, which is available through fiscal year 2020, is provided to ensure the Bureau has the necessary resources to immediately address any issues discovered during operational testing, and to provide a smoother transition between fiscal year 2018 and fiscal year 2019. The availability of those resources enabled the Bureau to continue preparations for the 2020 Census during the 35 days when appropriations lapsed for the Bureau. Moreover, the Consolidated Appropriations Act, 2019 appropriated for the Periodic Censuses and Programs account $3.551 billion. According to Bureau officials, this level of funding for fiscal year 2019 is sufficient to carry out 2020 Census activities as planned. Importantly, the census is conducted against a backdrop of immutable deadlines. In order to meet legally mandated reporting requirements, census activities need to take place at specific times and in the proper sequence. Thus, it is absolutely critical for the Bureau to stay on schedule. Figure 2 shows some dates for selected decennial events. The Bureau has begun to open its area census offices (ACO) for the 2020 Census. It has signed leases for all 248 ACOs, of which 39 of the offices will be open for the address canvassing operation set to begin in August 2019 where staff verifies the location of selected housing units. The remaining 209 offices will begin opening this fall. In 2010 the Bureau opened 494 census offices. The Bureau has been able to reduce its infrastructure because it is relying on automation to assign work and to record payroll. Therefore there is less paper—field assignments, maps, and daily payroll forms—to manually process. For the 2020 Census, the Bureau is refining its recruiting and hiring goals, but tentatively plans to recruit approximately 2.24 million applicants and hire nearly 500,000 temporary field staff from that applicant pool for two key operations: address canvassing, and nonresponse follow-up, where they visit households that do not return census forms to collect data in person. In 2010 the Bureau recruited 3.8 million applicants and hired 628,000 temporary workers to conduct the address canvassing and nonresponse follow-up field operations. According to Bureau officials, it has reduced the number of temporary staff it needs to hire because automation has made field operations more efficient and there is less paper. As of April 15, 2019, for its early operations efforts which includes hiring listers for address canvassing, the Bureau has processed approximately 264,000 applicants which represent 128.4 percent of its 205,000 recruiting goal. The Bureau is also in the process of hiring approximately 1,500 partnership specialists needed by June 2019 to help increase awareness and participation in the 2020 Census in minority communities and hard-to-reach populations. As of April 17, 2019, the Bureau has hired 467 partnership specialists, and another 329 applicants are waiting to have their background checks completed. Moreover, Bureau officials also stated that the current economic environment (i.e., the low unemployment rate compared to the economic environment of the 2010 Census) has not yet impacted their ability to recruit staff. The Bureau will continue to monitor the impact of low unemployment on its ability to recruit and hire at the local and regional levels. For the 2020 Census, the Bureau is significantly changing how it intends to conduct the census, in part by re-engineering key census-taking methods and infrastructure, and making use of new IT applications and systems. For example, the Bureau plans to offer an option for households to respond to the survey via the internet and enable field-based enumerators to use applications on mobile devices to collect survey data from households. To do this, the Bureau plans to utilize 52 new and legacy IT systems, and the infrastructure supporting them, to conduct the 2020 Census. A majority of these 52 systems have been tested during operational tests in 2017 and 2018. For example, the Bureau conducted its 2018 End-to- End test, which included 44 of the 52 systems and was intended to test all key systems and operations in a census-like environment to ensure readiness for the 2020 Census. Nevertheless, additional IT development and testing work needs to take place before the 2020 Census. Specifically, officials from the Bureau’s Decennial Directorate said they expect that the systems will need to undergo further development and testing due to, among other things, the need to add functionality that was not part of the End-to-End test, scale system performance to support the number of respondents expected during the 2020 Census, and address system defects identified during the 2018 End-to-End test. To prepare the systems and technology for the 2020 Census, the Bureau is also relying on significant contractor support. For example, it is relying on contractors to develop a number of systems and components of the IT infrastructure, including the IT platform that is intended to be used to collect data from households responding via the internet and telephone, and for non-response follow-up activities. Contractors are also deploying the IT and telecommunications hardware in the field offices and providing device-as-a-service capabilities by procuring the mobile devices and cellular service to be used for non-response follow-up. In addition to the development of technology, the Bureau is relying on a technical integration contractor to integrate all of the key systems and infrastructure. The contractor’s work is expected to include, among other things, evaluating the systems and infrastructure and acquiring the infrastructure (e.g., cloud or data center) to meet the Bureau’s scalability and performance needs; integrating all of the systems; and assisting with technical, performance and scalability, and operational testing activities. In February 2017, we added the 2020 Decennial Census as a high-risk area needing attention from Congress and the executive branch. This was due to significant risks related to, among other things, innovations never before used in prior enumerations, the acquisition and development of IT systems, and expected escalating costs. Among other things, we reported that the commitment of top leadership was needed to ensure the Bureau’s management, culture, and business practices align with a cost-effective enumeration. We also stressed that the Bureau needed to rigorously test census-taking activities; ensure that scheduling adheres to best practices; improve its ability to manage, develop, and secure its IT systems; and have better oversight and control over its cost estimation process. Our experience has shown that the key elements needed to make progress toward being removed from the High-Risk List are top-level attention by the administration and agency leaders grounded in the five criteria for removal, as well as any needed congressional action. The five criteria for removal that we identified in November 2000 are as follows: Leadership Commitment. The agency has demonstrated strong commitment and top leadership support. Capacity. The agency has the capacity (i.e., people and resources) to resolve the risk(s). Action Plan. A corrective action plan exists that defines the root causes and solutions, and that provides for substantially completing corrective measures, including steps necessary to implement solutions we recommended. Monitoring. A program has been instituted to monitor and independently validate the effectiveness and sustainability of corrective measures. Demonstrated Progress. The agency has demonstrated progress in implementing corrective measures and in resolving the high-risk area. These five criteria form a road map for efforts to improve, and ultimately address, high-risk issues. Addressing some of the criteria leads to progress, while satisfying all of the criteria is central to removal from the list. As we reported in the March 2019 high-risk report, the Bureau’s efforts to address the risks and challenges for the 2020 Census had fully met one of the five criteria for removal from the High-Risk List—leadership commitment—and partially met the other four, as shown in figure 3. Additional details about the status of the Bureau’s efforts to address this high-risk area are discussed later in this statement. The 2020 Census is on our list of high-risk programs because, among other things, (1) innovations never before used in prior enumerations are not expected to be fully tested, (2) the Bureau continues to face challenges in implementing IT systems, (3) the Bureau faces significant cybersecurity risks to its systems and data, and (4) the Bureau’s cost estimate for the 2020 Census was unreliable. If not sufficiently addressed, these risks could adversely impact the cost and quality of the enumeration. Moreover, the risks are compounded by other factors that contribute to the challenge of conducting a successful census, such as the nation’s increasingly diverse population and concerns over personal privacy. The basic design of the enumeration—mail out and mail back of the census questionnaire with in-person follow-up for non-respondents—has been in use since 1970. However, a lesson learned from the 2010 Census and earlier enumerations is that this traditional design is no longer capable of cost-effectively counting the population. In response to its own assessments, our recommendations, and studies by other organizations, the Bureau has fundamentally re-examined its approach for conducting the 2020 Census. Specifically, its plan for 2020 includes four broad innovation areas: re-engineering field operations, using administrative records, verifying addresses in-office, and developing an internet self-response option (see table 2). If they function as planned, the Bureau initially estimated that these innovations could result in savings of over $5 billion (in 2020 constant dollars) when compared to its estimates of the cost for conducting the census with traditional methods. However, in June 2016, we reported that the Bureau’s initial life-cycle cost estimate developed in October 2015 was not reliable and did not adequately account for risk. As discussed earlier in this statement, the Bureau has updated its estimate from $12.3 billion and now estimates a life-cycle cost of $15.6 billion, which would result in a smaller potential savings from the innovative design than the Bureau originally estimated. According to the Bureau, the goal of the cost estimate increase was to ensure quality was fully addressed. While the planned innovations could help control costs, they also introduce new risks, in part, because they include new procedures and technology that have not been used extensively in earlier decennials, if at all. Our prior work has shown the importance of the Bureau conducting a robust testing program, including the 2018 End-to-End test. Rigorous testing is a critical risk mitigation strategy because it provides information on the feasibility and performance of individual census-taking activities, their potential for achieving desired results, and the extent to which they are able to function together under full operational conditions. To address some of these challenges we have made numerous recommendations aimed at improving reengineered field operations, using administrative records, verifying the accuracy of the address list, and securing census responses via the internet. The Bureau has held a series of operational tests since 2012, but according to the Bureau, it scaled back its most recent field tests because of funding uncertainties. For example, the Bureau canceled the field components of the 2017 Census Test including non-response follow-up, a key census operation. In November 2016, we reported that the cancelation of the 2017 Census Test was a lost opportunity to test, refine, and integrate operations and systems, and that it put more pressure on the 2018 End-to-End test to demonstrate that enumeration activities will function under census-like conditions as needed for 2020. However, in May 2017, the Bureau scaled back the operational scope of the 2018 End-to-End test and, of the three planned test sites, only the Rhode Island site would fully implement the 2018 End-to-End test. The Washington and West Virginia sites would test just one field operation. In addition, due to budgetary concerns, the Bureau decided to remove three coverage measurement operations (and the technology that supports them) from the scope of the test. However, removal of the coverage measurement operations did not affect testing of the delivery of apportionment or redistricting data. Without sufficient testing, operational problems can go undiscovered and the opportunity to improve operations will be lost, in part because the 2018 End-to-End test was the last opportunity to demonstrate census technology and procedures across a range of geographic locations, housing types, and demographic groups under decennial-like conditions prior to the 2020 Census. To manage risk to the census, the Bureau has developed hundreds of mitigation and contingency plans. To maximize readiness for the 2020 Census, it will also be important for the Bureau to prioritize among its mitigation and contingency strategies those that will deliver the most cost-effective outcomes for the census. We reported on the 2018 End-to-End test in December 2018 and noted that the Bureau had made progress addressing prior test implementation issues but still faced challenges. As the Bureau studies the results of its testing to inform the 2020 Census, it will be important that it addresses key program management issues that arose during implementation of the test. Namely, by not aligning the skills, responsibilities, and information flows for the first-line supervisors during field data collection, the Bureau limited its role in support of enumerators within the re-engineered field operation. The Bureau also lacked mid-operation training or guidance, which, if implemented in a targeted, localized manner, could have further helped enumerators navigate procedural modifications and any commonly encountered problems when enumerating. It will be important for the Bureau to prioritize its mitigation strategies for these implementation issues so that it can maximize readiness for the 2020 Census. We have previously reported that the Bureau faces challenges in managing and overseeing IT programs, systems, and contractors supporting the 2020 Census. Specifically, we have noted challenges in the Bureau’s efforts to manage, among other things, the schedules and contracts for its systems. As a result of these challenges, the Bureau is at risk of being unable to fully implement the systems necessary to support the 2020 Census and conduct a cost-effective enumeration. To help improve its implementation of IT for the 2020 Census, the Bureau recently revised its systems development and testing schedule. Specifically, in October 2018, the Bureau organized the development and testing schedule for its 52 systems into 16 operational deliveries. Each of the 16 operational deliveries has milestone dates for, among other things, development, performance and scalability testing, and system deployment. According to Bureau officials in the Decennial Directorate, the schedule was revised, in part, due to schedule management challenges experienced, and lessons learned, while completing development and testing during the 2018 End-to-End test. The Bureau has made initial progress in executing work against its revised schedule. For example, the Bureau completed development for the systems in the first operational delivery—for 2020 Census early operations preparations—in July 2018, and deployed these systems into production in October 2018. However, our current work has determined that the Bureau is at risk of not meeting several near-term systems testing milestones. As of April 2019, six systems that are expected to be used in a total of two operational deliveries are at risk of not meeting milestone dates which would signal that the systems have completed development and are ready for testing. These six systems are needed for, among other things, field assignment management and worker performance tracking during address canvassing, data collection for operations, business and support automation, and customer support during self-response. According to Bureau documentation, these systems were at risk due, in part, to the lack of finalized system requirements and specifications. Figure 4 presents an overview of the status for all 16 operational deliveries, as of April 2019. The at-risk systems previously discussed add uncertainty to a highly compressed time frame over the next 4 months. Importantly, between April and August 2019, the Bureau is expected to begin integration testing for the systems in seven operational deliveries, including internet self- response and non-response follow-up. Officials from the Bureau’s integration contractor noted concern that the current schedule leaves little room for any delays in completing the remaining development and testing activities. In addition to managing the compressed testing time frames, the Bureau also has to quickly finalize plans related to its IT infrastructure. For example, in March 2019, the Bureau’s technical integration contractor stated that it needed the Bureau to obtain approval from federal partners for its Trusted Internet Connection or finalize alternative plans in order to complete performance and scalability testing in a timely manner. As of mid-April 2019, the Bureau stated that it was still awaiting final approval. Given that these plans may impact systems being tested this summer or deployed into production for the address canvassing operation in August 2019, it is important that the Bureau quickly addresses this matter. Our past reporting noted that the Bureau faced significant challenges in managing its schedule for system development and testing that occurred in 2017 and 2018. We reported that while the Bureau had continued to make progress in developing and testing IT systems for the 2020 Census, it had experienced delays in developing systems to support the 2018 End-to-End test. These delays compressed the time available for system and integration testing and for security assessments. In addition, several systems experienced problems during the test. We noted then, and reaffirm now, that continued schedule management challenges may compress the time available for the remaining system and integration testing and increase the risk that systems may not function or be as secure as intended. The Bureau has acknowledged that it faces risks to the implementation of its systems and technology. As of March 2019, the Bureau had identified about 330 active risks for the 2020 Census program, through its risk management process, including 20 high risks that may have substantial technical and schedule impacts if realized. Taken together, these risks represent a cross-section of issues, such as the effects of late changes to technical requirements, the need to ensure adequate time for system development and performance and scalability testing, contracting issues, privacy risks, and skilled staffing shortages. Going forward, it will be important that the Bureau effectively manages these risks to better ensure that it meets near-term milestones for system development and testing, and is ready for the major operations of the 2020 Census. The risks to IT systems supporting the federal government and its functions, including conducting the 2020 Census, are increasing as security threats continue to evolve and become more sophisticated. These risks include insider threats from witting or unwitting employees, escalating and emerging threats from around the globe, and the emergence of new and more destructive attacks. Underscoring the importance of this issue, we have designated information security as a government-wide high-risk area since 1997 and, in our most recent biennial report to Congress, ensuring the cybersecurity of the nation was one of nine high-risk areas that we reported needing especially focused executive and congressional attention. Our prior and ongoing work has identified significant challenges that the Bureau faces in securing systems and data for the 2020 Census. Specifically, the Bureau has faced challenges related to completing security assessments, addressing security weaknesses, resolving cybersecurity recommendations from DHS, and addressing numerous other cybersecurity concerns (such as phishing). Federal law specifies requirements for protecting federal information and information systems, such as those systems to be used in the 2020 Census. Specifically, the Federal Information Security Management Act of 2002 and the Federal Information Security Modernization Act of 2014 (FISMA) require executive branch agencies to develop, document, and implement an agency-wide program to provide security for the information and information systems that support operations and assets of the agency. In accordance with FISMA, National Institute of Standards and Technology (NIST) guidance, and Office of Management and Budget (OMB) guidance, the Bureau’s Office of the Chief Information Officer (CIO) established a risk management framework. This framework requires system developers to ensure that each of the Bureau’s systems undergoes a full security assessment, and that system developers remediate critical deficiencies. According to the Bureau’s risk management framework, the systems expected to be used to conduct the 2020 Census will need to have complete security documentation (such as system security plans) and an approved authorization to operate prior to their use. Currently, according to the Bureau’s Office of the CIO: Fourteen of the 52 systems have authorization to operate, and will not need to be reauthorized before they are used in the 2020 Census Thirty-two of the 52 systems have authorization to operate, and may need to be reauthorized before they are used in the 2020 Census Six of the 52 systems do not have authorization to operate, and will need to be authorized before they are used in the 2020 Census. Figure 5 summarizes the authorization to operate status for the systems being used in the 2020 Census, as reported by the Bureau in April 2019. As we have previously reported, while large-scale technological changes (such as internet self-response) increase the likelihood of efficiency and effectiveness gains, they also introduce many cybersecurity challenges. The 2020 Census also involves collecting personally identifiable information (PII) on over a hundred million households across the country, which further increases the need to properly secure these systems. Thus, it will be important that the Bureau provides adequate time to perform these security assessments, completes them in a timely manner, and ensures that risks are at an acceptable level before the systems are deployed. We have ongoing work examining how the Bureau plans to address both internal and external cyber threats, including its efforts to complete system security assessments and resolve identified weaknesses. FISMA requires that agency-wide information security programs include a process for planning, implementing, evaluating, and documenting remedial actions (i.e., corrective actions) to address any deficiencies in the information security policies, procedures, and practices of the agency. Agencies must establish procedures to reasonably ensure that all information security control weaknesses, regardless of how or by whom they are identified, are addressed through the agency’s remediation processes. For each identified control weakness, the agency is required to develop and implement a plan of actions and milestones (POA&M) based on findings from security control assessments, security impact analyses, continuous monitoring of activities, audit reports, and other sources. Additionally, the Bureau’s framework requires that security assessment findings that need to be remediated are to be tracked as POA&Ms. These POA&Ms are expected to provide a description of the vulnerabilities identified during the security assessment that resulted from a control weakness. As of March 2019, the Bureau had over 500 open POA&Ms to remediate for issues identified during security assessment activities, including ongoing continuous monitoring. Of these open POA&Ms, 247 (or about 48 percent) were considered “high-risk” or “very high-risk.” While the Bureau established POA&Ms for addressing these identified security control weaknesses, it did not always complete remedial actions in accordance with its established deadlines. For example, of the 247 open “high-risk” or “very high-risk” POA&Ms we reviewed through March 2019, the Bureau identified 115 as being delayed. Further, 70 of the 115 had missed their scheduled completion dates by 60 or more days. In addition, the number of open “high-risk” or “very high-risk” POA&Ms that the Bureau identified as delayed has substantially increased since June 2018, as shown in figure 6. According to the Bureau, these POA&Ms were identified as delayed due to technical challenges or resource constraints to remediate and close them. However, without resolving identified vulnerabilities in a timely manner, the Bureau faces an increased risk, as continuing opportunities exist for unauthorized individuals to exploit these weaknesses and gain access to sensitive information and systems. The Bureau is working with federal and industry partners, including the Department of Homeland Security, to support the 2020 Census cybersecurity efforts. Specifically, the Bureau is working with DHS to ensure a scalable and secure network connection for the 2020 Census respondents (e.g., virtual Trusted Internet Connection with the cloud), improve its cybersecurity posture (e.g., improve risk management processes and procedures), and to strengthen its response to potential cyber threats (e.g., federal cyber incident coordination). Federal law describes practices for strengthening cybersecurity by documenting or tracking corrective actions. As previously mentioned, FISMA requires executive branch agencies to establish a process for planning, implementing, evaluating, and documenting remedial actions to address any deficiencies in their information security policies, procedures, and practices. GAO’s internal control standards also state that agencies should establish effective internal control monitoring that includes a process to promptly resolve the findings of audits and other reviews. Specifically, agencies should document and complete corrective actions to remediate identified deficiencies on a timely basis. This would include correcting identified deficiencies or demonstrating that the findings and recommendations do not warrant agency action. Since January 2017, DHS has been providing cybersecurity assistance (including issuing recommendations) to the Bureau in preparation for the 2020 Census, and the Bureau has reported making progress in addressing those recommendations. Specifically, DHS has been providing cybersecurity assistance to the Bureau in five areas: management coordination and executive support, including a cybersecurity threat intelligence and information sharing enhancement through, among other things, a DHS cyber threat briefing to the Bureau’s leadership; network and infrastructure security and resilience, including National Cybersecurity Protection System (also called EINSTEIN) support; incident response and management readiness through a Federal Incident Response Evaluation assessment; and risk management and vulnerability assessments on specific targets provided by the Bureau. In the last 2 years, as a result of these activities, DHS has provided 17 recommendations for the Bureau to strengthen its cybersecurity efforts. Among other things, the recommendations pertained to strengthening incident management capabilities, penetration testing and web application assessments of select systems, and phishing assessments to gain access to sensitive PII. Due to the sensitive nature of the recommendations, we are not identifying the specific recommendations or specific findings associated with them in this statement. As of February 2019, the Bureau had fully completed actions to address three recommendations, needed to further improve on actions taken for one recommendation it indicated had been completed, and needed to complete actions in progress for the remaining 13 recommendations (as summarized in table 3). However, the Bureau had not established a formal process for documenting, tracking, and completing corrective actions for all the recommendations provided by DHS. To the Bureau’s credit, it had incorporated the corrective actions associated with the three completed recommendations into its formal process used for tracking POA&Ms, which includes identifying remediation activities, resources required, milestones, and completion dates. The Bureau did not incorporate the remaining 14 recommendations into the POA&M process. Instead, in November 2018, the Bureau created an informal document to track the 17 DHS recommendations, but this document does not consistently include details such as the resources required, expected completion date, or whether the recommendations do not warrant agency action. Until the Bureau implements a formal process for tracking and implementing appropriate corrective actions to remediate identified cybersecurity weaknesses from DHS, and addresses the identified deficiencies, it faces an increased likelihood that these weaknesses will go uncorrected and may be exploited to cause harm to agency’s 2020 Census IT systems and gain access to sensitive respondent data. Implementing a formal process would also help to ensure that DHS’s efforts result in improvements to the Bureau’s cybersecurity posture. The Bureau faces other significant cybersecurity challenges in addition to those previously discussed. More specifically, we previously reported that the extensive use of IT systems to support the 2020 Census redesign may help increase efficiency, but that this redesign introduces critical cybersecurity challenges. These challenges include those related to the following: Phishing. We have previously reported that advanced persistent threats may be targeted against social media web sites used by the federal government. In addition, attackers may use social media to collect information and launch attacks against federal information systems through social engineering, such as phishing. Phishing is a digital form of social engineering that uses authentic-looking, but fake, emails, websites, or instant messages to get users to download malware, open malicious attachments, or open links that direct them to a website that requests information or executes malicious code. Phishing attacks could target respondents, as well as Bureau employees and contractors. The 2020 Census will be the first one in which respondents will be heavily encouraged to respond via the internet. This will likely increase the risk that cyber criminals will use phishing in an attempt to steal personal information. Disinformation from social media. We previously reported that one of the Bureau’s key innovations for the 2020 Census is the large-scale implementation of an internet self-response option. The Bureau is encouraging the public to use the internet self-response option through expanded use of social media. However, the public perception of the Bureau’s ability to adequately safeguard the privacy and confidentiality of the 2020 Census internet self-responses could be influenced by disinformation spread through social media. According to the Bureau, if a substantial segment of the public is not convinced that the Bureau can safeguard public response data against data breaches and unauthorized use, then response rates may be lower than projected, leading to an increase in cases for follow-up and subsequent cost increases. Ensuring that individuals gain only limited and appropriate access to 2020 Census data. The Bureau plans to enable a public- facing website and Bureau-issued mobile devices to collect PII (e.g., name, address, and date of birth) from the nation’s entire population— estimated to be over 300 million. In addition, the Bureau is planning to obtain and store administrative records containing PII from other government agencies to help augment information that enumerators did not collect. The number of reported security incidents involving PII at federal agencies has increased dramatically in recent years. Because of these challenges, we have recommended, among other things, that federal agencies improve their response to information security incidents and data breaches involving PII, and consistently develop and implement privacy policies and procedures. Accordingly, it will be important for the Bureau to ensure that only respondents and Bureau officials are able to gain access to this information, and enumerators and other employees only have access to the information needed to perform their jobs. Ensuring adequate control in a cloud environment. The Bureau has decided to use cloud solutions as a key component of the 2020 Census IT infrastructure. We have previously reported that cloud computing has both positive and negative information security implications and, thus, federal agencies should develop service-level agreements with cloud providers. These agreements should specify, among other things, the security performance requirements— including data reliability, preservation, privacy, and access rights— that the service provider is to meet. Without these safeguards, computer systems and networks, as well as the critical operations and key infrastructures they support, may be lost; information—including sensitive personal information—may be compromised; and the agency’s operations could be disrupted. Ensuring contingency and incident response plans are in place to encompass all of the IT systems to be used to support the 2020 Census. Because of the brief time frame for collecting data during the 2020 Census, it is especially important that systems are available for respondents to ensure a high response rate. Contingency planning and incident response help ensure that, if normal operations are interrupted, network managers will be able to detect, mitigate, and recover from a service disruption while preserving access to vital information. Implementing important security controls, including policies, procedures, and techniques for contingency planning and incident response, helps to ensure the confidentiality, integrity, and availability of information and systems, even during disruptions of service. Without contingency and incident response plans, system availability might be impacted and result in a lower response rate. The Bureau’s CIO has acknowledged these cybersecurity challenges and is working to address them, according to Bureau documentation. In addition, we have ongoing work looking at many of these challenges, including the Bureau’s plans to protect PII, use a cloud-based infrastructure, and recover from security incidents and other disasters. Since 2015, the Bureau has made progress in improving its ability to develop a reliable cost estimate. We have reported on the reliability of the $12.3 billion life-cycle cost estimate released in October 2015 and the $15.6 billion revised cost estimate released in October 2017. In 2016 we reported that the October 2015 version of the Bureau’s life-cycle cost estimate for the 2020 Census was not reliable. Specifically, we found that the 2020 Census life-cycle cost estimate partially met two of the characteristics of a reliable cost estimate (comprehensive and accurate) and minimally met the other two (well-documented and credible). We recommended that the Bureau take specific steps to ensure its cost estimate meets the characteristics of a high-quality estimate. The Bureau agreed and has taken action to improve the reliability of the cost estimate. In August 2018 we reported that while improvements had been made, the Bureau’s October 2017 cost estimate for the 2020 Census did not fully reflect all the characteristics of a reliable estimate. (See figure 7.) In order for a cost estimate to be deemed reliable as described in GAO’s Cost Estimating and Assessment Guide and thus, to effectively inform 2020 Census annual budgetary figures, the cost estimate must meet or substantially meet the following four characteristics: Well-Documented. Cost estimates are considered valid if they are well-documented to the point they can be easily repeated or updated and can be traced to original sources through auditing, according to best practices. Accurate. Accurate estimates are unbiased and contain few mathematical mistakes. Credible. Credible cost estimates must clearly identify limitations due to uncertainty or bias surrounding the data or assumptions, according to best practices. Comprehensive. To be comprehensive an estimate should have enough detail to ensure that cost elements are neither omitted nor double-counted, and all cost-influencing assumptions are detailed in the estimate’s documentation, among other things, according to best practices. The 2017 cost estimate only partially met the characteristic of being well- documented. In general, some documentation was missing, inconsistent, or difficult to understand. Specifically, we found that source data did not always support the information described in the basis of estimate document or could not be found in the files provided for two of the Bureau’s largest field operations: Address Canvassing and Non- Response Follow-Up. We also found that some of the cost elements did not trace clearly to supporting spreadsheets and assumption documents. Failure to document an estimate in enough detail makes it more difficult to replicate calculations, or to detect possible errors in the estimate; reduces transparency of the estimation process; and can undermine the ability to use the information to improve future cost estimates or even to reconcile the estimate with another independent cost estimate. The Bureau told us it would continue to make improvements to ensure the estimate is well- documented. The 2017 life-cycle cost estimate includes significantly higher costs than those included in the 2015 estimate. The largest increases occurred in the Response, Managerial Contingency, and Census/Survey Engineering categories. For example, increased costs of $1.3 billion in the response category (costs related to collecting, maintaining, and processing survey response data) were in part due to reduced assumptions for self- response rates, leading to increases in the amount of data collected in the field, which is more costly to the Bureau. Contingency allocations increased overall from $1.35 billion in 2015 to $2.6 billion in 2017, as the Bureau gained a greater understanding of risks facing the 2020 Census. Increases of $838 million in the Census/Survey Engineering category were due mainly to the cost of an IT contract for integrating decennial survey systems that was not included in the 2015 cost estimate. Bureau officials attribute a decrease of $551 million in estimated costs for Program Management to changes in the categorization of costs associated with risks. Specifically, in the 2017 version of the estimate, estimated costs related to program risks were allocated to their corresponding work breakdown structure (WBS) element. Figure 8 shows the change in cost by WBS category for 2015 and 2017. More generally, factors that contributed to cost fluctuations between the 2015 and 2017 cost estimates include: Changes in assumptions. Among other changes, a decrease in the assumed rate for self-response from 63.5 percent in 2015 to 60.5 percent in 2017 increased the cost of collecting responses from nonresponding housing units. Improved ability to anticipate and quantify risk. In general, contingency allocations designed to address the effects of potential risks increased overall from $1.3 billion in 2015 to $2.6 billion in 2017. An overall increase in IT costs. IT cost increases, totaling $1.59 billion, represented almost 50 percent of the total cost increase from 2015 to 2017. More defined contract requirements. Bureau documents described an overall improvement in the Bureau’s ability to define and specify contract requirements. This resulted in updated estimates for several contracts, including for the Census Questionnaire Assistance contract. However, while the Bureau has been able to better quantify risk; in August 2018 we also reported that the Secretary of Commerce included a contingency amount of about $1.2 billion in the 2017 cost estimate to account for what the Bureau refers to as “unknown unknowns.” According to Bureau documentation these include such risks as natural disasters or cyber attacks. The Bureau provides a description of how the risk contingency for “unknown unknowns” is calculated; however, this description does not clearly link calculated amounts to the risks themselves. Thus, only $14.4 billion of the Bureau’s $15.6 billion cost estimate has justification. According to Bureau officials, the cost estimate remains at $15.6 billion, but they are managing the 2020 Census at a lower level of funding—$14.1 billion and, at this time, do not plan to request funding for the $1.2 billion contingency fund for unknown unknowns or $369 million in funding for selected discrete program risks for what-if scenarios such as an increase in the wage rate or additional supervisors needed to manage field operations. Instead of requesting funding for these contingencies upfront the Bureau plans to work with OMB and Commerce to request additional funds, if the need arises. According to Bureau officials they anticipate that the remaining $1.1 billion in contingency funding included in the $14.1 billion will be sufficient to carry out the 2020 Census. In June 2016 we recommended the Bureau improve control over how risk and uncertainty are accounted for. This prior recommendation remains valid given the life-cycle cost estimate still includes the $1.2 billion unjustified contingency fund for “unknown unknowns”. Moreover, given the cost growth between 2015 and 2017 it will be important for the Bureau to monitor cost in real-time, as well as, document, explain and review variances between planned and actual cost. In August 2018 we reported that the Bureau had not been tracking variances between estimated life-cycle costs and actual expenses. Tools to track variance enable management to measure progress against planned outcomes and will help inform the 2030 Census cost estimate. Bureau officials stated that they already have systems in place that can be adapted for tracking estimated and actual costs. We will continue to monitor the status of the tracking system. According to Bureau officials it plans to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement our recommendation related to the cost estimate. The difficulties facing the Bureau’s preparation for the decennial census in such areas as planning and testing; managing and overseeing IT programs, systems, and contractors supporting the enumeration; developing reliable cost estimates; prioritizing decisions; managing schedules; and other challenges, are symptomatic of deeper organizational issues. Following the 2010 Census, a key lesson learned for 2020 that we identified was ensuring that the Bureau’s organizational culture and structure, as well as its approach to strategic planning, human capital management, internal collaboration, knowledge sharing, capital decision- making, risk and change management, and other internal functions are aligned toward delivering more cost-effective outcomes. The Bureau has made improvements over the last decade, and continued progress will depend in part on sustaining efforts to strengthen risk management activities, enhancing systems testing, bringing in experienced personnel to key positions, implementing our recommendations, and meeting regularly with officials from its parent agency, Commerce. Going forward, we have reported that the key elements needed to make progress in high-risk areas are top-level attention by the administration and agency officials to (1) leadership commitment, (2) ensuring capacity, (3) developing a corrective action plan, (4) regular monitoring, and (5) demonstrated progress. Although important steps have been taken in at least some of these areas, overall, far more work is needed. We discuss three of five areas below. The Secretary of Commerce has successfully demonstrated leadership commitment. For example, the Bureau and Commerce have strengthened this area with executive-level oversight of the 2020 Census by holding regular meetings on the status of IT systems and other risk areas. In addition, in 2017 Commerce designated a team to assist senior Bureau management with cost estimation challenges. Moreover, on January 2, 2019, a new Director of the Census Bureau took office, a position that had been vacant since June 2017. With regard to capacity, the Bureau has improved the cost estimation process of the decennial when it established guidance including: roles and responsibilities for oversight and approval of cost estimation processes, procedures requiring a detailed description of the steps taken to produce a high-quality cost estimate, and a process for updating the cost estimate and associated documents over the life of a project. However, the Bureau continues to experience skills gaps in the government program management office overseeing the $886 million contract for integrating the IT systems needed to conduct the 2020 Census. Specifically, as of February 2019, 15 of 44 positions in this office were vacant. For the monitoring element, we found to track performance of decennial census operations, the Bureau relied on reports to track progress against pre-set goals for a test conducted in 2018. According to the Bureau, these same reports will be used in 2020 to track progress. However, the Bureau’s schedule for developing IT systems during the 2018 End-to-End test experienced delays that compressed the time available for system testing, integration testing, and security assessments. These schedule delays contributed to systems experiencing problems after deployment, as well as cybersecurity challenges. In the months ahead, we will continue to monitor the Bureau’s progress in addressing each of the five elements essential for reducing the risk to a cost-effective enumeration. Over the past several years we have issued numerous reports that underscored the fact that, if the Bureau was to successfully meet its cost savings goal for the 2020 Census, the agency needed to take significant actions to improve its research, testing, planning, scheduling, cost estimation, system development, and IT security practices. As of April 2019, we have made 97 recommendations related to the 2020 Census. The Bureau has implemented 72 of these recommendations, 24 remain open, and one recommendation was closed as not implemented. Of the 24 open recommendations, 11 were directed at improving the implementation of the innovations for the 2020 Census. Commerce generally agreed with our recommendations and is taking steps to implement them. Moreover, in April 2018 we designated 15 recommendations as “priority.” Priority recommendations are those recommendations that we believe warrant priority attention from heads of key departments and agencies. Eight of these 15 priority recommendations have been closed as implemented over the past year. On July 19, 2018, in response to our April 2018 letter calling his attention to our priority recommendations, the Commerce Secretary concurred that there was still much work to be done, and that the number of our priority recommendations concerning the 2020 Census was reflective of Commerce’s focus on ensuring a successful census in 2020. On April 23, 2019, we sent an updated priority recommendation letter to the Commerce Secretary that included five new recommendations from our recent work and also reflected the department’s progress on implementing past recommendations. We believe that attention to these recommendations is essential for a cost-effective enumeration. The recommendations included implementing reliable cost estimation and scheduling practices in order to establish better control over program costs, as well as taking steps to better position the Bureau to develop an internet response option for the 2020 Census. In addition to our recommendations, to better position the Bureau for a more cost-effective enumeration, on March 18, 2019, we met with OMB, Commerce, and Bureau officials to discuss the Bureau’s progress in reducing the risks facing the census. We also meet regularly with Bureau officials and managers to discuss the progress and status of open recommendations related to the 2020 Census, which has resulted in Bureau actions in recent months leading to closure of some recommendations. We are encouraged by this commitment by Commerce and the Bureau in addressing our recommendations. Implementing our recommendations in a complete and timely manner is important because it could improve the management of the 2020 Census and help to mitigate continued risks. In conclusion, while the Bureau has made progress in revamping its approach to the census, it faces considerable challenges and uncertainties in implementing key cost-saving innovations and ensuring they function under operational conditions; managing the development and testing of its IT systems; ensuring the cybersecurity of its systems and data; and developing a quality cost estimate for the 2020 Census and preventing further cost increases. For these reasons, the 2020 Census is a GAO high-risk area. Regarding cybersecurity, the Bureau’s involvement of DHS to improve its cybersecurity posture, including cyber threat briefings and vulnerability assessments, is a positive step forward. However, the Bureau’s corrective actions to address its high-risk and very high-risk security weaknesses are frequently delayed—often for months—which increases the risk that these weaknesses could be exploited to cause harm to the agency’s systems. In addition, the Bureau’s process for addressing DHS’s cybersecurity recommendations has shortcomings, which increases the risk that the underlying deficiencies identified by DHS may be exploited to gain access to the Bureau’s systems and sensitive data. Going forward, continued management attention and oversight will be vital for ensuring that risks are managed, preparations stay on track, and the Bureau is held accountable for implementing the enumeration, as planned. Without timely and appropriate actions, the challenges previously discussed could adversely affect the cost, accuracy, schedule, and security of the enumeration. We will continue to assess the Bureau’s efforts and look forward to keeping Congress informed of the Bureau’s progress. We are making the following two recommendations to Commerce: The Secretary of Commerce should direct the Director of the Census Bureau to direct the Census Bureau’s CIO to take steps to ensure that identified corrective actions for cybersecurity weaknesses are implemented within prescribed time frames. (Recommendation 1) The Secretary of Commerce should direct the Director of the Census Bureau to direct the Bureau’s CIO to implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity weaknesses identified by DHS, and expeditiously address the identified deficiencies. (Recommendation 2) Chairman Serrano, Ranking Member Aderholt, and Members of the Subcommittee, this completes our prepared statement. We would be pleased to respond to any questions that you may have. If you have any questions about this statement, please contact Robert Goldenkoff at (202) 512-2757 or by email at goldenkoffr@gao.gov or Nick Marinos at (202) 512-9342 or by email at marinosn@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Other key contributors to this testimony include Jon Ticehurst (Assistant Director); Ty Mitchell (Assistant Director); Lisa Pearson (Assistant Director); Andrea Starosciak (Analyst in Charge); Christopher Businsky, Rebecca Eyler, Scott Pettis, Lindsey Pilver; Kate Sharkey; Kevin R. Smith; Umesh Thakkar; and Tim Wexler. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "The Bureau, a component of the Department of Commerce (Commerce), is responsible for conducting a complete and accurate decennial census of the U.S. population. The decennial census is mandated by the Constitution and provides vital data for the nation. A complete count of the nation's population is an enormous undertaking as the Bureau seeks to control the cost of the census, implement operational innovations, and use new and modified IT systems. In recent years, GAO has identified challenges that raise serious concerns about the Bureau's ability to conduct a cost-effective count. For these reasons, GAO added the 2020 Census to its High-Risk list in February 2017. GAO was asked to testify about the reasons the 2020 Census remains on the High-Risk List and the steps the Bureau needs to take to mitigate risks to a successful census. To do so, GAO summarized its prior work regarding the Bureau's planning efforts for the 2020 Census. GAO also included preliminary observations from its ongoing work examining the IT systems readiness and cybersecurity for the 2020 Census. This information is related to, among other things, the Bureau's progress in developing and testing key systems and the status of cybersecurity risks. The 2020 Decennial Census is on GAO's list of high-risk programs primarily because the Census Bureau (Bureau) (1) is using innovations that are not expected to be fully tested, (2) continues to face challenges in implementing information technology (IT) systems, and (3) faces significant cybersecurity risks to its systems and data. Although the Bureau has taken initial steps to address risk, additional actions are needed as these risks could adversely impact the cost, quality, schedule, and security of the enumeration. Innovations : The Bureau is planning several innovations for the 2020 Census, including allowing the public to respond using the internet. These innovations show promise for controlling costs, but they also introduce new risks, in part, because they have not been used extensively, if at all, in earlier enumerations. As a result, testing is essential to ensure that key IT systems and operations will function as planned. However, citing budgetary uncertainties, the Bureau scaled back operational tests in 2017 and 2018, missing an opportunity to fully demonstrate that the innovations and IT systems will function as intended during the 2020 Census. To manage risk to the census, the Bureau has developed hundreds of mitigation and contingency plans. To maximize readiness for the 2020 Census, it will also be important for the Bureau to prioritize among its mitigation and contingency strategies those that will deliver the most cost-effective outcomes for the census. Implementing IT systems : The Bureau plans to rely heavily on IT for the 2020 Census, including a total of 52 new and legacy IT systems and the infrastructure supporting them. To help improve its implementation of IT, in October 2018, the Bureau revised its systems development and testing schedule to reflect, among other things, lessons learned during its 2018 operational test. However, GAO's ongoing work has determined that the Bureau is at risk of not meeting near-term IT system development and testing schedule milestones for two upcoming 2020 Census operational deliveries, including address canvassing (i.e., verification of the location of selected housing units). These schedule management challenges may compress the time available for the remaining system development and testing, and increase the risk that systems will not function as intended. It will be important that the Bureau effectively manages IT implementation risk to ensure that it meets near-term milestones for system development and testing, and that it is ready for the major operations of the 2020 Census. Cybersecurity : The Bureau has established a risk management framework that requires it to conduct a full security assessment for each system expected to be used for the 2020 Census and, if deficiencies are identified, to determine the corrective actions needed to remediate those deficiencies. As of March 2019, the Bureau had over 500 corrective actions from its security assessments that needed to be addressed, including nearly 250 that were considered “high-risk” or “very high-risk.” However, of these 250 corrective actions, the Bureau identified 115 as being delayed. Further, 70 of the 115 were delayed by 60 or more days. According to the Bureau, these corrective actions were delayed due to technical challenges or resource constraints. Resolving identified vulnerabilities within the Bureau's established time frames can help reduce the risk that unauthorized individuals may exploit weaknesses to gain access to sensitive information and systems. To its credit, the Bureau is also working with the Department of Homeland Security (DHS) to support its 2020 Census cybersecurity efforts. For example, DHS is helping the Bureau ensure a scalable and secure network connection for the 2020 Census respondents and to strengthen its response to potential cyber threats. During the last 2 years, as a result of these activities, the Bureau has received 17 recommendations from DHS to improve its cybersecurity posture. However, the Bureau lacks a formal process for tracking and completing corrective actions for these recommendations which would help to ensure that DHS's efforts result in improvements to the Bureau's cybersecurity posture. In addition to addressing risks which could affect innovations and the security of the enumeration, the Bureau has the opportunity to improve its cost estimating process for the 2020 Census, and ultimately the reliability of the estimate itself, by reflecting best practices. In October 2017, the 2020 Census life-cycle cost estimate was updated and is now projected to be $15.6 billion, a more than $3 billion (27 percent) increase over its earlier estimate. GAO reported in August 2018 that although the Bureau had taken steps to improve its cost estimation process for 2020, it needed to implement a system to track and report variances between actual and estimated cost elements. According to Bureau officials, they plan to release an updated version of the 2020 Census life-cycle estimate in the spring of 2019. To ensure that future updates to the life-cycle cost estimate reflect best practices, it will be important for the Bureau to implement GAO's recommendation related to the cost estimate. Over the past decade, GAO has made 97 recommendations specific to the 2020 Census to help address these risks and other concerns. Commerce has generally agreed with these recommendations and has taken action to address many of them. However, as of April 2019, 24 of the recommendations had not been fully implemented. Of the 24 open recommendations, 11 were directed at improving the implementation of the innovations for the 2020 Census. To ensure a cost-effective enumeration, it will be important for the Bureau to address these recommendations. GAO is making two recommendations to the Bureau to (1) better ensure that cybersecurity weaknesses are addressed within prescribed time frames, and (2) improve its process for addressing cybersecurity weaknesses identified by DHS.", "document_type": "gao"}
{"report": "AFSOC is the Air Force component of U.S. Special Operations Command and is responsible for providing Air Force capabilities and forces to support special operations activities. Special operations are operations requiring unique modes of employment, tactical techniques, equipment, and training often conducted in hostile, denied, or politically sensitive environments. Demand for AFSOC capabilities, including those provided by the ARC, is identified as part of the Department of Defense’s (DOD) Global Force Management process for assigning and allocating forces to meet global requirements. This process allows the Secretary of Defense to strategically manage forces—including the military services, conventional forces, and special operations forces—to support strategic guidance and meet combatant commander requirements. As part of this process, the Joint Staff validates requirements for forces. U.S. Special Operations Command, as the joint force provider, is responsible for identifying and recommending forces to support special operations requirements. U.S. Special Operations Command coordinates with its service component commands, including AFSOC, to determine which capabilities and specific units are best suited to meet validated requirements for special operations capabilities. After receiving these requirements, AFSOC considers its available options to provide the capabilities needed. This consideration includes reviewing active duty and reserve component units that provide specific sets of capabilities, such as intelligence, surveillance, and reconnaissance; personnel recovery; and radio and television broadcasting for psychological operations. If AFSOC, in conjunction with Headquarters Air Force, determines that the best solution to meet a requirement is to use capabilities from the ARC, it can rely on either volunteerism or involuntary recall to active duty—referred to as involuntary mobilization—to activate the needed forces. These two types of activation are described below. Volunteerism. The Secretary of the Air Force is authorized to activate ARC personnel on active duty with the consent of those individuals; however, the consent of the state governor is required for the voluntary activation of ANG personnel. According to Joint Publication 4-05, Joint Mobilization Planning (Feb. 21, 2014), volunteerism is important because it enables a service to fill required positions with reserve component personnel without its counting against the statutory limits related to involuntary mobilization. However, the guidance also states that volunteerism should be used judiciously, because excessive use of volunteers removes personnel from reserve component units, which could result in a reduction of the unit’s readiness in the event of unit mobilization. Another factor that mobilization planners must take into account is dwell time policy in relation to deployments. Furthermore, the Air Force has established specific goals for managing the operational tempo of its forces, and planners need to consider this factor as well. Involuntary Mobilization. Any unit or individual of a reserve component may be ordered to active duty under multiple mobilization statutory authorities under Title 10 of the U.S. Code that vary regarding the number of personnel who can be mobilized, the duration of the mobilization, and the approval authority. For example, section 12304 of Title 10, U.S. Code, provides authority to the President to involuntarily activate up to 200,000 members of the selected reserve for up to 365 days to augment active forces for an operational mission or in response to certain emergencies. AFSOC is required to follow Air Force guidance for accessing ARC units and personnel. The Air Force guidance implements DOD Instruction 1235.12, Accessing the Reserve Components (RC), which establishes the overarching policies and procedures for accessing the reserve components for all military departments. When AFSOC officials determine that ARC capabilities are the appropriate option for a given special operation requirement, their access to the reserve component is governed by Air Force Instruction 10-301, Managing Operational Utilization Requirements of the Air Reserve Component Forces. This instruction outlines roles and responsibilities for managing requirements for reserve component capabilities accessed through both involuntary mobilizations and volunteerism. Among other things, it establishes that AFSOC use the reserve component in a cyclical or periodic manner that provides predictability to ARC individuals, to the individual’s employer, and to the combatant command receiving the capabilities. The process for accessing the reserve component through involuntary mobilization is further outlined in Air Force Instruction 10-402, Mobilization Planning. This guidance implements and expands on the specific timelines for particular milestones during the mobilization process established in DOD Instruction 1235.12, such as the identification of the types of capabilities required and of the unit responsible for providing them. These timelines vary, depending on whether the requirement for capabilities is known well ahead of mobilization—a rotational, or preplanned, requirement—or, conversely, is emergent. Rotational or preplanned requirements: AFSOC must provide the reserve component with a request for particular capabilities at least 330 days prior to the mobilization, to allow ANG or AFR officials to identify the specific individuals who are available to support the request. Air Force guidance communicates the time frames in which reserve component personnel are to receive their mobilization orders. Specifically, AFSOC is required to submit requests to mobilize the ARC to Air Force headquarters to provide the Secretary of the Air Force enough time to approve the request; and then to communicate with ANG and AFR in sufficient time to provide personnel with their mobilization orders at least 180 days prior the start date of rotational or preplanned requirements. Emergent requirements: AFSOC is required to submit requests so that personnel receive notification at least 120 days prior to the mobilization date. In comparison, there are no specific time frames in the guidance for accessing the reserve component through volunteerism. The guidance generally discusses volunteerism as an approach that allows for ARC personnel to quickly respond to requests for forces. AFSOC officials told us that they have observed an increase in requests from ARC units to use involuntary mobilizations rather than rely on the use of volunteerism, and that they anticipate this trend to continue, since involuntary mobilizations afford more predictability than do voluntary deployments. As such, involuntary mobilizations help personnel manage the frequency of time spent away from home and maximize their access to military medical and retirement benefits. Specifically: Managing time away from home: Air Force guidance limits the frequency of involuntary mobilizations for an individual to a standard of five periods of time spent at home for every one period spent involuntarily mobilized. For example, an individual involuntarily mobilized for 90 days would not be available to AFSOC for involuntary mobilization for another 450 days after the individual’s return. This provides ARC personnel with some assurance that they will not deploy again for a specific window of time, unless they volunteer to do so. We have previously reported on challenges faced by DOD in setting policies to establish thresholds and track the total time individual servicemembers may be away from home, including for exercises, training, and deployment. We found that, with the exception of the Navy and U.S. Special Operations Command, the services either were not enforcing or had not established specific and measurable thresholds in their policies. Additionally, we found that DOD lacked reliable data for tracking the total time individual servicemembers spent away from home. We recommended that DOD clarify its policy to include specific and measurable department-wide thresholds and take steps to emphasize the collection of complete and reliable data. DOD concurred with our recommendation. Medical and retirement benefits: Involuntary mobilization can also maximize the window during which personnel receive medical and retirement benefits. All ARC personnel are eligible for benefits up to 180 days prior to their involuntary mobilization or voluntary deployment. However, to receive these benefits the individual must also have been issued mobilization orders identifying the mobilization date or, for a volunteer, the deployment date. As previously discussed, Air Force guidance identifies notification time frames designed to provide ARC personnel involuntarily mobilized to support rotational or preplanned requirements with their orders at least 180 days prior to the mobilization start date. This time frame allows personnel to receive these benefits for the entire time they are potentially eligible. By contrast, personnel who are involuntarily mobilized for emergent requirements are supposed to receive their orders with at least 120 days’ notice, and, according to AFSOC officials, volunteers can receive as little as one week’s notice. As a result, personnel may prefer involuntary mobilization, as it generally results in their receiving military medical and retirement benefits for more time than they would have received them if they had volunteered to deploy. AFSOC has mobilization processes that follow Air Force guidance, but it faces difficulties in implementing these processes. Specifically, we found AFSOC faces challenges in (1) consistently providing ARC units and personnel with timely notifications regarding anticipated demand for their capabilities; (2) coordinating with ANG and AFR commands on potential requirements for ARC capabilities; and (3) sharing reliable information about mission requirements and resources with ARC units and personnel. The notifications that AFSOC gives ARC units or personnel of anticipated demand for their capabilities generally do not meet the notification time frames associated with involuntary mobilizations for non-emergent requirements, thereby impeding ARC units’ ability to prepare for deployments. Officials at three of the four reserve component units we spoke with told us that AFSOC routinely provides units with limited notice of requirements for capabilities, even though they predominately support preplanned requirements that are known to AFSOC well in advance of their execution. Therefore, the officials stated, AFSOC should have sufficient time to identify and communicate the requirement for ARC capabilities to reserve component units to enable them to meet required time frames (for example, no less than 180 days in the case of non- emergent requirements). However, according to these officials, they routinely receive 90 or fewer days’ notice of when they are expected to provide capabilities for a given requirement. Due to this truncated time frame, the requirement must either be staffed using volunteers or receive approval from the Secretary of Defense to involuntarily mobilize reserve component personnel with limited notice. Receiving limited notification can create challenges for the ARC unit providing the capabilities for AFSOC requirements. For example, officials at one unit we spoke with stated that they requested that AFSOC provide at least 9 months’ notice prior to a mobilization to ensure that personnel received adequate training, because the unit provides a range of specialized capabilities. However, officials stated that what they generally received was 60 to 90 days’ notice, and that within this time frame the unit faced challenges in obtaining access to the equipment needed to train personnel for specific missions. Officials at another unit we spoke with stated that since 2015 they had received 60 or fewer days’ notice for their support of AFSOC requirements, one of which was an involuntary mobilization supporting a non-emergent requirement. An official explained that while AFSOC’s communication of requirements and planning of involuntary mobilizations has improved over time, the unit expects that orders for its next mobilization will be provided with fewer than 180 days’ notice. The official explained that in addition to limiting ARC personnel’s access to medical and retirement benefits, the abbreviated time frames make it difficult for them to coordinate their absences with their civilian employers. AFSOC officials acknowledged that they have been late to notify units in the past and identified this as an area in which they are working to improve. The officials explained that in some instances the late notification is a result of factors outside of AFSOC’s control, such as instances in which the Secretary of Defense’s process for approving requirements is delayed. We identified concerns regarding AFSOC’s practice of communicating directly with reserve component units, rather than formally coordinating with ANG and AFR commands, to develop potential requests for ARC unit capabilities. For example, AFR officials stated that geographic proximity to AFSOC frequently results in one unit’s receiving informal requests from AFSOC for its capabilities. That unit provides remotely piloted aircraft capabilities, which do not require personnel to deploy overseas. Officials explained that AFSOC will contact that unit directly to request capabilities to supplement the active duty personnel completing the same mission, but commonly AFSOC will provide only a few days’ notice prior to the requirement. According to these officials, personnel generally respond to these requests by volunteering with limited advance notice. AFSOC officials stated that communicating informally with the units to determine the availability of their personnel and capabilities enables AFSOC to expedite the identification of personnel potentially available to meet a requirement. However, headquarters officials for both ANG and AFR—who are responsible for identifying the specific personnel available to meet a requirement—stated that these indirect communications impede their ability to strategically manage and appropriately resource units. For example, headquarters AFR officials identified an instance in which changes to a unit’s anticipated contribution to a mission were arranged with the unit, but not with officials at their higher headquarters at the AFR. The requirement was originally for the AFR unit to supplement an active duty unit already providing the capability for AFSOC, but was expanded to require the AFR unit to have sole responsibility for providing part of the capability. The absence of direct communication and formal coordination between AFR headquarters and AFSOC during this expansion led to differing expectations regarding the number of AFR personnel needed to provide the capability required. AFR officials stated that as a result of limited transparency into future requirements for that unit, AFR headquarters did not request the appropriate level of funding for the unit, thereby limiting the resources available to support the requirement. AFSOC officials acknowledged that their use of informal communication with units instead of coordinating with ANG and AFR headquarters is not an ideal approach and could be improved. We identified concerns regarding the frequency with which AFSOC has changed the information it has communicated to ARC units about anticipated requirements, thereby creating unpredictability and impeding those units’ ability to train for and ultimately provide the capabilities needed to execute those requirements. While requirements may change subject to combatant command needs, AFSOC’s availability to proactively coordinate with both the combatant command and the ARC has been limited. AFSOC officials stated that, due to their limited capacity to manage involuntary mobilizations, they are often dedicating time only to those mobilizations that require urgent attention, as opposed to refining the details of the requirement and coordinating with the units in advance of the mobilization. ARC officials stated that the unpredictability resulting from the changes that occur can introduce challenges to the units’ ability to execute requirements. For example, officials at one unit stated that the location of a previous requirement changed at least three times in the 60 days preceding its involuntary mobilization. Officials explained that changes to the location of the requirement meant that the capabilities required by AFSOC also changed, because the unit provides intelligence, surveillance, and reconnaissance capabilities that need to be supported by specific communications equipment. Depending on the location, this equipment may already be in place, or it may be that the unit must bring it with them. In a different instance, the same unit arrived at a location to provide its intelligence, surveillance, and reconnaissance capabilities and found that the location lacked the communications equipment the unit needed to effectively use its capabilities. Further, ARC officials explained that changes regarding what capabilities are needed can create training challenges unique to the reserve component. ARC unit officials explained that while reserve component personnel maintain a standard level of readiness at all times, deployments may require them to train to a specific skill set to meet a mission requirement. For example, special tactics squadrons supporting AFSOC requirements can support three different mission sets, each of which may require specialized training to prepare for a specific mission, according to unit officials. Given the nature of the reserve component, these personnel have to complete this training during the limited windows of time in which they are called in from their full-time civilian jobs. As a result, the ARC has limited flexibility in responding to changes in training requirements. AFSOC officials acknowledged that the ARC can face challenges in meeting training requirements and that the advanced planning associated with involuntary mobilizations can help ensure that units have enough time to meet training requirements. Other Air Force entities that provide ARC capabilities to meet Air Force requirements through mobilization have established alternative approaches to initiating, planning, and coordinating their respective requirements for reserve component capabilities. Specifically, officials from Air Combat Command and Air Mobility Command, which are Air Force components similar to AFSOC regarding mobilization of ARC units, described entities established within their operations departments to coordinate with the ARC when implementing the involuntary mobilization process. These entities each consist of four to five individuals who are tasked on a full-time basis with ensuring that the reserve components are utilized in a predictable manner. The efforts of these entities include coordinating with the ARC to create plans that cover at least 2 years of anticipated rotational and preplanned requirements. While Air Combat Command and Air Mobility Command officials stated that they are responsible for coordinating a larger number of mobilizations than AFSOC coordinates, they noted that all three follow the same Air Force guidance with regard to the involuntary mobilization process. Officials from an ARC personnel recovery unit that supports Air Combat Command missions highlighted the benefits of the predictability that comes from Air Combat Command’s planning efforts. According to those officials, anticipated mobilizations are communicated to them in a schedule that covers a span of 5 years. More than a year before the unit is scheduled to involuntarily mobilize, Air Combat Command communicates the specifics of the requirement for the mission. The officials stated that, in their experience, these details rarely change once they have been communicated to the unit. By contrast, as previously discussed, we spoke with officials from an ARC special tactics squadron that provides AFSOC with capabilities similar to those of the personnel recovery unit described above, who stated that they regularly receive only 60-90 days’ notice prior to being deployed. They stated that they face difficulties in adequately training personnel to provide capabilities within these time frames. AFSOC officials stated that this issue is driven in part by the fact that units coordinate directly with requesting commands to fill their desired requirements. According to AFSOC officials, AFSOC does not have a headquarters entity dedicated to managing the planning, coordination, and execution of reserve component capabilities because, until recently, AFSOC did not use its reserve components to support ongoing missions to the extent that they do today. As a result, it was not considered necessary to have an organizational entity dedicated to managing involuntary mobilizations. Instead, AFSOC assigned the roles and responsibilities associated with initiating, planning, and coordinating ARC mobilizations within its overall process for managing AFSOC’s assignment and allocation of forces. AFSOC and ARC officials stated that under this process, a single individual at AFSOC is responsible for managing the involuntary mobilizations as a secondary duty. AFSOC officials stated that, given the scope of other assigned responsibilities, this individual focuses on managing involuntary mobilizations about half of one day in a work week. According to the officials, having a limited staff dedicated to initiating, planning, and coordinating involuntary mobilizations results in AFSOC’s responding to issues as they become urgent and impedes its ability to utilize the ARC in a predictable and stable manner. AFSOC officials also stated that the shift to using the ARC to support AFSOC’s steady state requirements, along with the increasing use of involuntary mobilizations to access ARC capabilities, have exposed the limitations of their capacity to manage involuntary mobilizations. These officials added that creating a more robust organizational capacity to manage the involuntary mobilization of the reserve component could counteract some of the challenges they have experienced in providing timely notification to ARC units, directly coordinating with ANG and AFR commands, and identifying and communicating reliable information about requirements to ARC units. AFSOC officials attribute the challenges faced in implementing AFSOC’s involuntary mobilization processes to the absence of adequate capacity to manage involuntary mobilizations. Specifically, they acknowledged that with additional capacity they would be better positioned to undertake the efforts needed to (1) provide more timely notification to ARC units, (2) coordinate with ANG and AFR commands, and (3) increase communication with the commands generating requirements. While officials acknowledged that some last-minute changes are unavoidable, they told us that having more personnel dedicated to AFSOC’s mobilization process could potentially lead to having more timely notifications or better indications of imminent changes. Further, some factors that can affect the involuntary mobilization process fall outside of AFSOC’s control, such as delays in the decision making process at the Secretary of Defense level and changes in combatant commander requirements. Although AFSOC cannot control all factors that affect involuntary mobilization of the ARC, increasing its capacity to manage involuntary mobilizations would improve its ability to anticipate and proactively address the challenges introduced by external factors. AFSOC officials stated that in recognition of this need, the command’s operations center has submitted multiple requests for additional resources to the headquarters in order to create a more robust organizational capacity to manage the involuntary mobilization of the reserve component. For example, the request submitted in January 2019 stated that AFSOC currently does not provide the support and guidance that ARC units need to properly execute the involuntary mobilization process. The request sought one additional full-time position dedicated to managing involuntary mobilizations and coordinating involuntary mobilizations with the ARC. Although AFSOC officials told us that the request was validated by AFSOC leadership, the validation of a request does not ensure that it will receive funding. After competing against other funding requests from other Air Force components, the Financial Management Board did not fund the position in fiscal years 2018 or 2019 because those other requests received higher priority. As an alternative to the full-time position requested by the operations center, AFSOC officials identified ongoing efforts to coordinate with the ANG that would result in the ANG’s allocating personnel to fill a temporary position at AFSOC. The individual in this position would be responsible for supporting the mobilization process. AFSOC officials stated that such an arrangement would help address the capacity challenges they currently face, but also noted that it would be a short-term solution, and highlighted that the individual filling the position would need to be familiar with AFSOC, ANG, and AFR processes to execute his or her duties. In addition, AFSOC officials could consider realigning existing capacity within the command to directly address the limited capacity to manage involuntary mobilizations. However, AFSOC officials emphasized that the command as a whole currently operates with limited capacity. In the absence of the Air Force developing additional AFSOC organizational capacity dedicated to the planning, coordination, and execution of involuntary mobilizations, AFSOC will continue to be impeded in its ability to manage involuntary mobilizations in accordance with Air Force guidance, including providing the notice required to access the ARC through involuntary mobilization in support of preplanned or rotational requirements. Additionally, at its current capacity AFSOC will likely face increasing challenges in providing timely notification to ARC units, coordinating with ANG and AFR commands, and enhancing communication with the commands generating requirements to help solidify mission specifics, as the number of involuntary mobilizations quadruple by 2021, as estimated by AFSOC officials. As a result, units may not be fully prepared to support requirements or able to effectively conduct their mission once in theater. Further, AFSOC will continue to be impeded in coordinating with ANG and AFR commands in a manner that enables the ARC to strategically manage and resource units in support of AFSOC’s requirements. While the Air Force’s force-generation model provides the ARC with a 24- month picture of the units it anticipates will be used to meet potential Air Force-wide deployments, the ARC does not have a comparable model with information on which ARC units could be used to support AFSOC requirements for special operations activities. According to officials, the ARC does not have a force-generation model for two reasons. First, while the Air Force model works for Air Force-wide requirements, it does not apply to special operations-specific requirements because they are unique to the Air Force’s special operations component, AFSOC. According to AFSOC officials, their command deploys units and personnel differently from typical Air Force units in order to maximize the number of requirements they can support with a smaller force. Second, the ARC has historically supported special operations activities using volunteerism, which is much more flexible than involuntary mobilization and requires less upfront planning or notification. As a result, ARC officials did not feel the need to develop a force-generation model for special operations requirements. ANG and AFR officials told us that ARC units will sometimes keep a unit-level schedule of their potential deployments, but that information is not available in a consolidated or consistent format. AFSOC officials added that any force-generation model for special operations should consider the limited capacity of some special operations capabilities. Officials stated that some capabilities in the ARC are limited to one unit, which results in AFSOC deploying parts of units rather than the whole unit to cover more requirements. ANG and AFR officials agreed that a force-generation model regarding future deployments could help identify which ARC units would be susceptible to deploy during a given period of time, which would be beneficial for planning ARC deployments. Consolidated information on potential unit deployments would provide units with advanced notification, making it easier to accomplish deployment preparation activities and helping ARC personnel make arrangements for their potential deployments. For example, ANG officials told us that advanced notification to units can give the ARC more time to incorporate needed training into drill training. Furthermore, unit personnel would also have more time to make arrangements with civilian employers or in their personal lives, making their transition to active duty easier and making it more likely that they will view mobilizations favorably in the future. Additionally, these officials stated that, with such a model, ANG and AFR could more easily identify and communicate which ARC units would be available for mobilization to support special operations activities. AFSOC officials stated that, in turn, this could provide AFSOC with more certainty that it would have access to ARC forces when needed. According to ANG and AFR officials, AFSOC officials have expressed some concerns about whether their command will have access to ARC forces. Specifically, since a substantial part of the total Air Force capability resides in the ARC, AFSOC officials are not certain that the capacity of ARC units supporting special operations will be able to meet future requirements. The officials added that by identifying units or individuals susceptible for deployment in advance, AFSOC would have more confidence in the ARC’s ability to support the command’s requirements. According to Air Force guidance, a predictable force-generation model is used to ensure proper force readiness and rapid responses to emerging crises. Specifically, Air Force Instruction 10-401, Air Force Operations Planning and Execution, calls for the Air Force and its components, including the ANG and AFR, to manage the deployment of its forces in order to meet global requirements while maintaining the highest possible level of overall readiness. The instruction calls for the Air Force to accomplish this task by establishing a force-generation model that can be used to manage the rhythm of force deployments to meet global combatant command requirements. The intent of the force-generation model is to establish a predictable, standardized pattern to ensure that forces are properly organized, trained, equipped, and ready to sustain capabilities while rapidly responding to emerging crises. ANG officials told us that they have taken some initial steps to create a force-generation model and consolidate the various unit-level schedules of ARC forces supporting special operations activities. Specifically, the ANG advisor to AFSOC was developing a consolidated schedule of ARC units intended for use by AFSOC to identify ANG units that could mobilize to support AFSOC requirements. However, according to AFSOC officials, the ANG advisor was expected to retire soon, and we found that ANG headquarters officials were not aware of this effort, and there were no plans to institutionalize it. AFR officials were likewise not aware of any similar effort to consolidate schedules for their units’ different capabilities to support special operations activities. Without having a method for providing consolidated information on reserve component units that are available for deployment, the ARC will not have the information it needs to successfully plan its deployments, or easily identify and communicate to AFSOC which of its units are or will be available for mobilization. Furthermore, AFSOC officials may continue to have concerns that they will not have access to high demand ARC capabilities to deploy under a mobilization. According to officials, although ANG and AFR units have a general understanding as to how many volunteers they have supporting special operations requirements at the unit level, the ANG and AFR lack a mechanism for tracking volunteer deployment rates across the ARC. Specifically, information on reserve components’ volunteer deployments is not available in a form that facilitates tracking in order to understand rates of volunteering or the contributions made by the ARC in supporting special operations activities, according to officials. The Air Force requires the ANG and AFR to track key data to ensure proper management of ARC utilization and mission execution. Specifically, Air Force Instruction 10-301, Managing Operational Utilization Requirements of the Air Reserve Component Forces, calls for the Air Force to identify full mission requirements for ARC utilization by collecting, tracking, and organizing relevant data and prioritizing requirements. It also states that these data are intended to aid in allocating funding, matching units to requirements, executing requirements, assessing each step of the process, and forecasting future requirements. Additionally, Standards for Internal Control in the Federal Government establishes that management should obtain relevant data from reliable internal and external sources in a timely manner to facilitate effective monitoring. ANG and AFR officials told us that voluntary deployments are more difficult to track than are involuntary mobilizations. Specifically, the statutory requirements for involuntarily mobilizing ARC units or personnel make tracking them simpler. For example, according to officials the Secretary of Defense is required to approve or be notified of involuntary mobilizations, and ANG and ARC units receive specific orders, all of which are tracked closely. Voluntary deployments, however, do not have the same approval requirements. Nevertheless, ANG and AFR officials told us that ARC units may have some information, as detailed below, on the numbers of volunteer deployments, although this information provides only a partial picture of volunteerism. Travel System Data: Officials from a reserve component unit we visited reported that some of the information on voluntary deployments could be compiled from travel systems used to send ARC units and personnel overseas. However, these officials added that matching travel records to the volunteer status of individuals could be time-consuming, because the travel systems are not designed to perform this function. Furthermore, unit officials told us that this travel information would be incomplete even if it were compiled, because it would not include units and individuals supporting operational requirements from their home stations—that is, not traveling outside their normal locations. For example, according to unit officials, personnel supporting remote piloted aircraft would not be included in the information collected from the travel systems because they do no travel outside their normal duty stations to carry out their missions. Without travel orders, the system would not show these types of deployments. Unit officials told us that there could be several cases like this one in which the information compiled from the travel system or other sources could be incomplete. Man-Day Estimates: An AFSOC official told us that the system used to track military personnel appropriation man-days could be another source used to track volunteerism among ANG and AFR units. According to this official, AFSOC uses a data system to transfer man- days to the volunteering ARC unit. This official stated that the system used to make these transfers may contain the information needed to track volunteerism, but acknowledged that no one at AFSOC was using the system for this purpose. Furthermore, ANG and AFR officials confirmed that the data system is not currently used for tracking rates of volunteerism among ARC units. According to AFR officials, tracking volunteerism would allow them to more easily document the ARC’s contributions to support special operations and evaluate whether ARC forces were being effectively utilized. Specifically, ANG and AFR officials expressed concerns that different rates of individual volunteerism within and across ARC units may result in a misleading picture of overall unit utilization. In some cases, incomplete data on volunteerism can result in overstating unit contributions. For example, the unit-level figures regarding deployments are actually averages of all the individuals in the unit. Officials expressed concerns that as a result of using averages, units may appear to be more highly utilized than they actually are, due to the high rates at which some individuals from the unit volunteer to deploy. According to ANG and AFR officials, some ARC personnel volunteer at high rates because they prefer the additional income or benefits from these deployments, while other personnel from the same units may prefer to deploy less often. ARC officials expressed concerns that this disparity may not be immediately visible to ARC and AFSOC leadership. AFSOC officials told us that they share some of these concerns. Other officials expressed concerns that without good information on volunteerism rates, the ANG and AFR could not effectively manage operational tempo goals. To measure operational tempo, DOD has established policies relating to how long military personnel are deployed versus at home (referred to as dwell time, or dwell). For example, ARC personnel who deploy for 7 months and are in dwell for 14 months would have a deployment-to-dwell ratio of 1:2. For ARC units, DOD also tracks the mobilization-to-dwell ratio, which is the ratio of how long ARC personnel are involuntarily mobilized versus not mobilized. DOD guidance establishes that the mobilization-to-dwell ratio for ARC units should be 1:5. According to ANG and AFR officials, ARC voluntary deployments are not factored into the dwell calculations for either ratio, making it more difficult to ensure that deployments do not fatigue ARC forces. Additionally, Special Operations Command policy specifies that ARC units supporting special operations should maintain the same deployment cycle as active duty units, which as a goal should be no less than a 1:2 deployment-to- dwell ratio. ANG, AFR, and AFSOC officials agreed that tracking volunteer deployment rates more comprehensively and consistently would provide greater perspective on how ARC units are utilized and help them more effectively manage their operational tempo goals. Officials stated that an additional consequence of having incomplete data on volunteerism is that the overall contributions of the ARC can be understated, because the full range of support that ARC units and personnel are providing is not being documented. For example, a report used by the Air Force to track force contributions from its components, including the ARC, shows that the AFR contributed forces to support special operations activities for about 6 months of an approximately 4- year period. However, according to AFR officials, the command’s contribution to support special operations activities was much higher than what is documented in the report. The officials stated that AFR also provided volunteer support to AFSOC over the entire period but that its contributions are not fully reflected in the report, because volunteers supporting an AFSOC-assigned mission are counted among the contributions made by other active duty forces, rather than by AFR. Without complete information on volunteer deployment rates among reserve component forces, the ANG and AFR may face difficulties in ensuring the effective utilization of their forces to support special operations activities, documenting force contributions from the ARC, and managing operational tempo and deployment-to-dwell goals. Further, the ARC will not have the information it needs to ensure effective management of its force utilization and mission execution. Specifically, it will not be able to determine whether units are being fully utilized, because of the distorted or incomplete volunteerism information. With a substantial part of the total Air Force capability residing in the ARC, AFSOC relies on mobilized ARC forces to support its operations. Furthermore, AFSOC’s increasing use of ARC as an operational reserve has highlighted the importance of the ARC’s and AFSOC’s planning and information-sharing efforts. However, AFSOC’s implementation of its mobilization process impedes its ability to provide the ARC with timely notification of mobilizations, coordinate with ANG and AFR commands, and share reliable information about requirements with the ARC. Without resolving AFSOC’s organizational capacity challenge in managing AFSOC requirements for reserve capabilities, AFSOC’s implementation of this process is unlikely to improve. AFSOC’s use of the ARC is also affected by the unavailability of complete information regarding both the units available to mobilize and voluntary deployment rates. Specifically, while the ARC is able to identify the units anticipated to be available to support non-special operations requirements, it does not have a method for communicating consolidated information on the availability of units for special operations requirements. Without such a method, AFSOC and the ARC do not have easily accessible information about the current and future availability of ARC units to support special operations requirements. In addition, voluntary deployments are a key piece of the ARC’s support of AFSOC requirements. However, the ARC has not developed a mechanism for tracking the rate at which they occur. Without tracking volunteer deployment rates, the ARC is limited in its ability both to ensure that its forces are effectively utilized and to communicate the level of contribution made by ARC volunteers in support of special operations requirements. We are making three recommendations to DOD: The Secretary of the Air Force, in coordination with ANG and AFR, should ensure that AFSOC has the organizational capacity to effectively initiate, coordinate, and execute ARC mobilizations, to include ensuring timely and reliable notification of requirements to those units. (Recommendation 1) The Secretary of the Air Force should ensure that the ANG and AFR develop a method for providing AFSOC with consolidated information regarding units available for immediate and future mobilizations to support special operations activities, such as the Air Force provides to its units with its force-generation model. (Recommendation 2) The Secretary of the Air Force should ensure that the ANG and AFR develop a mechanism for tracking volunteer deployments to better manage ARC force utilization. (Recommendation 3) In written comments on a draft of this report, DOD concurred with one recommendation and partially concurred with two recommendations. DOD’s comments are restated below and reprinted in appendix I. DOD also provided technical comments, which we incorporated where appropriate. DOD concurred with the first recommendation that the Secretary of the Air Force, in coordination with ANG and AFR, should ensure that AFSOC has the organizational capacity to effectively initiate, coordinate, and execute ARC mobilizations, to include ensuring timely and reliable notification of requirements to those units. In its response, DOD stated that the Air Force continues to balance manning requirements across the spectrum of operations. DOD also stated that fully manning AFSOC for this staff function would be helpful, whether additional manpower is programmed or AFSOC mitigates internally by reallocating manpower. We believe that fully manning AFSOC for this staff function, if fully implemented, would meet the intent of the recommendation. In its comments on this recommendation, DOD also stated that the ARC has a process in place to provide timely notification to ANG and AFR units once requirements are known. The department added that the ANG implemented the Agile ARC Mobilization Process on June 1, 2019, which streamlined policy and procedural chokepoints and improved notification timelines by an average of 60 days. We note that, while improvements in the notification timelines would be beneficial, it is too soon to understand the long-term effect of the implementation of this process. DOD partially concurred with the second recommendation that the Secretary of the Air Force should ensure that the ANG and AFR develop a method for providing AFSOC with consolidated information regarding units available for immediate and future mobilizations to support special operations activities, such as the Air Force provides to its units with its force-generation model. In its comments, DOD stated that the AFR currently provides AFSOC with information on units available, using Reserve Component Periods, and that the AFR will assess whether re- posturing in multiple Reserve Component Periods will provide a portion of capability with greater flexibility. We agree that this is a reasonable approach. However, as we noted in our report, consolidated information on reserve component units that are available for deployment could provide ARC units with advanced notification, making it easier to accomplish deployment preparation activities and help ARC personnel make arrangements for their potential deployments. Additionally, DOD stated that current information technology initiatives with the Air Force Integrated Personnel and Pay System will eventually provide the Air Force with functionality allowing a single, integrated system of software suites. According to the department, Air Force Integrated Personnel and Pay System will support a rapid and accurate information flow from the first identification of a requirement through the processing and delivering of orders, allowing the Air Force to start pay and benefits in an auditable manner. However, DOD did not identify a timeline for when that system would be available. We believe that improvements in the flow of information regarding ARC unit availability are necessary and would help to ensure that the ARC can successfully plan deployments, or easily identify and communicate to AFSOC which of its units are or will be available for mobilization. We believe that if this planned system is implemented as described, it would meet the intent of the recommendation. DOD partially concurred with the third recommendation that the Secretary of the Air Force should ensure that the ANG and AFR develop a mechanism for tracking volunteer deployments to better manage ARC force utilization. In its response, DOD stated that tracking volunteer deployments requires timely information from AFSOC to properly identify the requirements, establish expeditionary ARC units, and document the transaction when ARC members are activated. Further, it stated that in the short term, the AFR will work with AFSOC on further developing use of the Air Force Consolidated Planning Schedule to better define requirements. While coordination with AFSOC could help improve the tracking process, we believe that the ANG and AFR also need to develop a mechanism for tracking volunteer deployments to better manage ARC force utilization. Additionally, DOD noted that the planned information technology initiative, which it described in its response to our second recommendation, could also have benefits for tracking voluntary deployments. We believe that if the planned system is able to fully track voluntary deployments, it would meet the intent of the recommendation. We are sending copies of this report to the appropriate congressional committees; the Secretary of Defense; the Under Secretary for Personnel and Readiness; the Chief of the National Guard Bureau; and the Commanders of Special Operations Command, Air Force Special Operations Command, and Air Force Reserve Command. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-5431, or russellc@gao.gov. Contact points for our respective offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. In addition to the contact named above, individuals who made key contributions to this report include Jim Reynolds, Assistant Director; Adam Anguiano, Tracy Barnes, Adrianne Cline, Shylene Mata, Walter Vance, and Cheryl Weissman.", "summary": "Over the past decade the Air Force has increasingly relied on the ARC to meet operational requirements. The ARC is composed of two entities—the Air National Guard (ANG) and the Air Force Reserve (AFR)—which together comprise a substantial part of the total Air Force capability. AFSOC relies on either volunteerism or involuntary mobilization to activate ARC units. House Report 115-676, accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019, contains a provision for GAO to assess ANG and AFR involuntary mobilization plans to support special operations. GAO evaluated the extent to which (1) AFSOC's mobilization process provides the ARC with timely and reliable forecasts of planned utilization of units and personnel; and (2) the ARC identifies and communicates information to AFSOC on the units and individuals available for mobilization or on voluntary deployments. The Air Force Special Operation Command's (AFSOC) mobilization process does not fully support Air Reserve Component (ARC) needs for timely and reliable information. While AFSOC has established mobilization processes in line with Air Force guidance, the command faces difficulties, as follows: consistently providing ARC units and personnel with timely notifications regarding anticipated demand for their capabilities; coordinating with ARC commands on potential requirements for ARC capabilities; and sharing reliable information about mission requirements and resources with ARC units and personnel. According to AFSOC officials, these difficulties stem from AFSOC's limited organizational capacity to conduct the planning, coordination, and execution of involuntary mobilizations (that is, ARC units or personnel ordered to active duty). Other Air Force entities that provide ARC capabilities to meet Air Force-wide requirements have established the capacity within their operations departments to coordinate with the ARC when implementing the involuntary mobilization process. AFSOC officials stated that because AFSOC did not, until recently, regularly use involuntary mobilizations to access the ARC, it was not considered necessary to have an organizational entity dedicated to managing involuntary mobilizations. AFSOC officials stated that the command's operations center has submitted requests to its headquarters for additional resources toward creating such organizational capacity, but the requests were not funded in fiscal years 2018 or 2019, as other requests received higher priority. According to officials, AFSOC is currently exploring possible short-term solutions. In the absence of the organizational capacity to conduct the planning, coordination, and execution of involuntary mobilizations, AFSOC will continue to be impeded in providing the notice required to access the ARC in support of requirements. The ARC does not provide AFSOC with complete information regarding which of its units could be used to support AFSOC requirements for special operations activities. The Air Force uses a model that captures and organizes Air Force-wide requirements, but the model does not include special operations requirements, and AFSOC is expected to develop its own processes for its unique requirements. According to AFSOC and ARC officials, the ARC has not developed a method for capturing and organizing special operations requirements because it has historically supported special operations activities using volunteerism, which is more flexible and requires less up-front planning. Consolidated information on potential unit deployments would provide units with advanced notification, facilitating deployment preparation activities and helping personnel make arrangements with civilian employers or in their personal lives. Without a method to provide consolidated information on reserve component units available for deployment, the ARC will not have the information it needs to successfully plan its deployments, or to easily identify which of its units will be available for mobilization. GAO is making three recommendations, including that the Air Force should ensure that AFSOC has the organizational capacity to effectively initiate, coordinate, and execute ARC mobilizations; and should develop a method for providing AFSOC with consolidated information regarding units available for mobilizations. DOD concurred with one of these recommendations and partially concurred with two, stating that some information is being shared and a planned initiative could improve the information flow. GAO believes this initiative, if implemented, could address the intent of its recommendations.", "document_type": "gao"}
{"report": "While U.S. airlines’ business practices were largely deregulated following the Airline Deregulation Act of 1978, a number of consumer protections are in place at the federal level. For example, some consumer protections are required by federal statute, such as the Air Carrier Access Act of 1986 (ACAA), as amended, which prohibits airlines from discriminating against individuals based on a disability. Federal statutes have also authorized DOT to regulate certain areas affecting passengers. For example, DOT has the authority to stop airlines from engaging in unfair or deceptive practices, or unfair methods of competition, and promulgates consumer protection regulations under its statutory authorities. Under these authorities, DOT issued three final rules on Enhancing Airline Passenger Protections from 2009 through 2016. These rules have addressed long tarmac delays, increased compensation amounts for passengers who are involuntarily denied boarding, and required certain airlines to post information about their fees and on-time performance on their websites. In 2018, we found that airlines’ operational performance—as measured by DOT data on denied boardings; mishandled baggage; and late, cancelled, or diverted flights—generally improved from 2008 through 2017, the most recent data available at the time of our review. While rates of voluntary and involuntary denied boardings and mishandled baggage generally declined, airlines’ on-time performance stayed about the same (fig. 1). For example, over the 10-year period of our review, the lowest rate of involuntary denied boardings occurred in 2017. Specifically, in 2017, airlines involuntarily denied boarding to about .003 percent of all passengers (or about 23,000 of more than 680 million passengers)—a slight decrease from prior years. Our more recent work on airlines’ denied boarding practices found that even fewer passengers were denied boarding involuntarily in 2018. Rates of mishandled baggage also generally declined in recent years. For example, in 2017 airlines posted a rate of 2.5 mishandled bags per 1,000 passengers (a rate of .25 percent of mishandled bags per passenger enplanement), compared to a rate of 5.25 mishandled bags per 1,000 passengers in 2008. In 2019, we identified a number of factors that can cause airlines’ operational issues. For example, passengers might be denied boarding when airlines overbook their flights (i.e., intentionally sell more seats than are available on a flight) or have to substitute smaller aircraft than what was originally scheduled due to maintenance issues. We also found that outages associated with airline IT systems—which are used for flight and crew planning, passenger reservations or check-in, or for providing flight information to the Federal Aviation Administration—can cause flight delays and cancellations. While we found some outages caused minimal issues, the impact of others was more substantial. For instance, in 2016, an outage in one airline’s system that is used to check in and board passengers resulted in the cancellation of 2,300 flights over 3 days. While airlines’ operational performance generally improved, we found in 2018 that the number of passenger complaints reported to DOT, relative to passenger boardings, generally increased from 2008 through 2017 for 12 selected airlines, peaking in 2015 and declining somewhat in later years. Specifically, in that work we found that the rate of passenger complaints reported to DOT, relative to passenger boardings, increased about 10 percent, from about 1.1 complaints per 100,000 passengers in 2008 to 1.2 complaints per 100,000 passengers in 2017. Complaints about operational issues discussed above—which make up three of DOT’s 15 complaint categories—accounted for about half of all complaints for the 12 selected airlines from 2008 through 2017. More specifically, in 2018 we found: Flight problems generally accounted for an average of about 33 percent of all complaints. This category includes complaints related to delays, cancellations, and missed connections, among other things. From 2008 through 2017, the rate of complaints in this category generally increased. Baggage issues generally accounted for an average of about 15 percent of total complaints. Complaints were largely related to lost, delayed, or damaged bags. The rate of baggage complaints generally decreased over our time period. Denied boardings generally accounted for an average of about 4 percent of total complaints. Complaints were related to airlines’ failure to solicit volunteers or providing compensation below the required amount. Rates of complaints about denied boardings generally stayed constant over our time period. Two of the remaining 12 complaint categories tracked by DOT accounted for about a quarter of passenger complaints. One category related to reservations, ticketing, and boarding, and the other related to customer service—such as airline staff having a poor attitude or refusing to provide assistance, and unsatisfactory seat assignments. Each of these categories generally accounted for an average of about 13 percent of all complaints over the 10-year period. Our previous work identified actions taken by airlines or DOT in response to such operational issues. DOT’s actions are primarily related to establishing regulations about operational issues. For example, while DOT does not prohibit airlines from overbooking flights, it has set compensation amounts for passengers denied boarding involuntarily. DOT has also issued regulations related to returning mishandled baggage within 24 hours, tarmac delays, and prohibiting chronically delayed flights. Examples of airlines’ actions are listed below. Reducing denied boardings. In 2019, we reported that selected airlines have taken a range of actions, aimed at reducing involuntary denied boardings. Some of these actions also provide additional incentives for passengers to volunteer to be denied boarding. Actions include reducing or eliminating overbookings; improving software to better predict passenger no-shows; requesting volunteers earlier (e.g., at check-in instead of at the gate); increasing compensation for volunteers; and conducting reverse auctions to solicit volunteers. Less mishandled baggage. As we reported in 2018, representatives from almost all airlines we interviewed reported investing resources to improve baggage-handling efforts and minimize the effects to passengers whose bags are lost or delayed. Among other actions, airline representatives told us they upgraded baggage technology; modernized the claims process, so passengers could complete forms on-line; and instituted replacement baggage programs, where passengers can get a replacement bag at the airport. One airline also invested several million dollars to use radio frequency identification technology to track bags, as well as allowing passengers to track their baggage via an application on their smartphone. Efforts to minimize flight disruptions. In 2018, we also reported that selected airlines had taken numerous actions to improve on-time performance or mitigate challenges for passengers associated with flight delays and cancellations. For example, one airline began tracking flights that were “at-risk” of meeting DOT’s definition of a chronically delayed flight, so it could, among other things, swap crews or substitute aircraft and avoid these types of delays. Other airlines told us they use technology, such as text-messaging updates, to communicate with passengers during delays and cancellations or increased the number of circumstances for which passengers are compensated during delays and cancellations. Our prior work has shown that passengers may be affected to varying degrees by airline operational issues, and that incidents can be costly and disruptive for some passengers. Airlines are required by DOT regulations to provide compensation or certain amenities to inconvenienced passengers under certain circumstances. For example, some passengers who are denied boarding involuntarily are entitled to compensation, with the amount varying based on certain factors. Airlines are also required by DOT’s interpretation of the statutory prohibition on unfair and deceptive practices to provide refunds for canceled and significantly delayed flights, if a passenger chooses to cancel his or her trip. Beyond those requirements, DOT officials previously told us that airlines are not obligated to provide accommodations for flight disruptions, such as cancellations and delays, unless specified in an airline’s contract of carriage, although as mentioned above, some voluntarily choose to do so in certain situations. This may result in significant inconveniences for passengers, who may incur costs for lodging, meals and transportation. However, according to our prior work, available information about the number and magnitude of these effects is largely anecdotal and cannot be quantified. Furthermore, our review of selected airlines’ contracts of carriage in February 2019 showed variation in the types of accommodations airlines provide and circumstances in which they will be provided, when operational issues occur. According to the 2010 U.S. Census, 57 million Americans (roughly 1 in 5) have a disability, and more than half of those 57 million Americans have mobility issues. Furthermore, older Americans are representing an increasing share of the U.S. population. As the population continues to age, the likelihood of this group needing assistance may increase. Without accommodations—such as effective communication of flight information, accessible seats, appropriate boarding assistance, and careful handling and stowage of wheelchairs and other assistive devices—people with accessibility or mobility issues may face challenges when flying, or they may be unable to fly altogether. As previously mentioned, the ACAA prohibits airlines operating in the U.S. from discriminating against individuals on the basis of disability in the provision of air transportation. Under this law, DOT has promulgated regulations requiring that airlines provide passengers with disabilities (1) assistance in enplaning and deplaning; and (2) compensation for lost, damaged, or delayed wheelchairs or other assistive devices. In contrast to all other complaints that passengers submit directly to airlines, DOT regulations require that airlines report annually to DOT the number of all disability-related complaints they received. In our May 2017 report, we provided information showing that disability complaints reported to airlines and DOT generally increased from 2005 through 2015. More recent data shows that passenger complaints reported to U.S. airlines continued to increase (see table 1). In particular, we found that complaints reported to airlines on disability issues increased by about 50 percent from 2010 (19,347) to 2017 (29,662), the most recent year for which data are available. Based on our review, the vast majority of passengers chose to file their disability complaints directly to the airlines. Notably, the number of passenger complaints on disability issues reported to DOT from 2010 through 2019 ranged from 572 to 944 and averaged about 780 complaints per year. Complaints reported to DOT rose in 2019, after peaking in 2015 and declining the three following years. In 2017, the last year data are available for both, complaints reported to airlines and DOT were most commonly related to failure of airline staff to provide assistance, seating accommodation issues, and service animal issues. As we have previously reported, the number of complaints may not fully reflect the inconvenience experienced by passengers or would-be- passengers with accessibility issues. Some may choose not to fly and others may have to take inconvenient or uncomfortable precautionary measures to avoid using the aircraft lavatory. For example, in our recent work examining the accessibility of aircraft lavatories, stakeholders we interviewed told us that some passengers severely limit their food and fluid intake in advance of the flight, risking dehydration; use a catheter; or wear a protective undergarment. Furthermore, because lavatories accessible by the aircraft’s onboard wheelchair are not required on most aircraft (i.e., single-aisle aircraft) and there may not be an expectation that the lavatory be accessible by an onboard wheelchair, passengers may not see grounds to complain or may not take the time to submit a complaint. More generally, in our prior work, we found that complaint data are inherently limited because a substantial portion of dissatisfied individuals do not submit complaints and are therefore not represented in the complaint data. A number of federal statutes also prohibit or have been interpreted by DOT to prohibit airline discrimination against airline passengers. Federal statute also allows airlines to refuse to transport any passenger if the airline determines that the passenger is, or might be, a threat to safety. According to DOT guidance, this determination is made by the pilot in command of the aircraft or certain other specified airline personnel and cannot be arbitrary, but must be based on specific facts and circumstances known at the time. In its guidance, DOT has unequivocally provided that a passenger’s status in a protected class (e.g., race, ancestry, national origin, or religion) cannot be the determinative factor in an airline’s decision to deny boarding or remove a passenger from a flight. Our August 2019 report showed that the total number of passenger complaints reported to DOT against U.S. airlines alleging discrimination generally declined from 2010 through 2015, but began to increase starting in 2016. Moreover, updated data for 2019 show a further increase, with 96 complaints filed (table 2). According to our analysis, from 2010 through 2019, DOT received, on average, 80 discrimination- related complaints a year, most commonly about racial discrimination. Despite the recent increase in the total number of discrimination complaints, they account for a small percentage of total passenger complaints DOT receives, as well as total passenger boardings. For example, in 2019, of the 9,547 complaints DOT received against U.S. airlines, 96 alleged discriminatory treatment. As noted above and previously reported, DOT’s discrimination complaint data does not capture passenger complaints reported directly to airlines. In 2018, we reported that DOT officials estimated that, across all complaint categories, for every passenger complaint they receive, airlines receive about 50. While we have previously requested discrimination complaint data from selected airlines, they have generally declined, citing the proprietary nature of this information. Since 2017, DOT has disaggregated discrimination complaints into sub-categories, such as racial or religious discrimination, and published this data in its Air Travel Consumer Report. We previously identified actions that DOT and airlines have taken that are intended to ensure that no passengers are discriminated against on the basis of disability or other protected class. Our work primarily examined airlines’ efforts to train staff and contractors. However, our work also identified other airline actions (both proactive and reactive) taken to enhance compliance with consumer protections in these areas. For example, one airline developed a wheelchair tracking system in response to a DOT enforcement action to help reduce incidents of lost or mishandled wheelchairs. DOT requires that airlines provide their employees and contractor staff who interact with the traveling public training on the proper and safe operation of equipment used to accommodate passengers with a disability, as well as on boarding and deplaning assistance. While not required, DOT encourages airlines to implement comprehensive non- discrimination trainings to help prevent discrimination. DOT has also developed training materials, available on its aviation consumer protection website, for airline employees and contractor staff. These materials include brochures, digital content, and videos on the rights of passengers with disabilities, as well as tips on providing wheelchair assistance at airports and onboard aircraft. In 2017, DOT also developed guidance for airline personnel on non-discrimination topics. The material included scenarios for recognizing discriminatory behavior and provided examples of how to ask additional questions or conduct additional screening in a non-discriminatory manner. In 2017 we reviewed disability training programs for 12 selected airlines and found that they all had disability-related training requirements for their staff and contractors, with some variations in the content and format. Over the course of that work, each airline demonstrated that it had, as required, initial and recurrent training for its employees, contractors, and complaint resolution officers (CRO). All 12 selected airlines used a mix of training, including classroom-based training, computer-based training, situational scenarios, and hands-on training, such as wheelchair handling and lifting passengers into aisle seats to assist in boarding for specific groups. We also found that these selected airlines generally consulted with disability organizations when developing ACAA training programs. Some airlines also voluntarily implemented quality assurance programs to improve and sustain their disability-training programs’ performance. Another step some airlines have taken, though not required by the ACAA or its implementing regulations, is the creation of a disability board, which serves as a forum for increasing awareness among their workforce about disability issues. In 2019, we reported that representatives from all six U.S. airlines we selected for review told us they provide non-discrimination training to employees, although not all contractor staff receive that training. These representatives told us they provide initial non-discrimination training to newly hired employees who interact with passengers—including, for example, pilots, flight attendants, and customer service representatives— and that most regularly update the training based on current events or changes in policy. Airline representatives provided high-level examples describing the content of their trainings, but with one exception, they declined to provide more specific information, citing the sensitive or business proprietary nature of such materials. We found some similarities and differences in what representatives reported their trainings covered. For example, representatives generally stated that non-discrimination trainings—which were typically embedded in larger training programs and combined in-person and web-based modules—emphasized treating all individuals fairly and without bias, regardless of race, ancestry, or religion, among other things. Most also said trainings covered implicit bias—a term that refers to attitudes or stereotypes about groups of people that unconsciously affect a person’s understanding, actions, and decisions—and half said they have used DOT’s guidance discussed above, with some airline-specific modifications. In our recent work on aircraft lavatories, we found that some U.S. airlines voluntarily installed lavatories accessible by the aircraft’s onboard wheelchair for some of their single-aisle aircraft. However, we found that these aircraft only constituted about 4.5 percent of the eight selected airlines’ combined single-aisle fleet. According to airline representatives, providing lavatories accessible by the aircraft’s onboard wheelchair may reduce the number of revenue generating seats in the aircraft cabin, which can increase airlines’ costs and result in higher fares for consumers. In lieu of lavatories accessible by the aircraft’s onboard wheelchair, airline representatives said they have added certain features—such as assist handles or grab bars, and accessible call buttons or door locks—designed to increase access to certain lavatory functions. DOT has recently issued three notices of proposed rulemaking (NPRM) designed to improve the accessibility of aircraft lavatories, regulate service animals, and clarify DOT’s authority to stop airlines from engaging in unfair or deceptive practices. For example, in January 2020, DOT issued an NPRM to solicit comments on short-term accessibility improvements on single-aisle aircraft through the installation of accessibility features within the lavatory, such as those mentioned above, without changing the size of lavatories. In addition, DOT announced its intention to issue an advance NPRM to address long-term accessibility improvements and to solicit comments and gather information on the costs and benefits of requiring airlines to increase the size of the single- aisle lavatory on new aircraft models to accommodate a wheelchair as well as an assistant. In 2008, DOT noted that accessible lavatories on single-aisle aircraft would benefit passengers with disabilities, but also expressed concerns that revenue loss and other cost impacts could be too great for the airlines. The FAA Reauthorization Act of 2018 included a number of ongoing requirements for DOT in the airline consumer protection area. For example, DOT is responsible for developing leading non-discrimination practices for airlines, in consultation with airlines and other consumer advocates. In addition to our recently published work, we have ongoing work examining airport accessibility for passengers with disabilities, as well as DOT’s enforcement approach to consumer protections. We anticipate issuing reports on the results of this work later this year. Chairman Larsen, Ranking Member Graves, and members of the Subcommittee, this completes my prepared remarks. I look forward to answering any questions you may have. If you or your staff have any questions about this statement, please contact me at (202) 512-2834 or vonaha@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Jonathan Carver, Assistant Director, Geoffrey Hamilton, Delwen Jones, Josh Ormond, Amy Suntoke, Melissa Swearingen, and Elizabeth Wood. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Each year, hundreds of millions of passengers rely on airlines to get them to their destination without incident—including some of the 57 million Americans with a disability. While airlines maintain their performance and service have improved, passengers may still experience a range of inconveniences. A number of consumer protections are in place at the federal level. These protections have addressed long tarmac delays and increased compensation for passengers who are involuntarily denied boarding. Some protections are specific to passengers with disabilities, requiring that airlines provide (1) help enplaning and deplaning, and (2) compensation for lost or damaged wheelchairs. DOT enforces these protections. This statement discusses (1) DOT's data on airline operational performance from 2008 through 2017, and (2) what is known about passenger complaints and airlines' practices related to accessibility and non-discrimination issues. This statement is based on six prior GAO reports issued in the past 3 years. For that work, GAO analyzed relevant DOT data and passenger complaints; reviewed DOT documents and regulations; and interviewed DOT officials and representatives from selected airlines and consumer advocate organizations. For this statement, GAO updated prior analyses on passenger complaints for accessibility and discrimination issues and reviewed recent DOT rulemakings. The Department of Transportation's (DOT) data show that airlines' operational performance—as measured by rates of denied boardings, mishandled baggage, and flight delays—generally improved from 2008 through 2017, the latest available data at the time of GAO's review. Nevertheless, in 2018, GAO found that passenger complaints to DOT across all complaint categories increased about 10 percent from 2008 through 2017 for 12 airlines that GAO selected for review. Complaints about airlines' operational performance accounted for around 50 percent of the total. Passenger disability complaints submitted to airlines—which vastly outnumber such complaints submitted directly to DOT—have steadily increased since 2011. Unlike all other categories of passenger complaints, airlines are required to annually report the number of disability-related complaints they receive to DOT. Passenger disability complaints submitted directly to DOT also increased in 2019, accounting for the second highest level in the past 10 years. Complaints to airlines and DOT in 2017—the most recent year data were available—were most commonly about failure of airline staff to provide assistance, seating accommodation issues, and issues related to service animals. Passenger complaints submitted to DOT related to discrimination also rose in 2019, with 96 complaints filed. From 2010 through 2019, DOT received, on average, 80 complaints a year from passengers alleging discrimination, most commonly about racial discrimination. DOT requires that airlines provide training on accessibility issues and encourages non-discrimination training for its staff. In 2017, GAO found that 12 selected airlines had accessibility-related training requirements for their staff and contractors, with some variations in the content and format. In 2019, GAO reported that representatives from six selected U.S. airlines provide non-discrimination training to employees, although not all contractor staff receive that training. Airlines have taken initial actions in other areas. More recently, in 2020, GAO found that only about 4.5 percent of the eight largest U.S. airlines' fleet of aircraft with single aisles were designed to accommodate airplane onboard wheelchairs.", "document_type": "gao"}
{"report": "As previously mentioned, multiple federal departments and components have responsibilities for combating the flow of illicit drugs into the United States. Figure 1 summarizes the missions and responsibilities of the federal departments and components primarily responsible for combating the trafficking of illicit drugs. In 1989, DOD created several joint task forces, which aimed to bridge the military’s counterdrug efforts with those of civilian, federal law enforcement agencies. These task forces have evolved since then and eventually developed into the present-day iterations of JIATF-South under the U.S. Southern Command and JIATF-West under the U.S. Indo-Pacific Command. JIATF-South and JIATF-West both consist of representatives from DOD, DHS, and DOJ components, among others. Coast Guard admirals currently serve as the Directors of both of the JIATFs. Previously, DOD service components have led JIATF-South; however, while DOD is responsible for detection and monitoring of drug flow, it is precluded from taking law enforcement actions in counterdrug efforts. Task force officials stated that Coast Guard leadership encourages participation from both DOD and DHS because the Coast Guard is both a military and a law enforcement agency. The deputy and vice leadership positions at the JIATFs are held by officers and civilians from DOD, DHS, and DOJ components, which allow the task forces to leverage various experiences and authorities across these components, according to task force officials. In 2014, DHS established three new joint task forces — (1) JTF–East, (2) JTF–West, and (3) JTF–Investigations—as pilot programs to, among other things, address the smuggling of illicit drugs over the southern border and approaches to the United States. Additionally, according to the DHS Southern Border and Approaches Campaign Plan, the JTFs were created to strengthen the unity of effort within DHS toward common goals. The 2017 National Defense Authorization Act subsequently codified these task forces and established new JTF requirements, such as establishing outcome-based and other appropriate performance measures to evaluate the effectiveness of each JTF. In 2017, DHS also created a JTF Coordination Cell to develop JTF performance measures and enhance awareness among DHS components about the role of the JTFs, among other things. The DHS JTFs primarily consist of representatives from CBP, ICE, and the Coast Guard, and a representative from each of these components serves as the Director for each of the three JTFs. The deputy leadership positions of each JTF are held by officers from the other two components. For example, DHS JTF-West’s director is an officer from CBP, and the deputy directors are officers from the Coast Guard and ICE. According to a DHS memorandum, in establishing the JTFs, DHS wanted each JTF to be led and supported by the different DHS components in order to integrate their varied capabilities. For more information on the task forces’ leadership and compositions, see table 1. Each of the five task forces are similarly organized by functional areas and all include areas such as administration and personnel, intelligence, and operations. For example, JIATF-South, JIATF-West, and each of the DHS JTFs have Planning sections, which help guide the task forces’ overarching strategic plans and operations, with input from other sections. One task force—JIATF-West—further tailored its organizational structure to its missions and activities. Specifically, JIATF-West reorganized in January 2016, at the direction of the former U.S. Indo-Pacific Combatant Commander, to operationalize and combine its Intelligence and Operations functional areas into a Counternarcotics Operations Center. According to JIATF-West leadership, the Counternarcotics Operations Center better reflects the nature of its intelligence gathering and sharing activities with other federal law enforcement agencies and foreign countries. JIATF-West officials also stated the task force merged its section that provided support and training of foreign law enforcement agencies into its Planning and Engagement section since that section directs activities related to JIATF-West’s engagement with partner nations. As shown in figure 2, the two DOD task forces (JIATF-South and JIATF- West) and two of the three DHS task forces (JTF-East and JTF-West) have geographical areas of responsibility. In contrast, the third DHS task force (JTF-Investigations) is focused on coordinating investigations and information sharing to support DHS and the other two DHS JTFs. As a result, it does not have a geographical area of responsibility. Example of Joint Interagency Task Force– South (JIATF-South) Activity to Combat Illicit Drug Trafficking When JIATF-South receives information about a potential illicit drug smuggling event, it will use available air and maritime assets allocated to it to detect and monitor the suspect smuggling vessel. Once JIATF-South locates the suspect vessel and has assets in place, JIATF-South turns over control of the assets to the relevant law enforcement agencies (e.g., the Coast Guard, CBP, etc.) to interdict the smuggling vessel and any illicit drugs that may be on board. JIATF-South: Focuses its activities on detecting, monitoring, and supporting the interdiction of bulk cocaine movements being smuggled on noncommercial maritime vessels. According to JIATF- South officials, this focus is partly because the key coca-producing countries are within its area of responsibility, and partly because cocaine is a key source of profit for transnational criminal organizations. JIATF-South is also allocated assets, such as ships and surveillance aircraft, from DOD and DHS components (such as the Coast Guard and CBP Air and Marine Operations), as well as from foreign partners. JIATF-South uses these maritime and air assets, in conjunction with available intelligence, to detect and monitor the trafficking of illicit drugs, such as cocaine, being smuggled north across its area of responsibility. Once JIATF-South detects a smuggling event occurring, it passes this information and control of the assets to law enforcement authorities to interdict the smuggling event. For an example of how this occurs, see the sidebar. Example of Joint Interagency Task Force– West’s (JIATF-West) Capacity Building Efforts to Combat Illicit Drug Trafficking JIATF-West has helped countries in its area of responsibility—such as Vanuatu—build their financial investigative capacity by providing law enforcement training on topics such as bank records analysis, money laundering theory, and accounting. This training is intended to help foreign law enforcement agencies better detect transnational criminal organizations’ transactions, thus making it more difficult for such organizations to operate in their area of responsibility. JIATF-West: Focuses its missions and activities on four priorities: (1) detecting precursor chemicals that can be used to manufacture illicit drugs, such as synthetic opioids; (2) supporting allies and foreign partners in combating illicit drug trafficking in its area of responsibility; (3) monitoring drug flows moving to, from, and through Asia and other countries in the Indo-Pacific region; and (4) detecting the flow of fentanyl and other synthetic opioids, according to JIATF-West documents. According to JIATF-West officials, JIATF-West’s activities primarily consist of intelligence gathering and collaboration with law enforcement partners within foreign countries where precursor chemicals are manufactured or combined to manufacture illicit drugs. JIATF-West also engages in capacity building with law enforcement authorities in foreign countries in the Pacific region, such as the Philippines and Thailand. For an example of JIATF-West’s capacity building efforts, see the sidebar. Unlike JIATF-South, JIATF-West does not have assets, such as ships or aircraft. However, JIATF-West officials stated that even if JIATF- West had assets, it would not alter the focus of its missions and activities because of the threat transnational criminal organizations pose and the nature of the flow of illicit drugs and precursor chemicals in its expansive area of responsibility. For example, JIATF-West officials told us that precursor chemicals are typically shipped in commercial cargo containers. Notably, all precursor chemicals are legal to manufacture and sell for legitimate uses, such as the production of pharmaceutical drugs and pesticides, and it is difficult to determine when such chemicals have been diverted for illicit use. Officials stated that JIATF-West would face legal and logistical challenges if they were to directly disrupt precursor chemicals being diverted, such as if the vessel was state-owned or was in a foreign country’s territorial waters. Thus, even if JIATF-West had assets, JIATF-West officials noted that the legal and logistical challenges would not change how the task force approaches its missions and activities. DHS JTFs: Focus on coordinating with DHS components (e.g., CBP, ICE HSI, Coast Guard) to facilitate awareness about cross- component, cross-geographic homeland security issues. The JTFs have broader missions than countering the flow of illicit drugs. For example, the JTFs also have responsibilities for coordinating migrant interdiction and counter-terrorism activities. Further, given their areas of responsibility, JTF-East primarily focuses on threats along the southern maritime border of the United States and JTF-West primarily focuses on threats along the southwest land border. In contrast, JTF-Investigations focuses on supporting DHS-wide investigations and sharing information to support the other two task forces. Similar to JIATF-West, the JTFs do not have physical assets to support these activities. According to JTF officials, this is partly because the 2017 National Defense Authorization Act requires the JTFs to be cost neutral. Additionally, JTF officials stated the JTFs were not meant to serve a similar function as the DOD combatant commands and, instead, are meant to help with planning and coordinating missions and activities across joint operating areas. Task force officials reported that the task forces effectively coordinated counterdrug missions and activities to minimize duplication of efforts. The extent to which the task forces coordinate varied based on whether they have (1) shared purposes and (2) areas of responsibility with overlapping or shared geographical boundaries. In particular, those task forces that have shared purposes and those task forces that have overlapping areas of responsibility or shared boundaries tended to coordinate with one another more than with the other task forces. We also found that the task forces use a variety of mechanisms to coordinate counterdrug missions and activities, such as the use of working groups and liaison officers, that our prior work has identified as best practices. Officials we met with from each of the task forces stated that they are satisfied with the level of coordination that takes place with other task forces and that the coordination efforts have been effective. Our analysis of their responses found that of the five task forces, JTF-Investigations’ coordination activities were rated as the most effective by the other four task forces. JIATF-South was rated the second highest task force in terms of both the effectiveness of its coordination activities and the number of other task forces with which it coordinated. Figure 3 provides a visual representation of the task force officials’ views on the extent to which the task forces coordinate with one another and the effectiveness of the coordination efforts. of coordination with the other task forces varies based on the extent to which the task forces have shared purposes. Of the five task forces, JTF-Investigations was the one task force that coordinated with all the other task forces, which is consistent with its purpose to enhance DHS investigations, coordinate priorities, and share information with the other joint task forces. As a part of its process in designating cases as a Homeland Criminal Organization Target (HOMECORT), JTF-Investigations conducts a Comprehensive Criminal Network Analysis that identifies links between multiple cases and criminal organizations that can cross geographical and task force boundaries (see sidebar for more information on the HOMECORT process). According to JTF-Investigations officials, this analysis helps identify cases that may be related and helps to coordinate cases across task force jurisdictions to prevent duplication of missions and activities. forces told us that they coordinated more with those task forces with which they had a shared border or joint operating area. For example, JIATF-South shares a joint operating area or a geographical boundary with both JTF-East and JIATF-West and, as a result, officials from these three task forces provided more robust examples of coordination. According to task force documentation, such as operational guidance, and our discussions with task force officials, JIATF-South, JIATF-West, and the DHS JTFs coordinated with each other on missions and activities where they have a shared interest, such as a common illicit drug threat. These coordination activities include information sharing and joint operations, as well as mechanisms, such as the use of working groups and liaison officers, which our prior work has identified as best practices for coordination. According to task force officials, this coordination is intended to enhance counterdrug efforts and avoid duplication of missions and activities. As described earlier, the task forces have different mission focuses that depend on their geographically defined areas of responsibility, which also help the task forces avoid duplication of missions and activities. However, as shown earlier in figure 2, there are some areas of land, sea, and air in which more than one task force may conduct missions and activities (e.g., between JIATF-South and JTF- East). These areas of overlap are called joint operating areas. According to our review of task force documents and discussions with task force officials, within these joint operating areas, the task forces share intelligence information, coordinate missions and activities with one another, and sometimes conduct joint operations. For example, in 2018, JTF-East led and coordinated with JIATF-South on an operation to increase intelligence and targeting capabilities to disrupt illicit drug trafficking organizations operating within their joint operating area in the Caribbean. JTF-East personnel deployed to JIATF-South’s headquarters to facilitate coordination and information sharing. As a result of this joint operation, the law enforcement agencies involved seized over 3,700 pounds of cocaine and apprehended 69 migrants, one smuggler, and the smuggling vessel, according to JTF-East documentation. Officials from the task forces we spoke with reported coordinating most frequently through meetings and working groups, and through liaison officers, as detailed in examples below. JIATFs: In 2018, JIATF-South and JIATF-West officials developed a collaborative process to track and target shipments with potential illicit drugs and precursor chemicals moving between their respective areas of responsibility. For example, JIATF-West analysts traveled to JIATF- South to initiate the process, and officials stated they continue to work with JIATF-South analysts remotely on an ongoing basis on such collaborative efforts. JTFs: The JTF Coordination Cell hosts quarterly “synchronization meetings” with the three DHS JTFs to discuss emerging drug and smuggling trends, ongoing coordination efforts, and investigations. All five task forces utilize liaison officers to enhance coordination with the other task forces and components. For example, in 2018, JIATF-West sent an analyst to JTF-Investigations to coordinate on a HOMECORT case related to drug threats in the Indo-Pacific region. Further, the five task forces coordinate with each other and their participating components through liaison officers that reside at the task forces. For example, JIATF- South officials told us that they coordinate with JTF-East through a Coast Guard liaison at JIATF-South. Liaison officers also provide direct access to their components’ information systems, which task force officials said further aids them in sharing information and coordinating missions and activities. In addition to meetings, working groups, and liaison officers, the task forces utilize other coordination mechanisms, such as memoranda of understanding and agreement, shared databases, and conferences, as detailed below. Memoranda of understanding or agreement: The two JIATFs have nine separate formal memoranda of understanding or agreement with various DHS and DOJ components, such as the Drug Enforcement Administration and ICE, that detail how the task forces and agencies will coordinate with one another and share resources. Shared databases: Each of the five task forces, along with other federal agencies, can submit information, sometimes known as a “critical movement alert” to shared databases, to alert JIATF-South about a potential drug event in its area of responsibility. According to JIATF-South officials we spoke with and our observations, JIATF- South uses these critical movement alerts, along with other intelligence that may exist, to determine whether it will dedicate assets to target a smuggling event, in conjunction with other, relevant law enforcement agencies. Conferences: Each of the five task forces participates in periodic in- person, telephone, or video conferences to coordinate with one another and share information on key issues. For example, JIATF- South officials stated they have ongoing discussions once a quarter via video conference with JIATF-West officials and other federal agencies and task forces to coordinate on illicit drug threats. JIATF-South uses both output-based and outcome-based performance measures to gauge the effectiveness of its counterdrug missions and activities, and it reports the results to the DOD Deputy Assistant Secretary of Defense for Counternarcotics and Global Threats in JIATF- South’s annual Performance Summary Reports. JIATF-South consistently assesses four key performance measures, called interdiction continuum measures, using data from the Consolidated Counterdrug Database to determine the effectiveness of its missions and activities. Specifically, JIATF-South measures (1) total maritime smuggling events, (2) targeted smuggling events, (3) detected smuggling events, and (4) seized or disrupted smuggling events. According to JIATF-South officials, data on these events allow JIATF-South to develop its primary measure to determine the effectiveness of its counterdrug missions and activities: the percentage of smuggling events JIATF-South detected that it handed off to law enforcement agencies that resulted in disrupted or seized illicit drugs. These measures and the results for fiscal years 2014 through 2018 are shown in table 2. From fiscal years 2014 through 2018, the rate at which JIATF-South successfully detected and handed off smuggling events for interdiction was generally 70 percent or higher. While JIATF-South officials acknowledged they have not met the target set by DOD, they noted there are many factors that influence the effectiveness of JIATF-South’s counterdrug missions and activities in any given year that are outside of its span of control. For example, drug trafficking organizations may adapt their tactics in response to JIATF-South’s activities to make it more difficult for the task force to target and detect their movements. This could include changing their trafficking routes or altering the size or type of smuggling conveyances the drug trafficking organizations use to transport the illicit drugs. In September 2014, JIATF-West set up an Assessments Branch to provide an annual assessment of the task force’s counterdrug efforts that was intended to inform leadership about whether the task force was undertaking the best activities to achieve its mission and implementing them effectively. According to JIATF-West officials, the nature of JIATF- West’s missions and activities make it inherently more difficult to assess and quantify the effectiveness of its efforts relative to other task forces. For example, unlike JIATF-South, which is annually allocated assets to support its missions and activities and can measure results—such as tons of cocaine seized—JIATF-West’s initiatives and activities are primarily focused on information sharing and helping partner nations improve their counterdrug capabilities, activities for which results may be more difficult to quantify. To develop its annual assessment report, JIATF-West’s Assessments Branch evaluates and assigns scores for each of the approximately 20 counterdrug initiatives and more than 100 corresponding activities it conducts each year. (For an example of a JIATF-West initiative and a corresponding activity and a description of how they were assessed, see the sidebar.) In particular, JIATF-West evaluates its initiatives to determine the progress made toward achieving objectives defined in JIATF-West’s strategic documents, such as its Theater Counternarcotics Campaign Plan. Further, JIATF-West evaluates its activities to determine whether they were executed as planned, including considerations of whether the activities were done with the intended organizations, at the specified locations and times, and whether they met stated objectives. Nevertheless, we identified ways JIATF-West measures its performance that inhibit its ability to demonstrate its overall effectiveness of countering the flow of illicit drugs. Specifically, we found that JIATF-West (1) lacks a vital few performance measures that summarize its overall effectiveness that can be consistently assessed over time and (2) that it does not have established targets for assessing the effectiveness of its numerous missions and activities. JIATF-West has focused its performance measures on assessing its numerous initiatives and activities; however, it has not developed a vital few, comprehensive performance measures that summarize the overall effectiveness of its numerous initiatives and activities in a manner that would convey essential information on its counterdrug activities to decision makers at the DOD command level and above. Such information could help these decision makers better understand the overall effectiveness of JIATF-West’s counterdrug missions and activities in relation to broader U.S. counterdrug efforts. For example, JIATF-West could develop a performance measure that calculates the percentage of leads it provides to foreign partners that result in seizures or apprehensions. Such a measure could demonstrate JIATF-West’s overall effectiveness in supporting allies and foreign partners in combating illicit drug trafficking in its area of responsibility, in keeping with one of its operational priorities. Guidance on performance measures from the DOD Office of the Deputy Assistant Secretary of Defense for Counternarcotics and Global Threats states that agencies should develop a vital few measures, no more than two or three, which convey essential information on counterdrug activities to decision makers. JIATF-West used to assess and report such measures as recently as fiscal year 2015. For example, it reported scores on the effectiveness of its mission and broader lines of effort, such as countering illicit drug and precursor chemical flows in its area of responsibility. However, JIATF-West officials told us they stopped reporting on these performance measures in fiscal year 2015 because, from the task force’s perspective, the measures did not provide meaningful insights into the effectiveness of the task force’s operations. However, such performance measures could provide meaningful information on the effectiveness of JIATF-West’s counterdrug activities to decision makers at the DOD command level and above, even if such summary information might not affect the effectiveness of operations at the task force level. We have previously reported on the importance of developing performance measures that demonstrate broader effectiveness and have also reported it is worthwhile for agencies to develop them to better determine and understand the overall effectiveness of their missions and activities. Further, JIATF-West is also unable to assess the effectiveness of its initiatives and activities over time because it has annually changed the way it measures the effectiveness of more than 100 counterdrug initiatives and activities. Specifically, JIATF-West has adjusted how it assesses the initiatives and activities each year since 2014—for example, by changing the weight scale for scoring its initiatives and activities to give more emphasis to some over others. These changes to the methodology make it difficult to compare results and assess the effectiveness of its activities over time. DOD guidance states that agencies should have measures that are consistent over time to capture trend results. In discussing these issues with JIATF-West officials, they stated that assessing the initiatives and activities provides valuable information on the effectiveness of the task force’s efforts for internal, task force management. They acknowledged that JIATF-West’s performance measures could be improved to allow for assessments of the effectiveness of the task force’s activities over time, but they added that they plan to use the same methodology to calculate the task force’s initiatives and activities scores in the future because this information is still needed internally. Given that JIATF-West’s individual initiatives and activities change year to year, however, it will be difficult for JIATF-West to assess trends in the effectiveness of its initiatives and activities over time. By also establishing a vital few, comprehensive performance measures that can be assessed consistently over time, as appropriate, JIATF-West will be able to better convey trends in the overall effectiveness of its counterdrug missions and activities over time. JIATF-West has not developed specific performance targets (i.e., established acceptable levels of performance or outcomes) for its initiatives and activities as part of its documented assessment methodology, and no such targets appear in any of the task force’s annual assessment reports. When assessing its initiatives and activities, JIATF-West officials told us it aims to achieve the best possible outcome—or the highest possible score—for each of the initiatives and activities it undertakes and assesses. DOD guidance states that targets should be set for each performance measure to establish a minimum level of performance to be accomplished within a given time frame. Additionally, establishing specific performance measure targets that set a minimum level of performance to achieve could better encourage the task force to meet the targets and identify ways to improve, as needed. The DHS JTFs were fully operational in fiscal year 2016 and began assessing their performance and producing performance reports in fiscal year 2017. Since they began reporting on their performance, the measures the JTFs reported changed in fiscal year 2018 and, according to JTF officials, will change again in fiscal year 2019. Specifically, in the fiscal year 2017 performance report, the JTFs reported on activities, such as the amounts of drugs seized, arrests made, and currency seized. However, according to task force officials, the 2017 report’s performance measures did not accurately reflect the strategic-level coordination the JTFs performed. For example, the measures the JTFs reported in fiscal year 2017 focused on drug seizures and arrests made by the DHS components. While the drug seizures and arrests made by the DHS components may have been made possible because of coordination activities of the DHS JTFs, using data on drug seizures and arrests as JTF performance measures resulted in double-counting because the components reported on the same seizures and arrests for their respective counterdrug programs. To address these issues for fiscal year 2018, the JTFs and the DHS Coordination Cell developed a new set of performance measures that were intended to better reflect the JTFs’ coordination activities and contributions. For example, a new JTF performance measure developed for fiscal year 2018 included the number of leads that the JTFs provided to a partner law enforcement agency, DHS component, or foreign government partner for interdiction or investigative action. Table 3 shows the evolution of the JTF performance measures from fiscal year 2017 to fiscal year 2018. The 2017 National Defense Authorization Act requires the Secretary of DHS to establish outcome-based and other appropriate performance measures to evaluate the effectiveness of each joint task force. Although the DHS JTF Coordination Cell and the JTFs developed performance measures in fiscal year 2018 that better reflect the specific missions and activities of the three task forces, these measures are focused on outputs—such as the number of operations conducted in combating transnational criminal organizations—and not outcomes, such as the number or percentage of leads that resulted in seizures of illicit drugs. According to JTF Coordination Cell officials, the fiscal year 2018 JTF performance measures are not outcome-based because it is difficult to quantify and capture the contributions of the JTFs through their roles as coordinators and facilitators of missions and activities that are conducted by DHS components. Table 4 illustrates each of the DHS JTF performance results for fiscal year 2018 under the revised measures. In addition to the changes to the performance measures made from fiscal years 2017 to 2018, JTF Coordination Cell officials told us in October 2018 they plan to further revise their performance measures for fiscal year 2019, as they believe their measures could continue to improve to better reflect the value added by the JTFs and their coordination and information-sharing activities. JTF Coordination Cell officials further stated that they had considered linking the fiscal year 2018 performance measures to relevant strategic-level outcomes in DHS plans. However, they noted that such outcomes—including the number of drug seizures and apprehensions—are already reported by the individual DHS components and they are trying to avoid the double-counting that occurred in the fiscal year 2017 performance report. We acknowledge that the types of coordination activities that the JTFs perform are inherently more difficult to measure, but developing and implementing outcome-based performance measures that reflect the value the JTFs add would better position the JTFs to demonstrate the effectiveness of their coordination efforts. For example, a performance measure that calculates the percentage of leads provided to components, partner law enforcement agencies, or foreign government partners that result in a successful seizure or arrest could help demonstrate the JTFs’ contributions to DHS counterdrug efforts. Further, in designing its outcome-based performance measures that are reflective of their coordination and information sharing activities, establishing a consistent set of performance measures across years, as appropriate, will allow the JTFs to better assess and convey their progress over time. In 2017, 70,237 Americans died from an overdose involving synthetic opioids, heroin, cocaine, and other drugs. The number of annual overdose deaths has nearly doubled over the past decade. Combating the trafficking and availability of illicit drugs in the United States is a government-wide priority that requires a coordinated effort by federal departments and agencies with counterdrug responsibilities. JIATF- South, JIATF-West, and the three DHS JTFs are five task forces that are focused on strengthening interagency counterdrug efforts. While these task forces have worked together to coordinate and avoid duplicative activities, improvements to the performance measures used by four of the five task forces could enable them to better determine the effectiveness of their counterdrug missions and activities. In particular, by developing a vital few, comprehensive measures that are consistent from one year to the next, and establishing specific targets against which it can measure its missions and activities, JIATF-West will be better able to determine the effectiveness of its missions and activities and assess performance trends across years. In addition, by developing outcome-based performance measures that are consistent, the JTFs would be better positioned to demonstrate the effectiveness of their counterdrug efforts over time. We are making a total of three recommendations: two for JIATF-West and one for DHS. The Director of JIATF-West should establish a vital few performance measures that are consistently measured over time. (Recommendation 1) The Director of JIATF-West should establish specific targets that set a minimal level of performance. (Recommendation 2) The Secretary of Homeland Security should develop outcome-based performance measures for the DHS JTFs that are consistent. (Recommendation 3) In May 2019, we provided a copy of this report to DOD, DHS, DOJ, and the Office of National Drug Control Policy (ONDCP) for review and comment. In written comments, which are included in appendix II, DOD stated that it concurred with the two recommendations directed to JIATF- West and noted that JIATF-West plans to conduct an internal evaluation to establish a vital few performance measures to allow it to measure performance over time. Additionally, JIATF-West has identified several areas where it can establish specific targets that set a minimal level of performance to support DOD priorities. In its written comments, which are included in appendix III, DHS stated that it concurred with its recommendation and plans to implement new performance measures in a phased approach. DHS also provided technical comments, which we have incorporated into the report, as appropriate. Additionally, ONDCP provided technical comments, which we have incorporated into the report, as appropriate. DOJ did not have any comments on the draft report. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, the Acting Secretary of Defense, and other interested parties. In addition, the report is available at no charge on the GAO website at www.gao.gov. If you or your staffs have any questions about this report, please contact me at (202) 512-3841or AndersonN@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. This appendix provides further details regarding the performance measures and performance targets for the Department of Homeland Security Joint Task Forces. In addition to the contact named above, Christopher Conrad (Assistant Director), Kelsey Hawley (Analyst-in-Charge), and Julia Vieweg made key contributions to this report. Also contributing to the report were Billy Commons, Pamela Davidson, David Dornisch, Eric Hauswirth, and Susan Hsu. Drug Control: DOD Should Improve Its Oversight of the National Guard Counterdrug Program. GAO-19-27. Washington, D.C.: January 17, 2019. Colombia: U.S. Counternarcotics Assistance Achieved Some Positive Results, but State Needs to Review the Overall U.S. Approach. GAO-19-106. Washington, D.C.: December 12, 2018. Illicit Opioids: Office of National Drug Control Policy and Other Agencies Need to Better Assess Strategic Efforts. GAO-18-569T. Washington, D.C.: May 17, 2018. Illicit Opioids: While Greater Attention Given to Combating Synthetic Opioids, Agencies Need to Better Assess their Efforts. GAO-18-205. Washington, D.C.: March 29, 2018. Counternarcotics: Overview of U.S. Efforts in the Western Hemisphere. GAO-18-10. Washington, D.C.: October 13, 2017. Border Security: Additional Actions Could Strengthen DHS Efforts to Address Subterranean, Aerial, and Maritime Smuggling. GAO-17-474. Washington, D.C.: May 1, 2017. Coast Guard: Resources Provided for Drug Interdiction Operations in the Transit Zone, Puerto Rico, and the U.S. Virgin Islands. GAO-14-527. Washington, D.C.: June 16, 2014. Combatting Illicit Drugs: DEA and ICE Interagency Agreement Has Helped to Ensure Better Coordination of Drug Investigations. GAO-11-763. Washington, D.C.: July 28, 2011.", "summary": "The U.S. government has identified illicit drugs, as well as the criminal organizations that traffic them, as significant threats to the United States. In 2017, over 70,000 people died from drug overdoses, according to the Centers for Disease Control and Prevention. DOD and DHS created joint task forces to help facilitate and strengthen interagency efforts in combating the flow of illicit drugs, particularly in the maritime domain. GAO was asked to review the structure of these task forces and their ability to coordinate and conduct missions effectively. Among other objectives, this report (1) assesses the extent to which the task forces coordinate effectively to minimize duplication, and (2) examines how the task forces measure the effectiveness of their missions and activities. GAO reviewed and assessed documentation on the task forces' missions, coordination efforts, and performance assessments and compared them to best practices from prior work, departmental guidance, and federal internal control standards. GAO also met with task force officials to discuss and observe planning and coordination activities. Many federal agencies are involved in efforts to reduce the availability of illicit drugs by countering the flow of such drugs into the United States. Among them are the Department of Defense (DOD), which has lead responsibility for detecting and monitoring illicit drug trafficking into the country, and the Department of Homeland Security (DHS), which is responsible for securing U.S. borders to prevent illegal activity. DOD and DHS lead and operate task forces—Joint Interagency Task Force (JIATF)-South, JIATF-West, and three DHS Joint Task Forces (JTF)—to coordinate and conduct counterdrug missions and activities. Task force officials reported that the task forces coordinated effectively with each other when they had shared purposes and overlapping or shared geographical boundaries (see map). The task forces also used coordination mechanisms that align with best practices, such as working groups and liaison officers, to minimize duplication of their missions and activities. Note: DHS also has JTF-Investigations, which is a functional task force with no geographic area of responsibility. Each of the five task forces GAO reviewed has performance measures, but only JIATF-South uses output (e.g., number of detected smuggling events) and outcome-based measures to assess the effectiveness of its activities. Specifically, JIATF-South developed an outcome-based measure of its overall effectiveness: the percentage of smuggling events it detected and provided to law enforcement that resulted in disrupted or seized illicit drugs. JIATF-West evaluates its numerous initiatives and activities, for instance, by determining if they were executed as planned, but has not established a vital few performance measures that consistently convey the overall effectiveness of its activities. Lastly, the DHS JTFs' performance measures are not outcome-based and do not fully assess the effectiveness of the task forces' activities. Enhancing their measures would better position JIATF-West and the JTFs to demonstrate contributions and convey trends in the overall effectiveness of their activities. GAO is making three recommendations, including that JIATF-West establish a vital few, consistent performance measures for its overall performance; and that DHS develop outcome-based performance measures for the JTFs' activities. DOD and DHS concurred with the three recommendations.", "document_type": "gao"}
{"report": "The 8(a) program is designed to assist small, disadvantaged businesses in competing in the American economy through business development. Over the course of the program, qualified small, disadvantaged businesses can receive business development support from SBA, such as mentoring, procurement assistance, business counseling, training, financial assistance, surety bonding, and other management and technical assistance. One of the key areas of support is eligibility for competitive and sole-source federal contracts that are set aside for 8(a) businesses, which can be an important factor of the financial development for ANC-owned firms. Oversight and monitoring of all firms participating in the 8(a) program are delegated to each of SBA’s 68 district offices nationwide. Of its 68 district offices—staff at the Alaska District Office were assigned and oversaw the majority of all participating ANC-owned firms. ANCs and ANC-owned firms have a unique status in the 8(a) program and can enter into complex business arrangements In terms of their organizational structures, ANCs can be either for-profit or not-for-profit and can own a family of for-profit subsidiary firms, including but not limited to, wholly owned holding companies that often provide administrative support to smaller sister ANC-owned firms. As a condition of the 8(a) program, participating ANC-owned firms must be for-profit. Generally, ANC-owned firms can remain in the 8(a) program for up to 9 years, provided they maintain their eligibility. During the first four “developmental” years, participating firms may be eligible for assistance in program areas including sole-source and competitive 8(a) contract support, and training in business capacity development and strategies to compete successfully for both 8(a) and non-8(a) contracts, among other things. In the last 5 years, firms prepare to transition out of the program, and are required to obtain a certain percentage of non-8(a) revenue to demonstrate their progress in developing into a viable business that is not solely reliant on the 8(a) program. Across three reports on SBA’s 8(a) program, we have found persistent weaknesses in the oversight and monitoring of participating Tribal firms, in particular ANC-owned firms. Specifically, we found that SBA had (1) incomplete information and documentation on ANC-owned firms’ compliance with regulatory requirements; (2) limitations in its ability to track and share key program data needed to enforce revenue rules of Tribal firms, including ANC-owned firms; (3) insufficient staffing in its Alaska District Office to carry out necessary and critical monitoring tasks of ANC-owned firms; and (4) inadequate program guidance for clearly communicating to staff how to interpret new regulations. Incomplete information and documentation on ANC-owned firms and their compliance with regulations: We reported in 2016 that during a 2014 site visit to the Alaska District Office, we noted that incomplete information and documentation limited SBA’s oversight of the regulatory requirements specific to ANC-owned firms we examined. For example, SBA faced significant challenges in providing us with very basic information on ANC-owned firms, such as the total number of firms serviced by the agency. For example, during the course of our review, it took 3 months for SBA to provide us with a list of ANC-owned firms in the 8(a) program, and on three separate occasions SBA officials provided three separate numbers for the total number of ANC-owned firms— ranging from 226 to 636. We noted in our 2016 report that SBA’s inability to account for and make available principal information on all of the ANC- owned firms participating in the program raises concerns about the integrity of the agency’s internal controls and ability to provide effective and sustained oversight. As another example, we reported in 2016 that SBA was unable to provide seven of 30 required agency offer letters for 8(a) contracts that we requested for our review of contracts that may have been follow-on, sole- source contracts. According to the regulation, these required offer letters are critical documents that could have assisted SBA staff in understanding a contract’s acquisition history and any small business that performed this work prior to any subsequent awards. Once an applicant is admitted to the 8(a) program, it may not receive an 8(a) sole-source contract that is also a follow-on contract to an 8(a) contract that was performed “immediately previously” by another 8(a) program participant (or former participant) owned by the same ANC. We found that SBA’s inability to enforce the regulatory prohibition against follow-on, sole- source contracts was directly tied to the quality of the documentation it collected from contracting agencies. While we found that one program official in the Alaska District Office took steps during our 2016 review to ask agencies to specifically report whether contracts are follow-on, sole- source awards in offer letters, we have no evidence supporting that this practice was more broadly adopted by the program as a whole. Ultimately, we recommended and SBA agreed to enhance its internal controls and oversight of ANC-owned firms in the 8(a) program by ensuring that all ANC-owned firm files contain all relevant documents and information and providing additional guidance and training to SBA staff on the enforcement of related policies, among other things. Limitations in tracking and sharing key program data needed to enforce 8(a) revenue rules: In all three reports mentioned in this testimony, we found that SBA faced limitations in tracking information on the primary revenue generators for Tribal firms, including ANC-owned firms, to ensure that multiple firms under one parent ANC are not generating their revenue in the same primary line of business—that is, expressed as and operating under the same North American Industry Classification System (NAICS) code—which SBA’s regulation intends to limit. As discussed later in this testimony, we first identified this issue in our 2006 report, noting that SBA was not effectively tracking ANC-owned firms’ revenue data to ensure that the sister firms were not generating the majority of revenue in the same line of business. We recommended that SBA collect information on the participation of 8(a) ANC-owned firms as part of required overall 8(a) monitoring, to include tracking the primary revenue generators for ANC-owned firms and to ensure that multiple subsidiaries under one ANC are not generating their revenue in the same primary line of business. Then in our 2012 report, we found that SBA had not addressed this limitation and recommended that SBA develop a system that had the capability to track revenues from ANC-owned firms’ primary and secondary lines of business to ensure that ANC-owned firms under the same parent ANC are not generating the majority of their revenue from the same primary line of business. In our 2016 report, we found that SBA still had not developed such a system and thus was not effectively tracking and sharing the type of revenue information needed to ensure 8(a) ANC-owned firms are following the intent of 8(a) revenue rules. For example, we found that without such a system, sister ANC-owned firms owned by the same ANC could circumvent the intent of the prohibition. In particular, one sister ANC-owned firm could generate a greater portion of revenues under its secondary line of business that another sister ANC-owned firm is using as its primary line of business. Although this type of activity is not prohibited, we determined that if such activity is left untracked, a firm’s secondary line of business could effectively become its primary revenue source in the same line of business that its sister firm claims for its primary line of business without actually violating SBA’s regulation. During our 2016 review, we found 5 pairs of ANC-owned firms participating in the 8(a) program from fiscal years 2011 through 2014 that concurrently generated millions of dollars in the same line of business as their sister ANC-owned firm’s primary line of business, while generating less or no revenue under their own primary line of business. As we found then, such activity could, intentionally or not, potentially circumvent the intent of SBA’s prohibition, and as discussed later, we recommended that SBA take action to prevent ANC-owned firms from circumventing this rule. Figure 1 below illustrates one example we reported on in our 2016 report. Insufficient staffing levels in SBA’s Alaska District Office: In our 2006 report, we noted that SBA lacked adequate staffing levels in the Alaska District Office—a district office responsible for the oversight of the majority of ANC-owned firms. Our reports, and a 2008 report issued by the SBA’s Office of the Inspector General, have shown that inadequate staffing was a long-standing challenge and a consistent weakness that directly contributed to SBA’s inability to provide adequate oversight. In our 2012 report, we noted that ANC-owned firms could quickly outgrow the program. It should be noted that we recommended that SBA evaluate its staffing levels in 2006, and in our 2016 report, we found that the staffing challenges persisted. As a result, we found that SBA needed a sustained and comprehensive approach to staffing its Alaska District Office in order to conduct sufficient oversight of ANC-owned firm activities. We were told that frequent staff turnover directly contributed to the limited number of staff in the Alaska District Office with ANC firm expertise—limiting their ability to conduct effective and timely oversight of the ANC-owned firms participating in the program. An SBA official told us at the time that the optimum number of staff for the Alaska District Office was five with no more than 100 assigned 8(a) firm files each; however, that office had 1.5 staff responsible for about 200 files each. We found, based on SBA documentation and observation during our site visit to Alaska that, because of this staffing shortage, supervisory review of contract monitoring activities and annual reviews fell behind, resulting in a backlog of oversight duties related to ANC-owned firms. In 2016, we found that SBA took some short-term actions to address the issues that we identified, such as temporarily redistributing the management of ANC-owned firm files across several other district offices and within the Alaska District Office. As for long-term action, SBA officials provided us with documentation describing the program’s long-term staffing strategy, which included succession planning and managing attrition. For example, SBA planned to hire four additional BOS, and an attorney who understands ANCs. At that time, SBA began implementing its staffing strategy by hiring additional business opportunity specialists for its Alaska District Office. However, we have not evaluated whether the agency implemented the remainder of its strategy for succession planning and managing attrition. Inadequate program guidance: We reported that SBA lacked program guidance that could have assisted the Alaska District Office in improving staff’s knowledge of program rules and monitoring practices. We initially raised our concern about the need for strong guidance in 2006 given the unique status in the 8(a) program and relationships entered into by ANC- owned firms. For our 2012 report, SBA officials told us that it was in the process of updating its program guidance for the program. However, in our 2016 report, we similarly found that staff lacked sufficient guidance and training on key program regulations and internal monitoring practices, and concluded that resulting inconsistent supervisory review of ANC transactions and related documentation increased SBA’s vulnerability to compliance and fraud risks. Several months after we issued our report in 2016, SBA issued updated standard operating procedures on program rules that address the 2011 regulatory changes related to sister ANC-owned firms receiving follow-on, sole-source contracts and sister subsidiaries sharing primary NAICS codes. In addition to updating the guidance, SBA also provided training to its Alaska District Office staff on its 2011 regulations, specifically training on prohibitions against follow-on sole source contracts. SBA officials also told us in 2016 that staff in the Alaska District Office were provided training in supervisory review and other critical file management procedures, which we noted were weaknesses. To address the weaknesses described above, as well as others related to oversight and monitoring, our 2006, 2012, and 2016 reports contained a total of 21 recommendations to SBA. While SBA has fully implemented 15 of these recommendations, SBA has not implemented six recommendations—three of which we highlight in this statement. All six recommendations are important to enhancing SBA’s oversight of ANC-owned firms in the 8(a) program. We have not evaluated the operational effectiveness of SBA’s actions to implement the 15 recommendations, but if effectively implemented, those actions should help SBA improve its oversight and monitoring of ANC-owned firms in the 8(a) program. In response to our recommendations, SBA’s actions included providing training to its staff that emphasized regulations governing the requirement for procuring agencies to specifically state whether a contract is a follow-on contract in their offer letters, which could help reduce the award of a follow-on, sole-source contracts to sister ANC- owned firms; developing and enacting a regulation that gives SBA the authority, under certain circumstances, to change an ANC-owned firm’s primary line of business (expressed as a NAICS code) to the NAICS code that generates the greatest portion of the firm’s revenue; this action is intended to help SBA enforce rules preventing sister ANC-owned firms from operating in the same primary lines of business; and updating and providing written guidance to field staff officials on the enforcement of follow-on sole-source contract regulations. However, to date SBA has not provided us with evidence that it has implemented the three following recommendations, which if implemented as intended, could significantly improve its oversight of the 8(a) program. Absent action on these recommendations, SBA exposes the program to continued noncompliance. Tracking revenue data and other information on 8(a) ANC-owned firms: As previously discussed, SBA’s regulation prohibits ANCs from owning multiple firms that operate under the same primary line of business (expressed as a primary NAICS code). In each of our 2006, 2012, and 2016 reports we identified weaknesses in SBA’s ability to track this information in order to prevent sister ANC-owned firms from violating this rule or circumventing its intent. As a result, in 2006 we recommended that SBA track the primary revenue generators for ANC-owned firms and to ensure that multiple subsidiaries under one ANC are not generating their revenue in the same primary line of business, among other things. Similarly, in 2012 we recommended that, as SBA is developing a tracking system, it should take steps to ensure that the system tracks information on ANC-owned firms, including revenues and other information. In 2006 and 2012, SBA did not indicate whether it agreed with and intended to implement these recommendations. However, during our 2016 audit, SBA informed us that it had plans to address this issue, but could not provide any details. We therefore recommended in 2016 that SBA document this planned method for tracking revenue generated under subsidiaries’ primary and secondary lines of business. SBA agreed to implement this 2016 recommendation. As part of this recommendation, we stated that SBA’s documentation should include milestones and timelines for when and how the method will be implemented. We also recommended that SBA provide the appropriate level of access to and sharing of relevant subsidiary data across district offices, including primary and secondary lines of business and revenue data, once SBA develops a database with the capabilities of collecting and tracking these revenue data. In August 2018, SBA informed us that regulations promulgated in 2016 allow it to change an 8(a) ANC-owned firm’s primary line of business under certain circumstances if the greatest portion of the firm’s revenues evolved from one line of business to another. In our 2016 report, we concluded that the new regulations were a step in the right direction but would be difficult to implement effectively without the proper tracking and visibility of revenue data that we describe above and in our 2016 report. In 2018, SBA officials noted that they were testing an analytics tool that, they said, would allow them to track revenues for ANC-owned firms, as we recommended. SBA’s estimated completion date for the evaluation and implementation of this tool was December 31, 2018, but as of October 2019, SBA has not been able to provide documentation on whether this action has been implemented. We will continue to monitor SBA’s efforts to implement this recommendation. Criteria thresholds for contract modifications: As we reported in 2006, SBA regulation requires that when the contract execution function is delegated to the procuring agencies, these agencies must report to SBA certain 8(a) information, including contract modifications. Further, the agreements between SBA and the procuring agencies that we reviewed in 2006 require that the agencies provide SBA with copies of all 8(a) contract modifications within 15 days of the date of the contract award. However, in our 2006 report, we found that contracting officers were not consistently following these requirements. While some had notified SBA when incorporating additional services into the contract or when modifying the contract ceiling amount, others had not. Hence, we recommended that when revising relevant regulations and policies, the SBA Administrator should revisit the regulation that requires agencies to notify SBA of all contract modifications and consider establishing thresholds for notification. In 2006, SBA disagreed with this recommendation and thus had not revisited this regulatory requirement, but rather reiterated a preexisting requirement to provide all contract modifications, including administrative modifications, to SBA. We determined that this action did not fulfill our recommendation as it does not help to ensure that agencies are going to comply with the regulatory requirement. Small businesses potentially losing contracts to 8(a) ANC-owned firms: In our 2006 report, we found SBA’s oversight had fallen short in that it did not consistently determine whether other small businesses were losing contracting opportunities when large, sole-source contracts were awarded to ANC-owned firms. Further, we found cases where SBA did not take action when incumbent small businesses lost contract opportunities when ANC-owned firms were awarded a large sole-source contract. Hence, we recommended, that when revising relevant regulations and policies, the SBA Administrator should consistently determine whether other small 8(a) businesses are losing contracting opportunities when awarding contracts through the 8(a) program to ANC- owned firms. SBA did not agree with this recommendation, nor did it address the intent of this recommendation by developing a procedure to consistently perform this action. Instead, SBA reported to us that in 2009 it performed a single analysis of a limited set of procurement data from a limited period and concluded the data did not indicate that other small 8(a) firms (e.g., small businesses which are unconditionally owned and controlled by one or more socially and economically disadvantaged individuals, such black-owned and Hispanic-owned firms) were losing contracting opportunities to ANC-owned firms. We continue to believe that without a strategy for consistent monitoring of this issue, SBA is limited in determining the extent to which other small 8(a) businesses are being adversely impacted by contracts awarded to ANC-owned firms. In summary, the findings I have described in my statement today have persisted over time as SBA has struggled to articulate and execute an effective overall monitoring and oversight strategy. Implementing our remaining recommendations could help SBA address its monitoring and oversight control weaknesses in a comprehensive manner. Chairwoman Chu, Ranking Member Spano, and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information regarding this testimony, please contact Seto J. Bagdoyan, (202) 512-6722 or bagdoyans@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony are: Latesha Love (Assistant Director), Tatiana Winger (Assistant Director), Flavio Martinez (Analyst in Charge), Carla Craddock, April VanCleef, Tracy Abdo, Marcus Corbin, Colin Fallon, Julia Kennon, Barbara Lewis, Michele Mackin, Maria McMullen, James Murphy, Anna Maria Ortiz, William Shear, and Erin Villas. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Federal obligations under SBA's 8(a) Business Development Program totaled about $10.9 billion in fiscal year 2019, according to federal procurement data reported as of October 7, 2019. SBA's 8(a) program is one of the federal government's primary vehicles for developing socially and economically disadvantaged small businesses, including firms owned by ANCs. One of the key benefits of this program is the ability for ANC-owned firms to receive federal contract awards that have been set aside solely for 8(a) firms. From 2006 through 2016, GAO issued three reports detailing the limitations of SBA's oversight and monitoring of ANC-owned firms participating in the 8(a) program. GAO's testimony discusses the highlights of the aforementioned three reports and the extent to which SBA has addressed the recommendations GAO made in those reports, as of October 2019. GAO examined SBA files and other documents, conducted site visits, and interviewed program officials to perform the work of those reports. In three reports issued between 2006 and 2016, GAO has found persistent weaknesses in the Small Business Administration's (SBA) oversight and monitoring of Tribal 8(a) firms, in particular the Alaska Native Corporations' (ANC) subsidiary firms (ANC-owned firms) that participate in SBA's 8(a) program. Over the course of the program, qualified small, disadvantaged businesses, including ANC-owned firms, can receive federal contract awards that have been set aside solely for such businesses, and business development support from SBA, such as mentoring, financial assistance, and other management and technical assistance. In its three reports, among other things, GAO found that SBA had (1) incomplete information and documentation on ANC-owned firms and their compliance with regulatory requirements; (2) limitations in its ability to track and share key program data needed to enforce its own program; (3) insufficient staffing in its Alaska District Office to carry out necessary and critical monitoring tasks; and (4) inadequate or vague program guidance for clearly communicating to staff how to interpret new regulations. GAO made 21 recommendations to SBA that address weaknesses in SBA's oversight and monitoring of ANC-owned firms participating in the 8(a) program. SBA has taken steps to implement many of those recommendations, including enhancing training for SBA staff that emphasized program rules, and developing and implementing a regulation that helps SBA better enforce rules against ANC-owned firms obtaining contracts for which they were not necessarily eligible. However, SBA has not yet implemented recommendations that, if implemented as intended, could significantly improve its oversight of the 8(a) program. For example, SBA has not yet addressed limitations raised in GAO's 2006 and 2016 reports regarding SBA's tracking of revenue information for ANC-owned firms, which limits SBA's oversight of 8(a) rules prohibiting multiple subsidiaries under one ANC from generating revenue in the same primary line of business—which 8(a) program regulations intend to limit. SBA officials informed GAO of the agency's plans to develop an information system capable of addressing this issue. However, at the time of GAO's 2016 report, SBA could not provide detailed information or plans about this system, and as of today, the agency could not provide documentation that this system is operational. As another example, SBA has not addressed GAO's 2006 recommendation to consistently determine whether other small businesses are losing contracting opportunities when SBA awards contracts through the 8(a) program to ANC-owned firms, as required in regulation—an area where GAO found that SBA had fallen short in its oversight. Instead, in 2009, SBA reported that it performed a single analysis of a limited set of procurement data from a limited period and concluded the data did not indicate that other small 8(a) firms (e.g., black-owned, Hispanic-owned, and others) were losing contracting opportunities to ANC-owned firms. However, SBA's actions did not address the intent of GAO's recommendation to “consistently” perform this oversight. Absent action on these recommendations, the program continues to be at risk of noncompliance. GAO made multiple recommendations in its reports from 2006 through 2016, many of which SBA has taken steps to implement. However, SBA has not addressed key GAO recommendations, including tracking and sharing ANC-related information across SBA regional offices, considering the establishment of criteria thresholds for contract modifications, and developing policies to consistently assess whether other small businesses are losing 8(a) contracts to ANC-owned firms. GAO continues to believe that implementing these recommendations would enhance SBA's oversight and monitoring of firms in the 8(a) program.", "document_type": "gao"}
{"report": "Entities seeking to do business with DOD may have opaque ownership structures that obscure ownership or control by other entities or individuals. Beneficial Owner For the purposes of this report, we define a beneficial owner as the natural person or persons who directly or indirectly own and control, or receive substantial economic benefit from, a company. As the number of layers of ownership increases, ownership information becomes more opaque, as shown in figure 1. This opacity can make it difficult for DOD to determine which entities and individuals ultimately own or control its contractors. In the United States, no centralized information source or national registry maintains company ownership information. In 2014, the National Association of Secretaries of State found that most states collect minimal ownership data. The association reviewed key information collected by the 50 states and the District of Columbia during the entity-formation process and in annual or periodic reports. During both the entity-formation process and in annual or periodic reporting, the association found that very few states collect some form of entity ownership or control information from limited liability companies or corporations. The Securities and Exchange Commission collects some ownership information on publicly traded companies. Any person or group of persons that acquires beneficial ownership of more than 5 percent of a publicly traded company’s registered voting securities must register with the Securities and Exchange Commission. Institutional investment managers regularly disclose their holdings, and company officers, directors, and holders of more than 10 percent of a class of the company’s registered equity securities must file a statement of ownership with the Securities and Exchange Commission. GSA’s SAM is a federal government-wide database for vendor data that is used across all federal agencies. Any entity that wishes to do business with the government must register in SAM to be eligible to receive a contract award, except in specific circumstances outlined in the law and FAR. To increase procurement transparency and traceability, and broaden the government’s ability to implement fraud-detection technologies, the FAR was amended to begin requiring entities that wish to do business with the federal government to provide additional ownership information through the annual registration process in SAM starting on November 1, 2014. The required ownership information includes the “immediate” and “highest” level ownership of an offeror, as shown in figure 2 below. The FAR includes a requirement for ownership to be provided at the entity level. There is no requirement for offerors to report their beneficial owners. The FAR contains several provisions governing the selection of an offeror. Provisions such as price and past performance of the offeror are generally applicable in determining which offeror should win a contract. Additional requirements may apply to certain types of procurements, such as the procurement of national security systems. We outline several of the relevant FAR provisions; however, this does not represent a comprehensive list of all steps required by the FAR in making contract- award decisions. A prospective contractor must affirmatively demonstrate its responsibility, including, when necessary, the responsibility of its proposed subcontractors. Contracting officers must then determine the responsibility of prospective contractors, including whether prospective contractors can perform the terms of a contract. To be determined responsible, a prospective contractor must have adequate financial resources to perform the contract (or the ability to obtain them); be able to comply with the required delivery or performance schedule; have a satisfactory performance, integrity, and ethics record; have the necessary organization, experience, accounting and operational controls, and facilities to carry out the contract (or the ability to obtain them); and be otherwise qualified and eligible to receive an award under applicable laws and regulations. Before awarding a contract over the simplified acquisition threshold (generally $250,000 at the time of our review), a contracting officer must review the prospective contractor’s performance and integrity information available in the Federal Awardee Performance and Integrity Information System (FAPIIS). FAPIIS is a federal government-wide database designed to assist contracting officers with making a responsibility determination by providing integrity and performance information of covered federal agency contractors and grantees. FAPIIS provides a prospective contractor “Report Card” that includes information pertaining to the prospective contractor’s past performance (if applicable), such as any administrative agreements, contract terminations, nonresponsibility determinations, and exclusions, among other things. It also includes the ability to view the company relationship information, which details the ownership information that prospective contractors are required to report in SAM. When making a responsibility determination, the contracting officer must consider all the information available through FAPIIS with regard to the prospective contractor and any immediate owner, predecessor (an entity that the prospective contractor replaced by acquiring assets and carrying out affairs under a new name), or subsidiary identified for that prospective contractor in FAPIIS. The contracting officer must document in the contract file how the information in FAPIIS was considered in any responsibility determination, as well as the action that was taken as a result of the information. DCMA can play a role in supporting contracting officials in making responsibility determinations. For example, DCMA officials stated that they may provide information on a company’s business systems, financial capabilities, and company history, and assess whether the prospective contractor is likely to stay in business for the duration of the contract. When assessing the capacity to perform a contract, DCMA officials stated they examine company assets as a whole, including any parent company, to make a determination. According to officials, DCMA’s goal for identifying the organizational structure is to determine whether the company as a whole has the assets to perform the contract rather than to identify fraud or other risks that may be associated with that company. The level and type of support that DCMA provides to contracting officials depends on the particular needs of contracting officials for any given procurement. Some contracts require contractors to comply with cost- accounting standards and submit disclosures of their cost-accounting practice to show from which specific business units they receive allocations and to which specific business units they pass allocations; however, these disclosures are only required after a contract that is covered by cost-accounting standards is awarded. Contract award decisions are based on evaluation factors and significant subfactors that are tailored to the procurement, at the discretion of procurement officials. At a minimum, these factors must include: price/cost, quality, and past performance. Federal law grants DOD additional authority to use public and nonpublic information to make source-selection decisions when acquiring national security systems. DOD may exclude an offeror if necessary to protect national security by reducing supply-chain risk. Under this authority, DOD does not have to disclose the reason an offeror was excluded, nor can the offeror protest DOD’s decision. The FAR requires contracting officers to purchase supplies and services from responsible sources at fair and reasonable prices. For negotiated contracts, price reasonableness is ordinarily established by adequate competition, such as when there are more than two responsible offerors competing independently. For noncompetitive purchases with only one offeror, the contracting officer must obtain certified cost or pricing data, or data other than certified cost or pricing data, as necessary to establish a fair and reasonable price. Procurements with only one offeror may still be considered competitive if there was a reasonable expectation that two or more responsible and independent offerors would submit offers and the offeror submitted the offer with the expectation of competition. Section 841 of the 2015 National Defense Authorization Act grants DOD and other federal agencies the authority to limit contracts with entities that provide funds to a person or group that actively opposes U.S. or coalition forces involved in a contingency operation in which members of the armed forces are actively engaged in hostilities. It also allows agencies to terminate for default, void, or restrict the award of a contract to any contractor that provides funds received under a federal contract directly or indirectly to entities actively opposing U.S. forces engaged in hostilities. Fraud and “fraud risk” are distinct concepts. Fraud involves obtaining something of value through willful misrepresentation and is challenging to detect because of its deceptive nature. Fraud risk exists when individuals have an opportunity to engage in fraudulent activity, have an incentive or are under pressure to commit fraud, or are able to rationalize committing fraud. When fraud risks can be identified and mitigated, fraud may be less likely to occur. According to federal standards and leading practices, executive-branch agency managers are responsible for managing fraud risks and implementing practices for combating those risks. Federal internal control standards call for agency management officials to assess the internal and external risks their agencies face as they seek to achieve their objectives. The standards state that, as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks. In July 2015, GAO issued its Fraud Risk Framework, which provides a comprehensive set of key components and leading practices that serve as a guide for agency managers to use when developing efforts to combat fraud in a strategic, risk-based way. The Fraud Risk Framework consists of four components to effectively manage fraud risk: Assess, Design and Implement, Evaluate and Adapt, and Commit. The Assess component calls for federal managers to plan regular fraud risk assessments and to assess risks to determine a fraud risk profile. Identifying fraud risks is one of the steps included in the Fraud Risk Framework for assessing risks to determine a fraud risk profile. The fraud risk profile supports the development of a strategy to mitigate fraud risks. The Fraud Reduction and Data Analytics Act of 2015 (FRDAA), enacted in June 2016, requires the Office of Management and Budget to establish guidelines for federal agencies to create controls to identify and assess fraud risks and to design and implement antifraud control activities. The act further requires the Office of Management and Budget to incorporate the leading practices from the Fraud Risk Framework in the guidelines. In July 2016, the Office of Management and Budget published guidance about enterprise risk management and internal controls in federal executive departments and agencies. Among other things, this guidance affirms that managers should adhere to the leading practices identified in the Fraud Risk Framework. The act also requires federal agencies to submit to Congress a progress report each year for 3 consecutive years on the implementation of the controls established under the Office of Management and Budget guidelines, among other things. Recent GAO work examined federal agencies that are subject to FRDAA, including DOD, and found that 85 percent of those agencies have started planning and 78 percent have started implementing efforts to meet FRDAA requirements; however, the majority of these efforts were characterized as not being mature. Maturity was determined by agency responses to a survey question that asked whether the agency’s status of implementing FRDAA requirements was “not started,” “started but not mature,” or “mature.” The report identified the number and percentage of agencies that fell into each of these status categories, but did not state the level of maturity for any individual agency. Contractors with opaque ownership structures can pose a range of financial and nonfinancial fraud and national security risks to DOD by misrepresenting or concealing company ownership information to commit fraud against the government or to do harm to U.S. national security concerns. We identified multiple types of fraud and national security risks by examining 32 cases for fraud involving DOD contractors that were adjudicated or settled from calendar years 2012 through 2018 and conducting interviews with knowledgeable DOD officials and criminal investigators. There may be additional risks and cases related to contractor ownership that are not identified below. Court cases we identified were investigated by DOD and other entities based on, for example, information from whistleblowers, defective parts received by DOD, lawsuits involving contractors, and U.S. government officials determining they were receiving false contractor information. As discussed later in this report, DOD has not systematically assessed risks posed by contractor ownership; therefore the magnitude and prevalence of the risks we identified are not known. Appendix II of this report contains a complete listing and additional details of the 32 cases we identified. Contractors can use opaque ownership structures for illicit financial gain through a variety of methods, as described below. Concealing relationship with subcontractor to inflate prices. Contractors can subcontract with companies they own or control to inflate prices for financial benefit. For example, in a 2014 federal court case we examined, a contractor and another company with common ownership pled guilty to major fraud against the United States. They agreed to pay $434 million in criminal penalties and to settle a lawsuit in connection with concealing their relationship with a subcontractor that the contractor directed to fraudulently mark up costs on items that the contractor purchased and resold to DOD. Specifically, the contractor purchased goods from a company that its owners created, controlled, and used to make the fraudulent markups appear legitimate. Further highlighting the relationship between the company and the contractor, contractor personnel were also responsible for hiring individuals to work for the subcontractor. The contractor billed the government an artificially high price for the goods from July 2005 through April 2009 and resulted in a loss to DOD of $48 million. Figure 3 below illustrates this scheme to conceal ownership and fraudulently inflate prices. Billing for work not performed. Contractors or subcontractors can bill for work not performed by creating fictitious invoices that add costs to a contract. For example, in four court cases we examined, multiple DOD subcontractors were actually shell companies that did not have the inventory they purported to ultimately provide to the government or perform the work indicated in the contract requirements. According to documents filed in U.S. district court, some of these subcontractors hired other companies to perform work, but created additional invoices that added costs for work the subcontractors did not perform. These additional costs were then passed on to DOD. Disguising conflicts of interest. Contractors or subcontractors can conceal conflicts of interest for financial benefits. We identified a case involving a DOD subcontractor that concealed ownership for illicit financial gain. According to court records, a DOD contractor employee and his spouse formed a company and concealed their interests by not listing their names but listing the names of family members on formation documents. This company became a subcontractor to the company that employed the DOD contractor. The contractor employee, in his official position, wrote letters justifying awards of purchase orders to the subcontractor he owned and approving recommendations that the awards be made to the subcontractor. The co-owner of the subcontractor concealed her involvement by signing contracts using a different name, knowing that the use of her real name could reveal the DOD contractor employee’s ownership of the subcontractor and affect the awards. Creating the appearance of competition on a contract to inflate prices. In our review of 32 cases, we also identified the potential risk of companies creating the appearance of competition by submitting bids from fictitious companies. Specifically, we identified one case that involved a DOD contractor whose executives admitted as part of their plea agreements to creating fictitious, inflated bids that were not from actual businesses to ensure that the contractor’s own bid would be selected by DOD as the supposed lowest. In this instance, the contractor was required to obtain at least two competitive bids for certain services and items and provide the bids to DOD for selection. As part of their plea agreements, the individuals involved with the scheme also admitted that the scheme allowed the contractor to control and inflate the prices charged to DOD without any true, competitive bidding, as required. The contractor also fraudulently inflated invoices that were sent to DOD, and two individuals involved in the scheme admitted they were aware of losses to DOD of at least $34.8 million. Court records state that the scheme took place from 2011 to 2013. In 2017, two contractor executives involved with this scheme were sentenced to prison for 70 and 46 months. Additionally, we identified additional cases involving this contractor and its owner bribing government officials in exchange for the approval of fraudulent invoices, steering contracts, and covering up the contractor’s overcharging practices, which has led to at least 22 individuals pleading guilty. Additionally, DOD officials from Defense Pricing and Contracting and DLA identified the risk of different companies concealing common ownership to create the appearance of competition on a solicitation and attempt to inflate prices. By analyzing a subset of DOD solicitation data, we further examined the risk that contractors could disguise their ownership to create the appearance of competition. We identified potential relationships among the offerors of solicitations that could indicate common ownership. Our analysis of responses to approximately 2,700 solicitations in the Federal Business Opportunities (FBO) website from fiscal years 2015 through 2017 found indications that at least 16 offerors were potentially related to at least one other offeror when bidding on the same solicitation. This analysis shows indications that offerors may not always compete independently and the relationship among offerors is not always readily apparent to contracting officials or disclosed in SAM registration information. Specifically, we identified the following types of potential relationships among offerors. Offerors who shared the same management. We identified two offerors who each submitted bids on the same three solicitations and also shared the same mailing address and point-of-contact address, including suite number. According to the companies’ websites, the owner (who was also the President and Chief Executive Officer) for one offeror was the President and Chief Executive Officer of the other offeror. Further, both companies shared the same management team and neither company had reported any ownership information in SAM. According to DOD contracting officials, no additional information was disclosed to the contracting office for these offerors, nor were they otherwise aware of the potential relationship. Figure 4 below shows an example from one solicitation. Offerors who were potentially related to an entity excluded from doing business with the government. We identified two offerors who were potentially related to a third offeror who was actively excluded from doing business with the government. One of these offerors bid together with the excluded offeror on eight solicitations. Figure 5 below shows an example of one solicitation. In addition, a third potentially related offeror was identified as sharing information with one of these offerors who later bid together on a ninth solicitation. For one of the nine solicitations, one of the offerors potentially related to the excluded company was awarded a contract. According to DOD contracting officials, no additional information was disclosed to the contracting office for these offerors, nor were they otherwise aware of the potential relationship. Offerors who shared other information. We identified 11 offerors who shared other information with at least one other offeror when bidding on the same solicitation. In some instances, these potentially related offerors bid on multiple solicitations. For example, we found two potentially related offerors bid together on three separate solicitations in our FBO data. We further examined these 11 potentially related offerors’ SAM registration information to determine whether they reported shared ownership in SAM, and found one instance in which two of the potentially related offerors self-reported their relationship that one offeror owned the other; the remaining nine offerors did not report any type of shared ownership information in SAM. According to DOD contracting officials, none of the nine offerors disclosed a relationship with another offeror nor was the contracting officer otherwise aware of the potential relationship. While sharing certain information does not definitively confirm they are owned by the same entity, it is an indicator that these offerors are related. Figure 6 below highlights an example in which two offerors bidding on the same solicitation shared information and did not report shared ownership in SAM. Additionally, we identified an instance in which this type of information was also shared between two offerors and a subcontractor for a third offeror, as shown in figure 7 below. The potentially related offerors we identified did not appear to affect the overall competition on these contracts because other, seemingly unrelated offerors also submitted bids. As a result, it is unlikely that they would have affected the price paid by the government in these contracts. However, these potentially related offerors represent a risk that offerors may not always be competing independently and these types of relationships may not always be readily apparent to contracting officers, which is important when evaluating the sufficiency of competition on a solicitation and the independence of its offerors. Further, contractors may not always be forthcoming in reporting their ownership information in SAM, which can affect other areas of the procurement process, including any procedures that rely on the accuracy of this information. Contractors can pose nonfinancial fraud risks to DOD by concealing their ownership structure to bid on and obtain contracts that they are not eligible to receive. These nonfinancial risks may not pose a direct financial cost to DOD, but they can allow ineligible companies to contract with DOD while potentially denying eligible companies from contracting with DOD. As discussed below, these risks can also lead to additional vulnerabilities. In our review of 32 cases, we identified DOD contractors that concealed their ownership information to obtain contracts set aside for particular types of businesses, to obtain contracts only intended for domestic companies, and to circumvent debarment by the government. Set-Aside Contract Eligibility. Contractors with opaque ownership structures can pose the risk that government contracts set aside for small businesses are awarded to ineligible companies. Ineligible contractors could take advantage of Small Business Administration set-aside programs that allow small businesses that are owned by service-disabled veterans, women, minorities, or economically and socially disadvantaged individuals to receive government contracts specifically set aside for these types of businesses. Of the 32 cases we reviewed, we identified 20 cases in which DOD contractors or DOD contractor employees were found guilty, pled guilty, or settled with the government for representing themselves as eligible to receive set-aside contracts. These contractors falsified self-reported information and made false certifications to the government to claim eligibility by using eligible individuals as figurehead owners. In these cases, the figurehead owners did not actually maintain the level of beneficial ownership or control of the contractor required by federal regulations, or the contractors simply used the names of eligible individuals when communicating with the government to bid on and win contracts. For example, we identified one case that involved two DOD contractors participating in a single scheme to misrepresent their common ownership and obtain over $200 million in awards that they were not eligible to receive. One of the contractors that fraudulently obtained set-aside contracts claimed it was owned by a service-disabled veteran; however, that veteran had virtually no involvement with the contractor. The other contractor claimed to be owned by an economically disadvantaged individual who worked full-time for another entity and did not control the contractor. These contractors were not eligible to receive the set-aside contracts because they were not at least 51 percent controlled by the eligible individuals and the eligible individuals did not make long-term decisions for the companies. Rather, the contractors were controlled by an ineligible individual who owned and controlled a separate company that actually performed work on the set-aside contracts. To obtain government contracts set aside for companies owned by economically and socially disadvantaged individuals, the qualifying individuals must also control the majority of the company and make day- to-day decisions. Figure 8 below, which is based on an actual case, illustrates how ineligible contractors can obtain and receive government funds on contracts intended for Service-Disabled Veteran–Owned Small Businesses. Domestic Contractor Eligibility. Contractors with opaque ownership structures can also pose the risk of circumventing eligibility requirements for contracts that are only designated for domestic companies, which can lead to other vulnerabilities that affect warfighter readiness. Of the 32 cases we reviewed, we identified four cases in which individuals created domestic shell companies for foreign manufacturers and bid on contracts designated for domestic companies. In three of the four cases, the individuals behind the shell companies also had ownership interests in the foreign manufacturing companies. Foreign manufacturers received payments from the contracts, despite the contracts only allowing domestic manufacturers to be eligible, and one such manufacturer ultimately supplied DOD with defective and nonconforming parts that led to the grounding of at least 47 fighter aircraft. In multiple instances, another ineligible contractor supplied parts that were unusable due to design flaws and nonconformities. Three of these companies also exported military technical drawings and blueprints to foreign countries in violation of the Arms Export Control Act. Figure 9 below, which is based on an actual case, illustrates a contractor acting as a shell company and misrepresenting foreign manufacturing. Circumventing Debarment. Individuals that have been debarred, or prohibited from conducting business with the federal government, can circumvent their debarment by concealing their ownership in new companies that were created for the sole purpose of continuing to conduct business with the government. Of the 32 cases we reviewed, we identified one conviction of an individual who was debarred from 2013 to 2016 for supplying defective parts to DOD. This individual created three shell companies and concealed his beneficial ownership and control of these companies by omitting his name from communication with DOD and using fictitious names and names of family members as company officials. These three shell companies continued to provide defective and nonconforming parts to DOD, and the debarred individual received approximately $2.8 million in payments from DOD from May 2013 to June 2016. DOD officials we spoke with and published DOD research have identified the risk of contractors disguising company ownership as an enabler to do harm to national security interests. Contractors fraudulently misrepresenting themselves to DOD could actually be operated by adversaries seeking to act against the government’s interests. Foreign- owned contractors can conceal ownership information when registering in SAM, which allows contractors to self-attest ownership information. For example, in addition to the 32 cases we identified through our review, we also identified a bid protest filed with GAO challenging a contract award made to a foreign-owned DOD contractor in fiscal year 2018 that prohibited the participation of foreign firms or domestic companies under foreign ownership, control, or influence. This contractor did not disclose its foreign ownership or control in SAM or to DOD, as required by the FAR and the solicitation. As a result of the bid protest, DOD subsequently terminated the contract later in fiscal year 2018 after confirming the foreign ownership with the contractor. DIA and DLA officials stated that adversarial foreign governments or other malicious entities, such as companies attempting to access sensitive government information, could access sensitive systems to conduct sabotage or surveillance. These entities could infiltrate DOD’s supply chain to introduce components, such as circuit-board chips and routers modified to fail, facilitate state or company espionage, or compromise the integrity of DOD’s information-technology systems. According to CIO officials, adversarial entities could also potentially gain access to sensitive information through their relationship with DOD contractors. For example, DIA officials identified the possibility of foreign or adversarial entities exploiting companies in DOD’s supply chain with financial difficulties, and according to CIO officials, DOD may not always have visibility over foreign entities acquiring a domestic contractor. In 2017, the Office of the Director of National Intelligence released a management background paper discussing supply-chain risks, which stated that the multiple layers and networks of suppliers in this chain can allow foreign adversaries the ability to access the supply chain at multiple points. For example, according to the background paper, a hostile foreign intelligence entity could potentially conceal its presence in government supply chains by operating through multiple front organizations, companies, hackers, and organized crime, making it extremely difficult to discover and counter its actions. The paper also states that adversaries may be able to penetrate the supply chain to access sensitive research and development programs, steal intellectual property and personally identifiable information, insert malware into critical components, and mask foreign ownership, control, or influence of key providers of components and services. Furthermore, in April 2018, the U.S.-China Economic and Security Review Commission issued a report identifying a supply-chain threat to U.S. national security that stems from products produced, manufactured, or assembled by entities that are owned, directed, or subsidized by national governments or entities known to pose a supply- chain or intelligence threat to the United States. DOD officials have also identified an additional risk of contracting with companies that have opaque ownership structures. For example, a 2017 Defense Contract Audit Agency report to Congress described the risk of individuals receiving government contracts or gaining access to government installations who would harm deployed troops. Officials we spoke with from the Joint Staff Logistics Directorate also acknowledged the risk that government funds could be provided to contractors owned by a person or entity that is actively opposing U.S. or coalition forces involved in a contingency operation in which service members are actively engaged in hostilities. These adversaries can potentially use opaque ownership structures to disguise their ownership and contract with the government in areas involved in contingency operations, such as Iraq or Afghanistan, to fund their operations or gain access to military bases. DOD has taken steps that could address some fraud and other risks related to contractor ownership in the procurement process. It has not yet conducted a department-wide assessment of these risks or identified them as a risk area for assessment in its development of a fraud risk management program in accordance with federal internal control standards and leading practices, however. As mentioned previously, DOD and other federal agencies revised the FAR in 2014 to collect some contractor ownership information. DOD has also begun to consider contractor ownership to address national security risks, including identifying and using contractor ownership information as part of its supply-chain risk analysis in the procurement of national security systems and critical components, avoiding contracting with the enemy, and determining whether contractor facilities can be cleared to access classified materials. Although DOD has taken these actions, it faces a number of challenges in identifying and verifying contractor ownership. To assist the department and its components in identifying and assessing fraud risks, DOD has also begun a department-wide fraud risk management program. As it develops a fraud risk assessment across the department, DOD has opportunities to systematically assess risks related to contractor ownership as part of this larger effort. This fraud risk assessment, if used to inform the development of a risk-based antifraud strategy, could enhance the effectiveness of managing fraud risks for DOD, including those related to contractor ownership. DOD, GSA, and the National Aeronautics and Space Administration amended the FAR in May 2014 to require prospective contractors to self- report their immediate and highest-level entity owner, but not their beneficial owner, as part of contractors’ annual registration process in SAM. The agencies added the requirement to support the implementation of business tools to help track contractor performance issues across corporations as well as to improve supply-chain transparency and integrity efforts, among other reasons. According to DOD procurement policy officials, the intent is that the ownership information would be made available in FAPIIS for contracting officers to help identify past-performance issues across corporations to aid with responsibility determinations. The FAR requires contracting officers to consider all relevant information available in FAPIIS when making responsibility determinations, but, according to DOD procurement policy officials, there is no requirement to document whether and how ownership information is considered. According to DOD procurement policy officials, contracting officers’ general focus in the responsibility determination process is largely centered on whether the contractor is financially solvent, has the ability to carry out the contract, and has satisfactory past performance. DOD procurement policy officials said that they did not want to be too prescriptive in directing contracting officers on the use of this information, and therefore have not developed policies or procedures or provided training on how to specifically use the ownership information collected. According to these officials, DOD has not historically considered contractor ownership structures in the responsibility determination process, nor has the agency been aware of the extent to which such structures could pose a range of risks. As discussed below, conducting a department-wide assessment of risks posed by contractor ownership—an action that DOD has not yet taken—would be a key first step for the department before developing such policies and procedures. Within DOD, DLA has taken steps that could address some risks posed by contractor ownership. First, according to procurement officials, DLA provides its contracting officials with a “contractor responsibility matrix,” which outlines mandatory, recommended, and optional steps to take when making a responsibility determination for procurements both below and above the simplified acquisition threshold. Among the steps included, DLA requires contracting officials to review contractors’ attestations to ownership or control by a foreign government to determine whether the prospective contractor is qualified and eligible to receive an award. It also recommends contracting officials obtain responsibility information from other sources, including an internet search of the company’s reviews, and its owners and principals. This step is listed as optional for existing contractors. Further, DLA’s contracting officers are required to review the Defense Contractor Review List to identify any past-performance information. The Defense Contractor Review List is an internal tool used by DLA that is designed to monitor fraud, waste, and abuse for commercial entities and military unique items. The system is designed to allow DLA to identify and communicate information on its contractors, such as performance ability, delinquency information, suspension and debarment information, and various types of notes that may be relevant to contract performance or procurement decisions. DLA officials told us the Defense Contractor Review List can be used to communicate information or risks about contractor ownership. The Defense Logistics Acquisition Directive requires DLA contracting officers to review any Special Attention Reason Codes in the Defense Contractor Review List and comply with its associated Special Attention Treatment Codes when making responsibility determinations. The Special Attention Reason Codes describe the basis for being on the list and the Special Attention Treatment Codes provide recommended actions to contracting officers for mitigating risk. According to DLA officials, contractor ownership information is generally not identified in the Defense Contractor Review List. Nevertheless, ownership information may be included in the documentation if, for example, the contracting officer identifies that two or more companies appear to be related or in cases in which there may be suspected collusion. DOD has taken steps in other areas to use contractor ownership information to address risks in specific types of procurements, including those involving national security systems. For example, DOD has taken steps to address national security concerns related to contractor ownership, including conducting threat assessments to identify risks related to supply chains for critical components and national security systems. DOD has also taken steps to identify contractor ownership information to avoid contracting with the enemy, and to address foreign ownership, control, and influence in contracts involving classified information. DOD has outlined policies and procedures in some, but not all, of these areas. As discussed below, conducting a department-wide assessment of risks posed by contractor ownership—an action that DOD has not yet taken—would be a key first step for the department before fully developing such policies and procedures. Steps taken to use ownership information to address supply chain risks. DOD has taken some steps to identify and consider contractor ownership to address supply-chain risks. For example, DIA considers contractor ownership information when conducting threat assessments as part of its supply-chain risk analysis for procurement of national security systems and critical components, according to DIA officials. Specifically, DOD is able to use public and nonpublic intelligence information to exclude sources that present risks of an adversarial foreign government or other malicious entities infiltrating DOD’s supply chain and stealing information or compromising government systems. DIA officials told us that, as part of this supplier- related threat assessment, they identify and consider ownership information along the supply chain, including beneficial-ownership information. The guidelines in Intelligence Community Standard 731-02 state that a supply-chain threat assessment for a procurement item determined to be mission-critical should at a minimum include information on the contractor’s parent company, ultimate parent company, and subsidiaries. However, the guidance does not specify whether this ownership and related company information is to be independently verified or whether it relies on the contractor self-attestations in SAM. According to the guidance, supply-chain threat assessments should also include, at a minimum, information on the contractor’s key management personnel, such as members of the board of directors, officers, general partners, and senior management officials. The guidance does not mention, however, identifying beneficial owners or those who do not have direct control over a contractor but derive substantial economic benefit from it. Steps taken to use ownership information to address legal provisions against contracting with the enemy. Officials from the Joint Staff Logistics Directorate responsible for DOD’s vendor vetting program told us that contractor ownership information, including beneficial ownership, may be identified as part of the intelligence information gathered on vendors by combatant commands to ensure that money is not flowing to contractors owned by a person or entity that is actively opposing U.S. or coalition forces involved in a contingency operation in which service members are actively engaged in hostilities. According to these officials, DOD has not established department-wide policies or procedures to implement reviews of contractor ownership during the process of vetting vendors, but it is something the department is currently developing. These officials stated that a vendor threat-mitigation working group discusses how to close gaps in information sharing among the intelligence, procurement, and operations communities. Officials also noted some challenges. Although contracting officers are responsible for determining the responsibility of vendors and whether vendors can perform the terms of a contract, the information that may be available to contracting officers and the actions that they can take are not always clear. For example, the officials we spoke with mentioned concerns that contracting officers are not always able to access or act on intelligence information. GAO recently completed a review of this program in a classified report. Steps taken to address ownership risks in contracts involving classified information. DOD has taken steps to address risks posed by contractor ownership as part of the Facilities Clearance Process. DOD uses the Facilities Clearance Process to determine whether a contractor is eligible to access classified information. DOD has developed written policies and procedures for how contractor ownership, including foreign ownership, control, and influence, is to be investigated and addressed. As part of this process, Defense Security Service (DSS) guidance instructs its officers to identify key management personnel and to assess the risks they pose for possible foreign ownership, control, or influence. DSS guidelines indicate that key management personnel include company officers, directors, and members of a limited liability company, among others. Some key management personnel, such as members of a limited liability company, may also be the owners. According to DSS officials, beneficial owners who benefit financially but do not partake in active management may be identified as key management personnel as part of the clearance process, depending on various factors including the percentage of ownership. As an example, DSS officials stated that an individual who owns 50 percent of a company would not be able to purport that he or she does not control the company. According to the DSS guidance, if foreign ownership, control, or influence is found, mitigation agreements can be put into place to reduce the risk. DOD officials identified a number of challenges in identifying and verifying contractor ownership, especially if the contractor is actively seeking to misrepresent its ownership. For example, verifying contractor ownership can be challenging because state governments determine the type of information collected during company formation and, as discussed earlier, most states collect minimal ownership information as part of this process. As described earlier, there is no centralized information source or registry on company ownership information in the United States. As a result, contracting officers could face challenges in time-consuming efforts to verify contractor ownership. Further, DOD procurement policy officials stated that workload and resource constraints limit the extent to which they can verify contractor ownership. The nature of ownership information submitted during the SAM registration process also presents challenges to any verification efforts conducted by contracting officers. The ownership information submitted in SAM is self-reported by the prospective contractor, and therefore relies on the contractor to honestly report such information. DOD officials told us that, for most procurements, with the exception of those involving classified work or other national security concerns, this information is not verified. A related limitation involving SAM ownership information is that contractors must provide information on the immediate and highest-level entity owners and are not required to report beneficial-ownership information, that is, on the natural person or persons who own or control, or benefit financially from, the company. Lastly, while the SAM ownership requirement provides some transparency at the prime-contractor level, it does not provide transparency at the subcontracting levels below the prime contractor. Subcontractors are not required to register in SAM and, therefore, are not required to report their ownership. Consequently, DOD generally does not have insight into the ownership of its subcontractors. DOD procurement policy officials noted that this poses particular challenges in identifying fraud and other risks to the supply chain. For example, the contractor itself may not pose a risk; but that does not guarantee that the contractor’s suppliers do not pose fraud or other risks. DOD procurement policy officials told us that it would be helpful to require subcontractors to register in SAM and report their ownership. This requirement would be an additional burden on contractors, however, and would need to be balanced with the potential benefit of being able to identify problem actors. Another challenge involves the use of publicly available ownership information, including commercially available data services, by contracting officers to help identify contractor ownership. Depending on how a company is structured, there may be no publicly available ownership information. Furthermore, DOD procurement policy officials told us that public information, including ownership information, could be inaccurate or outdated and potentially expose the department to bid protests from the contractor. Therefore, any external or supplemental information used that was not part of the contractor’s submission would need to be vetted by the contractor before using it. These officials said that DOD would need to come up with an efficient process to inform the prospective contractor of the additional information and provide due process to allow it the opportunity to refute any information obtained. Additionally, DOD procurement policy officials noted that another difficulty with using a commercial tool to determine ownership is the volume of contracts processed by contracting officials, which amounted to over 570,000 new contracts in fiscal year 2018. For sensitive procurements in which DOD has the authority to use both public and nonpublic information (for example, those involving national security systems or classified work), DSS officials stated that the process of identifying and verifying ownership is lengthy, particularly with complex ownership. In some instances, it has taken DSS 1 to 2 years to resolve issues that have arisen when clearing contractors’ facilities for access to classified materials. In addition, DSS officials mentioned that the many different types of business structures, including new structures that DSS comes across, create challenges for identifying ownership. According to DIA officials, it is significantly easier to identify the beneficial owner of publicly traded companies than privately owned companies. DSS officials also mentioned that it is difficult and resource-intensive to monitor changes to contractor ownership, particularly given that they monitor 13,000 facilities. According to DOD procurement policy officials, DOD would need to determine which contracts require additional research into contractor ownership and which office would be responsible for conducting the research. Officials noted that DOD does not currently have the resources in place to focus on these kinds of activities because contracting officers are already operating in a constrained environment with limited resources, lacking the time, resources, or training they need to conduct in-depth reviews or analysis of the ownership aspects of a particular company. According to these officials, DOD should dedicate staff and funds to resolve this problem, including bringing in people with data- analysis and data-mining skillsets to learn from private-sector companies and organizations that already conduct vendor ownership-related risk assessments and data analytics. DOD procurement policy officials identified that another strategy to address opaque ownership structures would be to require contractors to report additional ownership information, such as beneficial-ownership information, when registering to do business with the federal government in SAM. However, the officials also noted that, previously, both public- sector organizations and private companies have resisted requirements to provide additional ownership information, due in part to the difficulty in defining ownership. Additionally, regulatory trends within government contracting have generally focused on easing the burden to do business with the government. New requirements to provide additional information may be viewed as an additional burden. A selected group of companies that contracted with DOD in the last 5 years provided us with mixed views on the potential burden of providing additional ownership information. Most small-business contractors we contacted told us that an additional beneficial-ownership reporting requirement would pose little to no further burden on them. In contrast, both of the large, publicly traded companies that similarly contracted with DOD expressed concerns about the complexity and difficulty of reporting their beneficial ownership. One large company noted that beneficial ownership would need to be more narrowly defined for it to determine the resulting regulatory burden. DOD has taken steps to conduct a department-wide fraud risk management program designed to identify and assess fraud risks. According to DOD’s Fraud Risk Management Pilot Program Instructions, in 2017 DOD began efforts to design, implement, and operate an internal control system that addresses fraud risks and to comply with requirements established by FRDAA. As mentioned earlier, FRDAA created requirements for agencies to establish financial and administrative controls for managing fraud risks. FRDAA also requires agencies to report their progress identifying risks and vulnerabilities to fraud affecting payroll, beneficiary payments, grants, purchase and travel cards, and large contracts. As part of this implementation process, and to test the development of its fraud risk management program, DOD conducted a fraud risk management pilot program in 2018 by selecting four components to identify fraud risks, assess controls they have in place to mitigate these risks, and develop mitigation plans, as appropriate. According to DOD, the pilot program was designed to assist DOD and its components in the development of a department-wide fraud risk management program by identifying and assessing fraud risks in a manner that is aligned with the leading practices within GAO’s Fraud Risk Framework. To prepare for this pilot program, in 2017, the Office of the Under Secretary of Defense (Comptroller) (OUSD) conducted a survey requesting that 66 DOD components determine the extent and maturity of control activities currently in place related to the prevention, detection, and response to fraud. The survey asked components to provide, among other things, information on any antifraud programs, key fraud risks identified, and processes for identifying, responding to, and monitoring risks. The responses from the 41 responding components were scored to determine their fraud program maturity. According to DOD’s Fraud Risk Management Pilot Program Instructions, the results of this survey were also used to identify potential vulnerabilities from the FRDAA requirements and guide the development of DOD’s pilot program. DOD officials told us that before the recent development of their fraud risk management pilot program, the department did not have a process for assessing fraud risks department-wide. Also, as part of the pilot program, OUSD(C) and the components identified seven fraud schemes that affect large contracts, five of which we discuss above as having the potential to involve risks posed by contractor ownership. Specifically, the pilot program identified fraud schemes involving service-disabled veteran–owned businesses, inflated prices charged by contractors for the services rendered, bid submission with the same two or three offerors on multiple contract opportunities, inclusion of one or more contractors as a subcontractor on the bid rigger’s proposal, and counterfeit parts. As discussed previously in this report, opaque ownership structures can play a role in carrying out these types of fraud schemes. DOD completed the pilot program in 2018, and in March 2019 began expanding the fraud risk management program department- wide by requesting that DOD components identify fraud risk and controls in place to mitigate these risks by July 2019. As with the pilot program, the components were requested to identify and assess fraud risks to meet requirements established by FRDAA and allow DOD to identify fraud risks and vulnerabilities facing the department. While DOD has taken some steps to identify and potentially address fraud and other risks posed by contractor ownership, it has not conducted a department-wide assessment of these risks or selected them as a risk area for assessment in its development of a fraud risk management program. DOD procurement policy officials told us that contractor ownership and financing structures have not historically been considered by the department. DOD procurement policy officials expressed the need for a strategic assessment of contractor ownership risks at the Office of the Secretary of Defense (OSD) level to deal with the wide range of potential threats that exist. Still, getting support at the senior OSD level to consider the risks posed by contractor ownership and dedicate resources to mitigating these risks is a challenge, according to these officials. The challenge exists because senior DOD officials may not be aware of the potential magnitude or frequency of risks posed by contractor ownership issues, including the extent to which risks cross multiple areas throughout the department. Additionally, DOD procurement policy officials told us that contracting officers do not have anyone within the department to contact for assistance in determining ownership during the procurement process and there is no dedicated entity within the department that deals with contractor ownership issues. Federal internal control standards call for agency management officials to assess the internal and external risks their entities face as they seek to achieve their objectives. The standards state that as part of this overall assessment, management should consider the potential for fraud when identifying, analyzing, and responding to risks, including changes to risks, and consider factors such as absent or ineffective controls that provide an opportunity to commit fraud. In a complementary fashion, the Assess component of GAO’s Fraud Risk Framework calls for federal managers to plan regular fraud risk assessments and to identify and assess risks to determine a fraud risk profile, as described in figure 10 below. According to the Fraud Risk Framework, a fraud risk profile documents the findings from a fraud risk assessment and can help agencies decide how to allocate resources to respond to residual fraud risks. The Assess component also indicates that relevant stakeholders, including those with responsibilities for specific control activities and with knowledge of emerging fraud risks, should be involved in the assessment process. This could include a variety of internal and external stakeholders, such as general counsel, contractors, or other external entities with knowledge about emerging fraud risks or responsibilities for specific control activities. For example, the DOD Office of Inspector General and its work on emerging risks involving contractor ownership may inform the fraud risk assessment process and help managers to identify fraud risks. Additionally, an assessment of ownership risks could include relevant DOD officials responsible for assessing and responding to national security risks, such as those responsible for assessing supply- chain risks in national security system procurements, vetting vendors to ensure DOD avoids contracting with the enemy, and determining whether contractor facilities can be cleared to access classified materials. Including relevant stakeholders would allow DOD to leverage the knowledge and experience of such officials and more comprehensively identify risks related to contractor ownership. Further, it would allow DOD to better understand the extent to which risks cross multiple areas throughout the department. At a fundamental level, assessing risks arising from contractor ownership would allow DOD to take a strategic, risk-based approach to identifying and managing these risks. In addition, a risk assessment would help DOD better understand the magnitude and prevalence of these risks, including the effects these risks have from both a fraud and national security perspective, and whether certain types of procurements are more vulnerable to contractor ownership risks. Further, conducting a department-wide assessment of risks posed by contractor ownership would assist the department in its evaluation of whether its existing control activities are sufficient and designed to effectively respond to these risks or whether additional control activities are needed. For example, it would allow DOD to better determine how contractor ownership information should be used and verified, and whether additional ownership information should be collected. In accordance with leading practices, DOD would then be positioned to design and implement specific control activities to prevent and detect contract ownership-related fraud and make informed decisions on how best to use its resources. DOD is the largest contracting agency in the federal government in terms of contract dollars obligated and number of contracts awarded. The scope and scale of this activity makes DOD procurement inherently susceptible to fraud. Our various analyses and discussions with procurement officials from across the department identified risks posed by contractors with opaque ownership that involve various types of procurements. DOD has taken some steps that could address some risks posed by contractor ownership in the procurement process. It has the opportunity to include these risks as part of its department-wide fraud risk assessment at a strategic level. Assessing risks related to contractor ownership, as a fundamental first step, would help DOD better determine whether certain types of procurements are more vulnerable to this type of risk. Further, it would help DOD determine whether additional policies and procedures are needed to articulate how officials should use and verify the ownership information it collects, or to require additional ownership information. We recognize that collecting additional ownership information, including beneficial-ownership information, could pose compliance burdens for contractors; and regulatory trends have generally focused on easing the burden to do business. Additionally, verifying contractor ownership can be challenging and time-consuming. Nevertheless, having a thorough assessment of contractor-ownership risks will better position DOD to make informed decisions on how best to use its resources and help ensure that the department’s fraud risk management program is organized and targeted to manage risks in a prioritized manner. Lastly, involving relevant stakeholders with knowledge of emerging risks could help inform other types of risk assessments across the department, including national security concerns. Doing so will contribute to the effective implementation of leading fraud risk management practices when considering the existing and emerging risks to the department. The Office of the Undersecretary of Defense (Comptroller) (OUSD) should include an assessment of risks related to contractor ownership as part of its ongoing efforts to plan and conduct a department-wide fraud risk assessment. As part of this assessment, consistent with leading practices, DOD should involve relevant stakeholders with knowledge of emerging risks and use this information to help inform other types of risk assessments across the department, including for national security concerns. (Recommendation 1) We provided a draft of the sensitive version of this report to DOD and GSA for comment. In commenting on a draft of the sensitive version of this report, DOD concurred with our recommendation and provided additional written comments outlining current and planned efforts in response to our recommendation. These written comments were deemed sensitive by DOD and have been omitted from this report. In an email, GSA stated that it did not have any comments. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Administrator of GSA, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-6722 or bagdoyans@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made contributions to this report are listed in appendix III. This report is a public version of a sensitive report that we issued on September 12, 2019, with the objectives to (1) identify types of fraud and other risks, if any, that contractors with opaque ownership could pose to the Department of Defense (DOD) in the procurement process and (2) assess whether DOD has taken steps to address risks posed by contractor ownership in the procurement process. The sensitive report included the results of data analysis we conducted to identify offerors who might disguise their ownership to create the appearance of competition. DOD deemed some of the details from this analysis to be sensitive, which must be protected from public disclosure. This report also omits sensitive information about ongoing investigations, certain internal controls and vulnerabilities, and actions taken to address some of these vulnerabilities. Although the information provided in this report is more limited, it addresses the same overall objectives as the sensitive report and uses the same methodology. To address our first objective, we researched information on closed cases investigated by the Defense Criminal Investigative Organizations or prosecuted by the Department of Justice (DOJ) from calendar years 2012 through 2018. These cases were identified by researching press releases from the websites of the DOJ Office of Public Affairs, Offices of the U.S. Attorney, DOD Office of Inspector General, and Defense Criminal Investigative Organizations. We also researched legal databases and news articles involving DOD contractors to identify federal court cases and federal agency decisions. We reviewed GAO bid-protest decisions to identify cases in which a contractor may have failed to disclose foreign ownership or concealed beneficial-owner information to obtain contracts that they were not eligible to receive. We interviewed investigators from the Defense Criminal Investigative Organizations and DOD contracting offices to supplement our research. For each case identified, we reviewed the associated federal court filings or DOJ press releases to determine the outcome of the case and how contractor ownership was used or concealed to carry out the offense. To identify additional types of risks that may not have been identified through our case-study research, we interviewed officials from the General Services Administration (GSA) and officials from across DOD, including the Office of Inspector General, Defense Criminal Investigative Organizations, Defense Pricing and Contracting, the Office of the Under Secretary of Defense (Comptroller) (OUSD), the Office of the Chief Information Officer, Defense Intelligence Agency (DIA), Defense Security Service (DSS), Defense Logistics Agency (DLA), Defense Contract Management Agency (DCMA), and Defense Contract Audit Agency, and relevant procurement policy officials from the Departments of the Army, Navy, and Air Force. We examined known risks identified through our case-study research and interviews with DOD officials; however, these risks are not necessarily representative of the extent or the types of these risks. There may be additional fraud or other risks and cases related to contractor ownership that are presently undiscovered fraud and are not identified in our report. Additionally, we further examined the risk that contractors could be disguising their ownership to create the appearance of competition on a contract to inflate prices by analyzing bid response data from GSA’s Federal Business Opportunities (FBO) website and registration data in GSA’s System for Award Management (SAM). Specifically, we analyzed responses to approximately 2,700 solicitations submitted for fiscal years 2015 through 2017 to identify indications of potentially related offerors bidding on the same solicitation. We selected this date range because fiscal year 2015 was the first year in which the Federal Acquisition Regulation (FAR) required offerors to report their ownership and fiscal year 2017 was the most-recent complete year of data at the time of our analysis. To identify whether offerors were potentially related, we analyzed information to identify instances in which different offerors shared certain information. Offerors sharing information does not definitively prove that the offerors are related or share ownership; however, it is an indicator that these offerors may not be independent of each other. For offerors we identified as potentially related, we researched company websites and third-party data sources to determine whether we could find other indicators of a relationship. Further, we provided a list of the potentially related offerors we identified to the relevant DOD contracting office to determine whether the offeror disclosed any relationships to other offerors or whether the contracting officer was otherwise aware of the relationship with another offeror. The results of our analysis are limited to the approximately 2,700 solicitations we reviewed and are not generalizable to other DOD solicitations. To assess the reliability of the data used in our analysis, we performed electronic testing to determine the validity of specific data elements in the FBO bid module and other datasets. We also reviewed documentation related to these databases, compared the data to published sources and source documentation maintained in the DOD contracting files, and interviewed GSA officials responsible for these databases. We determined that the data were sufficiently reliable for the purposes of analyzing potential ownership relationships. To address our second objective, we reviewed federal laws, the FAR, DOD regulations, directives, instructions, policies, procedures, and training documents. We also reviewed OUSD(C) fraud assessment templates and preliminary results from DOD’s fraud risk management pilot program. We interviewed procurement policy officials from GSA, Defense Pricing and Contracting, DLA, and the Departments of the Army, Navy, and Air Force as well as officials from the Office of the Chief Information Officer, OUSD(C), DIA, DSS, DCMA, the Defense Contract Audit Agency, the Joint Staff Logistics Directorate, the Defense Industrial Policy office, members of DOD’s Procurement Fraud Working Group, and the Naval Contracting Council to discuss how DOD has addressed risks. We also interviewed officials from the Defense Acquisition University to determine how, if at all, DOD trained contracting officials to consider risks posed by contractor ownership. To assess these efforts, we compared these documents and the information from our interviews to federal internal control standards and the leading practices outlined in GAO’s Framework for Managing Fraud Risks in Federal Programs. To gain the perspectives of contractors on whether a requirement to report beneficial- ownership information when doing business with DOD would impose a burden on companies, we researched and contacted several government contractors’ associations to gain the perspectives of their members. The contractors’ associations we contacted included associations for large, medium, and small businesses working in a variety of industries doing business with the government. We received responses to our inquiries from three associations. To gain their members’ perspectives, officials from the three associations forwarded our inquiries to their members and we received responses from 16 members. These 16 members were from a range of business sizes and industries. The perspectives gained from our queries are limited to the contractors from whom we received a response and are not generalizable to all contractors. We conducted this performance audit from August 2017 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with DOD from September 2019 to November 2019 to prepare this version of the original sensitive report for public release. This public version was also prepared in accordance with these standards. The table below summarizes the information we reviewed involving Department of Defense (DOD) contractors or subcontractors that provided false information about ownership or corporate structure to allegedly commit fraud. We identified cases involving contractors that posed financial and nonfinancial risks to DOD (see app. I for additional details on the methodology used). Financial risks we identified involved DOD contractors using opaque ownership structures to fraudulently inflate prices on DOD contracts. We also identified subcontractors that misrepresented ownership or shared common ownership with a contractor for the purpose of obtaining awards or overcharging the government. Nonfinancial risks we identified involved contractors bidding on and obtaining contracts that they were not eligible to receive, including contracts set aside for small businesses owned by service-disabled veterans or socially and economically disadvantaged individuals. We also identified cases involving ineligible foreign manufacturers creating domestic shell companies to obtain government contracts. As discussed in our report, DOD has not assessed risks posed by contractor ownership; therefore the magnitude and prevalence of these risks are not known. There may be additional risks and cases related to contractor ownership that are not identified below. The 32 cases below were adjudicated or settled from calendar years 2012 through 2018. As shown in the table below, we used public court records and Department of Justice and DOD press releases to identify the type of fraud and calendar years in which the cases were adjudicated or settled, a summary of how the contractor’s ownership was disguised or obfuscated to carry out the fraud schemes, dollar amount awarded or received to the extent available in each case, and the government agencies affected by the fraud. In addition to the contact named above, the following staff members made key contributions to this report: Tonita Gillich (Assistant Director); Tracy Abdo (Analyst-in-Charge); Marissa Esthimer; Colin Fallon; Mollie Lemon; Maria McMullen; Madeline Messick; Dustin Milne; Lauren Ostrander; Daniel Purdy; Daniel Silva; Sabrina Streagle; and Shana Wallace. Others who contributed to this report include Steven Campbell, Suellen Foth, and Pamela Snedden.", "summary": "DOD generally accounts for about two-thirds of federal contracting activity. Some companies doing business with DOD may have an opaque ownership structure that conceals other entities or individuals who own, control, or financially benefit from the company. Opaque ownership could be used to facilitate fraud and other unlawful activity. The House Armed Services Committee report on the National Defense Authorization Act for fiscal year 2018 included a provision for GAO to examine the risks posed by contractors with opaque ownership and DOD's processes for identifying ownership. This report identifies types of fraud and other risks that opaque contractor ownership poses to DOD in the procurement process and assesses whether DOD has taken steps to address those risks. GAO reviewed applicable laws and regulations and interviewed DOD officials, including procurement staff and criminal investigators. GAO researched cases from 2012–2018 where contractors may have concealed or failed to disclose ownership information. GAO compared DOD's efforts to leading practices in GAO's Fraud Risk Framework. This is a public version of a sensitive report that GAO issued in September 2019. Information that DOD deemed sensitive involving ongoing investigations and certain internal controls and vulnerabilities has been omitted. The Department of Defense (DOD) faces several types of financial and nonfinancial fraud and national security risks posed by contractors with opaque ownership. These risks, identified through GAO's review of 32 adjudicated cases, include price inflation through multiple companies owned by the same entity to falsely create the appearance of competition, contractors receiving contracts they were not eligible to receive, and a foreign manufacturer receiving sensitive information or producing faulty equipment through a U.S.-based company. For example, one case involved an ineligible foreign manufacturer that illegally exported sensitive military data and provided defective and nonconforming parts that led to the grounding of at least 47 fighter aircraft, as illustrated below. DOD has taken some steps that could address some risks related to contractor ownership in the procurement process but has not yet assessed these risks across the department. DOD, in coordination with other agencies, revised the Federal Acquisition Regulation in 2014 to require contractors to self-report some ownership information. DOD has taken steps to identify and use ownership information—for example, as part of its supply-chain risk analysis when acquiring critical components. DOD has also begun a department-wide fraud risk management program, but it has neither assessed risks of contractor ownership across the department nor identified risks posed by contractor ownership as a specific area for assessment. Assessing risks arising from contractor ownership would allow DOD to take a strategic approach to identifying and managing these risks, make informed decisions on how to best use its resources, and evaluate its existing control activities to ensure they effectively respond to these risks. GAO recommends that DOD assess risks related to contractor ownership as part of DOD's ongoing efforts to assess fraud risk. DOD should use this information to inform other types of risk assessments, including national security concerns. DOD concurred with GAO's recommendation.", "document_type": "gao"}
{"report": "The naval shipyards were originally designed to build wind- and steam- powered ships and range in age from 111 years to 252 years old (see fig. 1). Over the years, the Navy has adapted them into highly industrialized, large-scale operations that are essential to national defense and fulfill the legal requirement for DOD to maintain a critical logistics capability that is government owned and operated to support an effective and timely response for mobilization, national defense contingency situations, and other emergency requirements. However, as we have reported, the shipyards’ age, residual configuration for the shipbuilding mission, and poor condition reduces their efficiency for their modern-day mission of repairing nuclear-powered ships and submarines. The naval shipyards perform depot-level maintenance, which involves the most comprehensive and time-consuming maintenance work, including ship overhauls, alterations, refits, restorations, nuclear refuelings, and inactivations—activities crucial to supporting Navy readiness. This maintenance is performed during periods designated in the Navy’s Optimized Fleet Response Plan, an operational schedule of maintenance, training, and deployment periods for the entire fleet. It is designed to maximize the fleet’s operational availability to combatant commanders while ensuring adequate time for the training of personnel and maintenance of ships. We reported in 2016 that successful implementation of the Optimized Fleet Response Plan depends, in part, on the shipyards completing maintenance on time and that maintenance delays reduce the time that ships are available for training and operations. As a result, successful implementation of the Optimized Fleet Response Plan is essential to the Navy’s ability to maintain readiness and support operational needs. The Navy developed the congressionally directed Shipyard Infrastructure Optimization Plan (the plan) to mitigate infrastructure deficiencies at the public shipyards. For some infrastructure, the Navy had preexisting planning that it used to outline specific mitigation projects that would address deficiencies. For other aspects of its infrastructure, the plan outlines the Navy’s strategy for developing a more detailed mitigation approach. The plan serves as the Navy’s engineering analysis and strategy for the optimal placement of facilities and major equipment at each public shipyard, including a 20-year investment plan for infrastructure investments needed to improve shipyard performance. The plan proposes mitigations to address limitations with three major facets of the public shipyards’ operations: their dry docks, facilities, and capital equipment (see fig. 2). Navy officials said they integrated previous studies in these three areas to create the plan. For example, Naval Sea Systems Command (NAVSEA)—which is responsible for program management of the shipyards—completed a dry dock study that identified gaps in capacity and configuration, which served as the basis for the dry dock portions of the plan. In addition, the Navy had previously developed capital investment strategies intended to help improve the state of the shipyards’ facilities and equipment, which were also included in the plan. The Navy estimates that the plan could eventually save 328,000 labor-days each year and recover most of the maintenance periods it currently cannot support. Capital planning is the process by which an organization prepares for the acquisition of capital assets such as the facilities and equipment in the Navy’s plan. Congress, the Office of Management and Budget, and we have identified the need for effective capital planning, which can help ensure that capital funds are spent productively. In the overall capital programming process, planning is the first phase, and it drives the remaining phases of budgeting, procurement, and management. For decision makers to conduct effective capital planning, they must have reliable cost estimates. A reliable cost estimate is critical to the success of any program. Such estimates provide the basis for informed investments, realistic budgets, meaningful measurement of progress, proactive course correction, and accountability for results. According to the Office of Management and Budget, cost estimates should be well-documented and updated on a regular basis. Estimates should also encompass life-cycle costs of the program. Without high-quality estimates, agencies are at risk of experiencing cost overruns, missed deadlines, and performance shortfalls. The GAO Cost Estimating and Assessment Guide has identified a number of best practices grouped into four “characteristics” that are the basis of effective program cost estimating and should result in reliable and valid cost estimates that management can use to make informed decisions, as shown in figure 3 and discussed below. Comprehensive: A comprehensive cost estimate includes all costs of the program over its complete life cycle, from the start of the program through design, development, deployment, operation and maintenance, and retirement. It also fully defines the program, reflects the current schedule, and is technically reasonable. Comprehensive cost estimates provide sufficient detail to ensure that cost elements are neither omitted nor double counted. Finally, where information is limited and judgments must be made, the comprehensive cost estimate documents all cost-influencing ground rules and assumptions. Well-documented: A well-documented cost estimate is supported by detailed documentation that describes how it was derived and how the funds will be spent in order to achieve a given objective. Therefore, the documentation includes such things as the source data used, the calculations performed and their results, and the estimating methodology. Moreover, this information is captured in such a way that the data used can be easily replicated and updated. The documentation also discusses the technical baseline and how the data were standardized. Finally, the documentation includes evidence that the cost estimate was reviewed and accepted by management. Accurate: An accurate cost estimate provides results that are unbiased, and is not overly conservative or optimistic. An estimate is accurate when it is based on an assessment of the most likely costs, adjusted properly for inflation, and contains few, if any, minor mistakes. In addition, an accurate cost estimate is updated regularly to reflect significant changes in the program—such as when schedules or other assumptions change—and actual costs, so that it always reflects the program’s current status. During the updating process, differences between planned and actual costs are documented, explained, and reviewed. Among other things, the estimate is grounded in a historical record of cost estimating and actual experiences on comparable programs. Credible: A credible cost estimate discusses any limitations of the analysis resulting from uncertainty or biases surrounding the data or assumptions. Major assumptions should be varied and other outcomes recomputed to determine how sensitive they are to changes in the assumptions. Risk and uncertainty analysis are performed to determine the level of confidence associated with the estimate. Finally, an independent cost estimate is developed by a group outside the organization to determine whether other estimating methods produce similar results. The Shipyard Infrastructure Optimization Plan has identified a number of infrastructure deficiencies at the Navy’s four public shipyards—including deficiencies in dry docks, facilities, and capital equipment—that negatively affect their ability to support the Navy’s current and future force structure. However, the extent to which the Navy’s plan addresses these deficiencies remains to be seen because facility planning has not been completed and the proposed actions are complex and years away from being implemented. The Navy’s plan outlines steps that generally address the critical dry dock deficiencies the Navy has identified, although it does not anticipate completing these steps until 2035. Of the shipyards’ 18 dry docks, the plan states that eight require modernization and recapitalization projects to meet the Navy’s operational needs, including accommodating new classes of ships. If all of the projects are completed as planned, the Navy anticipates that it will be able to recover 67 of the 68 maintenance periods that it currently cannot support through fiscal year 2040. According to the Navy, without these planned dry dock investments, the Navy would lack sufficient capacity for about a third of its planned maintenance periods at the shipyards and would have to defer maintenance for some ships. This could result in ships being unavailable for use until a dry dock is available, effectively reducing the size of the fleet available for operational missions. However, the extent to which the plan’s actions will address the shipyards’ dry dock deficiencies remains to be seen because the initiation and completion of many of these projects is years away. Built in 1919, dry dock 3 is not certified to handle nuclear fuel, which means submarines must be defueled elsewhere before this dock can be used, according to Navy officials. Additionally, because of its shallow depth, the Navy can move Los Angeles–class submarines into or out of the dock only during high tides. Even then, the shipyard has to remove portions of the submarine to decrease weight and over-flood the dock to create enough clearance for the boat. Shipyard officials said dry dock 3 could be modified to create a new multimission dry dock (M2D2) that would provide an additional spot to dry dock an aircraft carrier on the West Coast. This would provide the redundancy necessary to allow the Navy to perform significant seismic upgrades to dry dock 6, which faces significant seismic risks and is the only dry dock on the West Coast capable of accommodating an aircraft carrier. Navy officials said the final decision regarding the location of the M2D2 is pending a formal Environmental Impact Study. insufficient capacity to support the longer Virginia-class submarines with the Virginia Payload Module (see fig. 4), lack of redundancy for a West Coast aircraft carrier, and various other capacity and capability deficiencies that hinder the maintenance process such as small dry docks that require time- consuming workarounds or an inability to handle nuclear fuel (see sidebar). Though the Navy intends to recover most of the missed maintenance periods with these projects, according to Navy officials, the plan was developed using then-current estimates of fleet size and shipbuilding schedules derived from the fiscal year 2017 force structure projection. The Navy has since revised that projection, and the fiscal year 2020 shipbuilding projection increases both the number and accelerates the build rate of the nuclear powered ships supported by the naval shipyards (see fig. 5). Program office representatives told us that the plan, if implemented, will support the higher numbers and accelerated schedule of the Navy’s 2020 shipbuilding plan. Officials also stated that they plan to stay aware of further changes to depot maintenance requirements by attending annual fleet scheduling conferences in the future. These conferences are intended to reach a Navy-wide consensus on, among other things, changes to shipbuilding plans and the schedules for various ships to undergo their dry dock maintenance. Program officials noted that their presence at the conference allows them to update the SIOP in the event that there are additional changes to the shipbuilding schedule in the future. We have previously recommended that the Navy assess the risks to implementing shipyard infrastructure improvements; changes to the shipbuilding schedule are one such risk. Because of our previous recommendation and the Navy’s process for reviewing changes, we are not making an additional recommendation on this matter. It is too soon to determine whether the Navy’s plan will fully address the shipyards’ facility deficiencies as the Navy has not yet completed the complex effort necessary to develop detailed facility optimization plans for each shipyard. Implementing the plan will be a complex, multiyear effort to redesign the workflows at each shipyard and will involve several steps (see fig. 6). As part of the facility optimization effort, the Navy will seek to address several critical facility deficiencies it has identified at the public shipyards that negatively affect the Navy’s ability to complete maintenance on time. These include the average age of shipyard production shop facilities is 76 years, exceeding DOD’s expected average service life of 67 years for facilities; the average condition rating of shipyard production shop facilities is 66, which is considered poor, falling below the Navy standard of 80; and inefficient facility layout at the shipyards that has not been optimized to support the maintenance, repair, and disposal of nuclear-powered Navy ships and submarines. According to the Navy, the shipyards were originally designed to support the construction of ships and submarines and not the maintenance mission for the nuclear fleet that they perform today. Because the shipyards were designed for a different mission, key facilities such as maintenance shops may be located at significant distances from where the majority of work is performed. As a result, it is not uncommon for workers to walk several miles each day because of the inefficient layout of the shipyards, according to shipyard officials. For example, building 155 at Pearl Harbor Naval Shipyard, which is actively involved in submarine maintenance, is about 1/3 mile away from the nearest dry dock. This distance creates additional travel time for both personnel and material, resulting in maintenance inefficiencies. We have noted previously that waterfront locations are often ideally located to support the shipyards’ maintenance mission, but that the challenges of dilapidated structures, historical designations, and other issues can make it difficult for the shipyards to make full use of the locations (see sidebar). Building 6 at Pearl Harbor Naval Shipyard is a former foundry that has not been used since the 1980s. The building’s distinctive 3-tier roof architectural style make it a historic facility and therefore difficult to restore and modernize, according to shipyard officials. Because of its size and close proximity to the waterfront, shipyard officials would like to use the facility to support the maintenance mission, rather than let it sit empty. However, the building has extensive health and safety issues and also requires environmental remediation. The Navy’s plan estimates that the implementation of facility optimization will take at least 20 years and require increased spending for facility construction and modernization over that time. In addition, this will be a highly complex effort to redesign four large operational industrial installations, and the time frame for its completion remains uncertain at this stage. The modeling and simulation of shipyard production facilities began in February 2019 and will not be completed until 2020. According to program office representatives, Pearl Harbor’s “current state” facility model is scheduled to be completed near the end of fiscal year 2019, and the optimal facility model is scheduled to be completed in the 2nd quarter of fiscal year 2020 (see fig. 7). Modeling and simulation at the Norfolk, Portsmouth, and Puget Sound shipyards are not scheduled to be completed until the end of fiscal year 2020. However, some shipyard officials have expressed doubt about this timeline, stating that the modeling and simulations may take more effort to complete. For example, officials from Puget Sound Naval Shipyard told us they have done some degree of industrial modeling and simulation since 2007, but never at this magnitude and with this many variables. Because the modeling and simulation effort is so complicated, officials said it may be necessary to use the model to optimize the most critical parts of the industrial process first before gradually adding others. Shipyard officials also said that running the models will require a highly skilled and interdisciplinary team due to the complexity of the effort. If the simulations are completed as planned, the Navy expects to use them to complete the shipyard Area Development Plans in fiscal year 2021 and a prioritized list of facility development projects by fiscal year 2022. Navy officials said the list would likely inform facility investments for the following 5 years. Navy officials told us that they are suspending work on many facilities’ projects in order to avoid funding projects that do not serve the larger optimization goal, although some critical projects have been allowed to continue because they provide improvements needed to meet immediate operational needs, such as dry dock improvements. However, according to Navy officials, some projects have been deferred until 2022 when the prioritized list of projects to support shipyard optimization is expected to be complete. In addition, specific actions to address other infrastructure deficiencies at the shipyards are not addressed in the current plan, adding additional uncertainty. Navy officials explained that the optimized layout of shipyard facilities, which is still in early development, will drive the future efforts that address deficiencies associated with roads, utilities, sidewalks, and information-technology systems, which are not addressed in the plan. These officials explained that it will likely be several years before they can incorporate specific actions into the plan to address these deficiencies. The Navy plans to mitigate equipment deficiencies at the shipyards through increased funding to replace aged shipyard equipment. Specifically, the Navy’s plan states that funding levels for shipyard capital equipment will need to increase from historical levels to about $150 million annually and be sustained for at least 20 years to bring the average age of shipyard equipment to within industry standards. However, it is not clear whether this will fully address shipyard equipment deficiencies, because the Navy officials stated that they will not be able to create a more detailed goal until after the facility modeling and simulation effort is complete. The Navy’s plan states that most shipyard capital equipment is beyond its effective service life, obsolete, unsupported by the original manufacturers, or at risk of failure. According to the plan, the average age for industrial equipment in the private sector is 7 to 10 years, while the average age of equipment at the four shipyards is 24 years. According to the Navy’s plan, aged equipment can increase the costs of depot maintenance for submarines and aircraft carriers and place schedules at risk. Modernizing the capital equipment at naval shipyards is essential to improving their efficiency, reducing maintenance costs, and supporting fleet readiness, according to the plan. The capital equipment deficiencies identified by the Navy’s plan are consistent with our recent work, which found that the equipment at the shipyards was, on average, past its expected service life (see table 1). However, it is too early to determine whether the Navy’s plan to increase equipment funding will fully address the shipyards’ equipment deficiencies. Navy officials told us that they have not yet established a specific improvement goal for shipyard capital equipment, because developing this metric will not be possible until after the modeling and simulation phase to develop optimized facilities is complete. For example, during the modeling and simulation phase to optimize shipyard operations, the Navy will likely make decisions that will affect the amount and cost of capital equipment, such as concentrating some specialized equipment at certain yards, standardizing equipment items and purchasing them in bulk at lower cost, or purchasing more efficient items that may reduce the quantity needed. Officials stated that they developed a rough order-of-magnitude estimate of the cost to replace aging equipment. The Navy has, in the past, spent about $50 million to $60 million annually to invest in capital equipment at the shipyards. However, the Navy estimates that it will require average annual funding of $150 million over the course of 20 years at a total cost of $3 billion in order to modernize capital equipment to within private industry standards. If this effort is sustained over the 20 years identified in the plan, the capital equipment deficiencies at the shipyards will not be fully addressed until fiscal year 2040. However, this estimate is based off an earlier Navy study that identified a need for annual average funding of $150 million over a longer, 30-year period. According to this earlier equipment study, the 10 additional years of investment would total $1.5 billion. Navy officials have stated that they will attempt to address the shipyards’ equipment deficiencies over the 20-year time frame by taking advantage of different equipment purchasing strategies and gaining efficiencies from the facility optimization effort that will allow the Navy to recapitalize equipment more effectively than was possible with its previous strategies. However, the efficacy of these strategies cannot be assessed until the Navy completes its modeling and simulation phase in fiscal year 2020 and develops more detailed plans for recapitalizing its shipyard equipment. The Navy estimates the Shipyard Infrastructure Optimization Plan will cost about $21 billion to implement; however, the estimate is preliminary and therefore is not complete or reliable. To develop the plan, the Navy first identified deficiencies in three major categories—dry docks, facilities, and equipment—and then developed a cost estimate to understand the resources it would need to mitigate those deficiencies. For the dry dock and equipment portions of the estimate, the Navy was able to build on previous cost estimates that had investigated additional investments in those areas. For the facilities portion of the estimate, the Navy assumed total reconstruction of most current facilities based on current processes, using notional square-footage facility requirements in the absence of a more detailed engineering assessment. The initial estimated cost to implement this plan over 20 years includes $4 billion for improvements to the dry docks, $14 billion for facilities, and $3 billion for capital equipment. Navy officials stated that they wanted to provide Navy leadership and congressional decision makers with a rough order-of-magnitude estimate, not a budget-ready cost estimate. That is why the estimate was released in its 2018 report to Congress, instead of after the Navy completes its shipyard modeling and simulation effort, which they believe will give them a more accurate picture of the necessary investments. For example, the Navy acknowledges that several expected costs are not included in its plan, such as those for utilities, roads, and environmental remediation. Officials with the Navy agree that including these will likely add hundreds of millions of dollars to the plan’s cost. However, they decided that it was not useful to calculate these costs before the facility optimization process was complete, since the facility layout is going to have an effect on the placement of roads and utilities, for example. Navy officials stated that the initial cost estimate was prepared using applicable Navy guidance and that they plan to develop a more detailed cost estimate after the Navy has finished creating digital models of the shipyards and they start prioritizing specific projects, which they estimate will be in fiscal year 2021. We found that the Navy’s initial cost estimate minimally met two characteristics of a reliable cost estimate, partially met one, and did not meet one, as shown in table 2. The GAO Cost Estimating and Assessment Guide identifies four “characteristics” of a reliable cost estimate as well as associated cost estimating best practices as previously discussed. Specifically, we found that the initial cost estimate was not reliable because it was not developed using the following best practices: Program Baseline: The Navy’s plan includes some pieces of a program baseline, such as a schedule and goals, but does not fully establish a common definition of the program from which all cost estimates could be derived. A program baseline for cost and schedule may be established prior to contract award or funding work and allows decision makers to track and report on cost and schedule deviations above certain thresholds from initial estimates throughout the life of the project, to facilitate oversight. Navy officials stated that the plan’s first phase is meant to serve as the program baseline, containing all relevant data to address systemic issues across all four shipyards. However, only the facilities estimate was developed specifically for the plan; the dry dock and equipment estimates came from previous Navy efforts, conducted under different conditions. Without a program baseline, a cost estimate will not be based on a complete program description and will lack specific information regarding technical and program risks. Work breakdown structure: The Navy’s plan includes a broad list of high-level goals, such as timelines for completing major lines of effort, but the estimate does not include a more detailed work breakdown structure. Including a work breakdown structure is an important part of a comprehensive plan. A work breakdown structure deconstructs a program’s end product into successive levels with smaller specific elements until the work is subdivided to a level suitable for management control. This allows program office and shipyard personnel to accurately track and closely monitor the progress of efforts to meet the SIOP’s goals. In addition, including this structure would ensure consistency across the various cost estimating contributors, the shipyards, and NAVSEA, and would ensure that there were no omissions from the analysis and that costs are not double counted. Navy personnel stated that a more detailed work breakdown structure would not be possible until after the modeling and simulation of the shipyards is complete, after fiscal year 2020. Methodology and key assumptions: The Navy’s plan describes assumptions, but not the methodology used to develop the initial cost estimate. For example, the plan states that the size and configuration of existing facilities make it difficult to increase capacity without a significant investment, but does not describe how the Navy intends to address the issue of a larger fleet. Cost estimates are often built around assumptions—such as the rate of inflation or material costs— because they are attempting to predict future costs. However, the plan must include a clearly identified methodology to be considered well- documented according to GAO best practices. Unless methodology and assumptions are clearly documented, it will be impossible to reproduce the estimate, and decision makers will lack information on which costs are concrete and which are best guesses. Inflation: The estimate did not account for inflation, which is an important component of an accurate cost estimate. If an estimate does not include adjustments for inflation, cost overruns can result. Inflation costs on a $21 billion program over 20 years could reach 45 percent or more. Applying inflation is an important step in cost estimating because, in the development of an estimate, cost data must be expressed in like terms. If a mistake is made or the inflation amount is not correct, cost overruns can result. Navy officials noted that they are currently evaluating the use of a covered dry dock model at the shipyards, which could result in significant maintenance efficiencies. A covered dry dock is a dry dock with an area built over it, which allows the shipyard to develop production space that can minimize personnel and materiel movement. However, the Navy is still investigating the cost benefit of the covered dry dock, which means that there could be additional costs or complications not included in the current plan. not include a cost risk or uncertainty analysis. A comprehensive analysis of risk and uncertainty in the estimate is an important component of an accurate cost estimate. Navy officials have identified a number of risks to implementing the plan, such as the costs of complying with historical preservation requirements, environmental remediation, and the acquisition or adaptation of alternative workspace for shipyards to use while facility upgrades are performed. Officials have stated that these factors could add hundreds of millions of dollars more to the total cost of the plan. For example, an official from Norfolk Naval Shipyard said that environmental remediation of certain sites at Norfolk alone could easily cost millions of dollars to execute. Furthermore, the plan excluded certain costs that the Navy will necessarily incur in implementing it, such as those related to utilities or roads. Because cost estimates predict future program costs—sometimes for projects that have never been built before— Navy officials always associate uncertainty with them (see sidebar). Lacking risk and uncertainty analysis, management cannot determine a defensible level of contingency reserves that is necessary to cover increased costs resulting from unexpected design complexity, incomplete requirements, technology uncertainty, and other uncertainties. While the Navy did not initially include mitigation strategies for these risks in the plan, Navy officials have stated that they are involved in a number of efforts to address them. Sensitivity: Our analysis showed that the Navy’s estimate does not include a sensitivity analysis, which evaluates the effect that individual elements or assumptions can have on the estimate. Without a sensitivity analysis, cost estimators and management will not have a full understanding of the implications that changes in ground rules and assumptions can have. Officials have stated that they plan to include a sensitivity analysis in their more detailed cost estimate in 2021. Independent Cost Estimate: Our analysis showed that the Navy’s plan does not include an independent cost estimate. An independent cost estimate provides an evaluation of the quality, accuracy, and reasonableness of a program’s cost estimate by a neutral third-party, with emphasis on specific cost and technical risks. It also helps to identify risks associated with budget shortfalls or excesses. Navy officials noted that an independent cost estimate was likely not feasible at this point, considering that the effort was still in its very early stages. However, the officials stated that given the size and projected cost of the plan, they anticipate they will likely seek out an independent cost estimate in the future. Navy officials said they plan to develop a more detailed cost estimate after the Navy has finished creating digital models of the naval shipyards and identifying their optimized layouts, which they estimate will be in fiscal year 2021. However, even in the context of a preliminary estimate, the best practices associated with the four characteristics are foundational and should be the building blocks upon which any sound program is based. The importance of best practices is only magnified by the size of the program, which means ignoring best practices can have meaningful effects. For example, as we noted previously, not adjusting for inflation is likely to underestimate the cost of the program. Navy officials have expressed openness to the best practices as they prepare the more detailed cost estimate. However, without incorporating these cost estimating best practices that inform Navy decision makers and Congress of the full costs of shipyard optimization, the Navy is at risk of not identifying the resources it needs to fully implement its optimization plan. In addition, without fully accounting for all costs, management will have difficulty successfully planning program resource requirements. The Navy created a management structure—a program management office (referred to as PMS 555)—to oversee the estimated 20-year-long process of optimizing the shipyards in June 2018. Shortly thereafter, in September 2018, the Assistant Secretary of the Navy for Research, Development, and Acquisition stated that, though the shipyard optimization effort did not fit all the characteristics of a formal acquisition program, its size and importance required the Navy to treat it as one. As a result, the newly created program office was designated as the acquisition lead for all efforts related to shipyard optimization. The program office was also required to report on its progress quarterly to an executive oversight council consisting of leadership representatives from a number of Navy organizations. This program office includes representatives from Navy organizations that would necessarily be involved in shipyard construction, including Navy Installations Command and Naval Facilities Engineering Command. Navy officials explained that NAVSEA is managing the implementation of the plan through the program office; Navy Installations Command provides installation support through management of shipyard land and facilities; Naval Facilities Engineering Command provides acquisition and technical expertise for real estate, facilities, and related environmental studies; and the shipyards implement the plan’s activities (see fig. 8). In the year since its creation, the program office told us they have begun taking steps to prioritize shipyard projects and complete the modeling and simulation of the existing shipyards. The office has also developed its internal organizational structure, which includes describing its relationships to essential stakeholders such as Navy Installations Command and Naval Facilities Engineering Command. However, the program office has not yet formally clarified the extent to which it will interact with the shipyards or its expectations of support from the shipyards. For example, officials with the program office have stated that they plan to locate new staff both in Washington, D.C., and at field offices at each of the shipyards. However, neither the program office nor the shipyards yet know where the field offices will fall in the shipyards’ reporting structures—including the chain of command—or precisely what their roles will be. According to program office representatives, the Navy is in the process of developing documentation, including a memorandum of agreement, to formally codify roles and responsibilities for executing the plan among the program office and its field offices, the shipyards, and other Navy organizations to accomplish these tasks, but did not provide an estimated time frame for when these roles and responsibilities would be determined. Officials said their current plan is for field offices to serve as extensions of the program office and that they will help the shipyards to oversee the execution of the plan. Program office representatives intend for shipyard personnel to help define project requirements, collect data, provide input on the digital shipyard models, and communicate the plan among the entire shipyard workforce. However, the development of the memorandum of agreement has been extended. Standards for Internal Control in the Federal Government states that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. Shipyard officials told us that the current lack of clarity has created concerns and confusion about what their roles should be during implementation. For example, shipyard officials were uncertain in what fiscal years certain positions would be needed for implementing the plan, and shipyard officials were not always involved with planning efforts. In addition, according to NAVSEA officials, the lack of clear roles and responsibilities has hampered several long-term planning efforts, including identifying and tracking performance metrics. According to Navy officials, the program office has since received funding that it intends to use to hire additional staff, and they intend to embed some of those staff members at the shipyards to coordinate with shipyard personnel. However, at present, shipyard personnel have stated that they are generally left to interpret and enact implementation activities, which could lead to inefficient or duplicative efforts. Given the time frames of the plan, even minor delays due to inefficiency could result in projects being postponed and critical ship maintenance being deferred. Establishing clear roles and responsibilities for the shipyards would better position the Navy to effectively implement the plan. The Navy’s four public shipyards are critical for repairing and maintaining the Navy’s nuclear fleet, and the Navy spends millions of dollars annually on facilities and equipment in order to sustain shipyard performance. Inefficient shipyards can lead to longer maintenance times, increased costs, and reduced readiness. Lack of adequate capacity can also result in critical parts of the fleet sitting idle awaiting maintenance, incurring hundreds of millions of dollars in operating and support costs without providing any operational benefit. We note that the shipyards are struggling to meet the Navy’s current needs with inadequate facilities, aging equipment, poorly configured dry docks, and an ineffective management approach for addressing these issues. The Navy is attempting to address these concerns with its Shipyard Infrastructure Optimization Plan. However, the cost estimate for implementing this plan is preliminary and therefore likely under states the costs of what will be a decades-long effort. Because the Navy will be required to request funding from Congress over 20 years in order to implement this plan, the lack of a reliable cost estimate places the effort at risk. By developing a more complete cost estimate, the Navy could reduce the risk that it might request too little funding to achieve its desired outcome. Without high- quality estimates, agencies are at risk of experiencing cost overruns, missed deadlines, and performance shortfalls. In addition, determining the roles and responsibilities of the organizations involved in implementing the plan would enhance the Navy’s ability to successfully complete the effort by ensuring that all stakeholders clearly understand their roles and expectations. We are making the following four recommendations to the Department of Defense: The Secretary of the Navy should ensure that the shipyard optimization program office (PMS 555) include all costs—such as costs for program office activities, utilities, roads, environmental remediation, historical preservation, and alternative workspace—when developing its second, more detailed, cost estimate. (Recommendation 1) The Secretary of the Navy should ensure that the shipyard optimization program office (PMS 555) use cost estimating best practices—as outlined in the GAO Cost Estimating and Assessment Guide—in developing its second cost estimate, including a program baseline, work breakdown structure, a description of the methodology and key assumptions, inflation, fully addressing risk and uncertainty, and a sensitivity analysis. (Recommendation 2) The Secretary of the Navy should ensure that the shipyard optimization program office (PMS 555) obtain an independent cost estimate of the program prior to the start of its project prioritization effort. (Recommendation 3) The Secretary of the Navy should ensure that the shipyard optimization program office (PMS 555), in coordination with relevant stakeholders, establish clear roles and responsibilities for the shipyards involved in the Shipyard Infrastructure Optimization Plan. (Recommendation 4) We provided a draft of this report to DOD for review and comment. In written comments provided by the Navy (reproduced in appendix III), DOD concurred with our recommendations. The Navy also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of the Navy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact me at maurerd@gao.gov or (202) 512-9627. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. The Navy released a 5-year plan for depot maintenance on submarines in December 2018, for fiscal years 2020 through 2024. The workload plan identifies efforts to address shipyard capacity issues across the nuclear- maintenance enterprise. According to the workload plan, the root cause of submarine idle time and associated loss of operational availability is largely that public shipyard capacity is not keeping pace with growing maintenance requirements. As a result, the public shipyards have historically struggled to complete maintenance on time, as shown in table 4. As we have previously reported, maintenance on ships and submarines may be delayed as a result of a number of factors, such as workforce gaps and inexperience, the poor condition of facilities and equipment, parts shortages, changes in planned maintenance work, and weather. The Navy’s workload plan discusses several efforts to improve maintenance performance at the public shipyards. Increasing hiring for the public shipyards. The Navy hired over 20,600 workers during fiscal years 2013 through 2018. After accounting for attrition, these hires increased total end strength from 29,400 to 36,700. Accelerating training for new employees. The effect of significant attrition and hiring resulted in approximately 56 percent of the shipyard production workforce having fewer than 5 years’ experience. The public shipyards implemented new approaches for accelerating training to develop skills in a relatively inexperienced workforce. Accounting for new employees’ lower proficiency and productivity. Shipyard officials have noted that employees with less than 5 years’ experience are generally not as skilled or productive as more experienced personnel. The Navy has established more realistic maintenance planning parameters to account for the lower proficiency and productivity of recently hired, less experienced workers. Improving the definition of workload requirements. Naval Sea Systems Command (NAVSEA) evaluated technical and program maintenance requirements with stakeholders in the maintenance community to identify and address barriers to on-time completion. Among the areas evaluated were time and condition-based maintenance strategies; logistic strategies; work estimating processes; shipyard overtime levels; and technology strategies. Improving material reliability and availability. The Navy is taking actions such as updating class maintenance plans; identifying and tracking frequently needed parts to determine appropriate acquisition strategies; creating an improved material forecasting tool; and moving material closer to the user. Balancing the submarine maintenance workload across the public and private shipyards. The Navy identified two submarines for which maintenance could be outsourced to Electric Boat or Huntington Ingalls over the next 5 years, in addition to the four submarines for which maintenance is currently outsourced. The workload plan contains some optimistic assumptions which may jeopardize achieving the intended benefits. According to the Navy’s workload plan, the Navy’s efforts identified above are intended to eliminate all submarine idle time and fully address the submarine maintenance backlog by fiscal year 2023. However, success of the plan depends on the public and private shipyards and the Navy realizing improvements in their performance that they have not yet demonstrated. For example: On-time completion of submarine maintenance, at both the public and private shipyards. The workload plan states that on-time completion of submarine maintenance, at both the public and private shipyards, is critical to eliminating submarine idle time and the submarine maintenance backlog. However, this assumption may not be realistic in light of recent performance at public and private shipyards. As discussed above, on average the public shipyards have completed maintenance on time only about 26 percent of the time between fiscal years 2007 and 2017. Of the three submarine maintenance periods that were allocated to the private shipyards between fiscal years 2015 and 2018, all three are projected to be completed about a year late, according to Navy reports. Officials with both Electric Boat and Huntington Ingalls have acknowledged the delays, which they attribute to an inexperienced workforce, lack of capital investment, and the submarines being in worse condition than expected. These officials also stated that if the Navy were to provide them with regular submarine repair work, they would expect their repair times to improve as their planning process matures and their workforce gains experience. Timely implementation of the Navy’s Shipyard Infrastructure Optimization Plan. Dry dock projects outlined in the Shipyard Infrastructure Optimization Plan must be completed on schedule, or else the Navy will not have the capacity to conduct some of its anticipated maintenance. This would in turn result in additional idle time and backlog. Some projects, such as the multimission dry dock project in Portsmouth, require the completion of earlier projects in order to proceed. Anything that disrupts the schedule of the earlier project could also affect the schedule of the later project. Given that the Shipyard Infrastructure Optimization Plan describes a 20-year- long effort that, at present, does not have clear organizational roles and responsibilities or a complete accounting of all the costs, it is possible that the gains it is intended to produce will take longer than expected to materialize. In addition to the individual named above, key contributors to this report are Suzanne Wren, (Assistant Director), James Lackey and Cody Raysinger (Analysts-in-Charge), A. Steven Bagley, Anna Irvine, Jennifer Leotta, Amie Lesser, Felicia Lopez, Carol Petersen, Michael Silver, and William Tedrick. Military Depots: Actions Needed to Improve Poor Conditions of Facilities and Equipment That Affect Maintenance Timeliness and Efficiency. GAO-19-242. Washington, D.C.: April 29, 2019. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy and Marine Corps: Rebuilding Ship, Submarine, and Aviation Readiness Will Require Time and Sustained Management Attention. GAO-19-225T. Washington, D.C.: December 12, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Navy Shipbuilding: Past Performance Provides Valuable Lessons for Future Investments. GAO-18-238SP. Washington, D.C.: June 6, 2018. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Affecting the Fleet. GAO-17-809T. Washington, D.C.: September 19, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions that Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Navy Shipbuilding: Policy Changes Needed to Improve the Post-Delivery Process and Ship Quality. GAO-17-418. Washington, D.C.: July 13, 2017. Department of Defense: Actions Needed to Address Five Key Mission Challenges. GAO-17-369. Washington, D.C.: June 13, 2017. Military Readiness: DOD’s Readiness Rebuilding Efforts May Be at Risk without a Comprehensive Plan. GAO-16-841. Washington, D.C.: September 7, 2016. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations. GAO-16-450. Washington, D.C.: June 9, 2016. Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Defense Inventory: Actions Needed to Improve the Defense Logistics Agency’s Inventory Management. GAO-14-495. Washington, D.C.: June 19, 2014. DOD’s 2010 Comprehensive Inventory Management Improvement Plan Addressed Statutory Requirements, But Faces Implementation Challenges. GAO-11-240R. Washington, D.C.: January 7, 2011.", "summary": "The poor condition of infrastructure at the Navy's four public shipyards—Norfolk Naval Shipyard, Virginia; Portsmouth Naval Shipyard, Maine; Puget Sound Naval Shipyard, Washington; and Pearl Harbor Naval Shipyard, Hawaii—affects the readiness of the aircraft carrier and submarine fleets they are charged with maintaining. In response to congressional direction to create a plan to address the shipyards' infrastructure deficiencies, the Navy developed the Shipyard Infrastructure Optimization Plan , which the Navy estimates will require $21 billion and 20 years to implement. Senate Report 115-262 accompanying a bill for the National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review the Shipyard Infrastructure Optimization Plan . GAO evaluated the extent to which the plan (1) addresses deficiencies in the infrastructure needed to support the Navy's projected needs, (2) includes reliable cost estimates to address those deficiencies, and (3) identifies clear roles and responsibilities for implementation. GAO reviewed the Navy's shipyard infrastructure plan and cost estimates; conducted site visits to shipyards selected to provide a variety of operational perspectives; and interviewed Navy and shipyard officials. The Navy's 2018 Shipyard Infrastructure Optimization Plan includes actions to address critical deficiencies at the shipyards, but the extent to which the plan fully addresses those deficiencies remains to be seen as the proposed actions are complex and years away from being implemented. The plan includes steps to address dry dock deficiencies, which the Navy expects willl provide it with the capacity and capability to perform 67 of 68 ship maintenance periods it is currently unable to support through fiscal year 2040. Once area development plans are complete (see figure), the Navy projects it will take at least $21 billion over 20 years to fully implement the plan. The Navy's initial cost estimate for the plan did not use certain best practices in developing the estimate, such as documenting key assumptions, accounting for inflation, and addressing risks that together could add billions to the ultimate cost. Navy officials stated that high-quality cost estimates will not be possible until they complete modeling and simulation in fiscal year 2020 and subsequently identify the most effective shipyard layouts and prioritize projects in fiscal year 2022. However, without fully following best practices in subsequent estimates, the Navy risks requesting inadequate resources to address shipyard deficiencies. The Navy created a program management office in June 2018 to oversee the estimated 20-year-long process of optimizing the shipyards. This program office includes representatives from multiple Navy organizations. However, the office has not formally defined the role of shipyard officials. Navy officials stated that they intend to develop an agreement to address roles and responsibilities, but this has not yet been finalized. Without defining clear shipyard roles and responsibilities, the Navy risks an ineffective implementation of its plan. GAO recommends that the Navy enhance the quality and reliability of its shipyard infrastructure plan by incorporating GAO's cost estimating best practices and determining clear shipyard roles and responsibilities for implementing the plan. The Navy concurred with these recommendations.", "document_type": "gao"}
{"report": "When children are removed from their homes, state or local child welfare agencies are typically responsible for coordinating their placement and provision of services. State or local child welfare agencies may also contract with private child welfare agencies to help them administer child welfare services. Child welfare agencies often place children in a foster home or in group care settings, depending on the child’s needs. Children placed in foster families may live with unrelated foster parents, relatives, or fictive kin (e.g., close family friends who are not relatives). Group care settings— also known as congregate care—typically include group homes and child care facilities that provide 24-hour care and/or treatment for groups of children. For example, these settings may include child care institutions, residential treatment facilities, or maternity homes, according to HHS. Child welfare agencies may provide foster caregivers with a monthly payment (referred to as a foster care maintenance payment) to help cover the costs of a child’s care, as determined by each state. Children generally remain in foster care until a permanent suitable living arrangement can be made, either by addressing the issues that led to the child’s removal and returning the child to his or her family; or through adoption, guardianship, placement with a relative, or another planned permanent living arrangement. In some cases, the child reaches adulthood before leaving foster care, commonly referred to as “aging out” of foster care. Historically, aging out typically occurred at age 18, but some state-funded programs implemented prior to the enactment of the Fostering Connections Act in 2008 allowed youth to remain in care beyond their 18th birthday. Title IV-E of the Social Security Act authorizes federal funding to state child welfare agencies to help cover the costs of operating their foster care programs. ACF administers title IV-E and oversees states’ foster care programs for compliance with IV-E requirements. Title IV-E is the largest single federal source of funding for child welfare programs, comprising about 89 percent of federal child welfare appropriations in fiscal year 2017 (approximately $7 billion of nearly $7.9 billion), according to ACF. Under title IV-E, states can access funding for their foster care programs in a few ways. Title IV-E reimbursements: Title IV-E funds may be used to reimburse states for a portion of expenses to support the daily care and supervision of eligible youth in foster care (such as for food, clothing, and shelter). The eligibility requirements generally limit reimbursements under title IV-E to youth that were removed from homes with very low incomes, among other criteria. However, some states have received waivers from certain title IV-E funding requirements to carry out HHS-approved demonstration projects. According to HHS, under these waivers states receive a capped allocation of title IV-E funds for youth in foster care, and these funds are generally reserved for youth under age 18. Chafee Program funds: The Chafee Program provides funding to states, under title IV-E, for support services that are intended to assist eligible youth in the transition to adulthood. Chafee Program funds are allocated to each state based on the state’s proportion of the nation’s foster care caseload. Through the Chafee Program, states can offer services to youth who have experienced foster care at ages 14 or older, youth who are likely to age out of foster care, and certain older youth who have aged out or left the foster care system. States generally have flexibility in determining the goals, strategies, and other features of their Chafee programs, as long as states design and conduct their programs based on the key purposes outlined in the law. Chafee Program services may include help with education, employment, financial management, housing, and emotional support through mentoring. State and county child welfare agencies may contract with private entities to provide these services. Up to 30 percent of a state’s Chafee Program allotment may also be used for room and board costs for certain eligible youth. According to HHS data, services provided under the Chafee Program may vary by state, including the extent to which states provide room and board financial assistance services. While title IV-E is the primary source of federal funding available to states for child welfare programs and services, states may also use other federal funds, such as title IV-B of the Social Security Act, Temporary Assistance for Needy Families (TANF) and Social Services Block Grant funds, as well as Medicaid. State child welfare agencies also generally combine state and local funds with federal funds to support their programs. According to a state survey funded by the Annie E. Casey Foundation and Casey Family Programs, in state fiscal year 2014, 43 percent of all child welfare expenditures were from federal sources, and 57 percent were from state and local funds. Since the Fostering Connections Act was enacted in 2008, HHS has as of February 2018 approved 26 states and six federally recognized tribes to claim title IV-E funding to extend foster care to youth ages 18 to 21. According to ACF, most of these states (19 of 26) began offering federally funded extended care between 2010 and 2012, with one state beginning to provide extended care as recently as 2018. States have several different options for implementing their extended care programs. For example, in order to be eligible for extended care, title IV- E requires a youth to meet at least one of five employment or education conditions specified in the statute. States can choose to use all or some of these conditions to determine which youth are eligible for their extended care program (referred to in this report as “eligibility criteria”). In addition, states can utilize supervised independent living settings for youth in extended foster care—a placement setting not typically available for federal reimbursement for youth under age 18. (See table 1 and fig. 1). The amendments made by the Fostering Connections Act permit states to use title IV-E funds to place eligible youth age 18 or older in supervised settings in which the youth live independently. According to a research brief sponsored by ACF, supervised independent living settings are unlike other foster care placement options (such as foster homes and group homes) because they are primarily intended for youth in extended care. States may place youth under age 18 in supervised independent living settings, but, as previously noted, they generally may not seek federal reimbursement for foster care maintenance payments for youth under 18 in such settings. According to ACF’s program instructions for implementing the Fostering Connections Act, state child welfare agencies have the discretion to develop a range of supervised independent living settings which can be reasonably interpreted as consistent with the law, including whether such settings need to be licensed and any safety protocols that may be needed. These instructions state that child welfare agencies may determine that—when paired with a supervising agency or supervising caseworker—host homes, college dormitories, shared housing, semi- supervised apartments, or other housing arrangements meet the supervised setting requirement. Youth in such settings may not have onsite caregivers and often have increased responsibilities, such as paying bills, assuming leases, and working with a landlord, according to ACF documentation. However, youth may receive foster care services, such as financial support and case management, to help them become successful adults. Additionally, ACF encouraged child welfare agencies to continue to work with youth who are in supervised independent living settings to ensure that youth form permanent connections with caring adults. This could include exploring options for guardianship, adoption, or living with other caring adults, and helping youth work towards those outcomes. In response to our survey, all 26 extended-care states reported offering a variety of supervised independent living arrangements as a placement option for older youth in care, with most of the options falling largely in two broad categories—transitional living programs and private residences—in addition to a range of other types of supervised independent living settings (see fig. 2). Overall, across 21 of the 26 extended-care states for which we analyzed placement data, about 34 percent of youth in foster care who were ages 18 to 21 were placed in supervised independent living settings in state fiscal year 2017 (see appendix I for additional information). Twenty-three of the 26 extended-care states reported that they offer transitional living programs as a type of supervised independent living arrangement. Generally, officials said these programs provide youth with the opportunity to practice daily independence and may include on-site case management and high levels of support built into regular programming. Supports may include experiential learning activities to build independent living skills, such as grocery shopping and budgeting. Local officials in California told us that transitional living programs are a stepping stone to independence, and they encourage older youth to start in one of these programs before living on their own. In our discussion groups with youth in extended care, youth told us transitional living programs helped them gradually move towards more independence and learn how to pay bills on their own. Officials we spoke with in the five selected states—California, Illinois, Maryland, New York, and Tennessee—described transitional living programs that use single-site or scattered-site models, or both, ranging from a group of youth living in a single family home to youth living in apartments dispersed across a geographical area (see table 2). Local caseworkers may continue to check in with youth in both single-site and scattered-site transitional living programs, but private agencies operating these programs are typically responsible for providing more frequent case management and supervision, according to officials in the selected states (see text box). One youth in a scattered-site program in California told us that he meets with his county case worker every couple of months, but he meets with program staff on a weekly basis and sometimes several times a week. Examples of Single-Site and Scattered-Site Transitional Living Programs in Selected States Single-site program: Officials from a single-site, all-male program in Tennessee described it as a family-like environment. Youth in the program live in cottages and house managers live in private quarters attached to the cottages. Program participants have their own bedrooms, and share bathrooms and common areas such as the kitchen. Youth over age 18 do not require 24-hour supervision, but have 24-hour access and daily interaction with the house managers. Youth typically receive an allowance of $150 per month (reduced to $100 if they are employed) to purchase personal items such as hygiene products. Scattered-site program: Officials from a private agency in California explained that their agency holds master leases on one- and two-bedroom apartments across Los Angeles and Alameda counties for youth who have demonstrated their readiness for more independence. An education and employment specialist or youth advisor meets with youth living in these apartments once a week, but youth can access program staff via phone anytime and are encouraged to attend activities at the agency’s main site. Youth receive a monthly stipend for personal expenses and their rent is paid by the program, but they are encouraged to work to manage additional living expenses. Those who stay in the program until they age out of foster care may remain in the apartment and take over the lease. Officials and representatives of private agencies we spoke with in four of the selected states said that they have transitional living programs specifically for certain populations that need specialized support. For example, Illinois officials described programs in their state that specialize in serving youth with mental illnesses, youth who are developmentally delayed, pregnant or parenting youth, youth who are dually involved with child welfare and justice systems, and youth with problematic sexual behaviors, such as sexual offenders. (See sidebar.) State and local officials we spoke with in the selected states said that youth who are ready to practice living more independently, in many instances with no on-site supervision, may live in private residences. Youth in these settings may choose where they would like to live, in comparison to youth in transitional living programs whose options may be limited to the apartments and facilities offered by the programs. Officials said that youth may live in apartments or private homes that are integrated in the community, and they are often responsible for signing their own lease or rental agreement. According to officials in the selected states, the level of supervision provided to youth living in private residences varies, but is generally less than youth in transitional living programs. Officials we spoke with in all five selected states confirmed that, at a minimum, case workers are expected to have monthly, in-person contact with youth. These visits are typically to confirm if youth are still in their living arrangement, and to determine if youth are experiencing any challenges, such as limited access to resources in their community. However, officials said that some youth may receive more frequent case management and supervision, such as youth who have behavioral or mental health conditions. For example, officials at one private agency in Illinois told us their staff have weekly check-ins with youth who require legal assistance or have mental health needs. State and local officials in two states mentioned that in addition to monthly in-person contact, case workers typically have more frequent communication with youth via phone calls, texting, or video conferencing. If youth are located far away to attend college or pursue other opportunities, caseworkers may use these alternative modes of communication to maintain contact and provide support. For example, a case worker for a private agency in Illinois told us that she video chats with her client twice a week, and communicates via text messaging and email several times a week, to provide support for this college student living in a private residence while studying abroad. Generally, states vary in the types of settings they allow for private residences, according to our survey results. Among the 26 extended-care states, the most common types of settings states reported offering include living in a shared apartment or home with a friend or roommate (25) or living in a private apartment or home (24). Most states reported that they also allow supervised independent living arrangements where a young person lives in a foster family home (20) (see text box). Living Arrangements with Current or Former Foster Parents In response to our survey, most states reported that they allow youth in supervised independent living arrangements to live with a foster parent. Officials in two states mentioned that because these placements are considered supervised independent living settings, youth are eligible to receive a stipend directly from the child welfare agency for rent and living expenses. The youth and their foster parent(s) may establish a rental agreement so the youth can practice paying rent. In three states, officials also said that they provide foster families with information and resources to teach and demonstrate independent living skills, such as cooking and cleaning a home. State and local officials said this arrangement allows youth to remain connected to a supportive adult, while also learning to live independently. In our discussion groups with youth in extended care, one youth told us that living with a foster family can be a good choice when a youth has a good bond with the foster parents, and when the foster parents allow the youth to have more independence. Youth in private residences typically receive a stipend to pay for their rent and other costs, according to our survey results. States reported that stipend amounts ranged from $421.80 to $1,715 per month. However, states reported having different expectations for youths’ responsibilities in covering their living expenses. Officials in some states said they require youth to supplement their stipend with income from their employment to cover living expenses. Officials in other states said they may encourage youth to work because the stipend may not be enough to cover most of their housing and other costs. Officials in one county said that youth may receive up to $850 per month but that amount may be adjusted based on the income they earn while attending school. In another state, officials reported that youth are expected to pay at least $50 towards their rent and, depending on the young person’s budget and financial obligations, the child welfare agency typically pays the difference directly to the landlord. One youth we spoke with in Illinois said that while working and going to school part-time, he built up his savings with help from the stipend that he received from the child welfare agency. States also reported allowing youth to live in a variety of other types of supervised independent living arrangements. According to our survey, other types of supervised independent living arrangements include college dorm rooms (22 states), Job Corps or employment training programs (21), single room occupancies (19), or mental health or substance use treatment facilities (15). Officials we spoke with said that they continue to provide case management and supervision to youth in these placements, and may also support youth with a stipend to assist with living expenses. Additionally, they said that when colleges go on break during the winter or summer, case workers work with youth to find a temporary placement if needed to ensure there is no lapse in housing. Temporary placements may include living with former foster parents, friends, or renting their own apartment. Supervised independent living settings are primarily intended for youth age 18 and older in extended care; however, some states also reported allowing these arrangements for youth under 18. In response to our survey, 19 of 26 states reported allowing youth under age 18 to live in supervised independent living arrangements. State and local officials said that in instances when youth under 18 are placed in supervised independent living arrangements, they are generally placed in college dorms or transitional living programs. In one state we visited, a transitional living program official said that the program accepts youth as young as 15 years old in a very few instances. (See table 3.) Local officials and case workers said that they place youth under age 18 in supervised independent living settings on a case-by-case basis if their case worker determines that the young person is mature and capable enough to manage living with less supervision (see text box). In response to our survey, 17 states reported that when youth under age 18 are placed in supervised independent living settings, they generally receive additional supervision or supportive services compared to youth 18 and older. Two states reported that no additional supervision or supportive services are provided for youth under 18 in independent living arrangements beyond those provided to youth ages 18 to 21. Officials we spoke with in three of the five selected states provided examples of the additional supports they offer to younger youth in these settings. Officials at one private agency in Tennessee told us that if youth under 18 in their transitional living program are unable to ride the bus to high school, program staff will transport them to school. State officials in California said that generally, youth under 18 living in transitional living programs receive more hands-on support. Officials at one private agency in California said the supports provided to youth under 18 in their transitional living program include 24 hour access to on-site program staff and weekly meetings with their case manager. Officials in Maryland told us youth under 18 living on their own receive additional case management support to evaluate how the youth is adjusting to living on their own, and to provide additional guidance on budgeting and household management. While many states allow youth under age 18 to live in supervised independent living settings in certain circumstances, over half of all extended-care states (15 of 26) reported that the typical age that youth enter this placement type is 18. Officials in three of the selected states said that even when the state allows it, these arrangements are not often used for youth under 18. Additionally, officials we spoke with reported that highly independent settings, such as their own apartment, are typically reserved for youth age 18 or older. Most states we surveyed reported considering youths’ readiness, such as life skills, education, and employment status, when placing youth in supervised independent living arrangements. Officials we spoke with in four of the five selected states similarly noted that supervised independent living is most appropriate for youth who have demonstrated their readiness. These officials also noted that they consider the availability of housing options, including for youth with complex needs, which can affect youths’ placement in supervised independent living arrangements. Life skills. In response to our survey, most states reported considering youths’ life skills when placing youth in supervised independent living. Specifically, 19 states reported requiring or recommending that youth participate in an assessment to gauge their mastery of certain life skills, such as the ability to budget finances or schedule medical appointments. For example, state officials in California said they developed an assessment form with questions such as whether youth understand the risks associated with using credit cards, can shop for food and prepare meals, and know how to do laundry. Caseworkers in one California county said that they consider youths’ ability to manage their living costs and their rental responsibilities prior to approving a supervised independent living placement. Education and employment. Most states also reported considering education and employment when placing youth in supervised independent living. Specifically, 16 states reported requiring or recommending that youth have a high school diploma or General Education Development certificate, or be enrolled in secondary or post- secondary school, in order to be placed in supervised independent living. Additionally, 17 states reported requiring or recommending that youth be employed or enrolled in a job training program. For example, in Illinois, youth who want to live in private residences must have a job for at least 45 days prior to being referred for placement, and continue working for at least 15 hours per week while in the private residence. Five states reported considering other indicators of readiness beyond life skills, education, and employment when placing youth in supervised independent living settings. For example, the District of Columbia reported requiring that youth (1) have no pending or unresolved criminal proceedings at the time they apply for supervised independent living, and (2) have a checking account with a minimum balance of $100 and actively participate in the child welfare agency’s financial literacy program. Availability of housing options, including for youth with complex needs. State and local officials in two of the five selected states said that they may place youth in private residences as a default or short-term option when no other living arrangements are available for youth age 18 or older. For example, officials in Tennessee said that transitional living programs and other housing options for youth outside of metropolitan areas are more limited. To ensure that youth in these areas do not experience homelessness, the officials said they may rely on other living arrangements, such as providing youth with stipends to live in private residences. Additionally, officials in New York and California said in certain localities, there may be constraints offering certain supervised independent living settings due to a lack of affordable housing. For example, officials in one San Francisco area county said some youth who want to live independently choose to move to a different part of the state, or even out of state, because their stipend for a private residence is insufficient to afford an apartment there. Officials in all selected states also said that there are shortages of foster parents willing to provide care for youth ages 18 to 21, which can generally affect their options for living arrangements. State and local officials from all five selected states also cited challenges finding housing options that are equipped to serve certain subpopulations of youth with complex needs, such as youth with acute mental health needs, youth that are also involved in the juvenile justice system, and pregnant and parenting youth. For example, local and private agency officials said state child welfare agencies may require parenting youth in supervised independent living settings to be in larger apartments, which may be too costly to afford. In addition, officials in four selected states said private agencies may be less likely to accept youth with acute mental health conditions or youth involved in the juvenile justice system if the agencies do not have the resources to address their needs. In addition to these considerations, officials we spoke with in all five selected states and other stakeholders said they consider the importance of giving youth in extended care greater involvement in decision making as they become adults. Local officials in California said they believe in allowing youth to take risks and experience the challenges of living independently while they have support from the child welfare system. Similarly, local officials in Tennessee said that giving youth choices in their living arrangements and considering their needs and goals is important for keeping them engaged in extended care. Most (24 of 26) extended-care states we surveyed reported using title IV- E funds to support youth in supervised independent living arrangements. Most (19 of 26) states also reported using Chafee Program funds, which primarily support independent living services, to fund supervised independent living arrangements. For example, state officials in Tennessee said that in certain situations when youth need to secure an apartment quickly, officials may use Chafee Program funds to help with the deposit. Officials in Illinois told us that they also use some Chafee Program funds for room and board, particularly for youth who are not title IV-E eligible. In addition to title IV-E and Chafee Program funds, most states reported using a combination of sources, including other federal funds such as those available under title IV-B of the Social Security Act, as well as state and local funds, to pay for supervised independent living arrangements. All states reported using state funds for supervised independent living (see fig. 3). Although most states reported using title IV-E funds to support supervised independent arrangements, in several states, few youth in extended care (regardless of their living arrangement) were eligible for title IV-E funding. In 14 of the 17 extended-care states for which we calculated eligibility rates, we found that the majority of youth ages 18 to 21 in care were not eligible for title IV-E reimbursement in state fiscal year 2017, meaning that the state was responsible for most or all of the cost of their care. We found that six of the states had title IV-E eligibility rates of 30 percent or lower. Two states, Virginia and Hawaii, had eligibility rates of over 70 percent (see fig. 4). State officials we spoke with in three of the five selected states said that ineligibility frequently stems from family income exceeding the income limit for title IV-E funding. Specifically, title IV-E is limited to youth removed from homes that would have qualified for cash assistance under the Aid to Families with Dependent Children (AFDC) program as of July 16, 1996. To receive title IV-E funding, youth must have met eligibility requirements at the time they were initially removed from their home, or at the time of their voluntary placement agreement. ACF has reported that fewer families meet the AFDC income standards over time, thereby reducing the number of all youth who are eligible for title IV-E funding, regardless of their age. In 2018, we reported on declining title IV-E eligibility rates for the entire population of youth in foster care. Officials we spoke with in Illinois and Tennessee said they reconsider a youth’s title IV-E eligibility once the youth turns 18, using the youth’s income at that point in time. Officials from these two states told us they close the original foster care case when a young person turns 18 and then reopen the case when the young person re-enters extended care. Using this approach, officials said they can base the title IV-E eligibility determination on the youth’s income at the time of re-entry into the foster care system, rather than the income of the home from which the youth was removed upon initially entering foster care. Illinois officials said this process helped increase the eligibility of their extended-care population by more than 30 percent since 2012. Officials we spoke with in the remaining three selected states said they do not use this approach. ACF officials said that states can choose to close and re-open cases for youth in extended care, which would allow new eligibility determinations based on a youth’s income. However, ACF officials said they do not monitor states’ choices in this area, or how states’ choices affect their title IV-E eligibility rate. Officials said they focus on helping states identify options and provide examples in ACF program instructions so states can determine what works best with their own policies and procedures. Four states (Arkansas, Indiana, Maryland, and Massachusetts) reported in our survey not claiming title IV-E reimbursements for any youth in extended care in state fiscal year 2017. Officials in two states, Indiana and Maryland, reported not claiming title IV-E funds for youth in extended care at least in part because they use a title IV-E waiver. However, according to ACF, states can claim title IV-E reimbursements for youth over 18 in addition to their waiver funds, so these two states may be able to claim additional title IV-E funds for their extended care population. State officials in Arkansas told us they have not yet established the proper procedures, internal controls, and monitoring mechanisms to allow them to claim title IV-E funds for youth in extended care. Officials said they do not have systems to track when youth may have lost their jobs or dropped out of school, which could affect the youth’s eligibility for extended care. To help youth develop independent living skills and successfully transition out of care, state and local officials in four of the five selected states reported offering targeted training and support for youth ages 18 to 21. For example: Officials in one Maryland county said they offer youth nearing age 21 a 3-week intensive training focused on employment and housing called “Keys to Success.” According to officials, Keys to Success offers experiential learning through cooking demonstrations, budgeting and financial literacy training, group trips to stores to look at furniture or interview-appropriate clothing, and housing fairs. (See fig. 5.) Officials from Youth Villages, a national nonprofit organization, said they offer the organization’s intensive YVLifeSet program to youth in extended care in Tennessee. The program generally lasts six to nine months and pairs youth with a specialist to meet with weekly to help them achieve their goals for independent adulthood. For example, to help youth maintain employment, officials said specialists can help youth build skills such as how to handle conflict with supervisors or coworkers, provide customer service, and understand job expectations, among others. In Illinois, the state’s “Countdown to 21” program is intended to encourage youth to plan for long-term education and vocational goals, and promote their financial stability through financial literacy training. All youth, at age 19, are referred to the financial literacy training, which covers topics such as credit and investing, and officials said most youth complete the training prior to exiting extended care. Officials in one California county said they offer youth ages 18 to 21 an annual public transportation pass through the Youth on the Move program, to ensure they can get to work or school. According to ACF, some extended care states also have a specialized case management system for youth over 18. For example, officials from one county in Maryland told us that all youth in foster care are automatically enrolled in a supervised independent living case management track when they turn 18. This case management system is intended to identify a youth’s areas of need and design a plan to prepare them for living independently, regardless of their current living arrangement. Youth in extended care can also participate in independent living services that are offered more broadly to all older youth in foster care. Officials in all five selected states reported offering services that support youth in extended care in their housing, education, financial literacy, and employment goals, as well as offering health education, mentoring, and training on daily living skills (e.g., grocery shopping and budgeting). Examples of types of services the selected states reported offering to all older youth include: Housing. Officials from Youth Villages described how their organization assists youth in Tennessee to learn to find and maintain stable housing. For example, Youth Villages specialists work with youth to search for affordable housing options, develop a housing budget, complete applications, and address background check issues. Specialists also help youth build and maintain relationships with roommates and landlords. Education. County officials in New York described how a local community college helps youth complete financial aid forms, and conducts college day simulations and resume-building workshops. Financial literacy. County officials in Maryland told us they offer classroom instruction on financial literacy which includes how to understand financial aid, good banking practices, and how to asses loans and grants. Employment. In California, county officials told us about several programs they offer to help youth meet their employment goals, such as a youth worker program in which 16- to 21-year-olds are hired to rotate through different county departments for 18 months. Health. County officials in Maryland told us they offer yoga classes and other stress reduction techniques, as well as outings to local clinics for youth to learn about family planning resources. Mentoring. County officials in California told us they host weekly social events to establish community connections between youth in care, and youth have regular meetings with supportive adults focused on building connections with family and friends. Daily living. Officials at a private agency in Illinois told us the youth in their housing programs have a set schedule to participate in different life skills activities, such as cooking, doing laundry, and other chores. Although officials in all five selected states said they offer a variety of training and supports to help youth in extended care develop independent living skills, officials in these states also said that youth may experience challenges using these skills. For example, officials said youth in private residences may have difficulty covering their living expenses, which can lead to evictions. A New York county official said some youth living on their own may struggle with the lack of structure and the amount of independence in making their own decisions and setting their schedule. For these youth, officials said the child welfare agency will increase the level of case management, and offer additional support or services. To best support the development of independent living skills in youth in extended care, officials we spoke with in all five selected states said they use assessments such as the Casey Life Skills assessment, transition planning, or regular check-ins to determine youth goals, direct youth to services to meet their needs, and to measure their progress. A county official in New York described how private child welfare agencies use the Casey Life Skills assessment every 6 months for youth in care to target services to areas in which the youth needs to build skills. Through its Ready by 21 program, Maryland has yearly independent living benchmarks for youth, starting at age 14. Officials we spoke with said that caseworkers can use these benchmarks to assess a youth’s progress towards living independently, create an individual service plan based on their progress, and direct youth to additional resources as needed (see fig. 6). In addition, title IV-E requires that caseworkers assist youth with developing a transition planning document. According to state and local officials, youth periodically meet with their caseworkers to discuss their progress on their goals, and caseworkers may provide additional guidance and support as needed during these meetings. For example, a caseworker in Tennessee described providing youth funds for driver’s education classes and licenses, prom expenses, and extracurricular activities, based on conversations with youth about their needs. Officials we spoke with in all five states also discussed providing financial incentives to encourage youth to participate in independent living services. For example, according to officials in Illinois, if youth complete the financial literacy course offered by the state child welfare agency, they receive $1,200 when they exit care. County officials in Maryland described participating in the Jim Casey Opportunity Passport program. In this program, officials said, youth who complete financial literacy training are eligible for a matched savings program of up to $3,000 to purchase an asset, such as a car. In our discussion groups with youth in extended care, youth told us that they are responsible for taking the initiative to participate in services, but financial incentives are helpful. Youth told us that as a result of these incentives, as well as other supportive savings programs, some are able to exit care with substantial savings. We provided a draft of this report to HHS for review and comment. In response, HHS provided technical comments, which we incorporated as appropriate, but did not provide general comments on the draft report. As agreed with your offices, unless you publicly announce its contents earlier, we plan no further distribution until 30 days from its issue date. At that time, we will send copies of this report to interested congressional committees and to the Department of Health and Human Services. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Figure 7 below presents the total number and percentage of youth in extended care by living arrangement (referred to as placement type) during states’ fiscal year 2017. Table 4 and Figure 8 present the number and percentage of youth in extended care by state and placement type during each state’s fiscal year 2017, respectively. Placement types include foster family homes with relatives or non-relatives, group homes or institutions, supervised independent living arrangements, and other types of arrangements. Figure 7, Table 4, and Figure 8 present information for 21 extended-care states. We excluded five of the 26 extended-care states we surveyed because they reported point in time data that did not reflect their entire state fiscal year 2017, or they reported data that were not reliable for the purposes of our analysis. To develop Figure 7, Table 4, and Figure 8, we assessed the information we collected in our survey of extended-care states on youth ages 18 to 21 for whom the state child welfare agency had responsibility for placement, care, or supervision during states’ fiscal year 2017. We administered the survey to state child welfare agencies in the 26 states approved by the Department of Health and Human Services (HHS) to offer federally funded extended care as of February 2018. The survey was conducted between August and October 2018 and we obtained a 100 percent response rate. Specifically, we asked states to provide data on the number of these youth in care by placement type. In addition, we asked states to provide data on the number of youth under age 18 that were placed in supervised independent living or other independent living arrangements. To ensure the quality and reliability of the survey, we pretested the questionnaire with three extended-care states to check (1) the clarity and flow of the questions, (2) the appropriateness of the terminology used, (3) if the information could be easily obtained and whether there were concerns about the reliability of data that would be collected, and (4) if the survey was comprehensive and unbiased. We revised the questionnaire based on the pretests. We reviewed responses to assess if they were consistent and contained all relevant information, and followed up as necessary to determine that states’ responses were complete, reasonable, and sufficiently reliable for the purposes of this report; we excluded data where we had concerns about their reliability. In addition to the contact named above, Sara Schibanoff Kelly (Assistant Director), Aimee Elivert (Analyst-in-Charge), Ada Nwadugbo, and Alexandra Squitieri made key contributions to this report. Also contributing to this report were Lucas Alvarez, Sarah Cornetto, Erik Gartland, Jean McSween, Mimi Nguyen, Jessica Orr, Jerry Sandau, and Almeta Spencer. Foster Care: Additional Actions Could Help HHS Better Support States’ Use of Private Providers to Recruit and Retain Foster Families. GAO-18-376. Washington, D.C.: May 30, 2018. Foster Care: Most Tribes Do Not Anticipate Challenges with Case Goal Changes but HHS Could Further Promote Guardianship Assistance. GAO-16-625. Washington, D.C.: August 8, 2016. Higher Education: Actions Needed to Improve Financial Access to Federal Financial Assistance for Homeless and Foster Youth. GAO-16-343. Washington, D.C.: May 19, 2016. Foster Care: HHS Could Do More to Support States’ Efforts to Keep Children in Family-Based Care. GAO-16-85. Washington, D.C.: October 9, 2015. Foster Care: HHS Needs to Improve Oversight of Fostering Connections Act Implementation. GAO-14-347. Washington, D.C.: May 29, 2014. Child Welfare: States Use Flexible Funds, but Struggle to Meet Service Needs. GAO-13-170. Washington, D.C.: January 30, 2013. Foster Youth: HHS Actions Could Improve Coordination of Services and Monitoring of States Independent Living Programs. GAO-05-25. Washington, D.C.: November 18, 2004.", "summary": "Youth who leave the foster care system at age 18 are often ill-prepared to live on their own and may face challenges as they transition to adulthood, such as difficulties finding stable housing. The Fostering Connections to Success and Increasing Adoptions Act of 2008 allowed states to receive federal reimbursement through title IV-E of the Social Security Act for a portion of the cost of extending care to certain eligible youth up to age 21. The Act also allows youth ages 18 up to 21 to live in a supervised setting in which the individual is living independently. One such setting may be an apartment, with monthly check-ins with a case worker (referred to as supervised independent living arrangements). GAO was asked to review supervised independent living arrangements and services for older youth. Among other things, this report examines (1) the types of supervised independent living arrangements available; (2) factors states reported considering when placing youth in these living arrangements; and (3) how selected states prepare youth to live independently. GAO surveyed state child welfare agencies in the 26 states approved by the Department of Health and Human Services (HHS) to receive federal funding to support their extended foster care programs; interviewed state and local child welfare officials and stakeholders in five states selected for factors such as variation in child welfare administration systems; reviewed relevant federal laws, regulations, and guidance; and interviewed HHS officials. The 26 states that have approval to receive federal funding to support their extended foster care programs for youth ages 18 up to 21 reported providing a range of supervised independent living arrangements. These arrangements include transitional living programs, private residences, and other settings (see figure). Officials we spoke with in five selected states said transitional living programs typically involve private child welfare agencies that lease apartments or facilities for youth, either at a single site or scattered across a geographic area, and offer on-site case management and supports to help youth build independent living skills. For private residences, youth may choose where to live, such as a private or shared apartment. In these cases, youth are typically responsible for their own lease, and may receive minimal supervision compared to youth in transitional living programs. For other settings, states reported options such as college dorms and residential employment training programs. Nineteen states also reported allowing youth under 18 to live in supervised independent living settings in certain instances, such as when they are pregnant, parents, or attending college, although such placements are generally not eligible for federal funding. Factors that most states reported considering when placing youth in supervised independent living arrangements include the youth's life skills—for example, their ability to budget finances and schedule medical appointments—as well as their education and employment status. Officials in selected states also said they consider the availability of housing, which may be limited in certain localities due to a lack of affordable housing options or other factors, and the options available to youth with complex needs, such as those who are pregnant and parents. Officials in four selected states said they help prepare youth in extended foster care to live independently by providing targeted trainings and other supports, such as financial literacy training. In all five selected states, youth can also learn independent living skills through services offered more broadly to all older youth in foster care, officials said, including assistance with housing, education, employment, and daily living skills, such as grocery shopping and budgeting.", "document_type": "gao"}
{"report": "Campus climate surveys on sexual violence are designed to collect information on the incidence and characteristics of sexual violence on college campuses as well as related student attitudes and behaviors. The topics covered by campus climate surveys can vary, depending on the questions included on the survey instrument. For example, these surveys may include questions about incidents of sexual violence, such as the number of incidents of sexual assault, intimate partner violence, or stalking, among other topics. There are two different methods that colleges can use to administer these surveys: In a census survey, all members of a group, such as the student body of a college, are surveyed. This type of survey can be used when the group that is the focus of the survey is small, when substantial resources and time are available to obtain enough responses to the survey, or when there is reason to provide all members of the group the opportunity to participate. In a sample survey, a portion of the group is selected using statistical methods to provide accurate information about the larger group. Administering a survey to a sample of students can reduce the time and resources needed to obtain enough survey responses to produce accurate data. Sample-based surveys are appropriate when it is not practical or desirable to survey every member of a group. With both sample and census-based surveys, collecting data that accurately represents the experiences of respondents requires taking a variety of steps when designing, administering, and analyzing the survey, such as weighting or analyzing the completed responses to ensure that they represent the larger group. A 2014 White House Task Force report recommended conducting these surveys as an initial step in a college’s plan to address campus sexual assault. The report also suggested follow-up actions for colleges to consider, such as providing training for college officials and creating partnerships with community sexual assault support services. In addition, there have been efforts to compare campus climate survey results across colleges. Some states have also enacted laws requiring colleges in their state to administer campus climate surveys. These state laws may vary in the nature of the survey requirements, such as the types of colleges covered by these requirements and whether a particular survey instrument must be used. For example, Louisiana requires public colleges in the state to administer these surveys, while New York requires all colleges located within the state to do so. Additionally, Louisiana requires that schools use a standard survey instrument developed by the state, while New York allows colleges to select their own survey instrument. However, there is currently no federal requirement for colleges to conduct campus climate surveys on sexual violence. Education, Justice, and HHS currently engage in a variety of efforts to address sexual violence on college campuses, including overseeing relevant federal laws and funding prevention and response activities. Education and Justice oversee colleges’ compliance with Title IX of the Education Amendments of 1972 (Title IX), which prohibits discrimination on the basis of sex in any education program or activity that receives federal financial assistance. Title IX prohibits sex discrimination— including sexual harassment and sexual violence—that effectively denies victims equal access to recipients’ educational opportunities or benefits. Under Education’s regulations, colleges receiving federal financial assistance from Education, such as those participating in federal student aid programs, must establish procedures for resolving Title IX complaints, and take steps to ensure that members of the college community are aware of their rights under Title IX. In addition, these colleges must designate at least one employee to coordinate their efforts to comply with and carry out their responsibilities under Title IX. According to Education guidance, the Title IX coordinator is responsible for coordinating the college’s response to all complaints involving possible sex discrimination, including monitoring outcomes, identifying and addressing any patterns, and assessing effects on the campus climate. Education also oversees the Clery Act, which requires colleges that participate in student financial assistance programs under Title IV of the Higher Education Act, as amended, to collect statistics on certain crimes that occur on or near their campuses, including specified sex offenses, publish those statistics in an annual security report, and annually report them to Education. Colleges must also include a policy statement in their annual security reports describing their sexual violence prevention and awareness programs for students and employees. In addition, Justice and HHS have funded grants for campus sexual violence prevention and response efforts. HHS has also developed a technical assistance document for planning and implementing sexual violence prevention strategies on college campuses. Education and Justice also manage key efforts to collect data related to campus sexual violence (see table 1). For example, Education oversees the Campus Safety and Security Survey, which collects information from colleges that participate in student financial aid programs on reported criminal incidents, including specified sex offenses, which occur on or near campuses that the colleges own or control, as required by the Clery Act. Colleges are required to include data on specified crimes that are reported to local police or campus security authorities and that occurred (1) on campus (including the subset of crimes that occurred in on-campus student housing facilities), (2) on public property within or immediately adjacent to campus, and (3) in or on non-campus buildings or property the college owns or controls. The survey collects data on the following offenses related to sexual violence: rape, fondling, incest, statutory rape, domestic violence, dating violence, and stalking. Education publishes the data on a public website. Justice collects data on crimes, including sex crimes, through the Bureau of Justice Statistics’ National Crime Victimization Survey (NCVS). The NCVS captures data on a range of offenses related to sexual violence: completed rape, attempted rape, threatened rape, sexual assault other than rape or attempted rape, unwanted sexual contact with or without force (e.g., grabbing, fondling), verbal threat of sexual assault other than rape, and stalking. The NCVS collects data through in-person interviews and phone calls with a nationally representative sample of households on the frequency, characteristics, and consequences of criminal victimization in the United States. In particular, the NCVS collects information about crimes reported and not reported to the police. Although the NCVS includes certain group residences, such as college residence halls, in its sample of households, the resulting data may not fully represent the sexual victimization experiences of college students residing on campus because the sample is primarily comprised of households. Research has found that individuals living in group residences may be at higher risk of sexual violence. Research has also noted concerns with how the NCVS is administered. Specifically, interviews are conducted in person at respondents’ homes or over the phone. As a result, victims may be less likely to honestly answer sensitive questions, such as those related to sexual violence, as their responses might be overheard by other members of their household or the offender. Stakeholders we interviewed, including survey developers, other researchers, and federal, state, and college officials, considered campus climate surveys a useful tool for learning more about the incidence of campus sexual violence and identifying areas for improvement to address it. However, stakeholders also noted that colleges face a variety of challenges with developing and conducting surveys, such as limited access to needed survey expertise and low response rates, which can affect the reliability of campus climate survey results. Nearly all stakeholders said that campus climate surveys provide an opportunity to learn more about the incidents of sexual violence occurring on individual campuses, such as those that students may not have previously reported to campus authorities or law enforcement. According to Justice officials and one researcher, campus climate surveys, which collect data directly from victims, can help overcome limitations in law enforcement data that rely on victims reporting to authorities (see sidebar). For example, the three campus climate surveys we reviewed are designed to capture information on incidents of sexual violence that students have experienced regardless of whether the incidents were previously reported to campus authorities or law enforcement. Underreporting of Traditional Crime Statistics According to a National Research Council panel, rape and sexual assault are generally underreported to law enforcement, which can affect traditional crime statistics for these incidents. For example, according to a 2014 Department of Justice report, National Crime Victimization Survey (NCVS) data showed the rate of rape and sexual assault for female college students was 6.1 per 1,000 (the 95 percent confidence interval ranges from 5.0 to 7.2 percent) for the period 1995–2013, and an estimated 80 percent of rape and sexual assault incidents went unreported to police (the 95 percent confidence interval ranges from 75 to 85 percent). College students responding to the NCVS who indicated they did not report incidents of rape and sexual assault to police cited a variety of reasons, such as considering the assault to be a personal matter, fear of reprisal, or not considering the victimization important enough to report. Similarly, Clery Act data are based on reports made to campus security authorities and law enforcement. According to one federally funded pilot study, data from campus climate surveys at nine colleges suggested that the majority of rapes are not represented in a college’s Clery numbers. In contrast, Clery Act data collected through Education’s Campus Safety and Security Survey provides information only on incidents that are reported to campus security authorities or law enforcement and that occurred on or near campuses that the colleges own or control. This can result in campus climate surveys identifying a larger number of campus sexual violence incidents than federal Clery Act data. For instance, a pilot study of campus climate surveys at nine colleges found that undergraduate students attending these colleges experienced an estimated 2,380 incidents of rape during the 2014-2015 academic year, of which an estimated 770 occurred on campus. In contrast, Clery Act data documented 40 reported rape incidents for these colleges during the 2014 calendar year. Several stakeholders we spoke with also said that campus climate surveys can provide information on a broader range of sexual violence incidents than federal crime statistics data, such as the National Crime Victimization Survey and Clery Act data, which collect information specifically on criminal offenses. For example, one researcher we spoke with noted that campus climate surveys can collect information about sexual harassment, which is not included in federal Clery Act crime statistics. The three surveys we reviewed collect information on a range of sexual violence incidents, including sexual assault, coerced sexual contact, stalking, intimate partner violence, and sexual harassment. Behavioral Questions Campus climate surveys on sexual violence ask students about a variety of topics that are often sensitive. One challenge of conducting these surveys is that students’ understanding of what behaviors are considered “sexual assault” or “rape” may differ and the words used to describe sexual violence will determine what is measured by the survey, such as incidents of rape. Research has found, for example, that surveys asking directly whether students experienced specific types of sexual violence can produce inaccurate data. To improve the quality of information collected by campus climate surveys, researchers ask students about specific behaviors and events that describe the incident rather than referring to it using a label such as “sexual assault” or “rape.” campus climate survey instruments we reviewed included questions that asked for additional context on incidents of sexual violence reported by students, such as the victim’s relationship to the perpetrator. Researchers we interviewed also noted that campus climate surveys can include behaviorally specific questions to identify conduct that survey respondents might not categorize as sexual violence (see sidebar). Each of the three surveys we reviewed used behaviorally specific questions to describe behaviors that may constitute sexual violence for survey respondents, without using specific terms, such as rape. For example: One survey we reviewed asks, “Since the beginning of the current academic year, has an intimate partner threatened to hurt you and you thought you might really get hurt?” instead of asking whether the respondent has experienced “intimate partner violence.” Another survey we reviewed asks, “How many times have one or more people left you unwanted messages (including text or voice messages)?” instead of asking if the respondent has experienced “stalking.” Seven of the nine researchers we spoke with considered behavioral questions to be a best practice for collecting data on sexual violence, including one that noted the general public may not be aware of the definitions of rape or other types of unwanted sexual contact or behaviors. However, one researcher we spoke with expressed concern that the wording of behavioral questions can be imprecise. Each of the three campus climate surveys we reviewed included questions regarding student knowledge of the administering college’s policies and resources related to preventing and responding to sexual violence on campus. According to nearly all of the stakeholders we interviewed, these data can help colleges identify areas for improvement. In particular, about half of these stakeholders noted that campus climate survey results can help colleges address barriers to reporting. For example, officials from one college we spoke with reported increasing their efforts to educate students about where to go if they experienced sexual assault based on gaps in awareness identified through survey results. Further, information from campus climate surveys also helped one state identify how it could better assist colleges, such as by providing training on intimate partner violence, according to a state official. Several stakeholders reported that campus climate surveys may also help colleges assess their performance on reducing sexual violence. For example, two researchers said that these surveys can help colleges see where improvements were made and where additional action might be needed. Another researcher we spoke with noted that colleges are very interested in using campus climate surveys to establish baseline data and are beginning to understand the usefulness of having data on sexual violence prevalence. While campus climate surveys can provide additional information on campus sexual violence, stakeholders reported that colleges face a variety of challenges with developing and conducting surveys, as well as analyzing the results. Although some survey instruments are free, about half of the stakeholders we interviewed offered that some institutions, particularly smaller colleges, may not have the resources to effectively administer surveys on their own. Stakeholders cited costs associated with hiring contractors or relying on faculty and staff to administer and analyze the results of a survey. For example, one researcher we spoke with said that administering a survey can require having people available to respond to student questions about the survey. Officials from one college we spoke with said they relied on faculty volunteers to analyze survey results over a school break, due to a limited survey budget. About half of the stakeholders also noted that providing incentives to students can help increase survey response rates, yet incentives can also be the most expensive part of a college’s survey budget. For example, one college reported that the $10 incentives offered to students who completed the survey constituted the college’s largest survey expense. Given the potentially high costs of these surveys, officials in one state we spoke with reported that the state provided funding to help its colleges administer surveys, analyze results, prepare reports, and translate the survey results into action. About half of the stakeholders also reported that some colleges may not have technical expertise readily available to conduct a campus climate survey on sexual violence. As previously noted, colleges can administer campus climate surveys to a sample of students (sample approach) or all students at a college (census approach). According to federal guidance, a sample approach can reduce the amount of follow-up needed to encourage survey completion; however, expertise is needed to create a sampling frame that includes all, or nearly all, of a target population, and then to accurately select a sample of that population to survey that still represents the target population. Several stakeholders said colleges may face challenges in creating a representative sample of their students, in particular. For example: One researcher noted that colleges may not collect sufficient demographic data or have adequate funding to create a representative sample of their students. Another researcher observed that for both sample and census surveys, colleges may also lack the expertise to ensure, through statistical methods such as non-response bias analysis or weighting responses, that respondents are representative of the student body. Justice officials noted that properly administering campus climate surveys requires personnel with adequate statistical expertise, as well as support from college administration. Research shows that statistical methods like testing for non-response bias and weighting responses are an important consideration when developing estimates on prevalence since non- response bias can potentially limit the extent to which the results can be generalized to the entire student population. One college that had not conducted a campus climate survey also noted that doing so would be a challenge due to limited expertise with conducting surveys on sensitive topics, such as sexual violence. However, two of the selected colleges that conducted campus climate surveys reported working with a third party to ensure more reliable results. Response rates are a key factor in producing reliable survey results, and most stakeholders reported that obtaining a sufficient number of responses from students can be a challenge. Achieving a sufficient response rate can help ensure that the survey results are representative of the target population, so that the results can be used with confidence to inform decisions. However, our prior work on federal sexual violence data found surveys are subject to variable response rates over time, and different surveys may have different response rates, which may affect the resulting estimates and the validity of the data. The seven selected colleges that conducted surveys reported response rates ranging from less than 10 percent to more than 60 percent. Additionally, officials we interviewed in two of the selected states reported that their survey response rates were not high enough to generalize or draw meaningful conclusions regarding campus sexual violence, as originally intended. Officials in these states said they primarily included the data in required state reports, with limitations noted as needed. Most stakeholders noted that survey design or administration factors can affect response rates. About half of the stakeholders noted that keeping the survey short is critical to ensuring more students complete it, but some topics of interest to the colleges may not be covered as a result. For example, at one college, officials included survey questions about sexual assault and sexual harassment, but did not pursue questions about stalking due to concerns about survey length. One researcher also told us that long and complicated surveys may not work well on smart phones, which is how many students take these surveys. As for survey administration, most stakeholders noted that choices on how to administer the survey can also affect the response rates for surveys. For example, two researchers we spoke with said that it is better to leave surveys open to respondents for a longer time period to increase the response rate. In addition, a researcher and one state official noted that technical issues can interfere with obtaining a high response rate, such as sending survey invitations to university email accounts that students may not check regularly. About half of the stakeholders stated that differences in survey instruments and methodology may make it difficult for colleges to compare their results with the results of other colleges. Variation in questions and definitions. The surveys we reviewed varied in the wording used to ask respondents about their knowledge of institutional policies for reporting sexual violence. According to one researcher, differences in the wording of questions and structure of questionnaires can affect comparability across surveys. Officials in one state also reported that colleges used different definitions of key terms on their campus climate surveys, which made it challenging to reach general conclusions across colleges. Similarly, another researcher stated that differences in the definitions of terms used in colleges’ campus climate surveys make accurate comparisons difficult. Variation in time periods. The surveys we reviewed ask respondents about incidents of sexual violence occurring over different time periods, which may also limit the comparability of survey results across colleges. According to one researcher we spoke with, colleges using different survey instruments should not compare prevalence estimates with results from other surveys that ask about incidents of sexual violence for different time periods. For example, one survey instrument we reviewed asks students about their experiences with sexual violence during the current academic year. In contrast, the two other survey instruments we reviewed ask students about their experiences with sexual violence since first enrolling at college, which covers a longer time period for seniors than first-year students. Time periods may also affect the accuracy of the data collected. One researcher we spoke with, for example, stated that survey questions that cover longer time periods can introduce bias, such as the telescoping effect, whereby respondents recall certain events as being more recent than they actually are. Additionally, longer time periods may yield larger numbers of incidents, since more individuals may experience the behavior over time. To address these comparability challenges, some colleges have used the same survey instruments as other colleges. For example, two colleges included in our review participated in a survey effort among multiple colleges that was designed to allow for comparisons across participating schools. To make these comparisons, a third party administered the survey at participating colleges using a survey instrument with standardized questions and a standardized methodology to enable the measurement of prevalence, and then analyzed the results. In summary, while all stakeholders noted the value of conducting campus climate surveys, about half of them generally cautioned against requiring colleges to administer them in light of the associated challenges previously discussed. Officials at one college that voluntarily conducted a campus climate survey using a one-time grant stated they would have to use funds from faculty and staff salaries if they were required to conduct a survey in the future. Additionally, an official from one college that had not conducted a campus climate survey noted that high turnover in the Title IX coordinator position would make it difficult for the college to sustain a survey effort over time. Further, another college that has not conducted a campus climate survey to examine the incidence of sexual violence noted it would be difficult to design a standard survey instrument that would apply across all colleges, such as those that primarily serve students who take courses online. The seven selected colleges that conducted campus climate surveys used various survey design, administration, and outreach strategies to learn about the incidence of campus sexual violence. Most of these colleges also chose to publicly report some survey results. Choosing a survey instrument. These seven colleges considered several factors when choosing a survey instrument: Rigor. Officials from each of the seven colleges that conducted a campus climate survey said it was important to use a rigorous survey instrument, such as one that survey developers have validated or colleges have widely adopted. One college official explained that using a validated instrument provided assurances that helped secure a timely approval from the college’s institutional review board. Flexibility. Officials from five colleges said they valued the flexibility of using a survey instrument that could be modified based on the specific characteristics and needs of their colleges. For example, officials from one college said that the chosen instrument enabled administrators to use gender-inclusive language and ask questions about incidents of sexual violence from the perspective of the perpetrator in addition to the victim. Comparability. Officials from four colleges noted that comparability was a consideration when selecting a survey instrument, including the potential to compare survey results across colleges that share similar characteristics or at their own colleges over time. However, as previously discussed, stakeholders noted that differences across survey instruments can limit the comparability of survey results. Cost. Officials from four colleges said the cost of conducting campus climate surveys informed their selection of a survey instrument. For example, officials at one college said they used a free, publicly available survey instrument because the college lacked the resources to pay for an instrument. Length. Officials from four colleges identified survey length as another factor they considered. Officials from three of these colleges specifically noted that longer surveys may result in lower response rates. In addition, officials from one of these colleges stated that because longer surveys collect more data, the college would need more time to analyze the results. An official from another college expressed concern that longer surveys with multiple follow-up questions about incidents of sexual violence risk re-traumatizing victims. Modifying the survey instrument. Six of the seven colleges modified their survey instruments to some extent. Officials at five of the six colleges reported adding questions to their survey instruments. For example, two colleges reported adding questions to comply with a state survey requirement, while another college reported adding follow-up questions to collect information on events prior to an incident of sexual violence. Officials at three of the five colleges reported limiting the number of questions they added to keep the survey short. Officials at two of these colleges noted that lengthening the survey could result in fewer students completing it. Officials at one of these colleges cited additional fees that the vendor charged for such modifications as another factor in their decision to limit the number of questions they added. Officials from two colleges also said they modified the language in the survey instruments to reflect the names of specific offices and programs on their campuses. In contrast, officials at one college reported making no changes to their survey instrument because they planned to use the original survey as a baseline against which to compare future survey results. Identifying the survey population. Six of the seven selected colleges that conducted a campus climate survey distributed their surveys via email to all students in the target population (i.e., a census approach), and one worked with a third party to select a representative sample of students to receive the survey. As previously discussed, surveying a sample of students can reduce the amount of follow-up work needed to obtain sufficient responses to provide information about the student body as a whole. However, officials at four of the seven colleges cited other considerations for choosing a census approach. Specifically, officials from three of these colleges said that a census approach provided every student the opportunity to share their experiences and perspectives through the climate survey. Officials from two of these colleges further explained that administering the survey to a sample of students could give the appearance they were excluding students, some of whom might be victims of sexual violence, from participating in the survey. Another college reported using a census approach because it lacked the resources needed to develop a representative survey sample. Determining survey timing and frequency. All seven of the selected colleges that conducted a climate survey administered at least one survey during the spring semester. Officials from three of these colleges said that administering climate surveys in the spring ensures that first-year students have spent time on campus prior to taking the survey. However, officials at four colleges said that competing demands for students’ time, such as other surveys and final exams, are a tradeoff to administering these surveys in the spring. As a result, students may experience “survey fatigue”—that is, they may be less likely to respond to or complete the survey. The seven selected colleges administered surveys with varying frequencies. For example, one college reported administering its survey biennially in accordance with a state requirement, while two others administered their surveys less frequently (e.g., every 4 years) to avoid survey fatigue and low response rates. Protecting confidentiality. Six of the colleges reported taking steps to preserve the confidentiality of survey respondents. For example, officials from five colleges explained that in order to maintain respondents’ confidentiality they had to redirect students who completed the survey to a separate webpage to claim their incentive or enter a drawing. Officials from four colleges reported using a third-party vendor to help protect students’ confidentiality or, at a minimum, signal that the college had no direct role in collecting or storing student responses. For example, to protect students’ confidentiality, officials from three of these colleges said their vendors provided summary data, rather than student-level data, and did not report results with a low number of respondents. Officials from three of the six colleges reported consulting their institutional review boards to help ensure that the colleges protected respondents’ confidentiality. Officials from another college reported limiting how often they administered campus climate surveys to head off potential student concerns that they were being “tracked” during their time on campus. Offering survey incentives. As part of their outreach efforts, six of the seven colleges offered incentives to students who completed surveys, which some research suggests can increase web-based survey participation rates (see fig. 1). For example, one college offered a $20 gift card to survey respondents, which college administrators considered critical to achieving a higher response rate. This comports with a study funded by Justice that found incentives between $20 and $30 appear to help maximize survey participation, whereas a $40 incentive does not clearly offer any additional advantage. To manage the cost of incentives, two colleges offered a limited number of incentives to students via lottery drawings. Officials from one of these colleges said it funded its lottery for five $200 gift cards with proceeds from an on-campus student event. Another college offered a coupon for a free drink at a campus coffee shop to the first 300 survey respondents. An official from the college that did not offer incentives in its most recent climate survey said that incentives would help improve response rates for future surveys. While incentives can help increase survey participation, two colleges noted that offering incentives may require additional precautions to prevent abuse. For example, one college had to put its survey on hold to fix a technical error that enabled a student to collect additional incentives by completing the survey multiple times. Another college with experience offering survey incentives reported that it received calls and emails from other colleges requesting assistance with preventing such abuses. Marketing the survey. Each of the seven selected colleges that conducted a climate survey used email to invite students to respond to the survey and various marketing efforts to encourage survey participation (see fig. 1). Officials from five of the colleges reported following up with email reminders. For example, one college reported adding the incentive dollar amount to the subject lines and another reported varying the gender of those who sent follow-up emails and the timing of them to increase student responses. In addition, five colleges reported using social media to advertise their climate surveys. Recognizing the importance of gaining institutional buy-in, officials at all seven colleges said they engaged college administrators or faculty in their marketing efforts. For example, officials at one college said that deans of its various schools were asked to send emails encouraging students to take the survey. The officials credited this particular email strategy for doubling the college’s survey response rate. Officials from five colleges also reported involving student leaders and influencers in their marketing efforts, such as creating t-shirts for students to wear that included information about the survey; having students publish an op-ed in the campus newspaper promoting the survey; and asking student leaders to share information about the survey with student organizations. Six of the seven selected colleges publicly reported at least some of the results of their surveys. Five colleges, for example, published survey results on their respective websites, and another created a campus poster with an infographic illustrating key survey results. Two of these colleges also presented the results during meetings with different student populations, such as fraternities and sororities and lesbian, gay, bisexual, transgender, and queer/questioning students. Officials from four colleges expressed that they felt a responsibility to be transparent. However, according to an official at one college, a potential drawback to making survey results publicly available is that the results could create or reinforce negative perceptions of a college’s climate regarding campus sexual violence. Finally, officials from the one college that had not publicly disclosed any survey results explained that, due to a lack of resources and in-house expertise, they did not feel sufficiently confident in their analysis of the survey results to publish them. Since the issuance of the White House Task Force to Protect Students from Sexual Assault report in 2014, federal agencies have created and disseminated informational resources for colleges interested in conducting campus climate surveys. For example, Justice’s Bureau of Justice Statistics and Office on Violence Against Women funded the development of a publicly available survey instrument and a validation study from 2014 to 2016, to provide colleges and researchers with access to a free and reliable survey instrument to collect school-level data on campus climate and sexual victimization. In 2017, Justice also collaborated with HHS’s Centers for Disease Control and Prevention to provide funding and project planning assistance for a pilot study to develop and test a campus climate survey for use at two Historically Black Colleges and Universities. According to Justice and HHS officials, this survey instrument was based on the validated Justice survey instrument, with some modifications made to the campus climate questions. In October 2019, Justice officials told us the agency had decided not to proceed with funding for the study due to concerns that modifications to the original validated survey instrument would result in data that are not comparable to data from the validation study. In addition, Justice has developed technical assistance materials for colleges interested in conducting a campus climate survey. For example, from 2016 to 2017 Justice’s Office on Violence Against Women issued documents outlining lessons learned from the Justice survey validation study, talking points to help college administrators and students communicate about climate surveys, and a frequently asked questions sheet on campus climate surveys. These documents covered a range of topics, including the goals of a campus climate survey, best practices for developing survey content, and tips for choosing survey participants and protecting their confidentiality, among others. Justice’s campus climate survey, validation study, and technical assistance documents are publicly available on Justice’s website. Justice’s campus climate survey and validation study are also available through the Center for Changing Our Campus Culture, an online clearinghouse developed and maintained by a nonprofit organization with funding from Justice’s Office on Violence Against Women. The clearinghouse provides resources for colleges on addressing sexual assault, domestic violence, dating violence, and stalking. For example, the clearinghouse includes documents outlining (1) selected research initiatives and resources on campus climate surveys, (2) suggested campus sexual assault policies and procedures, and (3) steps college institutional review boards and administrators can take to oversee research on sexual violence while maintaining participant confidentiality. Most stakeholders we interviewed were aware of federal information and resources available to assist colleges in conducting campus climate surveys. For example, officials at two of the colleges reported using Justice’s survey instrument for their campus climate surveys, with officials from one college noting they selected the instrument because it had been validated as a reliable instrument. An official from another college reported using Justice’s validation study during the survey instrument selection process, to better understand the strengths and weakness of survey instruments and potential sources of bias in the data collected. In addition to the resources provided by Justice, Education has offered information to colleges regarding the prevention of campus sexual violence. For example, Education’s 2015 Title IX Resource Guide encouraged Title IX coordinators to help colleges develop a method, appropriate to their college, for surveying students about the campus climate. Additionally, to address Title IX concerns or complaints, Education may enter into voluntary resolution agreements with colleges. These agreements describe the changes colleges agree to make to ensure their procedures for preventing and responding to sex discrimination comply with the law. According to agency officials, Education may include campus climate surveys as part of these voluntary agreements, on a case-by-case basis. Justice and HHS have also funded campus sexual assault prevention and response grants. For example, Justice’s Office on Violence Against Women provides grant funding to colleges to help improve responses to sexual assault and other types of domestic and sexual violence through its Grants to Reduce Sexual Assault, Domestic Violence, Dating Violence, and Stalking on Campus Program. According to a Justice official, colleges receiving these grants are allowed, with prior approval, to use a small percentage of the grant funds to conduct campus climate surveys for program improvement purposes, but it is not a requirement of the program. Additionally, HHS’s Office on Women’s Health provided funding for the College Sexual Assault Policy and Prevention Initiative from 2016 to 2019 to organizations that partnered with colleges to provide technical assistance and support in developing sexual assault policies and prevention strategies. According to HHS officials, grantees were encouraged to conduct campus climate surveys to establish baseline data for their partner campuses. HHS officials also reported providing grantees with information on different campus climate survey instrument options, including a free, publicly available survey instrument. One college we spoke with reported partnering with one of these HHS grantees to conduct baseline and follow-up campus climate surveys and to develop comprehensive campus prevention strategies. For example, officials from the college and the grantee told us they used funds from the grant to help the college establish memoranda of understanding with community-based organizations, such as the local women’s crisis center, to support students living off-campus who may have experienced sexual violence. We provided a draft of this report to the Departments of Education and Justice for review and comment. The Departments of Education and Justice provided technical comments, which we incorporated as appropriate. We also provided relevant report sections to the Department of Health and Human Services, and to third parties, including survey developers and states included in our review, for technical comments. The Department of Health and Human Services, survey developers, and state officials provided technical comments, which we incorporated as appropriate. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretary of Education, the Attorney General, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or larink@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. This report examines (1) what key stakeholders view as the strengths and limitations of using campus climate surveys to examine the incidence and characteristics of sexual violence on college campuses, (2) what approaches selected colleges have used to survey their students about the incidence of sexual violence on campus, and (3) what role federal agencies play in helping colleges develop and implement climate surveys. To inform our examination of stakeholders’ views on the strengths and limitations of campus climate surveys, we reviewed three commonly used survey instruments that included questions regarding the incidence of sexual violence, including sexual assaults, coerced sexual contact, stalking, and intimate partner violence. Each of these survey instruments is also available, online or by request, for any college to use for free. For each of the surveys, we reviewed survey questions and methodological reports, and conducted interviews with representatives from the organizations involved in developing them. The Association of American Universities (AAU), an association of 65 research universities, developed its survey instrument in conjunction with the research firm Westat. AAU administered its survey to participating colleges in spring 2015 and spring 2019. The Administrator Research Campus Climate Collaborative (ARC3), an organization of sexual assault researchers, university administrators, and student and legal affairs professionals, developed and tested its campus climate survey from 2014 to 2015. The final survey instrument was made available to colleges in 2015. According to the survey developers, there is no comprehensive list of schools that have conducted the ARC3 survey. The Department of Justice (Justice) survey instrument was initially developed by the White House Task Force to Protect Students from Sexual Assault in 2014, and later refined and tested by Justice in collaboration with RTI International, a research organization. The survey instrument, also known as the Campus Climate Survey Validation Study, is publicly available online. According to Justice officials, there is no comprehensive list of schools that have conducted the Justice survey. Additionally, we reviewed two key federal data sources on campus sexual violence: Clery Act data from Education’s Campus Safety and Security Survey and the National Crime Victimization Survey (NCVS) from Justice. We identified these data sources based on a review of prior GAO work and interviews with Education and Justice officials. We examined documentation for these data sources and interviewed the responsible agency officials to determine the type of data they collect on campus sexual violence, the methods for collecting this information, and their limitations. We determined these data sources were sufficiently reliable for our purposes. To inform all three objectives, we also interviewed a total of 25 stakeholders with relevant expertise, including representatives of four organizations involved in developing the three surveys we reviewed and five additional researchers who have studied campus sexual violence; officials from 10 colleges; officials from four states; and federal officials from Education and Justice. We refer to the representatives of these organizations and entities collectively as “stakeholders” in our report. When discussing stakeholder views, we group them into the following categories: “several” (between four and nine), “about half” (between 10 and 14), “most” (between 15 and 19), and “nearly all” (20 or greater). In instances where we report on the views of specific groups, such as colleges, researchers, or state officials, we refer to the individual group and enumerate the number of group members. During these interviews, we gathered information on issues related to designing and conducting campus climate surveys and analyzing and communicating survey results. We also discussed federal information and resources available to help colleges develop and implement campus climate surveys. Findings from our interviews summarize selected stakeholders’ views regarding campus climate surveys on sexual violence. These findings do not represent the views of all researchers on these topics and do not represent the experiences of all colleges developing or implementing these surveys. To identify researchers with a variety of perspectives, we reviewed research on sexual violence and conducted targeted web searches. We then selected individuals or organizations with experience conducting research on campus sexual violence or developing and administering a campus climate survey on sexual violence. We also spoke with representatives of the organizations responsible for developing the three climate survey instruments we reviewed. We used multiple approaches to identify the 10 selected colleges included in our review since there is no central repository of information on whether colleges have conducted a campus climate survey on sexual violence. Colleges that conducted a campus climate survey. Based on targeted web searches, we identified colleges that had conducted a campus climate survey and then grouped them according to which of the three survey instruments they used. We analyzed data from the Department of Education’s Integrated Postsecondary Education Data System to identify the characteristics of these colleges, including sector (i.e., public, private not-for-profit, and private for-profit), program length (i.e., 2-year and 4-year), size, and geographic location. Colleges that had not conducted a campus climate survey. We also used data from the Integrated Postsecondary Education Data System to help identify colleges that had not conducted campus climate surveys on sexual violence. Specifically, we grouped colleges into categories by sector and program length and randomized the lists within each category. To select specific colleges, we started with the college in each category at the top of the randomized list and conducted targeted web searches in an effort to ensure the college had not publicly reported conducting a campus climate survey. We conducted outreach to the Title IX coordinators at each of the selected colleges via email or telephone to confirm whether or not the college had conducted a campus climate survey on sexual violence. In total, we selected 10 colleges, including seven that have conducted campus climate surveys that examine the incidence of sexual violence on their campuses and three that have not. We selected these colleges to ensure variation in size, sector (i.e., public, private not-for-profit, and private for-profit), program length (i.e., 2-year and 4-year), geographic location, survey instrument used, and whether the college was located in a state that as of January 1, 2017 had a statutory requirement in effect for at least some colleges in their state to conduct a campus climate survey (see table 2 for selected colleges by program length, sector, and use of campus climate survey). We interviewed Title IX coordinators and other knowledgeable officials regarding the selected colleges’ experiences with conducting campus climate surveys and their perspectives on the strengths and limitations of these surveys. As part of our efforts to obtain a variety of perspectives, we also conducted semi-structured interviews with officials from four states regarding the use of campus climate surveys in their states. We selected three states (Louisiana, New York, and Washington) that as of January 1, 2017, had a statutory requirement in effect for at least some colleges in their state to conduct a campus climate survey, and one state (Ohio) that recommended colleges conduct such surveys. To identify states that required or recommended that colleges conduct campus climate surveys, we used several approaches to develop a preliminary list, including consulting with researchers, reviewing annual reports from 2014 to 2019 prepared by the National Conference of State Legislatures on state higher education legislation, and conducting targeted web searches. Based on these reviews, we judgmentally selected four states to ensure a diversity of state experiences with requiring or recommending campus climate surveys. We also confirmed applicable state requirements with state officials. The selected states differed in the nature of the survey requirement or recommendation, such as the types of colleges covered (e.g., public or public and private) and how frequently the survey was required or recommended to be administered. To supplement information gathered from our interviews, we also identified and reviewed studies and reports that examined the design and use of campus climate surveys. We conducted a targeted search of various databases to identify studies on leading survey practices. We selected studies for additional review based on their relevance to our objectives, and, using a standard review instrument, assessed the quality and rigor of each study’s findings and methods. Our report includes information about leading survey design and implementation practices from those studies we found were appropriate through this review process. To examine the role that federal agencies play in helping colleges develop and implement climate surveys, we reviewed Justice and Education resources available to help colleges conduct campus climate surveys. Additionally, we reviewed information on campus sexual violence prevention grants provided by the Department of Health and Human Services. We also reviewed relevant federal laws and regulations, as well as federal guidance and other documentation pertaining to campus sexual violence and campus climate surveys. We conducted this performance audit from July 2018 to April 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contact named above, Debra Prescott (Assistant Director), Maria Gadel (Analyst-in-Charge), Jonathan Adams, Will Colvin, Caitlin Cusati, Kirsten Lauber, and Erica Vilay made key contributions to this report. Additional assistance was provided by MacKenzie Cooper, Sarah Cornetto, Holly Dye, Monika Gomez, Dana Hopings, Connor Kincaid, Sheila R. McCoy, Mimi Nguyen, and Almeta Spencer.", "summary": "Sexual violence–which can include crimes such as rape and other forms of sexual coercion–is widely acknowledged as a problem on college campuses. Although Education collects some data on sexual violence at colleges that receive federal funding, measuring the prevalence of campus sexual violence has proven difficult, due in part to underreporting of these incidents to law enforcement. While some researchers have used surveys to gather additional information regarding sexual violence on college campuses, estimates from these surveys can vary widely due to factors such as differing methodologies and response rates. This report examines (1) key stakeholders' views on the strengths and limitations of campus climate surveys on sexual violence, (2) approaches selected colleges have taken to survey their students, and (3) the role federal agencies play in helping colleges develop and implement these surveys. GAO reviewed documentation for three widely administered survey instruments, and relevant federal laws, regulations, and guidance. GAO interviewed 25 stakeholders, including researchers; Education and Justice officials; officials in four states that required or recommended campus climate surveys as of January 1, 2017, a date selected to allow time for implementation; and 10 colleges—including seven that conducted campus climate surveys—selected based on program length (2- or 4-year), geographic diversity, and other factors. Campus climate surveys that examine sexual violence occurring on individual college campuses have several strengths and limitations, according to stakeholders GAO interviewed. Strengths. Nearly all stakeholders said colleges can use these surveys to gather more comprehensive information about incidents of campus sexual violence, such as those not previously reported to the colleges or law enforcement. Surveys can also provide information on students' knowledge of the colleges' procedures for reporting incidents, among other topics, which can help colleges identify areas for improvement. Limitations. Most stakeholders said getting students to respond can be challenging. In addition, about half of stakeholders said some colleges may not have the resources to effectively administer these surveys, and results across colleges that use different surveys may not be comparable. The seven selected colleges that conducted surveys reported using various approaches to survey their students about the incidence of campus sexual violence. Each college used one of three widely used surveys, but six modified them to some extent. Six colleges sent the survey to all undergraduates, and one surveyed a representative sample of students. Colleges also reported using multiple outreach strategies to increase participation, including offering incentives, such as gift cards, to students who completed the survey; using social media; and involving student leaders (see figure). Colleges' reported response rates ranged from less than 10 percent to more than 60 percent. The Departments of Justice (Justice), Education (Education), and Health and Human Services (HHS) have created and disseminated informational resources for colleges interested in conducting campus climate surveys. For example, from 2014 to 2017, Justice made funding available for the development of a campus climate survey instrument for public use, and developed technical assistance materials covering various topics, including how to choose survey respondents and protect their confidentiality. In addition, in 2015, Education issued guidance encouraging colleges to develop ways to survey students about the campus climate. Justice and HHS have also funded grant programs that allowed grantees to use some funding to conduct campus climate surveys.", "document_type": "gao"}
{"report": "NMFS and the eight regional fishery management councils are responsible for managing approximately 460 fish stocks in federal waters, as shown in figure 1. NMFS has overall responsibility for collecting data on fish stocks and ocean conditions and for generating scientific information for the conservation, management, and use of marine resources. NMFS carries out this responsibility primarily through its five regional offices and six regional fisheries science centers, which are responsible for collecting and analyzing data to conduct stock assessments. Stock assessments consider information about the past and current status of a managed fish stock, including information on fish biology, abundance, and distribution that can be used to inform management decisions. To the extent possible, stock assessments also predict future trends of stock abundance. NMFS provides the results of its stock assessments and other analyses, as appropriate, to the councils for use in implementing their respective fisheries management responsibilities. In the South Atlantic and Gulf of Mexico regions, NMFS provides support to the councils’ management efforts through its Southeast Regional Office and the Southeast Fisheries Science Center. Under the Magnuson-Stevens Act, the councils are responsible for managing the fisheries in their region. This includes developing fishery management plans, subject to NMFS approval, based on the best scientific information available and through collaboration with a range of stakeholders. The councils convene committees and advisory panels to assist them in developing research priorities and selecting fishery management options, in addition to conducting public meetings. The councils are to comprise members from federal and state agencies, as well as the commercial and recreational fishing sectors (see fig. 2). The councils—supported by council staff such as biologists, economists, and social scientists—are responsible for preparing proposed fishery management plans or plan amendments for NMFS review. These plans or amendments are to identify, among other things, conservation and management measures to be used to manage a fishery, including determining the maximum size of a fish stock’s allowable harvest. This is generally done by developing annual catch limits for each fish stock, that is, the amount of fish that can be harvested in the year. Fishery management plans or amendments also include establishing or revising any allocations between the commercial and recreational sectors for mixed-use fish stocks where the councils determine it may be warranted. For example, councils may allocate a percentage of a fish stock’s annual catch limit between the recreational and commercial fishing sectors. See figure 3 for an overview of the federal fisheries management process. Council staff facilitate the fisheries management process by organizing council meetings, preparing and providing analyses for those meetings, and facilitating input from stakeholders and the public on fisheries management issues, among other things. Stakeholders include participants in the commercial and recreational fishing sectors and related industries, such as fishing associations, seafood dealers and processors, food and travel industry representatives, and conservation groups. Once the councils complete proposed fishery management plans or plan amendments, they are to provide them to NMFS for review. NMFS is responsible for determining if the plans or amendments are consistent with the Magnuson-Stevens Act and other applicable laws, and for issuing and enforcing final regulations to implement approved plans. Tables 1 and 2 highlight the mixed-use fish stocks the South Atlantic and Gulf of Mexico councils manage, respectively. Under the Magnuson-Stevens Act’s national standards for fishery management plans, allocations are to be fair and equitable to all U.S. fishermen; reasonably calculated to promote conservation; and carried out in such manner that no particular individual, corporation, or other entity acquires an excessive share. NMFS guidelines for the national standards further indicate that in making allocations, councils should consider certain factors relevant to the fishery management plan’s objectives. These factors include economic and social consequences of the allocations, food production, consumer interest, dependence on the fishery by present participants and coastal communities, efficiency of various types of gear used in the fishery, transferability of effort to and impact on other fisheries, opportunity for new participants to enter the fishery, and enhancement of opportunities for recreational fishing. In reviewing and approving fishery management plans and amendments, NMFS is responsible for ensuring that the councils’ allocation decisions comply with the Magnuson-Stevens Act’s national standards. In this report, the terms “established” and “revised” allocations refer to allocations established or revised by the councils and subsequently approved by NMFS, unless otherwise stated. Historically, mixed-use fisheries allocations have been based predominantly on data estimating each fishing sector’s past use of the resource, according to NOAA. To collect commercial and recreational data, NMFS works with partners such as coastal states and interstate marine fisheries commissions. In particular, for the commercial fishing sector, NMFS collects data on landings, which include the weight and value of fish stocks sold to seafood dealers using a network of cooperative agreements with states. For recreational fishing, NMFS uses data from its Marine Recreational Information Program, which the agency began implementing in 2008 in place of the Marine Recreational Fisheries Statistics Survey. The Marine Recreational Information Program collects data on private anglers’ fishing effort and catch rates and uses these to estimate total recreational fishing catch. NMFS officials said that the program also collects information to estimate recreational landings. The program collects these data through such methods as mail surveys and shore-side interviews of anglers at public access fishing sites. Recognizing the difficulty in making allocation decisions—in part because allocations may be perceived as unfair by some stakeholders—NMFS commissioned a nationwide study in 2012 to examine allocation issues and gain stakeholders’ perspectives from commercial and recreational fishing sectors. The results of the study showed widespread dissatisfaction with how past allocation decisions were made. The study found little consensus on how to address concerns with allocations. For example, some stakeholders said that some allocations were outdated and that changes over time in human population, seafood demand, and recreational fishing warranted a comprehensive examination of allocations. Other stakeholders expressed concern that a uniform approach to allocation policy could harm fishing sectors, while others noted that it is important for the councils to have the flexibility to make regionally-focused decisions. The study concluded that many stakeholders may continue to view allocations as unbalanced or unfair unless the outcomes align with the positions they seek. The study recommended that NMFS take a number of steps to address allocation issues, including increasing stakeholder engagement in allocation decisions, periodically reviewing allocations, and creating a list of factors to guide allocation decisions. In response to the 2012 study, NMFS issued a fisheries allocation review policy in 2016 and two guidance documents to the councils, intended to help the councils and NMFS review and update allocations. The objective of the NMFS policy was to describe the fisheries allocation review process, which called for using an adaptive management approach. NMFS policy defined fisheries allocation review as the evaluation that leads to the decision of whether or not the development and evaluation of allocation options is warranted, but the allocation review is not, in and of itself, an implicit trigger to consider alternative allocations. Through its policy, NMFS established a multi-step process for reviewing and potentially revising fisheries allocations. Specifically, once an allocation review trigger has been met (as described below), the councils are to complete an allocation review. For this review, NMFS policy does not call for in-depth analyses but calls for a clear articulation of how objectives are or are not being met and a clear rationale and documentation on relevant factors considered. Based on the allocation review, the councils may decide to maintain existing allocations, or proceed to evaluate allocation options for a fishery management plan amendment. When proceeding with this next step, the councils are to undertake formal analyses and follow the fishery management plan amendment process to ultimately recommend that an existing allocation either be retained or revised. To supplement its fisheries allocation review policy, NMFS also issued two guidance documents, as follows: Criteria for initiating fisheries allocation reviews. NMFS guidance recommended that the councils establish criteria for initiating allocation reviews—or allocation review triggers—within 3 years, or as soon as practicable, for all fisheries that have allocations between sectors. The guidance identified three types of potential criteria for allocation review triggers: (1) time-based, which include provisions for periodic allocation reviews at specific time intervals on a regular basis; (2) public interest-based, which provide an opportunity for the public to express interest in allocation reviews; and (3) indicator-based, such as triggers based upon economic or other metrics. Factors to consider when reviewing and making allocation decisions. NMFS guidance outlined four categories of factors for the councils to consider when making allocation decisions, and noted that there may also be other appropriate factors to consider. These factors are not intended to prescribe particular outcomes with respect to allocations, but rather are intended to provide a framework for analysis, according to the guidance. The four categories of factors include: Fishery performance and change factors, to assess the current conditions of a fishery and any changes in those conditions that may indicate a need for updated allocations. Such factors could include historical or current trends in catch or landings, the status of the fish stock (for example, whether it is subject to overfishing, is overfished, or is rebuilding), or changes in the distribution of species within the fishery. Economic factors, to consider the monetary consequences of an allocation, such as by analyzing (1) whether the existing or recommended allocation is the most economically efficient, and (2) the economic impacts of the allocation. Social factors, to assess the consequences of an allocation on individuals and communities, such as whether an allocation may have disproportionate adverse effects on low income or minority groups or could lead to fishing despite unsafe conditions if access to the fishery is restricted to a limited number of days. Ecological factors, to consider the potential ecological impacts of allocations, such as impacts on the habitat or predator-prey dynamics of the fishery or of other fisheries within the ecosystem. Since the Magnuson-Stevens Act was passed in 1976, the South Atlantic and Gulf of Mexico councils have established and revised allocations to varying degrees for the mixed-use fish stocks they manage in their regions. The South Atlantic council has established allocations for almost all of its mixed-use fish stocks and the Gulf of Mexico council has done so for certain stocks. Based on documents from the South Atlantic council, we found that the council has established allocations for 50 of the region’s 51 mixed-use fish stocks. The council first established an allocation for one fish stock—king mackerel—in 1985. From 1987 through 2010, the council set allocations for eight fish stocks. The council then established most allocations, encompassing 40 of its mixed-use fish stocks, in 2011, with allocations generally based on estimates of each fishing sector’s historical landings. The council’s most recently established allocation—for a cobia stock—was in 2014, according to council documents. Appendix I provides additional information on the allocations for the mixed-use fisheries in the South Atlantic council region and the years in which the council established and revised allocations. According to South Atlantic council staff, the council’s approach to revising allocations has been to rely on stakeholder input to inform them of allocations that may need revision but to otherwise leave established allocations in place. For example, council staff noted that the allocation for king mackerel—which distributes a percentage of the annual catch limit to each fishing sector—has not changed since 1985 because it is still effective for both the commercial and recreational fishing sectors. Council staff explained that because neither sector has typically caught the amount of king mackerel they have been allocated, the council has not needed to revise the allocation. As of December 2019, the South Atlantic council had revised allocations for most of their mixed-use fish stocks once, according to council documents, as shown in table 3. The council revised allocations for 30 fish stocks in 2012, based on changes to the source of recreational catch data the council was using in its formulas for calculating allocation percentages. The South Atlantic council has revised few allocations more than once. Specifically, they revised allocations for two fish stocks twice and for one, dolphin, three times. For example, the council first established an allocation for dolphin (also known as mahimahi, dolphinfish, and dorado) in 2003. It established the allocation to maintain the fishery as predominantly recreational and based the allocation on historical landings, according to the council’s fishery management plan (see fig. 4). According to council documents, the council then revised the dolphin allocation three times: in 2011, when initially setting annual catch limits for dolphin, in 2013, based on changes to the source of recreational catch data used to calculate allocation percentages, and in 2015, because the recreational sector had not been catching the amount of fish it was allocated, and the council was concerned that the commercial sector could exceed its allocation in the future. The extent to which the South Atlantic council may have considered other revisions to allocations is unclear. For example, South Atlantic council staff said that their council had deliberated on revising allocations for some fish stocks at council meetings, but they do not have records of the deliberations because the council decided not to make revisions and did not initiate related fishery management plan amendments. South Atlantic council staff explained that they document all allocation revisions through fishery management plan amendments, but they have not otherwise formally documented reviews that did not result in revisions. Council staff said they recognize the need to better document such reviews in the future; however, the council did not identify how it plans to do so, as discussed later in this report. The Gulf of Mexico council established commercial and recreational allocations for nine of the region’s 23 mixed-use fish stocks, according to documents from the council (see app. I for allocations for the mixed-use fisheries in the Gulf of Mexico council region). Council staff said most of the council’s allocations were made based on estimates of each sector’s historical landings. The council has not established allocations for most mixed-use fish stocks in the region because allocations for these stocks have not been warranted, according to council staff. Council staff said the council generally considers establishing allocations when stakeholders identify issues, or if new information such as a stock assessment becomes available and indicates that allocations may be needed to help manage a fish stock. In the absence of such information, the Gulf of Mexico council manages the fish stocks with other methods— for example, with seasonal closures or trip or bag limits, which establish the number of fish that can be legally taken in a specified period. As of December 2019, the Gulf of Mexico council had revised allocations for three mixed-use fish stocks, as shown in table 4. For example, the council revised the allocation for red grouper in 2008 to increase the recreational sector’s allocation after a stock assessment indicated the fishery had recovered from overfishing, according to a council document. In 2008, the council also revised the gag grouper allocation to increase the commercial sector’s allocation. In addition, the Gulf of Mexico council completed a fishery management plan amendment in 2015 that revised the red snapper allocation by increasing the recreational sector’s percentage. However, after the Secretary of Commerce approved the amendment in 2016, a U.S. District Court vacated the amendment in 2017, and the council returned to the initial allocation established for red snapper. Gulf of Mexico council staff said the council has not identified a need to revise allocations for the other mixed-use fish stocks in the region with allocations. For instance, for the deep water grouper and tilefish complexes, council staff said there has been limited competition between the recreational and commercial fishing sectors and the council has not needed to revise the allocations initially established for those fish stocks in 2011. When the Gulf of Mexico council has considered revising allocations, it has done so through fishery management plan amendments, according to council staff. For example, in a 2016 fishery management plan amendment, the council considered revising the allocation for king mackerel because estimates indicated that the recreational sector had not been landing the amount of fish it was allocated. However, the council decided not to revise the allocation, citing the potential for increased recreational fishing for king mackerel in the future. Through our review of agency documents and interviews with NMFS and South Atlantic and Gulf of Mexico council staff, we found that various sources of information may be available to help NMFS and the councils review allocations, but each source presents some challenges to councils for supporting allocation decisions. Councils can use these sources of information to consider the factors NMFS’ 2016 guidance calls for— including fishery performance and change, economic, social, and ecological factors—when reviewing allocations. Five key sources of information that NMFS and the councils identified are trends in catch and landings, stock assessments, economic analyses, social indicators, and ecosystem models. NMFS officials said that the councils would like to incorporate these key sources into their allocation reviews, and use such information in supporting future allocation decisions. However, they said the availability, specificity, or quality of information can present challenges to using some of the information. In particular, they noted that available information other than landings is often sparse and uncertain for many fish stocks. As a result, the officials said it may be difficult for the councils to use such information as the basis for allocation decisions. NMFS is taking some steps to improve the information available, as discussed below. NMFS’ 2016 guidance states that changes in the performance or conditions of a fishery may indicate the need for updated allocations. Fishery performance and change factors include trends in catch or landings. Data on historical and current catch and landings can provide the councils with important information about demand, according to NMFS guidance, including whether a fishing sector may be catching above or below its allocation. Generally, NMFS collects landings data for commercial fisheries from state fisheries agencies, who obtain landings data from monthly reports submitted by seafood dealers on the weight and value of fish sold at the dock. NMFS collects data to estimate recreational catch and landings through survey and interview methods through its Marine Recreational Information Program. However, recreational catch estimates present some limitations. A 2017 National Academies study noted that obtaining reliable data on recreational catch can be challenging because of several attributes of the recreational fishing sector. For example, the greater number of recreational anglers compared with the number of participants in the commercial fishing sector, and the greater number of access and landing points available to recreational anglers, make it difficult to obtain reliable data on the extent of recreational fishing, according to the study. In 2018, the Marine Recreational Information Program updated how NMFS estimates recreational catch based on a change in the survey methodology used to collect data from anglers on the Atlantic and Gulf of Mexico coasts. According to NMFS documents, updated recreational catch estimates for many fish stocks are several times higher than previous estimates because of the change in methodology. However, any implications these updated estimates may have for allocations in the South Atlantic and Gulf of Mexico may not be fully understood until NMFS incorporates the estimates into stock assessments, which were scheduled for completion between 2019 and 2021, according to NMFS documents. Further, in the Gulf of Mexico, states collect recreational catch data through their own programs, which supplement NMFS’ Marine Recreational Information Program data. The states’ programs use different methodologies, however, which Gulf of Mexico council staff said make it difficult to reconcile the states’ recreational fisheries data with NMFS’ data on catch estimates. According to an NMFS document, some of the different methodologies the states use to design surveys have produced different estimates in years when two or more surveys were conducted side by side, making it difficult to determine the best estimates of recreational catch in the Gulf of Mexico. NMFS is taking steps to improve its recreational catch estimates. For instance, in September 2019 NMFS issued procedural guidance to help ensure that survey estimates from the Marine Recreational Information Program are based upon the best scientific information available and to promote nationwide consistency in collecting data and estimating recreational catch. NMFS is also working with Gulf of Mexico states to evaluate the critical assumptions made by each state’s data collection program and to help ensure that the states’ recreational catch estimates are comparable across years and with other states. As part of this effort, NMFS is calibrating recreational catch estimates from Gulf of Mexico states with data from the Marine Recreational Information Program. According to an agency official, NMFS anticipates completing this effort in May 2020. Stock assessments are a key source of information the councils can use to review allocations given the information they provide on the status of fish stocks, according to NMFS documents. Stock assessments can range in complexity from a simple description of historical trends in catch and landings to complex assessment models that incorporate spatial and seasonal analyses in addition to ecosystem or multispecies considerations. Stock assessments are not available for all fish stocks with allocations, however. In the South Atlantic, 32 of the 50 mixed-use fish stocks with allocations do not have stock assessments, according to council staff. Of these fish stocks, NMFS plans to complete stock assessments for three—gray triggerfish, scamp, and white grunt—by 2024, according to South Atlantic council staff. In the Gulf of Mexico, stock assessments are available for the mixed-use fish stocks with allocations, with the exception of the shallow and deep water grouper aggregate complexes. Stock assessments can provide maps of the spatial distributions of fish stocks and may show changes in those distributions over time, according to NMFS officials. Changes in a fish stock’s distribution may lead to allocation disputes, and basing allocations on historical catch may not be appropriate in such situations, according to an NMFS document. NMFS’ 2016 guidance states that the councils may need to update allocations if the distributions of fish stocks change over time for reasons such as climate change or natural fluctuations in abundance. However, NMFS officials noted that few stock assessments incorporate spatial models that would allow forecasts of future spatial distributions. To help improve the availability of such information, NMFS is conducting evaluations that will, among other things, assess changes in the distribution of fish stocks in the Gulf of Mexico and South Atlantic in response to regional climate change impacts. NMFS officials said they anticipate completion of these evaluations in 2020, which will help them forecast future spatial distributions for some fish stocks going forward. In addition, stock assessments are one source of information that the councils can use to assess each fishing sector’s expected ecological impacts, according to NMFS officials. For example, NMFS officials said that stock assessments commonly provide information on each sector’s discards—fish intentionally thrown back. Discards may be caught as bycatch—that is, incidentally to the harvest of the primary fish stock targeted. NMFS’ 2016 guidance states that councils can consider the expected impacts of each fishing sector’s allocation on bycatch and bycatch mortality. However, the availability and certainty of bycatch and discard information can vary, according to NMFS officials. NMFS is taking steps to improve information on bycatch and discards. For instance, beginning in 2020, the for-hire component of the recreational fishing sector is to use an electronic system to report its bycatch and discards in the South Atlantic and Gulf of Mexico, according to NMFS officials. The officials said that the commercial fishing sector will begin using this system by 2023. NMFS officials said that the agency is also developing a model that will, among other things, estimate the number of released fish caught by the recreational fishing sector in the South Atlantic and Gulf of Mexico. The officials said that the first version of the model is focused on gag grouper in the Gulf of Mexico, but that the model could be customized to any fish stock with the necessary data available. As of December 2019, NMFS officials anticipated completion of the model by late 2020 and estimated that the model would be ready to incorporate into stock assessments in fiscal year 2021 or later. Economic analyses can provide information on the economic consequences of allocations, according to NMFS documents. NMFS’ 2016 guidance notes that councils should consider if the current or preferred allocation results in the most economically efficient use of the fishery resource. According to the guidance and NMFS officials, economic efficiency refers to how well scarce resources are used in production and consumption, and is achieved when all resources are allocated to their most valuable productive use. In principle, an allocation is most economically efficient when the net economic benefits to the commercial and recreational fishing sectors in total are maximized. If net economic benefits are not maximized, then modifying the allocation may increase economic efficiency and economic benefits to the nation. NMFS officials said the agency focuses on conducting economic efficiency analyses to help guide allocation reviews. Economic efficiency analyses can help NMFS and the councils analyze whether a proposed change in an allocation would generate greater net economic benefits for society (that is, improve economic efficiency), compared with the current allocation, according to NMFS officials. We found the councils face challenges in using economic efficiency analyses in allocation decisions. According to NMFS officials and the agency’s published research, reliable data for estimating economic values associated with recreational fishing may not be readily available. This is because no market prices for fish caught by private anglers are available and thus, non-market valuation techniques must be used to estimate the marginal value of fish to recreational anglers. For example, a 2014 NMFS study on the economic efficiency of allocations for gag, red, and black grouper found that there are insufficient data on the recreational harvest by grouper species to generate statistically reliable estimates of economic value for each fish stock. In addition, it is difficult to estimate the economic value associated with one fish stock because recreational anglers may be willing to catch other species of fish if fishery managers limit anglers’ access to a particular stock, according to members of both councils’ socioeconomic panels. This transfer of effort from one fish stock to another makes it difficult to determine which fish stock drives the economic value that anglers associate with fishing. Further, a 2014 NMFS study on the economic efficiency of red snapper allocations indicated that a relevant market price that could be used as a benchmark for the recreational estimates is unavailable. The study found that in prior work the agency attempted to use charter fishing trip prices to address this concern, but no current data on charter prices existed to update that analysis. As a result, the study cautioned against comparing estimates of recreational value to that in the commercial sector, which is a key aspect of determining an economically efficient allocation. Moreover, two 2014 NMFS studies found that there are also methodological and data challenges related to obtaining economic information from the commercial fishing sector. For example, the studies raised questions about the quality of some of the price data that were used in developing estimates of economic values for the commercial sector. In addition, the studies’ estimates of the economic value of commercial fishing did not include the potential net value derived from other components of the commercial seafood supply chain, such as the processing, distribution, and sale of the fish to the end consumers, according to the NMFS studies and agency officials (see fig. 5). These NMFS studies noted that data for estimating the values from these other components are not readily available. Council staff and members, socioeconomic panel members, and fishery stakeholders we interviewed noted the importance of including the value of fish to the end consumers when considering the economic value of commercial fishing. To estimate the values of these other components of the commercial seafood supply chain, NMFS would need information about the consumer demand for fish as a function of domestic and international production, as well as information on changes in the price of the fish as they move from the dockside to retail markets, according to a separate NMFS study. NMFS officials said they are taking some steps related to improving economic analyses that the councils could consider in allocation reviews. For example, the agency is developing a manual of best practices for NMFS and council staff responsible for conducting economic analyses. NMFS officials said that they anticipate completing the manual by the end of fiscal year 2020. According to NMFS officials, the manual is intended to help (1) achieve consistency in analyses across the councils and regions, (2) establish an understanding of why economic analyses of allocations are important to fisheries management decisions, as well as their role in complying with various legal requirements and NMFS’ policy, and (3) establish an understanding of the basic concepts and tools used in these analyses and how they are expected to be applied in practice. In addition, NMFS conducted a study on the economics of the for-hire fishing sector in federal waters of the South Atlantic and Gulf of Mexico and completed a report on the study at the end of 2019. Among other things, agency officials said the study provides data sufficient to estimate producer surplus for the for-hire sector. This information could help inform future allocation decisions, according to NMFS officials. NMFS has developed social indicators to characterize community well- being for coastal communities engaged in fishing activities, which the councils could consider in reviewing allocations, according to NMFS officials. NMFS’ 2016 guidance states that the councils could consider individual, local, and regional fishing dependence and engagement, and that such analyses should include potential impacts on commercial, for- hire, private angler, and subsistence fishing, as well as fishing-related industries if data are available. NMFS’ social indicators are numerical measures that describe the well-being of fishing communities in coastal counties across the United States and their level of dependence on commercial and recreational fishing. For example, one indicator describes the vulnerability of fishing communities to disruptive events, such as a change to a fishing sector’s access to a fishery. Communities that are dependent on commercial fishing can be more socially vulnerable than other communities to changes, according to an NMFS document. However, NMFS’ social indicators on communities’ reliance on and engagement in commercial and recreational fishing are not specific to particular fish stocks. NMFS officials said this makes it challenging for councils to incorporate the information into their allocation reviews for specific fish stocks. The officials said that given current resource limitations and limited data available, it would be difficult to generate social indicators that are specific to fish stocks. In some instances, NMFS has some stock-specific information at the community level for the commercial fishing sector. But NMFS officials said that comparable information is not available for the recreational sector at the community level, making it difficult to develop fish stock-specific social indicators. NMFS officials said that the agency continues to work to update and improve social indicators relevant to recreational and commercial fisheries and is exploring other sources to provide better social data for fisheries management decisions. However, NMFS officials did not identify specific steps they plan to take to improve social indicators—such as developing information specific to particular fish stocks—so that the councils could more easily incorporate such information into their allocation reviews. NMFS’ 2016 guidance calls for the councils to consider the potential ecological impacts of allocation alternatives in determining the allocation between different sectors or groups. However, NMFS officials said there are few ecosystem models that incorporate ecological information that could be considered in reviewing allocations, in part because limited quantifiable ecological information is available. They said that it will be difficult to use ecosystem models in allocation decisions until such models are more fully developed. NMFS officials said they are taking some steps to enhance the use of ecological and ecosystem-based information. For instance, they noted that in 2016, NMFS released a policy to, among other things, establish a framework of guiding principles to enhance and accelerate the implementation of ecosystem-based fisheries management. Ecosystem- based fisheries management is a systematic approach to fisheries management in a geographically specified area that: contributes to the resilience and sustainability of the ecosystem; recognizes the physical, biological, economic, and social interactions among the affected fishery- related components of the ecosystem, including humans; and seeks to optimize benefits among a diverse set of societal goals, according to the policy. Among other things, this approach can help communicate the potential consequences of management decisions—including allocations—across fish stocks and improve the understanding of the potential benefits and effectiveness of management decisions, according to the policy. In 2019, NMFS issued plans for implementing ecosystem- based fisheries management in the South Atlantic and Gulf of Mexico. The South Atlantic and Gulf of Mexico councils each established criteria for initiating allocation reviews in response to NMFS’ 2016 guidance, but neither council has developed processes to guide how they will conduct or document their allocation reviews. The Gulf of Mexico council has taken initial steps to develop a process for how it will review allocations, and staff from both councils said they are waiting for our report to inform their next steps on developing processes for conducting allocation reviews in the future. The North Pacific council plans to review The four councils also identified public input as a potential allocation review trigger, but they did not specify what threshold of public interest would trigger a review. The remaining two councils—the Western Pacific and Caribbean—do not have allocations subject to National Marine Fisheries Service (NMFS) policy requiring councils to establish allocation review criteria, according to NMFS officials. the council reviews a fishery performance report. The South Atlantic council’s policy also established time-based triggers as secondary criteria for initiating allocation reviews. Its policy states that the council will review allocations not less than every 7 years if one of the conditions identified in the policy has not already triggered a review. The policy also states that once a review occurs, the next one will be automatically scheduled for 7 years later. In contrast, the Gulf of Mexico council’s April 2019 policy established time-based triggers as its primary criteria for initiating allocation reviews. Specifically, its policy indicates time intervals of 4 to 7 years for reviewing allocations, depending on the particular fish stock, and identifies the planned month and year for beginning each review. The council’s policy also identified public interest as a secondary allocation review trigger but did not specify thresholds for the level or type of public input that would trigger an allocation review. According to the policy, the council is to consider relevant social, economic, and ecological conditions as an intermediate step before determining whether public interest will trigger a review. According to NMFS’ 2016 guidance, periodic review of allocations on a set schedule is in several respects the most simple and straightforward criterion for such a review—it is unambiguous and less vulnerable to political and council dynamics. The guidance also states that time-based triggers for initiating allocation reviews might be most suitable for fisheries where the conflict among sectors or stakeholder groups makes the decision to simply initiate a review so contentious that use of alternative criteria is infeasible. In such a situation, a fixed schedule ensures that periodic reviews occur regardless of political dynamics or specific fishery outcomes, according to the guidance. However, the guidance also indicates that, compared with alternative approaches, adherence to a fixed schedule may be less sensitive to other council priorities and the availability of time and resources to conduct such reviews, which could potentially lead to significant expenditures. Therefore, given the inflexible nature of time-based triggers, the guidance recommends that they be used only in those situations where the benefit of certainty outweighs the costs of inflexibility. The South Atlantic and Gulf of Mexico councils’ policies laid out planned schedules for their respective allocation reviews, which both councils adjusted after issuing their policies. Table 5 shows both councils’ plans for allocation reviews as of December 2019. For example, the Gulf of Mexico council’s policy states that it plans to review the red grouper allocation in 2026. However, in response to the completion of an updated stock assessment for red grouper in July 2019, the council directed its staff in October 2019 to begin work on a fishery management plan amendment to update the red grouper allocation, according to a council document. The stock assessment for red grouper included the Marine Recreational Information Program’s updated estimates for recreational landings. The updated estimates approximately doubled previous estimates of recreational landings, according to a council newsletter. Council staff said that applying these updated estimates to the time series the council had used to establish the red grouper allocation could result in a percentage shift of the allocation to the recreational fishing sector. As a result, the council decided to begin review of the red grouper allocation sooner than the policy’s scheduled 2026 time frame, according to the staff. In addition, we found that the councils’ planned allocation review schedules may affect their workload and other priorities, but it is not clear to what extent. NMFS’ 2016 allocation guidance states that the councils’ allocation review processes should include consideration of current council priorities, other actions under deliberation, and available resources. NMFS officials and council staff expressed concern that the councils’ planned schedules—as identified in their April and July 2019 policies—may negatively affect the workloads and other priorities of NMFS’ social scientists, economists, and data analysts and council staff. For instance, staff from both councils said the planned allocation review schedules will increase their workloads and, depending on the nature and substance of how those reviews are conducted, could take resources away from other council activities and lead them to reprioritize or delay those activities. One council’s staff also noted that the council members have a difficult time keeping up with existing workloads. NMFS officials and council staff said that factors that may affect these types of costs include the complexity of the analyses, the number of NMFS or council staff involved in the process, and the degree of public interest. Fishery management plan amendments that establish or revise allocations can be controversial, and will likely have more public hearings and opportunity for public comment than other types of amendments, according to NMFS officials and council staff. NMFS officials and South Atlantic and Gulf of Mexico council staff said they have not tracked costs of establishing, reviewing, or revising allocations. The councils often make allocation decisions concurrently with other management actions, making it difficult to isolate costs. Further, NMFS officials stated the councils’ accelerated schedules as of December 2019, as shown in Table 5, will exacerbate the concerns. These schedules include starting reviews for 50 allocations in the South Atlantic between 2019 and 2026, assuming no conditions trigger earlier reviews, and reviews for 10 allocations in the Gulf of Mexico between 2019 and 2026. One NMFS official said that any additional workload for economists and social scientists in the Southeast Fisheries Science Center is difficult to anticipate because it will depend on the type of information the councils would like to use for the reviews and whether additional studies may be needed or data collected. Another NMFS official stated that the regional office will shift priorities from less important tasks and gain efficiencies where possible to accommodate the planned allocation reviews. The South Atlantic and Gulf of Mexico councils have not developed processes for how they will conduct or document their allocation reviews to implement NMFS’ 2016 policy and related guidance, although the Gulf of Mexico council has begun taking steps to do so. As noted, NMFS policy calls for a multi-step process for reviewing and potentially revising fisheries allocations. Specifically, once an allocation review trigger has been met, NMFS policy calls for an allocation review, after which the councils may maintain existing allocations or evaluate allocation options through a fishery management plan amendment. NMFS guidance states that the councils should develop a structured and transparent process for conducting allocation reviews, including consideration of current council priorities, other actions under deliberation, and available resources. In April 2019, the Gulf of Mexico council began taking steps to develop an allocation review process, according to council documents. Specifically, the Gulf of Mexico council convened an allocation review workgroup consisting of staff from the council and from NMFS’ Southeast Regional Office and Southeast Fisheries Science Center. The council expects the workgroup to propose draft allocation review procedures, including identifying data sources that would be needed to conduct allocation reviews, according to a council document. The workgroup met in June and July 2019 and discussed these topics and other potential proposals, such as establishing a tiered system for allocation reviews that would involve different levels of analysis for different tiers of reviews, according to council documents. Council staff said the workgroup plans to next meet after the issuance of our report to finalize a proposal for developing an allocation review process for the council to consider. However, the council has not indicated what actions it will take, if any, regarding the workgroup’s proposal; instead, the council will determine its course of action after reviewing this report, according to council staff. The South Atlantic council postponed discussion of defining or documenting its allocation review process until March 2020, according to council staff and members, to review our report before deciding any next steps. At the council’s June 2019 meeting, the council chair questioned the need for developing an allocation review process through policy. For instance, the chair cited concerns that the council may be continuously developing exceptions to such a policy to accommodate fishery-specific issues or other unique circumstances. The chair also stated that aside from establishing criteria for initiating allocation reviews, NMFS’ guidance does not require the councils to take other actions related to developing allocation review processes. NMFS officials said that the agency’s 2016 guidance recommending that the councils develop a structured and transparent process was not intended to require the councils to develop a separate policy or documented process for conducting allocation reviews. NMFS officials said that the agency’s operational guidelines for processes under the Magnuson-Stevens Act and associated regional operating agreements with the councils lay out the key requirements and processes guiding development, review, and implementation of fishery management plans and plan amendments, which would include actions related to allocations. The officials further explained that in developing the 2016 allocation policy, they intended that allocation reviews be conducted through the processes identified in the agency’s operational guidelines and regional operating agreements with the councils, which allow the councils flexibility to factor in their own needs. However, the operational guidelines and regional operating agreements for the South Atlantic and Gulf of Mexico councils apply to the fishery management plan and amendment process overall, and they do not specifically address allocations. The goals of the operational guidelines include promoting a timely, effective, and transparent public process for development and implementation of fishery management measures, and the guidelines note that the regional operating agreements are meant to make council procedures and processes transparent. The guidelines and agreements, however, do not lay out processes the councils are to follow in reviewing allocations apart from developing fishery management plans or plan amendments. As noted in NMFS’ 2016 policy and guidance, the councils may conduct allocation reviews separate from the fishery management plan amendment process. Moreover, the regional operating agreements are not intended to limit or prevent the councils’ use of additional processes in response to specific management needs, according to these documents and the operational guidelines, and the Gulf of Mexico council has taken initial steps in developing an allocation review process as previously described. Based on the framework for internal controls established by the Committee of Sponsoring Organizations of the Treadway Commission, documented policies and processes can be more difficult to circumvent, less costly to an organization if there is turnover in personnel, and increase accountability. The framework also states that when subject to external party review, policies and processes would be expected to be formally documented. Among other things, documented processes— according to the framework—promote consistency; assist in communicating the who, what, when, where, and why of internal control execution; enable proper monitoring; and provide a means to retain organizational knowledge and mitigate the risk of having the knowledge within the minds of a limited number of individuals. The 2012 report commissioned by NMFS to review fisheries allocation issues found that allocation reviews had not been done in a regular, consistent manner and stated that this makes it harder for stakeholders to understand the reviews as well as the process for conducting them. Similarly, stakeholders we interviewed indicated that a clear process for conducting allocation reviews is needed and would increase their confidence in or understanding of the councils’ decisions, regardless of specific outcomes. Other stakeholders stressed the need for predictability and certainty to be able to plan critical business decisions, such as securing loans from local banks or other lenders. Such uncertainty may cause participants in the commercial sector to leave the fishery because they cannot secure loans or meet other business requirements, according to one stakeholder, or it may create instability that could affect the market price of fish, according to another stakeholder. By working with the councils to develop documented allocation review processes, NMFS would have better assurance that the councils carry out their upcoming allocation reviews in a structured and transparent manner, consistent with the agency’s 2016 guidance. Further, it is unclear whether or how the councils plan to document each allocation review, such as the basis for their allocation decisions, whether fishery management plan objectives are being met, and what factors were considered in each review. NMFS’ operational guidelines state that fishery management decisions must be supported by a record providing the basis for the decision. In addition, NMFS’ 2016 policy and guidance call for the councils to clearly articulate in their allocation reviews how fishery management plan objectives are or are not being met, as well as to document their rationale for determining whether any factors are unimportant or not applicable in making an allocation decision. NMFS officials and council staff said that any allocation revisions would be documented through fishery management plan amendments. However, the councils may conduct allocation reviews separate from the fishery management plan amendment process, and it is not clear whether or how the councils will document those reviews. For example, as previously noted, in the past the South Atlantic council has not formally documented the results of allocation reviews that did not lead to fishery management plan amendments that revised the allocations. By working with the councils to specify how they plan to document their allocation reviews, NMFS could help ensure that the councils provide a clear record of the basis for their decisions, whether fishery management plan objectives are being met, and applicable factors considered. Clear records could also help increase transparency and stakeholder understanding of the councils’ decisions, particularly in those instances when reviews are separate from the fishery management plan amendment process. Making allocation decisions between the commercial and recreational fishing sectors can be complex and difficult, and the outcomes of those decisions may have important economic and social implications for stakeholders in each of the sectors. The South Atlantic and Gulf of Mexico councils have taken an important step in developing policies outlining criteria for initiating allocation reviews, in accordance with NMFS guidance. The Gulf of Mexico council has also taken initial steps to define how it will conduct its allocation reviews. However, neither council has developed a process for how they will conduct such reviews. By working with the councils to develop documented allocation review processes, NMFS would have better assurance that the councils carry out their upcoming allocation reviews in a structured and transparent manner, consistent with the agency’s 2016 guidance. Moreover, by working with the councils to also specify how they plan to document their allocation reviews, NMFS could help ensure that the councils provide a clear record of the basis for their decisions, whether fishery management plan objectives are being met, and applicable factors considered. We are making the following two recommendations to the NMFS Assistant Administrator for Fisheries: The NMFS Assistant Administrator for Fisheries should work with the South Atlantic and Gulf of Mexico councils, and other councils as appropriate, to develop documented processes for conducting allocation reviews. (Recommendation 1) The NMFS Assistant Administrator for Fisheries should work with the South Atlantic and Gulf of Mexico councils, and other councils as appropriate, to specify how the councils will document their allocation reviews, including the basis for their allocation decisions, whether fishery management plan objectives are being met, and what factors were considered in the reviews. (Recommendation 2) We provided a draft of this report to the Department of Commerce for review and comment. In written comments (reproduced in app. II), Commerce and NOAA agreed with our recommendations and stated that NOAA’s NMFS will work to implement them to the extent possible. NOAA stated that the report accurately describes the extent to which the councils established and revised allocations for mixed-use fisheries, the key sources of information that may be available for reviewing allocations, and the extent to which the councils have developed processes to help guide such reviews. NOAA also highlighted the delicate balance that councils seek to achieve in deciding what fishery management approaches to implement to comply with the Magnuson-Stevens Act and its 10 national standards. In addition, Commerce and NOAA stated that NMFS does not have the legal authority to direct the councils to take the actions included in our two recommendations, stating that such actions are outside of legal requirements that guide council fishery management actions. In response, we revised the wording of our two recommendations to state that the NMFS Assistant Administrator for Fisheries should “work with,” rather than “direct,” the councils to take the recommended actions. In response to our first recommendation, NOAA stated that it would build on the recommendations in its allocation policy by working with the South Atlantic and Gulf of Mexico councils, and other councils as appropriate, to develop documented processes for conducting allocation reviews. In response to our second recommendation on specifying how the councils will document their allocation reviews, NOAA stated that it will work with the councils on consistent documentation of allocation reviews. NOAA noted that transparency in the allocation process improves with a documented process for conducting allocation reviews, and that consistent documentation of those reviews will create further transparency in the allocation process and could improve stakeholders’ understanding of the councils’ decisions. NOAA also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Commerce, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Tables 6 and 7 provide information on mixed-use fisheries allocations— privileges for catching fish between the commercial and recreational fishing sectors—in the South Atlantic and Gulf of Mexico Fishery Management Council (council) regions, respectively. Not all mixed-use fish stocks in these regions have allocations. In the South Atlantic council region, spiny lobster does not have an allocation. In the Gulf of Mexico council region, 14 of 23 mixed-use fish stocks do not have allocations. Anne-Marie Fennell, (202) 512-3841 or fennella@gao.gov. In addition to the contact named above, Alyssa M. Hundrup (Assistant Director), Krista Breen Anderson (Analyst in Charge), Leo Acosta, Mark Braza, Tim Guinane, Paul Kazemersky, Patricia Moye, Cynthia Norris, Dan C. Royer, Rebecca Sandulli, Kiki Theodoropoulos, and Khristi Wilkins made key contributions to this report.", "summary": "Commercial and recreational marine fisheries—including those in the South Atlantic and Gulf of Mexico—are critical to the nation's economy, contributing approximately $99.5 billion to the U.S. gross domestic product in 2016, according to the Department of Commerce. NMFS and the councils may allocate fishing privileges for mixed-use fisheries in federal waters, but establishing and revising such allocations can be complex, in part because of concerns about equity. The Modernizing Recreational Fisheries Management Act of 2018 includes a provision for GAO to review mixed-use fisheries allocations in the South Atlantic and Gulf of Mexico. For these regions, this report examines (1) the extent to which the councils established or revised mixed-use fisheries allocations, (2) key sources of information that may be available for reviewing allocations, and (3) the extent to which the councils have developed processes to help guide such reviews. GAO reviewed NMFS and council policies and other council documents; analyzed information on allocations established and revised; compared council processes to agency guidance and internal control standards; and interviewed NMFS officials, council members and staff, and 46 stakeholders that reflected various interests. Views from these stakeholders are not generalizable. The South Atlantic and Gulf of Mexico regional fishery management councils, with approval from Department of Commerce's National Marine Fisheries Service (NMFS), established and revised allocations to varying degrees for mixed-use fish stocks—fisheries with a combination of commercial and recreational fishing. Regional councils were created by statute to help manage fisheries in federal waters, including allocating—or distributing—fishing privileges, when warranted. Starting in 1985, the South Atlantic council established allocations, generally a percentage of allowable harvest, for 50 of its 51 mixed-use fish stocks and revised most of those at least once. The Gulf of Mexico council established allocations for nine of its 23 mixed-use fish stocks, revising three of those once. Historically, allocations have been largely based on estimates of the commercial and recreational fishing sectors' past use of the resource, according to NMFS. Key sources of information that may be available to help NMFS and the councils review allocations include trends in catch and landings (the amount of fish caught or brought to shore); fish stock assessments; and economic analyses. Each source presents some challenges in supporting allocation decisions, however. For example, NMFS works with states to estimate recreational catch, which provides information about demand, but faces difficulties generating reliable estimates. This is in part because of attributes of the recreational fishing sector, including the greater number of recreational anglers compared with commercial fishing participants. NMFS issued guidance in 2019 to promote consistency in estimating recreational catch data to help improve the quality of the information. The South Atlantic and Gulf of Mexico councils developed processes for when to initiate fish stock allocation reviews, but not for how to conduct those reviews. A 2012 report for NMFS found that reviews had been done inconsistently, and stakeholders were dissatisfied with allocation decision-making. In response, NMFS developed guidance calling for structured and transparent allocation review processes. Both councils established criteria for initiating reviews, such as time-based triggers, and as of December 2019 they had several reviews underway (see figure). In April 2019, the Gulf of Mexico council began convening a workgroup to propose a draft allocation review process, but has not indicated what actions it will take, if any, in response to a proposal. The South Atlantic council postponed any discussions until March 2020. As of December 2019, neither council had a documented process. Documented processes for conducting allocation reviews would provide NMFS with better assurance that the councils carry out upcoming reviews in a structured and transparent manner. GAO is making two recommendations, including that NMFS work with the councils to develop documented processes for conducting allocation reviews. The agency agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Federal law specifies that the EPSDT benefit covers screening, vision, dental, and hearing services, as well as other Medicaid coverable services that are necessary to correct or ameliorate any conditions discovered through screening. The EPSDT benefit generally entitles beneficiaries to these services regardless of whether such services are covered in a state’s Medicaid state plan and regardless of any restrictions that the state may impose on coverage for adult services. The EPSDT screening component includes a wide range of preventive services, such as comprehensive child health assessments known as well-child screenings and age-appropriate blood lead screenings. Because EPSDT covers any medically necessary service that could be covered for adults in addition to the specified preventive screenings, the EPSDT benefit is generally more comprehensive than the benefits provided for adult beneficiaries. The federal government and states jointly share responsibility for implementing the EPSDT benefit. CMS, as part of its Medicaid oversight responsibilities, approves state Medicaid plans, which describe how the state administers its Medicaid program, including components related to the provision of EPSDT services. CMS also develops and issues general guidance to states about the EPSDT benefit, such as explanations of covered services and strategies for providing those services. Additionally, CMS has developed a goal for EPSDT, which is to assure that beneficiaries get the health care they need when they need it: the right care to the right child at the right time in the right setting. Further, CMS established performance measures, some with associated targets, to guide states’ implementation of EPSDT. For example, CMS set performance measures and performance measure targets as part of its Oral Health Initiative. CMS developed the performance measure targets to carry out statutory requirements, quality improvement efforts, and agency policy. (See table 1 for EPSDT performance measures that have associated targets.) States have flexibility, within federal parameters, to determine how EPSDT services are provided. For example, states are required to ensure that Medicaid-eligible beneficiaries and their families are aware of the EPSDT benefit and have access to required services, but states can choose whether to administer the benefit themselves or to oversee managed care organizations that are contracted to provide the benefit. States may also determine the frequency of screening services and communicate them through periodicity schedules that meet federal requirements. CMS uses various sources of information to oversee the EPSDT benefit, such as the CMS-416, the Child Core Set, and the Medicaid and CHIP Scorecard. States report information about the provision of select ESPDT services to CMS annually through the CMS-416 and measures on the Child Core Set. The CMS-416 provides CMS with basic information about EPSDT services, such as the participant ratio and number of beneficiaries receiving a preventive dental service. It includes the information necessary for CMS to assess states’ performance on the participant ratio and the screening ratio, among other things. The agency then can compare performance on the two ratios with the agency’s ESPDT performance measure targets. The Child Core Set provides CMS with information about the quality of health care provided to Medicaid and CHIP beneficiaries, and supports state efforts to improve health care quality and health outcomes. Child Core Set reporting becomes mandatory on an annual basis beginning with the state reports on fiscal year 2024. As of 2019, the Child Core Set included performance measures related to the provision of EPSDT services, such as well-child visits in the first 15 months of life. Because reporting is currently voluntary, states vary in the number of performance measures they choose to report. In fiscal year 2017, for example, 50 states and the District of Columbia voluntarily reported on at least one of the 27 Child Core Set performance measures, with states reporting a median of 18 Child Core Set performance measures. (See app. II for the information reported in the CMS-416 and Child Core Set.) As shown in table 2, there are both similarities and differences between the CMS-416 and Child Core Set. Since the Child Core Set performance measures include CHIP beneficiaries who may not be entitled to the EPSDT benefit, data from the Child Core Set are not directly comparable with reporting on the CMS- 416. In addition, CMS-416 data cover a longer period of time, as they are available from 1995, while Child Core Set data are available from 2011. CMS officials said that having more years of CMS-416 data helps identify trends in the provision of EPSDT services over a longer period of time than possible with the Child Core Set. On the other hand, CMS officials said it is difficult to compare states’ performance using the CMS- 416, because some performance measures are based on periodicity schedules, which vary state-to-state and over time. In contrast, the Child Core Set allows for more consistency in comparing data across states, because each state is expected to calculate performance measures in the same way. In June 2018, CMS published the first Medicaid and CHIP Scorecard, which includes performance measures about the provision of services to Medicaid and CHIP beneficiaries. The scorecard includes 17 performance measures related to the provision of EPSDT services, six of which are performance measures from the Child Core Set—and one of these six measures is derived from the CMS-416. In January 2019, CMS officials reported that the scorecard will be used to provide increased transparency about state Medicaid program administration and beneficiary health outcomes, and drive health care quality improvement across states. According to CMS officials, CMS envisions that the scorecard will be strengthened as state reporting of data through T-MSIS becomes more timely, accurate, and complete. CMS has been working since 2011 to implement T-MSIS as a replacement for some current reporting to improve and increase states’ reporting of Medicaid and CHIP data. CMS intends for T-MSIS to provide a national data repository to support federal and state Medicaid and CHIP program management, among other things. T-MSIS includes data not previously reported by states and is intended to improve Medicaid and CHIP program efficiency, in part, by allowing states to compare their data with other states’ data. T-MSIS includes data that can measure the provision of EPSDT services. According to CMS officials, T-MSIS also includes aspects designed to improve the accuracy of available state data. For example, states’ T-MSIS submissions undergo approximately 2,800 automated quality checks, which provide states with feedback on data format and consistency. As of January 2019, all 50 states and the District of Columbia were submitting data monthly, according to CMS, but T-MSIS data were not being used to create the CMS-416, Child Core Set, or the scorecard. Agency officials said research-ready files are in development and T-MSIS data are improving in quality over time with historical state resubmissions. According to our analysis of CMS-416 data for fiscal year 2017, millions of Medicaid beneficiaries received recommended EPSDT well-child screenings and preventive dental services. However, nearly as many eligible beneficiaries did not receive the various recommended screenings and services, and few states met CMS’s performance measure targets for EPSDT services. Additionally, while available data show that millions of blood lead screenings were performed, the total number of beneficiaries receiving blood lead screenings is unknown, because the data are incomplete. In fiscal year 2017, 20.2 million (59 percent) of the 34.2 million beneficiaries who should have received at least one recommended well- child screening received that screening, known as the participant ratio, according to our analysis of state-reported CMS-416 data. Additionally, our analysis indicates that the national participant ratio has declined 5 percentage points since fiscal year 2010. Three states met CMS’s participant ratio target of 80 percent in fiscal year 2017, as shown in figure 1. Our analysis also indicates that no more than four states met CMS’s participant ratio target in any one fiscal year from 2010 through 2017. (See app. III, table 6, for participant ratios in each state and nationally from fiscal years 2010 through 2017.) Our analysis also indicates that as beneficiaries age, they tend to receive fewer recommended well-child screenings, which results in lower participant ratios. (See fig. 2 for participant ratios and numbers of beneficiaries receiving and not receiving well-child screenings for each CMS-416 age group in fiscal year 2017.) CMS has issued a guide on serving older eligible beneficiaries, stating that regular preventive care visits can lead to early identification of health issues. CMS officials said the agency included measures focusing on these beneficiaries on the Child Core Set and Medicaid and CHIP Scorecard to recognize the importance of addressing these beneficiaries and to encourage states to focus on this population. CMS officials noted that some states have already taken steps to increase the number of well-child screenings that older eligible beneficiaries receive, for example, by partnering with schools. In fiscal year 2017, 18.3 million (48 percent) of the 38.3 million Medicaid beneficiaries aged 1 to 20 received a preventive dental service, according to our analysis of CMS-416 data. This is an increase from the 42 percent of beneficiaries receiving preventive dental services in 2011—the baseline year for measuring state progress toward CMS’s Oral Health Initiative targets—but less than CMS’s 52 percent national performance measure target. Our analysis also shows that from fiscal years 2011 through 2017, nine states met CMS’s performance measure target of a 10 percentage point increase in each state’s percentage of beneficiaries aged 1 to 20 receiving a preventive dental service. (See fig. 3 and table 8 in app. III for the percentage of beneficiaries aged 1 to 20 that received preventive dental services in each state and nationally from fiscal years 2011 through 2017.) Available data on blood lead screenings in the CMS-416 are incomplete and, as a result, do not provide information necessary to determine how many beneficiaries received the screenings. According to CMS’s November 2016 guidance, CMS-416 data do not accurately represent the number of beneficiaries receiving blood lead screenings. The CMS-416 data capture screenings paid for by Medicaid, but not those performed using funding from other sources, such as the Centers for Disease Control and Prevention. This could under-count the number of screenings performed. In addition, the blood lead screening data reported on the CMS-416 show how many screenings were performed, but do not identify the number of beneficiaries who received a blood lead screening. Our analysis of available CMS-416 data shows that in fiscal year 2017 states reported 2.0 million blood lead screenings for beneficiaries aged 12 through 24 months, and there were 4.6 million beneficiaries aged 12 through 24 months. CMS has regularly taken actions to use both the CMS-416 and the Child Core Set to improve the quality of information about the provision of EPSDT services. These actions have made the data reported about EPSDT services more complete and reliable. For example, CMS collects data annually from states on performance measures for both the CMS- 416 and the Child Core Set. (See table 3.) Additionally, CMS annually reviews the Child Core Set measures to determine whether measures need to be added, deleted, or revised. CMS also regularly provides technical assistance to states about data reliability, such as through its monthly Quality Technical Advisory Group. For example, during one group meeting, states shared challenges with reporting information about developmental screenings on the Child Core Set and suggestions for how to overcome these challenges. These actions are generally consistent with federal internal control standards regarding information and communication, which specify that management should use quality information to achieve the entity’s objectives. While CMS has taken actions to improve the quality of information about EPSDT, and agency officials said they regularly assess whether the information CMS collects on the CMS-416 is appropriate and useful for EPSDT oversight, CMS has not taken action, as needed, based on such assessments. For example, CMS has not added, removed, or amended any performance measures on the CMS-416 since 2010, even though officials acknowledge limitations in these measures. The participant ratio, for example, is dependent, in part, on a state’s chosen periodicity schedule, which means that the measure is not consistently defined across states. The screening ratio reflects the extent to which beneficiaries received the recommended number of well-child screenings during the year, but this information is aggregated and therefore cannot be used to determine whether individual beneficiaries received the recommended number of well-child screenings. Although federal law requires collecting certain information about the provision of EPSDT services, it provides the agency with flexibility to determine the form and manner in which data are collected and to set performance measures. For example, CMS could change the way states are required to calculate the participant ratio or the screening ratio, and could examine ways to do so to address the limitations that the agency has identified and improve the quality of information about the provision of EPSDT services. Because CMS has not taken action, as needed, based on assessments of the appropriateness of its CMS-416 performance measures, the agency cannot be sure that it has the information it needs to oversee state implementation of EPSDT. This is inconsistent with federal internal control standards regarding information and communication, which specify that management should identify information requirements in an iterative and ongoing manner and ensure information remains relevant. We have previously reported that results-oriented organizations set performance goals to define desired program outcomes and develop performance measures that are clearly linked to these performance goals and outcomes. CMS has taken steps to develop, assess, and use CMS-416 information to improve states’ performance in providing EPSDT services. For example, CMS has set performance measure targets for participant and screening ratios reported on the CMS-416, and CMS publishes state-level results of the participant and screening ratios. In addition, after identifying issues with calculating the performance measure and target for the permanent molar sealants, CMS removed them from the Oral Health Initiative. CMS also convenes affinity groups and technical advisory groups to provide assistance to states in improving performance, often centered on specific services, such as dental services. However, CMS and state Medicaid officials told us that CMS does not consistently (1) communicate CMS-416 performance measure targets to states, (2) evaluate state performance against performance measure targets, or (3) provide states with assistance in reaching performance measure targets. While it has not done so across all performance measure targets, CMS did take these actions regarding targets for preventive dental services as part of its Oral Health Initiative. For example, CMS communicated with states about the preventive dental service performance measure target after it developed the Oral Health Initiative; disseminated a national oral health strategy and published a review of eight states identifying innovative approaches in providing preventive dental services; and provided targeted outreach to states with the lowest performance on the preventive dental service performance measure. Improvements in the provision of dental services occurred in many states. For example, in 2013, CMS met with state Medicaid officials in Florida about improving the provision of preventive dental services. Five years later, the percentage of beneficiaries receiving preventive dental services had increased 18 percentage points. CMS has not taken action in other areas. For example: CMS does not communicate the participant and screening ratio targets. Officials from CMS and from each of our 16 selected states told us that CMS does not mention these targets in communications with states, including discussions related to performance improvement. CMS has not evaluated state performance in meeting the participant and screening ratio targets, nor has it provided focused assistance to states to resolve gaps in states’ performance in reaching these targets comparable to the assistance provided for the preventive dental screening performance measure as part of the Oral Health Initiative. CMS did not provide formal written notification to states when in March 2016 the agency informed participants in two meetings that CMS no longer planned to use the target for measuring states’ performance on the permanent molar sealants performance measure. The notification was not provided through an official policy document, such as an agency informational bulletin distributed to all states. Despite removing the target, CMS issued a technical assistance brief in March 2018 that referenced it, which could have led to confusion among state officials. With regard to the Child Core Set, CMS has not established any performance measure targets and agency officials were not able to provide information about plans for setting targets. CMS officials said that the CMS-416 will remain a part of its EPSDT oversight. However, because its information is not standardized across states, CMS plans to increasingly rely on the standardized Child Core Set data to assess and improve states’ performance on the provision of EPSDT services. CMS officials noted that it publishes median, top quartile, and bottom quartile information for each state for all the Child Core Set measures that are publicly reported. Officials further reported in June 2019 that CMS and states use these as performance benchmarks, with an aim of reaching the national median on these measures if not the top quartile. Reporting these data is an important step in ensuring better oversight of EPSDT. However, CMS has not developed fixed targets that explicitly track states’ progress in increasing beneficiaries’ receipt of EPSDT screenings and services. Using a median to assess states’ performance ensures that half the states will not meet this target, regardless of their individual performance. Further, CMS officials have not provided plans or timelines for when the Child Core Set would be used to help states achieve performance measure targets. CMS’s inaction regarding using the CMS-416 and Child Core Set to improve performance on the provision of EPSDT services limits the agency’s oversight and is inconsistent with federal internal control standards for monitoring, and practices of leading organizations. Federal internal control standards specify that management should (1) set performance measure targets in measureable, numeric terms; (2) communicate necessary information to achieve performance targets; (3) evaluate progress toward desired targets; and (4) take action to resolve identified issues. Without regularly using the CMS-416 and Child Core Set to improve the provision of EPSDT services, CMS is unable to identify whether state or federal efforts and policies are increasing the number of beneficiaries receiving EPSDT services. As a result, CMS’s oversight is limited and beneficiaries may not be receiving appropriate EPSDT services when they need them—CMS’s stated goal for EPSDT. (See table 4 for examples of actions CMS has and has not taken regarding using the CMS-416 and Child Core Set for improving the provision of EPSDT services.) CMS is unable to determine whether all eligible EPSDT beneficiaries are receiving blood lead screenings in accordance with CMS policy. As previously noted, CMS-416 data are incomplete, because they only include blood lead screenings paid for by Medicaid, and the form reports the number of screenings performed instead of the number of beneficiaries receiving screenings. State examples of collecting blood lead screening data Nebraska. Medicaid officials said that the state has developed a database with the Nebraska Health Information Initiative containing laboratory testing data. Treating providers and managed care organizations can access the database to determine whether a Medicaid beneficiary has received a blood lead screening. New Jersey. Medicaid officials said that it can be difficult to track blood lead screenings that are performed using funding from sources other than Medicaid; for example, those performed by the state health department. Officials said that they have been building a lead registry to capture data on lead screenings performed, regardless of how they are funded. New Jersey Medicaid officials said they collect data every 6 months on screenings not paid for by Medicaid and enter the data into the state’s blood lead registry. CMS has stated that screenings are important for identifying beneficiaries with elevated blood lead levels at as young an age as possible, because lead exposure can harmfully affect nearly every system of the body and cause developmental delays. According to a presidential task force on environmental health and safety risks to children, co-chaired by HHS, early identification of developmental delays allows providers and communities to intervene earlier to improve health outcomes. The presidential task force issued goals in December 2018 to reduce lead exposure and associated harms, including a goal to identify lead-exposed individuals and improve their health outcomes. Without complete information about blood lead screenings, CMS cannot identify the number of beneficiaries who have not received blood lead screenings. As a result, the agency may be unaware of beneficiaries with unidentified lead exposures. CMS issued guidance in 2016 to states on improving blood lead screening reporting, including correcting reporting errors and partnering with providers to ensure beneficiaries receive blood lead screenings. (See sidebar for examples of efforts states have taken to improve available data about blood lead screenings.) However, as of February 2019, the screening data remained incomplete, according to agency officials. CMS officials also told us they are currently in discussions with the Centers for Disease Control and Prevention about how to capture more complete information about Medicaid beneficiaries who are receiving blood lead screenings through programs funded by that agency. However, as of February 2019, CMS officials had not identified specific actions to gather this data. The lack of data is inconsistent with federal internal control standards, which specify that management should obtain relevant data from reliable sources based on identified information requirements, and use such data for effective monitoring. According to CMS, the results of recent pilot studies indicate that T-MSIS data can be used to replicate some information on the CMS-416 and Child Core Set. CMS officials said that the results also suggest that CMS may eventually be able to use T-MSIS data to produce the CMS- 416 and Child Core Set data, thus eliminating the need for states to report this information themselves separately. As previously noted, CMS intends for T-MSIS to both reduce the number of reports CMS requires states to submit and to provide more information to improve Medicaid oversight. CMS officials said that they were encouraged that the pilot studies to replicate portions of the CMS-416 and Child Core Set generally yielded positive results. For example, CMS was able to use T-MSIS to replicate the total number of Medicaid beneficiaries aged 20 and under eligible for EPSDT from the CMS-416 within 5 percent of state-reported values for eight of nine pilot states—which CMS officials viewed as a positive result. CMS officials noted some concerns with inaccurate state Medicaid eligibility data; for example, multiple dates of birth reported through T-MSIS for the same beneficiary. However, CMS officials believe the accuracy and completeness of T-MSIS data has improved since the pilot studies, which were conducted using data from 2015 and 2016. Regarding the Child Core Set, CMS was able to use T-MSIS to replicate some of the information, such as adolescent well-care visits, but not other information, such as emergency department visits. While CMS found generally positive results from the pilots, the agency has not developed a plan with time frames and interim milestones for when it will use state-reported T-MSIS data to produce the CMS-416 and Child Core Set data sets instead of states separately producing both T- MSIS data and the two data sets. In April 2019, CMS officials said that they were planning additional pilots beginning in fiscal year 2019 to replicate portions of the CMS-416 and the Child Core Set. However, CMS officials were unable to provide planned next steps, including time frames and interim milestones, for using T-MSIS data to replace the CMS-416 and Child Core Set. This is inconsistent with federal internal control standards related to using and communicating quality information to achieve objectives. Without a specific plan with time frames with interim milestones, CMS may miss opportunities to use T-MSIS data to streamline state reporting and better oversee states’ provision of EPSDT services. This limitation is similar to one we reported in December 2017 about the initial steps CMS had taken for using T-MSIS data. We found CMS was limited in using T-MSIS for its broader oversight efforts of state Medicaid programs, in part, due to the absence of an articulated plan and time frames. Under EPSDT, millions of Medicaid’s youngest beneficiaries received well-child screenings and dental services in fiscal year 2017; however, nearly as many of them did not. Further, existing data on blood lead screenings are incomplete and inaccurate, leaving CMS unaware of beneficiaries with unidentified lead exposures that can cause developmental delays. The EPSDT data collected—whether via the CMS- 416, Child Core Set, or T-MSIS—have the potential to improve CMS oversight of beneficiaries’ receipt of necessary services and screenings. However, CMS has not taken sufficient steps to help ensure the appropriateness of its state data collection, evaluations, and assistance; and its plans for new reporting, including time frames and interim milestones, are lacking. We are making the following six recommendations to CMS: The Administrator of CMS should work with states and relevant federal agencies to collect accurate and complete data on blood lead screening for Medicaid beneficiaries in order to ensure that CMS is able to monitor state compliance with its blood lead screening policy, and assist states with planning improvements to address states’ compliance as needed. (Recommendation 1) The Administrator of CMS should regularly assess the appropriateness of performance measures and targets for the EPSDT benefit, and take any necessary actions to ensure their relevance and use, including adding, changing, or removing measures, or targets, and regularly communicating performance measures and targets to states. (Recommendation 2) The Administrator of CMS should conduct regular evaluations of state performance by comparing states’ performance measurement data with CMS’s EPSDT targets to identify gaps in states’ performance and areas for improvement. (Recommendation 3) The Administrator of CMS should assist states with planning needed improvements, including providing focused assistance, to resolve gaps in states’ performance in meeting CMS’s EPSDT targets. (Recommendation 4) The Administrator of CMS should develop a plan with time frames and interim milestones for using T-MSIS data to generate the necessary data from the CMS-416 to improve EPSDT oversight and streamline state reporting. (Recommendation 5) The Administrator of CMS should develop a plan with time frames and interim milestones for using T-MSIS data to generate the necessary data from the Child Core Set to improve EPSDT oversight and streamline state reporting. (Recommendation 6) We provided a draft of this report to HHS for comment, and its comments are reprinted in appendix IV. HHS also provided us with technical comments, which we incorporated in the report as appropriate. Overall, HHS concurred with three recommendations and did not occur with three recommendations. HHS concurred with our first recommendation that CMS should work with states and relevant federal agencies to collect accurate and complete data on blood lead screening for Medicaid beneficiaries and assist states with planning improvements to resolve gaps in states’ performance as needed. However, HHS stated that it would not be possible to obtain complete data on blood lead screenings, because some screenings are not paid for by Medicaid. In our report, we noted some state and CMS efforts to improve available data on blood lead screenings. We continue to believe CMS needs to take additional actions to collect accurate and complete data to oversee whether eligible EPSDT beneficiaries are receiving blood lead screenings in accordance with CMS policy. HHS did not concur with our second recommendation, which stated that CMS should regularly assess the appropriateness of performance measures and targets for the EPSDT benefit, and take any necessary actions to ensure their relevance and use. HHS noted that it assesses the appropriateness of Child Core Set measures annually and may update existing measures based on that assessment, including measures on the CMS-416. We acknowledge CMS’s actions to assess the appropriateness of Child Core Set measures annually and update those measures as appropriate, and we found these actions generally consistent with federal internal control standards regarding information and communication. However, CMS has not taken action, as needed, related to any assessments of the CMS-416 performance measures, even though officials acknowledge limitations in these measures, such as the participant and screening ratios. HHS also stated that it may set targets in key areas as appropriate, and has done so as part of the Oral Health Initiative, but that HHS does not believe it would be productive at this time to set targets for every measure. We are encouraged that HHS agreed that it may set targets in key areas as appropriate. This is consistent with our recommendation for CMS to regularly assess the appropriateness of its targets. Our recommendation does not assume that targets should be set for every measure—rather, that CMS needs to regularly assess the appropriateness of performance measures and targets for the EPSDT benefit and communicate them to states. HHS did not concur with our third recommendation, which stated that CMS should conduct regular evaluations of state performance by comparing states’ performance measurement data with CMS’s EPSDT targets. HHS stated that it offers a wide range of technical assistance on quality improvement to help states address performance goals. HHS commented that it believes this is the most effective method of helping states identify and address areas for potential improvement. We acknowledge that CMS has provided states with technical assistance and individual state snapshots of selected Child Core Set measures over time. However, regular evaluations of states’ performance against appropriate EPSDT targets are necessary to help identify gaps in states’ performance and areas for improvement. HHS noted that states recently received snapshots about their performance on publicly reported Child Core Set measures for the past 5 years, through fiscal year 2017. According to HHS, the snapshots include information about a state’s performance on each measure relative to other states’ performance and highlights significant changes in a state’s performance for each measure. However, these snapshots include descriptions of all states’ performance—using medians, and top and bottom quartiles—which are subject to change over time. Moreover, because the median is the midpoint of all states’ performance, this target ensures that half of states will not meet it, regardless of their individual performance. A fixed target—or targeted improvement goal, such as the one developed as part of the Oral Health Initiative—would provide states with the opportunity to measure performance over prior years’ results, which is a more meaningful measure that all states can strive to achieve. HHS did not concur with our fourth recommendation, which stated that that CMS should assist states with planning needed improvements to resolve gaps in states’ performance in meeting EPSDT targets. HHS stated that it has developed national and state-specific improvement goals for children enrolled in Medicaid with respect to receipt of at least one preventive dental service and provided targeted technical assistance to the lowest performing states. In this report, we noted states’ progress in meeting targets once CMS developed a performance measurement target for preventive dental services, including actions to improve state performance. Developing additional targets on performance measures critical to beneficiaries’ health and well-being could help improve oversight of EPSDT. HHS also described other examples of targeted technical assistance to remedy gaps in states’ performance, which included working with states on improving their performance on certain Child Core Set measures and improving access to EPSDT services by better leveraging schools as settings for care. Such technical assistance could be valuable for CMS to provide to states after identifying gaps in states’ performance relative to EPSDT targets. Doing so would allow CMS to share additional strategies to help states plan and implement needed improvements. HHS concurred with our fifth and sixth recommendations that CMS should develop a plan with time frames and interim milestones for using T-MSIS data to generate the necessary data from the CMS-416 and Child Core Set to improve EPSDT oversight and streamline state reporting. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the Secretary of Health and Human Services, the Administrator of the Centers for Medicare & Medicaid Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Carolyn L. Yocom at (202) 512-7114 or yocomc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are listed in appendix V. Selected states used several types of practices to promote and facilitate the delivery of Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) services, according to Medicaid officials in the 16 selected states we interviewed and profiles of these states created by the American Academy of Pediatrics. The practices selected states used included outreach and education, financial incentives, collaboration in EPSDT administration, and EPSDT service delivery initiatives, as shown in figure 4. States annually report information about Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) services to the Centers for Medicare & Medicaid Services (CMS), through the Form CMS-416 and the Child Core Set. The CMS-416 provides basic information about EPSDT for Medicaid beneficiaries aged 20 and under, such as the participant ratio and number of beneficiaries receiving a preventive dental service. The Child Core Set provides CMS with information about the quality of health care provided to Medicaid beneficiaries and individuals aged 18 and under who are covered under the Children’s Health Insurance Program. In fiscal year 2024, annual reporting of the Child Core Set will become mandatory. As of 2019, the Child Core Set included performance measures related to the provision of EPSDT services, such as well-child visits in the first 15 months of life. Because Child Core Set reporting is currently voluntary, states vary in the number of performance measures they choose to report. In fiscal year 2017, for example, 50 states and the District of Columbia voluntarily reported on at least one of the 27 Child Core Set performance measures, with states reporting a median of 18 Child Core Set performance measures. Some information is only reported on the CMS-416 or Child Core Set, while other information— well-child visits, preventive dental services, and dental sealants—is reported on both CMS-416 and Child Core Set. (See table 5 for information reported on the CMS-416, the Child Core Set, or both.) Tables 6 through 8 present annual state-reported data from the Centers for Medicare & Medicaid Services’ (CMS) Form CMS-416 on the provision of selected Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) services by state and nationally. Well-child screenings are presented from fiscal year 2010, the year in which the current reporting template was implemented, through fiscal year 2017, the most recent year for which data were available at the time of our review. Preventive dental services data are presented from fiscal year 2011, the baseline year for measuring states’ progress toward CMS’s Oral Health Initiative targets, through fiscal year 2017, the most recent year for which data are available. Carolyn L. Yocom at (202) 512-7114 or yocomc@gao.gov. In addition to the contact named above, Karen Doran (Assistant Director), Peter Mangano (Analyst-in-Charge), Matthew Green, Erika Huber, Drew Long, Jennifer Rudisill, and Kelly Turner made key contributions to this report. Also contributing were Muriel Brown, Giselle Hicks, Erika Lessien, and Madeline Ross.", "summary": "The EPSDT benefit is key to ensuring that Medicaid beneficiaries aged 20 and under receive periodic screening services, such as well-child screenings, and diagnostic and treatment services, such as physical therapy and eyeglasses, to correct or ameliorate conditions discovered during a screening. GAO was asked to examine the extent to which Medicaid beneficiaries aged 20 and under receive health care services under the EPSDT benefit. Among other things, GAO examined (1) what is known about the provision of EPSDT services based on CMS-required annual state reporting, and (2) CMS oversight of the EPSDT benefit. To do this, GAO analyzed annual state reporting data from fiscal years 2010 through 2017, the most current year data were available; CMS documentation; and federal internal control standards. GAO also interviewed CMS officials and Medicaid officials from 16 states selected, in part, on the variation in number of beneficiaries and geographic diversity. Approximately half of all Medicaid beneficiaries aged 20 and under received screenings and services recommended under the Early and Periodic Screening, Diagnostic, and Treatment (EPSDT) benefit in fiscal year 2017, but nearly as many did not. For example, GAO's analysis of state-reported data found that about 59 percent of all beneficiaries (20.2 million) who should have received at least one recommended well-child screening received one. About 48 percent of beneficiaries aged 1 to 20 (18.3 million) received a preventive dental service in fiscal year 2017. Older beneficiaries tended to have lower rates of screening. Number of Medicaid Beneficiaries Receiving and Not Receiving Well-Child Screenings in Fiscal Year 2017, by Age Group The Centers for Medicare & Medicaid Services (CMS), the agency that oversees Medicaid, including EPSDT, has taken steps to improve the quality of information that states report about the provision of EPSDT services. CMS has also set some EPSDT performance measure targets for states; yet, the agency has not taken other steps to oversee the EPSDT benefit, such as collecting the data necessary to evaluate whether states are complying with CMS's policy for beneficiaries to receive a blood lead screening; taking action, as needed, based on assessments of the appropriateness of some performance measures, such as well-child screening measures; and using state-reported information to regularly evaluate states against CMS's EPSDT targets, or assisting states in planning improvements to meet the targets. Absent these steps, CMS's oversight is limited and beneficiaries may not be receiving appropriate EPSDT services when they need them. GAO is making six recommendations to CMS regarding its oversight of the EPSDT benefit, including collecting appropriate blood lead screening data; taking action, if needed, after assessing the appropriateness of performance measures and targets for EPSDT; and evaluating states' performance in meeting CMS's EPSDT targets. CMS agreed with three recommendations, but disagreed with three others regarding performance measures and targets. GAO maintains that these recommendations are valid, as discussed in this report.", "document_type": "gao"}
{"report": "To be entitled to VR&E services and related benefits, veterans generally must (1) have at least a 20 percent service-connected disability rating from VA and (2) be in need of rehabilitation because of an employment handicap. Entitled veterans may generally receive up to 48 months of vocational rehabilitation services and up to an additional 18 months of employment services, which include counseling, and placement and postplacement services. If a veteran is entitled to receive VR&E services and found to be employable, a counselor is to work with the veteran to identify a suitable employment goal, and to incorporate that goal and the needed services and benefits to achieve it into a vocational rehabilitation and employment plan (hereafter “employment plan”). To develop an employment plan, the counselor and veteran review labor market information for jobs within the veteran’s identified abilities, aptitudes, and interests that will not aggravate his or her service-connected disability or disabilities. After assessing obstacles to employment, they agree on a written employment plan that describes the employment goal and the services needed to achieve it. Common services provided by VR&E are funding for higher education, career counseling, and short-term employment services like job search assistance. Counselors have the authority to approve a wide variety of educational programs and may approve employment plans that have an annual cost of up to $25,000. Within VA’s Veterans Benefits Administration (VBA), the VR&E central office is responsible for overseeing the VR&E program, including training staff and monitoring their work to ensure high performance and consistency. Among other elements, VR&E’s quality assurance efforts entail reviewing a subset of case files on a monthly basis to ensure that the entitlement decisions, development of plans, and delivery of services are performed and documented in accordance with VA regulations, VR&E’s operations manual, and other directives. VR&E services are provided by field staff at 56 regional offices and about 300 satellite locations. The satellite locations include college campuses to help veterans successfully complete their training and find employment, as well as military sites to help servicemembers with disabilities as they begin their transition to veteran status and the civilian workplace. VR&E field positions include (1) VR&E officers who manage the program and its staff in each region; (2) vocational rehabilitation counselors who work directly with veterans to assess their entitlement, develop their employment plans, and manage their progress; and (3) staff to support the administration of the program. As of June 2019, 1,394 field staff members were administering the VR&E program, of which nearly 75 percent (1,026) were counselors. From September 2013 to June 2019, VR&E’s total caseload peaked in fiscal year 2016 with almost 135,000 participants (see fig. 1). Over the same period, the number of counselors changed little until 2019. In 2019, the number increased after VA hired an additional 88 counselors in response to a provision in an appropriations law suggesting that the agency aim to serve 125 veterans or fewer per full-time equivalent counselor. The increase in staffing helped reduce the average caseload of 130-141 cases per counselor during fiscal years 2013 through 2016 to 113 cases in June 2019 (see fig. 2). VR&E counselors consider a set of common factors, including the veteran’s disability or disabilities, interests, and local labor market conditions, when developing and approving veterans’ employment plans. Program regulations require an assessment of some of these factors when the veteran is initially evaluated. VR&E quality review data from fiscal years 2016 through 2018 suggest that counselors generally documented certain plan considerations during the evaluation. For example, in 98 percent of the 1,080 cases VA reviewed for accuracy in fiscal year 2018, counselors documented the veteran’s service needs based on their functional limitations. In 95 percent of cases, counselors documented that they assessed the veteran’s abilities, aptitudes, and interests. Lastly, in nearly 99 percent of cases, counselors documented that the veteran was involved in vocational exploration activities such as career searches and labor market research. During our more focused review of how counselors developed plans for a non-generalizable sample of 34 VR&E case files, we found that counselors generally documented a set of common factors. Consistent with program guidance stipulating that counselors are to consider a veteran’s service needs, abilities, aptitudes, and interests, we identified common consideration factors including one’s functional limitation from disability, prior education, aptitude results, and career interests. Table 1 presents these factors and the number of files in which the factors were documented. Our case file review found that 30 of the 34 counselors also documented the estimated cost of VR&E employment plans. According to testimony from a veteran service organization, many VR&E participants are dissuaded by their counselor from pursuing education at a top tier university because of cost. VA’s VR&E operations manual states that if more than one local training or educational facility will meet a veteran’s needs, counselors must justify their decision to select a school that is more expensive than the least costly one. Counselors are not required to document all of the educational facilities that would serve a veteran’s needs; therefore, we could not determine the extent to which counselors chose the lowest cost facility. Counselors we interviewed in each of the three regional offices we visited said that while mindful of cost, they strive to develop employment plans that best meet the needs of the veteran. For example, counselors at one regional office described a situation in which a higher priced school was chosen because the school offered smaller class sizes that better suited the veteran’s particular mental health conditions. Of the 34 files we reviewed, the annual plan cost exceeded $25,000 in 3 cases. Counselors we interviewed said that they considered the veteran’s career interests but weighed these interests against other factors, such as the veteran’s functional limitations and information about the local labor market. All 34 plans we reviewed aligned with the veteran’s stated career goals, though in some cases the veteran’s goals evolved after talking with the counselor about alternative occupations. In a few instances among these cases, the final plan’s career goal was notably different from the initial goal that the veteran had stated on the program intake form. Table 2 presents examples of how a plan can evolve as a result of career exploration activities and conversations between the veteran and their counselor. Counselors we interviewed described how veterans’ employment plans are individually designed to suit a veteran’s needs and, as a result, may differ from one another even when veterans have similar goals, characteristics, and circumstances. In some instances two veterans may appear to be similar, but may actually differ in some critical respect that results in appropriate variation across plans. A common difference among veterans is the geographical location where they are seeking employment. Counselors described how a veteran may be encouraged to explore an occupation with many job opportunities within a specific region, while a veteran with similar characteristics and interests living in a different area may be dissuaded from pursuing the same occupation for a lack of job opportunities in the area for that occupation. Local labor markets may also drive the need for a certain type of educational credential. For example, counselors said that some veterans will be competitive in certain labor markets with a bachelor’s degree, while others living in a different region with a more educated population may need a master’s degree. Likewise, they said that certain occupations, such as certified public accountants or school teachers, may require different forms of credentialing in different states. Other characteristics of individual veterans may also cause counselors to develop different plans for veterans who appear to have similar circumstances. One counselor we interviewed described a scenario in which one veteran who received a high score on an aptitude test for reading comprehension skills might obtain a certain employment plan while another veteran who received a much lower score would be steered toward a different plan. If the veterans were to compare their final plans, but were unaware of the differences in their aptitude test scores, they could perceive inconsistent treatment. Counselors also described how conversations they have with veterans as they work to develop employment plans can reveal other character traits, such as interpersonal skills, which can lead them to suggest different plans to two otherwise similar veterans. The counselors said that such conversations play an important role towards the development of successful plans. However, counselors we interviewed in each of the three regional offices we visited acknowledged that unintended variation likely occurs across plans developed for similarly-situated veterans. They explained that the reasons for such potential inconsistency can include (1) the prominent role professional judgment plays in the program and the potential for unintended bias, (2) counselors’ different VR&E experience levels, and (3) variations in regional offices’ policies. Judgment and bias. The counseling role is inherently subjective and requires counselors to use their professional judgment in each case. The VR&E operations manual describes counselors’ responsibilities in broad terms, stating that counselors are to guide and assist the veteran in making an informed decision on an appropriate plan based on the veteran’s abilities, aptitudes, and interests. According to counselors we interviewed, professional judgment enables them to develop a plan that is best suited for the veteran’s unique needs, although it also introduces the potential for personal bias and inconsistent plans for veterans with similar circumstances. For example, a counselor we interviewed cited a case in which he saw the need to develop a plan that allowed for a school that was closer to a veteran’s home over other, less costly options because of his sensitivity to the veteran’s childcare responsibilities. Another counselor in the same office may not have seen the need for that accommodation. Further, counselors we interviewed said that some of their colleagues may be more comfortable suggesting that a veteran reconsider his or her career goal given circumstances such as the veteran’s disabling conditions or the local labor market. They explained that while some counselors would be hesitant to make the veteran unhappy, and possibly angry, other counselors would be more inclined to work through the conflict. Counselors said that they try to mitigate inconsistency by asking their fellow counselors to weigh in on these sorts of judgments, either informally, or at periodic information-sharing meetings. Counselor experience. Although all counselors have at least a master’s degree in rehabilitation counseling or a related field, differences in counselors’ levels of VR&E experience may affect their approach to plan development. Counselors at two regional offices noted that the focus of the VR&E program has oscillated between education and employment, with employment being the current primary focus. They said, as a result, a counselor’s general approach to plan development could be influenced by the prevailing focus that existed at the time he or she was hired. Counselors also said that, in general, counselors with more experience will tend to approach plan development differently than a less seasoned counselor because they will apply lessons learned from serving many other veterans. For example, one counselor said that, based on years of prior experience and observation, he has developed a better understanding of which local educational programs offer veterans the best chance for success and which do not. He said while he is able to apply his institutional knowledge and experience to do what is best for veterans, a less experienced counselor may not have the same level of knowledge, which could lead to inconsistent plans for veterans with similar circumstances. According to counselors we interviewed, because of the recent hiring of new counselors to meet caseload targets, differences in VR&E experience among counselors may be more pronounced at this time. Regional office variation. Differences in administrative policies specific to individual regional offices may also contribute to inconsistent plan development. For example, according to program officials, to ensure the soundness of employment plans in the local labor market, some regional offices require management to approve plans involving a master’s degree, while others do not. Counselors in one region told us that requiring management approval might dissuade a counselor from developing a plan focused on a master’s degree because of the time the extra step would require. They acknowledged that this sort of approval policy could cause inconsistency across counselors’ plans and also cause a discrepancy in the number of master’s degree programs being approved at one regional office versus another. In general, the large number of variables involved in the development of employment plans may complicate the ability to determine the extent to which differences among counselors lead to inconsistent plans among veterans. Counselors we interviewed said that given the subjective nature of the program, such inconsistency is likely. However, counselors cautioned against making the plan development process overly structured and formulaic. In their view, a more restrictive approach would eliminate the flexibility that they need to generate plans that suit each veteran’s unique needs. VA trains counselors on developing sound and complete employment plans for veterans. New counselors receive a series of training courses that are developed and deployed through VR&E’s central office, and then receive additional courses and mentorship that are delivered through the regional offices. Course topics for new counselors include understanding vocational impairments, developing a rehabilitation plan, and documenting a narrative of the plan. The formal training emphasizes that plans should be individualized to accommodate the veteran’s rehabilitation needs, abilities, aptitudes, and interests. Collectively, these trainings take up to 80 hours. As of 2019, experienced counselors—those on the job for at least a year—take up to 20 hours of refresher training each year determined according to how they score on an annual assessment. The assessment evaluates counselors’ technical competencies such as knowledge of relevant regulations, vocational assessment and evaluation, and case management. If a counselor scores low on a particular topic, related courses are identified for the counselor to complete. In designing training for counselors, VA followed principles for strategically developing training that are consistent with a related guide for federal managers. For instance, VA obtained and considered input from multiple sources—including field advisory committees, quality assurance reviewers, and internal site visit auditors—to identify needs for counselor training. For example, questions and input from the field about a policy clarification led to a training about veterans’ entitlement to VR&E services. In addition, VA built flexibility into its training curricula for counselors so they could receive training on emerging topics such as implementing new policies throughout the year as needed. VA also has evaluated its training efforts in multiple ways. For example, it has evaluated training courses by surveying counselors to get immediate feedback and by checking with attendees and their supervisors to gauge improvements in skills and knowledge. VA monitors employment plans to ensure that they are complete, but does not check for consistency among counselors for veterans with similar circumstances. Quality reviews occur nationally as well as locally at each regional office. The purpose of the national reviews is to monitor the quality of regional offices’ work such as plan development, whereas the purpose of the local reviews is to help evaluate the performance of individual counselors. Nationally, a centralized quality assurance team monitors the completeness of regional offices’ VR&E entitlement decisions, employment plans, and service delivery by reviewing a randomly-selected subset of case files from each regional office on a monthly basis. Among other criteria, reviewers check whether a veteran’s plan identified goals and objectives, included an employment focus, and incorporated the veteran’s need for various services. Locally, VR&E officers or their designees are to review plans using the same criteria. Officers are supposed to review at least three cases per counselor per quality category (e.g., accuracy of evaluation, planning and rehabilitation services) per quarter. Reviewers do not check for consistency among counselors for similarly-situated veterans, at either the national or local levels. VR&E officials we interviewed identified challenges to completing and monitoring local reviews, but VA is addressing these challenges. According to the VR&E officer in each of the three regional offices we visited, it is difficult to complete local reviews given system limitations and their other job responsibilities such as implementing case management initiatives. They said that it is likely that some officers are not completing the required reviews while others are conducting them with varying degrees of thoroughness. Historically, VA has not identified the specific cases VR&E officers are supposed to review locally. Consequently, VA could not determine if VR&E officers conducted the requisite number of reviews or whether officers were selecting cases for quality review uniformly and fairly. In June 2019, during the course of our review, VA began a pilot in five regional offices to centrally and systematically identify the cases officers are to review to gauge individual counselors’ performance. The new process and system are intended to help officers conduct and track local reviews as well as to help VA monitor the completion of local reviews. VA plans to expand this process to all regional offices in fiscal year 2020. Although VA trains counselors to develop complete employment plans and reviews the completeness of some plans, it does not monitor the consistency of plans among different counselors. The code of professional ethics for rehabilitation counselors calls for counselors to be fair in the treatment of all clients and to provide appropriate services to all. In addition, one of the objectives of VR&E’s central office is to provide training and guidance to ensure high performance and consistency among field staff. Several veteran service organizations have testified at congressional hearings that VR&E is marked by inconsistent treatment of similarly-situated veterans. For example, one testimony cited veterans who allegedly received different plan approvals, such as access to graduate level education, merely on the basis of their counselor. Unlike for VA staff members who work on disability claim decisions, VA does not compare the output of VR&E counselors by, for example, analyzing responses to identical hypothetical cases for training or monitoring purposes. As a result, in addition to missing a training opportunity for counselors about employment plan development, VA does not know the degree to which inconsistency among counselors occurs. For example, the agency does not know the extent to which counselors would agree to a particular veteran’s pursuit of a master’s degree through VR&E. Moreover, VA cannot respond in an informed way—and take mitigating steps if warranted—to criticisms of subjectivity in the program. VR&E officials explained that the agency has not yet conducted such a comparative analysis because of other priorities, but agreed that it could do so particularly through its training efforts. VA uses several training and monitoring practices to help ensure that VR&E counselors develop employment plans that help veterans with disabilities obtain and sustain employment. In approving these plans, VR&E counselors use their judgment and discretion fostered in part by their formal education and professional experience in vocational rehabilitation. While our review of a non-generalizable sample of 34 cases found that counselors generally considered common factors in developing employment plans, counselors we interviewed nevertheless acknowledged that counselors may apply the factors differently because of their varying backgrounds and experience levels. The variability of counselors’ experiences and veterans’ circumstances may make it difficult to determine the full extent of any inconsistency. However, taking steps to examine the prevalence and type of any inconsistency among counselors who, for example, consider the same hypothetical case, would better position VA to mitigate any unfair differences in plans for veterans with similar circumstances. An understanding of how effectively and consistently counselors assist veterans will be even more important in the coming years as VA fully integrates the new counselors hired to decrease the average caseload. The Secretary of VA should ensure that the Director of VR&E assesses the consistency of VR&E plans among counselors and takes mitigating steps if results warrant. For example, as part of its training efforts, VA could have counselors respond to identical hypothetical veteran cases and, if unfair inconsistencies in plans result, the agency could enhance training on plan development. (Recommendation 1) We provided a draft of this report to VA for comment, and its written comments are reproduced as appendix I in this report. VA concurred with our recommendation and said that VBA will develop a consistency study of VR&E plan development. It emphasized that no two veterans are the same. It also provided technical comments which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Veterans Affairs, and other interested parties. In addition, the report will be available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the individual named above, Mark Glickman (Assistant Director), Joel Green (Analyst in Charge), and David Perkins made significant contribution to the report. In addition, Jennifer Cook, Holly Dye, Alex Galuten, Monica Savoy, Mimi Nguyen, Almeta Spencer, Jeff Tessin, Rosemary Torres Lerma, and Sonya Vartivarian made key contributions.", "summary": "VA's VR&E program helps veterans with service-connected disabilities obtain and maintain suitable employment. VR&E participants work with vocational counselors to develop career goals and employment plans. However, some veteran service organizations have questioned the consistency with which participants are treated by counselors in developing these plans. GAO was asked to review how VR&E vocational counselors work with participants to select employment plans, and VA's efforts to ensure high quality and consistency. This report examines (1) the factors that vocational counselors considered when developing VR&E participants' plans and how consistently they applied those factors, and (2) the extent to which VA trains and monitors vocational counselors to ensure a consistent, high-quality approach to helping veterans develop plans. GAO analyzed VR&E quality review data from fiscal years 2016 through 2018; reviewed a random, non-generalizable sample of 34 VR&E case files from 2019; reviewed relevant federal laws, regulations, and VA policy; and interviewed VR&E counselors and other program officials. The Department of Veterans Affairs' (VA) Vocational Rehabilitation and Employment (VR&E) counselors in GAO's review generally considered a set of common factors when developing plans to help veterans with disabilities obtain employment, but counselors explained that inconsistent application of those factors likely occurs. These factors included the veteran's disability, his or her interests, and local labor market conditions. The 34 VR&E plans GAO reviewed showed that counselors' generally considered and documented these factors (see table). Counselors in each of the three regional offices GAO visited said that plans are individualized to suit the veteran's needs and as a result will differ because each veteran's case is unique. Nonetheless, these counselors acknowledged that some veterans with similar circumstances likely receive different types of plans given differences in counselor judgment and experience. VA trains and monitors counselors to develop complete VR&E plans but does not assess the consistency of plans across counselors for veterans with similar circumstances. VA's training for VR&E counselors emphasizes that plans should accommodate each veteran's individual needs, abilities, aptitudes, and interests. In designing training for counselors, VA followed principles identified by GAO for strategically developing training. VA monitors the completeness of VR&E plans through national and regional quality reviews that check, among other elements, whether plans have an employment focus and include needed services. However, these quality reviews do not assess the consistency of plans developed by different counselors. VR&E officials explained that the agency has not yet conducted such an analysis because of other priorities, but agreed that it could do so. One of the objectives of VR&E's central office is to provide training and guidance to help ensure consistency among field staff. Assessing consistency across counselors would better position VA to mitigate any unfair differences in plans for similarly-situated veterans. GAO recommends that VA assess the consistency of VR&E plans among counselors by, for example, comparing counselors' responses to identical hypothetical cases, and take mitigating steps if warranted. VA concurred with the recommendation and planned to develop a consistency study.", "document_type": "gao"}
{"report": "Enacted in December 2015, ESSA’s amendments to Title I, Part A (Title I) of the ESEA included a number of requirements for SEAs and school districts to ensure the educational stability of children in foster care. For the purposes of this report, we refer to these requirements collectively as the “ESSA educational stability provisions.” Specifically, SEAs are required to describe in their Title I state plans the steps they will take to ensure collaboration with the state child welfare agency to ensure the educational stability of children in foster care, including assurances that: Such children enroll or remain in their school of origin, unless a determination is made that it is not in the child’s best interest to attend the school of origin. This decision shall be based on all factors relating to the child’s best interest, including consideration of the appropriateness of the current educational setting and the proximity to the school in which the child is enrolled at the time of placement. When a determination is made that it is not in a child’s best interest to remain in the school of origin, the child is immediately enrolled in a new school, even if the child is unable to produce records normally required for enrollment. The enrolling school shall immediately contact the school last attended by the child to obtain relevant academic and other records. The SEA will designate an employee to serve as a point of contact for child welfare agencies and to oversee implementation of the above provisions. LEAs are required to provide in their Title I LEA plans assurances that they will collaborate with the state or local child welfare agency to: designate a point of contact, if the corresponding child welfare agency notifies the LEA in writing that the child welfare agency has designated a point of contact for the LEA; and develop and implement clear written procedures governing how transportation to maintain children in foster care in their school of origin when in their best interest will be provided, arranged, and funded for the duration of the time in foster care. The ESSA requirements described above were generally required to be implemented by December 10, 2016. In addition, SEAs and school districts are required to publicly report on the academic achievement and graduation rates of youth in foster care on their annual report cards. States and localities also have some flexibility in implementing the ESSA educational stability provisions. For example, ESSA does not prescribe a specific process for determining whether it is in a child’s best interest to remain in their school of origin. In making this determination, state and local agencies have flexibility in determining which factors should be considered when evaluating the appropriateness of a child’s current educational setting, as well as any additional factors that pertain to a child’s best interest. Similarly, school districts and child welfare agencies generally determine the transportation procedures to use, provided they meet the minimum statutory requirements. In addition, SEAs may choose various approaches to help LEAs implement the ESSA educational stability provisions. For example, SEAs may decide to independently, or with their state child welfare agency, issue policies or guidance, disseminate question and answer documents, or hold informational meetings and webinars. Education and HHS collaborated to provide states with joint non- regulatory guidance specific to the ESSA educational stability provisions. In addition to this written guidance, Education provides technical assistance to states, such as through the State Support Network, one of its technical assistance providers. Each state also has a point of contact at Education for questions, according to Education officials. Education’s Office of School Support and Accountability oversees state implementation of Title I, Part A of the ESEA, including the amendments made by ESSA. Education’s oversight of SEAs includes reviewing state Title I plans that describe how states will follow a variety of federal requirements outlined in Title I, and periodic reviews of how each state is implementing Title I. These reviews occur every few years. HHS’s Children’s Bureau oversees state child welfare agencies’ implementation of Title IV-E, including the provisions in the Fostering Connections Act, and also provides related technical assistance. State and local officials reported facing several challenges related to implementing the ESSA educational stability provisions. Specifically, officials reported challenges with (1) turnover among local child welfare and educational agency staff, (2) obtaining school district input during the process for determining whether it is in a youth’s best interest to remain in their school of origin (referred to as best interest determinations), (3) providing and funding transportation, (4) ensuring accurate identification of youth in foster care, and (5) monitoring how school districts implement these provisions. In addition, while we did not ask on our survey about the requirement to immediately enroll youth in a new school if it is determined that remaining in the school of origin is not in their best interest, or about the requirement for the enrolling school to immediately contact the last school attended to obtain relevant records, education and child welfare officials we interviewed said they experienced challenges with immediate enrollment and records transfer for special populations of youth. Turnover among Local Child Welfare and Educational Agency Staff Turnover of local educational and child welfare agency officials was reported as a significant challenge that affects how many states and localities implement the ESSA educational stability provisions, according to our survey and interviews. Specifically, in our survey, 43 of 51 SEAs reported turnover of local child welfare agency points of contact as at least somewhat challenging. A similar number of respondents (39) reported facing challenges with turnover of school district points of contact (see fig. 1). During our discussion group, state child welfare agency officials highlighted turnover of local child welfare agency and school district staff as one of the most significant challenges their states face in ensuring educational stability for youth in foster care. In addition to turnover itself being a challenge, several other challenges reported by SEAs are related to staff turnover, according to officials we spoke with from four state and local educational and child welfare agencies. Specifically: Thirty-two SEA survey respondents identified maintaining an accurate list of school district foster care points of contact for their state as challenging, and officials from four state and local educational and child welfare agencies we spoke with stated turnover makes it difficult to keep these lists updated. One SEA point of contact said that when she sends emails to school district points of contact, she receives numerous responses each time from school district staff saying they are no longer the point of contact. Officials we interviewed at one school district noted that they tried to identify a new point of contact at another school district, but the list on the state website had not been updated. Thirty-eight SEAs reported on our survey that ensuring that school district points of contact are aware of their responsibilities is a challenge. Eight state and local educational and child welfare agency officials we interviewed echoed this observation and cited staff turnover as leading to a lack of awareness of responsibilities or protocols related to the ESSA educational stability provisions. Local staff being unaware of their responsibilities under ESSA can lead to conflicts, according to officials from two state and three local agencies we interviewed, and resolving conflicts between school districts and local child welfare agencies was a challenge reported by three-quarters (38) of SEA survey respondents. For example, officials at one local child welfare agency said they encountered school district officials who did not believe a youth in foster care could attend their current school, since their foster parent lived outside the school district. To resolve the conflict, the school district point of contact discussed the provisions with the school officials. To alleviate challenges related to turnover, SEA points of contact we surveyed and interviewed explained that they regularly provide information to local school district and child welfare agency officials on the ESSA educational stability provisions. To inform and remind local officials about the provisions, a few of these officials said they send emails to school district points of contact or provide training on the provisions at orientation for new staff at child welfare agencies. In all three states we visited, the SEAs and/or state child welfare agencies said they held joint presentations for both school districts and local child welfare agencies, and SEA officials in Georgia said they are considering holding regional collaborative meetings every four to six months. In addition, most SEAs reported on our survey that they work with their state child welfare agencies to provide or develop assistance, guidance, and sample documents or templates to facilitate implementation of the ESSA educational stability provisions at the local level. (See tables 1 and 2 in appendix II for more information on this assistance.) School District Input for Best Interest Determinations On our survey, 34 of 50 SEAs reported that ensuring school districts participate in best interest determinations is a challenge (see fig. 2). Two of five state child welfare agency officials in our discussion group also described challenges related to the lack of collaboration between child welfare agencies and schools on best interest determinations. While ESSA does not prescribe who should be involved in the best interest determination, the joint federal guidance encourages state and local child welfare and educational agencies, including school districts, to develop a process that involves all relevant parties. School district involvement, however, depends on child welfare agencies informing them when a child enters foster care or changes homes. Officials we interviewed at several child welfare agencies indicated they may not include school districts or schools in these determinations due to time constraints. Child welfare officials explained that removing a child from a home and placing them into foster care is a chaotic time and many steps need to be taken to quickly provide the child with a safe environment. During this time, caseworkers may lack the capacity to collaborate with school districts or schools. Child welfare agency officials at two local offices we visited explained that they prioritize a child’s health and safety when placing a child in a new foster home and that they place a greater focus on these issues than on educational stability. Some child welfare agency officials we spoke with said they do not always need school district input to make a best interest determination. For example, officials at two local child welfare agencies said that in some cases, the commute to a child’s current school may be so long that remaining there is clearly not in a child’s best interest. Officials from one state and two local child welfare agencies told us they assume it is in the best interest of the child to remain at their current school. Officials from the state child welfare agency said they do not believe they need to consult with school districts to make that decision. Officials at another local child welfare agency said it would not be helpful to collaborate with school districts on the best interest determination, since the child welfare officials do not believe where the child attends school is the highest priority. However, youth we spoke with in our discussion groups told us that changing schools can create several challenges (see text box). Officials from other state and local child welfare agencies told us they recognize the need to involve school districts and are taking steps to try to include them in best interest determinations. For example, one state child welfare agency we visited includes a line for the school district point of contact’s signature on the state’s best interest determination form; however, we heard from officials at a local child welfare agency that the school district point of contact may not be involved in making the best interest determination, and the form may not be consistently used. Officials at a local child welfare agency told us that they hold best interest determination meetings with the school district by phone because these meetings are faster to schedule than in-person meetings. Rather than speaking with school district staff, officials from four local child welfare agencies said they try to contact school staff that may be close to a child, such as a counselor or teacher, but officials from three of these agencies said they may not do so in every case. Thirty-seven of 50 SEAs reported on our survey that assisting school districts with identifying or arranging transportation is at least somewhat challenging (see fig. 3). To help school districts and local child welfare agencies identify transportation options, SEAs in two states we visited provide guidance or other documents to these agencies that describe potential transportation options. School district and local child welfare agency officials we spoke with reported using different approaches to transport youth, including having foster parents, school district or child welfare staff, or the youth drive to school; rerouting buses; hiring a taxi or other private transportation service; or using public transportation. Sometimes they reported combining these methods to transport youth to their current school. However, eight school district and local child welfare officials noted difficulties with their options, including limited options in rural areas and lack of appropriate transportation for younger youth and those with behavioral issues. For example, an Arizona local child welfare official explained that while they can use taxis to transport youth, they are not approved for use for children age 6 and younger. Foster parents and youth we spoke with shared challenges they have experienced with transportation to the school of origin (see text box). Experiences of Selected Foster Parents and Youth with Transportation to School of Origin Multiple foster parents in two states we visited shared that they were told by child welfare case workers that the foster parent(s) would have to transport children in their care to school for those children to remain in their current school. They told us that sometimes they could not drive the child due to distance or the needs of other youth in their care, and the child transferred to a new school. We also heard that other modes of transportation may be unreliable or cause difficulties for a child’s schedule. For example: One child in foster care in Arizona told us that she missed a week of school because the taxi provided by the child welfare agency failed to pick her up. A child in a foster care group home in Ohio said that despite being placed in a school which was in the same school district as her school of origin, her commute was long—she needed to take two public buses—and she sometimes missed dinner. On our survey, 30 of 50 SEAs reported that helping school districts determine how to fund the additional transportation costsdefined in the joint federal guidance as the difference between what a school district would otherwise spend transporting a student to their assigned school and the cost of transporting a child in foster care to their school of origin is also challenging. Among these 30 SEAs, 12 noted it was very or extremely challenging. Six school district and child welfare agency officials we interviewed also indicated that funding was a concern and some noted that transporting youth to their school of origin can result in extensive additional costs (see text box). Examples of Transportation Costs to Maintain Youth in Foster Care in Their School of Origin Over a school year, officials from a local child welfare agency said it spent $155,000 to transport students in one school district. According to officials at one school district, to transport one student, the school district had to hire a van at an estimated cost of up to $30,000 per year. In one month, another school district reported paying over $4,000 to transport five students. School district and child welfare officials said that they can rely on multiple funding streams—local, state, and/or federal—to cover these additional costs. Districts and local child welfare agencies reported that they sometimes split these costs, depending on their state’s policies. (See fig. 9 in appendix II for state-specific cost-sharing requirements reported in our survey.) For example, in Arizona, one agency transports the child to school and the other transports the child home and each pays for the cost of their one-way trip. To assist localities with funding additional transportation costs, nine SEAs said their state provides funding that partially or fully covers these costs. While educational and child welfare agencies may use federal funding through Title I or Title IV-E for the additional transportation costs, some SEA, school district, and child welfare agency officials we interviewed noted that they do not use these funds. Officials at a few school districts said they use Title I funding for other needs, while some child welfare agency officials explained their agency does not use Title IV-E funds because they did not have state “matching” funding, did not understand how to use the funds to reimburse schools for their costs, or had some youth who are not Title IV-E eligible. Ensuring Accurate Identification of Youth in Foster Care Thirty-two SEA survey respondents reported that ensuring school districts can accurately identify youth in foster care is at least somewhat challenging (see fig. 4). School district officials we spoke with expressed similar concerns. Officials we interviewed in nine of 10 districts stated they are not consistently aware of which students in their district are in foster care, and seven explained that there is no systematic way for school districts to be notified when a child enters or leaves care. Similarly, officials in four local child welfare agencies said they have no systematic way to inform schools when youth in foster care leave care or when their status in foster care changes. Officials from two school districts also stated their data systems have no way to indicate that a student is in foster care, so even if the child welfare agency notifies them of a youth’s status, they may not easily track the information. Officials from two school districts said not knowing the status of youth in foster care in their district impedes their ability to effectively implement the ESSA educational stability provisions. For example, one district official stated they would probably be transporting more youth to their school of origin if they knew which students were in foster care. In addition, two school district officials said that if they do not know which students are in foster care, they cannot provide additional supports that may be available to these youth, such as tutoring, financial assistance, or mental health services. The ability of school districts to accurately identify youth in foster care can also affect the accuracy of state and local report cards. Nine SEAs reported on our survey that they rely exclusively on school districts’ identification of youth in foster care for their state report cards. Of those nine, seven reported that ensuring that school districts accurately identify these youth is a challenge, which may affect the accuracy of the additional report card data required by ESSA. Some states and localities we visited had different ways to inform school districts when a youth’s foster care status changes, but officials noted varying degrees of consistency in notifying the districts of changes. Officials at two state child welfare agencies we visited told us they require the person enrolling the youth in school to present an official document that shows the youth is in state custody; however, they said schools are not informed when a child leaves foster care. One county and one state we visited had electronic data sharing agreements between child welfare and educational agencies for the purposes of updating school district records when a child enters and leaves foster care. Specifically, in that county, once a child enters foster care under the custody of the county child welfare agency, the school district’s database automatically receives pertinent information from the child welfare agency, according to officials. School and child welfare agency officials meet monthly to ensure data accuracy. In Georgia, officials from the state educational agency said they signed a data sharing agreement in spring 2018 with the state child welfare agency to allow information about youth in foster care to be provided to school districts. The previous data sharing agreement prevented the SEA from sharing the data with the school districts, according to officials. In Idaho (a state that participated in our discussion group), state officials said they ensure school districts are aware of youth in foster care by using an automated letter (see text box). Idaho’s iCARE System for Youth in Foster Care When a youth enters foster care or changes placements, Idaho’s iCARE system produces an automated letter that provides an initial communication from a child welfare social worker to the school district, SEA foster care points of contact, and the school principal. When the youth’s school of origin is entered into the system, the letter automatically populates the email addresses of the appropriate school district point of contact, SEA point of contact, and school principal. The letter contains the social worker’s initial best interest determination, and indicates if the student will need transportation to attend their school of origin, which the school district point of contact is responsible for coordinating. The school district point of contact has three days to provide input on the best interest determination when school is in session and 14 days during the summer months. The school district foster care point of contact and the child welfare social worker both must sign off on the plan identified within the electronic letter. Monitoring School Districts’ Efforts to Implement ESSA Educational Stability Provisions Under federal grant regulations, SEAs, which subgrant Title I funds to school districts, are required to conduct regular monitoring and oversight to ensure appropriate implementation of Title I by their school districts, and 43 SEA survey respondents reported that their states used one of the methods asked about in our survey to monitor how school districts implement at least one of the ESSA educational stability provisions. For example, over half (33) of SEAs reported that the Title I plans they receive from school districts include an assurance related to at least one of the ESSA educational stability provisions we asked about on the survey. More than two-thirds (36) of SEAs reported on our survey that effectively monitoring school districts’ implementation of the provisions is a challenge (see fig. 5). In their survey comments, eight SEA points of contact said limited state resources hinder their ability to ensure that the hundreds of school districts in their states properly execute the provisions. Officials we interviewed from all three SEAs in our site visits told us their states incorporate the educational stability provisions into their existing procedures for overseeing implementation of federal education programs. For example, SEA officials in Georgia told us that during one of their state reviews, they look for evidence of local agency collaboration, such as meeting agendas or emails. In Arizona, the SEA point of contact said he examines school district transportation procedures during on-site reviews. These on-site reviews occur for one- sixth of school districts in the state every year. (See table 3 in appendix II for more information on SEA monitoring of school districts.) Ensuring Immediate Enrollment and Obtaining Records While we did not ask on our survey about challenges related to immediate enrollment or obtaining records, seven state or local officials we spoke with noted difficulties with enrolling or obtaining records for students with disabilities who have individualized education programs, or students who previously attended juvenile justice or residential treatment facilities. Officials at a local child welfare agency and two school districts said that if an individualized education program is missing from a child’s records, they cannot know which services or classes a child might need and it may delay the child’s enrollment in the school or require switching classes again. Officials from Georgia’s SEA said they mitigate this challenge by providing school districts the option to share individualized education programs electronically, which enables other school districts that need the records to more easily obtain them. Education has provided technical assistance to states, at times in collaboration with HHS, to help states implement the ESSA educational stability provisions. Education’s technical assistance included written guidance, webinars, and in-person meetings, according to Education officials. Written guidance: Education and HHS jointly issued non-regulatory guidance on June 23, 2016 to help state and local educational agencies meet their obligations related to educational stability for youth in foster care under ESSA. On the same day, Education and HHS also issued a joint letter to chief state school officers and state child welfare directors that provided an overview of the ESSA educational stability provisions. Education sent an additional letter to chief state school officers on December 5, 2016, that provided information about the timelines for implementing the provisions. The letter also requested states to provide Education with their state foster care point of contact. Webinars: Education and HHS hosted several webinars for state educational and child welfare agencies that addressed a number of issues related to implementation of the ESSA educational stability provisions. In late summer 2016, Education and HHS hosted four webinars on the roles and responsibilities of educational and child welfare agency points of contact; best interest determinations and immediate enrollment; transportation; and effective collaboration. These webinars described the related ESSA requirements and featured selected states’ approaches to implementing the provisions. The State Support Network, one of Education’s technical assistance providers, facilitated another series of webinars that were offered in summer 2018 to address areas of implementation that states reported to be particularly problematic. HHS staff also participated in the webinar series, and topics included collaboration with child welfare agencies, data systems, transportation, and roles and responsibilities of points of contact. In-person and other assistance: Education provided additional assistance to state educational agencies through an in-person meeting and continuously provides assistance upon request. Education and HHS jointly held a session on sharing data to support students in foster care during its Combined Federal Programs Meeting for SEA officials in December 2018 in Washington, DC. At this meeting, Education also facilitated a session during which foster care points of contact networked with each other and subject matter experts, shared resources, and discussed outstanding implementation challenges. In addition, Education officials told us that they assign each state a point of contact at Education, and states can request technical assistance at any time through their assigned contact. This contact can work with the appropriate offices within Education to provide information requested by states and can facilitate further technical assistance through the State Support Network. Education officials said they respond to questions from states generally asking about expectations and requirements for the ESSA educational stability provisions. Thirty-seven SEAs reported on our survey that they would like additional federal assistance as they continue to implement the ESSA educational stability provisions. Our survey showed that most SEAs were interested in receiving additional guidance related to transportation cost sharing, transportation funding options, and arranging transportation; data privacy; and state monitoring of school districts’ efforts to implement these provisions, among other topics (see fig. 6). (Also see fig.10 in appendix II for all survey responses on these topics.) With respect to transportation issues, several state officials commented that they would like more information on how other states and localities are arranging and funding transportation. Regarding data privacy, a few other officials commented that they could use more information regarding privacy laws and what information can be shared across agencies. A few SEA officials noted that guidance on how they could monitor school district implementation would be useful. A majority of SEAs reported that opportunities for in-person and virtual meetings with a federal point of contact and their SEA and state child welfare agency counterparts, and a federally supported clearinghouse of information with sample documents from other states, would be moderately to extremely helpful (see fig. 7). (Also see fig. 11 in appendix II for all survey responses on this topic.) State educational and child welfare officials we interviewed explained that in-person and virtual meetings are helpful because they allow them to ask the federal contact questions and share and discuss issues with each other. Similarly, SEA officials in our discussion sessions said they would like federal agencies to organize more collaborative opportunities for SEA points of contact to interact with their peers to help identify best practices they can adapt in their state. Some states suggested Education could adopt methods it uses for other programs, such as the Education for Homeless Children and Youth program, to provide assistance and support to foster care points of contact, such as facilitating regional phone calls and identifying a point of contact specific to foster care at the federal level. According to Education officials, in June 2019 the agency selected a staff person to serve as the federal point of contact to work directly with SEA foster care points of contact, and they told us Education maintains a designated mailbox for all foster care-related correspondence (FosterCare@ed.gov). Education officials informed us that they plan to develop a community of practice for a small group of SEA foster care points of contact who will meet regularly for several months, which may facilitate more peer to peer interaction for a select number of states. Education plans to work with the Legal Center for Foster Care and Education to convene and facilitate the community of practice. According to Education officials, the community of practice will provide networking opportunities for participants to ask questions and obtain answers from their peers, and may include discussions of promising practices at the state and local level, among other areas. Officials said they will solicit interest from all SEAs about the opportunity to participate in the community of practice. However, they will limit the number of participants, depending on the level of interest, to 10 to 12 SEAs to promote discussion and sharing among states. Officials noted that if more states are interested in participating in the community of practice than they can accommodate, they will consider additional ways to support and share information with those additional states. Education officials also noted that they are exploring other types of technical assistance to facilitate more interaction and information exchange among states, such as a web portal where states can upload and share documents. Although Education is planning to develop a community of practice and is exploring other types of technical assistance, it may not have effective methods to reach all SEA points of contact to inform them of this assistance. In the course of our follow up on our survey, we determined that 22 of the current SEA points of contact were missing from Education’s email list. Education primarily disseminates information pertaining to the ESSA educational stability requirements to states through email. Twenty-three SEAs reported on our survey that they were not aware of webinars that Education offered in summer 2018. We discussed the email list with Education officials in June 2019 and they told us they had not conducted outreach to states to update the email list since they initially identified the SEA points of contact in 2016. Rather, officials said the email list was updated on an ad hoc basis, and Education depended on states to inform them when they want someone added to the email list. Subsequent to that discussion, in response to a recommendation included in a draft of this report which Education reviewed, Education officials told us they updated the email list in July and August 2019, and planned to update it quarterly moving forward. Education officials also acknowledged it could be useful to publicize the email list on its website. Education does not maintain information about its technical assistance webinars or other relevant materials in a centralized online location. Information relevant to implementing the ESSA educational stability provisions is located on multiple Education web pages, and the materials from the most recent 2018 webinars, including the recorded session and related sample documents shared by a number of states, are only available on a third party website for which there is no link from Education’s website. In our survey, SEA points of contact reported that they are interested in receiving additional information from other states. Thirty-seven SEAs reported in our survey that a clearinghouse of information with sample documents from other states would be helpful, and 22 of these 37 reported that this would be extremely helpful. One SEA official commented that it would be useful to have a clearinghouse that could be shared with school districts and other relevant parties nationwide. Federal standards for internal control maintain that management should select appropriate methods of communication, such as providing hard copy or electronic documents or conducting face-to- face meetings, and should periodically evaluate the methods of communication in order to communicate quality information on a timely basis. Without creating and maintaining a centralized online location for SEAs to access all related information, Education cannot ensure that all SEAs have access to technical assistance and guidance that could help them implement the ESSA educational stability provisions. Education officials told us that in 2020, they expect to fully implement the monitoring protocols for reviewing how states are implementing the ESSA educational stability provisions. Education officials said they plan to test draft protocols as part of a pilot by fall 2019 to determine necessary revisions and expect the final protocols to be implemented by fall 2020. According to Education officials, once the protocols are implemented, they plan to use a risk assessment approach to determine which states to review each year, and anticipate reviewing approximately nine states each year, depending on staff and resources. As part of their reviews, Education officials told us they plan to visit two school districts in each state under review to assess how the selected states are implementing the ESSA requirements, and to determine whether districts are getting appropriate support from the states. According to the draft monitoring protocols, during its state reviews, Education plans to obtain information on the following areas related to educational stability: SEA collaboration with the child welfare agency, best interest determinations, immediate enrollment, SEA foster care point of contact, and school district points of contact and transportation procedures. Education reviewed states’ plans for implementing Title I, however, Education officials said that the plans contain little information about the ESSA educational stability provisions. To receive Title I funds, states are required to submit state plans to the Secretary of Education, and the Secretary is required to approve the state plans if they meet the requirements in the law. While state plans are required to describe the steps the SEA will take to ensure collaboration with the state child welfare agency to ensure the educational stability of children in foster care, including various assurances, Education did not include specific instructions for information states should include on these provisions in the state plan template it developed for states. Youth in foster care face enormous challenges in their everyday lives and school can offer a stabilizing environment. Maintaining connections with teachers and friends, in addition to remaining in a familiar academic environment, can enhance the chances that a student is academically successful. However, many children in foster care are at higher risk of frequently changing schools, which can affect their academic achievement. ESSA made changes to the Title I program to help improve the educational stability of children in foster care. In the years since ESSA was enacted, SEAs and school districts have taken different approaches to implement its educational stability provisions, including collaborating with their child welfare agency counterparts. Most SEAs we surveyed reported common challenges with staff turnover and assisting districts with arranging transportation, among others, which can affect the successful implementation of the educational stability provisions. In addition, SEA officials are seeking more opportunities to understand how other states and localities have implemented the provisions and learn from their peers. Despite the assistance Education has provided to SEAs on a range of topics, the mechanisms Education uses to inform states of assistance are limited. The email list it uses to notify SEA foster care points of contact had not been systematically updated until July 2019, and resources on educational stability are not housed in one space. Without improvements in areas like these, states will not have access to all of the available resources that can help them improve the educational stability of youth in foster care, and ultimately, their academic success. The Secretary of Education should develop an online clearinghouse of sample documents from states and localities who wish to share them, past webinar recordings and their related documents, and links to other relevant resources that all SEAs can access. (Recommendation 1) We provided a draft of this report to Education and HHS for review and comment. Education provided written comments, which are reproduced in appendix III, as well as technical comments, which we incorporated as appropriate. HHS did not have comments. We also provided relevant excerpts to states we visited and incorporated their technical comments as appropriate. In its written comments, Education agreed with our recommendation to develop an online clearinghouse and noted actions it plans to take to implement it. Specifically, Education said in fall 2019, its Office of Elementary and Secondary Education will restructure its entire website to better organize its information, and create a new web page to house all foster care-related information and resources. Additionally, Education said this office will launch a virtual portal through which SEA foster care points of contact may collaborate and share resources. In addition, in a draft report sent to Education in August 2019, we included a recommendation to Education to update its foster care point of contact email list, and develop a process to update it at regular intervals. Education noted in its comment letter that it had updated its email list and that it will solicit updates to the email list on a quarterly basis, so we subsequently removed this recommendation. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies to the appropriate congressional committees, the Secretaries of Education and Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 617-788-0580 or nowickij@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of our report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the challenges states and selected local educational agencies face implementing the requirements of the Every Student Succeeds Act (ESSA) related to educational stability for youth in foster care, and (2) how the Department of Education (Education) provided technical assistance and monitored states and localities to ensure compliance with these requirements, including collaborating with the Department of Health and Human Services (HHS). To address both objectives and obtain national information, we held three discussion groups with officials from state educational agencies and child welfare agencies and conducted a web-based survey of state educational agencies in the 50 states, the District of Columbia, and Puerto Rico. To obtain more in-depth information, we visited three states—Arizona, Georgia, and Ohio—where we interviewed officials from state and local educational agencies and child welfare agencies. We reviewed relevant federal laws and regulations, Education and HHS guidance to states, and other research publications. We also interviewed officials from Education and HHS’s Administration for Children and Families, and other organizations that carry out efforts related to education and child welfare, including the Legal Center for Foster Care and Education and Casey Family programs, regarding the provisions, federal requirements and guidance, and state and local implementation. To learn about actions states have taken to implement the ESSA educational stability provisions and challenges they have encountered, we held three discussion groups, two with state educational agency (SEA) officials, and one with state child welfare agency officials, during a national meeting for SEA foster care points of contact and state child welfare agencies in Greensboro, North Carolina in October 2018. To solicit participants for these groups, we asked the meeting organizers to forward an invitation we drafted to all individuals who registered for the meeting to participate in our discussion groups, and also allowed individuals to sign up once they arrived at the conference. Meeting attendees self-selected to participate in the groups. Each of our discussion groups with SEA officials had seven participants, for a total of 14 state agency officials representing 14 states. Our discussion group of state child welfare agency officials had six participants representing five states. Discussion groups were guided by a GAO moderator using semi- structured interview protocols. These protocols included open-ended questions that encouraged participants to share their thoughts and experiences on implementing the ESSA educational stability provisions, including how they monitored local agencies, and whether any additional federal assistance is needed. To reach group consensus on the top challenges facing states as they implement the provisions, we used a nominal group technique. Officials from each state identified their state’s top three implementation challenges. The group then created a list from those named challenges and officials from each state used stickers to identify their top challenges from the list. Discussion groups are intended to generate in-depth information about the reasons for participants’ attitudes on specific topics and to offer insights into their concerns about and support for an issue. They are not designed to (1) demonstrate the extent of a problem or generalize results to a larger population, (2) develop a consensus to arrive at an agreed- upon plan or make decisions about what actions to take, or (3) provide statistically representative samples or reliable quantitative estimates. For these reasons, and because discussion group participants were self- selected volunteers, the results of our discussion groups are not generalizable. To learn about actions states have taken to implement the ESSA educational stability provisions and challenges they have encountered, we conducted a survey of SEA officials in the 50 states, the District of Columbia, and Puerto Rico. The survey was administered from January to March 2019 and we had a 98 percent response rate. The survey used a self-administered, web-based questionnaire, and state respondents received unique usernames and passwords. Our survey population was foster care points of contact at SEAs. We used multiple sources to create an initial list of points of contact, including a list provided by the Department of Education, SEA website pages related to foster care, and information from knowledgeable experts in the field. We reached out to each point of contact to ask them to confirm they were the foster care point of contact for their state or identify the appropriate point of contact. We instructed respondents to consult with others who were familiar with their state’s implementation of the provisions, if doing so would provide more accurate responses. Our survey included 20 fixed-choice and open-ended questions. We asked how SEAs collaborated with the state child welfare agency, how they assisted local educational and/or child welfare agencies, what challenges they encountered, and what assistance has been and would be helpful from the Department of Education in implementing the provisions. To draft the closed-ended questions and answer choices on the survey, we drew from recommended practices suggested in HHS and Education’s joint non-regulatory guidance to states, information shared during webinars sponsored by HHS and Education, and interviews with stakeholders, including our discussion groups with state educational and child welfare agencies. A draft of the survey questionnaire was reviewed by officials at Education, a knowledgeable stakeholder organization, and an independent GAO survey professional for completeness and accuracy. We made revisions based on their comments. We conducted three pretests—one by phone and two in-person—with SEA foster care points of contact from three different states to check that (1) the questions were clear and unambiguous, (2) terminology was used correctly, (3) the questionnaire did not place an undue burden on agency officials, (4) the information could feasibly be obtained, and (5) the survey was comprehensive and unbiased. To obtain our 98 percent response rate (51 out of 52 SEAs), we made multiple follow-up contacts by email and phone from January to March 2019 with points of contact who had not yet completed the survey. While 51 surveyed officials affirmatively checked “completed” at the end of the web-based survey, not all officials responded to every question or the sub-parts of every question. We conducted additional follow-up with a small number of respondents to verify key responses. Because this was not a sample survey, the survey has no sampling errors. However, the practical difficulties of conducting any survey may introduce errors, commonly referred to as non-sampling errors. For example, unwanted variability can result from differences in how a particular question is interpreted, the sources of information available to respondents, or how data from respondents are processed and analyzed. We tried to minimize these factors through our reviews, pre-tests, and follow-up efforts. In addition, the web-based survey allowed SEA foster care points of contact to enter their responses directly into an electronic instrument, which created an automatic record for each state in a data file. By using the electronic instrument, we eliminated the potential errors associated with a manual data entry process. To learn about actions states and localities have taken to implement the ESSA educational stability provisions and challenges they have encountered, we conducted site visits to three states to obtain information from state and local educational agency officials, state and local child welfare officials, foster parents, and current and former youth in foster care. We selected the three states—Arizona, Georgia, and Ohio—to represent a mix of factors, including type of child welfare agency (state or county administered), number of children in foster care, number of school districts, geographic dispersion, and variety in types of school districts (urban, suburban, rural). In each state we visited an urban, suburban, and rural school district, where we met with the school district officials responsible for implementing the ESSA educational stability provisions, and their primary child welfare agency counterparts. We also met with state educational and child welfare agency officials. We used a semi- structured interview protocol for these meetings. We held discussion groups with a total of 13 youth in foster care or formerly in foster care in three states, and in two states, we held discussion groups with a total of 14 foster parents, to obtain their perspectives on implementation of the provisions and educational stability generally. Although we cannot generalize our findings beyond these states and localities, these visits provided us with illustrative examples of how states and localities are implementing the ESSA educational stability requirements. We conducted this performance audit from June 2018 to September 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: Additional Survey Data to the question: “How much of a challenge, if at all, is each of the following items in implementing the ESSA educational stability provisions?” The term “ESSA educational stability provisions” refers to the amendments made by the Every Student Succeeds Act (ESSA) to Title I, Part A of the Elementary and Secondary Education Act of 1965 that are related to the educational stability of youth in foster care. These provisions have been codified at 20 U.S.C. §§ 6311(g)(1)(E), 6311(h)(1)(C), and 6312(c)(5). Best interest determination documents, like meeting documentation templates, questions to consider during the meeting, or sample notices to inform parties of the decision Sample memorandum of understanding/agreement for data sharing between school districts and local child welfare agencies for the purposes of identifying youth in foster care for the report card reporting 17 10 school of origin when in their best interest will be provided, arranged, and funded for the duration of the time in foster care. This includes states that reported that they solely respond when alerted to issues and do not conduct any other systematic monitoring activities. Specifically, nine states reported responding when alerted to issues regarding the provisions on best interest determinations and immediate enrollment, and did not report conducting any other monitoring activities. Similarly, 14 states reported solely responding when alerted to issues regarding new enrolling schools immediately contacting schools of origin to obtain relevant academic and other records, and did not report conducting any other monitoring activities. Finally, seven states reported responding when alerted to issues related to the provision on transportation procedures, and did not report conducting any other monitoring activities or did not know if their state monitors LEAs in other ways. educational stability of youth in foster care. These provisions have been codified at 20 U.S.C. §§ 6311(g)(1)(E), 6311(h)(1)(C), and 6312(c)(5). In addition to the contact named above, the following individuals made important contributions to this report: Elizabeth Morrison (Assistant Director), Kate Blumenreich (Analyst-in-Charge), Aimee Elivert, and Kelsey Kreider. Also contributing to this report were Steven Campbell, William Chatlos, Sarah Cornetto, Holly Dye, Jill Lacey, Jessica Orr, Catherine Roark, and Curtia Taylor.", "summary": "Roughly 270,000 school-aged youth were in foster care at the end of fiscal year 2017. Youth in foster care may change schools frequently, which can negatively affect their academic achievement. ESSA, enacted in 2015, reauthorized the Elementary and Secondary Education Act of 1965 and included provisions to improve educational stability for youth in foster care. These included requiring state educational agencies to ensure youth placed into foster care stay in their current school, unless it is not in their best interest to do so. GAO was asked to review implementation of these provisions. This report examines (1) the challenges SEAs and selected school districts face implementing the ESSA educational stability provisions for youth in foster care, and (2) how Education provides technical assistance and monitors state implementation efforts. GAO surveyed SEA foster care points of contact in the 50 states, District of Columbia, and Puerto Rico and all but one state responded. In addition to interviewing federal officials, GAO interviewed selected state and local educational and child welfare agency officials, and held discussion groups with foster youth and parents, in three states selected by number of youth in foster care, among other factors. GAO also held discussion groups with officials from 14 SEAs and 5 state child welfare agencies, and reviewed relevant federal laws, regulations, guidance, and technical assistance. State educational agencies (SEAs) reported several challenges in implementing the provisions in the Every Student Succeeds Act (ESSA) related to educational stability for youth in foster care. In their responses to GAO's national survey, SEAs reported challenges, including high turnover among local educational and child welfare agency officials, and with identifying and arranging transportation to schools for students (see figure). Turnover of local staff can result in the loss of knowledge and experience needed to implement the provisions, according to SEA and local officials we interviewed. Regarding transportation, ESSA requires school districts to work with child welfare agencies to provide and fund transportation so that youth in foster care can remain in their current school when it is in their best interest. Six school district and child welfare agency officials we interviewed indicated that funding was a concern and some noted that transporting youth to their current school can result in extensive costs. The Department of Education (Education) provided technical assistance in the form of written guidance, webinars, and in-person meetings to help states implement the ESSA educational stability provisions. Education officials said they also plan to monitor state implementation of the provisions. Most SEA officials reported in GAO's survey that they would like additional assistance and more opportunities to interact with other state officials. Education plans to convene a community of practice for several states in which participants will meet regularly for several months, and is exploring other technical assistance efforts. To share information about implementing the ESSA educational stability provisions, Education maintains an email address list of SEA foster care points of contact. GAO found that the list was inaccurate and not regularly updated. Education updated the list in late summer 2019 and plans to do so quarterly. Education also provides information online, but the information is scattered across different web pages. Twenty-two SEA officials reported on GAO's survey that a clearinghouse of information would be extremely helpful. Federal standards for internal control require agencies to externally communicate necessary information in a manner that enables them to achieve their objectives. Without a dedicated web page about implementing the provisions, states may not receive the assistance they need to improve educational stability for youth in foster care. GAO recommends that Education develop an online clearinghouse of resources. Education agreed with GAO's recommendation.", "document_type": "gao"}
{"report": "Corrosion is defined in section 2228 of Title 10, U.S. Code, as the deterioration of a material or its properties due to a reaction of that material with its chemical environment. Corrosion can take varied forms, such as rusting, pitting, galvanic reaction, calcium or other mineral build- up, degradation due to ultraviolet light exposure, and mold, mildew, or other organic decay. Corrosion can be either readily visible or microscopic. To provide leadership on corrosion matters, including the development of policy guidance and oversight, consistent with section 2228, DOD has established an organizational structure that includes the Corrosion Office and Corrosion Executives. The Director of the Corrosion Office is to provide oversight and coordination of corrosion control and prevention efforts for the department. The military departments have each assigned officials to serve as Corrosion Executives. The Corrosion Executives operate within the chain of command of their respective military departments, while also coordinating with the Corrosion Office. Prior to August 2018, the Corrosion Office reported directly to the Under Secretary of Defense for Acquisition, Technology, and Logistics. In 2018 the Corrosion Office was relocated within DOD, after section 901 of the National Defense Authorization Act for Fiscal Year 2017 (Pub. L. No. 114- 328, hereinafter referred to as the Act) required DOD to restructure parts of the Office of the Secretary of Defense. Among other things, the Act eliminated the Under Secretary of Defense for Acquisition, Technology, and Logistics, and it created: The Under Secretary of Defense for Research and Engineering, who, among other things, serves as the principal advisor to the Secretary of Defense on all research, engineering, and technology development activities and programs in DOD. The Under Secretary of Defense for Acquisition and Sustainment, who, among other things, serves as the principal advisor to the Secretary of Defense on acquisition and sustainment in DOD. In addition, the Under Secretary establishes policies on and supervises all elements of DOD relating to acquisition and sustainment. As part of this restructure, effective August 1, 2018, DOD relocated the Corrosion Office within the department’s restructured acquisition and sustainment organization, as shown in figure 1. The Corrosion Office is now located within the department’s Office of the Under Secretary of Defense for Acquisition and Sustainment. Within this office, the Deputy Assistant Secretary of Defense for Materiel Readiness oversees the Corrosion Office. The Deputy Assistant Secretary of Defense for Materiel Readiness is a principal advisor to the Assistant Secretary of Defense for Sustainment; provides integration and oversight of DOD’s maintenance program; and develops policies and procedures for materiel readiness and maintenance support of DOD’s major weapon systems and military equipment. The Deputy Assistant Secretary of Defense for Materiel Readiness stated that he is supportive of the Corrosion Office’s mission and views its move to the Materiel Readiness organization as fitting in with the other areas under his oversight. Officials representing the military departments’ Corrosion Executives also stated that they support DOD’s organizational movement of the Corrosion Office. They stated that they continue to find the Corrosion Office to be helpful in establishing corrosion prevention standards and in providing opportunities for networking and information sharing by means of triannual corrosion forums. In addition, they stated that they have found the Deputy Assistant Secretary of Defense for Materiel Readiness to be supportive of corrosion oversight and prevention in their meetings with him. Since August 1, 2018, the Corrosion Office has had an acting director. According to a Corrosion Office official, the Deputy Assistant Secretary of Defense for Materiel Readiness is involved in the ongoing hiring process for a permanent director. According to a Corrosion Office official, the time frame in which a permanent director is projected to be in place is Spring 2019. Section 2228 of Title 10, U.S. Code, contains provisions regarding the duties and responsibilities of the Director of the Corrosion Office. Specifically, these duties and responsibilities include the following: overseeing and coordinating efforts throughout DOD to prevent and mitigate corrosion of military equipment and infrastructure, and developing and recommending corrosion policy guidance to be issued by the Secretary of Defense; developing and implementing, on behalf of the Secretary of Defense, a long-term strategy to reduce corrosion and the effects of corrosion on military equipment and infrastructure; reviewing corrosion programs and funding levels proposed by the military departments during the annual internal DOD budget review process as those programs and funding proposals relate to programs and funding for the prevention and mitigation of corrosion, and submitting recommendations regarding those programs and proposed funding levels to the Secretary of Defense; providing oversight and coordination of efforts within DOD to prevent or mitigate corrosion during the design, acquisition, and maintenance of military equipment, as well as the design, construction, and maintenance of infrastructure; monitoring DOD acquisition practices to ensure that the use of corrosion prevention technologies and the application of corrosion prevention treatments are fully considered during research and development in the acquisition process; and ensuring that, to the extent determined appropriate for each acquisition program, such technologies and treatments are incorporated into that program, particularly during the engineering and design phases of the acquisition process. The Corrosion Office continues to perform the duties outlined in section 2228, as evidenced below. Specifically, the Corrosion Office is taking the following actions: Developing and recommending corrosion policy guidance. DOD previously developed and issued an instruction that establishes policy, assigns responsibilities, and provides guidance for corrosion prevention and mitigation. The Corrosion Office, via a working group in a working integrated product team, plans to update this DOD instruction. The working group intends for the updated DOD instruction to reflect the Corrosion Office’s movement within DOD’s restructured acquisition and sustainment organization; any statutory changes made to section 2228 since it was last issued; direction from the new acquisition and sustainment leadership; and any changes made to address the findings and recommendations in our 2018 report. Additionally, the Corrosion Office plans to create a new DOD manual on corrosion that, according to Corrosion Office officials, will contain operating procedural details on, among other items, conducting and recording the Corrosion Office’s review and evaluation processes. According to Corrosion Office officials, the Corrosion Office’s target time frame for updating this DOD instruction and creating this new manual is by the end of calendar year 2020. Also, since July 2018 the Corrosion Office has been reviewing other DOD policy guidance to identify relevant documents in which corrosion content should be added or updated. Corrosion Office officials stated that the new director will update existing corrosion prevention and mitigation policy guidance, directives, and instructions in coordination with the military departments’ Corrosion Executives, under the guidance of the Deputy Assistant Secretary of Defense for Materiel Readiness. Developing and implementing a long-term strategy to reduce corrosion and its effects. In 2015 DOD issued a long-term strategy for preventing and mitigating corrosion that calls for implementing DOD- wide standards and improving strategies and processes to prevent, detect, and treat corrosion. According to Corrosion Office officials, there was a planning meeting for the working integrated product teams’ leads and co-leads in mid-March 2019. At this meeting, the team leads and co-leads prepared a draft update to the long-term strategy, which had last been updated in 2015. These officials told us that examples of changes included in the draft update are revised goals, objectives, and metrics. In addition, these officials told us that the draft update was aligned to reflect the DOD sustainment and materiel readiness mission statements and objectives articulated by the Assistant Secretary of Defense for Sustainment and the Deputy Assistant Secretary of Defense for Materiel Readiness. According to Corrosion Office officials, this draft plan is being reviewed internally, and the Corrosion Office’s target time frame is to update it by the end of calendar year 2020. Reviewing corrosion programs and funding levels proposed by the military departments and submitting related recommendations to the Secretary of Defense. As it did prior to the restructure, the Corrosion Office continues to review the military departments’ proposed corrosion-related programs and funding levels during the annual internal DOD budget review process. In addition, it continues to annually submit a report to Congress on corrosion funding with the defense budget materials. As part of this process, the Corrosion Office collected information from the Corrosion Executives on the corrosion control and prevention programs within the respective military departments. The Corrosion Office in Autumn 2018 included the information provided by each Corrosion Executive as appendixes in its annual report on corrosion funding. The fiscal year 2020 report was submitted to Congress on February 15, 2019. Monitoring and ensuring that corrosion prevention and mitigation are incorporated into acquisition and maintenance programs. As we reported in November 2018, Corrosion Office officials told us that they continue to perform the Corrosion Office’s acquisition and maintenance-related duties. For instance, the Corrosion Office continues to review acquisition documentation, such as Systems Engineering Plans, and to maintain information on hundreds of technologies for preventing and mitigating corrosion. In November 2018 we recommended that the Corrosion Office develop a process to maintain documentation of its reviews of corrosion planning for major weapon system programs. Further, we stated that these records, at a minimum, should show what comments were made by the Corrosion Office in its reviews and evaluations, and should track the actions taken to resolve those comments. DOD concurred with this recommendation and stated that the Corrosion Office would develop and maintain such a process. More specifically, Corrosion Office officials stated that they plan to describe this process in a new DOD manual on corrosion. According to Corrosion Office officials, the DOD manual will also include information on considering corrosion during the weapon system program-planning evaluation process. In addition, the Corrosion Office plans to develop an internal data system that these officials told us will track its reviews and evaluations along with the weapon system programs’ responding actions. According to Corrosion Office officials, their target time frame is to create this new manual and internal data system by the end of calendar year 2020. Corrosion Office officials told us that they have not changed the way in which they carry out additional authorities identified in section 2228. For example, the Corrosion Office continues to develop and deliver corrosion training with the Defense Acquisition University. In addition, it continues to interact with industry, trade associations, other government corrosion prevention agencies, academic research and educational institutions, and a scientific organization engaged in corrosion prevention. According to the Deputy Assistant Secretary of Defense for Materiel Readiness, he is working to change some of the ways in which the Corrosion Office operates. Specifically, he is working to increase the following: corrosion advocacy throughout DOD; oversight of the Corrosion Office; the accountability of the military departments and the Corrosion Office to mitigate corrosion; and the transparency of corrosion and its alignment with materiel readiness. One of the efforts made by the Corrosion Office for achieving these objectives is by providing funding for corrosion technology demonstration projects proposed and implemented by the military departments. According to Corrosion Office officials, the Deputy Assistant Secretary of Defense for Materiel Readiness changed the process for awarding fiscal year 2019 funding by obtaining feedback from the military departments’ Corrosion Executives as to which project proposals should receive funds. Officials representing the military departments’ Corrosion Executives confirmed that they were able to provide such feedback. Corrosion Office officials told us that, as of April 2019, they had selected and funded demonstration projects for fiscal year 2019 in part based on the information provided by the military departments. In addition, the Deputy Assistant Secretary of Defense for Materiel Readiness stated that he wanted to have more of an emphasis on funding demonstration projects that would be beneficial to all of the military services. According to Corrosion Office officials, another effort they undertook at the direction of the Deputy Assistant is that of working to make the Corrosion Office more cost-efficient by streamlining the number of professional services and other support contracts it awards. For example, Corrosion Office officials stated that by consolidating five contracts for professional services and reporting on the cost of corrosion into a single contract by a target date of mid-July 2019, they estimate achieving savings of approximately $2 million. In another effort, the Deputy Assistant Secretary of Defense for Materiel Readiness provided written feedback to each of the military departments’ Corrosion Executives in March 2019 on their respective departments’ corrosion control and prevention programs. Specifically, the feedback concerned whether each military department’s calendar year 2018 corrosion report complied with statutory requirements; each department’s strengths and weaknesses related to its corrosion efforts; and recommendations each department had identified for itself to implement. In calendar years 2003 through 2018, we made 35 recommendations to the Corrosion Office in 11 corrosion-related products on topics such as strategic planning, performance management, and mandatory oversight reports. In responding to these products, DOD initially concurred with 16 of those recommendations, partially concurred with eight, and non- concurred with 11. As of March 2019 DOD’s Corrosion Office had taken action or had plans to take action on most of our recommendations. Specifically, out of 35 recommendations, DOD’s Corrosion Office had taken action on 18 recommendations, including sufficient action for us to close those recommendations as implemented; planned to take action to implement 12 additional recommendations. These planned actions include, among other actions, updating existing guidance and developing new policy or processes; and did not plan to take action on the remaining five recommendations. Corrosion Office officials stated that they did not plan to take action on these recommendations for a variety of reasons. For instance these officials stated that the Corrosion Office did not have the authority over the military departments to take the recommended actions. We continue to believe our recommendations are valid. Appendix I summarizes all 35 recommendations and DOD’s response to each recommendation at the time of our report and provides information, as of March 2019, on DOD’s actions or planned actions to address each recommendation. In some instances DOD had taken action or planned to take action on recommendations with which it had not concurred at the time of our report. We provided a draft of this report to DOD for review and comment. DOD concurred with the draft and had no technical comments. We are sending copies of this report to the appropriate congressional committees and to the Acting Secretary of Defense and the Under Secretary of Defense for Acquisition and Sustainment. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or our staff have any questions about this report, please contact me, Diana Maurer, at (202) 512-9627 or maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs are listed on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, Marilyn Wasleski (Assistant Director), Dawn Godfrey, Shvetal Khanna, Amie Lesser, Edward Malone, Nathan J. Napolitano, Carter Stevens, and Cheryl Weissman made key contributions to this report.", "summary": "Corrosion negatively affects DOD equipment and infrastructure and can lead to reduced asset availability, deterioration in performance, and increasing weapon system and infrastructure costs. According to a study contracted by DOD, the cost impact of corrosion to DOD in fiscal year 2016 was $20.6 billion. Senate Armed Services Committee Report 115-262 accompanying a bill for the John S. McCain National Defense Authorization Act for Fiscal Year 2019 included a provision for GAO to review aspects of the DOD Corrosion Office. This report examines (1) how the restructuring within the Office of the Secretary of Defense has affected DOD's Corrosion Office, including its performance of its statutory roles and responsibilities; and (2) what actions, if any, DOD has taken or has planned to implement recommendations GAO made from calendar years 2003 through 2018 related to corrosion management. GAO analyzed DOD documents, such as guidance and required reports provided to Congress, and interviewed DOD officials to address these objectives. GAO also assessed DOD's actions against its prior recommendations to determine the extent to which DOD had addressed the recommendations or has actions underway to address those recommendations. The Department of Defense (DOD) relocated the Office of Corrosion Policy and Oversight (Corrosion Office) within the restructured acquisition and sustainment organization in fiscal year 2018. Prior to the restructure, the Corrosion Office reported directly to the Under Secretary of Defense for Acquisition, Technology, and Logistics. As part of the restructure, DOD relocated the Corrosion Office within the Office of the Under Secretary of Defense for Acquisition and Sustainment, where it reports to the Deputy Assistant Secretary of Defense for Materiel Readiness. It continues to perform its statutory roles and responsibilities under the new oversight organization. For instance, it is continuing to develop and recommend corrosion policy guidance; develop and implement a long-term strategy to reduce corrosion; review corrosion programs and funding levels proposed by the military departments, and submit related recommendations to the Secretary of Defense; and monitor and ensure that corrosion prevention and mitigation are incorporated into acquisition and maintenance processes. DOD is also making or planning changes to the operation of the Corrosion Office, specifically planning to increase corrosion advocacy throughout DOD, oversight of the Corrosion Office, corrosion accountability of the military departments, and corrosion transparency and its alignment with materiel readiness. DOD's Corrosion Office has taken or planned actions to implement most recommendations GAO made in calendar years 2003 through 2018 related to corrosion management. Specifically, GAO made 35 recommendations to the Corrosion Office in 11 corrosion-related products on topics such as strategic planning, performance management, and mandatory oversight reports. In comments on these products, DOD concurred with 16 of those recommendations, partially concurred with eight, and non-concurred with 11. As of March 2019, DOD had taken action or planned to take action on most of GAO's prior recommendations (see figure). Specifically, DOD's Corrosion Office had taken action on 18 recommendations. Corrosion Office officials also described to GAO their plans to take action to implement 12 additional recommendations. These planned actions include, among other actions, updating existing guidance and developing new policy or processes. DOD stated that the Corrosion Office does not plan to take action on the remaining five recommendations. GAO continues to believe that its recommendations are valid.", "document_type": "gao"}
{"report": "This section provides information about abandoned hardrock mines, sites, and features; and federal and state agency roles in addressing abandoned hardrock mines. Federal and state agencies generally describe abandoned hardrock mines in terms of mine sites, the individual features that comprise a site, or both. However, these agencies do not all have a common definition for what constitutes an abandoned hardrock mine or mine site, as we found in 2008. The agencies generally agree on what constitutes an individual feature—for example, a feature can be a mine opening (such as a tunnel, pit, or vertical shaft), a structure, or a pile of discarded materials (known as mine tailings or waste rock) that is left behind after ore is crushed and the valuable minerals are extracted. They also generally agree that an abandoned mine site can be comprised of only one feature (e.g., an isolated mine shaft) or many features (e.g., an area with multiple entries, shafts, open pits, mill buildings, and tailings piles). There is no universally agreed-upon average number of features per site. Also, not all federal and state agencies count both sites and features—some agencies only count sites, some only count features, and some count both. The individual features that make up a mine site may pose hazards to physical safety and risks to human health and the environment. Physical safety hazards. Abandoned hardrock mine features that pose physical safety hazards generally present immediate danger of injury or death. Examples of physical safety hazards include unstable mine tunnels that can collapse without warning; unmarked open mine shafts and deep pits that pose a danger to individuals who may inadvertently drive off-road vehicles into them; and deadly concentrations of gases, such as carbon monoxide and methane, present inside some mines that can asphyxiate explorers. To address physical safety hazards, federal and state agencies typically focus on identifying and mitigating the risk from individual features. They may safeguard these features by, for example, filling, capping, or gating the abandoned mine openings with engineered structures. After a dangerous feature is identified, an agency may post a warning sign or erect a fence to temporarily limit access to the feature until the agency can permanently close it. According to a 2008 Interior Inspector General report, physical hazards require the least expertise to identify and evaluate and the least funding to fix or mitigate. Environmental hazards. Mine features can also contribute to degradation of the environment and present short- and long-term risks to human health. For this report, we refer to these collectively as environmental hazards. People may be exposed to these hazards when recreating or living near an abandoned mine. Examples of environmental hazards include a mine tunnel that drains acidic water laden with heavy metals into a waste rock or tailings piles located along the banks or in the middle of streams that release hazardous substances such as arsenic, lead, and mercury into the water; and tailings that have dispersed into a surrounding community’s soil, exposing residents to harmful substances. The extent of environmental hazards at abandoned mines can vary widely, from sites that contain one draining tunnel and a few waste rock piles to sites with extensive underground tunnel networks, many waste rock piles, and miles of dispersed tailings. Some contaminated hardrock mine sites are included on the National Priorities List, which includes some of the most seriously contaminated sites that EPA identifies for long-term cleanup. The work required to address environmental hazards varies depending on the extent, type, and concentration of contaminants. For example, agencies may take one or more of the following actions at a site: remove waste rock or tailings from streams; develop passive water treatment systems that allow water to flow out of mines into treatment ponds; manage the waste on-site or transport it off-site for disposal; or establish active water treatment systems for the most contaminated sites that require continuous long-term monitoring, among other actions. According to EPA documents, sites with environmental hazards can cost hundreds of millions of dollars and take many years to address. For example, as of July 2019, the actual costs at the 25 most expensive mine and mineral processing sites ranged from $50 million to $583 million per site, and EPA had been working on some of the sites for over 20 years. Furthermore, agencies monitor remedies after completion to help ensure that they are achieving the desired results. Figure 1 depicts examples of physical safety and environmental hazards found at abandoned hardrock mine sites and activities that could take place to address them. Land ownership at abandoned mine sites is often complicated. The General Mining Act authorizes miners to patent, or purchase, the land associated with their mining claims—thereby mined land often passed from federal to private ownership. Partly because of this, many abandoned mine sites are a patchwork of federal, private, and other lands, and the ownership boundaries are not always clear. Agencies refer to these sites as mixed ownership sites. The Forest Service, BLM, the Park Service, EPA, and OSMRE, as well as states with abandoned hardrock mines, administer programs that address abandoned hardrock mines. Specifically, these federal and state agencies collect information about abandoned hardrock mine sites and features, and the associated hazards, on land under their jurisdictions. These agencies also safeguard the physical safety hazards and clean up the environmental hazards present at these mines. Agencies inventory and address these mines based on their different authorizing statutes, regulations, and missions. The Forest Service is responsible for managing about 193 million acres of national forests and grasslands throughout the United States. The Forest Service’s Safety and Environmental Restoration program oversees the agency’s work on abandoned hardrock mines. The Forest Service distributed $15.9 million in appropriations to the Safety and Environmental Restoration program in fiscal year 2019. USDA also distributed about $6.9 million in fiscal year 2019 to the Forest Service to address environmental hazards at several abandoned hardrock mines. USDA seeks recovery of cleanup costs under the Comprehensive Environmental Response, Compensation, and Liability Act of 1980, as amended (CERCLA), from responsible parties, such as current and former owners and operators of a contaminated site, to help reimburse costs at such sites. The Forest Service develops and maintains its information about abandoned hardrock mines primarily at its regional, national forest, and district offices. In general, the Forest Service tracks physical safety hazards by feature and environmental hazards by mine site. As of November 2019, the Forest Service did not have a national inventory of abandoned hardrock mine features or sites and the physical safety hazards they may pose. However, information about environmental hazards at abandoned hardrock mine sites is contained in a database maintained by USDA that tracks progress on all hazardous waste cleanup projects funded by the department, including projects at abandoned hardrock mines. Forest Service regional and national forest staff inventory, assess, mitigate, and monitor the physical safety and environmental hazards at abandoned hardrock mine sites on Forest Service-managed land as part of their daily responsibilities. BLM manages 245 million acres of public lands in the United States, located primarily in the western states and Alaska. BLM’s Abandoned Mine Lands program is aimed at protecting public safety and reducing liabilities by eliminating or minimizing physical safety and environmental hazards posed by abandoned mines, among other objectives. BLM’s Hazardous Materials Management program also addresses environmental hazards at all types of contaminated sites, including abandoned hardrock mines. In fiscal year 2019, BLM received a total of $38.5 million in appropriations for these programs. In addition, Interior distributed $2.7 million to BLM in fiscal year 2019 from the Central Hazardous Materials Fund—an Interior account that supports response actions undertaken at contaminated sites pursuant to CERCLA—for work at abandoned hardrock mines. BLM maintains a national inventory of abandoned hardrock mines in its Abandoned Mines and Site Cleanup Module database to help track information about sites, features, and hazards. However, as of 2019, BLM officials said the agency is shifting from tracking information by site, which can be subject to interpretation, to primarily tracking and reporting abandoned mine features. In addition to its abandoned mine database, BLM submits a subset of information about its contaminated abandoned mines to Interior for inclusion on the department’s list of contaminated sites, the Environmental and Disposal Liabilities list. BLM state, district, and field office staff inventory, assess, and mitigate the physical safety and environmental hazards at abandoned hardrock mines on BLM- managed land while conducting their daily work. The Park Service manages more than 85 million acres in 419 park units across the country. The Park Service addresses abandoned hardrock mines on this land through an abandoned mine safety program and an environmental compliance and cleanup program. In fiscal year 2019, the Park Service received $5 million in appropriations to address physical safety hazards on abandoned mineral lands. Interior also distributed $890,000 from the Central Hazardous Materials Fund to the Park Service to address contaminated abandoned hardrock mine sites in fiscal year 2019. The Park Service recovers costs from responsible parties at abandoned mine sites through CERCLA. The Park Service maintains information about abandoned hardrock mine sites and features in its Abandoned Mineral Lands Database. In 2013, the Park Service completed a system-wide inventory and assessment project to identify abandoned mines on lands it manages. In addition, the Park Service submits information to Interior about contaminated abandoned mine sites for inclusion on the Environmental and Disposal Liabilities list. Park Service headquarters and regional offices may assist park units in addressing hazards and preserving cultural resources and wildlife habitat at abandoned hardrock mines on Park Service-managed land. EPA administers the Superfund program, which was established under CERCLA to address the threats that contaminated waste sites pose to human health and the environment. As part of the Superfund program, EPA oversees and conducts investigations and cleanup actions at a variety of hardrock mine and mineral processing sites on private and other nonfederal lands and mixed ownership sites. The Superfund program operates on the principle that polluters are to pay for the cleanups rather than passing on the costs to taxpayers. EPA may compel parties statutorily responsible for contamination at sites to clean them up or to reimburse EPA for its cleanup costs. Responsible parties at abandoned hardrock mines could include current or former owners or operators of a site; persons who arranged for disposal, treatment, or transportation of hazardous substances; or the transporters of hazardous substances. To address contaminated sites—including abandoned mines—that do not have viable responsible parties, EPA uses funding from appropriations to the Superfund program, which were approximately $1.1 billion in fiscal year 2019. EPA maintains information about abandoned hardrock mine and mineral processing sites on nonfederal lands, including tribal lands, and mixed ownership sites in its national database of contaminated sites, the Superfund Enterprise Management System. EPA counts these mines and processing facilities by site and not by individual mine feature. According to EPA officials, many of the mine sites included in the database may contain tens to hundreds of individual features. In addition, EPA does not count sites that pose solely a physical safety hazard since they fall outside of the Superfund program mission. In addition, EPA and authorized states address certain abandoned hardrock mines in accordance with the Clean Water Act. Specifically, EPA and state agencies regulate discharges of pollutants to waters of the United States at abandoned mine sites under the act, such as mine tunnels draining contaminated water that exceeds water quality standards. To comply with the act, an entity operating a cleanup project involving a draining mine tunnel or other concentrated discharge source must obtain a permit, under which the discharge must be treated or managed to meet and maintain applicable water quality standards. OSMRE’s Abandoned Mine Land program primarily focuses on reclaiming and restoring land and water resources degraded by past coal mining, but the program also supports reclamation at abandoned hardrock mines. In accordance with the Surface Mining Control and Reclamation Act of 1977, as amended, OSMRE can provide grants for the reclamation of certain abandoned hardrock mines under limited circumstances—in particular, after a state or Indian tribe certifies that it has cleaned up its abandoned coal mine sites and the Secretary of the Interior approves the certification. Absent such certification, OSMRE can award these grants at the request of a state or Indian tribe where necessary to protect the public health, safety, general welfare, and property from extreme danger of adverse effects from the abandoned hardrock mine, and the Secretary of the Interior grants the request. In fiscal year 2019, OSMRE distributed a total of $310.5 million in grants to states and tribes to address abandoned coal and non-coal mines. OSMRE does not maintain an inventory of abandoned hardrock mines since the Abandoned Mine Land program’s primary objective is to address abandoned coal mines. States that receive grants from OSMRE to address non-coal abandoned mines may maintain their own inventories of abandoned hardrock mines. According to OSMRE budget documents, western states in particular often use OSMRE grants to address physical safety hazards at high-priority abandoned hardrock mines for which there is no other source of federal funding. States identify and address physical safety and environmental hazards at abandoned hardrock mines on state, county, and private lands within their borders, often through state abandoned mine programs. States may also work with federal agencies to identify and address these hazards on federal land. Some state agencies manage or oversee cleanup activities under CERCLA at abandoned hardrock mines. State agencies may receive funds to support their work at abandoned hardrock mines from nonfederal and federal sources, including state-appropriated funds, responsible parties under CERCLA, and cooperative funding agreements or grants from federal agencies. States with abandoned hardrock mines generally maintain databases or inventories that identify the locations of these mines and any associated hazards. As of May 2019, the Forest Service, BLM, the Park Service, and EPA together identified in their databases at least 140,652 abandoned hardrock mine features—of which over 60 percent are known to pose or may pose physical safety or environmental hazards. Officials from 13 western states also identified from their state databases about 246,000 abandoned hardrock mine features on federal and nonfederal lands within their states, including about 126,000 features that pose physical safety or environmental hazards. Some state information overlaps with federal agency information, but the extent of overlap is unknown, according to state officials. Federal and state officials also estimated that there likely are hundreds of thousands of additional abandoned hardrock mine features that they have not yet captured in their databases. The Forest Service, BLM, the Park Service, and EPA identified in their databases at least 140,652 abandoned hardrock mine features, as of May 2019. Of this amount, BLM identified 103,029 features and the Park Service identified 20,675 features. As previously noted, the Forest Service and EPA track abandoned mines by site and not by features associated with the sites; the Forest Service identified 16,375 sites and EPA identified 573 sites. According to agency officials, many abandoned hardrock mine sites contain more than one feature. Since there is no agreed-upon average number of features per site, we counted the minimum of one feature per Forest Service and EPA site for the purpose of this analysis. As a result, the total number of features identified by federal agencies likely is underestimated. Of the 140,652 total features, about 89,000 features are known to pose or may pose a physical safety or environmental hazard, according to information in the federal agencies’ databases. Specifically, agencies confirmed 7,802 features pose a hazard, of which 6,439 pose a physical safety hazard and 1,363 pose an environmental hazard; and identified 81,541 features with an unconfirmed hazard (whereby agency staff had not assessed current conditions in person to confirm the hazard), of which 60,279 may pose a physical safety hazard and 21,262 may pose an environmental hazard. Table 1 shows information about abandoned hardrock mine features that pose or may pose physical safety and environmental hazards, by agency. However, agency officials said there could be approximately 393,000 more abandoned hardrock mine features on federal land that the agencies identified on historic maps but have not captured in their captured in a central database. In addition, BLM officials estimated there are about 380,000 abandoned hardrock mine features on the land BLM manages that are not captured in its abandoned mine database. Park Service officials did not estimate a number of additional abandoned mines that might be in Park Service units; they said they believe their database is relatively comprehensive. Given the Forest Service and BLM estimates of additional features not found in their databases, the total number of estimated and identified abandoned hardrock mine features on lands within Forest Service, BLM, Park Service, and EPA jurisdiction is at least 533,652. Figure 2 depicts federal agency information about the numbers of confirmed and unconfirmed physical safety and environmental hazards on the lands under these agencies’ jurisdictions, in relation to the total estimated abandoned hardrock mine features, as of May 2019. To develop more comprehensive information about the total number of abandoned hardrock mine features on the lands they manage, the Forest Service and BLM are taking steps to improve their databases, including capturing information about abandoned mines that are not currently in a database. Specifically, Forest Service officials told us that they are establishing a centralized geospatial database that will consolidate information about abandoned hardrock mine features with physical safety hazards that is currently maintained in regional and national forest offices. They said they expect the new database will be populated in fiscal year 2020 and that it will provide regional and headquarters managers with better information about the extent of features with physical safety hazards. In addition, BLM officials said that field staff have been identifying and adding new features each year to its database, prioritizing features located close to communities and recreational areas. BLM officials said that they plan to update the database and communicate this information to field staff in fiscal year 2020 to help ensure staff enter information about new features into the database consistently. Officials with the 13 western states that we reviewed identified about 246,000 abandoned hardrock mine features on the federal, state, and private lands within their state borders, as of May 2019. As with the federal agencies, officials with five of the 13 states provided information about total mine sites and not features; as a result, we counted the minimum of one feature for each reported mine site for the purpose of our analysis. Of the 246,000 total features in these states, state officials estimated that about 115,000 features pose a physical safety hazard and about 11,000 features pose environmental hazards. State officials said that many of the features identified in their databases were also likely to be found in the federal agencies’ databases, but the extent of overlap is unknown. Specifically, the state officials’ estimates include abandoned mine features on federal, state, and private land because states may work on abandoned hardrock mines on both federal and nonfederal lands. However, state officials are not always able to quantify the number of mine features on federal land versus private or state land. For example, some states’ inventories are based on information from maps and databases that did not always include details about land ownership boundaries, which are necessary to differentiate on what lands the features are located. In addition, in instances in which the states could identify the features that are on federal land, such as in Utah and Nevada, state officials did not know how many of those features were also captured in federal agency databases. Similar to the federal agencies, officials with the 13 states estimated that the actual number of abandoned hardrock mine features in their states is higher than the information contained in their databases. State officials noted that their inventories are incomplete, in part because they have not conducted comprehensive, on-the-ground work to identify all the abandoned mine features in their states. They primarily focus on addressing the hazards they have already identified. Nevertheless, state officials estimated that the number of abandoned hardrock mine features in the 13 states could total more than 620,000. For example, California officials we interviewed said field staff had identified more than 70,000 individual abandoned mine features in the state as of May 2019. However, based on information from topographic maps, they estimated that 274,000 total mine features exist statewide, with an undetermined number of physical safety and environmental hazards. The states’ estimates of abandoned hardrock mine features reflect the different ways states collect information about abandoned hardrock mines. For example, California and Nevada officials explained that they count each individual abandoned mine feature in their states, whereas Colorado and Utah officials said that they only collect information about potentially hazardous features. Colorado officials estimated that there are 23,000 potentially hazardous abandoned hardrock mine features in the state. However, if the state were to count all of the features in Colorado, including shallow prospecting pits that are unlikely to pose a physical safety hazard, the officials said the total estimate would be hundreds of thousands of mine features. In addition, some states, including Idaho and California, reported numbers of abandoned mine features that included non-hardrock mines, such as sand and gravel pits, because their abandoned mine programs address different types of abandoned mines. Federal agencies spent, on average, about $287 million annually identifying, cleaning up, and monitoring abandoned hardrock mines, for a total of about $2.9 billion, from fiscal years 2008 through 2017. The Forest Service, BLM, the Park Service, EPA, and OSMRE primarily worked in partnership with other federal and state agencies and some nongovernmental stakeholders when addressing these mines, according to federal officials. Officials from the 13 western states we reviewed estimated spending an additional total of about $117 million in nonfederal funds over the 10-year period, or an average of nearly $12 million annually, to address abandoned hardrock mines within their states. Federal agency officials said they estimated it would cost billions more to address abandoned hardrock mines in the future. Federal agencies spent, on average, about $287 million annually, or a total of about $2.9 billion, to identify, clean up, and monitor hazards at abandoned hardrock mines from fiscal years 2008 through 2017. (See fig. 3.) EPA spent 80 percent of the total federal expenditures—about $2.3 billion—to address environmental hazards. Of the $2.9 billion in total federal expenditures, approximately $1 billion was reimbursed by responsible parties. Appendix II contains additional information about Forest Service, BLM, Park Service, EPA, and OSMRE expenditures by state. The agencies used some expenditures to address physical safety hazards but used most to address environmental hazards at abandoned hardrock mines. Physical safety hazards. The Forest Service, BLM, and the Park Service spent a total of over $105 million from fiscal years 2008 through 2017 to address mine features that posed physical safety hazards. According to officials with these agencies, this included filling in holes and installing gates at tunnels and other mine openings to allow bats, tortoises, and other wildlife to continue accessing important habitat. (See fig. 4.) Officials also said that their expenditures include funds provided to state agencies and others through cooperative funding agreements for projects where the state or other entity managed the work at the sites. Environmental hazards. From fiscal years 2008 through 2017, the Forest Service, BLM, the Park Service, and EPA spent a total of about $2.5 billion to address environmental hazards at abandoned hardrock mines. According to agency officials, work at these sites included conducting initial site investigations, designing and implementing remedies to address contamination, operating water treatment facilities, and monitoring completed cleanup actions. The agencies either managed this work themselves or provided funding through cooperative agreements to state agencies or others to manage the work. EPA spent about $2.3 billion at 394 sites, with about 40 percent spent at five sites. Of EPA’s total expenditures, $983 million (43 percent) was reimbursed by responsible parties. In addition, the Forest Service, BLM, and the Park Service spent a total of about $232 million to address various environmental hazards on lands they manage, of which about $40 million was reimbursed by responsible parties. Further, OSMRE reported that 12 states and two Indian tribes spent approximately $190 million in OSMRE grants to address abandoned hardrock mines and other non-coal sites from fiscal years 2008 through 2017. OSMRE officials did not specify how much of the $190 million was spent to address physical safety hazards versus environmental hazards since the agency does not require states and tribes to report such information. Table 2 shows federal agency expenditures by agency and type of hazard. Forest Service, BLM, and Park Service officials we interviewed said they conducted most of their work to address physical safety and environmental hazards at abandoned hardrock mines in collaboration with state agencies, nonfederal stakeholders, and other federal agencies, including EPA. These officials noted that it is important to partner with state agencies and EPA because many of the abandoned mine sites are of mixed ownership and the federal land management agencies generally do not have authority to address mine features on nonfederal lands. Federal agency officials said it is also helpful to pursue partnerships at mixed ownership sites to leverage limited funding. For example, Forest Service and BLM officials told us that they have partnered with Trout Unlimited, a nongovernmental organization focused on conserving freshwater fisheries and their watersheds, on projects to address environmental hazards at mixed ownership abandoned hardrock mine sites in several western states. Examples of projects that federal agencies undertook with partners include: Flat Creek-Iron Mountain Mine and Mill, Montana. Since 2014, the Forest Service has coordinated with EPA and the state of Montana to address contamination from this abandoned mine and mill site on private and Forest Service-managed lands upstream from the town of Superior. Silver, lead, and other hardrock mining operations left mill tailings piles that contaminated soil, groundwater, and surface water in Flat Creek, which flows for 3.5 miles from the mine site through Forest Service and private lands into the town. The local government and individuals also used tailings as fill material in yards, roadways, and other locations, including the high school track. The Forest Service took the lead on the portion of the site on the land it manages, and EPA and the state took the lead on various nonfederal portions of the site. At the state’s request, in 2000, EPA started assessing and cleaning up 79 residential and community properties in Superior; it completed this effort in 2013. In 2017, the state removed mine tailings from the private lands along Flat Creek with EPA oversight. As of November 2019, the Forest Service has been working with Trout Unlimited and the state to remove the mine tailings from the banks of Flat Creek on Forest Service land. Trout Unlimited representatives and Forest Service officials said they are also planning to reconstruct the stream channel and floodplains and restore fisheries habitat in the summer of 2020 after the tailings are removed. Gold Butte National Monument, Nevada. In 2018, BLM and the Nevada Division of Minerals worked with other federal, state, and local agencies to address 40 features that posed physical safety hazards within the historic Gold Butte Mining District in southern Nevada. The abandoned mine features were within the BLM- managed Gold Butte National Monument, which was established in 2016. According to project documents, the anticipated increase in recreation as a result of the monument designation prompted BLM and the state to evaluate the area for potential physical safety hazards. The 40 abandoned mine features included horizontal mine tunnel openings and deep vertical openings. BLM and the Nevada Division of Wildlife conducted cultural and wildlife surveys, respectively, to help determine appropriate closure methods. The state then filled the hazardous openings with foam and rock or installed gates that provide access to bats and desert tortoises. The local county government also contributed to the installation of the bat gates. Officials from the 13 states in our review estimated spending about $117 million in total, or an average of nearly $12 million annually, of nonfederal funds from fiscal years 2008 through 2017 to address physical safety and environmental hazards at abandoned hardrock mines within their states. Spending in three of the 13 states—California, Colorado, and Idaho—represented over 86 percent of the total nonfederal expenditures. Of the approximately $117 million, states spent about $26 million addressing physical safety hazards and about $91 million addressing environmental hazards. (See table 3.) State officials said that the sources of nonfederal funds that the states spent to address abandoned hardrock mines included (1) state-generated funds and (2) funding from settlements with responsible parties. State-generated funds. Officials from eight of the 13 states reported that they expended revenue raised by the state government to work on abandoned hardrock mines. Revenue sources include mine license taxes and royalties on oil and gas, hardrock mines, and other mineral extraction, and other sources such as the state general fund. For example, officials from the California Department of Conservation said the agency spent funds generated by state fees on active gold and silver operations to address physical safety hazards at abandoned mines on public lands. In addition, Colorado officials said they spent funds from a state severance tax collected on oil and gas, coal, metallic minerals, and other mineral production to address physical safety and environmental hazards. Settlements with responsible parties. Officials from five of the 13 states reported that they spent funds received from settlements with responsible parties to either conduct cleanup actions or oversee the responsible parties’ work to address environmental hazards. For example, from fiscal years 2008 through 2017, the state of New Mexico spent over $3.8 million that it had collected from responsible parties at two abandoned hardrock mine sites, according to state documents. Nevada and Washington officials said that their agencies’ expenditures to address environmental hazards during the 10-year period were entirely funded by collections from responsible parties. State officials we interviewed said they spent these nonfederal funds to address abandoned hardrock mines located primarily on private, county, state, or other nonfederal lands, including at mixed ownership sites. Officials from two of the 13 states (Colorado and Nevada) said they also spent state-generated funding to address hazards on federal land. Officials from the Nevada Division of Minerals’ abandoned mine program said that they generally spend about 80 to 90 percent of the program’s nonfederal funding addressing physical safety hazards on federal land. These officials explained that fees from unpatented mining claims on federal land are the division’s main funding source and, therefore, the state spends most of this funding to address hazards on federal land. Officials with the 13 states also told us that, in addition to spending about $117 million in nonfederal funds over the 10 years, states also spent more than $440 million they received from federal agencies, primarily through grants and cooperative agreements, during this period. Officials with seven states reported that they receive significantly more federal funds than nonfederal funds to work on abandoned hardrock mines and that federal funding is critical to addressing hazards at these mines. The Forest Service, BLM, the Park Service, and EPA estimated that their future costs to inventory and address physical safety and environmental hazards at abandoned hardrock mines would be in the billions of dollars. Each agency has generated some information about estimated future costs using a variety of methods and covering a range of activities. Given the level of uncertainty associated with the estimates, they likely understate the amounts that will be needed to comprehensively inventory and address these hazards. The Forest Service and BLM estimated that it could cost over $650 million to finish inventorying abandoned hardrock mines on lands they manage. Specifically, Forest Service information indicated it could cost about $147 million to complete the agency’s inventory, which includes identifying potential environmental hazards at 15,247 sites as well as the locations and conditions at approximately 13,000 sites not currently captured in a database. In addition, BLM officials estimated that it would cost about $510 million to complete the agency’s inventory of abandoned hardrock mines. This estimate includes about $130 million to evaluate approximately 66,000 features identified as posing an unconfirmed physical safety or environmental hazard. It also includes another $380 million to confirm the locations and presence of hazards at the approximately 380,000 additional features that may be on BLM-managed land but are not in its database. The Park Service and EPA did not provide estimates for future inventory work. Park Service officials said they have not estimated costs for additional inventory work because they believe that their inventory is largely comprehensive. EPA officials explained that the agency does not manage lands so they do not work to identify the existence of contaminated abandoned mines. Rather, EPA relies on external sources, such as state agencies and local governments, to alert it of potentially contaminated sites on nonfederal lands that may need attention. BLM and the Park Service estimated it could cost nearly $5 billion to address the physical safety hazards at abandoned hardrock mines on the lands they manage, and the Forest Service has not estimated this amount. Specifically, BLM estimated it could cost about $4.7 billion to fill in, gate, or otherwise address the nearly 65,000 features it has identified with confirmed and unconfirmed physical safety hazards and the estimated 380,000 additional features that are not yet included in the agency’s database. Park Service officials said they estimated that it would cost about $86 million to address the physical safety hazards at the abandoned hardrock mines identified in the agency’s database. These officials said that they plan to revise this estimate once they have better information about the actual costs to close the features where they are currently working. The Forest Service and EPA did not have estimates for addressing physical safety hazards. The Forest Service has not comprehensively estimated these costs, although the individual forests identify priority projects for spending each year, according to agency officials. EPA has not separately estimated costs to address physical safety hazards since those costs are included in its estimates to address environmental hazards. The Forest Service, BLM, the Park Service, and EPA have partly estimated costs to address environmental hazards at abandoned hardrock mines. Agency officials said that they do not have comprehensive estimates, in part because they have not yet selected the cleanup remedy at numerous sites—information they need to develop detailed estimates—nor have they identified all of the contaminated sites that will need to be addressed. The officials explained that a remedy to address an abandoned mine site with one waste rock pile (e.g., removing the pile from a creek and constructing a repository for it) is different from a remedy needed to address a site with perpetually draining mine tunnels, which could include operating and maintaining water treatment systems over the long term. As a result, the costs of cleanup remedies can vary from hundreds of thousands to hundreds of millions of dollars per site. Estimates of future costs to address environmental hazards at abandoned hardrock mines and what the estimates included varied by agency: Forest Service. Forest Service and USDA officials said that they estimated in 2014 that it could cost about $6 billion to address environmental hazards at 6,600 abandoned hardrock mine sites on Forest Service-managed land. This estimate includes costs to assess the extent of contamination, search for responsible parties, design and implement an action to remove a small waste rock or tailings pile, and monitor and maintain each site for 30 years after the cleanup is complete. According to the estimate, costs to maintain the completed sites make up half of the $6 billion in estimated future costs. These officials also said they assumed that all 6,600 sites are relatively simple and not complex with more extensive contamination. In developing this estimate, the Forest Service did not assume that responsible parties would cover any of these costs. BLM. BLM estimated a portion of the costs associated with addressing environmental hazards at abandoned hardrock mines on BLM-managed land, since BLM officials said there are too many unknowns and unique circumstances at each feature to comprehensively estimate total costs. These officials said the agency has estimated costs for some sites with confirmed environmental hazards in accordance with Interior’s environmental liabilities reporting guidance. Specifically, as of June 2019, BLM estimated that future costs to address environmental hazards at 105 abandoned hardrock mine sites on BLM-managed land range from $61 million to about $265 million. Interior and BLM officials explained that these costs do not represent all future costs needed to clean up these sites. Instead, the range includes the future costs that the agency determines are reasonably estimable at the time for these sites. In some cases, these costs are limited to the cost of conducting a study if the agency has not selected a cleanup remedy. As a result, officials said they expect that BLM’s estimate of total future costs will increase once the agency selects the cleanup remedies and estimates their costs. Officials also said they have not estimated future costs for sites where the agency has not determined the type or extent of the contamination or where BLM is not likely to fund the cleanup, for example, because a responsible party may pay for it. Park Service. Similar to BLM, Park Service officials estimated the future costs associated with addressing environmental hazards at 50 contaminated abandoned hardrock mines, based on Interior’s guidance. As of June 2019, the Park Service estimated that these future costs range from $21 million to $35 million, exclusive of any reimbursements from responsible parties. The Park Service did not estimate the future costs to address 19 additional sites that the agency identified as posing environmental hazards because either work at these sites is in the early stages, the agency was unable to estimate costs, or the Park Service is not likely to fund the cleanup, according to Park Service and Interior officials. EPA. EPA officials told us that they do not have a comprehensive estimate of costs to clean up hardrock mines. Specifically, officials said EPA tracks planned obligations to be incurred for sites where the agency anticipates taking action within the next 3 years to help support its budget development process. As of fiscal year 2018, EPA identified about $519 million in planned obligations for 115 hardrock mine or mineral processing sites. EPA officials said the planned obligations do not necessarily reflect the total estimated costs remaining at a site because the agency typically requires its regions to report known planned obligations for 3 years, or longer, if available. According to EPA data, future costs to address hardrock mines likely will exceed these obligations. For example, EPA did not report planned obligations for 423 mine and mineral processing sites where the agency has not completed site assessment work or selected a cleanup remedy. According to EPA officials, they generally do not plan obligations for future cleanup work while conducting an assessment. However, they said that if an assessment reveals a need for a time-sensitive response at a site, the agency may fund it. EPA officials also told us that they expect responsible parties to pay a portion of the future costs associated with these sites, but that amount is unknown. Federal agency officials, state officials from three selected states (Colorado, Montana, and Nevada), and stakeholders cited availability of resources and legal liability concerns as factors that limit efforts to identify, clean up, and monitor hazards at abandoned hardrock mines. Federal and state officials said their backlog of work on abandoned mines is greater than current staff and budget levels. In addition, state agency officials and other stakeholders we interviewed, such as nongovernmental organizations and mining companies, have limited their participation in projects to address environmental hazards at abandoned mines because of concerns about their potential legal liability under CERCLA and the Clean Water Act. All of the officials we interviewed from the Forest Service, BLM, the Park Service, and EPA, as well as from Colorado, Montana, and Nevada, cited availability of resources as a factor that limits their efforts to identify and address the physical safety and environmental hazards at abandoned hardrock mines. Representatives from state associations and nongovernmental organizations we interviewed also cited this factor as limiting federal and state efforts. Federal and state officials said that their backlog of work on these mines far exceeds their current staff and budget levels. For example, BLM officials estimated that with the agency’s current abandoned mine budget and staff resources, it could take up to 500 years to confirm the presence of physical safety or environmental hazards at the approximately 66,000 features in its database and the estimated 380,000 features not yet captured in its database. Officials from Colorado and Montana and representatives from a state association noted that these two states regularly receive reclamation funding from OSMRE to address abandoned coal mines in their states. As a result of having access to such funds, five states, including Montana and Wyoming, as well as three tribes have certified that they have addressed all of their known priority abandoned coal mines. These officials also noted that there is not a similar or consistent source of funding for states to address hazards at abandoned hardrock mines. In Nevada, although state-collected mining fees contribute to addressing safety hazards at abandoned hardrock mines, state officials said they do not have a consistent source of funding to address environmental hazards. As a result, Nevada officials explained that they tend to work primarily on mines where there is a viable responsible party to fund the cleanup. However, one official said that most of the approximately 190 abandoned hardrock mine sites in the state that pose or may pose environmental hazards do not have a viable responsible party. Federal and state agency officials described several steps they have taken to work more efficiently within existing limited resources. For example, federal agency officials said they prioritize proposed projects to address abandoned mines that pose the highest safety and environmental risks. In addition, federal officials explained that they have established several formal mechanisms for national and local collaboration to facilitate leveraging resources. For instance, federal and state officials working in Colorado said they formed a working group in 2010 to jointly identify and prioritize watersheds that have been contaminated by abandoned hardrock mines. The agencies work collaboratively to evaluate the extent of contamination in each watershed, leading to a more holistic approach to addressing contamination, according to EPA and Colorado state officials. Regional Forest Service officials we interviewed who also work outside of Colorado said the group is a national model for collaboration and efficient use of resources. Forest Service, BLM, Park Service, EPA, and state officials also said that they work to leverage federal and state resources by searching for responsible parties to contribute funding to their efforts at abandoned hardrock mines. However, officials told us that identifying such parties is difficult and can be resource intensive given the length of time that has elapsed since the mines were abandoned and the lack of a clear chain of custody and land ownership boundaries at mine sites. All of the state officials and nearly all of the stakeholders from nongovernmental organizations, state associations, and industry we interviewed cited concerns over legal liability—that is, being held legally responsible for addressing environmental contamination—as a factor that limits efforts to address certain abandoned hardrock mine hazards on nonfederal land. Specifically, liability concerns can prevent third parties— entities who offer assistance in addressing environmental hazards that they did not create and are not legally required to clean up—from taking actions to help address such hazards that are on private land and on nonfederal portions of mixed ownership sites. These parties are often referred to as Good Samaritans and may include state agencies, nongovernmental organizations, local governments, private landowners, and mining companies, among others. Federal and state officials and stakeholders we interviewed said that Good Samaritans have avoided taking certain cleanup actions—in particular, addressing mine tunnels that perpetually drain highly contaminated water—at abandoned hardrock mines because they are concerned about potentially being held legally responsible under CERCLA and the Clean Water Act. Specifically, a Good Samaritan undertaking cleanup actions at an abandoned hardrock mine might become a responsible party under CERCLA and thereby would be responsible for the entire cost of cleaning up the site. As a result, representatives from an industry association and a nongovernmental organization told us that while they are interested in addressing contamination on private land in the West, they generally have not done so, in part because of concerns about becoming responsible under CERCLA for cleaning up all of the contamination present at the site. In addition, a Good Samaritan undertaking cleanup actions to address draining mine tunnels may be required to do so in accordance with a discharge permit under the Clean Water Act. Complying with such a permit requires that the cleanup meet and maintain water quality standards, which can be expensive and may require perpetual water treatment. State officials and stakeholders explained that meeting and maintaining such standards at certain mines is difficult because of naturally occurring heavy metals and continual drainage from the mines. They said they are interested in undertaking smaller-scale projects to address mine tunnel drainage that may significantly improve water quality and aquatic habitat but would not fully meet water quality standards. However, Colorado and Montana state officials and various stakeholders said they generally decide not to undertake such projects, even if they could make incremental improvements, because of the risk of being held responsible for meeting and maintaining water quality standards in perpetuity. To encourage nongovernmental organizations, other stakeholders, and states to participate in abandoned hardrock mine projects at mixed ownership sites and on other private land, EPA developed administrative tools aimed at limiting Good Samaritans’ CERCLA and Clean Water Act liability. In 2007, EPA developed guidance for issuing “comfort/status letters” to Good Samaritans willing to perform cleanup work under EPA oversight and for entering into settlement agreements—legally enforceable documents signed by EPA and a Good Samaritan that include a federal covenant not to sue under CERCLA in exchange for cleanup work. In 2012, EPA also issued guidance stating that, as a general matter, the agency would not require a Good Samaritan to obtain a Clean Water Act discharge permit if they successfully complete a cleanup action under a comfort/status letter or settlement agreement with EPA. Good Samaritans have participated in some projects at abandoned hardrock mines using EPA’s administrative tools. As of January 2020, EPA had issued four comfort letters and entered into three settlement agreements, generally to address hazards at sites that did not require a Clean Water Act permit. Some state officials and stakeholders we interviewed said they have not pursued using EPA’s administrative tools because, in part, these tools do not sufficiently alleviate liability under the Clean Water Act. For example, they explained that the tools and guidance provide reassurance that EPA may not sue the Good Samaritan but do not ensure that certain outside parties will not sue to require they meet water quality standards. State officials and stakeholders we spoke with said that they believe that resolving the concerns over CERCLA and Clean Water Act liability may require federal legislation. However, other stakeholders expressed concerns that legislative changes, such as amending CERCLA or the Clean Water Act, could inadvertently result in weakening the existing environmental protections in these and other laws or could limit the ability of outside parties to enforce their provisions. Since 1999, several bills have been introduced that would have responded to liability concerns but as of December 2019, none had been enacted. State officials and stakeholders have been involved in efforts to draft legislation that would address liability concerns, but the interested parties have disagreed about the specific provisions to include. While federal agency officials did not cite liability concerns as a factor that limits their agencies’ efforts to address abandoned hardrock mines on lands under their jurisdictions, Forest Service, BLM, and EPA officials concurred that legal liability concerns deter Good Samaritans from participating in projects with federal agencies at mixed ownership sites. Federal officials explained that, unlike Good Samaritans, the abandoned hardrock mines the federal agencies address are under their jurisdiction and the agencies are already responsible for meeting the requirements of CERCLA and other applicable laws. However, federal agency officials have observed the effects of Good Samaritan legal liability concerns on projects. For example, Forest Service officials in Colorado said that potential partners have expressed interest in addressing contamination on the private land portions of mixed ownership sites but declined once they learned they would be subject to liability under CERCLA. In the absence of legislative changes, EPA officials said they are looking for new ways to encourage Good Samaritan participation in abandoned hardrock mine projects. For example, they are working to update and refine the agency’s administrative tools and identify new solutions to better address Good Samaritans’ concerns. They are also looking to encourage Good Samaritan participation in more projects that would not require a Clean Water Act permit, such as moving mine tailings piles away from streams. We provided a draft of this report to the Department of Agriculture, the Department of the Interior, and EPA for their review and comment. The Forest Service Audit Liaison provided comments by email, stating that the Forest Service generally agreed with the report. USDA and EPA provided technical comments, which we incorporated as appropriate. Interior told us they had no comments. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the appropriate congressional committees, the Secretaries of Agriculture and the Interior, the Administrator of EPA, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or fennella@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. This report describes (1) what is known about the number of abandoned hardrock mines in the United States; (2) federal and state agency expenditures to address abandoned hardrock mines from fiscal years 2008 through 2017, and what is known about future costs to address these mines; and (3) factors that limit federal and state agencies’ and stakeholders’ efforts to address abandoned hardrock mines. To address these objectives, we reviewed our previous work on abandoned hardrock mines, including a March 2008 report in which we summarized information about the number of abandoned hardrock mines in the United States and the amount of federal spending on these mines from fiscal years 1998 through 2007. We also reviewed federal agency reports to identify the federal agencies that track numbers of abandoned hardrock mines, conduct work to address hazards at these mines, or fund projects to address these hazards. We identified the U.S. Department of Agriculture’s (USDA) Forest Service; the Department of the Interior’s Bureau of Land Management (BLM), National Park Service (Park Service), and Office of Surface Mining Reclamation and Enforcement (OSMRE); and the Environmental Protection Agency (EPA) to include in our review. We reviewed agency documents detailing these agencies’ cleanup efforts and abandoned hardrock mine programs. We also selected 13 western states to include in our review: Alaska, Arizona, California, Colorado, Idaho, Montana, Nevada, New Mexico, Oregon, South Dakota, Utah, Washington, and Wyoming. We selected these states because our March 2008 report and other federal and state agency reports indicated that most of the abandoned hardrock mines are in these states. We conducted two site visits to abandoned hardrock mines in Colorado in February 2019. We selected sites in Colorado because they provided opportunities to observe examples of physical safety and environmental hazards on federal and nonfederal lands. We visited sites with physical safety hazards that BLM and the state had addressed on BLM and county lands. We also visited a National Priorities List site where EPA and the state were addressing environmental hazards on private land. To describe what is known about the number of abandoned hardrock mines in the United States, we obtained and summarized information about abandoned hardrock mine features and sites—including the number of features and sites that pose confirmed and unconfirmed physical safety and environmental hazards—that the Forest Service, BLM, the Park Service, and EPA maintained in databases as of May 2019, the most current at the time of our review. Specifically: the Forest Service provided information about abandoned hardrock mine sites from USDA’s National Environmental Accomplishment Tracking system; BLM provided information about abandoned hardrock mine features from the Abandoned Mines and Site Cleanup Module; the Park Service provided information about abandoned hardrock mine sites and features from the Abandoned Mineral Lands Data Entry and Edit database and from Interior’s Environmental and Disposal Liabilities list; and EPA provided information about hardrock mining and mineral processing sites from its Superfund Enterprise Management System. In addition, we obtained information on the agencies’ estimates of the number of additional abandoned hardrock mine sites or features that are not captured in their databases, where applicable. We assessed the reliability of the agencies’ databases by testing the data for accuracy by cross-referencing with relevant data sets and checking for missing data and errors. We also reviewed agency documents about the databases and our previous related work regarding the use of these data. We also interviewed headquarters officials from each agency and discussed the data and any limitations. We determined that the information in the agencies’ databases about the number of abandoned hardrock mines was sufficiently reliable to summarize in our report. We calculated the agencies’ total number of abandoned hardrock mines in terms of the number of features. According to agency officials, many abandoned hardrock mine sites contain more than one feature, but there is no agreed-upon average number of features per site. Since the Forest Service and EPA reported information only by mine site, we counted the minimum of one feature per site in our calculations. As a result, the total number of features likely is underestimated. Further, we collected information about the number of abandoned hardrock mines in the 13 western states through semi-structured interviews with state officials. For each state, we interviewed officials with the relevant state agencies that address abandoned hardrock mines through, for example, a dedicated abandoned mine program or a broader program focused on addressing environmental hazards. In each interview, we asked the officials to provide information about the numbers of abandoned hardrock mine sites they identified in their state, features that posed a hazard to public health and safety, and features that caused environmental degradation as of the time of our review. We provided the states with a common definition of abandoned mine site and feature. However, officials with five states provided information only for abandoned mine sites and not features. For those states, we counted the minimum of one feature per site to calculate the states’ total number of abandoned hardrock mine features. As a result, the states’ total number of features likely is underestimated. We assessed the reliability of the states’ information by reviewing documents about the data systems, checking for missing data and errors, and discussing the data and their sources with state officials, including any limitations. We determined that the data were sufficiently reliable to describe what the state agencies know about abandoned hardrock mines within their jurisdictions. To describe federal agency expenditures to address abandoned hardrock mines from fiscal years 2008 through 2017, we summarized expenditure information from the Forest Service, BLM, the Park Service, EPA, and OSMRE for this time period, the most recent 10 years of information available at the time of our review. Specifically, we collected information about total expenditures to address abandoned hardrock mines, expenditures to address physical safety hazards, expenditures to address environmental hazards, and expenditures of collections from responsible parties under the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), as applicable. We assessed the reliability of the agencies’ information by testing the data for accuracy and completeness by checking for missing data and errors. We also reviewed our previous related work regarding the use of the information and interviewed agency officials involved with collecting or analyzing the information. We determined that the information obtained from the agencies was sufficiently reliable for our descriptive purposes. Additional details on agency-specific information we used follows: Forest Service. The Forest Service provided expenditure information for fiscal years 2008 through 2017 for its Abandoned Mine Land and Environmental Compliance and Protection programs from its Foundation Financial Information System. The Forest Service also provided information from this system about expenditures of reimbursements from responsible parties. USDA provided information about the Forest Service’s expenditures from the department’s Hazardous Materials Management Account for fiscal years 2008 through 2017 from the Financial Management Modernization Initiative system. BLM. BLM provided expenditure information from Interior’s Financial Business Management System for fiscal years 2009 through 2017. BLM’s budget office provided expenditure information for fiscal year 2008 since information prior to fiscal year 2009 is not included in Interior’s current financial system. BLM provided information about abandoned hardrock mine expenditures from relevant subactivity codes, including Abandoned Mine Lands, Hazardous Materials Management, American Recovery and Reinvestment Act-Abandoned Mine Land projects, and Central Hazardous Materials Fund, among others. Park Service. The Park Service provided expenditure information from Interior’s Financial Business Management System and the Park Service’s Project Management Information System and Administrative Financial Systems 3 and 4 for fiscal years 2008 through 2017 for its Abandoned Mine Lands program and the Contaminants Cleanup Branch. The Park Service also provided information from Interior’s system about expenditures of reimbursements from responsible parties. OSMRE. OSMRE provided expenditure information from Interior’s Financial Business Management System for fiscal years 2008 through 2017 from its non-coal account, which includes spending for projects to address abandoned hardrock mines, non-hardrock abandoned mines, and other eligible projects. To further narrow the non-coal account expenditures to spending on abandoned hardrock mines, we reviewed information for projects that states completed during the 10-year period and eliminated expenditures that were clearly identified for non-hardrock-related projects. We also compared the expenditure information from OSMRE with expenditure information we obtained during our semi-structured interviews with officials from six state agencies that reported spending OSMRE grants specifically on hardrock abandoned mines—Alaska, Colorado, New Mexico, Montana, Utah, and Wyoming. We determined that Alaska’s and Colorado’s reported expenditures were more specific to abandoned hardrock mines than the information OSMRE provided for those states. As a result, we used Alaska’s and Colorado’s information to report expenditures for those states and used OSMRE’s information to report expenditures for all other states. OSMRE officials agreed with this approach. EPA. EPA provided information about the Superfund program’s expenditures at mine and mineral processing sites from the Integrated Financial Management System for fiscal years 2008 through 2011 and the Compass Financial System for fiscal years 2012 through 2017. EPA provided expenditures from its (1) Superfund appropriation accounts, (2) special accounts through which EPA receives resources from settlements with responsible parties for EPA to conduct site- specific work, and (3) state cost-share accounts, through which states contribute 10 percent of costs for EPA’s Superfund-financed remedial actions. EPA also reported expenditures of funds provided by other federal agencies; we excluded these expenditures from our reporting of EPA’s spending to avoid potential double counting. Further, we obtained information through our semi-structured interviews with officials from the 13 selected states about their expenditures of nonfederal and federal funds at abandoned hardrock mines for state fiscal years 2008 through 2017. We obtained and summarized information on total expenditures to address abandoned hardrock mines, expenditures to address physical safety hazards, and expenditures to address environmental degradation. We also obtained information about the sources of the agencies’ funding, such as collections from responsible parties. The states provided expenditure information by state fiscal year and not federal fiscal year because their financial systems are organized by state fiscal year. We assessed the reliability of the states’ expenditure information by testing for missing data and errors, reviewing documents, and discussing the information and any limitations with state agency officials. Three states were unable to provide expenditure information specific to abandoned hardrock mines for the entire 10-year period. Therefore, we discussed and agreed with each of these states how they could provide information that most closely responded to our request—for example, by providing information for the years that were available—and we are reporting the state agencies’ total expenditures as estimates. We determined that the data were sufficiently reliable to describe an estimate of how much in nonfederal and federal funds the state agencies spent to address abandoned hardrock mines. We are reporting both federal and state agency expenditures in nominal dollars. We are doing so for several reasons, including that there was a relatively low rate of inflation from fiscal year 2008 through 2017 (about 1.5 percent per year, on average); not all states reported annual expenditures that could be adjusted for inflation; and federal and state agencies reported annual expenditures differently, with federal agencies reporting by federal fiscal year and state agencies reporting by state fiscal year. To describe what is known about future costs to address abandoned hardrock mines, we reviewed and summarized documentation of the federal agencies’ most recently available estimates of costs to inventory additional abandoned hardrock mine features and to address physical safety and environmental hazards that have not been addressed. We discussed these estimates, and the assumptions used to create the estimates, with relevant agency officials. We describe the estimates and their underlying assumptions in the report. To identify factors that limit federal and state agencies’ and stakeholders’ efforts to address abandoned hardrock mines, we reviewed relevant agency documents and independent reports that describe limiting factors. We interviewed federal agency officials, state agency officials, and stakeholders. More specifically, we interviewed Forest Service, BLM, Park Service, EPA, OSMRE, and Interior headquarters officials and officials from these agencies’ regional or state-based offices who work in Colorado, Montana, and Nevada. We also interviewed officials with the relevant state agencies that address abandoned hardrock mines in these three states. We selected these states for geographic diversity, higher numbers of abandoned hardrock mines, and variation in the types of hazards posed by abandoned hardrock mines in these states. The sample of states is not generalizable, and the results of our work do not apply to all states where abandoned hardrock mines are located, but provide illustrative examples. In addition, we obtained perspectives from stakeholders that have participated in or expressed interest in participating in projects to address abandoned hardrock mines. We interviewed a sample of stakeholders, selected to provide perspectives from industry associations, nongovernmental organizations, state agency associations, and individuals with long-standing involvement in issues related to addressing abandoned hardrock mines. We identified and selected these stakeholders based on our previous work, including the stakeholders we interviewed for our March 2008 report; a review of relevant literature, including written testimony statements and a summary of proceedings from a 2018 conference on abandoned hardrock mines; interviews with federal and state agency officials; and recommendations from stakeholders. Our sample of stakeholders is not generalizable to all stakeholders involved with abandoned hardrock mines, but provides perspectives on factors that limit efforts to address abandoned hardrock mines. In total, we obtained responses from officials with 13 federal agency offices, including six headquarters offices and seven regional or state- based offices; officials with three states; and representatives of 11 stakeholder organizations, including three state associations that represent states with abandoned mine programs, two nonprofit conservation organizations, two mining industry associations, one mining company, and three individuals with long-standing involvement in abandoned hardrock mine policy. In our discussions, officials and representatives with each entity identified the factors that limit their or others’ efforts to address abandoned hardrock mines. We reviewed the responses and identified the factors that officials and stakeholders in each group (i.e., federal agencies, state agencies, and stakeholders) frequently mentioned. Two factors arose frequently both within and across the groups—we describe these factors in our report. We conducted this performance audit from June 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings based on our audit objectives. Table 4 includes expenditures to address abandoned hardrock mines for the Bureau of Land Management, Environmental Protection Agency, Forest Service, Office of Surface Mining Reclamation and Enforcement, and National Park Service. In addition to the contact named above, Elizabeth Erdmann (Assistant Director), Leslie Kaas Pollock (Analyst-in-Charge), Matthew Elmer, William Gerard, Anne Rhodes-Kline, Sheryl Stein, Sara Sullivan, and Rajneesh Verma made key contributions to this report.", "summary": "The General Mining Act of 1872 allowed individuals to obtain exclusive rights to valuable hardrock mineral deposits on land belonging to the United States. Miners explored, mined, and processed valuable minerals, but many did not reclaim the land after their operations ended. Unsecured mine tunnels, toxic waste piles, and other hazards—known as mine features—are found at abandoned hardrock mines across federal and nonfederal lands. The Forest Service, BLM, National Park Service, EPA, and OSMRE—as well as state agencies—administer programs that identify and address hazardous features at abandoned hardrock mines. Addressing features could include, for example, sealing mine tunnels or treating contaminated water. GAO was asked to provide information about abandoned hardrock mines. This report describes (1) what is known about the number of abandoned hardrock mines in the United States; (2) agency spending to address abandoned hardrock mines from fiscal years 2008 through 2017 and estimated future costs; and (3) factors that limit federal and state agencies' and stakeholders' efforts to address abandoned mines. GAO obtained and summarized information from agency databases about the number of abandoned mines, features, and hazards as of 2019; summarized agency spending data from fiscal years 2008 through 2017, the most currently available; and interviewed federal and state agency officials and stakeholders, selected to provide diverse perspectives. The U.S. Department of Agriculture's Forest Service, the Department of the Interior's Bureau of Land Management (BLM) and National Park Service, and the Environmental Protection Agency (EPA) identified at least 140,000 abandoned hardrock mine features, such as a tunnel, on lands under their jurisdictions. Of these, about 67,000 pose or may pose physical safety hazards—danger of injury or death—and about 22,500 pose or may pose environmental hazards—risks to human health or wildlife from long-term exposure to harmful substances. Agency officials also estimated there could be more than 390,000 abandoned hardrock mine features on federal land they have not captured in their databases, and agencies are developing more comprehensive information about these mines. Forest Service, BLM, National Park Service, EPA, and Interior's Office of Surface Mining Reclamation and Enforcement (OSMRE) spent, on average, about $287 million annually to address physical safety and environmental hazards at abandoned hardrock mines from fiscal years 2008 through 2017, for a total of about $2.9 billion (see figure). Of this total, the agencies spent about 88 percent ($2.5 billion) addressing environmental hazards, and about $1 billion was reimbursed by private parties, such as former mine owners. Federal officials also estimated that it would cost billions more to address these mines in the future. Nearly all of the federal and state agency officials and stakeholders GAO interviewed cited availability of resources and legal liability concerns as factors that limit efforts to address hazards at abandoned hardrock mines. Federal and state officials said their backlog of work is greater than what can be done with available staff and budgets, but they have taken steps to collaborate to help leverage resources. State officials and stakeholders, such as conservation groups, said they want to help address environmental hazards that they did not cause at abandoned hardrock mines. However, they generally do not do so because they are concerned about becoming legally responsible for the entire cost of addressing contamination at an abandoned mine if they attempt partial cleanup. EPA officials said they are considering new ways to encourage volunteer participation, in addition to existing administrative tools.", "document_type": "gao"}
{"report": "Treasury borrows money by issuing Treasury securities to finance the federal deficit (i.e., the difference between current spending and revenues), which includes paying interest on outstanding debt, and refinancing maturing debt. According to Treasury’s Strategic Plan, the primary objective of its debt management strategy is to finance the government’s borrowing needs at the lowest cost over time. Treasury reports that it achieves this objective by issuing marketable debt with a regular and predictable framework— meaning Treasury debt managers provide the market clear and transparent information about planned issuance, and set a standard calendar of auctions of each security type. managing its debt portfolio to mitigate “rollover risk”—the risk that it may have to refinance its debt at higher interest rates; fostering a healthy and liquid secondary market—the marketplace in which Treasury securities are traded; and promoting a broad and diverse investor base. To this end, Treasury issues securities in a wide range of maturities to appeal to a broad range of investors, and in sufficient amounts to promote liquid markets so investors can easily buy and sell Treasury securities. Treasury’s regular and predictable auction framework also provides investors greater certainty and better information to plan their investments. Treasury regularly issues nominal securities that range in maturity from 4 weeks to 30 years, inflation protected securities with 5-, 10-, and 30-year maturities, and floating rate notes (see table 1). A nominal security returns the face value of the security at maturity; an inflation-indexed security repays the principal adjusted for inflation. Floating rate notes pay interest quarterly at a rate that varies with changes in the indexed rate, such as the discount rate on the 13-week Treasury bill. The interest rates associated with the range of maturities of the nominal securities issued by Treasury creates a “yield curve” which represents the relationship between the maturity of an asset and its yield (the interest rate paid by Treasury or cost of borrowing). Each security has different cost and risk features for Treasury. Generally, Treasury must pay a higher interest rate for longer-dated securities to compensate buyers for waiting longer for principal to be repaid and accepting increased risk due to uncertainty about future market conditions. But longer-dated securities offer more certainty for budget planning because they lock in interest rates for the duration of the security. Similarly, as Treasury offers more of any given security, it may have to pay more interest to attract investors. However, if Treasury offers too little of a specific security given changing market demand, it could reduce the security’s liquidity in the secondary market, which would increase the interest cost Treasury must pay to compensate investors for less liquidity. The mix of securities changes regularly as Treasury issues new debt and funding needs change. Figure 1 shows the outstanding marketable debt held by the public by security type between 2005 and 2019. Treasury typically responds to long-term increases in borrowing needs by taking the following steps: Increasing the amount of securities offered at scheduled auctions. In 2018, Treasury increased auction sizes for securities at all maturities as borrowing needs increased. For example, Treasury increased the average size of auctions for floating rate notes by 15 percent (from about $16.2 billion in 2017 to $18.6 billion in 2018) and 3-year notes by 32 percent (from about $25.9 to $34.1 billion). Increasing the frequency of scheduled auctions. For example, in 2003 and 2008, Treasury adjusted the auction calendar to include additional reopenings of 10-year notes. More recently, Treasury added an October 5-year TIPS issue, with the first auction held on October 17, 2019. Introducing new types of securities to offer at its auctions. For example, in 2014, Treasury introduced a 2-year floating rate note. In October 2018, Treasury began auctioning a 2-month bill. According to Treasury officials, the addition of the 2-month bill allowed Treasury to issue more bills without increasing auction sizes for existing bills beyond maximum sizes recommended by market participants. In taking these steps, Treasury announces expected auction sizes each quarter and publicly discusses the changes well in advance. Treasury securities are held by a wide range of investors for a variety of different reasons, including cash and liquidity management, collateral, hedging, speculation, arbitrage, and as long-term “buy and hold” investments. As shown in figure 2, these investors can be grouped into three categories: The Federal Reserve System (Federal Reserve), the U.S. central bank, conducts monetary policy to promote maximum employment, stable prices, and moderate long-term interest rates. As part of this role, the Federal Reserve banks may buy and sell Treasury and other securities in the secondary market and roll over holdings of Treasury securities at auction as a noncompetitive bidder. The Federal Reserve is the largest individual holder of Treasury securities, and as of June 2019, held approximately $2.3 trillion in Treasury securities— or 14 percent of marketable debt held by the public. International investors include both private investors and foreign official institutions, including central banks and government-owned investment funds. As of June 2019, foreign holdings represented 41 percent of marketable debt held by the public; about $6.6 trillion. Most foreign holdings are from official sources (63 percent according to available data), such as foreign central banks. Domestic investors include banks, investment funds, pension funds, insurance companies, state and local governments, and individuals. As of June 2019, domestic investors held 45 percent of marketable debt held by the public; more than $7 trillion. Figure 2 shows the sectors that represent the domestic investor category. The combination of the liquidity, depth, and safety of the Treasury market is unmatched in global markets. These characteristics make Treasury securities a unique and critical asset for a broad range of investors. Market participants and subject matter experts we interviewed and surveyed identified liquidity, depth, and safety as the most important characteristics of Treasury securities. As shown in figure 3, 63 of 67 market participants we surveyed from across 10 domestic sectors reported that liquidity is one of the most important characteristics, followed by depth and safety. Moreover, 55 of the 67 survey respondents cited at least two of these characteristics as the most important. Liquidity, depth, and safety are interrelated characteristics of Treasury securities (see fig. 4). For example, liquidity and depth are both related to the size of the market and the willingness of market participants to buy and sell securities at low cost. In addition, liquidity is enhanced by safety, for example by minimizing the risk that trading could be disrupted by default. Treasury securities are considered one of the safest assets in the world because they are backed by the full faith and credit of the U.S. government. The importance of these characteristics was consistent across sectors, as liquidity, depth, and safety support a variety of business practices and needs. For example, Treasury securities serve as a close substitute to cash for financial institutions and corporate treasurers, are one of the cheapest and one of the most widely used forms of collateral for financial transactions, and are a benchmark for pricing many other financial products, such as corporate bonds, derivatives, and mortgages. In addition, international investors and experts we interviewed said that both foreign official sector and foreign private sector investors value the liquidity, depth, and safety of the Treasury market. For example, foreign central banks value the ability to buy and sell large quantities of securities to assist in managing their exchange rates and, in times of economic stress, provide foreign currency credit to their country’s businesses that borrow or trade in U.S. dollars. Officials from a foreign central bank we spoke with told us that Treasury securities are well suited for their investment needs because of the combination of the large and deep market—which accommodates high-volume transactions—and their safety and liquidity. The combination of liquidity, depth, and safety supports reliable demand for Treasury securities through changing market conditions. A diverse investor base helps to protect Treasury from large swings in interest costs due to shifts in demand from particular sectors. After liquidity, depth, and safety, the fourth most cited characteristic of Treasury securities (25 of 67 survey respondents) was the ability to purchase across the yield curve—that is, purchasing securities of various maturities to match investment needs. In addition to issuing securities at various maturities, Treasury’s strategic plan includes a goal to develop new products to increase the investor base. As previously noted, Treasury began issuing 2-month bills in October 2018. Market participants we surveyed said there is potential demand for (1) a new nominal security; (2) expansion of the floating rate note offerings; and (3) a zero-coupon bond. (For more information on the survey results, see appendix II.) “An increase in global risk (political or economic) will determine flight to quality and higher allocation to Treasuries.” Many investors are willing to accept a lower yield on Treasury securities in exchange for the liquidity, depth, and safety they provide. For example, only 14 of the 67 market participants we surveyed cited the yield of Treasury securities as one of the top three characteristics. Market participants we surveyed and interviewed emphasized that there is no true substitute for Treasury securities because other assets come with additional risks or do not have the liquidity and depth of the Treasury market. As a result, in times of economic uncertainty or stress, investors often move quickly into Treasury securities—known as a “flight to quality”—which increases demand and drives down yields. While a broad and diverse investor base helps promote stability for the Treasury market as a whole, demand for Treasury securities by different types of investors fluctuates over time, reflecting changes in the investment needs of particular sectors. Since the 2007-2009 financial crisis, changes in monetary policy operations, financial regulation, and foreign central bank needs have changed the composition of demand for Treasury securities across different sectors. Figure 5 shows the overall changes in holdings of Treasury securities by the three primary investor groups—domestic investors, international investors, and the Federal Reserve. As part of its response to the 2007-2009 financial crisis, the Federal Reserve substantially increased its purchases of longer-term Treasury securities. In turn, these purchases substantially increased the overall size and duration of the Federal Reserve’s holdings of Treasury securities (see fig. 6). From 2008 to 2014, its holdings of Treasury securities increased by 475 percent; from roughly $480 billion in 2008 to $2.7 trillion in 2014. The average duration of the holdings also increased from 2.7 years in 2007 to a high of 7.8 years in 2013. This substantial shift in the size and composition of the Federal Reserve’s holdings began in late 2008 when the Federal Reserve undertook the first of a series of large-scale asset purchase programs, often referred to as quantitative easing, to better reduce long-term interest rates and improve economic conditions. The Federal Reserve’s purchases of long-dated Treasury securities, and other assets, substantially increased the size of its balance sheet and meaningfully reduced interest rates on long-term Treasury securities.One study estimated that quantitative easing reduced interest rates on 10-year Treasury securities as much as 160 basis points (or 1.6 percentage points) (see sidebar). Federal Funds Rate A market determined interest rate that banks charge each other to borrow reserves overnight. The Federal Reserve needed a new approach to managing short-term interest rates while maintaining a large balance sheet. Therefore, in 2014, the Federal Reserve outlined a new framework it intended to adopt for implementing monetary policy when it began to increase interest rates for the first time since the financial crisis. The new operating framework entails setting two short-term interest rates to manage the federal funds rate (see sidebar). Changes in these rates are intended to influence other short-term interest rates (including rates on Treasury securities), the availability of credit, and the economy as a whole to assist the Federal Reserve in achieving its monetary policy objectives. In response to the improving economy the Federal Reserve, in October 2017, began a process to slowly shrink its balance sheet by limiting the reinvestment of proceeds from maturing securities, intending to return to a smaller balance sheet and lower holdings of Treasury securities. In January 2019, however, the Federal Reserve announced that it intended to continue to operate with its post-crisis framework and would therefore evaluate the appropriate time to stop shrinking its balance sheet. In October 2019, the Federal Reserve announced that it would expand its balance sheet, through purchases of Treasury bills, to satisfy increases in the market’s demand for cash and keep the federal funds rate in its target range. As a result of these announcements, the Federal Reserve will continue to hold a much larger portfolio of Treasury securities and will therefore continue to purchase much larger quantities of Treasury securities on an ongoing basis. If economic and financial conditions warrant, the Federal Reserve has stated that it may again buy specific maturities of Treasury securities in significant amounts to influence prevailing long-term interest rates to improve economic conditions and thereby aid in achieving its monetary policy objectives. The possibility of these purchases during future periods of economic stress could increase current demand for Treasury securities among market participants, even during normal times. This could keep interest rates on Treasury securities somewhat lower than they would be otherwise. The implementation of recent financial regulations and reforms in the wake of the 2007-2009 financial crisis resulted in changes in certain domestic sectors’ holdings of Treasury securities, including money market funds and banking institutions. Money Market Fund A money market fund is a type of mutual fund that is required by law to invest in low-risk securities. Money market funds act as intermediaries between investors seeking highly liquid, safe investments and corporate and government entities that issue short-term debt to fund operations. Money market funds typically invest in short-term, highly liquid securities, such as Treasury bills, and pay dividends that generally reflect short-term interest rates. Money market fund reforms that took effect in 2016 resulted in a significant increase in this sector’s holdings of Treasury securities (see sidebar). This sector experienced significant volatility during the 2007- 2009 financial crisis as large numbers of investors rapidly withdrew from these funds. To address this risk, the Securities and Exchange Commission (SEC) placed a number of restrictions on prime money market funds. Prime funds invest primarily in taxable short-term corporate and bank debt. The SEC regulations exempted government money market funds— which invest only in cash and U.S. government securities, including Treasury securities—from certain requirements because these assets are less risky and more liquid than other investments. Since these exemptions make government funds particularly attractive, many investors replaced prime money market fund investments with government money market fund investments (see fig. 7). Money market funds now represent one of the largest shares of Treasury securities holdings among domestic investors, holding approximately 8 percent (around $743 billion) of the domestic total as of June 2019 (excluding the Federal Reserve). The five money market funds we surveyed all reported that one of the top three ways they use Treasury securities is to comply with regulations. Following the financial crisis, U.S. and international regulators implemented reforms intended to promote a more resilient financial sector, including reforms aimed at the banking sector. Overall, these reforms increased demand from large banking institutions for Treasury securities. The reforms strengthened global capital and liquidity standards to make banking institutions more resilient and better able to lend in the event of an economic shock. For example, through the “Liquidity Coverage Ratio,” large banking institutions are now required to ensure they can cover short-term cash needs by holding a proportionate amount of high-quality liquid assets—cash reserves, Treasury securities, or Ginnie Mae securities. Since Treasury securities are classified as part of the group of most liquid assets, they are attractive for banks looking to meet these requirements. “Changes in bank liquidity regulations steered us to use more Treasuries in recent years.” Overall, bank holdings of Treasury securities increased from less than 1 percent of the sector’s total assets in 2008 (just over $100 billion) to more than 3 percent (over $800 billion) as of June 2019. The five banks we surveyed all reported that one of the top three ways they use Treasury securities is to comply with regulations. Foreign official demand for Treasury securities—which includes foreign governments and central banks as well as government-owned investment funds—has fluctuated based on economic conditions, especially the need for foreign central banks to manage their exchange rates. After the 2007- 2009 financial crisis, foreign governments increased holdings of Treasury securities from $1.5 trillion in 2007 to $4.1 trillion in 2015. In recent years, foreign governments’ accumulation of Treasury securities has slowed substantially. As of December 2018, they held about $4 trillion, or about 25 percent of all marketable Treasury securities. According to market participants and subject matter experts we interviewed, this slowdown does not imply a change in the nature of foreign demand for Treasury securities, but rather is a consequence of foreign central banks’ changing need for foreign reserves—many of which are held in the form of Treasury securities—to assist in managing their currencies. The U.S. dollar is the dominant currency used by foreign central banks in their official foreign exchange reserves, referred to as a reserve currency (see sidebar). As the reserve currency, foreign central banks buy and sell U.S. dollars to influence the value of their currencies to help manage their exchange rates, among other uses. To this end, foreign central banks hold Treasury securities in part because they can be converted to U.S. dollars quickly and in great quantity. Foreign central banks often act to limit the impact of exchange rate fluctuations and maintain the stability of their own currency. For example, a fall in U.S. interest rates tends to reduce the demand for dollars as private investors seek higher yielding assets abroad. In response, foreign central banks buy dollars—often investing those dollars in Treasury securities—and sell their own currency on foreign exchange markets which reduces the demand for—and hence the value of—their own currency relative to the dollar (see fig. 8). Conversely, when U.S. interest rates began increasing in 2015, dollar- denominated assets became more attractive to private investors seeking higher yields, which increased the value of the dollar relative to other currencies. In response to this and other events, experts we spoke with highlighted the role of China in particular— the largest foreign official holder of Treasury securities—in selling Treasury securities during that time period to help stabilize its exchange rate. Because U.S. interest rates are cyclical, foreign central bank interventions will also be cyclical, which implies their demand for Treasury securities will continue, to some extent, to vary over time so long as the U.S. dollar is a dominant reserve currency. Future changes in market conditions or policies—especially to the extent those changes significantly affect the combination of liquidity, depth, and safety of Treasury securities—could raise new and important risks to the Treasury market. Market participants we interviewed and surveyed across various sectors have raised concerns about risks that could affect demand for Treasury securities: risks from a future debt limit impasse, the sustainability of the federal debt, the dollar’s status as the primary reserve currency, and changes in the structure of the market which might affect liquidity, all of which could degrade the unique advantages of the Treasury market. Debt Limit The debt limit is a legal limit on the total amount of federal debt that can be outstanding at one time. (31 U.S.C. §§ 3101, 3101A.) It is not a control on debt but rather an after- the-fact measure that restricts the Department of the Treasury’s authority to borrow to finance the decisions already enacted by Congress and the President. Many market participants from all 10 sectors we surveyed and interviewed identified delays in raising (or suspending) the debt limit as potentially undermining the perceived safety of Treasury securities (see sidebar). During these times, Treasury departs from normal cash and debt management operations and takes extraordinary actions to avoid breaching the limit. Once all of the extraordinary actions are exhausted, Treasury may not issue debt without further action from Congress and could be forced to delay payments until sufficient funds become available. Treasury could eventually be forced to default on legal debt obligations. We previously reported that delays in raising the debt limit can lead to increased borrowing costs and significant disruptions in the Treasury market. For example, there were lengthy impasses over the debt limit in 2011 and 2013. During the 2013 impasse, investors reported taking the unprecedented action of systematically avoiding certain Treasury securities (i.e., those that would mature around the dates when Treasury projected it would exhaust the extraordinary actions available). Consequently, interest rates for these securities increased dramatically and liquidity declined in the secondary market where securities are traded among investors. “Treasury securities are held for liquidity management. It is critical that we have confidence in the timely payment of principal and interest on U.S. Treasury securities. Gamesmanship by political parties that impacts the confidence in timely payment on U.S. Treasury securities simply is not acceptable. We therefore are forced to invest in other forms of liquid securities, or to modify our participation in T-bills to avoid key dates around debt limits.” Overall, 48 of the 67 (72 percent) investors we surveyed reported that they anticipated they would take similar action—such as avoiding purchases of securities that would mature around the affected dates and requiring higher yields for purchasing those securities—to manage potential market disruptions caused by any future debt limit impasses. A default would have devastating effects on U.S. and global economies and the public. It is generally recognized that a default would prevent the government from honoring all of its obligations to pay for such things as program benefits; contractual services and supplies; employees’ salaries and wages and retirement benefits; and principal on maturing securities. Any disruption of these payments would have cascading effects on the economy. A default would call into question the full faith and credit of the U.S. government, and therefore immediately and significantly decrease demand for Treasury securities. Those investors who did purchase Treasury securities would demand a premium in the form of higher interest rates, to compensate for this increased risk. We have reported numerous times that the full faith and credit of the United States must be preserved. We have recommended that Congress consider alternative approaches to the current debt limit to avoid seriously disrupting the Treasury market and increasing borrowing costs. Experts have suggested replacing the debt limit with a fiscal rule imposed on spending and revenue decisions. As previously reported, Congress could consider this change as part of a broader plan to put the government on a more sustainable fiscal path. Some market participants we interviewed and surveyed expressed concern that continued deterioration of the federal government’s fiscal position could negatively affect the safety of Treasury securities. We have reported that the federal government is on an unsustainable fiscal path. Over the last 10 years, debt held by the public has more than doubled; increasing from about $7 trillion in 2009 to $16 trillion in 2019. We, the Office of Management and Budget, and the Congressional Budget Office estimate that federal debt will continue to grow, surpassing its historical high of 106 percent of gross domestic product within 13 to 20 years. Congress and the administration face serious economic, security, and social challenges that require difficult policy choices in the near term in setting national priorities and charting a path forward for economic growth. We have reported that a broad plan is also needed to put the federal government on a sustainable long-term fiscal path and ensure that the United States remains in a strong economic position to meet its security and social needs, as well as to preserve the flexibility to address unforeseen events. In August 2011, one of the major credit rating agencies, Standard & Poor’s, lowered its long-term sovereign credit rating on the U.S. from AAA to AA+, citing the United States’ rising public debt burden and greater policymaking uncertainty. The other major rating agencies have not lowered their rating of U.S. debt but continually monitor fiscal conditions and the political climate. If market participants perceive that the deteriorating fiscal outlook of the federal government could undermine the credit quality of Treasury securities, some investors could seek out alternative investments or demand a risk premium. This could further increase yields and therefore costs to Treasury. In general, larger deficits are likely to increase the yields on Treasury securities that are required by market participants, all else equal. Market participants and subject matter experts we interviewed emphasized the importance of the U.S. dollar’s status as the dominant global reserve currency in supporting demand for Treasury securities. So long as the U.S. dollar remains the dominant reserve currency worldwide, Treasury securities are likely to remain in high demand by foreign central banks and other investors. However, events that undermine the liquidity, safety, or depth of the Treasury market—such as debt limit impasses or concerns about fiscal sustainability—could reduce the share of U.S. dollar assets in foreign central bank reserves. Furthermore, reduced openness of the U.S. economy in global trade or financial markets would reduce the advantages of holding U.S. dollar reserves and could similarly precipitate a shift away from the U.S. dollar toward other currencies. Such a shift would likely reduce foreign official holdings of Treasury securities and could potentially reduce demand from other sectors that use U.S. dollars for global trade and other transactions. Consequently, Treasury’s cost to borrow would likely increase. Secondary market trading in Treasury securities is increasingly conducted on electronic platforms. The resulting changes and innovations have led to a number of benefits for market participants, but could also introduce new risks. For example, the Treasury Market Practices Group reported in 2015 that electronic trading had arguably improved overall liquidity through enhanced order flow and competition, reducing trading costs and allowing market participants to more effectively manage risk. Many market participants we surveyed agreed. For example, a market participant we surveyed reported that increased electronification of the Treasury market made it easier to price, trade, and settle holdings. However, market participants we surveyed and interviewed also told us that there is a potential risk of reduced liquidity and increased volatility in the Treasury secondary market. Market participants attributed these potential risks to a number of different factors related to the changing structure of the market: (1) increased use of automated trading; (2) increased role of principal trading firms; and (3) post-crisis financial reforms. Automated Trading A subset of electronic trading that relies on computer algorithms—advanced mathematical models—to make decisions about the timing, price, and quantity of the market order. High-frequency Trading A subset of automated or algorithmic trading in which the trading opportunities are identified and acted upon algorithmically and executed through technology at high speeds. Market participants we surveyed and interviewed said that automated trading—particularly high-frequency algorithmic trading (see sidebar)— may introduce operational risks that could interfere with market functioning. Automated trading relies on speeds that are beyond manual detection and intervention. Consequently, the Treasury Market Practices Group pointed out that internal controls may not be sufficient to counteract malfunctioning algorithms or algorithms reacting to inaccurate or unexpected data. For example, a malfunctioning algorithm could interfere with market functioning by creating sharp, short-lived spikes in prices as a result of other algorithms responding to an initial incorrect order. “Our Treasury trading desk is about 50 percent smaller than it was a decade ago, and we now have nearly as many traders devoted to algorithmic and electronic market- making as traditional market-making activity.” Market participants also noted that this type of trading may lead to more frequent episodes of volatility, making it more difficult to buy or sell Treasury securities at predictable or stable prices, particularly during periods of market stress. In one notable example, on October 15, 2014— in what has been referred to as a “flash rally”—the Treasury secondary market experienced record-high trading volumes and significant intraday volatility that could not be explained by external policy announcements or other factors. A 2015 interagency report examining the events of that day observed that as the speed of market activity increases, the Treasury market could continue to experience more frequent variations in market liquidity than in the past. Increased Role of Principal Trading Firms Advancements in technology, and the associated growth in high-speed electronic trading, have contributed to a shift in the composition of the types of firms actively trading and making markets in Treasury securities. Market-makers serve a crucial role in financial markets by providing liquidity to facilitate market efficiency and functioning (see sidebar). The 2015 interagency report examining the “flash rally” found that principal trading firms—proprietary trading firms that almost exclusively use automated trading strategies—conducted more than half of the trading activity on certain electronic platforms on the days reviewed. Market participants we spoke with expressed concern that some of the principal trading firms might not continue to provide liquidity in times of stress. According to the 2015 interagency report, principal trading firms tend to buy and sell frequently in small amounts, rarely holding Treasury securities beyond a day, and generally not trading on behalf of clients. Additionally, the extent of these firms’ presence in the Treasury market and the role they play is less well understood in part because they are not required to report their Treasury holdings and other financial information to the SEC that other financial institutions, such as broker-dealers and investment companies, are required to report. These firms’ holdings of Treasury securities are reflected in the Federal Reserve’s “household” category; the largest category of Treasury securities holdings among all domestic investors (excluding the Federal Reserve). As of June 2019, “households” held roughly $2 trillion in Treasury securities, up from $565 billion at the beginning of 2009—a 249 percent increase. According to Treasury, its 2018 market outreach revealed that data on the size of trades (market volume) are not transparent, which may hinder liquidity for certain securities. In September 2019, Treasury announced that the Financial Industry Regulatory Authority, Inc. (FINRA) expects to publicly release aggregate trading volume data for the Treasury secondary market in 2020. At the same time that the number of principal trading firms increased, market participants we surveyed and interviewed told us that broker- dealers are holding a smaller inventory of Treasury securities, which they attributed to certain post-crisis financial reforms that increased the cost of holding a large inventory of securities, including Treasury securities, for broker-dealers that are part of the larger banking institutions. As discussed above, these reforms were introduced to promote a more resilient financial sector. One set of reforms requires that large banking institutions hold a certain amount of high-quality liquid assets, including Treasury securities, to cover short-term cash needs. Another bank capital regulation—the supplementary leverage ratio—requires an institution to hold a supply of capital proportionate to total assets, which includes both low-risk assets (e.g., Treasury securities) and higher-risk assets. Because there are costs for holding capital, these institutions may prefer to reduce the size of their Treasury securities portfolio for the purpose of making markets and instead expand other lines of business that offer higher returns for the same amount of capital under the supplementary leverage ratio. Broker-dealers have traditionally been the predominant market makers for customers, including foreign central banks, mutual funds, hedge funds, pension funds, and insurance companies; buying and selling Treasury securities to meet customer trading needs, which could involve maintaining a large balance sheet to be able to buy and sell in large amounts and across days. According to market participants, broker-dealers’ smaller balance sheets have resulted in reduced liquidity for certain securities and could lead to additional risks during periods of secondary market stress or volatility. A well-functioning secondary market is important to Treasury in part because rates in the secondary market ultimately affect Treasury’s borrowing costs, as investors generally demand similar rates at auction to those in the secondary market. Treasury must regularly make important debt issuance decisions—such as what type of Treasury security to issue and in what quantities—to maintain broad-based demand and support its goal of borrowing at the lowest cost over time. Treasury officials described the steps the Office of Debt Management takes to make decisions about Treasury’s debt issuance strategy (see fig. 9). Treasury officials told us that they rely on three key inputs to help analyze financing options and inform these decisions: (1) market outreach, (2) auction and market metrics, and (3) analytical models. This is consistent with World Bank-IMF guidelines for public debt management. These guidelines highlight the importance of communicating regularly with investors, monitoring market activity, and having a strong analytical framework to inform decisions about the timing and amount of each type of security to issue. However, we found Treasury lacks policies governing some of these key inputs. Specifically, Treasury’s draft policy for bilateral market outreach does not include guidance on systematically selecting and documenting these interactions. Furthermore, Treasury does not have a policy governing important aspects of its analytical modeling, including requiring that analyses are documented and that Treasury staff follow and document appropriate quality assurance steps. Primary Dealers A group of banks and broker-dealers designated by the Federal Reserve Bank of New York (FRBNY) to serve as trading counterparties to the FRBNY in the implementation of monetary policy. They are also required to participate in all Treasury auctions. meets with half of them in person on a rotating basis to obtain estimates on borrowing, issuance, and the federal budget deficit (see sidebar). Treasury also uses the survey and meetings to obtain input on a variety of debt management discussion topics, posed in advance. For example, in April 2018 Treasury officials asked the primary dealers to comment on foreign private and official demand for Treasury securities over the short to intermediate term. Treasury Borrowing Advisory Committee An advisory committee composed of 15 senior officials from broker-dealers, asset managers, banks, and hedge funds. Treasury Borrowing Advisory Committee (TBAC). Treasury and TBAC meet quarterly as part of Treasury’s quarterly refunding process (see sidebar). At these meetings, Treasury officials and the committee members discuss economic forecasts, federal borrowing needs, debt management issues, and market dynamics. For example, in January 2019, Treasury asked TBAC to examine any products or debt management practices that might expand the investor base for Treasury securities, among other things. TBAC also provides Treasury with technical assistance intended to complement Treasury’s internal analyses. For example, in 2016, TBAC members began work to develop a debt issuance model to help guide the committee’s recommendations to Treasury about how to finance the government’s borrowing needs. In November 2017, based on the modeling framework as well as other factors, TBAC recommended that Treasury increase issuance of 2-, 3-, and 5-year notes to meet higher funding needs. Bilateral market outreach. To reach a broader range of investors, Treasury officials and staff also communicate directly—via email, telephone, conferences, and in-person meetings—with other market participants, such as foreign central banks, asset managers, investment banks, life insurance companies, pension funds, hedge funds, principal trading firms, and trading platforms. According to Treasury, staff use this bilateral outreach to discuss new products or distribution channels; assess investor needs; determine the drivers of market demand; and guide market perception about Treasury policy. Treasury officials said they select individuals for bilateral outreach using a combination of qualitative and quantitative information, such as data on specific investors’ participation in the Treasury market. According to Treasury, the bilateral market outreach helps mitigate an over-reliance on a subset of market participants that might not represent the full spectrum of views of Treasury market investors. However, we found that Treasury does not have an official policy to ensure that its bilateral market outreach is conducted or documented in a systematic manner. This is consistent with our reporting from 2010. In May 2010, Treasury officials told us that one of Treasury’s priorities was to improve investor outreach and collect information more systematically. Treasury acquired a customer relationship management tool, but Treasury officials said they only use it to store contact information. Treasury also drafted a policy document in November 2017 for Office of Debt Management staff that specifies the nature, restrictions on, and expectations for bilateral discussions with market contacts, but the policy is not final. While Treasury’s 2017 draft policy includes some guidance on documenting the bilateral outreach, Treasury officials told us they did not systematically produce formal documentation of these meetings. Treasury officials said that one reason Treasury did not have formal documentation of market outreach is because the staff who conduct the outreach also make the policy recommendations. Treasury officials also said direct outreach can sometimes cover market-sensitive information and that confidentiality is important to ensure candid exchange of information. However, the discreet nature of the outreach does not preclude Treasury staff from taking steps to document summary level information that would meet their needs and still maintain confidentiality. For example, Treasury officials and staff are experienced at managing market sensitive information for TBAC and primary dealers and communicating appropriate information to the public. While the level and nature of documentation can vary based on the materiality to decision-making, documentation is a necessary part of an effective internal control system. Documentation provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. In 2017, Treasury conducted market outreach—through the primary dealers, TBAC, and bilateral discussions with market participants—about demand for a potential Treasury ultra-long bond (50- or 100-year bonds). At that time, Treasury decided not to proceed with introducing ultra-long bonds in part because its analysis indicated that the bond would be too costly to issue relative to other Treasury securities, such as the 30-year bond. In August 2019, Treasury announced that it was conducting broad market outreach to update its understanding of market demand for an ultra-long bond. Federal standards for internal control direct agencies to design and implement control activities—policies, procedures, and mechanisms—to achieve program objectives and respond to risks. A policy governing the selection of individuals for bilateral outreach could help Treasury ensure it is systematically obtaining market views from investors across various sectors. A policy for documenting bilateral outreach would also ensure that the information that Treasury staff obtains is available to help inform future deliberations. Treasury officials said that they are considering updating and finalizing the 2017 draft outreach guidance based on our review. In addition to market outreach, Treasury calculates and monitors metrics that summarize important aspects of the debt portfolio, Treasury auctions, and the secondary market. Treasury officials stated they monitor metrics to understand changing market dynamics and highlighted some of the key metrics they use to inform decisions (see table 2). According to Treasury officials, the percent of debt maturing in a given period is among the better indicators of rollover risk (see sidebar). 2. market access risk—the operational risks inherent in coming back to the market to refinance the debt. As of September 2019, more than half of the $16.3 trillion marketable debt held by the public will mature in the next 3 years; about 27 percent will mature in the next 12 months (see fig. 10). A significant share of that maturing debt will need to be refinanced at prevailing interest rates. Treasury publishes a number of key auction metrics that provide insight into auction demand for Treasury securities as well as which sectors purchase securities at auction (see table 3). Treasury also analyzes more granular data on bidders that are not publicly available. According to Treasury officials, one indicator of demand for Treasury securities at auction is the bid-to-cover ratio. When the ratio is greater than one, buyers submitted bids for more securities than were offered. Figure 11 shows weighted average bid-to-cover ratios for the 4-week bill, 2-year note, and 10-year note from 2000 to 2019. Treasury regularly engages with the Federal Reserve, SEC, and the U.S. Commodity Futures Trading Commission regarding secondary market activity, including significant price movements and their causes, trends in market structure (such as changes in venues, participants, and trade protocols), liquidity conditions, and market functioning. Treasury officials reported that they routinely review data relevant to secondary market activity (see table 4). Figure 12 shows the average daily trading volumes between primary dealers for Treasury bills; this is a measure of liquidity of the market. In the past, Treasury has had limited data on transactions in the secondary market. As a result, it has had limited real-time information on secondary market trading activity, which, as discussed earlier, has changed significantly in recent years, and has experienced abrupt changes in liquidity conditions, such as the October 2014 “flash rally” event. In July 2017, Treasury and other agencies gained access to more granular data on secondary market transactions as reported to the Financial Industry Regulatory Authority, Inc. (FINRA) by its broker-dealer members through the Trade Reporting and Compliance Engine (TRACE). Currently, the TRACE data are available to Treasury, the SEC, the Federal Reserve, and other official entities. According to Treasury officials, analyzing the raw TRACE data can provide insight into pricing in the market, patterns of trading activity, and the timing of trades. Treasury officials stated no other data source offered such detailed and reasonably comprehensive information on secondary market transactions in Treasury securities. However, there are limitations to the TRACE data, and Treasury is continuing to work with FINRA and the SEC to improve the quality of the data. Treasury has made policy recommendations supportive of expanding the scope of TRACE data reporting. Treasury reported that in April 2019, FINRA made enhancements to the Treasury transaction data that are reported through TRACE. For example, FINRA now requires more detailed transaction reporting to better understand the firms that are trading with each other. These identifying data will be available only to Treasury and regulators, such as the SEC and the Federal Reserve. According to Treasury, this will provide them with a better understanding of principal trading firm activity in the Treasury secondary market. Treasury’s analytical models are another source of information for the department’s financing decisions, but Treasury lacks a policy governing important aspects of these activities. According to Treasury officials, they use a number of analytical approaches, from fully specified models to simple illustrative analyses. Some models are more complex, combining information on the debt portfolio along with assumptions about future financing needs, economic conditions, and interest rates. Other models perform relatively simple calculations based on market data. Treasury officials told us they use these analyses to illustrate trade-offs, test potential financing options, and understand long-term dynamics of the Treasury market. These kinds of analytical tools can play an important role in good debt management decisions. According to Treasury officials, the bulk of modeling is completed by the Office of Debt Management’s Quantitative Strategies Group. Treasury officials told us that the group, which was formed in 2011, has two full- time-equivalent employees. Treasury officials provided examples of some internal analysis and modeling they have used in the last few years. Portfolio simulation models of the Treasury debt portfolio. These simulations produce estimates of future costs and risks—among other potential outputs—arising from the debt portfolio and potential issuance strategies. For example, the simulation can produce a cost metric that represents Treasury’s interest cost for a particular issuance strategy. In addition, the simulation can produce a risk metric that represents the amount of debt maturing over various periods (e.g., in 1 year, 3 years, 5 years) given a specific issuance strategy. One use of such a model is to represent an issuance strategy as one cost-risk choice among a range of options associated with alternative issuance strategies (see fig. 13). As assumptions about the economy or financial markets change, or as issue sizes or maturities are adjusted, the cost and risk outcomes change. In August 2018, Treasury officials stated that model output, along with market outreach and analysis of historical auction data, supported Treasury’s decision to increase issuance at all maturities with a focus on the intermediate range of 2, 3, and 5years. Stress testing to examine how the debt portfolio might perform in challenging environments. For example, Treasury staff examined projections of future borrowing needs and interest rates and analyzed how a strategy might perform under different interest-rate assumptions. Calculations to estimate the yields on potential new securities. For example, in 2017, Treasury used several analytical approaches to create a range of potential prices for an ultra-long bond. One approach estimated the additional yield for an ultra-long bond, assuming it would be proportionate to the difference between 30-year and 10-year bond yields. Analytical models can improve decisions, but they also come with risks, including possible adverse consequences of decisions based on models that are incorrect or misused. These risks can be managed through appropriate documentation and quality assurance. In our previous work, we identified the elements of economic analyses that are relevant for federal agency decision-making, including transparency and documentation of the analyses for internal stakeholders. Analyses should be transparent by describing and justifying the analytical choices, assumptions, and data used. Transparency allows internal stakeholders to understand the implications of these analytical choices and their associated risks. Sufficient documentation ensures that analytical choices, data, assumptions, limitations, and uncertainties are clear and available to future model developers and users. Documentation also provides a means to retain organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel. Documentation of quantitative analyses and models should be clearly written, with a plain language summary and clearly labeled tables that describe the data used and results, and a conclusion that is consistent with these results. Documentation should also indicate that analyses comply with a robust quality assurance process. The Federal Reserve outlines a quality assurance process intended to verify that models are performing in line with their design objectives and business uses and also identifies potential limitations and assesses their possible impact. The degree of quality assurance required should be commensurate with the level of complexity, risk, and materiality to decision-making. Federal standards for internal control also direct agencies to design and implement control activities—such as documentation and quality assurance—through policies to achieve program objectives and respond to risks. Treasury provided information on its analytical models which included some key elements relevant to the documentation and transparency of Treasury’s analyses, including: Internal Treasury presentations that described the purpose, rationale, and certain analytical choices and results for a portfolio simulation model. Internal presentations detailing results and some analytical choices related to pricing estimates for an ultra-long bond. A code repository that can facilitate replication of some models and examples of code used to operate models. While Treasury’s documentation of its analytical models contained useful information for internal stakeholders, the documentation did not fully characterize the analytical choices, data, assumptions, limitations, and uncertainties associated with the analyses. For example: Treasury’s internal presentations on its portfolio simulation models did not fully justify analytical choices or describe the limitations of the models. Treasury’s internal presentations on pricing estimates for an ultra-long bond contain estimates from six different analytical approaches developed by Treasury but only detail a subset of the assumptions needed to arrive at the estimates. For example, there is no description of the precise structure of the approaches or the necessary sources of uncertainty that would lead to the range of estimates that Treasury presents for each approach. Treasury officials did not have documentation indicating that analytical models had been subject to quality assurance or that quality assurance activities had been commensurate with the level of complexity, risk, and materiality to decision-making. These issues arise in part because Treasury does not have a policy governing important aspects of the Office of Debt Management’s analytical modeling activities, including requiring that analyses are documented and that Treasury staff follow and document appropriate quality assurance steps. Treasury officials told us that they take steps to ensure that analytical work is appropriately reviewed. They stated that the review process is based on the nature of the work, and according to Treasury officials, quality assurance generally entails cross checks among staff and review by office leadership. One model was also shared with external contacts for feedback. Treasury officials emphasized that models are only one input of many into Treasury’s decision-making and explained that their practices are sufficient for the more straightforward analyses that typically inform decisions. However, the analyses that Treasury relies on—both relatively straightforward and more complex—to inform important decisions should be documented and subject to quality assurance to ensure that decision makers receive quality information based on appropriate analytical approaches. Treasury relies on a range of analytical methods, all of which require some degree of technical expertise to develop, implement, and evaluate, despite varying degrees of complexity. A policy requiring appropriate documentation and quality assurance would help Treasury ensure that analytical methods, data, assumptions, limitations, and uncertainties are transparent, appropriate, and available to future model developers and users. U.S. Treasury securities play a vital role in U.S. and global financial markets because of their deep and liquid market and because investors are confident that debt backed by the full faith and credit of the U.S. government will be honored. This combination of characteristics has helped support reliable demand for Treasury securities through ever changing market conditions, which, in turn, has helped minimize Treasury’s borrowing costs. Changing investment needs across different sectors and fluctuations in demand for Treasury securities are a normal part of economic cycles. Treasury and Congress need to be alert to risks that could compromise these key characteristics to preserve Treasury securities’ unique advantages. These risks include changing dynamics of the secondary market, including new participants using high-frequency trading strategies that could reduce liquidity, particularly in times of market stress. Treasury’s recent efforts to coordinate with the SEC and FINRA to obtain detailed information on the secondary Treasury market are an important step. In addition, as we have previously reported, Congress needs to consider taking action to address the unsustainable long-term fiscal path as well as alternative approaches to managing the debt limit that would ensure the continued safety of U.S. Treasury securities. Treasury has a critical role to play through its management of the federal debt portfolio to support its goal to borrow at the lowest cost over time. Treasury must promote strong demand for its securities from a diverse group of investors while making debt issuance decisions that appropriately balance risks and interest costs. Therefore, it is important that Treasury make these decisions based on the best information possible. Consistent with good debt management practices, Treasury uses a range of qualitative and quantitative inputs to inform its decision-making. It does not, however, have policies governing important aspects of two of these inputs: bilateral market outreach and analytical modeling. Until Treasury has designed and implemented policies around these key activities, it cannot be certain that needed information for debt issuance decisions is available, complete, and appropriately reviewed. Moreover, without appropriate documentation of important market outreach or analytical models, Treasury risks losing critical organizational information as staff leave the agency. Given the size and importance of the Treasury market, ensuring the quality of information available to decision-makers is essential to Treasury’s efforts to reduce risk and cost to taxpayers. We are making the following two recommendations to Treasury. The Secretary of the Treasury should finalize the Office of Debt Management’s policy for conducting bilateral market outreach and ensure it includes guidance on selecting market participants and documenting and sharing relevant information throughout the office while safeguarding the confidentiality of discussions. (Recommendation 1) The Secretary of the Treasury should establish a policy for the documentation and quality assurance of the Office of Debt Management’s analytical models. At a minimum, this policy should require (1) appropriate and sufficient documentation of analytical models, and (2) documented quality assurance of analytical models commensurate with the level of complexity, risk, and materiality to decision-making. (Recommendation 2) We provided a draft of this report to Treasury and the Federal Reserve for review and comment. In its comments, reproduced in appendix III, Treasury agreed with our recommendations and said it would work to implement them over the coming months. Treasury and the Federal Reserve also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Treasury, the Federal Reserve, and other interested parties. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. For questions about this report, please contact Tranchau (Kris) T. Nguyen at (202) 512-6806 or nguyentt@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. To address both of our objectives, we surveyed market participants regarding (1) factors that affect demand for Treasury securities, (2) experiences interacting with the Department of the Treasury (Treasury), and (3) evolution of the Treasury market. In March 2019, we administered an online survey to 109 institutions. We selected the 10 largest institutions by total assets (or other equivalent financial indicator) in nine sectors that hold Treasury securities and the 15 largest mutual funds and exchange-traded funds by total assets under management (see table 5). We also sent the survey to four market participants we interviewed in September that did not meet our top 10 criterion for its sector. The survey results are not generalizable to all investors in Treasury securities. To define the sectors for our sample, we reviewed data from the Federal Reserve’s Financial Accounts of the United States, (table L.100 to L. 133, first quarter 2018) to identify sectors holding Treasury securities. We excluded some sectors due to challenges in contacting certain entities, such as foreign monetary authorities, other foreign investors, and the household sector. According to the Federal Reserve, the household sector is a residual category and includes individuals holding Treasury securities, hedge funds, and other institutions not required to report to regulatory bodies. We excluded this sector due to the difficulty of identifying, ranking, and contacting individual household investors and other entities. We excluded Government Sponsored Enterprises because these entities are unlikely to provide additional insights into the Treasury market beyond our sample, which includes commercial banks. We excluded federal government retirement funds because the Thrift Savings Plan does not invest in marketable Treasury securities. To identify the organizations within each sector that would receive our web-based survey, we used rankings of the largest organizations in each sector based on total assets or an equivalent financial indicator, such as assets under management or direct premiums written, and selected the 10 largest in each sector. In the case of mutual funds and exchange traded funds, we used information from the Investment Company Institute on total assets under management in Treasury- and government-focused funds to identify the largest 15 in that sector. For the broker-dealer sector, we selected the 10 largest primary dealers. As part of our survey of market participants, we asked respondents to identify products or debt management practices that, if the Department of the Treasury (Treasury) introduced, would increase the respondent’s overall demand for Treasury securities. Results from our related survey questions are presented below. Survey Question: If Treasury were to make the following changes to its offerings, would your overall demand for Treasury securities increase? (see fig. 14). Survey Question: If Treasury were to change its debt management practices in the following ways, would your overall demand for Treasury securities increase? (see fig. 15). In addition to the contact named above, Thomas J. McCabe (Assistant Director), Margaret M. Adams (Analyst-in-Charge), Abigail Brown, Michael Hoffman, Loren Lipsey, Daniel Mahoney, Anna Beth Smith, Andrew J. Stephens, Farrah Stone, and Wade Tanner made significant contributions to this report. Robert Gebhart, Jerome Sandau, Peter Verchinski, and Alicia White also contributed to this report.", "summary": "The Congressional Budget Office projects that federal deficits will reach $1 trillion in 2020 and average $1.2 trillion per year through 2029, further adding to the more than $16 trillion in current debt held by the public. As a result, Treasury will need to issue a substantial amount of debt to finance government operations and refinance maturing debt. To support its goal to borrow at the lowest cost over time, Treasury must maintain strong demand from a diverse group of investors for Treasury securities. GAO prepared this report as part of continuing efforts to assist Congress in identifying and addressing debt management challenges. This report (1) identifies factors that affect demand for Treasury securities and (2) examines how Treasury monitors and analyzes information about the Treasury market to inform its debt issuance strategy. GAO analyzed data on investor holdings of Treasury securities; surveyed a non-generalizable sample of 109 large domestic institutional investors across 10 sectors (67 responded); reviewed Treasury analysis and market research; and interviewed market participants across sectors, experts on foreign investors, and Treasury officials. The large institutional investors GAO surveyed across multiple sectors identified liquidity, depth, and safety as the most important characteristics of Treasury securities. This combination supports reliable demand from different types of investors through changing market conditions. Many investors accept low yields because of these characteristics, keeping the Department of the Treasury's (Treasury) borrowing costs low. Market participants GAO interviewed and surveyed identified risks that could degrade these key characteristics and reduce future demand: Debt limit impasses could force Treasury to delay payments on maturing securities and interest, until sufficient funds are available, compromising the safety of Treasury securities. Unsustainable levels of federal debt could cause investors to demand a risk premium and seek out alternatives to Treasury securities. A reduced role for the U.S. dollar as the dominant reserve currency could diminish the advantages of holding Treasury securities for foreign investors, particularly foreign government investors who hold large amounts of dollar-denominated assets to assist in managing their exchange rates. Changes in the Treasury secondary market where securities are traded— including high-frequency trading and a reduced role for broker-dealers who buy and sell for customers—could increase volatility and reduce liquidity. Treasury regularly makes important issuance decisions—such as what types of securities to issue and in what quantities—to maintain broad-based demand and support its goal of borrowing at the lowest cost over time. Treasury officials said three key inputs support these decisions: market outreach; auction and market metrics (e.g., trading volumes); and analytical models . However, Treasury has not finalized its policy for systematically conducting bilateral market outreach to ensure a thorough understanding of market demand. Treasury also does not have a policy governing important aspects of its analytical modeling, including following and documenting quality assurance steps to ensure that analytical methods are appropriate and available to future model developers and users. Codifying policies governing key information sources would help ensure that Treasury's decisions are based on the best possible information. GAO recommends that Treasury (1) finalize its policy for conducting bilateral market outreach and (2) establish a policy for the documentation and quality assurance of analytical models. Treasury agreed with these recommendations.", "document_type": "gao"}
{"report": "The GDPs were constructed in the 1940s and 1950s and were used to enrich uranium for the U.S. military as well as the nation’s domestic nuclear power industry. The GDPs are located near Oak Ridge, Tennessee; Paducah, Kentucky; and Portsmouth, Ohio (see fig. 1). The GDPs were rendered obsolete due to the emergence of newer, more efficient technologies and the globalization of the uranium enrichment market. All three GDPs eventually ceased uranium enrichment activities, with Paducah being the last to stop enriching by 2013. The GDP sites are similar in many ways. For example, the primary structures at each GDP are large buildings for uranium enrichment processing using the same gaseous diffusion technology. In addition, at each of the sites, these large buildings all housed similar equipment, such as compressors, converters, and other equipment necessary for enriching uranium. EM measures these buildings in acres rather than square feet (see fig. 2). For example, the five uranium enrichment processing buildings that once stood at Oak Ridge measured a total of 114 acres. Each GDP site also consists of hundreds of other similar buildings and facilities used to fabricate, service, repair, and clean machinery as well as additional infrastructure, such as electrical switchyards and cooling towers. Rescission of the USEC Fund The Energy Policy Act of 1992 created the United States Enrichment Corporation (USEC) as a government corporation authorized to, among other things, acquire, market, and enrich uranium. The 1992 Act also established a revolving fund in the U.S. Treasury—the USEC Fund—for carrying out USEC’s purposes. In 1996, Congress enacted the USEC Privatization Act authorizing establishment of a private, for-profit corporation. The act provided that “expenses of privatization” were to be paid from certain accounts, including the USEC Fund. One week before privatization, Congress enacted the “McConnell Act,” which reserved approximately $373 million from certain accounts, including the USEC Fund, for the disposition of depleted uranium stored at government-owned enrichment plants operated by USEC. USEC was privatized on July 28, 1998. After privatization, the USEC Fund balance of $1.2 billion was retained on the books of the Treasury. Since then, the balance of the USEC Fund has grown to an estimated $1.695 billion as of fiscal year 2020. In 2015, we found that the entire balance of the USEC Fund is available for permanent rescission since the two statutorily authorized uses for the USEC Fund have been fulfilled: (1) environmental clean-up expenses pursuant to the “McConnell Act,” and (2) expenses of privatization. In the fiscal year 2017 federal budget, the Administration proposed using the balances of the USEC Fund to carry out purposes authorized to be funded by the Uranium Enrichment Decontamination and Decommissioning Fund. This is not one of the authorized purposes of the USEC Fund. We have previously found that DOE’s effort to utilize USEC Fund monies instead of general fund appropriations to support efforts other than the authorized purpose of the USEC Fund would diminish transparency in budgeting. In May 2019, we highlighted this issue in our annual report on fragmentation, overlap, and duplication. As of September 2019, Congress had not passed legislation to permanently rescind the balance of the USEC Fund, as we suggested in April 2015. Rescission may increase the transparency of federal agencies' budget presentations and help Congress have a clear understanding of how new funding requests relate to funding decisions for existing projects with continuing resource needs. nuclear power reactors and enrichment continued until 1985. The Oak Ridge GDP permanently closed in 1987. Portsmouth. The Portsmouth GDP, a 3,778-acre site located north of Portsmouth, Ohio, operated from 1954 until 2001. The GDP enriched uranium for both commercial reactor fuel and military applications. The Portsmouth GDP includes three uranium enrichment processing buildings, as well as over 300 other buildings and facilities. Management of both Portsmouth and Paducah has changed over time. Specifically, the Energy Policy Act, as amended, established the United States Enrichment Corporation (USEC) as a government corporation to, among other things, provide uranium enrichment services and take over operations of the GDPs in Portsmouth and Paducah beginning in 1993 (see sidebar). By 1998, USEC was privatized under the USEC Privatization Act and became a subsidiary of the newly created USEC, Inc. USEC produced low-enriched uranium for commercial power plants until 2001, when it ceased operations at the Portsmouth GDP. Later that year, the plant was placed on cold standby—a dormant condition that would allow operations to be resumed within 18 to 24 months if needed—and USEC, under contract with DOE, maintained the site. In 2011, USEC returned the Portsmouth GDP to DOE and EM’s contractor initiated deactivation activities of the uranium enrichment processing buildings. Paducah. The Paducah GDP, located on 3,556 acres of land west of Paducah, Kentucky, initially produced enriched uranium for nuclear weapons from 1952 until 1993. From 1993 through 2013, USEC leased and operated the facilities to produce enriched uranium for the commercial nuclear power sector. Similar to the Portsmouth GDP site, management of the Paducah site has changed over time. The Paducah GDP has four uranium enrichment processing buildings as well as more than 500 other buildings and facilities. After shutting down operations in 2013, USEC returned the Paducah GDP to DOE in 2014. Table 1 provides additional detail on the GDPs, including the date when cleanup began, the site size, and the size of the contractor workforce performing the cleanup activities. Cleanup of the GDPs is a complex process that involves multiple, coordinated activities: surveillance and maintenance, D&D, and site remediation. Throughout the cleanup process, EM must conduct surveillance and maintenance activities at the GDPs to ensure public and worker safety. This includes maintaining and repairing site infrastructure, such as buildings and facilities and electrical and water supplies. The D&D process involves the following activities: deactivation, decontamination, decommissioning, and demolition. According to the National Academies and DOE, these cleanup activities are encompassed within the detailed processes described below: Characterization and measurement of the contaminants present. During this process, cleanup workers determine the identities, forms, amounts, and locations of hazardous and radioactive substances. According to DOE, common contaminants found at the GDPs include radioisotopes stemming from the historical enrichment process (e.g., uranium and technetium-99); hazardous chemicals (e.g., trichloroethylene, polychlorinated biphenyls, and beryllium); asbestos, and other hazardous materials typical of industrial facilities. When the GDPs were in operation, workers used volatile organic compounds in large quantities to clean and degrease equipment, which resulted in the release of such compounds, specifically trichloroethylene, into the environment. These compounds contaminated soil, surface water, and groundwater when they were spilled, burned in pits, discharged in holding ponds, or placed in trenches for disposal. Removal of large uranium deposits. During this process cleanup workers remove large deposits of enriched uranium from the process equipment and piping. This step is necessary at some of the uranium processing buildings to reduce the possibility of nuclear criticality—an event in which an assemblage of enriched uranium produces a short- duration (millisecond) burst of heat and radiation. This step is also necessary to resolve security concerns regarding the protection and handling of special nuclear materials. Disassembly and decontamination of equipment and building structural components. Hundreds of large process equipment components, such as converters, compressors, and motors may need to be disassembled and decontaminated. In addition, the floors, walls, and other structural components of buildings that housed such equipment must be decontaminated. Demolition of buildings and facilities. Hundreds of structures— including analytical laboratories, electrical switch yards, and uranium enrichment processing buildings that are many acres in size—must be demolished at the GDP sites. Management or disposal of waste. The D&D process generates significant amounts of waste, including building materials and hazardous and radioactive waste removed from equipment and piping. Waste management activities include treatment, storage, transportation, and disposal of low-level radioactive waste, hazardous waste, mixed radioactive and hazardous waste, and sanitary waste. In addition to surveillance and maintenance activities and the D&D of buildings and facilities, remediation of contaminated soils, surface water, and groundwater is a part of GDP cleanup and is an important aspect of protecting human health and the environment. According to DOE, remediation of contaminated soils, surface water, and groundwater involves assessing the site, including subsurface soils and groundwater contaminated by past GDP operation, and addressing the sources of contamination. According to EM, the Paducah GDP has the most groundwater and soil contamination of the three GDPs, and the Portsmouth GDP has the least amount of contamination. At each GDP site, EM is required to consult and reach agreement with federal and state regulatory agencies in determining cleanup requirements, strategies, and priorities. Federal laws, including the Resource Conservation and Recovery Act of 1976 (RCRA), as amended; the Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (CERCLA), as amended; and cleanup agreements with state regulatory agencies in Kentucky, Ohio, and Tennessee govern cleanup at the three GDPs. RCRA establishes the framework for the management of hazardous and non-hazardous solid waste. CERCLA authorizes the federal government to respond directly to releases or threatened releases of hazardous substances, pollutants, or contaminants that may endanger public health or the environment. CERCLA requires that EPA maintain a National Priorities List that includes some of the most seriously contaminated sites that EPA identifies for long-term cleanup of hazardous substances, pollutants, or contaminants throughout the United States and its territories. Federal sites on this list are required to have an interagency agreement for expeditious completion of all remedial action at the facility. The interagency agreement, termed a Federal Facility Agreement, guides the cleanup process and sets enforceable milestones for priority cleanup activities as agreed to by all the parties to the agreement. The Oak Ridge and Paducah GDPs are both included on EPA’s National Priorities List under CERCLA. As a result, both sites have negotiated tri- party Federal Facility Agreements signed by DOE, EPA, and the relevant state regulator. Under the terms of these agreements, DOE must reach agreement with EPA and Tennessee and Kentucky state regulators to establish cleanup priorities and schedules for work with enforceable milestones subject to the agreements’ dispute resolution procedures. In addition, the agreements state that DOE must consult with these regulators in making budget requests to Congress for the GDPs. The Portsmouth GDP is not listed on EPA’s National Priorities List due to an agreement among regulators and, therefore, does not have a Federal Facility Agreement. Instead, the Ohio regulator is responsible for overseeing cleanup under a State of Ohio Consent Decree under RCRA and an Ohio Environmental Protection Agency Directors Final Findings and Orders for Decontamination and Decommissioning, which guide the cleanup process at Portsmouth. Under Presidential Executive Order 12580, DOE is the lead federal agency for implementation of CERCLA at Portsmouth. According to DOE’s Fiscal Year 2020 Congressional Budget Justification, the Ohio regulator used the CERCLA framework in developing the Orders. According to EPA officials we interviewed, EPA is not involved in regulating the CERCLA or RCRA components of the cleanup at the Portsmouth GDP. Decontamination and Decommissioning Fund: Uranium and Thorium Reimbursements Title X of the Energy Policy Act, as amended, authorizes the Decontamination and Decommissioning (D&D) Fund to reimburse licensees of uranium and thorium processing sites for their portion of D&D activities, reclamation efforts, and other cleanup costs attributable to the uranium and thorium materials they sold to the federal government. These sites became contaminated with radon and other decay products of uranium over time. According to a DOE report, as of 2017, there were ten sites that were continuing remedial activities and where DOE was continuing to provide reimbursements. According to the 2017 DOE report, DOE had at the time issued about $716 million in reimbursement payments since inception of the D&D Fund. The largest recipient is West Chicago Environmental Response Trust, with over $380 million in reimbursement payments through fiscal year 2017. As of fiscal year 2016, DOE estimates that the total remaining payouts to uranium and thorium producers will be approximately $164 million. In 1992, the Energy Policy Act established the D&D Fund to pay for the cleanup of the three GDPs. The act authorized $480 million in annual contributions to the D&D Fund (annually adjusted for inflation) for a period of 15 years—from fiscal years 1993 through 2007. According to the act, of the $480 million in annual contributions originally authorized, up to $150 million was to come from a special assessment collected from domestic utility companies that used the enriched uranium produced by the GDPs for nuclear power generation, and the remainder was authorized to be appropriated by the federal government for a period of 15 years. While domestic utility payments were discontinued in 2007, as prescribed by the 1992 Energy Policy Act, additional sums have continued to be appropriated for the D&D Fund. The act specified that any unused balances in the D&D Fund be invested in Treasury securities and any interest earned be made available to pay for activities covered under the D&D Fund. The act also authorizes reimbursements to uranium and thorium processing site licensees who provided raw materials to the GDPs for their cleanup costs (see sidebar). The Energy Policy Act, as amended, authorizes the D&D Fund to pay for the costs of all D&D and remediation activities at the GDPs. Specifically, according to EM officials, the D&D Fund is used to pay for the following cleanup activities: (1) D&D of inactive facilities either by cleaning up the facilities so they could be reused or by demolishing them; (2) remedial actions such as assessing and treating groundwater or soil contamination; (3) waste management, such as the transport and disposal of hazardous waste; (4) the surveillance and maintenance of the GDPs, such as general repairs to keep the buildings and facilities in a safe condition; (5) uranium and thorium licensee reimbursements; (6) training for contractor personnel who work on D&D activities; and (7) other activities, such as legal costs associated with the GDPs, funding to support site-specific advisory boards at Portsmouth and Paducah, and pension costs of workers involved in uranium enrichment or D&D. According to EM officials, there are additional cleanup-related activities taking place at the GDPs that are not covered by the D&D Fund, which include: (1) security—which provides services to protect nuclear materials, sensitive uranium enrichment technology, equipment, and facilities; (2) operation of the onsite waste disposal facility at Oak Ridge; and (3) conversion of depleted uranium hexafluoride—a byproduct of the enrichment process—into a more stable form, such as uranium oxide, that will require eventual disposal (see sidebar). Depleted uranium hexafluoride—referred to as depleted uranium “tails”—is a byproduct of the uranium enrichment process. The uranium enrichment process involves concentrating uranium-235, which is the isotope of uranium that undergoes fission to release enormous amounts of energy. Natural uranium contains 0.7 percent of the uranium-235 isotope, and tails contain less uranium-235 than natural uranium (i.e., less than 0.7 percent of uranium-235). Tails have historically been considered waste because the enrichment process required to extract the remaining useful quantities of uranium-235 is significant and can be costly. In addition, tails may be dangerous to human health and the environment and can form extremely corrosive and potentially lethal compounds when in contact with water. Therefore, the Department of Energy (DOE) has opted to convert its inventory of tails into a more stable chemical form, such as uranium oxide, that would allow for long-term storage and minimize environmental impacts and costs. The Portsmouth and Paducah gaseous diffusion plants (GDP) each store their inventories of tails in thousands of cylinders, and both GDPs have an onsite conversion facility. As of March 2018, DOE estimated that the combined tails stockpile at the Portsmouth and Paducah GDPs was estimated at 62,000 cylinders. DOE estimates the Portsmouth GDP will complete conversion of its tails inventory by 2034 and Paducah by 2047. Most of the tails inventory at the Oak Ridge GDP (approximately 7,200 cylinders) has been shipped to Portsmouth for conversion. According to DOE officials, the D&D Fund is not used to pay for conversion of the tails. To pay for these additional cleanup-related activities, EM officials reported that EM has used the Defense Environmental Cleanup and the Non-Defense Environmental Cleanup Appropriation Accounts. At Portsmouth, EM has also transferred natural uranium to site contractors in exchange for cleanup services—a practice EM refers to as “barter.” Additional details on this practice are discussed later in the report. As we reported in February 2019, effective program and project management are important to the success of efforts like the EM program. According to PMI, a program is defined as “related projects, subsidiary programs, and program activities managed in a coordinated way to obtain benefits not available from managing them individually.” According to a PMI conference paper, to reach the ultimate goal from a program—to obtain benefits not available from managing the related projects and program activities individually—a structured way of working has to be established. The Program Management Improvement Accountability Act requires the Office of Management and Budget (OMB) to adopt and oversee implementation of government-wide standards, policies, and guidelines for program and project management in executive branch agencies. In June 2018, OMB issued a memorandum on the implementation of this law that includes initial implementation guidance and calls for agencies to generally align their own program management standards to the management practices and principles found in the memorandum. The memorandum states that the act aims to improve program and project management practices within the federal government. The OMB memorandum also states that agencies may use program management leading practices developed by us, other agencies, and external voluntary consensus standard-setting bodies, such as PMI. EM has managed cleanup of the GDPs as three individual sites, rather than as an integrated program, and has not managed the cleanup of the GDPs consistent with relevant program management leading practices. For over a decade, DOE has reported to Congress in its triennial reports that its intent is to manage the GDPs in an integrated manner but has not developed an integrated program management plan, integrated master schedule, and a reliable, integrated, comprehensive life-cycle cost estimate. In addition, EM estimates that cleanup of the Oak Ridge GDP is nearing completion, that Portsmouth will be completed by 2041, and that Paducah will be completed between 2065 and 2070. The Energy Policy Act, as amended, establishes a single, shared D&D Fund to pay for the D&D costs of the GDP sites, such that EM must coordinate and make trade-offs in its use of limited resources among the three GDPs. In addition, since 2007, DOE has stated in its triennial reports to Congress that its intent is to manage the GDPs in an integrated manner. While neither EM nor DOE explicitly refers to the management of the GDP cleanup as a program, DOE’s stated intent is consistent with PMI’s definition of a program—”related projects, subsidiary programs, and program activities managed in a coordinated way to obtain benefits not available from managing them individually.” However, we compared EM’s management of the cleanup of the three GDPs to the three relevant PMI program management leading practices that we examined—those addressing planning, scheduling, and cost estimating—and found that EM is not managing the cleanup of the GDPs consistent with these practices: Planning—Having a program management plan. We found that EM does not have a GDP-wide program management plan. According to PMI, a program management plan formally expresses an organization’s concept, vision, mission, and expected benefits produced by the program; it also defines program-specific goals and objectives. In a 1996 report, the National Academies recommended that DOE develop a GDP-wide program management plan for cleanup of the three GDPs that would help coordinate decisions across the three GDPs. Representatives from the National Academies told us in December 2018 that they continue to believe this recommendation is valid. Furthermore, EPA and state regulators have criticized EM for not having a long-term vision for GDP cleanup. According to EM officials, EM developed site-level plans for each of the three GDPs over time as the GDPs ceased operating and became available for cleanup at different times—Oak Ridge ceased operating in 1987, Portsmouth in 2011, and Paducah in 2013. However, in reviewing what EM officials refer to as GDP program management plans, we found that the documents were created for different purposes and do not contain comparable information. For example, The Oak Ridge plan was created in 2017 as an update of a fiscal year 2014 through 2024 site-level plan for the three EM cleanup sites located at Oak Ridge reservation—the GDP, the Oak Ridge National Laboratory, and the Y-12 National Security Complex. This document presents a high-level picture of cleanup activities. EM officials told us that the Oak Ridge plan is intended to be high- level because cleanup of the Oak Ridge GDP is further along than cleanup of the Portsmouth and Paducah GDPs and because the Oak Ridge plan covers all three cleanup efforts at the Oak Ridge Reservation. EM officials also noted that other specific planning materials on the Oak Ridge GDP could be found in other documentation, but such documentation was not in the plan or in a usable form. The document EM provided as the Portsmouth plan contains a series of PowerPoint presentations for a March 2018 symposium on waste management. The PowerPoint slides were presented by both DOE officials and contractor representatives about different projects at the Paducah and Portsmouth sites. However, the slides contain contradictory information on when the Paducah GDP began deactivation—one slide indicates that deactivation began in 2014, but another shows deactivation will begin in 2035. EM officials at the Paducah GDP provided the 2015 site management plan for the Paducah GDP, which was signed by DOE and the contractor. This plan includes actions taken to date, site prioritization information (i.e., risk prioritization criteria), and key planning assumptions. The Paducah plan is the most comprehensive and detailed. The individual GDP plans differ in their level of detail; do not present comparable information, such as milestones that each GDP is to meet; and do not reference past, ongoing, or planned work at the other GDPs. As a result, they are not useful as plans for decision- making on the three GDPs in an integrated manner. Further, EM does not have a document that contains a concept, vision, mission, and expected benefits from GDP cleanup or that defines program-specific goals and objectives. By developing a GDP-wide program management plan, EM would have a comprehensive and consistent roadmap to achieve GDP cleanup and would be in a better position to leverage resources among the three GDPs. Scheduling—Having a reliable, integrated master schedule. We found that EM does not have an integrated master schedule for cleanup of the GDPs. According to PMI’s Program Management Standard, a program master schedule is the top-level program planning document that defines the individual component schedules and dependencies among program components (individual components and program-level activities) required to achieve the program goals. It should include those component milestones that represent an output to the program or share interdependency with other components. The program master schedule should also include activities that are unique to the program including, but not limited to, activities related to stakeholder engagement, program-level risk mitigation, and program-level reviews. The program master schedule determines the timing of individual components, enables the program manager to determine when benefits will be delivered by the program, and identifies external dependencies of the program. EM officials told us that the agency’s corporate database—the Integrated Planning, Accountability, and Budgeting System (IPABS)— contains the integrated master schedule for all of EM’s cleanup work, including the GDPs. The purpose of IPABS is to provide information on (1) changes to the life-cycle scope, cost, and schedule and (2) performance data such as earned value, performance metrics, and cleanup milestones. While IPABS provides a top-line planned completion date as well as other information, including cleanup milestones negotiated with regulators and performance metrics, it does not provide all of the information needed to build up to that date, including sequences clearly showing how related portions of work depend on one another. Without information such as sequences, it will not be possible for EM to identify the consequences of changes or possible managerial action to respond to them. An integrated master schedule makes it possible to help coordinate cleanup across the GDPs by establishing each GDP site’s schedule and identifying how related portions of work, such as funding profiles and workforce and equipment requirements that tie the sites together, depend on one another. For example, EM officials stated that certain demolition equipment, such as high-reach excavators, are in limited supply and may be shared among the three GDPs. By creating an integrated master schedule, EM would be in a better position to coordinate individual project activities across the three GDPs and thus help achieve program goals. Cost Estimating—Having a reliable, integrated, comprehensive life-cycle cost estimate. We found that EM does not have a reliable, integrated, comprehensive life-cycle cost estimate for cleanup of the GDPs consistent with PMI’s Program Management Standard, which calls for estimating a program’s full life-cycle costs. According to PMI, calculating full life-cycle costs and including transition and sustainment costs results in total cost of ownership. Total cost of ownership is considered to be relative to the expected benefit of one program against another to derive a funding decision. There are numerous estimating techniques to derive program cost estimates. Program cost estimates should also identify any critical assumptions upon which the estimates are made, as these assumptions may prove unfounded in the course of program delivery and require reconsideration of the program business case or revision of the program management plan. Finally, program cost estimation can support or guide cost estimation at the component level. Any prevailing program level cost estimation guidance intended for use at the component level should be documented and communicated to component managers. Instead, EM has, over time, developed separate cost estimates for each of the three GDPs that do not reference historic costs at the other GDPs. EM officials stated that IPABS contains the life-cycle cost estimate for EM’s cleanup work, including the GDPs. However, IPABS only provides a top-line cost estimate. It does not provide details on what information is included in developing that estimate, such as any critical assumptions upon which the estimates are made. Moreover, in February 2019 we reported that certain IPABS data, including expenditure data, were not reliable. By developing an integrated, comprehensive life-cycle cost estimate, EM management, Congress, and stakeholders would have information on total cleanup costs, including underlying costs, enabling more informed decision-making on funding and resource allocations from the shared D&D Fund across the three GDPs. EM officials acknowledged that cleanup work at the GDPs is managed independently by the three sites and not as an integrated program. However, the officials noted that the GDP cleanup work is managed as part of EM’s overall work to clean up radioactive and other hazardous waste that remains at 16 different sites across the nation, which they explained was all managed as one program. Further, according to EM officials, since the cleanup work is part of EM’s overall cleanup program it is able to make decisions at a high-level to support overall funding priorities, reduce the greatest risks, and effectively use taxpayer dollars. However, in February 2019, we reported on EM’s cleanup program and found that EM’s cleanup policy—which governs its cleanup work—does not follow any of the relevant program management leading practices related to a program’s management of scope, cost, schedule performance, and independent review of performance. The benefits of managing the work at the GDPs as a program have long been recognized. In 1996, the National Academies in its report to Congress recognized GDP cleanup as having the characteristics of a program noting that the repetitive and common design of the GDPs would allow for economies of scale in performing D&D. The report recommended that DOE develop a GDP-wide program management plan that integrates the D&D of the facilities and environmental remediation activities, as previously mentioned. According to the National Academies report, coordinating efforts across the GDPs at the complex level would help to ensure that D&D is integrated at the three sites and that resources, including disbursements from the shared D&D Fund, would be used effectively. Moreover, the report noted that delays would lead to substantial expenditures for surveillance and maintenance; deterioration of the facilities would exacerbate these costs; risks to individuals would increase; and the costs for safeguards and security for the sites would continue. In December 2018, representatives from the National Academies told us that they continue to believe that managing the GDPs as an integrated program would benefit cleanup efforts. By taking steps to manage the three GDPs as an integrated program and following relevant program management leading practices (developing a program management plan; an integrated master schedule; and a reliable, integrated, comprehensive life-cycle cost estimate), EM would have more reasonable assurance that it is taking every opportunity to increase the efficiency and effectiveness of its management activities. EM estimates that cleanup of the Oak Ridge GDP is nearing completion, that Portsmouth will be completed by 2041, and that Paducah will be completed between 2065 and 2070. Cleanup of the three GDPs— primarily remediation efforts—began in the late 1980s, and EM estimates that cleanup of the last GDP, Paducah, will be completed by 2070 at the latest. As figure 3 shows, based on DOE’s estimates, cleanup from start to completion will take 33 years at Oak Ridge, 52 years at Portsmouth, and 77 to 82 years at Paducah. Each GDP site still has varying levels of cleanup work remaining, mainly relating to when the site was closed. For example, the majority of cleanup work began at Portsmouth and Paducah after the contractor operating the GDPs—USEC—returned the site to DOE (in 2011 and 2014, respectively). The following provides a brief overview of the work remaining and estimated cleanup completion dates for each of the GDPs. See appendix II for a summary of the cleanup work completed as of June 2019. Oak Ridge. At Oak Ridge, the work remaining includes cleaning up surface and groundwater contamination, remediating soils on approximately 800 acres, and conducting D&D on more than 130 remaining facilities. DOE reported in its 2019 triennial report that it intends to complete cleanup of the Oak Ridge GDP by fiscal year 2022. However, according to EM documentation and officials, EPA officials, and state regulators, EM is unlikely to complete the cleanup by this date. In information provided to us in 2018 and in documentation supporting its cost estimate, EM cited fiscal year 2024 as the completion date for the Oak Ridge cleanup. In addition, in March 2019, EM officials said that all facilities at the Oak Ridge GDP will be demolished by fiscal year 2020 and remediation activities will be completed by fiscal year 2024, stating that the fiscal year 2022 date in the 2019 triennial report is based on outdated data. EPA and Tennessee regulators also told us they do not believe that EM’s current estimated completion date is realistic for the Oak Ridge GDP cleanup based on their understanding of the scope of remaining work, particularly cleanup of groundwater contamination. They said it is more realistic that cleanup of the Oak Ridge GDP will not be completed until the late 2020s and EPA believes cleanup completion could go out as far out as the 2040s, due to the lack of an agreed approach to address contaminated groundwater. The completion date for the Oak Ridge GDP has slipped in the past. Oak Ridge was previously scheduled to be completed in fiscal year 2009 and then in fiscal year 2012. Portsmouth. At Portsmouth, EM must complete D&D for three uranium enrichment processing buildings. Specifically, the first of three processing buildings is undergoing the final stages of deactivation, and the contractor is scheduled to begin demolition in fiscal year 2020. EM has started deactivation procedures at the second of the processing buildings, where EM is scheduled to start demolition in fiscal year 2024. At the third processing building, deactivation has yet to begin, and EM estimates the building will be ready for demolition in fiscal year 2031. In addition, EM must conduct D&D on hundreds of other support buildings and facilities. EM also plans to continue to remediate groundwater plumes at Portsmouth and to complete construction of an onsite waste disposal facility, which is scheduled to be operational by fiscal year 2020. According to the 2019 triennial report, cleanup of the Portsmouth GDP will be completed in 2041 based on scope and funding projections. However, in June 2019, EM officials told us that the Portsmouth cleanup will more likely be completed in 2043. Paducah. At Paducah, EM is focusing its near-term cleanup efforts on D&D of the C-400 building—a building that was used to clean machinery parts and test equipment and has been identified as the primary source of groundwater contamination at the site. After the demolition of this building, EM plans to dig up the slabs underneath the building to remove contaminants that EM believes are the source of the contamination, according to EM officials. According to EPA, EM is also focusing its near-term cleanup efforts on other activities, such as stabilization and deactivation of uranium enrichment and support buildings across the GDP, infrastructure optimization activities (including railroad upgrades for safe waste transport and downsizing the electrical power grid network), and new facility construction. According to an EM document and officials, deactivation of the processing buildings began in 2014, after USEC returned the site to DOE. In addition to the process buildings, EM will also need to conduct D&D on hundreds of other buildings and facilities. In addition, according to EM officials, EM has yet to decide on whether the waste produced from the GDP cleanup will be shipped offsite or if it will construct an onsite waste facility. EM estimates the cleanup of the Paducah GDP will be completed between fiscal years 2065 and 2070. The completion date for the Paducah GDP has slipped in the past. Paducah was previously scheduled to be completed in fiscal year 2040, and then in fiscal year 2047. EM reported it has spent at least $15.5 billion on GDP cleanup as of 2018, including approximately $5.1 billion on the Oak Ridge cleanup, approximately $6.7 billion on the Portsmouth cleanup, and approximately $3.7 billion on the Paducah cleanup. However, EM has limited detailed expenditure information on the cleanup activities carried out at the GDPs. Moreover, EM’s cost estimates for completing cleanup at the three GDPs are not reliable because they do not fully or substantially meet all of the characteristics of a high-quality, reliable cost estimate as described in our Cost Estimating Guide. Efforts to Supplement the Decontamination and Decommissioning Fund: Transfer of Natural Uranium for Cleanup As we reported in September 2011, from 2009 through 2011, the Department of Energy (DOE) used 1,473 metric tons of natural uranium to pay for $194 million in cleanup services performed by a contractor—the United States Enrichment Corporation (USEC)—at the Portsmouth gaseous diffusion plant (GDP). USEC then sold the natural uranium and retained the proceeds. The cleanup services provided by USEC included removing chemical and hazardous material from the GDP. DOE has in the past referred to this practice as “barter.” We found in our September 2011 report that DOE mischaracterized certain transactions with USEC as barters. From December 2009 through March 2011 DOE’s uranium transactions with USEC were sales authorized by the USEC Privatization Act, but they did not comply with federal fiscal law. The USEC Privatization Act requires that before a uranium sale, DOE must determine: the materials are surplus to national security needs; the department is receiving fair market value; and the sales will not adversely affect the domestic uranium mining, conversion, and enrichment industries. We found that DOE met these requirements. Nevertheless, by not depositing the value of the net proceeds from the sales of uranium into the Treasury, we found that DOE violated the miscellaneous receipts statute. This statute requires an official or agent of the government receiving money from any source on the government's behalf to deposit the money into the Treasury. By not depositing an amount equal to the value of the uranium into the Treasury, DOE inappropriately circumvented the power of the purse granted to Congress under the Constitution. DOE disagreed that its actions did not comply with federal fiscal law. We suggested that Congress consider authorizing DOE to, among other things, retain the proceeds of future uranium transactions. Pursuant to direction from Congress, in March 2018, DOE suspended this practice through fiscal year 2019. In its fiscal year 2020 budget request, DOE indicated that it would resume this practice to help pay for cleanup at Portsmouth. a practice EM refers to as “barter.” According to data provided by EM officials in 2018, from December 2009 through March 2018, EM transferred uranium valued at about $1.4 billion. According to an EM official, EM has used this transfer process exclusively at Portsmouth (see sidebar). Among other sources, the Non-Defense Environmental Cleanup Appropriation Account supplied over $1.2 billion in cleanup funding at Portsmouth for activities such as the operation of the depleted uranium hexafluoride conversion facility. Paducah. EM also reports that it has spent about $3.7 billion on the Paducah cleanup as of 2018. Similar to the Oak Ridge and Portsmouth GDPs, the D&D Fund paid for the majority of the cleanup costs at the Paducah GDP—approximately $2.7 billion. The remaining $1 billion in cleanup expenditures were funded by aforementioned appropriation accounts, including $138 million from the Defense Environmental Cleanup Appropriation Account on activities such as security and safeguards. EM tracks annual expenditures for cleanup activities at each GDP site in STARS, according to EM officials. However, EM does not track detailed expenditure information by GDP site on specific cleanup activities—such as remediation, waste management, or surveillance and maintenance—in that system. For example, EM officials provided data from STARS indicating that EM spent about $262 million on D&D at the Oak Ridge GDP in fiscal year 2007, but officials could not provide a breakdown of what specific cleanup activities the funds were used for, such as remediation or waste management. EM headquarters and site officials explained that they do not track detailed expenditure information of GDP cleanup activities in STARS because they are not required to do so. EM has previously provided a detailed breakdown of expenditures. For example, in our July 2004 report, in addition to expenditures on D&D, EM provided expenditures for the following categories: remedial actions, surveillance and maintenance, uranium and thorium reimbursements, waste management, and other activities. In addition, DOE’s 2007 triennial report has an appendix on GDP future costs that provided a similar breakout. However, EM officials could not provide current expenditure information similar to these prior reports. EM site officials told us that EM tracks more detailed expenditure data on certain categories by project, including demolition activities, and that these data were available in various project management systems maintained across the three sites. However, according to these officials, the various project management systems do not consistently track expenditures across the three GDP sites. EM headquarters officials stated that EM tracks more detailed expenditure data centrally in IPABS. However, in February 2019, we reported that the earned value management data in IPABS, which contain the expenditure data, were unreliable. Detailed expenditure data are important for developing reliable cost estimates, according to our Cost Estimating Guide. The Cost Estimating Guide states that it is always better to use actual costs rather than estimates as data sources, since actual costs represent the most accurate data available. EM officials told us that they used expenditure data at Oak Ridge, supplemented by other information, to help develop cost estimates at Portsmouth and Paducah. However, according to EM officials, EM does not track detailed expenditure data consistently across the three GDPs, therefore its ability to develop accurate and informed cost estimates for future work at the three GDP sites is limited. By tracking consistent and detailed expenditure information on cleanup activities across the GDPs, EM management would be better able to develop reliable cost estimates to plan for future work. EM’s cost estimates for cleanup of the three GDPs (about $28-$30 billion, according to DOE’s 2019 triennial report to Congress) are not reliable and likely underestimate the future cleanup costs. EM has developed individual cost estimates for each of the three GDPs over time and has presented those cost estimates in the triennial reports to Congress. EM prepared the latest cost estimate for Oak Ridge in 2013, for Portsmouth in 2014, and for Paducah in 2017. We assessed EM’s cost estimates for the three GDPs individually by comparing them with the best practices identified in our Cost Estimating Guide. The guide outlines best practices for developing a high-quality, reliable cost estimate and identifies four characteristics of such an estimate: comprehensive, well-documented, accurate, and credible (see fig. 5 for a depiction of the four characteristics and some of the best practices that underlie them). A cost estimate is considered reliable if the assessment for each of the four characteristics are substantially or fully met. If any of the characteristics are not met, minimally met, or partially met, then the cost estimate does not fully reflect the characteristics of a high-quality estimate and cannot be considered reliable. We found that the Portsmouth and Paducah cost estimates fully or substantially met some of the characteristics of a reliable cost estimate, but none of the three cost estimates fully or substantially met all of the characteristics, so EM’s cost estimates for completing cleanup of the three GDPs are not reliable. Specifically, EM’s cost estimate for Portsmouth fully met the comprehensive characteristic and substantially met the well-documented and accurate characteristics. EM’s cost estimate for Paducah fully met the accurate characteristic and substantially met the comprehensive characteristic. However, in all other instances, the cost estimates partially or minimally met the characteristics, with Oak Ridge obtaining the lowest scores. Figure 6 provides a summary of our assessment of the cost estimates for Oak Ridge, Portsmouth, and Paducah for each characteristic. Appendix III provides additional information on our assessment. We also found that the cost estimates likely underestimate the cleanup costs because of challenges in reaching consensus on cleanup decisions with regulators that we discuss later in this report. In commenting on our assessment of the GDPs’ cost estimates, EM officials stated that they disagreed with our findings. According to EM officials, the cost estimates for the three GDPs have been audited numerous times and contain thousands of pages of support. Officials also questioned how the cost estimate for Oak Ridge scored the lowest of the three sites, when the documentation supporting that cost estimate was prepared by the same contractor that prepared the Paducah cost estimate using the same processes, practices, and procedures. We use the same criteria—our Cost Estimating Guide—to assess cost estimates throughout the federal government, and we follow the same process for assessing cost estimates. As we do for all agencies, we provided EM the opportunity to review the detailed analysis that we prepared as part of our assessment and the opportunity to provide additional documentation that may fill gaps identified in that assessment. While EM had documentation for the Paducah GDP cost estimate, which included a project life-cycle summary schedule and life-cycle baseline work breakdown structure, EM did not include such documentation for the Oak Ridge GDP cost estimate. In addition, many of the documents EM officials provided to support the Oak Ridge cost estimate were more than 5 years older than the cost estimate itself, a point by which EM should have had actual expenditure data rather than proposed data to inform the estimate. Because these documents did not contain actual expenditure data, we determined they were out of date for Oak Ridge’s 2013 cost estimate. We met with EM officials a second time to discuss our assessment of the Oak Ridge GDP cost estimate and reviewed additional documents provided by officials and modified the assessment to reflect that additional information. However, this information did not change our overall assessment. Until EM ensures the site-specific life-cycle cost estimates for the cleanup of each of the GDPs fully incorporate best practices for cost estimation, EM, DOE, regulators, and Congress will not have the information needed to understand the level of resources required to achieve cleanup of the GDPs. Under EM’s current cost estimates, remaining GDP cleanup costs exceed the balance of the D&D Fund by at least $25 billion, and EM faces challenges that could affect cleanup progress and the sufficiency of the fund. According to EPA and state regulatory officials from Kentucky and Tennessee, negotiations with EM regarding various cleanup decisions have strained relations between EM and the regulators and present challenges to the GDP cleanup progress that could affect cleanup progress and put additional demands on the D&D Fund. Finally, EM’s reporting to Congress on the sufficiency of the D&D Fund is based on old data and is not always complete or clear, which presents challenges to Congress’s ability to be fully informed in taking actions to address the sufficiency of the Fund. EM’s estimated costs of about $28 billion to $30 billion to complete cleanup of the GDPs—cited in DOE’s 2019 triennial report—exceed the $2.7 billion balance of the D&D Fund cited in a 2018 document agency officials provided. Most recently, in its 2019 triennial report, DOE stated that, as of September 2016, estimated cleanup costs exceeded the balance of the D&D Fund by $26.6 billion. DOE has therefore estimated that the D&D Fund would be exhausted by fiscal year 2020. Prior triennial reports have made similar estimations. However, according to EM data, this shortage is likely to be billions more. In 2017, EM prepared a revised cost estimate for Paducah, revising Paducah’s life-cycle cost estimate for completing cleanup to $34 billion from $15 to $16 billion in 2016 data. EM did not include this revision or note it in any way in the final 2019 triennial report provided to Congress. Based on this revision, EM’s estimated costs would be about $47 billion to $48 billion to complete cleanup of the GDPs. The sufficiency of the D&D Fund has been a long-standing issue. In July 2004, we reported that based on projected costs and revenues at the time, the D&D Fund would be insufficient to cover the cleanup activities at the three GDPs. To better ensure that the fund would be sufficient to cover the projected costs for authorized activities, we recommended that Congress consider reauthorizing the fund for an additional 3 years—to 2010—and require DOE to reassess the fund’s sufficiency before it expired in 2007 to determine if further extensions would be necessary beyond 2010. In November 2007, the U.S. Senate Committee on Energy and Natural Resources held a hearing on a bill which would have reauthorized the fund and required DOE to continue to assess the fund’s sufficiency. Although the committee did not take further action on that bill, Congress has continued providing appropriations to the D&D Fund. According to EPA and state regulatory officials from Kentucky and Tennessee, negotiations with EM regarding key cleanup decisions have strained relations between EM and the regulators and present challenges to the GDP cleanup progress. If EM is unable to reach agreement with the regulators on its preferred outcomes, there will likely be further delays and increases in GDP cleanup costs. The EPA and state regulatory officials said that their negotiations over pending cleanup decisions have raised concerns regarding EM’s priorities, cleanup remedies, and cost estimates. Because both the Oak Ridge and Paducah GDPs are included on EPA’s National Priorities List, both sites are required to have a Federal Facility Agreement—an agreement that guides the cleanup process and establishes cleanup priorities and schedules with enforceable milestones as agreed to by EM, EPA, and state regulators. Disagreements among the parties at both the Oak Ridge and Paducah GDPs present challenges to EM’s assumptions regarding the acceptance of its preferred cleanup strategy and will likely lead to delays and increases in EM’s estimated cleanup costs if that strategy is not followed. Disagreements over cleanup priorities. EPA and state regulatory officials disagree with EM’s cleanup priorities at Oak Ridge and Paducah. EM officials we interviewed told us their priority is characterizing, decontaminating, and demolishing buildings and facilities. EPA and state regulatory officials said that their priority is soil and groundwater remediation to address contamination. The Tennessee regulatory official said that the state agrees that the D&D of buildings is valuable and beneficial but that those operations must be followed by management and mitigation of soil and groundwater impacts. EPA officials also told us that EM needs to better balance D&D and remediation efforts by conducting more remediation activities. EM officials stated that at the Oak Ridge GDP, EM balances D&D with remediation activities, but they did not provide documentation about these efforts. The Tennessee regulatory officials added that EM has been reluctant to commit to milestones that regulators identify as a priority. In addition, EPA officials and the Kentucky state regulatory official said that EM reprioritizes the cleanup effort every few years. The Kentucky regulator added that this has led to delays in approving the site management plan. These issues have led to disputes, and strained relations at the Paducah GDP. Specifically, per the terms of their Federal Facility Agreement, EM, EPA, and the Kentucky regulator must annually agree to a site management plan that establishes enforceable milestones. However, the parties have not agreed to such a plan since 2015, and in its draft 2018 plan, EM changed its priorities from the 2015 plan by moving a number of enforceable milestones to non-enforceable planning dates. As of February 2019, these and other technical disputes between EM and EPA and state regulatory officials had delayed demolition of the C-400 building—the primary source of groundwater contamination at the Paducah site—by a year and led to cost increases. In commenting on a draft of this report, both DOE and EPA officials stated that disputes associated with the C-400 building demolition were resolved in a memorandum of agreement signed in August 2019. Differences in preferred cleanup remedies at Oak Ridge. The Oak Ridge Federal Facility Agreement requires EM to reach agreement with the regulators on cleanup remedies. According to EM, EPA, and Tennessee regulatory officials we interviewed, EM and the regulators differ in their choice of preferred cleanup remedies at the Oak Ridge GDP, an issue subject to dispute under the Federal Facility Agreement. At Oak Ridge, EM officials we interviewed said that their cost estimate for all of the groundwater cleanup assumes that regulators will agree to a waiver for active cleanup across the site, relying on a cleanup remedy called monitored natural attenuation— allowing natural processes to decrease or “attenuate” concentrations of contaminants in the groundwater and monitoring that progress over time. EM officials acknowledged that they have not reached agreement with regulators on groundwater cleanup remedies. The officials noted that their proposed approach is based on their analysis of what remedies are cost effective, technically practicable, technically feasible, fully protective, and likely to be agreed upon by the state. EM officials also noted that their cost estimates are developed following federal standards that require EM to assume the lowest cost remedy if no remedy is more likely than another. However, DOE’s preferred cleanup remedy may not be accepted by regulators. EPA and Tennessee regulators told us that while they may agree to a waiver for specific areas at Oak Ridge, they would not agree to a “blanket” waiver covering the entire site. They added that they would prefer that EM more actively address contamination, for example, by installing a pump-and-treat system at Oak Ridge. Without the blanket waiver included in their cost estimate, EM officials said that cleanup would likely be delayed by several years, and costs would likely increase by as much as hundreds of millions of dollars. EM officials later said that they are not seeking a blanket waiver and do not believe a blanket waiver will be required for all groundwater remediation requirements, but rather that focused waivers may be necessary for certain areas that cannot be restored by available technology. Notably, in reviewing EM’s most recent cost estimate, we found that the estimate continues to assume a waiver for the entire site. Concerns about EM’s cost estimation assumptions. EPA and the Kentucky and Tennessee state regulatory officials we interviewed told us that EM generally shares information under the terms of the Federal Facility Agreement. However, the officials said they were concerned that the assumptions behind EM’s cost estimates for GDP cleanup are not transparent and that EM has not worked with them to develop the estimates. EPA officials told us that EM does not adequately or transparently include EPA on technical scope and cleanup schedule considerations that underlie EM’s cost estimates. Tennessee regulatory officials added that EM’s cost estimates do not reflect the state’s assumptions about the technical scope and schedules for the remedies for soil and groundwater remediation. In commenting on a draft of this report, DOE officials stated that estimates for the Oak Ridge GDP reflect the technical scope and schedules to accomplish the end state remedies that the Tennessee regulator has agreed to for soil remediation. The officials added that they are working with the regulator on the remedy for groundwater remediation. Similarly, at the Paducah GDP, the Kentucky state regulatory official expressed concern that EM’s cost estimates were unrealistic—especially EM’s assumption that Paducah would receive over $1 billion in funding (in escalated dollars) for most years starting in 2036 and ending in 2050. Total enacted appropriations for Paducah in fiscal year 2019 were about $274 million; EM’s assumption would constitute a significant increase in Paducah’s funding. Without these increased funding levels, Paducah’s cleanup would likely extend beyond the 2065 to 2070 time frame, and EM’s estimates for completion and cleanup costs would likely increase. EM site officials at Oak Ridge disagreed that they have not been transparent with EPA and Tennessee state regulators, emphasizing that they have complied with all Federal Facility Agreement requirements regarding regulator participation in the budget process. At Paducah, the challenges between EM, EPA, and the Kentucky regulator are not new. In April 2004, we reported that EM, EPA, and the Kentucky regulator had difficulty agreeing on an overall cleanup approach as well as on the details of specific projects. Further, we found that over time, these disagreements had undermined trust and damaged the parties’ working relationship. We recommended that EM involve EPA and the Kentucky regulator early in the development of the annual site management plan and specific projects—before submitting formal cleanup proposals for regulatory approval—so that the parties can identify and resolve their concerns and reach consensus on cleanup decisions in a more timely manner. EM stated it believed at the time that it had been successful in fostering constructive relationships with its regulators and through its intent to involve regulators early in the decision-making process. In commenting on a draft of this report, DOE officials stated that every year DOE conducts scoping meetings with EPA and the Kentucky regulator to establish the strategy, planning schedules, and milestones for the annual site management plan prior to it being transmitted to the regulators in November. According to a September 2012 Memorandum on Environmental Collaboration and Conflict Resolution issued by OMB and the Council on Environmental Quality, departments and agencies should “increase the appropriate and effective use of third-party assisted environmental collaboration as well as environmental conflict resolution to resolve problems and conflicts that arise in the context of environmental, public lands, or natural resource issues, including matters related to energy, transportation, and water and land management.” Pursuant to the memorandum’s annual reporting requirement, DOE’s draft annual report from March 2018 presents information on the department’s use of third parties and other collaborative problem-solving approaches in fiscal year 2017. In that report, DOE cites the benefits of integrating third-party facilitation into DOE site and program office projects, including expanded and clearer communication that leads to smoother relationships with the regulators and the public. EM officials told us that they, in conjunction with the regulators, have used outside facilitators to help scope site management plans, work plans, and other project documents over the past few years. They said that they have engaged the services of a facilitator at Paducah on two significant efforts, and in both cases the facilitator added value and was effective. In addition, Tennessee state regulatory officials told us that they have used a mediator with EM at the Oak Ridge GDP site in the past, and they believe the process had a positive result. However, EM is currently not engaging the services of a facilitator at the three GDP sites to help the parties address differences in setting priorities, agreeing on remedies, and ensuring the cost estimates reflect regulator assumptions. By working with an independent, third-party facilitator to help resolve disagreements over cleanup priorities, cleanup remedies, and cost estimation assumptions, EM would be in a better position to achieve stakeholder concurrence on these issues and avoid future cleanup delays. EM’s reporting to Congress on the sufficiency of the D&D Fund is based on old data, incomplete information, and unclear scope, presenting challenges to Congress’s ability to be fully informed in taking actions to address the sufficiency of the fund. The Energy Policy Act, as amended, required the Secretary of Energy to report within 3 years of enactment, and at least once every 3 years thereafter, on the progress of the GDP cleanup effort. DOE has continued to prepare triennial reports on the status of the D&D Fund and GDP cleanup for Congress. However, DOE’s 2019 triennial report is based on outdated information, provides limited information on the challenges EM faces in reaching agreement with EPA and state regulators, and is not clear on the scope of work. These limitations reduce the quality of the information Congress receives for making decisions about allocating resources to the D&D Fund at the same time that Congress will have to address a continued need for resources for GDP cleanup given the fund is estimated to be exhausted by 2020. The 2019 triennial report is based on outdated information. The latest triennial report, issued in May 2019, is based on financial information as of September 2016 and on cost estimates prepared in 2013 (Oak Ridge) and 2014 (Portsmouth and Paducah). In addition, the report does not contain information on an updated cost estimate for the Paducah site. Specifically, for Paducah, the report cites a cost estimate—prepared in 2014—of $15 billion to $16 billion and a completion date of 2047. However, EM prepared a revised cost estimate in 2018 that estimated costs to be $34 billion and estimated completion dates ranging from 2065 to 2070. EM had initially included information from this 2018 estimate in a draft of the 2019 triennial report, but ultimately did not include this information or note it in any way in the final report provided to Congress. EM headquarters officials told us that they did not include the updated 2018 Paducah cost estimate in the final 2019 report because they had already completed an extensive field and headquarters review process of the 2019 triennial report and did not want to repeat that process. The 2019 triennial report does not discuss the challenges EM faces in reaching agreement with EPA and state regulators. The 2019 triennial report has a section on challenges and uncertainties for each GDP. For the Oak Ridge and Paducah GDPs, this section does not discuss the challenges EM faces in reaching agreement with regulators on cleanup remediation decisions. For example, the Oak Ridge challenges and uncertainties section of the 2019 triennial report mentions that some groundwater treatment may be required, but the report does not disclose EM’s assumption in its cost estimate that it will receive a waiver allowing it to avoid active groundwater remediation activities or that this is an area of disagreement with the regulators. Similarly, the report’s discussion of challenges and uncertainties at Paducah mentions that several CERCLA decisions regarding groundwater need to be made, but does not discuss disagreements with the regulators over priorities or the implications of those decisions on cost or schedule. Information in triennial reports is not always clear on scope of work. Some information in the triennial reports has not always been clear. For example, when reporting its cost estimates in its three most recent triennial reports (2010, 2016, and 2019), DOE reports only future costs for Oak Ridge; whereas for Portsmouth and Paducah it reports either total costs (past plus future estimated costs), or future costs, or does not clearly indicate if the cost estimate represents total or future costs. These differences make it difficult to make comparisons among the three GDPs. In addition, in six triennial reports, DOE reported similar estimated future costs for completing the Oak Ridge GDP cleanup—$1.2 billion in the 1998 report; $1.3 billion in 2001; $1.6 billion in 2007; $2.1 billion in 2010; $1.4 billion in 2016; and $950 million in 2019. Estimated costs to complete cleanup would likely be reduced over time as work scope is completed, unless the scope of work is increasing, costs for materials are increasing, or prior estimates were incorrect; however, DOE has not clearly explained the factors contributing to these similar future cost estimates in any of its reports since 2007 (2007, 2010, 2016, 2019). Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Given that DOE estimates the D&D Fund will be exhausted in 2020, there is an urgency for DOE to communicate current and accurate information on the fund on a timely basis to Congress. By regularly reporting on the status of the D&D Fund and cleanup efforts at the three GDPs with current information that contains details on challenges in reaching agreement with regulators and a clear scope of work, DOE will be able to provide better information for congressional decision-making on the sufficiency of the fund. EM has made progress in cleaning up DOE’s three former GDPs— particularly at Oak Ridge where contractors have demolished all five uranium enrichment processing buildings measuring a combined 114 acres as well as most other supporting buildings and facilities—but future work remains. Although DOE has stated its intent to manage cleanup of the GDPs in an integrated manner, EM is not managing the cleanup as an integrated program, even though cleanup of the GDPs meets the definition of a program as defined by PMI and Congress established a single, shared D&D Fund to pay for the cleanup. By taking steps to manage the three GDPs as an integrated program and following relevant program management leading practices we examined (developing a program management plan, an integrated master schedule, and a reliable, integrated, comprehensive life-cycle cost estimate), EM would have more reasonable assurance that it is taking every opportunity to increase the efficiency and effectiveness of its management activities. Further, EM has limited expenditure data and its cost estimates for completing cleanup are not reliable. Detailed expenditure data are important for developing reliable cost estimates. However, according to EM officials, EM does not track detailed expenditure data consistently across the three GDPs. As a result, EM’s ability to develop accurate and informed cost estimates for future work at the three GDP sites is limited. By tracking consistent and detailed expenditure information on cleanup activities across the three GDPs, EM management will be better able to develop reliable cost estimates to plan for future work. Moreover, EM does not have reliable cost estimates for completing cleanup of the three GDPs. Until EM ensures the site-specific life-cycle cost estimates for the cleanup of each of the GDPs fully incorporate best practices for cost estimation, EM, DOE, regulators, and Congress will not have the information needed to understand the level of resources required to achieve cleanup of the GDPs. According to EPA and state regulatory officials from Kentucky and Tennessee, negotiations with EM regarding various cleanup decisions have strained relations between EM and regulators and present challenges to the GDP cleanup progress that will likely cause further delays and increase GDP cleanup costs if EM is unable to reach agreement on its preferred outcomes. EM officials said they have used third-party facilitators with the regulators in the past but are not currently engaging the services of a facilitator at the three GDP sites. By working with an independent, third-party facilitator to help resolve disagreements over cleanup priorities, cleanup remedies, and cost estimation assumptions, EM would be in a better position to achieve stakeholder concurrence on these issues and avoid future cleanup delays. Finally, DOE’s 2019 triennial report is based on outdated information, provides limited information on the challenges EM faces in reaching agreement with EPA and state regulators, and is not clear on the scope of work, thereby reducing the quality of the information Congress receives about the sufficiency of the fund. Given that DOE estimates the fund will be exhausted in 2020, there is an urgency for the department to communicate current information on the fund on a timely basis to Congress. By regularly reporting on the status of the D&D Fund and cleanup efforts at the three GDPs with current information that contains details on challenges in reaching agreement with regulators and a clear scope of work, DOE will be able to provide better information for congressional decision-making on the sufficiency of the fund. We are making five recommendations to DOE: The Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to take steps to manage the three GDPs as an integrated program and follow relevant program management leading practices (developing a GDP-wide program management plan; an integrated master schedule; and a reliable, integrated, comprehensive life-cycle cost estimate.) (Recommendation 1) The Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to track consistent and detailed expenditure information on cleanup activities across the three GDPs. (Recommendation 2) The Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to ensure the site-specific life- cycle cost estimates for the cleanup of each of the GDPs fully incorporate best practices for cost estimation. (Recommendation 3) The Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to work—in conjunction with EPA and Kentucky and Tennessee state regulators—with an independent, third-party facilitator to help resolve disagreements over cleanup priorities, cleanup remedies, and cost estimation assumptions. (Recommendation 4) The Secretary of Energy should regularly report on the status of the D&D Fund and cleanup efforts at the three GDPs with current information that contains details on challenges in reaching agreement with regulators and a clear scope of work. (Recommendation 5) We provided a draft of this report to DOE and EPA for comment. In DOE’s comments, reproduced in appendix IV, the agency generally agreed with our findings and recommendations, and described actions that DOE intends to take in response to our recommendations. Specifically, of our five recommendations, DOE concurred with four and partially concurred with one. DOE also provided technical comments, which we incorporated as appropriate. EPA did not provide written comments but provided technical comments, which we incorporated as appropriate. DOE concurred with our first and second recommendations that the Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to (1) take steps to manage the three GDPs as an integrated program and follow relevant program management leading practices and (2) track consistent and detailed expenditure information on cleanup activities across the three GDPs. In its response to the first recommendation, DOE stated that EM will develop a program management master plan, to include site integrated master schedules and life cycle costs for the remaining cleanup at the Portsmouth and Paducah GDPs, and that the plan will incorporate program management leading practices as appropriate. In response to the second recommendation, DOE stated that EM will assess and identify an appropriate mechanism for tracking expenditures for both the Portsmouth and Paducah GDPs, using a standardized approach with an Earned Value Management System reporting on, at a minimum, an annual basis. We appreciate DOE’s commitment to improve cleanup at the Portsmouth and Paducah sites; however, we emphasize that these two recommendations are directed at all three GDPs, including the Oak Ridge GDP. We reported that DOE intends to complete cleanup of the Oak Ridge GDP by fiscal year 2022, but according to EM documentation we reviewed and EM officials we interviewed, as well as EPA officials and state regulators we interviewed, EM is unlikely to complete the cleanup by this date. EPA officials and Tennessee regulators stated that it is more realistic that cleanup of the Oak Ridge GDP will not be completed until the late 2020s, and EPA officials told us that cleanup may not be completed until the 2040s. Given the potential for Oak Ridge cleanup to continue for at least another decade, we continue to believe it is important that DOE include Oak Ridge in its implementation of these two recommendations. DOE partially concurred with our third recommendation that the Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to ensure the site-specific life-cycle cost estimates for the cleanup of each of the GDPs fully incorporate best practices for cost estimation. DOE stated that EM will direct the Portsmouth and Paducah sites to review and incorporate practices from our Cost Estimating Guide, as appropriate, into the next revisions of each site’s life-cycle cost baselines. DOE also stated that the remaining scope for the Oak Ridge GDP will become part of the performance baseline for the next Oak Ridge contractor. We appreciate DOE’s commitment to improve cost estimation for the Portsmouth and Paducah GDPs. However, we continue to believe that improving cost estimation for the Oak Ridge GDP is also important, given that cleanup of Oak Ridge may continue for at least another decade, as described above. As such, we continue to believe it is important that DOE include Oak Ridge in implementing this recommendation. DOE concurred with our fourth recommendation that the Secretary of Energy should direct the Assistant Secretary of the Office of Environmental Management to work—in conjunction with EPA, and Kentucky and Tennessee state regulators—with an independent, third- party facilitator to help resolve disagreements over cleanup priorities, cleanup remedies, and cost estimation assumptions. DOE stated that as disagreements over cleanup priorities, remedies, and cost estimation assumptions arise, EM will work with all parties to determine the feasibility and benefits of using a facilitator on a case by case basis to help resolve issues. DOE also concurred with our fifth recommendation that the Secretary of Energy should regularly report on the status of the D&D Fund and cleanup efforts at the three GDPs with current information that contains details on challenges in reaching agreement with regulators and a clear scope of work. DOE management stated that EM will produce its next triennial Uranium Enrichment Decontamination and Decommissioning Fund Report following closeout of fiscal year 2019, and release of the most recent environmental liability estimate associated with the remaining challenges and scope of cleanup at the GDPs. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, the Administrator of EPA, and other interested parties. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made significant contributions to the report are listed in appendix VI. Our report examined: (1) the extent to which the Department of Energy’s (DOE) Office of Environmental Management (EM) has managed cleanup of the three gaseous diffusion plants (GDP) compared with relevant program management leading practices and the status of the cleanup effort; (2) what EM has spent on cleanup at the three GDPs and the extent to which EM’s cost estimates for completing GDP cleanup are reliable; and (3) the extent to which the Decontamination and Decommissioning (D&D) Fund is sufficient to cover EM’s estimated cleanup costs of the GDPs and challenges, if any, that could affect the sufficiency of the D&D Fund. To inform all three objectives, we reviewed the Energy Policy Act of 1992, as amended; DOE triennial reports to Congress on GDP cleanup efforts; and prior reports issued by us, DOE’s Office of Inspector General (both performance audits and financial statement audits on the D&D Fund), and the National Academies of Sciences, Engineering, and Medicine (National Academies). We also interviewed officials from DOE’s Office of Inspector General, the Environmental Protection Agency (EPA), and representatives from of the National Academies, regarding their knowledge of EM’s cleanup progress at the GDPs and any past, ongoing, or future work they have conducted or are planning on the GDP cleanup. We visited all three GDP sites to observe the cleanup work and meet with EM officials responsible for the cleanup, representatives of the DOE contractor responsible for D&D activities, state regulators working with EM on environmental compliance activities (from Kentucky, Ohio, and Tennessee), members of GDP site-specific advisory boards, and representatives of community reuse organizations. During our interviews, we discussed topics including funding for the GDP cleanup, cleanup progress to date, and any challenges facing the cleanup effort. We selected these interviewees because we determined, based on input from EM officials, that they would be the most knowledgeable about GDP cleanup status, funding, and challenges. Following these interviews, we conducted a content analysis of all responses to our interview questions to determine any key challenges that EM faces in completing cleanup of the GDPs. We then grouped, coded, and verified the content in our analysis and performed second-rater review. Through our content analysis, we found that stakeholders primarily cited three key challenges related to EM’s program management; relations between EM, EPA, and state regulators; and transitioning the local communities to cleanup completion. To examine the extent to which EM has managed the cleanup of the GDPs compared with relevant leading practices for program management, and the status of the cleanup effort, we reviewed documents, including site-specific GDP cleanup plans and GDP cleanup progress briefings, as well as reports issued by the National Academies, us, and DOE. We interviewed EM officials and contractor representatives on their past, present, and future plans for cleanup. We also interviewed EPA and state regulatory agency representatives at each of the GDPs regarding their role in the cleanup and interactions with EM. We assessed the information from these reviews and all interviews (content analysis from interview responses) and identified the relevant program management leading practices that aligned with the assessed information. We identified the three program management leading practices by reviewing our prior work and the Project Management Institute’s (PMI) The Standard for Program Management—Fourth Edition. The three leading practices were having (1) a program management plan, (2) an integrated master schedule, and (3) a reliable, integrated, comprehensive life-cycle cost estimate. We compared EM’s management of the GDPs with these leading practices. Specifically, during our interviews with EM, the DOE Office of Inspector General, and EPA officials; Kentucky, Ohio, and Tennessee regulators; representatives of the National Academies; and members of the site- specific advisory board from all three sites, we asked about challenges EM faces in completing cleanup of the three GDP sites. As discussed above, we conducted a content analysis of their responses to our interviews and found that stakeholders primarily cited three key challenges, including EM’s poor program management. Under poor program management, stakeholders cited three sub-challenges: (1) frequent changes in EM’s cleanup priorities and staff turnover, which most closely aligns with the program planning leading practice; (2) lack of integrated schedules across the GDPs, which most closely aligns with the scheduling leading practice; and (3) lack of transparency in EM’s cost estimation processes, which most closely aligns with the program cost estimating leading practice. As a result, we assessed the three leading practices that aligned with those issues: (1) program management plan, (2) integrated master schedule, and (3) integrated comprehensive life- cycle cost estimate. To examine the status of cleanup at the GDPs, we reviewed EM’s documentation of the work completed and the work remaining at each GDP. To examine what EM has spent on cleanup at the three GDP sites, and the extent to which EM’s cost estimates for completing GDP cleanup are reliable, we reviewed historical funding and cleanup expenditure data for all three sites for the period from fiscal year 1994 through 2018 and analyzed EM documentation supporting its cost estimates for each of the three GDPs. The data the sites provided include expenditures from the D&D Fund as well as from other funding sources including: the American Recovery and Reinvestment Act, Uranium Facilities Maintenance and Remediation funds, Environmental Management Waste Management Facility funds, and Technetium-99 cleanup funds. We reviewed financial statement audit reports issued on the D&D Fund for fiscal years 2005 to 2012 and met with relevant headquarters and field staff in financial management, budget, and planning. In addition, we assessed the reliability of the historical funding and expenditure data provided by EM. Specifically, we obtained from EM officials familiar with DOE’s financial management system responses to a series of data reliability questions such as data entry access, quality control procedures, and the accuracy and completeness of the data. During our review of the GDP expenditure data, we identified a number of inconsistencies between the data received from EM site officials and the data reported in DOE’s 2019 triennial report to Congress. EM officials were able to provide satisfactory responses and documentation to address the identified inconsistencies. We therefore found the data to be reliable for our purposes. To examine the reliability of EM’s cost estimates for completing cleanup at the three GDPs, we reviewed EM’s cost estimate documentation, interviewed EM site officials, and compared GDP cost estimates against characteristics of reliable cost estimates contained in our Cost Estimating Guide. Our review included documents that established the basis and assumptions for site contractors’ contributions to the cost estimate, documents that established the contractors’ work breakdown structures, and presentations on contractors’ cost estimating models. We interviewed EM site officials and contractor staff responsible for producing the cost estimates to understand the methods, assumptions, information, and data EM used to produce the estimates. Our cost estimation specialists assessed this information against the best practices for cost estimating found in our Cost Estimating Guide that we developed to establish a consistent methodology that can be used across the federal government to develop, manage, and evaluate capital program cost estimates. We shared our draft assessment for each GDP cost estimate with EM officials and then revised those assessments based on EM’s written comments and additional documentation they provided as appropriate. At EM’s request, we met with Oak Ridge officials a second time to discuss our assessment of the Oak Ridge GDP cost estimate and reviewed additional documents provided by officials, and we reflected that additional information into our assessment of the Oak Ridge cost estimate. To examine the extent to which the D&D Fund is sufficient to cover EM’s estimated cleanup costs of the GDPs and challenges, if any, that could affect the sufficiency of the D&D Fund, we reviewed information on the balance of the D&D Fund and compared it to EM cost estimate information, past reports that describe the balance of the fund, and our prior report on the fund. Despite our findings that the three cost estimates were unreliable, we were able to report on the cost estimates provided in DOE’s 2019 Triennial Report by presenting an “at least” cost estimate. In addition, we interviewed key stakeholders, including officials from EM, the DOE Office of Inspector General, and EPA; regulators from the states of Kentucky, Ohio, and Tennessee; representatives of the National Academies; and members of the site-specific advisory boards and representatives of the community reuse organizations from all three sites, regarding challenges EM faces in completing cleanup of the three GDP sites and challenges that could affect the sufficiency of the D&D Fund. As noted above, we conducted a content analysis of their response and found that stakeholders primarily cited three challenges that could affect cleanup progress and further strain the D&D Fund, including challenges with negotiations with EPA and state regulators. We also reviewed DOE’s triennial reports from 1996 to 2019 and compared information included in each of these triennial reports to determine the extent to which the information provided was presented consistently across reports and consistent with other documentation provided, such as site-specific plans and DOE’s cost estimates. We also interviewed DOE officials about the sufficiency of the D&D Fund and factors affecting the sufficiency of the fund. We conducted this performance audit from April 2018 to December 2019, in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. This appendix provides information on cleanup work completed at the Department of Energy’s (DOE) former gaseous diffusion plants (GDP) as of June 2019. DOE’s Office of Environmental Management (EM) is responsible for their cleanup. EM began cleanup at Oak Ridge in 1989 and Decontamination and Decommissioning (D&D) of the uranium enrichment process buildings in 1998. Since that time, EM has characterized the levels and types of contamination for most of the site and conducted D&D on all five uranium enrichment process buildings. EM has also demolished over 390 additional buildings and facilities, including a fire water tower and the Central Neutralization Facility that was used to treat the site’s industrial wastewater. In addition, EM has remediated nearly 1,400 acres of contaminated soils and has used an onsite waste disposal facility to dispose of much of the waste generated from cleanup. Some specific cleanup work EM has completed at Oak Ridge includes: Removed slabs from two uranium enrichment process buildings and completed cleanup of contaminated soils beneath the slab, clearing the way for transition to industrial reuse. Excavated and disposed of approximately 100,000 cubic yards of contaminated materials from a burial ground. Remediated an area considered to be a primary source of organic contamination in area soils and groundwater and treated the resulting approximately 175 cubic meters of contaminated soil. Removed more than 48,000 tons of scrap metal from two scrap yards. EPA and Tennessee state regulators agree that the end use for the site will be a commercial industrial park, and several businesses are already leasing portions of former GDP lands. In addition, more than 3,000 acres of the former GDP lands have been cleared for conservation and recreational use. EM has partnered with the Community Reuse Organization of East Tennessee to attract businesses to operate on the available lands. According to a representative of the Community Reuse Organization of East Tennessee, EM has transferred over 1,000 acres of land and 14 buildings to the reuse organization, who has in turn sold over 300,000 square feet to the private sector. There are 20 private companies operating at the site. EM began cleanup at the Portsmouth GDP in 1989 and D&D of the uranium enrichment process buildings in 2011, after the contractor that operated the site—the Unites States Enrichment Corporation (USEC) returned the buildings to DOE in 2010. As of May 2019, EM is preparing the first of three uranium enrichment process buildings for demolition and is starting to characterize contamination in the second. EM is also conducting ongoing remediation activities and constructing an on-site waste disposal facility, where EM intends to dispose of D&D waste that meets the approved acceptance criteria of the disposal facility. Several site support facilities, including a large electric switchyard, have been demolished. Some specific cleanup work EM has completed at Portsmouth includes: Completed sampling and removal for off-site disposal of all 7,020 uranium enrichment components (converters, compressors, and coolers) from one of the uranium enrichment process buildings. Closed five on-site landfills covering 60 acres. Removed more than 37,000 pounds of trichloroethylene—a solvent for degreasing metal that contaminated the groundwater at the site— through groundwater remediation. EM contractors at Portsmouth told us that they are cleaning up the site for future industrial use. EM began cleanup at the Paducah site in 1988. USEC officially returned the GDP to DOE in 2014 and according to an EM document and officials, deactivation of the uranium processing buildings began that same year. In January 2019, EM reached a milestone—deactivation of the C-400 building—by completing the cleanup of legacy materials in the building. C-400 was a cleaning facility used to clean machinery parts and test equipment and has been identified as the primary source of groundwater contamination at the site. According to EM officials, EM has primarily been using a pump-and-treat method to control the high concentration portion of the groundwater plumes at Paducah. EM officials stated that EM is focusing its cleanup efforts on D&D of the C-400 building and remediation from now until the early 2030’s. According to EM officials, EM is continuing to treat large contamination plumes and demolish inactive facilities. Some specific cleanup work EM has completed at Paducah includes: Demolished and removed 43 inactive facilities including a 210,000 square foot uranium hexafluoride feed plant and a 60,000 square foot metals plant. Treated over four billion gallons of contaminated groundwater from two operating pump-and-treat facilities and, as part of this treatment, removed approximately 3,700 gallons of trichloroethylene. Removed more than 850,000 cubic feet of low-level and mixed low- level legacy wastes and material storage area waste. Resurfaced 74 acres of roofs at the site and rerouted roof drains in order to reduce infiltration of water into the facilities. Officials at Paducah told us that they are cleaning up the site for future industrial use. In addition to the individual named above, Amanda K. Kolling, Assistant Director; Luqman Abdullah; Mark Braza; Jennifer Echard; Emile Ettedgui; Juan C. Garay; Mark Keenan; Jennifer Leotta; Gregory Marchand; Kiki Theodoropoulos; and Lauren Woodard made key contributions to this report. Also contributing to this report were Alexandra Edwards; Keegan Maguigan; Anne Stevens; and Doris Yanger.", "summary": "Cleaning up DOE's former uranium enrichment sites will cost billions of dollars and span decades. These sites, near Oak Ridge, Tennessee; Paducah, Kentucky; and Portsmouth, Ohio, are contaminated with radioactive and hazardous materials. EM is responsible for their cleanup. This report examines (1) the extent to which EM has managed cleanup of the GDPs compared with relevant program management leading practices and the status of the cleanup effort; (2) what EM has spent on cleanup at the GDPs, and the extent to which EM's cost estimates for completing GDP cleanup are reliable; and (3) the extent to which the D&D Fund is sufficient to cover EM's estimated cleanup costs of the GDPs and challenges, if any, that could affect the sufficiency of the fund. GAO reviewed relevant legislation and DOE reports to Congress on GDP cleanup; compared program management to relevant leading practices; assessed EM expenditure and cost estimation documents; and interviewed EM and state regulatory officials at the three GDPs. Since 2007, the Department of Energy (DOE) has stated in reports to Congress that it intends to manage its three former gaseous diffusion plants (GDP) in an integrated manner. Also, a Decontamination and Decommissioning (D&D) Fund was established by law to pay for the cleanup costs of the GDP sites, so that DOE's Office of Environmental Management (EM) must coordinate and make trade-offs in its use of resources among the three GDPs. However, EM has managed the cleanup of the three GDPs as three individual sites. In addition, EM is not following relevant leading practices GAO reviewed for managing the cleanup as a program (having a program management plan; a reliable integrated master schedule; and a reliable, integrated, comprehensive life-cycle cost estimate. By managing the three GDPs as an integrated program and following these program management leading practices, EM would have more reasonable assurance that it is taking every opportunity to increase the efficiency and effectiveness of its management activities. EM has reported spending a total of about $15.5 billion on GDP cleanup as of fiscal year 2018. However, EM's cost estimates for completing cleanup at the three sites are not reliable. GAO assessed EM's cost estimates for the GDPs individually by comparing them with best practices for developing high-quality, reliable cost estimates. EM's cost estimates for completing cleanup of the GDPs do not fully or substantially meet all of the characteristics of a reliable cost estimate Until EM ensures that its site-specific cost estimates fully incorporate best practices for cost estimation, EM, DOE, regulators, and Congress will not have the information needed to understand the level of resources required to achieve cleanup of the three GDPs. Under EM's current cost estimates, remaining GDP cleanup costs exceed the balance of the D&D Fund by at least $25 billion and EM faces challenges that could affect cleanup progress and the sufficiency of the fund. For example, DOE's reporting to Congress on the sufficiency of the D&D Fund is based on old financial data, incomplete information, and unclear scope. These limitations reduce the quality of the information Congress receives for making decisions about the sufficiency of the fund and allocating resources to the fund. For example, DOE reported to Congress on the status of the D&D fund and GDP cleanup in May 2019. The report was based on financial data as of September 2016 and on cost estimates prepared in 2013 for one GDP and in 2014 for the other two. Given that DOE estimates the fund will be exhausted in 2020, there is urgency for DOE to communicate current information on the fund on a timely basis to Congress. By regularly reporting on the status of the D&D Fund and cleanup efforts at the three GDPs with current information that contains details on challenges in reaching agreement with regulators and a clear scope of work, DOE will be able to provide better information for congressional decision-making on the sufficiency of the fund. GAO is making five recommendations, including that DOE (1) manage the cleanup of the three GDPs as an integrated program and follow program management leading practices, (2) ensure cost estimates fully incorporate cost estimating best practices, and (3) report regularly on the status of the D&D Fund and cleanup efforts at the three GDPs. DOE agreed with four of them and partially agreed with one. GAO believes all of the recommendations should be implemented at all three sites.", "document_type": "gao"}
{"report": "MDA is responsible for developing a number of systems, known as elements, with the purpose of defending against ballistic and hypersonic missile attacks. MDA’s mission is to combine these elements into an integrated system-of-systems known as the Ballistic Missile Defense System (BMDS). The goal of the BMDS is to combine the abilities of two or more elements to achieve objectives that would not have been possible for any individual element. These emergent abilities are known as integrated capabilities or BMDS level capabilities. Table 1 provides a brief description of selected BMDS elements. MDA was established in 2002 with exceptional flexibilities to manage the acquisition of the BMDS—developed as a single program—that allow MDA to expedite the fielding of assets and integrated ballistic missile defense capabilities. These flexibilities allow MDA to diverge from DOD’s traditional acquisition life cycle and defer the application of certain acquisition policies and laws designed to facilitate oversight and accountability until a mature capability is ready to be handed over to a military service for production and operation. In addition, MDA has been operating in an environment of tight timeframes for delivering capabilities—beginning with a presidential directive in 2002 to field a limited capability by 2004. This was followed by a presidential announcement in 2009 to begin deploying U.S. missile defense in Europe in 2011 finishing in 2020. This schedule required concurrency among technology, testing and other development activities. More recently, MDA has been directed to develop and deploy defenses against hypersonic and cruise missile threats as soon as technologically able. These schedule pressures compound challenges associated with complex technology, design, and integration associated with the missile defense mission that normally require careful planning, disciplined engineering practices, extensive coordination, and effective management and oversight to be successful. MDA has taken important actions to increase transparency, reduce high- risk approaches in its management of BMDS elements, and test and deliver BMDS capability. Specifically, MDA has improved reporting in its annual progress reports to the Congress and made advances across a broad range of management activities, including the involvement of stakeholders, reducing concurrency, and continued efforts to improve key aspects of testing necessary to demonstrate delivered capability. Increased Transparency: MDA, consistent with several of our recommendations has increased the ability to track progress over time in the BMDS Accountability Report (BAR). This is MDA’s annual report that presents the current estimate of the BMDS programs’ baselines. To increase insight into MDA’s management of the BMDS, MDA implemented significant changes to its key acquisition processes and for the first time developed and reported detailed baselines for each element in the BAR in 2010. As we found in March 2011, MDA’s prior approach limited the ability for DOD and congressional decision makers to measure MDA’s progress on cost, schedule, and testing. While MDA’s changes were positive, over the years, we made additional recommendations to further improve MDA’s reporting. In response to our recommendations, MDA made improvements to the BAR that include providing details on variances to its test plan from year to year and including information on its use of contract actions known as an Undefinitized Contract Actions (UCA) and Unpriced Change Orders (UCO). Improved Stakeholder Outreach: MDA has increased its outreach to DOD stakeholders over the past few years. Our prior work on defense acquisitions has shown that establishing buy-in from decision makers is a key factor in achieving better acquisition outcomes because DOD components provide varying perspectives due to their unique areas of expertise and experience. For example, as we reported in December 2019, MDA has recently increased its interaction with the defense intelligence community. Specifically, MDA engaged the defense intelligence community on an analysis of alternatives the agency completed in February 2017 that assessed future sensor options for the BMDS. In addition, MDA reached out to the defense intelligence community on another analysis of alternatives pertaining to defense against hypersonic missiles. In fact, officials from several DOD organizations we met with over the past two years observed that MDA’s engagement with their organizations was improving. Reducing Concurrency: MDA continues to take steps to reduce concurrency, an issue we have reported on for many years. Concurrency is broadly defined as the overlap of development, testing, and production; coupled with an aggressive testing schedule. MDA’s concurrent development has often left the agency committing to production and fielding before development is complete. This approach has resulted in performance shortfalls, cost increases, and schedule delays. MDA has taken steps to mitigate this risk consistent with our recommendations. For example, as we found in May 2017, MDA took steps to reduce concurrency in the Aegis BMD SM-3 Block IB by adding in tests and delaying the full-rate production decision until the tests were completed. Figure 1 represents a highly concurrent acquisition schedule as compared to an approach based on gaining knowledge before proceeding to the next acquisition phase. Improving BMDS Testing: MDA has improved the accuracy of tools it uses to assess integrated BMDS capabilities. The BMDS is a system of systems that cannot be completely assessed using intercept flight tests because of the system’s scope and complexity, and because of safety constraints. Consequently, MDA, independent DOD testing organizations, and the warfighter must rely heavily on representations of the integrated BMDS called models and simulations in ground testing. This approach is used, rather than live tests, to test the operational performance of the whole BMDS against attacks with more threats represented. Our preliminary observations for fiscal year 2019 are that the number of accredited models and simulations that are needed to assess the integrated performance of the BMDS has steadily risen over the last 3 years. Over the past several years, we have reported on MDA’s progress in delivering assets and capabilities to counter attacks as well as cyber threats. MDA delivered important BMDS capabilities for architectures in the United States as well as those defending U.S. troops and allies in Europe, the Middle East, and the Eastern Pacific. For example: Homeland Defense: In fiscal year 2017 and 2018, MDA delivered a significant integrated capability for defending the United States, including improvements in the ability to discriminate lethal objects in targets, and increased capacity. This was a key achievement in fulfilling a directive from the Secretary of Defense to increase inventory of ground-based interceptors by the end of 2017. Regional BMD: In fiscal year 2016, MDA delivered capabilities for the second phase of its effort in Europe, called European Phased Adaptive Approach (EPAA). This effort required coordinated development of a number of elements and their integration to provide integrated BMDS-level integrated capabilities against short and medium range ballistic missiles. More recently, in fiscal years 2018 and 2019, MDA rapidly delivered capabilities for its effort to meet an urgent regional need. In addition, preliminary observations from our review covering fiscal year 2019 indicate that cybersecurity assessments in fiscal year 2019 informed the network defense posture in U.S. Northern Command and provided data on how to reduce mission risk for these elements operating in a cyber-contested environment. Moreover, the agency is incorporating lessons learned from prior cyber activities, and continues to address issues discovered in prior testing, improving its overall cybersecurity survivability. However, our preliminary observations indicate much remains to be done to ensure cyber resiliency of the BMDS including the completion of cybersecurity testing for capabilities delivered in 2017 and 2018, along with conducting element-level operational cooperative and adversarial assessments. MDA has made efforts to put some programs on a more sound footing and it has taken actions to address the issues I just mentioned. However, MDA can go further to align itself with best practices for acquisitions. Today, I will highlight certain acquisition challenges MDA still faces. Stakeholder involvement: While MDA has increased its outreach to the stakeholders over the past few years, opportunities remain for further engagement on key decisions. For instance, as we found in December 2019, although MDA has been increasing its engagement with the intelligence community, MDA provides the defense intelligence community with limited insight into how the agency uses threat assessments to inform its acquisition decisions. MDA is not required to obtain the defense intelligence community’s input; however, the community is uniquely positioned to assist MDA keep pace with rapidly emerging threats. Moreover, this limited insight has, in part, prevented validation of threat models designed to assess BMDS capabilities. Without validation, any flaws or bias in the threat models may go undetected, which can have significant implications for the performance of MDA’s weapon systems. MDA and the defense intelligence community recently began discussing a more suitable level of involvement in the agency’s acquisition processes and decisions. As we recommended in May 2017 and December 2019, MDA also needs to strengthen its collaboration with other stakeholders, including the warfighting community and independent cost and technical experts. In the early stages of the RKV program, concerns raised about the design—which ultimately was a key reason for the cancellation of the RKV—went unheeded. For example, preliminary observations for our assessment covering fiscal year 2019 showed that MDA and contractors did not adequately address technical risks despite numerous warnings from stakeholders about the performance issues. However, MDA officials indicate they are working with stakeholders more closely as they plan for the Next Generation Interceptor, a new more advanced interceptor. Concurrency: Although MDA has taken steps to reduce concurrency as we have previously recommended, the agency still turns to this practice when experiencing developmental delays or schedule pressures. For example, we reported in June 2019 that delays to construction resulted in MDA’s introduction of increasing levels of concurrency into the delivery schedule for the Aegis Ashore site in Poland. We found that key phases of the delivery process had been shortened from 16.5 months to 6.5 months. While overlapping acquisition activity, in theory, could speed up the construction process, this risky practice ultimately failed to mitigate the effects of problematic construction practices. However, program plans indicate that the site has experienced further delays and will not be ready for operational use until at least 2022—a 4 year delay from the original 2018 delivery date. In addition, the recently canceled Redesigned Kill Vehicle (RKV) program originally sought to avoid concurrency by aligning production decisions with flight testing. However, later—in response to the advancement of the North Korean missile threat—the program accelerated RKV development by concurrently performing development and production and reducing the number of necessary flight tests. This acceleration altered the schedule for the previously aligned flight tests and production decisions. Contracting: Although MDA has flexibilities in managing its acquisition process, it must follow the same contracting regulations that apply to DOD, including the Federal Acquisition Regulation and the Department of Defense Federal Acquisition Regulation Supplement. These regulations allow MDA to use a particular type of contract action called an undefinitized contract action when the negotiation of a definitive contract is not possible in sufficient time to meet the government’s requirements and government interests demand that the contractor be given a binding commitment so that contract performance can begin immediately. These actions authorize contractors to begin work before an agreement on terms, specifications, or price have been agreed upon. In May 2018, we found that the average length of the undefinitized period and the not- to-exceed price of MDA’s undefinitized contract actions had increased over the past 5 years. While MDA policy permits use of undefinitized contracts on a limited basis, we and others have found that they can place unnecessary cost risks on the government. As we reported in June 2019, while MDA improved its performance in timely definitization of these contract actions, the total not-to-exceed value of the undefinitized contract actions MDA initiated in 2018 far exceeded previous years we reviewed. Transparency in test cost estimates: As we reported in May 2017, MDA requests more than $1 billion in funding each fiscal year for the tests outlined in its integrated test schedule based on MDA’s internally developed test cost estimates. However, our analysis found these estimates were inconsistent and lacked documented traceability. A cost estimate is the summation of individual costs using established methods and valid data. Developing and maintaining reliable cost estimates ensures the appropriate amount of funds are needed when requested and for the expressed purpose. We found, however, in May 2017, MDA’s testing budget lacked transparency and could be improved. Specifically, we found that MDA’s annual budget submission did not provide insight into the funding for each specific test. MDA regularly makes changes to its test schedule without reporting the impacts to its costs and funding needs. Without a breakout of MDA’s costs by test in its annual budget submission and BAR, how many times or how much funding has been requested, received, or used for a specific test will continue to be unclear. Therefore, we recommended that MDA break out funding request by test. DOD did not concur with our recommendation and stated that MDA’s current approach for assigning resources prior to the test execution, is adequate. We continue to believe that breaking out funding requests by test will improve transparency into planned versus actual test costs and aid departmental and congressional decision makers as they make difficult choices of where to invest limited resources. MDA also continues to struggle with fully achieving its annual flight testing goals. After MDA revised its approach to developing the annual Integrated Master Test Plan in 2009, in February 2010, we recognized the new test schedule’s potential to address prior issues with shifting testing requirements or test dates, and adding or deleting tests. MDA also focused its testing to collect data necessary to support the development of models and simulations. However, MDA’s test plan has not stabilized. Since it formalized its approach in 2010, MDA has continued to revise its test schedule frequently by adding new tests, and deleting or delaying tests, in some cases, multiple times and further into future fiscal years. As a result, less testing is being conducted prior to delivery than originally planned, which means less data are available to understand BMDS capabilities and limitations. Specifically, preliminary observations from our fiscal year 2019 review show that from fiscal year 2010 through fiscal year 2019, MDA has conducted only 37% of its planned testing as originally scheduled, while the remainder has been either been delayed, deleted or conducted in a later fiscal year, as shown in figure 2. In addition, we reported in June 2019 that European Phased Adaptive Approach (EPAA) Phase 3 testing against intermediate range ballistic missiles (IRBM) had been reduced by 80 percent and MDA no longer planned to conduct a flight test against a raid—a likely tactic in a real- world attack—prior to delivery. The lack of raid flight testing prevented the accreditation of Aegis BMD models for assessment under those circumstances in all fiscal year 2019 ground tests that included Aegis BMD. MDA is currently at a pivotal crossroads, needing to balance its ability to pursue new and advanced efforts while also maintaining its existing portfolio of BMDS elements that have not transferred to the military services as originally planned. The new and advanced efforts, such as hypersonic defense and a Next Generation Interceptor (NGI) for GMD, are research and development-intensive tasks, which carry significant technical risks and financial commitments. If MDA’s elements are not transferred as originally intended, as they move further into production and operations and sustainment these elements will continue to consume a growing portion of the agency’s budget. MDA and military services have taken some actions to prepare for transferring the BMDS elements; however, the actions have not enabled transfer primarily due to a lack of early and frequent coordination, according to officials from the Undersecretary of Defense for Research and Development and Acquisitions and Sustainment. Consequently, there are overarching concerns related to transfer such as who funds the sustainment of the elements which have not been resolved. Congress and the Secretary of Defense have directed multiple reviews to determine how to address these concerns and chart a path forward for MDA. Chairman Cooper, Ranking Member Turner, and members of the Subcommittee, this concludes my prepared statement. I would be happy to respond to any questions you may have at this time. If you or your staff members have any questions about this testimony, please contact Cristina T. Chaplain, Director, Contracting and National Security Acquisitions, at (202) 512-4841 or Chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are LaTonya Miller (Assistant Director), Steven Stern (Analyst in Charge), Matthew Ambrose, Pete Anderson, Helena Johnson, Michael Moran, Wiktor Niewiadomski, Miranda Riemer, Brian Tittle, and Alyssa Weir. Missile Defense: Delivery Delays Provide Opportunity for Increased Testing to Better Understand Capability. GAO-19-387. Washington, D.C.: June 2019. Missile Defense: The Warfighter and Decision Makers Would Benefit from Better Communication about the System’s Capabilities and Limitations. GAO-18-324. Washington, D.C.: May 2018. Missile Defense: Some Progress Delivering Capabilities, but Challenges with Testing Transparency and Requirements Development Need to Be Addressed. GAO-17-381. Washington, D.C.: May 2017. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities. GAO-16-339R. Washington, D.C.: Apr. 2016. Missile Defense: Opportunities Exist to Reduce Acquisition Risk and Improve Reporting on System Capabilities. GAO-15-345. Washington, D.C.: May 2015. Missile Defense: Mixed Progress in Achieving Acquisition Goals and Improving Accountability. GAO-14-351. Washington, D.C.: Apr. 2014. Missile Defense: Opportunity to Refocus on Strengthening Acquisition Management. GAO-13-432. Washington, D.C.: Apr. 2013. Missile Defense: Opportunity Exists to Strengthen Acquisitions by Reducing Concurrency. GAO-12-486. Washington, D.C.: Apr. 2012. Missile Defense: Actions Needed to Improve Transparency and Accountability. GAO-11-372. Washington, D.C.: Mar. 2011. Defense Acquisitions: Missile Defense Transition Provides Opportunity to Strengthen Acquisition Approach. GAO-10-311. Washington, D.C.: Feb. 2010. Defense Acquisitions: Production and Fielding of Missile Defense Components Continue with Less Testing and Validation Than Planned. GAO-09-338. Washington, D.C.: Mar. 2009. Defense Acquisitions: Progress Made in Fielding Missile Defense, but Program is Short of Meeting Goals. GAO-08-448. Washington, D.C.: Mar. 2008. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost. GAO-07-387. Washington, D.C.: Mar. 2007. Defense Acquisitions: Missile Defense Agency Fields Initial Capability but Falls Short of Original Goals. GAO-06-327. Washington, D.C.: Mar. 2006. Defense Acquisitions: Status of Ballistic Missile Defense Program in 2004. GAO-05-243. Washington, D.C.: Mar. 2005. Missile Defense: Actions Are Needed to Enhance Testing and Accountability. GAO-04-409. Washington, D.C.: Apr. 2004. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "For over half a century, the Department of Defense has funded efforts to defend the United States from ballistic missile attacks. From 2002 to 2020, MDA has received about $174 billion to develop the BMDS and has requested about $9.2 billion for fiscal year 2021. The BMDS consists of diverse and highly complex land-, sea-, and space-based systems and assets located across the globe. This statement summarizes lessons that GAO has identified from its prior reviews of MDA starting in 2004 that can be applied to strengthen the transparency and acquisition practices for developing and fielding missile defense elements. Specifically, this testimony provides information on (1) steps MDA has taken to increase transparency and reduce acquisition risks; and (2) ongoing challenges associated with improving transparency and reducing high risk acquisition practices. In our prior work, GAO reviewed key MDA management documents including annual program reviews, tests plans and budget documents. We also interviewed officials from MDA and from other key DOD offices. The Missile Defense Agency (MDA) has taken important steps in recent years to improve management practices, reduce acquisition risks, and deliver capabilities to defend the United States and its allies from ballistic missile attacks. Specifically, MDA has made advances across a broad range of management activities, such as improving stakeholder outreach, reducing concurrency, (broadly defined as the overlap between product development, testing, and production), improving testing of the Ballistic Missile Defense System (BMDS) and increasing transparency of its progress. MDA has also made progress toward improving homeland and regional defense. However, MDA can go further to align itself with best practices as it faces ongoing challenges associated with improving transparency and reducing high risk acquisition practices. These challenges include: Stakeholder involvement: MDA has improved its outreach to stakeholders, including the intelligence community and other DOD stakeholders, however, opportunities remain, such as obtaining more input from the defense intelligence community. While MDA is not required to do so, the community is uniquely positioned to help keep pace with emerging threats and validate threat models. Concurrency: MDA has taken steps to reduce concurrency, but falls back on this practice when experiencing developmental delays or schedule pressures. The recently canceled Redesigned Kill Vehicle (RKV) initially aligned production decisions with flight testing. However, in response to advancements from North Korea, development and production were performed concurrently and flight testing was reduced, thereby removing the safeguards that had been put into place. Flight test schedule changes: Despite initiating a new approach to developing its flight test schedule in 2009, MDA continues to struggle with execution. Namely, MDA is frequently revising its annual schedule by adding new tests, and deleting or delaying others—sometimes multiple times. Transparency of test cost estimates: MDA regularly makes changes to its test schedule without reporting the impact to its costs and funding needs. We continue to believe that breaking out funding requests by test will improve transparency into planned versus actual test costs and aid departmental and congressional decision makers as they make difficult choices of where to invest limited resources. MDA is at a pivotal crossroads, needing to balance its ability to pursue new and advanced efforts while also maintaining its existing portfolio. Congress and the Secretary of Defense are undertaking multiple reviews to determine how to address these concerns and chart a path forward for MDA. GAO is not making any new recommendations in this statement. GAO has previously recommended that MDA take steps to increase transparency and align its acquisition approach to reduce high-risk practices. MDA concurred with certain recommendations and is taking steps to implement them.", "document_type": "gao"}
{"report": "In 1991, following the collapse of the Soviet Union, the U.S. government authorized the President to establish the Nunn-Lugar Cooperative Threat Reduction (CTR) program to provide nuclear security assistance to Russia and the former Soviet states. At the time, there were significant concerns about Russia’s ability to maintain adequate security over its large numbers of nuclear weapons and vast quantities of weapons-usable nuclear materials. In 1995, DOE established the Material Protection, Control, and Accounting (MPC&A) program to equip Russia and other countries with modern nuclear material security systems and promote effective nuclear material security practices. The CTR umbrella agreement with Russia—which established an overall legal framework under which the United States would provide nuclear security assistance to Russia—expired in June 2013. Joint nuclear security activities in Russia, however, continued under a multilateral agreement and a related bilateral protocol. In December 2014, in response to U.S. sanctions over Russian actions in Ukraine, the Russian government ended nearly all nuclear security cooperation with the United States. Until then, the United States had been gradually transitioning responsibility to Russia for supporting its nuclear material security systems, and it was anticipated that the U.S. MPC&A program would continue to help Russia sustain its nuclear material security systems until January 1, 2018. See figure 1 for a timeline of major events during the period of cooperation. Starting with fiscal year 2015, and with each fiscal year since, language in annual appropriations laws and national defense authorization acts has largely prohibited NNSA from funding new efforts in Russia, including nuclear material security assistance, unless the prohibition is waived by the Secretary of Energy under certain conditions. Russia’s weapons-usable nuclear materials are stored and processed at more than two dozen sites overseen by a number of Russian entities, and the MPC&A program’s focus was on 25 of these sites at the time of our last report in 2010. The Russian State Corporation for Atomic Energy (Rosatom) is the Russian agency that manages much of Russia’s nuclear security enterprise, including seven nuclear weapons complex sites located in closed cities. These sites store and process the nuclear materials used in Russia’s nuclear weapons. Of the other 18 sites, many are overseen by Rosatom, but some are independent of Rosatom or managed by other Russian government entities. These sites often hold HEU and plutonium for research reactors or for other civilian purposes. See figure 2 for the location of the 25 Russian nuclear material sites. Other Russian government organizations with responsibilities in nuclear security include the following: Russian Ministry of Foreign Affairs (MFA). MFA is responsible for overseeing Russian policy and agreements for cooperation with the United States, including cooperation on nuclear security. Russian Federal Service of Environmental, Technological, and Nuclear Supervision (Rostekhnadzor). Rostekhnadzor is the regulator responsible for Russia’s civilian nuclear facilities. Russian Ministry of Industry and Trade (Minpromtorg). Minpromtorg coordinates nuclear material security activities and develops nuclear material security regulations for Russian naval shipbuilding sites, including Sevmash Shipyard, the primary builder of nuclear submarines for the Russian Navy. Russian Ministry of Defense. DOD and NNSA supported Russian efforts to secure Russian Ministry of Defense nuclear warheads and strategic rocket sites. That work is outside the scope of this report. The MPC&A program was the primary NNSA program that worked with Russia to help improve Russia’s ability to secure its nuclear materials and its nuclear warheads. To secure Russia’s nuclear materials, the program consisted of three main efforts: Site-level projects. NNSA managed MPC&A projects at the 25 Russian nuclear material sites to upgrade security systems at those sites. Teams of specialists from across DOE’s national laboratories, referred to as U.S. project teams, identified and carried out MPC&A upgrades on behalf of NNSA. MPC&A includes the following types of security systems, among other things: physical protection systems, such as fences around buildings containing nuclear materials and metal doors protecting rooms where nuclear materials are stored; material control systems, such as seals attached to nuclear material containers to indicate whether material has been stolen from the containers, and badge systems that allow only authorized personnel into areas containing nuclear material; and material accounting systems, such as nuclear measurement equipment and computerized databases to inventory the amount and type of nuclear material contained in specific buildings and to track their location. Material control and material accounting are collectively known as material control and accounting. National-level projects. NNSA managed cross-cutting projects to enhance Russia’s national-level infrastructure to sustain MPC&A systems for nuclear materials, including enhancing Russian nuclear security culture, developing Russian regulations for MPC&A operations, and strengthening Russian inspection and oversight capabilities. Sustainability support for individual sites. NNSA also fostered development of MPC&A sustainability practices and procedures at the Russian nuclear material sites based on seven sustainability elements, such as the presence at the site of an effective MPC&A management structure that plans, implements, tests, and evaluates the site’s MPC&A systems. Based on our review of available NNSA documentation and interviews with project team personnel, we found that NNSA had completed many— but not all—site-level MPC&A projects at the 25 Russian nuclear material sites when cooperation ended in 2014. NNSA also made progress on 11 cross-cutting projects that were intended to improve Russia’s national- level nuclear material security infrastructure. In addition, NNSA made progress on supporting the ability of the 25 Russian sites to sustain nuclear material security efforts. However, at the time cooperation ended, NNSA still had a number of concerns about both the sustainability of nuclear security efforts at the 25 sites and the state of Russia’s national- level nuclear material security infrastructure. Based on our review of available NNSA documentation and interviews with stakeholders, we determined that NNSA completed many MPC&A projects at the 25 Russian nuclear material sites, and stakeholders said that these upgrades significantly improved the state of nuclear material security at the sites. In particular, they told us that during the early years of the MPC&A program, the program completed upgrades focused primarily on the most significant security gaps, and in later years the program became more focused on transitioning the responsibility for sustaining nuclear security efforts to Russia. However, not all work was completed before cooperation ended, and project team members told us that the extent of completion varied by site. For example, project team members estimated that 90 percent of MPC&A projects were completed at one site, but that projects at other sites had lower levels of project completion. NNSA was unable to provide a complete set of documents detailing all projects completed and not completed across the 25 sites because several projects were consolidated into continuing programs and have not yet been closed out. In addition, the available site documentation did not always include detailed information on all projects completed or not completed. As a result we could not quantify how much planned work was completed and not completed when cooperation ended across all 25 sites. However, based on our review of available NNSA documents, we were able to identify many completed projects that included specific types of physical protection measures, material access controls, and material accounting upgrades. Project team members we interviewed and documentation we reviewed also indicated that some projects were not completed when cooperation ended. NNSA documentation identifies a variety of uncompleted projects at specific sites, such as not constructing or upgrading perimeter fencing, not replacing aging physical protection equipment, and not upgrading entry control points with vehicle radiation monitors. For example, at one site there were several kilometers of modernized perimeter fencing, guard towers, and sensors that had not been completely installed by the time cooperation ended, according to NNSA documents and project team members. Project team members told us that the site had plans to complete these projects. However, because Russia ended cooperation, the project team was unable to verify that the equipment was installed or operating appropriately. Similarly, project team members told us about two major efforts at another site that were terminated by Russia when cooperation ended: a $1 million project to relocate the guard force building to reduce the reaction time for protective forces and a $300,000 project to update software for the central alarm station and other security systems. According to project team members, the contracts were agreed to and associated costs obligated by NNSA, but Russia ended cooperation before signing the agreements. In addition, in our 2010 classified report, we found that NNSA faced challenges in implementing MPC&A upgrades against insider and outsider threats at some Russian nuclear material facilities to reduce the risk of material theft. At the time of the 2010 report, NNSA had proposed MPC&A upgrades at certain Russian sites to address these concerns, and GAO found that progress in implementing upgrades at some locations and in some MPC&A technical areas had been limited. For our classified report issued in December 2019, we asked NNSA for an update on the status of these upgrades; in response to our request, NNSA officials told us that due to a lack of cooperation, they had not received additional information from Russian counterparts to determine the status of these upgrades. In addition to site-level MPC&A security projects, NNSA managed 11 cross-cutting projects to support Russia’s national-level nuclear material security infrastructure, such as projects to enhance Russian nuclear security culture, develop Russian regulations for MPC&A operations, and strengthen Russian MPC&A inspection and oversight capabilities. We found that—at the time cooperation ended in 2014—NNSA had made substantial progress on its cross-cutting projects. NNSA reported that work was fully completed or mostly completed on at least 10 of the 11 cross-cutting projects by the time cooperation ended. However, NNSA could not provide complete documentation detailing the level of progress for some of these projects. See table 1 below for a description of these project areas. We found that NNSA had planned to do more work on some national- level projects, but that the end of cooperation in 2014 resulted in some planned work not being completed. For example, in the case of regulations development, project team members told us that the project teams had planned to develop numerous regulations with Rosatom, but these were not completed because of the end of cooperation. As part of its plan to shift to Russia the responsibility for nuclear material security efforts, NNSA supported the adoption of MPC&A sustainability practices and procedures at the individual Russian nuclear material sites based on seven “sustainability elements.” NNSA identified these elements, such as performance testing of systems to evaluate MPC&A effectiveness, as being fundamental to the long-term sustainability of a modern nuclear material security system. See table 2 below for more information about the seven sustainability elements. To determine a site’s ability to sustain its security systems, project teams periodically assessed each site based on the seven elements, and rated sites in each element on a scale from low to high. In our 2010 classified report, we reported the results of these sustainability assessments across the 25 Russian nuclear material sites and found that the MPC&A program had made limited progress and faced challenges in developing effective practices and procedures consistent with the seven elements of sustainability. For our classified report issued in December 2019, we reviewed and reported on the most recent sustainability assessments, largely conducted between 2012 and 2014. We compared the ratings from the most recently completed site sustainability assessments for the same 25 sites to the ratings we reported in 2010. We found that sustainability ratings generally improved, but low scores persisted at many sites and in some sustainability areas. For example, we found that the number of high ratings increased over this period by about half, and the number of low ratings decreased by about half. We believe this indicates general progress in improving sustainability across the sites. Of the seven sustainability elements, the MPC&A organization sustainability element was the element most frequently rated as “high” in the most recent assessment, and it showed the most improvement across the 25 sites. This indicates that the ability of Russian site organizations to plan and coordinate MPC&A operations had improved. We also found in our review of these assessments that NNSA had continuing concerns when cooperation ended about both the sustainability of MPC&A upgrades at individual Russian sites and the state of the national-level nuclear material security infrastructure in Russia. In their final reports after cooperation ended, U.S. project teams documented ongoing concerns with the sustainability of MPC&A upgrades at Russian nuclear material sites. We reviewed the concerns in the 25 final site summary documents and interviewed project team members who provided additional examples of these concerns. Based on our documentation review and interviews with project team members, we identified the six most common areas of concerns, including: (1) the responsiveness of protective forces, (2) performance testing the effectiveness of MPC&A systems, (3) sustainment funding, (4) physical protection systems, (5) nuclear security culture, and (6) access and cooperation at Russian sites. Stakeholders we interviewed highlighted a number of national-level concerns in other areas, such as the state of security equipment. Project team members were concerned that some of the equipment provided in the early years of cooperation had become outdated or obsolete by the time cooperation ended, such as surveillance cameras and monitoring equipment, and would need to be replaced. There is little specific information available about the current state of security at Russian nuclear material sites, though anecdotal evidence suggests that nuclear material security regulations have improved and that Russia funds some nuclear security efforts. We interviewed DOE officials and national laboratory personnel about security risks and threats to Russian nuclear material security. The details of these conversations are classified. However, according to nongovernmental experts we interviewed, the theft of nuclear materials by insiders is currently considered the greatest threat to Russia’s nuclear materials. According to stakeholders, little information is available about site-level security currently at the 25 sites holding Russian nuclear material, including the status of U.S. upgrades funded through the MPC&A program. Stakeholders told us that this is primarily because U.S. personnel no longer have access to the sites to observe security improvements and discuss MPC&A practices with Russian site personnel. According to DOE officials, the ability of U.S. project teams and other personnel to visit Russian nuclear material sites helped provide transparency into the state of Russian security at these facilities, such as the status of radiation portal monitors at entry points within nuclear material storage buildings. Since the end of cooperation, few U.S. personnel have visited Russia’s nuclear material sites, greatly limiting transparency into the status of U.S. security investments and Russian security practices. According to NNSA officials and U.S. project team personnel, NNSA documentation—such as the U.S. project team closeout documents that are referred to above—are based on observations primarily from 2014 or earlier. This documentation provides the most recent direct assessments of security at the site level. These officials stated that while such reports are useful for identifying the state of Russian nuclear material site security at the time cooperation ended, they likely do not provide an accurate picture of the nuclear material security at the 25 sites currently. Regarding national-level efforts in Russia to support nuclear security in the country, stakeholders we interviewed said that information exists in two main areas: development of nuclear security regulations and nuclear security funding. Development of nuclear security regulations. According to stakeholders, Russia has improved its nuclear security regulations in recent years, including since cooperation ended in 2014. Although U.S. efforts to help Rosatom develop modern MPC&A regulations ended in 2014, NNSA has continued work with Rostekhnadzor to improve Russian nuclear material security regulations through a national-level MPC&A sustainability project. Stakeholders said that this project has resulted in Russian nuclear security regulatory improvements. For example, this project provided technical support on 11 regulations, including regulations to improve vulnerability assessments of nuclear sites and nuclear materials in transit. However, stakeholders also noted some limitations. For example, they stated that compliance with regulations at nuclear material sites is mostly unknown. Similarly, the effectiveness of enforcement in cases of noncompliance is unknown, though fines are thought to be negligible. Nuclear security funding. Information on nuclear security funding is limited, according to stakeholders. Some stakeholders we interviewed stated that, based on their experiences and conversations with Russian officials, they believed that Russia was generally providing sufficient funding for nuclear material security at sites. However, others doubted that Russia was providing sufficient resources to replace the funding lost when the U.S. MPC&A program ended. Stakeholders generally agreed that funding for nuclear security likely varies by site. A few stakeholders expressed concern that security at nuclear material sites could be one of the first areas cut during an economic downturn, as nuclear security is not seen to be as significant a priority for site managers as other operations and revenue-generating activities at the sites. We interviewed DOE officials and national laboratory personnel about security risks and threats to Russian nuclear material security. The details of these conversations are classified. However, according to nongovernmental experts we interviewed, the theft of nuclear materials by insiders is currently considered the greatest threat to Russia’s nuclear materials. According to nongovernmental experts we interviewed, Russia’s nuclear security culture generally does not prioritize protection against the threat of nuclear material theft by insiders, a threat that modern nuclear security systems are designed and maintained to prevent. For example, experts said that Russian nuclear material site managers were more likely to devote resources—such as training, manpower, and funding— to measures that protect facilities from outsider threats, and less likely to devote resources to measures that protect facilities against insider threats. Experts told us that while the MPC&A program advanced Russian appreciation of the insider threat during the period of cooperation, they were concerned that—without U.S. influence and training—protection against insider threats would still be insufficient and likely ignored unless the Russian government required such protection, which was not the case when cooperation ended. As a result, according to experts, Russian sites are likely not currently supporting MPC&A systems adequately to counter insider threats. One nongovernmental expert noted that Russian security services have assumed greater control and tightened security in the closed cities that contain the vast majority of Russia’s nuclear materials, and that this may have reduced the near-term threat from insiders. However, according to this expert, over time this reliance on the security services could create vulnerabilities. For example, some Russian sites may rely too heavily on the physical security elements of nuclear security systems—such as guard forces—to protect nuclear materials and may become complacent in modernizing other elements, such as material control and accounting practices to deter and prevent insider theft risks, or measures that can protect against other emerging, nontraditional threats such as drone or cyber risks. According to nongovernmental experts, other factors in the country may also exacerbate the risk of theft posed by both outsiders and insiders to Russia’s nuclear materials. For example, experts said the existence of massive amounts of weapons-usable nuclear materials at many dispersed sites across Russia is the primary factor that makes Russia’s nuclear materials a greater threat than the nuclear materials held in most other countries. In addition, according to experts, persistent corruption and existing terrorist groups near some of the closed cities are other contributing factors that could further increase the risk of theft. According to stakeholders, there could be opportunities to help Russia improve aspects of its nuclear security system that NNSA and others identified as continuing risks. However, stakeholders noted that any future cooperation would likely be limited in scope and would face considerable political challenges. According to stakeholders we interviewed, there could be opportunities for future U.S.-Russia cooperation to address some of the continuing nuclear security risks in Russia. However, stakeholders said that any future cooperation would likely differ dramatically from the donor-recipient model of the past MPC&A program. The Russian government would likely expect to be treated as an equal and would not want to be seen as a recipient of U.S. funds for infrastructure improvements. Therefore, the scope of future cooperation would likely be a limited partnership, would primarily involve training and information sharing rather than directly supporting security upgrades at Russian sites, and would require fewer U.S. resources than the past MPC&A program did. Stakeholders told us that engagement and cooperation are important because of the size of the Russian nuclear complex, the large amounts of Russian nuclear material, and the continuing security concerns in certain areas. Stakeholders told us they believed there would be security benefits to the United States in resuming nuclear security cooperation with Russia in some form. Stakeholders generally identified increased transparency and advancing security best practices as the two main benefits to nuclear security cooperation. Stakeholders we spoke to identified examples of opportunities for cooperation that could support U.S. interests by providing information on the security of Russia’s nuclear materials and by helping Russia improve nuclear material security practices and procedures. These include the following: Exchange of best practices. Stakeholders noted that the United States and Russia could share MPC&A best practices in conferences and workshops. Best practices could cover areas such as performance testing of MPC&A systems, insider threat protection, and material control and accounting. Some stakeholders said that Russian expertise, such as in nuclear forensics, could increase U.S. knowledge and potentially improve U.S. practices in certain areas. Technical exchanges. Stakeholders told us that there could be benefits to both the United States and Russia from reciprocal technical exchanges or meetings of nuclear security experts to review specific, technical MPC&A practices that each country employs. National laboratory personnel noted that past exchanges under the MPC&A program allowed Russian personnel to view MPC&A systems at U.S. facilities, which helped Russian personnel understand the features of modern MPC&A systems, such as insider threat prevention measures. U.S. personnel participated in reciprocal visits to view security measures at sites in Russia, which helped them understand Russian security practices. Stakeholders told us that such technical exchanges could help U.S. personnel better understand the state of Russian nuclear security funding and current Russian practices. Training. Experts and national laboratory personnel noted that training Russian personnel on technical matters—such as how to conduct comprehensive vulnerability assessments—could improve Russian security practices. Conversations on legal agreements. Some stakeholders said that initiating conversations with Russia on the status of existing but suspended legal agreements could provide an opening for other forms of cooperation. For example, a few stakeholders mentioned an existing—but suspended—research and development agreement from 2013 under which future nuclear security cooperation might be pursued if both parties were interested in reactivating the agreement. Cooperation within multilateral organizations. Some stakeholders noted that existing multilateral organizations, such as the International Atomic Energy Agency (IAEA) and the Global Initiative to Combat Nuclear Terrorism, could provide venues for the United States to pursue cooperative opportunities with Russia. For example, Russia and the United States could cooperate on developing recommendations to the IAEA on physical protection measures for nuclear material, which could then be shared with IAEA member states. Other opportunities. The Nuclear Threat Initiative, a U.S. nongovernmental organization (NGO), and the Center for Energy and Security Studies, a Russian NGO, coauthored a report that identified 51 mutually beneficial opportunities to cooperate in nuclear security, nuclear safety, nuclear energy, nuclear science, and nuclear environmental remediation. For example, the report identifies an opportunity for Russian and U.S. experts to establish a joint research and development program to improve nuclear security technologies to address emerging threats to nuclear material storage sites, such as drones. Russia would likely insist that it and the United States be seen as equal partners under any future arrangement or program for cooperation on nuclear security, according to stakeholders. However, U.S. project team personnel told us that Russian nuclear material sites often lack the financial resources to pay travel costs for Russian personnel or to cover costs for venues or workshops necessary for training or the exchange of best practices. Therefore, the level of funding to support any potential future cooperation might be disproportionate between the United States and Russia. Because we were unable to obtain views from Russian officials and Russian nuclear material site representatives, we were unable to establish the extent to which Russia would be willing to pursue any form of nuclear material security cooperation with the United States, regardless of funding sources and requirements. Stakeholders we interviewed were generally pessimistic about cooperation under the current political and diplomatic climate, and they noted that the deterioration of political relations is the most significant challenge to any future cooperation. Stakeholders identified other specific challenges, including the following: Funding prohibition. Some stakeholders said that provisions in recent appropriations acts and National Defense Authorization Acts (NDAA) prohibiting NNSA from funding nuclear security activities in Russia have been obstacles to cooperating on nuclear security matters. In a report submitted to Congress in May 2019, NNSA stated that “the lack of ability to sign new contracts or engage on a modest scale denies NNSA the insights necessary to directly monitor nuclear material security in Russia and the sustainment of past security improvements.” According to U.S. officials and U.S. project team personnel, the prohibition largely prevents U.S. personnel from sharing best practices with and training Russian counterparts, and the existence of the prohibition discourages U.S. and Russian personnel from interacting and maintaining relationships. Although the acts allow the Secretary of Energy to waive the prohibition under certain conditions, no secretary has done so since a prohibition was first included in the fiscal year 2015 appropriations act. In addition, according to NNSA officials we interviewed, the language describing waiver requirements in NDAAs has become more restrictive in recent years. Initially, the Secretary of Energy could waive the prohibition on the basis of a notification to certain congressional committees that the waiver was in the national security interest of the United States, an accompanying justification, and the passage of 15 days. Starting with the fiscal year 2017 NDAA, however, a waiver can only be issued if it is necessary to address an urgent nuclear-related threat in Russia, and any such waiver requires concurrence from the Secretary of Defense and the Secretary of State. Russian conditions on cooperation. Stakeholders we interviewed said that Russia has set conditions on any future nuclear security cooperation. For example, they said that Russia has indicated that it is unwilling to discuss nuclear security cooperation with the United States unless the United States is willing to discuss related areas, such as nuclear energy, nuclear safety, and nuclear science. According to stakeholders, in the past the United States has been unwilling to discuss these other areas as a condition for cooperating on nuclear security. Russian antagonism to U.S. security efforts. Stakeholders noted antagonism at some levels of the Russian government toward U.S. nuclear security efforts. For example, although Russia participates in nuclear security efforts at the IAEA, some stakeholders noted that Russia regularly obstructs U.S. initiatives and recommendations in that organization. As noted above, stakeholders view the general deterioration of political relations between the United States and Russia as the greatest challenge to cooperation, and it is not clear whether Russia is prepared to reengage with the United States on these or other options for rekindling U.S.- Russian nuclear security cooperation. We reached out to the Russian government to request meetings with Russian government officials and representatives of nuclear material sites who could provide Russian perspectives on efforts to secure Russia’s nuclear materials, the status of past U.S. nuclear material security investments, and potential opportunities for cooperation. The Russian government declined our requests to meet with these officials and site representatives. Therefore, without Russian perspectives on the likelihood of possible future cooperation, we were unable to determine whether changes to U.S. policy, such as lifting the funding prohibition, would have any meaningful effect on the status of nuclear security cooperation between the United States and Russia. We provided a draft of the classified version of this report to NNSA for review and comment. NNSA had no comments on the report. We are sending copies of this product to the Senate Armed Services Committee, the NNSA Administrator, and the Secretaries of Defense and State. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. This report (1) examines the extent to which the National Nuclear Security Administration’s (NNSA) planned nuclear material security efforts in Russia were completed when cooperation ended and what nuclear security concerns remained, (2) describes what is known about the current state of nuclear material security in Russia, and (3) describes stakeholder views on potential opportunities for future U.S.-Russian nuclear security cooperation. For all three objectives, we identified and interviewed relevant stakeholders, including U.S. government officials from NNSA, the Department of Energy (DOE), the State Department, and the Department of Defense; experts on Russian nuclear security from academia and nongovernmental organizations (NGO); and knowledgeable personnel at six U.S. national laboratories that supported U.S. nuclear security efforts in Russia, including personnel at Brookhaven National Laboratory, Lawrence Livermore National Laboratory, Los Alamos National Laboratory, Oak Ridge National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratory. We identified the stakeholders by contacting government agencies and NGOs with nuclear security expertise and asking them to identify other knowledgeable stakeholders. We reached out to these other knowledgeable stakeholders and interviewed those who responded and were willing to speak with us. To identify nongovernmental experts, we compiled a list of individuals who stakeholders identified as having expertise in the area of nuclear security in Russia. We also worked with a staff librarian to conduct an independent search of published literature to identify nongovernmental experts who had authored multiple publications related to Russian nuclear security. In addition, to ascertain whether an individual should be considered a nongovernmental expert, we considered other information, such as invitations to speak at nuclear security panels, being an editor of nuclear security related journals, and relevant positions in academic and other nongovernmental institutions. We interviewed six nongovernmental experts who fit these criteria. To examine the extent to which NNSA’s planned nuclear material security efforts in Russia were completed when cooperation ended and what nuclear security concerns remained, we reviewed documents prepared by NNSA and the national laboratories for each of the 25 nuclear material sites in Russia where the United States worked previously with Russia to improve security. To identify NNSA sustainability programs at a national level, we reviewed GAO reports and NNSA project documentation. We also reviewed NNSA guidelines that detailed how project teams were to support and assess the ability of Russian sites to sustain their material protection, control, and accounting (MPC&A) systems. We reviewed the NNSA documents that assessed site sustainability and analyzed how site sustainability had changed at sites by the end of cooperation. These documents included project team assessments for each of the 25 sites in seven different sustainability elements. In these assessments, project teams provided ratings from low to high on the extent to which sites were prepared to sustain these areas. We also reviewed NNSA documents and identified concerns that site teams documented about site sustainability. We then analyzed the concerns from the 25 sites and grouped similar concerns into categories. We developed these categories based on the similarity of the concerns, definitions of key nuclear security areas in NNSA documents, and professional judgement. We then identified the six concerns that appeared most frequently, which accounted for about 70 percent of all concerns. To describe what is known about the current state of nuclear security in Russia—in addition to interviews with our stakeholder group—we reviewed U.S. government and open-source documents. Specifically, we reviewed reports from the International Panel on Fissile Materials, the Nuclear Threat Institute, the National Academies of Science, and a national laboratory; articles on Russian nuclear security; and periodic reports on Russian nuclear security published by an expert independent consultant. In addition to general internet searches for published documents relating to Russian nuclear security and the MPC&A program, we conducted literature searches of published materials with assistance from a staff librarian; we excluded from our literature review any search results that were published prior to 2014 or were not related to nuclear material security in Russia. In addition to unclassified interviews with U.S. government officials on Russian nuclear material security, we received classified briefings from DOE. We requested threat and risk information relating to Russian nuclear material security from the Central Intelligence Agency, but we were not provided this information. To describe stakeholder views on potential opportunities for future U.S.- Russia nuclear security cooperation, we interviewed those in our stakeholder group identified above. We also reviewed administration plans and reports, including the National Security Strategy, the National Strategy for Countering Weapons of Mass Destruction Terrorism, and NNSA’s May 2019 Report to Congress describing NNSA’s funding of nuclear security improvements in Russia. To inform our understanding of the prohibition on NNSA’s expenditures on nuclear security in Russia, we reviewed laws since fiscal year 2015 that restricted relevant NNSA funding in some way. In addition, to obtain Russian perspectives on nuclear material security and past U.S. efforts, we requested—through the State Department and the U.S. Embassy in Moscow—interviews with Russian officials at relevant Russian agencies and representatives at five Russian nuclear material sites. However, the Russian government declined our request to meet with these officials and representatives. David Trimble, (202) 512-3841 or trimbled@gao.gov In addition to the contact named above, William Hoehn (Assistant Director), Dave Messman (Analyst in Charge), and Dan Will made key contributions to this report. Antoinette Capaccio, Ellen Fried, Greg Marchand, Dan Royer, and Sara Sullivan also contributed to this report.", "summary": "Russia possesses the world's largest stockpile of weapons-usable nuclear materials, largely left over from the Cold War. These nuclear materials could be used to build a nuclear weapon if acquired by a rogue state or terrorist group. Starting in 1993, and for the next 2 decades, DOE worked with Russia to improve security at dozens of sites that contained these nuclear materials. In 2014, following Russian aggression in Ukraine and U.S. diplomatic responses, Russia ended nearly all nuclear security cooperation with the United States. The Senate report accompanying the Fiscal Year 2019 National Defense Authorization Act includes a provision for GAO to review NNSA's efforts to improve Russian nuclear material security. This report (1) examines the extent to which NNSA had completed its planned nuclear material security efforts when cooperation ended and what nuclear security concerns remained, (2) describes what is known about the current state of nuclear material security in Russia, and (3) describes stakeholder views on opportunities for future U.S.-Russian nuclear security cooperation. To address all three objectives, GAO interviewed U.S. government officials, personnel from DOE's national laboratories, and nongovernmental experts. In this report, GAO refers to all of these groups as stakeholders. GAO also reviewed relevant U.S. government plans, policies, and program documentation. GAO requested the opportunity to interview Russian officials and representatives at nuclear material sites for this review, but the Russian government denied this request. Over more than 2 decades starting in the early 1990s, the Department of Energy (DOE) and its National Nuclear Security Administration (NNSA) completed many of their planned efforts to improve nuclear material security in Russia, according to DOE documentation, U.S. government officials, and nuclear security experts. These efforts, carried out primarily through NNSA's Material Protection, Control, and Accounting (MPC&A) program, included a range of projects to upgrade security at dozens of Russian nuclear material sites, such as the installation of modern perimeter fencing, surveillance cameras, and equipment to track and account for nuclear material. However, not all planned upgrades were completed before cooperation ended in late 2014. NNSA also completed many—but not all—of its planned efforts to help Russia support its national-level security infrastructure, such as by helping improve the security of Russian nuclear materials in transit. In addition, NNSA made some progress in improving each site's ability to sustain its security systems, such as by training Russian site personnel on modern MPC&A practices and procedures. NNSA documentation that GAO reviewed showed that by the time cooperation ended, Russian sites had generally improved their ability to sustain their MPC&A systems, but this documentation showed that concerns remained. According to stakeholders, there is little specific information about the current state of security at Russian nuclear material sites because U.S. personnel no longer have access to sites to observe security systems and discuss MPC&A practices with Russian site personnel. However, stakeholders said there is some information on national-level efforts. Specifically, stakeholders said that Russia has improved regulations for some MPC&A practices, and there are signs that Russian sites receive funding for nuclear material security, though it is unlikely that Russian funding is sufficient to account for the loss of U.S. financial support. Regarding threats to Russia's nuclear material, nongovernmental experts GAO interviewed raised concerns about the risk of insider theft of Russian nuclear materials. Experts stated that it is likely that Russian sites have maintained nuclear material security systems to protect against threats from outsiders, but it is unlikely that sites are adequately protecting against the threat from insiders. Stakeholders said that there may be opportunities for limited future cooperation between the two countries to help improve Russian nuclear material security. Such opportunities could include technical exchanges and training. These opportunities could provide the United States with better information about the risk posed by Russia's nuclear materials and could help address areas of concern, such as by training Russian personnel to help sites better address the insider threat. However, any potential cooperation faces considerable challenges, according to stakeholders, most notably the deterioration of political relations between the two countries. In addition, stakeholders said that cooperation is challenged by current U.S. law, which generally prohibits NNSA from funding nuclear security activities in Russia; by Russian antagonism toward U.S. proposals to improve nuclear material security internationally; and by Russian conditions for cooperation that the United States has not been willing to meet.", "document_type": "gao"}
{"report": "Prior to the enactment of the CFO Act, government reports found that agencies lost billions of dollars through fraud, waste, abuse, and mismanagement. These reports painted the picture of a government unable to properly manage its programs, protect its assets, or provide taxpayers with the effective and economical services they expected. Reported financial management problems included (1) unreliable financial information driven by widespread weaknesses in agency internal controls over financial reporting and obsolete and inefficient agency financial management systems and (2) financial reporting practices that did not accurately disclose the current and probable future cost of operating, permit adequate comparison of actual costs among executive branch agencies, or provide the timely information required for efficient program management. For example, in 1988, we reported on internal control problems such as the Department of Defense being unable to account for hundreds of millions of dollars in advances paid by foreign customers for equipment, weak controls permitting things such as over $50 million in undetected fraudulent insurance claims paid by the Federal Crop Insurance Corporation, millions of dollars in interest penalties because agencies paid 25 percent of their bills late, and over $350 million in lost interest because agencies paid their bills too soon. In 1990, Congress mandated financial management reform through enactment of the CFO Act. The CFO Act was the most comprehensive and far-reaching financial management improvement legislation enacted since the Budget and Accounting Procedures Act of 1950. The CFO Act established a Controller position at the government-wide level and a CFO position for each of the agencies identified in the act (referred to as the CFO Act agencies), provided for long-range planning, and began the process of preparing and independently auditing federal agency financial statements. The act aimed to strengthen internal controls, integration of agency accounting and financial management systems, financial reporting practices, and the financial management workforce. The act also called for systematic performance measurement and cost information. As figure 1 shows, a number of other financial management reforms were subsequently enacted to help improve federal financial management, some of which I will briefly discuss in my statement today. A chronological list of statutes cited in this report and selected additional financial management reforms is included in appendix II. The federal government has made substantial progress toward improving financial management and achieving the purposes of the CFO Act. Table 1 highlights some of the progress that has been made. The centralized leadership structures envisioned by the CFO Act—a Controller position at the government-wide level and a CFO position at each CFO Act agency—have been established. OMB’s Deputy Director for Management and Office of Federal Financial Management, headed by the Controller and Deputy Controller, have led reform efforts by developing and periodically updating guidance and initiatives in areas such as financial management systems, auditing, financial reporting, internal control, and grants management. The CFO Act also required OMB to submit to Congress, annually, a 5- year plan for improving financial management—mirrored in corresponding CFO Act agency plans. Among other things, the plan required a description of the existing financial management structure and changes needed; a strategy for developing adequate, consistent, and timely financial information; proposals for eliminating unneeded systems; identification of workforce needs and actions to ensure that those needs are met; a plan for the audit of financial statements of executive branch agencies; and an estimate of the costs for implementing the plan. The CFO Act also required annual financial management status reports government-wide and for executive branch agencies. From 1992 to 2009, OMB annually prepared comprehensive 5-year government-wide financial management plans. Agency CFOs have significantly contributed to improvements in financial management. According to the survey we issued to CFOs and deputy CFOs, some of these improvements include advising executive leadership on financial management matters and direction for agency financial operations and professional financial management personnel; taking steps to develop and maintain financial management systems; reducing duplicative financial management systems; resolving audit findings; supporting audits of the agency’s financial statements; helping to ensure the quality of financial information, and preparing the agency financial report and other financial reports. In addition, the CFO Council periodically met to advise and coordinate activities and initiatives, including those related to internal controls, financial management systems, and enterprise risk management. OMB stated that the CFO Council is also working on a workforce plan. In addition, the Department of the Treasury (Treasury) made contributions to improving federal financial management. Among other things, Treasury has developed and periodically updated government-wide guidance and tools to support federal financial reporting; issued, in coordination with OMB, the Financial Report of the U.S. Government since fiscal year 1997, which includes the government-wide consolidated financial statements; and developed a long-term vision for improving federal financial management. In 2010, Treasury established the Office of Financial Innovation and Transformation, which identifies and facilitates the implementation of innovative solutions to help agencies become more efficient and transparent, and Treasury also issues an annual message to agency CFOs to set the direction and goals of federal financial management. In 1990, OMB, Treasury, and GAO jointly established the Federal Accounting Standards Advisory Board (FASAB) to develop and promulgate accounting standards and principles for financial reporting in the federal government. In 1999, FASAB was recognized by the American Institute of Certified Public Accountants as the standard setter for generally accepted accounting principles for federal government entities. FASAB has issued 57 statements of federal financial accounting standards (SFFAS) that provide greater transparency and accountability over the federal government’s operations and financial condition, including SFFAS 36, Comprehensive Long-Term Projections for the U.S. Government, which requires the Statement of Long-Term Fiscal Projections as part of the government-wide consolidated financial statements. In addition, OMB, Treasury, and GAO have regularly provided guidance to agencies that improves transparency, consistency, and usefulness of financial reporting. Agencies have significantly improved the quality and timeliness of their financial reporting since the enactment of the CFO Act. As expanded by the Government Management Reform Act of 1994 (GMRA) and the Accountability of Tax Dollars Act of 2002 (ATDA), federal law now requires every CFO Act agency and most other executive agencies to annually prepare audited financial statements no later than March 1—5 months after the end of the federal fiscal year. However, OMB has accelerated this due date for audited financial statements. For the first time, for fiscal year 2005, all CFO Act agencies completed their audited financial statements by November 15, approximately 45 days after the close of the fiscal year, compared to the 60–90 day requirement for public companies filing with the Securities and Exchange Commission. For fiscal year 1996, the first year that all CFO Act agencies were required to prepare audited financial statements, six CFO Act agencies received an unmodified (“clean”) audit opinion on their respective entities’ financial statements, compared with 22 CFO Act agencies that received clean audit opinions for fiscal year 2018. Today, to demonstrate transparency and accountability to Congress and citizens, the CFO Act agencies make their annual performance reports and annual financial reports, which include audited financial statements, available on their websites. In addition, since fiscal year 1997, Treasury, in coordination with OMB, has annually prepared government-wide consolidated financial statements, which are available on Treasury’s website. Substantial benefits have been achieved as a result of the preparation and audit of financial statements, which provide useful and necessary insight into government operations, including federal agency accountability to Congress and citizens, including independent assurance about the reliability of reported financial information; greater confidence to stakeholders (governance officials, taxpayers, consumers, or regulated entities) that federal funds are being properly accounted for and assets are properly safeguarded; an assessment of the reliability and effectiveness of systems and related internal controls, including identifying control deficiencies that could lead to fraud, waste, and abuse; a focus on information security; early warnings of emerging financial management issues; and identification of noncompliance with laws and regulations, which can present challenges to agency operations. Our CFO survey respondents (18 of 23) agreed that preparation and audit of financial statements are greatly or moderately beneficial to federal agencies, noting that the financial audit process helped identify and eliminate material weaknesses in internal control, greatly strengthened internal control processes, and led to more discipline and integrity in federal accounting. Continuation of annual agency financial statement audits is critical to maintaining accountability and sustaining financial management improvements. Also, independent assurance that financial management information included in agency financial statements is fairly stated is an important element of accountability and provides agency management, OMB, Treasury, Congress, and citizens with assurances that the information is reliable and properly accounted for. A key goal of the CFO Act was to improve internal control to reasonably assure that the federal government’s financial management information is reliable, useful, and timely. Compared with 1990, internal control is markedly stronger. The number of material weaknesses in internal control over financial reporting—significant issues that create the potential for inaccurate financial information that would change or influence the judgment of a reasonable financial report user relying on the information—reported as part of financial statement audits has been significantly reduced. For fiscal year 2005, financial statement auditors reported no identified material weaknesses for only seven of 24 CFO Act agencies, based on their financial statement audits; by 2018, that number had doubled to 14. In addition, auditors identified and agencies fixed thousands of internal control problems over the past 3 decades. Further, Treasury and OMB have addressed many of the internal control problems related to the processes used to prepare the U.S. government’s consolidated financial statements. However, some internal control problems are long-standing, complex, and not quickly resolved, such as accounting for transactions between federal agencies. Annual financial statement audits also uncovered the significance of improper payments and prompted legislation to strengthen controls over improper payments. Agencies have made progress in estimating the amount of improper payments and implementing efforts to reduce them, but this remains an area of concern. We have reported improper payments as a material deficiency or weakness since the fiscal year 1997 initial audit of the U.S. government’s consolidated financial statements. For fiscal year 2018, 79 programs across 20 agencies reported estimated improper payments totaling about $151 billion. Since fiscal year 2003— when certain agencies were required to begin reporting estimated improper payments—cumulative improper payment estimates have totaled about $1.5 trillion. The annual financial statement audits, which include an assessment of information systems controls, surfaced widespread information security weaknesses. Since fiscal year 1997, we have reported information security as a material weakness in the audit of the U.S. government’s consolidated financial statements. We have also reported information security as a government-wide high-risk area since 1997. To address information security challenges surfaced by federal agency audits, Congress enacted the Federal Information Security Management Act of 2002 and its successor, the Federal Information Security Modernization Act of 2014. These laws require agencies to develop, document, and implement programs to provide security for the information and information systems that support agency operations and assets. One key purpose of the CFO Act and of the Federal Financial Management Improvement Act of 1996 (FFMIA) that followed was to improve federal agencies’ financial management systems. FFMIA requires CFO Act agencies to maintain financial management systems that substantially comply with (1) federal financial management systems requirements, (2) applicable federal accounting standards, and (3) the U.S. Government Standard General Ledger at the transaction level. Agencies have improved their compliance with FFMIA requirements. For fiscal year 2018, auditors reported that 16 of 24 CFO Act agencies’ financial systems substantially comply with FFMIA’s systems requirements for fiscal year 2018, up from four agencies in fiscal year 1997. Federal agencies have taken steps to implement new financial systems. While progress has been made in modernizing financial management systems, we have previously reported that efforts to modernize financial management systems have often exceeded budgeted cost, resulted in delays in delivery dates, and did not provide the anticipated system functionality and performance. For example, one-half (12 of 24) of the CFOs and deputy CFOs who responded to our survey indicated that they still use old systems and use obsolete software or hardware to perform financial management responsibilities. Some agencies have used migration of financial systems to external providers as part of their system modernization efforts, but others have experienced challenges in using shared services. For example, some CFO Act agencies have had difficulty in finding a provider with sufficient capacity and decided to modernize their financial system internally. Others that have attempted to move their financial system to a shared service provider failed to meet their cost, schedule, and performance goals. The federal government also has taken action aimed at reducing duplicative efforts by increasing agencies’ use of shared services for commonly used computer applications—such as payroll or travel. Over the past 15 years, there have been some notable shared services successes. For example, consolidating payroll services resulted in more than $1 billion in cost savings and cost avoidance over 10 years, according to Office of Personnel Management (OPM) estimates. In April 2019, OMB issued Memorandum M-19-16 on shared services, which among other things described the process and desired outcomes for shared services and established a governance and accountability model for achieving them. To help achieve the CFO Act’s purposes, the federal government established a financial management workforce structure, improving the quality of the federal workforce. Since then, steps have been taken to strengthen the federal financial management workforce, including the following: In 2000, the CFO Council and OPM worked together to align qualifications standards for accounting, auditing, and budget competencies with emerging financial management position requirements. In 2002, Congress and the President enacted legislation to empower OPM to provide agencies with additional authorities and flexibilities to manage the federal workforce and created the chief human capital officer (CHCO) positions and the CHCO Council to advise and assist agency leaders in their human capital efforts. In 2011, OPM and the CHCO Council created a working group that identified critical skills gaps in six government-wide, mission-critical occupations, including that of auditor. In 2017, OPM published a regulation requiring each CFO Act agency to develop a human capital operating plan describing agency-specific skills and competency gaps that are selected for closure and the strategies that will be implemented. While substantial progress has been made, additional attention is needed in several areas to help fully achieve the vision of the CFO Act and, in doing so, improve and modernize federal financial management. Based on the preliminary results from our ongoing review, we have identified several opportunities for enhancements that could help ensure that the CFO Act reaches its full potential. 1. To help ensure uniform responsibility, enhance strategic decision- making, and correct inconsistencies across government, amend agency CFO’s statutory responsibilities to ensure that they include all of the responsibilities necessary to effectively carry out financial management activities. Currently, responsibilities vary across agencies and do not include all key responsibilities that CFOs should possess. 2. To help ensure continuity in agency financial management operations when CFO vacancies occur, establish appropriate statutory responsibilities for deputy CFOs. This would minimize the effects of inevitable turnover in CFO positions. 3. Based on the maturity of federal financial management, extend the reporting frequency of the government-wide and agency-level financial management plans from annually to at least every 4 years (with timing to match the Government Performance and Results Act reporting requirements). In addition to the current government-wide financial management plan requirements, the plans should include actions for improving financial management systems, strengthening the federal financial management workforce, and better linking performance and cost information for decision-making. The government-wide plan should also include key selected financial management performance-based metrics. It is our view that OMB and Treasury should consult with the CFO Council, the Chief Information Officer Council, the Council of the Inspectors General on Integrity and Efficiency, GAO, and other appropriate financial management experts in preparing the government-wide plan. 4. To provide more complete and consistent measurement of the quality of agencies’ financial management, require OMB to develop, in consultation with the CFO Council, key selected performance-based metrics to assess the quality of an agency’s financial management, and changes therein. Examples of potential metrics include the number of internal control deficiencies, the number of internal control deficiencies corrected during the year, and the number of Antideficiency Act violations.The metrics should be included in the government-wide and agency-level financial management plans discussed above and agencies’ performance against the metrics reported in the annual status reports. Also, consider requiring auditor testing and reporting on the reliability of each agency’s reported performance against the metrics. 5. To reasonably assure that key financial management information that an agency uses is reliable, require agency management to (1) identify key financial management information, in addition to financial statements, needed for effective financial management and decision- making and (2) annually assess and report on the effectiveness of internal control over financial reporting and other key financial management information. Also, consider requiring auditor testing and reporting on internal control over financial reporting and other key financial management information. We provided a draft of the progress and opportunities for enhancements to OMB, Treasury, and OPM. OPM provided technical comments. OMB and Treasury generally agreed with enhancements 1 and 2, regarding CFOs’ and deputy CFOs’ statutory responsibilities. OMB generally disagreed with enhancement 3, regarding preparation of government- wide and agency-level financial management plans, stating that developing government-wide plans poses an administrative burden and is no longer relevant in light of the current state of financial management. However, we believe that a complete and integrated government-wide plan could help to ensure continuity in direction and a comprehensive understanding of the status and financial management challenges across government. Eight of the 10 financial experts we interviewed stated that without a government-wide financial management plan, the government lacks a clear strategic direction and agency improvement efforts may not appropriately address government-wide priorities. For enhancement 4, regarding performance metrics for agencies’ financial management, OMB generally disagreed, stating that it would be difficult to develop additional metrics that would apply to all agencies. We recognize the challenges in developing the metrics but continue to believe that a limited number of key metrics can be developed to effectively assess the quality of agencies’ financial management. For enhancement 5, regarding identifying key financial management information and assessing, reporting, and auditing internal control, Treasury generally agreed and OMB generally disagreed, noting that no action is needed and these controls are adequately addressed under existing initiatives and the enterprise risk management program contained in OMB guidance. We believe that a separate assessment is needed to reasonably assure that key agency financial management information used by the agency is reliable. Chairman Enzi, Ranking Member Sanders, and Members of the Committee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Dawn B. Simpson, Director, Financial Management and Assurance, at (202) 512-3406 or simpsondb@gao.gov or Robert F. Dacey, Chief Accountant, at (202) 512-3406 or daceyr@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Phyllis Anderson (Assistant Director), LaDonna Towler (Assistant Director), Beryl Davis (Director), David Ballard, Jeremy Choi, Anthony Clark, Patrick Frey, Ryan Guthrie, Isabella Hur, Jason Kelly, Jason Kirwan, Chris Klemmer, Michael LaForge, Jill Lacey, Diana Lee, Christy Ley, Keegan Maguigan, Lisa Motley, Heena Patel, Matthew Valenta, Walter Vance, and William Ye. This testimony highlights some of the most significant achievements in federal government financial management since enactment of the Chief Financial Officers Act of 1990 (CFO Act) and some preliminary observations on how federal financial management can be enhanced. The information in this testimony is based on our ongoing review and analysis of relevant legislation; federal financial management guidance, such as Office of Management and Budget (OMB) circulars; reports on financial management issued by the Government Accountability Office (GAO), agency offices of inspector general, and others; summarization of interviews and a panel discussion with experts in federal financial management; and summarization of results of GAO surveys to federal chief financial officers (CFO), inspectors general (IG), and independent public accountants (IPA). To obtain perspectives of agency personnel on federal financial management, we developed and administered two web-based surveys from May 22, 2019, through August 5, 2019. We administered one survey to 47 individuals from the CFO offices of the CFO Act agencies and included individuals holding the position of CFO, acting CFO, deputy CFO, or equivalent at these agencies as of May 1, 2019. Of the 47 individuals we surveyed, 24 individuals responded, which resulted in a 51 percent response rate. We administered the other survey to 53 individuals holding the position of IG, deputy IG, or counsel to the IG at the CFO Act agencies as of May 1, 2019, and an additional 24 IPAs who have performed financial statement audits for these agencies since fiscal year 2014. Of the 77 individuals we surveyed, 29 individuals responded, which resulted in a 38 percent response rate. Results of both surveys only represent the views of those individuals who responded to the surveys and may not be representative of all individuals from the CFO offices, IG offices, or IPA offices of the CFO Act agencies. In May 2019, we hosted an expert meeting with the theme “CFO Act - Progress and Challenges.” When planning the meeting, we considered experts with a broad array of expertise. We had a total of eight experts participate, representing both the federal and private sectors. They included individuals who had served in auditing capacities and individuals who had represented federal entities being audited. Some experts were currently serving in their roles, and others had retired. Including experts with both present and past experiences helped to ensure an examination and discussion of the history of the CFO Act from its inception to the present. Topics for discussion included progress and challenges since enactment of the CFO Act, the role of the Department of the Treasury (Treasury) and OMB with regard to the act, and suggestions for improvements to financial management processes and systems. The meeting transcript was categorized by key points, including progress, challenges, OMB’s and Treasury’s roles, government-wide plans, financial management systems, shared services, leading practices, and proposed reforms or suggestions for improvements. Budget and Accounting Procedures Act of 1950, ch. 946 §§ 110-118, 64 Stat. 834 (Sept. 12, 1950). Federal Managers’ Financial Integrity Act of 1982, Pub. L. No. 97-255, 96 Stat. 814 (Sept. 8, 1982), codified at 31 U.S.C. § 3512(c), (d). Chief Financial Officers Act of 1990, Pub. L. No. 101-576, 104 Stat. 2838 (Nov. 15, 1990). Government Performance and Results Act of 1993, Pub. L. No. 103-62, 107 Stat. 287 (Aug. 3, 1993). Government Management Reform Act of 1994, Pub. L. No. 103-356, title IV, § 405, 108 Stat. 3410, 3415 (Oct. 13, 1994). Clinger-Cohen Act of 1996, Pub. L. No. 104-106, div. D & E, 110 Stat. 642 (Feb. 10, 1996), codified as amended at 40 U.S.C. § 11101, et seq. Federal Financial Management Improvement Act of 1996, Pub. L. No. 104-208, div. A, § 101(f), title VIII, 110 Stat. 3009-389 (Sept. 30, 1996), codified at 31 U.S.C. § 3512 note. Reports Consolidation Act of 2000, Pub. L. No. 106-531, 114 Stat. 2537 (Nov. 22, 2000), codified as amended at 31 U.S.C. § 3516. Accountability of Tax Dollars Act of 2002, Pub. L. No. 107-289, 116 Stat. 2049 (Nov. 7, 2002). Chief Human Capital Officers Act of 2002, Pub. L. No. 107-296, title XIII, subtitle A, 116 Stat. 2135, 2287 (Nov. 25, 2002). Improper Payments Information Act of 2002, Pub. L. No. 107-300, 116 Stat. 2350 (Nov. 26, 2002), codified as amended at 31 U.S.C. § 3321 note. Federal Information Security Management Act of 2002, Pub. L. No. 107- 347, title III, 116 Stat. 2899, 2946 (Dec. 17, 2002), codified as amended at 44 U.S.C. §§ 3551-3558. Department of Homeland Security Financial Accountability Act, Pub. L. No. 108-330, 118 Stat. 1275 (Oct. 16, 2004). Federal Funding Accountability and Transparency Act of 2006, Pub. L. No. 109-282, 120 Stat. 1186 (Sept. 26, 2006), codified as amended at 31 U.S.C. § 6101 note. Improper Payments Elimination and Recovery Act of 2010, Pub. L. No. 111-204, 124 Stat. 2224 (July 22, 2010), codified as amended at 31 U.S.C. § 3321 note. GPRA Modernization Act of 2010, Pub. L. No. 111-352, 124 Stat. 3866 (Jan. 4, 2011). Improper Payments Elimination and Recovery Improvement Act of 2012, Pub. L. No. 112-248, 126 Stat. 2390 (Jan. 10, 2013), codified as amended at 31 U.S.C. § 3321 note. Digital Accountability and Transparency Act of 2014, Pub. L. No. 113-101, 128 Stat. 1146 (May 9, 2014), codified at 31 U.S.C. § 6101 note. Federal Information Security Modernization Act of 2014, Pub. L. No. 113- 283, (Dec. 18, 2014), codified at 44 U.S.C. §§ 3551-3558. Carl Levin and Howard P. ‘Buck’ McKeon National Defense Authorization Act for Fiscal Year 2015, Pub. L. No. 113-291, div. A, title VIII, subtitle D, 128 Stat. 3292, 3438-3450 (Dec. 19, 2014) (commonly referred to as the Federal Information Technology Acquisition Reform Act). Federal Improper Payments Coordination Act of 2015, Pub. L. No. 114- 109, 129 Stat. 2225 (Dec. 18, 2015). Fraud Reduction and Data Analytics Act of 2015, Pub. L. No. 114-186, 130 Stat. 546 (June 30, 2016). National Defense Authorization Act for Fiscal Year 2018, Pub. L. No. 115- 91, div. A, title X, subtitle G, 131 Stat. 1283, 1586 (Dec. 12, 2017), codified at 40 U.S.C. § 11301 note (commonly referred to as the Modernizing Government Technology Act). Foundations for Evidence-Based Policymaking Act of 2018, Pub. L. No. 115-435, 132 Stat. 5529 (Jan. 14, 2019). The CFO Act provided agency CFOs with broad responsibilities for all financial management activities of their respective agencies, including financial management systems (including financial reporting and internal controls); agency financial management personnel, activities, and operations; preparation of financial statements; and monitoring of budget execution. The specific responsibilities assigned to CFOs vary among agencies and are inconsistent government-wide. We previously reported that CFO Act agencies need to ensure that CFOs possess the necessary authorities within their agencies to achieve change. For instance, because of the interdependency of the budget and accounting functions, some agencies have included both budget formulation and execution functions under the CFO’s authority while others have not. Most financial experts we interviewed agreed and the CFO Council and the Council of the Inspectors General on Integrity and Efficiency (CIGIE) reported that to allow for better strategic decision-making, CFO responsibilities should include budget formulation and execution, planning and performance, risk management and internal controls, financial systems, and accounting. Most experts agreed that standardizing the CFO portfolio across agencies would promote standardized financial management training and education and consistent skill sets across agencies, both at the executive and staff levels. The CFO Council and CIGIE have identified turnover of agency CFOs, even during the same administration, as a significant challenge. They also stated that major financial management improvement initiatives can take years to fully implement and realize, often outlasting the average tenure of a political appointee to a CFO position. With frequent CFO turnover and potentially lengthy intervals between official appointments, long-term planning and leadership continuity can be affected because career deputy CFOs, who frequently serve as acting CFOs during CFO vacancies, do not always have the same breadth of responsibilities as CFOs. Deputy CFOs can be better prepared to act for CFOs when there are vacancies if appropriate responsibilities are established for deputy CFOs. In our survey to CFOs and deputy CFOs, 17 of 24 respondents stated that the deputy CFO position should include all, most, or many of the same responsibilities as the CFO position. Additionally, some respondents to our survey replied that it is important for the deputy CFO to be able to step into the CFO position should there be a vacancy. CIGIE also said that deputy CFOs should be sufficiently empowered with more standard responsibilities to ensure effective succession planning. The CFO Act called for annual comprehensive government-wide 5-year plans for improving federal financial management. It also called for each agency CFO to annually prepare a plan to implement the government- wide plan prepared by the Office of Management and Budget (OMB). Moreover, it required annual government-wide and agency-level status reports. The OMB plans and status reports were to be submitted to Congress to enable comprehensive congressional oversight. Since it issued the 2009 report, OMB has neither prepared nor submitted to Congress the annual 5-year government-wide plans as required by the CFO Act. Instead, OMB stated that it is meeting the intent of the requirement by providing information in the President’s Management Agenda (PMA), in the annual government-wide consolidated financial statements, and in documents placed on Performance.gov and the CFO Council’s website. For the consolidated financial statements, the information is included in a section in the Management’s Discussion and Analysis (MD&A) entitled Financial Management. This section discusses several of the priorities and accomplishments in financial management for the prior and current fiscal years and in some cases discusses goals for the next fiscal year. In addition, according to OMB, financial management elements are being considered in implementing the 2018 PMA. The CFO Council, in coordination with OMB, has identified six financial management cross- agency priorities and is developing detailed plans for each. Two of these plans, results-oriented accountability for grants and getting payments right, have been completed and posted on Performance.gov. The others are being managed by executive steering committees comprising CFO Council–approved members. While the various MD&A Financial Management sections, the PMA, and other OMB documents contain relevant information about improvements in financial management, these documents do not provide a complete and integrated financial management strategy for making continued improvements and for reporting on the administration’s accomplishments in a comprehensive manner. In 2019, OMB proposed eliminating the CFO Act requirement for a separate comprehensive plan, arguing that this change would provide it with flexibility to report information that is most relevant to financial management in a manner that is most efficient. However, having a complete and integrated financial management plan would help to address long-standing, costly, and challenging concerns in financial management in a strategic, comprehensive, efficient, and cost-effective manner. Eight of the 10 financial experts we interviewed stated that without a government-wide financial management plan, the government lacks a clear strategic direction and agency improvement efforts may not appropriately address government-wide priorities. To hold people accountable and facilitate congressional oversight, a complete and integrated financial management plan should include the resources required and measure progress through interim milestones with completion dates. Several experts also stated that they believe that a government-wide plan should be done every few years instead of annually, but that the status report could continue to be prepared annually. A complete and integrated government-wide financial management plan and supporting agency plans, prepared every few years, could help ensure continuity in direction and a more comprehensive understanding of gauging progress toward addressing financial management challenges across government. The CFO Act calls for agencies to (1) develop and maintain integrated accounting and financial management systems that provide for, among other things, systematic measurement of performance and (2) develop and report cost information. While the Government Performance and Results Act of 1993 (GPRA) laid a foundation for results-oriented management, we found that agencies’ reported use of performance data to make decisions has generally not improved. While agencies have made efforts in this direction, opportunity exists to enhance the availability and reliability of performance and cost information, and better link this information for decision-making. One example of this is linking program performance to program cost. A number of agencies have implemented activity-based costing, which creates a cost model of an organization by identifying the activities performed, the resources consumed, and the outputs (products and services) that an organization produces. However, linking cost and performance information for effective decision-making has been challenging. Respondents to our CFO survey noted that agencies face challenges in (1) developing and maintaining an integrated agency accounting and financial management system (19 of 24 respondents), (2) developing and reporting cost information (19 of 24 respondents), and (3) having financial management systems that produce the needed financial data to help address agency performance goals (21 of 24 respondents). Agencies that lack readily available, reliable, and linked performance and cost information may not be able to effectively make financial management decisions that are based on dollars allocated and results achieved and thus may miss opportunities to reduce costs or enhance mission effectiveness. Agencies have limited financial management performance-based metrics (e.g., financial statement audit opinion and number of reported material weaknesses in internal control over financial reporting) to help them assess the quality of their financial management. A broader set of key selected financial management performance-based metrics can provide more complete analysis across the breadth of financial management functions. Examples of potential metrics include the number of internal control deficiencies, the number of internal control deficiencies corrected during the year, and the number of Antideficiency Act violations. Key selected financial management performance-based metrics, including identifying metrics in the government-wide and agency-level plans discussed above and reporting of agency performance against the metrics in the annual status reports, can help ensure that the federal government better manages and uses the resources entrusted to it. Also, auditor testing and reporting on each agency’s reported performance against the metrics can provide assurance that such information is reliable. The CFO Act required CFOs to develop and maintain an integrated agency accounting and financial management system that provides for complete, reliable, consistent, and timely information prepared on a uniform basis and that responds to agency management’s financial information needs. To ensure the reliability of financial information, agencies need effective internal controls. While agencies have made important progress in strengthening internal control, as noted earlier, the federal government faces many internal control problems. The following discusses three areas: assessing internal control over key financial management information, government-wide improper payments, and material weaknesses preventing an opinion on the U.S. government’s consolidated financial statements. Management may not have reasonable assurance that internal control over financial reporting and other key financial management information that the agency uses is reliable. Since fiscal year 1997, agency auditors’ assessments of the effectiveness of internal control over financial reporting have identified long-standing, as well as new, material weaknesses. As a result of new material weaknesses, a number of agencies have not been able to sustain “clean” audit opinions on their financial statements. In addition, continuing material weaknesses have hindered two CFO Act agencies, the Departments of Defense and Housing and Urban Development, and the government as a whole, from achieving clean audit opinions. For fiscal year 2018, auditors of CFO Act agencies reported a total of 41 material weaknesses. One key to strengthening internal control over financial reporting at federal entities has been OMB Circular No. A-123, which carries out OMB’s responsibility to provide guidelines for agencies to follow in evaluating their systems of internal control. In December 2004, OMB issued A-123, Appendix A, Internal Controls over Financial Reporting, which provided a methodology with which agency management could assess, document, and report on internal control over financial reporting. It emphasized management’s responsibility for establishing and maintaining effective internal control over financial reporting. Appendix A required CFO Act agency management to annually assess the adequacy of internal control over financial reporting, provide a report on identified material weaknesses and corrective actions, and provide separate assurance on the effectiveness of the agency’s internal control over financial reporting. The CFO Council subsequently issued the Implementation Guide for Appendix A in 2005. In 2018, OMB reported that since the issuance of OMB Circular No. A- 123’s Appendix A, federal agencies have made substantial progress in improving their internal controls over financial reporting. OMB referred to this as a rigorous process for agencies to separately assess internal control over financial reporting. Beginning in fiscal year 2018, however, OMB no longer requires such a process. On June 6, 2018, OMB issued an updated Appendix A, Management of Reporting and Data Integrity Risk. The revised Appendix A integrates internal control over reporting, along with internal controls over operations and compliance, in an overall assessment of the agency’s internal control. This reporting guidance includes internal control over financial reporting as well as over other financial and nonfinancial information. It also requires that agencies develop and maintain a data quality plan that considers the risks to data quality in federal spending data required by the Digital Accountability and Transparency Act of 2014 (DATA Act) and any controls that would manage such risks in accordance with OMB Circular No. A-123. Further, agency senior accountable officials are required to certify each quarter, among other things, that their data submissions under the DATA Act are valid and reliable. However, the appendix does not require a separate management assessment of internal controls over the reliability of federal spending data. As we previously reported, there are significant data quality problems related to the completeness and accuracy of DATA Act data. In addition, the Federal Financial Management Improvement Act of 1996 (FFMIA) requires CFO Act agencies and their auditors to determine whether agency financial management systems comply substantially with federal financial management systems requirements. However, such systems requirements are focused on preparing agency financial statements and do not generally include system requirements related to other key financial management information (e.g., performance information and cost information) needed for management decision- making. We have expressed concerns about the adequacy of financial management systems requirements contained in the Treasury Financial Manual. In our survey of CFOs and deputy CFOs, most (20 of 24) respondents said that ensuring data quality of financial information was somewhat, very, or extremely challenging. Without (1) identifying all key financial management information needed for effective financial management and decision-making, (2) separately assessing and reporting on the effectiveness of internal control over financial reporting and other key financial management information, and (3) independently assessing such controls, management may lack reasonable assurance of the reliability of such information. Improper payments have consistently been a government-wide issue, despite efforts to reduce them. Since fiscal year 2003, cumulative improper payment estimates have totaled about $1.5 trillion. Although agencies have made progress identifying and reducing improper payments, more work needs to be done to address this government-wide material weakness in internal control. We continue to report, as a government-wide material weakness in internal control, that the federal government is unable to determine the full extent to which improper payments occur and reasonably assure that appropriate actions are taken to reduce them. OMB stopped reporting a government-wide improper payment estimate in fiscal year 2017. According to OMB, it stopped reporting a government-wide estimate because program-by-program improper payment data were more useful. However, we believe that the aggregation of improper payment estimates is essential for transparency as without such the extent and magnitude of the government-wide improper payments is not readily available to key decision makers. As such, we support a key provision in the Payment Integrity Information Act of 2019—a bill which has passed the Senate— to require OMB to report a government-wide improper payment estimate amount. Implementing this provision would be a positive step in determining the overall progress the federal government is making in the improper payment area. The federal government also needs to reasonably assure that agencies take appropriate actions to reduce improper payments. For example, in supplemental appropriations acts providing disaster relief funds in 2017 and 2018, Congress mandated an oversight framework for these funds by requiring federal agencies to submit internal control plans to Congress, based on OMB guidance. However, in June 2019, we reported that OMB lacked a strategy for ensuring that federal agencies provide sufficient, useful plans in a timely manner for oversight of disaster relief funds. As a result, we found that selected agencies did not submit their disaster aid internal control plans timely. The plans also lacked necessary information, such as how the selected agencies plan to meet OMB guidance and federal internal control standards. Such a strategy could help provide Congress some assurance that agencies will establish effective and efficient controls over disaster aid. The federal government also needs to reasonably assure that states, local governments, and nonprofit organizations take appropriate actions to reduce their improper payments of federal funds. For example, OMB recently revised its compliance supplement for Medicaid to enable auditors, as part of the single audit of all federal financial assistance that a state received or administered, to test beneficiaries for eligibility for the program. If this expansion of the compliance supplement is successful for Medicaid, other federal programs that states, local governments, and nonprofit organizations administer may also benefit from such revisions. Since the federal government began preparing consolidated financial statements over 20 years ago, three major impediments have continued to prevent us from rendering an opinion on the federal government’s accrual-based consolidated financial statements over this period. 1. Serious financial management problems at the Department of Defense (DOD) have prevented its financial statements from being auditable. DOD’s strategy for achieving a clean opinion on its financial statements and improving overall financial management has shifted from preparing for audit readiness to undergoing financial statement audits and remediating audit findings. In a positive development, DOD underwent an audit of its entity-wide fiscal year 2018 financial statements, which resulted in a disclaimer of opinion issued by the DOD Office of Inspector General (OIG). The DOD OIG also reported 20 material weaknesses in internal control over financial reporting, contributing to its disclaimer of opinion. DOD has acknowledged that achieving a clean audit opinion will take time. However, it stated that over the next several years, the resolution of audit findings will serve as an objective measure of progress toward that goal. DOD will need to develop and effectively monitor corrective action plans to appropriately address audit findings in a timely manner. Partially in response to our recommendations, DOD recently developed a centralized database for tracking the audit findings, recommendations, and related corrective action plans. 2. While significant progress has been made over the past few years, the federal government continues to be unable to adequately account for intragovernmental activity and balances between federal entities. Federal entities are responsible for properly accounting for and reporting their intragovernmental activity and balances in their entity financial statements. When preparing the consolidated financial statements, intragovernmental activity and balances between federal entities should be in agreement and must be subtracted out, or eliminated, from the financial statements. OMB and the Department of the Treasury (Treasury) have issued guidance directing component entities to reconcile intragovernmental activity and balances with their trading partners and resolve identified differences. In addition, the guidance directs the CFOs of significant component entities to report to Treasury, their respective inspectors general, and GAO on the extent and results of intragovernmental activity and balance reconciliation efforts as of the end of the fiscal year. 3. The federal government has an ineffective process for preparing the consolidated financial statements. Treasury, in coordination with OMB, has implemented several corrective actions during the past few years related to preparing the consolidated financial statements. Corrective actions included improving systems used for compiling the consolidated financial statements, enhancing guidance for collecting data from component entities, and implementing procedures to address certain internal control deficiencies. However, the federal government’s systems, controls, and procedures were not adequate to reasonably assure that the consolidated financial statements are consistent with the underlying audited entity financial statements, properly balanced, and in accordance with U.S. generally accepted accounting principles. Further, significant uncertainties, primarily related to achieving projected reductions in Medicare cost growth, and a material weakness in internal control prevented us from expressing an opinion on the sustainability financial statements. We, in connection with our audits, and agency auditors, in connection with their audits, have identified numerous deficiencies underlying the above weaknesses and have provided recommendations for corrective action. The federal government has made unsuccessful efforts to implement new financial management systems, most notably at DOD, the Internal Revenue Service, the Department of Homeland Security, and the Department of Housing and Urban Development—which have spent billions of dollars on failed systems. We have reported that the executive branch has undertaken numerous initiatives to better manage the more than $90 billion that the federal government annually invests in information technology (IT). However, we reported that federal IT investments too frequently fail or incur cost overruns and schedule slippages, while contributing little to mission-related outcomes. These investments often suffered from a lack of disciplined and effective management, including inadequate project planning, clearly defined requirements, and program oversight and governance. In 2015, we added the government’s management of IT acquisitions and operations to our High-Risk List, where it remains in 2019. In fiscal year 2018, eight of 24 CFO Act agencies’ financial management systems still did not substantially comply with FFMIA’s systems requirements. Moreover, a number of agencies rely on critical legacy systems that use outdated languages, have unsupported hardware and software, and are operating with known security vulnerabilities. We previously reported that some agencies have not established complete modernization plans and face an increased risk of cost overruns, schedule delays, and project failure. In addition, most respondents to our CFO survey (15 of 24) stated that it has been extremely, very, or somewhat challenging to work with financial management systems that are old and use obsolete software or hardware. Efforts to promote greater use of shared services in certain areas, such as human resources and financial management activities, resulted in some cost savings and efficiency gains, but challenges (e.g., implementation weaknesses, project scheduling, and project management and costs) impede widespread adoption. Almost all respondents to our CFO survey (22 of 24) indicated that they currently use or plan to use shared services. Most of those respondents (16 of 24) believed that use of shared services could help reduce costs. As noted above, in April 2019, OMB issued Memorandum M-19-16 on shared services, which among other things described the process and desired outcomes for shared services and established a governance and accountability model for achieving them. Also, OMB stated that, building off of OMB’s and Treasury’s efforts to create a Quality Service Management Office for Financial Management, they are establishing a more centralized approach to standardize, consolidate, and automate agency financial systems. A government-wide plan for improving federal financial management systems, including shared services, that is incorporated into the government-wide and agency-level plans discussed above could help ensure, among other things, that financial management system problems are addressed. Insufficient numbers of staff, inadequate workforce planning, and a lack of training in critical areas create gaps between what the federal government needs and the skills federal employees have. We have made a number of recommendations toward achieving a federal workforce with the necessary skills, including in financial management. In a 2007 testimony, we reported that one key challenge to strong federal financial management is building a financial management workforce for the future. This holds true today. Our CFO survey respondents (14 of 24) noted that CFO Act agencies do not have all of the staff with the professional qualifications, capabilities, and expertise needed to effectively support financial management operations and practices. With rapid changes, such as emerging technologies and growing availability of data, it is critical for the government to identify and strategically plan for the future workforce to achieve effective financial management. A comprehensive, long-term plan to address the challenges in the federal financial management workforce that is incorporated into the government-wide and agency-level plans discussed above could help ensure that agencies are held accountable for a long-term vision of attracting and retaining a workforce that maintains the professional qualifications, capabilities, and expertise that will meet current and future needs. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Prior to the enactment of the CFO Act, government reports found that agencies lost billions of dollars through fraud, waste, abuse, and mismanagement. These reports painted the picture of a government unable to properly manage its programs, protect its assets, or provide taxpayers with the effective and economical services they expected. The CFO Act was enacted to address these problems—calling for comprehensive federal financial management reform. Among other things, the act established CFO positions, provided for long-range planning, and began the process of auditing federal agency financial statements. The act also called for integrating accounting and financial management systems and systematic performance measurement and cost information. This statement is based on preliminary observations from GAO's ongoing review of the federal government's efforts to meet the requirements of the CFO Act. GAO reviewed federal financial management legislation, guidance, and reports. GAO also conducted interviews and a panel discussion with experts in federal financial management, and surveyed federal CFOs, inspectors general, and independent public accountants. The federal government has made significant strides in improving financial management since enactment of the Chief Financial Officers Act of 1990 (CFO Act). Substantial progress has occurred in areas such as improved internal controls, reliable agency financial statements, and establishment of chief financial officer (CFO) positions. To help ensure that the CFO Act achieves its full potential, there are several opportunities for enhancement. Standardize CFO and deputy CFO responsibilities across government. The responsibilities assigned to CFOs vary among agencies. Uniform and effective responsibilities of CFOs would help enhance strategic decision-making and correct inconsistencies across government. In addition, deputy CFOs should have appropriate responsibilities in order to be better prepared to act for CFOs when there are vacancies. Prepare government-wide and agency-level financial management plans. Since 2009, the Office of Management and Budget (OMB) has not prepared the annual 5-year government-wide plans that the CFO Act requires. Instead, OMB has provided information in the President's Management Agenda, the U.S. government's consolidated financial statements, and other documents. A complete and integrated government-wide financial management plan and supporting agency plans, prepared every few years, could help ensure continuity in direction and a more comprehensive understanding of gauging progress toward addressing financial management challenges across government. Better link performance and cost information for decision-making. While agencies have made efforts in this direction, opportunities exist for agencies to better link performance and cost information to effectively make financial management decisions that are based on dollars allocated and results achieved. Develop a broader set of key selected financial management performance-based metrics. Agencies currently have limited performance-based metrics to help them assess the quality of financial management and ensure that the federal government better manages and uses the resources entrusted to it. Rectify internal control issues in certain areas. The federal government faces many internal control problems. For example, assessments continue to identify long-standing, as well as new, material weaknesses. Improper payments continue to be a long-standing internal control issue. And finally, material weaknesses continue to prevent GAO from rendering an opinion on the U.S. government's consolidated financial statements. Improve financial management systems. The federal government has made unsuccessful efforts to implement new financial management systems at several agencies and spent billions of dollars on failed systems. Moreover, in fiscal year 2018, eight of 24 CFO Act agencies' still did not substantially comply with federal systems requirements. Strengthen the federal financial management workforce. With rapid changes, such as emerging technologies, it is critical for the government to identify and strategically plan for the future workforce. GAO obtained comments from OMB, the Department of the Treasury, and the Office of Personnel Management and has incorporated their comments as appropriate. As GAO finalizes its work for issuance next year, it will consider feedback on its work in making recommendations related to the opportunities for enhancement, as appropriate.", "document_type": "gao"}
{"report": "The Corps is one of the world’s largest public engineering, design, and construction management agencies. Located within the Department of Defense, the Corps has both military and civilian responsibilities. Through the civilian Civil Works Program, the Corps plans, constructs, operates, and maintains a wide range of water resources development projects such as navigation and flood risk projects. The Assistant Secretary of the Army for Civil Works, appointed by the President, sets the strategic direction for the program and has principal responsibility for the overall supervision of functions relating to the Army’s Civil Works Program. The Chief of Engineers, a military officer, is responsible for execution of the civil works and military missions. At the Corps level, the Civil Works Program is organized into three tiers: headquarters in Washington, D.C.; eight regional divisions; and 38 local district offices (see fig. 1). Corps headquarters primarily develops policies and guidance to implement the agency’s responsibilities and plans the direction of the organization. The divisions, which were established generally according to watershed boundaries, primarily coordinate the districts’ civil works and military projects and are commanded by military officers. The districts, also commanded by military officers, are to, among other things, plan and implement feasibility studies and the resulting water resources development projects that are approved by the divisions and headquarters. There are several steps in conducting a Corps water resources development project. When a local community perceives a need or experiences a water resources problem that is beyond its ability to solve, it typically contacts the Corps for assistance. These communities and Congress, as well as other entities, play key roles in the process. Figure 2 illustrates the major steps in conducting a Corps water resources development project. As identified above, one of the major steps in initiating a water resources development project is conducting a feasibility study. Feasibility studies further investigate a water resources problem and make recommendations on whether a project is in the federal interest, and if so, how the problem should be addressed. Generally, the cost of a feasibility study is shared between the Corps and a nonfederal sponsor, such as a local port authority or a state agency. In 2012, the Corps began using a new approach to conducting feasibility studies, referred to as SMART Planning. As part of this approach, Corps officials are to use and document a risk-informed approach to decision- making. Specifically, Corps officials are to consider risks at each point in the feasibility study process and balance the probability and consequences associated with those risks with the time and costs needed to avoid or mitigate risks through, for example, collecting additional data or conducting additional analysis. By doing so, they are to conduct only the additional analysis needed to make a decision at that point in the process. At each step, Corps officials are to use an approach that balances the level of detail, data collection, research, and associated risks with what is necessary to deliver the feasibility study, and they are to justify any additional work as the best course forward. The Corps’ feasibility study process consists of four phases (scoping, alternative evaluation and analysis, feasibility-level analysis, and Chief’s report) and a number of key milestones, such as identifying project alternatives for further review (see fig. 3). The complete feasibility study process is to take place within the statutory target time frame of less than 3 years (36 months). The Corps uses SMART Planning to help feasibility studies meet the agency’s 3x3x3 rule. Corps policy allows the Corps to spend more money and take more time on an unusually complex feasibility study if the district leading the study requests and receives an exemption from headquarters or the Assistant Secretary of the Army for Civil Works. However, Corps policy indicates that such exemptions are not routine and are to be granted only after careful consideration and review by division and headquarters officials. In addition, WRRDA 2014, as amended, provides that the Secretary of the Army may make an exception by extending the timeline of a study if the Secretary determines that the study is too complex to comply with the 3x3x3 rule. The Secretary is not to extend the timeline for a feasibility study for a period of more than 10 years, and any feasibility study that is not completed before that date shall no longer be authorized. The act also requires the Secretary to provide written notice to the Senate Committee on Environment and Public Works and the House Committee on Transportation and Infrastructure each time the Corps grants such an exception. The feasibility study process includes work the Corps undertakes to satisfy requirements under the National Environmental Policy Act (NEPA) and other environmental statutes. Under NEPA, federal agencies are to evaluate the potential effects of proposed projects on the environment. When the Corps determines that a water resources development project could have significant environmental effects, it must prepare an EIS. The Corps issues a draft EIS as part of the overall draft feasibility report for public and stakeholder review and issues a final EIS when it issues its final feasibility report. Feasibility studies that require an EIS typically represent larger and more complex studies than those that do not require an EIS. According to a 2013 Congressional Research Service report, Corps feasibility studies that are larger and more complex tend to require additional funding and time when compared to less complex, smaller studies. While the Corps does not publish information on the length of time it takes to complete feasibility studies, our analysis of publicly available data showed that the median time it took the Corps to complete a feasibility study with an EIS was more than 7 years for those studies completed from 2008 through 2018. WRRDA 2014 contains provisions related to, among other things, accelerating the completion of feasibility studies for which an EIS is prepared. These provisions broadly fall into different general categories, which we grouped as follows: Coordination and administration. These provisions are generally process oriented. Among other things, they relate to facilitating the process of coordinating and administering feasibility studies by, for example, encouraging the Corps and other agencies to coordinate early in the feasibility study process and resolve issues expeditiously. Environmental review. These provisions relate to implementing NEPA and other environmental statutes when conducting feasibility studies. For example, the Corps is to establish a program to measure and report on progress made to improve and expedite the planning and environmental review process. Public transparency. These provisions generally require the Corps to, among other things, make information publicly available on how it is implementing the acceleration provisions. The Corps has taken steps to address broad WRRDA 2014 provisions related to facilitating the process of coordinating and administering feasibility studies. For example: Issuance of a joint coordination guide. In September 2015, as a result of the act and previous ongoing coordination efforts, the Corps, NMFS, and FWS worked together to jointly issue a coordination guide for conducting feasibility studies. The guide discusses the feasibility study process in depth and emphasizes the importance of substantive, early engagement among the three agencies to successfully deliver projects and avoid delays later in the process that may result from lingering disagreements among the agencies. Issuance of Corps guidance on WRRDA 2014 acceleration provisions. In March 2018, the Corps issued guidance on how officials should implement the WRRDA 2014 acceleration provisions when conducting feasibility studies. This includes guidance on implementing administrative changes such as deadlines for gathering agency or public comments. It also includes guidance on coordination within the agency as well as with other agencies and stakeholders, such as nonfederal sponsors. For example, WRRDA 2014 provides that the Corps is to make certain information available to other agencies as early as practicable in the environmental review process. The Corps’ March 2018 guidance indicates that Corps officials are to provide information on the (1) environmental and socioeconomic resources located within the physical area associated with a feasibility study, and (2) general locations of the different alternatives under consideration. While the guidance was not issued for almost 4 years after the enactment of WRRDA 2014, several Corps headquarters and district officials said the Corps disseminated information on how to implement the acceleration provisions to the districts in various ways, such as through webinars and working with teams that had initiated feasibility studies subject to the act’s acceleration provisions. Many Corps headquarters, division, and district officials said that many of the act’s coordination and administration provisions are similar to long- standing practices they followed, based on requirements in other laws such as NEPA. For example, according to many Corps headquarters, division, and district officials, the WRRDA 2014 provision to develop a coordinated environmental review process is generally consistent with NEPA and its implementing regulations. According to a Corps headquarters official, the WRRDA 2014 coordination provisions add specificity to the Corps’ existing practices by detailing which agencies to involve in coordination efforts and when to involve them. The Corps also has taken steps to address one of the WRRDA 2014 provisions related to public transparency. Specifically, the Corps is to annually prepare, and make publicly available, a list of feasibility studies subject to the acceleration provisions that do not have adequate funding to make substantial progress toward completion of the study. Corps headquarters and district officials said that in the past the Corps funded several hundred active feasibility studies at any given time. While this allowed for many feasibility studies to remain active and make some progress, it also made less funding available for individual feasibility studies and slowed the progress of some studies, according to several Corps officials. According to a February 2012 Corps policy memo, agency leadership initiated a process to review all active feasibility studies to determine which were the most viable for congressional funding. The Corps re-scoped or deactivated the remainder of the feasibility studies. Many Corps district and headquarters officials told us this allowed for increased funding for and progress to be made on the feasibility studies that remained active. As a result of the Corps’ efforts, headquarters officials said the number of active Corps feasibility studies decreased from 653 in 2012 to 89 at the end of 2018. In addition, they said that because active feasibility studies now have greater levels of funding, the agency has not had to report any active feasibility studies that do not have adequate funding. However, as of May 2019, the Corps has not addressed other WRRDA 2014 provisions related to public transparency and environmental review. These include the following: Status and progress database. By June 2015, the Corps was to establish and maintain an electronic database and, in coordination with other federal and state agencies, issue reporting requirements to make publicly available the status and progress regarding compliance with applicable requirements of NEPA and other required approval or action. Performance measurement. The Corps is to establish a program to measure and report on progress made toward improving and expediting the planning and environmental review process. Environmental review guidance. The Corps is to (1) prepare, in consultation with the Council on Environmental Quality and other federal agencies with jurisdiction over actions or resources that may be impacted by a project, guidance documents that describe the coordinated environmental review processes the Corps intends to use to implement reforms for planning projects, and (2) issue guidance on the use of programmatic approaches for the environmental review process that carries out specified actions and meets specified requirements. In other instances, the Corps has taken some initial steps but has not fully addressed certain WRRDA 2014 provisions. Specifically, not later than 180 days after the act’s enactment, the Corps was to survey the agency’s use of categorical exclusions in projects since 2005, publish a review of that survey, and solicit requests from other federal agencies and project sponsors for new categorical exclusions. By June 2015, the Corps was to propose a new categorical exclusion if it identified a category of activities that merited such action. As of May 2019, the Corps had conducted an internal survey and solicited input through the Federal Register on its procedures for implementing NEPA. However, Corps headquarters officials said they had not published a review of its survey, targeted requests for new categorical exclusions to other federal agencies and nonfederal sponsors, or proposed new exclusions as merited. Appendix II contains a more detailed summary of the WRRDA 2014 acceleration provisions, along with information on Corps actions to address each provision. Corps headquarters officials identified resource constraints as the primary reason for not addressing some public transparency and environmental review provisions. For example, to develop environmental review guidance, Corps headquarters officials told us that they would need to conduct various steps, including drafting guidance, conducting administrative review with other federal agencies, soliciting public comment, and revising the guidance. Headquarters officials also said they were involved in a similar effort with other federal agencies to develop environmental review guidance in a publication called the 2015 Red Book, an effort they characterized as labor intensive. In addition, to establish a database to publicly report on the status of its feasibility studies, Corps headquarters officials said they would need to stand up and maintain a website similar to the Federal Infrastructure Permitting Dashboard for federal infrastructure projects. The Corps is one of many agencies involved in the effort to create and maintain this dashboard, and Corps headquarters officials said the effort was a resource-intensive process. Corps headquarters officials said that while they have not created the database required by WRRDA 2014, relevant information is available through the agency’s annual public reports on active and recently completed feasibility studies’ milestones and schedules. Corps headquarters officials also said the status of feasibility studies is often available on the Corps districts’ websites. However, this information is not easily accessible without knowing which district office is responsible for a given feasibility study. While Corps officials identified resource constraints as the primary reason for not addressing certain WRRDA 2014 provisions, they did not provide specific estimates on the resources that the Corps would need to address these provisions. In addition, the officials said they do not have a plan that addresses how and when they intend to implement the provisions they have yet to address. We have previously reported on leading practices for sound planning and have found that implementation plans that include resource estimates help ensure organizations achieve their goals and objectives. Such a plan would better position the Corps to address the remaining WRRDA 2014 provisions related to environmental review and public transparency. The Corps monitors feasibility studies and has done some review of its acceleration reforms but has not conducted a comprehensive evaluation of the impacts of these reforms. In terms of monitoring, Corps policy states that division and district leaders are responsible for monitoring feasibility studies within their areas of responsibility. According to Corps policy, districts are to prepare a quality control plan for each project to ensure compliance with all technical and policy requirements, and divisions are responsible for quality assurance by ensuring that districts plan, design, and deliver quality projects on schedule and within budget. Corps headquarters officials also said they monitor the progress of feasibility studies during management meetings, during which they discuss the cost and status of feasibility studies as well as the quality of those studies; such meetings are largely led by Corps management or by the Corps’ Planning Advisory Board, which oversees the quality of feasibility studies. In addition to monitoring individual feasibility studies, Corps headquarters officials said they have conducted some broader reviews of how the acceleration reforms are progressing. For example, they conducted a trend analysis in October 2018 and again in April 2019 to identify the reasons why some feasibility studies have received exceptions from the timing and cost requirements of the 3x3x3 rule. These analyses, among other things, identified that some studies were too complex to be completed within 3 years or for less than $3 million, according to Corps officials. Furthermore, based on their experiences with various reform efforts, Corps officials said that they have been making real-time enhancements. For example, based on input from the Corps’ Planning Advisory Board, Corps leadership has called for the agency to clarify its updated approach to risk management, according to Corps officials. These officials said each component within the Corps that is involved in conducting feasibility studies is to issue internal guidance on its risk management approach. However, Corps headquarters officials said the Corps has not conducted a comprehensive evaluation of acceleration reforms to determine what impacts the reforms have had and whether any modifications to those reforms are needed. Corps and other agency officials and stakeholders we interviewed differed in their views of the acceleration reforms’ impacts on the cost, time frames, and quality of feasibility studies: Cost and time frames for completing feasibility studies. Many Corps officials said they agreed with the overall goals of reducing costs and increasing the speed with which feasibility studies are carried out. Some Corps headquarters and district officials said SMART Planning and the 3x3x3 rule are changing the Corps’ culture around the amount of time and cost a feasibility study should take. However, several Corps district and headquarters officials said some Corps staff are experiencing difficulties with the cultural change represented by SMART Planning and the 3x3x3 rule. For example, a Corps district official said that in the past some Corps navigation economists had one year to complete some modeling analyses for feasibility studies, but they now are to complete such work in 90 days due to the constraints of SMART Planning and the 3x3x3 rule, which has been a difficult adjustment. In addition, many Corps headquarters, division, and district officials raised concerns that the cost limitation of $3 million may not be realistic given differences in cost across geographic locations or the loss of spending value over time caused by inflation. Quality of feasibility studies. Several Corps district officials we interviewed said they like the Corps’ new policy of involving other agencies earlier in the process and with more frequency. They said they believe this approach has improved coordination with other agencies—by, for example, inviting the other federal agencies to join the Corps in a formal initiation meeting—which can in turn improve the overall quality of a feasibility study. However, some FWS and NMFS officials said they would like to be more involved and have better communication with the Corps than they currently do, such as throughout the feasibility study process rather than just at the beginning of a study and at the end when their formal review is requested. Similarly, several Corps headquarters, district, and division officials have commended the agency’s new approach to risk management and stated that they aim to provide partner agencies with the information they need to conduct their work on the feasibility study. However, many Corps, FWS, and NMFS officials and nonfederal sponsors we interviewed said they were concerned that this new approach might result in insufficient information for making decisions, which could affect the quality of feasibility studies. For example, for six of the seven studies that we reviewed, officials from FWS and NMFS said it has become more difficult for them to provide meaningful input on the feasibility study alternatives considered because the Corps provides them with less detailed information than in the past. Corps officials and other stakeholders we interviewed also expressed concern about possible impacts of the 3x3x3 rule on the quality of feasibility studies. For example, many Corps headquarters, division, and district officials said that because the 3x3x3 rule puts constraints on costs and time frames, if the scope of a feasibility study is not similarly reduced, it can affect the study’s quality. In addition, nonfederal sponsors for four of the seven studies we examined expressed concerns with the 3x3x3 rule; three of these four nonfederal sponsors said they believe that the Corps is more focused on meeting the cost and schedule timelines than on the needs or quality of the study. Senior Corps headquarters officials said they are confident that the cost and duration of feasibility studies has decreased overall as a result of the acceleration reforms but could not provide us with documentation to support this observation. Specifically, officials said in March 2019 that based on analysis they had recently conducted, most feasibility studies are now being completed within 4 years and at a lower cost than feasibility studies undertaken prior to implementation of the 3x3x3 rule. While these results may not meet the 3x3x3 rule, officials said that these feasibility studies were the first subject to the acceleration reforms and may not depict the likelihood of future feasibility studies meeting the rule. This is, in part, because Corps officials who are working on new feasibility studies have the benefit of the past several years of experience working with the SMART Planning process. Further, Corps officials said that they do not have formal documentation summarizing how the acceleration reforms have affected the quality of their feasibility studies overall, but they monitor individual feasibility studies, as described earlier. According to Corps headquarters officials, the Corps has not conducted a more comprehensive evaluation of the broader impacts of the acceleration reforms because it has only completed a small number of feasibility studies since 2012 under the acceleration reforms, and officials are focused on monitoring their ongoing individual studies. These officials said they see the value in conducting such an evaluation as they complete more studies but that they have not developed formal plans to do so. Effective program evaluation includes an evaluation plan—that is, a plan that takes into account the questions guiding the evaluation, the constraints faced in studying the program, and the information needs of the intended users. Developing an evaluation plan would help position the Corps to conduct a timely and effective review of the impacts of the acceleration reforms overall. The Corps has not maintained complete data on the 10 key milestones in its central data system for more than half of the feasibility studies we reviewed. Specifically, for the 19 feasibility studies we reviewed, we found that: seven studies in the Corps’ central data system included complete data for all 10 key milestones, and twelve studies were missing one or more milestones in the data system. Table 1 provides information on the key milestone data included in the Corps’ central data system for the 19 feasibility studies we reviewed. Many Corps headquarters and division officials said that Corps officials vary in their knowledge of its central data system. Many headquarters, division, and district officials we interviewed also acknowledged that, in general, the milestone information entered into the Corps’ central data system can be inconsistent across different feasibility studies. Corps headquarters officials said agency policy requires district officials conducting feasibility studies to enter data on 10 key milestones for each study into the agency’s central data system. However, while the policy identified the 10 milestones, it only explicitly requires that two of the 10 milestones be entered into the agency’s central data system. Specifically, the policy states that officials are to enter into the Corps’ data system the milestones for (1) feasibility study initiation and (2) posting of the plan for peer and stakeholder review. Corps officials said the intent of the policy is for all 10 key milestones to be entered into the central data system but acknowledged that the policy may not be clear. In part to assist district officials in conducting feasibility studies, Corps headquarters officials created a template, which includes information on nine of the 10 key milestones. In addition, a Corps district official said she was unclear on the agency’s expectations about which milestones to enter into the central data system. Corps headquarters officials said they contact district officials responsible for feasibility studies to obtain up-to- date information and ensure they understand the progress of each feasibility study. While this may help to ensure accuracy and completeness of milestone data on feasibility studies, several Corps district officials said the process of responding to such data calls can be time consuming and take them away from their core responsibilities. Without clarifying its policy to help ensure district officials enter data on all key milestones for feasibility studies into its central data system, the Corps will not have complete data to efficiently monitor the progress of feasibility studies. The Corps has taken steps to address the acceleration provisions in WRRDA 2014, such as those related to coordination. However, it has not fully addressed provisions related to environmental review or public transparency. Corps officials said they do not have a plan that addresses implementation of remaining provisions or the resources that will be required to implement them. An implementation plan that includes resource estimates would better position the Corps to address the remaining provisions in WRRDA 2014. Further, the Corps monitors the progress of feasibility studies and has conducted some reviews of the individual acceleration reforms. However, the agency has not developed an evaluation plan for its acceleration reforms to better understand the reforms’ impacts overall and determine whether any modifications to those reforms are needed. Developing such a plan would enable the Corps to conduct a timely and effective evaluation. Further, without clarifying its policy to ensure district officials enter all key milestone dates for feasibility studies into its central data system, the Corps will continue to lack complete data to efficiently monitor the progress of feasibility studies. We are making the following three recommendations to the Department of Defense: The Secretary of the Army should direct the Assistant Secretary of the Army for Civil Works to develop an implementation plan that includes resource estimates to address the remaining WRRDA 2014 acceleration provisions. (Recommendation 1) The Secretary of the Army should direct the Assistant Secretary of the Army for Civil Works to develop a plan to conduct a comprehensive evaluation of the impacts of the agency’s feasibility study acceleration reforms. (Recommendation 2) The Secretary of the Army should direct the Assistant Secretary of the Army for Civil Works to clarify its policy to help ensure district officials enter data on all key milestones for feasibility studies into its central data system. (Recommendation 3) We provided a draft of this report to the Department of Defense for review and comment. In its written comments, reprinted in appendix III, the Department concurred with our recommendations. The Department commented that we should redirect our recommendations to the Assistant Secretary of the Army for Civil Works rather than to the Chief of Engineers and the Commanding General of the U.S. Army Corps of Engineers, which we did. The Department also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, the Secretary of the Department of the Interior, the Secretary of Commerce, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3841 or FennellA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines the extent to which the U.S. Army Corps of Engineers has (1) addressed the feasibility study acceleration provisions under the Water Resources Reform and Development Act of 2014 (WRRDA 2014), (2) reviewed the impact of its feasibility study acceleration reforms, and (3) maintained complete milestone data for feasibility studies in its central data system. To conduct our work, we reviewed the first 19 feasibility studies subject to the WRRDA 2014 feasibility study acceleration provisions, among other things. These feasibility studies included those that (1) were initiated after June 10, 2014, the date WRRDA 2014 was enacted, through August 15, 2018, and (2) for which an environmental impact statement (EIS) is prepared. We chose to review studies through August 15, 2018, because after that date the Corps initiated several feasibility studies using funding in a supplemental appropriation the Corps received in February 2018 to conduct work in response to recent large hurricanes, and Corps officials said they planned to use a somewhat different approach to conducting these studies. For each study, we reviewed Corps guidance on the agency’s process for planning feasibility studies and other related documentation. We examined information from the Corps on the progress and status of the19 feasibility studies. We also reviewed information for each feasibility study on the Corps’ business line or program, the district or division overseeing the study, and information on which studies had received exceptions from the 3x3x3 rule. We also conducted a more in-depth review of seven of these 19 feasibility studies. We selected these seven studies because they represent different types of water resources development projects, were at varying stages of completion, and are geographically dispersed. The seven studies, and the Corps districts leading these studies, are: Coastal Texas Protection and Restoration (Galveston District); Houston Ship Channel Expansion Channel Improvement Project (Galveston District); Matagorda Ship Channel (Galveston District); Gulf Intercoastal Waterway: Brazos River Floodgates and Colorado River Locks Systems (Galveston District); Mississippi River Ship Channel, Gulf to Baton Rouge, Louisiana General Reevaluation Report (New Orleans District); Sacramento River, General Reevaluation Report (Sacramento Port of Long Beach Deep Draft Navigation Improvements (Los Angeles District). For each of these seven studies, we reviewed project management plans and other project documents, such as draft feasibility studies, if available. From August 2018 through November 2018, we visited the four district offices that led these seven studies, including the Corps’ Galveston, Los Angeles, New Orleans, and Sacramento district offices. During these visits, we discussed the status and progress of each of these feasibility studies and the Corps’ coordination with other federal agencies and nonfederal sponsors, among other things. For each study, we interviewed officials from nonfederal sponsors—such as the state or local government associated with individual studies—and from federal partners—including the Fish and Wildlife Service (FWS) and the National Marine Fisheries Service (NMFS). We selected FWS and NMFS because of the important role they play in reviewing environmental aspects of Corps feasibility studies and their role in the 2015 joint publication on coordination. We also interviewed Corps officials at the three divisions overseeing the districts that conducted the feasibility studies we selected. This included officials from the Corps’ South Pacific, Mississippi Valley, and Southwestern divisions. While the seven studies provide illustrative examples, they are not generalizable to all of the Corps’ feasibility studies for which an EIS is prepared. We developed and used four standard sets of semi-structured interview questions for the following groups: the (1) Corps district office officials conducting the seven selected feasibility studies, (2) FWS and NMFS officials working with the Corps on these studies, (3) Corps division officials overseeing each study, and (4) nonfederal sponsors who worked with the Corps on each study. To characterize the views of those we interviewed throughout the report, we defined modifiers to quantify officials’ views as follows: “some” refers to responses from two to four Corps officials and/or stakeholders; “several” refers to responses from five to seven Corps officials and/or stakeholders; and “many” refers to responses from eight or more Corps officials and/or stakeholders. To examine the extent to which the Corps addressed the WRRDA 2014 feasibility study acceleration provisions, we compiled a list of the provisions. We then reviewed the Corps’ documentation related to the implementation of these provisions, including agency guidance and policies. We compared this information with the WRRDA 2014 acceleration provisions. To do this, we created categories for the acceleration provisions and grouped the provisions by category. To examine the extent to which the Corps has reviewed the impact of its acceleration reforms, we reviewed Corps policy, guidance, training, and other documentation on implementation of those reforms. We use the term acceleration reforms to refer to the requirements that new feasibility studies are to be completed in less than 3 years and at a cost of not more than $3 million, the Corps’ risk management of feasibility studies through its new SMART Planning process, and the WRRDA 2014 acceleration provisions. We reviewed documentation from the Corps on the feasibility studies that have received exceptions from the 3x3x3 rule. We interviewed Corps headquarters officials to learn what, if any, (1) new policies were in place to help division and district staff implement the reforms; and (2) review or analysis headquarters officials had completed of the impacts of the reforms on the cost, time frames, or quality of feasibility studies. We also interviewed Corps districts and division officials who were responsible for the seven studies about how the acceleration reforms were working, as well as FWS and NMFS officials and nonfederal sponsors about their views of the impacts of the new processes on their work on these feasibility studies. We compared this information with program evaluation guidance. To examine the extent to which the Corps has maintained complete milestone data for feasibility studies in its central data system, we obtained milestone data from the system for the 19 Corps feasibility studies in our review. We analyzed the milestone data to determine which milestone dates were in the system and then worked with Corps headquarters officials to verify that information. We assessed the reliability of these data by reviewing related documentation and interviewing knowledgeable officials, among other things. We determined that the data were sufficiently reliable for the purpose of understanding which districts and divisions conducted feasibility studies and for understanding the types of milestones that were entered into the central data system. However, as discussed in this report, we determined that the milestone data were not sufficiently reliable for other purposes. We reviewed data for all feasibility studies in our review to determine whether they conformed to Corps expectations on what milestone data should be in the system. We estimated the median time it took the Corps to complete a feasibility study for which an EIS was prepared. To do this, we obtained from the Corps website the names of all feasibility studies completed with a Chief’s Report from July 2008 through June 2018 and the dates they were completed. We verified with Corps headquarters officials that its list of studies with a Chief’s Report was current for that time frame. For each of these feasibility studies, we then found the associated notice of intent to complete an EIS as published in the Federal Register. While the date the Corps filed a notice of intent to complete an EIS is not the initiation date for the feasibility study, we used it as a proxy since Corps headquarters officials said that, in the past, the notice of intent was filed soon after a study was initiated. We calculated the time between the date the notice of intent was filed and the date of the Chief’s report to arrive at an estimate of the amount of time the each feasibility study took to complete. We then calculated the median time it took to complete these feasibility studies. We conducted this performance audit from April 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform our audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Appendix II: U.S. Army Corps of Engineers Project Acceleration Statutory Provisions and Corps Actions Related to Each Provision provides guidance, independently evaluates, and approves the document before taking subsequent action; and ensures the project sponsor complies with all design and mitigation commitments. In addition, any NEPA documents prepared in this way are to be adopted and used by any federal agency when making any determination to the same extent the agency could adopt or use a document prepared by another federal agency under NEPA. Category name Coordination and Administration Designating Jurisdictional Agencies GAO summary of statutory provision For all federal, state, and local governments and Indian tribes that may have jurisdiction over a project or that may be required to review some aspect of the feasibility study or make a determination on issuing a permit or other decision, the Corps must: identify these agencies as early as practicable, and invite these agencies to participate or coordinate as early as practicable and set a deadline for response. Corps actions related to provision The Corps issued its WRRDA 2014 acceleration guidance in March 2018. as well as the Principles and Guidelines and Planning Guidance Notebook. Any federal agency invited by the Corps will be designated as a cooperating agency unless that agency follows certain specified steps. Plan for Coordinating Input and Completing Environmental Review The Corps, after consultation with and with the concurrence of relevant entities is to establish a plan for coordinating public and agency participation in, and comment on, the environmental review process for each feasibility study or category of studies. As soon as practicable but not later than 45 days after the close of the public comment period on a draft Environmental Impact Statement (EIS), the Corps, after consultation with and with the concurrence of relevant entities, also is to establish, as a part of the coordination plan, a schedule for completing the environmental review process. In doing so, the Corps is to consider certain factors, provide the schedule to relevant entities, and make it available to the public. The Corps issued its WRRDA 2014 acceleration guidance in March 2018. In addition, a Corps official indicated that portions of this provision are implemented under the Corps’ NEPA procedures. The Corps issued its WRRDA 2014 acceleration guidance in March 2018. not more than 60 days for agency or public comment on a draft EIS, and not more than 30 days for agency and public comment on other environmental review documents. GAO summary of statutory provision Issue Identification and Resolution The Corps, the cooperating agencies, and any participating agencies are required to work cooperatively to identify and resolve issues that could delay completion of the environmental review process or result in the denial of any approval required for the project study under applicable laws. Corps actions related to provision The Corps issued its WRRDA 2014 acceleration guidance in March 2018. In addition, a Corps official indicated that portions of this provision are implemented under the Corps’ NEPA procedures and Planning Guidance Notebook. Many Corps district officials said they have used various strategies, such as meetings, to resolve issues with other agencies. The Corps is to make information available to the cooperating and participating agencies as soon as practicable in the environmental review process regarding the environmental and socioeconomic resources located within the project area and the general locations of the alternatives under consideration. Based on information from the Corps, cooperating and participating agencies are to identify as early as practicable any issues of concern regarding the potential environmental or socioeconomic impacts of the project, including any issues that could substantially delay or prevent an agency from granting a permit or other approval that is needed for the project study. On the request of a participating or cooperating agency or project sponsor, the Corps is to convene an issue resolution meeting with the relevant entities to resolve issues that may (1) delay completion of the environmental review process, or (2) result in denial of any approval required for the project study under applicable laws. Such a meeting is to be held not later than 21 days after the Corps receives the request for the meeting unless the Corps determines there is good cause to extend that deadline. Additionally, the Corps may convene an issue resolution meeting at its discretion, regardless of whether such a meeting is requested. If resolution cannot be achieved within 30 days of an issue resolution meeting and the Corps determines that all information necessary to resolve the issue has been obtained, the Corps is to forward the dispute to the heads of the relevant agencies for resolution. Corps actions related to provision The Corps issued its WRRDA 2014 acceleration guidance in March 2018. The Corps must notify the Senate Committee on Environment and Public Works and the House Committee on Transportation and Infrastructure as soon as practicable. The Corps must continue notifications every 60 days thereafter until all decisions have been made by the federal agency. The amount of funds made available to support the office of the head of that federal agency must be reduced by certain specified amounts, subject to certain limitations. The Corps, NMFS, and FWS jointly issued a coordination guide for conducting feasibility studies in September 2015. The Corps also issued its WRRDA 2014 acceleration guidance in March 2018.b In addition, a Corps official indicated that portions of this provision are implemented under the agency’s NEPA procedures and Planning Guidance Notebook,f as well as the Principles and Guidelines.e Upon request by a state or project sponsor, and to the maximum extent practicable and appropriate, as determined by the agencies, the Corps and other federal agencies with relevant jurisdiction in the environmental review process are to provide technical assistance to the state or project sponsor in carrying out early coordination activities. If requested by a state or project sponsor, the Corps, in consultation with other federal agencies with relevant jurisdiction, may establish memoranda of agreement with certain entities to carry out early coordination activities, subject to certain limitations. New Information The Corps is to consider information received after the close of a comment period if the information satisfies the requirements for a supplemental EIS under NEPA regulations. The Corps issued its WRRDA 2014 acceleration guidance in March 2018. Corps actions related to provision The Corps issued its WRRDA 2014 acceleration guidance in March 2018. With respect to the environmental review process for any project study, the Corps is to have the authority and responsibility to (1) take actions as are necessary and proper and within the Corps’ authority to facilitate the expeditious resolution of the environmental review process for the project study, and (2) prepare or ensure that any required EIS or other environmental review document required to be completed under NEPA is completed in accordance with applicable federal law. Publishing Information on Studies with Inadequate Funding to Make Substantial Progress The Corps is to annually prepare and make publicly available a list of feasibility studies that the agency does not have adequate funding to make substantial progress toward the completion of the study. The Corps has undertaken a multi-year effort to focus funding on the feasibility studies the agency determined are the most viable options for Congressional funding and then re-scope or deactivate the remaining studies. The Corps has not taken action as of May 2019. not later than June 10, 2015, establish and maintain an electronic database and, in coordination with other federal and state agencies, issue reporting requirements to make publicly available the status and progress with respect to compliance with applicable requirements of NEPA and other required approval or action; and publish the status and progress of any such required approval or action on a feasibility study. Categorical Exclusions Not later than 180 days after June 10, 2014, the Corps is to: conduct an internal survey on its use of categorical exclusions since 2005, publish a review of the survey that includes a description of certain specified information, and solicit requests from other federal agencies and project sponsors for new categorical exclusions. As of May 2019, the Corps had conducted an internal survey and solicited public input through the Federal Register on its procedures for implementing NEPA. However, Corps headquarters officials said they had not published a review of its survey, targeted requests for new categorical exclusions to other federal agencies and nonfederal sponsors, or proposed new exclusions as merited. If the Corps identifies a category of activities that merits establishing a new categorical exclusion, the agency is also to propose new categorical exclusions by June 10, 2015. Performance Measurement The Corps is to establish a program to measure and report on progress made toward improving and expediting the planning and environmental review process. The Corps has not taken action as of May 2019. GAO summary of statutory provision Guidance on Coordinated Environmental Review The Corps, in consultation with the Council on Environmental Quality and other federal agencies with jurisdiction over actions or resources that may be impacted by a project, is to prepare guidance documents that describe the coordinated environmental review processes that the Corps intends to use to implement the reforms for the planning of projects. Corps actions related to provision The Corps has not taken action as of May 2019. Corps officials said they have reached out to the Council on Environmental Quality several times and are waiting for feedback on preparing this guidance. Guidance on Programmatic Approaches to Environmental Review The Corps is to issue guidance on the use of programmatic approaches to carry out the environmental review process that carries out specified actions and meets specified requirements. The Corps has not taken action as of May 2019. U.S. Army Corps of Engineers, Implementation Guidance for Section 1005 of the Water Resources Reform and Development Act of 2014 (WRRDA 2014), Project Acceleration (Washington, D.C.: March 2018). Pub. L. No. 91-190, 83 Stat 852 (1970) (codified as amended at 42 U.S.C. §§ 4321-4347). In addition to the contact named above, Vondalee R. Hunt (Assistant Director), Candace Carpenter (Analyst in Charge), Matthew Levie, and Rebecca Makar made key contributions to this report. In addition, Michael Armes, Justin Fisher, Gwen Kirby, Patricia Moye, and Kiki Theodoropoulos contributed to the report.", "summary": "Water resources development projects undertaken by the Corps—such as those to reduce the risks from coastal storms—historically have taken years or even decades to complete. To implement these projects, the Corps first conducts a feasibility study, which includes an analysis of the federal interest and the costs, benefits, and environmental impacts of a project; such studies can take several years to complete. WRRDA 2014 requires the Corps to, among other things, conduct activities to accelerate the completion of feasibility studies. The act also includes a provision for GAO to assess acceleration reforms. This report examines the extent to which the Corps has (1) addressed the WRRDA 2014 feasibility study acceleration provisions, (2) reviewed the impact of its feasibility study acceleration reforms, and (3) maintained complete milestone data for its studies. GAO reviewed WRRDA 2014 and Corps documents; reviewed 19 feasibility studies subject to the act's acceleration provisions; analyzed data on key milestones; and interviewed Corps officials and stakeholders. The U.S. Army Corps of Engineers has taken steps to address some feasibility study acceleration provisions under the Water Resources Reform and Development Act of 2014 (WRRDA 2014) but not others. For example, to implement a provision related to coordination, the Corps in September 2015 issued guidance emphasizing the importance of early coordination with other federal agencies to avoid delays later in the process. However, the Corps has not taken steps to address other provisions, such as one that calls for the Corps to establish a database to make publicly available information on the status of feasibility studies, citing resource constraints. The Corps does not have a plan to address these other provisions. A plan that includes resource estimates would better position the Corps to address the remaining acceleration provisions. The Corps regularly monitors feasibility studies and has conducted some reviews of its acceleration reforms, such as an analysis that found that some studies were too complex to complete within the agency's timing and cost requirements—i.e., within 3 years and for less than $3 million. However, the Corps has not comprehensively evaluated the reforms' impacts. Corps officials and stakeholders expressed differing views on the reforms' impacts on the costs, time frames, and quality of feasibility studies. For example, many Corps officials GAO interviewed said the reforms' overall goals to reduce studies' cost and time frames were positive, but others raised concerns, such as that the $3 million cost limitation may not be realistic for different geographic areas. Corps officials said they have not conducted a comprehensive impact review in part because they are focused on monitoring ongoing studies. These officials said they see the value in conducting such a review as they complete more studies, but they have not developed a plan to do so. Developing an evaluation plan would help the Corps conduct a timely and effective review. The Corps has not maintained complete milestone data in its central data system for the 19 feasibility studies GAO reviewed (see figure). For example, 12 studies did not include data for one or more milestones. Corps officials said agency policy requires the entry of information on 10 key milestones in the agency's central data system. However, GAO found that the policy only explicitly requires that two of the key 10 milestones be entered into the agency's central data system. Without clarifying its policy to help ensure officials enter data on all milestones in the central data system, the Corps will not have complete data to efficiently monitor the progress of feasibility studies. GAO is making three recommendations to the Department of Defense to direct the Assistant Secretary of the Army for Civil Works to (1) develop a plan with resource estimates to address the remaining WRRDA 2014 provisions, (2) develop a plan to comprehensively evaluate the impacts of the agency's acceleration reforms, and (3) clarify its policy to help ensure district officials enter data on required milestones for feasibility studies in its central data system. The agency concurred with the recommendations.", "document_type": "gao"}
{"report": "The Marine Corps uses a fleet of 23 helicopters to support the President in the national capital region and when traveling in the continental United States and overseas. These aircraft have been in service for decades. In April 2002, the Navy began development of a replacement helicopter later identified as the VH-71 program. By 2009, schedule delays, performance issues, and a doubling of cost estimates, from $6.5 billion in 2005 to $13 billion in 2009, prompted the Navy to terminate the program. The need for a replacement helicopter remained, and by April 2012, the Office of the Secretary of Defense approved the Navy’s current acquisition approach. The Navy’s approach is based on the modification of an in-production aircraft to replace the legacy aircraft, by incorporating an executive cabin interior and unique mission equipment such as communications and mission systems, and limiting modifications to the aircraft to avoid a costly airworthiness recertification. In May 2014, the Navy awarded a fixed-price incentive (firm target) contract to Sikorsky Aircraft Corporation, a Lockheed Martin Company, for an Engineering and Manufacturing Development (EMD) phase. The contract includes options for production quantities. The VH-92A presidential helicopter is based on Sikorsky’s S-92A commercial helicopter. The fixed- price incentive contract includes a ceiling price of $1.3 billion that limits the maximum amount that the Navy may have to pay the contractor under the contract subject to other contract terms. The VH-92A is expected to provide improved performance, survivability, and communications capabilities, while offering increased passenger capacity when compared to the current helicopters. Sikorsky is taking S-92A aircraft from an active production line (at the Sikorsky plant in Coatesville, Pennsylvania) to a dedicated VH-92A modification facility for subsystem integration at its plant in Stratford, Connecticut. When the aircraft arrives from Coatesville, some components, such as circuit breaker panels, engines, and main and tail rotor blades are removed. After airframe modifications are done, the aircraft is then transferred to the Sikorsky facility in Owego, New York, where integration of the mission communications system, painting, and contractor-led testing, installation of the executive cabin interior, and the delivery of the aircraft will take place. See figure 1 for a depiction of modification of the commercial S-92A aircraft to the VH-92A presidential helicopter. The VH-92A development program includes delivery of two Engineering Development Model (EDM) test aircraft and four System Demonstration Test Article (SDTA) aircraft. The first flight of the first EDM aircraft took place in July 2017 and the second EDM aircraft’s first flight occurred in November 2017. The two EDM aircraft are currently undergoing government-led integrated testing, at Naval Air Station Patuxent River, Maryland, and were used to conduct an operational assessment in March 2019 to support a decision on whether to enter low-rate initial production. The four SDTA aircraft, now in the modification stages, are production representative aircraft being built under the development contract. These aircraft are to be used in the VH-92A’s initial operational test and evaluation, which is planned to begin in March 2020. The results of that testing will be used to inform a decision whether to enter full-rate production in 2021. These SDTA aircraft will be used to determine whether the VH-92A is operationally effective and suitable for its intended use. In July 2018, the Federal Aviation Administration certified the VH-92A EDM-1 aircraft and supporting documentation to allow delivery to the government under the contract. According to the program office, the first EDM VH-92A configured test aircraft arrived at Naval Air Station in Patuxent River, Maryland, to begin government-led performance testing. The program office explained that in December 2018, the contractor provided VH-92A EDM-2, the second development aircraft, to the Navy and it, too, is undergoing government testing. The VH-92A total program acquisition cost estimate has declined from $5.18 billion to $4.95 billion (then-year dollars)—since the program started in April 2014. Contractor officials attribute that the estimated decline in cost is due to stable requirements, a low number of design changes, and streamlined processes and reviews. The program has incurred delays of about 5 months to the start of its operational assessment due to parts shortages and early integration problems during product development. Program officials told us they have adjusted schedule milestones accordingly and now project that the VH-92A is on track to meet its key performance parameters, including providing a fully interoperable mission communications system (MCS) in time for initial operational test and evaluation in 2020. The Navy continues to reduce its acquisition cost estimate for the VH-92A program. The total VH-92A program acquisition cost estimate has decreased $234 million or about 4.5 percent—from $5.18 billion to $4.95 billion (then-year dollars)—since the program started in April 2014. The total program acquisition unit costs have decreased by the same percentage. According to the program office, this decrease is comprised, in part, by reductions of approximately: $36 million for lower than expected inflation rates, $88 million for efficiencies gained during development, and $103 million for revised spare parts cost and equipment production list. A key factor in controlling total program acquisition cost has been performance requirements stability. The Navy has not added any key performance requirements to the fixed-price contract, thereby limiting cost growth. In addition, the Navy and the contractor have been able to limit the number of necessary design changes that require modifications to aircraft. These modifications are now being incorporated into the four production representative aircraft. The Navy is using an existing basic ordering agreement with Sikorsky, separate from the VH-92A contract, for two additional design changes that are not part of the baseline program. These changes are to allow for improved visibility from the aircraft’s forward door and the addition of a fifth multi-functional display in the cockpit (which is identical to the existing four displays) to improve situational awareness. The program office is working with the contractor to determine the best time to make these modifications to the aircraft in order to minimize the effect on the production schedule. The final costs are still being negotiated; however, the program office expects the cost of implementing these two engineering changes to be minimal relative to the program’s total acquisition cost. The Navy and contractor have also taken advantage of other cost saving measures including streamlining some work processes and revised testing approach for some components; they are also sharing secure facilities used in support of the current presidential helicopter. In addition, they eliminated activities deemed redundant to the Federal Aviation Administration VH-92A airworthiness certification and plan to use a streamlined reporting process for the March 2019 operational assessment. According to program officials, the VH-92A has also optimized its live fire test and evaluation program. Overall, Sikorsky reported it had accomplished about 83.3 percent of development work, with the remainder to be completed by October 2020. As of February 2019, the contractor estimates it would have completed nearly all of its activities necessary to demonstrate performance specification compliance per the contract, by February 2019, and the Navy is now more than halfway through its ground and flight testing requirements needed to a support Milestone C, the decision point for entering into low-rate initial production. The program has addressed delays resulting from technical challenges and new discoveries during development by delaying the start dates for the operational assessment, the low-rate initial production decision, and initial operational test and evaluation by 5 months each. The milestone start dates still meet the baseline schedule thresholds. As we found in the past, part shortages and the integration and assembly effort taking longer than planned have all contributed to delays early in the development of the two engineering development model aircraft. The overall effect has been between 3 and 5 months of schedule delays. In addition, some work initially allocated to the contractor’s site will now be completed at the Naval Air Station, Patuxent River, Maryland. This is a result of the contractor’s inability to get some parts when needed to maintain the planned build schedule. According to the program office, the Navy has implemented a number of mitigation strategies to reduce the effect of the schedule slip, including leasing a commercial S-92A for pilot training, reducing the duration of some future activities, adjusting the program’s schedule, and reexamining and optimizing some work processes to maintain the approved program baseline schedule. We also found that the program’s integrated master schedule met the best practices for a reliable schedule compared against best practices criteria in the GAO Schedule Assessment Guide. The success of programs depend, in part, on having an integrated and reliable master schedule that defines when and how long work will occur and how each activity is related to the others. Such a schedule is necessary for government acquisition programs for many reasons. It provides not only a road map for systematic project execution but also the means by which to gauge progress, identify and resolve potential problems, and promote accountability at all levels of the program. An IMS provides a time sequence for the duration of a program’s activities and helps everyone understand both the dates for major milestones and the activities that drive the schedule. A program’s IMS is also a vehicle for developing a time-phased budget baseline. Moreover, it is an essential basis for managing tradeoffs between cost, schedule, and scope. Among other things, scheduling allows program management to decide between possible sequences of activities, determine the flexibility of the schedule according to available resources, predict the consequences of managerial action or inaction on events, and allocate contingency plans to mitigate risks. Our research has identified 10 best practices associated with effective schedule estimating that can be collapsed into 4 general characteristics (comprehensive, well-constructed, credible, and controlled) for sound schedule estimating. Overall, we found the program’s IMS fully met one and substantially met three of the four characteristics for sound schedule estimating. Table 2 provides a comparison of the planned timeframe for key events at development start to the current estimated schedule. The Navy’s operational assessment began in March 2019 and ended about 30 days later; this is nearly 2 months prior to the Milestone C review, which will authorize low-rate initial production. The contractor’s delivery of the first engineering development model aircraft to the government was about a month late. A Developmental Test and Evaluation official stated that this reduced the already short window of time between the end of development testing and start of the operational assessment. A Director, Operational Test and Evaluation official responsible for monitoring the program expressed concern that there is little time to address any new discoveries found during the operational assessment. The program office acknowledged that, while solutions to any newly discovered problems may not be ready to implement at the start of production, it expects to have enough information from government-led integrated testing and the operational assessment to move forward with the Milestone C decision. According to the contractor, by February 2019, its test program for the first two development aircraft will be nearly completed. In addition, as of December 2018, the government completed about 48 percent of its development ground and flight test points to support Milestone C but is slightly behind, as it had planned to complete about 57 percent at this time. Between August and December 2018, the program conducted three major test events—the Navy conducted 14 landings on the White House south lawn to assess approaches, departures, and operations in the landing zone. The Navy also installed MCS version 2.0 on the second EDM aircraft in support of the operational assessment and tested the ability to transport the VH-92A in a cargo plane. Figure 2 shows the status of government testing as of January 2019. While the program has made progress, the VH-92A program continues to face development challenges that could affect Sikorsky’s ability to deliver fully capable aircraft prior to the start of initial operational test and evaluation. Those challenges include issues associated with the aircraft’s start procedures for the propulsion system, landing zone suitability, and the aircraft’s mission communications system interoperability with secure networks. According to the program office, the performance requirements associated with these challenges may not be fully achieved until after the low-rate initial production decision currently planned for June 2019, which may result in a need to retrofit already built aircraft. Below is additional information on each of those performance requirements. VH-92A aircraft start procedures: As we reported last year, the VH- 92A was pursuing technical improvements related to the S-92A propulsion system, which was not meeting a performance requirement. According to program officials, a previously identified solution is no longer being pursued. However, these officials stated that the program is continuing to assess current capabilities and both material and non-material solutions to any potential capability shortfalls. Testing to demonstrate aircraft performance against the requirement will be completed prior to the Milestone C review in June 2019. Design changes, if needed, will be coordinated with program stakeholders. Program risk for this performance requirement has not changed since our April 2018 report on the program. Landing zone suitability: The VH-92A operates in and out of a variety of restrictive and highly visible landing zones. The White House South Lawn is one of the most frequent locations utilized for helicopter operations in support of the President. As we reported last year, the program was not meeting a key system capability requirement to land the aircraft without adversely affecting landing zones (including the White House South Lawn). The program has still not fully met this requirement and its assessment of this risk has increased since our last report. According to program officials, Sikorsky expects to have a solution for this requirement by November 2020. Mission Communications System (MCS): The mission communications system is a subsystem of the VH-92A aircraft that provides on-board and off-board communications services for the pilots, passengers, and crew. Currently, the VH-92A program has experienced problems connecting the MCS to secure networks, presenting a new risk area for the program. According to program officials, the MCS cannot connect to required secure networks due to recent changes in security protocols. Design changes will be needed to permanently correct this problem. For the March 2019 operational assessment, the program plans to connect to existing networks that do not use the new security protocols. This allowed the operational assessment to proceed but will limit the scope of testing. The Navy plans to have a final fix by January 2020 that will then be incorporated into the four production representative helicopters built under the development contract. These changes have caused the Navy to delay the start of the VH-92 initial operational test and evaluation by 3 months, a delay that is still within the approved program baseline threshold, as discussed earlier. We provided a draft of this report to DOD for review and comment. DOD provided technical comments, which were incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense and the Secretary of the Navy. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or sullivanm@gao.gov. Contacts points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix l. In addition to the contract above, Bruce H. Thomas, Assistant Director; Marvin E. Bonner; Bonita J. P. Oden: Peter Anderson, Juana S. Collymore, Danny C. Royer, and Marie Ahearn made key contributions to this report. Presidential Helicopter: VH-92A Program Is Stable and Making Progress While Facing Challenges. GAO-18-359. Washington, D.C.: April 30, 2018. Defense Acquisitions: Assessments of Selected Weapon Programs. GAO-17-333SP. Washington, D.C.: March 30, 2017. Presidential Helicopter: Program Progressing Largely as Planned. GAO-16-395. Washington, D.C.: April 14, 2016. Presidential Helicopter Acquisition: Program Established Knowledge- Based Business Case and Entered System Development with Plans for Managing Challenges. GAO-15-392R.Washington, D.C.: April 14, 2015. Presidential Helicopter Acquisition: Update on Program’s Progress toward Development Start. GAO-14-358R. Washington, D.C.: April 10, 2014. Department of Defense’s Waiver of Competitive Prototyping Requirement for the VXX Presidential Helicopter Replacement Program. GAO-13-826R.Washington, D.C.: September 6, 2013. Presidential Helicopter Acquisition: Program Makes Progress in Balancing Requirements, Costs, and Schedule. GAO-13-257. Washington, D.C.: April 9, 2013. Presidential Helicopter Acquisition: Effort Delayed as DOD Adopts New Approach to Balance Requirements, Costs, and Schedule. GAO-12-381R. Washington, D.C.: February 27, 2012. Defense Acquisitions: Application of Lessons Learned and Best Practices in the Presidential Helicopter Program. GAO-11-380R. Washington, D.C.: March 25, 2011.", "summary": "The mission of the presidential helicopter fleet is to provide safe, reliable, and timely transportation in support of the President. The Navy plans to acquire a fleet of 23 VH-92A helicopters to replace the current Marine Corps fleet of VH-3D and VH-60N aircraft. Initial delivery of VH-92A presidential helicopters is scheduled to begin in fiscal year 2020 with production ending in fiscal year 2023. The total cost of this acquisition program was originally estimated at almost $5.2 billion. The National Defense Authorization Act of 2014 included a provision for GAO to report on the VH-92A program annually, until the Navy awards the full-rate production contract. This report discusses (1) the extent to which the program is meeting its cost and schedule goals and (2) challenges facing the program in system development. To determine how the program is progressing, GAO analyzed program documents; and spoke with officials from the program office, the Defense Contract Management Agency, contractors, Director, Operational Test and Evaluation, and Department of Defense, Developmental Test and Evaluation. GAO also assessed the program's integrated master schedule against GAO best practices. Acquisition cost estimates for the Presidential Helicopter Replacement Program (also known as the VH-92A) have declined from $5.18 billion to $4.95 billion, for 23 new helicopters, since the program started in April 2014 (see table), and the program remains within its planned schedule. The contractor attributes this cost decrease to several factors: stable requirements, a low number of design changes, and program efficiencies. The program has delayed some program milestones—for example, its low-rate production decision—by 5 months from its original baseline goal. Although this remains within the approved schedule, the program will have less time than planned between the end of development testing and start of operational assessment. Program officials told GAO they expect to have enough information from both the government-led integrated testing and the operational assessment to inform the low-rate production decision. Continuing development challenges concerning performance requirements may affect whether the program can deliver fully capable aircraft on time in the future. These include: VH-92A start procedures: As we reported last year, the VH-92A was pursuing technical improvements related to Sikorsky's S-92A propulsion system, which has yet to meet a VH-92A performance requirement. Program risk for this performance requirement has not changed since our April 2018 report on the program. Landing zone suitability: As GAO found in 2018, the program has not yet met a key system capability requirement for landing the helicopter without damaging the landing zone—for example, the White House South Lawn. According to program officials, Sikorsky plans to have a solution for this performance requirement by November 2020 . Mission communications system: The VH-92A program has experienced problems connecting the aircraft's communication system to secure networks, due to changes in network security requirements, presenting a new risk area for the program. The Navy anticipates having a fix by January 2020. These changes are expected to be incorporated into the four production representative helicopters being built under the development contract in time for the program's initial operational test and evaluation. GAO is not making any recommendations in this report, but will continue to monitor the potential cost growth and schedule delays as the program responds to challenges meeting capability requirements.", "document_type": "gao"}
{"report": "CBP facilitates trade and travel, and enforces immigration and customs laws at the nation’s 167 land border crossings along the northern and southern border. CBP’s OFO is responsible for inspecting and processing pedestrians, passengers, cargo, and other items at all land border crossings. OFO has 20 Field Offices nationwide with nine that oversee the operations of all 110 land ports of entry—which may consist of one or more land border crossings—within their designated areas of responsibility. CBP OFAM manages CBP’s portfolio of owned and leased real property, including all 167 land border crossings. OFAM is responsible for capital planning at all land border crossings and for prioritizing capital projects across its portfolio based on need. GSA owns 101 (60 percent) of the 167 land border crossings, partially owns three, and leases 19 (11 percent). CBP owns 40 land border crossings (24 percent) and leases one directly from private owners. The National Park Service owns two and U.S. Forest Service owns one land border crossing. For the 101 land border crossings that GSA owns, it has occupancy agreements with CBP, which is the principal user of the facilities. GSA has responsibilities related to capital planning and construction at all 101 GSA-owned land border crossings. Since CBP’s operations depend heavily on the condition and functionality of infrastructure at land border crossings, GSA works closely with OFAM to plan, design, construct, and implement capital infrastructure improvements to accommodate ever-growing trade and travel at land border crossings. GSA-owned and leased land border crossings consist of large, medium, and small crossings along the northern and southern border. Land border crossings owned by other federal agencies—including CBP—tend to be small by comparison and are typically situated in remote locations along the northern border. See appendix I for more information on the nation’s portfolio of land border crossings. Of the 167 land border crossings at which CBP operates, 120 are located along the northern border and 47 are located along the southern border. Land border crossings vary across the northern and southern border, but are generally designed to process some combination of pedestrian, passenger vehicle, and commercial traffic with separate facilities for each mode. Infrastructure and layout at each land border crossing may vary depending on a variety of factors including the modes of traffic CBP processes at that location, traffic volume, local climate, and area-specific threats, among others. Many large land border crossings, including GSA’s Otay Mesa land border crossing in California, are designed to process pedestrians, passenger vehicles, and commercial traffic and are equipped with distinct infrastructure for each mode of traffic. Other land border crossings are designed to process a single mode of traffic, such as San Luis II in Arizona, which processes only commercial trucks. In general, CBP’s inspection process at land border crossings follows a standard sequence that includes separate areas designated for preprimary inspection, primary inspection, and secondary inspection for each mode of traffic and a main building which houses administrative and operational support activities, which we describe below. Preprimary inspection: Upon proceeding to cross the border into the United States, pedestrians and vehicles enter the land border crossing and are directed to preprimary inspection, where initial screening takes place. Depending on availability, CBP may deploy officers with canines to walk among the vehicles in preprimary waiting to reach an inspection booth. Overhead signage may be present to help CBP actively manage traffic by directing travelers to different lanes according to the type of travel documents they have. For example, CBP may use signs to designate specific lanes for travelers with Radio Frequency Identification (RFID) or other machine readable documents (“Ready lanes”) or for trusted travelers. Infrastructure in the pedestrian preprimary area often includes a space for travelers to queue prior to entering primary inspection. Infrastructure in the preprimary area for passenger vehicle and commercial traffic includes lanes for traffic to queue and radiation portal monitors that are designed to detect radiation and help prevent the smuggling of nuclear material into the United States. The passenger vehicle preprimary area also often includes screening technologies, including license plate readers and RFID readers to capture information on vehicles and RFID-ready travel documents such as passport cards and border crossing cards. At some land border crossings, CBP may use RFID readers in the commercial preprimary inspection area to electronically transmit identification, manifest, and other information to CBP officers prior to entering primary inspection. See figure 1 for examples of preprimary infrastructure. Primary inspection: After preprimary inspection, pedestrians enter the primary inspection area, typically located within the main building. Infrastructure for pedestrian primary inspection may include one or more lanes and officer booths where CBP officers review traveler information. Passenger vehicles and commercial traffic enter a primary inspection area where CBP officers verify passenger identification and perform an initial inspection of the vehicle, which may include a visual inspection of vehicles’ exterior and interior. Infrastructure supporting vehicular primary inspection includes one or more lanes and officer booths. Each booth may be equipped with an HVAC system to keep dangerous vehicle emissions and other fumes from entering the workspace and maintain a safe work environment during extreme heat and cold. Primary inspection booths are designed to be bullet and blast resistant to ensure officer safety. See figure 2 for examples of primary inspection infrastructure. Secondary inspection: If a pedestrian, driver, passenger or vehicle gives reason for suspicion or if the CBP officer is unable to complete the inspection at primary inspection for any reason, the officer may refer them to secondary inspection. Infrastructure in the pedestrian secondary inspection area is typically located within the main building and may include a processing area and a separate secure room where CBP officers can perform more thorough inspections for travelers suspected of criminal activity. Infrastructure in the passenger vehicle secondary inspection area may include work areas where CBP officers can search vehicles, vehicle lifts, and non-intrusive inspection x-ray technologies to identify contraband hidden in concealed compartments. Passengers may wait in the pedestrian secondary inspection area while CBP officers inspect vehicles. Infrastructure in the commercial secondary inspection area may include a loading dock where CBP officers can manually examine cargo and use x-ray technologies to identify hidden contraband. In addition, CBP uses canines at some land border crossings to conduct secondary inspections in the pedestrian, passenger, and commercial environments. See figure 3 for examples of secondary inspection infrastructure. Main buildings: Land border crossings may have facilities that support various administrative and operational activities. Infrastructure at CBP’s main buildings may include agricultural labs, commercial facilities, traveler processing areas, holding rooms, staff work areas, and locker rooms, among other infrastructure. See figure 4 for examples of main building infrastructure. Outbound infrastructure: Pedestrians and vehicles leaving the United States at land border crossings exit through the outbound area. Outbound infrastructure in the passenger vehicle, bus, commercial, and pedestrian area typically consists of one or more exit lanes and may also include inspection booths, inspection technologies, a secondary inspection area and support facilities, among others, to process traffic leaving the United States. See figure 5 for examples of outbound infrastructure. Figure 6 depicts a generic layout of a land border crossing with all modes of traffic. Travel: The volume of traffic at land border crossings varies across the northern and southern borders. At the nation’s busiest land border crossing—San Ysidro in California—CBP processed over 32 million entries in 2017. Conversely, at the Whitlash land border crossing in Montana—one of the smaller land border crossings—CBP processed 1,339 entries that same year. In total, CBP processed over 252 million entries in 2017 including 43 million pedestrian entries, 209 million passengers traveling to the United States in over 104 million passenger vehicle entries, 256,000 buses, and nearly 12 million commercial truck crossings. Figure 7 shows the largest northern and southern border U.S. land ports of entry by volume in 2017. Trade: In 2017, CBP processed and inspected nearly $721 billion in traded goods (imports and exports) through U.S. land ports of entry. As shown in figure 8, trade in goods transported via commercial truck through the largest northern and southern border land ports of entry impacted states across the country. Law Enforcement: Land border crossings serve a critical role in enabling CBP’s enforcement of immigration and customs laws. According to CBP, its officers encountered nearly 139,000 inadmissible individuals at land border crossings in fiscal year 2018. According to CBP, the lack of required travel documents, such as a visa, was the most common reason CBP officers determined individuals to be inadmissible. Further, according to the Drug Enforcement Administration, the nation’s land border crossings remain a target for exploitation by transnational criminal organizations. Specifically, the Drug Enforcement Administration’s 2018 National Drug Threat Assessment found that the most common smuggling method used by Mexican transnational criminal organizations involves transporting illicit drugs through U.S. land border crossings in passenger vehicles with concealed compartments or commingled with legitimate goods on tractor trailers. In fiscal year 2018, CBP seized 363,000 pounds of drugs at land border crossings, including approximately 265,000 pounds of marijuana, 70,000 pounds of methamphetamine, 20,000 pounds of cocaine, and 1,400 pounds of fentanyl. As part of its capital planning process, CBP is responsible for identifying land border crossing infrastructure needs and prioritizing capital projects across its portfolio of 167 land border crossings. At CBP-owned land border crossings, CBP generally funds these projects and hires a contractor to plan and execute capital infrastructure projects. At GSA- leased land border crossings, CBP and GSA typically work with the property owner to plan and execute capital projects. The owner of the land border crossing funds these projects, while CBP funds any alterations needed to fulfill its mission. At GSA-owned land border crossings, CBP typically works with GSA to complete a feasibility study and uses this information to prioritize infrastructure projects. According to GSA policy documents, feasibility studies are intended to determine the technical and economic viability of a project, define the project budget and scope, and establish an initial project design. GSA and CBP are to further refine land border crossing capital projects with a program development study, which updates project plans and budgets and provides the necessary information to pursue project funding. Each year, the Office of Management and Budget reviews each project included in GSA’s budget request and Congress authorizes projects and appropriates project funds as part of the federal budget cycle. GSA typically includes CBP’s top priority land border crossing capital infrastructure projects in its annual budget submission. GSA may pursue project funding for design and construction in separate budget requests or in a single appropriation, depending on the contract vehicle used. Once funded, GSA hires one or more contractors to design and execute the project. Figure 9 identifies funding for CBP and GSA-owned land border crossings in fiscal years 2009 through 2019. CBP defines its general land border infrastructure requirements in its Land Port of Entry Design Standards, which describe various infrastructure at land border crossings and detail how this infrastructure should operate. According to CBP, it updates these standards every few years to ensure the standards reflect CBP’s changing mission, including new technologies and infrastructure requirements. CBP officers we spoke with at 16 land border crossings and OFO field offices that oversee land border crossings reported examples of land border crossing infrastructure constraints they face at each stage of the inspection process including preprimary, primary, and secondary inspections. CBP relies on infrastructure to fulfill its mission at land border crossings. Specifically, according to CBP, well-functioning infrastructure is a critical factor in its ability to effectively screen persons and cargo, and facilitate cross-border travel and trade. For example, CBP officials stated that the number of operational inspection lanes is a key variable that affects traffic wait times. These officers also identified land border crossing infrastructure challenges with office space and port security. Examples of infrastructure constraints identified by CBP officers include: Limited space in the preprimary inspection area. According to CBP officers, land border crossings with primary inspection booths located in close proximity to the border line with Mexico have restricted space for CBP to conduct operations in the preprimary area. Figure 10 below shows a photo of restricted space in the preprimary area at a land border crossing on the southern border. Non-functioning screening technology in the preprimary inspection area. CBP officers stated that vehicle inspection technologies may not always function correctly. For example, at a land border crossing on the southern border, license plate readers and radiation portal monitors are inoperable at least once a week during summer months due to overheating, according to CBP officials. Temperatures can exceed 120 degrees Fahrenheit and the technology is exposed to the sun. Figure 11 shows license plate readers and radiation portal monitors in the preprimary area exposed to the sun at a land border crossing on the southern border. Officer inspection booths in the primary inspection area in need of repair. CBP officers stated that officer inspection booths may be inadequately cooled or heated resulting in officers more frequently rotating out of the booths for health and safety reasons. At one land border crossing, officers stated that the booth windows provide limited visibility since the old bullet resistant glazing has deteriorated and clouds officers’ view. At another land border crossing we visited, we observed that the doors on the primary inspection booths do not have working locks. Officers stated that as a result, when the land border crossing closes overnight they are unable to secure the booths or the computer equipment inside. Inadequate holding facilities in the secondary inspection area. Holding facilities at several land border crossings we visited had holding rooms that did not meet current CBP safety requirements, according to CBP officers. Officers at two land border crossings stated that safety concerns included inadequate ventilation. Officers at another land border crossing identified exposed wiring in a holding room as a safety hazard. Other land border crossings we visited did not have holding rooms and officers stated they detain individuals in the lobby of the administration building as a result. Figure 12 shows examples of holding facilities at land border crossings on the northern and southern borders that CBP officials identified as not meeting CBP requirements. Lack of availability of non-intrusive inspection (NII) technology in the secondary inspection area. CBP officers stated that the availability of NII technology improves their ability to conduct inspections. However, NII technology is not always available because it may need maintenance or repair, or CBP may share the technology with multiple land border crossings. Officers stated they may perform manual inspections of vehicles when NII technology is not available, which they noted can be less effective. Inadequate facilities for canine inspection in the secondary inspection area. CBP officers provided examples of limited facilities for inspection canines. For example, officers at one land border crossing stated they do not have a dedicated area to exercise inspection canines. Officers at another land border crossing stated they recently converted a storage closet into a climate-controlled canine kennel within the secondary inspection building. Previously, the CBP officers at this land border crossing kept the canines in running vehicles with air conditioning to keep them cool. Impeded traffic flow within the land border crossing. CBP officers identified challenges with facilitating traffic flow within the land border crossing. For example, the layout at a commercial land border crossing on the southern border impedes the flow of traffic because it requires commercial trucks to make a series of sharp turns as they travel through the border crossing. In addition, commercial traffic referred for secondary inspection must cut across four primary egress lanes to enter and exit the secondary inspection area. According to CBP officers, commercial trucks proceeding toward the border crossing exit may need to stop or reverse direction to create space for the trucks entering or exiting the secondary inspection area which creates delays in processing commercial traffic. Figure 13 shows an aerial view of a land border crossing with a diagram of where CBP officers identified that the land border crossing layout impedes traffic flow. Insufficient capacity to accommodate the volume of traffic. CBP officers stated that the number of travelers can exceed the capacity of the facility. For example, CBP officers stated that insufficient number of inspection lanes can result in lengthy wait times for travelers. Limited administrative space. CBP officers stated that insufficient administrative office space can be a challenge at land border crossings. For example, one land border crossing we visited did not have sufficient space for officer lockers and as a result placed some lockers in the contraband seizure room. Figure 14 shows lockers located in the contraband seizure room at a land border crossing on the northern border due to insufficient administrative space. Port security limitations. CBP officers also described challenges with land border crossing security. For example, officers stated the lack of measures to prevent travelers from exiting the crossing without authorization, such as vehicle barriers and security gates, impedes CBP’s ability to stop drivers from fleeing the land border crossing and entering the United States without inspection. Figure 15 shows exit lanes constructed with temporary barriers to control the flow of traffic leaving the land border crossing and entering the United States. Lack of inspection facilities for outbound traffic. CBP officers at land border crossings without facilities to inspect outbound traffic can face difficulties when inspecting traffic exiting the United States. For example, at one land border crossing without outbound inspection facilities, officials stated they park CBP vehicles in the outbound traffic lanes to slow traffic so that CBP officers can stop and inspect vehicles exiting the United States. CBP collects information on the condition of infrastructure at some land border crossings through contracted Facility Condition Assessments (FCA), but has not assessed conditions at all land border crossings. FCAs are engineering inspections that evaluate the condition of the facility and identify repair and improvement needs. The output of an FCA is a report that describes infrastructure deficiencies at a facility and represents the condition of the land border crossing infrastructure at the time of the FCA. From 2016 through 2018, CBP and GSA assessed the condition of infrastructure at 95 of the 167 land border crossings. As of December 2018, CBP had conducted FCAs at 74 of the 167 land border crossings within the previous three years. In addition, according to CBP officials, in 2016 GSA funded and conducted Building Engineering Reviews at 21 land border crossings in response to conversations between CBP and GSA on how to improve GSA service delivery at land border crossings. CBP officials stated they use facility condition information from the 2016 Building Engineering Reviews because they contain information similar to what CBP collects through an FCA. According to GSA officials, GSA now rarely conducts Building Engineering Reviews because they are costly and their data quickly become obsolete. GSA now uses other tools to assess infrastructure condition and GSA officials were not aware of any reviews at land border crossings since 2016. See table 1 for a breakdown of the land border crossings that CBP and GSA have assessed. According to the assessments, the condition of infrastructure varies across land border crossings. The facility condition index—the ratio of the costs to correct facility infrastructure deficiencies to the total replacement value of the facility—ranges from 0 percent to 69 percent across the 95 FCAs and Building Engineering Reviews conducted between 2016 and 2018. These assessments identified approximately $140 million in estimated infrastructure deficiencies and the average facility condition index is 16 percent. See table 2 for the distribution of facility condition indices across land border crossings by ownership type. See appendix I for facility condition index scores across CBP’s land border crossing portfolio. CBP began conducting FCAs at CBP-owned land border crossings in 2008. OFAM officials stated they set a goal of conducting FCAs at each CBP-owned land border crossing on a three-year cycle, but have not always been able to do so due to resource constraints. Our analysis identified that CBP conducted FCAs at only four of the 40 CBP-owned land border crossings over three years—2016 to 2018—when its goal was to have conducted FCAs at all 40 facilities over this time frame (see table 1 above). CBP also began conducting FCAs at GSA-owned facilities in 2016, and at GSA-leased facilities in 2017. According to CBP officials, they plan to conduct several FCAs at selected GSA-owned facilities each year to obtain information on the condition of infrastructure at these facilities, though there is no required interval at which they must assess these facilities. CBP officials stated they prioritize GSA land border crossings in need of capital investment when selecting which facilities to assess. DHS Directive 119-02-004 “DHS Real Property Facility Condition Assessment” instructs each DHS component—including CBP—to implement and maintain a program to ensure that the condition of real property is assessed every three years and updated each fiscal year through FCAs beginning in fiscal year 2018. The Directive applies to land border crossings owned by CBP and is intended to ensure that CBP collects information on the condition of infrastructure across these facilities. Although CBP has a goal of conducting FCAs at CBP-owned land border crossings every three years, it has not met this goal in recent years as CBP assessed only four of the 40 land border crossings from 2016 through 2018. According to CBP officials, FCAs older than three years may not accurately reflect the current condition of infrastructure at land border crossings. According to OFAM officials, they have not developed a plan to ensure that CBP implements its program consistent with the Directive by conducting FCAs on a three-year cycle going forward due to limited resources to conduct the assessments. Specifically, CBP officials stated that CBP has not been able to fully fund the FCA program due to other competing facility priorities. However, developing a plan that accounts for the new requirements under the Directive could assist CBP in planning funding needs for the FCA program. Further, developing and implementing a plan to ensure CBP executes its FCA program consistent with Directive 119-02-004 would assist CBP in making resource decisions for this program. Implementing its FCA program consistent with DHS Directive 119-02-004 would enable CBP to collect more complete and current information on the condition of infrastructure at land border crossings it owns. CBP and GSA conduct separate assessments of facility conditions at GSA-owned land border crossings; however, they do not routinely share or use the results of each other’s efforts to inform their assessments of facility condition. More specifically, separate from CBP’s process for assessing facility condition, GSA uses its Building Assessment Tool to assess the condition of infrastructure across its entire real property portfolio, including land border crossings. This process is intended to assist GSA in estimating its future costs for repairing and maintaining the buildings in its portfolio. Although the CBP FCA and the GSA Building Assessment Tool both assess elements of facility condition, these assessments have different methodologies, scopes, and purposes. We reviewed a 2018 CBP comparative analysis of the FCAs and Building Assessment Tool processes. CBP’s analysis showed that FCAs are detailed assessments of all building systems that CBP uses at a land border crossing. According to CBP officials, CBP uses FCAs to collect information on the condition of infrastructure at land border crossings and to inform land border crossing capital infrastructure projects. In comparison, GSA’s Building Assessment Tool is a standardized assessment used across GSA’s federal real property portfolio to identify, plan for, and prioritize repair and maintenance needs across GSA properties. As a result, while the two types of assessments may be related in some aspects, officials from each agency stated they could not use the other’s facility assessment in place of their own. GSA officials assessing land border crossing infrastructure condition are not required to consult with CBP officials who operate the port or review any existing CBP FCAs, according to GSA officials. CBP provides GSA with pre-assessment questionnaires prior to conducting FCAs at GSA- owned land border crossings. These questionnaires inquire about available GSA information on facility condition. However, CBP officials stated they do not specifically request GSA Building Assessment Tool data, and as a result, have not generally received these data prior to conducting a FCA. GSA officials stated that CBP FCAs and GSA Building Assessment Tool assessments differ in scope and as a result GSA does not use FCAs in place of their Building Assessment Tool assessments. However, FCAs identify infrastructure needs at land border crossings and the results could provide GSA with an understanding of infrastructure needs identified by CBP at land border crossings. Likewise, GSA’s Building Assessment Tool is used to identify infrastructure in need of repair and could provide CBP with an understanding of infrastructure needs identified by GSA. We have previously identified key practices for collaboration among federal agencies. Specifically, agencies can enhance and sustain their collaborative efforts by identifying and addressing needs by leveraging resources. According to CBP officials, improving information sharing on facility condition could help ensure that both CBP’s and GSA’s assessments are as accurate and complete as possible. Moreover, using each other’s facility condition information could enable CBP and GSA to improve the accuracy and completeness of their respective assessments of facility condition at land border crossings. CBP uses a software system called TRIRIGA to manage its real property asset portfolio, but information in this system is not fully reliable. Among other functions, CBP uses TRIRIGA to track infrastructure needs and the condition of facilities at land border crossings. CBP identifies infrastructure needs through FCAs and records these data in TRIRIGA. CBP also identifies additional infrastructure needs as they arise and records these data in TRIRIGA. For example, an infrastructure need may arise at a building and be recorded in TRIRIGA in the months following a CBP FCA. CBP uses TRIRIGA data to calculate a score reflecting the overall current condition of infrastructure at a land border crossing. CBP uses this score on condition to inform internal planning and prioritization of maintenance and repair projects at the local level, according to CBP officials. In addition, CBP’s goals for facility condition data in TRIRIGA include making facility condition information available in real time, starting with TRIRIGA for responses to data calls and reporting, and using data in the system for more efficient planning and decision making. However, according to CBP officials, land border crossing facility condition data in TRIRIGA have not been consistently reliable because some data on infrastructure needs are duplicative, out of date, or incomplete. Duplicate Data: CBP officials stated that in the past, OFAM officials responsible for entering infrastructure needs into TRIRIGA created duplicate entries in some instances. For example, OFAM officials have identified, and entered into TRIRIGA, infrastructure needs at land border crossings that had already been identified and entered in the past. As a result, TRIRIGA double-counted the costs associated with these duplicate infrastructure needs which impacted the reliability of the calculation of the score on facility condition for the associated land border crossing. According to OFAM officials, they have taken several steps to improve the TRIRIGA data entry processes. During the course of our review, OFAM officials identified internal confusion regarding who had the authority to remove infrastructure needs from TRIRIGA. In response, in April 2019 OFAM developed new guidelines clarifying roles and responsibilities for accurately entering FCA data and removing infrastructure needs from TRIRIGA. OFAM officials stated they expect this process to avoid duplicative data entry in the future. Further, as described earlier, by conducting FCAs for each CBP-owned land border crossing every three years, updating them annually consistent with DHS Directive 119-02-004, and then entering the results into TRIRIGA in accordance with the new guidelines for reviewing existing infrastructure needs and removing them as needed, CBP would be positioned to more frequently review and validate these data in the system on an ongoing basis. Out of Date Data: Officials stated that FCA data for some land border crossings in TRIRIGA originate from as early as 2013, the last time CBP conducted an FCA at those border crossings. As a result, TRIRIGA does not accurately reflect the current condition of these facilities. Historically, CBP has updated TRIRIGA with facility condition information collected through FCAs. As described earlier, DHS Directive 119-02-004 directs CBP to conduct FCAs for each CBP- owned land border crossings every three years and update them annually. By developing and implementing a plan to complete more timely FCAs at CBP-owned land border crossings, CBP will be better positioned to ensure that TRIRIGA is updated to reflect more current condition information. In addition, as CBP continues to conduct FCAs at GSA owned and leased land border crossings, CBP can continue to update TRIRIGA with more current information on facility condition consistent with OFAM’s April 2019 guidance on TRIRIGA data entry. Incomplete Data: Officials stated that because CBP oversees maintenance and repair work at CBP-owned land border crossings, data in TRIRIGA are more reliable for these land border crossings than for GSA-owned land border crossings where GSA is responsible for planning and executing maintenance and repair work. CBP officials said that while they do identify infrastructure needs at GSA- owned land border crossings and enter related information into TRIRIGA, the information on these needs can be incomplete. CBP officials stated that for example, a past CBP FCA may have identified a building roof in need of repair. Following the FCA, CBP would then enter a record of this infrastructure need in TRIRIGA. If GSA repaired the roof during the following year as part of its planned maintenance work, but did not inform CBP headquarters, TRIRIGA would continue to identify a deficient roof at the land border crossing after GSA repaired it. CBP officials stated that GSA may conduct maintenance or repair work to address an infrastructure need without CBP’s knowledge because CBP and GSA did not have a process for GSA to notify CBP of maintenance and repair work the agency conducts at land border crossings. According to OFAM officials, GSA began sharing with OFAM monthly summary-level data on maintenance GSA performs at land border crossings. However, these data do not include the level of detail required to update condition data or close out deficiencies in TRIRIGA. We previously identified key practices for collaboration among federal agencies, including that agencies can enhance and sustain their collaborative efforts by identifying and addressing needs by leveraging resources. Sharing information on GSA maintenance and repair work at GSA-owned land border crossings at the level of detail necessary for CBP to update TRIRIGA would enable CBP to improve the completeness and accuracy of data in the system. As a result, CBP would have access to more complete and accurate data to use when planning and prioritizing infrastructure maintenance activities, improving the availability of real-time facility condition information, and responding to data calls and reporting. For example, more complete and accurate data in TRIRIGA would better position CBP to identify and report to Congress on improvements needed at land ports of entry. Specifically, the 2018 United States Ports of Entry Threat and Operational Review Act requires CBP to submit to Congress a threat and operational analysis that includes, among other elements, an assessment of current and potential threats due to security vulnerabilities and unlawful entry, and improvements needed at ports of entry to enhance travel and trade facilitation and reduce wait times. CBP officials stated they have not yet determined which data they will use to develop this report, but this reporting requirement is one potential example of how more reliable data from TRIRIGA could be used to effectively report on the condition of land border crossing infrastructure. CBP prioritizes prospective land border crossing projects within its annual Five-Year Land Port of Entry Capital Investment Plan (five-year plan). CBP is statutorily required to complete a detailed five-year plan each fiscal year and include it with its annual budget submission to Congress (i.e., President’s budget), which typically occurs in February. Each five- year plan is to cover all federal land border port of entry projects with a yearly update of total projected future funding needs delineated by land port. According to CBP officials, CBP generally completes an initial draft of the five-year plan in November or December each fiscal year and submits it to CBP and GSA leadership, DHS leadership, and the Office and Management and Budget for review and approval. However, our analysis of CBP’s five-year plans for fiscal years 2014 through 2018 identified that CBP completed its five-year plan after the annual budget submission in fiscal year 2016 and 2018 and did not complete a plan at all in fiscal year 2017. Specifically, CBP submitted its fiscal year 2016 five-year plan in July 2016—163 days after CBP’s annual budget submission—and its fiscal year 2018 plan in October 2018—235 days after CBP’s annual budget submission. Table 3 identifies the days between CBP’s submission of its five-year plan and budget to Congress in fiscal years 2014 through 2018. CBP officials stated they completed the five-year plans after the annual budget submission in fiscal years 2016 and 2018, and did not complete a five-year plan for Congress in fiscal year 2017, due to delays in the review and approval process. CBP officials stated the review and approval process may take several months to complete due to revisions at various stages and competing priorities among stakeholders that may slow the process. Officials also said they have little control over how long it takes stakeholders within CBP leadership, DHS, and the Office of Management and Budget to review and approve the five-year plan. Consequently, according to CBP officials, CBP has not attempted to establish time frames for completing the plan. While we acknowledge that setting time frames for completing the plan may not guarantee timeliness, establishing time frames for each stakeholder could help measure and assess progress in reviewing and approving the draft plan. Standards for Internal Control in the Federal Government state that management should define objectives so that they are understood at all levels, including by outlining the time frames for achievement of those objectives. By establishing time frames for stakeholders throughout the five-year plan review and approval process, CBP would be better positioned to identify and address sources of delay and could improve its ability to meet statutory reporting requirements by including its five-year plan with its annual budget submission to Congress. CBP develops a list of roughly eight to twelve priority land border crossing capital projects each year and presents these projects to Congress in the five-year plan, but the agency has not established a consistent methodology in developing this list. CBP’s five year plans note five broad steps CBP follows in developing the list of priority capital projects. These steps are applicable to the entire land border crossing portfolio— regardless of ownership—and include: 1. Strategic Resource Assessment (SRA): According to the five-year plan, CBP conducts SRAs cyclically to compare infrastructure requirements across its portfolio and present a uniform picture of capital investment needs at all land border crossings along the northern and southern borders. 2. Capital Project Scoring: Using data generated during the SRA, CBP scores and ranks each land border crossing by criticality and relative urgency of infrastructure needs. 3. Sensitivity Analysis: CBP then applies a sensitivity analysis and updates its initial ranking based on factors unaccounted for through the SRA, including unique regional conditions, bilateral planning with partners in Canada and Mexico, or interests of other federal, state, or local agencies. 4. Assess Feasibility and Risk: CBP coordinates with project stakeholders—including GSA for all GSA-owned land border crossings—to evaluate the feasibility, risk, and cost associated with project implementation by completing a feasibility study. These studies analyze alternatives and review environmental, cultural, and historic preservation requirements as well as land acquisition requirements and procurement risks. CBP also assesses the likelihood of obtaining funding for the proposed project. 5. Establish a Five-year Capital Investment Plan: After the SRA and the scoring, analysis, and assessment phases, CBP prioritizes land border crossing capital projects and develops a five-year capital investment plan in coordination with GSA. CBP updates the plan annually, taking into account the changing conditions at land border crossings. Although CBP has outlined the five broad steps it uses to prioritize projects, our analysis of CBP’s five-year plans for fiscal years 2014 through 2018 identified that CBP did not follow a consistent methodology across the years or across projects when prioritizing prospective land border crossing projects. For example, in some five-year plans CBP prioritized projects by comparing relative need at land border crossings using more recent SRA data for some land border crossings and older data for other land border crossings. In one such instance in fiscal year 2018, CBP compared relative need using 2015 data for some land border crossings and data dating as far back as 2007 for other land border crossings. Although CBP’s five-year plan states that CBP performs SRAs cyclically, CBP has not established the frequency at which SRAs are to be completed. In 2015, CBP completed a partial SRA update for 36 of 167 land border crossings that it considered high-priority, but has not completed a portfolio-wide SRA since 2007. Our analysis of CBP’s five-year plans for fiscal years 2014 through 2018 also identified that CBP had feasibility studies for some, but not all, projects listed in the five-year plans. Specifically, our analysis identified that CBP had feasibility studies for approximately two thirds (28 of 41) of the projects it prioritized over these years. CBP officials told us that due to the limited shelf-life of feasibility studies (two to three years), CBP and GSA target high-priority land border crossing projects for feasibility studies that are likely to receive funding within the next two to three years. However, of the top five projects CBP ranked as the highest priority in each of its five-year plans in fiscal years 2014 through 2018, CBP completed feasibility studies for approximately half (12 of 20) of these projects. Further, among the 12 projects CBP ranked in the top five in its fiscal years 2014 through 2018 five-year plans that had feasibility studies, 10 of 12 projects had a feasibility study that was more than five years old when CBP prioritized them. In addition, CBP prioritized projects on each of its five-year plans by comparing cost estimates developed through different methodologies. Specifically, CBP prioritized projects using detailed cost estimates developed as part of a feasibility study for some projects and order of magnitude cost estimates for projects that do not have a feasibility study or that had an out-of-date feasibility study. These order of magnitude cost estimates were significantly different from the cost estimates that were later produced for these projects through feasibility studies. For example, CBP’s fiscal year 2015 plan included an order of magnitude cost estimate of $95 million to implement a single project at two separate crossings—San Luis I and II. However, after completing a feasibility study for the project in October 2017, GSA estimated it would cost $289 million—a nearly 300 percent cost increase—to complete the project. CBP outlines the five broad steps it is to take in general to develop a list of priority projects each year and establish an annual five-year plan and these steps are documented at a high level. However, there is not a detailed planning methodology that would help ensure officials consistently and appropriately develop and assess priority projects each year. For example, the five-year plans do not define what minimum steps CBP personnel are to take at each step in the process, such as guidance and procedures on which projects require feasibility studies. The plans also do not include time frames for completing each step, such as establishing expectations for the frequency at which CBP personnel are to update SRA data. As a result, CBP officials told us they rely on informal processes and procedures to complete these steps and prioritize land border crossings in its annual five-year plans. CBP officials acknowledged that they have not issued formal guidance documenting the steps in its prioritization process or establishing procedures and time frames for each step, but stated that they plan to do so going forward. Specifically, officials told us that CBP plans to document its process for prioritizing land border crossing projects to improve transparency, better educate staff on roles and responsibilities, and help ensure CBP consistently applies this process each year. While these would be positive steps, CBP was not able to provide information on specific plans or expected time frames for implementing these steps. Standards for Internal Control in the Federal Government state that management should define objectives so that they are understood at all levels by outlining what is to be achieved, how it will be achieved, and the time frames for achievement. The standards also establish that management should implement control activities through documented policies. To achieve this, management should document policies that establish each unit’s responsibility for achieving the objectives related to an operational process. Establishing and documenting a methodology for CBP’s annual land border crossing capital prioritization process, including procedures and time frames for each step, could help ensure that CBP identifies key activities needed to prioritize projects and that CBP personnel follow a consistent methodology across projects and across years. For example, such a methodology could help CBP identify which projects require feasibility studies in a given fiscal year, and how they are to use information on project feasibility, risk, and cost when prioritizing projects. Further, having time frames for each step could help CBP determine how often to update SRA data across its portfolio for purposes of comparing relative infrastructure needs at land border crossings. Lastly, establishing and documenting a land border crossing prioritization methodology could help CBP ensure it consistently provides Congress with more up-to-date and complete information in its five-year plans. From fiscal years 2014 through 2018, GSA initiated or completed 10 capital infrastructure projects at eight land border crossings. Among these projects, six were complete and four were ongoing as of March 2019. Projects at three of these border crossings—Alexandria Bay, Calexico West, and San Ysidro—consist of multiple phases. GSA manages each phase as a distinct project funded under separate congressional appropriations and executed through separate contracts. Across all 10 projects, the amount of schedule growth against the original schedule baselines ranged from 0 percent growth to 59.2 percent growth, though several of these projects revised their baselines to account for the schedule growth. Half of the projects experienced less than 10 percent schedule growth above their original schedule baselines, and the other half experienced more than 10 percent schedule growth. When accounting for projects for which schedule baselines were revised, among the 10 projects, six have met or are on track to meet schedule baselines. The Alexandria Bay project, which GSA expects to complete in January 2020, is the only project on track to meet its original schedule baseline. GSA revised its schedule baselines during construction for the remaining five projects and all have met or are on track to meet these revised baselines. More specifically, Calexico West, Derby Line, and Nogales West-Mariposa are the three projects that are complete and met revised schedule baselines. San Ysidro phases II and III are the two ongoing projects that are on track to meet their revised schedule baselines as of January 2019. See table 4 below for a breakdown of project schedule performance. Four of GSA’s 10 projects did not meet, or are not expected to meet, their schedule baselines. The Tornillo-Guadalupe project experienced the most schedule growth of the projects we reviewed. GSA completed the Tornillo-Guadalupe project in October 2014, 470 days later than its original baseline in July 2013 and 80 days later than its August 2014 revised baseline. Schedule growth at Tornillo-Guadalupe was primarily due to delays in the construction of corresponding Mexican infrastructure, unstable soil conditions, and contractor performance, according to GSA officials. In addition to Tornillo-Guadalupe, the San Ysidro I and Laredo projects did not meet their schedule baselines, and the Columbus project is not on track to meet its schedule baseline, as of January 2019. Of the four projects that experienced schedule growth against their final schedule baselines, two projects had less than 5 percent growth and two projects had about 10 percent growth. While none of the 10 projects kept costs at or below baselines, eight projects stayed within their 10 percent cost contingency allowance. The Tornillo-Guadalupe and Derby Line projects both exceeded their cost contingency allowance. GSA completed the Tornillo-Guadalupe project in October 2014 at a final construction cost of $59 million—18.7 percent above its cost baseline—due to challenges described above. GSA completed the Derby Line project in November 2018 with a final construction cost of $26.4 million—10.6 percent above its cost baseline— mainly due to CBP-requested changes, according to GSA officials. The total baseline construction cost for all 10 projects, as of January 2019, is $1.03 billion and the combined current contract value is $1.09 billion— which is about $62.9 million (6.1 percent) over baseline budgets. See table 5 below for a breakdown of project cost performance. GSA has completed, or expects to complete, nine out of the 10 projects at full scope. GSA reduced scope for one project—Laredo, TX—due to cost concerns after the construction contract award. During Laredo project construction, GSA removed plans to build a footbridge spanning the passenger vehicle primary lanes and cosmetic finishes to buildings to avoid further cost overruns, according to GSA and CBP officials. See appendix II for detailed descriptions of the ten projects. GSA reported facing challenges planning and designing land border crossing capital projects. These challenges included delays between design and construction and the division of large projects into smaller phases, which GSA officials reported led to higher costs and longer development timelines. Funding Lags. GSA officials reported that funding lags between project design and construction can increase costs and extend construction timelines. GSA has requested separate appropriations for project design and construction using a model known as design-bid-build, which created the potential for funding lags to occur. According to CBP and GSA officials, the process from requesting an infrastructure project to completing the project lasts approximately 7 years. However, GSA experienced funding lags of up to 10 years between design and construction. Figure 16 identifies development timelines from initial planning through construction for our 10 selected land border crossing capital projects. The cost of labor and materials can escalate when funding lags occur between design and construction. For example, after completing design for the Calexico West project, GSA requested construction funding in fiscal year 2010, but did not receive funding until five years later. As a result, estimated construction costs escalated from $78.5 to $90.8 million (16 percent). To keep project cost estimates up-to-date during funding lags, GSA officials explained that GSA typically increases project cost estimates over time to account for inflation, changes in the labor market, and the cost of materials, among other factors. To help address cost escalation, contractors have purchased materials upfront, and GSA has combined projects that would otherwise be constructed separately. To address increasing materials costs for the Alexandria Bay project, the contractor purchased steel upfront in order to avoid future cost increases due to import tariffs, according to GSA officials. The Laredo project faced significant labor and material cost growth due to a boom in the Texas construction market. As a result, GSA decided to combine the two Laredo crossings into one contract to lock in prices and avoid paying higher prices in the future. According to GSA officials, funding lags between design and construction may result in outdated project designs that do not reflect newer CBP infrastructure requirements. In such instances, GSA must invest additional time and resources to update project designs and incorporate new CBP requirements, such as newer inspection technologies or facilities. According to GSA officials, design refreshes can be challenging due to a lack of continuity and staff turnover at the architecture and engineering firms that originally designed the project. In some instances, according to GSA officials, the original firms may not be available or interested in redesigning the project and GSA may need to hire a new firm. For example, GSA spent $3.3 million on design for the Columbus project in fiscal years 2007 and 2009. However, the funding lag between design and construction required a $7.4 million design refresh in fiscal year 2014. In another example, GSA established the Calexico West project’s design concept in fiscal year 2007, but didn’t receive construction funding until fiscal year 2015. According to officials, GSA had to spend approximately $1 million for a design refresh to account for new CBP requirements, which resulted in a longer development timeline. To address risks of funding lags with the design-bid-build approach, GSA has shifted toward using contract vehicles for land border crossing capital projects that combine design and construction into a single appropriation. This approach allows for more precise planning, less risk from delays, and less time for costs to escalate, according to GSA officials. Project Phasing. According to GSA officials, OMB may request that GSA and CBP divide large projects into separate phases when high-cost projects are unlikely to be funded in a single appropriation. For example, of the eight border crossing locations represented across the 10 projects in our review, CBP and GSA broke three projects at three locations into phases to obtain approval: Alexandria Bay, Calexico West, and San Ysidro. However, for similar reasons as those related to funding lags between design and construction, breaking up projects into smaller phases can increase overall costs and add years to project timelines. According to GSA and CBP officials, when appropriations do not align with project schedules, contractors may leave the site after completing a single phase to pursue new work opportunities. Additionally, by the time GSA receives appropriations for latter phases, the contractor must remobilize equipment and labor, costs of labor and material may have increased, and projects may need design refreshes, as described above. For example, after Calexico West phase II remained unfunded two years after phase I was completed, GSA estimated that project costs increased by $27.7 million due to increases in labor and materials and potential redesign work. In another example, GSA officials told us that after originally designing the Alexandria Bay project as a single-phase in 2010, OMB directed GSA to break the project into two phases in 2014 to increase the likelihood of funding. According to GSA officials, redesigning Alexandria Bay as a two- phase project added as much as $16.5 million to total project costs. Construction costs escalated by about $58.4 million from the single-phase estimate in fiscal year 2011 to fiscal year 2017 when phase I construction began, an increase of 36 percent. Further, completing the Alexandria Bay project in two phases added an additional three years to the project timeline. While breaking projects into phases can potentially lead to higher costs, GSA officials told us that doing so can be an effective way to start work on a large capital project when funding for the entire project is not available in a single year and can be cost effective when GSA receives appropriations for each phase in line with its planned schedule. GSA and CBP have reported facing challenges constructing land border crossing projects, including those related to CBP-requested changes, geographical and environmental factors, and inadequate or incomplete infrastructure in neighboring countries. CBP Change Requests. CBP may request modifications to ongoing projects through Reimbursable Work Authorizations to meet changing infrastructure requirements, such as incorporating newer technologies and CBP design standards. These requests range from installing new information technology and security equipment to enhancing office, holding facilities, or public-facing areas of the port. CBP change requests are often necessary because the span between design and construction can last up to 10 years, according to CBP and GSA officials. While CBP typically pays for the cost of these modifications, GSA must incorporate changes into existing project plans, which can result in schedule growth, according to GSA officials. CBP-requested changes led to cost and/or schedule growth at the Calexico West, Columbus, Derby Line, Nogales West-Mariposa, and San Ysidro land border crossing projects, according to GSA officials. In one example, GSA revised the Nogales West- Mariposa project’s schedule baseline from March 2014 to August 2014 to incorporate a $10 million Reimbursable Work Authorization from CBP that added an outbound inspection facility. Environmental and geographical challenges. Environmental and geographical factors including extreme climates, remote locations, and limited space, can create construction challenges, according to CBP and GSA officials. Extreme climates can disrupt construction activities, such as concrete work at land border crossings. CBP officials said that at some southern crossings concrete may crack when it dries too quickly due to extreme heat, requiring contractors to pour concrete in the early morning when temperatures are cooler. However, officials said that because this work typically occurs outside of regular business hours, it often comes at a premium and can increase project costs. Along the northern border, contractors may not be able to do concrete work during the winter months because temperatures can be too cold to pour concrete. At Derby Line, because of delays earlier in construction, work extended into an additional winter season, contributing to cost and schedule growth because contractors were slowed or limited by weather, according to GSA officials. Environmental conditions surrounding construction sites also led to construction challenges, and in turn, cost and schedule growth. The area surrounding the Columbus land border crossing is prone to severe flooding, and major flood events have forced CBP to close the port several times a year, according to GSA officials. Officials also said flooding posed a potential risk of deteriorating port structures. After GSA spent $3.3 million to develop the original design, it spent an additional $7.4 million on a design refresh to incorporate flood protection and update CBP requirements to prepare for construction. In another example, GSA and the contractor discovered unstable soil conditions during the Tornillo- Guadalupe project that resulted in a two month delay and $1.3 million cost increase (about 3 percent of the project budget) to mitigate. GSA officials told us they may also experience challenges accessing labor, materials, and utilities for projects at remote land border crossings. For example, Alexandria Bay’s remote location created logistical challenges for transporting concrete to the site. Because the land border crossing is on an island and only accessible via toll bridge, the contractor determined it was more cost effective to construct a temporary concrete plant onsite. GSA officials also stated the labor market in Alexandria Bay is limited—due in part to its remoteness—and that labor costs were high because the contractor had to temporarily relocate its employees to the area. In another example, officials reported challenges with transporting construction materials to the Tornillo-Guadalupe site due to its remote location, contributing to 2.5 months in schedule growth. Natural features and dense population centers surrounding land border crossings can create challenges for contractors during construction. For example, the Alexandria Bay project—which will triple the crossing’s footprint when complete—required contractors to blast massive rock formations to create more room for facilities. GSA officials stated the rock removal entailed significant coordination with CBP because GSA required CBP to temporarily halt vehicle processing for safety reasons when GSA’s contractor was using dynamite. Officials also told us that snow removal is a challenge at Alexandria Bay because there are limited places to put plowed snow without impeding traffic and interrupting CBP operations. Corresponding international infrastructure. Inadequate or incomplete infrastructure in neighboring countries can lead to project delays. GSA officials explained that because land border crossings on both sides of the border need to connect, capital infrastructure projects in the United States are largely dependent on the readiness of Mexican or Canadian infrastructure. For example, GSA completed the Tornillo-Guadalupe project in October 2014, but delayed opening cargo processing facilities due to Mexico’s delays in completing its new commercial facilities and bridge system required for commercial traffic. As a result, CBP did not begin processing inbound cargo at Tornillo-Guadalupe until March 2016—16 months after it began processing passenger vehicles. Furthermore, after processing 277 trucks in 14 months, CBP suspended commercial inspection operations in May 2017, citing low traffic volumes. CBP officials said that commercial transporters were unwilling to use underdeveloped Mexican infrastructure in the region, leading to low commercial traffic volumes, and in turn, CBP’s decision to suspend commercial operations. Similarly, GSA had to delay work for 3 months on the Calexico West project because Mexico was behind schedule on its infrastructure project, according to GSA officials. To address this issue, GSA slowed work in that area and Mexico accelerated its schedule so that GSA and Mexico could complete their sections simultaneously. CBP is charged with facilitating billions of dollars in trade and travel at the nation’s border, while also preventing terrorists, criminals and other inadmissible individuals from entering the country. Given that CBP relies on infrastructure at land border crossings to fulfill its mission, maintaining the condition of the infrastructure is critical and can also be challenging, as many land border crossings were built more than 70 years ago. By developing and implementing a plan to ensure CBP executes its FCA program to assess the condition of infrastructure at CBP-owned land border crossings consistent with DHS policy, CBP would be able to maintain more complete and current information on its overall infrastructure needs. Also, given that GSA owns many of the land border crossings out of which CBP operates, sharing and using certain relevant information with each other—such as their respective facility assessments and repairs at land border crossings—could help both agencies improve the accuracy and completeness of their respective assessments of facility condition. Additionally, while CBP develops five-year plans to prioritize capital projects at land border crossings, establishing time frames for stakeholders who review and approve the plans would better position CBP to identify and address sources of delay and could improve its ability to complete a plan each year and include it in the budget submission to Congress. Furthermore, by also establishing a methodology for prioritizing its capital projects—including key required procedures and time frames—CBP could better ensure consistency in its approach from year to year. We are making a total of seven recommendations, including five to CBP and two to GSA: The CBP Commissioner, in conjunction with the DHS Office of the Chief Readiness Support Officer, should develop and implement a plan to ensure that CBP executes its FCA program by conducting FCAs at each CBP-owned land border crossing consistent with DHS Directive 119-02- 004. (Recommendation 1) The CBP Commissioner should share FCA reports with GSA and use facility condition information in GSA’s Building Assessment Tool to inform FCAs. (Recommendation 2) The GSA Administrator should share Building Assessment Tool reports with CBP and use facility condition information in CBP’s FCAs to inform its assessments through the Building Assessment Tool. (Recommendation 3) The GSA Administrator, in conjunction with CBP, should share with CBP information on GSA maintenance and repair work at GSA-owned land border crossings at the level of detail necessary to inform CBP’s data in TRIRIGA. (Recommendation 4) The CBP Commissioner should use information on maintenance and repair work conducted by GSA at GSA-owned land border crossings to update facility condition information in TRIRIGA on an ongoing basis. (Recommendation 5) The CBP Commissioner should establish review time frames for stakeholders involved in its Five-year Capital Investment Plan review and approval process. (Recommendation 6) The CBP Commissioner should establish and document a methodology for its annual land border crossing capital prioritization process that includes procedures and time frames for each step. (Recommendation 7) We provided a copy of this report to DHS and GSA for review and comment. DHS and GSA provided comments, which are reproduced in full in appendix III and appendix IV, respectively, and discussed below. DHS also provided technical comments, which we incorporated as appropriate. In its comments, DHS and GSA concurred with our seven recommendations and described actions planned to address them. With respect to our first recommendation that CBP develop and implement a plan to execute FCAs at CBP-owned land border crossings consistent with DHS Directive 119-02-004, DHS stated that CBP intends to develop a plan for completing FCAs at CBP-owned land border crossings consistent with the Directive. With regard to our second recommendation that CBP share FCA reports with GSA and use GSA’s Building Assessment Tool to inform CBP FCAs, DHS stated that CBP plans to provide FCA data to GSA. DHS also stated it has already begun receiving Building Assessment tool reports from GSA and will determine how to best use the information to inform CBP FCAs. With respect to our third recommendation that GSA share Building Assessment Tool reports with CBP and use CBP’s FCAs to inform its assessments, GSA stated it is developing a plan to share Building Assessment Tool information and use FCA information to inform its assessments. With regard to our fourth recommendation that GSA share information on its maintenance and repair work at GSA-owned land border crossings at the level of detail necessary to inform CBP’s data in TRIRIGA, GSA stated it will develop a plan to share information on GSA maintenance and repair work at the level of detail necessary to inform CBP’s data in TRIRIGA. With respect to our fifth recommendation that CBP use information on maintenance and repair work conducted by GSA at land border crossings and update facility condition information in TRIRIGA on an ongoing basis, DHS stated it has already begun receiving data from GSA on corrective maintenance work at land border crossings and that CBP will develop a plan for updating facility condition information in TRIRIGA using the data. With regard to our sixth recommendation that CBP establish time frames for stakeholders involved in its Five-year Capital Investment Plan review and approval process, DHS stated that CBP will establish a policy that outlines time frames for stakeholders involved in the review and approval process. DHS also concurred with our seventh recommendation that CBP establish and document a methodology for its annual land border crossing capital prioritization process that includes procedures and time frames for each step. Specifically, DHS stated that CBP will document the process and procedures, and provide time frames, for each step in the process. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Homeland Security, and the Administrator of the General Services Administration. In addition, this report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at 202-512-8777 or gamblerr@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of our report. GAO staff who made key contributions to this report are listed in appendix V. U.S. Customs and Border Protection (CBP) operates at 167 land border crossings along the northern and southern borders. Of the 167 land border crossings, CBP owns 40. The General Services Administration (GSA) fully owns 101, partially owns three, and leases 19. The National Park Service owns two and the U.S. Forest Service owns one. One land border crossing is privately owned. Further, CBP and GSA have assessed the condition of 95 of the 167 land border crossings along the northern and southern borders and calculated a facility condition index (0- 10% good, 10-20% fair, 20-30% poor, and 30-100% critical) and identified the total cost of infrastructure deficiencies at each crossing. Table 6 identifies land border crossings by name, state, ownership, year constructed, the year last renovated, facility condition index score, and the cost of known infrastructure deficiencies, according to CBP data, and is for informational purposes only. To provide an overview of recent land border crossing capital infrastructure projects, we developed a profile for each project that was active during fiscal years 2014 through 2018. These profiles contain background information on each crossing, along with basic travel, trade, and law enforcement data. Each profile also contains information on how infrastructure constraints affected U.S. Customs and Border Protection (CBP) operations, and how CBP and the General Services Administration (GSA) addressed those constraints through the capital project. Finally, the profiles include an assessment of project cost and schedule performance. We compiled information in the following project profiles from a variety of federal sources. We provide background information on each land border crossing in the “At A Glance” section of each profile. Some land ports of entry contain multiple land border crossings. While each project, and associated project performance data, refers to a single crossing unless otherwise noted, all throughput and trade data in this section is provided at the port-level. Law enforcement data are provided at the port-level, with the exception of arrests, which is provided at the crossing level. Daily CBP officers assigned to the port refers to the daily average for fiscal year 2017. We obtained condition, staffing, and law enforcement data from CBP’s Office of Facilities and Asset Management. Condition information includes the year GSA built each individual crossing and when GSA last modernized it through a major capital project. The number of arrests refers to arrests at land border crossings made by CBP Office of Field Operations officers, and does not include Border Patrol apprehensions. We analyzed data on imports, exports, and trade values from the Department of Transportation’s Bureau of Transportation Statistics (BTS) TransBorder Freight Data. These data are collected by CBP, processed and validated by the U.S. Census Bureau, and analyzed by BTS. Value of trade includes the combined totals of imports and exports for 2017. We also analyzed BTS’s Crossing/Entry Data to determine throughput for pedestrians, passenger vehicles, and cargo trucks. We analyzed project cost and schedule performance data from GSA’s Electronic Project Management system. These data included project cost and schedule baselines, and updated cost and schedule performance data as of January 2019. For multi-phase projects with only one phase included in our scope, phase costs may not equal total project costs when combined because certain project costs, such as site acquisition, cannot be attributed to an individual phase. Under schedule performance, original completion date refers to the project’s baseline substantial completion date. Revised completion date, if applicable, refers to a project’s updated substantial completion as revised by GSA to address project setbacks or delays. For ongoing projects, expected completion date is the date when GSA officials expect to complete the project. For completed projects, the actual completion date is the date the project reached substantial completion. We obtained information on crossing infrastructure constraints and project plans through interviews with GSA and CBP officials and project documents. These officials included GSA headquarters and project management officials, as well as CBP Office of Field Operations field office officials and local CBP officers. “Infrastructure Impacts on CBP Operations” refers to infrastructure constraints that existed prior to GSA’s recent capital project, while “Infrastructure Improvement Plans” describes each project’s scope and performance. To assess the reliability of project performance data from GSA’s Electronic Project Management system, we examined the data for obvious errors, and discussed the data with GSA project management officials. We determined the data to be sufficiently reliable for our purposes. To assess the reliability of trade data, we reviewed documentation and conducted interviews with officials from the U.S. Census Bureau, the original source of the validated data. Specifically, we analyzed procedures by agencies responsible for collecting the statistics, and reliability assessments by those agencies and outside sources. After reviewing data dictionaries and BTS’s quality control measures for analyzing the Census data, and conducting data quality checks, we determined that the trade data, originally collected by Census and released by BTS, are sufficiently reliable for providing contextual information about the value of trade. To assess the reliability of BTS crossing/entry data, we reviewed relevant documentation and procedures for analyzing the data, and met with BTS officials to discuss potential limitations. We determined the data to be sufficiently reliable for the purposes of reporting entry data for pedestrians, passenger vehicles, and trucks. Finally, we found the dates land border crossings were built and last modernized may be inconsistently recorded as provided by CBP’s Office of Facilities and Asset Management, but we provided accurate information in the project profiles. Built in 1974, Alexandria Bay is the seventh busiest commercial border crossing between the United States and Canada, as of 2017. In 2017, U.S. Customs and Border Protection (CBP) processed about 4,100 passengers, 1,600 passenger vehicles, 4 buses, and 600 trucks per day at Alexandria Bay. The majority of people crossing into the United States through Alexandria Bay in passenger vehicles are tourists traveling from the Ottawa, Kingston, Toronto, and Montreal regions, according to General Services Administration (GSA) project documentation. In 2017, GSA began phase I of a capital infrastructure project at Alexandria Bay. Prior to the project, the existing crossing lacked capacity to process growing traffic volumes which led to significant backups. These delays effectively brought cross-border traffic to a standstill, with traffic backups sometimes stretching three miles into Canada. The preprimary area did not provide adequate space for commercial traffic because the bridges connecting the United States and Canada were not designed to support prolonged periods of heavy traffic caused by backups. The commercial inspection facility provided enough space to unload a single commercial truck at a time and CBP’s commercial office space was housed in mobile trailers. GSA’s projected increases in traffic volume and updated CBP security procedures would necessitate an increase in the federal workforce beyond the existing crossing’s capacity. Phase I of this two-phase project will feature a new commercial building and warehouse, new commercial inspection lanes, and a new veterinary services building, among other enhancements. The completed two-phase project will more than double building space and triple the crossing’s footprint. Phase I will include five commercial inspection lanes—some of which will be equipped to process both commercial and passenger vehicles. After phase II, the crossing will feature five more passenger vehicle lanes and five more commercial lanes than the existing facility. An improved traffic pattern throughout the crossing will increase queuing space and allow safe and secure processing of traffic entering from Canada. Total funding for the entire project is $238 million, including $105 million for phase I, and construction began in August 2017. Phase I remains largely on budget and on schedule for completion in January 2020. GSA is expected to begin phase II in January 2020 and complete the project in July 2022. Calexico West, located in downtown Calexico, California, processes pedestrians and passenger vehicles. Inbound commercial and bus traffic are processed at the nearby Calexico East land border crossing, which opened in 1997 after Calexico West ceased commercial operations. Calexico West is the main crossing linking the California Imperial Valley agricultural industry to the Mexican state of Baja California and, according to U.S. Customs and Border Protection (CBP) officials, processes large volumes of farm workers during harvest season. CBP and General Services Administration (GSA) officials reported that the crossing’s facilities were undersized relative to current traffic volumes and obsolete in terms of inspection officer safety and border security. According to GSA, the crossing’s layout was also inefficient, resulting in bottlenecks and long lines for passenger vehicles and pedestrians. Passenger vehicle wait times regularly exceeded 1.5 hours during peak travel times, with outbound traffic often extending 1.5 miles into the United States. Facilities in the main building, including agricultural inspection laboratories, storerooms, holding cells, waiting areas, and officer work areas, were inadequate and undersized. CBP faced challenges finding space to install newer inspection equipment and technologies in the existing facilities, according to CBP officials. Finally, the passenger vehicle secondary inspection area was open to public view, enabling individuals to observe CBP inspections. CBP and GSA officials reported that phase I of this two-phase project reconfigured and expanded the existing crossing to reduce congestion and created five times more building space. Phase I delivered a new main building, 10 of 16 planned inbound vehicle inspection lanes, and five outbound vehicle inspection lanes. It also included a secondary vehicle inspection facility with canine kennels. The new preprimary inspection area is significantly larger, allowing CBP to actively manage traffic and reduce congestion. Further, the larger preprimary inspection area allows CBP officers to safely and effectively patrol this area with canine units, improving the effectiveness of CBP’s inspections. GSA completed the $94.6 million phase I construction in September 2018, about 6.4 percent above its cost baseline and six months later than planned. Delays associated with a corresponding infrastructure project in Mexico and CBP- requested modifications contributed to schedule growth. Phase II received partial funding in February 2019—two years after Phase II was scheduled to begin. Built in 1989, Columbus processes commercial traffic, passenger vehicles, and pedestrians. It is the only 24-hour pedestrian border crossing in New Mexico. Commercial traffic has steadily increased from about 5,700 trucks in 2007 to over 14,100 trucks in 2017. Historically, according to a GSA planning study, commercial traffic spiked in August and September during harvest season because produce is one of Columbus’s primary imports. Pedestrian traffic is higher during the harvest months due to farm workers and the winter when seasonal visitors cross the border. In 2017, the General Services Administration (GSA) began a capital infrastructure project at Columbus. U.S. Customs and Border Protection (CBP) and GSA officials reported that prior to this project, CBP operated from deteriorating facilities that were reaching the end of their useful lives. The volume of commercial trucks and travelers has increased significantly since the crossing opened and is expected to continue to grow. Over the years, GSA added additional facilities that, in turn, impeded traffic flow, caused backups, and threatened officer safety. Prior to the project, CBP could inspect two trucks at a time at the cargo loading dock. CBP also lacked the space to completely offload cargo, limiting inspection effectiveness. The site experienced significant flooding during major rain events that further limited inspection space and further deteriorated infrastructure, according to officials. CBP and GSA officials reported that the project involves a complete demolition of existing facilities and more than triples the crossing’s footprint with donated land. New facilities include a separate commercial processing facility and an expanded main building with new Non-Intrusive Inspection technologies, a hazardous material inspection area, canine kennel, narcotics vault, and site drainage improvements to address flooding. Processing capacity will expand from one pedestrian lane to four, from two passenger vehicle lanes to three, and from zero commercial lanes to one, and will increase usable commercial dock spaces from two to 12. GSA spent $3.3 million on design from 2007 to 2009. It spent another $7.4 million in 2014 on a redesign that incorporated flood protection and new CBP standards. GSA expects to complete the $87 million project in April 2019--about 3 percent above its cost baseline and two months later than planned due to CBP requested changes. Built in 1965, Derby Line I-91 is the busiest land border crossing in Vermont. The crossing processes passenger vehicles, buses, cargo, and pedestrians. There are two border crossings in Derby Line, at I-91 and about a half mile west on Route 5. The I-91 crossing is a large facility located on a major highway whereas the Route 5 crossing is relatively small, located on the village’s Main Street. U.S. Customs and Border Protection (CBP) processed about 3,000 passengers per day in 2017, along with about 1,500 passenger vehicles and 300 trucks. In 2016, General Services Administration (GSA) began a capital infrastructure project at the Derby Line I-91 crossing. CBP and GSA officials reported that CBP substantially increased staffing at the crossing over the years, resulting in overcrowded conditions. The administrative building lacked sufficient office and storage space, had limited secure areas to perform interviews and searches, and lacked a secure holding area. Due to insufficient space and outdated IT systems, the crossing could not accommodate newer inspection technologies. The commercial secondary inspection area was too small to completely offload cargo trucks for inspection and the vehicle lift was inoperative. The facility also lacked sufficient space to inspect buses and luggage. The crossing had poor lighting and inadequate perimeter security, and lacked measures to prevent travelers from exiting the crossing without authorization. Finally, poorly designed inbound primary inspection lanes made it difficult for commercial trucks to navigate through the crossing, at times resulting in long traffic delays, according to officials. CBP and GSA officials reported that the capital project will reduce cross- border travel times and improve the traveler experience. The project expanded the crossing’s footprint from 0.25 to 23 acres and improved traffic flow around the crossing, while adding measures to prevent travelers from exiting the crossing without authorization. Site improvements included new lighting, fire protection, and storm water management systems, among others. The project included a main building, and a commercial secondary inspection facility for CBP to offload and inspect trucks. GSA completed construction in November 2018 about 5 months later than originally planned and 11 percent above its cost baseline. Cost and schedule growth were primarily due to CBP-requested changes and contractor performance. The Laredo Land Port of Entry is made up of four land border crossings, each with its own bridge. In January 2019, the General Services Administration (GSA) completed a capital project at two of these crossings —the Convent Street Bridge (Laredo 1), and the Lincoln-Juarez Bridge (Laredo 2). Laredo 1 and 2 are located in downtown Laredo and process passenger vehicle and pedestrian traffic. The other two crossings–the Colombia Solidarity Bridge (Laredo 3) and the World Trade Bridge (Laredo 4)—primarily process cargo. The city of Laredo owns and maintains these bridges, while GSA owns and maintains the crossings and all property inside the crossing facilities. U.S. Customs and Border Protection (CBP) and GSA officials reported that volume at Laredo 1 and 2 have increased significantly in recent decades. Prior to the capital project, facilities at Laredo 1 did not effectively separate vehicles, bicycles, and pedestrians within the crossing, creating congestion, safety concerns, and pedestrian queues that could extend across the bridge into Mexico. GSA is unable to make extensive alterations or expand Laredo 1 because it is a U.S. Historic Site and is surrounded by businesses and homes. Laredo 2 was unable to efficiently process current traffic volumes. For example, GSA originally designed Laredo 2 to process up to 10 buses per day. However in 2017, Laredo 2 processed approximately 110 buses and 2,000 bus passengers each day. To accommodate these volumes, CBP converted Laredo 2’s passenger vehicle secondary facility to inspect buses and moved secondary vehicle inspections to a temporary facility. CBP and GSA officials reported that the capital project focused on improving efficiency, safety, and security while expanding pedestrian capacity at Laredo 1 and bus capacity at Laredo 2. GSA combined improvements at the two crossings into one estimated $96.6 million project ($33 million for Laredo I and $63.6 million for Laredo II) to save on labor and material costs. At Laredo 1, GSA replaced the main building, expanded pedestrian lanes from eight to 14, and reconfigured vehicle lanes to integrate newer inspection technologies. At Laredo 2, GSA enlarged the main building, built a facility to process passenger vehicle and bus passengers, and expanded bus processing capacity from two to eight lanes. GSA scoped out a footbridge and scaled back aesthetic finishes to control costs. GSA completed Laredo 1 in April 2018 and Laredo 2 in January 2019—about 3 months later than originally planned and 6 percent above cost baseline. Nogales West-Mariposa is one of three land border crossings in Nogales, Arizona and is one of the busiest land border crossings in the United States. It serves as the southern border’s main entry and distribution point for produce entering from Mexico. Nogales West processes about half of the agricultural commodities entering the United States from Mexico and has facilities for pedestrian, passenger vehicle, and commercial traffic. The other crossings in Nogales are the DeConcini (pedestrians and passenger vehicles) and Morley Gate crossings (pedestrians). In 2010, the General Services Administration (GSA) initiated a $180 million capital infrastructure project. U.S. Customs and Border Protection (CBP) and GSA officials reported that facilities and technologies at the original Nogales West-Mariposa land border crossing were outdated. The crossing’s layout was also inefficient resulting in bottlenecks, congestion, and commercial traffic backups that extended for miles into Mexico. GSA subsequently added new facilities to accommodate bus and pedestrian inspections, but did so in a way that further constrained space, impairing traffic movement within the crossing, according to officials. Wait times of up to eight hours resulted in spoilage or reduced shelf-life of perishable goods, resulting in financial losses for businesses. The original crossing also lacked adequate space and CBP repurposed some facilities to accommodate operational needs, including storing evidence in holding areas. CBP and GSA officials reported that the capital project focused on improving operational efficiencies, processing capacity, and security and safety of officers and the traveling public. The project entailed demolishing all existing structures and replacing them with new facilities, including new inspection areas, a main building, and other support facilities. GSA added 13 acres to the crossing’s footprint and expanded processing capacity from three to eight cargo primary lanes, one to five commercial exit lanes, 23 to 56 cargo docks (including six for refrigerated inspection), four to 12 passenger vehicle primary lanes, and eight to 24 passenger vehicle secondary inspection spaces. GSA completed the $180 million project in August 2014 more than 5 months later than originally planned and 5.5 percent above its cost baseline. This was due to CBP-requested changes, design deficiencies, and high site utility costs, among other reasons, according to officials. The project resulted in reduced wait times, but led to higher than expected operational and maintenance expenses. Built in 1932, San Ysidro is the busiest land border crossing in the western hemisphere, with 24/7 operations. San Ysidro processes pedestrians, passenger vehicles, and buses. The crossing does not have any commercial facilities for screening cargo. In 2017, U.S. Customs and Border Protection (CBP) processed about 65,000 northbound vehicle passengers and 23,000 northbound pedestrians each day at San Ysidro. The General Services Administration (GSA) began construction on a three-phase, $741 million project in 2011, with plans to complete all three phases by late 2019. CBP and GSA officials reported that queues and wait times at San Ysidro steadily increased over the years and that existing facilities could no longer accommodate the traffic volume. CBP also reported that outdated infrastructure in the pedestrian primary inspection area created officer safety concerns and that renovations were necessary to provide a safe and secure work environment for CBP staff. For example, CBP officials stated that the design and location of the existing pedestrian primary inspection booths obstructed officers’ view of pedestrians as they entered the primary inspection area. CBP and GSA officials reported that to better accommodate traffic growth and CBP’s requirements, GSA’s capital project is expanding and reconfiguring the crossing. The project entails demolishing existing structures and constructing new primary and secondary passenger vehicle inspection areas, a new main building, and other support structures. The project also includes two pedestrian processing areas—on the east and west sides of the crossing—that connect with transportation centers in Mexico and the United States. Once complete, the crossing will have 34 passenger vehicle lanes with 62 booths, including stacked booths that allow CBP officers to simultaneously inspect two vehicles in most lanes. The crossing will also add a dedicated bus lane and a total of 36 pedestrian primary inspection lanes across its two pedestrian facilities. GSA is building the $741 million project in three stand-alone phases, with expected completion in November 2019. Tornillo-Guadalupe (also known as the Marcelino Serna land border crossing) opened in 2015. Tornillo-Guadalupe replaced the Fabens land border crossing, which dated back to 1938. U.S. Customs and Border Protection (CBP) currently processes passenger vehicles and pedestrians at Tornillo-Guadalupe. Although Tornillo-Guadeloupe has commercial processing facilities, CBP ceased using these facilities in 2017 due to low volumes of commercial traffic. CBP and General Services Administration (GSA) officials reported that the original Fabens land border crossing was unable to process high traffic volumes and that the existing bridge connecting the United States and Mexico was no longer structurally sound enough to support commercial crossings. CBP ceased all commercial operations at Fabens in 2001, limiting CBP to pedestrian and passenger vehicle traffic processing. The number of CBP personnel at the crossing exceeded facility capacity and the limited space hindered CBP’s ability to process, interview, isolate, and detain travelers, according to CBP officials. Further, the existing septic system was not designed for the number of employees at the facility and the original water system was insufficient. CBP had to haul water on site to operate its facilities and provide bottled water for its employees and the public to drink, according to officials. CBP and GSA officials reported that the recent capital project delivered new passenger vehicle and pedestrian inspection facilities along with a new main building. The project also included a dedicated bus inspection area and a parking lot for seized vehicles. Commercial facilities included a new bridge and commercial building, 10 covered secondary inspection docks, two primary inspection lanes with a canopy, a hazardous materials containment area, agriculture lab, and seized narcotics storage. The project also added an additional 109 acres of donated farmland to the original crossing’s 6 acre footprint. GSA completed the $73.5 million construction project in October 2014, about 15 months later than planned and 19 percent above its cost baseline. Unstable soil conditions and contractor performance issues contributed to cost and schedule growth, according to GSA. Delays associated with infrastructure in Mexico delayed the start of cargo processing by 16 months. Despite investing in new commercial processing facilities at the crossing, CBP suspended cargo processing in May 2017 after 14 months, citing low traffic volumes due to underdeveloped infrastructure in Mexico. In addition to the contact named above, Michael Armes (Assistant Director) Kirk Kiester (Assistant Director), Bruce Crise (Analyst in Charge), Lilia Chaidez, Michele Fejfar, Eric Hauswirth, Susan Hsu, Daniel Kuhn, Jeremy Manion, Mara McMillen, Marc Meyer, and Sasan J. “Jon” Najmi made significant contributions to this report.", "summary": "CBP and GSA own, lease, or manage all of the nation's 167 land border crossings. CBP facilitates trade and travel at these crossings and has identified significant capital investment needs at these facilities. GAO was asked to review land border crossing infrastructure. This report examines (1) infrastructure constraints CBP faces and the extent CBP and GSA have information on infrastructure condition, (2) the extent CBP prioritizes capital projects and (3) the extent recent GSA capital projects met cost, schedule, and scope goals and challenges CBP and GSA reported. GAO analyzed land border crossing data and documentation, including CBP and GSA facility assessments, CBP capital investment plans for fiscal years 2014 through 2018, and data for GSA capital infrastructure projects active during those years. GAO also interviewed officials from CBP field offices that oversee all crossings about infrastructure constraints and visited 16 crossings selected based on high traffic volume and border crossings CBP has prioritized for infrastructure improvement. The Department of Homeland Security's (DHS) U.S. Customs and Border Protection (CBP) reported infrastructure constraints at land border crossings including limited inspection capacity, technology challenges, and security limitations. However, CBP does not have complete information on infrastructure conditions at all land border crossings. Specifically, CBP assessed facility conditions at four of the 40 land border crossings it owns from 2016 through 2018. Further, CBP has not developed a plan to ensure it conducts such assessments, consistent with DHS policy which calls for them every three years. Developing and implementing a plan to ensure CBP executes its facility condition assessment program would enable CBP to collect more complete and current infrastructure information. In addition, while CBP and the General Services Administration (GSA) both assess facility conditions at 101 GSA-owned land border crossings, they do not consistently share or use each other's information. Doing so could enable CBP and GSA to improve the accuracy and completeness of their respective assessments. CBP prioritizes land border crossing capital projects in a five-year plan, which by statute is to be submitted with DHS's annual budget request to Congress. In fiscal years 2014 through 2018, CBP submitted two plans on time, submitted two plans more than 100 days after submission of the budget request, and did not submit a plan in one year due to delays in the plan's review and approval process. By establishing timeframes for the review process, CBP would be better positioned to identify and address sources of delay in the review process, and improve its ability to meet statutory reporting requirements by including its five-year plan with its annual budget submission to Congress. The 10 completed or ongoing GSA land border crossing capital projects in fiscal years 2014 through 2018 generally experienced schedule growth ranging from 0 to 59 percent, but stayed within a 10 percent cost contingency allowance. Circumstances contributing to increased project costs or schedule growth include funding lags between project design and construction, and CBP-requested changes during construction to meet evolving mission needs, according to GSA and CBP officials. GAO is making seven recommendations, including that CBP develop a plan to ensure it conducts facility condition assessments consistent with DHS policy; that CBP and GSA share and use each other's information on facility conditions at land border crossings; and that CBP establish review timeframes for its capital investment plan.", "document_type": "gao"}
{"report": "Federal agencies have many programs that provide services and benefits to tribes and their members. For example, the Department of the Interior’s (Interior) Bureau of Indian Affairs (BIA) within the Office of the Assistant Secretary-Indian Affairs (Indian Affairs) administers programs in natural resources management, Indian child welfare, and economic development—among other responsibilities. One key BIA responsibility is to facilitate tribes’ development of energy resources on and beneath tribal lands by reviewing and approving leases, permits, and other documents required when the lands with Indian energy resources are held in trust or restricted status. The Bureau of Indian Education (BIE), also within Indian Affairs at Interior, administers education programs to approximately 41,000 students on or near Indian reservations at 185 schools around the country. The Indian Health Service (IHS) within the Department of Health and Human Services is charged with providing health care to approximately 2.6 million Indians through more than 600 IHS or tribally operated facilities as of 2019. When services are not available at these facilities, IHS may pay for services provided through external providers. In addition, as part of its disease prevention efforts, IHS provides technical and financial assistance to Indian tribes for the cooperative development and construction of drinking water and wastewater systems and support facilities. These and other federal programs may also be administered by tribal governments under a self-determination contract or self-governance compact under the Indian Self-Determination and Education Assistance Act of 1975, as amended. BIA and IHS are responsible for administering self-determination contracts that allow for tribal administration of specific government programs, including negotiating and approving each contract and its associated annual funding agreement and disbursing funds to the tribes. Each federally recognized tribe voluntarily decides whether, and to what extent, to pursue the administration of federal programs. According to a 2017 law journal article, by that year, nearly all tribes had used a self- determination contract or self-governance compact to take over the administration for one or more federal programs. In February 2017 we added federal management of programs that serve tribes and their members to our high-risk list of federal areas that are most vulnerable to fraud, waste, abuse, or mismanagement or that are in need of transformation to address economy, efficiency, or effectiveness challenges. In particular, we found numerous challenges facing BIE and BIA and IHS in administering education and health care services, that put the health and safety of American Indians served by these programs at risk. In addition, we reported that BIA mismanages Indian energy resources held in trust and thereby limits opportunities for tribes and their members to use those resources to create economic benefits and improve the well-being of their communities. Our recommendations identified in the high-risk area do not reflect the performance of programs administered by tribes nor are they directed at any tribally operated programs and activities. In our March 2019 high-risk update, we reported that the three agencies demonstrated progress to partially meet all five criteria for addressing high-risk issues: leadership commitment, capacity, action plan, monitoring, and demonstrated progress. We continue to monitor and report on progress made by the agencies in addressing issues in these three program areas. We have previously reported that constraints in federal agency capacity, funding and budget uncertainty limit effective delivery of some federal programs for tribes and their members managed by Indian Affairs, BIA, BIE, IHS, and in other agencies’ tribal consultation activities as shown in the following examples: High staff vacancies. In November 2016, we found BIA had high vacancy rates at some agency offices and that the agency had not conducted key workforce planning activities to ensure its workforce resources are appropriately deployed. We recommended that BIA establish a documented process for assessing its workforce composition at agency offices taking into account BIA’s mission, goals, and tribal priorities. In response to our recommendation, BIA has taken initial steps to assess its workforce composition; however more work is needed from BIA to establish a process to regularly assess its workforce composition and ensure it meets BIA and tribes’ needs. In February 2017 when we added improving federal management of programs that serve tribes and their members to our high-risk list, we found that high vacancies or declining staff levels across all three designated high-risk areas—education, health care, and Indian energy resources programs. For example, we reported that IHS had over 1,550 vacancies for various health care positions nationwide in 2016, and IHS officials said that the agency’s insufficient workforce was the biggest impediment to providing timely primary care. IHS has made some progress in demonstrating it has the capacity necessary to address the program risks we identified in our reports. For example, among other actions, in January 2019, IHS established an Office of Quality which includes divisions for Enterprise Risk Management and Internal Controls, Quality Assurance, Innovation and Improvement, and Patient Safety and Clinical Risk Management. As of August 2019, the Office of Quality had filled 14 positions. However, there are still key positions in the agency not yet permanently filled, including the Director of the Office of Finance and Accounting and the Deputy Director for Management Operations. In our August 2018 report, we also found that IHS’s overall vacancy rate for clinical care providers was 25 percent. Additionally, in our March 2019 high risk update and testimony, we reported that about 50 percent of all BIE positions had not been filled, according to recent BIE documentation, for a variety of reasons, including difficulty recruiting qualified individuals. Insufficient staff skills or knowledge. We have also identified concerns about existing staff having the right skills and expertise to adequately perform job duties for effective implementation of Indian energy development programs. For instance, in November 2016, we found that BIA had not completed key workforce planning activities, such as an assessment of work skills gaps, that contributed to BIA’s inability to effectively support energy development. We recommended that BIA incorporate effective workforce planning standards by assessing critical skills and competencies needed to fulfill BIA’s responsibilities related to energy development and by identifying potential gaps. Interior agreed with this recommendation and in fiscal year 2019, BIA began identifying the skills and competencies necessary for select Indian energy-related occupations. BIA officials told us that, once complete, agency officials will be able to use the catalog of necessary skills and competencies to identify training needs for existing staff. Additionally, in our March 2019 report on tribal consultation, 47 of 100 tribes that provided comments to federal agencies in 2016 identified insufficient agency officials’ knowledge or training on tribal consultation as a key factor that hinders effective consultation. Several tribal officials we interviewed shared similar concerns, and officials from 9 of 21 agencies we spoke with (43 percent) identified staff knowledge or training as a factor that hinders effective consultation. Inadequate funding. We have previously reported on agency and tribal perspectives on the adequacy of funding and how it impacts federal programs and also examined spending levels of some programs. In May 2018, we reported that federal agencies provided about $370 million to develop, construct, or repair tribal drinking water and wastewater infrastructure projects to address tribes’ needs in fiscal year 2016. This amount is about 11 percent of the more than $3 billion in total existing tribal drinking water and wastewater infrastructure needs that IHS had identified that same year. Further, in January 2019, we found that funding shortfalls— estimated at 60 percent for one BIA program in a 2013 report to Congress— may limit tribal options for administering federal programs using self- determination contracts or self-governance compacts. Many tribal stakeholders told us that they supplement federal funding when there are funding shortfalls. As we have previously reported, when tribes financially supplement the federal program they take over, it diverts funds away from other economic development opportunities and other government functions and services they provide to their communities and citizens. In our March 2019 report on tribal consultation, according to tribal comments we reviewed and interviews with tribal officials we found tribes’ ability to participate in consultations is limited by availability of funding from the tribe, federal agencies, or other sources. Tribes and agencies both identified insufficient resources, including funding to support tribes’ participation in consultation activities, as a key factor hindering effective consultation. Effects of budget uncertainty. Budget uncertainty arises during continuing resolutions—temporary funding periods during which the federal government has not passed a budget—and during government shutdowns. Failure to enact annual appropriations for federal tribal programs in a timely manner may exacerbate the problem of limited resources. For example, in our September 2018 report examining advance appropriations authority for IHS, IHS officials and tribal representatives described several effects of budget uncertainty on their health care programs and operations. Among other things, we reported that effects of budget uncertainty include (1) exacerbated challenges related to recruitment and retention of staff, and (2) additional administrative burden and costs for both IHS and tribes involved in calculating revised allocations and modification of hundreds of tribal contracts each time a new continuing resolution is enacted. IHS officials and tribal representatives said that advance appropriation authority could mitigate the effects of this uncertainty because IHS could use this authority to ensure continuity of health care services during lapses in annual appropriations. In our prior work, we have found a range of management weaknesses related to internal controls at Indian Affairs, BIA, BIE, and IHS that hinder effective delivery of some federal programs for tribes as shown in the following examples: Oversight weaknesses. In March 2016, we found that weaknesses in Indian Affairs oversight led to safety and health deficiencies at BIE school facilities that endangered students. We recommended that Indian Affairs ensure that all BIE schools are annually inspected for safety and health, as required by its policy, and that inspection information is complete and accurate. Indian Affairs has taken steps toward implementing our recommendations. For example, in April 2019 Indian Affairs provided documentation that it had assessed the quality of two fiscal year 2018 BIE safety inspection reports. However, Indian Affairs has not provided us with documentation that it has assessed the quality of BIE safety inspection reports for fiscal year 2019—the first year BIE was responsible for inspecting all of its schools. We believe it is important that the agency demonstrate that BIE is capable of inspecting all schools for safety in fiscal year 2019 and that they produce inspection reports for schools that are complete and accurate. As of November 2019, we have not received further updates from the agency on this recommendation’s status. Additionally, in March 2016, we reported on weaknesses in IHS’s oversight of the timeliness of patient care that led to long wait times at IHS facilities. We found that IHS had not set any agency-wide standards for patient wait times at IHS federally-operated facilities. We recommended that IHS (1) develop and communicate specific agency-wide standards for patient wait times in federally- operated facilities, and (2) monitor patient wait times and ensure corrective actions are taken when standards are not met. IHS agreed with our recommendations and implemented the first recommendation by publishing patient wait time standards as part of its Indian Health Manual website in August 2017. As of March 2019, IHS officials said that the agency was working to implement the second recommendation by developing system-wide monitoring capacity. We will continue to review IHS’s progress. Management weaknesses. In June 2015, we found shortcomings in BIA’s management of permits, and other approvals for energy development have led to lengthy review times and negatively impacted energy development on tribal lands. These lengthy review times have increased energy development costs for tribes, delayed projects, and led to lost revenue, among other impacts. For example, according to a tribal official, BIA took as long as 8 years to review some of its energy-related documents. In the meantime, the tribe estimates it lost $95 million in revenue that it could have earned from tribal permitting fees, oil and gas severance taxes, and royalties. We recommended that BIA develop a documented process to track its review and response times and enhance its data collection efforts. As of November 2019, the agency had taken initial steps toward implementing the recommendation by developing system enhancements to capture key dates during the review and approval process for energy-related documents. However, BIA needs to collect data from its system, develop time frames, and monitor agency performance to fully address these recommendations. In our January 2019 work on tribal self-governance, we reported that Interior’s process does not ensure that funds associated with self-determination contracts and self-governance compacts are disbursed in a timely manner, according to tribal stakeholders. These funding delays can therefore be a factor that hinders tribal use of these agreements. When funds are not disbursed in a timely manner, a tribal stakeholder told us that tribes may have to use funds from their general revenue accounts or seek other sources to cover federal program expenses. According to several tribal stakeholders, when a tribe has to use its own funds for the administration of federal programs—even temporarily—it can adversely affect the tribe in various ways. To help ensure that funds are disbursed in a timely manner, we recommended that Interior establish a process to track and monitor the disbursement of funds associated with self-determination contracts and self-governance compacts. Interior agreed with this recommendation, and as of November 2019, we are following up on its status. Weaknesses in planning. In May 2017, we found that Indian Affairs did not have a comprehensive capital asset plan to guide funding for construction projects to maintain, repair, or replace infrastructure at its 185 BIE schools. Specifically, although Indian Affairs had determined which 10 schools it planned to replace next, it did not have a long-term capital asset plan for the remaining 175 BIE schools. Many of the 175 schools were in poor condition and had safety hazards. We recommended Indian Affairs develop a comprehensive long-term capital asset plan that includes a prioritized list of projects with the greatest need of funding. Indian Affairs agreed with the recommendation. As of October 2018, Indian Affairs provided a list of deferred maintenance projects for 2018 and documentation of processes for prioritizing such projects, among other things, but as of November 2019 had not yet provided documentation that it had completed a comprehensive long-term capital asset plan. In conclusion, the resource constraints and management weaknesses in federal programs that serve tribes limit federal agencies’ effective delivery of programs to Native Americans. In many cases, we have made recommendations to agencies to take steps to address identified issues. While agencies have made some progress addressing recommendations to improve tribal programs identified in our high-risk and other areas, continued work to address these and other issues is needed. Sustained congressional attention to these issues and the relevant factors contributing to the disparities identified in the U.S. Civil Rights Commission’s report will help the federal government makes progress in addressing the needs of Native Americans. Chairman Gallego, Ranking Member Cook and Members of the Subcommittee, this completes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information regarding this testimony, please contact Anna Maria Ortiz at (202) 512-3841 or ortiza@gao.gov. If you or your staff have any questions about health care issues in this testimony or the related reports, please contact Jessica Farb at (202) 512-7114 or farbj@gao.gov. For questions about education, please contact Melissa Emrey-Arras at (617) 788-0534 or emreyarrasm@gao.gov. For questions about energy resource development, please contact Frank Rusco at (202) 512-3841 or ruscof@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Key contributors to this statement include Lisa Van Arsdale (Assistant Director), Swati Thomas (Analyst-in-Charge), Edward Bodine, Kelly DeMots, Summer Lingard-Smith, Elizabeth Sirois, Jeanette Soares, Kiki Theodoropoulos and Leigh White. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "As Congress affirmed in the Indian Trust Asset Reform Act, the United States has undertaken a unique trust responsibility to protect and support Indian tribes and Indians. Thus, federal agencies have many programs that provide services to tribes. However, in 2018, the U.S. Commission on Civil Rights found that, due to a variety of reasons—including historical discriminatory policies, insufficient resources, and inefficient federal program delivery—Native Americans continue to rank near the bottom of all Americans in terms of health, education, and employment. In February 2017 GAO designated federal management of programs that serve tribes in education, health care and energy as high risk. This designation is neither reflective of the performance of programs administered by tribes nor directed at tribal activities. This testimony, which is based on reports GAO issued from June 2015 through March 2019 primarily related to education, health care, and energy development, provides examples of (1) capacity and funding constraints and budget uncertainty and (2) management weaknesses that limit the effective delivery of federal programs for tribes and their members. GAO previously reported that constraints in federal agency capacity and funding and budget uncertainty limit effective delivery of some federal programs and activities serving tribes. Key federal agencies serving tribes include the Department of the Interior's Bureau of Indian Affairs (BIA) and Bureau of Indian Education (BIE), and the Department of Health and Human Services' Indian Health Service (IHS). For example: High staff vacancies and insufficient staff capacity. In February 2017, GAO reported that IHS had over 1,550 vacancies for health care positions in 2016, and IHS officials said that the agency's insufficient workforce was the biggest impediment to providing timely primary care. In addition, GAO's March 2019 high-risk update reported that about 50 percent of all BIE positions had not been filled, according to recent BIE documentation. Inadequate funding. In January 2019, GAO reported on agency and tribal perspectives on the adequacy of funding and how it impacts federal programs. GAO found that inadequate program funding to meet tribal needs (e.g., BIA estimated a funding shortfall at 60 percent for one program in a 2013 report to Congress) may limit tribal options for administering federal programs using self-determination contracts or self-governance compacts. Many tribal stakeholders told GAO that they supplement federal funding when there are shortfalls, which diverts funding from economic development and services provided to their communities. Effects of budget uncertainty. Budget uncertainty arises during continuing resolutions—temporary funding periods during which the federal government has not passed a budget—and during government shutdowns. In a September 2018 GAO report, IHS officials and tribal representatives described the effects of budget uncertainty on their health care programs and operations. GAO reported that these effects include recruitment and retention of staff challenges and additional administrative burden and cost for both tribes and IHS. In GAO's prior reports and March 2019 high-risk update, GAO found that management weaknesses at some federal agencies limit the effective delivery of some federal programs serving tribes. For example: Oversight weaknesses. In March 2016, GAO found weaknesses in IHS's oversight of timeliness of patient care leading to long wait times at IHS facilities. GAO recommended that IHS develop standards for patient wait times, monitor these wait times, and take corrective action as needed. IHS has established wait times standards and is developing monitoring capacity. Management weaknesses . In June 2015, GAO found shortcomings in BIA's management of energy development permitting processes that led to lengthy reviews and negatively impacted energy development on tribal lands. Among other things, GAO recommended that BIA develop a process to track its review and response times. BIA has taken initial steps to develop system enhancements to capture key dates during the review and approval process for energy development documents. GAO has made more than 50 recommendations related to its high- risk area and more than 40 recommendations for tribal water infrastructure, tribal self-governance and tribal consultation of which 60 recommendations are open. Sustained focus by the respective agencies and Congress on these and other issues are essential to continued progress.", "document_type": "gao"}
{"report": "In March 2017, the President issued an executive order requiring comprehensive reorganization plans for executive branch agencies (see fig. 1). In April 2017, OMB provided guidance to federal agencies for developing their respective reform plans. The government-wide reform plan was to have been based on the agency reform plans, OMB-coordinated crosscutting proposals, and public input. According to OMB’s M-17-22 guidance, OMB, in coordination with the President’s Management Council, was to establish a way to track the progress of the reforms. OMB’s guidance also stated that it would track progress of the reforms by leveraging the federal performance planning and reporting framework originally put into place by the Government Performance Results Act of 1993 (GPRA), and significantly enhanced by the GPRA Modernization Act of 2010 (GPRAMA), through the use of cross-agency priority (CAP) goals, agency priority goals, and Performance.gov. In March 2018, OMB released the President’s Management Agenda (PMA), which provided information on the preliminary status of government reorganization efforts and is connected with these reform efforts. The PMA also identified a set of CAP goals, required under GPRAMA, to target those areas where multiple agencies must collaborate to effect change and report progress in a manner the public can easily track. The PMA gave OPM a key role in fulfilling the administration’s human capital-related goals. Specifically, OPM, along with OMB and the Department of Defense (DOD), were tasked to “align and strategically manage the workforce to efficiently and effectively achieve the federal government’s mission.” The administration is planning to transfer OPM’s background investigations to DOD, policy and workforce strategy functions to the EOP, and all remaining functions to GSA (see fig. 2). These remaining functions include human resource solutions, information technology systems, healthcare and insurance, retirement services, merit system accountability and compliance, and IG functions. The President’s fiscal year 2020 budget proposal, which was issued in March 2019, states that the administration is planning to complete the reorganization of OPM by the end of fiscal year 2020. As such, the budget proposal provided no funds for OPM for fiscal year 2020. According to that budget proposal, “the Administration has been developing plans to execute transfers of OPM functions to GSA and the DOD using a combination of existing legal authority and legislation” since June 2018. The budget proposal also requested $50 million to transfer certain OPM functions to GSA, including an additional $1 million to cover costs associated with merging the OPM IG with the GSA IG. On May 16, 2019, the administration proposed new legislation requesting authority to fully implement its reorganization proposal. As we previously reported, a critical first step in the reform and reorganization process is to define the benefits of the merger, and describe how the future will be both different from and better than the past. As of May 17, 2019, OMB, OPM, and GSA had not fully established outcome-oriented goals and performance measures for, or assessed the costs and benefits of, the administration’s proposal to reorganize OPM (see fig. 3). Specifically, GSA provided one document, a draft Qualitative Business Case and Value Proposition for the GSA/HRS Merger (October 2018), which includes some preliminary goals and measures, such as to improve customer satisfaction. However, this document focuses only on the goals and measures related to the transfer of human resources solutions from OPM to GSA, rather than on the entire reform proposal. In addition, that document explicitly states that it is not a cost-benefit analysis, and OMB staff have told us that they have not conducted a cost-benefit analysis of the reform. In our prior work on organizational mergers and transformations, we have found that establishing a coherent mission and integrated strategic goals to guide the transformation involves adopting leading practices for results-oriented strategic planning and reporting. We have previously reported that organizational transformations should be led by a dedicated team of high-performing leaders within the agency, and GSA has provided some evidence of this leadership focus and attention, but OMB, OPM, and GSA have only partially addressed this key practice (see fig. 4). According to GSA officials and documents we reviewed, the agency designated a member of its Senior Executive Service as the leader of the reorganization within GSA, and has established a Project Management Office with dedicated staff and resources which will take on the responsibility of supporting the transfer of OPM’s functions to GSA. Also, GSA officials told us that OMB leads the reform by, for example, leading meetings under the Six Sigma management approach to manage progress on implementing the reorganization. However, as of May 17, 2019, OMB did not provide documents we requested about the role of these management meetings for the reorganization, and OPM did not provide relevant information or documents. Our past work has also found that leadership should articulate a succinct and compelling reason for the reform, as this helps build morale and commitment to the organizational changes. OMB provided the case for change in several public documents, such as the government-wide reform plan, which primarily state that the administration’s reason for moving OPM’s functions to GSA and the EOP is that these changes would create greater efficiencies and elevate the importance of human resources policy. However, sharing the case for change is only one key factor in successful reforms and reorganizations. As we stated above, illustrating what success looks like is also important, and involves articulating the specific goals and costs and benefits of the reform. Our prior work has shown that it is important for agencies to directly and continuously involve their employees, Congress, and other key stakeholders in the development of any major reforms. OMB and GSA have taken some actions to involve and communicate with Congress, employees, and other key stakeholders, but these initiatives lack documentation (see fig. 5). For example, GSA officials told us that they have met with members of Congress, conducted town hall meetings in which they provided information to and answered questions from GSA officials, and established an email inbox for communication between GSA leaders and employees on the reform. However, as of May 17, 2019, GSA officials had not provided us with documentation of their meetings and communications with employees, and neither OMB nor OPM had provided relevant documents on employee outreach and inclusion. We have previously reported that organizational transformations must be carefully and closely managed by developing an implementation plan with key milestones and deliverables to track and communicate implementation progress, among other actions. However, as of May 17, 2019, OMB, OPM, and GSA had not developed an implementation plan or publicly reported on key milestones (see fig. 6). This is the case despite the fact that the President’s fiscal year 2020 budget states that the reform is underway in fiscal year 2019, and that all remaining portions of the reform would be completed in fiscal year 2020 through legislation. Moreover, these agencies have not ensured transparency of their efforts by publicly reporting on implementation progress. Our prior work has shown that successful reorganizations seek to implement best practices in the systems and processes wherever they may be found, and guard against automatically adopting the approaches used by the largest or acquiring component. The risk is that the new organization may migrate less-than-fully efficient and effective systems and processes merely because those systems and processes are most often used. Accordingly, OPM’s proposed reorganization should address agency management challenges, such as those in our high-risk program, priority open recommendations, or those identified by agency IGs. OMB, OPM, and GSA are aware of our related prior work, including major management challenges, but have not demonstrated how the proposed reorganization will help address these challenges (see fig. 7). Based on a document released by the administration on May 15, 2019 discussing its rationale for the merger of OPM and GSA, the reorganization should better support human capital delivery across the federal government by centralizing the services provided by both agencies, and reducing duplication. The reform plan also acknowledges that federal human capital management remains a high-risk area due to mission-critical skills gaps within the federal workforce. The reform plan further states that OPM does not have the capacity to address the high- risk issues we have identified, and progress would be achieved more efficiently by transferring OPM’s responsibilities to other government entities, including GSA and the EOP. However, as of May 17, 2019, OMB, OPM and GSA had not provided any documentation or analysis to demonstrate how the proposed reorganization would help resolve high- risk issues. The reform plan also draws attention to the OPM security breach that occurred several years ago, and cites it as a reason for moving information technology systems to GSA. We have five open priority recommendations to OPM regarding information security, as we reported to OPM in April 2019. For example, in May 2016, we recommended that OPM update security plans to ensure controls specific to high-impact systems are addressed, provide and track training for individuals with significant security responsibilities, and ensure that security control assessments specific to high-impact systems are comprehensive. To fully implement these recommendations, we reported that OPM needs to complete its ongoing efforts in each of these areas by implementing an automated system for management of security controls and security plans, defining and completing its planned corrective actions on training, and reviewing completed security control assessments. It is unclear whether OMB, OPM, and GSA have fully considered how relevant major management challenges identified by OPM’s and GSA’s IGs may affect the proposed reorganization (see fig. 7). For example, the GSA IG’s 2018 report on management challenges contains a number of findings that call into question GSA’s capacity to take on certain responsibilities the administration proposes transferring to GSA as part of the reorganization. Specifically, the report discusses GSA’s challenges with managing internal controls, prioritizing cybersecurity, and managing human capital. By addressing major management challenges and adopting best practices and processes as part of the reorganization effort, the administration will be better positioned to successfully implement their proposal. As of May 17, 2019, OMB, OPM and GSA had not provided documentation that they had identified specific actions that can be taken administratively versus those that will require legislative action to reorganize OPM. We asked OMB, OPM, and GSA for their views on what legal authority, including appropriations, they are relying on to reorganize OPM, including any additional authority that may be needed. As described earlier in this statement, these agencies have not provided implementation plans or other details on the reorganization. Similarly, they have not provided details on the statutory underpinnings for OPM’s reorganization. To the extent the administration identifies the legal authority it is it relying on to support this proposed reorganization, or the additional legal authority it needs, we will continue to assess it. OPM is statutorily created as “an independent establishment in the executive branch.” In addition, the Director of OPM is vested with certain functions by statute, and the Director (or OPM designee) is required to perform those functions, including executing, administering, and enforcing civil service requirements. While the Director of OPM may delegate selected human capital management functions to other agencies, OPM remains statutorily responsible for certain oversight activities, such as establishing standards that apply to such delegated activities and making written findings, where appropriate, if an agency to which OPM delegated human capital management functions acts contrary to law, rule, regulation, or standard, and requiring that the agency take corrective action, among other activities. OPM has various statutorily required responsibilities related to administering civil service retirement, insurance, health benefits, and life insurance programs, among others. OPM is funded primarily through its revolving fund—which is made up of fees or reimbursements provided by agencies for services OPM provides, such as background investigations and human resources services— transfers from OPM’s Earned Benefits Trust Funds for administrative services, and discretionary appropriations for OPM’s general activities and the Office of IG. To execute certain transfers of functions from OPM to GSA, the administration has acknowledged the need for additional statutory authority, but has also stated that it will rely on existing authority to move certain functions administratively. For example, the Analytical Perspectives accompanying the President’s fiscal year 2020 budget acknowledges that the transfer of OPM functions to GSA will be completed using a combination of existing legal authority and legislation. However, the administration does not identify which functions will require legislation and which OPM functions may be transferred administratively. In particular, OMB’s Deputy Director for Management stated, in July 2018, that many of the administration’s reorganization proposals can be implemented in whole or in part through existing administrative authorities. The conference report accompanying the 2019 Appropriations Act directed OPM to submit a report that included, among other things, the legal authority under which OPM proposed to transfer the human resources solutions function within the OPM revolving fund to GSA. OPM’s report stated that it and GSA, in consultation with OMB, continue to deliberate upon the application and use of administrative authorities to transfer the OPM functions to GSA. In addition, in April 2019, the General Counsel of OPM told us that the agency is unable to provide its legal analysis to us because it was still in progress and the agency was waiting for certain executive branch actions to be finalized. Without this information, we cannot assess the legal authorities the administration is relying on to implement the reorganization of OPM. As Congress and the administration consider whether or how to restructure OPM, regardless of the eventual decision about the organizational arrangement, we believe that it will be important to retain the capacity to execute certain government-wide, strategic human capital functions. These include the capacity to (1) identify trends affecting the future of the federal workforce; (2) effectively collaborate and coordinate with key stakeholders to address these government-wide trends; (3) lead the design of government-wide solutions to shared human capital challenges; and (4) administer and enforce civil service laws and regulations. As noted in our prior work, these functions are desirable and appropriate because they generate broad consistency across federal agencies, which is critical for, among other things, ensuring that each federal employee has certain safeguards and protections regardless of where he or she works. They also produce certain efficiencies and economies of scale that come from central coordination, and help maintain a reasonably level playing field among federal agencies when competing for talent. This is particularly important because we continue to designate strategic human capital management as a high-risk area. While many day-to-day human capital responsibilities have been delegated from OPM to individual agencies over the years, OPM continues to play an important strategic role including in the creation, execution, oversight, and strengthening of human capital policies and programs. For example, OPM’s 2018-2022 strategic goals are to: Transform hiring, pay, and benefits across the federal government to attract and retain the best civilian workforce. Lead the establishment and modernization of human capital information technology and data management systems and solutions. Improve integration and communication of OPM services to federal agencies to meet emerging needs. Optimize agency performance. Moreover, OPM was given a key role in fulfilling the human capital-related goal of the most recent President’s Management Agenda, in which the administration noted its intention to partner with Congress on “overhauling the statutory and regulatory rules that have, over time, created an incomprehensible and unmanageable civil service system.” OPM, along with OMB and DOD was tasked with the goal of aligning and strategically managing the workforce to efficiently and effectively achieve the federal government’s mission. To carry out these government-wide, strategic responsibilities, the following capabilities, whether possessed by OPM or some other entity, will be essential for ensuring cost-effective leadership, management, and oversight of the federal workforce. In our March 2019 report, we noted that such trends as technological advances, an increased reliance on nonfederal partners, and changing demographics and shifting attitudes toward work, are affecting how federal work is done, and consequently the skills and competencies that workers need to accomplish agency missions. Moreover, recent publications by the administration and others have raised concerns about whether the government’s employment policies and practices are still relevant and desirable to the current and future workforce. As far back as 1989, we reported that OPM had not provided the leadership necessary to sustain attention to identifying and resolving critical human resource problems affecting government operations and preparing for the future. Although OPM has made progress in this area and provides a variety of services, its progress has been inconsistent and issues still remain. For example, in 2018, OPM issued its Federal Workforce Priorities Report, which identifies changes in the external environment that will likely affect federal human capital management, including the evolving role of workers, changes in technology, employee health, and shifting generational demographics. OPM has also hosted a series of symposia that provide human capital specialists insight on addressing workforce challenges of the future. While these and other efforts are all important steps in the right direction, more work is needed in other areas. For example, as discussed in our March 2019 report, over the years we have made a number of recommendations to OPM to help agencies better meet their missions in an era of changing technology, demographics, fiscal constraints, and other challenges. OPM agreed with most of these recommendations and has made some progress, but additional actions are needed. They include, for example, identifying existing skills and competencies, assessing gaps in existing and future skills and competencies, and monitoring progress toward closing skills gaps. Moreover, in our March 2019 High Risk report, we noted that OPM needs to fully address the recommendations in our January 2015 report. Our recommendation called on OPM to make more strategic use of government workforce data to build a predictive capacity for identifying and mitigating emerging skill gaps across government. Certain human capital issues, such as addressing mission critical skills gaps, are crosscutting in nature and require the coordinated efforts of multiple stakeholders. However, a key challenge we identified in our May 2014 report on strategies to help agencies meet their missions in an era of highly constrained resources was that the federal human capital community is highly fragmented, with multiple actors both inside and outside of government informing and executing human capital policies and initiatives in ways that are not always aligned with broader, government-wide human capital efforts. Within government, OPM, OMB, the Chief Human Capital Officers (CHCO) Council, and individual agencies create, implement, and oversee human capital initiatives. Those initiatives are shaped, in part, by input provided by labor unions and federal management councils such as the President’s Management Council. The federal chief human capital officers with whom we spoke noted that each of these actors possess its own mission, initiatives, agendas, chain of command, budgets, and oversight. While this is to be expected given their various roles and responsibilities, these same factors can create disincentives to collaborating to achieve common human capital goals. In response to this issue, we recommended in 2014 that OPM work with the CHCO Council to, among other actions, strengthen coordination and leadership on government-wide human capital issues. OPM agreed with our recommendation and issued a final regulation, effective in April 2017, requiring it and agencies take significant steps in identifying, prioritizing, and coordinating efforts to address critical human capital issues. We believe this final regulation represents an important step toward addressing fragmentation within the federal human capital community. Going forward, it will be important for OPM, or another entity, if reorganized, to work with the CHCO Council and other stakeholders to address our open recommendations concerning specific human capital functions. Indeed, many of our open recommendations, including those that require priority attention from OPM, call on OPM to work in conjunction with the CHCO Council. Government-wide or “enterprise” solutions are important because they can integrate the efforts of multiple departments and agencies to address crosscutting human capital challenges more effectively by leveraging agencies’ expertise, experience, technology, and other resources. However, in our 2014 report, we found that while agencies have many common human capital challenges, they tend to address these issues independently without looking to enterprise-wide solutions that could resolve them more effectively. Across government, there are examples of agencies and OPM initiating enterprise solutions to address crosscutting issues, including the consolidation of federal payroll systems into shared-services centers. While these and other actions are important steps in the right direction, the CHCOs we spoke with in 2014 identified certain barriers to greater coordination to address common problems. For example, federal budgeting and account structures reinforce the prevailing tradition of controlling agency resources within a single agency. Moreover, agencies may be reluctant to contribute resources to a government-wide approach because they may not get an equitable return on their investment, or may get a product that does not fit their needs. According to the CHCOs in 2014, two areas that are ripe for greater government-wide collaboration are human resource information technology (HR IT), and strategic workforce planning. Specifically, the CHCOs said agencies could be missing cost-savings opportunities by not coordinating HR IT investments within and across agencies. They noted that agencies are individually procuring identical systems rather than leveraging the purchasing power of multiple agencies to negotiate better prices or services, or use shared service centers. Similarly, several CHCOs we spoke with said agencies are not consistently leveraging lessons learned or collaborating to address difficulties they encounter with workforce planning models. To further agencies’ use of government-wide approaches, we recommended that the Director of OPM, in conjunction with the CHCO Council, should explore the feasibility of expanded use of enterprise solutions to more efficiently and effectively address shared or government-wide human capital challenges. Such actions could include: (1) seeking cost savings and improved functionality through coordinated government-wide human resources information technology planning and acquisition; (2) seeking agency input to ensure OPM’s workforce planning tools provide effective guidance for agencies; and (3) sharing workforce planning lessons learned and successful models across the government. OPM agreed with the recommendation and in September 2018, it reported that in spring 2019, data will be available to indicate whether surveys and tools to address government-wide human capital challenges are meeting their intended goals. In March 2019, OPM told us that it was conducting Human Capital Reviews with relevant agencies. However, to fully implement the recommendation, OPM, or another entity, if reorganized, needs to demonstrate continued progress in addressing government-wide human capital challenges. Broad consistency across federal agencies is important for ensuring that all federal employees have the same safeguards, rights, and protections regardless of where they work. These include, for example, merit principles; protection from prohibited human capital practices; the ability to organize, bargain collectively, and participate through labor organizations; and due process that is fair, fast, and final. OPM is responsible for executing, administering, and enforcing the civil service rules and regulations, and the laws governing the civil service. Additionally, OPM is required to establish and maintain oversight over delegated human capital activities, including delegated competitive examining activities, to ensure agencies are acting in accordance with the merit system principles and the relevant standards established by OPM, such as compliance with applicable laws, rules, regulations, executive orders, and OPM policies. OPM monitors overall implementation and identifies corrective actions when deficiencies are found. OPM conducts this oversight through three primary means: delegated examining unit audits, human resource management evaluations, and special studies. However, in our prior work, we have identified the need for more effective oversight in such areas as agencies’ use of hiring authorities, agencies’ classification programs, the conversion of political appointees to career positions, and the Senior Executive Service performance-based pay system. With respect to agencies’ use of hiring authorities, for example, to help strengthen the government’s ability to compete in the labor market for top talent, and to improve the federal hiring process, we recommended in 2016 that the Director of OPM, in conjunction with the CHCO Council, should determine whether opportunities exist to refine, consolidate, eliminate, or expand agency-specific authorities to other agencies and implement changes where OPM is authorized. OPM agreed with the recommendation and in December 2018, OPM said that it continues to research and examine streamlining opportunities, such as those identified in its July 2018 study on excepted service hiring authorities, as part of the broader initiative to modernize federal hiring practices under the President’s Management Agenda. However, OPM did not provide a time frame for implementation. In its March 2019 Congressional Justification for the fiscal year 2020 budget request, OPM included legislative proposals for new hiring authorities such as highly qualified experts and temporary appointments to help agencies meet critical needs as well as a change to the criteria for granting direct hire authority. While OPM has made some progress in this area, it will be important for the agency to follow through on its planned actions to streamline hiring authorities. To fully implement the recommendation, OPM or another entity, if reorganized, needs to complete these efforts and, as appropriate, develop legislative proposals in consultation with the CHCO Council. Thank you, Chairman Connolly, Ranking Member Meadows, and Members of the Subcommittee. This concludes my testimony. I would be pleased to answer any questions. If you or your staff has any questions concerning this testimony, please contact Triana McNeil at (202) 512-6806 (McNeilT@gao.gov). Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. In addition to the contacts named above, Sarah Veale (Assistant Director), Peter Beck (Analyst-in- Charge), Colenn Berracasa, Robert Goldenkoff, Chelsa Gurkin, Shelby Kain, Steven Putansu, Janet Temko-Blinder, Peter Verchinski, and Alicia White made key contributions to the testimony. Other staff who made contributions to the reports cited in the testimony are identified in the source products. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In June 2018, the administration proposed reorganizing OPM by devolving its responsibilities to other agencies and entities including GSA and the EOP; see the figure for details. OMB's role is to coordinate and oversee the reorganization proposal, with support from OPM and GSA. In June 2018, GAO reported on key practices to assess agency reform efforts. This testimony focuses on preliminary observations from GAO's ongoing work related to the transfer of functions from OPM to GSA and the EOP. Specifically, we evaluated (1) the extent to which OMB, OPM, and GSA have addressed key practices for effective reforms and reorganizations; (2) legal authorities that may affect the reorganization of OPM, and (3) key capacities important for effective strategic human capital management, which need to be in place regardless of how the leadership over federal human capital is organized. For the information in this testimony, as of May 17, 2019, GAO met with OMB staff, GSA officials, OPM's and GSA's Inspectors General staff, and analyzed documentation provided by GSA. GAO also reviewed its prior related work. The Office of Management and Budget (OMB), Office of Personnel Management (OPM), and General Services Administration (GSA) have generally not addressed key practices for agency reform efforts as they have moved forward with their proposal to reorganize OPM. They have not established outcome-oriented goals, developed a cost-benefit analysis or implementation plans, and have not fully involved or communicated their efforts with the Congress, employees, and other key stakeholders. OPM and GSA also have not shown how they will address management challenges that may affect their ability to successfully reorganize the government's central human capital functions. OMB, OPM and GSA have not identified specific actions, as of May 17, 2019, that can be taken administratively versus those that will require legislative action to reorganize OPM. The administration has acknowledged the need for additional statutory authority to execute certain transfers of functions from OPM to GSA and the Executive Offices of the President (EOP), but has also stated that it will rely on existing authority to move certain functions administratively. Without additional information from OMB and agencies, GAO cannot assess the legal authorities the administration is relying on to implement the reorganization. As the Congress and administration consider whether or how to restructure OPM, it will be important to retain the capacity to execute certain government-wide, strategic human capital functions, regardless of the decision made about the organizational arrangement. These capacities include an ability to identify future workforce trends and to effectively collaborate with stakeholders—for the purpose of creating, executing, and overseeing human capital policies and programs, and enforcing civil service laws and regulations. This is particularly important because GAO continues to designate strategic human capital management as a high-risk area.", "document_type": "gao"}
{"report": "As the federal agency with primary responsibility for civil aviation security within the United States, TSA promulgates security requirements, primarily through regulations but also through security directives and other mechanisms, and conducts inspections to ensure that airport operators, air carriers, and other regulated entities are in compliance with these requirements. Additionally, TSA oversees security operations at airports through different types of testing and vulnerability assessments to analyze and improve security, among other activities. As of December 2019, there were approximately 430 commercial airports nationwide. Airport operators, air carriers, and other regulated entities are responsible for implementing security requirements, primarily in accordance with their TSA-approved security programs. These programs generally cover day- to-day operations, including measures that contribute to mitigating insider threats. For example: For most commercial airports, airport operators must ensure there is an adequate law enforcement presence to support operations and prevent unauthorized access to security-restricted areas through, among other measures, employee vetting, the use of personnel identification media, and implementing access control systems. For most air carrier operations, the air carriers must implement measures to ensure the security of aircraft and facilities, such as preventing unauthorized access to aircraft; searching aircraft prior to boarding passengers; randomly searching service personnel, such as caterers, and their property prior to boarding the aircraft; and training employees in security procedures. In accordance with an airport operator’s security program, an air carrier may enter into an agreement with the airport operator to assume exclusive responsibility for specified security measures for all or portions of an airport’s security-restricted areas, including access points. This is known as an exclusive area agreement. The security programs that airport operators and air carriers implement, in accordance with federal regulations, are generally consistent across similarly-situated airports and air carriers. For example, all airports operating under complete security programs generally implement TSA- approved security programs that address the same requirements. However, the details of these programs and their implementation can differ widely based on the individual characteristics of the airport. For example, methods that airport operators use to control access into security-restricted areas vary because of differences in the design and layout of individual airports, but all access controls must meet minimum performance standards in accordance with TSA requirements. Airport operators and air carriers may also choose to implement measures beyond what is required by TSA, but they may choose not to pursue incorporating these additional measures into their security programs, because if incorporated into their security programs, TSA could then hold the regulated entities accountable for implementing such additional measures. By not incorporating the additional measures into their security programs, airport operators and air carriers retain the flexibility to alter such measures without TSA approval. The security measures that airport operators and air carriers implement are generally carried out within, or to prevent access to, security- restricted areas of an airport or aircraft. These areas include: Secured areas. Areas for which security measures, such as access controls, must be carried out to prevent and detect the unauthorized entry, presence, and movement of individuals and ground vehicles. This includes areas where domestic and foreign air carriers enplane and deplane passengers and sort and load baggage, and any adjacent areas not separated by adequate security measures. Security identification display areas (SIDA). Areas for which security measures, such as personnel identification systems, must be carried out to prevent the unauthorized presence and movement of individuals. Air operations areas. Areas for which measures must be carried out to prevent and detect the unauthorized entry, presence, and movement of individuals and ground vehicles. This includes aircraft movement and parking areas, loading ramps, and safety areas for use by TSA-regulated aircraft, and any adjacent areas not separated by adequate security systems, measures, or procedures. Sterile areas. Areas that, in general, provide passengers access to boarding aircraft and to which access is controlled through the screening of passengers and property. Figure 1 illustrates the variety of security-restricted areas of a typical larger airport, such as a category X or I airport, and aviation stakeholders’ primary responsibilities for securing the area. TSA’s Insider Threat Program, which was established in 2013, consists of offices across TSA conducting different portions of the insider threat mission, with TSA’s Law Enforcement/Federal Air Marshal Service office serving as the program lead. The program’s mission is to deter, detect, and mitigate insider threats to the nation’s transportation sector personnel, operations, information, and critical infrastructure. Other TSA offices that have key responsibilities in the Insider Threat Program include TSA’s Security Operations; Enrollment Services and Vetting Programs; Inspection; Intelligence and Analysis; and Policy, Plans, and Engagement, among others. To support inter-office coordination, TSA established the Insider Threat Advisory Group in 2015, which is a multi- office team of experts who review and analyze the program’s activities, identify gaps, and develop mitigation strategies, among other activities. The group is co-chaired by two TSA offices—Law Enforcement/Federal Air Marshal Service and Intelligence and Analysis. TSA’s Insider Threat Unit, which operates within the Law Enforcement/Federal Air Marshal Service office, serves as the focal point for all referrals of potential insider threat incidents. According to TSA, an insider threat includes direct risks to TSA’s security operations, as well as indirect risks that may compromise critical infrastructure or undermine the integrity of the aviation security system. Examples of insider threat events include compromises of airport security (e.g. using access and knowledge to smuggle contraband) and sabotage (e.g. intentionally damaging equipment meant to detect unauthorized access to security-restricted areas). TSA recognizes, however, that some insider threats may arise from complacency or ignorance rather than a malicious intent to cause harm, such as when workers assume a negligent approach to policies, procedures, and potential risks. The Insider Threat Unit receives referrals from a telephone tip line and email address; daily reports from the Transportation Security Operations Center detailing security policy violations, such as aviation workers attempting to bring prohibited items not necessary to their work duties into security-restricted areas of the airport; and internal and external intelligence reports and referrals. After a referral is made, the unit is to coordinate, disseminate, and retain all information when reviewing referrals and conducting investigations into potential insider threats. Specifically, the unit is to coordinate inquiries and investigations with the appropriate lead entities to include TSA offices; federal, state, and local law enforcement and intelligence agencies; and various airport and transit law enforcement authorities. According to one TSA official, many of these referrals do not require additional investigation because they were already appropriately mitigated at the local level. Referrals that meet the unit’s criteria are accepted for further investigation—called acceptances. Criteria include, for example, whether the incident involved a prohibited item, the perpetrator has multiple violations, the perpetrator attempted to circumvent security, or the perpetrator made threatening statements. According to Insider Threat Unit data from fiscal year 2017 through fiscal year 2019, there were an average of 138 referrals and 14 acceptances per month. The majority of referrals accepted for investigation during this time period occurred at category X and I airports (63 and 25 percent, respectively). Referrals where air carrier employees and other aviation workers are the potential insider threat each account for approximately one-third of referrals accepted for investigation. Table 1 discusses examples of insider threat incidents. TSA has ongoing activities that help mitigate insider threats, including long-standing historical efforts and more recent efforts initiated since 2017. For example, TSA initiated operations to randomly search aviation workers at high-risk airports through pat down searches and explosives trace detection. TSA also has plans to enhance its current Insider Threat Program. Airport operators are to implement security measures, primarily in accordance with their TSA-approved security programs, which detail the day-to-day operations of those entities and their responsibilities for controlling access to security-restricted areas, among other responsibilities. Based on our analysis of TSA’s representative sample, some airport operators choose to implement security measures beyond those required by TSA. For example, some airport operators use sophisticated technologies such as fingerprint readers to control access to security-restricted areas, or offer or require training for aviation workers about topics such as insider threats. Similarly, air carriers are to implement security measures in accordance with TSA-approved security programs. For example, air carriers are required to perform regular searches of aircraft. Some air carriers we spoke to said they also choose to implement additional measures not required by TSA to enhance their security posture, such as conducting full employee screening at dedicated checkpoints. Figure 2 provides examples of the variety of security procedures and technologies used by TSA, airport operators, and air carriers at typical category X or I airports to control access to security-restricted areas of airports and help mitigate insider threats. These efforts vary by airport, local needs, and resources available, among other factors. TSA has long-standing, established activities that the agency has conducted that help mitigate insider threats. These efforts directly or indirectly regulate or facilitate security at commercial airports and help mitigate insider threats. Specifically, TSA has programs to increase awareness of insider threats in the aviation community, analyze and disseminate intelligence, vet aviation workers and TSA staff, inspect and assess security at airports, and share information with the aviation community. We have previously reported on these efforts in our work on aviation security and perimeter and access control security at airports. Awareness and training. TSA promotes awareness of insider threats to the aviation community and disseminates materials on how to identify and report insider threats to aviation stakeholders, which they may use on a voluntary basis. Analyze and disseminate intelligence. TSA evaluates intelligence information related to both domestic and international adversaries (such as terrorists) who seek to leverage insiders and target the U.S. transportation system, among other things. TSA regularly disseminates this information to aviation stakeholders through TSA’s intelligence officers at its field offices, for example. There are approximately 80 field intelligence officers stationed throughout the U.S., Puerto Rico, and Guam, who provide information to airport officials and the aviation community on insider tactics and emerging threats, among other things. Vetting aviation workers. TSA facilitates background checks of aviation workers (e.g. baggage handlers and concessionaire employees) applying for unescorted access to security-restricted areas of airports. The background check includes a Security Threat Assessment that is generally made up of three parts: (1) near real- time vetting against terrorism watch lists and other federal databases, (2) verification of the applicant’s lawful presence in the United States, and (3) a fingerprint-based criminal history records check.Additionally, TSA staff, such as transportation security officers, undergo a pre-employment screening, including all parts of the Security Threat Assessment and other security checks, and a background investigation to determine the applicant’s suitability for the position. Depending upon their job duties, TSA staff at airports may be issued credentials for unescorted access to security-restricted areas of an airport. Inspections and assessments. Staff at TSA compliance hubs (field offices) inspect airports and air carriers and test security measures to ensure compliance with federal requirements. To further enhance airport security, TSA also performs comprehensive, targeted, and supplemental inspections and other compliance activities, such as assessments, investigations, and tests. Guidance, policies, and information sharing. TSA issues guidance and policies that, among other things, require airport operators and air carriers to implement or enhance access controls or other security measures, or share best practices on improving security and mitigating insider threats. TSA regularly communicates with aviation stakeholders to discuss security issues and policies. Since the beginning of fiscal year 2017, TSA has implemented a variety of activities to oversee and facilitate insider threat mitigation at commercial airports, either through new activities or by enhancing ongoing efforts. Among other things, TSA has taken steps to further augment vetting of aviation workers, enhance aviation worker screening, test airport security targeted toward identifying insider risks and vulnerabilities, and develop reference tools and guidance. See below for examples of TSA’s insider threat mitigation efforts initiated since the beginning of fiscal year 2017. Social media analysis. TSA augmented the vetting process for aviation workers, described above, in 2018 to include an evaluation of publically available social media information for individuals who match against a federal watch list and are applying for unescorted access to security-restricted areas of an airport. TSA uses information about the individual, including the social media information, to conduct the security threat assessment and determine whether to approve or deny the application. Proposed requirement for Rap Back enrollment. The Federal Bureau of Investigation’s Rap Back Service provides participating entities with ongoing notification of subsequent criminal activity that occurs after an individual’s initial criminal history records check. In 2019, TSA proposed requiring airport operators and air carriers to enroll in Rap Back and to subscribe covered aviation workers. As of December 2019, TSA has not yet imposed this requirement. Physical Screening of Aviation Workers Advanced Threat Local Allocation Strategy (ATLAS). TSA’s ATLAS tool generates a randomized schedule and location of procedures to physically screen aviation workers. The ATLAS tool randomly identifies the type of screening procedure by balancing on- person screenings, such as pat-down searches, and in-property screenings, such as testing for traces of explosives on workers’ property. Federal security directors may tailor the screenings and location based on local intelligence. TSA started using ATLAS in 2018 at high-risk airports to screen aviation workers entering or within security-restricted areas. Covert testing. TSA’s covert testing teams help identify security vulnerabilities in multiple aspects of aviation security (including airport access controls and vulnerabilities to insiders) and may recommend additional measures or procedures be implemented to mitigate these vulnerabilities. As described above, TSA increased the number of covert tests related to airport access controls and insider vulnerabilities in response to provisions of the Aviation Security Act of 2016. Further, in 2019, TSA began a covert test to assess vulnerabilities in TSA’s ATLAS program. Joint Vulnerability Assessment. Joint teams of TSA and Federal Bureau of Investigation officials assess vulnerabilities in multiple aspects of airport security and operations including fuel, cargo, catering, general aviation, terminal area, and law enforcement operations. The assessments are conducted at commercial airports identified as high-risk every three years and on a case-by-case basis at other airports. TSA revised the joint vulnerability assessment process in fiscal year 2017 to identify insider threat vulnerabilities and to suggest options to mitigate them. Insider Threat Mitigation Activity. In addition to the regular airport inspection and assessment duties, starting in fiscal year 2017, TSA required its aviation transportation security inspectors to conduct unannounced tests related to mitigating insider threats every fiscal year. Guidance, Notice, and Information Sharing Fraudulent identification guidance. In fiscal year 2017, TSA developed guidance for airport operators and air carriers on detecting fraudulent identification documents, including methods for detecting fraudulent identification and appropriate responses when discovered. Security directives. TSA updated a security directive in 2018 to mitigate potential insider threats by, among other things, requiring airport operators to post signs at sterile area entry points accessible by credentialed aviation workers. These signs advise individuals that they may be subject to inspection, among other things. Additionally, airport operators are required to conduct random inspections of vehicles when entering secured areas. Information Circulars. TSA issued information circulars in 2018 and 2019 that (1) recommended that airport operators and air carriers with exclusive area agreements conduct a vulnerability assessment of insider risks and develop a risk mitigation plan, and included best practices for the mitigation plan, and (2) described measures to prevent unauthorized access to aircraft and the flight deck. TSA has implemented efforts aimed toward enhancing its Insider Threat Program. TSA established an Executive Steering Committee with members from the program’s key offices to provide executive support and oversight across the multiple offices that compose the program. Also, TSA’s Insider Threat Advisory Group collaborated with the Aviation Security Advisory Committee (ASAC) to review and develop recommendations that would address gaps, redundancies, and vulnerabilities in the program. TSA Insider Threat Executive Steering Committee. TSA established the Steering Committee in October 2018 to be the central oversight body for managing insider risks and coordinating the agency’s mitigation strategies. Its purpose is to facilitate collaboration and decision-making across the program’s multiple offices, advance an integrated agency-wide strategy, and establish consistent executive support for TSA and ASAC efforts, among other things. Its work to date includes reviewing the 2019 ASAC recommendations described above and approving the development of the Insider Threat Roadmap, which is to describe TSA’s strategic vision. TSA Administrator’s Intent initiatives. Several objectives and initiatives from the Administrator’s Intent, published in June 2018, relate to mitigating insider threats. It identifies specific priorities, strategic goals, and objectives that the Administrator plans to accomplish by 2020. For example, one objective is to modernize TSA’s Insider Threat Program by, among other initiatives, expanding the Insider Threat Unit with dedicated staff from several key TSA offices. ASAC Subcommittee on Insider Threats. In 2018, the ASAC established a permanent, joint industry-government Subcommittee with members from TSA and various aviation stakeholders. The purpose of the Subcommittee is to provide a holistic and sustained body to research and make recommendations on risks posed by aviation workers to harm the aviation system. Previously, ASAC convened an industry-only Working Group on Airport Access Control on an as-needed basis. ASAC recommendations. In May 2019, at the request of the TSA Administrator, the ASAC issued a report to help enhance and broaden TSA’s Insider Threat Program through 21 recommendations. The recommendations span six areas of the insider threat concept: 1. threat detection, assessment, and response; 2. aviation worker vetting and evaluation; 3. aviation worker screening and access control; 4. 5. 6. governance and internal controls. TSA concurred with all 21 of the recommendations. As of October 2019, TSA officials reported that the agency had implemented one of the recommendations and created a document that details implementation steps for the remaining 20, progress on those implementation steps, and estimated timeframes for completion. According to TSA officials, previous recommendations made by ASAC have significantly contributed to the establishment and development of the Insider Threat Program, and they anticipate the 2019 report’s recommendations will have a similar positive effect. Further, TSA officials said that the next iteration of the Administrator’s Intent will incorporate these ASAC recommendations to help ensure that their implementation is tracked at the enterprise level. Overall, many airport operators help ensure the security of their facilities, including mitigating insider threats, through their efforts to comply with TSA regulations. However, airport operators may also implement additional measures beyond those required by TSA to improve their security posture. Some examples of voluntary efforts airport operators have reported implementing to help mitigate insider threats include physical screening of aviation workers at access points to SIDAs or secured areas in addition to TSA’s random screening under the ATLAS program, using sophisticated access control technologies such as biometric fingerprint readers, and offering or requiring training for aviation workers on additional security awareness topics. Although TSA requires airport operators to perform random aviation worker screening at sterile area access points, it does not require them to physically screen all aviation workers at all access points to security- restricted areas, at all times. However, some airport operators choose to voluntarily implement screening programs to physically search some or all workers or their property as they enter security-restricted areas. According to our analysis of TSA data collected in July through September 2019 from a representative sample of airports on their current insider threat mitigation measures, seven of 27 category X airports’ officials and 13 of 54 category I airports’ officials reported that when they screen aviation workers passing through an access point, they screen 100 percent of workers, their property, and their vehicles (if the screening operations take place at a vehicle access point). Airport officials from four of 44 sampled category II airports, 10 of 54 sampled category III airports, and one of 58 sampled category IV airports reported that they screen 100 percent of workers when screening operations are underway. At one category X airport we visited, airport officials said they implemented full worker screening, following the lead of one tenant air carrier. According to the officials, the airport has two worker screening checkpoints in the publicly-accessible baggage claim area that are used by all workers entering the security-restricted areas. These checkpoints use X-ray machines, explosives trace detection, and walk-through metal detectors to screen aviation workers and their property and ensure they do not carry items that are otherwise prohibited (e.g. firearms and illicit substances) and not required to perform their work duties beyond the worker checkpoint. Airport officials said these checkpoints are staffed by a dedicated crew of screeners employed by the airport operator, and officials believe having a consistent crew over time makes it easier for screeners to detect if a worker is behaving in an uncharacteristic or suspicious way. At one category I airport we visited, officials said that they established an insider threat program and implemented measures to mitigate insider threats in response to an illegal drug smuggling operation involving aviation workers that occurred at their airport. For example, they partner with TSA and local law enforcement to conduct full worker screening operations two to three times per week at randomly-selected times and locations, which supplements TSA’s ATLAS operations. Officials said during these operations, all arriving workers are funneled to the screening locations, and they are directed to walk through screening equipment that is capable of identifying metallic threats (e.g. guns and knives) and non- metallic threats (e.g. suicide vests and other weapons) both on person and in property. If the machines are not used, airport officials coordinate with TSA to conduct full-body pat-downs of all employees. Airport officials may also use open-and-look bag searches. At the same time, local law enforcement patrols the screening area with canine units to search for drugs and explosives. In general, category X, I, II, and III airports are required to implement measures to control access and prevent unauthorized entry to security- restricted areas of the airport. Airports choose their specific access control system and technology, such as cipher or keyed locks, proximity swipe cards, PIN readers, and biometric (e.g. fingerprint) authentication, provided such technology meets the standards of their TSA-approved security program. Category IV airports—which are typically the smallest commercial airports—are generally not required to identify security- restricted areas within their security programs and thus may not have mechanisms in place to control access to such areas. However, like the larger commercial airports, security programs for category IV airports must provide for adequate law enforcement support, and airport operators at these airports may choose to establish security-restricted areas and implement access control technologies or other measures at their discretion. According to our analysis of TSA data collected in July through September 2019 from a representative sample of airports, officials from most category X, I, and II airports reported that they have systems that use more than one technology to control access to sterile and secured areas of the airport, as shown in figure 3. Among category III airports, officials from 27 of 54 also reported using multiple technologies. Among category IV airports, officials from 37 of 58 reported using some type of access control technology, the most common being locks and keys. Technology at two category X airports we visited is used specifically to prevent workers from “piggybacking,” or attempting to enter security- restricted areas by following close behind another worker without swiping a proximity card or entering a PIN for access. For example, one airport has sensor towers at high-traffic doors from unsecured to secured areas of the airport. The two towers—one on each side of the door—can detect if more than one person crosses the threshold after only a single proximity card swipe and PIN entry. According to airport officials, when this happens, the nearby security cameras will pan toward the door so that security officials who monitor the feeds can view the individuals at the door and respond appropriately. Figure 4, below, shows this technology, as well as the proximity card reader and PIN pad, a separate reader and pad for elevator access, and signs describing security rules. At a second category X airport we visited, locking turnstiles are used to prevent piggybacking. Each worker who wishes to go through the access point must present their proximity badge and provide a fingerprint. Only then will the locked turnstiles unlock to allow that worker through. The turnstiles are on a timer, so if a worker does not go through within a set time, they will have to repeat the process from the beginning. Additionally, if a badge is presented more than one time within a specified time period, an alarm is triggered in the Airport’s Security Operations Center to alert airport security staff of a potential piggybacking incident. Figure 5 shows the card reader, fingerprint reader, and turnstile in use at one access point. Behind the turnstile, a TSA agent conducting ATLAS countermeasures waits for workers to come through. In general, according to TSA requirements, individuals with unescorted access to security-restricted areas of category X, I, II, and III airports must be trained on, among other things, escort procedures and the display and use of identification media. All airport operators across all airport categories must ensure that training for law enforcement personnel addresses the airport’s security program, among other security-related topics. For training offerings beyond what is required by TSA, our analysis of TSA data collected in July through September 2019 from a representative sample of airports showed the majority of airport operators at category X, I, II, and III airports reported that they offered or required training for aviation workers that specifically discusses insider threats, as shown in Table 2. Moreover, although they are not required to do so by TSA, many category IV airports reported they offer or require training on a variety of security- related topics, such as insider threats and reporting suspicious behavior and unusual activity. The six air carriers we spoke with reported they mitigate insider threats via their efforts to comply with federal requirements through their TSA- approved security programs. In general, federal regulations require that air carriers employ a variety of procedures to mitigate security threats. Among others, these measures may include: Preventing unauthorized access to security-restricted areas over which they have primary responsibility, such as aircraft (e.g. by performing regular searches) and areas covered by an exclusive area agreement, as applicable; Submitting applicant biographic information for criminal history records checks prior to issuing air carrier identification media or recommending that airport operators issue access credentials that grants an individual unescorted access to security-restricted areas of the airport; Using personnel identification systems that track information such as identification media expiration dates and appropriate level of access; and Providing training for workers who perform security-related duties or otherwise require access to security-restricted areas. Air carriers may also choose to voluntarily implement additional efforts to improve their security posture. As described above, these may be incorporated into an individual air carrier’s security program, but not necessarily. Air carriers we spoke with have implemented a variety of security measures. For example: To prevent unauthorized access to secured areas included in their exclusive area agreement or within their operations area, all air carriers we spoke to said they secure their facilities by employing at least one form of access control technology. The majority of air carriers (five of six) reported that they secure most access points with proximity card or fob readers, including one air carrier that reported it secures its access doors using additional measures beyond a proximity card swipe, requiring a PIN and a fingerprint as well. The sixth air carrier we spoke to said workers access security-restricted areas using keys or cipher combinations. Prospective air carrier employees may require access media credentials from the airport operator in addition to the air carrier. In some cases, the air carrier will accept the criminal history records check conducted by the airport operator to issue its own credentials, but officials from some air carriers we spoke to said they conduct more rigorous checks before issuing their air carrier credentials. For instance, one air carrier reported that it checks both the applicant’s employment history in addition to their criminal history, and it uses an additional set of disqualifying criteria beyond the regulatory minimum to determine suitability for hire. Some air carriers choose to further enhance their insider threat mitigation efforts. For example, one air carrier has a dedicated insider threat program and, at 16 airports, it implemented a screening program of workers and their belongings at dedicated checkpoints. Another air carrier created a team to monitor the use of the Known Crewmember program, a screening program that provides flight and cabin crews with expedited screening that may include a dedicated screening lane. According to air carrier officials, at its largest hub airport, the team reports on workers from all air carriers who violate the program’s rules to TSA. Some examples of such violations include crewmembers using the dedicated lane for leisure international travel or carrying other individuals’ bags through the Known Crewmember portal or passenger screening checkpoint and into sterile areas of the airport. Although TSA has multiple ongoing efforts to mitigate insider threats at commercial airports carried out by a number of offices, it does not have a strategic plan in place to guide its Insider Threat Program. When the program began in 2013, TSA initially developed a 2014-2016 Insider Threat Action Plan, which described TSA’s vision of an integrated insider threat program at TSA, and it included strategic goals, each with a set of objectives. However, according to TSA officials, TSA did not fully implement this Action Plan, and TSA did not renew or revise the Action Plan after 2016 due to the departure of the key sponsoring senior leader. Further, TSA officials said that the Action Plan does not reflect all the existing activities that TSA’s Insider Threat Program currently encompasses because the program has changed since 2014. TSA is aware of the importance of strategic planning and took steps to strategically plan for other programmatic efforts at the agency. For example, in 2019, TSA revised its National Strategy for Airport Perimeter and Access Control Security. This strategy describes how TSA seeks to secure the perimeter and control access to security-restricted areas of U.S. commercial airports, which is one concern related to insider threats. In 2018, TSA published its Administrator’s Intent to outline how TSA planned to execute its agency-wide strategy in the short term. The Intent includes one strategic objective to modernize elements of TSA’s Insider Threat Program, such as vetting capabilities. Also in 2018, TSA published the Cybersecurity Roadmap 2018, which details the agency’s efforts to protect its information technology infrastructure from adversaries who might seek to cause harm. Each of these documents contains the critical elements of strategic plans that are laid out by the Office of Management and Budget, including strategic goals and objectives. These strategic planning documents contain elements related to insider threats and can be drawn upon to help develop a comprehensive strategic plan that encompasses the myriad of activities across its many offices that compose TSA’s Insider Threat Program. In October 2018, TSA established the Insider Threat Executive Steering Committee in an effort to establish consistent executive-level engagement and support from the agency’s senior management. As described above, TSA’s Insider Threat Program is carried out by multiple, distinct offices at TSA, and TSA officials have indicated that the program could benefit from a more cohesive approach and oversight. During the course of our review, the Steering Committee approved the development of an Insider Risk Roadmap (Roadmap). According to TSA officials, the Roadmap is under development as of January 2020, and when completed, is to describe the future of insider risk mitigation for TSA. TSA officials were uncertain, however, of when the Roadmap would be completed and implemented. Given that TSA did not fully implement its 2014-2016 Insider Threat Action Plan, and it was never renewed or revised, it is important that TSA remain committed to developing and implementing the Roadmap and, as it moves forward in drafting the Roadmap, ensuring that it contains the critical elements of a strategic plan, including strategic goals and objectives. Federal internal control standards establish that management should define the entity’s objectives clearly and in alignment with the entity’s mission and strategic plan. Objectives should specifically identify what is to be achieved, how, by whom, and in what time frame, and should be defined in measurable terms so that performance toward achieving such objectives can be assessed consistently. More specifically, the Office of Management and Budget clarifies that a strategic goal articulates clearly what the agency wants to achieve to advance its mission, while strategic objectives reflect the outcome or impact the agency is trying to achieve and should facilitate prioritization and assessment for planning, management, reporting, and evaluation. For example, mission-focused strategic objectives express specifically the path an agency plans to follow to achieve or make progress on a single strategic goal. Having a strategic plan for its Insider Threat Program would better position TSA to ensure it is effectively coordinating across its multiple offices and leveraging each office’s resources to mitigate insider threats, a threat which has consistently been identified as the second-highest enterprise level risk. A strategic plan, such as the ones included in other examples of TSA roadmaps, would help both to (1) link these individual efforts to the program’s strategic goals and (2) describe how they contribute to the achievement of those goals and the agency’s stated mission. TSA officials agreed that developing and implementing a strategic plan such as the ones associated with other roadmaps would help ensure that (1) its efforts to develop the Insider Threat Roadmap would continue to progress and (2) executive-level support for strategic planning would remain a priority. Individual TSA offices have made progress developing methods to assess their individual office’s efforts, but TSA does not have a comprehensive set of performance goals that can be used to assess progress toward achieving the Insider Threat Program’s stated mission. The National Insider Threat Task Force, established under Executive Order 13587 of October 7, 2011, outlined the minimum standards and basic elements of an insider threat program as well as a Maturity Framework to help Executive Branch departments and agencies, such as TSA, increase the effectiveness of their insider threat programs, among other things. According to the Framework, program senior officials should use metrics to represent progress and better articulate the central role of its insider threat program in achieving the department or agency’s strategic objectives. The Office of Management and Budget specifies that performance goals are statements of the desired performance target to be accomplished within a certain timeframe, and a suite of performance goals should be used to assess progress toward achieving each strategic objective. Federal standards for internal control also state that entities should use performance goals to evaluate their performance in achieving their strategic objectives. Some TSA offices have developed indicators for measuring characteristics of their insider threat activities, but these do not exhibit the characteristics of performance goals as defined by the Office of Management and Budget. For example, TSA’s Security Operations office developed Key Performance Indicators for its ATLAS operations, which are operational indicators for the TSA staff carrying out the countermeasures. These include that teams must screen a percentage of workers who pass through the checkpoint and must meet their assigned screening time allotment. However, operational indicators such as these do not include baselines and timeframes for completion, which are characteristics of performance goals as described by the Office of Management and Budget. Moreover, the Insider Threat Program is without a strategic plan, and as a result, these operational indicators cannot link back to a strategic objective or show progress achieving such an objective, as called for by the Office of Management and Budget guidance. TSA identified the need to develop performance goals to assess its progress and effectiveness in its 2014-2016 Insider Threat Action Plan, which called for “a performance management system monitors and measures effectiveness of insider threat program.” According to officials, such a performance management system was never developed because of the departure of the key senior leader, as described above. Further, in its May 2019 report to the Administrator, ASAC recommended that TSA develop measures that assess the performance of its insider threat efforts. For example, ASAC recommended that TSA commission a comprehensive federally-funded research and development center to assist TSA in evaluating the performance of random or unpredictable aviation worker screening methods to mitigate insider threats. The report indicated that establishing measures of effectiveness and evaluating performance on such measures is “vital to proactive and effective insider threat management.” TSA officials said that the planned Insider Risk Roadmap may include performance goals for the Insider Threat Program, in addition to strategic goals and objectives. However, previous examples of Roadmaps for TSA efforts did not include references to specific, measurable performance goals that can be used to represent progress via targets and timeframes. Moreover, as described above, TSA officials are still drafting the Roadmap and are uncertain when it will be issued. Having documented and clearly defined performance goals that are linked to the program’s overarching strategic goals and objectives would better position TSA to understand the effectiveness of its insider threat efforts. As a result, TSA would be able to reduce the likelihood of expending resources on efforts that are not meeting the program’s stated mission. Focusing on the intended results of TSA’s insider threat efforts can promote strategic and disciplined management decisions that are more likely to be effective because managers are better able to target areas most in need of improvement and to select appropriate levels of investment. TSA could determine the success of its strategies, adjust its approach when necessary, and remain focused on results. Further, agency accountability can be enhanced when both agency management and external stakeholders—such as Congress—can assess an agency’s progress toward meeting its strategic goals. By developing such performance goals, TSA will better position itself to determine the Insider Threat Program’s progress toward achieving its mission of deterring, detecting, and mitigating insider threats to the aviation sector. TSA has consistently identified the insider threat among its highest enterprise-level risks and characterizes it as a significant and complex risk to aviation security. In the last ten years, TSA and aviation stakeholders have faced a consistent threat posed by insiders who used their access privileges and knowledge to commit criminal acts, such as drug smuggling, gun smuggling, theft, and attempted suicide bombing. Having an effective Insider Threat Program is critical to TSA’s ability to mitigate the risk of insiders causing harm to the civil aviation system. Since establishing its Insider Threat Program in 2013, TSA has taken steps to strengthen its efforts to combat the insider threat such as by implementing a program to physically screen aviation workers at high-risk airports. However, responsibility for the Insider Threat Program is spread across multiple offices within TSA and has made it challenging to synchronize and integrate activities across each office’s efforts. As of January 2020, TSA officials said that the Insider Threat Program does not have a strategic plan. However, officials said they are developing a new strategic “roadmap” for the Insider Threat Program but are uncertain when it will be issued. Developing and implementing a strategic plan with strategic goals and objectives will help improve coordination across the program’s multiple offices and prioritize and focus TSA’s efforts to ensure that resources are targeted effectively. Additionally, TSA has also not established performance goals to help assess its overall progress in achieving its Insider Threat mission. With specific performance goals tied to strategic objectives, TSA will have the necessary mechanism to assess the extent to which the program is achieving its objectives and overall mission. TSA has numerous efforts across the agency to address insider threats; and with performance goals, the program could assess progress, identify successes, gaps, and redundancies and prioritize and allocate resources effectively. When dealing with a program designed to keep the aviation system safe from criminal and terrorist acts, agency leaders and policy makers need to know how well the government is doing implementing its objectives. Establishing performance goals will help the agency and Congress assess the progress of the overall insider threat effort, target areas most in need of improvement, and select appropriate levels of investment. We are making the following two recommendations to TSA: The TSA Administrator should develop and implement a strategic plan for its Insider Threat Program that includes strategic goals and objectives. (Recommendation 1) The TSA Administrator should develop performance goals for its Insider Threat Program that assess progress achieving the strategic objectives in the insider threat strategic plan. (Recommendation 2) We provided a draft of this report to the Department of Homeland Security (DHS) for comment. In written comments, which are included in appendix I, DHS concurred with our two recommendations and described steps it plans to take to implement them, including an estimated timeframe for completion. TSA also provided technical comments, which we incorporated as appropriate. In response to our recommendations, DHS’s letter notes that TSA is in the process of drafting the 2020 Insider Threat Roadmap, which will include strategic goals and objectives to guide TSA in its efforts to mitigate insider threats. The letter further explains that the Roadmap will include performance measures to assess TSA’s progress achieving those strategic objectives. If fully implemented, these actions should address the intent of the recommendations. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of the Department of Homeland Security, and other interested parties. In addition, the report is available at no charge on the GAO website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8777 or McNeilT@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. In addition to the contact named above, William Russell (Director), Kevin Heinz (Assistant Director), Winchee Lin (Analyst in Charge), Sarah Williamson, Benjamin Crossley, Dominick Dale, Daniel Gaud, Thomas Lombardi, and Amanda Miller made key contributions to this report.", "summary": "Aviation workers using their access privileges to exploit vulnerabilities and potentially cause harm at the nation's airports is known as an “insider threat.” TSA, airport operators, and air carriers share the responsibility to mitigate all insider threats at airports. In October 2019, TSA estimated there are about 1.8 million aviation workers at the nation's airports. GAO was asked to review TSA's and aviation stakeholders' efforts to mitigate insider threats at airports. This report (1) discusses the efforts that TSA, airport operators, and air carriers have taken to help mitigate insider threats at airports and (2) evaluates the extent to which TSA's Insider Threat Program is guided by a strategic plan and has performance goals. GAO reviewed TSA guidance; analyzed TSA data from a questionnaire sent to a representative sample of airport operators; and obtained information from TSA officials, officials from selected larger U.S.-based air carriers, and a nongeneralizable sample of seven airport operators, selected, in part, based on the number of aircraft take-offs and landings. The Transportation Security Administration (TSA), airport operators, and air carriers mitigate insider threats through a variety of efforts. TSA's Insider Threat Program comprises multiple TSA offices with ongoing insider threat mitigation activities, including long-standing requirements addressing access controls and background checks, and compliance inspections. TSA also initiated activities more recently, such as implementing TSA-led, randomized worker screenings in 2018. Airport and air carrier officials implement security measures in accordance with TSA-approved programs and may implement additional measures to further mitigate threats. For example, many airport operators reported using sophisticated access control technologies (e.g. fingerprint readers). Additionally, some air carriers reported conducting more rigorous background checks prior to issuing identification credentials to employees. TSA‘s Insider Threat Program is not guided by a strategic plan with strategic goals and objectives nor does it have performance goals. TSA does not have an updated strategic plan that reflects the Program's current status. TSA officials said that the plan was not updated due to turnover of key senior leadership. As of January 2020, TSA officials said they were developing a roadmap that could serve as a new strategic plan for the Program. However, officials had not finalized the contents and were uncertain when it would be completed and implemented. Developing and implementing a strategic plan will help guide TSA's ongoing efforts and coordinate TSA's agency-wide approach. TSA has not defined performance goals with targets and timeframes to assess progress achieving the Program's mission. Without a strategic plan and performance goals, it is difficult for TSA to determine if its approach is working and progress is being made toward deterring, detecting, and mitigating insider threats to the aviation sector. GAO recommends that TSA develop and implement a strategic plan that has strategic goals and objectives, and develop performance goals to assess progress achieving objectives in the strategic plan. TSA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "NASA’s human spaceflight plans have changed focus three times over the last 15 years. These plans have shifted back and forth between conducting a human lunar landing in order to inform the longer-term goal of human exploration of Mars and a mission that sends astronauts to an asteroid boulder in orbit around the Moon but does not include a lunar landing. Figure 1 highlights key events in NASA’s human spaceflight plans from 2005 to 2019. We have found that NASA has faced challenges developing systems capable of transporting humans to space over the past two decades. These include development efforts under NASA’s prior human spaceflight program—the Constellation program—which was canceled in the face of acquisition problems and funding-related issues. More recently, we have found that NASA has struggled to complete its current human spaceflight programs—Orion, SLS, and Exploration Ground Systems—within their established cost and schedule baselines. Establishing a sound business case to ensure resources align with requirements includes following best practices for product development and creating cost estimates and schedules. NASA’s prior human spaceflight programs highlight challenges created when programs do not establish a sound business case. For example: In 2009, we found that NASA had not developed a solid business case—including firm requirements, mature technologies, a realistic cost estimate, and sufficient funding and time—needed to justify moving the Constellation program forward into the implementation phase. We found that the program had not developed a solid business case because the program had a poorly phased funding plan that increased the risk of funding shortfalls, among other reasons. This resulted in the program not completing planned work to support schedules and milestones, and ultimately the program was canceled. Over the past 5 years, we have issued several reports assessing the progress of NASA’s Orion, SLS, and Exploration Ground Systems programs relative to their agency baseline commitments and on technical challenges facing the programs. In 2018, we found that all three programs have been at risk of cost and schedule growth since NASA approved their baselines, and have since experienced cost growth and schedule delays. This was in part because NASA did not follow best practices for establishing cost and schedule baselines for these programs, including not updating cost and schedule analyses to reflect new risks. As a result, NASA overpromised what it could deliver from a cost and schedule perspective. Further, in 2019 we found that NASA should enhance contract management and oversight to improve SLS and Orion program outcomes. NASA’s past approach in this area has left it ill-positioned to identify early warning signs of impending schedule delays and cost growth or reap the benefits of competition. We have made 20 recommendations in prior reports to strengthen NASA’s acquisition management of SLS, Orion, and Exploration Ground Systems. NASA generally agreed with GAO’s recommendations, and has implemented eight of the recommendations. Further action is needed to fully implement the remaining recommendations. For example, in 2019, we recommended that NASA direct the SLS and Orion programs to reevaluate their strategies for incentivizing contractors and determine whether they could more effectively incentivize contractors to achieve the outcomes intended as part of ongoing and planned contract negotiations. NASA agreed with the intent of this recommendation and stated that the SLS and Orion program offices will reevaluate their strategies for incentivizing contract performance as part of contracting activities including contract restructures, contract baseline adjustments, and new contract actions. We will continue to follow up on the actions the agency is taking to address this recommendation. NASA initiates space flight programs and projects to accomplish its scientific or exploration goals. A NASA program has a dedicated funding profile and defined management structure, and may or may not include several projects. Projects are specific investments under a program that have defined requirements, life-cycle costs, schedules, and their own management structure. NASA uses the term “tightly coupled program” to refer to a program that is composed of multiple projects that work together to complete the program’s mission. NASA policy states that programs and projects shall follow their appropriate life cycle. The life cycle for programs and projects consists of two phases: 1. formulation, which takes a program or project from concept to 2. implementation, which includes building, launching, and operating the system, among other activities. Senior NASA officials must approve programs and projects at milestone reviews, known as key decision points (KDP), before they can enter each new phase. The life cycle for a single program closely resembles the life cycle for a spaceflight project. For example, the SLS program follows the project acquisition life cycle because it is not composed of multiple projects. Figure 2 depicts a notional NASA life cycle for a tightly coupled program and for a project. The formulation phase culminates in a review at KDP I for tightly coupled programs and KDP C for projects. This decision point is also known as confirmation, at which cost and schedule baselines are established and documented in a decision memorandum. The decision memorandum outlines the management agreement and the agency baseline commitment. The management agreement can be viewed as a contract between the agency and the program or project manager. The program or project manager has the authority to manage the program or project within the parameters outlined in the agreement. The agency baseline commitment includes the cost and schedule baselines against which the agency’s performance on a program or project may be measured. To inform the management agreement and the agency baseline commitment, each program and project with a life-cycle cost estimated to be greater than $250 million must also develop a joint cost and schedule confidence level (JCL). A JCL produces a point-in-time estimate that includes, among other things, all cost and schedule elements from the start of formulation through launch, and incorporates and quantifies known risks, assesses the effects of cost and schedule to date on the estimate, and addresses available annual resources. The results of a JCL indicate the probability of a program or project’s success of meeting cost and schedule targets. NASA has initiated multiple programs to help the agency achieve its Artemis III mission and longer-term lunar exploration goals. These programs include a platform in the lunar orbit, a landing system to put humans on the surface of the Moon, and robotic lunar landing services. Gateway. The Gateway program aims to build a sustainable platform in lunar orbit to support human lunar exploration and scientific experiments by NASA and its commercial and international partners. NASA is planning for Gateway to maneuver to different orbits around the Moon, which will allow access to a variety of locations on the lunar surface. The Gateway program is the first program NASA has designated as a tightly coupled program. The program is composed of multiple projects, which are responsible for executing portions of the Gateway mission. Individual teams manage the projects and each project will have its own cost estimate and launch readiness date. Gateway program management is responsible for ensuring the overall integration of all the individual projects. See figure 3 for a description of the three Gateway projects that NASA has initiated. In addition to Gateway, NASA initiated several other programs: Human Landing System. The Human Landing System, or lunar landers, is to provide crew transportation from Gateway to the lunar surface and back and demonstrate capabilities required for deep space missions. NASA anticipates that there will be three stages to the landers—a descent, ascent, and transfer stage—but the number of stages may vary depending on the contractors that NASA selects to develop the system. NASA is planning for the descent stage to serve as a crew and cargo lander; the ascent stage to bring crew back to Gateway from the lunar surface; and the transfer stage to transfer the ascent and descent stages from Gateway orbit to a lower lunar orbit for the landing. Space Suits. NASA plans to update the design of its space suits, which supply life support, including oxygen and water, among other things, to astronauts. The updates include additional protection from extreme temperatures and hazards in the lunar environment, such as dust; increased mobility; and extended service life for lunar surface operations. Commercial Lunar Payload Services. Under Commercial Lunar Payload Services, commercial partners provide end-to-end commercial payload delivery services to the surface of the Moon. The services include integrating payloads onto a robotic lander, launching the lander, and operating the lander and payloads. The payloads include science instruments and technology demonstrations that will characterize the lunar environment and inform the development of future landers and other exploration systems needed for humans to return to the lunar surface. Volatiles Investigating Polar Exploration Rover. NASA plans to develop a robotic lunar rover for long duration operations to investigate volatiles—which include water, carbon dioxide, and other chemicals that boil at low temperatures—at the lunar South Pole that could be used to support sustained human presence on the Lunar surface. NASA plans to utilize landers from the Commercial Lunar Payload Services to deliver the rover to the lunar surface. Orion and SLS. Orion is the crew capsule to transport humans from the Earth to Gateway and beyond. SLS is the vehicle NASA will use to launch the Orion crew capsule and cargo beyond low-Earth orbit, including to Gateway. Figure 4 shows a notional configuration of Gateway, the first integrated Human Landing System, and the Orion crew capsule. In this configuration, the Human Landing System ascent stage, Gateway Logistics and Power and Propulsion Element (PPE), and Orion crew capsule are designed to dock with the Gateway Habitation and Logistics Outpost. The Advanced Exploration Systems organization is responsible for overseeing the Gateway and Human Landing System programs and reports to NASA’s Associate Administrator for Human Exploration and Operations Mission Directorate (HEOMD). Another organization within HEOMD—Exploration Systems Development—is responsible for the development of the Orion crew capsule. The Office of the Chief Engineer and Office of the Chief Financial Officer are responsible for NASA policies and guidance related to the development of these systems. After the March 2019 announcement to accelerate the human lunar landing to 2024, NASA acknowledged that it could not complete all of its original plans under the new time frame. The original plans for a human lunar landing in 2028 included an expanded Gateway and uncrewed demonstrations of components of the Human Landing System. In response to the new direction, NASA decided to execute its lunar plans in two phases. Phase 1 focuses on systems NASA identified to support the Artemis III mission in 2024. Phase 2 builds upon Phase 1 efforts and focuses on establishing a long-term presence on the lunar surface through future Artemis missions, and is not currently the focus of NASA’s efforts (see figure 5). NASA made several changes to its prior lunar plans to increase the speed of developing the systems needed to meet the aggressive timeline for the Artemis III mission. For example: NASA reduced the scope of the Gateway program for Phase 1 by deferring or eliminating components, and changing its configuration. NASA removed a component that an international partner had planned to contribute and deferred work on a habitation component and other potential international contributions to Phase 2. Acknowledging that some elements of Gateway had to be deferred or eliminated for the first phase is a positive step NASA has taken to try to achieve an aggressive schedule. In some cases, NASA changed the acquisition strategy to increase the speed of development work. For example, NASA had planned to build the Habitation and Logistics Outpost in-house, but due to the 2024 acceleration announcement, now plans to award a contract for its development. In addition, NASA changed its plans to acquire the Human Landing System as an integrated system instead of by stage to meet the accelerated timeline. NASA developed a broad agency announcement for the Human Landing System with the goal of awarding contracts by the end of January 2020. NASA released a draft broad agency announcement for the integrated system in July 2019, about 4 months after receiving direction to land humans on the Moon by 2024. Human Landing System program officials raised concerns about the program’s ability to meet the 2024 timeline, but said they are trying to mitigate this risk by incorporating input from prior studies and feedback from industry into the program’s draft broad agency announcement. See table 1 for the status of NASA’s lunar programs, including changes NASA made to prior plans and timelines to meet the 2024 lunar landing goal. NASA is still considering the extent to which competition will be part of its acquisition plans to meet the accelerated 2024 landing. Competition may be a critical tool for achieving the best possible return on investment for taxpayers, and can help improve contractor performance. In addition, in 2014, we found there were competition opportunities for future SLS development work that may promote long-term affordability. We recommended that NASA assess the extent to which the agency could competitively procure development and production of future elements of the SLS to promote affordability. NASA agreed with this recommendation. However, NASA’s progress implementing it has been limited. For example, NASA awarded a sole-source contract for the upper stage engine, which further limits an opportunity for competition for the program. For Gateway Logistics Services and the Human Landing System, NASA officials stated that they are considering awarding multiple initial contracts. If NASA does award multiple contracts, NASA officials stated they would then be able to have the contractors compete for further development of the components and possibly for specific missions. Conversely, NASA does not plan to competitively award a contract for the Gateway Habitation and Logistics Outpost, citing the aggressive Artemis III schedule as a factor for this decision. NASA has identified the components of its lunar architecture—such as Gateway and lunar landers—but it has not fully defined a system architecture or established requirements for its lunar mission. A system architecture, among other things, defines the dependencies and interfaces between the components. The NASA systems engineering handbook states that defining the system architecture early enables NASA to develop components separately from each other while ensuring that they work together effectively to achieve top-level requirements. For example, a system architecture for the Artemis III mission would describe the relationships and interfaces between Gateway and the Human Landing System, ensuring that after the two programs are completed, they will work together properly to execute the mission. Figure 6 is an illustration of how specific program and project requirements flow down from NASA’s strategic goals and objectives. NASA officials told us they started with defining individual program and project requirements, and then plan to define the system architecture in an architecture definition document and the lunar system requirements in six separate HEOMD documents. These documents are in various stages of completion. HEOMD officials said they expect to finalize the overall architecture definition document at the end of 2019. They plan for this document to include a description of the integrated architecture, including the architecture’s components and high-level interfaces required for initial human lunar surface missions. In addition, HEOMD has six other documents that establish requirements for human space exploration missions, among other things. Three of these documents are currently outdated because they do not address lunar landings. HEOMD officials stated that they do not expect the documents to be updated before the end of 2019. NASA officials told us that they did not start with these higher-level architecture and all of the requirements documents because they thought it was important to first establish requirements for individual programs and review what contractors proposed for Gateway and the Human Landing System, and incorporate industry input on what requirements are feasible. The Human Landing System draft request for proposals contained a notional architecture that has three stages, but the agency is open to selecting contractors that do not follow this notional architecture. In our work to develop a framework for assessing and improving enterprise architecture management, we found that a mature architecture should ensure that components of the architecture align their plans with enterprise-level plans. Establishing such alignment is essential to achieving goals and supporting solutions that are appropriately integrated and compatible. NASA’s approach of defining the lunar architecture and associated requirements concurrently with programs setting their own requirements presents the risk of mismatches of requirements across and within programs. Such mismatches increase the risk of technical problems, schedule delays, and cost overruns. For example, the Gateway program is tracking the potential misalignment of requirements as a risk because the PPE project finalized its requirements before the Gateway program finalized corresponding requirements at the program level. PPE officials stated they finalized their requirements first because they had started work under a prior project and, as a result, moved quickly through early development activities. The Gateway program and PPE project officials said that when they reviewed the PPE requirements with Gateway’s requirements, they found two possible gaps. For example, NASA officials explained that there is a difference in the amount of power the PPE contractor is required to deliver for the PPE and Gateway’s requirements for power. The program is working with the PPE project office and contractor to study the potential gaps and determine how to resolve them if needed. The Gateway program officials said they would continue to assess gaps and risks related to requirements alignment for all projects. HEOMD officials agreed that there is a risk of discovering integration challenges across programs. NASA officials have taken action on one strategy to minimize this risk, and are considering two other potential mitigation strategies. To help ensure that the components of the lunar architecture can work together, NASA included international interoperability standards in its requests for proposals for the lunar programs. For example, there are standards for how the components will dock with each other. NASA officials said that including these standards would help mitigate integration challenges. The two other potential mitigation strategies are the following: Establish a Lunar Exploration Control Board. NASA is in the process of establishing a board that would act as an architecture configuration management body. Configuration management is a process used to control changes to top-level requirements. In our prior work on developing and maintaining systems or networks, we found that effective configuration management is a key means for ensuring that additions, deletions, or other changes to a system do not compromise the system’s ability to perform as intended. The board could serve as a body to make decisions that affect multiple lunar programs and ensure that changes to components of the lunar architecture do not affect NASA’s ability to accomplish a successful lunar landing. Hold cross-program synchronization or integration reviews. To help ensure that requirements are aligned across programs, a senior HEOMD official said NASA plans to hold cross-program synchronization or integration reviews. However, the official said NASA has not defined at what level those reviews would occur, when those reviews would occur, or what specific contractor data would be reviewed. Ensuring the Lunar Exploration Control Board is involved in these reviews will help the board in its role as a configuration management body and inform decisions that affect multiple lunar programs. NASA’s system engineering handbook states that activities to integrate systems throughout a system life cycle help to make sure that integrated system functions properly. These activities include conducting analysis to define and understand integration between systems. NASA is moving quickly to develop individual programs and projects that must work together as part of the broader lunar architecture. Delaying decisions about how and when NASA plans to hold synchronization or integration reviews risks discovery of changes late in the acquisition process. As stated in NASA’s system engineering guidance, the later in the development process changes occur, the more expensive they become. NASA has taken positive steps to increase the visibility into the cost and schedule performance of the Gateway program’s projects, but decisions on analyses to support program-level cost and schedule are still pending. In addition, the NASA Administrator has stated that Artemis III may cost between $20 billion to $30 billion, but NASA officials stated that the agency does not plan to establish an official cost estimate. As of October 2019, NASA was still defining its approach for developing cost and schedule estimates for all programs and projects in the lunar architecture, but we found NASA has made some decisions related to the structure of the Gateway program that will provide visibility into cost and schedule performance. In particular, NASA’s decision to structure the Gateway program as a tightly coupled program means that the projects that compose the Gateway—Power and Propulsion, Habitation and Logistics Outpost, and Logistics—are to develop individual project cost and schedule baselines by which performance will be measured. NASA officials stated that they expect this will provide accountability for each project to adhere to its cost and schedule baseline. This structure is a positive step for NASA to improve management of large, complex programs, and could have been beneficial to previous human spaceflight programs. For example, cost and schedule baselines for key hardware elements of the Space Launch System program—such as the core stage—might have provided earlier warning signs of development challenges affecting cost and schedule performance. NASA policy requires tightly coupled programs with a life cycle cost estimate greater than $250 million to conduct a program-level joint cost and schedule confidence level (JCL) to inform an agency baseline commitment. A JCL is a calculation that NASA uses to estimate the probability of success of a program or project meeting its cost and schedule baselines. However, NASA decided to remove the requirement for the Gateway program to establish an agency baseline commitment, and instead, require the program to document its cost and schedule estimates for phase 1 in a program commitment agreement. NASA officials explained that the agency viewed requiring the Gateway program to conduct a JCL to inform cost and schedule baselines as duplicative of analysis the projects are required to conduct to inform their project level baselines. In October 2019, Gateway program officials stated they have reconsidered this direction and now plan to conduct a program-level JCL. However, given that NASA officials previously determined they would not require the Gateway program to establish a baseline that is informed by a program-level JCL, the decision to conduct a JCL is subject to change again. NASA’s commitment to the program’s October 2019 decision to conduct a program-level JCL would enhance oversight and management for Gateway. NASA’s cost estimating handbook states that a JCL can serve as a valuable management tool that helps enforce some best practices of program planning and control, and potentially enhance vital communication to various stakeholders. Having a program-level JCL could help the program identify additional cost and schedule risks associated with integration of, or dependencies across, Gateway components that individual projects may not identify. As a tightly coupled program, Gateway has project schedules that are dependent on one another. For example, PPE provides power to subsequent Gateway components, such as the Habitation and Logistics Outpost, and must be launched and in lunar orbit for the outpost to dock with PPE. A program- level JCL would be able to quantify risk of delay across all dependent activities, regardless of which individual project experiences the delay. It would also provide NASA decision-makers and external stakeholders, such as Congress, with the probability of the program meeting both its cost and schedule commitments to support the Artemis III mission. The Gateway program is also the program in the lunar architecture that is the furthest along in developing a schedule aside from the SLS, Orion, and Exploration Ground Systems programs. The program expects to have an integrated master schedule in late 2019, but in the meantime has developed a high-level notional schedule. We identified two challenges with the Gateway program’s schedule that stem from decisions to meet the program’s rapid pace of development. Program and project technical reviews do not align. The NASA program management handbook states that lower-level technical reviews, such as project preliminary design reviews, are typically conducted prior to the program-level reviews. In addition, GAO’s Schedule Assessment Guide states that lower-level project schedules should be consistent with upper-level program review milestones. This creates consistency between program and project schedules, which enables different teams to work to the same schedule expectations and ensures the proper sequencing of activities. The Gateway program obtained approval from the NASA Associate Administrator to tailor its review schedule. This includes the replacement of traditional reviews with program sync reviews informed by project-level technical reviews. The program has some of the project-level technical reviews for its projects—PPE, Habitation and Logistics Outpost, and Logistics—occurring after equivalent Gateway program-level reviews. The Gateway program-level reviews are referred to as sync reviews, during which information is assessed across all projects. For example, the Logistics project plans to hold its preliminary design review after the Gateway program preliminary design-informed sync review. Figure 7 shows the preliminary Gateway program schedule and identifies reviews that differ from the notional tightly coupled program schedule found in NASA guidance. Without the results of project-level reviews, program officials may have limited information to assess progress at program-level reviews. This opens up the possibility of costly re-designs at later stages of the program life cycle. Gateway program officials said as the program progresses, they plan to assess the risk of holding a project-level review after a program-level review against the risk of delaying a program-level review to hold all the project-level reviews first. Officials added that they are still reviewing their approach for the timing of the reviews. We will continue to follow up through future work on the Gateway program’s risk assessments related to the timing of the technical reviews. Scheduling of key program milestone reviews after 2021 deferred. The Gateway Program does not yet have key milestone reviews—known as key decision points (KDP)—scheduled after 2021 (see figure 7). Currently, the final key decision point scheduled for the program is KDP I in 2021, which evaluates the completeness of the preliminary design, including for projects, and determines the program’s readiness to begin the detailed design phase. However, NASA policy requires the program to conduct two other key decision points that the Gateway program has not yet scheduled. Program officials told us that they want to determine the need for subsequent decision points after the systems have matured further in their development. During the period between 2021 and 2024, the Gateway program plans to launch and assemble its three components—PPE, Habitation and Logistics Outpost, and the first logistics vehicle—and integrate with the Human Landing System and Orion. It may be appropriate not to schedule a KDP III—a decision point that evaluates the readiness of the program, including its projects, for launch and early operations—for the Gateway program since the projects will launch separately and conduct operations on different timelines. However, not having a KDP II—a decision point that evaluates the program’s readiness for assembly, integration, and testing, prior to a system integration review—will limit information available to senior leaders for decision-making. Without scheduling a KDP II, NASA risks not having a formal mechanism to ensure that NASA has identified and sufficiently addressed any integration issues across the three projects. The NASA Administrator made a public statement that the Artemis III mission may cost between $20 billion and $30 billion, but NASA officials told us they do not plan to develop an official cost estimate for the Artemis III mission. A senior HEOMD official said that the agency developed a cost estimate that included costs for the lunar mission to 2028 to support budget submissions. However, the official said this life-cycle cost estimate included costs outside of the Artemis III mission, such as for missions later than Artemis III, and may not include integration and overall management costs. NASA officials told us that it is complicated to separate out costs for each mission and, as a result, do not plan to develop an Artemis III cost estimate. In addition, senior NASA officials stated that many of the programs needed to execute the mission are currently in the early stages of acquisition, and therefore NASA has limited cost information. Meanwhile, NASA requested an additional $1.6 billion in fiscal year 2020 above its initial budget request to support the Artemis III mission. Cost estimates provide management with critical cost-risk information to improve the control of resources in the present and future. GAO’s Cost Estimating and Assessment Guide states that a life-cycle cost estimate enhances decision-making, especially in early planning of an acquisition. Individual program cost estimates would not capture the integration costs across programs. Without an Artemis III cost estimate, NASA will not be able to effectively monitor total mission costs and Congress would have limited insight into mission or program affordability when making decisions about each year’s budget request. Given the breadth of activity and funding required for NASA to achieve a human lunar landing, a number of stakeholders have advocated for NASA to carry out this mission in a different way than NASA is pursuing. For example, one advocate proposed alternative lunar architectures that do not include the use of Orion, SLS, or Gateway, and instead rely on the use of commercial vehicles, and a former NASA associate administrator has promoted increased use of NASA’s current programs, including SLS. Agencies can use the process of assessing alternatives to justify their decisions and demonstrate careful planning. While NASA policy does not require programs to analyze alternatives before starting work, GAO best practices state that analyzing alternatives provides a framework to help ensure that entities consistently and reliably select the alternative that best meets the mission need based on selection criteria, such as safety, cost, or schedule. Similarly, the Department of Defense, an agency that also invests billions of dollars in acquisitions, considers an analysis of alternatives a key input to defining a system’s capabilities and assessing affordability. We previously found that analyzing alternatives is a key element in establishing a sound business case for a new architecture or program. Having a strong business case, including a formal assessment of alternatives, would help NASA effectively communicate its decisions to various stakeholders and facilitate a better understanding of its current lunar plans. NASA officials told us that they arrived at the current architecture and the designs of its lunar programs by conducting numerous studies and analyses over multiple decades. These studies looked at aspects of the various lunar missions NASA has planned over time, including the prior Constellation program and Journey to Mars effort. A HEOMD official responsible for mission directorate analyses said that the studies ranged from quick turn-around analyses to long-term, thorough studies. NASA officials identified 12 studies completed since the conclusion of the Constellation program in 2010 that informed their decision to build Gateway and other aspects of the lunar architecture. The studies varied in focus, ranging from a study on the overall framework for a mission to Mars to a study exclusively on the human lunar landers. We reviewed these 12 studies to determine the extent to which NASA analyzed alternatives to inform its current lunar architecture. We found that some of the studies contained detailed analyses, but had a narrow scope. For example: NASA conducted a study on the design of its human lunar landers that identified several alternative designs for the lander configuration, including two- and three-stage landers. The study provided an analysis on each alternative in order to compare those alternatives, given the physical constraints of SLS and commercial launch vehicles. HEOMD reviewed prior studies on a cislunar habitation facility conducted by internal and external partners that informed an Assessment of Alternatives for the Gateway program. At the time the mission directorate conducted this assessment, the concept was focused on the Journey to Mars effort, and mentioned lunar landers only as a potential secondary mission. The assessment analyzed various alternative configurations that Gateway might use and selected one of them based feasibility and schedule. NASA conducted studies on the best orbit in which to place Gateway. While these studies were robust, they did not more broadly analyze whether Gateway was the best solution to meet the mission need based on selection criteria. The following are examples of topics that NASA could have addressed if they had analyzed alternatives with a broader scope: Assessing commercial alternatives to SLS and Orion for a human landing on the Moon. Each of the studies assumes the use of SLS and the Orion capsule in order to conduct the required mission. A HEOMD official told us that they did not assess commercial alternatives to SLS and Orion because commercial alternatives are not available. If commercial technology to replace SLS and Orion becomes available, the official said NASA can on- ramp those options if SLS and Orion are not delivered on time. Assessing how a more capable SLS could have affected the lunar architecture. NASA did not assess whether refocusing investment on more capable versions of its current programs, including SLS, might affect risk, cost, and schedule for a lunar landing mission. For example, developing a more capable SLS earlier may have enabled NASA to propose a different lunar lander design or to launch components of the architecture in fewer launches. In the study on the design of its human lunar landers, NASA assumed that a more capable version of SLS would not be available until at least 2028, and therefore did not assess using it as a part of its architecture. Further, at the time of the study in 2018, NASA was unsure it would have enough SLS core stages available to utilize them for any components of the architecture other than to transport crew. Identifying alternatives to a lunar landing without using Gateway. All of the studies assumed the use of Gateway or similar capability as opposed to a capability that would take astronauts directly to the lunar surface. A HEOMD official told us that NASA did not assess architectures without Gateway because they planned to utilize SLS and Orion, and NASA did not design the Orion capsule for a direct-to- moon landing. However, a HEOMD official provided us with a quick turn-around analysis that NASA conducted in 2019, after NASA initiated the Gateway program, in response to questions about alternative lunar architectures. This analysis compared a lunar landing from Gateway to a landing without Gateway and found that NASA would have to upgrade the Orion Capsule to have a direct-to-moon landing, which would increase the cost and development time of the program. As a result, the analysis concluded that a lunar landing using Gateway was the superior option. Additionally, officials said Gateway helped develop an architecture that was sustainable and could contribute to a mission to Mars. In addition, only one of the studies focused on a lunar landing mission because NASA completed most of the studies prior to the December 2017 Space Policy Directive-1. NASA officials stated that this is because they were told not to analyze a lunar landing during the previous administration. As a result, none of these studies represents a comprehensive assessment for NASA’s current plans to return to the Moon and are, in total, missing information on potential alternatives. While conducting a formal analysis of alternatives for the lunar architecture is no longer viable given NASA’s schedule, by not having such an analysis NASA is ill-equipped to consider other alternatives as off-ramps if the current lunar architecture plans run into delays. Further, none of the studies contained a life-cycle cost estimate and without this, NASA does not know the costs of its architecture or of potential alternatives. In October 2019, NASA officials stated they had begun to develop an Architecture Campaign Document, which would provide a summary of the studies and analyses that have informed NASA’s lunar architecture. However, this document was still in draft form at the time of our review and officials did not commit to a completion date. Until NASA completes this summary, it will not have a cohesive document outlining the rationale for how it selected its current lunar architecture and lunar programs. Lastly, the practice of formally assessing alternatives is a beneficial practice for future architectures and programs. However, NASA policy and guidance describe an analysis of alternatives as a tool, but does not require officials to analyze alternatives prior to starting work to develop a system architecture or initiating directed missions. NASA may analyze alternatives for an architecture, program, project, or specific design or capability, but conducting a formal analysis of alternatives is optional. Without a requirement to conduct an analysis of alternatives prior to NASA authorizing the initial planning of a program, NASA could miss opportunities to move forward with a more viable architecture or program to meet mission needs in the future. For a new architecture or large programs that require a lot of investment, such as future exploration efforts including Mars, conducting an analysis of alternatives would better position NASA to build a sound business case, justify and document its decisions, and advocate for its plans. Effectively executing the Artemis III mission will require extensive coordination within NASA and its commercial partners, and for each individual program to meet aggressive development time frames. As NASA continues to develop its architecture and program schedules, it will be important that the agency use program management tools and practices to set these new programs up for success. Ensuring that NASA identifies points in time to conduct synchronization reviews, that the role of the proposed Lunar Exploration Control Board in these reviews is understood, and that programs are prepared with the necessary information to make the reviews successful will help NASA mitigate the risk of discovering integration challenges across the lunar programs. The reviews could be a helpful checkpoint on the agency’s progress towards meeting the aggressive timeline of the Artemis III mission. Further, ensuring that the Gateway program has an integrated schedule early on will help the program plan work to meet critical deadlines and avoid unnecessary rework due to the misalignment of requirements or design changes. To date, NASA has provided decision makers with limited cost information to inform decisions on the overall lunar investment. Without an overall cost estimate for the Artemis III mission, NASA is asking Congress to appropriate additional funding to meet a 2024 lunar deadline without having information available on how much it will cost in total to support such plans. Further, NASA senior leadership made a decision that resulted in limiting information regarding the probability of the Gateway program meeting cost and schedule estimates to support the 2024 lunar landing. Requiring the program to conduct a joint cost and schedule confidence level analysis would help to determine whether NASA can meet its lunar goal and whether it has resources to be able to do so. NASA will continue to have many stakeholders interested in its human space exploration plans, which requires NASA to establish a lunar architecture and programs that the agency can defend over time and to demonstrate that it has a solid business case. However, NASA is ill- positioned to explain how it arrived at its current lunar architecture without a comprehensive assessment that documents how NASA decided that its current plans are the best way to meet the agency’s long-term lunar exploration goals. NASA has taken a positive step by planning to create a summary of the studies and analyses that informed its lunar architecture, but has not committed to a date to finalize it. Finally, ensuring that NASA conducts a formal analysis of alternatives for future strategic missions and architectures, including as it further develops its plans for a human mission to Mars, will better position the agency to consistently and reliably select alternatives that best meet the mission need. We are making the following six recommendations to NASA. The NASA Administrator should ensure that the NASA Associate Administrator for Human Exploration and Operations directs the Advanced Exploration Systems division to define and determine a schedule for synchronization reviews, including the role of the proposed Lunar Exploration Control Board, to help ensure that requirements between mission and program levels are reconciled. (Recommendation 1) The NASA Administrator should ensure that the NASA Associate Administrator for Human Exploration and Operations directs the Gateway program to conduct a joint cost and schedule confidence level at the program level for the Artemis III mission. (Recommendation 2) The NASA Administrator should ensure that the NASA Associate Administrator for Human Exploration and Operations directs the Gateway program to update its overall schedule for 2024 to add a KDP II to occur before system integration. (Recommendation 3) The NASA Administrator should ensure that the NASA Associate Administrator for Human Exploration and Operations creates a life-cycle cost estimate for the Artemis III mission. (Recommendation 4) The NASA Administrator should ensure that the NASA Associate Administrator for Human Exploration and Operations directs the Advanced Exploration Systems division to commit to a completion date and finalize a cohesive document outlining the rationale for selecting its current lunar architecture and lunar programs. (Recommendation 5) The NASA Administrator should ensure that the Office of the Chief Engineer determines under what conditions it is appropriate to complete an analysis of alternatives, particularly when there are multiple pathways—including architectures or programs—that NASA could pursue in the future, and document the justification for not completing an analysis. (Recommendation 6) We provided a draft of this report to NASA for comment. In written comments, NASA agreed with our six recommendations. NASA provided estimated dates of completion for all of the recommendations ranging from April 2020 to September 2021. The comments are reprinted in appendix I. NASA also provided technical comments, which have been addressed in the report, as appropriate. We are sending copies of this report to the NASA Administrator and interested congressional committees. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-4841 or chaplainc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. Cristina T. Chaplain, (202) 512-4841 or chaplainc@gao.gov. In addition to the contact named above, Molly Traci, Assistant Director; Katie Bassion; Lorraine Ettaro; Laura Greifner; Anna Irvine, Erin Kennedy; Jason Lee, Assistant Director; Jennifer Leotta, Assistant Director; Ryan Lester; Dennis Mayo; Sylvia Schatz; Roxanna Sun; Jay Tallon, Assistant Director; Alyssa Weir; and Tonya Woodbury made significant contributions to this report.", "summary": "In March 2019, the White House directed NASA to accelerate its plans to return humans to the moon by 4 years, to 2024. To accomplish a lunar landing, NASA is developing programs including a small platform in lunar orbit, known as Gateway, and a lunar lander. NASA plans to use the Space Launch System and Orion crew capsule—two programs with a history of cost growth and schedule delays—to launch and transport crew to Gateway. The House Committee on Appropriations included a provision in its 2018 report for GAO to review NASA's proposed lunar-focused programs, including the Gateway program. GAO's report assesses (1) how NASA updated its lunar plans to support the accelerated 2024 landing timeline; (2) the extent to which NASA has made initial decisions about requirements, cost, and schedule for its lunar mission and programs; and (3) the extent to which NASA analyzed alternatives for its lunar plans, including the Gateway program. GAO analyzed NASA lunar mission and program documents, assessed NASA studies that informed NASA's lunar plans, and interviewed NASA officials. To support accelerated plans to land astronauts on the moon by 2024—four years earlier than planned—the National Aeronautics and Space Administration (NASA) quickly refocused its acquisition plans. In particular, NASA separated its lunar plans into two phases, with the first phase focused on the systems NASA identified to support the new timeline (see figure). One system, Gateway, includes three components—power and propulsion, habitation, and logistics—to form a small platform in lunar orbit. NASA has begun making decisions related to requirements, cost, and schedule for programs, but is behind in taking these steps for the whole lunar mission: NASA risks the discovery of integration challenges and needed changes late in the development process because it established some requirements for individual lunar programs before finalizing requirements for the overall lunar mission. NASA plans to take steps to mitigate this risk, such as by holding reviews to ensure that requirements align across programs, but has not yet defined these reviews or determined when they would occur. NASA has made some decisions that will increase visibility into the costs and schedules for individual lunar programs, but does not plan to develop a cost estimate for the first mission. Cost estimates provide management with critical cost-risk information to improve control of resources. Without a cost estimate for this mission, Congress will not have insight into affordability and NASA will not have insight into monitoring total mission costs. NASA conducted studies to inform its lunar plans, but did not fully assess a range of alternatives to these plans. GAO best practices state that analyzing alternatives provides a framework to help ensure that entities consistently and reliably select the alternative that best meets the mission need and justify agency decisions. Given NASA's schedule, conducting this analysis is no longer viable. Instead, NASA intends to create a summary of the studies that informed its lunar plans. However, it has not committed to a completion date. Without a documented rationale, NASA is ill-positioned to effectively communicate its decisions to stakeholders and facilitate a better understanding of its plans. GAO is making a total of 6 recommendations to NASA, including to define and schedule reviews that align requirements across lunar programs; create a cost estimate for the first lunar mission; and commit to a completion date and finalize a cohesive document outlining the rationale for selecting its current lunar plans. NASA concurred with the recommendations made in this report.", "document_type": "gao"}
{"report": "We reported in August 2018 that the total number of NIV applications that consular officers adjudicated (NIV adjudications) annually peaked at about 13.4 million in fiscal year 2016, which was an increase of approximately 30 percent since fiscal year 2012. In fiscal year 2017 (the most recent data available at the time of our report), NIV adjudications decreased by about 880,000 adjudications, or about 7 percent. Figure 2 shows the number of applications adjudicated each year from fiscal years 2012 through 2017. As shown in figure 2, the percentage of NIVs refused—known as the refusal rate—increased from fiscal years 2012 through 2016, and was about the same in fiscal year 2017 as the previous year. The NIV refusal rate rose from about 14 percent in fiscal year 2012 to about 22 percent in fiscal year 2016, and remained about the same in fiscal year 2017; averaging about 18 percent over the time period. The total number of NIVs issued peaked in fiscal year 2015 at about 10.89 million, before falling in fiscal years 2016 and 2017 to 10.38 million and 9.68 million, respectively. According to State data, while the majority of NIV refusals from fiscal years 2012 through 2017 were a result of consular officers finding the applicants ineligible, a relatively small number of refusals were due to terrorism and other security-related concerns. State data indicate that more than 90 percent of NIVs refused each year from fiscal years 2012 through 2017 were based on the consular officers’ determination that the applicants were ineligible nonimmigrants—in other words, the consular officers believed that the applicant was an intending immigrant seeking to stay permanently in the United States, which would generally violate NIV conditions, or that the applicant otherwise failed to demonstrate eligibility for the particular visa he or she was seeking. For example, an applicant applying for a student visa could be refused as an ineligible nonimmigrant for failure to demonstrate possession of sufficient funds to cover his or her educational expenses, as required. As we reported in August 2018, our analysis of State data indicates that relatively few applicants— approximately 0.05 percent—were refused for terrorism and other security-related reasons from fiscal years 2012 through 2017. As shown in figure 3, in fiscal year 2017, State data indicate that 1,256 refusals (or 0.05 percent) were based on terrorism and other security-related concerns, of which 357 refusals were specifically for terrorism-related reasons. The President issued Executive Order 13769, Protecting the Nation from Foreign Terrorist Entry Into the United States (EO-1), in January 2017. In March 2017, the President revoked and replaced EO-1 with the issuance of Executive Order 13780 (EO-2), which had the same title as EO-1. Among other things, EO-2 suspended entry of certain foreign nationals for a 90-day period, subject to exceptions and waivers. In September 2017, as a result of the reviews undertaken pursuant to EO-2, the President issued Presidential Proclamation 9645, Enhancing Vetting Capabilities and Processes for Detecting Attempted Entry into the United States by Terrorists or Other Public-Safety Threats (Proclamation), which imposes certain conditional restrictions and limitations on the entry of nationals of eight countries—Chad, Iran, Libya, North Korea, Somalia, Syria, Venezuela and Yemen—into the United States for an indefinite period. These restrictions, identified in table 1, are to remain in effect until the Secretaries of Homeland Security and State determine that a country provides sufficient information for the United States to assess adequately whether its nationals pose a security or safety threat. Challenges to both EOs and the Proclamation affected their implementation and, while EO-2’s entry restrictions have expired, the indefinite visa entry restrictions outlined in the Proclamation continued to be fully implemented as of our August 2018 report. We reported in August 2018 that our analysis of State data indicates that out of the nearly 2.8 million NIV applications refused in fiscal year 2017, 1,338 were refused due to visa entry restrictions implemented in accordance with the executive actions. To implement the entry restrictions, in March 2017, State directed its consular officers to continue to accept all NIV applications and determine whether the applicant was otherwise eligible for a visa without regard to the applicable EO or Proclamation. If the applicant was ineligible for the visa on grounds unrelated to the executive action, such as having prior immigration violations, the applicant was to be refused on those grounds. If the applicant was otherwise eligible for the visa, but fell within the scope of the nationality-specific visa restrictions implemented pursuant to the applicable EO or Proclamation and was not eligible for a waiver or exception, the consular officer was to refuse the visa and enter a refusal code into State’s NIV database indicating that the applicant was refused solely due to the executive actions. More than 90 percent of the NIV applications refused in fiscal year 2017 pursuant to an executive action were for tourist and business visitor visas, and more than 5 percent were for students and exchange visitors. As we reported in January 2017, CBP electronically vets all travelers before they board U.S.-bound flights, and continues to do so until they land at a U.S. port of entry. Through these vetting efforts, CBP seeks to identify high-risk travelers from the millions of individuals who travel to the United States each year. As we reported in January 2017, CBP’s vetting and targeting efforts are primarily conducted by its NTC and entail (1) traveler data matching and analysis, (2) rules-based targeting, and (3) recurrent vetting. Specifically: CBP’s primary method of identifying high-risk individuals is through the comparison of travelers’ information (such as name, date of birth, and gender) against records extracted from U.S. government databases, including the Terrorist Screening Database (TSDB)—the U.S. government’s consolidated terrorist watch list. Traveler data matching focuses on identifying known high-risk individuals—that is, individuals who may be inadmissible to the United States under U.S. immigration law or who may otherwise pose a threat to homeland or national security. CBP’s primary tool for vetting and targeting travelers is the Automated Targeting System (ATS), which is a computer-based enforcement and support system that compares traveler information against intelligence and law enforcement data to identify high-risk travelers. Traveler data matching occurs throughout the travel process and, upon a positive or possible match, CBP officers can select these individuals for further vetting, interviewing, and inspection. CBP’s rules-based targeting efforts seek to identify unknown high-risk travelers—that is, travelers for whom U.S. government entities do not have available derogatory information directly linking them to terrorist activities or any other actions that would make them potentially inadmissible to the United States but who may present a threat and thus warrant additional scrutiny. CBP identifies unknown high-risk individuals by comparing their information against a set of targeting rules based on intelligence, law enforcement, and other information. NTC officials stated that these rules have identified potential high-risk travelers, including potential foreign fighters. Rules-based targeting evaluates travelers during the travel process and, in some cases, in advance of the travel process. If a traveler is a rule “hit,” this individual can be selected for further vetting, interviewing, and inspection. CBP supports its traveler data matching and rules-based targeting efforts through the use of recurrent vetting. NTC’s vetting, targeting, and traveler data matching activities in ATS run 24 hours a day and 7 days a week and automatically scan updated traveler information, when available. This process is to ensure that new information that affects a traveler’s admissibility is identified in near real time. Recurrent vetting occurs throughout the travel process and continues until a traveler arrives at a domestic port of entry. For example, after checking into a foreign airport, a traveler may have his or her visa revoked for a security or immigration-related violation. Due to recurrent vetting, CBP would be alerted to this through ATS and could take action, as appropriate. As we reported in January 2017, throughout the travel process, CBP’s predeparture programs use the results of NTC’s efforts to identify and interdict high-risk individuals destined for the United States while they are still overseas; however, we found that CBP had not evaluated the effectiveness of its predeparture programs as a whole, including implementing a system of performance measures and baselines to assess whether the programs are achieving their stated goals. CBP operates three air predeparture programs that are responsible for all U.S.-bound air travelers—(1) Preclearance; (2) the Immigration Advisory Program (IAP) and Joint Security Program (JSP); and (3) the regional carrier liaison groups (RCLG). As we reported in January 2017, CBP data indicated that these programs identified and ultimately interdicted approximately 22,000 high-risk air travelers in fiscal year 2015, the most recent data available at the time of our review. Information on individuals who the NTC identifies through traveler data matching or rules-based targeting, including recurrent vetting, is compiled automatically through ATS into a daily high-priority list (or, traveler referral list). CBP officers at the NTC review the traveler referral list for accuracy and to remove, if possible, any automatically generated matches determined to not be potential high-risk individuals. After this review, CBP officers at the NTC use ATS to send the traveler referral list to officers at each Preclearance, IAP, JSP, and RCLG location, as shown in figure 4. Preclearance. Preclearance locations operate at foreign airports and serve as U.S. ports of entry. Preclearance operations began in 1952 in Toronto to facilitate trade and travel between the United States and Canada. As of March 2018, CBP operated 15 air Preclearance locations in six countries. Through the Preclearance program, uniformed CBP officers at a foreign airport exercise U.S. legal authorities to inspect travelers and luggage and make admissibility determinations prior to an individual boarding a plane to the United States. According to CBP officials, an inspection at a Preclearance location is the same inspection as an individual would undergo at a domestic port of entry, and officers conducting Preclearance inspections exercise the same authority as officers at domestic ports of entry to approve or deny admission into the United States. As a result, travelers arriving at domestic air ports of entry from Preclearance locations do not have to be re-inspected upon entry. According to CBP data, in fiscal year 2015, CBP officers at Preclearance locations determined that 10,648 air travelers were inadmissible out of the approximately 16 million air travelers seeking admission to the United States through a Preclearance location. In addition to requiring that all travelers undergo a primary inspection, CBP officers in these locations also referred almost 290,000 individuals for secondary inspection. Immigration Advisory Program (IAP) and Joint Security Program (JSP). IAP and JSP operated at nine and two foreign airports, respectively, as of January 2017. According to CBP officials, under this program, unarmed, plainclothes CBP officers posted at foreign airports partner with air carriers and host country government officials to help prevent terrorists and other high-risk individuals from boarding U.S.- bound flights by vetting and interviewing them before travel. According to CBP program documentation, CBP established IAP in 2004 to prevent terrorists, high- risk travelers, and improperly documented travelers from boarding airlines destined to the United States. Building on the IAP concept, CBP established JSP in 2009 to partner with host country law enforcement officials to identify high-risk travelers. CBP officers at IAP and JSP locations have the ability to question travelers and review their travel documents. They are to act in an advisory manner to the air carriers and host governments and do not have authority to deny boarding to individuals on U.S.-bound flights or fully inspect travelers or their belongings. IAP and JSP officers are authorized by CBP to make recommendations to airlines as to whether to board or deny boarding (known as a no-board recommendation) to selected travelers based on their likely admissibility status upon arrival to the United States. The final decision to board travelers, however, lies with the carriers. According to CBP data, CBP officers at IAP and JSP locations made 3,925 no-board recommendations in fiscal year 2015 for the approximately 29 million air travelers bound for the United States from such locations. During this same time period, CBP data indicated 1,154 confirmed encounters with individuals in the TSDB, including 106 on the No Fly List. Regional Carrier Liaison Groups (RCLG). RCLGs are located and operate at three domestic airports—Miami International Airport, John F. Kennedy International Airport, and Honolulu International Airport. CBP established RCLGs in 2006 to assist air carriers with questions regarding U.S. admissibility requirements and travel document authenticity. According to CBP officials, RCLGs are responsible for coordinating with air carriers on all actionable referrals from NTC on U.S.-bound travelers departing from an airport without an IAP, JSP, or Preclearance presence. Each RCLG is assigned responsibility for travelers departing out of a specific geographic location. Similar to IAP and JSP, CBP officers in RCLGs also make no-board recommendations, as appropriate, to air carriers. CBP officers at RCLGs do not have authority to make admissibility determinations about U.S.-bound air travelers, and the final decision to board or not board a traveler lies with the carrier. We reported in January 2017 that CBP officers working at the three RCLGs made 7,664 no-board recommendations in fiscal year 2015 for the approximately 59 million travelers bound for the United States from locations within the RCLGs’ spheres of responsibility. During this time period, CBP data indicated that RCLGs also reported 1,634 confirmed encounters with individuals in the TSDB, including 119 on the No Fly List. In January 2017, we reported that CBP had not evaluated the effectiveness of its predeparture programs as a whole, including implementing a system of performance measures and baselines to assess whether the programs were achieving their stated goals. We reported that CBP had taken some initial steps to measure the performance of these programs. Specifically, CBP officials told us that they had collected a large quantity of data and statistics regarding the actions of their predeparture programs and had done so since program inception for all programs. However, due to changes in operational focus, technology updates, and the use of separate data systems at program locations, CBP had not collected consistent data across all of its predeparture programs. As a result, CBP did not have baseline data on which to measure program performance. Therefore, we recommended that CBP develop and implement a system of performance measures and baselines for each program to help ensure that these programs achieve their intended goals. In response, as of March 2018, CBP has developed three performance measures for its predeparture programs. On the basis of our review of CBP documentation, as of December 2018, CBP has collected the fiscal year 2018 data relevant to these measures, used those data to set preliminary targets for fiscal year 2019, and plans to analyze the fiscal year 2019 results and set targets for future fiscal years by October 31, 2019. We will review documentation of CBP’s analysis of the fiscal year 2019 results and future targets, when available, to determine if CBP’s actions address our recommendation. Chairwoman Rice, Chairman Rose, Ranking Members Higgins and Walker, and Members of the Subcommittees, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. For further information regarding this testimony, please contact Rebecca Gambler at (202) 512-8777 or gamblerr@gao.gov. In addition, contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals who made key contributions to this testimony are Kathryn H. Bernet, Assistant Director; Eric Hauswirth; Thomas Lombardi; Sasan J. “Jon” Najmi; Erin O’Brien; and Natalie Swabb. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "Previous attempted and successful terrorist attacks against the United States have raised questions about the security of the U.S. government's screening and vetting processes for NIVs. State manages the visa adjudication process. DHS seeks to identify and interdict travelers who are potential security threats to the United States, such as foreign fighters and potential terrorists, human traffickers, drug smugglers and otherwise inadmissible persons, at the earliest possible point in time. DHS also has certain responsibilities for strengthening the security of the visa process. In 2017, the President issued executive actions directing agencies to improve visa screening and vetting, and establishing nationality-based visa entry restrictions, which the Supreme Court upheld in June 2018. This statement addresses (1) data and information on NIV adjudications and (2) CBP programs aimed at preventing high-risk travelers from boarding U.S.-bound flights. This statement is based on prior products GAO issued in January 2017 and August 2018, along with selected updates conducted in December 2018 to obtain information from DHS on actions it has taken to address a prior GAO recommendation. In August 2018, GAO reported that the total number of nonimmigrant visa (NIV) applications that Department of State (State) consular officers adjudicated annually increased from fiscal years 2012 through 2016, but decreased in fiscal year 2017 (the most recent data available at the time of GAO's report). NIVs are issued to foreign nationals, such as tourists, business visitors, and students, seeking temporary admission into the United States. The number of adjudications peaked at about 13.4 million in fiscal year 2016, and decreased by about 880,000 adjudications in fiscal year 2017. State refused about 18 percent of adjudicated applications during this time period, of which more than 90 percent were because the applicant did not qualify for the visa sought and 0.05 percent were due to terrorism and security-related concerns. In 2017, two executive orders and a proclamation issued by the President required, among other actions, visa entry restrictions for nationals of certain listed countries of concern. GAO's analysis indicates that, out of the nearly 2.8 million NIV applications refused in fiscal year 2017, 1,338 applications were refused specifically due to visa entry restrictions implemented per the executive actions. In January 2017, GAO reported that the Department of Homeland Security's (DHS) U.S. Customs and Border Protection (CBP) operates predeparture programs to help identify and interdict high-risk travelers before they board U.S.- bound flights. CBP officers inspect all U.S.-bound travelers on those flights that are precleared at the 15 Preclearance locations at foreign airports—which serve as U.S. ports of entry—and, if deemed inadmissible, a traveler will not be permitted to board the aircraft. CBP also operates nine Immigration Advisory Program and two Joint Security Program locations, as well as three Regional Carrier Liaison Groups, through which CBP may recommend that air carriers not permit identified high-risk travelers to board U.S.-bound flights. CBP data showed that it identified and interdicted over 22,000 high-risk air travelers through these programs in fiscal year 2015 (the most recent data available at the time of GAO's report). While CBP tracked some data, such as the number of travelers deemed inadmissible, it had not fully evaluated the overall effectiveness of these programs. GAO recommended that CBP develop a system of performance measures and baselines to better position CBP to assess program performance. As of December 2018, CBP set preliminary performance targets for fiscal year 2019, and plans to set targets for future fiscal years by October 31, 2019. GAO will continue to review CBP's actions to address this recommendation. GAO previously recommended that CBP evaluate the effectiveness of its predeparture programs. DHS agreed with GAO's recommendation and CBP has actions under way to address it.", "document_type": "gao"}
{"report": "VA’s process for deciding veterans’ eligibility for disability compensation begins when a veteran submits a claim to VA. Staff in one of VBA’s 57 regional offices assist the veteran by gathering additional evidence, such as military and medical records, that is needed to evaluate the claim. Based on this evidence, VBA decides whether the veteran is entitled to compensation and, if so, how much. A veteran dissatisfied with the initial claim decision can generally appeal within 1 year from the date of the notification letter sent by VBA. Under the current appeals process (now referred to by VA as the legacy process), an appeal begins with the veteran filing a Notice of Disagreement. VBA then re-examines the case and generally issues a Statement of the Case that represents its decision. A veteran dissatisfied with VBA’s decision can file an appeal with the Board. In filing that appeal, the veteran can indicate whether a Board hearing is desired. Before the Board reviews the appeal, VBA prepares the file and certifies it as ready for Board review. If the veteran requests a hearing to present new evidence or arguments, the Board will hold a hearing by videoconference or at a local VBA regional office. The Board reviews the evidence and either issues a decision to grant or deny the veteran’s appeal or refers the appeal back to VBA for further work. According to VA’s appeals plan, VA intends to implement the Act by February 2019, by replacing the current appeals process with a process offering veterans who are dissatisfied with VBA’s decision on their claim five options. Two of those options afford the veteran an opportunity for an additional review of VBA’s decision within VBA, and the other three options afford them the opportunity to bypass additional VBA review and appeal directly to the Board. Under the new appeals process, the two VBA options will be: 1. Request higher-level review: The veteran asks VBA to review its initial decision based on the same evidence but with a higher-level official reviewing and issuing a new decision. 2. File supplemental claim: The veteran provides additional evidence and files a supplemental claim with VBA for a new decision on the claim. The veteran can also request a VBA hearing. The three Board options will be: 3. Request Board review of existing record: The veteran appeals to the Board and asks it to review only the existing record without a hearing. 4. Request Board review of additional evidence, without a hearing. 5. Request Board review of additional evidence, with a hearing. In November 2017, VA initiated a test of the new VBA higher-level review and supplemental claim options. According to VA’s appeals plan, a purpose of this test—the Rapid Appeals Modernization Program (RAMP)—is to reduce legacy appeals by providing veterans with a chance for early resolution of their claims within VBA’s new process. Participation in RAMP is voluntary, but veterans must withdraw their pending legacy appeal to participate, according to VA’s appeals plan. In our March 2018 report, we found that VA’s November 2017 plan for implementing a new disability appeals process while attending to appeals under way in the current (legacy) process, addressed 17 of 22 elements required by the Act. For the 5 remaining elements, we found that it partially addressed 4 elements related to implementation monitoring, productivity projecting, and workforce planning, and did not address 1 element related to identifying total resources. This element called for delineating the resources needed by VBA and the Board to implement the new appeals process and address legacy appeals. We recommended in March 2018 that VA address all 22 required elements in the Act in VA’s appeals plan to Congress—including delineating resources required for all VBA and Board appeals options— using sensitivity analyses and results from its test, RAMP, where appropriate and needed. Since our March 2018 report, VA has taken some action on each of the five elements that we found were not fully addressed at that time. For example, VA added details related to projecting staff productivity, identifying total resources, as well as determining personnel requirements and productivity projections for processing appeals. For identifying total resources, VA added FTE information for other offices that help implement the appeals process and prepared a model to project resource needs. Although VA now addresses the 1 element related to projecting productivity, it only partially addresses 4 elements related to monitoring implementation, workforce planning, and delineating the total resources. For example, as of November 2018, VA’s plan does not contain metrics for monitoring implementation. Moreover, for total resources, the updated plan does not delineate the total resources required by VBA and the Board, such as the resources necessary for information technology and training. We acknowledge that in some cases delineating total resources could prove challenging, such as delineating information technology resources for the legacy and new appeals processes. We also acknowledge that implementing corrective actions to fully address these 4 elements may be challenging within the next several weeks, but we continue to believe VA has an opportunity to further address these 4 elements as part of certifying the agency’s readiness prior to the full implementation of the new process. In our March 2018 report, we found gaps in VA’s planning for how it will monitor and assess performance of the new appeals process when it is implemented. Specifically, we reported that the plan did not (1) establish timeliness goals for two of the three Board options (i.e., Board review of additional evidence without a hearing and Board review of additional evidence with a hearing); (2) articulate aspects of performance important for managing appeals, such as accuracy of decisions, veteran satisfaction with the process, or cost; (3) explain how the performance of the new appeals process would be compared to that of the legacy process; or (4) explain how the agency would monitor relative workloads of, and resources devoted to, the new and legacy appeals processes. To address these gaps, we recommended that VA clearly articulate in its appeals plan how VA will monitor and assess the new appeals process compared to the legacy process, including specifying a balanced set of goals and measures—such as timeliness goals for all VBA appeals options and Board dockets, and measures of accuracy, veteran satisfaction, and cost—and related baseline data. Articulating a balanced set of goals that cover key aspects of managing appeals is important to avoid promoting skewed behaviors (e.g., favoring timeliness over accuracy) and to fully understanding performance. In its progress reports, VA addressed some but not all aspects of this recommendation (see table 1). VA has made progress in monitoring performance and addressing workload changes in its new and legacy appeals processes, but still lacks a complete set of balanced goals and measures. As we noted in our July 2018 testimony, VA has developed sensitivity models and other analyses to monitor and forecast future VBA and Board workloads, production, and staffing requirements to help VA manage the legacy and new appeals processes. However, VBA and the Board have yet to specify a complete set of balanced goals for monitoring the performance of the new appeals processes. According to the November 2018 progress report, the Board plans to develop timeliness goals after VA fully implements the new appeals process. Until VA fully develops a set of balanced goals and measures, the agency risks not fully understanding how well the reforms are performing. Regarding comparing the performance of the new and legacy appeals processes, VA has previously reported that the agency plans to implement the reporting requirements in section 5 of the Act. This section requires VA to report performance measures related to, among other things, timeliness, productivity, and outcomes, without specifying whether or how VA should compare performance of the new versus legacy processes. In November 2018, VBA and Board officials told us they intend to use timeliness and productivity metrics from section 5 to compare the two processes. However, in its updated plans to date, VA has been reporting average timeliness of decisions made to date under RAMP—VA’s test of the two VBA options—without reporting the average time cases are pending. Moreover, VA has not been reporting timeliness data on both decisions and pending cases according to the month that they entered into RAMP, which present a more balanced indication of performance and trends. In November 2018 VBA and Board officials told us they would consider reporting timeliness using a monthly cohort that reflects when appeals were filed. VBA and Board officials also said they have taken steps to collect, through surveys, comparable information on veterans’ satisfaction with the new and legacy appeals processes. According to VBA and Board officials, they have pre-tested the surveys—which is considered a best practice by survey methodologists—and are coordinating the survey efforts with one another. VBA and Board officials also told us that the agency will report on accuracy and outcomes (grants and denials of claims) in the new process. However, they also stated that these measures would not provide a fair comparison with the legacy process because the Act eliminated several of the requirements formerly required in the legacy appeals administrative processes. Although VA officials said they would develop a plan for comparing the performance of the two appeals processes after the new process is fully implemented, they did not indicate how soon they would do so. Developing such a plan would better position the agency to fully understand whether the new process is an improvement. Our March 2018 report identified elements of a high-quality and reliable implementation schedule that were missing from VA’s master schedule for appeals reform. Specifically, we reported that VA’s high-level master schedule—which the agency included with its November 2017 plan—did not (1) include all key activities; (2) show which activities must finish prior to the start of other activities, or the amount of time an activity could be delayed before the delay affects VA’s estimated implementation date; (3) reflect interim goals and milestones for monitoring implementation; or (4) assign resources for activities. We recommended that VA augment the master schedule for its appeals plan to reflect all activities—such as modifications to information technology systems—as well as assigned responsibilities, interdependencies, start and end dates for key activities for each workgroup, and resources. These steps establish accountability and reduce overall risk of implementation failures. In response to our recommendation, the Board, VBA and other VA administrations made progress over time with developing and integrating underlying plans into the integrated master schedule (IMS) in spring and summer 2018. According to VA officials, VA set a baseline schedule for implementing appeals reform in response to the potential February 2019 implementation date established in the Act. Since November 2017, VA’s plan and progress reports have stated that VA uses an agency-wide governance structure to coordinate implementation, and regularly uses the schedule as a management tool for monitoring progress on appeals reform. For example, the Board’s project manager meets regularly with those responsible for major activities to check progress, including weekly meetings with leadership, and identifies and corrects issues related to schedule execution. In October 2018, VA provided us with lower-level schedules and information that allowed us to conduct a more detailed assessment of VA’s IMS against applicable best practices criteria. The six criteria we assessed lower-level schedules against were: Capturing all activities: schedule should reflect all activities necessary to perform work to accomplish a project’s objective. Sequencing activities: activities should be logically sequenced in the order they are to be carried out so that critical program dates can be met. Assigning resources: schedule should reflect all resources necessary to complete work, verify whether resources will be available, and identify any constraints. Verifying horizontal and vertical traceability: schedule should be rational and logically sequenced, account for interdependencies among activities, and provide a way to evaluate the current status (horizontal traceability). Also, the various levels of a schedule— summary, intermediate, and detailed—should be consistent with one another and enable different teams to work to the same schedule expectations (vertical traceability). Updating the schedule using actual progress and logic: maintain and continually update the schedule to reflect a realistic forecast of start and end dates of activities. Maintaining a baseline schedule: use original configuration of the program plan as a point of comparison for the current plan to manage scope, timeframes, and required resources. We found that, while VA has made progress with providing more detail, its master and underlying schedules only minimally met sound practices for project management. Specifically, as with our March 2018 assessment, we found that the schedule does not contain enough detail to manage the work or provide a realistic representation of the resources and time needed for this project. For example, the schedule did not contain a work breakdown structure that defines the work, activities, and resources necessary to accomplish implementation. Moreover, half of all the remaining activities are missing logic that shows which activities must finish prior to the start of other activities. In addition, the schedule contains an invalid critical path, meaning that the schedule does not present the amount of time that key activities could be delayed before such delays affect VA’s estimated implementation date. Without a valid critical path, management cannot focus on activities that will detrimentally affect the key program milestones and deliveries if they slip. To address our March 2018 recommendation, VA would need to ensure that all activities are accounted for, that scheduled activities appear in the correct order, that resources are properly allocated, that all activities appear on the critical path, and that a schedule risk analysis accounts for all risks. We provide a more detailed explanation of our assessment results in appendix I. In addition, establishing an overly optimistic schedule can reduce capacity for carrying out a project and potentially create pressure to sacrifice the quality of work activities to meet deadlines. Moreover, many of VA’s activities are slated to be concurrently completed just before implementation, posing a significant risk to implementing reform in February. For example, according to VA’s schedule, the agency needs to complete 117 activities after January 1, 2019. Further, other VA efforts to redesign or update key aspects of VA’s disability compensation process—including the Veterans Benefits Management System (VBMS)—were not driven by robust, comprehensive planning and did not achieve their schedule goals. While VA intends to start full implementation in February, we do not know the extent to which the lack of a robust schedule poses risks to successful and smooth implementation. Even if taking corrective actions to address our findings may not be feasible before February, incorporating such lessons learned into future project planning could help VA improve its project scheduling capabilities. In our March 2018 report, we found that VA’s appeals plan could more fully assess key risks related to implementing the new appeals process. In particular, we found that VA’s plan did not include testing of new Board options or clearly define how it would assess the RAMP test of the VBA- only options before implementing them more broadly. Further, we reported that VA’s plan had not comprehensively reflected key risks because the agency had not established a complete and balanced set of goals and measures, which are a necessary pre-condition to effectively assessing risk. We recommended that VA ensure that the appeals plan more fully addresses risk associated with appeals reform by, for example, assessing risks against a balanced set of goals and measures, articulating success criteria and an assessment plan for RAMP, and testing or conducting sensitivity analyses of all five appeals options before fully implementing the new appeals process. In its progress reports, VA took many steps to address our recommendation, although key steps are remaining for VA to better assess risks associated with implementing appeals reform and managing appeals workloads in the legacy process (see table 2). Sound redesign and change management practices both suggest that tests be rigorously monitored and evaluated and that further roll-out occur only after an agency takes any needed corrective action and determines that the new process is achieving previously identified success criteria. Until VA takes these remaining steps, it may not have comprehensively addressed key risks to better position the agency for successful implementation of appeals reform. In conclusion, VA is undertaking an ambitious effort to reform its disability appeals process—while onboarding hundreds of new staff and implementing new technology—that will affect the lives of hundreds of thousands of veterans with disabilities for years to come. Consistent with our prior recommendations, VA has made concrete progress to improve its planning for disability appeals reform while it attends to legacy appeals. Efforts such as resuming sensitivity analysis to monitor workloads and testing VBA and Board appeals options will provide useful information to guide VA through the uncertainty often associated with process change. However, VA has reported it plans to fully implement the new disability appeals process in February 2019 even though it has yet to fully address our recommendations. While fully implementing our recommendations prior to February 2019 may not be feasible, doing so would better position VA to ensure successful implementation. Nevertheless, VA should still work to increase clarity around its plans prior to fully implementing reform. Moreover, many of the principles of sound planning practices that informed our recommendations remain relevant during process change. By continuing to improve its approach to performance measurement, scheduling, and risk management, even after implementation, VA could better ensure that the new process meets veterans’ needs. Chairman Roe, Ranking Member Walz, and Members of the Committee, this concludes my prepared statement. I would be pleased to respond to any questions you may have at this time. For further information about this testimony, please contact Elizabeth H. Curda at (202) 512-7215 or curdae@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. Other key contributors to this testimony include James Whitcomb (Assistant Director), Juaná Collymore, Michele Grgich, Sara Pelton, and Rachel Pittenger. In addition, key support was provided by Susan Aschoff, Mark Bird, Alex Galuten, Jason Lee, Sheila R. McCoy, Almeta Spencer, and Walter Vance. For this testimony, we assessed the steps that the Department of Veterans Affairs (VA) has taken to address our March 2018 recommendations and what aspects remain unaddressed, including the extent to which VA is using sound practices for scheduling key projects. In summary, we identified several areas where VA’s most recent schedule falls short of sound practices. Further incorporating sound practices into future project planning could help VA improve its project scheduling capabilities. We reviewed VA’s integrated master schedule (IMS) for the appeals reform effort and underlying sub-schedules to assess them against 6 of the 10 best practices, which we determined most relevant to our March 2018 recommendation that VA augment its master schedule for VA’s appeals plan to reflect all activities—such as modifications to information technology systems—as well as assigned responsibilities, interdependencies, start and end dates for key activities for each workgroup, and resources, to establish accountability and reduce the overall risk of implementation failures. Specifically, we analyzed the following related scheduling best practices: (1) Capturing all activities, (2) Sequencing all activities, (3) Assigning resources to all activities, (4) Verifying that the schedule can be traced vertically and horizontally, (5) Updating the schedule using actual progress and logic and (6) Maintaining a baseline schedule. We assessed VA’s lower-level schedules against these 6 best practices by: Checking for specific problems that could hinder the schedule’s ability to respond to changes. For example, we: o Examined if there are any open-ended activities (i.e., activities with no predecessor and/or successors), o Searched for activities with poor logic: For example, Start to Start successor only or Finish to Finish predecessor only which represent dangling logic, or Logic on summary tasks rather than attached to detailed tasks (summary tasks are for organizing the schedule and should not drive the logic). o Looked for activities with constraints which keep the schedule rigid (e.g., start no earlier than, finish no later than, etc.), o Determined if activities were resource loaded—which helps to cost out the schedule—and examine whether resources are over- allocated or not available when needed, o Examined the schedule’s critical path to determine whether or not it was reliable and logical, o Examined schedule float and determined if it was reasonable, and o Examined whether the schedule was baselined, its status cycle, and what deviations there were from the original plan. We also determined if there were any actual start or finish dates recorded in the future and whether there was any broken logic between planned tasks. We also interviewed VA officials responsible for managing the schedule. We scored each scheduling leading practice on a five-point scale: “not met”, “minimally met”, “partially met”, “substantially met” and “fully met.” We determined the characteristic assessment rating by assigning each best practice rating a number and taking the average. Our resulting conclusions based on this assessment are as follows: VA’s project schedule minimally meets the best practice of capturing all activities. The schedule does not have well-defined start and finish milestones and there is not a project work breakdown structure (WBS) or corresponding WBS dictionary to define the work for each WBS element. We were not able to independently verify contractor work or major handoffs and deliverables in the schedule. In addition, there were activities with duplicate names, which could make communication difficult between VA teams, particularly between team members who are responsible for updating and integrating multiple schedules. VA’s project schedule minimally meets the best practice of sequencing activities. There are issues with missing dependencies, dangling activities, summary links, constraints and lags that affect the schedule meeting this best practice. Specifically, of the remaining activities, 55 percent have missing logic, over 12 percent are dangling, 42 percent have date constraints and 4 percent have leads assigned. When activities are not correctly linked, the program cannot use the integrated master schedule (IMS) to identify disconnects or hidden opportunities and cannot otherwise promote efficiency and accuracy or control the program by comparing actual to planned progress. When this happens, the schedule will not allow a sufficient understanding of the program as a whole, and users of the schedule may lack confidence in the dates and the critical path. VA’s project schedule minimally meets the best practice of assigning resources. While the schedule contains ‘Task Owner’ assignments, the Task Owner information has no effect on the durations or forecasted start and finish dates of detailed activities. Information on resource needs and availability in each work period assists the program office in forecasting the likelihood that activities will be completed as scheduled. If the current schedule does not allow insight into the current or projected allocation of resources, then the risk of the program’s slipping is significantly increased. VA’s project schedule minimally meets the best practice of verifying the schedule is traceable horizontally and vertically. There was no evidence in the schedule of hand-offs within the schedule—that is givers and receivers are easily identifiable in the schedule. We were unable to determine the relationship between lower-lever activities in the project schedule and higher-level activities and milestones in the management briefs provided to us. Specifically, we could not map the activities in the briefs to activities in the schedule. This inconsistency also prevented the verification of dates between the project schedule and higher-level management documents, even with documents that were provided from the same month as the October schedule. Products and outcomes were not easily traced through the sequencing of effort in the project schedule. In both cases the schedule did not respond appropriately to “shocks”; that is, greatly increasing the durations of some activities to increase the overall time required to complete the project did not affect the dates of key milestones. The duration increase of each activity did not affect the overall time line because the activity in question had a constraint that would not allow the project to appropriately extend. VA’s project schedule minimally meets the best practice of updating the schedule using progress and logic. Date anomalies, such as planned dates in the past or actual dates in the future, were found. The schedule was not current as of the date delivered to GAO. While officials report that they update the schedule regularly, a schedule narrative document does not accompany the schedule update that would detail changes to the current schedule and describe information such as the status of key milestone dates, changes in network logic, and a description of the current critical path(s). VA’s project schedule minimally meets the best practice of maintaining a baseline schedule. Officials said that the baseline schedule is the basis for performance measurement. But while baseline start and baseline finish dates were provided in the initial schedule, its activities were too high level, obfuscating the calculation of detail variances in subsequent schedules. There is also no evidence of a schedule basis document, which would include a general overview of the purpose of the schedule, other key basis information such as an overview of assumptions, rationale for durations specific to the CMR schedule, and required software settings. There is also no evidence of performance measuring. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "VA's disability compensation program pays cash benefits to veterans with disabilities connected to their military service. In recent years, veterans who appealed VA decisions on their claims have waited an average of 3 years. The subset of appeals resolved by the Board of Veterans Appeals—a separate VA agency that provides a higher level of appeals review—took on average 7 years to resolve. The Veterans Appeals Improvement and Modernization Act of 2017 makes changes to VA's current (legacy) process, giving veterans options to have their claims reviewed by VA or to appeal directly to the Board. The Act requires VA to submit to Congress and GAO a plan for implementing a new appeals process (which VA submitted in November 2017) and periodic progress reports (which VA submitted in February, May, August, and November 2018). The Act also includes a provision for GAO to assess VA's original plan. In March 2018, GAO found that VA could help ensure successful implementation of appeals reform by addressing gaps in planning and made four recommendations, with which VA agreed. This testimony focuses on the steps VA has taken to address GAO's recommendations, what aspects remain unaddressed, and risks these gaps pose for implementation. For this statement, GAO reviewed VA's updated plans, assessed VA's schedules against best practices, interviewed VA officials and reviewed information they provided about steps taken to implement GAO's recommendations. In a March 2018 report, GAO made four recommendations to address planning gaps in the Department of Veterans Affairs' (VA) November 2017 plan for changing its appeals process for disability compensation claims. Since then, VA has updated its appeals reform plan and taken steps to address aspects of these recommendations, but further steps could enhance its readiness for implementation: Address all legally required elements . VA's November 2017 plan did not address one and only partially addressed four of 22 elements required by the Veterans Appeals Improvement and Modernization Act of 2017 (Act); GAO recommended VA fully address all 22. As of November 2018, VA addressed one element related to projecting productivity and took steps to partially address the other four. VA is still missing information the agency needs to certify that it has the resources needed to successfully implement appeals reform. Articulate plans for performance monitoring and assessment . GAO recommended VA clearly articulate how it will monitor and assess the new appeals process relative to the legacy process, including, for example, specifying timeliness goals for the five new appeals options, and measures for decision accuracy in processing appeals. As of November 2018, VA officials stated their intention to use productivity, timeliness, accuracy, and veteran satisfaction metrics to assess the new versus the legacy appeals processes. However, VA has yet to specify a complete set of goals or measures for monitoring and assessing the relative efficacy of the new process or articulate detailed steps and timeframes for establishing them. Augment master schedule . GAO recommended VA augment its master schedule for appeals reform to reflect sound practices for guiding implementation of reform. Although VA's updated schedule reflected progress since VA's original 2017 plan, it still did not fully meet sound practices for project management. For example, the schedule does not appropriately define the work, activities, and resources necessary to accomplish appeals reform implementation. Without following sound practices, it is unclear whether the schedule poses risks to successful implementation of appeals reform. Address risk fully . GAO recommended that VA's plan more fully address risks in implementing a new appeals process by, for example, testing all appeals options prior to full implementation. As of November 2018, VA took many steps to address risks, although opportunities exist to better assess them. For example, although VA has used lessons learned from tests to update the implementation process, it has not fully tested all aspects nor has it developed mitigation strategies for all identified risks, such as veterans appealing to the Board at higher rates than expected. Until VA takes these remaining steps, it may not have sufficiently accounted for key risks in implementing the new process.", "document_type": "gao"}
{"report": "IT systems supporting federal agencies are inherently at risk. These systems are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the numerous operating systems, applications, and devices comprising federal systems and networks. Compounding these risks, federal systems and networks are often interconnected with other internal and external systems and networks, including the internet, thereby increasing the number of avenues of attack and expanding their potential attack surface. Without proper safeguards, computer systems are vulnerable to individuals and groups with malicious intent who can intrude and use their access to obtain sensitive information, commit fraud and identity theft, disrupt operations, or launch attacks against other computer systems and networks. Cyber-based threats to information systems can come from sources internal and external to the organization. Internal threats include errors or mistakes, as well as fraudulent or malevolent acts by employees or contractors working within the organization. External threats include the ever-growing number of cyber-based attacks that can come from a variety of sources such as individuals, groups, and countries that wish to do harm to an organization’s systems. Yet, IT systems are often riddled with security vulnerabilities—both known and unknown. These vulnerabilities can facilitate security incidents and cyberattacks that disrupt critical operations; lead to inappropriate access to and disclosure, modification, or destruction of sensitive information; and threaten national security, economic well-being, and public health and safety. Until fiscal year 2016, the number of information security incidents reported by federal agencies to DHS’s United States Computer Emergency Readiness Team (US-CERT) had steadily increased each year. From fiscal year 2009 through fiscal year 2015, reported incidents increased from 29,999 to 77,183, an increase of 157 percent. Changes to federal incident reporting guidelines for 2016 contributed to the decrease in reported incidents in fiscal year 2016. Specifically, updated incident reporting guidelines that became effective in fiscal year 2016 no longer required agencies to report non-cyber incidents or incidents categorized as scans, probes, and attempted access. More recently, agencies reported 35,277 incidents in fiscal year 2017 and 31,107 incidents in fiscal year 2018, as reflected in figure 1. According to US-CERT incident report data, the incidents reported in fiscal year 2018 involved several threat vectors. These threat vectors include web-based attacks, phishing attacks, and the loss or theft of computer equipment, among others. Figure 2 provides a breakdown of information security incidents by threat vector in fiscal year 2018. These incidents and others like them can pose a serious challenge to national security, economic well-being, and public health and safety, as shown by two incidents reported in fiscal year 2018: In March 2018, the Department of Justice reported that it had indicted nine Iranians for conducting a massive cybersecurity theft campaign on behalf of the Islamic Revolutionary Guard Corps. According to the department, the Iranians allegedly stole more than 31 terabytes of documents and data from more than 140 American universities, 30 U.S. companies, and five federal government agencies, among other entities. In March 2018, a joint alert from DHS and the Federal Bureau of Investigation stated that, since at least March 2016, Russian government actors had targeted U.S. government entities and critical infrastructure sectors, including the energy, nuclear, water, aviation, and critical manufacturing sectors. Congress enacted FISMA 2014 to provide a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets and to clarify government-wide responsibilities. The act addresses the increasing sophistication of cybersecurity attacks, promotes the use of automated security tools with the ability to continuously monitor and diagnose the security posture of federal agencies, and provides for improved oversight of federal agencies’ information security programs. FISMA requires agencies to develop, document, and implement an agency-wide information security program to secure federal information systems. These information security programs are to provide risk-based protections for the information and information systems that support the operations and assets of the agency. FISMA requires agencies to comply with OMB policies and procedures, DHS binding operational directives, and NIST federal information standards and guidelines. In addition, FISMA assigns to agency inspectors general responsibility for annually assessing the effectiveness of the information security policies, procedures, and practices of the agency. FISMA directs OMB to oversee agencies’ information security policies and practices. Among other things, FISMA requires OMB to develop and oversee the implementation of policies, principles, standards, and guidelines on information security in federal agencies, except with regard to national security systems. The law also assigns OMB the responsibility of requiring agencies to identify and provide information security protections commensurate with assessments of risk to their information and information systems. In addition, FISMA 2014 clarified and expanded DHS’s responsibilities for government-wide information security. Specifically, the act requires DHS, in consultation with OMB, to administer the implementation of agency information security policies and practices for non-national security information systems by: (1) assisting OMB with carrying out its oversight responsibilities; (2) developing, issuing, and overseeing implementation of binding operational directives; and (3) providing operational and technical assistance. Further, FISMA 2002 assigned to NIST the responsibility for developing standards and guidelines that include minimum information security requirements. FISMA also includes reporting requirements. Specifically, OMB is to report annually, in consultation with DHS, on the effectiveness of agency information security policies and practices, including a summary of major agency information security incidents and an assessment of agency compliance with NIST standards. Further, the law requires agencies to report annually to OMB, DHS, certain congressional committees, and the Comptroller General on the adequacy and effectiveness of their information security policies, procedures, and practices, including a description of each major security incident. In May 2017, the President signed Executive Order 13800, which sets policy for managing cybersecurity risk as an executive branch enterprise. Specifically, the order outlines actions to be taken by federal agencies and critical infrastructure sectors to improve the nation’s cybersecurity posture and capabilities. To this end, the order states that the President will hold executive agency heads accountable for managing agency-wide cybersecurity risk and directs each executive branch agency to use the NIST cybersecurity framework to manage those risks. In addition to requirements set in the executive order, OMB’s reporting metrics that were developed to facilitate agencies’ compliance with FISMA’s reporting requirement are aligned to the core functions outlined in the cybersecurity framework. Consequently, agencies are required to report on the effectiveness of their information security policies and practices according to the cybersecurity framework’s core functions. The NIST cybersecurity framework is based on five core security functions: Identify: Develop an understanding of the organization’s ability to manage cybersecurity risk to systems, people, assets, data, and capabilities. Protect: Develop and implement appropriate safeguards to ensure delivery of critical services. Detect: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event. Respond: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident. Recover: Develop and implement appropriate activities to maintain plans for resilience and to restore capabilities or services that were impaired due to a cybersecurity incident. According to NIST, these five functions should be performed concurrently and continuously to address cybersecurity risk. In addition, when considered together, they provide a high-level, strategic view of the life cycle of an organization’s management of cybersecurity risk. Within the five functions, NIST identifies 23 categories and 108 subcategories of activities and controls for achieving the intent of each function. Appendix II provides a description of the cybersecurity framework categories and subcategories of activities and controls. The Council of Inspectors General for Integrity and Efficiency (CIGIE), in collaboration with OMB, DHS, and other stakeholders, developed a capability maturity model for agency inspectors general to assess and report on the effectiveness of their agencies’ information security programs. As described in table 1, the model identifies five maturity levels with each succeeding level representing a more advanced level of implementation. Using the five-level maturity model described above, the inspectors general are to assign a maturity-level rating for each of the five core security functions based on an assessment of their agencies’ implementation of the activities and controls associated with each function using metrics that CIGIE developed in collaboration with OMB. The inspectors general then consider the maturity level ratings of the core security functions to evaluate the overall effectiveness of their agency’s information security program. OMB instructs inspectors general to rate their agency’s information security program as effective or not effective by applying a rule of simple majority. Specifically, if three or more of the five core security functions are rated effective, the overall information security program is considered to be effective. According to this maturity model, Level 4 (managed and measurable) is the lowest level to represent an effective level of security. Therefore, if an inspector general rates three or more of the agency’s core security functions at Level 4 or Level 5, then the inspector general can consider that agency to have an effective information security program. However, the inspector general has the discretion to have a different conclusion on program effectiveness if he or she deems it appropriate to do so. Similar to the inspector general FISMA reporting metrics, OMB and DHS worked with interagency partners to develop the CIO FISMA metrics, which are intended to be used by the agencies, OMB, and DHS to track agencies’ progress in implementing cybersecurity capabilities. The CIO FISMA reporting metrics are organized around the five core security functions outlined in NIST’s cybersecurity framework. In addition, certain CIO FISMA reporting metrics represent key milestones of the administration’s IT Modernization Cross-Agency Priority (CAP) goal, which includes a cybersecurity initiative. As a result, the CIO reporting metrics allow agency CIOs, OMB and DHS to monitor progress toward meeting key milestones and targets for the CAP goal. The cybersecurity initiative within the IT Modernization CAP goal is designed to reduce cybersecurity risks to the federal government’s information systems by mitigating the impact of risks to federal data, systems, and networks. The initiative consists of three strategies that contain 10 milestones that relate to key areas within the CIO FISMA metrics—information security continuous monitoring; identity, credential, and access management; and advanced network and data protections. In addition, each of the 10 milestones has an expected level of performance, or target, for implementation, as described later in this report. Each year, OMB requires agencies to report how much they spend on information security. In fiscal year 2018, the 23 civilian agencies covered by the CFO Act reported spending between $9 million and almost $1.9 billion on cybersecurity- or IT security-related activities. For these 23 agencies, their total reported security spending accounted for about 14 percent of their IT spending, with percentages for individual agencies ranging from 5 percent to 208 percent, as seen in table 2. Information security reports issued by GAO, inspectors general, and CIOs indicate that information security policies and practices of the agencies we reviewed are ineffective. Specifically, information security evaluation reports that we and agency inspectors general issued during fiscal year 2018 showed that most of the 16 selected agencies did not consistently or effectively implement policies or practices related to the core security functions of the cybersecurity framework. In addition, most of these selected agencies had deficiencies in implementing the eight elements of an information security program, as defined by FISMA. Also, inspectors general reported that most of the 24 CFO Act agencies did not have effective information security programs and were not effectively implementing security controls over financial systems during fiscal year 2018. Further, agency CIOs reported that most of the 23 civilian CFO Act agencies had not met targets for implementing cyber capabilities to reduce risk. FISMA requires agencies and their inspectors general to report on the adequacy and effectiveness of information security policies, procedures, and practices. To facilitate meeting this reporting requirement, CIGIE, in collaboration with OMB and DHS, developed metrics that agency inspectors general are to use to report on eight security domains that align with the five core security functions—Identify, Protect, Detect, Respond, and Recover—of the NIST cybersecurity framework. Table 3 illustrates how the inspector general reporting domains are related to the core security functions. Most of the 16 agencies that we reviewed had deficiencies in implementing policies and practices related to the cybersecurity framework core security functions and related domains during fiscal year 2018. Figure 3 shows the number of agencies with reported deficiencies in each of the framework’s core security functions. The Identify core security function includes the key process of risk management. NIST defines risk management as the process of identifying and assessing risk, and taking steps to reduce those risks to an acceptable level. NIST guidance specifies activities that agencies should implement to effectively identify and manage cybersecurity risks, including: establishing a risk management strategy that includes a determination identifying assets that require protection; assessing risk; and documenting plans of action and milestones (POA&Ms) to mitigate known deficiencies. Fifteen of the 16 selected agencies had deficiencies in activities associated with identifying risks. Figure 4 illustrates the number of selected agencies that had deficiencies in each of the activities. Establishment of a Risk Management Strategy Risk management strategies include strategic-level decisions and considerations for how senior leaders and executives are to manage risk to organizational operations and assets, individuals, other organizations, and the nation. GAO and inspectors general reports identified that 10 of the 16 selected agencies had deficiencies in developing, documenting, or implementing a risk management strategy. Specifically, nine of the 10 agencies had not developed or documented an enterprise-wide risk management strategy or process. Another agency had developed an enterprise risk management strategy but had not implemented it consistently across the agency. Without developing or documenting a risk management strategy, agencies lack clear guidance to help them make informed decisions for managing risk. Further, if agencies do not consistently implement a risk management strategy, they can potentially hinder their efforts to effectively identify and manage risk. FISMA requires agencies to develop and maintain an inventory of major information systems operated by or under the control of the agency to support risk management activities. Further, NIST Special Publication 800-53 states that centralized inventories of hardware, software, and firmware assets should be maintained to ensure proper accountability of those assets. These inventories also should be current, complete, and accurate to ensure proper accountability. Twelve of the 16 selected agencies did not fully identify or account for their major information systems or information technology assets. One agency did not maintain a comprehensive and accurate inventory of information systems and two other agencies did not maintain a current inventory of hardware and software assets. Nine additional agencies maintained neither a comprehensive and accurate inventory of information systems nor a current inventory of software and hardware assets. If agencies do not maintain comprehensive, accurate, or up-to- date inventories of information systems or hardware and software assets, agencies cannot ensure the protection of all assets within their networks. FISMA requires agencies to develop, document, and implement an agency-wide information security program that includes periodic risk assessments. According to NIST, these assessments are to address potential adverse impacts resulting from the operation and use of information systems and the information those systems process, store and transmit. Eight of the 16 selected agencies exhibited deficiencies in conducting risk assessments. Of the eight agencies that had deficiencies, four did not consistently perform risk assessments of their information systems; three did not fully update risk assessments subsequent to system changes; and one did not conduct a risk assessment supporting the agency’s decision to allocate resources to support mission and business processes. Without a sufficient process for conducting periodic risk assessments, agencies cannot determine, or appropriately respond to, risks to the information systems supporting the organization. Documentation of Plans of Action and Milestones FISMA requires agency information security programs to include a process for planning, implementing, evaluating, and documenting remedial action to address deficiencies in information system policies, procedures, and practices. In addition, NIST’s risk management framework states that agencies should implement a consistent process for developing POA&Ms using a prioritized approach to risk mitigation that is guided by a risk assessment. Further, documentation of POA&Ms should also be updated to reflect the current status of the deficiencies and, after remedial actions have been completed, agencies should test the actions to determine if they effectively addressed the deficiencies. Thirteen of the 16 selected agencies had deficiencies in their POA&M processes. Specifically, five agencies did not have an effective process for remediating vulnerabilities in a timely manner; seven other agencies did not adequately document or track the status of POA&Ms; and another agency did not assess the root cause of identified deficiencies to prioritize corrective actions based on the highest areas of risks. Additionally, one of the agencies that did not adequately document POA&Ms also did not have sufficient evidence to conclude that deficiencies were corrected even though the agency validated the remediation of the deficiency through its closure verification process. Without sufficiently documenting POA&Ms, agencies may not sufficiently remediate information security deficiencies in a timely manner, exposing their systems to increased risks that nefarious actors will exploit the deficiencies to gain unauthorized access to information resources. Agencies are to implement appropriate safeguards associated with the following four security domains that align with the Protect core security function: identity and access management; data protection and privacy; and security training. Each of the 16 selected agencies was deficient in developing and implementing appropriate safeguards to protect agency systems and networks. As shown in figure 5, most of the selected agencies had deficiencies in each of the four domains. NIST guidelines specify that agencies are to develop, implement, and maintain a baseline configuration; control changes to system configurations; and securely configure information systems. However, 14 of the selected 16 agencies reported weaknesses in one or more of these configuration management activities. Of the 14 agencies, nine had weaknesses in developing, maintaining, and implementing a baseline configuration for their information systems. For example, four agencies did not develop a baseline configuration for all systems or network devices. In addition, two agencies did not review or approve their baseline configurations. Further, three agencies did not consistently implement their baseline configurations. If agencies do not develop, maintain, or implement a current and comprehensive baseline of information systems and network devices, agencies cannot validate configuration information for accuracy, thereby hindering them from controlling changes made to a system. Eleven agencies did not effectively or consistently control changes to the configuration of their information systems. Properly controlling system changes can help agencies to ensure that changes are formally identified, proposed, reviewed, analyzed for security impact, tested, and approved prior to implementation. However, six of the 11 agencies did not properly approve or test changes before they were implemented; four other agencies did not consistently implement change control activities across their organization or their information systems; and one other agency did not consistently ensure accountability and responsibility for individuals performing configuration management activities. In addition, 12 agencies did not securely configure their information systems. NIST specifies that agencies should apply software patches in a timely manner, use vendor-supported software, apply secure configuration settings, and limit system functionality to least level needed to meet organizational requirements. However, of the 12 agencies that had deficiencies in implementing secure configurations, nine did not implement patches to address vulnerabilities or use up-to-date software that was supported by a vendor. Ten agencies also did not apply secure configuration settings to effectively enable security and facilitate the management of risk, while two agencies did not implement controls for limiting system functionality. As a result, these agencies cannot validate configuration information for their information systems and assets, detect or prevent unauthorized changes to information system resources, or provide a reasonable assurance that systems are configured and operating securely and as intended. Access controls are intended to limit or detect inappropriate access to computer resources to protect them from unauthorized modification, loss, and disclosure. Such controls include logical controls that require users to validate their identity and limit the files and other resources that those validated users can access and the actions they can execute. All 16 agencies that we reviewed had deficiencies in effectively implementing one or more controls associated with the identity and access management domain during fiscal year 2018. Fifteen of the 16 selected agencies did not adequately control user’s access to information systems and the information residing on them. For example, seven agencies did not appropriately authorize or approve system access before access was granted, and eight agencies did not perform user access reviews to ensure that they complied with account management policy. Additionally, 11 of the 16 agencies did not properly identify and validate information system users, which involve enforcing strong passwords and requiring passwords to be changed periodically. In addition, 11 of the 16 agencies had deficiencies in implementing access management to ensure separation of duties, or segregating work responsibilities so that one individual does not control all critical stages of a process. Without adequate access controls, unauthorized individuals, including outside intruders and former employees, can surreptitiously read and copy sensitive data and make undetected changes or deletions for malicious purposes or personal gain. According to NIST guidance on security and privacy controls, agencies should protect data at rest and in transit on their network through implementation of cryptography and other technologies to achieve confidentiality and integrity protections over that data. In addition, NIST’s guidance states that agencies should implement contingency strategies, such as conducting backups of information systems and having alternate processing and storage sites to protect data from loss during an interruption and to resume activities after an interruption. Further, NIST guidance states that agencies should develop privacy policies, procedures, and guidance for safeguarding the collection, access, use, dissemination, and storage of personally identifiable information that supports a privacy program. However, 15 of the 16 selected agencies did not effectively implement controls to protect data and ensure its privacy during fiscal year 2018. Specifically, eight of the 16 agencies did not adequately implement controls for protecting information at rest and four agencies did not adequately implement controls for ensuring the integrity and confidentiality of data in transit. In addition, five of the 16 agencies did not conduct backups of information systems and five agencies did not use alternate processing sites to retrieve backups or resume essential mission/business functions. Further, the inspectors general for 14 of the 16 agencies reported that their respective agency did not effectively document or implement policies and procedures supporting the agency’s privacy program. If agencies do not effectively implement controls to protect data and ensure its privacy, agencies may be hindered in limiting or containing the impact of a potential cybersecurity event. FISMA requires agency information security programs to include security awareness training to inform personnel of information security risks associated with their activities and responsibilities in complying with agency policies and procedures intended to reduce risk. In addition, FISMA requires agencies to provide role-based training to personnel with significant responsibilities for information security. Further, NIST guidance on building an IT security awareness and training program states that an awareness and training program is the means to communicate information that users need to support the mission of the organization, and security requirements across the agency. Most of the selected agencies exhibited deficiencies in implementing a security training program during fiscal year 2018. Only three of the 16 selected agencies effectively implemented elements of a security training program. Of the 13 agencies that had deficiencies, 12 did not ensure that personnel received security awareness training and 10 did not ensure that personnel with significant responsibilities for information security received role-based training, including nine agencies that were deficient in providing both types of training. As a result, these agencies risk having employees or contractors that are ill-prepared to protect systems, and risk inadvertently or intentionally compromising security. Agencies are to develop and implement controls to Detect cyber events and vulnerabilities. FISMA requires agencies to develop, document, and implement an agency-wide information security program that includes periodic testing and evaluation of effectiveness and procedures for detecting security incidents. NIST guidelines define these and other activities as part of information security continuous monitoring, including: defining an information security continuous monitoring strategy and implementing an information security continuous monitoring program in accordance with that strategy; assessing and reporting on the effectiveness of all implemented collecting, correlating, and analyzing security related information obtained through information system auditing. However, as shown in figure 6, agencies exhibited deficiencies in activities associated with information security continuous monitoring. Continuous Monitoring Strategy and Program NIST’s guidance on information security continuous monitoring states that defining an information security continuous monitoring strategy and developing an information security continuous monitoring program are the first two steps in creating, implementing, and maintaining information security continuous monitoring. In addition, agencies should implement the information security continuous monitoring program in accordance with the defined strategy. However, half of the 16 selected agencies did not develop an information security continuous monitoring strategy or program, or implement the information security continuous monitoring program. Specifically, five of the agencies did not fully develop an information security continuous monitoring strategy or program. In addition, while three agencies had developed, or made organizational changes to create a foundation for, an information security continuous monitoring strategy, those agencies did not consistently or effectively implement the strategy. Without a well- designed and implemented information security continuous monitoring strategy, agencies could be hindered in assuring ongoing situational awareness of information security, vulnerabilities, and threats. As stated above, FISMA requires agencies to include periodic testing and evaluation of information security policies, procedures, and practices in agency-wide information security programs. Security control assessments determine the extent to which controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the system requirements. Most agencies assessed the controls implemented on their systems. However, seven agencies did not consistently perform system control assessments to ensure that the controls were operating effectively, or as intended. Further, seven agencies had not completed or implemented other activities in their security assessment and authorization process that assists agencies with ensuring that appropriate controls are implemented on an information system and that the system is authorized to operate. If agencies do not perform consistent testing of information security controls, they cannot determine that implemented controls are appropriately designed or operating effectively. Audit Review, Analysis, and Reporting According to NIST guidance on log management, routine log analysis is beneficial to identifying security incidents, policy violations, fraudulent activity, and operational problems. As a result, log analysis supports information security continuous monitoring capabilities. However, more than half of the 16 selected agencies did not review, analyze, and report auditable events from audit logs. For example, nine agencies did not implement audit log review capabilities on their information systems. Without reviewing, analyzing, and reporting audit logs, agencies limit their ability to identify unauthorized, unusual, or sensitive access activity on their networks. Agencies should have policies and practices in place to Respond to detected incidents. FISMA requires agency information security programs to include procedures for responding to security incidents in order to mitigate risks associated with such incidents before substantial damage is done. According to NIST, incident response involves rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring IT services. An effective incident response process includes, for example: an incident handling capability that incorporates lessons learned from ongoing incident handling activities; the monitoring of incidents through documentation that includes pertinent information necessary for forensics, evaluating incident details, trends, and handling; the timely reporting of incidents with sufficient detail to allow analysis; and an incident response plan. Most of the 16 selected agencies had deficiencies in at least one of the activities associated with incident response processes, as shown in figure 7. According to NIST, agencies should have the ability to detect and analyze security incidents in order to minimize loss and destruction and mitigate the weaknesses that were exploited. In addition, agencies should incorporate lessons learned from an incident to improve existing security controls and practices. Most of the selected agencies did not report deficiencies associated with their incident handling capability, including the ability to analyze and respond to security incidents and incorporate lessons learned. However, seven agencies did not adequately implement capabilities to analyze and respond to security incidents. In addition, one of the seven agencies did not use lessons learned from prior incidents to improve incident handling. Without an effective incident handling capability, agencies have limited ability to detect and analyze security incidents to minimize destruction and mitigate exploited vulnerabilities. According to NIST, agencies should monitor and document security incidents with sufficient detail in order to effectively respond to and mitigate the risks associated with the incident. Doing so enables agencies to analyze security incidents, understand the impact of the incident, and perform analysis to identify trends and indicators of attack. Inspectors general for 12 of the 16 selected agencies did not identify deficiencies related to monitoring detected incidents. However, four agencies did not effectively monitor incidents. For example, one agency did not consistently document incidents detected and another agency had not implemented an automated enterprise tool for monitoring incidents. If agencies do not effectively implement incident monitoring processes, they hinder their ability to adequately analyze and respond to security incidents. FISMA requires agencies to develop, document, and implement an agency-wide information security program that includes procedures for reporting security incidents to US-CERT. In addition, NIST guidance states that agencies should have specific incident reporting requirements for reporting suspected security incidents to an internal incident reporting organization. However, 10 agencies had deficiencies in their implementation of incident reporting. While only two agencies did not clearly define incident reporting requirements, eight agencies did not effectively implement those requirements. For example, these agencies did not consistently categorize incidents or ensure timely reporting of incidents to US-CERT and internal reporting organizations. If agencies do not consistently categorize or report incidents in an accurate and timely manner, they cannot effectively respond to incidents because they may lack effective situational awareness in order to appropriately respond to incidents. Incident response plans are an important element to ensuring that incident response is performed effectively, efficiently, and consistently throughout the agency. Among other things, NIST guidance states that incident response plans should provide a roadmap for implementing an incident response capability, describe metrics for measuring the incident response capability, and be approved. Inspectors general for nine of the selected agencies did not report deficiencies related to incident response plans. However, seven agencies did not fully develop or monitor the effectiveness of their incident response plans. Specifically, five agencies had incident response plans that did not fully define requirements for implementing their incident response capability or were not approved. In addition, the other two agencies did not use performance metrics to verify the effectiveness of their incident response plan. Without an effective and comprehensive incident response plan, agencies cannot implement a coordinated approach to incident response. Agencies should be able to Recover from cyber events. FISMA requires agencies to develop, document, and implement an agency-wide information security program that includes plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the agency. NIST defines contingency planning as a coordinated strategy involving plans, procedures, and technical measures that enable the recovery of information systems, operations, and data after a disruption. Contingency planning is significant to protecting electronically maintained data and an agency’s ability to process and retrieve data during and after a cyber intrusion. According to NIST, agencies should develop and document a comprehensive contingency plan or suite of related plans for restoring capabilities during and after a cyber event. The suite of related plans should include a disaster recovery plan and business impact analysis. However, 11 of the 16 selected agencies did not sufficiently plan for recovering system operations after an interruption. Specifically, these 11 agencies did not consistently develop contingency plans, to include disaster recovery plans, or other associated documentation, such as business impact analyses for all of their information systems. In addition, one agency did not define how the agency is to process and retrieve data during and after an interruption. Without an effective contingency planning process, agencies are exposed to the risk of interruptions to information system operations and disruption to their mission and business processes. Controls associated with the five core security functions are related to elements of agencies’ information security programs. FISMA requires each agency to develop, document, and implement an information security program that includes the following eight elements: 1. periodic assessments of the risk; 2. cost-effective policies and procedures that reduce risk to an acceptable level, ensure that information security is addressed throughout the life cycle of each system, and ensure compliance with applicable requirements; 3. subordinate plans for providing adequate information security for networks, facilities, and systems or groups of information systems, as appropriate; 4. security awareness training and training for personnel with significant responsibilities for information security; 5. periodic testing and evaluation of the effectiveness of security policies, procedures, and practices; 6. a process for planning, implementing, evaluating, and documenting remedial actions to address information security deficiencies; 7. procedures for detecting, reporting, and responding to security 8. plans and procedures to ensure continuity of operations for information systems. As discussed earlier in this report, most of the 16 selected agencies had deficiencies related to implementing the eight elements of an agency- wide information security program. Figure 8 shows the number of selected agencies with deficiencies in implementing the eight elements of an agency-wide information security program. For example, of the 16 selected agencies: Eight agencies did not effectively assess risk; 11 agencies did not have policies to ensure that CIOs carried out their role as it relates to information security; Four agencies developed incomplete system security plans; 13 agencies did not ensure that personnel received security awareness training, or that personnel with security responsibilities received role-based security training; Seven agencies did not consistently perform control assessments to ensure that the controls were operating effectively, or as intended; 13 agencies did not effectively implement their POA&M process to address information security deficiencies; 13 agencies did not adequately detect or respond to incidents; and 11 agencies did not comprehensively develop plans to ensure the continuity of its operations. We and inspectors general have made numerous recommendations aimed at improving information security programs and practices over the years. Until these agencies take action to address deficiencies in implementing the eight elements of an agency-wide information security program, they lack assurance that their information systems and networks are protected from inadvertent or malicious activity. Inspectors general determined that few agencies covered by the CFO Act of 1990 had effective agency-wide information security programs during fiscal year 2018. Further, in agency financial statement audit reports for fiscal year 2018, inspectors general reported that they continued to identify significant deficiencies in information security controls over financial systems. As a result, inspectors general reported material weaknesses or significant deficiencies in internal control over financial reporting for fiscal year 2018. FISMA requires inspectors general to determine the effectiveness of their respective agencies’ information security programs. To do so, OMB instructed inspectors general to provide a maturity rating for agency information security policies, procedures, and practices related to the five core security functions established in the NIST cybersecurity framework, as well as for the agency-wide information security program. For fiscal year 2018, the inspectors general for only six of the 24 CFO Act agencies reported that their agencies had an effective agency-wide information security program. However, the remaining 18 agencies were reported as having ineffective information security programs. When considering each of the five core security functions, most inspectors general reported that their agency was at Level 3 (consistently implemented) for the Identify, Protect, and Recover functions; at Level 2 (defined) for the Detect function; and at Level 4 (managed and measurable) for the Respond function, as shown in figure 9. Agency inspectors general report on the effectiveness of agencies’ information security controls as part of the annual audits of the agencies’ financial statements. The reports resulting from these audits include a description of information security control deficiencies related to the five major control categories defined by the Federal Information System Controls Audit Manual (FISCAM)—security management, access controls, configuration management, segregation of duties, and contingency planning. For fiscal year 2018, inspectors general identified information security control deficiencies related to most of the FISCAM general control categories for most of the 24 CFO Act agencies as shown in figure 10. Overall, inspectors general for the 24 CFO Act agencies continued to report deficiencies in agencies information security practices for fiscal year 2018. Specifically, during that time, 18 inspectors general designated information security as either a material weakness (6) or significant deficiency (12) in internal control over financial reporting systems for their agency. Further, inspectors general at 21 of the 24 agencies cited information security as a major management challenge for their agency for fiscal year 2018. OMB, in its fiscal year CIO reporting metrics, directed CIOs to assess their agencies’ progress toward achieving outcomes that strengthen federal cybersecurity. To do this, CIOs evaluated their agency’s performance in reaching targets for meeting key milestones of the current administration’s IT Modernization Cross-Agency Priority (CAP) goal. This CAP goal includes a cybersecurity initiative to mitigate the impact of risks to federal agencies’ data, systems, and networks by implementing cutting edge cybersecurity capabilities. The CAP goal’s cybersecurity initiative has three strategies that include key milestones with specific implementation targets, most of which are expected to be met by the end of fiscal year 2020. Table 4 shows the key milestones and targets related to the three strategies of the IT Modernization CAP goal’s cybersecurity initiative, as well as how many agencies were meeting the targets for each of the milestones. Overall, only two of the civilian 23 CFO Act agencies met all 10 targets for the cybersecurity initiative of the IT Modernization CAP goal, during fiscal year 2018. Whereas, 10 agencies met seven to nine of the targets and the remaining 11 agencies met six or fewer targets. More specifically, by strategy area, Seven agencies met all four targets for the manage asset security strategy. Eight agencies met all three targets for the limit personnel security strategy. Seven agencies met all three targets for the protect networks and data strategy. OMB, DHS, and NIST have ongoing and planned initiatives to support FISMA’s implementation across the federal government. Specifically, OMB developed and oversaw the implementation of information security policies, procedures, and guidelines over the past 2 years. In addition, DHS oversaw and assisted government efforts that were intended to provide adequate, risk-based, cost-effective cybersecurity. Further, NIST continued to provide guidance to federal agencies to improve information security across the government. However, beyond fiscal year 2016, OMB held CyberStat meetings at significantly fewer agencies. These meetings are intended to help ensure effective implementation of information security policies and practices. In addition, OMB’s guidance to agencies for preparing their fiscal year 2018 FISMA report does not sufficiently address FISMA’s requirement for developing subordinate plans for providing adequate information security for networks, facilities, and information systems. FISMA requires that OMB submit a report to Congress no later than March 1 of each year on the effectiveness of agencies’ information security policies and practices during the preceding year. This report is to include: a summary of incidents described in the agencies’ annual reports; a description of the threshold for reporting major information security a summary of results from the annual IG evaluations of each agency’s information security program and practices; an assessment of each agency’s compliance with NIST information an assessment of agency compliance with OMB data breach notification policies and procedures. As of June 2019, OMB had not issued its annual FISMA report to Congress for fiscal year 2018. OMB officials stated that the lapse in appropriations during the start of 2019 caused a delay in the report’s development and release. The officials declined to provide a time frame for when they expected to issue the report. FISMA requires OMB to develop and oversee the implementation of policies, principles, standards, and guidelines on information security. Since the start of fiscal year 2018, OMB has developed or proposed policies and generally monitored their implementation. Specifically: In May 2019, OMB issued policy to address federal agencies’ implementation of identity, credential, and access management (ICAM). Among other things, the policy requires agencies to (1) implement identity, credential, and access management guidelines, standards, and directives issued by NIST, DHS, and the Office of Personnel Management; and (2) harmonize their enterprise-wide approach to ICAM governance, architecture, and acquisition through activities such as designating an integrated agency-wide ICAM governance structure and establishing solutions for ICAM services that are flexible and scalable. In December 2018, OMB issued a memorandum on the high-value asset (HVA) program that (1) outlined agency expectations for establishing agency governance; (2) required agencies to take action to improve the identification of HVAs; and (3) defined agency reporting, assessment, and remediation requirements for HVAs. In March 2018, OMB reported that agencies’ continued to have challenges in mitigating security vulnerabilities identified across the federal HVA landscape in its fiscal year 2017 FISMA report to Congress. In addition, OMB required agencies to report on the implementation of security controls to protect HVAs during fiscal year 2018. In October 2018, OMB issued new federal information security and privacy management guidance that required agencies to (1) report on the adequacy and effectiveness of their information security programs, (2) submit a current and prioritized list of HVAs through the Homeland Security Information Network, and (3) report major incidents to DHS, OMB, Congress and their agency inspectors general. In addition, the guidance required agencies to ensure that DHS has authorization and the information necessary to monitor and provide technical assistance related to vulnerability scanning. In addition to developing and monitoring the implementation of information security policies, FISMA directs OMB to oversee agencies’ compliance with the act’s requirements to provide information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access, use, disclosure, modification, or destruction of information or information systems. During fiscal year 2018, OMB issued four reports summarizing government-wide implementation of the information security requirements, as described below: In September 2018, OMB issued an assessment of intrusion detection and prevention capabilities across the federal enterprise. In its assessment, OMB briefly described federal agencies’ implementation of intrusion detection and prevention capabilities through DHS’s EINSTEIN sensor suite. In May 2018, OMB issued its Federal Cybersecurity Risk Determination Report and Action Plan. For this report, OMB evaluated risk management assessment reports for 96 agencies and described actions that it and agencies plan to take to address government-wide cybersecurity gaps. Two major actions discussed in the report are: (1) federal agencies must consolidate their security operations center capabilities and processes, or migrate the security operations center as a service; and (2) OMB, DHS, and other federal agencies are to assist with implementing the cyber threat framework developed by the Office of the Director of National Intelligence. In March 2018, OMB issued its annual FISMA report to Congress for fiscal year 2017, which summarized the performance of 97 agencies in implementing effective information security programs and managing risk, among other things. In December 2017, OMB released its Report to the President on Federal IT Modernization, which outlined a vision and recommendations for the federal government to build a more modern and secure architecture for federal systems. For example, OMB described government-wide initiatives intended to improve the security of federal networks that emphasized perimeter network- based security protections, but had gaps in the application and data- level protections needed to provide complete security. To address these deficiencies, OMB recommended a layered defensive strategy in government-wide programs to provide greater defense-in-depth capabilities that are intended to prevent malicious actors from moving laterally across linked networks to access valuable information. Number of Agencies Scheduled for CyberStat Meetings Significantly Declined Since Fiscal Year 2016 OMB, in coordination with DHS, is responsible for coordinating CyberStat review meetings. As mentioned previously, FISMA requires OMB to oversee agency compliance with requirements to provide information security protections on information and information systems. One means of fulfilling this oversight responsibility is through CyberStat engagements. For these engagements, OMB, in coordination with DHS, intends to engage agency leadership on Administration priorities and perform outreach to ensure that agencies are taking the appropriate actions to strengthen their cybersecurity posture. However, since our September 2017 report on fiscal year 2016 FISMA implementation, the number of agencies that have participated in a CyberStat engagement has significantly declined. In fiscal year 2016, OMB scheduled these engagements with 24 agencies to help develop action items that address information security risk, identify areas for targeted assistance, and track performance at the agencies throughout the year. The number of agencies scheduled to participate in an engagement decreased to five during fiscal year 2017, and decreased further to three during fiscal year 2018. As of May 2019, OMB staff in the Office of the Federal CIO informed us that the agency had not scheduled any agencies to participate in a CyberStat engagement during fiscal year 2019. According to OMB officials in the Office of the Federal CIO, updates to the CyberStat process resulted in extended engagements between DHS, OMB, and the agencies that lasted 4 to 6 weeks or more. Beginning in fiscal year 2017, according to DHS’s CyberStat concept of operations, OMB and DHS took a collaborative approach with the CyberStat process. Specifically, officials from the participating agencies, OMB’s Cyber and National Security Unit, and DHS’s Federal Network Resilience (FNR) division collaborated through these CyberStat engagements to reach a desired performance outcome at the participating agencies. DHS’s CyberStat concept of operations states that the department focuses on agency performance in key federal information security reporting, including agency FISMA reporting, DHS reports of agency compliance with binding operational directives, and reports issued by GAO and agency inspectors general. A DHS official from the department’s FNR division informed us that it uses these information security reports to make recommendations to OMB, who then decides which agencies will be scheduled to participate in a CyberStat engagement. According to OMB, the three agencies that participated in a CyberStat engagement initiated during fiscal year 2018 volunteered to do so after discussing their cybersecurity implementation issues with OMB. However, as discussed earlier in this report, deficiencies reported in agency fiscal year 2018 FISMA reports and information security evaluation reports issued by GAO and inspectors general for fiscal year 2018 indicate that several agencies are in need of OMB and DHS assistance to improve their information security posture. In addition, the three agencies that participated in CyberStat engagements scheduled during fiscal year 2018 saw value in changes resulting from the updated engagement process. For example, officials from the Office of the CIO (OCIO) at one of the three agencies stated that the updated process was more constructive and valuable than the prior CyberStat process that was based more on a compliance checklist. In addition, OCIO officials at all three agencies stated that the process helped improve their agencies’ information security posture and that their collaboration with OMB and DHS was beneficial to assisting with FISMA implementation. By conducting fewer CyberStat engagements with agencies, OMB loses an opportunity to assist agencies with improving their information security posture. Additionally, OMB will limit its ability to oversee specific agency efforts to provide information security protections for federal information and information systems. FISMA includes reporting requirements for OMB, agency CIOs and inspectors general. According to OMB’s FISMA reporting guidance, OMB and DHS collaborate with interagency and inspector general partners to develop the CIO and inspector general metrics, which are intended to facilitate agencies’ compliance with FISMA-related reporting requirements. These entities created separate sets of reporting metrics for agency CIOs and agency inspectors general. However, the inspector general reporting metrics did not specifically address the development and maintenance of system security plans, although subordinate plans, such as system security plans, are a key element of an agency-wide information security program required by FISMA. OMB officials in the Office of the Federal CIO informed us that, while they work in coordination with CIGIE to establish the reporting metrics, CIGIE is ultimately responsible for developing the metrics. According to both the published metrics and OMB’s guidance memorandum, OMB collaborates with DHS and inspector general partners to develop the IG FISMA metrics. According to representatives from CIGIE, the existence of system security plans is addressed in multiple questions within the reporting metrics, which is in alignment with OMB’s focus toward ongoing assessments and authorizations. Nevertheless, our review of the reporting metrics and supplemental evaluation guide did not identify any reference to the development and maintenance of system security plans. The lack of a defined reporting metric for addressing agency system security plans could lead to inconsistent reporting by inspectors general. Until such a metric is developed and reported on, OMB will not have reasonable assurance that inspectors general evaluations appropriately address each of the required elements of an information security program. Under FISMA, DHS, in consultation with OMB, is responsible for carrying out various activities, including developing and overseeing the implementation of binding operational directives and providing operational and technical assistance to agencies. Over the last 2 years, DHS had developed four binding operational directives as of April 2019, as required by FISMA. These directives instructed agencies to: remove and discontinue use of all present and future Kaspersky- branded products; enhance email security by adopting domain-based message authentication, reporting and conformance (DMARC) to prevent email spoofing and web security by ensuring all publicly accessible federal websites provides services through a secure connection; submit a current and prioritized high-value asset list to DHS and if selected, participate in risk and vulnerability assessments; and review and remediate critical and high vulnerabilities on internet- facing systems within 15 and 30 calendar days of initial detection, respectively. We have ongoing work evaluating DHS’s process to develop and oversee the implementation of binding operational directives as part of another engagement. We will report on the results of this evaluation in a separate report. DHS also provided operational and technical assistance to agencies through its Continuous Diagnostics and Mitigation (CDM) and National Cybersecurity Protection System (NCPS) programs. DHS is taking steps to deploy the CDM and NCPS capabilities to all participating federal agencies to enhance detection of cyber vulnerabilities and protection from cyber threats. Continuous Diagnostics and Mitigation program (CDM). The program is to provide federal departments and agencies with commercial off-the- shelf capabilities and tools that identify cybersecurity risks on an ongoing basis, prioritize these risks based upon potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first. In December 2018, we reported that the department was in the process of enhancing the capabilities of federal agencies to automate network monitoring for malicious activity through its CDM program. In our December report, we also recommended that DHS coordinate further with federal agencies to identify training and guidance needs for implementing CDM. DHS plans to complete implementation of our recommendation this fiscal year. In addition, we have an ongoing review to evaluate the extent to which selected agencies have effectively implemented CDM and to identify practices for effective and efficient implementation of the program. We will report on the results of this review separately. National Cybersecurity Protection System (NCPS). The program is one of the tools to aid federal agencies in mitigating information security threats. The system is intended to provide DHS with the capability to provide four cyber-related services to federal agencies: intrusion detection, intrusion prevention, analytics, and information sharing. In January 2016, we made nine recommendations to further improve NCPS capabilities by, among other things, developing metrics that clearly measure the effectiveness of NCPS’s efforts, including the quality, efficiency, and accuracy of actions related to detecting and preventing intrusions, providing analytic services, and sharing cyber-related information. As of June 2019, DHS had implemented six of our nine recommendations and plans to implement the remainder by the end of this fiscal year. According to FISMA, NIST is to develop information security standards and guidelines, in coordination with OMB and DHS. Specifically, NIST’s Computer Security Division is responsible for developing cybersecurity standards, guidelines, tests, and metrics for the protection of federal information systems. NIST has developed information security guidelines for federal agencies. Specifically, in April 2018, NIST issued an update to its cybersecurity framework that it originally issued in February 2014. Although the cybersecurity framework was initially intended for critical infrastructure, Executive Order 13800 requires federal agencies to use the cybersecurity framework to also manage their cybersecurity risk. The revised framework includes a new section on cybersecurity measurement; an expanded explanation of using the framework for cyber supply chain risk management; refinements to authentication, authorization, and identity proofing policies within access controls; and a new section on using the cybersecurity framework to understand and assess an organization’s cybersecurity risk. In May 2017, NIST published draft guidance for agencies to use in implementing the cybersecurity framework. This publication is intended to provide guidance on the use of the framework in conjunction with the current and planned suite of NIST security and privacy risk management publications, such as NIST Special Publication 800-53. According to NIST officials in the agency’s Computer Security Division, the agency is in the process of finalizing the implementation guidance and plans to publish the final version by the end of fiscal year 2019. Further, in December 2018, NIST released the revised Risk Management Framework for Information Systems and Organizations (risk management framework). According to NIST, the update provides an integrated, robust, and flexible methodology to address security and privacy risk management. Among the changes in the updated version is the integration of privacy risk management into the existing information security risk management processes. In addition, the risk management framework includes direct references to the cybersecurity framework, which demonstrates how organizations that implement the risk management framework can also achieve the outcomes of the cybersecurity framework. In April 2019, NIST released revised guidance on vetting the security of mobile applications. According to NIST, the revised publication provides guidance for planning and implementing a mobile application vetting process, developing security requirements for mobile applications, identifying appropriate tools for testing mobile applications, and determining if a mobile application is acceptable for deployment on an organization’s mobile devices. In addition, NIST is currently developing a privacy framework to help improve agencies’ privacy risk management. In April 2019, NIST issued a discussion draft for its privacy framework. According to the discussion draft, NIST will use feedback received on the discussion draft to develop a preliminary draft of the privacy framework, which is intended to assist organizations in identifying, assessing, and responding to privacy risks. Further, the framework is intended to foster the development of innovative approaches to protecting individuals’ privacy and increase trust in systems, products and services. According to NIST officials, the agency continues to engage stakeholders, both nationally and internationally, through roundtable meetings, webinars, and public workshops to solicit stakeholder input to inform development of this framework. NIST’s website states that the agency anticipates publishing the privacy framework in October 2019. Federal agencies continued to have deficiencies in implementing information security programs and practices. Inspectors general reported that 18 of 24 CFO Act agencies did not have effective agency-wide information security programs in fiscal year 2018. In addition, most of the selected agencies had deficiencies in the five core security functions. We and the inspectors general have made thousands of recommendations aimed at improving information security programs and practices over the years. Implementation of these recommendations will assist agencies in strengthening their information security policies and practices. OMB, DHS, and NIST have issued directives and guidance and implemented programs that, to some extent, have improved agencies’ security posture. However, OMB has not issued its report to Congress on the effectiveness of agencies’ information security policies and practices for fiscal year 2018, although the report was due several months ago. Further, while agencies indicated that the collaborative CyberStat engagements with DHS and OMB have aided with their FISMA implementation, the number of these engagements has declined significantly. In addition, the OMB-approved metrics that inspectors general use to evaluate FISMA implementation do not include one of the elements—system security plans—required by FISMA for information security programs. By not including this element, oversight of agencies’ information security programs has been diminished. We are making the following three recommendations to OMB: The Director of OMB should submit the statutorily required report to Congress on the effectiveness of agencies’ information security policies and practices during the preceding year. (Recommendation 1) The Director of OMB should expand its coordination of CyberStat review meetings for those agencies with a demonstrated need for assistance in implementing information security. (Recommendation 2) The Director of OMB should collaborate with CIGIE to ensure that the inspector general reporting metrics include the FISMA-required information security program element for system security plans. (Recommendation 3) We provided a draft of this report to OMB and the 28 selected agencies for review and comment. In response, OMB provided comments orally and via email in which the office, respectively, generally concurred with our first two recommendations and concurred with a revised version of our third recommendation. Specifically, in oral comments, officials in the Office of the Federal Chief Information Officer noted actions that they said OMB plans to take to address our first two recommendations. According to these officials, the office plans to issue its fiscal year 2018 report to Congress on the effectiveness of agencies’ information security policies and practices in the near future. In addition, the office plans to continue to collaborate with DHS to identify information security gaps at agencies and work with agencies to address those gaps in CyberStat meetings or by other means. With regard to our third recommendation, the officials expressed concern with the wording of the recommendation in our draft report, which related to OMB updating the IG metrics. They noted that CIGIE, rather than OMB, is responsible for updating these metrics. Accordingly, we revised the recommendation to emphasize the need for OMB to collaborate with CIGIE. In a subsequent email from our OMB liaison, the office concurred with the revised recommendation. The office emphasized its plans to continue working collaboratively with the inspector general community to assist with improving and evolving the metrics to ensure that the metrics address FISMA requirements. OMB also provided technical comments, which we incorporated, as appropriate. In addition, five of the 28 selected agencies provided written responses regarding the draft report: In its response (reprinted in appendix III), the Department of Housing and Urban Development stated that it had reviewed our draft report and had no comments. In its comments (reprinted in appendix IV), the Department of Veterans Affairs stated that it remains committed to complying with the requirements of FISMA and to safeguarding the department’s systems and data, which support the delivery of care, benefits, and services to veterans. The department also stated that it continues to prioritize efforts to address our prior information security-related recommendations to the department. In its response (reprinted in appendix V), the Environmental Protection Agency stated that it had reviewed our draft report and had no comments. In its comments (reprinted in appendix VI), the Social Security Administration stated that it will continue to improve its cybersecurity safeguards and looks forward to receiving additional guidance to assist the agency with its efforts. In its comments (reprinted in appendix VII), the U.S. Agency for International Development stated that it has developed, documented, and implemented an agency-wide program to provide security for its information and systems, pointing out that its inspector general reported that the agency had an effective program in fiscal year 2018. The agency also cited its commitment to continuing compliance with FISMA’s requirements and to safeguarding its information technology services to facilitate its mission. Further, four of the selected agencies—the Departments of Commerce, Homeland Security, and Transportation, as well as the National Science Foundation—also provided technical comments which we have incorporated in the report, where appropriate. The remaining 19 selected agencies provided emails stating that they had no comments on the report. These agencies were the Departments of Agriculture, Defense, Education, Energy, Health and Human Services, the Interior, Justice, Labor, State, and the Treasury; and the Federal Communications Commission; Federal Retirement Thrift Investment Board; General Services Administration; Merit System Protection Board; National Aeronautics and Space Administration; Nuclear Regulatory Commission; Office of Personnel Management; Presidio Trust; and Small Business Administration. We are sending copies of this report to appropriate congressional committees, the Director of OMB, the heads of the CFO Act agencies and their inspectors general, the heads of four selected non-CFO Act agencies, and other interested congressional parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact Gregory C. Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VIII. Our objectives were to (1) describe the reported adequacy and effectiveness of selected federal agencies’ information security policies and practices and (2) evaluate the extent to which the Office of Management and Budget (OMB), the Department of Homeland Security (DHS), and the National Institute of Standards and Technology (NIST) have implemented their government-wide Federal Information Security Modernization Act of 2014 (FISMA) requirements. To describe the reported adequacy and effectiveness of federal agencies’ information security policies and practices, we analyzed our, agency, and inspectors general information security-related reports for 16 selected agencies. Our selection of 16 agencies included 12 Chief Financial Officers (CFO) Act of 1990 agencies and four non-CFO Act agencies. To select the 12 CFO Act agencies, we first ranked the 23 civilian CFO Act agencies by the number of information security systems each agency reported operating in fiscal year 2017. We then separated the agencies into large, medium, and small categories based on the number of systems they reported, and selected four agencies from each category using a random number generator. To select the four non-CFO Act agencies, we listed the 73 non-CFO Act agencies reported in OMB’s annual FISMA report to Congress for fiscal year 2017 and then randomly selected four agencies. Although we randomly selected agencies and assured we had CFO Act and non-CFO Act agencies, due to the small number of agencies examined, results based on these agencies do not generalize beyond the agencies reviewed. The 16 agencies were the Departments of the Agriculture, Commerce, Education, Housing and Urban Development, Justice, Labor, State, and the Treasury; the Environmental Protection Agency; Federal Communications Commission; Federal Retirement Thrift Investment Board; Merit Systems Protection Board; National Aeronautics and Space Administration; Presidio Trust; Small Business Administration; and the Social Security Administration. For these agencies, we analyzed, categorized, and summarized weaknesses identified in inspector general and GAO reports using the NIST Framework for Improving Critical Infrastructure Cybersecurity (cybersecurity framework) core security functions and the eight elements of information security programs required by FISMA. In addition, for the 24 agencies covered by the CFO Act, we summarized (1) the inspector general ratings of agency-wide information security programs and (2) the inspector general designation of information security as a significant deficiency or a material weakness for financial reporting systems as reported for fiscal year 2018. For the 23 civilian agencies covered by the CFO Act, we summarized fiscal year 2018 agency Chief Information Officer (CIO) reports of their agency’s progress in meeting targets for implementing cyber capabilities supporting the Administration’s cybersecurity-related Cross-Agency Priority (CAP) goal. To gain insight into how agencies collect, report, and ensure the accuracy and completeness of the FISMA data they report, we analyzed documentation describing and supporting the processes at eight of the 16 selected agencies to ensure the accuracy and completeness of those data. We also interviewed officials at the eight agencies to obtain additional information on the quality controls implemented on the system used for FISMA reporting. The eight agencies selected were the Departments of Education, Justice, Labor, and the Treasury; the Federal Communications Commission; National Aeronautics and Space Administration; Presidio Trust; and the Small Business Administration. These agencies were randomly selected from the list of 16 agencies described above. Based on our assessment, we determined that the data were sufficiently reliable for the purpose of our reporting objectives. To evaluate the extent to which OMB, DHS, and NIST have implemented FISMA requirements, we analyzed the FISMA provisions to identify federal responsibilities for OMB, DHS, and NIST. We evaluated documentation of these agencies’ government-wide responsibilities to determine if the agencies were meeting FISMA requirements, including documentation obtained from their websites. Specifically, for OMB, we collected and reviewed information security-related policies and guidance that it issued since we last reported in September 2017. We also obtained reports issued by OMB to determine the extent to which the agency had overseen the policies and guidelines it issued, as well as other agency efforts for improving information security. In addition, we analyzed fiscal year 2018 inspector general and CIO FISMA reporting metrics to determine if the metrics sufficiently addressed the agency-wide information security program elements required by FISMA. We also interviewed OMB officials to obtain information on any actions they have planned or taken to improve the information security posture of the federal government. Further, we interviewed OMB and DHS officials to understand their process for scheduling CyberStat engagements with senior agency officials. We also interviewed officials at the three agencies that participated in a CyberStat engagement initiated during fiscal year 2018 to understand the benefits and challenges of their collaboration with OMB and DHS. For DHS, we reviewed and summarized a recently issued GAO report describing updates to the department’s Continuous Diagnostic and Mitigation Program and National Cybersecurity Protection System. We also collected and summarized the binding operational directives issued by DHS over the last 2 years. Further, we interviewed DHS officials to obtain information on any actions they have planned or taken to improve the information security posture of the federal government. For NIST, we collected and summarized the standards and guidance issued or updated by the agency since the start of fiscal year 2018. We also interviewed NIST officials and obtained information on draft standards and guidance to describe NIST’s current and planned efforts to help improve the information security posture of the federal government. We conducted this performance audit from December 2018 to July 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The National Institute of Standards and Technology established the cybersecurity framework to provide guidance for cybersecurity activities within the private sector and government agencies at all levels. The cybersecurity framework consists of five core functions: identify, protect, detect, respond, and recover. Within the five functions are 23 categories and 108 subcategories that define discrete outcomes for each function, as described in table 5. In addition to the individual named above, Jeffrey Knott (assistant director), Di’Mond Spencer (analyst-in-charge), Andrew Ahn, Chris Businsky, Fatima Jahan, and Priscilla Smith made key contributions to this report.", "summary": "For 22 years, GAO has designated information security as a government-wide high-risk area. FISMA requires federal agencies to develop, document, and implement information security programs and have independent evaluations of those programs and practices. It also assigns government-wide responsibilities for information security to OMB, DHS, and NIST. FISMA includes a provision for GAO to periodically report to Congress on agencies' implementation of the act. GAO's objectives in this report were to (1) describe the reported adequacy and effectiveness of selected federal agencies' information security policies and practices and (2) evaluate the extent to which OMB, DHS, and NIST have implemented their government-wide FISMA requirements. GAO categorized information security deficiencies as reported by 16 randomly selected agencies and their IGs according to the elements of an information security program; evaluated IG reports for 24 CFO Act agencies; examined OMB, DHS, and NIST documents; and interviewed agency officials. During fiscal year 2018, many federal agencies were often not adequately or effectively implementing their information security policies and practices. For example, most of the 16 agencies GAO selected for review had deficiencies related to implementing the eight elements of an agency-wide information security program required by the Federal Information Security Modernization Act of 2014 (FISMA) (see figure) . Further, inspectors general (IGs) reported that 18 of the 24 Chief Financial Officers (CFO) Act of 1990 agencies did not have effective agency-wide information security programs. GAO and IGs have previously made numerous recommendations to agencies to address such deficiencies, but many of these recommendations remain unimplemented. With certain exceptions, the Office of Management and Budget (OMB), Department of Homeland Security (DHS), and National Institute of Standards and Technology (NIST) were generally implementing their government-wide FISMA requirements, including issuing guidance and implementing programs that are intended to improve agencies' information security. However, OMB has not submitted its required FISMA report to Congress for fiscal year 2018 and has reduced the number of agencies at which it holds CyberStat meetings from 24 in fiscal year 2016 to three in fiscal year 2018—thereby restricting key activities for overseeing agencies' implementation of information security. Also, OMB, in collaboration with the Council of Inspectors General for Integrity and Efficiency (CIGIE), did not include a metric for system security plans, one of the required information security program elements, in its guidance on FISMA reporting. As a result, oversight of agencies' information security programs was diminished. GAO is making three recommendations to OMB to (1) submit its FISMA report to Congress for fiscal year 2018, (2) expand its coordination of CyberStat meetings with agencies, and (3) collaborate with CIGIE to update the inspector general FISMA reporting metrics to include assessing system security plans. OMB generally agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Medication synchronization is a process whereby a pharmacist aligns the refill dates of two or more of a patient’s medications to a single day each month—referred to as the synchronization date. Patients who are interested in medication synchronization must enroll or opt into the service, if offered at their pharmacy. To initiate medication synchronization, the pharmacist selects an anchor medication to which the other medications are synchronized, and dispenses short fills—that is, a quantity of less than a month’s supply—so that the patient has enough medication until the next synchronization date. Figure 1 illustrates the process by which a pharmacist may synchronize three medications for a patient. Before each synchronization date, the pharmacist generally contacts the patient to determine if the patient has had any changes in his or her medications or medical history. The pharmacist then makes any needed adjustments so that the patient can continue to pick up his or her medications on the synchronization date and avoid disruptions in their medication regimen. In 2017, national spending on prescription drugs dispensed by pharmacies totaled over $330 billion. Medicare accounted for over $100 billion and private health plans accounted for over $140 billion of total spending on prescription drugs that year. Medicare provides prescription drug coverage under Part D, a voluntary program in which beneficiaries can elect to enroll. In February 2019, about 45 million or three-fourths of Medicare beneficiaries were enrolled in Part D plans—including stand-alone prescription drug plans and Medicare Advantage prescription drug plans, which combine medical and prescription drug benefits. In comparison, in 2017, about 200 million patients were enrolled in a private health plan that provides prescription drug coverage, among other benefits, according to CMS. Health plans that provide prescription drug coverage interact with both patients and pharmacies. For patients, health plans may vary their benefits with regards to cost-sharing arrangements—such as copayments for medications—and quantity limits for medications covered—such as restricting the dosage or number of refills of a medication provided within a given period of time. For pharmacies, health plans pay pharmacies a share of the medication costs and a dispensing fee for the pharmacies’ administrative costs in preparing and dispensing the medication. Limited information available indicates that the use of medication synchronization has increased, but comprehensive data on its use by pharmacies and patients do not exist. Among the 22 peer-reviewed studies we identified, one study reported that the use of medication synchronization increased among pharmacies and patients. Specifically, the study examined survey data on the use of medication synchronization in retail pharmacies and reported that the number of retail pharmacies using medication synchronization increased from 3,324 in 2013 to 5,534 in 2014, a 66 percent increase. In addition, the study found that the number of patients using medication synchronization at these retail pharmacies increased from 124,608 in 2013 to 438,100 patients in 2014. We did not identify other studies that examined the use of medication synchronization. Officials from all five selected pharmacies that reported using medication synchronization told us that their pharmacies have increased their use of medication synchronization, but they generally could not provide us with data on their patients’ use of medication synchronization over time. The pharmacies included three retail pharmacy chains—two large national chains and one mid-size regional chain—one independent pharmacy, and one mail order pharmacy. Officials from four of these pharmacies told us that they started using medication synchronization within the last 5 years; officials from the fifth pharmacy told us that they started using medication synchronization in 2011. For example, officials from the two large retail pharmacy chains, each with about 10,000 pharmacies nationwide, told us that they first piloted medication synchronization to a small number of pharmacies in either 2015 or 2016. One of these chains now uses medication synchronization at all of its pharmacies, and the other is in the process of doing so. Officials from the mid-size retail pharmacy chain stated that they piloted medication synchronization in 2011 with about 2,500 patients enrolled across 50 pharmacies. They have since expanded it to about 83,000 patients across all their more than 90 pharmacies. Seven other stakeholders, including those representing patients and pharmacies, also told us that the use of medication synchronization has increased in recent years, but generally did not provide data on the increase. In addition, officials from an organization representing pharmacies told us that as of 2018, approximately 80 percent of independent pharmacies offered medication synchronization; however, they could not provide data from prior years. Limited information exists on the effects of medication synchronization, but available studies and stakeholders indicate several potential benefits, primarily for patients. According to CMS officials, CMS does not have data on the effects of medication synchronization, such as patient medication adherence; other stakeholders we interviewed indicated that such national data do not exist. Seventeen of the 22 peer-reviewed studies we identified evaluated the effects of medication synchronization—14 of these studies evaluated effects for patients and the rest for pharmacies and health plans. However, the data reported by these studies are limited in scope and are not generalizable to broader populations. Twelve of 14 peer-reviewed studies evaluating the potential effects of medication synchronization for patients reported two potential benefits— improved medication adherence or improved medical outcomes. Improved medication adherence. Twelve peer-reviewed studies that evaluated the potential effects of medication synchronization on patients’ adherence reported that medication synchronization improved adherence. For example, nine of the 12 studies compared medication adherence among patients using and not using medication synchronization and found that medication adherence was greater among patients using medication synchronization—one of the most recent studies showed adherence was 3 percent higher for those using medication synchronization. Two studies compared medication adherence among patients before and after using medication synchronization and found that adherence improved after synchronization was started—the most recent of these studies showed an improvement of 2 percent in average adherence after a year of enrollment. The last study reported that 56 percent of patients surveyed stated that they would be more adherent to their medications if their refills were synchronized. In addition, eight of these studies evaluated the effects of medication synchronization for patients with different chronic conditions and found differences by type of chronic condition. According to the studies, medication adherence improves as a result of medication synchronization because it simplifies the refilling process. Improved medical outcomes. One peer-reviewed study reported that medication synchronization may also lead to improved medical outcomes for patients. The study found that rates of hospitalization and emergency department visits and rates of outpatient visits were 9 percent and 3 percent lower, respectively, among patients using medication synchronization compared with those who were not. Stakeholders also cited improved medication adherence and medical outcomes as potential benefits for patients, and also identified additional benefits that may result from medication synchronization. Specifically, 14 of the 15 stakeholders representing patient and pharmacy organizations and selected pharmacies we interviewed said that medication synchronization may help improve patients’ medication adherence, and 12 of these stakeholders said that it may improve patients’ medical outcomes. These stakeholders also indicated other potential benefits for patients: Improved convenience. Medication synchronization improves convenience for patients—for example, by reducing the number of trips patients need to make to the pharmacy or making it easier to manage their medications, according to 10 of the 15 stakeholders representing patient and pharmacy organizations and selected pharmacies. Fewer trips to the pharmacy help to minimize the need for transportation arrangements, which is particularly important for older patients, patients who live in rural areas, and patients who lack reliable transportation. Five of the 10 stakeholders added that medication synchronization simplifies patients’ experience with managing their medications—patients no longer need to keep track of multiple refill dates for all their medications. Under medication synchronization, the pharmacists proactively perform this work and send reminders to the patients. Increased interaction between pharmacists and patients. Seven of 15 stakeholders representing patient and pharmacy organizations and selected pharmacies told us that medication synchronization increases the interaction patients have with their pharmacists, which may help patients better manage their medication regimens and improve their overall health. For example, a stakeholder representing pharmacies said that prior to the medication synchronization date, pharmacies generally contact patients to confirm that their medications should be filled; as part of this outreach, they also inquire about any changes in the patients’ medical history or therapy. If such changes are identified, pharmacists follow up with patients, and their physicians if necessary, to ensure that patients receive refills reflecting any necessary medication changes. In addition, according to some stakeholders, if a consultation is also provided on the medication synchronization date, pharmacists have more opportunities to answer patients’ questions about medication use, provide counseling, and offer patients other auxiliary services. For example, some stakeholders told us that pharmacists may provide screenings for blood pressure and diabetes, or recommend immunizations to patients when they pick up their medications. Because pharmacists regularly assess patients’ medical history in preparing for medication synchronization, they can target patients who may be at high risk for medical problems or immunization-preventable diseases. Regarding pharmacies, some studies and stakeholders identified the following potential benefits of medication synchronization. Operational efficiencies. Three peer-reviewed studies reported that medication synchronization can lead to operational efficiencies. For example, one study reported that medication synchronization can help pharmacists better manage inventory and personnel costs and improve workflow. Nine out of 12 stakeholders representing pharmacy organizations and selected pharmacies also said that medication synchronization can lead to improvements in operational efficiencies. For example, officials from one organization representing pharmacies said that pharmacists save time when they can dispense all of a patient’s medications at one time instead of several times throughout the month. Increased marketability of pharmacies to health plans. According to one peer-reviewed study and five of the 12 stakeholders representing pharmacy organizations and selected pharmacies, the extent to which a pharmacy’s medication synchronization program improves patient care, such as by improving medication adherence, may make the pharmacy more desirable to health plans. For example, according to the study and officials from one organization representing pharmacies, health plans may include pharmacies with highly adherent patients in the plans’ preferred pharmacy networks. Pharmacies in preferred pharmacy networks can offer lower medication prices, attracting more customers. Increased revenue. Three peer-reviewed studies and five of the 12 stakeholders representing pharmacy organizations and selected pharmacies reported that, to the extent that medication synchronization can improve patients’ medication adherence, it can also lead to increased pharmacy revenues generally because of an increase in filled prescriptions. For example, one of the three peer- reviewed studies reported that medication synchronization resulted in an average increase in medication adherence of almost 5 percent over the first 6 months of its use. Similarly, an industry study found that medication synchronization leads to an additional 20 fills per patient per year, and may lead to an average of $1,120 of additional revenue per enrolled patient annually. The three peer-reviewed studies and the industry study did not examine the causes of the increase in prescription fills, but their authors generally attributed the increase to the improved adherence of patients using medication synchronization. Two of the three studies reported that medication synchronization can increase pharmacy revenues generally because of an increase in filled prescriptions. In addition, officials from four stakeholders representing pharmacy organizations and selected pharmacies told us that pharmacies that use medication synchronization can leverage these opportunities to speak with patients and offer additional services, such as immunizations; these services can further help increase pharmacy revenue. Regarding health plans, some studies and stakeholders identified the following potential benefits of medication synchronization. Higher Medicare quality performance scores. Three peer-reviewed studies reported that medication synchronization can potentially improve health plans’ Medicare quality performance scores. CMS assesses the quality performance of Part D plans using information on various measures, such as adherence to medications for diabetes, high cholesterol, or hypertension. Specifically, CMS rates the plans’ performance using a star rating system, which gives each plan a score of between one and five stars, with five stars being the highest rating. Medication adherence measures are triple weighted in the calculation of a plan’s overall rating. Plans with the highest star ratings are rewarded with member enrollment incentives, while plans with lower star ratings are penalized. In addition, Medicare Advantage plans with high ratings may also receive financial bonuses from Medicare. To the extent that there are improvements in beneficiaries’ medication adherence as a result of medication synchronization, health plans may experience improved performance ratings and the commensurate financial benefits. However, only one of the four stakeholders representing health plan organizations and selected health plans indicated improved Medicare quality performance scores as a potential benefit of medication synchronization. Reduced medical costs. Medication synchronization may also benefit health plans by reducing their overall medical costs, according to one peer-reviewed study. The study found that medication synchronization can result in significant savings in medical costs for health plans, despite the increase in medication costs to the health plan. Specifically, the study reported that medical savings per additional dollar spent on medications under medication synchronization ranged from approximately $1 to $37, depending on the medication. According to the study, health plans could potentially experience such reduced medical costs as a result of medication synchronization because when patients are adherent to their medications, they may decrease their utilization of healthcare services. However, only one of the four stakeholders representing health plan organizations and selected health plans cited this as a potential benefit. A small number of studies and several stakeholders indicated that there are some potential limitations associated with medication synchronization. For example, Patients. One peer-reviewed study indicated that medication synchronization may not be beneficial for all patients. Similarly, 14 of the 15 stakeholders representing patient and pharmacy organizations and selected pharmacies said that not every patient may want to use medication synchronization. For example, 12 of the 14 stakeholders said that some patients may not be able to afford paying all copayments for their medications at one time each month, which deters them from using medication synchronization. In addition, one stakeholder said that some patients prefer going to the pharmacy regularly or consider trips to the pharmacy as opportunities for social interaction and may not be interested in medication synchronization. Pharmacies. One peer-reviewed study reported that using medication synchronization is time- and labor-intensive for pharmacies. Specifically, the study reported that almost 60 percent of pharmacists surveyed indicated that implementing medication synchronization involves a significant change in a pharmacy’s workflow. Seven of 12 stakeholders representing pharmacy organizations and selected pharmacies said this was because of several challenges. For example, it may be complicated to set up the initial synchronization, determine the best anchor medication and synchronization date, or adjust patients’ medication synchronization because of changes in their medical needs or therapy. In addition, pharmacists may have to conduct extensive follow-up with health plans because health plans may not be consistent in how they process pharmacies’ claims that involve short fills. For example, private health plans may initially deny coverage of short fills; such denials may require the pharmacist to expend additional resources to follow-up with the health plan to obtain approval for the short fill. Health plans. Officials from the two selected health plans told us that they do not require their Part D network pharmacies to use medication synchronization, nor do they compensate pharmacies for providing these services. While all stakeholders representing health plan organizations and selected health plans said that they view medication synchronization as having the potential to improve patients’ medication adherence and health outcomes, two of these stakeholders noted the lack of data explicitly tying medication synchronization to improved patient medication adherence, medical outcomes, and overall medical costs. Our review shows that a CMS regulation and laws related to prescription drug coverage in five selected states may support the use of medication synchronization. For example, CMS and the five selected states allow for reduced patient cost sharing for short fills needed to synchronize their medications. CMS does not have a formal medication synchronization program or policy for Medicare; however, a CMS regulation related to prescription drug benefits may support medication synchronization by reducing beneficiary cost sharing for certain amounts dispensed, according to officials. Specifically, CMS issued a regulation that, starting in 2014, required Medicare Part D plans to establish a daily cost-sharing rate (for example, a prorated copayment) when a beneficiary receives less than a month’s supply of a prescription medication—generally referred to as a short fill. According to CMS, the primary goal of the regulation was to reduce medication cost and waste—such as by allowing beneficiaries to initially receive a short fill of a new medication so that they can assess, in consultation with their providers, the efficacy of the medication and any associated adverse side effects. Because short fills may be needed to initially synchronize multiple medications to the same refill date, the prorated copayment may reduce the financial burden on beneficiaries who require these fills, according to CMS officials. In addition, officials from a selected pharmacy and officials from a technology vendor added that from a value perspective, beneficiaries may be reluctant to enroll in medication synchronization if they had to pay a full copayment for less than a month’s supply of medication. For example, as illustrated in figure 2, to initiate medication synchronization for a beneficiary taking three medications, each with a different refill date, the pharmacist may dispense short fills for two of the three medications. In this case, the pharmacist may dispense 8 days’ supply of one medication and 3 days’ supply of another medication. Prior to the regulation, the beneficiary would have paid $45 in copayments for these two short fills, as compared to $7 with prorated copayments—a difference of $38. The five selected states—Georgia, Illinois, Maine, Texas, and Washington—enacted laws within the last 4 years that may support medication synchronization. Specifically, these laws: Require insurance coverage of short fills. Laws in all five selected states require health plans in their state to provide coverage for medication short fills. These laws may also support medication synchronization by allowing health plans and pharmacies to work around certain plan policies that may impose limits on medication refills. Specifically, officials from a technology vendor told us that some health plans may impose limits on the number of refills that can be dispensed in a month. For example, if a patient is taking five medications and is limited to five refills a month, a short fill would count towards that limit and the patient may not then be able to get all of his or her medications covered by the health plan that month. Such laws allow the health plan and pharmacy to work around these quantity limits so that the patient can receive the needed short fills to synchronize all of his or her medications. Additionally, two states— Maine and Texas—specifically require their health plans to allow pharmacies to override denials related to refilling a prescription too soon. A pharmacy may receive such denials when refilling a prescription after having just filled it—for example, dispensing a short and full refill of a medication too close together. Officials from two selected pharmacies and an organization representing pharmacies told us that such laws also help to reduce the time and resources that pharmacies otherwise would have expended on addressing issues with these drug claims. Require prorated cost sharing for short fills. Like CMS’s regulation, laws in all five selected states require health plans in their state to prorate a patient’s cost sharing, such as a copayment, when the patient receives a short fill of a medication. Officials from four selected pharmacies told us such laws help reduce the financial burden on patients when they first have their medications synchronized. Without such a law, patients would have paid a full copayment for these medications, which may have discouraged or prevented some patients from enrolling in medication synchronization. Prohibit prorated dispensing fees for short fills. Laws in four of the five selected states prohibit health plans in their state from paying pharmacies a prorated dispensing fee for medication short fills. Pharmacies receive a dispensing fee from health plans for each prescription they fill to cover the pharmacies’ administrative costs of preparing and dispensing a fill. The dispensing fee is in addition to the reimbursement pharmacies receive from health plans for the costs of the medications. In states without this law, health plans may prorate the dispensing fee for short fills—that is, pay a lower fee because a smaller quantity of medications (for example, 10 pills rather than 30 pills) is dispensed. Officials from a technology vendor and an organization representing pharmacies told us that ensuring that a health plan pays a full dispensing fee provides an incentive for pharmacies to use medication synchronization. They explained that a pharmacy’s administrative costs of dispensing a medication remains the same, regardless of the quantity dispensed. Require medication synchronization process or policy. Laws in two of the five selected states—Texas and Washington—require health plans in their state to establish a process or policy for providing medication synchronization services. Both states require that, as part of this process or policy, the pharmacist or prescribing physician must ensure that medication synchronization is appropriate or in the best interest of the patient before the process is used. In addition to approval from both the pharmacist and physician, Texas also requires that the health plan and patient approve the medication synchronization plan. Officials from an organization representing pharmacies said that involving all these entities further helps to ensure the appropriateness of medication synchronization for a particular patient. While stakeholders generally told us that these laws have helped to support medication synchronization, they also said that the absence of such laws has not prevented pharmacies from using it in other states. For example, the five selected pharmacies that reported using medication synchronization—including three pharmacy chains—offered these services in at least some states without such laws. Additionally, officials from a selected pharmacy told us that they continue to offer medication synchronization despite receiving a prorated dispensing fee for short fills. We provided a draft of this report to the Department of Health and Human Services (HHS). HHS provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of HHS, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or CosgroveJ@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix II. Appendix I: Information about Stakeholders Interviewed We interviewed organizations reflecting a range in interests: Six organizations representing pharmacies or pharmacists Three organizations representing patients Two organizations representing health plans One organization representing the pharmaceutical industry 1 We interviewed one organization that specializes in Medicare issues and conducts analysis related to access to and quality of care, among other things. 5 We interviewed selected pharmacies that reported using medication synchronization Two large national retail chains One mid-size regional retail chain One small independent, single-store, retail pharmacy One mail order pharmacy 1 We interviewed a selected large national retail chain pharmacy that reported not using medication synchronization. 2 We interviewed two selected Medicare health plans that offer prescription drug coverage (Part D) that are among the top five Part D plans covering the largest Medicare populations—the combined Medicare Part D enrollment in these two plans totaled almost 14 million—or 31 percent of all Part D beneficiaries, as of August 2018. 2 We interviewed two selected medication synchronization vendors that contract with pharmacies to provide technological support in performing tasks such as identifying patients who would benefit from medication synchronization; determining the anchor medication; and setting up automated reminder to patients, in advance of their prescription refills. We identified these vendors in peer-reviewed studies on medication synchronization or through interviews with stakeholders. 5 We interviewed experts in medication synchronization, identified in peer-reviewed studies on medication synchronization or through interviews with stakeholders. In addition to the contact named above, Tim Bushfield, Assistant Director; Pauline Adams, Analyst-in-Charge; George Bogart; Nina Daoud; Krister Friday; Melissa Trinh-Duong Ostergard; and Vikki Porter made key contributions to this report. Andrews, S. B., T. R. Marcy, B. Osborn, and L. G. Planas. “The Impact of an Appointment‐Based Medication Synchronization Programme on Chronic Medication Adherence in an Adult Community Pharmacy Population.” Journal of Clinical Pharmacy and Therapeutics, vol. 42, no. 4 (2017): pp. 461-466. Barnes, Brenda, Ana L. Hincapie, Heidi Luder, James Kirby, Stacey Frede, and Pamela C. Heaton. “Appointment-Based Models: A Comparison of Three Model Designs in a Large Chain Community Pharmacy Setting.” Journal of the American Pharmacists Association, vol. 58, no. 2 (2018): pp. 156-162. Butler, Kendra T., Janelle F. Ruisinger, Jessica Bates, Emily S. Prohaska, and Brittany L. Melton. “Participant Satisfaction with a Community-Based Medication Synchronization Program.” Journal of the American Pharmacists Association, vol. 55, no. 5 (2015): pp. 534-539. Dao, Nancy, Sun Lee, Micah Hata, and Lord Sarino. “Impact of Appointment-Based Medication Synchronization on Proportion of Days Covered for Chronic Medications.” Pharmacy, vol. 6, no. 2 (2018): pp. 1- 9. DiDonato, Kristen L., Kristin R. Vetter, Yifei Liu, Justin R. May, and D. Matthew Hartwig. “Examining the Effect of a Medication Synchronization or an Education Program on Health Outcomes of Hypertensive Patients in a Community Pharmacy Setting.” INNOVATIONS in Pharmacy, vol. 5, no. 3 (2014): pp. 1-9. Doshi, Jalpa A., Raymond Lim, Pengxiang Li, Peinie P. Young, Victor F. Lawnicki, Joseph J. State, Andrea B. Troxel, and Kevin G. Volpp. “A Synchronized Prescription Refill Program Improved Medication Adherence.” Health Affairs, vol. 35, no. 8 (2016): pp. 1504-1512. Doshi, Jalpa A., Raymond Lim, Pengxiang Li, Peinie P. Young, Victor F. Lawnicki, Andrea B. Troxel, and Kevin G. Volpp. “Synchronized Prescription Refills and Medication Adherence: A Retrospective Claims Analysis.” American Journal of Managed Care, vol. 23, no. 2 (2017): pp. 98-104. Ghassemi, Emily, Jennifer Smith, Laura Owens, Charles Herring, and Melissa Holland. “Relationship Between Medication Synchronization and Antiretroviral Adherence.” Journal of the American Pharmacists Association, vol. 58, no. 4 (2018): pp. S78-S82. Girdish, Charmaine, William Shrank, Sarah Freytag, David Chen, Doug Gebhard, Andrew Bunton, Niteesh Choudhry, and Jennifer Polinski. “The Impact of a Retail Prescription Synchronization Program on Medication Adherence.” Journal of the American Pharmacists Association, vol. 57, no. 5 (2017): pp. 579-584. Hinson, Jessica L., Gretchen K. Garofoli, and Betsy M. Elswick. “The Impact of Medication Synchronization on Quality Care Criteria in an Independent Community Pharmacy.” Journal of the American Pharmacists Association, vol. 57, no. 2 (2017): pp. 236-240. Holdford, David A., and Timothy J. Inocencio. “Adherence and Persistence Associated with an Appointment-Based Medication Synchronization Program.” Journal of the American Pharmacists Association, vol. 53, no. 6 (2013): pp. 576-583. Holdford, David, and Kunal Saxena. “Impact of Appointment-Based Medication Synchronization on Existing Users of Chronic Medications.” Journal of Managed Care & Specialty Pharmacy, vol. 21, no. 8 (2015): pp. 662-669. Krumme, Alexis A., Robert J. Glynn, Sebastian Schneeweiss, Joshua J. Gagne, J. Samantha Dougherty, Gregory Brill, and Niteesh K. Choudhry. “Medication Synchronization Programs Improve Adherence to Cardiovascular Medications and Health Care Use.” Health Affairs, vol. 37, no. 1 (2018): pp. 125-133. Krumme, Alexis A., Danielle L. Isaman, Samuel F. Stolpe, J. Samantha Dougherty, and Niteesh K. Choudhry. “Prevalence, Effectiveness, and Characteristics of Pharmacy-Based Medication Synchronization Programs.” American Journal of Managed Care, vol. 22, no. 3 (2016): pp. 179-186. Luder, Heidi R., Natalie Kunze, Pamela C. Heaton, and Stacey M. Frede. “An Appointment-Based Model to Systematically Assess and Administer Vaccinations.” Journal of the American Pharmacists Association, vol. 58, no. 3 (2018): pp. 290-295. Nguyen, E., and D. M. Sobieraj. “The Impact of Appointment‐Based Medication Synchronization on Medication Taking Behaviour and Health Outcomes: A Systematic Review.” Journal of Clinical Pharmacy and Therapeutics, vol. 42, no. 4 (2017): pp. 404-413. Patterson, Julie, and David Holdford. “Understanding the Dissemination of Appointment-Based Synchronization Models Using the CFIR Framework.” Research in Social and Administrative Pharmacy, vol. 13, no. 5 (2017): pp. 914-921. Patterson, Julie A., David A. Holdford, and Kunal Saxena. “Cost-Benefit of Appointment-Based Medication Synchronization in Community Pharmacies.” American Journal of Managed Care, vol. 22, no. 9 (2016): pp. 587-593. Renfro, Chelsea P., Michael Patti, Jordan M. Ballou, and Stefanie P. Ferreri. “Development of a Medication Synchronization Common Language for Community Pharmacies.” Journal of the American Pharmacists Association, vol. 58, no. 5 (2018): pp. 515-521. Ross, Alexander, Humaira Jami, Heather A. Young, and Richard Katz. “Sync and Swim: The Impact of Medication Consolidation on Adherence in Medicaid Patients.” Journal of Primary Care & Community Health, vol. 4, no. 4 (2013): pp. 240-244. White, Nicole D. “Pharmacy Medication Synchronization Service Works to Improve Medication Adherence.” American Journal of Lifestyle Medicine, vol. 10, no. 6 (2016): pp. 385-387. Witry, Matthew, and Thao Hoang. “Community Pharmacist Attitudes on Medication Synchronization Programs.” INNOVATIONS in Pharmacy, vol. 8, no. 2 (2017): pp. 1-7.", "summary": "Medication adherence—that is, taking medications as prescribed—is important because not doing so increases the risk of hospitalization and can result in avoidable medical costs. According to some pharmacy industry groups, medication synchronization may help improve medication adherence, particularly for patients with multiple chronic conditions. More than 40 percent of Medicare beneficiaries had two or more chronic conditions in 2015. Congress included a provision in the Bipartisan Budget Act of 2018 for GAO to review and report on the use of medication synchronization. In this report, GAO examines (1) what is known about the use and potential effects of medication synchronization and (2) steps CMS and selected states have taken to support its use. GAO identified and reviewed 22 peer-reviewed studies on medication synchronization. In addition, GAO interviewed CMS officials and 30 stakeholders to gather a wide range of perspectives on medication synchronization. Among others, GAO interviewed six selected pharmacies and two selected Medicare health plans. GAO also reviewed CMS regulations as well as medication synchronization laws from five selected states that vary by geographic region. GAO provided a draft of this report to the Department of Health and Human Services, which provided technical comments. GAO incorporated these comments, as appropriate. Medication synchronization is a process whereby a pharmacist aligns the refill dates of two or more of a patient's medications to a single day (see figure below). GAO found that no comprehensive national data exist on the extent to which medication synchronization has been used or its potential effects. However, limited information suggests that the use of medication synchronization has increased in recent years and that it may have benefits. According to a study published in the American Journal of Managed Care that examined survey data on retail pharmacies, the number of pharmacies using medication synchronization increased from 3,324 in 2013 to 5,534 in 2014. Most of the studies that GAO identified found positive effects from medication synchronization, primarily on patients. For example, a 2018 study reported a 3 percent improvement in medication adherence among patients using medication synchronization than those who were not. Several stakeholders also identified potential limitations of using medication synchronization. For example, some patients may not be able to afford paying all the copayments for their medications at one time each month, and some patients prefer the social interaction of multiple trips to the pharmacy each month. The Centers for Medicare & Medicaid Services (CMS) issued a regulation and some states enacted laws that may help support the use of medication synchronization. While CMS does not have a formal medication synchronization policy for Medicare, a CMS regulation allows for reduced beneficiary cost sharing (for example, a lower copayment) when the beneficiary receives less than a month's supply of a medication. Similar laws pertain to private health plans that provide prescription drug coverage for patients in the five states GAO selected—Georgia, Illinois, Maine, Texas, and Washington. Such measures support medication synchronization because initially aligning the refill dates of multiple medications may require one or more of these medications to be refilled with a quantity that is less than a month's supply. Officials from CMS and four of the selected pharmacies said that lowering the copayments for these refills reduces the financial burden on patients when they first have their medications synchronized. They noted that requiring full copayments for a shorter supply may have discouraged or prevented patients from using medication synchronization.", "document_type": "gao"}
{"report": "From January through August 2017, the Navy suffered four significant mishaps at sea that resulted in the death of 17 sailors and hundreds of millions of dollars in damage to Navy surface ships (see fig.1). More recently, the Navy experienced two incidents during which Navy surface ships collided. First, on February 5, 2019, a Ticonderoga-class guided missile cruiser—USS Leyte Gulf (CG 55)—collided with a Navy resupply ship—the USNS Robert E. Peary (T-AKE 5)—while conducting an underway replenishment operation off the coast of Florida. Second, on June 21, 2019, a Freedom-class Littoral Combat Ship—the USS Billings (LCS 15)—struck a merchant ship while leaving a pier in Montreal, Canada. According to Navy officials, these recent incidents did not result in serious damage to the ships or injuries to the crews but they demonstrate the need for continued focus and attention on safe ship driving. As of March 2019, the Navy had approximately 8,400 SWOs—Navy officers whose training and primary duties focus on the operation of Navy ships at sea and the management of various shipboard systems. The Navy expects SWOs to progress over the course of their careers from Division Officers driving ships, to Department Heads participating in combat operations, to Executive Officers managing ship crews, and to Commanding Officers overseeing operations. Figure 2 below outlines a SWO’s career progression and associated shipboard duties. The Commander, Naval Surface Forces, in coordination with Office of the Chief of Naval Operations, Surface Warfare Officers School Command, and Navy Personnel Command, manages and provides ship-driving training to SWOs throughout their careers. Initially, the primary focus of a Division Officer is on leading sailors and developing ship-driving competency, ultimately working toward qualification as an Officer of the Deck and Surface Warfare Officer. Therefore, a large part of initial SWO training focuses on leading a division and developing the ship-driving skills needed to qualify and perform as an Officer of the Deck. This training is provided during a SWO’s initial training—in the Basic Division Officer Course—offered in Norfolk, Virginia, and San Diego, California, and is a mix of classroom and simulator-based training. After completing the Basic Division Officer Course, SWO candidates begin their first at-sea assignment as Division Officers. Division Officers have three primary roles aboard a ship: 1. They support ship-driving operations. New Division Officers gain ship- driving experience in pursuit of the qualification to stand as Officers of the Deck. Once qualified as Officers of the Deck, they lead watch teams in driving ships. 2. They support ship department operations under the supervision of Department Heads, and are responsible for a portion of ship equipment and operations. 3. They lead a division of approximately 12 to 50 enlisted personnel within departments, and are responsible for the administrative and supervisory duties for divisions. In addition to their Division Officer responsibilities, new Division Officers are expected to earn qualification as a SWO by completing required education and meeting experience standards, as well as gaining watchstanding experience and demonstrating proficiency in the execution of their duties, according to Navy officials. These qualifications include Officer of the Deck and Combat Information Center Watch Officer, where an officer assists in observing and analyzing information of importance for combat, among others. Navy officials stated that after an officer completes their qualifications, their Commanding Officer reviews the officer’s ability and experiences, and can grant the candidate SWO qualification. In June 2010, we reviewed Navy policies for surface force training— including initial SWO ship-driving training—and found that the Navy had reduced and altered initial SWO training as an efficiency measure, but lacked performance measures and data necessary to evaluate the impact of changes to training programs. We found that in 2003, the Navy had replaced its 6-month Division Officer course consisting of classroom and simulator training with software-based training where new Division Officers were instead expected to learn SWO skills from computer-based education software while onboard their first ship. The Navy said this change saved about $50 million annually, but we found that the Navy lacked outcome-based performance measures to evaluate the effects of these changes to training on officer performance. We recommended that the Navy develop metrics to measure the effects of training on SWO job performance, knowledge, skills, and abilities. The Navy concurred with this recommendation but did not implement the recommendation for the software training or for subsequent training programs. The Navy has enhanced ship-driving training for SWOs at the early stages of their careers following the 2017 collisions at sea, and by 2021 plans to triple the number of ship-driving training hours when compared with the amount of training SWOs were required to receive prior to the collisions. The Navy’s plans to increase ship-driving proficiency hinge on the completion of two new simulator-based training facilities—the Mariner Skills Training Centers—which are planned to be completed in June 2021 (San Diego, California) and in January 2023 (Norfolk, Virginia). Overall, the Navy plans to invest more than $467 million to develop new ship- driving training courses, build simulator facilities, and deliver the training through fiscal year 2025. Prior to the 2017 ship collisions, SWOs were required to complete 174 hours of ship-driving training during their Division Officer assignment by attending the Basic and Advanced Division Officer training courses. Following the collisions, the Navy increased the amount of required ship- driving training in these two courses to 203 hours. In June 2019, the Navy added a 4-week ship-driving course—the Junior Officer of the Deck course—that focused exclusively on building ship-driving skills. This course added 158 hours of required classroom and simulator ship-driving training. In June 2021, the Navy plans to expand the curriculum of the Junior Officer of the Deck course and rename it the Officer of the Deck Phase I course, and add an additional 3-week Officer of the Deck Phase II course. These two courses will add an additional 185 hours of required ship-driving training for Division Officers in preparation for their first and second at-sea assignments. Once these ship-driving training courses are in place, Division Officers will be required to complete a total of 535 hours of training—triple (a threefold increase in) the number of ship- driving training hours SWOs were required to complete prior to the 2017 collisions (see fig. 3). Below are detailed descriptions of the changes completed and planned to enhance ship-driving training. Basic Division Officer Course. From November 2017 through January 2019, the Surface Warfare Officers School Command changed the Basic Division Officer Course—a 9-week course for new SWO candidates—by increasing the required hours of classroom instruction and simulator training by 12 percent, and broadening the course curriculum. Specifically, prior to the 2017 collisions, SWO candidates were required to spend 113 hours (81 hours of classroom instruction and 32 hours in simulators) in this course to develop their ship-driving skills. After January 2019, however, SWO candidates were required to spend 126 hours (89 hours of classroom instruction and 37 hours in simulators) to develop their ship-driving skills. Regarding added course content, the Surface Warfare Officers School Command added subject matter including additional training on the internationally accepted ship-driving standards that govern ship maneuvers; radar navigation; and the tools used to aid ship-driving. Advanced Division Officer Course. From November 2017 through January 2019, the Surface Warfare Officers School Command changed the Advanced Division Officer Course—a 5-week course for SWOs returning from their first at-sea assignment—to improve ship-driving skills by increasing the required hours of simulator training from 24 to 36 hours. Prior to the 2017 collisions, SWOs were required to spend 61 hours (37 hours in the classroom and 24 hours in simulators) refining their ship- driving skills in this course. As of January 2019, SWOs were required to spend 77 hours (41 hours in the classroom and 36 hours in simulators) developing and honing their ship-driving skills. Surface Warfare Officers School Command officials also added subjects to classroom time to build on the subject matter presented in the Basic Division Officer Course, including more complex ship-driving techniques and advanced radar navigation. Surface Warfare Officers School Command plans to reduce the hours of training in this course once the Officer of the Deck Phase II course comes online in 2021. Junior Officer of the Deck course. In June 2019, Surface Warfare Officers School Command provided this new 4-week course for the first time—the course having been developed after the 2017 collisions and focused predominately on building ship-driving skills. The Junior Officer of the Deck course takes place after SWO candidates complete the Basic Division Officer Course and before they begin their first at-sea assignment. SWOs taking this course are required to complete 158 hours of classroom and simulator training designed to increase their ship-driving skills by exposing them to a variety of scenarios involving different maneuvers, and varying sea and weather conditions. The Navy plans to expand this course into a 6 week ship-driving training course (Officer of the Deck Phase I), scheduled to begin in June 2021. Officer of the Deck Phase I course. According to Commander, Naval Surface Forces documentation, the Junior Officer of the Deck course will expand into the Officer of the Deck Phase I course. Officer of the Deck Phase I is under development and will be 6 weeks long (an additional 2 weeks longer than Junior Officer of the Deck), and will take place after SWO candidates complete the Basic Division Officer Course and before they begin their first at-sea assignment. Officer of the Deck Phase I is intended to build on the Junior Officer of the Deck curriculum by increasing the required number of ship-driving training hours from 158 to 241, and expanding the course content to include instruction on more advanced radar navigation techniques. Surface Warfare Officers School Command and Commander, Naval Surface Forces officials expect the Officer of the Deck Phase I course to begin in June 2021. Officer of the Deck Phase II course. According to Navy documentation, the Officer of the Deck Phase II course that is under development will be 3 weeks long, and will take place after SWOs have completed their first at-sea assignment and before they attend the Advanced Division Officer Course. This course is intended to continue the development of ship- driving skills through an additional 102 hours of required classroom and simulator training. Surface Warfare Officers School Command and Commander, Naval Surface Forces officials stated that Officer of the Deck Phase II course could begin as early as June 2021. Mariner Skills Training Centers. According to Commander, Naval Surface Forces and Surface Forces documentation, Surface Warfare Officers School Command will provide the Officer of the Deck Phase I and Phase II courses at the Mariner Skills Training Centers—new simulator-based facilities expedited after the 2017 collisions. Officials from the Office of the Chief of Naval Operations stated that these facilities—including upgraded simulators, the instructors, classrooms, and the curriculum development for the Officer of the Deck Phase I and Phase II courses—will cost approximately $467.5 million through fiscal year 2025. According to Navy officials, construction on the San Diego, California Mariner Skills Training Center will begin in early fiscal year 2020 and will be complete by June 2021 and Norfolk, Virginia Mariner Skills Training Center will begin in fiscal year 2021 and will be complete in January 2023. The Mariner Skills Training Program is based upon the Littoral Combat Ship ship-driving training program, which according to the Navy, provides a balance of classroom, simulation, and shipboard experience. According to Navy officials, since Littoral Combat Ship SWOs serve in rotating crews and have less opportunity to train aboard their ships, the Navy developed the Littoral Combat Ship Training Facility to support SWOs’ training ashore (see fig. 4). The foundation of the Littoral Combat Ship ship-driving program is repetitive training in sophisticated simulators to build ship-driving proficiency. According to the Navy, the effectiveness of this training has been validated over the last 10 years by the superior ship-driving proficiency of Littoral Combat Ship officers during at-sea operations and assessment performance when compared with non- Littoral Combat Ship officers, in many cases. The Navy has relied on a series of added skill checks throughout a SWO’s career to help validate that SWOs have necessary ship-driving and other skills, but has not developed key processes and assessments to evaluate the overall effectiveness of its existing and planned training programs. The Navy is implementing a series of ten skill checks on ship-driving and other mariner tasks at various career points—for example, before a SWO begins leading a ship department and before the SWO takes command of a ship. The Commander, Naval Surface Forces, issued an instruction in September 2018 detailing ten skill checks to be conducted over the course of a SWO’s career to periodically gauge SWOs’ ship-driving skills. These checks, summarized in appendix IV, are to occur at standardized points in a SWO’s career, either during training or at the beginning or conclusion of certain at-sea assignments. Four of the ten checks were already in place at the time the instruction was issued in September 2018, with a preliminary version of a fifth check also in place. According to Navy documentation, three more of the ten checks had also been implemented as of August 2019, and Navy guidance states that the remaining checks are scheduled to be in place by 2021 or earlier. Navy officials stated they were making these checks more rigorous. For example, according to Navy officials, previously Department Heads were allowed to retake the Command Qualification Assessment ship-handling test as many times as they needed to pass the assessment. According to these officials, in 2018 Surface Warfare Officers School Command allowed only three chances to take the test, leading to five of the 256 Department Heads assessed in 2018 to be disqualified from advancing beyond the role of Department Head. Navy officials report that these skill checks are intended to enhance the development and sustainment of ship-driving proficiency across a SWO’s career and to ensure that the changes in training are resulting in competent SWOs at each level of their careers—essentially that SWOs have the skills required to perform their duties. Surface Warfare Officers School Command will administer checks during SWO training on ship- driving to better evaluate individual proficiency and target remediation for those whose performance presents significant concerns. Ship Commanding Officers will also observe and evaluate SWOs on a series of ship-driving scenarios before the completion of their first Division Officer assignment and later as a Department Head to certify that they are prepared for more advanced ship-driving training and responsibilities. While the planned skill checks are designed to help ensure that SWOs have the skills required to perform their duties, senior Navy officials stated that it could take 16 years or more to know if the planned changes to SWO training were effective in increasing Commanding Officer ship- driving proficiency across the fleet. These officials stated that they intend to closely monitor the implementation of changes to the training; however, we found a number of interrelated challenges that limit the Navy’s ability to determine in the near term if the significant investments it is making to expand and enhance SWO ship-driving training are effective. Specifically and described in detail below, in planning an approach for evaluating its efforts, the Navy has not (1) solicited fleet-wide feedback on the quality of the increased ship-driving training, (2) planned to routinely conduct ship- driving competency assessments, (3) provided standard criteria for qualifying Officer of the Deck candidates, and (4) determined how to analyze and use information from logbooks that SWOs are required to complete. The Navy’s Comprehensive Review of Recent Surface Force Incidents—one of the internal reviews completed after the 2017 mishaps—notes the importance of assessing and monitoring performance so that corrective actions can take place. In addition, federal government internal control standards state that management should use quality information and monitoring activities to ensure the agency’s objectives are achieved. Moreover, our prior work on assessing training efforts in the federal government states that an agency should evaluate the effectiveness of its training and development efforts, to include obtaining feedback, assessing competency, and analyzing relevant data. We found that while the Navy collects feedback from certain groups of SWOs, it did not have a formal fleet-wide process to solicit feedback from SWOs on the quality of the increased amount of ship-driving training or to gauge the health of the SWO community. In group discussions we held as part of our review, SWOs identified challenges that Division Officers experience in applying classroom and simulator training to their duties. According to SWOs in 19 of 24 group discussions with Department Heads and Division Officers, Division Officers have challenges in applying the ship-driving training they receive, due to factors such as differences between training curriculum and actual duties, extended lengths of time elapsed between training and application, varying ship-driving opportunities during Division Officer assignments, and difficulty retaining the large volume of course material. SWOs that participated in our discussion groups and interviews identified positive aspects of ship-driving training, as well as concerns about training material. During five of 12 ship group discussions with Division Officers, those Division Officers that had taken the Basic Division Officer Course identified positive aspects of the training such as valuable practical exercises and simulator time. However, SWOs in all 12 Division Officer group discussions also identified challenges related to this training, such as the information covered in training being too broad, and a lack of connection to actual duties on their ship. More experienced Division Officers in four of 12 Division Officer group discussions identified challenges related to the Advanced Division Officer Course, such as insufficient time in ship-driving simulators, and too much time spent covering material that Division Officers were already expected to learn during their first at-sea assignment. Commanding Officers and Executive Officers in seven of 12 interviews, and Department Heads in four of 12 group discussions likewise identified positive aspects of the Basic Division Officer Course, such as improved knowledge of ship operations for Divisions Officers that recently completed the course. However, Commanding Officers and Executive Officers in three of 12 interviews and Department Heads in seven of 12 group discussions identified challenges with the course, including areas where they had to compensate with on-the-job training for skills they felt should have been addressed in initial training, such as ship-driving proficiency in high-traffic environments. Our prior work on assessing training efforts in the federal government states that an agency should evaluate the effectiveness of its training and development efforts, to include obtaining and analyzing feedback. However, the Navy does not currently have a formal fleet-wide method of soliciting feedback from SWOs to obtain input on the quality of their classroom, simulator, and at-sea training on Division Officer performance and evaluate trends in feedback, and instead uses more limited means to assess training. For example: According to Navy officials, Surface Warfare Officers School Command conducts end-of-class surveys at the end of officer training, but no follow-up is conducted by the command after SWOs have assumed their ship duties or to obtain input from the trainees’ superior officers on the value of the training. The Navy had a survey for Division Officers and Department Heads in the past, but this survey gave little helpful feedback on training and, according to Navy officials, the Navy discontinued the survey after 2015. Surface Warfare Officers School Command assembles a board of officers from the fleet each year to review areas of its training curriculum, but Navy officials stated that participants are invited based on their expertise. As a result, only those selected to serve on the board (not officers across the fleet) have the opportunity to provide feedback. The Navy’s current means to assess training do not allow for the full range of junior and senior officers across the fleet to provide feedback on how well training prepares SWOs for their ship duties. Senior Navy officials acknowledged the value of conducting fleet-wide surveys of SWOs to obtain feedback on how to improve SWO training and gauge the health and morale of the SWO community. SWOs’ experiences in the fleet are diverse, therefore fleet-wide data is of particular value as centralized organizations like Naval Surface Forces, Surface Warfare Officers School Command, and the Office of the Chief of Naval Operations consider costly and consequential training investments. Without a method to regularly collect and analyze information from SWOs across the fleet, such as in a survey, regarding the quality of the increased classroom, simulator, and at-sea training on Division Officer performance, and evaluate trends in feedback received, Navy decision makers lack valuable information that could help them to assess the effects of training on SWO performance. Navy Surface Warfare Officer School Command training experts developed a ship-driving proficiency measurement system and used it in fiscal year 2018 to conduct ship-driving competency assessments. Specifically, from January through March 2018 Surface Warfare Officers School Command conducted “spot check” ship-driving competency assessments of 164 SWOs that had recently qualified as Officers of the Deck during their first at-sea assignment. Each assessment was conducted by three Navy inspectors that were independent of the assessed SWOs’ chain of command. The independent Navy inspectors found concerns in the ship-driving competency levels of more than 80 percent of these SWOs (see fig. 5). Specifically, Surface Warfare Officers School Command found that 29 SWOs (18 percent) had significant competency problems and 108 had some concerns (66 percent). According to Surface Warfare Officers School Command officials, those SWOs who experienced significant problems in their assessments likely should not have been qualified as Officer of the Deck at the time of the assessment because they violated fundamental ship-driving rules, among other issues. Navy guidance to the fleet emphasizes that these assessments performed by independent experts are valuable in supporting impartial results and providing quality information for analysis. According to Navy documentation, the Navy also used the 2018 competency assessments to help validate its new Junior Officer of the Deck and Officer of the Deck training curriculum. Specifically, Surface Warfare Officers School Command used the same Officer of the Deck competency assessment criteria to assess six officers in May 2018 and 12 in July 2018 that completed a pilot version of the Junior Officer of the Deck course. Surface Warfare Officer School Command found that the students with no at-sea experience that had completed a pilot of the new Junior Officer of the Deck training course in some cases outperformed qualified Officers of the Deck that had over a year of at-sea experience. According to Navy officials, the ability to compare ship-driving proficiency among populations and with earlier baselines using these competency assessments was valuable to the Navy in identifying the effects of changes to training, and could also be valuable in the future, as well. However, when we visited Surface Warfare Officers School Command in February 2019, officials told us they did not plan to conduct additional competency assessments until 2020. In meetings with Surface Warfare Officers School Command and senior Navy leaders, we noted that delaying additional assessments could limit visibility over ship driving proficiency trends and that small sample sizes could affect the Navy’s ability to make comparisons over time. In response, the Navy accelerated and expanded additional competency assessments. According to Navy officials, in spring 2019, Surface Warfare Officers School Command began to assess a sample of Division Officers using the Officer of the Deck competency assessment at the beginning of each Advanced Division Officer Course to collect and analyze performance data and refine training curriculum. Further, as of July 2019, the Navy had assessed 38 SWOs from three courses and found that the proficiency level of the SWOs assessed had not improved from the proficiency levels seen in the 2018 assessments. Senior Navy officials we met with as part of this review stated that they recognize the value in implementing periodic ship-driving competency assessments by independent inspectors to identify trends in ship-driving proficiency over time. However, we also found that the Navy has not planned to routinely conduct these assessments in the future. Specifically, in July 2019, Navy officials stated that they do not plan to complete these Officer of the Deck competency assessments beyond 2021 and plan to replace them with a different assessment at the end of the planned Officer of the Deck Phase II course. However, our analysis shows that mid-fiscal year 2024 is the first time Officer of the Deck Phase I course graduates will have completed their first at-sea assignment and be available to have their ship-driving training assessed, resulting in a multi-year gap in planned competency assessments. In order to measure the effectiveness of the full complement of Navy’s new and enhanced ship-driving training, the independent Navy inspectors will need to continue administering the Officer of the Deck competency assessments beyond 2021. In addition, an assessment performed at the end of training, such as the planned Officer of the Deck Phase II assessment, indicates the SWOs’ proficiency after additional training and may give a less accurate indication of prior at-sea proficiency. According to federal government internal control standards, management should use quality information and monitoring activities to ensure the entity’s objectives are achieved. Moreover, our prior work on assessing training efforts in the federal government states that an agency should evaluate the effectiveness of its training and development efforts, to include assessing competency and analyzing relevant data. Without routinely conducting Officer of the Deck competency assessments across the fleet using samples of sufficient size and selection methods, the Navy will be hindered in its ability to gauge fleet-wide ship driving proficiency trends and determine the effectiveness of the changes made to training, and the Navy may not know whether additional changes are needed. We found that the Navy has not provided standard criteria to ship Commanding Officers on fleet-wide ship driving proficiency expectations to inform the qualification of Officer of the Deck candidates. Instead, the Navy has determined that ship Commanding Officers should use their individual judgment in granting this qualification based on a set of required officer experiences, which the Navy refers to as Personnel Qualification Standards. Following the 2017 collisions, Surface Warfare Officers School Command developed proficiency standards to measure and test Officer of the Deck ship-driving proficiency to implement the Officer of the Deck competency assessments described above. The proficiency standards require an Officer of the Deck to demonstrate knowledge of navigation systems, rules of the road, and effective bridge resource management and to demonstrate the ability to successfully navigate high-traffic environments. However, the varying at-sea experiences of officers and subjective nature of some requirements have led to different experiences for SWO candidates working to qualify as Officer of the Deck. SWOs must complete a standard series of requirements in ship-driving and other experience before they are eligible to qualify as Officer of the Deck, with Commanding Officers granting qualification after their assessment of the SWO’s performance and fitness. However, when we held group discussions with SWOs on ships in the fleet, SWOs in nine of 12 group discussions with Division Officers, eight of 12 group discussions with Department Heads, and three of 12 interviews with Commanding Officers and Executive Officers identified significant differences in opportunities, experiences, and assessments that Division Officers experience in earning their qualification as Officers of the Deck during their first Division Officer assignment. For example: In one group discussion, Division Officers reported being qualified as Officers of the Deck without ever having stood watch at sea, with the Commanding Officer granting qualifications based on their classroom and simulator experience alone. In five of 12 group discussions with Division Officers, Division Officers stated that SWOs on ships in maintenance had few opportunities to stand watch on the bridge at sea to build proficiency in difficult ship- driving operations, but still received their qualifications. SWOs in 17 of 24 group discussions stated that some Division Officers get more ship driving experience than others before earning their Officer of the Deck qualifications. For example, Division Officers assigned to ships with more time at sea or fewer Division Officers get more experience to practice ship driving than those on ships with little time at sea or that must divide ship-driving opportunities among numerous Division Officers. Commanding Officers in three of 12 interviews reported that they had to temporarily place their Division Officers on other ships to gain qualifying experience, and had to rely on the judgment of the other ships’ Commanding Officers in determining their qualifications as Officers of the Deck. According to Navy officials, the Navy has not provided Officer of the Deck assessment criteria based on the developed proficiency standards to ship Commanding Officers, out of deference to their judgment in interpreting an officer’s preparedness to drive their ship. Navy officials emphasized the importance of allowing ship Commanding Officers to make their own determination of an officer’s preparedness to drive a ship, due to their knowledge of the ship’s operating conditions. Navy officials also stated that they considered the Officer of the Deck assessment standards to be a resource for use by Surface Warfare Officer Schools Command in assessing training curriculum and had not considered using the standards in the fleet for other purposes. However, the Navy’s 2018 and 2019 Officer of the Deck competency assessments identified significant variance in the ship-driving competency levels of recently qualified Officers of the Deck. Since the Navy has developed fleet-wide standards for assessing Officer of the Deck proficiency, the Navy could use these to provide standard Officer of the Deck assessment criteria in guidance to ship Commanding Officers. Federal government internal control standards state that management should internally communicate the necessary quality information to achieve the entity’s objectives and ensure decisions are made based on consistent standards. A SWO’s assigned ship, Commanding Officer, and operating conditions may change during a career, so a standard set of criteria would help Commanding Officers to determine what is expected of Officers of the Deck elsewhere in the fleet as they determine a junior officer’s qualification. Without providing standard Officer of the Deck assessment criteria and incorporating them into surface fleet guidance to Commanding Officers, the Navy risks creating uncertainty in Officer of the Deck qualification expectations— which can contribute to variations in ship-driving proficiency among SWOs that could jeopardize safe operations at sea. In September 2018, the Commander, Naval Surface Forces, U.S. Pacific Fleet and Commander, Naval Surface Forces Atlantic, began requiring SWOs to document their ship-driving and related experience in a handwritten logbook. The logbook—referred to as the Surface Warfare Mariner Skills Logbook (see fig. 6)—captures an officer’s experience gained during each watch aboard a ship, special evolution (e.g., underway replenishment, flight operations, and sea and anchor duty), and simulator training session. During our ship discussion groups, SWOs at the Division Officer and Department Head levels reported that they had begun filling out their logbooks and having them reviewed as required, but some acknowledged that they are inconsistently filling them out or that they were not entering any information in them. Specifically, SWOs in five of 24 discussion groups reported that logbooks are completed with inconsistent quality or not completed at all. Additionally, SWOs in four of 24 discussion groups reported that they are unaware of any plans to use the logbook information to identify any additional training needs and provide opportunities for SWOs to improve their ship-driving proficiency. Navy Personnel Command officials told us that, as of July 2019, they had received 174 summaries of Surface Warfare Mariner Skills Logbook data from Commanding Officers. Navy officials stated that over time, as they gather these data, they intend to examine the link between ship-driving proficiency and SWO experience. However, officials did not have any specific, measurable plans to analyze and use these data or to assess the completeness of these data. Federal internal control standards state that management should obtain relevant data from reliable sources and process those data into quality information to aid decision-making. Furthermore, Naval Surface Forces guidance states that the surface warfare community should analyze and use logbook data to link SWO experience with ship-driving proficiency. Despite this guidance, the Navy does not yet have a plan that includes specific steps to analyze and use logbook information to link SWO experience with ship-driving proficiency. According to senior Navy officials, while the Surface Warfare Mariner Skills Logbook is still relatively new, developing a plan to use the information would be a logical next step. Without a plan for analyzing and using Surface Warfare Mariner Skills Logbook data, the Navy cannot determine the relationship between SWO experience and ship-driving proficiency or use these data to aid decision-making. SWOs play a critical role in Navy surface fleet readiness, as they are responsible for safely driving ships at sea and successfully leading ships in Navy operations across the world. The Navy is making numerous changes and investments to enhance Surface Warfare Officer ship- driving training following the 2017 collisions at sea—with plans to triple initial training hours and spend nearly half a billion dollars to build simulator capacity to deliver this training. The Navy’s oversight of these efforts is centered on a series of added checks throughout SWOs’ careers to ensure that they have basic ship-driving and other skills. These checks are steps in the right direction but may not provide adequate assessment mechanisms in the near term and might lead to missed opportunities going forward. For example, the Navy is expanding its ship- driving training but is not planning to collect fleet-wide feedback on classroom, simulator, and at-sea training received. In addition, the Navy developed standards for conducting spot checks on ship-driving competency but is planning to stop those checks in 2021, missing an opportunity for an outside assessment and to evaluate how well new and updated training is working. Moreover, ship commanders are expected to qualify SWOs on ship driving but have not been provided standard guidance for how to do this, which can contribute to wide variations in SWO competence. Finally, the Navy has developed detailed logbooks for SWOs to track their experiences but the Navy has not developed a specific plan to analyze and use the logbook data. Without actions to address these challenges, the Navy cannot fully assess in the near term if the significant investments it is making to expand and enhance SWO ship-driving training are effective; further adjustments are necessary; and, ultimately, Navy ships are being operated safely at sea. We are making the following four recommendations to the Department of Navy: We recommend that the Secretary of the Navy ensure that the Commander, Naval Surface Forces, in coordination with Surface Warfare Officers School Command, develop a method to regularly collect feedback from SWOs across the fleet, such as in a survey, regarding the quality of their classroom, simulator, and at-sea training on Division Officer performance; and evaluates trends in the feedback received for the purpose of improving SWO training. (Recommendation 1) We recommend that the Secretary of the Navy ensure that the Commander, Naval Surface Forces, routinely conduct regular Officer of the Deck competency assessments using samples of sufficient size and using selection methods to gauge the level of fleet-wide ship-driving proficiency trends following the implementation of the planned ship- driving training programs. (Recommendation 2) We recommend that the Secretary of the Navy ensure that the Commander, Naval Surface Forces, in coordination with Surface Warfare Officers School Command, provide Commanding Officers with standard criteria to inform their evaluation of candidates for their Officer of the Deck qualification and incorporates these criteria into surface fleet guidance. (Recommendation 3) We recommend that the Secretary of the Navy ensure that the Commander, Naval Surface Forces, in coordination with Surface Warfare Officers School Command, develop a plan to analyze and use Mariner Skills Logbook information to inform decision-making. (Recommendation 4) We provided a draft of this report to DOD for review and comment. In written comments provided by the Navy through DOD (reprinted in their entirety in appendix V), the Navy concurred with all four of our recommendations and identified actions it plans to take to evaluate the effectiveness of changes to SWO training. The Navy also provided additional information and context in its comments and provided technical comments, which we incorporated as appropriate. The Navy concurred with our first recommendation that the Commander, Naval Surface Forces, in coordination with Surface Warfare Officers School Command, develop a method to regularly collect feedback from SWOs across the fleet, such as in a survey, regarding the quality of their classroom, simulator, and at-sea training on Division Officer performance; and evaluate trends in the feedback received for the purpose of improving SWO training. The Navy stated that it plans to explore additional means of garnering holistic SWO feedback regarding newly-implemented SWO training and assessments as well as gathering additional targeted feedback. However, the Navy stated that the use of performance data will remain the primary focus of surface force training improvement efforts. While using performance data is valuable, it will be important that the Navy follow through to develop a holistic means of collecting feedback, such as in a survey of SWOs across the fleet, on the effectiveness of Division Officer training on SWO performance to ensure a variety of perspectives are considered. In its comments, the Navy noted that the SWOs who participated in our ship visits and discussion groups had not experienced the changes made or planned to SWO training. We agree that our ship visits did not include officers who had experienced the expanded Division Officer training courses, as they were first introduced to the fleet in June 2019, after we had completed the majority of our work. While our discussion groups pre- date the implementation of new SWO training courses, the discussion groups we conducted with over 200 SWOs reinforced the our finding that the Navy needs to develop a method to regularly collect feedback from SWOs across the fleet. Also, the Navy plans to more than triple initial training, so routinely soliciting and analyzing feedback from SWOs on Division Officer training will be needed to determine the effectiveness of the Navy’s investments in these training programs and inform the Navy’s decisions on whether further adjustments are necessary. The Navy acknowledged that only officers participating in the Surface Warfare Officers School Command’s Board of Visitors provide direct feedback on the training curriculum. The Navy noted, however, that all available Surface Warfare units are invited to participate in Surface Warfare Officer School Board of Visitors events and so could provide feedback then. In addition, the Navy noted that Surface Warfare Officer School Command also solicits feedback through visits to fleet concentration areas and through semiannual symposiums of ship Commanding Officers. While such targeted means of collecting feedback may provide valuable information, officers may not be able to participate due to their deployment status, position on shore duty, timing of events during other personal responsibilities, or other factors. We believe that developing a method to regularly collect feedback from SWOs across the fleet would provide decision makers with valuable information that could help them assess the effects of training on SWO performance. The Navy concurred with our second recommendation that the Commander, Naval Surface Forces, routinely conduct regular Officer of the Deck competency assessments using samples of sufficient size and using selection methods to gauge the level of fleet-wide ship-driving proficiency trends following the implementation of the planned ship- driving training programs. The Navy stated that it plans to routinely collect and analyze standardized mariner skills performance data across an officer’s career path. However, the Navy stated it will use training checks, rather than the current Officer of the Deck competency assessment, to evaluate SWO performance after 2020. This presents two problems in meeting the intent of our recommendation. First, the Navy will need to ensure that the training checks are sufficiently rigorous to assess competency. Second, the Navy will not have valid data to compare the effects of training changes on competency if it changes its assessment approach. In 2018, the Navy used the Officer of the Deck competency assessment to establish a baseline of SWO ship-driving proficiency. We found that the 2018 competency assessments showed significant variation in ship- driving proficiency and the 2019 follow up assessments found that competency had not improved. In currently documented plans, the Officer of the Deck Phase II check after a Division Officer’s first assignment will occur at the end of the course. Even if the Navy changes the Officer of the Deck Phase II check to occur at the beginning of training as stated in its comments, performance data from this check cannot be directly compared with the results of the current competency assessment. Differences in assessment content or difficulty, remediation attempts, and the fact that the new check may have career implications for SWOs as a go/no-go assessment may affect proficiency measurements and pass rates. Due to these factors, we believe that a comparison between the current Officer of the Deck competency assessment and the planned Officer of the Deck Phase II check or another standard should not be considered as valid means for demonstrating changes in ship-driving proficiency over time. That is, adopting a new standard may affect the Navy’s ability to determine the impact of training on ship-driving proficiency compared with the 2018 baseline results. The Navy also stated in its comments that the SWO training and assessment continuum is designed to provide training and evaluation at all career milestone levels. The planned system of additional skills checks will provide the Navy with more insight into SWO proficiency levels over the course of an officer’s career and help the Navy to understand the effects of changes to training. As we stated in the report, we believe these checks are significant steps in the right direction but may not provide adequate assessment mechanisms in the near term. The more robust Officer of the Deck competency assessments are necessary to gauge the level of fleet-wide ship-driving proficiency trends following the implementation of the planned ship-driving training programs. Further, the Navy stated in its comments that while numerous means of assessing SWO mariner skills proficiency at various milestone levels are in place, the ultimate SWO career path goal is to develop the most proficient, experienced, and confident Commanding Officers, which occurs approximately 16 years into the SWO career path. While the quality of ship Commanding Officers is a vital component of Navy readiness and capability, the majority of SWOs do not remain in the Navy long enough to advance beyond the position of Division Officer, according to Navy documentation. Similarly few advance to the position of Commanding Officer during their career as a SWO. Since Division Officers constitute over one third of the SWO workforce and by design of the SWO career path do most of the ship-driving, it is of utmost importance to build and evaluate fundamental ship-driving skills for all Division Officers to support excellence in the ship-driving proficiency across the Navy. Finally, the Navy stated in its comments that our report language implies an absence of any Officer of the Deck assessments from 2021 through 2024. We acknowledge that the Navy will conduct assessments of Officers of the Deck during this time period in line with its planned system of ten checks over a SWO’s career. However, without maintaining the current Officer of the Deck competency assessments through at least 2024, the Navy will be unable to demonstrate any proficiency improvement, compared with the 2018 baseline, resulting from its new training programs. Further, the Navy stated in its comments that it is important to clarify that the SWOs who received competency checks in 2019 had not benefitted from the new and expanded ship-driving training courses. Our ship visits did not include officers who had experienced the expanded Division Officer training courses, as they were first introduced to the fleet in June 2019. Nonetheless, it is concerning that SWO competency had not improved in the 2 years since the 2017 collisions despite the fleet-wide attention to improving ship-driving skills. The Navy concurred with our third recommendation that the Commander, Naval Surface Forces, in coordination with Surface Warfare Officers School Command, provide Commanding Officers with standard criteria to inform their evaluation of candidates for their Officer of the Deck qualification and incorporate these criteria into surface fleet guidance. However, the Navy stated that such criteria are already in place. Specifically, the Navy noted that existing Personnel Qualification Standards provide the standard evaluation criteria for the Officer of the Deck qualification. We agree that the Personnel Qualification Standards are in place, but disagree that Qualification Standards provide standard evaluation criteria. Unless the Navy provides additional guidance for Commanding Officers to measure proficiency in addition to the list of required experiences present in the Personnel Qualification Standards, the actions the Navy identified as addressing our recommendation will not meet the intent of our recommendation. The Navy’s Officer of the Deck Personnel Qualification Standards provide a list of required experiences; however, the 2018 and 2019 competency assessments indicate that these existing criteria have not resulted in high levels of proficiency among Officers of the Deck. The Navy’s Personnel Qualification Standards do not require SWOs to demonstrate a standard level of proficiency, but rather that SWOs participate in a required number of ship-driving experiences at a level determined by his or her Commanding Officer. The absence of a common proficiency standard across the Navy may contribute to inconsistency in ship-driving skills among SWOs. Since the Officer of the Deck competency assessment provides a means to measure proficiency, communicating appropriate standards in line with those used in the current assessments as qualification criteria would help ensure a common understanding of proficiency expectations. In comments, the Navy stated that for junior officers whose ships experience maintenance periods, it is an historic surface force-wide practice for Commanding Officers to temporarily assign those officers to similar ships whose operational schedule better support qualification. This practice is understandable and may contribute to SWO career development, but can lead to significant differences in opportunities, experiences, and assessments that SWOs receive during their first Division Officer assignment. For example, as noted in our report, some Commanding Officers stated because of this temporary assignment, they had to rely on the judgment of the other ships’ Commanding Officers to determine their SWOs’ qualifications as Officers of the Deck. The Navy concurred with our fourth recommendation that Commander, Naval Surface Forces, in coordination with Surface Warfare Officer School Command, develop a plan to analyze and use Mariner Skills Logbook information to inform decision-making. The Navy noted that it would comprehensively evaluate performance data relative to Mariner Skills Logbook data in order to refine mariner skill milestone performance and proficiency criteria. If Navy efforts result in a plan that includes specific and measurable steps for analyzing and using Mariner Skills Logbook data, the efforts will meet the intent of our recommendation. In its comments the Navy stated that during the time we conducted our group discussions (i.e. January through April 2019), Mariner Skills Logbooks were still being introduced to the Fleet and recording practices were still being established. While at the time of our discussion groups the Mariner Skills Logbooks were relatively new, in September 2018, the Navy issued an instruction that established guidance for the implementation and use of the logbooks. In addition, all of the SWOs we met with as part of our review had already received their Mariner Skills Logbooks. We are sending copies of this report to congressional committees, the Secretary of Defense, the Secretary of the Navy, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-3489 or pendletonj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. Following the four 2017 mishaps at sea, the Navy completed two internal reviews on surface fleet readiness, ultimately compiling 111 recommendations for improvement. The Navy established a Readiness Reform and Oversight Council under the leadership of the Vice Chief of Naval Operations to oversee implementation of these recommendations. The Readiness Reform and Oversight Council reported in February 2019 that it considered 91 of these recommendations to be implemented. We reviewed the recommendations, identified 12 recommendations related to Surface Warfare Officer (SWO) initial ship-driving training, and requested the implementation status of each of these recommendations from the Commander, Naval Surface Forces. The Navy considers a recommendation to be “implemented” when there is a policy in place or action has been taken to address a recommendation. The Navy considers a recommendation to be “transitioned” when the Readiness Reform and Oversight Council no longer maintains regular oversight of a recommendation and has transitioned oversight to another Navy organization. As of August 2019, the Navy considered all 12 of the recommendations related to ship-driving training as implemented with the final recommendation estimated to transition by September 30, 2019. Table 1 lists the 12 recommendations related to SWO initial ship-driving training, and our summary of the Navy’s explanation for why they are considered to be implemented. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 and Senate Armed Services Committee report 115-262 to accompany a bill for the National Defense Authorization Act for Fiscal Year 2019 contained provisions that we review Surface Warfare Officer (SWO) training and career paths. This report (1) describes the changes the Navy has made or planned to SWO ship-driving training since the 2017 collisions and (2) assesses the extent to which the Navy has taken actions to evaluate the effectiveness of those changes. We plan to issue a separate report on SWO career paths in the future. For objective one, we reviewed Navy documentation from Commander, Naval Surface Forces, Surface Warfare Officers School Command, and the Office of the Chief of Naval Operations on the content, purpose, cost, and status of changes made and further changes planned to ship-driving training since the 2017 collisions. We focused our analysis on changes made to SWOs’ ship-driving training at the junior officer level as the Navy prioritizes ship-driving training and ship-driving experience for junior officers, and the Navy has identified actions it is taking to address recommendations from the Navy’s two 2017 internal reviews to ensure safe operations at sea through improvements to junior officer training. We analyzed planned investments from fiscal year 2018 through fiscal year 2025 for the construction of two ship-driving training facilities and the development of three ship-driving training courses, which includes the cost of purchasing new simulators, hiring new instructors, military construction, and course curriculum development. We discussed implementation plans for the 2017 internal reviews’ recommendations with the Commander, Naval Surface Forces; officials from the Surface Warfare Officers School Command; and officials from the Readiness and Reform Oversight Council, a group within the Office of the Chief of Naval Operations established to monitor the implementation of the internal reviews’ recommendations. For objective two, we reviewed Navy documentation and interviewed Navy officials on how they evaluate SWOs throughout their careers, gather and use feedback from SWOs, assess the effectiveness of SWO ship-driving training, and use available data to inform decisions regarding SWO training. Specifically, we reviewed the implementation of the 10 career milestone checks outlined in Naval Surface Forces Instruction 1412.5 Surface Warfare Officer Milestone Mariner Skills Assessments, Evaluations, and Competency Checks that are to be administered during a SWO’s career; Navy’s efforts to collect feedback from the surface fleet on the quality of SWO ship-driving training and the health of the SWO community; Navy’s 2018 Officer of the Deck competency assessment results, criteria, and plans to continue evaluating SWO ship-driving competency; extent to which the Navy had provided standardized criteria for ships’ Commanding Officers to use when evaluating SWO’s for ship-driving qualification; and format of SWO Mariner Skills Logbooks used to track SWO ship- driving experiences, and Navy policies regarding the logbooks. To do this we compared the Navy’s practices with relevant Navy reviews, instructions, and guidance, Standards for Internal Control in the Federal Government, and our prior work on assessing training efforts in the federal government. We assessed the reliability of the results of the Navy’s 2018 Officer of the Deck competency assessments by examining them for missing values, comparing other sources that provide the same types of data to ensure consistency, and interviewing knowledgeable agency officials regarding the assessments’ accuracy and completeness. In addition, we reviewed the Navy’s internal controls for performing the assessments, such as grading criteria and use of independent inspectors to ensure quality and consistency in the information. We determined that the results of the Navy’s 2018 Officer of the Deck competency assessments were sufficiently reliable for the purposes of reporting on the number and percentage of the graded categories. In addition to meeting with Navy offices, we visited 12 surface ships in the Pacific and Atlantic fleets from January through April 2019, selected according to which ships and crews were available at each of the sites we visited. Aboard the ships we held group discussions and interviews with approximately 225 SWOs to discuss their views on the sufficiency and appropriateness of SWO training. Discussion group sizes ranged from two to 20 SWOs. In conducting these group discussions, we held 24 group discussions, with two separate discussions for each of the 12 ships—one with Department Heads and one with Division Officers; interviewed Commanding and Executive Officers aboard each of the 12 ships, where available; and conducted each group discussion without the group’s supervisors or subordinates present. The ship crews we visited were those the Navy identified as available to hold group discussions with us during site visits, and the results of these group discussions are not generalizable to anyone outside these groups. Due to the timing of our work, the interviews and group discussions did not include SWOs that experienced changes made or planned for SWO training beyond April 2019. We asked each group a standard set of questions to obtain their views on the following topics: the sufficiency and appropriateness of SWO training programs in preparing SWOs for their ship responsibilities, including ship driving; the SWO career path, including the potential benefits and drawbacks of more specialized career paths; and any opportunities to improve the SWO community. We conducted an analysis of the discussion group responses to identify common themes and provide illustrative examples in our report. Specifically, we reviewed the responses received during discussion groups, grouped the responses by themes, and counted how many discussion groups and interviews provided similar feedback to our questions. One GAO analyst conducted this analysis, coding the information and entering it into a record of summary, and a different GAO analyst checked the information for accuracy and agreement on themes. Any initial disagreements in the coding were discussed and reconciled by the analysts. The analysts then tallied the responses to determine the extent to which the certain themes were covered during our discussion groups and interviews. We interviewed officials, or where appropriate, obtained documentation at the organizations listed below: Office of the Chief of Naval Operations Director of Surface Warfare (N96) Surface Warfare (N96) Manpower and Training Readiness Reform and Oversight Council Commander, Naval Surface Forces, U.S. Pacific Fleet Littoral Combat Ship Training Facility Navigation, Seamanship, and Ship-handling Training facility USS Ardent (MCM 12) USS Lake Champlain (CG 57) USS New Orleans (LPD 18) USS Paul Hamilton (DDG 60) USS Tulsa (LCS 16) Commander, Naval Surface Forces, Atlantic Navigation, Seamanship, and Ship-handling Training facility USS Bataan (LHD 5) USS Cole (DDG 67) USS Mahan (DDG 72) USS Mesa Verde (LPD 19) USS Oak Hill (LSD 51) USS San Antonio (LPD 17) USS San Jacinto (CG 56) Surface Warfare Officer School Command Basic Division Officer Course facilities—San Diego, California and Surface Warfare Officer (PERS-41) We conducted this performance audit from November 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Commander, Naval Surface Forces, issued an instruction in September 2018 listing ten ship-driving skill checks to be conducted periodically over the course of a Surface Warfare Officer’s (SWO) career. Failure to pass some of the checks can result in required remediation or disqualification from career advancement. Table 2 lists the ten current and planned checks as of August 2019, as well as information on their timing and content as described in the instruction. In addition to the contact named above, Chris Watson (Assistant Director), Tobin McMurdie (Analyst-in-Charge), David Beardwood, Vincent Buquicchio, Mae Jones, Amie Lesser, Shahrzad Nikoo, Michael Silver, and Brandon Voss made key contributions to this report.", "summary": "In 2017, the Navy had four mishaps at sea including two collisions that resulted in the loss of 17 sailors' lives and hundreds of millions of dollars in damage to Navy ships. In the wake of those mishaps, the Navy identified deficiencies in SWO ship-driving training and related experience as contributing factors and has undertaken a number of efforts to improve these areas. Senate Report 115-262, accompanying a bill for the Fiscal Year 2019 National Defense Authorization Act, contained a provision that GAO assess SWO training. This report (1) describes the changes the Navy has made to SWO ship-driving training since the 2017 collisions and (2) assesses the extent to which the Navy has taken actions to evaluate the effectiveness of changes made to SWO ship-driving training. GAO reviewed and analyzed changes made to Navy training and assessment practices and related investments; interviewed cognizant officials; and conducted discussions with SWOs aboard 12 ships. Since 2017, the Navy has made numerous changes and plans additional changes to enhance Surface Warfare Officer (SWO) ship-driving training. The Navy plans for these changes to result in a threefold increase in the number of initial ship-driving training hours for SWOs by 2021, compared with the number of training hours prior to the 2017 collisions (see fig.). The Navy added classroom and simulator time to existing training courses to improve ship-driving skills and is developing two additional simulator-based ship-driving courses planned for 2021. These plans hinge on the completion of two new simulator-based training facilities, scheduled for completion in June 2021 and in January 2023. The Navy has relied on added skill checks conducted throughout a SWO's career to ensure that each SWO has basic ship-driving skills, but has not put key processes and assessments in place to evaluate comprehensively the effectiveness of its changes to ship-driving training. Senior Navy officials stated that it could take 16 years or more to know if the planned changes to SWO training were effective in increasing Commanding Officer ship-driving proficiency across the fleet and stated that they intend to closely monitor the implementation of changes to the training. However, GAO found that in planning an approach for evaluating the changes, the Navy has not: (1) identified a method to solicit fleet-wide feedback on the quality of the increased ship-driving training received by SWOs; (2) planned to routinely conduct ship-driving competency “spot checks” that were instituted after the 2017 collisions despite Navy inspectors having found concerns with more than 80 percent of SWOs' ship-driving skills; (3) provided standard criteria to ship Commanding Officers for qualifying SWOs to drive ships, contributing to significant variance in ship-driving experience and competency levels across the fleet; nor (4) developed a specific plan to analyze and use information from logbooks in which SWOs are to document ship-driving and related experience. Without addressing these challenges, the Navy cannot assess in the near term if the significant investments made to expand and enhance SWO ship-driving training are effective; further adjustments are necessary; and Navy ships are being operated safely at sea. GAO is making four recommendations to the Navy to routinely evaluate SWO training, including that the Navy collect and evaluate fleet-wide feedback on the quality of training; routinely conduct ship-driving competency assessments; provide standard criteria for qualifying ship drivers; and develop a plan to analyze and use logbook information. The Navy concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The FSM and RMI are independent countries about 3,000 miles southwest of Hawaii. The FSM is a federation of four semiautonomous states—Chuuk, Kosrae, Pohnpei, and Yap—whose population and income vary widely. Chuuk, the largest state by population, has the lowest per-capita gross domestic product (GDP). Overall, the FSM had a 2016 population of approximately 102,000 and a GDP per capita of about $3,200. The RMI’s 2016 population was approximately 54,000 with a GDP per capita of about $3,600. The RMI’s most recent census, in 2011, found that approximately three-quarters of the population lived in Majuro, the nation’s capital, and on the island of Ebeye in the Kwajalein Atoll. Table 1 shows the FSM’s, FSM states’, and RMI’s estimated populations and annual GDP per capita in fiscal year 2016. U.S. relations with the FSM and the RMI began during World War II, when the United States ended Japanese occupation of the region. Starting in 1947, the United States administered the region under a United Nations trusteeship. In 1986, after a period of negotiations, the United States entered into a compact of free association with the FSM and RMI that provided for economic assistance to the two countries, secured U.S. defense rights, and allowed FSM and RMI citizens to migrate to the United States. In 2003, after a period of negotiations, the United States approved separate amended compacts with the FSM and the RMI that went into effect on June 25, 2004, and May 1, 2004, respectively. The amended compacts’ implementing legislation authorized and appropriated direct financial assistance to the FSM and the RMI in fiscal years 2004 through 2023, with the base amounts decreasing in most years. The legislation also provided for partial inflation adjustment of the base amount of compact sector grants and trust fund contributions each year. As the base amount of compact sector grants decreases, the trust fund contributions generally increase by an equivalent amount. Because the annual inflation adjustment is less than full inflation, the value of compact sector grants declines in real terms. Figure 1 shows the amount of compact sector grants and trust fund contributions each fiscal year from 2004 through 2023. The amended compacts and associated fiscal procedures agreements require that compact sector grants support the countries in six core sectors—education, health, infrastructure, environment, private sector development, and public sector capacity building—with priority given to the education and health sectors. These grants are described in section 211(a) of each compact and are referred to as compact sector grants or 211(a) grants. Section 211(b) of the RMI compact further states that the RMI must target a specified amount of grants to Ebeye and other Marshallese communities within Kwajalein Atoll. The RMI military use and operating rights agreement (MUORA) states that the Kwajalein- related funds provided to the RMI in the compacts shall be provided through fiscal year 2023 and thereafter for as long as this agreement remains in effect. The amended compacts and their subsidiary trust fund agreements provided that each trust fund is to be managed by a compact trust fund committee. Each compact trust fund committee includes representatives from both the United States and the respective country, but the terms of the trust fund agreements require the United States to hold the majority of votes. The Director of Interior’s Office of Insular Affairs serves as the chair of each committee. Trust fund committee responsibilities include overseeing fund operation, supervision, and management; investing and distributing the fund’s resources; and concluding agreements with any other contributors and other organizations. As part of this oversight, the committees are to establish an investment and distribution policy. The committees are also to determine fiscal procedures to be used in implementing the trust fund agreements on the basis of the fiscal procedures used for compact grant administration, unless otherwise agreed by the parties to the agreement. The U.S.–FSM and U.S.–RMI trust fund agreements allow for the agreements to be amended in writing at any time, with mutual consent of the governments. However, the U.S. legislation implementing the amended compacts requires that any amendment, change, or termination of all, or any part, of the compact trust fund agreements shall not enter into force until incorporated into an act of Congress. The compact trust fund agreements state that no funds, other than specified trust fund administrative expenses, may be distributed from the funds before October 1, 2023. From fiscal year 2024 onward, the maximum allowed disbursement from each compact trust fund is the amount of the fiscal year 2023 annual grant assistance, as defined by the trust fund agreement, with full inflation adjustment. In addition, the trust fund committees may approve additional amounts for special needs. The RMI compact trust fund agreement excludes Kwajalein-related assistance, defined in section 211(b) of the RMI compact, from the calculation of the allowed disbursement. Although the compact trust fund agreements state the maximum allowable disbursement level, they do not establish or guarantee a minimum disbursement level. Each country’s compact trust fund consists of three interrelated accounts: the “A” account, the “B” account, and the “C” account. The A account is the trust fund’s corpus and contains the initial, and any additional, U.S. and FSM or RMI contributions; contributions from other countries; and investment earnings. No funds, other than specified trust fund administrative expenses, may be disbursed from the A account. The B account is the trust fund’s disbursement account and becomes active in fiscal year 2023. All income earned in 2023 will be deposited in the B account for possible disbursement in 2024. Each subsequent year’s investment income will similarly be deposited in the B account for possible disbursement the following year. If there is no investment income, no funds will be deposited in the B account for possible disbursement the following year. The C account is the trust fund’s buffer account. Through 2022, any annual income exceeding 6 percent of the fund balance is deposited in the C account. The size of the C account is capped at three times the amount of the estimated annual grant assistance in 2023, including estimated inflation. From 2023 onward, if annual income from the A account is less than the previous year’s disbursement, adjusted for inflation, the C account may be tapped to address the shortfall. After 2023, any funds in the B account in excess of the amount approved for disbursement the following fiscal year are to be used to replenish the C account as needed, up to the maximum size of the account. If there are no funds in the C account and no prior-year investment income in the B account, no funds will be available for disbursement to the countries the following year. Figure 2 shows the compact trust fund account structure and associated rules. According to the U.S. trust fund agreements with the FSM and the RMI, contributions from other donors are permitted. In May 2005, Taiwan and the RMI reached an agreement that Taiwan would contribute a total of $40 million to the RMI’s compact trust fund A account between 2004 and 2023. A “D” account may also be established to hold any contributions by the FSM and the RMI governments of revenue or income from unanticipated sources. According to the trust fund agreements, the D account must be a separate account, not mixed with the rest of the trust fund. Only the RMI has a D account, governed in part by the agreement between Taiwan and the RMI. The amended compacts’ implementing legislation incorporates, by reference, related agreements extending programs and services to the FSM and RMI. The programs and services agreement with each country identifies the following programs and services as being available to each country: U.S. postal services, weather services, civil aviation, disaster preparedness and response, and telecommunications. Each programs and services agreement extends for 20 years from the compact’s entry into force. The agreement with the FSM ends on June 24, 2024, and the agreement with the RMI ends on April 30, 2024. The amended compacts’ implementing legislation (Pub. L. No. 108-188) and other U.S. legislation authorize other U.S. grants, programs, and services for the FSM and RMI. Pub. L. No. 108-188 authorizes an annual supplemental education grant (SEG) for the FSM and RMI in fiscal years 2005 through 2023, to be awarded in place of grants formerly awarded to the countries under several U.S. education, health, and labor programs. The FSM and RMI are not eligible for the programs replaced by the SEG during these years. Unlike the compact sector grants, the amended compacts’ implementing legislation authorized the SEG but did not appropriate funds for it. Funding for the SEG is appropriated annually to the U.S. Department of Education (Education) and is transferred to Interior for disbursement. Other provisions of the amended compacts’ implementing legislation, as well as other U.S. law, make the FSM and RMI eligible for a number of additional programs. As of fiscal year 2016, compact sector grants and the SEG, each of which end in 2023, supported a substantial portion of government expenditures in the FSM and RMI. Compact sector grants and the SEG supported about one-third of all FSM government expenditures. The four FSM states relied on these grants to a greater extent than did the FSM national government. In the RMI, compact sector grants and the SEG supported about one-quarter of all government expenditures. The expiration of the compacts’ programs and services agreements in 2024 would also require the FSM and RMI to bear additional costs to provide services currently provided by the United States under the agreements. Compact sector grants, the SEG, and other U.S. grants supported almost half of FSM national and state government expenditures in fiscal year 2016. Compact sector and supplemental education grants that end in 2023 supported approximately one-third of total FSM national and state government expenditures in fiscal year 2016, while other U.S. grants supported an additional 15 percent of total FSM government expenditures (see fig. 3). In fiscal year 2016, compact sector and supplemental education grants that end in 2023 supported a larger proportion of FSM state governments’ expenditures than of the FSM national government’s expenditures. Compact sector grants and the SEG supported 8 percent of national government expenditures but supported 50 percent or more of each state’s government expenditures. Among the FSM states, Chuuk, which has both the largest population and the lowest per-capita income in the FSM, had the highest percentage of expenditures supported by U.S. grants. (See table 2 for a summary of FSM national and state government expenditures supported by compact sector grants and the SEG and by other U.S. grants.) Compact sector and supplemental education grants that end in 2023 supported approximately 25 percent of the RMI’s $123.5 million in government expenditures in fiscal year 2016, while other U.S. grants supported an additional 8 percent. Kwajalein-related compact grants that do not end in 2023 supported an additional 3 percent (see fig. 4). FSM and RMI budgets would be further affected if the countries assumed responsibility for providing programs and services currently provided by the United States. The following describes the status after 2023 of U.S. grants, programs, and services in the FSM and RMI under current law: Compact sector grants are scheduled to end in 2023, but the RMI MUORA extends the time frame of Kwajalein-related compact grants for as long as the MUORA is in effect. The SEG and additional grants identified in the amended compacts’ implementing legislation are scheduled to end in 2023. Also, after fiscal year 2023, the FSM and RMI will no longer be eligible for some programs that the SEG replaced, including Head Start (early childhood education, health, and nutrition services for low-income children and their families). The compact-related programs and services agreements with each country will end in 2024. However, some U.S. agencies, such as the National Weather Service, Federal Aviation Administration, and U.S. Agency for International Development, may continue to provide programs and services similar to those provided in the agreement under other authorities. The FSM and RMI will generally remain eligible for other programs identified in the amended compacts’ implementing legislation. These programs include U.S. Department of Agriculture (USDA) Rural Utilities Service grant and loan programs and U.S. Department of Education Pell grants for higher education and grants under Part B of the Individuals with Disabilities Education Act for children with disabilities. The FSM and RMI will remain eligible for additional programs we identified that have been provided under other current U.S. laws. Examples of these programs include USDA housing assistance programs and multiple public health, medical, and disease control and prevention grants provided by the U.S. Department of Health and Human Services. See appendix I for more information about the status after 2023 of U.S. grants, programs, and services in the FSM and RMI under current law. Our May 2018 projections for the compact trust funds showed that after fiscal year 2023, the funds are unlikely to provide maximum annual disbursements and may provide no disbursements at all in some years. The risk of disbursements below the maximum and the risk of zero disbursements increase over time for both funds. Potential strategies we analyzed in our May 2018 report would reduce or eliminate the risk of the compact trust funds’ experiencing years of zero disbursement. However, all of the potential strategies would require the countries to exchange a near-term reduction in resources for more-predictable and more- sustainable disbursements in the longer term. Our May 2018 projections for the FSM and RMI compact trust funds after 2023 indicated that, given their balance at the end of fiscal year 2017 and current compact trust fund rules—the baseline scenario—the funds will be unable to provide maximum disbursements (equal to the inflation- adjusted amount of annual grant assistance in 2023) in some years and unable to provide any disbursement at all in some years, with the likelihood of zero disbursement in a given year increasing over time. The compact trust funds’ C account—designed as a buffer to protect disbursements from the B account in years when the funds do not earn enough to fund the disbursement—could be exhausted by a series of years with low or negative annual returns. Since current rules do not allow disbursements from the compact trust fund corpus (the A account), exhaustion of the C account would result in zero disbursement in years when fund returns are zero or negative. Thus, there may be no funds available to disburse even if the funds’ A accounts have a balance. As a result of low or zero disbursements, the countries could face economic and fiscal shocks and significant challenges in planning programs and budgets. Since we published our May 2018 report, an additional year of compact trust fund performance data and updated estimates of future inflation have become available; however, the updated information does not alter the conclusions we presented in May 2018. The updated data and inflation estimates change our model’s assumptions about the current compact trust fund balance, size of future U.S. contributions to the FSM and RMI compact trust funds, annual grant assistance in fiscal year 2023, and C account balance—each of which are relevant variables for our analysis. However, the updated variables would result in only slight changes to our 2018 report’s projections of future compact trust fund performance presented in this testimony and do not alter our broader conclusions about future risks to the compact trust funds. FSM compact trust fund projections. In May 2018, our model projected that, given the baseline scenario and a 6 percent net return, the FSM compact trust fund will experience declining disbursements relative to the maximum allowable disbursements and an increasing chance of zero disbursements. (See app. I of GAO-18-415 for a full description of our methodology, and see app. V of GAO-18-415 for the baseline results with alternative net returns.) Projected disbursements. We projected that the FSM compact trust fund will, on average, be able to provide disbursements equal to 82 percent of the maximum allowable disbursement—the inflation- adjusted amount of 2023 annual grant assistance—in its first decade of disbursements. The likely average disbursement falls to 49 percent of the maximum in the next decade and falls further in subsequent decades. In addition, the amount available for disbursement may fluctuate substantially from year to year. Depending on the compact trust fund’s performance in the previous year, disbursements may be higher or lower than the average amount if the balance in the C account is not sufficient to provide additional disbursements. Likelihood of providing zero disbursement. We projected a 41 percent likelihood that the FSM compact trust fund will be unable to disburse any funds in 1 or more years during the first decade of trust fund disbursements. This likelihood increases over time, rising to 92 percent in fiscal years 2054 through 2063. Figure 5 shows our May 2018 projections of the FSM compact trust fund’s average disbursements as a percentage of maximum disbursement and the likelihood of 1 or more years of zero disbursement, given the baseline scenario and a 6 percent net return. We calculated the average disbursement as a percentage of the maximum allowable disbursement by averaging, over each 10-year period and over 10,000 simulated cases, the ratio of simulated disbursement to the maximum inflation-adjusted allowable disbursement in the given period. We calculated the likelihood of zero disbursement by counting cases with 1 or more years of zero disbursement in each of the given periods over 10,000 simulated cases. RMI compact trust fund projections. In May 2018, our model projected that, given the baseline scenario and a 6 percent net return, the RMI compact trust fund will experience declining disbursements relative to the maximum allowable disbursements and an increasing chance of zero disbursements. Projected disbursements. We projected that in its first decade of disbursements, the RMI compact trust fund will, on average, be able to provide disbursements nearly equal to the inflation-adjusted amount of 2023 annual grant assistance as defined by the trust fund agreement—the maximum allowable. However, in each subsequent decade, the projected disbursements as a percentage of the maximum disbursements decline by about 10 percentage points. In addition, from year to year, the amount available to disburse may fluctuate substantially. Depending on the compact trust fund’s performance in the previous year, disbursements may be higher or lower than the average amount if the balance in the C account is not sufficient to provide additional disbursements. Likelihood of providing zero disbursement. We projected a 15 percent likelihood that the RMI compact trust fund will be unable to disburse any funds in 1 or more years during the first decade of trust fund disbursements. This likelihood increases over time, rising to 56 percent in fiscal years 2054 through 2063. Figure 6 shows our May 2018 projections of the RMI compact trust fund’s average disbursements as a percentage of maximum disbursement and its likelihood of 1 or more years of zero disbursement, given the baseline scenario and a 6 percent net return. We calculated the average disbursement as a percentage of the maximum allowable disbursement by averaging, over each 10-year period and over 10,000 simulated cases, the ratio of simulated disbursement to the maximum inflation-adjusted allowable disbursement in the given period. We calculated the likelihood of zero disbursement by counting cases with 1 or more years of zero disbursement in each of the given periods over 10,000 simulated cases. For our May 2018 report, we conducted a series of simulations to determine the likely effects of potential strategies for improving the outlook of the FSM and RMI compact trust funds. For example, we developed and analyzed potential strategies in which annual disbursements are reduced below the maximum allowable additional annual contributions are made to the trust fund prior to the end of fiscal year 2023; and the trust fund agreement disbursement policies are modified to limit the annual disbursement to a fixed percentage of the fund’s moving average balance over the previous 3 years, up to the maximum disbursement amount defined by the current trust fund agreement. All of the potential strategies we analyzed would reduce or eliminate the risk of the compact trust funds experiencing years of zero disbursement. However, some of the potential strategies might require changing the trust fund agreements, and all of the potential strategies would require the countries to exchange a near-term reduction in resources for more- predictable and more-sustainable disbursements in the longer term. (See app. VII of our May 2018 report for detailed results of our analysis.) The compact trust fund committees have not taken the actions we recommended in 2018 to prepare for the 2023 transition to trust fund income. The committees have not yet prepared distribution policies, required by the trust fund agreements, which could assist the countries in planning for the transition to trust fund income. In addition, the committees have not established fiscal procedures for oversight of compact trust fund disbursements as required by the trust fund agreements. Further, the committees have not yet addressed a potential misalignment between the timing of their annual calculation of the amounts available to disburse and the FSM’s and RMI’s budget timelines, potentially complicating each country’s planning and management. The compact trust fund committees have not yet developed, as the compact trust fund agreements require, policies to guide disbursements from the trust funds after fiscal year 2023. Under the agreements, each trust fund committee must develop a distribution policy, with the intent that compact trust fund disbursements will provide an annual source of revenue to the FSM and RMI after the scheduled end of compact grant assistance. The trust fund committees could use distribution policies to address risks to each fund’s sustainability. For example, the committees have the discretion to disburse an amount below the established maximum. Our analysis of potential strategies for improving the funds’ outlook shows that reducing the size of disbursements would improve each compact trust fund’s long-term sustainability. Without a distribution policy that provides information about the size of expected disbursements, the FSM and RMI are hampered in their current and ongoing efforts to plan for the potential reduction in U.S. compact assistance after 2023. The compact trust fund committees have not yet established fiscal procedures for compact trust fund disbursements after fiscal year 2023. Each trust fund agreement requires the respective committee to determine the fiscal procedures to be used in implementing the trust fund agreement. The committees are to base their procedures on the compact fiscal procedures agreements, unless the parties to the trust fund agreement agree to adopt different fiscal procedures. No compact trust fund disbursements are to be made unless the committee has established such trust fund fiscal procedures. Without fiscal procedures in place, the trust fund committees will not be able to provide disbursements and the United States, the FSM, and the RMI will lack clear guidance to ensure oversight for trust fund disbursements. The timing for the compact trust fund committees’ calculation of the amounts available for annual disbursement to the FSM and the RMI after fiscal year 2023 does not align with the countries’ budget and planning timelines. The amounts available for disbursement in a given fiscal year cannot be determined until each fund’s returns have been determined at the end of the prior year. Further, if the disbursement amounts are calculated from audited fund returns as determined by annual audits required by the trust fund agreements, the amounts may not be determined until as late as March 31, 6 months into the fiscal year for which the disbursement is to be provided. However, both the FSM and the RMI government budget cycles are completed before the annual amounts available for disbursement will be known. As a result, the FSM and RMI would have to budget without knowing the amount to be disbursed, complicating their annual budget and planning processes. The compact trust fund committees, chaired by Interior, have continued to discuss potential actions to address the recommendations in our May 2018 report. In May 2018, we made six recommendations to Interior— three parallel recommendations regarding each country’s trust fund. We recommended that the Secretary of the Interior ensure that the Director of the Office of Insular Affairs work with other members of the trust fund committees to develop distribution policies, develop the fiscal procedures required by the compact trust fund address the timing of the calculation of compact trust fund disbursements. Interior concurred with our recommendations and has stated that it plans to implement them before the FSM and RMI transition to trust fund income in 2023. The FSM and RMI also concurred with our recommendations to Interior. According to the Trust Fund Administrator and Interior officials, the distribution policy was discussed at trust fund committee meetings convened since our May 2018 report. At their September 2019 meetings, the FSM and RMI compact trust fund committees did not make any decisions regarding steps to address our recommendations. The FSM’s and RMI’s transition to relying on income from the compact trust funds will likely require significant budgetary choices. However, the lack of trust fund distribution policies as well as the lack of alignment between the trust fund committees’ annual disbursement calculations and the countries’ budget cycles, hampers the countries’ ability to plan for the transition. In addition, without the required fiscal procedures governing trust fund actions after 2023, the trust fund committees will be unable to make disbursements and the United States, the FSM, and the RMI will not have assurance of necessary oversight for trust fund disbursements. However, as of September 2019, Interior had not implemented our recommendations to address these issues. Further, while Interior has continued to discuss possible actions to address our recommendations with the trust fund committees, it targeted implementation of our recommendations for 2023. Chairmen Grijalva and Engel, Ranking Members Bishop and McCaul, and Members of the Committees, this concludes my statement. I would be pleased to respond to any questions you may have. If you or your staff have any questions about this testimony, please contact David Gootnick, Director, International Affairs and Trade, at (202) 512-3149 or gootnickd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Emil Friberg (Assistant Director), Ming Chen, Neil Doherty, Mark Dowling, Reid Lowe, Moon Parks, and Michael Simon. The amended compacts, compact–related agreements, the amended compacts’ implementing legislation, and other U.S. laws provide grants or eligibility for U.S. programs and services for the Federated States of Micronesia (FSM) and Republic of the Marshall Islands (RMI). The amended compacts provide compact sector, Kwajalein-related, and audit grants. Under current law, compact sector and audit grants are each scheduled to end in 2023, but the RMI military use and operating rights agreement (MUORA) extends the time frame of Kwajalein-related compact grants for as long as the agreement is in effect. The amended compacts’ implementing legislation provides additional grants, including authorizing a supplemental education grant (SEG), and identifies several specific U.S. programs as available to the FSM and RMI. Under current law, the additional grants end in 2023, but the statutory authorizations for some programs identified in Pub. L. No. 108-188 provide for the continued eligibility of the FSM and RMI to receive benefits under the programs. However, after fiscal year 2023, the FSM and RMI will no longer be eligible under current U.S. law for some programs that the SEG replaced. The compact-related programs and services agreements with each country identify additional programs and services that the United States makes available to the FSM and RMI. While these agreements will end in 2024, under current law, some U.S. agencies may continue to provide programs and services similar to those provided in the agreement under other authorities. Based on the status of current law, the FSM’s and RMI’s eligibility for other programs we identified that have been provided under other current U.S. laws will not change after fiscal year 2023. Under current law, compact sector grants provided to the FSM and the RMI under section 211(a) of the amended compacts are scheduled to end in 2023. However, the RMI is scheduled to continue to receive $7.2 million, partially inflation adjusted, related to the U.S. military base in Kwajalein Atoll and provided under section 211(b) of its compact. Under the terms of the RMI MUORA, the United States agreed to provide these Kwajalein-related grants for as long as the MUORA is in effect. The MUORA continues until 2066 and may be extended at the discretion of the United States until 2086. The amended RMI compact provides for $18 million, partially inflation adjusted, in annual payments to the RMI government to compensate for impacts from the U.S. Army Garrison– Kwajalein Atoll. These payments will continue for as long as the MUORA is in effect. Annual compact grants of up to $500,000 (not inflation adjusted) to each country to pay for required annual audits of compact grants are scheduled to end in 2023. See table 3 for a summary of compact sector, Kwajalein-related, and audit grants. The supplemental education grant (SEG) authorized by the amended compacts’ implementing legislation is scheduled to end in fiscal year 2023 and, under current law, FSM and RMI eligibility for most programs that the SEG replaced will not resume after fiscal year 2023. Absent changes to current law, the FSM and RMI will not be eligible after fiscal year 2023 for the following programs that the SEG replaced during fiscal years 2005 through 2023: U.S. elementary and secondary education grant programs, adult education and literacy programs, career and technical education programs, job training programs, and Head Start early education programs. However, under other provisions of current law, qualifying individuals in the FSM and RMI will be eligible after fiscal year 2023 for undergraduate education grants and work-study programs that the SEG replaced. See table 4. Although the programs and services agreements with the FSM and RMI will end in fiscal year 2024, current U.S. law enables U.S. agencies to continue providing some programs and services now provided under the agreements. After the agreements end, no current provisions of U.S. law will enable the Federal Emergency Management Agency (FEMA) to provide disaster response funding, enable the Federal Deposit Insurance Corporation to provide deposit insurance, or enable the U.S. Postal Service to provide the services that it currently provides to the FSM and RMI. However, the National Weather Service, the U.S. Department of Transportation’s (DOT) Federal Aviation Administration (FAA), and the U.S. Agency for International Development (USAID) could, under other legal authorities, provide services similar to those they now provide under the programs and services agreements. National Weather Service. The programs and services agreements authorize the National Weather Service to fund the operations of weather stations in the FSM and RMI, which it can continue to fund after the end of the agreements under other authorities, according to Department of Commerce officials. Federal Aviation Administration. The programs and services agreements authorize DOT’s FAA to provide technical assistance in the FSM and RMI, which it can continue to provide after the end of the agreements under other provisions of current U.S. law. However, DOT officials stated that FAA would require new bilateral agreements with the FSM and the RMI in order for the countries to continue to receive the civil aviation safety services that FAA currently provides under the programs and services agreements. The FAA would also seek reimbursement for any technical assistance it provides to the FSM and RMI. With regard to the civil aviation economic services provided under the programs and services agreements, DOT officials stated that, while the FSM and RMI could voluntarily decide to allow U.S. air carriers to continue operations in the FSM and RMI, new bilateral agreements would be needed to assure that result. U.S. Agency for International Development. Following a U.S. presidential disaster declaration, FEMA provides the funding for disaster relief and reconstruction, which is programmed through USAID. Under current law, FEMA funds will no longer be available to the FSM and RMI for this purpose once the agreements end; however, USAID will be able to provide foreign disaster assistance funding to the two countries under the same terms as it provides this assistance to other countries. After the programs and services agreements end, FEMA will be able to support disaster relief efforts only if USAID or the countries request such support on a reimbursable basis. In addition, according to State and Interior officials, telecommunications- related services that the two agencies provide to the FSM and RMI under the programs and services agreements will continue as long as the FSM and RMI provide appropriate authorization for such services. Table 5 shows the status, under current law, of programs and services currently provided to the FSM and the RMI under the programs and services agreements after the agreements end in fiscal year 2024. Although additional grants provided to the FSM and the RMI under the amended compacts’ implementing legislation will end in fiscal year 2023, the countries’ eligibility for programs now provided under that legislation will generally continue under current U.S. law. Grants provided under the amended compacts’ implementing legislation for (1) judicial training in the FSM and the RMI, and (2) agricultural and planting programs on the RMI’s nuclear-affected Enewetak Atoll are scheduled to end. However, under current U.S. law, legal authorities permitting the operation of other programs will remain available to the FSM and RMI after fiscal year 2023. Eligibility under these legal authorities continues either because the amended compacts’ implementing legislation does not specify an ending date or because other provisions in current U.S. law make the FSM and RMI eligible for the program. Programs provided in the amended compacts’ implementing legislation include U.S. Department of Agriculture Rural Utilities Service grant and loan programs; U.S. Department of Education Pell grants for higher education and grants under Part B of the Individuals with Disabilities Education Act for children with disabilities; programs for nuclear-affected areas in the RMI; and additional programs provided by the Departments of Commerce and Labor as well as law enforcement assistance provided by the U.S. Postal Service. See table 6 for a summary of the programs identified in the amended compacts’ implementing legislation and their status as of the end of fiscal year 2023. In addition to being eligible for the programs provided through the compact, its associated agreements, and the amended compacts’ implementing legislation, the FSM and RMI are also eligible for a number of programs under other provisions of current U.S. law. The FSM and RMI have each received funds from the U.S. Department of Agriculture for forestry and rural housing programs, multiple U.S. Department of Health and Human Services public health program grants, U.S. Department of the Interior technical assistance and historic preservation programs, and the DOT FAA airport improvement program, among others. Under current U.S. law, the legal authorities permitting the provision of these programs in the FSM and RMI would not necessarily change after 2023. Table 7 shows the FSM’s and RMI’s eligibility for these additional grants and programs under current law after fiscal year 2023.", "summary": "In 2003, the United States approved amended compacts of free association with the FSM and RMI, providing a total of $3.6 billion in economic assistance in fiscal years 2004 through 2023 and access to several U.S. programs and services. Compact grant funding, overseen by the Department of the Interior (Interior), generally decreases annually. However, the amount of the annual decrease in grants is added to the annual U.S. contributions to the compact trust funds, managed by joint U.S.–FSM and U.S.–RMI trust fund committees and chaired by Interior. Trust fund earnings are intended to provide a source of income after compact grants end in 2023. This testimony summarizes GAO's May 2018 report on compact grants and trust funds (GAO-18-415). In that report, GAO examined (1) the use and role of U.S. funds and programs in the FSM and RMI budgets, (2) projected compact trust fund disbursements, and (3) trust fund committee actions needed to address the 2023 transition to trust fund income. For this testimony, GAO also reviewed key variables for its trust fund model as of June 2019 to determine whether these variables had substantially changed. In addition, GAO reviewed the status of Interior's response to GAO's May 2018 recommendations. The Federated States of Micronesia (FSM) and the Republic of the Marshall Islands (RMI) rely on U.S. grants and programs, including several that are scheduled to end in 2023. In fiscal year 2016, U.S. compact sector grants and supplemental education grants, both scheduled to end in 2023, supported a third of the FSM's expenditures and a quarter of the RMI's. Agreements providing U.S. aviation, disaster relief, postal, weather, and other programs and services are scheduled to end in 2024, but some U.S. agencies may provide programs and services similar to those in the agreements under other authorities. GAO's 2018 report noted that the FSM and RMI compact trust funds face risks and may not provide disbursements in some future years. GAO projected a 41 percent likelihood that the FSM compact trust fund would be unable to provide any disbursement in 1 or more years in fiscal years 2024 through 2033, with the likelihood increasing to 92 percent in 2054 through 2063. GAO projected a 15 percent likelihood that the RMI compact trust fund would be unable to provide any disbursement in 1 or more years in fiscal years 2024 through 2033, with the likelihood increasing to 56 percent in 2054 through 2063. Potential strategies such as reduced trust fund disbursements would reduce or eliminate the risk of years with no disbursement. However, some of these strategies would require changing the trust fund agreements, and all of the strategies would require the countries to exchange a near-term reduction in resources for more-predictable and more-sustainable disbursements in the longer term. Interior has not yet implemented the actions GAO recommended to prepare for the 2023 transition to trust fund income. The trust fund committees have not developed distribution policies, required by the agreements, which could assist the countries in planning for the transition to trust fund income. The committees have not developed the required fiscal procedures for oversight of disbursements or addressed differences between the timing of their annual determinations of the disbursement amounts and the FSM's and RMI's annual budget cycles. In its May 2018 report, GAO made three recommendations to Interior regarding each country's trust fund to address trust fund disbursement risks. Interior concurred with GAO's recommendations and has continued to discuss actions in response at trust fund committee meetings, with implementation targeted for 2023.", "document_type": "gao"}
{"report": "DOD’s policy is to ensure that eligible personnel and their families have access to affordable, quality housing facilities and services consistent with grade and dependent status, and that the housing generally reflects contemporary community living standards. From the inception of MHPI, the military departments were provided with various authorities to obtain private-sector financing and management to repair, renovate, construct, and operate military housing in the United States and its territories. These authorities included the ability to make direct loans to and invest limited amounts of funds in projects for the construction and renovation of housing units for servicemembers and their families. The projects were generally financed through both private-sector financing, such as bank loans and bonds, and funds provided by the military departments. The Army and the Navy generally structured their privatized housing projects as limited liability companies in which the military departments formed partnerships with the developers and invested funds in the partnership. The Air Force generally provided direct loans to the developers. Because privatized housing projects involve budgetary commitments of the federal government, each project was scored at inception by the Office of Management and Budget to determine the amount of funds that needed to be budgeted for that particular project. The military departments have flexibility in how they structure their privatized housing projects, but typically the military departments lease land to developers for a 50-year term and convey existing housing located on the leased land to the developer for the duration of the lease. The developer then becomes responsible for renovating and constructing new housing and for the daily management of the housing units. At the end of fiscal year 2017, 14 private partners were responsible for 79 privatized military family housing projects—34 for the Army, 32 for the Air Force, and 13 for the Navy and the Marine Corps. See appendix II for a list of all of these housing projects. Each privatized housing project is a separate and distinct entity governed by a series of legal agreements that are specific to that project, hereafter referred to as business agreements. These agreements include, among other things, an operating agreement, a property management agreement, and an agreement that describes the management of funds in the projects, including the order in which funds are allocated within the project. However, while each project is distinct, there are some common elements in how projects invest and use funds. Every project takes in revenue, which consists mostly of rent payments. Projects then pay for operating expenses, including administrative costs, day-to-day maintenance, and utilities, among other things. After that, projects generally allocate funds for taxes and insurance, followed by debt payments. Figure 1 shows a typical funding structure for a privatized housing project. In the typical privatized housing project depicted in figure 1, once debt payments are made, funds are allocated to accounts that fund scheduled maintenance, such as repair and replacement of items like roofs, heating and cooling systems, and infrastructure. After that, funds are allocated to a series of management incentive fees, such as the property management fee. Finally, the project divides these remaining funds according to a fixed percentage between accounts that (1) fund major renovations and rebuilds and (2) are provided to the developer. The percentages may vary across agreements, but according to military department documentation, typically, the majority of funds go toward the accounts funding major renovations and rebuilds. Most of the projects’ business agreements also include the option for the private partners to receive performance incentive fees based on achieving the performance metrics established in each individual project’s business agreement. These fees are intended to incentivize private partner performance. The incentive fees can be paid to private partners on an annual or quarterly basis and can be withheld in part or in total if the private partner fails to meet the established metrics. The weight each performance metric and underlying indicator carries toward the incentive fee varies by project, so incentive fees for some projects may be heavily dependent on financial performance, while others may be more heavily weighted toward resident satisfaction. The Deputy Assistant Secretary of Defense for Facilities Management, under the authority, direction, and control of the Assistant Secretary of Defense for Sustainment, is responsible for all matters related to MHPI and is the program manager for all DOD housing, whether DOD-owned, DOD-leased, or privatized. In this capacity, the Deputy Assistant Secretary is to provide both guidance and general procedures related to military housing privatization, as well as required annual reports to Congress on privatized military housing projects. However, it is the responsibility of the military departments to execute and manage the privatized housing projects, including conducting financial management and monitoring their portfolio of projects. Each military department has issued guidance that outlines its responsibilities for privatized housing, such as which offices are responsible for overseeing privatized housing projects. See figure 2 for details on each military department’s roles and responsibilities in the MHPI program. We have previously reported on DOD’s privatized housing program. In 2002, we reported that although military installation officials were participating with developers in making improvement decisions for selected projects, DOD and military department headquarters oversight of those decisions appeared limited. We recommended, among other things, that DOD implement several changes to enhance government protections in the privatization program, such as requiring service headquarters and the OSD to review and approve privatization project reinvestment account expenditures over an established threshold. DOD generally agreed with our recommendations and took steps to implement them. Specifically, DOD revised guidance to establish new rules and thresholds for review and approval of project reinvestment expenditures, among other things. In addition, in 2006, we reported that although DOD and the individual military departments implemented program oversight policies and procedures to monitor the execution and performance of privatized housing projects, opportunities existed for improvement. Specifically, we reported that the value of DOD’s semiannual report to Congress was limited because it lacked a focus on key project performance metrics to help highlight any operational concerns. We also reported that data collected on servicemember satisfaction with housing, important for tracking satisfaction over time, were inconsistent and incomplete because DOD had not issued guidance for the standardized collection and reporting of such information. We recommended, among other things, that DOD streamline its report to Congress to focus on key project performance metrics and to provide guidance to the military departments to ensure the consistent collection and reporting of housing satisfaction information from all servicemembers. DOD generally agreed with our recommendations and took steps to implement them. For example, DOD took steps to streamline its report to Congress and update its guidance directing the services to ensure consistent reporting using a numerical rating system to rank housing satisfaction information. OSD and each of the military departments conduct a range of activities to oversee both the condition of privatized housing and performance of the private partners and have recently implemented initiatives to improve this oversight—such as increasing the frequency of the physical inspection of homes and issuing guidance to ensure consistency in the framework used to measure project performance. However, we found that these oversight efforts remain limited. Specifically, our review showed (1) the scope of oversight of the physical condition of privatized housing has been limited; (2) performance metrics focused on quality of maintenance and resident satisfaction may not accurately reflect private partner performance related to the condition of privatized housing; (3) there is a lack of reliable or consistent data on the condition of privatized housing; and (4) past DOD reports to Congress on resident satisfaction are unreliable due to the inconsistent handling and calculation of the data and therefore may be misleading. The military departments have taken steps to oversee the condition of their privatized military housing inventory and each has issued guidance that outlines their respective oversight roles and responsibilities, but the scope of these oversight efforts has been limited. Military department oversight activities generally fall into two categories—(1) daily oversight of management and operations and (2) periodic reviews of compliance with each project’s business agreements. Daily oversight of management and operations. Each installation has a military housing office that is responsible for conducting daily oversight of a project’s management and operations. Military housing officials told us that activities to monitor the physical condition of housing units generally include reviewing sample work order requests, following up with a sample of residents to check on their experience with recently completed work, and inspecting homes during the change-of-occupancy process. However, the implementation and scope of these activities varies and can be limited. For example, during our site visits conducted from June through August 2019, we identified the following installation- specific practices: The rate of inspections of homes following change-of-occupancy maintenance at the installations we visited varied. For example, at the time of our site visits, military housing office officials at Tinker Air Force Base, Oklahoma, told us that they inspect 100 percent of homes that have completed change-of-occupancy maintenance, while officials from Langley Air Force Base, Virginia, stated that they inspect 10 to 20 percent of these homes. In November 2019, Air Force officials told us that they are moving to a 100-percent inspection policy. Similarly, the Army issued an order in March 2019 directing military housing office officials to inspect 100 percent of homes where change-of-occupancy maintenance has been completed. Officials from Army installations we visited noted that this was an increase from previous practices, and for one installation was a change in practice from conducting inspections only during the move-out process, which occurs prior to change-of-occupancy maintenance. According to Department of Navy officials, the Navy’s business agreements stipulate that Navy and Marine Corps installations have access to all work order information. However, practices for following up on work order records varied among some of the Navy and Marine Corps installations we visited. For example, military housing office officials at Camp Pendleton, California, told us that for one of the two partners that own housing on the base, they had access to only 3 percent of completed work orders from the previous month. For the other partner that owns housing on the base, military housing office officials noted that the partner provided them with nine work orders of varying priority each month to review. One military housing office official added that these were the minimum requirements needed for monthly reporting and that they were working with the private partner to increase their access to work order records. Following a different practice, military housing office officials at Naval Station Norfolk, Virginia, told us that they had access to the private partner’s maintenance record system and would pull reports on homes that had made six or more maintenance calls in a 30-day period. Periodic reviews of compliance with each project’s business agreements. Periodic reviews of compliance with a project’s business agreements are a joint effort between the local military housing office, the private partners, military department installation commands, and other echelons of command. These reviews can include neighborhood tours to view project amenities such as community centers, playgrounds, and pools, all of which are owned, maintained, and operated by the private partner companies, as well as exteriors of housing units. However, similar to the daily oversight activities, these annual reviews have been narrow in the scope of their assessment of the physical condition of the housing units, as interior walk-throughs were, at times, focused on just a few homes at each installation. For example: The Air Force Civil Engineer Center is the primary oversight and governance body for the Air Force’s privatized housing projects. The Air Force oversight process includes periodic compliance reviews of all privatized housing projects. To accomplish this task, the Air Force is to use a compliance checklist to review the private partner’s compliance with a project’s business agreements. In addition to the compliance reviews, guidance states that Air Force Civil Engineer Center officials visit projects annually, and officials told us that they tour a sample of homes and interview private partner representatives, military housing office staff, and residents during these visits. However, according to selected annual site visit reports we reviewed and a discussion with an Air Force official, annual site visit reports typically include only an evaluation of three to four housing units on an installation and can be restricted to empty units or units that have completed change-of-occupancy maintenance, limiting the robustness of the assessment of the installation’s housing units’ physical condition. According to Department of the Navy officials, the Navy and the Marine Corps provide oversight of privatized housing projects through a tool called the monitoring matrix. Officials from the various organizational entities involved with privatized housing—to include the Commander, Naval Installation Command; the Naval Facilities and Engineering Command; and the military housing office—are to use this monitoring matrix to periodically review private partner compliance with a project’s business agreements. The matrix contains a condition assessment component, which includes a tour of privatized housing neighborhoods and a visual inspection of individual privatized housing units. However, similar to the Air Force, according to select assessments we reviewed and a discussion with a military housing office official, the visual inspections are typically focused on two to three homes in each neighborhood on an installation and to homes that have recently undergone change-of-occupancy maintenance. Army guidance calls for the U.S. Army Corps of Engineers to conduct an annual ground lease inspection to review private partner compliance with a project’s business agreements. The guidance also calls for the Army’s program manager to conduct an annual installation visit to each project to evaluate performance and ensure a project’s compliance with the business agreements. The visit is to include a recommended site tour, described in guidance as a brief visual inspection tour of community elements, and a walk-through visual inspection of at least four housing units—two renovated and two recently built—including one unit designated as an accessible home under federal guidelines. However, according to a May 2019 report by the Army Inspector General, these requirements were inconsistently met, and the results did not include a follow-up process and were not communicated to senior commanders. Through the recent housing reviews that they have conducted, each military department’s internal oversight body has recognized that the departments’ oversight guidance has been limited in addressing the condition of privatized homes and provides little clarity to housing officials about their roles and responsibilities in assessing the physical condition of homes. For example, in May 2019, the Department of the Army Inspector General reported that senior commanders and garrison staffs expressed confusion concerning the roles, responsibilities, and authorities regarding privatized housing and that oversight, governance, and synchronization were insufficient to identify current housing challenges. Similarly, an April 2019 report from the Air Force Inspector General noted that ambiguous guidance had resulted in inconsistent action and uneven performance across Air Force housing projects. In addition, a November 2019 report by the Naval Audit Service identified nine separate guidance documents for the oversight of privatized housing and found that personnel at installation and regional levels were unclear on the guidance and requirements for performing oversight of privatized housing. According to military department officials, each department has completed initiatives and is undertaking initiatives to revise guidance and standardize daily oversight activities in an effort to provide consistent oversight across projects and installations and to increase the focus on the physical condition of housing. In addition, the military departments have initiatives to increase staffing levels, improve training for military housing office officials, and ensure that military department housing officials have independent access to work order data to strengthen their oversight activities. Figure 3 outlines examples of completed and ongoing initiatives by military department to improve the oversight of privatized housing. However, each military department is working to implement service- specific initiatives with minimal guidance from OSD on the level of oversight expected as it relates to the condition of privatized housing. OSD guidance as it pertains to the condition of privatized housing is limited compared with the guidance OSD provides for monitoring the condition of military-owned housing. Specifically, OSD guidance is focused on the oversight of the implementation of projects, the construction of new housing units, and project financial monitoring. The guidance stipulates that after privatized housing projects are awarded, monitoring should include descriptions of deal structure and strategies for project monitoring. In contrast, OSD guidance for military-owned housing provides clearly defined objectives to the military departments for oversight, including the physical condition of the homes. For example, the DOD manual for housing management directs the military departments to provide managerial oversight of DOD’s government-owned family housing to ensure that (1) the required inventory is being provided and maintained in good condition, (2) the program is being operated in an effective and cost-efficient manner, and (3) servicemembers and their families have adequate housing choices. Further, the manual provides specific objectives for the condition of DOD’s government-owned family housing, stating that for DOD family housing to be considered adequate overall, it must meet minimum standards for configuration, privacy, condition, health, and safety. It also states that military service condition assessments shall use private-sector housing industry and DOD standards or codes as a basis for assessing inventory adequacy. The manual adds that for DOD government-owned family housing to be considered in adequate condition, the construction cost for all needed repairs and improvements cannot exceed 20 percent of the replacement cost. According to DOD’s housing manual, program assumptions for privatized housing are that privatization allows the military departments to work with the private sector to generate housing built to market standards. While the military departments’ policies provide for some measureable oversight activities, such as requiring a certain number or type of home to be inspected, OSD has not provided guidance to the military departments clearly defining oversight objectives for monitoring the physical condition of privatized housing units. DOD’s housing manual further states that because privatization creates a long-term governmental interest in privatized housing, it is essential that projects be attentively monitored. The 50-year term for the ground leases creates a long-term interest in monitoring the privatized housing assets, to include the physical condition of the housing units. However, unless DOD updates its guidance on the oversight of privatized housing with objectives for overseeing the physical condition of housing units, it cannot be assured that the military departments’ oversight activities will be sustained over time or be sufficiently consistent across projects, raising the risk that private partners may not provide adequate quality housing. Notably, the military departments have entered into privatized housing agreements with some of the same companies, and members of different military services may live at installations managed by military services different than their own. As such, it is important that oversight expectations generally be consistent across the military departments and the projects they manage. Moreover, all military departments have an interest in ensuring that residents feel confident that the private partners will be held to a consistent standard for maintaining the condition of their homes. Participants in 8 of our 15 focus groups stated that they will no longer live in privatized housing following their current experience, and participants in 6 of our 15 focus groups stated that their current experience with privatized housing will affect the future career decisions for their family. One participant stated that he plans to exit the service after 8 years, noting that his decision is largely based on his experience with privatized housing. In addition, in our online tool we asked residents if their experience with privatized housing would impact their future career and housing decisions. For those residents that responded to these questions, the majority said their experience will make them less likely to continue to live in privatized housing in the future. For example, one respondent stated that while living in privatized housing is a benefit to being in the military, living in housing that is subpar and where nothing seems to be getting fixed or at least acknowledged makes the family hesitant to live in privatized housing again. Some residents also indicated that their experience would impact their future career decisions. The military departments each use a range of project-specific performance metrics to monitor private partner performance. However, the indicators underlying the metrics designed to focus on resident satisfaction and on the quality of the maintenance conducted on housing units may not provide meaningful information or reflect the actual condition of the housing units. For example, in April 2019 the Air Force Inspector General reported that the current incentive structure measures many things with precision, but does not measure the right things. Private partner performance is commonly measured through four key metrics—resident satisfaction, maintenance management, project safety, and financial management. To determine how well the private partners are performing under these metrics, military housing office officials told us that they rely on a range of indicators established in the project business agreements. Table 1 provides examples of various indicators that the performance metrics comprise. According to officials from each military department, the performance metrics and their underlying indicators are a key tool that each military department uses to hold private partners accountable for providing quality management of the privatized housing projects. However, we found that the indicators themselves may not reflect how the private partner is performing in terms of providing servicemembers and their families with quality services and housing. For example: Maintenance management: One commonly used indicator of performance in maintenance management measures how often the property manager’s response time to work orders meets required time frames established in the project’s business agreements. While this indicator measures the timeliness of the private partner’s response, it does not measure or take into account the quality of the work that was conducted or whether the resident’s issue was fully addressed. As such, a property manager may fully meet the metric for maintenance management, even if a given repair has not been adequately completed. Residents in 13 of our 15 focus groups noted that they typically have had to submit multiple work order requests before an individual maintenance issue has been fully addressed. For example, a resident who participated in one of our focus groups provided us with a copy of work orders she had submitted related to a single maintenance issue in her home. The first work order was marked completed on time, yet the resident had to submit a work order for the same issue a week later. Further, an official at one Army installation told us that since the incentive fee for the project is awarded on a quarterly basis, judging property managers only on the basis of work orders completed on time for that quarter could mask persistent ongoing housing problems. This is because many smaller work orders get closed out each quarter, while work orders for more complicated issues might stay open over multiple quarters. Some projects include indicators that aim to more directly measure quality, such as the number of work orders placed during the first 5 business days of residency. This type of indicator may more clearly indicate the extent to which change-of-occupancy maintenance was complete on a given home. Resident satisfaction: One example of an indicator of resident satisfaction is whether a project has met target occupancy rates established in the project’s business agreements. An OSD official and private partner representatives told us they use occupancy as an indicator of satisfaction, based on the assumption that residents would move if they are dissatisfied with their home’s condition. However, according to the Army’s Portfolio and Asset Management Handbook, occupancy rates are not a recommended metric to monitor private partner performance because occupancy rates already impact project finances. Our focus groups and the responses we received to our online tool also indicate that this may not be a reliable assumption. Although most residents are not required to live in military housing, residents in each of our 15 focus groups and responses to our online tool indicated a variety of reasons for choosing to live in privatized housing, many of which do not have to do with their satisfaction with the quality or condition of their homes. For example, residents in our focus groups cited other factors influencing their decision to live in privatized housing, such as living in close proximity to military medical or educational services for children or other family members that are part of the military’s Exceptional Family Member Program, a lack of safe and affordable housing in the surrounding community, and access to quality schools. Volunteers that responded to our online tool also cited accessibility to base services, commute time, and safety as reasons for choosing to live in privatized housing. Another commonly used indicator of resident satisfaction is the results of various resident satisfaction surveys, such as maintenance surveys and leasing surveys, as well as the annual satisfaction survey. The military departments and the private partners use these survey tools to gauge resident satisfaction with the maintenance conducted on their homes, service provided by property managers, and amenities provided in their community, among other things. However, residents in 4 out of our 15 focus groups indicated that the surveys they receive related to maintenance performed on their homes do not ask questions about the quality of maintenance work. For example, residents told us that maintenance surveys, which they generally receive after maintenance work is completed on their homes, ask if the maintenance worker was courteous, but not about the quality of the work performed on the home. We reviewed maintenance surveys from 3 of the 10 installations we visited and found that the surveys asked residents to provide feedback on the quality of the work, with questions asking them to rate their satisfaction with the quality of the maintenance work completed. In addition, we reviewed a quarterly Army survey from one of the installations we visited and found that this survey asked residents about their satisfaction with the courteousness and professionalism of the maintenance team and the responsiveness and timeliness of maintenance work, but did not specifically ask about their satisfaction with the quality of the maintenance work completed. We also found that the information used to support the indicators can vary. For example, officials at one Army installation—Fort Huachuca, Arizona—use quarterly resident surveys, the Army’s annual survey, and action plans on Army annual survey results as indicators of resident satisfaction. However, officials at another Army installation—Fort Knox, Kentucky—use residential community office relationship management and point of service surveys. Similarly, we found differences in the information used as indicators of the maintenance management metric. For example, officials at both Hickam Air Force Base, Hawaii, and Davis- Monthan Air Force Base, Arizona, rely on the timeliness and quality of change-of-occupancy maintenance as an indicator of maintenance management. However, officials at Hickam Air Force Base also use work order response and completion times as indicators of the maintenance management metric, whereas officials at Davis-Monthan Air Force Base, Arizona, only use work order response times. Standards for Internal Control in the Federal Government state that management should evaluate performance and hold individuals accountable for their internal control responsibilities. If management establishes incentives, management should recognize that such actions can yield unintended consequences and evaluate incentives so that they align with the entity’s standards of conduct. The standards further state that management should use quality information to achieve the entity’s objectives, including relevant data from reliable sources. In October 2019, OSD, in collaboration with the military departments and private partners, issued new guidance standardizing the performance incentive fee framework across the military departments. The new guidance provides a framework for standardizing the minimum and maximum percentages of the fee that each metric can account for, allowing for some flexibility in the weight each metric will carry for an individual project. Specifically, maintenance management and resident satisfaction can account for between 60 and 90 percent of the fee, project safety can account for between 5 and 15 percent of the fee, and financial performance can account for between 5 and 15 percent of the fee. However, despite DOD’s efforts to ensure more focus on the condition and quality of, and resident satisfaction with, privatized housing through the standardization of metrics across the military departments, the metrics may be misleading if the specific underlying indicators used to determine whether a metric has been reached are not reevaluated on an ongoing basis to ensure they are accurate measures of the private partners’ performance and an accurate reflection of the condition and quality of privatized homes. OSD and military department officials have recognized that the current indicators for measuring performance do not consistently focus on or prioritize the private partners’ performance with maintaining housing units and ensuring resident satisfaction. For example, Army officials told us they are no longer using occupancy rate as an indicator of resident satisfaction and have taken steps to standardize performance indicators across all Army projects, while still allowing for flexibility at the installation level to modify the weight of indicators to provide incentives reflective of the specific needs of the installation. Limitations to the current indicators may hinder the military departments’ ability to accurately determine private partner performance. OSD and the military department officials told us they have not yet reevaluated the specific indicators used to determine whether a private partner has met a specific metric because doing so will require negotiation with each of the private partners for each project. However, without reviewing the specific indicators used to award performance incentives, OSD and the military departments do not have assurance that the information the military departments are using to award these incentives reflects the actual condition of the housing. Maintenance data collected by the private partners are not captured consistently or reliably across projects for use in ongoing monitoring of the condition of privatized housing units over time. The privatized housing projects’ business agreements typically include a requirement for the private partner to maintain a records management system to record, among other things, maintenance work requested and conducted on each housing unit. According to private partner representatives from all 14 companies, each company uses commercial property management software platforms for activities such as initiating maintenance work orders and dispatching maintenance technicians. Some private partner representatives stated that while data from the work order tracking systems are primarily used to prioritize and triage maintenance work, the data were never intended to monitor the overall condition of privatized housing units. Military department officials told us that efforts are underway to monitor work order data from the private partners’ work order tracking systems in an effort to increase the military departments’ oversight and accountability of the private partners for providing quality housing to servicemembers. For example, the Army and the Navy are taking steps to create data dashboards to track installations’ work orders by priority, status, and category. However, while data from these work order tracking systems may be useful for point-in-time assessments of work order volume at a given installation, we found that these data are not captured reliably or consistently for use in ongoing monitoring of the condition of privatized housing units across projects and over time. We received and reviewed data from each of the 14 private partners’ work order tracking systems covering each of the 79 privatized housing projects. Based on our review of these data and discussions with private partner representatives, we found two primary factors that would limit the reliability or consistency of using these data for ongoing monitoring of the condition of privatized housing units over time—(1) inconsistent use of terminology in work order records and (2) differing practices for opening and closing work orders. Data in these work order tracking systems include information such as records of resident requests for service, history of work conducted on specific housing units, change-of-occupancy maintenance performed, and work completed on common areas. Residents may request service for a broad range of issues, such as lost keys, broken appliances, ceiling or wall damage, lack of hot water, or water leaks or floods. According to private partner representatives, work orders can be entered into the system by property management office staff, maintenance technicians, or call center representatives for those companies that use offsite call centers to process resident service request calls. At some installations, residents can also enter work orders into the work order tracking system through online portals or mobile applications. However, we noted cases where work orders were inconsistently entered into the work order tracking systems with respect to two primary factors— (1) how the request is described by the resident or interpreted by the individual entering the data, which can differ for each work order; and (2) the existing range of pre-established service category options in the private partner’s work order tracking system, which differ among the partners. According to private partner representatives, the individual responsible for entering the work order into the system—property management office staff, maintenance technicians, call center representatives, or residents—makes a judgment on how to categorize the work order. These factors create challenges for looking at the data across projects. Private partner representatives from one installation we met with stated that the quality of the work order data is dependent on the data input into the system. In some cases, the data input can be inaccurate or imprecise, depending on the specificity with which a resident describes his or her maintenance issue or how a staff person enters the data into the system. A private partner representative from another installation we visited stated that reporting on data from the work order tracking system can be challenging because individuals across installations inputting data may have a different interpretation of a resident’s reported issue. Private partner representatives from another installation noted that the work order tracking system they used could not be easily updated with a new category if needed, making it more difficult to identify systemic issues. For example, there is one category for all exterior repairs, but no way to break that category down into what the specific repairs are, such as roofs. In the event that there is an issue with several roofs in the same area, the private partner representative said it would be hard to identify the issue because the only option available is to look through the notes section. According to this individual, the regional maintenance technicians, not the work order tracking system, are the best resource for identifying trends or recurring issues. This inconsistent entering of information into the work order tracking systems, which occurs both within and across installations, means that the military departments cannot readily use the data to capture the prevalence of a particular issue, such as mold, among the homes in a reliable manner. For example, if someone wanted to use work order data to track instances of mold, he or she would find that these may be represented in the work order systems under a variety of service categories, such as mold or mildew, plumbing and bath, heating and cooling, or general. To isolate service requests related to mold, one may have to rely on using the service comments for each request, which can vary in their level of detail. In addition, service requests for mold issues may be entered into the work order systems under different priority levels, such as routine, urgent, or emergency. As a result of the variation in the type and amount of information collected in the work order tracking systems, work order data alone cannot be used to determine the validity of a service request, the severity of the problem, or whether the work was completed to a quality standard. Figure 4 shows examples of differences in how a perceived mold issue can be captured in these systems based on our review of the data provided by the private partners. Military department officials found similar limitations when analyzing the work order data. According to some officials, one challenge in using the work order data for oversight is that, while there are good data in the individual records, people report and record things differently. Specifically, a Navy official working with these data told us they have to consider these differences and create unique algorithms to query data for each partner. At some installations we visited, private partners noted changes in practices for opening or closing work orders, limiting the usefulness of data in monitoring the status of work orders over time and thus the condition of privatized housing. For example, according to private partner representatives at one installation we visited, a practice for tracking emergency work orders in the work order tracking system had changed in 2013. Work that comes in under an emergency priority may take several steps to complete: A maintenance technician may first have to stop the emergency, then clean up any resulting damage, before repairing the root cause and completing any finishing work. Prior to 2013, maintenance technicians would open and close new work orders for each step in the process. Under the new practice, the original work order is kept open until completion. Representatives from a different private partner described a similar change in practices, noting that if a work order was closed or recategorized before the work was finished there could be issues for how it is tracked, such as getting dropped out of the system and the work not getting done. A third partner noted the same practice, but added that an emergency work order can be downgraded to urgent or routine status during the time that the work is taking place. As a result, work order data alone may not accurately identify the number of open work orders at any given time, the time it took to address a maintenance issue, or if a maintenance request has been fully completed. Additionally, we identified anomalies in the work order data provided to us from each of the 14 partners. For example, we identified instances of, among other things, duplicate work orders, work orders with completion dates prior to the dates that the resident had submitted the work order, and work orders still listed as in-progress for more than 18 months. According to military department officials, they have increased their efforts to review data from the private partners’ work order tracking systems and have found similar anomalies. For example, a Navy official working with work order data found that a couple of homes had six or seven unique work order records in the system, but each contained identical information in the various data fields. Officials from both the Navy and Air Force have come across work order records that were marked as complete within minutes of being entered into the system or marked as complete with a date prior to the work order being open, which signaled the need for further scrutiny. Each military department has efforts underway to monitor private partner work order data in an effort to increase oversight of the quality of privatized housing. However, because neither OSD nor the military departments have identified minimum data requirements, established consistent terminology or practices for data collection, or developed processes for the military departments to validate the work order data collected by the private partners, data from these work order tracking systems are not reliable for use in the ongoing monitoring of the condition of privatized homes. Further, military department data monitoring efforts are department-specific, even though the departments have entered into privatized housing agreements with some of the same companies. Standards for Internal Control in the Federal Government state that management should use quality information to achieve the entity’s objectives and design information systems and related control activities to achieve objectives and respond to risks. Information, among other things, should be complete and accurate. The standards also state that management should define the identified information requirements at the relevant level and requisite level of specificity for appropriate personnel. Without direction from OSD to establish minimum data requirements and consistent terminology or practices for data collection, as well as a requirement for the military departments to validate the data, the military departments’ ability to use data from the private partners’ work order tracking systems to monitor the condition of privatized homes over time is limited and may vary across projects. DOD has provided periodic reports to Congress on the privatized housing program; however, reported results on resident satisfaction have been unreliable and are misleading due to (1) variances in the data the military departments collect and provide to OSD and (2) OSD’s calculation and presentation of the data. DOD is statutorily required to provide reports to Congress that include, among other things, information about military housing privatization projects’ financial health and performance and the backlog, if any, of maintenance and repairs. These reports have also included information on resident satisfaction based on the results of the annual military department satisfaction surveys. In May 2019, DOD issued its report for fiscal year 2017, which stated that overall resident satisfaction for calendar year 2017 was 87 percent. However, this number is misleading due to issues associated with the collection and calculation of the data DOD used. The military departments provide data on resident satisfaction to OSD for inclusion in DOD’s submission to Congress based on information from the annual resident satisfaction surveys. Specifically, OSD’s instructions to the military departments for the fiscal year 2017 report required the military departments to report the following: The month and year of the most recently completed tenant satisfaction survey. The number of residents surveyed and the total number of tenants who completed the survey during the reporting period. Resident responses to the question that asks: “Would you recommend privatized housing?” Results should indicate how many tenants responded “Yes,” “No,” or “Don’t Know.” However, instead of asking whether residents would recommend privatized housing, the military departments’ annual resident satisfaction survey asked residents the following: “How much do you agree or disagree with the following statement, ‘I would recommend this community to others.’” The difference in the wording between the question asked of residents and the question reported to Congress is notable, as a resident’s satisfaction with his or her community and inclination to recommend it to others may not be reflective of satisfaction with either the privatized housing unit or privatized housing in general. We also found differences in how the military departments interpreted responses to the question they asked. When asked whether they would recommend their community to others, residents were provided the following response categories on a scale of five to zero: (5) strongly agree, (4) agree, (3) neither agree nor disagree, (2) disagree, (1) strongly disagree, and (0) not applicable, no opinion, don’t know, or no answer. However, we found that the ways in which the military departments translated these responses into the “yes,” “no,” or “do not know” categories differed across the military departments, and in the case of the Army differed from year to year. For the fiscal years 2015 through 2017 reports, Navy officials told us they counted responses reported in categories 5 (strongly agree) and 4 (agree) as “yes,” responses in categories 2 (disagree) and 1 (strongly disagree) as “no,” and responses in categories 0 (not applicable, no opinion, don’t know, or no answer) and 3 (neither agree nor disagree) as “don’t know.” For the same time period, Air Force officials told us they counted responses in categories 5 (strongly agree), 4 (agree), and 3—neither agree nor disagree—as “yes,” responses in categories 2 (disagree) and 1 (strongly disagree) as “no,” and responses in category 0 (not applicable, no opinion, don’t know, or no answer) as “don’t know.” If 3 had not been counted as “yes,” the reported resident satisfaction rate would have been lower. For example, for Lackland Air Force Base, Texas, if officials had not counted responses in category 3 as “yes,” the resident satisfaction rate for newly constructed units would have been more than 20 percent lower than what was reported. The Army calculated responses differently for fiscal years 2015, 2016, and 2017. Specifically: For the fiscal year 2017 report, the Army counted responses in categories 5 (strongly agree) and 4 (agree) as “yes,” responses in categories 2 (disagree) and 1 (strongly disagree) as “no,” and responses in categories 0 (not applicable, no opinion, don’t know, or no answer) and 3 (neither agree nor disagree) as “don’t know.” For the fiscal year 2016 report, the Army counted responses in categories 5 (strongly agree) and 4 (agree) as “yes,” responses in categories 2 (disagree), 1 (strongly disagree), and 0 (not applicable, no opinion, don’t know, or no answer) as “no,” and responses in category 3 (neither agree nor disagree) as “don’t know.” For the fiscal year 2015 report, the Army counted responses in categories 5 (strongly agree), 4 (agree), and 3 (neither agree nor disagree) as “yes,” responses in categories 2 (disagree) and 1 (strongly disagree) as “no,” and responses in category 0 (not applicable, no opinion, don’t know, or no answer) as “don’t know.” In addition, we identified errors and inaccuracies in how OSD calculates these data and reports them to Congress. Specifically, we found missing data points and incorrect formulas, among other errors, in OSD’s calculation of the data submitted by the military departments. For example: The formula used by OSD to calculate overall resident satisfaction for fiscal year 2017 did not include data for several projects, including four Army projects—Fort Bragg, North Carolina; Fort Knox, Kentucky; Joint Base Lewis-McChord, Washington; and Presidio of Monterey/Naval Postgraduate School, California. As of September 30, 2017, these four projects accounted for over 18 percent of the Army’s total housing inventory. The formula used by OSD to calculate resident satisfaction by project double counted resident satisfaction data for new and unrenovated homes for Vandenberg Air Force Base, California, by incorrectly using the Vandenberg Air Force Base data for both the Vandenberg and for the Fort Huachuca/Yuma Proving Ground project. As a result, incorrect data were reported for the Fort Huachuca/Yuma Proving Ground project for some categories of homes. OSD did not include resident satisfaction data for New Orleans Naval Complex, Louisiana, in its fiscal year 2017 report to Congress, even though the Navy had included data for this project when submitting its data to OSD. OSD also reported identical resident satisfaction data for Wright-Patterson Air Force Base, Ohio, in fiscal years 2015, 2016, and 2017, despite the fact that Air Force officials noted in their submissions to OSD that the annual resident satisfaction data was from the annual resident satisfaction survey for Wright-Patterson Air Force Base conducted December 2013. Further, Army data provided to OSD had calculation errors that OSD did not reconcile. Specifically, the Army provided OSD the total number of surveys received for a project, as well as the number of surveys broken out by different housing categories. However, we found instances where the sum of the data broken out by different housing categories was not equal to the reported total number of surveys received. For example, when we reviewed data for Fort Rucker, Alabama, the calculated sum of surveys broken out by different housing categories was 1,372, but the Army reported a total of 530 surveys received, a difference of 842 surveys. Further, the presentation of data in OSD’s report to Congress is misleading because OSD did not explain the methodology it used to calculate the overall resident satisfaction percentage or include caveats to explain limitations to the data. Specifically, OSD did not include information on overall response rates to the annual satisfaction survey for each military department, nor did it include response rates by project. Low response rates can create the potential for bias in survey results. For example, in its fiscal year 2017 report, OSD reported that 25 percent of residents living in renovated homes at the MHPI project including Fort Detrick, Maryland/Walter Reed Army Medical Center, Washington, D.C., were satisfied with their housing. However, only four residents provided responses to this question, meaning that just one resident reported being satisfied. In addition, we found that OSD did not include an explanation in the report for why five projects were listed as not applicable. According to OSD officials, this error was a quality control issue that they plan to address, but the officials told us there are no plans for quality control in development at this time. The Fiscal Year 2020 NDAA includes a provision requiring each military installation to use the same satisfaction survey for tenants of military housing—including privatized military housing—the results of which are not to be shared with private partners until reviewed by DOD. The statute also states that DOD’s reports to Congress shall include additional information, such as the results of residence surveys, as well as assessments of maintenance response times, completion of maintenance requests, the dispute resolution process, overall customer service for tenants, and other factors related to the condition of privatized housing. OSD’s report to Congress states that, given DOD’s objective of improving the quality of life for its servicemembers, the degree of satisfaction military families experience in privatized housing is a critical indicator of overall program success and the military departments and private partners use tenant surveys to help assess the quality of privatized housing. Additionally, Standards for Internal Control in the Federal Government state that management should obtain relevant data from reliable internal and external sources in a timely manner based on identified information requirements. Relevant data have a logical connection with, or bearing upon, the identified information requirements. Reliable internal and external sources provide data that are reasonably free from error and bias and faithfully represent what they purport to represent. Management should evaluate both internal and external sources of data for reliability, and obtain data on a timely basis so they can be used for effective monitoring. However, the errors we identified in OSD’s data calculations, as well as the differences in how the military departments translate data provided to OSD, indicate the need for better internal controls, including a process for collecting and calculating resident satisfaction data from the military departments, and explanation of the data collected and reported on resident satisfaction to ensure they are reasonably free from error and bias and represent what they purport to represent. According to an OSD official responsible for preparing the reports to Congress, her office inherited the MHPI report process from its predecessors and had to quickly catch up on reports because DOD was behind on its reporting requirement. However, she noted her office is working with the military departments to review the resident satisfaction survey questions and will be identifying and implementing measures to ensure an accurate and reliable process to compile, calculate, report, and compare MHPI residents’ satisfaction by military department and across DOD. Additionally, for future survey data reporting, OSD officials told us they plan to research the possibility of directly collecting resident survey data from the survey administrator to minimize data transcription errors. Until OSD makes these changes to the data collection and calculation efforts that make up the department’s report to Congress and provides explanations of the data in the reports, OSD will not be able to provide Congress with an accurate picture of resident satisfaction with privatized housing. Military housing offices located at each installation are available to provide resources to servicemembers experiencing challenges with their privatized housing, among other services, but these offices have not always clearly and systematically communicated this role to residents of privatized housing. Military housing office officials noted that servicemembers living in privatized military housing primarily interact with their installation’s military housing office when they first receive orders to move to an installation. The military housing office provides new residents with information on their local housing options, to include referral services for housing options. However, military department guidance calls for the military housing office to provide continued assistance to servicemembers and their families living in privatized housing. For example, each military department has guidance that establishes the role of its housing offices in the resident dispute resolution process—specifically, if servicemembers are experiencing a dispute with the private partner: Army policy states that each installation should have an official tasked with providing support to servicemembers regarding resident issues that cannot be resolved by the private property manager. This individual is also in charge of resolving every resident complaint, and the military housing office, if required, can request mediation by the garrison commander. Air Force policy directs installation commanders to establish regular meetings with the private partners to discuss resident disputes and develop resolutions for residents’ issues. Also, the Air Force business agreements for each project are to establish Management Review Committees, in which the private project owner, Air Force housing office officials, and the Air Force Civil Engineer Center meet quarterly to review and facilitate the resolution of prevalent issues. The Navy announced a standardized two-step resolution process in May 2019 for housing residents who have issues or concerns with their current homes. The first step is to report any issue to the local property manager. If the issue is not resolved in either a timely manner or to quality standards, residents are asked to contact their local Navy housing service center, which directly reports to the installation commanding officer, or the servicemember’s chain of command. Prior to the standardization of this process, Navy guidance established a general responsibility to assist residents in the dispute resolution process and each project’s tenant lease includes specific dispute resolution processes. The Marine Corps has established a three-step dispute resolution process for residents to follow when they are experiencing a dispute with the private partner. Further, Marine Corps policy calls for each of the private partners to establish standard operating procedures that should include complaint resolution procedures. Despite established military department guidance, we found that residents were sometimes confused and lacked awareness of the availability of the military housing office to assist them with issues they were experiencing with privatized housing. For example, residents who participated in our focus groups and responded to our online tool expressed the following concerns: At least one resident in each of our focus groups noted being sometimes confused about the military housing office’s roles and responsibilities with regard to the maintenance of their home. These residents indicated they did not know the military housing office existed or could serve as a resource. Further, some individuals that responded to our online tool indicated that they did not know they could reach out to military housing office officials or their chain of command with issues related to the condition of their home. Residents in at least three of our focus groups indicated they perceived that the military housing office was not working independently of the partner or in the residents’ best interest. For example, residents in at least three focus groups noted that they viewed the military housing office as an extension of the private partner. Other residents noted that they did not know what the military housing office was or what role the office plays in managing privatized housing. In addition, residents we solicited information from through our online tool indicated that they felt they have not had any recourse in resolving issues and disagreements with private partners. For example, one individual who responded to our online tool stated that she was glad she moved off post because she now has legal recourse if the landlord does not meet maintenance requirements. The military department oversight agencies have found that the military departments have not clearly and systematically communicated their roles to residents, and resident confusion and a lack of awareness regarding the role of the military housing offices is an issue. In April 2019, the Air Force Inspector General reported that less than half of the residents interviewed used their military housing office to resolve complaints, and at some installations officials visited many residents did not know the military housing office had an oversight role. Similarly, in May 2019, the Army Inspector General reported to the Secretary of the Army that at 82 percent of Army installations with privatized housing, residents did not know how to escalate issues with either the private partner or the Army housing office. Additionally, the Army Inspector General reported that installation command teams and staff cited multiple circumstances where military housing offices and tenant advocacy roles and responsibilities were unclear. Further, military housing office officials with whom we spoke during our site visits acknowledged the gap in resident awareness regarding the existence and purpose of the military housing office. Officials also noted that at times residents were unaware of the difference between the military housing office and the private partner office due, in part, to their physical co-location and unclear building signage. For example, a military housing office official at Fort Bragg, North Carolina, told us the military housing office was the best kept secret on the installation. Moreover, residents that participated in our four focus groups at Fort Bragg expressed confusion in differentiating the Army military housing office officials from private partner representatives. Similarly, officials at the military housing office at Tinker Air Force Base, Oklahoma, told us that many residents were confused by their office’s role because the private partner office goes by the name “Tinker Housing Office.” Further, we observed that both private partner representatives and some military housing office officials are located in the same building, and signage does not distinctly indicate that the office houses both military officials and private partner representatives. In contrast, the military housing office at Camp Pendleton, California, is intentionally branded as the “Camp Pendleton Joint Housing Office” and signage indicates the office houses officials from both the Marine Corps and the installation’s private partners. See figure 5 for examples of the varying level of detail in military housing office signage. Some military housing office officials told us they have taken steps to improve resident awareness, such as increasing advertising of the military housing office’s role and contact information, using town hall meetings to inform residents of their roles and responsibilities, and rebranding their military housing offices to differentiate them from the private partners. For example, the Army housing office at Fort Sill, Oklahoma, changed its name from the “Residential Communities Initiative Housing Office” to the “Garrison Housing Office” to more clearly denote that the military housing office is not associated with the private partner. In addition, a Marine Corps housing office official provided us with a flyer, which is distributed to residents by the private partner, informing residents of housing office contact information and the service’s three-step dispute resolution process. See figure 6 for a copy of the flyer. According to DOD officials, the military departments generally decreased their staffing and oversight of daily privatized housing operations after the MHPI was enacted, which led to less ongoing resident interaction. For example, Army officials we spoke with in January 2019 told us they typically filled 80 percent of available military housing office positions across their installations. Additionally, officials stated that housing offices were generally staffed with two or three officials responsible for assisting servicemembers with housing needs both on the installation as well as in the local community. Further, the officials told us that the team at Fort Bragg, North Carolina, was decreased from about 15 to 3 positions. According to OSD officials, while housing offices should generally not require the number of personnel that were necessary prior to privatization, reductions following sequestration reduced housing staff below the level necessary to fully perform required privatized housing oversight as it was originally envisioned at the outset of the program. OSD has also recognized that the military departments’ communication with residents about their role as a resource for residents has not been clear or systematic. In February 2019, the Assistant Secretary of Defense for Sustainment testified before Congress that a way forward in addressing resident concerns would require focus in three key areas: communication, engagement, and responsiveness. In support of this, OSD and the military departments are collaborating with each of the private partners on several initiatives aimed at improving the residents’ experience with privatized housing and ensuring a consistent resident experience across installations. These initiatives include: establishing a tenant bill of rights that will clearly define tenants’ rights establishing a resident advocate position that is planned to provide advice, education, and support to the resident and advocate on the resident’s behalf in disputes with private partners; developing a common lease that provides a common framework and language in residential leases across all privatization projects; and developing a standardized formal dispute resolution process to ensure the prompt and fair resolution of disputes that arise between privatized housing landlords and residents. Despite the development of initiatives aimed at improving the resident’s experience with privatized housing and various ad hoc efforts to better brand and advertise the roles and responsibilities of some military housing offices, the military departments have not systematically or clearly communicated these efforts to residents, and military officials we met with acknowledged that there still appears to be a gap in residents’ awareness of the military housing office and its role in the dispute resolution process. Standards for Internal Control in the Federal Government state that management should externally communicate the necessary quality information to achieve the entity’s objectives. Management communicates this externally through reporting lines so that external parties can help the entity achieve its objectives and address related risks. Moving forward, having plans in place to clearly and systematically communicate the difference between the military housing office and the private partners— including the military departments’ roles, responsibilities, and military housing office locations and contact information—will better position the military departments to achieve the intended objectives of the initiatives they are currently developing with OSD. OSD, the military departments, and the private partners have identified and begun collaborating on a series of initiatives aimed at improving residents’ experience with privatized housing. According to an OSD official, a series of initiatives have been identified and are currently in various phases of development and implementation. Tri-service working groups, each chaired by a designated military department and including officials and legal counsel from each military department as well as private partner representatives, are leading efforts to develop and implement the initiatives. In addition, in the Fiscal Year 2020 NDAA, Congress established several requirements aimed at addressing military privatization housing reform. Several of the statutory requirements provide specific provisions that DOD will need to incorporate into its development and implementation of existing MHPI initiatives, as well as additional requirements aimed at improving the oversight of privatized housing. Table 2 outlines key initiatives aimed at improving privatized housing, as well as additional selected requirements mandated by the Fiscal Year 2020 NDAA. In addition to the provisions noted in table 2, the Fiscal Year 2020 NDAA included requirements for increased oversight of the physical condition of privatized housing. Specifically, the legislation required the following: The Secretary of Defense is to designate a Chief Housing Officer to oversee housing units, including the creation and standardization of policies and processes regarding housing units. The Secretary of Defense is required to establish a uniform code of basic standards for privatized military housing and plans to conduct inspections and assessment of the condition of privatized homes. The military departments are required to create a council on privatized military housing for the purposes of maintaining adequate oversight of the military housing program and serving as a mechanism to identify and resolve problems regarding privatized military housing. The head of the installation military housing office is responsible for conducting a physical inspection and approving the habitability of a vacant housing unit for the installation before the landlord managing the housing unit is authorized to offer the housing unit available for occupancy; conducting a physical inspection of the housing unit upon tenant move-out; and initiating contact with a tenant regarding the tenant’s satisfaction with his or her housing unit not later than 15 days after move-in, and again 60 days after move-in. Each installation is required to use the same satisfaction survey for tenants of military housing, including privatized military housing, and results are not to be shared with partners until reviewed by DOD. DOD and private partner representatives have cited several challenges that could affect their ability to implement initiatives aimed at improving MHPI. Specifically, key challenges include the timeliness with which they are able to implement initiatives, a lack of resources needed for implementation, and concerns that implementation could have unintended negative impacts on the financial viability of the privatized housing projects. Timeliness of implementation due to the need to collaborate with and obtain input and agreement from the large number of stakeholders involved in privatized housing. According to DOD officials and private partner representatives, many of the initiatives designed to improve privatized housing require not only agreement between DOD and the private housing partners, but also discussion with and, in some cases, approval by the project bond holders. Because DOD does not have the ability to unilaterally make changes to existing business agreements, this need for stakeholder agreement limits DOD’s control over the implementation timeline of any initiative that requires changes to a project’s business agreement—such as the implementation of a standardized dispute resolution process. Additionally, the private partners noted that the bond holders may be reluctant to agree to changes to the business agreements that could result in higher project costs. The need for more military department staff with targeted expertise. As noted earlier, the military departments had reduced their involvement in daily privatized military housing operations as part of the overall privatization effort. This included reducing staffing levels at the installations, and military housing office officials at over half of the installations we visited stated that reduced staffing levels had impacted their ability to carry out oversight duties, such as work order data analysis and housing inspections. Further, until recent issues surfaced over concerns of the quality of privatized housing, the military departments had distanced themselves from involvement in daily military housing operations. For example, the Army issued a memorandum in 2013, which has since been rescinded, stating that garrison commanders were not to authorize, direct, or permit Army representatives to initiate health and welfare inspections of privatized housing. Each of the military departments has plans to increase the military housing office staffing at each installation to allow for enhanced oversight. In particular, according to military department officials, these positions will focus on quality control and quality assurance of the maintenance of privatized homes. However, improvements to the condition of privatized housing may not be fully realized until DOD establishes a uniform code of basic standards for privatized military housing, as required by the Fiscal Year 2020 NDAA, and these new personnel are trained in these standards. The potential for unintended negative financial impacts on the projects that could outweigh the intended benefits of the initiatives. OSD officials and private partner representatives have expressed concern that some proposed initiatives could result in unintended financial consequences for the housing projects. In particular, private partner representatives noted costs from things such as legal fees associated with the development of a common lease and the various addendums that would be required and the unanticipated costs of hiring outside third party inspections. In particular, some of the private partners noted that the financial impact of unfunded requirements to projects that are already experiencing financial distress could result in even fewer funds available to reinvest in improvements to the current and future physical condition of the homes. Moreover, OSD officials told us they have concerns that some initiatives—such as increased frequency of change-of-occupancy inspections that may result in homes remaining vacant longer than planned and therefore not collecting rent—may unintentionally impact a project’s cash flow. Officials noted that some installations have large-scale housing turn over at the same time and inspections may not be able to be completed in the required time frames. For example, OSD officials said that at Fort Leavenworth, Kansas, the vast majority of homes generally turn over during a 2-week time period. Officials said that in a location like this, new oversight requirements may have a negative impact on residents’ move-in timelines, which could subsequently impact occupancy rates and project cash flow as a result of delays in rent payments. OSD officials also stated that residents’ ability to have their basic allowance housing payments segregated and held in escrow may present financial challenges to both the resident and the project. These officials noted that they did not yet know how the withholding of these payments would be implemented. According to OSD officials, as of January 2020, there are many questions surrounding the implementation of the Fiscal Year 2020 NDAA provisions. Officials told us that they have not yet assessed the impact of increased oversight on the financial viability of the MHPI projects, but stated that as they develop processes to implement each new statutory provision, the financial impact is something that needs to be considered. DOD’s Military Housing Privatization Initiative Performance Evaluation Report for fiscal year 2017 stated that the government’s interests are not always aligned with those of the private sector, and that oversight and engagement are required and expected in a public-private partnership over the long term to ensure success. We have previously reported that the military departments have not defined their risk tolerance levels for privatized housing relative to the program’s objective of providing quality housing that reflects community living. Specifically, we recognized that the Office of Management and Budget guidance on the preparation, submission, and execution of the federal budget suggests that public- private partnerships, such as privatized military housing projects, contain some elements of risk to the government. Standards for Internal Control in the Federal Government state that management should identify, analyze, and respond to risks related to achieving defined program objectives. While DOD is in the process of developing and implementing initiatives to improve privatized military housing, OSD and the military departments have not assessed the risk of the proposed initiatives on the financial viability of the privatized housing projects. According to an OSD official, the intention of privatization was to reduce the government’s role in the management of military housing and put more responsibility on the private partners. As described earlier in this report, the military departments have ramped up their oversight efforts in response to recent concerns about the condition of privatized housing by, for example, revising guidance and hiring additional staff. However, OSD has not assessed the impact of these activities on the financial viability of the MHPI projects. For example, OSD has not determined how increasing the frequency of housing office inspections and residents’ withholding of rent could impact the bottom line of some of its privatized projects. Without assessing risks to the financial viability of the MHPI projects associated with the implementation of these initiatives aimed at improving privatized housing, DOD’s efforts to improve the privatized housing program could be compromised. Further, DOD has a long-term interest in ensuring the financial health of the properties privatized under MHPI. As we have reported, typically the titles to the homes that were conveyed to the private partners and any improvements made to these homes during the duration of the ground leases will automatically revert to the military departments upon expiration or termination of the leases. DOD’s oversight of privatized housing is critical to ensure that residents are being provided with affordable, quality housing that generally reflects contemporary community living standards. In light of recent concerns about the effect of inadequate and poor quality housing on servicemembers and their families, the military departments have recently implemented steps to increase the oversight of the condition of privatized housing. However, OSD has not provided the military departments with specific objectives for this monitoring. The newly established Chief Housing Officer position, intended to standardize guidance and processes for the oversight of privatized housing, provides DOD with an opportunity to ensure that revised guidance provided to the military departments includes objectives for increased oversight. In addition to oversight of the condition of homes, DOD has taken initial steps to standardize performance incentive metrics across the military departments. However, unless efforts are made to ensure that the indicators driving these metrics accurately reflect private partners’ performance in maintaining the condition and quality of privatized homes, DOD’s ability to hold private partners accountable will remain limited. Further, while the military departments continue to increase the access to and use of work order data to monitor and track the condition of privatized housing, without consistent terminology and practices for work order data collection and processes for validating data collected from the private housing partners, the use of these data may not result in reliable findings. Finally, DOD has frequently reported high customer resident satisfaction rates as a key indicator of the success of the privatization initiative. However, the process used to collect and calculate the data used for determining these rates and limitations in its presentation to Congress raise questions about the reliability of DOD’s reports and their usefulness as an indicator of program success. By improving oversight guidance, mechanisms for measuring private partner performance, the reliability of housing data, and reporting on resident satisfaction, DOD can better ensure that MHPI is providing servicemembers with quality housing. Despite a decreased role in the daily management of privatized housing, the military departments still maintain responsibility for providing servicemembers with resources for seeking resolution to any issues identified in their privatized homes. However, without plans in place to communicate military housing office roles, responsibilities, and locations to residents of privatized housing, these individuals may not receive the full benefits of the assistance that the military housing offices provide. In light of the increased focus by DOD and Congress in ensuring that residents are aware of their rights and responsibilities, improved communication with residents about the military housing offices’ roles and responsibilities can help ensure that residents are utilizing the full range of resources available to them if they have issues with privatized housing. As OSD, the military departments, and the private partners take steps to improve the resident experience with privatized military housing and increase the department’s focus on the condition of privatized homes, ensuring that their efforts do not inadvertently harm the financial viability of these projects is key. Without assessing and mitigating the potential risk program improvements may have on the financial viability of the MHPI projects, DOD cannot ensure that these initiatives and the implementation of new statutory requirements will ultimately result in improvements to the condition of privatized housing. We are making a total of 12 recommendations—six to the Office of the Secretary of Defense, two to the Secretary of the Army, two to the Secretary of the Air Force, and two to the Secretary of the Navy: The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in collaboration with the military departments, provide updated guidance for the oversight of privatized military housing, to include oversight objectives for each service to monitor the physical condition of privatized homes over the remaining duration of the ground leases. (Recommendation 1) The Secretary of the Army should take steps, in collaboration with the Army’s private housing partners, to review the indicators underlying the privatized housing project performance metrics to ensure they provide an accurate reflection of the condition and quality of the homes. (Recommendation 2) The Secretary of the Air Force should take steps, in collaboration with the Air Force’s private housing partners, to review the indicators underlying the privatized housing project performance metrics to ensure they provide an accurate reflection of the condition and quality of the homes. (Recommendation 3) The Secretary of the Navy should take steps, in collaboration with the Navy and Marine Corps’ private housing partners, to review the indicators underlying the privatized housing project performance metrics to ensure they provide an accurate reflection of the condition and quality of the homes. (Recommendation 4) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in collaboration with the military departments and private housing partners, establish minimum data requirements and consistent terminology and practices for work order data collection for comparability across installations and projects and to track trends over time. (Recommendation 5) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment require the military departments to establish a process to validate data collected by the private housing partners to better ensure the reliability and validity of work order data and to allow for more effective use of these data for monitoring and tracking purposes. (Recommendation 6) The Secretary of Defense should ensure the Assistant Secretary of Defense for Sustainment, in collaboration with the military departments, develop a process for collecting and calculating resident satisfaction data from the military departments to ensure that the data are compiled and calculated in a standardized and accurate way. (Recommendation 7) The Secretary of Defense should ensure the Assistant Secretary of Defense for Sustainment provides additional explanation of the data collected and reported in future reports to Congress, such as explaining the limitations of available survey data, how resident satisfaction was calculated, and reasons for any missing data, among other things. (Recommendation 8) The Secretary of the Army should develop and implement a plan to clearly and systematically communicate to residents the difference between the military housing office and the private partner. At a minimum, these plans should include the Army housing office’s roles, responsibilities, locations, and contact information and should ensure that all residents are aware that they can directly contact Army housing office officials. (Recommendation 9) The Secretary of the Air Force should develop and implement a plan to clearly and systematically communicate to residents the difference between the military housing office and the private partner. At a minimum, these plans should include the Air Force housing office’s roles, responsibilities, locations, and contact information and should ensure that all residents are aware that they can directly contact Air Force housing office officials. (Recommendation 10) The Secretary of the Navy should develop and implement a plan to clearly and systematically communicate to residents the difference between the military housing office and the private partner. At a minimum, these plans should include the Navy housing office’s roles, responsibilities, locations, and contact information and should ensure that all residents are aware that they can directly contact Navy housing office officials. (Recommendation 11) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment, in collaboration with the military departments, assess the risks of proposed initiatives aimed at improving the privatized military housing program on the financial viability of the projects. (Recommendation 12) We provided a draft of this report to DOD for review and comment. In written comments, reprinted in their entirety in appendix III, DOD concurred with 10 of our recommendations and partially concurred with 2, identifying actions it plans to take to address each of them. DOD also provided technical comments, which we incorporated as appropriate. DOD partially concurred with our recommendation that the Assistant Secretary of Defense for Sustainment, in collaboration with the military departments and private housing partners, establish minimum data requirements and consistent terminology and practices for work order collection. The department noted that neither the Assistant Secretary of Defense for Sustainment nor the military departments could mandate changes to existing privatized housing project ground leases or legal agreements. DOD further noted that it cannot unilaterally make changes to the project ground leases and associated legal documents without concurrence from the private partners. However, the department noted that to the maximum extent practical, it would work to establish minimum data requirements and consistent terminology and practices for work order collection. DOD also partially concurred with our recommendation that the Under Secretary of Defense for Sustainment, in collaboration with the military departments, develops a process for collecting and calculating resident satisfaction data because there is no Under Secretary of Defense for Sustainment. Based on the department’s comments, we revised the addressee of this recommendation, directing action to the Assistant Secretary of Defense for Sustainment. However, the department noted that effective with the survey collection effort for Fiscal Year 2021, it would refine the process for collecting and calculating resident satisfaction data from the military departments to ensure that DOD compiles and calculates data in a standardized and accurate way. We are sending copies of this report to the appropriate congressional committees; Senator Catherine Cortez Masto; Senator Mark Warner; Representative Gus Bilirakis; the Secretary of Defense; and the Secretaries of the Departments of the Army, the Navy, and the Air Force. In addition, the report is available at no charge on our website at https://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-2775 or FieldE1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix IV. The Conference Report accompanying a bill for the Fiscal Year 2019 Department of Defense Appropriations Act included a provision for us to review ongoing issues within privatized military housing. This report examines the extent to which the Office of the Secretary of Defense (OSD) and the military departments (1) conduct oversight of privatized military housing for servicemembers and their families, (2) have communicated their roles and responsibilities to servicemembers and their families, and (3) have developed and implemented initiatives to improve privatized housing. We included all privatized housing projects in each military department. For each of our objectives, we reviewed OSD and military department policies and guidance for the implementation of the Military Housing Privatization Initiative (MHPI) program, including guidance on the authority, roles, and responsibilities for oversight and management of privatized housing. We evaluated the extent to which the evidence we collected aligned with OSD policy and stated goals for oversight and management of privatized housing, and whether the evidence adhered to the principles in Standards for Internal Control in the Federal Government. We conducted interviews with officials from the Office of the Assistant Secretary of Defense for Sustainment, Office of Facilities Management; the Office of the Deputy Assistant Secretary of the Army (Installations, Housing and Partnerships); the Army Installation Management Command; the Army Assistant Chief of Staff for Installation Management; the Assistant Secretary of the Air Force for Installations, Environment, and Energy; the Air Force Civil Engineer Center; the Commander, Navy Installations Command; the Commander, Naval Facilities Engineering Command; the Marine Corps Installation Command; and representatives from each of the 14 private partners that are currently responsible for privatized housing projects. We visited a non-generalizable sample of 10 installations selected to represent each of the military departments, six private partners—including the five largest who own the majority of privatized military housing—and geographic and climate diversity. The selected sites in our non- generalizable sample were three Army installations—Fort Bragg, North Carolina; Fort Huachuca, Arizona; and Fort Sill, Oklahoma; two Navy installations—Naval Station Norfolk, Virginia, and Naval Base San Diego, California; two Marine Corps installations—Marine Corps Base Camp Lejeune, North Carolina, and Marine Corps Base Camp Pendleton, California; and three Air Force installations—Davis-Monthan Air Force Base, Arizona; Langley Air Force Base, Virginia; and Tinker Air Force Base, Oklahoma. We reviewed the ground leases and other MHPI project documents for housing projects at each of these locations, and at each installation we met with officials from the installation commander’s office and conducted interviews with officials from both the installation military housing office and representatives from the private partners. To collect input from residents of privatized housing, we facilitated 15 focus groups with a self-selected group of current residents of privatized military housing. During the focus groups, a methodologist led participants through a structured questionnaire, which we pretested with 11 residents of privatized housing prior to the first focus group. To solicit participants for our focus groups, we requested that local military housing office officials email all current residents of privatized housing prior to our visit to inform them of our focus groups. Individuals interested in participating in our focus group sessions were instructed to contact us directly for further information. We had over 70 residents participate in our focus groups. In addition to the 15 focus groups, we conducted an additional five sessions in which fewer than three residents attended. We collected information from these residents, but we did not include their input in our focus group analysis. Comments from focus group participants are not generalizable to all residents of privatized military housing. We also developed and administered a publically available online tool that provided an opportunity for any resident of privatized military housing to voluntarily submit information on their experiences. Participants had the option to remain anonymous and make multiple submissions in order to provide us information on their experience at more than one installation. We developed our tool in conjunction with a survey methodologist to ensure it met our requirements for publically available anonymous data collection instruments, and conducted five pretests of the questions with residents of privatized housing. Our online tool was made available to the public from June 17, 2019, through August 31, 2019. We received a total of 658 responses. In analyzing information provided through the online tool, we took steps to identify responses that did not meet our criteria, including removing 13 responses for reasons such as responses with duplicative usernames or Internet Protocol (IP) addresses that described the same experience or had been started but not fully completed, responses from DOD officials that informed us they had provided responses to test our tool, and responses from residents living on installations outside of the United States. In reporting results from our online tool, we used the following qualifiers in presenting our results— most (to indicate 80 percent or higher); majority (to indicate 51-79 percent); and some (to indicate less than 50 percent). Findings from our focus groups and online tool are not generalizable to all privatized military housing residents. To determine the extent to which DOD conducts oversight of privatized military housing for servicemembers and their families, we conducted the following additional data analysis. Through the steps described in the following bullets, we determined these data to be reliable for the purposes of our findings: To determine the extent to which performance incentive fee metrics assessed the condition of privatized housing, we collected information on the structure of the incentive fees from private partners for 74 privatized housing projects and received confirmation that there are 5 projects that do not have incentive fee plans as part of their business agreements. We reviewed all of the incentive fee plans and identified commonly used metrics and indicators. We met with officials from the military housing offices, the military departments, and private partner representatives to discuss the administration and measurement of the incentive fee structures. To gain an understanding of how performance incentive fees are used, we reviewed documents and guidance from OSD and the military departments that explains the processes for developing and awarding performance incentive metrics and fees. In addition, we obtained information from residents through focus groups and our online tool and spoke with military housing office officials to obtain anecdotal information regarding the extent to which the metrics are adequately measuring the condition of the housing. To assess the extent to which private partner work order data could be used to monitor and track the condition of privatized homes, we collected and reviewed private partner work order data from October 2016 through April 2019 from each of the 79 MHPI projects and discussed these data with the private partners and military department officials. Given that we requested the work order data from the private partners in April and May 2019, we selected the October 2016 through April 2019 time frame to include complete data for fiscal years 2017 and 2018 and the most comprehensive data available at the time for fiscal year 2019. Prior to requesting these data, we contacted representatives from each of the 14 private partner companies to discuss our forthcoming data request and to better understand each company’s data system and potential limitations for using the data. Subsequently, we requested that each partner provide us with data for all work orders across all data elements for each installation under their management. We received data on over 8 million work orders among the 14 private partners. We performed manual testing on initial data files received by each partner to identify issues that would impact the validity and reliability of using these data for ongoing monitoring and tracking of the condition of privatized housing units. In doing so, we identified instances of anomalies in work order data from each of the 14 partners. For 12 of the 14 partners, we found at least one of the following anomalies in the initial work order data files received for the time period requested: (1) duplicate work orders; (2) work orders with completion dates prior to the dates that a resident had submitted the work order; and (3) work orders still listed as in-progress for more than 18 months. We reviewed work order data from at least one installation for each private partner to check for instances of these anomalies. We also held follow-up discussions with 10 of the 14 private partners to discuss anomalies found in the data and potential factors contributing to the presence of these anomalies. In addition to the initial data collected on all of the work orders, we requested a second data run of work orders over the same time period—October 1, 2016, through April 30, 2019—for service requests related to lead- based paint, mold, and pest/rodent/vermin infestation. As part of this request, we asked that partners provide the criteria used for querying the data they provided us. We reviewed these data to determine how requests for data on specific hazards were getting sorted into the work order tracking systems by category and priority among the various partners. To identify differences in terminology and business practices used by the private partners in their work order tracking systems, we requested and reviewed private partner documentation of data definitions and protocols for managing work order data. In addition, we conducted interviews with military department officials to discuss ongoing efforts by the military departments to collect and analyze work order data. To evaluate resident satisfaction data reported in OSD’s reports to Congress on privatized housing, we reviewed the processes for collecting, calculating, and reporting these data for the three most recently issued reports for fiscal years 2015, 2016, and 2017. We reviewed the instructions OSD provided to the military departments outlining how the military departments are to submit resident satisfaction data to OSD. We also reviewed the question the military departments asked on their annual surveys to gauge resident satisfaction. We then requested the survey data the military departments submitted to OSD to be included in the annual report to Congress for fiscal years 2015, 2016, and 2017. We performed data quality checks and identified inaccuracies on a random sample of data reported by OSD. We reviewed how military departments calculated overall resident satisfaction for each privatized housing project. Further, we discussed these data with OSD and the military departments to assess the validity and reliability of using these data for identifying overall tenant satisfaction with the condition of privatized housing. To determine the extent to which the military departments have communicated their respective military housing office roles and responsibilities to residents, we reviewed military department policies and guidance related to their roles and responsibilities for working with residents of privatized housing. During our site visits to 10 installations, we interviewed military department housing office officials and private partner representatives to discuss their specific roles and responsibilities. We asked questions soliciting information about residents understanding of the roles and responsibilities of the military housing office and the dispute resolution process during our 15 focus groups. We also solicited resident feedback in our online tools regarding residents’ experience reporting maintenance issues and working with military housing offices and private partners to get maintenance issues resolved. To determine the extent to which DOD and private partners have developed and implemented initiatives to improve privatized housing, we interviewed OSD and military department officials to discuss ongoing initiatives developed over the course of our audit work aimed at improving MHPI and reviewed relevant guidance. We met with private partner representatives to discuss their involvement in developing these initiatives, as well as to gain an understanding of any challenges or concerns that may impact the implementation of these initiatives. Following the passage of the National Defense Authorization Act for Fiscal Year 2020, we reviewed provisions of the statute designed to improve the condition of privatized housing and evaluated the extent to which these provisions would impact ongoing or planned DOD initiatives or provide new oversight roles and responsibilities for OSD and the military departments. We discussed these provisions with OSD officials and private partner representatives to understand how, if at all, their implementation may impact the privatized housing projects, as well as any potential barriers to implementation in the current legal construct of the program. We conducted this performance audit from November 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In table 3, we provide the complete listing of the Department of Defense’s 79 privatized military housing projects, as of September 30, 2017. This list reflects information that the Office of the Assistant Secretary of Defense for Sustainment provided in its annual report to Congress for the time period of October 1, 2016, through September 30, 2017. The report was provided to Congress in May 2019. The projects can consist of one or multiple installations. Elizabeth A. Field, Director, (202) 512-2775 or FieldE1@gao.gov. In addition to the contact above, the following are key contributors to this report: Kristy Williams (Assistant Director), Tida Barakat Reveley (Analyst in Charge), Austin Barvin, Ronnie Bergman, Vincent Buquicchio, William Carpluk, Juliee Conde-Medina, Mae Jones, Jordan Tibbetts, Kelly Rubin, Monica Savoy, and John Van Schaik. Military Housing: Preliminary Recommendations to Strengthen DOD's Oversight and Monitoring of Privatized Housing. GAO-20-471T. Washington, D.C.: March 3, 2020. Military Housing Privatization: Preliminary Observations on DOD’s Oversight of the Condition of Privatized Military Housing. GAO-20-280T. Washington, D.C: December 3, 2019. Defense Infrastructure: Additional Actions Could Enhance DOD’s Efforts to Identify, Evaluate, and Preserve Historic Properties. GAO-19-335. Washington, D.C.: June 19, 2019. Military Housing Privatization: DOD Should Take Steps to Improve Monitoring, Reporting, and Risk Assessment. GAO-18-218. Washington, D.C.: March 13, 2018. Defense Infrastructure: Army Has a Process to Manage Litigation Costs for the Military Housing Privatization Initiative. GAO-14-327. Washington, D.C.: April 3, 2014. Military Housing: Information on the Privatization of Unaccompanied Personnel Housing. GAO-14-313. Washington, D.C.: March 18, 2014. Military Housing: Enhancements Needed to Housing Allowance Process and Information Sharing among Services. GAO-11-462. Washington, D.C.: May 16, 2011. Military Housing Privatization: DOD Faces New Challenges Due to Significant Growth at Some Installations and Recent Turmoil in the Financial Markets. GAO-09-352. Washington, D.C.: May 15, 2009. Military Housing: Management Issues Require Attention as the Privatization Program Matures. GAO-06-438. Washington, D.C.: April 28, 2006. Military Housing: Further Improvement Needed in Requirements Determination and Program Review. GAO-04-556. Washington, D.C.: May 19, 2004. Military Housing: Better Reporting Needed on the Status of the Privatization Program and the Costs of Its Consultants. GAO-04-111. Washington, D.C.: October 9, 2003. Military Housing: Opportunities That Should Be Explored to Improve Housing and Reduce Costs for Unmarried Junior Servicemembers. GAO-03-602. Washington, D.C.: June 10, 2003. Military Housing: Management Improvements Needed as the Pace of Privatization Quickens. GAO-02-624. Washington, D.C.: June 21, 2002. Military Housing: DOD Needs to Address Long-Standing Requirements Determination Problems. GAO-01-889. Washington, D.C.: August 3, 2001. Military Housing: Continued Concerns in Implementing the Privatization Initiative. GAO/NSIAD-00-71. Washington, D.C.: March 30, 2000. Military Housing: Privatization Off to a Slow Start and Continued Management Attention Needed. GAO/NSIAD-98-178. Washington, D.C.: July 17, 1998.", "summary": "Congress enacted the Military Housing Privatization Initiative in 1996 to improve the quality of housing for servicemembers. DOD is responsible for general oversight of privatized housing projects. However, private-sector developers are responsible for the construction, renovation, maintenance, and repair of about 99 percent of military housing in the United States. Recent reports of hazards, such as mold and pest infestation, have raised questions about DOD's oversight of privatized military housing. Conference Report 115-952 included a provision for GAO to review ongoing issues within privatized housing. This report assesses, among other things, the extent to which OSD and the military departments (1) conduct oversight of privatized housing and (2) have developed and implemented initiatives to improve privatized housing. GAO reviewed policies and guidance; visited a non-generalizable sample of 10 installations; analyzed work order data; and interviewed DOD officials and private partner representatives. The Office of the Secretary of Defense (OSD) and the military departments conduct a range of oversight activities, but some of these activities have been more extensive than others. Specifically, GAO found that: DOD provides reports to Congress on the status of privatized housing, but some data in these reports are unreliable, leading to misleading results. DOD provides periodic reports to Congress on the status of privatized housing, but reported results on resident satisfaction are unreliable due to variances in the data provided to OSD by the military departments and in how OSD has calculated and reported these data. OSD has made progress in developing and implementing a series of initiatives aimed at improving privatized housing. In addition, Congress established several requirements addressing privatization housing reform. However, DOD officials and private partner representatives have identified challenges that could affect implementation of these various initiatives. These include concerns that implementation could have unintended negative impacts on the financial viability of the privatized housing projects. However, DOD has not assessed the risk of the initiatives on project finances. GAO is making 12 recommendations, including that DOD take steps to improve housing condition oversight, performance indicators, maintenance data, and resident satisfaction reporting as well as to assess the risk of the initiatives on project finances. DOD generally concurred with the recommendations and identified actions it plans to take to implement them.", "document_type": "gao"}
{"report": "To support its mission, DOD uses contracts to procure many different types of supplies (such as ships, planes, and munitions) and services (such as management, maintenance, and technical services). The federal acquisition process generally includes three phases: the pre-award phase, which includes acquisition planning and activities such as conducting market research and defining contract terms and conditions prior to soliciting proposals; the award phase, which includes activities such as soliciting offers from prospective contractors, evaluating prospective contractors’ proposals and qualifications, and awarding the contract; and the contract performance phase, which includes monitoring contract performance. Within these phases, contracting officials complete certain activities as provided by applicable federal statutes and the Federal Acquisition Regulation (FAR). These activities differ somewhat based on the unique circumstances of each contract, including, for example, whether a contract is awarded competitively through full and open competition or non-competitively through other than full and open competition, and whether negotiated procedures are used. (See fig.1.) Before awarding a contract in excess of the simplified acquisition threshold (generally $150,000 at the time of our review), the FAR requires contracting officials to review information in the Federal Awardee Performance and Integrity Information System (FAPIIS), which can include descriptions of a prospective contractor’s past safety and health violations. Furthermore, for competitively awarded acquisitions using negotiated procedures and expected to exceed the simplified acquisition threshold, agencies generally must evaluate prospective contractors’ past performance. Contracting officials enter and view performance assessments in the Contractor Performance Assessment Reporting System (CPARS). In evaluating past performance, agencies may review a contractor’s past performance assessments, which can contain information about prior safety incidents and may be used to support award decisions. While the FAR prescribes policies and requirements that apply to executive agencies, there can be wide variation concerning the acquisition practices at individual agencies. For example, USACE often can take advantage of a robust competitive market and frequently uses competitively awarded fixed-price contracts. NAVSEA, by contrast, operates within an industrial base that has far fewer participants that often are uniquely qualified to produce specific classes of ships. As a consequence, many of NAVSEA’s contracts are negotiated on a sole- source or limited competition basis. Under the Occupational Safety and Health Act of 1970 (OSH Act), OSHA sets and directly enforces occupational safety and health standards for the private sector in about half the states. The remaining states have chosen to set and enforce their own occupational safety and health standards for these employers under a state plan approved by OSHA. State standards and their enforcement must be “at least as effective” in providing safe and healthful employment as the federal standards. Most private sector employers, including federal contractors, are covered by the OSH Act and must comply with any applicable state or federal occupational safety and health standards. In addition to the OSH Act, several other federal laws require federal contractors, depending on the type and amount of the contract, to comply with occupational safety and health standards. OSHA and the states have approximately 2,100 compliance officers responsible for enforcing health and safety standards at more than 8 million worksites across the nation, which employ approximately 130 million workers. According to data provided by OSHA officials, in fiscal year 2017, OSHA and the states conducted about 76,000 inspections. A little less than half of these inspections were in the construction industry (about 34,000), and about one-fifth were in the manufacturing industry (about 14,000). OSHA and state occupational safety and health agencies conduct both programmed and unprogrammed inspections. Programmed inspections— which represented about 44 percent of all federal OSHA inspections in fiscal year 2017—are planned based on workplace injury incidence rates, previous citation history, or random selection. Programmed inspections include those conducted under OSHA’s emphasis programs, which focus on a particular safety or health hazard or a specific industry. OSHA’s nine current national emphasis programs include one on shipbreaking, which covers some companies with DOD contracts. In addition, OSHA has regional and local emphasis programs. Unprogrammed inspections— which represented the other 56 percent of all federal OSHA inspections in fiscal year 2017—are unplanned and are conducted in response to reports of imminent danger, fatalities, severe injuries, worker complaints, referrals from other government agencies, and catastrophic events that cause worker deaths and hospitalizations. Before beginning an inspection, OSHA or state compliance officers generally hold a brief opening conference to inform employer and employee representatives of the purpose of the inspection and their rights during the inspection, and provide a copy of the complaint, if applicable. After completing an inspection, if OSHA or state compliance officers determine that the employer has violated any safety or health standards, they may issue a citation, including a deadline for correcting the hazards, and related financial penalties (see fig. 2). If OSHA issues a citation, it is required to do so within 6 months of the occurrence of a violation. After receiving a citation, the employer may request an informal conference with OSHA officials to present evidence or views that they believe would support an adjustment to the citation or penalty, but an informal conference is not required. The employer may also contest the citation. Employers are required to certify that the hazards have been corrected by the deadline and provide supporting documentation. If they do not, OSHA may conduct a follow up inspection, and may issue additional citations and penalties if the hazards were not corrected. When an employer is inspected and OSHA finds violations, various factors might affect the number of violations identified. For example, an inspection with a narrow focus may identify fewer violations than a full inspection of the same worksite. OSHA officials said that construction inspections are often focused on a particular issue, such as protecting workers from falls or securing a trench, and thus may not be as comprehensive as a full inspection of a general industry facility. In addition, the number of violations identified during an inspection could be affected by factors such as company size, industry, and the presence of other safety oversight efforts. For example, OSHA officials said that in the construction industry they routinely cite both a general contractor and a subcontractor for the same violation, but do so to a lesser extent in other industries. Officials also noted that on USACE construction sites, both USACE and contractor representatives conduct safety inspections, which enhances employer compliance with both OSHA standards and the USACE Safety and Health Requirements Manual. DOL has authority under the Contract Work Hours and Safety Standards Act to debar federal contractors in the construction industry from receiving federal contracts if they have committed “repeatedly willful or grossly negligent” violations of OSHA safety and health standards. However, as of October 2018, officials said that DOL had not debarred a construction contractor for this reason in the last 10 years. According to officials, DOL does not have debarment authority for violations of safety and health standards in industries other than construction, although it has debarment authority for other types of labor law violations. Of the 192 companies we selected with DOD manufacturing or construction contracts in fiscal year 2017, we found that a little more than half (106) were inspected by OSHA or state occupational safety and health agencies from fiscal years 2013 to 2017. Of the companies that were inspected, 59 had construction contracts, and 47 had manufacturing contracts in fiscal year 2017. During this 5-year time period, OSHA or state agencies conducted 609 inspections of these 106 companies. Most of these inspections (about 81 percent) were conducted by OSHA. The percentages of programmed and unprogrammed inspections of our selected companies from fiscal years 2013 to 2017 were similar to these percentages for all federal OSHA inspections in fiscal year 2017. (See fig.3.) OSHA’s enforcement policy is designed to focus OSHA’s inspection resources on the most hazardous workplaces. Officials told us that employers, including DOD contractors, may not be inspected if they do not meet OSHA’s criteria for programmed inspections and do not experience a safety or health incident that would lead to an unprogrammed inspection. In addition, officials said employers that participate in OSHA’s Voluntary Protection Programs (VPP) must have high-quality safety and health programs, are exempt from regular programmed inspections, and are only inspected if OSHA is notified of a safety or health incident. According to OSHA officials, of the 86 selected companies that were not inspected by OSHA or state agencies from fiscal years 2013 to 2017, one currently participates in the VPP. Our analysis found that of the 106 selected companies that were inspected during this time period, 83 were cited for at least one safety or health violation of any type, and of those, 52 were cited for serious violations (when there was a substantial probability that death or serious physical harm could result, and the employer knew, or could have known with the exercise of reasonable diligence, of the hazard). Three companies were cited for at least one repeated violation. (See fig. 4.) However, we were unable to determine from the available data whether these safety and health violations occurred during work on a DOD contract because OSHA inspection data do not include that information. The 83 selected companies that were cited for workplace safety or health violations from fiscal years 2013 to 2017 had a total of 405 violations, including 195 serious violations, 7 repeated violations, and 203 violations of other types. These companies were assessed financial penalties totaling about $1.2 million over that time period, including about $742,000 in penalties for serious violations. In fiscal year 2017, the 83 companies previously cited for violations of any type had DOD contracts totaling about $113 billion, and the 52 companies previously cited for serious violations had DOD contracts of $46 billion (as measured by federal obligations). (See table 1.) Furthermore, for some of the selected companies cited for serious violations, the related OSHA inspection data described worker injuries or deaths. As previously noted, 52 of the selected companies were cited for a total of 195 serious violations from fiscal years 2013 to 2017. For some, but not all, of these serious violations, the related inspection data described accidents in which 7 workers died, 20 were hospitalized for severe injuries—including fractures, chemical burns, other burns, and amputations—and 4 had severe injuries that did not require hospitalization. According to the inspection data, the accidents in which 7 workers died included the following: a hydrogen blast in a melting chamber resulted in one worker being pinned under a 20,000 pound lid, another receiving second degree burns, and a third being killed; a barge capsized after a crane tilted over, and one worker drowned; a worker fell 98 feet from an elevator and was killed; a worker sustained a fatal electric shock when replacing jumper wires on a high voltage transmission corner tower, and another worker was injured; an autoclave exploded, striking and killing a worker with extreme a vessel became unmoored due to high winds and struck a pier which then collapsed, pulling two workers underwater, one of whom died. While we could identify some selected companies with DOD contracts in fiscal year 2017 that were previously cited for safety or health violations, the incidence of these violations among all inspected companies with DOD contracts is unknown because data limitations prevent comprehensive matching of federal contracting data with OSHA inspection data. Specifically, the corporate identification numbers used in the federal contracting databases—the Employer Identification Number/Taxpayer Identification Number (EIN/TIN) and the Data Universal Numbering System (DUNS) number—are not well-populated in OSHA’s database because OSHA has not designated them as required fields. OSHA officials are required to enter certain types of data in OSHA’s inspection database—such as the employer’s name and address, the type of inspection, and any violations that were identified during the inspection—and have the option to enter the employer’s EIN/TIN and DUNS number. However, at the time of our review, for manufacturing and construction inspections initiated from fiscal years 2013 to 2017, the EIN/TIN of the inspected company was entered in OSHA’s inspection data for about one-third of all inspections, and the DUNS number was entered for about 8 percent of all inspections (see fig. 5). OSHA has acknowledged that it is difficult to match records across different databases without corporate identification numbers. In addition, OSHA’s website with information about safety and health violations cannot currently be searched by a company’s EIN/TIN or DUNS number. OSHA makes information about violations publicly available on its website, which can be searched by company name and industry code, among other fields. However, when searching OSHA’s website by company name, interested parties may experience challenges obtaining relevant information because company names differ across databases. When we searched the OSHA website by company name as part of selecting USACE and NAVSEA contracts for review, we were unable to determine whether 18 of the 66 company names we searched had been inspected. For example, when we searched the OSHA website using the first word in one company’s name, the search results included 34 inspections, but none of the company names in the search results exactly matched the company name in the federal contracting data. OSHA officials said the EIN/TIN and DUNS numbers are not required fields because employers or their on-site representatives do not always have these numbers. Officials told us that smaller companies, such as small construction companies, are less likely to have these numbers than larger companies. When companies do have corporate identification numbers, officials said that the employer’s on-site representative who interacts with the OSHA compliance officer—such as a foreman—might not know these numbers, and OSHA officials may not have the opportunity to meet with other employer representatives who would be more likely to know these numbers. However, if an employer requests an informal conference with OSHA officials after being cited for a violation, the conference provides an opportunity for OSHA officials to obtain the employer’s corporate identification number from knowledgeable representatives. In addition, OSHA officials said requiring a corporate identification number in OSHA’s inspection database could prevent closing an inspection record and issuing any related citations if they were unable to obtain this number within the required six-month timeframe. Officials added that delays in issuing citations could also lead to delays in addressing workplace hazards, because employers are not required to begin addressing these hazards until they receive a citation. However, OSHA officials noted that if an employer’s EIN/TIN or DUNS number is not available during an inspection, the number can be added to the inspection database at a later time. Collecting corporate identification numbers as part of inspections could benefit both OSHA and users of OSHA’s website. OSHA officials said that the EIN is useful for collecting financial penalties from companies that have been cited for violations. In addition, OSHA officials told us that requiring the EIN/TIN or DUNS number in OSHA’s inspection database would make it easier to search for companies in OSHA’s online inspection data. According to federal internal control standards, management should externally communicate the necessary quality information to achieve the entity’s objectives. Quality information is appropriate, current, complete, accurate, accessible, and provided on a timely basis. Without exploring the feasibility of requiring a corporate identification number in OSHA’s inspection database and enabling OSHA’s website to be searched by that number, contracting officials and other interested parties are likely to experience challenges obtaining accurate information about companies’ safety and health violations. Officials at DOD have multiple opportunities to address contractor safety throughout the acquisition process. For example, during the award phase, officials can consider safety information when they evaluate contractors’ past performance for contracts awarded competitively using negotiated procedures. However, not all contracting officials are aware that relevant contractor safety information is available on the OSHA website. During the contract performance phase, USACE and NAVSEA both take additional steps related to contractor safety and health, including accident prevention and accident reporting. Only USACE, however, has a practice of requiring contracting officials to assess contractor safety performance on construction contracts at the completion of the contract. As a consequence, safety performance information for other contracts across DOD may not be readily accessible to officials when awarding new contracts. The FAR does not specifically require contracting officials to consider information about prospective contractors’ records of safety performance before awarding a contract. Furthermore, DOD, Army, Navy, USACE, and NAVSEA policy and guidance do not specifically direct contracting officials to consider information about prospective contractors’ safety records before awarding contracts, according to officials. However, contracting officials have several opportunities to consider contractor safety and health records and other safety information during the pre- award and award phases of the contracting process. Developing requirements and drafting the solicitation. As part of acquisition planning, contracting and program officials develop requirements. In addition, when drafting a solicitation, the FAR or agency guidance may prescribe the use of certain clauses. For example, the FAR requires that fixed-price construction contracts above the simplified acquisition threshold include a provision related to workplace safety. Specifically, these contracts must include an Accident Prevention clause that requires the contractor to provide appropriate safety barricades, signs, and signals, and comply with OSHA safety and health standards, among other requirements. In addition, for DOD construction fixed-price contracts above the simplified acquisition threshold, this Accident Prevention clause requires contractors to comply with the USACE Safety and Health Requirements Manual. USACE contracting officials also told us that if contracts include work associated with asbestos abatement, lead abatement, or hazardous waste remediation, clauses specific to these areas are also included in the solicitation and resulting contract. NAVSEA also uses clauses as applicable to the specific work performed, for shipbuilding procurements or ship repair, in its contracts, and NAVSEA stated that many of these clauses are related to safety and environmental issues. Further, program officials can include specific requirements for unique or high-risk activities. For example, one of our selected NAVSEA contracts specified that the contractor must ensure that all required safety and emergency devices, such as emergency escape breathing devices, were onboard the ship before the contractor conducted sea trials. Soliciting and evaluating offers from prospective contractors. For contracts awarded competitively using negotiated procedures, contracting officials are required to identify the factors on which they will evaluate prospective contractors’ proposals and their relative weights. Contracting officials can designate safety in the solicitation as among the criteria that they will use to evaluate proposals and require prospective contractors to submit related information. For example, solicitations for two of our selected contracts included aspects of safety in the evaluation of certain factors. Safety also may be considered during the evaluation of contractor past performance. For acquisitions following negotiated procedures that are expected to exceed the simplified acquisition threshold, the FAR generally requires an evaluation of prospective contractors’ past performance, which can include compliance with safety requirements on past contracts. The evaluation must include past performance as an evaluation factor unless the contracting officials document the reason past performance is not an appropriate evaluation factor for the acquisition. In evaluating past performance, the contractor’s performance assessments in CPARS may be reviewed and used by contracting officials to support future award decisions. For example, for one NAVSEA contract, the assessments identified instances when the contractor’s safety program failed to comply with NAVSEA’s safety standards. In noncompetitive acquisitions following negotiated procedures, there is no requirement that there be evaluation criteria that include past performance. In these situations, opportunities for considering safety issues may be limited to the responsibility determination. Determining that contractors meet responsibility standards. Prior to contract award, contracting officials must determine that prospective contractors are “responsible,” which is also known as the responsibility determination. The responsibility determination has several required elements, some of which may include consideration of workplace safety and health. For example, before awarding a contract, contracting officials must: determine that prospective contractors have the necessary organization, experience, accounting and operational controls, and technical skills, or the ability to obtain them, which may include assessing whether contractors have applicable safety programs; and determine that prospective contractors have a satisfactory performance record which for contracts that will be in excess of the simplified acquisition threshold includes reviewing and considering prospective contractors’ performance and integrity information in FAPIIS, which may include information about proceedings related to safety and health violations. For one of our selected contracts, the FAPIIS search result in the contract file described OSHA safety and health violations. While they were not required to do so, none of the responsibility determinations for our six selected contracts contained information about workplace safety. If contracting officials considered safety when making this determination, we did not locate it in the contract files. The information available to contracting officials in the federal contracting databases about contractors’ past performance varies by DOD component. Specifically, USACE has a practice of requiring officials to assess and rate contractors’ performance on construction contracts with respect to safety, among other required factors, in CPARS at the completion of the contract. USACE contracting officials enter a safety performance rating—exceptional, very good, satisfactory, marginal, or unsatisfactory—and provide a supporting written narrative in a specific tab in CPARS. As a result, information on safety performance is summarized in a single location within CPARS, and thus, readily accessible to federal contracting officials, including those at DOD, when a previous USACE construction contractor is considered for future contract awards. For all other DOD contracts, according to officials we interviewed, information on contractors’ safety performance may be included in various places throughout CPARS, but is not required to be summarized as a separate rating in a single location. The contract file documentation we reviewed illustrated these differences. For two of our selected USACE contracts, we found that this safety performance rating was available to officials for their consideration when awarding the contract. Based on our review of the contract file for one of these contracts, source selection officials identified less than satisfactory comments related to the safety performance rating in CPARS. As a result, they considered the rating, as well as the actions explained by the contractor to mitigate the safety issues. These officials determined that the corrective actions were sufficient, according to the documentation we reviewed. In contrast, for one of our selected NAVSEA contracts, we found that the past performance assessments in CPARS contained no information about workplace safety or health—either satisfactory or unsatisfactory. The past performance for the remaining NAVSEA contract file for which we obtained a CPARS report contained information on workplace safety and health—for example, the assessments noted corrective action requests were submitted for safety incidents. According to federal internal control standards, management should use quality information—information that is complete and accessible—to achieve its objectives. Without a safety performance rating for contractors in industries with relatively high rates of occupational injuries, such as manufacturing or ship building and repairing, contracting officials may lack complete, readily accessible information on prospective contractors’ workplace safety performance. As a result, DOD may miss opportunities to address safety and health concerns when awarding contracts in these high-risk industries—for example, by considering whether and how prospective contractors resolved or mitigated violations or safety issues on prior contracts. In addition, DOD contracting officials may not be aware that the OSHA website is a resource for additional information about contractors’ workplace safety and health records. Since CPARS only includes past performance assessments for federal government contracts, contracting officials may not know about OSHA violations committed by companies during work that took place outside of these contracts, or when the company was not a federal contractor. DOD officials told us that they expect contracting officials to use their discretion in evaluating safety performance; however, DOD has not advised its contracting officials that the OSHA website is a resource for additional information on workplace safety records. For one of our selected contracts, the contracting official told us he was not aware of a past OSHA violation when determining contractor responsibility. According to the contracting official, OSHA issued the citation for non-Navy work performed at the contractor’s commercial shipyard. Several contracting officials told us that they would likely only consider violations they deemed relevant, for example, those that occurred at the facility where the contract will be performed. However, without knowing that a past violation occurred, the official we interviewed for our selected contract may not have had the opportunity to consider all of the available information when evaluating the contractor or addressing potential safety issues. Moreover, contracting officials for the six USACE and NAVSEA contracts we reviewed said they have not sought information about contractor safety and health violations from the OSHA website, and several were unaware that the website contained information on violations. Without being made aware that the OSHA website is a resource for additional information, contracting officials may not have the opportunity to utilize all of the available information about prospective contractors’ safety history. As a result, DOD contracting officials may miss opportunities to consider safety and health concerns when they are awarding new contracts. Officials from our two selected components—USACE and NAVSEA—also identified various actions they may take during the contract performance phase related to the workplace safety of their contractors. For example, according to officials, during the contract performance phase, USACE and NAVSEA oversee contractors’ compliance with contract requirements related to workplace safety and health. The steps they take may include ensuring that contractors submit accident prevention plans, when required, and conducting safety inspections, among other actions. Monitoring for OSHA violations. As mentioned above, the FAR requires a clause regarding compliance with safety and health standards to be included in certain federal construction contracts. USACE officials told us that this is monitored as a reportable item while work is being conducted, and that if violations occur during the performance of the contract, the contracting official is to enter information about the violations into CPARS. An Army official also told us that the Army recently implemented a system to track OSHA violations, but that it did not yet contain any data. Accident prevention. The FAR requires compliance with the USACE Safety and Health Requirements Manual for certain DOD construction contracts. According to the manual and USACE officials, USACE does not allow construction to begin until officials have reviewed and accepted the contractor’s accident prevention plan, including changes if necessary. For example, the contract documentation we reviewed for a dredging contract included a memorandum outlining changes that were to be addressed in the accident prevention plan (for example, outlining credentials for the safety officer on the site). According to the manual, USACE requires contractors’ submitted accident prevention plans to be job-specific and include work to be performed by subcontractors. NAVSEA may require contractors to submit an occupational health and safety plan for ship repair work. For example, one of the files we reviewed for a maintenance, modernization, and repair contract for a certain class of ships included a safety plan—a required deliverable under the contract—covering topics such as fall protection, evacuation procedures, and accident notification. Inspections. The USACE manual requires daily safety inspections of contractors’ worksites by both contractor and USACE personnel, and officials told us that USACE procedures require these inspections to be entered in USACE’s Resident Management System. The manual also requires the accident prevention plan or the USACE project safety and occupational health plan to provide for “frequent” safety inspections of the work sites, material, and equipment to ensure compliance with the plan and the USACE manual. For one of the USACE contracts we selected for review, CPARS documentation provided by USACE officials indicated that USACE staff noted repeated issues with safety requirements, including exposed live electrical wiring, lack of adequate lighting, and improper use of extension cords. This CPARS example indicates that the contractor worked to increase safety compliance. Finally, USACE’s manual states that when an employee is deemed to be in imminent danger, contractor or USACE officials must immediately stop the unsafe work being performed. For NAVSEA, officials told us that safety requirements and oversight responsibilities will vary depending on the type of work involved. For new construction, the Navy Supervisor of Shipbuilding, Conversion, and Repair (SUPSHIP) oversees safety. For repair and maintenance, the Regional Maintenance Centers are charged with safety oversight, among other administrative responsibilities. At both organizations, if problems are found, personnel issue corrective action requests. For example, a regional maintenance center staff member issued a corrective action request because the contractor failed to monitor the use of personal protective equipment and a contractor employee fell through a deck opening. As previously noted, the CPARS assessments for one of our selected contracts specifically noted that safety corrective action requests had been issued to that contractor. NAVSEA officials told us that quality assurance staff also have regular meetings with the contractors and monitor workplace safety. Accident reporting. USACE policy is to investigate and report USACE accidents in order to prevent recurrences and to comply with OSHA, DOD, Army, and other requirements. USACE regulation requires contracting officials to inform contractors of their responsibilities for accident reporting and investigation, and ensure all accidents that occur within their area of responsibility are investigated and reported. USACE also collects information about accidents at contractors’ worksites, and disseminates summaries of incidents on a regular basis. For example, one summary described a fall by a contractor employee resulting in stitches and a broken nose. The summary reminds USACE personnel of the importance of protective equipment to prevent this type of incident. USACE officials also told us that they have on-site engineers who would typically address any safety concerns directly with the contractor and inform the contracting official responsible for entering information into CPARS. Navy policy requires significant problems, including severe personnel injuries, to be reported to the NAVSEA Commander through the use of trouble reports. In addition, the SUPSHIP supervisor implements hazard identification and reporting processes and ensures the collection, evaluation and reporting of data for the determination of contractor award fees and past performance data bases. SUPSHIP also assesses the overall effectiveness of contractor safety and health management systems and provides safety program assessments for quarterly reviews. Finally, the SUPSHIP Operations Manual provides that SUPSHIP personnel who are aware of any major or willful contractor violation of federal, state, or local laws and regulations (for example, recurring/major unsafe work practices) will report these violations. Personnel training. According to a USACE official, USACE requires the designated quality control manager for each worksite to take the USACE Construction Quality Management course before being approved to work on a project. The course aims to ensure that construction is performed according to plans and specifications, on time, within budget, and in a safe work environment. In addition, contractor safety managers are required by the USACE manual to be on all project sites for USACE construction contracts and must complete certain OSHA training or equivalent training. This program provides training on the recognition, avoidance, abatement, and prevention of workplace hazards. According to officials, NAVSEA recommends that its personnel working in acquisition of defense systems or maintenance of ships and aircraft undergo acquisition safety training. A NAVSEA contracting official told us that the first draft of this training has been developed and will be required training for NAVSEA contracting personnel. Officials said that the aim of this training is ensure that safety is considered when developing contract requirements. DOD obligates hundreds of billions of dollars each year on contracts, including those for work in high-risk industries such as construction and ship building and repairing, and some companies have received DOD contracts after being cited for serious workplace safety or health violations. Even if these violations did not occur during work on a DOD contract, they could be relevant to decisions about new DOD contracts, for example, when a prospective contractor has not previously received federal contracts or when past performance information does not address workplace safety. However, the incidence of serious safety and health violations among all inspected DOD contractors remains unknown because OSHA does not require a corporate identification number in its inspection data. Furthermore, OSHA’s website currently cannot be searched by a corporate identification number. Without these enhancements to OSHA’s inspection data and website, DOD contracting officials and other interested parties are likely to experience challenges obtaining accurate information about contractors’ workplace safety and health records. In addition, DOD contracting officials may be unaware of OSHA’s website because DOD has not advised them that this resource exists. Despite some data limitations, OSHA’s website currently can be used to obtain information about contractors’ workplace safety and health records in some cases. While DOD contracting officials are not required to consider information about contractors’ workplace safety and health before awarding contracts, they have multiple opportunities to do so. Unless DOD provides information about OSHA’s website to contracting officials, they may remain unaware that this resource exists, and may miss opportunities to consider safety and health concerns when awarding new contracts. Furthermore, some DOD contracting officials may lack readily accessible information on contractors’ past workplace safety performance because DOD does not require a safety performance rating for contracts department-wide. One of the DOD components we selected has a practice of requiring construction contractors’ performance to be rated with respect to workplace safety at the completion of each contract. However, DOD does not require a safety performance rating for other components’ construction contracts or contracts in other industries with similarly high rates of occupational injuries, such as manufacturing. Without exploring the feasibility of requiring a department-wide safety performance rating for all contracts in high-risk industries, DOD may miss opportunities to reduce risks by considering safety concerns when awarding new contracts in these industries. We are making three recommendations, including one to OSHA and two to DOD. Specifically: The Assistant Secretary of Labor for Occupational Safety and Health should explore the feasibility of requiring a corporate identification number in its inspection database and enabling its website to be searched by that number. This should include exploring the following issues: which corporate identification number would be most appropriate to options for obtaining this number from employers; and options for entering this number in its database that would prevent or minimize delays in closing inspection records. (Recommendation 1) The Secretary of Defense should provide information to contracting officials to advise them that the OSHA website is a resource for information about contractors’ workplace safety and health records. (Recommendation 2) The Secretary of Defense should explore the feasibility of requiring a safety performance rating for contracts in industries that have relatively high rates of occupational injuries, such as manufacturing, construction, and ship building and repairing. (Recommendation 3) We provided a draft of this report to DOL and DOD for review and comment. DOL’s Occupational Safety and Health Administration (OSHA) and DOD provided written comments, which are reprinted in appendixes II and III, respectively. With respect to our first recommendation that OSHA explore the feasibility of requiring a corporate identification number in its database and enabling its website to be searched by that number, OSHA did not state whether it agreed with our recommendation. OSHA acknowledged the potential utility of obtaining a unique identifier from each employer and said it will continue to promote the collection of Employer Identification Numbers (EIN) or Tax Identification Numbers (TIN) whenever possible by issuing a revised memorandum to field staff to reinforce the importance of collecting this information. OSHA stated that it does not view EINs as confidential or protected from disclosure. However, OSHA expressed concerns about protecting TINs and Social Security Numbers from disclosure, and noted that it would not be able to make a data field available for public search if it contained either of these numbers. OSHA also raised concerns about the financial cost associated with redesigning the agency’s data system. We encourage OSHA to explore options for addressing these concerns as it further considers how to implement our recommendation. With respect to our second and third recommendations that DOD provide information to contracting officials about the OSHA website and explore the feasibility of requiring a safety performance rating for contracts in high-risk industries, DOD agreed with both recommendations and identified implementation timelines. We are sending copies of this report to the appropriate congressional committees, the Secretary of the Department of Labor, the Secretary of the Department of Defense, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact William T. Woods at (202) 512-4841 or woodsw@gao.gov, or Chelsa Gurkin at (202) 512-7215 or gurkinc@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix IV. This report examines (1) the incidence of prior serious safety or health violations among selected companies with Department of Defense (DOD) manufacturing and construction contracts, and (2) how DOD and selected DOD components address contractor workplace safety and health during the acquisition process. To describe the incidence of prior serious safety or health violations among selected companies with DOD manufacturing and construction contracts, we matched federal contracting data to the Department of Labor’s (DOL) Occupational Safety and Health Administration (OSHA) inspection data for selected contractors, interviewed OSHA officials, and reviewed relevant OSHA policy. Our data matching process is described below. To describe how DOD and selected DOD components address contractor workplace safety and health during the acquisition process, we selected two military departments (Army and Navy) and two components within these departments (the U.S. Army Corps of Engineers (USACE) and the Naval Sea Systems Command (NAVSEA)). We interviewed officials from DOD and these departments and components, and reviewed relevant DOD and component-level policy and guidance. To provide illustrative examples, we selected a non-generalizable sample of three USACE and three NAVSEA contracts, reviewed relevant contract file documentation, and interviewed knowledgeable contracting officials. Our criteria for selecting contracts and our review of contract file documentation are described below. While this review primarily focused on the award phase of the contracting process, NAVSEA and USACE officials also provided some information on the pre-award and contract performance phases of the contracting process, which we include in this report where relevant. For example, we interviewed USACE and NAVSEA safety officials about safety oversight practices during the contract performance phase. We also obtained examples of safety- related requirements for each of our selected contracts by interviewing contracting officials and reviewing contract documentation. To address both objectives, we reviewed relevant federal laws and regulations. To describe the incidence of prior serious safety or health violations among selected companies with Department of Defense (DOD) manufacturing and construction contracts, we matched federal contracting data to OSHA inspection data. OSHA categorizes a violation as “serious” when there is a substantial probability that death or serious physical harm could result, and the employer knew, or could have known with the exercise of reasonable diligence, of the hazard. Specifically, we matched contracting data from the Federal Procurement Data System- Next Generation (FPDS-NG) and the System for Award Management (SAM) to inspection data from the Occupational Safety and Health Information System (OIS) and Integrated Management Information System (IMIS). We assessed the reliability of the federal contracting data and OSHA inspection data by (1) performing electronic testing of relevant data elements, (2) reviewing existing information about the data and the systems that produced them, and (3) collecting information from federal officials knowledgeable about the data. Based on these reviews, we found the employer identification information in the federal contracting data, obligation amounts in the federal contracting data, and the OSHA inspection data to be sufficiently reliable for our purposes. First, we used FPDS-NG data to select the 100 companies with the largest DOD manufacturing contracts and the 100 companies with the largest DOD construction contracts (as measured by federal obligations) in fiscal year 2017. We focused on the manufacturing and construction industries because they have relatively high rates of occupational injuries, according to data from DOL’s Bureau of Labor Statistics (BLS), and over half of DOD contract obligations in that year were for contracts in these industries, according to FPDS-NG data. Next, we identified duplicate or related companies, and entities that were not private companies with DOD contracts performed within the United States, and narrowed this list of 200 companies to 192 companies. In fiscal year 2017, DOD obligations for contracts with these 192 companies accounted for about 79 percent of DOD’s obligations for contracts in the manufacturing and construction industries and about 46 percent of DOD’s total contract obligations. Then, to determine whether the 192 companies had been inspected by OSHA or state occupational safety and health agencies from fiscal years 2013 to 2017, we used automated matching procedures that compared the Employer Identification Numbers (EINs) and company names entered in the federal contracting databases to those entered in OSHA’s inspection databases. Specifically, we used FPDS-NG to identify the Data Universal Numbering System (DUNS) numbers for our selected companies, and then used SAM to identify the EINs that corresponded to each of those DUNS numbers. Next, we matched those EINs to the EINs in the OSHA inspection data. We considered a company to be a match if the EINs were identical and either (1) the company names were the same or similar, or (2) the company names were different, but we identified a relationship between the two company names, such as a parent company/subsidiary relationship, through an internet search. Using this process, we initially identified 90 selected companies that were inspected by OSHA from fiscal years 2013 to 2017. After completing this matching process, we sent a list of the remaining companies that we were unable to match to OSHA for review. Specifically, we asked OSHA officials to identify whether those companies were inspected from fiscal years 2013 to 2017, and provide inspection numbers for those companies that were inspected. OSHA officials reviewed this list and reported that OSHA had inspected some of the unmatched companies, and provided related inspection numbers. We then added those inspections to our analysis, which brought the total number of selected companies inspected by OSHA during this time period to 106 of 192. Our results are not generalizable to all companies that were awarded DOD manufacturing and construction contracts in fiscal year 2017. That year, about 29,000 companies had DOD manufacturing or construction contracts, and we reviewed a non-generalizable sample of 192 companies. In addition, limitations in the data do not allow a determination of whether the safety and health violations we identified occurred during work on a DOD contract because OSHA data do not include that information. Our counts of violations include only those in citations issued by OSHA or state agencies to our selected contractors as determined by our matching process, and only those that resulted from closed inspections where the violations and penalties are considered final. In addition, our counts of violations exclude any in citations issued only to subcontractors. According to OSHA officials, in certain circumstances, OSHA may cite both a prime contractor and a subcontractor for a violation, but in these cases the data would be recorded under two separate inspection numbers, which may or may not be linked in OSHA’s database. As a result, we did not attempt to identify inspections and violations for subcontractors. Furthermore, our counts of violations might exclude those in citations issued to any of the selected contractors’ subsidiaries or locations not identified by our matching process. We counted inspections and violations at the parent company level. Many of the companies we selected had multiple locations, and some may have had subsidiaries. OSHA inspections take place at the local worksite level. As a result, the number of violations we report reflects the total number of violations we identified across the selected companies’ various locations or subsidiaries that were inspected from fiscal years 2013 to 2017. To the extent that our matching process did not capture every company location or subsidiary, our findings may underestimate the actual number of inspections and violations among our selected companies. To provide examples of how selected DOD components address contractor workplace safety and health during the acquisition process, we selected a non-generalizable sample of three USACE and three NAVSEA contracts. To select these contracts, we first identified the 50 companies with the largest DOD construction contracts and the 50 companies with the largest DOD manufacturing contracts (as measured by federal obligations) in fiscal year 2017. Because our review focused on USACE and NAVSEA, we narrowed this list to USACE construction contractors (45) and NAVSEA shipbuilding or ship repair contractors (18). Next, we searched OSHA’s online inspection data to determine whether these contractors were cited for serious workplace safety or health violations within the last five years (fiscal years 2013 to 2017). Then, we selected the three USACE contractors and the three NAVSEA contractors that had the highest number of serious violations for closed OSHA inspections. We counted serious violations at the parent company level, which may include violations at different company locations. For example, OSHA violations we identified for one selected contractor occurred during both tank manufacturing and ship repair at different locations within the United States. After selecting these six companies, we identified the new USACE and NAVSEA contracts that were awarded to each selected company in fiscal years 2017 and 2016. We selected contracts that were awarded in fiscal year 2017 or 2016 because we expected that documentation for those contracts would be more readily available than for contracts awarded in previous years. Starting with the contracts that were awarded in fiscal year 2017, we selected one contract for each of these six contractors that had the highest total contract value (including base and all options) and provided diversity with respect to the contracting office that awarded the contract and the location where the work was performed. We excluded contracts that were for design or planning, rather than actual construction, shipbuilding, or ship repair. We also considered the proximity of the violation dates to the contract award date, and excluded contracts where all of the violations occurred after the contract was awarded, or immediately before the contract was awarded. In three cases, to satisfy these inclusion and exclusion criteria, it was necessary to select a contract that was awarded in 2016 and/or a contract that had the second highest total value. Each of our six selected contracts had a total contract value that was above the simplified acquisition threshold, which for the timeframe of our sample was generally above $150,000. (See table 2.) Of these six contractors, two had prior OSHA violations that occurred at the same location where the work on the selected contract was performed. However, we were unable to determine from the available data whether these violations occurred during work on a prior DOD contract, because OSHA data do not include that information. For each of the six selected contracts, we reviewed available relevant documentation in the contract file to determine how, if at all, officials considered information about contractors’ workplace safety and health in awarding the contract. These documents—depending on the type of source selection—included the contract solicitation, source selection plan, evaluation of contractor proposals, and the responsibility determination. In addition, we interviewed the contracting officials who awarded each of the six contracts to discuss how and why they considered available information about contractors’ workplace safety and health before awarding the contract, including whether this information was considered as part of the responsibility determination. We also determined whether prior OSHA violations were recorded in the Federal Awardee Performance and Integrity Information System (FAPIIS), to the extent these records were saved in the contract file. In addition, we obtained and reviewed Contractor Performance Assessment Reporting System (CPARS) reports for any information about occupational safety and health performance on past contracts, such as comments on safety practices or accidents, or the presence of safety ratings, as available in the files. The results of this review of contract file documentation cannot be generalized. We conducted this performance audit from February 2018 to February 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the contacts named above, Betty Ward-Zukerman (Assistant Director), Caitlin Croake (Analyst-In-Charge), Amy Sweet, Sonja Bensen, and Cathy Roark made key contributions to this report. Also contributing to this report were Marie Ahearn, Blake Ainsworth, Hiwotte Amare, Vincent Balloon, James Bennett, Linda Collins, Sarah Cornetto, Holly Dye, Andrea Evans, Laurier Fish, Suellen Foth, Kristen Jones, Sheila McCoy, Jean McSween, Diana Moldafsky, Stacy Ouellette, Anh Nguyen, Jason Rodriguez, Almeta Spencer, Kelly Turner, Kristin Van Wychen, Alyssa Weir, and Eve Weisberg.", "summary": "DOD is the largest contracting agency in the federal government, obligating about $320 billion for contracts in fiscal year 2017. Some DOD contracts—including some in the manufacturing and construction industries—involve work that can be dangerous, and questions have been raised about working conditions for these workers. The National Defense Authorization Act for Fiscal Year 2018 includes a provision for GAO to review issues related to the safety and health records of DOD contractors. This report examines: (1) the incidence of prior serious safety or health violations among selected companies with DOD manufacturing and construction contracts, and (2) how DOD and selected DOD components address contractor workplace safety and health during the acquisition process. GAO matched federal contracting data for fiscal year 2017 to OSHA inspection data for fiscal years 2013-2017 (most recent available); interviewed officials from OSHA, DOD, selected military departments, and selected DOD components; reviewed documentation from six selected DOD contract files; and reviewed relevant federal laws and regulations, policy, and guidance. Some selected companies with Department of Defense (DOD) manufacturing or construction contracts in fiscal year 2017 were previously cited for serious safety or health violations, according to GAO's analysis of federal data. Of the 192 companies with DOD contracts GAO selected for review, 106 had been inspected by the Department of Labor's (DOL) Occupational Safety and Health Administration (OSHA) or state occupational safety and health agencies during fiscal years 2013 through 2017. These inspections resulted in 83 companies being cited for at least one violation, including 52 with at least one serious violation (see figure). However, available data do not allow a determination of whether these violations occurred during work on a DOD contract because OSHA inspection data do not include that information. The incidence of violations among all inspected companies with DOD contracts cannot be determined because OSHA does not require its staff to obtain and enter a corporate identification number in its inspection data, which is needed to match contracting data to inspection data. As a result, OSHA's data do not consistently include these numbers, and users of OSHA's website cannot use these numbers to search for companies' previous violations. According to federal internal control standards, management should share the quality information necessary to achieve the entity's objectives. Unless OSHA explores the feasibility of requiring a corporate identification number in its inspection data, website users will likely have difficulty obtaining accurate information on individual companies' previous violations. DOD contracting officials have opportunities during the acquisition process to address contractor workplace safety and health. For example, before awarding certain types of contracts, officials may consider workplace safety and health information when they evaluate prospective contractors' performance on past contracts. However, the past performance information that is available for officials to consider varies by DOD component. One component has a practice of requiring construction contractors to be rated on workplace safety at the completion of the contract, but DOD does not require a safety performance rating department-wide. As a result, contracting officials in other components may lack readily accessible information on contractors' past safety performance, and DOD may miss opportunities to consider safety concerns when awarding new contracts, particularly those in high-risk industries with relatively high rates of occupational injuries, such as manufacturing and construction. GAO is making one recommendation to OSHA and two recommendations to DOD to enhance available information on contractor workplace safety. OSHA neither agreed nor disagreed with GAO's recommendation, but planned to take action to address it. DOD agreed with the recommendations.", "document_type": "gao"}
{"report": "In 2012, DOD developed plans to establish 133 CMF teams focused on offensive operations, defensive operations, and DOD network protection. DOD provided budget resources for these teams beginning in fiscal year 2014. It subsequently set goals for reaching initial operational capability and full operational capability. Later in this report we describe how some of the methods used to facilitate these teams’ achievement of full operational capability subsequently affected readiness. Once each CMF team has achieved full operational capability, it is required to certify to its mission at least every 2 years. According to CYBERCOM’s 2017 readiness guidance, in order for each CMF team to achieve the best readiness rating it must certify to its mission every 12 months. According to the DOD Cyber Strategy published in 2015, the first wave of CMF teams will include nearly 6,200 military, civilian, and contractor support personnel from across the military departments and defense components, when they are fully staffed. In February 2017, the commander of CYBERCOM endorsed an Army proposal to present its 21 Reserve component Cyber Protection Teams (11 Army National Guard and 10 Army Reserve) for assignment to U.S. Strategic Command to help address increased mission requirements. These 21 teams represent a second wave of teams, which CYBERCOM has scheduled to achieve full operational capability by September 30, 2024. The second wave of 21 Army Reserve component teams are to include more than 800 personnel once they are fully staffed. The CMF teams are aligned with various DOD organizations, as shown in figure 1. The military service cyber components—Army Cyber Command, Fleet Cyber Command, Marine Corps Forces Cyberspace, and Air Forces Cyber—are CYBERCOM’s service elements and support CYBERCOM in achieving its missions. The personnel on each team represent a variety of specialties, such as intelligence analysts, linguists, and cyber operators and specialists. Figure 2 provides a hypothetical example of how each team might combine personnel from different specialties to carry out its missions. This figure does not show the actual composition of any type of team, but rather provides notional examples of how each team consists of personnel from different specialties who unite to perform cyber missions as part of the CMF. Training personnel for the CMF occurs in four phases and is administered by different entities, as shown in figure 3. Phase one basic training is the initial training performed by the military services that is delivered to any new recruit so that he or she may be assigned a military specialty. As shown in figure 2, CMF personnel draw from a number of different military specialties, including cyber, all-source intelligence, signals intelligence, information technology, and language specialists. Phase one basic training is not necessarily cyber-specific, as it is meant to provide military personnel with the basic skills needed to perform a particular occupation for the service. For example, CMF teams include intelligence professionals who may be assigned to analyze intelligence information that comes from a variety of sources. Training in phases two (foundational), three (collective), and four (sustainment) are focused more directly on the specific skills required to function as a member of the various CMF teams. To establish and train the CMF teams, DOD has assigned components and senior officials with CMF training roles and responsibilities. The key responsibilities for training the CMF are summarized in table 1 below; a more inclusive list is presented in appendix I. As part of the department’s efforts to develop and maintain trained CMF teams, CYBERCOM and the military services have implemented a number of initiatives. Specifically, CYBERCOM established consistent training standards, developed standard operating procedures for readiness reporting, and established and maintained a series of phase two foundational training courses. Further, CYBERCOM and the military services used existing training capabilities to build CMF teams. However, many of the teams that have been built are not yet fully trained and, according to agency officials, have “generally low” readiness levels. In 2012, CYBERCOM established consistent standards for CMF training phases within its responsibility, and the command has continuously updated those standards, as needed, to meet evolving requirements. Specifically, the command has established and updated the standards for phases two (foundational), three (collective), and four (sustainment) of CMF training. These standards apply to all military personnel regardless of service affiliation or active/reserve status. The standards are contained primarily in two documents. First, CYBERCOM issued and has regularly updated the Joint Cyberspace Training and Certification Standards (JCT&CS) to create standardized joint procedures, guidelines, and standards for individual staff and collective training, and to accurately assess CMF teams’ ability to perform their missions. This document was most recently revised in February 2018, to update, among other things, the tasks and abilities associated with CMF work roles based on feedback from experts within the military services and CYBERCOM. Second, CYBERCOM published the CMF Training and Readiness Manual to serve as the primary training and evaluation guidance for DOD cyber professionals. The CMF Training and Readiness Manual has been updated 13 times since it was originally issued in 2013, and it is CYBERCOM’s authoritative guide to building and maintaining cyber training and readiness for its personnel. It provides graduated levels of evaluated training that teams can use in preparing for certification and in being certified. Additionally, it identifies approved training events and the mission-essential tasks, associated standards, and key duties for members of CMF teams. The manual requires each team to recertify every 2 years, or upon recovery from a 50 percent or higher turnover of CMF team personnel. In December 2017, CYBERCOM published standard operating procedures for readiness reporting that CMF teams are to use to assess whether they have the resources and capability to perform their missions. The procedures define CMF readiness reporting guidelines related to personnel, equipment, and training. For example, the document identifies three training metrics that evaluate (1) whether personnel are trained to job qualification standards; (2) whether CMF teams have successfully completed supporting tasks during training exercises, events, or real world operations; and (3) the length of time between formal evaluations. Specifically, the standard operating procedures emphasize that in order to obtain the best training readiness rating, teams must perform an evaluated event or operation at least once every 12 months. CYBERCOM maintains and coordinates a series of CMF courses for phase two foundational training. It develops and administers these course requirements for all of the CMF work roles and requires personnel to complete courses specific to their job responsibilities. All CMF personnel filling a specific mission and role complete the same foundational courses, regardless of military service, employment status—active duty or reserve—or type of CMF team to which they are assigned. For example, all intelligence analysts on CMF teams are to complete the same 14 courses that are specific to their role on the team. CYBERCOM training directorate officials told us they had to make changes to the training progression over time to adapt to the changing threat environment. Accordingly, CYBERCOM has added, modified, or deleted phase two foundational training courses over the past 4 years. For example, in the past 4 years CYBERCOM consolidated four existing courses into a single introductory cyber course that is taken by all-source intelligence analysts who will be part of CMF teams. In November 2017, the command updated the phase two foundational training requirements by removing three courses that were required for a variety of Cyber Protection Team work roles. CYBERCOM also added a new networking course that is a pre-requisite to a course that comes later in the training progression for Cyber and National Mission Team mission commanders. The most recent update also emphasized that Cyber Protection Team personnel must complete the Intermediate Cyber Core Course, the Cyber Protection Team Core Course, and then their specific methodology courses, in that order. According to officials from the service cyber components, the changes CYBERCOM has made to its phase two foundational training progression have been transparent and have addressed evolving threats. However, the changes have also negatively affected training time frames, particularly for the CMF teams composed of National Guard and Reserve personnel. Because National Guard and Reserve teams are scheduled to achieve full operational capability after the active duty teams, they are more likely to be subject to the newer training progressions, which in some cases require a few additional days of courses. Officials from the National Guard told us that this additional training time is more difficult to schedule for National Guard and Reserve personnel because—unlike the active duty personnel who are available to train full time—National Guard and reservist personnel are available to train only one weekend per month and generally for 2 weeks of annual training. Additionally, most of these personnel must coordinate time off from their full-time jobs to take the required phase two foundational training courses. To help address these challenges, CYBERCOM officials told us they use mobile training teams. The Army Cyber School has also used mobile training teams to provide CMF training opportunities to Reserve personnel. The officials from CYBERCOM and the Army told us that the mobile training teams make training more accessible by avoiding the need for the National Guard and Reserve personnel to travel. DOD has used existing training capabilities—including courses, instructors, and facilities—throughout all phases of CMF training. For example: Joint Cyber Analysis Course. The Navy’s Center for Information Warfare Training is the host for the Joint Cyber Analysis Course—a phase one basic training course for personnel designated for cryptologic roles. CYBERCOM recommends this course for many CMF work roles. Cyber and Cryptologic training institutions. CYBERCOM has partnered with the Defense Cyber Investigation Training Academy, the Defense Information Systems Agency, the National Security Agency, and military service schoolhouses to deliver phase two foundational training for the CMF. The Defense Cyber Investigation Training Academy offers almost all of the training courses needed by Cyber Protection Teams, and Army officials said they used the expertise and course materials provided by the Defense Cyber Investigation Training Academy to develop Cyber Protection Team training courses that they offer at the Army Cyber School as well. National Security Agency’s National Cryptologic School provides a majority of the other phase two foundational CMF training courses. According to officials from CYBERCOM and the National Cryptologic School, reliance on existing training capabilities and expertise from the National Security Agency enabled the command to quickly establish CMF capabilities. Operational events. CYBERCOM used both simulated and real-world operational events on networks to support the certification of CMF teams. For example, CYBERCOM officials told us that CYBER KNIGHT is a training event offered periodically by CYBERCOM for CMF teams to exercise national and non-national mission sets. CYBER FLAG and CYBER GUARD, also conducted by CYBERCOM on a periodic basis, utilize a dynamic joint cyber training environment and, according to CYBERCOM officials train all types of CMF teams. In addition to using simulated events through exercises, CYBERCOM and military service officials said that teams were allowed to use real- world operations to meet phase three collective training requirements. The military services and CYBERCOM plan to continue to use existing resources, such as the service school houses, for new and continuous training into the future. For example, as part of their training transition plan, Marine Corps officials reported that they have a contract in place with Navy’s Space and Naval Warfare Systems Command to provide additional training to Marine Corps CMF personnel after they complete the phase two foundational training progression. Additionally, the Army Cyber School, which provides CMF-specific training for the Army, currently trains Marine Corps personnel as well. The Army and Marine Corps have training agreements in place to continue this arrangement. Figure 4 below shows a member of the National Guard participating in a cyber training exercise. We found that many of the CMF teams for which DOD has reported achieving full operational capability actually require further training, for varying reasons. For example, officials from many key organizations across the DOD cyber enterprise told us that the services moved some personnel among teams, reducing the readiness for teams from which personnel were transferred. Officials from the Office of the Under Secretary of Defense for Personnel and Readiness, Joint Staff, and the military services cited other challenges affecting CMF team readiness levels as well, including the long time frames needed to obtain the appropriate clearances for CMF personnel and the high pace of operations for the teams, leaving little time for training. The same officials from across DOD’s cyber enterprise affirmed that, taken together, these actions and circumstances have had a negative effect on CMF team resource readiness levels. In April 2018, the commander of CYBERCOM acknowledged in testimony that “much works remains to be done to make the personnel proficient at their duties and the whole team ready and able to perform whatever missions might be directed.” The CMF teams were not fully trained and had lower readiness levels because CYBERCOM and the military services focused primarily on the teams’ achieving full operational capability by October 1, 2018, rather than on building operational readiness. Building operational readiness requires the teams to simultaneously have the appropriate number of sufficiently trained personnel across the force. According to the CMF Training Transition Plan, CYBERCOM’s senior leadership directed the command to achieve full operational capability, and it designated that effort as a higher priority than operational readiness. CYBERCOM officials told us that they recognized the low readiness of the CMF teams and have identified two actions to address the training deficiencies—and associated effects on readiness—for the CMF teams. First, according to the officials, CYBERCOM has developed a system that assigns unique identifiers to each person in the CMF and allows CYBERCOM to easily track when personnel move from one team to another. Second, in December 2017, CYBERCOM issued its readiness reporting standard operating procedure that establishes new readiness reporting guidelines. CYBERCOM officials stated that these guidelines emphasize readiness over the achievement of interim milestones, such as full operational capability. Given that CYBERCOM recently implemented these efforts to improve the readiness of the CMF teams, and that the quarterly readiness reports indicate improved resource readiness for personnel and training metrics, we are not making recommendations related to this issue. Through our body of work on defense cyber issues, we will continue to monitor DOD’s and CYBERCOM’s efforts to maintain a ready CMF. DOD has taken steps to shift its focus from building a trained CMF to maintaining this force, but it has not taken key actions to ensure that the department is poised to maintain CMF training following this transition. Specifically, the military services have not developed plans that include time frames for validating all phase two foundational training courses, or that comprehensively assess their training requirements. Further, as of June 2018, CYBERCOM had not provided a plan for establishing independent assessors to evaluate and certify the completion of phase three collective training for CMF teams. DOD officials told us that the department is shifting its focus away from building and toward maintaining a trained CMF. For example, the Army is leading the development of a Persistent Cyber Training Environment. The goal of that training environment is to provide on-demand access to scenarios that Army officials told us will enhance the quality, quantity, and standardization of phase three (collective) and phase four (sustainment) training and exercise events. The Persistent Cyber Training Environment is scheduled to provide some operational capability by 2019, and it is expected to continue to evolve to meet training needs. In addition to building a Persistent Cyber Training Environment, the department has developed the CMF Training Transition Plan, which will transfer administration of phase two foundational training from CYBERCOM to the services. Specifically, beginning in October 2018, the military services will assume responsibility for phase two foundational training of CMF personnel, which CYBERCOM has centrally managed since CMF training began in 2013. Officials from the services and CYBERCOM have held quarterly meetings to help guide the implementation of this plan. According to the CMF Training Transition Plan, the transfer is being made in response to a direction in Senate Report 114-49 accompanying a bill for the National Defense Authorization Act for Fiscal Year 2016. The report directed the DOD Principal Cyber Advisor, the Commander, CYBERCOM, and the service secretaries to develop a plan for the military services to complete all required training for the second wave of CMF teams and to maintain individual training capabilities for the existing teams. In January 2017 the Joint Staff and Principal Cyber Advisor published the CMF Training Transition Plan, to transition CMF training to a model that complied with congressional committee direction. The principal goal of this approach is to drive efficiencies and reduce training development and delivery costs. According to the plan, CYBERCOM maintains control of the standards for phase two foundational training, while the Army, Navy, and Air Force are to assume specific joint curriculum lead roles. These roles entail developing joint training plans for the courses under the work roles they are assigned. In addition, the joint curriculum leads (i.e., Army, Navy, and Air Force) are responsible for identifying training gaps and developing learning objectives and courseware based on the CYBERCOM training task list requirements for each of the work roles. For example, under its curriculum lead role, the Army has accepted responsibility for the cyber planner courses. In carrying out this role, the Army developed the Cyber Operations Planners Course and submitted it to CYBERCOM to establish as an approved course for all cyber planners—regardless of service affiliation and of active or reserve duty status—in the CMF. Figure 5 shows the work role categories and responsibilities for which each military service has agreed to be curriculum lead. In November 2017, CYBERCOM directed the military services to develop plans to implement their responsibilities in support of the CMF Training Transition Plan. In accordance with the training transition plan, the military services will assume responsibility for phase two foundational course validation as part of their joint curriculum lead duties. In February 2018, each of the four services provided a plan to CYBERCOM that, at a minimum, highlighted the efforts each service was taking to prepare for its new training transformation responsibilities, including phase two foundational course validation. The purpose of course validation is to determine whether a course adheres to CYBERCOM’s joint training standards as published in the Joint Cyberspace Training and Certification Standards (JCT&CS). CYBERCOM’s draft course validation guidance states that validation involves an examination of both the content of the courses, as well as the instructional methods. The manual states that the content should align with the knowledge, skills, and abilities for the appropriate CYBERCOM work roles and should meet the joint training standard. Further, the manual states that the validation of instructional methods examines how the course is taught and determines whether the methods are appropriate to support desired course outcomes. CYBERCOM’s draft course validation guidance lays out a series of requirements for the validation process, among which are the following: The military service that is submitting the course for validation is responsible for assembling course information, providing back-up data about the course, and securing subject matter experts to review the submission. The military service that is the joint curriculum lead for the course is responsible for reviewing the submissions and offering recommendations for modifications to courses to reflect joint standards. CYBERCOM is responsible for making final determinations of course validity. In this final review, CYBERCOM may hold discussions with key stakeholders, audit the course, review student feedback on the course, or review evaluation data from the course to inform its final validation determination. Our review of the services’ training transition plans found that the Army’s and Air Force’s plans address course validation to some degree, but they do not identify specific time frames for completing course validation. Specifically, the Army’s plan identifies the milestones, dates, and resources for the submission of two of its analyst and planner courses to CYBERCOM for validation, but it does not indicate when the service will submit its Cyber Protection Team Core Training Course for validation. The Air Force’s plan establishes a timeline for developing, finalizing, and distributing course validation guidance, but it does not have time frames or milestones indicating a time for beginning the process of submitting courses to CYBERCOM for validation. Standards for Internal Control in the Federal Government highlights the need to define objectives in specific terms, to include how objectives are to be achieved and time frames for their achievement. For example, the Navy’s plan indicates that the four courses for which it is responsible will be iteratively validated between fiscal years 2019 and 2021. While a 24- month time frame is broad and it may be challenging for CYBERCOM and the other services to know with precision when the Navy will complete its course validation efforts, the plan includes a time frame that CYBERCOM and the services can use for further discussion and planning purposes. The plans submitted by the Army and the Air Force indicate that the course validation time frames for phase two foundational courses are unknown because course validation is still dependent upon CYBERCOM’s review. The Army’s plan includes time frames for submitting to CYBERCOM two of the three courses it is responsible for developing, but one of the courses does not have any time frames. Further, the Air Force plan includes time frames for developing guidance on how to perform course validation that only carry it through September 2018; it does not have time frames for actually carrying out its course validation processes. As the military services assume phase two foundational training responsibilities from CYBERCOM, it is important that they coordinate with CYBERCOM to establish a timeline for course validation, as appropriate. With a clearer idea of which information can appropriately be removed from training courses, the services will be able to make informed decisions to balance the cost-effectiveness of the training with delivering trained cyber personnel to CMF teams more quickly. However, without an established time frame to assess and validate the efficiency and effectiveness of all phase two individual foundational training against established expectations, DOD will not be well positioned to reasonably assure that the phase two foundational training meets the needs of the CMF and its mission. Training plans should be detailed enough to provide insight into the number of people needed to fill specific positions to sustain an organization. As part of the training transition process, CYBERCOM required the military services to submit implementation plans that identify, among other things, training requirements and execution. Also, according to our prior work published in Human Capital: A Guide for Assessing Strategic Training and Development Efforts in the Federal Government, training plans should be designed to determine the skills and competencies a workforce needs to prepare for current, emerging, and future agency needs in pursuit of its missions. These needs include the size of the workforce; its deployment across the organization; and the knowledge, skills, and abilities needed for the agency to pursue its current and future missions. To ensure a strategic workforce planning approach, it is important that agencies consider how hiring, training, and other human capital strategies can be aligned to support mission success. The Army, Navy, and Air Force developed training transition implementation plans to address training requirements and execution to some degree, but the plans do not identify the number of personnel or teams and the specific training activities needed across all phases of training to maintain the CMF. For example, neither the Army nor the Air Force plan identifies the number (average or total) of personnel for each of the work roles described in figure 2 (for example, cyber operators, intelligence analysts, linguists) that the military services need to complete phase two foundational training courses to maintain the appropriate sizing and deployment of personnel across CMF teams. Additionally, the Army and Air Force plans do not identify the number of personnel or teams needed to conduct phase three (collective) and phase four (sustainment) training in future years. In contrast, the Navy’s plan identifies the average number of personnel who would need to take specific phase two foundational courses—including those being developed by other services and CYBERCOM—to maintain its CMF teams. However, the Navy’s plan does not include this same information for phases three and four of training. The Marine Corps did not address training requirements and execution within its implementation plan. According to officials from the Army and the Air Force, the February 2018 documents they provided in response to CYBERCOM’s requirement do not include plans that identify training requirements because submission of that information was not required by CYBERCOM. However, a November 2017 CYBERCOM memorandum clearly directed the military services with joint curriculum lead responsibilities to submit plans that support implementation of the department’s CMF Training Transition Plan, including training requirements execution data. Having a comprehensive plan that identifies the number of personnel or teams needed to accomplish specific training activities would help the services to better manage the number of personnel who need to be rotated into the CMF teams. It would also help the military services coordinate with each other on course offerings by providing situational awareness of the number of personnel from other services who could attend their courses in any given year. For example, the Air Force would know how many Army, Navy, and Marine Corps personnel would attend the courses being offered by the Air Force. Without a plan that comprehensively assesses and identifies the services’ training needs for each type of personnel, DOD cannot reasonably ensure that its training plan will support the transition to a joint training model or be aligned with its stated goal to maintain a trained and ready force. As of June 2018, CYBERCOM had not provided a plan for establishing independent assessors to evaluate and certify the completion of phase three collective training for CMF teams. CYBERCOM’s CMF Training and Readiness Manual explains that evaluations are necessary to assess readiness and provide commanders with a process to determine a team’s proficiency in the tasks it must perform during a mission. Assessors play an important role in this evaluation process by judging the performance of CMF teams using CYBERCOM’s evaluation forms, which establish common evaluation criteria to determine whether the team being evaluated has met the certification standards. CYBERCOM officials told us that to evaluate teams completing phase three certification through CYBERCOM events (approximately 50 percent, according to agency officials), the command provided a joint team of assessors. CYBERCOM and service officials told us that the services provided their own assessors for teams that completed phase three training through their respective service-hosted exercises. In discussions with Army and Air Force officials, they identified two challenges they have experienced with the services providing assessors to evaluate their own teams, which could lead to subjectivity in CMF team evaluations. First, in some instances the assessors have come from within the same chain of command as the CMF team and thus are not truly independent. Standards for Internal Control in the Federal Government discusses the importance of segregation of duties in designing control activities so that incompatible duties are segregated in order to mitigate the risk of management override of internal control. In this case, having an assessor from the same chain of command evaluate a CMF team’s performance in a certification event presents an increased risk of fraud through management override. Second, while the CMF Training and Readiness Manual includes checklists that assessors can use to evaluate team performance, according to service officials, the manual does not provide clear guidance on how to evaluate whether the tasks and performance standards have been sufficiently met by the team. The absence of such information could lead to subjective evaluations as to whether a team met the desired performance standard. According to one service official, these challenges could be addressed if CYBERCOM were to provide an expert who evaluates the training tasks and performance standards—an action that could lead to a more consistent application of evaluation criteria. When we asked officials from CYBERCOM’s training directorate about whether the command could provide more oversight for certification events, the officials acknowledged that, among other tasks, the command is responsible for ensuring that assigned joint cyber forces are trained, certified, and interoperable with other forces. The officials said that to do this, the command will use established training standards and develop a plan to train and certify CMF team evaluators to a set of standardized criteria. Command officials said they believe this will enable the services and CMF teams to have qualified assessors who are trained and certified by CYBERCOM to consistently evaluate the performance of the CMF teams based on joint standards. With this capability, for example, a Navy Cyber Protection Team assessor can be used by an Army Cyber Protection Team to evaluate that team in an operation, exercise, or training event. This training capacity should enhance the interoperability between the services and allow for consistent evaluation of a team’s performance. However, as of June 2018, CYBERCOM had not provided a plan to train and certify assessors from across the services; as such a plan had not yet been developed. Standards for Internal Control in the Federal Government explains that in defining objectives, management should clearly define what is to be achieved, how it will be achieved, and the time frames for achievement. Documenting these objectives in a plan also will help formalize the new process and ensure that the appropriate managerial emphasis is given to the effort. DOD has used similar mechanisms to implement changes to cyber training in the past, such as developing the CMF Training Transition Plan in response to moving phase two foundational training responsibility from CYBERCOM to the military services. Since phase three certification events act as a quality control mechanism for CMF teams, it is important that the events be independently evaluated to ensure that CMF teams are trained to a consistent standard. Without a documented plan to train and certify assessors to evaluate CMF phase three collective training certification events, the CMF teams will not be consistently evaluated as they are operationally certified. CYBERCOM assesses the prior experience of CMF personnel to meet training requirements through a process known as individual training equivalency. This process allows personnel to be exempted from specific training courses by showing that they have already met the learning objectives of the course through their prior experience. CYBERCOM established an Individual Training Equivalency Board consisting of subject matter experts and representatives from CYBERCOM, the National Security Agency, and service cyber components who review the applications and recommend whether equivalency should be granted. The Individual Training Equivalency Board reviewed approximately 700 applications for equivalency from September 2013 through April 2018, and more than three-quarters of those applicants had at least one course exemption approved. According to officials from CYBERCOM’s training directorate, which is responsible for administering the individual equivalency process, there are a number of reasons why requests for course exemptions are not approved. For example, some applicants are denied for administrative reasons, such as not filling out the paperwork correctly. Also, applicants are not eligible to receive exemptions for courses that are not part of their work role requirements, but some personnel try to do so. Officials also said that board members do not deem some applicants’ reported experiences as comparable to the knowledge and skills they would obtain from taking courses for which they seek exemptions. Based on our review CYBERCOM’s memorandums that document the approval or disapproval of approximately 700 individual requests for training exemptions, we observed that applicants typically requested exemptions for multiple courses, with some seeking exemptions for up to 16 courses. Altogether during this period, we found that CYBERCOM granted more than 1,400 equivalencies for approximately 90 different phase two foundational training courses. Certain courses were exempted more often than others. For example, the course for which CYBERCOM most frequently granted individual exemptions was the Joint Advanced Cyber Warfare Course. This 4-week course provides an orientation to CYBERCOM, the global cryptologic platform, the intelligence community, and allies and major partners in the conduct of cyber warfare operations, planning, and analysis of effects. Other courses that were commonly granted training exemptions included 1-week courses related to computer network exploitation, cyber offensive and defensive operations, and understanding network and operating system fundamentals. These courses teach the basic skills associated with performing CMF operations. Additionally, we found that CYBERCOM’s Individual Training Equivalency Board approved approximately 50 exemptions for Intermediate Cyber Core, which is an 8- week course that CYBERCOM training officials described as providing the background and proficiency needed to identify, understand, and navigate the digital environment. The officials said that the course also provides an understanding of network operational methods and offensive and defensive cyber operation principles. CYBERCOM has not established master training task lists for phase two foundational training, a key set of standards the services are to use in preparing course equivalency standards. The task lists correlate to the knowledge, skills, and abilities that the services will use to develop learning objectives and course materials for training. They are also important in informing the services’ ability to make equivalency application determinations because they form the learning objectives of the courses that may be bypassed. To determine whether an applicant’s experience is equivalent to what would be taught in a course; the entity making the decision must know the learning objectives of the course. However, as of May 2018, CYBERCOM officials were unable to provide evidence that the command had developed master training task lists for phase two foundational CMF training courses, as required. The January 2017 CMF Training Transition Plan required CYBERCOM to provide all mission and support team master training task lists for the phase two foundational training courses to the military services no later than March of 2018. Service and CYBERCOM officials said that they are holding monthly meetings to provide updates related to the training standards and other training transition-related information, but as of May 2018, CYBERCOM officials had not confirmed that they had provided the master training task lists to the services. Officials from the services told us that they need these master training task lists to develop clear decision rules as they assume responsibility for making equivalency decisions for phase two foundational training courses. When we interviewed CYBERCOM in February of 2018, officials told us that they were not aware of the requirement established in the CMF Training Transition Plan, but said they would start developing the master training task lists. Establishing clear standards is particularly important at this time, because the services are scheduled to assume responsibility for administration of the individual training equivalency process for Cyber Protection Team phase two foundational training courses in October 2018. Until CYBERCOM establishes and disseminates the master training task lists for phase two foundational CMF courses, the military services are at risk of developing inconsistent decision rules for their training equivalency processes, and the development of such processes could be delayed, resulting in the funding of training that is unnecessary. Developing and maintaining a trained cyber mission force is imperative to DOD’s ability to achieve its missions in the connected world within which it operates. DOD has made progress toward its goals of building and maintaining a trained cyber mission force. As DOD starts to focus on maintaining a ready CMF, addressing gaps in its training plans and structure will help it reach those goals. The Army’s and Air Force’s lack of time frames, like those established by the Navy in its implementation plan, for validating phase two foundational training could contribute to training inefficiency and unnecessarily long time frames for training personnel. Further, the military services, by not clearly identifying the number of personnel they need to train, hinder planning and coordination efforts to ensure that the training infrastructure is sufficient and is used efficiently. In addition, the absence of a plan for CYBERCOM to establish independent assessors for phase three collective training certification events may lead to teams being certified to different standards. Also, not having the master training task lists necessary to establish clear decision rules for granting individual training exemptions for phase two foundational training courses may contribute to inconsistent personnel skill levels and inefficient use of training resources. Focusing on maintaining sustainable readiness, as DOD has already begun to do, and addressing these weaknesses can lead to long-term improvements in the capability and capacity of its CMF. We are making eight recommendations to DOD. The Secretary of Defense should ensure that the Army, in coordination with CYBERCOM and the National Cryptologic School, where appropriate, establish a time frame to validate all of the phase two foundational training courses for which it is responsible. (Recommendation 1) The Secretary of Defense should ensure that the Air Force, in coordination with CYBERCOM and the National Cryptologic School, where appropriate, establish a time frame to validate all of the phase two foundational training courses for which it is responsible. (Recommendation 2) The Secretary of the Army should ensure that Army Cyber Command coordinate with CYBERCOM to develop a plan that comprehensively assesses and identifies specific CMF training requirements for phases two (foundational), three (collective), and four (sustainment), in order to maintain the appropriate sizing and deployment of personnel across the Army’s CMF teams. (Recommendation 3) The Secretary of the Navy should ensure that Fleet Cyber Command coordinate with CYBERCOM to develop a plan that comprehensively assesses and identifies specific CMF training requirements for phases three (collective) and four (sustainment) in order to maintain the appropriate sizing and deployment of personnel across the Navy’s CMF teams. (Recommendation 4) The Secretary of the Air Force should ensure that Air Forces Cyber coordinate with CYBERCOM to develop a plan that comprehensively assesses and identifies specific CMF training requirements for phases two (foundational), three (collective), and four (sustainment), in order to maintain the appropriate sizing and deployment of personnel across the Air Force’s CMF teams. (Recommendation 5) The Commandant of the Marine Corps should ensure that Marine Corps Forces Cyberspace coordinate with CYBERCOM to develop a plan that comprehensively assesses and identifies specific CMF training requirements for phases two (foundational), three (collective), and four (sustainment), in order to maintain the appropriate sizing and deployment of personnel across the Marine Corps’ CMF teams. (Recommendation 6) The Secretary of Defense should ensure that the commander of CYBERCOM develops and documents a plan for establishing independent assessors to evaluate CMF phase three collective training certification events. (Recommendation 7) The Secretary of Defense should ensure that the commander of CYBERCOM establishes and disseminates the master training task lists covered by each phase two foundational training course and convey them to the military services, in accordance with the CMF Training Transition Plan. (Recommendation 8) We provided a draft of the FOUO version of this product to DOD for review and comment and worked with the department to develop this unclassified product. In its comments on the FOUO version of this, reproduced in appendix II, DOD concurred with our recommendations. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to appropriate congressional committees; the Secretary of Defense, the office of the Principal Cyber Advisor, the Office of the Under Secretary of Defense for Personnel and Readiness, the Office of the Deputy Assistant Secretary of Defense for Cyber Policy, the Commander of CYBERCOM, the leadership of each of the service cyber components, and the director of the National Security Agency’s National Cryptologic School. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9971 or kirschbaumj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. Based on our review of related statutes, Department of Defense (DOD) instructions and directives, and other guidance, we found that various DOD officials have been assigned a variety of CMF training roles and responsibilities, summarized in table 1 below. In addition to the individual named above, Tommy Baril, Assistant Director; Tracy Barnes; Patricia Farrell Donahue; Ashley Houston; Amie Lesser; Randy Neice; Geo Venegas; and Cheryl Weissman made key contributions to this report.", "summary": "Developing a skilled cyber workforce is imperative to DOD achieving its offensive and defensive missions, and in 2013 it began developing CMF teams to fulfill these missions. CYBERCOM announced that the first wave of 133 such teams achieved full operational capability in May 2018. House Report 115-200 includes a provision for GAO to assess DOD's current and planned state of cyber training. GAO's report examines the extent to which DOD has (1) developed a trained CMF, (2) made plans to maintain a trained CMF, and (3) leveraged other cyber experience to meet training requirements for CMF personnel. To address these objectives, GAO reviewed DOD's cyber training standards, planning documents, and reports on CMF training; and interviewed DOD officials. This is an unclassified version of a For Official Use Only report that GAO previously issued. U.S. Cyber Command (CYBERCOM) has taken a number of steps—such as establishing consistent training standards—to develop its Cyber Mission Force (CMF) teams (see figure). To train CMF teams rapidly, CYBERCOM used existing resources where possible, such as the Navy's Joint Cyber Analysis Course and the National Security Agency's National Cryptologic School. As of November 2018, many of the 133 CMF teams that initially reported achieving full operational capability no longer had the full complement of trained personnel, and therefore did not meet CYBERCOM's readiness standards. This was caused by a number of factors, but CYBERCOM has since implemented new readiness procedures that emphasize readiness rather than achieving interim milestones, such as full operational capability. DOD has begun to shift focus from building to maintaining a trained CMF. The department developed a transition plan for the CMF that transfers foundational (phase two) training responsibility to the services. However, the Army and Air Force do not have time frames for required validation of foundational courses to CYBERCOM standards. Further, services' plans do not include all CMF training requirements, such as the numbers of personnel that need to be trained. Also, CYBERCOM does not have a plan to establish required independent assessors to ensure the consistency of collective (phase three) CMF training. Between 2013 and 2018, CMF personnel made approximately 700 requests for exemptions from training based on their experience, and about 85 percent of those applicants had at least one course exemption approved. However, GAO found that CYBERCOM has not established training task lists for foundational training courses. The services need these task lists to prepare appropriate course equivalency standards. GAO is making eight recommendations, including that the Army and Air Force identify time frames for validating foundational CMF courses; the military services develop CMF training plans with specific personnel requirements; CYBERCOM develop and document a plan establishing independent assessors to evaluate training; and CYBERCOM establish the training tasks covered by foundational training courses and convey them to the services. DOD concurred with the recommendations.", "document_type": "gao"}
{"report": "VA’s mission is to promote the health, welfare, and dignity of all veterans by ensuring that they receive medical care, benefits, social support, and lasting memorials. In providing health care and other benefits to veterans and their dependents, VA relies extensively on IT systems and networks to receive, process, and maintain sensitive data, including veterans’ medical records and other personally identifiable information. Accordingly, effective information security controls based on federal guidance and requirements are essential to ensure that the department’s systems and information are adequately protected from loss, unauthorized disclosure, inadvertent or deliberate misuse, or improper modification, and are available when needed. Implementing an effective information security program and controls is particularly important for VA since it uses IT systems and electronic information to perform essential activities for veterans, such as providing primary and specialized health care services, medical research, disability compensation, educational opportunities, assistance with home ownership, and burial and memorial benefits. The corruption, denial, or delay of these services due to compromised IT systems and electronic information can create undue hardship for veterans and their dependents. The Federal Information Security Modernization Act of 2014 (FISMA) requires the head of each agency to provide information security protections commensurate with the risk and magnitude of harm resulting from unauthorized access, use, disclosure, disruption, modification, or destruction of the information and information systems used by or on behalf of the agency. The act also requires federal agencies to develop, document, and implement an agency-wide information security program to provide security for the information and information systems supporting their operations and assets by implementing policies and procedures intended to cost-effectively reduce risks to an acceptable level. In May 2017, the president signed Executive Order 13800 on strengthening the cybersecurity of federal networks and critical infrastructure. The order sets policy for managing cybersecurity risk and directs each executive branch agency to use the National Institute of Standards and Technology’s (NIST) cybersecurity framework to manage those risks. The NIST cybersecurity framework identifies specific activities and controls for achieving five core security functions: Identify: Develop an understanding of the organization’s ability to manage cybersecurity risk to systems, people, assets, data, and capabilities. Protect: Develop and implement appropriate safeguards to ensure delivery of critical services. Detect: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event. Respond: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident. Recover: Develop and implement appropriate activities to maintain plans for resilience and to restore capabilities or services that were impaired due to a cybersecurity incident. According to NIST, these five functions provide a high-level, strategic view of the life cycle of an organization’s management of cybersecurity risk. In fiscal year 2018, the 23 civilian agencies covered by the Chief Financial Officers Act of 1990 (CFO Act), including VA, reported spending over $6.5 billion on IT security- or cybersecurity-related activities. The 23 civilian agencies individually reported spending between $9 million and almost $1.9 billion on these activities. Collectively, these 23 agencies spent on average about 14 percent of their total IT expenditures on cybersecurity-related activities. VA reported spending about $386 million on cybersecurity, which represented about 8 percent of its total IT expenditures. In fiscal year 2018, federal agencies continued to report large numbers of information security incidents. As we previously noted, federal agencies reported over 30,000 security incidents during each of the last three fiscal years. Specifically, agencies reported a total of 30,899, 35,277, and 31,107 information security incidents in fiscal years 2016, 2017, and 2018, respectively. During those same periods of time, VA reported an average of 2,415 incidents annually, although the number of reported incidents steadily decreased from 2,808 to 1,776, as shown in figure 1. In fiscal year 2018, VA reported 1,776 incidents involving several threat vectors. These threat vectors included web-based attacks, phishing attacks, and the loss or theft of computer equipment, among others. Figure 2 provides a breakdown of information security incidents, by threat vector, reported by VA in fiscal year 2018. Perhaps most concerning of the incidents reported by VA is the relatively large percentage of incidents (41 percent) for which VA identified “Other” as the threat vector. Government-wide, agencies identified approximately 27 percent of their incidents in the “Other” category in fiscal year 2018. A large percentage of these incidents may indicate a lack of agency awareness and ability to investigate and catalog incidents. FISMA requires IGs to determine the effectiveness of their respective agency’s information security programs. To do so, OMB instructed IGs to provide a maturity rating for agency information security policies, procedures, and practices related to the five core security functions— identify, protect, detect, respond, and recover—established in the NIST cybersecurity framework, as well as for the agency-wide information security program. The ratings used to evaluate the effectiveness of agency information security programs are based on a five-level maturity model, as described in table 1. According to this maturity model, Level 4 (managed and measurable) represents an effective level of security. Therefore, if an IG rates the agency’s information security program at Level 4 or Level 5, then that agency is considered to have an effective information security program. VA was one of 18 CFO Act agencies where the IG determined that the agency-wide information security program was not effectively implemented during fiscal year 2018. The VA IG also determined the department’s maturity level for each of the five core security functions: Level 2 (defined) for the Detect function; Level 3 (consistently implemented) for the Identify, Protect, and Level 4 (managed and measurable) for the Respond function. As shown in figure 3, VA’s ratings were generally consistent with the maturity level ratings of other CFO Act agencies. Agency IGs or independent auditors assess the effectiveness of information security controls as part of the annual audits of the agencies’ financial statements. The reports resulting from these audits include a description of information security control deficiencies related to the five major general control categories defined by the Federal Information System Controls Audit Manual (FISCAM): security management controls that provide a framework for ensuring that risks are understood and that effective controls are selected, implemented, and operating as intended; access controls that limit or detect access to computer resources, thereby protecting them against unauthorized modification, loss, and disclosure; configuration management controls that prevent unauthorized changes to information system resources and assure that software is current and known vulnerabilities are patched; segregation of duties controls that prevent an individual from controlling all critical stages of a process by splitting responsibilities between two or more organizational groups; and contingency planning controls that help avoid significant disruptions in computer-dependent operations. For fiscal year 2018, most of the 24 CFO Act agencies had deficiencies in most of the control categories, as illustrated in figure 4. VA’s IG reported deficiencies in each of these categories for the department. As a result of these deficiencies, the IGs at 18 of the 24 CFO Act agencies designated information security as either a material weakness (six agencies, including VA) or significant deficiency (12 agencies) in internal control over financial reporting for their agency. For VA, fiscal year 2018 was the 17th year in a row that the department had reported a material weakness in information security. In addition, IGs at 21 of the 24 agencies, including VA, cited information security as a major management challenge for their agency for fiscal year 2018. The administration has developed key milestones and performance metrics for agency chief information officers (CIO) to use to assess their agency’s progress toward achieving outcomes that strengthen federal cybersecurity. The milestones and metrics have specific implementation targets, most of which are expected to be met by the end of fiscal year 2020. As of fiscal year 2018, most civilian CFO Act agencies, including VA, had reported meeting most of the implementation targets for that year. VA reported meeting six of 10 targets. Table 2 shows the number of agencies meeting their targets as of fiscal year 2018, as well as VA’s status in doing so. In several reports issued since fiscal year 2016, we described deficiencies related to key challenges that VA has faced in safeguarding its information and information systems. The challenges we reported related to effectively implementing information security controls; mitigating known security deficiencies; establishing elements of its cybersecurity risk management program; and identifying critical cybersecurity staffing needs. Our work stresses the need for VA to address these challenges as well as manage IT supply chain risks as it modernizes and secures its information systems. Effectively Implementing Information Security Controls VA has been challenged to effectively implement security controls over its information and information systems. As previously mentioned in this statement, the VA IG reported that the department did not have an effective information security program and has had deficient information security controls over its financial systems. The weaknesses described by the IG are consistent with the control deficiencies we identified during an examination of VA’s high-impact systems that we reported on in 2016. In those reports, we described deficiencies in VA’s implementation of access controls, patch management, and contingency planning. These deficiencies existed, in part, because the department had not effectively implemented key elements of its information security program. Until VA rectifies reported shortcomings in its agency-wide information security program, it will continue to have limited assurance that its sensitive information and information systems are sufficiently safeguarded. Adequately Mitigating Known Security Deficiencies VA has not consistently mitigated known security deficiencies in a timely manner. As mentioned earlier, VA has reported a material weakness in information security for financial reporting purposes for 17 consecutive years. In fiscal year 2016, we recommended 74 actions for the department to take to improve its cybersecurity program and remedy known control deficiencies with selected high-impact systems. However, as of October 2019, over 3 years later, VA had implemented only 32 (or 43 percent) of the 74 recommendations. One of the remaining unimplemented recommendations calls for the department to consistently and comprehensively perform security control assessments. This recommended activity is an important element of a cybersecurity program and helps to provide assurance that controls are operating as intended and to detect controls that are not functioning correctly. VA has also been challenged in assuring that its actions to mitigate vulnerabilities and implement recommended improvements are effective. The department has asserted that it had implemented 39 of the 42 remaining open recommendations from our fiscal year 2016 reports. However, the evidence VA provided was insufficient to demonstrate that it had fully implemented the recommendations. The department subsequently provided additional evidence, which was also insufficient, indicating that its remedial action process was not validating the effectiveness of actions taken to resolve known deficiencies. Until VA adequately mitigates security control deficiencies, the sensitive data maintained on its systems will remain at increased risk of unauthorized modification and disclosure, and the systems will remain at risk of disruption. Fully Establishing Elements of a Cybersecurity Risk Management Program VA has been challenged in managing its cybersecurity risk. In July 2019, we reported that the department had fully met only one of the five foundational practices for establishing a cybersecurity risk management program. Although VA established the role of a cybersecurity risk executive, the department had not fully: developed a cybersecurity risk management strategy that addressed key elements, such as risk tolerance and risk mitigation strategies; documented risk-based policies that required the department to perform agency-wide risk assessments; conducted an agency-wide cybersecurity risk assessment to identify, assess, and manage potential enterprise risks; or established coordination between cybersecurity and enterprise risk management. VA concurred with our four recommendations to address these deficiencies and asserted that it is acting to do so. Nevertheless, until VA fully establishes a cybersecurity risk management program, its ability to convey acceptable limits regarding the selection and implementation of controls within the established organizational risk tolerance will be diminished. Identifying Critical Cybersecurity Staffing Needs VA has been challenged to accurately identify the work roles of its workforce positions that perform IT, cybersecurity, or cyber-related functions—a key step in identifying its critical cybersecurity staffing needs. In March 2019, we reported that the department had likely miscategorized the work roles of many of these positions in its personnel system. Specifically, VA had reported that 3,008 (or 45 percent) of its 6,636 positions in the 2210 IT management occupational series— positions that most likely performed IT, cybersecurity, and cyber-related functions—were not performing these functions. VA concurred with our recommendation to review the work roles for positions in the 2210 IT management occupational series and assign the appropriate work roles, and stated that it had begun to do so. Nevertheless, until VA completely and accurately categorizes the work roles of its workforce positions performing IT, cybersecurity, and cyber- related functions, the reliability of the information needed to improve workforce planning will be diminished and its ability to effectively identify critical staffing needs will be impaired. Managing IT Supply Chain Risks as Part of IT Modernization Programs Assessing and managing supply chain risks are important considerations for agencies, including VA, when operating and modernizing IT systems. In July 2018, we reported that reliance on a global IT supply chain introduces risks to federal information systems. We noted that supply chain threats are present during various phases of a system’s development life cycle and we identified the following threats: Installation of malicious or intentionally harmful hardware or software; Installation of counterfeit hardware or software; Failure or disruption in the production or distribution of critical Reliance on a malicious or unqualified service provider; and Installation of hardware or software that contains unintentional vulnerabilities, such as defects in code that can be exploited. These threats can have a range of impacts, including allowing adversaries to take control of systems or decreasing the availability of materials or services needed to develop systems. Accordingly, agencies such as VA need to take appropriate measures to assess and manage IT supply chain risks as they operate and modernize their information systems. Failure to do so could result in data loss, modification, or exfiltration; loss of system availability; and a persistent negative impact on the agency’s mission. In summary, similar to other federal agencies, VA continues to be challenged in implementing an effective agency-wide program and controls for securing its information and information systems. As VA pursues efforts to modernize and secure its IT systems, it will need to successfully address multiple challenges in order to achieve effective outcomes. Chair Lee, Ranking Member Banks, and Members of the Subcommittee, this completes my written statement. I would be pleased to answer your questions. If you or your staff members have any questions concerning this testimony, please contact me at (202) 512-6244 or wilshuseng@gao.gov. Contact points for our Office of Congressional Relations and Public Affairs may be found on the last page of this statement. Other individuals who made key contributions to this testimony include Jeffrey Knott (Assistant Director), Di’Mond Spencer (Analyst-in-Charge), Chris Businsky, Nancy Glover, Franklin Jackson, and Daniel Swartz. Also contributing were Melina Asencio, Scott Pettis, and Zsaroq Powe. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "In providing health care and other benefits to veterans and their dependents, VA relies extensively on IT systems and networks to receive, process, and maintain sensitive data, including veterans' medical records and other personally identifiable information. Accordingly, effective security controls based on federal guidance and requirements are essential to ensure that VA's systems and information are adequately protected from loss, unauthorized disclosure, inadvertent or deliberate misuse, or improper modification, and are available when needed. For this testimony, GAO summarized the status of information security across the federal government and particularly at VA. It also discusses the security challenges that VA faces as it modernizes and secures its information systems. To develop this statement, GAO reviewed its prior reports and relevant Office of Management and Budget, IG, and agency reports. , detect , respond , and recover —established by the National Institute of Standards and Technology's cybersecurity framework. VA's ratings were generally consistent with the ratings of other major agencies (see figure) and its information security program was one of 18 agency programs that IGs deemed ineffective. Most major agencies, including VA, had significant security control deficiencies over their financial reporting. For example, for fiscal year 2018, VA's IG reported deficiencies in control areas, such as security management, access control, configuration management, segregation of duties, and contingency planning. Additionally, as of fiscal year 2018, VA reported meeting six of the 10 cybersecurity performance targets set by the administration. VA faces several security challenges as it secures and modernizes its information systems. These challenges pertain to effectively implementing information security controls; mitigating known vulnerabilities; establishing elements of its cybersecurity risk management program; and identifying critical cybersecurity staffing needs. VA also faces the additional challenge of managing IT supply chain risks as the department takes steps to modernize its information systems. In 2016, GAO recommended 74 actions for VA to take to address deficiencies and improve its cybersecurity program. However, as of October 2019, VA had not demonstrated that it had addressed 42 of these recommendations. In 2019, GAO made four additional recommendations to improve the department's cybersecurity risk management program and one recommendation to accurately identify work roles of IT and cybersecurity workforce positions. VA concurred with these recommendations and planned to implement them.", "document_type": "gao"}
{"report": "It is DOD policy that installations, property, and personnel shall be protected and that the authority of a DOD commander to take reasonably necessary and lawful measures to maintain law and order and to protect installation personnel and property includes the individuals’ removal from or denial of access to, an installation when those individuals threaten the orderly administration of the installation. The Under Secretary of Defense for Intelligence develops overall security policy, including requirements for the DOD Physical Security Program, and the secretaries of the military departments and heads of DOD components establish policies and procedures to implement the Under Secretary’s policies. Individuals may seek unescorted, escorted, or trusted traveler access to DOD installations. As previously mentioned, this report focuses on individuals seeking unescorted access. Unescorted installation access requires, with limited exceptions, individuals seeking access to establish their identity, be determined fit for access, and establish an acceptable purpose for their presence on the installation. DOD components’ security forces establish the identity of individuals at authorized installation control points by using identification credentials, specifically a DOD-issued common access card or other credentials listed in DOD guidance. DOD’s Identity Matching Engine for Security and Analysis (IMESA), which is maintained by the Under Secretary of Defense for Personnel and Readiness, helps security forces make current fitness-for-access determinations for installations that have PACS that connect to IMESA. IMESA electronically links PACS to federal government (including DOD’s) and local population databases to verify information contained in individuals’ credentials and to search for derogatory information. IMESA continuously vets individuals for fitness- for-access determinations against these authoritative government databases every 24 hours. If derogatory information is found, IMESA is to send an alert to the PACS so that security forces can take appropriate action if and when those individuals next seek access to installations. Individuals without a common access card or another acceptable credential who seek access to installations with PACS are sent through the installations’ visitor control process where security forces are to (1) authenticate the individuals’ identity, (2) establish an acceptable purpose for their presence on the installations, and (3) make fitness-for-access determinations using any derogatory information from authoritative government databases. These databases could include those accessible through IMESA, where available and as applicable. Figure 1 illustrates the process for gaining unescorted access to installations with PACS that connect to IMESA—both for individuals with and without acceptable credentials. DOD components have fielded the following types of PACS at their domestic installations: DBIDS. DMDC developed DBIDS and it is used by the Air Force, the Navy, the Marine Corps, and DLA to control access to their respective installations. DBIDS consists of hardware and software—specifically, computers, servers, badge printers, and handheld identification devices. DBIDS has the capability to electronically connect to authoritative government databases using IMESA. AIE. The Army developed AIE to control access to its installations. AIE consists of hardware and software—specifically, computers, servers, badge printers, and handheld identification devices. AIE also includes additional hardware such as gate arms and automated pedestals where individuals can scan their own credentials. AIE has the capability to electronically connect to authoritative government databases using IMESA. RAPIDGate. RAPIDGate is a legacy system that according to DMDC officials is no longer being fielded to DOD installations and, according to Army officials, as of October 2018 was in use at only four domestic Army installations. RAPIDGate does not have the capability to electronically connect to authoritative government databases. Deployed by DOD in 2014, IMESA verifies enrolled individuals’ information against (1) DOD’s Defense Enrollment Eligibility Reporting System to determine if the credentials have been revoked; (2) the Federal Bureau of Investigation’s National Crime Information Center’s Wanted Persons file to determine if there are records on the individuals for an outstanding felony warrant; (3) the Federal Bureau of Investigation’s Terrorist Screening Database to determine if the individuals are known or suspected terrorists; and (4) the local population database, according to an OUSD(I) official, to determine if credentials issued by installations have been revoked or have expired. Individuals with enrollable credentials are enrolled in IMESA when their credentials are scanned by PACS for the first time. According to DMDC officials, once individuals are enrolled, IMESA continuously vets them against these authoritative government databases every 24 hours and it takes approximately 2 seconds for each individual’s credential to be vetted through IMESA. Figure 2 illustrates the process of using PACS to electronically connect to IMESA to validate individuals’ identity and continuously vet individuals’ fitness for access to DOD installations. The Under Secretary of Defense for Intelligence is responsible for establishing department-wide physical access control standards, procedures, and guidance, consistent with DOD guidance and applicable laws, to include developing processes for establishing the identity of individuals seeking access to installations. The Under Secretary of Defense for Personnel and Readiness is responsible for designing and maintaining IMESA, and establishing and executing a plan to integrate IMESA with PACS at all DOD installations. DMDC is a center within the Office of the Under Secretary of Defense for Personnel and Readiness that provides identity management services and oversees the fielding and maintenance of DBIDS. DOD components issue their own component- and installation-specific requirements for physical access control. These include physical access barrier requirements such as fences, as well as the use of PACS. Each DOD component has designated a program manager to supervise and oversee its physical security program, to include PACS. According to DOD component guidance and officials: The Army Acquisition Corps, Product Manager for Force Protection Systems, is responsible for the procurement and fielding for the Army’s PACS. The Army Office of the Provost Marshal General develops PACS requirements based on DOD and Army policies for the Army’s physical security program. The Commander Navy Installations Command is responsible for the Navy’s PACS. The Air Force Security Forces Center is responsible for the Air Force’s PACS. The Office of the Deputy Chief of Staff for Logistics, Engineering, and Force Protection, Directorate of Security Forces, is responsible for developing service-wide access control policies. The Commander, Marine Corps Installations Command, is responsible for the Marine Corps’ PACS. The Deputy Commandant, Plans, Policies, and Operations establishes policies, sets requirements, and is responsible for the Marine Corps’ Physical Security Program. DLA Information Operations and Installation Support Security and Emergency Services Staff Directors share responsibility for the DLA’s PACS. Additionally, DOD component installation commanders are responsible for the physical security of their installations, including for the use of PACS. OUSD(I) issued a physical security manual in January 2019 that addresses minimum department-wide standards for access to DOD installations. The manual incorporates and cancels Directive-Type Memorandum 09-012, the interim policy for DOD physical access control that was in effect for about 9 years. The manual directs DOD components to, among other things, implement procedures for all populations to gain access to component installations; field electronic PACS at all DOD installations; and fund the continued operation, maintenance, and enhancement of IMESA with additional government data sources. The manual also states that new electronic PACS and existing electronic PACS undergoing significant upgrades (valued at more than 50 percent of replacement cost) must interface with IMESA. Each DOD component had also issued guidance on installation physical access control standards that pre-date the January 2019 physical security manual. For example, DLA Manual 5200.08 Volume 1 identifies DBIDS as DLA’s PACS and requires certain installation commanders to incorporate and maximize the use of electronic credential authentication. In another example, Army Regulation 190-13 assigns installation commanders responsibility for implementing AIE, when available, and states that deviations from the Army AIE standards and specifications are not authorized without written approval from Army headquarters. DOD component officials said that they will update their guidance to incorporate the DOD installation access control standards contained in OUSD(I)’s 2019 physical security manual. To implement these department-wide access control standards, according to OUSD(I) and DOD component officials, each DOD component has fielded or plans to field PACS that connect to IMESA at all their domestic installations. According to DOD component officials, as of February 2019, the Air Force, the Navy, the Marine Corps, and DLA have fielded DBIDS at all of their domestic installations. Specifically, according to DOD component officials, DBIDS is fielded at: 67 Air Force installations 16 Marine Corps installations According to Army officials, as of February 2019, AIE was fielded at 35 of the Army’s domestic installations. The officials stated that the Army currently plans to field AIE at an additional 60 installations by September 2019, and at all of its remaining domestic installations by the end of fiscal year 2021. However, Army officials told us that, at the direction of the Secretary of the Army, AIE is undergoing additional testing and assessment to inform a comparison with DBIDS. The Secretary of the Army is expected to make a decision sometime in summer 2019 on which PACS to field at remaining Army installations. DMDC plans to enhance IMESA’s capabilities to allow for increased information sharing and vetting, and to expand the type of credentials that DBIDS can scan. Specifically, the Under Secretary of Defense for Intelligence has identified additional authoritative government databases that IMESA will connect with to access derogatory information. For example, the Under Secretary of Defense for Intelligence directed the secretaries of the military departments to develop a plan to vet individuals seeking unescorted access to domestic installations for disqualifying derogatory information in additional files within the National Crime Information Center’s database and the Interstate Identification Index by September 30, 2019. According to an OUSD(I) official, IMESA will be able to access two additional National Crime Information Center files by 2020: the National Sexual Offender Registry File and the Violent Persons File. The official also stated that there are plans to connect IMESA to DOD’s Automated Biometric Identification System by 2020. DMDC plans to expand the types of credentials that DBIDS can scan, to include all credentials listed in DOD’s 2019 physical security manual. For example, according to DMDC officials, scheduled enhancements to DBIDS will enable security forces to scan cards and driver’s licenses compliant with the REAL ID Act of 2005 by the end of fiscal year 2019. Moreover, according to DMDC officials, this enhancement will eliminate the time and expense to annually issue and print hundreds of thousands of temporary DBIDS credentials. The officials also stated that DMDC has plans to enable DBIDS handheld devices to read military veterans’ health identification cards, although no time frame for implementation has been set. Army Office of the Provost Marshal General officials told us that AIE can already scan identification cards and driver’s licenses compliant with the REAL ID Act. This capability allows individuals with these credentials to be vetted and enrolled in IMESA in the access control lane without having to go the visitor control center. According to Army officials, this “in-lane” initial vetting and IMESA enrollment takes approximately 30 seconds by checking the National Crime Information Center database and Interstate Identification Index for criminal history and active warrants. Further, these officials told us that the Army has also identified future enhancements to AIE, such as transitioning to a cloud-based version. The officials told us that a cloud-based version of AIE will allow for quicker and more cost- effective fielding because of fewer installation prerequisites and reduced computer hardware requirements. Army officials are also considering other enhancements, such as self-service kiosks and web-based registration options, to streamline and expedite initial visit registrations. The Air Force and DLA monitor their installations’ use of PACS and the Army, the Navy, and the Marine Corps do not. As a part of our work, we conducted numerous site visits to domestic installations to observe the DOD components’ use of PACS, but details concerning our findings associated with these visits are omitted because the information was deemed sensitive by DOD. Air Force and DLA officials stated they routinely collect data on PACS use and the number of credentials scanned at their installations and provide those data to their leadership. Additionally, the Air Force is using these data to brief installation commanders on the risks associated with not using DBIDS at their installations. Army, Navy and Marine Corps officials stated they do not monitor PACS use at their installations because there is not a requirement to do so. Our review of DOD guidance also found no such requirement. DOD component officials emphasized the importance of installation commanders having discretion to make risk-based decisions regarding access control in general, and in deciding when or when not to use PACS. Nevertheless, OUSD(I), Army, Navy, and Marine Corps officials agreed that monitoring installations’ use of PACS would be beneficial and could be readily accomplished without significant cost using existing technology. For example, Army, Navy, and Marine Corps officials stated that their installations could collect monthly scanning data using existing PACS reporting mechanisms to identify below average use and determine if actions are needed to increase use. One OUSD(I) official further stated that, depending on the extent to which installations are not using PACS, changes to guidance might be warranted to require monitoring of the use of PACS. DOD Instruction 5010.40, Managers’ Internal Control Program Procedures directs the Office of the Secretary of Defense and DOD component heads to implement a comprehensive system of internal controls that provides reasonable assurance that programs are operating as intended and to periodically evaluate the effectiveness of those controls. Furthermore, Standards for Internal Control in the Federal Government for performing monitoring activities states that management should monitor and evaluate the results of its internal control systems by obtaining relevant data on a timely basis, and determine appropriate control actions for any identified deficiencies. Because the Army, the Navy, and the Marine Corps do not monitor the use of PACS and because OUSD(I) does not require that they do so, those military services do not know the extent to which PACS are being used at more than 100 installations. Consequently, the military services do not have the data they need to evaluate the effectiveness of PACS and inform risk-based decisions to safeguard personnel and mission– critical, high-value installation assets. Demonstrating the importance of using PACS that connect to IMESA, we note that, according to DMDC, IMESA has identified more than 42,000 instances of individuals who were granted access to a DOD installation and were subsequently issued a felony warrant. Installation security forces call the DMDC helpdesk for assistance in resolving DBIDS technical issues. According to DMDC officials, this helpdesk handles technical issues for more than 100 DMDC applications and programs, including DBIDS, and is staffed 24 hours a day, 7 days a week. DMDC helpdesk staff classify DBIDS technical issues into one of three tiers, based on complexity and the estimated time to resolve an issue. According to DMDC officials, tier I issues tend to be the least complex and typically take the least time to resolve, whereas tier III issues tend to be the most complex and typically take the longest time to resolve. Tier II issues fall between tier I and tier III issues with respect to complexity and anticipated resolution time. Below are examples of issues that are experienced in each tier: Tier I. Unresponsive computer screens, passwords that need to be reset, and relatively simple network printer issues. Tier II. Handheld device battery charging issues, network synchronization issues, and problems installing fingerprint readers. Tier III. Handheld devices not connecting to servers, locked user accounts, and equipment that needs to be replaced. According to DMDC officials, all calls to the helpdesk are initially handled by a tier I customer service representative. The tier I representative triages the issue using DBIDS reference materials, and if he or she is unable to resolve the issue it is passed to a tier II customer service representative. If the tier II representative is unable to resolve the issue using DBIDS reference materials, then, with a supervisor’s review and approval, the call is transferred to the tier III group. The issue is then assigned to either the tier III hardware group or the tier III software/application group, depending on the nature of the technical issue. According to DMDC officials, the tier III hardware group is located in Ashburn, Virginia, and the tier III software/application group is located at DMDC’s offices in Seaside, California. The Army also has instituted a tiered approach for resolving AIE technical issues through its helpdesk. The AIE helpdesk is also staffed 24 hours a day, 7 days a week. Similar to DBIDS, the Army classifies AIE technical issues into one of three tiers, based on complexity and time to resolve. According to Army officials, all Army installation security forces’ calls to the helpdesk are initially handled by a tier I customer service representative who tries to resolve the issue using AIE reference materials. If the tier I representative is unable to resolve the issue, the issue is passed to a tier II field service representative. The field service representative is expected to contact the installation within 24 hours and attempt to resolve the issue by email or phone. If the field service representative is unable to resolve the issue remotely, the representative will make an in-person service visit to attempt to resolve the issue. If the issue cannot be resolved, then the customer service representative classifies the issue as tier III and transfers the issue to AIE system engineers for resolution. According to Army officials, tier III issues are usually Army-wide issues, such as problems associated with software updates. DMDC has collected data on DBIDS technical issues; however, DMDC has not been able to assess its performance due to a lack of performance measures and associated goals. Table 1 shows the number of DBIDS technical issues and the average time it took to resolve them, by tier, from January 2016 through July 2018. Specific details regarding the number of issues and the resolution time were omitted because the information was deemed sensitive by DOD. The Army collects data on AIE technical issues and has developed performance measures and associated goals to assess AIE performance. Specifically, the AIE Reliability Analytics Model tracks real-time information on operational availability with a goal of 100 percent, the number and age of open helpdesk tickets with a goal of resolving tier II issues within 48 hours, and field service representative performance with a goal of a 100 percent closure rate for tier II issues. According to Army officials, the Army is currently developing specific targets for its tier I and tier III technical issues. The Army has used data on AIE technical issues to improve AIE performance. For example, due to the age and number of tickets, the Army analyzed 646 AIE helpdesk tickets generated from October 2017 through February 2018 and determined that the root causes of the most prevalent technical issues were site server and handheld device failures. As a result of its analysis, the Army implemented an AIE software update and has begun fielding a more reliable brand of handheld device to installation security forces. According to Army officials, AIE operational availability has increased and technical issues are resolved more quickly since the AIE Reliability Analytics Model came online in September 2017. For example, from September 2017 through August 2018, AIE’s operational availability increased from 93 percent to 98 percent and the average ticket age for all tiers decreased by 33 percent. Increased AIE operational availability allows for increased continuous vetting of individuals seeking access to Army installations. Army officials at all levels have access to the model, and the Army Product Manager for Force Protection Systems sends weekly emails to Army leadership highlighting AIE performance achievements and challenges. We have previously reported, that by tracking performance and developing performance measures, agencies can better evaluate whether they are making progress and achieving their goals. Further, to fully address challenges agencies must be able to demonstrate progress achieved through corrective actions, which is possible through the reporting of performance measures. Characteristics of effective performance measures include having baseline or trend data, setting measurable program goals, and establishing time frames for achieving goals. Program goals communicate what results the agency seeks and allow agencies to assess or demonstrate the degree to which those desired results are achieved. Both performance measures and goals give managers crucial information to identify gaps in program performance and plan any needed improvements. Although user agreements between DMDC and the DOD components state that DMDC will provide helpdesk and maintenance support, the agreements do not include performance measures and associated goals regarding DBIDS’ operational availability and the timely resolution of technical issues. DMDC officials acknowledged that performance measures and associated goals would likely reduce the time it takes to resolve DBIDS technical issues, particularly for tier II and tier III issues. However, until DMDC develops performance measures and goals, its ability to systematically address the underlying issues negatively affecting DBIDS’ operational availability is hindered. Although according to DOD officials DOD has fielded or plans to field PACS that connect to IMESA at all domestic installations, only the Air Force and DLA have monitored PACS use at their installations. The Army, the Navy, and the Marine Corps at more than 100 installations have not monitored the use of PACs because, as stated by officials, there is not a requirement to do so. As a result, these components do not have the data necessary to evaluate PACS effectiveness and inform risk-based decisions regarding PACS use to safeguard personnel and mission- critical, high-value installation assets. Further, DOD component and installation officials told us about their dissatisfaction with the time it takes to resolve DBIDS’ technical issues. Although the Army has developed performance measures and associated goals for its helpdesk that have improved the ability to resolve technical issues and overall AIE operational availability, DMDC has not. Without such performance measures and associated goals, DMDC is unable to systematically evaluate how well DBIDS is performing and address underlying issues negatively affecting DBIDS’ operational availability. We are making the following five recommendations to the Department of Defense: The Secretary of Defense should ensure that the Under Secretary of Defense for Intelligence requires that DOD components (including the military departments and DLA) monitor the use of PACS at their installations. (Recommendation 1) The Secretary of the Army should ensure that the Office of Provost Marshal General monitors the use of PACS at Army installations. (Recommendation 2) The Secretary of the Navy should ensure that the Commander, Navy Installations Command, monitors the use of PACS at Navy installations. (Recommendation 3) The Secretary of the Navy, in coordination with the Commandant of the Marine Corps, should ensure that the Commander, Marine Corps Installations Command, monitors the use of PACS at Marine Corps installations. (Recommendation 4) The Secretary of Defense should ensure that the Under Secretary of Defense for Personnel and Readiness develops appropriate performance measures and associated goals for the timely resolution of DBIDS technical issues to facilitate improved PACS performance. (Recommendation 5) We provided a draft of this report to DOD for comment. In its written comments, reproduced in appendix II, DOD concurred with our five recommendations and identified actions that it was taking or planned to take to implement our recommendations. Regarding our second recommendation, DOD concurred with that recommendation to monitor the use of PACS at Army installations, and on the basis of the department’s written comments we modified the recommendation to indicate that the Army Office of the Provost Marshal General is responsible for monitoring the use of PACS at Army installations. DOD also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Defense, and the Under Secretary of Defense for Intelligence. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9627 or maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix III. In this report we (1) describe actions the Department of Defense (DOD) has taken to develop guidance on physical access to domestic installations and to field physical access control systems (PACS) at these installations, (2) evaluate the extent to which DOD components have monitored the use of fielded PACS at these installations, and (3) evaluate the extent to which DOD has implemented an approach for addressing PACS technical issues and assessing associated performance. This report is a public version of a sensitive report that we issued on May 31, 2019. The sensitive report included an objective related to the extent to which security forces at various DOD domestic installations used fielded PACS. DOD deemed a significant portion of the information related to this objective to be sensitive, necessitating protection from public disclosure. This public report omits information related to our observations of PACS use at these installations and the risks associated with not using PACS. As a result of this omission, we updated the wording of the second objective to focus on DOD components’ efforts to monitor the use of fielded PACS at installations. Although the second objective and the information associated with it in this public report is more limited, we relied on the same methodology to support our findings and the excluded information does not impact our recommendations. The first and third objectives in this report are the same as in the sensitive report and use the same methodology as in the sensitive report. DOD deemed some of the detailed information presented in conjunction with the third objective to be sensitive, necessitating protection from public disclosure. As a result, this public report omits specific details regarding the technical issues of PACs. This report focuses on physical access controls at authorized access control points at DOD’s domestic installations that are owned and operated by the Army, the Navy, the Air Force, the Marine Corps, and the Defense Logistics Agency (DLA). We did not consider actions DOD has taken to prevent unauthorized access to its domestic installations by means such as tunneling under or climbing over perimeter barriers. For objective one, we analyzed key Office of the Under Secretary of Defense for Intelligence (OUSD(I)) and DOD component policies outlining physical access control requirements. The key guidance documents we analyzed are listed in table 2. Additionally, we interviewed officials from OUSD(I), the Joint Staff, each of the DOD components, and the U.S. Northern Command to discuss the guidance documents and any efforts to update, revise, or draft new guidance on the use of installation PACS. We also reviewed DOD component documentation and interviewed OUSD(I) and DOD component officials to determine the extent to which PACS was fielded at domestic installations and to identify ongoing efforts to field PACS at additional domestic installations. Finally, we interviewed DOD officials to identify any planned future enhancements to PACS and the Identify Matching Engine for Security and Analysis (IMESA). For our second objective, we focused on individuals seeking unescorted access to DOD domestic installations. We reviewed and analyzed OUSD(I), DOD component, and installation-specific guidance on the use and monitoring of PACS. We conducted site visits to six domestic installations to meet with installation command and security force officials to discuss their experiences using PACS and to observe their use of PACS. We then compared the guidance and our observations with Standards for Internal Control in the Federal Government for monitoring activities, which states that management should obtain data on a timely basis so that they can be used for effective monitoring. Although findings from these six installations are not generalizable to all DOD domestic installations, they are illustrative of how PACS are used, and more generally, how installation access is controlled. In selecting the six installations to visit we considered installation ownership to ensure that we included an installation from each DOD component, geographic proximity among installations, and the type of PACS used by the installation. We also visited an installation where no PACS was installed. We limited our site selection to active-duty installations in the continental United States. Based on this methodology we visited Fort Stewart, Georgia; Moody Air Force Base, Georgia; Naval Station Mayport, Florida; Marine Corps Support Facility Blount Island, Florida; Tobyhanna Army Depot, Pennsylvania; and DLA Distribution Center Susquehanna, Pennsylvania. For our third objective, we reviewed DOD user agreements to determine the support agreement terms, requirements, and responsibilities for addressing PACS technical issues. We analyzed DOD component data on the number and type of Defense Biometric Identification System (DBIDS) helpdesk technical issues reported from January 2016 through July 2018, and compared the data with provisions in the user agreements that discuss the PACS helpdesk. We also compared the steps the Army and DMDC have taken or planned to address helpdesk technical issues with Standards for Internal Control in the Federal Government for developing performance measures, which states that management should establish performance measures and indicators. We interviewed officials from DOD components and the installations we visited to discuss their experiences with PACS helpdesks, and their views on the performance and reliability of PACS. We assessed the reliability of the helpdesk technical issue data by interviewing knowledgeable officials about the data and by testing the raw data to determine the accuracy of the summary data provided by DOD. Additionally, we collected and analyzed the raw data to determine whether calculations were made correctly. We determined that the data were sufficiently reliable for our understanding the number and types of PACS technical issues. To address our three reporting objectives, we met with officials from the DOD organizations listed in table 3. We conducted this performance audit from February 2018 to August 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We subsequently worked with DOD from July 2019 to August 2019 to prepare this public version of the original sensitive report. This public version was also prepared in accordance with these standards. In addition to the contact name above, GAO staff who made key contributions on this report include Brian Lepore, Director (retired); Jason Bair, Acting Director; Marc Schwartz, Assistant Director; Shawn Arbogast, Analyst-in-Charge; Jamilah Moon; Richard Hung; Mae Jones; Amie Lesser; Serena Lo; Amber Lopez Roberts; and Carter Stevens.", "summary": "In November 2009, an Army officer killed or wounded 45 people at Fort Hood, Texas; 4 years later in September 2013, a Navy contractor killed or wounded 16 people at the Washington Navy Yard in Washington, D.C. Independent reviews conducted in the aftermath of these shootings identified physical access control weaknesses at DOD installations. The conference report accompanying the National Defense Authorization Act for Fiscal Year 2018 contained a provision for GAO to assess DOD's installation access control efforts. GAO (1) described actions DOD has taken to develop guidance on physical access to domestic installations and to field PACS at these installations, (2) evaluated the extent to which DOD has monitored the use of fielded PACS at these installations, and (3) evaluated the extent to which DOD has implemented an approach for addressing PACS technical issues and assessing associated performance. GAO analyzed DOD guidance on physical access control requirements, and visited installations to discuss with installation command and security force officials their experiences using PACS. This is a public version of a sensitive report that GAO issued in May 2019. Information that DOD deemed sensitive has been omitted. The Department of Defense (DOD) has issued guidance on accessing its domestic installations and strengthening physical access control systems (PACS)—used to scan credentials to authenticate the identity and authorize individuals to access DOD installations. Specifically, DOD has recently issued guidance directing the fielding of PACS and has fielded or plans to field such systems at domestic installations. The Defense Manpower Data Center (DMDC) developed the PACS used by the Air Force, the Navy, the Marine Corps, and the Defense Logistics Agency. The Army developed its own PACS. Both types of PACS electronically connect to DOD's Identity Matching Engine for Security and Analysis (IMESA). IMESA accesses authoritative government databases to determine an individual's fitness for access (i.e., whether an individual is likely a risk to an installation or its occupants), and continually vets this fitness for subsequent visits (see fig.). The Air Force and DLA have monitored their installations' use of PACS, but the Army, the Navy, and the Marine Corps have not. Army, Navy, and Marine Corps installation officials stated that they do not monitor PACS use at their installations because there is no requirement to do so. Because the Army, the Navy, and the Marine Corps do not monitor PACS use and DOD does not require that they do so, those military services do not have the data they need to evaluate the effectiveness of PACS and make informed risk-based decisions to safeguard personnel and mission-critical, high-value installation assets. DOD, Army, Navy, and Marine Corps officials agreed that monitoring installations' use of PACS would be beneficial and could be readily accomplished without significant cost using existing technology. The Army and DMDC have used a tiered approach and established helpdesks to address PACS technical issues. The Army has established performance measures and goals to assess its approach, which has improved the ability to resolve technical issues. DMDC, however, does not have performance measures and goals, and thus lacks the information needed to evaluate its PACS' performance and address issues negatively affecting operational availability. GAO made five recommendations, including that DOD monitor installations' use of PACS and develop appropriate performance measures and goals for resolving technical issues to improve PACS performance. DOD concurred with GAO's recommendations.", "document_type": "gao"}
{"report": "The F-35 Lighting II program is a joint, multinational acquisition program intended to develop and field a family of next-generation strike fighter aircraft for the U.S. Air Force, Navy, and Marine Corps (hereinafter referred to as the services); seven international partners; and four foreign military sales customers (collectively hereinafter referred to as program participants). The program has developed and is delivering three variants of the F-35 aircraft: F-35A conventional takeoff and landing variant for the Air Force. (see fig. 1) F-35B short takeoff and vertical landing variant for the Marine Corps. F-35C carrier-suitable variant for the Navy. The characteristics of the services’ variants are similar in that each is intended to be a multi-role, stealthy strike aircraft, but each service’s variant also has unique operating requirements. For example, the Marine Corps requires that the F-35B be capable of operating from aircraft carriers, amphibious ships, and main and austere operating bases alike, requiring the ability to conduct short take offs and vertical landings. DOD initiated the F-35 program in October 2001. Since then, the Marine Corps and Air Force declared initial operational capability in 2015 and 2016, respectively, while the Navy declared initial operational capability in February 2019. Operational testing of the F-35 aircraft began in December 2018 and is currently scheduled to be completed late 2020. At that time, DOD will make a decision on whether to proceed with plans to begin full-rate production of the aircraft. DOD has, concurrently, been fielding and operating a growing fleet of aircraft as part of low-rate initial production. As of October 2019, more than 435 U.S. and international aircraft had been fielded and were operating from 19 sites worldwide. By 2023, the global F-35 fleet is expected to expand to more than 1,100 aircraft across 43 operational sites. In total, the program participants plan to purchase more than 3,300 F-35 aircraft, with the U.S. services planning to purchase nearly 2,500 of those aircraft. See Figure 2 for a timeline of anticipated worldwide fleet growth in the F-35 program. DOD has two primary contractors for the F-35 program: Lockheed Martin for the overall aircraft system and Pratt & Whitney for the engine. As the prime contractor for the overall aircraft system, Lockheed Martin (hereinafter referred to as the prime contractor) is responsible for managing the F-35 supply chain, depot maintenance, and pilot and maintainer training, as well as for providing engineering and technical support. Currently, DOD is contracting for this support with the prime contractor largely through annual contracts. It plans to transition to multiple-year, fixed-price, performance-based sustainment contracts when the program achieves certain condition-based criteria, including the establishment of critical sustainment capabilities and the government’s ability to collect and more fully assess performance and cost data. In addition, the U.S. Air Force, Navy, and Marine Corps have each established an F-35 integration office or similar construct focused on how the services will operate and afford the F-35, among other things. Figure 3 depicts how these key stakeholders provide support to the F-35 program participants across the three aircraft variants. The Autonomic Logistics Information System (ALIS) is a system of systems that serves as the primary logistics tool to support F-35 operations, mission planning, and sustainment. ALIS is intended to help maintainers manage tasks including aircraft health and diagnostics, supply-chain management, and other maintenance events. ALIS functionality is intended to support many of the F-35 program’s key performance parameters such as: Increase sortie generation rate: Number of aircraft sorties launched in a flight day. Increase mission reliability: The probability that a system will perform mission essential functions for a period of time. Reduce logistics footprint: The size of in-theater logistics support needed to move and sustain a warfighting force. The footprint includes all the necessary support needed to maintain the force such as fuels, parts, support equipment, transportation, and people. According to DOD officials, ALIS is integral to supporting F-35 operations. Figure 4 shows some of the key intended capabilities of ALIS. These capabilities reside in multiple software applications within the system that perform specific functions for maintainers, pilots, supply personnel, and data analysts. Lockheed Martin is the prime contractor for ALIS and has been responsible for developing and managing the capabilities of the system, as well as developing training materials for F-35 pilots, maintainers, and supply personnel. ALIS is co-located with F-35 aircraft both at U.S. military installations and in theater to support missions and assist with maintenance and resource allocation. ALIS consists of the overarching system, the applications housed within it, and the network infrastructure required to provide global integrated and autonomic support of the F-35 fleet. It comprises both hardware and software, and supports the flow of unclassified and classified aircraft-related data. As a system of systems, major components of ALIS consist of: The Autonomic Logistics Operating Unit (ALOU). The ALOU is the central computer unit that all F-35 data are sent through. As part of the unit, the ALOU consists of two servers that process and store classified and unclassified data respectively. There is only one ALOU, and it is owned by the prime contractor. The Central Point of Entry (CPE). The CPE is a server unit configured to provide software and data distribution for a country’s entire F-35 fleet. It is the node between the ALOU and each country’s Standard Operating Units (generally housed at F-35 installations). The CPE consists of two servers that process and store classified and unclassified data respectively. There is typically one operational CPE per country, although the United States has separate CPEs for its operational commands and training sites. The Standard Operating Unit (SOU). The SOU is a server that is intended to provide all ALIS capabilities to support flying, maintenance, and training at F-35 installations. Typically, each F-35 squadron has at least one SOU. It is the node local to each F-35 squadron. There are two types of SOUs: a classified SOU that supports the flow of classified aircraft-related data and an unclassified SOU that supports the flow of unclassified aircraft-related data. The Portable Memory Device (PMD). The PMD is informally referred to as the “brick” that F-35 pilots use to upload information such as mission planning data. F-35 personnel use the PMD to store mission and maintenance data generated during flight which may then be downloaded into the ALIS SOU to support maintenance and mission debrief activities. The Portable Memory Device Reader (PMD Reader). The PMD Reader is a device intended to be used to remove maintenance data, including health-related codes, off of the Portable Memory Device and load into the SOU. The Portable Maintenance Aid (PMA). The PMA is an unclassified ruggedized laptop used by F-35 maintainers and flight-line supervisors to view unclassified technical data, and perform and document maintenance activities. According to the F-35 program office, the purpose of the server construct is to support the exchange of information necessary to support the F-35 sustainment enterprise. As of September 2019, according to program officials, there was one operational ALOU and CPE within the United States. Each F-35 site in the United States has a varying number of SOUs depending on the site’s number of aircraft and squadrons. The SOU was designed to have its components fit into transit cases that can be carried by two personnel, with each case weighing up to 200 pounds. The PMDs, PMD Readers, and PMAs reside at the squadron and support the collection and transfer of unclassified and classified aircraft-related data. Figure 5 shows how unclassified ALIS data are collected and transferred from component to component. As we have previously reported, ALIS has experienced recurring developmental issues and schedule delays. The development of ALIS originated in 2002, a year after the start of the F-35 program. However, the first major ALIS release was not fielded until October 2009, nearly 7 years after initial development began. DOD officials had originally planned for the version of ALIS that would include all of the capabilities required to complete developmental testing of the program to be finalized in 2010. However, this milestone was reached in September 2018, nearly 8 years behind the original schedule. Figure 6 shows the timeline of major ALIS software version releases and other significant ALIS-related milestones. ALIS users from all 5 F-35 locations we visited reported that ALIS has improved in some aspects over the last 5 years. However, these users continue to report significant challenges with ALIS that are affecting the day-to-day operations of the aircraft. DOD is currently unable to assess the overall performance of ALIS because it has not developed performance metrics. Additionally, DOD is unaware of how challenges with ALIS are affecting F-35 fleet-wide readiness. According to pilots, maintainers, supply personnel, and contractors at 5 U.S. F-35 locations, ALIS is generally performing better than it was 5 years ago. Specifically, users at all 5 locations stated that data processing, downloading of information, and screen navigation were generally faster than previous years. According to users at 1 location, in previous releases of ALIS, it could take several minutes to complete a simple function like a screen download. Further, some users also reported minor functionality improvements within certain ALIS applications, such as the Computerized Maintenance Management System, leading to reduced time required to perform actions within those applications. We reported in April 2016 that ALIS users had problems accessing data in ALIS to produce service-specific reports for their squadrons. Users we spoke to at 4 locations for this report stated that they can now access some data within ALIS and can generate reports that they previously could not. For example, users at 1 location said that it was now easier to export aircraft-related maintenance information from ALIS and put it into an external spreadsheet. Additionally, in December 2015, the F-35 program began deploying software “fixes” to address minor defects in ALIS at F-35 locations in between major ALIS software version releases, which users at 1 location said have made improvements to the system. According to the F-35 program office, these software releases, referred to as service packs, have focused on improving user interface-related flaws that were discovered during major releases. Service packs provide users more frequent functionality fixes to the system, preventing them from having to wait, in most cases, over a year for a major ALIS software release. While users at all 5 F-35 locations we visited said that ALIS is performing better than it was 5 years ago, they also stated that the system still posed significant challenges to day-to-day F-35 operations. Specifically, users across the 5 locations we visited stated that seven significant challenges still exist with ALIS, as shown in table 1. Many of the challenges cited above are similar to those we reported in April 2016, including deployability, inefficient issue resolution process, and data inaccuracies. We recommended at that time that DOD develop a plan to prioritize and address ALIS issues. DOD concurred and in 2016 developed a plan that identified key areas for system modernization and sustainment, which included prioritizing issues related to ALIS. While DOD’s development of this plan is a positive step, significant user issues persist today, which are discussed in more detail below. Continued attention on ALIS is needed to make improvements to the system, reduce the burden on its users, and mitigate risks to operations and maintenance. Users at all 5 F-35 locations we visited expressed concern about data integrity issues related to inaccurate or missing data within ALIS. For example, users at all the locations said they have had consistent problems with data related to aircraft parts. Certain F-35 parts have an associated electronic record, which is used to track the remaining time before the part must be replaced, among other things. To be cleared for flight, F-35 policy states that an aircraft must be electronically “complete” in ALIS, meaning that all of the electronic records from each installed F- 35 part must be entered into ALIS. However, users at all 5 of the locations we visited told us that electronic records are frequently incorrect, corrupt, or missing, resulting in ALIS signaling that the aircraft should be grounded, often in cases where maintainers know that the parts have been correctly installed and are safe for flight. Users at 1 location said that within a 6-month period in 2019, they experienced anywhere between 0 and 400 issues per week related to inaccurate or missing electronic records. These same users said that it is common for their squadron leadership to elect to allow an aircraft to fly with over 20 inaccurate or missing electronic records that ALIS signals to ground. According to users at all 5 locations we visited, squadron leadership (e.g., DOD personnel designated by maintenance squadron commanders) may decide to fly an aircraft with inaccurate or missing electronic records, but we found that this practice varies by location and type of part. In June 2019, the Department of Defense Inspector General published a report on missing electronic records on F-35 spare parts. The report found that since 2015, F-35 locations have been consistently receiving spare parts without requisite electronic records. For example, of the 263 spare parts delivered to one location in June 2018, 213 spare parts (81 percent) did not have electronic records. Due in part to the unreliability of the data in ALIS, users at all 5 F-35 locations we visited have been collecting and tracking information outside of the system that should be automatically captured in ALIS. Although not a requirement, users said they need to track information outside of the system because they do not always trust the data that reside in ALIS. Users provided examples of critical aircraft data that they are tracking outside of ALIS—such as aircraft performance data and maintenance inspection deadlines—and said that manually tracking this information is a time-intensive process that pulls maintainers away from completing other aircraft maintenance-related responsibilities. For example, users at 1 location estimated that they spend an average of 5,000 to 10,000 hours per year manually tracking information that should be automatically and accurately captured within ALIS. In addition, there may be risks associated with using information tracked outside of the system of record to make decisions about the safety and operational health of aircraft. For example, users at one location said that there is a danger of overlooking a critical piece of information when key aircraft data used to determine an aircraft’s status must be tracked manually using Excel spreadsheets. Users also said that by continuously ignoring alerts in ALIS caused by missing or inaccurate data, squadrons could be at risk of ignoring an alert for a legitimate aircraft issue. Finally, one commander we spoke with said that while his policy is to generally require maintainers to resolve data issues before releasing an aircraft for flight, in a wartime scenario, his squadron will carry out missions with inaccurate or missing ALIS data and assume the subsequent risk that this may entail. Users at all 5 F-35 locations we visited cited challenges deploying with ALIS to forward locations. Users stated that the required hardware for ALIS is bulky, can be cumbersome to transport, and, when necessary, difficult to store on a ship. For example, the unclassified and classified Standard Operating Unit (SOU) servers that are required for collecting and analyzing aircraft data in ALIS are broken up into a series of transportable cases. These cases each weigh approximately 200 pounds and require at least two people to lift. Users from 1 location told us that they have taken several separate SOU-related cases to support ALIS on deployments. These servers, as shown in figure 7, require dedicated transportation to transport them to forward locations, and heavy-duty equipment to load them on and off of ships. Some users stated that it was challenging to find space on the ship to store these servers since they typically require an entire room to function, as well as specific power and environmental controls. Additionally, users at all 5 locations stated that limited internet connectivity can make deployments challenging. Although SOU servers are critical ALIS hardware components, due to their size, squadrons will not always take them on deployments. In these instances, internet connectivity is important to access critical aircraft data from the forward location and send it back to the squadron’s SOU for processing. However, internet connectivity can be slow or non-existent at these locations. In 2018, we recommended that the F-35 Program Executive Officer should test operating the F-35 disconnected from ALIS for extended periods of time in a variety of scenarios to assess the risks related to operating and sustaining the aircraft. DOD concurred with the recommendation, but as of December 2019, DOD had still not determined how long the aircraft can safely fly without connectivity to ALIS. Finally, users at 2 locations stated that contractor support is critical to supporting deployments. For example, at one location, due to inaccuracies with parts data in ALIS, the prime contractor prefers to match every requisite electronic record with its respective spare part prior to a deployment, which requires significant time and advanced planning. Furthermore, according to users at another location, due to the complexities and functionality issues related to ALIS, contractor support is required on deployments; however, deploying with contractors could become problematic in a combat scenario. Overall, users at all 5 locations said that they have completed deployments using ALIS. However, deployments are challenging and the current deployment preparation process for ALIS inhibits a military service’s ability to deploy on short notice. Users at 4 of 5 F-35 locations we visited stated that ALIS requires more contractor or military personnel support than originally planned. According to the F-35’s Operational Requirements Document—the document that outlines the overall requirements for the F-35 program— ALIS is supposed to help reduce the logistics footprint for the F-35. However, a 2013 DOD-commissioned study on reducing F-35 costs stated that the current ALIS support plan already uses 30 percent more administrators across squadrons and bases than a similarly-scaled IT implementation would normally require. In addition, current ALIS users at these 4 locations are finding that as ALIS becomes more mature, even more personnel are required to support the system’s operations. For example, according to users at 1 Air Force location, the Air Force currently relies on about 8 contractor employees to support each ALIS SOU server, but has determined that this is not sufficient. Users at 2 Air Force locations stated that until the Air Force can train more military personnel to support ALIS-related issues, they will need to increase the number of contractor employees per squadron to support F-35 operations. Further, users from 1 Air Force location said they have had to assign full- time “ALIS Expeditor” responsibilities to military personnel within the squadrons to keep track of ALIS-related issues and pressure the contractor for resolution. Since these roles are not official billets, their resulting responsibilities are adding to the military personnel’s existing, non-ALIS related responsibilities on the flight line. Air Force users from 1 location reported that due to inconsistencies within ALIS, they now have 20 full-time ALIS Expeditors to track ALIS-related issues and help ensure safety of flight for the aircraft. The Marine Corps had originally planned to maintain ALIS using only military personnel; however, as the numbers of aircraft and requisite SOUs increased, users at 1 Marine Corps location said that it was too difficult to develop and retain personnel with ALIS- specific expertise. According to these users, this has resulted in the Marine Corps needing increased numbers of contractor personnel to support its squadron operations. Users at all 5 F-35 locations we visited said that the process for resolving F-35 issues within ALIS remains problematic and inefficient. The Action Request (AR) process requires personnel to use an application within ALIS to submit an AR about any F-35 problem, including those about ALIS itself, to the contractor for triaging and ultimate resolution. In April 2016, we reported that ALIS users thought the AR process did not allow for the effective reporting and resolution of F-35 aircraft and ALIS issues. Specifically, users stated that the process did not provide transparency to all ARs submitted across F-35 locations and placed responsibility for resolving the requests primarily on the contractor. ALIS users at 4 locations stated that this remains the case. Users from 3 locations stated that the overall process would be more efficient if they were able to search ARs submitted by other squadrons across the fleet to determine if a solution to the problem already exists. Without this ability, users must submit an AR for every issue and wait for a response that can sometimes take months. For example, 1 location reported that from October 2018 through September 2019, F-35 aircraft were grounded for 9,262 hours or 9 percent of possible flight hours, due to unresolved ALIS- related ARs attributed mainly to missing and inaccurate electronic parts records. Officials from another location reported that during a 6-month period they had to ground aircraft for 2,200 hours as a result of waiting for contractors to resolve parts-related ARs. Users from a third location stated that more transparency in the AR process could reduce reliance on contractor support, provide a way to address F-35 problems more efficiently, and reduce costs to the program since DOD incurs a fee each time an AR is submitted. Users at all 5 F-35 locations we visited stated that ALIS is not user- friendly or intuitive. While users stated that there have been some limited improvements to ALIS over the past years, as previously discussed, in general, users at all 5 locations described ALIS applications as difficult to navigate. For example, users from 1 location stated that it is more difficult and time-consuming to search for information on parts in ALIS than in legacy logistics systems because the information is located in multiple locations within ALIS. Additionally, users from all 5 locations said that some of the applications within ALIS have very slow processing speeds. According to users at 1 location, in some instances, ALIS’s slow applications require maintainers to work additional hours to complete required maintenance tasks. During a demonstration of ALIS and its Joint Technical Data application at one of the locations we visited, we observed maintainers deal with a slow log-in process, problems filtering and searching for data in an application, and ultimately having the application freeze and kick them out. Figure 8 shows a maintainer using a PMA to work in ALIS. Users at all 5 F-35 locations we visited stated that the training and mission planning applications within ALIS remain immature. Users at all 5 locations said they are not using the Training Management System (TMS), an application designed for pilots and maintainers to track training qualifications and assign personnel to carry out specific tasks, for its intended purpose. Users from 4 locations said that because of the ongoing issues with TMS, they are using legacy systems in its place. For example, one Air Force command released a memorandum in January 2018 allowing some squadrons to use an external legacy system in place of the TMS application due to shortfalls in TMS functionality, which it stated had caused excessive work to execute normal operations and become an unacceptable burden. Marine Corps and Navy users from 2 locations we visited said that they are using other legacy systems to circumvent the TMS application as well. Additionally, pilots at 4 locations stated that the Off-Board Mission Support (OMS) application within ALIS is immature and remains non- intuitive, time consuming, and difficult to navigate. The OMS application is a key application for pilots to conduct mission planning and debriefing. Pilots at 2 locations said that they rely on contractors to help them complete tasks in the application. Users at all 5 F-35 locations we visited stated that training to learn how to use ALIS does not provide adequate knowledge or information to fully prepare users to operate the system. Specifically, users at 3 locations we visited stated that the training for ALIS does not reflect a realistic operational environment. Instead, users at all 5 locations stated that training materials are usually in the form of PowerPoint slides and that knowledge of ALIS and its functionality is primarily obtained at the squadron level through on-the-job-training. In April 2016, we reported that almost every user in the F-35-related focus groups we conducted at that time noted that they did not learn how to operate any ALIS applications until on-the-job training began on the flight line. Users stated that this remains true today. Users at 1 of the locations we visited stated that learning how to use ALIS in this manner has caused people to develop their own unique way of operating the system, which creates an F-35 fleet environment that is using its primary logistics tool in different ways. Although DOD and F-35 program officials agreed that ALIS continues to provide challenges for users and is generally not performing well, DOD still has not determined how it wants the system to perform. For example, officials from the Joint Strike Fighter Integrated Test Force told us that testing for individual ALIS software version releases focuses primarily on whether the new version is performing “better” than the previous version. Specifically, ALIS testers have developed criteria to determine if the newest version of ALIS is functioning more efficiently than the previous version by comparing such tasks as screen download times. However, according to these officials, these tests are not determining if the ALIS system is performing to a specified standard because DOD has not defined this standard. In September 2014, we recommended that DOD develop a performance- measurement process for ALIS that includes, but is not limited to, performance metrics and targets that (1) are based on the intended behavior of the system in actual operations and (2) tie system performance to user requirements. The DOD Systems Engineering Guide for Systems of Systems states that to fully understand performance of systems of systems (such as ALIS), it is important to have a set of metrics that assess the system’s performance and trace back to user requirements because the system will likely evolve based on incremental changes—similar to ALIS’s incremental fielding. These metrics should measure the intended behavior and performance of the system in actual operations versus the progress of the development of the system, allowing an assessment of system capabilities based on user requirements. After over 5 years, and more than 400 aircraft fielded, DOD has not yet established a performance-measurement process for ALIS. DOD concurred with our 2014 recommendation, and repeated its commitment to develop performance metrics for ALIS after the release of our 2016 report on ALIS risks. In September 2019 program officials told us that DOD remains in the process of developing these metrics and has no set timeline for their completion. Without a performance-measurement process, the F-35 program does not have critical information about ALIS performance across F-35 locations. Such information could help address current and future ALIS performance issues and systematically measure ALIS functionality compared to intended performance. Users at all 5 F-35 locations we visited also stated that problems with ALIS are affecting the overall readiness of the F-35 fleet; however, they were unable to tell us the degree to which this is the case. Overall F-35 fleet-wide performance has been falling short of warfighter requirements—that is, aircraft cannot perform as many missions or fly as often as required. Figure 9 shows F-35 fleet aircraft performance from October 2018 through September 2019. Full mission capability, or the percentage of time during which the aircraft can perform all of its tasked missions, was 31.6 percent across the fleet, as compared with the warfighter minimum target of 60 percent. Mission capability, or the percentage of time during which the aircraft can safely fly and perform at least one tasked mission, was 59.5 percent across the fleet, as compared with the warfighter minimum target of 75 percent. Furthermore, citing less than desirable aircraft performance, in September 2018, the Secretary of Defense directed the military services to achieve and maintain 80 percent mission capability rates for their critical aviation platforms, including the F- 35 fleet, by the end of fiscal year 2019. Two F-35 locations have started tracking information on how ALIS is affecting F-35 aircraft performance at their locations. Officials from one location told us that from October 2018 through September 2019, F-35 aircraft were grounded and thus non-mission capable for 16,221 hours, or 2 percent of possible flight hours, as a direct result of issues with ALIS— such as inaccurate or missing electronic records. However, according to officials at this location, this number does not capture all scenarios in which ALIS is affecting aircraft performance because sometimes squadron commanders make decisions to fly an aircraft when ALIS signals that they should not, in order to fulfill mission requirements. Officials from another location reported that in fiscal year 2018, ALIS- related issues caused the F-35 aircraft to be non-mission capable for 3,246 hours, or .5 percent of possible flight hours; however, as was the case with the previous location, officials said that this number also did not capture all scenarios in which ALIS is affecting aircraft performance. These limited efforts represent squadron-specific initiatives, as no other F-35 location has tracked similar ALIS-related data. Further, the data collected by the two locations only capture non-mission capability rates when ALIS signals to ground the aircraft and makes the aircraft incapable of completing a mission. The data do not account for the workarounds users said they are routinely performing to circumvent a non-functioning aspect of ALIS in order to get an aircraft ready to fly, or the times when squadron leadership decides to fly the aircraft when ALIS signals otherwise. Different factors can play a role in reducing F-35 aircraft readiness. For example, in April 2019, we reported that reduced aircraft performance was due largely to spare parts shortages. This conclusion was drawn from data that had been collected and tracked by both the contractor and DOD across the entire fleet to determine non-mission capability rates due to supply issues. Further, the F-35 program collects data on the degree to which maintenance issues are affecting F-35 mission capability. And, there are ongoing efforts to improve F-35 fleet readiness that are specifically targeted at supply and maintenance issues that are causing the significant mission-capability degradation. However, users and program officials stated that recurring issues with ALIS could also be affecting aircraft performance and noted that data on these issues are not being collected by the contractor or DOD. Although users reported multiple instances when ALIS-related issues grounded aircraft, these issues are being captured and categorized as either supply or maintenance-related issues, thus masking ALIS’s effect on fleet-wide readiness. DOD Instruction 5000.02T, “Operation of the Defense Acquisition System,” states that the program manager will use technical performance measures and metrics to assess program progress. It further states that the analysis of technical performance measures and metrics, in terms of progress against established plans, will provide insight into the technical progress and risk of a program like the F-35. In the case of ALIS, the F-35 program does not have a fleet-wide process for measuring, collecting, and tracking information on how ALIS is affecting the performance of the F-35 aircraft, such as fleet-wide mission capability rates. Without such a process, the F-35 program may be limited in its ability to identify all of the drivers of reduced aircraft performance and appropriate target solutions. Further, as we previously reported, DOD plans to enter into multi-year, performance-based F-35 sustainment contracts with the prime contractor, but may not be well positioned to enter into such contracts because, in part, it does not fully understand the technical characteristics of the aircraft. ALIS may or may not be having a notable effect on mission capability rates for the F-35 fleet. However, without understanding how or the extent to which ALIS is affecting the performance of the aircraft, DOD risks entering into long-term, performance-based logistics contracts without fully understanding all of the factors currently affecting aircraft operations. This could hinder DOD’s ability to effectively negotiate performance-related terms of the contract. Finally, without understanding how ALIS is affecting the performance of the aircraft, DOD risks developing a performance-measurement process for ALIS that is not tied to the overall performance goals of the program. DOD is taking actions to enhance the long-term viability of ALIS. Limited DOD attention on ALIS has resulted in a troubled history with the system. As a result, multiple efforts are currently underway to re-design and attempt to improve ALIS. However, key technical and programmatic uncertainties hinder these efforts. Furthermore, DOD does not have an overarching strategy for the future redesign of ALIS. As originally envisioned, ALIS was intended to be a first-of-its-kind, fully autonomic system that would provide users access to data on a range of capabilities—including operations, maintenance, prognostics, supply chain, customer support services, training, and technical data—in one logistics system to support aircraft operations. According to Joint Strike Fighter Integrated Test Force officials, previous DOD aircraft logistics systems were much simpler, not fully autonomic, and generally included data related to fewer major capabilities. However, the F-35 program office did not clearly specify what it required from ALIS from the warfighter’s perspective beyond the broad capabilities to be included in the system. Air Force officials stated that instead, the F- 35 program office relied on the prime contractor to take the lead in managing the development of the system. For example, the F-35 Operational Requirements Document provides only overarching, high- level requirements for ALIS and does not include specific, user-related requirements or requirements to adapt and modernize the system over time. DOD officials acknowledged that historically, DOD has prioritized other aspects of the F-35 program, such as the development of the airframe, over its logistics system. In addition, DOD’s focus with ALIS development over the last 5 years has largely centered on adding capabilities required to complete developmental testing for the F-35. As issues with the fielded system have arisen, DOD and the prime contractor’s approach has generally been to resolve these issues on a case-by-case basis as available resources allowed, as opposed to making more costly and time-intensive improvements to the system’s underlying design and functionality. DOD contracting officials and prime contractor representatives stated that the need to balance a limited number of software development personnel between efforts to stabilize the current system and add new features has negatively affected the development of ALIS. In a 2017 report, the Air Force Digital Service recommended that the F-35 program office cease adding new capabilities in order to re-evaluate ALIS-related design choices and improve software development processes and procedures. According to the report, many of the issues with ALIS have known root causes that are directly related to software and hardware design choices that are 15 years old. For example, ALIS is made up of siloed applications that each have their own, sometimes conflicting, databases. Further, according to the Air Force Digital Service report, efforts to upgrade ALIS from an out-of-date operating system have not been prioritized by the F- 35 program office. Finally, ALIS hardware is cumbersome, consisting of heavy servers as well as laptops that were originally designed in the mid- 1990s. The current approach to developing ALIS has generally led to scheduling delays and challenges addressing a backlog of ALIS deficiencies. For example, the ALIS version required to complete developmental testing for the F-35 was not released until 2018—8 years after the originally planned release date. F-35 program office officials emphasized that in general, the timeframe for releasing major software updates for ALIS—up to 18 months—has been long. Further, based on data from the prime contractor, as of September 2019, there were about 4,700 open ALIS deficiencies, which are used by the prime contractor to track and manage issues with the system. According to an F-35 program office official, ALIS deficiencies may be identified in the field by F-35 users, in the prime contractor’s testing laboratory, or during DOD-led developmental and operational testing of the F-35 and ALIS. Of these 4,700 deficiencies, about 34 percent were identified in 2017 or earlier and 22 percent were category 1 or category 2 deficiencies. Category 1 deficiencies are considered critical and could jeopardize safety, security, or another requirement; category 2 deficiencies are those that could impede or constrain successful mission accomplishment. As shown in figure 10, the total number of open deficiencies has generally increased over the last 2 years. In addition, the number of open category 1 through category 3 deficiencies, which are considered critical or have an adverse effect on mission accomplishment, generally increased during this period. While the rate at which the prime contractor closed deficiencies during this period increased, the rate of increase was generally lower than the rate at which new deficiencies were identified. Officials from the Joint Strike Fighter Integrated Test Force and Office of the Director of Operational Test and Evaluation expressed concerns about the number and nature of the ALIS-related deficiencies they have identified during developmental and operational testing. For example, F- 35 testers identified a number of deficiencies with the most recent ALIS software version, ALIS 3.5, including eight category 1 deficiencies. ALIS 3.5 is referred to as the “stabilization” release because it was intended to address longstanding issues with ALIS. In addition, F-35 testers stated that since 2016, they have identified a number of cyber-related ALIS deficiencies, most of which remain open today. While officials said that the number of cyber deficiencies is consistent with other DOD weapons systems, they stressed that a vulnerable ALIS is particularly problematic because of how interconnected the system is with the F-35 aircraft and its operations. DOD and the prime contractor have acknowledged ALIS’s troubled history and have established three initiatives to re-design and fix ALIS. At a November 2019 congressional hearing, the F-35 Program Executive Officer stressed that significant additional work is required to improve ALIS functionality and that this work cannot be done in old and outdated ways. Table 2 summarizes the three initiatives, led by the F-35 program office, Air Force, and prime contractor respectively. According to the F-35 program office, the three initiatives are complementary and will eventually be integrated in a final redesign of ALIS. However, we found that DOD lacks clarity on how it will address key technical and programmatic uncertainties about the future of the system (see figure 11). These uncertainties relate to complex aspects of ALIS that will significantly impact the future design of the system and how it will be managed. Further, there are divergent views among officials involved with the various initiatives in terms of how DOD should approach key aspects of the re-design, highlighting the uncertainty that exists about the future of ALIS. DOD has not fully determined what capabilities will be included in the ALIS re-design. After years of focusing on adding new capabilities with each major ALIS software version release, DOD officials agreed that that their current goal is to streamline and simplify ALIS. For example, the Mad Hatter initiative is designing applications based on the minimum capabilities required by maintainers to quickly release an aircraft for flight. Similarly, the ALIS Next initiative is working to optimize functions in ALIS by identifying aspects of the current design that could be slowing down the system—for example, transferring an aircraft’s entire digital history each time the jet is transferred from one SOU to another. However, officials from the Office of the Director of Operational Test and Evaluation indicated that there continues to be uncertainty about the capabilities— both classified and unclassified—that will be included in the re-design. Further, as discussed previously, the F-35 program office has not formally established how it expects ALIS to perform in operations or developed a performance-measurement process for ALIS. Program officials indicated the need for discussions with the services and international partners about aspects of the current system that are not consistently being used and may therefore not be required (such as the Training Management System) through an updated process for establishing ALIS-related requirements. This process, which requires coordination across all military services and international partners, has proven to be challenging in the past. According to a 2017 Air Force Digital Service report, the F-35 program office faces challenges identifying and prioritizing ALIS capabilities across multiple services and international partners, and this has negatively affected the development of the system. DOD is unclear about the extent to which it can adopt a more flexible software development model known as Agile. As we reported in April 2019, the F-35 program as a whole is pursuing a faster and more incremental approach for delivering new aircraft capabilities to the warfighter in order to more flexibly address evolving threats. One approach to software development that helps facilitate such incremental delivery is Agile, which calls for the delivery of software in small, short increments rather than in the typically long, sequential phases of a traditional software development approach. More a philosophy than a methodology, Agile emphasizes early and continuous software delivery, as well as using collaborative teams, and measuring progress with working software. According to some F-35 program office officials, adopting Agile could result in a more secure system because it involves continually testing software for security vulnerabilities. Further, we have previously reported that following an incremental development approach, such as Agile, gives agencies the opportunity to obtain additional feedback from users, which increases the probability that each successive increment will meet user needs. The Mad Hatter initiative is experimenting with an Agile approach and has had some initial successes using this model. For example, in July 2019, we observed a demonstration of a Mad Hatter-developed application that allows the user to quickly and easily search through Joint Technical Data, an application within ALIS that has been reported by some users as being extremely difficult to navigate. However, the Mad Hatter initiative has operated outside of F-35 program office policies and processes and its applications are currently not integrated with the fielded ALIS system. Further, Mad Hatter and F-35 program office officials said that they have faced challenges communicating the value of their approach with one another, and according to a senior Air Force official associated with the Mad Hatter initiative, the F-35 program office has not clarified the role of Mad Hatter representatives in current planning efforts aimed at scaling the results of the Mad Hatter initiative to the entire F-35 enterprise. Separately, as part of its own ALIS initiative, prime contractor officials said that their company recently began taking steps to adopt best practices for delivering new ALIS software using an Agile model. However, these efforts are new, and the F-35 program office has not developed standards for software developed by the prime contractor using this model. DOD officials we spoke with expressed differing views on the extent to which DOD should adopt an Agile software delivery model for ALIS. For example, in a 2018 memorandum establishing the Mad Hatter pilot, a senior Air Force acquisition official stated that the F-35 program should embrace the tenets of this type of model in order to innovate and rapidly deliver useful capability through ALIS. Similarly, Air Force, Office of the Secretary of Defense, and some F-35 program office officials stated that modernizing ALIS will require DOD to adopt industry best practices by making decisions quickly, delivering usable products early and often, and revising plans to reflect experience from completed software iterations. In contrast, Marine Corps and some F-35 program office officials indicated that DOD should carefully consider different commercially-available software tools, as well as DOD-specific constraints, before delivering new ALIS capabilities. For example, F-35 program office officials associated with the ALIS Next initiative stated that they conducted an assessment of the commercial software tools that could be used for new ALIS software development. These officials said that some of the tools that were initially being used by the Mad Hatter initiative to develop applications make software development easier in the short-term but more difficult to switch toolsets and/or contractors in the long-term. Marine Corps and some F-35 program officials also noted that current DOD processes and procedures—such as the software certification and cost-estimating processes—may not be able to support quick software releases. While an Agile software delivery model has been identified as having the potential to improve the way in which the federal government develops and implements IT, we previously reported that this type of model requires significant procedural and organizational changes in order to be implemented successfully. DOD has not made a decision about the extent to which the ALIS re- design will be hosted in the cloud as opposed to onsite servers at the squadron level. In April 2019, we reported that cloud computing allows federal agencies to access on-demand, shared computing resources with the goal of delivering services more quickly and at a lower cost. More specifically, purchasing IT services through a provider enables agencies to avoid paying for all of the computing resources (e.g., hardware, software, networks) that would typically be needed to provide such services. This approach offers federal agencies a means to buy the services faster and possibly at less cost than building, operating, and maintaining these computing resources themselves. However, National Institute of Standards and Technology guidance states that public cloud computing represents a significant shift from the norms of on-site data centers and should therefore be approached carefully with consideration to the sensitivity of data. While the Mad Hatter initiative has embraced hosting ALIS in the cloud, including at the squadron level, ALIS Next is conducting an assessment of the extent to which a cloud-based system is the best option for ALIS. Further, as part of its internal ALIS investment, the prime contractor has designed an alternative model to the current system that includes an onsite server at each F-35 squadron. Office of the Secretary of Defense, Air Force, and F-35 program office officials we talked to agreed that the ALIS re-design will involve migrating some portions of ALIS from onsite servers to the cloud. For example, these officials agreed that DOD should explore options for migrating the ALOU and U.S. CPE to the cloud. However, these officials disagreed about how much of the future system should be cloud-based at the squadron level. For example, Air Force, Office of the Secretary of Defense, and some F-35 program office officials stressed that for day-to- day maintenance at U.S. bases, F-35 squadrons should be able to access ALIS using Wi-Fi, and that the reliance on onsite servers should therefore be minimal and limited to deployed scenarios. According to these officials, DOD can achieve significant cost savings by moving ALIS to the cloud. These officials also indicated that DOD’s hesitation about moving from onsite servers to the cloud is mostly cultural and the result of a lack of understanding about what the cloud is. One senior Office of the Secretary of Defense official with software expertise stated that warfighters should be able to deploy with a minimal amount of ALIS hardware (for example, only a high-powered laptop). In contrast, other F- 35 program office officials told us that the F-35 program office is restricted in the extent to which it can migrate to cloud-based SOUs due to connectivity and security restrictions. Further, at an ALIS Next conference, some partner country representatives expressed concerns about hosting ALIS in the cloud, stating that stringent security requirements would likely prevent their governments from accepting a cloud-based solution for ALIS. DOD does not have a plan for incorporating users early and often in the development of new ALIS software across the F-35 enterprise. Previous GAO reports as well as other DOD studies have found that giving users the opportunity to provide feedback on actual working software early and often in the software development process, and incorporating that feedback in subsequent development, is critical to the success of any software development effort. For example, in March 2019, we reported that obtaining frequent feedback is linked to reducing risk, improving customer commitment, and improving technical staff motivation. Historically, user feedback has not been prioritized in the ALIS software development process. According to users we talked to, working groups do exist that serve as a venue for voicing user-related issues; however, users stated that these working groups meet infrequently and often do not lead to desired changes. Further, prime contractor representatives told us that while they recently began soliciting user feedback as part of their ALIS initiative, the F-35 program office has not contractually required incorporating user feedback in the ALIS software development process. The Mad Hatter initiative is currently incorporating user feedback into new software development for ALIS and has established a process whereby F-35 users and Mad Hatter software developers can communicate directly about the Mad Hatter applications that are in development. As part of this process, Mad Hatter product teams develop simple applications, field the applications to users, and then use feedback from users—obtained by email or videoconferences—to adjust and enhance the applications. Although Mad Hatter’s process for incorporating user feedback aligns with the practice of incorporating feedback early and often, the initiative is being executed at one F-35 installation, with one military service. Further, while the F-35 program office intends to eventually scale the results of Mad Hatter’s experimentation to the rest of the F-35 enterprise, it has not formally outlined how it will institutionalize the initiative’s process for incorporating user feedback across multiple services and international partners. DOD has not determined the roles of DOD and the prime contractor in future ALIS development and management. DOD officials stressed that historically, the department has relied heavily on the prime contractor to develop and manage ALIS. Officials also said that moving forward, DOD will need to play a more active role in the management of ALIS. For example, Air Force, Office of the Secretary of Defense, and F-35 program office officials all said that DOD should serve as the primary owner of the ALIS software system, with the prime contractor and other firms developing applications that will feed into DOD’s software pipeline. However, the F-35 program office has not officially named DOD as the prime ALIS owner, or specified how it will coordinate software development across these multiple entities. Further, while one of the long- term objectives of the Mad Hatter initiative is to build DOD’s capacity to manage and develop new ALIS software itself, Air Force officials involved in this initiative stated that DOD has not yet fully developed this capacity. As the original ALIS developer, prime contractor representatives stated that their company is in the best position to modernize ALIS. F-35 program office officials acknowledged that because the prime contractor plays such a critical role in the development and sustainment of the F-35, it will be necessary for DOD to work closely with the contractor, regardless of the direction DOD decides to take. For example, DOD officials said they have faced challenges obtaining key technical data from the prime contractor that would be required by DOD to lead ALIS software development, such as the underlying source code for current ALIS software, and that they were uncertain about the extent to which they would be able to obtain these data in the future. At a November 2019 congressional hearing, the Under Secretary of Defense for Acquisition and Sustainment stressed that many of the challenges with ALIS stem from the fact that ALIS data are fed back through prime- contractor computers, and there is resulting ambiguity over the ownership of that data. As we previously reported, DOD continues to lack clarity about the technical data it owns and the additional data it would require to maintain flexibility in the sustainment of the F-35. DOD has not agreed on the extent to which the ALIS re-design will incorporate current ALIS software—consisting of 8 million lines of code. As part of the ALIS Next initiative, F-35 program office officials said they intend to review the underlying source code for ALIS to determine which aspects of the current software should be integrated in the re-design. These officials explained that redesigning ALIS software from scratch will take too long and the future ALIS system will therefore need to incorporate, to some extent, current ALIS software. In contrast, a senior Air Force official associated with the Mad Hatter initiative stated that the initiative intends to replace most current ALIS applications with commercial or new custom applications, retaining only those ALIS applications that can be cost-effectively modernized. Further, officials from the Air Force, Office of the Secretary of Defense, and F-35 program office indicated that because most of the ALIS source code has not been updated in years and contains numerous security vulnerabilities, the software should be completely re-designed. DOD is unclear about how it will approach the key technical and programmatic uncertainties surrounding ALIS because the department has not developed a strategy for the future re-design of the system. DOD guidance for program managers states that a sound strategy requires, among other things, a clear articulation of program goals as well as an understanding of the risks or uncertainties and costs associated with achieving those goals. While DOD and the prime contractor have established various initiatives to re-design ALIS, DOD has not developed a strategy for the future of ALIS that clearly identifies and assesses goals, key risks or uncertainties, and associated costs. For example, as discussed previously, DOD lacks clarity about the goals of the re-design, such as the capabilities that will be included in the future system and the extent to which ALIS will be hosted in the cloud. In addition, DOD has not fully assessed key risks or uncertainties, including the extent to which DOD can adopt an Agile software development approach or manage the system itself. Finally, because it has not answered key questions about the future of the system, such as the extent to which the re-design will incorporate current ALIS software, DOD has not been able to develop accurate cost estimates for the ALIS re-design. In the past, DOD has faced challenges estimating and tracking ALIS costs. For example, in 2016 we reported that while DOD had estimated that ALIS would cost approximately $17 billion, the estimate was not fully credible because DOD had not performed uncertainty and sensitivity analyses as part of the cost-estimating process. Further, for this review, the F-35 program office was not able to provide us with historic costs showing how much the department has spent on ALIS over the years. DOD officials stated that historically, the department has faced challenges allocating scarce resources across competing priorities, and that the F-35 air vehicle has generally been prioritized over ALIS. With the completion of F-35 developmental testing in April 2018, program officials said they are now in a better position to focus on ALIS and address long-standing issues with the system. However, efforts to correct ALIS are relatively new and have not been fully developed. Without a strategy to guide the re-design of ALIS, DOD will not be able to effectively plan for the transition from the current system to a future one. For example, according to F-35 program office officials, DOD recently procured additional hardware for the current system, which officials said may not be required if DOD is able to develop and field a re-designed ALIS in the near term. Officials from the Office of the Director of Operational Test and Evaluation stressed that effectively transitioning from the current system to a future one will be particularly challenging for DOD given the need to continue sustaining the more than 400 aircraft that have already been fielded with current ALIS. Further, as discussed above, there are divergent views in terms of how DOD should approach key technical and programmatic aspects of the re-design, and integrating the different efforts that are underway to fix ALIS—led by the F-35 program office, Air Force, and prime contractor—will therefore require significant direction and leadership. Without a strategy, DOD may not be able to effectively coordinate and leverage the different ALIS initiatives that are underway, potentially leading to inefficiencies. DOD also risks repeating history by failing to clearly articulate what it expects from ALIS and how it will play a more active role in the management of the system going forward. The F-35 aircraft, with its advanced warfighting capabilities, provides critical tactical aviation for the Department of Defense. However, DOD will need to overcome substantial challenges related to ALIS if it wants to find successes in both sustainment and operations of the aircraft. Current ALIS users continue to report significant challenges with the system that are affecting day-to-day operations of the aircraft, adding additional flight line-related responsibilities, and, in some instances, causing squadron leadership to assume the risk of flying aircraft when ALIS tells them to stay on the ground. Although ALIS is not currently performing well, over 5 years after we recommended it, DOD has yet to establish a performance- measurement process that would define how ALIS should perform. In the absence of such a process, DOD will be challenged to address current and future ALIS-performance issues because it cannot measure ALIS functionality compared to intended system performance. Furthermore, ALIS users collectively agree that the issues with ALIS are affecting the readiness of the aircraft; however, the degree to which this is true remains unknown. Fleet-wide mission capability rates for the F-35 are still below the warfighter’s minimum targets, but DOD does not have a process for measuring, collecting, and tracking information on how ALIS is affecting these rates. Without such a process, DOD may not understand all of the factors behind the reduced aircraft performance, thus limiting its ability to target appropriate solutions. DOD officials have acknowledged the ongoing challenges with ALIS and know that the system, as it stands today, cannot be sustained into the future; therefore, it is positive that the department has embarked on efforts to re-design and fix ALIS, as well as take on a more active role in the management of the system. However, DOD faces a significant challenge as there are several complex technical and programmatic uncertainties that will need to be resolved before any future ALIS solution can be realized. Additionally, there are divergent views among ALIS stakeholders about how to go about addressing these complex issues. The future of ALIS remains unclear because the department has not developed a strategy for the re-design of the system that would identify, among other things, what the system should look like, how will it be developed and managed, how it will address key risks, and how much it will ultimately cost. Without such a strategy, DOD will not be able to effectively plan for the transition from the current ALIS system, which is already embedded in over 400 aircraft across the global F-35 fleet, to whatever solution is determined. Furthermore, a strategy would help align what is currently a chorus of divergent views within the department on how to address the future of ALIS. With the worldwide fleet expected to grow to over 1,000 aircraft over the next four years, and with the U.S. services becoming increasingly reliant on the F-35’s capabilities to support their operational strategies, it will be imperative for DOD to address the ongoing issues related to the F-35’s logistics system. Congress should consider legislation requiring the Department of Defense to establish a performance-measurement process for ALIS that includes, but is not limited to, performance metrics and targets that (1) are based on intended behavior of the system in actual operations and (2) tie system performance to user requirements. (Matter for Consideration 1) We are making the following two recommendations to DOD: The Secretary of Defense should ensure the Under Secretary of Defense for Acquisition and Sustainment, in consultation with the F-35 Program Executive Officer, develops a program-wide process for measuring, collecting, and tracking information on how ALIS is affecting the performance of the F-35 fleet to include, but not be limited to, its effects on mission capability rates. (Recommendation 1) The Secretary of Defense should ensure the Under Secretary of Defense for Acquisition and Sustainment, in consultation with the F-35 Program Executive Officer, develops and implements a strategy for the re-design of ALIS. The strategy should be detailed enough to clearly identify and assess the goals, key risks or uncertainties, and costs of re-designing the system. (Recommendation 2) We provided a draft of this report to DOD for review and comment. In its written comments, reproduced in appendix II, DOD concurred with our recommendations and identified actions that it was taking or planned in response. We agree that DOD is taking positive steps in addressing issues with ALIS, including the decision to replace ALIS with a future system that it has named the F-35 Operational Data Integrated Network (ODIN). According to DOD, the department is currently developing a strategy that will guide ODIN’s development. As DOD proceeds with replacing ALIS with ODIN, it will be imperative for the department to carefully consider and assess the key technical and programmatic uncertainties discussed in this report. These issues—including how much of ALIS will be incorporated in ODIN and the extent to which DOD has access to the data it needs to play a more active role in the management of the system—are complex, and will require significant direction and leadership to resolve. As agreed with your office, unless you publicly announce the contents of this report earlier, we plan no further distribution until 7 days from the report date. At that time, we will send copies of this report to congressional requesters; the Secretary of Defense; the Under Secretary of Defense for Acquisition and Sustainment; the F-35 Program Executive Officer; the Secretaries of the Air Force and Navy; and the Commandant of the Marine Corps. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-9627 or maurerd@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Staff members making key contributions to this report are listed in appendix III. For each of our objectives, we reviewed relevant F-35 sustainment and the Autonomic Logistics Information System (ALIS)-related data, plans, program briefs, guidance, and other documentation and collected information by interviewing officials from the Office of the Under Secretary of Defense for Acquisition and Sustainment, the F-35 Joint Program Office, the Director, Operational Test and Evaluation, the Defense Contract Management Agency, the U.S. Air Force, the U.S. Navy, the U.S. Marine Corps, the Air Force Digital Service, and the prime contractor, Lockheed Martin. To interview officials and observe ALIS- related operations, we conducted site visits to five F-35 locations—Luke Air Force Base, Arizona; Edwards Air Force Base, California; Nellis Air Force Base, Nevada; Marine Corps Air Station Yuma, Arizona; and Naval Air Station Lemoore, California. We selected these locations to obtain perspectives from ALIS-users (i.e. maintainers, pilots, supply personnel, contractors) from all U.S. services participating in the F-35 program, including from operational, training, and testing locations. Additionally, we developed a data collection instrument to collect ALIS-related inputs and data from ALIS-users (i.e. maintainers, pilots, supply personnel, contractors) at all 10 U.S. F-35 locations—Luke Air Force Base, Arizona; Edwards Air Force Base, California; Nellis Air Force Base, Nevada; Marine Corps Air Station Yuma, Arizona; Naval Air Station Lemoore, California; Hill Air Force Base, Utah; Naval Air Station Patuxent, Maryland; Eglin Air Force Base, Florida; Marine Corps Air Station Beaufort, South Carolina; and Marine Corps Air Station Iwakuni, Japan. Finally, we met with officials from the F-35 Joint Program Office, Massachusetts Institute of Technology (MIT) Lincoln Labs, Lockheed Martin Rotary and Mission Systems, Air Force Digital Service, Kessel Run (Air Force), and others to discuss ALIS-related improvement efforts. In support of our objectives, we gathered data from fiscal year 2019 (the most recent full fiscal year of data available at the time of our review) from the prime contractor on the performance of the F-35 fleet such as the full and mission capability rates. We also collected the most recent available information on ALIS software deficiencies. To determine the reliability of these data, we collected information on how the data were collected, managed, and used through a questionnaire and interviews. Although we identified some limitations in the way that certain data are being collected and reported—such as data related to aircraft performance like mission capability rates—we determined that they are sufficiently reliable for the way in which we reported them and our purposes of providing information on the progress and challenges within the program. All the performance data presented in our report are sufficiently reliable to provide a general comparison of capabilities to minimum targets. To assess the extent to which there have been improvements as well as key challenges with ALIS over the last 5 years, we interviewed officials and examined guidance and briefing documents from the Office of the Under Secretary of Defense for Acquisition and Sustainment, the U.S. Services, the F-35 Joint Program Office, the Defense Contract Management Agency and Lockheed Martin Rotary and Mission Systems officials to discuss the current status of the system and plans for mitigating risks. To determine user views on risks to (or issues with) ALIS, we interviewed officials at our 5 selected bases, conducted a short data collection instrument of the other 5 bases, interviewed officials at Air Force headquarters and the contractor, and reviewed relevant documents. At the 5 bases, we interviewed groups of pilots, maintainers and supply personnel about ALIS performance, challenges, and possible improvements. In addition, we posed several targeted questions based on risks found in our last report. In total, we received input from more than 160 users at the 5 bases we visited through group discussions or interviews. We analyzed the responses provided in these group interviews, and identified the issues/risks that at least one set of users reported at each of the 5 bases. We also considered any improvements that were described as having occurred during the last few years. We also compared the responses from the interviews at the 5 bases with our data collection responses, and the other testimonial and documentary evidence we obtained. The list of issues/risks we identified contains some that were reported in our 2016 report as well as some new ones. While this list summarizes the types of issues/risks described at the 5 bases, and also in other interviews and document review, individual user views and experiences could vary by base and user group. We also interviewed officials and reviewed reports from the Air Force Audit Agency, the Director, Operational Test and Evaluation, and the Department of Defense Inspector General to identify improvements as well as any functionality issues with ALIS. We interviewed and gathered information from DOD officials on testing for ALIS, metrics on ALIS’s performance, and the operations of the system. As discussed previously, we collected and analyzed data for fiscal year 2019 that we obtained from the prime contractor on the overall aircraft performance such as the full mission capability and mission capability rates. We analyzed and compared information obtained from interviews, site visits, data collection instruments, and documents with guidance such as DOD’s System Engineering Guide for System of Systems to determine the extent to which DOD has an effective procedure for addressing and mitigating specific risks and challenges that may be associated with a major weapon system. We also compared this information with previous GAO reports from 2014, 2016, and 2018 to determine the extent to which DOD has addressed our prior recommendations on ALIS-related issues. To assess the extent to which the F-35 program has addressed issues with ALIS, we gathered and analyzed data from the prime contractor on open and closed ALIS deficiencies identified from November 2017 through October 2018. We selected this timeframe because it included the most recent data on ALIS deficiencies at the time of our review and also allowed us to observe trends in ALIS deficiencies over a two-year period. The data we received included summary information on the total number of open deficiencies, the total number of closed deficiencies, the number of newly closed deficiencies, the number of newly identified deficiencies, and the total number of open category 1 through category 3 deficiencies (considered critical or adverse) for each month during the two-year period. To determine the reliability of these data, we conducted electronic tests to identify any internal inconsistencies with the data. We also reviewed documentation from the prime contractor on the management of ALIS deficiency data and collected information on how the data were collected, managed, and used through a questionnaire. Specifically, we asked questions about inconsistencies we identified through electronic testing of the data, the extent to which the prime contractor’s system for collecting deficiency information includes edit checks or controls to help ensure the data are entered accurately, and limitations related to the accuracy or completeness of the data. As a result, we determined the data to be sufficiently reliable for the purpose of reporting trends in the number of open and closed ALIS deficiencies over time. To determine the extent to which DOD is taking actions to enhance the long-term viability of the system, we interviewed officials and reviewed guidance and/or planning documents from the Office of the Under Secretary of Defense for Acquisition and Sustainment, the F-35 Joint Program Office, and the Office of the Assistant Secretary of the Air Force for Acquisition, Technology, and Logistics. We interviewed officials from the prime contractor to determine their role in helping DOD mitigate risks regarding the long-term viability for ALIS. Additionally, we examined briefing documents from the MIT-Lincoln Labs, a federally-funded research and development center assisting the F-35 Joint Program Office, on plans, timelines, and risks for modernizing the hardware and software. We interviewed officials from the Air Force’s Kessel Run team to discuss their Mad Hatter initiative (intended to improve ALIS functionality), the viability of current ALIS software, and any risks associated with the future of ALIS. We conducted a site visit to Nellis Air Force Base to observe the Mad Hatter initiative and discuss its results and the future of ALIS software. Further, as discussed previously, we analyzed data from November 2017 through October 2019 on ALIS deficiencies. We reviewed reports and interviewed officials from the Air Force Digital Service and the Director, Operational Test and Evaluation on the future viability of these long-term initiatives for ALIS. Finally, we analyzed and compared information obtained from interviews, site visits, and documents with applicable guidance to determine the extent to which DOD has an effective long-term plan for ALIS that addresses operational and financial risks. In support of our work, we interviewed officials from the following DOD organizations and other organizations during our review. We selected these organizations based on their oversight, planning, and/or execution roles related to F-35 ALIS operations. Office of the Under Secretary of Defense for Acquisition and Sustainment, Arlington, Virginia Office of the Director for Operational Test and Evaluation, Arlington, Defense Contract Management Agency Lockheed Martin, Orlando, F-35 Joint Program Office, Arlington, Virginia Office of the Assistant Secretary of the Air Force for Acquisition, Air Force F-35 Integration Office, Arlington, Virginia Kessel Run Team, Hanscom Air Force Base, Massachusetts Luke Air Force Base, Arizona 56th Maintenance Group 61st Aircraft Maintenance Unit 62nd Aircraft Maintenance Unit Edwards Air Force Base, California Nellis Air Force Base, Nevada 57th Aircraft Maintenance Squadron Navy F-35 Integration Office, Arlington, Virginia Naval Air Station Lemoore, California Strike Fighter Wing Pacific Strike Fighter Squadron 125 Strike Fighter Squadron 147 Marine Corps F-35 Integration Office Marine Corps Air Station Yuma, Arizona Marine Aircraft Group 13 Marine Aviation Logistics Squadron 13 Marine Fighter Attack Squadron 211 Marine Fighter Attack Squadron 122 Air Force Digital Service, Arlington, Virginia Lockheed Martin Rotary and Mission Systems, Orlando, Florida MIT Lincoln Laboratory, Lexington, Massachusetts We conducted this performance audit from August 2018 to March 2020 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides and reasonable basis for our findings and conclusions based on our audit objectives. Diana Maurer, (202) 512-9627, maurerd@gao.gov In addition to the contact named above, Alissa Czyz (Assistant Director), Matthew Bader, Vincent Buquicchio, Tracy Burney, Juana Collymore, Martin De Alteriis, Michael Holland, Jeff Hubbard, Clarice Ransom, and Elisa Yoshiara made key contributions to this report. F-35 Aircraft Sustainment: DOD Faces Challenges in Sustaining a Growing Fleet. GAO-20-234T. Washington, D.C.: November 13, 2019. Space Command and Control: Comprehensive Planning and Oversight Could Help DOD Acquire Critical Capabilities and Address Challenges. GAO-20-146. Washington, D.C.: October 30, 2019. F-35 Joint Strike Fighter: Action Needed to Improve Reliability and Prepare for Modernization Efforts. GAO-19-341, Washington, D.C.: April 29, 2019. F-35 Aircraft Sustainment: DOD Needs to Address Substantial Supply Chain Challenges.GAO-19-321. Washington, D.C.: April 25, 2019. Cloud Computing: Agencies Have Increased Usage and Realized Benefits, but Cost and Savings Data Need to Be Better Tracked. GAO-19-58, Washington, D.C.: April 4, 2019. DOD Space Acquisitions: Including Users Early and Often in Software Development Could Benefit Programs. GAO-19-136. Washington, D.C.: March 18, 2019. F-35 Joint Strike Fighter: Development Is Nearly Complete, but Deficiencies Found in Testing Need to Be Resolved. GAO-18-321. Washington D.C.: June 5, 2018. Warfighter Support: DOD Needs to Share F-35 Operational Lessons Across the Military Services. GAO-18-464R, Washington D.C.: April 25, 2018. Military Aircraft: F-35 Brings Increased Capabilities, but the Marine Corps Needs to Assess Challenges Associated with Operating in the Pacific. GAO-18-79C. Washington, D.C.: March 28, 2018. Information Technology Reform: Agencies Need to Improve Certification of Incremental Development. GAO-18-148. Washington, D.C.: November 7, 2017. F-35 Aircraft Sustainment: DOD Needs to Address Challenges Affecting Readiness and Cost Transparency. GAO-18-75. Washington D.C.: October 26, 2017. F-35 Joint Strike Fighter: DOD’s Proposed Follow-on Modernization Acquisition Strategy Reflects an Incremental Approach Although Plans Are Not Yet Finalized. GAO-17-690R. Washington, D.C. August 8, 2017. F-35 Joint Strike Fighter: DOD Needs to Complete Developmental Testing Before Making Significant New Investments. GAO-17-351. Washington, D.C.: April 24, 2017. F-35 Joint Strike Fighter: Continued Oversight Needed as Program Plans to Begin Development of New Capabilities. GAO-16-390. Washington, D.C.: April 14, 2016. F-35 Sustainment: DOD Needs a Plan to Address Risks Related to Its Central Logistics System. GAO-16-439. Washington, D.C.: April 14, 2016. F-35 Joint Strike Fighter: Preliminary Observations on Program Progress. GAO-16-489T. Washington, D.C.: March 23, 2016. F-35 Joint Strike Fighter: Assessment Needed to Address Affordability Challenges. GAO-15-364. Washington, D.C.: April 14, 2015. F-35 Sustainment: Need for Affordable Strategy, Greater Attention to Risks, and Improved Cost Estimates. GAO-14-778. Washington, D.C.: September 23, 2014. F-35 Joint Strike Fighter: Slower Than Expected Progress in Software Testing May Limit Initial Warfighting Capabilities. GAO-14-468T. Washington, D.C.: March 26, 2014. F-35 Joint Strike Fighter: Problems Completing Software Testing May Hinder Delivery of Expected Warfighting Capabilities. GAO-14-322. Washington, D.C.: March 24, 2014. F-35 Joint Strike Fighter: Restructuring Has Improved the Program, but Affordability Challenges and Other Risks Remain. GAO-13-690T. Washington, D.C.: June 19, 2013. F-35 Joint Strike Fighter: Program Has Improved in Some Areas, but Affordability Challenges and Other Risks Remain. GAO-13-500T. Washington, D.C.: April 17, 2013. F-35 Joint Strike Fighter: Current Outlook Is Improved, but Long-Term Affordability Is a Major Concern. GAO-13-309. Washington, D.C.: March 11, 2013. Software Development: Effective Practices and Federal Challenges in Applying Agile Methods. GAO-12-681. Washington, D.C.: July 27, 2012. Joint Strike Fighter: DOD Actions Needed to Further Enhance Restructuring and Address Affordability Risks. GAO-12-437. Washington, D.C.: June 14, 2012. Joint Strike Fighter: Restructuring Added Resources and Reduced Risk, but Concurrency Is Still a Major Concern. GAO-12-525T. Washington, D.C.: March 20, 2012. Joint Strike Fighter: Implications of Program Restructuring and Other Recent Developments on Key Aspects of DOD’s Prior Alternate Engine Analyses. GAO-11-903R. Washington, D.C.: September 14, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Is Still Lagging. GAO-11-677T. Washington, D.C.: May 19, 2011. Joint Strike Fighter: Restructuring Places Program on Firmer Footing, but Progress Still Lags. GAO-11-325. Washington, D.C.: April 7, 2011. Joint Strike Fighter: Restructuring Should Improve Outcomes, but Progress Is Still Lagging Overall. GAO-11-450T. Washington, D.C.: March 15, 2011.", "summary": "The F-35 is DOD's most ambitious and costly weapon system in history, with U.S. sustainment costs estimated at about $1.2 trillion over a 66-year life cycle. Central to the F-35 is ALIS—a complex system that supports operations, mission planning, supply-chain management, maintenance, and other processes. A fully functional ALIS is critical to the F-35's operational success. However, over the past 5 years GAO has reported on key risks associated with the system, such as challenges deploying the F-35 with ALIS, inaccurate data that reside in ALIS, and ineffective training for personnel who need to use ALIS. GAO was asked to review DOD's efforts to improve ALIS. This report assesses the extent to which (1) improvements have been made over the past 5 years and challenges remain for ALIS users, and (2) DOD is taking actions to enhance the long-term viability of the system. GAO reviewed F-35 and ALIS program documentation and data, interviewed DOD officials and contractor employees, and visited five U.S. F-35 sites. The Autonomic Logistics Information System (ALIS) is integral to supporting the F-35 fighter jet's operations and maintenance. F-35 personnel at 5 locations GAO visited agreed that ALIS is performing better in some aspects, such as faster processing speeds for some tasks. However, problems with ALIS continue to pose significant challenges for F-35 personnel (see figure). The Department of Defense (DOD) has not (1) developed a performance measurement process for ALIS, which GAO recommended in 2014, or (2) determined how ALIS issues affect F-35 fleet readiness. Without efforts in these areas, DOD will be hindered in addressing ALIS challenges and improving aircraft readiness. DOD and the prime contractor have a variety of initiatives underway for re-designing ALIS. However, these initiatives involve differing approaches and technical and programmatic uncertainties are hindering the re-design effort (see figure). DOD has not developed a strategy for the future of ALIS that includes goals of the re-design, an assessment of key risks, or costs. Without this, DOD may not be able to coordinate various ALIS design-improvement initiatives that are under way or meaningfully enhance the system over the long term. GAO is recommending that DOD track how ALIS is affecting readiness of the F-35 fleet and develop a strategy for the ALIS re-design. In addition, GAO believes that Congress should consider requiring DOD to develop a performance measurement process for ALIS. DOD concurred with both of GAO's recommendations.", "document_type": "gao"}
{"report": "Following Hurricane Katrina in 2005, the Post-Katrina Act required FEMA to develop a national preparedness system and assess preparedness capabilities to determine the nation’s disaster preparedness. In September 2011, DHS issued the National Preparedness Goal: a secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk. The National Preparedness Goal also defined the “whole community” as individuals and communities, the private and nonprofit sectors, faith-based organizations, and all governments (local, regional/metropolitan, state, tribal, territorial, insular area, and federal). The National Preparedness Goal identifies and defines 32 core capabilities across five broad mission areas. These capabilities form the foundation for measuring overall national preparedness and assisting the nation in allocating resources to fill identified preparedness gaps. Three of the 32 core capabilities affect all mission areas and are considered to be “crosscutting” (see fig. 1). The five broad mission areas are: Prevention. Preventing an imminent threat, or actual act of terrorism. Protection. Protecting citizens, residents, visitors, and assets in a manner that allows interests, aspirations, and way of life to thrive. Mitigation. Mitigating the loss of life and property by lessening the impact of future disasters. Response. Responding quickly to save lives, protect property and the environment, and meet basic human needs in the immediate aftermath of an incident. Recovery. Recovering through a focus on the timely restoration, strengthening, and revitalization of infrastructure, housing, and a sustainable economy, as well as the health, social, cultural, historic, and environment fabric of communities affected by an incident. Since 2012, DHS has produced a National Preparedness Report annually, which assesses progress toward the National Preparedness Goal of achieving a secure and resilient nation. A key element of the National Preparedness Report is that it evaluates and measures the extent to which jurisdictions have strengthened their 32 core capabilities. From 2012 to 2017, all 50 states, District of Columbia, and 5 territories were required to assess the preparedness levels of their 32 capabilities by providing a rating of 1 to 5, with 5 being the highest preparedness rating. Emergency management capabilities with a rating of 1 or 2 are considered to have the largest capability gaps. FEMA used this assessment process to inform the National Preparedness Report by illustrating which threats and hazards occurred in the past and which capabilities have the largest gaps. FEMA’s National Preparedness Directorate, which includes the National Preparedness Assessment Division, is responsible for assisting communities in becoming more resilient by developing the capabilities needed to prevent, protect against, respond to, recover from, and mitigate against all threats and hazards. The Directorate provides guidance, programs, and processes to assist communities in completing the requirements associated with the National Preparedness System. To help jurisdictions more comprehensively assess their gaps, FEMA required they complete the Threat and Hazard Identification and Risk Assessment (THIRA) and Stakeholders Preparedness Review (SPR). The THIRA is conducted by jurisdictions every 3 years to, in part, identify threats and hazards that are both reasonably likely to affect the community and would most challenge the community’s ability to deliver one or more of its capabilities; and estimate and describe the potential impacts of those threats and hazards. The types of threats and hazards are defined as (1) natural hazards or acts of nature; (2) technological hazards that are accidents or failures of systems and structures; and (3) human-caused incidents resulting from intentional actions. Jurisdictions are to conduct the SPR annually to, among other things, identify capability gaps by assessing the capabilities against the types of threats and hazards identified in the THIRA. In 2012-2013, FEMA issued its initial guidance to jurisdictions to help them understand how to identify the threats and hazards through the THIRA, and assess their core capabilities. In 2018, FEMA issued new guidance for the THIRA and SPR requiring jurisdictions to change the methodology, moving away from proficiency-based ratings to a process that relies more on quantitative data to measure gaps across the core capabilities. In 2018, FEMA required jurisdictions to begin using the new methodology to assess the core capabilities within the response and recovery mission areas. Beginning in 2019, FEMA required jurisdictions to begin using the new methodology to assess the core capabilities across all mission areas. FEMA’s 10 regions provide technical assistance and training to help jurisdictions become more proficient in completing these capability assessments. FEMA also sponsors exercises with states, territories, tribes, and localities to help them assess their emergency management capabilities. In addition to the jurisdictions’ THIRAs and SPRs, in 2019, FEMA initiated an effort to assess the federal government’s emergency management capacity. According to FEMA, the effort is intended to provide a national THIRA and SPR that assesses the federal government’s capabilities against the nation’s threats and hazards. The Disaster Recovery Reform Act of 2018 (DRRA) requires FEMA, among other things, to provide congressional committees updates every 6 months on its progress in completing a national preparedness assessment until the assessment is complete. In July 2019, FEMA issued its 2019 National Threat and Hazard Identification and Risk Assessment (National THIRA): Overview and Methodology, describing its approach to completing a national-level risk assessment (i.e., a National THIRA). According to FEMA, the National THIRA was completed in 2020, and will be included in the 2020 National Preparedness Report. DHS, through FEMA, provides jurisdictions preparedness grants, which are used, in part, to strengthen the 32 core capabilities across the five mission areas. FEMA has traditionally provided three primary preparedness grants that jurisdictions can use to strengthen their emergency management core capabilities. Two of the three grants, the State Homeland Security Grant Program and the Urban Area Security Initiative, were established after the terrorist attacks of September 11, 2001. As established by federal law, these grants are intended to help states and localities prevent, prepare for, protect against, and respond to acts of terrorism. State Homeland Security Grant Program. Provides funding to assist state, local, and tribal governments in preventing, preparing for, protecting against, and responding to acts of terrorism. Helps support states’ implementation of homeland security strategies to address the identified planning, organization, equipment, training, and exercise needs at the state and local levels. In fiscal year 2019, the total funding available to all 50 states, District of Columbia and 5 territories was $415 million. Urban Area Security Initiative. Provides federal assistance to address the unique needs of high-threat, high-density urban areas, and assists the areas in building a capacity to prevent, prepare for, protect against, and respond to acts of terrorism. In fiscal year 2019, the total funding available to the 31 urban areas was $590 million. Emergency Management Performance Grant. Provides federal assistance to states to assist state, local, and tribal governments in preparing for all hazards. The program plays a valuable role in strengthening and sustaining the 32 core capabilities across the five mission areas. In fiscal year 2019, the total funding available to states, local governments, and tribes was $315 million. The National Preparedness System and associated preparedness grants have helped jurisdictions strengthen and sustain their emergency management capabilities. More specifically, according to National Preparedness Reports since calendar year 2012, states and territories generally have rated their capabilities within the prevention and response mission areas, as well as their crosscutting capabilities—which involve all five mission areas, as having the highest preparedness levels. By contrast, states and territories generally have rated their capabilities in the recovery and protection mission areas as having lower preparedness levels, and these ratings showed little to no improvement from 2013 to 2017. Additionally, since 2013, jurisdictions have directed nearly 87 percent of their FEMA preparedness grants toward sustaining or strengthening capabilities in the crosscutting, prevention, and response mission areas, and around 13 percent on enhancing or sustaining capabilities in the protection, mitigation, and recovery mission areas. FEMA has encouraged jurisdictions to invest future preparedness grants to strengthen their capabilities that have lower preparedness ratings and to address emerging threats, such as cybersecurity. However, FEMA officials told us their efforts to help jurisdictions enhance their capabilities, including the distribution of existing preparedness grants, will likely not be sufficient to address the capability gaps that have been identified by jurisdictions. States and territories’ 2017 preparedness data showed that eight core capabilities in the response and crosscutting mission areas had the highest level of preparedness (a rating of 4 or 5 on a 5-point scale). For example, as shown in figure 2 below, over 50 percent of the assessment ratings by the states and territories identified crosscutting capabilities, such as public information and warning and operational coordination, in the highest category of preparedness. Similarly, 57 percent of the assessment ratings by states and territories identified on-scene security, protection, and law enforcement capabilities within the response mission area in the highest preparedness categories. In our discussions with local officials who were impacted by the 2017 and 2018 hurricanes, they told us that the operational coordination and public information and warning capabilities were effective during their response efforts. For example, Craven County, NC, officials told us that in response to the flooding from Hurricane Florence, their emergency operations center was instrumental in communicating with first responders. In doing so, they were able to keep county wells running while working with utility companies to prioritize areas that needed electrical power, such as hospitals and grocery stores. Additionally, Onslow County, NC officials said their emergency operations center was instrumental in communicating and coordinating the rescue operations of around 700 residents through the use of the county’s swift water rescue teams, with assistance from the U.S. Marine Corps, North Carolina’s National Guard, and the local fire and police departments. In addition, Brazoria County, TX, officials told us that in response to Hurricane Harvey they used videos and social media to get warning messages out to the residents and businesses about evacuation assistance as well as information on hurricane preparedness. Supply chain integrity and security Hurricane Florence caused significant flooding in and around New Hanover County, North Carolina. County officials told us the state’s National Guard high wheel clearance trucks had to be used to transport food, water, fuel, and generators throughout the flooded areas to isolated communities because the county did not have the capability to deliver these commodities. According to the North Carolina National Guard, the high-water vehicles were also used to evacuate citizens to shelters and transport essential civilian personnel such as nurses, doctors, and first responders. Preparedness data from 2017 show that almost 40 percent of jurisdictions’ ratings identified five capabilities in the recovery and protection mission areas in the lowest category of preparedness (a rating of a 1-2 on a 5-point scale). For example, within the recovery mission area, 51 percent of the ratings identified disaster housing in the lowest category of preparedness. Similarly, within the protection mission area, 46 percent of the assessment ratings identified cybersecurity in the lowest category. Additionally, these capabilities have been consistently rated in the lowest preparedness categories from 2013 through 2017 and have shown little-to-no change. For example, under the recovery mission area, 56 percent of the assessment ratings by states and territories identified disaster housing in the lowest category in 2013, with minimal changes through 2017. Some of the capabilities that had the lowest preparedness ratings in 2013 were: Economic recovery. The ability to return economic and business activities (including agricultural) to a state of health and develop new economic opportunities that result in a sustainable and economically viable community. Natural and cultural resources. The ability to preserve, conserve, rehabilitate, and restore historic property consistent with post-disaster community priorities and best practices and in compliance with environmental and historic preservation laws and executive orders. Disaster housing. The ability to address pre- and post-disaster housing issues and coordinate the delivery of federal resources and activities to assist local, state, tribal, territorial, and insular area governments as they rehabilitate and reconstruct destroyed and damaged housing. Supply chain integrity and security. The ability to secure and make resilient key nodes, methods of transport between nodes, and materials in transit between a supplier and consumer. Table 1 shows the percentages of the lowest-rated capabilities from 2013 through 2017. While the National Preparedness System may help jurisdictions assess their preparedness using emergency preparedness capability assessments, jurisdictional officials we spoke with told us that real-life disasters sometimes show jurisdictions to be less prepared than their capability assessments previously indicated. As a result, some states have lowered their preparedness ratings in subsequent capability assessments following a disaster. For example, after the 2017 and 2018 hurricanes, some states told us they lowered their preparedness rating in their 2019 assessments for disaster housing because they realized the capability gap was larger than they previously believed. Officials from the North Carolina Division of Emergency Management said that in 2018, they lowered their preparedness rating for housing because their housing capacity was not able to meet the needs of disaster victims who needed immediate housing assistance. From fiscal years 2013 through 2018, jurisdictions received approximately $8.3 billion in preparedness grants funds primarily from the State Homeland Security Program, Urban Area Security Initiative, and the Emergency Management Performance Grant. Of this amount, jurisdictions directed about $7.3 billion—or about 87 percent of the funds—to capabilities in the crosscutting, prevention, and response mission areas, which constitute the highest-rated mission areas. For example, in California, $1.9 million in Urban Area Security Initiative grants were used to strengthen crosscutting and prevention capabilities by providing situational awareness to first responders and emergency managers working on active threats to infrastructure. Additionally, in Florida, up to $2.8 million of the State Homeland Security grant was used to create a system intended to strengthen crosscutting and prevention capabilities by enabling the state’s law enforcement agencies to more easily share information. Of the $8.3 billion in preparedness grant funding from fiscal years 2013 through 2018, about $1.1 billion—or about 13 percent—was directed to capabilities in the mitigation, protection, and recovery mission areas, which constitute the lowest-rated mission areas. During this time, jurisdictions directed the least amount of preparedness grant funds on the recovery mission area—$78 million, or about 1 percent (see fig. 3). Jurisdictions also directed about 5 percent of the $1.1 billion to capabilities within the mitigation mission area, though preparedness ratings in the mitigation mission area generally showed improvements each year. In 2017, 43 percent of the assessment ratings by states and territories rated three of the four mitigation-related capabilities in the highest category. Improvements in the mitigation mission area could be, in part, attributable to FEMA providing jurisdictions with grant funds other than preparedness grants, such as post-disaster grants, which include Hazard Mitigation Grant Program funds. Further, state and local decisions on how to prioritize preparedness grant awards resulted in about 1 percent—$78 million—being directed to capabilities within the recovery mission area between 2013 and 2018. As shown in figure 4, jurisdictions directed approximately 79 percent of the $78 million (about $62 million) in the recovery mission area to the infrastructure systems capability, which is intended to, in part, allow jurisdictions to re-establish critical infrastructure in disaster-impacted areas to support life sustainment activities, ongoing emergency response operations, and to help facilitate recovery efforts. Additionally, about 3 percent of the $78 million—about $2.4 million—was directed to disaster housing capabilities, such as implementing housing solutions that effectively support the temporary housing needs of an impacted jurisdiction. State officials from New York and North Carolina, as well as officials from five localities, said they often prioritize and use preparedness grants to maintain existing capabilities within the crosscutting, prevention, and response capabilities, rather than enhancing capabilities where gaps are known to exist, such as those in the recovery and protection areas. In addition, state officials from Texas, as well as officials from two localities told us that they need to use portions of their limited grant funds— especially from Emergency Management Performance Grant funds—to hire and retain local emergency management personnel, which leaves fewer funds for them to devote to enhancing lower-rated emergency management capabilities. For example, some county governments may not have the resources necessary to fund a single emergency manager, which requires them to use Emergency Management Performance Grant funds to hire and retain necessary staff. Another reason why jurisdictions do not use more of the grants toward lower-rated mission areas is because some view certain capabilities in the recovery and mitigation mission areas to be the responsibility of the federal government. Both FEMA and state officials told us that sometimes jurisdictions do not use these grants to strengthen capabilities such as housing because they consider the federal government responsible for filling the gaps. For example, preparedness data from 2013 to 2017 showed the percent of jurisdictions identifying the federal government as responsible for providing housing solutions to disaster survivors increased from 46 to 53 percent. According to state officials from North Carolina, it would not be a prudent use of grant funds for the state to purchase and store temporary housing units that may not be needed inside the borders of the state for several years. Following a major disaster declaration, FEMA coordinates with jurisdictions to provide disaster housing assistance to people displaced from their homes. For example, following Hurricane Florence, FEMA provided financial rental assistance and grants under its Individuals and Households program to help make repairs to damaged homes. In addition, FEMA, in coordination with the state of North Carolina, delivered travel trailers and manufactured housing units (i.e., mobile homes) to displaced disaster victims through FEMA’s Direct Temporary Housing Assistance program. FEMA has encouraged jurisdictions to make investments in core capabilities that have the largest preparedness gaps (i.e., the lowest preparedness scores). From 2013 to 2018, DHS identified investment priorities in its annual announcements of preparedness grant funding opportunities. The priorities focused on select capabilities where jurisdictions had reported lower preparedness scores, such as cybersecurity, disaster housing, economic recovery, natural and cultural resources, and supply chain integrity and security. Specifically, FEMA officials told us cybersecurity remains a high priority for all jurisdictions for 2020 and has identified areas from lessons learned where cybersecurity could be strengthened. Jurisdictions are considering investments in cybersecurity such as adding more information technology equipment and hiring personnel with cybersecurity expertise. However, according to state officials from New York and Texas, jurisdictions often lack the resources necessary to hire and retain personnel skilled enough to prepare for, respond to, and recover from cyberattacks. Preparedness grants, in general, are designed to allow jurisdictions discretion to spend the funds as they see fit on projects that meet eligibility requirements. While FEMA encourages jurisdictions to invest grant funds to address their capability gaps, it does not require or direct jurisdictions to spend grant funding in a certain area. In light of these challenges, FEMA has taken a number of other steps to try to address these capability gaps. FEMA proposed creating a new National Priorities Security Grant in the President’s 2019 and 2020 budget proposals, which could be used to address new and emerging threats and gaps, such as those in cybersecurity. FEMA proposed that the program’s priorities be assessed frequently and shift as needed to address emerging threats and capability gaps. In fiscal years 2019 and 2020, the President’s budget proposed $522 and $430 million respectively. The proposed grant program was not approved by Congress. In 2019, FEMA established the Regional Catastrophic Preparedness Grant Program to help jurisdictions address known capability gaps in disaster housing as well as logistics and supply chain management. In fiscal year 2019, FEMA awarded $10 million in these grants to eight local governments. In 2019, FEMA began implementing the Building Resilient Infrastructure and Communities (BRIC) program to provide jurisdictions with funding to make their infrastructure more resilient in future disasters. According to FEMA, grant recipients could use future funding to strengthen capability gaps in the recovery and mitigation mission areas. FEMA plans to issue a Notice of Funding Opportunity in the summer of 2020, followed by an application period. Based on historical disaster expenditures, FEMA anticipates BRIC will be funded between $300 million and $500 million per year on average. It is too early to assess the extent to which this program will help address capability gaps. While FEMA is taking steps to encourage jurisdictions to enhance their lower-rated capabilities, FEMA officials told us their efforts combined with existing preparedness grants, will likely not be sufficient to fully address jurisdictions’ capability gaps. Specifically, FEMA officials told us that the current suite of preparedness grants lacks the flexibility needed to address some of the long-standing capability gaps, in part, because the grants are required to be spent on capabilities that have a nexus to terrorism. In addition, as described earlier, one state official, and two local officials, suggested that the level of funding for the Emergency Management Performance Grant will likely not allow states and localities to hire and retain local emergency management personnel while also making the investments needed to address the capability gaps identified through the National Preparedness System. For example, one emergency management official from a county explained that without using the Emergency Management Performance Grant to offset his own salary, the county would not have an emergency management department with the capability to complete many of the FEMA requirements associated with receiving disaster assistance. In addition to the steps FEMA has already taken to attempt to address the capability gaps, FEMA has developed a new methodology for assessing national preparedness capabilities that uses more quantitative methods. According to FEMA, such methods could enable jurisdictions to more tangibly define what resources are needed to fill identified gaps. We describe this methodology in more detail below. FEMA has taken steps to enhance its methodology for assessing jurisdictions’ emergency management capabilities by requiring jurisdictions to collect more quantitative preparedness data to support their capability ratings. We reported in March 2011 that FEMA needed to improve its oversight of preparedness grants by establishing a framework with measurable performance objectives for assessing urban area, state, territory, and tribal capabilities to identify gaps and prioritize investments. Specifically, we recommended that FEMA complete a national preparedness assessment of capability gaps at each level of government based on tiered, capability-specific performance objectives to enable prioritization of grant funding. We also reported in March 2013 that FEMA has made some progress in assessing its preparedness capabilities, but continued to face challenges developing a national preparedness system that could assist FEMA in prioritizing preparedness grant funding. FEMA’s issuance of the 2020 National Preparedness Report could provide an assessment of capability gaps at each level of government—including an assessment of the federal government’s capabilities for the first time—and help FEMA address the intent of the 2011 recommendation. However, as discussed before, prioritizing jurisdictions’ preparedness grant funding alone may not effectively address the nation’s emergency management capability gaps. An assessment that also considers the federal government’s emergency management capabilities could help determine what capabilities federal agencies could provide to assist in the wake of disasters when jurisdictions’ capabilities become overwhelmed or are not otherwise available. Once the assessment is completed, FEMA and its federal budgeting stakeholders (i.e., Congress and the Office of Management and Budget) could use such an assessment to identify the potential costs of establishing and maintaining capabilities, not only at the jurisdictional level, but also at the federal level. FEMA has continued to take steps to implement the 2011 recommendation, but has not yet fully addressed it as of January 2020. For example, FEMA published new guidance in May 2018 to update the methodology for how jurisdictions are to evaluate their preparedness levels when completing THIRAs and SPRs. The intent was to allow communities to collect more specific, quantitative data to compare their capability targets to current capabilities, thereby more accurately defining their capability gaps. Beginning in 2018, jurisdictions used the new methodology to assess their capabilities in the crosscutting, response, and recovery mission areas. Beginning in 2019, jurisdictions were required to use the new methodology to assess the capabilities across all five mission areas: prevention, protection, mitigation, response, and recovery. According to FEMA, this new methodology improves on the prior one because the new methodology will allow jurisdictions to more accurately determine what amount of resources are needed to address specific threats and hazards. Specifically, as a result of using more quantitative data, such as the specific number of disaster victims able to be sheltered following a disaster, jurisdictions may be able to better define their capability gaps when compiling their SPRs. For example, if jurisdictions are able to understand that their current capability is less than their needed capability target, they will be able to define their capability gaps in quantitative terms. According to FEMA officials, the new methodology, if implemented successfully, will allow jurisdictions to know what additional resources and capabilities—beyond their own current capabilities—may be needed during future disasters. Table 2 shows an example of how FEMA’s updated methodology provides a more quantitative assessment to more accurately define their capabilities. In 2019, FEMA began working on its first National Threat and Hazard Identification and Risk Assessment (National THIRA) to identify what federal government capabilities will be needed to address the greatest threats to the nation. According to FEMA, the results of this effort are expected to be included in FEMA’s annual National Preparedness Report in 2020, which is expected to be published late in calendar year 2020. FEMA’s effort is intended to provide a quantitative assessment of federal capabilities, which when combined with state, territory, urban area, and tribal THIRAs and SPRs, could provide a more meaningful assessment of the nation’s overall preparedness. Figure 5 below shows how national and jurisdiction risk assessments are intended to work together to provide a collective picture of overall capability gaps. As subsequent iterations of the National THIRA and National SPR are produced, FEMA intends to consolidate them with the THIRA and SPR assessments submitted by jurisdictions to provide a comprehensive overview of national preparedness. FEMA officials told us that they have begun to assess and measure the federal government’s capabilities in the crosscutting, response, and recovery mission areas. In conducting the 2019 National THIRA—that FEMA officials told us will be included in the 2020 National Preparedness Report—FEMA coordinated with over a dozen federal departments and agencies, as well as selected national laboratories and the White House to solicit feedback on the most challenging threats and hazards facing the nation. The 2019 National THIRA consists of nine catastrophic incident scenarios and 22 capability targets across the crosscutting, response, and recovery mission areas. For example, FEMA used catastrophic scenarios, such as a pandemic (see sidebar) or New Madrid Earthquake, to assess the nation’s emergency management capacity. Pandemic Scenario In early October, the Centers for Disease Control and Prevention (CDC) reports a new strain of influenza virus in the National Capital Region. Less than 2 weeks after the first confirmed case is identified at a local hospital, the illness causes hundreds of fatalities and thousands of people seeking medical attention. As the virus spreads, approximately 30 percent of the population across the United States and other countries becomes severely ill. Conventional flu vaccines are ineffective against the current strain, and the CDC estimates that a new vaccine could be months away from mass production. Because of the pandemic, social distancing is in widespread effect. Utilities, police, fire, government, and other essential services are disrupted due to social distancing and employee absenteeism. Businesses close, resulting in a large-scale loss of services across the region (e.g. banking, food stores, gas stations). There is a shortage of medical supplies, equipment, beds, and healthcare workers as hospitals are quickly overwhelmed, with up to millions of individuals seeking outpatient medical care and millions more requiring hospitalization. Civil disorder contributes to the high rate of absenteeism and the overcrowding of hospitals and medical centers. how quickly power service can be restored to customers; how quickly life-sustaining commodities can be delivered to people; how quickly emergency sheltering, food, and water can be provided to how quickly affected healthcare facilities can restore function. In the aftermath of the sequential 2017 disasters, FEMA’s 2017 Hurricane Season FEMA After-Action Report recognized the need to more effectively scale response efforts for concurrent, complex incidents. As a result, in addition to the nine catastrophic scenarios, the National THIRA considered the challenges associated with managing concurrent incidents. To examine the potential impacts of managing concurrent incidents, FEMA developed a set of “plausible concurrent operations.” FEMA acknowledged that the agency and its federal partners “will almost certainly be engaged in ongoing disaster operations at the time of any catastrophic-level incident” and gathered data from historical incidents from recent years, including the sequential disasters that took place in 2017; three large hurricanes and wildfires in California, among others. FEMA found that combining the impacts of a National THIRA scenario with the set of plausible concurrent operations more accurately reflects the challenges the nation would need to address should one of the threat scenarios identified in the National THIRA occur. However, given that FEMA has yet to finalize inclusion of the National THIRA into the 2020 National Preparedness Report, it is too early to determine the extent to which it helps FEMA more accurately define the nation’s emergency management capability gaps and results in the nation being better prepared for future catastrophic disasters. As discussed above, the National Preparedness System has identified gaps in jurisdictions’ emergency management capabilities since 2012. While jurisdictions have used preparedness grants to strengthen select capabilities, preparedness data shows that they have not used the grants to address capability gaps across all the mission areas. Furthermore, while FEMA has encouraged jurisdictions to use grant funding to address capabilities that have the largest capability gaps, such as those in the recovery and cybersecurity areas, they do not require that jurisdictions do this. However, if FEMA were to require jurisdictions to use their grant funds to address lower-rated capabilities, it could affect jurisdictions’ ability to sustain other core capabilities—or to fund emergency management personnel in select jurisdictions, some of which only have one full-time employee. As FEMA implements its new methodology and begins to more fully assess both federal and jurisdictional capabilities, the agency is expected to have better and more quantitative information on capability gaps in order to better prioritize grant funds and resources. According to FEMA, the agency and its partners will better understand the extent of the nation’s emergency management capability gaps when they issue the National Preparedness Report by December 2020. While these actions may allow FEMA to address our 2011 recommendation and better measure the nation’s overall preparedness, the agency has yet to determine what additional actions may be needed to close the remaining gaps once the 2020 National Preparedness Report is issued. Further, while FEMA has taken some steps to close the gaps jurisdictions have identified since 2012, such as proposing the National Priorities Security Grant, this program has not been approved by Congress, and thus, will not help to address the gaps. According to FEMA officials, preparedness grants alone are unlikely to address the gaps in an effective manner. In addition, the National Preparedness Goal states that analyzing current performance against intended capabilities allows the emergency management community the opportunity to determine necessary resource levels, inform resource allocation, and help guide federal investments in preparedness. Such information could help inform budget decisions across the preparedness enterprise and help prioritize limited resources. For example, determining what steps need to be taken, following the issuance of the 2020 National Preparedness Report, could help FEMA inform key decision makers, such as Congress and the Office of Management and Budget, about the necessary level of resources—including the allocation of resources—that are needed to address the nation’s capability gaps. Such an effort could be a significant step toward enhancing the capability gaps that have been identified since 2012 and help determine the nation’s overall preparedness levels, as called for in the Post-Katrina Act. The Post-Katrina Act requires FEMA to analyze real-world events to identify and disseminate lessons learned and best practices, and to generate and disseminate, as appropriate, after-action reports to participants after real-world events. After major disasters occur, FEMA’s policy is to conduct an after-action review that identifies strengths, areas for improvement, and potential best practices identified during response and recovery efforts. Lessons learned from past disasters are to provide collective knowledge and diverse experiences for improving disaster response and recovery. Further, FEMA’s 2018-2022 Strategic Plan calls for sharing lessons learned from disasters and exercises with the whole community to help prioritize investments and anticipate known challenges during future disasters. In July 2018, FEMA published its 2017 Hurricane Season After-Action Report, which discussed findings and recommendations based on a review of the agency’s preparation for, immediate response to, and initial recovery operations for Hurricanes Harvey, Irma, and Maria. According to FEMA, the agency is implementing recommendations to address the challenges outlined in the after-action report, which include the following focus areas: scaling and staffing for concurrent complex incidents; improving logistics capabilities during response; improving response to long-term infrastructure outages; and, improving mass care to initial disaster housing operations based on innovations developed during the 2017 hurricane season. According to FEMA, the agency has taken a number of actions in response to this after-action report. For example, it increased its incident management workforce strength by 19 percent since Hurricane Harvey and updated hurricane plans, annexes, and procedures for the continental United States and for states and territories outside the continental United States, among other things. FEMA’s Continuous Improvement Program is responsible for collecting observations and conducting after-action reviews after disasters. The program is intended to consolidate feedback and information from regional, headquarters, and field operations staff and provide information to FEMA leadership and program offices to improve the efficiency and effectiveness of the agency’s disaster operations. The regional role in the Continuous Improvement Program is to identify lessons learned and best practices from disaster events in their regions, conduct after-action reviews, and track corrective actions and improvement plans applicable to the region through Continuous Improvement Working Groups. FEMA officials told us that after-action report findings that cannot be resolved at the regional level are elevated to headquarters for resolution. According to FEMA officials, FEMA headquarters reviews completed after-action reports to identify any areas for improvement that may need to be addressed through changes in policies and procedures. Although FEMA’s policy requires after-action reviews be conducted after every presidentially-declared major disaster, we found that the agency does not consistently conduct after-action reviews after all major disasters and has not instituted time frames for following up on incomplete after- action reviews. As of January 2020 FEMA had completed after-action reviews for 29 percent of disasters since January 2017, with 43 percent pending or in the process of being completed, and 27 percent having been deferred (i.e., not completed or status unknown), as shown in figure 6. Our review of relevant policy indicates that FEMA does not specify time frames for when after-action reviews are to be completed. This is consistent with what we heard from FEMA officials who explained they do not have any time frames for when a certain region is to complete after- action reviews. FEMA has recently updated its Continuous Improvement Program. For example, in 2019, FEMA updated the Continuous Improvement Directive to formalize an annual Summary of Findings that consolidates the field, regional, and headquarters’ observations from the year’s incidents in order to identify the strengths, best practices, and lessons learned that should be addressed the following year. However, FEMA officials noted that this had only been done once in 2019, and would be completed in future years. Officials from FEMA’s Continuous Improvement Program in one region cited challenges with capacity, staffing, and the number of on-going after- action reviews as reasons for not being able to complete all of their after- action reports. According to FEMA officials, in 2017 each region was assigned one to two continuous improvement advisors who are responsible for developing the region’s after-action reviews. However, FEMA officials in one region said that in 2019, they faced challenges in having the staff resources necessary to operate the Continuous Improvement Program due to competing priorities, such as responding to active disasters. In addition, FEMA officials stated that due to limited staff, the regions have to prioritize which after-action reviews they can complete based on the severity and impact of the disaster. For example, in 2017, FEMA focused resources on reviewing the agency’s response and recovery for Hurricanes Harvey, Irma, and Maria. According to FEMA regional and headquarters officials, competing priorities, such as responding to active disasters, often result in staff being unavailable to conduct after-action reviews. While we acknowledge staffing is limited and that FEMA may need to prioritize completing some after-action reviews over others, FEMA officials have not established a process or framework by which regional offices are to prioritize after-action reviews. Based on our analysis of the after-action reviews since 2017 and discussions with FEMA headquarters and regional staff, we found that FEMA does not have a formal process to prioritize after-action reviews and has not established general time frames for how long following a disaster an after-action review should be completed, or followed-up on. FEMA officials agreed that having a formal process to prioritize after-action reviews, including establishing time frames for following up on incomplete after-action reviews, could provide the agency additional opportunities to improve response and recovery operations for future disasters. According to FEMA Regional officials, timely after-action reviews are useful. For example, as a result of the 2017 Hurricanes Season After-Action Report, Region II was able to update response plans for Puerto Rico, which could prove to be beneficial for future disasters. According to The Standards for Program Management, agencies should collect, measure, and disseminate performance information, analyze program trends, and point to areas in need of adjustment. In addition, leading practices for program management indicate that project schedules should be developed to define project milestones and identify and sequence activities in order to determine start and end dates for each activity. Additionally, in other branches of FEMA, the agency provides time frames for completing after-action reports. For example, states and territories are expected to submit after-action reports within 90 days of exercises that are funded by the Homeland Security Grant Program. . Similarly, FEMA policy requires Urban Search and Rescue teams to submit after-action reports 30 days after returning from deployment. Developing a process by which regional offices are to prioritize after- action reviews could help FEMA ensure that regions have a common framework to work from when determining what disasters should be prioritized for review and could help FEMA prioritize staff resources more effectively across the Continuous Improvement Program. Furthermore, establishing time frames for following up on incomplete after-action reviews could provide FEMA with greater assurance that the reviews will be conducted in a timely fashion, so that other FEMA Regions and key stakeholders can benefit from the lessons learned. As described earlier, FEMA regional offices Continuous Improvement Working Groups are responsible for developing and tracking, to the extent possible, corrective actions and best practices identified through after- action reviews. These working groups are to elevate to FEMA headquarters any issues that cannot be resolved at the regional-level. However, FEMA does not have a formal mechanism at the headquarters level for documenting and tracking best practices, lessons learned, and corrective actions that have been elevated from the regional working groups. According to FEMA, it has taken steps to track best practices and lessons learned through a serious of Microsoft Excel files, but it is not a long term or ideal operating solution due to its lack of accessibility, ease of use, and ability to be queried. In February 2016, we recommended that FEMA implement a process to document, track, and analyze recommendations and implement lessons learned after disaster deployments. FEMA concurred with this recommendation and implemented the recommendation by using the Department of Defense’s Joint Lessons Learned Information System as its primary system to capture and manage lessons learned data. However, according to FEMA officials, as of July 2019, it no longer uses the system to capture lessons learned data. FEMA officials also said the Joint Lessons Learned Information System was not user-friendly. FEMA officials stated that they hold a quarterly meeting, as required by FEMA Directive 107-1, with FEMA’s Associate Administrators to review national priorities and issues that have been elevated to headquarters for resolution. According to FEMA officials, this group performs the function that a Continuous Improvement Working Group does at the regional level by monitoring issues that need adjudication by senior management officials. While the quarterly meeting may be helpful, it does not serve as a mechanism, such as a data system, for documenting and tracking best practices, lessons learned, and corrective actions identified after a major disaster. Additionally, continuous improvement coordinators from the regions we interviewed stated that once a finding is elevated to FEMA’s headquarters, in general the region does not have visibility into what steps, if any, FEMA headquarters is taking or plans to take to address the issue. Having a mechanism, such as a database, to record after-action report findings, such as corrective actions or best practices, could help FEMA facilitate awareness across the agency about the status of FEMA’s efforts to address them. According to the Post-Katrina Act, FEMA should conduct remedial action tracking and long-term trend analysis. Furthermore, the National Response Framework specifies that evaluation and continual process improvement are cornerstones of effective preparedness. The framework notes that effective practices with continuity planning ensures the capabilities contained in the framework can continue to be executed regardless of the threat or hazard. Without a mechanism to document and track best practices, lessons learned, and corrective actions identified through after-action reviews across the regions and headquarters, FEMA may not be able to provide assurance that it is effectively leveraging best practices and lessons learned or taking corrective actions to improve its response and recovery programs. As described earlier, the Post-Katrina Act requires FEMA to generate and disseminate, as appropriate, after-action reports to participants in exercises and real-world events. In addition, FEMA’s stated policy on knowledge sharing after disasters is to collaborate with public and private sector partners to share insights on critical issues facing emergency management, promote best practices, and discuss ways in which FEMA itself can improve. However, based on a query of FEMA’s website for after-action reports on disasters, since January 1, 2017, FEMA has placed on-line one after-action report on the 2017 hurricane season. In addition, state officials from Florida, as well as officials from ten localities told us that there has been no communication from FEMA specifically in regards to its 2017 Hurricane Season After-Action Report to ask jurisdictions to provide feedback on the final product or its findings. In addition to FEMA not communicating with jurisdictions about its final product or its findings, state and local officials we spoke with said that FEMA does not consistently share after-action reports with affected jurisdictions. For example, officials from the state of Florida and four localities told us that FEMA does not consistently share its reports after each disaster, while officials from the state of California stated that FEMA has regularly shared after-action reports from disasters. One FEMA regional official noted that it would be helpful to know who, when, and to what extent lessons learned should be shared with external partners. Further, according to FEMA, knowledge sharing allows communities impacted by disasters to prioritize investments and anticipate known challenges during disasters. According to The Standards for Program Management, agencies should collect, measure, and disseminate performance information and analyze program trends, and point to areas in need of adjustment. FEMA has guidance for sharing after-action reports internally within the agency, but according to FEMA officials has not developed guidance for when after-action reports, or findings from after-action reports, should be shared with external stakeholders. According to some state and local officials we spoke with, having access to disaster after-action reports could be useful to FEMA’s external stakeholders. For example, because FEMA’s 2017 Hurricanes Season After-Action Report was accessible, New York City officials said they were able to be proactive in areas that needed to be strengthened in the event of delayed federal assistance, such as providing disaster housing services. Lessons learned can be produced through after-action reports and are relevant to key stakeholders, such as state and local governments, which are instrumental in disaster preparedness, response, and recovery, and would play a key role in any future disasters. However, without guidance to help officials determine when it is appropriate to share after-action reports, FEMA may miss opportunities to share lessons learned. Further, FEMA’s Strategic Plan states that building a culture of preparedness requires continued learning, improvement, innovative ideas, and engagement of the whole community. As such, all sectors of society, including governments, nonprofit organizations, and the private sector, will need to be involved in preparedness for future disasters. The plan further states that insights can be gained through observations from after- action reports and through feedback from stakeholders. A FEMA official from one of the region’s Continuous Improvement Program agreed that developing guidance to determine when it is appropriate to share after- action reports, could help stakeholders better prepare for future disasters. By developing guidance for sharing after-action reports or their relevant findings—when appropriate—with key external stakeholders, FEMA could help communities better prepare for future disasters through knowledge sharing. FEMA has taken numerous steps to continue to strengthen national preparedness, such as distributing grant funds. However, FEMA has not fully defined the capability gaps and determined what steps are needed to enhance capabilities across all levels of government. Informing key stakeholders, such as the Office of Management and Budget and Congress, about what resources will be necessary to address the gaps— across all levels of government—will be critical in addressing the nation’s emergency management capability gaps. In addition, opportunities exist to enhance FEMA’s after-action review process. More specifically, until FEMA prioritizes when—and for what disasters—after-action reviews should be completed and establishes time frames for following up on incomplete after-action reports, the agency will not be able to guarantee that FEMA and its stakeholders can leverage lessons learned from recent disasters and apply corrective actions before future disasters occur. Further, without a mechanism to document and track best practices, lessons learned, and corrective actions throughout the agency, FEMA may not be able to effectively leverage best practices and lessons learned or implement corrective actions to improve its response and recovery operations. By addressing areas needing improvement (i.e., corrective actions) once after-action reviews are completed, FEMA could improve response and recovery operations in the wake of future disasters. In addition, FEMA could help communities better prepare for future disasters by developing guidance to share its after- action reports or findings from its after-action reports—when appropriate—with key stakeholders, allowing them to provide feedback on the findings or adjust their own operational plans to be better prepared to work with FEMA during future disasters. We are making the following four recommendations to the FEMA Administrator: Following the completion of the 2021 National Preparedness Report, determine what steps are needed to address the nation’s emergency management capability gaps across all levels of government and inform key stakeholders, such as the Office of Management and Budget and Congress, about what level of resources will be necessary to address the known gaps. (Recommendation 1) Develop guidance to help determine which after-action reviews should be prioritized based on factors, such as the severity of disasters and availability of staff and resources to conduct the review, and implement time frames for following up on incomplete after-action reports. (Recommendation 2) Develop a mechanism to consistently track best practices, lessons learned, and corrective actions that have been elevated to headquarters for resolution. (Recommendation 3) Develop guidance on sharing after-action reports and their relevant findings with external stakeholders, when appropriate. (Recommendation 4) We provided a draft of this report to the Department of Homeland Security (DHS) for their review and comment. DHS provided written comments, which are reproduced in appendix I. In its comments, DHS concurred with the four recommendations and described actions under way or planned to address them by March 31, 2022. DHS provided technical comments, which we incorporated as appropriate. DHS concurred with our first recommendation to determine what steps are needed to address the nation's emergency management capability gaps across all levels of government and inform key stakeholders about what level of resources will be necessary to address the known gaps. According to DHS, this recommendation is consistent with the requirements outlined in the Disaster Recovery Reform Act of 2018 (DRRA) noting that FEMA complete a national preparedness assessment of capability gaps at each level based on tiered, capability-specific performance objectives to enable prioritization of grant funding; and identify the potential costs for establishing and maintaining those capabilities at each level and determine what capabilities federal agencies should provide. DHS also stated that while the 2020 National Preparedness Report will include a nation-wide assessment of community capability against national capability targets to help understand gaps and inform grant investments, it will not include data on federal capabilities. The collection of that information, through the National Stakeholder Preparedness Report, was scheduled to begin in 2020 but was delayed due to response operations for the COVID-19 pandemic. According to DHS, this information will be incorporated into the 2021 National Preparedness Report, helping to form a more complete picture of national capabilities. FEMA stated that the costs to address the nation’s resource gaps cannot be estimated without first accounting for existing federal capabilities. According to DHS, the anticipated date for the 2020 National Preparedness Report, pending response operations to the COVID-19 pandemic, is October 30, 2020, and the 2021 National Preparedness Report is planned to be released in October 2021. DHS stated that once the 2021 National Preparedness Report is released, FEMA will develop and socialize a plan to work with the federal interagency to identify resources needed to address the national gaps identified in the 2021 National Preparedness Report. If implemented effectively, these actions combined with the steps taken to inform key stakeholders could meet the intent of our recommendation. Due to the impacts of the COVID-19 pandemic and the need to finalize the 2021 National Preparedness Report prior to being able to account for the federal government’s existing capabilities, we are adjusting the wording of this recommendation to follow the issuance of the 2021 National Preparedness Report. DHS estimates the expected completion date to be March 2022. DHS concurred with our second recommendation to develop guidance to help determine which after-action reviews should be prioritized and implement timeframes for following up on incomplete after-action reports. According to DHS, FEMA will address the prioritization of disaster after- action reports as the Continuous Improvement Program’s first priority for 2020. Additionally, FEMA plans to identify and develop timeframes for following up on after-action reports as part of a broader program evaluation effort in 2020. These actions, if implemented effectively, could meet the intent of our recommendation. While FEMA originally anticipated completing this guidance during 2020, the COVID-19 response extended this timeline. DHS estimates the expected completion date to be March 31, 2021. DHS concurred with our third recommendation to develop a formal mechanism to consistently track best practices, lessons learned, and corrective actions. DHS stated that FEMA, in December 2019, implemented an issue elevation and resolution system for tracking best practices, lessons learned, and corrective actions that are elevated to FEMA headquarters level for resolution, as appropriate. However, according to FEMA in April 2020, the agency has taken steps to track best practices and lessons learned through a serious of Microsoft Excel files, but this is not considered to be a long term or ideal operating solution due to its lack of accessibility, ease of use, and ability to be queried. Further, in April 2020, FEMA stated that it is working to identify resources to build an actual application that will be used for this purpose. These actions, if implemented effectively, could meet the intent of our recommendation. DHS concurred with our fourth recommendation that FEMA develop guidance on sharing after-action reports and their relevant findings with external stakeholders, when appropriate. According to DHS, FEMA is drafting program guidance for the Continuous Improvement Program to address the sharing of after action reports and their relevant findings with external stakeholders. These actions, if implemented effectively, could meet the intent of the recommendation. Due to the ongoing COIVD-19 pandemic, FEMA estimates its completion date to be March 31, 2021. We are sending copies of this report to the Secretary of Homeland Security, the FEMA Administrator, and the appropriate congressional committees. If you or your staff have any questions about this report, please contact me at (404) 679-1875 or curriec@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Key contributors to this report are listed in appendix II. In addition, the report will be available at no charge on the GAO website at http://www.gao.gov. In addition to the contact named above, Aditi Archer (Assistant Director), Robert Denton Herring (Analyst-in-Charge), Erin Guinn-Villareal, James Lawson, Ben Ayres, Eric Hauswirth, Tracey King, Amanda Miller, Kevin Reeves, and Minette Richardson made significant contributions to this report.", "summary": "FEMA uses the National Preparedness System to help assess the nation's emergency management capabilities in preparing for disasters and, in part, to help prioritize federal preparedness grants it provides to state and local jurisdictions. Since 2002, FEMA has provided over $52 billion in such grants intended to enhance preparedness capabilities. GAO was asked to examine national preparedness. This report examines the extent to which: (1) FEMA's National Preparedness System and associated preparedness grants have assisted jurisdictions in preparing for disasters; (2) FEMA has strengthened the National Preparedness System and what steps remain; and (3) FEMA is using after-action reports to identify lessons learned and strengthen future preparedness. GAO evaluated agency guidance, analyzed 2013 to 2017 capability data—the most current available; conducted site visits to five states; and interviewed FEMA, state, and local emergency management officials. The Federal Emergency Management Agency's (FEMA) National Preparedness System and associated grants have helped build some emergency management capabilities, but gaps remain. Capabilities fall in five mission areas: (1) prevention—preventing imminent acts of terrorism, (2) protection—protecting citizens and assets, (3) mitigation—mitigating the loss of life and property, (4) response—responding quickly to save lives, and (5) recovery—timely restoration of infrastructure and housing, among other things. From fiscal years 2013 through 2018, jurisdictions directed almost 90 percent of FEMA preparedness grants ($7.3 of $8.3 billion) to capabilities in the crosscutting (i.e., benefit all five mission areas), response, and prevention areas (figure below). Jurisdictions reported a higher level of preparedness in these areas compared to capabilities in the other mission areas—recovery, mitigation, and protection. Jurisdictions have consistently rated select capabilities in these three mission areas—such as disaster housing and cybersecurity—in the lowest category since 2013. FEMA does not limit jurisdictions' use of preparedness grants for select capabilities, but it has encouraged jurisdictions to address the known gaps. FEMA is taking steps to strengthen the national preparedness system, but has yet to determine what steps are needed to address the nation's capability gaps across all levels of government. Specifically, FEMA is implementing a new methodology to collect more quantitative data on capabilities at the state, territory, and local levels—as GAO recommended in 2011—and also plans to begin assessing the federal government's capabilities. Including the federal government in such an assessment would enable FEMA and jurisdictions to assess national preparedness capabilities collectively. While these are positive steps that could meet the intent of the 2011 recommendation, FEMA has yet to determine what steps are needed to address the capability gaps once they are identified, including jurisdictions' capability gaps that have been known since 2012. By determining these steps and informing key stakeholders, such as Congress, about what resources will be needed across all levels of government, FEMA will be better positioned to address the nation's capability gaps. FEMA after-action reports have identified areas for improvement and lessons learned following disasters, but has completed after-action reviews for only 29 percent of disasters from 2017 through 2019. FEMA lacks a formal mechanism to track corrective actions and does not have guidance on sharing after-action reports with key external stakeholders, as appropriate. GAO is making four recommendations that FEMA (1) determine what steps are needed to address emergency management capability gaps, and communicate it to key stakeholders (2) prioritize completion of after-action reviews, 3) track corrective actions, and (4) develop guidance on sharing findings externally. The Department of Homeland Security concurred and FEMA is taking actions in response.", "document_type": "gao"}
{"report": "DOE has issued PILT orders and policies to articulate DOE’s procedures for carrying out the PILT provision of the Atomic Energy Act. DOE has changed its PILT procedures over time, which is reflected in multiple PILT orders and policies. These changes modified eligibility requirements for PILT, as well as how PILT payments were to be calculated. In 1958, a predecessor agency to DOE issued the first order on PILT. Under the order, payments were to be based on the property value when the land was acquired and the tax rate of the year for which the payment was made; however, it allowed for exceptions to this rule. The 1958 order also allowed DOE to pay sites retroactively for years prior to their initial PILT application. In 1987, DOE issued a new PILT order with changes to address budget constraints. The new order introduced more stringent requirements for new PILT applicants; prior PILT recipients were not subject to the new restrictions. The 1987 order included an eligibility requirement called a “gross benefits test.” Under this requirement, payments were only allowed if the tax loss that was incurred exceeded the total value of all benefits derived from DOE’s activities in the community. The 1987 order also included a provision that required payments to be reduced by the amount of tax benefits a community received from DOE’s activities and eliminated retroactive payments to communities for the years prior to their application for PILT. In 1993, DOE revised its policy in response to concerns about inequities arising from the application of the 1987 order. Specifically, the 1993 policy eliminated the gross benefits test and modified the provision that required payments to be reduced to account for tax benefits from DOE activities. In addition, it allowed payments to all communities to be based on the current tax rates and value of the property in the condition in which it was acquired. In 2003, DOE issued its most recent PILT order. This order updated responsibilities outlined in the 1993 policy and shifted some details to a separate policy document. It also eliminated a detail of the 1993 policy regarding special burdens payments. In order for a community to be eligible for PILT payments, it must submit to DOE an initial PILT application. DOE uses the one-time initial application to establish the eligibility of land at a certain community. Officials from the relevant DOE site and program offices, along with officials from DOE’s Office of the Chief Financial Officer (CFO), Office of Management, and General Counsel at DOE headquarters, evaluate the application based on several criteria, such as: (1) the property must have been subject to taxation by local or state authorities immediately prior to being acquired by the federal government, (2) payments must not be retroactive, (3) payments should not be in excess of the taxes that would have been collected if the property had remained on the local tax rolls in the condition in which it was acquired, and (4) property values will be based on the highest and best use of the property based on the classification of the property when it was acquired. The CFO makes the final determination of whether to approve or reject the application. Once an application is approved, DOE and the community enter into an intergovernmental assistance agreement, which emphasizes that payments are subject to the availability of funds and to legislative or administrative reductions and states that PILT is not an entitlement to the community. After establishing eligibility through the application process, each community submits to DOE an annual PILT invoice reflecting its requested PILT amount. These annual PILT invoices specify how much a community estimates its PILT payments should be based on the community’s calculations for a specific tax year. DOE site offices—offices at various DOE sites across the United States that report to DOE program offices— review each PILT invoice and determine whether enough funding is available to pay the amount requested in the PILT invoice. If a community’s PILT invoice reflects a reclassification of the property to a new tax classification or category, a change in the amount of eligible land, or another significant change in the method of calculating the requested PILT payment by the community, the community must submit a new PILT application. PILT processes involve multiple organizations, including several parts of DOE as well as local governments (see fig. 1). DOE headquarters— including the CFO, Office of Management, and General Counsel, and program offices—is responsible for reviewing and approving initial or revised PILT applications. The CFO and program offices are responsible for ensuring that funding needed for PILT payments is included in budget requests. As of fiscal year 2019, the program offices involved with PILT include: the Office of Environmental Management, which has the mission to clean up sites contaminated by nuclear weapons development and nuclear energy research; the National Nuclear Security Administration, which is responsible for maintaining and enhancing the safety, reliability, and performance of the U.S. nuclear weapons stockpile; the Office of Science, which manages national laboratories and supports research of physics, materials science, and chemistry; the Office of Nuclear Energy, which focuses on research, development, and demonstration of nuclear reactors; and the Office of Legacy Management, which is responsible for providing long-term surveillance and maintenance of DOE sites that have closed. Under the current PILT order, DOE site offices are responsible for providing recommendations for any initial and revised PILT applications and for administering payments. These DOE site offices operate in their PILT recipient communities. DOE site offices are overseen by DOE program offices. For example, cleanup activities related to nuclear weapons production at the Hanford and Savannah River sites are overseen by the Office of Environmental Management, while the Argonne and Brookhaven National Laboratories are overseen by the Office of Science. The site of the now closed Fernald Plant is overseen by the Office of Legacy Management. At some sites, multiple communities at the site receive PILT payments. For example, three communities at the Oak Ridge site receive PILT payments: the City of Oak Ridge, Anderson County, and Roane County. Property taxes in the United States are levied by a number of different taxing authorities, including state and local governments, but mostly by local governments. Local governments, such as counties, can levy and collect taxes on behalf of smaller jurisdictions within their boundaries. Broadly speaking, property taxes are based on the assessed value of the property times the tax rate. Assessed value. The assessed value of the property is generally a function of the market value and the assessment ratio. The market value depends on the characteristics of the property and can vary across locations as a result of local conditions, including the supply and demand for the type of property. The assessment ratio is a percentage modifier applied in certain circumstances to alter the market value of the property. Some states and counties apply a lower assessment ratio to certain classifications of property, such as agricultural property. Tax rate. The tax rate is a figure—typically in the form of a percentage—that is applied to the assessed value of the property to determine the total property tax amount. Tax rates vary across locations, depending on local and state tax laws and policies. In addition, for a given property tax bill, local governments may apply a wide variety of tax rates, with different rates applied for different government-supported functions, such as education, emergency services, and roads. The classification of the property can thus influence the tax rates. PILT payments vary considerably across DOE sites, with the communities at two sites with the most eligible land receiving the majority of payments. Total PILT payments made to communities at the 12 DOE sites that receive PILT payments have increased from approximately $9.5 million in 1994 to approximately $23 million in 2017 in fiscal year 2017 dollars. Payments to communities at the Hanford and Savannah River sites account for the majority of that growth. According to DOE, communities at the majority of DOE sites do not receive PILT payments because they are ineligible for PILT or have not applied to receive payments. Specifically, of the 74 DOE sites, communities at 44 sites are ineligible for PILT. Of the 30 sites where communities are eligible or potentially eligible, 18 have communities that have not applied for PILT or currently do not receive PILT, while communities at 12 sites currently or recently received PILT as of 2017, according to DOE documents. Of the over 2 million acres covered by DOE sites, approximately 70 percent—approximately 1.5-million acres—is ineligible for PILT, according to documents provided by DOE. According to DOE, communities at most of the 44 ineligible sites are not eligible under the provisions of the Atomic Energy Act because they are on property that either: was not on local tax rolls prior to acquisition, is private land, is land controlled by another federal agency, or is university-owned. Some examples of property that is ineligible include: the Waste Isolation Pilot Plant, New Mexico, which is situated on federal land and thus not subject to prior state or local taxation; Hazelwood Interim Storage Site, Missouri, which is on land DOE leases from a private owner; Sandia Lab, Kauai, Hawaii, which is on land controlled by another federal agency; and the Radiobiological Laboratory of Utah, Utah, which is on university-owned land. In addition, in some cases, sites include a mix of eligible and ineligible acreage. Of the approximately 680,000 acres of property at the 30 sites that are eligible or potentially eligible for PILT, about 25 percent is located at the 18 sites where the communities did not receive PILT payments, according to fiscal year 2017 data provided by DOE. Examples of those sites with eligible property that have not received payments include the Weldon Spring Quarry in St. Charles County, Missouri, and the Atlas Complex in Clark County, Nevada. DOE headquarters officials that we spoke with stated that they are unsure why some communities with eligible property have not applied for PILT. Of the property that is eligible for PILT, approximately 75 percent is located at the 12 sites where the community has applied for and receives PILT payments. These sites began receiving payments at least as early as the 1950s and as late as 2012. Some sites are located in communities that previously, but no longer, receive PILT payments. For example, the community at the Mound Site, which is under the Office of Legacy Management, received its last payment in 2006. Figure 2 shows PILT eligibility and receipt by site and by acreage. In fiscal year 2017, communities at 12 DOE sites received or had pending PILT payments. These sites are located in 10 states. The sites vary in size and the amount of land at the site that is eligible under DOE’s PILT order. The two largest sites in terms of eligible acreage—Hanford and Savannah River—are the only sites that have more than 100,000 PILT- eligible acres, at nearly 180,000 and 200,000 respectively. Although the Idaho site includes about 570,000 acres, according to DOE officials, only 5 percent of those are eligible for PILT because they were previously on local tax rolls when DOE acquired the land, while the rest of the land was not on the tax rolls. Five sites—Brookhaven National Laboratory, Argonne National Laboratory, the Fernald Plant, Los Alamos National Laboratory, and Bettis Atomic Power Laboratory—have total PILT-eligible acreage of less than 2,000 acres, with the smallest, Bettis Atomic Power Laboratory, having around 200 PILT-eligible acres. Figure 3, below, shows the name, location, and PILT-associated acreage of DOE sites where local communities received PILT payments in 2017 or had pending PILT payments. Payments to communities at the 11 DOE sites that received PILT payments in fiscal year 2017 varied considerably, from less than $65,000 to more than $9 million, totaling over $23 million. Communities at the Hanford and Savannah River sites, representing over 75 percent of all PILT-eligible acreage, received approximately 70 percent of total PILT payments—approximately $9.7 million and $6.5 million, respectively. Of the communities at the remaining 9 sites, communities at 2 received more than $1 million, and communities at 2 received less than $100,000. Figure 4 shows payment amounts for the communities at the 11 sites that received payments in fiscal year 2017. See appendix III for detailed information on PILT payments from 1994 to 2017. Growth in PILT payments since 1994 is primarily a result of increases in payments to communities at two sites—Hanford and Savannah River—in addition to new PILT recipient communities at DOE sites. Since 1994, total annual PILT payments have grown from $8,582,446 to $23,170,049 in fiscal year 2017 constant dollars, as figure 5 shows. Since 1994, increases in payments to the communities at the Hanford and Savannah River sites are responsible for the nearly 60 percent of remaining total growth in PILT payments. PILT payments have increased from a total of over $19 million in 2012 to over $23 million by 2017 in real terms. Nearly all of that growth in total payments during that time is a result of higher payments to communities at the Hanford site, which community and DOE site officials attributed to increases in local land value resulting from the growth in agriculture in the region. PILT payments to the three communities at the Hanford site increased by 43 percent, or nearly $3 million, in that time frame. Communities at the Hanford site were not the only ones to experience a large payment growth rate. PILT payments to communities at two other sites, Pantex and Idaho National Laboratory, increased by approximately 90 percent and 55 percent respectively over the same time period; however, this growth was approximately $100,000 and $85,000 respectively for those communities and therefore did not account for much of the overall growth in PILT payments. The majority of communities that currently receive PILT payments began receiving them beginning in or after 1994. DOE’s 1993 policy eliminated the gross benefits test and modified a provision that required payments to be reduced by the amount of tax benefits a community received from DOE’s activities. These changes allowed for additional sites to enter into PILT agreements with DOE and allowed other sites to obtain higher payment amounts. Since 1994, communities at seven additional sites were approved for and have begun receiving PILT payments. The addition of these new PILT recipient communities after the 1993 policy change, primarily Brookhaven National Laboratory, is responsible for approximately 15 percent of the growth of total annual payments. Variations in PILT payments across sites are largely due to differences among the sites, including the different histories and market conditions at each site. However, the PILT order’s lack of requirements about PILT documentation, review of PILT invoices, and payment determinations has limited DOE’s ability to provide adequate assurance that payments fully reflect the terms of their original agreements and consistently meet PILT goals. The goal of PILT, as stated in the Atomic Energy Act and reflected in DOE’s order implementing the act, is to render financial assistance to communities, while generally not making payments in excess of the taxes that would have been payable for the property in the condition in which it was acquired. DOE officials stated that an additional PILT goal is to compensate communities for the revenues they would have received under those conditions. Although the order does not require payments to reflect the revenues communities would have received, it states that, on a case-by-case basis, PILT payments will be based on the same assessment values and tax rates that the communities apply to comparable properties with the same use and/or tax classification. Since these values and rates differ between sites, payments may also differ under the order. Consistent with DOE’s PILT order, PILT payments to communities vary given the characteristics of the property, market conditions, and tax policies applied at each site, in order to reflect the revenue the communities would have received had the property remained on their tax rolls. DOE generally bases PILT payments on the recipient communities’ estimates of the property taxes they would have received. The communities calculate their estimated payments and then communicate their requested payment amounts in annual invoices to DOE. DOE does not prescribe the use of a particular formula by communities seeking payments. However, DOE officials noted that communities usually base the calculations they use to develop their annual PILT invoices on property taxes and that they generally calculate these using a relatively standard formula. Key information in this calculation includes the amount of land, its estimated value, assessment ratio, and the property tax rate (see figure 6). Differences in PILT payments to different sites are generally not a function of variations in the payment formula, but rather of variations among the inputs into the formula, although DOE has sometimes altered payments in other ways. Based on our analysis of PILT payments in fiscal year 2017, we found that values of property, assessment ratios, and property tax rates vary across DOE sites and communities. The assessed value of the property is partially determined by characteristics, or history, of the property and market conditions. State and local tax policies may determine both the assessment ratio and the property tax rate. Characteristics of the property. The amount of PILT eligible property and its classification are factors that partially determine payment amounts. DOE provides the highest payments to communities at sites with the greatest amount of eligible acreage—the Hanford, Savannah River, and Oak Ridge sites. Similarly, lower acreage at some sites usually results in lower payments. For example, Los Alamos National Laboratory and the Fernald Plant are among the smallest sites and payments to these communities are among the smallest. In addition, the land use classification of the property, such as whether it was used for agricultural or commercial purposes when it was acquired, influences its value. Some classifications of land tend to have higher market values than others; for example, commercial land generally has a higher value than agricultural land. The land at the Bettis Atomic Power Laboratory site, located in western Pennsylvania, is classified as commercial property and was valued in 2017 for PILT purposes at an average of $64,476 per acre. As a result, although Bettis Atomic Power Laboratory has among the smallest acreage of any site—at approximately 200 acres—its payments are the fifth highest. In contrast, the land at the Pantex site, located in the Texas Panhandle, is classified as agricultural and homestead property and was valued in 2017 for PILT purposes at an average of $976 per acre. Market conditions. The market value of property varies across PILT sites as a result of local market conditions. Greater demand for land contributes to higher per-acre values than when there is less demand for land. This contributes to variations among land values, even within a given classification, for the communities’ annual PILT invoices to DOE. For example, irrigable agricultural land at Benton County—one of the communities that hosts the Hanford site—was valued at about $6,500 per acre in 2017, which DOE and county officials attributed primarily to high demand for agricultural property in Washington State’s Columbia Valley River Basin. In contrast, Carson County— which hosts the Pantex Plant and is in a region with lower farm real estate values and is not near a major city—valued its land at $976 per acre in 2017, as previously noted. State and local tax policies. Some states and counties reduce assessment ratios for certain types of property, such as agricultural property. For example, the assessed value of the property is reduced to a fraction of its market value. Some communities have reflected these assessment ratios in their calculations for their annual PILT invoices to DOE. Because assessment ratios can vary widely across locations—from 6 percent to 100 percent among communities that received PILT payments in fiscal year 2017—they can create large variations in PILT payments. For example, the communities at the Oak Ridge site assess agricultural property at 25 percent of the full market value, which they reflect in their annual PILT invoices to DOE. On the other hand, the Town of Brookhaven, which hosts Brookhaven National Laboratory, applied a 90 percent assessment ratio to its PILT-eligible property, which is categorized as residential. In addition, tax rates vary across communities. For example, in fiscal year 2017, the City of Oak Ridge applied a 2.5 percent tax rate to determine its payments; whereas, Carson County applied a 0.6 percent tax rate. DOE’s PILT order requires DOE to deduct from PILT payments an amount equal to any payments by the federal government that will be used by the community for the same, identifiable, discrete purpose. In practice, when communities calculate their annual PILT requests, they subtract this amount from their total payment requests. According to DOE and some community officials, communities have made these deductions to offset payments they received through the Department of Education’s Impact Aid program. DOE’s PILT order calls for communities to document key determinants of PILT payments in PILT applications, but it does not include requirements or procedures for DOE or communities to document key determinants of PILT payments after the initial PILT application. In addition, although the order lists evaluation criteria on which PILT payments should be based, it does not establish a process or requirements for DOE offices to review PILT invoices to ensure payments are consistent with those criteria. The order also does not require regular, independent—such as headquarters- level—involvement in such a review process. Lastly, the PILT order lacks specificity on how payments should be determined in certain scenarios. The PILT order’s lack of sufficient internal controls may have contributed to some cases in which payments may not reflect PILT goals. DOE’s PILT order lists application and evaluation criteria that it says will serve as the basis of PILT payments. Those criteria include factors, which we refer to as “key determinants,” such as: description of the property; tax rates and assessment values for comparable property; use and zoning classification of the property; and payments from the federal government that will be used for the same identifiable, discrete purpose. These key determinants are fundamental to determining how much revenue a community would have received if the property had remained on its tax rolls and to ensure that the communities’ PILT payments are not higher than that amount. The order calls for these key determinants to be documented in PILT applications. However, DOE’s PILT order does not require communities or DOE to document such key determinants of PILT payments at any later stage. Specifically, the order does not require DOE or communities to include this information in PILT intergovernmental agreements, which are agreements between DOE and each community and serve as a basis for obligating funding under PILT. The order also does not require communities to include such information in their annual PILT invoices that they submit to request PILT payments. GAO, Standards for Internal Control in the Federal Government, GAO-14-704G (Washington, D.C.: September 2014). key determinants of PILT payments for each community, DOE does not have adequate assurance that its payments are consistent with the agreed upon bases of PILT payments, and DOE is more likely to make payments that do not meet PILT goals. DOE’s PILT order states that “DOE plans to evaluate applications for PILT, and to calculate” PILT payments using specific guidelines based on key determinants, such as the description of the property, tax rates and assessment values for comparable property, use and zoning classification of the property, and deductions equivalent to certain federal payments; however, it does not call for a review process to determine whether calculations used for PILT invoices follow those guidelines. DOE’s PILT order calls for site, program office, and headquarters review of original and revised PILT applications. However, most original applications were developed decades ago and revised PILT applications are only required if the community would like to reclassify property, change the amount of property, or make other significant changes. DOE’s PILT order does not require independent, headquarters-level review at any later stage. The PILT order states that site offices will manage the administration of PILT payments. However, it does not specifically call for DOE organizations to review communities’ annual PILT invoices to determine whether PILT invoices follow payment calculation guidelines and do not exceed the amount communities would have received had the property remained on the tax rolls. DOE headquarters officials said that headquarters officials do not review annual PILT invoices. Some DOE CFO officials and officials at some sites stated that DOE sites treat the annual payments as bills to be paid, without applying much scrutiny. To the extent that PILT invoices are reviewed, they are reviewed at the site level by officials who may live in the same communities that receive PILT payments. DOE CFO officials stated that site offices are more knowledgeable of local tax authorities and local conditions than DOE headquarters and that they have expertise—in the form of local realty, legal, budget, and supervisory staff—that DOE headquarters staff rely on for the execution of PILT payments. Nevertheless, there may be an appearance of bias if the only review of PILT invoices is conducted at the site level by individuals who may benefit indirectly from payments to their communities. Because DOE’s PILT order lacks a requirement for review and validation of annual PILT invoices, DOE is not well positioned to determine whether communities’ payment requests in PILT invoices are consistent with DOE goals. Under federal standards for internal control, management should design control activities to achieve objectives and respond to risks, such as by comparing actual performance to planned or expected performance and analyzing significant differences. By requiring site office and headquarters review of key payment determinants in PILT invoices, DOE may realize benefits, including the ability to (1) evaluate whether PILT invoices are consistent with agreed-upon bases of PILT payments and PILT goals, and (2) ensure greater independence in the review process to avoid the appearance of bias on the part of site officials, who may live in the communities receiving PILT payments and may indirectly benefit from the payments. Without requirements for DOE site offices to review key PILT payment determinants in communities’ invoices for accuracy and consistency with the agreed-upon bases of PILT payments and PILT goals and for headquarters-level review and validation of annual PILT invoices, DOE is more likely to have payments that do not meet PILT goals. DOE’s PILT order lacks specificity about how it will determine PILT payment amounts in some scenarios. The PILT order includes information about some key determinants of PILT payments, such as tax rates, assessment values, and property classification, but the order does not provide guidance on other factors that may affect PILT payments, such as tax relief programs. In addition, the order states that the property value will exclude the value of improvements made after the federal government acquired the real property, but it does not state whether property values should include the value of resources such as timber. Last, the order states that payments will be reduced by an amount equal to any payments to the state or local jurisdiction for the same identifiable, discrete purpose. However, the order does not define the phrase “same identifiable, discrete purpose.” Under federal standards for internal control, management should design control activities to achieve objectives and respond to risks, such as by documenting internal control in management directives, administrative policies, or operating manuals. While DOE has documented some key determinants of PILT payments in its order, it does not clearly document how DOE should address tax relief programs in payment determinations. Without additional guidance in the PILT order on how communities should calculate payment requests for their PILT invoices, DOE is more likely to make payments that do not meet PILT goals, as is described in the following section. DOE does not have adequate assurance that payments are meeting PILT goals. This limited assurance that payments meet PILT goals may be in part a result of deficiencies in DOE’s internal controls for PILT. Based on our reviews of PILT documentation and interviews with DOE officials, we identified cases in which payments did not appear to meet the stated PILT goal of compensating communities for the revenue they would have received if the property had remained on the tax rolls. Specifically, we identified five examples of payments potentially not meeting goals as a result of issues with: property classification, determination of land value, application of state tax adjustments, payment deductions, and payment adjustments. Property classification. We identified a case in which payments appear to be higher than the amount communities would have received had the property remained on the tax rolls in the condition in which it was acquired. In the case of Benton County, the property classification that forms the basis of its requested PILT payments does not appear to be based on the classification of the property when it was acquired. Benton County’s original PILT agreement from 1996 shows that, when acquired, Hanford property in the county was classified as 11 percent farmland and 88 percent rangeland. However, the agreement also states that, considering uses of the land at the time of the agreement, 72 percent of the land would be treated for the purpose of PILT as farmland in the category of “irrigable land” and only 27 percent as rangeland. In 2017, irrigable land in Benton County was valued at $6,495 per acre whereas rangeland was valued at $410 per acre—higher percentages of irrigable land compared to rangeland therefore result in higher payments. Using these land classifications is inconsistent with the PILT goal that payments will not exceed the taxes that would have been payable for the property in the condition in which it was acquired. DOE headquarters officials we spoke with were not aware of this discrepancy in Benton County’s property classification. In addition, DOE did not have documentation to explain DOE’s decision, but an Office of the General Counsel official noted that DOE agreed to these terms as part of a settlement agreement at a time when a number of issues, beyond just PILT issues, were in dispute between Benton County and DOE. Because of this inconsistency in land classifications, it appears that Benton County’s payments may not have reflected the revenues the county would have received had the property remained on the tax rolls in the condition in which it was acquired. Had DOE maintained more thorough documentation and had there been independent review of PILT invoices, these higher payments might have been avoided. Determination of land value. We identified one case in which payments were not clearly linked to the revenue communities would have received if the property had remained on the tax rolls. Specifically, DOE negotiated with Savannah River Site counties to apply a dollar amount per acre that is not directly tied to assessed property values. DOE and the counties originally negotiated values in 1988 of $1,000 per acre for Aiken and Barnwell and $426 for Allendale counties. Those amounts remained flat until 2007, when DOE agreed to adjust them with a “time value of money” factor to $1,641 and $712 respectively. According to county officials, the counties and DOE agreed to use a negotiated rate rather than a rate based on current assessment values partly because of the difficulty of conducting appraisals because of the large amount of land, lack of comparable properties, and the high expense of an appraisal. Because of this reliance on a negotiated, rather than assessed value, it is unclear whether these payments reflect the revenues the counties would have received had the property remained on the tax rolls in the condition in which it was acquired. Had DOE required independent review of key determinants of PILT payments, this deviation from using assessed values might have been avoided. Application of tax relief programs. We identified a third case in which payments may have been higher than the revenue communities would have received if the property had remained on the tax rolls. With regard to the Hanford Site, the Open Space Taxation Act of Washington State is a tax relief program that community officials said allows assessment ratios of about 40 percent to be applied for land that is being used for agriculture or as rangeland. In the past, none of the three counties that receive PILT at the Hanford site applied special assessment ratios under this tax relief program in calculating PILT payments. Hanford site officials informed us that they were aware of this tax law and requested that the three counties at the Hanford site apply it. The DOE officials explained that the counties refused because DOE was not using those lands for agriculture or rangeland. The officials stated that the counties at Hanford decided that DOE did not meet the purpose and the terms of the program. However, if the land had remained on the tax rolls in the condition in which it was acquired, it could also be assumed that it might have been farmed or used as rangeland, in which case the counties may have applied the special assessment ratios. Although DOE’s order does not state whether PILT payments should take into account such tax relief programs, failure to take such programs into account may have resulted in DOE paying the counties at Hanford more than they would have received had the property remained on the tax rolls in the condition in which it was acquired, contrary to the order. If DOE’s PILT order had included more specificity about how tax relief programs should be addressed, DOE might have had greater assurance that these payments were not higher than the revenue the communities would have received had the property remained on the tax rolls in the condition in which it was acquired. Payment deductions. We identified a case in which it was unclear whether payments aligned with PILT goals. DOE has provided non- PILT funding to Los Alamos public schools and the Los Alamos fire department. According to DOE officials, DOE has annually provided $8 million to the county’s schools; DOE provided over $20 million for the county’s fiscal year 2020 firefighting services. DOE also provides PILT funding to Los Alamos County, which was $244,183 in fiscal year 2017. About a decade ago, DOE considered whether it should stop making PILT payments to Los Alamos County because of its other support for the community and the provision in the PILT order requiring deductions from PILT for other payments by the federal government that will be used for the same identifiable, discrete purpose. However, DOE has decided to continue paying Los Alamos County PILT. The county’s position is that the schools are a separate entity from the county government and that its payments should not be reduced to account for amounts received directly by the schools, but in 2017 the county nonetheless reduced its PILT request by the amount it would have provided to Los Alamos schools. It is unclear how the PILT order should be applied in situations like this where payments, including PILT payments, are made to multiple entities. Making continued payments in such a situation, however, may exacerbate perceptions of inequities across sites. If DOE’s PILT order had included more specificity about the reduction of payments to account for other federal payments for the same identifiable, discrete purpose, DOE might have had greater assurance that these payments meet PILT goals. Payment adjustments. We identified a case in which the PILT order’s lack of specificity led to uncertainty for PILT payment recipients when DOE’s payments did not align with the communities’ calculations of what the communities determined they would have received if the property had remained on the tax rolls. When the PILT invoices from the three counties at the Hanford Site increased by about 73 percent in real terms from a total of about $6 million in 2010 to about $10.7 million in 2017, DOE began providing payments that were lower than what the counties requested in their PILT invoices. Specifically, in 2017, DOE provided 91 percent of what the counties requested, and in 2018 DOE provided 65 percent of what they requested, which DOE officials said was because payment requests exceeded the amounts set aside for PILT purposes. DOE did not cite problems in the counties’ PILT invoices or document problems with the counties’ PILT invoices. Payment adjustments are allowable under the PILT order—both the Atomic Energy Act and DOE’s PILT order give DOE discretion as to payment amounts. However, because the order also lists key determinants for PILT payments that are based on the taxes communities would have received had they remained on the tax rolls and because DOE has typically provided what communities have requested, communities we spoke with said they began to rely on PILT in their budget formulations. The communities had developed their budgets based on the assumption that payments would align with the amounts they determined they would have received had their property remained on the tax rolls, but it is now difficult for them to plan ahead with the new uncertainty. In response to this uncertainty in the payment amount, in 2019, one of the counties at Hanford—Benton County—provided DOE with a PILT invoice that was about $5 million lower than the previous year. According to the county officials we spoke with, the goal of providing a lower PILT payment invoice was to increase the likelihood that they would receive the full amount. DOE’s order does not include any information about under what conditions DOE will adjust payments— such as if payments calculations are not consistent with PILT payment determinants—to guide DOE’s oversight. The order also does not require DOE to document or communicate such information ahead of time. Had DOE’s PILT order included more specificity on these topics, communities might have had more clarity regarding whether their payment calculations were consistent with PILT goals and whether they were likely to receive the amounts they requested. PILT payments help replace tax revenue that communities are no longer receiving because of DOE’s acquisition of property in their communities. Our past work reported that DOE allowed different standards for PILT invoices at different sites, depending on when the community applied for PILT payments, raising concerns about inequitable treatment of communities. In 1993, DOE updated its PILT order to address one of these concerns by eliminating the gross benefits test that had been applied to new communities. However, some concerns remained. DOE intentionally allows payments to communities to vary across locations because property characteristics, market conditions, and tax policies differ; this variance enables payments to reflect the taxes the communities would have received if the property had remained on local tax rolls. However, DOE’s PILT order lacks: (1) requirements for documenting key determinants of PILT payments in intergovernmental agreements and invoices, (2) requirements for independent review of PILT invoices for consistency with agreed-upon bases of payments, and (3) specificity about payment determinations in certain scenarios. This has resulted in a relatively hands-off approach to management and oversight of communities’ annual PILT invoices as well as some uncertainty about how to determine PILT payments. This is inconsistent with federal internal-control standards and has limited DOE’s ability to provide adequate assurance that DOE is meeting PILT goals. Until DOE strengthens its internal-control activities, communities may continue to perceive that there are inequities in PILT, and DOE will not be able to provide adequate assurance that it is meeting PILT goals. We are making the following three recommendations to DOE: The Secretary of Energy should direct DOE’s Office of the Chief Financial Officer to revise DOE’s PILT order to require DOE to maintain documentation of key determinants of PILT payments for each community to help ensure that payments are consistent with the agreed-upon bases of PILT payments and PILT goals. (Recommendation 1) The Secretary of Energy should direct DOE’s Office of the Chief Financial Officer to revise DOE’s PILT order to require DOE site offices to review key determinants of PILT payments in communities’ PILT invoices for accuracy and consistency with the agreed-upon bases of PILT payments and PILT goals and for DOE headquarters to document its review and validation of site office determinations. (Recommendation 2) The Secretary of Energy should direct DOE’s Office of the Chief Financial Officer to revise DOE’s PILT order to provide additional guidance on how communities should calculate their payment requests for their PILT invoices. (Recommendation 3) We provided a draft of this product to DOE for review and comment. In its comments, reproduced in appendix IV, DOE neither agreed nor disagreed with our recommendations but did describe actions that it intends to take in response to our recommendations. DOE stated that it will undertake a comprehensive assessment of the PILT program, its objectives, and the manner in which DOE accomplishes PILT’s objectives. DOE also stated that it will convene a working group to identify high-level options for PILT and recommend appropriate changes, if necessary, to DOE leadership. Although further analysis of PILT could be worthwhile, we believe our review sufficiently demonstrated that DOE’s PILT order lacks sufficient internal controls. As a result, we continue to believe that implementing our recommendations for revising the PILT order could provide better assurance that payments meet PILT goals. DOE also provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate congressional committees, the Secretary of Energy, and other interested parties. In addition, this report will be available at no charge on the GAO website at http://www.gao.gov. If you or your staff members have questions about this report, please contact David C. Trimble at (202) 512-3841 or trimbled@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix V. The objectives of our review were to assess: (1) how, if at all, PILT payments vary across sites and how they have varied over time, and (2) reasons for variations in payments and the extent to which the Department of Energy (DOE) is providing assurance that payments meet PILT goals. To assess how, if at all, PILT payments vary across sites and how they have changed over time, we obtained and analyzed documentation from DOE regarding total number of DOE sites, their eligibility for PILT, and reasons for lack of eligibility, when applicable. We analyzed DOE documentation of eligible acreage at sites that are affiliated with communities that receive PILT payments and compared this with acreage of DOE property that is not eligible for PILT. Idaho National Laboratory, Idaho: Bingham County, Butte County, Clark County, Jefferson County Office of Legacy Management: Fernald Plant, Ohio: Hamilton County We took several steps to assess the reliability of PILT payment data. We collected data in two phases. The first used PILT datasets that DOE had collected prior to our review. These covered years 1989–2009 and 2012– 2017. We used those data to develop a preliminary understanding of how PILT payments varied across sites and over time. We asked DOE to collect a second, complete, data set for the purpose of our review. That data set covered years 1994-2017. Using these data, we identified possible outliers and missing data and interviewed relevant agency officials at the headquarters, field office, and site office level to determine the extent to which the data were reliable. In addition, we interviewed relevant agency officials at the headquarters, field office, and site offices regarding their internal data reliability and data control measures. A number of written questions regarding their annual PILT invoices, PILT payments, federal offsets, and other related topics that were responded to by all 12 site offices. We also requested DOE payment information that would allow spot checking of the data that DOE provided. We requested that each of the 12 sites provide documentation of their payments for one in every 5 years between 1994 and 2017. We compared this documentation with data DOE submitted for those years to spot check the data for accuracy. We reviewed past GAO reports on PILT and past GAO and DOE reports on DOE financial management systems. We determined the data to be sufficiently reliable for our purposes. For both objectives, we conducted interviews with or obtained written responses from the following DOE offices, which included representatives of all of the sites that received recent PILT payments: DOE headquarters: Office of the Chief Financial Officer and General Counsel. DOE program offices that manage sites hosted by PILT-recipient communities: National Nuclear Security Administration, Office of Environmental Management, Office of Legacy Management, Office of Nuclear Energy, and Office of Science. DOE site offices hosted by PILT-recipient communities: Argonne National Laboratory, Bettis Atomic Power Laboratory, Brookhaven National Laboratory, Fernald Plant, Knolls Atomic Power Laboratory, Hanford site, Idaho National Laboratory, Los Alamos National Laboratory, Oak Ridge site, Pantex Plant, Portsmouth site, and Savannah River site. To assess reasons for variations in payments, we identified how DOE communities calculate their requested PILT payment amounts and how DOE officials determine how much DOE will pay. We reviewed DOE’s PILT order, DOE Order 143.1, to determine how DOE specifies payments are to be calculated. We also interviewed DOE site office officials about how they expect communities to determine their requested payment amounts. We compared DOE expectations regarding annual payment request calculations with PILT invoices that communities submit to request payments. Because communities appeared to generally calculate payments to align with expected property tax revenue they would have received had the DOE-acquired property remained on the tax rolls in the condition in which it was acquired, we compared this information with information on how local and state governments determine property taxes. When we needed further clarification about how communities had determined their requested payment amounts, we sent follow up questions to DOE site officials regarding the PILT invoices they had reviewed. Once we identified how communities calculate PILT invoices, we analyzed communities’ fiscal year 2017 payment request documentation to determine how factors—such as characteristics of the property, market conditions, and state and local tax policies—influence payment amounts. We interviewed DOE site officials and some community officials, at the communities that received some of the largest payments, about instances when payments varied from what communities requested. We analyzed PILT invoices, agreements, and payment data to identify how communities and sites had determined and documented key determinants and decisions, such as property classification, deductions because of other federal payments, land values, and assessment rates. We analyzed DOE’s PILT order to identify PILT goals and requirements related to: PILT payment determinations, DOE review of communities’ PILT invoices, and PILT documentation. We compared this with federal standards for internal control. We interviewed officials from selected communities that received some of the largest payments to determine how they used PILT payments, how they assess land value, and challenges they have faced with PILT. These communities included all communities at the two sites with the largest aggregate PILT payments in fiscal year 2017: Benton, Franklin, and Grant counties at the Hanford site and Aiken, Allendale, and Barnwell counties at the Savannah River site. Regarding these same topics, we also interviewed staff at community organizations that represent communities that host DOE sites, including: the Energy Communities Alliance and the National Association of Counties. Findings from these communities at two sites and two community organizations cannot be generalized to those we did not interview as part of our review. We conducted this performance audit from October 2018 to October 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on audit objectives. The Argonne National Laboratory covers 1,363 acres in DuPage County outside of Chicago, Illinois. Established in 1946 to conduct “cooperative research in nucleonics” as part of the Atomic Energy Commission’s development of nuclear reactors, Argonne National Laboratory now has over 3,200 employees in addition to nearly 800 scientists who visit the site yearly. Additionally, Argonne has over 7,900 facility users who participate in research at five major user facilities located on site. The Bettis Atomic Power Laboratory, covering approximately 200 acres in West Mifflin outside of Pittsburgh, Pennsylvania, is a part of the Naval Nuclear Propulsion Program in the Department of Energy. The Laboratory began operations in 1948 in order to support the engineering, design, and construction of the prototypes of the first nuclear powered submarine, and by 1955 the USS Nautilus was successfully launched. Since then, the Laboratory led development on other nuclear powered crafts including the first nuclear powered ship and aircraft carrier, the USS Long Beach and USS Enterprise, respectively. Today, the Laboratory focuses on design and engineering support for nuclear-powered submarines and aircraft carriers, in addition to development for the nuclear power elements of next generation aircraft carriers. The Brookhaven National Laboratory was established in 1947 by the Atomic Energy Commission. Formerly Camp Upton, a U.S. Army installation site, Brookhaven is located on a 5,263-acre site on Long Island in Upton, New York, approximately 60 miles east of New York City. Historically, Brookhaven was involved in the construction of accelerators and research reactors such as the Cosmotron, the High Flux Beam Reactor, and the Brookhaven Graphite Research Reactor. These research facilities led the way in high-energy physics experiments and subsequent discoveries but also resulted in creation of hazardous wastes. As a result, Brookhaven was listed as a Superfund Site in 1989 and a subsequent agreement with state and federal regulators led to the building and operation of groundwater remediation facilities, and the decontamination and decommissioning of the High Flux Beam Reactor and the Brookhaven Graphite Research Reactor including offsite waste disposal. The Fernald Plant covers 839 acres in southwestern Ohio near Cincinnati, Ohio. The Fernald Plant’s production mission took place from 1951–1989 as it housed the Feed Materials Production Center, which processed uranium as the first step in the nuclear weapons production cycle. In 2006, the remediation and restoration of the site was completed and at the time was one of the largest environmental cleanup operations ever undertaken in the United States. Currently, monitoring of the site and a groundwater extraction and treatment remediation under the Office of Legacy Management is the remaining remediation activity. The site includes restored native plants and grasses and the largest manmade wetlands in Ohio. DOE is responsible for one of the world’s largest environmental cleanup projects: the treatment and disposal of millions of gallons of radioactive and hazardous waste at its 586 square mile Hanford Site in southeastern Washington State. Hanford facilities produced more than 20 million pieces of uranium metal fuel for nine nuclear reactors along the Columbia River. Five plants in the center of the Hanford Site processed 110,000 tons of fuel from the reactors, discharging an estimated 450 billion gallons of liquids to soil disposal sites and 53 million gallons of radioactive waste to 177 large underground tanks. Plutonium production ended in the late 1980s. Hanford cleanup began in 1989 and now involves (1) groundwater monitoring and treatment, (2) deactivation and decommissioning of contaminated facilities, and (3) the construction of the waste treatment and immobilization plant intended, when complete, to treat the waste in the underground tanks. DOE’s Idaho Site is an 890-square-mile federal reserve, only some of which is eligible for PILT, situated in the Arco Desert over the Snake River Plain Aquifer in central Idaho. The site is home to both the Idaho National Laboratory (INL) and the Idaho Cleanup Project. Work at the INL focuses on research and development of nuclear energy technologies, critical infrastructure protection research, and support of national defense and homeland security. The environmental cleanup mission includes remediation of contaminated legacy wastes generated from World War II- era conventional weapons testing, government-owned research and defense reactors, spent nuclear fuel reprocessing, laboratory research, and defense missions at other DOE sites. The Knolls Atomic Power Laboratory, located on 173 acres in Niskayuna, near Schenectady, NY, was established in May 1946. The original mission of the Knolls laboratory was to provide technical support for the chemical separation of plutonium and uranium from irradiated fuel. In the 1950s, Knolls changed focus to Navy submarine propulsion development. Knolls developed a series of nuclear reactor and propulsion plant designs for the U.S. Navy. Knolls is the lead design laboratory for the newest Virginia Class fast attack submarines and is leading the design effort on the next generation ballistic missile submarine. The laboratory, founded in 1943 during World War II, served as a secret facility for research and development of the first nuclear weapon. The site was chosen because the area provided controlled access, steep canyons for testing high explosives, and existing infrastructure. The Manhattan Project’s research and development efforts that were previously spread throughout the nation became centralized at Los Alamos and left a legacy of contamination. Today, the Los Alamos National Laboratory Cleanup Project is responsible for the treatment, storage, and disposition of a variety of radioactive and hazardous waste streams; removal and disposition of buried waste; protection of the regional aquifer; and removal or deactivation of unneeded facilities. DOE’s Oak Ridge Reservation is located on approximately 33,500 acres in East Tennessee. The reservation was established in the early 1940s by the Manhattan Engineer District of the United States Army Corps of Engineers and played a role in the production of enriched uranium during the Manhattan Project and the Cold War. DOE is now working to address excess and contaminated facilities, remove soil and groundwater contamination, and enable modernization that allows the National Nuclear Security Administration to continue its national security and nuclear nonproliferation responsibilities and the Oak Ridge National Laboratory to continue its mission for advancing technology and science. The Pantex Plant covers 2,000 acres and is located northeast of Amarillo, Texas. One of six production facilities in the National Nuclear Security Administration’s Nuclear Security Enterprise, since 1975 the Pantex Plant has operated as the nation’s primary facility for the assembly, dismantlement, and maintenance of nuclear weapons. The last new nuclear weapon was completed in 1991, and since then, the Pantex Plant has dismantled, retired, or stored thousands of nuclear weapons. The Portsmouth Gaseous Diffusion Plant is located in Pike County, Ohio, in southern central Ohio, approximately 20 miles north of the city of Portsmouth, Ohio. This facility was initially constructed to produce enriched uranium to support the nation’s nuclear weapons program and, later, commercial nuclear reactors. Decades of uranium enrichment and support activities required the use of a number of typical and special industrial chemicals and materials. Plant operations generated hazardous, radioactive, mixed (both hazardous and radioactive), and nonchemical (sanitary) wastes. Past operations also resulted in soil, groundwater, and surface water contamination at several sites located within plant boundaries. The Savannah River Site complex covers 198,344 acres, or 310 square miles, encompassing parts of Aiken, Barnwell, and Allendale counties in South Carolina, bordering the Savannah River. The site is a key DOE industrial complex responsible for environmental stewardship, environmental cleanup, waste management, and disposition of nuclear materials. During the early 1950s, the site began to produce materials used in nuclear weapons, primarily tritium and plutonium-239. Five reactors were built to produce nuclear materials and resulted in unusable by-products, such as radioactive waste. About 35 million gallons of radioactive liquid waste are stored in 43 underground tanks. The Defense Waste Processing Facility is processing the high-activity waste, encapsulating radioactive elements in borosilicate glass, a stable storage form. Since the facility began operations in March 1996, it has produced more than 4,000 canisters (more than 16 million pounds) of radioactive glass. In addition to the individual named above, Amanda Kolling, Assistant Director; Antoinette Capaccio; Ellen Fried; Laura Holliday; Skip McClinton; and Sara Sullivan made key contributions to this report. Also contributing to this report were Jeff Arkin, Cindy Gilbert, Michael Kendix, Richard Johnson, and Oliver Richard.", "summary": "The Atomic Energy Act, as amended, authorizes DOE to make PILT payments to communities that host DOE sites that meet specific criteria. PILT is discretionary financial assistance that provides payments to communities based on the property taxes they would have received had the property remained on their tax rolls. House Report 115-230 accompanying a bill for the Energy and Water Development and Related Agencies Appropriations Act of 2018 included a provision for GAO to review DOE PILT. This report assesses (1) how PILT payments vary, if at all, by site and over time, and (2) reasons for variations in payments and the extent to which DOE is providing assurance that payments meet PILT goals. GAO analyzed data on DOE payments to communities that DOE reported as having received PILT payments between 2008 and 2017. GAO compared 2017 data across sites and identified changes in payments to those communities between 1994 and 2017. GAO reviewed PILT's authorizing statute, DOE's PILT order, and PILT documentation. GAO interviewed officials from DOE, communities, and community organizations. The Department of Energy's (DOE) payments in lieu of taxes (PILT)—payments made to some local communities that host DOE sites—vary considerably across the sites and have generally increased over time. Communities at 11 DOE sites received PILT payments in fiscal year 2017 (the most recent fiscal year for which complete data were available), totaling approximately $23 million (see figure). Payments to communities at the Hanford and Savannah River sites accounted for approximately 70 percent of that total, while payments to six sites combined accounted for less than 5 percent. Total PILT payments have more than doubled since 1994, primarily because of growth in payments to communities at the Hanford and Savannah River sites and because communities at other sites began receiving payments since 1994. DOE intentionally allows for variations of payments across sites so that payments may reflect the revenues communities would have received had the property remained on the tax rolls in the condition in which it was acquired, which DOE officials stated is a goal of PILT. However, DOE's PILT order's lack of requirements has limited DOE's ability to provide adequate assurance that payments consistently meet this and other PILT goals. The PILT order does not require documentation of the key determinants that went into the calculation of payments, or an independent review process to determine whether payment calculations are consistent with PILT goals. The PILT order also lacks specificity about payment determinations in certain scenarios. Without updates to the PILT order to strengthen DOE's internal controls, DOE will continue to lack adequate assurance that payments meet PILT goals. GAO is making three recommendations that DOE update its PILT order to: improve collection and documentation of key determinants of PILT payments, implement a review process, and clarify how communities should calculate payment requests. DOE neither agreed nor disagreed and plans instead to further study PILT. We believe our report supports implementation of these recommendations.", "document_type": "gao"}
{"report": "State had 22,806 full-time, permanent, career employees at the end of fiscal year 2018—an increase of more than 38 percent from fiscal year 2002. Over this period, the number of full-time, permanent, career employees in State’s Civil Service rose by nearly 40 percent, from 6,831 in fiscal year 2002 to 9,546 in fiscal year 2018. Over the same period, the number of full-time, permanent, career employees in State’s Foreign Service increased by 36 percent, from 9,739 to 13,260. To increase diversity in its workforce, State carries out a variety of efforts focused on recruiting and retention. For example, the Thomas R. Pickering Foreign Affairs Fellowship Program and Charles B. Rangel International Affairs Program recruit diverse candidates for the Foreign Service by providing graduate fellowships to college seniors and college graduates. Additionally, according to State officials, recruiters for the department participate in career fairs and discussion panels and host information sessions at conferences with a focus on diversity and inclusion, such as those held by the Hispanic Association of Colleges and Universities and the Congressional Black Caucus Foundation. Some regional and functional bureaus also undertake efforts to increase diversity. According to State’s Senior Advisor for Diversity, Inclusion, and Outreach, bureau leaders set the tone, and provide support for bureau- level initiatives. The Equal Employment Opportunity Commission’s (EEOC) Management Directive 715 (MD-715) provides policy guidance and standards for establishing and maintaining effective affirmative programs of equal employment opportunity. Through MD-715, EEOC directs federal agencies to regularly evaluate their employment practices to identify barriers to equal opportunity in the workplace, take measures to eliminate identified barriers, and report annually on these efforts to EEOC. Among State’s full-time, permanent, career employees, the proportion of racial or ethnic minorities grew from 28 percent in fiscal year 2002 to 32 percent in fiscal year 2018. During this period, as figure 1 shows, the proportion of racial or ethnic minorities in the Civil Service decreased slightly, from 44 to 43 percent, and the proportion of racial or ethnic minorities in the Foreign Service increased from 17 to 24 percent. Although the overall proportion of racial or ethnic minorities at State increased from fiscal year 2002 to fiscal year 2018, the direction of change for specific racial or ethnic minority groups varied, as shown in figure 1. The proportion of African Americans at State overall declined from 17 percent in fiscal year 2002 to 15 percent in fiscal year 2018. The proportion of African Americans in State’s Civil Service decreased from 34 to 26 percent, while the proportion of African Americans in State’s Foreign Service increased from 6 to 7 percent. The proportions of Hispanics, Asians, and other racial or ethnic minorities at State overall and in both the Civil and Foreign Services increased by varying percentages from fiscal year 2002 to fiscal year 2018. As figure 2 shows, the proportions of racial or ethnic minorities in the Civil and Foreign Services were generally much smaller in higher ranks in fiscal year 2018. The proportion of racial or ethnic minorities in fiscal year 2018 was lower than the proportion of whites at GS-11, GS-13, and higher ranks in the Civil Service and at all ranks in the Foreign Service. The proportion of racial or ethnic minorities in fiscal year 2018 was progressively lower in each rank above GS-12 in the Civil Service and above Class 5 in the Foreign Service. Among State’s full-time, permanent, career employees, the overall proportion of women at State decreased slightly, from 44 percent in fiscal year 2002 to 43 percent in fiscal year 2018. During this period, as figure 3 shows, the proportion of women in State’s Civil Service decreased from 61 to 54 percent and the proportion of women in State’s Foreign Service increased from 33 to 35 percent. In addition, the proportion of women at State was generally lower than that of men in the higher ranks of both the Civil and Foreign Services in fiscal year 2018, as figure 4 shows. The proportion of women was lower than the proportion of men at GS- 14 and higher ranks in the Civil Service and at Class 4 and higher ranks in the Foreign Service in fiscal year 2018. For example, the proportion of women at Class 4 was 36 percent, while the proportion of men was 64 percent. The proportion of women in the Civil and Foreign Services in fiscal year 2018 was generally progressively smaller from the lower to the higher ranks. Our analyses of State data for fiscal years 2002 through 2018 found differences between promotion outcomes for racial or ethnic minorities relative to whites and for women relative to men. We found these differences when conducting descriptive analyses, which calculated simple averages, as well as adjusted analyses, which controlled for certain individual and occupational factors other than racial or ethnic minority status and gender that could influence promotion. Our analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, our analyses do not establish a causal relationship between demographic characteristics and promotion outcomes. The following are some highlights of our analysis. Promotion outcomes in State’s Civil Service were generally lower for racial or ethnic minorities than for whites. Our descriptive analysis of State data for fiscal years 2002 through 2018 found that rates of promotion from GS-11 through the executive rank were 16.1 to 42.0 percent lower for racial or ethnic minorities in the Civil Service than for their white counterparts, depending on the GS level. Our adjusted analysis, controlling for factors other than race or ethnicity that could influence promotion, found that racial or ethnic minorities in the Civil Service were 4.3 to 29.3 percent less likely to be promoted from GS-11 through the executive rank than their white counterparts. Promotion rates in State’s Foreign Service were generally lower for racial or ethnic minorities than for whites, but the differences in promotion odds were generally not statistically significant. Our descriptive analysis of State data for fiscal years 2002 through 2018 found that, relative to whites, the rate of promotion for racial or ethnic minorities in the Foreign Service was 5.0 to 15.8 percent lower for promotions from Class 4 through Class 1. Controlling for factors other than race or ethnicity that could influence promotion, our adjusted analysis found that differences in the odds of promotion for racial or ethnic minorities and whites were generally not statistically significant. However, the odds of promotion from Class 4 to Class 3 were statistically significantly lower for racial or ethnic minorities than for their white counterparts. Promotion rates were generally lower for women than men in State’s Civil Service, but differences in the odds of promotion were not statistically significant. Our descriptive analysis of State data for fiscal years 2002 through 2018 found that the rate of promotion in the Civil Service was generally lower for women than for men. Specifically, for promotions from GS-11 through the executive rank, promotion rates for women were generally 0.7 to 11.6 percent lower than the promotion rates for men, depending on the GS level. However, our adjusted analysis, controlling for factors other than gender that could influence promotion, did not find any statistically significant differences in the odds of promotion for women and men in the Civil Service. Our adjusted analysis found that the odds of promotion were generally higher for women than men in State’s Foreign Service. Our descriptive analysis of State data for fiscal years 2002 through 2018 found that women in the Foreign Service experienced a higher rate of promotion than men from Class 3 to Class 2 and from Class 2 to Class 1. Our adjusted analysis, controlling for factors other than gender that could influence promotion, found that women in the Foreign Service had higher odds of promotion than men in early to mid career. For example, the odds of promotion from Class 4 to Class 3 were 9.4 percent higher for women than for men. State has identified some diversity issues in its reports to EEOC. As table 1 shows, in fiscal years 2009 through 2018, State’s annual MD-715 reports identified and analyzed a total of 11 diversity issues related to participation of racial or ethnic minorities and women. State identified most of these issues in multiple years. However, State employee groups and our analysis have identified additional diversity issues, such as differences in promotion outcomes for racial or ethnic minorities relative to whites in early to mid career. For example, during our structured interviews with 11 employee groups, representatives of the groups discussed a variety of issues related to diversity at State. Examples include the following: Employee group representatives expressed concern about representation of minorities in the higher ranks of both the Civil and Foreign Services. For example, representatives told us that for some minority groups, it is difficult to be promoted above the GS-13 level. Employee group representatives voiced perceptions that it takes longer for women and racial or ethnic minorities to be promoted. For example, representatives of one group told us that it takes longer for employees with diverse backgrounds to reach GS-13 in the Civil Service and Class 2 in the Foreign Service and that very few of these employees are promoted beyond those levels. We recommended that the Secretary of State take additional steps to identify diversity issues that could indicate potential barriers to equal opportunity in its workforce. For example, State could conduct additional analyses of workforce data and of employee groups’ feedback. State concurred with the recommendation and noted that the agency will continue to work on initiatives to recruit, retain, develop, and empower a diverse, capable workforce. In conclusion, although State has implemented several plans, activities, and initiatives to improve diversity and representation throughout the ranks of its workforce, longstanding diversity issues—for example, underrepresentation of racial or ethnic minorities and women in the senior ranks—persist at the agency. Until State takes steps to explore such issues, it could be missing opportunities to investigate, identify, and remove barriers that impede members of some demographic groups from realizing their full potential. Chairman Castro, Ranking Member Zeldin, and Members of the Subcommittee, this concludes my prepared statement. I would be pleased to respond to any questions that you may have at this time. If you or your staff have any questions about this testimony, please contact Jason Bair, Director, International Affairs and Trade, at (202) 512- 6881 or bairj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony are Emil Friberg (Assistant Director), Julia Jebo Grant (Analyst-in-Charge), Nisha Rai, Moon Parks, Justin Fisher, Melinda Cordero, Courtney Lafountain, Kathleen McQueeney, Dae Park, K. Nicole Willems, Reid Lowe, and Christopher Keblitis. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.", "summary": "State has expressed a commitment to maintaining a diverse workforce and has undertaken efforts to increase diversity in its Civil and Foreign Services. EEOC directs federal agencies to regularly evaluate their employment practices to identify barriers to equal opportunity, take measures to eliminate any barriers, and report annually on these efforts. This testimony examines (1) the demographic composition of State's workforce in fiscal years 2002 through 2018; (2) any differences in promotion outcomes for various demographic groups in State's workforce; and (3) the extent to which State has identified any barriers to diversity in its workforce. For the January 2020 report on which this testimony is based (GAO-20-237), GAO analyzed State's data for its full-time, permanent, career workforce in fiscal years 2002 through 2018. GAO also analyzed the number of years until promotion from early career ranks to the executive rank in both the Civil and Foreign Services. (GAO's analyses do not completely explain the reasons for differences in promotion outcomes, which may result from various unobservable factors. Thus, GAO's analyses do not establish a causal relationship between demographic characteristics and promotion outcomes.) In addition, GAO reviewed State documents and interviewed State officials and employee group representatives. The overall proportion of racial or ethnic minorities in the Department of State's (State) full-time, permanent, career workforce grew from 28 to 32 percent from fiscal year 2002 to fiscal year 2018. The direction of change for specific groups varied. For instance, the proportion of African Americans fell from 17 to 15 percent, while the proportions of Hispanics, Asians, and other racial or ethnic minorities rose by varying percentages. The proportion of racial or ethnic minorities and women was lowest in the higher ranks of State's workforce. GAO's analyses of State data for fiscal years 2002 through 2018 found differences in promotion outcomes for racial or ethnic minorities and whites and for men and women. GAO found these differences in both descriptive analyses (calculating simple averages) and adjusted analyses (controlling for certain individual and occupational factors that could influence promotion). For example, GAO's descriptive analysis of data for State's Civil Service found that rates of promotion for racial or ethnic minorities were 16 to 42 percent lower, depending on the rank, than for whites. Similarly, after controling for certain additional factors, GAO's adjusted analysis of these data found that promotion for racial or ethnic minorites was 4 to 29 percent less likely than for whites. Also, both types of analysis generally found that promotion outcomes for women relative to men were lower in the Civil Service and higher in the Foreign Service. For example, women in the Foreign Service were more likely than men to be promoted in early to mid career. State has identified some diversity issues, but it should consider other issues that could indicate potential barriers to diversity in its workforce. State's annual reports to the Equal Employment Opportunity Commission (EEOC) for fiscal years 2009 through 2018 identified issues such as underrepresentation of Hispanic employees and underrepresentation of minorities in the senior ranks. However, GAO's analysis and GAO's interviews with State employee groups highlighted additional issues that could indicate barriers to diversity. For example, State's reports have not identified lower promotion outcomes for racial or ethnic minorities relative to whites, which GAO found in its analysis. Until State takes steps to explore such issues, it could be missing opportunities to investigate and remove barriers that impede members of some demographic groups from realizing their full potential. In its January 2020 report, GAO recommended that State take additional steps to identify diversity issues that could indicate potential barriers to equal opportunity in its workforce. State concurred with this recommendation.", "document_type": "gao"}
{"report": "The Office of Entrepreneurial Development, Office of Field Operations, and Office of Strategic Alliances are key SBA offices that administer entrepreneurial programs and manage outreach efforts that could foster entrepreneurship (see fig. 1). Office of Entrepreneurial Development. The Office of Entrepreneurial Development oversees several programs, primarily through a nationwide network of public and private resource partners that offer small business counseling and technical assistance. These resource partners include SBDCs, Women’s Business Centers, and SCORE chapters. The SBDC program receives the majority of entrepreneurial development program funding to provide technical assistance (business counseling and training) to small businesses and aspiring entrepreneurs. SBDC services include assisting small businesses access capital, develop and exchange new technologies, and improve business planning, strategy, and financial management. The entities eligible to receive SBDC funding are primarily institutions of higher education. By statute, the amount eligible entities receive is determined by a state population-based funding formula subject to the amount of an appropriation in any given fiscal year. As a condition of receiving the grant, the recipient or host institution is required to match the funding. The host institution (funding recipient) is responsible for establishing a lead center and network of service centers for a designated service area. The SBDC program has 63 lead centers (generally hosted by institutions of higher education) and more than 900 service centers, including satellite locations. SBA has identified certain special emphasis groups to be targeted for assistance by SBDCs, such as certain populations of business owners. The groups do not include institutions; thus, HBCUs are not included as special emphasis groups. According to SBA officials, SBDCs target underrepresented groups in the population of business owners near HBCUs. Office of Field Operations. SBA also provides services through a network of 10 regional offices and 68 district offices that are led by the Office of Field Operations. SBA district offices serve as the point of delivery for most SBA programs and services. Some district office staff (including business opportunity, lender relations, and economic development specialists) work directly with SBA clients. SBA’s district offices also can initiate and oversee outreach activities to foster entrepreneurship. For example, SBA district offices can implement counseling or training events on their own, participate in such events organized by third parties, or co-sponsor such activities with a third party (for-profit, nonprofit, or government entity) through a co-sponsorship agreement. Moreover, district offices can enter into a 2-year agreement with a nonprofit or government party, known as a strategic alliance memorandum, to foster a working relationship designed to strengthen small business development in a local area. Office of Strategic Alliances. The Office of Strategic Alliances, housed in SBA’s Office of Communication and Public Liaison, reviews co- sponsorship agreements and strategic alliance memorandums drafted by district or program offices. The co-sponsorship agreements and memorandums are based on an internal SBA template provided by the Office of Strategic Alliances, which also maintains records for both strategic alliance memorandums and co-sponsorship agreements. Figure 2, an interactive map, illustrates locations of SBDC lead centers and SBA district office in states with HBCUs. See appendix II for additional information on figure 2. As of December 2018, there were 101 HBCUs, located across 19 states, the District of Columbia and the U.S. Virgin Islands. As previously discussed, HBCUs educated more than 226,000 African-American students in 2017. HBCUs also have played a critical role in supporting underserved students and communities. We previously reported that a higher proportion of students at private HBCUs (77 percent) received Pell Grants in the 2015–16 school year than students at similar private colleges or universities (43 percent). Pell Grants provide low-income undergraduates who demonstrate financial need with financial assistance to help meet education expenses. Executive Order 12232 (1980) established the White House Initiative on Historically Black Colleges and Universities to strengthen the capacity of HBCUs to provide quality education. Subsequent administrations issued executive orders to continue the initiative. Most recently, as expressed in Executive Order 13779 (2017), federal priorities for working with HBCUs encompass two missions: (1) increasing the role of private-sector entities in helping to improve capacity of HBCUs, and (2) enhancing HBCUs’ capabilities for helping young adults. The initiative has been housed in the Executive Office of the President since 2017, according to representatives from the initiative. The more recent executive orders (from 2002, 2010, and 2017) direct each department and agency designated by the Secretary of Education to prepare an annual plan on efforts to strengthen HBCU capacity. Annual plans are to describe how the department or agency intends to increase the capacity of HBCUs, including by identifying federal programs and initiatives in which HBCUs are underserved or that HBCUs may have underutilized. SBA is one of the agencies designated to prepare an annual agency plan. The more recent executive orders also state that a Board of Advisors on HBCUs (in the Department of Education) shall report annually to the President on the Board’s progress in carrying out its duties, which include advising the President on matters pertaining to strengthening the educational capacity of HBCUs. The current Board was chartered in May 2019. SBA has used SBDCs, strategic alliance memorandums, and co- sponsored activities to foster entrepreneurship with HBCUs in recent years; stakeholders’ experiences collaborating with SBA varied. Small Business Development Centers. Two HBCUs—Howard University in Washington, D.C., and the University of the Virgin Islands in St. Thomas, U.S. Virgin Islands—have been longstanding host institutions for SBDCs. More specifically, they have been the only host institutions for two lead SBDCs, the District of Columbia SBDC and the Virgin Islands SBDC, for more than 30 years (and remained so as of September 2019). Colleges and universities predominately have been the institutional hosts of lead SBDCs since the 1980s according to SBA officials. According to SBA officials, there is little turnover among institutions hosting lead SBDCs because SBDC program announcements for host institutions are not full and open competitions and existing host institutions often renew their cooperative agreements to continue operating lead SBDCs. Based on the statutorily defined and population- based allocation formula, the District of Columbia SBDC and the Virgin Islands SBDC together received about 1.3–1.4 percent of the total SBDC funding awarded to institutions of higher education from fiscal year 2008 through 2018. The District of Columbia SBDC and the Virgin Islands SBDC have engaged with HBCU students, alumni, or faculty. As we previously reported, District of Columbia SBDC representatives told us that as of November 2018 they were working with 10–15 Howard University student clients. They also stated they work with all students who come to their center seeking help and do not have a cap on the number of student clients. Similarly, the Virgin Islands SBDC representatives told us as of February 2019 they had made presentations to upper-level business classes and freshmen development seminars at the University of the Virgin Islands. They also counseled students who participated in an annual entrepreneurial competition. They noted that many of the SBDC clients they serve have some affiliation with the university, such as being an alumnus or having attended classes there. In addition to establishing the lead SBDC, the host institution establishes a network of service centers to deliver services, such as counseling and training, within its service area, including at HBCUs. As of September 2018, at least 16 HBCUs hosted SBDC service centers across 11 states. Three SBDC service centers we reviewed that were HBCU- hosted had engaged with HBCU students, alumni, or faculty. For example, the Alabama SBDC service center representatives (housed at Alabama State University in Montgomery, Alabama) said the center works with several faculty members who provided training at SBDC workshops and assisted the service center on specialized topics, such as marketing. Through its relationship with faculty members, the Alabama SBDC service center also conducts outreach to students. Similarly, representatives of two service centers for the North Carolina Small Business Technology and Development Center (housed at North Carolina Central University in Durham, North Carolina, and North Carolina A&T State University in Greensboro, North Carolina) said they have worked with students on the respective campuses. For example, the service center at North Carolina Central University has engaged graduate business students on marketing projects. While the number of HBCU-hosted lead SBDCs has remained unchanged in recent years, it is unclear how many HBCUs have hosted service centers. SBA officials told us that the number fluctuates but were unable to provide the list of all service centers in existence prior to 2018. We discuss SBA’s data collection efforts later in this report. Strategic alliance memorandums. From 2013 through 2018, SBA signed at least 35 strategic alliance memorandums with HBCUs (see table 1). SBA signed at least 51 such memorandums with institutions of higher education in states with HBCUs in that period. As we previously reported, strategic alliance memorandums are mechanisms to initiate and formalize a relationship with nonprofit and governmental agencies, but they are not necessary to initiate a relationship. SBA officials told us the memorandums do not authorize or fund events or activities and are largely symbolic. In August 2019, SBA officials said that numbers of strategic alliance memorandums can fluctuate due to their 2-year duration and changes in SBA administration. Representatives of six HBCUs with whom we met that signed strategic alliance memorandums varied in their assessment of the usefulness of the memorandums. Three of the six HBCUs said they had positive experiences as a result of the memorandums: Representatives of an HBCU in North Carolina said a May 2013 memorandum established a relationship with SBA and provided access to information and resources not otherwise available. Representatives of another HBCU in North Carolina said a 2013 memorandum helped recruit speakers for two entrepreneurship classes. A representative from an HBCU in Tennessee told us that a 2013 memorandum enabled the college to connect students, alumni, and faculty with the resources of SBA’s Tennessee District Office and its resource partners. The representative said a subsequent 2018 memorandum resulted in collaboration with SBA to host a 1-day small business conference on campus. In contrast, representatives of the three other HBCUs either were unaware of the memorandum or said it produced no results: Representatives of two HBCUs (one in Alabama and one in Georgia) told us they were unaware of the signed strategic alliance memorandums (March and April 2013, respectively) due to staffing changes in senior administrative positions. A representative from another HBCU in Georgia told us the school had little involvement with the Georgia SBA district office after signing a memorandum in April 2013. Officials from the district office with whom we spoke agreed with this statement but noted the college had not asked them to participate in any events. Co-sponsored activities. As shown in table 2, from fiscal years 2013 through 2018, SBA signed at least 16 co-sponsorship agreements with HBCUs to jointly conduct activities or events. Twelve of the 16 co- sponsored activities were training or counseling events related to entrepreneurship. SBA signed at least 78 co-sponsorship agreements with institutions of higher education in states with HBCUs in that period. SBA developed a fiscal year 2018 plan for the White House Initiative on HBCUs, in accordance with Executive Order 13779 (2017). SBA’s 2018 plan included two primary goals. The first goal was to raise awareness and provide information to increase the capacity of HBCUs to participate in federally funded programs. More specifically, the plan stated that SBA would engage with HBCUs and provide them with information needed to access and compete for federal grants and contracts. The second goal was to promote collaboration among HBCUs, SBA resource partners, and SBA district offices. For example, the plan stated that SBA would encourage the formation of strategic alliance memorandums between SBA district offices and HBCUs to promote and support entrepreneurship in underserved markets. The plan also stated that SBA would explore and consider partnerships with the National Association for Equal Opportunity in Higher Education, among other organizations, to raise awareness, disseminate information, and share resources among and with HBCUs. The 2018 plan also described five measures to monitor SBA’s efforts to engage, share information, and increase the capacity of HBCUs. The measures are (1) number of outreach events, (2) number of outreach attendees, (3) number of partnerships established, (4) percentage of engaged HBCUs that pursued federal funding, and (5) percentage of HBCUs engaged that found the information useful. The two previous Executive Orders (from 2002 and 2010) on the White House Initiative on HBCUs also directed designated agencies to prepare annual plans on their efforts to support HBCUs. For years prior to 2018, SBA only could provide documentation of plans for 2011 and 2012. Officials of the Office of Entrepreneurial Development told us they were not aware of records for plans developed for the other years in the period we reviewed (2008–2018). SBA was unclear about the responsibilities of the offices involved in the agency’s efforts for addressing the White House Initiative on HBCUs. In March 2019, SBA officials told us the SBA Administrator had designated the Office of Entrepreneurial Development as the lead office for addressing the initiative in 2018. However, the responsibilities for other offices involved in efforts that include HBCUs remain unclear. SBA could not provide documentation of roles, responsibilities, or reporting lines among offices involved in addressing the White House Initiative on HBCUs. For example, the Associate Administrator for the Office of Entrepreneurial Development stated the agency’s interaction with HBCUs occurs through SBA district offices. However, there is no documentation describing how the Office of Entrepreneurial Development and Office of Field Operations, which is responsible for SBA’s district offices, should work together to address the White House Initiative on HBCUs. Moreover, because SBA has not documented specific roles and responsibilities (to include reporting lines), it is unclear how plans prepared for the White House Initiative on HBCUs would be implemented among headquarters, field offices, and resource partners. Additionally, the role of the director of the Office of Faith Based and Community Initiatives in efforts to address the HBCU initiative is unclear. SBA officials told us the Office of Faith Based and Community Initiatives is not involved in administering the initiative. However, the director of that office serves as SBA’s representative to the Interagency Working Group of the White House Initiative on HBCUs. According to SBA officials, the director’s role is to support efforts by the Office of Entrepreneurial Development on the initiative due to staffing shortages. However, officials were unable to tell us in greater detail how the director would provide such support. Federal internal control standards state that management should establish an organizational structure, assign responsibility, and delegate authority to achieve the entity’s objectives. For example, management assigns responsibilities to discrete units to enable the organization to operate in an efficient and effective manner and to delegate authority to key roles throughout the entity. Additionally, management establishes defined reporting lines within an organizational structure so that units can communicate (up, down, and across the organization) the quality information necessary for each unit to fulfill its overall responsibilities. SBA’s uncertainty about the responsibilities of the offices involved in the White House Initiative on HBCUs may be a result of changes over the years as to which program office was chiefly responsible for the effort. According to the Associate Administrator of the Office of Entrepreneurial Development, the responsibilities for the White House initiative on HBCUs have resided in various SBA program offices over the years. Moreover, the Associate Administrator told us the Office of Entrepreneurial Development was designated the lead office for the initiative late in the planning process; therefore, it took time to transfer responsibilities for addressing the initiative to the Office of Entrepreneurial Development. As a result, the Office of Entrepreneurial Development had not yet defined the responsibilities for other offices involved in efforts related to the White House Initiative on HBCUs. In September 2019, SBA officials told us they intended to establish an intra-agency working group focused on HBCUs, which would define the roles and responsibilities of headquarters offices related to the initiative. While the Office of Entrepreneurial Development has been designated as the lead office, without clearly assigned roles, responsibilities, and reporting lines for the other offices involved in the White House Initiative on HBCUs, SBA may not be able to effectively implement future plans for the initiative. Additionally, the lack of clearly assigned roles, responsibilities, and reporting lines has resulted in and may result in future loss of institutional knowledge on efforts to implement the initiative. SBA’s 2018 plan to support HBCUs had the goal of promoting collaboration among HBCUs, SBA resource partners, and SBA district offices. However, SBA headquarters did not communicate its plan for supporting HBCUs to SBDCs and district offices with HBCUs in their service areas. Specifically, SBA officials told us the Office of Entrepreneurial Development, which oversees the SBDC program, did not communicate the 2018 plan to support HBCUs to SBDCs, including the goal to collaborate with HBCUs. None of the SBDC representatives with whom we spoke (for six lead centers and three service centers), reported that SBA communicated information related to the 2018 plan, including goals, measures, or other HBCU-related expectations. Furthermore, none said they received guidance from SBA headquarters related to fostering entrepreneurship with HBCUs, although SBDCs deliver counseling and training to potential and existing business owners. Similarly, the Office of Field Operations, which oversees district offices, did not communicate the 2018 plan to support HBCUs to district offices, including the goal to collaborate with HBCUs, according to SBA officials. While SBA’s district offices deliver most of SBA’s programs and services, none of the representatives of the eight district offices with whom we spoke answered questions related to SBA’s planned efforts to support HBCUs because they stated they were not involved with agency plans for the White House Initiative on HBCUs or were otherwise unable to provide a response. Federal internal control standards state that management should internally communicate the necessary quality information to achieve the entity’s objectives. For example, management assigns the internal control responsibilities for key roles and communicates quality information up, down, and across reporting lines. This enables personnel to perform key roles in achieving objectives, addressing risks, and supporting the internal control system. According to SBA officials, SBA headquarters did not communicate its plan for supporting HBCUs to SBDCs and district offices due to the timing of the plan’s issuance—the 2018 plan was not finalized until near the end of the fiscal year. SBA officials told us that instead of communicating the 2018 plan at the end of the 2018 fiscal year, officials chose to focus on the upcoming fiscal year and future efforts to support HBCUs. Additionally, SBA officials stated the Office of Field Operations was not involved in addressing the White House Initiative on HBCUs, although the office is responsible for providing policy guidance and oversight to district offices in implementing agency goals and objectives. Because SBA headquarters did not communicate its plan for supporting HBCUs, SBDCs and district offices with HBCUs in their service areas were not aware of the goal to collaborate with HBCUs. Therefore, the agency may have missed opportunities to collaborate with HBCUs and work toward 2018 plan goals, even if for a brief period. As of September 2019, SBA officials told us the agency’s fiscal year 2019 plan (or update) for the White House Initiative on HBCUs had not been finalized. As a result, it was unclear when this plan would be communicated to SBDCs and district offices. If the 2019 and subsequent plans for supporting HBCUs are not communicated to SBDCs and district offices, SBA risks repeating a scenario in which SBDCs and district offices with HBCUs in their service areas are unaware of goals to support HBCUs, and therefore may miss opportunities to engage with HBCUs. The extent to which SBA collected information about its programs and activities with HBCUs is limited. More specifically, SBA did not collect relevant information to establish a baseline for performance measures developed in its 2018 plan for the White House Initiative on HBCUs. SBA officials told us that they wanted to use the measures to establish a baseline to better assess progress towards meeting the plan’s goals to support HBCUs in fiscal year 2019. As noted earlier, the 2018 plan’s five measures are (1) number of outreach events, (2) number of outreach attendees, (3) number of partnerships established, (4) percentage of engaged HBCUs that pursued federal funding, and (5) percentage of HBCUs engaged that found the information useful. Number of outreach events and attendees. SBA collects information on the number of outreach events and the number of outreach attendees, but this information is incomplete and not specific to HBCUs. According to SBA officials, SBA district offices are required to collect and report the number of outreach events and attendees to the Office of Field Operations. However, information for outreach activities is reported on an aggregate basis to headquarters and does not specifically identify which institutions hosted or participated in the events. As such, the information reported also does not specifically identify attendees affiliated with an HBCU, such as students, faculty, or alumni. Therefore, while representatives of all eight district offices we contacted said they have conducted outreach activities with HBCUs, these activities would not be readily identifiable in the information reported to headquarters. Until July 2019, SBA district offices reported outreach events through the activity contact report. District offices were able to include optional information, such as the event location and organization name for their outreach events, as shown in figure 3. SBA officials told us they can perform manual searches for specific text (such as the specific name of an institution or “HBCU”) included in information reported by district offices that may identify HBCU-related activities. However, they said manual searches are not easy or effective or routinely performed. Therefore, manually searching for specific text that may be included in information reported by district offices does not lend itself to efficient monitoring of HBCU-related outreach. SBA officials told us a temporary reporting tool (used since late July 2019 in place of the activity contact report) includes an optional data field for district offices to identify whether their activity was HBCU-related. While this additional field may enable users to conduct manual searches for HBCU-related outreach more easily, SBA officials told us the data from the field are still reported in the aggregate to SBA headquarters and therefore continue to be not readily identifiable as HBCU-related. For more information about SBA’s systems for reporting (including district offices), see appendix IV. Additionally, SBA officials told us headquarters does not have policies or guidance for district offices for systematically collecting or reporting data on their HBCU-related outreach. At least one district office, West Virginia, voluntarily tracks its activities with the HBCUs in its region, using a spreadsheet it developed. Unlike district offices, SBDCs are not required to collect and report information related to outreach (such as the number of outreach events and attendees) to the Office of Entrepreneurial Development. As a result, although all nine SBDCs we contacted conduct outreach to HBCUs, SBA lacks data about these activities. The 2020 funding opportunity for SBDCs requires SBDCs with HBCUs in their states to report outreach events with HBCUs in their semi-annual and final year-end reports. Number of partnerships established. SBA collects information on the number of partnerships established, but this information is incomplete and not specific to HBCUs. According to SBA officials, there is no written definition defining partnerships for this measure, but it would include both informal and formal partnerships. SBA collects information related to formal partnerships: SBDCs, strategic alliance memorandums, and co- sponsorship agreements. However, these records do not allow for the ready identification of HBCU partnerships because there are no data fields to identify whether the partner is an HBCU. SBDCs. Information on the number of SBDCs hosted by HBCUs is incomplete. SBA’s records do not allow for ready identification of HBCUs as host institutions because there is no field to identify whether a host institution is an HBCU. While SBA provided information on the number of SBDC lead centers hosted by HBCUs over time, information was not available on the number of SBDC service centers hosted by HBCUs during the time frame of our review (2008–2018) because according to SBA officials, host institutions for service centers can change over time. Strategic alliance memorandums. Information on the number of strategic alliance memorandums signed with HBCUs is incomplete. In September 2018, SBA provided us a list of HBCUs that signed strategic alliance memorandums from 2008 through 2018, developed by cross-referencing records of memorandums with a list of HBCUs. SBA identified 24 such HBCUs, but we identified an additional three HBCUs that had signed strategic alliance memorandums during this period. In June 2019, SBA provided us a list of all strategic alliance memorandums signed from 2015 through 2018, but we found that a 2016 memorandum with Alabama A&M University (Huntsville, Alabama) was not included. Co-sponsorship agreements. Information on the number of co- sponsorship agreements signed with HBCUs is incomplete. In November 2018, SBA provided us copies of co-sponsorship agreements signed with HBCUs from fiscal years 2013 through 2018 by manually cross-referencing its records with a list of HBCUs. SBA identified 14 such agreements, but we identified an additional two co- sponsorship agreements signed with HBCUs. Usefulness. SBA does not collect information on the percentage of HBCUs engaged in activities that found the resources and information SBA provided to be useful. According to SBA officials, district offices are not required to collect written feedback related to the usefulness of information presented during their activities, such as counseling and training. If district offices solicit feedback, it cannot be distinguished as feedback from HBCUs. For example, SBA district offices may solicit written feedback for co- sponsored activities using a headquarters-developed form. The form does not include fields for participants to identify their affiliation with an HBCU and therefore, feedback received would not be HBCU-specific. Unlike district offices, SBDCs are required to issue evaluation forms for SBDC clients who receive continuous counseling or attend an SBDC training event. For example, representatives from the Alabama SBDC lead center told us they conduct quarterly counseling surveys, which include questions related to the timeliness of the counseling and knowledge of the business advisor. SBDCs report data on client satisfaction rates to SBA headquarters. However, SBA officials told us the feedback-related information SBDCs collect and report to headquarters is not specific to HBCUs, despite the agency’s identification of this measure as relevant in its 2018 plan. Federal internal controls standards state that management should use quality information to achieve the entity’s objectives. For example, management obtains relevant data based on the identified information requirements and relevant data have a logical connection with the identified information requirements. SBA lacks information related to programs and activities with HBCUs because district offices and SBDCs with HBCUs in their service areas have not been required by relevant program offices to collect or report information specific to HBCUs, including information relevant for measures developed in SBA’s 2018 plan. Without collection of relevant information for its HBCU-related efforts, particularly for measures developed for annual plans, SBA will not be able to establish a baseline of its efforts to support HBCUs. Moreover, without this baseline SBA cannot determine the extent or effectiveness of its efforts to support and engage HBCUs. SBA’s priority goals include reaching emerging markets that are socially and economically disadvantaged. The agency’s efforts related to HBCUs, which educate many low-income students and help support their local communities, can assist the agency in advancing that goal. But while SBA has long participated in the White House Initiative on HBCUs, it has not clearly assigned responsibilities among relevant offices for addressing its plan for the initiative; communicated its plan to support HBCUs to SBA district offices and SBDCs (with HBCUs in their service areas), which deliver training and counseling; and collected relevant information to establish a baseline and track ongoing efforts to support HBCUs. Addressing these issues would better position SBA to assess the extent to which it is reaching its goals specific to supporting HBCUs, as well as agency-wide priority goals to more broadly reach socially and economically disadvantaged communities. We are making the following three recommendations to the Small Business Administration: The SBA Administrator should assign and document clear roles, responsibilities, and reporting lines for headquarters offices’ implementation of SBA’s plan for addressing the White House Initiative on HBCUs in a timely manner. (Recommendation 1) The Associate Administrators of the Office of Entrepreneurial Development and Office of Field Operations should communicate planned efforts to support HBCUs, including expectations, goals, and related measures, to the district offices and Small Business Development Centers with HBCUs in their service areas. (Recommendation 2) The Associate Administrator of the Office of Entrepreneurial Development should take and document steps to ensure that the office’s reporting mechanisms collect the information needed to establish a baseline for, and also inform future monitoring and assessment of, efforts to support HBCUs. (Recommendation 3) We provided a draft of this report to the Small Business Administration for review and comment. In comments reproduced in appendix V, the Small Business Administration agreed with our three recommendations. The Small Business Administration also provided additional examples of recent accomplishments and plans in their comments. As agreed with your offices, unless you publicly announce the contents of this report earlier, we plan no further distribution until 30 days from the report date. At that time, we will send copies of this report to the Acting Administrator of the Small Business Administration and other interested parties. In addition, the report will be made available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-8678 or OrtizA@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix VI. You asked us to review SBA’s entrepreneurship-related efforts with Historically Black Colleges and Universities (HBCU). This report examines, as did two related products, (1) the Small Business Administration’s (SBA) efforts to foster entrepreneurship through key programs and activities with HBCUs in recent years, (2) SBA’s agency plans for the White House Initiative on HBCUs, and (3) the extent to which SBA collected and recorded information specific to HBCUs. Our review of efforts to foster entrepreneurship focused on counseling and training. To address the first objective, we analyzed SBA programs and activities that in previous work we identified as key for fostering entrepreneurship with HBCUs. Key programs and activities are the Small Business Development Center (SBDC) program, strategic alliance memorandums, and co-sponsored activities. We obtained data from SBA’s Office of Entrepreneurial Development and Office of Strategic Alliances for these key programs and activities, and identified the participation of institutions of higher education, including HBCUs. We reviewed and analyzed data provided to us by SBA of the host institutions and the total amount of funding obligated to administer the SBDC program in fiscal years 2008– 2018 and signed agreements (strategic alliance memorandums and co- sponsorship agreements) with institutions of higher education (HBCUs and non-HBCUs) in fiscal years 2013–2018. In addition, we conducted an on-site file review to record strategic alliance memorandums signed in fiscal years 2013–2015 that were not readily available electronically. To assess the reliability of these data, we reviewed available data, cross- walked them with publicly available information, if applicable, and requested written responses from SBA officials about the data and their limitations, if any. We determined the data were sufficiently reliable for describing the general scale of SBA’s efforts to engage with HBCUs and non-HBCUs. To address the second objective, we reviewed SBA’s 2018 plan for the White House Initiative on HBCUs and documentation of plans for 2011 and 2012, which were the only years in the period of our review (2008– 2018) for which SBA could provide documentation of such plans. We also analyzed the three most recent executive orders related to HBCUs to understand the responsibilities expected of federal agencies and identify changes over time. We also reviewed additional documents that SBA provided related to its agency plans, such as efforts to promote small business research programs, and one available annual agency submission (fiscal year 2010) to the White House Initiative on HBCUs on SBA’s efforts to support HBCUs. We interviewed SBA officials from the Office of Entrepreneurial Development, Office of Field Operations, and the Office of Strategic Alliances. We also interviewed representatives of six SBDC lead centers and three associated service centers, and eight SBA district offices (with 47 HBCUs in their areas). We selected these SBDC networks and district offices based on a combination of factors, including (1) HBCU participation in an SBDC network (hosting a lead or service center), (2) high number of HBCUs located in the state, and (3) high number of agreements (strategic alliance memorandums or co-sponsorship agreements) SBA signed with HBCUs. Based on data SBA provided of signed strategic alliance memorandums with HBCUs, we selected and contacted 12 HBCUs that had signed a strategic alliance memorandum with SBA between 2013 and 2018 or were located close to SBA offices or resource partners such as SBDCs. We interviewed staff at eight of these HBCUs and the remaining four HBCUs did not respond. We visited the District of Columbia, Maryland, North Carolina, and the U.S. Virgin Islands and met with SBDC representatives, SBA district officials, and HBCU representatives, as applicable. We also interviewed America’s SBDCs, an association for SBDCs, and representatives of the following advocacy groups: the Thurgood Marshall College Fund, the United Negro College Fund, and the National Association for Equal Opportunity. To address the third objective, we reviewed two sets of SBA standard operating procedures to understand information collected and reported for (1) the SBDC program, and (2) outreach activities that include co- sponsored activities and strategic alliance memorandums. We reviewed available program announcements or funding opportunities, and cooperative agreements for recipients of the SBDC program to identify their reporting requirements. We reviewed guidance related to the Office of Field Operations’ goals and measures to identity SBA district offices’ reporting requirements. In addition, we reviewed user manuals, data entry form templates, and data dictionaries for SBA information systems used by SBDCs and SBA district offices, such as the Entrepreneurial Development Management Information System and the Activity Contact Report, to identify the extent to which data collected and reported included HBCU-related activities. We reviewed SBA’s 2018 plan for the White House Initiative on HBCUs to identify performance measures developed to monitor SBA’s HBCU- related efforts. We then analyzed whether the information that SBDCs and SBA district offices are required to report included information for monitoring the performance measures developed in the 2018 plan. We assessed SBA’s plans and related efforts against federal internal control standards. Additionally, we interviewed SBA officials from the Office of Entrepreneurial Development, Office of Field Operations, and Office of Strategic Alliances; SBA district office officials from eight offices; and SBDC representatives from nine SBDC networks to better understand the extent to which SBA collects and records information related to their engagement with HBCUs. We conducted this performance audit, from June 2018 to November 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. The Small Business Administration’s (SBA) Small Business Development Centers (SBDC) and district offices provide services that could foster entrepreneurship. The SBDC program provides technical assistance (business counseling and training) to small businesses and aspiring entrepreneurs. SBDCs assist small businesses access capital, develop and exchange new technologies, and improve business planning, strategy, and financial management, among other services. The recipient or host institution of the SBDC is responsible for establishing a lead center and a network of service centers for a designated service area. SBA district offices serve as the point of delivery for most SBA programs and services. Some district office staff (including business opportunity, lender relations, and economic development specialists) work directly with SBA clients. SBA’s district offices also can initiate and oversee outreach activities to foster entrepreneurship. As of December 2018, there were 101 Historically Black Colleges and Universities (HBCU), located across 19 states, the District of Columbia, and the U.S. Virgin Islands. Table 3 lists those states (in addition to the District of Columbia and the U.S. Virgin Islands), the locations of SBDC lead centers and district offices, and the HBCUs. The Small Business Administration’s (SBA) 2018 plan for the White House Initiative on Historically Black Colleges and Universities (HBCU) identifies two programs as available resources that are underutilized by HBCUs. More specifically, the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs provide research and development funding to small businesses to develop and commercialize innovative technologies. The programs are authorized by the Small Business Act, and SBA’s Office of Investment and Innovation is responsible for their oversight, including coordinating the participating agencies’ efforts for the programs. The SBIR program began in 1982 and has four main purposes: (1) use small businesses to meet federal research and development needs, (2) stimulate technological innovation, (3) increase private-sector commercialization of innovations derived from federal research and development efforts, and (4) foster and encourage technological innovation by small businesses owned by women and disadvantaged individuals. The STTR program began in 1992 and has three main purposes: (1) stimulate technological innovation, (2) foster technological transfer through cooperative research and development between small businesses and research institutions, and (3) increase private-sector commercialization of innovations derived from federal research and development. Both programs are similar in that participating agencies identify topics for research and development projects and support small businesses, but the STTR program requires the small business to partner with a nonprofit research institution, such as a college or university or federally funded research and development center. SBA has made some recent efforts to increase awareness among HBCUs about opportunities to access these programs. For example: SBA participated in the HBCU and Minority-Serving Institution Technology Infusion Road Tour, which was organized by the National Aeronautics and Space Administration. As a part of this effort, SBA participated in presentations on the SBIR and STTR programs at three HBCUs: Tennessee State University (Nashville, Tennessee) in April 2017, Johnson C. Smith University (Charlotte, North Carolina) in February 2018, and Clark Atlanta University (Atlanta, Georgia) in March 2018. In 2018, SBA conducted an SBIR Road Tour to raise awareness of available research and development funding. As part of the tour, the agency conducted workshops and presentations at two HBCUs: Alabama A&M University (Huntsville, Alabama) and Jackson State University (Jackson, Mississippi). SBA participated in the 2018 National HBCU Week Conference hosted by the White House Initiative on HBCUs. SBA staff served as speakers and panelists in sessions related to access to federally funded programs (such as SBIR and STTR), and science, technology, engineering, and mathematics. The North Carolina Small Business and Technology Development Center, an SBA resource partner, hosted a workshop in April 2018 at an HBCU—North Carolina Central University (Durham, North Carolina)—focused on preparing proposals for the SBIR and STTR programs. The Small Business Administration’s (SBA) information systems collect a variety of information about SBA’s Small Business Development Centers (SBDC) and district office activities, including counseling and training. Partner Identification Management System. SBDC lead centers are required to maintain their lead center and service center information in SBA’s Partner Identification Management System. This information includes each SBDC service location by name, host institution, and physical address. Additionally, SBDC locations are identified as the lead center, service center, or satellite location. There is no data field to identify the type of host institution (such as institution of higher education) or whether the host institution is a Historically Black College and University (HBCU). Entrepreneurial Development Management Information System. SBDCs are required to report their program data, including counseling and training activities, through SBA’s data collection system, known as the Entrepreneurial Development Management Information System. According to the user manual, the system is designed around two primary forms: SBA’s counseling information form and SBA’s management training report. These forms include data fields for users to enter demographic information on clients and training participants, such as race, gender, and veteran status. Figure 4 shows the data fields related to demographic information included in SBA’s counseling information form. Figure 5 shows data fields related to demographic information included in SBA’s management training report. There are no data fields for users to enter information related to whether a client or training participant is associated with an institution of higher education, including an HBCU. The Entrepreneurial Development Management Information System enables SBA management to generate reports based on demographic information, such as the number of minority participants trained by SBDCs, but not on the number of HBCU- affiliated clients and training participants. Activity contact report. Until July 2019, district offices were required to report activities (including training, presentations, and interactions with stakeholders) that aligned with their goals and measures to the Office of Field Operations through SBA’s activity contact report. District office staff reported their activities in categories that included general inquiries, training, presentations, counseling and technical assistance, outreach, meetings, and special initiatives. Activity contact report forms did not include data entry fields specific to the type of institution (such as institutions of higher education, including HBCUs) that hosted or participated in the district office’s activity. Additionally, the activity contact report forms did not include data entry fields to identify whether participants were affiliated with an HBCU (students, faculty, or alumni). For some activity contact report categories, the forms included additional data entry fields for the event location and name of the organization involved. For example, the activity contact report form for meetings included optional data fields for the event location and organization name, as shown in figure 6. According to SBA officials, the temporary reporting tool (used since late July 2019 in place of the activity contact report) includes an optional data field for district offices to identity whether their activity was HBCU-related. In addition to the contact named above, Lisa Moore (Assistant Director), Chir-Jen Huang (Analyst in Charge), Rachel Beers, John Karikari, Ben Licht, John Mingus, Sulayman Njie, Maria Psara, Barbara Roesmann, Jessica Sandler, Jena Sinkfield, and Andrew Stavisky made key contributions to this report.", "summary": "The 101 HBCUs play an important role in higher education and in their local and regional economies. Among African Americans who obtained a doctorate in science, technology, engineering, or mathematics in 2005–2010, more than one-third earned their undergraduate degrees from an HBCU. SBA is part of a long-standing White House initiative to strengthen the capacity of HBCUs, including their ability to access and participate in federal programs. SBA's mission includes business development, and SBA also works with colleges and universities to provide entrepreneurial training and counseling. GAO was asked to review SBA's entrepreneurship-related efforts with HBCUs. This report examines (1) SBA efforts to foster entrepreneurship with HBCUs in recent years, (2) SBA's plans for the White House Initiative on HBCUs, and (3) the extent to which SBA collected information specific to HBCUs. GAO analyzed SBA information on HBCU participation in programs and activities for fostering entrepreneurship and reviewed related standard operating procedures. GAO also interviewed officials at SBA headquarters and eight SBA district offices, and representatives of nine Small Business Development Centers (selected for a high number of agreements with HBCUs and other factors). The Small Business Administration (SBA) worked with Historically Black Colleges and Universities (HBCU) to foster entrepreneurship, primarily through its Small Business Development Center program (which provides counseling and training), strategic alliance memorandums, and co-sponsorship agreements. Two HBCUs—Howard University and the University of the Virgin Islands—have hosted SBDC “lead centers” since the 1980s. SBA also signed at least 35 strategic alliance memorandums with HBCUs and at least 16 co-sponsorship agreements in 2013–2018. In 2018, SBA developed a plan to support HBCUs (including goals and measures) for the White House Initiative on HBCUs. However, SBA headquarters did not communicate this plan or its goals to key Small Business Development Centers or SBA district offices (those with HBCUs in their service areas). As a result, SBA may have missed opportunities to collaborate with HBCUs and help achieve the goals of its plan. SBA has collected limited information about its programs and activities with HBCUs. SBA could not establish a baseline for performance measures developed in its 2018 plan because SBA district offices and the Small Business Development Centers are not required to collect or report information about their HBCU-related outreach and other activities. For example, while representatives from the nine Small Business Development Centers with whom GAO spoke said they conducted outreach to HBCUs, this information was not reported to SBA headquarters. Without collecting relevant information about its HBCU-related efforts, including data for performance measures, SBA cannot assess the extent or effectiveness of its efforts to support HBCUs. GAO is making three recommendations, including that SBA communicate planned efforts to support HBCUs to key Small Business Development Centers or district offices, and collect additional information on its efforts to support HBCUs. SBA agreed with GAO's recommendations.", "document_type": "gao"}
{"report": "Depots are government-owned, government-operated industrial installations that maintain, overhaul, and repair a multitude of complex military weapons systems and equipment for the Department of Defense. These depots are essential to maintaining readiness for DOD, and they have a key role in sustaining weapon systems and equipment in both peacetime and during mobilization, contingency, or other emergency. There are 21 depots operated by the military services that are subject to the 6 percent minimum investment requirement (the “6 percent rule”)—four are Naval Shipyards, three are Navy Fleet Readiness Centers, two are Marine Corps Production Plants, three are Air Force Air Logistics Complexes, and nine are Army Depots and Arsenals. Figure 1 shows the location of these 21 depots across the United States. The depots are part of a larger, DOD-wide logistics enterprise that involves a number of different organizations. The Office of the Under Secretary of Defense for Acquisition and Sustainment is responsible for establishing policies for access to, and maintenance of, the defense industrial base, including depots. Specifically, the office is tasked with establishing policies and procedures for the management of DOD installations and environment to support military readiness with regard to facility construction, sustainment, and modernization. The Assistant Secretary of Defense for Sustainment serves as the principal assistant and advisor to the Under Secretary of Defense for Acquisition and Sustainment on material readiness. Among other responsibilities, the Assistant Secretary of Defense for Sustainment prescribes policies and procedures on maintenance, materiel readiness and sustainment support. DOD officials report that the Office of the Deputy Assistant Secretary of Defense for Materiel Readiness is responsible for maintenance policy along with the development of a strategic vision for DOD’s organic depot base. Finally, each service has its own logistics or materiel command component, which provides day-to-day management and oversight of the services’ depots (see fig. 2). In addition, service support commands such as Naval Facilities Engineering Command can provide expertise in project design or facility management. Depot maintenance across the services generally involves three primary steps: planning, disassembly, and rebuilding. During each step, the depots rely on their facilities and equipment to ensure that they can conduct the large number of activities needed to repair DOD’s complex weapon systems and return them to the warfighter to be used during training and operations. Repair duration for each system varies according to the complexity of the repair and the type of use the system has experienced since the last overhaul. Because repair times vary, demands on depot facilities and equipment also vary. Delays in depot maintenance can directly affect the services’ readiness by hindering their ability to conduct training and operations using these weapon systems. For example: We reported in May 2016 that the Navy’s implementation of sustainable operational schedules—and readiness recovery more broadly—is premised on adherence to deployment, training, and maintenance schedules. However, we found that the Navy was having difficulty implementing its new schedule as intended, in part because public shipyards were challenged to complete maintenance on time. Specifically, we reported in December 2018 that in fiscal years 2012 through 2018, maintenance overruns on aircraft carrier repairs resulted in a total of 1,207 days of maintenance delay—days that ships were not available for operations—the equivalent of losing the use of 0.5 aircraft carriers each year. Similarly, in fiscal years 2012 through 2018, maintenance overruns on submarine repairs resulted in a total of 7,321 days of maintenance delay—the equivalent of losing the use of almost three submarines each year. We found in September 2018 that depot maintenance delays, among other challenges, limit the Navy, Air Force, and Marine Corps’ ability to keep aviation units ready by reducing the number of aircraft that are available to squadrons for conducting full spectrum training. We reported in June 2018 that the Army’s depots, which conduct reset and recapitalization to extend the life of the Patriot surface-to-air missile system, have often returned equipment to Patriot units late, which has affected unit training. Specifically, we found that of the seven Patriot battalions that underwent reset from fiscal years 2014 through 2017, only one received its equipment within 180 days in accordance with Army policy. Depot maintenance delays also cause the services to incur costs for which they receive no capability. For example, we reported in November 2018 that the Navy is incurring significant costs associated with maintenance delays on attack submarines. We estimated that from fiscal years 2008 to 2018, the Navy had spent more than $1.5 billion—in fiscal year 2018 constant dollars—to crew, maintain, and support attack submarines that provided no operational capability. This was a result of the submarines sitting idle and unable to conduct normal operations while waiting to enter the shipyards, and from being delayed in completing their maintenance at the shipyard. Our previous work has identified multiple factors that can affect depot performance, including the size and skill of the depot workforce, the condition of weapon systems upon arrival at the depot, the availability of spare parts, and the condition of the depot’s facilities and equipment, among others (see fig. 3). In addition, all of these factors can be affected by funding and operational considerations (such as unexpected accidents). DOD officials have stated that disruptions to funding, to include continuing resolutions, affect the ability to conduct depot maintenance. Depots rely on working and efficient facilities and equipment to complete repairs and overhauls, and DOD maintenance officials have stated that any underlying conditions – such as leaks, lack of capacity, inefficient layouts, and breakdowns – require workarounds. Facilities are defined as any building, structure, or linear structure (such as a fence or railway). Equipment includes all nonexpendable items needed to outfit or equip an organization; for the depots, that includes items used by depot personnel to conduct depot-level maintenance, such as tools, test equipment, machining equipment, and test stands. We have previously noted that workarounds are additional efforts to complete the task that can delay maintenance, negatively affect productivity, and increase costs of depot maintenance. Functioning depot facilities and equipment are essential to a number of depot processes, as shown in figure 4. These facilities and equipment often require significant investment to plan, construct, install, repair, and modernize. For example, new DOD depot facilities can cost millions of dollars and are generally expected to last around 67 years, though facilities can, through restoration and modernization efforts, operate significantly longer. Equipment generally lasts for a shorter length of time, though equipment used in production can be expected to last 10 years or more and can be costly. Because these facility and equipment investments can take years to plan and require significant resources, a depot’s decision to invest must often take place well in advance of the specific need the facility or equipment is intended to serve. Other factors that the depots consider when planning investments include topography, flood plains, environmental and historic preservation needs, roads and parking, utilities, and the effect on continuing depot operations. This makes careful planning and management of these investments essential to ensuring that critical capabilities are not neglected. In fiscal year 2007, Congress enacted the 6 percent rule, requiring each military department to invest in the capital budgets of its depots no less than 6 percent of the average total dollar value of the combined maintenance, repair, and overhaul workload funded at all the depots of that department over the preceding 3 fiscal years. The departments generally met the minimum investment requirement from fiscal year 2007 through fiscal year 2017, as we discuss in more detail in appendix I. Our analysis of service metrics shows that depot facilities are, on average, rated as “poor” on DOD’s facility rating scale, and the age of equipment at the depots generally exceeds its expected useful life. Meanwhile, performance at the service depots has generally declined since fiscal year 2007. Our previous work has shown that facility and equipment condition can affect depot performance. However, the military services do not consistently track the extent to which the condition of facilities and equipment affect depot performance. Navy Aviation Depots Rely on Many Facilities from World War II Era While service officials do not consider the age of a facility to be an ideal indicator of its overall health – since the services regularly restore and modernize older facilities rather than build new ones – the age of facilities can still offer insight into some of the depots’ challenges. For example, over 30 million square feet at the Navy aviation depots was built during the 1940’s – more than one-third of its existing space. components of a facility—such as the electrical and plumbing systems and use these assessments to develop a condition rating that summarizes the overall health of the facility. In turn, these condition ratings help service officials plan investment strategies and prioritize depot projects. The condition rating does not necessarily correlate with the age of the facility (see sidebar); a relatively new facility might have a poor condition rating if it has been damaged, for example, and an old facility that has recently been modernized might have a high condition rating. Our analysis of fiscal year 2017 depot facilities data found that the average weighted condition rating at a majority of the 21 service depots is poor. Specifically, 12 of the 21 depots–more than half–have average condition ratings that are below 80, indicating that they are in “poor” condition (see fig. 5). Of the remaining depots, five had an average rating in the “fair” category, and four had an average rating in the “good” category. Officials note that older facilities can face additional challenges, such as electrical systems built for different weapon systems, historical preservation requirements, and suboptimal layouts. It can be difficult for a depot to maintain complex, modern weapon systems, such as the F/A-18, with facilities that were designed for less complex systems. Equipment is generally past its expected useful life at most military depots. Each piece of capital equipment has an expected service life, which indicates the number of years that the equipment is expected to operate. Equipment can be operated past its expected service life. However, equipment that is past its expected service life can pose an increased risk for maintenance delays or higher maintenance costs, affecting the depots’ ability to conduct work. As we have previously reported, aging equipment can present a number of challenges, such as more frequent breakdowns, less effective or efficient operation, and safety hazards. Our analysis shows that most of the 21 depots reviewed rely on equipment that is past its expected useful life (see fig. 7). As Figure 7 shows, only three depots rely on equipment that is, on average, within its useful life. Three other depots were unable to provide data. For more detailed information about equipment age and equipment repairs at individual depots, see appendixes II through XXII. The service depots have generally experienced worsening performance in terms of completing maintenance on time or in the required amount over the past decade. The Navy aviation depots have seen decreases in their timely completion of maintenance for aircraft, engines and modules, and components. For example, on-time performance for aircraft completed at the Navy’s three aviation depots has decreased from about 56 percent in fiscal year 2007 to about 31 percent in fiscal year 2017 (see fig. 8). This occurred even though the number of aircraft scheduled for repair over that same time period declined by about 26 percent. Similarly, the three Air Force aviation depots’ on-time performance has decreased over this same time period from about 98 percent on-time aircraft completions in fiscal year 2007 to about 81 percent on-time aircraft completions in fiscal year 2017 (see fig. 9). This decrease occurred even though the number of aircraft scheduled for repair declined by approximately 15 percent. Naval shipyards have also experienced performance challenges, such as an increase in maintenance delays (see fig. 10). Our analysis shows that the number of days of maintenance delay at the four Navy shipyards has increased by about 45 percent from fiscal year 2007 through 2017, from 986 days in fiscal year 2007 to 1,431 days in fiscal year 2017. We have previously reported that from fiscal year 2008 through fiscal year 2018, the Navy incurred $1.5 billion in fiscal year 2018 constant dollars to crew, maintain, and support attack submarines that provided no operational capability as a result of the submarines sitting idle while waiting to enter the shipyards and from being delayed in completing their maintenance at the shipyards. Army depot data is mixed—our analysis shows that the performance at two depots has decreased, but for others it has held steady or improved. See figure 11 below for changes over time in performance. Finally, the Marine Corps depot output decreased by less than 1 percent, as shown in figure 12. The depots rely on their facilities and equipment to ensure they can conduct the large number of activities needed to efficiently repair DOD’s complex weapons systems. Inadequate facilities can make the overall repair process less efficient, as maintainers perform workarounds that can increase maintenance time and costs. Because the depots are generally operating with equipment past its expected useful life, the depots may be incurring costs related to operating aging equipment – including performing equipment repairs, procuring spare parts, and expending labor hours to repair equipment – while at the same time delaying mission-related work. For example: At Albany Production Plant, officials told us that a shortage of paint booths results in vehicles remaining unpainted and stored outside. Exposure to the elements can cause flash rusting in the event of rain or high humidity, necessitating retreatment that increases both maintenance time and cost. At Norfolk Naval Shipyard, officials had to re-inspect 10 years’ of parts made in a single furnace, after it was discovered that the controls on the furnace were reading incorrectly. At Corpus Christi Army Depot, depot documentation shows that engines are moved nearly 5 miles across the depots during their repair process. According to officials at the depot, this is the result of years of incremental construction that did not allow them to optimize their workflow. At Fleet Readiness Center Southwest, officials told us that they had to develop an inefficient repair process to maintain the CMV-22 due to a lack of hangars that could accommodate the large aircraft. While maintenance delays can be brief, extended maintenance delays can prevent the timely return of weapon systems to operational status. Delays can cause the services to incur operating and support costs without an operational benefit. Lack of weapon systems can also cause other negative effects such as an inability to train people to use the system, leading to a reduction in readiness. The services have used various facility strategies to keep the depots operating, such as restoring and modernizing facilities when funding was available, developing workarounds when space or funding was not available, or continuing to use the inadequate facilities. Over time, this patchwork of old, modernized, and workaround solutions for new weapons systems can result in suboptimzed workflow that adds time and cost to the maintenance process, which can ultimately affect readiness. For example, at Production Plant Albany, the depot has four welding centers in different locations throughout the depot. According to officials, they utilized these welding centers over time as needs arose, and the centers are not ideally located for an efficient work flow. This means that the depot has to provide welding supplies, shift maintainers between, and deliver vehicles to and from these different locations. Alternatively, investments that optimize depot facilities and equipment can positively affect maintenance efficiency. For example: Fleet Readiness Center Southwest recently built a new facility that optimizes the workflow for its repairs of H-60 helicopters. Officials stated that its previous H-60 facility could only fit eight helicopters at a time, and only by crowding them such that using the crane on one required others to be moved as well, adding time and workload to the maintenance process. The new facility can accommodate more than 30 H-60s at a time, and each can be brought into and out of the facility without requiring others to be moved. As part of this effort, the depot also invested in additional lighting, ventilation, and crane capabilities that depot officials stated have increased the depot’s capacity for conducting H-60 repairs by more than 20 percent over their previous facility. At Corpus Christi Army Depot, planners have designed a multiphase workflow for their engine and component repairs that involves investing in a new facility and related equipment. Officials noted that the current engine repair process has developed over decades, and is spread throughout the depot. The redesigned process, which involves several investments over more than two decades, is intended to have a more efficient workflow. An Army analysis estimated that this investment will reduce the time it takes to repair and test engines and components and could result in the depot requiring about 200,000 fewer labor hours, saving about $10 million in labor costs annually. The Naval Shipyard Optimization Plan released by the Navy in February 2018 addresses the shipyards’ ability to maintain the current fleet, and projects that facility and equipment investments at the shipyards will increase efficiency and save resources. For example, the plan estimates that optimized facilities and equipment will save the shipyards over 325,000 labor days per year. Despite the negative effect that poor conditions can have on depot performance, the military services do not consistently track when facilities and equipment conditions lead to maintenance delays. Based on our analysis, the services each track a form of maintenance delay— specifically, work stoppages caused by either equipment or facility conditions. Work stoppages are circumstances where maintenance can no longer proceed because the depot does not have everything it needs, including the facility space to begin additional work or equipment needed to perform a certain function. However, table 1 below shows that although the services have the ability to track work stoppages, they do not all track both facility and equipment-related maintenance delays across all their depots. Further, even within a service, the depots may use different methodologies. Different methodologies make it difficult to compare across depots and identify issues. For example, according to Navy officials, the Navy aviation depots track work stoppages, but each depot uses different standards for determining which incidents are tracked. This means that an event counted as a work stoppage at one location might not be counted at another location. Standards for Internal Control in the Federal Government states that management should use quality information to achieve an entity’s objectives. However, the depots do not track maintenance delays caused by facility and equipment conditions, such as work stoppages, more consistently because there is currently no requirement from their respective materiel commands to do so. Every year, the services spend millions of dollars on depot facilities and equipment to meet their minimum investment requirement. Establishing measures and using them to track maintenance delays caused by facility and equipment conditions would help the services to make better investment decisions because they could target investments to facility and equipment needs that would have the greatest impact on repair times or other key performance goals. Without knowing how often facility and equipment conditions lead to work delays, the services risk investing in less critical infrastructure and experiencing more work stoppages due to facility or equipment conditions. The military services are developing optimization plans for their depots, but these plans lack analytically-based goals, results-oriented metrics, a full accounting of the resources, risks, and stakeholders, and a process for reporting on progress. Including these elements could enhance the effectiveness of service depot investments. Furthermore, there is currently no process at the Office of the Secretary of Defense level that monitors depot investment decisions or provides regular reporting to decision makers and Congress. The services have each begun to develop depot optimization plans, as directed by Congress. In June 2018 Congress directed the Secretaries of the Army, Navy and Air Force to submit an engineering master plan for optimal placement and consolidation of facilities and major equipment, as well as an investment strategy addressing the facilities, major equipment and infrastructure requirements of depots under the jurisdiction of each service. These plans are to include a life cycle cost analysis to modernize depot facilities and equipment and an investment strategy. The Army, Navy, Air Force, and Marine Corps have all begun to develop depot optimization plans, and officials told us that they expect to complete work on these initial plans by the February 2019 date directed by Congress. However, material management command officials also noted that more detailed plans – that include workflow optimization, analysis of supporting utilities, and long-term investment planning – would not be possible by that date. Instead, officials intend to use the initial phase to develop a strategy for completing their final plans. Officials told us that they are using this initial development effort to identify the work needed to fully establish their depot optimization plans, identify the resources and expertise needed for implementation, and develop a timeline for completion. Depot optimization is a challenging effort that involves complex tasks such as, according to service officials, understanding interdependencies between facilities, equipment, and utilities; accounting for environmental, geographic, and economic factors; planning for facility construction and equipment purchases years in advance; and making arrangements for ongoing depot-level maintenance operations while facility and equipment improvements are underway. The Navy developed a Shipyard Infrastructure Optimization Plan, released in February 2018, to address some of its longstanding challenges—including aging facilities and equipment, inefficient layouts, and lack of capacity. Officials estimate that the effort will cost $21 billion over 20 years, and will allow for increased repair capacity. Over time, the Navy estimates that this investment could ultimately save more than 328,000 labor days annually in reduced transportation and materiel movement time. We have a separate review examining the Navy’s effort to optimize its shipyards, which examines its use of results-oriented elements. However, based on our discussions with officials from all four services, the depot plans for the Army and Marine Corps depots and arsenals, the Navy Fleet Readiness Centers, and the Air Force Air Logistics Complexes currently under development will lack certain key elements identified in our prior work, including: Analytically-based goals. The services have not fully established analytically-based goals for their depot investments that are tied to the service’s operational needs. For example, Army and Air Force officials told us that they were still in the process of developing goals for their plans. Meanwhile, Navy aviation officials had developed some initial goals, but expected these goals to change as their planning and information became more detailed. The Marine Corps is in the process of developing its plan, but officials say that they have not determined what analytically-based goals will serve as the foundation of their efforts. Some have told us that the only goal that is feasible by the February 2019 deadline is to plan to develop a better plan. Our prior work has shown that establishing analytically-based goals that define the desired outcomes and results is a leading practice that can enhance the success of an initiative. Results-oriented metrics. As we noted earlier, planners lack key data critical for developing investment plans, such as the source and extent of facilities- and equipment-related maintenance delays. Army, Navy, Air Force, and Marine Corps officials all noted that they were planning to use metrics to determine the effectiveness of their respective plans. However, without established goals for their plans, the services cannot identify the best ways to measure progress in meeting those goals. In addition, the Army, Navy, and Air Force do not have metrics that tie their depot investments to specific outcomes, such as increased performance or improved readiness. Our prior work has shown that using results-oriented metrics enables effective monitoring and facilitates targeting efforts to those with the greatest effect. Identification of required resources, risks, and stakeholders. Army, Navy, Air Force, and Marine Corps officials told us that they have begun identifying the resources needed for their plans. For example, all services have identified at least some of the project costs that will be needed for certain depot facility and equipment improvements. However, without having analytically-based goals to serve as a starting point, it is impossible to fully identify the required resources and risks because the desired end state has not been established. Meanwhile, Army, Air Force, and Navy aviation officials have identified many stakeholders that they intend to involve in their optimization efforts, though in some cases these stakeholders have not been included in the process. Service officials also noted that in some cases they lack the necessary engineering expertise to redesign their depot’s workflow process from the ground up. The services have identified about $6.5 billion in backlogged restoration and modernization projects for their depot facilities. However, this figure is likely under stated because our prior work has shown that depot facility projects are subject to factors such as regulatory compliance and historical preservation costs that can be hard to predict. Moreover, the services track their backlog of needed facility improvements differently, which makes it difficult to determine the full scope of investment required and to provide effective oversight. Our prior work has shown that fully identifying 1) the resources required to achieve the goals, 2) the stakeholders that have equities and requisite expertise in the effort, and 3) potential risks to the effort are leading results-oriented practices that are key to success. Reporting on progress. Army, Navy, Air Force, and Marine Corps officials told us that they are in the process of developing one-time reports for Congress on the depots’ investment needs. However, these one-time reports will not provide Congress and decision makers with information after their initial release. Depot optimization planning will require time, along with sustained management and congressional attention to successfully implement. For example, the Navy’s Shipyard Optimization Plan estimates that it will be a 20-year effort requiring around $21 billion. However, the other initial steps taken by the services to address the congressional request are not as focused on the long term. For example, Army and Air Force officials told us that their initial plans will likely be “plans to get to a plan” rather than a decades-long proposal like the Navy shipyards. Our prior work has shown that reporting on progress is a leading results-oriented practice that holds the organization accountable for results and provides information to senior leaders and Congress that can help keep an effort on track and responsive to changes. According to service officials, the military services’ depot optimization plans will not include all the elements of a results-oriented management approach because there is no requirement that the plans do so. Our prior work has found that a results-oriented management approach can help organizations remain operationally effective, efficient, and capable of meeting future requirements. Specifically, our work has highlighted the importance of elements such as developing analytically-based goals; using results-oriented metrics to monitor progress; fully identifying required resources, risks, and stakeholders; and regular reporting on progress to making reform efforts more efficient, effective, and accountable. Congress directed the services to include some results- oriented elements in their plans, such as an identification of key steps and an initial report to Congress. However, including these additional elements—establishing results-oriented metrics; identifying all necessary resources, stakeholders, and associated risks; and regular reporting to decision makers and Congress—would further enhance the effectiveness of the plans. Without a plan that includes all the key elements of a results- oriented management approach, the services risk continued deterioration of the depots and making suboptimal investments that could hinder their ability to efficiently and effectively support readiness. DOD has not developed a process to oversee the implementation of the services’ depot optimization plans or provide reporting on depot investment effectiveness to DOD decision makers and Congress. Officials with the Deputy Assistant Secretary of Defense for Materiel Readiness stated that their role is to advocate for the service depots within DOD, and not to develop depot policies or review service depot investments. Specifically, they stated that they are unable to set infrastructure policy and do not have authority to alter service investment decisions. However, as part of an office reorganization during the summer of 2018, the Secretary of Defense tasked the Assistant Secretary of Defense for Sustainment with developing logistics and maintenance policy. organizations have successfully used a results-oriented management approach—which includes regular monitoring and reporting—to oversee the department-wide efforts to drive significant improvements. For example, officials with the Office of the Assistant Secretary of Defense for Logistics and Materiel Readiness created a Comprehensive Inventory Management Improvement Plan in 2010 that DOD used to improve data collection, develop standardized metrics, and provide increased oversight (see sidebar). The result was that DOD was able to achieve a number of improvements, such as reducing the value of its on-hand excess inventory by about $2 billion, improving policy and guidance, and establishing standardized metrics for monitoring its operations. Based on these positive results, DOD institutionalized this process through guidance and has continued to use it since 2010. Using this approach, DOD was ultimately able to improve its inventory management processes enough to have it removed from GAO’s High Risk List in 2017. 2. The team of experts assessed the data sources and methods used by the services and DLA and evaluated potential department- wide metrics for measuring demand forecasting accuracy based on the available data sources. 3. DOD implemented the standardized metrics in a phased approach with the initial phase focused on establishing a baseline for the metrics. Through the process of establishing these metrics, DOD developed additional areas for exploration and improvement, such as improving its guidance on demand forecasting. DOD does report some depot information to Congress; however, the information reported is limited in nature and does not address key issues concerning depot facilities and equipment. For example, every other year DOD is required to report to Congress on its core depot-level maintenance and repair capability requirements and workload. DOD must also report annually on the percentage of depot maintenance funds expended during the preceding fiscal year and projected to be expended during the current and ensuing fiscal year, for performance of depot-level maintenance and repair workloads by the public and private sectors. Combined with the services’ reporting on their depot investment spending (see appendix I), this information provides Congress with some information about depot operations and performance. However, these reports do not inform Congress about several key points, including whether the service depots are becoming more effective and efficient or the extent to which DOD has managed to address depot investment backlogs. We have noted in prior work that the backlog of facilities restoration and modernization projects at the depots can be significant, and that reducing these backlogs will likely take a sustained effort over many years. Furthermore, these efforts are important to improving the effectiveness and efficiency of the depots, which is important to ensuring the readiness of military forces. Improving readiness is one of DOD’s top priorities. Specifically, the Secretary of Defense issued a memorandum in September 2018 about improving readiness which set a minimum target of 80 percent mission capability for DOD’s key aviation platforms starting in fiscal year 2019. In addition, the memorandum identified reducing operating and support costs for these platforms every year beginning in fiscal year 2019 as another priority. Furthermore, DOD has more broadly identified rebuilding readiness as a priority across all the services. As noted previously, the depots are essential to providing readiness to DOD in the form of repaired weapon systems, and depot optimization efforts can provide a return on investment in the form of reduced maintenance time and cost. However, the investments made at the depots—which are crucial for optimization, throughput, and ultimately readiness—often need years and millions of dollars to execute, which means that long-term planning is essential to ensuring that investments are made effectively. Regular monitoring of the services’ depot investment efforts could ensure that these investments target readiness drivers to produce the greatest effect. Furthermore, our previous work has noted that timeframes for improvement efforts can slip, which makes reporting to DOD decision makers and Congress essential for holding stakeholders accountable for making progress. For example, we reported in 2017 that even though the Navy had developed capital investment plans in 2013 and 2015 intended to help improve the state of the facilities and equipment at the shipyards, backlogged restoration and maintenance projects had grown by 41 percent over 5 years which extended the amount of time required to clear the backlog under expected funding levels. Without providing oversight of and reporting on service depot investments, DOD risks continued deterioration of the depots’ facilities and equipment, suboptimal investments, and reduced military readiness as the services experience costly maintenance delays. DOD’s 21 depots are critical for repairing and maintaining its complex array of weapon systems. Inefficient depots contribute to longer maintenance times, increased costs, and reduced readiness. Currently, a majority of the depots have facilities that are in poor condition and are relying on old equipment that is past its useful service life. The military services spend millions of dollars annually on depot facilities and equipment in order to meet minimum investment requirements designed to sustain depot performance. Notwithstanding these expenditures, the services are not consistently required to track maintenance delays caused by facility or equipment conditions. This lack of tracking hinders the services’ ability to target investments to facility and equipment needs that would have the greatest effect on repair times or other performance goals. By knowing how often facility and equipment conditions lead to work delays, the services could reduce the risk of investing in less critical facilities and equipment. They could also reduce the risk of more work stoppages caused by facility or equipment conditions. The military services are in the midst of developing congressionally- directed depot optimization plans that are expected to include both 1) an analysis of the cost of depot facilities and equipment modernization and 2) an investment strategy. However, with the exception of the plan designed to address the Navy shipyards, the services’ plans are still in the initial stages, and each one is expected to lack key elements of a results-oriented management approach—including analytically based goals, results-oriented metrics, full identification of required resources and risks, and regular reporting on progress—that would help guide investment. As the shipyard optimization plan has demonstrated, the cost of optimization may be high and, once defined, will require sustained management attention over many years to carry out successfully. In addition, implementing a regular monitoring and reporting process to provide oversight and accountability over depot investments would further enhance DOD’s ability to attain improvements at the depots significant enough to reverse years of decline and reach the challenging goals set by the Secretary of Defense for improving mission capability rates and reducing operating and support costs. We are making the following 13 recommendations to the Department of Defense. The Secretary of the Army should ensure that Army Materiel Command establishes measures for its depots to track facility or equipment conditions that lead to maintenance delays. (Recommendation 1) The Secretary of the Army should ensure that Army Materiel Command implements tracking of the measures for identifying when facility or equipment conditions lead to maintenance delays at each Army depot. (Recommendation 2) The Secretary of the Navy should ensure that Naval Sea Systems Command and the Commander, Fleet Readiness Centers establish measures for their depots to track facility or equipment conditions that lead to maintenance delays. (Recommendation 3) The Secretary of the Navy should ensure that Naval Sea Systems Command and the Commander, Fleet Readiness Centers implement tracking of the measures for identifying when facility or equipment conditions lead to maintenance delays at each Navy depot. (Recommendation 4) The Secretary of the Air Force should ensure that Air Force Materiel Command establishes measures for its depots to track facility or equipment conditions that lead to maintenance delays. (Recommendation 5) The Secretary of the Air Force should ensure that Air Force Materiel Command implements tracking of the measures for identifying when facility or equipment conditions lead to maintenance delays at each Air Force depot. (Recommendation 6) The Commandant of the Marine Corps should ensure that Marine Corps Logistics Command establishes measures for its depots to track facility or equipment conditions that lead to maintenance delays. (Recommendation 7) The Commandant of the Marine Corps should ensure that Marine Corps Logistics Command implements tracking of the measures for identifying when facility or equipment conditions lead to maintenance delays at each Marine Corp depot. (Recommendation 8) The Secretary of the Army should ensure that Army Materiel Command incorporates in its depot optimization plan, key results-oriented elements including analytically-based goals, results-oriented metrics, identification of required resources, risks, and stakeholders, and regular reporting to decision makers on progress. (Recommendation 9) The Secretary of the Navy should ensure that Commander, Fleet Readiness Centers incorporates in its depot optimization plan, key results-oriented elements including analytically-based goals, results- oriented metrics, identification of required resources, risks, and stakeholders, and regular reporting to decision makers on progress. (Recommendation 10) The Secretary of the Air Force should ensure that Air Force Materiel Command incorporates in its depot optimization plan, key results-oriented elements including analytically-based goals, results-oriented metrics, identification of required resources, risks, and stakeholders, and regular reporting to decision makers on progress. (Recommendation 11) The Commandant of the Marine Corps should ensure that Marine Corps Logistics Command incorporates in its depot optimization plan, key results-oriented elements including analytically-based goals, results- oriented metrics, identification of required resources, risks, and stakeholders, and regular reporting to decision makers on progress. (Recommendation 12) The Secretary of Defense should ensure that the Assistant Secretary of Defense for Sustainment develops an approach for managing service depot investments that includes management monitoring and regular reporting to decision makers and Congress on progress. (Recommendation 13) We provided a draft of this report to DOD for review and comment. In written comments on a draft of this report (reproduced in appendix XXIV), DOD concurred with 12 of our 13 recommendations and stated, in general, that the Service Chiefs for the Army, Navy, Air Force, and Marine Corps will ensure that their respective material commands take actions to implement the recommendations for their service. DOD also provided technical comments, which we incorporated where appropriate. DOD did not concur with our recommendation that the Assistant Secretary of Defense for Sustainment (ASD for Sustainment) develop an approach for managing service depot investments. In its response, DOD stated it could not develop such an approach until the services finalized and resourced depot optimization plans. DOD stated it would continue to monitor capital investments at service depots through the budget process. We continue to believe that the ASD for Sustainment should develop an approach for managing service depot investments that includes management monitoring and regular reporting to decision makers and Congress on progress for several reasons. First, our recommendation is focused on the ASD for Sustainment developing an approach for overseeing the services’ overall depot investments, not just those contained in their optimization plans. While the depot optimization plans will certainly affect the services’ depot investments, the depots will require additional investments to sustain, restore, and modernize their operations apart from their efforts to optimize facility layout and workflow. Second, the ASD for Sustainment’s early involvement in the services’ development and resourcing of depot optimization plans could enhance service efforts to identify appropriate analytically-based goals aligned with the Secretary of Defense’s readiness objectives, enhance optimization across the DOD enterprise, and ensure sustained senior leadership attention to achieving optimal depot efficiency and effectiveness. Waiting until the services’ depot optimization plans have been resourced – that is, funded – could result in the ASD for Sustainment beginning its involvement and oversight after critical optimization decisions, such as setting goals, identifying key metrics, and adjudicating trade-offs across the depot enterprise, have been made on an individual basis by the services. Third, while monitoring investments at the service depots through the budget process is an important aspect of oversight, the ASD for Sustainment could enhance the oversight of and accountability over depot investments through a more comprehensive oversight approach. This comprehensive approach could include regular monitoring that focuses on ensuring that approved depot investment funding is implemented as planned and achieves desired results. An approach focused on the implementation of efforts aimed at desired outcomes could better position DOD and the services to make sustained progress. Finally, having regular reporting of progress will help ensure DOD leadership and the Congress have the information needed to help make critical funding and policy decisions. Reporting on progress towards desired outcomes also could assist in ensuring that there is accountability within the department for reversing years of decline and reaching the challenging goals set by the Secretary of Defense for improving mission capability rates and reducing operating and support costs. We are sending copies of this report to the appropriate congressional committees, the Acting Secretary of Defense, and the Secretaries of the Army, Navy, Air Force, and the Commandant of the Marine Corps. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have questions about this report, please contact me at maurerd@gao.gov or (202) 512-9627. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix XXV. Based on our analysis of service budget submissions and 6 percent project lists, we found that the departments have generally met the 6 percent requirement in fiscal years 2007 through 2017 (see fig. 13). As shown above, the Navy and Air Force met the minimum requirement every year since the minimum investment requirement was enacted in fiscal year 2007. The Army met the minimum investment requirement for most years, but did not meet the minimum on two occasions, in fiscal year 2011 and fiscal year 2013. According to Army officials, they missed the fiscal year 2011 minimum by around $21 million due to a software project that was scheduled to execute in fiscal year 2011, but was unable to execute and moved to fiscal year 2012 instead. An Army official attributed the difference in fiscal year 2013, which was over $68 million, to the effects of fiscal year 2013 sequestration, which generally reduced funding available to the services. While the Navy met its minimum investment requirement every year, it is worth noting that the 6 percent rule measures compliance by department. Therefore, the Navy’s reported investments include those for its four shipyards, its three fleet readiness centers, and the two Marine Corps depots. From fiscal year 2007 through fiscal year 2017, the shipyards accounted for 76 percent of Navy depot investment (see fig. 14). If these three organizations were viewed independently, only the shipyards would have regularly met their minimum investment requirement; the fleet readiness centers and Marine Corps depots have generally invested less than 6 percent of their respective maintenance, repair, and overhaul workload, as shown in figure 15. Under this perspective, the fleet readiness centers would only have met the 6 percent minimum in fiscal years 2008 and 2012, and the Marine Corps depots would never have met the 6 percent minimum. The services have counted some facilities sustainment activities towards meeting the 6 percent minimum since fiscal year 2012, but the effect of these activities on the departments’ ability to meet the minimum investment requirement appears minimal. In fiscal year 2012, Congress revised 10 U.S.C. § 2476 to prohibit the services from counting sustainment activity towards meeting their 6 percent investment minimum. Sustainment activities are defined as the regular activities needed to keep a facility in good working order. We requested project documentation from each of the services for a number of the investments that they counted towards their 6 percent minimum. Army officials were only able to provide us with about one-third of our requested project documentation (46 out of 158 projects requested); as a result, our assessment of the Army is limited. Of the project documentation we did receive, we found sustainment activities accounted for 13 projects totaling about $21 million in nominal dollars from fiscal year 2012 through fiscal year 2017. Those projects represent approximately 1 percent of the Army’s total depot investment over that time. The Army’s compliance with the 6 percent rule would not have been affected if those projects had been properly excluded. Navy and Marine Corps officials were able to provide project documentation for 172 out of 211 projects requested. Navy sustainment activities accounted for 47 projects totaling about $94 million in nominal dollars from fiscal year 2012 through fiscal year 2017. Those projects represent about 3 percent of the Navy’s total depot investment over that time. If those projects had been properly excluded, the Navy would still have met its 6 percent minimum for each fiscal year. Finally, Air Force officials were able to provide project documentation for 136 out of 138 projects requested. Air Force sustainment activities accounted for 51 projects totaling about $45 million in nominal dollars from fiscal year 2012 through fiscal year 2017. Those projects represent about 2 percent of the Air Force’s total depot investment over that time. If those projects had been properly excluded, the Air Force would still have met its 6 percent investment minimum for each fiscal year. Mission Anniston specializes in tracked and wheeled vehicles, artillery, bridging equipment, small arms, and other items. Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $196 million – nearly 15% – went to Anniston. Anniston Facilities Restoration and Modernization Backlog As of fiscal year 2017, Anniston has identified about $38 million in backlogged restoration and modernization projects. Mission Corpus Christi specializes in helicopters (AH-64, AH-1, CH-47, OH-58, UH-60, and UH-1), engines, and associated systems and subsystems. Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $311 million – over 23% – went to Corpus Christi. Corpus Christi Facilities Restoration and Modernization Backlog As of fiscal year 2017, Corpus Christi has identified about $25 million in backlogged restoration and modernization projects. Mission Red River specializes in tactical wheeled vehicles—including Mine Resistant Ambush Protected (MRAP) vehicles, High Mobility Multipurpose Wheeled Vehicles (HMMWV), Family of Medium Tactical Vehicles (FMTV), Bradley Fighting Vehicles, and the Multiple Launch Rocket System (MLRS). Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $227 million – nearly 17% – went to Red River. Red River Facilities Restoration and Modernization Backlog Red River did not provide any data on their backlog of restoration and modernization projects. Mission Rock Island houses the Joint Manufacturing and Technology Center, which has been designated the Center of Industrial and Technical Excellence for mobile maintenance equipment such as the Forward Repair System. It is also the sole Army location for assembling recoil mechanisms (such as those on howitzers). Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $59 million – over 4% – went to Rock Island. Rock Island Facilities Restoration and Modernization Backlog Rock Island did not provide any data on their backlog of restoration and modernization projects. Mission Tobyhanna specializes in command, control, communications, computers, intelligence, surveillance and reconnaissance systems, electronics, avionics, and missile guidance and control systems. Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $279 million – nearly 21% – went to Tobyhanna. Tobyhanna Facilities Restoration and Modernization Backlog As of fiscal year 2017, Tobyhanna has identified about $43 million in backlogged restoration and modernization projects. Mission Tooele specializes in ammunition logistics (storage, shipping, sorting, and inspecting), as well as production of related equipment needed for ammunition maintenance and demilitarization. Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, about $84 million – over 6% – went to Tooele. Tooele Facilities Restoration and Modernization Backlog As of fiscal year 2017, Tooele has identified about $21 million in backlogged restoration and modernization projects. Mission Watervliet specializes in cannons, mortars, and associated components, as well as machining and fabrication services. Of the $1.6 billion spent by the Army on depot investment between fiscal year 2012 and fiscal year 2017, $309 million was spent on projects that benefited multiple depots. Of the remaining $1.34 billion, $87 million – about 6% – went to Watervliet. Watervliet Facilities Restoration and Modernization Backlog As of fiscal year 2017, Watervliet has identified about $36 million in backlogged restoration and modernization projects. Mission Norfolk Naval Shipyard specializes in nuclear aircraft carriers (Nimitz class), submarines (Los Angeles- class and Ohio-class), and various surface combatants (CGs, LHDs, LPDs, LCCs, FFGs, and AS Tenders). Of the $2.4 billion spent by the four shipyards on depot investment between fiscal year 2012 and 2017, $557 million—about 23%— was spent on Norfolk Naval Shipyard. Norfolk Naval Shipyard Facilities Restoration and Modernization Backlog Norfolk Naval Shipyard identified about $1.46 billion in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts that have been identified but not yet executed. Mission Pearl Harbor Naval Shipyard specializes in nuclear submarines (Los Angeles-class and Virginia- class) and surface combatants (CGs, DDGs, LPDs, FFGs, and AS Tenders). Navy Depot Investment Of the $2.4 billion spent by the four shipyards on depot investment between fiscal year 2012 and 2017, $458 million—about 19%— was spent on Pearl Harbor Naval Shipyard. Pearl Harbor Naval Shipyard Facilities Rrestoration and Modernization Backlog Pearl Harbor Naval Shipyard identified about $1.69 billion in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts that have been identified but not yet executed. Mission Portsmouth Naval Shipyard specializes in nuclear submarines (Los Angeles-class and Virginia- class). Navy Depot Investment Of the $2.4 billion spent by the four shipyards on depot investment between fiscal year 2012 and 2017, about $568 million—about 23%—was spent on Portsmouth Naval Shipyard. Portsmouth Naval Shipyard Facilities Restoration and Modernization Backlog Portsmouth Naval Shipyard identified about $761 million in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts that have been identified but not yet executed. Mission Puget Sound specializes in nuclear carriers (Nimitz class), submarines (Los Angeles-class, Seawolf-class, and Ohio-class), and surface combatants (DDG-51 class). Navy Depot Investment Of the $2.4 billion spent by the four shipyards on depot investment between fiscal year 2012 and 2017, $841 million—about 35%— was spent on Puget Sound Naval Shipyard. Puget Sound Naval Shipyard Facilities Restoration and Modernization Backlog Puget Sound Naval Shipyard has identified about $1.49 billion in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts that have been identified but not yet executed. Mission FRC East specializes in helicopters (AH-1, CH-53E, MH-53E, UH-1Y), airplanes (AV-8B and EA-6B), fighter aircraft (F/A-18 A, C, and D variants), the MV-22 Osprey, and various engines and components. Of the $526 million spent by the three FRCs on depot investment between fiscal year 2013 and fiscal year 2017, $199 million, about 38%, was spent on projects that benefited FRC East. FRC East Facilities Restoration and Modernization Backlog FRC East identified about $198 million in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts which have been identified but not yet executed. Mission FRC Southeast specializes in helicopters (MH-60R and S) Aircraft (C-2A and E-2 C and D, EA-6B, P-3), fighter aircraft (F-35, F/A-18 A-F variants), trainers (T-6, T-34, T-44), and various components. Of the $526 million spent by the three FRCs on depot investment between fiscal year 2013 and fiscal year 2017, $197 million, about 37%, was spent on projects that benefited FRC Southeast. FRC Southeast Facilities Restoration and Modernization Backlog FRC Southeast identified about $124 million in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts which have been identified but not yet executed. Mission FRC Southwest specializes in helicopters (AH-1, CH-53E, HH- 60, MH-60, and UH-1Y), airplanes (C-2A, E-2C, E-2D, and EA-18G), fighter aircraft (F/A-18 A-F variants), the MV-22 Osprey, and various engines and components. Of the $526 million spent by the three FRCs on depot investment between fiscal year 2013 and fiscal year 2017, $131 million, about 25%, was spent on projects that benefited FRC Southwest. FRC Southwest Facilities Restoration and Modernization Backlog FRC Southwest identified about $53 million in backlogged restoration and modernization (R&M) projects in fiscal year 2017. The Navy defines backlog as R&M efforts which have been identified but not yet executed. Mission Ogden specializes in depot level maintenance for fighter aircraft (F- 35, F-22, F-16, A-10), cargo aircraft (C-130), testers (T-38), other weapons systems (Minuteman III ICBM), and software. Of the $2.1 billion spent by the Air Force on depot investment between fiscal year 2012 and fiscal year 2017, $717.1 million, or 34%, went to the Ogden ALC. Ogden ALC Facilities Restoration and Modernization Backlog As of fiscal year 2017, Ogden ALC has identified about $259 million in backlogged restoration and modernization projects. Backlog is calculated as the difference between programmed requirements and funded requirements in the Complex’s annual budgets. Mission Oklahoma City specializes in depot level repair of bombers (B-1B, B- 52), tankers (KC-135), E-3 Sentry, multiple engine systems, and software. Of the $2.1 billion spent by the Air Force on depot investment between fiscal year 2012 and fiscal year 2017, $1.0 billion – nearly half – went to the Oklahoma City ALC. Oklahoma City ALC Facilities Restoration and Modernization Backlog As of fiscal year 2017, Oklahoma City ALC has identified about $104 million in backlogged restoration and modernization projects. The backlog is calculated as the difference between total programmed requirements and funded requirements in the Complex’s annual budgets. Mission Warner Robins specializes in maintenance of cargo aircraft (C- 130, C-5, C-17), fighter aircraft (F- 15), aviation electronics, and software systems. Of the $2.1 billion spent by the Air Force on depot investment between fiscal year 2012 and fiscal year 2017, $358 million – 17% – went to the Warner Robins ALC. Warner Robins ALC Facilities Restoration and Modernization Backlog As of fiscal year 2017, Warner Robins has identified about $190 million in backlogged restoration and modernization projects. The backlog is calculated as the difference between total programmed requirements and funded requirements in the Complex’s annual budgets. Mission Albany specializes in Amphibious Assault Vehicles (AAV), Light Armored Vehicles (LAV), High Mobility Multipurpose Wheeled Vehicles (HMMWV), Mine Resistant Ambush Protected (MRAP) vehicles, Medium Tactical Vehicle Replacements, communications/electronics equipment, and small arms. Marine Corps Depot Investment Of the approximately $111 million spent by the Marine Corps on depot investment between fiscal year 2012 and fiscal year 2017, $66 million, about 59%, was spent on projects that benefited Albany Production Plant. Albany Facilities Restoration and Modernization Backlog As of fiscal year 2017, Albany Production Plant has identified about $12 million in backlogged restoration and modernization projects. Mission Barstow specializes in Amphibious Assault Vehicles (AAV), Light Armored Vehicles (LAV), High Mobility Multipurpose Wheeled Vehicles, Mine Resistant Ambush Protected (MRAP) vehicles, Medium Tactical Vehicle Replacements (MTVR), howitzers, and communications/electronics equipment. Marine Corps Depot Investment Of the approximately $111 million spent by the Marine Corps on depot investment between fiscal year 2012 and fiscal year 2017, $45 million, about 41%, was spent on projects that benefited Barstow Production Plant. Barstow Facilities Restoration and Modernization Backlog As of fiscal year 2017, Barstow Production Plant has identified about $2 million in backlogged restoration and modernization projects. For each of these locations, we collected and analyzed data such as facility condition rating, facility age, number of facility repairs, equipment age, number of equipment repairs, restoration and modernization backlog, work stoppages due to facility and equipment conditions, depot investment projects, and depot performance metrics including on-time delivery and delayed maintenance days. Whenever possible, we collected data from fiscal year 2007 – the year in which the 6 percent rule was first enacted – to fiscal year 2017, the latest for which most data were available. the General Fund Enterprise Business System for data on facility and equipment repairs and investment projects from fiscal year 2007 through fiscal year 2017; the Defense Industrial Financial Management System for data on Air Force age of equipment for fiscal year 2017; the Logistics Modernization Program for data on Army depot performance from fiscal years 2014 to 2017, investment projects, and equipment repairs from fiscal year 2007 through fiscal year 2017; the Navy Modernization Process for data on Navy shipyard performance from fiscal years 2007 to 2017; Production Status Reporting for data on Navy aviation depot performance from fiscal years 2007 to 2017; the Aircraft/Missile Maintenance Production/Compression Report for data on Air Force depot performance from fiscal years 2007 to 2017; and the Master Scheduling Support Tool for data on Marine Corps depot performance from fiscal years 2007 to 2017. We found the data that we used from these systems to be sufficiently reliable for the purposes of summarizing trends in the selected facility and equipment metrics reported. To determine the extent to which the services track data on maintenance delays caused by facilities and equipment conditions, we requested data on work stoppages related to facilities and equipment conditions at the depots. We also spoke with service officials about delays and work stoppages and the ability of the services to collect this data, and the extent to which they used delay and work stoppage data to target their investments. We did not assess the reliability of any work stoppage data, as we are not reporting this data. Marine Corps Logistics Base Albany Headquarters, Department of the Air Force Air Force Material Command Air Force Sustainment Center To determine the extent to which DOD and the services have developed an approach for guiding depot investments to address key challenges, we discussed with service depot and materiel command officials the depot investment process, the existence of investment plans at the DOD, service, or depot levels, and any challenges in meeting service operational needs resulting from inadequate investment. We also reviewed service documentation on current and future investment plans and analyzed the depots’ processes guiding investment decisions to determine whether these included any elements of a results-oriented management approach. Our previous work has highlighted the importance of a results-oriented management approach to effective operations and investment at various organizations, including defense logistics. the last year for which projects were available. We compared those lists with the services’ actual reported 6 percent spending in their respective budget justification books (specifically, the Fund-6 Report), and reconciled any differences. We then identified facility projects that cost $250,000 and above with the potential for sustainment activities. First, an analyst recorded his assessment of whether a project might include sustainment activity. A second analyst independently reviewed the same information and recorded her assessment. The two analysts created a final assessment that reconciled their two independent assessments and reflects their consensus. This sample is not generalizable to all service projects, but was chosen to identify the projects most likely to affect compliance with the 6 percent rule. We then requested and collected additional project documentation, such as project proposals, for those projects that both analysts agreed had the potential to include sustainment activities. Using this more detailed project documentation, an analyst recorded his assessment of whether a project included sustainment activity. A second analyst independently reviewed the same information and recorded her assessment of whether the project included sustainment activity. The two analysts created a final assessment that reconciled their two independent assessments and reflects their consensus. We then shared the results of our review to obtain the services’ perspectives. In some cases, the services provided additional information about a project that led us to revise our initial determination, such as noting that a particular project was conducted as a result of severe weather damage (which is considered restoration, even if the activity would otherwise be considered sustainment). For the Air Force and Navy shipyards, our final determination of sustainment projects – as presented in summary in appendix I – was consistent with the services’ respective determinations of which projects included sustainment activity. We presented these amounts using nominal, non-inflation adjusted dollars, in order that the comparison with that year’s 6 percent minimum reporting would be comparable. Officials from the Marine Corps and Navy aviation command did not agree with our determination that one and three of the reviewed projects, respectively, included sustainment activity. The Army did not provide a response to most of our sustainment determinations. We conducted this performance audit from August 2017 to April 2019 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. In addition to the individual named above, key contributors to this report are Suzanne Wren, (Assistant Director), James Lackey (Analyst in Charge), Andrew Duggan, Amie Lesser, Felicia Lopez, Michael Perkins, Carol Petersen, Michael Silver, John E. “Jet” Trubey, Britney Tsao, and Lillian Yob. DOD Depot Workforce: Services Need to Assess the Effectiveness of Their Initiatives to Maintain Critical Skills. GAO-19-51. Washington, D.C.: December 14, 2018. Navy Readiness: Actions Needed to Address Costly Maintenance Delays Facing the Attack Submarine Fleet. GAO-19-229. Washington, D.C.: November 19, 2018. Air Force Readiness: Actions Needed to Rebuild Readiness and Prepare for the Future. GAO-19-120T. Washington, D.C.: October 10, 2018. Weapon System Sustainment: Selected Air Force and Navy Aircraft Generally Have Not Met Availability Goals, and DOD and Navy Guidance Need to Be Clarified. GAO-18-678. Washington, D.C.: September 10, 2018. Military Readiness: Analysis of Maintenance Delays Needed to Improve Availability of Patriot Equipment for Training. GAO-18-447. Washington, D.C.: June 20, 2018. Navy Shipbuilding: Past Performance Provides Valuable Lessons for Future Investments. GAO-18-238SP. Washington, D.C.: June 6, 2018. Navy Readiness: Actions Needed to Address Persistent Maintenance, Training, and Other Challenges Affecting the Fleet. GAO-17-809T. Washington, D.C.: September. 19, 2017. Naval Shipyards: Actions Needed to Improve Poor Conditions that Affect Operations. GAO-17-548. Washington, D.C.: September 12, 2017. Navy Shipbuilding: Policy Changes Needed to Improve the Post-Delivery Process and Ship Quality. GAO-17-418. Washington, D.C.: July 13, 2017. Department of Defense: Actions Needed to Address Five Key Mission Challenges. GAO-17-369. Washington, D.C.: June 13, 2017. Military Readiness: DOD’s Readiness Rebuilding Efforts May Be at Risk without a Comprehensive Plan. GAO-16-841. Washington, D.C.: September 7, 2016. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations. GAO-16-450. Washington, D.C.: June 9, 2016. Military Readiness: Progress and Challenges in Implementing the Navy’s Optimized Fleet Response Plan. GAO-16-466R. Washington, D.C.: May 2, 2016. Defense Inventory: Actions Needed to Improve the Defense Logistics Agency’s Inventory Management. GAO-14-495. Washington, D.C.: June 19, 2014. DOD’s 2010 Comprehensive Inventory Management Improvement Plan Addressed Statutory Requirements, But Faces Implementation Challenges. GAO-11-240R. Washington, D.C.: January 7, 2011.", "summary": "The military services' 21 depots maintain the readiness of critical weapon systems such as ships, aircraft, and tanks needed for military operations. The condition of depot facilities and equipment directly affects the timeliness of maintenance and the readiness of the weapon systems they repair. The services have invested over $13 billion in the depots from fiscal year 2007 to fiscal year 2017. Senate Report 115-125 included a provision for GAO to examine the services' investment in and performance of their depots. GAO evaluated (1) the condition of depot facilities and equipment, their relationship to depot performance, and the services' tracking of the relationship to depot performance and (2) the extent to which DOD and the services have developed an approach for guiding depot investments to address key challenges. GAO also provides an overview summary for each depot. GAO reviewed data from fiscal years 2007 through 2017 on depot investment, performance, and the age and condition of facilities and equipment; reviewed agency guidance; and interviewed DOD, service, and depot officials. The condition of facilities at a majority of the Department of Defense's (DOD) depots is poor and the age of equipment is generally past its useful life, but the services do not consistently track the effect that these conditions have on depot performance. Twelve of the 21 depots GAO reviewed––more than half––had “poor” average facility condition ratings (see figure). Some facilities also serve functions for which they were not designed, reducing their efficiency. In addition, the average age of depot equipment exceeded its expected useful life at 15 of the 21 depots. These factors contributed, in part, to a decline in performance over the same period. From 2007 to 2017, performance at the depots generally declined, reducing the availability of the weapon systems repaired for training and operations. Optimizing facilities and equipment at the depots can improve their maintenance efficiency. For example, the Navy estimates that its shipyard optimization effort will save over 325,000 labor days per year, which would allow an additional submarine overhaul annually. However, the services lack data on the effect that facilities and equipment conditions have on maintenance delays, hindering DOD's ability to effectively target investments to the highest priorities. DOD and the services' approach for managing investments to improve the efficiency and effectiveness of its depots lacks elements important to addressing key challenges. The services have efforts underway to complete their plans by February 2019 to address their depots' facility and equipment needs. However, GAO found that these plans are preliminary and will not include key elements, such as analytically-based goals; results-oriented metrics; a full accounting of the resources, risks, and stakeholders; and a process for reporting on progress. Addressing the poor conditions at DOD's 21 depots will cost billions and require sustained management attention over many years. However, the DOD office responsible for depot policy does not monitor or regularly report on depot improvement efforts to DOD decision makers and Congress. Until DOD and the services incorporate these key elements into the management approach for their depot investments, they risk continued deterioration of the depots, hindering their ability to meet the Secretary of Defense's goals for improving readiness and reducing operating and support costs. GAO is making 13 recommendations to improve data collection on the effect of facilities and equipment condition on depot performance, and develop plans that incorporate key elements to guide depot investments. DOD concurred with 12 recommendations, but did not agree to monitor and report on depot investments. We continue to believe monitoring and reporting will enhance DOD's efforts to improve its depots.", "document_type": "gao"}
{"report": "According to HRSA, the current demand for physicians in the United States will likely continue, with a projected shortage of 23,640 primary care physicians by 2025. While increasing physician supply is one way to reduce physician shortages, some experts have also suggested increasing the number of non-physician providers. For example, HRSA predicted that, with health care delivery changes that would allow for NPs and PAs to deliver a greater proportion of services than they do now, the projected shortage of 23,640 primary physicians in 2025 could be mitigated. According to the Bureau of Labor Statistics, in 2018, there were 756,800 physicians, over 189,100 NPs, and 118,800 PAs practicing in the United States. Physicians. Physician GME, also known as residency, provides the clinical training required for a physician to be eligible for licensure and board certification to practice medicine independently in the United States. Specifically, after completing medical school and receiving a medical degree, physicians enter a multi-year residency training program during which they complete their formal education as a physician, primarily in teaching hospitals. Completion of a residency can take from 3 to 7 years after graduation from medical school, depending on the specialty or subspecialty chosen by the physician. In some cases, physicians may choose to pursue additional training—referred to as fellowships—to become a subspecialist, such as a cardiologist. NPs and PAs. Since the first NP and PA training programs in the United States were founded in 1965, these professions and their educational requirements have evolved to allow them to furnish more care that was traditionally provided by physicians, such as diagnosing patients, prescribing medication, and performing certain procedures. The extent to which they can provide care independently from physician supervision varies by state. There are multiple pathways for students to become NPs. In general, after completion of a bachelor’s degree, a nurse may become an NP once he or she achieves a master’s or doctoral degree in nursing. Full-time master’s programs are generally 18 to 24 months and doctoral programs are generally 3 to 5 years. Both programs include classroom and clinical work. In addition, NP students may have varying amounts of hands-on nursing experience before entering an NP program. NP programs generally include the following focus areas: family practice, women’s health, acute care, adult/geriatric health, child health, neonatal health, and mental health. NPs are trained according to a nursing care model, which emphasizes providing comprehensive care for patients that encompasses their physical and other needs. After completion of a bachelor’s degree, students become PAs once they earn a master’s degree in physician assistant studies. The average full- time PA program takes about 27 months to complete, which includes classroom education followed by clinical work conducted through rotations in internal medicine, family medicine, surgery, pediatrics, obstetrics and gynecology, emergency medicine, and behavioral medicine. In addition, PA students have varying amounts of hands-on work experience in health care before entering a PA program. PAs are trained to approach patient care according to a medical model focused on assessing, diagnosing, and treating disease. Both NP and PA students are required to complete clinical work as part of their graduate programs by providing care to patients under the supervision of a preceptor—an experienced and licensed health care provider who provides instruction and supervision to the student during their clinical rotations. Upon graduation and after passing a national certification exam and obtaining a license in the state in which they choose to work, both NPs and PAs can begin practicing. NPs and PAs may also complete an optional post-graduate residency training program, but unlike physicians, they are not required to do so in order to obtain a state license to practice. Figure 1 shows an example of education and training paths for physicians, NPs, and PAs. Physicians. The vast majority of federal funding for physician GME training is distributed by HHS through CMS’s Medicare GME program. In our 2018 report on GME funding, we found that Medicare GME payments for physicians totaled more than $10.3 billion in 2015. CMS pays for a hospital’s costs associated with GME training through two mechanisms— direct graduate medical education and indirect medical education payments—both of which are formula-based payments set by statute. Direct payments are for costs that include, for example, residents’ salaries and benefits, compensation for faculty who supervise the residents, and overhead costs. Indirect payments are for costs including higher patient care costs that teaching sites are thought to incur as a result of training residents, such as increased diagnostic testing and procedures performed. Payments to hospitals may also include funds for training in nonhospital settings. Other sources of federal GME funding for physicians include the Medicaid program, which is jointly administered by CMS and the states, programs administered by HRSA, and other federal agencies outside of HHS. NPs and PAs. HHS funding is available to train NPs and PAs, primarily through HRSA grants authorized under titles VII and VIII of the Public Health Service Act. Specifically, according to HRSA officials, funding for programs that included NP and PA training totaled approximately $136.2 million in fiscal year 2019. (See table 2 for a description of these programs.) In recent years, CMS also provided funding for graduate training for advanced practice registered nurses, including NPs, from fiscal years 2012 through 2018 as part of the Graduate Nurse Education Demonstration. The Graduate Nurse Education Demonstration was established by the Patient Protection and Affordable Care Act to determine whether payments for clinical training provided to hospitals would increase the number of advanced practice registered nurses, including NPs, and whether these payments would affect the number of advanced practice registered nurses by specialty. Officials from the stakeholder organizations we interviewed identified the potential benefits and challenges of expanding the Medicare GME program to include NP and PA graduate training. Predictability and stability of Medicare GME program funding. According to officials from five of the nine stakeholder organizations we interviewed—three NP and two PA organizations—a benefit of expanding the Medicare GME program is that it may create more predictability and stability for training funding for NPs and PAs. This would be beneficial by allowing NP and PA programs to do better long-range planning such as planning for the number of NP and PA students that can be admitted. Officials from two of these stakeholder organizations noted that a benefit of the Medicare GME program for physicians is that funding is historically more stable than the funding available to NPs and PAs through HRSA. Specifically, Medicare GME funding is mandatory, while funding for NP and PA training programs administered by HRSA is discretionary. During the annual appropriations process, Congress may choose to appropriate the amount requested by HRSA, to increase or decrease those levels, or to not appropriate any funds. For example, Congress appropriated $28.5 million in fiscal year 2018 for HRSA’s Nurse Faculty Loan Program, but then decreased this appropriation to $13.5 million in fiscal year 2019. Potential opportunity to pay preceptors. Officials from four of the nine stakeholder organizations—two NP and two PA organizations— noted that one benefit of expanding the Medicare GME program to include NP and PA graduate training is that funding could be used to pay preceptors as an incentive to supervise students. CMS and others have also reported that schools of nursing have faced significant challenges increasing enrollments, in part due to difficulty finding preceptors willing to supervise students. Similarly, officials from two PA organizations we interviewed noted that some programs may choose not to fill their available enrollment slots because they are concerned about finding enough preceptors to allow all their students to graduate. Officials from four of the stakeholder organizations we interviewed noted that supervising students can take time away from the preceptor’s productivity in seeing patients, and that some practices and health care systems do not allow their health care providers to serve as preceptors. Specifically, officials from two stakeholder organizations we interviewed said that, historically, these preceptors have volunteered as a way of “giving back” to their profession and have not been paid for their time. However, due to difficulties finding a sufficient number of volunteer preceptors, some graduate programs have begun reimbursing preceptors for their time in order to encourage their participation. CMS’s Graduate Nurse Education Demonstration also included funding for preceptors. Differences in training requirements. Officials from six of the nine stakeholder organizations—two NP, two PA, and two physician organizations—raised concerns about challenges that could occur because NP and PA clinical training requirements do not align with the current structure of the Medicare GME program. For example, officials from some of these organizations noted that the Medicare GME program is structured to fund physician residency training, which is required in order for physicians to practice, but NPs and PAs are not required to complete a residency after completing a graduate program in order to practice. Specifically, CMS makes GME payments to hospitals according to formulas outlined in statute based, in part, on the number of physician residency positions. Therefore, officials from some of these stakeholder organizations said that any change to Medicare GME to include NPs and PAs would need to consider how to allocate GME funding for NP and PA programs in light of these differences in training requirements between physicians, NPs, and PAs. Potential limitations on Medicare funding for physician training. Officials from seven of the nine stakeholder organizations we interviewed—four NP, one PA, and two physician organizations— expressed concern that expanding the Medicare GME program to increase the number of NPs and PAs without increasing overall funding may negatively impact the funding available for physician training. For example, officials from one stakeholder organization said that reallocating available Medicare GME dollars could be problematic and potentially diminish needed resources for others. An official from one of these stakeholder organizations said that there is currently not enough funding to provide residency training for all qualified physicians, and adding NPs and PAs to the existing pool of underfunded residency candidates would worsen the funding shortage. Officials from another stakeholder organization echoed this concern by noting that expanding the Medicare GME program could force NPs to compete with physician residents for patients and space. Through our review of the literature and our interviews with officials from stakeholder organizations, CMS, and HRSA, we identified two estimates of NP or PA graduate training costs. CMS’s evaluation of its Graduate Nurse Education Demonstration estimated the total cost of graduate clinical NP training to be about $47,000 per student, based on the funds paid to the demonstration sites from fiscal year 2012 through fiscal year 2018, and the Physician Assistant Education Association estimated the total cost of graduate PA training to be about $45,000 per student, based on the results of its 2018 survey. While these two estimates provide some information about the costs of training NPs and PAs, they provide limited and incomplete information on these costs. CMS Graduate Nurse Education Demonstration. CMS estimated NP graduate training costs totaling $47,172 per graduate according to its evaluation of the Graduate Nurse Education Demonstration, in which CMS funded graduate clinical training for advanced practice registered nurses—a category that includes NPs—over 6 years. This estimate represents the cost to CMS (defined as the total funds paid to the demonstration sites during the duration of the demonstration) for the clinical training of each graduating student. Part of the cost covered by the demonstration includes the costs of clinical preceptors. Congress appropriated a total of $200 million for the demonstration, which operated from fiscal years 2012 through 2018. The demonstration funded clinical training at five hospitals, which partnered with 19 schools of nursing, and multiple community- based care settings. The cost estimate underreports the total cost of NP graduate training because, while both clinical and classroom training are required for NP students to graduate, CMS’s demonstration only provided funding for clinical training, as specified by the Patient Protection and Affordable Care Act. Specifically, CMS does not include the costs associated with classroom training, certification, and licensure of advanced practice registered nursing students. In addition, the demonstration targeted advanced practice registered nurses, which is a broader category that includes NPs in addition to other types of specialty nurses such as certified nurse-midwives and certified registered nurse anesthetists. However, according to CMS, the vast majority of advanced practice registered nursing students enroll in NP programs. CMS’s evaluation also noted that the cost estimates are not generalizable because they are only based on information from the schools that participated in the demonstration. (See table 3.) Physician Assistant Education Association survey data. The Physician Assistant Education Association, whose members are graduate PA programs, estimated PA graduate training costs totaling $45,309 per student—an estimate based on the results of a published annual survey of its members in 2018. This represents the average cost to the member PA programs for training a student in a 27-month PA graduate program, based on expense data reported by programs from the 2017-2018 fiscal year. The Physician Assistant Education Association’s data are self- reported by PA graduate programs. In addition, these data likely underreport the total costs of graduate PA training because they exclude in-kind contributions from clinical sites. These contributions, such as the donated time from volunteer preceptors, are necessary for clinical training. Officials estimated that paying for costs supported by these in-kind contributions—which the Physician Assistant Education Association estimated to be about $11,300 per student— would likely add an additional 25 percent to the total estimated cost to train PAs. (See table 4.) We provided a draft of this report to HHS for review and comment. The department provided technical comments, which we incorporated as appropriate. We also provided relevant draft portions of this report to the nine professional associations that we interviewed and they provided technical comments, which we incorporated as appropriate. We are sending copies of this report to the appropriate Congressional committees, the Secretary of Health and Human Services, and other interested parties. In addition, the report is available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made key contributions to this report are listed in appendix I. James Cosgrove, (202) 512-7114 or cosgrovej@gao.gov. In addition to the contact named above, Kelly DeMots (Assistant Director), Teresa Tam and Sarah-Lynn McGrath (Analysts-in-Charge), and Margaret Fisher made key contributions to this report. Also contributing were Leia Dickerson, Diona Martyn, Caitlin Scoville, Ethiene Salgado-Rodriguez, and Jennifer Whitworth.", "summary": "An adequate, well-trained health care provider workforce is essential to ensure Americans have access to quality health care services. However, studies have shown the United States faces a shortage of physicians, making it increasingly difficult for people to access needed health care. Experts have identified ways to address this shortage, such as through strategies that increase the number of other types of non-physician providers, including NPs and PAs. For example, members of Congress and others have questioned whether expanding the scope of the Medicare GME program to include NPs and PAs could help mitigate the effects of a physician shortage. A Senate Committee on Appropriations report included a provision for GAO to examine the potential of making GME payments under the Medicare program for NPs and PAs. This report describes: (1) stakeholder views on the potential benefits and challenges of expanding the Medicare GME program to include NP and PA graduate training; and (2) available information on the estimated costs of NP and PA graduate training. GAO reviewed literature and interviewed officials from nine professional associations with knowledge of NP, PA, and physician graduate training; and agency officials. Based on these interviews, GAO identified sources of information on estimated costs and reviewed those sources. The federal government funds many education programs for health care providers, but the vast majority of this funding—more than $10.3 billion in 2015—supports physician residency training through the Department of Health and Human Services's (HHS) Medicare graduate medical education (GME) program. This program does not fund graduate training for nurse practitioners (NP) and physician assistants (PA) who deliver many of the same services as physicians, such as diagnosing patients and performing certain procedures. Instead, a smaller portion of federal funding—approximately $136 million in fiscal year 2019—is available to train them. Stakeholders GAO interviewed said that one benefit of expanding Medicare GME is that Medicare GME funding would provide more stable funding for NP and PA training, compared to existing programs. Stakeholders said one challenge of such an expansion is that clinical training requirements for NPs and PAs are different than physicians; therefore, any change to Medicare GME to include NPs and PAs would need to consider how to allocate GME funding in light of these differences. GAO identified two estimates of costs for completing an NP or PA graduate school program; while the estimates provide some information about these costs, they are limited and incomplete. The Centers for Medicare & Medicaid Services' (CMS) evaluation of its Graduate Nurse Education Demonstration estimated the total costs over the 2012-2018 demonstration period to be about $47,000 per NP student. While clinical and classroom training are required for NP students, CMS's demonstration only provided funding for clinical training, as specified by statute, and the estimate is not generalizable beyond the participating schools. The Physician Assistant Education Association estimated the total costs to be about $45,000 per PA student. The estimate is based on self-reported data from a 2018 survey of member PA programs and excludes in-kind contributions for clinical training. GAO received technical comments on this report from HHS and the professional associations interviewed and incorporated them as appropriate.", "document_type": "gao"}
{"report": "The sale of U.S-origin armaments and other \"defense articles \" has been a part of national security policy since at least the Lend-Lease programs in the lead-up to U.S. involvement in World War II. Historically, Presidents have used sales of defense articles and services to foreign governments and organizations to further broad foreign policy goals, ranging from sales to strategically important countries during the Cold War, to building global counterterrorism capacity following the terrorist attacks of September 11, 2001. The sale of U.S. defense articles to foreign countries is governed by a broad set of statutes, public laws, federal regulations, and executive branch policies, along with international agreements. An interconnected body of legislative provisions, authorizations, and reporting requirements related to the transfer of U.S. defense articles appears in both the National Defense Authorization Acts (NDAA) and in the State Department, Foreign Operations, and Related Programs (SFOPS) Appropriations Acts. These laws reflect the roles that both the Department of State and the Department of Defense (DOD) take in the administration of the sale, export, and funding of defense articles to foreign countries, which can be found in both Title 22 (Foreign Relations) and Title 10 (Armed Services) of the United States Code . Congress enacted the current statutory framework for the sale and export of defense articles to other countries mainly through two lawsâThe Foreign Assistance Act of 1961(FAA), 22 U.S.C Â§2151, et seq., and the Arms Export Control Act of 1976 (AECA), 22 U.S.C. Â§2751, et seq. Among other provisions, the FAA established broad policy guidelines for the overall transfer of defense articles and services from the United States to foreign entities (foreign countries, firms, and/or individuals) to include both sales and grant transfers, while the AECA also governs the sales of defense articles and services to those entities. This report describes the major statutory provisions governing the sale and export of defense articlesâForeign Military Sales (FMS) and Direct Commercial Sales (DCS)âand outlines the process through which those sales and exports are made. FMS is the program through which the U.S. government, through interaction with purchasers, acts as a broker to procure defense articles for sales to certain foreign countries and organizations, also called eligible purchasers . In DCS, the U.S. government does not act as a broker for the sale, but still must license it, unless export of the item is exempt from licensing according to regulations in the International Traffic in Arms Regulations (ITAR), contained in Subchapter M, 22 CFR 120-130, described below. The President designates what items are deemed to be defense articles or defense services, and thus subject to DCS licensing, via the U.S. Munitions List (USML). All persons (other than U.S. government personnel performing official duties) engaging in manufacturing, acting as a broker, exporting, or importing defense articles and services must register with the State Department according to ITAR procedures. The State Department is required under the AECA to notify Congress 15 to 30 days prior to all planned FMS and DCS cases over a certain value threshold. Congress can, pursuant to the AECA, hold or restrict such sales via a joint resolution. The report also provides a select list of specific legislative limitations on arms sales and end use monitoring requirements found in the Arms Export Control Act. Future updates will consider policy implications and issues for Congress. In FY2018, the latest year complete agency data is available, the value of authorized U.S. arms sales to foreign governments and export licenses issued totaled about $184.3 billion. Foreign entities purchased $47.71 billion in FMS cases and the value of privately contracted DCS authorizations licensed by the State Department (distinct from actual deliveries of licensed articles and services) totaled $136.6 billion ( Table 1 and Table 2 ). That same year, the State Department requested $7.09 billion (base and OCO) for all of its Title 22 security assistance authorities in its International Security Assistance account, while DOD executed $4.42 billion for Title 10 security cooperation authorities, totaling $11.51 billion, or 24.1% of what foreign entities spent on FMS and 8.4% of the amount of DCS approved licenses. While most arms sales and exports are paid for by the recipient government or entity, transfers funded by U.S. security assistance or security cooperation grants to foreign security forces comprise a small portion of arms exports, but they are beyond the scope of this report. These transfers are generally considered foreign assistance, and are authorized pursuant to the FAA, annual National Defense Authorization Acts, and other authorities codified in Title 22 and Title 10 of the U.S. Code. With the exception of Title 10 authorities, the FAA and AECA also govern all of the transfers of U.S.-origin defense articles and services, whether they are commercial sales, government-to-government sales, or security assistance/security cooperation. Major Title 22 grant-based security assistance authorities pertaining to defense articles are Foreign Military Financing (FMF), Nonproliferation, Anti-Terrorism, Demining, and Related Programs (NADR), Peacekeeping Operations (PKO). Major Title 10 grant-based security cooperation authorities are Authority to Build the Capacity of Foreign Security Forces (\"333 authority\"), Defense Institution Reform Initiative (DIRI), Ministry of Defense Advisors (MDOA) program, and Southeast Asia Maritime Security Initiative (MSI). DOD, through its Defense Security Cooperation Agency (DSCA), executes most security assistance and security cooperation programs. FMF, IMET, EDA, and equipment lease cases involving the transfer of U.S-origin arms are treated as FMS cases and reported as such by DSCA. Cases executed pursuant to Title 10 authorities are also treated as FMS cases, but are referred to by practitioners as \"pseudo-FMS\" cases because they often involve a focus on training of foreign forces as well as on the transfer of arms. The broad set of statutes, public laws, federal regulations, executive branch policies, and international agreements governing the sale of U.S. defense articles to foreign countries include the following . As noted above, the primary statutes covering the sale and export of U.S. defense articles to foreign countries are the FAA (P.L. 87-195, as amended) and AECA ( P.L. 90-629 , as amended) . The FAA expresses, as U.S. policy, that the efforts of the United States and other friendly countries to promote peace and security continue to require measures of support based upon the principle of effective self-help and mutual aid, [and that its purpose is] to authorize measures in the common defense against internal and external aggression, including the furnishing of military assistance, upon request, to friendly countries and international organizations. The AECA states that it is the sense of Congress that all such sales be approved only when they are consistent with the foreign policy of the United States, the purposes of the foreign assistance program of the United States as embodied in the Foreign Assistance Act of 1961, as amended, the extent and character of the military requirement and the economic and financial capability of the recipient country, with particular regard being given, where appropriate, to proper balance among such sales, grant military assistance, and economic assistance as well as to the impact of the sales on programs of social and economic development and on existing or incipient arms races. The FAA also establishes the U.S. policy for how recipient countries are to utilize defense articles sold or otherwise transferred. Section 502 states that defense articles and defense services to any country shall be furnished solely for internal security (including for antiterrorism and nonproliferation purposes), for legitimate self-defense, to permit the recipient country to participate in regional or collective arrangements or measures consistent with the Charter of the United Nations, or otherwise to permit the recipient country to participate in collective measures requested by the United Nations for the purpose of assisting foreign military forces in less developed friendly countries (or the voluntary efforts of personnel of the Armed Forces of the United States in such countries) to construct public works or to engage in other activities helpful to the economic and social development of such friendly countries. Section 22 of the AECA, provides the statutory basis for the U.S. Foreign Military Sales program and allows the U.S. government to interact with purchaser as a broker to procure defense articles for sales to certain foreign countries and organizations, also called eligible purchasers . Under this provision, the President may, without requirement for charge to any appropriation or contract authorization, enter into contracts to sell defense articles or defense services to a foreign country or international organization if it provides the U.S. government with a dependable undertaking to pay the full amount of the contract. Section 38 of the AECA furthermore provides the statutory basis for the U.S. Direct Commercial Sales of defense articles and services. Under this provision, the U.S. government does not act as a broker for the sale, but still must license it, unless specifically provided for in regulations in the International Traffic in Arms Regulations, contained in Subchapter M, 22 CFR 120-130, described below. The President designates what items are deemed to be defense articles or defense services, and thus subject to DCS licensing, via the U.S. Munitions List. All persons (other than U.S. government personnel performing official duties) engaging in manufacturing, acting as a broker, exporting, or importing defense articles and services must register with the State Department according to ITAR procedures. The provision also requires the President to review the items on the USML and to notify the House Foreign Affairs Committee, the Senate Foreign Relations Committee, and the Senate Banking Committee if any items no longer warrant export controls, pursuant to the ITAR. In April 2018, the Trump Administration, citing the AECA, issued a National Security Presidential Memorandum, NSPM-10, outlining its policy concerning the transfer of conventional arms. The memorandum reflects many of the policy statements of the FAA and AECA in aiming to \"bolster the security of the United States and our allies and partners,\" while preventing proliferation by exercising restraint and continuing to participate in multilateral nonproliferation arrangements such as the Missile Technology Control Regime (MTCR) and Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. It explicitly commits the U.S. government to continue to meet the requirements of all applicable statues, including the AECA, the FAA, the International Emergency Economic Powers Act, and the annual NDAAs. NSPM-10 also prioritizes efforts to \"increase trade opportunities for United States companies, including by supporting United States industry with appropriate advocacy and trade promotion activities and by simplifying the United States regulatory environment.\" In addition, NSPM-10 directs the executive branch to consider the following in making arms transfer decisions: the national security of the United States, including the transfer's effect on the technological advantage of the United States; the economic security of the United States and innovation; relationships with allies and partners; human rights and international humanitarian law; and nonproliferation implications. The AECA, Section 38, also authorizes the President to issue regulations on the import and export of defense articles. As noted above, the catalog of defense articles subject to these regulations is called the United States Munitions List. The USML is found in federal regulations at 22 CFR 121. The series of federal regulations for importing and exporting of defense articlesâthe International Traffic in Arms Regulationsâis contained in Subchapter M, 22 CFR 120-130. The USML lists defense articles by category and identifies which of those articles are \"significant military equipment\" further restricted by provisions in the AECA. The President has delegated authority for administering the USML and associated regulations to the Secretary of State, who in turn has delegated this authority to the Deputy Assistant Secretary of State for Defense Trade Controls in the Bureau of Political-Military Affairs (PM). The Directorate of Defense Trade Controls (DDTC) is responsible for ensuring that commercial exports of defense articles and defense services advance U.S. national security objectives. DDTC also administers a public web portal for U.S. firms seeking assistance with exporting defense articles and services. The Department of Defense has a substantial role in the sale of defense articles to foreign countries through FMS, which DOD administers in coordination with the Department of State mainly through the Defense Security Cooperation Agency. DSCA provides procedures for FMS and certain other transfers of defense articles and defense services to foreign entities in its Security Assistance Management Manual (SAMM). The SAMM is used mainly by the military services, the Office of the Secretary of Defense, Special Operations Command (SOCOM), the regional combatant commanders, and country teams in U.S. embassies overseas, and it may also be consulted by foreign countries and U.S. defense contractors. The SAMM also provides the timelines and methods for coordinating FMS, cases with the State Department. The United States participates in two international agreements that broadly affect the transfer of U.S. defense articles: The Missile Technology Control Regime and the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. Other international agreements, such as the Treaty on the Nonproliferation of Nuclear Weapons (NPT), the Convention on the Physical Protection of Nuclear Material, the Chemical Weapons Convention, and the Biological and Toxin Weapons Convention, may limit exports of defense-related material, but only material linked to the development of nuclear, chemical, and biological weapons. The Missile Technology Control Regime, while not a treaty, is an informal and voluntary association of countries seeking to reduce the number of systems capable of delivering weapons of mass destruction (other than manned aircraft), and seeking to coordinate national export licensing efforts aimed at preventing their proliferation. The MTCR was originally established in 1987 by Canada, France, Germany, Italy, Japan, the United Kingdom and the United States. Since then, participation has grown to 35 countries. Member nations, by consensus, agree on common export guidelines (the MCTR Guidelines) on transfer of systems capable of delivering weapons of mass destruction, as well as an integral common list of controlled items (the MTCR Equipment, Software and Technology Annex). The annex is a list of controlled items â both military and dual-use â including virtually all key equipment, materials, software, and technology needed for the development, production, and operation of systems capable of delivering nuclear, biological, and chemical weapons. The annex is divided into \"Category I\" and \"Category II\" items. Partner countries exercise restraint when considering transfers of items contained in the annex, and such transfers are considered by each partner country on a case-by-case basis. The State Department, Directorate of Defense Trade Controls, administers the U.S. implementation of the MTCR and incorporates the MTCR guidelines and annex into the International Traffic in Arms Regulations and the U.S. Munitions List. In 1996, 33 countries, including the United States, agreed to the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. The arrangement aims \"to contribute to regional and international security and stability, by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilising accumulations.\" It maintains two control lists. One is a list of weapons, including small arms, tanks, aircraft, and unmanned aerial systems. The second is a list of dual-use technologies including material processing, electronics, computers, information security, and navigation/avionics. Dual-use, in this context, means items and technologies that can be used in both civilian and military applications. DDTC incorporates the Wassennar Arrangement into the ITAR and USML. Under the Export Control Act of 2018 (Subtitle B, Part 1, P.L. 115-232 ), the Department of Commerce is to \"establish and maintain a list\" of controlled items, foreign persons, and end-uses determined to be a threat to U.S. national security and foreign policy. The legislation also directs the Commerce Department to require export licenses; \"prohibit unauthorized exports, re-exports, and in-country transfers of controlled items\"; and \"monitor shipments and other means of transfer.\" The FMS program is the U.S. government-brokered method for delivering U.S. arms to eligible foreign purchasers, normally friendly nations, partner countries, and allies. The program is authorized through the AECA, with related authorities delegated by the President, under Executive Order 13637, to the Secretaries of State, Defense, and Commerce. The State Department (DOS) is responsible for the export (and temporary import) of defense articles andÂ services governed by the AECA, and reviews and submits to Congress an annual Congressional Budget Justification (CBJ) for security assistance. This also includes an annual estimate of the total amount of sales and licensed commercial exports expected to be made to each foreign nation as required by 22 U.S.C Â§2765(a)(2)). DOD generally implements the FMS program as a military-to-military program and serves as intermediary for foreign partners' acquisition of U.S. defense articles and services. Using what is commonly called the Total Package Approach , U.S. security assistance organizations must offer, in addition to specific defense articles, a sustainment package to help the buyer maintain and operate the article(s) effectively and in accord with U.S. intent. DOD follows the Defense Federal Acquisition Regulation Supplement (DFARS), except where deviations are authorized. Acquisition on behalf of eligible FMS purchasers must be in accordance with DOD regulations and other applicable U.S. government procedures. This arrangement affords the foreign purchaser the same benefits and protections that apply to DOD procurement, and it is one of the principal reasons why foreign governments and international organizations might choose to procure defense articles through FMS. FMS requirements may be consolidated with U.S. requirements or placed on separate contracts, whichever is more expedient and cost-effective. Purchasers must agree to pay in U.S. dollars, by converting their own national currency or, under limited circumstances, though reciprocal arrangements. When the purchase cannot be financed by other means, credit financing or credit guarantees can be extended if allowed by U.S. law. FMS cases can also be directly funded by DOS using Foreign Military Financing appropriations. When an eligible foreign purchaser (government or otherwise) decides to purchase or otherwise obtain a U.S. defense article or service, it begins the process by making the official request in the form of a letter of request (LOR) (See Figure 1 for an illustration of the process from receipt to case closure.) The letter may take nearly any form, from a handwritten request to a formal letter, but it must be in writing. The purchaser submits the LOR to a U.S. security cooperation organization (SCO), normally an Office of Defense Cooperation nested within the U.S. Embassy in the country, or directly to DSCA or an implementing agency (IA). The IA is usually a military department or DOD agency (e.g., Army Security Assistance Command, Navy International Programs Office, Air Force International Affairs). The LOR can be submitted in-country or through the country's military and diplomatic personnel stationed in the United States. Unless an item has been designated as \"FMS Only,\" DOD is generally neutral as to whether a country purchases U.S.-origin defense articles/services through FMS or DCS (discussed below). The AECA gives the President discretion to designate which military end-items must be sold exclusively through FMS channels. This discretion is delegated to the Secretary of State under Executive Order 13637 and, as a matter of policy, this discretion is generally exercised upon the recommendation of DOD. Once the U.S. SCO receives the LOR, it transmits the request to the relevant agencies (e.g., DSCA, IA) for consideration and export licensing. U.S. government responses to LORs include price and availability (P&A) data, letters of offer and acceptance (LOAs), and other appropriate actions that respond to purchasers' requests. If the IA recommends disapproval, it notifies DSCA, which coordinates the disapproval with DOS, as required, and formally notifies the customer of the disapproval. After approving the transfer of a defense article, the United States responds with a letter of offer and acceptance. The LOA is the legal instrument used by the USG to sell defense articles, defense services including training, and design and construction services to an eligible purchaser. The LOA itemizes the defense articles and services offered and when implemented becomes an official tender by the USG. Signed LOAs and their subsequent amendments and modifications are also referred to as \"FMS cases.\" The time required to prepare LOAs varies with the complexity of the sale. Within 60 days after the end of a quarter, the State Department, on behalf of the President, sends to the Speaker of the House, HFAC, and the chairman of the SFRC a report of, inter alia, LOAs offering major defense equipment valued at $1 million or more; all LOAs accepted and the total value; the dollar amount of all credit agreements with each eligible purchaser; and all licenses and approvals for exports sold for $1 million or more. The IA takes action to implement a case once the purchaser has signed the LOA and necessary documentation and provided any required initial deposit. The standard types of FMS cases are defined order, blanket order, and cooperative logistics supply support arrangement (CLSSA). A CLSSA usually accompanies sales of major defense articles, providing an arrangement for supplying repair parts and other services over a specified period after delivery of the articles. Defined order cases or lines are commonly used for the sale of items that require item-by-item security control throughout the sales process or that require separate reporting; blanket order cases or lines are used to provide categories of items or services (normally to support one or more end items) with no definitive listing of items or quantities. Defined order and blanket order cases are routinely used to provide hardware or services to support commercial end items, obsolete end items (including end items that have undergone system support buyouts), and selected non-U.S. origin military equipment. The case must be implemented in all applicable data systems (e.g., Defense Security Assistance Management System [DSAMS], Defense Integrated Financial System [DIFS], DSCA 1200 System, and Military Department [MILDEP] systems) before case execution occurs. The IA issues implementing instructions to activities that are involved in executing the FMS case. Case execution is the longest phase of the FMS case life cycle. Case execution includes acquisition, logistics, transportation, maintenance, training, financial management, oversight, coordination, documentation, case amendment or modification, case reconciliation, and case reporting. Case managers, normally assigned to the IAs, track FMS delivery status in coordination with SCOs. FMS records, such as case directives, production or repair schedules, international logistics supply delivery plans, requisitions, shipping documents, bills of lading, contract documents, billing and accounting documents, and work sheets, are normally unclassified. All case transactions, financial and logistical, must be recorded as part of the official case file. Cost statements and large accounting spreadsheets must be supported by source documents. LOA requirements are fulfilled through existing U.S. military logistics systems. With the exception of excess defense articles (EDA) or obsolete equipment, items are furnished only when DOD plans to ensure logistics support for the expected item service life. This includes follow-on spare parts support. If an item will not be supported through its remaining service life, including EDA and obsolete defense articles, an explanation should be included in the LOA. FMS cases may be amended or modified to accommodate certain changes. An amendment is necessary when a change requires purchaser acceptance. The scope of the case is a key issue for the IA to consider in deciding whether to prepare an amendment, modification, or new LOA. In defined order cases, scope is limited to the quantity of items or described services, including specific performance periods listed on the LOA. In blanket order cases, scope is limited to the specified item or service categories and the case or line dollar value. In CLSSAs, scope is limited by the LOA description of end items to be supported and dollar values of the cases. A scope change takes place when the original purpose of a case line or note changes. U.S. government unilateral changes to an FMS case are made by a modification and do not require acceptance by the purchaser. In all FMS cases, the firms then ship the defense articles to the foreign partner via a third-party freight forwarding company. The security cooperation organization, part of the U.S. embassy country team, may receive the item and hand it over to the purchaser, or the purchaser may receive it directly. The U.S. government and the purchaser's advanced planning for transportation of materiel is critical for case development and execution. DOD policy requires that the purchaser is responsible for transportation and delivery of its purchased materiel. Purchasers can use DOD distribution capabilities on a reimbursable basis at DOD reimbursable rates via the Defense Transportation System (DTS). Alternatively, purchasers may employ an agent, known as a Foreign Military Sales freight forwarder, to manage transportation and delivery from the point of origin (typically the continental United States) to the purchaser's desired destination. Ultimately, the purchaser is responsible for obtaining overseas customs clearances and for all actions and costs associated with customs clearances for deliveries of FMS materiel, including any intermediate stops or transfer points. Generally, title to FMS materiel is transferred to the purchaser upon release from its point of origin, normally a DOD supply activity, unless otherwise specified in the LOA. However, U.S. government security responsibility does not cease until the recipient's designated government representative assumes control of the consignment. While an export license is not required for the FMS transfers, registered U.S. firms may sell defense articles directly to foreign partners via licenses received from the State Department. In this case, the request for defense articles and/or defense services may originate as a result of interaction between the U.S. firm and a foreign government, may be initiated through the country team in U.S. embassies overseas, or may be generated by foreign diplomatic or defense personnel stationed in the United States. A significant difference between DCS licenses and FMS cases is that in DCS, the U.S government does not participate in the sale or broker the defense articles or services for transfer by the U.S. government to the foreign country. While DCS originates between registered U.S. firms and foreign customers, an application for an export license goes through a review process similar to FMS ( Figure 2 , below). DOS and DOD have agency review processes that assess proposed DCS transfers for foreign policy, national security, human rights, and nonproliferation concerns. In order for a U.S. firm to export defense articles or services on the U.S. Munitions List, it must first register with the State Department, Directorate of Defense Trade Controls. It must then obtain export licenses for all defense articles and follow the International Traffic in Arms Regulations. Once granted, an export license is valid for four years, after which a new application and license are required. To export a defense article through DCS, a U.S. defense firm must comply with ITAR requirements. The three Directorates of the State Department's Bureau of Political-Military Affairs publish policy, issue licenses, and enforce compliance in accord with the ITAR in order to ensure commercial exports of defense articles and defense services advance U.S. national security and foreign policy objectives. If marketing efforts involve the disclosure of technical data or the temporary export of defense articles, the defense firm must also obtain the appropriate export license from DDTC. DOD's Defense Technology Security Administration (DTSA) serves as a reviewing agency for the export licensing of dual-use commodities and munitions items and provides technical and policy assessments of export license applications. Specifically, it identifies and mitigates national security risks associated with the international transfer of critical information and advanced technology in order to maintain the U.S. military's technological edge and to support U.S. national security objectives. The ITAR includes many exemptions from the licensing requirements. Some are self-executing by the exporting firm who is to use them and normally are based on prior authorizations. Other exemptions (for example, the exemption in 22 CFR 125.4(b)(1) regarding technical data) may be requested or directed by the supporting military department or DOD agency. In contrast to FMS, DOD does not directly administer sales or facilitate transportation of items purchased under DCS, although, unless the host country requests that purchase be made through FMS, DOD tries to accommodate a U.S. defense firm's preference for DCS, if articulated. In addition, DOD does not normally provide price quotes for comparison of FMS to DCS. If a company or country prefers that a sale be made commercially rather than via FMS, and when a company receives a request for proposal from a country and prefers DCS, the company may request that DSCA issue a DCS preference for that particular sale. The particulars of each recipient country, U.S. firm, and sale determine whether FMS or DCS is preferred. Before approving DCS preference for a specific transaction, DSCA considers the following: Items provided through blanket order and those required in conjunction with a system sale do not normally qualify for DCS preference. FMS procedures may be required in sales to certain countries and for sales financed with Military Assistance Program (MAP) funds or, in most cases, with FMF funds. The DSCA Director may also recommend to the DOS that it mandate FMS for a specific sale. DCS preferences are valid for one year; therefore, during this time, if the IA receives from the purchaser a request for pricing and availability (P&A) or an LOA for the same item, it should notify the purchaser of the DCS preference. U.S. firms may request defense articles and services from DOD to support a DCS to a foreign country or international organization. Defense articles must be provided pursuant to applicable statutory authority, including 22 U.S.C. 2770, which authorizes the sale of defense articles or defense services to U.S. companies at not less than their estimated replacement cost (or actual cost in the case of services). The SCO chief and other relevant members of the country team normally meet with visiting U.S. defense industry representatives regarding their experiences in country. The SCO chief responds to follow-up inquiries from industry representatives with respect to any reactions from host country officials or subsequent marketing efforts by foreign competitors. The SCO chief alerts embassy staff to observe reactions of the host country officials on U.S. defense industry marketing efforts. As appropriate, the SCO chief can pass these reactions to the U.S. industry representatives. However, the SCO may not work on behalf of any specific U.S. firm; its only preference can be for purchasers to \"buy American.\" If the SCO chief believes that a firm's marketing efforts do not coincide with overall U.S. defense interests or have potential for damaging U.S. credibility and relations with the country, the SCO chief relays these concerns, along with a request for guidance, throughout the country team and to the Combatant Command, Military Department, and DSCA. If a partner is unable to purchase, or wishes to avoid purchasing, a newly-manufactured U.S. defense article, it may request transfer of Excess Defense Articles from DOD to its designated recipient. EDA refers to DOD and United States Coast Guard (USCG)-owned defense articles that are no longer needed and, as a result, have been declared excess by the U.S. Armed Forces. This excess equipment is offered at reduced or no cost to eligible foreign recipients on an \"as is, where is\" basis. As such, EDA is a hybrid between sales and grant transfer programs. DOD states that the EDA program works best in assisting friends and allies to augment current inventories of like items with a support structure already in place. All FMS eligible countries can request EDA. An EDA grant transfer to a country must be justified to Congress for the fiscal year in which the transfer is proposed as part of the annual congressional justification documents for military assistance programs. There is no guarantee that any EDA offer will be made on a grant basis; each EDA transfer is considered on a case-by-case basis. EDA grants or sales that contain significant military equipment or with an original acquisition cost of $7 million or more require a 30-calendar day congressional notification. Title to EDA items transfers at the point of origin, except for items located in Germany; those EDA items transfer title at the nearest point of debarkation outside of Germany. All purchasers or grant recipients must agree that they will not transfer title or possession of any defense article or related training or other defense services to any other country without prior consent from DOS pursuant to 22 U.S.C. Â§2753 and 22 U.S.C. Â§2314. The decision-making and execution involved in a transfer of defense articles or services includes myriad stakeholders, from the President and Congress to small, two-person Security Cooperation Organizations in embassies around the world. Having granted to the President authority to carry out arms sales and exports, Congress oversees its conduct. In further delegation of authority, the Secretaries of State and Defense, through their departments, carry out functions outlined in statute, federal regulations, and executive orders. All security assistance programs are subject to the continuous supervision and general direction of the Secretary of State, to be consistent with U.S. foreign policy interests. DOS ensures partner and purchaser eligibility for arms transfer(s) and obtains required assurances from recipient countries and organizations. The State Department also reviews and approves export license requests for direct commercial sales of items on the United States Munitions List. As mentioned above, DOS submits to Congress, in its Congressional Budget Justification, an annual estimate of the total amount of transfers expected to be made to each foreign nation and an annual arms sale proposal report (Javits Report) required by law. Within the State Department, the Bureau of Political-Military Affairs (PM) is the main administrator for arms transfers, whether FMS or DCS. PM provides policy direction for sale and export of defense articles related to international security, security assistance, military operations, defense strategy and plans, and defense trade. Under PM, the Office of Regional Security and Arms Transfers (RSAT) manages the sale/transfer of U.S.-origin defense articles and services to foreign governments. PM/RSAT, which is responsible for ensuring that all FMS cases are properly reviewed within the State Department for consistency with U.S. foreign policy and national security objectives, receives all FMS cases from DSCA, DOD's FMS implementing agency. PM/RSAT officers coordinate with other department bureaus and offices and provide recommendations to PM leadership on whether to approve potential FMS sales. Finally, PM/RSAT officers work with PM leadership and DOD to make the required notifications, to include briefing congressional staff on the Javits Report. Each U.S. embassy country team, under the direction of the State Department and led by the Chief of Mission (usually the U.S. Ambassador), prepares an Integrated Country Strategy (ICS) detailing mission plans for engagements with the host country, including defense education, training, arms transfers, and other cooperation. Within the country team, the senior defense official (SDO) directs the preparation of the defense cooperation portion of ICS. The embassy's SCO (see footnote 41 ), normally called the Chief of the Office of Defense Cooperation (ODC Chief), annually forecasts and documents the budget for defense cooperation activities, based upon his or her own contacts with the host nation military and those of the SDO and other military stationed in-country. Both the SDO and ODC Chief work under the direct supervision of the Chief of Mission but report to, and are evaluated by, the geographic combatant command (COCOM) in the operational area where the host nation lies. They manage the delicate task of balancing the COCOM's view of necessary security cooperation and capacity-building activities with relevant State Department officials' views. The SDO and ODC Chief may submit their recommendations directly to both the Head of Mission and to the COCOM. Where there is a large ODC, with subordinate service representative offices, the service representatives may submit service-specific forecasts and budgets to their service and its implementing agency as well. The COCOM views may or may not be reflected in the mission's ICS submission, as the Head of Mission ultimately decides what the mission will forward. Many countries that receive U.S.-made defense articles and services have organizations similar to an ODC in their embassies or consulates in the United States. They interact with both State Department and DOD officials, as well as U.S. defense contractors, to initiate and coordinate pre-LOR (for FMS) or pre-DCS actions. Notwithstanding the primary role of the State Department, DOD plays a central role in shaping arms sales policy and implementing arms transfers (as noted in sections above outlining the processes for FMS and DCS). DOD Directive 5132.03 promulgates DOD Policy and Responsibilities Relating to Security Cooperation, based on the National Defense Strategy and the National Military Strategy. Within DOD security cooperation, the Theater Campaign Plan (TCP) balances U.S. government strategic imperatives with host nation military-to-military engagement. Each country section of the TCP identifies significant security cooperation initiatives planned for the country and articulates specific, measurable, attainable, relevant, and time-bound objectives in support of such initiatives. The regional COCOM's corresponding, subordinate country cooperation plans drive the specific transfers of defense articles and services, including major arms transfers and training events. The objectives set within these strategies take into account the host nation's security environment, political will, willingness and ability to protect sensitive information and technologies, and absorptive capacity, as well as policy and legal constraints. The COCOM then passes its recommendations for FMS and EDA arms transfers to the Chairman of the Joint Chiefs of Staff (CJCS) and to the Under Secretary of Defense for Policy (USD (P)) for inclusion in the integrated country strategy and the joint regional strategy; they also identify obstacles to execution of plans, including shortfalls in security cooperation authorities or resources, joint capability shortfalls, or shortfalls in partners' capabilities. The CJCS is generally charged with providing military advice to the Secretary of Defense concerning security cooperation. The CJCS and the USD(P) are charged with developing and managing a process to address obstacles to campaign plan execution that the COCOMs identify. The office of the USD(P) is generally charged with representing DOD in security assistance and security cooperation matters, setting DOD's security cooperation priorities, and harmonizing these within a whole-of-government approach to engagements with allied and partner nations. The one assistant charged purely with leading security cooperation is the Director of the Defense Security Cooperation Agency. Selected tasks of this officer, normally a 3-star general or flag officer, working directly for the USD (P), include providing guidance to the DOD Components and DOD representatives to U.S. missions (i.e. senior defense officials) for the execution of DOD security cooperation programs; managing and administering those Title 10 and 22 programs for which DSCA has responsibility, consistent with security cooperation priorities; and coordinating the development of foreign disclosure and sales policies and procedures for defense information, technology, and systems (with the USD(P) and USD (Sustainment). In sum, DOD generally implement security cooperation programs on behalf of the Department of State, as part of broader foreign policy and national security strategies. Based on its authority under Title 22, the State Department must arbitrate among a large number stakeholders (e.g., partner nations, embassy country teams, COCOMs, Joint Staff and Office of the Secretary of Defense) and interests (e.g., economic gain for U.S. firms, technology security, long-term national security of the United States and its partners). The Arms Export Control Act (AECA) directs the President to establish a program that provides for the end-use monitoring for all defense articles and defense services sold, leased, or exported under the act. The program is required to provide reasonable assurance that the recipient is complying with the requirements imposed by the U.S. government with respect to use, transfers, and security of the articles and services, as well as that such articles and services are being used for the purposes for which they were provided. The executive branch has two formal EUM programs: Blue Lantern is for Direct Commercial Sales, while Golden Sentry is for Foreign Military Sales. If exported defense articles require specialized physical security and accounting, the Golden Sentry program conducts specialized Enhanced EUM. The State Department's Directorate for Defense Trade Controls administers the Blue Lantern program for articles and services on the USML exported via DCS. According to DOS, it includes pre-license, post-license, and post-shipment checks to verify the bona fides of foreign country consignees and end users, as well as verifying the legitimacy of proposed transactions and the compliance with U.S. defense export rules and policies. Typically conducted by U.S. embassy and consular staff, verifications occur in over 100 countries every year. If the Blue Lantern check determines an unfavorable use, it may result in the denial or revocation of the export license, the violator's entry on DDTC's watch list, or referral to Homeland Security Investigations or the FBI. In FY2018, with 35,779 authorized DCS export license applications, DOS initiated 466 Blue Lantern checks (268 pre-license, 89 post-shipment, and 109 containing both pre-license and post-shipment checks) in over 70 countries. In the same year, DOS closed 585 Blue Lantern cases, with 168 labeled \"unfavorable.\" The Defense Security Cooperation Agency administers DOD's Golden Sentry program, which is the FMS counterpart of State's Blue Lantern program. Golden Sentry's objective is to ensure compliance with technology control requirements and to provide reasonable assurance that the recipients are complying with U.S. government requirements with respect to the use, transfer, and security of defense articles and services. The program includes actions to prevent misuse or unauthorized transfer of the articles or services from title transfer until disposal, with the type of article or service generally determining the level of monitoring required. In routine EUM, DOD's Security Cooperation Organizations (SCOs) are required to observe and report any potential misuse or unapproved transfer of FMS articles or services to the regional COCOM, DSCA, and the State Department. They must conduct their checks at least quarterly, and must document their checks in reporting to DSCA. In the case of arms, ammunition, and explosives, SCOs are required to apply the same standards of U.S. control to the items upon release to the purchaser. Some security-sensitive exported or transferred defense articles require specialized physical security and accounting. These items are designated as requiring Enhanced End-Use Monitoring (EEUM) by a military service's export policy, or by interagency agreement, or through DOD policy resulting from consultation with Congress. The EEUM program is administered through Golden Sentry and requires DOD's SCOs in-country to conduct planned and coordinated visits to host nation installations, where they verify by serial number each EEUM-designated item on an annual basis. Section 1 of the AECA states, \"An ultimate goal of the United States continues to be a world which is free from the scourge of war and the dangers and burdens of armaments; in which the use of force has been subordinated to the rule of law; and in which international adjustments to a changing world are achieved peacefully. In furtherance of that goal, it remains the policy of the United States to encourage regional arms control and disarmament agreements and to discourage arms races.\" The AECA proceeds to acknowledge and allow that arms transfers and cooperation are necessary to \"maintain and foster the environment of international peace and security essential to social, economic, and political progress.\" These two paragraphs appear to draw a distinction between the policy aims of arms production and transfer on the one hand and, on the other, the burden [emphasis added] thereof as separate from economic endeavor and progress. Current Administration policy contained in NSPM-10 is to \"bolster the security of the United States and our allies and partners,\" while preventing proliferation by exercising restraint and continuing to participate in multilateral nonproliferation arrangements such as the Missile Technology Control Regime and the Wassenaar Arrangement. It explicitly commits the U.S. government to continue to meet the requirements of all applicable statues, including the AECA, the FAA, the International Emergency Economic Powers Act, and the annual NDAAs. It also prioritizes efforts to \"increase trade opportunities for United States companies, including by supporting United States industry with appropriate advocacy and trade promotion activities and by simplifying the United States regulatory environment.\" The document adds \"a dynamic defense industrial base\" as a named employment source and stipulates \"economic security\" as a requirement for national security and defense. Congress may consider whether current sales and exports of defense articles and services, at current levels, bolster the security of the U.S. and its allies, while simultaneously fostering U.S. industry and innovation. Overall, should the goals of increasing trade opportunities for U.S. companies be an explicit goal of U.S. arms sales policy? In light of the potential differences between 10 U.S.C. Â§ 2151 and the current United States Conventional Arms Transfer Policy, Congress may consider whether to reformulate the goals of the Arms Export Control Act in light of the contemporary national security situation, whether and to what extent economic security comprises a facet of national security including any effect on the defense industrial base (DIB) and the national technical industrial base (NTIB), and whether to determine the value of U.S. national arms production and export as part of overall U.S. exports and the degree to which desirability of arms production contributes to real long term economic growth. In FY2018, foreign entities purchased $47.71 billion in FMS cases and the value of privately contracted DCS authorizations licensed by the State Department totaled $136.6 billion (see Table 1 and Table 2 , above). Congress may consider if this amount of annual arms sales is consistent with the intent of statute governing these sales. The FAA expresses, as U.S. policy, \"the efforts of the United States and other friendly countries to promote peace and security continue to require measures of support based upon the principle of effective self-help and mutual aid.\" The AECA states that \"all such sales be approved only when they are consistent with the foreign policy of the United States, the purposes of the foreign assistance programâ¦, and the economic and financial capability of the recipient country, with particular regard being given, where appropriate, to proper balance among such sales, grant military assistance, and economic assistance as well as to the impact of the sales on programs of social and economic development and on existing or incipient arms races.\" Section 1 of the AECA further limits U.S. arms sales, as policy, to levels extant when it was enacted: It is the sense of the Congress that the aggregate value of defense articles and defense services- (1) which are sold under section 2761 or section 2762 of this title; or (2) which are licensed or approved for export under section 2778 of this title to, for the use, or for benefit of the armed forces, police, intelligence, or other internal security forces of a foreign country or international organization under a commercial sales contract; in any fiscal year should not exceed current levels. Congress may consider whether and how it measures the relation between the 1976 level of arms sales and any contemporary level. Some critics of current EUM programs point to a potential disparity between the number of defense articles exported and the number of EUM investigations completed. For example, in the State Department's Blue Sentry Program in FY2018, DDTC authorized 35,779 export license applications. DOS initiated 466 Blue Lantern checks (268 pre-license, 89 post-shipment, and 109 containing both pre-license and post-shipment checks) in over 70 countries. This represents approximately 1.3 percent of adjudicated license applications. The State Department employed five full-time employees and six contractors to administer the program. Some analysts have argued that such a small staff could not possibly track everything that happens to billions of dollars' worth of defense articles transferred to dozens of foreign countries each year. Acting Assistant Secretary of State for Political-Military Affairs Tina Kaidanow testified that under current programs, there are a number of steps that the U.S government can take to endure proper end use of exported defense articles. She noted further that most U.S defense manufacturers are responsible for ensuring compliance with the ITAR, with personnel dedicated to ensuring such compliance while working closely with the State Department to address any compliance issues that may arise. Since the enactment of the Foreign Assistance Act (FAA) in 1961, Congress has amended both the FAA and the AECA, as well as Title 10 U.S.C. (governing DOD) in order to limit the sale and export of U.S. defense articles to certain foreign countries. Additional limitations have been enacted in the annual State/Foreign Operations and Related Programs Appropriations Acts, and through the National Defense Authorization Acts. The following illustrative examples are not intended to be comprehensive. Restrictions Based on Human Rights Violations Section 502B(a)(2) of the FAA (22 U.S.C. 2304(a)(2)) prohibits, absent the exercise of a presidential waiver, security assistance to any country where the government engages in a consistent pattern of gross violations of internationally recognized human rights. \"Security assistance\" is defined here to include \"sales of defense articles or services, extensions of credits (including participations in credits), and guaranties of loans\" under the AECA. The U.S. \"Leahy Laws,\" Section 620M of the FAA and 10 U.S.C. Â§ 362, prohibit U.S. security assistance to foreign security force units when credible evidence exists that the unit has committed a gross violation of human rights. However, these laws do not define security assistance, and in practice the executive branch applies them only to U.S.-funded transactions, excluding FMS or DCS. The Child Soldiers Prevention Act of 2008 ( P.L. 110-547 , 22 U.S.C Â§2370c-1), prohibits assistance to and licensing for direct commercial sales of military equipment to the government of a country that is clearly identified as having governmental armed forces, police, or other security forces, or government-supported armed groups, that recruit or use child soldiers. The Victims of Trafficking and Violence Protection Act of 2000, P.L. 106-386 , amended Section 502B of the FAA to require that the President report to the Congress on countries found to be involved in extreme forms of trafficking of persons. The act prohibits nonhumanitarian and nontrade-related aid, including security assistance, to countries that do not comply with minimum standards for eliminating trafficking in persons, subject to presidential waiver. Restrictions on Countries Supporting Terrorism Section 40 of the AECA (22 U.S.C. Â§2780) prohibits exporting or otherwise providing, directly or indirectly, any munitions item to a country whose government has repeatedly provided support for acts of international terrorism. Section 40A (22 U.S.C. Â§2781) prohibits any defense article or defense service from being sold or licensed for export to any county the President determines is not cooperating fully with United States antiterrorism efforts. The prohibitions contained in this section do not apply with respect to any transaction subject to reporting requirements under title V of the National Security Act of 1947, 50 U.S.C. Â§3091 et seq. Restrictions on the Process of Foreign Military Sales Section 830 of the FY2017 National Defense Authorization Act, P.L. 114-328 , required the Secretary of Defense to prescribe regulations to require the use of firm fixed-price contracts for Foreign Military Sales. Restrictions and Limitations on Specific Countries and Regions Libya: Section 404 of the International Security and Cooperation Act of 1985, P.L. 99-83 , which amended the FAA (22 U.S.C. Â§2439aa-8), authorized the President to prohibit any goods or technology, including technical data or other information, from being exported to Libya. Middle East Countries, Excluding Israel: Section 36(h)(1) of the AECA, P.L. 90-629 , 22 U.S.C Â§2776(h)(1), requires any certification relating to a proposed sale to Middle East countries, excluding Israel, to include a determination that the sale or export of the defense articles or defense services will not adversely affect Israel's qualitative military edge over military threats to Israel. West Bank and Gaza: Section 699 of the FY2003 Foreign Relations Authorization Act, P.L. 107-228 , prohibits the sale of defense articles or defense services to any person or entity whom \"the President determines, based on a preponderance of the evidence, â¦ has knowingly transferred proscribed weapons to Palestinian entities in the West Bank or Gaza,\" for two years after congressional notification. Iraq: The FY2008 NDAA, Section 1228, P.L. 110-181 , required the President to implement a policy to control the export and transfer of defense articles into Iraq, with no defense articles to be provided to the Government of Iraq until the President certified to Congress that a registration and monitoring system was in place. Arab League Boycott of Israel: Section 564 of the Foreign Relations Authorization Act, Fiscal Years 1994 and 1995, P.L. 103-236 , stated, \"No defense article or defense service may be sold or leased by the United States Government to any country or international organization that, as a matter of policy or practice, is known to have sent letters to United States firms requesting compliance with, or soliciting information regarding compliance with, the Arab League secondary or tertiary boycott of Israelâ¦\" Saudi Arabia and Kuwait: Section 104 of the Dire Emergency Supplemental Appropriations and Transfers for Relief from the Effects of Natural Disasters, for Other Urgent Needs, and for Incremental Costs of \"Operation Desert Shield/Desert Storm\" Act of 1992, P.L. 102-229 , prohibited any funds appropriated in the act to conduct, support, or administer any sale of defense articles or defense services to Saudi Arabia or Kuwait until that country paid in full their commitments to the United States made during Operation Desert Shield/Storm. Restrictions on Defense Articles Related to Nuclear, Biological, and ChemicalÂ Weapons The AECA has a series of provisions limiting the export of defense items related to nuclear, biological, and chemical weapons (22 U.S.C. Â§2799aa). Those controls are explained in detail in CRS Report R41916, The U.S. Export Control System and the Export Control Reform Initiative , by Ian F. Fergusson and Paul K. Kerr.", "summary": "The sale and export of U.S.-origin weapons to foreign countries (\"defense articles and defense services,\" officially) are governed by an extensive set of laws, regulations, policies, and procedures. Congress has authorized such sales under two laws: The Foreign Assistance Act (FAA) of 1961, 22 U.S.C. Â§2151, et seq. The Arms Export Control Act (AECA) of 1976, 22 U.S.C. Â§2751, et seq. The FAA and AECA govern all transfers of U.S.-origin defense articles and services, whether they are commercial sales, government-to-government sales, or security assistance/security cooperation grants (or building partnership capacity programs provided by U.S. military personnel). These measures can be provided by Title 22 (Foreign Relations) or Title 10 (Armed Services) authorities. Arms sold or transferred under these authorities are regulated by the International Traffic in Arms Regulations (ITAR) and the U.S. Munitions List (USML), which are located in Title 22, Parts 120-130 of the Code of Federal Regulations (CFR). The two main methods for the sale and export of U.S.-made weapons are the Foreign Military Sales (FMS) program and Direct Commercial Sales (DCS) licenses. Some other arms sales occur from current Department of Defense (DOD) stocks through Excess Defense Articles (EDA) provisions. For FMS, the U.S. government procures defense articles as an intermediary for foreign partners' acquisition of defense articles and defense services, which ensures that the articles have the same benefits and protections that apply to the U.S. military's acquisition of its own articles and services. For DCS, registered U.S. firms may sell defense articles directly to foreign partners though licenses and agreements received from the Department of State. Firms are still required to obtain State Department approval, and for major sales DOD review and congressional notification is required. In some cases where U.S. firms have entered into international partnerships to produce some major weapons systems, comprehensive export regulations under 22 CFR 126.14 are intended to allow exports and technical data for those systems without having to go through the licensing process. Congress has amended the FAA and AECA to restrict arms sales to foreign entities for a variety of reasons . These include restrictions on transfers to countries that violate human rights and states that support terrorism, as well as limitations on specific countries at certain times, such as any Middle East countries whose import of U.S. arms would adversely affect Israel's qualitative military edge. Arms transfers to Taiwan are governed under the Taiwan Relations Act of 1979, P.L. 96-8 , 22 U.S.C. Â§ 3301 et seq. Under the AECA, Congress can also overturn individual notified arms sales via a joint resolution . During the 116 th Congress, such joint resolutions were introduced in opposition to planned arms sales to Saudi Arabia, but did not pass . All U.S. defense articles and defense services sold, leased, or exported under the AECA are subject to end-use monitoring (to provide reasonable assurance that the recipient is complying with the requirements imposed by the U.S. government with respect to use, transfers, and security of the articles and services) to be conducted by the President (Section 40A of the AECA) to ensure compliance with U.S. arms export rules and policies. FMS transfers are monitored under DOD's Golden Sentry program and DCS transfers are monitored under the State Department's Blue Lantern program.", "document_type": "crs"}
{"report": "The United States and Liberia have maintained diplomatic relations for more than 150 years. Close ties endured in the 20th centuryâunderpinned by U.S. investment in the rubber sector and robust political, development, and defense cooperation during the Cold Warâbut they came under strain during Liberia's two civil wars (1989-1997 and 1999-2003). The United States provided substantial humanitarian assistance in response to those conflicts and helped mediate an end to each war, and the U.S. military briefly deployed a task force to assist peacekeepers and support aid delivery after the conflict. U.S.-Liberia ties improved considerably during the tenure of former President Ellen Johnson Sirleaf (in office 2006-2018) and have remained close under current President George Weah (inaugurated in 2018). Congress has shown enduring interest in Liberia and has held periodic hearings on the country. Since the end of the second civil war, Congress has appropriated over $2.4 billion in State Department- and USAID-administered assistance to support Liberia's stabilization, recovery, and development. Such aid has centered on promoting good governance, strengthening the rule of law, reforming the security sector, improving service delivery, and spurring inclusive economic development. Congress provided roughly $600 million in additional State Department- and USAID-administered assistance to help combat the 2014-2016 Ebola outbreak in Liberia, where the U.S. governmentâin collaboration with Liberian authorities and U.N. agenciesâplayed a lead role in the response. In recent years, several Members of Congress have sought to adjust the immigration status of over 80,000 Liberian nationals resident in the United States, some of whom originally came to the United States as refugees. Members regularly travel to Liberia, including under a House Democracy Partnership legislative engagement program initiated in 2006. The United States and Liberia established diplomatic relations in 1864, nearly two decades after Liberia declared independence from the American Colonization Society, a U.S. organization that resettled freed slaves and freeborn African-Americans in Liberia. A small elite dominated by \"Americo-Liberians,\" descendants of this settler population, held a monopoly on state power until a 1980 military coup d'Ã©tat. Under President Samuel Doe, economic mismanagement, corruption, and repression along ethnic lines characterized much of the ensuing decade. In 1989, Charles Taylor, a Liberian former civil servant who had fled to the United States after falling out with Doe, launched a rebellion from neighboring CÃ´te d'Ivoire. Factional violence soon engulfed the country. Hundreds of thousands died and \"virtually all\" Liberians fled their homes at some point during Liberia's first civil war. After a series of abortive ceasefires, the war ended in a peace accord and general elections in 1997, which Taylor won by a wide margin. In 1999, an incursion by Liberian rebels based in neighboring Guinea grew into a second nationwide conflict that pitted Taylor's army against two insurgent factions. After years of fighting, a rebel assault on the capital, Monrovia, and mounting international pressureâincluding U.N. sanctions and a public demand from President George W. Bush that Taylor resignâultimately forced Taylor to step down in 2003. Days later, a peace agreement officially ended the conflict and laid the foundations for a transitional government. The U.N. Security Council established a peacekeeping mission, the U.N. Mission in Liberia (UNMIL), in September 2003 to help stabilize the country. Liberia's wars impeded social service provision, devastated the economy, and destabilized the broader region. Notably, Taylor provided material support to rebels in neighboring Sierra Leone during that country's civil war (1991-2002). In 2006, Taylor was arrested in Nigeria (where he had been granted asylum upon stepping down in 2003) on a warrant issued by the Special Court for Sierra Leone (SCSL), a U.N.-mandated judicial body created to prosecute crimes perpetrated during the Sierra Leonean civil war. In 2012, the SCSL convicted Taylor of war crimes in relation to his support for Sierra Leonean rebels; he is now serving a 50-year sentence in a prison in the United Kingdom. To date, a similar tribunal to prosecute atrocities committed during Liberia's wars has not been established, spurring perceptions of impunity and mounting calls by civil society and some legislators for the creation of a war crimes court for Liberia (see \" Postwar Transitional Justice Efforts \"). Taylor's ex-wife and several former associates remain active in Liberian politics, as do figures formerly associated with various armed factions. President Ellen Johnson Sirleaf, a Harvard-educated former Finance Minister and U.N. official, won election in 2006, putting an end to a three-year transitional government led by Taylor's vice president. During her two terms in office, Sirleaf won praise for overseeing a postwar transition marked by political stability and, until the Ebola outbreak in 2014, rapid economic growth. Africa's first elected female head of state, Sirleaf bolstered confidence among donors, drawing large inflows of U.S., Chinese, and multilateral assistance. Such aid financed the rehabilitation of infrastructure and a range of other development and stabilization efforts. Sirleaf also secured almost $5 billion in external debt relief and oversaw an expansion in state revenues. The United Statesâlong the largest bilateral donor to Liberiaâprovided significant assistance to Sirleaf's administration, funding programs to spur economic growth and development, reform the security sector, promote good governance, and build state capacity (see \" U.S. Relations and Assistance \"). The Sirleaf administration took steps to rehabilitate Liberia's global standing. The U.N. Security Council had imposed various sanctions in response to Liberia's civil wars, including embargoes on imports of arms into the country and on exports of rough diamonds and timber of Liberian origin. As Liberia stabilized and the Sirleaf government enacted sectoral reforms, these sanctions were gradually lifted. The Security Council lifted the last arms embargo, on non-state actors, in 2016, ending the U.N. sanctions regime. (The Obama Administration lifted U.S. targeted sanctions on Taylor and key associates in late 2015.) Also in 2016, UNMIL officially transferred national security duties to Liberian authorities in anticipation of full withdrawal in 2018. Sirleaf's international standing arguably surpassed her popularity among Liberians. Despite rapid economic growth, her administration struggled to meet high expectations for Liberia's postwar trajectory. Extreme poverty remained widespread throughout her tenure, and her government failed to implement key recommendations of Liberia's postwar Truth and Reconciliation Commission (TRC), such as the creation of a war crimes court. Several corruption scandals arose during her tenure, and she drew criticism for appointing her sons to state posts. Her administration's response to the 2014-2016 Ebola outbreak reportedly featured financial irregularities and a heavy-handed approach by security forces. Some of these shortcomings reasonably could be attributed to structural challenges, such as corruption, low institutional capacity, deficiencies in education and health service provision, and infrastructure gaps. The October 2017 presidential and legislative polls were Liberia's third set of postwar general elections. Constitutional term limits barred Sirleaf from seeking reelection. Approaching the polls, the opposition Congress for Democratic Change party, led by professional soccer star-turned-politician George Weah, allied with the National Patriotic Party of Jewel Howard-Taylor (an ex-wife of Charles Taylor) to form the Coalition for Democratic Change (CDC). Weah won the presidency with 62% of votes in a runoff against incumbent Vice President Joseph Boakai of Sirleaf's Unity Party (UP). Despite some violence and a short-lived legal challenge over alleged fraud in the first round of polls, election observers from the U.S. National Democratic Institute (NDI) lauded the election as a \"historic achievement for the country.\" Concurrent House of Representatives elections resulted in a slim plurality for Weah's party, which took 21 out of 73 seats, ahead of the UP, which took 20. Ten parties and thirteen independents claimed the rest. The United States, the European Union (EU), and other donors provided substantial support for the 2017 elections. U.S. support included the $17 million, USAID-funded Liberia Elections and Political Transition (LEPT) project, under which the U.S. International Foundation for Electoral Systems (IFES) and NDI provided technical assistance to the National Elections Commission (NEC), supported voter education initiatives targeting women and people with disabilities, and enhanced civil society oversight of voting and other electoral processes. President Weah, who took office in January 2018, gained prominence as a European league soccer star prior to his foray into politics. His lack of formal education was a point of criticism during an unsuccessful bid for the presidency in 2005; he went on to earn a high school diploma and, later, an undergraduate business degree in the United States. In 2014, he won a Senate seat representing Montserrado County, which surrounds Monrovia. His choice of then-Senator Jewel Howard-Taylor as his running mate in the 2017 election hinted at the enduring influence of Charles Taylor and his associates in Liberia's politics. As a legislator, Howard-Taylor sparked controversy by attempting to make homosexuality a felony punishable by death and to amend the constitution to declare Liberia a Christian state, despite its sizable Muslim minority. Goodwill surrounding Weah's inaugurationâwhich marked Liberia's first electoral transfer of power since 1944 and paved the way for UNMIL's withdrawalâhas dissipated as several high-profile corruption scandals have undermined his political standing. Weah initially drew criticism for failing to disclose his assets prior to taking office, as required of all senior public officials. He ultimately declared his assets in 2018, though the disclosure has remained confidential. Since Weah's inauguration, a number of his associates reportedly have been awarded public contracts, including for large infrastructure projects. Meanwhile, Weah's attempt to nominate a political ally, former Speaker of the House Alex Tyler, to the board of ArcelorMittal, Liberia's largest iron ore producer, prompted significant pushback in local media, given an open inquiry into bribery allegations against Tyler. Weah ultimately withdrew the nomination. (Tyler was later acquitted.) Among the highest-profile scandals that have arisen under Weah was the reported disappearance, in late 2018, of a shipping container holding 15.5 billion Liberian dollars ($104 million). Officials issued contradictory statements about the \"missing millions,\" which the Sirleaf government had procured but whose delivery to Liberia extended into the Weah administration. A U.S. Embassy-contracted inquiry by Kroll Associates, a corporate investigations firm, found no evidence that banknotes had disappeared but documented \"discrepancies at every stage\" of the procurement and delivery processes. The review also raised concerns regarding the \"potential misappropriation of banknotes\" and \"opportunities for money laundering\" in the course of the Weah government's mid-2018 infusion of $25 million U.S. dollars into the monetary system to replace Liberian dollars in an effort to control inflation. (Liberia has two official currencies, the Liberian dollar and the U.S. dollar.) Several former central bank officials, including former President Sirleaf's son, have been charged in the scandal. A USAID technical assistance program, to be implemented by Kroll Associates, aims to enhance the Central Bank's currency management processes. Concerns also have centered on the Weah administration's management of donor assistance, a key source of financing for development efforts. In mid-2019, the U.S. ambassador to Liberia and several foreign counterparts sent a joint letter to the government signaling discontent with the Weah administration's use of aid funds for unintended purposes. The Weah administration publicly acknowledged that it had used aid funds to pay state salaries, but claimed that it had later restored donor accounts. Separately, press reports emerged that the U.N. Resident Coordinator in Liberia had sent a letter to the government over concerns about delayed and inaccurate financial reporting on U.N.-funded activities. In late 2019, the World Bank reportedly demanded that the government refund certain ineligible expenses identified during a project review. According to the State Department's congressionally mandated fiscal transparency report, \"foreign assistance receipts, largely project-based, were neither adequately captured in the budget nor subject to the same audit and domestic oversight as other budget items\" in 2018, the latest reporting year. In June 2019, simmering discontent over alleged corruption and mismanagement by the Weah administration gave way to large-scale anti-government protests in Monrovia. Headed by the Council of Patriots (COP), a coalition of opposition politicians and activists, the demonstrators called for an audit of all state ministries and petitioned Weah to publicly disclose his assets. The government drew criticism for its response to the protests, during which it blocked social media access. In January 2020, thousands of protesters joined COP-led demonstrations in Monrovia, which police dispersed with tear gas. The Independent National Commission on Human Rights, a state body, has called for an inquiry into allegations of excessive force by security forces. In a joint statement, the ambassadors of the United States, EU, and Economic Community of West African States (ECOWAS) lauded the security forces' management of the demonstrations but noted \"with regret\" the government's decision to disperse peaceful protesters without warning. Human rights groups and press freedom advocates have condemned what they have described as a crackdown on COP leader Henry Costa, a radio host who currently lives in the United States. Annual GDP growth averaged 7.4% over the decade following the end of Liberia's second conflict, as substantial donor assistance helped power a fragile postwar recovery and modest development gains. Foreign direct investment (FDI) significantly increased under President Sirleaf, mostly concentrated in the mining, palm oil, rubber, and timber industries. The 2014 Ebola outbreak and a simultaneous slump in global commodity prices cut short this expansion: Liberia's economy contracted by 1.6% in 2016 before rebounding to 2.5% growth the following year owing to expanded gold, rubber, and palm oil exports. The International Monetary Fund (IMF) projects a contraction of 1.4% in 2019 due to slowing aggregate demand, followed by a recovery to 1.4% growth in 2020 due to an expected rise in consumption. Since 2017, a weakening of the Liberian dollar (which depreciated by 26% in 2018) and rising inflation (which stands at around 30%) have undermined local purchasing power and living standards. The World Bank projects a rise in the household poverty rate from 42% in 2018 to 44% by 2021; the rural poverty rate, estimated at 72%, is more than double that of urban areasâa longstanding pattern. The IMF predicts average annual growth of 3.0% between 2020 and 2023, a rate likely insufficient to raise living standards adequately for a population growing at 2.6% per year. Infrastructure gaps, low electricity access (estimated at 17% nationally and 3% in rural areas), poor service delivery, corruption, and an uncompetitive business climate all threaten growth prospects. Liberia ranked fifth lowest globally in the World Bank's 2018 Human Capital Index (HCI), a survey of health and education indicators. The government has struggled to marshal donor assistance for its ambitious Pro-Poor Agenda for Prosperity and Development (PAPD, 2018-2023), which centers on infrastructure investments and social service improvements. The government relies heavily on exports of rubber, gold, iron ore, diamonds, and palm oil for state revenues and foreign exchange, but these sectors have created minimal local employment. The multinational firms ArcelorMittal and Firestone, which are engaged in the extraction of iron and rubber, respectively, are among Liberia's largest private sector actors, though low global commodity prices have prompted both companies to downsize operations in recent years. Most working-age Liberians remain engaged in subsistence agriculture. According to the World Bank, infrastructure gaps, high transport costs, limited market information, and inadequate public sector support have discouraged a shift toward more productive agricultural activity. At the same time, few households produce enough food for family consumption, and Liberia depends on imports of key staple foods, such as rice and cassava, despite ample rainfall and fertile land. Rural poverty drives high rates of food insecurity and malnutrition. Liberia ranked 112 out of 117 countries surveyed on the International Food Policy Research Institute's 2019 Global Hunger Index, a composite ranking of undernourishment and related indicators. A 2018 analysis by the Liberian government and international partners found that 18% of Liberians faced moderate to severe food insecurity, meaning they regularly lack food and consistently do not consume a diet of adequate quality. Roughly 36% of children under five years old are \"stunted,\" or too short for their ageâa risk indicator of impaired cognitive and physical development. Low global oil prices and a poor business climate have dimmed interest in Liberia's nascent oil and gas sector. Several U.S. oil firms, including Chevron, ExxonMobil, and Anadarko Petroleum, have relinquished licenses to offshore blocks, in some cases following unsuccessful exploration activities. According to the State Department, foreign investors have cited corruption as a key obstacle to engagement in Liberia, with graft perceived to be \"most pervasive in government procurement, contract and concession awards, customs and taxation systems, regulatory systems, performance requirements, and government payments systems.\" According to State Department monitors, key human rights challenges in 2018 included extrajudicial killings by police, arbitrary and prolonged detention, and harsh and overcrowded prison conditions. Additional challenges included discrimination and violence against women and marginalized communities. While Weah earned plaudits for supporting a new press freedom act, which repealed various criminal statutes that had been used to harass and arrest journalists, his government also has targeted opposition media figures and shuttered critical news outlets. Reporters have faced harassment and violence from government officials, including members of the national legislature, and press outlets self-censor to evade persecution. Sexual and gender-based violence is widespread; the State Department reports that rape remains \"a serious and pervasive problem\" despite efforts to address the issue by successive governments as well as nongovernmental organizations operating in Liberia. Access to justice is constrained by an under-resourced, uneven, and often ineffective justice system in which judicial corruption is common, and by social practices and attitudes that discourage reporting and prosecution. In August 2019, President Weah signed into law the Domestic Violence Act, which criminalizes various forms of intimate partner violence, including spousal rapeâlong excluded from legal definitions of sexual assault. That legislation ultimately did not include a provision that would have criminalized female genital mutilation/cutting (FGM/C), which Liberia's legislature has not prohibited despite considerable pressure from the Sirleaf and Weah administrations, donors, and domestic and international civil society groups. The practice remains widespread and is politically sensitive. Same-sex relations are illegal under Liberian law, and lesbian, gay, bisexual, transgender, and intersex individuals face violence, discrimination, harassment, and hate speech. Interethnic grievances over access to land and other resources have been a source of social and political tension and conflict. Surrounding the 2017 polls, NDI election observers documented derogatory statements and other forms of discriminatory behavior targeting Liberia's Muslim community (roughly 12% of the population) and the largely Muslim Mandingo ethnic group (3%), some of whom were barred from registering or voting. Mandingo mobilization formed the backbone of the 1997-2003 insurgency against Taylor. Since 2017, Liberia has ranked as a Tier 2 Watch List country on the State Department's annual Trafficking in Persons (TIP) report, submitted pursuant to the Trafficking Victims Protection Act of 2000 (TVPA, Division A of P.L. 106-386 ). Per the TVPA, failure to improve from Tier 2 Watch List ranking for three consecutive years results in a downgrade to Tier 3 (worst) status, which may carry restrictions on access to certain types of U.S. assistance. The Administration granted Liberia a waiver from such a downgrade in 2019 because the State Department found that Liberia's \"government has devoted sufficient resources to a written plan that, if implemented, would constitute significant efforts to meet the minimum standards\" for TIP elimination. Accountability for wartime human rights violations in Liberia remains a highly sensitive topic. A postwar Truth and Reconciliation Commission (TRC), which operated between 2005 and 2010, recommended the establishment of a war crimes tribunal, but no such court has been established. This is partly attributable to opposition from former combatants and others likely to be targeted by such a tribunal, some of whom are current or former elected officials. The TRC recommended the prosecution of at least three members of the current legislature. Such individuals wield influence not only within the legislature but also as vote mobilizers at the national level; for instance, Senator Prince Johnson, one of two former armed faction leaders currently serving in Liberia's legislature, arguably was critical to President Weah's winning 2017 political coalition. Opponents of a possible war crimes court also include former President Sirleaf, whom the TRC identified as having provided financial support to Charles Taylor in the early years of Liberia's first civil war. Some Liberians may oppose potential transitional justice measures out of a reluctance to revisit wartime atrocities or fear of rekindling social tensions. In September 2019, President Weah appeared to endorse the establishment of a war crimes court and requested that the legislature advise him on the issue. After Weah's announcement, a resolution calling for a war crimes tribunal quickly garnered the two-thirds support required for passage in Liberia's House of Representatives. Weah subsequently walked back his support for the court, however, and it remains to be seen whether Weah's announcement paves the way for the creation of a court and/or the implementation of other transitional justice measures. Some perpetrators of wartime atrocities have faced justice abroad, including in the United States. In 2009, Charles Taylor's U.S.-born son, Roy M. Belfast Jr. (AKA Charles \"Chuckie\" Taylor), was sentenced to 97 years in prison by a U.S. District Court for wartime acts of torture. Belfast remains the only individual prosecuted in the U.S. judicial system specifically for atrocities committed during Liberia's conflicts. Others have faced immigration-related charges, however, often in relation to fraud or perjury linked to nondisclosure of involvement in wartime abuses in applications for U.S. asylum, residency, or citizenship. Several Liberian nationals have been convicted on such offenses, which can carry lengthy prison sentences and/or result in deportation and loss of citizenship or residency permission. Former armed faction leader George Boley was deported from the United States in 2012 in connection with his involvement in the use of child soldiers. This marked the first deportation under the Child Soldiers Accountability Act ( P.L. 110-340 ), which made use of child soldiers a ground for deportation from the United States. As noted above, the United States played a key role in Liberia's founding, and bilateral ties generally have been close, characterized by substantial U.S. assistance. U.S. engagement in Liberia expanded significantly during the administration of President Sirleaf, under successive U.S. Administrations and with bipartisan support from Congress. Sirleaf addressed a joint session of Congress in 2006, and between FY2006 and FY2018, Congress appropriated over $2.1 billion in State Department- and USAID-administered aid to Liberia to support stabilization, development, security sector reform, and health programs. This total does not include assistance provided via other U.S. agencies and substantial Millennium Challenge Corporation (MCC) aid funding (see below). It also excludes U.S. funding for UNMIL provided through assessed contributions to the U.N. peacekeeping budget, as well as U.S. support for Liberia's Ebola response or programs funded through regionally or centrally managed programs. The Trump Administration has expressed support for strong U.S.-Liberia ties. In late 2019, Assistant Secretary of State for African Affairs Tibor Nagy hosted the fourth U.S.-Liberia Partnership Dialogue, a high-level diplomatic engagement that most recently focused on \"youth engagement, trafficking in persons, economic growth, and strengthening health and education systems.\" Congress has continued to appropriate sizable bilateral foreign assistance for the country (see below), and has held hearings on its development and governance prospects. Congress also has fostered relations through a House Democracy Partnership (HDP) program with the Liberian legislature, which is one of 21 HDP partner legislatures worldwide. Launched in 2006, the Liberia HDP program has focused on the development of Liberian parliamentary capacity, including through peer-to-peer visits. In October 2019, five Members of Congress visited Liberia, where they met with various legislators and President Weah. Immigration Issues. Liberian immigration to the United States has played a significant role in bilateral relations. According to the U.S. Census Bureau, there were roughly 85,000 foreign-born individuals from Liberia living in the United States in 2018 (latest available). Liberians in the United States first received Temporary Protected Status (TPS) in 1991 during the first civil war. In the years since, qualifying Liberians have been granted TPS and/or Deferred Enforced Departure (DED)âtemporary blanket relief from removal provided by the Presidentâin the context of Liberia's conflicts and, later, the Ebola outbreak. Efforts to extend the immigration status of Liberians eligible for such protections have drawn bipartisan congressional support. In March 2019, three days before DED was to expire for certain Liberians resident in the United States since 2002, President Trump reaffirmed the termination but extended the wind-down period through March 30, 2020. In his memorandum, President Trump stated that \"Extending the wind-down period will preserve the status quo while the Congress considers remedial legislation\" to provide Liberian DED beneficiaries with relief from removal. Congress ultimately granted such relief in the National Defense Authorization Act for 2020 ( P.L. 116-92 ), which directs the Secretary of Homeland Security to adjust the status of eligible Liberian applicantsâthose continuously present in the United States since November 20, 2014, or the immediate family of such individuals, among other criteriaâto lawful permanent resident (LPR) status. Appropriated State Department and USAID-administered assistance for Liberia totaled $112.3 million in FY2018 and $96.5 million in FY2019. Recent U.S. aid largely has focused on health system strengthening and support for public service delivery, civil society capacity building, agriculture sector development, and justice sector improvements. Most U.S. development assistance is implemented by nongovernmental organizations, but the United States has a direct government-to-government financing agreement with Liberia's Ministry of Health that supports health service delivery. The State Department has funded programs to train, equip, advise, and professionalize the Armed Forces of Liberia (AFL), which was established with U.S. support after Liberia's second civil war, and to build the capacity of civilian law enforcement. DOD has conducted periodic trainings for AFL personnel and provided support to Liberia's defense ministry. Liberia also benefits from a State Partnership Program with the Michigan National Guard. The country hosts 94 Peace Corps Volunteers (PCVs) working on projects related to education and health. In December 2019, the U.S. Embassy withdrew PCVs from several regions due to liquidity challenges associated with withdrawing money from local banks. FY2020 aid allocations for Liberia pursuant to P.L. 116-94 have yet to be made public. The Administration requested $32.6 million in State Department- and USAID-administered aid for Liberia in FY2021, which would represent a 66% decrease from FY2019 appropriations. In successive years, Congress has appropriated aid for Liberia far in excess of the levels proposed in the Trump Administration's budget requests. Liberia is currently implementing a five-year, $256.7 million MCC C ompact that entered into force in 2016. The Compact targets two constraints to economic growth: (1) a lack of access to reliable and affordable electricity, and (2) inadequate road infrastructure. The energy project seeks to provide a new hydropower turbine to the Mt. Coffee Hydropower Plant, train electricity sector personnel, and support the creation of an independent energy sector regulator. The roads project aims to build the capacity of Liberian authorities to plan road maintenance. Liberia previously benefitted from a $15 million MCC Threshold Program (2010-2013) focused on expanding girls' access to education, enhancing land rights and access, and promoting trade. In FY2019 and FY2020, Liberia did not secure a passing grade on half of its MCC Scorecardâa prerequisite for a potential second compact. According to its FY2020 scorecard, Liberia failed to meet standards in fiscal and trade policy, regulatory quality, inflation control, land rights and access, government effectiveness, rule of law, and a range of human development measures. Pressures on Weah's administration are likely to mount. State finances are under increasing strain due to weak economic growth, poor tax administration, declining donor aid, and the departure of UNMIL, which came to play a key role in Liberia's economy. At a time when the government faces popular expectations for dividends from Liberia's postwar transitionâincluding for better infrastructure, improved public services, job creation, and poverty reductionâsurging inflation and a depreciation of the Liberian dollar have contributed to falling purchasing power, rising poverty, and a mounting food security crisis. The IMF has welcomed austerity measures on the part of the government, including cuts to the public sector wage bill, and in late 2019 approved a four-year, $213.6 million program to support macroeconomic adjustments and other reforms. Austerity policies are likely to be domestically unpopular, however, and it remains to be seen whether the Weah administration continues to pursue reforms that may be politically challenging. Efforts to address corruption and other governance demands are likely to encounter pushback from key segments of Liberia's political landscape. Corruption has been a longstanding concern in Liberia and remains prevalent throughout the government, according to the State Department, which has documented a \"culture of impunity\" in the civil service. Any attempts to enact meaningful anti-corruption measures may thus founder on a lack of political will from legislators and other officials who profit from the current system. Meanwhile, Weah's stated commitment to address mounting calls from civil society and some legislators for postwar transitional justice measures has met with opposition from some legislators who are central to his political coalition. Recent protests and instances of inflammatory rhetoric have raised concerns over political tensions in the country. In May 2019, the U.S. Embassy condemned ethnically divisive statements by politicians, reproaching those who \"incite unlawful acts through ill-considered rhetoric that could jeopardize Liberia's hard-won peace and security.\" The U.S. Embassy also has warned Liberia's opposition against using charged rhetoric, as it has called on the Weah administration to respect political freedoms. Mounting socioeconomic pressures and calls for governance reform and postwar accountability are key challenges facing Liberia's fledgling democracy; how the country's political class responds to such forces will have implications for Liberia's trajectory. U.S.-Liberia ties remain close, and the United States appears poised to continue supporting the country's development, albeit with potentially lower aid allocations than in past years. The United States continues to exert significant influence in the country, and Liberian authorities appear receptive to U.S. engagement, as suggested by President Weah's recent suspension of an official whom the U.S. ambassador had accused of promoting societal divisions. At the same time, the Weah administration's mismanagement of donor assistance may be of concern to some Members of Congress, as may enduring corruption, rising political tensions, persistent institutional weaknesses, and continued inaction on transitional justice measures. Members of Congress may continue to debate the relative effectiveness of various tools for advancing U.S. interests in Liberia, including diplomacy, foreign assistance, and possible punitive measures. ", "summary": "Introduction . Congress has shown enduring interest in Liberia, a small coastal West African country of about 4.8 million people. The United States played a key role in the country's founding, and bilateral ties generally have remained close despite significant strains during Liberia's two civil wars (1989-1997 and 1999-2003). Congress has appropriated considerable foreign assistance for Liberia, and has held hearings on the country's postwar trajectory and development. In recent years, congressional interest partly has centered on the immigration status of over 80,000 Liberian nationals resident in the United States. Liberia participates in the House Democracy Partnership, a U.S. House of Representatives legislative-strengthening initiative that revolves around peer-to-peer engagement. Background. Liberia's conflicts caused hundreds of thousands of deaths, spurred massive displacement, and devastated the country's economy and infrastructure, aggravating existing development challenges. Postwar foreign assistance supported a recovery characterized by high economic growth and modest improvements across various sectors. An Ebola outbreak from 2014-2016 cut short this progress; nearly 5,000 Liberians died from the virus, which overwhelmed the health system and spurred an economic recession. The outbreak also exposed enduring governance challenges, including weak state institutions, poor service delivery, official corruption, and public distrust of government. Politics. Optimism surrounding the 2018 inauguration of President George Weahâwhich marked Liberia's first electoral transfer of power since 1944âarguably has waned as his administration has become embroiled in a series of corruption scandals and the country has encountered new economic headwinds. According to the International Monetary Fund (IMF), the economy contracted by 1.4% in 2019, down from 1.2% growth in 2018, as rising inflation has undermined household purchasing power. Weah's government has struggled to deliver on ambitious pro-poor campaign pledges, as diminishing foreign aid flows, poor tax administration, and low global prices for Liberia's top export commodities have strained state finances. Public discontent with alleged mismanagement and corruption has given way to large anti-government protests in the capital city of Monrovia. The Economy and Development Issues . Liberia faces substantial obstacles to broad-based, sustainable development. Infrastructure gaps, poor electricity provision, corruption, and an uncompetitive business climate impede growth. Exports of raw rubber, gold, iron ore, diamonds, and palm oil are key sources of government revenues and foreign exchange, but these industries provide few high-paying jobs to local Liberians, and much of the population relies on subsistence agriculture. Nearly one-third of Liberians face moderate to severe chronic food insecurity despite the country's fertile land, extensive coastline, and abundant rainfall. Human Rights. Human rights conditions have improved considerably since the early 2000s, though corruption, episodic security force abuses against civilians, and di scrimination against women and marginalized communities persist. Press freedoms have come under threat during Weah's presidency; reporters have faced harassment and occasional violence from government officials, including legislators, and some journalists reportedly self-censor to evade persecution. Accountability for wartime abuses remains a highly sensitive issue, and several individuals who played key roles in Liberia's conflicts retain influence and/or serve in elected office. Several perpetrators of wartime abuses have faced trial in the U.S. court system, most on immigration-related fraud or perjury charges related to nondisclosure of involvement in such abuses in applications for U.S. asylum, residency, or citizenship. U.S. Assistance. Since the end of Liberia's second conflict in 2003, the United States has provided more than $2.4 billion in State Department- and USAID-administered assistance to support Liberia's post-war stabilization and development. This does not include nearly $600 million in emergency assistance for Liberia's Ebola response, aid channeled through other U.S. agencies, or U.S. funding for a long-running U.N. peacekeeping mission that completed its mandate in 2018. Current U.S. assistance, which totaled $96.5 million in FY2019, centers on supporting agriculture-led development and strengthening the health system, public service delivery, civil society capacity, and justice and security sectors. An ongoing $256.7 million Millennium Challenge Corporation (MCC) Compact seeks to enhance Liberia's power sector and roads infrastructure.", "document_type": "crs"}
{"report": "B order officials are dually responsible for facilitating the lawful flow of people and goods, while at the same time preventing unauthorized entries and stopping illicit drugs and other contraband from entering the United States. As such, policy discussions around border security often involve questions about how illicit drugs flow into the country. These include questions about the smugglers, types and quantities of illicit drugs crossing U.S. borders, primary entry points, and methods by which drugs are smuggled. Further, these discussions often center on the shared U.S.-Mexico border, as it is a major conduit through which illicit drugs flow into the United States. Mexican transnational criminal organizations (TCOs) are a dominant influence in the U.S. illicit drug market and \"remain the greatest criminal drug threat to the United States; no other groups are currently positioned to challenge them.\" They produce and transport foreign-sourced drugs into the United States and control lucrative smuggling corridors along the Southwest border. Drug intelligence and seizure data provide some insight into drug smuggling into the country. Generally, intelligence suggests that more foreign-produced cocaine, methamphetamine, heroin, and fentanyl flow into the country through official ports of entry (POEs) than between the ports. Seizure data from U.S. Customs and Border Protection (CBP) follows this pattern as well. Conversely, more foreign-produced marijuana has historically been believed to flow into the country between the ports rather than through them. However, CBP seizure data indicate that, like cocaine, methamphetamine, heroin, and fentanyl, more marijuana was seized at POEs than between them in FY2019. While indicators suggest that large amounts of illicit drugs are flowing through POEs and that drug seizures are more concentrated at the ports, it is the flows between them that have been a primary topic of recent policy discussions around border security. This report focuses on the smuggling of illicit drugs between POEs. It briefly describes how these drugs are smuggled between the ports and then illuminates the discussion of how border barriers may shift or disrupt smuggling methods and routes. Notably, there are no data that capture the total quantity of foreign-produced illicit drugs smuggled into the United States at or between POEs; drugs successfully smuggled into the country have evaded seizure by border officials and are generally not quantifiable. In lieu of these data, officials, policymakers, and analysts sometimes rely on certain drug seizure data to help understand how and where illicit drugs are crossing U.S. borders. By weight, marijuana continues to be the illicit drug most-seized by border officials both at and between POEs, though total annual marijuana seizures have declined both at and between the ports in recent years. Historically, border officials have reported seizing more marijuana between POEs than at them. However, more marijuana, by weight, was seized at the ports than between them in FY2019. Of the 556,351 pounds of marijuana seized by CBP in that year, 289,529 pounds (52%) were seized at the ports, and 266,822 pounds (48%) were seized by the Border Patrol between the ports. While marijuana remains the primary drug seized by the Border Patrol between POEs, the annual quantity seized, in pounds, has declined since FY2013 (see Figure 1 ). Conversely, the amount of methamphetamine seized by the Border Patrol has increased annually since FY2013, and seizures of cocaine, heroin, and fentanyl have fluctuated. Smugglers employ a variety of methods to move illicit drugs into the United States between POEs, through land, aerial, and subterranean routes. These methods include the use of underground tunnels, ultralight aircraft and unmanned aerial systems (UASs), maritime vessels, and backpackers, or \"mules.\" As noted, the smuggling between the official POEs has received heightened attention in policy discussions about border security. Specifically, there has been some debate about how physical barriers along the Southwest border between the POEs may deter or alter the smuggling of foreign-produced, illicit drugs into the country. Since the early 1990s, there have been efforts to build barriers along the Southwest border, in part, to deter the unauthorized entry of migrants and smugglers. More recently, in debates about physical barriers along the Southwest border, the prevention of drug smuggling and trafficking has been cited as a key goal and a reason to expand and enhance the physical barriers. For instance, the January 25, 2017, Executive Order 13767 stated that it is executive branch policy to \"secure the southern border of the United States through the immediate construction of a physical wall on the southern border, monitored and supported by adequate personnel so as to prevent illegal immigration, drug and human trafficking, and acts of terrorism.\" Analysts suggest that smugglers may respond (if they have not already, given the hundreds of miles of border barriers already in place) by moving contraband under, over, or through the barriers, as well as around themâincluding by changing their concealment techniques to move illicit drugs more effectively through POEs. Mexican traffickers utilize subterranean, cross-border tunnels to smuggle illicit drugsâprimarily marijuanaâfrom Mexico into the United States. Since the first one was discovered in 1990, tunnel construction has increased in sophistication. Tunnels may include amenities such as ventilation, electricity, elevators, and railways, and tunnel architects may take advantage of existing infrastructure such as drainage systems. For instance, in August 2019 officials discovered a sophisticated drug smuggling tunnel running more than 4,300 feet in length (over three-quarters of a mile) and an average of 70 feet below the surface from Tijuana, Mexico, to Otay Mesa, CAâthe longest smuggling tunnel discovered to date. CBP and Immigration and Customs Enforcement (ICE) have primary responsibility for investigating and interdicting subterranean smuggling. CBP has invested in technology and services to help close certain capability gaps such as predicting potential tunnel locations as well as detecting and confirming existing tunnelsâincluding their trajectoriesâand tunneling activities. Reportedly, among the challenges in detecting tunnels is the variance in types of soil along the Southwest border, which requires different types of detection sensors. ICE, CBP, and other agencies coordinate through initiatives such as the Border Enforcement Security Task Force (BEST) program, where they have focused Tunnel Task Forces in various border sectors. The Government Accountability Office (GAO) recommended in 2017 that CBP and ICE further establish standard operating procedures, including best practices applicable to all border sectors, to coordinate their counter-tunnel efforts. Policymakers may question whether current agency coordination is sufficient or whether the agencies have implemented or should implement GAO's recommendation. Traffickers have moved contraband over border barriers through a variety of mechanisms, from tossing loads by hand and launching bundles from compressed air cannons to driving vehicles on ramps up and over certain types of fencing, as well as employing ultralight aircraft and unmanned aircraft systems (UASs) and drones. While ultralights are used to transport bulkier marijuana shipments, \"UASs can only convey small multi-kilogram amounts of illicit drugs at a time and are therefore not commonly used, though [officials see] potential for increased growth and use.\" For instance, in August 2017, border agents arrested a smuggler who used a drone to smuggle 13 pounds of methamphetamine over the border fence from Mexico into California. Border officials have tested several systems to enhance detection of ultralights and UASs crossing the border. Currently, CBP uses a variety of radar technology, including the Tethered Aerostat Radar System. These technologies are not, however, focused specifically on detecting illicit drugs being smuggled into the country over barriers; rather, they are more broadly used to help detect unauthorized movement of people and goods. Policymakers may examine technologies acquired and used by border officials, including whether they allow officials to keep pace with the evolving strategies of smugglers moving illicit drugs over the U.S. bordersâspecifically, over border barriers. In addition, they may examine whether, as GAO has recommended, CBP is assessing its performance in interdicting UASs and ultralights against specific performance targets to better evaluate the outcome of using these technologies. Various forms of physical barriers exist along the Southwest border, generally intended to prevent the passage of vehicles and pedestrians. Barrier styles and materials include expanded metal, steel mesh, chain link, steel and concrete bollards, and others. Smugglers have found ways to defeat them. They have cut holes and driven vehicles through fencing and, in at least one instance, have bribed border officials to provide keys to the fencing and inside knowledge about unpatrolled roads and sensor locations. More recently, smugglers have reportedly sawed through steel and concrete bollards on the newly constructed border barrier; \"after cutting through the base of a single bollard, smugglers can push the steel out of the way, creating an adult-size gap\" through which people and drugs can pass. Some have noted that border barriers may deter some portion of illegal drug smuggling, while an unknown portion will be displaced to areas without fencing. Specifically, along the Southwest border, barriers may shift some portion of smuggling traffic to other areas of the land border between the United States and Mexico as well as to the ocean. Some of these alternate areas may have terrain that acts as some sort of a barrier, presenting different challenges than those from constructed border barriers. These challenges may, in turn, deter or alter drug smuggling. In addition, there have been reports that the newly constructed border barrier in the San Diego border sector has coincided with an increase of maritime smuggling along that coast. Smugglers use small open vessels (\"pangas\"), which can travel at high speeds. They also use recreational boats and small commercial fishing vessels that can be outfitted with hidden compartments to \"blend in with legitimate boaters.\" In addition to moving illicit drugs across water or open areas of the land border without manmade barriers, the addition or enhancement of border barriers could lead some smugglers to move their contraband through POEs. The most recent data from CBP indicate that, in pounds, more illicit drugsâspecifically marijuana, cocaine, methamphetamine, heroin, and fentanylâare already being moved through POEs than between them. Policymakers may question whether any drug smuggling displaced to the POEs as a result of additional or augmented border barriers is a substantive change. A question policymakers may ask is what effect, if any, increased miles or enhanced styles of border barriers may have on drug smuggling between the POEs. Specifically, they may question whether additional border barrier construction will substantially alter drug smugglers' routes, tactics, speed, or abilities to breach these barriers and bring contraband into the country. A comprehensive analysis of this issue is confounded by a number of factors, the most fundamental being that the exact quantity of illicit drugs flowing into the United States is unknown . Without this baseline, analysts, enforcement officials, and policymakers rely on other data, albeit selected or incomplete, to help inform whether or how border barriers may affect illicit drug smuggling. Border barriers are only one component of tactical infrastructure employed at the border. Infrastructure, in turn, is only one element (along with technology and personnel) of border security. Isolating the potential effects of changes in border barriers from those of other infrastructure investments, as well as from the effects of changes in technology and personnel, is a very difficult task. The Department of Homeland Security (DHS) has made efforts to estimate the effectiveness of border security on the Southwest border between POEs; however, the department recognizes inevitable shortcomings of these estimates due, in part, to unknown flows of people and goods. Further, its estimates of border security effectiveness do not make precise attributions of effectiveness to personnel, technology, or infrastructureâor even more specifically, the portion of infrastructure that is border barriers. There are also factors beyond the immediate personnel, technology, and infrastructure of border security efforts that may affect drug smuggling. These include \"the demand and supply for drugs, the type of drug being shipped, terrain and climate conditions, and smuggler counterintelligence functions.\" And, it may be difficult to separate the results of border security efforts from the effects of those external factors on drug smuggling. Moreover, changes in drug smuggling cannot always be directly linked to changes in border security efforts. Policymakers may continue to question how DHS is identifying and evaluating any potential changes in drug smuggling between the POEs. More specifically, they may examine whether or how DHS is linking observed changes in drug seizure dataâsometimes used as one proxy for drug smugglingâto specific border security efforts such as expanded border barriers. They may also consider how any return on investment in border barriers (measured by effects on illicit drug seizures) compares to the relative return from other border security enhancements. Relatedly, policymakers may continue to examine how DHS defines \"success\" or \"effectiveness\" of border barriers in deterring or altering drug smuggling. For instance, is an effective barrier one that deters the smuggling of illicit drugs altogether, or might it be one that slows smugglers, changes their routes, or alters their techniques so that border officials have more time, opportunity, or ability to seize the contraband? In addition, policymakers may question whether or how border barriers contribute to gathering intelligence that can be used by the broader drug-control community and whether that potential outcome is a measure of effectiveness.", "summary": "Policy discussions around border security often involve questions about how illicit drugs flow into the United States. These include questions about the smugglers, types and quantities of illicit drugs crossing U.S. borders, primary entry points, and methods by which drugs are smuggled. Further, these discussions often center on the shared U.S.-Mexico border, as it is a major conduit through which illicit drugs flow. There are no comprehensive data on the total quantity of foreign-produced illicit drugs smuggled into the United States at or between official ports of entry (POEs) because these are drugs that have generally evaded seizure by border officials. In lieu of these data, officials, policymakers, and analysts sometimes rely on certain drug seizure data to help understand how and where illicit drugs are crossing U.S. borders. Data from U.S. Customs and Border Protection (CBP) indicate that, by weight, more marijuana, cocaine, methamphetamine, heroin, and fentanyl were seized at POEs than between them in FY2019. While available indicators suggest that drug seizures are more concentrated at POEs, it is the flow of drugs between them that have been a primary topic of recent policy discussions around border security. Specifically, there has been some debate about whether, how, and to what extent physical barriers along the Southwest border between the POEs may deter or alter the smuggling of foreign-produced, illicit drugs into the country. Since the early 1990s, there have been efforts to build pedestrian and vehicle barriers along the Southwest border in part to deter the unauthorized entry of migrants and smugglers. Analysts have suggested that in some cases, smugglers have responded by moving contraband under, over, or through the barriers, as well as around themâincluding by changing their concealment techniques to move illicit drugs more effectively through POEs. Drug smugglers utilize subterranean, cross-border tunnels to move illicit drugsâprimarily marijuanaâfrom Mexico into the United States. Their construction has increased in sophistication; tunnels may include amenities such as ventilation, electricity, and railways, and tunnel architects may take advantage of existing infrastructure such as drainage systems. Traffickers move contraband over border barriers through myriad mechanisms, from tossing loads by hand and launching bundles from compressed air cannons to driving vehicles on ramps up and over certain types of fencing, as well as employing ultralight aircraft and unmanned aircraft systems (UASs) and drones. Smugglers may also attempt to go through various types of border barriers; strategies include cutting holes in the barriers and bribing border officials to provide keys to openings in them. Smugglers may also move illicit drugs around border barriers. For instance, along the Southwest border, they may use boats to move contraband around fencing that extends into the Pacific Ocean, move drugs over land areas without constructed barriers, or smuggle goods through the POEs. A key question policymakers may ask is what effect an increase in border barrier length or enhancement of barrier style might have on drug smuggling between the POEs. Specifically, they may question whether or how additional border barrier construction might substantially alter drug smugglers' routes, tactics, speed, or abilities to breach these barriers and bring contraband into the country, and whether or how it has done so in the past. A comprehensive analysis of this issue is confounded by a number of factors, the most fundamental being that the exact quantity of illicit drugs flowing into the United States is unknown . Without this baseline, analysts, enforcement officials, and policymakers rely on other data points to help inform whether or how border barriers may affect illicit drug smuggling.", "document_type": "crs"}
{"report": "R apid growth in leveraged lending, a relatively complex form of credit, in the current economic expansion has raised concerns with some policymakers because they have noted similarities between leveraged lending and mortgage lending and mortgage-backed securities (MBS) markets in the lead-up to the 2007-2009 financial crisis. This report explains how leveraged lending works; identifies the borrowers, lenders, and investors who participate in the market; and examines the characteristics of a leveraged loan. It then explains the characteristics of collateralized loan obligations (CLOs)âsecurities backed by cash flow from pools of leveraged loansâand their investors. Understanding CLOs is crucial to a discussion of the policy issues surrounding leveraged lending because more than 60% of investment in leveraged lending occurs through CLOs. The report also provides data on trends and investor composition. Once these basics are explained, the report explores the regulation ofâand some of the potential risks posed byâleveraged lending and CLOs. Finally, it discusses how policymakers have addressed leveraged lending issues to date. Put simply, leveraged lending refers to loans to companies that are highly indebted (in financial jargon, highly leveraged ). Conceptually, a leveraged loan is understood to be a relatively high-risk loan made to a corporate borrower, but there is no consensus definition of leveraged lending for measurement purposes. Instead, different observers or industry groups use various working definitions that may refer to the borrower's corporate credit rating or a ratio of the company's debt to some measure of its ability to repay that debt, such as earnings or net worth. Because they are high risk, leveraged loans typically have relatively high interest rates, and thus offer higher potential returns for lenders. Leveraged loans are made to companies from all industries, and the concentration of leveraged lending in each industry varies over time based on industries' economic conditions. In the second quarter of 2018, healthcare and service were the top two industries using leveraged lending. Leveraged loans are often used to complete a buyout or merger, restructure a company's balance sheet (by buying back shares, for example), or refinance existing debt. Several types of institutions provide funds to borrowers in leveraged lending, including banks, insurance companies, pension funds, mutual funds, hedge funds, and other private investment funds. Put simply, those institutions are the lenders. However, this concise explanation does not capture certain important characteristics and dynamics within the leveraged lending market. The institution that originates a leveraged loan rarely, if ever, subsequently holds the loan entirely on its own balance sheet, because a lender often would be wary of taking on a large exposure to a single highly indebted company. Instead, the originating lender typically will either (1) partner with colenders, (2) sell pieces of a single loan to investors, or (3) bundle part or all of the loan into a pool of other leveraged loans in a process called securitization , then sell pieces of the pool to investors. The first two optionsâreferred to as syndicat ion and participation , respectivelyâare described in more detail below. The third option creates securities called collateralized loan obligations (CLOs), which are described in more detail in the \" What Are CLOs? \" section. When examining statistics or regulations related to leveraged loans, this report will distinguish between institutions that issue (i.e., originate or create) leveraged loans and institutions that hold (i.e., invest in or purchase pieces of) leveraged loans or CLOs. One notable recent trend is the migration of activity from the banking sector to the nonbank sector. Historically, banks played a primary role in both issuing and holding leveraged loans. However, in recent decades, nonbank credit investors, such as private investment funds and finance companies, have increasingly overtaken market share. As shown in Figure 1 , in the primary market , where leveraged loans are first created, bank financing has fallen from about 70% in the mid-1990s to below 10% in 2018, whereas all other nonbank financing combined now comprises more than 90% of leveraged loan investments. As discussed below, this migration of activity from the banking industry to nonbank institutions has implications for systemic risk and how leveraged loans are regulated. In general, a single lender does not want to hold a whole leveraged loan because such loans are large and risky. Instead, lenders typically use economically similar but contractually different arrangementsâsyndication and participationâto divide the loan among multiple lenders. Under both arrangements, multiple lenders provide a portion of the loan's funding and share in its risk and returns. The contractual relationship between the parties differs in syndications and participations. In a syndicated loan, the borrower enters into a single loan agreement with multiple lenders. Hence, all lenders have a direct contractual relationship with the borrower. Alternatively, a single lender could enter into the loan agreement with the borrower, and this originating lender could then sell portions of the loan, called participations , to other lenders. In this case, the borrower has a direct contractual relationship with the originating lender, who in turn has contractual relationships with the other participants. In either case, the loan has in effect been split up between multiple lenders, even though the particulars of the various parties' contractual rights and responsibilities differ. Syndication and participation require a relatively high degree of coordination among various institutions and stakeholders, and industry practice is that one company acts as an arranger of the deal. The arranger gathers information about the borrower and the loan's purpose, determines appropriate pricing and loan terms, and brings together lenders to join a loan syndication or buy participations. After the deal is closed, the arranger or another company acts as the loan's agent by collecting the payments and fees and passing the appropriate amounts to the loan's holders. The arranger and agent collect fees for these services. Traditionally, arrangers and agents were banks, who would also hold a large portion of the loan, and the colenders were also banks. Since the mid-1990s, colenders have increasingly been nonbank lenders, such as finance companies and private investment funds, and the portions of loans held by banks have decreased. In some cases, nonbank lenders have taken on the arranger and agent roles. How syndications and participations are regulated is covered in \" How Are Leveraged Loans Regulated? \" Leveraged loan agreements typically include covenants âprovisions in the loan contract that set conditions the borrower must meet to avoid technical default (as opposed to a payment default, wherein a scheduled payment is missed). Often these conditions relate to indications of the borrower's ability to repay the loan, such as cash flow and financial performance, or restrict certain actions the borrower may take, such as management changes or asset sales. If the borrower violates a covenant, the lender can accelerate or call the loan (possibly forcing the borrower into bankruptcy), but often lenders will instead restructure the loan with stricter terms that may include additional restrictions on the borrower's behavior. Lenders see covenants as an important mechanism to monitor the borrower's ability to repay the loan and avoid repayment defaults. Loan agreements that include fewer or more lax covenants than are found in traditional leveraged lending contracts are often characterized as covenant-lite . A number of industry observers have noted that covenant-lite loans are becoming more common, and some have argued this indicates credit standards are declining and could lead to higher losses in the future. However, the causes of the increase in covenant-lite loans and the level of concern this trend warrants are subject to debate. The Federal Reserve states that there were approximately $1.15 trillion of leveraged loans outstanding at the end of 2018. For comparison, this amount was similar to U.S. auto loans ($1.16 trillion) or credit card debt ($1.06 trillion) outstanding. In recent years, leveraged lending has grown much faster than other categories of credit reported by the Federal Reserve (see Table 1 ). The $1.15 trillion outstanding was a 20.1% increase from a year earlierâmore than four times the growth of overall business creditâand annual growth has averaged 15.8% since 2000. By comparison, student loans outstanding grew 5.3% last year and have averaged 9.7% annual growth since 1997. In part, the rapid growth in leveraged loans reflects growing nonfinancial business indebtedness, but overall nonfinancial business indebtedness grew only about a fifth as quickly as leveraged lending. This suggests that leveraged lending growth may reflect a substitution of one type of debt for another. Investors can hold leveraged loans by either (1) investing directly in individual leveraged loans, typically through syndications and participations or (2) investing in CLOs. Institutions that directly hold large shares of outstanding leveraged loans include mutual funds (19%), banks (8%), and insurance companies (6%), as shown in Figure 2 . According to one study, mutual fund holdings are split fairly evenly between funds offered to institutional investors and funds offered to retail investors. Nearly all of the remainder of leveraged loans (62%) are held by CLOs. Portions, or tranches , of CLOs are then sold, largely to the same types of investors that invest directly in leveraged loans. CLOs will be discussed in more detail in the next section. As discussed above, banks' share of funding in the leveraged loan market has exhibited a long-term decline. Collateralized loan obligations are securities backed by portfolios of corporate loans. Although CLOs can be backed by a pool of any type of business loan, in practice, U.S. CLOs are primarily backed by leveraged loans, according to the Federal Reserve. The outstanding value of U.S. CLOs has grown from around $200 billion at year-end 2006 to $617 billion at year-end 2018. As noted above, about 60% of leveraged loans are held in CLOs. CLOs offer a way for investors to receive cash flows from many loans, instead of being completely exposed to potential payments or defaults on a single loan. To isolate financial risks, CLOs are structured as bankruptcy-remote special purpose vehicles (SPVs) that are separate legal entities. Each CLO has a portfolio manager, who is responsible for constructing the initial portfolio as well as the CLO's ongoing trading activities. CLO managers are primarily banks, investment firms (including hedge funds), and private equity firms. CLOs are sold in separate tranches , which give the holder the right to the payment of cash flow on the underlying loans. The different tranches are assigned different payment priorities, so some will incur losses before others. This tranche structure redistributes the loan portfolios' credit risk. The tranches are often known as senior , mezzanine , and equity tranches, in order from highest to lowest payment priority, credit quality, and credit rating. Through this process, the loan portfolio's risks are redistributed to the lower tranches first, and tranches with higher credit ratings are formed. In general, the financial industry views CLOs' tranched structure as an effective method for providing economic protection against unexpected losses. As Figure 3 illustrates, in the event of default, the lower CLO tranches would incur losses before others. Hence, tranches with higher payment priority have additional protection from losses and receive a higher credit rating. The pricing of the tranches also reflects this difference in asset quality and credit risk, with lower tranches offering potentially higher returns to compensate for greater risks taken. CLOs are often sold to institutional investors, including asset managers, banks, insurance companies, and others. The asset management industry, which includes hedge funds and mutual funds, mainly holds the riskier mezzanine and equity tranches, and banks and insurers hold most of the lower-risk senior CLO tranches. The Federal Reserve estimated that U.S. investors held approximately $556 billion in CLOs based on U.S. loans at the end of 2018. Of this, an estimated $147 billion in U.S. CLO holdings were issued domestically. Detailed data on domestic CLOs' holders are not available; certain detailed data, however, can be found in the reporting of cross-border financial holdings, which comprise a large majority of U.S. CLOs. The cross-border financial reporting indicates that $409 billion of U.S. CLO holdings were issued in the Cayman Islands, apparently the only offshore issuer. Figure 4 provides an overview by investor type for domestic holdings of these CLOs. The rapid growth of leveraged lending has led to concerns that this source of credit could dry up in the next downturn. A slowdown in leveraged loan issuance could pose challenges for the (primarily) nonfinancial companies relying on leveraged loans for financing. Were these firms to lose access to financing, they could be forced to reduce their capital spending, among other operational constraints, if they were unable to find alternative funding sources. Capital spending (physical investment) by businesses is typically one of the most cyclical components of the economy, meaning it is highly sensitive to expansions and recessions. Overall borrowing by nonfinancial firms is historically high at present. This raises concerns that heavily indebted firms could experience a debt overhang âwhere high levels of existing debt curtail a firm's ability to take on new debtâin the next downturn. If a debt overhang at nonfinancial firms leads to a larger-than-normal reduction in capital spending or more corporate failures, this might exacerbate the overall downturn. If a downturn in the leveraged loan market had a negative effect on financial stability, as discussed in the next section, negative effects on the overall economy could be greater. Leveraged loans and CLOs pose potential risks to investors and overall financial stability. Some risks, such as potential unexpected losses for investors, are presented by both leveraged loans and CLOs. Some apply to only one, such as risks posed by securitization presented by CLOs. This section considers the risks posed by both, highlighting differences between the two where applicable. Risks to investors. Like any financial instrument, leveraged loans and CLOs pose various types of risk to investors. In particular, they pose credit risk âthe risk that loans will not be repaid in full (due to default, for example). Credit risk is heightened because the borrowers are typically relatively indebted, have low credit ratings, and, in the case of covenant-lite loans, certain common risk-mitigating protections have been omitted. The ways borrowers often use the funds raised from leveraged loans, such as for leveraged buyouts, can also be high risk. Nevertheless, the overall risk of leveraged loans should not be exaggeratedâleveraged loans have historically had lower default rates and higher recovery rates in default than high-yield ( junk ) bonds, another form of debt issued by financially weaker firms. Credit risk is mitigated to a certain degree because leveraged loans are typically secured and their holders stand ahead of the firm's equity holders to be repaid in the event of bankruptcy. Furthermore, leveraged loans typically have floating interest rates, so interest rate risk is borne by the borrower, not the investor. As mentioned in the \"What Are CLOs?\" section, when leveraged loans are securitized and packaged into CLOs, the credit risk of the original leveraged loans is redistributed by the CLOs' tranched structure, with senior tranches (mostly held by banks and insurers) often receiving the highest credit rating (e.g., AAA) and junior tranches (mostly held by hedge funds and other asset managers) receiving lower credit ratings. Subordinated debt and equity positions provide additional protection to the senior tranches. Tranching distributes CLO credit risk differently across investors in different tranches. Up to this point in the credit cycle, the risks associated with leveraged loans and CLOs have largely not materializedâleveraged loan default rates have been relatively low because of low interest rates and robust business conditions. But some analysts fear that default rates could spike if economic conditions worsen, interest rates rise, or bothâand these possibilities may not have been properly priced in. Default rates on leveraged loans rose from below 1% to almost 11% during the last recession. An unanticipated spike in default rates would impose unexpected losses on leveraged loan and CLO holders. Systemic risk. Investment losses associated with changing asset values, by themselves, are routine in financial markets across many types of assets and pose no particular policy concern if investors have the opportunity to make informed decisions. The main policy concern is whether leveraged loans and CLOs pose systemic risk ; that is, whether a deterioration in leveraged loans' performanceâparticularly if it were large and unexpectedâcould lead to broader financial instability. This depends on whether channels exist through which problems with leveraged loans could spill over to cause broader problems in financial markets. Losses on leveraged loans or liquidity problems with leveraged loans could lead to financial instability through various transmission channels discussed below. During the financial crisis, problems with mortgage-backed securities (MBS) demonstrated how a class of securities can pose systemic risk. Similar to CLOs, MBS are complex, opaque securities backed by a pool of underlying assets that are typically tranched, with the senior tranches receiving the highest credit rating. Unexpected declines in housing prices and increases in mortgage default rates revealed that MBSâboth highly rated and lowly rated tranchesâhad been mispriced, with the previous pricing not accurately reflecting the underlying risks. The subsequent repricing led to a cascade of systemic distress in the financial system: liquidity in the secondary market for MBS rapidly declined and fire sales pushed all MBS prices even lower. MBS losses caused certain leveraged and interconnected financial institutions, including banks, investment firms, and insurance companies, to experience capital shortfalls and lose access to the short-term borrowing markets on which they relied. Ultimately, these problems caused financial panic and a broader decline in credit availability as financial institutions deleveraged âreducing new lending activity to restore their capital levelsâin response to MBS losses. The resulting reduction in credit in turn caused a sharp decline in real economic activity. CLOs today share some similarities with MBS before the crisis, but there are important differences. Similarities include the rapid growth in available credit and erosion of underwriting standards. Both types of securities are relatively complex and opaque, potentially obfuscating the underlying assets' true risks. Outstanding leveraged loans and CLOs are small relative to overall securities markets, which in isolation is prima facie evidence that they pose limited systemic risk, even if they were to become illiquid or subject to fire sales. However, before the financial crisis, policy concerns were mainly focused on potential problems in subprime mortgage markets, which were also relatively small. Nevertheless, problems with subprime mortgages turned out to be the proverbial tip of the iceberg, as the deflating housing bubble caused losses in the much-larger overall mortgage market. Analogously, a disruption in the leveraged lending market could create spillover effects in related asset classes, similar to how problems that started with subprime mortgages eventually spread to the entire mortgage market and nonmortgage asset-backed securities in the financial crisis. Ultimately, the underlying cause of the MBS meltdown was the bursting of the housing bubble. Despite the high share of business debt to gross domestic product (GDP) at present, experts are divided on whether there is any underlying asset bubble in corporate debt markets (analogous to the housing bubble) that could lead to a destabilizing downturn. In addition, it is not clear whether unexpected losses in leveraged lending would lead to broader systemic deleveraging by financial firms or problems for systemically important institutions. Losses on leveraged loans or CLOs might not cause problems for leveraged financial institutions, such as banks, because (1) their leveraged loan and CLO holdings are small relative to total assets and limited mostly to AAA tranches; and (2) banks face higher capital and liquidity requirements to protect against losses or a liquidity freeze, respectively, than they did before the crisis. Furthermore, the largest holders of leveraged loans and CLOs are asset managers. They generally hold these assets as agents on their clients' behalf and thus are normally not vulnerable to insolvency from asset losses because those losses are directly passed on to account holders, who own the assets. Another source of systemic risk relates to a liquidity mismatch for certain holders. There is potentially an incentive for investors in leveraged loan mutual funds and exchange traded funds (ETFs), respectively, to redeem their shares on demand for cash or sell their shares during episodes of market or systemic distress, similar to a bank run. Because the underlying leveraged loans and CLOs are illiquid, investors who are first to exit could limit their losses if they redeem them while the fund still has cash on hand and is not forced to sell the underlying assets at fire sale prices. This incentive could act as a self-fulfilling prophecy, as the incentive to run could cause mass redemptions that then force fire sales that reduce the fund's value. Leveraged loan mutual funds generally allow withdrawal on demand, but other run risk may be limited because \"U.S. CLOs are not required to mark-to-market their assets, and early redemption by investors is generally not permissible\" and other private investment funds, such as hedge funds, often feature redemption restrictions. Although the financial crisis is a cautionary tale, there are other historical examples where a sudden shift in an asset class's performance did not lead to financial instability. For example, a collapse in the junk bond market following a spike in defaults from 1989 to 1990 did not pose problems for the broader financial system or economy. In addition, while CLO issuance slowed during the last financial crisis, the rating agency and data provider Standard & Poor's reports that CLO default rates remained low and \"no tranches originally rated AAA or AA experienced a loss\" throughout the crisis. However, the amount of CLOs outstanding was much smaller then compared to now, and product features have changed over time. More recently, in December 2018, relatively large investor withdrawals from bank loan mutual funds did not result in instability in the leveraged loan market. The goals of financial regulation, and the tools used to achieve those goals, vary based on the type of financial institution, market, or instrument involved. Thus, to answer this question, it is useful to break down leveraged loan regulation by the type of institution and activity (issuance, investment, and securitization). Leveraged lending falls under the purview of multiple regulators with different regulatory approaches and authorities. This regulatory fragmentation could encourage activities to migrate to less-regulated sectors, limits the official data available, and may complicate the evaluation and mitigation of any potential systemic risk to financial stability associated with leveraged lending. Following the 2007-2009 financial crisis, the Financial Stability Oversight Council (FSOC), an interagency council of regulators headed by the Treasury Secretary, was created to address threats to financial stability and issues where regulatory fragmentation hinders an effective policy response. In its 2018 Annual Report, FSOC recommended that the financial regulators \"continue to monitor levels of nonfinancial business leverage, trends in asset valuations, and potential implications for the entities they regulate.\" Outside of monitoring risk, FSOC has not, to date, recommended any regulatory or legislative changes to address leveraged lending. The regulations applicable to leveraged loan issuance and syndication differ between banks and nonbank lenders. In both cases, though, leveraged lending falls under the laws and regulations applied to business lending in general, rather than rules that apply specifically to leveraged lending. In general, banks are required to act in a safe and sound manner to mitigate the potential for failure and are subject to supervision to ensure that they are doing so. As such, regulators generally will check banks' leverage loan origination, syndication, and participation practices as part of regular examinations. This supervision could uncover cases in which a bank is originating or syndicating excessively risky leveraged loans. In addition, the bank regulators have issued guidance documents, most recently in 2013, describing certain standards and practices and communicating regulator expectations related to leveraged lending. Whether this guidance qualifies as regulation that must go through the rulemaking process is a matter of debate examined in the \" What Is the Status of the Bank Regulators' Leveraged Loan Guidance? \" section later in this report. In any case, the guidance covers only the leveraged loan activities of banks, is not meant to cover nonbank activity or bank investment in CLOs, and cannot address potential systemic risk originating outside of the banking system. Nonbank participants, with the exception of insurance companies, generally are not subject to similar oversight. To the extent that banks' role in leveraged lending is decreasing, and particularly in cases where a bank is not involved in a leveraged loan at all, this could result in reduced regulatory oversight of leveraged loan issuance and syndication. Regulations applicable to holding leveraged loans or CLOs depend on what type of entity is involved. Nonbank investment funds, banks, and insurance companies all face different requirements. As with regulations applying to issuance, these rules generally are not uniquely or specifically applied to leveraged loans and CLOs, but rather to all types of loans and assets held by these institutions. Banks. Banks face a number of prudential (or safety and soundness) regulations related to all bank activities, including leveraged lending. Capital requirements and the Volcker Rule are notable prudential regulations banks must consider when engaged in leveraged lending. Certain payments banks make on capital are flexible, unlike the rigid payment obligations they face on deposits and liabilities. Thus, capital gives banks the ability to absorb some amount of losses without failing. Banks are required to satisfy several requirements to ensure they hold enough capital. In general, these requirements are expressed as minimum ratios between certain balance sheet items that banks must maintain. L everage ratios require banks to hold a certain amount of capital for all loans regardless of riskiness, whereas r isk -weighted ratios require banks to hold an amount of capital based on the riskiness of the loan. When a bank holds leveraged loans or CLO tranches or makes credit available to others to finance leveraged loans or CLOs, it must comply with both types of requirements. Based on the characteristics of individual loans and assets, a bank might be required to hold a relatively large amount of capital for leveraged loans and CLOs to comply with risk-weighted ratios. Banks also face certain permissible activity restrictions , which prohibit them from engaging in certain risky activities. Section 619 of the Dodd-Frank Act (called the Volcker Rule) is one such regulation that prohibits banks from proprietary trading and certain relationships with hedge funds and certain other funds. The latter restriction may be pertinent to banks' involvement in CLOs, depending on how they are structured. Although CLOs may be structured in a manner similar to loan participations (which generally are allowed under the Volcker Rule), they can also be structured such that banks' ownership interests appear similar to those associated with hedge funds (which is generally not allowed under the Volcker Rule). The Volcker Rule establishes criteria for a CLO to qualify for an exemption. Moreover, the final rule provides guidance on how banks may construct CLO structures to avoid retaining impermissible ownership or equity interests that resemble hedge funds. In addition, banks are subject to periodic examination by federal bank regulators. If examiners determine a bank is holding overly risky loans, they can give it a worse rating (which in turn could increase the fees it pays for deposit insurance or restrict it from certain activities) or direct it to take corrective action. Because leveraged loans are considered more risky than other loan types, they may be more likely to draw examiners' attention and elicit a response. Furthermore, the bank regulators established the Shared National Credit Program in 1977 to more closely monitor and assess risk related to large syndicated loans. The program requires banks to report data on syndicated loans larger than $100 million. To inform banks of their regulatory obligations and regulator expectations related to leveraged lending, the federal bank regulatory agencies have issued a guidance document to banks. Whether this document qualifies as an official regulation, as well as, whether it inappropriately discouraged banks from engaging in leveraged lending, is a subject of debate covered in this report's section \" What Is the Status of the Bank Regulators' Leveraged Loan Guidance? \" below. Asset management . Relative to banking, investment funds in the asset management industry involve different operational frameworks and regulatory requirements. The asset management industry's operating framework is an agent-based model that separates investment management functions from investment ownership. In this model, risk is largely borne by the investors who own the assets, not by the companies managing them. This is different from the model used for banking, in which banks own and retain the assets and risks. Asset managers are generally not subject to safety and soundness regulations that apply to banks. The Securities and Exchange Commission (SEC) is the primary regulator overseeing the asset management industry. The main components of the SEC's asset management regulatory regime include disclosure requirements, investor access restrictions, examinations, and risk mitigation controls. In addition, the SEC's Office of Compliance Inspections and Examinations (OCIE) is responsible for conducting examinations and certain other risk oversight of the asset management industry. Examples of violations involving leveraged loan capital markets participants that could trigger a SEC investigation include market manipulation and violation of fiduciary duties. Industry self-regulatory organizations under SEC oversight, such as the Financial Industry Regulatory Authority (FINRA), could also examine broker-dealers involved with leveraged lending. Restrictions or requirements for investment funds in the leveraged lending and CLO markets depend on whether a fund is public (broadly accessible by investors of all types) or private (accessible only by institutional and individual investors who meet certain size and sophistication criteria). Public funds that invest in leveraged lending and CLOs include mutual funds and exchange-traded funds (ETFs), whereas private fund investors include hedge funds and private equity. Depending on the types of the funds, they could also be subject to other requirements, such as disclosure of portfolio holdings through prospectus, conflict of interest mitigation through fiduciary requirements, liquidity and leverage restrictions, as well as operational compliance requirements to safeguard client assets. Insurance. Insurance firms are regulated for safety and soundness, but at the state level rather than by a federal entity. Insurance firms also face risk-based capital requirements that affect how many leveraged loans and CLOs they hold. Insurance capital requirements focus significantly on the riskiness of insurers' contingent liabilities (i.e., potential claims), in addition to the riskiness of the assets they hold. The National Association of Insurance Commissioners (NAIC) assigns a risk assessment to the assets (including leveraged loans and CLOs) insurance companies purchase to back their claims. Riskier assets get less credit toward fulfilling those capital requirements. Thus, the risk assessment assigned to individual leveraged loans and CLOs largely determines the limits that capital requirements impose on insurers' holdings of those loans and securities. In 2017, 97% of CLOs held by insurers received an investment-grade rating from the NAIC (NAIC-1 or NAIC-2), posing less expected risk and requiring less capital to guard against that risk than lower-rated holdings. A significant difference between the insurance and banking industries, and thus how they are regulated for safety and soundness, is the importance of matching the durations of assets and liabilities in insurance, particularly life insurance. Insurance often entails much longer-term liabilities than does banking, allowing insurers to safely hold longer-term assets to match these longer-term liabilities. This allowance for duration matching may influence the leveraged loans and CLOs an insurer can safely hold. However, insurance regulators have recently increased their focus on the liquidity of insurers' assets, which could discourage insurers from holding many leveraged loans and CLOs because of their relative illiquidity. Through the securitization process, securities (CLOs) backed by leveraged loans are issued and sold to investors. This section highlights the regulatory requirements applied to CLOs and CLO managers. Notably, it discusses the initial application of risk-retention rules to CLOs, and their subsequent partial removal. The securitization process traditionally allowed managers creating the securities to fully transfer their portfolio assets (and risks) to capital markets investors. This process could result in a misalignment of incentives between managers and investors because the managers did not share much of the securitized products' risks, which has been referred to as a lack of \"skin in the game.\" The 2007-2009 financial crisis revealed this misalignment as a structural flaw that contributed to the crisis. To address the issue, the SEC and other financial regulators adopted credit risk-retention rules under the Dodd-Frank Wall Street Reform and Consumer Protection Act ( P.L. 111-203 ) for securitization structures, including CLOs, in December 2016. The risk retention rule requires CLO managers to retain 5% of the original value of CLO assets, thus aligning their own interests with those of investors (i.e., imposing skin in the game). Subsequently, in 2018, the U.S. Court of Appeals ruled that managers of open-market CLOs, which are reportedly the most common form of CLOs, are no longer subject to risk-retention rules. However, other types of CLOs are still subject to risk-retention requirements. CLOs are securities instruments. The federal securities laws, including the Securities Act of 1933 (P.L. 73-22) and the Securities Exchange Act of 1934 (P.L. 73-291), require all offers and sales of CLO securities to either be registered under its provisions or qualify for an exemption from registration. Registration requires public disclosure of material information, such as the underlying security's financial details. However, most CLOs are created under private exemptions, which require less registration than public offerings but confine offerings to a more limited investor base. As discussed above, a CLO manager oversees the securitization process. CLO managers are generally registered as investment advisers under the Investment Advisers Act of 1940. As a result, they are subject to the SEC's registration and compliance requirements as well as the fiduciary duties that obligate them to place clients' interests above their own. Bank regulators use guidance to provide clarity to banks on supervision, such as how supervisors treat specific activities in their exams. In 2013, the federal bank regulators jointly issued an updated 15-page guidance document that described their \"expectations for the sound risk management of leveraged lending activities.\" Subsequently, banks asserted that following the guidance constrained them from making sound loans and that regulators enforced the guidance as if it were a binding regulation. As opposed to guidance, a regulation can be issued only if the agency follows the Administrative Procedure Act's requirements (5 U.S.C. Â§551 et seq.), including the notice and comment process and other relevant requirements. Under the Congressional Review Act (CRA; P.L. 104-121 ), regulators must submit new regulations and certain guidance documents to Congress, which can then prevent a regulation or guidance from taking effect by enacting a joint resolution of disapproval. Because the bank regulators appeared to have the view that the document did not meet the CRA's definition of \"rule,\" they did not submit it to Congress. In 2017, Senator Pat Toomey asked the Government Accountability Office (GAO) to analyze the guidance and determine whether it qualified as a rule subject to CRA review. GAO concluded that the guidance is a rule subject to CRA review. Following GAO's determination, the bank regulators reportedly sent letters to Congress indicating they would seek further feedback on the guidance, and Federal Reserve Chairman Jerome Powell indicated at a hearing on February 27, 2018, that the Federal Reserve has emphasized to its bank supervisors that the guidance was nonbinding. The Comptroller of the Currency, Joseph Otting, reportedly stated in 2018 that the guidance provides flexibility for leveraged loans that do not meet its criteria, provided banks operate in a safe and sound manner. To date, no changes have been made to the guidance and no joint resolution of disapproval under the CRA has been introduced. The Congressional Research Service has been unable to locate a submission of the guidance to Congress following the GAO finding that it was required under the CRA. The House Financial Services Committee held a hearing on June 4, 2019, entitled Emerging Threats to Stability: Considering the Systemic Risk of Leveraged Lending . Two unnumbered draft bills related to leveraged lending were considered at this hearing. The draft Leveraged Lending Data and Analysis Act would require the Office of Financial Research, a Treasury office that supports FSOC, to gather information, assess risks, and make recommendations in a report to Congress on leveraged lending. The draft Leveraged Lending Examination Enhancement Act would require the Federal Financial Institutions Examination Council (FFIEC), an interagency council of federal bank regulators, to set prudential standards for leveraged lending by depository institutions. It would also require the FFIEC to report quarterly on leveraged lending by depository institutions.", "summary": "Leveraged lending generally refers to loans made to businesses that are highly indebted or have a low credit rating. Most leveraged loans are syndicated, meaning a group of bank or nonbank lenders collectively funds a leveraged loan made to a single borrower, in contrast to a traditional loan held by a single bank. In some cases, investors hold leveraged loans directly. However, more than 60% of leveraged loans are securitized into collateralized loan obligations (CLOs)âsecurities backed by cash flow from pools of leveraged loans. These securities are then sold to investors. The largest investors in leveraged loans and CLOs are mutual funds, insurance companies, banks, and pension funds. During the past decade, the U.S. leveraged loan market experienced periods of growth; it grew by 20% in 2018, bringing the amount outstanding to more than $1 trillion. According to some industry observers, deteriorating credit quality and decreasing investor safeguards have accompanied this growth; however, default rates have remained low. The share of leveraged loans originated by and held by banks has declined, whereas the roles of nonbank participants, such as investment management and finance companies, have increased. In addition, some observers have noted similarities between leveraged lending and CLO market characteristics and those of certain mortgage lending and mortgage-backed securities (MBS) markets in the lead-up to the 2007-2009 financial crisis. As a result, leveraged lending has raised a number of interrelated policy issues. Observers express concerns that leveraged lending presents certain financial and economic risks, as both a potential source of systemic risk and a mechanism that could exacerbate a future recession (even if it does not cause financial instability). Leveraged lending could pose systemic risk because it couples high risk with opacity, potentially leading to unexpectedly high losses and financial disruption. Some experts have argued that potential leveraged loan losses or illiquidity could lead to contagion effects, wherein one financial firm's distress affects other firms and activities. However, banks' limited exposure to leveraged loans and stronger postcrisis capital and liquidity positions might mitigate contagion effects. For these reasons, some financial authorities (e.g., the chairman of the Federal Reserve) have indicated that although leveraged loans raise some concerns, they \"do not appear to present notable risks to financial stability.\" Even if leveraged loans do not cause financial instability, some nonfinancial firms that rely on leveraged lending could lose access to financing during the next downturn, which could negatively affect their operations if they were unable to find alternative funding. Overall borrowing by nonfinancial firms is historically high, which could lead to a larger-than-normal cutback in their spending or more corporate failures in the next recession, exacerbating that recession. Some assert that because certain leveraged loans, such as those involved in private nonbank transactions, face different regulation than leveraged lending by banks and comparable bond issuances, the market might be ineffectively regulated. In addition, some analysts have argued that a lack of transparency in the leveraged lending market prevents the industry and regulators from fully monitoring risks that could be addressed through increased data collection and sharing. To date, Congress and the financial regulators have mainly limited the policy response to leveraged lending to monitoring risks. A more active regulatory intervention would be complicated by the fact there are few specific regulations governing leveraged lending. (One exception is a supervisory guidance issued by bank regulators in 2013, which the regulators have stressed is nonbinding but the Government Accountability Office declared to be a regulation for Congressional Review Act purposes in 2017.) Addressing systemic risk is under the purview of federal financial regulators, including the Financial Stability Oversight Council (FSOC), an interagency council headed by the Treasury Secretary. Although FSOC recommended in its 2018 Annual Report that the financial regulators \"continue to monitor levels of nonfinancial business leverage, trends in asset valuations, and potential implications for the entities they regulate,\" it did not recommend regulatory or legislative changes to address leveraged lending.", "document_type": "crs"}
{"report": "Over the past couple of decades, national attention to \"emerging contaminants\" or \"contaminants of emerging concern\" (CECs) in surface water and groundwater has been increasing. Although there is no federal statutor y or regulatory definition of CECs, generally, the term refers to unregulated substances detected in the environment that may present a risk to human health, aquatic life, or the environment. CECs can include many different types of manmade chemicals and substancesâsuch as those in personal care products, pharmaceuticals, industrial chemicals, lawn care and agricultural products, and microplasticsâas well as naturally occurring substances such as algal toxins or manganese. CECs often enter the environment, including ground and surface waters, via municipal and industrial wastewater discharges and urban and agricultural storm runoff. Although municipal and industrial wastewater are both treated prior to discharge into waterways, treatment facilities are often not designed to remove CECs. The availability of data on CECsâsuch as concentration and pervasiveness in the environment or exposure or toxicity data that would help determine their risk to humans and aquatic lifeâmay be limited. In some cases, detections of CECs in the environment have triggered a call for action from federal, state, and local government, as well as Congress. Increased monitoring and detections of one particular group of chemicals, per- and polyfluoroalkyl substances (PFAS), has recently heightened public and congressional interest in these CECs and has also prompted a broader discussion about how CECs are identified, detected, and regulated and whether additional actions should be taken to protect human health and the environment. Several statutesâincluding the Safe Drinking Water Act; the Toxic Substances Control Act (TSCA); the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA); and the Clean Water Act (CWA) âprovide authorities to the U.S. Environmental Protection Agency (EPA) and states to address particular CECs. In the 116 th Congress, Members have introduced more than 40 bills to address PFAS through various means. Multiple bills, including House- and Senate-passed National Defense Authorization Act (NDAA) bills for FY2020 ( H.R. 2500 and S. 1790 , respectively), would direct EPA to take regulatory and other actions to address PFAS under several environmental statutes. Two of these bills ( H.R. 2500 and H.R. 3616 ) would direct EPA to address PFAS using authorities provided to the agency under the CWA, which Congress established to restore and protect the quality of the nation's surface waters. Global concern about another group of CECsâmicroplasticsâand their potential impacts has also been mounting. Recent studies have found that treated effluents from wastewater treatment plants can be key sources of microplastics, as can runoff from agricultural sites where sewage sludge from the wastewater treatment process has been applied as fertilizer. As with many other CECs, wastewater treatment facilities are generally not designed to screen for microplastic debris, such as microbeads, plastic fragments, or plastic fibers from clothing. Congress has shown interest in addressing the impacts of plastic pollution. In 2015, Congress passed legislation to ban plastic microbeads from rinse-off personal care products (\"Microbead-Free Waters Act of 2015,\" P.L. 114-114 ). More recently, some Members in the 116 th Congress announced plans to introduce comprehensive legislation to address plastic waste in fall 2019. Some stakeholders have asserted that EPA could be more effective in using its existing CWA authorities to address CECs, while others have suggested a need to identify and address potential gaps in CWA authorities through amendments to the statute. This report examines authorities available to address CECs under the CWA. EPA has several CWA authorities it may use to address CECs, although it faces some challenges in doing so. The CWA's stated objective is \"to restore and maintain the chemical, physical, and biological integrity of the Nation's waters.\" To help achieve this objective, the CWA prohibits the discharge of pollutants from any point source (i.e., a discrete conveyance, such as a pipe, ditch, etc.) to waters of the United States without a permit. Under the CWA, one of the primary mechanisms to protect or improve surface water quality is to limit or prohibit discharges of contaminants, including CECs, in National Pollutant Discharge Elimination System (NPDES) permits. The CWA authorizes EPA and delegated states to set limits or prohibit discharges of pollutants in permits through technology-based effluent (i.e., discharge) limitations and standards and through water-quality-based effluent limitations, which are established through water quality standards and criteria. Technology-based effluent limitations are specific numerical limits (i.e., maximum allowable levels of specific pollutants) that represent the minimum level of control that must be established in a permit. In cases where technology-based effluent limitations are not adequate to meet applicable water quality standards, the permits also incorporate water-quality-based effluent limitations. Water-quality-based effluent limitations are specific limits established in a permit that, if not exceeded in the discharge, allow for attainment of water quality standards in the receiving water. Water quality standardsâestablished by states, territories, tribes, and EPAâdefine the desired condition or level of protection of a water body and what is needed to achieve or protect that condition. In addition, the CWA authorizes EPA to designate contaminants as toxic pollutants (CWA Â§307) or as hazardous substances (CWA Â§311), which may trigger other actions under the CWA and CERCLA. This section first identifies the authorities available under the CWA, their applicability to CECs, and potential challenges with EPA use of these authorities. The CWA requires EPA to establish technology-based effluent limitations for various categories of point sources/dischargers . Technology-based requirements consider the performance of specific technologies as well as economic achievability. These limits do not specify what technologies must be employed; rather , they establish the levels of specific pollutants that are allowable in the discharge based on the performance of technologies identified as representing specified levels of control (e.g., best available technology economically achievable, best conventional pollutant control technology). CWA Section 301 prescribes the levels of control required. EPA broadly classifies NPDES permittees as either (1) publicly owned treatment works (POTWs) or (2) non-POTWs, which include all other point sources and are also often called n on municipal facilities or industrial facilities . The CWA requires POTWs to meet secondary treatment standards as determined by EPA. Secondary standards are based on performance data for POTWs that use physical and biological treatment to remove or control conventional pollutants. As shown in Figure 1 , the CWA requires non-POTW dischargers to achieve specified levels of control based on (1) whether a discharger directly or indirectly discharges into a water of the United States (an indirect discharger discharges to a POTW for treatment prior to discharge into a water of the United States), (2) whether the discharger is a new or existing source, and (3) the category of pollutant (conventional, toxic, or nonconventional ). The CWA requires EPA to publish national regulations for non-POTW dischargersâcalled Effluent Limitation Guidelines and Standards (ELGs)âwhich set minimum standards for specific pollutants in industrial wastewater discharges based on the specified levels of control. Since 1972, EPA has developed ELGs for 59 industrial categories. For direct dischargers, states or EPA incorporate the limits established in ELGs into the NPDES permits they issue. For indirect dischargers, pretreatment standards established in ELGs to prevent pass through and interference at the POTW apply. The CWA requires EPA to annually review all existing ELGs to determine whether revisions are appropriate. In addition, CWA Section 304(m) requires EPA to publish a plan every two years that includes a schedule for review and revision of promulgated ELGs, identifies categories of sources discharging toxic or nonconventional pollutants that do not have ELGs, and establishes a schedule for promulgating ELGs for any newly identified categories. In its 2002 draft Strategy for National Clean Water Industrial Regulations , EPA described a process for identifying existing ELGs that the agency should consider revising as well as industrial categories that may warrant development of new ELGs. As outlined in the strategy, EPA considers four main factors when prioritizing existing ELGs for possible revision: (1) the amount and type of pollutants in an industrial category's discharge and the relative hazard to human health or the environment, (2) the availability of an applicable and demonstrated wastewater treatment technology, process change, or pollution prevention measure that can reduce pollutants in the discharge and the associated risk to human health or the environment; (3) the cost, performance, and affordability or economic achievability of the wastewater treatment technology, process change, or pollution prevention measure; and (4) the opportunity to eliminate inefficiencies or impediments to pollution prevention or technological innovation or promote innovative approaches. EPA considers nearly identical factors in deciding whether to develop new ELGs. EPA uses a variety of screening-level analyses to address these factors. These analyses evaluate discharge monitoring reports and EPA's Toxic Release Inventory to rank industrial categories according to the total toxicity of their wastewater. In 2012, the Government Accountability Office recommended that the annual review include additional industrial hazard data sources to augment its screening-level reviews. In response, EPA has begun to use additional data sources that provide information about CECs or new pollutant discharges, industrial process changes, and new and more sensitive analytical methods, among other things. For example, EPA has reviewed data from the agency's Office of Pollution Prevention and Toxics to identify potential CECs. If EPA identifies an industrial discharge category warranting further review, it conducts a more detailed review, which may lead to a new or revised guideline. EPA published its most recent effluent guidelines program planâthe Final 2016 Effluent Guidelines Program Plan âin April 2018. It identified one new rulemaking to revise the Steam Electric Power Generating Point Source Category ELG but concluded that no other industries warrant new ELGs at this time. In its plan, EPA also announced that it is initiating three new studies: a holistic look at the management of oil and gas extraction wastewater from onshore facilities, an industry-wide study of nutrients, and an industry-wide study of PFAS. Both EPA and states have authority under the CWA to address CECs through technology-based effluent limitations using ELGs or by setting technology-based effluent limits in NPDES permits on a case-by-case basis. In addition, the CWA authorizes EPA to add contaminants to the Toxic Pollutant List. When EPA develops an ELG for a new industrial category or revises an existing ELG, it is for the industrial categoryânot a specific pollutant. However, as evidenced in the agency's most recent effluent guidelines program plan, EPA may initiate a cross-industry review of particular pollutants (such as the agency is doing with PFAS and nutrients). EPA uses such reviews to prioritize further study of the industrial categories that may be candidates for ELG development or revision to control the discharges of those particular pollutants. If EPA were to determine that new or revised ELGs are warranted to control discharges of those pollutants, and the agency had the necessary data to support the development or revision, the agency could initiate a rulemaking process to do so. The CWA also authorizes EPA and states to impose technology-based effluent limits in NPDES permits on a case-by-case basis when \"EPA-promulgated effluent limitations are inapplicable.\" This includes when EPA has not developed ELGs for the industry or type of facility being permitted or pollutants or processes are present that were not considered when the ELG was developed. This provides a means for the permitting authority to restrict pollutants in a facility's discharge even when an ELG is not available. CWA regulations require best professional judgment to set case-by-case technology-based effluent limits, applying criteria that are similar to the analysis EPA uses to develop ELGs but are performed by the permit writer for a single facility. The CWA also authorizes EPA to designate contaminants as toxic pollutants, which can trigger other actions under the CWA and CERCLA. (For a discussion of the effect of designating a contaminant as a toxic pollutant on the treatment of that contaminant under CERCLA, see \" Designating CECs as Toxic Pollutants or Hazardous Substances .\") CWA Section 307 authorizes EPA to designate toxic pollutants and promulgate ELGs that establish requirements for those toxic pollutants. Section 307(a)(1) directed EPA to publish a specified list of individual toxic pollutants or combination of pollutants and, from time to time, add or remove any pollutant that possesses certain properties. EPA adopted the initial list of 65 toxic pollutants in 1978, as directed by Congress. Since that time, the list of 65 toxic pollutants has generally not changed. Section 307(a)(1) directs EPA to \"take into account the toxicity of the pollutant, its persistence, degradability, the usual or potential presence of the affected organisms in any waters, the importance of the affected organisms, and the nature and extent of the effect of the toxic pollutant on such organisms\" when revising the Toxic Pollutant List. Section 307(a)(2) authorizes EPA to develop effluent limitations for any pollutant on the Toxic Pollutant List based on best available technology. Notably, however, EPA has the authority to develop effluent limitations for any pollutant regardless of whether it is on the Toxic Pollutant List. Adding a pollutant to the Toxic Pollutant List would trigger an additional requirement for states. Section 303(c)(2)(B) of the CWA requires states, whenever reviewing, revising, or adopting water quality standards, to adopt numeric criteria for all toxic pollutants listed pursuant to Section 307, for which EPA has published water quality criteria under Section 304(a). EPA and states use both the ELGs for industrial categories and state water quality standards in establishing pollutant limits in permits under Section 402. (See Figure 1 .) EPA and states face a number of challenges in addressing CECs through technology-based effluent limitations. In particular, EPA officials stated that in developing a new ELG or updating an existing ELG, the agency needs to gather extensive supporting information. This effort includes identifying the pollutants of concern; evaluating the levels, prevalence, and sources of those pollutants of concern; determining whether the pollutants are in treatable quantities and whether effective treatment technologies are available; and developing economic data to project the cost of treatment, among other things. Also, EPA and state officials have asserted that it is difficult for the agency and its CWA programs to keep pace with the growth of new chemicals in commerce. Accordingly, the agency is generally reactive rather than proactive in addressing CECs. EPA officials stated that identifying demonstrated treatment technologies and documenting their efficiency is especially challenging. The officials further stated that the most difficult task is showing that any technology selected as the basis for an ELG is economically achievable for the industry. In addition, EPA and states often lack analytical methods to measure an emerging contaminant. Even where analytical methods are available, there is still often a lack of data on the levels of the contaminant in dischargers' effluent and/or in the receiving surface waters. The two sources of data most readily available to EPAâdischarge monitoring report data and toxic release inventory dataâare limited to specific contaminants on which industry is required to report. EPA stated that the agency's capacity to collect dataâincluding obtaining clearance to request and collect the data and undertaking the extensive effort to do soâis limited in light of their staffing levels and resources. Should EPA have enough data to determine that a new or revised ELG is warranted and announce its intent to do so in an effluent guidelines program plan, the time it takes to issue the regulation varies, according to EPA officials. CWA Section 304(m) establishes a three-year time limit for new ELGs. For revised ELGs, the EPA officials stated that the time can vary depending upon the availability of data and the level of complexityâsome may be very technical and involve many wastestreams. Two of the more recently issued ELGsârevisions of the oil and gas extraction and steam electric power generating categoriesâtook five and six years, respectively. Under the CWA, water quality standards translate the goals of the act (e.g., fishable and swimmable waters, no toxic pollutants in toxic amounts) into measurable objectives to protect or improve water quality. States, territories, and authorized tribes (hereinafter referred to collectively as states) are required to adopt water quality standards for waters of the United States, subject to EPA approval. They may also adopt standards for additional surface waters if their own state laws allow them to do so. Water quality standards consist of three key required components: 1. Designated uses for each water bodyâfor example, recreation (swimming or boating), aquatic life support, fish consumption, public water supply, agriculture; 2. Criteria , which describe the conditions in a water body necessary to support the designated usesâexpressed as concentrations of pollutants or other quantitative measures or narrative statements; and 3. An antidegradation policy for maintaining existing water quality. States have the primary authority to adopt, review, and revise their water quality standards and implementation procedures. The CWA requires states to review their water quality standards at least once every three years. EPA is required to review the states' water quality standards. Water quality criteria prescribe limits on specific contaminants or conditions in a water body that protect particular designated uses of the water body. Both the EPA and states have roles in establishing water quality criteria under CWA Section 304(a) and 303(c)(2), respectively. CWA Section 304(a) requires EPA to develop and publish and \"from time to time thereafter revise\" criteria for water quality that accurately reflect the latest scientific knowledge. These criteria are recommendations to states for use in developing their own water quality standards. EPA has developed several different types of criteria, including human health criteria, aquatic life criteria, and recreational criteria. EPA has also published guidelines for deriving water quality criteria, which the agency uses to develop new criteria under Section 304(a). These guidelines also serve as guidance to states as they adjust water quality criteria developed under Section 304(a) to reflect local conditions or develop their own scientifically defensible water quality criteria. EPA most recently updated its human health criteria in 2015, revising 94 of the 122 existing human health criteria. EPA last updated its methodology for deriving human health criteria in 2000, incorporating \"significant scientific advances in key areas such as cancer and non-cancer risk assessments, exposure assessments, and bioaccumulation in fish.\" EPA's national recommended aquatic life criteria table currently includes 58 criteria. Many of these criteria were published prior to 1990. In the past 10 years, EPA has published two new criteria. EPA has not updated its guidelines for deriving aquatic life criteria since 1985. According to EPA, however, the guidelines allow for best professional judgment, which they have used in more recent criteria development and updates. The agency recognizes that since 1985, there has been substantial scientific advancement that warrants updating these guidelines. EPA formally initiated the guidelines revision process in 2015. However, according to EPA officials, the agency has shifted its focus from updating the guidelines to determining whether available data and research support development of human health criteria for PFAS. In doing so, EPA officials indicated they plan to use information gathered for the guidelines revision and also noted that they are not tied to the 1985 guidelines due to the best professional judgment clause included therein. EPA's recreational water quality criteria are national recommendations for all inland and coastal waters that have a primary contact recreation (i.e., swimming) designated use. EPA establishes recreational water quality criteria to help protect against illness caused by organismsâsuch as viruses, bacteria, and their associated toxinsâin water bodies. In 2012, EPA updated its recreational water quality criteria, which it had last issued in 1986. Additionally, in June 2019, EPA published final recreational water quality criteria for two algal toxins, which are commonly present in harmful algal blooms, to supplement the 2012 recreational water quality criteria. In addition, EPA is currently developing recreational water quality criteria for coliphage, a viral indicator of fecal contamination. States use EPA's criteria as guidance in developing their own water quality standards. CWA Section 303(c)(2) requires states to adopt criteria to protect the designated uses of their water bodies and to also adopt criteria for all toxic pollutants listed pursuant to Section 307(a)(1), for which EPA has published criteria under Section 304(a). States' water quality criteria must be based on sound scientific rationale, contain sufficient parameters or constituents to protect the designated uses, and support the most sensitive use for water bodies with multiple designated uses. EPA regulations further require that states should establish numeric criteria based on CWA Section 304(a) guidance, CWA Section 304(a) guidance modified to reflect site-specific conditions, or other scientifically defensible methods. Where numeric criteria cannot be established, states are required to establish narrative criteria or criteria based on biomonitoring methods. States may adopt more stringent criteria than what EPA recommends, including for pollutants or parameters for which EPA has not promulgated 304(a) criteria. EPA and states may establish water quality criteria for CECs. If EPA were to establish criteria under CWA Section 304(a) for a CEC, that action alone would not necessarily require states to adopt criteria for that contaminant. As explained above, the CWA requires that states adopt criteria to protect their designated uses into their water quality standards. EPA's regulations provide that if a state does not adopt new or revised criteria for parameters for which EPA has published new or updated recommendations, then the state shall provide an explanation. States are explicitly required, as explained above, to adopt criteria for a contaminant if EPA designates it as a toxic pollutant under CWA Section 307 and publishes criteria for that contaminant under Section 304(a). Once a state has adopted water quality criteria for a contaminant as part of its state water quality standards and those standards have been approved, several CWA tools are available for achieving those standards. The primary tool is to limit or prohibit discharges of the contaminant in NPDES permits. In some cases, the technology-based effluent limits may already enable attainment of state water quality standards. In instances where they do not, the permit writer is required to establish water-quality-based effluent limitations. If a water body is not attaining its designated use (i.e., is \"impaired\" for that use), the Total Maximum Daily Load (TMDL) may also be used. A TMDL, essentially a \"pollution diet\" for a water body, is the maximum amount of a pollutant that a water body can receive and still meet water quality standards and an allocation of that amount to the pollutant's sources (including a margin of safety). TMDLs consider point sources, which can be addressed through permits, as well as nonpoint (diffuse) sources, which are more often addressed through best management practices and related efforts under CWA Section 319 nonpoint source management programs. A key challenge is often a lack of data about the occurrence, concentration, and persistence of CECs in the environment, as well as the effects on human health and aquatic life. Detection of a contaminant does not necessarily trigger regulatory measures. Information on the potential for the contaminant to adversely affect human health and aquatic life, potential exposure pathways, and other data would also be needed to inform such decisions. Developing new water quality criteria or updating existing criteria can often be time intensive, particularly in cases where data are limited. The general process for developing criteria involves a number of steps, including problem formulation and developing an analysis plan; gathering data and analyzing relevant studies; drafting the criteria document; a rigorous review process (e.g., branch level, office level, interagency, and independent external peer review); public notice and comment, and revising and publishing the criteria. According to EPA officials, the time it takes to develop or update criteria is often a function of the data that are available. EPA officials noted that developing criteria can take several years or longer. For example, the 2016 update for the aquatic life water quality criteria for seleniumâan effort characterized by EPA as complicated, in part because of the contaminant's bioaccumulative propertiesâtook 10 years to complete. In other cases, such as when a contaminant has an existing EPA Integrated Risk Information System value, developing or updating the human health water quality criteria for that contaminant may take less time, according to EPA officials. In May 2019, a report from the Contaminants of Emerging Concern Workgroup, convened by the Association of State Drinking Water Administrators and the Association of Clean Water Administrators, provided recommendations from state regulators regarding the ways state and federal agencies could improve the management of CECs. The report stated the following: The use of existing authorities and processes under the CWA and [Safe Drinking Water Act] to establish new criteria or standards is onerous, can take decades to implement, and does not meet public expectations for timely identification and prioritization of CECsâ¦. However slow these federal processes are, many state agencies do not have the infrastructure (i.e., sufficient funds and/or staffing levels), regulatory authority, or technical expertise to derive their own criteria or set their own standards for drinking water, surface water, groundwater, and fish tissue. Among numerous other recommendations provided in the report, the CEC workgroup recommended that EPA work with states to generate a list of priority CECs. To that end, EPA officials stated that they are developing a more formalized prioritization process for determining which contaminants warrant criteria development that will incorporate input from multiple stakeholders (including states), leverage information collected under the Safe Drinking Water Act, and incorporate monitoring and other data (e.g., ambient water concentrations). Two sections of the CWAâSections 307 and 311âauthorize EPA to designate contaminants as toxic pollutants and hazardous substances, respectively. Designating a contaminant under Section 307 or Section 311 of the CWA has implications for how the contaminant is treated under CERCLA. CERCLA defines the term hazardous substance to include toxic pollutants designated under CWA Section 307 and hazardous substances designated under CWA Section 311 (as well as substances designated under certain other statutes and other chemicals that EPA may designate as hazardous substances). EPA's authority to designate contaminants under CWA Section 307 as toxic pollutants and the CWA-related implications of that designation are discussed above under \" Toxic Pollutant List .\" CWA Section 311(b)(2)(A) authorizes EPA to promulgate a rule designating as a \"hazardous substance\" any element or compound that, when discharged as specified under the section, would present an imminent and substantial danger to public health or welfare, including but not limited to fish, shellfish, wildlife, shorelines, and beaches. EPA is authorized to revise the list of hazardous substances subject to these criteria as may be appropriate. EPA finalized the initial list of hazardous substances in 1978 and thereafter revised the list in 1979, 1989, and 2011. Pursuant to Section 311(b)(4), EPA established \"harmful\" quantities for these substances that are subject to the reporting of discharges prohibited under Section 311(b)(3). Section 311(b)(5) requires a person in charge of a vessel or facility to notify the National Response Center, administered by the U.S. Coast Guard, as soon as that person has knowledge of a discharge. Discharges permitted under other provisions of the CWA or otherwise allowable under certain other federal, state, and local regulations are excluded from reporting under CWA Section 311. CWA Section 311(c) authorizes federal actions to remove a prohibited discharge of a hazardous substance (or oil). CWA Section 311(f) establishes liability for the recovery of removal costs, including restoration of damaged natural resources. Section 311(e) authorizes enforcement orders to require a responsible party to abate an imminent and substantial threat to public health or welfare from a prohibited discharge, or threat of a harmful discharge, of a hazardous substance (or oil). If EPA were to designate a CEC, or any contaminant, as a toxic pollutant or hazardous substance under the CWA, that contaminant would, by statutory definition, be defined as a hazardous substance under CERCLA. CERCLA authorizes federal actions to respond to a release, or substantial threat of a release, of a hazardous substance into the environment in coordination with the states. CERCLA similarly authorizes response actions for releases of other pollutants or contaminants that may present an imminent and substantial danger to public health or welfare. CERCLA also establishes liability for response costs and natural resource damages but only for hazardous substances and not for other pollutants or contaminants. CERCLA response authority is available for releases of pollutants or contaminants but without liability to require a potentially responsible party to perform or pay for response actions. Designating a CEC as a toxic pollutant or hazardous substance under the CWA would have the effect of establishing liability for their release as a hazardous substance under CERCLA. However, releases in compliance with a CWA permit would be exempt from liability under CERCLA as a \"federally permitted release\" based on the premise that the permit requirements would mitigate potential risks. CWA Section 311 also establishes liability for releases of hazardous substances, but CERCLA liability and enforcement mechanisms are broader than the CWA. In practice, CERCLA has been the principal federal authority used to respond to discharges of hazardous substances into surface waters and to enforce liability, although the enforcement authorities of CWA Section 311 remain available to EPA. For a broader discussion of CERCLA, see CRS Report R41039, Comprehensive Environmental Response, Compensation, and Liability Act: A Summary of Superfund Cleanup Authorities and Related Provisions of the Act , by David M. Bearden. Recent congressional interest in CECs has largely focused on addressing one particular group of CECsâPFASâand addressing them through several statutes, such as the Safe Drinking Water Act. However, legislation in the 116 th Congress proposes to address PFAS using CWA authorities. H.R. 3616 âthe Clean Water Standards for PFAS Act of 2019âand Section 330A of H.R. 2500 , the House-passed version of the NDAA for FY2020, would direct EPA to add PFAS to the CWA Toxic Pollutant List and publish ELGs and pretreatment standards for PFAS within specified time frames. In addition, Section 330G of the House-passed version of the NDAA bill, Sections 6731-6736 of S. 1790 (the Senate NDAA bill), H.R. 1976 , and S. 950 would direct the U.S. Geological Survey (USGS) to carry out nationwide samplingâin consultation with states and EPAâto determine the concentration of perfluorinated compounds in surface water, groundwater, and soil. These bills would also require USGS to prepare a report for Congress and provide the sampling data to the EPA as well as other federal and state regulatory agencies that request it. Additionally, the bills would require the data to be used to \"inform and enhance assessments of exposure, likely health and environmental impacts, and remediation priorities.\" Some Members have also introduced legislation to require comprehensive PFAS toxicity testing ( H.R. 2608 ). In addition to focusing on PFAS, several bills proposed in the 116 th Congress look more broadly at how to address CECs. For example, some aim to improve federal coordination and research and support states in addressing emerging contaminants. S. 1507 , S. 1251 , and Sections 6741-6742 of S. 1790 would direct the White House Office of Science and Technology Policy to establish a National Emerging Contaminant Research Initiative. The bills would also direct EPA to develop a program to provide technical assistance and support to states for testing and analysis of emerging contaminants and establish a database of resources available through the program to assist states with testing for emerging contaminants. While these efforts are more focused on CECs in drinking water, the bill directs the EPA to ensure that the database is available to groups that have interest in emerging contaminants, including wastewater utilities. While Congress is currently debating how to best address the concerns related to widespread detections of PFAS, attention to other emerging contaminants (e.g., microplastics and algal toxins) has also increased with the availability of new detection methods and increased monitoring. Observers note that in the coming years, other CECs will likely emerge and prompt similar calls for immediate action to protect public health and the environment. Many observers argue that federal actions to address CECs currently tend to be reactive rather than proactive. Many of these observers assert that more focus and attention is needed on assessing the toxicity of chemical substances before they are introduced into commerce. Congress is currently considering legislation to improve federal coordination and responses to CECs. Specific to the CWA, some observers advocate for oversight to identify and address potential gaps or barriers in CWA authorities and processes that make it difficult for EPA and states to quickly respond when CECs are detected. Other observers assert that EPA could better use its existing authorities to address CECs. For example, EPA has not updated its ELGs for certain industrial categories in decades. Accordingly, some observers assert that various ELGs do not reflect advancements in science or technology that could lead to new effluent limitations for CECs. Similarly, some stakeholders assert that EPA could better prioritize which CECs warrant water quality criteria development. EPA's ability to address these and other recommendations depends on the availability of resources, treatment technologies, and scientific and economic data. Moving forward, Congress may be interested in evaluating EPA appropriations for the CWA programs that support EPA's efforts to address discharges of CECs. Congress may also be interested in overseeing the Administration's implementation of these programs.", "summary": "Recent decades have seen increased national attention to the presence of \"emerging contaminants\" or \"contaminants of emerging concern\" (CECs) in surface water and groundwater. Although there is no federal statutory or regulatory definition of CECs, generally, the term refers to unregulated substances detected in the environment that may present a risk to human health, aquatic life, or the environment and for which the scientific understanding of potential risks is evolving. CECs can include many different types of manufactured chemicals and substancesâsuch as those in pharmaceuticals, industrial chemicals, agricultural products, and microplasticsâas well as naturally occurring substances, such as algal toxins. Data on CECs that would help determine their risk to humans and aquatic life or other aspects of the environment are often limited. Increased monitoring and detections of one particular group of chemicals, per- and polyfluoroalkyl substances (PFAS), has recently heightened public and congressional interest in these CECs and has also prompted a broader discussion about how CECs are identified, detected, and regulated and whether additional actions should be taken to protect human health and the environment. While several statutes provide authorities to the U.S. Environmental Protection Agency (EPA) and states to address CECs, this report examines authorities available under the Clean Water Act (CWA)âwhich Congress established to restore and protect the quality of the nation's surface waters. EPA has several CWA authorities it may use to address CECs, although it faces some challenges in doing so. Under the CWA, a primary mechanism to control contaminants in surface waters is through permits. The statute prohibits the discharge of pollutants from any point source (i.e., a discrete conveyance) to waters of the United States without a permit. The CWA authorizes EPA and states to limit or prohibit discharges of pollutants in the National Pollutant Discharge Elimination System (NPDES) permits they issue. These permits incorporate technology-based and water-quality-based requirements. The CWA authorizes EPA and states to address CECs through technology-based effluent limitations using national Effluent Limitation Guidelines and Standards (ELGs) or by setting technology-based effluent limits in NPDES permits on a case-by-case basis. The CWA requires EPA to publish ELGs, which are the required minimum standards for industrial wastewater discharges. The CWA also requires EPA to annually review all existing ELGs and to publish a biennial plan that includes a schedule for review and revision of promulgated ELGs, identifies categories of sources discharging toxic or nonconventional pollutants that do not have ELGs, and establishes a schedule for promulgating ELGs for any newly identified categories. In cases where EPA has not established an ELG for a particular industrial category or type of facility, or where pollutants or processes were not considered when an ELG was developed, the permitting authority (EPA or states) may still impose technology-based effluent limits on a case-by-case basis. Although EPA and states have these authorities available to address CECs, there are some challenges to doing so, including a lack of data available to support new ELGs or updates to existing ELGs. Agency officials stated that it is difficult for the agency to keep pace with the growth of new chemicals in commerce. The CWA also authorizes EPA and states to address CECs through water-quality-based requirements. States are required to adopt water quality standards for waters of the United States and review them at least once every three years. The CWA requires EPA to publish, and \"from time to time thereafter revise\" water quality criteria that reflect the latest scientific knowledge. States use EPA's criteria as guidance in developing their water quality standards. The CWA directs states to adopt criteria to protect their water bodies' designated uses and to also adopt criteria for all pollutants on the Toxic Pollutant List, for which EPA has published criteria. Once a state adopts water quality criteria for a contaminant as part of its water quality standards, several CWA tools are available to the state for achieving them. The primary tool is to establish water-quality-based effluent limitations in NPDES permits. Although EPA and states have authority to address CECs through water-quality-based requirements, they often lack data needed to support development of criteria or water-quality-based effluent limitations. The CWA also authorizes EPA to designate contaminants as toxic pollutants or as hazardous substances, which may trigger other actions under the CWA and the Comprehensive Environmental Response, Compensation, and Liability Act. Recent congressional interest in CECs has focused on addressing one particular group of CECsâPFASâand on addressing them through other statutes. However, in the 116 th Congress, H.R. 3616 and H.Amdt. 537 , Section 330A, of the House-passed version of the National Defense Authorization Act for FY2020 ( H.R. 2500 ), would direct EPA to add PFAS to the CWA Toxic Pollutant List and publish ELGs that establish effluent limitations and standards for PFAS within specified time frames.", "document_type": "crs"}
{"report": "T he National Oceanic and Atmospheric Administration (NOAA) currently supports natural, nature-based, or green infrastructure and other related types of features (hereinafter referred to as nature-based infrastructure) as part of its statutory mandates to support, research, restore, and conserve natural resources. Practitioners and decisionmakers have been using the term nature-based infrastructure and supporting nature-based infrastructure features since at least the late 2000s (although these types of features have been assigned various names over time). Nature-based infrastructure may continue to be appealing due to (1) stakeholder emphasis on infrastructure features that benefit both humans and the environment in multiple ways and (2) recognition that infrastructure may be longer lasting if it can adjust to changing environmental conditions in the short and long terms. Members of Congress may consider whether and how to support nature-based infrastructure activities at federal agencies, including NOAA, with these objectives, among others, in mind. This report describes how NOAA characterizes nature-based infrastructure and the agency's current activities supporting research and implementation of nature-based infrastructure. The report also discusses potential issues for Congress including (1) definitions of nature-based infrastructure in statute, (2) NOAA's authority to support nature-based infrastructure, (3) how NOAA coordinates with other federal agencies and nonfederal entities on nature-based infrastructure activities, and (4) how NOAA funds nature-based infrastructure activities and its total nature-based infrastructure-related expenditures. NOAA has defined natural infrastructure and nature-based infrastructure in NOAA Administrative Order (NAO) 216-117: NOAA National Habitat Policy. NOAA defines natural infrastructure as \"healthy ecosystems, including forests, wetlands, floodplains, dune systems, and reefs, which provide multiple benefits to communities, including storm protection through wave attenuation or flood storage capacity and enhanced water services and security.\" Similarly, NOAA defines nature-based infrastructure as \"engineered systems where natural features are combined with more hard or structural engineering approaches to create a hybrid system.\" However, across NOAA's publicly accessible documents and websites, the agency appears to use the terms nature-based infrastructure, natural infrastructure, and green infrastructure interchangeably. Table 1 lists several types of nature-based infrastructure features as identified by NOAA. According to NOAA, nature-based infrastructure projects may include features that are completely natural, such as open lands and trees, or may incorporate varying degrees of hard or \"gray\" steel and concrete structures, such as bulkheads ( Figure 1 ). Often, multiple types of nature-based infrastructure features are combined within a project. The selection of nature-based infrastructure features often depends on a combination of available funding, space constraints, land or roof availability, technical feasibility, hydrologic impact, and community acceptance, among other factors. According to NOAA, nature-based infrastructure can provide several benefits in addition to flood, erosion, and runoff management, such as improved water quality, wildlife habitat, opportunity for groundwater recharge, recreation uses, and aesthetic appeal, among others. The extent to which nature-based infrastructure features provide these benefits is partially dependent on the location and types of features used. NOAA's National Habitat Policy (NAO 216-117) directs the agency to protect, maintain, and restore ocean, coastal, and Great Lakes ecosystems by \"applying natural and nature-based infrastructure,\" among other activities. According to the agency, this work is supported by a variety of statutory mandates and authorities. Congress has not defined in statute nature-based or related terms for NOAA, nor has it explicitly directed NOAA to broadly support nature-based features or related activities across the agency. NOAA's nature-based infrastructure activities fall primarily under three line offices: the National Marine Fisheries Service (NMFS), National Ocean Service (NOS), and Office of Oceanic and Atmospheric Research (OAR). According to NOAA, many of the agency's nature-based infrastructure activities are related to restoration and conservation projects; the projects are typically local or regional in scale and take place within coastal or Great Lakes states. NMFS's Restoration Center administers the community-based restoration grant program with congressionally appropriated funds to support nature-based infrastructure activities, among other restoration activities, implemented by institutions of higher education; nonprofit and for-profit organizations; U.S. territories; and state, local, and tribal governments. The NOAA Restoration Atlas, a project-tracking database, lists over 2,000 community-based restoration projects, many of which include nature-based infrastructure features and multiple benefits. For instance, the Restoration Center provided funds for the planting of marshgrass along the coast of Northumberland County, VA, to reduce shoreline erosion and improve fish habitat ( Figure 2 ). Several programs and activities under NOS support research and implementation of nature-based infrastructure. For example, the Coral Reef Conservation Program, National Coastal Zone Management Program, and National Estuarine Research Reserve System provide technical assistance and administer competitive grant programs to a variety of entities, such as institutions of higher education; nonprofit organizations; and local, state, and tribal governments, among others. Coastal scientists with NOAA's National Centers for Coastal Ocean Science have estimated the economic value of nature-based infrastructure to stabilize coastlines along the Pacific Northwest. Additionally, the Damage Assessment, Remediation, and Restoration Program, a program with components in both NMFS and NOS, supports nature-based infrastructure implementation through funds recovered in settlements or litigation. For example, it has supported the design and implementation of a living shoreline with breakwaters in Pensacola, FL, to (1) create and restore salt marsh and reef habitat and (2) protect and stabilize the shoreline, with funds from the BP Deepwater Horizon spill settlement ( Figure 3 ). Under OAR, the Climate Program Office and the National Sea Grant College Program (Sea Grant) both support research and implementation of nature-based infrastructure through competitive grant programs on a variety of topics, including nature-based infrastructure. For example, the Climate Program Office has awarded grants to institutions of higher learning and agencies within state government to support the development and application of methodologies to value nature-based infrastructure. Sea Grant also may support research or provide technical assistance for nature-based infrastructure projects. For instance, Alaska Sea Grant organized trainings in \"Green Infrastructure for Coastal Resilience\" for municipal and borough planners, designers, landscape architects, public housing authority planners, academics, and nonprofits. In another case, New York Sea Grant funded the monitoring of nature-based shoreline erosion management measures in various regions of New York. Additional NOAA programs may have roles related to nature-based infrastructure, such as reviewing projects that may use nature-based infrastructure and providing underlying data for decisionmaking. For example, the NMFS Office of Protected Resources is often involved in reviewing nature-based infrastructure projects that may affect protected species under NOAA's jurisdiction. NOAA may also direct appropriated funding to nonfederal organizations, such as the National Fish and Wildlife Foundation, to support nature-based infrastructure activities. For example, NOAA provides funds and program oversight to the foundation's National Coastal Resilience Fund, which in FY2019 funded grants to \"create, expand, and restore natural systems in areas that will both increase protection for communities from coastal storms, sea- and lake-level changes, inundation, and coastal erosion while also improving valuable habitats for fish and wildlife species,\" among other objectives. Congress has not defined the term nature-based infrastructure , or similar terms, in statute for NOAA as it has for USACE and EPA. For example, in P.L. 114-322 Congress defined natural and nature-based features and directed USACE to consider the features when studying the feasibility of flood risk management, hurricane and storm damage reduction, and ecosystem restoration projects (33 U.S.C. Â§2289a). In P.L. 115-436 , which amended the Clean Water Act, Congress defined green infrastructure and directed EPA to promote green infrastructure use, among other activities (33 U.S.C. Â§1362(27) and 33 U.S.C. Â§1377a). Congress may consider whether and how to define the term and the types of nature-based infrastructure for NOAA. Some Members of Congress have proposed definitions within the context of new NOAA programs. For example, H.R. 1317 in the 116 th Congress would provide definitions for natural , nature-based , and nonstructural features to be used as criteria for new NOAA financial assistance programs. Two other nearly identical bills in the 116 th Congress, H.R. 3115 and S. 1730 , define the term living shoreline for the use within a new agency-administered grant program. A NOAA-specific definition of nature-based infrastructure and similar terms in statute may help the agency prioritize and manage its nature-based infrastructure activities. A definition also could potentially limit the types of nature-based infrastructure, by inhibiting the development and adoption of new designs and features that are not captured in a statutory definition. Further, a NOAA-specific definition may conflict with other federal agency definitions for nature-based infrastructure. Congress may consider whether one definition should be used among all federal agencies to minimize the potential for confusion. A single definition across all federal agencies, however, could conflict with the various missions and activities of the different federal agencies. Congress has directed NOAA to support, research, restore, and conserve natural resources in a variety of statutes. Congress has not enacted authorities specifically for nature-based infrastructure activities; however, NOAA has interpreted some of its authorities to include support for nature-based infrastructure activities. For example, in 2009 Congress directed NOAA to create the Coastal and Estuarine Land Conservation Program (CELCP) under the Coastal Zone Management Act (CZMA; P.L. 111-11 , 16 U.S.C. Â§1456-1 and Â§1456d). Congress established the CELCP to provide grants to nonfederal entities to protect \"important coastal and estuarine areas that have significant conservation, recreation, ecological, historical, or aesthetic values\" (16 U.S.C. Â§1456d), which may include natural or open lands, identified by NOAA as nature-based infrastructure in Table 1 . Similarly, Congress instructed NOAA to conduct and support \"activities to conserve coral reefs and coral reef ecosystems\" (16 U.S.C. Â§Â§6401-6409). NOAA has identified coral reefs as a type of nature-based infrastructure ( Table 1 ); coral reefs have been shown to buffer waves and provide protection from shoreline erosion. Some stakeholders contend that NOAA is already authorized to support nature-based infrastructure features through its existing statutes. Others in Congress, however, have proposed legislation that would expand the type of nature-based infrastructure activities NOAA currently supports. For example, in the 116 th Congress, H.R. 1317 would direct NOAA to \"improve the resilience of the built and natural environment to natural disasters and climate change\" by using natural, nature-based, and nonstructural features, among other features. Another bill, H.R. 3115 , would require NOAA to administer grants for \"designing and implementing ... living shorelines; and ... innovative uses of natural materials and systems to protect coastal communities, habitats, and natural system functions,\" among other provisions. Expanding NOAA's authority for nature-based infrastructure activities has been met with some opposition. For example, some in Congress have argued that a new NOAA grant program that H.R. 3115 would authorize \"strays from the long-standing Congressional intent of providing eligible coastal states and territories the flexibility to design programs that best address local challenges by inserting federal priorities into a state-run program.\" NOAA often supports nature-based infrastructure activities alongside other federal and nonfederal partners. For example, the agency has provided financial and technical support to the aforementioned Pensacola Bay Living Shoreline Project, which also receives support from the Florida Department of Environmental Protection. In addition, NOAA has been a part of several federal interagency and interorganizational efforts to better understand and support nature-based infrastructure. For instance, NOAA was a part of the federal Coastal Green Infrastructure and Ecosystem Services Task Force established in response to Hurricane Sandy Rebuilding Strategy recommendations. The task force was co-chaired by NOAA and the U.S. Geological Survey and resulted in the development of a 2015 report. Report recommendations focused on \"coastal green infrastructure\" metrics, production functions (e.g., how can the United States better track how ecosystem changes may impact infrastructure), ecosystem-service valuation, social factors, and decisionmaking support. NOAA also has been a member of the interorganizational Systems Approach to Geomorphic Engineering (SAGE) working group. SAGE includes representatives from federal and state agencies, academic and research institutes, nongovernmental organizations, and the private sector. SAGE is a \"community of practice\" and aims to share advances in the science, engineering, policy, and financing of nature-based infrastructure across organizations. For example, organizations, including NOAA, have been a part of SAGE pilot projects in selected locations working to address issues such as shoreline loss using nature-based infrastructure. SAGE also brings organizations together to discuss technical, policy, and financial issues through periodic meetings and serves as a public resource aggregator by compiling links to technical guidance, conference proceedings, research, and other materials. Congress may deliberate whether and how to direct NOAA to manage nature-based infrastructure activities within the agency or with non-NOAA organizations in specific ways. For example, Congress may require NOAA to coordinate its nature-based infrastructure within an intra-agency working group or task force. Alternatively, Congress could establish an advisory board or similar group to provide recommendations for better intra-agency, interagency, and interorganizational coordination. For coordination with organizations outside of NOAA, Congress may authorize in statute an already established working group, such as SAGE, or create a new group focused on nature-based infrastructure. Some stakeholders may argue that a statutory requirement for NOAA to coordinate with federal and nonfederal partners may facilitate information sharing, promote the efficient use of available funding, and streamline permitting across federal agencies. Others may argue that unless Congress specifically authorizes NOAA to support nature-based infrastructure activities, the agency should (1) focus resources solely on meeting current congressional directives and/or (2) coordinate at their own discretion. Congress funds NOAA to support, research, restore, and conserve natural resources primarily through the annual appropriations process. NOAA reports its spending to Congress on a program-by-program basis, but nature-based infrastructure activities are not tracked specifically as line items in either the agency's annual budget request or in congressional appropriations bills and reports. For example, Congress appropriated $68 million to the National Sea Grant College Program in FY2019; however, NOAA does not track what portion of that funding was used to support nature-based infrastructure activities. Similarly, NOAA does not report the proportion of funding supporting nature-based infrastructure activities in other NOAA programs. Congress may consider requiring NOAA to track and/or report its spending on nature-based infrastructure activities. Other federal agencies also likely do not track spending related to nature-based infrastructure activities, and Congress may consider requiring all federal agencies to report their nature-based infrastructure expenditures. Congress has sometimes required federal agencies to submit crosscut budgets detailing individual agency expenditures (e.g., USACE water resources research and technology institutes expenditures as required under 42 U.S.C. Â§10303) as well as some interagency expenditures (e.g., Great Lakes restoration activity expenditures as required under 33 U.S.C. Â§1268a). Stakeholders hold different views about whether or how Congress should fund nature-based infrastructure activities. Congress could continue to appropriate funds that support NOAA's core capabilities and mission, without specifying they be used for nature-based infrastructure activities. Alternatively, Congress could, for example, appropriate funds for existing or new NOAA programs that provide grants to nonfederal entities explicitly for research and implementation of nature-based infrastructure. Several bills introduced in the 116 th Congress address funding for nature-based infrastructure activities in various ways. For example, H.R. 3115 would create a new grant program to fund the installation of living shorelines, a type of nature-based infrastructure feature. H.R. 1317 would (1) issue a U.S. Postal Service semipostal stamp and use some of its proceeds to fund prize competitions and research catalog development, and (2) authorize appropriations for capitalization funds to establish state community resilience revolving funds for the implementation of nature-based infrastructure, among other projects. S. 2284 would establish the Carbon Dividend Trust Fund with requisite fund transfers to federal agencies. As proposed in S. 2284 , NOAA's portion of the fund transfer would support several programs, including a coastal resiliency program that would be required to prioritize the consideration of natural and nature-based infrastructure. However, some Members of Congress have argued that the establishment of new grant programs, such as the living shoreline grant program in H.R. 3115 , are \"duplicative and wasteful,\" as Congress already appropriates funding to NOAA that may be used to support nature-based infrastructure.", "summary": "The National Oceanic and Atmospheric Administration (NOAA) currently supports natural, nature-based, or green infrastructure and other related types of features (hereinafter referred to as nature-based infrastructure) as part of its statutory mandates to support, research, restore, and conserve natural resources. NOAA's nature-based activities primarily fall under three line offices: the National Marine Fisheries Service, National Ocean Service, and Office of Oceanic and Atmospheric Research. NOAA uses the term nature-based infrastructure and other related terms interchangeably to describe natural systems or engineered systems that mimic natural processes built to minimize flooding, erosion, and runoff. Nature-based infrastructure projects may include features that are completely natural, such as open lands and trees (e.g., coastal mangroves), or may incorporate varying degrees of hard or \"gray\" steel and concrete structures, such as seawalls. Often, multiple types of nature-based infrastructure features are combined within a project. Stakeholder selection of nature-based infrastructure features may depend on a combination of factors, including available funding, space constraints, technical feasibility, hydrologic impact, and community acceptance, among other factors. According to NOAA, nature-based infrastructure can provide several benefits such as flood, erosion, and runoff management, wave buffering, improved water quality, wildlife habitat, opportunity for groundwater recharge, recreation uses, and aesthetic appeal, among others. The extent to which nature-based infrastructure features provide these benefits is partially dependent on the types of features used and the location. Historically, Congress has directed funding to some federal agencies for the design and construction of hard infrastructure, such as breakwaters, revetments, and bulkheads or seawalls that provide a measurable and expected level of flood, erosion, and runoff management. However, these features also have demonstrated limitations and some unintended consequences. Researchers and practitioners have studied the potential impacts and benefits of hard structures relatively well, whereas similar research on nature-based infrastructure is ongoing. Practitioners and decisionmakers have been using the term nature-based infrastructure and supporting nature-based infrastructure features since at least the late 2000s (although these types of features have likely been studied and implemented under various terms for several decades). Nature-based infrastructure may continue to be appealing due to (1) stakeholder emphasis on infrastructure features that benefit both humans and the environment in multiple ways and (2) recognition that infrastructure may be longer lasting if it can adjust to changing environmental conditions in the short and long terms. Members of Congress may consider whether and how federal agencies, including NOAA, can support nature-based infrastructure activities by federal agencies. Congress has neither defined nature-based infrastructure in statutes related to NOAA activities nor directed in statute that the agency support such activities. Congress has provided some statutory direction related to nature-based infrastructure for the U.S. Army Corps of Engineers (USACE) and the Environmental Protection Agency (EPA). Congress may consider whether to define nature-based infrastructure for NOAA or explicitly authorize NOAA to support nature-based infrastructure in specific cases, similar to USACE and EPA, or require NOAA to consider nature-based infrastructure activities across the agency. Congress also may consider requiring federal (and federal with nonfederal) coordination of nature-based infrastructure activities in an existing federal working group (e.g., the System Approach to Geomorphic Engineering community of practice), a new group, or other mechanism. Finally, as NOAA does not identify its nature-based infrastructure activities as separate budget line items, Congress may consider (1) directing NOAA, and other federal agencies, to report its nature-based infrastructure spending and (2) whether to retain existing or establish new mechanisms to fund nature-based infrastructure activities at NOAA.", "document_type": "crs"}
{"report": "On June 5, 2019, the commissioners of the Securities and Exchange Commission (SEC) voted to adopt Regulation Best Interest (Reg BI). Reg BI is arguably the centerpiece and most controversial part of a set of regulatory reforms related to financial professionals adopted by the SEC on that day. A new rule under the Securities and Exchange Act of 1934 (P.L. 73-291), Reg BI changes broker-dealers' obligations in their relationships with retail customers. According to the SEC, the regulation is meant to \"enhance the broker-dealer standard of conduct beyond existing ... obligations [by] requiring broker-dealers ... to: (1) act in the best interest of the retail customer at the time the recommendation is made, without placing the financial or other interest of the broker-dealer ahead of the interests of the retail customer; and (2) address [various broker-dealer] conflicts of interest [with those clients].\" H.R. 3351 , the FY2020 Financial Services and General Government appropriations bill as passed by the House included an amendment sponsored by House Financial Services Committee Chair Maxine Waters that would have forbidden the SEC from using any of its congressional spending authority to implement, administer, enforce, or publicize the final rules and interpretations with respect to Reg BI. This language, however, was not included in H.R. 1865 / P.L. 116-94 , the Further Consolidated Appropriations Act, 2020, as enacted. This report examines Reg BI in that it (1) provides background on the roles and the regulation of two types of financial professionals, broker-dealers and investment advisers; (2) provides background on the Obama Administration Department of Labor's 2016 fiduciary rule for broker-dealers under the Employee Retirement Income Security Act of 1974 (ERISA, P.L. 93-406 ); (3) describes the component obligations required to fulfill Reg BI's best interest broker-dealer standard; (4) examines state-based broker-dealer fiduciary regulatory and statutory developments; (5) examines congressional concerns and actions regarding Reg BI; (6) presents some key supportive and critical perspectives on Reg BI; and (7) examines research with potential relevance to the debate over the potential costs and benefits of Reg BI. Broker-dealer firms or their affiliated persons act as brokers when they execute securities trades for their clients and as dealers when they trade their own securities for their own benefit. They are often discussed as a joint entity because most broker-dealers must register with the SEC, and must generally be members of and comply with the rules and guidance of a self-regulatory organization (SRO), the Financial Industry Regulatory Authority (FINRA, an SEC-regulated nonprofit). In addition, broker-dealer sales personnel (called registered representatives) register with their state securities regulator. SEC-registered broker-dealers are largely regulated under the Securities Exchange Act of 1934 (P.L. 73-291) and comprise a small set of large and medium-sized broker-dealers and thousands of smaller broker-dealers who compete in small niche or regional markets. Broker-dealers, or simply brokers, have significant range in the kinds of services they provide and generally divide into two groups, full-service and discount brokerage firms. Broker-dealers typically provide discrete, transaction-specific investment recommendations and are compensated via the commissions they receive for each individual transaction. A broker-dealer's investment recommendations suite may include buying securities from or selling securities to retail customers on a principal basis or recommending the purchase of proprietary products. In their investment recommendations, they are generally subject to what is known as the suitability standard , which requires them to \"reasonably believe that a client recommendation is suitable given the client's investor profile.\" Investment a dvisers are firms or persons who provide investment advice directly to their clients. Clients include individuals and institutional investors, such as mutual funds and hedge funds. Pursuant to the Investment Advisers Act of 1940 (IAA, which regulates key aspects of investment advisers; P.L. 76-768), advisers with more than $110 million in assets under management (AUM) must register with the SEC. States generally register and regulate investment adviser firms with between $25 million and $110 million in AUM. Investment advisers typically provide ongoing investment advice and services with respect to client portfolio management. Their compensation is generally determined by the client's account AUM size, a fixed fee, or other arrangements, such as a fee-based compensation model. Although not expressly written in the IAA, court rulings and decisions from SEC enforcement cases have helped establish the fiduciary standard , the prevailing standard of retail customer care for investment advisers. Under this standard, advisers are generally expected to serve the best interests of their clients and are required to subordinate their own interests to those of their clients. Ideally, advisers are also expected to either eliminate material conflicts of interest or be fully transparent to the client about the existence of such conflicts. By contrast, broker-dealers are generally subject to a less demanding standard of client care that is found in FINRA's Rule 2111, the suitability standard . Triggered when a broker-dealer makes an investment recommendation, the \"standard requires that a firm or associated person have a reasonable basis to believe a recommended transaction or investment strategy involving a security or securities is suitable for the customer.... [It] is based on the information obtained through reasonable diligence of the firm or associated person to ascertain the customer's investment profile.\" Also, unlike investment advisers, brokers do not have an ongoing duty to monitor their clients' financial positions. Broker-dealers are, however, subject to a fiduciary standard (1) when they have control of a client's discretionary account (meaning that they have a client's authority to buy and sell securities on the client's behalf) generally, according to case law; or (2) in a few statesâCalifornia, Missouri, South Dakota, and South Carolinaâwhere state courts have reportedly \"imposed an unambiguous fiduciary standard\" on them. The overall number of SEC-registered broker-dealers fell from more than 6,000 in 2005 to fewer than 4,000 in 2018, in contrast to an increase of SEC-registered investment advisers from about 9,000 in 2005 to more than 13,000 in 2018. During the late 1980s and early 1990s, the landscape for the delivery of investment advice began to shift as broker-dealers increasingly offered financial advisory services somewhat akin to investment advisers, including investment and retirement planning. The expansion was reportedly helped along by the brokers' reliance on the IAA's \"solely incidental\" exemption from compliance with the act, and the growth of dually registered firms (i.e., firms registered with FINRA and the SEC as both broker-dealers and investment advisers). Compounding the potential retail customer perplexity over who is an investment adviser and who is a broker-dealer is the existence of \"dozens of titles [in the broker world], including generic titles, such as financial advisor and financial consultant, as well as advertisements that reportedly claim that 'we do it all.'\" As a consequence of these developments, various surveys report that retail customers are often confused over the distinctions between broker-dealers and advisers and the unique set of customer obligations attached to each of them. This was encapsulated in an observation made in a Rand Corporation study: \"[T]he industry is becoming increasingly complex, firms are becoming more heterogeneous and intertwined, and investors do not have a clear understanding of the different functions and fiduciary responsibilities of financial professionals.\" In 2009, the U.S. Department of the Treasury issued a white paper on potential financial reforms in the wake of the financial crisis, Financial Regulatory Reform â A New Foundation: Rebuilding Financial Supervision and Regulation . A section of the report observed that for many investors there was little if any difference in the way they perceived brokers and advisers. It then argued that \"retail customers repose the same degree of trust in their brokers as they do in investment advisers, but the legal responsibilities of the intermediaries may not be the same.\" The white paper then recommended the enactment of new legislation \"requiring that broker-dealers who provide investment advice about securities to investors have the same fiduciary obligations as registered investment advisers.\" On the heels of the Treasury report and driven in part by similar concerns regarding investor confusion over the roles of investment advisors and broker-dealers, Section 913 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act, P.L. 111-203 ) did a number of things in this area. Among them was granting the SEC authority to impose fiduciary rules on broker-dealers subject to certain conditions and requiring the SEC to study various aspects of financial professionals' standards of retail customer care. Among other questions, the study was asked to evaluate \"whether there are legal or regulatory gaps, shortcomings, or overlaps in legal or regulatory standards in the protection of retail customers relating to the standards of care for providing personalized investment advice about securities to retail customers that should be addressed by rule or statute.\" Released in 2011, the staff study recommended that the SEC bolster investor protection and reduce investor confusion regarding the differences between brokers and investment advisers. The staff study then recommended \"establishing a uniform fiduciary standard for investment advisers and broker-dealers when providing investment advice about securities to retail customers that is consistent with the standard that currently applies to investment advisers.\" After the study, then-SEC Chair Mary Schapiro noted that the SEC staff had been tasked with considering the various ramifications of the recommended rulemaking. No such rulemaking was proposed or adopted by the SEC under Chair Schapiro or her successor, Chair Mary Jo White, who in 2015 reportedly said that the agency should \"implement a uniform fiduciary duty for broker-dealers and investment advisers where the standard is to act in the best interest of the investor.\" In April 2016, the Obama Administration's Department of Labor (DOL) adopted new rules under the Employee Retirement Income Security Act of 1974 (ERISA; P.L. 93-406 ). Previously, under ERISA, securities brokers-dealers who provided services to retirement plans and who were not fiduciaries were generally subject to a suitability standard. The 2016 DOL rules represented a significant change from this. Under them, broker-dealers were generally deemed to be fiduciaries while providing recommendations to retirement plan participants. Major parts of the rules were not to be implemented until 2018. In making the case for the reform, the Obama Administration argued that the definition of investment advice needed to be revised given the changed nature of how Americans were readying themselves for retirement after ERISA's enactment in 1975. More specifically, the number of participants in traditional defined benefit (DB) plans had significantly declined, whereas the number of participants in defined contribution (DC) plans, such as 401(k) plans, had surged. The Administration argued that DC plan participants tend to confront more decision options, such as contribution amounts, investment allocations, rollovers, and withdrawals, than do DB plan participants. As such, it was argued that those in DB plans may have greater need for investment assistance and advice subject to the more strenuous fiduciary standard. Supporters of DOL's fiduciary rules, including investor advocates, argued that financial advisers (including broker-dealers) would no longer be able to direct clients to products that awarded them larger commissions at the client's expense. Detractors, including broker-dealers, financial planners, and various Members of Congress, stressed that the rules would increase the cost of retirement accounts and would curtail various investors' access to investment advice. In February 2017, President Trump released a presidential memorandum ordering the Labor Department to reexamine the rule. Later, between April and November 2017, DOL ordered a series of delays for key parts of the rule that stretched until July 2019. On March 15, 2018, the Fifth Circuit Court of Appeals vacated the DOL rules. It ruled that DOL had exceeded its statutory authority under ERISA in writing the rules. The decision formally halted implementation of the rules. The adjudication was the result of a lawsuit brought by various business groups, including the U.S. Chamber of Commerce (a major business trade group), the Financial Services Roundtable (a group that represents the nation's largest firms in banking, insurance, and investment services), and the Securities Industry and Financial Markets Association (SIFMA, a major trade group for broker-dealers, investment banks and asset managers). The Trump Administration's DOL has not challenged the Fifth Circuit's decision. However, in fall 2018, DOL officially announced that it was \"considering regulatory options in light of the Fifth Circuit opinion\" and projected a September 2019 date for the potential new final rules. In June 2019, various DOL officials, including then-DOL Secretary Alexander Acosta, reportedly said that the agency \"was working with the SEC to promulgate new rules.\" The same month, Jeanne Klinefelter Wilson, deputy assistant secretary of the Employee Benefits Security Administration, the DOL unit that oversees ERISA, observed that although DOL and the SEC operate under different regulations, \"the goal is to proceed under a raw common framework and propose Department of Labor rules [that] track as closely as possible with [the] SEC's best-interest regulations.\" In July 2019, President Trump nominated Eugene Scalia to succeed Alexander Acosta as Secretary of Labor. Scalia was later confirmed for that post by the Senate on September 26, 2019. While a partner with the law firm Gibson, Dunn, & Crutcher, Scalia presented oral arguments on behalf of the plaintiffs in the aforementioned case in which the court vacated DOL's fiduciary rule. Scalia has reportedly described the rule as \"an immensely controversial and burdensome rule that really pushed the envelope of the agency's regulatory authority.\" The possibility has been raised that Secretary Scalia may have to recuse himself from involvement in the development of a fiduciary rule because of government ethics rules that guard against conflicts of interest by prohibiting officials from participating in issues they were involved with in the private sector. On June 5, 2019, the SEC commissioners separately approved parts of a package of final rules related to the duty of care financial professionals owe to retail investors. The package contained Reg BI; the Form Customer Relationship Summary, a short-form disclosure that would identify key distinctions in the types of services offered by broker-dealers and investment advisers to their clients; applicable legal standards, and potential conflicts of interest; a clarification of the fiduciary duty owed by investment advisers to their clients under the Investment Advisers Act; and an interpretation of the \"solely incidental\" broker-dealer exclusion under the IAA aimed at clarifying when a broker-dealer's exercise of investment advisory activities redefines it as an investment adviser according to the IAA. As observed earlier, in addition to its stated goal of requiring a broker-dealer to act in the best interest of a retail customer making recommendations, Reg BI also seeks to address some remaining conflict-of-interest concerns. Reg BI will do so by requiring broker-dealers to \"address conflicts of interest by establishing, maintaining, and enforcing policies and procedures reasonably designed to identify and fully and fairly disclose material facts about conflicts of interest, and in instances where [the SEC] ... determined that disclosure is insufficient to reasonably address the conflict, to mitigate or, in certain instances, eliminate the conflict.\" According to SEC officials, under Reg BI, which the SEC deliberately constructed to be a principles-based set of obligations rather than an expressly defined one, when retail investor clients receive and use a broker-dealer recommendation, the broker-dealer will be required to act in the retail customer's best interest without placing the broker-dealer's financial or other interests ahead of the retail customer's. The SEC interprets Regulation BI to apply to recommendations of (1) \"any securities transaction\" (purchase, sale, and exchange); and (2) any \"investment strategy\" involving securities (including account recommendations). In addition to investors receiving broker-dealer recommendations for non-retirement-based investment accounts, Reg BI also defines an applicable retail investor to include a \"person receiving recommendations for his or her own retirement account, including but not limited to IRAs and individual accounts in workplace retirement plans, such as 401(k) plans and other tax-favored retirement plans.\" It also interprets applicable broker-dealer \"account recommendations to include â¦ recommendations to roll over or transfer assets from one type of account to another (e.g., converting a workplace retirement plan account to an IRA).\" Broker-dealers will have until June 30, 2020, to comply with Reg BI. Officials at FINRA have reportedly characterized Reg BI as \"sort of federalizing [broker-dealer] sales practice issues.\" Noting that \"most of the [broker-dealer] sales practice requirements historically have come from the FINRA rulebook,\" they indicated that FINRA will likely have to adjust its rules to align with Reg BI. Under Reg BI, the dictate that a broker-dealer cannot place its financial or other interests ahead of its retail customers' interests is known as the general obligation . To satisfy the general obligation, a broker-dealer must comply with three underlying component obligations: (1) a duty of disclosure; (2) a duty of compliance; and (3) a duty of customer care. These obligations are described below. In addition, a fourth component obligationâa duty to address certain conflicts of interestsâis one of two broad mandates under Reg BI. Given its significance, a separate section (see \" The Conflict of Interest Obligation Under Reg BI \") then discusses that obligation. The disclosure obligation. Under this obligation, a broker must, prior to or at the time of the recommendation, provide to the retail customer, in writing, full and fair disclosure of all material facts related to the scope and terms of the relationship, including all material facts relating to conflicts of interest associated with the recommendation. The compliance obligation. Reg BI requires broker-dealers to establish written policies and procedures reasonably designed to achieve compliance with Reg BI as a whole. This requirement reflected the SEC's decision to adopt certain commenters' suggestions that the proposed requirement to develop policies and procedures align with the conflict-of-interest obligation described below. The compliance obligation provides flexibility to allow broker-dealers to establish compliance policies and procedures that accommodate a broad range of business models. It does not enumerate specific requirements that broker-dealers must include in their policies and procedures. Instead, each broker-dealer should consider the scope, size, and risks associated with the firm's operations and the types of business in which the firm engages when adopting its policies and procedures. According to the Reg BI release, a reasonably designed compliance program generally would also include controls, remediation of noncompliance, training, and periodic review and testing. The duty of care obligation . Under the duty of care obligation, a broker-dealer must exercise reasonable diligence, care, and skill when making a recommendation to a retail customer. As part of this, the broker-dealer must understand the potential risks, rewards, and costs associated with the recommendation. The broker-dealer must consider such factors in light of the retail customer's investment profile, while ensuring that an ensuing recommendation is in that customer's best interest. The broad conflict of interest mandate under Reg BI says that broker-dealers must \"address conflicts of interest by establishing, maintaining, and enforcing policies and procedures reasonably designed to identify and fully and fairly disclose material facts about conflicts of interest, and in instances where [the SEC] ... determined that disclosure is insufficient to reasonably address the conflict ... mitigate or, in certain instances, eliminate the conflict.\" Conflicts of interest occur when the interests of an entity working on behalf of a customer and the interests of that customer are misaligned. This dynamic informs the relationship between broker-dealers and customers because of various factors that potentially encourage broker-dealers to boost their compensation or to benefit in other ways to the possible detriment of their customers, such as the transaction-based commission compensation model. Federal securities laws and FINRA's rules address broker-dealer conflicts through three distinct approaches: (1) the express prohibition of certain actions; (2) mitigation through the client suitability requirement when giving investment advice; and (3) the required disclosure of material conflicts of interest when making client recommendations. Expanding on these, the conflict of interest component obligation under Reg BI requires broker-dealers to have written policies and procedures reasonably designed to identify and, at a minimum, disclose or eliminate conflicts of interest, including the following: Mitigating conflicts that may encourage them to place their interests, or their firm's interests, ahead of the customer's. Mitigation alters a broker-dealer's policies and procedures to \"reduce the incentive for the associated person to make a recommendation that places the associated person's or firm's interests ahead of the retail customer's interest.\" Examples include (1) avoiding broker-dealer compensation targets that disproportionately expand compensation via certain sale increases; and (2) establishing a differential compensation based on neutral factors to minimize broker-dealer employee compensation incentives that incentivize the promotion of certain types of investment accounts over others. (This is similar to a provision in the 2016 DOL fiduciary rules. ) Establishing, maintaining, and enforcing written policies and procedures designed to \"identify and eliminate any sales contests, sales quotas, bonuses, and non-cash compensation that are based on the sales of specific securities or specific types of securities within a limited period of time.\" (This is similar to a provision in the earlier DOL fiduciary rule. ) Preventing customer offerings that have material limitations, including product menus that are very limited in scope or that solely offer proprietary products that can cause a broker-dealer to place his or her interests or the firm's interests ahead of the customer's. (This is said to be a broader and more rigorous requirement than current FINRA rules on noncash compensation. ) Broker-dealers are subject to state securities laws, known as \"Blue Sky Laws,\" state common laws, and judicial rulings from a state's highest court. As discussed earlier, reports indicate that the common law derived from judicial rulings in four statesâCalifornia, Missouri, South Dakota, and South Carolinaâimposes an \"unambiguous fiduciary standard\" for broker-dealers who do business in the states. State common laws, however, lack the authority of state regulations and statutes. Under state Blue Sky laws, it is generally unlawful for any person to transact business in a state as a broker-dealer or agent unless they are registered with the state's securities regulatory authority. During the past few years, several states have been attempting to impose either state statutory or regulatory requirements stipulating that state-registered broker-dealers have a fiduciary duty to their retail customers. And as of September 2019, New Jersey, Nevada, Massachusetts, and New York reportedly had ongoing initiatives that would impose fiduciary requirements on broker-dealers in various stages of development. Of these state initiatives, only Massachusetts' (proposed in June 2019) began after the Reg BI proposal and final rule. Explaining the rationale for the Massachusetts initiative, Secretary of the Commonwealth William Galvin blamed the inadequacies of Reg BI: \"We are proposing this standard, because the SEC has failed to provide investors with the protections they need against conflicts of interest in the financial industry, with its recent 'Regulation Best Interest' rule.\" Barbara Roper, director of investor protection at the Consumer Federation of America, a consumer advocacy group, has raised concerns that the state-based fiduciary laws could create loopholes to the detriment of broker-dealer customers. She noted that the Nevada initiative would not recognize insurance agents as financial planners, excluding them from the fiduciary regulation, which she argued could significantly disadvantage consumers within the state. Meanwhile, the brokerage industry and its trade groups have reportedly been lobbying states, such as New Jersey, to halt state-based fiduciary actions. Their arguments are two-pronged: (1) states should reconsider their fiduciary efforts in light of Reg BI; and (2) if adopted, multiple state-based fiduciary broker-dealer standards will result in a messy patchwork of \"laws that would be duplicative of, different than, and possibly in conflict with federal standards.\" Jay Clayton, the SEC chair, has raised related concerns; he identified \"the potential patchwork of inconsistent state-level standards [as a development that he] and many others believe ... will increase costs, limit choice for retail investors and make oversight and enforcement more difficult.\" By contrast, SEC Commissioner Robert Jackson, who provided the sole dissenting vote on Reg BI, has characterized the state fiduciary effort as a potentially encouraging fix to the perceived inadequacies of Reg BI. The National Securities Markets Improvement Act (NSMIA; P.L. 104-290 ) is often cited as being in potential conflict with the state fiduciary proposals. Aimed at increasing financial services industry efficiency, the act expanded federal regulators' authority by taking some authority away from state securities regulators. Among other things, it also prohibited states from imposing additional or different books and records requirements on broker-dealers outside of federal requirements. The provision is often cited as a potential source for a legal challenge in the event that any of the state broker-dealer fiduciary regimes are adopted. Before the SEC's adoption of Reg BI, SIFMA, a critic of the state fiduciary proposals, asked the agency to consider inserting language into Reg BI noting that NSMIA provides for federal preemption of such actions. The final rule does not contain any such language, a position advocated by an association of state and provincial securities regulators, the North American Securities Administrators Association. Instead, the commentary accompanying the rule notes that \"the preemptive effect of Regulation Best Interest on any state law governing the relationship between regulated entities and their customers would be determined in future judicial proceedings based on the specific language and effect of that state law.\" On September 9, 2019, Attorneys General (AGs) from California, Connecticut, Delaware, Maine, New Mexico, New York, Oregon, and the District of Columbia filed a suit in the United States District Court, Southern District of New York, asking the court to vacate Reg BI. In arguing that it should be vacated, the AGs alleged that the regulation injures retail investors in two significant ways: (1) it fails to restrict the provision of conflicted advice as directed by Section 913(g) of the Dodd-Frank Act, which permits the SEC to promulgate rules to provide for a uniform fiduciary standard; and (2) it increases the potential that retail investors will receive conflicted information because it compounds previously existing investor confusion with respect to the duties that broker-dealers owe such investors in the provision of investment advice. The AGs also argued that the standard of customer care provided by Reg BI fails to meaningfully go beyond FINRA's existing \"suitability obligation.\" In September 2018, 35 House and Senate Democratic Membersâincluding House Committee on Financial Services then-ranking member Maxine Waters, who now chairs the committee, and Senate Committee on Banking, Housing, and Urban Affairs ranking member Sherrod Brownâsent a letter to SEC Chair Jay Clayton criticizing the then-proposed Reg BI. The letter stated the following: Regulation BI falls woefully shortâ¦ We urge the SEC to revise its proposal consistent with [the Dodd-Frank law] and require brokers to abide by the same high standard that currently applies to investment advisers so that their advice to retail investors is provided without regard to their financial and other interests. Regulation BI for brokers and the SEC's interpretation of the \"fiduciary\" obligation owed by investment advisers fail to clearly do this, enabling investors to 'consent' to harmful conduct in complex and legalistic disclosures that most will never read and would not understand if they did. In March 2019, in advance of the SEC's adoption of Reg BI, Chair Waters reportedly said the following: [W]e have to be concerned about best interests of our consumers and our seniors in particular. When you have investment advisors who are not acting in [consumer's] best interest, but are acting in their own best interest, it does not bode well for our senior investors in particular. So we are going to continue to pay attention to that. I don't know what the SEC has decided about what their role should be in this [fiduciary realm], but it's of interest to us. On June 26, 2019, the House passed H.R. 3351 , the Financial Services and General Government Appropriations Act for FY2020. The bill included an amendment sponsored by Chair Waters that would have forbidden the SEC from using any of its congressional spending authority \"to implement, administer, enforce or publicize the final rules and interpretations\" with respect to Reg BI. On December 20, 2019, President Trump signed H.R. 1865 , the Further Consolidated Appropriations Act, 2020, which became P.L. 116-94 and will fund the federal government through FY2020. It does not contain the aforementioned SEC restrictions contained in H.R. 3351 . Responses to the congressional action generally reflect where observers stand on the merits of Reg BI itself. Like the wide-ranging comments that followed the release of the proposed Reg BI in 2018, the adoption of the final 2019 rule also elicited an expansive range of responses. This section first identifies the three broad reactions to the reform. It then provides quoted excerpts from various observers and stakeholders that either (1) provide support for or (2) are critical of several concerns regarding Reg BI, including its failure to provide for a broker-dealer fiduciary standard. The three broad divisions with respect to overall views on Reg BI are as follows: those who have given it qualified support, such as Rick Fleming, the SEC's investor advocate, who characterized it as \"not as strong as it could be\" but \"a step in the right direction\"; those who broadly support it, including the U.S. Chamber of Commerce, a major business trade group, and SIFMA; and those who are broadly critical, including the Consumer Federation of America and the Public Investors Arbitration Bar Association (PIABA, a bar association whose members represent investors in disputes with the securities industry). This section provides excerpts of quotes from various stakeholders and observers, which provide contrasting supportive and critical views on policy concerns integral to the debate surrounding Reg BI. Framed as debatable assertions, they are as follows: (1) Reg BI represents meaningful progress over the suitability requirement; (2) Reg BI's failure to define best interest is a problem; (3) the absence of a uniform fiduciary standard is not a problem; (4) the absence of a Reg BI fiduciary standard is not a problem; and (5) Reg BI meaningfully addresses outstanding conflict of interest issues. In a letter to Members of the House, SIFMA said the following in support of Reg BI: Reg BI is the most comprehensive enhancement of the standard of conduct rules governing broker-dealers since the enactment of the Securities Exchange Act of 1934. The new SEC rules dramatically and undeniably exceed the previous suitability standard by requiring a duty of loyalty, meaning that a broker's recommendations must be in the customer's best interest and that the broker cannot place its own interests ahead of its customer. The regulations impose a duty of diligence, care and skill in making the recommendations, thereby holding the broker accountable for failures of knowledge or skill. SEC Chairman Jay Clayton said the following in a July 2019 speech: Regulation Best Interestâor \"Reg. BI\"âimposes a new standard of conduct specifically for broker-dealers that substantially enhances their obligations beyond the current \"suitability\" requirementsâ¦. Reg. BI is satisfied only if the broker-dealer complies with four specified component obligations: Disclosure, Care, Conflict of Interest, and Compliance. Each of these obligations includes a number of prescriptive requirements, all of which must be satisfied to comply with the rule. The U.S. Chamber of Commerce said the following in a press release supporting Reg BI: The new best interest standards create strong new protections for investors against bad actors, provide clearer information that will help Americans invest and save for their futures, allow investors to choose the right type of advice to fit their needs, and help small businesses provide retirement benefits for their employees. We hope that the Department of Labor moves forward on similar protections for ERISA plans that dovetail with the SEC's approach. SEC Commissioner Robert Jackson, who provided the sole dissenting vote on Reg BI, said the following in a statement after the rule's adoption: As to brokers, today's rule, like the proposal, fails to require that investor interests come first. Congress expressly authorized us to take that step in Dodd-Frankâauthority we should have used today. Instead, the core standard of conduct set forth in Regulation Best Interest remains far too ambiguous about a question on which there should be no confusion. As a result, conflicts will continue to taint the advice American investors receive from brokers. Micah Hauptman, financial services counsel at the Consumer Federation of America, reportedly said the following: [Reg BI is] a bait and switch on investors. The SEC claims to be imposing a new best interest standard on brokers, but it won't change any practices in the brokerage industry. Instead, Reg BI simply codifies the existin g standard under FINRA rules, just like the brokerage industry asked them to. [The investing public is] getting hoodwinked. Barbara Roper, director of investor protection for the Consumer Federation of America, reportedly said the following: [The SEC is saying] we'll let you have the conflict and then just mitigate it. Two different advisors both can call what they do financial planning or retirement planning, and one could have a duty to you for the whole relationship, but for the otherâa brokerâit's transaction by transaction. Barbara Roper, of the Consumer Federation of America, said the following in testimony before the House Committee on Financial Services Committee, Subcommittee on Investor Protection, Entrepreneurship and Capital Markets: If the goal behind Reg BI truly is to enhance protections for investors, and not simply to preserve the status quo, the Commission must start by clarifying what it means by \"best interest,\" and it must do so in a way that offers protections beyond those already afforded under FINRA rules.... The Commission must adopt a principles-based definition of best interest clarifying that a broker acts in a customer's best interest when she recommends, from among the reasonably available suitable options, those investments, investment strategies, services, or accounts that she reasonably believes are the best available match for that investor, taking into account both the investor's needs and the investments' material characteristics. While there will often not be a single \"best\" option, satisfying a best interest standard should require the broker to narrow down the acceptable options beyond the dozens or even hundreds of investments that would satisfy the existing suitability standard in a given situation.\" Massachusetts Secretary of the Commonwealth William Galvin reportedly said the following: Crucially, the term \"best interest\" is not defined in the rulemaking package. This ambiguity will lay the groundwork for the same debates and litigation that exist today under the \"suitability\" standard that applies to broker/dealers. SEC Chairman Jay Clayton said the following in a July 2019 speech: [Some commenters to the Reg BI proposal asked whether the SEC should] provide a detailed, specific, situation-by-situation definition of \"best interest\" in the rule text.... Our view was that the best approach would be to apply the specific component obligations of Reg. BI, including the \"best interest\" requirement in the Care Obligation, in a principles-based manner. Under Reg. BI, whether a broker-dealer has acted in the retail customer's best interest will turn on an objective assessment of the facts and circumstances of how the specific components of the rule are satisfied. This principles-based approach is a common and effective approach to addressing issues of duty under law, particularly where the facts and circumstances of individual relationships can vary widely and change over time, including as a result of innovation. [The] approach is â¦ similar to an investment adviser's fiduciary duty, which has worked well for advisers' retail clients and our markets. Indeed, there is no definition of \"best interest\" under the Advisers Act. Thomas Wade, director of financial services policy at the American Action Forum, said the following: [With respect to Reg BI's lack of a clear definition] the SEC provides for a spectrum of advisor-investor obligation, allowing investors to choose their desired level of protection based on their risk appetite and finances. The criticism of allowing this fluidityâthat investors may not understand the duty of care provided by their advisorâhas been mitigated by the SEC requirement that brokers at stand-alone broker-dealerships not be able to use the word \"advisor\" in their title. Financial news summary service FINSUM said the following regarding Reg BI's lack of a \"best interest\" definition: Having a highly defined rule leaves it more vulnerable to loopholes. With the current contextual structure, one has to worry whether their behavior could be considered \"best interest\" depending on an amorphous standard. It seems like a better way to keep bad actors in line. In the text of Reg BI, the SEC said the following regarding a uniform fiduciary standard: We have also declined to craft a new uniform standard that would apply equally and without differentiation to both broker-dealers and investment advisers. Adopting a \"one size fits all\" approach would risk reducing investor choice and access to existing products, services, service providers, and payment options, and would increase costs for firms and for retail investors in both broker-dealer and investment adviser relationships. In a July 2019 speech, SEC Chairman Jay Clayton said the following regarding the decision to not adopt a uniform fiduciary standard: A number of commenters expressly or impliedly advocated for regulation that would collapse the distinction, with a substantial majority of those commentators favoring the generally applicable investment adviser model where clients pay an asset-based fee or a flat fee for generally broad-based financial advice from a fiduciaryâ¦. [T]his is a good model, and for many investors, this type of investment adviser relationship may better match their needs than the typical broker-dealer relationship. However, for many other investors, the broker-dealer model, particularly after the implementation of Reg. BIâeither alone or in combination with an investment adviser relationshipâprovides the better match. For example, a retail customer that intends to buy and hold a long-term investment may find that paying a one-time commission to a broker-dealer is more cost effective than paying an ongoing advisory fee to an investment adviser to hold the same investment. That same investor might want to use a brokerage account to hold those long-term investments, and an advisory account for other investments. SIFMA described the following findings from a study in support of the idea that a uniform fiduciary standard could negatively impact customer choice: SIFMA has released a study conducted by Oliver Wyman for the Securities and Exchange Commission that examines the impact of unifying the fiduciary standard of care that retail investors receive from financial advisers and broker-dealers.... Oliver Wyman collected data from a broad selection of retail brokerage firms that serve 33% of households and represent 27% of all retail financial assets. The key insight from the survey is that broker-dealers play a critical role in the financial services industry that cannot be easily replicated with alternative services models. Therefore, if the proposed standardization is adopted, retail investors (particularly small investors) could see a negative impact on the choice of advisory model, product access, and affordability of advisory services. The Financial Planning Coalition, an industry group, said the following: Adoption of a uniform fiduciary standard of care will not affect the availability of investment advice or the range of products for moderate- or low-income consumers.... Research shows that the costs to broker-dealers to implement a fiduciary standard would be minimal. Duane Thompson, senior policy analyst at Fi360, reportedly said the following: Instead of having a uniform fiduciary standard for identical advisory services, there will continue to be two somewhat different market conduct standards to what can be identical advisory services. It's another tangible sign that the broker-dealer business model has changed dramatically in recent years, where advice is a dominant feature of what they provide. According to a media report, the AARP's Reg BI comment letter to the SEC said the following: [AARP is asking the SEC to] adopt a uniform fiduciary standard for financial professionals that applies to all types of retail accounts. There is no question that there is confusion among retail investors in the marketplace as a result of standards that are not uniform and do not address the perpetually evolving universe of investment products and industry practices. In a 2015 speech, SEC Commissioner Daniel M. Gallagher said the following regarding the fiduciary duty: Much of the debate on these issues seems to assume that the \"fiduciary duty\" is some sort of talismanic protection that can overcome any competing regulatory concerns. All too often, this is the approach taken by those who simply do not know how the fiduciary duty works in practice. They do not understand or choose to ignore the limitations of the fiduciary duty. In a 2018 speech, SEC Commissioner Hester Peirce said the following: The word \"fiduciary\" hangs heavily over any discussion about standards for financial professionals. The word carries a lot of different meanings, and legal context mattersâ¦. Never mind that it took many pages of regulation and lots of interpretation to explain what \"fiduciary\" meant in the new DOL iteration. Never mind that even lawyers and financial professionals do not have a universal understanding of what the term means. The SEC addressed the fiduciary standard in the text of Reg BI as follows: We have declined to subject broker-dealers to a wholesale and complete application of the existing fiduciary standard under the Advisers Act because it is not appropriately tailored to the structure and characteristics of the broker-dealer business model (i.e., transaction-specific recommendations and compensation), and would not properly take into account, and build upon, existing obligations that apply to broker-dealers, including under FINRA rules. Moreover, we believe (and our experience indicates), that this approach would significantly reduce retail investor access to differing types of investment services and products, reduce retail investor choice in how to pay for those products and services, and increase costs for retail investors of obtaining investment recommendations. In a July 2019 speech, SEC Chairman Clayton said the following: Reg. BIâimposes a new standard of conduct specifically for broker-dealers that substantially enhances their obligations beyond the current \"suitability\" requirements.... [I]t establishes a general obligation that draws from key fiduciary principles, requiring broker-dealers to act in the best interest of their retail customers and not place their own interest ahead of the retail customer's interest. In the same speech, Chairman Clayton also said the following: This [principles-based] approach is similar to an investment adviser's fiduciary duty, which has worked well for advisers' retail clients and our markets.... [And the determination of whether a broker-dealer is acting in a retail customer's best interests, will be based on] an objective assessment of the facts and circumstances of how the specific components of Regulation Best Interest are satisfied at the time that the recommendation is made (and not in hindsight). In a June 2019 statement, SEC Commissioner Elad L. Roisman said the following: Regulation Best Interest also will impose heightened disclosure requirements about brokers, their investment offerings, and associated conflicts of interest in order to better inform retail customers about their service provider and investing options. Not even the so-called fiduciary standard under the Investment Advisers Act includes the obligation to eliminate or mitigate conflicts. In the same statement, Commissioner Roisman also said the following: In 2016, for example, the DOL acted unilaterally to adopt its so-called \"Fiduciary Rule\" that would have applied to providers of retirement investment accountsâa significant proportion of the registrants under the SEC's jurisdiction. DOL's rule quickly proved unworkable for many, if not all, providers of pay-as-you-go financial services, raising compliance costs, exposing firms to new litigation risks, and in some cases forcing them to choose whether to continue serving some of their smallest customers. According to some, the rule resulted in huge swaths of U.S. investors losing access to affordable financial advice and others paying much higher fees on their retirement accounts, without receiving any increases in service or other discernable benefits. I am glad that this rule is not in effect. Representative Trey Hollingsworth reportedly said the following: I am very upset that we continue to talk about polls that ask: Do you believe that this fiduciary rule is a good idea? People say yes. What's not disclosed in that is that you, lower and middle income America, won't get the benefit of that because you don't have an account size that's enough to ensure that those people will continue to give you advice. The Financial Planning Coalition said the following: Adoption of a fiduciary standard of care will not negatively affect the availability of investment advice or the range of products for moderate- and low-income consumers.... Research shows that the costs to broker-dealers to implement a fiduciary standard would be minimal, and that broker-dealers and investment advisers who provide financial services under a fiduciary standard experience stronger asset and revenue growth than those under a suitability standard. In comments to the SEC, the CFA Institute, an investment profession industry group, said the following: [B]rokers who are providing non-incidental advice must, by virtue of the Advisers Act, adhere to a fiduciary standard of care and therefore refrain from putting their own interests ahead of their clients' interests. Imposing a fiduciary standard on broker-dealer recommendations, therefore, would still be in keeping with these investor expectations. Representative Carolyn Maloney reportedly said the following during a House subcommittee hearing on Reg BI: [Under Reg BI] brokers have to act in the \"best interest of customers,\" which sounds good, but the rule does not even define what this means. In fact, the rule allows brokers to continue to take their own financial interest into account when making client regulations. They can remain conflicted as long as they offer some basic amount of disclosure. This is dangerous for investors. An industry observer wrote the following regarding the absence of a fiduciary standard: [This rulemaking] presented a perfect opportunity to firm up what \"best interest\" means, but the SEC declined to do so. I have mixed feelings about this, because best interest can vary from client to client, and this allows flexibility when needed. However, the grey area has proven to be problematic, because, as you can imagine, it's hard to hold someone accountable to a flexible and unclear standard of care. John Britt, a retired SEC enforcement attorney, reportedly said the following: If a securities professional recommends that his client purchase a particular stock, he is giving investment advice. And if he's giving investment advice, he should have a fiduciary duty to his clientânothing less.... [This is] fake regulation. The SEC addressed conflicts of interest in the text of Reg BI as follows: The conflicts of interest associated with incentives at the associated person level and limitations on the securities or products that may be recommended to retail customers have raised particular concerns in the context of the broker-dealer, transaction-based relationship. Accordingly, the Commission believes specific disclosure and additional mitigation requirements are appropriate to address those conflicts. Sales contests, sales quotas, bonuses and non-cash compensation that are based on the sales of specific securities within a limited period of time create high-pressure situations for associated persons to increase the sales of specific securities or specific types of securities within a limited period of time and thus compromise the best interests of their retail customers. The Commission does not believe such conflicts of interest can be reasonably mitigated and, accordingly, they must be eliminated. In a written statement to Congress, former SEC Chairman Harvey L. Pitt said the following: [N]othing ... requires broker-dealers to recommend the least expensive or least remunerative securities or investment strategies, as long as the firm and its associated individuals comply with the disclosure, care and conflict of interest obligations that would be created by the Regulation. This is significant, because the mere fact that a brokerage firm, or an account executive, receive additional remuneration for pursuing certain strategies or securities does not, ipso facto, make the recommendation improper, unsuitable, or contrary to the best interests of the retail customer. In a July 2019 speech, SEC Chairman Jay Clayton said the following: Some critics have gone so far as to fault Reg. BI for failing to require elimination of all conflicts of interest. This criticism is misguidedâthere are conflicts of interest inherent in all principal-agent relationships, and the broker-customer relationship and the investment adviser-client relationship are no exception. Reg. BI recognizes that these conflicts exist, and requires that firms address those conflicts and provide recommendations that are in the best interest of their retail customers. Thomas Wade, of the American Action Forum, said the following: [It has been argued] that the best interest standard is a greater protection than fiduciary, as brokers must mitigate and eliminate conflicts of interests, where under the fiduciary duty all that was required was disclosure. The Consumer Federation of America said the following in a fact sheet criticizing Reg BI: The rule's conflict obligations don't prohibit firms from creating incentives that encourage and reward advice that is not in customers' best interests. Nor does the rule require firms to manage any conflicts to the benefit of the customer. For example, policies and procedures to \"mitigate\" financial conflicts don't have to be reasonably designed to prevent the broker from placing its interests ahead of the customer's interests. A media report detailed SEC Commissioner Jackson's criticism of Reg BI's approach to conflicts of interest as follows: The rule would be much improved with the addition of provisions that \"limit or ban compensation practices that lead brokers to engage in conflicted activities,\" he says. \"[Y]ou can expect people in the marketplace to do that which they're paid to do,\" he says. \"If you pay them extra to put people in in-house products that are bad for the people, you can expect that there will be conflicts that will be difficult to mitigate, so I've urged for changes there as well.\" Commissioner Jackson also said the following in his statement on Reg BI: Troubling broker compensation practices that put investors at risk are addressed [in a very limited fashion] when they are \"based on the sales of specific securities within a limited period of time,\" or \"create high-pressure situations.\" These restrictions merely mimic those in longstanding FINRA proposals, and I cannot see why our rules should permit pay practices that create any pressure for brokers to harm investors.\" An industry observer wrote the following regarding Reg BI and conflicts of interest: The SEC fact sheet [as part of the press release accompanying Reg BI] ... did take positive steps from the proposed rule, but still left significant worries. For instance, sales competitions with award trips, bonuses and other rewards tend to prioritize growth over customer care (think Wells Fargo) were to some degree shot down in the rule, but not entirely. While specific product sales leading to bonuses appear to be shot down, an overall competition or bonus system for selling a suite of products is not clearly prohibited. This could really just cause companies to redo their bonus and competition models and allow them to continue. The Consumer Federation of America said the following in a press release: Even where conflicts would have to be \"mitigated,\" the Commission doesn't make clear that mitigation has to be designed to support compliance with the best interest standard. In its 700-page Reg BI release, the SEC spoke of its inability to employ data-based research to gain insight into the reform's probable impact: Because the Commission does not have, has not received, and, in certain cases, does not believe it can reasonably obtain data that may inform on certain economic effects, the Commission is unable to quantify certain economic effects.... [E]ven in cases where it has some data or it has received some data regarding certain economic effects, the quantification of these effects is particularly challenging due to the number of assumptions that it would need to make to forecast how broker-dealers will respond to Regulation Best Interest, and how those responses will, in turn, affect the broader market for investment advice and the retail customers' participation in financial markets. The release, however, included a discussion of theoretical costs and benefits from an alternative to Reg BI that would have imposed fiduciary standards on broker-dealers akin to those that generally apply to investment advisers. The release asserted that a major theoretical benefit to such a uniform fiduciary standard would be reduced customer confusion surrounding what obligations both brokers and investment advisers have toward them. Moreover, the release argued that such a change could also reduce potential customer costs associated with choosing a financial professional who is not a good fit since both brokers and investment advisers would be subject to the same standard of customer care. The release noted, however, that a uniform fiduciary standard could result in a standard of care for brokers \"that is not appropriately tailored to the structure and characteristics of the broker-dealer model (i.e., transaction specific recommendations and compensation).\" Because of this possibility, it argued that the range of options in the financial advice market would shrink. It contended that at least in the short run, brokers would face greater compliance costs, possibly encouraging them to transition into offering advice in an investment adviser capacity and discouraging them from continuing to offer advice in a broker capacity. In turn, the release observed that brokers formally exiting their roles as broker-dealers could limit retail customers' access to particular securities or investment strategies as well as how they would pay for such advice. As a result, customers' costs for such advice could increase. The release then examined the potential fallout from a hypothetical scenario in which brokers operate under a new fiduciary standard but uniformly remain broker-dealers. According to the release, this could result in increased compliance costs for brokers that could be fully or partially passed on to their clients. That possibility, it argued, could lead to some customers problematically engaging less expensive investment advice providers outside of the regulated world of investment advisers and broker-dealers. Some data-based research has also examined the implications of a hypothetical final rulemaking that imposed a fiduciary standard on brokers. Several examples of this research are examined below, illustrating that research has resulted in disparate views on the nature of such impact. The Deloitte -SIFMA Study . In 2017, the business consultant Deloitte and SIFMA, the broker-dealer trade group, released the results of a collaborative survey conducted by Deloitte on SIFMA members. The study yielded results from the responses of 21 large national corporate SIFMA members on their reactions to the partially implemented DOL fiduciary rule, which the members had responded to by making plans to modify their retail customer-based services and products. Of the 21 respondents, 53% reported that they had either eliminated or limited access to brokerage advice services and 67% had migrated away from open choice to fee-based or limited brokerage services. The study also found that a \"trend towards fee-based accounts was likely accelerated by the rule.\" It noted that \"[t]ypically, fee-based accounts offer a higher level of service than brokerage accounts and often include automatic rebalancing of accounts, comprehensive annual reviews, enhanced reporting to account holders, and access to third party money managers. The fees are generally an 'all-in' asset-based fee that is generally higher than the fees paid in an advised brokerage account.\" Finke and Langdon . As indicated earlier, some states have common laws that impose a fiduciary standard of care on brokers, but many do not. By surveying broker-dealer registered representatives subject to differing state common law-based fiduciary requirements, Finke and Langdon, two academics, exploited those differences to ascertain whether a relatively stricter fiduciary standard of care affected brokers' willingness to provide advisory services to retail consumers. Among other things, the 2012 research found that the number of registered representatives conducting business within a state as a percentage of total households did not significantly change whether or not a state had a stricter fiduciary standard. It also found no significant differences among such financial professionals in states with a strict fiduciary standard compared with states that did not have a fiduciary standard with respect to (1) whether they were limited in their ability to recommend certain products or to serve clients with limited wealth; (2) the percentage of clients with lower incomes and higher levels of wealth; (3) their ability to provide a broad range of investment products including those that involve commission-based compensation; and (4) the ability to provide tailored customer advice. Bhattacharya , Padi , and Illanes . The researchers analyzed patterns of sales behavior for annuities issued by a large national financial company sold between 2013 and 2015 by broker-dealers based in adjacent counties separated by state lines. Released in 2019, the analysis hinged on the fact that some of the counties were in states with common law-based broker fiduciary standards, but adjacent counties were in states without such standards. Among other things, they found that subjecting brokers to a fiduciary duty shifted the suite of investment products that they sell to retail investors. Relative to counties without broker fiduciary obligations, brokers in counties with fiduciary standards saw increased costs of doing business, but the jurisdictions also witnessed direct improvements in the quality of the financial advice.", "summary": "On June 5, 2019, the Securities and Exchange Commission (SEC) voted to adopt Regulation Best Interest (Reg BI) under the Securities and Exchange Act of 1934 (P.L. 73-291). Reg BI reforms requirements for broker-dealers when they make investment recommendations to retail customers. According to the SEC, Reg BI is meant to \"enhance the broker-dealer standard of conduct beyond existing ... obligations [by] requiring broker-dealers ... to: (1) act in the best interest of the retail customer at the time the recommendation is made, without placing the financial or other interest of the broker-dealer ahead of the interests of the retail customer; and (2) address [various broker-dealer] conflicts of interest [with those clients].\" Broker-dealers have until June 2020 to comply. Broker-dealers execute securities trades and provide investment recommendations. They are licensed and regulated by state securities regulators, the SEC, and the Financial Industry Regulatory Authority (FINRA), a SEC-regulated entity that they must also join. Traditionally, broker-dealers provided transaction-specific discrete investment recommendations and were compensated via commissions for individual transactions. Broker-dealers have generally made investment recommendations under the suitability standard , a FINRA rule requiring that recommendations are merely consistent with customers' interests. By contrast, investment advisersâanother type of financial professional that typically offers more ongoing investment counsel (such as retirement planning) and is compensated by fixed fees or a percentage of total assets managedâhave generally followed the fiduciary standard , a nonstatutory obligation derived from court rulings and decisions from SEC enforcement cases. It requires a more demanding level of financial professional client care than does broker-dealers' suitability standard: advisers are expected to serve their clients' best interests above their own. Partly motivated by reporting on widespread investor confusion over the differences between broker-dealers and investment advisers and their respective client obligations, Section 913 of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank, P.L. 111-203 ) directed the SEC to evaluate gaps in existing regulations for advisers and broker-dealers. It gave the SEC authority to impose a fiduciary standard of care on broker-dealers akin to that already applied to advisers. Dodd-Frank also required the SEC to study this issue. The resulting 2011 staff study recommended that the SEC adopt a uniform fiduciary standard. In 2016, the Obama Administration's Department of Labor (DOL) issued controversial regulations that subjected financial professionals who work with private-sector retirement plans governed by the Employee Retirement Income Security Act of 1974 ( P.L. 93-406 ) to an elevated fiduciary level of customer duty. The largely unimplemented reform, which earned praise from investor advocates, was vacated in a 2018 court case brought by various business interests who successfully argued that it was statutory overreach. Currently, Trump Administration DOL officials are reportedly working on a new standard projected to align with Reg BI. SEC officials and various business groups argue that Reg BI properly balances the need for an enhanced broker-dealer standard of care with the need to preserve the broker-dealer business model, a model deemed to have special appeal to less-affluent investors. Critics, including investor advocates, argue that it effectively preserves the inadequate suitability standard, exposing investors to harm from unaddressed broker-dealer conflicts of interest. In June 2019, the House passed H.R. 3351 , the FY2020 Financial Services and General Government appropriations bill. It included an amendment sponsored by House Financial Services Committee Chair Maxine Waters that would have forbidden the SEC from using any of its congressional spending authority to implement, administer, enforce, or publicize the final rules and interpretations with respect to Reg BI. On December 20, 2019, President Trump signed H.R. 1865 , the Further Consolidated Appropriations Act, 2020, which became P.L. 116-94 and will fund the federal government through FY2020. It does not contain the aforementioned SEC restrictions contained in H.R. 3351 .", "document_type": "crs"}
{"report": "The process of resolving the legislative differences that arise between the House of Representatives and the Senate is one of the most critical stages of the legislative process. It is also potentially one of the most complicated. Each chamber continues to be governed by its own rules, precedents, and practices, but at this stage, each house also must take into account the preferences and, to some extent, the procedures of the other. This report summarizes the procedures the two houses of Congress use most frequently to resolve their legislative differences. It is based upon an interpretation of the rules and published precedents of the House and Senate and an analysis of the application of these rules and precedents in recent practice. It bears emphasizing that this report is not exhaustive, nor is it in any way an official statement of House or Senate procedures. It may serve as a useful introduction or general guide, but it should not be considered an adequate substitute for a study of House and Senate rules and precedents themselves or for consultations with the parliamentarians of the House and Senate on the meaning and possible application of the rules and precedents. Readers may wish to study the provisions of the rules—especially House Rule XXII—and examine the applicable precedents as explained in House Practice: A Guide to the Rules, Precedents, and Procedures of the House , especially pages 339-374 (on \"Conferences Between the Houses\") and pages 857-883 (on \"Senate Bills; Amendments Between the Houses\"), and in Riddick's Senate Procedure (Senate Document No. 101-28), especially pages 126-143 (on \"Amendments Between Houses\") and pages 449-493 (on \"Conferences and Conference Reports\"). Before Congress can submit a bill or joint resolution to the President for his approval or disapproval, the Senate and the House of Representatives must agree on each and every provision of that measure. It is not enough for both houses to pass versions of the same measure that are comparable in purpose but that differ in certain technical or even minor details; the House and Senate must agree on identical legislative language. Nor is it enough for the two chambers to approve separate bills with exactly the same text; the House and Senate both must pass the same bill. In sum, both chambers of Congress must pass precisely the same measure in precisely the same form before it can become law. Each of these requirements—agreement on the identity of the measure (e.g., H.R. 1 or S. 1) and agreement on the text of that measure—is considered in turn in the following sections of this report. Because both chambers must pass the same measure before it can become law, at some point during the legislative process the House must act on a Senate bill or the Senate must act on a House bill. Congress usually meets this requirement without difficulty or controversy. In some cases, however, selecting the measure may require some parliamentary ingenuity and can have policy and political consequences. After either house debates and passes a measure, it sends (or \"messages\") that bill to the other chamber. If the second house passes the first house's bill without any amendments, the legislative process is completed: Both houses have passed the same measure in the same form. If the second house passes the bill with one or more amendments, both chambers have acted on the same measure; now they must resolve the differences between their respective versions of the text if the measure is to become law. In most cases, either the House or the Senate can be the first chamber to act. However, the Constitution requires that all revenue measures originate in the House, and the House traditionally has insisted that this prerogative extends to appropriations as well as tax measures. Thus, the House normally acts first on such a measure, and, consequently, it is a House-numbered bill or joint resolution that Congress ultimately presents to the President for enacting appropriations or tax laws. In some cases, the proponents of a measure may decide that one house or the other should act first. For example, a bill's supporters may first press for floor action in the chamber where they think the measure enjoys greater support. They may hope that success in one house may generate political momentum that will help the measure overcome the greater opposition they expect in the second chamber. Alternatively, one house may defer floor action on a bill unless and until it is passed by the other, where the measure is expected to encounter stiff opposition. The House leadership, for example, may decide that it is pointless for the House to invest considerable time, and for Representatives to cast possibly unnecessary and politically difficult votes, on a controversial bill until after an expected Senate filibuster on a comparable Senate bill has been avoided or overcome. As these considerations imply, major legislative proposals frequently are introduced in both houses—either identical companion bills or bills that address the same subject in rather different ways. If so, the appropriate subcommittees and committees of the House and Senate may consider and report their own measures on the same subject at roughly the same time. Thus, when one house passes and sends a bill to the other, the second chamber may have its own bill on the same subject that has been (or is soon to be) reported from committee and available for floor consideration. In such cases, the second chamber might act initially on its own bill, rather than the bill received from the other house. This is particularly likely to happen when the committee of the second house reports a bill that differs significantly in approach from the measure passed by the first chamber. The text selected for floor consideration generally sets the frame of reference within which debate occurs and amendments are proposed. In most cases, the House or Senate modifies, but does not wholly replace, the legislative approach embodied in the bill it considers. It is usually advantageous, therefore, for a committee to press for floor consideration of its approach, rather than the approach proposed by the other house. In large part for this reason, the House (or the Senate) sometimes acts on its own bill even though it has already received the other chamber's bill on the same subject. Under these circumstances, however, it would not be constructive for the House to pass its bill and then send it to the Senate. If the House were to do so, then each chamber would have in its possession a bill passed by the other, but both chambers would not yet have acted on the same measure. To avoid this potential problem, the second house often acts initially on its own bill, and then it also acts on the other chamber's bill on the same subject. In these situations, the House customarily debates, amends, and passes the House bill and, immediately thereafter, takes up the counterpart Senate bill. The floor manager then moves to \"strike out all after the enacting clause\" of the Senate bill (the opening lines of every bill—\"Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled\") and replace the stricken text with the full text of the House bill as just passed. The House often agrees by unanimous consent to consider the Senate bill and approves the House substitute routinely. The Senate bill, as amended, is then passed by voice vote or without objection. In some cases, a special rule includes provisions for such action on a companion Senate bill. For instance, a special rule may state The House hereby takes from the Speaker's table the bill S. l and adopts an amendment to strike out all after the enacting clause of the said Senate bill and insert in lieu thereof the provisions contained in H.R. 1 as passed by the House. In this way, the House actually passes two bills on the same subject and with identical provisions, but it is the Senate bill (which both chambers now have passed) that is the subject of further action. The Senate acts in a comparable fashion. The Senate might debate and amend its bill and, after passage, take up the House bill by unanimous consent, strike out all after the enacting clause, insert the amended text of the Senate bill, and pass the House bill, as it has been amended by the Senate's amendment in the nature of a substitute. To occur swiftly, these procedures require unanimous consent. Sometimes the Senate begins consideration of a House-numbered bill to avoid the need for unanimous consent at the end of the process, particularly when the measure is a revenue or appropriations measure. If the first house's bill has been referred to committee in the second chamber and is still there, it is first necessary to discharge the committee from further consideration of the bill. This also is normally accomplished routinely, either by unanimous consent or, in the House, pursuant to the provisions of a special rule. To avoid the need for this action, the Speaker often leaves a Senate bill on \"the Speaker's table,\" instead of referring it to the appropriate House committee, if there is reason to expect that the House will soon act on a companion House bill. Similarly, a House bill may be taken up on the Senate floor without first being referred to committee when a companion Senate bill has been reported from committee and is on the Senate's legislative calendar. By these devices, the House and Senate arrange to act on the same bill, even if they have passed that measure with fundamentally different texts. In most cases, these arrangements are noncontroversial and routine. Under some circumstances, however, complications and difficulties can arise. The House operates under a rule that requires that all amendments must be germane to the measure being considered; the Senate does not. Unless the Senate imposes a germaneness requirement on itself by unanimous consent or by invoking cloture, most measures are subject to whatever nongermane floor amendments Senators wish to offer. Consequently, the Senate may select a House bill on one subject as a convenient \"vehicle\" and amend it to include provisions on other, unrelated subjects. Sometimes the use of unrelated legislative vehicles is accepted by both the House and the Senate as a useful, or even necessary, device to cope with different political and parliamentary conditions prevailing in the two chambers. Once the House and Senate have passed different versions of the same measure, there are basically two methods they can use to resolve the differences between their versions. One method involves a conference committee—a panel of Members representing each house that attempts to negotiate a version acceptable to both chambers. Historically, Congress has sent most major bills to conference committees. The other method makes a conference committee unnecessary by relying instead on amendments between the houses—Senate amendments to the House position, House amendments to the Senate position, or both. The two houses shuttle the measure back and forth between them, each chamber proposing an alternative to the position of the other or insisting on its own position, in the hope that both houses eventually will agree on the same position. The essential nature of each method can be described relatively simply. However, potential variations abound. Occasionally, some combination of the two methods may be used. For example, the House and Senate may begin the process of resolving their differences by amending each other's amendments. Then they may decide to go to conference if the first method is not totally, or even partially, successful. Alternatively, the two houses may decide immediately to create a conference committee, but that conference committee might resolve only some of the differences between their two versions. If so, the two chambers may accept whatever agreements the conferees have reached and then attempt to deal with the remaining disagreements through an exchange of amendments between the houses. Under some circumstances, the process can become even more complicated. Certain patterns of action are most common, but the possible variations make the procedures at this stage of the legislative process the most difficult to predict with any assurance. Moreover, either house may refuse to act at any time and at any stage of this process, and if that chamber remains adamant in its refusal to act, the measure dies. In general, the House or Senate cannot take any action by either method unless it is in formal possession of the \"papers\"—the official copies of the measure and whatever amendments, motions, and accompanying messages have been approved by the House and Senate. In attempting to resolve their differences, the two chambers act sequentially, not simultaneously. The need to resolve differences arises when one house passes a measure that the second chamber subsequently passes with one or more amendments. It is these amendments that create the differences between the two houses. The differences may be resolved by one chamber accepting the amendments of the other or by proposing new amendments that the other house agrees to accept. Within limits to be discussed, the measure may be sent back and forth between the House and Senate, each house amending the amendments of the other, in the hope that one chamber will agree to the proposals from the other. When the amending opportunities are exhausted, one house must accept the position of the other or the bill can die for lack of agreement. Alternatively, at any stage during this process, either house can request a conference, thereby proposing to use the other method for resolving their differences. (Then, if the conference is not totally successful, it may be necessary to return once again to amendments between the houses.) The second chamber's amendments to the bill are the text that is subject to amendments between the houses, and that text may be amended in two degrees. Assume that the House has passed H.R. 1 and the Senate has passed the same bill with an amendment. When the Senate sends the bill back to the House, the House may amend the Senate amendment. (Technically, the House concurs in the Senate amendment with a House amendment.) This House amendment to the Senate amendment is a first-degree amendment. When the Senate receives from the House the bill with the House amendment to the Senate amendment, the Senate may concur in the House amendment to the Senate amendment. If the Senate does so, the differences between the chambers have been resolved. Alternatively, the Senate may amend the House amendment. (Technically, the Senate concurs in the House amendment to the Senate amendment with a further Senate amendment.) This further Senate amendment is a second-degree amendment. When the bill and the accompanying papers (that is, the various House and Senate amendments and messages) are now returned to the House, that chamber may not propose a further amendment. That would be a prohibited amendment in the third degree. The House may concur in the final Senate amendment, in which case the differences are resolved, or it may disagree to the Senate amendment. (Note that this is the first point at which disagreement has been expressed; a later section of this report discusses the importance of reaching the stage of disagreement.) If the House disagrees to the final Senate amendment (or to any Senate amendment at some earlier stage), the Senate may recede from its amendment and concur in the last position offered by the House (thereby achieving agreement), or the Senate may insist on its amendment. In turn, if both chambers are adamant, the House may insist on its disagreement, the Senate may adhere to its amendment, and the House finally may adhere to its disagreement. If this stage is reached, the bill is almost certain to die unless one house or the other recedes from its last position. (This same sequence of events can begin in the Senate, with the subsequent actions of the chambers reversed.) The two houses may reach agreement at any stage of this process if one chamber concurs in the amendment of the other or recedes from its own amendment. Alternatively, stalemate could be reached more quickly—for instance, if the chambers refuse to alter their original positions and proceed directly through the stages of disagreement, insistence, and adherence, bypassing the intermediate stages at which they could offer new proposals in the form of first- and second-degree amendments between the houses. Fortunately, the House and Senate rarely reach the point of insistence and then adherence. The House may consider on the floor a House-passed measure with Senate amendments under several circumstances: (1) instead of sending the bill to a conference committee, (2) in the process of sending it to conference, or (3) after the measure has been considered by a conference. This section discusses House action on Senate amendments either instead of or before consideration in conference. House actions on Senate amendments after conference are discussed in later sections of this report on amendments in true and technical disagreement. A bill that the House has passed and that the Senate has amended and returned to the House usually remains at \"the Speaker's table\" until it is taken up again on the House floor. It may be referred to a House committee at the discretion of the Speaker, but referral to committee is not mandatory and rarely occurs. The Speaker is most likely to refer the bill to committee if the Senate amendments are major in scope and nongermane in character, and especially if the Senate amendments would fall within the jurisdiction of a House committee that had not considered the bill originally. At this stage of the legislative process, the bill and the Senate amendments to it are not privileged for floor consideration by the House—in other words, it is not in order for the House to consider the Senate amendments to the bill—unless the Senate amendments do not include any authorization, appropriation, or revenue provisions that House rules require to be considered in Committee of the Whole. The bill and Senate amendments become privileged for House floor consideration only after the House has reached the stage of disagreement. The only motion that can be made on the House floor at this stage is a motion to go to conference with the Senate. This motion can take two forms. If the Senate has passed a House bill with Senate amendments, the motion proposes that the House disagree to the Senate amendments and request or agree to a conference with the Senate. If the Senate has disagreed to House amendments to a Senate bill and returned the bill to the House, the motion proposes instead that the House insist on its amendments and request or agree to a conference. In either case, the motion is entertained at the Speaker's discretion and may be made only if authorized by the committee (or committees) with jurisdiction over the subject of the measure. The same result is achieved far more often by unanimous consent. If the Senate amendments require consideration in Committee of the Whole, it is not in order to move to concur in the Senate amendments (thereby reaching agreement), or to move to concur in the Senate amendments with House amendments (thereby proposing a new House position to the Senate). However, such actions sometimes are taken by unanimous consent. The House floor manager may ask unanimous consent, for instance, to take the bill, H.R. 1, with Senate amendments thereto from the Speaker's table and concur in the Senate amendments. Another Member, generally a minority-party member of the committee of jurisdiction, often reserves the right to object, usually only for the purpose of asking the floor manager to explain the purpose of the request and the content of the Senate amendments. Their discussion usually establishes that the Senate amendments are either desirable or minor and, in any case, are acceptable to the Representatives who know and care the most about the measure. The reservation of objection then is withdrawn; the unanimous consent request is accepted, and the differences between the House and Senate are thereby resolved. In similar fashion, the House may—again, by unanimous consent—concur in some or all of the Senate amendments with House amendments. It bears repeating that, if there is objection to a unanimous consent request to concur in Senate amendments (with or without House amendments), no motion to that effect can be made if the amendments require consideration in Committee of the Whole. However, at least two alternatives are available. First, the Speaker may recognize the floor manager to move to suspend the rules and concur in the Senate amendments (again, with or without House amendments). Motions to suspend the rules may be considered, at the discretion of the Speaker, on a Monday, Tuesday, or Wednesday. The Speaker also may entertain motions to suspend the rules on other days by unanimous consent or pursuant to a special rule. Such a motion is debatable for 40 minutes, is not amendable, and requires support from two-thirds of the Members present and voting. Second, the Rules Committee may report, and the House may agree to, a special rulemaking in order a motion to concur (with or without amendments). In fact, the special rule may even be drafted in such a way that the vote to agree to the rule is also the vote to concur in the Senate amendments. Such a resolution is known as a self-executing rule and may take the following form: Resolved , That immediately upon the adoption of this resolution the bill ( H.R. 1 ), together with the Senate amendments thereto, is taken from the Speaker's table to the end that the Senate amendments be, and the same are hereby, agreed to. There are additional rules and precedents concerning the consideration of certain Senate amendments in Committee of the Whole, the germaneness of House amendments to Senate amendments, and the relative precedence of the motion to concur and the motion to concur with amendments. However, these rules and precedents are not often invoked at this stage of House proceedings because the measure and the Senate amendments are either sent directly to conference or they are disposed of by a means that waives these rules and precedents: unanimous consent, suspension of the rules, or special rules. Some of these possibilities are far more likely to arise during House floor action on Senate amendments in true or technical disagreement, and they are discussed in later sections on those subjects. When the Senate receives a bill with House amendments, it normally is held at the desk. House amendments are privileged and, therefore, can be laid before the Senate without debate. Moreover, the consideration of these amendments suspends, but does not displace, the pending or unfinished business. Paragraph 3 of Rule VII provides: The Presiding Officer may at any time lay, and it shall be in order for a Senator to move to lay, before the Senate, any bill or other matter sent to the Senate by the President or the House of Representatives for appropriate action allowed under the rules and any question pending at that time shall be suspended for this purpose. Any motion so made shall be determined without debate. Normally, the majority leader asks the presiding officer to lay before the Senate the House message on a bill; such a message may state that the House has passed a certain Senate bill with amendments that are stated in the message. The message also may inform the Senate that the House has requested a conference. In many situations, House amendments are not called up on the Senate floor until after a process of consultations and negotiations as is characteristic of the Senate. The majority and minority floor managers can be expected to consult with each other and to decide if the House amendments are acceptable or if the two Senators can agree on amendments to those House amendments. Whatever agreement the floor managers reach also is discussed with other interested Senators in the hope of achieving general concurrence. If such concurrence is reached, it is reflected in an expeditious floor decision to agree to the House amendments, with or without further Senate amendments. If such an agreement is not reached, then a variety of parliamentary options are available for acting on House amendments. If the goal is to arrange for a conference committee with the House, a motion could be made that can take two forms: 1. If the House has passed a Senate bill with House amendments, the motion proposes that the Senate disagree to the House amendments, request or agree to a conference with the Senate, and authorize the presiding officer to appoint conferees. 2. If the House has disagreed to Senate amendments to a House bill and returned the bill to the Senate, the motion proposes instead that the Senate insist on its amendments, request or agree to a conference, and authorize the presiding officer to appoint conferees. In either case, the motion is subject to debate under the regular rules of the Senate, but as discussed in the section on arranging for a conference, a new rule approved in the 113 th Congress provides for an expedited cloture process on the motion. If the goal is to return the amendment(s) to the House to further the legislative process, then the basic choices before the Senate are to propose a change to the House amendment(s), agree to the House amendment(s), or to disagree to the House amendment(s). More formally, the three central motions to dispose of House amendments prior to the stage of disagreement are (1) that the Senate concur in the House amendment(s) with Senate amendment(s), (2) that the Senate concur in the House amendment(s), or (3) that the Senate disagree to the House amendment(s). Any of these motions are debatable and, therefore, subject to being filibustered. However, a fourth motion—to table the House amendments—is not debatable and, if agreed to by the Senate, returns the House amendment with a message that the Senate has disagreed to the House amendment. It is possible for multiple motions to dispose of a House amendment to be pending at the same time. The motions to concur, concur with an amendment, and to disagree are listed above in their order of precedence; a motion can be understood to have precedence over another if it may be offered while the other is pending and it is disposed of first. Thus, with a motion to disagree pending, a motion to concur and a motion to concur with an amendment could be offered and would be voted on first. If a motion to concur with an amendment were pending, however, neither a motion to concur nor a motion to disagree could be offered until the Senate disposed of the motion to concur with an amendment. A motion to table is of the highest precedence. Furthermore, if the House has proposed several amendments to the Senate bill (or Senate amendment), then the Senate could take different actions on each of the House amendments. When the Senate receives multiple amendments from the House, it considers them in the order that they affect the Senate text. A single motion can be made to dispose of several amendments, so long as it is the same form of disposition (for example, to concur), but such a motion would be subject to division. At least in part due to the potential for procedural complexity in relation to consideration of House amendments, in recent Congresses the majority leader has used his right of preferential recognition to offer a motion to concur in House amendments, as well as all the other available amendatory motions related to it. This process has been referred to as \"filling the tree.\" The procedural effect of filling the tree—or offering all of the amendatory motions available in a particular parliamentary situation—is that no Senator can propose an alternative method of acting on the House amendments until the Senate disposes of (or lays aside by unanimous consent) one of the pending motions. Filling the tree does not affect the right of Senators to debate the motions regarding House amendments at length. It does not, therefore, bring the Senate any closer to final disposition of the House amendments. If, however, the majority leader can build a coalition of at least 60 Senators (assuming no vacancies in the Senate) in order to invoke cloture, then he can fill the tree to block other Senators from proposing other ways of disposing of House amendments, including perhaps proposing Senate amendments to the House amendments prior to Senate disposition of the House amendments. In recent Congresses, the majority leader has \"filled the tree\" and then filed a cloture motion in order to end consideration of an underlying question. If the Senate agrees to invoke cloture on a motion to dispose of the House amendments, such as a motion to concur, then all other pending motions of a higher precedence fall. The motion on which cloture was invoked can then be considered for a maximum of 30 additional hours. If the House and Senate versions of a measure are submitted to conference, the conference committee must meet formally and, if it resolves some or all of the differences between the houses, prepare both a conference report and a joint explanatory statement. To avoid these and other requirements, the two chambers may use the process of sending amendments between the houses as an informal alternative that achieves much the same purpose and result as would a conference committee. The purpose of a conference committee is to negotiate a settlement of the legislative differences between the two chambers. But these negotiations do not have to take place in the official setting of a conference committee meeting. They also can occur through informal discussions among the most interested Representatives and Senators and their staffs. If such informal discussions are successful, their results can be embodied in an amendment between the houses. As the second house nears or reaches completion of floor action on a measure, the staffs of the respective House and Senate committees are likely to be comparing the two versions of the bill and seeking grounds for settling whatever differences exist. After initial staff discussions, the House and Senate committee leaders themselves may become involved. If these informal and unofficial conversations appear productive, they may continue until a tentative agreement is reached, even though no conference committee has yet been created. If the tentative agreement proves acceptable to other interested Representatives and Senators, a conference committee may be unnecessary. Instead, when the bill with the second house's amendments has been returned to the first chamber, the majority floor manager may, under the appropriate rules or practices of that house, call up the bill and propose that the House or Senate (as the case may be) concur in the second chamber's amendments with some amendments. He or she then describes the differences between the House and Senate versions of the measure and explains that the proposed amendments represent a compromise that is agreeable to the interested Members of both houses. The floor managers may express their confidence that, if the first house accepts the amendments, the other chamber also will accept them. If the first house does agree to the amendments, the second chamber then considers and agrees to them as well, under its procedures for considering amendments of the \"other body.\" In this way, the differences between the House and Senate are resolved through the kind of negotiations for which conference committees are created, but without resort to a formal conference committee. Since the purpose of conference committees is to resolve legislative disagreements between the House and Senate, it follows that there can be no conference committee until there is disagreement—until the House and Senate formally state their disagreement to each other's positions. A chamber reaches this stage either by formally insisting on its own position or by disagreeing to the position of the other house, and so informing the other house. Once the House or Senate reaches the stage of disagreement, it cannot then agree to (concur in) a position of the other chamber, or agree with an amendment, without first receding from its disagreement. The stage of disagreement is an important threshold. Before this threshold is reached, the two chambers presumably are still in the process of reaching agreement. Thus, amendments between the houses, as an alternative to conference, are couched in terms of one chamber concurring in the other's amendments, or concurring in the other's amendments with amendments. For example, when the House concurs in Senate amendments with House amendments, the House does so because it does not accept the Senate amendments—in fact, it disagrees with them. But the House does not state its disagreement explicitly and formally at this stage because crossing the threshold of disagreement has significant procedural consequences, especially in the House. Whereas House amendments are always privileged in the Senate, most Senate amendments are not privileged in the House before the House has reached the stage of disagreement. Moreover, the order of precedence among certain motions is reversed in the House (but not in the Senate) after the stage of disagreement has been reached. Before the stage of disagreement, the order of precedence among motions in both chambers favors motions that tend to perfect the measure further; after the stage of disagreement in the House, the order of precedence is reversed, with precedence being given to motions that tend to promote agreement between the chambers. Before the stage of disagreement, for example, a motion to concur with an amendment has precedence over a motion to concur; after the stage of disagreement in the House, a motion to recede and concur has precedence over a motion to recede and concur with an amendment. The precedence among motions before and after the stage of disagreement can become important during the process of exchanging amendments between the houses. It is most likely to matter after a conference committee has reported and the House and Senate are considering amendments in true or technical disagreement. For this reason, a more detailed discussion of the subject is reserved to the sections on such amendments. If the differences between the House and the Senate cannot be resolved through the exchange of amendments between the houses, two possibilities remain. First, stalemate can lead to the death of the legislation if both chambers remain adamant. Second, the two houses can agree to create a conference committee to discuss their differences and seek a mutually satisfactory resolution. Historically, major bills have been sent to conference, either after an unsuccessful attempt to resolve the differences through amendments between the houses or, more often, without such an attempt having even been made. The process of arranging for a conference can begin as soon as the second house passes the bill at issue, either with one or more amendments to parts of the measure or with a single amendment in the nature of a substitute that replaces the entire text approved by the first chamber. The second house then may simply return the bill, with its amendments, to the first chamber if there is reason to believe that the first house might accept the amendments, or that amendments between the houses can be used successfully as an informal alternative to conference. It also may do so if the second house wishes to act first on an eventual conference report, because the chamber that asks for a conference normally acts last on the conference report. Alternatively, the second house may pass the bill and immediately insist on its amendments and also request a conference with the first chamber. By insisting on its amendments, the second chamber reaches the stage of disagreement. The bill, the second house's amendments, and the message requesting a conference then are returned to the first house. The first house is not obliged to disagree to the second chamber's amendments and agree to the requested conference. The first house also has the options, for example, of refusing to act at all or concurring in the second chamber amendments, with or without amendments. When one chamber requests a conference, however, the other house normally agrees to the request. If the second chamber just returns the bill and its amendments to the first house without insisting on its amendments, the first house may disagree to the amendments and request a conference. The bill, the amendments, and the message requesting the conference then are returned to the second chamber, which usually insists on its amendments (thereby reaching the stage of disagreement) and agrees to the conference. Thus, there are essentially two direct routes to conference. (There are more indirect routes, of course, if an attempt is first made to resolve the differences through an exchange of amendments.) The second house may begin the process by insisting on its amendments and requesting the conference. If this does not occur, the first house then may begin the process by disagreeing to the second chamber's amendments and requesting the conference itself. The first route is likely to be followed when the need for a conference is a foregone conclusion. However, strategic considerations also may influence how the Senate and House agree to go to conference, especially in view of the convention that the chamber that asks for the conference normally acts last on the conference report. With this in mind, proponents of the legislation may prefer one route to the other. For example, House or Senate conferees can avoid the possibility of facing a motion in one house to recommit the conference report (with or without instructions) if they have arranged for the other house to act first on the report. By the same token, if Senate opponents are expected to filibuster the conference report, proponents may prefer for the Senate to agree to a House request for a conference, so that the Senate will act first on the report. This arrangement avoids compelling Representatives to cast difficult votes for or against a conference report that may not reach a vote in the Senate. On the other hand, a bill's supporters could prefer that the House agree to the conference and then vote first on the report, with the hope that a successful House vote might improve the prospects for later success on the Senate floor. In addition, under a provision of Senate Rules added in 2013, it might be easier to arrange for conference (1) after the House has disagreed to a Senate amendment, or (2) after the House has amended a Senate bill (or amendment). At the start of the 113 th Congress, the Senate agreed to a rules change creating a new motion to take the steps necessary to arrange for a conference committee with the House and expediting the cloture process on that motion. Under this rule, if cloture is filed on the new motion to authorize a conference committee, the consolidated motion would be subject to two hours of debate, after which the Senate would vote on cloture. If cloture were invoked by three-fifths of the Senate, a simple majority could approve the motion to authorize a conference, and no further debate of the motion would be in order. The new motion, however, is only in order when a House message has been laid before the Senate. It would not be in order immediately after the Senate has passed a House bill with amendment(s). To arrange for a conference at that stage would require unanimous consent, just as it did prior to the rules change. After either house requests or agrees to a conference, it usually proceeds immediately to select conferees (or managers, as they may also be called). The selection of conferees can be critically important, because it is this group—sometimes a small group—of Representatives and Senators who usually determine the final form and content of major legislation. In the House, clause 11 of Rule I authorizes the Speaker to appoint all members of conference committees and gives him certain guidelines to follow: The Speaker shall appoint all select, joint, and conference committees ordered by the House. At any time after an original appointment, the Speaker may remove Members, Delegates, or the Resident Commissioner from, or appoint additional Members, Delegates, or the Resident Commissioner to, a select or conference committee. In appointing Members, Delegates, or the Resident Commissioner to conference committees, the Speaker shall appoint no less than a majority who generally supported the House position as determined by the Speaker, shall name Members who are primarily responsible for the legislation, and shall, to the fullest extent feasible, include the principal proponents of the major provisions of the bill or resolution passed or adopted by the House. These guidelines carry weight as admonitions but they necessarily give the Speaker considerable discretion, and his or her exercise of this discretion cannot be challenged on the floor through a point of order. In the Senate, the presiding officer is almost always authorized by unanimous consent to appoint \"the managers on the part of the Senate.\" The Senate could also grant this authority to the presiding officer by agreeing to a motion arranging for a conference (Rule XXVIII, paragraph 2). Before the formal announcement of conferees in each chamber, a process of consultation takes place that vests great influence with the chairman and the ranking minority member of the committee (and sometimes the subcommittee) that had considered the bill originally. These Representatives and Senators almost always serve as conferees. Furthermore, they usually play an influential, and often a controlling, role in deciding the number of conferees from their respective chambers, the party ratio among these conferees, and which of their committee colleagues shall be appointed to the conference committee. In the House, the Speaker often accepts without change the list developed by the House committee leaders; the presiding officer in the Senate always does so. If the bill at issue had been considered by more than one committee in either house, all the involved chairmen and ranking minority members from that chamber normally participate in determining its roster of conferees, and the conferees usually are drawn from both or all of those committees. In such cases, the party leaders in each house are more likely to become involved in the selection process—in determining the total number of House or Senate conferees and the division of conferees between or among the committees of jurisdiction, as well as in choosing individual Members to serve. From time to time, the Speaker also exercises the authority granted in the rule to appoint a Representative who offered a key successful floor amendment, even if he or she is not on the committee(s) that reported the legislation. In some cases—and especially in cases of multiple committee jurisdiction—House or Senate conferees may be appointed for limited purposes: for example, only for the consideration of Title I of the House version, or only for the consideration of a particular (and possibly nongermane) Senate amendment. Such conferees are expected to limit their participation in the conference to consideration of the matters for which they are appointed. This practice protects the influence in conference of the appropriate House and Senate standing committees. Each house determines for itself the size of its delegation to the conference committee. The House and Senate need not select equal numbers of conferees, and they frequently do not. However, unequal numbers of House and Senate managers do not affect the formal power of either house in conference decisions. The conference report requires approval by a majority of the House conferees and a majority of the Senate conferees, rather than a majority of all conferees. Each house usually appoints an odd number of conferees to avoid tie votes. After the House or Senate decides to go to conference (either by requesting the conference or agreeing to a request from the other house), its conferees usually are appointed immediately. Between these two steps, however, both houses have an opportunity (although usually only a momentary opportunity) to move to instruct the conferees. For example, the managers may be instructed to insist on the position of their house on a certain matter, or even to recede to the position of the other house. Instructions are not binding in either house. They are only admonitions, or advisory expressions of position or preference. No point of order lies in either the House or the Senate against a conference report on the ground that conferees did not adhere to the instructions they received. In the Senate, a motion to instruct is debatable and amendable. In the House, such a motion is debated under the one-hour rule, and a germane amendment to the instructions is in order only if the House does not order the previous question during or at the end of the first hour of debate. In neither house can conferees be instructed to take some action that exceeds their authority. In the House, clause 7 of Rule XXII also bars instructions that \"include argument.\" Only one valid motion to instruct is in order in the House before its conferees are named, whether or not the motion is agreed to; but if a motion to instruct is ruled out of order, another motion to instruct may be made. Under the precedents of the House, a Member of the minority party is entitled to recognition to move to instruct. The Speaker normally looks first to senior minority-party members of the committee that reported the measure at issue. This recognition practice can be used to try to control the instructions that are proposed; for example, instructions on one subject may be precluded if the ranking minority member seeks recognition to offer a motion to instruct on another subject. In the House, but not in the Senate, motions to instruct also are in order after House conferees have been appointed but have failed to report an agreement. Clause 7(c)(1) of House Rule XXII provides in part: A motion to instruct managers on the part of the House, or a motion to discharge all managers on the part of the House and to appoint new conferees, shall be privileged— (A) after a conference committee has been appointed for 45 calendar days and 25 legislative days without making a report.... By precedent, more than one proper motion to instruct is in order when made pursuant to this clause, and the minority party does not enjoy preferential recognition in offering such motions. According to clause 7(c)(2), the Speaker \"may designate a time in the legislative schedule on that legislative day for consideration\" of the motion to instruct. In principle, there are significant restrictions on the kinds of policy agreements that House conferees can accept. In practice, however, these restrictions are not as stringent as they might seem at first. Because conference committees are created to resolve disagreements between the House and Senate, the authority of House conferees is limited to the matters in disagreement between the two houses. House conferees have no authority to change matters that are not in disagreement—that is, either matters that appear in the House and Senate versions of the measure in identical form, or matters that were not submitted to the conference in either the House or the Senate version. Furthermore, as House conferees consider each matter in disagreement, their authority is limited by the scope of the differences between the House and Senate positions on that matter. The House's managers may agree on the House position, the Senate position, or some middle ground. But they may not include a provision in a conference report that does not fall within the range of options defined by the House position at one extreme and the Senate position at the other. If, for example, the House proposes to appropriate $1 billion for a certain purpose and the Senate proposes $2 billion instead, the House conferees may agree on $1 billion or $2 billion or any intermediate figure. But they may not agree on a figure that is less than $1 billion or more than $2 billion. To do so would exceed the scope of the differences between the House and Senate positions on that matter in disagreement. The concept of \"scope\" relates to specific differences between the House and Senate versions of the same measure, not to the implications or consequences of these differences. Thus, House conferees on a general appropriations bill may agree on the higher (or lower) of the House and Senate positions on each appropriation item, even though the sum of their agreements is higher (or lower) than the total sum proposed in either the House or the Senate version of the bill (unless the two versions explicitly state such a total). Also, if one house proposes to amend some existing law and the other chamber does not, the scope of the differences over this matter generally is bounded by the proposed amendments, on the one hand, and the pertinent provisions of existing law, on the other. Thus, the House conferees may agree on the proposed amendments or on alternatives that are closer to existing law. Thus, there are significant restrictions on the authority of House conferees: Their authority is restricted by the scope of the differences between the House and Senate over the matters in disagreement between them. However, it is far easier to make this statement than to apply it in all cases. It becomes much more difficult to define the scope of the differences when the differences are qualitative, not quantitative as in the example above. Moreover, how difficult it is to define the scope of the differences also depends on how the second chamber to act on the measure has cast the matters in disagreement. If one house takes up a measure from the other and passes the measure with a series of amendments to the first chamber's text, then the matters in disagreement in conference are cast in terms of two or more discrete amendments approved by the second house to pass the bill. These amendments usually are numbered for convenient reference. The two versions of the measure can be compared side by side to identify the provisions that are identical in both versions and those that are the subject of disagreements. Therefore, it is possible to identify both the matters in disagreement and the House and Senate positions on each of them. However, the second chamber that acts on a measure typically casts its version in the form of an amendment in the nature of a substitute for the entire text passed by the first house. In such cases, only one amendment is submitted to conference, even though that single amendment may encompass any number of specific differences between the House and Senate versions of the measure. In fact, the text of the bill as passed by one house and the text of the other house's amendment in the nature of a substitute may embody wholly different approaches to the subject of the measure. The two versions may be organized differently and may address the same subject in fundamentally different ways. Second house substitutes make it much harder, if not impractical, to specifically identify each matter in disagreement and the scope of the differences over that matter. When a second chamber substitute is in conference, therefore, the conferees must have somewhat greater room for maneuver. Technically, the House and Senate are in disagreement over the entire text of the measure; substantively, the policy disagreements may be almost as profound. In such cases, the conferees resolve the differences between the House and Senate by creating a third version of the measure—a conference substitute for both the version originally passed by the first house and the amendment in the nature of a substitute approved by the second house. This latitude may be necessary, but it also means that the conference substitute could take the form of a third and new approach to the subject at hand—an approach that had not been considered on the floor of either house. To inhibit such a result, clause 9 of House Rule XXII states: Whenever a disagreement to an amendment has been committed to a conference committee, the managers on the part of the House may propose a substitute that is a germane modification of the matter in disagreement. The introduction of any language presenting specific additional matter not committed to the conference committee by either House does not constitute a germane modification of the matter in disagreement. Moreover, a conference report may not include matter not committed to the conference committee by either House and may not include a modification of specific matter committed to the conference committee by either or both Houses if that modification is beyond the scope of that specific matter as committed to the conference committee. Notwithstanding this specificity, determining whether a conference substitute includes some new \"matter\" is far more difficult than determining whether the conferees' agreement on an appropriation for a program falls within the scope of the differences between the funding levels originally proposed by the House and Senate. If the House conferees have exceeded their authority in any one respect in agreeing to a conference report, that report as a whole is tainted and so is subject to a point of order on the House floor. However, there are at least three reasons why it is relatively unusual for a point of order to be made and sustained against a conference report. First, House conferees are aware of the limits within which they are to negotiate, and they usually try not to exceed their authority. Second, conferees frequently are presented with second chamber substitutes, and in those cases, they have somewhat greater discretion in the agreements they can reach. Third, even if the House managers propose a conference report that exceeds their authority, there are several ways in which they can protect their report against being subject to a point of order on the House floor. If the conferees were negotiating over separate numbered amendments and their agreement concerning one or more of the amendments is beyond their authority, they can report those amendments back to the House and Senate as amendments in technical disagreement. However, conferees may not report back in disagreement on part of an amendment in the nature of a substitute. Alternatively, the House can approve a conference report by a two-thirds vote under suspension of the rules, a procedure that does not allow points of order to be made on the floor. Finally, and perhaps most importantly in current practice, the House Rules Committee may propose that the House approve a special rule waiving any or all points of order against a conference report and against its consideration. Even if a conference report is ruled out of order, it may then be possible to propose precisely the same agreements that were contained in the report in the form of amendments between the houses (if the amendments are not in the third degree and do not contain nongermane matter). The Senate's rules and precedents embody roughly the same principles regarding restrictions on the authority of its conferees. Paragraphs 3 and 4 of Senate Rule XXVIII state, in part: 3. (a) Conferees shall not insert in their report matter not committed to them by either House, nor shall they strike from the bill matter agreed to by both Houses. (b) If matter which was agreed to by both Houses is stricken from the bill a point of order may be made against the report, and if the point of order is sustained, the report is rejected or shall be recommitted to the committee of conference if the House of Representatives has not already acted thereon. (c) If new matter is inserted in the report, a point of order may be made against the conference report and it shall be disposed of as provided under paragraph 4. 4. (a) In any case in which a disagreement to an amendment in the nature of a substitute has been referred to conferees— (1) it shall be in order for the conferees to report a substitute on the same subject matter; (2) the conferees may not include in the report matter not committed to them by either House; and (3) the conferees may include in their report in any such case matter which is a germane modification of subjects in disagreement. Historically, the Senate has interpreted its rules and precedents affecting the content of conference reports in ways that grant conferees considerable latitude in reaching agreements with the House. According to Riddick's Senate Procedure , for example, a \"conference report may not include new 'matter entirely irrelevant to the subject matter,' not contained in the House- or Senate-passed versions of a measure as distinct from a substitute therefor.\" And regarding conference substitutes, Senate precedents state that, \"in such cases, they [the conferees] have the entire subject before them with little limitation placed on their discretion, except as to germaneness, and they may report any germane bill.\" Under current practice, the Senate takes a commonsense approach to deciding whether new matter is sufficiently relevant to constitute \"a germane modification of subjects in disagreement.\" The authority of Senate conferees is further limited by paragraph 8 of Senate Rule XLIV. A Senator can raise a point of order against provisions of a conference report if they constitute \"new directed spending provisions.\" Paragraph 8 defines a \"new directed spending provision\" as any item that consists of a specific provision containing a specific level of funding for any specific account, specific program, specific project, or specific activity, when no specific funding was provided for such specific account, specific program, specific project, or specific activity in the measure originally committed to the conferees by either House. Paragraph 8 of Senate Rule XLIV applies only to provisions of conference reports that would provide for actual spending. In other words, it applies only to discretionary and mandatory spending provisions and not to authorizations of appropriations. Discretionary spending is provided in appropriations acts and generally funds many of the programs, agencies, and routine operations of the federal government. Mandatory spending, also referred to as direct spending, is provided in or controlled by authorizing law and generally funds entitlement programs, such as Social Security and Medicare. The Senate can waive both of these restrictions on the content of conference reports by a three-fifths vote of Senators duly chosen and sworn (60 Senators assuming no vacancies). The process for waiving a point of order and the effect of a successful point of order raised under either of these rules are discussed in a later section of this report on floor consideration of conference reports. Rules of procedure guide and constrain the legislative activities of both the House and Senate. So it is striking that there are almost no rules governing procedure in conference. The members of each conference committee can select their own chairmen. They also can decide for themselves whether they wish to adopt any formal rules governing such matters as debate, quorums, proxy voting, or amendments, but usually they do not. The only rules imposed by the two houses governing conference committee meetings concern approval of the conference report and the openness of meetings to all conferees and to the public. A majority of the House managers and a majority of the Senate managers must approve and sign the conference report. Decisions are never made by a vote among all the conferees combined. All votes take place within the House delegation and within the Senate delegation. This is why there is no requirement or necessity for the two houses to appoint the same number of conferees; five Senate conferees, for example, enjoy the same formal collective power in conference as 25 House conferees. Until the mid-1970s, conference meetings were almost always closed to the public; now they are open unless a specific decision is made to close part or all of a meeting. Paragraph 8 of Senate Rule XXVIII states: Each conference committee between the Senate and the House of Representatives shall be open to the public except when managers of either the Senate or the House of Representatives in open session determine by a rollcall vote of a majority of those managers present, that all or part of the remainder of the meeting on the day of the vote shall be closed to the public. The comparable House rule is even more stringent. Clause 12 of House Rule XXII requires a majority vote on the House floor to close part or all of a conference meeting. In other words, House conferees cannot vote to close a conference committee meeting unless they have been authorized to do so by a specific roll-call vote of the House. This difference between House and Senate rules has not been a source of public contention because efforts to close conferences normally are made only when they must deal with national security matters. When House managers want the authority to close part or all of a formal conference meeting, they usually offer a motion to this effect at the time the House arranges to go to conference. House rules place additional requirements on conference committee meetings. According to clause 12 of House Rule XXII, managers \"should endeavor to ensure\" that meetings only occur if every House manager has been given notice and an opportunity to attend. The House rule also explicitly states that all matters in disagreement are open to discussion at a conference meeting. If a point of order is made and sustained on the House floor that conferees met in violation of clause 12 (or that they never met at all), the conference report is rejected and the House is considered to have requested a further conference with the Senate. Similarly, the Senate has agreed that it is the \"sense of the Senate\" that conferees should hold \"regular, formal meetings of all conferees that are open to the public,\" that conferees should be given \"adequate notice\" of such meetings, and that all conferees should be given an opportunity to \"participate in full and complete debates\" of the matters before the conference. Few other rules govern conference proceedings, and conference committees do not often vote to establish their own rules. Instead, they generally manage without them. This absence of rules reflects the basic nature of the conference committee as a negotiating forum in which the negotiators should be free to decide for themselves how to proceed most effectively. In some cases, conferences are rather formal. One delegation puts a proposal on the table; the other delegation considers it and responds with a counter-proposal. In other cases, conferences resemble free-form discussions in which the issues and the matters in disagreement are discussed without any apparent agenda or direction until the outlines of a compromise begin to emerge. In recent years, conferences on massive omnibus bills have even created \"sub-conferences\" to seek agreements that then can be combined into a single conference report. Sometimes customary practices develop among members of House and Senate committees who meet with each other regularly in conference. For example, they may alternate the chairmanship from one conference to the next between the committee or subcommittee chairmen from each house. Conference bargaining also can be facilitated by preliminary staff work. Staff may prepare side-by-side comparisons of the House and Senate versions so that the conferees can understand more easily how the two houses dealt with the same issues or problems. Furthermore, senior staff may engage in preliminary negotiations among themselves, seeking agreements acceptable to their principals, so that the members themselves can concentrate on the more intractable disagreements. When the conferees reach full agreement, staff prepare a conference report that indicates how each amendment in disagreement has been resolved. For example, the report may propose that the Senate recede from certain of its amendments to the House bill, that the House recede from its disagreement to certain other Senate amendments, and that the House recede from its disagreement to the remaining Senate amendments and concur in each with a House amendment (the text of which is made part of the report). When the conferees have considered a single amendment in the nature of a substitute, the report proposes that the house that originated the bill recede from its disagreement to the other house's substitute, and concur in that amendment in the nature of a substitute with a substitute amendment that is the new version of the bill on which the conference committee has agreed. Two copies of the conference report must be signed by a majority of House conferees and a majority of Senate conferees. No additional or minority views may be included in the report. From time to time, a manager's signature may be accompanied by an indication that he or she does not concur in the conference agreement on a certain numbered amendment. This does not make the report subject to a point of order in the House so long as a majority of House conferees have agreed on each numbered amendment. House rules require that House conferees be given an opportunity to sign the conference agreement at a set time and place. At least one copy of the final conference agreement must be made available for review by House managers with the signature sheets. The conference report itself is not the most informative document, because it does not describe the nature of the disagreements that confronted the conferees. Therefore, the rules of both houses require that a conference report be accompanied by a joint explanatory statement. According to paragraph 6 of Senate Rule XXVIII, this statement is to be \"sufficiently detailed and explicit to inform the Senate as to the effect which the amendments or propositions contained in such report will have upon the measure to which those amendments or propositions relate.\" Clause 7(e) of House Rule XXII contains a comparable requirement. Normally, this joint explanatory statement summarizes the House, Senate, and conference positions on each amendment in disagreement (or each provision, in the case of second chamber and conference substitutes). The statement also is prepared in duplicate and signed by majorities of both House and Senate conferees. The house that agreed to the conference normally acts first on the conference report. Because this is an established practice, not a requirement of either House or Senate rules, the order of consideration can be reversed, if that is strategically advantageous. For example, the House may wish to delay acting on a report until after the Senate has voted on it because of the possibility that the report may fall victim to a Senate filibuster. Alternatively, Senate conferees may agree that the House should act first if the report is likely to enjoy greater support in the House in the belief (or hope) that the House vote will increase the prospects for approving the report in the Senate. Also, the first house to consider a conference report has the option of voting to recommit the report to conference. If either house agrees to the report, the effect of that vote is to discharge that house's conferees, so there is no longer a conference committee to which the report can be recommitted. Therefore, the second house to consider the report does not have the option of recommitting it; it only may accept or reject the report. Sometimes, therefore, the supporters of a bill arrange for one house or the other to act first on the conference report in order to avoid the possibility of a successful recommittal motion. Whatever the case may be, the conferees must see to it that the house they want to act first takes the papers out of the conference. If conferees cannot agree on any of the amendments before them, or if they cannot agree on all matters encompassed by one house's bill and the other's substitute, they may report back in disagreement. The House and Senate then can seek a resolution of the differences either through a second conference or through an exchange of amendments and motions between the houses. Conferees also may report in total disagreement if they have reached an agreement on a bill and a second chamber substitute that, in some respect, violates their authority. In such a case, their disagreement is technical, not substantive. After the House receives or the Senate agrees to the report in disagreement, the conferees' actual agreement is presented as a floor amendment to the amendment in disagreement, at which point considerations of the conferees' authority no longer apply. Alternatively, the conferees may submit their report to the House and Senate even though it violates their authority in one or more respects, and then, in the House, the Rules Committee can propose and the House can adopt a resolution protecting the report against points of order. A conference report may be presented or filed at almost any time the House or Senate is in session, but not when the Senate is in executive session or when the House has resolved into Committee of the Whole. A conference report is unlikely to be considered immediately because both the House and Senate have layover and availability requirements that apply to conference reports. In the House, conference reports are subject to a 72-hour \"layover\" requirement. Clause 8(a) of Rule XXII prohibits consideration of a conference report until 72 hours after the report and joint explanatory statement has been available in the Congressional Record or on the House electronic document repository ( http://docs.house.gov ). These requirements do not apply during the last six days of a session. In addition, copies of the report and the statement must be available for at least two hours before consideration of the report begins. Clause 2(b) applies the same requirements and conditions to amendments reported from conference in disagreement. However, the House may waive these restrictions by adopting a resolution reported from the Rules Committee for that purpose. A conference report that meets the availability requirements is considered as having been read when called up for consideration in the House. If a report does not meet one or more of the requirements but is called up by unanimous consent, it must be read. However, the House normally agrees by unanimous consent to have the joint explanatory statement read instead of the report, and then it also agrees to dispense with the reading of the statement. Conference reports are highly privileged in the House and may be called up at almost any time that another matter is not pending. When called up, the report is considered in the House (not in Committee of the Whole) under the one-hour rule. Clause 8(d) of Rule XXII requires that this hour be equally divided between the majority and minority parties, not necessarily between proponents and opponents. The two floor managers normally explain the agreements reached in conference and then yield time to other Members who wish to speak on the report. If both floor managers support the report, a Member who opposes it is entitled to claim control of one-third of the time for debate. Before a second hour of debate can begin, the majority floor manager moves the previous question. If agreed to, as it invariably is, this motion shuts off further debate, and the House immediately votes on agreeing to the conference report. Any points of order against a conference report in the House must be made or reserved before debate on the report begins (or before the joint explanatory statement is read). A conference report can be protected against one or more points of order if the Rules Committee reports and the House adopts a resolution waiving the applicable rules, or if the report is considered under suspension of the rules. In the Senate, paragraph 1 of Senate Rule XXVIII requires that a conference report must be \"available on each Senator's desk\" before the Senate may consider it. In addition, under paragraph 9 of that same rule it is not in order to vote on the adoption of a conference report unless it has been available to Members and the general public for at least 48 hours before the vote. This availability requirement can be waived by three-fifths of Senators duly chosen and sworn (60 Senators if there are no vacancies). It can also be waived by joint agreement of the majority and minority leader in the case of a significant disruption to Senate facilities or to the availability of the Internet. Under the rule, a report is considered to be available to the general public if it is posted on a congressional website or on a website controlled by the Library of Congress or the Government Publishing Office. The report and accompanying statement normally are not printed in the Senate section of the Record if they have been printed in the House section. Conference reports also normally are printed only as House documents. Conference reports are privileged in the Senate. The motion to consider a report on the Senate floor is in order at most times, and it is not debatable. The Senate's usual practice is to take up conference reports by unanimous consent at times arranged in advance among the floor and committee leaders. Under a standing order the Senate adopted at the close of the 106 th Congress in December 2000, the reading of a conference report is no longer required if the report \"is available in the Senate.\" When considered on the Senate floor, a conference report is debatable under normal Senate procedures; it is subject to extended debate unless the time for debate is limited by unanimous consent or cloture, or if the Senate is considering the report under expedited procedures established by law (such as the procedures for considering budget resolutions and budget reconciliation measures under the Budget Act). Paragraph 7 of Senate Rule XXVIII states that, if time for debating a conference report is limited (presumably by unanimous consent), that time shall be equally divided between the majority and minority parties, not necessarily between proponents and opponents of the report. Consideration of a conference report by the Senate suspends, but does not displace, any pending or unfinished business; after disposition of the report, that business is again before the Senate. A point of order may be made against a conference report at any time that it is pending on the Senate floor (or after all time for debate has expired or has been yielded back, if the report is considered under a time agreement). If a point of order is sustained against a conference report on the grounds that conferees exceeded their authority—either by including \"new matter\" (Rule XXVIII) or \"new directed spending provisions\" (paragraph 8 of Rule XLIV) in the conference report—then there is a special procedure to strike out the offending portion(s) of the conference recommendation and continue consideration of the rest of the proposed compromise. Under the new procedure, a Senator can make a point of order against one or more provisions of a conference report. If the point of order is not waived (see below), the presiding officer rules whether or not the provision is in violation of the rule. If a point of order is raised against more than one provision, the presiding officer may make separate decisions regarding each provision. Senate rules provide further that when the presiding officer sustains a point of order against a conference report on the grounds that it violates either the prohibition of \"new matter\" or \"new directed spending provisions,\" the matter is to be stricken from the conference recommendation. After all points of order raised under this procedure are disposed of, the Senate proceeds to consider a motion to send to the House, in place of the original conference agreement, a proposal consisting of the text of the conference agreement minus the \"new matter\" or \"new directed spending provision\" that was stricken. Amendments to this motion are not in order. The motion is debatable \"under the same debate limitation as the conference report.\" In short, the terms for consideration of the motion to send to the House the proposal without the offending provisions are the same as those that would have applied to the conference report itself. If the Senate agrees to the motion, the conference recommendation as altered by the deletion of the \"new matter\" or \"new directed spending provision\" would be returned to the House in the form of an amendment between the houses. The House would then have an opportunity to act on the amendment under the regular House procedures for considering Senate amendments discussed in earlier sections of this report. Senate rules also create a mechanism for waiving these restrictions on conference reports. Senators can move to waive points of order against one or several provisions, or they can make one motion to waive all possible points of order under either Rule XXVIII or Rule XLIV, paragraph 8. A motion to waive all points of order is not amendable, but a motion to waive points of order against specific provisions is. Time for debate on a motion to waive is limited to one hour and is divided equally between the majority leader and the minority leader, or their designees. If the motion to waive garners the necessary support, the Senate is effectively agreeing to keep the matter that is potentially in violation of either rule in the conference report. The rules further require a three-fifths vote to sustain an appeal of the ruling of the chair and limit debate on an appeal to one hour, equally divided between the party leaders or their designees. The purpose of these requirements is to ensure that either method by which the Senate could choose to apply these rules—through a motion to waive or through an appeal of the ruling of the chair—requires a three-fifths vote of the Senate (usually 60 Senators). A simple majority (51 Senators if there are no vacancies and all Senators are voting) cannot achieve the same outcome. Conference reports may not be amended on the floor of either house. Conferees are appointed to negotiate over the differences between the versions of the same bill that the two houses have passed; the delegations return to their respective chambers with identical recommendations in the form of a report that proposes a package settlement of all these differences. The House and Senate may accept or reject the settlement, but they may not amend it directly. If conference reports were amendable, the process of resolving bicameral differences would be far more tortuous and possibly interminable. As noted in previous sections, the house that agrees to the request for a conference normally acts first on the report. The first chamber to act may vote to agree or not agree to the report, or it may agree to a preferential motion to recommit the report to conference, with or without non-binding instructions. Successful recommittal motions are quite unusual, in part because such an action implies that the conferees should and could have reached a more desirable compromise. If the first house agrees to the report, the second house only has the options of approving or disapproving the report. At this stage, the report cannot be recommitted. A vote by either house to agree to a conference report has the effect of automatically discharging its conferees and disbanding the conference committee; thus, there is no conference committee to which the second house could recommit the report. The defeat of a conference report in either house may kill the legislation, but only if no further action is taken, such as requesting a second conference or proposing a new position through an amendment between the houses. For lack of time, a second conference may not be practical near the end of a Congress, when many conference reports are considered. The vote to agree to a conference report normally completes that house's action on the measure, assuming the other house also approves the report. However, some conference reports, especially those on general appropriations bills, may be accompanied by one or more amendments in either true or technical disagreement. Furthermore, House rules include special procedures for coping with conference report provisions originating in the Senate that would not have been germane floor amendments to the bill in the House. These possibilities are discussed in separate sections that follow. It is generally in the interests of both the House and Senate managers and their parent chambers for the conferees to reach full agreement. Each house already has passed a version of the legislation and has entrusted the responsibility for resolving its differences with the other house to Members who usually were actively involved in developing and promoting the measure. Nonetheless, conferees sometimes cannot reach agreement on all the amendments in disagreement. In such a case, the conferees may return to the House and Senate with a partial conference report dealing with the amendments on which they have reached agreement but excluding one or more amendments that remain in disagreement. The result is complicated and potentially confusing procedural possibilities that, fortunately, do not often arise in current practice. The house that agreed to the conference first debates and votes on the partial conference report. After the report is approved, the reading clerk reads or designates the first amendment in disagreement, and the majority floor manager offers a motion to dispose of the amendment. When this process begins in the House, for example, the floor manager may move that the House insist on its disagreement to a Senate amendment. Agreeing to this motion implies that the House adamantly supports its original position and that the House wishes the Senate to recede from its amendment. Alternatively, the floor manager may move that the House either (1) recede from its disagreement to the Senate amendment and concur in that amendment, or (2) recede and concur with a House amendment. In the latter case, this House amendment (which must be germane to the Senate amendment) may be the position that the House managers had been advocating in conference, or it may be a new compromise position they have developed. By agreeing to this motion, the House supports the negotiating position of its conferees and asks the Senate to concur in this new House amendment. After the House disposes of the first amendment in disagreement, it acts in similar fashion on each of the other amendments that were not resolved in conference. The House then sends all the papers to the Senate with a message describing its actions. If the Senate agrees to the partial conference report and to the House position on all the amendments in disagreement on which Senate action is required, the legislative process is completed and the bill may be enrolled for presidential action. However, the Senate may agree to the partial conference report (which is rarely controversial), but not accept the House position on one or more of the amendments in disagreement. Instead, the Senate may vote to insist on its original position, support the negotiating position of its managers, or propose a new bargaining position to the House. If the House has insisted on its disagreement to a Senate amendment, the Senate may continue to insist on its amendment. If the House has receded from its disagreement to a Senate amendment and concurred in that amendment with a House amendment, the Senate may disagree to the House amendment or it may concur in the House amendment with a further Senate amendment (if such a Senate amendment would not be an amendment in the third degree). If one or more amendments remain in disagreement at the end of this process, either method of resolution may be pursued again. The amendments may be \"messaged\" back and forth between the houses until one chamber accepts the position of the other or until stalemate is reached. Alternatively, either house may request a further conference to consider the amendments that remain in disagreement. The same or new conferees may be appointed. Only the amendments in disagreement are submitted to the new conference. The managers may not re-open matters that were resolved in the partial conference report that both houses approved, because these matters are no longer in disagreement. But the partial conference report cannot become law until all the remaining disagreements have been resolved. If the second conference is successful, the managers submit a second report for action on the House and Senate floor. If not, the legislation, including the partial conference report, is probably dead for that Congress. Amendments in true disagreement rarely arise when conferees are presented with a second chamber substitute. In such a situation, there is only one amendment before the conference. The conferees either reach agreement or they do not; they may not report only part of the substitute as an amendment in disagreement. If the conferees report back in total disagreement, the House and Senate can then vote to insist on their original positions or propose new versions of the legislation. This hardly ever occurs; but when it does, the bill may die for lack of further action, or the two houses may agree to a new conference to consider the same issues once again. Instead, amendments in true disagreement generally have arisen when the second chamber has passed a bill with a series of separate amendments. Since this has happened most often to general appropriations bills that originate in the House (and on which the Senate requests conferences), the House usually has acted first on partial conference reports and amendments in disagreement. The possibility of amendments in disagreement can make it exceedingly difficult to anticipate what will happen to a measure that is sent to conference. It is not simply a question of whether or not the conferees will be able to resolve all the amendments in disagreement by reaching compromises that fall within the scope of the differences between the House and Senate versions. If a number of amendments are considered in conference, the managers may reach agreement on some, but not on others. And what then happens to the amendments reported in disagreement depends on the motions that are made and agreed to by the House and Senate. Furthermore, the recourse to amendments in disagreement creates new possibilities that were not available in conference. In conference, the managers' options are defined and limited by the scope of the differences between the House and Senate positions before them. However, when the House and Senate act on an amendment in disagreement, they are not subject to this restriction. The concept of \"the scope of the differences\" is a restriction on the authority of managers in conference; it is not a restriction on amendments between the houses. So, for example, the House may amend a Senate amendment in disagreement with a new House position (or technically, the House may recede from its disagreement to the Senate amendment and concur in the Senate amendment with a House amendment) that goes beyond the scope of either house's original position. Thus, it is possible, though not very likely in practice, that (1) the conferees could report an amendment in disagreement, (2) the first chamber to act could propose a new position in the form of an amendment to the amendment in disagreement, (3) the second chamber could respond with a further amendment that constitutes a new position of its own, and (4) conferees could be appointed for a second time to attempt to resolve the differences between these two new positions on the same subject. In this second conference, the same general policy question would be at issue, but the scope of the differences between the House and Senate versions (and consequently the options open to the conferees) would not be the same. To add to the uncertainties, several other complications can occur in the House as it acts on each amendment in disagreement. These options arise from the different order of precedence among certain motions in the House (but not in the Senate) that prevails before and after the House reaches the stage of disagreement, and the opportunities for crossing and re-crossing that threshold. These complications have arisen most often during action on amendments in disagreement to general appropriations bills. Before the House reaches the stage of disagreement, the order of precedence favors motions that tend to perfect the measure further; after the stage of disagreement, the order of precedence is reversed and favors motions that tend to promote agreement between the houses. Thus, if a motion to concur in a Senate amendment is made on the House floor before the stage of disagreement, a motion to concur with an amendment has precedence and may be offered and voted on while the motion to concur is pending. The motion to concur with an amendment has precedence because it tends to perfect the measure. If the House agrees to the motion to concur with an amendment, the straight motion to concur automatically falls without a vote, even though it had been offered first. After the House has reached the stage of disagreement, however, a motion that the House recede from its disagreement and concur in a Senate amendment has precedence over a motion to recede and concur with an amendment. The motion to recede and concur tends to promote agreement more directly than the motion to recede and concur with an amendment. If a preferential motion to recede and concur is made and carries, no vote occurs on the motion to recede and concur with an amendment, even if that motion had already been made. As if this were not complicated enough, the motion to recede and concur is divisible in the House, as is the motion to recede and concur with an amendment. Any Representative may demand that it be divided into two proposals: first, that the House recede from its disagreement to the Senate amendment; and second, that the House then concur in the Senate amendment (or concur in it with an amendment, depending on which motion has been made). Following a demand for the division of the motion, the House first considers whether it should recede from its disagreement. But if the House votes to recede, it crosses back over the threshold of disagreement; consequently, the precedence of motions reverses, and a motion to concur with an amendment takes precedence over a motion to concur. As a result, the possibilities that may arise on the House floor as the House considers each amendment in disagreement depend on (1) which motion is made by the floor manager, (2) what motions have precedence over that motion, and (3) whether an attempt is made to change the order of precedence by demanding a division of the first motion. Suppose that the clerk reads an amendment in disagreement and the floor manager moves that the House recede from its disagreement to that amendment and concur therein. Because the House and Senate reached the stage of disagreement before they appointed their conferees, a motion to recede and concur with a House amendment does not have precedence. However, if any Member demands a division of the motion to recede and concur, the House first debates and votes on whether to recede. Normally, the House does vote to recede, because rejecting this motion would imply that the House is unwilling to consider either the Senate amendment or any compromise version. But when the House recedes from its disagreement, it crosses back over the threshold of disagreement, and the order of precedence among motions is reversed. When the House then considers the second half of the divided motion—to concur in the Senate amendment—another Member may move instead that the House concur in the Senate amendment with an amendment, because the motion to concur with an amendment now has precedence over the motion to concur. Only if the House rejects the motion to concur with an amendment would it then vote on the original proposal to concur in the Senate amendment. Suppose instead that, after an amendment in disagreement has been read, the floor manager moves that the House recede and concur with an amendment. The stage of disagreement having been reached, a simple motion to recede and concur has precedence and may be offered. But if this motion is divided, the House votes first on whether to recede. And if the House does recede, the threshold of disagreement is again re-crossed and the motion to concur with an amendment has precedence over the second half of the divided motion—that the House concur. Thus, the amendment originally proposed in the motion to recede and concur with an amendment may be offered again as a motion to concur with an amendment—after a preferential motion to recede and concur has been offered, after that motion has been divided, and after the House has voted to recede. The array of possible complications on the Senate floor is more limited. First, the order of precedence of motions in the Senate is not reversed after the stage of disagreement has been reached. Second, Senators may not demand the division of a motion to recede and concur or of a motion to recede and concur with an amendment. Even in the House, Representatives seldom use the opportunities available to them. Amendments in true disagreement rarely arise, and when they do, the House usually accepts the floor manager's motions to dispose of them. The sheer complexity of some of the parliamentary maneuvers described above probably discourages Members from attempting them for fear that they are more likely to create confusion than achieve some strategic advantage. Nonetheless, the possibility of amendments in true disagreement and the various options for dealing with each of them on the floor make it dangerous to predict with confidence exactly what will happen to a measure once it has been submitted to conference. As discussed in earlier sections of this report, there are important restrictions on the content of conference reports. Conferees may deal only with the matters that are in disagreement between the House and Senate, and they must resolve each of these matters by reaching an agreement that is within the scope of the differences between the House and Senate positions. If a conference report violates these restrictions in any one respect, the entire report is subject to a point of order. Yet conferees sometimes find it desirable or necessary to exceed their authority. For example, changing circumstances may make it imperative for Congress to appropriate more money for some program than either the House or the Senate initially approved. Or the conferees may decide that a bill should include provisions on a subject that was not included in the version passed by either house. In such cases, the conferees may be able to achieve their purpose, without subjecting their report to a point of order, by using the device of amendments in disagreement. In doing so, they take advantage of the fact that the restrictions that apply to provisions of conference reports do not govern amendments between the houses. If the conferees wish to exceed their authority in resolving one of the amendments in disagreement, they can exclude this amendment from the conference report and present to the House and Senate a partial conference report and an amendment in disagreement. This is called an amendment in technical disagreement. There is no substantive disagreement between the House and Senate conferees; they report the amendment in disagreement only for technical reasons—to avoid the restrictions that apply to conference reports. The first house considers the partial conference report and then the amendment in technical disagreement. When that amendment is presented (in the House, for example) the floor manager moves that the House recede from its disagreement to the Senate amendment and concur therein with an amendment that is the decision made in conference. Because this conference recommendation is considered outside of the conference report—as part of a motion to dispose of an amendment in technical disagreement—no point of order lies against the motion or the proposed amendment on the grounds that the amendment exceeds the scope of the differences or proposes a subject not committed to conference by either house. However, the proposed amendment still must be germane in the House. If the first house votes for the motion, the second chamber acts on the partial conference report and then on the first house's amendment to the amendment in technical disagreement. When the amendment is presented, the floor manager moves that the Senate concur in the House amendment (assuming that the House acted first). If the Senate agrees to this motion, the process of resolution is completed. Until the mid-1990s, conferees used this device regularly, although for a somewhat different purpose, to complete congressional action on general appropriations bills. The rules of the House generally prohibit such bills from carrying unauthorized appropriations and changes in existing law (\"legislation\"). The procedures of the Senate, however, are not as strict. Under a number of conditions, the Senate may consider floor amendments to general appropriations bills that would not have been in order in the House. If approved by the Senate, these amendments are sent to conference and constitute amendments in disagreement with the House. They are properly before the conference, and the conferees may accept them without violating the restrictions on their authority that have been mentioned so far. This situation could create a significant problem for the House. On a general appropriations bill, conferees could present the House with a conference report that is not amendable but that includes matter that could not even have been considered, much less approved, by the House when it first acted on the bill on the floor. The remedy for the House can lie in the use of amendments in technical disagreement. Clause 5 of House Rule XXII states that House conferees may not agree to a Senate amendment to a general appropriations bill if the amendment would violate the prohibitions in the House's rules against unauthorized appropriations and legislation on such bills (in clause 2 of Rule XXI), \"unless specific authority to agree to the amendment first is given by the House by a separate vote with respect thereto.\" Otherwise, the same clause provides, the Senate amendment in question \"shall be reported in disagreement by the conference committee back to the two Houses for disposition by separate motion.\" The same two options are available to conferees in the case of a Senate amendment proposing to appropriate funds in any bill that is not a general appropriations bill. In practice, House conferees never seek separate House floor votes in advance. Instead, the conferees report any amendments to which Rule XXII, clause 5(a), applies as amendments in technical disagreement. After the House agrees to the partial conference report, it considers these amendments. As each of the Senate amendments is presented to the House, the majority floor manager offers a motion that the House recede from its disagreement and either concur in the Senate amendment or concur in it with a House amendment. In either case, the floor manager's motion incorporates the agreement reached in conference. After the House agrees to these motions, the Senate approves the partial report and then agrees to corresponding motions to dispose of the amendments that require Senate action. Whereas the House has dealt with most or all of the amendments separately, the Senate usually has disposed of most or all of them en bloc by unanimous consent. (The House may dispose of a number of such amendments en bloc , also by unanimous consent, when they are noncontroversial and when the floor manager proposes that the House recede and concur in each of them.) By this means, the House could respond, on a case-by-case basis, to Senate amendments to general appropriations bills that would not have been in order in the House. This procedure enabled the House to protect itself against having simply to vote for or against a conference report containing such Senate amendments (or modifications of them) and, therefore, having to choose between rejecting the report (and jeopardizing the bill) or violating the principles of its own rules. By voting on the motions made by the House floor manager, the House could decide in each instance whether to accept the judgment of its conferees that wisdom or necessity dictated an exception to a strict separation of appropriations from both authorizations and changes in existing law. Moreover, the House and Senate have the same options for dealing with amendments in technical disagreement that are available for disposing of amendments in true disagreement. Thus, amendments in technical disagreement was a useful device to deal with the differences between House and Senate rules governing matters that may be included in general appropriations bills. This device was convenient for appropriations conferees because the Senate typically passed House appropriations bills with many separate, numbered amendments. Consequently, the conferees could report as many of these amendments as necessary as amendments in technical disagreement. In the last several Congresses, however, there have been far fewer amendments in technical disagreement accompanying appropriations conference reports. In many instances, the Senate has passed House appropriations bills with amendments in the nature of substitutes, and it is not possible to report back from conference with part of such an amendment in disagreement. Also, the House Rules Committee has reported, and the House has adopted, special rules waiving points of order against many of the appropriations conference reports. Anticipating that their reports would receive this protection, appropriations conferees could include all their agreements within their reports, without regard for considerations of scope or the matters in disagreement and without fear that they would make their reports vulnerable to points of order on the House floor. The contrast between House and Senate rules and procedures governing general appropriations bills poses one problem for bicameral relations that arises during the process of resolving legislative differences. A past remedy was the use of amendments in technical disagreement. Another and similar problem results from the contrast between House and Senate rules concerning the germaneness of amendments—a problem for which the House has devised a somewhat different remedy. House rules require amendments to be germane (unless this requirement is waived by a special rule). By contrast, Senate rules require that amendments be germane only when offered to general appropriations measures or budget measures (both budget resolutions and reconciliation bills) or when offered after the Senate has invoked cloture. In addition, the Senate sometimes imposes a germaneness requirement on itself as part of unanimous consent agreements governing consideration of individual measures, although such agreements may include exceptions that make specific nongermane amendments in order. Consider the potential consequences of this difference for the House. The Senate may pass a House bill with one or more nongermane amendments. Each of these amendments is \"conferenceable\" (an unofficial term that is used from time to time by participants in the legislative process) as an amendment in disagreement between the House and Senate. The conferees may include it (or a modification of it) in their conference report without violating their authority. However, this situation could force the House into an up-or-down vote on a conference report including nongermane matters that were not debated on the House floor, that would have been subject to points of order if offered as House floor amendments, and that might not even have been considered by the appropriate House committees. The remedy for the House appears in clause 10 of House Rule XXII. This clause creates an opportunity for the House to identify nongermane matter originating in the Senate and to consider it separately. Of course, the House can and usually does adopt a special rule reported from the Rules Committee that waives the point of order this clause creates. Clause 10 states that when the House begins consideration of a conference report or a motion to dispose of a Senate amendment to which the House has disagreed, a Member may make a point of order (before debate begins) against matter contained in the report or the motion on the grounds that the matter in question would not have been germane if it had been offered as a House floor amendment to the measure (in the form the measure passed the House). If the Speaker sustains the point of order (thereby establishing that the matter in question is nongermane), the Member may then move that the House reject the nongermane matter. This motion is debatable for 40 minutes, to be equally divided between and controlled by proponents and opponents. After the House votes on the motion, another such point of order may be made against different nongermane matter; and if it is sustained, another motion to reject is in order. If the House defeats any and all motions to reject, the House thereby decides to retain the nongermane matter. The House may vote not to reject nongermane language for at least two reasons: (1) a majority of Representatives may support the nongermane matter on its merits, or (2) the House may conclude that the Senate is so insistent on its nongermane language that rejecting it could seriously jeopardize enactment of the entire bill. If the House does vote to reject any nongermane matter in a conference report, the report is considered as having been rejected. This is consistent with the principle that conference reports are not amendable. Clause 10(d)(2) states that, in most cases, the House then proceeds automatically to decide \"whether the House shall recede and concur in the Senate amendment with an amendment consisting of so much of the conference report as was not rejected.\" In other words, the House votes to amend the Senate amendment with a House amendment that consists of the remainder of the conference agreement without the nongermane matter. If the Senate accepts this new House amendment, resolution is reached. If not, the Senate may disagree to the House amendment and request a new conference with the House. In this way, the House can isolate nongermane Senate matter for separate consideration, but neither chamber can impose its will on the other. Clause 10(d)(3) makes in order three possible motions, in an established order of precedence, that Members may make if the House votes to reject nongermane matter contained not in a conference report but in a motion that the House recede and concur in a Senate amendment, with or without amendment. In brief, these motions allow the House to amend the Senate amendment or to again disagree to it, perhaps also requesting a new conference with the Senate to resolve this disagreement.", "summary": "The Constitution requires that the House and Senate approve the same bill or joint resolution in precisely the same form before it is presented to the President for his signature or veto. To this end, both houses must pass the same measure and then attempt to reach agreement about its provisions. The House and Senate may be able to reach agreement by an exchange of amendments between the houses. Each house has one opportunity to amend the amendments from the other house, so there can be Senate amendments to House amendments to Senate amendments to a House bill. House amendments to Senate bills or amendments are privileged for consideration on the Senate floor; Senate amendments to House bills or amendments generally are not privileged for consideration on the House floor. In practice, the House often disposes of amendments between the houses under the terms of a special rule reported by the Rules Committee. The Senate sometimes disposes of House amendments by unanimous consent, but the procedures associated with the exchange of amendments can become complicated. Alternatively, the House and Senate can each disagree to the position of the other on a bill and then agree to create a conference committee to propose a package settlement of all their disagreements. Most conferees are drawn from the standing committees that had considered the bill initially. The House or Senate may vote to instruct its conferees before they are appointed, but such instructions are not binding. Conferees generally are free to negotiate in whatever ways they choose, but eventually their agreement must be approved by a majority of the House conferees and a majority of the Senate conferees. The conferees are expected to address only the matters on which the House and Senate have disagreed. They also are expected to resolve each disagreement within the scope of the differences between the House and Senate positions. If the conferees cannot reach agreement on an amendment, or if their agreement exceeds their authority, they may report that amendment as an amendment in true or technical disagreement. On the House and Senate floors, conference reports are privileged and debatable, but they are not amendable. The Senate has a procedure to strike out portions of the conference agreement that are considered, under Senate rules, to be \"out of scope material\" or \"new directed spending provisions.\" The House also has a special procedure for voting to reject conference report provisions that would not have been germane to the bill in the House. After agreeing to a conference report, the House or Senate can dispose of any remaining amendments in disagreement. Only when the House and Senate have reached agreement on all provisions of the bill can it be enrolled for presentation to the President.", "document_type": "crs"}
{"report": "This report provides an overview of the judiciary's FY2020 budget request, as well as information about Congress's consideration of the judiciary's request. The first section of this report includes subsections covering each major action involving the judiciary's FY2020 budget request, including the initial submission by the President of the judiciary's request on March 11, 2019; a hearing held on March 7, 2019, by the House Financial Services and General Government Appropriations Subcommittee on the budget request for the U.S. Supreme Court; the House subcommittee markup on June 3, 2019; the House Appropriations Committee markup on June 11, 2019; passage by the House on June 26, 2019; the Senate subcommittee markup on September 17, 2019; the Senate Appropriations Committee markup on September 19, 2019; enactment of a continuing resolution on September 27, 2019 ( P.L. 116-59 ); enactment of a second continuing resolution on November 21, 2019 ( P.L. 116-69 ); and enactment of FY2020 appropriations for the judiciary in the FY2020 Consolidated Appropriations Act ( P.L. 116-93 , December 20, 2019). The second section of the report provides information about the specific discretionary appropriations requested by the judiciary for FY2020, as well as information about the mandatory appropriations and administrative provisions included in the appropriations process. The third section provides information about the various courts, judicial entities, and judicial services that are covered by appropriations for the judiciary. The report also identifies some of the courts and judicial services that are not covered by such appropriations (but are covered by other appropriations bills). Finally, the report provides information about ongoing policy issues affecting the judiciary that may be of interest to Congress during FY2020. This section provides an overview of the major actions involving congressional consideration of FY2020 judiciary appropriations. The final status of FY2020 judiciary appropriations is summarized in Table 1 . The President's proposed FY2020 budget request was submitted on March 11, 2019. It contained a request for $8.29 billion in new budget authority for judicial branch activities, including $7.62 billion in discretionary funds and $669.8 million in mandatory funding for judges' salaries and judicial retirement accounts. By law, the judicial branch appropriations request is submitted to the President and included in the budget submission without change. Appropriations for the judiciary comprise approximately 0.2% of total budget authority. The Financial Services and General Government Appropriations Subcommittee held hearings on the FY2020 budget request of $106.8 million for the U.S. Supreme Court. This request was included in the judiciary's overall FY2020 budget request of $8.29 billion and represents approximately 1.3% of that total. Associate Justices Samuel A. Alito and Elena Kagan testified before the subcommittee regarding the Supreme Court's budgetary request. It was the first public hearing since 2015 regarding the Supreme Court's budget. According to Representative Mike Quigley (IL), chairman of the subcommittee, it is his \"intent to hold a hearing with the Supreme Court at least once a year to discuss the resources needed for the highest court\" and to hear the Justices' \"thoughts regarding America's court system.\" He also expressed his view that \"hearings such as this one is a great way for the public to get more exposure to our third branch.\" One issue raised during the subcommittee's hearings was the use of cameras or video recordings in Supreme Court proceedings. In his opening remarks, Chairman Quigley stated that \"one government institution remains closed to the public eyeâthe U.S. Supreme Court\" and \"due to antiquated practices and policies, we have no video record\" of the Court's most important decisions. He further stated that \"it is not unreasonable for the American people to have an opportunity to hear firsthand the arguments and opinions that will shape their society for years to come.\" Justice Alito, in response, stated that while the Court wants as much access for the public as possible, it does not \"want access at the expense of damaging the decision-making process.\" Similarly, Justice Kagan stated that cameras might adversely affect the way the Court functioned. She emphasized that the kind of questioning a Justice uses in the courtroom might be taken out of context in a video broadcast. For example, video of Court proceedings shown by a news program might cause viewers to perceive that a Justice has a particular view or opinion on an issue when, instead, the Justice is playing devil's advocate and posing challenging questions to one or both sides in a case. Other issues discussed or mentioned at the subcommittee hearing include cost-cutting measures the Court has undertaken by revising existing contracts and cutting back on discretionary spending in order to meet the cost-of-living adjustment for federal employees; the priority the Court has placed on enhancing its physical and cybersecurity with previous funds appropriated by Congress; the implementation of a new electronic case filing system; and a revamp of the Court's website to make it more user-friendly and highlight important information (e.g., the current term calendar). Justice Alito also noted in his testimony that the Court was not requesting any new programmatic increases in funds. On June 3, 2019, the House subcommittee held a markup of the FY2020 Financial Services and General Government (FSGG) bill. The subcommittee, by voice vote, recommended a total of $7.51 billion in discretionary funds for the judiciary. On June 11, 2019, the House Appropriations Committee held a markup of the FY2020 FSGG bill. The committee recommended $7.51 billion in discretionary funds for the judiciary. The $7.51 billion in discretionary funding recommended for the judiciary represents approximately 31% of the total $24.55 billion in discretionary funding included in the entire FSGG appropriations bill (which also funds such entities as the Department of the Treasury, the Executive Office of the President, the Consumer Product Safety Commission, the Federal Trade Commission, the Securities and Exchange Commission, and the Small Business Administration). The FY2020 FSGG bill was ordered reported by a roll call vote of 30-21 ( H.R. 3351 , H.Rept. 116-122 ). No amendments were offered during the committee markup that were related to the judiciary. The House report that accompanied the committee's markup addressed the issue of video access to Supreme Court proceedings, which had been discussed at the subcommittee's hearings on the Supreme Court's FY2020 budget request. The committee stated that \"providing the American people with the opportunity to access Supreme Court arguments in real time via video and/or live audio would greatly expand the Court's accessibility to average Americans and provide historical and educational value.\" Consequently, the committee encouraged the Court \"to take steps to permit video and live audio coverage in all open sessions of the court unless the Court decides that allowing such coverage in any case would violate the due process of one or more of the parties before the Court.\" The FSGG appropriations bill was passed by a roll call vote of 224-196 in the House on June 26, 2019. No amendments were offered during House consideration that were related to the judiciary. On September 17, 2019, the Senate subcommittee held a markup of the FY2020 Financial Services and General Government (FSGG) bill and approved it by voice vote. The subcommittee recommended a total of $7.42 billion in discretionary funds for the judiciary. On September 19, 2019, the Senate Appropriations Committee held a markup of the FY2020 FSGG bill. The committee recommended $7.42 billion in discretionary funds for the judiciary. The $7.42 billion in discretionary funding recommended for the judiciary represents approximately 31% of the total discretionary funding included in the entire FSGG appropriations bill (which also funds such entities as the Department of the Treasury, the Executive Office of the President, the Consumer Product Safety Commission, the Federal Trade Commission, the Securities and Exchange Commission, and the Small Business Administration). The FY2020 FSGG bill was ordered reported by a roll call vote of 31-0 ( S. 2524 , S.Rept. 116-111 ). No amendments were offered during the committee markup that were related to the judiciary. The Senate report that accompanied the committee's markup emphasized that it \"is imperative that the Federal judiciary devote its resources primarily to the retention of staff.\" Additionally, the report stated that \"it is also important that the judiciary contain controllable costs such as travel, construction, and other expenses.\" The Senate report did not address the issue of video access to Supreme Court proceedings, which had been discussed at the House subcommittee's hearing on the Supreme Court's FY2020 budget request. Final enactment of the judiciary's budget did not occur prior to the beginning of FY2020. Consequently, the judiciary was funded through November 21, 2019, by the Continuing Appropriations Act, 2020. The act passed the House on September 19, 2019, and the Senate on September 26, 2019. It was signed by the President on September 27, 2019. Final enactment of the judiciary's budget did not occur prior to November 22, 2019. Consequently, the judiciary was funded from November 22, 2019, through December 20, 2019, by the Further Continuing Appropriations Act, 2020. The act passed the House on November 19, 2019, and the Senate on November 21, 2019. It was signed by the President on November 21, 2019. Enactment of the judiciary's budget for FY2020 was included in the FY2020 Consolidated Appropriations Act. The total amount in discretionary funds appropriated for the judiciary was $7.49 billion, and the amount in mandatory funds provided for the judiciary was $705.48 million. The act passed the House on December 17, 2019, and the Senate on December 19, 2019. It was signed by the President on December 20, 2019. On March 27, 2020, the House passedâand the President signedâthe Coronavirus Aid, Relief, and Economic Security Act (CARES Act) to address the nationwide impact of Coronavirus Disease 2019 (COVID-19). The act, in part, provides funding for the federal judiciary to respond to the pandemic. Specifically, the CARES Act makes appropriations to the federal judiciary \"to prevent, prepare for, and respond to coronavirus, domestically or internationally.\" By law, Congress designated such appropriations to be for an emergency requirement. The three judiciary accounts that received funds under the act include the Supreme Court of the United StatesâSalaries and Expenses account ($500,000); the Courts of Appeals, District Courts, And Other Judicial ServicesâSalaries and Expenses account ($6 million); and the Defender Services account ($1 million). The judiciary's FY2020 discretionary budget request totaled $7.62 billion and represented a 5.1% increase from the $7.25 billion in discretionary appropriations enacted by Congress for FY2019. Table 2 lists, for each account included in the judiciary's discretionary budget, (1) the amount enacted by Congress for FY2019, (2) the judiciary's FY2020 request, (3) the FY2020 amount that passed the House, (4) the FY2020 amount that was reported by the Senate Appropriations Committee, and (5) the FY2020 enacted amount. Of the judiciary's FY2020 total discretionary request for $7.62 billion (see the second column in Table 2 ), the greatest percentage was for the Salaries and ExpensesâCourts of Appeals, District Courts, and Other Judicial Services accountârepresenting 70.6% of the request. The second-greatest percentage was for the Defender Services account, representing 16.2% of the total discretionary request. The third-greatest percentage was for the Court Security account, representing 8.4% of the request. The remaining 4.8% of the FY2020 discretionary request was for the other accounts listed in the table. Similarly, of the $7.49 billion that was enacted by Congress for the judiciary's FY2020 budget, the greatest percentage was for the Salaries and ExpensesâCourts of Appeals, District Courts, and Other Judicial Services account (see the final column in Table 2 )ârepresenting 70.1% of the enacted amount. The second-greatest percentage was for the Defender Services account, representing 16.5% of the total enacted amount. The third-greatest percentage was for the Court Security account, representing 8.5% of the enacted amount. The remaining 4.8% of the FY2020 enacted amount was for the other accounts listed in the table. Of the accounts listed in Table 2 , the largest percentage increase between the amount enacted in FY2019 and the amount requested by the judiciary for FY2020 was for the Defender Services accountâa 7.3% increase from the FY2019 amount enacted to the FY2020 request. The second-greatest increase was for the Vaccine Injury Trust Fund account, a 6.3% increase. The third-greatest increase was for the Court Security account, a 5.6% increase. Of the same accounts listed in the table, the largest percentage increase between the amount enacted in FY2019 and the amount enacted by Congress for FY2020 was for the Fees of Jurors and Commissioners accountâa 7.6% increase from the FY2019 enacted amount. The second-greatest increase was for the Defender Services account, a 7.3% increase. The third-greatest increase was for the Vaccine Injury Trust Fund account, a 7.1% increase. Overall, Congress enacted $7.49 billion, or 98.2%, of the judiciary's FY2020 budget request of $7.62 billion. Additionally, the enacted FY2020 amount for each account was, in each case, at least 95% of the judiciary's FY2020 request for that account. For example, for the Supreme CourtâBuilding and Grounds account, Congress provided $15.6 millionârepresenting 95.1% of the judiciary's FY2020 request of $16.4 million. Altogether, for seven accounts, Congress appropriated less than the amount requested by the judiciary in its FY2020 budget submission. For two accounts, Congress passed the same amount as was requested by the judiciary. And for three accounts, Congress appropriated more than the amount requested by the judiciary in its FY2020 budget submission. The federal courts, judicial entities, and judicial programs funded by the various accounts listed in Table 2 are discussed below in greater detail in the section of the report titled Courts, Programs, and Other Items Funded by the Judiciary Budget . FY2019 judiciary funding was provided in Division D, Title III, of the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), which was enacted on February 15, 2019. The act provided $7.25 billion in discretionary funds for the judiciary. FY2018 judiciary funding was provided in Division E, Title III, of the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), which was enacted on March 23, 2018. The act provided $7.11 billion in discretionary funds for the judiciary. FY2017 judiciary funding was provided in Division E, Title III, of the Consolidated Appropriations Act, 2017 ( P.L. 115-31 ), which was enacted on May 5, 2017. The act provided $6.93 billion in discretionary funds for the judiciary. The judiciary also uses nonappropriated funds to help offset its funding requirements. The majority of these nonappropriated funds are from the collection of fees, primarily court filing fees and fees associated with obtaining case and docket information online from various federal courts. These monies are used to offset expenses that would otherwise be covered by the discretionary Salaries and Expenses subaccount for the courts of appeals, district courts, and other judicial services. The numbers presented in this report reflect the net resources for the judiciary, and do not include these offsetting nonappropriated funds. Mandatory appropriations are used to meet the constitutional and statutory obligations associated with the salaries and expenses of certain types of judgeships (and, consequently, are not considered discretionary appropriations for the judiciary). Such mandatory appropriations fall into two categories: (1) funds used to pay the salaries of Article III judges (Supreme Court Justices, U.S. courts of appeals judges, etc.) and certain other types of federal judges (e.g., bankruptcy judges); and (2) funds used for several judicial retirement accountsâspecifically, the Judicial Officers' Retirement Fund (28 U.S.C. Â§377(o)); the Judicial Survivors' Annuities Fund (28 U.S.C. Â§376(c)); and the U.S. Court of Federal Claims Judges' Retirement Fund (28 U.S.C. Â§178(1)). The mandatory appropriations enacted for FY2020 totaled $705.5 million. Of the FY2020 mandatory amount, $465.4 million, or 66.0%, is for salaries and expenses associated with judgeships that the judiciary is constitutionally (or statutorily) required to pay. The remaining $240.1 million (or 34.0% of FY2020 mandatory appropriations) was to provide for judicial retirement funds. There was a similar breakdown in the use of mandatory funds for FY2019. Of the $637.0 million in mandatory appropriations provided for FY2019, $425.3 million (or 66.8%) was to fund the salaries and expenses associated with Article III judges and certain other types of federal judges. The remaining $211.7 million (or 33.2% of FY2019 mandatory appropriations) was to provide for judicial retirement funds. The judiciary's FY2020 request also contained administrative provisions related to (1) the authorization of salaries and expenses for the judiciary's use of experts and consultant services; (2) allowing the transfer between judiciary accounts of up to 5% of any appropriation, with some accounts prohibited from increasing by more than 10% as a result of any such transfer of appropriations; (3) a limitation of $11,000 for official reception and representation expenses incurred by the Judicial Conference of the United States; (4) language enabling the judiciary to contract, under certain circumstances, for repairs costing less than $100,000; (5) the continuation of a court security pilot program; and (6) a one-year extension of various temporary judgeships. The bill passed by the House included each of these six provisions. The bill, however, specified that no judiciary account, \"except in certain circumstances,\" may increase by more than 10% as a result of the transfer of appropriations between judiciary accounts. The Senate committee-reported bill included each of these six provisions. The bill, however, limited (similar to the House bill) \"to 10 percent the amount that may be transferred into any one appropriation.\" The final enacted FY2020 appropriations for the judiciary included each of the six administrative provisions. In terms of the second provision identified above, the enacted bill allows the transfer between judiciary accounts of up to 5% of any appropriation, with some accounts prohibited from increasing by more than 10% as a result of any such transfers. Any transfer that occurs must also be treated as a reprogramming of funds under the act and meet certain other requirements. The U.S. Supreme Court is the final arbiter in the federal court system. Congress has authorized nine judgeships for the Court. Among the nine Justices on the Court, one is also appointed as Chief Justice of the United States. Justices are appointed by the President with the advice and consent of the Senate. U.S. courts of appeals, or circuit courts, take appeals from U.S. district court decisions and are also empowered to review the decisions of many administrative agencies. When hearing a challenge to a district court decision from a court located within its geographic circuit, the task of a court of appeals is to determine whether or not the law was applied correctly by the district court. Cases presented to U.S. circuit courts are generally considered by judges sitting in three-member panels (circuit courts do not use juries). The nation is divided into 12 geographic circuits, each with a U.S. court of appeals. There is also one nationwide circuit, the U.S. Court of Appeals for the Federal Circuit (discussed in the text below). Altogether, 167 judgeships for these 12 regional circuit courts are currently authorized by law. The First Circuit (comprising Maine, Massachusetts, New Hampshire, Rhode Island, and Puerto Rico) has the fewest number of authorized judgeships, 6, while the Ninth Circuit (comprising Alaska, Arizona, California, Hawaii, Idaho, Montana, Nevada, Oregon, and Washington) has the most, 29. U.S. circuit court judges are appointed by the President with the advice and consent of the Senate. Such appointments are considered to be effective for life (under Article III of the U.S. Constitution), meaning judges remain in office until they die, assume senior status, resign, retire, or are removed by Congress through the process of impeachment. This court has nationwide jurisdiction over certain types of cases, including international trade, government contracts, patents, trademarks, certain money claims against the United States government, federal personnel, veterans' benefits, and public safety officers' benefits claims. The court also reviews certain administrative agency decisions. In FY2018, the court's jurisdiction consisted of \"administrative law cases (20%), intellectual property cases (67%), and cases involving money damages against the United States government (13%).\" There are 12 judgeships authorized for the U.S. Court of Appeals for the Federal Circuit. Judges serving on the Federal Circuit are appointed by the President with the advice and consent of the Senate. Such appointments are considered to be effective for life (under Article III of the U.S. Constitution), meaning judges remain in office until they die, assume senior status, resign, retire, or are removed by Congress through the process of impeachment. This court has nationwide jurisdiction over civil actions related to the customs and international trade laws of the United States. Most of the cases heard by the court \"involve antidumping and countervailing duties, the classification and valuation of imported merchandise, actions to recover unpaid customs duties and civil penalties, and various actions arising generally under the tariff laws.\" In 2018, the court reported a total of 242 case filings. There are nine judgeships authorized for the U.S. Court of International Trade. Judges serving on the Court of International Trade are appointed by the President with the advice and consent of the Senate. Such appointments are considered to be effective for life (under Article III of the U.S. Constitution), meaning judges remain in office until they die, assume senior status, resign, retire, or are removed by Congress through the process of impeachment. District courts are the federal trial courts of general jurisdiction. These trial courts determine facts and apply legal principles to resolve disputes. Trials are conducted by a district court judge or, in some cases, a magistrate judge. Each state has at least one district court (there is also one district court in each of the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, and the Commonwealth of the Northern Mariana Islands). States with more than one district court are divided into judicial districts, with each district having one district court. For example, California is divided into four judicial districtsâeach with its own district court. Altogether there are 94 district courts. At present, there are 677 district court judgeships authorized by law. Congress has authorized between 1 and 28 judgeships for each district court, with district courts serving more populous areas generally having more authorized judgeships. Among judicial districts with Article III judgeships, the Eastern District of Oklahoma (Muskogee) has the fewest number (with 1 authorized judgeship), while the district courts located in the Southern District of New York (Manhattan) and the Central District of California (Los Angeles) have the greatest number (each with 28 authorized judgeships). U.S. district court judges are appointed by the President with the advice and consent of the Senate. Such appointments are considered to be effective for life (under Article III of the U.S. Constitution), meaning judges remain in office until they die, assume senior status, resign, retire, or are removed by Congress through the process of impeachment. Territorial district court judges, serving the U.S. Virgin Islands, Guam, and the Commonwealth of the Northern Mariana Islands, are also appointed by the President with the advice and consent of the Senate (under Article IV of the U.S. Constitution). These appointments, however, are not effective for life but are for a fixed 10-year term in office. Certain types of trials and proceedings held by district courts can also be conducted by magistrate judges. A district court judge may refer certain matters to a magistrate judge (e.g., a magistrate judge may be assigned to hold a pretrial conference or an evidentiary hearing). A magistrate judge may also conduct any type of civil trial as long as the parties consent (i.e., there is consent jurisdiction ), and they may also preside over all misdemeanor criminal trials as long as a defendant has waived his right to a trial before a district judge. Magistrate judges cannot preside over felony criminal cases (but can handle pretrial matters and preliminary proceedings in such cases). As of September 2018, the Judicial Conference has authorized 547 full-time magistrate judge positions, 29 part-time positions, and 3 combination clerk/magistrate judge positions. Magistrate judges are non-Article III judges appointed by district court judges. Full-time magistrate judges serve a term of eight years and may be reappointed. In 2018, magistrate judges disposed of a total of 1,219,163 mattersâthis included 348,421 civil matters that had been referred to them by district court judges; 17,112 civil cases in which they were the presiding judges for all proceedings by consent of the parties; 213,964 felony pretrial matters (e.g., disposing of certain types of motions); and 426,865 felony preliminary proceedings (e.g., search warrant applications). Other matters disposed of by magistrate judges included Class A misdemeanor cases, petty offense cases, and cases brought by prisoners (involving, for example, habeas corpus petitions and civil rights claims). The number of magistrate judge positions is determined by the Judicial Conference of the United States. A magistrate judge is appointed by majority vote of the active district court judges serving on the court to which the magistrate judge would serve. A full-time magistrate judge serves a term of eight years and may be reappointed. Federal courts have exclusive jurisdiction over bankruptcy matters (i.e., a bankruptcy case cannot be filed in state court). Bankruptcy courts are units of the federal district courts and exercise jurisdiction over bankruptcy matters as granted by statute and referred to them by their respective district courts. In 2018, debtors filed a total of 773,375 bankruptcy petitionsâa 2% decline from 2017. Of all petitions filed in 2018, nonbusiness (mostly consumer) petitions accounted for approximately 97% and business petitions accounted for 3%. As of September 2018, there were a total of 350 bankruptcy judgeships authorized by Congress (i.e., the number of bankruptcy judges is determined by Congress). Bankruptcy judges are non-Article III judges appointed by the court of appeals for the circuit where the bankruptcy court is located. Judges are appointed for a term of 14 years and may be reappointed. This court had nationwide jurisdiction over various types of monetary claims against the federal government, including \"those involving tax refunds, federal taking of private property for public use, pay and dismissal of federal civilian employees, pay and dismissal of military personnel, land claims brought by Native Americans and/or their tribe(s), contract disputes, bid protests, patents and copyright, congressional reference, and the National Vaccine Injury Compensation Act.\" Each January, pursuant to 28 U.S.C. Â§791(c), the clerk of the Court of Federal Claims submits to Congress a statement of all the judgments rendered by the court. The statement \"notes the names of the claimants, the amounts, the dates of entry and nature of the claims, and the disposition for all judgments rendered the previous fiscal year.\" In 2018, filings increased in the court by 16% to 2,224. The increase was due, in part, to a 223% increase in cases involving taken property and a 30% increase in contract/injunction cases. The court consists of 16 non-Article III judges who are appointed for a term of 15 years by the President with the advice and consent of the Senate. Federal probation and pretrial services officers investigate and supervise defendants and offenders within the federal criminal justice system. A pretrial services officer \"supervises defendants awaiting trial who are released\" and provides reports \"upon which the court can determine the conditions of release or detention while criminal cases are pending adjudication.\" A probation officer \"provides the court with reliable information concerning the offender, the victim, and the offense committed, as well as an impartial application of the sentencing guidelines.\" Officers also \"supervise offenders sentenced to probation, as well as offenders coming out of federal prison who are required to serve a term of supervised release.\" In 2018, pretrial services officers prepared 95,442 pretrial services reports for judgesâan increase of 12% from 2017. Of these reports, 97% were prebail reports. Additionally, officers provided pretrial services supervision for approximately 23,600 defendantsâan increase of 2% from 2017. Such supervision included providing various support services (e.g., substance abuse treatment and location monitoring) and informing the courts and U.S. attorneys of any apparent violations of release conditions. In 2018, a total of 129,706 individuals were under postconviction supervision by probation officersâa decrease of 4% from 2017. Of those under postconviction supervision, 47% had been convicted of drug offenses; 18% had been convicted of property offenses; and 14% had been convicted of firearms offenses. Federal probation officers also prepared 67,039 presentence investigative reportsâan increase of 5% from 2017. The Sixth Amendment of the U.S. Constitution guarantees the right to representation by counsel in serious criminal proceedings. The federal judiciary has, historically, exercised \"responsibility for appointing counsel in federal criminal proceedings for those unable to bear the cost of representation.\" This account in the judiciary budget funds the operations of federal defender organizations responsible for providing representation to defendants financially unable to retain counsel in federal criminal proceedings. At present, there are 81 authorized federal defender organizations that employ more than 3,700 lawyers, investigators, paralegals, and support personnel. This account also provides funds to reimburse the services of private appointed counsel (i.e., panel attorneys ) in federal criminal proceedings. The rates paid to panel attorneys cover both attorney compensation and office overhead. There are case maximum amounts that limit the compensation paid to a panel attorney based on the type of case to which he or she is appointed. Consequently, the costs associated with this account are driven, in part, by the number and type of prosecutions brought by U.S. Attorneys offices. This account provides for protective guard services and security systems and equipment for United States courthouses and other facilities housing federal court operations. The majority of funding for court security is transferred to the U.S. Marshals Service (USMS), which is responsible for ensuring \"the safe and secure conduct of judicial proceedings\" and for providing \"protection for federal judges, other court officials, witnesses, jurors, the visiting public and prisoners.\" At present, the Marshals protect 711 judicial facilities and approximately 2,200 federal judges. The Marshals also have protective responsibility for approximately 26,000 federal prosecutors and court officials. In FY2018, the Marshals assessed or handled 4,542 threats and inappropriate communications against protected persons. As part of its mission to protect the federal judicial process, the U.S. Marshals Service administers the Judicial Facility Security Program (funded by the Court Security account). The program \"oversees the daily operation and management of security services performed by approximately 5,300 court security officers\" and \"installs and maintains security systems for the protection of federal courthouses and other judicial facilities.\" This account in the judiciary's budget funds the fees and allowances provided to petit and grand jurors and compensation for jury and land commissioners. Petit jurors serve on a trial jury, while grand jurors serve on a grand jury. Petit jurors are paid $50 per day but can, after serving 10 days on a jury, receive up to $60 per day. Grand jurors are also paid $50 per day but can, after serving 45 days on a grand jury, receive up to $60 per day. Petit and grand jurors are also reimbursed for reasonable transportation expenses and parking fees. Jurors can receive a subsistence allowance that covers their meals and lodging if they are sequestered during their service. A jury commissioner is appointed in some cases to work with the clerk of court to manage the random selection of petit and grand jurors. The compensation paid to a jury commissioner is $50 per day (plus the reimbursement of reasonable expenses related to his or her service). According to the U.S. Administrative Office of U.S. Courts, \"costs associated with this account can be unpredictable and are driven by the number of jury trials, the length of those trials, and statutory rates for reimbursement paid to jurors.\" The National Childhood Vaccine Injury Act of 1986 created a program to provide compensation to people found to be injured by certain vaccines. The program \"is designed to encourage vaccination by providing a streamlined system for compensation in rare instances where an injury results from vaccination\" and provides \"an alternative to traditional products liability and medical malpractice litigation for persons injured by their receipt or one or more of the standard childhood vaccines.\" The program, according to the Department of Justice, \"has succeeded in providing a less adversarial, less expensive, and less time-consuming system of recovery than the traditional tort system that governs medical malpractice, personal injury, and product liability cases.\" The Vaccine Injury Compensation Trust Fund provides funding for the compensation program, covering claims related to vaccine-related injuries or deaths for covered vaccines administered on or after October 1, 1988. An individual who believes he or she has been injured by a covered vaccine can seek compensation from the fund by filing a claim against the Secretary of the Department of Health and Human Services in the U.S. Court of Federal Claims. Since the program began in 1988, over 6,000 individuals have received more than $3.9 billion (combined) for such claims. The Department of the Treasury manages the fund's investments and produces a monthly Vaccine Injury Compensation Report . The Administrative Office of U.S. Courts (AO) \"is the agency within the judicial branch that provides a broad range of legislative, legal, financial, technology, management, administrative, and program support services to federal courts.\" A main responsibility of AO is to provide staff support and counsel for the Judicial Conference, the national policymaking body for the federal courts, and the Conference's committees. With input from the Judicial Conference, AO also develops the annual judiciary budget for submission by the President and approval by Congress. As the federal judiciary's research and education entity, the Federal Judicial Center (FJC) \"develops orientation and continuing education programs for judges and other court personnel. It also studies judiciary operations and recommends to the Judicial Conference how to improve the management and administration of the federal courts.\" The operations of the FJC are \"overseen by a board of directors whose members are the Chief Justice, the director of the Administrative Office, and seven judges chosen by the Judicial Conference.\" The United States Sentencing Commission is an independent agency that is located within the federal judiciary. It was created by Congress in 1984 \"to reduce sentencing disparities and promote transparency and proportionality in sentencing.\" As such, the commission establishes and amends sentencing guidelines for the federal criminal justice system, as well as \"monitors sentencing recommendations by probation officers and operates an information center on sentencing practices.\" The commission consists of seven voting members appointed by the President and confirmed by the Senate, with members serving staggered six-year terms. No more than four members of the commission can be members of the same political party, and at least three members must be federal judges. In order for a sentencing guideline to be amended, the amendment must receive the affirmative votes of four members of the commission. The commission has a staff of approximately 100 employees. The commission is also advised by \"four standing advisory groups representing the views of practitioners, probation officers, victims, and tribal lands.\" The purpose, in part, of the advisory group representing the views of tribal lands is to provide the commission \"its views on federal sentencing issues related to American Indian defendants and victims and to offenses committed in Indian Country.\" Three specialized courts within the federal court system are not funded under the judiciary budget: the U.S. Court of Appeals for the Armed Forces (funded in the Department of Defense appropriations bill), the U.S. Court of Appeals for Veterans Claims (funded in the Military Construction, Veterans Affairs, and Related Agencies appropriations bill), and the U.S. Tax Court (funded under Independent Agencies, Title V of the FSGG bill). Additionally, federal courthouse construction is funded within the General Services Administration account under Independent Agencies, Title V of the FSGG bill. Congress determines through legislative action both the size and structure of the federal judiciary. Consequently, the creation of any new permanent or temporary U.S. circuit and district court judgeships must be authorized by Congress. The Judicial Conference of the United States, the policymaking body of the federal courts, makes biennial recommendations to Congress that identify any circuit and district courts that, according to the Conference, require new permanent judgeships to appropriately administer civil and criminal justice in the federal court system. In evaluating whether a court might need additional judgeships, the Judicial Conference examines whether certain caseload levels have been met, as well as court-specific information that might uniquely affect a particular court. The Judicial Conference's most recent recommendation, released in March 2019, calls for the creation of five permanent judgeships for the U.S. Court of Appeals for the Ninth Circuit (composed of California, eight other western states, and two U.S. territories). The Conference also recommends creating 65 permanent U.S. district court judgeships, as well as converting 8 temporary district court judgeships to permanent status. According to the Judicial Conference, since the enactment of the most recent omnibus judgeship bill in 1990 ( P.L. 101-650 ), the number of U.S. circuit court judgeships has remained at 179 while appellate court case filings increased by 15% through the end of FY2018. During this same time period, Congress enacted legislation that increased the number of permanent and temporary district judgeships by 4% (from 645 to 673) while district court case filings increased by 39%. In terms of specific types of cases, civil cases increased by 34% during the same period, and cases involving criminal felony defendants increased by 60%. The House Appropriations Committee, in its report that accompanied the committee's passage of the FSGG funding bill, noted that the Judicial Conference recently recommended the creation of a \"significant number of new Article III judgeships\" for the nation's circuit and district courts. The committee also expressed its concern that, \"absent executive and congressional action to fill existing judicial vacancies and the passage of comprehensive bipartisan legislation to create new judgeships, the ability of the federal courts to administer justice in a swift, fair, and effective manner could be compromised.\" There is ongoing congressional interest in the safe conduct of court proceedings and the security of federal judges. Congress has, in the past, appropriated funds specifically to enhance the personal security of judges. For example, an FY2005 supplemental appropriations act included a provision providing funds for home intrusion detection systems for federal judges. Additionally, the Court Security Improvement Act of 2007 included various measures to enhance security for judges and court personnel, as well as courtroom safety for the public. The act, for example, amended 18 U.S.C. Â§930(e)(1) to prohibit the possession of dangerous weapons (other than firearms, which were already prohibited) in federal court facilities. The judiciary works closely with the U.S. Marshals Service (USMS) to ensure that adequate protective policies, procedures, and practices are in place for the federal courts. As discussed in the text above, the Marshals are largely responsible for protecting federal courthouses, judges, and other judicial employees. In FY2018, after the USMS assessed the level of danger in explicit threats and inappropriate communications directed at judges and other court officers, there were 531 predicated protective investigations opened \"based on the presence of or potential for criminal activity.\" The House Appropriations Committee, in the report accompanying its markup of the FY2020 judiciary budget, stated that the committee considers it a priority to improve the physical security of federal judicial facilities and \"to ensure the integrity of the judicial process.\" The judiciary continues the cost containment initiatives that it began in 2004.Â Specific areas of focus for containing costs include office space rental, personnel expenses, information technology, and operating costs. The Senate report that accompanied the Appropriations Committee's markup addressed the issue of cost containment, stating that the \"judicial branch is subject to the same funding constraints facing the executive and legislative branches. It is imperative that the Federal judiciary devote its resources primarily to the retention of staff. Further, it is also important that the judiciary contain controllable costs such as travel, construction, and other expenses.\" Of particular focus by the judiciary is an effort to cut costs associated with office space and rental payments. The Administrative Office of U.S. Courts (AO) announced in December 2018 that the federal judiciary \"has succeeded dramatically in its five-year quest to reduce building space and rent costs, exceeding its original reduction goals by nearly 30 percent.\" Additionally, AO noted that \"rent has been cut more than $36 million a year,\" with additional savings anticipated in the future. In its FY2020 budget summary, the Administrative Office of U.S. Courts (AO) emphasized that, as of September 30, 2018, approximately 1.1. million usable square feet had been removed from the judiciary's rent bill. Examples of the judiciary's space reduction campaign include the following: The bankruptcy court for the District of New Hampshire \"was relocated from leased space in Manchester into the District Court in Concord, NH. Savings: 20,000 square feet.\" In New York, the bankruptcy court in Buffalo \"relocated into the district courthouse. In Manhattan, the Bankruptcy Court reduced space by digitizing paper records. Combined savings: 39,000 square feet.\" The bankruptcy court in San Francisco \"saved over 25,000 square feet and $1.5 million in annual rent by moving into the Phillip Burton Federal Building and U.S. Courthouse.\" Courthouse \"library reductions in Camden, NJ; Wilmington, DE; Harrisburg, PA; Philadelphia; and U.S. Virgin Islands saved over 18,000 square feet.\" The Sixth Circuit's library headquarters in Cincinnati \"relocated to space formerly used for Clerk's Office file storage. Total savings: 15,000 square feet.\" Courthouses for which there was no permanently assigned judge, that is, non resident courthouses , \"were closed in Bryson City, NC; Wilkesboro, NC; Beaufort, SC; and Parkersburg, WV. Total savings: over 35,000 square feet.\" \"In Miami, 33,000 square feet and $900,000 in annual rent were saved by relocating the Bankruptcy Court into the C. Clyde Atkins U.S. Courthouse. Two magistrate judges were relocated, and a circuit library and jury assembly area were vacated.\" The Administrative Office of U.S. Courts also noted that, in addition to space reduction, the judiciary has \"undertaken significant efforts to develop alternative organizational models that may result in cost savings, including expanding shared administrative services within and among\" district courts. The House Appropriations Committee noted in its report that it recognizes the judiciary's \"cost containment efforts over the past 12 years and is pleased with the [its] savings and cost avoidance.\" The committee noted, specifically, that the reduction of usable square feet from the judiciary's rent bill \"equates to an annual cost avoidance of nearly $36,000,000 and $105,000,000 over the past five years.\"", "summary": "Funds for the judicial branch are included annually in the Financial Services and General Government (FSGG) appropriations bill. The bill provides funding for the U.S. Supreme Court; the U.S. Court of Appeals for the Federal Circuit; the U.S. Court of International Trade; U.S. courts of appeals and district courts; the Administrative Office of the U.S. Courts; the Federal Judicial Center; the U.S. Sentencing Commission; federal defender organizations that provide legal representation to defendants financially unable to retain counsel in federal criminal proceedings; security and protective services for courthouses, judicial officers, and judicial employees; and fees and allowances paid to jurors. The judiciary's FY2020 budget request of $8.29 billion was submitted to Congress on March 11, 2019. By law, the President includes, without change, the appropriations request submitted by the judiciary in the annual budget submission to Congress. The FY2020 budget request included $7.62 billion in discretionary funds, representing a 5.1% increase over the FY2019 enacted level of $7.25 billion provided in the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ; February 15, 2019). The FY2020 budget request also included $669.8 million in mandatory funds to pay the salaries and benefits of certain types of federal judges and to also provide for judicial retirement accounts. The House Appropriations Committee held a markup ( H.R. 3351 ) on June 11, 2019, and recommended the judiciary receive a total of $7.51 billion in discretionary funds. The House passed H.R. 3351 on June 26, 2019. The Senate Appropriations Committee held a markup ( S. 2524 ) on September 19, 2019, and recommended the judiciary receive a total of $7.42 billion in discretionary funds. The FSGG appropriations bill was not enacted prior to the beginning of FY2020 on October 1, 2019. Subsequently, the judiciary was funded through November 21, 2019, by the Continuing Appropriations Act, 2020 ( P.L. 116-59 , September 27, 2019) and from November 22, 2019, through December 20, 2019, by the Further Continuing Appropriations Act, 2020 ( P.L. 116-69 , November 21, 2019). Final FY2020 appropriations for the judiciary were included in the FY2020 Consolidated Appropriations Act ( P.L. 116-93 ). Congress provided a total of $8.19 billion, with $7.49 billion in discretionary funds and $705.5 million in mandatory funds. The act passed the House on December 17, 2019, the Senate on December 19, 2019, and was signed by the President on December 20, 2019. In recent years, appropriations for the judiciary have comprised approximately 0.2% of total budget authority.", "document_type": "crs"}
{"report": "In Congress, multiple bills and resolutions have been introduced related to China's handling of a novel coronavirus outbreak in Wuhan, China, that expanded to become the coronavirus disease 2019 (COVID-19) global pandemic. This report provides a timeline of key developments in the early weeks of the pandemic, based on available public reporting to date. The timeline starts with the onset of symptoms among the first known patients later identified as having COVID-19. The timeline documents the subsequent responses in China, at the World Health Organization (WHO), and in the United States through January 31, 2020, the day U.S. Department of Health and Human Services (HHS) Secretary Alex M. Azar II declared the pandemic had become a public health emergency for the United States. The report opens with short sections on disease terminology and the Chinese geographic and political context of the outbreak in its early weeks. The report next offers discussion of select issues raised by the timeline. A detailed timeline follows. A concise timeline is included in an Appendix . On February 11, 2020, the International Committee on Taxonomy of Viruses named the novel coronavirus \"severe acute respiratory syndrome coronavirus 2\" (SARS-CoV-2). The name references the virus' genetic link to the coronavirus responsible for the 2002-2003 severe acute respiratory syndrome (SARS) outbreak, which began in China's Guangdong Province and sparked global panic, infecting 8,096 people worldwide and causing 774 deaths. Also on February 11, WHO named the disease caused by SARS-CoV-2 \"coronavirus disease 2019\" (COVID-19). Earlier, from January 30, 2020, to February 11, WHO referred to the virus by the interim name \"2019 novel coronavirus\" (2019 nCoV), and to the disease by the interim name, \"2019 novel coronavirus acute respiratory disease\" (2019-nCoV acute respiratory disease). China initially referred to the illness its doctors were observing in Wuhan as \"pneumonia of unknown cause.\" Beginning on January 1, 2020, official Chinese sources began referring to it as a \"viral pneumonia.\" On January 12, 2020, the day after China shared the genomic sequence of the novel coronavirus with WHO and on an open-source platform, Wuhan authorities began using the term, \"novel coronavirus infection pneumonia.\" The government and media in China continue to refer to the disease by that name. Chinese doctors first identified cases of the disease later named COVID-19 in Wuhan, capital of China's Hubei Province. Wuhan, with a population of 11.2 million, is the largest city in central China, a region comprised of six provinces with a combined population of 368 million. Situated at the intersection of the Yangtze River and its largest tributary, the Hanshui River, the city is a major transportation hub, with river, highway, high-speed rail, and air links to the rest of China. Until the pandemic led airlines to suspend service, the city also offered direct air routes to destinations around the world. Wuhan is a major industrial base and boasts a concentration of elite universities and research centers. The Wuhan Municipal Health Commission, the city's health agency, is in the third tier of a national health hierarchy that extends from the National Health Commission in Beijing down through the Health Commission of Hubei Province, whose offices are also located in Wuhan. The Wuhan Municipal Health Commission reports both to the Wuhan People's Government and to the provincial health commission. The Wuhan Municipal Health Commission directly oversees a dozen hospitals and the Wuhan Center for Disease Control and Prevention (Wuhan CDC), which has a staff of about 220. Wuhan is divided into 13 districts. Each has its own health bureau and CDC, which report both to the district government and the next higher-level entity in their hierarchies, the Wuhan Municipal Health Commission and Wuhan CDC. Jianghan District, home to the Huanan Seafood Wholesale Market, where a number of earliest known COVID-19 patients worked, has a population of 730,000. Population density in Jianghan District is on par with Manhattan. In China's political system, Communist Party secretaries are the most powerful officials at every level of government. They oversee the party bureaucracy and make major decisions. A deputy party secretary usually serves concurrently as head of the parallel state bureaucracy, which implements the Party's decisions. At the national level, Communist Party General Secretary Xi Jinping is China's top leader. He serves concurrently as Chairman of the Party's Central Military Commission and as State President. The Party's second-most senior official, Li Keqiang, serves as Premier of the State Council, or cabinet, overseeing China's state bureaucracy. Both men are members of China's most senior decisionmaking body, the seven-man Communist Party Politburo (or Political Bureau) Standing Committee. At the outset of the epidemic, the top officials of Hubei Province were Party Secretary Jiang Chaoliang and Governor Wang Xiaodong, with the latter serving concurrently as a provincial deputy party secretary. The Party removed Jiang from office on February 13, 2020, and replaced him with former Shanghai Mayor Ying Yong, an associate of Party General Secretary Xi. Governor Wang remains in office. In the city of Wuhan, the top officials at the outset of the epidemic were Party Secretary Ma Guoqiang, who served concurrently as a deputy party secretary for Hubei Province, and Mayor Zhou Xianwang, who served concurrently as the city's deputy party secretary. The Party removed Ma from his provincial and municipal party posts on February 13, 2020, and replaced him with the former Party Secretary of the eastern China city of Jinan, Wang Zhonglin. Mayor Zhou remains in office. At the outset of the epidemic, the top officials of the Hubei Provincial Health Commission were Party Secretary Zhang Jin and Director Liu Yingzi. The Party removed both from their posts on February 11, 2020, replacing them with a former deputy director of China's National Health Commission, Wang Hesheng. The top official of the Wuhan Municipal Health Commission remains Zhang Hongxing. He has served as both Party Secretary and Director of the commission since early 2019. In 2002-2003, China's government was widely criticized for waiting more than two months to report the outbreak of SARS to WHO and to its own people. China has shared information about COVID-19 more quickly and comprehensively. The timeline shows, for example, that Chinese authorities allowed experts from the WHO China Country Office and WHO's Western Pacific Regional Office to conduct what WHO describes as \"a brief visit to Wuhan\" January 20-21, 2020. The timeline nonetheless raises questions for some about China's interactions with WHO at key moments in the early weeks of the pandemic. Article 6 of the International Health Regulations (IHR) (2005), an international agreement to which China, the United States, and 194 other countries are parties, outlines State Parties' obligations, including: Each State Party shall assess events occurring within its territory.... Each State Party shall notify WHO, by the most efficient means of communication available, by way of the National IHR Focal Point, and within 24 hours of assessment of public health information, of all events which may constitute a public health emergency of international concern within its territory.... Following a notification, a State Party shall continue to communicate to WHO timely, accurate and sufficiently detailed public health information available to it on the notified event, where possible including case definitions, laboratory results, source and type of the risk, number of cases and deaths, conditions affecting the spread of the disease and the health measures employed; and report, when necessary, the difficulties faced and support needed in responding to the potential public health emergency of international concern. The timeline suggests that in the early weeks of the pandemic, Chinese authorities may not always have communicated with WHO in the \"timely, accurate and sufficiently detailed\" way IHR (2005) requires. It appears China may not have proactively notified WHO of the outbreak, as required by Article 6.1 of IHR (2005). According to Dr. Michael Ryan, Executive Director of WHO's Health Emergencies Programme, WHO headquarters in Geneva first learned about the outbreak in Wuhan not directly from Chinese authorities, but rather from the Program for Monitoring Emerging Diseases (ProMED), a U.S.-based open-source platform for early intelligence about infectious disease outbreaks. At 11:59 p.m. Eastern Standard Time (EST), a ProMed user posted a machine translation of a Chinese-language report about the outbreak from a news organization, Yicai , the financial news arm of China's state-owned Shanghai Media Group. Yicai had published its report online just under three hours earlier. It detailed the contents of two Wuhan Municipal Health Commission \"urgent notices\" about atypical pneumonia cases, which the commission had sent the day before to medical institutions in Wuhan, and which internet users in Wuhan had leaked online within minutes. Another document from Wuhan that circulated widely online overnight on December 30-31âa photograph of a patient lab report showing a positive result for SARS, with the SARS finding circled in redâalerted Chinese news organizations to the possible significance of the \"urgent notices.\" The head of emergency medicine at Wuhan Central Hospital, Dr. Ai Fen, had shared the image online with a former classmate and a group of colleagues in the time between the issuance of the two Wuhan Municipal Health Commission \"urgent notices\" on December 30. Another Wuhan Central Hospital doctor, Li Wenliang, had shared the image with a group of his former classmates in a private online WeChat group a few hours later. (Dr. Li would later be reprimanded by Wuhan authorities for his social media posts, celebrated by the Chinese public as a whistleblower, and fall victim to COVID-19. He died on February 7, 2020, at the age of 33. ) For WHO, the ProMED post appears to have triggered Articles 9 and 10 of IHR (2005). Article 9 provides for WHO to \"take into account reports from sources other than notifications or consultations\" by State Parties, and then \"attempt to obtain verification from the State Party in whose territory the event is allegedly occurring.\" Article 10 requires State Parties to respond to verification requests from WHO within 24 hours. Speaking at a WHO press conference on April 20, 2020, Ryan said as soon as WHO headquarters learned about the outbreak from ProMed on December 31, it asked the WHO China Country Office to request \"verification of the event\" from the government of China under IHR (2005). Ryan noted, \"member states are required to respond within 24 to 48 hours of any request from the WHO for clarification or verification of an event or a signal that we believe may be significant.\" (IHR (2005) stipulates 24 hours, not 48.) China's official timeline says it began \"regularly informing\" WHO of developments related to the outbreak on January 3. On January 4, WHO tweeted, \"China has reported to WHO a cluster of pneumonia casesâwith no deathsâin Wuhan, Hubei Province.\" WHO's Ryan said the WHO China Country Office formally requested verification of the outbreak on January 1, \"[t]hat process continued and on 4 th January WHO tweeted the existence of the event.\" Whether intentionally or otherwise, WHO's first formal statement about the outbreak, on January 5, was not clear on how the WHO Country Office learned about the outbreak. It used passive voice to state that the China Country Office \"was informed\" on December 31, 2019, of cases of pneumonia of unknown cause in Wuhan. China's government appears to have potentially hesitated before informing WHO both when it determined a novel coronavirus was responsible for the outbreak and when its scientists sequenced the virus' genome. On January 9, 2020, WHO announced, \"Chinese authorities have made a preliminary determination of a novel (or new) coronavirus, identified in a hospitalized person with pneumonia in Wuhan.\" On January 11, 2020, WHO tweeted, \"BREAKING: WHO has received the genetic sequences for the novel #coronavirus (2019-nCoV) from the Chinese authorities.\" China appears to have determined that a novel coronavirus was responsible days before January 9, 2020, however. Its scientists also sequenced the virus' genome days earlier than January 11, 2020. According to Caixin , a respected Chinese news organization, hospitals in Wuhan sent samples from their pneumonia cases to commercial companies for analysis in late December 2019. Several of those companies informed the hospitals that the patient samples indicated a novel coronavirus. One company, BGI Genomics, completed genomic sequencing of the novel coronavirus on December 26, 2019, Caixin reports. The next entity reported to have sequenced the genome was the Wuhan Institute of Virology (WIV), an affiliate of the Chinese Academy of Sciences. Chinese state media say WIV sequenced the virus' genome on January 2. A timeline in a March 26, 2020, article by China CDC experts and others in T he New England Journal of Medicine indicates China CDC sequenced the genome on January 3, 2020. China's official timelines provide January 7 as the date China CDC sequenced the genome. January 9, 2020, media reports about the CDC's sequencing breakthrough appear to have prompted WHO to issue its statement announcing identification of a novel coronavirus. A fourth group of scientists, led by Prof. Yong-zhen Zhang of Fudan University in Shanghai, sequenced the genome on January 5, 2020, and was the first to share it with the world. They deposited the sequence with the U.S. National Institutes of Health's GenBank, a database of publicly available DNA sequences, on January 5, submitted a paper on their work to the journal Nature on January 7, 2020, and posted the genome on Virological.org, an open-access hub for pre-publication data and analyses, on the morning of January 11. Later on January 11, 2020, a team from China CDC and two other teams shared genomic sequences of the novel coronavirus on Global Initiative on Sharing All Influenza Data (GISAID), an international platform for sharing influenza data, and WHO tweeted that Chinese authorities had provided WHO with genetic sequences for the virus. Chinese authorities do not appear to have shared biological samples with WHO or other international partners as of January 28, 2020, and possibly as of April 25. A line in a January 28, 2020, WHO press release about WHO Director-General Dr. Tedros Adhanom Ghebreyesus' meeting with Chinese leader Xi Jinping indicates that China's government had yet to share biological samples with the organization. Among other things, Director-General Tedros and Xi discussed, \"continuing to share data, and for China to share biological material with WHO,\" the WHO press release stated. On April 25, 2020, State Department Spokesperson Morgan Ortagus tweeted, \"China has not shared any #COVID19 virus or clinical samples to the best of our knowledge.\" The timeline indicates that information Chinese authorities provided to the Chinese public and to the world in the early weeks of the epidemic was often incomplete and understated the extent of the virus' spread. China shared more information beginning January 20, 2020. On January 21, for example, China's National Health Commission began issuing daily updates on case numbers. Information gaps in the early weeks and other information-sharing issues include the following. Wuhan doctors suspected person-to-person transmission of the mysterious new pneumonia as early as late December. Dr. Zhang Jixian of the Hubei Provincial Hospital of Integrated Chinese and Western Medicine later told China's state news agency that she reported a family cluster of cases to her superiors on December 27, 2019, because, \"It is unlikely that all three members of a family caught the same disease at the same time unless it is an infectious disease.\" When visitors from Hong Kong, Macao, and Taiwan visited Wuhan January 13-14, 2020, an official from China's National Health Commission told them, \"limited human-to-human transmission cannot be excluded.\" A WHO expert echoed that position in a January 14, 2020, press conference, stating that China had experienced \"limited\" human-to-human transmission of the novel coronavirus, mainly in families. Chinese authorities first publicly confirmed person-to-person transmission on January 20. Wuhan medical personnel began falling ill with symptoms similar to their patients' in December, but Chinese authorities did not acknowledge medical worker infections until January 20. The best-known victim of the novel coronavirus in China is Dr. Li Wenliang of Wuhan Central Hospital, whom Wuhan police reprimanded on January 3, 2020, for sharing information about the virus online. Li was hospitalized on January 12, 2020, and died on February 7, 2020. Among other reports of medical worker infections, a single \"super-spreader\" patient who underwent surgery at the Wuhan Union Hospital on January 7, 2020, was later found to have infected 14 medical staff. Wuhan's Municipal Health Commission issued no updates while a five-day-long political meeting took place in the city January 6-10. For the duration of a second major political meeting in the city, January 12-17, the Wuhan Municipal Health Commission issued daily updates, but reported no new infections. The commission's report on January 11, issued on the day between the two political meetings, gave the impression the epidemic was shrinking. On January 5, the commission had reported a cumulative 59 cases in the city. On January 11, it revised the cumulative number of cases down to 41, a number that remained constant through January 16. The absence of updates from January 6 to 10, and the official statements that no new cases had been detected between January 3 and January 16, may have given Wuhan residents a false sense of security that the outbreak was under control. The United States made multiple offers over the course of January 2020 to send a U.S. Centers for Disease Control and Prevention (U.S. CDC) team to China to assist with response to the outbreak. Any team that went would also have learned information about the epidemic of relevance to the U.S. response. The timeline shows U.S. officials offered to send a U.S. CDC team on January 4, January 6, and January 27. On January 27, President Trump supported the offer with a tweet, saying, \"We have offered China and President Xi any help that is necessary. Our experts are extraordinary!\" No U.S. CDC team traveled to China in this period, although Weigong Zhou, an employee of U.S. CDC, and Clifford Lane, an employee of the U.S. National Institutes of Health (NIH), did participate in a WHO-China Joint Mission to China from February 16 to 24, 2020. Although Chinese experts have published a stream of papers in English-language scientific journals since the epidemic began, including several important papers in January 2020, some in the international community have expressed frustration over what China has not shared. One area of interest is analysis of samples from the Huanan Seafood Wholesale Market (also referred to in some sources as South China Seafood City). China CDC provided summary details of its findings to Chinese state mediaâit found 33 of 585 samples tested positive for SARS-Cov-2âbut China CDC has not issued details of its scientific analysis of the samples and appears to have not taken samples from animals in the market. Chinese media reports indicate that local authorities disinfected the market on at least the two nights before it closed, potentially also compromising samples. On May 6, 2020, Secretary of State Michael R. Pompeo stated, \"China is still refusing to share the information we need to keep people safe, such as viral isolates, clinical specimens, and details about the many COVID-19 patients in December 2019, not to mention 'patient zero.'\" It remains unclear who was responsible for decisions to withhold information in the early weeks. In a nationally televised interview, Wuhan Mayor Zhou Xianwang pointed to China's Law on Prevention and Control of Infectious Diseases , which he said restricted Wuhan from sharing information without permission from higher-ups. In addition to examples of incomplete information provided by Chinese authorities, the timeline of events through January 31, 2020, includes instances of official actions to discipline those who shared information about the epidemic publicly, as well as examples of censorship. They include the following: Wuhan Municipal Public Security officers reprimanded at least eight people for allegedly \"spreading rumors\" about the outbreak and thereby creating a \"negative social influence.\" It remains unclear whether two of the best known medical workers reprimanded for sharing early information about the outbreak, Wuhan Central Hospital's Dr. Ai Fen and Dr. Li Wenliang, are counted among the eight, or if theirs are additional cases. The day after the team of scientists led by Prof. Yong-zhen Zhang of Fudan University in Shanghai became the first to share the genetic sequence of the novel coronavirus with the world, Shanghai authorities closed down Professor Zhang's laboratory for \"rectification,\" implying it is being investigated for unspecified wrongdoing. Hong Kong's South Morning Post , which reported the development, wrote that it was \"not clear whether the closure was related to the publishing of the sequencing data before the authorities.\" Official Chinese timelines omit mention of the team's work. Official censorship has blocked access to enterprising reporting undertaken by both Chinese and foreign news organizations. Dr. Ai Fen's first-person account in a national magazine, People ( Renwu ), for example, was deleted from Renwu's website the day it appeared, though Chinese internet users have worked to keep it accessible. Chinese activists have archived it and many other censored reports on sites such as Terminus2049. Some of those activists are now missing. Prior to January 20, the public record provides little evidence that China's top leaders saw containment of the epidemic as a high priority. China's state media reported three meetings of China's top decisionmaking body, the seven-man Communist Party Politburo (also known as \"Political Bureau\") Standing Committee, in the month of January 2020, on January 7, 13, and 25. Contemporaneous reporting on the first two meetings made no mention of the epidemic, although on February 15 the Communist Party released February 3 remarks in which General Secretary Xi recalled having \"raised a demand for prevention and control of the novel coronavirus pneumonia\" at the January 7 meeting. People's Daily , the newspaper of the Communist Party Central Committee, made no mention of the epidemic in its pages until January 21, when it carried six articles, including two on the front page. Chinese officials at all levels monitored the paper closely for signals about leadership priorities. General Secretary Xi, in his capacity as State President, made an official visit to Burma from January 17-18, 2020, to celebrate the 70 th anniversary of bilateral diplomatic relations. State media coverage of the trip gave no indication that Xi and his Burmese hosts discussed the epidemic or efforts by China to contain it. The Chinese leadership's approach to the epidemic changed dramatically on January 20. On that day, a medical expert lauded for his role in the SARS epidemic, Zhong Nanshan, officially confirmed human-to-human transmission and medical worker infections. China's National Health Commission declared novel coronavirus-caused pneumonia a statutory notifiable infectious disease under the PRC Law on the Prevention and Treatment of Infectious Diseases . China also amended the PRC Health and Quarantine Law , opening the way for mandatory quarantines and lock-downs. The day ended with General Secretary Xi issuing an \"important instruction,\" carried in all major media, to prioritize novel coronavirus prevention and control work. China's holiday calendar likely set back efforts to contain the outbreak and contributed to its spread overseas. The Lunar New Year, also known as Spring Festival, is China's most important holiday. In 2020, it fell on January 25. Ahead of the holiday, millions of Wuhan residents left the city to return to their hometowns to spend the festival with their extended families. A smaller number of Wuhan residents got on planes to holiday destinations abroad. In Wuhan, a community of 40,000 households with a two-decade tradition of mass potluck banquets ahead of the Lunar New Year went ahead with its 20 th annual potluck on January 18, 2020, contributing to the virus' spread. Note that when times are listed, the timeline also notes the time zone, whether Chinese Standard Time (CST) for China, Eastern Standard Time (EST) for the eastern part of the contiguous United States, or Central European Time (CET) for Geneva, Switzerland, the headquarters location for WHO. Retrospectively, the date the earliest known COVID-19 patient first developed symptoms remains unclear. In a March 2020 report, the Hong Kong-based South China Morning Post , citing Chinese \"government data seen by the Post ,\" indicates that the first known patient was a 55-year-old from Hubei Province who became ill on November 17. Asked in March 2020 about the Post report, China CDC Director Gao Fu states, \"There is no solid evidence to say we already had clusters in November.\" In a January 24, 2020, article in The Lancet medical journal, doctors from a Wuhan infectious disease hospital and their co-authors state that among the first 41 cases in Wuhan later identified as being COVID-19, the first patient showed symptoms on December 1. In January 11-12 communications with WHO and in an authoritative February 17 report, Chinese authorities provide December 8 as the day when the first known patient later identified as having COVID-19 became symptomatic. Doctors at Wuhan Central Hospital take fluid samples from the lungs of a 65-year-old patient with pneumonia and send them to Vision Medicals, a genomics company in Guangzhou, Guangdong Province, for testing. Another Wuhan hospital sends a sample from a pneumonia patient to publicly-listed genomics company BGI Genomics for analysis. Dr. Zhang Jixian, Director of Respiratory and Critical Care Medicine at the Hubei Provincial Hospital of Integrated Chinese and Western Medicine in Wuhan, files a report with her supervisors about three members of a single family whom she found to be suffering from pneumonia of unknown cause. She later recalls concluding, \"It is unlikely that all three members of a family caught the same disease at the same time unless it is an infectious disease.\" The hospital notifies Center for Disease Control for its district of Wuhan, Jianghan District. Vision Medicals, the genomics company to which Wuhan Central Hospital sent samples from the lungs of the 65-year-old patient for analysis on December 24, calls with the results. According to an account Dr. Zhao Su, the hospital's head of respiratory medicine, gave news organization Caixin in February 2020, \"They just called us and said it was a new coronavirus.\" Wuhan Central Hospital admits a 41-year-old man with pneumonia, collects biological samples from him, and sends the swabs to another laboratory, CapitalBio Medlab Co. Ltd., for analysis. The Hubei Provincial Hospital of Integrated Chinese and Western Medicine has identified additional cases of pneumonia of unknown cause. Other hospitals in Wuhan are reporting similar cases. Wuhan Municipal CDC organizes an expert team to investigate. BGI Genomics is the first known entity to complete sequencing of the novel coronavirus virus, based on the sample sent to it on December 26. A BGI Genomics source later tells Caixin the company did not know the virus was responsible for multiple illnesses and so did not understand the significance of its work at the time. 3:10 p . m . (CST) : The Wuhan Municipal Health Commission issues an \"urgent notice\" intended only for medical institutions in Wuhan. It states that cases of pneumonia of unknown cause have emerged from the city's Huanan Seafood Wholesale Market. It orders hospitals to compile statistics on all such cases admitted in the previous week and report them by email to the Health Commission by 4 p.m. A later investigation by the National State Supervisory Commission, an agency tasked with investigating graft and malfeasance among public servants, will reveal that someone leaks the notice online within 12 minutes of its being issued. About 12 p.m. CST : Dr. Ai Fen, head of the emergency department at Wuhan Central Hospital, receives a WeChat message from a former classmate at another hospital, Tongji Hospital, asking about a message circulating online: \"Don't go to Huanan [Market]. A lot of people there have feversâ¦.\" Dr. Ai sees the message from her classmate while she is reviewing a computed tomography (CT) scan of an infected patient's lungs. She records an 11-second clip of the CT scan and sends it to him. A bout 4 p.m . CST : Dr. Ai Fen reads Capital Bio's laboratory report on the patient admitted on December 27, which states that his sample has tested positive for Severe Acute Respiratory Disease (SARS). (The finding is later determined to be erroneous. The patient was infected with the novel coronavirus, later named SARS-CoV-2.) Dr. Ai telephones the hospital's public health department and its infectious disease department to report the finding and tells the director of the respiratory disease department in person. Then she draws a red line around the \"SARS\" finding and shares an image of the report online with her classmate at Tongji Hospital, as well as with a group of colleagues. She will later say she does so \"to remind everyone to pay attention to protecting themselves.\" 5:43 p . m . CST : Wuhan Central Hospital ophthalmologist Li Wenliang sends a message to a group of his medical school classmates on the WeChat social media platform, reporting, \"7 confirmed SARS cases from the Huanan Fruit and Seafood Market.\" Dr. Li does not personally know Dr. Ai Fen, but he sends an image of the laboratory report Dr. Ai shared with her associates less than two hours earlier. He also sends the 11-second lung CT scan of a patient's lungs that Dr. Ai shared with her classmate at noon. 6:50 p . m . CST : The Wuhan Municipal Health Commission issues a second \"urgent notice\" to medical institutions, instructing them on how to manage patients with pneumonia of unknown cause and ordering them to track such cases and report them in a timely fashion to district CDCs and the Wuhan Municipal Health Commission. A later investigation by China's State Supervisory Commission will reveal that someone leaks the notice online within 10 minutes of its being issued. The Wuhan Municipal Health Commission alerts China's National Health Commission and China CDC in Beijing to the cases. The National Health Commission dispatches a working group and the first of several expert teams to Wuhan. Morning CST: Several Chinese media outlets confirm the authenticity of the Wuhan Health Commission's \"urgent notices\" of the day before, which spread rapidly across social media overnight. Yicai (also known as China Business News ), the financial news arm of state-owned Shanghai Media Group, confirms the notices are genuine by calling the Wuhan Municipal Health Commission's public hotline number. Yicai publishes a story on the outbreak in Wuhan online at 10:16 a.m. CST. Another Chinese news organization, Xin Jing Bao , confirms the authenticity of the documents with Wuhan CDC, and publishes its own story 37 minutes later. 11:59 p.m. EST ( December 30 ) / 5:59 a.m. CET (Geneva)/12:59 p.m. CST ) : A user of the U.S.-based listserv Program for Monitoring Emerging Diseases or ProMED posts a machine translation of Yicai's article. 1:38 p . m . CST : The Wuhan Municipal Health Commission posts on its website its first public statement on the outbreak. It states that some medical institutions in the city have treated cases of pneumonia linked to the city's Huanan Seafood Wholesale Market. The commission says it asked medical institutions to search for cases related to the market and do retrospective investigations, and they identified 27 cases, including seven cases in which patients are seriously ill. The commission notes that hygiene investigation and environmental sanitation measures at the market are underway. Doctors at Wuhan's Jinyintan Hospital request that the Wuhan Institute of Virology under the Chinese Academy of Sciences conduct whole-genome sequencing on samples from six patients. World Health Organization (WHO) headquarters in Geneva learns of \"a cluster of pneumonia cases in China\" from the ProMED platform. (See \" United States (Brookline, MA) \".) WHO headquarters requests that the WHO China Country Office follow up with Chinese authorities. Taiwan's Centers for Disease Control sends an email to WHO. It reads, \"News resources today indicate that at least seven atypical pneumonia cases were reported in Wuhan, CHINA. Their health authorities replied to the media that the cases were believed not SARS; however the samples are still under examination, and cases have been isolated for treatment. I would greatly appreciate if you have relevant information to share with us.\" Taiwan's Central Epidemic Command Center later notes, \"To be prudent, in the email we took pains to refer to atypical pneumonia, and specifically noted that patients had been isolated for treatment. Public health professionals could discern from this wording that there was a real possibility of human-to-human transmission of the disease.\" Between 5 a.m. and 6 a.m. CST : Wuhan's Jianghan District government suspends operation of the Huanan Seafood Wholesale Market linked to cases of atypical pneumonia. (In addition to selling seafood, the market also sold live wild animals, including hedgehogs, badgers, snakes, and turtledoves. ) Vendors tell the news organization Xin Jing Bao that workers wearing masks have been spraying disinfectant in the market late at night since at least December 30, 2019. Morning CST : A team from China's National Institute for Viral Disease Control and Prevention, part of Beijing-based China CDC, visits the Huanan Seafood Wholesale Market and collects 515 environmental samples, which it sends back to the institute for analysis. CDC experts will return on January 12, 2020, to take 70 more samples from stalls where vendors sold wild animals. Other scientists will later fault the team for not undertaking direct animal sampling in the market before it closed, as without such samples, it may be difficult to determine whether animals at the market were reservoirs for the virus. 5:38 p.m. CST : The Wuhan Municipal Public Security Bureau announces on its official Weibo social media account that it has investigated eight people for \"spreading rumors.\" The bureau's announcement states that while medical institutions in the city have admitted multiple pneumonia cases, some netizens posted and shared \"inaccurate information\" online, creating a \"negative social influence.\" The eight \"law breakers\" have been \"dealt with,\" the bureau says. It warns others against \"manufacturing rumors, believing rumors, or spreading rumors.\" Chinese Central Television (CCTV), the Xinhua News Agency, and national other news outlets report on the Wuhan Municipal Public Security Bureau's announcement, also warning against spreading rumors. The Hubei Provincial Health Commission reportedly orders genomics companies to stop testing samples from Wuhan and to destroy existing samples. Following the protocols of Article 9 of the International Health Regulations (IHR) (2005), an international agreement on responses to infectious disease outbreaks, WHO's China Country Office formally requests that the government of China provide \"verification\" of the outbreak. At just after 8 a.m. CST, a senior official of Wuhan Central Hospital subjects Dr. Ai Fen to what she later describes as \"an unprecedented and very severe rebuke.\" The official tells her not to speak to anyone, including her husband, about the pneumonia cases. She will comply, but will later express regret about lives lost because she didn't \"keep screaming.\" Using samples from patients at Wuhan's Jinyintan Hospital, the Wuhan Institute of Virology identifies the novel coronavirus and sequences its genome. China CDC and the Chinese Academy of Medical Sciences (CAMS) receive biological samples from four patients in Hubei Province and begin work to identify the pathogen responsible for their illnesses. About 1:30 p.m. CST : Wuhan Central Hospital's Dr. Li Wenliang, accompanied by a colleague, arrives at the Wuchang Sub-station of the Wuhan Public Security Bureau to discuss his December 30 posts to the WeChat group. Li is required to sign a letter of reprimand, which he will post online on January 31. The letter states that Li's \"false statement\" \"severely disturbed social order\" and violated the People's Republic of China's Law on Penalties for Administration of Public Security . (Article 25 of the law prohibits \"intentionally disturbing the public order by spreading rumors or making false reports of dangerous situations, epidemic situations, or police actions.\" ) 5:08 pm CST : The Wuhan Municipal Health Commission reports it has identified 44 patients with symptoms consistent with pneumonia of unknown origin, some of whom worked at the Huanan Seafood Wholesale Market and 11 of whom are severely ill. Professor Yong-zhen Zhang of the Shanghai Public Health Clinical Center and School of Public Health at Fudan University in Shanghai receives biological samples for analysis from Wuhan Central Hospital. The samples are from a 41-year-old pneumonia patient who worked at the Huanan Seafood Wholesale Market in Wuhan and was admitted to Wuhan Central Hospital on December 26, 2019. China CDC completes genomic sequencing of the novel coronavirus, according to a March 26 paper by China CDC experts and others in the The New England Journal of Medicine . (China's official timeline gives January 7 as the date China CDC completed sequencing of the virus.) China's National Health Commission issues a directive on management of biological samples in major infectious disease outbreaks. The directive reportedly \"ordered institutions not to publish any information related to the unknown disease, and ordered labs to transfer any samples they had to designated testing institutions, or to destroy them.\" U.S. Centers for Disease Control and Prevention (U.S. CDC) Director Robert Redfield emails and then speaks with his Chinese counterpart, Gao Fu (George F. Gao), Director-General of China CDC, who tells him about the atypical pneumonia outbreak in Wuhan. (China later says this is the first of 30 briefings it will provide to the U.S. government through February 3. ) Redfield then calls HHS Secretary Alex M. Azar II at home to brief him on the call. Secretary Azar reportedly tells his chief of staff to notify the White House's National Security Council. In its first public statement on the outbreak, WHO tweets, \"China has reported to WHO a cluster of pneumonia casesâwith no deathsâin Wuhan, Hubei Province. Investigations are underway to identify the cause of this illness.\" The tweet appears to reflect that China has formally verified the outbreak, as the WHO China Country Office requested it do on January 1. The U.S. CDC offers to send technical experts to China. U.S. CDC Director Robert Redfield emails China CDC Director-General Gao Fu, saying, \"I would like to offer [U.S.] CDC technical experts in laboratory and epidemiology of respiratory infectious diseases to assist you and China CDC in identification of this unknown and possibly novel pathogen.\" Neither the United States nor China has disclosed how Gao responds, if at all, but no U.S. CDC team goes to China at this time. The Wuhan Municipal Health Commission announces that it has identified 59 patients with symptoms consistent with pneumonia of unknown origin. It states that a preliminary investigation has uncovered no \"clear evidence of human-to-human transmission\" or infections among medical workers. The team led by Prof. Yong-zhen Zhang of Fudan University in Shanghai identifies a novel coronavirus and sequences its genome. The team reports its work to Chinese authorities and submits the sequence to GenBank, a genetic sequence database operated by the U.S. National Institutes of Health that serves as \"an annotated collection of all publicly available DNA sequences.\" (China's official timelines omit mention of the team's work, perhaps because it was not coordinated by China's National Health Commission. China's official timelines state that successful sequencing of the genome happened two days later, with China CDC's reported sequencing of the virus on January 7. ) WHO issues its first formal public statement on the outbreak, a \"disease outbreak news\" item. It states, \"On December 31, 2019, the WHO China Country Office was informed of cases of pneumonia of unknown etiology (unknown cause) detected in Wuhan City, Hubei Province of China.\" The statement adds, \"Based on the preliminary information from the Chinese investigation team, no evidence of significant human-to-human transmission and no health care worker infections have been reported.\" WHO says it \"advises against the application of any travel or trade restrictions on China based on the current information available on this event.\" The annual full session of the Wuhan Municipal People's Congress opens. The congress will last five days and occupy 515 of the city's most important citizens, including the city's entire top leadership. While the congress is in session, the Wuhan Municipal Health Commission will issue no updates on the status of the epidemic. U.S. CDC issues a \"Watch Level 1 Alert (be aware and practice usual precautions)\" for Wuhan, due to \"a pneumonia outbreak of unknown cause.\" It advises travelers to Wuhan to \"Avoid animals (alive or dead), animal markets, and products that come from animals (such as uncooked meat),\" \"Avoid contact with sick people,\" and \"Wash hands often with soap and water.\" It also advises anyone who has traveled to Wuhan and feels sick to isolate at home except for seeking medical care. HHS Secretary Azar and CDC Director Robert Redfield renew Redfield's offer to send U.S. CDC experts to China, this time in the form of an official letter. Azar later recalls, \"We made the offer to send the [U.S.] CDC experts in laboratory and epidemiology of respiratory infectious diseases to assist their Chinese colleagues to get to the bottom of key scientific questions like, how transmissible is this disease? What is the severity? What is the incubation period and can there be asymptomatic transmission?\" A 69-year-old patient undergoes neurosurgery at Wuhan Union Hospital. Four days later, he will develop symptoms that will later be identified as those of the novel coronavirus. Following his admission, he will infect 14 medical workers, making him the virus' first identified \"super-spreader.\" Chinese authorities will not disclose infections among medical personnel until January 20. China's leader, Xi Jinping, convenes an all-day meeting of the country's seven-man Politburo Standing Committee, the country's highest decisionmaking body. Media reports of the meeting at the time do not mention the epidemic. In a February 3 speech made public on February 15, however, Xi states that at the January 7 meeting, he \"raised a demand for prevention and control of the novel coronavirus pneumonia.\" 9 p . m . CST : A China CDC team reportedly sequences the genome of the novel coronavirus. Chinese state media will announce this on January 9. The team led by Prof. Yong-zhen Zhang of Fudan University in Shanghai submits an article to the peer-reviewed journal Nature detailing the team's sequencing of the novel coronavirus. In an article with a Hong Kong byline, \"New Virus Discovered by Chinese Scientists Investigating Pneumonia Outbreak,\" The Wall Street Journal is the first major publication to report that Chinese scientists have genetically sequenced a novel coronavirus. The Wall Street Journal says \"Chinese scientists\" sequenced the virus, but it does not identify them or their institutions. U.S. and Chinese CDC Directors speak by phone about \"technological exchanges and cooperation,\" according to China's official timeline. 9:45 a.m. CST : The Xinhua news agency publishes an interview in which a prominent medical expert states that the pneumonia cases in Wuhan appear to be caused by a novel coronavirus. 10:32 a.m. CST: CCTV reports that on January 7, China CDC successfully sequenced the genome of the novel coronavirus responsible for the Wuhan outbreak. WHO issues a statement about the preliminary determination of a novel coronavirus, observing, \"Preliminary identification of a novel virus in a short period of time is a notable achievement.\" It adds, \"WHO does not recommend any specific measures for travelers. WHO advises against the application of any travel or trade restrictions on China based on the information currently available.\" The annual full session of the Wuhan Municipal People's Congress concludes after five days, during which the Wuhan Municipal Health Commission issued no updates on the epidemic. The Wuhan Institute of Virology is among the institutions that have now developed testing kits. All suspected novel coronavirus patients in Wuhan are tested. Chinese National Health Commission Party Secretary and Director Ma Xiaowei and China CDC Director-General Gao Fu speak separately by telephone with WHO Director General Tedros about the epidemic. According to China's official timeline, the Chinese government shares \"specific primers and probes for detecting the novel coronavirus\" with WHO. WHO issues \"Advice for International Travel and Trade in Relation to the Outbreak of Pneumonia Caused by a New Coronavirus in China.\" It recommends against entry screening for travelers, stating, \"It is generally considered that entry screening offers little benefit, while requiring considerable resources.\" Reflecting information from China, it states, \"From the currently available information, preliminary investigation suggests that there is no significant human-to-human transmission, and no infections among health care workers have occurred.\" In its first statement since January 5, the Wuhan Municipal Health Commission states that it has identified no new infections since January 3 and that cases preliminarily attributed to novel coronavirus pneumonia stand at 41â18 fewer than the 59 cases of pneumonia of unknown cause the commission reported on January 5. The commission announces the first death of a coronavirus patient, a 61-year-old man who was a long-time customer of the Huanan Seafood Wholesale Market. The commission states again that it has not found evidence of person-to-person transmission or infections among health care workers. 9 :08 a.m. CST : The team led by Prof. Yong-Zhen Zhang of Fudan University in Shanghai becomes the first to share the genomic sequence of the novel coronavirus with the world. Australian virologist Edward C. Holmes tweets that he has posted an \"initial genome sequence of the coronavirus associated with the Wuhan outbreak\" on Virological.org, a hub for pre-publication data and analyses. On Virological.org, Holmes writes that he is acting on behalf of the consortium of scientists led by Prof. Zhang, and that the team has also deposited the sequence with GenBank. After the Shanghai team's announcement, China CDC's National Institute for Viral Disease Control and Prevention shares three sequences on Global Initiative on Sharing All Influenza Data (GISAID), an international platform for sharing influenza data. Two other Chinese teams share sequences to GISAID, too. WHO tweets, \"BREAKING: WHO has received the genetic sequences for the novel #coronavirus (2019-nCoV) from the Chinese authorities. We expect them to be made publicly available as soon as possible.\" China later says the Chinese institutions that jointly share the genomic sequence with WHO are China CDC, the Chinese Academy of Medical Sciences, and the Wuhan Institute of Virology under the Chinese Academy of Sciences, as designated agencies of the National Health Commission. The annual full session of the People's Congress of Hubei Province opens in Wuhan. It will last five-and-a-half days and involve 683 delegates. Representatives from the U.S. and United Kingdom consulates in Wuhan attend the opening ceremony. While the congress is in session, the Wuhan Municipal Health Commission will issue daily updates, but will report no new infections. Dr. Li Wenliang is hospitalized with symptoms of the novel coronavirus. In a January 31 Weibo micro-blog post, he recalls thinking at this time, \"How can the bulletins still be saying there is no human-to-human transmission, and no medical worker infections?\" Chinese authorities do not disclose medical worker infections until January 20. A team from China's National Institute for Viral Disease Control and Prevention, part of China CDC, return to the shuttered Huanan Seafood Wholesale Market to collect 70 additional samples from stalls where vendors sold wild animals. China CDC previously collected an initial 515 environmental samples from the market on January 1, 2020. The Shanghai Health Commission orders Dr. Yong-zhen Zhang's laboratory at the Shanghai Public Health Clinical Centre and School of Public Health at Fudan University to close for unspecified \"rectification.'\" No reason is given. According to Hong Kong's South Morning Post , it is \"not clear whether the closure was related to the publishing of the sequencing data before the authorities.\" WHO issues a statement noting, \"China shared the genetic sequence of the novel coronavirus on 12 January, which will be of great importance for other countries to use in developing specific diagnostic tests.\" WHO also states, \"The evidence is highly suggestive that the outbreak is associated with exposures in one seafood market in Wuhan. The market was closed on 1 January 2020. At this stage, there is no infection among healthcare workers, and no clear evidence of human to human transmission.\" Two experts from Taiwan's Communicable Disease Control Medical Network and its Centers for Disease Control arrive in Wuhan for a two-day visit to investigate the outbreak. With colleagues from the Chinese Special Administrative Regions of Hong Kong and Macao, they visit Wuhan's Jinyintan Hospital, where an official from China's National Health Commission tells them, \"limited human-to-human transmission cannot be excluded.\" One of the Taiwan experts recalls thinking, \"that means human-to-human transmission absolutely.\" The Communist Party's top decisionmaking body, the Politburo Standing Committee, meets in Beijing to discuss reports to be delivered at upcoming annual full meetings of the national legislature, the National People's Congress, and a political advisory body. (Both meetings will subsequently be postponed due to the epidemic.) Chinese media reports on the meeting do not mention the novel coronavirus. Thai authorities confirm the first case of the coronavirus outside of China. The individual confirmed to have the virus is a Chinese national who traveled to Thailand from Wuhan. WHO headquarters tweets, \"Preliminary investigations conducted by the Chinese authorities have found no clear evidence of human-to-human transmission of the novel #coronavirus (2019-nCov) identified in #Wuhan, #China.\" Dr. Maria Van Kerkhove, acting head of WHO's emerging diseases unit, tells a press conference in Geneva the same day, \"it is certainly possible that there is limited human-to-human transmission.\" The Wuhan Municipal Health Commission reports no new infections or deaths, stating that the cumulative number of cases in the city has remained steady at 41. In a question-and-answer statement dated January 14 but posted to its website on January 15, the Wuhan Municipal Health Commission confirms that the case reported by Thai authorities on January 13 is a resident of Wuhan. The commission also answers the question, \"Up to now, has there been person-to-person transmission?\" The commission answers, \"Existing investigative results indicate no clear evidence of person-to-person transmission. We cannot rule out the possibility of limited person-to-person transmission, but the risk of sustained person-to-person transmission is low.\" The annual full session of the People's Congress of Hubei Province, which opened on January 12, concludes. After the session closes, the Wuhan Municipal Health Commission announces new infections for the first time since January 3. It states that four new infections bring the number of confirmed cases in the city to 45, with two deaths. Chinese leader Xi Jinping arrives in Burma (also known as Myanmar) at the start of a state visit to celebrate the 70 th anniversary of bilateral diplomatic relations and the \"China-Myanmar Year of Culture and Tourism.\" It is his first overseas trip of the year. Chinese media coverage of his trip does not mention the novel coronavirus. U.S. CDC and the Department of Homeland Security's U.S. Customs and Border Protection begin health screenings for travelers arriving from Wuhan at three U.S. airports. The airports, identified as receiving the greatest number of travelers from Wuhan, are San Francisco (SFO), New York (JFK), and Los Angeles (LAX). To celebrate the Lunar New Year, more than 40,000 households in Wuhan's Bubuting neighborhood hold their 20 th annual potluck banquet. Observers later blame the banquet for contributing to the spread of the virus in Wuhan. In a January 22 interview with CCTV, Wuhan Mayor Zhou Xianwang says the decision to go forward with the banquet was \"based on the judgment that in this epidemic, transmission between people was limited.\" Evening CST : A six-person National Health Commission high-level expert group led by Dr. Zhong Nanshan, a hero from China's struggle against SARS in 2002-2003, arrives in Wuhan. Chinese leader Xi Jinping returns to Beijing after a two-day state visit to Burma. In a telephone call, HHS Secretary Azar briefs President Donald J. Trump about the epidemic for the first time. China's National Health Commission confirms the first case of the new coronavirus outside of Hubei Province, in a 66-year-old resident of Shenzhen, Guangdong Province, next to Hong Kong. The patient had traveled to Wuhan on December 29, 2019, developed symptoms on January 3, and returned to Shenzhen on January 4. The Wuhan Municipal Health Commission announces that the city's cumulative total of cases is 62, with two deaths. The Chinese National Health Commission high-level expert team receives a briefing from the Wuhan Municipal Health Commission and visits the Jinyintan Hospital, where novel coronavirus patients are being treated, and Wuhan CDC. At 5 p.m. CST, the expert team boards a plane for Beijing. The Wuhan Municipal Health Commission announces its cumulative case count is 198, an increase of 136 cases from the day before, with three deaths. The city of Wuhan establishes a \"Novel Coronavirus Infection Pneumonia Epidemic Prevention and Control Command Center\" headed by Wuhan Mayor Zhou Xianwang. 8 a.m. to 12 p.m. CST: The National Health Commission high-level expert group led by Dr. Zhong Nanshan briefs China's cabinet, the State Council, on findings from the group's visit to Wuhan the day before. 5:00 p.m. -7:00 p.m. CST : In a group interview organized by the National Health Commission, the head of the Chinese National Health Commission's High-Level Expert Group, Dr. Zhong Nanshan, publicly confirms for the first time that the novel coronavirus is being transmitted from person to person and that medical personnel have been infected. 7:27 p.m. CST : Xinhua News Agency reports that Chinese leader Xi Jinping has issued an \"important instruction\" to prioritize prevention and control work. He tells Communist Party and government bodies at all levels to put people's lives and health \"in first place.\" He also orders \"timely issuance of epidemic information and deepening of international cooperation.\" China's National Health Commission classifies the novel coronavirus-caused pneumonia as a Category B statutory notifiable infectious disease under the PRC Law on the Prevention and Treatment of Infectious Diseases . This empowers hospitals to put those with the disease under mandatory isolation or quarantine and allows the government to blockade epidemic areas. The commission also declares the new disease an infectious disease subject to quarantines for the purposes of the PRC Frontier Health and Quarantine Law , allowing authorities to impose quarantines and other measures on travelers entering and exiting China. Experts from the WHO China Country Office and WHO's Western Pacific Regional Office arrive in Wuhan for a brief field visit. They visit Wuhan's Tianhe Airport, Zhongnan Hospital, and Hubei Provincial CDC. They will leave the next day. The Wuhan Municipal Health Commission reports that 15 medical personnel in the city have been infected with the novel coronavirus. 4:00 p.m. CST: At a Guangdong Provincial Government press conference, Dr. Zhong Nanshan, head of the National Health Commission's high-level expert group, discloses that in Wuhan, a single patient infected 14 medical personnel. People's Daily , the authoritative newspaper of the Communist Party Central Committee, breaks its silence on the novel coronavirus epidemic. Its January 21 issue carries six articles on the epidemic, including two on the front page. WHO issues its first situation report on the novel coronavirus. It reports 278 confirmed cases in China and four outside the country. U.S. CDC confirms the first novel coronavirus case in the United States, in a patient who returned from Wuhan on January 15, 2020. U.S. CDC issues a \"Watch Level 2 Alert (Practice Enhanced Precautions)\" for the pneumonia caused by the novel coronavirus. In addition to advice issued on January 6, U.S. CDC now also advises that older travelers and those with underlying health issues \"should discuss travel to Wuhan with their healthcare provider.\" 2 a.m. CST : Wuhan Municipality's Novel Coronavirus Infection Pneumonia Epidemic Prevention and Control Command Center issues its first order. It states, \"From 10 a.m. on January 23, 2020, the entire city's public transportation, subway, ferries, and long-distance travel will be suspended. Without special reasons, city residents must not leave Wuhan. Channels for departing Wuhan from the airport and railway station are temporarily closed.\" 3 :55 p.m. CST: In an \"urgent notice,\" China's Ministry of Transport orders transportation authorities across China to suspend passenger travel into Wuhan by road and waterway, and to bar transportation operators from taking passengers out of Wuhan. The epidemic command centers of other cities in Hubei Province start ordering lockdowns. 9:09 p.m. CST: Hubei Province's epidemic command center suspends all intra-provincial flights, trains, buses, and ferry travel in and out of the city of Wuhan. The provinces of Zhejiang, Guangdong, and Hunan are the first to raise their public health emergency response levels to Level I (\"extremely significant\"), the highest of four levels in China's public health emergency management system. The Level I alert makes provincial governments responsible for coordinating emergency measures related to the epidemic undertaken by government, health authorities, medical institutions, centers for disease control and prevention, and border and quarantine authorities. A WHO Emergency Committee convened under the International Health Regulations (2005) is unable to reach consensus on whether the outbreak constitutes a Public Health Emergency of International Concern. The committee requests to reconvene in 10 days' time. The 15-member body includes a U.S. citizen, Dr. Martin Cetron of U.S. CDC, and a citizen of China, Wannian Liang of China's National Health Commission. The State Department orders the mandatory departure of nonemergency U.S. personnel and their family members from the U.S. consulate in Wuhan. National Security Adviser Robert O'Brien briefs President Trump for the first time on \"the potential pandemic threat\" of the novel coronavirus. Hubei Province's newly-established epidemic command center raises the province's public health emergency response level to Level I. Additional cities in the province impose travel and transport restrictions, putting tens of millions of residents under partial lockdown. An article published in T he Lancet medical journal raises questions about whether Wuhan's Huanan Seafood Wholesale Market is the source of the virus. The co-authors, including experts from Wuhan's leading infectious disease hospital, report that among the first 41 patients identified in Wuhan, the first patient to show symptoms, on December 1, 2019, had no exposure to the market. Two of the next three patients to show symptoms, all on December 10, also had no exposure to the market. WHO updates its advice for international travelers. Whereas on January 10 it advised against entry screening for travelers, it now notes that in the current outbreak \"the majority of exported cases were detected through entry screening.\" It thus \"advises that measures to limit the risk of exportation or importation of the disease should be implemented, without unnecessary restrictions of international traffic.\" President Trump tweets, \"China has been working very hard to contain the Coronavirus. The United States greatly appreciates their efforts and transparency. It will all work out well. In particular, on behalf of the American People, I want to thank President Xi!\" The State Department raises its travel alert for Hubei Province to Level 4 (\"Do not travel\"), its highest alert level, due to the coronavirus outbreak. Lunar New Year's Day, also known as Spring Festival. China's Politburo Standing Committee meets for the third time since January 7. This is the first meeting at which the novel coronavirus is contemporaneously acknowledged to be on the agenda. State media reports the body discusses prevention and control of the outbreak and establishes a high-level working group, known as a central leading group, to oversee control efforts. By 9 p.m. CST, 30 of mainland China's 31 provincial-level jurisdictions have raised their public health alerts to Level I. The only such jurisdiction not to do so is Tibet, which has not so far identified a suspected or confirmed case of novel coronavirus infection. China's National Institute for Viral Disease Control and Prevention, part of China CDC, announces it has confirmed the presence of the novel coronavirus in environmental samples collected from Wuhan's Huanan Seafood Wholesale Market earlier in the month. According to Xinhua, 33 of 585 samples from the market test positive. Of these, all but two were collected from an area of the market where wildlife vendors were concentrated. Xinhua says the results indicate \"the virus stems from wild animals on sale at the market.\" The Communist Party of China announces the establishment of the new top-level Party body focused on combating the epidemic, the Central Leading Small Group for Work to Counter the Novel Coronavirus Infection Pneumonia Epidemic. The Party names Premier Li Keqiang, the Communist Party's second-most senior official, to head the body. At a press conference in Beijing, a senior official says his ministry is working to divert personal protective equipment (PPE) that Chinese factories make for exportâabout 50,000 sets a dayâto domestic use. Vice Minister Wang Jiangping of the Ministry of Industry and Information Technology presents the challenge as one of tweaking China's standards rules to allow PPE made to European and U.S. standards to be used in China. Wang says China has also begun procuring PPE from abroad, with 220,000 sets of PPE purchased on the international market currently on their way to China. In a nationally televised interview, Wuhan Mayor Zhou Xianwang acknowledges having failed to disclose information \"in a timely manner\" and says China's Law on Prevention and Control of Infectious Diseases restricted Wuhan from sharing information without permission from higher-ups. Zhou also acknowledges that an estimated 5 million people left Wuhan before travel restrictions went into effect. Premier Li Keqiang, head of the Communist Party's Leading Group on Prevention and Control of the Novel Coronavirus Epidemic, visits Wuhan and thanks front-line workers. In an effort to reduce the movement of people across the country, China's government extends the Lunar New Year Holiday to February 2, 2020. It had originally been scheduled to last from January 24 to 30. The government will later extend the holiday to February 13, 2020, in Hubei Province. HHS Secretary Azar speaks to the Chinese National Health Commission Director Ma Xiaowei, and repeats his offer to send a U.S. CDC team to China to assist with COVID-19 public health response efforts. Neither side discloses how Minister Ma responds, if at all, but no CDC team goes to China at this time. Weigong Zhou, an employee of U.S. CDC, and Clifford Lane, an employee of the U.S. National Institutes of Health (NIH), will, however, participate in a WHO-China Joint Mission to China from February 16 to 24. President Trump tweets, \"We are in very close communication with China concerning the virus. Very few cases reported in USA, but strongly on watch. We have offered China and President Xi any help that is necessary. Our experts are extraordinary!\" U.S. CDC issues its highest-level travel health notice, Level 3, recommending that travelers avoid all nonessential travel to China. The State Department raises its own travel advisory for all of China to Level 3 of 4, urging U.S. citizens to \"reconsider travel\" to China, while retaining its Level 4 travel advisory for Hubei Province. China's Supreme People's Court criticizes Wuhan Public Security Bureau officers for their reprimand of the eight Wuhan citizens accused of spreading rumors about the new disease. \"It might have been a fortunate thing if the public had believed the 'rumors' then and started to wear masks and carry out sanitization measures, and avoid the wild animal market,\" the court posts on its WeChat account. President Xi Jinping and WHO Director-General Tedros Adhanom Ghebreyesus meet in Beijing. According to WHO, they agree \"that WHO will send international experts to visit China as soon as possible.\" (They will begin their mission to China nearly three weeks later, on February 16.) WHO also requests that China \"share biological material with WHO,\" indicating that China has not yet shared biological samples with WHO. WHO quotes Tedros as saying, \"We appreciate the seriousness with which China is taking this outbreak, especially the commitment from top leadership, and the transparency they have demonstrated, including sharing data and [the] genetic sequence of the virus.\" WHO raises its global level risk assessment to \"high,\" one rung below its risk assessment for China, which is \"very high.\" A U.S. State Department-organized charter flight leaves Wuhan carrying 195 U.S. government personnel and their family members, private U.S. citizens and their family members, and some third country nationals. The flight will arrive in California the same day. The United States is the first country to evacuate its citizens from Wuhan. The State Department will organize four more evacuation flights from Wuhan before the end of February. Secretary of State Michael R. Pompeo speaks by telephone with Yang Jiechi, a member of the Communist Party of China's 25-person Politburo, the country's second highest decisionmaking body. The call is the most senior-level U.S.-China conversation related to the novel coronavirus to date. According to the State Department, Pompeo \"expressed condolences for the Chinese citizens who lost their lives as a result of the coronavirus outbreak.\" He also thanked Yang for assistance in evacuating Americans from Wuhan. According to China's state news agency, Xinhua, \"Pompeo conveyed sympathy for the casualties\" in China and \"expressed appreciation for China's timely response to U.S. concerns after the outbreak of the epidemic.\" The State Department authorizes the voluntary departure of nonemergency personnel and family members of U.S. government employees from remaining diplomatic posts in mainland China: the Embassy in Beijing and consulates in the Chinese cities of Chengdu, Guangzhou, Shanghai, and Shenyang. WHO Director-General Tedros reconvenes the Emergency Committee under the International Health Regulations (2005). The committee advises him that the novel coronavirus outbreak constitutes a \"Public Health Emergency of International Concern\" (PHEIC). Tedros declares the PHEIC. He states, \"Let me be clear: this declaration is not a vote of no confidence in China. On the contrary, WHO continues to have confidence in China's capacity to control the outbreak.\" He also states, \"WHO doesn't recommend limiting trade and movement.\" At a campaign rally in Iowa, President Trump states, \"maybe we've never had a better relationship [with China] and we[']re working with them very closely on the Coronavirus. We're working with them very, very closely. We only have five people [infected]. Hopefully everything's going to be great. They have somewhat of a problem, but hopefully it's all going to be great. But, we're working with China just so you know, and other countries very, very closely, so it doesn't get out of hand, but it's something that we have to be very, very careful with, right? We have to be very careful.\" The President announces the formation of the President's Coronavirus Task Force, headed by HHS Secretary Azar, with coordination provided by the National Security Council. The State Department elevates its travel advisory for all of China to Level 4 (\"do not travel\") and advises Americans in China to \"consider departing using commercial means.\" Daily confirmed cases peak in areas of China outside Hubei, with 875 new confirmed cases reported outside the province. Dr. Li Wenliang posts to social media platform Weibo from his iPhone, recounting the details of his encounter with the law and his struggle with the virus. The next day, Li will share in his last-ever social media post that he has tested positive for the novel coronavirus. Li will die from COVID-19 on February 7, at age 33. The State Department orders the departure of all under-age-21 family members of U.S. personnel in China. President Trump signs Proclamation 9984, effective February 2, suspending entry into the United States of most foreigners who were physically present in mainland China during the preceding 14-day period. The order does not apply to lawful permanent residents, most immediate relatives of U.S. citizens and lawful permanent residents, and some other groups. HHS Secretary Azar declares a public health emergency for the United States \"to aid the nation's healthcare community in responding to 2019 novel coronavirus.\" He also announces that beginning February 2, all U.S. citizens returning to the United States who have been in Hubei Province in the previous 14 days will be subject to up to 14 days of mandatory quarantine. Azar states, \"The United States appreciates China's efforts and coordination with public health officials across the globe and continues to encourage the highest levels of transparency.\" WHO's daily situation report reports a cumulative tally of 9,748 confirmed cases in mainland China and 78 cases in the rest of the world. First identified in Wuhan, China, in December 2019, coronavirus disease 2019 (COVID-19) is now a global pandemic. The timeline below includes key developments in the responses of China, the World Health Organization (WHO), and the United States through January 31, 2020, the day U.S. Department of Health and Human Services (HHS) Secretary Alex M. Azar II declared the pandemic had become a public health emergency for the United States. Late December: Hospitals in Wuhan, China identify cases of pneumonia of unknown origin. December 30: The Wuhan Municipal Health Commission issues \"urgent notices\" to city hospitals about cases of atypical pneumonia linked to the city's Huanan Seafood Wholesale Market. The notices leak online. | Wuhan medical workers, including ophthalmologist Li Wenliang, trade messages about the cases in online chat groups. December 31: Chinese media outlets confirm the authenticity of the official \"urgent notices\" that spread online overnight and publish reports about the outbreak. A machine translation of one such media report is posted to ProMED, a U.S.-based open-access platform for early intelligence about infectious disease outbreaks. WHO headquarters in Geneva sees the ProMED post. Following protocols established in International Health Regulations (IHR) (2005), an international health agreement, WHO headquarters instructs the WHO China Country Office to request verification of the outbreak from China's government. | The Wuhan Municipal Health Commission issues its first public statement on the outbreak, saying it has identified 27 cases. January 1: WHO's China Country Office requests China verify the outbreak. | Wuhan authorities shut down the city's Huanan Seafood Wholesale Market. A Chinese Center for Disease Control and Prevention (China CDC) team collects environmental samples from the closed market for analysis. | Wuhan's Public Security Bureau announces it has investigated eight people for \"spreading rumors\" about the outbreak. January 3: Dr. Li Wenliang is summoned to a local police station, where he is reprimanded for spreading allegedly false statements about the outbreak online. | China CDC Director-General Gao Fu (George F. Gao) tells U.S. Centers for Disease Control and Prevention (U.S. CDC) Director Robert Redfield about a respiratory illness spreading in Wuhan. January 4: In its first public statement on the outbreak, WHO tweets, \"China has reported to WHO a cluster of pneumonia casesâwith no deathsâin Wuhan, Hubei Province.\" The tweet appears to confirm China's government has verified the outbreak to WHO under IHR (2005). January 5: A team led by Prof. Yong-zhen Zhang of Fudan University in Shanghai sequences the novel coronavirus' genome and deposits it in the U.S. National Institutes of Health's GenBank database of publicly available DNA sequences. January 6: Department of Health and Human Services (HHS) Secretary Alex M. Azar II and U.S. CDC Director Redfield offer to send U.S. CDC experts to China. | U.S. CDC issues a \"Watch Level 1 Alert\" for Wuhan due to \"a pneumonia outbreak of unknown cause\" and advises travelers to Wuhan to avoid animals, animal markets, and animal products. January 7: China CDC reportedly sequences the genome of the novel coronavirus. January 11 : Prof. Yong-zhen Zhang's team posts the genetic sequence of the virus on open-access platform Virological.org, becoming the first to share it with the world. | China CDC and two other teams post additional genetic sequences of the virus on Global Initiative on Sharing All Influenza Data (GISAID), another open-access platform. | China shares the virus' genomic sequence with WHO. | WHO issues guidance for international travel, recommending against entry screening for travelers. January 12: Dr. Li Wenliang is hospitalized with symptoms of the novel coronavirus. He will die from the disease on February 7. January 13: Thai authorities announce the first case of the novel coronavirus outside China. | Experts from Taiwan and the Chinese Special Administration Regions of Hong Kong and Macao visit Wuhan. A National Health Commission official tells them \"limited human-to-human transmission cannot be excluded.\" January 14: WHO headquarters tweets, \"Preliminary investigations conducted by the Chinese authorities have found no clear evidence of human-to-human transmission.\" The acting head of WHO's emerging diseases unit tells a press conference in Geneva, \"it is certainly possible that there is limited human-to-human transmission.\" January 17: The Wuhan Municipal Health Commission states cases in the city stand at 45, with two deaths. | U.S. CDC and the U.S. Customs and Border Protection begin health screenings for travelers arriving from Wuhan at three U.S. airports. January 18: In a telephone call, HHS Secretary Azar briefs President Trump about the epidemic for the first time. January 20: The head of a high-level Chinese National Health Commission expert team, Dr. Zhong Nanshan, confirms person-to-person transmission of the novel coronavirus and infections among medical workers. | Wuhan establishes an epidemic prevention and control command center. | China declares the disease caused by the novel coronavirus a statutory notifiable infectious disease under the PRC Law on the Prevention and Treatment of Infectious Diseases and an infectious disease for the purposes of the PRC Health and Quarantine Law , opening the way for mandatory quarantines and lock downs. | Communist Party General Secretary Xi Jinping issues an \"important instruction\" to prioritize epidemic prevention and control work and orders \"timely issuance of epidemic information and deepening of international cooperation.\" | Experts from WHO's China Country Office and its Western Pacific Regional Office arrive in Wuhan for an overnight visit. January 21: WHO issues its first situation report on the novel coronavirus. | U.S. CDC confirms the first novel coronavirus case in the United States, in a patient who returned from Wuhan on January 15, 2020. January 23: At 2 a.m. CST, Wuhan's new epidemic command center issues its first order, suspending public transportation and barring residents from leaving the city, effective at 10 a.m. | Provinces around China begin raising their public health alerts to Level I (\"extremely significant\"), making provincial governments responsible for coordinating emergency measures related to the epidemic. | An Emergency Committee convened by WHO under IHR (2005) does not reach consensus on whether the outbreak constitutes a Public Health Emergency of International Concern. | The U.S. State Department orders the mandatory departure of nonemergency U.S. personnel and their families from the U.S. Consulate in Wuhan. | National Security Adviser Robert O'Brien briefs President Donald J. Trump for the first time on \"the potential pandemic threat\" of the novel coronavirus. January 24: Additional cities in Hubei Province impose travel and transport restrictions, putting much of the province of 59 million under partial lockdowns. | WHO updates its advice for international travelers to advise measures to limit the risk of importing the disease, including entry screening. | President Trump tweets, \"China has been working very hard to contain the Coronavirus. The United States greatly appreciates their efforts and transparency.\" January 25: China's most senior decisionmaking body, the seven-man Communist Party Politburo Standing Committee, meets for the third time since January 7. For the first time, the novel coronavirus is contemporaneously acknowledged to be on the agenda. | All but one of mainland China's 31 provincial-level jurisdictions have by now raised their public health alerts to Level I. January 26: China CDC announces it has identified the novel coronavirus in samples collected from Wuhan's Huanan Seafood Wholesale Market earlier in the month. State media suggest this indicates the virus came from wild animals sold at the market. | At a press conference in Beijing, a Vice Minister of Industry and Information Technology says he is working to make personal protective equipment (PPE) manufactured for export available for domestic use. January 27: Premier Li Keqiang, head of a new Communist Party body on prevention and control of the epidemic, visits Wuhan. He is the first member of the Politburo Standing Committee to visit. | HHS Secretary Azar speaks to China's Minister of Health and repeats his offer to send a U.S. CDC team to China. | President Trump tweets, \"We have offered China and President Xi any help that is necessary.\" January 28: Chinese leader Xi Jinping and WHO Director-General Tedros Adhanom Ghebreyesus meet in Beijing. Xi agrees to accept a visit from a WHO international expert team. (The mission will begin February 16.) WHO requests that China \"share biological material with WHO,\" indicating China has not so far done so. | WHO raises its global level risk assessment to \"high,\" one rung below its risk assessment for China, which is \"very high.\" | China's Supreme People's Court criticizes the Wuhan Public Security Bureau for its reprimand of the eight Wuhan citizens accused of spreading rumors about the new disease. January 29: A U.S. State Department-organized charter flight carrying U.S. government personnel, their families, and private U.S. citizens evacuated from Wuhan arrives in California. | Secretary of State Michael R. Pompeo speaks by telephone with Yang Jiechi, a member of China's second highest decisionmaking body, the Communist Party's 25-person Politburo. The call is the highest-level U.S.-China conversation related to the novel coronavirus to date. Pompeo expresses condolences for Chinese lives lost in the outbreak and thanks Yang for China's assistance in evacuating the Americans from Wuhan. January 30: WHO Director-General Tedros declares the epidemic a Public Health Emergency of International Concern. | President Trump states, \"maybe we've never had a better relationship\" with China, and says the two countries are working together \"very closely\" to respond to the epidemic. | The President announces the formation of the President's Coronavirus Task Force, headed by HHS Secretary Azar, with coordination provided by the National Security Council. | The State Department elevates its travel advisory for all of China to Level 4 (\"do not travel\") and advises Americans in China to \"consider departing using commercial means.\" January 31: President Trump signs Proclamation 9984, suspending entry into the United States of most foreigners who were physically present in mainland China during the preceding 14-day period, effective February 2. | HHS Secretary Azar declares a public health emergency for the United States \"to aid the nation's healthcare community in responding to 2019 novel coronavirus.\" He also announces that beginning February 2, all U.S. citizens returning to the United States who have been in Hubei Province in the previous 14 days will be subject to up to 14 days of mandatory quarantine. | WHO's daily situation report reports a cumulative total of 9,748 confirmed cases in mainland China and 78 cases in the rest of the world.", "summary": "In Congress, multiple bills and resolutions have been introduced related to China's handling of a novel coronavirus outbreak in Wuhan, China, that expanded to become the coronavirus disease 2019 (COVID-19) global pandemic. This report provides a timeline of key developments in the early weeks of the pandemic, based on available public reporting. It also considers issues raised by the timeline, including the timeliness of China's information sharing with the World Health Organization (WHO), gaps in early information China shared with the world, and episodes in which Chinese authorities sought to discipline those who publicly shared information about aspects of the epidemic. Prior to January 20, 2020âthe day Chinese authorities acknowledged person-to-person transmission of the novel coronavirusâthe public record provides little indication that China's top leaders saw containment of the epidemic as a high priority. Thereafter, however, Chinese authorities appear to have taken aggressive measures to contain the virus. The Appendix includes a concise version of the timeline. A condensed version is below: Late December: Hospitals in Wuhan, China, identify cases of pneumonia of unknown origin. December 30: The Wuhan Municipal Health Commission issues \"urgent notices\" to city hospitals about cases of atypical pneumonia linked to the city's Huanan Seafood Wholesale Market. The notices leak online. | Wuhan medical workers, including ophthalmologist Li Wenliang, trade messages about the cases in online chat groups. December 31: A machine translation of a Chinese media report about the outbreak is posted to ProMED, a U.S.-based open-access platform for early intelligence about infectious disease outbreaks. WHO headquarters in Geneva sees the ProMED post and instructs the WHO China Country Office to request verification of the outbreak from China's government. | The Wuhan Municipal Health Commission issues its first public statement on the outbreak, saying it has identified 27 cases. January 1: Wuhan authorities shut down the city's Huanan Seafood Wholesale Market. January 3: Dr. Li Wenliang is reprimanded by local Wuhan police for spreading allegedly false statements about the outbreak online. | Chinese Center for Disease Control and Prevention (China CDC) Director-General Gao Fu tells U.S. Centers for Disease Control and Prevention (U.S. CDC) Director Robert Redfield about a pneumonia outbreak in Wuhan. January 4: In its first public statement on the outbreak, WHO tweets, \"China has reported to WHO a cluster of pneumonia casesâwith no deathsâin Wuhan, Hubei Province.\" January 6: Department of Health and Human Services (HHS) Secretary Alex M. Azar II and U.S. CDC Director Redfield offer to send U.S. CDC experts to China. | U.S. CDC issues a \"Watch Level 1 Alert\" for Wuhan and advises travelers to Wuhan to avoid animals, animal markets, and animal products. January 11 : A team led by Prof. Yong-zhen Zhang of Fudan University in Shanghai posts the genetic sequence of the virus on an open-access platform, sharing it with the world. | China CDC and two other Chinese teams subsequently also post genetic sequences of the virus on an open-access platform. | China shares the virus' genomic sequence with WHO. January 1 2: Dr. Li Wenliang is hospitalized with symptoms of the novel coronavirus. January 20: China confirms person-to-person transmission of the novel coronavirus and infections among medical workers. January 21: U.S. CDC announces the first novel coronavirus case in the United States, in a patient who returned from Wuhan on January 15, 2020. January 23: Wuhan suspends public transportation and bars residents from leaving the city. January 28: Chinese leader Xi Jinping and WHO Director-General Tedros Adhanom Ghebreyesus meet in Beijing. January 30: WHO Director-General Tedros declares the epidemic a Public Health Emergency of International Concern. | President Trump announces the formation of the President's Coronavirus Task Force. January 31: President Trump suspends entry into the United States of most foreigners who were physically present in mainland China during the preceding 14-day period, effective February 2. | HHS Secretary Azar declares a public health emergency for the United States to aid response to the novel coronavirus.", "document_type": "crs"}
{"report": "The poverty rate among Americans aged 65 and older has declined by almost 70% in the past five decades. In 2017, 4.7 million people aged 65 and older had income below the federal poverty thresholds. The poverty rate (i.e., the percentage who were in poverty) among the aged fell from 28.5% in 1966 to 9.2% in 2017. Several government programs have contributed to older Americans' increased incomes, including Old Age, Survivor and Disability Insurance (OASDI, commonly known as Social Security) and Supplemental Security Income (SSI). However, certain groups of older Americans, such as widows, divorced women, and never married men and women, are still vulnerable to poverty. Congress may be interested in the effect of existing programs that reduce poverty, as well as potential proposals aimed at improving income among vulnerable groups of older Americans. This report presents the time trends and current status of poverty rates among Americans aged 65 and older, as well as poverty rates among different demographic groups of the aged. This report also summarizes federal programs that may provide income to the aged poor. Over the past several decades, criticisms of the official poverty measure have led to the development of an alternative research measure called the Supplemental Poverty Measure (SPM), which the Census Bureau also computes and releases. This report compares the official aged poverty measure with the SPM and provides statistics measuring the impact of federal cash benefits (mainly Social Security and SSI), taxes, and in-kind benefits (such as housing, energy, and food assistance) on aged poverty. Poverty status is determined by comparing a measure of a family's resources against a measure of its needs. Families whose resources are less than a dollar amount representing an austere level of \"needs\" are considered to be in poverty. However, defining resources and needs is not straightforward. The official poverty measure is based on 48 dollar amounts called poverty thresholds that vary by family size and composition, but not by geographic area. These official thresholds were developed in the 1960s, were based on food consumption in 1955 and food costs in 1961, and are updated annually for inflation. As such, they reflect a level of deprivation based on a restrictive food budget, but are not based on a full measurement of families' and individuals' needs and their associated costs. Family resources are measured in dollars and are based on cash income before taxes. All poverty data presented in this report are estimates based on a survey, and like all survey estimates, they are subject to sampling and nonsampling error. The poverty research community has discussed the official poverty measure's limitations for decades. Its use of pretax income renders it unhelpful in gauging tax credits' effects on the low-income population. It does not consider in-kind (noncash) benefits, such as housing subsidies as income, and as a result cannot (on its own) illustrate such benefits' effects on the poor population. Although the measure of need represented by the thresholds is updated every year for overall inflation, it may not accurately reflect the current costs of basic needs, because prices for goods and services related to basic needs may not rise at the same rate as prices for luxury items. Since the official measure's initial development, new data sources have offered more detail on the goods and services families consume, but developing an approach that defines basic needs and determines available resources for families to spend on those needs has taken decades of research and discussion. The SPM resulted from that research, and is described briefly in the section, \" The Supplemental Poverty Measure .\" Notwithstanding the official measure's limitations, for more than 50 years, it has provided a consistent measure of poverty in the United States, with few methodological changes over that time, and it is based on empirical measures of need (food budgets and food consumption, albeit in 1961 and 1955, respectively) . For these reasons, trends for the aged population based on the official measure are discussed below. The proportion of Americans aged 65 and older who lived in poverty has declined significantly in the past 50 years. In 1966, 28.5% of Americans aged 65 and older had family incomes below the poverty thresholds. By 2017, the poverty rate among older Americans had dropped to 9.2% (see Figure 1 ). However, whereas the proportion of persons aged 65 and older who live in poverty has fallen over the past five decades, the number of aged poor has increased since the mid-1970s as the total number of elderly people has grown. In 1974, 3.1 million people aged 65 and older had income below the federal poverty thresholds, whereas in 2017, 4.7 million people aged 65 and older had income below the thresholds. The poverty rate for Americans aged 65 and older historically was higher than the rates for adults aged 18 to 64 and children under the age of 18, but today it is the lowest among those three age groups. In 1966, the poverty rate among persons aged 65 and older was 28.5%, compared with 10.5% among adults aged 18 to 64 and 17.6% among children under the age of 18. In 1974, the aged poverty rate fell below the rate among children under the age of 18, and by the early 1990s, the aged poverty rate had fallen below the rate among adults aged 18 to 64. The elderly poverty rate has remained lower than the nonelderly adult poverty rate since that time. The poverty rate among Americans aged 65 and older was 9.2% in 2017, which was lower than the 11.2% poverty rate among adults aged 18 to 64 and the 17.5% poverty rate among children under 18 years old (see Figure 2 ). Poverty status among Americans aged 65 and older generally varies across different demographic groups. This section describes the aged population's poverty status for selected demographic characteristics based on age groups, gender, marital status, and race and Hispanic origin. People aged 80 and older have a higher poverty rate than older Americans under the age of 80. Figure 3 displays the percentage of Americans aged 65 and older who were in poverty by age groups from 1975 to 2017. In 1975, the poverty rate among individuals who were in the oldest age group (80 and older) was 21.5%, compared with 16.4% among Americans aged 75-79, 14.4% among those aged 70-74, and 12.5% among those aged 65-69. Poverty rates declined over the past 40 years, and in 2017, approximately 11.6% of people aged 80 and older lived in poverty (a 10 percentage-point reduction from 1975), but the share was still higher than the 9.3% poverty rate among individuals aged 75-79, 8.6% among those aged 70-74, and 7.9% among those aged 65-69. Individuals aged 80 and older might be more vulnerable to income risks because they are more likely to have lower or no earnings (as they phase out of the labor force), exhaust existing retirement resources, have reduced purchasing power in certain defined benefit pensions, and incur higher medical expenses. Women aged 80 and older had the highest poverty rate among elderly women and men in all age groups (see Figure 4 ). In 1975, the poverty rate among women aged 80 and older was 25.1%, compared with 15.2% among men in the same age group and 14.9% among women aged 65-69. In 2017, the poverty rate of women aged 80 and older declined to 13.5%, compared with 8.7% among men in the same age group and 8.6% among women aged 65-69. Poverty status among individuals aged 80 and older varies depending on whether the person is living with other family members. Poverty rates for those living with other family members in 2017 were less than half the rates for those living alone. In 2017, the poverty rate for men aged 80 and older was 6.3% if they lived with other family members, and 15.5% if they lived alone (see Figure 5 ). In the same year, the poverty rate for women aged 80 and older was about 8.2% if they lived with other family members and 18.6% if they lived alone. Americans aged 65 and older who were married and living together at the time of the survey generally had a lower poverty rate than those who were not married (see Figure 6 ). In 1975, about 53.0% of individuals aged 65 and older were married and living together, and this percentage was slightly higher at 56.8% in 2017. Approximately 8.2% of married Americans aged 65 and older and living together had family incomes below the federal poverty threshold in 1975, and this rate declined to 4.4% in 2017. During the same period, the poverty rate among aged nonmarried Americans decreased from 23.4% to 15.5%. Figure 7 shows the poverty rate in 2017 by gender and marital status at the survey time. Married couples generally have significantly lower poverty rates than nonmarried individuals, and widowed and divorced women aged 65 or older are more likely to be in poverty than their male counterparts. Among women aged 65 and older, about 4.3% of married women had total incomes below the official poverty threshold in 2017, compared with 13.9% of widows, 15.8% of divorced women, and 21.5% of never-married women. In contrast with the widowed and divorced men in this age group, who are less likely to be poor than widowed and divorced women, poverty rates are also high among never-married men, at a rate of 22.5% in 2017. In 2017, roughly 10% of individuals aged 65 and older lived in families with children under 18 years old. Poverty rates among aged men and women varied by the presence of children in the family (see Figure 8 ), although not always in the same direction. Among married men and women, a relatively higher share of those with children lived in poverty (8.0% for men and 7.5% for women) than those without any child (4.2% for men and 4.1% for women). Similarly, among never-married individuals, those with children also had higher poverty rates (25.4% for men and 22.7% for women) than those without children (22.4% for men and 21.4% for women). However, while widows and divorced women with children had higher poverty rates (14.8% and 17.9%, respectively) than those without children (13.8% and 15.6%, respectively), among men the pattern was reversed: 8.1% of widowers with children and 7.9% of divorced men with children were in poverty, lower than their childless counterparts (10.1% and 13.2%, respectively). Poverty rates vary by race and Hispanic origin, as shown in Figure 9 . In surveys, Hispanic origin is asked separately from race; accordingly, persons identifying as Hispanic may be of any race. The poverty rate for Americans aged 65 and older has decreased among persons identifying as black or African American alone, non-Hispanic white alone, and Hispanic from 1975 to 2017. Among aged African Americans, the poverty rate decreased from 36.3% in 1975 to 19.3% in 2017; among the aged non-Hispanic white population, from 13.0% to 7.0%; and among the aged Hispanic population, from 27.7% to 17.0%. During the period for which data are available, the poverty rate for the aged Asian population ranged between 10.0% and 16.0% with no consistent directional trend. As shown in Figure 10 , among the racial and Hispanic origin groups, in 2017, the poverty rate was lowest among the aged non-Hispanic white population (5.8% for men and 8.0% for women) and highest among the aged black population (16.1% for men and 21.5% for women). Social Security and Supplemental Security Income (SSI) are the two main federal programs that provide cash benefits to the aged poor. In 2017, Social Security accounted for 78.3% of total money income among aged individuals whose family incomes were below 100% of the poverty threshold and 81.3% among those with family incomes below 125% of the poverty threshold (see Table 1 ). In the same year, SSI and other cash public assistance accounted for 11.0% of the total money income for aged individuals whose family incomes were below 100% of the poverty threshold and 7.6% for those with family incomes below 125% of the poverty threshold. Social Security is a federal social insurance program that provides benefits to insured workers and their eligible family members, provided the workers worked in jobs covered by Social Security for a sufficient number of years and meet certain other criteria. Social Security is not designed solely for the poor, but benefits are weighted to replace a greater share of career-average earnings for low-paid workers than for high-paid workers. One study suggests that increased Social Security benefits explained most of the decline in poverty among the aged that occurred during 1967 to 2000 (see Figure 1 ). Social Security benefits alone, however, would not be sufficient to eliminate poverty for a large number of older Americans. The poverty rate among Social Security beneficiaries aged 65 and older was 6.5% in 2017. Although the Social Security program contains a special minimum benefit provision that increases benefits to workers who have many years of low earnings and meet certain other criteria, this provision has virtually no effect on the benefits paid to today's new retirees. According to the Census Bureau's analysis, 30.0% of Americans aged 65 and older would live in poverty without Social Security benefits, holding other resources and expenses constant. SSI is a federal assistance program that provides monthly cash benefits to aged, blind, and disabled individuals who have limited income and assets. The program is intended to provide a minimum level of income to adults who have difficulty meeting their basic living expenses due to age or disability and who have little or no Social Security or other income. Some studies show that the SSI program does not provide effective income protection for the oldest Americans. For example, the maximum SSI benefit in 2017 was 75% of the poverty threshold for an elderly single person and 89% of the poverty threshold for an elderly married couple. Thus, aged SSI recipients may still be impoverished. Furthermore, the maximum SSI benefit is more generous for married couples, who are less likely to need assistance than elderly single individuals. Some researchers also suggest that restructuring the Social Security special minimum benefit provision could be more effective in alleviating poverty than making certain reforms to the SSI program, although a combination of reforms to both programs could be useful if regular Social Security benefits are greatly reduced in the future. The federal government also provides certain noncash benefits to help the elderly poor, such as housing subsidies and Supplemental Nutrition Assistance Program (SNAP) benefits. Congress funds housing subsidy programs, ranging from public housing to government subsidies to renters, to help poor and vulnerable populations meet their housing needs. SNAP is designed primarily to increase the food purchasing power of eligible low-income households to help them buy a nutritionally adequate low-cost diet. Individuals aged 65 and older may also receive a small portion of income from some other federal programs, including refundable tax credits, school meals, Temporary Assistance for Needy Families (TANF), the Low Income Home Energy Assistance Program (LIHEAP), unemployment insurance, workers' compensation, and the Special Supplemental Nutrition Program for Women, Infants and Children (WIC). The official poverty measure is of limited value for analyzing various federal programs' effects on poverty status among the aged population, but the Supplemental Poverty Measure (SPM), discussed in the following section, addresses some of those impacts. The official poverty measure was developed in the 1960s and was established by the Bureau of the Budget (later the Office of Management and Budget, OMB) for measuring the official poverty rate in the United States. Under the official poverty measure, an individual is counted as poor if his or her family's pretax money income falls below the poverty threshold. One of the main criticisms of the official poverty measure is that pretax money income excludes the value of government noncash benefits (such as health insurance, SNAP, or housing assistance) provided either privately or publicly. It also does not consider taxes paid to federal, state, or local governments, or tax benefits (such as the Earned Income Tax Credit) that families might receive. The Census Bureau's SPM was designed to address the official poverty measure's limitations and has been published since 2011. The SPM poverty thresholds measure a standard of living based on expenditures for food, clothing, shelter, and utilities (FCSU) and \"a little more\" for other expenses. Its thresholdsâdollar amounts related to the level of need for a familyâvary by whether the family rents, owns a home with a mortgage, or owns a home without a mortgage (the latter of which is more common among the aged population than it is among younger populations). It computes the amount of resources available after taxes, includes the values of noncash benefits, and subtracts some expenses (such as work-related expenses and medical out-of-pocket expenses, the latter of which tend to be higher among the aged than among younger populations). In 2017, the most recent data available, the SPM poverty rate for persons aged 65 and older was 14.1% in 2017, compared with 9.2% using the official poverty measure. This higher poverty rate results largely from higher medical out-of-pocket costs among the aged, in spite of lower housing expenses among the aged, who are more likely to have paid off their mortgages. The data presented in Figure 11 illustrate how changing the definition of the SPM to exclude a particular resource or expenditure can affect the SPM poverty rate among Americans aged 65 and older. The data do not consider the behavioral effects that may occur if the resource or cost were to be eliminated in reality. Social Security has the greatest effect, by far, on the poverty status of the aged population. Removing Social Security as a resource while holding the other resources and expenditures constant would increase the SPM aged poverty rate by more than 34.6%. Among the other resources, SSI, housing subsidies, and SNAP had the next-largest impacts on the SPM poverty rate, but were a full order of magnitude smaller (around a single percentage point instead of tens of percentage points). The remaining resources affected the SPM poverty rate by much less than one percentage point. Three of the resources shown are related to child rearing (child support, school lunch, and WIC), and tax credits are often targeted to families with children. Households headed by people aged 65 and older are less likely than nonelderly households to have children present in the family. Among the expenses considered in the SPM but not considered in the official measure, medical out-of-pocket costs had the largest effect: deducting those costs from family income raised the SPM poverty rate by 5.4%. Given that the aged population tends to have greater medical need and higher out-of-pocket health care costs than younger populations, it is perhaps not surprising that medical costs had a larger effect than the other costs shown in the figure. The remaining costs were largely related to work, and, congruent with the aged population's lower likelihood to be working compared with younger populations, these costs affected the aged population's SPM poverty rate by less than one percentage point. Approximately 1.2 million persons in nursing homes are aged 65 or older. Poverty status is not measured for the institutionalized population, which includes persons in nursing homes, prisons, or military personnel living on base. This exclusion is not trivial considering that the population in nursing homes is about one-fourth as large as the 4.7 million persons aged 65 or older who were in poverty in 2017. Poverty is used as a measure of well-being, but it measures only economic well-being and does not directly include a person's health status. Health status may influence the amount and types of income a person receives (by affecting, for example, ability to work or receive disability benefits) and is thus considered indirectly. However, the noneconomic aspect of well-being that comes from good health is not considered in the poverty measures discussed in this report. Furthermore, in the SPM, medical out-of-pocket expenses are considered, but the overall value of health insurance programs to the individual, which may well exceed out-of-pocket costs for medical care or insurance premiums, is not. Considering that Medicaid is an important vehicle for long-term care, the benefits Medicaid provides to the aged population could be characterized as fulfilling needs that are not solely medical in nature, but have economic value as well. ", "summary": "The poverty rate among Americans aged 65 and older has declined by almost 70% in the past five decades. In 2017, approximately 9.2% of Americans aged 65 and older had income below the poverty thresholds. However, the number of aged poor has increased since the mid-1970s as the total number of elderly has grown. In 2017, 4.7 million people aged 65 and older lived in poverty. The poverty rate for Americans aged 65 and older historically was higher than the rates for younger groups, but the aged have experienced lower poverty rates than children under age 18 since 1974 and lower rates than adults aged 18 to 64 since the early 1990s. In 2017, the 9.2% poverty rate among Americans aged 65 and older was lower than the 11.2% poverty rate among adults aged 18 to 64 and the 17.5% poverty rate among children under 18 years old. Although the poverty rate has generally declined for older Americans in most demographic groups, certain aged people still live in poverty. For example, People aged 80 and older have a higher poverty rate than other elderly Americans. In 2017, approximately 11.6% of people aged 80 and older lived in poverty, compared with poverty rates of 9.3% among individuals aged 75-79, 8.6% among those aged 70-74, and 7.9% among those aged 65-69. Women aged 80 and older had the highest poverty rate among elderly women and men in all age groups, at 13.5% in 2017 for women aged 80 and older, and 18.6% for those living alone. Americans aged 65 and older who were married and living together with spouses at the time of the survey generally had a lower poverty rate than those who were not married. Among women aged 65 and older, about 4.3% of married women had total incomes below the official poverty threshold in 2017, compared with 13.9% of widows, 15.8% of divorced women, and 21.5% of never-married women. Among individuals aged 65 and older, poverty rates were also high among never-married men, at 22.5% in 2017. Poverty rates vary by race and Hispanic origin. Hispanic origin is distinct from race, and people may identify with one or more races. From 1975 to 2017, the poverty rate for Americans aged 65 and older has decreased for those identifying as non-Hispanic white alone, black alone, and Hispanic. In 2017, the poverty rate was lowest among the non-Hispanic white population (5.8% for men and 8.0% for women) and highest among those identifying as black or African American (16.1% for men and 21.5% for women). The official poverty measure is defined using cash income only, before taxes, and was computed based on food consumption in 1955 and food costs in 1961, indexed to inflation. That definition prevents the official measure from gauging the effects of noncash benefits, taxes, or tax credits on the low-income population, and it does not consider how certain other costs, such as housing or medical expenses, might affect them as well. After decades of research, the Supplemental Poverty Measure (SPM) was developed to address some of the official poverty measure's limitations. The SPM poverty rate for the aged population is higher than the official poverty rate (14.1% compared with 9.2% in 2017). This higher poverty rate results largely from higher medical out-of-pocket costs among the aged. Social Security and Supplemental Security Income (SSI) are the main federally funded programs that provide cash benefits to the aged poor; they accounted for almost 90% of total money income received by Americans aged 65 and older whose incomes were below the poverty thresholds in 2017. The federal government also provides certain noncash benefits to help the elderly poor, such as housing subsidies and Supplemental Nutrition Assistance Program (SNAP). The SPM poverty rate among individuals aged 65 and older would increase by more than 34 percentage points if Social Security benefits were excluded from their income resources, holding other economic behaviors constant. Among the other resources, eliminating SSI, housing subsidies, or SNAP from income would each increase the SPM poverty rate by about one percentage point.", "document_type": "crs"}
{"report": "Serious disruptions for certain industries caused by the COVID-19 (coronavirus) pandemic have led to calls for federal government assistance to affected industries. Although out of the ordinary, this would not be the first occasion on which the federal government has provided aid to troubled or financially distressed industries. To help inform congressional debate, this report examines selected past instances in which the government has aided troubled industries, providing information about the way in which such assistance was structured, the role of Congress, and the eventual cost. Assistance for distressed industries or businessesâsometimes popularly referred to as \"government bailouts\"âhistorically has taken different forms and has occurred under varying circumstances. Assistance has not been limited to outlays by the Treasury, or to actions explicitly authorized by Congress, or to measures which imposed a net cost on taxpayers on an unadjusted cash-flow basis. Sometimes, the industry distress was being driven by external shocks, such as the 9/11 terrorist attacks or the 2007-2009 financial crisis, and other times it was driven by long-term secular trends, such as changes in the economic outlook for the railroad industry. Past assistance has involved such instruments as loan guarantees, asset purchases, capital injections, direct loans, and regulatory changes, with the specific mix of policies varying significantly from case to case. These differences make it somewhat subjective what should be defined as a \"bailout.\" In order to provide greater detail, the examples discussed in this report all involve cases in which federal assistance was (1) widely available to firms within an industry rather than being targeted to a particular firm; (2) extraordinary in nature rather than a type of assistance that is routinely provided; and (3) motivated primarily by a desire to prevent industry-wide business failures. For each case, the report provides data on the costs and income to government, to the extent that they are available. In some of the cases reviewed in this report, the government was able to recoup much or all of its assistance through fees, interest, warrants, and loan or principal repayments. In others, there were no arrangements made for recoupment or repayment. But the fact that a beneficiary of government assistance repaid a loan or gave the government shares that ultimately increased in value does not necessarily mean that the government \"broke even\" or \"made a profit.\" The government had to borrow, incurring interest payments, to finance these programs, and adjusting federal outlays and receipts for inflation may not account fully for this. In most cases, although not all, government assistance was provided under the assumption that it would be repaid, exposing the government to risk of credit loss that is not accounted for simply by adding up expenditures and receipts. An economist would typically determine whether the government received full compensation for credit assistance by comparing the government's terms to what a private investor would have required for the loan or loan guarantee. Making such adjustments would increase the reported value of federal assistance and in some instances would indicate that taxpayers were not fully compensatedâalthough it is fair to question what terms would have been required, for example, by a hypothetical commercial lender in the depths of the 2007-2009 financial crisis, when private credit markets were not functioning normally. In any case, if such a standard were used, it would be a more demanding one than the government typically uses to measure the costs of federal credit and guarantee programs. The Congressional Budget Office (CBO) has provided assessments of the Troubled Asset Relief Program (TARP) adjusting for borrowing costs and market risk, but CBO has not offered such estimates of other government assistance. The final disposition of assets and liabilities arising from assistance often can take years. But not all sources continued to consistently report data long after the initial intervention. Thus, while the cost estimates presented here are based on official sources, they sometimes involve a degree of uncertainty. In some cases, precise information on the timing of outlays and recoupments is unclear and assumptions are necessary in order to compute the inflation adjustments. Where there is uncertainty about the timing of payments, we present a range of possible inflation-adjusted outcomes. There are broader policy concerns raised by government assistance that are difficult to quantify and do not get captured in tallies of the government's income and expenses. Potential benefits of assistance can include avoiding potentially long-lasting disruptions to consumers, workers, local communities, and the overall economy; averting losses to federally guaranteed retirement funds; and maintaining federal tax revenues. Potential drawbacks to assistance include the possibility that it may reduce competition by rewarding incumbents over new entrants and distort the affected product market by causing (or prolonging) overproduction; that it may cause \"moral hazard\" if firms respond to government assistance by acting with less financial prudence in the future; and that it can delay an industry's adjustment to structural problems such as high production cost and excess capacity. In every case, federal assistance to certain industries may raise questions about the fairness of providing assistance to some businesses but not to others. Information on the various assistance programs comes primarily from reports from the Government Accountability Office (GAO), Congressional Research Service (CRS), and executive branch agencies involved in the assistance. Specific sources are cited in the individual sections. Reporting on the programs has varied significantly over the years as different agencies have undertaken the assistance under different statutory authority. In some cases, Congress has included specific reporting requirements when assistance is authorized or other specific oversight mechanisms. Historical vote totals are included from http://www.congress.gov and from Congressional Quarterly, CQ Almanac (various years). Various iterations of some bills received multiple votes; for brevity, we only include the final vote taken. Stock prices and market information are from the Wall Street Journal print and online versions. Inflation adjustments are based on gross domestic product (GDP) price index data from the Bureau of Economic Analysis. Throughout the 1950s, the rail industry was in decline as federal spending on highways and the growth of the airline industry ate into railroads' ability to compete with those other modes of transportation. One large railroad, the New York, Ontario and Western, which had been in financial distress since the 1930s, was liquidated in 1957. Rail industry leaders advocated for one or more of the following in order to counter this trend: permission to shut down unprofitable routes, especially passenger routes; direct subsidies to continue operations; and/or encouragement of large-scale mergers to create economies of scale. Congress' initial legislative response, the Transportation Act of 1958 ( P.L. 85-625 ), created a loan guarantee program for railroads and gave the Interstate Commerce Commission (ICC) sole authority over proposals to curtail service, circumventing the previous role of state agencies. Still, the industry underwent a wave of mergers, consolidating from 110 Class I railroads in 1957 to 71 in 1970. The process culminated in the 1968 merger of arch-rivals Pennsylvania Railroad and New York Central Railroad into the Penn Central, the largest railroad in the world at the time. By this time, a wave of bankruptcies was well underway. The New York, New Haven and Hartford Railroad had gone into bankruptcy in 1961 and was merged into the Penn Central in 1969, its inclusion having been a condition of the Penn Central-New York Central merger's approval by the ICC. The Central Railroad of New Jersey failed in 1967. Then, in declining financial condition due to falling revenues, badly rundown infrastructure, high property taxes, incompatible systems, and high labor costs, the Penn Central itself declared bankruptcy in June 1970, less than three years after its creation. Other railroads operating in the Northeast and Midwest also went bankrupt and could not be reorganized, some having suffered severe damage caused by Hurricane Agnes in 1972. The other troubled carriers included the Ann Arbor Railroad, the Reading Railroad, the Lehigh Valley Railroad, the Boston and Maine Railroad, and the Erie Lackawanna Railroad, itself the result of a merger of former competitors completed in 1960. In addition to disrupting passenger and freight transportation, the railroad industry's distress exposed a number of major banks and financial institutions to large potential losses. The commercial paper market, in which firms issue short-term securities to meet near-term financial needs, experienced disruptions following the Penn Central bankruptcy, leading to concerns that the Penn Central's problems could endanger companies in other industries. Several federal agencies, including the Department of Transportation, the Department of Defense, and the Federal Reserve, were unwilling or unable to assist troubled railroads with loan guarantees. The ICC sought to assist railroads by expediting approval of applications for mergers or abandonment of unprofitable lines, but this was not enough to forestall bankruptcies. Congress enacted several measures throughout the 1970s to avert the collapse of the rail industry. These actions combined federal financial assistance, deregulation, and the creation of new quasi-governmental private companies. The Rail Passenger Service Act of 1970 (P.L. 91-518), which was passed by voice vote in both houses of Congress, relieved all railroad companies of the obligation to provide intercity passenger service, creating a quasi-governmental private company called the National Railroad Passenger CorporationâAmtrakâto operate passenger trains over freight railroads' tracks with federal support. The act called for a \"basic system\" of key routes that the railroads would continue to operate until Amtrak began operations on May 1, 1971, and provided for railroad companies to transfer unneeded passenger rail equipment to Amtrak. The Emergency Rail Services Act of 1970 (P.L. 91-663) provided up to $125 million in loan guarantees to railroads to preserve essential service until a more permanent restructuring plan could be put in place. The law was passed in the Senate on a vote of 47-29 and in the House on a vote of 165-121. In March 1973, the bankruptcy court handling the Penn Central's case found that its finances were so precarious that it would likely need to cease all operations before October of that year. In December 1973, the Regional Rail Reorganization Act ( P.L. 93-236 ), also called the 3R Act, created the United States Railway Association (USRA) to provide additional emergency funding and prepare the restructuring and rehabilitation of Penn Central and other bankrupt railroads. The law passed the Senate on a vote of 45-16 and the House on a vote of 284-59. It provided for the creation of Conrailâofficially the Consolidated Rail Corporationâas a quasi-private for-profit corporation that would take over operations of various bankrupt railroads in the Northeast and Midwest. USRA was charged with creating a \"Final System Plan\" that identified the lines that would be transferred to Conrail. The Railroad Revitalization and Regulatory Reform (4R) Act of 1976 ( P.L. 94-210 ), which approved the USRA's \"Final System Plan,\" was enacted on February 5, 1976. It passed the House on a vote of 353-62 and the Senate on a vote of 58-26. Conrail was incorporated five days later, beginning operations on April 1, 1976, at which point its predecessorsâincluding the Penn Centralâceased to exist as railroad companies. In addition to taking responsibility for those railroads' physical infrastructure and freight operations, Conrail operated commuter services in several states. The 4R Act provided funding for Conrail, permitted and approved additional property designations under 3R, and facilitated the transfer of ownership of the Penn Central's Northeast Corridor line to Amtrak. Direct federal subsidies to Conrail took several forms including remuneration of direct operating losses, approximately $2.1 billion; capital rehabilitation, approximately $1.2 billion; and \"lifetime protection\" payments to employees of Conrail and its predecessors, approximately $650 million. Much of this flowed through USRA purchases of Conrail equity instruments. In addition, approximately $3 billion was paid to the estates of bankrupt railroads for property taken to create Conrail. Total assistance for Conrail was estimated at approximately $7 billion. The 4R Act also contained reforms aimed at easing ICC regulation of the railroad industry more broadly. Railroads were given greater flexibility to set shipping rates and were allowed for the first time to sign contracts with large shippers specifying rates and terms of service. The act gave the ICC the power to exempt certain types of freight traffic from rate regulation altogether. The act also created the Railroad Rehabilitation and Improvement Financing (RRIF) loan program, currently codified at 45 U.S.C. Â§Â§821-838, to offer long-term, low-cost loans to railroad operators. The RRIF program was intended to assist \"short line\" railroads, which took over many small lines that were being abandoned by larger railroads, to finance improvements to infrastructure and investments in equipment. The restructuring of the eastern railroads did not put an end to the industry's difficulties. In the Midwest, the Chicago, Rock Island and Pacific Railroad filed for bankruptcy in 1975, and the Chicago, Milwaukee, St. Paul and Pacific Railroad in 1977. They were not incorporated into Conrail, but were the subject of separate federal legislation. Congress passed the Milwaukee Railroad Restructuring Act ( P.L. 96-101 ) in both the House and the Senate by voice vote in 1979 and the Rock Island Railroad Transition and Employee Assistance Act ( P.L. 96-254 ) in both the House and Senate by voice vote in 1980. Each law contained worker protection provisions and empowered bankruptcy courts to accelerate the sale or abandonment of parts of their networks as part of restructuring. The Chicago, Milwaukee, St. Paul and Pacific Railroad abandoned or sold roughly two-thirds of its network, with the rest ultimately acquired in 1985 by the Canadian Pacific Railroad through an American subsidiary. The case of the Chicago, Rock Island and Pacific Railroad was direr; by March 1980, before Congress had a chance to pass its transition assistance law, the railroad had been deemed incapable of continuing rail operations by the ICC, declared the property of a neutral party (pursuant to 3R), and ceased operations. Its former property was acquired by multiple buyers. With Conrail's profitability still not much improved, Congress passed the Staggers Rail Act of 1980 ( P.L. 96-448 ), by a 61-8 vote in the Senate and a voice vote in the House. The law expanded upon the deregulation begun in the 3R and 4R Acts. Among other provisions, the Staggers Act prevented the ICC from setting maximum shipping rates, permitted railroads to keep their rate agreements with customers secret, broadened the ICC's power to declare exemptions, and required the submissions of proposals for the future of Conrail. While many of its provisions were unpopular with some shippers, particularly those who could not readily move their freight by truck or barge if they found rail rates excessive, the law helped restore the freight rail sector to profitability and eventually led to increased capital investment in the industry. While the duty to provide intercity passenger rail had been transferred to Amtrak by the Rail Passenger Service Act of 1970, Conrail was still bound to operate the local commuter routes previously run by its predecessor railroads. The Northeast Rail Services Act of 1981 (NERSA; P.L. 97-35 ) was enacted as Subtitle E of the Omnibus Budget Reconciliation Act of 1981, approved by the Senate on a vote of 80-15 and by the House on a vote of 232-195. NERSA relieved Conrail of all obligations to provide commuter rail service beginning January 1, 1983, in order to improve its profitability. To ensure continuity of operations, however, NERSA required state- or locally-chartered commuter authorities to continue to operate all commuter rail lines previously operated by Conrail, and created a new subsidiary of Amtrak to take over such lines if any state declined to do so (none did). NERSA also stipulated that Conrail's status as a quasi-governmental corporation should be temporary and that the government's stake in the company should eventually be sold to one or more private buyers. Following the reforms in the 3R and 4R Acts, the Staggers Act, and NERSA, Conrail reported a profit in 1981 and in subsequent years. The government's 85% stake in the company was sold through an initial public offering in 1987 after the government rebuffed attempts by other railroads to acquire it in ways that could have reduced rail competition in the Northeast. (The other 15% was owned by Conrail employees.) The government recouped a total of approximately $2 billion, including a $300 million dividend from Conrail and $1.65 billion from the public offering. This was approximately $5 billion less than total government outlays, when measured in nominal dollars, or $20 billion to $24 billion less than the government's outlays when adjusted for inflation ( Table 1 ). Railroad profitability increased following implementation of the Staggers Act, and railroad companies, devoting themselves entirely to freight traffic, continued to consolidate and shed unprofitable lines. Some 70,000 miles of railroad have been abandoned since 1980, and the number of large railroadsâknown as Class I railroadsâoperating in the United States now stands at seven. Following its privatization, Conrail continued as an independent company until 1997, when it was acquired by Norfolk Southern Corporation and CSX Corporation in a joint stock purchase valued at approximately $10.3 billion. Norfolk Southern and CSX split most of the Conrail assets after the purchase. Amtrak has never generated an operating profit, and has received federal operating support every year since its creation. The federal government has a long history of assisting farmers with real estate and operating loans. This intervention has been justified by the presence of asymmetric information between lenders and farmers, lack of competition and resources in rural areas, and policies to target assistance to disadvantaged groups. The two agricultural lenders with the greatest federal connection are the Farm Service Agency (FSA) and the Farm Credit System (FCS), a private cooperative. The first, FSA, is part of the U.S. Department of Agriculture (USDA) and receives federal appropriations to make direct loans and guarantees to farmers who do not qualify for commercial credit. The second, FCS, is privately funded without federal appropriation as a cooperatively owned entity with a statutory mandate to serve only agriculture-related borrowers. The FCS is regulated by the Farm Credit Administration, an independent agency funded by assessments on system institutions. A severe downturn in the agricultural economy beginning in the early 1980s contributed to a financial crisis among many agricultural lenders and their farmer borrowers (the result of low farm income, high interest rates, and declining land prices). Since the FCS had exposure to only a single industry, it held a loan portfolio that developed large delinquencies, much of which was eventually written off as uncollectible. The farm financial crisis caused the FCS to experience operating losses of $2.7 billion in 1985 and $1.9 billion in 1986, for example, which jeopardized its financial stability, including its ability to repay bondholders in private capital markets. While FCS debt is not a government obligation nor guaranteed, many investors perceive its government-sponsored enterprise (GSE) status to imply that the Treasury would not allow FCS default. Moreover, FCS was an important lender to agriculture and held one-third of farm debt at the time. The Agricultural Credit Act of 1987 ( P.L. 100-233 ) was enacted on January 6, 1988, after being approved by the Senate by a vote of 85-2 and the House on a vote of 365-18. The law authorized a $4 billion financial assistance package. It created a new FCS entity, the FCS Financial Assistance Corporation, which utilized $1.26 billion in loans from the U.S. Treasury. The assistance stabilized the FCS by allowing it to repay its bonds and meet its debt obligations. The act required the FCS to work out a schedule for repaying the Treasury, mandated FCS organizational changes, protected FCS borrowers' stock investments in FCS institutions, and specified requirements for restructuring FCS problem farm loans. Among the notable organizational changes, FCS banks became jointly and severally liable for each other's debts (that is, the FCS banks together would be responsible for the cumulative debts of the individual FCS banks if any become insolvent). The act also created an FCS Insurance Corporation, similar to the Federal Deposit Insurance Corporation, to further ensure the ability of the FCS to repay its bonds. Although the primary purpose of the 1987 Act was to rescue and restructure the FCS, the act also led to the creation of a system of borrower rights for the FCS and the FSA. These borrower rights are somewhat unique to agriculture, compared to what was available to homeowners during the 2008 housing crisis. Before the FCS and FSA can initiate foreclosure proceedings, it must offer options to restructure delinquent farm loans when it would be less costly than taking foreclosure action, and it must offer rights of first refusal for an individual or extended family to repay a delinquent loan to avoid foreclosure and preserve a farm homestead. The FCS Financial Assistance Corporation borrowed $1.26 billion from the U.S. Treasury during the farm financial crisis of the 1980s. The FCS made provisions in the early 1990s to systematically repay all of its financial assistance by collecting assessments on system banks and associations. The arrangement for the 15-year debt by the FCS Financial Assistance Corporation to the Treasury was that the government paid the interest for the first five years, FCS and the Treasury split the interest during the second five years, and FCS bore all of the interest during the final five years. In June 2005, the last of the bonds and interest was repaid on schedule to the U.S. Treasury. The FCS Financial Assistance Corporation was dissolved in December 2006. Farm Credit System financial performance steadily improved throughout the 1990s and into the present day. The Farm Credit System Insurance Corporation is fully funded to its capitalization goals. The borrowers' rights provisions continue to provide protection to farmers facing new financial difficulties, such as through the financial crisis in 2007-2009 and during the current period of lower farm income. Savings and loan institutions (S&Ls) were state- or federally chartered deposit-taking institutions whose loans mainly took the form of residential mortgages. Some were mutual institutions owned by their depositors, while others had publicly traded shares. Federally chartered S&Ls were authorized in the 1930s to promote mortgage lending and were regulated by a separate regulator, the Federal Home Loan Bank Board (FHLBB), rather than by the agencies responsible for regulating commercial banks. The industry suffered a solvency crisis in the 1980s. When interest rates rose, S&Ls' floating-rate liabilities (e.g., deposits) had a higher interest cost than the industry was earning on fixed-rate assets that had been issued before rates rose (e.g., mortgages). In the presence of government deposit insurance, depositors had little incentive to withdraw their deposits from unprofitable S&Ls, since their deposits were safe even if their S&L failed. This allowed insolvent S&Ls to continue to access the funds needed to keep operating. According to a study by the Federal Deposit Insurance Corporation, \"Net S&L income, which totaled $781 million in 1980, fell to negative $4.6 billion and $4.1 billion in 1981 and 1982â¦. In fact, tangible net worth for the entire S&L industry was virtually zero, having fallen from 5.3 percent of assets in 1980 to only 0.5 percent of assets in 1982.\" Policymakers were slow to address the crisis because of concerns that resolving large numbers of S&Ls would have a negative effect on homeownership by disrupting mortgage lending. Government policy is generally viewed as exacerbating the crisis in two ways. First, the S&L regulator, the FHLBB, practiced \"regulatory forbearance,\" allowing insolvent firms to keep operating in the hopes that they would eventually become profitable again. Forbearance made the problem larger because it arguably encouraged such \"zombie S&Ls\" to take on more risks, undermining more conservatively run competitors. Regulatory forbearance was motivated in part by the fact that the Federal Savings and Loan Insurance Corporation (FSLIC), the agency responsible for insuring S&L customers' deposits, lacked the funds to honor deposit insurance claims if all the undercapitalized S&Ls were rescued or closed down. Almost 1,000 thrifts still in operation, holding half of total industry assets, were insolvent or nearly insolvent by 1986. By 1987, the FSLIC itself was insolvent. In the meantime, zombie S&Ls incurred additional losses, which increased the ultimate cost to the government. Second, deregulation in the early 1980s gave the industry new opportunities to take risks that increased ultimate losses, which arguably occurred because deregulation took place in the context of an already undercapitalized industry with inadequate prudential regulation. Deposit insurance is self-financing only if insurance premiums match expected losses. Because the FSLIC deposit insurance scheme was inadequate, a government \"bailout\" could only have been avoided if the government had reneged on its promise to guarantee deposits. The congressional response to the S&L crisis can be divided into two phases. From 1980 to 1982, legislation was enacted to attempt to restore industry solvency (or buy time to restore industry solvency) through forbearance and the removal of legal restrictions on industry activities. From 1987 on, legislation was enacted to attempt to resolve insolvent S&Ls by granting financial resources and to prevent future losses through new regulatory powers. Many of these bills contained wide-ranging provisions, and only the provisions relevant to the S&L crisis are highlighted here. The Competitive Equality Banking Act of 1987 ( P.L. 100-86 ) was passed in the Senate on a vote of 96-2 and in House on a vote of 382-12. The law created the Financing Corporation (FICO) to provide funding to FSLIC by issuing $10.8 billion in long-term bonds to be repaid by assessments on savings and loans and the Federal Home Loan Banks. It also eased regulatory requirements for savings and loans in economically depressed areas. According to the FDIC study, \"Although the Competitive Equality Banking Act of 1987 provided the FSLIC with resources to resolve insolvent institutions, the amount was clearly inadequate. Nevertheless, under the new FHLBB chairman, Danny Wall, the FSLIC resolved 222 S&Ls, with assets of $116 billion, in 1988.... But despite these resolutions, at year-end 1988 there were still 250 S&Ls, with $80.8 billion in assets that were insolvent based on regulatory accounting principles.\" The Financial Institutions Reform, Recovery, and Enforcement Act of 1989 ( P.L. 101-73 ) was passed by the House on a vote of 201-175 and by the Senate by division vote (individual votes not recorded). The law abolished FSLIC and transferred its assets, liabilities, and operations to the FSLIC Resolution Fund (FRF). The act abolished FHLBB and transferred its authority to the newly created Office of Thrift Supervision with new regulatory powers, created the Savings Association Insurance Fund, administered by FDIC, created the Resolution Trust Corporation (RTC) to resolve troubled thrifts, and created the Resolution Funding Corporation (REFCORP) to issue debt to finance RTC to be repaid by industry assessments and the federal government. The Resolution Trust Corporation Funding Act of 1991 ( P.L. 102-18 ) , passed by the House on a vote of 225-188 and passed by the Senate by voice vote, provided $30 billion to the RTC to cover losses of failed thrifts in FY1991. The Resolution Trust Corporation Refinancing, Restructuring, and Improvement Act of 1991 ( P.L. 102-233 ), passed by the Senate on a vote of 44-33 and passed in the House by division vote 112-63, provided the RTC up to $25 billion until April 1, 1992, to resolve failed savings and loan institutions. The law also restructured the RTC and terminated FICO. The Resolution Trust Corporation Completion Act of 1993 ( P.L. 103-204 ) passed the House on vote of 235-191 (with 1 Member voting present), and passed the Senate on a vote of 54-45. The law provided $18.3 billion to finish the savings and loan cleanup. It terminated the RTC on December 31, 1995, and authorized $8.5 billion for the Saving Association Insurance Fund (SAIF), to be spent only if the savings and loan industry could not pay for future failures itself through higher insurance premiums. The cost of the S&L cleanup was spread among the federal government (through appropriations), government-sponsored enterprises (the Federal Home Loan Bank system), and the industry (through deposit insurance premiums). Two quasi-governmental entities (FICO and REFCORP) were created to provide financing. Measuring the cost of the S&L crisis poses unique challenges compared to the other episodes discussed in this report. The resolution of failing thrifts was not a one-time event. Thrifts may fail at any time, even when economic conditions are generally good, and the insurance fund may be called upon to repay depositors. What was unique during the crisis was the magnitude of the failures, which caused premiums to be inadequate for addressing the problem. Thus, a somewhat arbitrary date must be chosen for the beginning and the end of the cleanup. Different sources vary slightly on the overall net cost. In January 1995, CBO estimated the cost at $150 billion in 1990 dollars. In 1996, GAO estimated the cost at $160.1 billion. Table 2 presents an estimate from the FDIC Banking Review , as this source provides the most detailed information. It estimated expenses paid by the FRF and RTC to be $152.7 billion, with an additional $7.3 billion in indirect costs from 1986 to 1995. Of the $152.7 billion, direct appropriations covered $99.4 billion and FICO and REFCORP bond proceeds covered $38.3 billion. The government recouped $30.1 billion through industry assessments, interest on bonds paid by the industry, and the value of remaining assets seized from failed S&Ls as of the end of 1999, putting the net direct costs at $122.6 billion and the net total costs at $129.9 billion. (CRS classified the FHLBs as industry for purposes of this table, so their contributions are considered a recoupment rather than a government expense.) It should be noted that this source does not include interest costs on the federal debt used to finance appropriations or the FICO and REFCORP bonds issued to finance the cleanup. Cumulatively, 1,043 insolvent firms holding $519 billion in assets were resolved between 1986 and 1995. The industry's finances stabilized by the mid-1990s, by which time the number of S&Ls had fallen by half compared to 1986. The RTC ceased operations at the end of 1995. Some special bonds issued to finance the cleanup remain outstanding until 2030. S&Ls were renamed savings associations or thrifts and their regulation was reformed by FIRREA. Further problems with the regulation of the thrift industry in the 2007-2009 financial crisis led to the elimination of the Office of Thrift Supervision and the shifting of its powers to the federal banking regulators by the Dodd-Frank Wall Street Reform and Consumer Protection Act ( P.L. 111-203 ). The use of commercial airplanes as assault vehicles to wreak havoc on the United States has no precedent in aviation history. At the time of the September 11, 2001, terrorist attacks on the World Trade Center in New York and the Pentagon in Washington, the airline industry was already experiencing a difficult financial situation due to the recession. In the wake of the attacks, the federal government temporarily grounded all civil air traffic in the United States, including all commercial flights. The attacks contributed to a significant decline in both domestic and international passenger traffic in 2001 that resulted in major financial losses. In the aftermath of the 9/11 attacks, Congress moved to provide the airline industry with federal financial support. The Air Transportation Safety and System Stabilization Act (Stabilization Act; P.L. 107-42 ) passed in the House by a vote of 356-54, with two Members voting present, and in the Senate by a unanimous vote. It was signed into law on September 22, 2001, providing the airlines access to up to $15 billion in short-term assistance. This included $5 billion in emergency assistance to compensate the air carriers for losses incurred as a result of the attacks, and $10 billion in the form of guaranteed loans designed to provide longer-term stability to the industry and make it more creditworthy in private markets. The Stabilization Act also supported the airline industry by providing premium war risk insurance for 180 days. This insurance was extended multiple times until it expired in 2014. The Secretary of Transportation and the Comptroller General were in charge of the $5 billion direct compensation to air carriers, while the distribution of the loan guarantees was controlled by an \"air transportation stabilization board\" (ATSB) consisting of three voting membersâthe Chairman of the Federal Reserve Board, the Secretary of the Treasury, and the Secretary of Transportation, or their designeesâand a non-voting member, the Comptroller General. According to the April 2011 report of the President to the U.S. Congress, as required by the Stabilization Act, 407 air carriers were compensated for direct operating losses as the result of federal ground stop orders as well as any incremental losses incurred between September 11, 2001, and December 31, 2001. Payments totaled nearly $4.6 billion of the $5 billion initially made available. Portions of the remaining balance in the account were rescinded by Congress at various points, with all unobligated balances permanently rescinded by the Omnibus Appropriations Act, 2009 ( P.L. 111-8 , Title I). The ATSB was established to review and decide on airlines' applications for loan guarantee assistance. The ATSB received 16 loan guarantee applications from a range of air carriers, including large airlines, small airlines, low-fare airlines, and charter and cargo carriers. It approved and closed on six loan guarantee applications: American West, ATA Airlines (formerly American Trans Air), Aloha Airlines, Frontier Airlines, US Airways, and World Airways. The total amount of loan guarantees was $1,558,600,000. Five of the six guaranteed loans were fully repaid by the carriers, while the ATA Airlines loan guarantee had to be exercised when ATA Airlines filed for bankruptcy under Chapter 11. In 2005, the ATSB paid approximately $125 million, the outstanding balance on the ATA loan which the ATSB had guaranteed, but eventually recouped $97.2 million of that amount. The ATSB also established that the government was to be compensated for the risks associated with the guarantees through fees and stock warrants. The six airlines paid more than $240 million in fees and interest; while proceeds of warrant sales totaled $142.6 million. Overall, after deducting ATSB expenses, the 2011 report of the President to the U.S. Congress concluded that the government recovered a net of $338.8 million from the carriers as a result of the ATSB loan guarantee activities (see Table 3 ). According to the Federal Aviation Administration's estimate, between September 2001 and December 2014, $1.8 billion in premiums were collected and the total amount of claims paid for three war risk occurrences was $10,107,874. The remaining balance in the Aviation Insurance Revolving Fund is used to back more than $20 billion of the non-premium aviation insurance program that provides critical support to national security and defense by making insurance available to air carriers contracted by the Department of Defense to support military operations. The uncommitted balance of the ATSB loan guarantee authority was $8,441,400,000 on June 28, 2002, the deadline for submitting applications. The Consolidated Appropriations Act of 2008 ( P.L. 110-161 , Division D, Title I) rescinded the unobligated balance of program funds. The War Risk Insurance program expansion expired in 2014. If direct assistance is excluded, the government recouped more than was paid out on both the loan guarantees and the war risk insurance program. Nevertheless, it was exposed to significant financial risks from both programs. The financial crisis of 2007-2009 grew out of an unprecedented housing boom that turned into a housing bust. Much of the lending for housing during the boom was based on asset-backed securities that used the repayment of housing loans as the basis of these securities. As housing prices fell and mortgage defaults increased, these securities became illiquid and fell sharply in value. This caused capital losses for firms holding them, which threated many firms with insolvency. There was widespread lack of trust in financial markets as participants were unsure which firms might be holding so-called toxic assets that might now be worth much less than previously estimated, thus making these firms unreliable counterparties in financial transactions. This uncertainty prevented firms from accessing credit markets to meet their liquidity needs. The banking industry was at the center of the crisis, both as holders of mortgage backed securities and as lenders making mortgage loans. The Federal Reserve was created in 1913 largely to act as a lender of last resort in liquidity crises, and its authority was augmented during the Great Depression. As the crisis developed in 2007 and 2008, the Federal Reserve took a variety of steps under its statutory authority to inject liquidity into the financial system. To the degree that the crisis caused solvency problems in financial firms, however, the Federal Reserve was unable to assist, as its authority is limited to lending funds, which offered little assistance to firms that were already highly leveraged and suffering from capital shortfalls. The Emergency Economic Stabilization Act of 2008 (EESA), was brought to the floor of the House as a substitute amendment to H.R. 3997 on September 29, 2008 ; this amendment failed in the House by a vote of 205-228. Another version of EESA, which included the original EESA plus several other provisions not in the first bill, was offered on October 1 in the Senate as an amendment ( S.Amdt. 5685 ) to an unrelated bill, H.R. 1424 , which had previously passed the House. The amendment to H.R. 1424 was approved by a Senate vote of 74-25; it was then taken up by the House and passed by a vote of 263-171, on October 3, 2008. The President signed the amended version of H.R. 1424 , now P.L. 110-343 , the same day as House passage. EESA gave the Department of the Treasury broad authority under the newly created Troubled Asset Relief Program to use up to $700 billion to address the crises. The congressional debate was focused on purchasing the \"toxic\" assets from firms, thus replacing them with safer assets, but the statute also allowed the Treasury to guarantee assets or to directly augment firms' capital. Among the programs under the EESA authority, the Treasury created the Capital Purchase Program (CPP) to purchase up to $250 billion in preferred shares from banks, thus adding this amount to capital levels. More than 700 banks participated in the CPP and approximately $205 billion was actually disbursed. In addition, there was a relatively small ($570 million) Community Development Financial Institution program that also purchased preferred shares, but on less stringent terms than the CPP. The CPP was augmented with an additional Targeted Investment Program (TIP) preferred share purchases and asset guarantees for two of the most troubled banks, Bank of America and Citigroup. The share purchases were $20 billion to each bank. The asset guarantees were more complicated. Any losses were to be shared between the Treasury, FDIC, and Federal Reserve. The guarantee for Bank of America on $118 billion in assets was offered, but never officially closed. The Citibank guarantee was on $301 billion in assets, but funds were never paid out on any losses. EESA was amended in early 2009, specifically allowing earlier repayment of assistance than originally foreseen and adding additional executive compensation requirements on firms with outstanding assistance. P.L. 111-5 passed the House on a vote of 246-183 and the Senate on a vote of 60-38. In most cases, the Treasury recouped money from sales of preferred shares, primarily back to the issuing banks, as dividends and from warrants that were issued along with the preferred shares and fees paid for the asset guarantees. The Citigroup preferred shares were converted into common equity and sold on the open market. Recoupment from the general TARP bank assistance was completed relatively quickly. For example, by the end of 2011, approximately $255.4 billion had been recouped in total with $17.35 billion of $245.5 billion still outstanding. By 2020, $271.4 billion had been recouped, with $0.04 billion of preferred shares still outstanding. The special assistance for Bank of America was completed by the end of 2009, with a $425 million termination fee paid for the uncompleted asset guarantee and repurchase of the $20 billion in TIP shares resulting in $22.7 billion in recoupment. Citigroup's special assistance finished in December 2009 with $21.8 billion in recoupment from the TIP shares and $3.9 billion in premiums paid for the asset guarantees. Despite the default risk that TARP was exposed to, the government recouped $30.5 billion more than it disbursed on the bank programs (see Table 4 ). The financial crisis passed relatively quickly for the banking industry once the panic conditions of fall 2008 passed. One marker of this is that originally banks were to be required to hold the CPP capital on their books for a minimum of three years, whereas banks began repurchasing CPP preferred shares by March 2009 when the program was still disbursing funds. The overall profitability levels in the banking system returned relatively quickly. In 2008 and 2009, the financial crisis, rising gasoline prices, and a contracting global economy combined to create the worst market in decades for production and sale of motor vehicles in the United States and other industrial countries. While Ford Motor Company had negotiated an $18 billion line of credit in 2007, General Motors (GM) and Chrysler did not have similar long-term financing available when the financial crisis hit, which temporarily made it difficult for most firms to access borrowing markets. In 2009, GM's production dropped by 47% (compared to 2008), and Chrysler's by 57%; total U.S. production among all automakers fell by 34%. The prospect of GM and Chrysler bankruptcies raised other concerns: the failure of their parts suppliersâalso used by most other automakersâcould cascade financial difficulties throughout the sector; and those supplier failures could overwhelm the federal Pension Benefit Guaranty Corporation with abandoned pension plans. In addition, large affiliated financial companies (which provided auto loans to consumers and dealers) could fail if the automakers entered bankruptcy. Congress never passed specific legislation to address auto industry issues. The George W. Bush Administration and congressional leaders differed on the type of assistance that should be offered the automakers: initially, the Administration recommended reprogramming a Department of Energy motor vehicle loan program to provide bridge loans. In December 2008, the House of Representatives passed H.R. 7321 , which would have authorized funds from the DOE Advanced Technology Vehicles Manufacturing program (ATVM) as bridge loans to GM and Chrysler. Although that bill passed the House 237-170, the Senate did not vote on it. When this legislation stalled, the George W. Bush Administration announced that it would use the Troubled Asset Relief Program to support the automakers, arguing that failure to provide assistance could make the recession worse and impose other federal costs, such as unemployment insurance for many displaced auto and auto parts employees. The Bush Administration made initial TARP loans of $24.8 billion to GM, Chrysler, and two auto financing companies (GMAC and Chrysler Financial) in December 2008 and January 2009. When the Obama Administration took office in January 2009, it continued this loan program, bringing total loans to the auto industry to $79.7 billion. In addition, the Obama Administration established an Auto Task Force chaired by the Secretary of the Treasury to work with GM and Chrysler on restructuring plans with creditors, unions, dealers, and other stakeholders. The goal of the spring 2009 restructurings was to avoid bankruptcy filings, but all stakeholders did not agree to the major changes in the companies. Chrysler and GM filed for bankruptcy in April and June 2009, respectively. After about a month, both companies emerged from bankruptcy court, with new owners: the U.S. Treasury owned about 10% of Chrysler and nearly 61% of GM in return for forfeiting repayment of the previous loans. Other owners included the Canadian government, bondholders, and the United Auto Workers. The federal ownership was sold off over the following years. The assistance was repaid or recouped beginning in 2009 in a variety of ways, including initial public offerings, gradual public offerings of other federal shares, and private sales of stock. Table 5 summarizes the amounts of government assistance and the amount of recoupment for auto industry assistance. The U.S. Treasury sold its last holdings of Chrysler in June 2011 and GM in December 2013. The proceeds from the sales were not enough to cover the original loans to Chrysler and GM. Chrysler Financial fully repaid its loan, and the federal government's recoupment from GMAC was greater than the amount of its assistance. After restructuring and bankruptcy, GM and Chrysler recovered their positions as major U.S. automakers; GM is independent and Chrysler is part of Fiat Chrysler Automobiles (FCA), a corporation based in Great Britain. Table 6 shows comparisons before and after restructuring and bankruptcy. Money market mutual funds are a type of mutual fund that generally invest in high-quality, short-term assets. Often the value of a share is held at $1 per share and fund gains are paid out as dividends mimicking interest payment. Thus, they are seen as largely analogous to bank deposits, but are not guaranteed by the Federal Deposit Insurance Corporation (FDIC). As part of the market turmoil resulting from the bursting of a nationwide housing bubble, on September 16, 2008, a money market mutual fund called the Reserve Fund \"broke the buck,\" meaning that the value of its shares had fallen below $1. This occurred because of losses it had taken on short-term debt issued by the investment bank Lehman Brothers, which filed for bankruptcy on September 15, 2008. Money market investors had perceived \"breaking the buck\" to be highly unlikely, and its occurrence set off a generalized run on money market mutual funds, as investors simultaneously attempted to withdraw an estimated $250 billion of their investmentsâeven from funds without exposure to Lehman Brothers. To stop the run, the Treasury announced an optional program to guarantee deposits in participating money market funds. The Treasury would finance any losses from this guarantee with assets in the Exchange Stabilization Fund (ESF), funds intended to protect the value of the dollar. The Treasury announced this program without seeking specific congressional authorization, justifying the program on the grounds that guaranteeing money market funds would protect the value of the dollar. The program expired after one year in September 2009. The Emergency Economic Stabilization Act of 2008 included language (Section 131) that directed the Treasury Secretary to reimburse the Exchange Stabilization Fund for any funds used for the money market guarantee program and prohibited usage of the ESF in the future for such a program. Funds utilizing the guarantee program paid fees for the guarantee of between 0.015% and 0.022% of the amount guaranteed by the program. Over the life of the program, the Treasury reported that no money market mutual fund guarantees were invoked and $1.2 billion in fees had been collected (see Table 7 ). More than $3 trillion of deposits were guaranteed and, according to the Bank for International Settlements, 98% of U.S. money market mutual funds were covered by the guarantee, with most exceptions being funds that invested only in Treasury securities. In early 2018, the Trump Administrationâciting concerns over national security and unfair trade practicesâimposed increased tariffs on steel and aluminum from a number of countries and on a broad range of U.S. imports from China. Several of the affected foreign trading partnersâincluding China, Canada, Mexico, the European Union, and Turkeyâresponded to the U.S. tariffs with their own retaliatory tariffs targeting various U.S. products, especially agricultural commodities. As a result of these retaliatory tariffs, both market prices and exports of affected U.S. agricultural products dropped sharply in the immediate aftermath of retaliation before gradually recovering as trade shifted to alternate markets. The most notable result of this trade dispute was a decline in trade between the United States and China. From 2010 through 2016, China was the top destination for U.S. agricultural exports based on value. In 2018, U.S. agricultural exports to China declined 53% in value to $9 billion from $19 billion in calendar year 2017. The retaliatory tariffs affected producers of several major U.S. commodities, including field crops like soybeans and sorghum, livestock products like milk and pork, and many fruits, nuts, and other specialty crops. Following the imposition of retaliatory tariffs in 2018, the United States began negotiations with several of the retaliating trade partners to resolve the disputes. However, several of the negotiations were protractedâparticularly the U.S.-China trade talksâand trade failed to return to normal patterns during 2018 and 2019. The Secretary of Agriculture used his authority under Section 5 of the Commodity Credit Corporation (CCC) Charter Act of 1948 (P.L. 80-806; 15 U.S.C. 714 et seq.), as amended, to initiate two ad hoc trade assistance programs in 2018 and 2019. Referred to as \"trade-aid packages,\" these two initiatives represented the Administration's effort to provide short-term assistance to farmers in response to the foreign trade retaliation targeting U.S. agricultural products. The first trade-aid package was announced on July 24, 2018. It targeted production for nine agricultural commodities in 2018 and was valued at up to $12 billion. The second trade-aid package was announced on May 23, 2019. It targeted production for an expanded list of 41 commodities and was valued at up to an additional $16 billion. According to the U.S. Department of Agriculture (USDA), the two trade-aid packages are structured in a similar manner and include three principal components ( Table 8 ): The Market Facilitation Program (MFP) provides direct payments to producers of USDA-specified \"trade damaged\" commodities. USDA used different payment rate formulas to determine the MFP payment distribution for each of the 2018 and 2019 programs (described below). MFP payments are administered by USDA's Farm Service Agency (FSA). The Food Purchase and Distribution Program (FPDP) is for purchases of unexpected surpluses of affected commodities such as fruits, nuts, rice, legumes, beef, pork, milk, and other specified products for redistribution by USDA's Food and Nutrition Service through federal nutrition assistance programs including food banks, schools, and other outlets serving low-income individuals. It is administered by USDA's Agricultural Marketing Service. The Agricultural Trade Promotion (ATP) program provides cost-share assistance to eligible U.S. organizations for activitiesâsuch as consumer advertising, public relations, point-of-sale demonstrations, participation in trade fairs and exhibits, market research, and technical assistanceâto boost exports for U.S. agriculture, including food, fish, and forestry products. It is administered by USDA's Foreign Agriculture Service in conjunction with the private sector. The two years of trade assistance, as announced by the Secretary of Agriculture, were valued at a potential combined $28 billion, the largest component being the MFP direct payments to producers valued at a combined $24.5 billion ( Table 8 ). The broad discretionary authority granted to the Secretary under the CCC Charter Act to implement the trade-aid package also allowed the Secretary to determine how the aid was calculated and distributed. Some important differences between the 2018 and 2019 trade aid packages include the following: Although the 2018 and 2019 MFP programs focused payments on the same three commodity groupsânon-specialty crops (grains and oilseeds), specialty crops (nuts and fruit), and animal products (hogs and dairy)âthe 2019 MFP included an expanded list of eligible commodities (41 eligible commodities in 2019 compared with nine in 2018). The 2018 MFP payments for eligible specialty and non-specialty crops were based on physical production in 2018, and calculated as per-unit payment rates. The 2019 MFP program based its payment rates for specialty crops on harvested acres, and non-specialty crops on planted acres. This change was done to avoid having MFP payments reduced by the lower yields that were expected to occur across major growing regions due to the widespread wet spring and delayed plantings. Then a weighted-average MFP payment-rate-per-acre was calculated at the county level. This was done to minimize influencing producer crop choices and avoid large payment-rate discrepancies across commodities grown within the same county. The end result was a single 2019 MFP payment rate for each county with eligible commodities. Under both 2018 and 2019 MFP programs, payments to dairy producers were based on historical production, while those to hog producers used mid-year inventory data. Payments were made in three tranches under both the 2018 and 2019 MFP programs; cumulative program receipts were subject to annual payment limits and adjusted gross income (AGI) eligibility requirements. The 2018 MFP payments were capped on a per-person or per-legal-entity basis at a combined $125,000 for eligible non-specialty crops, a combined $125,000 for animal products, and, separately, a combined $125,000 for specialty crops. In contrast, the 2019 package used expanded payment limits per individual per commodity group ($250,000) and an expanded maximum combined payment limit across commodity groups ($500,000 versus $375,000 in 2018). Both 2018 and 2019 MFP payment recipients were subject to an AGI eligibility threshold of $900,000, but with an exemption from the AGI criteria if at least 75% of a farm's AGI was from farming operations. There is a general consensus among farm policy analysts that the MFP payments provided a substantial income boost to the U.S. agricultural sector in the aggregate during what otherwise would have been a period of low commodity prices and low net farm income. However, an examination of MFP payments data reveals that they were unevenly distributed across both commodities and regions. No congressional action was involved in the establishment, funding, or implementation of the 2018 and 2019 MFP programs. The ranking member of the Senate Committee on Agriculture, Nutrition, and Forestry, Debbie Stabenow of Michigan, has raised concerns about the methodology used to determine payment rates and the resultant distribution of payments across both commodities and regions. In January 2020, Senator Stabenow requested a comprehensive investigation by GAO into the integrity of USDA's trade aid to farmers affected by the Trump Administration's trade policies. There is no provision for repayment or recoupment of any of the funds disbursed under the 2018 and 2019 trade-aid packages. President Trump has claimed that the tariffs imposed on products imported into the United States increased U.S. government revenue, and that these amounts, mainly paid by Chinese exporters, were used to offset the cost of the trade-aid packages. However, economic studies have generally found that the cost of tariffs on imported goods is borne largely by U.S. firms and consumers, not by foreign trading partners. USDA's use of CCC authority to initiate and fund agricultural support programs without congressional involvement is not without precedent, but the scope and scale of its use for the two trade-aid packagesâat a potential cost of up to $28 billionâhave increased congressional and public interest. On February 11, 2020, USDA Inspector General Phyllis Fong told the House Agriculture Appropriations Subcommittee that her office would be undertaking an investigation of the Administration's trade assistance programs, starting with whether USDA had the proper legal authority to make direct payments to farmers. It is also possible that other countries may challenge MFP payments as a violation of U.S. trade commitments to the World Trade Organization.", "summary": "Serious disruptions for certain industries caused by the COVID-19 (coronavirus) pandemic have led to calls for federal government assistance to affected industries. Direct federal financial assistance to the private sector on a large scale is unusual, except for geographically narrow assistance following natural disasters. Nonetheless, assistance to business sectors affected by COVID-19 would not be the first occasion on which the federal government has aided troubled or financially distressed industries. Historically, aidâsometimes popularly referred to as \"government bailouts\"âhas taken many forms and has occurred under a wide variety of circumstances. Past assistance has involved such instruments as loan guarantees, asset purchases, capital injections, direct loans, and regulatory changes, with the specific mix of policies varying significantly from case to case. These differences make it somewhat subjective as to what should be defined as a \"bailout.\" To help inform congressional debate, this report examines selected past instances in which the government has aided troubled industries, providing information about the way in which such assistance was structured, the role of Congress, and the eventual cost. In order to provide greater detail, the examples all involve cases in which federal assistance was (1) widely available to firms within an industry rather than being targeted to a particular firm; (2) extraordinary in nature rather than a type of assistance that is routinely provided; and (3) motivated primarily by a desire to prevent industry-wide business failures. The coverage is not exhaustive, and excludes cases in which assistance was targeted at individual firms rather than at entire industries. In some of these cases, the government was able to recoup much or all of its assistance through fees, interest, warrants, and loan or principal repayments. In others, there were no arrangements made for recoupment or repayment. The episodes considered include the following: Railroad Restructuring (1957-1987) Farm Credit System Crisis (1980s) Savings and Loan Crisis (1980s-1990s) Airline Industry (2001-2014) Auto Industry (2008-2014) Troubled Asset Relief Program (TARP) Bank Support (2008-present) Money Market Mutual Fund Guarantee (2008-2009) Agricultural Trade-Aid (2018-2019) Assessing extraordinary assistance can be difficult as particular episodes may play out over decades and full data about assistance may be difficult to collect and analyze. Congress has sometimes included particular oversight and reporting requirements in statutes authorizing aid. In addition, there are broader policy concerns raised by government assistance that may be impossible to quantify and do not get captured in tallies of the government's income and expenses. Possible benefits of assistance may include avoiding potentially long-lasting disruptions to consumers, workers, local communities, and the overall economy; averting losses to federally guaranteed retirement funds; and maintaining federal tax revenues. Potential drawbacks to assistance include the possibility that it may reduce competition by rewarding incumbents over new entrants and distort the affected product market by causing (or prolonging) overproduction; that it may cause \"moral hazard\" if firms respond to government assistance by acting with less financial prudence in the future; and that it can delay an industry's adjustment to structural problems such as high production cost and excess capacity. In every case, federal assistance to certain industries may raise questions about the fairness of providing assistance to some businesses but not to others.", "document_type": "crs"}
{"report": "Relations between Iran and the United States have been mostly confrontational since 1979, when Iran's Islamic Revolution removed from power the U.S.-backed government of the Shah and replaced it with a Shia-cleric dominated system. Successive U.S. administrations have treated Iranian policies as a threat to U.S. interests in the Middle East, particularly Iran's support for terrorist and other armed groups and, after 2002, its nuclear program. Following its 2018 withdrawal from the 2015 multilateral nuclear agreement with Iran (Joint Comprehensive Plan of Action, JCPOA), the Trump Administration has taken several steps in its campaign of applying \"maximum pressure\" on Iran. These steps include designating the Islamic Revolutionary Guards Corps-Qods Force (IRGC-QF) as a Foreign Terrorist Organization (FTO), ending a U.S. sanctions exception for the purchase of Iranian oil to bring Iran's oil exports to \"zero,\" and deploying additional U.S. military assets to the region. Tensions have increased significantly since May 2019, as Iran (and Iran-linked forces) have apparently responded by attacking and seizing commercial ships, posing threats to U.S. forces and interests (including downing a U.S. unmanned aerial vehicle), causing destruction to some critical infrastructure in the Arab states of the Persian Gulf, and reducing compliance with the provisions of the JCPOA. On December 27, 2019, a rocket attack on a base near Kirkuk in northern Iraq killed a U.S. contractor and wounded four U.S. servicemembers and two Iraqi servicemembers. Two days later, the United States launched retaliatory airstrikes on five facilities (three in Iraq, two in Syria) used by the Iran-backed Iraqi armed group Kata'ib Hezbollah (KH), a U.S.-designated FTO to which the United States attributed the December 27 and other attacks. On December 31, 2019, supporters of Kata'ib Hezbollah and other Iran-backed Iraqi militias surrounded the U.S. Embassy in Baghdad, forcing their way into the compound and setting some outer buildings on fire. No U.S. personnel were reported harmed at the Embassy, but Secretary of Defense Mark Esper announced the deployment of an additional infantry battalion \"in response to increased threat levels against U.S. personnel and facilities, such as we witnessed in Baghdad.\" President Trump tweeted that Iran, which \"orchestrat[ed the] attack,\" would \"be held fully responsible for lives lost, or damage incurred, at any of our facilities. They will pay a very BIG PRICE!\" On January 2, 2020, the U.S. Department of Defense announced in a statement that the U.S. military had killed IRGC-QF Commander Major General Qasem Soleimani in a \"defensive action.\" The statement cited Soleimani's responsibility for \"the deaths of hundreds of Americans and coalition servicemembers\" and his approval of the embassy blockade in Baghdad, and asserted that he was \"actively developing plans to attack American diplomats and servicemembers in Iraq and throughout the region.\" According to subsequent media reports and Administration statements, Soleimani was killed in a U.S. drone strike while leaving Baghdad International Airport early on the morning of January 3 local time; KH founder and Iraqi Popular Mobilization Forces (PMF) leader Abu Mahdi Al Muhandis and other Iranian and Iraqi figures also were killed in the strike. Soleimani was widely regarded as one of the most powerful and influential figures in Iran, perhaps second only to Supreme Leader Ali Khamene'i, to whom Soleimani reportedly had a direct channel. As head of the IRGC-QF, Soleimani was the driving force behind Iran's external military operations, including the campaign to keep the Asad government in power in Syria. Some analysts argue that his death is likely to have a dramatic impact on Iran's capabilities, with one expert describing him as \"the military center of gravity of Iran's regional hegemonic efforts\" and \"an operational and organization genius who likely has no peer in the upper ranks of the Islamic Revolutionary Guard Corps.\" Others contend that while Soleimani was undoubtedly important, \"he was only the agent of a government policy that preceded him and will continue without him.\" U.S. officials have explained the timing and rationale behind the strike in a number of ways. Administration officials claim that Soleimani posed a direct threat and that he was involved in planning an \"imminent\" attack that would put U.S. lives at risk. Some Members of Congress have challenged that assertion, publicly contesting the evidence presented by the Administration in a classified setting. President Trump said in a January 10 interview that he believed Soleimani was involved in planning \"large-scale attacks\" on \"four embassies,\" while Secretary Esper said on January 12 that he \"didn't see\" specific intelligence indicating such a threat. Some Members of Congress have also challenged this rationale in light of reports that another IRGC-QF commander was targeted in Yemen on the same day as the Soleimani strike (see below). The Administration has also argued that striking Soleimani was an attempt to deter future Iranian aggression. Striking Soleimani would appear to be of greater magnitude than previous U.S. responses, such as additional troop deployments, that were carried out with the stated intention of deterring Iran. Those responses arguably did not do so (given the December 27 rocket strike and other Iranian actions). This killing thus may be an attempt to alter Iran's decision-making calculus. Some have suggested that the December 27 death of the American contractor in Iraq and the subsequent embassy blockade compelled President Trump to order the strike. Secretary of State Mike Pompeo has underscored that the United States is not seeking further escalation. Iran's leaders, including Supreme Leader Khamene'i and President Hassan Rouhani, have vowed revenge for Soleimani's killing. Khamene'i declared three days of public mourning, and large crowds, estimated in the hundreds of thousands in some cases, attended funeral processions for Soleimani across Iran. One analyst argues that, because of Soleimani's personal popularity across the Iranian political spectrum, his death \"will create a rally to the flag,\" likely strengthening hardliners in advance of legislative elections scheduled for February 2020. Others caution that the crowds, brought about in part by government coercion, are also \"images that are destined for domestic consumption but more so for foreign consumption to display popular support for the regime.\" Early on January 8, 2020 (Iraq local time), in its first action since Soleimani's death, Iran launched several ballistic missiles targeting at least two Iraqi military bases where U.S. forces are located. The U.S. Department of Defense said the missiles, of which there were more than a dozen, were launched from Iran. Both the U.S. and Iraqi militaries reported no casualties. President Trump appeared to downplay the attack, tweeting that \"All is well!\" and \"So far, so good!\" Iranian officials conveyed different messages about the strike and whether it represented the entirety of Iran's response. Iranian Foreign Minister Javad Zarif tweeted that Iran \"took & concluded proportionate measures,\" while Supreme Leader Khamene'i tweeted that \"such military actions are not enough.\" Debate remains about whether Iran intended to inflict casualties in the attack: an Iranian general said that Iran \"did not intend to kill,\" while Chairman of the Joints Chief of Staff Army General Mark Milley and Secretary Pompeo have said that Iran did have that intention. Some outside analysts contend that Iran was seeking to demonstrate its ability to kill Americans while stopping short of doing so. Further Iranian response could take several forms. Possible Iranian retaliatory measures could include mobilizing militias it supports to attack U.S. forces deployed in Iraq, Syria, and/or Afghanistan; conducting strikes on oil production facilities or tankers, U.S. military installations, or other targets in the Gulf; activating proxies and operatives to execute \"more asymmetric or unconventional-style hits\" through Europe, South America, or elsewhere; cyber attacks; or other responses. The confrontation also could heighten the prospect of additional Iranian steps in breach of the JCPOA (see below), perhaps dealing a \"fatal blow\" to the accord and international attempts to preserve it. Regarding the threat posed by possible Iranian retaliation, Secretary Pompeo said on January 5 that \"there is a real likelihood that Iran will make a mistake and make a decision to go after some of our forces,\" while also maintaining that, \"There is less risk today to American forces in the region as a result of\" Soleimani's death. Iranian options may be constrained by increased domestic upheaval in the wake of its January 8, 2020, downing of a civilian airliner. Several hours after Iranian forces launched missiles at Iraqi bases, a Ukraine International Airlines passenger flight crashed shortly after taking off from Tehran, killing all 176 on board. The Iranian government stated that the crash was caused by a mechanical failure and pledged to investigate the incident, which it described as unrelated to the missile launch. However, international pressure grew in light of evidence that the plane had been shot down by the Iranian military, and after Canada (which had 57 citizens killed in the crash) and several other countries publicly charged Iran with downing the plane, the Iranian government admitted that the plane had been shot down by a Russian-made Tor-M1 (or SA-15) surface-to-air missile, attributing the firing to \"human error.\" Demonstrators subsequently gathered in Tehran and elsewhere to demand accountability and condemn the government, with President Trump warning Iranian leaders, via Twitter, \"Do not kill your protesters\" and \"the world is watching.\" In May 2018, President Trump signed National Security Presidential Memorandum 11, \"ceasing U.S. participation in the JCPOA [Joint Comprehensive Plan of Action] and taking additional action to counter Iran's malign influence and deny Iran all paths to a nuclear weapon.\" The action set in motion a reestablishment of U.S. unilateral economic sanctions that affect U.S. businesses and include secondary sanctions that target commerce originating in other countries that engage in trade with and investment in Iran. On January 10, 2020, the President, as promised in the immediate aftermath of the U.S. drone strike that killed Soleimani, announced new sanctions to curtail international trade, transactions, and financing in Iran's construction, mining, manufacturing, and textile sectors. The Secretary of the Treasury, on the same day, announced that eight \"senior Iranian regime officials who have advanced the regime's destabilizing objectives\" were made subject to sanctions, and 17 Iranian metals producers, mining companies, and three partners in China and the Seychelles that facilitated trade in Iran's metal products were also now designated for economic restrictions. The sanctions authority announced on January 10, like the authority used to target those engaged in Iran's metals and mining sectors, can be used to target individuals and entitiesâincluding financial institutionsâin third countries (secondary sanctions) that are found to operate in or engage in the sector, or materially assist, sponsor, or provide \"financial, material, or technological support for, or goods or services to or in support of\" any entity subject to sanctions for its participation in Iran's construction, mining, manufacturing, and textile sectors. Foreign financial institutions, in particular, could be subject to being denied the means to operate in the United States. No designations have been made yet under this new sanctions authority. Following the Trump Administration's May 2018 announcement that the United States would no longer participate in the JCPOA, Iran threatened to exceed the agreement's limits on the country's nuclear activities. In July 2019, the International Atomic Energy Agency (IAEA) verified that some of Iran's nuclear activities were exceeding these limits; the Iranian government has since increased the number of such activities, such as exceeding JCPOA-mandated limits on its heavy water stockpile. The Iranian government announced on January 5, 2020, what an official news agency report described as \"the fifth and final step in reducing\" Tehran's JCPOA commitments. The statement explains that Iran \"will set aside the final operational restrictions under the JCPOA which is 'the restriction on the number of centrifuges,'\" but provides no further details. Tehran has stated that the government will continue to cooperate with the IAEA and abide by the JCPOA's monitoring and inspections provisions. The January 5 announcement adds that \"[i]n case of the removal of sanctions and Iran benefiting from the JCPOA,\" Iran \"is ready to resume its commitments\" pursuant to the agreement. This announcement does not mention Soleimani's death and is consistent with a timeline described in a November 5, 2019, speech by Iranian President Hassan Rouhani speech, in which he said, \"In the next two months, we still have a chance for negotiations.\" Iran's support for armed factions in the region is a key instrument of its policy. Iran's operations in support of its allies (identified below) are carried out by the IRGC-QF, formerly headed by Soleimani. IRGC leaders generally publicly acknowledge operations in support of regional allies, although they often characterize Iran's support as humanitarian aid or protection for Shia minority populations or religious sites. Iran supplies weaponry to its allies including specialized anti-tank systems, artillery rockets, mortars, short-range ballistic missiles, and cruise missiles. Estimates of the dollar value of material support that Iran provides to its allies and proxies vary widely and are difficult to corroborate. Information from official U.S. government sources sometimes provides broad dollar figures without breakdowns or clear information on how those figures were derived. For example, the State Department's September 2018 report \"Outlaw Regime: A Chronicle of Iran's Destructive Activities\" asserts that Iran has spent over $16 billion since 2012 \"propping up the Assad regime and supporting [Iran's] other partners and proxies in Syria, Iraq, and Yemen.\" However, that report appears to cite an outside estimate that does not explain how the estimates were derived. The State Department has described Hezbollah, a Lebanon-based militia and U.S.-designated Foreign Terrorist Organization (FTO) that plays a major role in Lebanese politics, as \"Iran's primary terrorist proxy group;\" Iran provides Hezbollah with significant funding, training and weapons. In June 2018, Treasury Under Secretary for Terrorism and Financial Intelligence Sigal Mandelker estimated that Iran provided Hezbollah with more than $700 million per year. According to the State Department, Iran provides Hezbollah with thousands of rockets, short-range missiles, and small arms, and has trained \"thousands\" of Hezbollah fighters at camps in Iran. Israeli security officials have also expressed concern that Iran may be assisting Hezbollah to develop an indigenous rocket and missile production capability. Since violence broke out in Syria in 2011, Iran has provided technical assistance, training, and financial support to both the Syrian government and to pro-regime Shia militias operating in Syria. The U.S. Department of the Treasury has designated for sanctions the Iranian Ministry of Intelligence and Security (MOIS), the IRCG-QF, and Iran's national police pursuant to Executive Order 13572 (April 2011), for assisting the Syrian government in its violent crackdown on protestors. Iran also has facilitated the travel of Shia militia fighters from Iraq, Afghanistan, and Pakistan into Syria to bolster the Asad government. Iran has directly backed the activities of these militia fighters with armored vehicles, artillery, and drones. Iran also has provided Syria with billions of dollars in credit to purchase oil, food, and import goods. In mid-2019, the United States imposed sanctions on Iranian ships and shipping facilitators involved in Iranian oil shipments to Syria. Iran supports a number of armed groups in Iraq, including U.S. designated terrorist organizations such as Kata'ib Hezbollah (KH), Asa'ib Ahl al Haq (AAH), and Harakat Hezbollah al Nujaba. Iran-linked groups in Iraq directly targeted U.S. forces from 2003 through 2011, and U.S. officials blame Iran-linked Iraqi groups for a series of indirect fire attacks on U.S. and Iraqi facilities hosting U.S. civilian and military personnel since 2018. The 115 th and 116 th Congresses have considered proposals directing the Administration to impose U.S. sanctions on some Iran-aligned Iraqi groups, and enacted legislation containing reporting requirements focused on Iranian support to nonstate actors in Iraq and other countries. On January 3, 2020, the State Department designated the AAH as a Foreign Terrorist Organization and two of the group's leaders, Qa'is Khazzali and his brother Laith, as Specially Designated Global Terrorists under E.O.13224, as amended by E.O. 13886. These designations follow action taken by the Department of the Treasury on December 6, 2019, to designate the brothers pursuant to E.O. 13818 for their involvement in serious human rights abuses in Iraq, notably approving lethal force against protestors. Several Iraqi militia forces have vowed revenge against the United States and stated their renewed commitment to expelling U.S. forces from Iraq, but some others have called for a measured approach and disavowed potential attacks on non-military targets as a means of fulfilling their stated objectives. For example, Kata'ib Hezbollah released a statement in the aftermath of the Iranian missile attack on Iraq saying \"emotions must be set aside\" to further the project of expelling the United States. On January 8, Qa'is al Khazali said that the response to the killing of Soleimani and Muhandis \"will be no less than the size of the Iranian response. That is a promise.\" Later Khazali denied responsibility for a January 8 rocket attack targeting the U.S. Embassy while insisting on U.S. military withdrawal and vowing an \"earthshattering\" response. Iran has sometimes intervened militarily in Iraq directly, including by conducting air strikes against Islamic State forces advancing on the border with Iran in 2014 and by launching missiles against Iranian Kurdish groups encamped in parts of northern Iraq in 2018. Iranian leaders have not historically identified Yemen as a core Iranian security interest, but they have given some material support to the Shia Houthi rebels that are fighting Saudi Arabia and the coalition that it leads in support of the Yemeni government. In response to the Saudi-led air campaign in Yemen, the Houthis have fired ballistic missiles on sites within Saudi Arabia on several occasions; Saudi Arabia, with U.S. backing, accuses Iran of providing those missiles. The increasingly sophisticated nature of Iran's support for the Houthis could suggest that Iran perceives the Houthis as a potential proxy to project power on the southwestern coast of the Arabian Peninsula. On the other hand, Special Representative for Iran and Senior Advisor to the Secretary of State Brian Hook stated on December 5, 2019, that Iran's continued involvement in the conflict amidst a nascent Saudi-Houthi de-escalation process since September 2019 shows that \"Iran clearly does not speak for the Houthisâ¦. Iran is trying to prolong Yemen's civil war to project power.\" In December 2019, the U.S. government offered up to $15 million for information concerning Yemen-based IRGC-QF leader Abdul Reza Shahla'i. Shahla'i reportedly was targeted by a strike or raid in Yemen on January 3, 2020, the day of Soleimani's killing. Unnamed U.S. officials reportedly confirmed the operation, which was unsuccessful, on January 10, leading some analysts and some Members of Congress to question the Administration's assertion that the Soleimani strike was justified by an \"imminent threat.\" In addition to the entities above, the U.S. government alleges that Iran provides support to other regional groups, including Palestinian groups Hamas and Islamic Jihad, the Bahraini group Al Ashtar Brigades, and the Afghan Taliban. Iraqi officials protested the December 29 U.S. airstrikes on KH personnel as a violation of Iraqi sovereignty, and, days later, KH members and other figures associated with Iran-linked militias and PMF units marched to the U.S. Embassy in Baghdad and damaged property, setting outer buildings on fire. Iraqi officials and security forces reestablished order outside the embassy, but tensions remained high, with KH supporters and other pro-Iran figures threatening further action and vowing to expel the United States from Iraq by force if necessary. As noted, along with Soleimani, the U.S. airstrike that hit his convoy also killed KH founder and PMF leader Jamal Ja'far al Ibrahimi (commonly referred to as Abu Mahdi al Muhandis). Muhandis was one of the key Iraqi leaders aligned with Iran who worked with Soleimani to develop and maintain Iran's ties to armed groups in Iraq over the last 20 years; Soleimani long served as a leading Iranian emissary to Iraqi political and security figures. The death of Al Muhandis is expected to require renegotiation in the relationships among Iran-aligned Iraqi militias and shape the PMF's future. The U.S. operation was met with shock in Iraq, and Prime Minister Adel Abd al Mahdi and President Barham Salih issued statements condemning the strike as a violation of Iraqi sovereignty. The prime minister called for and then addressed a special session of Iraq's unicameral legislature, the Council of Representatives (COR), on January 5, recommending that the quorum of legislators present vote to direct his government to ask all foreign military forces to leave the country. Most Kurdish and Sunni COR members reportedly boycotted the session. Those COR members present adopted by voice vote a parliamentary decision directing the Iraqi government to withdraw its request to the international anti-IS coalition for military support; remove all foreign forces from Iraq and end the use of Iraq's territory, waters, and airspace by foreign militaries; protest the U.S. airstrikes as breaches of Iraqi sovereignty at the United Nations and in the U.N. Security Council; and investigate the U.S. strikes and report back to the COR within seven days. On January 6, Prime Minister Abd al Mahdi met with U.S. Ambassador to Iraq Matthew Tueller and informed him of the COR's decision, requesting that the United States begin working with Iraq to implement the COR decision. In a statement, the prime minister's office reiterated Iraq's desire to avoid war, to resist being drawn into conflict between outsiders, and to maintain cooperative relations with the United States based on mutual respect. Amid subsequent reports that some U.S. military forces in Baghdad are repositioning for force protection reasons and potentially \"to prepare for onward movement,\" Secretary Esper stated, \"There has been no decision made to leave Iraq, period.\" On January 9, Prime Minister Abd al Mahdi asked Secretary of State Michael Pompeo to \"send delegates to Iraq to prepare a mechanism to carry out the parliament's resolution regarding the withdrawal of foreign troops from Iraq.\" On January 10, the State Department released a statement saying \"At this time, any delegation sent to Iraq would be dedicated to discussing how to best recommit to our strategic partnership, not to discuss troop withdrawal, but our right, appropriate force posture in the Middle East.\" Secretary of State Michael Pompeo said that Prime Minister Abd al Mahdi's office had not characterized their conversation accurately, and said We are happy to continue the conversation with the Iraqis about what the right structure is. Our mission set there is very clear: We've been there to perform a training mission to help the Iraqi security forces be successful and to continue the campaign against ISIS, the counter-Daesh campaign. We're going to continue that mission. But as theâas times change and we get to a place where we can deliver upon what I believe and the President believes is our right structure, with fewer resources dedicated to that mission, we will do so. Prime Minister Abd al Mahdi's December 2019 resignation marked the beginning of what may be an extended political transition period in Iraq that reopens several contentious issues for debate and negotiation. Principal political decisions now before Iraqi leaders concern (1) identification and endorsement of a caretaker prime minister and cabinet, (2) implementation of adopted electoral system reforms, and (3) the proposed holding of parliamentary and provincial government elections in 2020. Following any national elections, government formation negotiations would recur, taking into consideration domestic and international developments over the interim period, including the fate of foreign military efforts in Iraq and the state of U.S.-Iran-Iraq relations. Leaders in Iraq's Kurdistan Regional Government have endorsed the continuation of foreign military support for Iraq, but may be wary of challenging the authority of the national government if Baghdad issues departure orders to foreign partners. On January 7, Kurdistan Democratic Party leader and former KRG President Masoud Barzani said, \"we cannot be involved in any proxy wars.\" Prime Minister Abd al Mahdi traveled to Erbil to consult with Barzani on January 11, generating speculation that Abd al Mahdi may be seeking support for a re-nomination as prime minister. In 2014, the Iraqi government submitted two requests to the United Nations Security Council asking for international training, advice, and military assistance in combatting the threats posed by the Islamic State organization. These invitational letters have provided the underlying diplomatic basis for the presence of most U.S. and other international military forces in Iraq since 2014. Supplementary bilateral agreements between the Iraqi government and troop contributing countries set terms for the continued deployment of foreign forces in Iraq, and the presence of U.S. troops contributing to Operation Inherent Resolve (the U.S.-led international coalition to defeat the Islamic State), related training, and advisory support is governed by an exchange of diplomatic notes agreed to in 2014. According to former Special Presidential Envoy for the Global Coalition to Counter ISIL Brett McGurk, the 2014 U.S.-Iraq diplomatic notes, which are not public, contain a one year cancelation clause. The executive authority of the Iraqi government (the Prime Minister) may seek to amend or revoke requests for international assistance submitted to the United Nations or reached with other governments at its discretion: Iraq's constitution does not require the Iraqi executive to seek the approval of legislators in the Council of Representatives. As noted above, Prime Minister Abd al Mahdi and Secretary of State Pompeo have had initial conversations regarding the future of the U.S. presence in Iraq. President Trump has threatened to impose sanctions on Iraq, if Iraq forces U.S. troops to withdraw on unfriendly terms. Depending on the form such sanctions might take, they could elicit reciprocal hostility from Iraq and could complicate Iraq's economic ties to its neighbors and U.S. partners in Europe and Asia. If denied opportunities to build economic ties to the United States and U.S. partners, Iraqi leaders could instead mover closer to Iran, Russia, and/or China with whom they have already established close ties. Since 2018, Iraqi leaders have sought and received temporary relief from U.S. sanctions on Iran, in light of Iraq's continuing dependence on purchases of natural gas and electricity from Iran. The Trump Administration has serially granted temporary permissions for these transactions to continue, while encouraging Iraq to diversify its energy relationships with its neighbors and to become more energy independent. The Administration's most recent such sanction exemption for Iraq is set to expire in February 2020. Some press reporting suggests that Administration officials have begun preparing to implement the President's sanctions threat if necessary and considering potential effects and consequences. On May 19, 2019, the Trump Administration renewed the national emergency with respect to the stabilization of Iraq declared in Executive Order 13303 (2003) as modified by subsequent executive orders. Sanctions could be based on the national emergency declared in the 2003 Executive Order, or the President could declare that recent events constitute a new, separate emergency under authorities stated in the National Emergency Act and International Emergency Economic Powers Act (NEA and IEEPA, respectively). Sanctions under IEEPA target U.S.-based assets and transactions with designated individuals; while a designation might not reap significant economic disruption, it can send a significant and purposefully humiliating signal to the international community about an individual or entity. The National Emergencies Act, at 50 U.S.C. 1622, provides a legislative mechanism for Congress to terminate a national emergency with enactment of a joint resolution of disapproval. Short of declaring a national emergency, however, the President has broad authority to curtail foreign assistance (throughout the Foreign Assistance Act of 1961 (22 U.S.C. 2151 et seq.), and related authorizations and appropriations), sales and leases of defense articles and services (particularly Section 3 of the Arms Export Control Act; 22 U.S.C. 2753), and entry into the United States of Iraqi nationals (Immigration and Nationality Act; particularly at 8 U.S.C. 1189). More than 5,000 U.S. military personnel and hundreds of international counterparts remain in Iraq at the Iraqi government's invitation, subject to bilateral executive-to-executive agreements. Since Soleimani's death, Canada and Germany have announced withdrawal of some of their training forces from Iraq. Combined Joint Task ForceâOperation Inherent Resolve (CJTF-OIR) announced on January 5 that U.S. training and counter-IS operations were being temporarily paused to enable U.S. forces to focus on force protection measures. U.S. officials have reported that through October 2019, the Islamic State group in Iraq continued \"to solidify and expand its command and control structure in Iraq, but had not increased its capabilities in areas where the Coalition was present.\" CJTF-OIR judged that IS fighters \"continued to regroup in desert and mountainous areas where there is little to no local security presence\" but were \"incapable of conducting large-scale attacks.\" Iraqi Security Forces (ISF), Counter Terrorism Service (CTS) and Popular Mobilization Forces (PMF) continue to conduct clearance, counterterrorism, and hold missions against IS fights across northern, central, and western Iraq. Some of these operations are conducted without U.S. and coalition support, while others are partnered with U.S. and coalition forces or supported by U.S. and coalition forces. In its latest public oversight reporting, CJTF-OIR described the Iraqi Security Forces as lacking sufficient personnel to hold and constantly patrol remote terrain. According to CJTF-OIR reporting to the DOD inspector general, Iraq's Counterterrorism Service (CTS) has \"dramatically improved\" its ability \"to integrate, synchronize, direct, and optimize counterterrorism operations,\" and some CTS brigades are able to sustain unilateral operations. According to U.S. officials, ISF units are capable of conducting security operations in and around population centers and assaulting identified targets but many lack the will and capability to \"find and fix\" targets or exploit intelligence without assistance from coalition partners. According to November 2019 reporting CJTF-OIR said that most commands within the ISF will not conduct operations to clear ISIS insurgents in mountainous and desert terrain without Coalition air cover, intelligence, surveillance, and reconnaissance (ISR), and coordination. Instead, ISF commands rely on the Coalition to monitor \"points of interest\" and collect ISR for them. Despite ongoing training, CJTF-OIR said that the ISF has not changed its level of reliance on Coalition forces for the last 9 months and that Iraqi commanders continue to request Coalition assets instead of utilizing their own systems. These conditions and trends suggest that while the capabilities of IS fighters remain limited at present, IS personnel and other armed groups could exploit persistent weaknesses in ISF capabilities to reconstitute the threats they pose to Iraq and neighboring countries. This may be particularly true with regard to remote areas of Iraq or under circumstances where security forces remain otherwise occupied with crowd control or force protection measures. A reconstituted IS threat might not reemerge rapidly under these circumstances, but the potential is evident. U.S. and coalition training efforts have shifted to a train-the-trainer and Iraqi ownership approach under the auspices of OIR's Reliable Partnership initiative and the NATO Training Mission in Iraq. Reliable Partnership was redesigned to focus on building a minimally viable counterterrorism capacity among Iraqi forces, with other outstanding capability and support needs to be reassessed after September 2020. In the days following the Soleimani killing, Coalition and NATO training efforts were temporarily suspended, and some countries announced plans to withdraw forces participating in Coalition and NATO training programs. If such trends continue, they could accelerate an already planned transition to greater Iraqi ownership of training efforts and an international reassessment of Iraq's needs and terms for longer-term partnership. The January 5 CJTF-OIR statement that announced the pause in counter-IS operations in Iraq following Soleimani's death, referenced above, did not mention the status of U.S. operations against the Islamic State in Syria, where roughly 600 U.S. forces are currently based. Various observers have argued that the absence of ongoing U.S. counterterrorism pressure is likely to provide the Islamic State with the operational space necessary to reconstitute itself in the region. U.S. forces in Syria have at times come into direct conflict with Iran-backed militia forces. In 2017, U.S. forces in Syria conducted strikes against pro-Asad militia fighters that infiltrated the de-confliction area around the U.S. garrison at At Tanf. In late 2019, U.S. forces targeted the Iran-backed militia Kata'ib Hezbollah in Iraq and eastern Syria, in response to an attack by the group on U.S. forces in Kirkuk. U.S. personnel in Syria may be vulnerable to additional attacks by Iran-backed forces. On January 4, 2020, President Trump submitted a notification to the Speaker of the House and President Pro Tempore of the Senate of the Soleimani drone strike, as required by Section 4(a) of the War Powers Resolution ( P.L. 93-148 ; 50 U.S.C. Â§ 1543(a)(1)), which requires notification within 48 hours of U.S. forces being introduced into conflict or into a situation that could lead to conflict. That notification, pursuant to the War Powers Resolution, also is to set out the constitutional and legislative authority for the action. According to a media report, citing \"congressional officials,\" the notification was classified in its entirety by the Trump Administration, and its contents therefore have not been made publicly available. Speaker Nancy Pelosi criticized the decision to classify the notification in its entirety as \"highly unusual.\" In statements after the strike, National Security Adviser Robert O'Brien asserted that the Authorization for Use of Military Force Against Iraq Resolution of 2002 (\"2002 AUMF\"; P.L. 107-243 ) provided the President authority to direct the strike against General Soleimani in Iraq. Congress enacted the 2002 AUMF prior to the 2003 U.S. invasion of Iraq that toppled the government of Saddam Hussein, authorizing the President to use the U.S. military to enforce United Nations Security Council resolutions targeting the Hussein regime and to \"defend the national security of the United States against the continuing threat posed by Iraq.\" The Obama Administration had asserted that U.S. military action after 2014 against the Islamic State in Iraq and Syria was authorized pursuant to the 2002 AUMF as well as the post-September 11, 2001 Authorization for Use of Military Force (\"2001 AUMF\"; P.L. 107-40 ). In a March 2018 report to Congress, the Trump Administration argued that the 2002 AUMF \"has always been understood to authorize the use of force for the related dual purposes of helping to establish a stable, democratic Iraq and for the purpose of addressing terrorist threats emanating from Iraq.\" Speaking in the context of the campaign against the Islamic State, the report stated that the 2002 AUMF \"contains no geographic limitation,\" and asserted that the statute permits the use of military force to protect Iraq outside the territory of Iraq itself if necessary. In a June 2019 letter, the State Department explained that it determined that 2002 AUMF authority permitted the use of military force against Iran \"as may be necessary to protect U.S. and partner forces engaged in counterterrorism operations or operations to establish a stable, democratic Iraq.\" To the extent the Administration considers the actions of Soleimani and the IRGC (designated by President Trump in April 2019 as a terrorist organization) as creating a threat to Iraq's stability or a threat of terrorism, as well as a necessity to protect U.S. or partner forces, this interpretation of the 2002 AUMF would seem to authorize operations such as the Soleimani drone strike both within and outside Iraq. Reaction from Members of Congress to the drone strike has been divided, with some Members praising the decision as a blow to Iran's operations placing U.S. and partner forces at risk of attack, and others criticizing the President's decision as possibly precipitating armed conflict between the United States and Iran, and increasing the risk of broader instability in the Middle East. Some Members, including Speaker Nancy Pelosi, have decried the President's failure to inform and consult with Congress prior to the strike, and have questioned the President's authority to conduct such military action. In response to the strike, Senators Tim Kaine and Richard Durbin introduced a joint resolution ( S.J.Res. 63 ) to \"direct the removal of United States Armed Forces from hostilities against the Islamic Republic of Iran that have not been authorized by Congress.\" The resolution states that neither the 2002 AUMF nor the 2001 AUMF provide specific authority to the President to use military force against Iran, and that Congress has not provided such specific authority in any legislation. The resolution further finds that there exists a \"conflict between the United States and the Islamic Republic of Iran\" that constitutes, pursuant to Section 4(a)(1) of the War Powers Resolution ( P.L. 93-148 ; 50 U.S.C. Â§ 1543(a)(1)), \"hostilities or a situation where imminent involvement in hostilities is clearly indicated by the circumstances,\" into which U.S. armed forces have been introduced without authorization. The resolution therefore directs the President to remove U.S. armed forces from hostilities with Iran, \"or any part of its government or military,\" within 30 days of the resolution's enactment. The resolution was introduced pursuant to Section 1013 of the Department of State Authorization Act, Fiscal Years 1984 and 1985 (50 U.S.C. Â§ 1546a), which permits expedited consideration in the Senate of a joint resolution that \"requires the removal of United States Armed Forces engaged in hostilities\" without specific congressional authorization. On January 7, 2020, Representative Ilhan Omar introduced H.J.Res. 82 , the text of which is identical to S.J.Res. 63 . After indicating that he had agreed to some changes to S.J.Res. 63 , Senator Kaine introduced an amended version of his original proposal, S.J.Res. 68 , on January 9, 2020. Instead of directing the President to \"remove\" U.S. armed forces from hostilities with Iran, S.J.Res. 68 would direct the President to \"terminate the use of U.S. armed forces for hostilities\" with Iran. This change might be a reflection of concern that requiring \"removal\" of U.S. armed forces might precipitate changes in current deployments, including possible withdrawal of U.S. armed forces in Iraq. The new proposal also eliminates references to Trump Administration statements and policy with regard to Iran. On January 3, 2020, Representative Ro Khanna and Senator Bernie Sanders indicated their intent to introduce legislation to prohibit funding for the U.S. use of military force against Iran. Representative Khanna introduced his bill, H.R. 5543 , with 47 cosponsors, on January 7. The bill would state that neither the 2002 AUMF nor 2001 AUMF, nor any other existing provision of law, may be construed to provide authority to use military force against Iran, and would prohibit the use of federal funds to use force against Iran without such specific authorization. The proposed legislation is identical to an amendment adopted in the House version of the National Defense Authorization Act for Fiscal Year 2020, but that was not included in the final version of the act. Senator Sanders introduced a similar bill, S. 3159 , on January 8, 2020. On January 8, 2020, Senator Jeff Merkley introduced S.J.Res. 64, which consists of a provision specifying that neither the Authorization for Use of Military Force Against Iraq Resolution of 2002 (\"2002 AUMF\"; P.L. 107-243 ), nor the post-September 11, 2001 Authorization for Use of Military Force (\"2001 AUMF\"; P.L. 107-40 ) \"may be interpreted as a statutory authorization for the use of military force against the Islamic Republic of Iran.\" On January 8, 2020, Representative Elissa Slotkin introduced, pursuant to Section 5(c) of the War Powers Resolution (50 U.S.C. Â§ 1544(c)), a concurrent resolution ( H.Con.Res. 83 ) \"to terminate the use of United States Armed Forces to engage in hostilities in or against Iran.\" This resolution would state that Congress has not enacted an authorization for the President to use military force against Iran, and that any decision to use force against Iran should be explained both to Congress, as required by Section 3 of the War Powers Resolution, and the American people. It explains, however, that the \"United States has an inherent right to self-defense against imminent armed attacks.\" In the operative provision, it would therefore directs the President \"to terminate the use of United States Armed Forces to engage in hostilities in or against Iran or any part of its government or military,\" unless Congress specifically authorizes such use of the armed forces, or if such force is necessary and appropriate to defend the United States or its armed forces against \"imminent attack.\" Senator Tom Udall introduced a companion resolution in the Senate, S.Con.Res. 33 , on January 9, 2020. The House debated H.Con.Res. 83 on January 9, 2020. During debate, proponents of the resolution argued that the President had taken military action that made wider conflict with Iran more likely, and that it was the constitutional duty of the Congress to require the President to obtain specific legislative authorization for any further military action against Iran only after the Congress had a full opportunity to debate such authorization. Opponents of the measure stated that the President's strike on Soleimani was lawful and necessary to protect the national security of the United States and the safety of U.S. armed forces in Iraq and the Middle East region, and that congressional action to limit the President from carrying out further military action was divisive and would embolden Iran and other enemies of the United States. After general debate, the House voted to adopt H.Con.Res. 83 by a 224-194 roll call vote. The measure will now move to the Senate, where it is to be referred to the Senate Foreign Relations Committee. As a Section 5(c) concurrent resolution receiving privileged consideration pursuant to Section 7 of the War Powers Resolution (50 U.S.C. Â§ 1546), the Committee is required to report the measure to the full Senate for consideration no later than 15 calendar days after referral, upon which the measure becomes the pending business of the Senate and shall be voted upon in the Senate within three calendar days, unless the Senate votes to alter the timeframe by the yeas and nays. Regarding concurrent resolutions. H.Con.Res. 83 was introduced pursuant to Section 5(c) of the War Powers Resolution (50 U.S.C. Â§ 1544(c)), which sets out a process by which Congress can direct termination of an unauthorized presidential use of military force through concurrent resolution, adopted in both houses of Congress but not presented to the President for signature. It has been argued that this provision constitutes an unconstitutional \"legislative veto,\" essentially a legislative action that is intended to have the effect of enacted law but without the step of presentment to the President. In invalidating an unrelated statute as constituting a \"legislative veto,\" the Supreme Court in INS v. Chadha determined that all \"legislative acts\" are subject to the bicameralism and presentment requirements of Article I, Â§7. The Court defined a legislative act as any action \"properly [] regarded as legislative in its character and effect\" or taken with \"the purpose and effect of altering the legal rights, duties and relations of persons ... outside the Legislative Branch.\" The courts, however, have not ruled expressly on the constitutionality of Section 5(c), and it is not settled that Section 5(c) resolutions necessarily involve congressional reversal of executive branch action by a simple or concurrent resolution, when such decisions were taken pursuant to a previous congressional delegation of authority to such agency by legislation. It could be argued that Congress adopting a concurrent resolution directing withdrawal from unauthorized hostilities is not a legislative act to repeal existing authority previously delegated by Congress. Congress in the War Powers Resolution has not purported to delegate use of military force decision making authority to the President, setting a legislative veto to reverse such decisions when it sees fit. Nor has it delegated authority to the President to order any specified use of military force. Instead, it can be argued that Congress is indicating its will to formally disapprove an originally unauthorized use of military force, which arguably would not alter the legal rights or duties of the President. Such a resolution would act to reiterate Congress's position, stated in Section 2 of the War Powers Resolution, that the Constitution grants only Congress, not the President, the authority to introduce U.S. armed forces into hostilities in all cases except defense against an armed attack on the United States, its possessions, or U.S. armed forces. Regarding Joint Resolutions. A concurrent resolution evidencing the will of Congress to direct the President to withdraw from hostilities that the War Powers Resolution asserts is already unauthorized may nonetheless have less than the desired effect, as it is in one conception merely a reiteration of congressional interpretation of the limits of presidential war powers, an interpretation already rejected in most instances by the President. Using a joint resolution rather than a concurrent resolution as a vehicle to direct the President to cease action against Iran, S.J.Res. 63 (for example) was introduced under Section 1013 of the Department of State Authorization Act, Fiscal Years 1984 and 1985 (50 U.S.C. Â§ 1546a). Congress enacted Section 1013 in the wake of the Chadha decision to provide a separate process by which Congress could expedite consideration of a joint resolution that would require presentment to the President rather than using an expedited Section 5(c) resolution. Utilization of this provision might be preferred by some Members of Congress, as it avoids the legislative veto issue, and perhaps provides a more forceful vehicle by which to require an end to unauthorized presidential introduction of U.S. armed forces into hostilities. On the other hand, such joint resolutions presented to the President are likely to receive a presidential veto, requiring two-thirds majorities in both Houses if such resolutions are to become law. This was a situation Congress sought to avoid when enacting the War Powers Resolution, as it placed a severe test on Congress to act to preserve its role in determining whether the United States would enter a military conflict. Secretary Pompeo has said that although U.S. personnel in the Middle East are safer following the removal of Soleimani from the battlefield, there remains \"an enormous set of risks in the region\" and that the United States is \"preparing for each and every one of them.\" Secretary Pompeo has also remarked that the United States will ensure that its overseas diplomatic facilities are as \"hardened as we can possibly get them\" to defend against possible Iranian action. Following the December 31 blockade of the U.S. Embassy in Baghdad, 100 Marines assigned to the Special Purpose Marine Air-Ground Task Force, Crisis ResponseâCentral Command (SPMAGTF-CR-CC) were deployed at the State Department's request to reinforce the Embassy. Analysts note that this Task Force, which was created after the 2012 attack on a U.S. post in Benghazi, is capable of providing compound defense through the use of air, ground, and, when necessary, amphibious operations. These additional forces augment the Marine Security Guard (MSG) detachment and other security personnel already present at the Embassy. MSGs have worked with the State Department to protect and safeguard U.S. overseas posts for over 60 years. Neither the State Department nor the Department of Defense disclose the number of MSGs serving at each overseas post. General Milley has expressed confidence regarding Embassy Baghdad's security, stating that it is unlikely to be overrun and warning that air and ground capabilities there mean that anyone who attempts to do so \"will run into a buzzsaw.\" Some analysts maintain that because Iran and its proxies have previously demonstrated their capability to perpetrate attacks throughout the world, the State Department must mitigate risks to the safety of U.S. personnel not only in the Middle East but worldwide. State Department regulations enable the Principal Officer at each overseas post (at an embassy, this would be the ambassador), Regional Security Officer (or RSO, the senior Diplomatic Security Service special agent serving at post), and the post's Emergency Action Committee, with the support of Bureau of Diplomatic Security personnel in Washington, DC, to evaluate threats and develop and implement security policies and programs. Some analysts have suggested that past Iranian behavior indicates that the State Department should give special consideration to the threat posed by kidnapping or attacks focused on so-called \"soft targets,\" which include buildings such as schools, restaurants, or other public spaces that often are frequented by diplomats or their families. The State Department could also choose to close or change the status of an overseas post in response to evolving threat assessments. This occurred previously in Iraq, when in September 2018 the State Department announced that the U.S. Consulate General in Basrah would be placed on ordered departure, meaning that all U.S. personnel would be evacuated from post. Secretary Pompeo has stated that the State Department is continuing to evaluate the appropriate overseas diplomatic posture for the United States given the Iranian threat. As policymakers and analysts consider how Iran might respond to the killing of Soleimani, the situation clearly has implications for the state of Israel. Israel and Iran are already engaged in low-level conflict. Since 2017, this has reportedly included periodic cross-border exchanges of fire between Israel and Iran-supported groups in Syria and Lebanon, as well as numerous Israeli air strikes against Iran-linked targets in both countries and Iraq. Israel has indicated that Iranian transfers of precision-guided rockets and missiles to groups, such as Hezbollah in Lebanon, and Iran's presence in Syria, have made the situation on its northern front one of the top threats to Israel's national security (alongside Iran's nuclear program). As a result of Soleimani's killing, the Israel Defense Forces have been placed on high alert. Israel has an extensive network of missile defense systems, and Congress annually appropriates funds for joint U.S.-Israeli missile defense research, development, and production. On January 6, the United States Embassy in Israel released a travel advisory, warning of the possibility of rocket fire against the country. However, that same day, senior Israeli military officials held a security cabinet meeting in which they expressed doubt that Iran would target Israel. Prime Minister Binyamin Netanyahu praised President Trump in connection with Soleimani's killing, stating, \"Just as Israel has the right of self-defense, the United States has exactly the same right.\" Beyond Israel, there is some concern that Iran could retaliate against Jewish targets worldwide. In 1994, 85 people were killed in a bombing of a Jewish community center in Buenos Aires, Argentina. In 2012, a suicide bomber killed five Israeli tourists in Bulgaria. Various sources have linked Hezbollah and Iran to these attacks. Differences over Iran have strained U.S.-European relations during the Trump Administration. The EU opposes the Administration's decision to withdraw from the JCPOA, and has sought to work with Iran and other signatories to prevent its collapse. The EU shares other U.S. concerns about Iran, however, including those related to Iran's ballistic missile program and support for terrorism. On January 6, 2020, French President Emmanuel Macron, German Chancellor Angela Merkel, and UK Prime Minister Boris Johnson released a joint statement asserting that We have condemned the recent attacks on coalitions [sic] forces in Iraq and are gravely concerned by the negative role Iran has played in the region, including through the IRGC and the Al-Qods force under the command of General Soleimani. There is now an urgent need for de-escalation. We call on all parties to exercise utmost restraint and responsibility. The current cycle of violence in Iraq must be stopped. We specifically call on Iran to refrain from further violent action or proliferation, and urge Iran to reverse all measures inconsistent with the JCPOA. The statement additionally expressed concern about security and stability in Iraq and emphasized the importance of continuing to combat the Islamic State. In a subsequent statement following a meeting of NATO countries, NATO Secretary General Jens Stoltenberg reiterated many of these points, similarly expressing concern about Iran's destabilizing behavior and calling for de-escalation. European countries are significant contributors to Global Coalition to Defeat ISIS and the NATO training and advisory mission in Iraq, both of which suspended operations following the Soleimani strike. Germany and several other European nations reportedly began moving troops out of Iraq in the days after Soleimani's death. Additionally, in recent years, European countries have stepped up criticism of Iran for alleged Iranian plots to assassinate dissidents in Europe. The U.S. State Department said in a 2018 report that Iranian-sponsored terrorist attacks in Europe, after a \"brief lull in the 1990s and early 2000s,\" are \"on the rise.\" In January 2019, in response to a Dutch letter linking Iran to assassinations of Dutch nationals of Iranian origin in 2015 and 2017, the EU imposed sanctions on the internal security unit of Iran's Intelligence ministry and two Iranian operatives for sponsoring acts of terrorism. Since May 2019, the United States has added forces and military capabilities in the region, beginning with the accelerated deployment of the USS Abraham Lincoln (which was relieved in December 2019 by the USS Harry S. Truman Carrier Strike Group). The additional deployments as of October 2019 had added approximately ten thousand U.S. military personnel to a baseline of between 60,000-80,000 U.S. forces in and around the Persian Gulf, which include those stationed at military facilities in the Arab states of the Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Oman, and Bahrain), and those in Iraq and Afghanistan. DOD officials indicated that the additional deployments are prudent defensive measures, allowing the U.S. to respond to aggression, if necessary. Other key recent deployments include the following: On December 31, 2019, DOD announced deployment to Kuwait of an infantry battalion from the Immediate Response Force (IRF) of the 82 nd Airborne Division, with 750 soldiers to deploy immediately and additional forces from the IRF (about 3,000 military personnel) to deploy thereafter. A small (likely platoon-size) element of the 173 rd Brigade is also deploying to the region, possibly to Lebanon. On January 5, 2020, DOD officials announced that a task force of U.S. Special Operations Forces, including Rangers, was deployed to the Middle East. On January 6, 2020, reports indicated that the 26 th Marine Expeditionary Unit was being directed to the Mediterranean. On January 6, 2020, it was reported that DOD would be sending six B-52 Stratofortress bombers to Diego Garcia in the Indian Ocean, to be available for operations in Iran, if ordered. According to key Trump Administration documents, including the 2017 National Security Strategy and 2018 National Defense Strategy, effectively competingâeconomically, diplomatically, and militarilyâwith China and Russia is the key national security priority facing the United States today. Accordingly, activities that can bolster the United States within this competition are, at least in theory, to be prioritized over other strategic challenges including countering violent extremist groups, a long-standing and critical challenge in the CENTCOM area of responsibility (AOR). Some observers contend that a shift in U.S. resources away from the CENTCOM AOR and towards Europe and Asia is therefore necessary. CENTCOM Commander General Kenneth McKenzie noted in his questions for the record associated with his December 2018 confirmation hearing: The 2018 National Defense Strategy (NDS) will reduce U.S. force posture in the Central Region and realign resources to goals with higher priority in the NDS. The shift of U.S. resources away from USCENTCOM presents a challenge to the command's ability to provide deterrence with forward stationed combat credible forces. This will require USCENTCOM to develop new concepts and strengthen its relationships with regional partners and allies. Additionally, reduced U.S. presence provides an opportunity for competitors to potentially increase their influence with our partners. As stated earlier, this creates increased risk if USCENTCOM also loses funding which will likely be taken from engagement and security cooperation programs necessary to offset our reposturing-both real and perceived. Despite this intended strategic reprioritization, Iran has long been viewed as a central challenge to the United States and U.S. allies and interests in the CENTCOM AOR. General McKenzie argued in his confirmation hearing that \"The long term, enduring most significant threat in the U.S. CENTCOM AOR is Iran,\" which will \"require [CENTCOM] to adopt innovative new techniques to maintain deterrence against Iran, becauseâ¦the underpinning of everything else that will go on in the theater is the ability to deter Iran and respond if required to.\" These developments have led some observers to question whether the proposed strategic reprioritization of threats, including the redirection of assets and capabilities away from the CENTCOM AOR, is feasible. Others contend that despite recent developments with Iran, the region should still figure as a less important U.S. strategic priority given the scale of the challenges posed by China and Russia. Still others contend that force planning concepts like Dynamic Force Employmentâthat is, the rapid and unpredictable shift of key U.S. military assets from one theater to anotherâmitigate some of the risk associated with diverting resources away from CENTCOM. While the commitment of additional U.S. troops has been relatively modest since May 2019, other threats and contingencies could create a demand for additional U.S. forces that is not currently forecasted and that could create pressures on the U.S. military. Ultimately, any troops that are deployed to CENTCOM, as well as those training to replace them, would be taken out of the \"pool\" of forces available and ready to respond to other possible contingencies. U.S. military forces are a finite resource; the deployment of assets to the CENTCOM AOR would necessarily impact the availability of forces for other theaters and contingencies. U.S. expeditionary operations are enabled by a network of American bases and facilities that are hosted in other allied and partner countries. Yet basing of U.S. troops on foreign soil is a sensitive matter for host countries due to the fact that such deployments of American military forcesâwhich are subject to U.S. rather than host nation legal jurisdictionâare inherently in tension with a host nation's sovereignty. As a result, the political-military dynamics with the countries that host U.S. troops require careful management. Recent events, including the Soleimani strike and Iranian counter-strikes, could complicate bilateral negotiations on U.S. forward bases, both in Iraq as well as in other parts of the world, discussions that are already sensitive due to burden-sharing issues. While the aftermath of the January 8, 2020, Iranian missile counterstrikes is still evolving, many practitioners and experts note that the United States has, at times in recent decades, engaged in hybrid, irregular conflict with Iran (with U.S.-Iran naval clashes during the 1980-1988 Iran-Iraq War being a notable exception). Hybrid and irregular warfare are commonly understood to be instances in which belligerents, to varying extents, collaborate with proxies (including, but not limited to, militias, other countries, criminal networks, corporations, and hackers) and deliberately sow confusion as to what constitutes \"civilian\" versus \"military\" activities in order to create plausible deniability for a given action. Some scholars maintain that Iran relies heavily on proxy forces to achieve its objectives: [Iran's nonstate] network is the cornerstone of Iranian national security strategyâ¦ It is in large part because of this extensive network that the United States considers Iran a threat to national security and a destabilizing force in the region. Iran's network of nonstate partners enables the country to project power and increase its influence outside its borders while antagonizing the United States and its regional partners. In turn, these groups pursue a range of malign activities to sow instability, complicate ongoing conflicts, and undermine the interests of the United States and its partners, all while remaining under the threshold of warâwhich Tehran tries to avoid at all costs as its conventional forces lack the capabilities to match those of the United States. Many observers expect that U.S.-Iranian conflict will return to a state of mostly irregular/hybrid warfare. However, given the Trump Administration's overall strategic guidance to prioritize great power competition, some are concerned that insufficient attention and resources are now being dedicated toward preparing U.S. forces to wage the kind of irregular/hybrid warfare that may be an enduring feature of strategic dynamics, both in the Persian Gulf and in other parts of the world. Still others express concern that other national security and foreign policy institutions such as the State Departmentâwith nonmilitary capabilities and authorities that could be useful for effectively prosecuting U.S. irregular /hybrid warfare strategies (as well as countering such tactics from adversaries)âare insufficiently organized and resourced relative to the scope and scale of the challenges. ", "summary": "The January 2, 2020, U.S. killing in Iraq of Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF) Commander Qasem Soleimani, generally regarded as one of the most powerful and important officials in Iran, has potentially dramatic implications for the United States. For Congress, it raises possible questions about U.S. policy in the Middle East, broader U.S. global strategy, U.S. relations with partners and allies, the authorization and legality of U.S. military action abroad, U.S. measures to protect its servicemembers and diplomatic personnel, and congressional oversight of these and related issues. This report provides background information in response to some frequently asked questions related to the strike and its aftermath, including Who was Qasem Soleimani and why did the U.S. military kill him? How have Iranians reacted? How have Iraqis reacted and how does this impact Iraqi policy and government formation? How might the strike and Iraqi reactions impact the U.S. military presence in Iraq and the U.S.-led counter-ISIS campaign (Operation Inherent Resolve)? How does the killing of Soleimani impact Israel and its security? What has been the European reaction? Under what authority did the U.S. military carry out the strike? How have Members of Congress responded legislatively or otherwise? What is the U.S. force posture in the region? How do recent regional developments align with broader U.S. strategy? The information contained in this report, which will be updated periodically as events warrant, is current as of January 13, 2020. The following CRS products provide additional background and analysis of issues discussed in this report: CRS Report R44017, Iran's Foreign and Defense Policies , by Kenneth Katzman; CRS Report R45795, U.S.-Iran Conflict and Implications for U.S. Policy , by Kenneth Katzman, Kathleen J. McInnis, and Clayton Thomas; CRS In Focus IF11403, The 2019-2020 Iran Crisis and U.S. Military Deployments , by Kathleen J. McInnis; CRS In Focus IF10404, Iraq and U.S. Policy , by Christopher M. Blanchard; CRS Report R42699, The War Powers Resolution: Concepts and Practice , by Matthew C. Weed; CRS Report RL34544, Iran's Nuclear Program: Status , by Paul K. Kerr; and CRS In Focus IF11338, Diplomatic Security and the Role of Congress , by Cory R. Gill and Edward J. Collins-Chase.", "document_type": "crs"}
{"report": "This report describes selected health care-related provisions that are scheduled to expire during the second session of the 116 th Congress (i.e., during calendar year [CY] 2020). For purposes of this report, expiring provisions are defined as portions of law that are time-limited and will lapse once a statutory deadline is reached, absent further legislative action. The expiring provisions included in this report are those related to Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. The report also includes health care-related provisions enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or extended under the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ). This report describes health care-related provisions within the same scope that expired during the first session of the 116 th Congress (i.e., during CY2019). Although the Congressional Research Service (CRS) has attempted to be comprehensive, it cannot guarantee that every relevant provision is included here. The two types of provisions discussed in this report generally are enacted in the context of authorization laws and thus are typically within the purview of congressional authorizing committees. The duration that a provision is in effect usually is regarded as creating a timeline for legislative decisionmaking. In choosing this timeline, Congress navigates tradeoffs between the frequency of congressional review and the stability of funding or other legal requirements that pertain to the program. The first type of provision in this report provides or controls mandatory spending, meaning it provides temporary funding, temporary increases or decreases in funding (e.g., Medicare provider bonus payments), or temporary special protections that may result in changes in funding levels (e.g., Medicare funding provisions that establish a floor). The second type of provision defines the authority of government agencies or other entities to act, usually by authorizing a policy, project, or activity. Such provisions also may temporarily delay the implementation of a regulation, requirement, or deadline, or establish a moratorium on a particular activity. Expiring health care provisions that are predominantly associated with discretionary spending activitiesâsuch as discretionary authorizations of appropriations and authorities for discretionary user feesâare excluded from this report. Certain types of provisions with expiration dates that otherwise would meet the criteria set forth above are also excluded from this report. Some of these provisions are excluded, because they are transitional or routine in nature or have been superseded by congressional action that otherwise modifies the intent of the expiring provision. For example, statutorily required Medicare payment rate reductions and payment rate re-basings that are implemented over a specified period are not considered to require legislative attention and are excluded. The report is organized as follows: Table 1 lists the relevant provisions that are scheduled to expire in 2020. Table 2 lists the relevant provisions that expired during 2019. The provisions in each table are organized by expiration date and applicable health care-related program. The report then describes each listed provision, including a legislative history. The summaries are grouped by provisions scheduled to expire in 2020 followed by those that expired in 2019. Appendix A lists demonstration projects and pilot programs that are scheduled to expire in 2020 or that expired in 2019 and are related to Medicare, Medicaid, CHIP, and private health insurance programs and activities or other health care-related provisions that were enacted in the ACA or last extended under the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). Appendix B lists the status of provisions included in CRS Report R45781, Health Care-Related Expiring Provisions of the 116th Congress, First Session , that did not apply within the scope of this report. Appendix C lists all laws that created, modified, or extended the health care-related expiring provisions described in this report. Appendix D lists abbreviations used in the report. The Title V Sexual Risk Avoidance Education (SRAE) program, formerly known as the Abstinence Education Grants program, provides funding for education to adolescents aged 10 to 20 exclusively on abstaining from sexual activity outside of marriage. The Department of Health and Human Services (HHS) administers the program, and funding is provided primarily via formula grants. The 50 states, District of Columbia, and the territories are eligible to apply for funds. Jurisdictions request Title V SRAE funds as part of their request for Maternal and Child Health Block Grant funds authorized in SSA Section 501. Funds are allocated to jurisdictions based on their relative shares of low-income children. Funding is also available for eligible entities (not defined in statute) in jurisdictions that do not apply for funding. The Personal Responsibility and Work Opportunity Reconciliation Act of 1996 ( PRWORA; P.L. 104-193 ), Section 912 , established the Abstinence Education Grants program and provided $50 million for each of FY1998 through FY2002. The Welfare Reform Extension Act of 2003 (WREA 2003; P.L. 108-40 ), Section 6, provided $50 million for FY2003. An Act to Extend the Temporary Assistance for Needy Families Block Grant Program, and Certain Tax and Trade Programs, and For Other Purposes ( P.L. 108-89 ), Section 101 , provided funding through March 31, 2014 in the manner authorized for FY2002 (i.e., $50 million, but proportionally provided for the first two quarters of FY2004). The Welfare Reform Extension Act of 2004 (WREA 2004 ; P.L. 108-210 ), Section 2 , provided funding through June 30, 2004 in the manner authorized for FY2002. TANF and Related Programs Continuation Act of 2004 ( P.L. 108-262 ) , Section 2 , provided funding through September 30, 2004 in the manner authorized for FY2002. Welfare Reform Extension Act, Part VIII ( P.L. 108-308 ) , Section 2 , provided funding through March 31, 2005 in the manner authorized for FY2004. The Welfare Reform Extension Act of 2005 (WREA 2005 ; P.L. 109-4 ), Section 2, provided funding through June 30, 2005 in the manner authorized for FY2004. TANF Extension Act of 2005 ( P.L. 109-19 ) , Section 2 , provided funding through September 30, 2005 in the manner authorized for FY2004. QI, TMA, and Abstinence Programs Extension and Hurricane Katrina Unemployment Relief Act of 2005 ( P.L. 109-91 ) , Section 102 , provided funding through December 31, 2005 in the manner authorized for FY2005. The Tax Relief and Health Care Act of 2006 (TRHCA; P.L. 109-432 ), Section 401 , provided funding through June 30, 2007 in the manner authorized for FY2006. An Act to Provide for the Extension of Transitional Medical Assistance, and Other Provisions ( P.L. 110-48 ) , Section 1 , provided funding through September 30, 2007 in the manner authorized for FY2006. TMA, Abstinence Education, and QI Programs Extension Act of 2007 ( P.L. 110-90 ) , Section 2 , provided funding through December 31, 2007 in the manner authorized for FY2007. The Medicare, Medicaid, and SCHIP Extension Act of 2007 ( MMSEA; P.L. 110-173 ), Section 202 , provided funding through June 30, 2008 in the manner authorized for FY2007. The Medicare Improvements for Patients and Providers Act of 2008 (MIPPA ; P.L. 110-275 ), Se ction 201 , provided funding through June 30, 2009 in the manner authorized for FY2007. ACA, Section 2954, provided $50 million for each of FY2010 through FY2014. Protecting Access to Medicare Act of 2014 ( PAMA ; P.L. 113-93 ), Section 205 , provided $50 million for FY2015. Medicare Access and CHIP Reauthorization Act of 2015 ( MACRA ; P.L. 114-10 ), Section 214 , provided $75 million for each of FY2016 and FY2017. BBA 2018, Section 50502 , renamed the program and provided $75 million for each of FY2018 and FY2019. Continuing App ropriations Act, 2020, and Health Extenders Act of 2019 ( P.L. 116-59 ), Section 12 01 , provided $10,684,931 for the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriation s Act, 2020, and Further Health Extenders Act of 2019 ( P.L. 116-69 ), Section 120 1 , provided $16,643,836 for the period of October 1, 2019 through December 20, 2019. Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) Division N, Section 303, provided $48,287,671 for the period of October 1, 2019 through May 22, 2020. Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ), S ection 3821 provided $75 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, funding was provided for a specified portion of FY2021 (October 1, 2020 through November 30, 2020) at the same proportional share of amounts provided during that same period in FY2020. Funding authorized under the CARES Act for the Title V SRAE program expires after November 30, 2020. The Personal Responsibility Education Program (PREP) is a broad approach to teen pregnancy prevention that seeks to educate adolescents ages 10 through 19 and pregnant and parenting youth under age 21 on both abstinence and contraceptives to prevent pregnancy and sexually transmitted infections (STIs). Education services can address abstinence and/or contraceptives to prevent pregnancy and STIs. PREP includes four types of grants, which are administered by HHS: (1) State PREP grants, (2) Competitive PREP grants, (3) Tribal PREP, and (4) PREPâInnovative Strategies (PREIS). A majority of PREP funding is allocated to states and territories via the State PREP grant. The 50 states, District of Columbia, and the territories are eligible for funding. Funds are allocated by formula based on the proportion of youth aged 10 to 20 in each jurisdiction relative to other jurisdictions. ACA, Section 2953 , established PREP and provided $75 million annually from FY2010 through FY2014. PAMA, Section 206 provided $75 million for FY2015. MACRA, Section 215 , provided $75 million for each of FY2016 and FY2017. BBA 2018, Section 50503 , provided $75 million for each of FY2018 and FY2019. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019, Section 1202, provided $10,684,931 for the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Section 1202, provided $16,643,836 for the period of October 1, 2019 through December 20, 2019. Further Consolidated Appropriations Act, 2020, Division N, Section 304, provided $48,287,671 for the period of October 1, 2019 through May 22, 2020. CARES Act , Section 382 2 provided $75 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, funding was provided for a specified portion of FY2021 (October 1, 2020 through November 30, 2020) at the same proportional share of amounts provided during that same period in FY2020. Funding authorized under the CARES Act for PREP expires after November 30, 2020. SSA Section 1890A requires the HHS Secretary to establish a pre-rulemaking process to select quality measures for use in the Medicare program. As part of this process, the Secretary makes available to the public measures under consideration for use in Medicare quality programs and broadly disseminates the quality measures that are selected to be used, while the consensus-based entity with a contract (National Quality Form, or NQF) gathers multi-stakeholder input and annually transmits that input to the Secretary. NQF fulfills this requirement through its Measure Applications Partnership (MAP), an entity that convenes multi-stakeholder groups to provide input into the selection of quality measures for use in Medicare and other federal programs. MAP publishes annual reports with recommendations for selection of quality measures in February of each year, with the first report published in February 2012. ACA, Section 3014(c) , transferred a total of $20 million from the Medicare Hospital Insurance (HI) and Supplementary Medical Insurance (SMI) Trust Funds for each of FY2010 through FY2014 to carry out SSA Section 1890A(a)-(d) (and the amendments made to SSA Section 1890(b) by ACA Section 3014(a)). PAMA, Section 109 , transferred $5 million for the remainder of FY2014 (from April 1, 2014, to September 30, 2014) and $15 million for the first six months of FY2015 (from October 1, 2014, to March 31, 2015) to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d); funds were required to remain available until expended. MACRA, Section 207 , transferred $30 million for each of FY2015 through FY2017 to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d). The funding provided under MACRA for FY2015 replaced the funding provided under PAMA for that year; therefore, the total funding for FY2015 was $30 million. BBA 2018, Section 50206 , transferred $7.5 million for each of FY2018 and FY2019 to carry out both Section 1890 and SSA Section 1890A(a)-(d). The section also added new HHS reporting requirements and modified existing NQF reporting requirements to specify use of funding, among other things. Amounts transferred for each of FY2018 and FY2019 are in addition to any unobligated balances that remained from prior years' transfers. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019 , Section 1401, transferred $1,069,000 for the period beginning October 1, 2019, and ending November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Section 1401, transferred $1,665,000 for the period beginning October 1, 2019, and ending December 20, 2019. Further Consolidated Appropriations Act, 2020 , Division N, Section 102, transferred $4,830,000 for the period beginning October 1, 2019, and ending May 22, 2020. CARES Act, Section 3802 , provided $20 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, funding was provided for a specified portion of FY2021 (October 1, 2020 through November 30, 2020) at the same proportional share of amounts provided during that same period in FY2020. Funding authorized under the CARES Act to carry out the measure selection activities under SSA Section 1890A(a)-(d) expires after November 30, 2020. Under SSA Section 1890, the HHS Secretary is required to have a contract with a consensus-based entity (e.g., NQF) to carry out specified duties related to performance improvement and measurement. These duties include, among others, priority setting, measure endorsement, measure maintenance, and annual reporting to Congress. MIPPA, Section 183 , transferred, from the Medicare HI and SMI Trust Funds, a total of $10 million for each of FY2009 through FY2012 to carry out the activities under SSA Section 1890. American Taxpayer Relief Act of 2012 ( ATRA ; P.L. 112-240 ) , Section 609(a) , transferred $10 million for FY2013 and modified the duties of the consensus-based entity. Pathway for SGR Reform Act of 2013 ( PSRA ; P.L. 113-67 ) , Section 1109 , required that transferred funding remain available until expended. PAMA, Section 109 , transferred $5 million for the remainder of FY2014 (from April 1, 2014, to September 30, 2014) and $15 million for the first six months of FY2015 (from October 1, 2014, to March 31, 2015) to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d); funds were required to remain available until expended. MACRA, Section 207 , transferred $30 million for each of FY2015 through FY2017 to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d). The funding provided under MACRA for FY2015 effectively replaced the funding provided under PAMA for that year; therefore, the total funding for FY2015 was $30 million. Funds were required to remain available until expended. BBA 2018, Section 50206 , transferred $7.5 million from the Medicare HI and SMI Trust Funds for each of FY2018 and FY2019 to carry out both Section 1890 and SSA Section 1890A(a)-(d). The section also added new HHS reporting requirements and modified existing NQF reporting requirements to specify use of funding, among other things. Amounts transferred for each of FY2018 and FY2019 are in addition to any unobligated balances that remained from prior years' transfers. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019 , Section 1401, transferred $1,069,000 for the period beginning October 1, 2019, and ending November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Section 1401, transferred $1,665,000 for the period beginning October 1, 2019, and ending December 20, 2019. Further Consolidated Appropriations Act, 2020, Division N, Section 102, transferred $4,830,000 for the period beginning October 1, 2019, and ending May 22, 2020. CARES Act, Section 3802 , provided $20 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, funding was provided for a specified portion of FY2021 (October 1, 2020 through November 30, 2020) at the same proportional share of amounts provided during that same period in FY2020. Funding authorized under the CARES Act to support the contract with the consensus-based entity under SSA Section 1890 expires after November 30, 2020. MACRA made several fundamental changes to how Medicare pays for physician and practitioner services by (1) changing the methodology for determining the annual updates to the conversion factor, (2) establishing new methods for paying for professional services under Medicare Part B, including a merit-based incentive payment system (MIPS) to consolidate and replace several existing incentive programs and to apply value and quality adjustments to the Medicare physician fee schedule (MPFS), and (3) establishing the development of, and participation in, alternative payment models (APMs). To provide technical assistance to small practices and practices in health professional shortage areas, MACRA required the HHS Secretary to enter into contracts or agreements with appropriate entities (such as quality-improvement organizations, regional extension centers, or regional health collaboratives) to offer guidance and assistance to MIPS-eligible professionals in practices of 15 or fewer professionals. Under the technical assistance program, priority is required to be given to professionals located in rural areas, health professional shortage areas, or practices with low composite scores under the new payment system. The guidance and assistance is provided with respect to the MIPS performance categories or with respect to how to transition to the implementation of and participation in an APM. For purposes of implementing the technical assistance program, $20 million from the SMI Trust Fund was made available to the Centers for Medicare & Medicaid Services (CMS) for each of FY2016-FY2020. These amounts are available until expended. MACRA, Section 101, provided for the transfer of $20 million, for each of FY2016 through FY2020, from the Medicare SMI Trust Fund. No funds to support the technical assistance program have been authorized beyond FY2020. Payments under the Medicare MPFS are adjusted geographically for three factors to reflect differences in the cost of resources needed to produce physician services: physician work, practice expense, and medical malpractice insurance. The geographic adjustments are indicesâknown as Geographic Practice Cost Indices (GPCIs)âthat reflect how each area compares to the national average in a \"market basket\" of goods. A value of 1.00 represents the average across all areas. These indices are used in the calculation of the payment rate under the MPFS. Several laws have established a minimum value of 1.00 (floor) for the physician work GPCI for localities where the work GPCI was less than 1.00. MMA , Section 412, provided for an increase in the work geographic index to 1.0 (floor) for any locality for which the work geographic index was less than 1.0 for services furnished from January 1, 2004, through December 31, 2006. TRHCA , Section 102 , extended the floor through December 31, 2007. MMSEA , Section 103, extended the floor through June 30, 2008. MIPPA , Section 134, extended the floor through December 31, 2009. In addition, beginning January 1, 2009, MIPAA set the work geographic index for Alaska to 1.5 if the index otherwise would be less than 1.5; no expiration was set for this modification. ACA , Section 3102, extended the floor through December 31, 2010. Medicare and Medicaid Extenders Act of 2010 (MMEA; P.L. 111-309 ) , Section 103, extended the floor through December 31, 2011. Temporary Payroll Tax Cut Continuation Act of 2011 ( TPTCCA, P.L. 112-78 ) , Section 303, extended the floor through February 29, 2012. Middle Class Tax Relief and Job Creation Act of 2012 (MCTRJCA, P.L. 112-96 ) , Section 3004, extended the floor through December 31, 2012, and required the Medicare Payment Advisory Commission (MedPAC) to report on whether any work geographic adjustment to the MPFS is appropriate, what that level of adjustment should be (if appropriate), and where the adjustment should be applied. The report also was required to assess the impact of such an adjustment, including how it would affect access to care. ATRA , Section 602, extended the floor through December 31, 2013. PAMA , Section 102, extended the floor through March 31, 2015. MACRA , Section 201, extended the floor through December 31, 2017. BBA 2018 , Section 50201, extended the floor through December 31, 2019. Further Consolidated Appropriations Act, 2020, Division N, Section 101 , extended the floor through March 22, 2020. CARES Act, Section 3801, extended the floor through November 30, 2020. The authority for the MPFS GPCI floor expires after November 30, 2020. Federally certified home health (HH) agencies receive increased payments under the HH prospective payment system (PPS) for Medicare home health care episodes furnished to beneficiaries in rural areas. Before BBA 2018, when provided by legislation, the HHÂ  rural add-on Â was a fixed percent age Â increase to the HH PPS that was appliedÂ uniformly to Â  Medicare home health episodes of care provided in rural counties.Â  Under BBA 2018, the add-on was applied unvaryingly for the first year the legislation extended the increase d Â payment, providing a 3% rural add-on payment to Medicare home health episodes furnished in any rural county that began in CY2018. After CY2018, BBA 2018 provided home health agencies a 3%, 2%, and 1% HH PPS add-on payment for services furnished in rural counties beginning during CY2019-CY2021, respectively, unless the Medicare home health services were, or are, furnished in a rural county with one of the twoÂ  below-describedÂ  designations, in which case alternative add-on payments were /are Â provided: For home health episodes furnished to beneficiaries who reside inÂ  low population densityÂ  counties, which are defined as rural counties that have a population density of six or fewer individuals per square mile, BBA 2019 provided 4%, 3%, 2%, and 1% HH PPS add-on payments for services beginning during CY2019-CY2022, respectively , and For home health episodes provided to beneficiaries who reside inÂ  high utilizationÂ  counties, which are defined as rural counties in the top quartile of all counties rendering home health services (by the number of HH episodes furnished per 100 Medicare eligibles), BBA 2018 provided 1.5% and 0.5% HH PPS add-on payments for home health episodes beginning in CY2019-CY2020, respectively. BBA 2018 provided no add-on payment for episodes furnished in high utilization rural counties that begin in CY2021 or CY2022. Under BBA 2018, rural counties were to be categorized only once and such determination applies to payment home health episodes through CY2022. The Medicare, Medicaid, and SCHIP Benefits Improvement and Protection Act of 2000 (BIPA 2000; P.L. 106-554 ), Section 508, Â established a 10% add-on to Medicare's HH PPS rates for home health episodes provided to beneficiaries in rural areas beginning April 1, 2001, through March 31, 2003. Medicare Prescription Drug, Improvement, and Modernization Act of 2003 ( MMA ; P.L. 108-173 ), Section 421, Â provided a 5% add-on for services beginning April 1, 2004, through March 31, 2005. Deficit Reduction Act of 2005 ( DRA ; P.L. 109-171 ) , Section 5201, Â provided a 5% add-on for services beginning January 1, 2006, through December 31, 2006. ACA Section, 3131, Â provided a 3% add-on for services beginning April 1, 2010, through December 31, 2015. MACRA, Section 210, Â provided a 3% add-on for services beginning January 1, 2016 through December 31, 2017. BBA 2018, Section 50208, Â provided a 3% add-on for services beginning in CY2018. BBA 2018 provided a 3%, 2%, and 1% add-on for services beginning in years CY2019-CY2021, respectively, unless the services were provided in a low population density or high utilization rural county. For services provided in low population density rural counties, BBA 2018 provided an add-on at 4%, 3%, 2%, and 1% for services beginning in years CY2019-CY2022, respectively. For services furnished in high utilization rural counties, a 1.5% and 0.5% add-on was provided for services beginning in years CY2019-CY2020, respectively.Â  After December 31, 2020, home health agencies are no longer set to receive an add-on payment for services provided in rural counties designated as high utilization counties.Â  The Administration for Community Living (ACL) administers federal grant programs that fund outreach and assistance to older adults, individuals with disabilities, and their caregivers in accessing various health and social services. Funding for these programs is provided through discretionary budget authority in annual appropriations to the following entities: State Health Insurance Assistance Programs (SHIPs): programs that provide outreach, counseling, and information assistance to Medicare beneficiaries and their families and caregivers on Medicare and other health insurance issues. Area Agencies on Aging (AAA): state-designated public or private nonprofit agencies that address the needs and concerns of older adults at the regional or local levels. AAAs plan, develop, coordinate, and deliver a wide range of home and community-based services. Most AAAs are direct providers of information and referral assistance programs. Aging and Disability Resource Centers (ADRCs): programs in local communities that assist older adults, individuals with disabilities, and caregivers in accessing the full range of long-term services and supports options, including available public programs and private payment options. The National Center for Benefits and Outreach Enrollment assists organizations to enroll older adults and individuals with disabilities into benefit programs that they may be eligible for, such as Medicare, Medicaid, the Supplemental Security Income (SSI) program, and the Supplemental Nutrition Assistance Program (SNAP), among others. In addition to discretionary funding for these programs, beginning in FY2009, MIPPA provided funding for specific outreach and assistance activities to Medicare beneficiaries. This mandatory funding was extended multiple times, most recently in the CARES Act through November 30, 2020, and provided for outreach and assistance to low-income Medicare beneficiaries including those who may be eligible for the Low-Income Subsidy program, Medicare Savings Program (MSP), and the Medicare Part D Prescription Drug Program. The HHS Secretary is required to transfer specified amounts for MIPPA program activities from the Medicare Trust Funds. MIPPA , Section 119, authorized and provided a total of $25 million for FY2009 to fund low-income Medicare beneficiary outreach and education activities through SHIPs, AAAs, ADRCs, and coordination efforts to inform older Americans about benefits available under federal and state programs. ACA , Section 3306, extended authority for these programs and provided a total of $45 million for FY2010 through FY2012 in the following amounts: SHIPs, $15 million; AAAs, $15 million; ADRCs, $10 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. ATRA , Section 610, extended authority for these programs through FY2013 and provided a total of $25 million in the following amounts: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. PSRA , Section 1110, extended authority for these programs through the second quarter of FY2014 and provided funds at FY2013 levels ($25 million) for the first two quarters of FY2014 (through March 31, 2014). PAMA , Section 110, extended authority for these programs through the second quarter of FY2015 (through March 31, 2015). For FY2014, PAMA provided a total of $25 million at the following FY2013 funding levels: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5.0 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5.0 million. In addition, PAMA provided funds at FY2014 levels for the first two quarters of FY2015 (through March 31, 2015). MACRA , Section 208, extended authority for these programs through September 30, 2017. For FY2015, MACRA provided funding at the previous year's level of $25 million in the following amounts: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. For FY2016 and FY2017, MACRA provided $37.5 million annually, a $12.5 million per year increase from FY2015 funding levels, in the following amounts: SHIPs, $13 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $12 million. BBA 2018, Section 50207, extended authority for these programs through September 30, 2019. For FY2018 and FY2019, BBA 2018 provides funding at the FY2017 funding level of $37.5 million annually in the following amounts: SHIPs, $13 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $12 million. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019, Section 1402, extended authority for these programs through November 21, 2019. For October 1, 2019 to November 21, 2019, they provided a total of $5.343 million in the following amounts: SHIPs, $1.852 million; AAAs $1.069 million; ADRCs, $712,000; and the contract with the National Center for Benefits Outreach and Enrollment, $1.710 million. F urther Continuing Appropriations Act, 2020 , and F urther H ealth Extenders Act of 2019 , Section 1402, extended authority for these programs through December 20, 2019. For November 22, 2019 to December 20, 2019, they provided a total of $2.98 million in the following amounts: SHIPs, $1.033 million; AAAs $597,000; ADRCs, $397,000; and the contract with the National Center for Benefits Outreach and Enrollment, $953,000. Further Consolidated Appropriations Act, 2020, Division N, Section 103, extended authority for these programs through May 22, 2020. For December 21, 2019 to May 22, 2020, it provided a total of $15.823 million in the following amounts: SHIPs, $5.485 million; AAAs $3.165 million; ADRCs, $2.110 million; and the contract with the National Center for Benefits Outreach and Enrollment, $5.063 million. CARES Act, Section 3803, extended authority for these programs through November 30, 2020. For FY2020, it provided a total of $37.5 million in the following amounts (which supersedes the funding previously provided by law for all periods of FY2020): SHIPs, $13 million; AAAs $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits Outreach and Enrollment, $12 million. Additionally, funding was provided for these programs for a specified portion of FY2021 (October 1, 2020 through November 30, 2020) at the same proportional share of amounts provided for FY2020. Funding authorized under the CARES Act for low-income outreach and assistance programs will expire after November 30, 2020. However, funds appropriated will be available for obligation until expended. When determining financial eligibility for Medicaid-covered long-term services and supports (LTSS), there are specific rules under SSA Section 1924 for the treatment of a married couple's assets when one spouse needs long-term care provided in an institution, such as a nursing home. Commonly referred to as \"spousal impoverishment rules,\" these rules attempt to equitably allocate income and assets to each spouse when determining Medicaid financial eligibility and are intended to prevent the impoverishment of the non-Medicaid spouse. For example, spousal impoverishment rules require state Medicaid programs to exempt all of a non-Medicaid spouse's income in his or her name from being considered available to the Medicaid spouse. Joint income of the couple is divided in half between the spouses, and the Medicaid spouse can transfer income to bring the non-Medicaid spouse up to certain income thresholds. Assets of the couple, regardless whose name they are in, are combined and then split in half. The non-Medicaid spouse can retain assets up to an asset threshold determined by the state within certain statutory parameters. Prior to enactment of the ACA, spousal impoverishment rules applied only in situations where the Medicaid participant was receiving LTSS in an institution. States had the option to extend these protections to certain home and community-based services (HCBS) participants under a Section 1915(c) waiver program. Beginning January 1, 2014, ACA Section 2404 temporarily substituted the definition of \"institutionalized spouse\" under SSA Section 1924(h)(1) to include application of these spousal impoverishment protections to all married individuals who are eligible for HCBS authorized under certain specified authorities. Thus, beginning January 1, 2014, for a five-year time period, the ACA required states to apply the spousal impoverishment rules to all married individuals who are eligible for HCBS under these specified authorities, not just those receiving institutional care. This modified definition expired on December 31, 2018. The 116 th Congress extended the authority for these protections and included a provision regarding state flexibility in the application of income or asset disregards for married individuals receiving certain HCBS. ACA, Section 2404, required states to extend spousal impoverishment rules to certain beneficiaries receiving HCBS for a five-year period beginning on January 1, 2014. The Medicaid Extenders Act of 2019 ( P.L. 116-3 ), Section 3 , extended this provision through March 31, 2019. The Medicai d Services Investment and Accountability Act of 2019 ( P.L. 116-16 ), Section 2, extended this provision through September 30, 2019. The Sustaining Excellence in Medicaid Act of 2019 ( P.L. 116-39 ), Section 3, extended this provision through December 31, 2019. Further Consolidated Appropriations Act, 2020 , Section 204, extended this provision through May 22, 2020. CARES Act, Section 3812, further extended this provision through November 30, 2020. The authority for the extension of spousal impoverishment protections for certain Medicaid HCBS recipients will expire after November 30, 2020. The federal government's share of CHIP expenditures (including both services and administration) is determined by the enhanced federal medical assistance percentage (E-FMAP) rate. The E-FMAP rate is based on the federal medical assistance percentage (FMAP) rate, which is the federal matching rate for the Medicaid program. The FMAP formula compares each state's average per capita income with average U.S. per capita income. FMAP rates have a statutory minimum of 50% and a statutory maximum of 83%. The E-FMAP rate is calculated by reducing the state share under the regular FMAP rate by 30%. Statutorily, the E-FMAP (or federal matching rate) can range from 65% to 85%. For some CHIP expenditures, the federal matching rate is different from the E-FMAP rate. For instance, the matching rate for translation and interpretation services is the higher of 75% or states' E-FMAP rate plus 5 percentage points. Also, for services provided to children with family incomes exceeding 300% of the federal poverty level (FPL) with an exception for certain states, the matching rate is the lower regular FMAP rate. ACA, Section 2101 , included a provision to increase the E-FMAP rate by 23 percentage points (not to exceed 100%) for most CHIP expenditures from FY2016 through FY2019. Making further continuing appropriations for the fiscal year ending September 30, 2018, and for other purposes ( P.L. 115-120 ), Section 3005, extended the increase to the E-FMAP rate for one year through FY2020. However, for FY2020 the increase to the E-FMAP is 11.5 percentage points instead of 23 percentage points. The increase to the E-FMAP expires after September 30, 2020. The Community Health Center Fund (CHCF) provided mandatory funding for federal health centers authorized in PHSA Section 330. These centers are located in medically underserved areas and provide primary care, dental care, and other health and supportive services to individuals regardless of their ability to pay. The mandatory CHCF appropriations are provided in addition to discretionary funding for the program; however, the CHCF comprised more than 70% of health center programs' appropriations in FY2019, the last year where final appropriations data are available. ACA, Section 10503, established the CHCF and provided a total of $9.5 billion to the fund annually from FY2011 through FY2015, as follows: $1 billion for FY2011, $1.2 billion for FY2012, $1.5 billion for FY2013, $2.2 billion for FY2014, and $3.6 billion for FY2015. The ACA also provided $1.5 billion for health center construction and renovation for the period FY2011 through FY2015. MACRA, Section 221, provided $3.6 billion for each of FY2016 and FY2017 to the CHCF. An Act to amend the Homeland Security Act of 2002 to require the Secretary of Homeland Security to issue Department of Homeland Security-wide guidance and develop training programs as part of the Department of Homeland Security Blue Campaign, and for other purposes ( P.L. 115-96 ), Section 3101(a), provided $550 million for the first and second quarters of FY2018 to the CHCF. BBA 2018, Section 50901, made a number of changes to the health center program replaced language that had provided two quarters of funding and provided $3.8 billion to the CHCF in FY2018 and $4 billion in FY2019. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019 , Division B, Section 1101 , provided $569,863,014 for the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Division B, Section 1101 , struck the amount that had been provided in P.L. 116-59 and provided $887,671,223 for the period of October 1, 2019 through December 20, 2019. Further Consolidated Ap propriations Act, 2020, Division N, Section 401, struck the amount that had been provided in P.L. 116-69 , and provided $2,575,342,466 for the period of October 1, 2019 through May 22, 2020. CARES Act , Section 3831, provided $4 billion for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, $668,493,151 was provided for the period of October 1, 2020 through November 30, 2020. Funding authorized under the CARES Act for CHCF expires after November 30, 2020. Any unused portion of grants awarded for a given fiscal year prior to November 30, 2020, will remain available until expended. The Special Diabetes Program for Type I Diabetes (PHSA Section 330B) provides funding for the National Institutes of Health to award grants for research into the prevention and cure of Type I diabetes. The Special Diabetes Program for Indians (PHSA Section 330C) provides funding for the Indian Health Service (IHS) to award grants for services related to the prevention and treatment of diabetes for American Indians and Alaska Natives who receive services at IHS-funded facilities. The Balanced Budget Act of 1997 (BBA 97; P.L. 105-33 ), Sections 4921 and 4922, established the two special diabetes programs and transferred $30 million annually from CHIP funds to each program from FY1998 through FY2002. BIPA 2000, Section 931, increased each program's annual appropriations to $70 million for FY2001 through FY2002 and provided $100 million for FY2003. An Act to Amend the Public Health Service Act with Respect to Special Diabetes Programs for Type 1 Diabetes and Indians ( P.L. 107-360 ) , Section 1, increased each program's annual appropriations to $150 million and provided funds from FY2004 through FY2008. MMSEA, Section 302, provided $150 million for each program through FY2009. MIPPA, Section 303, provided $150 million each program through FY2011. MMEA, Section 112, provided $150 million each program through FY2013. ATRA, Section 625, provided $150 million each program through FY2014. PAMA, Section 204, provided of $150 million each program through FY2015. MACRA, Section 213, provided $150 million each program through FY2017. Disaster Tax Relief and Airport and Airway Extension Act of 2017 ( P.L. 115-63 ), Section 301(b), provided $37.5 million for first quarter of FY2018 for the Special Diabetes Program for Indians (Note: it did not provide funding for the Special Diabetes Program for Type I Diabetes.) An Act to amend the Homeland Security Act of 2002 to require the Secretary of Homeland Security to issue Department of Homeland Security-wide guidance and develop training programs as part of the Department of Homeland Security Blue Campaign, and for other purposes, Section 3102, provided $37.5 million for the second quarter for the Special Diabetes Program for Indians and provided $37.5 million for the first and second quarters of FY2018 for the Special Diabetes Program for Type I Diabetes. BBA 2018, Section 50902, replaced language that had provided funding for the first and second quarters of FY2018 to provide $150 million for each program in FY2018 and FY2019. Continuing Appropriations Act, 2020, and Health Extenders Act of 2019 , Division B, Section 1102 , provided $ 21,369,863 for each program for the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Division B, Section 1102 , struck the amount that had been provided in P.L. 116-59 and provided $ 33,287,671 for each program for the period of October 1, 2019 through December 20, 2019. Further Consolidated Appropriations Act, 2020, Division N, Section 402, struck the amount that had been provided in P.L. 116-69 , and provided $96,575,342 for each program for the period of October 1, 2019 through May 22, 2020. CARES Act, Section 3832, provided $150 million for FY2020 for each program, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, $ 25,068,493 was provided for each program for the period of October 1, 2020 through November 30, 2020. Funding authorized under the CARES Act for the two special diabetes programs expires after November 30, 2020. Any unused portion of grants awarded for a given fiscal year prior to November 30, 2020, will remain available until expended. The National Health Service Corps (NHSC) provides scholarships and loan repayments to certain health professionals in exchange for providing care in a health professional shortage area for a period of time that varies based on the length of the scholarship or the number of years of loan repayment received. The NHSC receives mandatory funding from the CHCF through PHSA Title III. The NHSC also received discretionary appropriations in FY2011. Between FY2012 and FY2017, the program did not receive discretionary appropriations. Beginning in FY2018 and continuing in FY2019, the program received discretionary appropriations, primarily to expand the number and type of substance abuse providers participating in the NHSC. The mandatory funding from the CHCF represents more nearly three-quarters of the program's funding in both FY2018 and FY2019, the last years where final appropriations data are available. ACA, Section 10503, funded $1.5 billion to support the NHSC annually from FY2011 through FY2015, as follows: $290 million for FY2011, $295 million for FY2012, $300 million for FY2013, $305 million for FY2014, and $310 million for FY2015. Funds are to remain available until expended. MACRA, Section 221, funded $310 million for each of FY2016 and FY2017 for the NHSC. An Act to amend the Homeland Security Act of 2002 to require the Secretary of Homeland Security to issue Department of Homeland Security-wide guidance and develop training programs as part of the Department of Homeland Security Blue Campaign, and for other purposes Section 3101 , funded $65 million for the first and second quarters of FY2018 for the NHSC. BBA 2018, Sec tion 50901 , replaced language that had provided two-quarters of funding and funded $310 million for each of FY2018 and FY2019 for the NHSC. Continuing Appropriations Act, 2020, and Health Extend ers Act of 2019, Division B, Section 1101 , provided $18,021,918 for the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Division B, Section 1101 , struck the amount that had been provided in P.L. 116-59 and provided $28,072,603 for the period of October 1, 2019 through December 20, 2019. Further Consolidated Appropriations Act, 2020, Division N, Section 401, struck the amount that had been provided in P.L. 116-69 , and provided $81,445,205 for the period of October 1, 2019 through May 22, 2020. CARES Act, Section 3831, provided $310 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, $51,808,219 was provided for the period of October 1, 2020 through November 30, 2020. Funding authorized under the CARES Act for the CHCF component of the NHSC expires after November 30, 2020. Any unused portion of grants awarded for a given fiscal year prior to November 30, 2020, will remain available until expended. The Teaching Health Center program provides direct and indirect graduate medical education (GME) payments to support medical and dental residents training at qualified teaching health centers (i.e., outpatient health care facilities that provide care to underserved patients). ACA, Section 5508 , established the Teaching Health Center program and provided $230 million for direct and indirect GME payments for the period of FY2011 through FY2015. MACRA, Section 221, provided $60 million for each of FY2016 and FY2017 for direct and indirect GME payments for teaching health centers. Disaster Tax Relief and Airport and Airway Exten sion Act of 2017, Section 301 , provided $15 million for the first quarter of FY2018 for direct and indirect GME payments for teaching health centers. An Act to amend the Homeland Security Act of 2002 to require the Secretary of Homeland Security to issue Department of Homeland Security-wide guidance and develop training programs as part of the Department of Homeland Security Blue Campaign, and for other purposes, Section 3101 , struck the first quarter of funding and provided $30 million for the first and second quarters of FY2018 for direct and indirect GME payments for teaching health centers. It also limited the amount of funding that could be used for administrative purposes. B BA 2018, Section 50901 , made a number of changes to the Teaching Health Center program and replaced language that had provided two-quarters of funding and provided $126.5 million for each of FY2018 and FY2019 for direct and indirect GME payments for teaching health centers. Continuing Appropriations Act, 2020, and Health Extenders Act of 2 019 , Division B , Section 1101 , provided $44,164,384 or the period of October 1, 2019 through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019, Division B, Section 1101 , struck the amount that had been provided in P.L. 116-59 and provided $68,794,521 for the period of October 1, 2019 through December 20, 2019. Further Consolidated Appropriations Act, 2020 , Division N , Section 401, struck the amount that had been provided in P.L. 116-69 , and provided $ 199,589,041 for the period of October 1, 2019 through May 22, 2020. CARES Act, Section 3831, provided $126.5 million for FY2020, which supersedes the funding previously provided by law for all periods of FY2020. Additionally, $21,141,096 was provided for the period of October 1, 2020 through November 30, 2020. Funding authorized under the CARES Act for Teaching Health Center GME payments expires after November 30, 2020, but unused funds remain available until expended. The Health Coverage Tax Credit (HCTC) subsidizes 72.5% of the cost of qualified health insurance for eligible taxpayers and their family members. Potential eligibility for the HCTC is limited to two groups of taxpayers. One group is composed of individuals eligible for Trade Adjustment Assistance (TAA) allowances because they experienced qualifying job losses. The other group consists of individuals whose defined-benefit pension plans were taken over by the Pension Benefit Guaranty Corporation because of financial difficulties. HCTC-eligible individuals are allowed to receive the tax credit only if they either cannot enroll in certain other health coverage (e.g., Medicaid) or are not eligible for other specified coverage (e.g., Medicare Part A). To claim the HCTC, eligible taxpayers must have qualified health insurance (specific categories of coverage, as specified in statute). The credit is financed through a permanent appropriation under 31 U.S.C. Â§1324(b)(2); therefore, the financing of the HCTC is not subject to the annual appropriations process. The T rade Act of 2002 ( P.L. 107-210 ), Sections 2 01-203, authorized the Health Coverage Tax Credit, specified the eligibility criteria for claiming the credit, and made conforming amendment to the U.S.C. for purposes of financing the credit. The American Recovery and Reinvestment Act of 2009 ( ARRA, P.L. 111-5 ), Part VI: TAA Health Coverage Improvement Act of 2009 , expanded eligibility for and subsidy of the HCTC including retroactive amendments, and provided $80 million for FY2009 and FY2010 to implement the enacted changes to the HCTC. The Trade Adjustment Assistance Extension Act of 2011 ( P.L. 112-40 ), Section 241 , established a sunset date of before January 1, 2014. The T rade Preferences Extension Act of 2015 ( P.L. 114-27 ), Section 407 , retroactively reauthorized the HCTC and established a new sunset date of before January 1, 2020. Further Consolidated Appropriations Act, 2020, Section 146 , established a new sunset date of before January 1, 2021. Authorization for the HCTC is scheduled to expire after December 31, 2020. The Pregnancy Assistance Fund (PAF) program focuses on meeting the educational, social service, and health needs of vulnerable expectant and parenting individuals and their families during pregnancy and the postnatal period. The program identifies eligible populations as expectant and parenting teens, college students, and women of any age who experience domestic violence, sexual violence, sexual assault, or stalking. HHS administers the PAF program, and funding is awarded competitively to the 50 states, DC, U.S. territories, and tribal entities (hereinafter, grantees) that apply successfully. Grantees may use funds (1) to establish, operate, or maintain pregnancy or parenting services at institutions of higher education (IHEs), high schools, or community service providers; (2) to provide, in partnership with the state attorney general's office, certain legal and supportive services for women who experience domestic violence, sexual violence, sexual assault, or stalking while they are pregnant or parenting an infant; and (3) to support, either directly or through a subgrantee, public awareness about PAF services for the expectant and parenting population that is eligible for the program. ACA, Section 10212 , established PAF and provided $25 million annually from FY2010 through FY2019. Funding authorized under the ACA expired after September 30, 2019. Section 101 of MACRA made fundamental changes to the way Medicare payments to physicians are determined and how they are updated. To implement the payment modifications in Section 101 of MACRA, the law authorized the transfer of $80 million from the SMI Trust Fund for each fiscal year beginning with FY2015 and ending with FY2019. The amounts transferred are to be available until expended. MACRA , Section 101 , provided for the transfer of $80 million, for each of FY2015 through FY2019, from the Medicare SMI Trust Fund. Appropriated funds to support the activities under this subsection have not been enacted for FY2020 or subsequent fiscal years. SSA Section 1848(s) required the HHS Secretary to develop a plan for the development of quality measures for use in the MIPS program, which is to be updated as needed. The subsection also requires the Secretary to enter into contracts or other arrangements to develop, improve, update, or expand quality measures, in accordance with the plan. In entering into contracts, the Secretary must give priority to developing measures of outcomes, patient experience of care, and care coordination, among other things. The HHS Secretary, through CMS, annually reports on the progress made in developing quality measures under this subsection. MACRA, Section 102 , provided for the transfer of $15 million, for each of FY2015 through FY2019, from the Medicare SMI Trust Fund. Appropriated funds to support the activities under this subsection have not been enacted for FY2020 or subsequent fiscal years. However, funds appropriated prior to FY2020 are available for obligation through the end of FY2022. Medicare pays LTCHs for certain inpatient hospital care under the LTCH prospective payment system (LTCH PPS), which is typically higher than payments for inpatient hospital care under the inpatient prospective payment system (IPPS). PSRA amended the law so that the LTCH PPS payment is no longer available for all LTCH discharges but instead is available only for those LTCH discharges that met specific clinical criteria. Specifically, LTCHs are paid under the LTCH PPS if a Medicare beneficiary either (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. Discharges involving patients who have a principal diagnosis relating to a psychiatric diagnosis or rehabilitation do not qualify for the LTCH PPS rate. Subsequent legislation provided for other criteria to temporarily receive payment under the LTCH PPS. See section \" Temporary Exception for Certain Spinal Cord Conditions from Application of the Medicare LTCH Site Neutral Payment for Certain LTCHs (SSAÂ Â§1886(m)(6)(F); 42Â U.S.C.Â Â§1395ww(m)(6)(F)) .\" For LTCH discharges that did not qualify for the LTCH PPS based on these clinical criteria, a \"site neutral payment rate\" similar to the PPS for inpatient acute care hospitals (IPPS) was to be phased-in. The site neutral rate is defined as the lower of an \"IPPS-comparable\" per diem amount, as defined in regulations, or the estimated cost of the services involved. PSRA, Section 1206(a), established patient criteria for payment under the LTCH PPS and a site neutral payment rate for LTCH patients who do not meet these criteria. During a phase-in period for discharges in cost-reporting periods beginning in FY2016 and FY2017, LTCHs received a blended payment amount based on 50% of what the LTCH would have been reimbursed under the LTCH PPS rate and 50% of the site neutral payment rate. For cost-reporting periods beginning in FY2018 and subsequent years, the LTCH was to receive the site neutral payment rate. BBA 2018, Section 51005 , extended the transition period to site neutral Medicare payments for LTCH patients who do not meet the patient criteria for an additional two years, to include discharges in cost-reporting periods beginning during FY2018 and FY2019. During this period, LTCHs continue to receive the 50/50 blended payment for discharges that do not meet certain LTCH PPS criteria. The extended transition period to site neutral payments during which LTCHs receive a blended payment for discharges that do not meet the patient criteria expired for discharges occurring in cost-reporting periods beginning during FY2020 and subsequent years. Medicare pays LTCHs for inpatient hospital care under the LTCH PPS, which is typically higher than payments for inpatient hospital care under the IPPS. Effective for cost-reporting periods beginning in FY2016, LTCHS are paid the LTCH PPS rate for patients that meet one of the following two criteria: (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. Discharges involving patients who have a principal diagnosis relating to a psychiatric diagnosis or rehabilitation do not qualify for the LTCH PPS rate. For LTCH discharges that did not qualify for the LTCH PPS based on these criteria, a site neutral payment rate is being phased-in for cost-reporting periods beginning FY2016 through FY2019. Subsequent legislation provided for other criteria to temporarily receive payment under the LTCH PPS. See section \" Temporary Extension of Long-Term Care Hospital (LTCH) Site Neutral Payment Policy Transition Period (SSAÂ Â§1886(m)(6)(B)(i); 42Â U.S.C.Â Â§1395ww(m)(6)(B)(i)) \" for details related to site neutral payment. The 21 st Century Cures Act (Cures Act; P.L. 114-255 ), Division C, Section 15009 , established an additional temporary criterion for payment under the LTCH PPS related to certain spinal cord conditions for discharges occurring in cost-reporting periods FY2018 and FY2019. Specifically, the LTCH PPS rate would apply to an LTCH discharge if all of the following are met: (1) the LTCH was a not-for-profit on June 1, 2014; (2) at least 50% of the LTCH's CY2013 LTCH PPS-paid discharges were classified under LTCH diagnosis related groups (DRGs) associated with catastrophic spinal cord injuries, acquired brain injury, or other paralyzing neuromuscular conditions; and (3) the LTCH during FY2014 discharged patients (including Medicare beneficiaries and others) who had been admitted from at least 20 of the 50 states, as determined by the HHS Secretary based on a patient's state of residency. The authority for the temporary criterion related to certain spinal cord conditions to receive payment under the LTCH PPS expired for discharges occurring in cost reporting periods during FY2020 and for subsequent years. Currently, Medicare payments for services of physicians and certain non-physician practitioners, including radiation therapy services, are made on the basis of a fee schedule. To set payment rates under the MPFS, relative values units (RVUs) are assigned to each of more than 7,000 service codes that reflect physician work (i.e., the time, skill, and intensity it takes to provide the service), practice expenses, and malpractice costs. The relative value for a service compares the relative work and other inputs involved in performing one service with the inputs involved in providing other physicians' services. The relative values are adjusted for geographic variation in input costs. The adjusted relative values are then converted into a dollar payment amount by a conversion factor. CMS, which is responsible for maintaining and updating the fee schedule, continually modifies and refines the methodology for estimating RVUs. CMS is required to review the RVUs no less than every five years; the ACA added the requirement that the HHS Secretary periodically identify physician services as being potentially misvalued, and make appropriate adjustments to the relative values of such services under the Medicare physician fee schedule. In determining adjustments to RVUs used as the basis for calculating Medicare physician reimbursement under the fee schedule, the HHS Secretary has authority, under previously existing law and as augmented by the ACA, to adjust the number of RVUs for any service code to take into account changes in medical practice, coding changes, new data on relative value components, or the addition of new procedures. Under the potentially misvalued codes authority, certain radiation therapy codes were identified as being potentially misvalued in 2015. However, because of concerns that the existing code set did not accurately reflect the radiation therapy treatments identified, CMS created several new codes during the transition toward an episodic alternative payment model. Patient Access and Medicare Protection Act (PAMPA; P.L. 114-115 ), required CMS to apply the same code definitions, work RVUs, and direct inputs for the practice expense RVUs in CY2017 and CY2018 as applied in 2016 for these transition codes, effectively keeping the payments for these services unchanged, subject to the annual update factor. PAMPA exempted these radiation therapy and related imaging services from being considered as potentially misvalued services under CMS's misvalued codes initiative for CY2017 and CY2018. PAMPA also instructed the HHS Secretary to report to Congress on the development of an episodic alternative payment model under the Medicare program for radiation therapy services furnished in non-facility settings. BBA 2018 Section 51009, extended the restrictions through CY2019. The payment restrictions expired after December 31, 2019. Appendix A. Demonstration Projects and PilotÂ Programs This appendix lists selected health care-related demonstration projects and pilot programs that are scheduled to expire during the second session of the 116 th Congress (i.e., during calendar year [CY] 2020). The expiring demonstration projects and pilot programs listed below have portions of law that are time-limited and will lapse once a statutory deadline is reached, absent further legislative action. The expiring demonstration projects and pilot programs included here are those related to Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. This appendix also includes health care-related demonstration projects and pilot programs that were enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or extended in the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ). No relevant demonstration projects and pilot programs within the same scope expired during the first session of the 116 th Congress (i.e., during CY2019). Although CRS has attempted to be comprehensive, it cannot guarantee that every relevant demonstration project and pilot program is included here. Table A-1 lists the relevant demonstration projects and pilot programs that are scheduled to expire in 2020. Appendix B. Provisions Included in the Previous CRS Health Care-Related Expiring ProvisionsÂ Report This appendix provides information on the provisions that were included in the previous CRS report on health care-related expiring provisions (CRS Report R45781, Health Care-Related Expiring Provisions of the 116th Congress, First Session ) henceforth referred to as \"R45781,\" but were not detailed in the body of this report. As does the current report, R45781 included expiring provisions (of the same two types discussed herein) related to Medicare, Medicaid, State Children's Health Insurance Program (CHIP), and private health insurance programs and activities as well as selected other health care-related provisions. R45781 included health care-related provisions that were enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or, at the time of publication, had been extended under the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). R45781 also described health care-related provisions that, at the time of publication, were set to expire during the first session of the 116 th Congress (i.e., during calendar year [CY] 2019) or had expired during the 115 th Congress (i.e., during CY2017 or CY2018). Some of the provisions detailed in R45781 fell within the scope of this report. Such provisions expired in CY2019 or were extended and are set to expire in CY2020. Table B-1 includes the provisions detailed in R45781 that remain expired or were extended to dates beyond the 116 th Congress (i.e., after CY2020). The third column in Table B-1 provides each provision's expiration date as it was in R45781. The fourth column reflects updated information, indicating whether the expiration date remains \"unchanged\" by law or providing the current expiration date for provisions extended pursuant to congressional modification. Two private health insurance provisions were included in R45781 that did not meet the report criteria but were set to expire in 2019. These provisions modified fees and taxes established by the ACA to help fund ACA activities, including those related to private health insurance. As reflected in Table B-1, those fee and tax provisions were permanently repealed in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). Unlike the other provisions that were included in R45781 and were extended past CY2020, the extension for the Patient-Centered Outcomes Research Trust Fund (PCORTF) was legislatively undertaken in a manner that resulted in significant revisions to the program and/or funding mechanisms detailed in R45781. Because of this, this appendix includes an updated provision summary below Table B-1. See, \"Patient-Centered Outcomes Research Trust Fund (IRC Â§9511 and Â§Â§4375-4377, SSA Â§1183; 26 U.S.C. Â§9511; 26 U.S.C. Â§Â§4375-4377; 42 U.S.C. Â§1320e-2).\" For more detailed background information on the other provisions included in Table B-1, see CRS Report R45781, Health Care-Related Expiring Provisions of the 116th Congress, First Session . Table B-1 does not include demonstration projects or pilot programs. The only project or program in Appendix A of R45781 that was not included in this report is the Demonstration Program to Increase Access to Dental Health Care Service. The demonstration program expired after March 23, 2017. Patient-Centered Outcomes Research Trust Fund (IRC Â§9511 and Â§Â§4375-4377, SSA Â§1183; 26 U.S.C. Â§9511; 26 U.S.C. Â§Â§4375-4377; 42 U.S.C. Â§1320e-2) Background SSA Section 1181 establishes the Patient-Centered Outcomes Research Institute (PCORI), which is responsible for coordinating and supporting comparative clinical effectiveness research. PCORI has entered into contracts with federal agencies, as well as with academic and private sector research entities for both the management of funding and conduct of research. PHSA Section 937 requires the Agency for Healthcare Research and Quality (AHRQ) to broadly disseminate research findings that are published by PCORI and other government-funded comparative effectiveness research entities. IRC Section 9511 establishes the Patient-Centered Outcomes Research Trust Fund to support the activities of PCORI and to fund activities under PHSA Section 937. It provides annual funding to the PCORTF over the period FY2010-FY2019 from the following three sources: (1) annual appropriations, (2) fees on health insurance policies and self-insured plans, and (3) transfers from the Medicare HI and SMI Trust Funds. SSA Section 1183 provides for the transfer of the required funds from the Medicare Trust Funds. Transfers to PCORTF from the Medicare HI and SMI Trust Funds are calculated based on the number of individuals entitled to benefits under Medicare Part A or enrolled in Medicare Part B. IRC Sections 4375-4377 impose the referenced fees on applicable health insurance policies and self-insured health plans and describe the method for their calculation. For each of FY2011 through FY2019, IRC Section 9511 requires 80% of the PCORTF funds to be made available to PCORI, and the remaining 20% of funds to be transferred to the HHS Secretary for carrying out PHSA Section 937. Of the total amount transferred to HHS, 80% is to be distributed to AHRQ, with the remainder going to the Office of the Secretary (OS)/HHS. Relevant Legislation ACA, Section 6301 , provided the following amounts to the PCORTF: (1) $10 million for FY2010, (2) $50 million for FY2011, and (3) $150 million for each of FY2012 through FY2019. In addition, for each of FY2013 through FY2019, the section provided an amount equivalent to the net revenues from a new fee that the law imposed on health insurance policies and self-insured plans. For policy/plan years ending during FY2013, the fee equals $1 multiplied by the average number of covered lives. For policy/plan years ending during each subsequent fiscal year through FY2019, the fee equals $2 multiplied by the average number of covered lives. Finally, the section (in addition to ACA Section 6301(d)) provided for transfers to PCORTF from the Medicare Part A and Part B trust funds; these are generally calculated by multiplying the average number of individuals entitled to benefits under Medicare Part A, or enrolled in Medicare Part B, by $1 (for FY2013) or by $2 (for each of FY2014 through FY2019). Under this provision, PCORTF was to terminate on September 30, 2019. Continu ing Appropriations Act, 2020, and Health Extenders Act of 2019 ( P.L. 116-59 ), Section 1403 , extended the termination date of PCORTF through November 21, 2019. Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019 ( P.L. 116-69 ), Section 1403 , further extended the termination date of PCORTF through December 20, 2019. Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), Division N, Section 104 , extends funding for PCORTF through FY2029 by appropriating both the amount equivalent to the net revenues received from the fees on health insurance policies and self-insured plans and providing a direct appropriation in a specified amount (the \"applicable amount\") for each of fiscal years 2020 through 2029. The transfers from the Medicare HI and SMI Trust Funds were not extended. The section extends the termination date of PCTORF through FY2029; extends the termination dates of the fees on health insurance policies and self-insured plans through FY2029; and extends the requirement that 20% of PCORTF funds be transferred to the HHS Secretary for carrying out PHSA Section 937 for each fiscal year through FY2029. The section also makes modifications to the authorizing language for PCORI relating to the composition of its Board; appointments to its Methodology Committee; and the identification of research priorities, among others. Current Status Appropriated funds to PCORTF expire after September 30, 2029. Funds transferred to the HHS Secretary under IRC Section 9511 remain available until expended. No amounts shall be available for expenditure from the PCORTF after September 30, 2029, and any amounts in the Trust Fund after such date shall be transferred to the general fund of the Treasury. Appendix C. Laws That Created, Modified, or Extended Current Health Care-Related ExpiringÂ Provisions Appendix D. List of Abbreviations AAA: Area Agencies on Aging ACA: Patient Protection and Affordable Care Act ( P.L. 111-148 , as amended) ACL: Administration for Community Living ADRC: Aging and Disability Resource Center AHRQ: Agency for Healthcare Research and Quality APM: Alternative payment model ARRA: American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ) ASC: Ambulatory Surgery Center ATRA: American Taxpayer Relief Act of 2012 ( P.L. 112-240 ) BBA 97: Balanced Budget Act of 1997 ( P.L. 105-33 ) BBA 2018 : Bipartisan Budget Act of 2018 ( P.L. 115-123 ) BIPA 2000 : Medicare, Medicaid, and SCHIP Benefits Improvement and Protection Act of 2000 ( P.L. 106-554 ) CARES Act: Coronavirus Aid, Relief, and Economic Security Act ( P.L. 116-136 ) CHCF: Community Health Center Fund CHIP: State Children's Health Insurance Program CMS: Centers for Medicare & Medicaid Services CRS: Congressional Research Service CY: Calendar year DRA: Deficit Reduction Act of 2005 ( P.L. 109-171 ) DRG: Diagnosis related group E-FMAP: Enhanced federal medical assistance percentage FFCRA: Families First Coronavirus Response Act ( P.L. 116-127 ) FMAP: Federal medical assistance percentage FPL: Federal poverty level FY: Fiscal year GME: Graduate medical education GPCI: Geographic Practice Cost Index HCBS: Home and community-based services HCTC: Health Coverage Tax Credit HH: Home health HHS: Department of Health and Human Services HI: Hospital Insurance IHE : Institution of higher education IHS: Indian Health Service IPPS: Medicare Inpatient Prospective Payment System IVIG: Intravenous immune globulin LTCH: Long-term care hospital LTCH PPS: Long-term care hospital prospective payment system LTSS: Long-term services and supports MA: Medicare Advantage MACRA: Medicare Access and CHIP Reauthorization Act of 2015 ( P.L. 114-10 ) MAP: Measure Applications Partnership MCTRJCA: Middle Class Tax Relief and Job Creation Act of 2012 ( P.L. 112-96 ) MedPAC: Medicare Payment Advisory Commission MIPPA: Medicare Improvements for Patients and Providers Act of 2008 ( P.L. 110-275 ) MIPS: Merit-based incentive payment system MMA: Medicare Prescription Drug, Improvement, and Modernization Act of 2003 ( P.L. 108-173 ) MMEA: Medicare and Medicaid Extenders Act of 2010 ( P.L. 111-309 ) MMSEA: Medicare, Medicaid and SCHIP Extension Act of 2007 ( P.L. 110-173 ) MPFS: Medicare physician fee schedule MSP: Medicare Savings Program NHSC: National Health Service Corps NQF: National Quality Forum PAF: Pregnancy Assistance Fund PAMA: Protecting Access to Medicare Act of 2014 ( P.L. 113-93 ) PAMPA: Patient Access and Medicare Protection Act ( P.L. 114-115 ) PCORI: Patient-Centered Outcomes Research Institute PCORTF: Patient-Centered Outcomes Research Trust Fund PETI: Post-eligibility treatment of income PHSA: Public Health Service Act PPS: Prospective payment system PREIS: Personal Responsibility Education Program Innovative Strategies PREP: Personal Responsibility Education Program PRWORA: Personal Responsibility and Work Opportunity Reconciliation Act of 1996 ( P.L. 104-193 ) PSRA: Pathway for SGR Reform Act of 2013 ( P.L. 113-67 , Division B) RVU: Relative value unit SHIP: State Health Insurance Assistance Program SMI: Supplementary Medical Insurance SNAP: Supplemental Nutrition Assistance Program SRAE: Sexual Risk Avoidance Education SSA: Social Security Act SSI: Supplemental Security Income TAA: Trade Adjustment Assistance TANF: State Temporary Assistance for Needy Families TPTCCA: Temporary Payroll Tax Cut Continuation Act of 2011( P.L. 112-78 ) TRHCA: Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ) U.S.C.: U.S. Code WREA 2003: Welfare Reform Extension Act of 2003 ( P.L. 108-40 ) WREA 2004: Welfare Reform Extension Act of 2004 ( P.L. 108-210 ) WREA 2005: Welfare Reform Extension Act of 2005 ( P.L. 109-4 )", "summary": "This report describes selected health care-related provisions that are scheduled to expire during the second session of the 116 th Congress (i.e., during calendar year [CY] 2020). For purposes of this report, expiring provisions are defined as portions of law that are time-limited and will lapse once a statutory deadline is reached, absent further legislative action. The expiring provisions included in this report are those related to Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. The report also includes health care-related provisions enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or extended under the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ). In addition, this report describes health care-related provisions within the same scope that expired during the first session of the 116 th Congress (i.e., during CY2019). Although the Congressional Research Service (CRS) has attempted to be comprehensive, it cannot guarantee that every relevant provision is included here. This report focuses on two types of health care-related provisions within the scope discussed above. The first, and most common, type of provision provides or controls mandatory spending, meaning it provides temporary funding, temporary increases or decreases in funding (e.g., Medicare provider bonus payments), or temporary special protections that may result in changes in funding levels (e.g., Medicare funding provisions that establish a floor). The second type of provision defines the authority of government agencies or other entities to act, usually by authorizing a policy, project, or activity. Such provisions also may temporarily delay the implementation of a regulation, requirement, or deadline or establish a moratorium on a particular activity. Expiring health care provisions that are predominantly associated with discretionary spending activitiesâsuch as discretionary authorizations of appropriations and authorities for discretionary user feesâare excluded from this report. Certain types of provisions with expiration dates that otherwise would meet the criteria set forth above are excluded from this report. Some of these provisions are excluded because they are transitional or routine in nature or have been superseded by congressional action that otherwise modifies the intent of the expiring provision. For example, statutorily required Medicare payment rate reductions and payment rate re-basings that are implemented over a specified period are not considered to require legislative attention and are excluded. The report provides tables listing the relevant provisions that are scheduled to expire in 2020 and that expired in 2019. The report then describes each listed provision, including a legislative history. An appendix lists relevant demonstration projects and pilot programs that are scheduled to expire in 2020 or that expired in 2019.", "document_type": "crs"}
{"report": "T he Commodity Credit Corporation (CCC) has served as the financial institution for carrying out federal farm commodity price support and production programs since 1933. It is a wholly government-owned entity that exists solely to finance authorized programs that support U.S. agriculture. It is subject to the supervision and direction of the Secretary of Agriculture at the U.S. Department of Agriculture (USDA). The CCC mission was conceived mostly as one of commodity support, but over time it has expanded to include an increasingly broad array of programs, including export and commodity programs, resource conservation, disaster assistance, agricultural research, and bioenergy development. While CCC operates according to a large number of statutory authorities, its broad powers allow it to carry out almost any operation required to meet the objectives of supporting U.S. agriculture. This broad mandate, and its significant borrowing authority, has traditionally drawn little attention. For most of its history, CCC's responsibilities have been expanded through legislative directives such as the farm bill. In past years, Congress took actions to limit the discretional uses of CCC funds through restrictions in appropriations language. These restrictions highlight a tension between authorizers and appropriators when it comes to the use of the CCC (see \"Tension Between Authorizers and Appropriators\" box). While these restrictions are no longer included, questions remain about what the CCC is, how it operates, what its current uses are, and what it may be used for in the future. This report provides a brief review of CCC's unique history, funding structure, general operation, and recent issues associated with its use. Other CRS reports cover in detail programs and activities authorized through CCC. For over a decade prior to the creation of CCC in 1933, the farm economy struggled with low levels of income from depressed commodity prices and increasing costs for needed supplies and services. The first major federal effort to boost commodity prices was through the Federal Farm Board, established by the Agricultural Marketing Act of 1929. An inadequate and ultimately failed effort to eliminate surpluses was attempted by making loans to cooperative associations for the purpose of carrying out surplus purchase operations. Without the ability to control production, it was impossible to eliminate surplus stocks. This led to proposals to regulate the harvested acreage of farm commodities and quantities sold. The concept of acreage and marketing controls was incorporated in to the Agricultural Adjustment Act of 1933 (AAA). The AAA sought to reduce production by paying producers to participate in acreage control programs. Funding came from a tax on companies that processed farm products. Additional provisions of the law dealt with fair marketing practices and voluntary agreements between producers and handlers of commodities to regulate marketing. A financial institution was needed to carry out the newly authorized farm legislation, and this was accomplished with the creation of the Commodity Credit Corporation. Executive Order 6340 of October 17, 1933, directed the incorporation of CCC in the state of Delaware. The Delaware charter authorized CCC, among other things, to buy and sell farm commodities; lend; undertake activities for the purpose of increasing production, stabilizing prices, and insuring adequate supplies; and facilitate the efficient distribution of agricultural commodities. It was originally capitalized with $3 million appropriated by Congress. In 1936, sufficient stock was acquired to raise the capitalization to $100 million. Its capital stock remains at this level today. In 1939, Executive Order 8219 ordered that all rights of the United States arising out of the ownership of CCC be transferred to the Secretary of Agriculture. At that time, low prices became so critical for cotton and corn producers that waiting for another season for supply controls to impact the market was judged to be untenable. With the establishment of CCC, it became possible to make nonrecourse loans so that farmers would have funds to hold their products off the market until prices improve. The first loans were made to cotton farmers at the rate of 10 cents per pound, while the average market price was between eight and nine cents per pound. Since loans were higher than the market price and were nonrecourse, they could be satisfied by forfeiting the cotton pledged as collateral against the loan, they served as a form of price support and set the floor for the domestic market. Funding for these first loan operations came from a tax on commodity processing and from CCC's $3 million capital account, which was appropriated under authority of the National Industrial Recovery Act and the Fourth Deficiency Act. Constitutional difficulties with some provisions of the AAA, and practical shortcomings with elements of the law, led to additional legislation in the 1930s that continues today as permanent authority for many USDA activities. Subsequent omnibus \"farm bills\" now set most of the policy goals and program constraints for farm price and income support operations that are funded through CCC . The Government Corporation Control Act of 1945 (GCCA) required all wholly owned government corporations to be reincorporated as agencies or instrumentalities of the United States. Accordingly, Congress passed the Commodity Credit Corporation Charter Act of 1948 (Charter Act). All CCC rights, duties, assets, and liabilities were assumed by the federal corporation, and the Delaware corporation was dissolved. According to the Charter Act, the purpose of CCC is to stabilize, support, and protect farm income and prices; assist in maintaining balanced and adequate supplies of agricultural commodities; and facilitate the orderly distribution of commodities. A list of some of CCC's authorities (paraphrased from Section 5 of the Charter Act, 15 U.S.C. Â§714(c)) conveys a sense of its broadly stated powers: Support agricultural commodity prices through loans, purchases, payments, and other operations. Make available materials and facilities in connection with the production and marketing of agricultural products. Procure commodities for sale to other government agencies; foreign governments; and domestic, foreign, or international relief or rehabilitation agencies and for domestic requirements. Remove and dispose of surplus agricultural commodities. Increase the domestic consumption of commodities by expanding markets or developing new and additional markets, marketing facilities, and uses for commodities. Export, or cause to be exported, or aid in the development of foreign markets for commodities. Carry out authorized conservation or environmental programs. Over time, Congress has authorized CCC to fund an increasing number of diverse programs and activities related to its charter (see text box below). In carrying out operations, CCC is directed, to the maximum extent practicable, to use the usual and customary channels, facilities, and arrangements of trade and commerce. The Charter Act makes CCC an agency and instrumentality of the United States within USDA, subject to the supervision and direction of the Secretary of Agriculture. A board of directors appointed by the President, consisting of the Secretary and seven other USDA officials, is responsible for the management of CCC. CCC officers and advisorsâalso USDA officialsâare charged with maintaining liaisons with other governmental and private trade operations on the CCC's behalf. The CCC has no personnel of its own. Rather, USDA employees and facilities carry out all of its activities. Administrative functions generally fall to the USDA agencies directed to administer the various CCC programs. The majority of its functions are administered by the Farm Service Agency (FSA), which operates most of the commodity and income support programs. Other agencies that administer CCC programs include the Natural Resources Conservation Service, the Agricultural Marketing Service, the Foreign Agricultural Service, and the United States Agency for International Development (USAID). CCC reimburses other agencies for their administrative costs. CCC cannot acquire property or interest in property unless it is related to providing storage for program implementation or protecting CCC's financial interests. CCC is allowed to rent or lease space necessary to conduct business (e.g., warehousing of commodities). CCC is responsible for the direct spending and credit guarantees used to finance the federal government's agricultural commodity price support and related activities that are undertaken by authority of agricultural legislation (such as farm bills) or the Charter Act itself. It is, in brief, a broadly empowered financial institution. The money CCC needs comes from its own funds (including its $100 million capital stock, appropriations from Congress, and its earnings) and from borrowings. In accordance with government accounting statutes and regulations, CCC is required to submit an annual business-type budget statement to Congress. This is typically released annually with the President's budget request. The Office of Management and Budget (OMB) also plays a role in how CCC funds are administered through an apportionment process, which allows OMB to set a limit on the funds available for obligation and subsequent outlay. OMB apportions funds for select CCC programs and operating expenditures. OMB is precluded, however, from apportioning funds \"for price support and surplus removal of agricultural commodities.\" Most CCC-funded programs are classified as mandatory spending programs and therefore do not require annual appropriations in order to operate. CCC instead borrows from the U.S. Treasury to finance its programs. CCC has permanent indefinite authority to borrow from the Treasury (and also private lending institutions) within limits set by Congress. As the amount of money needed to carry out its activities has grown over time, the borrowing limit has been steadily increased ( Figure 1 ). At present, CCC's borrowing authority is limited to $30 billion, an amount that has not been increased since 1987. CCC activity is often described using two similar but different measures. The first is net expenditures , which is a combination of outlays and receipts. The second is net realized losses , which are expenditures that will never be recovered. CCC recoups some money from authorized activities (e.g., sale of commodity stocks, loan repayments, and fees), though not nearly as much money as it spends, resulting in net expenditures. Net expenditures include all cash outlays minus all cash receipts, commonly referred to as \"cash flow.\" CCC outlays or expenditures represent the total cash outlays of the CCC-funded programs (e.g., loans made, conservation program payments, commodity purchases, and disaster payments). Outlays are offset by receipts (e.g., loan repayment, sale of commodities, and fees). In practice a portion of these net expenditures may be recovered in future years (e.g., through loan repayments). CCC also has net realized losses, also referred to as nonrecoverable losses. These refer to the outlays that CCC will never recover, such as the cost of commodities sold or donated, uncollectible loans, storage and transportation costs, interest paid to the Treasury, program payments, and operating expenses. The net realized loss is the amount that CCC, by law, is authorized to receive through appropriations to replenish the CCC's borrowing authority (see Figure 2 ). The annual appropriation for CCC varies each year based on the net realized loss of the previous year. For example, the FY2019 appropriation ( P.L. 116-6 ) continues to provide an indefinite appropriation, covering the net realized loss for FY2018, which was $15.41 billion, 8% more than the net realized loss in FY2017 of $14.28 billion. The increase does not indicate any action by Congress to change program support but rather changes in farm program payments and other CCC activities that fluctuate based on economic circumstances and weather conditions. Also, CCC's assets, which include loans and commodity inventories, are not considered to be \"losses\" until CCC ultimately disposes of the asset (e.g., by sales, exports, or donations). At that time, the total cost is realized and added to other program expenses less any other program income. Some CCC operations are financed through appropriated funds and are unrelated to the permanent indefinite borrowing authority described above. These activities include a specific statutory authority for separate reimbursementâfor example, export credit guarantee programs, foreign donations, concessional sales under the Food for Peace Program (P.L. 83-480, also known as P.L. 480), and disaster aid. CCC has what it refers to as a \"parent/child\" account relationship with USAID. CCC allocates funds (as the parent) to USAID (as the child) to fund P.L. 480 Title II and Bill Emerson Humanitarian Trust transportation costs and other administrative costs in connection with foreign commodity donations. CCC then reports USAID's budgetary and proprietary activities in its financial statements. Over time, a number of new activities have been added to CCC's original mission, including conservation, specialty crop support, and bioenergy development. Some have suggested adding other agriculture-related activities to CCC. The idea of expanding CCC's activities generates both concern and support. Some consider this expansion to be beyond CCC's chartered purpose. Others, however, prefer the stability and consistency of mandatory funding to that of the annual appropriations process. Any expansion of mandatory funding authority, however, would require a spending or revenue offset under current budgetary rules. Although Congress as a whole makes final funding decisions, the rise in the number of agricultural programs with mandatory budget authority from the authorizing committees has not gone unnoticed or untouched by appropriators. In previous years, appropriations bills have reduced mandatory program spending below authorized levels. These reductions, as estimated by the Congressional Budget Office, are commonly referred to as changes in mandatory program spending (CHIMPS). CHIMPS can be used to offset increases in discretionary spending that are above discretionary budget caps. From FY2012 to FY2017, annual appropriation acts limited USDA's discretion to use CCC's authority to remove surplus commodities and support prices (see text box below). The FY2018 omnibus appropriation did not include this limitation, effectively allowing USDA to use CCC's full authority, including its discretion for surplus removal and price support activities, along with other authorized uses. USDA's ability to use its administrative powers in the Charter Act, however, may be restricted by executive budgetary rules such as \"administrative PAYGO\"ââthat is, the need to offset additional spending created by administrative action. Administrative PAYGO has been cited as a potential roadblock to undertaking certain CCC actions but has also been waived or not raised as an issue in other cases involving CCC. The majority of CCC operations are directed by statutory authorities that specifically direct USDA on how to administer CCC activities and in what amounts to fund them. The broad CCC authorities, however, also allow USDA a level of discretion to carry out effectively any operation that supports U.S. agriculture. This discretion has been used throughout CCC's history for a number of different purposes, including responses to natural disasters, economic conditions, and administrative priorities. The scope and scale of this discretion has traditionally been targeted to specific events, crops, or domestic needs. In the decade before FY2018, administrative discretion was partially restricted (see \" Restrictions on Use \"). USDA's use of the unrestricted portion of CCC's authority during this period totaled in the hundreds of millions of dollars (see examples below). This changed in summer 2018, when USDA announced that it would be taking several actions to assist farmers in response to trade damage from retaliatory tariffs targeting various U.S. products. USDA used its administrative discretion to authorize up to $12 billion in assistanceâreferred to as the \"trade aid\" packageâfor certain agricultural commodities. This authority was then used again in summer 2019, when USDA announced a second trade aid package authorizing up to an additional $16 billion in assistance. Congressional support for discretionary use of CCC typically varies depending on purpose. Some in Congress have questioned how USDA has used CCC, but few have advocated for a restriction or repeal of the discretionary authority in the last two years. Some Members have called on USDA to use CCC for similar assistance to industries within their states and districts. Congress did require USDA to expand payments under the trade aid program in the FY2019 supplemental appropriations. This expansion could be viewed as congressional support for the trade aid package. CCC is a government-owned and broadly empowered financial institution that has a mandate to support U.S. agriculture. Its activities are derived from authorities granted by Congress. While it is the primary funding mechanism used in omnibus farm bills, its existence, use, and operations are frequently misunderstood and often confused with USDA itself. One reason for this confusion may be because much of CCC's functional operations support USDA's program activitiesââCCC has no staff of its own; rather, it operates through USDA agencies. These broad authorities that Congress has granted to CCC allow it to carry out almost any operation that is consistent with the objective of supporting U.S. agriculture. It is these same broad powers that make CCC the object of attention from various interest groups and from Congress. The mandatory funding nature of CCC activities makes it an attractive funding mechanism. Any expansion of mandatory funding authority by Congress, however, may require a spending/revenue offset or an amendment to current budgetary rules. Recent congressional action restoring CCC's authority have allowed for the Trump Administration's use of CCC to mitigate commodity price declines from retaliatory tariffs on a variety of U.S. agricultural products. The use of CCC's discretionary authority for the FY2018 and FY2019 trade aid packages is perhaps less controversial than the total amount authorized. Each package is close to the total amount expended by CCC annually in recent fiscal years, effectively doubling the annual net realized loss. This increase in spending brings CCC close to its borrowing authority limit of $30 billion. If the borrowing authority limit were reached before Congress appropriates the net realized loss reimbursement, all functions and operations of CCC would be suspended, including those authorized in the recently enacted 2018 farm bill. Additionally, since the two trade aid packages were undertaken using CCC's discretionary authority, no congressional budget offset was required, and administrative PAYGO was not raised. The corporation's permanent, indefinite funding authority means that trade aid expenditures are reimbursed annually as a net realized loss, thus increasing total federal spending.", "summary": "The Commodity Credit Corporation (CCC) has served as a mandatory funding mechanism for agricultural programs since 1933. The CCC Charter Act enables the CCC to broadly support the U.S. agriculture industry through authorized programs including commodity and income support, natural resources conservation, export promotion, international food aid, disaster assistance, agricultural research, and bioenergy development. While CCC is authorized to carry out a number of activities, it has no staff of its own. Rather, U.S. Department of Agriculture (USDA) employees and facilities carry out all of its activities. CCC is overseen by the Secretary of Agriculture and a board of directors, which are also USDA officials. CCC has $100 million in capital stock; buys, owns, sells, and donates commodity stocks; and provides loans to farmers and ranchers. It has a permanent indefinite borrowing authority of $30 billion from the U.S. Treasury. By law, it receives an annual appropriation equal to the amount of the previous year's net realized loss. This replenishes its borrowing authority from the Treasury and allows it to cover authorized expenditures that will not be recovered. The majority of CCC activities are authorized through omnibus farm billsâmost recently the Agriculture Improvement Act of 2018 ( P.L. 115-334 ). Farm bill authorization allows programs to utilize CCC's borrowing authority, thereby dispensing with the need for an annual appropriation for individual programs. The use of this mandatory authority has expanded over time and has led to tension between authorizing committees and appropriation committees in previous fiscal years. The Charter Act also grants the Secretary of Agriculture broad powers and discretion in the use of the CCC. This discretionary use was restricted in annual appropriations legislation from FY2012 through FY2017, effectively reducing the Secretary's discretionary use of CCC. The FY2018 Consolidated Appropriations Act ( P.L. 115-124 ) did not include these restrictions, which has allowed the Trump Administration to use CCC's authority to address market impacts from China's retaliatory tariffs on certain U.S. agricultural commodities in 2018 and 2019.", "document_type": "crs"}
{"report": "On February 10, 2020, the Trump Administration proposed its FY2021 budget for the Department of State, Foreign Operations, and Related Programs (SFOPS) accounts, totaling $44.12 billion (including $158.90 million in mandatory retirement funds). SFOPS funding typically represents about 1% of the annual federal budget and supports a wide range of U.S. activities around the world, including the operations of U.S. embassies, diplomatic activities, educational and cultural exchanges, development, security, and humanitarian assistance, and U.S. participation in multilateral organizations. Figure 1 shows funding for different SFOPS components based on FY2020 budget authority estimates, relative to each other and to the broader federal budget. The Administration's request is about 3% higher than the FY2020 request for SFOPS accounts but nearly 23% below the FY2020 SFOPS funding level enacted by Congress, including supplemental funds to help combat the COVID-19 epidemic globally. The Trump Administration has consistently requested far less SFOPS funding than Congress has appropriated. This is a reversal from the Obama Administration, when Congress typically provided less total SFOPS funding than was requested, though the gap narrowed over time during Obama's terms ( Table 1 ). If enacted, the requested SFOPS funding level would be the lowest in over a decade ( Figure 2 ). Since FY2012, the appropriations process has been shaped by the discretionary spending caps put in place by the Budget Control Act of 2011 (BCA; P.L. 112-25 ). Congress has since sought ways to manage the constraints imposed by the BCA and has repeatedly amended the BCA to raise the caps, most recently by the Bipartisan Budget Act of 2019 (BBA 2019; P.L. 116-37 ). The BBA 2019 raised discretionary spending limits set by the BCA for FY2020 and FY2021, the final two years the BCA caps are in effect. In addition to raising the caps, Congress has worked around the BCA limits by using Overseas Contingency Operations (OCO) funding, which is excluded from BCA discretionary budget limits. Congress began appropriating OCO in the SFOPS budget in FY2012, having previously provided OCO funds for the Department of Defense (DOD). Originally used to support shorter-term, contingency-related programming in Afghanistan, Iraq, and Pakistan that was not considered part of the \"base\" or \"core\" budget, OCO's use expanded considerably in level and scope between FY2012 and FY2017. Global SFOPS OCO funding peaked at $20.80 billion in FY2017 (nearly 35% of SFOPS funds that year), at which point it was used to support 18 different SFOPS accounts, ranging from USAID operating expenses and the Office of Inspector General to International Disaster Assistance and Foreign Military Financing. This broad use has led many observers to question whether the OCO designation makes a meaningful distinction between core and contingency activities, with some describing OCO (in both SFOPS and Defense appropriations) as a slush fund. The Administration has not requested OCO funds for SFOPS since FY2018, though it has continued to request OCO funds in the DOD budget. Nevertheless, Congress designated $8.00 billion of enacted SFOPS funding in both FY2019 and FY2020 as OCO, continuing a downward trend in the use of OCO since the FY2017 peak. FY2020 SFOPS funding also included $2.37 billion in supplemental emergency funding to help combat the COVID-19 pandemic abroad. Like OCO-designated funding, emergency-designated funding does not count toward the BCA discretionary spending caps and may therefore be used as an alternative to the OCO designation. Before the use of OCO in SFOPS, funding for contingency activities was often provided through supplemental emergency appropriations. Congressional action on SFOPS and other FY2021 appropriations has been delayed to an uncertain degree by disruption of congressional activity related to the Coronavirus Disease 2019 (COVID-19) pandemic. Congress held some hearings on the FY2021 budget request before all hearings were postponed in March 2020. Subcommittee allocations have not been formally established, nor has SFOPS legislation been introduced for FY2021. The FY2021 request would cut funding for the Department of State and Related Agency appropriations accounts to $14.03 billion, down 18.9% from an enacted FY2020 level of $17.31 billion (including $588 million in COVID-19 supplemental funds). The Administration's request does not include funds to support the State Department's response to the COVID-19 pandemic. To date, Congress has provided all State Department operations funding for COVID-19-related matters through two FY2020 supplemental appropriations acts ( P.L. 116-123 and P.L. 116-136 ). The Administration's stated priorities for funding provided via Department of State and Related Agency accounts in FY2021 include supporting the Indo-Pacific Strategy; countering Chinese, Russian, and Iranian malign influence; protecting U.S. government personnel, facilities, and data assets; and maintaining American leadership in international organizations while asking other nations to increase their support. Table 2 provides a comparative breakout of the Administration's State Department and Related Agency request, by account. Consistent with its previous requests, the majority (87.1%) of the funding the Administration is requesting for the Department of State and Related Agency appropriations accounts is for diplomatic programs, diplomatic security and embassy construction, and contributions to international organizations and international peacekeeping activities. For FY2020, such programs composed approximately 88.1% of the Administration's request and 84.8% of the enacted appropriations Congress provided for these accounts. Some of the Administration's priorities within these areas, as identified by the Department of State in its Congressional Budget Justification, are detailed below. The Diplomatic Programs account is the State Department's principal operating appropriation and serves as the source of funding for several key functions. These include most domestic and overseas State Department personnel salaries; foreign policy programs administered by State Department regional bureaus, the Bureau of Conflict and Stabilization Operations, and others; public diplomacy programs; and the operations of the department's strategic and managerial units, including the Bureaus of Administration, Budget and Planning, and Legislative Affairs as well as the Office of the Chief of Protocol. The Administration's FY2021 request for Diplomatic Programs totals $8.49 billion, around 12.6% less than the $9.71 billion Congress provided for this account in FY2020 (this amount includes $588 million Congress provided for Diplomatic Programs in FY2020 supplemental COVID-19 funds; see text box for more detail). The Administration's request seeks $138 million for the Global Engagement Center (GEC), which is responsible for leading interagency efforts to recognize, understand, expose, and counter foreign state and non-state propaganda and disinformation efforts aimed at undermining U.S. interests, including those carried out from Russia, China, and Iran. The Administration maintains that this request, which would constitute a $76 million increase in annual funding for the GEC provided through SFOPS, would alleviate the need for DOD to transfer funds for GEC operations. Some Members of Congress and other observers have expressed concern regarding past DOD transfers, arguing that DOD has not transferred funding to the State Department in an expeditious manner or at funding levels that reflect congressional intent. The Administration's request also includes a realignment of personnel and funding from the Bureau of Global Talent Management (formerly the Bureau of Human Resources); the Bureau of Arms Control, Verification, and Compliance; and the Office of the Coordinator for Cyber Issues to establish a new Bureau for Cyber Security and Emerging Technologies (CSET). The State Department first notified Congress of its intent to create this new bureau in June 2019. It will be responsible for supporting \"foreign policies and initiatives to promote U.S. cyber and emerging technology policies and deter adversaries from malicious and destabilizing behavior in their use and application of such technologies.\" Some observers have expressed criticism over elements of the State Department's plan for CSET, arguing that additional cyber-related matters such as global internet governance should be included in the bureau's remit. However, it appears that this issue and related matters will instead remain under the purview of the Bureau of Economic and Business Affairs. For FY2021, the Administration requests around $5.38 billion for the State Department's key diplomatic security accounts: $3.70 billion for the Worldwide Security Protection (WSP) allocation within the Diplomatic Programs account and $1.68 billion for the Embassy Security, Construction, and Maintenance (ESCM) account. The Administration's request represents a decrease of 11.4% from the FY2020 enacted funding level (see Table 3 ). The Administration is proposing that Congress decouple WSP from Diplomatic Programs and establish a standalone WSP account (see text box). WSP funds the Bureau of Diplomatic Security (DS), which is responsible for implementing the department's security programs to protect U.S. embassies and other overseas posts, diplomatic residences, and domestic State Department offices. In addition, WSP supports many of the State Department's security and emergency response programs, including those pertaining to operational medicine and security and crisis management training. The ESCM account funds the Bureau of Overseas Building Operations (OBO), which is responsible for providing U.S. diplomatic and consular missions overseas with secure, functional, and resilient facilities and managing nonmilitary U.S. government property abroad. The Administration's WSP-funded priorities for FY2021 include the hiring of an additional 110 special agents at DS, which the Administration maintains is necessary to address critical overseas vacancies. In addition, the Administration intends to deploy High Definition Secure Video Systems (HDSVS) at overseas posts worldwide. The Administration has stated these systems will provide enhanced monitoring capabilities at overseas posts, including greater video resolution and enhanced nighttime visibility. At the same time, the Administration has proposed a cut of $109 million for DS operations in Afghanistan, which it says is consistent with the consolidation of DS-managed locations in the country and a corresponding reduction in costs for guard services and logistical support. The Administration's ESCM request includes $866.67 million for the State Department's share of the Capital Security Cost Sharing and Maintenance Cost Sharing Programs, which are the sources of funding for the planning, design, construction, and maintenance of the United States' overseas diplomatic posts. The Administration maintains that this request, when combined with funds contributed by other agencies with personnel at overseas posts and visa fee revenues, will fund these programs at the $2.20 billion level recommended by the Benghazi Accountability Review Board. Construction projects the Administration is seeking to fund through this request include a new embassy compound in Riyadh, Saudi Arabia, and new consulate compounds in Adana, Turkey, and Rio de Janeiro, Brazil. The Contributions to International Organizations (CIO) account is the funding vehicle for the United States' payments of its assessed contributions (membership dues) to over 40 organizations. These include the United Nations (U.N.) and its specialized agencies (among them, the World Health Organization, or WHO), inter-American organizations such as the Organization of American States, and the North Atlantic Treaty Organization (NATO), among others. U.S. funding to international organizations is also provided through the various SFOPS multilateral assistance accounts, as described in the \" Foreign Operations Highlights \" section of this report. Separately, the United States pays its assessed contributions to most U.N. peacekeeping missions through the Contributions for International Peacekeeping Operations (CIPA) account. For FY2021, the Administration is requesting a combined $2.05 billion for these accounts. If enacted, this funding level would mark a 31.8% cut from that provided by Congress for FY2020. Table 4 shows recent funding levels for each account. Similar to previous budget requests, the Administration's CIO request prioritizes paying assessments to international organizations \"whose missions substantially advance U.S. foreign policy interests\" while proposing funding cuts to those organizations whose work it says either does not directly affect U.S. national security interests or renders unclear results. With these intentions in mind, the Administration proposed to eliminate funding to the Organization of Economic Cooperation and Development (OECD), while decreasing U.N. regular budget and specialized agency funding by more than one-third. The request intends to maintain near-recent-year levels of U.S. funding for other organizations, including the International Atomic Energy Agency (IAEA). For CIPA, the Administration's FY2021 request reflects its ongoing commitment to reduce costs for U.N. peacekeeping missions by reevaluating their respective mandates, design, and implementation. The Administration has stated that its request, when combined with the application of U.N. peacekeeping credits (excess funds from previous U.N. peacekeeping missions), would allow the United States to provide 25% of all assessed global funding for U.N. peacekeeping missions, which is equal to the statutory cap established by Congress. However, the current U.S. assessment for U.N. peacekeeping (last negotiated in 2018) is 27.9%, meaning that around $345 million of anticipated U.S. assessed funding would be carried over into arrears. This practice has resulted in the accumulation of over $900 million in U.S. peacekeeping arrearages since FY2017. The foreign operations accounts in the SFOPS appropriation compose the majority of U.S. foreign assistance included in the international affairs budget; the remainder is enacted in the agriculture appropriation, which provides funding for the Food for Peace Act, Title II and McGovern-Dole International Food for Education and Child Nutrition programs. The Administration's FY2021 foreign operations request totals $30.09 billion, representing a 3.7% increase from the Administration's FY2020 request and a 25.7% decrease from FY2020-enacted levels. Total foreign assistance requested for FY2021, including the food assistance funds provided in the agriculture appropriation, would represent a 29.1% reduction from FY2020-enacted levels. The Administration's budget request articulates five primary goals for U.S. foreign assistance that are meant to align with both the National Security Strategy and the State-USAID Joint Strategic Plan: prioritize global strategic challenges, including countering Chinese, Russian, and Iranian influence; support strategic partners and allies, including Israel, Egypt, Jordan, Colombia, and Venezuela; enhance commitment to long-term development; strengthen key areas of U.S. leadership, to include global health and humanitarian assistance; and advance U.S. national security and economic interests. These goals are also meant to guide the Administration's regional thematic priorities (see \" Country and Regional Assistance \"), as well as how funds are allocated across assistance types. The Administration's FY2021 budget request proposes cuts in nearly all assistance types ( Table 5 ). The only exception is export promotion assistance, which would see a significant increase. This increase is largely due to proposed funding for the new U.S. Development Finance Corporation (DFC), which the Administration states represents an \"expansion of the role of development finance in advancing U.S. interests around the world,\" and an estimated increase in offsetting collections from the Export-Import Bank. Consistent with prior year funding and the FY2020 enacted levels, proposed funding for global health programs, humanitarian assistance, and security assistance comprises approximately two-thirds of the $30.09 billion FY2021 foreign operations budget request ( Figure 3 ). The total FY2021 request for the Global Health Programs (GHP) account is nearly $6.00 billion, representing a 5.4% reduction from the FY2020 budget request and a 37.5% reduction from the FY2020-enacted level, including supplemental appropriations. When compared with FY2020-enacted levels before enactment of supplemental funding for COVID-19, all but one GHP subaccount would be reduced under the budget proposal ( Table 6 ). Budget documents indicate that the increase to pandemic influenza funding (when compared with FY2020-enacted appropriations prior to the COVID-19 supplemental funding) would include a $25.00 million deposit of nonexpiring funds to replenish the Emergency Reserve Fund for rapid response to infectious disease outbreaks. Observers have expressed concern about the potential cessation of USAID's PREDICT-II pandemic preparedness program in March 2020. The Administration does not indicate in the budget request, nor has it specified in any public fora, whether PREDICT-II will be continued. However, the University of California, Davisâone of PREDICT-II's implementing organizationsâhas reportedly received additional funding from USAID to extend PREDICT-II and continue related work through the \"One Health WorkforceâNext Generation\" project. Requested cuts to GHP subaccounts range from 8.0% for malaria programs to 100% for USAID's HIV/AIDS and vulnerable children subaccounts. The Administration asserts that despite its proposed reduction to HIV/AIDS funding, the requested level would be sufficient to maintain treatment for all current recipients. The proposal also reflects the Administration's effort to limit U.S. contributions to the Global Fundâan international financing mechanism for efforts to combat AIDS, tuberculosis, and malariaâto 25% of all donations, rather than the 33% limit that the United States has provided since the George W. Bush Administration. As noted above, the Administration's FY2021 request does not include funds for COVID-19, because the request was prepared prior to the outbreak. Congress enacted, and the President signed into law, three supplemental appropriations acts for COVID-19 preparedness and response in March ( P.L. 116-123 , P.L. 116-127 , and P.L. 116-136 ). As of this report's publishing, the Administration has not submitted a request for additional FY2021 funds to combat the virus. The FY2021 budget request for humanitarian assistance is nearly $6.27 billion, roughly equivalent to the FY2020 request but down 40.1% from the FY2020-enacted level of $10.46 billion. In successive years, the Administration has requested levels of humanitarian assistance far lower than those enacted the prior year, at times reflecting the fact that humanitarian assistance funds may be carried over from year to year and unobligated balances from prior years may still be available. On a bipartisan basis, for many years, Congress has consistently supported global humanitarian efforts through appropriation levels well above the budget request ( Figure 4 ). In addition to the proposed $6.27 billion in new funding for humanitarian assistance, the Administration's request assumes $2.80 billion in carryover funding from past-year humanitarian assistance. The Administration asserts that the FY2021 request, combined with the estimated carryover, totals close to $9.00 billion, which would allow the United States \"to program well above the second highest level ever, and is sufficient to address the needs for Syria, Yemen, and other crisis areas.\" For FY2021, as in FY2020, the Trump Administration proposes to fund all humanitarian assistance through a single International Humanitarian Assistance (IHA) account managed through USAID's new Bureau for Humanitarian Assistance (BHA). The Administration has justified the restructuring as necessary \"to optimize humanitarian assistance, prioritize funding, and use funding as effectively and efficiently as possible.\" The proposal would effectively move the administration of overseas refugee and migration assistance fundingâcurrently funded through the Migration and Refugee Assistance (MRA) and Emergency Refugee and Migration Assistance (ERMA) accountsâfrom the State Department to USAID. In FY2020, enacted funding for these accounts totaled $3.78 billion. The budget request would eliminate the ERMA account and significantly reduce funding to MRA, with none for overseas needs. Within USAID, the BHA is in the process of combining the functions of the Offices of U.S. Foreign Disaster Assistance and Food for Peace. The budget request would eliminate the International Disaster Assistance (IDA) account (FY2020-enacted funding totaled $4.95 billion), as well as Food for Peace Act, Title II emergency food assistance funding, the latter of which is currently appropriated through the agriculture appropriation but administered by USAID (FY2020-enacted funding totaled $1.73 billion). Funds previously requested in these accounts would be consolidated into the IHA account. The Administration is requesting $7.73 billion in international security assistance for FY2021, an increase of 4.3% from the FY2020 request and 14.3% below the FY2020-enacted level. The greatest cuts to security assistance accounts would be to Peacekeeping Operations (PKO, -36.6%) and International Military Education and Training (IMET, -27.4%) ( Figure 5 ). Consistent with prior year requests and appropriations, the majority of security assistance ($5.19 billion) would be for Foreign Military Financing (FMF) to the Middle East, including $3.30 billion in grants to Israel. As in the Trump Administration's past three budget proposals, the FY2021 request seeks flexibility to provide FMF assistance through a combination of grants and loans, including loan guarantees, rather than the current use of FMF on an almost exclusive grant basis. The Administration asserts that this authority would both \"expand the tools available to the United States to help NATO and Major-Non NATO allies purchase more American-made defense equipment and related services\" and \"increase burden sharing by asking these partners to contribute more national funds to foreign military sales cases.\" The remaining third of the FY2021 foreign operations request proposes to allocate funds to development sectors other than those related to global health, independent agencies, multilateral assistance, and export promotion agencies. The FY2021 budget request would reduce funding from FY2020-enacted levels in a number of development sectors ( Table 7 ). Environment-focused aid, for example, would be cut by 86.3%, while funding for education and water and sanitation would fall by 61.2%. As with the FY2020 request, the FY2021 request includes a significant increase from prior year-enacted levels to programming that seeks to promote women in developing economies, largely due to a proposed $200.00 million for the Women's Global Development and Prosperity Initiative (W-GDP). Under the FY2021 request, most development accountsâDevelopment Assistance (DA); Economic Support Fund (ESF); Assistance to Europe, Eurasia and Central Asia (AEECA); and the Democracy Fund (DF)âwould be combined into a single new Economic Support and Development Fund (ESDF). The Administration asserts that this consolidated account would streamline the deployment of resources, increasing efficiency in foreign assistance. Because the consolidated account would incorporate what are now both core and shared USAID accounts, it remains unclear what portion of the new account USAID would manage or implement. The Administration made a similar request in the FY2018, FY2019, and FY2020 budget requests, but Congress did not enact the proposals. The FY2021 budget request nestles the Relief and Recovery Fund (RRF) and a proposed new Diplomatic Progress Fund (DPF)âboth previously requested as separate budget itemsâunder the proposed ESDF account. According to the justification, the DPF would \"allow the State Department and USAID to respond to new opportunities arising from progress in diplomatic and peace efforts around the world.\" While Congress provided funds for the RRF in previous fiscal years, Congress has not accepted the Administration's proposal for the DPF. The Administration's FY2021 request would reduce funding to the Peace Corps (-19.5%) and the Millennium Challenge Corporation (-11.6%). The request also proposes eliminating the Inter-American Foundation (IAF) and the U.S African Development Foundation (USADF), and incorporating staff and small grant activities of the two foundations into USAID's new Bureau for Development, Democracy, and Innovation. The Administration maintains that this consolidation would allow USAID to \"capitalize on the existing expertise, capacity, relationships, and tools that USADF and IAF provide, including their regional and market segment emphases, in order to reinforce U.S. government bilateral development efforts.\" To implement the shuttering of the IAF and USADF, the Administration requests $3.85 million and $4.66 million, respectively. SFOPS multilateral assistance accounts provide for U.S. payments to multilateral development banks and international organizations that pool funding from multiple donors to finance development activities. The Administration's FY2021 request would reduce these accounts by 28.9% from FY2020-enacted levels. As in the Trump Administration's three previous requests, the proposal would eliminate funding for the International Organizations and Programs (IO&P) account, which funds U.S. voluntary contributions to international organizations, primarily United Nations entities such as UNICEF. Congress appropriated $390.50 million for IO&P in FY2020. The Administration also proposes eliminating funds for the Global Environment Facility (GEF) and the International Fund for Agricultural Development (IFAD). For the GEF, the Administration asserts that carryover funds from FY2019 and FY2020 appropriations are sufficient to meet the U.S. pledge to the GEF's seventh replenishment. The FY2021 request includes an increased investment in the U.S. Development Finance Corporation (DFC), established in 2019 to implement the BUILD Act. However, the Administration would eliminate funding for the U.S. Trade and Development Agencyâthe request includes $12.11 million for the agency's \"orderly closeout\"âand an 8.3% reduction from FY2020-enacted levels for the Export-Import Bank of the United States' Operations account. As in previous years, the Administration assumes that all export promotion expenditures would be offset by collections. In the FY2021 request, the Administration assumes $711.20 million and $496.00 million in offsetting collections from the Export-Import Bank and the DFC, respectively. The Administration organizes much of its country and regional assistance into six thematic priorities ( Figure 6 ). These priorities are also meant to reflect the broader foreign operations goals outlined in \" Foreign Operations Highlights .\" Top country recipients under the FY2021 request remain consistent with prior year funding allocations. Israel, Egypt, and Jordan would remain the top three recipients of foreign assistanceâthough Egypt would move ahead of Jordan when compared with FY2019 actual fundingâlargely due to the proposed levels of military aid for those three countries. Other countries that the Administration maintains are strategically significant, including Afghanistan and Ukraine, also remain top country recipients in the FY2021 request, as do several African countries that would receive high levels of global health and development aid ( Table 8 ). Regionally, the Middle East and Africa would receive the largest shares of aid in the FY2021 requestâtogether comprising about 71.5% of total aid allocated by country or regionâconsistent with FY2019 year actuals ( Figure 7 ). Proposed funding for Europe and Eurasia and, separately, the Indo-Pacific, come to 3.9% and 9.2%, respectively. Notably, the distribution of assistance within regions vary significantly. For example, Africa receives a majority of GHP funding (58.1% in FY2019 and a proposed 66.7% for FY2021), but accounts for a small proportion of INCLE funding (5.2% in FY2019 and a proposed 4.1% for FY2021). In comparison, the Western Hemisphere region accounts for a small percentage of GHP (2.5% in FY2019 and a proposed 2.2% for FY2021) and a large proportion of INCLE funds (37.7% in FY2019 and a proposed 44.8% for FY2021). Appendix A. SFOPS Funding, by Account Appendix B. International Affairs Budget The International Affairs budget, or Function 150, includes funding that is not in the Department of State, Foreign Operations, and Related Programs (SFOPS) appropriation; in particular, international food assistance programs (Food for Peace Act (FFPA), Title II and McGovern-Dole International Food for Education and Child Nutrition programs) are in the Agriculture Appropriations, and the Foreign Claim Settlement Commission and the International Trade Commission are in the Commerce, Justice, Science appropriations. In addition, the Department of State, Foreign Operations, and Related Programs appropriation measure includes funding for certain international commissions that are not part of the International Affairs Function 150 account. Appendix C. SFOPS Organization Chart", "summary": "Each year, Congress considers 12 distinct appropriations measures to fund federal programs and activities. One of these is the Department of State, Foreign Operations, and Related Programs (SFOPS) bill, which includes funding for U.S. diplomatic activities, cultural exchanges, development and security assistance, and participation in multilateral organizations, among other international activities. On February 10, 2020, the Trump Administration submitted to Congress its SFOPS budget proposal for FY2021, totaling $44.12 billion (including $158.90 million in mandatory State Department retirement funds). Consistent with Administration requests since FY2018, none of the requested SFOPS funds were designated as Overseas Contingency Operations (OCO) funds; nevertheless, Congress has enacted OCO funds for SFOPS each year during this period. The Administration's FY2021 request is about 3% higher than its FY2020 request for SFOPS accounts but nearly 24% below the FY2020 SFOPS funding level enacted by Congress (including COVID-19 supplemental funds). Within these totals, funding is divided among two main components: Department of State and Related Agency accounts. These funds, provided in Title I of the SFOPS appropriation, primarily support Department of State diplomatic and security activities and would be reduced by 18.9% from FY2020-enacted levels. Noteworthy cuts are proposed for the Educational and Cultural Exchange Programs (-57.6%), International Organizations (-31.8%) accounts, and the Diplomatic Programs account (-12.6%), which funds many of the State Department's day-to-day operations. The Foreign Ope rations accounts, funded in Title II-VI of the SFOPS bill, fund most foreign assistance activities. These accounts would see a total reduction of 25.7%, with particularly steep cuts proposed for global health programs (-37.5%), peacekeeping operations (PKO, -36.6%), multilateral aid (-28.9%), and humanitarian assistance (-28.3%, not including food aid programs funded through the agriculture appropriation). This report provides an overview of the FY2021 SFOPS budget request, discusses trends in SFOPS funding, and highlights key policy issues. An account-by-account comparison of the FY2021 SFOPS request and enacted FY2020 SFOPS appropriations is presented in Appendix A . Appendix B provides a similar comparison, focused specifically on the International Affairs budget. Appendix C depicts the organization of the SFOPS appropriation. The report will be updated to reflect congressional action. This report is designed to track SFOPS appropriations, with a focus on comparing funding levels for accounts and purposes across enacted FY2020 SFOPS appropriations, FY2021 Administration requests, and FY2021 SFOPS legislation as it moves through the legislative process. It does not provide significant analysis of international affairs policy issues. For in-depth analysis and contextual information on international affairs issues, please consult the wide range of CRS reports on specific subjects, such as global health, diplomatic security, and U.S. participation in the United Nations.", "document_type": "crs"}
{"report": "Fully autonomous vehicles, which would carry out many or all of their functions without the intervention of a driver, may someday bring sweeping social and economic changes and \"lead to breakthrough gains in transportation safety.\" Motor vehicle crashes caused an estimated 36,560 fatalities in 2018; a study by the National Highway Traffic Safety Administration (NHTSA) has shown that 94% of crashes are due to human errors. Legislation that would encourage development and testing of autonomous vehicles has faced controversy in Congress. In the 115 th Congress, the House of Representatives passed an autonomous vehicle bill, H.R. 3388 , by voice vote in September 2017. The Senate Committee on Commerce, Science, and Transportation reported a different bill, S. 1885 , in November 2017, but after some Senators raised concerns about the preemption of state laws and the possibility of large numbers of vehicles being exempted from some Federal Motor Vehicle Safety Standards, the Senate bill did not reach the floor. No further action was taken on either bill before the 115 th Congress adjourned. Although some Members of Congress remain interested in autonomous vehicles, no legislative proposals have become law. Several fatal accidents involving autonomous vehicles raised new questions about how federal and state governments should regulate vehicle testing and the introduction of new technologies into vehicles offered for sale. A pedestrian was killed in Arizona by an autonomous vehicle operated by Uber on March 18, 2018, and three Tesla drivers died when they failed to respond to hazards not recognized by the vehicles. These accidents suggest that the challenge of producing fully autonomous vehicles that can operate safely on public roads may be greater than developers had envisioned, a new outlook voiced by several executives, including the Ford Motor Co. CEO. However, with the authorization of federal highway and public transportation programs set to expire at the end of FY2020, a surface transportation reauthorization bill could become a focus of efforts to also enact autonomous vehicle legislation. While fully autonomous vehicles may lie well in the future, a range of new technologies is already improving vehicle performance and safety while bringing automation to vehicular functions once performed only by the driver. The technologies involved are very different from the predominantly mechanical, driver-controlled technology of the 1960s, when the first federal vehicle safety laws were enacted. These new features automate lighting and braking, connect the car and driver to the Global Positioning System (GPS) and smartphones, and keep the vehicle in the correct lane. Three forces are driving these innovations: technological advances enabled by new materials and more powerful, compact electronics; consumer demand for telecommunications connectivity and new types of vehicle ownership and ridesharing; and regulatory mandates pertaining to emissions, fuel efficiency, and safety. Manufacturers are combining these innovations to produce vehicles with higher levels of automation. Vehicles do not fall neatly into the categories of \"automated\" or \"nonautomated,\" because all new motor vehicles have some element of automation. The Society of Automotive Engineers International (SAE), an international standards-setting organization, has developed six categories of vehicle automationâranging from a human driver doing everything to fully autonomous systems performing all the tasks once performed by a driver. This classification system ( Table 1 ) has been adopted by the U.S. Department of Transportation (DOT) to foster standardized nomenclature to aid clarity and consistency in discussions about vehicle automation and safety. Vehicles sold today are in levels 1 and 2 of SAE's automation rating system. Although some experts forecast market-ready autonomous vehicles at level 3 will be available in a few years, deployment of fully autonomous vehicles in all parts of the country at level 5 appears to be more distant, except perhaps within closed systems that allow fully autonomous vehicles to operate without encountering other types of vehicles. Testing and development of autonomous vehicles continue in many states and cities. Technologies that could guide an autonomous vehicle ( Figure 1 ) include a wide variety of electronic sensors that would determine the distance between the vehicle and obstacles; park the vehicle; use GPS, inertial navigation, and a system of built-in maps to guide the vehicle's direction and location; and employ cameras that provide 360-degree views around the vehicle. To successfully navigate roadways, an autonomous vehicle's computers, sensors and cameras will need to accomplish four tasks that a human driver undertakes automatically: detect objects in the vehicle's path; classify those objects as to their likely makeup (e.g., plastic bag in the wind, a pedestrian or a moving bicycle); predict the likely path of the object; and plan an appropriate response. Most autonomous vehicles use dedicated short-range communication (DSRC) to monitor road conditions, congestion, crashes, and possible rerouting. As 5G wireless communications infrastructure is installed more widely, DSRC may evolve and become integrated with it, enabling vehicles to offer greater interoperability, bandwidth, and cybersecurity. Some versions of these autonomous vehicle technologies, such as GPS and rear-facing cameras, are being offered on vehicles currently on the market, while manufacturers are studying how to add others to safely transport passengers without drivers. Manufacturers of conventional vehicles, such as General Motors and Honda, are competing in this space with autonomous vehicle \"developers\" such as Alphabet's Waymo. In addition, automakers are aligning themselves with new partners that have experience with ride-sharing and artificial intelligence: Ford and Volkswagen have announced that they expect to use autonomous vehicle technology in a new ride-sharing service in Pittsburgh, PA, as early as 2021; GM acquired Cruise Automation, a company that is developing self-driving technology for Level 4 and 5 vehicles. GM has also invested $500 million in the Lyft ride-sharing service; Honda, after breaking off talks about partnering with Waymo, purchased a stake in GM's Cruise Automation; Volvo and Daimler have announced partnerships with ride-sharing service Uber; and BMW partnered with the Mobileye division of Intel, a semiconductor manufacturer, to design autonomous vehicle software. As vehicle technologies advance, the security of data collected by vehicle computers and the protection of on-board systems against intrusion are becoming more prominent concerns. Many of the sensors and automated components providing functions now handled by the driver will generate large amounts of data about the vehicle, its location at precise moments in time, driver behavior, and vehicle performance. The systems that allow vehicles to communicate with each other, with roadside infrastructure, and with manufacturers seeking to update software will also offer portals for possible unauthorized access to vehicle systems and the data generated by them. Protecting autonomous vehicles from hackers is of paramount concern to federal and state governments, manufacturers, and service providers. A well-publicized hacking of a conventional vehicle by professionals demonstrated to the public that such disruptions can occur. Hackers could use more than a dozen portals to enter even a conventional vehicle's electronic systems ( Figure 2 ), including seemingly innocuous entry points such as the airbag, the lighting system, and the tire pressure monitoring system (TPMS). Requirements that increasingly automated vehicles accept remote software updates, so that owners do not need to take action each time software is revised, are in part a response to concerns that security weaknesses be rectified as quickly as possible. To address these concerns, motor vehicle manufacturers established the Automotive Information Sharing and Analysis Center (Auto-ISAC), which released a set of cybersecurity principles in 2016. DOT's autonomous vehicle policies designate Auto-ISAC as a central clearinghouse for manufacturers to share reports of cybersecurity incidents, threats, and violations with others in the vehicle industry. Aside from hackers, many legitimate entities would like to access vehicle data, including vehicle and component manufacturers, the suppliers providing the technology and sensors, the vehicle owner and occupants, urban planners, insurance companies, law enforcement, and first responders (in case of an accident). Issues pertaining to vehicle data collection include vehicle testing crash data (how is it stored and who gets to access it); data ownership (who owns most of the data collected by vehicle software and computers); and consumer privacy (transparency for consumers and owner access to data). At present, no laws preclude manufacturers and software providers from reselling data about individual vehicles and drivers to third parties. Autonomous vehicles are being developed and tested in many countries, including those that produce most of the world's motor vehicles. Several analyses have evaluated the factors that are contributing to the advancement of autonomous vehicles in various countries: Innovation . Benchmarks in this area include the number and engagement of domestic automakers and technology developers working on automation, the partnerships they forge with academic and related businesses, the prevalence of ride-sharing services, and autonomous vehicle patents issued. V ehicle infrastructure . Autonomous vehicles will need new types of infrastructure support and maintenance, including advanced telecommunications links and near-perfect pavement and signage markings. Planning and implementing these highway improvements may enable autonomous vehicles to be fully functional sooner. In addition, many test vehicles are currently powered by electricity, so the availability of refueling stations could be a factor in their acceptance. Wo rkforce training. The increased reliance on autonomous vehicle technologies may require different workforce skills. Many traditional mechanical parts may disappear, especially if autonomous vehicles operate entirely on battery power, while the arrangement and function of dashboards and seating may be reinvented. Components suppliers that are already addressing this new product demand and reorienting their workforces will assist in the transition to autonomous vehicles. G overnment laws and regulations that encourage development and testing . Fully autonomous vehicles may not have standard features of today's cars, such as steering wheels and brake pedals, as there will not be a driver. By law or regulation, motor vehicles built today are required to have many of these features. Some governments are taking a lead by modifying vehicle requirements for purposes of pilot programs and tests. Permanent changes in standards will most likely be necessary if autonomous vehicle technologies are to be commercialized. L evel of consumer acceptance . Markets are more likely to embrace autonomous vehicles if many residents in cities see autonomous vehicles on the road, a high level of technology is in use (including internet access and mobile broadband), and ride-hailing services are more widely used. Several surveys have been conducted analyzing many of these factors. For example, a 2018 Harvard University report highlights plans in China, South Korea, Japan, and the United States to \"seize the benefits\" of autonomous vehicles. In a report on innovation policies in four Asian countries (China, Japan, South Korea, and Singapore), the United Nations Economic and Social Commission for Asia and the Pacific ranked Singapore first in autonomous vehicle readiness because of its policies and new laws governing their deployment and its high consumer acceptance. The report also notes that South Korea's K-City facility is \"intended to be the world's largest testbed for self-driving cars.\" A more detailed comparison of factors affecting autonomous vehicle development and deployment has been conducted by KPMG International, which has developed an index to measure how 25 countries are guiding autonomous vehicles ( Table 2 ). The Netherlands ranked first overall in the KPMG report, where it was cited as \"an example of how to ready a country for AVs by performing strongly in many areas , \" as well as first in infrastructure. Singapore came in first on policy and legislation because it has a single government entity overseeing autonomous vehicle regulations, it is funding autonomous vehicle pilots, and it has enacted a national standard to promote safe deployment. Contributing to its rank was a World Economic Forum (WEF) report that ranked it first among 139 countries in having an effective national legislature and efficient resolution of legal disputes. Singapore also scored first place on the consumer acceptance metric, primarily because its extensive autonomous testing is being conducted throughout the island nation, thereby familiarizing residents with autonomous passenger vehicles and buses. Two other major auto-producing countriesâGermany and Japanâfall just below the United States on technology and innovation, according to KPMG, while Japan ranks higher on autonomous vehicle infrastructure ( Table 3 ). Vehicles operating on public roads are subject to dual regulation by the federal government and the states in which they are registered and driven. Traditionally, NHTSA, within DOT, has regulated auto safety, while states have licensed automobile drivers, established traffic regulations, and regulated automobile insurance. Proponents of autonomous vehicles note that lengthy revisions to current vehicle safety regulations could impede innovation, as the rules could be obsolete by the time they take effect. In 2016, the Obama Administration issued the first report on federal regulations affecting autonomous vehicles. Since then, DOT has issued two follow-up reports and has said it anticipates issuing annual updates to its regulatory guidance. In addition, the Federal Communications Commission (FCC) is reconsidering the allocation of electromagnetic spectrum currently reserved for motor vehicle communications, and its decisions may affect how autonomous vehicles evolve. DOT's 2016 report proposed federal and state regulatory policies in these areas: A set of guidelines outlining best practices for autonomous vehicle design, testing, and deployment. DOT identified 15 practices and procedures that it expected manufacturers, suppliers, and service providers (such as ridesharing companies) to follow in testing autonomous vehicles, including data recording, privacy, crashworthiness, and object and event detection and response. These reports, called Safety Assessment Letters, would be voluntary, but the report noted that \"they may be made mandatory through a future rulemaking.\" A m odel s tate p olicy that identifies where new autonomous vehicle-related issues fit in the current federal and state regulatory structures. The model state policy, developed by NHTSA in concert with the American Association of Motor Vehicle Administrators and private-sector organizations, suggests state roles and procedures, including administrative issues (designating a lead state agency for autonomous vehicle testing), an application process for manufacturers that want to test vehicles on state roads, coordination with local law enforcement agencies, changes to vehicle registration and titling, and regulation of motor vehicle liability and insurance. A streamlined review process to issue DOT regulatory interpretations on autonomous vehicle questions within 60 days and on regulatory exemptions within six months. Identification of new tools and regulatory structures for NHTSA that could build its expertise in new vehicle technologies, expand its ability to regulate autonomous vehicle safety, and increase speed of its rulemakings. Two new tools could be expansion of existing exemption authority and premarket testing to assure that autonomous vehicles will be safe. Some of the new regulatory options cited would require new statutory authority, while others could be instituted administratively. The report noted that \"DOT does not intend to advocate or oppose any of the tools.â¦ [I]t intends â¦ to solicit input and analysis regarding those potential options from interested parties.\" The two follow-up reports issued by the Trump Administration describe a more limited federal regulatory role in overseeing autonomous passenger vehicle deployment, while also broadening the scope of DOT oversight by addressing the impact of autonomous technology on commercial trucks, public transit, rail, and ports and ships. The policies described in these reports replace those recommended by the Obama Administration in several ways, including the following: Encouraging integration of automation across all transportation modes , instead of just passenger vehicles. The October 2018 report Automated Vehicles 3.0 outlines how each of DOT's agencies will address autonomous vehicle safety within its purview. Establishing six automation principles that will be applied to DOT's role in overseeing passenger cars, trucks, commercial buses, and other types of vehicles. These include giving priority to safety; remaining technology-neutral; modernizing regulations; encouraging a consistent federal and state regulatory environment; providing guidance, research, and best practices to government and industry partners; and protecting consumers' ability to choose conventional as well as autonomous vehicles. Reiterating the traditional roles of federal and state governments in regulating motor vehicles and motorists, respectively. The reports cite best practices that states should consider implementing, such as minimum requirements for autonomous vehicle test drivers, and discuss how DOT can provide states with technical assistance. Recommending voluntary action in lieu of regulation. This could include suggesting that manufacturers and developers of autonomous driving systems issue and make public voluntary safety self-assessments to demonstrate transparency and increase understanding of the new technologies and industry development of \"voluntary technical standards\" to \"advance the integration of automation technologies into the transportation system.\" The NHTSA Voluntary Safety Self-Assessment web page lists 17 companies that have filed self-assessment reports, including three major automakers. To provide a perspective, 64 companies have been issued autonomous vehicle testing permits by the State of California alone. Accelerating NHTSA decisions on requests for exemptions from federal safety standards for autonomous vehicle testing. Promoting development of voluntary technical standards by other organizations, such as the Society of Automotive Engineers, the government's National Institute of Standards and Technology, and the International Organization for Standardization. DOT has indicated that it wants to revise regulations pertinent to autonomous vehicles, such as redefining the terms \"driver\" and \"operator\" to indicate that a human being does not always have to be in control of a motor vehicle. It also said it plans to require changes in standards for the inspection, repair, and maintenance of federally regulated commercial trucks and buses. Along these lines, NHTSA issued a Notice of Proposed Rulemaking in May 2019, requesting comments on testing and verifying how autonomous vehicle technologies may comply with existing federal safety standards. On November 19, 2019, the National Transportation Safety Board (NTSB) issued its report on the probable cause of a 2018 fatality involving an autonomous vehicle in Tempe, AZ. In that accident, a pedestrian was fatally injured by a test vehicle operated by Uber Technologies with an operator in the driver's seat. The NTSB investigation determined that the probable cause of the crash \"was the failure of the vehicle operator to monitor the driving environment and the operation of the ADS [automated driving system] because she was visually distracted throughout the trip by her personal cell phone.\" Though the vehicle detected the pedestrian 5.6 seconds before the crash, the NTSB reported that \"it never accurately classified her as a pedestrian or predicted her path.\" Beyond the immediate cause of this accident, NTSB reported that an \"inadequate safety culture\" at Uber and deficiencies in state and federal regulation contributed to the circumstances that led to the fatal crash. Among the findings were the following: Uber's internal safety risk-assessment procedures and oversight of the operator were inadequate, and its disabling of the vehicle's forward collision warning and automatic emergency braking systems increased risks. The Arizona Department of Transportation provided insufficient oversight of autonomous vehicle testing in the state. NHTSA provides insufficient guidance to developers and manufacturers on how they should achieve safety goals, has not established a process for evaluating developers' safety self-assessment reports, and does not require such reports to be submitted, leaving their filing as voluntary. NTSB recommended that Uber, the Arizona Department of Transportation, and NHTSA take specific steps to address the issues it identified. It also recommended that the American Association of Motor Vehicle Administrators inform all states about the circumstances of the Tempe crash, encouraging them to require and evaluate applications by developers before granting testing permits. Federal regulation of the spectrum used in vehicle communications may affect how automation proceeds. Autonomous vehicles, whose artificial intelligence and technology are generally self-contained in each vehicle, are part of a larger category of connected vehicles and infrastructure. Federal, state, and industry research and testing of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications has been under way since the 1990s. Together, these two sets of technologies, known as V2X, are expected to reduce the number of accidents by improving detection of oncoming vehicles, providing warnings to drivers, and establishing communications infrastructure along roadways that would prevent many vehicles from leaving the road and striking pedestrians. These technologies fall within the broad category of intelligent transportation systems, which have received strong support from Congress due to their potential to improve traffic flow and safety. For vehicles to communicate wirelessly, they use radio frequencies, or spectrum, which are regulated by the Federal Communications Commission (FCC). In 1999, the FCC allocated the 5.9 gigahertz (GHz) band solely for motor vehicle safety purposes for vehicles using DSRC. Over the past two decades, industry and government agencies have collaborated to develop, test, and deploy DSRC technologies. States have invested in DSRC-based improvements, and this technology is operating in dozens of states and cities. As industry has continued to explore vehicle automation, an alternative, cellular-based technology has recently emerged, known as C-V2X. In December 2019, the FCC proposed rules that would reallocate the lower 45 MHz of the 5.9 GHz band for unlicensed use (e.g., Wi-Fi), and allocate the remaining 30 MHz for transportation and vehicle-related use. Of the 30 MHz, the FCC proposed to grant C-V2X exclusive use of 20 MHz of the segment. It is seeking comment on whether the remaining 10 MHz should remain dedicated to DSRC or be dedicated to C-V2X. The FCC commissioners noted that DSRC has evolved slowly and has not been widely deployed, and the rules are intended to ensure the spectrum supports its highest and best use. This decision has competitive implications for the automotive, electronics, and telecommunications industries, and may affect the availability of safety technologies and the path toward vehicle automation. DOT has called for retaining the entire 5.9 GHz band for exclusive transportation use. Figure 3 shows that these two technologies facilitate somewhat different types of vehicle and infrastructure communications. In light of their different characteristics, the European Commission has approved DSRC use for direct V2V and V2I communications, while endorsing cellular-based technology for vehicle access to the cloud and remote infrastructure. Industry groups in the United States took varying positions in the FCC proceedings. DSRC advocates argued that this technology has been proven by years of testing and is already deployed in many areas. They generally supported retaining the 5.9 GHz band for exclusive use for DSRC. C-V2X supporters contended that its cellular-based solution is aligned with international telecommunications standards for 5G technologies and should be allowed to use the 5.9 GHz band alongside DSRC. A group of technology companies, including device makers, argued that additional spectrum is needed to accommodate the increasing number of interconnected devices, and that the 5.9GHz band can safely be shared among transportation and non-transportation uses. During the 115 th Congress, committees in the House of Representatives and the Senate held numerous hearings in 2017 on the technology of autonomous vehicles and possible federal issues that could result from their deployment. Initially, bipartisan consensus existed on major issues: H.R. 3388 , the SELF DRIVE Act, was reported unanimously by the House Committee on Energy and Commerce, and on September 6, 2017, the House of Representatives passed it without amendment by voice vote. A similar bipartisan initiative began in the Senate. Prior to markup in the Committee on Commerce, Science, and Transportation, the then-chairman and ranking member issued a set of principles they viewed as central to new legislation: prioritize safety , acknowledging that federal standards will eventually be as important for self-driving vehicles as they are for conventional vehicles; promote innovation and address the incompatibility of old regulations written before the advent of self-driving vehicles; remain technology - neutral , not favoring one business model over another; reinforce separate but complementary federal and state regulatory roles ; strengthen cybersecurity so that manufacturers address potential vulnerabilities before occupant safety is compromised; and educate the public through government and industry efforts so that the differences between conventional and self-driving vehicles are understood. Legislation slightly different from the House-passed bill emerged: S. 1885 , the AV START Act, was reported by the Committee on Commerce, Science, and Transportation on November 28, 2017. It was not scheduled for a floor vote prior to adjournment in December 2018 because of unresolved concerns raised by several Senators. To address some of those concerns, a committee staff draft bill that would have revised S. 1885 was circulated in December 2018 that could form the basis of future legislation. The House and Senate bills addressed concerns about state action replacing some federal regulation, while also empowering NHTSA to take unique regulatory actions to ensure safety and encouraging innovation in autonomous vehicles. The bills retained the current arrangement of states controlling most driver-related functions and the federal government being responsible for vehicle safety. The House and Senate bills included the following major provisions. Where the December 2018 Commerce Committee staff draft proposed significant changes, they are noted in this analysis. P reemption of state laws . H.R. 3388 would have barred states from regulating the design, construction, or performance of highly autonomous vehicles, automated driving systems, or their components unless those laws are identical to federal law. The House-passed bill reiterated that vehicle registration, driver licensing, driving education, insurance, law enforcement, and crash investigations should remain under state jurisdiction as long as state laws and regulations do not restrict autonomous-vehicle development. H.R. 3388 provided that nothing in the preemption section should prohibit states from enforcing their laws and regulations on the sale and repair of motor vehicles. S. 1885 would also have preempted states from adopting laws, regulations, and standards that would regulate many aspects of autonomous vehicles, but would have omitted some of the specific powers reserved to the states under the House-passed bill. States would not have been required to issue drivers licenses for autonomous-vehicle operations, but states that chose to issue such licenses would not have been allowed to discriminate based on a disability. The bill provided that preemption would end when NHTSA establishes standards covering these vehicles. The Senate staff draft sought to clarify that state and local governments would not lose their traditional authority over traffic laws. It also would have added provisions that state common law and statutory liability would be unaffected by preemption, and would have limited use of arbitration in death or bodily injury cases until new federal safety standards are in effect. Exemption authority . Both the House and Senate bills would have expanded DOT's ability to issue exemptions from existing safety standards to encourage autonomous-vehicle testing on public roads. To qualify for an autonomous-vehicle exemption, a manufacturer would have had to show that the safety level of the vehicle equaled or exceeded the safety level of each standard for which an exemption was sought. Current law limits exemptions to 2,500 vehicles per manufacturer per year. The House-passed bill would have phased in increases over four years of up to 100,000 vehicles per manufacturer per year; the Senate bill would have permitted up to 80,000 in a similar phase-in. H.R. 3388 provided constraints on the issuance of exemptions from crashworthiness and occupant protection standards; S. 1885 did not address those two issues. DOT would have been directed to establish a publicly available and searchable database of motor vehicles that have been granted an exemption. Crashes of exempted vehicles would have had to be reported to DOT. The Senate bill would not have required the establishment of a database of exempted vehicles, and reporting of exempt vehicle crashes would not have been required. The Senate staff draft added a provision to ensure that vehicles exempted from federal standards would have been required to nonetheless maintain the same level of overall safety, occupant protection, and crash avoidance as a traditional vehicle. A DOT review of vehicle exemptions would have been required annually. The draft capped exemptions at no more than five years. New NHTSA safety rules. The House bill would have required NHTSA to issue a new regulation requiring developers and manufacturers to submit a \"safety assessment certification\" explaining how safety is being addressed in their autonomous vehicles. The Senate bill included a similar provision requiring a \"safety evaluation report,\" and would have delineated nine areas for inclusion in the reports, including system safety, data recording, cybersecurity risks, and methods of informing the operator about whether the vehicle technology is functioning properly. While manufacturers and developers would be required to submit reports, the legislation did not mandate that NHTSA establish an assessment protocol to ensure that minimum risk conditions are met. The Senate staff draft would have clarified the process by which federal motor vehicle safety standards would be updated to accommodate new vehicle technologies, providing additional time for new rulemaking. Within six months of enactment, DOT would have been required to develop and publicize a plan for its rulemaking priorities for the safe deployment of autonomous vehicles. To address concerns that autonomous vehicles might not recognize certain potential hazardsâincluding the presence of bicyclists, pedestrians, and animalsâand hence possibly introduce new vulnerabilities to motor vehicle travel, the Senate staff draft would have clarified that manufacturers must describe how they are addressing the ability of their autonomous vehicles to detect, classify, and respond to these and other road users. Manufacturers and developers would include this analysis in their safety evaluation reports. Cybersecurity. The House-passed bill provided that no highly autonomous vehicle or vehicle with \"partial driving automation\" could be sold domestically unless a cybersecurity plan had been developed by the automaker. Such plans would have to have been developed within six months of enactment and would include a written policy on mitigation of cyberattacks, unauthorized intrusions, and malicious vehicle control commands; a point of contact at the automaker with cybersecurity responsibilities; a process for limiting access to autonomous driving systems; and the manufacturer's plans for employee training and for maintenance of the policies. The Senate bill would have required written cybersecurity plans to be issued, including a process for identifying and protecting vehicle control systems, detection, and response to cybersecurity incidents, and methods for exchanging cybersecurity information. A cybersecurity point of contact at the manufacturer or vehicle developer would have had to be named. Unlike the House-passed bill, S. 1885 would have directed DOT to create incentives so that vehicle developers would share information about vulnerabilities, and would have specified that all federal research on cybersecurity risks should be coordinated with DOT. In addition, S. 1885 would have established a Highly Automated Vehicle Data Access Advisory Committee to provide Congress with recommendations on cybersecurity issues. Federal agencies would have been prohibited from issuing regulations pertaining to the access or ownership of data stored in autonomous vehicles until the advisory committee's report was submitted. The staff draft would have added several cybersecurity provisions, including an additional study by the National Institute of Standards and Technology that would recommend ways vehicles can be protected from cybersecurity incidents. Privacy. Before selling autonomous vehicles, manufacturers would have been required by the House-passed bill to develop written privacy plans concerning the collection and storage of data generated by the vehicles, as well as a method of conveying that information to vehicle owners and occupants. However, a manufacturer would have been allowed to exclude processes from its privacy policy that encrypt or make anonymous the sources of data. The Federal Trade Commission would have been tasked with developing a report for Congress on a number of vehicle privacy issues. Although S. 1885 would not have explicitly required privacy plans by developers and manufacturers, it would have required NHTSA to establish an online, searchable motor vehicle privacy database that would include a description of the types of information, including personally identifiable information (PII), that are collected about individuals during operation of a motor vehicle. This database would have covered all types of vehiclesânot just autonomous vehiclesâand would have included the privacy policies of manufacturers. The database would also have included an explanation about how PII would be collected, retained, and destroyed when no longer relevant. The Senate staff draft would have added new passenger motor vehicle privacy protections. Research and advisory panels. Both bills would have established several new advisory bodies to conduct further research on autonomous vehicles and advise DOT on possible new vehicle standards. H.R. 3388 would have established a NHTSA advisory group with a broad cross-section of members to advise on mobility access for senior citizens and the disabled; cybersecurity; labor, employment, environmental, and privacy issues; and testing and information sharing among manufacturers. S. 1885 would have established other panels, including a Highly Automated Vehicles Technical Committee to advise DOT on rulemaking policy and vehicle safety; a working group comprising industry and consumer groups to identify marketing strategies and educational outreach to consumers; and a committee of transportation and environmental experts to evaluate the impact of autonomous vehicles on transportation infrastructure, mobility, the environment, and fuel consumption. Separately, DOT would have been required to study ways in which autonomous vehicles and parts could be produced domestically, with recommendations on how to incentivize U.S. manufacturing. The Senate staff draft would have consolidated some of the advisory committees in S. 1885 into a Highly Automated Vehicle Advisory Council with diverse stakeholder representation, and mandated to report on mobility for the disabled, senior citizens and populations underserved by public transportation; cybersecurity; employment and environmental issues; and privacy and data sharing. No similar comprehensive autonomous vehicle legislation has been introduced in the 116 th Congress, although discussions on a bicameral bill have been ongoing. In addition, the Senate Committee on Environment and Public Works has reported America's Transportation Infrastructure Act of 2019, S. 2302 , which includes several provisions in Subtitle D addressing the possible impact of autonomous vehicles on highway infrastructure. It would establish a grant program to modernize the U.S. charging and fueling infrastructure so that it would be responsive to technology advancements, including autonomous vehicles. The legislation would also require research on ways in which roadway infrastructure should be improved for autonomous vehicles. State and local rules and regulations may affect how autonomous vehicles are tested and deployed. The National Governors Association (NGA) has noted that state governments have a role with respect to vehicle and pedestrian safety, privacy, cybersecurity, and linkage with advanced communications networks. While supporting technology innovations in transportation, a recent NGA report notes that \"the existing regulatory structure and related incentives have not kept pace with the new technology\" and that \"recent accidents have raised concerns about the safety of drivers, pedestrians and other road users in the period during which autonomous and non-autonomous vehicles share the road.\" NGA has joined with other state and local government organizations to call for modifications in forthcoming autonomous vehicle legislation, including clarity that states and local governments not only can enforce existing laws governing operation of motor vehicles on public roads, but also originate new statutes and regulations; requiring submission of more detailed automaker and developer reports to DOT on the safety of their technologies, so that states and cities can be assured that autonomous vehicle testing is being conducted in a safe manner; differentiation between limited vehicle testing and the commercial deployment of large numbers of autonomous vehicles through an expanded exemptions process; and expansion of plans for consumer education about \"safe use and interaction\" with respect to autonomous vehicles. According to the National Conference of State Legislatures (NCSL), at least 41 states and the District of Columbia considered legislation related to autonomous vehicles between 2013 and October 2019; in that time, 29 states and the District of Columbia enacted legislation, governors in 11 states issued executive orders, and 5 states issued both an executive order and enacted legislation. ( Figure 4 ). Of the states that have enacted laws in 2017, 2018, and 2019 pertaining to autonomous vehicles, NCSL reports that the largest number of states have passed laws that clarify certain types of commercial activity, such as how closely autonomous vehicles can follow each other when they are coordinated, as in truck platooning. According to NCSL, no recent state laws have been enacted dealing with cybersecurity or vehicle inspection reports. NCSL has organized and categorized the types of state legislation ( Table 4 ). For a more thorough description of the legislation passed in 2017, 2018, and 2019, the NCSL Table of Enacted State Legislation provides more detail. Deployment of fully autonomous vehicles will require not only a suite of new technologies, but also changes to the highway infrastructure on which those vehicles will operate. Autonomous vehicles being tested today rely on clear pavement markings and legible signage to stay in their lanes and navigate through traffic. Major highways as well as side roads in urban and rural settings will need to accommodate autonomous vehicles in addition to a large fleet of conventional vehicles with human drivers. In this transition period to more autonomous vehiclesâwhich many anticipate will last several decades âthe Federal Highway Administration (FHWA) is expected to play a significant role through its administration of the Manual on Uniform Traffic Control Devices (MUTCD), which sets standards for all traffic control devices, including signs, intersection signals, and road markings. For example, overhead signage on Interstate Highways contains white lettering on a green background in all 50 statesâeasily recognizable to any U.S. driverâdue to MUTCD standards. FHWA is in the process of updating the 2009 MUTCD to address issues specific to autonomous vehicle technologies. However, state compliance with MUTCD is voluntary, and not all states uniformly apply all standards. Audi reportedly announced in 2018 that it would not make its new Level 3 autonomous vehicle technology, called Traffic Jam Pilot, available in the United States because of \"laws that change from one state to the next, insurance requirements, and things like lane lines and road signs that look different in different regions.\" Other automakers have made similar complaints about U.S. roads. In the near term, improvement and better maintenance of pavement markings, signage and intersection design may be the most helpful steps that federal and state transportation officials can take. Despite national standards based on MUTCD, not all states maintain their highway markings at a level that would be useful to guide autonomous vehicles. Inadequate road maintenance may affect the pace of autonomous vehicle deployment. Some 21% of major U.S. roads are in poor condition, and a road with many potholes or temporary pavement repairs may also lack continuous lane markings. Many minor roads, which are generally the responsibility of county or municipal governments, may lack road edge lines as well as center lines, potentially making it difficult for autonomous vehicles to position themselves correctly. Dirt and gravel roads may pose particular challenges for autonomous vehicles, as they generally have no pavement markings and cameras may be unable to detect potholes or edges in low-visibility conditions. Closely tied to the need for clearer road markings and signage will be ways in which federal and state transportation agencies develop a standardized method to communicate information to vehicles and motorists about construction, road accidents, detours, and other changes to road environments. Many of the perceived benefits of autonomous vehiclesâreduced vehicle fatalities, congestion mitigation, and pollution reductionâmay depend on the ability of vehicles to exchange information with surrounding infrastructure. The Transportation Research Board (TRB) has been evaluating how states should begin now to plan and develop the types of connected vehicle infrastructure that will be necessary for full autonomous vehicle deployment. TRB's research is also focused on how cash-strapped transportation agencies can identify the large investments that will in turn be necessary to implement connectivity on top of regular maintenance of highways, bridges, and other traditional infrastructure. Other options to facilitate autonomous vehicle travel may include designation of special highway corridors that would include all V2X systems necessary for safe autonomous vehicle operation; three European countries have agreed to build such a corridor. Over a longer time line, the importance of highway markings may fade as automakers and developers find new ways for autonomous vehicles to navigate, including greater use of guardrails and roadside barriers, sensors, and three-dimensional maps. If highly detailed mapping is deemed to be one replacement for visual cues such as lane markings, then transportation agencies and automakers may need to develop an open standard so that all vehicles will understand the mapping technology. V2X communications through DSRC and cellular may evolve to provide a mechanism for new types of vehicle guidance.", "summary": "Autonomous vehicles have the potential to bring major improvements in highway safety. Motor vehicle crashes caused an estimated 36,560 fatalities in 2018; a study by the National Highway Traffic Safety Administration (NHTSA) has shown that 94% of crashes are due to human errors. For this and other reasons, federal oversight of the testing and deployment of autonomous vehicles has been of considerable interest to Congress. In the 115 th Congress, autonomous vehicle legislation passed the House as H.R. 3388 , the SELF DRIVE Act, and a separate bill, S. 1885 , the AV START Act, was reported from a Senate committee. Neither bill was enacted. In the 116 th Congress, interest in autonomous vehicles remains strong, but similar comprehensive legislative proposals have not been introduced. The America's Transportation Infrastructure Act of 2019, S. 2302 , which has been reported by the Senate Environment and Public Works Committee, would encourage research and development of infrastructure that could accommodate new technologies such as autonomous vehicles. In recent years, private and government testing of autonomous vehicles has increased significantly, although it is likely that widespread use of fully autonomous vehiclesâwhere no driver attention is neededâmay be many years in the future. The pace of autonomous vehicle commercialization may have slowed due to the 2018 death in Arizona of a pedestrian struck by an autonomous vehicle, which highlighted the challenges of duplicating human decisionmaking by artificial intelligence. The National Transportation Safety Board determined that the fatality was caused by an \"inadequate safety culture\" at Uberâwhich was testing the vehicleâand deficiencies in state and federal regulation. The U.S. Department of Transportation and NHTSA have issued three reports since 2016 that inform the discussion of federal autonomous vehicle policies, suggesting best practices that states should consider in driver regulation; a set of voluntary, publicly available self-assessments by automakers showing how they are building safety into their vehicles; and a proposal to modify the current system of granting exemptions from federal safety standards. On February 6, 2020, NHTSA announced its approval of the first autonomous vehicle exemptionâfrom three federal motor vehicle standardsâto Nuro, a California-based company that plans to deliver packages with a robotic vehicle smaller than a typical car. Proponents of autonomous vehicles contend that lengthy revisions to current safety regulations could impede innovation, as the rules could be obsolete by the time they took effect. Federal and state regulatory agencies are addressing vehicle and motorist standards, while Congress is considering legislative solutions to some of the regulatory challenges. Legislation did not pass the 115 th Congress due to disagreements on several key issues. These included the following: The extent to which Congress should alter the traditional division of vehicle regulation, with the federal government being responsible for vehicle safety and states for driver-related aspects such as licensing and registration, as the roles of driver and vehicle merge. The number of autonomous vehicles that NHTSA should permit to be tested on highways by granting exemptions to federal safety standards, and which specific safety standards, such as those requiring steering wheels and brake pedals, can be relaxed to permit thorough testing. How much detail legislation should contain related to addressing cybersecurity threats, including whether federal standards should require vehicle technology that could report and stop hacking of critical vehicle software and how much information car buyers should be given about these issues. The extent to which vehicle owners, operators, manufacturers, insurers, and other parties have access to data that is generated by autonomous vehicles, and the rights of various parties to sell vehicle-related data to others. Congress may address these issues in legislation reauthorizing surface transportation programs. The current surface transportation authorization expires at the end of FY2020. Policy decisions about the allocation of radio spectrum and road maintenance also may affect the rate at which autonomous vehicle technologies come into use.", "document_type": "crs"}
{"report": "Many U.S. officials and Members of Congress consider Estonia, Latvia, and Lithuania, often referred to collectively as the Baltic states , to be valued U.S. allies and among the most pro-U.S. countries in Europe. Strong ties between the United States and the Baltic states have deep historical roots. Lithuania, Latvia, and Estonia gained their independence in 1918, after the collapse of the Russian Empire. In 1940, they were forcibly incorporated into the Soviet Union, but the United States never recognized their annexation. The United States strongly supported the restoration of the three countries' independence in 1991, and it was a leading advocate of their accession to NATO and the European Union (EU) in 2004. The United States and the Baltic states work closely together in their respective bilateral relationships and within NATO, as well as in the context of U.S.-EU relations. The U.S.-Baltic partnership encompasses diplomatic cooperation in pursuit of shared foreign policy objectives, extensive cooperation on security and defense, and a mutually beneficial economic relationship. The United States provides considerable security assistance to the Baltic states, including financing assistance and defense sales, intended to strengthen their military capabilities. Since 2014, U.S. focus on the Baltic region has increased, driven by concerns about potential threats posed by Russia. Developments related to Russia and the implications for U.S. policy and NATO likely will have continuing relevance for Congress. Estonia, Latvia, and Lithuania are central interlocutors and partners in examining and responding to these challenges. As indicated by annual security assistance appropriations, as well as resolutions and bills adopted or introduced in recent years, Congress supports the maintenance of close relations and security cooperation with the Baltic states. The House Baltic Caucus, a bipartisan group of 70 Members of the House of Representatives, and the Senate Baltic Freedom Caucus, a bipartisan group of 11 Senators, seek to maintain and strengthen the U.S.-Baltic relationship and engage in issues of mutual interest. Although outside observers typically view Estonia, Latvia, and Lithuania as a group, citizens of the three countries tend to point out that alongside the three countries' many similarities are notable differences in national history, language, and culture. Cooperation and convergence among the Baltic states remains the central trend, but each country has its own unique domestic political dynamics and the viewpoints and priorities of the three countries are not always completely aligned. Estonia, Latvia, and Lithuania stand out as the leaders of democracy among post-Soviet states and are the only post-Soviet states that have joined NATO and the EU. Since the restoration of their independence nearly 30 years ago, the three countries' governments have tended to consist of multiparty coalitions, which have maintained broadly pro-market, pro-U.S./NATO, and pro-EU orientations. The government of Estonia is led by the center-left Center Party in a coalition with the far-right, anti-immigration Conservative People's Party of Estonia (EKRE) and the conservative Pro Patria (Fatherland) party. Juri Ratas of the Center Party is Estonia's prime minister. The Center Party came in second in Estonia's March 2019 general election with 23.1% of the vote (26 seats in Estonia's 101-seat unicameral parliament, the Riigikogu ); it was able to form a government after it unexpectedly reversed its campaign pledge not to work with the far-right EKRE. EKRE came in third in the election with 17.8% of the vote, more than doubling its share of the vote from the 2015 election and winning 19 seats (a gain of 12 seats). The center-right Reform Party, which led a series of coalition governments from 2005 to 2016, came in first place in the 2019 election, winning 28.9% of the vote (34 seats). However, it was unable to secure enough support from potential coalition partners to form a government. The Center Party, whose support comes largely from Estonia's Russian-speaking population (about 30% of the population), previously led a coalition government with Pro Patria and the center-left Social Democratic Party from November 2016 until the 2019 election. In late 2016, a changeover in the party's leadership reoriented the Center Party away from a Russian-leaning outlook to a clear pro-Western stance in support of Estonia's membership in NATO and the EU. During the 2019 campaign, the Center Party advocated for a progressive tax system, higher social spending, a simplified path to citizenship for noncitizen residents, and maintenance of the country's dual Estonian- and Russian-language education system. The Reform Party, by contrast, advocated maintenance of a flat tax, tight fiscal policy, and Estonian language exams for obtaining citizenship. The Reform Party also called for rolling back Russian-language education in the country's school system. Observers assert that EKRE benefitted in the 2019 election from antiestablishment sentiment among voters and gained support by appealing to rural Estonians who feel economically left behind. In addition to opposing immigration, EKRE is adamantly nationalist, skeptical of the EU, and anti-Russia. Some analysts suggest there is a potential for friction between the Center Party and EKRE on issues such as citizenship, immigration, and abortion policy. In 2016, Estonia's parliament unanimously elected Kersti Kaljulaid as president. Kaljulaid is the country's youngest president (aged 46 at the time of her election) and its first female president. A political outsider with a background as an accountant at the European Court of Auditors, she was put forward as a surprise unity candidate after Estonia's political parties were unable to agree on the first round of candidates. The president serves a five-year term and has largely ceremonial duties but plays a role in defining Estonia's international image and reflecting the country's values. Latvia's October 2018 general election produced a fragmented result, with seven parties winning seats in the country's 100-seat unicameral parliament ( Saeima ) . After three months of negotiations and deadlock, a five-party coalition government took office in January 2019. Prime Minister KriÅ¡jÄnis KariÅÅ¡ of the center-right New Unity Party (JV) leads the government. JV leveraged its experience as a member of the previous governing coalition to put together and lead the new government despite being the smallest party in the Saeima , with eight seats. The other coalition members are the conservative, nationalist National Alliance (NA) and three new parties: the antiestablishment Who Owns the State? (KPV LV); the New Conservative Party (JKP), which campaigned on an anti-corruption platform; and the liberal Development/For! alliance. The coalition partners hold a combined 61 seats in the Saeima and appear likely to maintain the broadly center-right, fiscally conservative, and pro-European policies followed by recent Latvian governments. At the same time, the strong showings in the election by KPV LV and JKP (each won 16 seats) appeared to reflect deepening public dissatisfaction with corruption and the political establishment following high-profile bribery and money-laundering scandals in 2018. The three parties of the previous coalition government, the centrist Union of Greens and Farmers (ZZS), the Unity Party (rebranded New Unity in 2018), and the NA, lost nearly half their total seats, dropping from a combined 61 seats to 32 seats. The center-left Harmony Social Democratic Party (SDPS), which draws its support largely from the country's ethnic Russian population, remained the largest party in parliament, with 23 seats. With five of the seven parties in the coalition government, the SDPS and ZZS are the parliamentary opposition. The next general election is scheduled to take place in 2022. On May 29, 2019, the Saeima elected Egils Levits to be Latvia's next president. A former judge at the European Court of Justice, Levits formally took office on July 8, 2019. Outgoing President Raimonds Vejonis of the ZZS declined to run for a second term. The president performs a mostly ceremonial role as head of state but also acts as commander-in-chief of the armed forces and has the power to propose and block legislation. Lithuania has a centrist coalition government composed of four political parties and led by the center-right Lithuanian Peasants and Greens Union (LVÅ½S). The LVÅ½S emerged as the surprise winner of the country's October 2016 parliamentary election, winning 54 of the 141 seats in the Lithuanian parliament ( Seimas ) after winning one seat in the 2012 election. The prime minister of Lithuania is Saulius Skvernelis, a politically independent former interior minister and police chief who was selected for the position by the LVÅ½S (while remaining independent, Skvernelis campaigned for the LVÅ½S). A major factor in the 2016 election outcome was the perception that Skvernelis and the LVÅ½S remained untainted by a series of corruption scandals that negatively affected support for most of Lithuania's other political parties. The LVÅ½S initially formed a coalition government with the center-left Social Democratic Party of Lithuania (LSDP), which led the previous coalition government following the 2012 election. In September 2017, the LSDP left the coalition amid tensions over the slow pace of tax and pension reforms intended to reduce economic inequality. Prime Minister Skvernelis subsequently led a minority government of the LVÅ½S and the Social Democratic Labour Party of Lithuania (LSDDP), a new party that splintered off from the LSDP. In July 2019, the LVÅ½S and the LSDDP reached an agreement to form a new coalition government with the addition of the nationalist-conservative Order and Justice Party and the Electoral Action of Poles in Lithuania-Christian Families Alliance. The four parties in the current coalition control a parliamentary majority, with a combined 76 out of 141 seats in the Seimas . The coalition's domestic agenda focuses primarily on boosting social programs, including greater spending on social insurance and increased benefits for families, students, and the elderly. The opposition parties are the center-right Homeland Union-Lithuanian Christian Democrats, which came in second place in the 2016 election with 31 seats; the LSDP; and the center-right Liberal Movement. The next general election is scheduled to take place in October 2020. Gitanas NausÄda, a pro-European, politically independent centrist and former banker, won Lithuania's May 2019 presidential election. He replaces Dalia GrybauskaitÄ , who served as president from 2009 to 2019 and was consistently regarded as Lithuania ' s most popular politician. The powers of the Lithuanian presidency, the only presidency in the Baltic states to be directly elected, are weaker than those of the U.S. presidency. However, the Lithuanian president plays an important role in shaping foreign and national security policy, is commander-in-chief of the armed forces, appoints government officials, and has the power to veto legislation. Efforts to combat corruption remain a focus of Lithuania's government. Following a series of bribery scandals involving leading politicians and one of the country's largest companies, the Seimas adopted a new law in 2018 appointing special prosecutors to investigate cases of political corruption. The 2008-2009 global economic crisis hit the Baltic states especially hard; each of the three countries experienced an economic contraction of more than 14% in 2009. The social costs of the recession and the resulting budget austerity included increased poverty rates and income inequality and considerable emigration to wealthier parts of the EU. The Baltic economies have since rebounded, however, benefitting from strong domestic consumption, external demand for exports, and investment growth (including from EU funding): Estonia's gross domestic product (GDP) grew by 5.8% in 2017 and 4.8% in 2018. It is forecast to grow by 3.2% in 2019 and 2.9% in 2020. Unemployment declined from 16.7% in 2010 to 5.4% in 2018. Latvia's GDP grew by 4.6% in 2017 and 4.8% in 2018; it is forecast to grow by 2.8% in 2019 and 2.8% in 2020. Unemployment declined from 19.5% in 2010 to 7.4% in 2018. Lithuania's GDP grew by 4.1% in 2017 and 3.5% in 2018; it is forecast to grow by 3.4% in 2019 and 2.7% in 2020. Unemployment declined from 17.8% in 2010 to 6.1% in 2018. Despite the crisis and aftermath, each of the Baltic states fulfilled a primary economic goal when each adopted the euro as its currency (Estonia in 2011, Latvia in 2014, and Lithuania in 2015). The public finances of the Baltic states remain well within guidelines set by the EU (which require member states to have an annual budget deficit of less than 3% of GDP and maintain government debt below 60% of GDP). Both Estonia and Latvia recorded a budget deficit below 1% of GDP in 2018, and Lithuania had a small budget surplus. Gross government debt in 2018 was approximately 8.3% of GDP for Estonia (making it the EU's least-indebted member state), 35.9% of GDP for Latvia, and 34.2% of GDP for Lithuania. According to a study by the European Commission, foreign direct investment (FDI) in the Baltic states remains below precrisis levels. With considerable investment in the financial services sector, Sweden is the largest foreign investor in the region, followed by Finland and the Netherlands. Estonia has been the most successful of the three Baltic countries in attracting FDI, with FDI equivalent to approximately 100% of gross value added in 2015, compared to approximately 63% for Latvia and 40% for Lithuania. U.S. and European authorities have expressed concerns about the practices of banks in the region that cater to nonresidents, largely serving account holders based in Russia and other countries of the former Soviet Union. In 2018, two scandals in particular brought attention to money-laundering challenges in the region. In February 2018, the U.S. Department of the Treasury designated ABLV Bank, then the third-largest bank in Latvia, as a financial institution of primary money laundering concern. Treasury accused it of money laundering, bribery, and facilitating transactions violating United Nations sanctions against North Korea. Following a run on deposits and a decision by the European Central Bank not to intervene, ABLV initiated a process of self-liquidation. The Latvian government subsequently made reforming the banking sector and strengthening anti-money-laundering (AML) practices top policy priorities. A September 2018 report commissioned by Danske Bank, Denmark's largest bank, indicated that between 2007 and 2015, some â¬200 billion (approximately $220 billion) worth of suspicious transactions may have flowed through a segment of its Estonian branch catering to nonresidents, primarily Russians. The activity continued despite critical reports by regulatory authorities and whistleblower accounts highlighting numerous failures in applying AML practices. In February 2019, the Estonian Financial Supervision Authority ordered Danske Bank to cease operations in Estonia; Danske Bank subsequently decided to cease its activities in Latvia and Lithuania (and Russia), as well. The U.S. State Department describes Estonia, Latvia, and Lithuania as strong, effective, reliable, and valued allies that have helped to promote security, stability, democracy, and prosperity in Europe and beyond. Many citizens of the Baltic states remain grateful to the United States for consistently supporting their independence throughout the Cold War and playing a key role in promoting the restoration of independence in 1991. Most policymakers in the Baltic states tend to see their countries' relationship with the United States as the ultimate guarantor of their security against pressure or possible threats from Russia. All three Baltic states joined NATO and the EU in 2004 with strong U.S. support. In addition to maintaining a pro-NATO and pro-EU orientation, the Baltic states have sought to support U.S. foreign policy and security goals. For example, they have worked closely with the United States in Afghanistan, where the three Baltic states have contributed troops to NATO-led missions since 2002-2003. The three countries also have been partner countries in the Global Coalition to Defeat the Islamic State, providing personnel, training, weapons, and funding for efforts to counter the Islamic State in Iraq and Syria since 2014. The Trump Administration and many Members of Congress have demonstrated support for strong U.S. relations with the Baltic states. In April 2018, President Donald Trump hosted the presidents of the three Baltic states for a quadrilateral U.S.-Baltic Summit intended to deepen security and defense cooperation and reaffirm the U.S. commitment to the region. The presidential summit was followed by a U.S.-Baltic Business Summit intended to expand commercial and economic ties. During the 115 th Congress, the Senate adopted a resolution ( S.Res. 432 ) congratulating Estonia, Latvia, and Lithuania on the 100 th anniversary of their independence; applauding the U.S.-Baltic partnership; commending the Baltic states' commitment to NATO, transatlantic security, democracy, and human rights; and reiterating the Senate's support for the European Deterrence Initiative (EDI) as a means of enhancing Baltic security (on EDI, see \" U.S. European Deterrence Initiative ,\" below). The United States provides significant security assistance to its Baltic partners. According to the State Department, as of July 2019, U.S. security assistance to the Baltic states has included more than $450 million in defense articles sold under the Foreign Military Sales (FMS) program and more than $350 million in defense articles authorized under the Direct Commercial Sales process since 2014; more than $150 million in Foreign Military Financing (FMF) since 2015, with the aim of strengthening the Baltic states' defensive capabilities in areas such as hybrid warfare, electronic warfare, border security, and air and maritime domain awareness and enhancing interoperability with NATO forces; approximately $1.2 million annually per country in International Military Education and Training (IMET) funds contributing to the professional education of military officers; and $290 million in funding from the Department of Defense under Title 10 train and equip programs since 2015, including approximately $173 million in FY2018. Since 1993, the Baltic states have participated in the U.S. National Guard State Partnership Program. Under the program, Estonia's armed forces partner with units from the Maryland National Guard, Latvia's armed forces partner with the Michigan National Guard, and Lithuania's armed forces partner with the Pennsylvania National Guard. In 2017, the United States signed separate bilateral defense cooperation agreements with each of the Baltic states. The agreements enhanced defense cooperation by building on the NATO Status of Forces Agreement to provide a more specific legal framework for the in-country presence and activities of U.S. military personnel. The National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ) authorized the Department of Defense to conduct or support a security assistance program to improve the Baltic states' interoperability and build their capacity to deter and resist aggression. The program was authorized through 2020 with a spending limit of $100 million. In November 2018, the United States and the three Baltic states agreed to develop bilateral defense cooperation strategic road maps focusing on specific areas of security cooperation for the period 2019-2024. In April 2019, the United States and Lithuania signed a road map agreeing to strengthen cooperation in training, exercises, and multilateral operations; improve maritime domain awareness in the Baltic Sea; improve regional intelligence-sharing, surveillance, and early warning capabilities; and build cybersecurity capabilities. In May 2019, the United States signed road map agreements with Latvia and Estonia outlining similar priorities for security cooperation. In the 116 th Congress, the National Defense Authorization Act for Fiscal Year 2020 ( P.L. 116-92 ) extended security assistance to the Baltic states for building interoperability and deterrence through 2021 and increased the total spending limit to $125 million. The act also requires the Secretary of Defense and the Secretary of State to jointly conduct a comprehensive assessment of the military requirements necessary to deter and resist Russian aggression in the region. The committee report ( S.Rept. 116-103 ) for the Senate version of the Department of Defense Appropriations Act, 2020 ( S. 2474 ), recommends allocating $400 million to the Defense Cooperation Security Agency to fund a Baltics regional air defense radar system. A sense of Congress resolution introduced in the House of Representatives ( H.Res. 416 ) would reaffirm U.S. support for the Baltic states' sovereignty and territorial integrity and encourage the Administration to further defense cooperation efforts. Partially reflected in the National Defense Authorization Act for Fiscal Year 2020, the Baltic Reassurance Act ( H.R. 3064 ) introduced in the House of Representatives would reiterate the U.S. commitment to the security of the Baltic states and require the Secretary of Defense to conduct a comprehensive regional defense assessment. U.S. economic ties with the three Baltic states remain relatively limited, although the State Department has stated there are \"growing commercial opportunities for U.S. businesses\" and \"room for growth\" in the relationship. In 2018, U.S. goods exports to Estonia were valued at $346.1 million and goods imports from Estonia were valued at $953.5 million. Main U.S. exports to Estonia are computer and electronic products, chemicals, machinery, and transportation equipment; Estonia's top exports to the United States are computer and electronic products, petroleum products and chemicals, electrical equipment, and medical instruments. U.S. affiliates employ about 3,570 people in Estonia, and U.S. FDI in Estonia was about $100 million in 2017. In 2018, U.S. goods exports to Latvia were valued at $510.4 million and goods imports from Latvia were valued at $727.1 million. Main U.S. exports to Latvia are transportation equipment and computer and electronic products; top U.S. imports from Latvia are beverage products and transportation equipment. U.S. affiliates employ about 1,325 people in Latvia, and U.S. FDI in Latvia was $71 million in 2017. In 2018, U.S. exports to Lithuania were valued at $706.4 million and imports from Lithuania were valued at nearly $1.268 billion. Main U.S. exports to Lithuania are used machinery, chemicals, computer and electronic products, and transportation equipment; top U.S. imports from Lithuania are petroleum and coal products, chemicals, and furniture. U.S. affiliates employ about 2,250 people in Lithuania, and Lithuania has not attracted significant levels of U.S. FDI. Officials in the Baltic region have noted with concern what they view as increasing signs of Russian foreign policy assertiveness. These signs include a buildup of Russian forces in the region, large-scale military exercises, and incursions by Russian military aircraft into Baltic states' airspace. Unlike Georgia and Ukraine, the Baltic states are members of NATO, and many observers contend the alliance's Article 5 collective defense guarantee limits potential Russian aggression in the Baltic region. Nevertheless, imposing various kinds of pressure on the Baltic states enables Russia to test NATO solidarity and credibility. Defense experts assert that Russian forces stationed near the Baltic region, including surface ships, submarines, and advanced S-400 air defense systems, could \"allow [Russia] to effectively close off the Baltic Sea and skies to NATO reinforcements.\" According to a RAND report based on a series of war games staged in 2014 and 2015, a quick Russian strike could reach the capitals of Estonia and Latvia in 36-60 hours. The breakup of the Soviet Union left the Baltic states with virtually no national militaries, and their forces remain small and limited (see Table 1 ). The Baltic states' defense planning consequently relies heavily on NATO membership, and these states have emphasized active participation in the alliance through measures such as contributing troops to NATO's mission in Afghanistan. In the context of Russia's invasion of Ukraine and renewed concerns about Russia, the Baltic states have significantly increased their defense budgets and sought to acquire new military capabilities. Lithuania has the largest military of the three Baltic states, with 19,850 total active duty personnel in 2019. According to NATO, Lithuania has increased its defense spending from $427 million in 2014 to an expected $1.084 billion in 2019, equivalent to 1.98% of GDP (NATO recommends that member states allocate 2% of GDP for defense spending). The defense ministry has moved ahead with plans to acquire new self-propelled artillery systems and portable anti-aircraft missiles, as well as elements of a medium-range air defense system. After abolishing conscription in 2008, Lithuania reintroduced compulsory military service in 2015 due to concerns about Russia, a move that brings 3,000 personnel to the armed forces per year. According to NATO, Estonia's defense spending is expected to be 2.13% of GDP ($669 million) in 2019. The country's armed forces total 6,600 active personnel and 12,000 reserves, plus a volunteer territorial defense force with about 15,800 members. Estonia has taken steps to upgrade its air defense system and modernize a range of ground warfare equipment, including anti-tank weapons. Estonia has compulsory military service for men aged 18-27, with an eight-month basic term of conscripted service. Latvia's armed forces total 6,210 active personnel. According to NATO figures, Latvia has more than doubled its defense spending as a percentage of GDP over the past five years, from 0.94% of GDP in 2014 to 2.01% of GDP ($724 million) in 2019. Acquisition priorities of the Latvian armed forces include self-propelled artillery, armored reconnaissance vehicles, multi-role helicopters, anti-aircraft missiles, and anti-tank missiles. Under the European Deterrence Initiative (EDI), which was launched in 2014 and originally called the European Reassurance Initiative, the United States has bolstered security cooperation in Central and Eastern Europe with enhanced U.S. military activities in five areas: (1) increased military presence in Europe, (2) additional exercises and training with allies and partners, (3) improved infrastructure to allow greater responsiveness, (4) enhanced prepositioning of U.S. equipment, and (5) intensified efforts to build partner capacity of newer NATO members and other partners. As of December 2019, there are approximately 6,000 U.S. military personnel involved in the associated Atlantic Resolve mission at any given time, with units typically operating in the region under a rotational nine-month deployment. The United States has not increased its permanent troop presence in Europe (about 67,000 troops, including two U.S. Army Brigade Combat Teams, or BCTs). Instead, it has focused on rotating additional forces into the region, including nine-month deployments of a third BCT based in the United States. The rotational BCT is based largely in Poland, with units also conducting training and exercises in the Baltic states and 14 other European countries. The Fourth Infantry Division Mission Command Element, based in PoznaÅ, Poland, acts as the headquarters overseeing rotational units. EDI funding increased substantially during the first years of the Trump Administration, from approximately $3.4 billion in FY2017 to approximately $4.8 billion in FY2018 and approximately $6.5 billion in FY2019. For FY2020, the Administration requested $5.9 billion in funding for the EDI; defense officials explained that the reduced request was due to the completion of construction and infrastructure projects. In September 2019, the Department of Defense announced plans to defer $3.6 billion of funding for 127 military construction projects in order to fund construction of the U.S.-Mexico border wall, with approximately $770 million of this money to come from EDI-related projects. Affected initiatives in the Baltic states reportedly include the planned construction of a special forces operations and training facility in Estonia. At the 2016 NATO Summit in Warsaw, the alliance agreed to deploy battalion-sized (approximately 1,100-1,500 troops) multinational battle groups to Poland and each of the three Baltic states (see Figure 2 ). These enhanced forward presence units are intended to deter Russian aggression and emphasize NATO's commitment to collective defense by acting as a tripwire that ensures a response from the whole of the alliance in the event of a Russian attack. Germany leads the multinational battalion in Lithuania, with troop contributions from Belgium, the Czech Republic, Iceland, the Netherlands, and Norway. Canada leads the multinational battalion in Latvia, with troop contributions from Albania, the Czech Republic, Italy, Montenegro, Poland, Slovakia, Slovenia, and Spain. The United Kingdom (UK) leads in Estonia, with contributions from Denmark, France, and Iceland. (The United States leads the multinational battalion in Poland, with contributions from Croatia, Romania, and the UK. ) NATO continues to resist calls to deploy troops permanently in countries that joined the alliance after the collapse of the Soviet Union due to concerns in some member states that doing so could violate the terms of the 1997 NATO-Russia Founding Act. Accordingly, the enhanced NATO presence has been referred to as continuous but rotational rather than permanent . Lacking their own fighter aircraft, the Baltic states rely on their NATO allies to police and defend Baltic airspace. NATO launched the Baltic Air Policing mission in 2004. The mission originally consisted of rotating four-month deployments of four aircraft. Following Russia's invasion of Ukraine in 2014, deployments increased to 8 to 12 aircraft at a time. The Baltic states contribute to mission costs, including by providing ground services for the aircraft and supplying aviation fuel. In September 2019, Belgium took over as the air-policing mission's lead nation, with four Belgian and four Danish F-16s operating from Å iauliai Air Base in Lithuania, augmented by four Czech Gripen fighters based at Ãmari Air Base in Estonia. From May to August 2019, in what was the 50 th rotation of the Baltic Air Policing mission, Hungary was the lead nation, with Hungarian Gripens joined at Å iauliai by F-18s from Spain and British Eurofighters augmenting from Ãmari. In recent years, tensions between Russia and the Baltic states have been exacerbated by reciprocal accusations of spying; illicit cyber activity, including the hacking of Baltic states' government websites; and a Russian propaganda offensive directed at Russian speakers in the Baltic states. Baltic states' support for EU sanctions on Russia due to its invasion of Ukraine also has exacerbated tensions, as have Russian retaliatory sanctions targeting agricultural products. Many observers have expressed concerns about Russia targeting the Baltic states with hybrid warfare tactics, such as those it has used in Ukraine. The presence of a large ethnic Russian population in the Baltic states is a factor in these concerns, especially given that Russian claims of persecution against Russian communities were part of Russia's pretext for intervention in Ukraine. According to statements by Russian officials, including President Vladimir Putin, one of the central principles of Russian foreign policy is acting as the defender and guarantor of the rights of Russian-speaking people wherever they live. Russia routinely accuses Estonia and Latvia of violating the human rights of Russian-speaking minorities by discriminating against the Russian language in official usage. Although international organizations generally have rejected these charges, some segments of the countries' Russian-speaking communities are poorly integrated into society. About 230,000 people in Latvia and 76,000 people in Estonia, the majority of whom are ethnic Russians, are noncitizen residents who are not allowed to vote or hold public office because they have not passed a citizenship test, which includes language and history components. Additionally, approximately 55,000 Russian citizens live in Latvia and 89,000 Russian citizens live in Estonia. Many in the ethnic Russian community receive their news primarily from Russian-language television and newspapers, and Russian media dominates the information market in Russian-speaking regions. In the past, Latvia and Lithuania have imposed fines and temporary bans on Russian media outlets, such as Rossiya and Sputnik , due to what authorities considered dangerous and unbalanced reporting. Analysts have documented how Russia uses traditional media (e.g., radio, television) and social media to propagate disinformation in the Baltic states and many other European countries. Russian disinformation efforts against the Baltic states typically attempt to polarize society by portraying the Baltic states as illegitimate and dysfunctional, the EU as ineffective and divided, NATO and the United States as imperial powers, and Baltic governments as Russophobe fascist regimes that oppress their ethnic Russian populations. Russian outlets repeatedly have sought to stir up opposition to NATO deployments in the region by fabricating stories of criminal activity by deployed NATO soldiers. There is no movement among Russian-speaking communities in the Baltic states advocating absorption by Russia, and survey data indicate that these communities are not a unified, homogenous group in terms of how they view competing political narratives. Analysts believe most members of these communities prefer to live in Estonia or Latvia rather than Russia; noncitizen residents enjoy benefits such as visa-free travel throughout the EU, and average wages are considerably higher than in Russia. Concerns remain, however, that Russia could attempt to foment tensions or civil unrest as a pretext for intervention or in an attempt to seize territory populated by ethnic Russians. Vulnerability to potential cyberattacks is a primary concern for the Baltic states. Following a period of heightened tensions with Russia in 2007, Estonia's internet infrastructure came under heavy attack from hackers. Estonian officials said some assaults came from Russian government web servers, although many others came from all over the world. According to analysts, what appeared as a series of smaller, individual distributed denial-of-service attacks was most likely a coordinated, large-scale effort. The attacks did little long-term damage, and they gave Estonia experience in facing such incidents and prompted the country to strengthen its cyber defenses. Estonia hosts the NATO Cooperative Cyber Defense Center of Excellence, which opened in 2008. The center fosters cooperation and information sharing on cybersecurity between NATO countries, conducts cyberwarfare research and training, and organizes exercises and conferences preparing NATO countries to detect and fight cyberattacks. In 2018, Lithuania adopted a national Cyber Security Strategy and integrated several government agencies into the National Cyber Security Centre (NCSC) under the Ministry of Defense. Lithuania's NCSC registered more than 53,000 cybersecurity incidents in 2018. The International Telecommunication Union's Global Cybersecurity Index 2018 ranked Lithuania fourth and Estonia fifth in the world based on measurements of legal, technical, organizational, capacity building, and cooperation measures related to cybersecurity. (The UK was ranked first, United States second, and France third. ) In 2014, a decade after joining NATO and the EU, the Baltic states continued to import 100% of their natural gas from Russia. This dependence raised concerns that Russia could use energy as political and economic leverage against the Baltic states, prompting them to diversify their supply sources and improve their integration with European natural gas networks. In 2014, a floating liquefied natural gas (LNG) terminal became operational at the Lithuanian port of KlaipÄda. The nearly 300-meter-long vessel, the Independence , has the capacity to supply 100% of Lithuania's natural gas needs and 90% of the total natural gas needs of the three Baltic countries combined. In 2014, the Lithuanian gas company Litgas signed a five-year deal with Norway's Statoil (now Equinor) to provide 540 million cubic meters of gas to the facility annually. Gazprom subsequently agreed to cut the price Lithuania pays for natural gas. The United States began exporting LNG to Lithuania in 2017. Currently, Lithuania imports nearly 58% of its natural gas from Russia, accounting for approximately 19% of its primary energy consumption. Although Estonia and Latvia continue to import all of their natural gas from Russia, natural gas accounts for a relatively low share of the countries' overall energy supplies. Oil shale accounts for about 85% of Estonia's domestic energy supply, whereas natural gas accounts for less than 6%. Russian natural gas accounts for approximately 24% of Latvia's primary energy consumption; hydropower is Latvia's largest source of energy. In addition to Lithuania's LNG facility, numerous initiatives aim to reduce regional energy dependence on Russia through supply diversification and increased interconnectivity. A pipeline from Poland to Lithuania, linking the natural gas networks of the Baltic states to the rest of the EU, is expected to be completed in 2021. The Baltic Connector pipeline linking the gas infrastructures of Estonia and Finland is expected to become operational in 2020. Poland opened an LNG terminal in 2015, and Finland opened one in 2019. As a remnant of the Soviet era, the Baltic states' power grids remain connected and synchronized with those of Russia (including Kaliningrad) and Belarus; a control center in Moscow regulates frequency and manages reserve capacity for the Baltic states' electricity supply. Two strategic projects to integrate the region's power grid into the wider European electricity market became operational in 2016: the LitPol link connecting Lithuania with Poland and the 450-kilometer undersea NordBalt cable connecting Lithuania with Sweden. Previously, two connections between Estonia and Finland were the only infrastructure linking the region's electric grid to the rest of Europe. In 2018, the governments of Estonia, Latvia, and Lithuania reached an agreement with the European Commission on plans to synchronize their electricity grids with the rest of Europe by 2025. Many U.S. officials and Members of Congress regard European energy security as a U.S. interest. In particular, there has been concern in the United States that Russian energy dominance could affect the ability to present a united transatlantic position when it comes to other issues related to Russia. Successive U.S. Administrations have encouraged EU member states to reduce energy dependence on Russia through diversification of supply. They also have supported European steps to develop alternative sources and increase energy efficiency. In the 116 th Congress, related bills include the European Energy Security and Diversification Act of 2019 (House-passed H.R. 1616 and S. 704 ), the Protect European Energy Security Act ( H.R. 2023 ), and the Energy Security Cooperation with Allied Partners in Europe Act of 2019 ( S. 1830 ). The Baltic states are likely to remain strong U.S. allies and important U.S. security partners in Europe. Analysts believe close cooperation between the United States and the Baltic states will continue for the foreseeable future in areas such as efforts to deter potential Russian aggression, the future of NATO, energy security, and economic issues. The Baltic states likely will continue to look to the United States for leadership on foreign policy and security issues. During the 116 th Congress, the activities and funding level of the EDI, bilateral security cooperation with the Baltic states, and the regional presence and activities of NATO forces may remain of interest to Members of Congress. Efforts to bolster the capabilities of the Baltic states' armed forces, including through defense sales and the provision of U.S. security assistance, also may be of congressional interest. The Baltic states likely will be of continuing importance in the area of European energy security. In addition, Members of Congress may wish to remain informed about potential security threats to the Baltic states posed by Russia, including conventional military concerns and hybrid threats, such as disinformation campaigns and cyberattacks. Members of Congress may have an interest in assessing how the Baltic states, as well as other NATO and EU member states, can develop capabilities to counter such hybrid threats.", "summary": "Estonia, Latvia, and Lithuania, often referred to as the Baltic states , are close U.S. allies and considered among the most pro-U.S. countries in Europe. Strong U.S. relations with these three states are rooted in history. The United States never recognized the Soviet Union's forcible incorporation of the Baltic states in 1940, and it applauded the restoration of their independence in 1991. These policies were backed by Congress on a bipartisan basis. The United States supported the Baltic states' accession to NATO and the European Union (EU) in 2004. Especially since Russia's 2014 invasion of Ukraine, potential threats posed to the Baltic states by Russia have been a primary driver of increased U.S. and congressional interest in the region. Congressional interest in the Baltic states has focused largely on defense cooperation and security assistance for the purposes of deterring potential Russian aggression and countering hybrid threats, such as disinformation campaigns and cyberattacks. Energy security is another main area of U.S. and congressional interest in the Baltic region. Regional Security Concerns U.S., NATO, and Baltic leaders have viewed Russian military activity in the region with concern; such activity includes large-scale exercises, incursions into Baltic states' airspace, and a layered build-up of anti-access/area denial (A2AD) capabilities. Experts have concluded that defense of the Baltic states in a conventional military conflict with Russia likely would be difficult and problematic. The Baltic states fulfill NATO's target of spending 2% of gross domestic product (GDP) on defense, although as countries with relatively small populations, their armed forces remain relatively small and their military capabilities limited. Consequently, the Baltic states' defense planning relies heavily on their NATO membership. Defense Cooperation and Security Assistance The United States and the Baltic states cooperate closely on defense and security issues. New bilateral defense agreements signed in spring 2019 focus security cooperation on improving capabilities in areas such as maritime domain awareness, intelligence sharing, surveillance, and cybersecurity. The United States provides significant security assistance to the Baltic states; the National Defense Authorization Act for Fiscal Year 2020 ( P.L. 116-92 ) increased and extended U.S. assistance for building interoperability and capacity to deter and resist aggression. Under the U.S. European Deterrence Initiative (EDI), launched in 2014, the United States has bolstered its military presence in Central and Eastern Europe. As part of the associated Operation Atlantic Resolve, rotational U.S. forces have conducted various training activities and exercises in the Baltic states. NATO has also helped to bolster the Baltic states' security. At the 2016 NATO summit, the allies agreed to deploy multinational battalions to each of the Baltic states and Poland. The United Kingdom leads the battalion deployed in Estonia, Canada leads in Latvia, and Germany leads in Lithuania. Rotational deployments of aircraft from NATO member countries have patrolled the Baltic states' airspace since 2004; deployments have increased in size since 2014. Potential Hybrid Threats Since 2014, when the EU adopted sanctions targeting Russia due to the Ukraine conflict, tensions between Russia and the Baltic states have grown. These conditions have generated heightened concerns about possible hybrid threats and Russian tactics, such as disinformation campaigns and propaganda, to pressure the Baltic states and promote anti-U.S. or anti-NATO narratives. A large minority of the Estonian and Latvian populations consists of ethnic Russians; Russia frequently accuses Baltic state governments of violating the rights of Russian speakers. Many ethnic Russians in the Baltic states receive their news and information from Russian media sources, potentially making those communities a leading target for disinformation and propaganda. Some observers have expressed concerns that Russia could use the Baltic states' ethnic Russian minorities as a pretext to manufacture a crisis. Cyberattacks are another potential hybrid threat; addressing potential vulnerabilities with regard to cybersecurity is a top priority of the Baltic states. Energy Security The Baltic states have taken steps to decrease energy reliance on Russia, including through a liquefied natural gas (LNG) terminal in Lithuania and projects to build pipeline and electricity interconnections with Poland, Finland, and Sweden.", "document_type": "crs"}
{"report": "The Every Student Succeeds Act (ESSA; P.L. 114-95 ) amended the Elementary and Secondary Education Act (ESEA) to add a new Part E to Title I entitled \"Flexibility for Equitable Per-Pupil Spending.\" Under Title I-E, the Secretary of Education (the Secretary) has the authority to provide local educational agencies (LEAs) with flexibility to consolidate eligible federal funds with state and local funding to create a \"single school funding system based on weighted per-pupil allocations for low-income and otherwise disadvantaged students.\" The ESEA Title I-E authority is applicable to LEAs that are using or agree to implement \"weighted student funding\" systems to establish budgets for, and allocate funds to, individual public schools. These funding systems base school funding on the number of pupils in each school in specified categories. Under these funding systems, weights are assigned to a variety of pupil characteristics that are deemed to be related to the costs of educating such pupilsâsuch as being from a low-income family, being an English Learner (EL), or having a disability. Weights are also assigned on the basis of students' educational program (grade level, career-technical education, gifted and talented, or others). School budgets are based on these weighted pupil counts, in contrast to treating all pupils in the same manner. Under weighted student funding policies, school allocations are based on weighted counts of students enrolled in them; therefore, if students transfer from one public school to another within the same LEA, their weighted budget level transfers with them, although possibly with a time lag. The Secretary is permitted to waive a wide range of requirements under various ESEA programs, including provisions related to the allocation of Title I-A funds to schools, for LEAs entering into an agreement under Title I-E if an existing ESEA requirement would prevent the LEA from implementing its weighted student funding system under the agreement. LEAs must, however, meet Title I-E requirements for allocations to schools with students from low-income families and ELs. LEAs must also continue to meet a number of Title I-A and other requirements, though in somewhat modified fashion in some instances. The Title I-E authority is limited to 50 LEAs in school years preceding 2019-2020, but it could be offered to any LEA from that year onward, as long as a \"substantial majority\" of the LEAs participating in previous years have met program requirements. In February 2018, the Secretary announced that she would begin accepting applications from LEAs to enter into local flexibility demonstration agreements under the Student-Centered Funding Pilot, which is how the U.S. Department of Education (ED) refers to the Title I-E authority. To date, six LEAs have applied for the Title I-E authority, and only Puerto Rico has been approved to enter into an agreement. Puerto Rico will begin implementing a weighted student funding system using the Title I-E flexibility authority during the 2019-2020 school year. Thus, no LEAs will have implemented weighted student funding systems under Title I-E prior to the 2019-2020 school year. To provide context for the Title I-E authority, this report begins with a brief discussion of how public elementary and secondary education is financed at the state and local levels. It focuses on the primary types of state school finance programs and school finance \"equalization,\" including an overview of weighted student funding systems. For a more detailed discussion of state and local financing of public schools, see CRS Report R45827, State and Local Financing of Public Schools . Building on this background, the remainder of the report focuses on the Title I-E authority. First, there is an examination of the Title I-E statutory authority and related non-regulatory guidance provided by ED. This is followed by a discussion of current Title I-E implementation issues. The next section considers possible interactions between the Title I-E authority and other ESEA programs, particularly Title I-A. The report concludes with discussion of some issues that may arise related to the Title I-E authority. This section provides a brief overview of funding sources for public elementary and secondary education. It also discusses school finance \"equalization,\" including an examination of the use of weighted student funding at the state and LEA levels. The funding of public elementary and secondary schools in the United States involves a combination of local, state, and federal government revenues, in proportions that vary substantially both across and within states. Overall, a total of $678.4 billion in revenues was devoted to public elementary and secondary education in the 2015-16 school year (the latest year for which detailed data on revenues by source are available). State governments provided $318.6 billion (47.0%) of these revenues, local governments provided $303.8 billion (44.8%), and the federal government provided $56.0 billion (8.3%). Over the last several decades, the share of public elementary and secondary education revenues provided by state governments has increased, the share provided by local governments has decreased, and the federal share has varied within a range of 6.0% to 12.7%. The primary source of local revenues for public elementary and secondary education is the property tax, while state revenues are raised from a variety of sources, primarily personal and corporate income and retail sales taxes, a variety of \"excise\" taxes such as those on tobacco products and alcoholic beverages, plus lotteries in several states. All states (but not the District of Columbia) provide a share of the total revenues available for public elementary and secondary education. This state share varies widely, from approximately 25% in Illinois to almost 90% in Hawaii and Vermont. The programs through which state funds are provided to LEAs for public elementary and secondary education have traditionally been categorized into five types of programs: (1) Foundation Programs, (2) Full State Funding Programs, (3) Flat Grants, (4) District Power Equalizing, and (5) Categorical Grants. , Of these, Foundation Programs are the most common, although many states use a combination of program types. A goal of all of the various types of state school finance programs is to provide at least some limited degree of \"equalization\" of spending and resources, and/or local ability to raise funds, for public elementary and secondary education across all of the LEAs in the state. Such programs often establish target levels of funding \"per pupil.\" The \"pupil\" counts involved in these programs may simply be based on total student enrollment as of some point in time, or they may be a \"weighted\" count of students, taking into account variations in a number of categoriesâspecial pupil needs (e.g., disabilities, low family income, limited proficiency in English), grade levels, specific educational programs (e.g., career and technical education), or geographic considerations (e.g., student population sparsity or local variation in costs of providing education). A review of the individual state entries in a recent survey is an instructive indication of the extent to which weighted student counts are used to determine funding levels under current state programs. It shows that at least 32 states used some degree of weighting of the pupil counts used to calculate state aid to LEAs. Most of these states have policies that assign numeric weights to different categories of pupils, while in other states the school finance program specifies different target dollar amounts for specific categories of pupils, which is mathematically equivalent to assigning weights. Many states also adjust pupil weights for those in selected grade levels, geographic areas, or programs. Weights are often higher for pupils in the earliest grades or in grades 9-12, though policies vary widely, and a few states prioritize other grade levels such as 7-9. The population sparsity weights recognize the diseconomies of scale in areas with especially small LEAs or schools. The career and technical education weights recognize the extra costs of these types of programs. As seen above, the concept of pupil weighting is often applied in determining funding levels for LEAs under state school finance programs. After state funds reach LEAs, they are combined with locally raised funds to provide educational resources to students in individual schools. It is this stage in the distribution of educational resources that is relevant to the weighted student funding authority in ESEA Title I, Part E (see subsequent discussion of Title I-E). Below is an overview of both conventional intra-LEA budgeting policies and the use of weighted student funding at the LEA level. Under the traditional, and still most common, method of allocating resources within LEAs, there are no specific budgets for individual schools. Available state and local funds are managed centrally, by LEA staff, and various resourcesâfacilities, teachers, support staff, school administrators, instructional equipment, etc.âare assigned to individual schools. In this process, LEA staff typically apply LEA-wide standards such as pupil-teacher ratios or numbers of various categories of administrative and support staff to schools of specific enrollment sizes and grade levels. While levels of expenditures per pupil may be determined for individual schools under these budgetary systems, they are calculated \"after the fact,\" based on whatever staff and other resources have been assigned to the school. And while standard ratios of pupils per teacher or other resource measures may be applied LEA-wide in these situations, substantial variations in the amounts actually spent on teachers and other resources in each school can result from systematic variations in teacher seniority and other factors. These variations might be masked by local policies to apply average salaries, rather than specific actual salaries, in school accounting systems. Further, under traditional school budgeting policies there is little or no immediate or direct adjustment of resources or spending when students transfer from one school to another. In contrast to traditional, fully centralized budgeting and accounting policies for public schools within LEAs, a number of LEAs have in recent years applied the weighted student funding concept to developing and implementing individual school budgets. These policies are not currently applied to any federal program funds and are applied only to a portion of the state and local revenues received by these LEAs, as they continue to centrally administer and budget for various activities such as school facility construction, operations and maintenance, employee benefits, transportation, food services, and many administrative functions . The LEAs develop school budgets for teachers, support staff, and at least some other resources on the basis of weighted counts of the students currently enrolled in each school, and adjust these budgets when students transfer from one school to another. CRS is not aware of any comprehensive listing of all of the LEAs that are currently implementing weighted student funding policies for intra-LEA allocations to schools. The use of weighted student funding within LEAs is a relatively new practice in most cases, and comprehensive research on its effects is not yet available. However, Dr. Marguerite Roza and her team at the Edunomics Lab at Georgetown University were awarded a three-year grant by the Institute of Education Sciences at ED to study whether spending patterns change with weighted student funding systems and what the effects of these systems are on equity and achievement, particularly for poor and at-risk students. An interview with Dr. Roza based on their preliminary findings revealed that nearly all 19 LEAs in the study that use weighted student funding systems cite equity (89%) and flexibility for school principals (79%) as a main reason for implementing such systems. Dr. Roza also noted that there is not a \"standard\" weighted student funding model used by LEAs and that LEAs differ with respect to the share of their total budgets allocated through weighted student funding systems, how base amounts are defined, and the weights assigned to various categories of students. She also noted that almost all of the LEAs in their study continue to use average salaries in their budgeting rather than actual personnel expenditures. The remainder of this report focuses on the new authority for flexible per-pupil spending made available under ESEA Title I-E. The discussion begins with an examination of the Title I-E statutory requirements and implementation of that authority. This is followed by an analysis of how these requirements may interact with ESEA programmatic requirements for several programs, with a focus on interactions with the Title I-A program. The report concludes with discussion of possible issues related to the Title I-E authority. This section discusses the requirements related to the Title I-E authority. All of the statutory provisions are included in ESEA, Section 1501. The purpose of the Title I-E authority is to provide LEAs with flexibility to consolidate eligible federal funds with state and local funding to create a \"single school funding system based on weighted per-pupil allocations for low-income and otherwise disadvantaged students.\" Once consolidated in a participating LEA's weighted student funding system, the eligible federal funds are treated the same way as the state and local funds. There are no required uses associated with the eligible federal funds provided that the expenditures are \"reasonable and necessary\" and the purposes of the eligible federal programs for which funds have been consolidated are met. Eligible federal funds that may be consolidated under the Title I-E authority include ESEA funds received by LEAs under the programs listed below. Programs that provide formula grant funding to LEAs directly or via the state educational agency (SEA) are denoted by an asterisk. Title I-A* Migrant Education (Title I-C) Neglected and Delinquent (Title I-D-2)* Supporting Effective Instruction (Title II-A)* Teacher and School Leader Incentive Program (Title II-B-1) Comprehensive Literacy State Development Grants (Title II-B-2) Innovative Approaches to Literacy (Title II-B-2) School Leader Recruitment and Support (Title II, Section 2243) English Language Acquisition (Title III)* Student Support and Academic Enrichment (Title IV-A)* Small, Rural School Achievement Program (Title V-B-1)* Rural and Low-Income School Program (Title V-B-2)* In general, a participating LEA may use the consolidated federal funds without having to meet the specific requirements of each of the programs whose funds were consolidated provided the LEA is able to demonstrate the funds allocated through its weighted student funding systems address the purposes of each of the federal programs. For example, under the Student Support and Academic Enrichment (SSAE) grant program, LEAs must use funds for well-rounded education, safe and healthy students, and technology purposes. If SSAE funds were consolidated with state and local funds under a weighted student funding system, then the participating LEA would have to demonstrate that the activities being implemented in its schools meet these purposes. However, the LEA would not have to meet SSAE grant requirements about how much funding was used for each purpose. If a participating LEA consolidates funds from an eligible federal program that provides competitive grants to LEAs into its weighted student funding system, it is still required to carry out the scope and objectives, at a minimum, as described in the LEA's approved application. The majority of federal funds available for LEAs to use under the Title I-E authority are provided through formula grants. LEAs applying for funding flexibility under Title I-E are not required to include funds from every eligible federal program in their weighted student funding systems. If a participating LEA opts not to include some of the eligible federal funds in its system, all current statutory and regulatory requirements will continue to apply to those funds. It should be noted that no non-ESEA funds, such as those available under the Individuals with Disabilities Education Act (IDEA) or Perkins Career and Technical Education (CTE) Act, are considered eligible federal funds for the purposes of the Title I-E authority. Under the authority granted under Title I-E, the Secretary may enter into a local flexibility demonstration agreement for up to three years with an LEA that is selected to participate and meets the required terms of the agreement (hereinafter referred to as a participating LEA). A participating LEA may consolidate and use funds as stated in the agreement to develop and implement a school funding system based on weighted student funding allocations for low-income and otherwise disadvantaged students. Except as discussed below, the Secretary is authorized in entering into these agreements to waive any ESEA provision that would prevent a participating LEA from using eligible federal funds in its weighted student funding system, including Title I-A requirements regarding the allocation of Title I-A funds to public schools (Section 1113(c)). Thus, the waiver authority granted to the Secretary for the purposes of Title I-E is broader than the general waiver authority available under Section 8401. Under the latter, the Secretary is prohibited from waiving provisions such as the allocation or distribution of funds to grantees. However, there are several statutory requirements that participating LEAs must agree to continue to meet. For example, each participating LEA must agree to meet the three Title I-A fiscal accountability requirements in Section 1118, which include maintenance of effort (Section 1118(a)), supplement, not supplant (Section 1118(b)), and comparability (Section 1118(c)). The maintenance of effort provision requires LEA expenditures of state and local funds to be at least 90% of what they were for the second preceding fiscal year for public elementary and secondary education. The use of either a weighted student funding system or a traditional funding system should not directly affect the amount of state and local funds spent on public education, so the use of a weighted student funding system does not present any problems with meeting this requirement. The supplement, not supplant provision requires that Title I-A funds be used so as to supplement and not supplant state and local funds that would otherwise be provided to Title I-A schools. According to ED, an LEA may presume that this requirement has been met if the LEA \"implements its system so that the State and local funds that are included in the system include the funds that Title I, Part A schools would have received if they were not Title I, Part A schools.\" Comparability requires that a comparable level of services be provided with state and local funds in Title I-A schools compared with non-Title I-A schools prior to the receipt of Title I-A funds. Many LEAs currently meet this provision using a pupil-teacher ratio to compare Title I-A and non-Title I-A schools. It is possible that they may not be able to continue to use this method under a weighted student funding system. According to ED, if an LEA demonstrates comparability based on the state and local funds received by each Title I-A school compared to non-Title I-A schools through an equitable funding system, the LEA's weighted student funding system would \"constitute per se comparability.\" Therefore, according to ED, an LEA might find it \"advantageous to demonstrate comparability based on funds rather than a staff-student ratio.\" The identification of public schools for purposes of the supplement, not supplant and comparability fiscal accountability provisions requires the identification of public schools as Title I-A schools and their Title I-A funding levels under the current structure of the program. Thus, Title I-A provisions that require LEAs to determine which public schools would receive Title I-A funds and the amount that each school would receive cannot be waived by the Secretary, even though funds would not be distributed based on these determinations if an LEA chose to include Title I-A funds in its weighted student funding system. However, as previously mentioned, an LEA does not have to distribute Title I-A funds based on the current distribution requirements if the LEA includes Title I-A funds in its weighted student funding system. In addition to meeting Title I-A fiscal accountability requirements and provisions related to the identification of Title I-A schools and their Title I-A funding levels, participating LEAs must continue to meet Title I-A program requirements related to the participation of eligible children enrolled in private schools as well as the Section 8501 requirements related to the participation of children enrolled in private schools in other ESEA programs. Prior to allocating funds through its weighted student funding system, each participating LEA must determine the amount of funds from each eligible federal program whose funds have been consolidated that must be reserved to provide equitable services under that program. For example, under Title I-A a participating LEA must still determine the amount of funding that would have been provided to a public school attendance area if the LEA was allocating Title I-A funds in accordance with Section 1113(c). Based on this funding level, the LEA must determine how much Title I-A funding needs to be reserved for serving eligible private school students. The participating LEA must then follow current procedures with respect to consulting with private school officials and providing needed services under each program to eligible private school students. Remaining Title I-A funds not reserved at the LEA level would be distributed through the LEA's weighted student funding formula. Participating LEAs are also required to meet all applicable federal civil rights laws (e.g., Title VI of the Civil Rights Act) and all IDEA requirements. These requirements may not be waived by the Secretary. In addition to the requirements in statutory language, there are several other requirements that the Secretary has determined cannot be waived. For example, participating LEAs must continue to meet state-level requirements, such as implementing state academic standards, administering annual state assessments, meeting educational accountability requirements, and issuing an annual local report card, including reporting per-pupil expenditures by school. In addition, state-level requirements delegated by a state to an LEA as part of a subgrant agreement cannot be waived. For example, if a participating LEA is delegated state responsibilities for identifying migratory children and transferring student records, these responsibilities must be met. The Secretary has also determined that a participating LEA that has schools identified for comprehensive or targeted support and improvement under Section 1111 must ensure that such schools develop and implement improvement plans. If a participating LEA chooses to offer public school choice as an intervention in schools identified for comprehensive support and improvement, however, the LEA would no longer be subject to the limitation on funding for transportation. A participating LEA is also required to continue addressing the disparities that result in low-income and minority students in Title I-A schools being taught at higher rates than other students by inexperienced, ineffective, or out-of-field teachers. The Secretary has also noted that a participating LEA may have to meet additional ESEA requirements to ensure that it is meeting the purpose of each eligible federal program included in its weighted student funding system. The Secretary is permitted to enter into local flexibility demonstration agreements with up to 50 LEAs having approved applications through the 2018-2019 school year. Each interested LEA must do three things to be selected: 1. submit a proposed local flexibility demonstration agreement in accordance with the requirements of Section 1501, 2. demonstrate that the submitted agreement meets all statutory requirements, and 3. agree to meet the continued demonstration requirements included in Section 1501. Beginning with the 2019-2020 school year, the Secretary is permitted to extend the funding flexibility to any LEA that submits and has approved an application that meets the required terms that apply to local flexibility demonstration agreements provided that a \"substantial majority\" of LEAs that entered into agreements meet two sets of requirements as of the end of the 2018-2019 school year. First, they must meet the requirements for the weighted student funding system included in Section 1501 (discussed below). Second, they must demonstrate annually to the Secretary that compared to the previous fiscal year, no high-poverty school served by the LEA received less per-pupil funding for low-income students or less per-pupil funding for English learners. A high-poverty school is defined as a school in the highest two quartiles of schools served by the LEA based on the enrollment of students from low-income families. As will be discussed in subsequent sections, six LEAs applied for Title I-E authority, and one LEA, Puerto Rico, was approved to implement a local flexibility demonstration agreement for the 2018-2019 school year, but it will not implement the funding flexibility until the 2019-2020 school year. Thus, no LEAs will have implemented weighted student funding systems under Title I-E prior to the 2019-2020 school year. LEAs interested in entering into a local flexibility demonstration agreement to consolidate eligible federal funds with state and local funds in a weighted student funding system must submit an application to the Secretary. To assist in the review of applications, the Secretary may establish a peer review process. The application must include a description of the LEA's weighted student funding system, including the weights that will be used to allocate funds. It must also include information about the LEA's legal authority to use state and local funds in the system. The application must address the specific system requirements included in Section 1501 (discussed below) and discuss how the system will support the academic achievement of students, including low-income students, the lowest-achieving students, ELs, and students with disabilities. The application must detail the funding sources, including eligible federal funds and state and local funds, that will be included in the weighted student funding system. The LEA must provide a description of the amount and percentage of total LEA funding (eligible federal funds, state funds, and local funds) that will be allocated through the system. The application must also state the per-pupil expenditures of state and local education funds for each school served by the LEA for the previous fiscal year. In making this determination, the LEA is required to base the per-pupil expenditures calculation on actual personnel expenditures, including staff salary differentials for years of employment, and actual nonpersonnel expenditures. The LEA must also provide the per-pupil amount of eligible federal funds that each school served by the agency received in the preceding fiscal year, disaggregated by the programs supported by the eligible federal funds. The application must include a description of how the system will ensure that for any eligible federal funds allocated through it, the purposes of the federal programs will be met, including serving students from low-income families, ELs, migratory children, and children who are neglected, delinquent, or at risk, as applicable. An LEA is required to provide several assurances in its application. First, it must provide an assurance that it has developed and will implement the local flexibility demonstration agreement in consultation with various stakeholders including teachers, principals, other school leaders, administrators of federal programs affected by the agreement, and community leaders. Second, it must provide an assurance that it will use fiscal controls and sound accounting procedures to ensure that the eligible federal funds included in the weighted student funding system are properly disbursed and accounted for. Third, as previously discussed, it must agree to continue to meet the requirements of ESEA Sections 1117, 1118, and 8501. Finally, it must provide an assurance that it will meet the requirements of all applicable federal civil rights laws (e.g., Title VI of the Civil Rights Act) when implementing its agreement and consolidating and using funds under that agreement. In order to enter into a local flexibility demonstration agreement, each LEA must have a weighted student funding system that meets specific requirements. The system must allocate a \"significant portion of funds,\" including eligible federal funds and state and local funds, to the school level based on the number of students in a school and an LEA-developed formula that determines per-pupil weighted amounts. The system must also allocate to schools a \"significant percentage\" of all of the LEA's eligible federal funds and state and local funds. The percentage must be agreed upon during the application process, and must be sufficient to carry out the purpose of the agreement and meet its terms. In addition, the LEA must demonstrate that the percentage of eligible federal funds and state and local funds that are not allocated through the LEA's system does not undermine or conflict with the requirements of the agreement. The LEA's weighted student funding system must use weights or allocation amounts that provide \"substantially more funding\" than is allocated to other students to ELs, students from low-income families, and students with any other characteristic related to educational disadvantage that is selected by the LEA. The system must also ensure that each high-poverty school receives in the first year of the agreement more per-pupil funding from federal, state, and local sources for low-income students than was received for low-income students from in the year prior to entering into an agreement and at least as much per-pupil funding from federal, state, and local sources for ELs as was received for ELs in the year prior to entering into an agreement. The system must include all school-level actual personnel expenditures for instructional staff, including staff salary differentials for years of employment, and actual nonpersonnel expenditures in the LEA's calculation of eligible federal funds and state and local funds to be allocated to the school level. After funds are allocated to schools through the weighted student funding formula, the LEA is required to determine or \"charge\" each school for the per-pupil expenditures of eligible federal funds and state and local funds. This determination must include actual personnel expenditures, including staff salary differentials for years of employment, for instructional staff and actual nonpersonnel expenditures. By charging schools based on actual costs, an LEA can ensure that schools do not receive less funding than the weighted student funding system would indicate the school should receive, even if it has lower actual expenditures in some categories compared to the LEA average. , Finally, as discussed by ED, LEAs entering into a local flexibility demonstration agreement must agree to cooperate with ED in monitoring and technical assistance activities. They must also collect and report information that the \"Secretary may reasonably require\" in order to conduct the program evaluation discussed below. Each participating LEA must demonstrate to the Secretary on an annual basis that, as compared to the previous year, no high-poverty school served by the LEA received (1) less per-pupil funding for low-income students or (2) less per-pupil funding for ELs from eligible federal funds and state and local funds. On an annual basis, each participating LEA is also required to make public and report to the Secretary for the preceding fiscal year the per-pupil expenditures of eligible federal funds and state and local funds for each school served by the LEA, disaggregated by each quartile of students attending the school based on student level of poverty and by each major racial/ethnic group. Per-pupil expenditure data must include actual personnel expenditures, including staff salary differentials for years of employment, and actual nonpersonnel expenditures. Each year, the participating LEA must also make public the total number of students enrolled in each school served by the agency and the number of students enrolled in each school disaggregated by economically disadvantaged students, students from major racial/ethnic groups, children with disabilities, and ELs. Any information reported or made public by the participating LEA to comply with these requirements shall only be reported or made public if it does not reveal personally identifiable information. The Secretary is authorized to renew local flexibility demonstration agreements for additional three-year terms if the participating LEA (1) has met the requirements for weighted student funding systems and the continued demonstration requirements and (2) has a \"high likelihood\" of continuing to meet these requirements. The Secretary must also determine that renewing the agreement is in the interest of students served by programs authorized under Title I and Title III of the ESEA. After providing notice and opportunity for a hearing, the Secretary may terminate a local flexibility demonstration agreement if there is evidence that the LEA has failed to comply with the terms of the agreement, the requirements of the system, and continued demonstration requirements. If the LEA believes the Secretary has erred in making this determination for statistical or other substantive reasons, it may provide additional evidence that the Secretary shall consider before making a final determination. From the amount reserved for evaluation under Section 8601, the Secretary, acting through the Director of the Institute of Education Sciences, shall consult with the relevant program office at ED to evaluate the implementation of local flexibility demonstration agreements and their effect on improving the equitable distribution of state and local funding and increasing student achievement. The statutory language does not require an evaluation of the distribution of eligible federal funds. Each participating LEA may use for administrative purposes an amount of eligible federal funds that is not more than the percentage of funds allowed for such purposes under each eligible federal program. On February 2, 2018, the Secretary announced that she was using the authority made available under Title I-E to launch a Student-Centered Funding Pilot. LEAs interested in using the flexibility for the 2018-2019 school year were required to submit an application by March 12, 2018. LEAs interested in using the flexibility for the 2019-2020 school year had to apply by July 15, 2018. Five LEAs submitted applications for the local flexibility demonstration agreement by March 12, 2018: Wilsona School District (CA), Indianapolis Public Schools (IN), Salem-Keizer School District 24J (OR), Upper Adams School District (PA), and the Puerto Rico Department of Education. Puerto Rico's application was approved on June 28, 2018. While Puerto Rico initially intended to implement a weighted student funding system that consolidated eligible federal funds with state and local funds during the 2018-2019 school year, its implementation has been delayed until the 2019-2020 school year. As of July 2019, none of the other applicants have had their applications approved. Only the Roosevelt School District in Arizona applied by the July deadline to use the flexibility for the 2019-2020 school year. As of July 2019, its application had not yet been approved. This section provides an overview of ED's budget requests for FY2018 through FY2020 as they relate to the Title I-E authority. In its FY2018 budget request, ED requested that it be permitted to use up to $1 billion of Title I-A funding to support weighted student funding systems and public school choice. The funds would have been used to make Furthering Options for Children to Unlock Success (FOCUS) grants. One use of the FOCUS grant funds would have been to support LEAs in establishing or expanding weighted student funding systems if they agreed to combine their funding flexibility with an open enrollment policy for public school choice. ED proposed that it would establish the requirements for such open enrollment systems with a focus on \"maximizing opportunities for all students, particularly those from low-income families, to select, attend, and succeed in a high-quality public school.\" The proposal suggested that the requirements could include, for example, making school information available to parents in a timely way, supporting school integration efforts, arranging or paying for transportation to schools of choice, and giving priority to low-income students or students in schools identified for improvement under Title I-A. ED also proposed allowing participating LEAs to use the funds to provide temporary payments to individual schools affected by the transition to a weighted funding system. In addition, the proposal included an option for ED to establish \"tiers based on LEA student enrollments\" and give special consideration to LEAs proposing to serve at least one rural school or to consortia of LEAs that agreed to provide interdistrict choice for all students. Implementing this proposal would have required congressional authorization, and Congress did not act on ED's request. In its FY2019 budget request, ED requested funding to make Open Enrollment Grants (OEGs) to LEAs approved to operate Flexibility for Equitable Per-Pupil Funding pilots authorized under Title I-E that agreed to combine their funding flexibility with an open enrollment policy for public school choice. Similar to its FY2018 budget request, ED proposed that it would establish the requirements for such open enrollment systems with a focus on \"maximizing opportunities for all students, particularly those from low-income families, to select, attend, and succeed in a high-quality public school.\" The proposal again suggested that the requirements could include, for example, making school information available to parents in a timely way, supporting school integration efforts, arranging or paying for transportation to schools of choice, and giving priority to low-income students or students in schools identified for improvement under Title I-A. ED also proposed allowing participating LEAs to use the funds to provide temporary payments to individual schools affected by the transition to a weighted funding system, providing information on public school options to parents, and supporting needed administrative systems. ED did not request a specific amount of funding for only the OEGs. Rather, it requested $500 million for Scholarships for Private Schools and OEGs to be divided between the programs based on the demand for grants. Implementing either program would have required congressional authorization, and Congress did not act on ED's proposal. In its FY2020 budget request, ED requested $50 million to create Student-Centered Funding Incentive Grants to help increase LEA participation in the agreements authorized under ESEA Section 1501. These grants are not authorized in the ESEA and congressional action would be required to implement the proposal. In its proposal, ED argues that the new grants \"would help demonstrate the viability\" of moving to weighted student funding systems and the potential for these new systems to improve student outcomes while reducing \"LEA red tape.\" ED believes that the proposed grants could help increase participation by providing resources to LEAs to develop procedures to charge schools based on actual (as opposed to average) personnel expenditures and could reduce the potential negative effects on some individual schools of transitioning to a weighted student funding system under Title I-E. The grants would only be available to LEAs that have already been approved for an agreement. ED estimates that up to 10 LEAs could be supported through the grants and suggests that it could give \"special consideration\" to LEAs with the highest concentration of poverty. The funds could be used by participating LEAs for activities related to implementing weighted student funding systems. According to ED, this could include using funds to make temporary payments to individual schools to offset reductions in funding resulting from the transition to the system, allowing a \"smooth transition to these new systems.\" Grant funds could also be used by ED to provide technical assistance to LEAs in developing and preparing for the implementation of weighted student funding systems that meet the requirements of Section 1501. In its proposal, ED also mentions that it may consider using existing authority to extend the initial local flexibility demonstration agreement period from three years to six years to help increase LEA participation. Regardless of whether Congress acts on ED's proposal to provide Student-Centered Funding Incentive Grants, LEAs that enter into an agreement are currently permitted to use administrative funds consolidated under Section 8203 to support the implementation of their weighted student funding system. This section discusses some of the ways in which the Title I-E authority might interact with other ESEA programs. As Title I-A is the only ESEA program that includes specific requirements for the allocation of funds to schools within LEAs, it is the primary focus of the discussion. Under Title I-E, participating LEAs may consolidate and allocate eligible federal funds to public schools through their weighted student funding formulas. Table 1 details the amount of funding appropriated under each eligible federal program for FY2019. The majority of the funding available for consolidation and allocation under the Title I-E authority is provided through formula grants. These grants are either provided directly to LEAs or, in most cases, to LEAs via the state. Most of the attention regarding the possible impact of the weighted student funding authority has been focused on the ESEA Title I-A program. In addition to constituting about 76% of the total FY2019 appropriations for all programs potentially affected by the Title I-E authority ( Table 1 ), it is the only one of the potentially affected federal programs under which most funds are allocated to individual schools under statutory school allocation policies, and therefore the only program where current policies for the allocation of funds to schools can be compared to how funds might be allocated to schools under the weighted student funding authority. The other potentially affected federal programs are either much less focused on individual schools (as opposed to being centrally managed by LEAs), are much less widespread in their distribution of funds among LEAs, and/or are focused largely on SEAs rather than LEAs or schools. Thus, in most cases, ESEA Title I-A funds are likely to be the primary federal program funds directly affected by the ESEA Title I-E authority in most participating LEAs. It is possible, however, depending on which eligible federal funds and the percentage of such funds an LEA decides to include in its weighting student funding system, that the distribution of funds under other ESEA programs that have funds eligible for consolidation could change substantially. As is explained below, the allocation of Title I-A funds within LEAs is focused on providing grants to schools with comparatively high concentrations of students from low-income families, not individual students. Thus, the authority under ESEA Title I-E to combine Title I-A funds with state and local funds under weighted student funding formulas and to have the Title I-A funds follow students to any public school in the LEA, not just those with concentrations of students from low-income families, is a significant shift from the way the program is generally implemented. Under almost all federal education assistance programs, grants are made to states or to LEAs (or subgranted to LEAs by SEAs) with services or resources provided in a manner that is managed by the SEA or LEA. In sharp contrast to this general pattern, most ESEA Title I-A funds are allocated to individual schools, under statutory allocation provisions, although LEAs retain substantial discretion to control the use of a share of Title I-A grants at a central district level. While there are several rules related to school selection, LEAs must generally rank public schools by their percentage of pupils from low-income families, and serve them in rank order. LEAs may choose to consider only schools serving selected grade levels (e.g., only elementary schools or only middle schools) in determining eligibility for grants, so long as all public schools where more than 75% of the pupils from low-income families receive grants (if sufficient funds are available to serve all such schools). LEAs also have the option of serving all high schools where more than 50% of the pupils are from low-income families before choosing to serve schools at selected grade levels. All participating schools must generally have a percentage of children from low-income families that is higher than the LEA's average, or 35%, whichever of these two figures is lower. The percentage of students from low-income families for each public school is usually measured directly, although LEAs may choose to measure it indirectly for middle or high schools based on the measured percentages for the elementary or middle schools that students attended previously (sometimes called \"feeder schools\"). LEAs have the option of setting school eligibility thresholds higher than the minimum in order to concentrate available funds on a smaller number of schools, and this is especially the practice in some large urban LEAs. For example, according to data available from ED, in the 2015-16 school year all public schools reported as participating in Title I-A in Chicago had a free and reduced-price lunch child percentage of 55% or higher, whereas the minimum eligibility threshold would generally be 35%. In almost all cases, the data used to determine which pupils are from low-income families for the distribution of Title I-A funds to schools are not the same as those used to estimate the number of school-age children in low-income families for purposes of calculating Title I-A allocations to states and LEAs. This is because Census or other data are generally not available on the number of school-age children enrolled in a school, or living in a residential school attendance zone, with income below the standard federal poverty threshold. Thus, LEAs must use available proxies for low-income status. The Title I-A statute allows LEAs to use the following low-income measures for school selection and allocations: (1) eligibility for free and reduced-price school lunches under the federal child nutrition programs, (2) eligibility for Temporary Assistance for Needy Families (TANF), (3) eligibility for Medicaid, or (4) Census poverty estimates (in the rare instances where such estimates may be available for individual schools or school attendance areas). According to the most recent relevant data, approximately 90% of LEAs receiving Title I-A funds use free/reduced-price school lunch (FRPL) dataâsometimes alone, sometimes in combination with other authorized criteriaâto select Title I-A schools and allocate funds among them. The income eligibility thresholds for free and reduced-price lunchesâ130% of the poverty income threshold for free lunches, and 185% of poverty for reduced-price lunchesâare higher than the poverty levels used in the Title I-A allocation formulas to states and LEAs. For example, for a family of four people during the 2018-2019 school year, the income threshold for eligibility was $32,630 for free lunches and $46,435 for reduced price lunches. By contrast, the poverty threshold for a family of four people in 2018 was $25,100. While Title I-A funds are to be focused on the schools within a recipient LEA with percentages of students from low-income families that are relatively high in the context of their locality, many Title I-A schools do not have high percentages of low-income students when considered from a national perspective. Largely because of the relatively low poverty rate thresholds for LEA eligibility to receive Title I-A grants, many low-poverty LEAs receive Title I-A funds, and often the highest-poverty schools in those LEAs do not have high percentages of students from low-income families compared to the nation as a whole. For example, according to ED, 23% of the nation's public schools that are in the lowest quartile nationwide in terms of their percentage of students from low-income families (35% or below) receive Title I-A grants. Title I-A funds are allocated among participating schools in proportion to their number of pupils from low-income families, although grants to eligible schools per pupil from a low-income family need not be equal for all schools. LEAs may choose to provide higher grants per child from a low-income family to schools with higher percentages of such pupils. A Title I-A school at which 40% or more of the students are from low-income families may provide Title I-A services via a schoolwide program, under which all of the students at the school may be served. This is in contrast to the other mode of providing Title I-A servicesâvia targeted assistance schoolsâwherein Title I-A may be used only for services directed to the lowest-achieving students at the schools. The share of funds to be used by each Title I-A LEA to serve educationally disadvantaged pupils attending private schools is determined on the basis of the number of private school students from low-income families living in the residential areas served by public schools selected to receive Title I-A grants. In making this determination, LEAs may use either the same source of data used to select and allocate funds among public schools (i.e., usually FRPL data) or one of a specified range of alternatives. As noted earlier, the allocation of Title I-A funds within LEAs is focused on providing grants to schools with comparatively high concentrations of students from low-income families, not individual students. One rationale for the strategy of concentrating Title I-A funds on relatively high poverty schools is that the level of funding for each participating student is relatively low and can finance a substantial level of services only if combined with Title I-A funding for numerous eligible students in a school. Title I-A funding per student is usually discussed in terms of grant amounts per student served under the program. Especially with the growth of schoolwide programs in recent years, the amount of funding per student deemed to be participating in the program (which includes all students in schoolwide program sites) would be estimated at $645. Even this amount, which is based on dividing the total FY2019 Title I-A appropriation ($15,859,802,000) by the latest published estimate of the number of students participating in Title I-A programs (24.6 million), would be an overestimate, as it does not take into account the share of Title I-A funds that do not reach individual schools because they are used at the state or LEA level for activities such as administration, school improvement, and districtwide programs (e.g., professional development for Title I-A teachers). However, under weighted student funding the more relevant figure would be the level of funding per student from a low-income family. If the standard of low-income most often applied in the current Title I-A school allocation process were used, the number of public school students from low-income families would be slightly higher (25.8 million) and the national average Title I-A grant per pupil from a low-income family would be $614. For the reasons just discussed (i.e., not accounting for funds retained at the state or LEA level), this would also be an overestimate of the amount of funding per student. Beyond the primary focus on the ESEA Title I-A program, it is possible that LEAs participating in the weighted student funding authority would include funds from at least some of the other potentially affected programs. For example, the one currently approved applicant for the ESEA Title I-E authority, Puerto Rico, plans to allocate 53% of its Title I-A funds plus 55% of its Title II-A and 92% of its Title III-A funds to schools through its weighted student funding formula. Thus, in participating LEAs, at least some federal programs that are currently centrally managed by LEAs may be decentralized and managed, at least in part, by individual schools. The extent to which this occurs may depend on the percentage of funds of an eligible federal program that are allocated through the LEA's weighted student funding formula as opposed to being retained at the state or LEA level. The last section of the report examines issues related to the Title I-E flexibility authority. The first set of issues examines possible reasons why participation by LEAs in the Title I-E authority has been low and some potential issues related to it. It then considers why LEAs might want to participate in the Title I-E authority based on reasons stated by ED. This is followed by an examination of possible issues that may arise if participation in the Title I-E authority increases. This includes consideration of how the allocation of eligible federal funds, particularly Title I-A funds, could be different if the Title I-E flexibility was adopted more broadly, as well as LEA access to other fund consolidation authority, whether the use of the Title I-E authority could increase the extent to which federal programs are focused on individual schools, whether the Title I-E authority could represent a model for a major change in the distribution of ESEA funds, and whether adequate safeguards exist to ensure that the purposes of federal education programs whose funds are consolidated are met. As of July 2019, six LEAs have applied for the weighted student funding authority under Title I-E, and one has been approved. The single approved LEA, Puerto Rico, intends to implement the authority beginning in the 2019-2020 school year. One reason for the low rate of participation could be the relatively slow implementation by ED. The authority was provided under the ESSA's amendments to the ESEA, enacted on December 10, 2015. However, ED's initial announcement that the flexibility authority was available was made more than two years later, on February 2, 2018. LEA interest, to the extent that it existed, may have waned over this time period. Another possible constraint on LEA interest in applying for the Title I-E authority is that the authority is applicable for only a three-year period. While potentially renewable, and while such a time limitation may be typical and appropriate for a pilot authority, LEAs may be hesitant to make major changes to, or new investments in, their school finance system or administration of Title I-A and other federal programs for such a limited time period. While it is not a requirement that an LEA already be implementing a weighted student funding system in order to participate in Title I-E, the number of LEAs that have already adopted weighted student funding for their state and local funds, and would therefore be interested in expanding those systems to include a number of federal programs, may be limited. There is no definitive, comprehensive listing of LEAs currently using weighted student funding formulas. While a number of relatively large urban LEAs are doing so, the total number of such LEAs may still be rather small, limiting the number of likely and eligible applicants for the federal weighted student funding authority. Potential applicants may be deterred by the limitations to the federal weighted student funding authority. While state- and LEA-level weighted student funding formulas often include state and local funding for students with disabilities and career and technical education programs, the Title I-E authority does not apply to funds under IDEA or the Perkins CTE Act. While it might seem most appropriate for an ESEA flexibility provision to apply only to ESEA programs, and while the IDEA and the Perkins CTE Act involve somewhat different constituencies and interest groups than the ESEA, the Title I-E flexibility authority might be more consistent with many state and local weighted student funding policies, and offer enhanced flexibility to participating LEAs, if it included at least some of the IDEA and Perkins CTE Act funding streams. In addition, as discussed below, schools operating schoolwide programs under Title I-A are already permitted to consolidate federal funds provided through non-ESEA programs (e.g., IDEA and Perkins CTE Act funds) with their state and local funds. It is also possible that LEAs have been deterred by the Title I-E requirement that weighted student funding systems must use actual personnel expenditures, including staff salary differentials for years of employment, in their systems. Based on the preliminary results of an ongoing study on the use of weighted student funding systems in LEAs, most of the LEAs in the study have continued to use average staff salaries, rather than actual personnel expenditures, in their weighted student funding systems. In addition, while many requirements under ESEA Title I-A and other ESEA programs are waived in LEAs receiving the weighted student funding flexibility authority, a number of others (e.g., those involving fiscal and academic outcome accountability) remain in effect. This may cause potential-applicant LEAs to determine that the possible reduction in administrative burdens (e.g., from having to track the use of some federal funds, or to allocate them among schools as they have in the past) is not sufficient for them to be motivated to apply. If an LEA enters into a local flexibility demonstration agreement, the resulting distribution of state, local, and eligible federal funds under a weighted student funding system that meets the Title I-E requirements could lead to funds shifting among public schools in the LEA. While this may result in public schools serving low-income students, ELs, and other disadvantaged students receiving an increase in funding, it is possible that other public schools may lose funds, possibly a substantial amount or percentage of their current funding. Decreases in funding levels in the course of one school year could potentially be difficult for an individual school to absorb. Without state, local, or federal funds to help ease the transition to a weighted funding system, it is possible that some LEAs may be hesitant to apply to enter into an agreement. Under current law, the Title I-E authority for the Secretary does not include any federal funds to implement local flexibility demonstration agreements or offset the loss of funds in public schools as LEAs implement weighted student funding systems under an agreement. In its budget requests, ED has proposed providing grants to LEAs implementing a local flexibility demonstration agreement for these purposes (see previous discussion of FY2018, FY2019, and FY2020 budget requests), but no such funds have yet been appropriated. The delay in implementation of the Title I-E authority by the Secretary complicates the schedule envisioned in the Title I-E legislation regarding expansion of eligibility for weighted student funding flexibility to potentially all LEAs. Eligibility for the weighted student funding authority was limited to no more than 50 LEAs for school years preceding 2019-2020. But the statute provides that eligibility may be expanded to any LEA beginning with the 2019-2020 school year, as long as a \"substantial majority\" of the LEAs participating in previous years have met program requirements. However, no LEA will actually begin implementing the Title I-E flexibility authority until the 2019-2020 school year. Thus, a key requirement for program expansion cannot be met. It is unclear how this would be resolved moving forward should additional LEAs express interest in applying for the Title I-E authority. Given the relatively low level of LEA interest in the flexibility offered by Title I-E, there are questions about why an LEA would want to enter into a local flexibility demonstration agreement. In a document titled \"Why should your school district apply for the Student-centered Funding pilot?,\" ED outlined several opportunities that, in its opinion, would be advanced for LEAs that implement the ESEA Title I-E authority. ED states that participating LEAs would have greater flexibility in the use of the affected federal education program funds, because those federal funds could be used in the same manner as state and local funds, with no specifically required or prohibited uses. LEAs would be able to set their own priorities for these funds. ED further states that participating LEAs would experience reduced administrative burdens, because federal funds under the affected programs would not have to be tracked separately. By combining state, local, and federal funds, participating LEAs could prioritize funding for groups of students with particular needs by developing or expanding a weighted student funding system. ED also notes that participating in the Title I-E authority would enhance transparency in the allocation of resources within LEAs and facilitate the involvement of school-level leaders in resource allocation. In addition, advocates of weighted student funding policies in general often argue that they enhance options for student mobility and choice among public schools in an LEA, support school-based management practices, and may increase the targeting of total (local, state and federal) funds on schools attended by disadvantaged students. The ED document specifically compares the weighted student funding authority to the schoolwide program authority provided under ESEA Title I-A. The document states that the weighted student funding authority is more expansive than the schoolwide program authority, as it would be available to all public schools within the LEA. (For more information about differences between the Title I-E authority and schoolwide program authority to consolidate federal funds, see the next \"issue\" discussion.) These views of ED and of advocates of weighted student funding may be countered by other views of, or concerns about, the weighted student funding authority, as discussed elsewhere in the \"Issues\" section of this report. Title I-A schools that are operating schoolwide programs already have the authority to consolidate their federal, state, and local funds without having to create a weighted student funding system. However, there are several differences between the funding consolidation authority available to Title I-A schools operating schoolwide programs under Section 1114 and the funding consolidation authority available under Title I-E. The authority to consolidate funds under schoolwide programs is only available to Title I-A schools operating those programs (as opposed to operating targeted assistance programs). Schools operating schoolwide programs have the choice of whether to consolidate their federal, state, and local funds or not. Under the Title I-E authority, all public schools in an LEA that has entered into a local flexibility demonstration agreement would be required to consolidate state, local, and eligible federal funds. An individual public school would not have a choice about participating in the weighted student funding system. Schools operating schoolwide programs must conduct a comprehensive needs assessment, develop a comprehensive schoolwide plan, annually review the schoolwide plan, and revise the plan as necessary based on student needs. Schools located in an LEA participating in Title I-E are not required to conduct a comprehensive needs assessment or develop and maintain a comprehensive plan. For any funds consolidated by a school or an LEA, respectively, under either a schoolwide program or a local flexibility demonstration agreement, the school or LEA must ensure that it meets the intent and purposes of each federal program whose funds were consolidated. While federal programs eligible for consolidation under the Title I-E authority are limited to selected ESEA programs, schools operating schoolwide programs have the flexibility to consolidate funds from ESEA programs as well as non-ESEA programs, such as the IDEA and Perkins Act, provided certain requirements are met. Federal funds consolidated under either a schoolwide program or the Title I-E authority are subject to supplement, not supplant requirements. Title I-A is the only one of the potentially affected federal programs that currently has school-level allocation requirements. It currently is primarily a \"school-based\" program, with funds targeted on the specific schools in each LEA with relatively high concentrations of students from low-income families. In sharp contrast, under the Title I-E flexibility authority Title I-A funds in a participating LEA would be provided to any public school in the LEA that enrolls even one student from a low-income family. While it is not possible precisely to compare the current allocation of Title I-A funds to schools to how they might be allocated under the weighted student funding authority, there would be a distinct contrast in general strategy between the two sets of allocation policies. The Title I-A program structure is based implicitly on the assumption, and the findings of past studies, that the relationship between poverty and low achievement is not especially strong for individual pupils, but the correlation between concentrations of poverty and concentrations of low-achieving pupils is quite high. According to proponents of the current structure of Title I-A, this implies that limited Title I-A funds should be concentrated on the highest-poverty schools if they are to address the greatest pupil needs. In addition, the level of Title I-A funding per pupil (a maximum of an estimated $645 per pupil served or $614 per pupil from a low-income family, as discussed above) might be sufficient to pay the costs of substantial supplementary educational services only if combined for relatively large numbers of students in a school. Under the Title I-E flexibility authority, while funds would be allocated among these schools in proportion to their number of students from low-income families, the overall distribution of Title I-A funds would almost undoubtedly be more dispersed among more public schools than under current policies. Concerns regarding economies of scale would argue against the dispersal of Title I-A grants among potentially all schools in a locality. As noted, it is possible that the current level of aid per student can provide a significant amount of resources or services only if combined for a substantial number of pupils in a school. While this would not be a concern at public schools that numerous pupils from low-income families choose to attend, it would be an issue at schools that only a few such children choose to attend. However, this concern might be countered by the fact that under a weighted student funding process, not only Title I-A funds but also state and local funds and potentially other eligible federal program funds would be combined and allocated under a formula giving additional weight to students from low-income families. It is also specifically required that the high-poverty schools in a participating LEA receive in the first year of implementation more total funding per pupil from a low-income family (and at least as much per EL) as in the year preceding initial implementation of the flexibility authority, and at least as much in succeeding years. Thus, while Title I-A funds alone would likely be substantially more widely dispersed among schools than they currently are, it is possible that total federal, state, and local funding to relatively high-poverty schools would increase, especially in LEAs that had not previously adopted weighted student funding policies with respect to their state and local funds. It is possible that as a result of the Title I-E flexibility, some eligible federal programs may become more focused on the use of funds at the school level as opposed to the state or LEA level. There is currently limited data on how funds under eligible federal programs are distributed to the school level, if at all. It may be helpful from a data analysis perspective to have comprehensive data on the specific federal education funds provided to each public school to examine whether switching to a weighted student funding system that meets the requirements of Title I-E alters this distribution of funds. Under the ESEA as amended by the ESSA, Title I-A requires participating states to include in school report cards data on expenditures at each public school. The state report card must provide data on LEA- and school-level per-pupil expenditures of federal, state, and local funds, including actual personnel expenditures and actual nonpersonnel expenditures, disaggregated by the source of funds. The data must be reported for every LEA and public school in the state. These data have not been reported for LEAs and public schools in the past. Based on draft guidance issued by ED, SEAs and LEAs may delay reporting per-pupil expenditures until they issue report cards for the 2018-2019 school year. However, if an LEA decides to delay the reporting of per-pupil expenditures, the SEA and its LEAs are required to provide information on their report cards for the 2017-2018 school year about the steps they are taking to provide such information on the 2018-2019 school year report card. While this new reporting requirement does not require schools to disaggregate the receipt of funds under Title I-E eligible federal programs, it will, for the first time, detail the per-pupil expenditure of aggregate federal funds that are allocated or used at the school level. If LEAs participating in the Title I-E authority include Title I-A funds in their agreement, it may be possible to get a sense of whether the allocation of federal funds at individual schools is changing under weighted student funding systems that meet the requirements of Title I-E. In participating LEAs that include Title I-A funds in their weighted student funding systems, Title I-A would be transformed from a \"school-based\" program to an \"individualized grant.\" The Title I-E flexibility authority arguably represents a substantial change in the basic strategy of Title I-A, and to a lesser extent other potentially affected federal education programs. As discussed earlier, from its beginning in 1965 Title I-A has been primarily a school-based program. Funds are to be allocated only to the relatively high-poverty schools in each participating LEA. Within those recipient schools, Title I-A funds are to be used only to serve the lowest-achieving students unless the school meets the 40% low-income threshold, in which case they can be used to serve all students. The level of Title I-A funding per student served is relatively modest, and it is implicitly assumed that such amounts are sufficient to provide substantial services only if combined for relatively large numbers of students from low-income families in a school. Further, there are a number of requirements regarding the authorized uses of Title I-A funds to meet the special educational needs of educationally disadvantaged students in participating schools. The weighted student funding pilot represents a very different approach. First, while academic outcome accountability and civil rights requirements will continue to apply to all public schools in states receiving Title I-A funds, and fiscal accountability requirements will continue to apply to certain \"high-poverty\" schools within LEAs, other requirements for targeting schools or uses of funds will be waived. Administrative burdens would be reduced, but so would a number of potentially important requirements for targeting services on students with the greatest educational needs. Title I-A and other federal program funds would be combined with state and local funds into weighted grant amounts that would be dispersed among all public schools in the LEA, and that would follow students if they transfer among schools in the LEA (though possibly with a time lag). This is a very different approach from traditional Title I-A programs. The \"individualized grant\" approach embodied in the Title I-E authority might serve as a model that could, in the future, be expanded if desired through congressional action to include students attending public schools in other LEAs of the same state, or possibly even eligible students enrolled in private schools. The Title I-E flexibility authority provides for the waiver of a wide range of requirements regarding the allocation of Title I-A funds to schools, and regarding the authorized uses of funds under all of the eligible federal programs. However, participating LEAs must ensure that the purposes of the eligible federal programs included in their weighted student funding systems are met. This may be challenging for participating LEAs, at least initially, as more federal funding from non-Title I-A programs is provided to the school level as opposed to being retained and controlled at the LEA level and as Title I-A funds are potentially used for the first time in schools that had not previously received the funds. CTE: Career and Technical Education ED: U.S. Department of Education EFIG: Education Finance Incentive Grant EL: English Learner ESEA: Elementary and Secondary Education Act ESSA: Every Student Succeeds Act ( P.L. 114-95 ) IDEA: Individuals with Disabilities Education Act LEA: Local educational agency OEG: Open Enrollment Grant SEA: State educational agency SSAE: Student Support and Academic Enrichment grants TANF: Temporary Assistance for Needy Families", "summary": "The Every Student Succeeds Act (ESSA; P.L. 114-95 ) amended the Elementary and Secondary Education Act (ESEA) to add the \"Flexibility for Equitable Per-Pupil Spending\" authority as Title I, Part E. Under Title I-E, the Secretary of Education (the Secretary) has authority to provide local educational agencies (LEAs) with flexibility to consolidate eligible federal funds with state and local funding to create a \"single school funding system based on weighted per-pupil allocations for low-income and otherwise disadvantaged students.\" The Title I-E authority is applicable to LEAs that are implementing \"weighted student funding\" systems to establish budgets for, and allocate funds to, individual public schools. In general, weighted student funding systems base school funding on the number of pupils in each school in specified categories. Under these funding systems, weights are assigned to pupil characteristics that are deemed to be related to the costs of educating such pupilsâsuch as being from a low-income family, being an English Learner (EL), or having a disabilityâand their educational program (such as grade level or career-technical education). Eligible federal funds that may be consolidated in an LEA's weighted student funding system include those available under ESEA Title I-A (Education for the Disadvantaged), Supporting Effective Instruction (Title II-A), English Language Acquisition (Title III-A), and Student Support and Academic Enrichment (Title IV-A). No non-ESEA funds (e.g., funds available under the Individuals with Disabilities Education Act (IDEA) or the Perkins Career and Technical Education (Perkins) Act) may be consolidated. Once eligible federal funds are consolidated in a participating LEA's weighted student funding system, these funds are treated the same way as the state and local funds. LEAs participating in Title I-E must have a funding system that uses weights or allocation amounts that provide \"substantially more funding\" than is allocated to other students to ELs, students from low-income families, and students with any other characteristic related to educational disadvantage that is selected by the LEA. The system must also ensure that each high-poverty school receives in the first year of the local flexibility demonstration agreement more per-pupil funding for low-income students than was received for low-income students from federal, state, and local sources in the year prior to entering into the agreement and at least as much per-pupil funding for ELs as was received for ELs from federal, state, and local sources in the prior year. The weighted student funding system must include all school-level actual personnel expenditures for instructional staff, including staff salary differentials for years of employment, and actual nonpersonnel expenditures in the LEA's calculation of eligible federal funds and state and local funds to be allocated to the school level. The Title I-E authority is limited to 50 LEAs in school years preceding 2019-2020, but could be offered to any LEA from that year onward, if a \"substantial majority\" of the LEAs participating in previous years have met program requirements. In February 2018, the Secretary announced that the U.S. Department of Education (ED) would begin accepting applications from LEAs to enter into agreements under the Student-Centered Funding Pilot, which is how ED refers to the Title I-E authority. To date, only six LEAs have applied for the Title I-E authority, and only Puerto Rico has been approved to enter into an agreement. Puerto Rico will begin implementing the Title I-E flexibility authority during the 2019-2020 school year. Thus, no LEAs will have implemented weighted student funding systems under Title I-E prior to the 2019-2020 school year. While it is unclear why relatively few LEAs have expressed interest in participating in the Title I-E authority, there are several possible explanations, some of which are summarized below: ED did not act to implement the Title I-E authority until February 2018, more than two years after the enactment of the ESSA. Local flexibility demonstration agreements are for a three-year period with a possible renewal. LEAs may not feel that the changes needed to implement the required weighted student funding system are worthwhile for a three-year period without knowing for certain if the authority would be extended. States and LEAs that currently have weighted student funding systems often include funds for students with disabilities and career and technical education in their systems. However, LEAs would be prohibited from consolidating IDEA or Perkins funds under the Title I-E authority. Public schools that operate schoolwide programs under Title I-A already have the authority to consolidate state, local, and certain federal funds, including those available under IDEA or Perkins. There may be concerns that some public schools may lose funds by switching to a weighted student funding system. As the Title I-E authority does not include any funding to ease the transition to the new funding system for schools that may be negatively affected, LEAs may be hesitant to participate. Under the ESEA Title I-A program, which accounts for over 76% of the eligible federal funds under Title I-E, funds have historically been provided to public schools with the highest concentrations of low-income students. Under the Title I-E authority, if an LEA chooses to consolidate its Title I-A funds it is likely that the distribution of Title I-A funds would be more diffuse. It is possible that some LEAs may view the consolidation of federal funds and the resulting redistribution of funds among public schools in the LEA as a step toward the portability of federal funds, whereby funds would be associated with individual students rather than schools and could ultimately follow them to any school of their choosing, including a private school.", "document_type": "crs"}
{"report": "The federal individual income tax is structured so that the poor owe little or no income tax (although they may pay other federal taxes, like payroll taxes as well as state and local taxes). In addition, the federal income tax increases the disposable income of many poor families via refundable tax credits. These tax creditsâprimarily the earned income tax credit (EITC) and the refundable portion of the child tax credit, called the additional child tax credit (ACTC)âincrease the disposable income of many low-income taxpayers who work and have children, and have been shown to reduce poverty. P.L. 115-97 , commonly referred to as the Tax Cuts and Jobs Act (TCJA), made numerous temporary changes to the federal income tax system, including many that affect individuals and families. Preliminary analyses of the TCJA found that the law provides larger benefits to higher-income individuals and families. This report's analyses find that overall the law had a relatively small impact on poverty compared to the pre-TCJA federal individual income tax. Recent tax legislation considered in the 116 th Congressâincluding the Economic Mobility Act of 2019 ( H.R. 3300 ) ordered reported by the House Ways and Means Committee on June 20, 2019âwould target additional tax benefits to lower-income families. H.R. 3300 would temporarily increase the amount of the EITC for \"childless\" workers, allow all eligible taxpayers to receive the full amount of the ACTC, irrespective of a taxpayer's earned income, and make the child and dependent care tax credit refundable. To provide context for the consideration of new tax legislation, this report examines the relationship between the federal individual income tax and poverty. Given some policymakers' continued interest in using the tax system to reduce poverty and boost the incomes of low-income working families with children, understanding the impact of the income tax in reducing povertyâpre- and post-TCJAâmay help inform future policy debates and legislative proposals. This report is structured to first provide a brief overview of the major federal income tax provisions that affect lower-income individuals and families, including a comparison of how these provisions changed under the TCJA. The report then provides an analysis of how the pre-TCJA federal income tax affected poverty, followed by a comparison of how the post-TCJA federal income tax affected poverty. The report concludes with some observations on the benefits and limitations of the federal income tax system and refundable tax credits in reducing poverty. Several major concepts, conventions, and terms used throughout this report are briefly described below. The information in this report provides some insights into how the federal income tax affects families' poverty status, specifically the immediate, short-term impact of the TCJA on poverty. The report does not estimate how the impacts of the TCJA will change over time or how people may change their behavior (e.g., choices between working and not working) in response to the TCJA. The family is the unit of analysis. While federal income tax provisions affect taxpayers, the impact of these provisions is analyzed in terms of families. A taxpayer is generally composed of all individuals listed on a federal income tax return (IRS Form 1040) and includes an individual, his or her spouse (if married), and any dependents. Descriptions of the tax system pre- and post- TCJA will generally refer to how these changes applied to taxpayers (i.e., the below section titled, \" How Major Federal Income Tax Provisions Apply to the Poor \"). In contrast, poverty analysis is done at the family level since families can share many resources and expenses. Hence, in this report analyses of the impact of the income tax , pre- and post-TCJA, are generally done at the family level . In this report, a family is composed of people living together related by blood or marriage (the family), cohabiting partners, and foster children. In some cases, like multigenerational families, a family is composed of multiple taxpayers. In these cases, tax liabilities and/or benefits for all taxpayers are aggregated to determine the impact of the income tax on the family's resources. If a family is determined to be poor, all members of that family are counted as poor. The Supplemental Poverty Measure (SPM) is used to measure the poverty impact of the federal income tax. This report examines the impact of the pre- and post-TCJA federal income tax on poverty, using the federal government's Supplemental Poverty Measure (SPM). Unlike the official poverty measure, the SPM was developed in part to help assess the effects of tax and government benefit policies on the economic well-being of low-income individuals. For more information on the SPM, see Appendix A and CRS Report R45031, The Supplemental Poverty Measure: Its Core Concepts, Development, and Use . The impact s of the federal income tax (pre- and post-TCJA) are estimated using the TRIM3 model and are modeled as if they were in effect in 2016. To estimate the impact of the federal income tax on povertyâin both the pre- and post-TCJA casesâincome taxes owed (or the net benefit from refundable credits received) are subtracted from (or added to) the family's other resources, which are then assessed against an SPM poverty threshold. Other taxes that a family may payâincluding payroll and excise taxesâare unchanged in these analyses. All poverty estimates in this report are calculated using a computer simulation model called the Transfer Income Model, version 3 (TRIM3). TRIM3 uses data from the 2017 Annual Social and Economic Supplement (ASEC) to the Current Population Survey (CPS), representing income received and tax liabilities or benefits accrued during calendar year 2016. As such, the poverty estimates under the old and new income tax systems are estimated as if they were in effect in 2016 . Hence, for ease of reading, the estimates in this report are described in the past tense. Details on this methodology, including how the TCJA was modeled in TRIM3, can be found in Appendix A . The federal income tax can increase or decrease a taxpayer's disposable income, which may affect a family's poverty status. Broadly, when a taxpayer receives refundable tax credits greater than the income taxes they owe, they have a negative tax liability , and an increase in disposable income, all else being equal. Conversely, if a taxpayer owes federal income tax, they have a positive tax liability , and reduced disposable income, all else being equal. (If a taxpayer has zero tax liability , their disposable income is unchanged by the income tax.) Unless otherwise mentioned, the term tax liability will refer to federal income tax liability in this report. In order to understand how the individual income tax can affect tax liabilities, it can be helpful to broadly understand how income taxes are calculated, and in particular, how major components of the income tax affect poor taxpayers. Importantly, the description below summarizes only the major aspects of the federal income tax calculation that are particularly relevant for poor families. For a more detailed overview of the federal income tax calculation, see CRS Report R45145, Overview of the Federal Tax System in 2018 ; and CRS Infographic IG10014, The U.S. Individual Income Tax System, 2019 . For a more detailed description of the tax provisions summarized below, how they affect income tax liability, and how they were modified by the TCJA, see CRS Report R45092, The 2017 Tax Revision (P.L. 115-97): Comparison to 2017 Tax Law . The TCJA substantially modified the federal tax code, including changing many provisions that affect individuals. Most of these changes are temporary, and are scheduled to expire (\"sunset\") at the end of 2025. The major changes made by the TCJA that are likely to affect many low-income taxpayers are highlighted below. The first step for taxpayers in calculating their income tax liability is to add up their income from various sources to calculate their gross income. The income tax code excludes certain types of income received by lower-income individuals from gross income. For example, public assistance payments (cash assistance from the Supplemental Security Income program or the Temporary Assistance for Needy Families [TANF] Block Grant) and the value of certain noncash benefits (food benefits from the Supplemental Nutrition Assistance Program [SNAP] or the subsidy value of housing benefits) are excluded from gross income under the income tax system, and hence are not taxable. The TCJA did not make any changes to the exclusion of public assistance. The taxpayer then subtracts from gross income various deductions and exemptions to calculate the amount of income that is taxableâtheir taxable income . Most low-income taxpayers will subtract from their gross income the standard deduction (and before 2018, personal exemptions) to calculate their taxable income. The standard deduction is a fixed dollar amount all taxpayers may deduct from their income, with the amount varying by the taxpayer's tax filing status. In 2018, before enactment of the TCJA, the standard deduction would have ranged from $6,500 to $13,000, depending on the taxpayer's filing status. The TCJA almost doubled the standard deduction. The personal exemption is a per-person subtraction from gross income for the taxpayer and, if applicable, his or her spouse and dependents. Before enactment of the TCJA, the personal exemption would have equaled $4,150 per person in 2018. The TCJA effectively eliminated the personal exemption (reduced the amount to $0). When combined, the personal exemptions and the standard deduction represent an amount of income that is not subject to income taxation. As a result of these provisions, many low-income taxpayers have little or no taxable income and hence have little or no income tax liability. (Taxable income cannot be reduced below zero.) After taxpayers have calculated their taxable income, they then apply marginal tax rates to calculate their tax liability before credits. A marginal tax rate is the tax incurred on each additional dollar of taxable income. Marginal tax rates in the individual income tax code are graduated, meaning the rate increases over successive ranges of taxable income. Many low-income taxpayers who do have taxable income pay taxes at the lowest marginal rate of 10%. The ranges of taxable income and their associated rate are often referred to as tax brackets . Taxpayers determine their tax liability before credits by applying marginal tax rates to their taxable income. Then taxpayers can subtract tax credits to determine their final tax liability. The 10% tax bracket (the lowest tax bracket) was unchanged by the TCJA. In general, marginal tax rates above the 10% rate were reduced under the TCJA. See Table C-2 . Tax credits reduce the amount a taxpayer owes dollar-for-dollar the value of the credit. Credits can be nonrefundable or refundable. Nonrefundable credits cannot exceed tax liability, and therefore can only reduce tax liability to zero. In other words, \"the maximum value of a nonrefundable credit is capped at a taxpayer's tax liability.\" For example, if a taxpayer owes $1,000 in income taxes and is eligible to receive $4,000 in nonrefundable tax credits, the taxpayer will receive only $1,000 in nonrefundable tax credits, reducing their income tax liability to zero. By contrast, refundable credits are not limited by how much a taxpayer owes in income taxes, meaning those with little to no tax liability, including may poor taxpayers, can receive the full value of the credit. A refundable tax credit provides a net benefit to a taxpayer (i.e., after-tax income is greater than before-tax income) when the amount of the credit is greater than the taxpayer's income tax liability. For example, if a taxpayer owes $1,000 in income taxes but receives $4,000 in refundable tax credits, the taxpayer has a net benefit (and negative tax liability) of $3,000. The two major refundable tax credits claimed by low-income working taxpayers are the EITC and the additional child tax credit (the ACTC, which is the refundable portion of the child tax credit). The amount of the EITC is based on a taxpayer's earned income, marital status, and number of qualifying children. In 2018, before the TCJA, the maximum amount of the credit would have ranged from $520 to $6,444, depending on the number of qualifying children. The TCJA did not alter the EITC itself, though it did change the rules for adjusting it for inflation, which resulted in a slightly smaller EITC under the TCJA than under prior law (a difference of $1 to $13 in 2018, depending on the number of qualifying children claimed by a taxpayer). Before the TCJA the child tax credit equaled a maximum $1,000 per child, and up to the full amount ($1,000 per child) could be received as the ACTC. The ACTC was calculated as 15% of earned income over $3,000, not to exceed $1,000 per child. The TCJA increased the maximum child tax credit from $1,000 to $2,000 per child and increased the maximum amount of credit that could be claimed as the ACTC from $1,000 to $1,400 per child. The formula for calculating the ACTC was also modestly changed. Post-TCJA, the ACTC formula now equals 15% of earned income above $2,500, not to exceed $1,400 per child. While many low-income taxpayers did receive a larger benefit as a result of these changes, the poorest taxpayers received a more modest increase of up to $75 (see Figure C-1 and Figure C-2 ). The ultimate impact of the TCJA on a particular taxpayer's tax liability depends on how the taxpayer's individual circumstances interact with all of these provisions, not just one of them. For example, as a result of all the changes made by the TCJA, a taxpayer may have greater taxable income, but that income may be subject to lower marginal tax rates, and the taxpayer may also be eligible for a larger child credit. Hence, even though on average the TCJA lowered tax liabilities, individual taxpayers' tax liabilities may have been unchanged, increased, or decreased as a result of the law. Under the pre-TCJA income tax, many poor families did not owe federal income taxes, and a significant proportion received a net benefit from refundable credits. As previously discussed, the combination of personal exemptions and the standard deductionâsubtracted from gross income to determine income subject to the taxâgenerally reduced most poor families' taxable income to zero. Additionally, some poor families with little or no income tax liabilityâparticularly those with children and earned incomeâreceived refundable tax credits that resulted in their after-tax income being greater than their before-tax income. (CRS estimates that before the income tax was subtracted from [or added to, in the case of negative tax liabilities] a family's resources, there were approximately 21.4 million familiesâequaling an estimated 46.5 million individualsâin poverty. For more information, see Appendix B .) Figure 1 illustrates the estimated share of families who owed income taxes (positive tax liability), owed no income taxes (zero tax liability), or owed no income taxes and received a net benefit from refundable tax credits (negative tax liability) by family poverty status. Under the pre-TCJA income tax, the majority of nonpoor families (75.7%) owed income taxes. In contrast, the majority of poor families (62.7%) owed no income taxes, and approximately a quarter (24.3%) owed no income taxes and received a net benefit from refundable tax credits. Figure 2 shows the estimated share of poor families with positive, zero, and negative tax liabilities by the presence of children or aged family members. Nearly 6 in 10 poor families with children (57.5%) had a negative tax liability under the pre-TCJA income tax. In comparison, nearly 2 in 10 poor families without children or aged adults (19.5%) had a negative tax liability. Comparing poverty rates before and after a policy change is one way to assess a policy's impact on poverty. To calculate poverty rates under the pre-TCJA income tax, a family's poverty status must be determined before and after tax. A family's before-tax poverty status is based on the family's available financial resources before federal income tax liabilities are subtracted from (or added to, in the case of negative tax liabilities) their disposable income. In contrast, a family's after-tax poverty status is based on the family's financial resources after the federal income tax is subtracted from (or added to, in the case of negative tax liabilities) disposable income. If the income tax boosts income sufficiently to push a poor family above the poverty threshold, they are then counted as nonpoor as a result of the pre-TCJA income tax. As previously discussed, if a family is determined to be poor, all members of that family are counted as poor. Poverty rates are then calculated based on the number of individuals who are poor before and after the pre-TCJA income tax is applied. Figure 3 shows the effect of the pre-TCJA income tax system on the poverty rates of individuals based on the types of families in which individuals lived. Overall, the pre-TCJA income tax reduced poverty: the before-tax poverty rate was 14.5%, while the after-tax poverty rate was 12.5%, a net reduction of two percentage points. Figure 3 also indicates that the poverty reduction impact of the income tax was concentrated among individuals who lived in families with children. Specifically, the pre-TCJA income tax reduced child poverty by nearly 30% (from 17.5% in poverty to 12.3% in poverty) and reduced poverty among nonaged (i.e., nonelderly) adults in families with children by a quarter (from 14.5% in poverty to 10.8% in poverty). In contrast, the post-tax poverty rate for nonaged adults in families with no children was higher than the pre-tax poverty rate for this group (the poverty rate for individuals in this group rose from 12.8% to 13.1%). Further examination of the impact of the pre-TCJA income tax on poverty rates indicates that all of the antipoverty effect of the federal income tax went to those individuals who lived in families with workers. As illustrated in Table 1 , CRS estimates that among the subset of families who had no workers, poverty rates, including the poverty rates of children and nonaged adults who lived with children, were unchanged by the pre-TCJA income tax. In contrast, among those who lived with a worker, poverty fell by over 20% (from 10.8% in poverty to 8.3% in poverty), with larger reductions for children and nonaged adults who lived in families with children. In other words, the poverty reduction of the pre-TCJA income tax was concentrated among individuals who lived with workers and children. The poverty gap is another metric that can be used to understand poverty and to examine the impact of a policy on poverty. The poverty gap is the difference between the poverty threshold (an amount of money below which a family is counted as poor) and a family's disposable income. (The poverty gap for a nonpoor family is $0.) Unlike the poverty rate, which is based on whether a family is below the poverty threshold, the poverty gap provides a way of examining the degree to which a family is below that threshold. For example, assume there are two poor families who have the same poverty threshold of $25,000. The first family has $20,000 of disposable income, hence their poverty gap is $5,000. The second family has $10,000 of disposable incomeâthey are poorer than the first familyâand their poverty gap is $15,000. Hence the larger the poverty gap, the poorer the family. For this analysis, poverty gaps are summed together across all poor families to determine the aggregate poverty gap. The aggregate poverty gap is calculated both before and after taxes (or refundable credits) are subtracted (or added) to disposable income as calculated under the pre-TCJA income tax. Changes to the aggregate poverty gap from the pre-TCJA income tax measure the degree to which the federal income tax reduced financial hardship among poor families. Table 2 provides estimates of the aggregate poverty gap before and after the pre-TCJA income tax. The aggregate poverty gap before the pre-TCJA income tax was $150.8 billion. The poverty gap after the pre-TCJA income tax was $138.1 billion. Thus, the pre-TCJA income tax reduced the aggregate poverty gap by $12.7 billion, all of which went to families with children and at least one worker. For families without children (i.e., families with aged adults and families without children or aged adults), the aggregate poverty gap increased slightly as a result of the pre-TCJA income tax. Under the post-TCJA income taxâsimilar to the pre-TCJA income taxâmany poor families did not owe federal income taxes (i.e., had zero tax liability), and a significant proportion owed no income tax and received a net benefit from refundable credits (i.e., had a negative tax liability). The impact of the post-TCJA income tax system on poverty rates and the poverty gap suggests the TCJA provided relatively small benefits to poor families. (CRS estimates that before the income tax was subtracted from [or added to, in the case of negative tax liabilities] a family's resources, there were approximately 21.4 million familiesâequaling 46.5 million individualsâin poverty. For more information, see Appendix B .) As illustrated in Figure 4 , CRS analysis indicates that the shares of poor and nonpoor families with positive, negative, and zero income tax liabilities were similar pre- and post-TCJA. For both poor and nonpoor families, there is a relatively small decrease (less than 2 percentage points) in the number of families with a positive tax liability. For both poor and nonpoor families, there is a relatively small increase in the share of families with zero tax liability. The share of poor families with a negative tax liability is effectively unchanged, while the share of nonpoor families with a negative tax liability increased by a relatively small amount. Figure 5 compares the estimated share of poor families with positive, zero, and negative income tax liabilities under the pre-TCJA and post-TCJA income tax by family type. This analysis indicates that across all poor family types, the share of poor families that owed taxes (i.e., had positive tax liability) modestly fell as a result of the TCJA. Among poor families with children, CRS analysis indicates that share of these families who did not owe income taxes (i.e., had zero tax liability) increased as a result of the TCJA. In contrast, the share of poor families with children who received an increase in their disposable income from refundable tax credits (i.e., had a negative income tax liability) fell as a result of the TCJA. Figure 6 compares estimated after-tax poverty rates between the pre- and post-TCJA income tax. The difference in these poverty rates reflects the impact of the TCJA on poverty. These estimates indicate that the TCJA had a relatively small effect on poverty rates. CRS estimates that the TCJA reduced overall poverty by 1.6% (from 12.5% in poverty under the pre-TCJA income tax to 12.3% in poverty under the post-TCJA income tax). The impact of these changes was concentrated among individuals who lived in families with children. Specifically, the TCJA reduced poverty among children and nonaged adults living in families with children by about 2.4% and 1.9%, respectively (from 12.3% to 12.0% in poverty among children and from 10.8% to 10.6% in poverty among nonaged adults living in families with children). As with the pre-TCJA income tax, the impact of the post-TCJA income tax on poverty rates was concentrated among those who lived in a family with workers. As illustrated in Table 3 , CRS estimates that among the subset of families who had no workers, the poverty rates of children and nonaged adults who lived with children were unchanged by the post-TCJA income tax. In contrast, among those who lived with a worker, poverty fell by nearly 25% (from 10.8% in poverty to 8.1% in poverty), with larger reductions for children and nonaged adults who lived in families with children. As with the pre-TCJA income tax, these estimates suggest that virtually all of the benefits of post-TCJA income tax go to individuals who live with workers and children. The post-TCJA income tax reduced the aggregate poverty gap from $150.8 billion to $136.9 billion. The pre-TCJA income tax reduced the aggregate poverty gap to $138.1 billion. Hence, CRS estimates that the changes made by the TCJA reduced the aggregate poverty gap by an additional $1.2 billion compared to the pre-TCJA income tax. Table 4 breaks down this $1.2 billion reduction by family type and indicates that the majority of the additional reduction in the poverty gapâapproximately $800 million of the $1.2 billionâoccurred among families with children. Almost all of that $800 million went to families with children and workers. A comparison of estimated antipoverty effects of the post-TCJA income tax and other low-income assistance programs indicates that while the income tax substantially reduced the poverty rate , it had more limited effects on the aggregate poverty gap . Figure 7 shows the estimated percentage-point reduction in the poverty rate attributable to the post-TCJA income tax and several low-income assistance programs: the Supplemental Nutrition Assistance Program (SNAP); Supplemental Security Income (SSI); assisted housing programs (Section 8 vouchers and public housing); and Temporary Assistance for Needy Families (TANF) block grant cash assistance. Only SNAP resulted in a comparable reduction in the overall poverty rate compared to the post-TCJA income tax. Estimates of the reduction in the aggregate poverty gap from the post-TCJA income tax compared to selected low-income assistance programs highlight some of the limitations of the income tax in helping the poorest families. As illustrated in Figure 8 , three of the four low-income assistance programs reduced the poverty gap by greater amounts than the income tax. This may occur for several reasons. First, these nontax programs tend to aid the very poor, and even though their benefits are not large enough to lift a family above the poverty threshold, they do provide significant financial assistance. Second, the majority of the income tax's antipoverty provisionsâincluding the EITC and the ACTCâare available only to families with earned income. Poor families who receive the EITC and the ACTC tend to be \"less poor\" than other families who receive SNAP, SSI, and housing assistance. The income tax provides significant monetary benefits to many low-income families. These benefits reduce the overall poverty rate. The analysis in this report suggests, however, that the income tax is less effective, in comparison to many needs-tested programs, in helping the poorest families move out of poverty, as measured by its impact in reducing the aggregate poverty gap. Overall, the impact of the income tax on poverty was marginally changed by the TCJA. Specifically CRS estimates that before taxes, the poverty rate was 14.5%. After the pre-TCJA income tax, the poverty rate fell to 12.5%, while after the post-TCJA income tax it fell to 12.3%. CRS estimates that before taxes, the aggregate poverty gap was $150.8 billion. After the pre-TCJA income tax it fell to $138.1 billion, while after the post-TCJA income tax it fell to $136.9 billion. These benefits went almost exclusively to individuals who lived in families with workers and children. This analysis highlights both the importance of the tax system in reducing poverty, and also some of its limitations. As discussed in this report, the main mechanism by which the income tax reduces poverty is through refundable tax credits, primarily the EITC and the refundable portion of the child tax credit, the ACTC. These credits are available only to families who include a worker (and who generally have children) since their value is based in part on a taxpayer's earned income. Hence these credits provide little if any benefit to those who do not or cannot work, and who are more likely to be poor. There are other limitations to using refundable tax credits to reduce poverty that are not discussed in this report. Notably, the EITC and child tax credit are received once a year as part of a taxpayer's refund after they file their federal income tax return, and are not paid out on a more periodic basis (i.e., monthly) to help families meet their basic needs. Addressing this limitation, the National Academy of Sciences, in its most recent report on reducing child poverty, proposed converting the child tax credit into a monthly child allowance. However, the Internal Revenue Service (IRS) may be ill-equipped to accurately and efficiently pay out tax benefits like the EITC and the child tax credit on a more periodic basis. Even on an annual basis, as they are currently paid out, these credits can be difficult for the IRS to administer and for taxpayers to comply with. The complexity of these tax credits is often cited as the main factor driving their high rate of erroneous claims. Despite these limitations, and the limitations highlighted in this report, the income tax remains a popular (and near-universal) mechanism to provide aid to the working poor, especially those with children. Recent legislative proposals, including the Economic Mobility Act of 2019 ( H.R. 3300 ), would expand refundable tax credits, increasing the size of the EITC for workers without custodial children (the \"childless EITC\"), and increasing the ACTC to $2,000 ($3,000 for young children) for all low-income taxpayers irrespective of earned income. The stated purpose of this legislation is to help working families with children. And yet, by eliminating the phase-in for the ACTC, H.R. 3300 (and the American Family Act of 2019; S. 690 / H.R. 1560 ) also represents a shift in the target population of refundable tax credits, expanding eligibility to poor families with children that do not include a worker. Similarly, the proposed increase in the EITC for taxpayers without custodial children also reflects a shift from providing benefits only to workers with children (although childless EITC recipients may live in families with other children and/or have noncustodial children who do not live with them). Insofar as eligibility and the amount of refundable tax credits are expanded, the antipoverty effects of the income tax may increase. Appendix A. Methodology and Data Sources To examine how the federal individual income tax affects poverty, this report uses estimates from the Transfer Income Model, version 3 (TRIM3) and data from the Census Bureau's Annual Social and Economic Supplement (ASEC) to the Current Population Survey. TRIM3 is a static microsimulation model that estimates federal and state taxes and certain benefit transfer programs. TRIM3 is primarily funded by the U.S. Department of Health and Human Services and maintained by the Urban Institute. The measure of poverty used is the Census Bureau's Supplemental Poverty Measure (SPM). The Annual Social and Economic (ASEC) Supplement to the Current Population Survey The ASEC is a household survey of the noninstitutionalized population conducted by the Census Bureau in March of each year. There are approximately 94,000 households in the ASEC. The ASEC includes questions related to household members' demographic characteristics and family living arrangement at the time of the survey, and work experience and income in the prior year. This report's estimates are based on the 2017 ASEC, which captures information on work experience and income in the prior yearâ2016. The ASEC is used by the U.S. Census Bureau to estimate both the official poverty measure and SPM poverty in its reports. The sample of the ASEC is large enough to make reliable estimates for the nation as a whole and, sometimes, for some of the larger states. However, the sample is not large enough to make state-level estimates for all states. Estimates discussed in this report were weighted from the sample information to make the ASEC representative of the population of U.S. households. Since the estimates in this report come from a sample, they are subject to sampling error. Additionally, the information on the ASEC is based on respondents' answers to the survey questions, and nonresponse or incorrect responses can result in nonsampling error. The ASEC itself does not ask survey respondents about taxes paid or refundable credits received in the prior year. That informationâimportant for determining a family's or an individual's SPM poverty statusâmust be estimated. This report uses estimates from the TRIM microsimulation model for these estimates. The Census Bureau uses a different microsimulation model in its reports on SPM poverty. The TRIM3 Microsimulation Model Microsimulation models of tax and transfer programs are composed of computer code that mimics the rules of the tax code and benefit programs. The models determine whether an individual, family, or other unit is eligible to be subject to a tax or eligible for a benefit and then estimates the amount of the tax (or benefit). TRIM assumes that all taxpayers fully comply with the requirements and rules of the tax code. Federal Income Tax Module for 2016 TRIM3 applies policy rules in effect during the year to the population for that year. The estimates in this report use information from the TRIM3 federal income tax module for 2016. The 2016 federal income tax module makes \"baseline estimates\" of the tax code as it existed for 2016. The model uses data from the ASEC's information on family structure at the time of the survey to place individuals into federal tax filing units (e.g., taxpayer and, for those married filing jointly, the spouse). It also identifies \"extended\" tax filing units, which include dependents, and identifies \"qualifying children\" for the purpose of the EITC and the child tax credit. TRIM3 creates tax units not only for tax filers, but also for all potential filers. The model then uses information on the earnings and other income sources reported on the ASEC for 2016 to determine a tax filing unit's federal income tax liability. Additionally, expense and income items not available on the ASEC but required to compute federal income taxes were obtained through a statistical match with the IRS Statistics of Income Public Use File, which is based on a sample of tax returns. TRIM3 estimates of the elderly and disabled tax credit and the child and dependent care tax credit are aligned to target amounts based on IRS data. In terms of estimating federal income taxes, there are a number of caveats and limitations of the TRIM3 estimates. These limitations are not idiosyncratic to TRIM3 estimates. They generally result from limitations on the underlying ASEC data and are also present in estimates from the Census Bureau. These limitations include the following: Estimates are not reliable for very - high - income taxpayers . The estimates of federal income tax liability are not likely to be reliable for very-high-income taxpayers because the ASEC oversamples lower-income populations, rather than higher-income populations. Thus, TRIM3/ASEC estimates are most often used in reports (such as this report) that focus on lower-income populations. Amounts of refundable tax credits tend to be underestimated . The estimates from TRIM3 (as well as the Census Bureau's microsimulation model) underestimate refundable tax credits. For example, the TRIM3 estimate of the EITC for 2016 (pre-TCJA) was $39.2 billion. The total amount of the EITC claimed in 2016 according to the IRS was $66.7 billion. This discrepancy has long been known by researchers, but has yet to be fully explained. Potential reasons for the discrepancy include the information on the ASEC family structure perhaps not adequately representing that used for filing tax returns; the underreporting of certain forms of earnings (such as self-employment earnings); and the high rates of error made by taxpayers claiming the EITC. A Revised Federal Income Tax Module for Estimating Rules under the TCJA The Urban Institute, in partnership with the Congressional Research Service (CRS), modified TRIM3's federal income tax module to account for the major provisions of the TCJA affecting individual taxpayers. Thus, the information in the model was revised to reflect the new tax brackets and marginal tax rates that apply to them, the suspension of the personal exemption and the increases in the standard deduction, limitations on itemized deductions, including the limitation on the deductibility of state and local taxes (SALT), revised rules for the child tax credit, and other changes to the federal individual income tax code. TCJA Changes Not Modeled A number of changes to the federal income tax were not modeled. These include changes to the treatment of alimony, the mortgage interest deduction, and elimination of the individual mandate for health insurance. The treatment of alimony was not modeled because the changes will apply only to new or revised orders and will not affect many cases in the near term. Limits on interest qualifying for the mortgage interest deduction were not modeled since there are no data to inform the impact of these changes. Additionally, certain smaller changes are not present in the simulation, such as the elimination of the deduction for bicycle commuting. Inflation Adjustment The post-TCJA tax code parameters were deflated to 2016 dollars to answer the question, \"What if the 2018 TCJA parameters were in place in 2016 and 2016 was the first year of their enactment?\" The adjustment was done using the chained Consumer Price Index for All Urban Consumers (C-CPI-U), since the TCJA requires the use of that price index rather than the CPI-U for future price adjustments. Specifically, the 2018 amounts were adjusted to 2016 dollars using the chained CPI; see. Hence the estimates in this report reflect the impact of the post-TCJA tax code as if the first year of its enactment were 2016 (it actually went into effect in 2018). The Supplemental Poverty Measure The SPM was created to address some of the limitations of the official poverty measure. Particularly relevant for this analysis, the official poverty measure does not take into account taxes (and tax benefits, like refundable credits) and their impact on disposable income. It also does not take into account certain noncash government benefits, such as food benefits from SNAP or the value of housing benefits. The measure of total income in this analysis is computed similarly to the way the U.S. Census Bureau computes total financial resources, though there are a few differences. This analysis uses the TRIM3 estimates for TANF, SSI, and SNAP, rather than amounts reported on the ASEC, to address the underreporting of these income sources on the ASEC. Additionally, the measure of child careâdeducted as a work expense for the SPMâdiffers. This analysis uses TRIM3's estimate of child care expenses, which includes estimated copayments for families receiving child care subsidies from the Child Care and Development Block Grant (CCDBG). The Census Bureau also caps child care expenses at the earnings of the lower-earning parent when determining net financial resources. This analysis deducts all child care expenses as a work-related expense of the family. Appendix B. Estimated Number of Individuals and Families in Poverty Before the Income Tax, 2016 Below are estimates of the number of individuals in poverty before the federal income taxes are subtracted from (or added to) financial resources using the TRIM3 microsimulation model. The individual types used in this table are also found in Table 1 and Table 3 of this report. Below are estimates of the number of families in poverty before federal income taxes are subtracted from (or added to) financial resources, estimated using the TRIM3 microsimulation model. The family types used in this table are also found in Table 2 and Table 4 of this report. Appendix C. How the Major Federal Income Tax Provisions That Affect Low-Income Taxpayers Were Modified by the TCJA Below are descriptions of how the major federal income tax provisions that affect low-income taxpayersâdeductions, exemptions, tax rates, and refundable creditsâwere changed by the TCJA. Stylized examples included at the end of each section help illustrate the impact of these changes for a hypothetical family. Standard Deduction and Personal Exemptions The standard deduction and personal exemption, when combined, represent the minimum amount of income of a tax unit that is not taxed under the federal income tax. The standard deduction is a fixed dollar amount that taxpayers can subtract from their income when determining the amount of their income subject to taxation (e.g., \"taxable income\"). The TCJA nearly doubled the standard deduction. Specifically, in 2018 the standard deduction for unmarried single filers, head of household filers, and married joint filers increased from $6,500, $9,550, and $13,000 to $12,000, $18,000, and $24,000, respectively. The TCJA suspended the personal exemption, effectively reducing it from $4,150 per person in 2018 to $0. These changes are in effect from 2018 through the end of 2025. The combination of the standard deduction and personal exemption is sometimes referred to as the 0% bracket since that income is not taxed. It is also referred to as the tax entry point since every dollar above this amount is generally taxable (and hence considered taxable income). The increase of the standard deduction combined with the effective elimination of the personal exemption result in a similar or higher tax entry point for some families (unmarried individuals with no children, unmarried individuals with one child, and married couples with no children, as illustrated in Table C-1 ), while larger families, including many with children, will have a lower tax entry point under the new tax law. For these families, more of their income will potentially be subject to the federal income tax. Stylized Example For example, as illustrated in Table C-1 , a married couple with two children would have had a tax entry point in 2018 pre-TCJA of $29,600. If this family had $36,000 of income, only the amount above $29,600â$6,400âwould have been taxable. Post-TCJA this tax entry point is now $24,000 for this same family. Hence, of their $36,000 of income, $12,000 would now be taxable income. Marginal Tax Rates/Tax Brackets A marginal tax rate is the percentage that a taxpayer pays on an additional dollar of taxable income. The federal individual income tax code has seven marginal tax rates ranging from 10% to 37%. The income ranges over which these marginal rates apply, often referred to as tax brackets , differ based on the taxpayer's filing status. The federal income tax is considered a progressive tax by economists because as taxable income increases, income above a given bracket threshold is taxed at a higher marginal rate. Once a tax unit has determined how muchâif anyâof their income is taxable (i.e., after subtracting the standard deduction from their income post-TCJA), they then apply marginal tax rates to this amount. If poor families have any taxable income, most if not all of it is subject to the lowest marginal tax rate, although some of their income may be subject to the second-lowest bracket (the second-lowest bracket was the 15% bracket pre-TCJA, and is now 12% under the TCJA). The lowest marginal tax rateâ10%âwas unchanged by the TCJA. Changes to marginal tax rates are presented in Table C-2 . These changes are in effect from 2018 through the end of 2025. Stylized Example For example, for a married couple with two children and $36,000 in income, their taxable income pre-TCJA would have been $6,400 in 2018. That income would have been subject to a 10% marginal rate, for a tax liabilityâbefore accounting for tax creditsâof $640. Post-TCJA, this same family would have had $12,000 of taxable income, all subject to the 10% marginal rate, which would result in $1,200 of income tax liability before subtracting any tax credits. The Child Tax Credit After taxpayers calculate their income tax liability before credits, they can subtract the value of any tax credits for which they may be eligible. Taxpayers with little or no tax liabilityâwhich includes most of the poorâcan still receive the refundable credits, including the refundable portion of the child tax credit (the ACTC). The ACTC is calculated as a percentage of earnings (the refundability rate) above the refundability threshold up to the maximum amount of the refundable portion of the credit. The ACTC plus the amount of the credit that offsets any income tax liability cannot be greater than the maximum credit per child. (Low-income families who do have a positive tax liability will first reduce their income tax liability by the nonrefundable portion of the child tax credit, and then claim the ACTC.) TCJA made several changes to the child tax credit and ACTC, as outlined in Table C-3 . In addition to modifying the credit formula, TCJA also enacted a new ID requirement for the credit. Prior to TCJA, taxpayers could provide the taxpayer identification number for the child in order to claim the credit. The most common taxpayer ID is a Social Security number (SSN), but other taxpayer identification IDs included individual taxpayer identification numbers (ITINs). Post-TCJA, taxpayers will now need to provide the SSN for the child in order to claim the credit. These changes are in effect from 2018 through the end of 2025. How much a taxpayer's child tax credit changed following the TCJA depends on their income level. As a result of the changes made in the TCJA, the child tax credit doubled for many middle-income families. With the higher income phaseout thresholds, middle- and higher-income families became child tax credit eligible, as illustrated in Figure C-1 . However, many low-income families received a smaller increase, as illustrated in Figure C-2 . Stylized Example For example, for a married couple with two children and $25,000 of income, their child credit as a result of the TCJA would increase from $2,000 to $2,900 ($800 of the increase from the refundable portion and $100 from the nonrefundable portion). For this family, once income was $36,000, their child tax credit would increase from $2,000 to $4,000 (with $800 of that increase from the refundable portion and $1,200 from the nonrefundable portion). Other Changes The law did not directly change the largest antipoverty program in the tax code, the EITC. However, the law did change the measure of inflation used to adjust numerous provisions in the tax code, including the EITC, beginning in 2018. This new inflation index, the C-CPI-U price index, is projected to grow more slowly than the previous inflation index, the CPI-U. Hence, over time the EITC will grow more slowly. In 2018, the differences in the EITC from the adoption of this new measure will be relatively small, reducing the maximum amount of the credit by $1 for recipients with no children, $7 for recipients with one child, $12 for those with two children, and $13 for those with three or more children. However, as the effects of the slower inflation adjustment compound over time, these changes will grow larger. In addition, the income cutoff points of marginal tax rates will grow more slowly. Over time, if wages grow faster than C-CPI-U, some of the income of low-income taxpayers currently subject to the 10% marginal tax rate may become subject to higher marginal rates.", "summary": "The federal individual income tax is structured so that the poor owe little or no income tax. In addition, the federal individual income tax (hereinafter referred to simply as the income tax) increases the disposable income of many poor families via refundable tax creditsâprimarily the earned income tax credit (EITC) and the refundable portion of the child tax credit, referred to as the additional child tax credit, or ACTC. These credits are explicitly designed to benefit low-income families with workers and children and can significantly boost families' disposable income, lifting many of these families above the poverty line. Using the federal government's Supplemental Poverty Measure (SPM), CRS estimates that under current law, the income tax reduced total poverty by 15% (from 14.5% in poverty to 12.3% in poverty). The impact of the income tax on the overall poverty rate was larger than the impact of many needs-tested benefits programs targeted toward the poor. In contrast, the income tax's ability to lift the poorest Americans out of povertyâto reduce the \"poverty gap\"âwas limited in comparison to many needs-tested programs. (The poverty gap is the difference between the poverty threshold and a family's disposable income, aggregated over all poor families, and is a measure of the degree of poverty.) CRS estimates that under current law, the income tax reduced the poverty gap by about $13.9 billion annually (from $150.8 billion to $136.9 billion), approximately half the effect of other needs-tested programs. Virtually all of the poverty reduction from the income taxâboth in terms of reducing poverty rates and the poverty gapâwas concentrated among families with children and workers. For example, CRS estimates that poverty among children who lived in families with workers fell by almost 40% (from 14.7% in poverty to 8.9% in poverty) as a result of the income tax. For nonaged (i.e., nonelderly) adults in families with children and workers, poverty fell by almost a third (from 12.3% in poverty to 8.3% in poverty). (In contrast, CRS estimates that the poverty rates among individuals who lived in families with no workers were unchanged by the income tax.) Similarly, all of the estimated $13.9 billion in poverty gap reduction from the current income tax occurred among families with children and workers. The current income tax includes the effects of legislative changes made by P.L. 115-97 , commonly referred to as the Tax Cuts and Jobs Act (TCJA). The TCJA made numerous changes to the federal income tax system, including many that affect individuals and families. A comparison of the effect of the current income tax (i.e., the post-TCJA income tax) and the pre-TCJA income tax on poverty rates and the poverty gap (assuming all else unchanged) provides one measure of the law's impact on poverty. CRS estimates suggest that the TCJA marginally reduced poverty rates and the poverty gap, with the impact of the post-TCJA income tax similar to the impact of the pre-TCJA income tax. This suggests the law provided relatively small benefits to poor families. Insofar as policymakers are interested in expanding the antipoverty impact of the income tax, they could expand or modify the EITC or ACTC, or create new refundable tax credits targeted toward the poor. However, refundable tax credits are subject to several limitations as a poverty reduction policy: the current credits primarily benefit those who work (and have children), limiting their ability to reduce poverty among those who do not or cannot work; they are received only once a year when income tax returns are filed, limiting their ability to help the poor meet ongoing basic needs; and they are difficult for the IRS to administer, subjecting the credits and their recipients to additional scrutiny.", "document_type": "crs"}
{"report": "O n December 31, 2019, the World Health Organization (WHO) was informed of a cluster of pneumonia cases in Wuhan City, Hubei Province of China. Illnesses have since been linked to a disease caused by a previously unidentified strain of coronavirus, designated Coronavirus Disease 2019, or COVID-19. Despite containment efforts in China, the United States, and elsewhere, by late February there were indications that the COVID-19 outbreak may have entered a new phase, with community spread occurring or suspected in several countries other than China, including in the United States. Diagnostic testing is a critical part of the public health response to and clinical management of the COVID-19 caused by the SARS-CoV-2 virus. Efforts in the United States to develop and disseminate a test for COVID-19 have faced challenges. Manufacturing and quality issues with the nation's testâdeveloped by the Centers for Disease Control and Prevention (CDC)âresulted in essentially all testing going through CDC's laboratory facility in Atlanta through early March, despite distribution of test kits to state and local public health labs beginning in early February. CDC's initial test kits had to be remanufactured and redistributed, which, along with other factors, has significantly delayed access to testing throughout the country. It has been reported that the CDC's Atlanta laboratory is currently under investigation by the Department of Health and Human Services (HHS) for possible quality issues related to its manufacture of the test kits, which may have led to the contamination of one reagent and thus to the quality issues with the test. In this context, on February 29, 2020, in an effort to facilitate the expansion of testing capacity as the first cases of community spread were confirmed in the United States, the Food and Drug Administration (FDA) announced a significant new policy. This policy, issued via agency guidance and effective immediately, allows certain laboratoriesâprincipally clinical and commercial laboratoriesâthat have developed and validated their own COVID-19 diagnostics to begin to use the tests prior to the test receiving an Emergency Use Authorization (EUA) from the agency. Diagnostic testing for COVID-19, in part because it is caused by a novel pathogen, has been led and carried out to date through the country's public health infrastructure. This includes primarily the CDC and the country's network of state and local public health laboratories. In contrast, in most situations, diagnostic testing is carried out by a number of facilities, including private commercial laboratories (e.g., Quest, LabCorp), hospital and other clinical laboratories, and laboratories in academic medical centers, among others. FDA's February 29 guidance aims to facilitate the expansion of diagnostic testing from the public health setting into the clinical health care and commercial settings, leveraging significant standing resources throughout the country, including facilities, trained personnel, expertise, materials, and equipment. It is FDA's intention that this expansion will help the country meet the increasing and substantial demand for testing generated by community spread of the disease and expanded clinical testing guidelines issued by the CDC. In addition, because many cases of COVID-19 are reportedly mild or asymptomatic, widespread access to testingâwhich informs development of important metrics such as the case fatality rateâis critical to understanding the scope and extent of the disease in the United States, and to efficiently directing resources to mitigate its impact in the broader community. Diagnostic testsâformally called in vitro diagnostic (IVD) devicesâmay be commercially developed and distributed as \"kits\" or developed, validated, and carried out by a single laboratory. This second type of testâknown as a laboratory-developed test, or an LDTâis the more commonly used type of test because of its flexibility and differing federal regulatory requirements, among other reasons. Although the CDC's test is being manufactured as a test kit and initially has been distributed to specific CDC-qualified labs, the FDA guidance targets LDTs that are generally carried out in clinical and academic settings or private commercial laboratories. All clinical laboratories in the United States, regardless of whether they are part of the country's public health infrastructure or part of the health care delivery system, are regulated by the Clinical Laboratory Improvement Amendments of 1988 (CLIA) program, administered by the Centers for Medicare & Medicaid Services (CMS). Federal agencies involved in the regulation of IVDs include FDA and CMS. FDA derives its authority to regulate the sale and distribution of medical devices, such as IVDs, from the Federal Food, Drug, and Cosmetics Act (FFDCA) and the Public Health Service Act (PHSA). CMS's authority to regulate IVDs is through CLIA ( P.L. 100-578 ). FDA regulates the safety and effectiveness of diagnostic tests, as well as the quality of the design and manufacture of the diagnostic test. CMS regulates the quality of clinical laboratories and the clinical testing process. In vitro diagnostic devices are defined in FDA regulation as a specific subset of medical devices that include \"reagents, instruments, and systems intended for use in the diagnosis of disease or other conditions ... in order to cure, mitigate, treat, or prevent disease ... [s]uch products are intended for use in the collection, preparation, and examination of specimens taken from the human body.\" As indicated by this definition, an IVD may also include components of tests, which can include both non-diagnostic ingredients, called general purpose reagents (GPRs), and the active ingredient in a diagnostic test, referred to as the analyte specific reagent (ASR). In general, an IVD device may be a \"commercial test kit\" (a product developed, produced, and sold by a manufacturer for distribution to multiple laboratories) or a \"laboratory developed test\" (a product developed by and used in a single laboratory). LDTs may use components (e.g., general purpose reagents like a buffer) that are either manufactured in-house by the laboratory or commercially developed and distributed. A laboratory-developed test is a class of IVD that is designed, manufactured, and used within a single laboratory. LDTs are often used to test for conditions or diseases that are either rapidly changing (e.g., new strains of known infectious diseases) or the subject of quickly advancing scientific research (e.g., genomic testing for cancer). The majority of genetic testsâa type of IVD that analyzes various aspects of an individual's genetic material (e.g., DNA, RNA)âare LDTs. In general, oversight of in vitro diagnostic devices focuses on ensuring their safety and effectiveness; their accuracy and reliability; the quality of clinical laboratories that carry out IVD testing; the utility of the information generated by IVDs in clinician and patient decision-making; and the truthfulness of claims made about IVDs that are marketed directly to consumers. As with other medical devices, the application of FDA regulatory requirements to IVDs depends on the IVD's risk classification according to its intended use. Classification is based, in turn, on the risk the device poses to the patient. For IVDs, which are informational tests, the risk to the patient is that of an incorrect test result, either a false positive or a false negative result, either of which may cause serious harm to the individual. In the case of infectious diseasesâfor example, COVID-19âthe risk of a false negative test extends beyond the individual patient into the community at large. The FDA has three classes of medical device: Class I (low risk), Class II (moderate risk), and Class III (high risk). Regulatory controls are dependent on the class of a given medical device. COVID-19 diagnostics would most likely fall in Class III, as they would be considered to be high-risk devices. The regulation of laboratory-developed tests has been the subject of ongoing debate over the past 20 years, driven in large part by an increase in the number and complexity of genetic tests over this time. In general, the FDA has maintained that it has clear regulatory authority over LDTs, as it does with all IVDs that meet the definition of medical device in the FFDCA. However, the FDA traditionally exercised enforcement discretion over LDTsâchoosing not to enforce applicable statutory and regulatory requirements with respect to such testsâmeaning that most of these tests have neither undergone premarket review nor received FDA clearance or approval for marketing. To date, FDA has instead focused its enforcement efforts on commercial IVD kits, which are broadly commercially marketed. In recent years, despite the absence of specific agency guidance on the regulation of LDTs, FDA has nevertheless begun to assert authority over LDTs, and specifically over some direct-to-consumer (DTC) genetic tests, that it considers to be higher-risk tests. CLIA of 1988 provides CMS with authority to regulate clinical laboratories. CLIA establishes quality standards for clinical laboratory testing and a certification program for clinical laboratories that perform testing using IVD devices. All laboratories that perform diagnostic testing for health-related reasons (i.e., with results returned to the patient or a health care practitioner) are regulated by CMS under the authority of CLIA. For CLIA to apply, testing must be carried out on a human specimen. CLIA certification is based on the level of complexity of testing that the laboratory performs, specifically (1) low (therefore, waived) complexity, (2) moderate complexity, and (3) high complexity. FDA is responsible for categorizing tests according to their level of complexity. CLIA requirements are used to evaluate a test's analytical validity , defined as the ability of a test to detect or measure the analyte it is intended to detect or measure. Laboratories that perform moderate- and high-complexity testing must meet specific standards and requirements as a condition of certification, including proficiency testing (PT), patient test management, quality control, personnel qualifications, and quality assurance. All LDTs, including genetic tests offered as LDTs, are considered high-complexity tests under CLIA. All COVID-19 diagnostics would be considered to be high complexity tests under CLIA. In certain public health or other emergency situations, the HHS Secretary may declare that existing circumstances justify the use of unapproved medical products for certain uses, or approved medical products for unapproved uses. This declaration facilitates access to not-yet-approved medical products in an expedited manner during certain emergency situations. In the case of the COVID-19 disease, HHS Secretary Azar determined that \"there is a public health emergency and [declared] that circumstances exist justifying the authorization of emergency use of in vitro diagnostics for detection and/or diagnosis of the novel coronavirus.\" On the basis of this declaration, FDA issued an Emergency Use Authorization authorizing the emergency use of the CDC-developed diagnostic test for COVID-19. The FDA also issued an EUA to the state of New York for an LDT developed by the state public health labs. To date, these are the only two EUAs for coronavirus diagnostics that the FDA has issued. During an emergency, all laboratory-developed tests testing for the relevant pathogen (in this case, SARS-CoV-2) must either be approved, cleared, or authorized under an EUA to be legally carried out. As noted above, FDA generally waives most regulatory requirements (e.g., premarket review) for LDTs in normal situations; nevertheless, LDTs may only be used with authorization (e.g., an EUA) during an emergency declaration pursuant to FFDCA Section 564. That is, statutory requirements under FFDCA Section 564 apply to LDTs as they do to other medical products, and they apply to both commercial test kitsâwhich are normally subject to FDA regulatory requirementsâand to LDTs. The EUA process is usually used to expedite access to medical products that would otherwise need premarket approval or clearance in emergency situations. However, because premarket approval requirements for LDTs are generally waived through enforcement discretion by the agency, the EUA represents additional regulatory requirements for the use of an LDT in emergency situations. This is because, among other things, in the case of a communicable disease, the test result has implications beyond the individual being tested, and so a false negative result could have serious consequences for the community. Therefore, FDA states that these tests need an EUA in an emergency prior to clinical use as do other medical products. In contrast, for commercial test kits, the EUA represents an abbreviated mechanism that allows the unapproved product to be used without undergoing the FDA premarket review typically required (for a complex molecular test for a novel pathogen, that review would generally be a Premarket Approval, or PMA, for high-risk medical devices). Despite a request from the Association of Public Health Laboratories (APHL) to FDA, the agency declined to exercise enforcement discretion with respect to LDTs that detect SARC-CoV-2 and diagnose COVID-19 and the requirement that they receive an EUA prior to use. APHL maintains that these labs are regulated by CLIA, and that this regulatory oversight is sufficient. However, on February 29, 2020, FDA announced a new policy allowing certain laboratories that have developed and validated COVID-19 LDTs to begin to use the test clinically prior to it receiving an EUA from the agency but after validation of the test and notification of the agency (see \" What Steps Did FDA Take to Expand Testing Capacity in Response to the Problems with CDC's Test? \"). The diagnostic test developed by the CDC, called the 2019-Novel Coronavirus (2019-nCoV) Real-Time Reverse Transcriptase (RT)-PCR Diagnostic Panel, is a complex molecular diagnostic test that relies on generally standard molecular biology laboratory techniques. Specifically, the test uses a technique called Polymerase Chain Reaction (PCR), a standard in vitro technique for amplification of DNA. Because the SARS-CoV-2 virusâthe virus that causes COVID-19âis an RNA virus, the RNA must be first reverse transcribed to generate copy DNA, or cDNA, which is then amplified (multiple copies are generated) using PCR. PCR relies on primersâvery short single stranded pieces of DNA that are complementary to and bind with specific regions of the viral genome and thus define the specific genomic region to be amplified. The test then relies on a probe, or a single-stranded piece of DNA that is chemically or radioactively labelled, that can bind to and thus detect the amplified target portion of the viral genetic material. CDC's original test used three sets of primers and probes: two to target specific regions of a designated gene within the SARS-CoV-2 viral genome, and a third that was specific to all SARS-like coronaviruses (see \" What Quality Problems Did the CDC's Test Experience on Rollout to the State and Local Public Health Laboratories? \"). The test also includes a number of authorized control samples, including a positive control for SARS-CoV-2 and a \"no template control\" to test for system contamination. Together, these controls help ensure that the test is functioning properly. The CDC's test is being developed by the agency as a test kit and is generally authorized to be distributed to state and local public health laboratories to augment public health testing capacity. The test received an EUA from the FDA on February 4, 2020, under which \"authorized laboratories\" may receive and carry out the test despite the fact that it is not FDA-approved or FDA-cleared, and that it does not meet all related regulatory requirements for marketing. The EUA notes that \"[t]esting is limited to qualified laboratories designated by CDC and, in the United States, certified under the Clinical Laboratory Improvement Amendments of 1988 (CLIA), (42 U.S.C. Â§263a), to perform high complexity tests.\" CDC-qualified laboratories with a CLIA certification for high-complexity testing able to receive the test kits include U.S. state and local public health laboratories, Department of Defense (DOD) laboratories, and select international laboratories. The public health laboratories must verify the test themselves prior to using it, and are currently required to send presumptive positive cases back to the CDC in Atlanta for confirmatory testing by the agency. The Trump Administration had estimated that approximately 1 million tests would be broadly available imminently, facilitated by leveraging manufacturing of the CDC test kit by a private company, Integrated DNA Technologies (IDT), a manufacturer that has been working with CDC. According to HHS Secretary Azar on March 5, 2020, IDT will send the CDC test kit to \"hospitals, other labs around the country, commercial, public health â¦ labs\" by the end of the week of March 2. The test kit being manufactured by IDT, identical to the CDC test kit and referred to as \"IDT 2019-novel coronavirus kit,\" is being qualified by CDC in lots, and FDA reports that these CDC-qualified, IDT-manufactured test kits are covered by the CDC's EUA authorization of February 4, 2020. FDA notes that if a lab purchases a test kit from IDT, the laboratory does not need its own EUA to carry it out, but that \"[t]esting using CDC's EUA-authorized protocol and CDC qualified lots of reagents is considered to be testing done under the CDC's EUA. Labs performing such testing should follow any applicable conditions set forth in the EUA.\" LabCorp, a large commercial laboratory, is already reporting that it can perform the CDC test \"if needed to meet testing demand\" and that the test is only for use with \"authorized specimens collected from individuals who meet CDC criteria for COVID-19 testing.\" IDT is manufacturing test kits in two sizes, with the largest having a capacity of 500 reactions (approximately 250 individual patients). As noted above, the CDC's test kit used three sets of probes and primersâor reagentsâto detect and identify viral DNA beyond that specific to COVID-19. One of these reagents, the one meant to detect any SARS-like coronavirus including SARS-CoV-2, was returning inconclusive results. In response, the CDC validated a new protocol for their test that allows it to be run excluding the faulty reagent, running the test with only the other two diagnostic components. CDC has the authority to modify the test through enforcement discretion granted by FDA. The agency determined that the exclusion of this reagent does not affect the accuracy or the sensitivity and specificity of the test. Certain laboratories have continued to experience problems running the test, even when using the modified protocol, with at least one laboratory reporting that the first reagent was also returning inconclusive results. This problem severely limited the state and local public health laboratories' ability to carry out the CDC's test. In response to these issues, the New York State Department of Health requested and was granted the FDA's second EUA for its own laboratory-developed test, the New York SARS-CoV-2 Real-time RT-PCR Diagnostic Panel. Testing is limited under the EUA to two laboratories in New Yorkâthe Wadsworth Center, New York State Department of Public Health, and the New York City Department of Health and Mental Hygiene, Public Health Laboratories. New York was one of the states that had continued difficulty implementing CDC's original test kit, even with the modified protocol. In response, CDC is also manufacturing new test kits after reportedly resolving the manufacturing issue that affected the original test kit. This time, however, CDC is manufacturing test kits with only the two reagents that were unaffected by the quality issueâthat are specific to SARS-CoV-2âand those kits are being made available to qualified CDC labs through the International Reagent Resource. , These test kits are expected to result in the public health laboratories having capacity to test up to 75,000 patients. Some believe that the CDC's choice to develop and mitigate quality problems with its own COVID-19 diagnostic when an accepted diagnostic was available through the World Health Organization (WHO), which was efficiently distributing a German-developed test globally early in the outbreak, was a decision that cost the United States time in its response to the virus's introduction and spread in the country. Some speculated about the use of the third reagentâthat was to detect SARS-like coronavirusesâand whether it had been strictly necessary if the test was still accurate at diagnosing COVID-19 without that reagent included in the test at all, or if it had instead overcomplicated the test. In general, there have been questions raised about the CDC's handling of the development and distribution of its test, and its response to the quality problems that occurred, and the impact this may have had on the country's ability to detect community spread of the disease before it occurred more widely. On February 29, 2020, as problems with the rollout of the CDC-developed diagnostic test continued, FDA announced a new policy to immediately leverage LDTs developed in high-complexity commercial, reference, and clinical laboratories nationwide to expand testing capacity. Specifically, the new agency guidance allows CLIA-certified high-complexity laboratories that have developed and validated their own COVID-19 diagnostics to use the tests while the laboratory is preparing, and FDA is reviewing, their EUA submission. , The FDA guidance states that laboratories have 15 days after validating their test to submit an EUA application to FDA, and the guidance recommends confirming the test's first five negative and positive results against an EUA-authorized diagnostic. According to FDA, it \"does not intend to object to the use of these tests for clinical testing while the laboratories are pursuing an EUA with the FDA. Importantly, this policy only applies to laboratories that are certified to perform high-complexity testing consistent with requirements under Clinical Laboratory Improvement Amendments.\" The guidance includes detailed information about FDA's expected methods for test validation. Pursuant to this FDA guidance, on March 5, 2020, LabCorp announced that it had begun offering its LDT, the LabCorp 2019 Novel Coronavirus (COVID-19), NAA test \"for ordering by physicians or other authorized healthcare providers anywhere in the U.S.,\" and that it is currently pursuing an EUA with the agency for the test. This test is to take between three to four days to return results, and a health care provider must order and authorize it, and obtain the required specimen from the patient. Under the FDA's new guidance, Quest has also announced that it will begin testing for coronavirus with its own LDT, beginning March 9, 2020, and that it plans to pursue an EUA with the agency within 15 days, as required by the guidance.", "summary": "On December 31, 2019, the World Health Organization (WHO) was informed of a cluster of pneumonia cases in Wuhan City, Hubei Province of China. Illnesses have since been linked to a disease caused by a previously unidentified strain of coronavirus, designated Coronavirus Disease 2019, or COVID-19. Despite containment efforts in China, the United States, and elsewhere, by late February there were indications that the COVID-19 outbreak may have entered a new phase, with community spread occurring or suspected in several countries other than China, including in the United States. Diagnostic testing is a critical part of the public health response to and clinical management of COVID-19, caused by the SARS-CoV-2 virus. Efforts in the United States to develop and disseminate a test for COVID-19 have faced challenges. Manufacturing and quality issues with the nation's testâdeveloped by the Centers for Disease Control and Prevention (CDC)âresulted in significant delay in access to testing throughout the country. In this context, on February 29, 2020, in an effort to facilitate the expansion of testing capacity as the first cases of community spread were confirmed in the United States, the Food and Drug Administration (FDA) announced a new policy, issued via agency guidance and effective immediately, that would allow certain laboratoriesâprincipally clinical and large commercial and reference laboratoriesâthat have developed and validated their own COVID-19 diagnostic to begin to use the test prior to it receiving an Emergency Use Authorization (EUA) from the agency. FDA's February 29 guidance aims to facilitate the expansion of diagnostic testing from the public health setting into the clinical health care and commercial settings. Doing so may help the country meet the increasing and substantial demand for testing generated by community spread of the disease and expanded clinical testing guidelines issued by the CDC. This report does not address financing or coverage of diagnostic testing for COVID-19.", "document_type": "crs"}
{"report": "Every 10 years, the U.S. population is counted through the national census, and districts for the U.S. House of Representatives are readjusted to reflect the new population level and its distribution across states through the federal apportionment and state redistricting processes. The requirement to have proportional representation in the House is found in the U.S. Constitution, and constitutional provisions also underlie other elements of the census, apportionment, and redistricting practices. Figure 1 provides a generalized timeline for how these three interrelated processes occur, and the sections of the report that follow provide additional information on apportionment and redistricting. For additional information on the census process, see CRS Report R44788, The Decennial Census: Issues for 2020 , and CRS In Focus IF11015, The 2020 Decennial Census: Overview and Issues . Apportionment (or reapportionment) refers to the process of dividing seats in the U.S. House of Representatives among the states. Article 1, Section 2, of the U.S. Constitution, as amended by Section 2 of the Fourteenth Amendment, requires that seats for Representatives are divided among states, based on the population size of each state. House seats today are reallocated due to changes in state populations, since the number of U.S. states (50) has remained constant since 1959; in earlier eras, the addition of new states would also affect the reapportionment process, as each state is constitutionally required to receive at least one House seat. The 2010 census reported a 9.9% overall increase in the U.S. apportionment population since the 2000 census, to 309,183,463 individuals. The ideal (or average) district population size increased across all states following the 2010 census, even though some states experienced larger growth levels than others. The average congressional district population for the United States following the 2010 census was 710,767 individuals. The map in Figure 2 illustrates changes in states' ideal district size and changes in the number of House seats allocated to each state between the 1990 and 2010 apportionments. Twelve U.S. House seats shifted across states following the 2010 census; 10 states lost seats and 8 states gained seats, distributed as shown in Table 1 . Table 2 provides additional historical data on the number of states and number of seats affected by each apportionment since 1910. Regional patterns of population change observed following previous censuses continued in 2010, as the percentage of House seats distributed across the Northeast and Midwest regions decreased, and the percentage of House seats distributed across the South and West regions increased. California had the largest House delegation following the 2010 census, with 53 seats; Alaska, Delaware, Montana, North Dakota, South Dakota, Vermont, and Wyoming each had a single House seat. The constitutional requirements for representation in the House based on state population size are provided in Article I, Section 2, as amended by Section 2 of the Fourteenth Amendment. Article I, Section 2, specified the first apportionment of seats for the House of Representatives, and it also includes some standards for subsequent reapportionments. Article I, Section 2, requires that the national population be counted at least once every 10 years in order to distribute House seats across states. Broad parameters for the number of House Members are also contained in Article I, Section 2: there can be no more than one Representative for every 30,000 persons, provided that each state receives at least one Representative. Federal statute establishes a number of other elements of the apportionment process, including how to count the population every 10 years via the decennial census; how many seats are in the House; how those House seats are divided across states; and certain related administrative details. In the 19 th century, Congress often passed measures each decade to address those factors, specifically for the next upcoming census and reapportionment. By the early 20 th century, however, Congress began to create legislation to standardize the process and apply it to all subsequent censuses and reapportionments, unless modified by later acts. One example of such legislation was the permanent authorization of the U.S. Census Bureau in 1902, which helped establish a recurring decennial census process and timeline. Other legislation established the current number of 435 House seats; this number was first used following the 1910 census and subsequently became fixed under the Permanent Apportionment Act of 1929. Congress also created a more general reapportionment formula and process to redistribute seats across states. The timeline for congressional reapportionment and current method for allocating seats among states were contained in the Apportionment Act of 1941, which would then apply to every reapportionment cycle, beginning with the one following the 1950 census. The size of the House, method for reapportionment, and timeline for reapportionment are codified in 2 U.S.C. Â§2a and are further detailed in the section below, alongside the relevant census procedures codified in Title 13 of the U.S. Code . The apportionment steps detailed below are also summarized by the timeline in Figure 1 . Under federal law, April 1 in any year ending in \"0\" marks the official decennial census date and the beginning of the population counting process. The U.S. Census Bureau calculates the apportionment population for the United States from the information it collects in the decennial census and certain administrative records. The apportionment population reflects the total resident population in each of the 50 states, including minors and noncitizens, plus Armed Forces personnel/dependents living overseas and federal civilian employees/dependents living overseas. The Secretary of Commerce must report the apportionment population to the President within nine months of the census date (by December 31 of the year ending in \"0\"). In past years, the Census Bureau has released apportionment counts to the public at about the same time they are presented to the President. Under requirements in the Constitution, each state must receive at least one House Representative, and under statute, the current House size is set at 435 seats. To determine how the 51 st through 435 th seats are distributed across the 50 states, a mathematical approach known as the method of equal proportions is used, which is specified in statute. Essentially, under this method, the \"next\" House seat available is apportioned to the state ranked highest on a priority list . The priority list rankings are calculated by taking each state's apportionment population from the most recent census, and multiplying it by a series of values. The multipliers used are the reciprocals of the geometric means between every pair of consecutive whole numbers, with those whole numbers representing House seats to be apportioned. The resulting priority values are ordered from largest to smallest, and with the House size set at 435, the states with the top 385 priority values receive the available seats. See the Appendix for additional information on the method of equal proportions and other methods proposed or used in previous apportionments. The President then transmits a statement to Congress showing (1) \"the whole number of persons in each State,\" as determined by the decennial census and certain administrative records; and (2) the resulting number of Representatives each state would be entitled to under an apportionment, given the existing number of Representatives and using the method of equal proportions. The President submits this statement to Congress within the first week of the first regular session of the next Congress (typically, early January of a year ending in \"1\"). Within 15 calendar days of receiving the President's statement, the Clerk of the House sends each state governor a certificate indicating the number of Representatives the state is entitled to. Each state receives the number of Representatives noted in the President's statement for its House delegation, beginning at the start of the next session of Congress (typically, early January of a year ending in \"3\"). States may then engage in their own redistricting processes, which vary based on state laws. Federal law contains requirements for how apportionment changes will apply to states in the event that any congressional elections occur between a reapportionment and the completion of a state's redistricting process. In these instances, states with the same number of House seats would use the existing congressional districts to elect Representatives; states with more seats than districts would elect a Representative for the \"new\" seat through an at-large election and use existing districts for the other seats; and states with fewer seats than districts would elect all Representatives through an at-large election. Congressional redistricting involves creating or redrawing geographic boundaries for U.S. House districts within a state. Redistricting procedures are largely determined by state law and vary across states, but states must comply with certain parameters established by federal statute and court decisions. In general, there is variation among states regarding the practice of drawing districts and which decisionmakers are involved in the process. Across states, there are some common standards and criteria for districts, some of which reflect values that are commonly thought of as traditional districting practices. Districting criteria may result either from shared expectations and precedent regarding what districts should be like, or they may result from certain standards established by current federal statute and court decisions. These criteria typically reflect a goal of enabling \"fair\" representation for all residents, rather than allowing arbitrary, or discriminatory, map lines. Redistricting efforts intended to unfairly favor one group's interests over another's are commonly referred to as gerrymandering . Packing and cracking are two common terms that describe such districts, but there are various ways in which district boundaries might be designed to advantage or disadvantage certain groups of voters. Packing describes district boundaries that are drawn to concentrate individuals who are thought to share similar voting behaviors into certain districts. Concentrating prospective voters with shared preferences can result in a large number of \"wasted votes\" for these districts, as their Representatives will often be elected by a supermajority that far exceeds the number of votes required for a candidate to win. Cracking may be thought of as the opposite of packing, and occurs when individuals who are thought to share similar voting preferences are deliberately dispersed across a number of districts. This approach dilutes the voting strength of a group and can prevent its preferred candidates from receiving a majority of the vote in any district. For some states, redistricting following an apportionment may be necessary to account for House seats gained or lost based on the most recent census population count. Generally, however, states with multiple congressional districts engage in redistricting following an apportionment in order to ensure that the population size of each district remains approximately equal under the equality standard or \"one person, one vote\" principle (discussed under \" Population Equality \" below). Some states might make additional changes to district boundaries in the years following an initial redistricting; in some instances, such changes are required by legal decisions finding that the initial districts were improperly drawn. From time to time, Congress considers legislation that would affect apportionment and redistricting processes. The Constitution requires the apportionment of House seats across states based on population size, but it does not specify how those seats are to be distributed within each state. Most redistricting practices are determined by state constitutions or statutes, although some parts of the redistricting process are affected by federal statute or judicial interpretations. The current system of single-member districts (rather than a general ticket system, where voters could select a slate of Representatives for an entire state) is provided by 2 U.S.C. Â§2c. In addition to requiring single-member districts, Congress has, at times, passed legislation addressing House district characteristics. For example, in the 1800s and early 1900s, some federal apportionment statutes included other standards for congressional districts, such as population equality or geographic compactness. None of these criteria is expressly contained in the current statute addressing federal apportionment. Many of the other federal parameters for congressional redistricting have resulted from judicial decisions. It is not uncommon for states to face legal challenges regarding elements of their redistricting plans. One analysis of the 2010 redistricting cycle, for example, found that redistricting lawsuits had been filed in 38 states, and legal challenges to congressional districts in several states continued into 2019. This report is not intended to be a legal analysis. For additional information on redistricting law, see CRS Report R44199, Congressional Redistricting: Legal and Constitutional Issues , and CRS Report R44798, Congressional Redistricting Law: Background and Recent Court Rulings . One area of redistricting addressed by federal standards is population equality across districts. Legislative provisions, requiring that congressional districts \"[contain] as nearly as practicable an equal number of inhabitants,\" were found in federal apportionment acts between 1872 and 1911. The U.S. Supreme Court has also addressed population size variance among congressional districts within a state, or malapportionment . Under what is known as the \"equality standard\" or \"one person, one vote\" principle, the Court has found congressional districts within a state should be drawn to approximately equal population sizes. Mathematically, there are several ways in which the population difference across districts (or deviation from an ideal district size) may be expressed. These equal population standards apply only to districts within a state, not to districts across states. To illustrate how district population sizes can vary across states, Table 3 provides Census Bureau estimates from 1910 to 2010 for the average district population size nationwide, as well as estimates for which states had the largest and smallest average district population sizes. Wide variations in state populations and the U.S. Constitution's requirement of at least one House seat per state make it difficult to ensure equal district sizes across states, particularly if the size of the House is fixed. The expectation that districts in a state will have equal population sizes reinforces the long-standing practice that states redraw district boundaries following each U.S. Census, in order to account for the sizable population shifts that can occur within a 10-year span. To assist states in drawing districts that have equal population sizes, the Census Bureau provides population tabulations for certain geographic areas identified by state officials, if requested, under the Census Redistricting Data Program, created by P.L. 94-171 in 1975. Under the program, the Census Bureau is required to provide total population counts for small geographic areas; in practice, the Bureau also typically provides additional demographic information, such as race, ethnicity, and voting age population, to states. The Voting Rights Act of 1965 (VRA) also affects how congressional districts are drawn. One key statutory requirement for congressional districts comes from Section 2 of the VRA, as amended, which prohibits states or their political subdivisions from imposing any voting qualification, practice, or procedure that results in denial or abridgement of the right to vote based on race, color, or membership in a language minority. Under the VRA, states cannot draw district maps that have the effect of reducing, or diluting, minority voting strength. In addition to requirements of population equality and compliance with the VRA, several other redistricting criteria are common across many states today, including compactness, contiguity, and observing political boundaries. Some of the common redistricting criteria specified by states are presented in Table 4 . These factors are sometimes referred to as traditional districting principles and are often related to geography. The placement of district boundaries, for example, might reflect natural features of the state's land; how the population is distributed across a certain land area; and efforts to preserve existing subdivisions or communities (such as town boundaries or neighborhood areas). Redistricting laws in many states currently include such criteria, but they are not explicitly addressed in current federal statute. Previous federal apportionment statutes, however, sometimes contained similar provisions. As a districting criterion, compactness reflects the idea that a congressional district should represent a geographically consolidated area. Compactness of congressional districts is a requirement in 30 states, but often, state laws do not specify precise measures of compactness. Generally, a compact district would tend to have smoother boundaries and might resemble a standard geometric shape more than a less compact district. In some conceptualizations, a compact district would have an identifiable \"center\" that seems reasonably equidistant from any of its boundaries. Federal apportionment acts between 1842 and 1911 contained a provision requiring that congressional districts be of \"contiguous territory,\" and most states have included similar language in their current redistricting laws. For a district to be contiguous, it generally must be possible to travel from any point in the district to any other place in the district without crossing into a different district. Most states require that redistricting practitioners take into account existing political boundaries, such as towns, cities, or counties. In many instances, districts may not be able to be drawn in ways that encompass entire political subdivisions, given other districting standards, like population equality, that could take precedence. Maintaining political subdivisions can also help simplify election administration by ensuring that a local election jurisdiction is not split among multiple congressional districts. Some state laws direct redistricting authorities to preserve the \"core\" of existing congressional districts; other states prohibit drawing district boundaries that would create electoral contests between incumbent House Members. Some states include the preservation of communities of interest as a criterion in their redistricting laws. People within a community of interest generally have a shared background or common interests that may be relevant to their legislative representation. These recognized similarities may be due to shared social, cultural, historical, racial, ethnic, partisan, or economic factors. In some instances, communities of interest may naturally be preserved by following other redistricting criteria, such as compactness or preserving political subdivisions. Some states include measures providing that districts cannot be drawn to unduly favor a particular candidate or political party. The term gerrymander originated to describe districts drawn to favor a particular political party, and it is often used in this context today. Redistricting has traditionally been viewed as an inherently political process, where authorities have used partisan considerations in drawing district boundaries. Districts generally may be drawn in a way that is politically advantageous to certain candidates or political parties, unless prohibited by state law. Some states, for example, expressly allow the use of party identification information in the redistricting process, whereas others prohibit it; similarly, some states may allow for practices to protect an incumbent or maintain the \"core\" of an existing district, whereas other states prohibit any practices that would favor or disfavor an incumbent or candidate. Redistricting processes are fundamentally the responsibility of state governments under current law and practice. Among the 43 states with multiple House districts, a variety of approaches are taken, but generally, states either allow their state legislatures or a separate redistricting commission to determine congressional district boundaries. The map in Figure 3 displays the redistricting methods currently used across states. Historically, and in the majority of states today, congressional district boundaries are primarily determined by state legislatures. Currently, 37 states authorize their state legislatures to establish congressional district boundaries. Most of these states enable the governor to veto a redistricting plan created by the legislature; Connecticut and North Carolina do not allow a gubernatorial veto. Other states, in recent years, have begun to use redistricting commissions, which may be more removed from state legislative politics. In eight states that currently have multiple congressional districts (Arizona, California, Colorado, Hawaii, Idaho, Michigan, New Jersey, and Washington), redistricting commissions are primarily responsible for redrawing congressional districts; Montana's state constitution provides for an independent redistricting commission to draw congressional district boundaries, if reapportionment results in multiple seats for the state. In five other states (Maine, New York, Rhode Island, Utah, and Virginia), a commission serves in an advisory capacity during the redistricting process. Commissions may also be used as a \"backup\" or alternate means of redistricting if the legislature's plan is not enacted, such as in Connecticut, Indiana, and Ohio. The composition of congressional redistricting commissions can also vary; many include members of the public selected by a method intended to be nonpartisan or bipartisan, whereas other commissions may include political appointees or elected officials, such as in Hawaii and New Jersey. A commission's membership, the authority granted to it, its relationship to other state government entities, and other features may affect whether a commission is perceived to be undertaking an objective process or a more politicized one. Some proponents of redistricting commissions believe that using independent redistricting commissions can prevent opportunities for partisan gerrymandering and may create more competitive and representative districts. Others, however, believe that political considerations can remain in commission decisionmaking processes, and that the effect of redistricting methods on electoral competitiveness is overstated. For more information on redistricting commissions, see CRS Insight IN11053, Redistricting Commissions for Congressional Districts . The timeline for redistricting also varies across states, and can be affected by state or federal requirements regarding the redistricting process; the efficiency of the legislature, commission, or other entities involved in drawing a state's districts; and, potentially, by legal or political challenges made to a drafted or enacted redistricting plan. In general, the redistricting process would usually begin early in a year ending in \"1,\" once each state has learned how many seats it is entitled to under the apportionment following the decennial census. Many states complete the process within the next year. After the 2010 reapportionment, for example, Iowa was the first state to complete its initial congressional redistricting plan on March 31, 2011, and 31 other states completed their initial plans by the end of 2011. The remaining 11 states with multiple congressional districts completed their initial redistricting plans by the middle of 2012, with Kansas becoming the final state to complete its initial plan on June 7, 2012. Some states may redistrict multiple times between apportionments, if allowed under state law or required by a legal challenge to the preliminary redistricting. Although redistricting processes in practice today are largely governed by state law, Congress has, at times, considered an expanded federal government role, which could serve to standardize certain elements of the redistricting process across states. Given the historically limited role the federal government has played in the redistricting process, concerns about federalism may arise in the context of certain congressional efforts addressing redistricting. The types of legislative proposals briefly introduced in this section reflect some common examples of redistricting bills introduced in recent Congresses; they are not meant to be an exhaustive list of all the options Congress has considered or could consider related to redistricting. Some legislative proposals in recent Congresses would establish criteria for districts, such as population equality, compactness, contiguity, or preservation of existing political subdivisions. Bills have also been introduced that would require states to use independent redistricting commissions and/or maintain certain standards of public input and transparency regarding the redistricting process. Some congressional bills include provisions to prevent states from redistricting more than once following an apportionment, which is a practice sometimes referred to as \"mid-decade redistricting.\" Other bills would expand oversight by the Department of Justice under certain circumstances related to existing requirements of, or proposed amendments to, the VRA. Most of these bills have been referred to committee but not passed by either chamber. In the 116 th Congress, H.R. 1 served as a subject of multiple committee hearings and was passed by the House. H.R. 1 is a multifaceted bill that addresses multiple areas of election administration, among other topics; with respect to redistricting, it would require states to use independent redistricting commissions, adopt certain redistricting criteria, and prohibit mid-decade redistricting. Apportionment and redistricting address fundamental elements of representational democracy. Determining how many elected representatives should serve in the House, and how many people should be in each congressional district, are central questions for those who are concerned with how responsive the House can be to the interests of the American public. During earlier eras in the United States, the number of seats in the House of Representatives generally increased as the American population increased, and district sizes could be kept more equal over time and across states. The House size, however, has been set at 435 seats throughout the last century, while the national population has continued to grow and concentrate in certain geographic areas, leading to larger constituencies across all House districts over time and disparate district sizes across states. Certain elements of the apportionment process are established by the U.S. Constitution. This includes the requirement for representation in the House based on state population size; the reallocation of House seats every 10 years upon the completion of a national population count; and the requirements that each state receives at least one Representative and that there can be no more than one Representative for every 30,000 persons. Other elements of the process are addressed through congressional legislation, such as the overall number of House seats or method of distributing seats among the states. Congress more regularly legislated in this area prior to the mid-20 th century, passing decennial acts to address upcoming censuses and apportionments, rather than creating bills intended to apply for all future reapportionment cycles. Whereas apportionment is a process largely governed by federal statute, redistricting is a process, in practice, largely governed by state law. Certain federal standards apply to House districts, generally in the interest of preserving equal access to representation, but the method and timeline by which those districts are created is largely determined by state law. In states with multiple congressional districts, there are a multitude of ways in which district boundaries can be drawn, depending upon the criteria used to create the districts. There is often an expectation that congressional districts will be drawn in a way that ensures \"fair\" representation, but \"fairness\" can be a somewhat subjective determination. Many lawmakers and members of the public may agree on some of the more basic representational principles embedded in apportionment and redistricting law, but can find it difficult to apply those principles in practice. The criteria commonly used for redistricting today reflect a combination of state and federal statutes, judicial interpretations, and practices from past redistricting cycles that may require trade-offs between one consideration and another. Ensuring equal population size across all congressional districts, for example, may be an agreeable goal for many individuals. In practice, however, the geographic and demographic distribution of residents within and across states, coupled with requirements to observe state boundaries, provide all states with at least one Representative, and maintain a constant number of House seats, make this goal more difficult to achieve. Although mapmaking software today can design districts with increasing precision with respect to geographic boundaries and population characteristics, this technological capacity has not necessarily simplified the overall task of redistricting. A majority of states faced legal challenges to congressional district maps drawn following the 2010 census, and several cases remained pending in 2019, reflecting differing perspectives on fairness, representational access, and how competing redistricting criteria should be weighted. Congress is a bicameral legislature, in which each state receives equal representation in the Senate and each state's representation in the House is based upon its population. Essentially, any method of apportionment for the House must consider three key variables: (1) the number of House seats; (2) the number of U.S. states; and (3) the apportionment population of each state. A mathematical decision must also be made regarding how fractions of seats are addressed, since House seats must be allocated as whole numbers, and simple division methods are unlikely to produce this outcome for all (or any) states. Because the Constitution does not specify a particular method for apportionment, several options have been considered and utilized throughout history. When determining apportionment, parameters could be set for the number of seats in the House, the population size of a district, or both. The Constitution, to an extent, addresses House size and district size by requiring that each state receives at least one House seat and requiring that there can be no more than one Representative per every 30,000 persons. Yet these provisions provide little practical guidance for what the size of the House or the size of a district should be. Based on the number of states and U.S. apportionment population from the 2010 Census, for example, the House could range from a minimum of 50 seats to a maximum size of over 10,000 seats. As a general principle, House size and district size are inversely related: a larger number of House seats means smaller population sizes for districts, and a smaller number of House seats means larger population sizes for districts. Attempts by the Framers and various Congresses to address apportionment reveal a number of perspectives on how best to create a representative legislature, along with political and logistical considerations related to changes in the size of the House. Prioritizing Equal-Sized Districts or Preserving a Fixed House Size An apportionment method prioritizing relatively equal district population size would establish a representation ratio, where there would be one Representative per x number of persons. If the ratio remains the same across apportionment cycles, increases or decreases in the U.S. apportionment population would result in corresponding increases or decreases to the total number of House seats. The representation ratio could also be adjusted to create larger or smaller districts, in order to limit the magnitude of changes to the overall size of the House. If states receive fractional allocations of House seats and there is no constraint on the size of the House, a simple rounding rule could be utilized to arrive at a whole number of seats for the House overall. A general example of an apportionment approach prioritizing relatively equal district size follows: 1. determine an ideal district population size, d ; 2. divide each state's apportionment population, p s1 , p s2 â¦ p s50, by d to determine how many House seats a state would be entitled to (its \"quota\" of seats), q ; and 3. determine a rounding rule to apply for states in which q is not a whole number. Until the early 20 th century, the size of the House generally increased with each apportionment, due to the addition of new states and population growth, but today, the number of House seats is set at 435 by federal statute. Arguments to expand the House have included expanding the range of interests that House Members would represent and ensuring that Members remained knowledgeable about local issues. Yet concerns have also been raised that it would not be feasible to increase the House size apace with national population growth. To be sure that a particular apportionment conforms to a specified size of the House, each state must receive a whole number of seats, and the sum of all states' seats must equal the desired total House size. Many apportionment approaches vary on how to address fractional seats, as remainders will often result when calculating state seat quotas. A general example of an apportionment approach to reach a certain House size follows: 1. a set number of House seats, H , is agreed upon; 2. divide the national apportionment population, p USA , by H to determine an \"ideal\" or average district population size, d , also known as the \"initial divisor\"; 3. divide each state's apportionment population, p s1 , p s2 â¦ p s50, by d to determine how many House seats a state would be entitled to (its \"quota\" of seats), q ; 4. determine a rounding rule to apply to any q values that are not whole numbers (to represent actual House seats, which cannot be divided); and 5. add these rounded (or adjusted), q values; if this sum does not equal H , determine a method to adjust state quotas so that the sum of the resulting q values equals H . The following discussions provide an introduction to several methods that have been used for congressional apportionment in the United States. To illustrate how these methods work, for each method an imaginary example is provided in the accompanying table, in which the size of the House is fixed at 20 Members and the seats are divided among four states (states A, B, C, and D) with the populations specified in the tables. Hamilton/Vinton Method (Ranking Fractional Remainders) Congress considered various methods of apportionment after the first census of 1790 and passed an initial apportionment bill in 1792 that would have utilized what is now known as the Hamilton/Vinton method. President George Washington, however, exercised his first veto on the measure, in part, because the resulting apportionment calculations would have violated the requirement of at least 30,000 persons per district for multiple states. Representative Samuel Vinton later introduced legislation proposing this method, which was enacted, and this apportionment method was first used in 1850 and continued to inform apportionment considerations throughout the rest of the 19 th century, in conjunction with the Webster method (discussed below). The Hamilton/Vinton method is based on a fixed House size, H . Each state receives the whole number of seats in its quota, q , of seats. The remainders from q are rank-ordered from largest to smallest, and any additional House seats are apportioned to the states with the largest remainders. Jefferson Method (Largest Divisors) Following the presidential veto of the Hamilton method, Congress adopted the Jefferson method of apportionment, which was used from 1792 to 1832. The Jefferson method for apportionment is based on a fixed House size, H , and each state's quota of seats, q , is rounded down to the nearest whole number. Often, the sum of the rounded-down q values is less than H . When this occurs, divisor values smaller than d are tested until an adjusted divisor, d adj , is found that results in a set of q values which, when rounded down, sum to H . Webster Method (Major Fractions) Some believed that the Jefferson method favored large states, and the Webster method was an approach first used for apportionment in 1842 and last used for apportionment following the 1930 census. The Webster method is similar to the Hamilton/Vinton method but differs in how it addresses remainders of seats. Each state receives the whole number of seats in its quota, q ; then, q remainders greater than or equal to 0.5 are rounded up to the next whole number, and those states receive an additional seat. The example provided in Table A-3 happens to result in the same number of House seats as the other examples in this appendix, which treat the House size, H , as fixed at 20 seats, but performing these initial calculations under the Webster method could result in a subsequent adjustment to the number of House seats. If the House size remains fixed, and the initial sum of seats produced by the Webster method does not equal the desired number of seats, an adjusted divisor, d adj , can be used to calculate q values that, when rounded and summed, result in a specific House size. Huntington-Hill Method (Method of Equal Proportions) In addition to treating large and small states similarly, some have also believed that an apportionment method should minimize percentage differences in district population sizes (across states) as much as possible. The method of equal proportions, also known as the Huntington-Hill method, seeks to achieve this objective, and has been used for all House apportionments since 1941. This method differs from the Webster method by rounding up remainders for a state's quota, q , at the geometric mean, G , rather than at the arithmetic mean. The geometric mean is found by multiplying two successive numbers together, then taking the square root of their product; here, the successive numbers represent a state's q rounded down to the nearest whole number (its \"lower\" quota) and a state's q rounded up to the nearest whole number (its \"upper\" quota). Each state receives its \"lower\" quota of seats and then may receive an additional seat if its quota, q , is greater than or equal to its geometric mean, G . The initial calculation for a state's quota, q , under the method of equal proportions, is made by using the \"ideal\" district size, d , as the divisor. Table A-4 provides a sample apportionment in which the sum of the rounded geometric means happens to result in the desired House size, H , of 20 seats, but, in practice, this often does not occur. If the sum of the rounded geometric means for each state does not result in the desired number of House seats, there is an additional step: seats can be apportioned using a priority list , which essentially ranks each state's claim to the \"next\" House seat apportioned (i.e., the 51 st -435 th seats), after each state receives the one seat it is constitutionally entitled to. To generate a priority list, each state's apportionment population is multiplied by a series of multiplier values. The multiplier values are created using the reciprocal of the geometric mean associated with each potential successive seat number for the state (above its constitutionally mandated first seat). For example, the multiplier value for a second House seat in any state would be 1/â(1 x 2) or 0.707, the multiplier for a third House seat would be â(2 x 3) or 0.408, and so on. The products that result from multiplying these values by each state's apportionment population are ranked from largest to smallest to create the priority list, and seats are distributed until H number of seats (currently 385, the number needed to get to a total of 435 seats once each of the 50 states receives its constitutionally required seat) have been apportioned.", "summary": "The census, apportionment, and redistricting are interrelated activities that affect representation in the U.S. House of Representatives. Congressional apportionment (or reapportionment) is the process of dividing seats for the House among the 50 states following the decennial census. Redistricting refers to the process that follows, in which states create new congressional districts or redraw existing district boundaries to adjust for population changes and/or changes in the number of House seats for the state. At times, Congress has passed or considered legislation addressing apportionment and redistricting processes under its broad authority to make law affecting House elections under Article I, Section 4, of the U.S. Constitution. These processes are all rooted in provisions in Article I, Section 2 (as amended by Section 2 of the Fourteenth Amendment). Seats for the House of Representatives are constitutionally required to be divided among the states, based on the population size of each state. To determine how many Representatives each state is entitled to, the Constitution requires the national population to be counted every 10 years, which is done through the census. The Constitution also limits the number of Representatives to no more than one for every 30,000 persons, provided that each state receives at least one Representative. Additional parameters for the census and for apportionment have been established through federal statutes, including timelines for these processes; the number of seats in the House; and the method by which House seats are divided among states. Congress began creating more permanent legislation by the early 20 th century to provide recurring procedures for the census and apportionment, rather than passing measures each decade to address an upcoming reapportionment cycle. Federal law related to the census process is found in Title 13 of the U.S. Code , and two key statutes affecting apportionment today are the Permanent Apportionment Act of 1929 and the Apportionment Act of 1941. April 1 of a year ending in \"0\" marks the decennial census date and the start of the apportionment population counting process; the Secretary of Commerce must report the apportionment population of each state to the President by the end of that year. Within the first week of the first regular session of the next Congress, the President transmits a statement to the House relaying state population information and the number of Representatives each state is entitled to. Each state receives one Representative, as required by the Constitution, and the remaining seats are distributed using a mathematical approach known as the method of equal proportions, as established by the Apportionment Act of 1941. Essentially, a ranked \"priority list\" is created that indicates which states will receive the 51 st -435 th House seats, based on a calculation involving the population size of each state and the number of additional seats a state has received. The U.S. apportionment population from the 2010 census was 309,183,463, reflecting a 9.9% increase since 2000, and 12 House seats were reapportioned among 18 states. After a census and apportionment are completed, state officials receive updated population information from the U.S. Census Bureau and the state's allocation of House seats from the Clerk of the House. Single-member House districts are required by 2 U.S.C. Â§2c, and certain other redistricting standards, largely related to the composition of districts, have been established by federal statute and various legal decisions. Current federal parameters related to redistricting criteria generally address population equality and protections against discrimination for racial and language minority groups under the Voting Rights Act of 1965 (VRA), as amended. Previous federal apportionment statutes have, at times, included other district criteria, such as geographic compactness or contiguity, and these standards have sometimes been referred to in U.S. Supreme Court cases, but they are not included in the current federal statutes that address the apportionment process. These redistricting principles and others, such as considering existing political boundaries, preserving communities of interest, and promoting political competition, have been commonly used across states, and many are reflected in state laws today. The procedural elements of redistricting are generally governed by state laws, and state redistricting practices can vary regarding the methods used for drawing districts, timeline for redistricting, and which actors (e.g., elected officials, designated redistricting commissioners, and/or members of the public) are involved in the process. Mapmakers must often make trade-offs between one redistricting consideration and others, and making these trade-offs can add an additional challenge to an already complicated task of ensuring \"fair\" representation for district residents. Despite technological advances that make it easier to design districts with increasing geographic and demographic precision, the overall task of redistricting remains complex and, in many instances, can be controversial. A majority of states, for example, faced legal challenges to congressional district maps drawn following the 2010 census, and several cases remained pending in 2019âless than a year before the next decennial census date.", "document_type": "crs"}
{"report": "The Department of Veterans Affairs (VA) provides a range of benefits and services to veterans who meet certain eligibility criteria. These benefits and services include, among other things, hospital and medical care; disability compensation and pensions; education; vocational rehabilitation and employment services; assistance to homeless veterans; home loan guarantees; administration of life insurance, as well as traumatic injury protection insurance for servicemembers; and death benefits that cover burial expenses. The department carries out its programs nationwide through three administrations and the Board of Veterans' Appeals (BVA). The Veterans Health Administration (VHA) is responsible for health care services and medical and prosthetic research programs. The Veterans Benefits Administration (VBA) is responsible for, among other things, providing disability compensation, pensions, and education assistance. The National Cemetery Administration (NCA) is responsible for maintaining national veterans cemeteries; providing grants to states for establishing, expanding, or improving state veterans cemeteries; and providing headstones and markers for the graves of eligible persons, among other things. In addition to providing health care services to veterans and certain eligible dependents, the VHA must, by statute, serve as a contingency backup to the Department of Defense (DOD) medical system during a national security emergency and provide support to the National Disaster Medical System and the Department of Health and Human Services (HHS) as necessary in response to national crises. The department must also take appropriate actions to ensure VA medical centers are prepared to protect veteran patients and staff during a public health emergency. On December 31, 2019, the World Health Organization (WHO) learned of a cluster of pneumonia cases in Wuhan City, Hubei Province of China. The WHO has since linked these illnesses to a disease, called Coronavirus Disease 2019 or COVID-19, caused by a previously unidentified strain of coronavirus, designated SARS-CoV-2. On January 30, 2020, an Emergency Committee convened by the WHO Director-General declared the COVID-19 outbreak to be a Public Health Emergency of International Concern (PHEIC). On January 31, the Secretary of Health and Human Services declared a public health emergency under Section 319 of the Public Health Service Act (42 U.S.C. Â§247d). On March 11, 2020, the WHO characterized the COVID-19 outbreak as a pandemic. Two days later, on March 13, the President declared the COVID-19 outbreak a national emergency, beginning March 1, 2020. The VHA plays a significant role in the domestic response to a pandemic. The VHA is one of the largest integrated direct health care delivery systems in the nation, caring for more than 7.1 million patients in FY2020 and providing 123.8 million outpatient visits at approximately 1,450 VA sites of care. The VHA employs a workforce of 337,908 full-time equivalent employees (FTEs), largely composed of health care professionals. In addition, the VHA has a statutory mission to contribute to the overall federal emergency response capabilities. This report provides an overview of VA's and Congress's response thus far to the rapidly evolving COVID-19 pandemic. The report does not provide an exhaustive description of all of the department's activities, and it is based on publicly available information and daily updates provided from the VA. The report is organized as follows: first, it provides details on VHA's, VBA's, and NCA's response activities; second, it provides details on VA's emergency preparedness (\"Fourth Mission\") activities to provide support to the overall federal emergency response; and third, it describes congressional activity related to VA and veterans programs and services. The COVID-19 pandemic is a rapidly evolving situation and information changes on a daily, or often hourly, basis. The Appendix provides a summary of VHA's emergency authorities. VHA's provision of medical care to veterans in response to the COVID-19 outbreak includes implementing mitigation strategies at VHA sites of care, as well as testing and treating veterans diagnosed with or suspected of having COVID-19. (A general description of medical care to veterans is provided in other CRS reports. ) In late February 2020, the VA provided information to congressional oversight committees on the number of positive and presumptive positive cases of COVID-19. On March 13, 2020, the department began publishing this information publicly on its website, which it updates on a regular basis. The VA has been providing regular updates to congressional oversight committees since that time. The VA has published two public documents that provide valuable information to patients and the public regarding the response to COVID-19: (1) a COVID-19 response plan that provides operational details for both medical care for veterans, as well as other VHA missions, and (2) Coronavirus Frequently Asked Questions (FAQ) for patients. The VA COVID-19 response plan is summarized in more detail in the \" Emergency Preparedness (\"Fourth Mission\") \" section of this report. This section describes current health system capacity (including staffing changes), guidance for patients, mitigation at VHA sites of care (including limitations to community care), and testing and treatment for COVID-19. This subsection reflects point-in-time information provided by the VA to reflect the current capacity of the system. As of April 14, 2020, veterans and VHA employees at sites of care spanning the United States have been diagnosed with COVID-19. The vast majority of COVID-19-positive veterans are being treated in outpatient settings, with a minority in VA inpatient intensive care unit (ICU) and acute care settings. The COVID-19 pandemic is a rapidly evolving situation and information changes on a daily, or often hourly, basis. In response to the pandemic, the VA increased the number of ICU and acute care beds that are typically available. As of April 29, 2020, bed capacity across the health system is 12,215, with far less than half occupied. No regional or local level occupancy data have been reported. The VA started deploying Vet Centers, which provide a range of counseling services, in locations facing large COVID-19 outbreaks. The VA is reporting that the health system has adequate levels of personal protective equipment (PPE), including N95 respirators. Earlier media reports, citing internal VA memoranda, stated that the VA has a shortage of PPE and hospitals are being directed to decide which employees get certain supplies. The media reports suggested that only employees that work directly with COVID-19 patients are to be provided N95 respirators. An April 16, 2020, memorandum to Veterans Integrated Service Networks (VISN) directors from the VA Deputy Under Secretary for Health for Operations and Management confirmed that the VA received a significant number of N95 respirators and is working to secure additional facemasks and surgical masks. The memo specified that facilities have enough masks and respirators to follow CDC-based contingency strategies for supply management. The memo provides system-wide guidance for staff use of respirators and masks. Staff providing direct care should use N95 respirators. If N95 respirators are in short supply, staff are directed to use surgical masks for low-risk care on suspected or confirmed COVID-19 patients. Staff providing care for patients in specified institutional settings will be provided with one facemask or surgical mask per day. It goes on to provide guidance to VISN directors on how to support medical facility directors in implementing contingency and crisis strategies based on the referenced CDC guidelines. Medical facility directors have authority to determine allocation and crisis standards of care, in the event that resources become scarce. The VA is allocating equipment within VISNs, as needed, and it has increased pharmaceutical inventories from 8 days to 10 days and is utilizing certain medications needed for hospitalized COVID-19 patients as national system-wide resources. As described below, the VA has taken a number of actions to ensure that there is adequate staffing and that safeguards are in place to protect frontline employees. These actions are described in the next section. Actions related to employment can be separated into two categories: (1) actions to increase the capacity of the health system during the pandemic response and (2) actions to protect current employees from contracting the COVID-19 virus. The VA submitted a request to the Office of Personnel Management (OPM) and received approval to waive a requirement that retiree' salaries be reduced when rehired to reflect the retirement annuity they already receive, otherwise known as a dual compensation reduction waiver. The VA is asking retired clinicians to register online to join the workforce and to act as surge capacity if needed. The registration form adds the reemployed retirees to VHA's national provider database and matches them to opportunities based on their specialties. The VA has indicated that it is exploring the use of existing hiring authorities to make 30-day appointments where a critical need exists, one-year appointments in remote/isolated areas, and temporary not-to-exceed 120-day appointments. VA on-boarded 3,107 new hires in the period between April 22 and April 28, 2020. In addition, activation of the Disaster Emergency Medical Personnel System (DEMPS) allows the VA to deploy personnel from areas that are less impacted by COVID-19 to reinforce staff levels at other facilities as needed (e.g., facilities in New York City and New Orleans). Under DEMPS, movement of personnel must be approved by the VISN and the originating medical center's director. A number of VHA employees have been diagnosed with COVID-19 or are being monitored for COVID-19. As of April 29, 2020, over 2,200 employees have been diagnosed with COVID-19 and 20 employees have died from the disease. The VA has taken specific actions to protect employees, which, in turn, increases health system capacity by reducing the need for front-line employees to take leave during the pandemic. The VA is following CDC precautions to reduce the likelihood of transmission of COVID-19 among employees. According to the VA, staff have been given guidance to remain home if symptoms develop, to obtain health checks for symptoms associated with COVID-19 while at work, and to report symptoms through the correct process. Employees are also being encouraged to develop personal and family disaster plans that enable them to continue working. Employees are encouraged to telework, if their work can be accomplished remotely. Sites of care are encouraged to use alternative treatment methods wherever possible, such as telemedicine and telehealth. To prevent the spread of infection, the VA has dedicated specific treatment areas for COVID-19 patients. This and other mitigation efforts at VHA sites of care are discussed below. The VHA operates care settings with varying levels of patient risk for developing severe symptoms if COVID-19 is contracted. Each VA medical center is implementing a two-tiered system to mitigate the potential for spread of the virus, with one zone for active COVID-19 cases and a passive zone for care unrelated to COVID-19. The VA has canceled all elective surgeries and limited routine appointments to only those with the most critical need. This section describes mitigation efforts at community living centers (CLCs; nursing homes) and spinal cord injury/disorder (SCI/D) centers, which are high-risk settings, separate from other care settings. The VA has implemented different screening processes and other pandemic responses depending on the care setting. On March 26, 2020, the VA Office of Inspector General (OIG) published the results of inspections of VA facilities for implementing the enhanced screening processes and pandemic readiness, which took place between March 19 and March 24. The findings of those inspections for each care setting appear in the appropriate sections below. On March 10, 2020, the VA announced safeguards to protect nursing home residents and spinal cord injury patients. As of that date, no visitors are allowed at either VA nursing homes or spinal cord injury/disorder centers. The only exception to this policy is if a veteran is in the last stages of life, in which case the VA allows visitors in the veteran's room only. The VA is not accepting any new admissions to nursing homes and is limiting new admissions to SCI/D centers. The OIG tested the no-access policy at 54 CLCs and found the majority to be in compliance with the policy. Nine of the 54 CLCs tested were prepared to allow OIG staff to enter, despite the no-access policy. The VA implemented enhanced screening procedures at all sites of care to screen for respiratory illness and COVID-19 exposure. Because each facility determines its own enhanced screening procedures, those procedures vary at the local level. However, the VA has designed standardized screening questions for each facility. Screening consists of the following three general questions: Do you have a fever or worsening cough or shortness of breath or flu-like symptoms? Have you or a close contact traveled to an area with widespread or sustained community transmission of COVID-19 within 14 days of symptom onset? Have you been in close contact with someone, including health care workers, confirmed to have COVID-19? The VA's COVID-19 response plan provided specific potential questions that sites of care can implement in different care settings. Those screening questions also include screening scenarios for virtual triage via phone, telehealth, or secure messaging. If screened individuals are determined to be at risk, staff are instructed to isolate them immediately. If critically ill, individuals are transferred to the emergency department. If stable, individuals are sent home with printed instructions to isolate and contact their primary care providers. The OIG evaluated screening procedures at 58 medical centers and 125 community-based outpatient clinics (CBOC). The OIG found that 41 of 58 (71%) of medical centers' screening processes were generally adequate, 16 (28%) had some opportunities for improvement, and one medical center had inadequate screening procedures. The OIG found that the vast majority of CBOCs (97%) had screening processes in place. Four CBOCs had no screening process in place. The VA instituted several changes to community care guidance during the COVID-19 pandemic response on community care access under the Veterans Community Care Program (VCCP). Under normal circumstances, veterans generally are eligible for access to medical care from non-VA community providers if they meet certain criteria, including wait time and drive time access standards and if the veteran elects to receive community care. The eligibility criteria are mandated by law, and the VA has no authority to waive them. However, as many non-VA providers are postponing or canceling routine care to mitigate the spread of COVID-19, wait times may be just as long or longer in the community. In addition, the VA indicated that community providers should not have veterans attend routine appointments in-person except where the urgency of in-person treatment outweighs the risk of contracting COVID-19. VA issued the following guidance to providers: convert routine in-person appointments to telehealth; follow CMS, CDC, state, and local guidance regarding screening, testing, case reporting, and PPE; plan for increased high acuity demand; communicate with local VA medical center regarding any veteran cases or exposure to COVID-19; episodes of care ordered through the VA can be extended by 60 days; and work with the third-party administrators of the community care network (CCN) to expand enrollment where possible. The VA is promoting the Coronavirus FAQ document as the main source of guidance for veterans. This document includes answers to broad questions about COVID-19, VA's role, testing, access to care, mental health, and visiting patients. A fact sheet with similar information is also available to patients. The VA is advising veterans who may be sick or who are exhibiting flu-like symptoms not to come to a VA facility. Instead, patients are asked to send a secure message through the VHA online portal, My HealtheVet, or to schedule a telehealth appointment. The VA is experiencing high call volumes at some facilities and call centers, so it is advising veterans to use online tools first. However, patients can call their health care providers instead of using the online tools available from the VA. In addition, the VA is advising patients to budget additional time for appointments due to enhanced screening measures at VA facilities. These enhanced screening measures, as well as other mitigation strategies at VHA facilities, are described below. This section describes the current VA policy on testing patients for COVID-19 and treatment following a COVID-19 diagnosis. On March 13, 2020, the department began publishing the number of positive cases of COVID-19, and the number of tests conducted, on its public website, which it updates on a regular basis. Individual medical centers have discretion on where to send samples for testing. Samples can be tested at the Palo Alto VA Medical Center, state public health labs, or private labs. Individual providers decide whether to test for COVID-19 on a patient-by-patient basis. However, the VA has advised providers that to be tested, patients must be exhibiting respiratory symptoms and have another factor, such as recent travel or known exposure to someone who tested positive. Generally, diagnostic testing is a covered service under VA's standard medical benefits package, which is available to all veterans enrolled in the VA health care system. Some veterans are required to pay copayments for care that is not related to a service-connected disability. However, routine lab tests are exempt from copayment requirements. The Families First Coronavirus Response Act ( P.L. 116-127 ), enacted on March 18, 2020, does not allow the VA to charge any copayment or other cost-sharing payments for COVID-19 testing or medical visits during any period of this public health emergency. (For a discussion of P.L. 116-127 , see the \" Congressional Response \" section of this report.) The VA has not indicated whether it has developed a specific treatment plan for patients diagnosed with COVID-19. Treatment depends largely on the severity of symptoms that each patient experiences. The VA is handling coverage and cost of treatment for COVID-19 as it would for any other treatment for a condition that is not service-connected. Treatment for COVID-19 is a covered benefit under the VA standard medical benefits package. However, some veterans may have to pay copayments for both outpatient and inpatient care. Normal coverage rules apply for veterans who report to urgent care or walk-in clinics. To be eligible, a veteran must be enrolled in the VA health care system and must have received VA care in the past 24 months preceding the episode of urgent or walk-in care. Eligible veterans needing urgent care must obtain care through facilities that are part of VA's contracted network of community providers. These facilities typically post information indicating that they are part of VA's contracted network. If an eligible veteran receives urgent care from a noncontracted provider or receives services that are not covered under the urgent care benefit, the veteran may be required to pay the full cost of such care. Certain veterans are required to pay copayments for care obtained at a VA-contracted urgent care facility or walk-in retail health clinic. In addition, normal rules apply for veterans who report to non-VA emergency departments. To be eligible for VA payment or reimbursement, a veteran's non-VA care must meet the following criteria: The emergency care or services were provided in a hospital emergency department or a similar facility that provides emergency care to the public. The claim for payment or reimbursement for the initial evaluation and treatment was for a condition of such a nature that a prudent layperson would have reasonably expected that delay in seeking immediate medical attention would have been hazardous to life or health. A VA or other federal facility or provider was not feasibly available, and an attempt to use them beforehand would not have been considered reasonable by a prudent layperson. At the time the emergency care or services were furnished, the veteran was enrolled in the VA health care system and had received medical services from the VHA within the 24-month period preceding the furnishing of such emergency treatment. The veteran was financially liable to the provider of emergency treatment for that treatment. The veteran had no coverage under a health plan contract that would fully cancel the medical liability for the emergency treatment. If the condition for which the emergency treatment was furnished was caused by an accident or work-related injury, the veteran is required to first pursue all claims against a third party for payment of such treatment. In the event that a vaccine is approved by FDA and brought to market, it is unclear whether certain veterans would be charged copayments for administration of the vaccine. Under current regulations, the VA is prohibited from charging copayments for \"an outpatient visit solely consisting of preventive screening and immunizations (e.g., influenza immunization, pneumococcal immunization).\" Veterans experiencing homelessness live in conditions that could make them particularly vulnerable to COVID-19. Those who are unsheltered lack access to sanitary facilities. For those sleeping in emergency shelters, conditions may be crowded, with short distances between beds, and there may be limited facilities for washing and keeping clean. The VA administers programs to assist veterans experiencing homelessness and also manages several grant programs for nonprofit and public entities to provide housing and services to homeless veterans. These include the Homeless Providers Grant and Per Diem program (GPD), for transitional housing and services; the Supportive Services for Veteran Families program (SSVF), for short- to medium-term rental assistance and services; and Contract Residential Services (CRS), for providing housing for veterans participating in VA's Health Care for Homeless Veterans program. In addition, the Department of Housing and Urban Development (HUD), together with VA, administers the HUD-VA Supportive Housing program (HUD-VASH), through which veterans who are homeless may receive Section 8 vouchers to cover the costs of permanent housing and VA provides case management services. The VA released guidance on March 13, 2020, for its grantees that administer programs for veterans who are homeless. The guidance suggests grantees take a number of actions: Develop a response plan, or review an existing plan, and coordinate response planning with local entities, including health departments, local VA medical providers, and Continuums of Care. Plans should address staff health, potential staff shortages, and acquisition of food and other supplies, as well as how to assist veteran clients. Prevent infection through methods recommended by the CDC, such as frequent handwashing, wiping down surfaces, and informing clients about prevention techniques. In congregate living facilities, such as those provided through VA's Grant and Per Diem program, keep beds at least three feet apart (preferably six, if space permits), sleep head-to-toe, or place barriers between beds, if possible. Develop questions to ask clients about their health to determine their needs and how best to serve them. For new clients, interviews should occur prior to entry into a facility (such as over the phone), if possible, or in a place separate from other clients. If a client's answers to questions indicate risk of COVID-19, separate them from other program participants (have an isolation area, if possible), clean surfaces, and reach out to medical professionals. If isolation is not practical, reach out to other providers who might be able to isolate. The VA has released additional specific guidance and flexibilities for SSVF providers. SSVF regulations allow funds to be used for emergency housing, including hotels and motels; however, this use of funds may occur only when no other housing options, such as transitional housing through GPD, are available. In response to COVID-19, however, grantees may use funds for high-risk veterans to live in hotels and motels instead of congregate settings. Due to Public Housing Authority (PHA) closures and remote work, veterans who have HUD-VASH vouchers, but who have not yet moved into a housing unit, may face delays in receiving rental assistance. This delay may occur if a PHA cannot conduct a housing quality standards (HQS) inspection or complete other administrative tasks that allow move-in to occur. In these cases, SSVF grantees may use funds to cover rental assistance until a PHA has completed the tasks allowing the voucher to be used. For veterans residing in rental housing using HUD-VASH vouchers, HUD has waived certain requirements pursuant to CARES Act ( P.L. 116-136 ) waiver authority to address situations that may arise due to COVID-19. For example, ordinarily HUD will not approve a unit for Section 8 rental assistance (which includes HUD-VASH vouchers) unless it has passed an HQS inspection. However, HUD has waived this requirement and will accept an owner certification that there is \"no reasonable basis to have knowledge that life threatening conditions exist in the unit.\" PHAs must conduct inspections of units as soon as reasonably possible, and no later than October 31, 2020. PHAs may also accept alternative inspection results rather than HQS inspections and allow families to move into units in these cases. For existing tenants, PHAs may change from an annual unit inspection schedule to a biennial schedule without updating their administrative plan. If resident income changes due to an inability to work, or other reason, residents should report the change to their local PHA and rent should be adjusted accordingly. HUD has waived the requirement that PHAs obtain third-party verification of an income change for these income recertifications. In addition, as part of the CARES Act ( P.L. 116-136 ), residents receiving Section 8 rental assistance cannot be evicted for nonpayment of rent for 120 days from the date of the bill's enactment (March 27, 2020). The VA administers both guaranteed and direct loans for veterans through the Veterans Benefits Administration. Prior to enactment of the CARES Act, VA encouraged lenders to establish a foreclosure moratorium for borrowers with VA loans, but a moratorium was not required. However, the CARES Act provides for both forbearance (i.e., allowing borrowers to reduce or suspend mortgage payments) and a foreclosure moratorium for federally backed single-family mortgages, including guaranteed VA loans. Direct VA loans do not appear to be included in the CARES Act definition of federally backed mortgage. Borrowers may request forbearance from their loan servicer for up to 180 days, with another 180-day extension, due to financial hardship caused directly or indirectly by COVID-19. The foreclosure moratorium is in effect for 60 days beginning March 18, 2020. For more information about these provisions, see CRS Insight IN11334, Mortgage Provisions in the Coronavirus Aid, Relief, and Economic Security (CARES) Act . The Veterans Benefits Administration has taken several actions to assure continued delivery of disability compensation, pensions, and education assistance. On March 18, 2020, the Veterans Benefits Administration announced via Facebook and Twitter that all regional offices would be closed to the public starting March 19. The regional offices are to remain open to ensure the continuity of benefits, however, the offices are longer accepting walk-ins for claims assistance, scheduled appointments, counseling, or other in-person services. The VBA is directing veterans who have claims-specific questions or any other questions to use the Inquiry Routing & Information System (IRIS) or to call 1-800-827-1000. In a March 26 interview, VA Under Secretary for Benefits, Dr. Paul Lawrence, assured veterans and their families that benefits were still being processed thanks in part to the large telework capability in place for the VBA. Lawrence stated that about 90% of all VBA employees, approximately 22,500 individuals, are set up and teleworking to retain the continuity of processing claims. Dr. Lawrence also addressed the issue of veterans who need a compensation and pension exam completed as part of their benefits application. Due to travel restrictions and social distancing policies, Lawrence explained VBA's attempt at still providing the exams but without in-person contact. He stated: So we're trying to do more, a lot more through telehealth, You know phone call or a Skype session or something. We can get these exams done that we're flexing in new ways. Where once things were done in person â¦ now they're being done electronically. Following Dr. Lawrence's interview, on March 31, the VA issued a press release announcing changes to several in-person meetings and programs to ensure the safety of both the staff and veteran/dependent during this time. Some of these changes included providing educational counseling through online and telephone services; using teleconferencing and VA Video Connect for case management, general counseling and connecting veterans to VR&E services; conducting informal conference hearings by telephone or video conferencing; providing virtual briefings and individualized counseling for transitioning servicemembers; and conducting examinations for disability benefits using tele-compensation and pension (Tele-C&P) exams. If an in-person examination is required, veterans will be notified for scheduling. However, on April 6, the VBA announced via email that it is \"suspending in-person C&P examinations until further notice and will continue to conduct C&P exams through ACE and Tele-C&P, when possible.\" The email also provided guidance on filing claims and information to assist veterans with submitting medical documentation without appearing in person. On April 3, the VA announced that claimants who need an extension in filing their paperwork \"can simply submit [the request] with any late-filed paperwork and veterans do not have to proactively request an extension in advance.\" In FY2020, over 900,000 individuals are expected to receive veterans educational assistance from the GI Bills (e.g., the Post-9/11 GI Bill), Vocational Rehabilitation & Employment (VR&E), Veteran Employment Through Technology Education Courses (VET TEC), Veterans Work-Study, Veterans Counseling, and VetSuccess on Campus (VSOC). As a result of COVID-19, some participants' training and education may be disrupted, and some participants may receive a lower level of benefits, or none at all. These concerns may directly affect beneficiaries in several ways, including the following: Some students may be required to stop out, discontinue working, or take a leave of absence as a result of their own illness. Some training establishments, educational institutions, and work-study providers may close temporarily or permanently. Some training establishments, educational institutions, and work-study providers may be required to reduce participants' hours, enrollment rate, or rate of pursuit. Some educational institutions may transition some courses to a distance learning format. Some educational institutions may require students living on campus to move off campus. Individuals receiving benefits in foreign countries may encounter any of the above circumstances while residing in a foreign country whose COVID-19 situation may differ from that in the United States, or may stop out, discontinue working, or take a leave of absence and return to the United States. Since mid-March, the VA has sent direct emails to GI Bill participants and school certifying officials (SCOs) and held webinars for SCOs to explain its authority and payment processing procedures that are directly relevant to COVID-19 disruptions. On March 13, 2020, the VBA Education Service requested that school-certifying officials \"temporarily refrain from making any adjustments to enrollment certifications\" if resident courses transitioned to distance education pending subsequent VA guidance and/or legislative action. The VBA Education Service administers VA educational assistance programs. Prior to the COVID-19 emergency, educational institutions were required to receive approval before transitioning any courses to a distance learning format for the courses to remain GI Bill-eligible. GI Bill benefits could not be paid for the pursuit of online courses that had not been previously approved as online courses. This limitation was alleviated by recently enacted legislation (for a discussion of P.L. 116-128 , see the \" Congressional Response \" section of this report). In addition, on April 3, 2020, the VA announced that it was suspending for sixty days the collection of institutions' and veterans' debt, including for debts under the jurisdiction of the Department of the Treasury. Individuals with an existing repayment plan must request a suspension if they are unable to make payments. In 2019, the VA indicated that approximately 25% of GI Bill participants must resolve an overpayment-related debt at some point. The VBA Education Service has announced that it is moving away from paper correspondence, including faxes. In an effort to accomplish this transition, VBA has requested that GI Bill participants provide or update their email addresses. On-the-job training (OJT) and apprenticeship training establishments must submit certifications electronically. The National Cemetery Administration has provided information for the survivors and dependents of veterans who have passed away and are scheduled to be buried in a National Cemetery during this national emergency. Effective March 23, 2020, the NCA announced that all \"committal services and the rendering of military funeral honors, whether by military personnel or volunteer organizations, will be discontinued until further notice at VA national cemeteries.\" VA National Cemeteries will remain open to visitors and for interments, but visitors should follow their local communities' restrictions on visitations and travel. In addition, visitors should be prepared for certain areas of the cemetery typically open to the public to be closed. These areas include public information centers, visitor centers, and chapels. For direct interments, the NCA is limiting attendance to immediate family of deceased family members, up to 10 individuals. In addition, the NCA is to work with families to schedule a committal or memorial service at a later date. On Friday, March 27, the NCA informed funeral directors of a change in the floral arrangement policy, stating that national cemeteries will no longer accept floral arrangements with direct interments.Â If families want to place a floral arrangement at the gravesite, they may do so after 4:30 pm on the day of interment or any time after. In addition, the NCA limited floral arrangements to two per gravesite. The NCA announced that the National Cemetery Scheduling Office in St. Louis will continue to provide scheduling services. The NCA has set up an \"Alerts\" web page for the public to check cemetery operating status and is directing the public to its Facebook and Twitter pages for the most recent operating information. In 1982, the Veterans Administration and Department of Defense Health Resources Sharing and Emergency Operations Act ( P.L. 97-174 ) was enacted to serve as the primary health care backup to the military health care system during and immediately following an outbreak of war or a national emergency. Since then, Congress has provided additional authorities to VA to \"use its vast infrastructure and resources, geographic reach, deployable assets, and health care expertise, to make significant contributions to the Federal emergency response effort in times of emergencies and disasters.\" Among other authorities, the VHA may care for nonveterans, as well as veterans not enrolled in the VA health care system. The VA also has authority to provide certain health services such as medical counter measures to VA employees. The authority to care for care for nonveterans, applies in situations where the President has declared a major disaster or emergency under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act), or where the HHS Secretary has declared a disaster or emergency activating the National Disaster Medical System established pursuant to Section 2811(b) of the Public Health Service Act (42 U.S.C. Â§300hh-11(b)). The President's March 13, 2020, declaration of a national emergency under Section 501(b) of the Stafford Act allows VA to use this authority. On March 27, 2020, the VA released its COVID-19 Response Plan. The plan defines the VA's national level roles and responsibilities: VHA will provide [personal protective equipment] PPE fit-testing, medical screening, and training for [Emergency Support Function #8] ESF #8 and other Federal response personnel. Provide VHA staff as ESF #8 liaisons to [Federal Emergency Management Agency] FEMA the Incident Management Assistance Teams deploying to the state emergency operations center. Provide VHA planners currently trained to support ESF #8 teams. VHA provides vaccination services to VA staff and VA beneficiaries in order to minimize stress on local communities. VHA furnishes available VA hospital care and medical services to individuals responding to a major disaster or emergency, including active duty members of the Armed Forces as well as National Guard and military Reserve members activated by state or Federal authority for disaster response support. VHA provides ventilators, medical equipment and supplies, pharmaceuticals, and acquisition and logistical support through VA National Acquisition Center. [NCA] provides burial services for eligible veterans and dependents and advises on methods for interment during national security emergencies. VHA designates and deploys available medical, surgical, mental health, and other health service support assets. VHA provides one representative to the National Response Coordination Center (NRCC) during the operational period on a 24/7 basis. According to the VA, during declared major disasters and emergencies, service-connected veterans receive the highest priority for VA care and services, followed by members of the Armed Forces receiving care under 38 U.S.C. Section 8111A, and then followed by individuals affected by a disaster or emergency described in 38 U.S.C. Section 1785 (i.e., individuals requiring care during a declared disaster or emergency or during activation of the National Disaster Medical System [NDMS]). In general, care is prioritized based on clinical needâthat is, urgent, life-threating medical conditions are treated before routine medical conditions (see the Appendix ). The Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ), provided funding for the Public Health and Social Services Emergency Fund to reimburse the VHA to respond to COVID-19 and to provide medical care for nonveterans. However, prior to reimbursing the VHA, the HHS Secretary is required to certify to congressional appropriations committees that funds available under the Robert T. Stafford Disaster Relief and Emergency Assistance Act are insufficient and that funds provided under the CARES Act are necessary to reimburse the VHA for expenses incurred to provide health care to nonveterans . Generally, if a state, tribal, or territorial government needs resources, it can request assistance from the federal government through its local HHS regional emergency coordinator (REC), which is a part of FEMA's NRCC. The VA cannot receive direct requests for assistance from state and local governments. In addition, the VA does not support providing VA medical personnel to nondepartment facilities. The VHA has accepted several \"fourth mission\" assignments from FEMA/HHS. For example, the VHA has responded and provided assistance to New York and New Jersey. On March 29, VA New York Harbor Healthcare System's Manhattan and Brooklyn VA medical centers admitted nonveteran, non-COVID-19 patients, and on April 1, East Orange, New Jersey VA Medical Center, admitted nonveteran critical and noncritical COVID-19 patients. Furthermore, the VHA is providing laboratory services, pharmaceutical and medication supply through the National Acquisition Center (NAC), and mobile pharmacy units, among others, as requested by FEMA/HHS. In response to the COVID-19 pandemic, Congress passed several measures to provide the VA with supplemental appropriations and provided temporary statutory changes to enhance veterans' benefits and services during this public health emergency. On March 18, 2020, the President signed into law the Families First Coronavirus Response Act ( P.L. 116-127 ). The act provides $30 million for VHA's medical services account to fund health services and related items pertaining to COVID-19, and $30 million for VHA's medical community care account (see Table 1 ). These funds are designated as emergency spending and are to remain available until September 30, 2022. Among other things, the act does not allow the VA to charge any copayment or other cost-sharing payments for COVID-19 testing or medical visits during any period of this public health emergency. P.L. 116-128 , as enacted on March 21, 2020, allows the VA to continue to provide GI Bill benefits from March 1, 2020, through December 21, 2020, for courses at educational institutions that are converted from in-residence to distance learning by reason of an emergency or health-related situation. P.L. 116-128 further permits the VA to pay the Post-9/11 GI Bill housing allowance as if the courses were not offered through distance learning throughout the same period. With the exception of those participants covered under this P.L. 116-128 exemption, Post-9/11 GI Bill participants enrolled exclusively in distance education are eligible for no more than one-half the national average of the housing allowance. On March 17, 2020, the Administration submitted to Congress a supplemental appropriations request. The Administration sought $16.6 billion for FY2020 for VA's response to the COVID-19 outbreak. This amount included $13.1 billion for the medical services account. According to the request, this additional amount would provide funding for \"healthcare treatment costs, testing kits, temporary intensive care unit bed conversion and expansion, and personal protective equipment.\" The request also included $2.1 billion for the medical community care account to provide three months of health care treatment provided in the community in response to COVID-19. The VA assumes that about 20% of care for eligible veterans will be provided in the community, since community care facilities would be at full capacity with nonveteran patients. Furthermore, the emergency supplemental appropriations request included $100 million for the medical support and compliance account to provide 24-hour emergency management coordination overtime payments, to cover costs associated with travel and transport of materials, and to enable VHA' s Office of Emergency Management to manage its response to COVID-19; $175 million for the medical facilities account to upgrade VA medical facilities to respond to the virus; and $1.2 billion for the information technology systems account to upgrade telehealth and related internet technology to deliver more health care services remotely. On March 27, the President signed into law the CARES Act ( P.L. 116-136 ). Division B of this act included an emergency supplemental appropriations measure. Title X of Division B provides supplemental appropriations for FY2020 for certain VA accounts totaling $19.6 billion, and is designated as emergency spending. Unless otherwise noted below, funds remain available until September 30, 2021. Funding provided in the CARES Act is broken down as follows (see Table 1 ): VBA, general operating expenses account, $13 million, for enhancing telework support for VBA staff and for additional cleaning contracts. VHA, medical services account, $14.4 billion, for increased telehealth services; purchasing of additional medical equipment and supplies, testing kits, and personal protective equipment; and to provide additional support to homeless veterans, among other things. VHA, medical community care account, $2.1 billion, for increased emergency room and urgent care usage in the community. VHA, medical support and compliance account, $100 million, for the provision of 24-hour emergency management coordination overtime payments, and for costs associated with travel and transport of materials. VHA, medical facilities account, $606 million, for the procurement of mobile treatment facilities, improvements in security, and nonrecurring maintenance projects. VA, general administration account, $6.0 million, for maintaining 24-hour operations of crisis response and continuity of operations plans at VA facilities, among other things. VA, information technology systems account, 2.2 billion, for increased telework capacity, purchasing additional laptops for telework and telehealth-enabled laptops for VHA providers to work from home, and to increase bandwidth and IT infrastructure needs, among other things. VA, Office of Inspector General account, $12.5 million, for increased oversight of VA's preparation and response to COVID-19 (funds remain available until September 30, 2022). VA, grants for construction of state extended care facilities account, $150 million, to assist state homes to renovate, alter, or repair facilities to respond to COVID-19. This section allows the VA to transfer funds between the medical services, medical community care, medical support and compliance, and medical facilities accounts. The VA can make any transfer that is less than 2% of the total amount appropriated to an account and may follow after notifying the congressional appropriations committees. Any transfer that is greater than 2% of the total amount appropriated to an account or exceeding a cumulative 2% for all of the funds appropriated to the VA in the CARES Act requires Senate and House Appropriations Committee approval. This section requires the VA to provide monthly reports to the Senate and House Appropriations Committees detailing obligations, expenditures, and planned activities for all the funds provided to the VA in the CARES Act. This section defines a public health emergency as an emergency with respect to COVID-19 declared by a federal, state, or local authority. The VHA provides telehealth services to veteran patients in their communities from any location in the United States, including U.S. territories, the District of Columbia, and the Commonwealth of Puerto Rico. Section 20004 defines telehealth as \"the use of electronic information and telecommunications technologies to support and promote long-distance clinical health care, patient and professional health-related education, public health, and health administration.\" Examples of telecommunications technologies include the internet, videoconferencing, streaming media, and terrestrial and wireless communications. This section allows the VA Secretary to enter into short-term agreements or contracts with telecommunications companies to expand veteran patients' access to telemental health care services . The goal of the short-term agreements and contracts is for the telecommunications companies to provide temporary, complimentary, or subsidized fixed and mobile broadband services to veteran patients. The Secretary is allowed to enter into short-term agreements or contracts with telecommunications companies only during the period of the COVID-19 outbreak. During this period, covered veteran patients can assess VA telemental health care services through telehealth and the VA Video Connect (VVC) mobile application, which the act refers to as the VA program that connects veteran patients with their health care teams using encryption. Veteran patients can access the VVC on their mobile devices, such as laptops and smartphones. The short-term agreements or contracts with telecommunications companies must address the telemental health care needs of isolated veterans; therefore, the VA Secretary must prioritize eligibility to veterans who either have low-incomes, live in unserved and underserved areas, reside in rural and highly rural areas, or are considered by the Secretary as having a higher risk of committing suicide and mental health care needs while being isolated during the COVID-19 outbreak. The VA, however, may expand eligibility for telemental health care services to veteran patients who are currently receiving VA care but who are ineligible to receive mental health care services and other health care services through telehealth and/or the VVC. The state veterans' home program is a federal-state partnership to construct or acquire nursing home, domiciliary, and adult day health care facilities. VA provides assistance to states in three ways: First, VA provides states with up to 65% of the cost to construct, acquire, remodel, or modify state homes. Second, VA provides per diem payments to states for the care of eligible veterans in state homes. VA may adjust the per diem rates each year. A state home is required to meet all VA standards in order to continue to receive per diem payments. Third, VA is required to support states financially to assist state homes in the hiring and retention of nurses to reduce nursing shortages at state veterans' homes. This section modifies the treatment of state homes during the public health emergency by (1) waiving requirements for per diem reimbursements for state homes under the VHA State Home Per Diem Program and (2) authorizing the Secretary to provide equipment to state homes. The section waives the occupancy rate requirement under 38 C.F.R. Section 51.40(c), authorizing a state home to receive per diem payments for veterans who are temporarily absent from nursing home care regardless of the state home's occupancy rate. In addition, the section waives the requirement under 38 C.F.R. Section 51.210(d) that a state home must maintain a certain percentage of veteran residents. Lastly, the section authorizes the Secretary to provide state homes with medication, personal protective equipment, medical supplies, and any other equipment, supplies, and assistance available to VA. The personal protective equipment may be provided through the All Hazards Emergency Cache in addition to any other source available. The Veteran Directed Care Program helps isolated veterans who need assistance with activities of daily living or instrumental activities of daily living, and who are at high risk of nursing home placement, to live in their own homes. Veterans in this program are provided a budget for services that can be managed by the veteran or a family caregiver. This section modifies the Veterans Directed Care Program during the public health emergency to require that the Secretary (1) accept telephone or telehealth enrollments and renewals; (2) stop all suspensions or disenrollments unless requested by a veteran or representative, or the veteran and provider make a mutual decision; (3) waive paperwork requirements and penalties for late paperwork; and (4) waive any requirement to stop payments under the program if the veteran or caregiver is out of state for more than 14 days. In general, VHA prosthetics staff are responsible for providing and fitting prosthetic appliances that meet the best medical needs of the veteran patient. This provision requires the Secretary to ensure that eligible veterans receiving or requiring prosthetic appliances and services are able to obtain them from contracted non-VA providers during this emergency period. Under existing regulations, certain VA employees may not receive any combination of premium pay, including overtime pay, that, when added to their base pay, results in total pay above the higher of two rates: GS-15, step 10, or the rate payable for Level V of the Executive Schedule on a biweekly basis. This provision allows the Secretary waive any limitation on pay for any employee of the VA during a public health emergency for work done in support of the emergency. The Secretary is required to provide reports on a monthly basis to the Senate and House Committees on Veterans' Affairs detailing the waivers. This section requires the Secretary to provide VA home health workers with personal protective equipment from the All Hazards Emergency Cache or any other available source. Under ordinary circumstances, eligibility for a VA pension is, in part, based upon the annual income of the individual. Generally, \"all payments of any kind or from any source (including salary, retirement or annuity payments, or similar income, which has been waived, irrespective of whether the waiver was made pursuant to statute, contract, or otherwise) shall be included\" when calculating a veteran's annual income. This provision of the CARES Act excludes the recovery rebate from a veteran's annual income, thereby preventing it from counting towards the income limit associated with pension eligibility. It explicitly states that the rebate \"shall not be treated as income or resources for purposes of determining eligibility for pension under chapter 15 of title 38.\" Consequently, the direct individual payment included in the CARES Act will not affect a veteran's eligibility for a VA pension. Formerly homeless veterans participating in the HUD-VASH program are assigned VA case managers to assist with their health and other needs. This section requires the VA to ensure that telehealth capabilities are available to veterans and case managers participating in HUD-VASH. The SSVF program, which provides short- to medium-term rental assistance and supportive services to homeless veterans and their families, is authorized at $380 million through FY2021. Without legislative authority, the VA cannot obligate additional funding for the program. This provision removes the SSVF funding limitation in cases of public health emergencies. The Homeless Providers Grant and Per Diem (GPD) program provides grants to public entities and private nonprofit organizations for the capital costs associated with developing facilities to serve homeless veterans and also makes per diem payments to grantees for the costs of providing housing and supportive services to homeless veterans. Together, grant and per diem funding is authorized at approximately $258 million per year. In addition, grant costs are limited to 65% of the costs of acquisition, construction, expansion, or remodeling of facilities, and per diem payments are limited to the VA domiciliary care per diem rate, which, for FY2020, is $48.50 per day. This section allows additional appropriations for the GPD program in cases of public health emergencies notwithstanding the FY2020 authorization level, and it also allows the Secretary to waive statutory limitations on grant and per diem payments to grantees. Generally, VA, under GPD guidance, requires providers to discharge veterans residing in GPD housing who are absent for more than 14 days. In addition, VA will not make per diem payments after a veteran has been absent for more than 72 consecutive hours. This section requires the VA Secretary to waive the discharge requirement and allows the Secretary to reimburse providers for veterans who have been absent for more than 72 hours. The Student Veteran Coronavirus Response Act of 2020 ( P.L. 116-140 ), as enacted on April 28, 2020, responds to concerns that abrupt and temporary closures or suspensions of educational institutions, programs of education, and employment could negatively impact the short-term finances of eligible beneficiaries and their continued pursuit of educational programs. Eligible beneficiaries include participants in several VA educational assistance programs and Vocational Rehabilitation and Employment (VR&E). The act provides special authorities for the period beginning on March 1, 2020, and ending on December 21, 2020, including academic terms beginning prior to December 21, 2020. Selected sections of the bill are discussed below. The Veterans Work-Study Program allows GI Bill and VR&E participants to receive additional financial assistance through the VA in exchange for employment. Provisions in this section permit Work-Study payments in accordance with an existing Work-Study agreement or at a lesser amount despite the participant's inability to perform work by reason of an emergency situation. These provisions further require the VA to extend an existing agreement for a subsequent period beginning during the covered period if requested by the Work-Study participant. The VA has authority under 38 U.S.C. Section 3680(a)(2)(A) to pay GI Bill and VR&E allowances for up to four weeks when an educational institution temporarily closes under an established policy based on an Executive order of the President or due to an emergency situation. The provisions in this section permit GI Bill and VR&E payments for up to four weeks, in addition to any payments under 38 U.S.C. Section 3680(a)(2)(A), if an educational institution closes or the program of education is suspended due to an emergency situation. In general, the GI Bills provide eligible persons a 36-month entitlement to educational assistance. GI Bill entitlement is restored in the following instances: for an incomplete course if an individual is unable to receive credit or lost training time as a result of an educational institution closing; for an incomplete course if an individual is unable to receive credit or lost training time because the course or program is disapproved by a subsequently established or modified policy, regulation, or law; and for the interim (through the end of the academic term but no more than 120 days) Post-9/11 GI Bill housing allowance paid following either a closure or disapproval. The provisions in this section require that the VA restore entitlement for an incomplete course if an individual is unable to receive credit or lost training time as a result of a temporary closure of an educational institution or the temporary termination of a course or program of education by reason of an emergency situation. Many GI Bill participants must use their educational entitlement within a specified time period beginning upon discharge or release from active duty or eligibility. There are notable exceptions to the time limitation. For example, Post-9/11 GI Bill participants whose last discharge or release from active duty was on or after January 1, 2013, are not subject to a time limitation. The provisions in this section exempt from the time limitation, the period during which an individual is prevented from pursuing a program of education because the educational institution closed (temporarily or permanently) under an established policy based on an Executive order of the President or due to an emergency situation until the individual is able to resume pursuit. The provisions are applicable to the Montgomery GI Bill-Active Duty (MGIB-AD) 10-year limitation, the Post-9/11 GI Bill 15-year limitation and age limitation for children using transferred benefits, the VR&E 12-year limitation and the period of a veteran's vocational rehabilitation program, and the Montgomery GI Bill-Selected Reserve (MGIB-SR) limitation. Typically, programs under VR&E are limited to 48 months of entitlement and veterans pursuing an education program under VR&E must be enrolled to receive a subsistence allowance. For the covered period, the provisions in this section extend protections from entitlement charges following school closures that are established for the GI Bills to veterans participating in education programs under the VR&E program. The provisions further allow the VA to (1) continue paying subsistence allowances to VR&E participants through the end of the academic term but no more than 120 days following either a closure or disapproval and (2) prohibits VA from charging the impacted term against a veteran's VR&E entitlement if the veteran did not receive credit for classes. The provisions in this section provide two additional months of subsistence allowance to veterans who were following a program of employment services under the VR&E program during the covered period.", "summary": "The Department of Veterans Affairs (VA) provides a range of benefits to eligible veterans and their dependents. The department carries out its programs nationwide through three administrations and the Board of Veterans' Appeals (BVA). The Veterans Health Administration (VHA) is responsible for health care services and medical and prosthetic research programs. The Veterans Benefits Administration (VBA) is responsible for, among other things, providing disability compensation, pensions, and education assistance. The National Cemetery Administration (NCA) is responsible for maintaining national veterans cemeteries; providing grants to states for establishing, expanding, or improving state veterans cemeteries; and providing headstones and markers for the graves of eligible persons, among other things. With a vast integrated health care delivery system spread across the United States, the VHA is statutorily required to serve as a contingency backup to the Department of Defense (DOD) medical system during a national security emergency and to provide support to the National Disaster Medical System and the Department of Health and Human Services (HHS), as necessary, in support of national emergencies. These functions are known as VA's \"Fourth Mission.\" Since the onset of the Coronavirus Disease 2019 (COVID-19) pandemic, Congress has passed a number of relief measures affecting the VA and its Fourth Mission. T he Families First Coronavirus Response Act ( P.L. 116-127 ), enacted on March 18, 2020, provides $60 million for the VHA in emergency supplemental appropriations. Among other things, the act also prohibits the VA from charging any copayment or other cost-sharing payments for COVID-19 testing or medical visits during any period of this public health emergency. P.L. 116-128 , enacted on March 21, allows the VA to continue to provide GI Bill benefits from March 1, 2020, through December 21, 2020, for courses at educational institutions that are converted from in-residence to distance learning by reason of an emergency or health-related situation. T he Coronavirus Aid, Relief, and Economic Security Act (CARES Act) ( P.L. 116-136 ), enacted on March 27, provides a total of $19.6 billion in emergency supplemental appropriations for FY2020 for certain VA accounts, as well as temporary statutory relief for various VA programs and services during the COVID-19 public health emergency. The Student Veteran Coronavirus Response Act of 2020 ( P.L. 116-140 ), enacted on April 28, 2020, is intended to mitigate the disruption to VA educational benefits, including Vocational Rehabilitation & Employment (VR&E), when schools, programs of education, and work are suspended or closed from March 1, 2020, to December 21, 2020.", "document_type": "crs"}
{"report": "This report provides a brief history of the major legislative changes to the charitable deduction for individuals, from its enactment in 1917 through the recent changes enacted at the end of 2017. Policymakers considering changes to this tax benefit may find it helpful to understand how this benefit has evolved over the past 100 years. This report does not address all the legislative changes made to this tax benefit, nor does it provide a broad overview of charitable giving in general, charitable giving tax incentives, their economic effects, or policy options to modify them. Those issues are discussed in CRS Report R45922, Tax Issues Relating to Charitable Contributions and Organizations , by Jane G. Gravelle, Donald J. Marples, and Molly F. Sherlock, and CRS In Focus IF11022, The Charitable Deduction for Individuals , by Margot L. Crandall-Hollick and Molly F. Sherlock. This report begins with a brief overview of the current charitable deduction for individuals. It then describes major legislative changes made to the deduction from 1917 through the present day, with the most recent changes being those made in 2017. For the purposes of this report, major legislative changes include those that changed the amount that taxpayers could deduct. The bills summarized in this report do not include those that temporarily modified the charitable deduction in response to a disaster. Laws that modified definitions or changed substantiation requirements for taxpayers claiming the deduction are also generally excluded. This report will be updated as necessary to reflect future legislative changes. Under current law, taxpayers who itemize their deductions canâsubject to certain limitationsâdeduct charitable donations to qualifying organizations. (Individuals who take the standard deduction may not deduct their charitable contributions.) Deductions that cannot be claimed in the current tax year can be carried forward for up to five years, subject to certain limitations. Under current law, charitable contributions are tax deductible when made to qualifying Section 501(c)(3) organizations, governmental units, veterans' organizations, fraternal organizations, and cemetery companies. A Section 501(c)(3) organization is either a public charity or private foundation. Private foundations often are tightly controlled, receive significant portions of their funds from a small number of donors or a single source, and make grants to other organizations rather than directly carry out charitable activities. Most private foundationsâ91% of all private foundations in 2015 âprimarily make grants to other charitable organizations and to individuals. These foundations are referred to as nonoperating foundations . Foundations that directly operate their own charitable programs are referred to as operating foundations . In contrast, public charities tend to have broad public support and provide charitable services directly to beneficiaries. Public charities include organizations \"organized and operated exclusively for religious, charitable, scientific, testing for public safety, literary, or educational purposes, or to foster national or international amateur sports competition â¦ or for the prevention of cruelty to children or animals.\" Tax-deductible donations to qualifying organizations can be in the form of cash, securities, or property. Properties or securities held for more than a year are often referred to as long - term capital gain properties . Properties or securities held for less than a year are often referred to as short - term capital gain properties. (For more information on general valuation rules of noncash property, see Appendix B .) Depending on (1) the type of property donated and (2) the type of qualifying organization that receives the donations, there are limitations on the total dollar amount that the taxpayer can deduct, as illustrated in Table 1 . The limitations are defined as a percentage of the taxpayer's adjusted gross income (AGI). Enacted in 1917, the deduction for charitable giving has changed over the years from \"a short statutory provision into a complex set of rules.\" Below is a brief legislative history of the major legislative changes to the charitable deduction that have occurred over the past 100 years, focusing on changes to the amount that taxpayers could deduct. Table 2 summarizes these changes. Over the past 100 years, Congress has generally increased the amount that eligible taxpayers can deduct for their charitable donation. The history of the charitable deduction illustrates two main policy objectives of this benefit. In its early years, the charitable deduction served to ensure that resources given to charity would not be treated as income for the purposes of taxation. When the charitable deduction was created, the income tax was in its early years, and applied only to the very top of the income distribution. Thus, when the deduction was created, it could be viewed as having been designed to \"protect voluntary giving to public goods by rich industrialists who had made their fortunes in business.\" Today, many policymakers are focused on the charitable deduction's impact on giving, and its efficacy at inducing additional giving. As the deduction has changed over time, policymakers have continued to discuss its effectiveness at increasing charitable giving, the broader role of the government in the philanthropic sector, and reform proposalsâa discussion that continues to this day. The charitable deduction was initially enacted to offset the potential negative effects of increased income taxes on charitable giving among the wealthy. The federal income tax, enacted four years earlier as part of the Tariff Act of 1913, generally applied a top rate of 7% to only the wealthiest Americans. The War Income Tax Revenue Act of 1917 (P.L. 65-50) increased federal income tax ratesâthe top rate on individuals rose to 67% by 1917 âas a way to pay for the costs of the United States' involvement in World War I. According to the Joint Committee on Taxation (JCT), some [l]egislators feared that the [tax] increase would reduce individuals' income \"surplus\" from which they supported charity. It was thought that a decrease in private support would create an increased need for public support and even higher rates, so the [charitable] deduction was offered as a compromise. In short, some policymakers were concerned that without the charitable deduction, wealthy taxpayers subjected to these higher tax rates would no longer contribute to charities or institutions of higher education (or would contribute less). As Senator Hollis stated, Usually people contribute to charities and educational objects out of their surplus. After they have done everything else they want to do, after they have educated their children and traveled and spent their money on everything they really want or think they want, then, if they have something left over, they will contribute it to a college or to the Red Cross or for some scientific purposes. Now when war comes and we impose these very heavy taxes on income, that will be the first place where wealthy men will be tempted to economize, namely in donations to charity. They will say, \"Charity begins at home.\" I should not favor allowing any man to deduct all of his contributions to these objects from his income-tax return, but if we limit it to 20 percent of his income we cannot be doing much harm to the Public Treasury. Look at it this way: For every dollar that a man contributes for these public charities, educational, scientific, or otherwise, the public gets 100 percent; it is all devoted to that purpose. And since \"many believed charities could deliver social services better than the government,\" a drop in funding to charitable groups could have led to what many may have perceived as the inefficient provision of social services and public goods by the government. The law allowed a deduction for cash or gifts made to organizations operated for religious, charitable, scientific, or education purposes, or for the prevention of cruelty to animals or children. The overall amount that could be deducted was limited to 15% of net taxable income \"to ensure that individual taxpayers could not eliminate their tax liability through the deduction.\" Several years later, Congress waived the 15% limitation for taxpayers who made consistently large charitable donations. Specifically, as a result of the Revenue Act of 1924 (P.L. 68-176), taxpayers who donated \"more than 90% of their net taxable income in the current year and in each of the previous 10 years\" were not subject to the 15% net taxable income limitation. This provision was often referred to as the \"Philadelphia nun\" provision, after Mary Katherine Drexel, a wealthy Philadelphia native who became a nun and underwrote her charitable activities from her sizable inheritance. (In later years, it was also referred to as the \"unlimited charitable deduction\" (UCD), or \"unlimited charitable contribution deduction.\") In 1944, Congress changed the limitation of the charitable deduction, which effectively increased the maximum amount that taxpayers could deduct. As previously discussed, for most taxpayers the charitable deduction was limited to 15% of net taxable income. The Individual Income Tax Act of 1944 (P.L. 78-315) changed the measurement of this limitation from net taxable income to adjusted gross income. Since AGI was generally larger than net taxable income, the maximum amount that could be deducted in dollar terms was larger. This law also created a standard deduction, which some charities worried would result in a reduction in charitable giving. The federal income tax, which before the early 1940s had been levied only on high-income Americans, was expanded to apply to most working-age Americans by the end of World War II. According to the IRS, In 1939 only about five percent of American workers paid income tax. The United States' entrance into World War II changed that figure. The demands of war production put almost every American back to work, but the expense of the war still exceeded tax-generated revenue. President Roosevelt's proposed Revenue Act of 1942 introduced the broadest and most progressive tax in American history, the Victory Tax. Now, about 75 percent of American workers would pay income taxes. This expansion was driven by increasing needs for revenue to finance World War II expenses. As more Americans became subject to the federal income tax, Congress became interested in simplifying tax preparation for these new taxpayers, which motivated the creation of a standard deduction. However, some worried that among those who used the standard deduction, there would be a reduction in charitable giving since there would be no additional tax benefit for these donations. Others who advocated for the standard deduction contended that charitable contributions were made for more than just financial reasons, and that especially among lower- and middle-income taxpayers (who were most likely to claim the standard deduction), the tax benefit for giving was not an important factor in their decisions to give. According to Senator Walter George, Chairman of the Senate Finance Committee, The committee does not believe that it can be proved that a tax incentive has been an important factor in the making of such gifts by individuals having less than $5,000 of adjusted gross income, and certainly the $500 standard deduction will not remove the tax incentive for persons in the higher brackets, upon whom the charities depend for contributions in substantial amounts. In 1952, as part of P.L. 82-465, Congress further increased the maximum amount taxpayers could deduct, raising the limitation to 20% of AGI. In 1954, Congress further increased the maximum deduction limit to 30% of AGI (P.L. 83-591) for any contributions to certain charitable organizations ânamely churches, educational institutions, or hospitals. The 10% of additional AGI that taxpayers could deduct was allowable only for contributions made to one of these eligible organizations. Deductible donations to other eligible organizations were still limited to 20% of AGI. One commentator noted that this was \"the first time that Congress encouraged certain charitable giving by granting more generous deductions for donations to certain charitable organizations than to others â¦ [to] encourage additional contributions to these organizations to offset their rising costs and modest returns on endowment funds.\" Congress expanded the list of organizations for which taxpayers could claim the 30% charitable deduction as part of the Revenue Act of 1964 (P.L. 88-272) to include those that \"receive a substantial part of [their] support from a governmental unit â¦ or from direct or indirect contributions from the general public.\" This effectively expanded the 30% AGI limitation to most charitable organizations except private nonoperating foundations, which were still subject to the 20% limitation. In addition, the law included a provision that allowed for charitable contributions in excess of the AGI limits to be carried forward up to five years. This five-year carryforward allows taxpayers who contributions exceed the AGI limit in a given year to still potentially receive a tax benefit from that contribution in future years. The Tax Reform of 1969 (P.L. 91-172) made several modifications to the charitable deduction, including increasing the maximum AGI limits, phasing out the \"Philadelphia nun\" provision, and creating certain limitations on donations of appreciated property. Many of the current parameters of the charitable deduction for individuals were enacted as part of this law. At the time that Congress was debating this legislation, there was increased concern that taxpayers were using tax benefits like the charitable deduction to avoid paying income taxes. In particular, â¦ the unlimited charitable contribution deduction (UCD) had become a sanctuary in which many of the very wealthy were sheltered from the income tax. Prior to its repeal, the UCD was being used by an estimated 100 taxpayers who generally had economic income in excess of one million dollars. Since the UCD had a particular appeal to taxpayers having large amounts of appreciated capital which could be donated to charitable institutions, with the deduction based on the full market value rather than acquisition value, it not surprisingly became a prime target for reformers. The Tax Reform Act of 1969 phased out the \"Philadelphia nun provision\" over five years while also raising the maximum AGI limitation to 50% of AGI for donations of cash/short-term capital gain property to public charities. The increase in the AGI limit was intended to \"offset any decreased incentive resulting from the repeal of the unlimited charitable contributions deduction.\" In addition, the increased AGI limitation was intended to [s]trengthen the incentive effect of the charitable contributions deduction for taxpayers.â¦ It is believed that the increase in the limitation will benefit taxpayers who donate substantial portions of their income to charity and for whom the incentive effect of the deduction is strongâprimarily taxpayers in the middle- and upper-income ranges. The new 50% limitation generally did not apply to gifts of property that had appreciated in value (e.g., capital gains), which were still generally subject to the 30% AGI limitation. In addition, the 20% AGI limitation for donations to private nonoperating foundations (irrespective of the form of the donation) was unchanged by the law. Under the Economic Recovery Act of 1981 ( P.L. 97-34 ), taxpayers who did not itemize their deductionsâi.e., those who took the standard deductionâcould claim a new deduction for charitable giving. This was a temporary provision that went into effect in 1982 and was scheduled to expire at the end of 1986. (The law made no change to the itemized deduction for charitable giving.) The amount that nonitemizers could deduct was limited to a percentage of the contributed amount, subject in some years to an additional fixed dollar cap. In 1982 and 1983, 25% of contributions could be deducted, subject to a $100 cap. In 1984, the contribution percentage remained unchanged (25%), but the dollar cap rose to $300. In 1985, 50% of contributions could be deducted, and the contribution cap was eliminated, and in 1986 100% of contributions could be deducted with no contribution cap. In addition to these caps, the amounts that could be deducted were also subject to the AGI limits applicable to the itemized deduction for charitable giving. This temporary provision was opposed by the Treasury Department and some economists at the time. For example, Donald Lubick, Assistant Secretary for Tax Policy at the Treasury Department, argued that the main beneficiaries of the above-the-line deductionâlower- and moderate-income taxpayersâwould be less responsive than higher-income taxpayers in terms of additional giving. Lubick argued that the above-the-line deduction \"would go, in very large measure, to those who are already giving with respect to their existing gifts,\" providing them with a windfall gain. He testified that an above-the-line deduction \"would result in a large revenue loss to the Treasury and little increased giving for the charities.\" But according to JCT, Congress disagreed. The Congress believed that allowing a charitable deduction to nonitemizers stimulates charitable giving, thereby providing more funds for worthwhile nonprofit organizations, many of which provide services that otherwise might have to be provided by the Federal government. In addition, supporters of this provision believed that \"[p]eople ought not be taxed on money they contribute to charitable causes. This should be true whether or not their other economic actions make it advantageous for them to itemize their deductions.\" This tax benefit expired as scheduled at the end of 1986, and was not extended as part of the Tax Reform Act of 1986. According to one commentator, \"The big idea of the '86 Act was to pare away deductions and credits to broaden the base so you could bring the top rates down. And that was a pretty powerful tide and the nonitemizer [deduction] just wasn't strong enough to swim against that current.\" As part of the Deficit Reduction Act of 1984 ( P.L. 98-369 ), Congress increased the contribution limits on donations of cash or ordinary income property to private nonoperating foundations from 20% of AGI to 30% of AGI. (Donations of long-term capital gain property to private nonoperating foundations remained limited to 20% of AGI.) In explaining this increase, JCT noted the following: Because as a general rule public charities and operating foundations directly carry out charitable function and programs, expend charitable donations more promptly and have public involvement, support, and supervision, the Congress concluded that a tax preference for contributions to public charities and operating foundations [50% AGI limitation] continues to be appropriate. However, acknowledging the substantial role of many grant making foundations in private philanthropy, the Congress believed that the extent of this tax preference should be narrowed by increasing to 30 percent the deduction limitation for gifts by individuals of cash and ordinary-income property to nonoperating foundations. At the end of 2017, President Trump signed into law P.L. 115-97 , often referred to as the Tax Cuts and Jobs Act (TCJA), which made numerous changes to the federal income tax for individuals and businesses. Among the many changes, the law temporarily increased the AGI limit for cash donations made to public charities from 50% to 60%. This change went into effect in 2018, and is scheduled to expire on December 31, 2025. According to the House Ways and Means Committee report that accompanied H.R. 1 (the House-passed version of P.L. 115-9 ): The Committee believes that a robust charitable sector is vital to our economy, and that charitable giving is critical to ensuring that the sector thrives. For this reason, the Committee believes that it is desirable to provide additional incentives for taxpayers to provide monetary and volunteer support to charities. Increasing the charitable percentage limit for cash contributions to public charities will encourage taxpayers to provide essential monetary support to front-line charities. While this change to the charitable deduction may increase the amount that some taxpayers can deduct and hence may encourage more charitable giving, other changes made by the law are expected to result in an overall reduction in charitable giving. TPC estimates that even after including the increased 60% limitation, the changes TCJA made to the tax code could result in charitable donations falling by 5%. Appendix A. Definitions of Commonly Used Terms Appendix B. Valuation of Noncash Donations for the Charitable Deduction For noncash donations, there are certain rules on how to value the property. Depending on the type of property and the recipient organizations, the property is generally valued either at its basis (i.e., what the taxpayer originally paid for the property) or its fair market value (how much the taxpayer would receive in an open market for the property at the time it is donated), as summarized in Table B-1 . For an overview of these and other terms often used in the context of the charitable deduction, see Appendix A . If a property increases or appreciates in value, its fair market value when sold will be greater than its basis. If property decreases or depreciates in value, its fair market value when sold will be less than its basis. Hence, deducting the fair market value of an appreciated (depreciated) property results in a larger (smaller) deduction for the taxpayer than the basis value of that same property. ", "summary": "This report provides a brief history of the major legislative changes to the charitable deduction that have occurred over the past 100 years, focusing on changes to the amount that taxpayers could deduct. Over the past 100 years, Congress has generally increased the amount that eligible taxpayers can deduct for their charitable donations. These changes are summarized in the below table. As Congress has expanded the amount that can be deducted by those who claim the deduction, policymakers have debated the deduction's effectiveness at increasing charitable giving and the broader role of government subsidies for the philanthropic sectorâa discussion that continues to this day.", "document_type": "crs"}
{"report": "The current trajectory of democracy around the world is an issue of interest for Congress, which has contributed to U.S. democracy promotion objectives overseas. For decades, U.S. policy has broadly reflected the view that the spread of democracy around the world is favorable to U.S. interests. This report provides a regional snapshot of the political climate in Latin America and the Caribbean, based on the U.S. Department of State's description of each country's political system and selected nongovernmental (NGO) indices that measure democracy trends worldwide. For additional information on democracy in the global context, see CRS Report R45344, Global Trends in Democracy: Background, U.S. Policy, and Issues for Congress , by Michael A. Weber. For related information about democracy in Latin American and the Caribbean, see the following products: CRS In Focus IF10460, Latin America and the Caribbean: U.S. Policy Overview , by Mark P. Sullivan; CRS Report R45547, U.S. Foreign Assistance to Latin America and the Caribbean: FY2019 Appropriations , by Peter J. Meyer and Edward Y. Gracia; CRS Report 98-684, Latin America and the Caribbean: Fact Sheet on Leaders and Elections , by Carla Y. Davis-Castro; and CRS Report R45733, Combating Corruption in Latin America: Congressional Considerations , coordinated by June S. Beittel. CRS also publishes reports on specific Latin American and Caribbean countries. This report compiles information from the U.S. State Department and data from four nongovernmental (NGO) indices. For a discussion about definitions of democracy and critiques of democracy indices, see CRS Report R45344, Global Trends in Democracy: Background, U.S. Policy, and Issues for Congress , by Michael A. Weber. CRS does not endorse the methodology or accuracy of any particular democracy index. In parentheses following the country name in the tables below is the nature of the country's political system, as described in the U.S. State Department's 2018 Country Reports on Human Rights Practices . While the publication focuses broadly on human rights conditions in each country, the first sentence of each country report provides a characterization of the country's political system. This U.S. government information is included here for comparison with findings from the democracy indicators published by NGOs. Bertelsmann Stiftung, a private foundation based in Germany, has published the Bertelsmann Transformation Index (BTI) biannually since 2006. Key regional findings and country reports are available in English (BTI publishes the full regional report in German). BTI 2018 evaluates the quality of democracy, a market economy, and political management in 129 developing and transition countries. For political transformation specifically, BTI ranks countries using 18 indicators grouped into five criteria: (1) stateness, (2) political participation, (3) rule of law, (4) stability of democratic institutions, and (5) political and social integration. Based on the criteria, BTI assigns a category: democracy in consolidation, defective democracy, highly defective democracy, moderate autocracy , and hardline autocracy . In its regional report, BTI notes that since 2008, it \"has recorded a decline in the quality of democracy in Latin Americaânot dramatic, but continual.\" BTI evaluates all Central and South American nations. With the exception of Cuba, the Dominican Republic, Haiti, and Jamaica, BTI does not evaluate Caribbean nations. The Economist Intelligence Unit (EIU), based in London and New York, has offices and analysts in various countries. Since 2006, EIU has produced a democracy index that provides an annual snapshot of the state of democracy for 165 independent states and two territories. The EIU classifies countries as full democracies , flawed democracies , hybrid regimes , or authoritarian regimes based on an aggregate score of 60 indicators in five categories: (1) electoral process and pluralism, (2) civil liberties, (3) the functioning of government, (4) political participation, and (5) political culture. According to the EIU's Democracy Index 2018 , the Latin America and Caribbean region's overall score went down from 6.26 in 2017 to 6.24 in 2018 (on a 0 to 10 scale). The two countries in the region classified in 2018 as full democracies are Uruguay and, new to the group, Costa Rica. EIU's Democracy Index 2018 identified three countries in the region as authoritarian regimes: Nicaragua moved to join Venezuela and Cuba. EIU evaluates all Central and South American nations. With the exceptions of Cuba, the Dominican Republic, Guyana, Haiti, Jamaica, Suriname, and Trinidad and Tobago, EIU does not evaluate Caribbean nations. Freedom House is a U.S.-based NGO that conducts research on democracy, political freedom, and human rights worldwide. It has published Freedom in the World since 1978, and the current report covers 195 countries and 14 territories. Freedom House assigns each country 0 to 4 points on 25 indicators (10 political rights indicators and 15 civil liberties indicators) for a total of up to 100 points. The scores determine numerical ratings for political rights and civil liberties freedoms on a scale of 1 (most free) to 7 (least free). The political rights and civil liberties ratings are averaged to produce an overall status of free, partly free , or not free. Freedom House's report covering 2018 found that Nicaragua was the country with the greatest decline in the world regarding conditions for political rights and civil liberties as compared to 2017. Venezuela had the third-greatest decline; Brazil, El Salvador, and Guatemala also made the top 20 for steepest declines. The report's analysis is based on data that are detailed in full on the Freedom House web page on \"Countries,\" which ranks the state of democracy for 197 countries and 15 territories. This web page lists the top three aggregate scores in Latin America and the Caribbean: Uruguay, Barbados, and Chile; the region's lowest aggregate scores are those for Nicaragua, Venezuela, and Cuba. Freedom House evaluates democracy in all Central and South American and Caribbean nations. The Varieties of Democracy Institute (V-DEM), headquartered at the University of Gothenburg in Sweden, collects democracy data through its research team in collaboration with country experts. In 2017, V-Dem published its first global report measuring the status of democracy with an index. Democracy Report 2019 includes the Liberal Democracy Index, which examines 71 indicators included in the Liberal Component Index and the Electoral Democracy Index. V-Dem groups 179 countries into four categories: liberal democracy , electoral democracy , electoral autocracy , and closed autocracy . The current report notes \"the regional average for Latin America is down to 0.51 in 2018, bringing the region back to about 1996-levels.\" V-DEM evaluates all Central and South American nations. With the exceptions of Barbados, Cuba, the Dominican Republic, Guyana, Haiti, Jamaica, Suriname, and Trinidad and Tobago, V-DEM does not evaluate Caribbean nations. Table 1 looks at Caribbean countries' global democracy rankings according to EIU's Democracy Index 2018 , Freedom House's Freedom in the World 2019 , V-Dem's Democracy Report 2019 , and Bertelsmann Stiftung's 2018 Transformation Index. Table 2 compares the same reports for Mexico and Central America, as does Table 3 for South America. Each report evaluates a different number of countries, so there are missing rankings for some countries. Countries are listed alphabetically in each table. Figure 1 shows the global rank and classification of all Central and South American and Caribbean countries according to the Political Transformation Rank, a component of the 2018 Bertelsmann Stiftung Transformation Index (BTI). Figure 2 shows the global rank and classification of Central and South American and Caribbean countries according to the EIU's Democracy Index 2018 . Figure 3 shows the aggregate scores of all Central and South American and Caribbean countries according to the Freedom House country web page for Freedom in the World 2019 . Countries receive 0 to 4 points on 25 indicators (10 political rights indicators and 15 civil liberties indicators) for a total of up to 100 points. Figure 4 shows the political rights and civil liberties scores of all Central and South American and Caribbean countries according to Freedom House's Freedom in the World 2019 . The scale used is 1-7, with 1 indicating the most free conditions and 7 the least free. Figure 5 shows the liberal democracy index rank and classification of all Central and South American and Caribbean countries according to the Varieties of Democracy Institute's Democracy Report 2019 . Table 4 provides resources for further information about democracy indicators in Central and South America and the Caribbean, although many cover other geographic areas as well. The sources are organized alphabetically by title. This is not an exhaustive list.", "summary": "This report provides a regional snapshot of the political climate in Latin America and the Caribbean, based on the U.S. Department of State's description of each country's political system and selected nongovernmental indices that measure democracy trends worldwide. Using tables and graphs to illustrate regional trends, this report provides a snapshot of democracy indicators from the following sources: (1) the U.S. Department of State's 2018 Country Reports on Human Rights Practices ; (2) Bertelsmann Stiftung's 2018 Bertelsmann Transformation Index (BTI); (3) the Economist Intelligence Unit's (EIU's) Democracy Index 2018 ; (4) Freedom House's Freedom in the World 2019 ; and (5) the Varieties of Democracy Institute's (V-DEM's) Liberal Democracy Index in its Democracy Report 2019 . A bibliography at the end provides sources for further information.", "document_type": "crs"}
{"report": "For roughly the first 100 years of the electric power industry, electricity generation occurred mostly in large, c entralized power plants. Partly in response to the energy crisis of the 1970s, Congress established policies to promote, among other things, alternatives to centralized power plants, including generation capacity located on customer property. Customer-sited generation is a type of distributed generation (DG) and can be located on commercial, industrial, or residential properties. One policy intended to promote DG is net metering. In the Energy Policy Act of 2005 (EPACT05; P.L. 109-58 ) Congress encouraged states to adopt net metering, defined in the law as service to an electric consumer under which electric energy generated by that electric consumer from an eligible on-site generating facility and delivered to the local distribution facilities may be used to offset electric energy provided by the electric utility to the electric consumer during the applicable billing period. State net metering policies may be relevant to congressional discussions about the role of renewable energy sources, like solar, in the nation's electricity system. Solar photovoltaic (PV) is the most commonly deployed energy type participating in net metering, comprising 97% of net metering capacity in 2018. Other federal and state policies (e.g., tax incentives, renewable portfolio standards, carbon pricing) may interact with net metering policies to determine the deployment pace of distributed solar energy sources and other types of DG. Also, some Members of Congress may be interested in how some states have modified their net metering policies in recent years, including the effect of those modifications on stakeholders. Some recent state policy changes are expected to expand solar energy development, while others are expected to slow it. Among other options, Congress could choose to restrict, encourage, or require certain kinds of state policy modifications, or take no action on state net metering policies, depending on congressional priorities. This report provides background information and discusses current issues related to net metering policy. Net metering policies determine how electricity customers with distributed generation are compensated for electricity they deliver to the grid. Net metering is frequently used to mean a policy of net energy metering (NEM), which specifies that electricity delivered to the grid from a net metering customer is compensated on a one-to-one basis for electricity purchased from the grid. Every unit of electricity generated by the customer (typically expressed in kilowatt-hours, kWh) is subtracted from the amount of electricity they consume, for billing purposes. This is frequently described as \"the meter running backward.\" Other analyses and discussions sometimes distinguish different policy options, including: buy-all, sell-all , under which a utility buys all electricity generated by the net metering customer at one (usually, lower) rate and sells all the electricity consumed by the customer at a different rate (usually the same retail rate charged to any other customer); and net billing , under which electricity delivered to the grid is compensated at a pre-determined value, which might be measured as a rate or a fixed amount. This report will generally use the term net metering to refer to any of these policies since they are closely related to each other, in that they provide financial support for DG. As of April 2019, 45 states had net metering policies in place that require utilities to offer net metering to customers. Some of these policies include alternatives to net energy metering. Further, some of these policies predate EPACT05. In the states that do not require utilities to offer net metering, some utilities voluntarily offer net metering service to customers. According to the U.S. Energy Information Administration (EIA), almost 2 million customers participated in net metering programs in the United States in 2018, compared to over 153 million electricity customers overall. In other words, about 1% of U.S. electricity customers in 2018 participated in net metering. The number of net metering customers increased from 2013 to 2018 as shown in Figure 1 . Data before 2013 also show growth in net metering participation, but EIA changed the way it reported net metering data beginning in 2013, so these data are not shown below, in the interest of consistency. Net metering participation can be measured in other ways, such as total net metering capacity or the amount of electricity delivered to the grid from net metering generators. According to the EIA data, these measures have seen average annual increases similar to customer count. Levels of net metering participation vary by state, as shown in Figure 2 . In many states, less than 0.1% of electricity customers participate in net metering. Hawaii has the highest participation rate, with over 15% of customers participating in the state's net metering programs. Some potentially relevant factors for the differences among states include design of state net metering policies, presence of other state policies such as renewable portfolio standards (which may incentivize renewable DG), average electricity prices, and solar resource quality. A full analysis of the factors behind different state participation rates is beyond the scope of this report. This section provides an overview of how electricity rates are set in general, in order to clarify major areas of debate for state net metering policies. Electricity ratemaking is the process of allocating to customers the total costs that utilities incur when producing and delivering electricity. Many complexities and local factors influence ratemaking. A full discussion is beyond the scope of this report. As an illustrative example, this section discusses typical ratemaking considerations for vertically-integrated investor-owned utilities. In its service territory, this type of utility owns and operates all parts of the electricity system, from electricity generation to transmission and distribution to customers. State regulators conduct the ratemaking process and approve rates that the utility can charge its customers. Regulators design rates so that utilities can recover their costs through customers' bill payments. These costs generally include: the costs of building and operating power plants, including fuel costs and compliance with any applicable regulations (e.g., environmental, safety, reliability); the costs of building and maintaining transmission and distribution systems (i.e., the grid); regular utility operating costs, such as ensuring reliable grid operation (i.e., grid services) or collecting meter data for billing; any programmatic costs, such as bill relief for low-income consumers or implementation of other public policies; and a return on the utility investments (i.e., return on equity or ROE). A common method for setting rates is to establish volumetric rates (sometimes called flat rates). All customers within a given type, or customer class, will pay the same rate expressed in cents per kilowatt-hour (cents/kWh). The more electricity a customer uses, the higher a bill they will have. Customers' bills will vary each month based on the amount of electricity they consume. Regulators estimate a value for the volumetric rate that will allow the utility to recover its total costs, based on projections of total sales for all customer classes. In this way, the costs for electricity generation, transmission, distribution, and other utility expenses are shared among all customers. Costs associated with customer service (e.g., billing, connections) sometimes are separated from the electricity rate and recovered in a separate customer charge. This charge would appear as a fixed value on the customer's bill and would not change from month to month. Customer charges are additional to rates. In other words, a customer's bill would have volumetric charges (rate times kWh consumed) plus a fixed customer charge. Some customer classes, such as large industrial facilities or institutions, consume so much electricity that utilities might make special system modifications for them. In some cases, utilities recover these costs in a demand charge that is only paid by those high-consuming customers. Like customer charges, demand charges are generally additional to volumetric charges and do not typically change from month to month. EPACT05 encouraged states to adopt net metering, but the law did not specify how customers should be compensated. States with net metering have taken different approaches in implementing their policies, and many states have revised their compensation approaches in recent years. These decisions may affect DG markets. As one study from the National Renewable Energy Laboratory observed, \"compensation mechanisms impact DG deployment because they strongly influence the value proposition of a DG investment for individual customers.\" This section describes some elements of states' approaches to implementing net metering. A common approach to net metering is to compensate net metering customers at the utility's approved retail rate of electricity. This is frequently described as a net energy metering (NEM) policy, or simply net metering. A 2019 review of state net metering policy revisions describes how state policymakers initially viewed the retail rate as a \"close-enough proxy\" for rate setting, as follows: Initially, NEM was largely understood to be an administratively simple, rough-justice approach that was acceptable at a time when markets for solar PV and other DG were uneconomic. In many of the initial decisions about NEM, policy makers assumed that the retail rate was a close-enough proxy for the value of solar or value of DG, and the total numbers of participating customers and kilowatt hours being credited at the retail price were relatively small ... the small number of participating customers multiplied by the small quantity of energy each would deliver to the grid, meant that any error associated with under- or over-estimating the true value would be small. Retail rates provide relatively high compensation for net metering generation (see Figure 3 ). As described above (under \"Overview of Electricity Ratemaking\"), this is because the retail rate for any electric utility customer reflects the total costs the utility incurs for delivering electricity, including generating electricity and maintaining the grid. Retail rates may encourage net metering participation to a greater extent than other compensation approaches because customers can recover the upfront costs of a DG system more quickly. Some stakeholders have noted the possibility that compensating net metering customers at the retail rate may result in increased costs for non-net metering customers. This possibility, known as a cost shift or cross-subsidy, arises from the fact that the ratemaking process allocates total utility costs among all customers. Net metering customers generate electricity for their own consumption, which reduces the amount of utility-provided electricity they need (and, consequentially, the utility's costs to produce electricity). However, self-generation does not necessarily reduce the amount of other utility-provided services a customer uses (or, generally, the utility's costs to provide those services, such as maintaining the grid). For example, solar net metering customers might consume electricity from the grid at night and derive reliability benefits from the grid even when the sun is shining. Over time, rates for non-net metering customers could increase so the utility could recover the costs of maintaining the grid that are not recovered from net metering customers. Some stakeholders also have noted that residential net metering customers have tended to have higher incomes than non-net metering customers, raising potential equity concerns over cross-subsidies. Studies disagree on the extent to which non-net metering customers may be cross-subsidizing net metering customers. Studies have used different methodologies in estimating cross-subsidies, including which costs and benefits are included and over what timeframe the costs and benefits are considered. These methodological differences may help explain the lack of a consensus view on the magnitude of cross-subsidies. Also, any observed cross-subsidies may be affected by local factors, such as DG penetration and electricity demand growth, which may change over time. As a result, an estimate conducted in one state in one year cannot necessarily be extrapolated to all states in all future years. One synthesis of estimates conducted in or around 2015 found that net metering cost shifts range from $444 to $1,752 per net metering customer per year. Observers may disagree on how much of a cross-subsidy is large enough to warrant policy action. Net metering, and any associated cross-subsidies, is only one factor affecting electricity rates. A 2017 study assessed the potential rate effects of a variety of factors, including net metering, energy efficiency, natural gas prices, state renewable portfolio standards, the federal Clean Power Plan (which was never implemented), and utility capital expenditures. That study found that the rate effects of DG would likely be increases between 0.03 cents/kWh and 0.2 cents/kWh, compared to increases up to 3.6 cents/kWh caused by other factors. The possible presence of a cost shift does not necessarily mean that non-net metering customers are transferring money to net metering customers. The extent to which this might occur would depend, among other things, on net metering participation rates and ratemaking decisions made by regulators. There could be a delay in addressing cost shifts through normal ratemaking processes because those processes have inherent time lags. Further, cost shifts are not unique to DG. As noted in a guide for state regulators, \"cost shifting, or subsidies, is unavoidable in practical rate design but regulators endeavor to mitigate these effects in the larger context of the many, often conflicting, rate design principles.\" Some states are seeking to move from the \"close-enough proxy\" of the retail rate to more precise allocations of system costs and benefits to net metering customers. Often state policy debates focus on addressing concerns about potential cross-subsidies from retail rate compensation. Conceptually, states are exploring two options: adding fixed charges (e.g., customer charge, demand charge) to net metering customers' bills or changing the compensation rate. In practice, states are considering variations of these options, and some states have implemented one of these options or both at the same time. Adding fixed charges to net metering customers' bills is meant to allow utilities to recover costs for grid maintenance and operation. At the same time, this approach might preserve some perceived advantages for compensating net metering customers at the retail rate (e.g., administrative simplicity, ease of understanding). Proponents of this approach typically include utilities and some advocates for low-income customers. They often assert that adding fixed charges (or other revisions like alternative compensation rates) reduces cost shifting and increases fairness. Opponents typically include the solar industry and environmental advocates. They often contend that net metering promotes competition in the electricity industry and that fixed charges (or other revisions that would discourage DG) ignore societal benefits that DG (especially solar energy) can provide. In addition, while the concept of adding fixed charges may be straightforward, determining a value for fixed charges that accurately reflects net metering customers' use of the grid has been complex and controversial in practice. Some states have adopted an alternative compensation rate that attempts to represent the energy costs the utility avoids when net metering customers supply some of their own energy (see Figure 3 ). This approach, referred to in this report as an avoided cost rate, is sometimes called an energy rate, a wholesale rate, a supply rate, or variations of these terms. While the retail rate reflects all costs associated with producing energy, operating and maintaining the grid, and other utility expenses, an avoided cost rate primarily reflects costs associated with producing energy. Some states also might consider network upgrades required to reliably integrate DG, especially solar PV. Depending on circumstances, the avoided cost rate might be estimated by a regulator using an independent methodology or by referral to wholesale electricity markets. Avoided cost rates are usually lower than retail rates. Another alternative compensation rate applies to net metering customers with installed solar PV. Under this method, net metering customers are compensated according to a value of solar (VOS) rate. As illustrated in Figure 3 , this approach reflects many of the same considerations as an avoided cost rate and, additionally, reflects estimated societal benefits associated with distributed solar PV (e.g., reduced air emissions). Solar advocates generally favor inclusion of societal benefits in all aspects of net metering policy and rate design. Some states (and stakeholders) may consider reduced greenhouse gas emissions a benefit of distributed solar PV as well. VOS is often calculated to be larger than avoided cost rates but smaller than retail rates, though states could potentially determine a VOS rate greater than the retail rate, depending on the perceived benefits of solar included in the analysis. A related compensation rate applies to any distributed energy resource (DER), not just distributed solar generation, and reflects estimated grid and societal benefits of DERs. New York is one state taking this approach. Regardless of which rate is set (i.e., avoided cost or VOS) and how it is calculated, it could be applied in either a buy-all, sell-all net metering arrangement or a net billing arrangement (see definitions in the section \" What Is Net Metering? \"). Points of debate about alternative compensation approaches have included which costs and benefits to consider, and how to quantify them. One challenge around quantification is that costs and benefits of DG can be time- and location-specific. Another challenge is that costs and benefits might change as the level of DG penetration changes. States vary in their approach to evaluating net metering, as evidenced by a 2018 analysis conducted for the U.S. Department of Energy (DOE). That analysis, which reviewed 15 state studies of net metering costs and benefits released between 2014 and 2017, noted that states used various assumptions, and that \"the set of value categories included, and whether these categories represent costs or benefits, have a significant impact on the overall results of a given study.\" In addition to differing in net metering compensation, state net metering policies differ in a variety of other aspects. Some differences pertain to provisions on program caps, source eligibility, credit retention, and system ownership. Provisions in these areas can affect deployment of DG. Program caps, sometimes called aggregate capacity limits, set limits on the number of customers or amount of generation capacity that may participate. Program caps can be expressed in units of power (e.g., megawatts; MW), a percentage of electricity demand over some period of time, or other measures as determined by a state. The choice of whether to have program caps and, if so, how to define them can affect the amount of DG that a state's net metering policy might promote. Program caps may be established to reduce risks to the electricity system, such as potential reliability risks from DG, or reduce the likelihood that cross-subsidies would occur. Caps also might reduce the potential for sales losses or other negative financial impacts for utilities. On the other hand, program caps might create a barrier to achieving other policy goals, for example the renewable energy goals that some states have. States specify which generation sources can participate in net metering, often based on capacity limits (i.e., generator size) and technology type. Solar energy is the dominant energy source for net metering capacity, but some states allow other energy types to participate as well. Whether a non-solar project will participate is usually due to cost factors, but other factors such as customer type (e.g., residential, commercial, or industrial) and location (e.g., urban, rural) may be influential as well. For example, combined heat and power facilities might be attractive mostly to large commercial and industrial customers that use steam. Distributed wind projects might be attractive mostly to farms or other customers with relatively large acreage. Net metering customers often have periods when their electricity consumption exceeds their generation and periods when the opposite is true. When net metering generation exceeds consumption, net metering customers can deliver this surplus generation to the grid. Many state net metering policies compensate net metering customers in some way for the total amount of electricity they generate, but some states only compensate the surplus generation (i.e., the amount delivered to the grid). Typically, if a net metering customer has a surplus over an entire billing period, the customer receives a credit on the next bill. States have different provisions for how long credits can carry over. Credit retention policies can determine the extent to which customers might reduce their total electricity costs to $0. Many net metering customers have a single generator located behind a single electricity meter. A single-family home with a rooftop solar installation is one example. Other arrangements are possible though, and some states allow these. Aggregate net metering applies to single customers with multiple electricity meters on their property, for example farms, municipalities, or school districts. Shared net metering applies to multiple customers associated with the same net metering generation capacity, for example participants in community solar projects (sometimes called solar gardens). A version of shared net metering called virtual net metering applies when the shared project is located onsite, for example multi-family dwellings. A related policy is whether third party participation is allowed. In third party participation arrangements, such as solar leasing and power purchase agreements, the solar system is owned by an entity other than the electricity consumer on whose property the system is installed. Some Members of Congress have introduced legislation addressing aspects of states' net metering policies. Some proposals would influence state policies directly. For example, S.Amdt. 3120 in the 114 th Congress would have limited the ability of state regulators to move net metering customers to lower compensation rates or to add fixed charges to their bills. S.Amdt. 3053 , also in the 114 th Congress, would have required state regulators to consider the extent to which their net metering policies created cross-subsidies. H.R. 4175 in the 116 th Congress would require states to consider adopting net billing policies for community solar. Other legislation would require studies to better understand the costs and benefits of net metering. For example, in a committee report on an FY2017 appropriations bill, Congress requested a DOE study on \"the costs and benefits of net-metering and distributed solar generation to the electrical grid, utilities and ratepayers.\" DOE transmitted the report to Congress in 2019. In the 116 th Congress, S. 346 and H.R. 1009 would require the National Academies of Sciences, Engineering, and Medicine to study various aspects of net metering such as alternative incentives for DG, net metering planning and operating techniques, and consumer and industry incentives for net metering. ", "summary": "Net metering is a policy that allows electricity customers with their own generation capacity to be financially compensated for the energy they produce. Net metering is widely regarded as having an important role in deployment of distributed generation (DG), especially solar energy. State and local governments have authority to establish net metering policies, and some have done so for many years. Congress took action to encourage net metering in the Energy Policy Act of 2005 (EPACT05), and the policy now exists, in some form, in 45 states. Recent state net metering policy modifications, and potential effects on solar energy deployment, may be relevant to congressional discussions regarding the role of renewable energy sources in the nation's electricity system. Solar photovoltaic panels (e.g., rooftop solar) accounted for 97% of the generation capacity participating in net metering programs in 2018. Net metering participation roughly quadrupled from 2013 to 2018, according to data from the U.S. Energy Information Administration. Hawaii has the highest participation rate of any state, with 15% of electricity customers participating in net metering in 2018. In a majority of states, however, net metering customers account for less than 1% of total electricity customers. States differ in the way net metering customers are compensated. A common method is the retail rate, under which energy from net metering capacity offsets energy consumed from the grid in a one-to-one fashion. This method is often described as the \"meter running backward.\" Retail rate compensation was initially adopted, in large part, for its administrative simplicity. Some stakeholders continue to prefer it for the relatively high payments it gives to net metering customers. Other stakeholders criticize retail rate compensation as overcompensating net metering customers for the electricity they produce. Part of this criticism comes from the fact that electricity retail rates reflect not just costs associated with generating electricity, but also costs associated with building, maintaining, and operating the transmission and distribution systems (\"the grid\"). Electricity rates are typically designed so that utilities can recover their total costs associated with providing electricity. If a sufficiently large number of customers participate in net metering, costs might increase for non-net metering customers in order to pay for the grid benefits. This possibility is known as a cross-subsidy, or sometimes a cost shift. In addition to these concerns about fairness, some critics of retail rate compensation raise concerns about equity, because historically most net metering customers have had above-average incomes. Empirical evidence of the cost increases for non-net metering customers is mixed, partly because studies make different assumptions about costs and benefits associated with DG. Some projections in different states have quantified a potential cross-subsidy, but projections in other states have concluded that the value of cross-subsidies are approximately zero. States have considered, and in some cases adopted, alternative compensation approaches to address concerns over cross-subsidies. One type of approach adds a fixed charge to net metering customers' bills to reflect the costs of maintaining the grid. Another type of approach provides an alternative compensation rate (i.e., not the retail rate) that net metering customers receive for the energy they deliver to the grid. Options for alternative compensation rates are avoided cost rates, which reflect primarily the utility's cost of producing electricity, and value of solar (VOS) rates, which additionally consider societal benefits such as reduced air emissions. Generally, rates that consider more benefits (and avoided costs) associated with DG have a higher monetary value and might promote greater levels of DG penetration. States have included different costs and benefits in analyses conducted to estimate alternative compensation rates, resulting in different monetary values for alternative rates. Even if states opted to include the same types of costs and benefits, they might derive different values for rates, since the relative costs and benefits of DG can vary based on local circumstances. Relevant local circumstances include overall penetration of DG, average and marginal electricity costs, congestion in transmission and distribution systems, and potentially other factors. Other state net metering policy provisions can affect deployment of DG. They relate to whether to adopt program caps, thereby limiting the number of participants; which technology type and what size generator are eligible; how long customers can \"carry over\" credits associated with surplus electricity generation; and what types of system ownership arrangements may participate in net metering. A related consideration is whether third parties, such as solar leasing firms, may develop DG in the state. Some Members of Congress have expressed interest in various aspects of net metering policy since passage of EPACT05. Legislation has sought to limit revisions that states can make to net metering policies; expand access to net metering for different types of electricity generation; and estimate costs and benefits associated with net metering, among other topics.", "document_type": "crs"}
{"report": "The U.S. government administers multiple international food assistance programs that aim to alleviate hunger and improve food security in other countries. Some of these programs provide emergency assistance to people affected by conflict or natural disaster. Other programs provide nonemergency assistance to address chronic poverty and hunger, such as by providing food to people during a seasonal food shortage or training communities on issues related to nutrition. U.S. international food assistance programs originated in 1954 with the Food for Peace Act (P.L. 83-480), also referred to as P.L. 480 . Historically, the United States has provided international food assistance primarily through in-kind aid , whereby U.S. commodities are shipped to countries in need. Congress typically funds in-kind food aid programs through the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Actâknown as the Agriculture appropriations bill. The Agriculture appropriations bill funds the U.S. Department of Agriculture (USDA) except for the Forest Service. In 2010, the U.S. Agency for International Development (USAID) began providing market-based assistance to supplement in-kind aid in emergency and nonemergency situations. Market-based assistance provides cash transfers, vouchers, or local and regional procurement (LRP)âfood purchased in the country or region where it is to be distributed rather than purchased in the United States. Congress funds most market-based assistance through the Department of State, Foreign Operations, and Related Programs (SFOPS) appropriations bill. The SFOPS appropriations bill funds the U.S. Department of State, USAID, and other non-defense foreign policy agencies. For FY2020, the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) provided approximately $4.091 billion for U.S. international food assistance programs. This was an 11% decrease from the $4.581 billion provided in FY2019. Division B of P.L. 116-94 provided $1.945 billion for international food assistance programs in Agriculture appropriations, including $1.725 billion for the Food for Peace (FFP) Title II program and $220 million for the McGovern-Dole International Food for Education and Child Nutrition Program. Division G of P.L. 116-94 provided an estimated $2.146 billion for international food assistance programs in SFOPS appropriations. This included an estimated $2.066 billion for the Emergency Food Security Program (EFSP) and $80 million for the Community Development Fund (CDF). This report provides an overview of accounts in the Agriculture and SFOPS appropriations bills that fund international food assistance programs. It summarizes the Trump Administration's FY2020 budget request for international food assistance. The report then details the international food assistance provisions in the FY2020 enacted Agriculture and SFOPS appropriations billsâDivision B and Division G of P.L. 116-94 , respectively. Congress funds most U.S. international food assistance programs through two annual appropriations billsâthe Agriculture appropriations bill and the SFOPS appropriations bill. The following sections detail each account in the Agriculture and SFOPS appropriations bills that funds international food assistance and the programs funded through these accounts. Table 1 lists each international food assistance account along with the respective appropriations bill, funded programs, primary delivery method, and implementing agency. Figure 1 depicts each U.S. international food assistance program by authorizing and appropriations committee jurisdiction and implementing agency. Some international food assistance programs under the jurisdiction of the Agriculture appropriations committees receive discretionary funding, while other programs receive mandatory funding. Congress authorizes discretionary funding levels in authorizing legislation. A program's receipt of any of the authorized funding then awaits congressional discretion in annual appropriations. With mandatory funding, Congress authorizes and provides funding in authorizing legislation. Thus, programs with mandatory funding do not require a separate appropriation. The Food for Peace Act (P.L. 83-480) is the primary authorizing legislation for international food assistance programs funded through agriculture appropriations. Congress reauthorizes discretionary and mandatory funding levels for these programs in periodic farm bills, most recently the Agriculture Improvement Act of 2018 (2018 farm bill; P.L. 115-334 ). Congress provides discretionary funding for international food assistance programs through three accounts in the Foreign Assistance and Related Programs title of the Agriculture appropriations bill: the Food for Peace Title I Direct Credit and Food for Progress Program account, the Food for Peace Title II Grants account, and the McGovern-Dole International Food for Education and Child Nutrition Program Grants account. Congress has periodically provided additional discretionary funding for international food assistance in the General Provisions title of the Agriculture appropriations bill. The Food for Peace (FFP) Title I Direct Credit and Food for Progress Program account provides administrative expenses for the FFP Title I and Food for Progress programs. FFP Title I provides concessional sales âsales on credit terms below market rates (loans)âof U.S. commodities to governments of developing countries and private entities. USDA administers FFP Title I. Congress has not appropriated funds for new FFP Title I sales since FY2006 but continues to appropriate funds to administer the FFP Title I loans provided before FY2006. Food for Progress donates U.S. agricultural commodities to governments or organizations to be monetized âsold on local markets in recipient countries to generate proceeds for economic development projects. Congress has authorized Food for Progress to receive both mandatory and discretionary funding. This account receives annual appropriations to cover administrative expenses. Congress primarily funds programmatic activities through mandatory funding. The Food for Peace Title II Grants account funds the FFP Title II program. FFP Title II donates U.S. agricultural commodities to recipients in foreign countries. FFP Title II provides both emergency and nonemergency aid. Typically, the majority of FFP Title II funds support emergency aid. USAID administers FFP Title II. Congress appropriates FFP Title II funds to USDA, which then transfers the funds to USAID. Since the mid-1980s, FFP Title II has received the majority of funds appropriated to international food assistance in the Agriculture appropriations bill. FFP Title II also receives some funding for nonemergency assistance from the Community Development Fund in the SFOPS appropriations bill (see \" SFOPS-Funded International Food Assistance Accounts \"). This account funds the McGovern-Dole International Food for Education and Child Nutrition Program. McGovern-Dole donates U.S. agricultural commodities to school feeding programs and pregnant or nursing mothers in qualifying countries. USDA administers McGovern-Dole. Since FY2016, Congress has set aside a portion of McGovern-Dole funds for LRP. The 2018 farm bill authorized USDA to use up to 10% of annual McGovern-Dole funds for LRP. Congress funds the Farmer-to-Farmer Program, also known as FFP Title V, through a set-aside of the total appropriation for Food for Peace Act programs. This program finances short-term placements for U.S. volunteers to provide technical assistance to farmers in developing countries. USAID administers the Farmer-to-Farmer Program. Statute sets minimum program funding as the greater of $10 million or 0.5% of annual funds for Food for Peace Act programs and maximum program funding as the greater of $15 million or 0.6% of annual funds for Food for Peace Act programs. Congress has authorized certain U.S. international food aid programs to receive mandatory funding. Food for Progress relies primarily on mandatory funding financed through USDA's Commodity Credit Corporation (CCC). Food for Progress does not typically receive discretionary funding beyond funding for administrative expenses provided by the FFP Title I account. However, in FY2019, Congress provided discretionary funding for Food for Progress in the General Provisions title of the Agriculture Appropriations Act. The Bill Emerson Humanitarian Trust (BEHT) is a reserve of funds held by the CCC. USDA can use BEHT funds to supplement FFP Title II activities, especially when FFP Title II funds alone cannot meet emergency international food needs. If USDA provides aid through BEHT, Congress may appropriate funds to the CCC in a subsequent fiscal year to reimburse the CCC for the value of the released funds. USDA did not release funds from BEHT in FY2019, and Congress did not appropriate any BEHT reimbursement funds to the CCC in FY2020. Congress funds international food assistance programs through two funding accounts in the SFOPS appropriation using discretionary funds. The International Disaster Assistance (IDA) funding account provides for EFSP, which USAID first employed in FY2010 to supplement its emergency FFP Title II in-kind aid. Congress permanently authorized the program in the Global Food Security Act of 2016 ( P.L. 114-195 ). Congress does not specify the exact funding level for EFSP in its annual appropriation; rather, USAID determines the allocation of IDA funds in response to humanitarian need in any given year. Between FY2015 and FY2019, EFSP represented an average of 47% of the whole IDA appropriation. Congress designates funding within the Development Assistance (DA) account for CDF. CDF funds complement FFP Title II nonemergency programs. USAID first used CDF in FY2010 to reduce its reliance on monetization âthe practice of implementing partners selling U.S. commodities on local markets and using the proceeds to fund programs. As with EFSP, CDF offers USAID the flexibility to pursue market-based interventions including cash transfers, food vouchers, and LRP. Today, CDF continues to complement FFP Title II nonemergency programming but is no longer needed to offset monetization, as the practice is no longer a legislative requirement. Congress designates the level of CDF in its reports accompanying annual appropriations (often referred to as a \"soft earmark\"). For more information on CDF, see CRS Report R45879, International Food Assistance: Food for Peace Nonemergency Programs , by Emily M. Morgenstern. For the third year in a row, the Trump Administration's FY2020 budget request proposed eliminating McGovern-Dole and FFP Title II. However, unlike in the FY2018 and FY2019 requestsâin which the President proposed shifting all funding for international food assistance to the IDA account within the SFOPS appropriations billâthe President's FY2020 request proposed creating a new International Humanitarian Assistance (IHA) account. The proposed IHA account would have consolidated four humanitarian assistance accountsâthe IDA, Migration and Refugee Assistance, and Emergency Refugee and Migration Assistance accounts that are funded in SFOPS appropriations, along with FFP Title II within Agriculture appropriationsâinto a single account within the SFOPS appropriations bill. The FY2020 budget request also repeated past proposals to eliminate Food for Progress and merge the DA account with the Economic Support Fund (ESF), Democracy Fund (DF), and Assistance for Europe, Eurasia, and Central Asia (AEECA) accounts to create a new Economic Support and Development Fund (ESDF) within SFOPS appropriations. Congress did not adopt the Administration's FY2020 proposals to eliminate FFP Title II, McGovern-Dole, or Food for Progress or create the new combined IHA and ESDF accounts. The following section summarizes the Administration's FY2020 budget requests for U.S. international food assistance programs in the Agriculture and SFOPS appropriations bills. For FY2020, the Trump Administration requested discretionary funding for one international food assistance program account. The Administration requested $135,000 for the FFP Title I account to carry out existing FFP Title I loans and Food for Progress projects. This amount would have been $14,000 less than the FY2019 enacted amount for the FFP Title I account. The Administration's FY2020 budget request stated that the workload to administer FFP Title I was \"significantly less than previously estimated\" and that \"funds were redirected to meet higher priorities.\" The FY2020 request also repeated the FY2018 and FY2019 proposals to eliminate FFP Title II, and McGovern-Dole and the FY2019 proposal to eliminate Food for Progress. Regarding FFP Title II, the Administration stated \"To replace the inefficient food aid provided through Title II, the 2020 request includes funding for emergency food needs within the new, more efficient International Humanitarian Assistance (IHA) account.\" Eliminating FFP Title II would fund all emergency food assistance through the SFOPS appropriations rather than jointly between the SFOPS and Agriculture appropriations bills. Regarding the proposed elimination of McGovern-Dole, the Administration's FY2020 request stated, \"In kind food aid is associated with high transportation and other costs and is inefficient compared to other types of development assistance. In addition, the McGovern Dole program has unaddressed oversight and performance monitoring challenges.\" Food for Progress primarily receives mandatory funding. The FY2020 request proposes to eliminate mandatory funding authority, estimating that this would result in $1.7 billion in savings over 10 years. The FY2020 SFOPS budget proposal included a combined IHA account that would have consolidated the four humanitarian assistance accounts. According to budget documents, the IHA account would have supported \"all aspects of humanitarian assistance, including shelter, protection, emergency health and nutrition, the provision of safe drinking water, livelihoods supports, emergency food interventions, rehabilitation, disaster risk reduction, and transition to development assistance programs,\" among other activities. The account would have been managed by the newly consolidated Humanitarian Assistance Bureau at USAID but with a \"senior dual-hat leader\" under the policy authority of the Secretary of State reporting to both the Secretary of State and the USAID administrator. The Administration proposed $5.97 billion for the IHA account, a 37% decrease from the combined FY2019 appropriations for IDA, FFP Title II, Migration and Refugee Assistance, and Emergency Refugee and Migration Assistance. The FY2020 SFOPS budget proposal also included a combined ESDF account that would have merged the DA, ESF, DF, and AEECA accounts. The FY2020 proposal included $5.23 billion for ESDF, a 32% decrease from the FY2019 appropriations for the four accounts combined. Moving funding from FFP Title II to a new IHA could have changed how the United States delivers food assistance to recipient countries. Statute requires that nearly all assistance distributed under FFP Title II be in-kind aid. By contrast, EFSP, which Congress currently funds through the IDA account but which the Administration proposed to fund through the new IHA, does not have a statutory requirement to provide a portion of assistance as in-kind aid. EFSP can provide in-kind aid or market-based assistance. Therefore, under current statutes, shifting international food assistance funding from FFP Title II to IHA would have meant this funding would not have needed to adhere to the FFP Title II requirement to provide in-kind aid. This could have increased the portion of food assistance provided as market-based assistance rather than in-kind aid and would have shifted implementation from USDA to USAID. Proposals to shift U.S. international food assistance funding from in-kind food aid to market-based food assistance are not new. Both the Obama and George W. Bush Administrations proposed increasing the portion of U.S. international food assistance delivered as market-based assistance. Some proponents of increasing the use of market-based assistance argue that it could improve program efficiency. However, some interested parties assert that the Trump Administration's proposed decrease in overall funding for international food assistance could offset potential efficiency gains, resulting in fewer people receiving assistance. Some opponents of increasing the share of food assistance that is market-based rather than in-kind maintain that in-kind aid ensures that the United States provides high-quality food to recipients. Certain stakeholders, such as some agricultural commodity groups, may also oppose such changes due to their implications for U.S. government purchase of U.S. commodities. In addition to the implications above, there are a number of international food assistance issues in which Members of Congress have expressed interest. These include the share of in-kind and market-based food assistance, cargo preference requirements, and congressional jurisdiction, among others. For more information on the broad range of international food assistance-related issues, see CRS Report R45422, U.S. International Food Assistance: An Overview , by Alyssa R. Casey. The FY2020 Agriculture Appropriations Act provided funding for U.S. international food assistance programs in the Foreign Assistance and Related Programs title (Title V). This included funding for FFP Title II and McGovern-Dole. The act also provided funding for administrative expenses to manage existing FFP Title I loans that originated while the FFP Title I program was active. Unlike in FY2019, Congress did not provide discretionary funding in FY2020 for the Food for Progress program. The FY2020 SFOPS Appropriations Act provided funding for international food assistance programs in Bilateral Assistance (Title III). Figure 2 shows funding trends for international food assistance programs for FY2015-FY2020. Table 2 details appropriations for international food assistance programs for FY2018-FY2020, including proposed funding levels in the FY2020 Administration's request and House and Senate Agriculture and SFOPS appropriations bills. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 , Div. B) provided $1.945 billion for international food assistance programs, roughly level with the FY2019 enacted amount of $1.942 billion. The FY2020 enacted amount was less than the $2.085 billion in the House-passed Agriculture appropriations bill ( H.R. 3055 ) but more than the $1.926 billion in the Senate-passed bill ( H.R. 3055 ). Congress did not adopt the Administration's FY2020 proposal to eliminate FFP Title II, McGovern-Dole, and Food for Progress. The FY2020 act provided $1.725 billion for FFP Title II, a 0.5% increase from the $1.716 billion provided in FY2019. In FY2020, Congress provided all FFP Title II funding in the Foreign Assistance and Related Programs title (Title V) of the Agriculture appropriations bill. This was a change from FY2019, when Congress provided the majority of FFP Title II funding ($1.5 billion) in the Foreign Assistance title but provided additional funding for FFP Title II ($216 million) in the bill's General Provisions title (Title VII). The FY2020 act provided $220 million for McGovern-Dole, a 5% increase from the FY2019 enacted amount of $210. Congress directed a minimum of $20 million of McGovern-Dole funding and a maximum of 10% of total program funding ($22 million) be set aside for LRP. This was an increase from the $15 million set-aside in FY2019. The FY2020 act also provided $142,000 for FFP Title I and Food for Progress administrative expenses, equal to the FY2019 enacted amount. Unlike in FY2019, the FY2020 act did not provide discretionary appropriations for Food for Progress. Congress typically funds this program through mandatory funding. The 2018 farm bill ( P.L. 115-334 , Â§3302) authorized new pilot agreements within the Food for Progress program to directly fund economic development projects rather than funding the projects through monetizing commodities. The 2018 farm bill authorized $10 million per year for FY2019-FY2023 for pilot agreements, subject to annual appropriations. Congress did not appropriate funding for Food for Progress pilot agreements in FY2019 or FY2020. Division G of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) provided funds for international food assistance programs appropriated under the SFOPS measure. The enacted IDA appropriation level grew by 0.2%, from $4.385 billion in FY2019 to $4.395 billion in FY2020. As in prior fiscal years, the measure did not determine a specific level for EFSP. IDA funds are designated to \"carry out the provisions of section 491 of the Foreign Assistance Act of 1961 for international disaster relief, rehabilitation, and reconstruction assistance.\" Because the account is meant to respond to international emergencies, Congress tends to appropriate funds in a lump sum instead of directing funds toward specific countries or crises. As in previous fiscal years, the final FY2020 act included $80 million for CDF under DA. In addition to providing funding, the Agriculture and SFOPS appropriations bills may contain policy-related provisions that direct the executive branch how to spend certain funds. Provisions included in appropriations act text have the force of law but generally only for the duration of the fiscal year for which the act provides appropriations. Policy-related provisions generally do not amend the U.S. Code . Table 3 compares select policy-related provisions pertaining to U.S. international food aid programs from the Foreign Assistance and Related Programs (Title V) and General Provisions (Title VII) titles of the FY2019 and FY2020 Agriculture Appropriations Acts. There was no language from the SFOPS bills for a similar table. The explanatory statement that accompanies the appropriations act, as well as the committee reports that accompany the House and Senate committee-reported bills, can provide statements of support for certain programs or directions to federal agencies on how to spend certain funding provided in the appropriations bill. While these documents generally do not have the force of law, they can express congressional intent. The committee reports and explanatory statement may need to be read together to capture all of the congressional intent for a given fiscal year. Table 4 compares selected policy-related provisions pertaining to U.S. international food aid programs from the FY2019 and FY2020 House and Senate committee reports and explanatory statement for the FY2020 Agriculture Appropriations Act. Table 5 compares one selected policy-related provision pertaining to U.S. international food assistance programs from the FY2019 and FY2020 House and Senate committee reports and explanatory statement for the FY2020 SFOPS appropriation. ", "summary": "U.S. international food assistance programs provide food, or the means to purchase food, to people around the world at risk of hunger. Congress funds these programs through two appropriations bills: the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Actâalso known as the Agriculture appropriations billâand the Department of State, Foreign Operations, and Related Programs (SFOPS) Appropriations Act. The Agriculture appropriations bill funds the U.S. Department of Agriculture (USDA) except for the Forest Service. The SFOPS appropriations bill funds the U.S. Department of State, U.S. Agency for International Development (USAID), and other non-defense foreign policy agencies. Both bills provide funding for U.S. international food assistance programs. Appropriations for agricultural development programs, such as Feed the Future or international agricultural exchange programs, are not considered part of food assistance spending. For FY2020, the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), provided an estimated $4.091 billion in funding for U.S. international food assistance programs. This was an 11% decrease from the $4.581 billion provided in FY2019. Division B of the act provided $1.945 billion in agriculture appropriations for international food assistance programs, including $1.725 billion for the Food for Peace (FFP) Title II program and $220 million for the McGovern-Dole International Food for Education and Child Nutrition Program. Division G of the act provided an estimated $2.146 billion for international food assistance in SFOPS appropriations. This included $80 million in the Community Development Fund and an estimated $2.066 billion for the Emergency Food Security Program (EFSP). Congress funds EFSP within the International Disaster Assistance (IDA) account but does not designate a specific amount for the program. USAID allocates IDA funds to EFSP and other non-food humanitarian response programs. The estimated FY2020 EFSP appropriation is a CRS calculation based on a five-year average of the percentage of IDA funds allocated to EFSP. In its FY2020 budget request, the Trump Administration proposed to eliminate the FFP Title II, McGovern-Dole, and Food for Progress programs, which Congress funds within Agriculture appropriations. The Administration proposed to consolidate multiple accounts, including accounts within Agriculture and SFOPS appropriations that fund international food assistance and other humanitarian assistance, into a new International Humanitarian Assistance account. Congress did not adopt these proposals. In addition to funding U.S. international food assistance programs, the FY2020 Agriculture appropriations bill included policy-related provisions that directed the executive branch how to carry out certain appropriations. The Explanatory Statement accompanying P.L. 116-94 , as well as committee reports accompanying the House and Senate Agriculture and SFOPS appropriations bills, also included policy provisions related to international food assistance. For example, one provision directed that a certain amount of the funds appropriated for the McGovern-Dole Program be used for local and regional procure ment âfood assistance purchased in the country or region where it is to be distributed rather than purchased in the United States.", "document_type": "crs"}
{"report": "T he current September 11 th Victim Compensation Fund (VCF) provides cash benefits to certain persons whose health may have been affected by the aftermath of the September 11, 2001, terrorist attacks on the Pentagon and the World Trade Center, and the terrorist-related aircraft crash at Shanksville, PA. The current iteration of the VCF may be unable to pay full benefits to eligible persons and is scheduled to sunset on December 18, 2020. Current VCF data are provided in this report's Appendix . On September 22, 2001, the Air Transportation Safety and System Stabilization Act (ATSSA; P.L. 107-42 ) was enacted into law. Quickly passed by Congress in the wake of the September 11, 2001, terrorist attacks, this legislation provided various forms of relief to the American airline industry and affirmed Congress's commitment to improving airline safety. Title IV of the ATSSA also established the VCF to compensate persons injured or the representatives of persons killed in the attacks or their immediate aftermath. The VCF originally closed in 2003 and was reopened in 2011 and expanded to provide compensation to responders to the September 11, 2001, terrorist attacks and others, such as certain New York City residents, who may have suffered health effects in the aftermath of the attacks. The VCF was reauthorized in 2015 and, if not reauthorized in the 116 th Congress, will sunset on December 18, 2020. The original VCF, as created by Title IV of the ATSSA, provided cash benefits to the following groups of persons who suffered physical injury or death as a result of the terrorist attacks of September 11, 2001: persons who were present at the World Trade Center, Pentagon, or aircraft crash site in Shanksville, PA, at the time of or in the immediate aftermath of the aircraft crashes at those sites on September 11, 2001; and passengers and crew of any aircraft that crashed on September 11, 2001, as a result of terrorist activity. The amount of benefits available to each claimant was determined by a Special Master appointed by the Attorney General. The amount of benefits payable to each claimant was based on each person's economic losses (such as loss of future earnings) and noneconomic losses (such as pain and suffering). The VCF statute specifically prohibited the payment of punitive damages. Benefits were reduced by certain collateral source payments, such as life insurance benefits, available to the claimant. There was no cap on the amount of benefits that any one person could receive or on total benefits paid. By filing a VCF claim, a person waived his or her right to file a civil action or be a party to such an action in any federal or state court for damages related to the September 11, 2001, terrorist-related aircraft crashes. This provision established the VCF as an alternate and expedited route to compensation for victims while providing some protection against lawsuits for damages that may have been brought by victims against the air carriers; airframe manufacturers; the Port Authority of New York and New Jersey, who owned the World Trade Center; or any other entity. Congress provided funding for the VCF through an appropriation of \"such sums as may be necessary\" for benefit payment and administration. The Special Master of the VCF was required to promulgate regulations to govern the program within 90 days of the law's enactment, and all claims had to be filed within two years of the regulations' promulgation, at which time the VCF would close. The original VCF received 7,403 claims and made awards totaling $7.049 billion to 5,560 claimants. The original VCF was closed to new claims in December 2003. However, concerns about injuries and illnesses incurred by persons involved in emergency response, recovery, and debris removal operations at the September 11 th aircraft crash sites led Congress to reopen the VCF with the enactment of Title II of the James Zadroga 9/11 Health and Compensation Act of 2010 (Zadroga Act; P.L. 111-347 ). The reopened VCF extended eligibility for cash benefits to persons who suffered physical injuries or illnesses as a result of rescue, recovery, or debris removal work at or near the September 11 th aircraft crash sites during the period from September 11, 2001, to May 30, 2002, as well as certain persons who lived, worked, or were near the World Trade Center on September 11, 2001. The VCF was initially reopened for new claims through October 3, 2016. Total benefits and administrative costs paid by the reopened VCF were limited to $2.775 billion, unlike in the original VCF, which had no cap on total funding for benefits, allowing the Special Master to award benefits without considering the benefits' total cost. Under the reopened VCF, attorneys' fees were limited to 10% of the VCF award. The reopened VCF was scheduled to stop taking claims on October 3, 2016. The VCF was reauthorized on December 18, 2015, with the enactment of Title IV of Division O of the Consolidated Appropriations Act, 2016 (Zadroga Reauthorization Act of 2015; P.L. 114-113 ). Under this reauthorization, claims approved before the reauthorization date are considered Group A claims. Group A claims are subject to the same rules as claims under the reopened VCF and are subject to the $2.775 billion cap on total benefit payments. All other claims filed before the final VCF deadline of December 18, 2020, are considered Group B claims subject to additional rules and funding caps established by the reauthorization legislation. Thus, all current claims are Group B claims. To be eligible for VCF benefits, a person must have died as a passenger or crew member on one of the aircraft hijacked on September 11, 2001; died as a direct result of the terrorist-related aircraft crashes or rescue, recovery, or debris removal in the immediate aftermath of the September 11, 2001, terrorist attacks; or been present at a September 11 th crash site in the immediate aftermath of the September 11, 2001, terrorist attacks and suffered physical harm as a direct result of the crashes or the rescue, recovery, and debris removal efforts. For the purposes of VCF eligibility, the immediate aftermath of the September 11 th terrorist attacks is the time period from September 11, 2001, to May 30, 2002. For the purposes of VCF eligibility, the September 11 th crash sites include the World Trade Center, Pentagon, or Shanksville, PA, crash sites; the buildings or portions of buildings that were destroyed as a result of the September 11 th terrorist attacks; the area in Manhattan that is south of the line that runs along Canal Street from the Hudson River to the intersection of Canal Street and East Broadway, north on East Broadway to Clinton Street, and east on Clinton Street to the East River; and any area related to debris removal, such as the debris-removal barges and Fresh Kills in Staten Island, New York. To be eligible for the VCF, individuals who did not die as passengers or crew members of one of the hijacked aircraft, or as a direct result of the September 11 th terrorist attacks (including rescue, recovery, and debris removal), must have suffered physical harm as a result of the attacks. For the purposes of VCF eligibility, physical harm is demonstrated by the presence of a World Trade Center (WTC)-related physical health condition as defined for the purposes of the World Trade Center Health Program (WTCHP). A WTC-related physical health condition is a physical health condition covered by the WTCHP. These conditions are those provided in statute at Sections 3312(a) and 3322(b) of the Public Health Service Act (PHSA) and those added through rulemaking by the WTCHP administrator. Per Section 3312(a) of the PHSA, to be covered by the WTCHP and thus compensable under the VCF, a condition must be on the list of covered WTCHP-covered conditions and it must be determined that exposure in the aftermath of the September 11, 2001, terrorist attacks \"is substantially likely to be a significant factor in aggravating, contributing to, or causing the illness or health condition.\" In most cases, the VCF requires that a person's condition be certified by the WTCHP for that condition to be compensable. The WTCHP provides guidance on how to evaluate if a person's condition meets the standard to be linked to exposure in the aftermath of the September 11, 2001, terrorist attacks. This evaluation is based on a combination of the amount of time a person was physically present at a site and the specific activitiesâsuch as search and rescue, sleeping in a home in Lower Manhattan, or just passing through a siteâin which the person engaged. For example, a person who was engaged in search and rescue activities at the World Trade Center site between September 11 and September 14, 2001, must have been present for at least 4 hours for the WTCHP to certify his or her condition and thus compensable by the VCF, whereas a person whose only activity was passing through Lower Manhattan during the same period, and who was not caught in the actual dust cloud resulting from the buildings' collapse, would have to have been in the area for at least 20 hours to be eligible for compensation. The WTCHP evaluates conditions that do not meet the minimum exposure criteria on a case-by-case basis using \"professional judgement\" and \"any relevant medical and/or scientific information.\" WTCHP-covered mental health conditions may not be used to establish VCF eligibility, as the VCF does not include any provisions for benefit payments for mental health conditions. The WTCHP statute does not include any type of cancer in the list of WTC-related health conditions. However, the statute does require the WTCHP administrator to periodically review the available scientific evidence to determine if any type of cancer should be covered by the WTCHP and, by extension, the VCF. In response to a petition to add conditions to the list of WTC-related health conditions, the WTCHP administrator is required, within 90 days, to either request a recommendation on action from the WTC Scientific/Technical Advisory Committee (STAC) or make a determination on adding the health condition. If the WTCHP administrator requests a recommendation from the STAC, that recommendation must be made within 90 days of its receipt and the WTCHP administrator must act on that request within an additional 90 days. On September 7, 2011, Representatives Carolyn B. Maloney, Jerrold Nadler, Peter King, Charles B. Rangel, Nydia M. Velazquez, Michael G. Grimm, and Yvette Clarke and Senators Charles E. Schumer and Kirsten E. Gillibrand filed a petition, in the form of a letter to the WTCHP administrator, requesting that the administrator \"conduct an immediate review of new medical evidence showing increased cancer rates among firefighters who served at ground zero\" and that the administrator \"consider adding coverage for cancer under the Zadroga Act.\" In response to this petition, the WTC administrator requested that the STAC \"review the available information on cancer outcomes associated with the exposures resulting from the September 11, 2001, terrorist attacks, and provide advice on whether to add cancer, or a certain type of cancer, to the List specified in the Zadroga Act.\" On September 12, 2012, based on the STAC's recommendations, the WTCHP administrator added more than 60 types of cancer, covering nearly every body system and including any cancers in persons less than 20 years of age and any rare cancers, to the list of WTC-related health conditions, thus making these conditions compensable under the VCF. In a review of the decision to add cancers to the list of WTC-related health conditions, the Government Accountability Office (GAO) found that the WTCHP administrator used a hazards-based approach to evaluate cancers. This approach evaluated whether exposures in the aftermath of the September 11, 2001, terrorist attacks were associated with types of cancer but did not evaluate the probability of developing cancer based on a given exposure. A GAO-convened scientific panel indicated that the hazards-based approach the WTCHP administrator used was reasonable given data constraints and the fact that there is a certification process to determine if a cancer or other condition on the list of WTC-related health conditions meets the statutory requirement of being \"substantially likely to be a significant factor in aggravating, contributing to, or causing the illness or health condition.\" The panel also indicated that this approach could have benefited from an independent peer review process. The WTCHP administrator stated that peer review was not possible given the statutory time constraints to act on the petition and the STAC's recommendation. One year later, the WTCHP administrator added prostate cancer to the list of WTC-related health conditions. The WTCHP administrator has also established minimum latency periods for certain types of cancer and maximum onset periods for certain types of aerodigestive disorders. The Civil Division of the Department of Justice administers the VCF. The VCF Special Master, currently Rupa Bhattacharyya decides VCF eligibility and benefits. A claimant dissatisfied with the Special Master's decision on his or her claim may file an appeal and request a hearing before a VCF hearing officer appointed by the VCF. There is no further right of appeal or judicial review of VCF decisions. A claimant may amend his or her claim after a decision has been made if the claimant has new material relevant to the claim. All claims for VCF benefits must be filed by December 18, 2020, five years after the VCF reauthorization act's enactment. Before filing a claim, a potential claimant must have registered with the VCF by one of the following applicable deadlines: by October 3, 2013, if the claimant knew, or reasonably should have known, that he or she suffered a physical harm or died as a result of the September 11 th attacks or rescue, recovery, or debris removal efforts, and that he or she was eligible for the VCF, on or before October 3, 2011; within two years of the date the claimant knew, or reasonably should have known, that he or she has a WTC-related physical health condition or died as a result of the September 11 th attacks and is eligible for the VCF. If a claimant has a condition that is later added to the list of conditions covered by the WTCHP, then the two-year period begins on the later of the dates when a government entity, such as the WTCHP or a state workers' compensation agency, determines that the condition is related to the September 11 th attacks, or when a claimant's condition is added to the list of conditions covered by the WTCHP. Benefits under the original VCF were not subject to any caps on individual or total payments. When the VCF was reopened, total benefits were subject to a cap of $2.775 billion; however, there were no specific caps on individual benefits. VCF benefits for Group B are subject to caps on noneconomic losses and total benefits. Benefits under the VCF for Group B claims are determined by the Special Master based on the claimant's economic and noneconomic losses. For noneconomic losses, there is a cap of $250,000 for claims based on cancer and $90,000 for all other claims. However, for cases in which a person's death was caused by a WTC-related health condition, the VCF regulations provide that the presumed award for noneconomic loss is $250,000 plus an additional $100,000 for the person's spouse and each dependent. When calculating economic losses, the Special Master is only permitted to consider the first $200,000 in annual income when determining losses to past earnings and future earning capacity, which limits the amount of economic losses that can be paid. There is a total cap of $4.6 billion for VCF Group B awards. As in past iterations of the VCF, benefits are reduced by certain collateral source payments available to claimants, such as life insurance benefits, workers' compensation payments, and government benefits related to the person's injury or death, such as Social Security Disability Insurance (SSDI) and the Public Safety Officers' Benefits Program (PSOB). The costs of VCF benefits and administration are not subject to annual appropriations. Rather, costs for Group A benefits and administration were financed by the $2.775 billion in appropriations provided by the Zadroga Act. Costs for Group B benefits and administration are financed by the one-time appropriation of $4.6 billion provided in the Zadroga Reauthorization Act of 2015. Thus, the total funding available for the VCF since its reopening is $7.375 billion. Funding was made exempt from budget sequestration by the Zadroga Reauthorization Act of 2015. Total funding for VCF benefits and administrative costs is capped by the $7.375 billion in appropriations that have been provided in the Zadroga Act and Zadroga Reauthorization Act of 2015, with a total cap of $4.6 billion for VCF Group B awards. The VCF statute requires the Special Master to annually reassess VCF policies and procedures to determine if these policies and procedures satisfy the statutory requirements that claimants with the most debilitating physical conditions have their claims prioritized and that total expenditures for awards and administrative costs associated with Group B claims do not exceed the $4.6 billion in available funding. In October 2018, the Special Master published a Notice of Inquiry in the Federal Register seeking public comments on possible policy changes that the Special Master could consider to ensure there is sufficient funding to administer and pay future VCF claims without exceeding the $4.6 billion cap on Group B expenditures. The Special Master received 28 comments in response to this Notice of Inquiry, of which 16 were relevant to the request for information on possible VCF policy and procedure changes. In February 2019, the Special Master published her most recent annual assessment of VCF policies and procedures. This report includes two sets of projections of future VCF benefit and administrative costs. One projection is based on historical program data and another projection is based on these historical data, augmented by data on recent program trends. These two models were also used in the 2017 assessment, whereas the 2018 assessment only projected costs based on historical program data. As shown in Table 1 , the Special Master projects under both models that total VCF program costs by the end of the program will far exceed the $7.375 billion in available funding. This is the first time the Special Master projects that program funding will be insufficient to pay all VCF benefits and administrative expenses. On June 21, 2019, during testimony before the House Committee on the Judiciary, the Special Master pointed to increases in death claims, cancer claims, and claims from non-responders have played a role in driving projected benefit costs above the amount of available funding Congress provided. The Special Master did not, however, break down how much of the cost increases can be attributed to each of these three factors. As of May 31, 2019, the Special Master has determined that 1,057 death claims are eligible for the reopened VCF. Of these, award decisions based on economic and noneconomic loss have been made in 856 cases. As a comparison, the original VCF paid awards in 2,880 cases of death. Because there is a regulatory presumption of noneconomic loss of $250,000 for the decedent and an additional $100,000 for the spouse and any dependents, noneconomic loss awards in death cases have the potential to be larger than those in injury cases. Since the VCF's reauthorization in 2015, the number of eligible and awarded death cases has increased significantly. For claims paid prior to reauthorization (Group A claims), awards were paid in 17 death cases. Thus, in less than four years since reauthorization, there has been a nearly 5,000% increase in death awards. Of the 839 death awards paid since reauthorization, 517 were awarded in the period between April 30, 2018, and April 30, 2019, with an additional 43 claims paid in May 2019. Through the end of May 2019, there has been an average of more than 35 new eligibility decisions and more than 48 new awards in death claims per month. Although the Special Master does not discuss the causes of the increases in death claims, the nature of many of the compensable medical conditions, especially certain types of cancer with low survival rates, means that many persons eligible for compensation from the VCF will likely die as a result of their WTC-related health conditions, thus possibly making their families eligible for death compensation. Cancers were first added to the VCF as compensable conditions in September 2012. Since then, there have been 8,734 cases with at least one form of cancer determined to be eligible for the VCF. As of the end of April 2019, eligible claims with at least one type of cancer made up 37% of all eligible VCF claims. As shown in Table 2 , the most significant growth in cancer claims occurred shortly after cancers were added to the list of WTC-eligible health conditions and also in the most recent year. Between September 30, 2014, and December 31, 2015, the number of eligible claims with cancer as the only compensable condition (cases that would not otherwise be eligible for the VCF if not for the addition of cancer) increased 194% from 472 claims to 1,387 claims. This increase is understandable and expected given that this was early in the period during which cancer claims were first eligible for compensation. However, the recent increase in eligible cancer-only claims as a percentage of all eligible claims is one of the factors that drove the projected program costs, which were just below total available funds in the 2018 assessment, over the funding cap in the 2019 assessment. In 2018, the number of eligible cancer-only claims increased 58%. At the end of 2018, eligible cancer-only claims made up 18% of all eligible claims. The increase in eligible cancer claims is notable for three reasons. First, no types of cancer were compensable when the VCF was originally reopened in 2010 and no cancers were included in the list of WTC-related health conditions created by Congress in the Zadroga Act. Cancers were added to the list of covered conditions by the WTCHP administrator in two determinations made in 2012 and 2013. These determinations resulted in more than 60 types of cancer covering nearly every body system being compensable under the VCF. Neither the VCF nor WTCHP statutes include any specific provisions requiring any follow-up or continuous review of scientific evidence to determine if, in the nearly seven years since these determinations were made, there is any additional evidence to support or refute including these types of cancers in the list of WTC-related health conditions compensable under the VCF. The GAO cited limitations on data available in 2012 as a reason that its scientific panel found the WTCHP administrator's use of a hazards-based rather than probability model to add cancers to the list of WTC-related health conditions reasonable. Given the increases in the number of persons receiving services from the WTCHP and developing cancer in the years since the 2012 and 2013 cancer determinations, there may be additional data to warrant reevaluating the list of covered cancers or evaluating the likelihood of developing cancer after different types of exposures in the aftermath of the September 11, 2001, terrorist attacks. In addition, the VCF covers a wide range of persons from firefighters and police officers who were the first responders to the attacks, to construction and other workers who were involved in debris removal, and to adults and children who were in lower Manhattan at the time of the attacks, all of whom may have had different types and durations of exposure to toxic substances in the aftermath of the attacks. Although the determination that a person's health condition was linked to his or her exposure in the aftermath of the September 11, 2001, terrorist attacks is based on a combination of duration and nature of exposure, the list of covered conditions, including all cancers except childhood cancer, applies equally to all persons with no accounting for individual exposure experience. Second, the VCF is a program of presumptive eligibility. Thus, when determining eligibility for the VCF, controlling factors such as genetics, age, behaviors such as tobacco use, or exposure to other toxins are not considered and the Special Master does not make a determination as to the probability that a person's exposure in the aftermath of the September 11, 2001, terrorist attacks caused his or her cancer. Rather, the only requirement that a cancer or other health condition be linked to a person's exposure in the aftermath of the attacks is the WTCHP's determination that such exposure \"is substantially likely to be a significant factor in aggravating, contributing to, or causing the illness or health condition.\" In addition, the WTCHP administrator did not consider the likelihood or probability that any given cancer would occur based on the hazards experienced in the aftermath of the September 11, 2001, attacks when cancers were added to list of WTC-related health conditions. This approach is different than the probability of causation model used for some cancer claims under Part B of the Energy Employees Occupational Illness Compensation Program Act (EEOICPA), in which the probability that a person's cancer was caused by occupational exposure to ionizing radiation must be 50% or greater to receive compensation. The VCF's presumptive eligibility model is also in contrast to the probability of causation model recommended by the National Research Council Board on Radiation Effects Research to be used to determine eligibility for benefits under the Radiation Exposure Compensation Act (RECA) for persons who lived near the Nevada Test Site during atmospheric atomic weapons testing. However, the presumptive eligibility model is used for other federal compensation programs, including disability compensation for veterans exposed to radiation and Agent Orange. Third, cancer claims have the potential to result in higher benefits than non-cancer claims. The cap on noneconomic loss awards for cancer claims is $250,000 versus $90,000 for non-cancer claims. Since it was reauthorized in 2015, the VCF has paid awards to an increasing number of non-responders. For claims paid prior to reauthorization (Group A claims), awards to non-respondersâincluding those who participated in cleaning or maintenance work near one of the crash sites or persons who lived in, worked in, attended school in, or were visiting lower Manhattan between September 11, 2001, and May 30, 2002âmade up 14% of total initial compensation awards. As of the end of 2018, the percentage of total awards made to non-responders had risen to 19% of total initial awards. Although the Special Master cites the increase in non-responder claims as one of the causes of the increase in VCF benefit costs and the recent projection that program costs will exceed available funding, limitations in the data reported by the VCF make analyzing this potential cost driver difficult. In her congressional testimony, the Special Master states \"At the time of Reauthorization in December 2015, not quite 14% of all VCF awards were paid to non-responders. Today, just about 38% of claims filed are from this population.\" However, this is not a direct comparison, as the Special Master is comparing data on awards with data on claims filed, regardless of whether those claims result in awards without any additional information on the percentage of claims filed that may result in awards. In addition, the data reported by the VCF in its annual status reports are, according to the VCF, self-reported data. Finally, in each year's data on claimant categories, there are a number of cases listed as \"no response.\" Of the 20,981 initial awards reported in the VCF's most recent status report, for example, 370 cases, or 2% of total awards, are listed in the \"no response\" category. Because award costs under both models are projected to exceed the $7.375 billion in available funding, in February 2019, the Special Master announced the following reductions in the amounts of all future VCF awards for all cases pending as of February 25, 2019: For all cases filed on or before February 1, 2019; the calculated award is to be reduced by 50%; For all cases that qualify for expedited processing because the claimant has a terminal illness or significant financial hardship, the calculated award is to be reduced by 50%; and For all cases filed after February 1, 2019, the calculated award is to be reduced by 70%. In all cases, the full amount of any offsets for collateral source payments are to continue to be taken. The award reductions are not to apply to appeals decisions initially issued before February 25, 2019. However, there will be scheduling adjustments for future appeals. For appeals of noneconomic loss decisions, the VCF is to schedule appeals hearings only for cases involving the most severe conditions, such as cancer, interstitial lung disease, and sarcoidosis. For all other noneconomic loss and economic-loss cases, the VCF is not to schedule appeals hearings until after December 18, 2020. These schedule changes are designed to ensure that there is sufficient funding to pay increased noneconomic loss determinations made on appeal for the most severe conditions. The VCF is scheduled to sunset on December 18, 2020. The 116 th Congress faces the question of whether to reauthorize the program or let it expire. On June 12, 2019, the House Committee on the Judiciary ordered that H.R. 1327 , the Never Forget the Heroes: Permanent Authorization of the September 11 th Victim Compensation Fund Act, be reported. Identical legislation, S. 546 , is pending committee action in the Senate. This reauthorization legislation includes the following major components: authorization for the VCF through FY2090, with a deadline of October 1, 2089, to file claims; removal of the cap on VCF funding; appropriations of \"such sums as may be necessary\" for the VCF for each fiscal year through FY2090; payment of the difference between the full award and the actual amount received for all persons who received reduced awards due to the Special Master's actions; authority for the Special Master to exceed the limit on noneconomic loss if it is determined that a person's pain and suffering is of such severity as to make the award \"insufficiently compensatory\"; and a cost of living adjustment, to be made every five years, to the maximum amount of annual income permitted to be considered by the Special Master when determining economic loss (currently $200,000). The reauthorization legislation would not make any changes to the basic eligibility for VCF awards. The legislation also would not specifically address the three drivers of increased VCF costs that the Special Master identified in her 2019 congressional testimony: (1) increases in death claims, (2) cancer claims, and (3) claims from non-responders. However, because this legislation would provide full funding for the VCF not subject to annual appropriations, any increases in program costs would not result in the VCF having insufficient funding to pay all benefits. The Congressional Budget Office has estimated that this legislation, if enacted, would result in $6.785 billion in direct spending on benefits and administration between FY2019 and FY2024 and $10.180 billion in spending between FY2019 and FY2029. On July 12, 2019, the House of Representatives passed H.R. 1327 with the following amendments: the bill's title was changed to the \"Never Forget the Heroes: James Zadroga, Ray Pfeifer, and Luis Alvarez Permanent Authorization of the September 11 th Victim Compensation Fund Act\"; the appropriations of \"such sums as may be necessary\" for the VCF for each fiscal year through FY2090 is changed to include each fiscal year through FY2092, and the deadline for filing claims is changed from October 1, 2089, to October 1, 2090; the authority for the Special Master to exceed the limit on noneconomic loss is changed from requiring a determination that a person's pain and suffering is of such severity as to make the award \"insufficiently compensatory\" to a determination that the claim \"presents special circumstances\"; the original bill's requirement that the Special Master apply a cost-of-living adjustment to the maximum amount of annual income permitted to be considered when determining economic loss (currently $200,000) every five years was replaced with a provision requiring the Special Master to \"periodically\" adjust the limit \"to account for inflation\"; a provision was added permitting the Attorney General to appoint up to two Deputy Special Masters and providing that the Special Master and the deputies serve at the pleasure of the Attorney General; and a provision was added specifying that the legislation's budgetary effects shall not be entered on the statutory or Senate PAYGO scorecards, thus making the legislation exempt from PAYGO requirements that new legislative spending not increase the deficit.", "summary": "The September 11 th Victim Compensation Fund (VCF) provides cash benefits to certain persons whose health may have been affected by exposure to debris or toxic substances in the aftermath of the September 11, 2001, terrorist attacks on the Pentagon and the World Trade Center, and the terrorist-related aircraft crash at Shanksville, PA. Congress created the original VCF shortly after the 2001 terrorist attacks to provide compensation to persons injured and to the families of persons killed in the attacks and their immediate aftermath. In 2011, Congress reopened the VCF to provide benefits to persons who responded to the terrorist attack sites, were involved in the cleanup of these sites, or lived in lower Manhattan during the attacks. The VCF was reauthorized in 2015, and it is scheduled to sunset on December 18, 2020. The VCF has awarded more than $5 billion since its reopening and is in danger of exceeding its current appropriation of $7.375 billion before its sunset date and thus being unable to pay full benefits. In February 2019, the Special Master of the VCF announced that all future VCF awards would be reduced to prevent the VCF from running out of appropriated funds. The Special Master cites increases in death claims, cancer claims, and claims from non-responders as drivers of the increase in VCF benefit costs. Reauthorization bills, H.R. 1327 and S. 546 , have been introduced, with H.R. 1327 being ordered reported out of the Judiciary Committee on June 12, 2019. Both bills would reauthorize the VCF without changing any eligibility categories and appropriate \"such sums as may be necessary\" for each fiscal year through FY2090. On July 12, 2019, H.R. 1327 was passed by the House of Representatives with amendments that changed the bill's name, changed the provisions for adjusting the maximum amount of income considered for determining noneconomic loss, added up to two Deputy Special Masters to the program's administration, and made the bill's spending exempt from PAYGO requirements.", "document_type": "crs"}
{"report": "T his report examines technological innovation in payment systems generally and particular policy issues as a result of retail (i.e., point of sale) payment innovation. The report also discusses wholesale payment, clearing, and settlement systems that send payment messages between banks and transfer funds, including the \"real-time payments\" service being introduced by the Federal Reserve. This report includes an Appendix that describes interbank payment, clearing, and settlement systems related to U.S. payments. The U.S. financial system processes millions of transactions each day to facilitate purchases and payments. In general terms, a payment system consists of the means for transferring money between suppliers and users of funds through the use of cash substitutes, such as checks, drafts, and electronic funds transfers. The Committee on Payment and Settlement Systems (CPSS), consisting of representatives from several international regulatory authorities, has developed generally accepted definitions of standard payment system terminology. As defined by the CPSS, a payment system is a system that consists of a set of instruments, banking procedures, and, typically, interbank funds transfer systems that ensure the circulation of money. These systems allow for the processing and completion of financial transactions. From the typical consumer's perspective, making a payment is simple. A person swipes a card, clicks a button, or taps a mobile device and the payment is approved within seconds. However, the infrastructure and technology underlying the payment systems are substantial and complex. To simplify, a payment system has three parts (see Figure 1 ). First, the sender (i.e., the person making the payment) initiates the payment through an end-user service , such as an online payment service or mobile app, instructing the payer's bank to make a payment to the recipient. The payer and recipient interact only with end-user services, which comprise the \"retail\" portion of payments. Second, the payer's bank sends a payment message containing payment details to the recipient's bank through a payment system (sometimes called a clearing service ). Third, the payment is completed (or settled) when the two banks transfer funds through a settlement system. Different systems can perform each of these parts, and systems' developers and operators compete with each other to provide payment and settlement services to consumers, businesses, and banks. These final two inter-bank steps are the \"wholesale\" portion of payments. End-user services, which are operated by the private sector, facilitate a consumer's ability to purchase goods and services, pay bills, obtain cash through withdrawals and advances, and make person-to-person payments. Retail payments tend to generate a large number of transactions that have relatively small value per transaction. Retail payment services can be accessed through many consumer financial products, including credit and debit cards and checking accounts. The most common methods of payment are debit cards, cash, credit cards, direct debits and credits via an automated clearing house (ACH), checks, and prepaid debit cards (see Figure 2 ). In the United States, the Federal Reserve (Fed) operates some of the key bank-to-bank payment, clearing, and settlement (PCS) systems that process retail or wholesale transactions, and private-sector organizations operate other systems that clear and settle bank-to-bank payment, including those described in the Appendix . Technological advances in digitization and data processing and storage have greatly increased the availability and convenience of electronic payments. In recent years, the use of electronic payments has risen rapidly, whereas the use of cash and checks has declined (see Figure 2 ). According the Federal Reserve's most recent triennial payment study (released in 2016), the number of transactions of three electronic payment methodsâdebit card, credit card, and ACHâgrew at annual rates of 7.1%, 8.0%, and 4.9%, respectively. Together, they totaled more than 144 billion transactions with a value of almost $178 trillion in 2015. Meanwhile, check payments declined by an annual rate of 4.4% during that period, and totaled 17.3 billion transactions worth almost $27 trillion in 2015. Less data are available on cash usage and the value of cash transaction in part because they are person-to-person and do not involve a digital record, but a Fed survey estimates that between 2012 and 2015, the share of transactions made in cash fell from 40.7% of all transactions to 32.5%. This trend is probably due, at least in part, to various new technological products and services that offer fast, convenient payments for individuals and businesses. Payment apps linked to bank accounts and payment cards can be downloaded onto mobile devices that allow individuals to send payments to each other or to merchants. These services include Venmo (owned by PayPal), Zelle (owned by a consortium of large U.S. banks), and Cash App (owned by Square). Other companies provide hardware and software products that allow individuals and small businesses to accept debit and credit card payments, online or in person. These companies include PayPal, Square, and Stripe. Another advance in payments is allowing consumers to make payments using a mobile device, wherein debit card, credit card, or bank account information is stored in a \"digital wallet\" and sensitive information is protected by transmitting surrogate data (a process called tokenization ) at the point of sale. This service includes Apple Pay, Google Pay, and Samsung Pay. These services are generally layered on top of traditional electronic payment systems. To use these services, the consumer or business often must link them to a bank account, debit card, or credit card. The payments are still ultimately settled when the money from the payer's account is deposited in the recipient's account. An exception are payments made by cryptocurrencies, discussed in the text box. Although faster and potentially less costly payment systems benefit consumers and businesses, the use of new technology in existing and new payment systems raise questions about whether existing regulation adequately addresses issues related to cybersecurity and data privacy, industry competition, and consumer access and protection. How payments are federally regulated depends, in part, on whether they are being provided by banks. Banks are subject to a variety of prudential regulation, enforcement, and supervision by federal bank regulators. Nonbank payment processors are subject to similar regulation and supervision (but not enforcement) by bank regulators if they are a service provider to a bank, but otherwise are not. Nonbank companies that do not provide services to banks may be regulated as money transmitters at the state level by state agencies and as money service businesses at the federal level by the Department of the Treasury's Financial Crimes Enforcement Network and subject to applicable laws and regulations. These services are subject to federal consumer protection regulation under the Electronic Fund Transfer Act ( P.L. 95-630 ); anti-money laundering requirements under the Bank Secrecy Act (P.L. 91-508); and various state licensing, safety and soundness, anti-money laundering, and consumer protection requirements. A broad issue that permeates many of the specific issues examined in this report is the debate over whether the various companies providing retail payment services are effectively and efficiently regulated. Nonbank money transmission is largely regulated at the state level. Some observers have argued that this state-by-state regulatory regime, designed to protect against risks presented by traditional money transmitters such as Western Union, is overly onerous and ill-suited when applied to new, technology-focused payment companies. State regulators assert they are best positioned to regulate these companies, noting their experience and recent efforts to coordinate and streamline state regulation. A greater federal role in payment regulation could impose more or less stringent standards (with federal preemption of state regulation, in the latter case) than any given state's current standards. One potential solution for concerns that the current system is too fragmented and overly burdensome could be to allow certain nonbank payment companies to enter the bank regulatory regime. Two potential mechanisms are under consideration that could allow a technology-focused payment company to be federally regulatedâthe Office of the Comptroller of the Currency (OCC) special purpose national bank charter and a state-level industrial loan company (ILC) charter with Federal Deposit Insurance Corporation (FDIC) insurance. Both could be particularly desirable for payment firms if they provide an avenue to directly access Fed wholesale payment systems. However, both mechanisms are controversial and subject to contentious debate. The OCC and proponents of the special purpose charter generally view the charter as a way to free companies from what they assert is the unnecessarily onerous regulatory burden of being subject to numerous state regulatory regimes while not overly relaxing regulationsâunder the special purpose charter, the companies would become subject to the OCC's national bank regulatory regime. Opponents generally assert that the OCC does not have the authority to charter these types of companies and that doing so would inappropriately allow fintech firms offering fast payment services to circumvent important state-level consumer protections. State regulators have filed lawsuits to block the granting of such charters. To date, no companies have applied for such a charter, although ongoing legal uncertainty is likely a discouraging factor. ILC charters are controversial because they allow commercial firmsâsuch as retailers, manufacturers, or technology companiesâto own banks. The United States has historically adopted policies to separate commerce and banking, and the FDIC has not approved deposit insurance for a new ILC since 2006. Opponents of ILC charters argue that by creating an avenue for a commercial firm to own a depository institution, they blur the line between commerce and banking, exposing the U.S. economy to related risks such as creating possible incentives for imprudent underwriting, inappropriately exposing taxpayers to losses through federal deposit insurance, and leading to entities that can exercise market power. Proponents of ILC charters assert these concerns are overstated. They cite the potential benefits of mixed arrangement (e.g., economies of scale, risk diversification, information efficiencies, customer convenience and savings) and note that certain other stable developed countries allow more blending of banking and commerce than the United States with, they argue, no or little ill effect. Recently, three fintech companies submitted applications to the FDIC for ILC deposit insurance. Two companies, however, have since withdrawn their applications, and the company with a pending application, Square, is a payment system provider. All payment methods expose users to some risks, including money theft or fraudulent payments made using their accounts or identities. In general, improving technology reduces one type of risk but may expose users to new risks. For example, if a pickpocket steals a person's cash, the victim has little recourse. If instead, the pickpocket steals a payment card, the victim can cancel the card and generally would not be held liable for fraudulent purchases. However, identity thieves can steal card information using card reader skimmers, allowing thieves to open and use lines of credit in victims' names without their knowledge. Similarly, new payment technologies reduce certain risks but create others. For example, digital wallets on mobile devices can eliminate the need to carry physical cards that can be lost or stolen and can protect sensitive information at the point of sale through tokenization. However, the device itself can be compromised by software designed to gain unauthorized access to devices, called malware, which may lead to fraudulent charges. In addition, storing payment information on multiple websites, apps, and devices creates more opportunities for hackers to steal it than if the information existed only on the card itself. Recent breaches at various financial and nonfinancial companies in which people's sensitive information were compromised illustrate the potential risk and have raised questions over whether policymakers should implement stricter cybersecurity requirements. Some possible policy responses include enacting a federal breach notification law, creating federal cybersecurity standards, or increasing federal authority to penalize companies that fail to adequately protect consumer data. Payment systems necessarily collect detailed consumer information on transactions, including the retail stores a consumer shops at, the businesses and individuals the consumer pays, and the dates, times, and amounts of each transaction. Through analysis, this data have the potential to reveal a lot of information about individual consumers, including where they live and their gender, age, race, ethnicity, and approximate income. Such data are valuable from a business perspective; for example, for targeting product marketing to consumers. In addition, scammers could use this data to facilitate fraud. Electronic payments have resulted in a proliferation in the availability and use of personal information, which has raised policy concerns about how companies use the data, whether consumers understand how their data will be used, and whether consumers should have more control over its use. Payment data has the potential to improve consumer outcomes. For example, personal financial management apps or other digital tools could help consumers more easily track payments, automate saving and budgeting, and more efficiently shop for financial products that meet their personal needs. Consumers could also in the future share this data with financial institutions to apply for loans or other banking products. Given these benefits, as well as possible privacy concerns, the question becomes how much access should companies have to individuals' information. Privacy policy disclosures to consumers is another important element of privacy policy that might be more difficult as payments become faster using new technology. For example, according to the Bureau of Consumer Financial Protection (CFPB), stakeholders suggest that \"providing disclosures that are clear and sufficient for consumers to make informed decisions is difficult\" in the mobile environment due to small screens, which may make it difficult to read long, technical disclosure documents. These stakeholders indicate that clear privacy policies and more consumer control over the use of consumer data may be important considerations in this new digital environment. When developing a new or faster retail payment system, consumer protection is an important consideration. Although new technology offers consumers many potential benefits, it raises issues of concern, such as consumer liability for fraudulent payment and consumer error or nonreceipt of goods resolution. The Electronic Fund Transfer Act, currently implemented by the CFPB through Regulation E, is the most relevant consumer protection law applying to financial payments. Regulation E protects individual consumers who engage in electronic fund transfers. It mandates consumer disclosures, limits consumer liability for unauthorized transfers, and maintains procedures for resolving errors. Other regulations may also be relevant to a new faster payment system, depending on its structure. For example, the Expedited Funds Availability Act ( P.L. 100-86 ), currently implemented by the Federal Reserve as Regulation CC, prescribes how quickly banks must make funds available to customers. When developing a new faster payment system, Congress and federal regulators may consider how a new system should comply with relevant regulations, such as Regulation E. Depending on the structure of the new system, regulators might decide to update these regulations to tailor them as appropriate. For example, current consumer protection rules might not cover all aspects of the system, leaving consumers at risk of financial loss, without clear recourse for some payment-related disputes, or other negative impacts. In this spirit, in 2015, the CFPB released nine consumer protection principles for new faster payments systems, including consumer control over payments, fraud and error resolution protections, and disclosed and clear costs. The CFPB has not acted on these principles through rulemaking or other initiatives since their release in 2015. Financial education might be another consumer protection policy option. As new technology is introduced into financial products, consumers may need to learn new skills, sometimes referred to as digital financial literacy , which includes \"knowing how to use devices to safely access financial products and services via digital channels in ways that help consumers achieve their financial goals, protect against financial harm and enhance ability to know where to get help.\" This type of financial education might be particularly important to ensure that lower-income and older consumers are included in a new faster payment system. Innovations in the payment system may benefit some consumers and fail to reach others. New retail payment options that are linked to bank accounts, internet-based, or require mobile devices could disadvantage consumers who rely on cash payments, do not have easy internet or mobile access, or do not feel comfortable using this new technology. As long as payments remain based on the banking system, the unbanked and underbanked may encounter participation limits to faster payments. In contrast, innovation in technology may help marginalized groups gain access to the financial system. The ability to access digital channels using cash may be particularly important for including underserved consumers, leading to the development of new payment productsâsuch as pre-paid cards and servicesâthat allow cash to be placed in an account that can be used to make online payments. The cost of internet and mobile data plans might limit the ability of underserved consumers to access a faster payment system that is internet- or mobile-based. However, as internet access and mobile devices continue to proliferate and decline in cost, barriers to accessing those technologies may decline. For example, most consumers, including unbanked and underbanked consumers, have access to mobile phones and smartphones, and the use of these technologies is growing. According to a national survey, in 2017, 83% of underbanked and 50% of unbanked consumers had access to a smart phone. The survey noted that underbanked consumers were more likely to use mobile banking services than the rest of the U.S. population. A faster payment system may provide certain other benefits besides access for low-income or liquidity-constrained consumers (colloquially, those living \"paycheck to paycheck\") who may more often need access to their funds quickly. In particular, many lower-income consumers say that they use alternative financial services, such as check cashing services and payday loans, because they need immediate access to funds. Faster payments may also help some consumers avoid checking account overdraft fees. Note, however, that some payments that households make would also be cleared fasterâdebiting their accounts more quicklyâ than the current system, which could be harmful to some underserved households. Traditional payment systems generally are characterized by strong economies of scale and are subject to network effects , wherein the more widespread a payment method's use and acceptance becomes the more incentive additional consumers and businesses have to adopt it. These economic characteristics may mean payment industries naturally become highly concentrated, because a small number of widely used systems are more efficient than many narrowly used systems. For instance, established payment systems currently have high market concentrations. Debit card payment processing networks are dominated by Visa and Mastercard, and credit card processing networks are mostly operated by Visa, Mastercard, American Express, and Discover. Some observers are concerned that market concentration will also be a feature in new payment systems. Others argue that new payment systems based on the internet may avoid similar concentration observed in traditional systems, because they do not require new entrants to make large initial investments in infrastructure. To date, the entry of multiple new services and companies into the market for end-user payment systems has supported competition and consumer choice. Whether the industry will eventually consolidate remains to be seen. Creating additional concentration concerns is the entrance of some of the largest global technology companies into the payment industry, including U.S. companies such as Google (Google Pay), Apple (Apple Pay), Amazon (Amazon Pay) and Facebook (Facebook Pay and the Libra proposal). Such companies already have large market shares in various technology-related industries and collect huge amounts of consumer data, which could increase as they now seek to expand their scope into the payment industry. Were they to dominate electronic payments, it could pose competition concerns in the payment industry, as well as increase their dominance in their core industries. In addition, these developments raise concerns discussed above (see the \" Regulatory Framework \" section), relating to the implications of mixing commerce with what has traditionally been a core banking activity. Payments between two parties who are both members of the same end-user serviceâa closed loop paymen t âcan occur in real time because the service can instantly communicate between the two parties, verifying that the payer has sufficient funds in the account to make the payment. However, a payment in which one party is outside of a single end-user service typically travels through the banking system, and thus cannot occur in real time unless real-time messaging, clearing, and settlement of the payment is available through wholesale payment systems. For example, a debit or credit card payment to a merchant needs to transfer funds from the sender's bank (in the case of a credit card, the card-issuing bank) and send them to the recipient's bank. Real-time payment can only occur in this scenario if settlement occurs in real-time or if payment occurs before settlement (putting the recipient's bank at risk that the transfer never occurs). Even within an end-user service that would provide real-time payment, if the transfer were made between two members entirely using existing balances within the service, delivery of funds could be delayed if the payer needs to add funds to their account to make payment (via direct debit or credit card transfer, for example) or if the recipient wishes to withdraw funds from the payment service to deposit in its bank account. Thus, the speed of many existing end-user services are ultimately limited by what happens with wholesale payment systems. On August 5, 2019, the Fed announced plans to create a wholesale real-time payment (RTP) system. This section discusses the history of the Fed's role in the payment system; compares recent RTP initiatives by the Fed, the private sector, and abroad; and analyzes policy issues raised by these initiatives. The Fed was originally created as a \"banker's bank\" to improve the functioning of a national banking system that was dominated at the time by small, local banks. To that end, providing bank-to-bank check-clearing services was one of the Fed's original, primary functions. Problems with private clearinghouses were one of the central issues in the financial panic that led to the Fed's creation. As other payment methods have emerged over time, the Fed has also provided other types of bank-to-bank payment and settlement systems. The Fed provides these services by linking the accounts that all banks maintain at the Fed to comply with reserve requirements. Throughout the Fed's history, the private sector has operated competing payment and settlement systems that the Fed has regulated (see Appendix for more details). For example, the Fed and the private-sector Electronic Payments Network (owned by The Clearing House , an association of large banks ) currently operate competing automated clearinghouse (ACH) systems, which are payment systems that allow banks (and certain other financial institutions) to send direct debit and credit messages that initiate fund transfers. The Fed also operates two wholesale settlement systems for payments, Fedwire Funds Service and the National Settlement Service. The Clearing House Interbank Payment System (CHIPS) is a competing private-sector gross settlement system. (The Fed does not operate any end-user service directly accessed by individuals or nonfinancial businesses.) A typical bank-to-bank electronic payment is currently settled on the same or next business day. The Fed plans to introduce an RTP system called FedNow in 2023 or 2024. FedNow would be \"a new interbank 24x7x365 real-time gross settlement service with integrated clearing functionality to support faster payments in the United States,\" that \"would process individual payments within seconds ... (and) would incorporate clearing functionality with messages containing information required to complete end-to-end payments, such as account information for the sender and receiver, in addition to interbank settlement information.\" According to the Fed, FedNow will be available to all banks with a reserve account at the Fed. It will require banks using FedNow to make funds transferred over it available to their customers immediately after being notified of settlement. In a November 2018 proposal, the Fed also sought comment on the possibility of the Fed creating \"a liquidity management tool that would enable transfers between Federal Reserve accounts on a 24x7x365 basis to support services for real-time interbank settlement of faster payments, whether those services are provided by the private sector or Federal Reserve Banks.\" The purpose of this tool would be to accommodate the need for banks to move funds between their accounts at the Fed continuously, including outside of business hours in real-time settlement. In the August notice, the Fed stated it was exploring whether this goal could be accomplished by expanding Fedwire Funds Service and the National Settlement Service to permit 24x7x365 real-time gross settlement. Previously, the Fed proposed expanding same-day payment settlements on Fedwire and the National Settlement Service. Several private-sector initiatives are also underway to implement faster payments, some of which would make funds available to the recipient in real time (with deferred settlement) and some of which would provide real-time settlement. Notably, the Clearing House introduced its RTP network (with real-time settlement) in November 2017; according to the Clearing House, it currently \"reaches 50% of U.S. transaction accounts, and is on track to reach nearly all U.S. accounts in the next several years.\" In addition, both the Fed and private-sector companies can set joint standards, rules, and a governance framework to facilitate the adoption of faster payments, whether those systems are operated by the Fed or the private sector, and promote interoperability between systems. The Fed convened the Faster Payments Task Force, composed of more than 300 stakeholders, which has issued a number of recommendations to facilitate the adoption of faster payments. Other countries have already introduced or are in the process of introducing RTP. According to Fed Chair Jerome Powell, \"the United States is far behind other countries in terms of having real-time payments available to the general public.\" Businesses and consumers would benefit from the ability to receive funds more quickly, particularly as a greater share of payments are made online or using mobile technology. Some have argued that RTP would be especially beneficial to low-income, liquidity-constrained individuals as described in the \" Financial Access \" section above. The main policy issue regarding the Federal Reserve and RTP is whether Fed entry in this market is desirable. The Fed bases decisions on whether to introduce new payment systems or system features on three principles: \"The Federal Reserve must expect to achieve full recovery of costs over the long run. The Federal Reserve must expect that its providing the service will yield a clear public benefit, including, for example, promoting the integrity of the payments system, improving the effectiveness of financial markets, reducing the risk associated with payments and securities-transfer services, or improving the efficiency of the payments system. The service should be one that other providers alone cannot be expected to provide with reasonable effectiveness, scope, and equity.\" Stakeholders are divided over the introduction of FedNow. Some question whether, in light of these principles, the Fed can justify creating a RTP system in the presence of competing private systems. Some fear that FedNow will hold back or crowd out private-sector initiatives already underway and could be a duplicative use of resources. The Treasury Department supports Fed involvement on the grounds that it will help private-sector initiatives at the retail level. Others, including many small banks , fear that aspects of payment and settlement systems exhibit some features of a natural monopoly (because of network effects), and, in the absence of FedNow, private-sector solutions could result in monopoly profits or anticompetitive behavior, to the detriment of financial institutions accessing RTPs and their customers (merchants and consumers). In 2017, the Justice Department sent the Clearing House a letter stating that it did not plan to challenge the Clearing House's RTP system on antitrust grounds, based on the Clearing House's plans at that time. From a societal perspective, it is unclear whether it is optimal to have a single provider or multiple providers in the case of a natural monopoly, particularly when one of those competitors is governmental. Multiple providers could spur competition that might drive down user costs, but more resources are likely to be spent on duplicative infrastructure. RTP competition between the Fed and the private sector also has mixed implications for other policy goals: Innovation. Competition typically fosters innovation, but the Fed's unique cost structure could potentially undermine the private sector's success, limiting the latter's willingness to invest in innovations. Ubiquity. The Fed argues that RTP ubiquity is more likely with its involvement because it has existing relationships with all banks and because no single payment system has ever achieved ubiquity historically. However, the Fed's entry into RTP could delay the achievement of universal RTP in the next few years if banks decide to wait until FedNow is available instead of joining the Clearing House's network. Interoperability. Interoperability (the ability to make payments across different systems) is more difficult to achieve with competing firms, but the Fed argues that if no single RTP system is ubiquitous, the ability of any two given institutions to exchange funds is improved if competing systems increase ubiquity. The ability to make payments across ACH networks is an example of how interoperability has currently been achieved between competing Fed and Clearing House systems. However, the technology involved in RTP may make interoperability more difficult. In its proposal, the Fed did not commit to ensure interoperability, but stated that it was a desirable goal. Equity. The Clearing House has attempted to assuage equity concerns by pledging access to its system on equal terms to all banks, regardless of size, but these terms could change, and small banks have raised concerns that they may since the system is owned by large banks. The Clearing House has pointed to the Fed's volume discounts for existing payment systems as evidence that FedNow may not be equitable, however. Security. Security across competing systems could be difficult to coordinate, but systems might also attempt to compete by providing better security features. The Fed argues that competing RTP systems reduces operational and systemic risks because a system with only one provider has a \"single point of failure.\" Repeated data breaches at large financial institutions also point to the difficulty of monitoring cybersecurity in private systems, although government has also proven to be vulnerable to data breaches as well. The Fed states that \"participating banks would continue to serve as a primary line of defense against fraudulent transactions, as they do today ... \" under FedNow. The Fed, and by extension the taxpayer, is exposed to default risk because of its provision of intraday and overnight credit (some of which is uncollateralized) when banks use its payment and settlement systems. Currently, when banks use Fed payment and settlement systems, the time lag between payment and settlement can cause mismatches in the amounts due and the amounts available in their accounts. As a result, the Fed extends intraday credit for a fee (if uncollateralized) to avoid settlement failures. Daily overdrafts have been relatively low in recent years, but peaked at $186 billion during the 2007-2009 financial crisis. Introducing real-time payments with deferred settlement could increase the use of intraday credit. The Fed does not state in its final rule whether it expects the level of intraday credit to be affected under FedNow, although it notes that it might need to extend the availability of intraday credit to off-hours. Note that the Fed provides this credit to reduce systemic risk to the banking system, so eliminating intraday credit has the potential to reduce financial stability. RTPs offered by the private sector could fit into the existing regulatory framework. The Fed already regulates and supervises private payment systems for risk management and transparency, but not pricing. RTP could potentially alleviate some existing risks (e.g., if settlement is in real time, credit risk is reduced for the recipient institution) while posing new risks (e.g., RTP requires more active liquidity management). Any RTP system and regulation would need to account for these changing risks. To address systemic risk concerns, a private RTP system could be designated as a systemically important Financial Market Utility (FMU) under Title VIII of the Dodd-Frank Act ( P.L. 111-203 ). The Dodd-Frank Act allows the Financial Stability Oversight Council , a council of financial regulators led by the Treasury Secretary, to designate a payment, clearing, or settlement system as systemically important on the grounds that \"the failure of or a disruption to the functioning of the FMU could create or increase the risk of significant liquidity or credit problems spreading among financial institutions or markets and thereby threaten the stability of the U.S. financial system.\" FMUs, currently including the Clearing House Interbank Payments System, are subject to heightened regulation, and the Fed has supervisory and enforcement powers to ensure those standards are met. Policymakers could consider whether systemic risk concerns are better addressed through Fed operation of payment and settlement systems or Fed regulation of private systems.", "summary": "Technological advances in digitization and data processing and storage have greatly increased the availability and convenience of electronic payments. New products and services offer faster, more convenient payment for individuals and businesses, and the numerous options on offer foster competition and innovation among end-user service providers. Currently, many new payment services are layered on top of existing electronic payment systems, which may limit their speed. Most payments flow through both retail and wholesale payment systems before they are completed. Consumers access retail payment systems to purchase goods and services, pay bills, obtain cash through withdrawals and advances, and make person-to-person transfers. Consumers' financial institutions access wholesale systems to complete the payment. In the United States, systems accessed by consumers are operated by the private sector, whereas systems accessed by banks to complete those transactions are operated by the Federal Reserve (Fed) or the private sector. Regulation of retail payment systems is dispersed across multiple state and federal regulators. For example, payment systems are subject to federal consumer protection regulation under the Electronic Fund Transfer Act ( P.L. 95-630 ), anti-money laundering requirements under the Bank Secrecy Act (P.L. 91-508), and various state licensing, safety and soundness, anti-money laundering, and consumer protection requirements. Private wholesale payment systems are regulated by the Fed, and if they are systemically important, they can be designated as \"financial market utilities\" and subject to heightened oversight. Although faster and potentially less costly payment systems may benefit consumers and businesses, the use of new technology in existing and new payment systems raise a number of questions for policymakers. Some observers have argued that certain innovative financial technology, or fintech, payment companies would be more effectively regulated through the federal banking regulatory framework, whereas opponents of this idea assert it would result in the preemption of important state-level consumer protections and in an inappropriate combination of banking and commercial activities. The increased prevalence of data generation, collection, and analysis in payment systems has caused observers to question whether existing regulation adequately addresses issues related to data privacy and cybersecurity. Although the traditional high-levels of industry concentration and the recent entry by technology giants have raised concerns over market power and industry competition, competition to date has been robust and certain analysts argue that internet-based payments that do not require a large investment in infrastructure will prevent the market concentration that exists in older payment services. What effect technological innovation in payments will have on consumer access and whether consumers are adequately protected against potential problems, such as fraudulent or erroneous transactions, are also subjects of debate. In August 2019, the Fed announced plans to create an interbank real-time payments (RTP) system by 2023 or 2024. The Fed stated that the new system will be available to all banks with a reserve account at the Fed, and it will require banks using this new system to make those funds available to their customers immediately after being notified of settlement. In addition, several private-sector initiatives are also underway to implement faster payments, some of which would make funds available to the recipient in real time (with deferred settlement) and some of which would provide real-time settlement. Businesses and consumers would benefit from the ability to receive funds more quickly, particularly as a greater share of payments are made online or using mobile technology. The main policy issue regarding the Federal Reserve and RTP is whether Fed entry in this market is desirable, given similar private-sector developments are already underway. There is debate about whether competition from the Fed would be beneficial in terms of cost, efficiency, safety, innovation, ubiquity, and financial stability. In the 116 th Congress, H.R. 3951 and S. 2243 , among other bills, would require the Fed to create a RTP system and would require banks to make payments to account holders in real time.", "document_type": "crs"}
{"report": "Around the world, people use websites on their computers and apps on their mobile devices to access information and services. Creators of these websites and apps are known as \"edge providers.\" The Federal Communications Commission (FCC) first used the term in 2010 to refer to individuals and entities \"providing content, applications, services, and devices accessed over or connected to broadband Internet access service.\" Such activities, conducted on the \"edge\" of the internetâhence the nameâcan range from an individual creating a personal blog to a billion-dollar company creating a website. At that time, the FCC determined that it would not regulate edge provider activities. Instead, similar to other businesses, edge providers may be examined by the Department of Justice (DOJ) and Federal Trade Commission (FTC) on a case-by-case basis for potential violations of consumer protection or antitrust statutes. Federal agencies and Congress are investigating competition among edge providers, particularly companies with large amounts of revenue. The FTC, DOJ, and at least 47 attorneys general are reportedly looking into whether select edge providersâreportedly including Google, Apple, Facebook, and Amazonâhave violated antitrust laws. A House Judiciary Committee investigation into competition in digital markets has raised the question of whether existing antitrust laws, competition policies, and current enforcement levels are adequate to address competition issues among edge providers. Competition is generally viewed as a means to ensure low prices for consumers and to spur innovation. Some have raised concern that competition is being harmed by a few dominant edge providers and that regulations may be needed. This report examines the potential effects of edge providers' expansion on competition. Due to acquisitions or growth, some edge providers now operate in multiple industries. Some companies have integrated vertically, both generating content as edge providers and delivering it to consumers as internet service providers (ISPs). Other companies have integrated horizontally by acquiring other edge providers, which could increase their customer base and expand the content or services offered, but also eliminate potential competitors. This report focuses on how horizontal and vertical integration may affect edge providers' relationships with ISPs and competition among edge providers. In its 2010 Open Internet Order, the FCC first referred to individuals and entities \"providing content, applications, services, and devices\" over the internet as \"edge providers.\" These can be search engine providers, streaming video or music services, social media platforms, retailers, or other types of businesses. An edge provider can be a blog or personal website maintained by an individual, making it difficult to distinguish between edge providers and end users. It can also be a website maintained by a company that generates billions of dollars in revenue. An edge provider can serve as a conduit for content created by others instead of or in addition to content created by the company itself. Some of the content may be subject to licenses granted by copyright holders, while other content might not face any copyright restrictions. This report focuses on companies that operate at least one edge provider. Some edge providers generate revenue by selling products or subscriptions to their content. Others offer their content for free and generate their revenue by using information provided by their users to sell advertising spaces or by selling the information itself. In the third quarter of 2019, Facebook, one of the largest edge providers as measured by market capitalization, reported $17.4 billion in revenue from advertising, which made up 98% of its total quarterly revenue. Google, another large edge provider, reported $33.9 billion in advertising revenue for the same quarter, which made up 84% of its total quarterly revenue. ISPs and mobile carriers connect edge providers with those who use their content. On mobile devices, edge providers generally provide their content over apps. Consumers typically obtain apps from online app stores such as Google Play and the Apple App Store. Browser appsâsuch as Chrome, Safari, and Firefoxâallow users to access other edge providers' websites, similar to a browser on a computer. To access the content on apps, users need a data plan from their mobile carrier or a wireless connection to an ISP. Figure 1 presents a simplified example of how edge providers interact with ISPs and users. In this example, Content Provider (CP) A relies on digital advertising for its revenue: advertisers pay CP A to place an ad, and in turn receive revenue from users who pay for the advertised product. CP B receives a direct payment for its content from users. Both edge providers pay the ISP a termination fee to bring the content to the terminal point, the user. Users pay the ISP a subscription fee to access the data provided by CP A and CP B. In reality, the process can be more complicated. An edge provider may rely on a different ISP than its users' ISPs, in which case the content would travel through the internet backbone. The internet backbone consists of various networks linking servers and multiple ISPs together. An edge provider may also have direct connections to multiple ISPs or upload its content directly onto the internet backbone. While details on how the internet operates are beyond the scope of this report, a key factor in competition among edge providers is the role ISPs have in the relationship between edge providers and their users. Edge providers depend entirely on ISPs and mobile carriers to deliver their content to users. A growing number of companies operate both as edge providers and as ISPs, becoming vertically integrated (i.e., operating at multiple stages along a supply chain). Thus, companies that both generate content and deliver it to users are competing with others that either solely generate content or solely deliver it to users. Companies that started in the telecommunications and media industries are now among the most popular edge providers. Of the 16 edge providers that attracted the largest number of users in the United States in July 2019 ( Figure 2 ), six â Google, Facebook, Amazon, PayPal, Twitter, and the Weather Companyâstarted as edge providers. AT&T. AT&T owns part of the internet backbone and is considered a Tier 1 ISP, meaning it has free access to the entire U.S. internet region. It is also a mobile carrier and provides voice services and video programming. In 2018, AT&T acquired Time Warner, a content creator that owns HBO and its affiliated edge provider HBO NOW, as well as other cable channels. The DOJ unsuccessfully attempted to block the merger. AT&T has announced plans to introduce a new edge providerâHBO Maxâto stream video programming for no extra charge to AT&T customers who are also HBO subscribers; other customers will reportedly be charged a subscription fee. Comcast. Comcast is an ISP, a cable television service, and a voice service provider. In 2011, Comcast became the majority owner of NBCUniversal, which owns television networks and broadcast stations, and thus obtained minority ownership of Hulu, an edge provider that streams video programming to subscribers. In 2019, Walt Disney Company obtained \"full operational control\" of Hulu, but Comcast retained its 33% financial stake. Comcast also announced plans to launch its own video streaming service, Peacock. Comcast reportedly plans to offer three subscription options for Peacock: a free option supported by ads, a premium version with more programming for a fee, and the premium version with no ads for a higher fee. The premium version is to be offered for free to subscribers of Comcast and Cox Communications. Verizon. Verizon owns part of the internet backbone and is considered a Tier 1 ISP. It is also a mobile carrier, and offers video, voice, and ISP services. In 2015, Verizon acquired AOL, an ISP and edge provider, and in 2016, it acquired the core business of Yahoo, an edge provider. It combined the edge provider products from these acquisitionsâsuch as Yahoo Finance, Huffington Post, TechCrunch, and Engadgetâin 2017 to create Oath. Google. Google is the largest subsidiary of the company Alphabet. It offers multiple products, including a search engine, email server, word processing, video streaming, and mapping/navigation system. Google generally relies on other ISPs to deliver its content, but entered the ISP market in 2010 when it announced Google Fiber. Google Fiber provides broadband internet service and video programming. Beginning in 2016, it suspended or ended some of its projects; as of October 2019, it had installed fiber optic cables in 18 cities. Facebook. As it attracted more users, Facebook expanded from providing an online platform that connects users to an online platform suitable for various activities, including fundraising, messaging, and commerce. In 2018, a spokesman confirmed that Facebook was pursuing another project, dubbed Athena. Athena is an experimental satellite that would beam internet access through radio signals. If successful, Athena would enable Facebook to become an ISP. Amazon. In addition to being a major online retailer, Amazon offers information technology infrastructure services through Amazon Web Services. In 2019, Amazon confirmed plansâdubbed Project Kuiperâto launch 3,236 satellites into low-Earth orbit to provide broadband internet across the world. If successful, Project Kuiper would enable Amazon to become an ISP. Edge providers can compete in various ways. A few examples include offering new content or services, advertising their content, or acquiring potential competitors. Subscription-based edge providers can lower their fees, offer discounts for referrals, or use price promotions to attract new users. This report focuses on the potential effects of vertical integration (e.g., where a company operates as both an edge provider and an ISP) as well as horizontal integration (e.g., where an edge provider acquires another edge provider). Common indicators used to determine the level of competition in a market include measuring its concentration and changes in the number of establishments. Market concentration is determined by examining whether most sales are concentrated among a few firms or dispersed among a large number of firms. Changes in the number of establishments can be used as an indicator as well, particularly when firm-level sales are unavailable. For example, if the total number of stores in a market is decreasing, it can suggest, but does not demonstrate, that competition is decreasing. To use these indicators to measure competition in a market, one must first define its scope. A common method of defining a market's scope is to use the North American Industry Classification System (NAICS). Two industries that consist of only edge providers are \"Data Processing, Hosting, and Related Services\" (NAICS 519130) and \"Internet Publishing and Broadcasting and Web Search Portals\" (NAICS 518210). Figure 3 shows that the number of establishments in both industries has increased over the past decade. However, most users seeking specific types of content obtain it from only a few edge providers. For example, data from August 2019 show that among social network websites, 95% of the visits from the users in the United States went to three websites: Facebook, Pinterest, and Twitter ( Figure 4 ). Similarly, data from June 2019 show that among mobile social networking apps, the three most popular among users in the United States were Facebook, Instagram (owned by Facebook), and Facebook Messenger ( Figure 5 ). Edge providers compete for users based on content and quality of services offered. To increase the number of users, edge providers attempt to provide content that is in high demand and to ensure that the content is delivered as seamlessly as possible. In response to network congestion, most content used to be delivered on a \"best effort\" basis because most of the content was not time-sensitive (e.g., email). The \"best effort\" basis does not guarantee that content will be delivered by a certain time or at a certain speed. This meant that some content was held at a congestion point until a future time, while other content was dispatched in real time. While this practice was suitable for some content, it became problematic for edge providers sending time-sensitive content. Interruptions, latency, or delays in transferring data lower the value of time-sensitive content (e.g., video programming). As a result, some edge providers have been given the option to pay network managers, including ISPs, to ensure their content would be given priority, an industry practice known as paid prioritization. Another practice to ensure a more consistent quality of service is to avoid potential congestion points by bypassing parts of the network. For example, edge providers can pay ISPs for a direct connection to their networks, or edge providers can build their own content delivery network (CDN) or pay to use another company's CDN. Examples of CDNs include Microsoft's Azure or Amazon's CloudFront, which is available through Amazon Web Services. A CDN distributes online content and network services from servers located as close as possible to users' ISPs to avoid potential congestion points and reduce the bandwidth needed to send the content; a CDN may also have a direct connection to users' ISPs. As a result, CDNs can serve as a digital intermediary between users' ISPs and other edge providers. Congress and the FCC have considered edge providers' access to end users over the internet under the rubric of \"net neutrality,\" a term associated with the concept that ISPs should treat data in a nondiscriminatory manner, regardless of the size or type of content. Policy discussions on net neutrality have focused on the role of the ISP in delivering content to end users. Concerns over practices ISPs might use to manage the flow of content, such as blocking, throttling, and paid prioritization, have become major discussion points. Although the FCC placed a ban on such practices when it issued the 2015 Open Internet Order, the restrictions were subsequently removed by the FCC with the issuance of the 2017 Restoring Internet Freedom Order. Congress has considered bills both banning or removing bans on such practices. The ability to pay ISPs for direction connections or prioritization of content could affect competition among edge providers. Although some see paid prioritization as a management tool that ensures time-sensitive content receives priority, others view it as a means to discriminate among content. A nascent edge provider may not have the financial resources to pay for prioritization or for a direct connection, meaning its content could be delivered more slowly than content from competing edge providers that can afford these payments. The potential competitive imbalance between nascent edge providers and more established ones may be further exacerbated by the growing number of vertical mergers. Some of the companies edge providers rely on for distribution are also their competitors because of vertical integration among edge providers and ISPs. For example, while Netflix works with Comcast to deliver its content, Comcast is also its competitor as the operator of cable systems, a partial owner of Hulu, and the owner of the planned video streaming service Peacock. Vertical integration could affect competition among edge providers. Companies that operate as both an ISP and edge provider may have a competitive advantage with the quality of content delivery over edge providers that have not paid for a direct connection to the ISP's network. Companies that pay for a direct connection to the network may also be at a competitive disadvantage because they incur an additional cost to obtain a connection that vertically integrated edge providers do not. Edge providers that also operate as CDNs may similarly benefit from better connections to ISPs without incurring a cost borne by edge providers that are not integrated with CDNs or ISPs. For example, Netflix pays Amazon to house its content on Amazon Web Services, although it competes with Amazon Prime Video, which also offers video streaming services. Vertically integrated companies associated with an ISP or CDN could also potentially prioritize their own edge providers' content over rivals' content. Similar concerns affect companies that operate as both edge providers and mobile carriers. Edge providers that are also mobile carriers can include their own apps on their customers' mobile devices for free and retain all of the profits from those apps. In contrast, competing edge providers may be charged a feeâsuch as an initial payment or a percentage of salesâfor including their apps in the app store. In this case, nonaffiliated edge providers would face a cost that edge providers affiliated with mobile carriers do not. Edge providers associated with mobile devices in general may also have similar advantages. For example, in 2005, Google acquired Androidâan operating system for mobile devicesâand further developed the software thereafter. Google was fined â¬4.34 billion ($5.05 billion) by the European Union (EU) for anticompetitive practices related to Android. Specifically, the European Commission determined that Google violated EU antitrust law by \"bundling\" its Play app store with its Search and Chrome apps (i.e., by requiring smartphone manufacturers that preinstalled the Google Play store to preinstall Google Search and Google Chrome). The ruling stated that by doing so, Google reduced the ability of rival search engines and web browsers to compete effectively, as consumers with Google Search and Google Chrome preinstalled on their devices were less likely to download competing search engines and web browsers. Some ISPs, particularly mobile carriers, have introduced \"zero rating\" or sponsored data plans. These plans allow subscribers to consume specific content or services without incurring charges against the subscriber's usage limits. For example, Facebook's Free Basics is a mobile phone app available through various mobile carriers in 65 countries. It provides free access to a limited selection of services and websites, including Facebook. It was banned by the Telecom Regulatory Authority of India for being anticompetitive by offering free access only to online services owned or controlled by Facebook. Similarly, critics claim that these plans favor edge providers affiliated with ISPs and those that are entrenched and well financed. However, supporters claim that these plans encourage consumers to try new services, particularly those that require large amounts of data. By combining consumer data collected by its ISP and edge provider components, a vertically integrated company may also have a competitive advantage through its ability to send targeted advertisements. In proposing to acquire Time Warner in 2018, AT&T chief executive Randall Stephenson stated that the merger would expand AT&T's access to customer and viewer data, allowing it to run targeted advertisements, which tend to be more profitable. Some state legislatures have passed or introduced legislation restricting how ISPs may collect or share consumer data; Congress has not passed similar legislation at the federal level. California has enacted data protection legislation, the California Consumer Privacy Act, which went into effect on January 1, 2020. It provides California residents the right to access, delete, and share personal information collected by businesses, including edge providers and ISPs. Consumers could benefit from the economic efficiencies obtained from edge providers' vertical integration with ISPs or mobile carriers by receiving content at faster speeds and lower prices. Vertically integrated edge providers could pass on to consumers the cost savings of not paying for a direct connection to the ISP network. For example, subscribers to a streaming service owned by an ISP may be able to receive its content more smoothly and at lower cost than subscribers to a streaming service not affiliated with an ISP. Free apps could benefit consumers as well. Vertical integration may also benefit consumers by increasing competition among ISPs. Currently, individual users in many areas have access to a limited number of internet providers because of the high costs associated with broadband deployment. If edge providers enter the ISP market, consumers may benefit from an increase in provider options, potentially resulting in lower prices and/or faster speeds. For example, one study credits Google Fiber for encouraging faster speeds, lower prices, and/or network upgrades among competing ISPs. However, the competitive benefit of edge providers entering the ISP market may be undermined by reduced competition among edge providers. Through mergers and acquisitions among themselves, edge providers have integrated horizontally. Facebook has made at least 79 acquisitions, including Instagram, WhatsApp, Oculus VR, and Chai labs. Google has made over 200 acquisitions, including DoubleClick, Waze, Nest, and YouTube. In some cases, edge providers have acquired companies with unique technologies in the early stages of development, foreclosing potential competition. Whether such acquisitions should be reviewed in the context of antitrust enforcement is controversial. Some commentators advocate limiting mergers among edge providers or breaking up large edge providers to increase competition, while others view mergers as a natural result of a competitive market in which more successful firms acquire smaller ones. Edge providers can benefit from acquiring other edge providers that offer different content or services. They can participate in a diverse set of online markets, expand or improve their content, or eliminate potential competitors. Google's acquisition of YouTube enabled it to gain a stronger footing in the online video market. Facebook acquired Divvyshot to improve its photo-sharing platform, particularly for mobile devices. These acquisitions can be viewed as integrating media platforms to improve end users' experience, a positive byproduct of competition, or as reducing competition by preventing the growth of other edge providers. Some have criticized Facebook's acquisition of Instagramâa photo and video-sharing social media appâand advocate for breaking up Facebook and Instagram; critics include some Members of Congress. Horizontal integration may increase an edge provider's customer base, which may give it greater bargaining power with ISPs. Because edge providers rely on ISPs to deliver their content, ISPs generally have leverage over edge providers that seek access to their networks. However, edge providers with large numbers of end users may have much greater bargaining power than smaller local or regional ISPs, as they may in some cases account for a large share of an ISP's internet traffic. By increasing their customer base through horizontal integration, edge providers can improve their market position. Edge providers that rely on digital advertising can target more individuals with digital advertisements and potentially increase the number of spaces to sell to advertisers. Edge providers can create more detailed profiles of individual users and improve their methods of targeting advertisements by combining consumer data from multiple sources. Some edge providers have acquired firms that control tools used to buy and sell digital advertising, such as advertisement servers that place spaces in auctions to determine which advertisement should be selected. By controlling such tools, an edge provider could have a competitive advantage against other edge providers that need to pay to use these tools. Concern about control of digital advertising tools has focused on Alphabet, which has acquired and incorporated into Google several digital advertising tools, including DoubleClick, AdMob, and Admeld. These acquisitions helped Google become the largest seller of digital advertising. Google has reportedly waived fees for using multiple components of its advertising services, bundling them together. This could make it difficult for rivals to offer competing services. Google reportedly required advertisers to use its advertising services to purchase advertisement spaces on YouTube, and used data collected from its edge provider services (e.g., Gmail and Google maps) in its advertising server. The DOJ and state attorneys general are reportedly investigating Google's use of its advertising products. The vertical integration of edge providers and ISPs creates a situation in which certain activities of a company may be regulated by the FCC while closely connected activities are not. On June 15, 2015, Consumer Watchdog, a nonprofit organization that advocates for taxpayer and consumer interests, filed a petition requesting the FCC to regulate edge providers and prevent them from \"tracking personal information and web activity without consumers' knowledge and permission.\" The FCC dismissed the petition on November 6, 2015, citing its 2015 Open Internet Order, which stated that the FCC would not regulate any internet content. The 2017 Restore Internet Freedom Order reversed the 2015 Open Internet Order by reclassifying ISPs under Title I, but it also did not address the regulation of edge providers. Thus, pursuant to the 2015 Open Internet Order, the FCC has left oversight of edge providers to other agencies, principally the FTC and DOJ. The FTC deals with consumer privacy issues under its broad authority to prohibit unfair and deceptive trade practices, and the FTC and DOJ deal with unfair methods of competition that may violate antitrust laws. The FTC has expanded its examination of consumer data privacy concerns from its initial edge provider focus to include vertical integration by ISPs. On March 26, 2019, the FTC issued orders to seven ISPs to obtain information on how they collect, retain, use, and disclose information about consumers and their devices. The order specifically addressed the need to better understand ISPs' privacy practices because their vertical integration allows them to provide advertising-supported content produced by related entities within the companies. The FTC and DOJ opened antitrust investigations of possible anticompetitive behavior by \"Big Tech\" firms, reportedly including Google, Apple, Facebook, and Amazon. On September 6, 2019, the attorneys general of eight states and the District of Columbia announced an investigation of Facebook and Google for possible antitrust violations. By October 22, 2019, the number of participating attorneys general had reportedly grown to 47. A key question in these antitrust investigations could be determining the market for edge providers. Generally, a market is established based on specific goods or services, and their substitutability with other goods and services. However, because some edge providers offer multiple goods and services that could be classified in multiple industries, it has become difficult to determine which market(s) these edge providers belong in. For example, should each product sold on Amazon (e.g., clothes, children's toys, books) be placed in a separate market? If so, should products that are sold by another company on Amazon's website be considered Amazon's products or the selling company's products? Are physical books sold on Amazon in the same market as its Kindle e-books or its Audible audiobooks? Competition analysis generally involves defining the market of a product, which can be particularly complex in the analysis of edge providers. Determining the market share for edge providers that rely on digital advertising rather than selling tangible products may be even more complicated. In addition to the complexity of defining which market some of these edge providers fall in, it can be difficult to determine their \"sales,\" as they generally do not obtain revenue from offering their content to users. These edge providers obtain revenue from selling advertisement spaces using users' data or from selling users' data directly. Should the market share for these edge providers be determined by the total advertising revenue obtained from each website or by the amount of user data collected? In the latter case, how should user data be \"priced\"? Should all edge providers that rely on digital advertising be compared to each other in one market, or should these edge providers be separated based on content? On June 3, 2019, the House Judiciary Committee announced that it would begin an investigation into competition in digital markets. It has held five hearings, which have raised questions and discussions including or related to the topics covered in this report. Among the major questions related to edge providers that Congress may wish to consider are the following: How does vertical integration among ISPs and edge providers affect competition? One of the difficulties in answering this question is the inability to evaluate how the market would have developed absent vertical integration. For example, vertical integration may lead to greater innovation in some cases, but to less innovation in others. It is also unclear how the effect of vertical integration on competition should be measured. As many users of edge providers' services do not pay for those services in a monetary sense, price effects, which are traditionally used to evaluate the extent of competition, may not be a sufficient measure. How could inequities in the amount of consumer data obtained by edge providers affect competition in the future? Consumer data may become increasingly important as machine learning and artificial intelligence technologies are further refined. It could be used to predict behavior among consumers or provide other competitive advantages for edge providers with large amounts of consumer data. Should competition among edge providers be regulated, and if so, to what extent? While the DOJ and FTC examine specific companies on a case-by-case basis for consumer protection or antitrust violations, the establishment of a regulatory framework could help prohibit anticompetitive practices. However, regulations may also disadvantage potential entrants while strengthening incumbents, and may impede innovation. Edge providers offer a wide variety of products and services, which could complicate the establishment of a single regulatory framework. However, other aspects of competition among edge providers, such as their relations with ISPs, are a matter relevant to all edge providers.", "summary": "Edge providers are individuals and entities that provide content, applications, services, and devices accessed over the internet. An edge provider can be a personal blog created by an individual or a website created by a billion-dollar company. Some edge providers sell products or subscriptions, while others sell consumer data or use it for digital advertising. Edge provider activities, conducted on the \"edge\" of the internetâhence the nameâare not regulated by the Federal Communications Commission (FCC). Edge providers rely on internet service providers (ISPs) and mobile carriers to deliver content to users. Some companies that operate as ISPs have become edge providers, and a few edge providers with substantial financial resources have become or intend to become ISPs. This has the potential to affect competition among edge providers, as an ISP may have incentives to prioritize content from affiliated edge providers. To deliver content at speeds similar to edge providers associated with ISPs, unaffiliated edge providers may choose to incur the costs of direct connections to users' ISPs. Other unaffiliated edge providers may build or pay to use another company's content delivery networks, which use geographically dispersed servers to deliver online content and services more quickly. Mobile carriers that also serve as edge providers can also have a competitive advantage. For example, they can include their own apps on mobile devices for free, while charging other edge providers a fee. Mobile carriers can also allow users to access content from affiliated edge providers without incurring charges on the users' data plans. These actions could affect net neutrality, a term associated with the concept that all data traveling through the internet should be treated in a nondiscriminatory manner. Some edge providers are acquiring other edge providers for a variety of reasons, including to increase their customer base, to improve the content or services offered, or to eliminate potential competitors. By increasing its customer base, an edge provider could enhance its market position, increasing its leverage in bargaining with ISPs over the speed and quality with which its content is delivered. An edge provider that relies on digital advertising could also benefit from enlarging its customer base, as this would allow it to send advertisements to more individuals and sell more advertisement spaces to advertisers. It may be difficult to distinguish between acquisitions intended to improve the content or services offered and those seeking to eliminate potential competitors. While consumers generally benefit in the former case, the latter case could have negative effects, such as hindering innovation. While the FCC does not regulate edge provider activities, the Federal Trade Commission (FTC) and Department of Justice (DOJ) may examine edge providers on a case-by-case basis for potential consumer privacy or antitrust violations. The FTC, DOJ, and at least 47 attorneys general have reportedly opened antitrust investigations of possible anticompetitive behavior, reportedly including Google, Apple, Facebook, and Amazon. The House Judiciary Committee also opened an investigation into competition in digital markets. A key question in these investigations is how to define the markets within which edge providers compete. Oftentimes, edge providers offer products and services that can be classified under multiple industries. For example, do video streaming services compete only with each other, with cable networks and movie theaters, or with the entertainment industry as a whole? Should a diversified company be examined as a unified entity, or should its edge provider component be evaluated separately? Estimating the market shares of edge providers that rely on revenue from digital advertising is further complicated by the difficulty of determining \"sales\" for these companies, as they may not obtain revenue from offering their content to users. Some edge providers now operate in multiple industries. Some companies have integrated vertically, both generating content as edge providers and delivering it to consumers as internet service providers (ISPs). Other companies have integrated horizontally by acquiring other edge providers, which could increase their customer base and expand the content or services offered, but also eliminate potential competitors. This report focuses on how horizontal and vertical integration may affect edge providers' relationships with ISPs and competition among edge providers.", "document_type": "crs"}
{"report": "This report provides an overview of FY2019 appropriations actions for accounts traditionally funded in the appropriations bill for the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS). This bill provides discretionary and mandatory appropriations to three federal departments: the Department of Labor (DOL), the Department of Health and Human Services (HHS), and the Department of Education (ED). In addition, the bill provides annual appropriations for more than a dozen related agencies, including the Social Security Administration (SSA). Discretionary funds represent less than one-fifth of the total funds appropriated in the LHHS bill. Nevertheless, the LHHS bill is typically the largest single source of discretionary funds for domestic nondefense federal programs among the various appropriations bills. (The Department of Defense bill is the largest source of discretionary funds among all federal programs.) The bulk of this report is focused on discretionary appropriations because these funds receive the most attention during the appropriations process. The LHHS bill typically is one of the more controversial of the regular appropriations bills because of the size of its funding total and the scope of its programs, as well as various related social policy issues addressed in the bill, such as restrictions on the use of federal funds for abortion and for research on human embryos and stem cells. Congressional clients may consult the LHHS experts list in CRS Report R42638, Appropriations: CRS Experts , for information on which analysts to contact at the Congressional Research Service (CRS) with questions on specific agencies and programs funded in the LHHS bill. This report is divided into several sections. The opening section provides an explanation of the scope of the LHHS bill (and hence, the scope of this report) and an introduction to important terminology and concepts that carry throughout the report. Next is a series of sections describing major congressional actions on FY2019 appropriations and (for context) a review of the conclusion of the FY2018 appropriations process. This is followed by a high-level summary and analysis of enacted and proposed appropriations for FY2019, compared to FY2018 funding levels. The body of the report concludes with overview sections for each of the major titles of the bill: DOL, HHS, ED, and Related Agencies. These sections provide selected highlights from FY2019 enacted and proposed funding levels compared to FY2018. (Note that the distribution of funds is sometimes illustrated by figures, which in all cases are based on the FY2019 enacted version of the LHHS bill. ) Finally, Appendix A provides a summary of budget enforcement activities for FY2019. This includes information on the Budget Control Act of 2011 (BCA; P.L. 112-25 ) and sequestration, budget enforcement in the absence of an FY2019 budget resolution, provisional subcommittee spending allocations, and current-year spending levels. This is followed by Appendix B , which provides an overview of the LHHS-related floor amendments that were offered in the Senate during its consideration of H.R. 6157 , an appropriations measure that was amended to contain LHHS appropriations for FY2019. In general, this report is focused strictly on appropriations to agencies and accounts that are subject to the jurisdiction of the Labor, Health and Human Services, Education, and Related Agencies subcommittees of the House and Senate appropriations committees (i.e., accounts traditionally funded via the LHHS bill). Department \"totals\" provided in this report do not include funding for accounts or agencies that are traditionally funded by appropriations bills under the jurisdiction of other subcommittees. The LHHS bill provides appropriations for the following federal departments and agencies: the Department of Labor; most agencies at the Department of Health and Human Services, except for the Food and Drug Administration (funded through the Agriculture appropriations bill), the Indian Health Service (funded through the Interior-Environment appropriations bill), and the Agency for Toxic Substances and Disease Registry (also funded through the Interior-Environment appropriations bill); the Department of Education; and more than a dozen related agencies, including the Social Security Administration, the Corporation for National and Community Service, the Corporation for Public Broadcasting, the Institute of Museum and Library Services, the National Labor Relations Board, and the Railroad Retirement Board. Note also that funding totals displayed in this report do not reflect amounts provided outside of the annual appropriations process. Certain direct spending programs, such as Social Security and parts of Medicare, receive funding directly from their authorizing statutes; such funds are not reflected in the totals provided in this report because they are not provided through the annual appropriations process (see related discussion in the \" Important Budget Concepts \" section). The LHHS bill includes both discretionary and mandatory budget authority. While all discretionary spending is subject to the annual appropriations process, only a portion of mandatory spending is provided in appropriations measures. Mandatory programs funded through the annual appropriations process are commonly referred to as appropriated entitlements . In general, appropriators have little control over the amounts provided for appropriated entitlements; rather, the authorizing statute controls the program parameters (e.g., eligibility rules, benefit levels) that entitle certain recipients to payments. If Congress does not appropriate the money necessary to meet these commitments, entitled recipients (e.g., individuals, states, or other entities) may have legal recourse. Most mandatory spending is not provided through the annual appropriations process, but rather through budget authority provided by the program's authorizing statute (e.g., Social Security benefits payments). The funding amounts in this report do not include budget authority provided outside of the appropriations process. Instead, the amounts reflect only those funds, discretionary and mandatory, that are provided through appropriations acts. Note that, as displayed in this report, mandatory amounts for the Trump Administration's budget submission reflect current-law (or current services) estimates; they generally do not include the President's proposed changes to a mandatory spending program's authorizing statute that might affect total spending. (In general, such proposals are excluded from this report, as they typically would be enacted in authorizing legislation.) Note also that the report focuses most closely on discretionary funding. This is because discretionary funding receives the bulk of attention during the appropriations process. (As noted earlier, although the LHHS bill includes more mandatory funding than discretionary funding, the appropriators generally have less flexibility in adjusting mandatory funding levels than discretionary funding levels.) Mandatory and discretionary spending is subject to budget enforcement processes that include sequestration. In general, sequestration involves largely across-the-board reductions that are made to certain categories of discretionary or mandatory spending. However, the conditions that trigger sequestration, and how it is carried out, differ for each type of spending. This is discussed further in Appendix A . Budget authority is the amount of money a federal agency is legally authorized to commit or spend. Appropriations bills may include budget authority that becomes available in the current fiscal year, in future fiscal years, or some combination. Amounts that become available in future fiscal years are typically referred to as advance appropriations . Unless otherwise specified, appropriations levels displayed in this report refer to the total amount of budget authority provided in an appropriations bill (i.e., \"total in the bill\"), regardless of the year in which the funding becomes available. In some cases, the report breaks out \"current-year\" appropriations (i.e., the amount of budget authority available for obligation in a given fiscal year , regardless of the year in which it was first appropriated). As the annual appropriations process unfolds, the amount of current-year budget authority is measured against 302(b) allocation ceilings (budget enforcement caps for appropriations subcommittees that traditionally emerge following the budget resolution process). The process of measuring appropria tions against these spending ceilings takes into account scorekeeping adjustments , which are made by the Congressional Budget Office (CBO) to reflect conventions and special instructions of Congress. Unless otherwise specified, appropriations levels displayed in this report do not reflect additional scorekeeping adjustments. Table 1 provides a timeline of major legislative actions for full-year LHHS proposals, which are discussed in greater detail below. On July 1, the President signed into law P.L. 116-26 , an FY2019 supplemental appropriations act focused primarily on humanitarian assistance and security needs at the southern border. The bill was passed by the House on June 27 and by the Senate on June 26. (An earlier version of the bill had passed the House on June 25. A related bill, S. 1900 , had been reported by the Senate Appropriations Committee on June 19; this bill was substantially similar to the final version of P.L. 116-26 .) As enacted, the FY2019 border supplemental contained nearly $2.9 billion in emergency-designated LHHS appropriations for the Refugee and Entrant Assistance account at HHS. These funds were primarily intended to support the Unaccompanied Alien Children (UAC) program, which provides for the shelter, care, and placement of unaccompanied alien children who have been apprehended in the United States. According to a letter to Congress from the Office of Management and Budget (OMB), as of May 1 the number of apprehensions referred to HHS had increased by almost 50% from the prior year. In this same letter, OMB requested about $2.9 billion in supplemental funds for the UAC program, noting that these funds would provide \"critical child welfare services and high-quality shelter care.\" The letter estimated that these funds would allow HHS to increase shelter capacity to approximately 23,600 beds. Of the $2.9 billion appropriated to the UAC account, some funds were set aside for designated activities or purposes, such as state-licensed shelters (not less than $866 million); postrelease services, child advocates, and legal services (not less than $100 million); additional federal field specialists and increased case management and coordination services intended to place children with sponsors more expeditiously and reduce the length of stay in HHS custody (not less than $8 million); project officers/program staff and the development of a discharge rate improvement plan (not less than $1 million); and oversight activities conducted by the HHS Office of the Inspector General ($5 million). In addition to these reservations, the bill also placed a number of conditions on the use of the supplemental funds. For instance, the bill directed HHS to prioritize community-based residential care, state-licensed facilities, hard-sided dormitories, and shelter care other than large-scale institutional facilities (Â§401); prohibited funds from being used for unlicensed facilities, except in limited circumstances (e.g., on a temporary basis due to a large influx of children) when specified conditions are met (e.g., comprehensive monitoring for an unlicensed facility operating for more than three consecutive months) (Â§404); required HHS to ensure, when feasible, that certain types of children (e.g., children under age 13, children with special needs, pregnant or parenting teens) are not placed in unlicensed facilities (Â§406); required HHS to reverse any reprogramming within the account that had been carried out pursuant to a notification submitted to the appropriations committees on May 16 (proviso within UAC appropriation); prohibited funds from being used to prevent a Member of Congress from visiting a UAC facility for oversight purposes (Â§407); prohibited funds from being used by the Department of Homeland Security (DHS) to detain or remove sponsors (or potential sponsors) of unaccompanied children based on information provided by HHS as part of the sponsor's application, except when specified criteria are met (Â§409); and prohibited funds from being used to reverse or change certain operational directives previously issued by HHS, except in limited circumstances (Â§403). The bill also included a number of notification and reporting requirements associated with these funds. For instance, the bill required HHS to notify the appropriations committees within 72 hours of conducting a formal assessment of a facility for possible lease/acquisition and within seven days of any acquisition/lease of real property (proviso within UAC appropriation); submit to the appropriations committees a discharge rate improvement plan within 120 days of enactment (proviso within UAC appropriation); provide specific information to the appropriations committees at least 15 days before opening an unlicensed facility and provide the committees with monthly reports on the children placed at such facilities (Â§405); submit to the appropriations committees (and make public) a monthly report on the number and ages of unaccompanied alien children transferred into HHS care after being separated from parents or legal guardians by DHS, along with the reasons for the separations (Â§408); and submit to the appropriations committees a detailed spending plan of anticipated uses of funds within 30 days of enactment (Â§410). Over the course of FY2019, the 115 th and 116 th Congresses considered supplemental appropriations to several federal departments and agencies for expenses related to various recent wildfires, hurricanes, volcanic eruptions, earthquakes, typhoons, and other natural disasters or emergencies (e.g., H.R. 695 in the 115 th Congress; H.R. 268 , S.Amdt. 201 to H.R. 268 , and H.R. 2157 in the 116 th Congress). Each of these bills included appropriations for several accounts typically funded in the LHHS bill. Ultimately, on June 6, the President signed into law P.L. 116-20 , a supplemental appropriations act for FY2019. The bill was passed by the House on June 3 and by the Senate on May 23. (An earlier version of the bill had passed the House on May 10.) As enacted, the bill included roughly $611 million in emergency-designated LHHS appropriations for accounts at DOL, HHS, and ED. With limited exceptions, the bill explicitly directed the LHHS funds toward necessary expenses directly related to Hurricane Florence, Hurricane Michael, Typhoon Mangkhut, Super Typhoon Yutu, wildfires and earthquakes occurring in calendar year 2018, and tornadoes and floods occurring in calendar year 2019. The FY2019 supplemental provided the following definite LHHS appropriations: $50 million for the dislocated worker assistance national reserve at DOL, of which up to $1 million may be transferred to other DOL accounts for reconstruction and recovery needs and up to $500,000 is to be transferred to the DOL Office of the Inspector General for oversight activities. $30 million to the Child Care and Development Block Grant at HHS to support the costs of renovating, repairing, or rebuilding child care facilities. $90 million to the Children and Families Services Programs account at HHS for necessary expenses related to the disasters and emergencies referenced by the law. Of the total, $55 million is directed to Head Start programs, $25 million is directed to the Community Services Block Grant, $5 million is directed to the Stephanie Tubbs Jones Child Welfare Services program, and up to $5 million may be used for federal administrative expenses. $201 million for the Public Health and Social Services Emergency Fund at HHS for necessary expenses directly related to the disasters and emergencies referenced by the law. Of this amount, HHS is directed to transfer not less than $100 million to the Substance Abuse and Mental Health Services Administration (SAMHSA) Health Surveillance and Program Support account for grants, contracts, and cooperative agreements for behavioral health treatment, treatment of substance use disorders, crisis counseling and related helplines, and other similar programs to support impacted individuals; $80 million to the Health Resources and Services Administration (HRSA) federal health centers program for alteration, renovation, construction, equipment, and other capital improvements to meet the needs of affected areas; not less than $20 million to the Centers for Disease Control and Prevention (CDC) for CDC-Wide Activities and Program Support for response, recovery, mitigation, and other expenses; and up to $1 million to the Office of the Inspector General for oversight activities. $165 million for Hurricane Education Recovery at ED to assist in meeting the educational needs of affected individuals. Of the total, $2 million is to be transferred to the Office of the Inspector General for oversight activities and up to $1 million may be used for program administration. In addition, the supplemental provided a combination of definite and indefinite appropriations to the Medicaid program at HHS to support program costs in the Northern Mariana Islands, Guam, and American Samoa. During the 115 th Congress, on September 28, 2018, the President signed into law the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019 and Continuing Appropriations Act, 2019 ( H.R. 6157 , P.L. 115-245 ). This was the first occasion since the FY1997 appropriations cycle that full-year LHHS appropriations were enacted on or before the start of the fiscal year (October 1). The House and Senate had previously agreed to resolve differences on the measure via a conference committee. (Conferees on the bill were named in the House on September 4 and in the Senate on September 6.) The conference report ( H.Rept. 115-952 ) was adopted by the Senate on September 18, and the House on September 26. LHHS discretionary appropriations in the FY2019 omnibus totaled $189.4 billion. This amount is 1.5% more than FY2018 enacted and 8.9% more than the FY2019 President's budget request. The omnibus also provided $869.8 billion in mandatory funding, for a combined LHHS total of $1.059 trillion. (Note that these totals are based only on amounts provided by the FY2019 LHHS omnibus and do not include the supplemental funds, which were provided in addition to the annual appropriations.) See Figure 1 for a breakdown of FY2019 discretionary and mandatory LHHS appropriations. The House Appropriations Committee's LHHS subcommittee approved its draft bill on June 15, 2018. The full committee markup was held on July 11, 2018, and the bill was ordered to be reported that same day (30-22). The bill was subsequently reported to the House on July 23 ( H.R. 6470 , H.Rept. 115-862 ). It did not receive floor consideration in the House. As reported by the full committee, the bill would have provided $187.2 billion in discretionary LHHS funds, a 0.3% increase from FY2018 enacted levels. This amount would have been 7.6% more than the FY2019 President's request. In addition, the House committee bill would have provided an estimated $869.8 billion in mandatory funding, for a combined total of $1.057 trillion for LHHS as a whole. The Senate Appropriations Committee's LHHS subcommittee approved its draft bill on June 26, 2018. The full committee markup was held on June 28, 2018. The committee approved the bill (30-1) and reported it that same day ( S. 3158 , S.Rept. 115-289 ). Instead of taking up S. 3158 , the Senate chose to consider and pass H.R. 6157 on August 23, 2018, by a vote of 85-7. The bill was amended on the Senate floor to contain FY2019 LHHS appropriations in Division B. (Division A contained the appropriations act for the Department of Defense.) The text of Division B that was considered for amendment was the same as S. 3158 (with minor alterations). During floor consideration, the Senate also adopted 31 amendments to the new LHHS division of the bill (see Appendix B for a summary of these amendments). The Senate-passed bill would have provided $189.4 billion in discretionary LHHS funds. This would have been 1.5% more than FY2018, and 8.9% more than the FY2019 President's request. In addition, the Senate bill would have provided an estimated $869.8 billion in mandatory funding, for a combined total of $1.059 trillion for LHHS as a whole. On February 12, 2018, the Trump Administration released the FY2019 President's budget. The President requested $173.9 billion in discretionary funding for accounts funded by the LHHS bill, which would have been a decrease of 6.8% from FY2018 levels. In addition, the President requested $869.8 billion in annually appropriated mandatory funding, for a total of $1.044 trillion for LHHS as a whole. On March 23, 2018, President Trump signed into law the Consolidated Appropriations Act, 2018 ( H.R. 1625 , P.L. 115-141 ). The bill was agreed to in the House on March 22 and in the Senate on March 23. The bill provided regular, full-year appropriations for all 12 annual appropriations acts, including LHHS (Division H). LHHS discretionary appropriations in the FY2018 omnibus totaled $186.5 billion (this total does not include emergency funding provided by an earlier supplemental appropriations act for FY2018, P.L. 115-123 ). This amount was 7.6% more than FY2017 levels and 25.3% more than the FY2018 budget request from the Trump Administration. The omnibus also provided $817.5 billion in mandatory funding, for a combined FY2018 LHHS total of $1.004 trillion. Table 2 displays FY2019 discretionary and mandatory LHHS budget authority provided or proposed, by bill title, along with FY2018 enacted levels. The amounts shown in this table reflect total budget authority provided in the bill (i.e., all funds appropriated in the bill, regardless of the fiscal year in which the funds become available), not total budget authority available for the current fiscal year. (For a comparable table showing current-year budget authority, see Table A-2 in Appendix A .) Figure 2 displays the FY2019 enacted discretionary and mandatory LHHS funding levels, by bill title. (While the dollars and percentages discussed in this section were calculated based on the FY2019 enacted amounts, they are generally also illustrativeâwithin several percentage pointsâof the share of funds directed to each bill title in FY2018 and under the other FY2019 proposals.) As this figure demonstrates, HHS accounts for the largest share of total FY2019 LHHS appropriations: $899 billion, or 84.9%. This is due to the large amount of mandatory funding included in the HHS appropriation, the majority of which is for Medicaid grants to states and payments to health care trust funds. After HHS, ED and the Related Agencies represent the next-largest shares of total LHHS funding, accounting for 7.1% and 6.7%, respectively. (The majority of the ED appropriations each year are discretionary, while the bulk of funding for the Related Agencies goes toward mandatory payments and administrative costs of the Supplemental Security Income program at the Social Security Administration.) Finally, DOL accounts for the smallest share of total LHHS funds, 1.3%. However, the overall composition of LHHS funding is noticeably different when comparing only discretionary appropriations. HHS accounts for a comparatively smaller share of total discretionary appropriations (47.8%), while ED accounts for a relatively larger share (37.7%). Together, these two departments represent the majority (85.5%) of discretionary LHHS appropriations. DOL and the Related Agencies account for a roughly even split of the remaining 14.5% of discretionary LHHS funds. Note that all amounts in this section are based on regular LHHS appropriations only. Amounts in this section do not include mandatory funds provided outside of the annual appropriations process (e.g., direct appropriations for Unemployment Insurance benefits payments). All amounts in this section are rounded to the nearest million or billion (as labeled). The dollar changes and percentage changes discussed in the text are based on unrounded amounts. For consistency with source materials, amounts do not reflect sequestration or reestimates of mandatory spending programs, where applicable. DOL is a federal department comprised of multiple entities that provide services related to employment and training, worker protection, income security, and contract enforcement. Annual LHHS appropriations laws direct funding to all DOL entities (see the text box). The DOL entities fall primarily into two main functional areasâworkforce development and worker protection. First, there are several DOL entities that administer workforce employment and training programsâsuch as the Workforce Innovation and Opportunity Act (WIOA) state formula grant programs, Job Corps, and the Employment Serviceâthat provide direct funding for employment activities or administration of income security programs (e.g., for the Unemployment Insurance benefits program). Also included in this area is the Veterans' Employment and Training Service (VETS), which provides employment services specifically for the veteran population. Second, there are several agencies that provide various worker protection services. For example, the Occupational Safety and Health Administration (OSHA), the Mine Safety and Health Administration (MSHA), and the Wage and Hour Division (WHD) provide different types of regulation and oversight of working conditions. DOL entities focused on worker protection provide services to ensure worker safety, adherence to wage and overtime laws, and contract compliance, among other duties. In addition to these two main functional areas, DOL's Bureau of Labor Statistics (BLS) collects data and provides analysis on the labor market and related labor issues. Table 3 generally displays FY2019 discretionary and mandatory DOL budget authority provided or proposed, along with FY2018 enacted levels. The FY2019 LHHS omnibus decreased discretionary appropriations for DOL by 0.8% compared to the FY2018 enacted levels. Similarly, discretionary DOL appropriations would have decreased, compared to FY2018, under the FY2019 President's budget request (-11.1%), as well as the FY2019 House committee bill (-2.4%) and Senate-passed bill (-0.8%). Of the total funding provided in the bill for DOL, roughly 89% is discretionary. The following sections present highlights from FY2019 enacted and proposed appropriations compared to FY2018 enacted appropriations for selected DOL accounts and programs. Table 4 displays funding for DOL programs and activities discussed in this section. ETA administers the primary federal workforce development law, the Workforce Innovation and Opportunity Act (WIOA, P.L. 113-128 ). The WIOA, which replaced the Workforce Investment Act, was signed into law in July 2014 and authorizes appropriations for its programs through FY2020. WIOA's provisions went into effect in FY2015 and FY2016. Title I of WIOA, which authorizes more than half of all funding for the programs authorized by the four titles of WIOA, includes three state formula grant programs serving Adults, Youth, and Dislocated Workers. While the FY2019 LHHS omnibus provided the same funding for the three WIOA state formula grant programs compared to FY2018, the President's budget would have reduced funding for all three of the state formula grant programs by $80 million (-2.9%), compared to FY2018 enacted levels. The FY2019 LHHS omnibus provided $221 million for the Dislocated Workers Activities National Reserve (DWA National Reserve), which was the same level enacted in FY2018. The FY2019 President's budget and the House committee bill would have reduced funding for the DWA National Reserve by $75 million (-34.0%) and $21 million (-9.4%), respectively, while the Senate would have kept DWA National Reserve funding the same as FY2018. Finally, the FY2019 LHHS omnibus maintained a provision in that account (which had originated in the FY2018 omnibus) directing $30 million from the DWA National Reserve toward training and employment assistance for workers dislocated in both the Appalachian and lower Mississippi regions. The FY2019 LHHS omnibus provided $160 million for the Apprenticeship Grant program, which is $15 million (+10.3%) more than the level enacted in FY2018. The FY2019 President's budget would have increased funding for the Apprenticeship Grant program by $55 million (+37.9%) compared to the FY2018 enacted level. Finally, four ETA programs for which the FY2019 President's budget proposed no fundingâthe Native Americans program, the Migrant and Seasonal Farmworkers program, the Community Service Employment for Older Americans (CSEOA) program, and the Workforce Data Quality Initiativeâreceived FY2019 appropriations at roughly the same level as FY2018. The FY2019 LHHS omnibus provided the same funding, $86 million, for ILAB as was provided in FY2018. The Senate-passed bill would also have provided $86 million for ILAB. The FY2019 President's budget and the House committee bill each would have decreased funding by $68 million (-78.5%) for ILAB, which provides research, advocacy, technical assistance, and grants to promote workers' rights in different parts of the world. Language in the FY2019 President's budget indicated that the proposed reduction reflected a \"workload decrease associated with the elimination of new grants as well as ILAB's refocusing of its efforts and resources on ensuring that U.S. trade agreements are fair for U.S. workers by monitoring and enforcing the labor provisions of Free Trade Agreements (FTAs) and trade preference programs.\" Annual LHHS appropriations acts regularly contain general provisions related to certain labor issues. This section highlights selected DOL general provisions in the FY2019 LHHS omnibus. The FY2019 LHHS omnibus continued several provisions that have been included in at least one previous LHHS appropriations act, including provisions that direct the Secretary of Labor to accept private wage surveys as part of the process of determining prevailing wages in the H-2B program, even in instances in which relevant wage data are available from the Bureau of Labor Statistics (included since FY2016); exempt certain insurance claims adjusters from overtime protection for two years following a \"major disaster\" (included since FY2016); authorize the Secretary of Labor to provide up to $2 million in \"excess personal property\" to apprenticeship programs to assist training apprentices (included since FY2018); authorize the Secretary of Labor to employ law enforcement officers or special agents to provide protection to the Secretary of Labor and certain other employees and family members at public events and in situations in which there is a \"unique and articulable\" threat of physical harm (included since FY2018); and authorize the Secretary of Labor to dispose of or divest \"by any means the Secretary determines appropriate\" all or part of the real property on which the Treasure Island Job Corps Center is located (included since FY2018). Note that all amounts in this section are based on regular LHHS appropriations only; they do not include funds for HHS agencies provided through other appropriations bills (e.g., funding for the Food and Drug Administration) or outside of the annual appropriations process (e.g., direct appropriations for Medicare or mandatory funds provided by authorizing laws, such as the Patient Protection and Affordable Care Act [ACA, P.L. 111-148 ]). All amounts in this section are rounded to the nearest million or billion (as labeled). The dollar changes and percentage changes discussed in the text are based on unrounded amounts. For consistency with source materials, amounts do not reflect sequestration or reestimates of mandatory spending programs, where applicable. HHS is a large federal department composed of multiple agencies working to enhance the health and well-being of Americans. Annual LHHS appropriations laws direct funding to most (but not all) HHS agencies (see text box for HHS agencies supported by the LHHS bill). For instance, the LHHS bill directs funding to five Public Health Service (PHS) agencies: the Health Resources and Services Administration (HRSA), Centers for Disease Control and Prevention (CDC), National Institutes of Health (NIH), Substance Abuse and Mental Health Services Administration (SAMHSA), and Agency for Healthcare Research and Quality (AHRQ). These public health agencies support diverse missions, ranging from the provision of health care services and supports (e.g., HRSA, SAMHSA), to the advancement of health care quality and medical research (e.g., AHRQ, NIH), to the prevention and control of infectious and chronic diseases (e.g., CDC). In addition, the LHHS bill provides funding for annually appropriated components of CMS, which is the HHS agency responsible for the administration of Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and consumer protections and private health insurance provisions of the ACA. The LHHS bill also provides funding for two HHS agencies focused primarily on the provision of social services: the Administration for Children and Families (ACF) and the Administration for Community Living (ACL). ACF's mission is to promote the economic and social well-being of vulnerable children, youth, families, and communities. ACL was formed with a goal of increasing access to community supports for older Americans and people with disabilities. Finally, the LHHS bill also provides funding for the HHS Office of the Secretary (OS), which encompasses a broad array of management, research, oversight, and emergency preparedness functions in support of the entire department. Table 5 displays enacted and proposed FY2019 funding levels for HHS, along with FY2018 levels. In general, discretionary funds account for about 10% of HHS appropriations in the LHHS bill. Compared to the FY2018 funding levels, the FY2019 LHHS omnibus increased HHS discretionary appropriations by 2.6%. The House committee bill would have increased HHS discretionary appropriations to a lesser degree, by 1.3%, whereas the Senate proposed a more substantial increase of 2.7%. In contrast, the President requested a 1.6% decrease in discretionary HHS funding. Figure 3 provides an HHS agency-level breakdown of FY2019 enacted appropriations. As this figure demonstrates, annual HHS appropriations are dominated by mandatory funding, the majority of which goes to CMS to provide Medicaid benefits and payments to health care trust funds. When taking into account both mandatory and discretionary funding, CMS accounts for $796.9 billion, which is 88.6% of all enacted appropriations for HHS. ACF and NIH account for the next-largest shares of total HHS appropriations, receiving about 4.2% apiece. By contrast, when looking exclusively at discretionary appropriations, funding for CMS constitutes about 4.9% of FY2019 enacted HHS appropriations. Instead, the bulk of discretionary appropriations went to the PHS agencies, which account for 63.5% of discretionary appropriations provided for HHS. NIH typically receives the largest share of all discretionary funding among HHS agencies (41.9% in FY2019), with ACF accounting for the second-largest share (25.6% in FY2019). Annual appropriations for HHS public health service agencies are best understood in the context of certain HHS-specific funding mechanisms: the Public Health Service (PHS) Evaluation Set-Aside and the Prevention and Public Health Fund (PPHF). In recent years, LHHS appropriations have used these funding mechanisms to direct additional support to certain programs and activities. The PHS Evaluation Set-Aside, also known as the PHS Evaluation Tap, is a unique feature of HHS appropriations. It is authorized by Section 241 of the Public Health Service Act (PHSA), and allows the Secretary of HHS, with the approval of appropriators, to redistribute a portion of eligible PHS agency appropriations across HHS for program evaluation purposes. The PHSA limits the set-aside to not less than 0.2% and not more than 1% of eligible program appropriations. However, LHHS appropriations acts have commonly established a higher maximum percentage for the set-aside and have distributed specific amounts of \"tap\" funding to selected HHS programs. Since FY2010, and including in FY2019, this higher maximum set-aside level has been 2.5% of eligible appropriations. (While the House committee bill would also have maintained the set-aside at 2.5%, the Senate-passed bill and the President's budget each proposed to increase the set-aside to 2.6% and 2.9%, respectively.) Before FY2015, the PHS tap traditionally provided more than a dozen HHS programs with funding beyond their annual appropriations and, in some cases, was the sole source of funding for a program or activity. However, since FY2015 and including in FY2019, LHHS appropriations laws have directed tap funds to a smaller number of programs or activities within three HHS agencies (NIH, SAMHSA, and OS) and have not provided any tap transfers to AHRQ, CDC, and HRSA. This has been particularly notable for AHRQ, which had been funded primarily through tap transfers from FY2003 to FY2014, but has received discretionary appropriations since then. The House committee bill and the Senate-passed bill generally would have maintained the current distributional practice for FY2019. However, the President's budget proposed to expand the activities and agencies funded by the PHS tap to include the Public Health Scientific Services at the CDC, while simultaneously proposing to eliminate tap transfers to some other activities. Since FY2015, LHHS appropriations laws have directed the largest share of tap transfers to NIH. The FY2019 omnibus provided $1.1 billion in tap transfers to NIH, a $224 million (+24.3%) increase over the FY2018 level. The FY2019 House committee bill proposed that the NIH transfers be continued at FY2018 levels ($923 million), whereas the Senate-passed bill would have increased the transfer by $95 million (+10.3%). In contrast, the President's request proposed that the transfer be reduced by $182 million (-19.7%). The ACA both authorized and appropriated mandatory funding to three funds to support programs and activities within the PHS agencies. One of these, the Prevention and Public Health Fund (PPHF, ACA Â§4002, as amended), was given a permanent, annual appropriation that was intended to provide support each year to prevention, wellness, and related public health programs funded through HHS accounts. The ACA had appropriated $2 billion in mandatory funds to the PPHF for FY2019, but this amount has been reduced by subsequent laws that decreased PPHF funding for FY2019 and other fiscal years. Under current law, the FY2019 appropriation was $900 million. In addition, this appropriation was subject to a 6.2% reduction due to sequestration of nonexempt mandatory spending. (For more information on sequestration, see the budget enforcement discussion in Appendix A .) After sequestration, the total PPHF appropriation available for FY2019 was $844 million, an increase of $4 million relative to FY2018. Of this amount, the LHHS omnibus allocated $805 million to CDC, $12 million to SAMHSA, and $28 million to ACL. PPHF funds are intended to supplement (sometimes quite substantially) the funding that selected programs receive through regular appropriations. Although the PPHF authority instructs the HHS Secretary to transfer amounts from the fund to HHS agencies, since FY2014 provisions in annual appropriations acts and accompanying reports have explicitly directed the distribution of PPHF funds and prohibited the Secretary from making further transfers for those years. The CDC commonly receives the largest share of annual PPHF funds. The amount provided to the CDC for FY2019, $805 million, was a $4 million (+0.4%) increase relative to FY2018. The House committee bill and the Senate-passed bill each proposed increases to the CDC allocation (to $848 million and $808 million, respectively), while the President's request proposed eliminating the mandatory PPHF appropriation entirely. This section begins with a limited selection of FY2019 discretionary funding highlights by HHS agency. The discussion is largely based on the enacted and proposed appropriations levels for FY2019, compared to FY2018 enacted levels. These summaries are followed by a brief overview of significant provisions from annual HHS appropriations laws that restrict spending in certain controversial areas, such as abortion and stem cell research. The section concludes with two tables ( Table 6 and Table 7 ) presenting more detailed information on FY2018 enacted and FY2019 proposed and enacted funding levels for HHS. The FY2019 LHHS omnibus provided $6.9 billion in discretionary budget authority for HRSA. This was $107 million (+1.6%) more than HRSA's FY2018 discretionary funding level and $2.7 billion (-28.4%) less than the FY2019 President's budget request. In several cases, the FY2019 President's budget proposed new or increased discretionary budget authority for HRSA programs that had previously been funded exclusively or jointly with mandatory appropriations from authorizing laws, such as the health centers program, the National Health Service Corps, and the Maternal, Infant, and Early Childhood Home Visiting program. Simultaneously, the President's budget proposed to eliminate mandatory funding for these programs. However, authorizing law ultimately provided FY2019 mandatory appropriations for each of these programs and the FY2019 LHHS omnibus maintained discretionary appropriations for them at their FY2018 levels, where applicable. The FY2019 LHHS omnibus provided $286 million for Title X Family Planning, the same as FY2018. For the fourth year in a row, the House committee bill had proposed eliminating funding for Title X of the PHSA and also prohibiting the use of other HHS funds to carry out Title X. In contrast, the FY2019 Senate-passed bill and the FY2019 President's budget had proposed a flat funding level for Title X from FY2018, and no prohibition on the use of other HHS funds. The FY2019 LHHS omnibus also continued to fund the Rural Communities Opioids Response program within HRSA's Rural Health account. The program was created in FY2018 to support treatment and prevention of substance use disorders in high-risk rural communities. The omnibus appropriated $120 million for the program, an increase of $20 million (+20.0%) from FY2018. HRSA is directed to use this increase to establish three Rural Centers of Excellence on substance use disorders. The LHHS omnibus provided Healthy Start an increase of $12 million (+10.9%) from FY2018 as part of a new initiative to reduce maternal mortality and increased funding to support maternal mortality reduction efforts under the Maternal and Child Health Block Grant by $26 million (+4.0%). The FY2019 LHHS omnibus provided $7.1 billion in discretionary budget authority for CDC. This was $117 million (-1.6%) less than CDC's FY2018 funding level and $1.6 billion (+28.3%) more than the FY2019 President's budget request. The FY2019 LHHS omnibus did not direct any PHS tap funds to the CDC, continuing the practice started in FY2015. (The FY2019 President's budget had requested $136 million in tap funds.) However, the FY2019 LHHS omnibus did supplement discretionary CDC appropriations with $805 million in PPHF transfers to the CDC, which was $4 million (+0.4%) more than FY2018. (Unlike FY2018, the FY2019 LHHS omnibus did not direct any transfers from the HHS Nonrecurring Expenses Fund (NEF) to the CDC.) A number of CDC accounts contained funding set aside to address the opioid crisis. For example, the HIV/AIDS, Viral Hepatitis, Sexually Transmitted Diseases and Tuberculosis Prevention account received an increase of $5 million (+0.4%) from FY2018; the conference report specified that the increase be used for a new initiative targeting infectious disease consequences of the opioid epidemic. With regard to the Injury Prevention and Control account, which was maintained at the FY2018 level of $649 million, the conference report directed HHS to reserve $476 million from this total for the CDC's Prescription Drug Overdose (PDO) activities, noting that these funds should be used to \"advance the understanding of the opioid overdose epidemic and scale up prevention activities.\" In addition, $10 million in PDO funding was to be dedicated to a nationwide opioid awareness and education campaign. The Birth Defects and Developmental Disabilities account received an increase of $15 million (+10.7%), of which $10 million was to support monitoring of mothers and babies affected by the Zika virus as well as other emerging health threats, such as opioid use during pregnancy, and $2 million was reserved specifically for activities related to neonatal abstinence syndrome. The FY2019 LHHS omnibus provided $37.9 billion in discretionary budget authority for NIH. This was $1.8 billion (+4.9%) more than FY2018 and $4.1 billion (+12.3%) more than the President's FY2019 budget request. In addition, the FY2019 LHHS omnibus directed $1.1 billion in PHS tap transfers to NIH, an increase of $224 million (+24.3%) from FY2018. The entirety of the tap transfer was provided to the National Institute of General Medical Sciences (NIGMS), and was paired with a discretionary appropriation of $1.7 billion. The discretionary appropriation was $137 million (-7.3%) less than FY2018, but when combined with the tap transfer, total funding for NIGMS increased by $87 million (+3.1%) from FY2018. When accounting for discretionary appropriations and PHS tap transfers, each of the NIH accounts in the LHHS bill received an increase from FY2018 levels. Compared to FY2018, the largest percentage increases went to the National Institute on Aging, which received a total of $3.1 billion (+19.8%), and the Buildings and Facilities account, which received $200 million (+55.2%). In line with recent practice, the conference report on the FY2019 LHHS omnibus directed NIH to reserve a specific amount ($2.34 billion) for Alzheimer's disease research, referring to it as an increase of $425 million from FY2018. Reserving a specific dollar amount for a particular disease or area of research at NIH is a relatively new practice and constitutes a significant departure from past precedent. The FY2019 LHHS omnibus appropriated $711 million to the NIH Innovation Account pursuant to the 21 st Century Cures Act ( P.L. 114-255 ), which was equal to the amount authorized to be appropriated in that act. The conference report also reiterated the purposes authorized in the act, directing that NIH transfer $400 million to the National Cancer Institute to support cancer research, and $57.5 million each to the National Institute of Neurological Disorders and Stroke and the National Institute of Mental Health to support the Brain Research through Advancing Innovative Neurotechnologies (BRAIN) Initiative. The remaining $196 million was divided between the Precision Medicine Initiative ($186 million) and regenerative medicine research ($10 million). The FY2019 LHHS omnibus provided $5.6 billion in discretionary budget authority for SAMHSA. This amount was $584 million (+11.6%) more than SAMHSA's FY2018 funding level and $2.2 billion (+63.4%) more than the President's FY2019 budget request. In addition, the FY2019 LHHS omnibus also directed $134 million in PHS evaluation tap funding and $12 million in PPHF funding to SAMHSA, which was the same amount as FY2018. State Opioid Response Grants received $1.5 billion in FY2019, a $500 million (+50%) increase from FY2018, which was the first year in which funding was provided for this program. However, the State Targeted Response to the Opioid Crisis (STR) grants that were appropriated $500 million in each of FY2017 and FY2018 did not receive appropriations in FY2019. The FY2019 LHHS omnibus also included an increase of $50 million (+50.0%) from FY2018 for Certified Community Behavioral Health Centers. Mental Health Programs of Regional and National Significance (PRNS) and Substance Abuse Prevention PRNS each had a reduction of $43 million (-10.1% and -17.2%, respectively) from FY2018, while Substance Abuse Treatment PRNS had an increase of $55 million (+13.7) from FY2018. The FY2019 LHHS omnibus provided $4.4 billion in discretionary budget authority for CMS. This was $20 million (+0.5%) more than FY2018 and $121 million (+2.8%) more than the FY2019 President's budget request. The LHHS omnibus appropriated $765 million for the CMS Health Care Fraud and Abuse Control (HCFAC) account, 2.7% more than FY2018, and slightly less (-0.6%) than the FY2019 President's request. Of the total amount appropriated for HCFAC, $454 million was effectively exempt from the discretionary budget caps. (See Appendix A for an explanation of the LHHS budget cap exemptions.) The LHHS omnibus provided the CMS Program Management account with a flat funding level of $3.7 billion. This account supports CMS program operations (e.g., claims processing, information technology investments, provider and beneficiary outreach and education, and program implementation), in addition to federal administration and other activities related to the administration of Medicare, Medicaid, the State Children's Health Insurance Program, and private health insurance provisions established by the ACA. The FY2019 appropriation was the same amount that was proposed by the Senate-passed bill, but more than the amounts proposed by the President's budget (+3.6%) and the House committee bill (+4.8%). The omnibus maintained a general provision (Â§227), included in LHHS appropriations acts since FY2014, authorizing HHS to transfer additional funds into this account from Medicare trust funds. The terms of the provision required that such funds be used to support activities specific to the Medicare program, limited the amount of the transfers to $305 million, and explicitly prohibited such transfers from being used to support or supplant funding for ACA implementation. The House committee bill would have eliminated this provision. The FY2019 LHHS omnibus provided $23.2 billion in discretionary budget authority for ACF. This was $357 million (+1.6%) more than FY2018 and $7.8 billion (+50.6%) more than the FY2019 President's budget request. The President's budget would have decreased ACF discretionary funding by roughly one-third relative to the prior year (-32.5%). The President's budget would have achieved much of its proposed reduction by eliminating certain programs within ACF, such as the Low Income Home Energy Assistance Program (LIHEAP), Preschool Development Grants (PDG), and the Community Services Block Grant (CSBG). Funding for these three programs was sustained or increased in the FY2019 LHHS omnibus: LIHEAP received $3.7 billion, PDG $250 million, and CSBG $725 million. The LHHS omnibus provided $1.9 billion for the Refugee and Entrant Assistance programs account, an increase of $40 million (+2.2%) relative to FY2018. The LHHS omnibus retained a provision, included in LHHS appropriations since FY2015, authorizing HHS to augment appropriations for the Refugee and Entrant Assistance account by up to 10% via transfers from other discretionary HHS funds. The conference report on the omnibus directed the majority of the appropriation for Refugee and Entrant Assistance programs toward the Unaccompanied Alien Children (UAC) program ($1.3 billion, the same as FY2018). The UAC program provides for the shelter, care, and placement of unaccompanied alien children who have been apprehended in the United States. The LHHS omnibus also included several new general provisions related to the UAC program. For instance, the law authorized HHS to accept donations for the care of UACs (Â§232), required HHS to submit a report on reunification of children with parents who are no longer in the United States (Â§233), and prohibited HHS appropriations from being used to prevent a Member of Congress from visiting a UAC facility for oversight purposes (Â§234). In addition, the conference report on the LHHS omnibus expressed an expectation that HHS would adhere to certain general provisions that had been included in the House committee bill ( H.R. 6470 ), specifically provisions relating to sibling placement (Â§235), monthly reporting (Â§236), a report on preliterate children in custody (Â§541), a report on the mental health needs of children separated from their parents (Â§542), and a sense of the Congress that immigrant children should not be separated from their parents and should be reunited immediately (Â§539). A number of new directives and reporting requirements on the UAC program were also included in the conference report itself, as well as reports on the earlier committee-reported FY2019 LHHS bills. The conferees noted that HHS was expected to adhere to the requirements laid out in all three reports (unless a particular requirement in a committee report had been superseded by the LHHS omnibus or its conference report). These requirements addressed a range of topics related to, for instance, the administration of medication, questioning children about religion, sharing information on the whereabouts of children and parents, protecting genetic material, the provision of qualified and independent legal counsel, and expectations for communication with appropriations committees on various UAC issues. The FY2019 LHHS omnibus provided $338 million in discretionary budget authority to AHRQ. This was 1.2% more than the FY2018 level of $334 million. The FY2019 LHHS omnibus did not direct any PHS tap transfers to AHRQ, which is in keeping with practices since FY2015 but contrasts with earlier years (FY2003-FY2014) in which AHRQ had been funded primarily with tap transfers. The FY2019 omnibus continued to fund AHRQ as its own operating division, declining the President's proposal to consolidate AHRQ into NIH. The FY2019 President's request had proposed zero funding for AHRQ, proposing instead to continue funding many of AHRQ's activities through a new National Institute for Research on Safety and Quality (NIRSQ) in the NIH. The FY2019 LHHS omnibus provided $2.2 billion in discretionary budget authority for ACL. This was $25 million (+1.2%) more than FY2018. In addition, the FY2019 LHHS omnibus directed $28 million in PPHF transfers to ACL, the same as FY2018. The FY2019 LHHS omnibus specified that the PPHF transfers were for the Alzheimer's Disease Program, Chronic Disease Self-Management, and Elder Falls Prevention. The FY2019 LHHS omnibus did not adopt the President's budget proposals to consolidate Chronic Disease Self-Management and Elder Falls Prevention into the Preventive Health Services Program, or to eliminate funding for the State Health Insurance Program, the Paralysis Resource Center, and the Limb Loss Resource Center. The conference report on the FY2019 LHHS omnibus called on ACL to use a portion of the $181 million reserved for Family Caregiver Support Services to establish and carry out activities for two newly authorized advisory councils. Specifically, the report recommended that ACL dedicate $300,000 to the Family Caregiving Advisory Council authorized under the RAISE Family Caregivers Act ( P.L. 115-119 ) and $300,000 to the Advisory Council to Support Grandparents Raising Grandchildren authorized under the Supporting Grandparents Raising Grandchildren Act ( P.L. 115-196 ). In addition, the conference report on the FY2019 LHHS omnibus called for a $5 million (+40.1%) increase under Aging Network Support Activities for a new Care Corps grants program. Care Corps grants are intended to support public agencies and nonprofits in placing volunteers to provide nonmedical care to help family caregivers, seniors, and individuals with disabilities to maintain independence. Annual LHHS appropriations measures regularly contain broad restrictions related to certain controversial issues. For instance, annual LHHS appropriations acts commonly include provisions limiting the use of federal funds for abortions, the use of human embryos for research, needle exchange programs, and gun control advocacy. Abortions: Since FY1977, annual LHHS appropriations acts have included provisions limiting the circumstances under which LHHS funds (including Medicaid funds) may be used to pay for abortions. Early versions of these provisions applied only to HHS, but since FY1994 most provisions have applied to the entire LHHS bill. Under current provisions, (1) abortions may be funded only when the life of the mother is endangered or in cases of rape or incest; (2) funds may not be used to buy a managed care package that includes abortion coverage, except in cases of rape, incest, or endangerment; and (3) federal programs and state and local governments that receive LHHS funding are prohibited from discriminating against health care entities that do not provide or pay for abortions or abortion services. The FY2019 omnibus retained these existing restrictions (Â§Â§506 and 507). In addition, the House committee bill proposed a new provision that was not enacted (Â§534) based on the Conscience Protection Act ( H.R. 644 , 115 th Congress). Among other things, this provision would have amended the Public Health Service Act to generally prevent federal, state, and local governments from penalizing or discriminating against health care providers who choose not to perform, pay for, or sponsor coverage of abortions. However, the provision was not included in the LHHS omnibus. Human Embryo Research: Since FY1996, annual LHHS appropriations have included a provision prohibiting any LHHS funds (including NIH funds) from being used to create human embryos for research purposes or for research in which human embryos are destroyed. The FY2019 omnibus retained these existing restrictions (Â§508). Needle Exchange Programs: Since FY1990, annual LHHS appropriations have generally included a provision prohibiting any LHHS funds from being used for needle exchange programs (i.e., programs in which sterile needles or syringes are made available to injection drug users in exchange for used needles or syringes to mitigate the spread of related infections, such as Hepatitis and HIV/AIDS). Starting in FY2016, the provision was modified to allow funds to be used for needle exchange programs under the following conditions: (1) federal funds may not be used to purchase the needles, but may be used for other aspects of such programs; (2) the state or local jurisdiction must demonstrate, in consultation with CDC, that they are experiencing, or at risk for, a significant increase in hepatitis infections or an HIV outbreak due to injection drug use; and (3) the program must be operating in accordance with state and local law. The FY2019 omnibus retained these existing restrictions and conditions (Â§529). Gun Control: Since FY1997, annual LHHS appropriations have included provisions prohibiting the use of certain funds for activities that advocate or promote gun control. Early versions of these provisions applied only to CDC; since FY2012, annual appropriations acts also have included HHS-specific restrictions, in addition to restrictions that apply to all LHHS funds (including funds transferred from the PPHF). The FY2019 omnibus retained these existing restrictions (Â§210 [HHS] and Â§503(c) [all LHHS, plus PPHF transfers]). Restrictions on ACA Implementation: Since FY2011, annual LHHS appropriations have included provisions limiting or altering the ability of HHS to implement various aspects of the ACA. The content and scope of these provisions has evolved over time. The FY2019 House committee bill contained two provisions related to this topic that were not included in the FY2018 omnibus. First, the FY2019 House committee bill (Â§528) would have prohibited any funds appropriated in the bill from being used for health insurance \"navigator\" programs required by Section 1311 of the ACA. (Navigators conduct public education activities to help consumers and small businesses make informed decisions about insurance.) Further, the House committee bill would have prohibited LHHS appropriations from being used to \"implement, administer, enforce, or further\" any provision of the ACA, with limited exceptions (Â§527). The Senate bill did not include comparable provisions. Note that amounts in this section are based on regular LHHS appropriations only. They do not include mandatory funds provided outside of the annual appropriations process (e.g., direct appropriations for the Federal Direct Student Loan program and the mandatory portion of the Federal Pell Grant program). Amounts are rounded to the nearest million or billion (as labeled). The dollar and percentage changes discussed are based on unrounded amounts. For consistency with source materials, amounts do not reflect sequestration or reestimates of mandatory spending programs, where applicable. Federal policymakers established the U.S. Department of Education (ED) in 1980. Its mission is to \"promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access.\" Typically, about three-quarters of ED's discretionary appropriations go either to local educational agenciesâwhich primarily use the funds to provide educational and related services for economically disadvantaged students and students with disabilitiesâor to low-income postsecondary students in the form of Pell Grants, which help pay for college. The remainder of ED's discretionary budget provides for a wide range of activities, including (but not limited to) support for minority-serving institutions; educational research; and career, technical, and adult education. The federal government provides roughly 7% of overall funding for elementary and secondary education in the United States. The majority of school fundingâabout 83%âcomes from states and local districts, which have primary responsibility for the provision of elementary and secondary education. With regard to higher education, the federal government provided roughly 61% of undergraduate and graduate student aid in academic year (AY) 2017-2018. Table 8 displays FY2019 discretionary and mandatory ED budget authority provided and proposed, along with FY2018 enacted levels. Discretionary funds represent the majority of ED's annual appropriations, accounting for roughly 95% of the FY2018 and FY2019 enacted levels. The FY2019 enacted discretionary ED appropriations were 0.8% higher than FY2018 levels. Proposed discretionary ED appropriations for FY2019 compared to FY2018 would have decreased under the President's budget (-10.8%) and increased slightly under the Senate floor and House committee bills (+0.8 and +0.2, respectively). The following sections highlight FY2019 appropriations for selected ED accounts and programs. Table 9 tracks funding levels for major ED budget and appropriations accounts. The FY2019 LHHS omnibus appropriated nearly $1.3 billion for career and technical education, a 5.8% increase from the FY2018 level of $1.2 billion. The President's budget requested approximately $1.1 billion for CTE. The Senate bill would have kept CTE funding at the FY2018 level, whereas the House committee bill would have appropriated just over $1.3 billion. The Carl D. Perkins Career and Technical Education Act (Perkins Act) is the primary federal law aimed at developing and supporting career and technical education (CTE) programs at the secondary and postsecondary educational levels. Recipients of Perkins funds are required to use those funds for a variety of purposes that help CTE students attain technical skills and earn an industry-recognized credential, certificate, or a postsecondary degree. Prior to the 115 th Congress, the Perkins Act had most recently been reauthorized in 2006 by the Carl D. Perkins Career and Technical Education Act of 2006 (Perkins IV; P.L. 109-270 ). In 2018, the Perkins Act was comprehensively reauthorized once again through the passage of the Strengthening Career and Technical Education for the 21 st Century Act (Perkins V; P.L. 115-224 ). Perkins V was signed into law by President Trump on July 31, 2018, and went into effect on July 1, 2019. The Pell Grant program within the Student Financial Assistance account provides need-based financial aid primarily to low-income undergraduate students to help them cover the cost of higher education. Pell Grants are the largest single source of federal grant aid for undergraduate students; they are projected to provide approximately $30 billion in aid to roughly 7.6 million undergraduate students in the 2019-2020 award year. The FY2019 enacted discretionary appropriation of $22.5 billion provided level funding compared to FY2018. The President's budget, the Senate bill, and the House committee bill all proposed level funding. The FY2019 LHHS omnibus increased the discretionary maximum Pell Grant award level to $5,135, which is $100 higher than the FY2018 level. The Senate bill recommended that same amount. The House committee bill did not recommend an increase. The President's budget, which was released before the FY2018 appropriations were finalized, requested the same discretionary maximum Pell Grant award level as in FY2017: $4,860. The total maximum Pell Grant award is the sum of the discretionary maximum award level and the mandatory add-on award level. The discretionary award program costs may be funded through (1) annual discretionary appropriations; (2) a permanent, definite mandatory appropriation; and (3) the Pell Grant program surplus. The mandatory add-on award program costs are funded by a permanent, indefinite mandatory appropriation. Both mandatory appropriation sources are provided outside the annual appropriations process, are authorized by and funded in the Higher Education Act (HEA), and do not appear in Table 9 . As a result of Pell Grant award rules established in the HEA, the increase in the discretionary maximum Pell Grant award level increases FY2019 program costs, assuming no other changes. In order to pay for the estimated increase in FY2019 mandatory add-on award program costs, the LHHS omnibus reduced the FY2019 definite mandatory appropriation from $1.409 billion to $1.370 billion (Â§311). The Senate bill would have reduced the FY2019 definite mandatory appropriation by the same amount, while the House committee bill would not have reduced it. (The President's budget also proposed a reduction in the FY2019 definite mandatory appropriation, but that reduction was to fund a policy proposal that was subsequently implemented by the FY2018 appropriations act.) The FY2019 LHHS omnibus implemented another provision related to the Pell Grant program surplus: it rescinded $600 million of the surplus, which offset the cost of appropriations in the act. ED collects and processes information from prospective postsecondary students to determine eligibility for federal loans, grants, and other types of financial aid using the Free Application for Federal Student Aid (FAFSA). Through the FAFSA, students provide information on income, assets, and other characteristics. The Higher Education Act (HEA) permits student information from the FAFSA to be shared with state agencies and institutions of higher education to help determine federal and nonfederal aid. The FY2019 LHHS omnibus included a general provision authorizing institutions of higher education to share, with the applicant's explicit written consent, information collected from the FAFSA with a scholarship granting organization or an organization assisting the applicant in applying for and receiving federal, state, local, or tribal assistance (Â§312). The omnibus prohibits organizations that receive such information from selling or otherwise sharing it. The omnibus specifies that this provision is to remain in effect until Title IV of the HEA is reauthorized. Note that all amounts in this section are based on regular LHHS appropriations only; they do not include funds provided outside of the annual appropriations process (e.g., mandatory appropriations for Social Security benefit payments). All amounts in this section are rounded to the nearest million or billion (as labeled). The dollar changes and percentage changes in the text are based on unrounded amounts. For consistency with source materials, amounts do not reflect sequestration or reestimates of mandatory spending programs, where applicable. Table 10 displays FY2019 proposed and enacted funding levels for LHHS related agencies, along with FY2018 enacted levels. In general, discretionary funds constitute about 20% of total appropriations for LHHS related agencies each year. The FY2019 omnibus increased discretionary appropriations for related agencies by about 0.1% compared to FY2018. The President's budget and the House committee bill would have decreased discretionary appropriations for related agencies by about 14.0% and 2.2%, respectively, while the Senate-passed bill would have increased such appropriations by 0.5%. The largest share of funding appropriated to related agencies in the LHHS bill consistently goes to the Social Security Administration (SSA). When taking into account both mandatory and discretionary funding, SSA usually represents roughly 97% of total appropriations to related agencies in the LHHS bill. The bulk of mandatory funding provided to SSA from the LHHS bill supports the Supplemental Security Income (SSI) program, which provides means-tested cash assistance to disabled adults and children and to seniors aged 65 or older. When looking exclusively at discretionary funding, SSA received 84.7% of discretionary appropriations for LHHS related agencies in the FY2019 LHHS omnibus. After SSA, the next-largest related agency in terms of appropriations is usually the Corporation for National and Community Service (CNCS), which accounted for about 1.5% of total appropriations and 7.1% of discretionary appropriations to LHHS related agencies in FY2019. Typically, each of the remaining related agencies receives less than $1 billion from the annual LHHS appropriations bill. For more information, see Table 11 . The following sections highlight FY2019 appropriations issues for selected related agencies. Table 11 tracks funding levels for these related agencies. The SSA LAE account consists mainly of funds that are used by SSA to administer the Social Security and SSI programs and to support CMS in administering portions of Medicare. The account also contains funds that are specifically set aside for certain program integrity activities, such as continuing disability reviews (CDRs) and SSI nonmedical redeterminations. The FY2019 LHHS omnibus provided $12.9 billion to the LAE account, which was a slight increase (+$2 million) over the FY2018 enacted level. The President's request would have provided about $482 million less (-3.7%) for the LAE account relative to FY2018. The Senate-passed bill would have increased LAE funding by $77 million (+0.6%) compared to FY2018, while the House committee bill would have decreased LAE funding by $318 million (-2.5%). Of the $12.9 billion provided to the LAE account for FY2019, nearly $1.7 billion (13.1%) was dedicated to program integrity activities. The program integrity portion of the LAE account included $273 million in \"base\" funding subject to the discretionary spending caps established by the Budget Control Act of 2011, as well as additional funding that was effectively exempt from those caps and subject to an annual limit (\"cap adjustment funding\"; see Appendix A for further information). The FY2019 LHHS omnibus provided $1.4 billion in cap adjustment funding, which was the maximum amount permitted for FY2019. However, because federal law allowed more cap adjustment funding for FY2018 than for FY2019, the combined amount of program integrity funding enacted for FY2019 was $52 million (-3.0%) less than the combined amount enacted for FY2018. All three proposals would have also provided the maximum amount of cap adjustment funding permitted for FY2019. The CNCS is an independent federal agency that administers a variety of national and community service programs, such as AmeriCorps and the National Senior Volunteer Corps. The FY2019 LHHS omnibus provided $1.1 billion in total CNCS funding, a $19 million (+1.8%) increase over the FY2018 enacted level. The FY2019 President's budget had requested $123 million (-88.5%) for CNCS, noting that these funds would be used to execute an orderly shutdown of CNCS operations, with the agency's closure slated to be complete by the end of FY2019. Both the House committee bill and the Senate-passed bill declined the President's proposal, with the House proposing to retain CNCS funding at its FY2018 level of $1.1 billion (0.0%), while the Senate-passed bill would have modestly reduced agency funding by $6 million (-0.5%). The NLRB is an independent board that enforces provisions in the National Labor Relations Act (NLRA). The FY2019 LHHS omnibus maintained the FY2018 funding levels for the NLRB of $274 million. The FY2019 President's budget and the House committee bill would have decreased funding for the NLRB by $25 million (-9.2%) and by $13 million (-4.7%), respectively, while the Senate-passed bill would have provided the same amount as FY2018. The FY2019 LHHS omnibus retained a provision that has been included in the LHHS bill since FY2012 that prohibits any funds appropriated to the NLRB in the bill, or any prior appropriations act, from being used to issue a directive or regulation to provide employees a means of voting through any electronic method in an election determining representation for collective bargaining (Â§407). The FY2019 LHHS omnibus, however, did not include two NRLB-related provisions proposed by the House committee bill that would have prohibited any funds made available by the bill from being used to issue, enforce, or litigate any administrative action related to changing the interpretation or application of the \"joint employer\" standard in effect as of January 1, 2014 (Â§408 of H.R. 6470 ) ; and prohibited any funds made available by the bill from being used to enforce the NLRA against any Indian tribe (Â§409 of H.R. 6470 ). Appendix A. Budget Enforcement Activities The framework for budget enforcement under the congressional budget process has both statutory and procedural elements. The statutory elements include the discretionary spending limits and mandatory spending sequester derived from the Budget Control Act of 2011 (BCA; P.L. 112-25 ) and the Balanced Budget and Emergency Deficit Control Act of 1985 (BBEDCA; P.L. 99-177 ). The procedural elements are primarily associated with the budget resolution and limit both total discretionary spending and spending under the jurisdiction of each appropriations subcommittee. Readers should note that the statutory budget enforcement requirements that apply to FY2019 discretionary spending under the BCA were altered the prior fiscal year by the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ), which was enacted on February 9, 2018. This law increased the defense and nondefense discretionary spending limits for FY2018 and FY2019, and extended mandatory spending sequestration through FY2027. Budget Control Act and Sequestration The BCA provides budget process mechanisms to reduce mandatory spending and further reduce discretionary spending over an extended period. For mandatory spending, reductions are to occur through sequestration in each of fiscal years between FY2013-FY2027. For discretionary spending, reductions occurred through sequestration in FY2013, but are to be achieved through lower discretionary spending limits for each of the fiscal years between FY2014-FY2021. The BCA does not require a sequester of discretionary spending in FY2014-FY2021 unless one or both of the statutory discretionary spending limits (defense and nondefense) is breached. Only discretionary spending subject to a given spending limit is affected by a breach of that limit, and the LHHS bill only includes funding in the nondefense category. FY2019 On February 12, 2018, concurrent with the release of the President's budget, President Trump issued the required FY2019 sequestration order, calling for nonexempt mandatory spending to be reduced on October 1, 2018. The Office of Management and Budget (OMB) estimated that the FY2019 sequestration percentages would equal 2% of nonexempt Medicare spending and 6.2% of other nonexempt nondefense mandatory spending, for a total reduction of $19 billion in FY2019. (OMB also estimated an 8.7% reduction, totaling $809 million, in nonexempt defense mandatory spending, which does not affect LHHS funds.) With regard to discretionary spending, the FY2019 statutory spending limits as specified in BBA 2018 were $647 billion for defense spending and $597 billion for nondefense spending; each of these levels was $18 billion more than their respective FY2018 limits. Once all annual appropriations acts were enacted for FY2019 and allowable adjustments to the spending limits were made, OMB determined that those appropriations did not violate either the defense or the nondefense limit. Cap Adjustments, Exemptions, and Special Rules The BCA allows for certain adjustments to the discretionary spending limits for FY2012-FY2021. For LHHS, the BCA as originally enacted allowed increases to the nondefense limit (up to a point) to accommodate new budget authority for specified program integrity initiatives at HHS and the Social Security Administration (SSA). The Bipartisan Budget Act of 2015 ( P.L. 114-74 ) amended the list of SSA activities that may be covered by this \"cap adjustment\" to include costs associated with work-related continuing disability reviews, Cooperative Disability Investigations, and fraud prosecutions by Special Assistant U.S. Attorneys. The Bipartisan Budget Act of 2015 also revised the amount of the allowable SSA adjustment amounts to be more generous in FY2017-FY2019 compared to what was previously allowed, but less generous in FY2021. The BBA 2018 added a new cap adjustment that also involves a LHHS activity. This new cap adjustment allows increases to the nondefense limit (up to a point) to accommodate new budget authority for the DOL to help fund the reemployment services and eligibility assessments conducted by the states related to unemployment compensation. Separate from these cap adjustments, the 21 st Century Cures Act (Cures Act, P.L. 114-255 ), which was enacted on December 13, 2016, included additional budget enforcement procedures related to the discretionary spending limits. These procedures originally applied to two accounts within the scope of the LHHS bill: the NIH Innovation Account and the Account for the State Response to the Opioid Abuse Crisis. For FY2019, the NIH Innovation Account was the only LHHS funding to be subject to the Cures Act budget enforcement procedures. The Cures Act created the NIH Innovation and State Response to the Opioid Abuse Crisis accounts and authorized appropriations from them for specific fiscal years (FY2017-FY2026 for the NIH Innovation Account and FY2017-FY2018 for the Account for the State Response to the Opioid Abuse Crisis). The Cures Act further provided that subsequent discretionary appropriations from these accounts (up to the amounts authorized for each fiscal year) are to be subtracted from any cost estimates provided for purposes of budget controls. The Cures Act ensured that appropriations from these accounts will not count against any spending limits, such as the statutory discretionary spending limits imposed by the BCA; that is, the amounts appropriated from these accounts will be considered to be outside those limits. An additional set of statutory exemptions and special rules that apply to sequestration are relevant for the LHHS bill. The LHHS bill contains several programs that are exempt from sequestration, including Medicaid, payments to health care trust funds, Supplemental Security Income, Special Benefits for Disabled Coal Miners, retirement pay and medical benefits for commissioned Public Health Service officers, foster care and adoption assistance, and certain family support payments. The LHHS bill also contains several programs that are subject to special rules under sequestration, such as unemployment compensation, certain student loans, health centers, and portions of Medicare. Budget Resolution and 302(b) Suballocations The procedural elements of budget enforcement generally stem from requirements under the Congressional Budget Act of 1974 ( P.L. 93-44 ) that are associated with the adoption of an annual budget resolution. Through this process, the Appropriations Committee in each chamber receives a procedural limit on the total amount of discretionary budget authority for the upcoming fiscal year, referred to as a 302(a) allocation. The Appropriations Committee subsequently divides this allocation among its 12 subcommittees. These subcommittee-level spending limits are referred to as 302(b) suballocations. The 302(b) suballocations restrict the amount of budget authority available to each subcommittee for the agencies, projects, and activities under its jurisdiction, effectively acting as a cap on each of the 12 regular appropriations bills. Enforcement of the 302(a) allocation and 302(b) suballocations occurs through points of order. For the FY2019 appropriations cycle, the House and the Senate did not adopt a budget resolution. Instead, the House and Senate both used authority granted in the BBA 2018 for the Budget Committee chair in each chamber to file enforceable budgetary levels for FY2019. In line with these budgetary levels, the House Appropriations Committee adopted its initial suballocations on May 10, 2018 ( H.Rept. 115-710 ), while the Senate Appropriations Committee adopted its initial suballocations on May 24, 2018 ( S.Rept. 115-260 ). (As the FY2019 appropriations process was underway, both committees periodically updated these suballocations to align them with changing congressional priorities.) For current-year LHHS discretionary funding, Table A-1 displays FY2018 enacted levels, the House and the Senate FY2019 initial suballocations, and enacted FY2019 LHHS appropriations. The table shows that the House initially would have kept regular LHHS appropriations at a flat level compared to the prior fiscal year, whereas the Senate would have increased those appropriations by about $2.1 billion relative to FY2018 (+1%). Ultimately, final enacted appropriations were a little less than $1 billion higher than the prior fiscal year. The table also displays funding for which adjustments may be made to the discretionary spending limits under the BCA, including funding for certain LHHS program integrity activities and emergency requirements, where applicable. The \"adjusted appropriations\" total includes this funding. Note that compliance with discretionary spending allocations is evaluated based on budget authority available in the current fiscal year , adjusted for scorekeeping by CBO. As such, totals shown in this table may not be comparable to other totals shown in this report. Current-year budget authority totals exclude advance appropriations for future years, but include advance appropriations from prior years that become available in the current year. (Advance appropriations are provided to selected LHHS accounts, generally in order to manage specific planning concerns and ensure continuity of operations at the start of a new fiscal year.) Current-Year Budget Authority Table A-2 displays the total LHHS current-year budget authority, by title. The amounts shown in this table reflect total budget authority available for obligation in the fiscal year, regardless of the year in which it was first appropriated. Amounts in the FY2018 enacted column include FY2018 budget authority provided by the FY2016 omnibus ( P.L. 114-113 ) and FY2017 omnibus ( P.L. 115-31 ). Similarly, the FY2019 President's budget, House committee, Senate floor, and enacted columns include FY2019 budget authority provided by the FY2017 and FY2018 omnibuses. (For a comparable table showing total budget authority in the bill, rather than current-year budget authority, see Table 2 in this report.) As mentioned above, it is current-year budget authority (adjusted for scorekeeping by CBO) that is used to determine compliance with discretionary spending allocations. Appendix B. Senate Floor Amendments Offered to H.R. 6157 While the Senate committee-reported version of the LHHS bill ( S. 3158 ) did not receive floor consideration, the text of this measure (with minor alterations) was included in a different appropriations vehicle ( H.R. 6157 ) that was amended on the floor and passed by the Senate on August 23, 2018. Prior to Senate floor consideration, H.R. 6157 contained the text of the FY2019 Department of Defense appropriations only. On the floor, that bill was amended into an omnibus measure that contained appropriations for both the Department of Defense and LHHS. The Senate proceeded to consider H.R. 6157 by unanimous consent on August 16, 2018. At that point, Senator Shelby (the chair of the Senate Appropriations Committee) offered an amendment in the nature of a substitute containing Department of Defense appropriations in Division A, and LHHS appropriations in Division B ( S.Amdt. 3695 ). On August 21, a cloture motion on the measure was presented in the Senate, but a subsequent unanimous consent agreement provided, among other matters, for the Senate to adopt a manager's package comprised of dozens of amendments to the substitute amendment, adopt the substitute amendment (as amended), and then proceed to a vote without the need to invoke cloture. The Senate passed the bill, as amended, by a vote of 85-7. Over the course of Senate floor consideration, a total of 32 LHHS amendments were offered to Division B. Twenty-nine of these were adopted by unanimous consent en bloc as part of the manager's package. Of the three that received recorded votes, two were adopted and one was rejected. These amendments and their dispositions are listed in Table B-1 below. ", "summary": "This report offers an overview of actions taken by Congress and the President to provide FY2019 appropriations for accounts funded by the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS) appropriations bill. This bill includes all accounts funded through the annual appropriations process at the Department of Labor (DOL) and Department of Education (ED). It also provides annual appropriations for most agencies within the Department of Health and Human Services (HHS), with certain exceptions (e.g., the Food and Drug Administration is funded via the Agriculture bill). Finally, the LHHS bill provides funds for more than a dozen related agencies, including the Social Security Administration (SSA). FY2019 Supplemental Appropriations for the Southern Border : During the 116 th Congress, on July 1, 2019, the President signed into law P.L. 116-26 , a supplemental appropriations act for FY2019 focusing primarily on the provision of humanitarian assistance and security at the southern border. The bill was passed by the House on June 27 and by the Senate on June 26. (An earlier version of the bill had passed the House on June 25. A related bill, S. 1900 , had passed the Senate on June 19; this bill was substantially similar to the final version of P.L. 116-26 .) As enacted, the bill contained nearly $2.9 billion in emergency-designated LHHS appropriations for the Refugee and Entrant Assistance account at HHS. The FY2019 enacted levels presented throughout this report are based on amounts provided by the FY2019 LHHS omnibus ( P.L. 115-245 , see below) and do not include these supplemental funds, which were provided in addition to the annual appropriations. FY2019 Supplemental Appropriations for Disaster Relief : During the 116 th Congress, on June 6, 2019, the President signed into law P.L. 116-20 , a supplemental appropriations act for FY2019 focusing primarily on certain expenses arising from hurricanes, typhoons, wildfires, earthquakes, tornadoes, floods, and other natural disasters or emergencies. The bill was passed by the House on June 3 and by the Senate on May 23. (An earlier version of the bill had passed the House on May 10.) As enacted, the bill included roughly $611 million in emergency-designated LHHS appropriations for accounts at DOL, HHS, and ED. The FY2019 enacted levels presented throughout this report are based on amounts provided by the FY2019 LHHS omnibus ( P.L. 115-245 ) and do not include these supplemental funds, which were provided in addition to the annual appropriations. FY201 9 LHHS Omnibus: During the 115 th Congress, on September 28, 2018, the President signed into law the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019 and Continuing Appropriations Act, 2019 ( H.R. 6157 , P.L. 115-245 ). This law contained full-year LHHS appropriations in Division B. This is the first occasion since the FY1997 appropriations cycle that full-year LHHS appropriations were enacted on or before the start of the fiscal year (October 1). The FY2019 LHHS omnibus contained discretionary appropriations totaling $189.4 billion. This amount is 1.5% more than FY2018 enacted levels and 8.9% more than the FY2019 President's budget request. The omnibus also provided $869.8 billion in mandatory funding, for a combined LHHS total of $1.059 trillion. The distribution of discretionary funding was as follows: DOL: $12.1 billion, 0.8% less than FY2018. HHS: $90.5 billion, 2.6% more than FY2018. ED: $71.4 billion, 0.8% more than FY2018. Related Agencies: $15.3 billion, 0.1% more than FY2018. FY2019 LHHS Senate Action: The Senate Appropriations Committee reported its version of the FY2018 LHHS appropriations bill on June 28, 2018, by a vote of 30-1 ( S. 3158 ). Instead of taking up the committee-reported vehicle, the Senate chose to take up a different appropriations vehicle ( H.R. 6157 ) and amend it to contain FY2019 LHHS appropriations as well. (Those LHHS appropriations, which were added as Division B of H.R. 6157 , were substantially the same as S. 3158 .) During floor consideration of H.R. 6157 , the Senate also adopted 31 amendments to the new LHHS division of the bill (see Appendix B for a summary of these amendments). The Senate passed an amended H.R. 6157 by a vote of 85-7 on August 23, 2018. The Senate-passed bill would have provided $189.4 billion in discretionary LHHS funds. This would have been 1.5% more than FY2018, and 8.9% more than the FY2019 President's request. In addition, the Senate-passed bill would have provided an estimated $869.8 billion in mandatory funding, for a combined total of $1.059 trillion for LHHS as a whole. The distribution of discretionary funding would have been as follows: DOL: $12.1 billion, 0.8% less than FY2018. HHS: $90.5 billion, 2.7% more than FY2018. ED: $71.4 billion, 0.8% more than FY2018. Related Agencies: $15.4 billion, 0.5% more than FY2018. FY2019 LHHS House Action: The House Appropriations Committee's version of the FY2019 LHHS appropriations bill was ordered reported by the full committee on July 11, 2018, by a vote of 30-22, and reported to the House on July 23 ( H.R. 6470 ). This bill would have provided $187.2 billion in discretionary LHHS funds, a 0.3% increase from FY2018 enacted levels. This amount would have been 7.6% more than the FY2019 President's request. In addition, the House committee bill would have provided an estimated $869.8 billion in mandatory funding, for a combined total of $1.057 trillion for LHHS as a whole. The distribution of discretionary funding would have been as follows: DOL: $11.9 billion, 2.4% less than FY2018. HHS: $89.3 billion, 1.3% more than FY2018. ED: $71.0 billion, 0.2% more than FY2018. Related Agencies: $15.0 billion, 2.2% less than FY2018. The House committee-reported version of the LHHS bill did not receive floor consideration. FY2019 President's Budget Request: On February 12, 2018, the Trump Administration released the FY2019 President's budget. The President requested $173.9 billion in discretionary funding for accounts funded by the LHHS bill, which would have been a decrease of 6.8% from FY2018 levels. In addition, the President requested $869.8 billion in annually appropriated mandatory funding, for a total of $1.044 trillion for LHHS as a whole. The distribution of discretionary funding was as follows: DOL: $10.9 billion, 11.1% less than FY2018. HHS: $86.7 billion, 1.6% less than FY2018. ED: $63.2 billion, 10.8% less than FY2018. Related Agencies: $13.2 billion, 14.0% less than FY2018.", "document_type": "crs"}
{"report": "The federal research and development (R&D) enterprise is a large and complex system, spanning the country, that includes government facilities and employees as well as federally funded work in industry, academia, and the nonprofit sector. In FY2019, federal agencies obligated an estimated $141.5 billion for R&D, including $39.6 billion for intramural R&D and $101.9 billion for extramural R&D. Its work is essential to U.S. economic prosperity, national security, health care, and other national priorities. It also plays a substantial direct role in the U.S. economy. Today, the operation of the system is being affected profoundly by the Coronavirus Disease 2019 (COVID-19) pandemic and the national response to it. This report provides an overview of how the nation's response to COVID-19 is affecting the federal R&D enterprise, how the federal government and others are addressing those effects, and issues that may arise as the situation develops. The scope of this report is limited to the effects of COVID-19 on federally funded R&D. It does not attempt to address effects on the broader U.S. R&D enterprise, the majority of which is funded by and conducted in the private sector. In addition, it does not attempt to address the federal R&D resources now being focused on understanding the science of COVID-19, developing tests and treatments, and otherwise applying R&D to address the pandemic. As the scientific, government, and public understanding of COVID-19 has grown, the national response has evolved, and it is likely to continue to evolve. The scope, scale, and dynamism of responses by the federal government, state and local governments, and the private sector are too great to catalog fully in this report. Rather, the report highlights key effects and issues of concern and provides examples of agency actions. Faced with the global spread of a contagious and deadly virus, U.S. institutions have taken a number of extraordinary measures. One key response has been social distancingâlimiting close contacts between individuals in order to reduce opportunities for transmission of the virus. This response has led to the closure of many businesses, schools, government offices, and other institutions. Where possible, these institutions have continued to operate via telework and e-learning. Research and development activities, however, often require physical access to unique facilities and equipment. As a result, many R&D organizationsâincluding federal facilities as well as industrial and academic laboratories supported by federal fundsâhave closed or curtailed operations. Closures of R&D facilities and social distancing requirements for researchers depend less on coordinated national policies than on the independent decisions of individual agencies, universities, and other institutions. For example, the National Aeronautics and Space Administration (NASA) decides the status of each of its centers separately, based on local conditions, according to a four-stage response framework. At the same time, some NASA centers may be at stage 3 (open to mission-essential personnel) while others are at stage 4 (closed except to protect life and critical infrastructure). During March 2020, NASA made the decision to move to stage 3 and subsequently from stage 3 to stage 4 at different times for different centers. Actions by state or local governments may be a factor in the decisions of some facilities. For example, shutdowns at Department of Energy (DOE) laboratories in California and Illinois followed statewide social distancing orders issued by the governors of those states. In some cases, specific R&D activities may be allowed to continue, despite closures, if an institution determines that the work is sufficiently important, that suspending it would be too costly or disruptive, or that it can be conducted remotely. For example, most employees of the National Institute of Standards and Technology (NIST) are on telework with limited access to the laboratories' physical facilities and only with supervisor approval. However, some NIST employees continue to work onsite to provide certain limited essential services, including the sale of Standard Reference Materials, calibration of precision instruments, distribution of time and frequency signals, and maintenance of the National Vulnerability Database. Many of these considerations for laboratories and other research facilities apply similarly to research conducted in the field. The policies guiding these decisions often use terms like essential or critical . In the NASA response framework, for example, mission-essential work includes work needed for the safety of human life or protection of property and \"work that must be performed to maintain mission/project operations or schedules and cannot be performed remotely/virtually.\" The Office of Management and Budget (OMB) has provided guidance to agencies about what travel (including travel to conduct R&D or to attend scientific meetings) should be considered mission-critical, based on a list of 11 factors, such as whether the travel is for activities essential to national security or whether it is time-sensitive. Presidential Policy Directive 21 (PPD-21) identifies the defense industrial base, including defense R&D, as one of 16 critical infrastructure sectors. A memorandum from the Under Secretary of Defense for Acquisition and Sustainment identifies development and testing by Department of Defense (DOD) contractors as an essential part of this critical infrastructure. Some state emergency orders have included exemptions for facilities and organizations that are considered critical infrastructure, suggesting that defense-related R&D may be allowed to continue even when other R&D is suspended. In general, however, state and local authoritiesânot federal agenciesâassume responsibility for adjudicating claims of criticality by private-sector organizations. In some cases, the determination of whether an R&D project should continue is based on how severely it would be affected by being suspended. For example, the relative positions of Earth and Mars in their respective orbits typically create a narrow launch window for NASA science missions to Mars. If a mission misses that window, it is likely to be delayed 26 months until the next launch window. While NASA has suspended a number of other major projects, it is continuing work on the Mars 2020 mission, scheduled for a launch window that opens in mid-July 2020. Other time-sensitive projects may include experiments that require continuity of data collection or that involve caring for live animals or maintaining cell cultures. University decisions about essential research functions may be informed by local conditions, federal funding agency directives, ethical considerations about the well-being of human subjects and animals in discontinued or scaled-back research, and each university's own risk management decisionmaking. Columbia University has defined essential functions to include, in addition to COVID-19 research and ongoing clinical trials, \"the maintenance of equipment, laboratory resources, critical animal resources, and cell lines.\" Johns Hopkins University has defined three tiers of its clinical research. The top, essential, tier includes trials of potential COVID-19 treatments and trials that address certain acute, life-threatening conditions such as Huntington's disease. Only trials in this tier can continue normally, including enrolling new patients. According to the Association of Public and Land-Grant Universities, research functions that some (but not necessarily all) universities have identified as essential include COVID-19 related research; activity that if discontinued would generate significant data and sample loss; activity that if discontinued would pose a safety hazard; activity that maintains critical equipment or core facilities; activity that maintains critical samples, reagents, and materials; activity that maintains animal populations; activity that maintains critically needed plant populations, tissue cultures, or other living organisms; activity in support of essential human subjects research; and clinical trial activity that if discontinued would adversely affect patient care. Not all time-sensitive research is necessarily considered essential, however. One example of an activity that is generally not being treated as essential is agricultural research that depends on an annual planting cycle or an animal maturation cycle. Whether researchers can continue to make progress on a particular R&D project remotely may also depend on the nature of the project. For example, researchers working remotely may be able to perform scientific computations, engage in modeling and simulation, design experimental hardware, analyze data already obtained, and prepare journal articles. In contrast, handling physical and biological samples, caring for laboratory animals, and building or operating specialized equipment likely require a researcher to be present in the laboratory. Research involving human subjects may be interrupted if those subjects are unavailable because of social distancing. In some cases, the extent to which research activities can continue may depend on the duration of the disruption; for example, analyzing data and preparing results for publication may no longer be an option once all existing data have been analyzed and written up. These factors may affect different disciplines differently; for example, research in mathematics, computer science, and theoretical physics may be more amenable to remote working than research in agricultural science, geology, or microbiology. Travel restrictions and social distancing requirements have also resulted in the cancellation of numerous scientific and technical conferences. The person-to-person interactionsâboth formal and informalâthat take place at such conferences are an instrumental mechanism for knowledge sharing, peer feedback, the ideation of new research, technology transfer, and interactions between researchers and agency program managers. Other mechanisms, such as scientific papers and electronic communications, also offer other important ways to exchange knowledge and share ideas, but they lack some of the interactive advantages of in-person conferences. Accordingly, the cancellation of scientific and technical conferences may have a detrimental impact on advances in knowledge and the benefits that emerge from such knowledge. These adverse effects apply both to federal scientists and engineers and to their counterparts in academia and the private sector who work on federally funded R&D. The impact of cancelling conferences may be particularly significant in certain fields. In computer science, for example, papers published in conference proceedings may be as influential as journal articles, to an extent that is rare in other fields. In some cases, conferences are continuing virtually with attempts to facilitate informal interactions that would normally take place in person. For example, the annual Conference on Retroviruses and Opportunistic Infections, originally scheduled to be held in Boston in March 2020, was converted to a virtual conference, with prerecorded presentations, live webcasts, and electronic poster presentations. In April 2020, the annual International Conference on Learning Representations (devoted to machine learning) plans to present papers using prerecorded videos and offer online opportunities to ask questions of speakers, see questions and answers from other participants, take part in discussion groups, meet with sponsors, and join groups for networking. Scientific and technical conferences are often run by professional societies and other organizations that rely on them for revenue. Cancellations are likely to result in financial losses for these organizations as expected revenues are not realized and cancellation costs associated with the use of hotels, meeting facilities, and other services are incurred. Such losses can be considerable for the organizations involved. The cancellation of the March 2020 annual meeting of the American Physical Society cost the society about $7 million, about 12% of its typical annual revenues; other societies have reported cancellation losses that wiped out essentially all of their financial reserves. Federal agencies also run scientific and technical conferences. While these conferences are not generally a significant source of agency revenues, some agencies are likely to face one-time cancellation costs that may be considerable. Researchers planning to attend conferences that have been cancelled may have incurred nonrefundable travel or lodging expenses. Some agencies have determined that awardees may charge these costs to their research awards despite regulations that would normally prohibit doing so. Some of the same considerations apply to other types of meetings. For example, some DOE scientific user facilities have cancelled or postponed their annual user meetings, limiting opportunities for facility outreach and user engagement. Even when R&D projects can continue, restrictions may affect efficiency or quality. According to one space policy expert, \"The enforced separation of people working on the same or related tasks will inject delays and miscommunications. It will certainly be an obstacle to schedules and success in activities like preparing for a launch or building an exploratory spacecraft.\" A U.S. researcher working remotely on a particle physics experiment has described the inefficiency of guiding an on-site technician through installing a piece of electronics: \"I've spent probably 3 hours over the past 24 on Skype with somebodyâ¦. He says something then points the webcam at what we're looking at, then we talk a little bit more.\" Others note the need to devote time to emergency planning. Institutions may incur unplanned expenses even for R&D that is not suspended. For example, they may need additional computing and networking equipment and services to accommodate researchers working remotely. Janitorial expenses may increase at facilities that remain open, if additional cleaning is required to guard against the spread of infection. Prices may increase for materials and equipment that are in short supply. R&D at institutions that remain open may also be affected by disruptions to the supply of materials and equipment or by closures at collaborating research institutions. Laboratories have reported shortages of widely used supplies, such as RNA-extraction kits, swabs, and personal protective equipment, that are in high demand for COVID-19 testing and patient care. Basic laboratory supplies such as reagents and pipette tips, when still available, may be on backorder or available only at multiples of the usual price. Depending on the duration of the pandemic, NASA's plans for a 2021 launch of the James Webb Space Telescope may be jeopardized. It is to be launched from a European Space Agency spaceport in Kourou, French Guiana, but France suspended launch campaigns from the Guiana Space Center on March 16, 2020, due to the COVID-19 pandemic. In some cases, agencies and researchers are shifting their research focus to COVID-19 related topics. The National Institutes of Health (NIH) has issued several funding opportunity announcements for researchers to submit competitive revisions or seek supplemental funding for existing projects, in order to redirect their research efforts to COVID-19. Other agencies that are typically less focused on health research have also sought to shift their R&D priorities. For example, light source user facilities operated by the DOE Office of Basic Energy Sciences are used for structural biology research in partnership with NIH and universities. According to DOE, these facilities are making \"every effort to give [COVID-19] researchers priority access\" and \"want to ensure they are doing everything possible to enable research into this virus and the search for an effective vaccine or other treatment.\" More generally, DOE wrote an open letter to the research community asking for \"ideas about how DOE and the National Labs might contribute resources to help address COVID-19 through science and technology efforts and collaborations.\" A newly formed consortium of agencies, universities, and companies is making supercomputing resources available \"to accelerate understanding of the COVID-19 virus and the development of treatments and vaccines.\" The NASA Earth Science program has provided guidance to \"investigators looking to reprioritize currently-funded efforts\" and noted that an existing funding opportunity could support \"investigations making innovative use of NASA satellite data to address â¦ impacts of the COVID-19 pandemic.\" NIST has announced a new grant opportunity under the Manufacturing USA National Emergency Assistance Program to support rapid, high-impact projects that support the nation's response to the COVID-19 pandemic. Up to $2 million is to be available to Manufacturing USA institutes under the program. Suspending research may result in additional costs for activities such as animal care, maintenance of cell cultures and biological samples, and safe storage of hazardous materials. Restarting research, when conditions permit, may also incur costs for staff time and supplies to bring experimental equipment back to operational status, reestablish laboratory animal populations, or replace masks and other personal protective equipment that was donated to hospitals and first responders during the pandemic. The extent to which these costs may be covered out of existing federal research awards is not yet clear. There may be future auditing issues for federally funded research that is redirected to address COVID-19, or for federally funded researchers who incurred costs to shut down and restart their projects or donated personal protective gear that had been paid for out of grant funds. Even if these changes had the support of the federal funding agency, the time-sensitive circumstances may mean that not all approvals were adequately documented to satisfy auditing requirements. The flexibilities provided to funding agencies in these circumstances (see \" Federal Actions to Date \" below) may not yet be aligned with corresponding flexibilities for accounting and auditing. There are specific challenges for shared university research infrastructure, including core facilitiesâspecialized laboratories with unique instruments and capabilities that provide services to an institution's researchers âas well as animal care facilities and clinical trial infrastructure. These facilities are typically supported mostly through user fees, often paid from federal funds that are supporting a user's research. They are widely used: one university reported that a majority of its grant-funded research in FY2019 relied in part on core facilities, while a majority of its NIH-funded research made use of shared animal care facilities. Much of this infrastructure has closed, creating uncertainty about funding for shutdown and restart costs as well as continuity of pay for technical staff. Some facilities remain open to support research that is continuing, but open facilities may face their own financial challenges in continuing to operate, as the fees that usually support them are likely to be reduced by the suspension of research by some of their users. Planned R&D may be delayed by interruptions in the development or manufacturing of major equipment. NASA, for example, has suspended work on the James Webb Space Telescope, which had been scheduled for launch in March 2021, and on the Space Launch System rocket and Orion crew capsule, needed for its plans to land humans on the Moon in 2024. Some federal laboratories engage in R&D activities under a Work for Others (WFO) or similar agreement. Using a WFO, a federal agency, federal laboratory, or company can pay to have R&D conducted by another federal laboratory. This often enables access to unique facilities, equipment, and personnel. While the cancellation or suspension of WFO projects due to the COVID-19 response may reduce costs to the sponsoring organization, it may simultaneously reduce revenue that would otherwise have supported the staff, facilities, and equipment of the laboratory that was to perform the work. According to the Government Accountability Office, from FY2008 through FY2012, DOE performed about $2 billion worth of R&D annually under WFO agreements, accounting for 13%-17% of total DOE laboratory revenues. Most of the work (88%) was performed for other federal agencies. NIST conducted $94.4 million in research, development and supporting services for other federal agencies in FY2019. NIST certifies and provides more than 1,300 Standard Reference Materials (SRM) that are used to perform instrument calibrations, verify the accuracy of specific measurements, and support the development of new measurement methods. NIST SRMs are used by industry, academia, and government to facilitate commerce and trade and advance R&D. NIST revenues from SRMs in FY2019 were $21.8 million. NIST also provides calibration and testing services for industry, academia, and government; its FY2019 revenues for these services were $33.5 million. As of the date of this report, NIST continues to provide SRM and calibration services, but it is unclear how long NIST will be able to provide these services if the pandemic continues for an extended period. As some agencies and researchers shift their R&D priorities to respond to the COVID-19 pandemic, the funding available for R&D on other topics may be reduced, at least in the near term. More generally, the federal funding needed for the national response to COVID-19 may reduce the overall federal resources available for R&D. While supplemental appropriations already enacted include additional funds for R&D and institutions that conduct R&D, increased federal spending to address the pandemic, coupled with decreased federal revenue associated with potential economic contraction, may lead to a future fiscal environment with constrained spending across the government. These outcomes may not be clear for some time, however, and may depend on a host of independent decisions by agencies and Congress. University research typically involves postdoctoral researchers (postdocs), graduate students, and sometimes undergraduate students in addition to faculty members. Even if the nature of a particular research project qualifies it to continue despite COVID-19, many universities are limiting the continued participation of postdocs and students. Cancelled or suspended research may be of particular concern to these groups. Continuing to work remotely may also be more challenging for students, postdocs, and early-career faculty who have families, as their children are more likely to be young than those of more senior researchers. Failing to complete a project on time may delay the completion of a degree or make it difficult to demonstrate research success when applying for a job or seeking tenure. Cancelled conferences are also a particular concern for postdocs, students, and other early-career researchers, who often rely on conferences to meet more senior scientists, present their work, and find jobs. In some circumstances, there may be uncertainty about continuity of pay for students employed as research assistants or teaching assistants. Because there are disparities between disciplines in the extent to which research can continue while working remotely, students and postdocs in different disciplines may find disparities in how their careers are affected. Disparities may also arise between students and postdocs whose experiments can be suspended and restarted and those whose experiments must simply be abandoned and begun afresh. To the extent that research disruptions, delayed graduation, or difficulty obtaining in-field employment discourage students and early-career researchers from continuing in their field of research, those outcomes could create challenges for the future science and engineering workforce. Continued travel restrictions may also affect the enrollment of foreign science and engineering students in U.S. universities in the 2020-2021 academic year. As well as potentially creating financial challenges for some universities, reduced international enrollment could have long-term workforce consequences, given that many foreign students in science and engineering remain in the United States after graduation. On March 9, 2020, OMB authorized federal agencies to provide certain short-term relief from administrative, financial management, and auditing requirements for grantees involved in research related to COVID-19. On March 18, four organizations representing universities and other research organizations wrote to OMB requesting the expansion of these flexibilities to all research grants. On March 19, OMB provided relief for \"an expanded scope of recipients affected by the loss of operational capacity and increased costs due to the COVID-19 crisis.\" The Appendix summarizes OMB's government-wide administrative actions, extensions of authorities, and guidance. It also provides a link to a compilation maintained by the Council on Governmental Relations (COGR) of guidance from federal agencies, academic institutions, and other organizations, as well as frequently asked questions about how federal agencies that fund R&D are implementing the OMB-directed flexibilities. Some agencies have compiled special guidance for awardees. For example, an NIH webpage provides information on changes to proposal submission and award management, updated policies on clinical trials and animal welfare, and revised procedures for peer review. The National Science Foundation (NSF) has issued guidance for contractors operating NSF-funded facilities. COGR has compiled links to such guidance, sorted by agency, along with links to institutional guidance from a long list of individual universities. Some agencies have extended the due dates for research proposals, announced that they will accommodate applications received late, or reduced the institutional approvals required for an initial proposal. While these accommodations provide additional flexibility for researchers, delays in receiving and acting on proposals may result in delays in issuing awards. Some agencies have announced accommodations for existing awardees, such as no-cost extensions of awards, extensions of financial and other reporting deadlines, changes to the allowability of cancellation fees and costs resulting from the pausing and restarting of research, and allowing the continued payment of salaries and benefits out of grant funds. While these steps give researchers additional flexibility, they may create challenges once research resumes. For example, grant funds that have been spent on cancellation fees, activities required for the suspension of research, or researcher salaries while research is suspended necessarily reduce the balance of funds subsequently available to complete a research project. No-cost extensions extend an award's completion date; they do not provide additional funds to cover costs incurred because of delays. Congress has already enacted some legislation with R&D-related funding and provisions in response to the COVID-19 pandemic. For example The Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), enacted on March 6, 2020, appropriated $836 million in supplemental funding for NIH, with additional transferrable amounts from other accounts. Some of the $3.1 billion appropriated to the Public Health and Social Services Emergency Fund may also be made available to the Biomedical Advanced Research and Development Authority for the development of COVID-19 medical countermeasures, such as therapies and vaccines. The Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ), enacted on March 27, 2020, appropriated more than $1 billion in supplemental funding for R&D. Most of this total was for research on COVID-19 itself, including $945 million for NIH, $415 million for research, development, testing, and evaluation (RDT&E) in the DOD Defense Health Program, and smaller sums for several other agencies. The act also provided funding to several R&D agencies to offset unanticipated costs arising from the pandemic. For example, NASA received $60 million to cover the costs of mission delays caused by center closures, while the U.S. Forest Service received $3 million to reestablish experiments affected by travel restrictions. Section 18004 of the CARES Act established a $14 billion Higher Education Emergency Relief Fund for colleges and universities. At least half of this total must be allocated for emergency financial aid grants to students. It is not yet clear how much, if any, will be available to address issues directly related to R&D. Section 3610 of the CARES Act authorized federal agencies to reimburse contractors for \"any paid leave, including sick leave, a contractor provides to keep its employees or subcontractors in a ready state\" when they are unable to work on-site due to facility closures and telework is not an option. Although this provision is not specifically directed at R&D, it could be significant for agencies such as DOE and NASA whose R&D facilities are staffed with numerous contractor employees. Section 12004 of the CARES Act authorized the Patent and Trademark Office to temporarily suspend, modify, adjust, or waive timing deadlines under the Patent Act and the Trademark Act during the COVID-19 emergency period. Section 13006 of the CARES Act gave DOD additional flexibility in the use of its other transaction authority for the development of prototypes related to COVID-19. The CARES Act provided NIST laboratories with $6 million in additional funding, including $5 million to support and accelerate measurement science related to viral testing and biomanufacturing; $50 million for the NIST Manufacturing Extension Partnership program to help companies across the country transform operations in support of COVID-19 related needs and to foster development of COVID-19 related supply chains; and $10 million for research related activities at Manufacturing USA's National Institute for Innovation in Manufacturing Biopharmaceuticals (NIIMBL). The CARES Act provided $2.25 million for the Environmental Protection Agency's Science and Technology account to prevent, prepare for, and respond to coronavirus, domestically or internationally, including $1.5 million for research on methods to reduce the risks from environmental transmission of coronavirus via contaminated surfaces or materials. The CARES Act provided NSF with $76 million \"to prevent, prepare for, and respond to coronavirus, domestically or internationally, including to fund research grants and other necessary expenses.\" The Senate Appropriations Committee summary notes that $75 million is to support NSF's RAPID grant mechanism, \"which will support near real-time research at the cellular, physiological, and ecological levels to better understand coronavirus,\" and $1 million is to assist in the administration of these grants. In the House, Speaker Pelosi has announced plans for a special committee to oversee the federal response to COVID-19, including the spending of supplemental funding provided under the above legislation. Several organizations from industry and academia have put forward policy recommendations to address R&D-related challenges resulting from COVID-19. Congress may also seek to take additional actions through legislation or oversight. The Commercial Spaceflight Federation, an industry group, has asked Congress for legislation directing the Internal Revenue Service to provide for immediate refunds of accumulated research and experimentation (R&E) tax credits. It argues that this would allow \"continued innovation through R&D reinvestment.\" In many cases, under current law, companies that qualify for this credit are unable to use the full amount immediately because of insufficient tax liability or other factors; unused amounts can be carried forward for up to 20 years. The credit only applies to R&D funded by a company itself, but companies that conduct R&D with federal funding often fund their own R&D as well. Organizations representing research universities, medical schools, and teaching hospitals have asked Congress, among other steps, to give research institutions receiving federal funding additional flexibility to cover researcher salaries and benefits while their institutions are affected, to provide $13 billion in additional extramural research funding, and to allow agencies to reprogram any supplemental funds that are not spent within a year for new awards. The latter proposal, they argued, \"could have a stimulative effect and help to address the nation's research competitiveness.\" Noting that \"many scientific societies have been and will continue to be adversely impacted by meeting and conference cancellations as a result of COVID-19,\" the Federation of American Societies for Experimental Biology has asked Congress to include measures such as zero-interest loans and grant to associations, nonprofit organizations, and other tax-exempt organizations in future economic stimulus packages and supplemental appropriations measures. While OMB has issued guidance to agencies regarding administrative flexibilities and other issues, as described above, agency implementation of that guidance has varied. Representatives of the Association of American Universities have indicated that more uniform implementation by federal research funding agencies would reduce administrative burdens and uncertainties for award recipients. Congress may consider a variety of other legislative and oversight actions, either in the near term while the pandemic continues or retrospectively to improve the response to future crises. These might include seeking a clearer understanding of how federally funded R&D is being affected by COVID-19, through hearings, mandates for agency reports, support for academic studies, or mandates for reports by organizations such as the Government Accountability Office or the National Academies of Sciences, Engineering, and Medicine; directing OMB, the Office of Science and Technology Policy, or an interagency task force to develop more uniform guidance on how to identify essential or critical R&D activities, with recommendations for implementing that guidance at government laboratories, universities, companies, and other institutions involved in intramural and extramural federally funded R&D; and establishing a post-pandemic task force on the federal R&D enterprise to examine lessons learned from the COVID-19 pandemic and recommend policy changes to improve the national response of the R&D community in the event of future pandemics. Over time, the near-term and long-term effects of COVID-19 on the nation's R&D enterprise will become more apparent. Congress may monitor these effects and develop a deeper understanding of their implications for the wide-ranging national policy objectives that motivate federal spending on R&Dâsuch as national security, economic growth and job creation, public health, transportation, and agricultureâas well as the implications for the U.S. science and engineering workforce and the education of the next generation of American scientists, engineers, and technicians. The effects of COVID-19 on federally funded R&D, as described in this report, may adversely affect the pace of R&D generally and the pace of the innovation that builds on it. The national and global economic consequences may have implications for economic growth, the workforce, the development of new products and services, and the competitiveness of companies and nations. The extent of these effects cannot yet be known and may not be fully understood for years. An optimist might hope for a silver lining. If the R&D community learns to overcome some of the challenges of remote working and travel restrictions, that might create future opportunities, after the COVID-19 pandemic is over, for increased workplace flexibilities and reduced travel expenses. The pandemic has also highlighted issues that Congress may seek to address in the future, such as additional R&D on cybersecurity for virtual collaboration and rural access to broadband internet for off-site work during emergencies. Office of Management and Budget Memoranda OMB has issued a number of memoranda related to the COVID-19 response. These memoranda are written broadly, not focused solely on federal R&D activities. Nevertheless, elements included in these memoranda have relevant information regarding the operation of the federal R&D enterprise. The memoranda are downloadable from the OMB website. As of the date of this report, COVID-19-related memoranda include M-20-19 Harnessing Technology to Support Mission Continuity (March 22, 2020) Directs agencies to utilize technology to the greatest extent practicable to support mission continuity. The memorandum addresses a set of frequently asked questions to provide additional guidance and assist the IT workforce as it addresses impacts of COVID-19. https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-19.pdf M-20-18 Managing Federal Contract Performance Issues Associated with the Novel Coronavirus (COVID-19) (March 20, 2020) Identifies certain agency actions to relieve short-term administrative, financial management, and audit requirements under 2 C.F.R. Â§200, Uniform Administrative Requirements, Cost P rinciples and Audit Requirements for Federal Awards , without compromising federal financial assistance accountability requirements. These include (1) flexibility with System for Award Management (SAM) registration/recertification for applicants, (2) waiver for Notice of Funding Opportunities (NOFOs) publication, (3) pre-award costs, (4) no-cost extensions on expiring awards, (5) abbreviated noncompetitive continuation requests, (6) expenditure of award funds for salaries and other project activities, (7) waivers from prior approval requirements, (8) exemption of certain procurement requirements, (9) extension of financial and other reporting, and (10) extension of Single Audit submission. In accordance with 2 CFR Â§200.102, \"Exceptions,\" OMB is allowing federal agencies to grant class exceptions in instances where the agency has determined that the purpose of the federal awards is to support the continued research and services necessary to carry out the emergency response related to COVID-19. The memorandum also reminds agencies of existing flexibility to issue exceptions on a case-by-case basis in accordance with 2 CFR Â§200.102, \"Exceptions.\" https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-18.pdf M-20-17 Administrative Relief for Recipients and Applicants of Federal Financial Assistance Directly Impacted by the Novel Coronavirus (COVID-19) Due to Loss of OperationsÂ (March 19, 2020) Identifies steps to help ensure safety while maintaining continued contract performance in support of agency missions, wherever possible and consistent with the precautions issued by the Centers for Disease Control and Prevention (CDC). Agencies are urged to work with their contractors, if they have not already, to evaluate and maximize telework for contractor employees, wherever possible; be flexible in providing extensions to performance dates if telework or other flexible work solutions, such as virtual work environments, are not possible, or if a contractor is unable to perform in a timely manner due to quarantining, social distancing, or other COVID-19 related interruptions; take into consideration whether it is beneficial to keep skilled professionals or key personnel in a mobile-ready state for activities the agency deems critical to national security or other high priorities; consider whether contracts that possess capabilities for addressing impending requirements such as security, logistics, or other functions may be retooled for pandemic response consistent with the scope of the contract; and leverage the special emergency procurement authorities authorized in connection with the President's emergency declaration under Section 501(b) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. Â§Â§5121-5207 (the Stafford Act). The memorandum also provides answers to a set of frequently asked questions intended to assist the acquisition workforce as it addresses impacts due to COVID-19. https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-17.pdf M-20-16 Federal Agency Operational Alignment to Slow the Spread of Coronavirus COVID-19 (March 17, 2020) Provided agencies with initial guidance, consistent with the President's Coronavirus Guidelines for America, directing agencies to take appropriate steps to prioritize all resources to slow the transmission of COVID-19, while ensuring mission-critical activities continue. The memorandum further required all agencies, within 48 hours, to review, modify, and begin implementing risk-based policies and procedures based on CDC guidance and legal advice, as necessary to safeguard the health and safety of federal workplaces to restrict the transmission of COVID-19. https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-16.pdf M-20-15 Updated Guidance for the National Capital Region on Telework Flexibilities in Response to Coronavirus (March 15, 2020) Directs agencies to offer maximum telework flexibilities to all current telework-eligible employees, consistent with operational needs of the departments and agencies as determined by their heads, as well as to use all existing authorities to offer telework to additional employees, to the extent their work could be telework enabled. https://www.whitehouse.gov/wp-content/uploads/2020/03/M20-15-Telework-Guidance-OMB.pdf M-20-14 Updated Federal Travel Guidance in Response to Coronavirus (March 14, 2020) Advises that \"only mission-critical travel is recommended at this time.\" The memorandum also authorizes executive branch agency heads to determine what travel meets the mission-critical threshold and provides a list of factors to be considered in this determination. https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-14-travel-guidance-OMB-1.pdf M-20-13 Updated Guidance on Telework Flexibilities in Response to Coronavirus (March 12, 2020) Encourages agencies to maximize telework flexibilities (1) to eligible workers within those populations that the CDC identified as being at higher risk for serious complications from COVID-19 (e.g., older adults and individuals who have chronic health conditions, such as high blood pressure, heart disease, diabetes, lung disease, compromised immune systems); and (2) to CDC-identified special populations including pregnant women. Further directs that agencies do not need to require certification by a medical professional, and may accept self-identification by employees in one of these populations. The memorandum also encourages agencies to consult with local public health officials and the CDC about whether to extend telework flexibilities more broadly to all eligible teleworkers in areas in which either such local officials or the CDC have determined there is community spread. Agencies are also encouraged to extend telework flexibilities more broadly to accommodate state and local responses to the outbreak, including, but not limited to, school closures. Agencies are encouraged to consider the mission-critical nature of employees' work in determining telework and leave decisions. https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-13.pdf M-20-11 Administrative Relief for Recipients and Applicants of Federal Financial Assistance Directly Impacted by the Novel Coronavirus (COVID-19) (March 9, 2020) Identifies and authorizes agency actions to relieve short-term administrative, financial management and audit requirements under 2 C.F.R. Â§200, Uniform Administrative Requirements, Cost P rinciples and Audit Requirements for Federal Awards , without compromising federal financial assistance accountability requirements. Notes that OMB is allowing federal agencies to grant class exceptions in instances where the agency has determined that the purpose of the federal awards is to support the continued research and services necessary to carry out the emergency response related to COVID-19. The memorandum also notes agencies' existing flexibility to issue exceptions on a case-by-case basis in accordance with 2 C.F.R. Â§200.102, \"Exceptions.\" https://www.whitehouse.gov/wp-content/uploads/2020/03/M-20-11.pdf Compilation of Other Resources The Council on Governmental Relations maintains an online compilation of guidance from federal agencies, academic institutions, and other organizations, as well as responses to frequently asked questions about how federal agencies that fund R&D are implementing the OMB-directed flexibilities. See \"Institutional and Agency Responses to COVID-19 and Additional Resources,\" https://www.cogr.edu/institutional-and-agency-responses-covid-19-and-additional-resources .", "summary": "The federal research and development (R&D) enterprise is a large and complex system that includes government facilities and employees as well as federally funded work in industry, academia, and the nonprofit sector. The nation's response to the Coronavirus Disease 2019 (COVID-19) pandemic is affecting the federal R&D enterprise, and the federal government and others are trying to address those effects. A number of congressional and other policy issues may arise as the situation develops. Implementation of social distancing guidelines had led many laboratories and R&D projects to close. Where possible, researchers have continued to work remotely, but R&D often requires physical access to unique facilities and equipment. Institutions have faced decisions about which projectsâsuch as research on COVID-19 itselfâare sufficiently essential that they should continue. Many scientific and technical conferences have also been cancelled, with consequences for the sharing and advancement of knowledge and for the conference organizers, which are now often faced with substantial cancellation costs. In some cases, conferences are continuing virtually. Even for continuing R&D projects, there may be efficiency and quality impacts, additional costs, and challenges such as the closure of suppliers and service providers. Some resources dedicated to ongoing R&D are also being redirected toward work focused on COVID-19. Other potential effects of the pandemic include unplanned costs for the shutdown and restarting of R&D projects that are suspended, delays in the availability of major new R&D equipment, the loss of anticipated revenues by some federal R&D agencies, uncertainty about the future stability of federal R&D funding if COVID-19 affects the government's fiscal situation, and impacts on the graduation schedules and career prospects of students, postdoctoral researchers, and early-career faculty whose research is interrupted. Federal actions to date to address these challenges include a wide variety of government-wide and agency-specific policy changes to accommodate the R&D community's needs and provide agencies with additional flexibilities, as well as legislation enacted by Congress to provide supplemental funding for R&D and for R&D organizations affected by closures, and to provide new authorities to agencies. Groups representing R&D organizations in industry and academia have proposed a variety of additional steps, including further increases in funding for the federal R&D agencies, more flexibility in the expenses that can be paid using federal R&D awards, and other support for R&D organizations in the form of loans, grants, and tax changes. As the near-term and long-term effects of COVID-19 on the nation's R&D enterprise become more apparent, Congress may seek to monitor those effects, develop a deeper understanding of their implications, and consider whether additional legislative actions are necessary.", "document_type": "crs"}
{"report": "Dams may provide flood control, hydroelectric power, recreation, navigation, and water supply. Dams also entail financial costs for construction, operation and maintenance (O&M), rehabilitation (i.e., bringing a dam up to current safety standards), and repair, and they often result in environmental c hange (e.g., alteration of riverine habitat). Federal government agencies reported owning 3% of the more than 90,000 dams in the National Inventory of Dams (NID), including some of the country's largest dams (e.g., the Bureau of Reclamation's Hoover Dam in Nevada is 730 feet tall with storage capacity of over 30 million acre-feet of water). Most dams in the United States are owned by private entities, state or local governments, or public utilities. Dams may pose a potential safety threat to populations living downstream of dams and populations surrounding associated reservoirs. As dams age, they can deteriorate, which also may pose a potential safety threat. The risks of dam deterioration may be amplified by lack of maintenance, misoperation, development in surrounding areas, natural hazards (e.g., weather and seismic activity), and security threats. Structural failure of dams may threaten public safety, local and regional economies, and the environment, as well as cause the loss of services provided by a dam. In recent years, several dam safety incidents have highlighted the public safety risks posed by the failure of dams and related facilities. From 2015 to 2018, over 100 dams breached in North Carolina and South Carolina due to record flooding. In 2017, the near failure of Oroville Dam's spillway in California resulted in a precautionary evacuation of approximately 200,000 people and more than $1.1 billion in emergency response and repair. In 2018, California began to expedite inspections of dams and associated spillway structures. Congress has expressed an interest in dam safety over several decades, often prompted by destructive events. Dam failures in the 1970s resulting in the loss of life and billions of dollars in property damage prompted Congress and the executive branch to establish the NID, the National Dam Safety Program (NDSP), and other federal activities related to dam safety. Following terrorist attacks on September 11, 2001, the federal government focused on dam security and the potential for acts of terrorism at major dam sites. As dams age and the population density near many dams increases, attention has turned to mitigating dam failure through dam inspection programs, rehabilitation, and repair, in addition to preventing and preparing for emergencies. This report provides an overview of dam safety and associated activities in the United States, highlighting the federal role in dam safety. The primary federal agencies involved in these activities include the Federal Emergency Management Agency (FEMA), the U.S. Army Corps of Engineers (USACE), and the Bureau of Reclamation (Reclamation). The report also discusses potential issues for Congress, such as the federal role for nonfederal dam safety; federal funding for dam safety programs, rehabilitation, and repair; and public awareness of dam safety risks. The report does not discuss in detail emergency response from a dam incident, dam building and removal policies, or state dam safety programs. Dam safety generally focuses on preventing dam failure and incidentsâepisodes that, without intervention, likely would have resulted in dam failure. Challenges to dam safety include aging and inadequately constructed dams, frequent or severe floods (for instance, due to climate change), misoperation of dams, and dam security. The risks associated with dam misoperation and failure also may increase as populations and development encroach upstream and downstream of some dams. Safe operation and proper maintenance of dams and associated structures is fundamental for dam safety. In addition, routine inspections by dam owners and regulators determine a dam's hazard potential (see \" Hazard Potential \" below), condition (see \" Condition Assessment \" below), and possible needs for rehabilitation and repair. The NID, a database of dams in the United States, is maintained by USACE. For the purposes of inclusion in the NID, a dam is defined as any artificial barrier that has the ability to impound water, wastewater, or any liquid-borne material, for the purpose of storage or control of water that (1) is at least 25 feet in height with a storage capacity of more than 15 acre-feet, (2) is greater than 6 feet in height with a storage capacity of at least 50 acre-feet, or (3) poses a significant threat to human life or property should it fail (i.e., high or significant hazard dams). Thousands of dams do not meet these criteria; therefore, they are not included in the NID. The most common type of dam is an earthen dam (see Figure 1 ), which is made from natural soil or rock or from mining waste materials. Other dams include concrete dams, tailings dams (i.e., dams that store mining byproducts), overflow dams (i.e., dams regulating downstream flow), and dikes (i.e., dams constructed at a low point of a reservoir of water). This report does not cover levees, which are manmade structures designed to control water movement along a landscape. The nation's dams were constructed for various purposes: recreation, flood control, ecological (e.g., fisheries management), irrigation and water supply, hydroelectric, mining, navigation, and others (see Figure 2 ). Dams may serve multiple purposes. Dams were built to engineering and construction standards and regulations corresponding to the time of their construction. Over half of the dams with age reported in the NID were built over fifty years ago. Some dams, including older dams, may not meet current dam safety standards, which have evolved as scientific data and engineering have improved over time. Dam failures and incidentsâepisodes that, without intervention, likely would have resulted in dam failureâmay occur for various reasons. Potential causes include floods that may exceed design capacity; faulty design or construction; misoperation or inadequate operation plans; overtopping, with water spilling over the top of the dam; foundation defects, including settlement and slope instability; cracking caused by movements, including seismic activity; inadequate maintenance and upkeep; and piping, when seepage through a dam forms holes in the dam (see Figure 3 ). Engineers and organizations have documented dam failure in an ad hoc manner for decades. Some report over 1,600 dam failures resulting in approximately 3,500 casualties in the United States since the middle of the 19 th century, although these numbers are difficult to confirm. Many failures are of spillways and small dams, which may result in limited flooding and downstream impact compared to large dam failures. Flooding that occurs when a dam is breached may not result in life safety consequences or significant property damage. Still, some dam failures have resulted in notable disasters in the United States. Between 2000 and 2019, states reported 294 failures and 537 nonfailure dam safety incidents. Recent eventsâincluding the evacuation of approximately 200,000 people in California in 2017 due to structural deficiencies of the spillway at Oroville Damâhave led to increased attention on the condition of dams and the federal role in dam safety. From 2015 to 2018, extreme storms (including Hurricane Matthew) and subsequent flooding resulted in over 100 dam breaches in North Carolina and South Carolina. Floods resulting from hurricanes in 2017 also filled reservoirs of dams to record levels in some regions: for example, USACE's Addicks and Barker Dams in the Houston, TX, area; the Puerto Rico Electric Power Authority's Guajataca Dam in Puerto Rico; and USACE's Herbert Hoover Dike in Florida. The March 2006 failure of the private Kaloko Dam in Hawaii killed seven people, and the 2003 failure of the Upper Peninsula Power Company's Silver Lake Dam in Michigan caused more than $100 million in damage. Federal guidelines set out a hazard potential rating to quantify the potential harm associated with a dam's failure or misoperation. As described in Table 1 , the three hazard ratings (low, significant, and high) do not indicate the likelihood of failure; instead, the ratings reflect the amount and type of damage that a failure would cause. Figure 4 depicts the number of dams listed in the NID classified as high hazard in each state; 65% of dams in the NID are classified as low hazard. From 2000 to 2018, thousands of dams were reclassified increasing the number of high hazard dams from 9,921 to 15,629. According to FEMA, the primary factor increasing dams' hazard potential is hazard creep âdevelopment upstream and downstream of a dam, especially in the dam failure inundation zone (i.e., downstream areas that would be inundated by water from a possible dam failure). Reclassification from low hazard potential to high or significant hazard potential may trigger more stringent requirements by regulatory agencies, such as increased spillway capacity, structural improvements, more frequent inspections, and creating or updating an emergency action plan (EAP). Some of these requirements may be process and procedure based, and others may require structural changes for existing facilities. The NID includes condition assessmentsâassessments of relative dam deficiencies determined from inspectionsâas reported by federal and state agencies (see Table 2 ). Of the 15,629 high hazard potential dams in the 2018 NID, 63% had satisfactory or fair condition assessment, 15% had a poor or unsatisfactory condition assessment, and 22% were not rated. For dams rated as poor and unsatisfactory, federal agencies and state regulatory agencies may take actions to reduce risk, such as reservoir drawdowns, and may convey updated risk and response procedures to stakeholders. In the context of dam safety, risk is comprised of three parts: the likelihood of a triggering event (e.g., flood or earthquake), the likelihood of a dam safety deficiency resulting in adverse structural response (e.g., dam failure or spillway damage), and the magnitude of consequences resulting from the adverse event (e.g., loss of life or economic damages). Preventing dam failure involves proper location, design, and construction of structures, and regular technical inspections, O&M, and rehabilitation and repair of existing structures. Preparing and responding to dam safety concerns may involve community development planning, emergency preparation, and stakeholder awareness. Dam safety policies may address risk by focusing on preventing dam failure while preparing for the consequences if failure occurs. Rehabilitation typically consists of bringing a dam up to current safety standards (e.g., increasing spillway capacity, installing modern gates, addressing major structural deficiencies), and repair addresses damage to a structure. Rehabilitation and repair are different from day-to-day O&M. According to a 2019 study by ASDSO, the combined total cost to rehabilitate the nonfederal and federal dams in the NID would exceed $70 billion. The study projected that the cost to rehabilitate high hazard potential dams in the NID would be approximately $3 billion for federal dams and $19 billion for nonfederal dams. Some stakeholders project that funding requirements for dam safety rehabilitation and repair will continue to grow as infrastructure ages, risk awareness progresses, and design standards evolve. Dam safety processes and productsâsuch as emergency action plans (EAPs) and inundation mapsâmay support informed decisionmaking to reduce the risk and consequences of dam failures and incidents. An EAP is a formal document that identifies potential emergency conditions at a dam and specifies preplanned actions to minimize property damage and loss of life. EAPs identify the actions and responsibilities of different parties in the event of an emergency, such as the procedures to issue early warning and notification messages to emergency management authorities. EAPs also contain inundation maps to show emergency management authorities the critical areas for action in case of an emergency (see Figure 5 for a map illustration of potential inundation areas due to a dam failure). Many agencies that are responsible for dam oversight require or encourage dam owners to develop EAPs and often oversee emergency response simulations (i.e., tabletop exercises) and field exercises. Requirements for EAPs often focus on high hazard dams. In 2018, the percentage of high hazard potential dams in the United States with EAPs was 74% for federally owned dams and 80% for state-regulated dams. Federal agencies have developed tools to assist dam owners and regulators, along with emergency managers and communities, to prepare, monitor, and respond to dam failures and incidents. FEMA's RiskMAP program provides flood maps, tools to assess the risk from flooding, and planning and outreach support to communities for flood risk mitigation. A RiskMAP project may incorporate the potential risk of dam failure or incidents. FEMA's Decision Support System for Water Infrastructure Security (DSS-WISE) Lite allows states to conduct dam failure simulations and human consequence assessments. Using DSS-WISE Lite, FEMA conducted emergency dam-break flood simulation and inundation mapping of 36 dams in Puerto Rico during the response to Hurricane Maria in 2017. DamWatch is a web-based monitoring and informational tool for 11,800 nonfederal flood control dams built with assistance from the U.S. Department of Agriculture. When these dams experience a critical event (e.g., threatening storm systems), essential personnel are alerted via an electronic medium and can implement EAPs if necessary. The U.S. Geological Survey's ShakeCast is a post-earthquake awareness application that notifies responsible parties of dams about the occurrence of a potentially damaging earthquake and its potential impact at dam locations. The responsible parties may use the information to prioritize response, inspection, rehabilitation, and repair of potentially affected dams. In addition to owning dams, the federal government is involved in multiple areas of dam safety through legislative and executive actions. Following USACE's publication of the NID in 1975 as authorized by P.L. 92-367, the Interagency Committee on Dam Safetyâestablished by President Jimmy Carter through Executive Order 12148âreleased safety guidelines for dams regulated by federal agencies in 1979. In 1996, the National Dam Safety Program Act (Section 215 of the Water Resources Development Act of 1996; P.L. 104-303 ) established the National Dam Safety Program, the nation's principal dam safety program, under the direction of FEMA. Congress has reauthorized the NDSP four times and enacted other dam safety programs and activities related to federal and nonfederal dams. A chronology of selected federal dam safety actions is provided in the box below. The NDSP is a federal program established to facilitate collaboration among the various federal agencies, states, and owners with responsibility for dam safety. The NDSP also provides dam safety information resources and training, conducts research and outreach, and supports state dam safety programs with grant assistance. The NDSP does not mandate uniform standards across dam safety programs. Figure 6 shows authorization of appropriations levels for the NDSP and appropriations for the program, including grant funding distributed to states. The National Dam Safety Review Board (NDSRB) advises FEMA's director on dam safety issues, including the allocation of grants to state dam safety programs. The board consists of five representatives appointed from federal agencies, five state dam safety officials, and one representative from the private sector. The Interagency Committee on Dam Safety (ICODS) serves as a forum for coordination of federal efforts to promote dam safety. ICODS is chaired by FEMA and includes representatives from the Federal Energy Regulatory Commission (FERC); the International Boundary and Water Commission; the Nuclear Regulatory Commission (NRC); the Tennessee Valley Authority; and the Departments of Agriculture, Defense, Energy, the Interior (DOI), and Labor (DOL). Every state (except Alabama) has established a regulatory program for dam safety, as has Puerto Rico. Collectively, these programs have regulatory authority for 69% of the NID dams. State dam safety programs typically include safety evaluations of existing dams, review of plans and specifications for dam construction and major repair work, periodic inspections of construction work on new and existing dams, reviews and approval of EAPs, and activities with local officials and dam owners for emergency preparedness. Funding levels and a lack of state statutory authorities may limit the activities of some state dam safety programs. For example, the Model State Dam Safety Program , a guideline for developing state dam safety programs, recommends one full-time employee (FTE) for every 20 dams regulated by the agency. As of 2019, one stateâCaliforniaâmeets this target, with 75 employees and 1,246 regulated dams. Most state dam safety programs reportedly have from two to seven FTEs. In addition, some statesâAlabama, Florida, Indiana, Iowa, Kentucky, Vermont, and Wyomingâdo not have the authority to require dam owners of high hazard dams to develop EAPs. The National Dam Safety Program Act, as amended (Section 215 of the Water Resources Development Act of 1996; P.L. 104-303 ; 33 U.S.C. Â§Â§467f et seq.), authorizes state assistance programs under the NDSP. Two such programs are discussed below (see \" FEMA High Hazard Dam Rehabilitation Grant Program \" for information about FEMA's dam rehabilitation program initiated in FY2019). Grant A ssistance to State Dam Safety Programs . States working toward or meeting minimal requirements as established by the National Dam Safety Program Act are eligible for assistance grants. The objective of these grants is to improve state programs using the Model State Dam Safety Program as a guide. Grant assistance is allocated to state programs via a formula: one-third of funds are distributed equally among states participating in the matching grant program and two-thirds of funds are distributed in proportion to the number of state-regulated dams in the NID for each participating state. Grant funding may be used for training, dam inspections, dam safety awareness workshops and outreach materials, identification of dams in need of repair or removal, development and testing of EAPs, permitting activities, and improved coordination with state emergency preparedness officials. For some state dam safety programs, the grant funds support the salaries of FTEs that conduct these activities. This money is not available for rehabilitation and repair activities. In FY2019, FEMA distributed $6.8 million in dam safety program grants to 49 states and Puerto Rico (ranging from $48,000 to $465,000 per state). Training for State Inspectors . At the request of states, FEMA provides technical training to dam safety inspectors. The training program is available to all states by request, regardless of state participation in the matching grant program. At the end of each odd-numbered fiscal year, FEMA is to submit to Congress a report describing the NDSP's status, federal agencies' progress at implementing the Federal Guidelines for Dam Safety , progress achieved in dam safety by states participating in the program, and any recommendations for legislation or other actions (33 U.S.C. Â§â¯467h). Federal agencies and states provide FEMA with annual program performance assessments on key metrics such as inspections, rehabilitation and repair activities, EAPs, staffing, and budgets. USACE provides summaries and analysis of NID data (e.g., inspections and EAPs) to FEMA. Some of the metrics for the dam safety program, such as the percentage of state-regulated high hazard potential dams with EAPs and condition assessments, have shown improvement. The percentage of these dams with EAPs increased from 35% in 1999 to 80% in 2018, and condition assessments of these dams increased from 41% in 2009 to 85% in 2018. The percentage of state-regulated high hazard potential dams inspected has remained relatively stable during the same periodâbetween 85% to 100% dams inspected based on inspection schedules. The major federal water resource management agencies, USACE and Reclamation, own 42% of federal dams, including many large dams ( Figure 7 ). The remaining federal dams typically are smaller dams owned by other agencies, including land management agencies (e.g., Fish and Wildlife Service and the Forest Service), the Department of Defense, and the Bureau of Indian Affairs, among others. The federal government is responsible for maintaining dam safety of federally owned dams by performing maintenance, inspections, rehabilitation, and repair work. No single agency regulates all federally owned dams; rather, each federal dam is regulated according to the policies and guidance of the individual federal agency that owns the dam. The Federal Guidelines for Dam Safety provides basic guidance for federal agencies' dam safety programs. The Federal Guidelines for Dam Safety recommends that agencies formally inspect each dam that they own at least once every five years; however, some agencies require more frequent inspections and base the frequency of inspections on the dam's hazard potential. Inspections may result in an update of the dam's hazard potential and condition assessment (see Figure 8 for the status of hazard potential and condition assessments of federal dams). Inspections typically are funded through agency O&M budgets. After identifying dam safety deficiencies, federal agencies may undertake risk reduction measures or rehabilitation and repair activities. Agencies may not have funding available to immediately undertake all nonurgent rehabilitation and repair; rather, they generally prioritize their rehabilitation and repair investments based on various forms of assessment and schedule these activities in conjunction with the budget process. At some agencies, dam rehabilitation and repair needs must compete for funding with other construction projects (e.g., buildings and levees). Federal agencies traditionally approached dam safety through a deterministic, standards-based approach by mainly considering structural integrity to withstand maximum probable floods and maximum credible earthquakes. Many agencies with large dam portfolios (e.g., Reclamation and USACE) have since moved from this solely standards-based approach for their dam safety programs to a portfolio risk management approach to dam safety, including evaluating all modes of failure (e.g., seepage of water and sediment through a dam) and prioritizing rehabilitation and repair efforts. The following sections provide more information on specific policies at these agencies. USACE implements a dam safety program consisting of inspections and risk analyses for USACE operated dams, and performs risk reduction measures or project modifications to address dam safety risks. USACE uses a Dam Safety Action Classification System (DSAC) based on the probability of failure and incremental risk (see Table 3 ). Congress provides funding for USACE's various dam safety activities through the Investigations, O&M, and Construction accounts. The Inventory of Dams line item in the Investigations account provides funding for the maintenance and publication of the NID. The O&M account provides funding for routine O&M of USACE dams and for NDSP activities, including assessments of USACE dams. The Construction account provides funding for nonroutine dam safety activities (e.g., dam safety rehabilitation and repair modifications). The Dam Safety and Seepage/Stability Correction Program conducts nonroutine dam safety evaluations and studies of extremely high-risk or very high-risk dams (DSAC 1 and DSAC 2). Under the program, an issue evaluation study may evaluate high-risk dams, dam safety incidents, and unsatisfactory performance, and then provide determinations for modification or reclassification. If recommended, a dam safety modification study would further investigate dam deficiencies and propose alternatives to reduce risks to tolerable levels; a dam safety modification report is issued if USACE recommends a modification. USACE funds construction of dam safety modifications through project-specific line items in the Construction account. Modification of USACE-constructed dams for safety purposes may be cost shared with nonfederal project sponsors using two cost-sharing authorities: major rehabilitation and dam safety assurance. USACE schedules modifications under all of these programs based on funding availability. Major rehabilitation is for significant, costly, one-time structural rehabilitation or major replacement work. Major rehabilitation applies to dam safety repairs associated with typical degradation of dams over time. Nonfederal sponsors are to pay the standard cost share based on authorized purposes. USACE does not provide support under major rehabilitation for facilities that were turned over to local project sponsors for O&M after they were constructed by USACE. Dam safety assurance cost sharing may apply to all dams built by USACE, regardless of the entity performing O&M. Modifications are based on new hydrologic or seismic data or changes in state-of-the-art design or construction criteria that are deemed necessary for safety purposes. Application of the authority provided by Section 1203 of the Water Resources Development Act of 1986 ( P.L. 99-662 ; 33 U.S.C. Â§467n) reduces a sponsor's responsibility to 15% of its agreed nonfederal cost share. In 2015, the Government Accountability Office (GAO) examined cost sharing for USACE dam safety repairs. GAO recommended policy clarification for the usage of the \"state-of-the-art\" provision and improved communication with nonfederal sponsors. Section 1139 of the Water Infrastructure Improvements for the Nation Act (WIIN Act; P.L. 114-322 ) mandated the issuance of guidance on the state-of-the-art provision, and in March 2019, USACE began to implement a new policy that allows for the state-of-the-art provision across its dam portfolio. Prior to the guidance, USACE applied the authority in January 2019 to lower the nonfederal cost share of repairing the Harland County Dam in Nebraska by approximately $2.1 million (about half of the original amount owed). Recent USACE dam safety construction projects have had costs ranging from $10 million to $1.8 billion; most cost in the hundreds of millions of dollars. In FY2018, USACE funded $268 million in work on 10 dam safety construction projects at DSAC 1 and DSAC 2 dams, and funded dam safety studies at 39 projects on DSAC 2 and DSAC 3 dams. In FY2019, USACE estimated a backlog of $20 billion to address DSAC 1 and DSAC 2 dam safety concerns. Reclamation's dam safety program, authorized by Reclamation Safety of Dams Act of 1978, as amended ( P.L. 95-578 ; 43 U.S.C. 506 et seq.), provides for inspection and repairs to qualifying projects at Reclamation dams. Reclamation conducts dam safety inspections through the Safety Evaluation of Existing Dams (SEED) program using Dam Safety Priority Ratings (DSPR; see Table 3 ). Corrective actions, if necessary, are carried out through the Initiate Safety of Dams Corrective Action (ISCA) program. With ISCA appropriations, Reclamation funds modifications on priority structures based on an evolving identification of risks and needs. The Reclamation Safety of Dams Act Amendments of 1984 ( P.L. 98-404 ) requires a 15% cost share from sponsors for dam safety modifications when modifications are based on new hydrologic or seismic data or changes in state-of-the-art design or construction criteria that are deemed necessary for safety purposes. In 2015, P.L. 114-113 amended the Reclamation Safety of Dams Act to increase Reclamation's authority, before needing congressional authorization to approve a modification project, from $1.25 million to $20 million. The act also authorized the Secretary of the Interior to develop additional project benefits, through the construction of new or supplementary works on a project in conjunction with dam safety modifications, if such additional benefits are deemed necessary and in the interests of the United States and the project. Nonfederal and federal funding participants must agree to a cost share related to the additional project benefits. In FY2019, Congress appropriated $71 million for ISCA, which funded 18 dam safety modifications. FY2019 funding also included $20.3 million for SEED and $1.3 million for the Dam Safety Program. As of FY2019, Reclamation estimated that the current portfolio of dam safety modification projects through FY2030 would cost between $1.4 billion to $1.8 billion. The Commissioner of Reclamation also serves as the Department of the Interior's (DOI's) coordinator for dam safety and advises the Secretary of the Interior on program development and operation of the dam safety programs within DOI. In this role, Reclamation provides training to other DOI agencies with dam safety programs and responsibilities, and Reclamation's dam safety officer represents DOI on the ICODS. Some federal agencies are involved in dam safety activities of nonfederal dams; these activities may be regulatory or consist of voluntary coordination (see box on \"Nonfederal Dams on Federal Lands\"). Congress has enacted legislation to regulate hydropower projects, certain mining activities, and nuclear facilities and materials. These largely nonfederal facilities and activities may utilize dams for certain purposes. States also may have jurisdiction or ownership over these facilities, activities, and associated dams, and therefore may oversee dam safety in coordination with applicable federal regulations. Under the Federal Power Act (16 U.S.C. Â§Â§791a-828c), FERC has the authority to issue licenses for the construction and operation of hydroelectric projects, among other things. Many of these projects involve dams, some of which may be owned by a state or local government. According to FERC, approximately 3,036 dams are regulated by FERC's dam safety program. Of these, 1,374 are nonfederal dams listed in the 2018 NID; 791 nonfederal dams are classified as high hazard, with 144 in California, 87 in New York, and 72 in Michigan. Before FERC can issue a license, FERC reviews and approves the designs and specifications of dams and other structures for the hydropower project. Each license is for a stated number of years (generally 30-50 years), and must undergo a relicensing process at the end of the license. Along with nonfederal hydropower licensing, FERC is responsible for dam inspection during and after construction. FERC staff inspect regulated dams at regular intervals, and the owners of certain dams require more thorough inspections. According to 18 C.F.R. Â§12, every five years, an independent consulting engineer, approved by FERC, must inspect and evaluate projects with dams higher than 32.8 feet, or with a total storage capacity of more than 2,000 acre-feet. These inspections are to include a detailed review of the design, construction, performance, and current condition assessment of the entire project. Inspections are to include examinations of dam safety deficiencies, project construction and operation, and safety concerns related to natural hazards. Should an inspection identify a deficiency, FERC would require the project owner to submit a plan and schedule to remediate the deficiency. FERC then is to review, approve, and monitor the corrective actions until the licensees have addressed the deficiency. If a finding is highly critical, FERC has the authority to require risk-reduction measures immediately; these measures often include reservoir drawdowns. Following the spillway incident in 2017 at Oroville Dam, CA, California's Department of Water Resources engaged an independent forensic team to develop findings and opinions on the causes of the incident. FERC also convened an after-action panel to evaluate FERC's dam safety program at Oroville focusing on the original design, construction, and operations, including the five-year safety review process. Both the after-action panel and the forensic team released reports in 2018 that raised questions about the thoroughness of FERC's oversight of dam safety. Among other findings, the panel's report concluded that the established FERC inspection process, if properly implemented, would address most issues that could result in a failure; however, the panel's report stated that several failures occurred in the last decade because certain technical details, such as spillway components and original design, were overlooked and not addressed in the inspection or by the owner. For example, both reports highlighted inspectors' limited attention to spillways compared to more attention for main dams. After the Oroville incident, a FERC-led initiative to examine dam structures comparable to those at Oroville Dam identified 27 dam spillways at FERC-licensed facilities with varying degrees of safety concerns; FERC officials stated they are working with dam licensees to address the deficiencies. A 2018 GAO review also found that FERC had been prioritizing individual dam inspections and responses to urgent dam safety incidents, but had not conducted portfolio-wide risk analyses. FERC told GAO in January 2019 that it had begun developing a risk-assessment program to assess safety risks across the inventory of regulated dams and to help guide safety decisions. In addition, FERC produced draft guidelines in 2016 for risk-informed decisionmaking, with a similar risk management approach as USACE and Reclamation. FERC has allowed dam owners, generally those with a portfolio of dams, to pilot risk-informed decisionmaking using the draft guidelines for their inspections and prioritizing rehabilitation and repairs instead of using the current deterministic, standards-based approach. At mining sites, dams may be constructed for water supply, water treatment, sediment control, or the disposal of mining byproducts and waste (i.e., tailings dams). Under the Federal Mine Safety and Health Act of 1977, as amended (P.L. 91-173; 30 U.S.C. 801 et seq.), the Department of Labor's Mine Safety and Health Administration (MSHA) regulates private dams used in or resulting from mining. According to MSHA, approximately 1,640 dams are in its inventory. Of these, 447 are in the 2018 NID, with 220 classified as high hazard. As a regulator, MSHA develops standards and conducts reviews, inspections, and investigations to ensure mine operators comply with those standards. According to agency policies, MSHA is to inspect each surface mine and associated dams at least two times a year and each underground mine and associated dams at least four times a year. Under Title V of the Surface Mining Control and Reclamation Act of 1977, as amended (SMCRA; P.L. 95-87 ; 30 U.S.C. Â§Â§1251-1279), DOI's Office of Surface Mining Reclamation and Enforcement (OSMRE) administers the federal government's responsibility to regulate active coal mines to minimize environmental impacts during mining and to reclaim affected lands and waters after mining. OSMRE regulations require private companies to demonstrate that dams are in accordance with federal standards (30 C.F.R. Â§715.18). According to the 2018 DOI Annual Report on Dam Safety, OSMRE regulates 69 dams at coal mines under OSMRE's federal and Indian lands regulatory authority. Twenty four states have primary regulation authority (i.e., primacy) for dams under SMCRA authority: for primacy, states must meet the requirements of SMCRA and be no less effective than the federal regulations. If the dam is noncompliant with the approved design at any time during construction or the life of the dam's operation, OSMRE or an approved state regulatory program is to instruct the permittee to correct the deficiency immediately or cease operations. The Nuclear Regulatory Commission (NRC) was established by the Energy Reorganization Act of 1974 (42 U.S.C. 5801 et seq.) as an independent federal agency to regulate and license nuclear facilities and the use of nuclear materials as authorized by the Atomic Energy Act of 1954, as amended (P.L. 83-703). Among its regulatory licensing responsibilities pertaining to dams, NRC regulates uranium mill tailings dams, storage water pond dams at in situ leach (ISL) uranium recovery facilities, and dams integral to the operation of other licensed facilities that may pose a radiological safety-related hazard should they fail. Currently, NRC directly regulates eight dams. If NRC shares regulatory authority with another federal agency (e.g., FERC, USACE, Reclamation), NRC will defer regulatory oversight of the dam to the other federal agency. Under NRC's authority to delegate regulatory authority, states may regulate dams associated with nuclear activities based on agreements with NRC (i.e., agreement state programs). Nonfederal dam owners generally are responsible for investing in the safety, rehabilitation, and repair of their dams. In 2019, ASDSO estimated that $65.9 billion was needed to rehabilitate nonfederal dams; of that amount, $18.7 billion was needed for high hazard nonfederal dams. Twenty-three states provide a limited amount of assistance for these activities through a grant or low-interest revolving loan program. Some federal programs may specifically provide limited assistance to nonfederal dams; these programs are described below. In addition, more general federal programs, such as the Community Development Block Grant Program, offer broader funding opportunities for which dam rehabilitation and repair may qualify under certain criteria. The WIIN Act authorized FEMA to administer a high hazard dam rehabilitation grant program, which would provide funding assistance for the repair, removal, or rehabilitation of nonfederal high hazard potential dams. Congress authorized the program to provide technical, planning, design, and construction assistance in the form of grants to nonfederal sponsors. Nonfederal sponsorsâsuch as state governments or nonprofit organizationsâmay submit applications to FEMA on behalf of eligible dams and then distribute any grant funding received from FEMA to these dams. Eligible dams must be in a state with a dam safety program, be classified as high hazard, have developed a state-approved EAP, fail to meet the state's minimum dam safety standards, and pose an unacceptable risk to the public. Participating dams also must comply with certain federal programs and laws (e.g., flood insurance programs, the Robert T. Stafford Disaster Relief and Emergency Assistance Act), have or develop hazard mitigation and floodplain management plans, and commit to provide O&M for 50 years following completion of the rehabilitation activity. The WIIN Act authorized appropriations of $10 million annually for FY2017 and FY2018, $25 million for FY2019, $40 million for FY2020, and $60 million annually for FY2021 through FY2026 for the High Hazard Dam Rehabilitation Grant Program (see Figure 9 ). FEMA is to distribute grant money to nonfederal sponsors based on the following formula: one-third of the total funding is to be distributed equally among the nonfederal sponsors that applied for funds, and two-thirds of the total is to be distributed among the nonfederal sponsors proportional to the number of eligible high hazard dams represented by nonfederal sponsors. Individual grants to nonfederal sponsors are not to exceed 12.5% of total program funds or $7.5 million, whichever is less. Grant assistance must be accompanied by a nonfederal cost share of no less than 35%. Congress appropriated $10 million in FY2019 for FEMA's High Hazard Dam Rehabilitation Grant Program under the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), enacted on February 15, 2019. FEMA released a notice of funding opportunity on May 22, 2019, for proposals to be submitted by nonfederal sponsors by July 8, 2019. In FY2019, 26 nonfederal sponsors were awarded grants ranging from $153,000 to $1,250,000 to provide technical, planning, design, and construction assistance for rehabilitation of eligible high hazard potential dams. The Natural Resources Conservation Service (NRCS), within the U.S. Department of Agriculture, provides assistance for selected watershed activities generally related to managing water on or affecting agricultural or rural areas. The Watershed Protection and Flood Prevention Act (P.L. 83-566) and the Flood Control Act of 1944 (P.L. 78-534) provide the authority for NRCS to construct dams through the Watershed and Flood Prevention Operations program. By the end of 2019, more than half of the 11,847 watershed dams constructed with assistance from NRCS will have reached the end of their designed life spans. Congress created a rehabilitation program, known as the Small Watershed Rehabilitation Program, in Section 313 of the Grain Standards and Warehouse Improvement Act of 2000 ( P.L. 106-472 ; 16 U.S.C. Â§1012). Under this authority, watershed dams constructed with assistance from NRCS are eligible for assistance from the Small Watershed Rehabilitation Program. The rehabilitation program is intended to extend the approved service life of the dams and bring them into compliance with applicable safety and performance standards or to decommission the dams so they no longer pose a threat to life and property. From 2000 to 2018, the program authorized the rehabilitation of 288 dams. NRCS may provide 65% of the total rehabilitation costs; this may include up to 100% of the actual construction cost and no O&M costs. The Small Watershed Rehabilitation Program has discretionary funding authority of up to $85 million annually. Since FY2000, Congress has appropriated more than $700 million for rehabilitation projects. The Small Watershed Rehabilitation Program has received an average annual appropriation of $11.2 million over the last five years, including $10 million in FY2019. USACE's Rehabilitation and Inspection Program (RIP, or the P.L. 84-99 program) is used mainly for levees, but may provide federal support for selected nonfederal dams that meet certain criteria (e.g., the reservoir behind the dam has storage capacity for a 200-year flood event, otherwise referred to as a flood event having 0.5% chance of occurring in any given year). RIP may provide assistance for flood control works if a facility is damaged by floods, storms, or seismic activity. To be eligible for RIP assistance, damaged flood control works must be active in RIP (i.e., subject to regular inspections) and in a minimally acceptable condition at the time of damage. As of 2017, USACE considered 33 nonfederal dams as \"active\" in RIP. Because annual appropriations for USACE's Flood Control and Coastal Emergencies account are limited primarily to flood preparedness activities, USACE generally uses supplemental appropriations for major repairs through RIP. Congress may consider oversight and legislation relating to dam safety in the larger framework of infrastructure improvements and risk management, or as an exclusive area of interest. Congress may deliberate the federal role for dam safety, especially as most of the dams in the NID are nonfederal. Further, Congress may evaluate the level and allocation of appropriations to federal dam safety programs, project modifications for federal dams, and financial assistance for nonfederal dam safety programs and nonfederal dams. In addition, Congress may maintain or amend policies for disclosure of dam safety information when considering the federal role in both providing dam safety risk and response information to the public (including those living downstream of dams) while also maintaining security of these structures. Since the 1970s, the federal government has developed and overseen national dam safety standards and has provided technical assistance for the design, construction, and O&M of dams. These activities, as well as the enhancement of federal agencies' dam safety programs, have improved certain dam safety metrics; nonetheless, deficiencies in federal and state programs may have contributed to recent incidents (e.g., the 2017 spillway incident at Oroville Dam, California). Some federal agencies have received criticism of their dam safety programs. For example, in 2014, the Department of Defense (DOD) Inspector General found that DOD did not have a policy requiring installations to implement a dam safety inspection program consistent with the Federal Guidelines for Dam Safety . Since the findings, some service branches of DOD reported developing new dam safety policies including the creation of a dam safety program for the U.S. Marine Corps. Congress may consider other oversight activities similar to, for example, direction requiring USACE, Reclamation, and FERC to brief the Senate Committee on Appropriations on efforts to incorporate lessons learned from Oroville into dam inspection protocols across all three agencies and their state partners. Although incidents and reviews may result in recommending improvements to federal dam safety programs, some agencies report financial and other limitations to revising or expanding their dam safety programs. Congress may consider these obstacles, as identified in its oversight activities, in determining whether new authorities or appropriations are needed. Some stakeholders argue that the federal government should continue its activities in maintaining and regulating dams owned by federal agencies and nonfederal dams under federal regulatory authority, while state dam safety programs should retain responsibility for state-regulated dams by following the guidelines of the Model State Dam Safety Program . However, some stakeholders, such as the Association of State Floodplain Managers and ASDSO, advocate for a larger federal role in nonfederal dam safety. They argue that many state dam safety programs and nonfederal dam owners have limited resources and authorities to inspect, conduct O&M, rehabilitate, and repair nonfederal dams. However, land use and zoning are considered nonfederal responsibilities, and some may argue against encroaching on state and local sovereignty and against the potential growth of the federal government's role. Dam removal is a potential policy alternative to rehabilitation and repair of high hazard dams. A dam-removal policy incentive would likely require, for example, evaluation of the current level of use of the dam, whether some or all of its functions could be economically replaced by nonstructural measures, and whether O&M, rehabilitation, and repair are feasible (e.g., the dam owner is absent or repairs are too costly). Congress has previously considered incentives to encourage states to remove dams deemed unnecessary or infeasible to rehabilitate. For instance, Congress authorized dam removal as an activity under FEMA's High Hazard Dam Rehabilitation Grant Program and authorized USACE to study the structural integrity and possible modification or removal for certain dams located in Vermont. When considering dam removal for dam safety purposes, policymakers also may weigh removal costs and the loss of recognized benefits from the dam. Individual dam O&M, rehabilitation, and repair can range in cost from thousands to hundreds of millions of dollars. The responsibility for these expenses lies with dam owners; however, many nonfederal dam owners are not willing or able to fund these costs. As of 2019, ASDSO estimated that rehabilitation and repair of nonfederal high hazard dams in the NID would cost approximately $18.7 billion (overall rehabilitation and repair for nonfederal dams in the NID were estimated at $65.9 billion). Some, such as ASDSO and American Society of Civil Engineers, call for increased federal funding to rehabilitate and repair these dams. They note that upfront federal investment in rehabilitation and repair may prevent loss of lives and large federal outlays in emergency spending if a high hazard dam were to fail. Twenty-three states have created a state-funded grant or low-interest revolving loan program to assist dam owners with repairs. ASDSO states that the programs seem to vary significantly in the scope and reach of the financial assistance available. Congress authorized the \" FEMA High Hazard Dam Rehabilitation Grant Program \" in the WIIN Act, and subsequently provided appropriations of $10 million to the program in Division A (Department of Homeland Security Appropriations Act, 2019) of the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ). For FY2020, the House Committee on Appropriations recommended no money for the grant program, while the Senate Committee on Appropriations recommended $10 million. Congress may consider the tradeoffs in focusing federal resources on federal dams versus nonfederal dams. While federal agencies report owning only 3% of dams in the NID, many of these dams are considered large dams that can affect large populations and may require costly investments in dam safety. In FY2019, USACE estimated a backlog of $20 billion to address DSAC 1 and DSAC 2 dam safety concerns. USACE has stated that investments in dam rehabilitation and repair above recent levels of appropriations would help alleviate risks and the likelihood of a major dam incident. Reclamation estimates that the current portfolio of dam safety modification projects for Reclamation-owned dams would cost $1.4 billion to $1.8 billion through FY2030. To address this backlog, Congress has considered authorizing mandatory funding from the Reclamation Fund to provide for dam O&M, rehabilitation, and repair, so the funding would not be subject to the appropriations process. While some Members of Congress and stakeholders support this proposal, such as the Western States Water Council, other Members of Congress argue that increasing mandatory funding would remove congressional oversight and control of the Reclamation Fund and result in increases in spending and budget deficits, among other things. Agencies with portfolios of smaller dams (e.g., Forest Service, Fish and Wildlife Service, National Park Service) report that their biggest challenge for dam safety is lack of resources, especially when dam safety is competing against other facility projects (e.g., buildings, levees). The Fish and Wildlife Service suggested in the FY2016-FY2017 National Dam Safety Program Report that downgrading small impoundments from the definition of a dam would alleviate some financial burdens. The agency reasoned that small impoundments that narrowly qualify as dams based on height and/or storage volume obligate the owners and regulators to perform dam safety functions with little likelihood of providing significant dam safety benefits or any genuine risk reduction. Congress may consider continuing current spending levels for dam safety. Under current funding, some metrics for the NDSP, such as the percentage of dams with EAPs and condition assessments, have shown improvement (see \" Progress of the National Dam Safety Program \"). Similar metrics have improved for some federal agencies that own dams, and certain federal dam safety programs have implemented or are beginning to implement risk-based dam safety approaches to managing their dam portfolios (e.g., USACE and Reclamation). Some stakeholders (e.g., a committee convened by ASDSO, the Association of State Floodplain Managers) have recommended alternative funding structures to congressional appropriations, such as a federal low interest, revolving loan program or financial credit for disaster assistance. For example, Congress has previously authorized a Water Infrastructure Finance and Innovation Act (WIFIA) program, creating a new mechanismâcredit assistance including direct loans and loan guaranteesâfor USACE to provide assistance for water resource projects (e.g., flood control and storm damage reduction). Congress may consider amending WIFIA to include making rehabilitation and repair of nonfederal dams eligible for credit assistance, or for establishing a new low-interest loan guarantee program. Although Congress authorized secured and direct loans when it enacted WIFIA in 2014, Congress has not provided appropriations to USACE to implement the programs as of FY2019. Similarly, Congress would need to provide both the authority and appropriations for these financial incentives for dam safety programs. According to some advocacy groups, many Americans are unaware that they live downstream of a dam. Further, if they are aware, the public may not know if a dam is deficient, has an EAP, or could cause destruction if it failed. A lack of public awareness may stem from a lack of access to certain dam safety information, the public's confidence in dam integrity, or other reasons. Dam safety processes and products (such as inspections, EAPs, and inundation maps) are intended to support decisionmaking and enhance community resilience. Some of the information and resulting products may not be readily available to all community members and stakeholders because access to dam safety information is generally restricted from public access. The September 11, 2001, terrorist attacks drew attention to the security of many facilities, including the nation's water supply and water quality infrastructure, including dams. Damage or destruction of a dam by a malicious attack (e.g., terrorist attack, cyberattack) could disrupt the delivery of water resource services, threaten public health and the environment, or result in catastrophic flooding and loss of life. As a consequence of the September 11, 2001, terrorist attacks, current federal policy and practices restrict public access to most information related to the condition assessment of dams and consequences of dam or component failure. For example, according to USACE, dams in the NID meet the definition of critical infrastructure as defined by the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 ( P.L. 107-56 ). Vulnerability assessments of critical infrastructure are restricted from public access. Currently USACE considers condition assessments as a type of vulnerability assessment; therefore, dam condition assessments contained in the NID are restricted only to approved government users. However, FEMA reported that following a 2017 recommendation from the NDSRB, USACE is considering making condition assessments of NID dams unrestricted for public access. Congress may consider reevaluating the appropriate amount of information to share (e.g., inundation scenarios from dam failure) to address public safety concerns and what amount and type of information not to share to address concerns about malicious use of that information. There are tradeoffs involved in sharing certain types of data. For example, sharing inundation mapping data with the public may raise awareness of the potential risk of living downstream of a dam, but misinterpretation of that information could cause unnecessary alarm in downstream communities. Currently, inundation mapping data generally are shared with emergency managers and responders rather than with the public at large. Some argue that disclosure to these officials is sufficient, as it provides the information to the officials who bear responsibilities for emergency response. In addition to managing information flow to the public to address risk, Congress might consider the risk of individuals or groups using the information for malicious purposes; namely, the concerns originally raised following the September 11, 2001, terrorist attacks.", "summary": "Dams provide various services, including flood control, hydroelectric power, recreation, navigation, and water supply, but they require maintenance, and sometimes rehabilitation and repair, to ensure public and economic safety. Dam failure or incidents can endanger lives and property, as well as result in loss of services provided by the dam. Federal government agencies reported owning 3% of the more than 90,000 dams listed in the National Inventory of Dams (NID), including some of the largest dams in the United States. The majority of NID-listed dams are owned by private entities, nonfederal governments, and public utilities. Although states have regulatory authority for over 69% of NID-listed dams, the federal government plays a key role in dam safety policies for both federal and nonfederal dams. Congress has expressed interest in dam safety over several decades, often prompted by critical events such as the 2017 near failure of Oroville Dam's spillway in California. Dam failures in the 1970s that resulted in the loss of life and billions of dollars of property damage spurred Congress and the executive branch to establish the NID, the National Dam Safety Program (NDSP), and other federal activities. These programs and activities have increased safety inspections, emergency planning, rehabilitation, and repair. Since the late 1990s, some federal agency dam safety programs have shifted from a standards-based approach to a risk-management approach. A risk-management approach seeks to mitigate failure of dams and related structures through inspection programs, risk reduction measures, and rehabilitation and repair, and it prioritizes structures whose failure would pose the greatest threat to life and property. Responsibility for dam safety is distributed among federal agencies, nonfederal agencies, and private dam owners. The Federal Emergency Management Agency's (FEMA's) NDSP facilitates collaboration among these stakeholders. The National Dam Safety Program Act, as amended (Section 215 of the Water Resources Development Act of 1996; P.L. 104-303 ; 33 U.S.C. Â§Â§467f et seq.), authorizes the NDSP at $13.4 million annually. In FY2019, Congress appropriated $9.2 million for the program, which provided training and $6.8 million in state grants, among other activities. The federal government is directly responsible for maintaining the safety of federally owned dams. The U.S. Army Corps of Engineers (USACE) and the Department of the Interior's Bureau of Reclamation own 42% of federal dams, including many large dams. The remaining federal dams are owned by the Forest Service, Bureau of Land Management, Fish and Wildlife Service, Department of Defense, Bureau of Indian Affairs, Tennessee Valley Authority, Department of Energy, and International Boundary and Water Commission. Congress has provided various authorities for these agencies to conduct dam safety activities, rehabilitation, and repair. Congress also has enacted legislation authorizing the federal government to regulate or rehabilitate and repair certain nonfederal dams. A number of federal agencies regulate dams associated with hydropower projects, mining activities, and nuclear facilities and materials. Selected nonfederal dams may be eligible for rehabilitation and repair assistance from the Natural Resources Conservation Service, USACE, and FEMA. For example, in 2016, the Water Infrastructure Improvements for the Nation Act (WIIN Act; P.L. 114-322 ) authorized FEMA to administer a high hazard dam rehabilitation grant program to provide funding assistance for the repair, removal, or rehabilitation of certain nonfederal dams. Congress may consider how to address the structural integrity of dam infrastructure and mitigate the risk of dam safety incidents, either within a broader infrastructure investment effort or as an exclusive area of interest. Congress may reexamine the federal role for dam safety, while considering that most of the nation's dams are nonfederal. Congress may reevaluate the level and allocation of appropriations to federal dam safety programs, rehabilitation and repair for federal dams, and financial assistance for nonfederal dam safety programs and dams. In addition, Congress may maintain or amend policies for disclosure of dam safety information when considering the federal role in both providing dam safety risk and response information to the public while also maintaining security of these structures.", "document_type": "crs"}
{"report": "Heads of state and government from NATO's 30 member states met in London, United Kingdom (UK), on December 3-4, 2019. NATO and U.S. officials highlighted the following key deliverables from the London Leaders' Meeting: Completion of a new Readiness Initiative, under which the alliance would have at its disposal 30 mechanized battalions, 30 air squadrons, and 30 naval combat vessels ready to use within 30 days. Declaration of space as a new operational domain for NATO and advances in combatting cyber and hybrid threats, including establishing new baseline requirements for telecommunications infrastructure. Increased defense spending by European allies and Canada. Renewed commitment to NATO's mission in Afghanistan and counterterrorism efforts in the Middle East and North Africa. Agreement to assess China's impact on NATO and transatlantic security. Initiation of a new \"forward-looking reflection process â¦ to further strengthen NATO's political dimension including consultation.\" More broadly, NATO officials sought to highlight NATO's achievements and the importance of strong U.S.-European relations to these efforts. The United States was the driving proponent of NATO's creation in 1949 and has been the unquestioned leader of the alliance as it has evolved from a collective defense organization of 12 members focused on deterring the Soviet Union to a globally engaged security organization of 30 members. Successive U.S. Administrations have viewed U.S. leadership of NATO as a cornerstone of U.S. national security strategy that brings benefits ranging from peace and stability in Europe to the political and military support of 28 allies, including many of the world's most advanced militaries. The London meeting came at a tense time for NATO, however. Some European allies question the Trump Administration's commitment to NATO and have criticized the Administration for a perceived unilateral approach to foreign policy issues, including the October 2019 drawdown of U.S. forces from Syria. Many allies also have criticized fellow NATO member Turkey for its military operations in Syria and its acquisition of a Russian-made air defense system. NATO Secretary General Jens Stoltenberg acknowledges ongoing tensions within the alliance but stresses that continued transatlantic cooperation has enabled NATO to be more active today than it has been in decades. Trump Administration officials maintain that the United States remains committed to NATO, and in London, President Trump stressed that NATO \"has a great purpose.\" U.S. officials also highlight the Administration's successful efforts in 2017 and 2018 to substantially increase funding for the U.S. force presence in Europe and note that Secretary General Stoltenberg has credited President Trump with playing a role in securing defense spending increases across the alliance in recent years. Critics of the Trump Administration's NATO policy maintain that renewed Russian aggression has been a key factor behind such increases. At the London meeting, NATO leaders stressed their commitment to advancing existing readiness and deterrence initiatives and to confronting emerging security challenges, including by declaring space as an operational domain for NATO. The allies also reinforced their commitment to NATO's ongoing mission in Afghanistan and other counterterrorism efforts and discussed the implications for NATO of China's growing investment in, and engagement with, Europe. In the five years since Russia occupied Crimea and invaded Eastern Ukraine, the United States has supported efforts to renew NATO's focus on territorial defense and deterring Russian aggression. Among other measures, NATO member states have deployed an Enhanced Forward Presence (EFP) totaling about 4,500 troops to the three Baltic States (Estonia, Latvia, and Lithuania) and Poland; increased military exercises and training activities in Central and Eastern Europe; and established new NATO command structures in six Central and Eastern European countries. In London, the allies announced progress on several new initiatives intended to enhance NATO's readiness to respond swiftly to an attack on a NATO member, including by reinforcing the aforementioned EFP battlegroups. A cornerstone of these efforts is full implementation by the end of 2019 of the so-called Four-Thirties Readiness Initiative, proposed by the United States in 2018, under which NATO would have 30 mechanized battalions, 30 air squadrons, and 30 naval combat vessels ready to use within 30 days. Although the allies have continued to support and contribute to NATO deterrence initiatives, some analysts question the effectiveness and sustainability of these efforts. For example, the authors of a February 2016 report by the RAND Corporation contend that \"as presently postured, NATO cannot successfully defend the territory of its most exposed members.\" Some allies, including Poland and the Baltic States, have urged other NATO members to deploy more forces to the region to reinforce that alliance's deterrence posture. Other allies, including leaders in Western European countries such as Germany, Italy, and France, have stressed the importance of a dual-track approach to Russia that complements deterrence with dialogue. These allies contend that efforts to rebuild cooperative relations with Moscow should receive as much attention as efforts to deter Russia. Accordingly, these allies are reluctant to endorse permanently deploying troops in countries that joined NATO after the collapse of the Soviet Union due to concerns that this would violate the terms of the 1997 NATO-Russia Founding Act; in consideration of these terms, NATO's EFP has been referred to as \"continuous\" but rotational rather than \"permanent.\" In London, the allies highlighted progress in responding to cyber and hybrid threats and formally declared space as a new operational domain for the alliance. Since naming cyber defense a core NATO competence in 2014, the alliance has adopted measures to protect NATO networks from cyberattacks and to assist member states in bolstering national cyber defense capabilities. NATO has made available Cyber Rapid Reaction Teams to help allies respond to cyberattacks, and in 2018 it announced plans to establish a new NATO Cyberspace Operations Center in Brussels. The new cyber center will focus on integrating allies' national cyber capabilities into NATO missions and operations. Although NATO member states maintain full ownership of these capabilitiesâas they do with other military capabilities deployed to NATO missionsâthe new operations center is tasked with incorporating cyber defense into all levels of NATO planning and operations. NATO also has sought to bolster capabilities to counter heightened hybrid warfare threats, including propaganda, deception, sabotage, and other nonmilitary tactics. NATO's focus has been on enhancing strategic communications, developing appropriate exercise scenarios, and strengthening coordination with the European Union (EU) to respond to hybrid threats. At their meeting in 2018, NATO leaders agreed to establish counter-hybrid support teams to provide tailored assistance to allies in preparing against and responding to hybrid activities. NATO deployed the first of these teams to Montenegro in November 2019. As discussed in more detail below (see \" Assessing China's Impact on NATO and Transatlantic Security \"), in London, NATO leaders endorsed new baseline requirements for allies with respect to the resilience of telecommunications infrastructure, including 5G systems. In London, NATO leaders formally declared space as an operational domain for NATO, alongside air, land, sea, and cyber. Secretary General Stoltenberg stated that the declaration reflects a consensus desire within NATO to strengthen defense and deterrence in all areas, including space, where NATO allies reportedly own about half of the approximately 2,000 satellites estimated to be in orbit currently. Stoltenberg has stressed that NATO has no intention of deploying weapons in space and that NATO's approach will remain defensive and in line with international law. Others have questioned whether China, which has a growing presence in space, might view the NATO declaration as a provocation. A primary focus of the Trump Administration's policy toward NATO has been to urge allies to increase their national defense budgets in line with past agreements intended to ensure an equitable distribution of defense responsibilities within the alliance. In London, President Trump continued these calls but also welcomed substantial increases in European allies' defense spending over the past five years. Secretary General Stoltenberg has credited President Trump with playing a key role in spurring increases in European allied defense spending over the past five years. However, critics of the U.S. President express concern that his strident criticism of what he considers insufficient defense spending by some allies could damage NATO cohesion and credibility. In 2006, NATO members informally agreed to aim to allocate at least 2% of gross domestic product (GDP) to their national defense budgets annually and to devote at least 20% of national defense expenditure to procurement and related research and development. These targets were formalized at NATO's 2014 Wales Summit, when the allies pledged to halt declines in defense expenditures and \"move towards the 2% guideline within a decade.\" U.S. and NATO officials say they are encouraged that defense spending by European allies and Canada has grown for five consecutive years (see Figure 1 ). According to Secretary General Stoltenberg, European allies and Canada have added $130 billion in defense spending since 2014; the figure is expected to rise to $400 billion by the end of 2024. In 2014, three allies met the 2% guideline; in 2019, 9 allies are expected to have met the 2% guideline, and 16 allies are expected to have met the 20% benchmark for spending on major equipment. President Trump and others continue to criticize those NATO members perceived to be reluctant to achieve defense-spending targets, however. One such member is Europe's largest economy, Germany, which currently spends about 1.38% of GDP on defense and has plans to reach 1.5% of GDP by 2024. Although all allied governments agreed to the Wales commitments, many, including Germany, emphasize that allied contributions to ongoing NATO missions and the effectiveness of allied military capabilities should be considered as important as total defense spending levels. For example, an ally spending less than 2% of GDP on defense could have more modern, effective military capabilities than an ally that meets the 2% target but allocates most of that funding to personnel costs and relatively little to ongoing missions and modernization. Analysts on both sides of the Atlantic also have argued that a relatively narrow focus on defense inputs (i.e., the size of defense budgets) should be accompanied by an equal, if not greater, focus on defense outputs (i.e., military capabilities and the effectiveness of contributions to NATO missions and activities). The alliance's target to devote at least 20% of each member's national defense expenditure to new equipment and related research and development reflects this goal. Secretary General Stoltenberg has emphasized a broad approach to measuring contributions to the alliance, using a metric of \"cash, capabilities, and contributions.\" Proponents of this approach argue that a broad assessment of allied contributions that takes into account factors beyond the 2% of GDP defense spending metric would be more appropriate given NATO's wide-ranging strategic objectives, some of which may require capabilities beyond the military sphere. In London, allied leaders approved a U.S. proposal to reduce assessed U.S. contributions, and increase German contributions, to NATO's relatively small pot of common funds . National contributions to NATO's common fundsâabout $2.6 billion total in 2019âpay for the day-to-day operations of NATO headquarters, as well as some collective NATO military assets and infrastructure. According to NATO, in 2018, the U.S. share of NATO's common-funded budgets was about 22% , or about $570 million, followed by Germany (15%), France (11%), and the UK (10%). The U.S. proposal approved in London would bring both the U.S. and German contributions to about 16% each. In London, the allies renewed their commitment to NATO's ongoing training mission in Afghanistan, despite speculation about a possible drawdown of U.S. forces in the country. In January 2015, following the end of its 11-year-long combat mission in Afghanistan, NATO launched the Resolute Support Mission (RSM) to train, advise, and assist Afghan security forces. Between 2015 and late 2018, NATO allies and partners steadily matched U.S. increases in troop levels to RSM. As of February 2020, about 8,500 of the 16,551 troops contributing to RSM were from NATO members and partner countries other than the United States. After the United States (8,000 troops), the top contributors to the mission were Germany (1,300), the UK (1,100), Italy (895), non-NATO-member Georgia (871), and Romania (797). NATO leaders welcomed the February 29, 2020, Joint Declaration between the United States and Afghanistan and agreement between the United States and the Taliban in pursuit of a peaceful settlement to the conflict in Afghanistan. Secretary General Stoltenberg said that NATO would implement adjustments, including troop reductions, to its mission as outlined in the agreements; he stressed, however, that such actions would be \"conditions-based.\" NATO continues to \"reaffirm its longstanding commitment to Afghanistan and ongoing support for the Afghan National Defense and Security Forces.\" In the past, European allies have expressed concern that they were not consulted on possible drawdown plans and stressed that any such plans be carried out in close coordination with the allies. President Trump consistently has called on NATO to expand its counterterrorism efforts beyond Afghanistan, and terrorist threats emanating from the Middle East and North Africa (MENA) region are key European concerns as well. Over the past several years, NATO leaders have launched several new initiatives aimed at countering terrorism and addressing instability in the MENA region. These initiatives include the noncombat NATO Training Mission in Iraq, carried out by between 300 and 500 allied military trainers; the Package on the South, an initiative that includes a range of partnership activities to enhance cooperation initiatives with MENA countries such as Tunisia and Jordan; and establishment of a NATO Regional Hub for the South in Naples, Italy, to coordinate NATO responses to crises emanating from the South. NATO also has deployed aerial surveillance aircraft (AWACS) to assist the global coalition fighting the Islamic State terrorist organization. Several factors have limited enhanced NATO engagement on security challenges emanating from the MENA region. These factors include a belief among some allies that the EU is the appropriate institution to lead Europe's response to terrorism and migration issues and a related reluctance to cede leadership on these issues to NATO. France, for example, has advocated strong European responses to terrorism and conflict in the Middle East but has generally opposed a larger role for NATO. Some allies also disagree on what the appropriate response should be to some of the security challenges in the MENA region, with some appearing hesitant to involve NATO in a way that could be seen as endorsing military action. The Trump Administration and some Members of Congress have urged NATO to assess the security implications of growing Chinese investment in Europe and to work to counter potential negative impacts on transatlantic security. As expressed in the December 2017 U.S. National Security Strategy , U.S. officials have grown increasingly concerned that \"China is gaining a strategic foothold in Europe by expanding its unfair trade practices and investing in key industries, sensitive technologies, and infrastructure.\" U.S. officials express particular concern about Chinese investment in critical infrastructure and telecommunications systems, such as 5G networks. Some U.S. defense officials have suggested that the United States might limit military cooperation and intelligence sharing with allies that allow Chinese investment in 5G networks. In London, NATO formally adopted an October 2019 plan by NATO defense ministers to update the alliance's baseline requirements for civilian telecommunications to reflect emerging concerns about 5G technology. The allies agreed to assess the risks to communications systems associated with cyber threats, and the consequences of foreign ownership, control, or direct investment. Although the EU is attempting to develop common guidelines to govern contracting decisions on 5G networks, these decisions would remain the prerogative of individual national governments. As noted above, U.S. officials have warned European allies and partners that using Huawei or other Chinese 5G equipment could impede intelligence sharing with the United States due to fears of compromised network security. Although some allies, such as the UK and Germany, have said they would not prevent Chinese companies from bidding on 5G contracts, these allies have stressed that they would not contract with any companies that do not meet their national security requirements. On January 28, 2020, the UK government announced that \"high-risk vendors\" including, but not limited to, Huawei, would be excluded from sensitive \"core\" parts of 5G networks and locations deemed critical national infrastructure, and that such vendors' access to nonsensitive parts of networks would be limited to 35%. Other countries, such as Poland, have considered formally excluding Huawei from their telecommunications sector, and Czech Republic intelligence officials publicly labeled Huawei a national security risk. Despite U.S. concerns about China's growing footprint in Europe, Administration officials have expressed optimism that the United States and Europe can work together to meet the various security and economic issues posed by a rising China. Analysts, too, cite numerous concerns shared on both sides of the Atlantic and contend that joint U.S.-European pressure on China would be more effective than either partner's individual dealings with China. On March 27, 2020, North Macedonia became NATO's 30 th member (see Figure 2 for a map of NATO members and accession dates). NATO officials had hoped North Macedonia's accession would be complete in time for the London Leaders' Meeting, but elections in some member states delayed the accession ratification process. The U.S. Senate approved U.S. ratification on October 22, 2019. Deliberations in London drew attention to heightened tension and divergent views within the alliance on a range of issues, including U.S. policy toward NATO and Europe, Turkey's standing as a member of the alliance, EU security and defense policy, and NATO's relations with Russia. Disagreement within the alliance on whether and how to respond to these and other issues has prompted some, including French President Emmanuel Macron, to question NATO's strategic direction and future. Many officials and analysts on both sides of the Atlantic also have suggested that President Trump's vocal criticism of NATO and the lack of transatlantic coordination on policies related to Syria and Afghanistan have seriously undermined the alliance. Secretary General Stoltenberg and others maintain that disagreement among allies is not a new phenomenon and stress that \"Europe and North American are doing more together in NATO today than we have for decades.\" In an apparent effort to address diverging views within NATO, in London, the allies agreed to initiate a \"forward-looking reflection process â¦ to further strengthen NATO's political dimension including consultation.\" On March 31, 2020, Secretary General Stoltenberg announced the appointment of a group of 10 experts tasked with recommending ways to \"reinforce Alliance unity, increase political consultation and coordination between Allies, and strengthen NATO's political role. The group will be cochaired by former U.S. Assistant Secretary of State Wess Mitchell and former German Interior and Defense Minister Thomas De MaziÃ¨re. Some analysts and allied leaders question the Trump Administration's level of commitment to NATO and express concern that President Trump's criticisms of the alliance could cause lasting damage to NATO cohesion and credibility. In addition to admonishing European allies for failing to meet agreed NATO defense spending targets President Trump has repeatedly questioned NATO's value to the United States. Although he is not the first U.S. President to press the allies to increase defense spending, none has done so as stridently and none has called into question the U.S. commitment to NATO as openly or to the same extent as President Trump. In London, President Trump expressed that his Administration remains committed to NATO and to upholding European security, including through increased funding for U.S. defense activities in Europe such as the European Deterrence Initiative (EDI). Some NATO member state governments argue that growing divergence between the United States and many European allies on a range of key foreign and security policy issues, from Iran's nuclear program to fighting the Islamic State terrorist organization in Syria, has impeded cooperation in NATO and exposed strategic rifts within the alliance. Some European allies have expressed particular concern about what they portray as a lack of U.S. coordination on policy in Syria, where many European countries have been fighting alongside the United States to counter the Islamic State. Some maintain that the U.S. drawdown of forces in Syria in October 2019 enabled Turkey's subsequent military operations against Kurdish forces in the country. In a widely reported November 2019 interview, French President Macron cited these divergences when he proclaimed that, \"we are currently experiencing the brain death of NATO.\" Referring to concerns about the drawdown of U.S. forces from Syria in October 2019 and subsequent military operations by Turkey, he lamented, \"You have partners together in the same part of the world, and you have no coordination whatsoever of strategic decision-making between the United States and its NATO allies. None. You have an uncoordinated aggressive action by another NATO ally, Turkey, in an area where our interests are at stake. There has been no NATO planning, nor any coordination.\" In London, President Trump characterized Macron's criticism as \"very, very nasty\" and stressed that \"NATO serves a great purpose\"; Macron said he stood by his earlier criticism of the alliance. Some of Turkey's fellow NATO members have sharply criticized Turkey's October 2019 military operations against Kurdish forces in northern Syria as well as its planned deployment of a Russian S-400 air defense system, with some policymakers calling into question Turkey's qualification for continued membership in the alliance. Turkey has been a NATO member since 1952 and has participated in numerous NATO missions, including ongoing operations in Afghanistan, Iraq, and the Western Balkans. NATO, in turn, has invested substantially in military facilities in Turkey, including naval bases and radar sites. Since 2013, NATO members have provided Turkey with air defense support through the deployment of defensive missile systems along its southern border. During an October 11, 2019, visit to Turkey, Secretary General Stoltenberg acknowledged Turkey's \"legitimate\" security concerns but urged Turkey to \"act with restraint\" and do everything it can to preserve the gains that have been made against the Islamic State. Since 2012, Turkey has on three separate occasions invoked Article 4 of NATO's founding treaty to prompt high-level NATO consultations on a perceived threat from Syria to Turkey's territorial integrity or security. On February 28, 2020, the allies met and expressed full solidarity with Turkey in response to \"indiscriminate air strikes by the Syrian regime and Russia in Idlib province.\" Secretary General Stoltenberg stressed that NATO allies were providing Turkey with air defense support along its border with Syria and aerial surveillance over Syria. NATO has deployed up to three air defense systems along the Turkish-Syrian border since early 2013 in response to a Turkish request for support following shelling by Syrian forces and the shooting down of a Turkish fighter jet in 2012. Although the air defense mission continues, some allies cast doubts on the deployment after Turkey's military incursion into northern Syria in October 2019. Italy withdrew its air defense system from Turkey in December 2019, though it said the decision was not a response to Turkey's actions; Spain continues to deploy a Patriot missile battery along Turkey's border. Secretary General Stoltenberg has said that Turkey's acquisition of the S-400 air defense system is \"not good\" for NATO, but he stressed that Turkey could continue to participate in NATO's integrated air and missile defense systems if the S-400 is excluded from these systems. Some allied leaders have argued that NATO should exclude Turkey from NATO's defense systems if it deploys the S-400. The North Atlantic Treaty does not contain provisions explicitly authorizing NATO allies to take action against another NATO member without its consent. However, the United States and other NATO members could take measures to affect the character of allied cooperation with Turkeyâfor example, by changing their contributions of equipment or personnel, or their participation in specific activities in Turkey. On October 14, 2019, U.S. Defense Secretary Mark Esper stated that he would \"press our other NATO allies to take collective and individual diplomatic and economic measures in response to these egregious Turkish actions.\" Some European leaders, including French President Macron, have argued that uncertainty about the future U.S. role in European security should add urgency to long-standing efforts to develop coordinated European defense capabilities and policies, independent of but complementary to NATO. For two decades, the EU has sought to develop its Common Security and Defense Policy to bolster its common foreign policy, strengthen the EU's ability to respond to security crises, and enhance European military capabilities. Improving European military capabilities has been difficult, however, especially given many years of flat or declining European defense budgets. In recent years, the EU has announced several new defense initiatives, including a European Defense Fund (EDF) to support joint defense research and development activities and a new EU defense pact (known as Permanent Structured Cooperation, or PESCO) aimed at spending defense funds more efficiently. Secretary General Stoltenberg has expressed support for further EU defense integration and cooperation but emphasizes that these efforts should strengthen the European pillar within NATOâ22 NATO members are also members of the EUârather than replace or supplant NATO. Stoltenberg also has stressed that EU defense initiatives should be careful not to duplicate NATO capacities and should complement NATO initiatives. In addition, the Trump Administration has expressed concern that the EDF and PESCO could restrict U.S. defense companies from participating in the development of pan-European military projects. Supporters of EU defense integration highlight that PESCO's initial priority projects were identified in consultation with NATO and that several of these projects focus on enhancing military mobility across Europe, a key NATO priority. Congress was instrumental in creating NATO in 1949 and has played a critical role in shaping U.S. policy toward the alliance ever since. Although many Members of Congress have criticized specific developments within NATOâregarding burden-sharing, for exampleâCongress as a whole has consistently demonstrated strong support for active U.S. leadership of and support for NATO. Congressional support for NATO traditionally has buttressed broader U.S. policy toward the alliance. During the Trump Administration, however, demonstrations of congressional support for NATO have at times been viewed primarily as an effort to reassure allies about the U.S. commitment to NATO after President Trump's criticisms of the alliance. For example, during the Trump Administration, both chambers of Congress have passed legislation expressly reaffirming U.S. support for NATO at times when some allies have questioned the President's commitment. Some analysts portrayed House Speaker Nancy Pelosi and Senate Majority Leader Mitch McConnell's joint invitation to Secretary General Stoltenberg to address a joint session of Congress on April 3, 2019, in commemoration of NATO's 70 th anniversary as an additional demonstration of NATO's importance to Congress. Although Congress has expressed consistent support for NATO and its cornerstone Article 5 mutual defense commitment, congressional hearings on NATO in the 115 th and 116 th Congresses have reflected disagreement regarding President Trump's impact on the alliance. Some in Congress argue that President Trump's criticism of allied defense spending levels has spurred recent defense spending increases by NATO members that were not forthcoming under prior Administrations, despite long-standing U.S. concern. Other Members of Congress counter that President Trump's admonition of U.S. allies and his questioning of NATO's utility have damaged essential relationships and undermined NATO's credibility and cohesion. They contend that doubts about the U.S. commitment to the alliance could embolden adversaries, including Russia, and ultimately weaken other allies' commitment to NATO. Critics also have lamented the Administration's reported lack of coordination with its allies on policies that have significant security ramifications for Europe, such as countering the Islamic State in Syria. Despite disagreement over President Trump's impact on the alliance, most Members of Congress continue to express support for robust U.S. leadership of NATO, in particular to address potential threats posed by Russia. Many Members have called for enhanced NATO and U.S. military responses to Russian aggression in Ukraine, and others have advocated stronger European contributions to collective defense measures in Europe. Increasingly, some Members of Congress have questioned whether NATO should take formal action against an ally, such as Turkey, which pursues foreign and defense policies that they believe could threaten alliance security. In light of these considerations, Members of Congress could focus on several key questions regarding NATO's future, including the following: addressing the strategic value of NATO to the United States and the United States' leadership role within NATO; examining whether the alliance should adopt a new strategic concept that better reflects views of the security threat posed by Russia and new and emerging threats in the cyber and hybrid warfare domains (NATO's current strategic concept was adopted in 2010); examining NATO's capacity and willingness to address other security threats to the Euro-Atlantic region, including from the MENA region, posed by challenges such as terrorism and migration; examining the possible consequences of member states' failure to meet agreed defense spending targets; assessing U.S. force posture in Europe and the willingness of European allies to contribute to NATO deterrence efforts and U.S. defense initiatives in Europe, such as the ballistic missile defense program and EDI; examining options to sanction allies that act in ways that jeopardize allied security; revisiting the allies' commitment to NATO's stated \"open door\" policy on enlargement, especially with respect to the membership aspirations of Georgia and Ukraine; and developing a NATO strategy toward China, particularly given U.S. and other allies' concerns about the security ramifications of increased Chinese investment in Europe.", "summary": "Heads of state and government from NATO's 30 member states met in London, United Kingdom (UK), on December 3-4, 2019. Two key goals for the meeting were to commemorate the alliance's past achievementsâ2019 marks NATO's 70 th anniversaryâand to advance efforts to address new and emerging security challenges, including Russian aggression, terrorism and instability in the Middle East and North Africa, and cyber and hybrid threats. The meeting also exposed heightened political tension within the alliance and divergent views on a range of issues, including U.S. policy toward NATO and Europe, relations with NATO member Turkey, and relations with Russia. In the six years since Russia occupied Crimea and invaded Eastern Ukraine, the United States has played a key role in renewing NATO's focus on territorial defense and deterring Russian aggression. Among other measures, NATO member states have deployed an Enhanced Forward Presence (EFP), totaling about 4,500 troops to the three Baltic States and Poland and including increased military exercises and training activities in Central and Eastern Europe. At the behest of the United States, the alliance also has sought to bolster its response to security threats posed by growing instability in the Middle East and North Africa, primarily through partnerships and training activities. NATO continues to lead a \"train and assist\" mission of about 16,500 troops in Afghanistan. In February 2020, NATO defense ministers agreed to expand NATO's training mission in Iraq, which currently consists of between 300 and 500 military trainers. The London meeting came at a tense time for NATO. Some allied governments argue that growing divergence between the United States and many European allies on a range of key foreign and security policy issues, from Iran's nuclear program to fighting the Islamic State terrorist organization in Syria, has impeded cooperation in NATO and exposed strategic rifts within the alliance. Some European allies have expressed particular concern about what they portray as a lack of U.S. coordination on policy in Syria, where many European countries have been assisting U.S.-led efforts to counter the Islamic State. Many allies also have criticized fellow NATO member Turkey for its military operations in Syria and its acquisition of a Russian-made air defense system. Although many Members of Congress have criticized specific developments within NATOâregarding burden sharing, for exampleâCongress as a whole has demonstrated consistent support for NATO. During the Trump Administration, congressional support at times has been viewed by some as an effort to reassure allies troubled by President Trump's criticisms of the alliance. Over the past several years, both chambers of Congress have passed legislation reaffirming U.S. support for NATO (e.g., H.Res. 397, H.R. 676 , H.R. 5515 / P.L. 115-232 , and H.Res. 256 in the 115 th Congress; S. 1790 / P.L. 116-92 in the 116 th Congress) and in some cases have sought to limit the President's ability to withdraw from NATO unilaterally ( H.R. 676 ; S. 1790 / P.L. 116-92 ). At the same time, Congress continues to assess NATO's utility and value to the United States, and some Members are concerned about key challenges facing NATO, including burden sharing, managing relations with Russia and China, and divergent threat perceptions within the alliance.", "document_type": "crs"}
{"report": "Credit unions are nonprofit depository financial institutions that are owned and operated entirely by their members. In other words, na tural person credit unions, also known as retail credit unions, are financial cooperatives that return profits to their memberships. For this reason, member deposits are referred to as shares , which may be used to provide loans to members, other credit unions, and credit union organizations; and the interest earned by members is referred to as share d ividends , which are comparable to shareholder profit distributions. Credit unions (and banks) engage in financial intermediation , or facilitating transfers of funds back and forth between savers (via accepting deposits) and borrowers (via loans). The National Credit Union Administration (NCUA), an independent federal agency, is the primary federal regulator and share deposit insurer for credit unions. There are three federal bank prudential regulators: the Office of the Comptroller of the Currency (OCC) charters and supervises national depository (commercial) banks; the Federal Deposit Insurance Corporation (FDIC) provides deposit insurance by collecting insurance premiums from member banks and places the proceeds in its Deposit Insurance Fund (DIF), which are subsequently used to reimburse depositors when acting as the receiver of a failed bank; and the Federal Reserve provides lender-of-last-resort liquidity to solvent banks via its discount window. The NCUA, by comparison, serves all three functions for federally regulated credit unions. The NCUA also manages the National Credit Union Share Insurance Fund (NCUSIF), which is the federal deposit insurance fund for credit unions. Although scholars are unable to pinpoint the precise origin of the credit union movement, the organization of membership-owned cooperatives to raise funds for members lacking sufficient collateral or wealth necessary to qualify for bank loans dates back to colonial times. During their infancy stages, credit cooperatives basically emerged as a form of microlending in financially underserved localities to provide unsecured small-dollar loans. Small group cooperatives initially relied on pooled funds, donations, and subsidies to make loans (allocated via lotteries or auctions) until evolving into self-sufficient systems more reliant on deposits. The advantage of small memberships for group credit cooperatives allow members to know each other, which facilitates peer monitoring of the lending decisions and borrowers' repayment behavior. The original concept of a credit union stemmed from cooperatives formed to promote thrift among its members and to provide them with a low-cost source of credit. Following numerous bank failures and runs during the Great Depression that resulted in an extensive contraction of credit, Congress sought to enhance cooperative organizations' ability to meet their members' credit needs. Congress passed the Federal Credit Union Act of 1934 (FCU Act; 48 Stat. 1216) to create a class of federally chartered financial institutions for \"promoting thrift among its members and creating a source of credit for provident or productive purposes.\" Over time, Congress expanded credit unions' permissible activities because the original concept of a credit union arguably needed to evolve with the marketplace. According to the NCUA, When Congress amended the FCU Act in 1977 to add an extensive array of savings, lending and investment powers, it intended to \"allow credit unions to continue to attract and retain the savings of their members by providing essential and contemporary services,\" and acknowledged that credit unions are entitled to \"updated and more flexible authority granting them the opportunity to better serve their members in a highly-competitive and ever-changing financial environment.\" H.R. Rep. 95â23 at 7 (1977), reprinted in 1977 U.S.C.C.A.N. 105, 110. Congress acknowledged the difficulty in \"regulating contemporary financial institutions within the framework of an Act that has on a continuing basis required major updating by means of regulation.\" Although small memberships may be more advantageous for informal microlending systems, advanced intermediation systemsâsuch as banking and the modern credit union industryâbenefit from economies of scale . In other words, more assets (loans), greater access to deposits, and increased transactions volumes provide greater risk diversification and lower average cost per transaction, thus reducing vulnerability to financial disruptions that would be confined to a particular small group. On April 19, 1977, P.L. 95-22 (the Mini Bill of 1977) substantially amended the FCU Act. It authorized the credit union industry to provide many financial products (e.g., loans, checking and savings deposit services) similar to those offered by the commercial banking system. Today, modern credit unions primarily engage in consumer and residential lending, and some originate commercial business loans for members. The lending and investment powers of the credit union industry, however, are still more restrictive than those of commercial banks. Credit unions can make loans only to their members, other credit unions, and credit union organizations, thus limiting who they can serve. A statutory interest rate cap for credit union loans exists (with exceptions that allow for sufficient earnings necessary to maintain credit availability). Loans made by federally insured credit unions are generally limited to 15 years (except for residential mortgages). Federal credit unions' investment authority is limited by statute to loans, government securities, deposits in other financial institutions, and certain other limited investments given their origins to promote thrift rather than be long-term investors. Business lending restrictions include an aggregate limit on an individual credit union's member business loan balances and on the amount that can be loaned to one member. If some or all of these restrictions are relaxed to allow the credit union system's lending powers to expand and become more comparable to the banking system, the prudential regulatory regimes arguably may require greater harmonization to protect against comparable financial risk exposures. This report focuses on policy developments pertaining to the credit union system. It begins with an overview of recent efforts to further expand system lending capacities. Next, it describes how the system's exposure to mortgage credit (default) risk grew after credit unions were given greater intermediation authorities in the mortgage lending space. It then discusses the system's financial distress and recovery resulting from the 2008 financial crisis, and updates the progress made to improve the system's resiliency to credit and insolvency risks. This discussion will use the balance sheet terminology defined in the box below. Congress has passed legislation, and the NCUA has implemented and proposed rules, supporting the expansion of lending activities that would increase financial transactions volumes (economies of scale). The expansion of lending activities, as discussed in this section, is likely to generate greater cash flows and revenues for the credit union system. A credit union's \"field of membership\" is the legal definition of who is eligible to join. Federal or state governments grant credit union charters on the basis of a \"common bond.\" There are three types of charters: a (1) single common bond (occupation or association based); (2) multiple common bond (more than one group each having a common bond of occupation or association); and (3) community-based (geographically defined) common bond. Individual credit unions are owned by their memberships. Credit union members elect a board of directors from their institution's membership (one member, one vote). Credit unions can make loans only to their members, other credit unions, and credit union organizations. Field of membership restrictions may limit an intermediary's ability to collect deposits, which are used to fund loans. Common bond requirements on credit unions can be considered analogous to U.S. restrictions on interstate and branch banking, which are no longer in place. By limiting access to supplementary sources of funds, a credit union (or bank) becomes more vulnerable to cash flow disruptions (e.g., increases in loan defaults, substantial deposit withdrawals) following adverse eventsâparticularly those that would directly affect its field of membership. Despite field of membership restrictions, some of the larger credit unions may still be able to achieve a sufficiently large and diversified depositor base, allowing them to enjoy greater economies of scale. Nevertheless, all intermediaries of all sizes are still vulnerable to a sudden need for liquid funds following some unexpected or adverse interest rate movements or a national recession, discussed in the section entitled \"Increased Exposure to Mortgage Credit Risk and Recent NCUSIF Management Initiatives.\" For this reason, access to more sources of depositors arguably enhances liquidity management for credit unions and banks, which typically have assets (portfolio loans) that are less liquid than their liabilities (deposits). On December 7, 2016, the NCUA published a final rule comprehensively amending its chartering and field of membership rules to maximize access to federal credit union services to the extent permitted by law. Although NCUA cannot change the three initial statutory field of membership categories, it revised certain terms such as local community , rural district , underserved area , and multiple common-bond credit union , among other things to broaden access to federal credit unions. Competitors of credit unions, however, legally challenged the revisions, arguing that an associational charter may limit the ability of a credit union to add underserved areas (e.g., local urban or rural underserved areas as determined by the NCUA) to its field of membership unless it also has a multiple common-bond charter. On August 20, 2019, the D.C. Circuit Court of Appeals upheld the rule but remanded two provisions of the NCUA's revised field of membership rule. One provision, to satisfy a community-based common bond charter, would have allowed a combined statistical area with fewer than 2.5 million people to qualify as a local community; arguably, this provision could have had a discriminatory impact on poor and minority urban residents. The second remanded provision would have raised the population limit for rural districts from the greater of 250,000 or 3% of the relevant state's population to 1 million people; some geographical areas arguably could have been defined to extend beyond the state borders of a credit union's headquarters. The NCUA proposed to clarify its authority to reject fields of membership applications that would want to exclude low- or moderate-income individuals. On November, 7, 2019, the NCUA proposed to re-adopt the provision pertaining to the combined statistical area to clarify existing requirements and add an explicit provision to the rule to address potential discriminatory concerns. Lending caps on member business (commercial) loans offered by credit unions did not exist until 1998. Congress included provisions in the Credit Union Membership Access Act of 1998 (CUMAA; P.L. 105-219 ) that established a commercial lending cap that limits most credit unions to lending no more than 12.25% of their assets to small businesses, among other provisions. The following passages from the Senate's CUMAA report explain the rationale for establishing the member business loan (MBL) cap. \"The purpose of H.R. 1151, the CUMAA, as reported from the Committee, is to amend existing law with regard to the field of membership of federal credit unions, to preserve the integrity and purpose of federal credit unions and to enhance supervisory oversight of federally insured credit unions.... The bill significantly strengthens the prudential safeguards applicable to federally insured credit unions and makes the credit union system safer, sounder and more resilient.\" \" Section 203. Limitation on member business loans . In new section 107A(a), the Committee has imposed substantial new restrictions on commercial business lending by insured credit unions. Those restrictions are intended to ensure that credit unions continue to fulfill their specified mission of meeting the credit and savings needs of consumers, especially persons of modest means, through an emphasis on consumer rather than business loans. The Committee action will prevent significant amounts of credit union resources from being allocated in the future to large commercial loans that may present additional safety and soundness concerns for credit unions, and that could potentially increase the risk of taxpayer losses through the National Credit Union Share Insurance Fund ('Fund').\" The CUMAA contained the following provisions: The MBL definition was codified and defined as \"any loan, line of credit, or letter of credit, the proceeds of which will be used for a commercial, corporate or other business investment property or venture, or agricultural purpose,\" but it does not include an extension of credit that is fully secured by a lien on a one-to-four-family dwelling that is a member's primary residence. The aggregate amount of MBLs that can be made by an individual credit union was limited to the lesser of 1.75 times the credit union's actual net worth or 1.75 times the minimum net worth amount required to be well-capitalized under the prompt corrective action supervisory framework, typically calculated to be 12.25%. Three exceptions to the aggregate MBL limit were authorized for credit unions (1) that have low-income designations or participate in the Community Development Financial Institutions program; (2) chartered for the purpose of making business loans (as determined by the NCUA); and (3) with a history of primarily making such loans (as determined by the NCUA). In addition to the statute, a NCUA regulation limits the aggregate amount of a business loan that can be made to one member or group of associated members at 15% of the credit union's net worth or $100,000, whichever is greater. On March 14, 2016, the NCUA implemented final MBL rules to replace the prescriptive requirements (and limitations) with a broad principles-based regulatory approach, which became effective on January 1, 2017. The prescriptive approach, for example, required credit unions to request MBL origination waivers for NCUA approval, among other requirements. According to the NCUA, the prescriptive approach took significant time and resources from both credit unions and NCUA, resulting in delays in processing MBL applications. The principles approach, by contrast, streamlines the MBL underwriting process by granting credit unions more flexibility and individual autonomy to best fit their members' needs. Credit unions are still expected to comply with prudential underwriting practices and commensurate net worth requirements. To facilitate the streamlined underwriting approach, the NCUA updated various MBL exemptions, resulting in several new definitions. For example, a commercial loan is a business loan (1) that is fully guaranteed by a federal or state agency or provides an advance commitment to purchase in full or (2) made to a nonmember or part of a joint lending arrangement with an entity that is not a member of the credit union system. Commercial loans do not count toward the MBL cap. On May 24, 2018, Section 105 of the Economic Growth, Regulatory Relief, and Consumer Protection Act (EGRRCPA; P.L. 115-174 ) amended the statutory MBL definition (i.e., it removed the words ''that is the primary residence of a member'') to address a disparity in the treatment of certain residential real estate loans made by credit unions and banks. The NCUA has since revised the MBL definition to exclude all extensions of credit that are fully secured by a lien on a one-to-four-family dwelling regardless of the borrower's occupancy status. For this reason, non-owner occupied real estate (e.g., rental property) loans are no longer considered MBLs and do not count toward the aggregate MBL cap. In addition to amending the MBL definition, EGRRCPA Section 103 amended the Financial Institutions Reform, Recovery, and Enforcement Act of 1989 (FIRREA; P.L. 101-73 ) to exempt from appraisal requirements certain federally related, rural real estate transactions valued at or below $400,000 if no state-certified or state-licensed appraiser is available. The NCUA implemented this provision in a July 2019 final rule. Depository institution lending typically requires appraised collateral as backing for the loans. The rise in home prices (since the $250,000 appraisal threshold was set in 1994) along with the innovation of less expensive automated appraisal valuations arguably has reduced the need for manual appraisals on less expensive homes, thereby lowering borrowers' closing costs. The NCUA also increased the appraisal threshold to $1 million for commercial real estate and qualified MBLs. The $1 million commercial appraisal threshold is higher than the current $500,000 for banks. The NCUA board, however, did not unanimously agree on the $1 million commercial appraisal threshold because, despite the system's low exposure to commercial real estate risks, the banking system still has more expertise evaluating and managing commercial lending risks than does the credit union system. The credit union industry has generally supported efforts to increase or eliminate the MBL cap. At the end of 2018, the NCUA reported that the credit union system originated 4.7% in MBLs relative to its assets. If MBL capacity were increased, some larger credit unions could become more competitive with small community banks as well as with some midsize and regional banks. Credit unions that currently enjoy a presence in the commercial lending market, have a sufficiently large asset base, or already operating close to the existing statutory limit would be more likely to increase their presence in the commercial market if the cap were raised. In addition, the credit union system as a whole can support increased member business lending by increasing its use of participation loans . Financial institutions use loan participations to provide credit jointly. The loan originator, that often structures the loan participation arrangement, typically retains the largest share of the loan and sells smaller portions to other institutions. This practice allows the originator to maintain control of the customer relationship (including the loan servicing) and overcome funding limitations. In addition, all of the institutions involved in the participation loan use their individual portions of the loan to diversify their asset (loan) portfolios, which can be a cost-effective financial risk management tool. The credit union system could, therefore, become a more prominent competitor in the commercial lending market with the banking system, which also uses participation lending arrangements to diversify risks. Nevertheless, because all lending entails exposure to financial risks, having multiple credit unions involved in participations would still pose risk to the NCUSIF. From an economics perspective, a lending cap imposes an arbitrary limit that may be too high for some credit unions and too low for others, thus resulting in MBL shortages in the latter situations. For those credit unions that provide very few or no MBLs, a cap is irrelevant. Credit unions facing an active MBL market must abruptly cease this type of lending when activity volume reaches the cap, which some may argue is set \"too low,\" given that they can no longer satisfy their memberships' financial needs. Hence, a lending cap is arguably a blunt instrument to the extent that it imposes the same requirement on all institutions without taking into account differences in asset size and market purview. Alternatively, a policy tool with a greater focus on the costs to originate MBLsâspecifically subjecting the net income derived from MBL activities to a type of taxâwould impose financial costs on credit unions without directly capping their lending ability. For example, the unrelated business income tax (UBIT) for tax-exempt organizations could be applied to MBLs. At the entity level, credit unions are exempt from federal income tax because they are not-for-profit financial cooperatives. If, for example, a credit union were to provide financial services (e.g., check-cashing) to nonmembers, any revenue generated from those activities would be subject to UBIT. Likewise, implementing the UBIT for MBLs would allow costs to grow in proportion to the amount of MBL activity while minimizing an abrupt discontinuation of the activity for those credit unions nearing an established policy cap. Another policy option, also with similarities to a tax, would be to adopt capitalization requirements comparable to those implemented for the banking system. The CUMAA established the MBL cap and a capital-based supervisory framework as tools to enhance prudential safety and soundness, ultimately providing more protection for the share deposit insurance fund. Enhanced capitalization (net worth) requirements arguably could substitute for an MBL cap. In short, policy tools operating via cost disincentives rather than quantity restrictions may still allow the credit union system to restrain MBL activity but with more flexibility for certain circumstances. As previously discussed, the credit union system has evolved to a formal intermediation system that provides a range of financial services; however, it still has not acquired all of the lending powers comparable to those of banks. In addition, some of the system's current lending authorities are temporary and must be regularly renewed. This section reviews some of the temporary or limited lending authorities that the credit union industry and some policymakers argue could be enhanced. The FCU Act sets an annual 12% interest rate ceiling (or cap) for loans made by federally chartered credit unions and federally insured state-chartered credit unions. The statutory loan interest rate ceiling was raised to 15% per annum after the Depository Institutions Deregulation and Monetary Control Act of 1980 (DIDMCA; P.L. 96-221 ) was passed. The DIDMCA also authorized the NCUA to set a ceiling above the 15% cap for up to an 18-month period after consulting with Congress, the U.S. Department of the Treasury, and other federal financial agencies. The credit union interest rate ceiling is currently set at 18%. According to NCUA notices, its interest rate ceiling is an annual percentage rate (APR) rather than a pure interest rate. The APR represents the total annual borrowing costs of a loan expressed as a percentage, meaning that it is calculated using both interest rates and origination fees. The text-box below explains more about how to calculate and interpret the APR. In December 1980, the NCUA board raised the ceiling to 21%. In May 1987, the board reduced the rate ceiling and has since maintained it at 18%. When setting the interest rate above 15%, the NCUA must (1) review money market interest rate trends and (2) assess how prevailing interest rate movements (volatility) might threaten credit unions' safety and soundness in terms of the ability to sustain their lending activities, the effect on their net-interest income (earnings), and the effect on their liquidity. In July 2018, for example, the board expressed concern that a ceiling below 18% could result in lower net interest income, considered to be the key driver of credit union earnings, thus reducing credit union profitability and limiting borrowers' access to credit. On January 23, 2020, the board retained the current 18% rate ceiling for federally insured credit union loans, from March 11, 2020, through September 10, 2021, after (1) observing rising money market rates over the preceding six-month period; (2) observing adverse liquidity, capital, earnings, and growth trends; and (3) consulting with the relevant federal agencies. The Military Lending Act of 2006 (MLA; P.L. 109-364 ) was passed to protect active duty military personnel and their eligible family members from predatory lending. The MLA limits the Military Annual Percentage Rate (MAPR) to 36% for small-dollar loans and credit products, such as credit cards, deposit advances, overdraft lines of credits, and certain types of installment loans. Â The MLA, however, does not apply to mortgages, automobile loans, and secured loans. A credit union borrower typically receives an APR below the MAPR ceiling for covered transactions. Hence, the credit union interest rate ceiling is currently below the federal MLA cap on consumer loans offered to military personnel. The NCUA, however, permits the credit union system to make payday alternative loans (PALs) to its membership with certain restrictions. Under the existing permissible framework, PAL amounts may range from $200 to $1,000; they must have fully amortizing payments; the term length must range from 46 days to 180 days; and the application fee must be $20 or less. If the borrower cannot repay the initial PAL, a credit union may allow for a rollover into a new PAL of the same initial maturity as long as no additional fees are charged or no additional credit is extended. No more than three PALs can be made to a single borrower in a rolling six-month period. This specific loan product, referred to as a PALs I, requires a one-month membership before it can be offered. The PALs program has a 28% ceiling, meaning that it is exempt from the 18% interest rate ceiling that covers other loan originations made by federally insured credit unions and from the 36% MAPR ceiling. The MAPR ceiling includes the origination fees, but the NCUA PALs ceiling excludes the $20 origination fee. The PAL loan APR when including the $20 origination fee, in many cases, exceeds the 36% MAPR ceiling. To avoid lending reductions by credit unions to military service customers, the NCUA requested and was granted a PAL exemption from the MAPR so that the PAL application fee is not included in the APR computation. The higher PAL ceiling also does not include an initial origination fee of up to $20 in the APR calculation. On October 1, 2019, the NCUA broadened the PALs framework to allow credit unions to offer additional short-term, small-dollar products. A new PALs II product may have an amount up to $2000 and have fully amortizing payments over a 1-to-12-month term. Furthermore, there is no minimum membership length requirement to be eligible for a PALs II, which may allow borrowers to quickly consolidate multiple non-credit union payday loans into one PALs loan. Credit unions may not charge any overdraft or insufficient funds fees for any PALs II drawn against a member's account, which may reduce the likelihood of creating a negative balance in the account while still allowing credit unions to make sufficient (as opposed to maximum) profit in this line of business. When the FCU Act was initially passed, credit unions were allowed to make loans not to exceed two years. Congress has since increased system-originated loan maturity lengths. On September 22, 1959, Section 8 of P.L. 86-354 amended the FCU Act to increase credit union loan maturities for up to 5 years. On July 5, 1968, Section 1 of P.L. 90-375 amended the FCU Act to allow credit unions to make unsecured loans with maturities not to exceed 5 years and secured loans with maturities not to exceed 10 years. The Mini Bill of 1977 allowed loan maturities not to exceed 12 years. It also allowed credit unions to make residential real estate loans with maturities up to 30 years; home improvement loans and mobile home loans (for principal residence) were allowed for up to 15 years. The Garn-St. Germain Depository Institutions Act of 1982 (Garn-St. Germain Act; P.L. 97-320 , 96 Stat. 1469) permitted mortgage loan refinancing, and extended the maturity limit to 15 years for all second mortgages. The Competitive Equality Banking Act of 1987 (CEBA; P.L. 100-86 ) amended the FCU Act to authorize the NCUA to allow second-mortgage, home-improvement, and mobile home loans beyond 15 years. On October 1989, the NCUA finalized the rule to extend the maturity limit to 20 years. On October 13, 2006, Section 502 of P.L. 109-351 amended the FCU Act to set a 15-year maximum maturity on credit union loans, with some exceptions. For example, residential one-to-four family mortgages may exceed the 15-year maturity term as long as the property is the borrower's primary residence. In the 116 th Congress, H.R. 1661 was introduced on March 8, 2019, and referred to the House Committee on Financial Services. H.R. 1661 , if enacted, would amend Section 107(5) of the FCU Act to allow NCUA the flexibility to extend maturities for all loans, including MBLs and student loans. Congress created the NCUSIF in 1970 to be the insurance fund for all federally regulated credit unions. The NCUA manages the NCUSIF, which is completely funded by insured credit unions. The NCUSIF's primary income source is the premiums collected from credit unions, which pay the fund's operating expenses, cover losses, and build reserves. Premiums were originally set at one-twelfth of 1% of the total amount of member share accounts, but P.L. 98-369 required each federally insured credit union to maintain a fund deposit equal to 1% of its insured share accounts. Examination fees and any penalties NCUA collects from insured institutions are also deposited into the NCUSIF. Fund portions not applied to current operations can be invested in government securities, and the earnings also generate fund income. The NCUSIF's reserves consist of the 1% deposit, plus the fund's accumulated insurance premiums, fees, and interest earnings. Prudential safety and soundness regulation, which includes holding sufficient capital reserves, may reduce the financial institutions' insolvency (failure) risk and promote public confidence in the financial system. Although higher capital requirements may not prevent adverse financial risk events from occurring, more capital enhances the financial firms' ability to absorb greater losses associated with potential loan defaults. The enhanced absorption capacity may strengthen public confidence in the soundness of these financial institutions and increase their ability to function during periods of financial stress. For this reason, the NCUA has proposed enhanced net worth (capitalization) requirements for credit unions, which is intended to increase the credit union system's resilience to insolvency risk and to minimize possible losses to the NCUSIF and ultimately to taxpayers. These prudential issues are discussed in this section. Credit unions were granted the authority to increase their participation in the mortgage market during the late 1970s and 1980s. In light of the savings and loan (S&L) crisis, discussed in the text box below, the credit union system was also granted more powers to mitigate interest rate risk stemming from exposure to mortgage market risk. The following list highlights some of these authorities: After the Mini Bill of 1977 was passed, the NCUA adopted regulations on August 7, 1978, permitting credit unions to sell mortgage loans in the secondary marketâspecifically to Fannie Mae, Freddie Mac, and Ginnie Mae (government-sponsored enterprises, or GSEs) as well as to federal, state, and local housing authorities. On August 16, 1978, federal credit unions were also granted the authority to sell their members' federally guaranteed student loans. The Garn-St. Germain Act, as mentioned, eliminated limits on the size and maturity of first lien mortgages, permitted refinancing of mortgage loans, and extended the maturity limit to 15 years for all second mortgages. The CEBA amended the FCU Act to authorize the NCUA to allow second-mortgage, home-improvement, and mobile home loans beyond 15 years. The Garn-St. Germain Act also amended the FCU Act to allow credit unions to issue and sell securities, which are guaranteed pursuant to Section 306(g) of the National Housing Act. In other words, federal credit unions were given the authority to participate in activities that would allow them to securitize assets. In 1988, the NCUA allowed credit unions to invest in mortgage-backed securities (MBS). Rather than hold, for example, 30-year mortgages, the ability to hold MBS of shorter (e.g., 10 year) maturities reduces asset duration risk (discussed in the text box below). In 1989, credit unions were allowed to use financial derivatives to purchase insurance against declines in GSE-issued MBS values that would occur after a rise in interest rates, thus protecting the overall value of their asset (loan) portfolios. (NCUA noted that the credit union system had experienced a 48% increase in real estate lending in 1987.) Consequently, as credit unions and other financial intermediaries increased their participation in the mortgage market, they also grew more susceptible to the financial risks linked to this market. Rising interest rates was a major risk factor in the S&L crisis during the 1980s, whereas rising mortgage defaults or credit risk was a major factor in the financial crisis that occurred in 2008. Because of the greater exposure to mortgage credit risk, the credit union system along with numerous financial entities in 2008 experienced distress after a sharp rise in the percentage of seriously delinquent mortgage loans in the United States. According to the NCUA chairman, corporate credit unions faced increasing liquidity pressures during 2008 after a significant portion of their MBSsâfollowing a deterioration of the underlying real estate collateralâlost value and were subsequently downgraded below investment grade. Corporate credit unions operate as wholesale credit unions, meaning that they provide financing, investment, and clearing services for the retail credit unions that interface directly with customers. The corporates accept deposits from, as well as provide liquidity and correspondent lending services to, retail credit unions. This reduces the costs that smaller institutions would bear individually to perform various financial transactions for members. Given that retail credit unions are cooperative owners of corporate credit unions, they are also federally insured by the NCUSIF. The NCUA placed two corporate credit unions into conservatorship in March 2009 and three additional corporates in September 2010. The five corporates under conservatorship at the time had represented approximately 70% of the entire corporate system's assets and 98.6% of the investment losses within the system. The share equity ratioâthe ratio of total funds in the NCUSIF relative to the estimated amount of share deposits held by credit unionsâis an indicator that represents the adequacy of reserves available to protect share depositors and maintain public confidence. The NCUA annually determines the normal operating level for the share equity ratio, which statutorily must fall between 1.2% and 1.5%. The 2006 equity ratio was 1.30% and fell below the statutory minimum to 1.18% by August 2010. The NCUA board may assess a premium when the ratio falls between 1.2% and the declared operating level; however, it is required to assess a premium if the equity ratio falls below 1.2%. Similarly, the NCUA board may declare a dividend if, at the end of the calendar year, the equity level exceeds the normal operating level; it is required to do so if the equity ratio exceeds 1.5%. Rather than deplete the NCUSIF, Congress in May 2009 established a Temporary Corporate Credit Union Stabilization Fund (TCCUSF) to accrue and recover losses from the corporates. The TCCUSF borrowed from Treasury to help cover conservatorship costs, and the NCUA also raised assessments on all federally insured credit unions, including those that did not avail themselves of corporate credit union services. The premium assessment reflected a plan to restore the NCUSIF equity ratio to 1.3%, which happened by December 2011. After achieving a positive net position of $1.9 billion as of May 2017, the NCUA, in July 2017, proposed closing the TCCUSF and providing credit unions with a Share Insurance Fund distribution in 2018, estimated to be between $600 million and $800 million. The TCCUSF officially closed on October 1, 2017; its assets and obligations were transferred to the NCUSIF. The NCUA reduced the share equity ratio from 1.39, which had previously been set in September 2017, to 1.38, administering an equity distribution (rebate) of $160.1 million to member institutions. On January 23, 2014, the NCUA announced increases in capital requirements for a subset of natural person credit unions designated as complex . NCUA initially defined a complex credit union to have at least $50 million in assets. On January 27, 2015, the NCUA revised the initial proposed rule, amending the definition as having at least $100 million in assets. On October 29, 2015, the NCUA finalized the risk-based capital rule. Some of the rule's specific requirements included the following: A new asset risk-weighting system was introduced that would apply to complex credit unions, which would be more consistent with the methodology used for U.S. federally insured banking institutions. A new risk-based capital ratio (defined using the narrower risk-based capital measure in the numerator and total risk-weighted assets, which are computed using the new risk-weighting system, in the denominator) of 10% would be required for complex credit unions to be well-capitalized under the prompt corrective action supervisory framework. The risk-based capital ratio was designed to be more consistent with the capital adequacy requirements commonly applied to depository (banking) institutions worldwide. Compliance of complex credit unions with the risk-based capital ratio requirements as well as the existing statutory 7% net-worth asset ratio would have been effective by January 1, 2019, to avoid NCUA supervisory enforcement actions. Non-complex credit unions with assets below $100 million would not have been required to comply with the new risk-weighting system, and they would no longer be required to risk-weight their assets. Instead, non-complex credit unions must comply with the existing statutory 7% net-worth asset ratio. Credit unions with a concentration in commercial lending in excess of 50% of their total assets would be required to hold higher amounts of net worth to abate the higher levels of concentration risk. On December 17, 2019, the NCUA issued a final rule to move the effective date to January 1, 2022. The NCUA also amended the complex credit union's definition by increasing the asset threshold level from $100 million to $500 million. The NCUA also wanted more time to consider the feasibility of adopting a capital framework for the credit union system that would be similar to the community bank leverage ratio framework. Under this framework, banks with less than $10 billion in average total consolidated assets may elect to maintain a leverage ratio of greater than 9% to satisfy both the risk-based and leverage capital requirements to be well-capitalized. Nevertheless, the delays have prompted some Members of Congress to monitor the implementation progress of the risk-based capital rule for credit unions. Because credit unions do not issue common stock equity, they do not have access to capital sources beyond retained earnings. If alternative sources of capital, referred to as supplemental capital, were to be used in addition to net worth, then credit unions would be able to increase their lending while remaining in compliance with their safety and soundness net worth requirements. The proposal discussed below to adopt supplemental capital requirements would enhance the credit union system's lending capacity and introduce a new prudential risk management tool. An NCUA working group has developed three general sources of supplemental capital, all of which would be repaid after reimbursement of the NCUSIF following liquidation of an insolvent credit union. Credit unions could raise voluntary patronage capital (VPC) if (noninstitutional) members were to purchase \"equity shares\" in the organization. VPC equity shares would pay dividends; however, a VPC investor would not obtain any additional voting rights, and no investment would be allowed to exceed 5% of a credit union's net worth. mandatory membership capital (MMC) if a member pays what may be conceptually analogous to a membership fee. MMC capital would still be considered equity for the credit union but, unlike VPC, it would not accrue any dividends. subordinate debt (SD) from external and institutional investors. SD investors would have no voting rights or involvement in a credit union's managerial affairs. SD would function as a hybrid debt-equity instrument, meaning the investor would simply be a creditor with no equity share in the credit union while it is solvent and would not be repaid principal or interest should the credit union become insolvent. SD investors must make a minimum five-year investment with no option for early redemption. A credit union 's net worth is defined in statute; therefore, congressional legislative action would be required to permit other forms of supplemental capital to count toward their net worth prudential requirements. Credit union industry advocates argue that lifting lending restrictions to make the system more comparable with the banking system would increase borrowers' available pools of credit. Community banks, which often compete with credit unions, argue that policies such as raising the business lending cap, for example, would allow credit unions to expand beyond their congressionally mandated mission and could pose a threat to financial stability. By amending the FCU Act several times to expand permissible lending activities, Congress arguably had recognized that the credit union system has evolved into a more sophisticated financial intermediation system. Congress has also emphasized prudential safety and soundness concerns. Following the 2008 financial crisis, the federal bank prudential regulators implemented prudential requirements to enhance the U.S. banking system's resiliency to systemic risk events. The NCUA initially proposed in 2014 to increase capital requirements particularly for large credit unions (those with $500 million or more in assets); however, the proposal has been revised, delayed, and is currently scheduled to become effective in January 2022. In the meantime, the NCUA has implemented and proposed rules to support expanding lending activities that would increase financial transactions volumes (economies of scale), thus possibly generating greater cash flows and profitability for the credit union system. The adoption of enhanced prudential net worth requirements for the credit union system, however, arguably may facilitate mitigating the financial risks that typically accompany increases in lending.", "summary": "Credit unions make loans to their members, other credit unions, and corporate credit unions that provide financial services to individual credit unions. Historically, credit unions have faced statutory restrictions on their lending activities, including restricting lending activities to their members. Other lending restrictions include a 15% statutory loan interest rate ceiling, with some authority to operate above the cap under certain circumstances; a 15-year maturity limit on most loans (with some exceptions, such as residential mortgages); and an aggregate limit on an individual credit union's member business loan (MBL) activity (in the form of outstanding loan balances) and on the amount that can be loaned to any one member. Congress passed the Federal Credit Union Act of 1934 (FCU Act; 48 Stat. 1216) to create a class of federally chartered financial institutions to \"promote thrift among its members and create a source of credit for provident or productive purposes.\" The original concept of a credit union stemmed from small lending cooperatives that not only provided a low-cost source of credit for but also promoted thriftiness among their members. Since their inception, credit unions have been granted additional lending authorities as the marketplace has evolved. Nevertheless, the credit union system still faces more restrictions than the commercial banking system. Credit union industry advocates argue that lifting lending restrictions to make the system more comparable with the banking system would increase borrowers' available pools of credit. Community banks, which often compete with credit unions, argue that policies such as raising the business lending cap, for example, would allow credit unions to expand beyond their congressionally mandated mission and could pose a threat to financial stability. By amending the FCU Act several times to expand permissible lending activities, Congress arguably recognizes that the credit union system has evolved into a more sophisticated financial intermediation system. In addition to various FCU Act amendments over the past several decades, Congress has recently passed various legislation that would allow credit unions to expand their lending activities. For example, P.L. 115-174 revised the MBL definition, allowing credit unions to extend loans to one-to-four family dwellings regardless of whether the dwellings are primary residences. In the 116 th Congress, H.R. 1661 has been introduced and, if enacted, would amend the FCU Act to allow the National Credit Union Administration (NCUA)âthe primary regulator of federally insured credit unionsâthe flexibility to extend loan maturities for all loans, including MBLs and student loans. Recognizing credit unions' primary mission as meeting consumers' credit and savings needs, Congress emphasized prudential safety and soundness concerns when it established the statutory cap on MBLs and a capital supervisory framework for the credit union system. Following the 2008 financial crisis, the federal bank prudential regulators (i.e., the Federal Reserve, the Office of the Comptroller of the Currency, and the Federal Deposit Insurance Corporation) enhanced their prudential capital requirements to increase the U.S. banking system's resilience to systemic risk events. Likewise, the NCUA initially proposed in 2014 to increase capital (net worth) requirements particularly for large credit unions (those with $500 million or more in assets); however, the proposal has been revised and delayed and is currently scheduled to become effective in January 2022. In the meantime, the NCUA has implemented and proposed rules to support expanding lending activities that would increase financial transactions volumes (economies of scale), thus increasing the array of loan product offerings for members and potential revenues for the credit union system. Likewise, Congress has been monitoring the extent to which the adoption of enhanced prudential capital requirements for the credit union system has kept pace with the bank prudential regulatory regime.", "document_type": "crs"}
{"report": "The 116 th Congress is considering multiple proposed changes to U.S. mineral policy. Currently certain types of mineral production on federal lands provide the federal government and some states and industries with sources of revenue, while other production does not generate similar revenue. Proposed changes to federal mineral policy could impact these revenue streams, industries, and states in a variety of ways. The North American Industry Classification System (NAICS) defines the term mining to \"include ore extraction, quarrying, and beneficiating (e.g., crushing, screening, washing, sizing, concentrating, and flotation), customarily done at the mine site.\" Mineral mining in the United States had a value added of $60.6 billion in 2018, which was about 0.3% of total U.S. value added (i.e., GDP). The value-added contribution to total economic output of minerals mined on federal lands is not known, as not all of the underlying data are recorded by the Bureau of Land Management (BLM) or reported by mine operators. Using available data, the U.S. Department of the Interior (DOI) estimates that coal and solid minerals mined on federal lands supported $13.9 billion in value added, $24.2 billion in economic output, and 81,700 jobs in FY2018. This report offers an introduction to the framework created by federal statutes applicable to mining on federal lands. It also highlights some topics in the mining sector that may be relevant to the issue of mining on federal lands for the 116 th Congress, such as the availability of mineral production data; royalties assessed on federal minerals; federal land withdrawals; and critical minerals on federal lands. While the focus of this report is on mining on federal lands, some related topics and concepts are included within this focus. The statutory framework applicable to mining on federal lands is a combination of mineral laws, land laws, and laws that impact mining directly or indirectly. These combinations can be complex when discussing specific minerals and mineral topics, as the statutes applying to one situation may be different for another situation. This introduction to the statutory framework is presented in four subsections: \" Laws Establishing Mineral Categories ,\" \" Land Laws Applicable to Mining ,\" \" Laws That Apply to Mining on Federal and Non-Federal Lands ,\" and \" Selected Federal Laws That May Impact Mining on Federal Lands .\" This section presents the statutory framework for mining on federal lands; the section \" Processes Related to Mining on Federal Lands \" presents more detail on the regulated processes to mine the different categories of minerals on federal lands. The present regulatory framework applicable to mining on federal lands generally places minerals into three categories: locatable (or hardrock ), leasable , and salable . The latter two categories stem from two major changes to the General Mining Law of 1872, which encompassed all mineral deposits on federal lands that were considered valuable. The mining of leasable minerals requires lease and royalty payments; salable minerals generally only require a payment for the quantity purchased. The laws that define the leasable and salable categories are explained in the next two subsections. Locatable minerals originally included all minerals, but now this category includes only those minerals not covered by other laws: a locatable mineral is a mineral that is not leasable or salable. Locatable minerals are typically high-value minerals; some examples include gold, copper, lead, gypsum, and gemstones. An otherwise locatable mineral is a leasable mineral if it is on acquired land (see \" Mineral Leasing Act for Acquired Lands \"). Locatable minerals mined on federal lands are not subject to federal royalties. Leasable minerals are defined by the Mineral Leasing Act of 1920, and include minerals such as coal, phosphate, potassium, and sodium. Pursuant to this act, mining of these minerals on federal land is conducted under a statutory and regulatory framework similar to that of producing oil and natural gas, including lease payments and production royalties. The leasing process may be competitive, and the resulting leases are required to obtain fair market value for the public. Salable minerals (or mineral materials) are defined by the Materials Act of 1947, and include low-value, common minerals and materials (i.e., not considered locatable minerals due to their low value), such as sand, gravel, and pumice. Salable minerals from federal lands are sold to the public at fair market value from community pits, common resource area, or under more formal arrangements for large quantities. Salable minerals can be obtained for free by some entities, including government entities and non-profit organizations. Unless found in unusually valuable deposits, salable minerals are no longer covered by the General Mining Law of 1872. The present land area of the United States, excluding territories and possessions, is approximately 2.4 billion acres, and is the culmination of land purchases, cessions, and acquisitions. As the country's land area grew, public policies were enacted to encourage settlement and private land ownership of previously federal lands. These and other policies resulted in changes to the acreage of federal lands; these changes continue, although more slowly in recent years. Four federal land management agencies include the BLM, the Fish and Wildlife Service (FWS), and the National Park Service (NPS) in the DOI, and the Forest Service (FS) in the Department of Agriculture. The BLM managed 244.4 million acres of surface lands (about 10% of the total surface area) and 708.5 million acres of the federal mineral estate (about 29% of the total surface area) of the United States in 2018. The laws and regulations applicable to mining on federal lands vary for different arrangements of surface and subsurface ownership, and if the lands are part of the public domain . The following examples illustrate some of the potential complexities related to mining on federal lands for different situations. Mining may be allowed in a national forest, whose surface is managed by the U.S. Forest Service and whose subsurface is managed by the BLM. New mining claims are not allowed in national parks. Regulations for mining on acquired lands may be different from regulations for mining on other federal lands, depending on the mineral. The Department of Energy manages and leases about 25,000 acres of federal land that was withdrawn from the public domain for mining uranium, which would otherwise be a locatable mineral. Mineral production data for a given mineral may or may not be publicly available, depending on the type of federal land on which it is found. The following three subsections highlight statutes related to federal lands that directly impact mining on federal lands. The Federal Land Policy Management Act (FLPMA) establishes statutory guidance for DOI and BLM management of federal lands, including the federal mineral estate. FLPMA directs the BLM to manage federal lands according to the principles of multiple use and sustained yield . FLPMA codifies the policy that public lands remain in federal ownership, unless the DOI determines disposal of public lands is in the national interest, and that fair market value is to be obtained for use of federal lands. Under FLPMA, the BLM prepares resource management plans (or land use plans ) through a defined process that incorporates public input, including environmental, historical, and societal values, from a variety of stakeholders. Where the BLM is not the surface management agency of a proposed mining operation, FLPMA directs the BLM to coordinate with the surface management agency. FLPMA provides authority to DOI to withdraw lands from mineral entry (i.e., no new mining is allowed). Acquired lands are lands that federal agencies purchased, received by donation or exchange, or acquired through eminent domain; millions of acres have been acquired by the federal government. Generally, minerals that would otherwise be considered locatable are leasable if they are on acquired lands, per the Mineral Leasing Act for Acquired Lands, as amended, which became law in 1947. Specific legislation could allow for different treatment of such minerals on acquired lands. The Stock Raising Homestead Act of 1916 allowed settlers to claim the surface rights of 640 acres of federal land, while the subsurface rights remained with the federal government. When the surface owner does not own the subsurface rights, the joint ownership is designated split estate . No new split estate lands have been created under the Stock Raising Homestead Act since 1976. The process to explore and claim mineral deposits on split estate lands requires additional steps, as the surface owner must be notified, and compensated in the case of damage to the surface resulting from the mining operation. Two laws are discussed in this subsection. The first is applicable to all mining, including all mining on federal lands. The second is applicable to all coal mining, about 43% of which was produced on federal lands in 2018. The Federal Mine Safety and Health Act (FMSHA), as amended, created the Mine Safety and Health Administration (MSHA) within the Department of Labor. MSHA develops and enforces safety and health rules for all U.S. mines regardless of size, number of employees, commodity mined, method of extraction, or land ownership. The Surface Mining Control and Reclamation Act (SMCRA), as amended, established the Office of Surface Mining Reclamation and Enforcement (OSMRE) within the Department of the Interior. SMCRA applies to all coal mining operations, including those on federal and Native American lands. OSMRE's objectives \"are to ensure that coal mines are operated in a manner that protects citizens and the environment during mining and assures that the land is restored to beneficial use following mining, and to mitigate the effects of past mining by aggressively pursuing reclamation of abandoned coal mines.\" Among other requirements, SMCRA establishes that, as a prerequisite for obtaining a coal mining permit, the applicant is required to post a reclamation bond. Other laws and statutes may apply to mining on federal lands in certain situations. Below is a selected list of such statutes with a reference for more information; a range of other federal and state laws may also apply on a case-by-case basis. Application of these laws and statutes vary widely for different mining operations; further discussion is beyond the scope of this report. National Environmental Policy Act of 1969 (NEPA) Clean Water Act of 1972 (CWA) Clean Air Act (CAA) Endangered Species Act of 1973 (ESA) National Historic Preservation Act of 1966 (NHPA) The process to mine on federal lands generally begins with the interested person identifying the surface management agency (or owner, if the land is split estate) and the subsurface management agency, if different. The surface management agency can assist with the process to determine whether the area targeted for mining has been previously claimed, leased, or withdrawn from the federal mineral estate. This can occur when lands are designated as national parks, monuments, or military bases, among others. The agency can also ensure that the targeted area and mineral estate are still under federal control, as changes can occur that would give control to private entities, state governments, or Indian governments. The managing agency can also indicate whether the targeted area is acquired land, for which, in most cases, mineral leasing applies. Further, the managing agency can indicate the required information and processes to explore and potentially mine in a given area; such requirements can vary among agencies and within agency offices. Aside from special cases, the BLM is the subsurface management agency for mining on federal lands. Additional considerations and regulations may apply to Indian territories, which number more than 300 territories and cover more than 56 million acres. Indian tribes and persons retain the right to develop or allow others to develop mineral resources on their lands. The BLM may be invited to provide assistance, in which case \"the BLM's authorities and responsibilities include, but are not limited to, resource evaluation, approval of drilling permits, mining and reclamation, production plans, mineral appraisals, inspection and enforcement, and production verification.\" The subsequent steps in the process to open a new mine on federal lands depend on the type of mineral to be mined (i.e., locatable, leasable, or salable), as the processes vary by mineral category. If the mineral of interest is locatable and on federal lands open to mineral entry not previously claimed, exploration that does not result in surface disturbances (e.g., rock-hounding or use of hand-operated tools) can begin without a permit; a permit may be required if surface disturbance is expected. Establishing or staking a claim is the statutorily defined process of physically indicating and publicly recording the specific boundaries of the area containing the mineral(s). The local field office of the applicable surface management agency can assist with this process, but the person exploring is responsible for knowing if a specific area is subject to being claimed (i.e., there is not an existing prior claim on that area, and that the area is open to mineral entry). If a reasonable quantity of a locatable mineral is found on public land that is open to mineral entry and has not yet been claimed, the area can be claimed. The two types of mineral claims defined by statute are lode claims and placer claims. Lode claims pertain to valuable minerals in an undisturbed state or location (i.e., rock in place); placer claims refer to valuable minerals that have been moved and deposited in a location different from the mineral's formation, typically due to erosion (e.g., sediment bars along streams). A lode claim cannot be longer than 1,500 feet along the main axis and wider than 300 feet on each side of the axis; an individual placer claim cannot exceed 20 acres. If the BLM is both the surface and subsurface manager, it then works with the operator to approve a required notice or a plan of operation . The mine operator is required to submit an estimate of the reclamation costs to the BLM for approval, after which the mine operator provides a financial guarantee equal to that amount to the BLM. The financial guarantee is held until operations have ceased and the site has been acceptably reclaimed, as determined by the BLM. A claimant must pay a location fee when first recording the claim. An annual maintenance fee is also required. Claim holders may be required to file annual documentation required by FLPMA. More detailed processes need to be followed if exploring on split-estate lands. Under the General Mining Law, mining claims meeting certain conditions are allowed to be patented , which typically transfers all rights to the claim holder. However, starting in 1994, Congress, through appropriations laws, has continually placed one-year moratoria on the patent process. If the mineral of interest is leasable, which generally includes otherwise locatable minerals on acquired lands, exploration requires a permit or license a pr ospecting permit is required to identify valuable deposits of leasable minerals in areas where valuable deposits have not yet been identified; an exploration license is required if additional information is desired by the prospective miner regarding a known deposit. If a valuable deposit is identified by a prospecting permit holder (and other conditions are met), the BLM may issue the holder a preference right lease . The BLM may issue a notice for a competitive lease sale on unleased, leasable parcels known to contain valuable mineral deposits. Some leasable minerals are subject to minimum royalties, including 5% of the value of gross output for sulfur and phosphate; 2% of the value of gross output for potassium and sodium; and 25 cents per ton of marketable production for asphalt. Unless otherwise indicated by the BLM, leases require the payment of rent, royalties, and the posting of a reclamation bond; reclamation includes removal of machinery and structures, in addition to required grading and re-vegetation. Many of the steps needed to obtain mining permits, leases, or licenses require the payment of cost-recovery fees to agencies and local governments. Coal is a leasable mineral and follows the general process for leasable minerals. However, coal exploration and coal leasing on federal lands are subject to specific regulations and statutes. Coal exploration begins with a designation that the land in question is suitable for coal leasing. Coal exploration requires an exploration license, an exploration bond, and conformance with various federal statutory obligations, and also includes conformance of the regulations promulgated by SMCRA. After any party expresses interest in exploring for coal, the BLM is to publish a notice of in vitation calling for other interested parties to jointly explore the indicated tract of federal land. Existing coal regions on federal lands may have tracts available for lease that do not require additional exploration. While some exceptions exist, coal leases are to be issued through the competitive process lease by application . This process begins when an interested party files an application of interest with the BLM for a tract of land previously identified as suitable for coal mining by the BLM. The BLM publishes notices of the lease sale and invites others to submit sealed bids for the lease. The lease is awarded to the highest bid that is at least equal to the fair market value of the lease (conditional on other requirements being met). Only U.S. citizens, associations, corporations, and public bodies are able to obtain coal leases. No entity is permitted to own or control coal leases on federal lands exceeding 75,000 acres in any one state or 150,000 acres in the United States. Coal leases require an annual rental payment of a minimum of $3 per acre, to be specified in the lease. Coal mining on federal lands requires the payment of royalties. The royalty for surface mined coal is a minimum of 12.5% of the gross value of coal produced, and the royalty for coal mined by underground mining methods is 8%. A coal lease also requires that the successful bidder post a lease bond to the BLM. An individual planning to mine or remove salable minerals must contact the local BLM office and secure a sales contract before conducting any operations. Generally, the BLM authorizes the removal (i.e., disposition) of salable minerals on federal lands by a sales contract ; a free use permit may be available to certain government entities or non-profit organizations. If a mine operator desires to open a new deposit of a salable mineral, exploration and mining follow the general processes for leasable minerals. However, c ommon use areas or community pits may be available for immediate mineral removal, eliminating the need for exploration and other processes. The BLM is to identify the fair market value of the mineral at the specific location, required payment, and limitation on surface disturbances, among other specifications. Four policy areas related to mining on federal lands that have been raised in legislation in the 116 th Congress are presented and discussed below. After a brief presentation of the topic, each section presents policy concerns, options, and examples of related current legislation. Unless noted, bills discussed in this section have been introduced in the House or Senate and referred to committee, but have not seen further legislative activity. The BLM currently collects mineral production data for leasable and salable minerals on federal lands, but not for locatable minerals. Locatable mineral production information could be useful for some policy considerations; conversely, the lack of such information could limit policy discussion for those considerations. Concern regarding the collection of these data is not new. In 2008 the U.S. Government Accountability Office (GAO) reported, \"according to officials with BLM and the Forest Service, they do not have the authority to collect information from mine operators on the amount of hardrock minerals produced on federal land, or the amount remaining.\" The GAO also highlighted the limitations of the data collected and reported by the U.S. Geological Survey (USGS) by noting, \"it is not possible to determine hardrock mineral production on federal lands from the USGS data.\" The DOI reports production of some hardrock minerals from federal lands, but notes those values are estimates based on state data. This lack of locatable mineral production data for federal lands can impact multiple policy areas, including issues discussed in the following sections. Some related policy topics include Royalties: Potential changes to existing mining laws to extend royalties to all locatable minerals face the challenge that current production and value of these minerals is not collected. Without this information, analysis of such policy changes may be limited. For example, it may be difficult to estimate increased royalty collection or increased costs to producers. Reclamation Bonds: Knowledge of production data could assist the BLM in determining if the posted reclamation bond continues to be adequate, is excessive, or is inadequate for an ongoing locatable mineral operation on federal lands. Critical Minerals: Executive Order (E.O.) 13817 tasked the DOI with coordinating with other executive branch agencies to publish a list of critical minerals. One criterion used to define a critical mineral is net import reliance , the calculation of which includes domestic production of the critical mineral commodity. It is unclear how locatable mineral production, which is not required to be reported, is incorporated into the calculation of net import reliance. Congress could address this question of data availability by requiring the collection of mineral production data from federal lands. For example, Congress could authorize and require a government agency to collect mineral production and production value data, among other operations data. While the BLM could be the agency tasked with this data collection due to its role in managing the federal mineral estate, other agencies could also receive consideration. For example, MSHA currently collects and publicly provides data on all mining operations; the USGS tracks and distributes mineral production from sources around the country; and the Environmental Protection Agency (EPA) administers or oversees certain permits for most domestic mining operations. H.R. 2579 , the Hardrock Leasing and Reclamation Act of 2019 (ordered reported by the House Committee on Natural Resources on October 23, 2019), among other provisions, would establish the requirement that mining operations on federal lands report production volumes and values, and it includes the requirement that these and other data are to be made public. Locatable minerals remain regulated by the General Mining Law and are not subject to federal royalties, unlike leasable minerals. Although the federal government does not assess royalties on locatable minerals, some states assess royalties (i.e., severance taxes) on some minerals mined on federal lands. Congress might consider establishing a royalty policy for locatable minerals. As viewed by some, locatable minerals represent public assets, and the public should be compensated if any of these assets are removed for private gain. Royalties on locatable minerals could capture this change in ownership, and the revenue streams could be used to fund national priorities. Others view royalty-free access to locatable minerals as a public benefit, given associated mining employment and mining-related economic activity. If set too high, mineral royalties could restrict mining activity and force marginal operations to cease. Congress could also recognize additional complexities stemming from the different types of royalties and their associated characteristics. Three common royalties are unit-based royalties, ad valorem royalties, and profit-based royalties. Unit-based royalties are assessed on units of volume or weight and ensure that some revenue is collected in exchange for the removal of the mineral. Ad valorem royalties are assessed on the sale of the mineral and are subject to fluctuations in mineral prices. Profit-based royalties are assessed on operator profits, allowing deductions for certain costs. Further complexities can include whether to assign different royalty rates to different minerals and how to treat minerals that are byproducts of other minerals. As noted above, Congress is currently considering H.R. 2579 , the Hardrock Leasing and Reclamation Act of 2019 (ordered reported by the House Committee on Natural Resources on October 23, 2019), which, among other provisions, would close federal lands to new mining claims under the General Mining Law of 1872 and create a hardrock mine reclamation fund. This bill would establish a federal royalty of 12.5% and a displaced materials reclamation fee of 7 cents per ton of displaced materials for all new hardrock mineral mining operations on federal lands. These fees and other revenue generated by provisions in the bill would be deposited into a newly created fund, the Hardrock Minerals Reclamation Fund. The reclamation fund would target reclamation of abandoned hardrock mines and other environmental conservation activities on lands and waters affected by past hardrock mining activity, independent of land owner. The bill would require the collection and public dissemination of data regarding mine production and royalties paid, and regular inspection of all hardrock mines on federal lands. New mining operations on federal lands require that the federal lands are open for mineral entry. Some federal lands have undergone withdrawal , which generally means those lands are closed to or withdrawn from mining and other activities. FLPMA defines withdrawal as withholding an area of Federal land from settlement, sale, location, or entry, under some or all of the general land laws, for the purpose of limiting activities under those laws in order to maintain other public values in the area or reserving the area for a particular public purpose or program; or transferring jurisdiction over an area of Federal land, other than \"property\" ... from one department, bureau or agency to another department, bureau or agency. As indicated in this definition, a withdrawal does not necessarily close land to mining, and a withdrawal that closes land to mining may not restrict other land uses. A land withdrawal can occur through legislation, executive order, or agency action, and a withdrawal is usually for a specified period of time. In the event a withdrawal impacts existing mining claims or leases, the DOI and the involved agencies may allow the claims or leases to continue, or they may offer other federal land in exchange for the existing claims or leases. Many federal land withdrawals close the land to mining, including NPS lands, which are closed to new mining claims. The mining industry generally advocates for limited withdrawals from the mineral estate, as access to public lands for mining represents opportunities for ongoing and future operations. Advocates for a specific land withdrawal (with closure to mineral entry) generally see the proposed use (e.g., military base, national park, national monument, wilderness area) as superseding the potential use of the public land by other interests (e.g., for mining). One example of a withdrawal affecting mining on federal lands occurred in 2012 when the Secretary of the Interior withdrew about one million acres of federal land surrounding the Grand Canyon National Park from new mineral development for 20 years. The withdrawn area contained active uranium mining operations and about 3,200 mining claims. H.R. 1373 , among other provisions, would permanently withdraw this area from new mineral entry. H.R. 1373 passed the House; a companion bill has been introduced in the Senate as S. 3127 . Another example of a withdrawal with closure to mineral entry is for the Nevada Test and Training Range (NTTR), which is currently comprised of over 2.9 million acres of federal land withdrawn until 2021. The Department of the Air Force is requesting that this land withdrawal be renewed and an additional 300,000 acres be withdrawn to expand the area. The State of Nevada Commission on Mineral Resources has produced a map of the existing and proposed expansion areas, including affected active mining claims. H.R. 5606 and S. 3145 , among other provisions, would expand and renew the withdrawn federal land. A third example involves a planned mine by Twin Metals Minnesota (TMM) in the Superior Nation Forest, near the Boundary Waters Canoe Area Wilderness. The Superior National Forest was withdrawn from mineral entry in 1930, but it was reopened to mineral entry in 1950. TMM holds two leases issued in 1966 (renewed twice); no mineral production has occurred under these leases. TMM applied to renew these leases for a third time in 2012, ahead of their 2016 expiration. In 2016, DOI found that TMM does not have a non-discretionary right to renewal, and the FS did not consent to renewing the leases; DOI canceled the leases. In 2017, the DOI found that TMM has a non-discretionary right to renewal, and it renewed the leases. H.R. 5598 , among other provisions, would withdraw 234,328 acres of federal lands in the Superior National Forest, which include the lands covered by the TMM leases. Affordable and reliable access to critical minerals, and materials or products containing critical minerals, has been an issue since before the Great Depression, with the first official list of critical minerals dating to 1921. One recent definition of a critical mineral is (i) a non-fuel mineral or mineral material essential to the economic and national security of the United States, (ii) the supply chain of which is vulnerable to disruption, and (iii) that serves an essential function in the manufacturing of a product, the absence of which would have significant consequences for our economy or our national security. Numerous lists of critical minerals and materials exist, and the creation of such lists is inherently subjective, as the definition of \"critical\" includes notions of access to markets and costs of possible supply interruptions. Potentially adding further confusion, some agencies and studies conflate or do not clarify distinctions between the related terms critical minerals, critical materials, strategic minerals, and strategic materials. Discussions of critical minerals often note that the United States has few known locations of critical minerals that could be economically produced, and the United States does not presently have refining capabilities to process those critical minerals into commodities. The United States imports critical minerals (the USGS calculates net import reliance as part of the process to define a critical mineral) or products containing them, resulting in what is sometimes considered vulnerable dependencies. The limitations of using net import reliance to define a critical mineral or critical material are not fully defined, as manufactured products can contain critical minerals of domestic or foreign origin that have been previously imported or exported. Some known critical mineral deposits lie on federal lands. One example is the Idaho Cobalt Operation, which is a cobalt reserve on federal lands. Another example is the Twin Metals Minnesota mining project, which would mine copper, nickel, platinum group metals, and cobalt in the Superior National Forest. To provide more information on the likely locations of critical mineral resources, the USGS has begun the Earth Mapping Resources Initiative (Earth MRI). This program has produced a map and dataset covering numerous focus areas for one group of critical minerals: the rare-earth elements. Many of these focus areas occur in the western region and presumably lie on federal lands. As the Earth MRI program continues, it plans to focus on other critical minerals. Policy options to address concerns related to critical minerals typically intend to create or increase access to secure quantities of critical minerals. Expanding mineral production on federal and non-federal lands is one option to create increased access to secure quantities of critical minerals. Other policy options can include non-mining options; two such options are mentioned below. One option that could increase access to critical minerals on federal lands includes creating mapping and mineral exploration programs, such as Earth MRI. Such programs can facilitate and lower the private costs of locating critical mineral reserves. While general knowledge of the likelihood of a deposit can assist new mineral developments, policies supporting such programs may have limited impacts on production from known critical mineral deposits. A policy option not focused on increasing domestic mineral production would focus on reducing potential negative effects of supply shocks by stockpiling additional critical minerals at the National Defense Stockpile. Given the number of critical minerals and the higher number of manufacturing input materials made from critical minerals, the costs and complexity of maintaining substantial supplies could limit the effectiveness of this option. An additional complication is that \"the National Defense Stockpile is not to be used for economic or budgetary purposes,\" and much demand for critical minerals stems from private consumption, such as motors and batteries for electric vehicles. A third option, also not focused on increasing domestic mineral production, would be to secure more access to critical minerals by supporting a domestic supply chain based on critical minerals captured through recycling consumer products. Such support could include funding research to develop technology that would reduce the costs of recycling critical minerals to a competitive level. Other support could include tariffs or quotas on imported critical minerals, thus allowing recycled domestic sources to be more cost competitive. Congress is presently considering bills related to critical minerals and materials, with some containing provisions related to the federal mineral estate. These include An amendment in the nature of a substitute to S. 2657 was introduced on February 27, 2020 (including the new title \"American Energy Innovation Act of 2020\"), and incorporated language from several energy and mineral bills reported by the Senate Committee on Energy and Natural Resources. Cloture was invoked on March 2. This bill includes text from S. 1317 and S. 1052 (discussed below). S. 1317 , among other provisions, would instruct the USGS to publish information regarding known and unknown domestic critical mineral resources. The USGS may conduct geological surveys to increase this information. This bill would also establish a research and development program in the Department of Energy (DOE) to increase efficiencies in the critical mineral supply chain, to identify substitutes for critical minerals, and to promote the use of recycling as a source of critical minerals. This research also includes producing forecasts related to critical minerals for a 10-year period, including expected demand, market conditions, and possible substitutes for critical minerals. This bill would repeal the National Critical Materials Act of 1984 and authorize $50 million per year for 10 years to fund its activities. This bill also includes identical language to S. 1052 (discussed below). H.R. 4410 , among other provisions, would establish a federal cooperative and a federal corporation related to rare-earth minerals and thorium; both federal charters would be privately funded and operated. The cooperative would process domestic and international sources of rare-earth minerals and materials into products for sale. The corporation would accept all radioactive material (e.g., thorium) produced by the cooperative, sell any valuable materials, and could conduct research on new uses of such materials. S. 1052 , among other provisions, would direct the DOE to authorize an ongoing program to develop technologies for the extraction of rare-earth elements (REE) from coal and coal byproducts. The bill would authorize $23 million per year for eight years to fund this program. According the committee report accompanying this bill, \"Congress appropriated funding in 2014 for [the National Energy Technology Lab] to develop extraction technologies for REEs from coal byproducts. S. 1052 formally authorizes the program.\" H.R. 2531 , among other provisions, would treat mineral exploration and mining projects related to critical minerals as high-priority infrastructure projects, as defined by E.O. 13807, and would attempt to reduce the time to issue permits to 30 months by allowing the lead agency to determine that NEPA requirements have been met or do not apply to the project. H.R. 3405 , among other provisions, would instruct the Secretary of the Interior to remove uranium from the list of critical minerals, as prepared by the USGS pursuant to E.O. 13817. A previous version of this bill, introduced on June 21, 2019, finds that the United States has reserves of uranium, and that 52% of uranium is imported from stable trading partners. H.R. 3567 , among other provisions, would direct the Under Secretary of Defense for Acquisition and Sustainment, in consultation with others, to establish guidance for the acquisition of items containing rare-earth materials and the supply chain of rare-earth materials from countries that are not U.S. adversaries. The bill would also direct the National Defense Stockpile Manager to dispose of an additional three million pounds of tungsten and to use available funds to acquire approximately $37 million of critical materials over five years; tantalum would be added to the list of critical materials. S. 3356 , among other provisions, would require the DOE to award grants to encourage battery recycling research, development, and demonstration projects. Separately, grants would be awarded to state and local governments and battery retailers to enhance battery recycling collection programs. The bill would authorize $10 million for one year for the existing Lithium-Ion Battery Recycling Prize competition at the DOE, and would authorize to be appropriated $30 million per year for five years.", "summary": "The 116 th Congress is considering multiple proposed changes to U.S. mineral policy. Currently certain types of mineral production on federal lands provide the federal government and some states and industries with sources of revenue, while other production does not generate similar revenue. Proposed changes to federal mineral policy could impact these revenue streams, industries, and states in a variety of ways. The processes and requirements to mine on federal lands vary by mineral category, surface/subsurface management agencies, and estate ownership. Three main statutes create the three categories of minerals applicable to mining on federal lands. The General Mining Law of 1872 covers locatable (or hardrock) minerals, which are now defined as those minerals not defined by other statutes; typical examples include gold, silver, copper, and gemstones, when not found on acquired lands. Leasable minerals are defined by the Mineral Leasing Act of 1920, and include coal, phosphate, potassium, and sodium, among others (leasable minerals also include otherwise locatable minerals on acquired land, per the Mineral Leasing Act for Acquired Lands of 1947). Salable minerals are defined by the Materials Act of 1947, and include common minerals such as sand and gravel. Additional processes and requirements apply when the surface rights above the federal mineral estate are privately owned (i.e., split estate), commonly resulting from the Stock Raising Homestead Act of 1916. Similarly, coordination is required between the surface management agency and the agency managing the mineral estate. Two statutes generally apply to mining on federal lands, including the Surface Mining Control and Reclamation Act of 1977 (only applicable to coal) and the Federal Mine Safety and Health Act of 1977, while others may apply, including the Federal Land Policy Management Act of 1976; the National Environmental Policy Act of 1969; the Clean Water Act of 1972; the Clean Air Act; the Endangered Species Act of 1973; and the National Historic Preservation Act of 1966, among others. Data regarding mineral production for locatable minerals on federal lands are not collected by the federal government. This lack of data can hinder the development and analysis of policies intending to affect mineral production on federal lands. The 116 th Congress is considering H.R. 2579 , the Hardrock Leasing and Reclamation Act of 2019, which would, among other provisions, require mining operations on federal lands to report production volumes and values, with these data made public. Locatable mineral production on federal lands is not subject to royalties. Some interested parties see not charging royalties as a means of encouraging mineral exploration and production, while others may argue the public is not recovering fair market value for the transfer of a public asset to a private entity. H.R. 2579 would also establish a federal royalty policy for all new hardrock mineral mining operations on federal lands, and use these and other fees for the reclamation of abandoned hardrock mines and other environmental conservation activities on lands and waters affected by past hardrock mining. Federal land withdrawals may close a given area to mining. Advocates for a specific land withdrawal generally see the proposed use (e.g., military base, national park, national monument, wilderness area) as superseding the potential use of the public land by other interests (e.g., for mining). Proponents of mining generally advocate for limited withdrawals from the mineral estate, as access to public lands for mining represents opportunities for ongoing and future operations. H.R. 1373 would permanently withdraw about one million acres surrounding the Grand Canyon National Park from new mineral entry; it passed the House, and a companion bill, S. 3127 , has been introduced in the Senate. H.R. 5598 would withdraw 234,328 acres of federal lands in the Superior National Forest, including lands covered by previously disputed mineral leases. Several bills in the 116 th Congress would address U.S. critical mineral supply (i.e., those minerals defined by the U.S. Geological Survey that meet certain net import dependence criteria and perceived necessity to the U.S. economy). For example, S. 1317 would instruct the U.S. Geological Survey (USGS) to publish information regarding domestic critical mineral resources and would authorize an ongoing research and development program for critical minerals in the Department of Energy. The text of S. 1317 was incorporated into a substitute amendment to S. 2657 . Another example is H.R. 4410 , which would establish a federal cooperative and a federal corporation to process and sell certain critical minerals commonly found with thorium, which is radioactive.", "document_type": "crs"}
{"report": "The Chief Financial Officers Act of 1990 (CFO Act) requires annual financial audits of federal agencies' financial statements to \"assure the issuance of reliable financial information ... deter fraud, waste and abuse of Government resources ... [and assist] the executive branch ... and Congress in the financing, management, and evaluation of Federal programs.\" Agency inspectors general (IGs) are responsible for the audits and may contract with one or more external auditors. The Department of Defense (DOD) completed its first agency-wide financial audit in FY2018 and recently completed its FY2019 audit. Comprehensive data for the FY2019 audit are not currently available. Therefore, this report focuses on DOD's FY2018 audit. Congressional interest in DOD's audits is particularly acute because DOD accounts for about half of federal discretionary expenditures and 15% of total federal expenditures. The Department of Defense Inspector General (DOD IG) contracted with nine Independent Public Accounting firms (IPAs) to conduct the FY2018 and FY2019 audit. The IPAs conducted 24 separate audits within DOD (see Table 1 for each of the component-level audit opinions). In both FY2018 and FY2019 audits, the DOD IG issued the overall agency-wide opinion of disclaimer of o pinion âmeaning auditors could not express an opinion on the financial statements because the financial information was not sufficiently reliable. DOD components that received a disclaimer of opinion represent approximately 56% of the reported DOD assets and 90% of the reported DOD budgetary resources. DOD expected to receive a disclaimer of opinion for FY2018 and FY2019. The department has stated it could take a decade to receive an u nmodified (clean) audit opinion. The federal government as a whole is unable to receive a clean opinion on its financial report because agencies with significant assets and budgetary costs, such as DOD, the Department of Housing and Urban Development, and the Railroad Retirement Board, have each received a disclaimer of opinion in recent years. The federal government as a whole potentially could receive a clean audit opinion without all government agencies receiving a clean audit opinion; however, the size of the DOD budgetâ$708 billion in FY2019âprevents an overall clean opinion without DOD receiving a clean audit opinion. DOD employs 2.9 million military and civilian employees at approximately 4,800 DOD sites in 160 countries. DOD IG personnel and auditors from IPAs visited over 600 sites, sent over 40,000 requests for documentation, and tested over 90,000 sample items. DOD spent $413 million to conduct the FY2018 audit: $192 million on audit fees for the IPAs and $221 million on government costs to support the audit. DOD spent an additional $406 million on audit remediation and $153 million on financial system fixes. Financial statements are the primary way for an entity to communicate its financial performance to its stakeholders. How each line item on a financial statement (e.g., property) should be valued and reported is based on Generally Accepted Accounting Principles (GAAP), an agreement among practitioners (i.e., accountants, auditors, and regulators). In a financial audit, a private or public entity hires an independent auditor to provide reasonable assurance to all stakeholders that its financial statements are free of material misstatement, whether caused by error or fraud. Auditors form opinions by examining the types of risks an organization might face and the controls in place to mitigate those risks. Auditors give unbiased professional opinions on whether financial statements and related disclosures are fairly stated in all material respects for a given period of time in accordance with GAAP. As mentioned previously, the CFO Act requires federal agencies' financial statements to be audited annually. The CFO Act assigns responsibility for audits to agency inspectors general (IGs), but an IG may contract with one or more external auditors to perform an audit. The annual audit can inform Congress and the agency about its business processes and areas for improvement. An audit of DOD can provide benefits, such as (1) effective and efficient internal operations that can lead to reducing costs and improving operational readiness; (2) improved allocation of assets and financial resources that can enhance DOD's decisionmaking and ability to support the Armed Forces; and (3) improved compliance with statutes and financial regulations. For each line item on a financial statement and notes to the financial statement, an auditor will examine a sample of the underlying economic events to determine the reported information's accuracy. The Federal Accounting Standards Advisory Board (FASAB) promulgates financial reporting and accounting standards for federal government entities, and GAO establishes federal auditing standards, including for federal grant recipients in state and local governments. GAO issues the Generally Accepted Government Auditing Standards (GAGAS), also commonly known as the Yellow Book , to provide a framework for conducting federal government audits. The Yellow Book requires auditors to consider the visibility and sensitivity of government programs in determining the materiality threshold. Similar to requirements in the private sector, GAGAS requires federal financial reporting to disclose compliance with laws, regulations, contracts, and grant agreements that have a material effect on financial statements. Before auditors examine an entity's financial statement, they first evaluate its Enterprise Resource Planning (ERP) systems' (information technology systems') access control and reliability, as well as internal controls. ERP refers to an enterprise-wide information system used to manage and coordinate all of an entity's resources, information, and functions from shared data stores, including financial information. Auditing ERP systems is a critical aspect of evaluating an entity's internal controls. Internal control is a series of integrated actions that management uses to guide an entity's operations. Under GAO standards, effective internal controls should require management to use dynamic, integrated, and responsive judgment rather than rigidly adhering to past policies and procedures. The success or failure of an entity's internal controls depends on its personnel. Management is responsible for designing effective internal controls, but implementation depends on all personnel understanding, implementing, and operating an effective internal control system. Federal agencies have been required to report to Congress on internal controls since the Federal Managers' Financial Integrity Act of 1982. In addition, the Federal Financial Management Improvement Act of 1996 requires agencies to report to Congress on the effectiveness of internal control over financial management systems. GAO's Standards for Internal Control in the Federal Government (also known as the Green Book ) provides the overall framework for designing, implementing, and operating an effective internal control system. An audit of an entity's internal controls includes computer systems at the entity-wide, system, and application levels. GAGAS recommends using specific frameworks for internal control policies and procedures, including certain evaluation tools created specifically for federal government entities. Office of Management and Budget (OMB) Circular No. A123, Management's Responsibility for Enterprise Risk Management and Internal Control , provides additional guidance. The federal government's internal control framework is based on the framework created by the Committee of Sponsoring Organizations of the Treadway Commission (COSO), which is widely used in the private sector. The COSO framework is dedicated to improving organizational performance and governance through effective internal control, enterprise risk management, and fraud deterrence. The COSO framework, depicted in Figure 1 , was created to help practitioners assess internal controls not as an isolated issue, but rather as an integrated framework for how internal controls work together across an organization to help achieve objectives as determined by management. It represents the integrated perspective recommended by COSO for practitioners who are creating and assessing internal controls. The cube may be best understood by examining each set of components separately: Categories of objectives. Operations, Reporting, and Compliance are represented by the columns. The objectives are designed to help an organization focus on different aspects of internal controls to help management achieve its objectives. Components of internal control. Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring Activities are represented by the rows. The components represent what is required to achieve the three objectives. Levels of organizational structure. Entity-Level, Division, Operating Unit, and Function are represented by the third dimension. For an organization to achieve its objectives, according to COSO, internal control must be effective and integrated across all organizational levels. Internal controls can help DOD leadership achieve desired financial results through effective stewardship of public resources. Effective internal controls can increase the likelihood that DOD achieves its financial objectives, including getting a clean (i.e., unmodified) audit opinion. Properly designed internal controls can help reduce the amount of detail an auditor will examine, including the number of samples examined. Good internal controls could reduce the amount of time required to conduct an audit, thus reducing its cost. At DOD, auditors identified 20 agency-wide internal control material weaknesses and 129 DOD component-level material weaknesses that range from issues with financial management systems to inventory management. A material weakness is a deficiency, or a combination of deficiencies, in internal control over financial reporting that results in a reasonable possibility that management will not prevent, or detect and correct, a material misstatement in the financial statements in a timely manner. Many of these material weaknesses are discussed later in this report under \" Issues for Congress .\" Properly designed internal controls can also serve as the first line of defense in safeguarding assets. Internal controls help private and public entities achieve objectives, such as enterprise risk management, fraud deterrence, and sustained and improved performance, by designing processes that control risk. The DOD IG identified multiple DOD components that do not have sufficient entity-level internal controls . The lack of entity-level internal controls directly contributed to an increased risk of material misstatements on the components' financial statements and the agency-wide financial statements. Until DOD resolves the many issues surrounding internal controls and establishes a better record-keeping system, it might be difficult for auditors to identify other material weaknesses that could prevent DOD from receiving a clean audit opinion. When the current set of internal control issues is resolved, and auditors are better able to analyze DOD records, they might discover additional issues, including new material weaknesses, that need to be resolvedâa cascading effectâbefore DOD receives a clean audit opinion. This cycle might repeat a few times. The DOD auditors issued 2,377 notices of findings and recommendations (NFRs) that resulted in 20 agency-wide material weaknesses and 129 DOD component-level material weaknesses. Appendix A provides an overview of the 20 agency-wide material weaknesses. An auditor creates an NFR to capture issues that require corrective action. DOD then creates a corrective action plan (CAP) to address one or more NFRs. The NFR is later retested, and if the CAP sufficiently addresses the NFR, the auditor is to validate that the issue has been resolved. As of June 2019, the majority of NFRs were related to three critical areas: approximately 48% were related to financial management systems and information technology; 30% were related to financial reporting and DOD's fund balance with Treasury; and 16% were related to property. Although the overall number of NFRs increased slightly between December 2018 and June 2019, the number has decreased significantly in certain categories (see Table 2 , Other column). The increase in NFRs in certain categories is an expected result of the audit process. As auditors learn more about DOD and how it functions, they may continue to identify new NFRs, while DOD continues to address some of the previously identified NFRs. The Office of the Under Secretary of Defense (Comptroller) has established an audit NFR database. DOD uses the database to consolidate and track the status of all auditor-issued NFRs and prioritize and link them to CAPs. The NFR and CAP component-based metrics are reported and reviewed monthly in the National Defense Strategy meeting with the Deputy Secretary of Defense and Military Service financial management leadership teams. The military service branchesâArmy, Navy, Marine Corps, and Air Forceâaccount for over 60% of NFRs identified in the FY2018 audit (see Table 3 ). For DOD to receive a clean audit opinion, civilian leadership and uniformed Armed Forces personnel may need to improve collaboration. According to DOD, it is prioritizing CAPs that align with the National Defense Strategy and provide the greatest potential value to DOD operations and the warfighter. DOD has established actionable financial statement audit priorities at many levels within the department, including at the command level. Those FY2019 priorities include the following: Real Property; Government Property in the Possession of Contractors; Inventory, and Operating Materials and supplies; and Access Controls for IT Systems. Given the complexity of DOD operations, auditors began their work for the FY2019 financial audit in late 2018. Comprehensive data for the FY2019 audit are not currently available. However, the auditors issued an overall agency-wide disclaimer of opinion for FY2019. Most financial statement audits stop as soon as the auditor determines the reporting entity is not auditable. DOD, however, has asked the auditors to continue such audits to identify as many problems as possible, with the goals of identifying systemic issues and making faster progress toward business reform. Although the CFO Act required annual audits of federal agencies' financial statements, DOD did not complete an agency-wide audit until 2018â28 years later. One of DOD's strategic goals is to reform its business practices for greater performance and affordability. According to DOD, the annual audit process helps it reform its business practices consistent with the National Defense Strategy (NDS): The financial statement annual audit regimen is foundational to reforming the Department's business practices and consistent with the National Defense Strategy. Data from the audits is driving the Department's strategy, goals, and priorities and enabling leaders to focus on areas that yield the most value to the warfighter. The audits are already proving invaluable and have the potential to support long-term, sustainable reform that could lead to efficiencies, better buying power, and increased public confidence in DoD's stewardship of funds. Continued congressional oversight of DOD's plan to achieve a clean audit opinion could help DOD achieve a clean audit opinion. As more components receive a clean audit opinion, audit costs might eventually decrease. For FY2018, DOD incurred nearly $1 billion in total audit costs, which was less than 0.25% of DOD's FY2018 budget. Although the cost of an audit is a consideration, the more impactful benefits from an annual financial audit, arguably, are the changes in DOD business practices that directly impact the NDS while increasing transparency. The audits identified three critical areas of improvement that are consistent with the NDS: (1) financial management systems and information technology (IT), (2) financial reporting and fund balance with Treasury, and (3) property (real property, inventory, and supplies, and government property in the possession of contractors). Addressing the issues in these critical areas not only could help DOD improve its business practices, but it might also help resolve many of the NFRs, which could enable some audit components to receive clean audit opinions in the next few years instead of in another decade or more. According to DOD, its financial management systems and information technology provide a broad range of functionality to support agency financial management, supply chain management, logistics, and human resource management. Reliable systems are mission critical to DOD meeting its NDS and supporting the warfighter. Also, DOD is required to comply with laws and regulations, such as the Federal Managers' Financial Integrity Act of 1982, the Federal Financial Management Improvement Act of 1996, and OMB Circular A-123. These laws and regulations collectively require DOD to maintain a system of internal controls that can produce reliable operational and financial information. The challenges DOD faces in financial management systems and information technology are twofold and compromise nearly half of all NFRs (see Table 2 or Table 3 ). First, DOD's initiatives to address the issues related to access controls for IT systems are partially implemented. A fully implemented plan to address access control issues would potentially restrict access rights to appropriate personnel, monitor user activity, and safeguard sensitive data from unauthorized access and misuse. As part of its corrective action plan, DOD is requiring financial system owners and owners of business systems that contribute financial information to review and limit access only to those who need it and only to the specific areas within the systems that they need to access. DOD has developed security controls and standardized test plans that align with the Federal Information Systems Control Audit Manual methodology used to test systems during an audit. Further, DOD management has directed components without a proper software maintenance policy to establish a baseline policy for those software systems and maintain a record of all software system changes. In addition to requiring components to develop reports on privileged users and transactions, including privileged user activities, the department has directed components to periodically review user access rights and remove unauthorized users. Second, the number and variety of financial systems complicate DOD's financial statement audits. In 2016, DOD reported more than 400 separate information technology systems were used to process accounting information to support DOD's financial statements. Many of these legacy systems were designed and implemented to support a particular function, such as human resource management, property management, or logistics management, and were not designed for financial statement reporting. These systems include newer ERP systems and custom-built legacy systems, financial systems, and nonfinancial feeder systems. Also, aging systems and technology that predate modern data standards and laws, as well as nonaccounting feeder systems, affect data exchange with modern ERPs to facilitate auditable financial reports. DOD's IT modernization program is investing in ERPs and aims to migrate 51 legacy systems to core modern ERPs by the end of 2023. How the remediation plans evolve and how they are implemented as DOD migrates to the new ERPs could be a significant determiner of DOD's ability to address nearly half of the NFRs. According to DOD's auditors, its policies and procedures for compiling and reporting financial statements are not sufficient to identify, detect, and correct inaccurate and incomplete balances in the general ledger. Without an adequate process to identify and correct potential misstatements in the general ledger, balances reported on financial statements, accompanying footnotes, and related disclosures may not be reliable or useful for decisionmaking for Congress, including appropriating the DOD budget. The lack of accurate numbers, arguably, also presents challenges for DOD leadership in making agency financial decisions. DOD's assets increased by nearly $200 billion in FY2018 over FY2017. Fund Balance with Treasury, one of the assets, increased by $78.6 billion. According to DOD, the increase in Fund Balance with Treasury resulted from additional appropriations received in FY2018. DOD is unable to effectively track and reconcile collection and disbursements activity from its financial systems, which resulted in DOD being unable to reconcile its general ledger and Treasury accounts. The fund balance with the Treasury Department is an asset account reported on DOD's general ledger, which shows a DOD component's available budget authority. Similar to a personal checking account, the fund's balance increases and decreases with collections and disbursements of new appropriations and other funding sources. Each DOD component should be able to perform a detailed monthly reconciliation that identifies all the differences between its records and Treasury's records. The reconciliations are essential to supporting the budget authority and outlays reported on the financial statements. The auditors identified several deficiencies in the design and operation of internal controls for fund balance with the Treasury that resulted in DOD-wide material weakness. DOD has undertaken business process improvements to streamline reporting, reduce differences to an insignificant amount, and support account reconciliations. The auditors report that DOD faces challenges with properly recording, valuing, and identifying the physical location of real property, inventory, and government property that is in the possession of contractors. DOD's challenges with property and inventory complicate Congress's ability to perform effective oversight and budget appropriations. Without accurate real estate counts and values, DOD will continue to face challenges in meeting the National Strategy for Efficient Use of Real Property. DOD faces similar issues with inventory. It is unable to provide assurance that inventory recorded in the financial statements exists and is valued properly. Without accurate inventory counts, DOD might not be able to support its missions without incurring additional costs. Some appropriated funds could be used to purchase extraneous inventory that DOD might already have on hand, or DOD might rely on inventory that appears in an inaccurate count but does not actually exist. The auditors report that DOD is unable to accurately account for all of its buildings and structures. This includes houses, warehouses, vehicle maintenance shops, aircraft hangars, and medical treatment facilities, among others. As an example, during the FY2018 audit, the Air Force identified 478 buildings and structures at 12 installations that were not in the real property system. DOD faces issues with demonstrating the right of occupancy or ownership through supporting documentation and with incomplete or out-of-date systems of record. Accurate property records, valuation, and right of ownership could potentially help inform DOD leadership as it considers any future base realignment and closure. According to DOD, military departments are executing real property physical inventories to reconcile with the systems of record. The Army has the largest real property portfolio in the department. All branches of the Armed Forces are facing challenges with obtaining source documents, establishing value for properties, and assessing and reporting expected maintenance costs. The Air Force is focused on correcting its records for buildings, which account for more than 90% of its real property value, first addressing its building inventory at its most significant bases. The Navy has completed its physical inventory and corrected its records. Initial results showed a 99.7% accuracy rate. The Marine Corps has undertaken a process of accurately counting and recording its physical inventory. The Armed Forces will be unable to obtain a clean audit opinion without determining the value of their real property and other assets. DOD manages inventory and other property at over 100,000 facilities located in more than 5,000 different locations. The military services and DOD components report inventory ownership on their financial statements, but this inventory can be in the custody of or managed by the military service or another DOD component. For example, as of FY2017 year end, the military services reported that the Defense Logistics Agency held approximately 46% of the Army's inventory, 39% of the Navy's inventory, and 45% of the Air Force's inventory, ranging from clothes to spare parts to engines. Given the vast geographic dispersion of DOD resources and the complexity of how they are managed, the system of records and physical inventory must agree with each other for DOD leadership to have an accurate understanding of available resources. GAO highlighted a few examples in its latest high-risk series: The Army found 39 Blackhawk helicopters that were not recorded in the property system; 107 Blackhawk rotor blades could not be used but were still in the inventory records; 20 fuel injector assemblies for Blackhawk helicopters did not have documentation to indicate ownership by any specific military service; and 24 gyro electronics for military aircraft that should not be used were still in the inventory records. Accurate inventory, materials, and supplies help DOD avoid purchasing materials it does not need and help ensure that the right parts, supplies, and other inventory are available to support mission readiness. Ensuring that parts, supplies, and inventory are usable not only helps with mission readiness but also helps avoid unnecessary warehousing costs. Many of the parts, supplies, and inventory are unique to DOD and require long lead times to contract and manufacture. An accurate physical count and system of records could help shorten the time before items are available for the warfighter. At times, DOD might provide contractors with property for use on a contract, such as tooling, test equipment, items to be repaired, and spare parts held as inventory. The government-provided property and contractor-acquired property should be recorded in DOD's property system, and at the end of the contract, it might be disposed of, consumed, modified, or returned to DOD. The auditors report that the DOD property system should be able to accurately distinguish DOD property ownership and possession between DOD and the contractor. For DOD to receive a clean audit opinion, it should consider requiring its contractors to maintain and provide auditors with accurate records. Transferring property from DOD to contractors, and from contractors to DOD, requires an accurate real-time system of record keeping. Total DOD audit-related costs for FY2018, including the cost of remediating audit findings, supporting the audits and responding to auditor requests, and achieving an auditable systems environment, were $973 million (see Table 4 ). DOD predicts that audit-related costs will remain relatively consistent for a few more years until more components begin to achieve unmodified opinions. In addition to the issues previously discussed, there are three agency-level issues or approaches that contribute to DOD audit costs remaining relatively constant in the near term: more substantive testing, completion of audit procedures even for those components that are likely to receive a disclaimer of opinion, and expansion of DOD service provider examinations. While DOD's annual audit costs (i.e., excluding remediation costs) might remain close to FY2018 costs (nearly $413 million) or increase in the near term, the cost is expected to decrease after the first few years, as more components achieve a clean audit opinion. Eventually, DOD audit costs might increase as costs for travel and accounting increase with economic growth. To reduce the risk of potential material misstatement without reliable internal controls, auditors seek other ways of validating financial information. Reliance on internal controls is not a pass-or-fail approach; rather, it is incremental. DOD received 20 agency-wide material weaknesses and 129 component-level material weaknesses in internal controls in the FY2018 audit; until those are resolved, DOD auditors must rely on substantive testing, which will keep audit costs relatively high. There are two categories of substantive testing: Analytical P rocedures . Substantive testing through analytical procedures might include comparing current-year information with the prior year, examining trend lines, or reviewing various financial ratios. Because FY2018 was the first full financial audit of DOD and many systems of records are not reliable, auditors may have difficulty performing analytical procedures and must rely more on tests of details. Tests of Details. An auditor selects individual items for testing and applies detail procedures, such as verifying that invoiced items from a vendor match payments made by DOD, physically locating an inventory item that is recorded in DOD's financial systems, and verifying mathematical accuracy by recalculating certain records. To gain a detailed understanding of the underlying issues that prevent DOD components from receiving clean audit opinions, the department has requested comprehensive completion of audit procedures even after auditors have determined components will receive disclaimers of opinion. While this approach might initially incur higher audit costs, in the long run it might enable DOD to resolve the component-specific issues more quickly and to gain a holistic perspective of system-wide issues. These benefits might help DOD lower its financial audit costs in the long run. Some DOD organizations provide common information technology services to other organizations within DOD, such as the Defense Information Systems Agency's (DISA's) Automated Time Attendance and Production System. For FY2018, auditors completed 20 DOD service provider examinations; 14 resulted in unmodified opinions and 6 resulted in qualified opinions. See Table B-1 for more information, including auditors' opinions and the number of FY2018 NFRs issued. Service provider examinations assess whether information technology control activities were designed, implemented, and operated effectively to provide management reasonable assurance that control objectives function as designed or intended in all material respects. The procedures performed by the auditors for examinations are not meant to provide the same level of assurance as a full audit. These examinations' results can be used to reduce redundant testing of control by component-level auditors, saving time and money; see Table 1 for the list of audited DOD components. For FY2019, DOD expects to complete 23 common service provider examinations, compared to 20 in FY2018. The expanded service provider examinations for FY2019 might incrementally increase DOD audit costs over FY2018. Since passing the CFO Act of 1990, Congress has continued to express interest in DOD completing an annual financial audit. Financial audits can help DOD increase transparency and accountability, improve business processes, and improve the visibility of assets and financial resources, but by design, audits are meant to accomplish a specific purpose, and therefore there are some inherent limitations on the benefits they can provide. Financial audits' limitations and benefits are discussed below. A financial audit is a tool to help improve business processes and readiness on an annual basis. It does not address program effectiveness or efficiency, but it does consider whether an entity's assets, including its budget authority, are used to accomplish its programmatic purpose. To communicate the annual audit's benefits to Congress and other stakeholders, DOD may attempt to measure cost savings or business process improvements, but it may struggle to fully quantify the benefits, as many of the daily operational improvements are likely to be organic and informal. Only the most significant issues will be identified in auditors' reports. DOD will likely benefit from auditors' NFRs, as well as ongoing informal dialogue between auditors and DOD personnel. When an auditor identifies an issue, DOD could seek to address the issue immediately rather than wait for a written report. It is inefficient for auditors or DOD to capture and write a report on all issues, large and small. In the private sector, generally, only critical audit matters that involve especially challenging or complex auditor judgments are included in audit reports. Many other issues are addressed in the normal course of business. Reporting or recording every instance of savings or process improvement based on auditors' informal feedback arguably detracts from the audit's purpose. Allowing a degree of flexibility to identify and report the cost savings and process improvements that DOD determines are the most significant may help the department focus effectively on responding to audit findings. Independent audit opinions do not fully guarantee that financial statements are presented fairly in all material respects, but provide reasonable assurance for the following reasons: Auditors use statistical methods for random sampling and look at only a fraction of economic events or documents during an audit. It is cost- and time-prohibitive to recreate all economic events. Some line items on financial statements involve subjective decisions or a degree of uncertainty as a result of using estimates. Audit procedures cannot eliminate potential fraud, though an auditor may identify fraud. Financial audits are not specifically designed to detect fraud, but an auditor assesses the potential for fraud, including evaluating internal controls designed by management to prevent and identify potential fraud, waste, and abuse. Auditors are required to consider whether financial statements could be misstated as a result of fraud. Effective internal controls could prevent or mitigate risks for fraudulent financial reporting, misappropriation of assets, bribery, and other illegal acts. Fraud risk factors do not necessarily indicate fraud exists, but risk factors often exist when fraud occurs. In a few years, if DOD has improved its current business practices, future improvements might be less significant and more incremental. Even so, annual audits could potentially be a valuable tool to help DOD continue to improve its business processes. The annual audit gives Congress an independent opinion on DOD's financial systems and business processes. It provides a way for DOD to continue to improve its performance and highlights areas that need to be fixed. DOD has identified four categories of how the annual audit improves its operations, along with some examples: Increases Transparency and Accountability. Holds DOD accountable to Congress and the taxpayers that DOD takes spending taxpayer dollars seriously through efficient practices. Auditing DOD helps improve public confidence in DOD operations, similar to other Cabinet-level agencies that conduct an annual financial audit. Streamlines Business Processes. Audits help reduce component silos and help leadership better understand interdependencies within DOD. The department might be able to improve its buying power and reduce costs, as well as improve operational efficiencies. Improves Visibility of Assets and Financial Resources. More accurate data could enhance DOD readiness and decisionmaking. Getting the appropriate supplies to warfighters helps improve their fighting posture. If a service does not know whether it has enough spare parts to ensure that aircraft are able to fly, it may spend significant amounts of money to get spare parts quickly to meet operational requirements. Accurate cost information related to assets, such as inventory and property, can help DOD make more informed decisions on repair costs and future purchases. Strengthens Internal Controls. Strengthened internal controls help minimize fraud, waste, and abuse. In addition, they help improve DOD's cybersecurity and enhance national security. In addition to the previously described identification of Blackhawk helicopters and parts, DOD is starting to see gains by eliminating recurring annual costs. For example, strengthening internal controls to improve operations at the U.S. Pacific Fleet has freed up purchasing power to fund $4.4 million in additional ship repair costs. Also, the Army has implemented a materiality-based physical inventory best practice to count assets at Army depots. The Army estimates this process improvement could help avoid approximately $10 million in future costs. Since passing the CFO Act of 1990, which required 24 agencies to conduct an agency-wide annual financial audit, Congress has continued to express interest in DOD completing an annual audit. DOD completed its first agency-wide audit in FY2018 and a subsequent audit in FY2019. Both audits resulted in a disclaimer of o pinion . The ongoing independent assessment of DOD's financial systems, arguably, provides Congress and DOD leadership with an independent third-party assessment of DOD's financial and business operations. Reliable systems that produce auditable financial information, including an accurate count and valuation of real estate and inventory, could help Congress provide better oversight and ultimately determine how funds appropriated for DOD should be spent in support of the NDS. Further, the annual financial audit of DOD by independent auditors might provide DOD with a competitive advantage when compared to other countries' defense agencies. In many other countries, financial informationâincluding a financial audit of defense agenciesâis nonexistent or opaque at best and not readily available to legislators or citizens. Many of DOD's financial management systems are also used for operational purposes. Testing of the financial management systems and other systems that interface with each other as part of the annual audit process can help identify and improve cybersecurity vulnerabilities and the conduct of military operations. DOD's efforts to fix its vulnerabilities and reduce wasteful practices, arguably, could enable it to respond to future threats more effectively. The implementation of new ERP systems and the complexity of auditing DOD might result in DOD not achieving a clean audit opinion within the next decade. Without each of the Armed Forces receiving a clean audit opinion, DOD will not be able to receive an agency-wide clean audit opinion even if all other DOD components receive a clean audit opinion. Appendix A. DOD Agency-Wide Material Weaknesses Weaknesses and inefficiencies in internal controls are classified based on severity. Auditors identified 20 material weaknesses at DOD (see Table A-1 ) related to internal controls that range from issues with financial management systems to inventory management. A material weakness is a deficiency, or a combination of deficiencies, in internal control over financial reporting that results in a reasonable possibility that management will not prevent, or detect and correct, a material misstatement in the financial statements in a timely manner. In addition to material weaknesses, the auditors issue two types of deficienciesâa significant deficiency or a control deficiency â that are less severe than a material weakness, but a combination or multiple instances of either deficiency can result in material weaknesses. A significant deficiency is a deficiency or a combination of deficiencies that are less severe than a material weakness, but important enough to merit management's attention. A control deficiency is a noted weakness or deficiency that auditors typically bring to management's attention, but that does not have an impact on the financial statement unless a combination of them results in a material weakness. Improvements in either type of deficiency could improve the business process and help prevent waste, abuse, and fraud. Appendix B. Common Service Providers Some organizations within DOD provide common information technology services to other organizations at DOD. These organizations report to higher-level organizations. For FY2018, auditors completed 20 DOD service provider examinationsâ14 resulted in unmodified opinions and 6 resulted in qualified opinions. See Table B-1 for more information, including auditors' opinions and the number of FY2018 NFRs issued. Service provider examinations provide a positive assurance as to whether information technology control activities were designed, implemented, and operate effectively to provide management reasonable assurance that control objectives function as designed or intended in all material respects. Examination procedures are limited in scope as compared to a financial audit. Component-level auditors can use these examinations' results to reduce redundant testing, saving time and money; see Table 1 for the list of audited DOD components. For FY2019, DOD expects to complete 23 common service provider examinations.", "summary": "The Chief Financial Officers Act of 1990 (CFO Act, P.L. 101-576 ) requires annual financial audits of federal agencies' financial statements to \"assure the issuance of reliable financial information ... deter fraud, waste and abuse of Government resources ... [and assist] the executive branch ... and Congress in the financing, management, and evaluation of Federal programs.\" Agency inspectors general (IGs) are responsible for the audits and may contract with one or more external auditors. Congressional interest in the Department of Defense's (DOD's) audits is especially acute because DOD's expenditures represent about half of federal discretionary spending and about 15% of total spending by the federal government. Also, DOD's financial management has been on the Government Accountability Office's high-risk list since 1995. Those on the high-risk list are considered more vulnerable to fraud, waste, abuse, and mismanagement. DOD completed its first-ever agency-wide financial audit in FY2018 and recently completed its FY2019 audit. As expected, DOD received an agency-wide disclaimer of o pinion from the DOD IG in both auditsâmeaning auditors could not express an opinion on the department's financial statements because the financial information was not sufficiently reliable. DOD has stated it could take up to 10 years to receive a clean audit opinion. Some reasons for a disclaimer of opinion can include inadequate internal controls (i.e., a series of integrated actions that management uses to guide operations), financial statements not conforming to Generally Accepted Accounting Principles (GAAP), insufficient property and inventory records, and financial management systems that do not provide sufficient evidence for the auditor to express an opinion. The FY2018 audit included 2,358 notices of findings and recommendations (NFRs), which capture issues that require corrective action. Approximately 94% of the NFRs were related to three critical areas: financial management systems and information technology; financial reporting and DOD's fund balance with Treasury; and property. These NFRs resulted in 20 agency-wide material weaknesses and 129 component-level material weaknesses. All material weaknesses were related to issues with internal control. A material weakness is a deficiency, or a combination of deficiencies, in internal control over financial reporting that results in a reasonable possibility that management will not prevent, or detect and correct, a material financial misstatement. Comprehensive data from the FY2019 audit are not currently available. However, DOD has announced that auditors validated that DOD had resolved over 550 findings, more than 23%, from the department's FY2018 audit and that the audits have helped DOD \"target and prioritize corrective actions as we strive to achieve an unmodified audit opinion.\" After describing what a financial audit entails, this report examines the FY2018 audit in detail and addresses several issues for Congress, including the audit's cost (approximately $413 million in FY2018) and the challenges the material weaknesses identified in the FY2018 audit may create for congressional oversight of DOD.", "document_type": "crs"}
{"report": "Family reunification and the admission of immigrants with needed skills are two of the major principles underlying U.S. immigration policy. As a result, current law weights the allocation of immigrant visas heavily toward individuals with close family in the United States and, to a lesser extent, toward individuals who meet particular employment needs. The diversity immigrant category was added to the Immigration and Nationality Act (INA) by the Immigration Act of 1990 ( P.L. 101-649 ) to stimulate \"new seed\" immigration (i.e., to foster new, more varied migration from other parts of the world). Diversity visas are allocated to natives of countries from which the combination of immediate relatives, family preference, and employment preference immigrant admissions were lower than a total of 50,000 over the preceding five years combined. The Immigration Amendments of 1965 replaced the national origins quota system, which prioritized European source countries, with equally distributed per-country ceilings. In the 1980s, some Members of Congress began expressing concern that U.S. legal immigration admissions were skewed in favor of immigrants from Asia and Latin America because of the 1965 amendments. The first legislative response to this concern occurred in Section 314 of the Immigration Reform and Control Act of 1986 (IRCA), which allowed an extra 5,000 immigrant visas per year for FY1987 and FY1988 to be distributed to natives of 36 countries that had been adversely affected by the 1965 changes to the INA. Over 1 million people applied for what was then called the NP-5 program, and visas were made available according to the chronological order in which qualified applications were mailed to the State Department (DOS). Natives of Ireland received the largest proportion (31%) of the NP-5 visas, followed by natives of Canada (21%) and Great Britain (11%). In 1988, Congress extended the NP-5 program for two more years and made 15,000 additional immigrant visas available each year in FY1989 and FY1990. What is now known as the diversity immigrant category was added to the INA by P.L. 101-649 and went fully into effect in FY1995. Section 132 of P.L. 101-649 provided 40,000 visas per year for a transitional program during FY1992-FY1994 for certain natives of foreign states that were adversely affected by the 1965 changes to the INA. At least 40% of these visas were earmarked for natives of Ireland. The current diversity visa category had an annual allocation of 55,000 visas when it went into effect in FY1995. While the diversity visa category has not been directly amended since its enactment, P.L. 105-100 , the Nicaraguan Adjustment and Central American Relief Act of 1997 (NACARA), temporarily decreased the 55,000 annual ceiling to 50,000. Beginning in FY2000, the 55,000 ceiling has been reduced by 5,000 annually to offset immigrant visas made available to certain unsuccessful asylum seekers from El Salvador, Guatemala, and formerly communist countries in Europe who are being granted immigrant status under special rules established by NACARA. The 5,000 offset is temporary, but it is not clear how many years it will be in effect to handle these adjustments of status. To be eligible for a diversity visa, the INA requires that a foreign national must have at least a high school education or the equivalent, or two years of experience in an occupation that requires at least two years of training or experience. The applicant or the applicant's spouse must be a native of one of the countries listed as a foreign state qualified for the DV program. Minor children of the qualifying diversity immigrant, as well as the spouse, may accompany as lawful permanent residents (LPRs) and are counted toward the 50,000 annual limit. Because the demand for diversity visas is much higher than the supply, a lottery is used to randomly select who may apply for one of the 50,000 diversity visas available annually. (See Figure 1 for an illustration of the process). There is no fee to enter the diversity lottery. Registration for the FY2020 diversity lottery began on October 3, 2018, and closed on November 6, 2018. Beginning on May 7, 2019, and continuing through September 30, 2020, those who registered can use an online system to find out if they had been selected. The FY2018 lottery had 14.7 million entries, representing over 23 million people (including family members). From the millions of entries, approximately 100,000 selectees are randomly chosen. Being chosen as a selectee (\"lottery winner\") does not guarantee receipt of a diversity visa; rather, it identifies those who are eligible to apply for one. To receive a visa, selectees must successfully complete the application process (including security and medical screenings and in-person interviews) by the end of the fiscal year for which they registered for the lottery or they lose their eligibility. DV applicants, like all other foreign nationals applying to come to the United States, must pay applicable fees and undergo reviews and biometric background checks performed by DOS consular officers abroad and Department of Homeland Security (DHS) immigration officers upon entry to the United States. Individuals selected for a diversity visa who are residing in the United States as nonimmigrants must undergo reviews by U.S. Citizenship and Immigration Services (USCIS) prior to adjusting to LPR status. These reviews, which include an in-person interview, are intended to ensure that the applicants are not inadmissible under the grounds spelled out in Section 212(a) of the INA. Grounds for inadmissibility include health, criminal history, security and terrorist concerns, public charge, illegal entry, and previous removal. The diversity immigrant visa program currently makes 50,000 visas available annually to natives of countries from which immigrant admissions were lower than a total of 50,000 over the preceding five years. USCIS implements a formula for allocating visas according to statutory specifications: visas are divided among six global geographic regions, and each region and country is identified as either high admission or low admission based on how many immigrant visas each received over the previous five-year period. Higher proportions of diversity visas are allocated to low-admission regions and low-admission countries. Each country is limited to 7%, or 3,500, of the total, and the INA provides that Northern Ireland be treated as a separate foreign state. The distribution of diversity visas by global region of origin has shifted over time (see Figure 2 ). From FY1995 through FY2001, foreign nationals from Europe garnered a plurality of diversity visas, ranging from 38% to 47% of the total. In the early 2000s, the share of DV recipients from Africa was on par with those from Europe. Europe's share dropped by nine percentage points from FY2005 to FY2006 as the shares from African and Asian countries continued to increase. Since FY2008, Europe has accounted for smaller shares than Africa or Asia. Latin America (which includes South America, Mexico, Central America, and the Caribbean), Oceania, and North America accounted for less than 8% each year. In total, from FY1995 through FY2017 immigrants from Africa accounted for 40% of diversity immigrants, while Europeans accounted for 31% and Asians for 25%. These trends are consistent with the statutory formula Congress outlined to allocate diversity visas. Figure 3 presents the countries from which at least 1,000 DV immigrants were admitted in the first five years that the program was in full effect (FY1995-FY1999) and the most recent five years for which data are available (FY2013-FY2017). Early in the program, most of the top countries were in Europe (particularly Eastern Europe) and Africa. In more recent years, there has been a shift toward Africa and Asia. Certain countriesâsuch as Ethiopia, Ukraine, and Egyptârank high across many years of the program, while othersâsuch as Ireland, Poland, and Venezuelaâare limited to particular periods of time. From FY1995-FY2017, natives of six countries received at least 40,000 diversity visas in total: Ethiopia (67,832), Nigeria (58,563), Egypt (56,862), Ukraine (52,654), Albania (47,136), and Bangladesh (40,847). As one would expect, diversity immigrants come from different parts of the world that differ from the leading immigrant-sending regions. Department of Homeland Security data ( Figure 4 ) reveal that Africa accounted for 43% of diversity immigrants admitted in FY2017, but 11% of all LPRs admitted that fiscal year. Europeans made up 7% of all LPRs admitted in FY2017, but 22% of diversity immigrants. In contrast, Latin America (Mexico, Central America, the Caribbean, and South America) was the sending region for 43% of all LPRs admitted in FY2017, but provided 4% of the diversity immigrants during that fiscal year. North America (excluding Mexico) and Oceania account for a small percentage of LPRs admitted by any means. The distribution of LPR admissions and DV admissions from Asia illustrates the impact of the two-step visa allocation formula, which considers both regional and national admissions levels. Asia includes many top-sending countriesâsuch as China, India, and the Philippinesâfor family- and employment-based LPRs, making it a high-admission region. Yet it also includes low-admission countriesâsuch as Nepal, Iran, and Uzbekistanâthat rank high for their number of diversity visas. As a result, as Figure 4 illustrates, in FY2017 foreign nationals from Asia represented a somewhat more equivalent share of the 1.1 million LPRs (38%) in relation to their share (30%) of diversity LPRs in contrast to the other world regions. Diversity immigrants are, on average, younger than other LPRs. Department of Homeland Security data (see Figure 5 ) reveal that DV immigrants are more likely to be working-age adults and their children, and less likely to be over the age of 40 than LPRs overall. Also, the foreign-born population of the United States is more likely to be in the prime working-age group (i.e., ages 25 to 64) than the native-born population, and diversity immigrants have a younger age distribution than the foreign-born population as a whole. In addition, 56% of diversity immigrants in FY2017 were male compared to 46% of all LPRs. Diversity immigrants were less likely to be married than LPRs generally (47% versus 58%) in FY2017, perhaps a function of their relative youth. Over half (52%) of diversity immigrants were single, in contrast to 36% of LPRs overall. Few of either group were likely to be widowed, divorced, or separated. Recent critics of the diversity immigrant visa have argued against the program on the grounds that individuals do not need high levels of education or work experience to qualify for the DV program and that the U.S. admissions system should prioritize \"high-skilled\" immigrants. Neither DHS nor DOS publish data on the educational attainment of DV immigrants, but other sources provide some information. According to now-dated data from the New Immigrant Survey, a widely cited, nationally representative, longitudinal study of individuals who obtained LPR status in 2003, those who entered as principals via the diversity visa category had, on average, 14.5 years of schooling when they entered the United States, which was higher than those who were admitted on family-based visas as spouses or siblings of U.S. citizens (13.0 and 11.5 years, respectively), but lower than those who were admitted as principal employment-based immigrants (15.6 years). Similarly, DV immigrants were more likely to be fluent in English than most family-based immigrants (except for immigrant spouses of native-born U.S. citizens), but less likely than employment-based immigrants to be fluent in English. Using the same data source, the Migration Policy Institute found that 50% of DV immigrants who entered in 2003 had a college degree (32% with a bachelor's and 18% with a graduate degree). It is likely that the educational attainment of recent DV immigrants is higher than it was for those represented in the New Immigrant Survey, given that more recently arrived immigrants have higher levels of education overall than their predecessors. Government data on other labor market characteristics of DV immigrants are also limited. According to the New Immigrant Survey, DV immigrants who entered in 2003 had higher initial unemployment rates than employment-based immigrants and those who immigrated as spouses of U.S. citizens, but lower unemployment rates than those who immigrated as siblings of U.S. citizens. Four to six years after U.S. entry, however, DV immigrants' unemployment rates had dropped significantly and were similar to those of all other groups except employment-based principals (who had the lowest rates at both initial entry and four to six years later). DV immigrants' hourly earnings were similarly situated between that of employment-based immigrant category (which had the highest earnings) and that of the sibling category (which had the lowest). Among male immigrants earning wages, those who entered on diversity visas had the highest percentage growth in real hourly wages between initial entry and re-sampling four to six years later. Given its name and the discourse about \"new seed\" immigrants that preceded the creation of the diversity visa, the question arises whether the DV program has led to an increase in the diversity of immigrant flows to the United States. Leading up to and since its enactment, some observers have noted that, regardless of its name, the DV program was intended to benefit Irish and Italian constituents who had been negatively affected by the Immigration Act of 1965 that resulted in an increase in immigration from Asia and Latin America. During the transition period after the program was created (FY1992-FY1994), at least 40% of diversity visas were earmarked for Irish immigrants, and 92% of diversity visas in FY1994 went to Europeans. Since its full implementation in FY1995, however, immigrants from a wider range of countries and regions have entered via the program (see \" Regions of Birth \" above). The DV program's small size relative to total annual immigrant admissions (DV admissions make up about 5% of annual LPR admissions) limits its impact on the make-up of the immigrant population. Former Representative Bruce Morrison, who helped create the program, stated in a 2005 hearing that it was not Congress's intent to diversify the immigrant flow as a whole (\"It could not have possibly done so at the 50,000 number\"), but rather to add a new pathway for those who would not be able to enter under the family- or employment-based systems. By that standard, the program arguably fulfills its objectives, having admitted more than 1 million immigrants from under-represented countries since FY1995 (see Figure 3 ). Another way to assess the program's impact is to analyze the diversity of annual LPR flows before and after the DV program was established. Using a measure of diversity called the entropy index, CRS found that in FY1990, before the DV program was in effect, the diversity of LPR admissions was 0.52. In every year from FY1995 (when the DV program went into full effect) through FY2017 (the most recent data available), the diversity of annual LPR admissions was higher than in 1990, ranging from 0.67 to 0.72. In each of those years, the diversity of LPR admissions not including the DV admissions was lower than it was with DV admissions included (see the Appendix ), indicating that the admission of DV immigrants does increase the diversity of annual LPR admissions. A full analysis of the impacts of the DV program on admission numbers would also take into account individuals whom DV immigrants subsequently sponsor through the family-based admissions system. Because administrative data on immigrant admissions do not specify these linkages, this type of direct analysis is not currently possible. However, admissions data suggest that, at least for Africans, the DV has led to an increase in immigration via the family-based system (particularly immediate relatives). From 1992 to 2007, admissions of Africans based on family sponsorship grew faster than other categories of admissions for Africans, including diversity, which remained fairly stable over the time period. The DV seems to have diversified the African flow itself by boosting emigration from non-English speaking African countries (whereas English-speaking African countries have longer histories of U.S. immigration and are therefore more likely to be the source of sponsoring immigrant family members). Legislation related to the Diversity Immigrant Visa has focused largely on eliminating the program. Bills to eliminate the diversity visa category have been introduced in nearly every Congress since the program was created and have passed one chamber on more than one occasion. Most recently, S. 744 in the 113 th Congress, a comprehensive immigration reform bill that the Senate passed in 2013 by a vote of 68 to 32, would have eliminated the program. Other bills introduced in the past would have raised the annual limit of diversity visas or temporarily re-allocated diversity visas for other purposes. In the 116 th Congress, several bills to eliminate the DV program have been introduced, including H.R. 479 , H.R. 2278 , S. 1103 , and S. 1632 . In contrast, H.R. 3799 would raise the annual diversity visa allocation to 80,000. As Congress weighs whether to eliminate or revise the diversity visa category, it may want to consider various policy questions pertinent to this discussion. Given the 3.7 million approved family-based and employment-based petitions waiting for a visa to become available at the close of FY2018, some argue that the 50,000 diversity visas should be used for backlog reduction in these visa categories. Others might observe that the family-based, employment-based, and diversity visa categories are statutorily designed as independent pathways to LPR status and that the problems of the family-based and employment-based backlogs should be addressed separately. Some also argue that the DV program increases fairness in the immigration system by making visas available to individuals who would not otherwise have a chance of obtaining one and by discouraging illegal immigration through expanding access to the legal immigration system. Some argue that the diversity visa program reverts to discriminatory national origin quotas, which Congress eliminated through the 1965 amendments to the Immigration and Nationality Act. However, there are other examples of admissions policies that effectively discriminate based on nationality (e.g., H-2A, H-2B, E, and TN nonimmigrant visas, the Visa Waiver Program, and the per country caps on family- and employment-based LPR admissions, all of which limit admissions by nationality). Some also argue that admissions decisions should be based on higher levels of education, job experience, and language skills, or family ties to U.S. residents, rather than country of origin and being selected at random via a lottery. In contrast, others argue that the program bolsters equity of opportunityâa quintessential American valueâby providing a pathway for individualsâparticularly those from Africa, Eastern Europe, and the former Soviet Unionâwho do not have family or employer connections in the United States. Some also argue that the more than one million immigrants who have moved to the United States as a result of the program have enriched the United States culturally and economically, and strengthened the nation's global connections. Some also argue that efforts to end it are racially motivated or point out that for most of U.S. history, Africans in particular had little opportunity to come to the United States other than as slaves. Some equate the use of a lottery system in the DV program to awarding \"green cards\" at random and argue that luck should not come into play in U.S. admissions decisions. Others argue that, given the millions of interested applicants every year, a lottery is a fair method of reducing the applicant pool because it gives all entrants who meet the program's qualifications an equal chance to apply for a diversity visa. They also cite the use of a lottery in other over-subscribed visa categories such as the H-1B and H-2B temporary worker classifications to illustrate that U.S. immigration policy considers it a reasonable tool. Some observers concerned about immigration fraud surrounding the DV program reference a 2003 State Department Office of Inspector General report and a 2007 GAO report which found fraud vulnerabilities in the DV program. They may also cite the 2017 and 2018 complaints filed by the Department of Justice (DOJ) in two cases seeking the denaturalization of individuals who had gained admission (in 1997 and 2001) to the United States through the DV program. In the first case, DOJ filed a complaint to denaturalize four Somali-born diversity visa recipients who falsely claimed to be a family. In the second case, DOJ filed a complaint to denaturalize a diversity visa recipient who obtained naturalization without having disclosed two prior orders of removal. Those defending the fraud protections of the DV program counter that DOS has since revised the diversity lottery procedures to address fraud vulnerabilities, including a requirement to submit a recent photograph, the addition of biographic and facial recognition checks to reduce duplicate entries, a policy requiring the disqualification of entrants who fail to list their spouse and children on their entries, and technical improvements to limit manipulation of entries by automated bots. They also argue that the risk of fraud is not unique to the DV program and refer to the numerous fraud investigations and arrests of immigrants who entered the United States via other visa categories and the significant resources that DOS commits to fraud prevention for all immigrant and nonimmigrant visa applications through its Fraud Prevention Units at posts overseas. In addition, on June 5, 2019, DOS published an interim final rule to require diversity visa entrants to provide certain information from a valid, unexpired passport on the electronic entry form. This rule is intended to make it more difficult for third parties to submit unauthorized entries, because third parties are less likely to have individuals' passport numbers. Some assert that the difficulties of performing background checks in many of the countries whose natives currently qualify for the DV program, as well as broader concerns about terrorism, justify the elimination of the category. Some cite the 2004 warning of the DOS Deputy Inspector General that the diversity visa lottery \"contains significant vulnerabilities to national security\" from state sponsors of terrorism. They argue that DV immigrants, by definition, are not required to have employer or family ties in the United States and thus may be more likely to have nefarious intent. They cite the case of a New Jersey resident responsible for killing eight people with his rental truck in lower Manhattan in 2017, who had immigrated to the United States from Uzbekistan on a diversity visa. In response to that event, the Trump Administration called on Congress to immediately terminate the diversity visa lottery program. Others respond that immigrants coming to the United States in other immigrant visa categories are not restricted if they come from these same countries, and further argue that background checks for national security risks are performed on all prospective immigrants seeking to come to the United States. They also point to the 2005 DOS Inspector General's testimony that DOS's Bureau of Consular Affairs strengthened the DV program by complying with most of the recommendations in the OIG's 2003 report. They similarly note the testimony of one of the creators of the DV Program who contended that \"it is absurd to think that a lottery would be the vehicle of choice for terrorists\" and that attention should instead be focused on greater security risks. They also point out that since the creation of the Visa Security Program in 2003, DHS has aided consular officers in extensively vetting individuals applying for visas. They also reference a 2007 GAO report stating: \"We found no documented evidence that DV immigrants from these, or other, countries posed a terrorist or other threat. However, experts familiar with immigration fraud believe that some individuals, including terrorists and criminals, could use fraudulent means to enter or remain in the United States.\" Citing the millions of diversity visa lottery entries every year from around the world, some argue that the DV program is an efficient means of boosting American goodwill and \"soft power\" abroad, and that a diversity of immigrant origins helps the United States better respond to the challenges of globalization. Some also cite the value of remittances sent by diversity immigrants to their countries of origin as international development assistance without U.S. government expense. Others argue that the DV program encourages \"brain drain\" from developing countries, a concern which acknowledges that many DV immigrantsâparticularly from Africaâpossess education and skills beyond the minimum requirements for program eligibility. Supporters of the DV program argue that it honors the United States' history as a destination for enterprising immigrantsâthe \"self-selected strivers\" âwho arrive without family ties but with a desire to work hard for a better life. Some point to the present-day preponderance of immigrants from a handful of countries and argue that the diversity visa fosters new and more varied migration to counterbalance an admissions system weighted disproportionately to family-based immigration, which tends to perpetuate the dominance of certain countries. They also point to wide support for legislation that would remove or raise the 7% per-country limits on family- and employment-based immigrant admissions, which would likely result in further concentration of immigrant flows from the top sending countries. Even with the per-country limits and DV program in place, the total foreign-born population has become more concentrated in the top ten source countries compared to 1990 (see \" Impact of the DV Program on Immigrant Diversity \"). Others argue that, after almost 30 years, the diversity visa category has run its course. They might cite the countriesâsuch as Pakistan, Brazil, Nigeria, and Bangladeshâthat formerly qualified for the DV program and no longer do due to their increase in admissions, or the growth in immigration from Africa, Eastern Europe, and parts of Asia as an indication that the need for \"new seed\" immigration has been met. Others counter that these trends indicate that the program is meeting its goals and should be continued. They further argue that in many countries around the world, the diversity visa remains the only accessible avenue for immigrating to the United States. The entropy index (also called the Shannon index) is a measure of the diversity of a population. Diversity can be defined as the \"relative heterogeneity of a population.\" It is at its maximum when all subpopulations are present in equal proportions (for the purposes of this report, when each country of birth receives an equal number of LPR admissions). The formula for the entropy index is where H is the entropy index, k is the country-of-origin group, and P is the proportion of the total from each country-of-origin group. The index can be standardized by dividing by its maximum, log K. Doing so results in a range of 0 (for the case where all of the population is in one subpopulation) to 1.0 (for the case where all subpopulations are present in equal proportions). For this report, the standardized entropy index was calculated by year for country of birth of total LPR admissions, LPR admissions minus DV admissions, and DV admissions. This was calculated after creating a standardized list of countries across all years so that K was held constant. As shown in Figure A-1 , between FY1995 and FY2017, the entropy index varied, but in all years the index was higher when DV LPRs were included. ", "summary": "The purpose of the diversity immigrant visa program (DV program, sometimes called \"the green card lottery\" or \"the visa lottery\") is, as the name suggests, to foster legal immigration from countries other than the major sending countries of current immigrants to the United States. Current law weights the allocation of immigrant visas primarily toward individuals with close family in the United States and, to a lesser extent, toward those who meet particular employment needs. The diversity immigrant category was added to the Immigration and Nationality Act (INA) by the Immigration Act of 1990 ( P.L. 101-649 ) to stimulate \"new seed\" immigration (i.e., to foster new, more varied migration from other parts of the world). The DV program currently makes 50,000 visas available annually to natives of countries from which immigrant admissions were less than 50,000 over the preceding five years combined. The formula for allocating these visas is specified in statute: visas are divided among six global geographic regions, and each region and country is identified as either high-admission or low-admission based on how many immigrant visas were given to foreign nationals from each region and country over the previous five-year period. Higher proportions of diversity visas are allocated to low-admission regions and countries. The INA limits each country to 7% (3,500, currently) of the total and provides that Northern Ireland be treated as a separate foreign state. Because demand for diversity visas greatly exceeds supply, a lottery system is used to select individuals who may apply for them. Those selected by lottery (\"lottery winners\"), like all other foreign nationals wishing to come to the United States, must undergo reviews performed by Department of State consular officers abroad and Department of Homeland Security immigration officers upon entry to the United States. These reviews are intended to ensure that the foreign nationals are not ineligible for visas or admission to the United States under the grounds for inadmissibility spelled out in the INA. To be eligible for a diversity visa, the INA requires that a foreign national have at least a high school education or the equivalent, or two years' experience in an occupation that requires at least two years of training or experience. The foreign national or the foreign national's spouse must be a native of one of the countries listed as a foreign state qualified for the diversity visa program. The distribution of diversity visas by global region of origin has shifted over time, with higher shares coming from Africa and Asia in recent years compared to earlier years when Europe accounted for a higher proportion. Of all those admitted through the program from FY1995 (the first year it was in full effect) through FY2017 (the most recent year for which data are available), individuals from Africa accounted for 40% of diversity immigrants, while Europeans accounted for 31% and Asians for 25%. Some argue that the DV program should be eliminated and its visas re-allocated for employment-based visas or backlog reduction in various visa categories. Critics of the DV program warn that it is vulnerable to fraud and misuse and is potentially an avenue for terrorists to enter the United States, citing the difficulties of performing background checks in many of the countries whose citizens are eligible for a diversity visa. Critics also argue that admitting immigrants on the basis of their nationality is discriminatory and that the reasons for establishing the DV program are no longer germane. Supporters of the program argue that it provides \"new seed\" immigrants for a system weighted disproportionately to family-based immigrants from a handful of countries. Supporters contend that fraud and abuse have declined following measures put in place by the State Department, and that the system relies on background checks for criminal and national security matters that are performed on all prospective immigrants seeking to come to the United States, including those applying for diversity visas. Supporters also contend that the DV program promotes equity of opportunity and serves important foreign policy goals.", "document_type": "crs"}
{"report": "T he Livestock Mandatory Reporting (LMR) Act of 1999 ( P.L. 106-78 , Title IX; 7 U.S.C. Â§ 1635 et seq. ) amended the Agricultural Marketing Act of 1946 (7 U.S.C. Â§1621 et seq. ) to require that meat packers report prices and other information on purchases of cattle, swine, and boxed beef (wholesale cuts of beef) to the U.S. Department of Agriculture (USDA). Lamb and lamb meat were added through initial rulemaking, and the act was amended to include wholesale pork in 2010. In September 2015, Congress reauthorized LMR until September 30, 2020, in the enacted Agriculture Reauthorizations Act of 2015 ( P.L. 114-54 ). In past reauthorizations, most livestock industry stakeholders have supported reauthorization of the act and put forward proposals amending mandatory reporting. This report provides an overview of LMR and its legislative and rulemaking history; a description of the LMR program; and issues that the cattle, swine, and lamb industries have raised with USDA that could be considered during possible reauthorization. Information on House and Senate bills that would reauthorize LMR will be added should they become available. Before Congress enacted LMR in 1999, the USDA Agricultural Marketing Service (AMS) collected livestock and meat price and related market information from meat packers on a voluntary basis under the authority of the Agricultural Marketing Act of 1946. AMS market reporters collected and reported prices from livestock auctions, feedlots, and packing plants. The information was disseminated through hundreds of daily, weekly, monthly, and annual written and electronic USDA reports on sales of live cattle, hogs, and sheep and wholesale meat products from these animals. The goal was to provide all buyers and sellers with accurate and objective market information. By the 1990s, the livestock industry had undergone many changes, including increased concentration in meat packing and animal feeding, production specialization, and vertical integration (firms controlling more than one aspect of production). Fewer animals were sold through negotiated (cash or \"spot\") sales, while an increasing number of purchases were made under alternative marketing arrangements (e.g., formula purchases based on a negotiated price established in the future). These formula purchases were based on prices not publicly disclosed or reported. Some livestock producers, believing that such arrangements made it difficult or impossible for them to assess \"fair\" market prices for livestock going to slaughter, called for mandatory price reporting for packers and others who process and market meat. USDA had estimated in 2000 that the former voluntary system was not reporting transactions of the order of 35%-40% of cattle, 75% of hogs, and 40% of lambs. During initial debate in Congress on LMR, opponents, including some meat packers and other farmers and ranchers, argued that a mandate would impose costly new burdens on the industry and could cause the release of confidential company information. Nonetheless, some of these early opponents ultimately supported an LMR law. Livestock producers had experienced low prices in the late 1990s and were looking for ways to strengthen market prices. Some meat packers also supported a national consensus bill at least partly to preempt what they viewed as an emerging \"patchwork\" of state price reporting laws that could alter competition among packers operating under different state laws. LMR was enacted in October 1999 as part of the FY2000 Agriculture appropriations act. (See Table 1 , \"Legislative and Rulemaking History.\") The law mandated price reporting for live cattle, boxed beef, and live swine and allowed USDA to establish LMR for lamb purchases and lamb meat sales. The law authorized appropriations as necessary and required USDA to implement regulations no later than 180 days after the law was enacted. LMR was authorized for five years, until September 30, 2004. USDA issued a final rule on December 1, 2000. Although reporting for lamb was optional in the LMR statute, USDA established mandatory reporting for lamb in the final rule. The rule was to be implemented on January 30, 2001, but USDA delayed implementation until April 2, 2001, to allow for additional time to test the automated LMR program to ensure program requirements were being met. The implementation of LMR did not affect the continuation of the AMS voluntary price-reporting program. AMS continues to publish prices from livestock auctions and feeder cattle and pig sales through voluntary-based market news reports. LMR authority lapsed for two months in October 2004 before Congress extended it for one year to September 30, 2005. Authority for LMR lapsed again on September 30, 2005. At that time, USDA requested that all packers who were required to report under the 1999 act continue to submit required information voluntarily. About 90% of packers voluntarily reported, which allowed USDA to continue to publish most reports. In October 2006, Congress passed legislation to reauthorize LMR through September 30, 2010. This act also amended swine reporting requirements from the original 1999 law by separating the reporting requirements for sows and boars from barrows and gilts, among other changes. Because statutory authority for the program had lapsed for a year, USDA determined that it had to reestablish regulatory authority through rulemaking in order to continue LMR operations. On May 16, 2008, USDA issued the final rule to reestablish and revise the mandatory reporting program. This rule incorporated the swine reporting changes and was intended to enhance the program's overall effectiveness and efficiency based on AMS's experience in the administration of the program. The rule became effective on July 15, 2008. Mandatory wholesale pork price reporting was not included in the original LMR act because the swine industry could not agree on reporting for pork. Section 11001 of the 2008 farm bill ( P.L. 110-246 ) directed USDA to study the effects of requiring packers to report the price and volume of wholesale pork cuts, which was a voluntary reporting activity at the time. The study was released in November 2009 and concluded that there would be benefits from a mandatory pork reporting program. On September 27, 2010, the President signed into law the Mandatory Price Reporting Act of 2010 ( P.L. 111-239 ), reauthorizing LMR through September 30, 2015. The act added a provision for LMR of wholesale pork cuts, directed USDA to engage in negotiated rulemaking to make required regulatory changes for mandatory wholesale pork reporting, and established a negotiated rulemaking committee to develop these changes. The committee was composed of representatives of pork producers, packers, processors, and retailers. The committee met three times, was open to the public, and developed recommendations for mandatory wholesale pork reporting. USDA released the final rule on August 22, 2012, and the regulation was implemented on January 7, 2013. The Agriculture Reauthorizations Act of 2015 ( P.L. 114-54 ) was enacted into law on September 30, 2015, extending LMR to September 30, 2020. P.L. 114-54 included amendments to swine and lamb reporting and addressed certain issues that livestock stakeholders had raised about LMR. (See \" LMR Provisions Enacted in 2015 \" below.) The Agriculture Reauthorizations Act of 2015 ( P.L. 114-54 ) extended LMR through September 30, 2020, and established the negotiated formula purchase reporting category for swine. A negotiated formula purchase is a purchase of swine based on a formula, negotiated on a lot-by-lot basis, in which the swine are committed to packers and scheduled for delivery no later than 14 days after the formula is negotiated. The enacted legislation also amended swine LMR by requiring the reporting of the low and high range of net swine prices to include the number of barrows and the number of gilts within the ranges and the total number and weighted average price of barrows and gilts. Lastly, the act requires that next-day reports include transaction prices that were concluded after the previous day's reporting deadlines. P.L. 114-54 amended lamb reporting regulations to redefine lamb importers and lamb packers . Importer is defined as an entity that imports an average of 1,000 metric tons (MT) of lamb meat per year during the immediately preceding four years. The original threshold was 2,500 MT. If an importing entity does not meet the volume limit, the Secretary of Agriculture may still determine that an entity should be considered an importer. Lamb packer is defined as an entity having 50% or more ownership in facilities, including federally inspected facilities, that slaughtered and processed an average of 35,000 head per year over the immediately preceding five years. The original threshold was 75,000 head. Also, the Secretary may consider other facilities to be packers based on processing plant capacity. Lastly, the reauthorization required USDA to study the price-reporting program for cattle, swine, and lamb. The study, to be conducted by AMS and the USDA Office of the Chief Economist, was directed to analyze current marketing practices and identify legislative and regulatory recommendations that are readily understandable; reflect current market practices; and are relevant and useful to producers, packers, and other market participants. AMS submitted the report to Congress in April 2018. LMR requires livestock buyers and sellers of meat products to report prices and other characteristics of their transactions. Ten types of transactions are reported for livestock, and each is described below. Several other marketing terms are defined in the text box following the description of transactions. Lastly, there is a discussion of LMR confidentiality requirements, AMS reporting, and enforcement measures. Some types of transactions required under LMR are for specific livestock, such as cattle or swine, others cover all covered species. Negotiated purchase: a cash or \"spot\" market purchase by a packer of livestock from a producer under which the base price for the livestock is determined by seller-buyer interaction and agreement on a delivery day. Cattle are delivered to the packer within 30 days of the agreement. Swine are delivered within 14 days. Negotiated grid purchase (cattle): the negotiation of a base price, from which premiums are added and discounts are subtracted, determined by seller-buyer interaction and agreement on a delivery day. Cattle are usually delivered to the packer not more than 14 days after the date the livestock are committed to the packer. Forward contract: an agreement for the purchase of livestock, executed in advance of slaughter, under which the base price is established by reference to publicly available prices. For example, forward contracts may be priced on quoted Chicago Mercantile Exchange prices or other comparable public prices. Formula marketing arrangement: the advance commitment of livestock for slaughter by any means other than a negotiated or negotiated grid purchase or a forward contract using a method for calculating price in which the price is determined at a future date. Swine or pork market formula purchase: a purchase of swine by a packer in which the pricing mechanism is a formula price based on a market for swine, pork, or a pork product other than a future or option for swine, pork, or a pork product. Negotiated formula purchase (swine): a purchase of swine based on a swine/pork market formula that is negotiated lot-by-lot and scheduled for delivery and committed to the packer within 14 days of the negotiation. The sales are reported as producer- or packer-sold. Other market formula purchase: a purchase of swine by a packer in which the pricing mechanism is a formula price based on one or more futures or options contracts, and the sales are reported as producer- or packer-sold. Other purchase arrangement: a purchase of swine by a packer that is not a negotiated purchase, swine or pork market formula purchase, negotiated formula, or other market formula purchase and does not involve packer-owned swine. The sales are reported as producer- or packer-sold. Packer-sold swine: the swine that are owned by a packer (including a subsidiary or affiliate of the packer) for more than 14 days immediately before sale for slaughter and sold for slaughter to another packer. Packer-owned: livestock that packers (includes a subsidiary or affiliate of swine packers) own for at least 14 days immediately before slaughter. Information such as weight and dressing percent is reported on packer-owned livestock. Meat packers are also required to report negotiated sales, formula sales, and forward contracts for boxed beef, boxed lamb, carcass lamb, and wholesale pork. Negotiated sales : a wholesale pork, boxed beef, or boxed lamb trade in which a price is determined by seller and buyer and is scheduled for delivery no more the 14 days from the date the price is established. Formula marketing arrangements: agreements in which the price is determined based on publicly available quoted prices. Forward sales: a wholesale pork, boxed beef, or boxed lamb sale in which the price is determined by seller and buyer and the delivery is scheduled beyond the time of a negotiate sale (over 14 days). Export sales: meats that are delivered outside the United States but not to Canada or Mexico. Figure 1 and Figure 2 show the monthly percentage since 2002 of cattle and swine purchases by transactions type. Both demonstrate the long-term declining trend in negotiated purchases and the move to formula-based purchases. In January 2002, almost 50% of cattle were traded on a negotiated basis, but negotiated purchases amounted to about 25% of purchases in May 2019. The declining trend in negotiated purchases in swine has gone from 17% in January 2002 to less than 2% in February 2019. AMS does not report the number of lambs sold on a formula basis because of confidentiality requirements. Throughout 2017 AMS was unable to report formula purchases in its National Weekly Lamb Report that included both lamb negotiated and formula purchases because of confidentiality requirements. AMS stopped publishing the report in December 2017. In 2016, about 40% of lambs were purchased on a negotiated basis and 60% on a formula basis. Currently, AMS reports the number of lambs, their weight and price range, and the weighted average price of purchased lambs on a negotiated basis, as well as comprehensive information that includes the average weight, net price, and dressing percent that combines negotiated and formula purchase information. Sufficient data are not available to publish all of the regular LMR transactions due to the limited number of transactions. The text box above provides definitions of selected marketing terms that are used in LMR reports. The following sections discuss some of the main LMR reporting requirements, a description of confidentiality, and AMS reporting and enforcement of LMR. The complete LMR reporting requirements for cattle, swine, lamb, beef, pork, and lamb meat are in the LMR statute (7 U.S.C. Â§1635 et seq. ) and the LMR regulations (7 C.F.R. Part 59). LMR reports are available at the AMS Livestock, Poultry, and Grain Market News Portal . A description of selected reporting requirements under the LMR, and of the entities that are subject to them, follow. Packers that are subject to mandatory reporting are defined as federally inspected plants that have slaughtered a minimum annual average of 125,000 head of cattle, 100,000 head of swine, 200,000 head of sows and boars or a combination thereof, or 35,000 lambs during the immediate five preceding years. If a plant has operated for fewer than five years, USDA determines, based on capacity, if the packer must report. Packers are required to report the prices established for steers and heifers twice daily (10 a.m. and 2 p.m. central time), for cows and bulls twice daily (10 a.m. central for current day and 2 p.m. for previous-day purchases), barrows and gilts three times daily (7 a.m. central for prior-day purchases and 10 a.m. and 2 p.m. central), sows and boars once daily (7 a.m. central for prior-day purchases), and lambs once daily (2 p.m. central). Besides the established prices, packers report premiums and discounts and the type of purchase transactionâfor example, negotiated sales, formula sales, or forward contracts. Depending on the species, packers are required to report the quantity delivered for the day; the quantity committed to the packer; the estimated weight on a live weight basis or a dressed weight basis; and quality characteristics, such as quality grade. In addition to daily reporting, on the first reporting day of the week, packers file a cumulative weekly report of the previous week's purchases of steers, heifers, and swine. Lamb packers are required to report the previous week's purchases on the first and second reporting day of the week, depending on the data. Steer and heifer and lamb packers are to include data on type of purchase (negotiated, formula, or forward contract), premiums and discounts, and some carcass characteristics (e.g., quality grade and yield, average dressing percentage). Swine packers are required to report the amount paid in premiums that are based on noncarcass characteristics (e.g., volume, delivery timing, hog breed). Also, packers must provide producers a list of such premiums. In addition to livestock purchase prices, packers are required to report sales data for boxed beef, wholesale pork, and carcass and boxed lamb. Sales are reported twice daily for beef and pork and once daily for lamb. Packers are required to provide price, quantity, quality grade for beef and lamb, and type of cut. Packers must also report beef and pork domestic and export sales and domestic boxed lamb sales. Lamb importers who have imported a minimum average of 1,000 MT of lamb in the immediate four preceding years are required to report weekly lamb prices; quantities imported; the type of sale (negotiated, formula, or forward contract); cuts of lamb; and delivery period. The LMR law requires that price reporting be confidential to protect packer identity, contracts, and proprietary business information. In determining what data could be published, AMS initially adopted a \"3/60\" confidentiality guideline, which is commonly used throughout the federal government. Under 3/60, at least three entities must report in the regional or national reporting area, and no single entity may account for more than 60% of the reported market volume. Because of concentration in the livestock industry, AMS found that the \"3/60\" guideline resulted in large gaps in data reporting. For example, between April 2, 2001, and June 15, 2001, 24% of daily reports and 20% of weekly reports were not published because of confidentiality provisions. In order to address the data gaps, in August 2001 AMS adopted a \"3/70/20\" guideline, which requires that (1) at least three entities report 50% of the time over the most recent 60-day period, (2) no single reporting entity may account for more than 70% of reported volume over the most recent 60-day period, and (3) no single reporting entity may be the only reporting entity for a single report more than 20% of the time over the most recent 60-day period. These new guidelines eliminated most of the data gaps. The Livestock, Poultry, and Grain Market News Division of the AMS Livestock, Poultry, and Seed Program is responsible for compiling and disseminating the information collected under LMR. It continues to operate a voluntary reporting program for livestock, poultry, and grain not covered under LMR. Under LMR, AMS publishes 24 daily cattle reports, 20 daily swine reports, and 2 daily lamb reports, and on a weekly basis, 21 cattle reports, 2 swine reports, and 3 lamb reports. It also publishes daily 6 boxed beef reports, 4 wholesale pork reports, and 1 boxed lamb and 1 lamb carcass report, and weekly 11 boxed beef reports, 10 wholesale pork reports, and 1 boxed lamb and 1 lamb carcass report. AMS also publishes 13 monthly cattle reports under LMR. According to AMS, LMR provides data for 78% of total slaughtered cattle, 94% of hogs, and 43% of sheep. For meat products, LMR covers 93% of boxed beef production, 87% of wholesale pork, and 43% of boxed lamb. Small operations that fall below required thresholds or nonfederally inspected meat packing facilities account for the remaining percentage of livestock slaughter and meat production. AMS market news operates on an annual appropriation of about $34 million, and the LMR program accounts for about $4 million of that amount. AMS compliance staff enforces LMR through audits once every six months. AMS accomplishes this by reviewing support documentation for randomly sampled lots. AMS classifies noncompliance as major or minor violations. Major violations occur when packers do not submit information or submit incorrect information that affects the accuracy of reports. Minor violations are submissions that have typographical or data entry errors, for example, but have a minimal effect on report accuracy. If noncompliance is found, AMS will ask the packer to correct the problem. If the packer does not correct the problem, AMS may issue a warning letter and conduct additional audits. Ultimately, AMS could fine the packer $10,000 for each violation if corrective action is not taken. Packing plants have the right to appeal any noncompliance findings within 30 days of receiving a request for corrective action. In FY2015, AMS switched from quarterly plant visit reports to semiannual compliance reports on plant visits. For FY2018, AMS issued 369 noncompliance violations (270 major and 99 minor) during audits of 457 plants and 4,389 audited lots. As part of the 2015 reauthorization study requirement, AMS held several meetings with cattle, swine, and lamb industry stakeholders to gather feedback on the LMR program. Stakeholders represented at the meetings included industry associations, farm groups, meat processors and food companies. In several cases AMS has already implemented reporting changes to address industry concerns. A common concern among stakeholders is the limited volume of the negotiated purchase market (see Figure 1 and Figure 2 ). Other concerns cited went to issues of confidentiality and the need for greater clarity in how transactions are categorized in reports. Some stakeholders want to see more detailed information on transactions, such as premiums, especially as pricing models evolve, as well as changes in reporting on the number of livestock committed to packers. The sections below provide summaries of the baseline study and stakeholder feedback. In response to the report requirements in the 2015 reauthorization, AMS commissioned a baseline study that explored underlying changes in the livestock and meat markets that affect LMR. The study's findings include the following: 1. Since LMR was established, the meatpacking industry has become more concentrated and vertically integrated. Many producers are also looking to vertical integration to remain competitive. 2. The industry is responding to domestic and global consumer meat demand with product differentiation and a mix of new products that did not exist when LMR began. 3. Livestock and meat are traded differently than they were 20 years ago as negotiated trades represent a smaller share of transactions, while formula pricing, forward contracts, and other arrangements comprise an increasing share of the total trade. 4. There are new platforms for pricing, such as internet auctions, that did not exist in early years of LMR. The industry is likely to continue to develop other platforms that vary greatly from traditional trading of livestock and meat. The study's authors concluded that the loss of LMR data during the 2013 government shutdown left the industry without a benchmark to accurately evaluate the markets. During the 2018-2019 shutdown AMS continued LMR reporting. Further structural changesâconcentration and integrationâin the livestock industry create challenges for confidentiality in reporting. In addition, the effectiveness of LMR as a means of providing relevant information for market participants may need to be assessed in the context of changes, such as introduction of branded or specialty programs that are not captured by LMR as it is currently structured. Also, with international trade in meat increasing, the inclusion of more market information on exported meat products could add to transparency in the market. Lastly, the study noted that timely AMS collaboration with the industry is crucial to the usefulness of LMR. Stakeholders in the cattle, swine, and lamb industries provided a range of comments and suggestions during their meetings with AMS, and these are summarized below. Cattle stakeholders did not offer legislative recommendations to AMS but suggested changes to LMR reporting. AMS has already addressed some cattle stakeholder concerns. For example, cattle stakeholders raised concerns about how AMS reports delivery periods for negotiated purchases. A period of 15-30 days for deliveries was added in 2008, but AMS was unable to report data because of confidentiality guidelines. Instead data was reported as deliveries of 0-30 days. In response, AMS conducted a study of delivery periods, and in November 2017 it began reporting weighted average negotiated cattle prices for delivery periods of 0-14 and 15-30 days. AMS has also adjusted reporting so that negotiated purchases delivered beyond 30 days are separate from forward contract purchase. Some in the cattle industry expressed the need for greater reporting of committed cattle. For example, hog packers report each morning the number of hogs they have committed to take delivery of during the next 14 days. Conversely, some cattle stakeholders disagree that additional data on committed cattle is needed, pointing out that cattle market numbers are smaller than swine numbers, and therefore the information could be misleading. Stakeholders in the swine industry also expressed concern about the low volume of transactions in the negotiated markets. They were also skeptical about whether LMR can adequately capture market information related to changes in consumer preferences for porkâsuch as organic, antibiotic-free, raised without sow crates, or pork raised without the growth promoter ractopamine. In general, swine stakeholders also want AMS to report more noncarcass premiums, revise its reporting on the pork cutout (cut up parts of the carcass), and provide guidance on how transactions are categorized. Swine stakeholders offered the following six recommendations for legislative changes to LMR: 1. Remove the \"negotiated formula purchase\" definition and reporting requirement for swine that was included in the 2015 LMR reauthorization; 2. Amend the definition of non-carcass merit premium to more clearly differentiate the reporting requirements from premiums offered for carcass merit; 3. Define and report swine attributes, specifically addressing how attribute premiums, base prices, and net prices are reported by purchase type; 4. Amend the definitions of affiliate to lower the threshold of ownership or control to anything greater than 0 percent; 5. Add to reporting the volume of swine or pork market formula transactions that are priced on the pork carcass cutout; and 6. Remove the requirement for reporting wholesale pork on a free-on-board (FOB) Omaha basis. Wholesale pork is reported on an FOB plant basis and FOB Omaha basis, but most of the pork industry now uses FOB plant as the basis for pricing. The U.S. sheep and lamb industry is a concentrated market that results in price-reporting challenges not necessarily experienced by the larger cattle and hog sectors. As a result, AMS is no longer able to publish lamb formula purchases because too few companies purchase the volume needed to meet reporting confidentiality guidelines. At the request of the lamb industry, AMS commissioned a study of lamb data and confidentiality. The study found that it is not feasible to relax confidentiality guidelines but suggested alternatives such as publishing a comprehensive report, which AMS has done, and developing a standardized pricing model that would produce a price based on the relationship of various reporting attributes. The lamb stakeholders raised concerns that AMS was not capturing price information for cooperative-owned lambs and for custom slaughtered lambs. AMS addressed the cooperative owned lamb issue in November 2017 by adding these lamb prices and their carcass weight information to its weekly sheep report. Under custom slaughter, ownership does not change. A producer's lambs are slaughtered on contract and are usually priced on a per-head basis. The lamb carcasses may then be sold to a lamb processor for fabrication (processing the carcasses into various cuts), but prices are not reported to AMS. Lastly, some stakeholders requested reporting of the number of lambs committed to be delivered to packers. However, the industry is not in agreement on reporting of committed lambs because of concern among some that this information would provide market information to import competitors. Lamb stakeholders involved in discussions with AMS proposed that three amendments be included in the reauthorization of LMR: 1. Lower the reporting threshold for lamb packers from 35,000 head per year on average to 20,000 head per year on average. 2. Define and require reporting of custom slaughtered lambs. 3. Define and require reporting of committed lambs. LMR, as enacted and amended over the past 20 years, has increased market transparency for all market participants and livestock analysts. Livestock stakeholders have been generally supportive of LMR and its reauthorization over the years. The five-year reauthorization period has provided an opportunity for Congress to receive input from livestock stakeholders and evaluate whether or not the law and its implementation is fulfilling its purpose. This has proven especially critical when the industry is constantly changing and adapting to market and consumer demands. The 2015 reauthorization law that required that USDA provide a report to Congress on the LMR program offers a potential starting point for Congress to consider for possible 2020 reauthorization. Livestock stakeholders have offered specific proposals for Congress to consider should it choose to address reauthorization legislation. Other recommendations may be forthcoming. AMS regularly engages the livestock industry on LMR reporting issues and makes changes to reporting. During consideration of reauthorization, Congress may consider legislation to bolster LMR and whether AMS needs additional regulatory authority to address LMR issues. Stakeholders may have particular interest in adjusting confidentiality requirements for lamb reporting and expanding reporting requirements for certain attributes that address changing livestock markets.", "summary": "The U.S. Department of Agriculture's (USDA) Agricultural Marketing Service (AMS) collects livestock and meat price data and related market information from meat packers under the authority of the Agricultural Marketing Act of 1946 (7 U.S.C. Â§1621 et seq. ). This information was collected on a voluntary basis until 2001, when most of it became mandatory. As the livestock industry became increasingly concentrated in the 1990s, fewer animals were sold through negotiated (cash or \"spot\") purchases and with increasing frequency were sold under alternative marketing arrangements that were not publicly disclosed under voluntary reporting. Some livestock producers, believing such arrangements made it difficult to impossible for them to assess \"fair\" market prices for livestock going to slaughter, called for livestock mandatory reporting (LMR) for packers who purchase livestock, process them, and market the meat. In response, Congress passed the Livestock Mandatory Reporting Act of 1999 ( P.L. 106-78 ) that mandated price reporting for cattle, boxed beef, and swine and allowed USDA to establish mandatory price reporting for lamb purchases. USDA issued a final rule that included lamb reporting in December 2000 and took effect in April 2001. Since then, the law has been amended to include more detail on swine reporting and has added wholesale pork as a covered product. The act has been reauthorized four times, and most recently the Agriculture Reauthorizations Act of 2015 ( P.L. 114-54 ) reauthorized LMR through September 30, 2020. In addition to extending LMR, the enacted legislation established the \"negotiated formula purchase\" category for swine and added additional swine reporting requirements (e.g., net prices and head counts by type of swine). The act also amended reporting volume thresholds for lamb importers and lamb packers. The reauthorization required USDA to conduct a study that analyzed current marketing practices, identified livestock industry stakeholder concerns, and solicited stakeholder legislative and regulatory recommendations for LMR. AMS submitted this report to Congress in April 2018. The LMR study found that the meatpacking industry has become more concentrated and vertically integrated since LMR was established. It also found that the industry is responding to domestic and global consumer meat demand with product differentiation and a mix of new products that did not exist when LMR began. And it concluded that the types of transactions for livestock and meat have significantly changed as negotiated trades decrease and are replaced by formula pricing, forward contracts, and other arrangements. AMS held several meetings with cattle, swine, and lamb industry stakeholders to gather feedback on the LMR program in 2016 and 2017. Stakeholders represented at the meetings included industry associations, farm groups, meat processors, and food companies. Since then, AMS has implemented reporting changes that address several concerns raised by stakeholders. A common concern among stakeholders is the low volume of negotiated purchases and a parallel trend toward increased formula purchases or other marketing arrangements. Other concerns are about confidentiality and a lack of clarity on how transactions are categorized in reports, with some stakeholders advocating for the inclusion of more details about transactions, such as premium levelsâespecially as the market changesâand reporting on the number of livestock committed to packers. Swine and lamb stakeholders have provided specific legislative recommendations to be considered during possible reauthorization of the act in the 116 th Congress. Swine stakeholders have recommended eliminating the \"negotiated formula purchase\" transaction and the reporting of wholesale pork prices based on shipment to Omaha, Nebraska, because these reporting requirements are rarely used in the swine industry today. They also recommended expanding definitions and reporting on certain swine attributes. Lamb stakeholders have recommended setting a lower threshold for the number of lambs processed by a packer to be covered by LMR and requiring custom slaughtered lambs and the number of lambs committed to packers to be reported.", "document_type": "crs"}
{"report": "On March 27, 2020, the Coronavirus Aid, Relief, and Economic Security (CARES) Act was signed into law ( P.L. 116-136 ). The CARES Act includes $3.5 billion in supplemental appropriations for the Child Care and Development Block Grant (CCDBG). This report provides an overview of the CCDBG provisions in the CARES Act. Among other things, these provisions address allowable uses and flexibilities of the supplemental funds. The report also includes allocations for the additional $3.5 billion in CCDBG appropriations. The CCDBG Act (42 U.S.C. Â§Â§9858 et seq.) is the main federal law supporting child care programs for low-income working families. The CCDBG is administered by the U.S. Department of Health and Human Services (HHS). HHS allocates CCDBG funds to states, territories, and tribes according to a statutory formula. In addition, certain funds may be reserved for other activities, such as technical assistance and research. State, territory, and tribal lead agencies submit CCDBG plans to HHS every three years describing how their child care programs will operate. CCDBG funds are used to subsidize the cost of child care for eligible children of low-income working parents. Funds are also used to support activities to improve the quality of child care and for certain other costs. The CARES Act appropriates $3.5 billion in FY2020 emergency supplemental funds to the CCDBG. The funds are to be used to \"prevent, prepare for, and respond to coronavirus.\" The CARES Act funds are provided in addition to FY2020 annual appropriations of $5.8 billion (see P.L. 116-94 ). The additional $3.5 billion represents a 60% increase in total appropriations to the CCDBG in FY2020. The additional funds are to remain available for obligation by HHS through September 30, 2021 (i.e., the end of FY2021). The CARES Act includes a number of provisions that clarify allowable uses and, in some cases, waive certain underlying requirements of the CCDBG Act. Below is a brief discussion of key provisions. Under the CCDBG Act, lead agencies subsidize the cost of child care for eligible children. Lead agencies commonly provide subsidy payments directly to child care providers. In some cases, lead agencies may provide additional CCDBG funds to eligible providers for other purposes, such as supporting professional development or helping build the supply of quality child care. The CARES Act specifies that CCDBG funds appropriated in the act may be used to provide continued payments and assistance to child care providers in cases of decreased enrollment or closures related to coronavirus, and to ensure that providers are able to remain open or reopen as appropriate and applicable. The CCDBG Act generally encourages (but does not require) lead agencies to make payments to child care providers based on enrollment rather than attendance. Specifically, the law states that lead agencies should \"to the extent practicable\" delink provider reimbursements from an eligible child's occasional absences due to holidays or unforeseen circumstances such as illness. This provision of the law is intended to support the fixed costs incurred by providers. The CARES Act specifies that CCDBG funds appropriated in the act shall be available to eligible child care providers under the CCDBG Act for the purposes of cleaning and sanitation, and other activities necessary to maintain or resume the operation of programs. The act clarifies that this provision applies to eligible child care providers even if those providers were not receiving CCDBG assistance prior to the public health emergency resulting from coronavirus. Under the CCDBG Act, eligible child care providers generally must be licensed, regulated, or registered by the state (though states may exempt certain providers from this requirement); and meet certain minimum health and safety standards. An exception to these requirements is made in cases of child care providers caring only for relatives. However, such providers must comply with requirements applicable to relative caregivers. The CARES Act encourages states, territories, and tribes to place conditions on payments to child care providers aimed at ensuring providers use a portion of the funds to continue to pay staff salaries and wages. Payment of salaries and wages is not explicitly addressed in the CCDBG Act, though presumably it is typical for some share of CCDBG provider payments to support these expenses. According to national estimates from the Bureau of Labor Statistics (BLS), the mean hourly wage for child care workers was $12.27 in May 2019. BLS estimated the mean annual wage for child care workers at $25,510 nationally. The CARES Act specifies that states, territories, and tribes are authorized to use CCDBG funds appropriated in the act to provide child care assistance to health care sector employees, emergency responders, sanitation workers, and other workers deemed essential during the response to coronavirus by public officials. Further, the act specifies that such workers may receive CCDBG assistance without regard to the typical income eligibility requirements under the CCDBG Act. The CCDBG Act generally stipulates that eligible children must be under age 13 (children may be older in limited circumstances ); reside with a parent who is working or attending job training (unless the child is receiving or needs to receive protective services); have family income no greater than 85% of state median income (SMI), or lower depending on state policy; and have no more than $1 million in family assets. While the CARES Act waives income requirements for essential workers as noted above, it does not waive other eligibility requirements (e.g., those related to the child's age or the parent's work status). The CARES Act requires HHS to remind states that CCDBG state plans do not need to be amended prior to using \"existing authorities in the CCDBG Act for the purposes provided\" in the CARES Act. Typically, if a state intends to make a substantial change to policies laid out in its CCDBG plan (e.g., a change in eligibility rules, provider payment rates, family copayments), the state would submit a state plan amendment to HHS for approval. Under regulations, a plan amendment must be submitted within 60 days of the effective date of the requirement (i.e., the state may execute the policy change before submitting the amendment). HHS has 90 days to approve or deny a plan amendment. In the current circumstances, there are several reasons states might want to amend their plans. For instance, the CARES Act authorizes HHS to provide child care assistance to essential workers regardless of income. This is a substantial change, as federal law and state policies generally condition eligibility on family income. The CARES Act effectively waives or adjusts certain requirements related to the obligation and expenditure of the CCDBG funds appropriated in the act. The CCDBG Act generally requires lead agencies to spend at least 9% of their FY2020 allotments on quality activities, plus an additional 3% on activities to improve the quality of care for infants and toddlers. All told, these quality set-asides are intended to account for at least 12% of spending from FY2020 allotments. The CARES Act effectively waives these quality spending minimums for funds provided in the act, offering lead agencies greater flexibility in how funds may be spent. The CCDBG Act includes requirements related to minimum spending on direct services. (The term direct services generally refers to child care assistance provided to families and is often, but not always, provided in the form of a voucher.) For instance, after lead agencies set aside funds to meet minimum quality spending requirements and for spending on administrative costs (capped at 5% for states and territories ), they must use at least 70% of remaining CCDBG funds for direct services. The CARES Act effectively waives direct spending requirements in the CCDBG Act, again offering lead agencies greater flexibility in how funds may be spent. The CARES Act specifies that funds provided via the CCDBG are to be used to supplement, not supplant , state, territory, and tribal general revenue funding for child care assistance for low-income families (i.e., the funds provided under the act should not be used to replace existing state, territory, or tribal spending on such activities). CCDBG provisions in annual appropriations acts typically include similar provisions. Past guidance from HHS suggests that this requirement would likely be considered satisfied if a state, territory, or tribe does not make any administrative or legislative changes to reduce general revenue spending after the enactment of a new CCDBG appropriation. An action occurring after this date could potentially be considered a violation of the non-supplantation requirement, unless the lead agency demonstrates that the reduction was not due to increased federal CCDBG funds. The CARES Act specifies that the CCDBG funds it appropriates may be made available to restore amounts, either directly or through reimbursement, for obligations incurred prior to enactment. These amounts may only be restored with CARES Act funds if they were used to prevent, prepare for, and respond to coronavirus. The CARES Act states that payments made by HHS may be obligated by the state, territory, tribe, or other recipient in the current fiscal year or the succeeding two fiscal years. Effectively, this means that lead agencies have through FY2022 to obligate funds they receive under the CARES Act. The CCDBG Act typically gives states or other recipients two fiscal years, rather than three, to obligate funds. CCDBG funds are generally allocated according to a formula set in statute. Under the CCDBG Act formula, HHS is to reserve up to 0.5% for territories and not less than 2% for tribes and tribal organizations. The formula also includes set-asides for technical assistance (up to 0.5%); research, demonstrations, and evaluation (0.5%); and a national toll-free hotline and website (up to $1.5 million). After all reservations have been made, the remaining funds go to states. Funds are allocated to states according to a formula based on their share of children under age five, their share of children receiving free- or reduced-price lunches, and state per capita income. Table 1 presents FY2020 CCDBG allocations released by HHS. The table includes allocations from FY2020 annual appropriations ( P.L. 116-94 ), as well as the CARES Act ( P.L. 116-136 ). ", "summary": "On March 27, 2020, the Coronavirus Aid, Relief, and Economic Security (CARES) Act was signed into law ( P.L. 116-136 ). The CARES Act includes $3.5 billion in supplemental appropriations for the Child Care and Development Block Grant (CCDBG). These funds are to be used to \"prevent, prepare for, and respond to coronavirus.\" The CCDBG Act (42 U.S.C. Â§Â§9858 et seq.) is the main federal law supporting child care programs for low-income working families. The CCDBG is administered by the U.S. Department of Health and Human Services (HHS). HHS allocates CCDBG funds to states, territories, and tribes according to a statutory formula. State, territory, and tribal lead agencies submit CCDBG plans to HHS every three years describing how their child care programs will operate. CCDBG funds are used to subsidize the cost of child care for eligible children of low-income working parents. Funds are also used to support activities to improve the quality of child care and for certain other activities. The $3.5 billion in supplemental CCDBG funds are provided in addition to FY2020 annual appropriations of $5.8 billion ( P.L. 116-94 ). The additional $3.5 billion represents a 60% increase in total appropriations to the CCDBG in FY2020. The CARES Act funds may be used under existing CCDBG Act authorities. In addition, the CARES Act includes a number of provisions that clarify allowable uses and, in some cases, waive certain underlying requirements of the CCDBG Act. For instance, the CARES Act specifies that the funds may be used to provide continued payments and assistance to child care providers in cases of decreased enrollment or closures related to coronavirus, and to ensure they are able to remain open or reopen; may be used to continue to pay staff salaries and wages of child care providers (CCDBG lead agencies are encouraged to place conditions on payments to child care providers aimed at ensuring that a portion of the funds they receive go toward costs of salaries and wages); may be used to provide child care assistance to health care sector employees, emergency responders, sanitation workers, and other workers deemed essential during the response to the coronavirus, without regard to typical CCDBG income eligibility requirements (federal law generally limits eligibility to those whose family income does not exceed 85% of state median income, though most states set income limits below this federal threshold); shall be available to eligible child care providers under the CCDBG Act (even if they were not receiving CCDBG funds previously) for the purposes of cleaning and sanitation, and other activities necessary to maintain or resume program operation; are exempt from the minimum spending requirements for quality activities and direct services; may be used for allowable obligations incurred prior to enactment of the CARES Act; may be used for purposes provided in the CARES Act before the lead agency submits any applicable CCDBG plan amendments to HHS (under regulations, lead agencies generally must submit state plan amendments within 60 days of policy change); shall be used to supplement, not supplant, state, territory, and tribal general revenue funds for child care assistance for low-income families; and are to remain available for obligation by HHS through the end of FY2021 and may remain available for obligation by CCDBG le ad a gencies through the end of FY2022.", "document_type": "crs"}
{"report": "Congress has long been interested in the status of indigenous peoples abroad. In 1992, the 102 nd Congress enacted H.R. 5368 ( P.L. 102-391 ) requiring the State Department's annual human rights report to \"describe the extent to which indigenous people are able to participate in decisions affecting their lands, cultures, traditions and the a llocation of natural resources, and assess the extent of protection of their civil and political rights.\" Issues relating to indigenous peoples periodically have been considered in hearings focused on such issues as environmental protection, energy opportunities, and security cooperation. This report provides statistical information on indigenous peoples in Latin America, including populations and languages, socioeconomic data, land and natural resources, human rights, and international legal conventions. Resource lists for each section (languages; socioeconomics; land and resources; international organizations; and human rights) are available in the tables of Appendix A . Table B-1 lists national agencies that oversee indigenous affairs in each country. Definitions of indigenous peoples vary. The United Nations (U.N.) has not adopted an official definition, but instead relies on self-identification to categorize indigenous populations around the world; many countries do the same. However, the U.N. web page dedicated to indigenous peoples does state \"indigenous peoples are inheritors and practitioners of unique cultures and ways of relating to people and the environment. They have retained social, cultural, economic and political characteristics that are distinct from those of the dominant societies in which they live.\" The annex of the U.N. Declaration on the Rights of Indigenous Peoples states \"indigenous peoples have suffered from historic injustices as a result of, inter alia , their colonization and dispossession of their lands, territories and resources.\" The Organization of American States' (OAS) American Declaration on the Rights of Indigenous Peoples repeats the U.N. Declaration language and adds \"indigenous peoples are original, diverse societies with their own identities that constitute an integral part of the Americas.\" According to OAS estimates, there are more than 50 million people of indigenous descent in the Western hemisphere. This report examines those living in Latin American and the Caribbean. According to the Manual for National Human Rights Institutions that accompanied the U.N. Declaration on the Rights of Indigenous Peoples, \"indigenous peoples have argued against the adoption of a formal definition at the international level, stressing the need for flexibility and for respecting the desire and the right of each indigenous people to define themselves.â¦ As a consequence, no formal definition has been adopted in international law. A strict definition is seen as unnecessary and undesirable.\" In counting distinct groups, this report uses the term \"indigenous groups\" rather than \"tribe,\" \"nation,\" \"ethnic minority,\" or \"sociolinguistic group.\" A 2019 United Nations report included sections titled \"the need for disaggregated data\" and \"the persistent invisibility of indigenous peoples\" to address data limitations regarding indigenous people around the globe. However, the report notes progress in Latin America: \"only two censuses included self-identification criteria in the 1990 round, but by the 2010 round such criteria were present in 21 of them.\" Despite some advances, the sources cited in this report contain data limitations, which are discussed in Appendix A . The countries listed in each table or graph may differ from others in this report based on the information available in the sources. Latin America is home to 29-45 million indigenous people according to several studies that provided estimates for around 2010. The World Bank stated in a report that \"official data on indigenous people are not conclusive, as many technical and sociological difficulties persist in census data collection. Other sources based on estimates and unofficial data refer to 50 million indigenous inhabitants in Latin America (about 10 percent of the total population). For this report, however, we will refer to the officialâalbeit imperfectânumbers provided by the national censuses [41.81 million].\" Figure 1 illustrates the total number of indigenous people and their share of the total population according to three sources: a 2009 UNICEF report, a 2015 report from the Economic Commission for Latin America and the Caribbean (ECLAC), and a 2015 World Bank Report. Census projections forecast indigenous population increases in many countries in part due to populations that are younger on average than non-indigenous populations and in part due to an increase in self-identification. Table 1 shows a breakdown by country of indigenous populations and their share of the overall population. CRS created the following tables from several sources; publication dates and methodologies differed. The countries listed in each table may differ from others in this report based on the information available in the sources. Figure 2 illustrates the range of estimates regarding the indigenous population as a percentage of the general population in each country. Bolivia's steep decrease in the indigenous population reflects \"reasons that probably have more to do with discrepancies in how the data were collected between the last two censuses than with a real trend to negative growth,\" according to the World Bank. More generally, differences in data collection between censuses and across countries make it difficult to estimate population increases. To raise awareness and mobilize action, the U.N. declared 2019 the International Year of Indigenous Languages, yet figures on indigenous groups and languages vary among sources. Figure 3 shows the total number of indigenous groups in Latin America as identified by three sources. A 2009 UNICEF report identified a total of 655 indigenous groups in Latin America. The 2014 ECLAC report cites 826 indigenous groups in Latin America although it does not provide a country breakdown. Of these 826, about 200 indigenous groups live in voluntary isolation, which is defined by an Inter-American Commission on Human Rights report as groups that \"do not maintain sustained contacts with the majority non-indigenous population.\" The World Bank's 2015 report identifies 772 indigenous groups in Latin America. According to several sources, indigenous languages number fewer than the number of indigenous groups across the region (see Figure 4 ). The 2015 World Bank report found 558 indigenous languages across 20 countries of Latin America, while a 2009 UNICEF report found 551 languages across the same 20 countries. Of these 551, the latter report found that 111 languages are vulnerable to extinction although five (Quechua, Nahuatl, Aymara, Yucatan Maya, and Ki'che') had over a million speakers each. In 2019, the Summer Institute of Linguistics (SIL International) reported 880 indigenous languages are spoken across the same 20 Latin American countries. Table 2 shows a breakdown of Latin America's indigenous groups and languages by country according to two sources. CRS created the table from several sources; publication dates and methodologies differed. The countries listed in each table may differ from others in this report based on the information available in the sources. According to the U.S. Census Bureau, approximately 15,000-19,000 indigenous language speakers from Latin America reside in the United States. Additional resources about indigenous groups and languages can be found in Table A-1 . In a 2015 publication, the World Bank found that 43% of indigenous people in Latin America are poor (living on less than $5.50 a day in 2011 purchasing power parity prices or PPP), and 24% are extremely poor (living on less than $1.90 a day in 2011 PPP prices), more than twice the rates for non-indigenous people. The report also documented education gaps were across the region. Drawing from another World Bank resource, Figure 5 compares rates of indigenous peoples living on less than $5.50 a day compared to the general population in select countries of Central and South America. The World Bank provides statistics on access to various services and opportunities for indigenous peoples in select countries of Central and South America, last updated in October 2018. The following graphs compare indigenous rates of access to these amenities compared with the general population rates by country ( Figure 6 , electricity; Figure 7 , internet; Figure 8 , home ownership; Figure 9 , sewage; and Figure 10 , water). The World Bank also provides labor and education statistics for indigenous peoples in select countries of Central and South America, last updated in October 2018. The following graphs compare indigenous rates compared with general population rates by country ( Figure 11 , literacy; Figure 12 , school attendance; Figure 13 , unemployment; and Figure 14 , low-skill and high-skill employment). In the appendix, Table A-2 lists resources relating to the socioeconomic standing of indigenous peoples in Latin America. A 2017 World Resources Institute (WRI) report states \"the precise amount of communal land is not known, but many experts argue that at least half of the world's land is held by Indigenous Peoples and other communities. Some estimates are as high as 65 percent or more of the global land area.\" The WRI goes on to specify that \"globally, Indigenous Peoples and local communities have formal legal ownership of 10 percent of the land, and have some degree of government-recognized management rights over an additional 8 percent.\" The United Nations' Economic Commission for Latin America and the Caribbean's (ECLAC) 2014 report Guaranteeing indigenous people's rights in Latin America: Progress in the past decade and remaining challenges states that \"over the past decade, booming international demand for primary goods (minerals, hydrocarbons, soybeans and other agricultural commodities) has boosted economic growth in the countries of Latin America but has had its cost in the form of a growing number of environmental, social and ethnic conflicts involving extractive industries located in or near indigenous territories.\" According a 2012 Forest Peoples Programme global report, \"[A]n estimated 350 million people live inside or close to dense forests, largely dependent on these areas for subsistence and income, while an estimated range of 60 million to 200 million indigenous people are almost wholly dependent on forests.\" For the region of Mexico, Central and South America, the report estimates 42-48 million indigenous peoples and 21-26 million forest peoples. Some but not all indigenous peoples are also forest peoples. Some countries did not have population figures for forest people. A 2018 Science article classifies drivers of global tree cover loss using satellite imagery. In Latin America, deforestation accounts for over half of the tree cover loss, shifting agriculture about a third, and, to a smaller degree, forestry, wildfire, and urbanization. In the 2015 report Indigenous Peoples, Communities of African Descent, Extractive Industries , the IACHR wrote that \"through the implementation of its monitoring mechanisms, the Commission has consistently received information evidencing the human, social, health, cultural and environmental impacts of [extraction, exploitation, and development activities concerning natural resources] on indigenous peoples and Afrodescendent communities. Many extractive and development activities in the hemisphere are implemented in lands and territories historically occupied by indigenous and Afro-descendent communities, which often coincide with areas hosting a great wealth of natural resources.\" Table A-3 lists resources about indigenous peoples' lands and natural resources in Latin America. While the titles may not exclusively focus on indigenous peoples, the industries' impact on indigenous people is a part of the analysis of each resource. Various international human rights mechanisms protect the rights of indigenous peoples of Latin America and the Caribbean. Table 3 identifies those countries that have ratified or voted in favor of the following three multilateral instruments on indigenous peoples' rights: International Labor Organization's Indigenous and Tribal Peoples Convention, 1989 (No. 169). 26 The convention includes sections on land; recruitment and conditions of employment; vocational training, handicrafts and rural industries; and social security and health; education and means of communication. United Nations Declaration on the Rights of Indigenous Peoples (UNDRIP). 27 The 2007 declaration covers such topics as self-determination or autonomy; land and environment; employment; religion; language and media; education; discrimination and violence; and health. American Declaration on the Rights of Indigenous Peoples (ADRIP). 28 The 2016 declaration approved by the Organization of American States includes sections on human and collective rights; cultural identity; organizational and political rights; and social, economic and property rights. The United Nations has a Permanent Forum on Indigenous Issues and in 2001 created the Special Rapporteurship on the Rights of Indigenous Peoples, which promote the rights of indigenous peoples across the globe. In 1990, the Organization of American States created the Rapporteurship on the Rights of Indigenous Peoples to promote the rights of indigenous peoples throughout the Western Hemisphere. Table A-4 provides additional resources about the work of international organizations with indigenous peoples. In a 2000 report, the Inter-American Commission on Human Rights (IACHR) wrote \"concern for the human rights of indigenous peoples and their members has been a constant feature in the work of the Commission.\" The IACHR has tracked its work involving indigenous peoples. It hosts multiple sessions per year to hold hearings regarding human rights issues affecting a particular country or subregion of the Western Hemisphere. One of the categories for hearings is the rights of indigenous peoples. Table 4 shows the number of IACHR hearings by country involving indigenous peoples' rights. It also shows the number of Inter-American Court of Human Rights cases brought by indigenous peoples against countries. In the appendix, Table A-5 lists publications that document various human rights issues confronting indigenous peoples. CRS also publishes a number of reports with country-specific information on indigenous peoples' human rights issues. Appendix A. Data Sources and Resources Lists The United Nations Children's Fund (UNICEF) and FundaciÃ³n para la EducaciÃ³n en Contextos de MultilingÃ¼ismo y Pluriculturalidad (the Foundation for Education in Multilingual and Multicultural Contexts or FUNPROEIB) gathered data in 21 Latin American and Caribbean countries in 2009 for its report in two volumes titled Atlas SociolingÃ¼Ã­stico de Pueblos IndÃ­genas en AmÃ©rica Latina . The report notes the limitations of using national censuses. In 2014, the United Nations' Economic Commission for Latin America and the Caribbean (ECLAC) gathered population data from 17 Latin American countries using national censuses for Guaranteeing Indigenous People's Rights in Latin America: Progress in the past Decade and Remaining Challenges . The report notes that most countries ask people to self-identify as indigenous with the exception of Peru, which asks people if they speak an indigenous language. In 2015, the World Bank gathered data in 16 countries using national censuses and household survey data in order to publish Indigenous Latin America in the Twenty-First Century: the First Decade . The report notes that the definition of who is indigenous has become increasingly controversial and \"underscores the complexity of identifying indigenous people across the region and argues that the conditions of indigeneity vary over time and are, in some cases, context- and country-specific.\" The current edition of Ethnologue documents language counts for each country and divides them into indigenous and non-indigenous categories. Indigenous languages figures were used in Table 2 as non-indigenous is defined as \"a language that did not originate in the country, but which is now established there either as a result of its longstanding presence or because of institutionally supported use and recognition.\" Only living languages were included in the count, not languages classified as extinct. Ethnologue's \"about\" section provides details on the methodology, language names, and status of usage. The World Bank's Latin America and Caribbean Equity Lab provides data on poverty, access to services, education and labor (last updated in October 2018). The World Bank notes that ethnic identity is based on self-reported data. Statistics may vary from official statistics reported by governments as the World Bank uses SEDLAC, \"a regional data harmonization effort that increases cross-country comparability.\" The web page of the Inter-American Commission's Human Rights Rapporteurship on the Rights of Indigenous Peoples provides detailed information on hearings and court cases related to indigenous peoples' rights. The data on drivers of forest loss in Latin America are from: Philip G. Curtis, Christy M. Slay, Nancy L. Harris, Alexandra Tyukavina, Matthew C. Hansen, \"Classifying drivers of global forest loss,\" Science , Vol. 361, Issue 6407, pp. 1108-1111, September 14, 2018, at https://science.sciencemag.org/content/361/6407/1108 . There are multiple methodologies for each driver of forest loss using map-based estimates and sample-based estimates. For each table below, sources are listed in reverse chronological order with the year in parentheses following the title. Multiple sources from the same year are listed alphabetically as are sources without a publication date, such as websites. Some sources are global, with a section dedicated to Latin America. Appendix B. National Agencies of Indigenous Affairs ", "summary": "This report provides statistical information on indigenous peoples in Latin America, including populations and languages, socioeconomic data, land and natural resources, human rights and international legal conventions. Resource lists for each section (languages; socioeconomics; land and resources; international organizations; and human rights) are available in the appendix as well as a lists of national agencies that oversee indigenous affairs in each Central American or South American country.", "document_type": "crs"}
{"report": "The U.S. Coast Guard is the agency charged by law with overseeing the safety of vessels and maritime operations. For at least four decades, Congress has been concerned about the Coast Guard's ability to maintain an adequate staff of experienced marine safety personnel with technical knowledge of vessel construction and accident investigation. Recent incidents, particularly the 2015 sinking of the U.S.-flag cargo ship El Faro with the loss of 33 lives during a hurricane near the Bahamas, have revived questions about the Coast Guard's persistent difficulty with hiring and training a marine safety workforce. The safety inspections of the vessel were found to have been inadequate. In the Hamm Alert Maritime Safety Act of 2018 ( P.L. 115-265 , Â§210), Congress directed the Coast Guard to brief congressional committees of jurisdiction on its efforts to enhance its marine inspections staff, the staff responsible for ensuring that vessels are meeting safety standards. In the Frank LoBiondo Coast Guard Authorization Act of 2018 ( P.L. 115-282 , Â§501) Congress requested a report from the Coast Guard detailing the courses and other training a marine inspector must complete to be considered qualified, including any courses that have been dropped from the training curriculum in recent years. This report examines the staffing challenges the Coast Guard faces in assuring marine safety at a time when its responsibilities in this area are increasing significantly. It also considers proposals to realign marine safety functions within the federal government. The Coast Guard engages in two distinct activities with respect to marine safety: Vessel inspection . The Coast Guard has a staff of 671 marine inspectorsâ533 military and 138 civilianâwho are responsible for inspecting U.S.-registered passenger and cargo vessels, foreign-flag vessels calling at U.S. ports, mobile offshore drilling units, and towing vessels and barges carrying hazardous cargoes. Foreign-flag vessels are those registered in jurisdictions other than the United States. Accident investigation. The Coast Guard employs 158 accident investigatorsâ120 military and 38 civilianâwho conduct casualty investigations of U.S.- and foreign-flag vessels to detect and correct safety hazards, prepare investigation reports, analyze trends, and recommend enforcement action. These two assignments fall under the Coast Guard's prevention policy workforce headed by the Assistant Commandant for Prevention Policy, a rear admiral. Reporting to the Assistant Commandant is the Director of Inspections and Compliance, a captain, who oversees the Office of Commercial Vessel Compliance and the Office of Investigations and Casualty Analysis, among other safety-related offices. The prevention policy workforce is especially critical for the commercial U.S.-flag fleet because a majority of this fleet is much older than the 15 to 20 years of age at which ships in the worldwide oceangoing fleet are typically scrapped. About 60% of the 217 ships in the dry-cargo U.S.-flag commercial fleet and 53% of U.S.-flag offshore supply vessels (which service oil rigs) are older than 20 years; the El Faro had been in service for 40 years. Some 72% of the 1,497 vessels in the U.S.-flag passenger and ferry fleet are over 20 years old. In general, older vessels require more frequent inspection; the National Transportation Safety Board (NTSB) raised questions about the quality of the Coast Guard's inspections in its investigation of the El Faro sinking, after which the Coast Guard revoked the safety certificate for another vessel of the same design and similar age, forcing its removal from service. Generally, inspections of vessels carrying passengers or hazardous cargo, and inspections of older vessels, are more frequent than inspections of general-cargo vessels and newer vessels. Vessels transporting cargo or passengers domestically (from one U.S. point to another U.S. point) must be U.S.-built, as required by the Jones Act. The cost of U.S.-built vessels, particularly deep-draft ships, can be multiples of world prices, which may retard vessel replacement. U.S.-flag vessels on international voyages need not be U.S.-built, and this fleet is younger than the Jones Act fleet. Congress's request for information about the Coast Guard's inspection staff comes at a time when the number of vessels requiring inspection is increasing by about 50% because towing vessels have been added to the list. Congress has been increasing the agency's role in fishing vessel safety as well, putting additional demands on the safety workforce. Adding to the Coast Guard's safety responsibilities is the construction of several liquefied natural gas (LNG) export terminals, whose siting, operations, and security are partly or entirely under Coast Guard jurisdiction, as well as the increasing use of LNG as ship fuel. According to the Coast Guard, the marine inspector workforce consists of commissioned officers, chief warrant officers (CWOs), and civilians. Officer marine inspectors enter the workforce through a variety of accession sources, including Officer Candidate School, the Direct Commission Officer program for U.S. Maritime Academy graduates, and the Coast Guard Academy. CWOs are divided into two specialties: Marine Safety Specialty Deck and Marine Safety Specialty Engineer. Those who meet the eligibility requirements to compete for CWO are selected through an accession panel. An emphasis is placed on past maritime and inspection experience when hiring civilian marine inspectors. Additionally, the Coast Guard hires and trains civilians who are inexperienced in inspections to become marine inspectors through its civilian marine inspector apprenticeship program. The normal entry is a marine inspector apprenticeship tour at a larger port (referred to as a feeder port). A feeder port is located near a unit that is better prepared and equipped to train inspectors. The civilian inspectors generally remain at a single location for their entire careers to provide continuity. Most officers complete one to three tours as a field-level marine inspector or marine investigator and do not rotate between tours ashore and afloat. Officers rotate approximately every three years and may be promoted to leadership positions in the marine safety organization. CWOs remain marine inspectors or marine investigators until retirement. On average, a CWO serving as a marine inspector works in this capacity for approximately 8.7 years. Inspector pay scales range from CWO2 to CWO4 (approximately $90,000 to $124,000); officers (O-1 to O-5, approximately $64,000 to $152,000). Civilian marine inspectors are typically classified at GS-12 ($64,000 to $84,000). The investigator workforce also comprises commissioned officers, CWOs, and civilians. It has the same path for entry as marine inspection. Many marine investigators have prior experience as inspectors, giving them familiarity with commercial shipping operations and regulations. However, this is not true in all cases, and some marine investigators become familiar with marine inspections through on-the-job training. The typical pay scale for investigators is CWO3 to CWO4 (approximately $106,000 to $124,000) and O-2 to O-4 (approximately $83,000 to $130,000). The Coast Guard has recognized the training of the inspection staff as an important concern. As Rear Admiral John Nadeau, then the Coast Guard's Assistant Commandant for Prevention Policy, testified at a January 2018 hearing about the El Faro casualty: [T]his is not strictly a capacity problem. There are elements to training. If you just gave me another 1,000 marine inspectors, it wouldn't solve this problem. This problem involves training. This problem involves getting the right information. This problem involves getting the right policy and procedures in place.... Entry-level marine inspections is not what I am talking about. I need to have a small corpsâit is not a lotâa small corps of people that can get out and are highly trained and proficient and stay focused on this area until we get it right. In a March 2019 hearing, Rear Admiral Nadeau testified that the agency was improving the quality of its safety inspection workforce: [T]he Coast Guard has prioritized marine inspector training, established new staff dedicated to performing third party oversight, increased opportunities for maritime graduates to join the Coast Guard, and prioritized the hiring of civilian marine inspectors.... The Coast Guard is actively developing a comprehensive training architecture for our marine inspectors. This architecture will provide cohesive strategy, policy, and performance support to ensure that Coast Guard marine inspectors are trained consistently from the basic to the advanced level in a manner that keeps pace with industry, technology, and related regulatory changes. The Coast Guard repeatedly has made statements in recent decades laying out its plans to improve the quality of its inspection workforce. Often, these pronouncements have been in response to heightened congressional scrutiny of the agency's marine inspection program in the aftermath of a major marine casualty in which investigators found that subpar vessel inspections played a contributing role. This cycle was described by a retired Coast Guard senior official in 2015: [T]he Marine Safety program is a low profile mission within the Coast Guard's multi-mission portfolio. That is true until a confluence of factors markedly raises its visibility and causes great introspection. The program's purpose is to keep bad things from happening. Non-events are virtually impossible to measure. Marine Safety is normally not a major budget item of interest to the Service. The Coast Guard, especially in what has generally been a declining resource environment, will always have many pressing and competing budget needs. And if a major incident occurs, Congress is willing to throw the Service a lifesaver in the form of significant dollars. As employees of a military organization, Coast Guard personnel typically change mission assignments and/or locations every two or three years, so they do not develop the knowledge and experience required of a proficient marine inspector or investigator. As noted, the scope of the vessel types the Coast Guard inspects ranges from small passenger boats to oceangoing ships to mobile offshore drilling rigs. Geographic reassignments can change the category of vessels an individual inspector must evaluate. Vessel technology can be complex and is constantly changing, and the safety regulations are voluminous and technical. An internal Coast Guard study in 2012 revealed that \"41% of marine inspectors were not confident interacting with maritime industry personnel concerning marine inspection issues.\" Even if personnel rotate back into marine inspection after a different assignment, they need time to regain proficiency. The Coast Guard recognizes the difficulty of building marine inspection and investigation proficiency among uniformed officers who rotate assignments frequently. Consequently, each Commandant's initiative or plan to revamp marine inspections has stated a goal of boosting the civilian inspector and investigator workforce and creating more attractive long-term career paths by extending promotion potential. However, a perception inside the agency that marine safety is an area that retards promotion could be thwarting efforts to boost the inspection workforce. This is asserted in a study by a career Coast Guard official who spent his last several years working in human resources for the agency: [T]he Coast Guard's internal manpower management processes are considered to be at odds with the need to build and maintain a competent marine safety officer corps â¦ The perception for decades is that it is difficult for marine safety officers to succeed in the Coast Guard's military officer promotion system. The Service endeavors to manage individual officer specialties, such as marine safety, while at the same time operate an \"up or out\" promotion system that is mandated by law.... officers who follow a marine safety career path consider themselves disadvantaged as they become more senior and face stiffer competition for promotion.... Currently, the perception of disadvantage continues. The Coast Guard's challenges with marine inspection and investigation date to a government reorganization in preparation for World War II. A 1942 executive order transferred the civilian Bureau of Marine Inspection and Navigation (BMIN) from the Department of Commerce to the Coast Guard for the duration of the war and for six months after hostilities ended. After the war ended, President Truman proposed keeping the marine inspection function under the Coast Guard rather than transferring it back to the Department of Commerce. Proponents of this approach contended that the Coast Guard had performed the mission adequately during the U.S. involvement in the war and that synergies existed with other Coast Guard missions such as maritime search and rescue. Furthermore, they asserted, there was no need to create additional overhead and administrative expenses by establishing a separate bureau. The maritime industry argued against keeping marine inspections under the Coast Guard. A witness representing the American Petroleum Institute testified in 1947 that under the BMIN, almost all of the inspectors had been former merchant marine officers with 10 to 20 years of experience aboard ships who had practical knowledge of vessel safety vulnerabilities. The permanent assignment of marine inspections to the Coast Guard was part of a much larger government reorganization plan advanced by the Truman Administration that was to go into effect unless both houses passed a concurrent resolution of disapproval within a specified period. The House adopted such a resolution, but the Senate did not. Consequently, President Truman's plan became effective in 1946. In subsequent years, the Coast Guard's role remained a point of contention. In 1947, a representative of a ship captains' union testified that under the old regime, the men in the Bureau of Marine Inspection were the wearers of the purple cloth. Before men could become assistant local inspector and go up to the grade of local inspector and supervising inspector, and so forth, they had to be either a master mariner [ship captain], or a chief engineer â¦ with the result that the most mature, and most sensible and most experienced and most intelligent of our profession got into the service. It was very seldom that you found a local inspector under 35 years of age.... They were of mature judgement and they were one of the most respected organizations in the entire marine industry. The concern that the Coast Guard would be unable to replace the experience of the ex-BMIN inspectors as they retired persisted over the decades. In 1979, the General Accounting Office (GAO, known since 2004 as the Government Accountability Office) conducted an audit of the Coast Guard's marine inspection program after a series of tanker accidents in or near U.S. waters during the winter of 1976-1977 resulted in losses of life and property and environmental damage. Under the heading \"Trained and Experienced Personnel Needed,\" the GAO report raised questions about the training of marine inspectors: Most of the inspectors in the three districts included in our review have had at least one tour of sea duty on Coast Guard cutters. Considering this sea experience, along with the on-the-job and formal training, it would seem that most inspectors would be highly qualified. However, we found that relatively few field unit inspectors could be considered as qualified hull or boiler inspectors. This has occurred because the Coast Guard has not established uniform criteria or procedures to determine whether inspectors are actually qualified and has not scheduled needed vessel inspection training in a timely manner. In addition, the rotation policy caused by the lack of a specialized job classification or career ladder contributes to the difficulty in achieving and maintaining expertise in marine inspection. The report note d that the Coast Guard Merchant Marine Safety Manual in effect at the time stated as a customarily accepted fact that it takes three years of experience to become a qualified marine inspector , adding that \"every 2 to 3 years the Coast Guard rotates its staff among various duty stations such as search and rescue, buoy tenders, and high- and medium-endurance cutters , \" and that \" about the time personnel become proficient in one area, such as vessel inspection, they are transferred and assigned to another job.\" The GAO found that \"few field inspectors had previous inspection duty or consecutive assignments at marine inspection offices\" and the Coast Guard had been \"unable to keep experienced and trained staff in the vessel inspection area.\" Some of the Coast Guard field officers interviewed by the GAO commented that inspectors needed to have additional expertise to gain the respect of the maritime industry, and that most inspectors were not knowledgeable enough to provide industry with a precise interpretation of marine rules and regulations. In response to the 1979 GAO report, the Coast Guard stated that while it would consider establishing an inspection specialty career classification for both officers and enlisted personnel and extend its inspection assignment tour, its existing job classification system was better suited to the multimission nature of the agency. In October 1980, the U.S.-flag ship Poet , carrying a load of corn to Egypt, disappeared with no trace somewhere in the Atlantic. Its disappearance was believed to have coincided with a period of heavy weather; the structural integrity of the 36-year-old ship was suspected as a possible cause. The Coast Guard's Marine Board of Investigation found that the Coast Guard inspector conducting most of the ship's inspections during the year prior to the voyage had no previous experience inspecting commercial vessels, which heightened the Marine Board's concern that structural defects may have gone undetected. In February 1983, the Marine Electric , a 40-year-old Jones Act ship carrying coal from Norfolk, VA, to Massachusetts, sank in heavy weather, killing 31 crew members. Investigators concluded that the probable cause of the sinking was the poor condition of the cargo hatches and deck plating, which allowed waves to flood the hull. The Coast Guard's Marine Board of Investigation stated that the ship's Coast Guard inspectors lacked the experience to conduct safety examinations of a vessel the size, service, and configuration of the Marine Electric . The incompleteness of these inspections as to the dictates of regulations and policy was attributed to the lack of training and experience on the part of the Coast Guard inspectors.... the inexperience of the inspectors who went aboard the Marine Electric , and their failure to recognize the safety hazard imposed by the deteriorated, weakened and non-tight hatch covers, raises doubts about the capabilities of the Coast Guard inspectors to enforce the laws and regulations in a satisfactory manner. At a 1983 congressional hearing examining the marine casualty, a representative of a ship engineers' union noted that \"Coast Guard officers with 12 weeks experience behind a desk are dealing with officers of the merchant marine who have spent 20 years at sea,\" and that \"an inspector can't condemn a dangerous ship if he doesn't know what a dangerous ship is.\" This representative further stated that \"while multi-mission flexibility and frequent rotation may be an optimal way to fulfill the Coast Guard's military readiness mission, it is a serious and even fatal distraction from the regulation of commercial industry.\" The witness urged Congress to transfer ship inspection responsibilities to an agency of civilian career professionals, similar to the Bureau of Marine Inspection and Navigation that existed before World War II. Some committee Members appeared receptive to this idea. The witness also raised the issue of whether the more fundamental problem was the age of the U.S. fleet: The problem of course is old ships. This means dangerous ships â¦ The Poet and the Marine Electric are trying to tell us something: If a ship isn't retired when it gets old, it will retire itself ... Although 40% of the U.S. fleet is at least 20 years old, 75% of the dozen worst U.S. marine tragedies in the past two decades struck these ships aged 20 or older. Twenty is the rounded number when industry experts say a ship should be junked. In conclusion, any analysis of the plight of maritime safety is misleading if it does not identify old ships as the core of the problem. The only way to uproot this evil is to mandate an aggressive attack by a dedicated and seasoned staff of professional inspectorsâa team that the Coast Guard could never field unless it ended its fundamental multi-missioned military structure. In 1985, following up on its 1979 audit, the GAO reported that the Coast Guard had recently completed a two-year project to develop a new marine safety training and qualification program. One change was establishment of uniform standardized on-the-job training and on-the-job qualification requirements. Another change was selection of three \"training ports\" where new inspectors would go for 18 months of intensive training before their initial assignment. The GAO stated that it was too early to assess whether these changes had addressed the qualification problems identified in its 1979 report. On March 24, 1989, the U.S.-flag tanker Exxon Valdez grounded on Bligh Reef after departing Valdez, AK, spilling about 11 million gallons of oil. The actions of the ship captain, who was found to be impaired by alcohol, and who had turned over operation of the vessel to a third mate before reaching open waters, was the focus of the marine casualty investigation. In response to the Exxon Valdez incident, among other things, Congress increased funding for Coast Guard safety personnel. According to one Coast Guard senior official, the \"War on Drugs\" in the mid-1980s had shifted resources from the agency's safety mission to its drug interdiction mission. In the 1990s, the quality of Coast Guard inspections came under scrutiny again as the result of two fatal passenger vessel incidents. On December 5, 1993, the wooden vessel El Toro II , a fishing charter party vessel built in 1961 and carrying 23 people, began sinking in the Chesapeake Bay when water seeped through the hull's planks. There were three fatalities. The Coast Guard's Marine Board of Investigation found that the Coast Guard inspector's knowledge of wooden boat structure was lacking, and that inspection staff were not cognizant of previous inspection reports that would have prompted concern about the vessel's seaworthiness, given the owner's poor track record in making needed repairs to the 32-year-old vessel. The second incident occurred on a lake near Hot Springs, AR, in May 1999. The Miss Majestic , an amphibious \"duckboat\" built during World War II to transport troops and supplies, which had since been converted into a tour boat, began taking on water and sank in less than 30 seconds, drowning 13 of its 20 passengers. The Coast Guard's Marine Board of Investigation found that the Coast Guard inspector had not noticed that a critical part was missing from the rear shaft that was the main source of the leak. It determined that the inspector lacked awareness of the importance of this vessel's design components. The board also found that the local Coast Guard office was not keeping adequate inspection records, which would have shown that the vessel's owner had not installed safety equipment that previous inspectors had called for. The NTSB concluded that the Coast Guard's inspections of the vessel were \"inadequate and cursory\" and that the \"lack of Coast Guard guidance and training for the inspection of [this vessel design] contributed to the inadequate inspections of the Miss Majestic .\" Moreover, the NTSB found that Coast Guard inspectors over the preceding five years had missed deficiencies with the vessel that might have been obvious even to an untrained observer, such as pinholes in the hull of the vessel caused by corrosion and an improper repair using a rubber patch to conceal a large, wasted area of the hull. These marine casualties in the 1990s prompted the Coast Guard and Congress to examine the marine safety mission of the agency once again. In December 1995, the Coast Guard conducted an internal study of its accident investigation activity. One of the recommendations of the internal report was \"To improve the overall quality of the information derived from investigations, an investigations career path should be developed. This would enable the Coast Guard to raise the overall level of expertise in investigations.\" In 1996, the GAO reviewed whether the Coast Guard had fully utilized additional funding Congress provided the agency in the early 1990s to add 875 positions to its Marine Safety Program. At a 1997 congressional hearing, a representative of the passenger vessel industry noted that vessel inspection \"responsibilities fill hundreds of pages of regulations and thousands of pages of referenced consensus standards and rules.\" The industry representative was \"concerned that the problems in the commercial vessel safety program will grow because of a resulting lack of training and experience on the part of many Coast Guard inspectors.\" Following the terrorist attacks of September 11, 2001, Congress greatly increased the Coast Guard's resources directed toward maritime security matters. The maritime industry's reaction to the Coast Guard's new security responsibilities came to light at a 2007 congressional hearing. Some industry witnesses at the hearing contended that since the Coast Guard had been transferred from the Department of Transportation to the newly created Department of Homeland Security (DHS) in 2002, the agency was more focused on security matters than on safety. One industry witness asserted that the industry's relationship with Coast Guard inspectors had changed from being partners with a mutual interest in safety to being viewed as a security risk. The purpose of the 2007 hearing was to examine a proposal by the chairman of the House Transportation and Infrastructure Committee to transfer the Coast Guard's marine safety inspection function to a civilian agencyâin other words, to undo the World War II-era reorganization. The chairman argued that \"What we need is what we have in the [Federal Aviation Administration], skilled personnel who have years of seasoning, who aren't shifted year after year from one post to another with only three years on staff.\" At the hearing, a witness representing ship captains described how marine inspection was performed in other countries: In foreign countries outside the United States, you go to the Netherlands or Germany or Norway, that is a civilian force that comes on. They are all retired masters or chief engineers, and they become the inspection service for that country. When they go aboard a ship, they are interfacing with chief engineers and masters that have a shared experience. There is a great deal of respect for the inspectors, and the inspectors have a great deal of respect for the officers on the ship. It is an effective system. You have expertise. You have competence, and you have motivation. They obviously love the maritime industry because that is their choice. It is not something they have been assigned to as part of their tour of duty and attaining a generalized background in the Coast Guard. I think that is the way to go. When a fellow retires after a career at sea and he is 45, 50 years old, he might not be looking for a future career advancement as Coast Guard officer. You make him a civilian inspector, and he would fill the same role that they fill in Germany and most maritime countries. Most maritime countries do not have a uniform Coast Guard acting as the maritime inspection service. They use maritime professionals from the industry to fill that role. When they send a petty officer down to represent the United States' interest in enforcing international conventions on foreign flag ships as a port state control officer, the foreign masters, the Germans and the British, take offense that the Coast Guard hasn't sent an officer down or a civilian personnel with a maritime background. At the hearing, the Commandant of the Coast Guard explained the dilemma facing the agency regarding its inspection staff: Here is the quandary we are faced with. Sooner or later, as you get promoted in the Coast Guard, you become a commanding officer. If you get selected for flag, you become a district commander and maybe even a Commandant. When you get to there, you become a general. You are representing the entire organization. We have an issue of needing specialists, subject matter experts, but at some point we need to generalize these folks and give them other experiences if they are going to be promotable and move up to become executives in the organization. In corporate America, for example, if you are a vice president, everybody needs to understand corporate finance. What we have developed inside the Coast Guard is the notion of what we call a broadened specialist. What we need to look at is maintaining the subject matter expertise that is critical to mission execution and then how we can broaden these people at a later date and still make them promotable. They want to be able to move up in the organization as well. At the 2007 hearing, the Commandant urged the ex-chairman of the Transportation and Infrastructure Committee to defer his proposal until the Coast Guard had a chance to rectify the problem, which the chairman agreed to do. The Commandant outlined the actions he was taking to improve the inspection workforce: In the last year, I have directed significant changes and improvements in the training and qualifications of our inspectors to keep pace with the technological advancements and growth in maritime industry. We have made changes to our warrant officer selection system to bring more talented and experienced enlisted personnel into the maritime safety specialty. We have learned valuable lessons from joint military and civilian staffing of our sector command centers and our vessel traffic services. These are areas where we used to have Coast Guard personnel only staffing. We now have brought civilian personnel in to provide continuity, corporate memory and way to bridge during the transfer season, so we get the best of training for our people in uniform by maintaining continuity of services. I am committed to the establishment of more civilian positions in the marine inspection field. We need people with critical job skills. We need to maintain continuity while providing our military members access to this type of experience. We must leverage and expand this dual staffing model. Getting the inspection program right in terms of training, qualifications and staffing is my highest maritime safety priority. The Commandant also argued that marine safety and security were two sides of the same coin; they were not mutually exclusive missions but synergistic to the Coast Guard's other maritime missions. The Commandant's first step was an internal study of the issue by a retired Commandant. This internal study acknowledged that the agency's practice of regularly rotating staff geographically or by activity, as military organizations typically do, hindered its ability to develop a cadre of staff with sufficient technical expertise in marine safety. The report noted the following: \"If the inspector is constantly referring to the regulations when conducting an inspection, the customer doesn't have much confidence in the quality of the Coast Guard inspection. I understand that the Coast Guard has sent unqualified personnel or marginally qualified personnel to conduct inspections and investigations.\" The report also stated that \"the DHS has no responsibility for transportation safety so getting them to embrace the Marine Safety program could be a heavy lift.\" In response to this problem, the agency revamped its safety program and Congress appropriated additional funds specifically for safety personnel. The FY2009 Coast Guard budget request noted that \"the Coast Guard is encountering serious stakeholder concern about our capacity to conduct marine inspections, investigations, and rulemaking.\" Under the revamped safety program, the Coast Guard created additional civilian safety positions, converted military positions into civilian ones, and developed a long-term career path for civilian safety inspectors and investigators. A 2008 audit by the DHS Inspector General (IG) confirmed that Coast Guard stated that the problems identified with respect to its safety program workforce also existed among vessel accident investigators. The IG found that accident investigations were hindered by unqualified personnel and recommended hiring more civilians for this activity. The IG also found that the Coast Guard had lowered the qualification standard for accident investigators in August 2007 by removing the requirement that an investigator have experience as a hull or machinery and small passenger vessel inspector. Since vessel casualties commonly involve structural deficiencies in the hull or loss of propulsion, this experience is considered important for an accident investigator. The IG noted that in the United Kingdom, Australia, and Canada, accident investigators are required to be former ship captains or chief engineers with several years of experience. The IG report noted issues with rotating assignments and promotion potential in the marine safety area: A tour in the Prevention Directorate could mean yearly rotations across specialty areas, such as waterways management and drug and alcohol testing. Given the lack of a career path and the unpredictable nature of investigation assignments, potential Coast Guard candidates also may not want to become investigators. Hull and Machinery Inspectors told us that promotion to the position of marine casualty investigator would not advance their careers. Additionally, according to Coast Guard personnel, tour of duty rotations hinder investigators in acquiring the experience needed for career development. The agency's uniformed investigators generally are not in their positions for more than a single, three-year tour of duty in the same location. The forced rotations preclude the investigators from acquiring the extensive knowledge of local waterways and industries that experienced casualty investigators have told us is needed to be an effective investigator. In contrast, civilian marine casualty investigators are not subject to the three year tour of duty rotation standard. Over time, they can gain a greater knowledge of specialties such as local waterways and industries or experience in enforcing maritime regulations to enhance their qualifications. Of the 22 marine casualty investigators that we reviewed, one was a civilian. A 2009 study by the Homeland Security Institute, a federally funded research center established by Congress in the Homeland Security Act of 2002 (Â§312) to assist DHS in addressing policy issues, reiterated the same theme regarding frequent rotations of uniformed staff hindering proficiency in marine inspection and investigation. The study's recommendations were to increase tour lengths as well as require back-to-back tours in these areas and to rely more on civilians for these functions. The study found that the Coast Guard's workforce database was not able to indicate years of service or level of expertise for marine safety personnel. The study found that the Coast Guard had no central office responsible for overall management of the marine safety workforce and therefore there were no agency-wide specific standards for determining qualifications in this area. Lacking documentation, the study's authors relied heavily on interviews with hundreds of Coast Guard personnel and private industry to gather data on the marine safety workforce. On April 20, 2010, the mobile offshore drilling unit Deepwater Horizon , 45 miles off the coast of Louisiana, experienced a catastrophic blowout, causing a major explosion and fire, and resulting in its sinking. There were 11 deaths and an oil spill estimated at approximately 206 million gallons, the largest in U.S. history. The Department of the Interior's Minerals Management Service had responsibility for inspection of the drilling apparatus that was the cause of the explosion, but the Coast Guard was responsible for the safety inspection of the rig above water that has commonality with vessels in general (firefighting and lifesaving equipment, evacuation procedures, electrical systems). The ensuing investigation revealed that Coast Guard regulations of offshore structures dated to 1978 and had not been updated as rigs moved farther and farther offshore. For instance, in places where they are not attached to the seabed because of the tremendous depth, these rigs use dynamic positioning systems (propeller systems) to remain in place, but at the time of the accident the Coast Guard had not developed regulations for checking the safety aspects of these critical systems. In response to the Deepwater Horizon marine casualty, Congress required the Coast Guard to take several initiatives to improve the quality of its marine inspection workforce in the Coast Guard Authorization Act of 2010 ( P.L. 111-281 ). Under the subtitle \"Workforce Expertise\" (Â§Â§521-526), these initiatives included improving career path management, adding apprenticeships to the program, measuring workforce quality and quantity, adding a marine industry training program and a marine safety curriculum at the Coast Guard Academy, and preparing a report on recruiting and retaining civilian marine inspectors and investigators. A June 2011 audit by the DHS IG of vessel inspections in the offshore oil and gas industry (involving rigs and vessels that support operation of the rigs) found a positive result for the marine inspection program in this sector. The IG found that 99% of those inspections had been performed by Coast Guard inspectors who had been fully qualified. However, the IG found that the Coast Guard's guidance on how to inspect these vessels and how to record the results of these inspections was deficient. A May 2013 audit by the DHS Inspector General found that the agency's efforts had not improved its marine accident reporting system, due to familiar issues surrounding the qualifications and rotation of the personnel: The USCG [United States Coast Guard] does not have adequate processes to investigate, take corrective actions, and enforce Federal regulations related to the reporting of marine accidents. These conditions exist because the USCG has not developed and retained sufficient personnel, established a complete process with dedicated resources to address corrective actions, and provided adequate training to personnel on enforcement of marine accident reporting. As a result, the USCG may be delayed in identifying the causes of accidents; initiating corrective actions; and providing the findings and lessons learned to mariners, the public, and other government entities. These conditions may also delay the development of new standards, which could prevent future accidents. [T]he Director of Prevention Policy [the marine safety program] provides personnel with career management guidance that suggests they should leave this specialty to improve their promotion potential, because of the USCG's emphasis on personnel attaining a wide variety of experience. Personnel indicated that both investigations and inspections suffer from investing time and money into training people only to have them leave the specialty. The IG found that at the 11 sites it visited, two-thirds of accident inspectors and investigators did not meet the Coast Guard's own qualification standards. The IG stated that the shortage of qualified personnel would be further compounded by the new towing vessel safety regime, which would expand the inspection workload by about 50% (or an additional 5,700 vessels to inspect). In January 2015, the new Commandant, Paul Zukunft, indicated that human resource competencies would be one of his key focus areas. He referred to the need to grow \"subject matter experts\" for the marine safety workforce and overhaul the generalist-driven military personnel system in favor of a specialist workforce. Commandant Zukunft called for increasing proficiency through more specialization in both the officer and enlisted corps and to extend the time between job rotations. He noted the complexity of systems aboard vessels and new developments in using LNG as fuel, stating that the Coast Guard needed to know these technologies in order to lead the industry on safety rather than having to learn them from industry. In February 2015, Commandant Zukunft stated his priorities regarding the marine safety mission: I have directed the Vice Commandant to undertake a service-wide effort to revitalize our marine safety enterprise with particular focus on marine inspection and our regulatory framework.... We will increase the proficiency of our marine safety workforce, and we will continue to train new marine inspectorsâadding to the more than 500 that have entered our workforce since 2008.... We will review our civilian career management process to eliminate barriers and improve upward mobility. As noted above, the October 2015 sinking of the El Faro has renewed focus on the Coast Guard's marine inspection workforce, but, as in the past, the age of ships in the U.S.-flag fleet has been raised as a corollary safety issue. Regarding the El Faro , the Coast Guard testified in 2018: We looked a little further beyond this particular incident, caused us to look at other vessels in the fleet and did cause us concern about their condition.â¦ And the findings indicate that it is not unique to the El Faro . We have other ships out there that are in substandard condition.â¦ You know, some of our fleetâour fleet is almost three times older than the average fleet sailing around the world today. Just like your old car, those are the ones likely to breakdown. Those are the (inaudible) oneâthe ones that are more difficult to maintain and may not start when I go out, turn the key. As the above history indicates, the measure most often proposed to increase the competence of marine safety personnel is to shift this mission to a civilian workforce in a civilian subagency, either under the Coast Guard or somewhere else in the executive branch with complementary maritime functions. While such a shift could have the advantages stated, one cannot necessarily expect it, in and of itself, to solve the issue completely. Civilian agencies with inspection workforces covering technically demanding industries also have had difficulty retaining experienced staff. For instance, the Federal Aviation Administration has been criticized for increasing its reliance on private-sector inspectors paid by industry rather than enhancing its in-house inspection workforce. The rationale for this reliance on private-industry inspectors is that the pace of technological development in aviation has overwhelmed the capability of government inspectors. Similarly, the Department of Transportation's Pipeline and Hazardous Materials Safety Administration, which regulates pipeline safety, has found that experienced inspectors are often hired away as safety compliance officers by pipeline companies. The Department of the Interior has voiced much the same concern with respect to the offshore oil rig inspection workforce of the Bureau of Safety and Environmental Enforcement. Even under a civilian agency, vessel inspectors would be subject to recruitment by private industry, as experienced inspectors are sought by ship owners, banks that finance ships, and insurers, all of which want to ensure ships are built to, and are being maintained to, safety standards. Inspectors are employed by private ship classification societies for this purpose. Another consideration with respect to realigning the government's marine safety function is the benefit of housing maritime-related missions in a single agency. As commandants have argued, there are synergies among these missions. For example, the knowledge of and familiarity with vessels and crews that safety inspectors gain via their interactions with them provide risk intelligence relevant to the agency's security mission. Personnel involved in the often perilous mission of search and rescue directly benefit from a competent and effective safety inspection workforce that can reduce the number of such missions. The vessel safety inspection function has synergies with vessel environmental inspections related to oil pollution, ballast water, and emissions. The marine safety function is also complimentary to the Coast Guard's responsibility for deploying and maintaining channel marker buoys and lights and breaking ice in winter. Fisheries enforcement has synergies with fishing safety and security missions. All of these missions require special knowledge for operating on the water, and most require a fleet to do so. Thus, there are both human resource and capital equipment synergies among these missions. Notwithstanding these factors, one can also rationalize dismantling parts of the Coast Guard and reorganizing them under other agencies. The Coast Guard has a close relationship with the Navy, even in peacetime. In 1982, Members of Congress sponsored bills to transfer the agency to the Navy or the Department of Defense ( H.R. 4996 , H.R. 5567 ). These proposals were partly in response to the Reagan Administration's proposal to drastically reduce the size of the Coast Guard, replace the commandant with a civilian administrator, and transfer the Coast Guard's aids to navigation mission to the Army Corps of Engineers. During the partial government shutdown in January 2019, when Coast Guard personnel were the only military personnel not paid, calls for shifting the Coast Guard to the Navy or Department of Defense were renewed. While some supporters hope that transferring the Coast Guard to the military might boost the agency's budget, others have argued that the Coast Guard's nondefense-related missions would suffer, as these missions are not a priority for the military. It would appear that such a transfer might not assist the Coast Guard in addressing the issue of rotating staff in the marine safety program. In addition to realigning marine safety functions, Congress has discussed rearranging navigation-related functions in the federal government more broadly. Some Members of Congress, dissatisfied with the Army Corps of Engineers' performance in the provision of navigation channel infrastructure, have proposed transferring that function to the Department of Transportation. The Trump Administration also has proposed this transfer as part of a larger reorganization plan involving multiple agencies. Congress has requested a National Academy of Sciences study related to this idea. If such a transfer were to occur, navigation infrastructure functions could be combined with a marine safety inspection and accident investigation within the Department of Transportation. This combination of safety and infrastructure provision parallels the primary missions of the department with respect to other transportation modes. However, Congress has shown reluctance to eliminate any of the Coast Guard's missions. Both in 1967, when the Department of Transportation was created and the Coast Guard was transferred there from the Department of the Treasury, and in 2003 after the Department of Homeland Security was created, and the agency was transferred there from the Department of Transportation, the Coast Guard was transferred as a distinct entity.", "summary": "For at least four decades, Congress has been concerned about the Coast Guard's ability to maintain an adequate staff of experienced marine safety personnel to ensure that vessels meet federal safety standards. The 2015 sinking of the U.S.-flag cargo ship El Faro during a hurricane near the Bahamas with the loss of 33 lives renewed attention to the Coast Guard's persistent difficulty with hiring and training a marine safety workforce with technical knowledge of vessel construction and accident investigation, as the safety inspections of the vessel were found to have been inadequate. In the Hamm Alert Maritime Safety Act of 2018 ( P.L. 115-265 ), Congress directed the Coast Guard to brief congressional committees of jurisdiction on its efforts to enhance its marine inspections staff. In the Frank LoBiondo Coast Guard Authorization Act of 2018 ( P.L. 115-282 ), Congress requested a report from the Coast Guard detailing the courses and other training a marine inspector must complete to be considered qualified, including any courses that have been dropped from the training curriculum in recent years. Congress's concern about the Coast Guard's inspection staff comes at a time when the agency's vessel inspection workload is increasing by about 50% because towing vessels have been added to its responsibilities. Additionally, Congress has been increasing the agency's role in fishing vessel safety. Adding to the Coast Guard's safety responsibilities is the construction of several liquefied natural gas (LNG) export terminals as well as the increasing use of LNG as ship fuel. Vessel safety inspections are especially critical for the U.S.-flag fleet, like the El Faro , because a majority of it is much older than the 15 to 20 years of age at which ships in the foreign-flag worldwide oceangoing fleet are typically scrapped. Over half of the U.S.-flag commercial fleet is over 20 years old; the El Faro had been in service for 40 years. Vessels that transport cargo or passengers domestically (from one U.S. point to another U.S. point) must be built in the United States, as required by the Jones Act. The comparatively high cost of domestic ship construction encourages ship owners to keep Jones Act vessels in service well beyond their normal retirement age. In general, older vessels are believed to have a higher risk of structural defects and to require more intensive inspection. Currently, the Coast Guard's marine inspection staff consists of 533 military and 138 civilian personnel, while its accident investigation staff consists of 120 military staff and 38 civilians. As a military organization, the Coast Guard frequently rotates its staff among various duty stations, so personnel may not develop the knowledge and experience required of a proficient marine inspector or investigator. A common perception inside the agency that marine safety is an area that retards promotion also may be thwarting efforts to boost this mission's workforce. The Coast Guard recently has stated its intention to improve the quality of its inspection workforce and to make marine safety an attractive long-term career path by extending promotion potential. However, its recent statements are similar to statements made 10 years ago, when some Members of Congress advocated transferring the marine safety function to a civilian agency. It is unclear what the agency has accomplished over the last decade regarding its inspection workforce. Government audits dating to 1979 have been consistently critical of the proficiency level of Coast Guard inspectors and accident investigators. Reorganizing the marine safety function under a civilian agency, perhaps as an element of a larger reorganization of navigation functions in the federal government, might improve the quality of safety inspections and investigations, but other federal agencies with transportation-related safety inspection workforces have had similar issues with retaining experienced personnel.", "document_type": "crs"}
{"report": "The rules and practices of the House of Representatives governing quorums and voting on the floor are closely intertwined, and derive from two provisions of Article I of the Constitution. Regarding quorums, clause 1 of Section 5 states in part that \"a Majority of each [House] shall constitute a Quorum to do Business; but a smaller Number may adjourn from day to day, and may be authorized to compel the Attendance of absent Members, in such Manner, and under such Penalties as each House may provide.\" Regarding voting, clause 3 of the same section provides in part that \"the Yeas and Nays of the Members of either House on any question shall, at the Desire of one fifth of those present, be entered on the Journal.\" This report discusses how the House now interprets and implements these two constitutional provisions. It focuses on the most important rules and the most common practices; it does not attempt to cover all the precedents the House has established or all the procedures that may be invokedâfor example, the procedures for calling the roll instead of using the electronic voting system to decide a question or establish the presence of a quorum. This report also assumes a familiarity with some other aspects of the House's floor procedures. The Constitution's quorum requirement quoted above seems to make it necessary for a simple majority of the House's members, or a minimum of 218 Representatives if there are no vacancies in the House, to be present on the floor whenever the House conducts business. As any observer of the House soon notices, however, sometimes only a handful of Members are present during House debates. In fact, it is rather unusual for as many as 218 Members to be present on the floor at the same time unless a vote or quorum call is being conducted using the House's electronic voting system. There appears to be an inconsistency, therefore, between an apparently unambiguous constitutional requirement and the well-established and well-accepted practices of the House. How is this inconsistency to be explained? First, the House transacts much of its business on the floor by resolving itself into the Committee of the Wholeâformally, the Committee of the Whole House on the State of the Union. The primary reason for doing so is that the rules governing debate and amendment in Committee of the Whole are more flexible than those that apply when the House is meeting \"in the House.\" Resolving into Committee of the Whole is also convenient for another reason. The Committee of the Whole is a committee that the House has created in its rules, just as the House has created various standing committees. Although the Committee of the Whole differs from other House committees in that all Representatives are members of it and it meets on the House floor, it still remains a committee of the House. Therefore, a meeting of the Committee of the Whole is not a meeting of the House itself, so the constitutional quorum requirement for the House does not apply in Committee of the Whole. Instead, the House is free to set in its rules whatever quorum requirement it chooses for meetings of the Committee of the Whole. Clause 6(a) of House Rule XVIII provides that a \"quorum of a Committee of the Whole House on the state of the Union is 100 Members,\" not the majority of House Members that constitutes a quorum of the House. Second, whether the House is meeting as the House or in Committee of the Whole, a quorum is always presumed to be present unless and until its absence is demonstrated. Reasonably enough, the House presumes that it is complying with the Constitution or its own rules, as the case may be. Furthermore, neither the Speaker nor the chair of the Committee of the Whole is empowered to take the initiative to ensure that this presumption is correct. At no time may the Speaker or the chair interrupt the proceedings on the floor because he or she observes that the necessary quorum is not present or because he or she decides to count those present to determine whether the applicable quorum requirement is being met. Instead, the Speaker or chair responds to an assertion that a Member makes from the floor that a quorum is not present (or less often, when a Member is recognized to move a call of the House). A quorum is always presumed to be present unless a Member challenges this presumption from the floor, and the House's standing rules severely limit when he or she may do so. Many of the details of these rules are discussed later in this report. To summarize them here, there is a critical linkage between the House's quorum and voting procedures: About the only times that a Member has a right to make a point of order that a quorum is not present is when a vote is taking place. In a sense, the House in its rules has adopted a definition of business for purposes of the constitutional quorum requirement that is limited to voting. If a majority of all Representatives actually had to be in the chamber from the opening gavel to the adjournment of each daily session, it would become practically impossible for Members to satisfy all their various responsibilities and for the House to do its work in a timely fashion. Either the Constitution or the House's rules require that certain kinds of questions be decided by record votes that are almost always conducted by use of the House's electronic voting system. First, the Constitution mandates that any vote to override a presidential veto \"shall be determined by Yeas and Nays\" (Article I, Section 7, clause 2). Second, under clause 10 of Rule XX, the \"yeas and nays shall be considered as ordered when the Speaker puts the question on passage of a bill or joint resolution, or on adoption of a conference report, making general appropriations, or on final adoption of a concurrent resolution on the budget or conference report thereon.\" And third, clause 12(a)(2) of Rule XXII provides for a record vote on any motion to authorize House managers to close the meetings of any conference committee. In all other cases, the basic procedures for voting in the House are laid out in House Rules I and XX. The manner in which questions are put to a vote is governed by clause 6 of Rule I, on the duties of the Speaker: The Speaker shall put a question in this form: \"Those in favor (of the question), say 'Aye.'\"; and after the affirmative voice is expressed, \"Those opposed, say 'No.'\". After a vote by voice under this clause, the Speaker may use such voting procedures as may be invoked under rule XX. Clause 1 of Rule XX then lays out the basic procedures for securing division and record votes: (a) The House shall divide after the Speaker has put a question to a vote by voice as provided in clause 6 of rule I if the Speaker is in doubt or division is demanded. Those in favor of the question shall first rise from their seats to be counted, and then those opposed. (b) If a Member, Delegate, or Resident Commissioner requests a recorded vote, and that request is supported by at least one-fifth of a quorum, the vote shall be taken by electronic device unless the Speaker invokes another procedure for recording votes provided in this rule. A recorded vote taken in the House under this paragraph shall be considered a vote by the yeas and nays. (c) In case of a tie vote, a question shall be lost. Whether in the House or in Committee of the Whole, every question, except the few noted above, is first put to a voice vote. The chair instructs those who favor the question to call out \"aye,\" and then those who oppose it to call out \"no.\" The chair then is expected to state that, in his or her opinion, \"the ayes [or the noes] appear to have it,\" and to pause before banging the gavel and announcing that \"the ayes [or noes] do have it and the bill is [or is not] passed\" (or the motion is agreed to, or whatever the case may be). If no one challenges the chair's statement, his or her announcement is conclusive, and the question is decided. Furthermore, the vote is considered valid even if only a few Members actually voted. A quorum is presumed to have been present, regardless of how many may have actually participated in the voice vote. After the chair announces his or her opinion as to the outcome of a voice vote, any Member, Delegate, or Resident Commissioner has a right to demand a division vote, although they rarely do this in practice. Even less common, the chair may call for a division vote when a voice vote leaves him or her in doubt. When a division vote is demanded, the chair directs all those in favor of the question to stand and to remain standing until he or she counts them; then in like manner, the chair counts those who stand in opposition to the question. The chair then announces the result, and the question is decided. As is true of a voice vote, the positions of individual Members in a division vote are not recorded, and a division vote is valid even if less than a quorum was present to participate in it, unless the vote is challenged for that reason. Again, the presumption is that a quorum is present on the floor when the vote takes place even if not all of those Members choose to take part in the vote. Both voice votes and division votes involve only the Members who happen to be on or very near the floor at the time a vote takes place. No time is provided for Members to come to the floor from their offices or committee rooms. As a result, a small number of Members can determine the outcome of either kind of vote, and that outcome may not be the same as it would be if most or all Members participated. Before the final result of either a voice vote or a division vote is announced, therefore, any Member, Delegate, or Resident Commissioner may request a record vote using the House's electronic voting system. During this kind of vote, Members usually have 15 minutes or more to come to the floor and record their votes, and the vote of each Member is recorded individually and printed in the Congressional Record . The House uses its electronic voting system for taking what are actually several different kinds of votes. They are indistinguishable from each other in how they are conducted, but not in how they are ordered. There are three ways to secure an electronic vote in the House. According to the former Parliamentarian On any vote in the House, (1) the vote may be objected to (for lack of a quorum) under Rule XV clause 4 [now clause 6 of Rule XX], thereby precipitating an automatic ordering of the yeas-and-nays; (2) a recorded vote may be ordered by one-fifth of a quorum; or (3) the yeas and nays may be ordered by one-fifth of those present. Recall that the Constitution provides that \"the Yeas and Nays of the Members of either House on any question shall, at the Desire of one fifth of those present, be entered on the Journal.\" A vote by the yeas and nays is what has traditionally been called a roll call vote, though today it is also known as a kind of record vote and is taken by use of the House's electronic voting system unless that system were to break down. In that case, the clerk of the House would actually call the roll of Members, following clause 3 of Rule XXâas was done before the electronic system was installedâto implement the Legislative Reorganization Act of 1970. Clause 2(a) of Rule XX now provides that all record votes and quorum calls in the House are to be conducted electronically unless the Speaker exercises the discretion to have the clerk call the names of Members instead. In practice, the electronic voting system is always used unless it is temporarily inoperative. (For this reason, all references in this report to roll call and record votes should be understood to be references to votes taken \"by electronic device.\") As noted earlier, there is an important linkage between the House's quorum requirements and its procedures for ordering electronic votes. In the House, a yea-and-nay vote can be ordered, as a matter of constitutional right, by one-fifth of the Members present, but this number need not constitute a quorum. One-fifth of however many Members happen to be present may order the yeas and nays. However, there is an alternative that is even less demanding: Any Member can usually compel an electronic vote on any question on which the House is voting by invoking clause 6(a) of Rule XX, which provides for an electronic vote that also establishes the presence of a quorum. That rule states in part When a quorum fails to vote on a question, a quorum is not present, and objection is made for that cause (unless the House shall adjourn)â (1) there shall be a call of the House; (2) the Sergeant-at-Arms shall proceed forthwith to bring in absent Members; and (3) the yeas and nays on the pending question shall at the same time be considered as ordered . (Emphasis added.) Clause 6(b) goes on to provide in part If those voting on the question and those who are present and decline to vote together make a majority of the House, the Speaker shall declare that a quorum is constituted, and the pending question shall be decided as the requisite majority of those voting shall have determined. Thereupon further proceedings under the call shall be considered as dispensed with. When the Speaker announces the result of a voice vote or a division vote in the House, a Member may take advantage of the rules just quoted by rising and saying: Mr./Madam Speaker, I object to the vote on the ground that a quorum is not present and I make a point of order that a quorum is not present. The Member making this statement is invoking the constitutional quorum requirement and challenging the validity of the voice or division vote by asserting that it does not comply with the Constitution because a quorum of the House was not present at the time. In response, the Speaker counts to determine whether, in fact, a quorum (218 Members if there is no more than one vacancy) is present on the floor. If a quorum is present, the Speaker overrules the point of order. If the Representative still wants an electronically recorded vote, he or she may ask for the yeas and nays, and hope that one-fifth of the Members present rise to indicate their support for the request. Alternatively, the Member may ask for a recorded vote, invoking clause 1(b) of Rule XX which states, \"If a Member, Delegate, or Resident Commissioner requests a recorded vote, and that request is supported by at least one-fifth of a quorum, the vote shall be taken by electronic device\" unless the Speaker orders otherwise. Notice that it takes 44 Members (one-fifth of a quorum) to order a recorded vote under this rule, compared to one-fifth of those present to order the yeas-and-nays. When a quorum is present on the floor, it may be easier to obtain sufficient support for a recorded vote than for a yea-and-nay vote, because the number of Members present will probably exceed the minimal quorum of 218 (in which case one-fifth of the number present will exceed 44). In either event, the vote will be taken by using the electronic voting system, regardless of whether it is technically a yea-and-nay vote or a recorded vote ordered under clause 1(b) of Rule XX. If the Speaker discovers that a quorum is not present, the Speaker announces that fact and also states that, under clause 6(a) of Rule XX, an electronic vote is ordered on the question before the House. This vote accomplishes two purposes at once. First, it decides the question (for example, \"Will a bill pass?\"). Second, at the same time, it demonstrates the presence of a quorum (as Members use the 15 or more minutes given them to come to the floor and vote). If a quorum participates in the vote, the presence of a quorum is established, and the House can continue to transact business. (It is rarely necessary for the Sergeant at Arms to \"bring in absent Members,\" because Members usually want to be recorded on all electronic votes.) More often than not, however, the Speaker does not respond to such a point of order by counting for a quorum but instead by postponing further proceedings. As discussed fully in the section below, the Speaker has the authority to postpone votes on many questions under clause 8(a)(1) of Rule XX. When the Speaker postpones a vote after an objection to the lack of a quorum, the point of order is considered withdrawn. This is because the Speaker is effectively no longer putting the question to a vote, and it is therefore not in order to make a point of order that a quorum is not present. When proceedings are resumed on the question, the Speaker will put the question again, first by voice vote. In practice, the Speaker resumes proceedings at a time that a quorum is present on the floor. A Member, Delegate, or Resident Commissioner can, at that time, request either a recorded vote or a yea-and-nay vote, and if there is a sufficient second, the vote will be taken by electronic device. The constitutional right to demand \"the Yeas and Nays\" applies to both the House and the Senate, but it does not extend to the Committee of the Whole. There is no constitutional right for one-fifth of the Members present to insist on a vote in Committee of the Whole by call of the roll or by use of the electronic voting system. In fact, before 1970, the votes of individual Members were never recorded on any question that was decided in Committee of the Whole, including all the votes on amendments to bills. As part of the same 1970 Legislative Reorganization Act that authorized the electronic voting system, the House amended its rules to provide for recorded votes in Committee of the Whole. Especially with the installation of the new voting system, these votes became the functional equivalent of yea-and-nay votes in the House. However, the requirements and procedures for securing a record vote in Committee of the Whole are somewhat different from those used to obtain comparable votes in the House, even though all these votes are almost always conducted by use of the same electronic system. Under clause 6(e) of House Rule XVIII, \"In the Committee of the Whole House on the state of the Union, the chair shall order a recorded vote on a request supported by at least 25 Members, Delegates, and the Resident Commissioner.\" So before the final result of a voice or division vote is announced, all a Member need do is rise and request a recorded voteâso long as he or she is confident that at least 24 others will rise to support the request. Even when the floor is not crowded, Members typically request a recorded vote on an amendment in this fashion because the chair can postpone the request for a recorded vote on an amendment. The chair is likely to do this and resume proceedings at a time when more Members are present and a sufficient second is likely to support the request. Another option for Members if a quorum is not present is to state Mr./Madam Chair, I request a recorded vote and, pending that, I make a point of order that a quorum is not present. When the Member requests a recorded vote and, at the same time, makes a point of order that the House rule governing quorums in Committee of the Whole is being violated, the chair is required to act first on the point of order that a quorum is not present (sometimes called a point of no quorum). He or she counts to ascertain the presence of a quorum, which is 100 members of the Committee of the Whole (which includes the Delegates and the Resident Commissioner). If a quorum is present, a recorded vote is ordered only if 25 members of the Committee of the Whole have risen to support the request. If a quorum is not present, the chair could order an immediate quorum call. If the request is for a recorded vote on an amendment, however, the chair will likely instead postpone the vote. If the vote is postponed, the point of order of no quorum is considered withdrawn. If the chair orders a quorum call instead of postponing the vote, members of the Committee of the Whole then come to the floor to record their presence, giving the member who is seeking a recorded vote the chance to convince 24 or more allies to remain on the floor. When the quorum call is concluded and the presence of a quorum has been established, the chair returns to the pending request for a recorded vote. At this time, presumably, there are at least 25 members of the Committee of the Whole standing to support this request; if so, a recorded vote is ordered. The key difference between these steps and those that occur in the House proper is that, under the rules, in the House, the quorum call and the electronically recorded vote are combined; the outcome of the automatic record vote demonstrates the presence of a quorum. In Committee of the Whole, on the other hand, there may be a quorum call that is soon followed by a recorded vote on the amendment or motion in question. In current practice, however, typically the chair of the Committee of the Whole postpones further proceedings when a point of no quorum is made, akin to the case when a point of no quorum is made in the House. When an electronic vote or quorum call is ordered, either in the House or in Committee of the Whole, Representatives usually have at least 15 minutes to reach the floor and vote or record their presence. Clause 2(a) of Rule XX so provides \"the minimum time for a record vote or quorum call by electronic device shall be 15 minutes.\" Note that 15 minutes is \"the minimum time\"; it is not a fixed or maximum time. In practice, the time allowed is often extended to allow as many Members as possible to be recorded. Although the Speaker or chair of the Committee of the Whole may close a vote at any time after the 15 minutes have elapsed, he or she will sometimes allow at least several more minutes for any Members who are en route to the floor. For this reason, electronic votes frequently consume 20 minutes or longer. The chair's discretion to decide how long to leave a vote open after 15 minutes has elapsed could be used to the majority party's advantage. In the case of a very close vote, the Speaker or chair may close the vote after 15 minutes as soon as his or her side enjoys a majority, especially when the outcome might be reversed if the vote were left open long enough for other Members to reach the floor. However, Speakers have announced that they would not close electronic votes when Members are in the chamber seeking to be recorded. Alternatively, the chair could leave a vote open for much more than 15 minutes if his or her side is losing a close vote and more time is needed to reverse that outcome by persuading Members to change their votes or by waiting for more Members to arrive and vote. During an electronic vote or quorum call, Members may change their votes or record their presence at any time before the chair announces the result. However, a Member's vote or presence may not be recorded thereafter. The House Parliamentarian states, \"Requests to correct the Congressional Record and the Journal on votes taken by electronic device are not entertained, it being the responsibility of each Member to utilize the safeguards of electronic system and to verify the proper recording of his vote.\" Also, \"Following the announcement of the result of a call of the House conducted by electronic device ..., the Speaker declined to entertain requests by Members to record their presence.\" A Member who misses an electronic vote may announce from the floor how he or she would have voted and, by unanimous consent, have that statement inserted in the Record in proximity to the vote tally. Alternatively, Members can submit a signed statement stating how they would have voted, and if it is submitted the same day as the vote, it will appear in the Congressional Record right after the vote result in a distinctive type. Whether announced on the floor or submitted in writing, the statements can include explanations for why the Member was unavoidably detained. Members may be allowed less than 15 minutes to vote by electronic device when one such vote follows shortly after another or when an electronically recorded vote immediately follows a quorum call. In such circumstances, Members do not need 15 minutes to participate in the second or subsequent vote because they are already on the floor. Clause 9 of Rule XX grants the Speaker the discretion to reduce the time for an electronic vote in the House from not less than 15 minutes to not less than five minutes 1. on any question that follows another vote by electronic device; and 2. on any question that follows a report from the Committee of the Whole. The Speaker can only reduce the time for such votes if, in his or her discretion, Members \"would be afforded an adequate opportunity to vote.\" The Speaker announces in advance the intention to exercise this discretion in any of these circumstances. The Speaker states that the first electronic vote will be a 15-minute vote and the second one, if ordered, will be a five-minute vote. For example, he or she may announce that the vote on adopting a resolution will be a five-minute vote if the House agrees by record vote to order the previous question on the resolution. In this way, Members coming to the floor for the first vote are alerted to remain for the second. Clause 9(b) of Rule XX directs that notice of five-minute voting shall be issued prior to the first vote in a series \"to the maximum extent practicable.\" Clause 8 of Rule XX gives the Speaker the discretion to defer votes on some questions when an electronic vote has been ordered or when a point of order has been made against a voice or division vote on the grounds that a quorum was not present. The Speaker's authority applies to votes on (1) adopting a resolution or passing a bill, (2) agreeing to a conference report or a motion to instruct conferees, (3) agreeing to an amendment, (4) adopting a motion to recommit a bill, (5) adopting a motion to concur in a Senate amendment, with or without amendment, (6) ordering the previous question on any of the questions described in (1)-(5), (7) agreeing to the Speaker's approval of the Journal , (8) agreeing to a motion to suspend the rules, and (9) agreeing to a motion to reconsider or to lay on the table a motion to reconsider. When an electronic vote is ordered on any one of these questions, the Speaker may announce that he or she is postponing the vote to a time he or she designates later on the same legislative day, in case of a Journal vote, or within two legislative days, in case of any of the other votes. The vote or votes are postponed to a certain point in the legislative schedule (for example, after disposition of another bill that is scheduled for consideration). When the House reaches that point, Members vote on the questions in the order in which the votes on them had been postponed. The first of these votes must be a regular 15-minute vote; before it begins, however, the Speaker may announce that each of the succeeding votes will be five-minute votes if no business intervenes. This authority is regularly invoked when, on the same day, the House considers a series of motions to suspend the rules. If the Speaker was not able to postpone and cluster votes on these motions, there might be a series of electronic votes at no more than 40-minute intervals (the time allowed for debating each motion) on a Monday or Tuesday, when many Members are in the process of returning to Washington from their districts. The Speaker's authority under clause 8 allows votes to be scheduled later on Monday or \"rolled over\" until Tuesday or Wednesday, when they take place back-to-back with only the first vote in the series consuming at least 15 minutes. In similar fashion, the Speaker can postpone and cluster electronic votes that are ordered on suspension motions on Tuesdays and Wednesdays. There are four circumstances in which the time for completing an electronic vote in Committee of the Whole may be reduced to a minimum of two minutes. They involve a vote occurring immediately after another vote or after a quorum call, or other circumstances when, in the discretion of the chair, two minutes will provide an adequate opportunity to vote. First, clause 6(g) of Rule XVIII empowers the chair of the Committee of the Whole to postpone requests for a record votes on separate amendments to a bill until later during consideration of the bill, and also to cluster the votes on those amendments. That is, the Committee would vote on the amendments later, one right after the other. When the Committee of the Whole resumes proceedings at a time of the chair's choosing, the request for a recorded vote is made again, and a vote by electronic device will be taken if supported by a sufficient second (24 additional Members, Delegates, and the Resident Commissioner). In such cases, the chair may reduce the time for the second and each subsequent vote to no less than two minutes. Second, if votes will occur in Committee of the Whole on two or more pending amendments, the chair may announce that there will be at least 15 minutes for the first vote but at least five minutes for each of the succeeding votes, so long as no business or debate intervenes between each vote (clause 6(f) of Rule XVIII). Suppose, for example, that a substitute for a first degree amendment has been offered. The Committee of the Whole will first vote on the substitute and then on the first degree amendment (as amended, if amended by the substitute). The chair may state that there will be a 15-minute vote on the substitute to be followed by a five-minute vote on the first degree amendment as long as no debate occurs and no other motions or amendments are offered between the two votes. Third, if votes on amendments have been postponed, when the House resolves into the Committee of the Whole to resume proceedings, time for the votes can be reduced to two minutes if Members, Delegates, and the Resident Commissioner \"would be afforded an adequate opportunity to vote.\" This provision of Rule XVIII, clause 6(g)(2), accounts for circumstances when, for example, the Committee of the Whole rises briefly during a series of votes. It also allows two-minute votes when amendments are postponed and scheduled for a time later in the day or the next day, perhaps after a vote series that begins with questions voted on in the House. In such a situation, a 15-minute vote might occur in the House and then, after the House resolves into the Committee of the Whole, the first amendment vote could be two minutes. Fourth, as discussed above, a Member, Delegate, or Resident Commissioner may request a recorded vote in Committee of the Whole on an amendment and, pending that request, make a point of order that a quorum is not present. If the chair determines that a quorum is not present and orders a quorum call, he or she may also announce at that time that, if a recorded vote on the amendment is ordered after the completion of the 15-minute quorum call, the time for the amendment vote itself will be reduced to not less than two minutes (clause 6(b)(3) of Rule XVIII). As noted above, clause 2(a) of Rule XX also provides not less than 15 minutes for Members to respond to quorum calls in the House, but this time may be reduced for quorum calls ordered in Committee of the Whole. The device is what is known informally as a \"notice quorum.\" Clause 6(c) of Rule XVIII gives the chair the discretion to announce, before a quorum call begins, that he or she will declare that a quorum is constituted as soon as 100 members of the Committee of the Whole (which includes the Delegates and Resident Commissioner) have recorded their presence: When ordering a quorum call in the Committee of the Whole House on the state of the Union, the Chair may announce an intention to declare that a quorum is constituted at any time during the quorum call when he determines that a quorum has appeared. If the Chair interrupts the quorum call by declaring that a quorum is constituted, proceedings under the quorum call shall be considered as vacated, and the Committee of the Whole shall continue its sitting and resume its business. Notice quorums are now uncommon. Quorum calls in Committee of the Whole do not usually take place, because if a recorded vote is requested on an amendment, further proceedings are typically postponed until a time when a series of amendment votes is expected, and a quorum is present. The key rule governing attempts to secure the presence of a majority of Representatives on the floor during a meeting of the House is clause 7 of Rule XX, which states (a) The Speaker may not entertain a point of order that a quorum is not present unless a question has been put to a vote. (b) Subject to subparagraph (c) the Speaker may recognize a Member, Delegate, or Resident Commissioner to move a call of the House at any time. When a quorum is established pursuant to a call of the House, further proceedings under the call shall be considered as dispensed with unless the Speaker recognizes for a motion to compel attendance of Members under clause 5(b). (c) A call of the House shall not be in order after the previous question is ordered unless the Speaker determines by actual count that a quorum is not present. Under subparagraph (a), a Member only has the right to invoke the constitutional quorum requirement when a vote is taking place. At that time, any Representative \"may object to the vote on the ground that a quorum is not present and make a point of order that a quorum is not present.\" At any other time, the equivalent of a quorum call may take place only at the discretion of the Speaker, when he or she recognizes a Member \"to move a call of the House.\" In the former case, the Speaker responds to the point of order by counting to determine whether a quorum is present. If it is, the point of order is overruled and no quorum call ensues; if it is not, the point of order is sustained, and an automatic roll call vote is ordered, taken by electronic device. In the latter case (subparagraph (b)), a Member makes a motion for a call of the House, prompting what is in effect a quorum call to secure the presence of Members, regardless of whether or not a quorum was present when it began. Note that the purpose of a quorum call under subparagraph (a), or a call of the House under subparagraph (b), is to secure the presence of a quorum, not to require the attendance of all the Members of the House. Subparagraph (b) provides that, once a quorum responds to a call of the House, \"further proceedings under the call\"âwhich would be efforts by the Sergeant at Arms to secure the attendance of all the remaining Membersâ\"shall be considered as dispensed with\" unless the Speaker decides to entertain a motion for that purpose. Similarly, clause 6(b) of Rule XX, quoted earlier, provides for the same \"further proceedings\" to be dispensed with after a quorum call pursuant to subparagraph (a). The corresponding rule governing quorums and quorum calls in Committee of the Whole is clause 6 of Rule XVIII. It is this rule that (1) sets the quorum in Committee of the Whole at 100 Members, Delegates, and the Resident Commissioner; (2) authorizes notice quorum calls at the discretion of the chair; and (3) provides for two-minute votes on amendments following regular quorum calls, again at the chair's discretion. In addition, the same rule controls when a point of order that a quorum is not present can be made in Committee of the Whole. (Calls of the House are not permitted in Committee of the Whole.) In brief, the rule states that the chair need not permit a point of order of no quorum to be made during general debate, and once a quorum in Committee of the Whole has been established on any day, a point of order of no quorum may be made only when \"the Chair has put the pending proposition to a vote.\" In other words, no Member has a right to insist on the presence of a quorum during general debate. There is a right to make one point of order of no quorum if it is made during the amending process that follows general debate but only (1) if there was no quorum call during general debate and (2) if this point of order is made before there has been a recorded vote on an amendment or motion during that day's sitting. Once a quorum call or recorded vote has taken place in Committee of the Whole on any day, a Member has the right to make a point of order that a quorum is not present only when the Committee is in the process of voting. In the unlikely event that a majority of the House fails either to respond to a quorum call or to participate in an electronic vote, the House's failure to comply with the constitutional quorum requirement is demonstrated. Consequently, the House cannot resume legislative business until the presence of a quorum is recorded. The House has only two options: one is to adjourn; the other is to take steps necessary to secure the attendance of a quorum. In most cases, the House can be expected to adopt the second of these options by invoking clause 5(a) of Rule XX. This clause provides in part that, \"in the absence of a quorum, a majority comprising at least 15 Members, which may include the Speaker, may compel the attendance of absent Members.\" In this instance, the House can act without a quorum being present because the constitutional provision quoted at the beginning of this report authorizes it to do so. That provision states that, in the absence of a quorum, \"a smaller Number may adjourn from day to day, and may be authorized to compel the Attendance of absent Members, in such Manner, and under such Penalties as each House may provide.\" The situation and options in Committee of the Whole are comparable. \"Where the Chair has announced the absence of a quorum in Committee of the Whole, no further business may be conducted until a quorum is established or the Committee rises.\" For much the same reason that the Constitution authorizes the House to adjourn without a quorum being present, clause 6(d) of House Rule XVIII states that \"a quorum is not required in the Committee of the Whole House on the state of the Union for adoption of a motion that the Committee rise.\" However, a quorum is necessary to adopt a motion that the Committee rise and report a measure for final passage in the House. Article I, Section 5, clause 1 of the Constitution states that \"a Majority of each [House] shall constitute a Quorum to do Business.\" A quorum has long been defined as a majority of the whole number of the House, and the whole number of the House has long been viewed as the number of Members elected, sworn, and living. Whenever the death, resignation, disqualification, or expulsion of a Member results in a vacancy, the whole number of the House is adjusted. In the event of a catastrophe, however, it may not be immediately known whether a Member is alive or dead, thereby making it impossible to adjust the whole number of Members. Furthermore, if a Member is incapacitated but living, or unharmed but unable to attend the proceedings of the House, he or she would still count toward the whole number used to determine a quorum. Missing, injured, and stranded Members are still \"elected, sworn, and living.\" If many such Members are affected, and the Congress needs to act, this situation could prove problematic because it may be impossible to establish a quorum. In order to address this issue, in 2005 the House modified clause 5 of Rule XX to prepare for a catastrophic event that leaves a large number of Members missing, incapacitated, or incapable of attending the proceedings of the House. The rule establishes a method for establishing a \"provisional quorum\" in the case of a catastrophic event. This method did not provide a new means for determining the whole number of the House; on the contrary, it is a method to be used provisionally until a quorum can be constituted by a majority of the whole number of the House. Under the rule, if the House is without a majority of Members elected, sworn, and living due to catastrophic circumstances, then a quorum shall be a majority of the \"provisional number\" of the House. The rule requires four steps to be taken in order, and without intervening adjournment, to establish that the House is without a quorum due to catastrophic circumstances. Only after the steps described below are taken will a new number required for a quorum be determined based on the provisional number of the House. A majority of Members present may terminate the proceedings by adopting the motion to adjourn. If the absence of a quorum is demonstrated, then under a House rule (dating to 1789) a Member can make a motion to compel the attendance of absent Members. This motion, described in House Rule XX, clause 5(a), must first be disposed of, either favorably or unfavorably, before any other steps are taken to establish that the House is without a quorum due to catastrophic circumstances. The motion to compel the attendance of absent Members requires a majority vote for adoption, and that majority must comprise at least 15 Members. If the motion is adopted, then the call of the House occurs through Members presenting themselves, perhaps after receiving notification from the Sergeant at Arms and having their presence recorded by the Clerk. If the motion is not adopted, either because it failed to garner support from a majority of Members present or because the majority supporting it is fewer than 15 Members, then the motion is still considered \"disposed of\" and the other steps necessary to establish that the House is without a quorum due to catastrophic circumstances can occur. After disposing of the motion to compel the attendance of absent Members, the House must have a call (or series of calls) of the House over a period of 72 hours, excluding time spent in recess. The call could be the one that was ordered by adoption of the motion to compel the attendance of absent Members. The Speaker could also entertain a motion for a call of the House under clause 7(b) of Rule XX. However ordered, if the call failed to produce a quorum based on the existing whole number of the House after 72 hours, then the call could be closed, and additional steps to establish that the House is without a quorum due to catastrophic circumstances could be taken. After the call of the House is closed, the Speaker, with the majority and minority leaders, can then receive from the Sergeant at Arms (or designee) a \"catastrophic quorum failure report\" that states that the House cannot establish a quorum because of catastrophic circumstances such as an attack, natural disaster, or contagion. According to the rule, a catastrophic quorum failure report must contain the number of known vacancies, a list of former Representatives whose seats are vacant (this list would include any known dead Representatives as well as any Representatives who resigned or who were removed by action of the House if their seats had not yet been filled), a list of Representatives considered incapacitated, a list of Representatives not incapacitated but still incapable of attending the proceedings of the House, and a list of Representatives not accounted for. The Sergeant at Arms is directed by the rule to prepare the report in consultation with the Attending Physician to the Congress (or a designee), the Clerk of the House (or a designee), and public health and law enforcement officials. The Speaker, after consultation with the two party leaders, is required to announce the content of the report to the House. This announcement is not subject to appeal. Even after the Speaker's announcement, the House is not considered to be without a quorum due to catastrophic circumstances until the completion of a second extended call of the House. This call of the House can be ordered under the procedures described in clause 5(a) of Rule XX or by a motion for the call under clause 7(b). This second call of the House, or series of calls, could be closed after 24 hours, excluding the time spent in recess, if it does not produce a majority of the whole number of the House. If all four of these steps are completed, then the House has established that it is without a quorum due to catastrophic circumstances. A quorum for conducting business can then be determined based on the \"provisional number of the House.\" The number of Members who respond to the 24-hour call of the House will be the provisional number of the House, and a majority of the provisional number will constitute a quorum for doing business. If Members arrive after the call of the House, the provisional number is increased accordingly. If any Member counted under the 24-hour call of the House to determine the provisional number later ceases to be a Representative due to death, resignation, or action by the House, then the provisional number of the House would also be reduced accordingly. The catastrophic quorum failure report must be updated each legislative day; in other words, it must be updated each time the House reconvenes after an adjournment. The Speaker is required to make these updates available to the House. If at any time a sufficient number of Members arrive to constitute a quorum of the whole number of the House, then the provisional number would no longer be in effect. Some Members expressed concern that the catastrophic quorum rule was unconstitutional. When H.Res. 5 was called up for consideration, a Representative made a constitutional point of order. The Speaker declined to entertain the constitutional point of order, citing numerous earlier precedents barring the Speaker from ruling on the constitutionality of a pending proposal. Instead, typically, the House determines for itself the constitutionality of a proposition either by voting to consider it or voting to adopt it. The Representative then raised the question of consideration, and the House by a vote of 224-192 agreed to consider H.Res. 5 and the provisions in it dealing with the new quorum procedure. Thereafter, H.Res. 5 was agreed to by a vote of 220-195. Whether an attempt will be made to challenge in court the constitutionality of the rule is not yet certain. Neither is it certain that a Member has legal standing to bring such a suit without the new quorum rule ever having been implemented. In general, every Representative is expected to vote on every question, but House rules make an exception for the Speaker. Under clause 7 of Rule I, the Speaker \"is not required to vote in ordinary legislative proceedings, except when such vote would be decisive or when the House is engaged in voting by ballot.\" Although this rule does not prevent Speakers from voting, they usually do not. Every other Member \"shall vote on each question put, unless having a direct personal or pecuniary interest in the event of such question\" (Rule III, clause 1). Each Representative is expected to apply this clause to himself or herself. The House Parliamentarian observes that \"it has been found impracticable to enforce the provision requiring every Member to vote.\" Also, in recent practice, \"the Speaker has held that the Member and not the Chair should determine\" whether a Representative has \"a direct personal or pecuniary interest\" in the outcome of a vote; \"the Speaker has denied the Speaker's own power to deprive a Member of the constitutional right to vote.\" In the same vein, clause 10 of Rule XXIII, the Code of Official Conduct, states that a Member, Delegate, or Resident Commissioner who has been convicted of a crime for which he or she may be sentenced to two years or more in prison \"should refrain\" from voting in the House or in Committee of the Whole. Voting is an individual right and responsibility that cannot be delegated or exercised by anyone else. In response to concerns about the possibility of \"ghost voting,\" in which a Member would be recorded as having voted even when there was evidence that he or she could not have done so, the House voted in 1981 to add what is now clause 2 of Rule III: (a) A Member may not authorize any other person to cast the vote of such Member or record the presence of such Member in the House or the Committee of the Whole House on the state of the Union. (b) No other person may cast a Member's vote or record a Member's presence in the House or the Committee of the Whole House on the state of the Union. All questions are to be decided on the House floor by simple majority vote unless some constitutional provision or House rule provides otherwise. A simple majority vote is defined as at least one-half-plus-one of the Members voting, provided that a quorum is present; clause 1(c) of Rule XX provides that \"in case of a tie vote, a question shall be lost.\" The Constitution requires a two-thirds vote of the Members voting for various purposes: to expel a Member, to override a presidential veto, to propose a constitutional amendment, to remove political disabilities (now obsolete), and to determine that a President remains disabled. In addition, for other purposes House rules require the support of either two-thirds or three-fifths of the Members voting: Two-thirds: to agree to a motion to suspend the rules (clause 1(a) of Rule XV), Two-thirds: to agree to a motion to dispense with the call of the Private Calendar (clause 5(a) of Rule XV), and Two-thirds: to consider a special rule on the same day the Rules Committee reports it (clause 6(a) of Rule XIII).", "summary": "The Constitution requires that a quorum, defined as a majority of the House, be present on the floor when the House transacts business. The House, however, always presumes that a quorum is present unless and until its absence is demonstrated conclusively. The rules of the House strictly limit the occasions on which a Representative may make a point of order that a quorum is not present. In current practice, Members usually make such a point of order only when a vote is taking place. If a majority of the Members fails to respond to a quorum call or participate in an electronically recorded vote conducted in the House, the House must adjourn or take steps necessary to secure the attendance of enough Members to constitute a quorum. Questions to be decided on the floor are usually first put to a voice vote. Such votesâin which those present on the floor respond by answering together \"aye\" (after the presiding officer asks how many are in favor) or \"no\" (after the presiding officer asks how many are opposed)âare very common in the House. For such votes, no public record shows how individual Members voted. In practice, such votes might be taken with few Members present on the floor. Before the final result of a voice vote is announced, however, any Member may demand a division vote or seek an electronically recorded vote. Members' positions on these votes are publicly recorded. During a vote using the House's electronic voting system, Members have at least 15 minutes to come to the floor and cast their votes. The time for a vote by electronic device immediately following another vote by electronic device can be reduced to five minutes if the Speaker determines that Members will have an adequate opportunity to vote. The Speaker also has the authority to postpone record votes on certain questions identified in House Rules, including to approve a bill or resolution and to suspend the rules to pass a bill. Most postponed votes must be scheduled within two additional legislative days. The procedures for securing a vote by electronic device differ based on whether the House is meeting as the House proper or instead in the Committee of the Whole (a parliamentary forum that the House, in current practice, uses to consider amendments to legislation). In the House proper, an electronic vote can be secured in one of three ways. First, one-fifth of the number of Members present on the floor can invoke their constitutional right to demand \"the yeas and nays.\" Second, one-fifth of a quorum (usually 44 Members), can demand a \"recorded vote\" under House rules. Third, if a quorum is not present, a Member can make a point of order that a quorum is not present and object to a voice vote on the grounds that a quorum is not present. Most often, after such a point of order is made, the Speaker postpones further proceedings on the question being voted on. When the House resumes consideration of the question at a time designated by the Speaker, a quorum is typically present, and an electronic vote can be secured using one of the other two methods. (If, instead, the Speaker sustained a point of order against a voice vote on the grounds that a quorum was not present, an electronic vote would take place automatically to decide the question and establish the presence of a quorum.) To be clear, these three procedures result in votes that are indistinguishable from each other in how they are conducted; they differ in how they are ordered. When instead the House is meeting in the Committee of the Whole, 25 members can secure an electronic vote on a pending amendment or motion. The chair has the authority to postpone a request for a recorded vote on an amendment, and usually does. This allows the request to be renewed at a time the floor is crowded and a member can likely receive the support of a sufficient second to take the vote by electronic device. In addition, if a quorum (100 members of the Committee of the Whole) is not present, a member first can require that a quorum call take place before the chair counts to determine if there is sufficient support to order an electronically recorded vote. This option is less frequently utilized, and proceedings can be postponed in this case as well. In order to prepare for a catastrophic event, in 2005 the House created a procedure to determine a how many Members constitute a quorum when a large number are missing, incapacitated, or incapable of attending House proceedings. The House must hold two lengthy quorum calls and receive a report from the Sergeant at Arms before a quorum will be determined based on the \"provisional number of the House.\" At the time the rule was approved, a Member raised a point of order that the provisional quorum mechanism was unconstitutional. The Speaker does not rule on constitutional questions; instead, the House determines the constitutionality of a proposition by voting to consider it or by adopting it. In this case, a question of consideration was raised, and the House voted to consider the resolution. Thereafter, the resolution was agreed to.", "document_type": "crs"}
{"report": "The Health Resources and Services Administration (HRSA), of the Department of Health and Human Services (HHS), is the federal agency charged with improving the nation's health safety net. HRSA provides access to health care services for those who are uninsured, isolated, or medically vulnerable, and educates health care providers on maternal and child health issues. HRSA's main role in maternal health is through its Maternal and Child Health Bureau (MCHB). The MCHB, in this context, encourages health promotion, promotes risk prevention, and disseminates information to health care professionals with the goal of reducing U.S. cases of severe maternal morbidity (SMM) and maternal mortality. According to the Centers for Disease Control and Prevention (CDC) of HHS S evere maternal morbidity refers to a medical condition such as eclampsia and health failure that adversely affects the maternal health outcome of labor and delivery, resulting in either short-term or long-term consequences for pregnant and postpartum women. U.S. maternal death refers to \"the death of a woman while pregnant or within 42 days of termination of pregnancy, but excludes those from accidental or incidental causes.\" CDC estimates the U.S. rate of SMM by measuring U.S. cases of SMM per 10,000 delivery hospitalizations. According to the CDC, the overall U.S. SMM rate increased by 190.9% between 1993 and 2014, from 49.5 SMM to 144.0 SMM. The CDC estimates the prevalence of U.S. maternal deaths by calculating the U.S. maternal mortality ratio (MMR) , which is the number of U.S. maternal deaths per 100,000 live births. According to the CDC, the U.S. MMR increased by 32.8% from 13.1 maternal deaths per 100,000 live births in 2004 to 17.4 maternal deaths per 100,000 live births in 2018. To address U.S. cases of SMM and maternal mortality, the FY2019 appropriations report language for the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019, and Continuing Appropriations Act, 2019 ( P.L. 115-245 ), among other things, reserved funds within the Special Projects of Regional and National Significance (SPRANS) for HRSA to administer maternal health programs. SPRANS is a competitive grant program for research and training programs and services related to maternal and child health and to children with special health care needs. The FY2019 appropriation provided $109.6 million to SPRANS, which explicitly included $26 million for HRSA to maintain and establish new maternal health programs. Using the SPRANS authority, HRSA allocated $3 million to the previously existing Alliance for Innovation on Maternal Health (AIM) program and for the establishment of the Alliance for Innovation on Maternal Health (AIM)âCommunity Care Initiative. Additionally, HRSA allocated $23 million to establish the State Maternal Health Innovation (MHI) program. In FY2019, HRSA also established the Rural Maternity and Obstetrics Management Strategies (RMOMS) program and the Supporting Maternal Health Innovation (MHI) program. The appropriations report language authorizes HRSA to use $1 million of the $23 million appropriated, for the purchase and implementation of telehealth and to support coordination of rural obstetric care. The FY2020 appropriations report language explicitly provides $5 million to SPRANS for HRSA to carry out the activities through both of the AIM programs and $23 million for the State MHI program; the report language does not explicitly provide funding to the RMOMS program and Supporting MHI program. However, Congress appropriated $119.1 million to SPRANS for FY2020âincreasing the FY2019 appropriation level by $10.5 million. For FY2020, according to HRSA, the federal agency is providing $2 million to the RMOMS program, $5 million to carry out the activities through both of the AIM programs, and $23 million to the State MHI program. For FY2021, according to HRSA, the agency is requesting from Congress $12 million for the RMOMS program, $15 million to carry out the activities through both of the AIM programs, and $53 million for the State MHI program. HRSA's FY2021 budget documents do not provide information on either prior year or planned funding allocations for the Supporting MHI program. HRSA funds the five programs through cooperative agreements. According to HRSA, a cooperative agreement refers to \"a financial assistance mechanism where substantial involvement is anticipated between HRSA and the recipient during performance of the contemplated project.\" Figure 1 provides an overview of and the coordination between the five maternal health programs. HRSA is administering the five maternal health programs under the agency's Improving Maternal Health in America initiative. To assist Congress as it considers measures on U.S. maternal health programs, this report provides an overview of the previously existing AIM program and the four new maternal health programs that HRSA established in FY2019. For each of the five maternal health programs, the report provides an overview of the program, discusses the main core activities or functions of the program, provides the program's criteria of eligibility and reporting requirements, and discusses the program's funding allocations. The Alliance for Innovation on Maternal Health (AIM) program aims to improve U.S. maternal health outcomes, including maternal safety, by diminishing the number of preventable SMMs and maternal deaths. The initiative funds one cooperative agreement to support continuity of care for pregnant and postpartum women who receive maternal health care services at birthing facilities and hospitals. HRSA established the AIM program in 2014. Since 2014, The American College of Obstetricians and Gynecologists (ACOG), which is a medical professional organization for obstetricians and gynecologists, has been the sole grantee of the AIM program. During the AIM program's most recent four-year performance period. ACOG was responsible for engaging and building partnerships with national stakeholders, promoting the adoption and implementation of hospital-focused maternal safety bundles by state-based teams, and evaluating the delivery of provider education on interconception health. According to HRSA, a maternal safety bundle refers to \"a set of small, straightforward evidence-based practices, that when implemented collectively and reliably in the delivery setting have improved patient outcomes and reduced maternal mortality and [SMM].\" Hospital-focused maternal safety bundles are designed for health care providers in birthing facilities and hospitals. The best practices contained in the maternal safety bundles are grouped into four administrative activities: (1) readiness, (2) recognition and prevention, (3) response, and (4) reporting/systems learning. Listed below are the current eight hospital-focused maternal safety bundles. For example, the text box below describes the Maternal Mental Health: Depression and Anxiety safety bundle. The eight hospital-focused maternal safety bundles, according to HRSA, \"include data metrics, are shown to be clinically effective, and are currently being adopted by states for inpatient use.\" As of January 2020, according to HRSA, an estimated 1,300 hospitals in 27 states participate in the initial AIM program. The current AIM program has a five-year period of performance of September 1, 2018, through August 31, 2023. Under the AIM program, the award recipient performs three core activities: (1) facilitating multidisciplinary collaborations to reduce the number of preventable SMMs and maternal mortality, (2) guiding the national implementation and adoption of maternal safety bundles, and (3) collecting and analyzing data. The overall goal of the core activities is to achieve the program's outcomes. According to HRSA, the program objectives are to do the following: Maintain the existing 10 AIM state-based teams and accept 25 new state-based teams to expand the implementation of the current maternal safety bundles. Develop new maternal safety bundles and/or resources that aim to address the quality and safety of maternity care practices. Establish a national campaign on SMM and maternal mortality that demonstrates the impact of AIM and maternal safety bundles. Prevent 100,000 cases of SMM and 1,000 maternal deaths. Domestic public and private entities are eligible to apply for the AIM program. Eligibility extends to tribes, tribal organizations, community-based organizations, and faith-based organizations. The AIM grant recipient is required to provide HRSA with annual progress reports, performances reports, and a final report narrative. The recipient is to submit annual reports on progress made toward achieving the program outcomes. The performance reports are to examine measures such as sustainability, depression screening, well-woman visit/preventive care, and health equity in maternal health outcomes, sustainability. According to HRSA, \"the Project Officer will provide additional information about [the final report narrative] after HRSA makes the award.\" HRSA may annually allocate no more than $2 million to the sole recipient of the AIMâCommunity Care Initiative. This funding is dependent upon the availability of appropriated funds, recipient's satisfactory progress in meeting program's objectives, and the interest of the federal government. The AIM program has no cost-sharing or matching requirements. On August 1, 2018, HRSA awarded $2 million to ACOG via a cooperative agreement to continue assisting state-based teams with implementing maternal safety bundles. The Alliance for Innovation on Maternal Health (AIM)âCommunity Care Initiative is a designed to improve U.S. maternal health and safety. The initiative funds one cooperative agreement to support continuity of care for pregnant and postpartum women who receive maternal health care services at medical facilities outside of birthing facilities and hospitals. The AIMâCommunity Care Initiative builds on the work of the initial AIM program. Together, both AIM programs aim to expand the implementation and adoption of maternal safety bundles to all 50 U.S. states, the District of Columbia, and U.S. territories, as well as tribal entities. The AIMâCommunity Care Initiative focuses on two priority areas: supporting the development and implementation of nonhospital maternal safety bundles for health care providers in outpatient settings and community-based organizations, and addressing preventable SMM and maternal deaths among pregnant and postpartum women who receive care outside of birthing facilities and hospitals. The initial AIM program, which focuses on hospital-based services, began developing two nonhospital maternal safety bundles: (1) Postpartum Care Basics for Maternal Safety: From Birth to the Comprehensive Postpartum Visit, and (2) Postpartum Care Basics for Maternal Safety: Transition from Maternity to Well-Woman Care. The AIMâCommunity Care Initiative is responsible for further developing these two maternal safety bundles. The award recipient is to aim to advance the two nonhospital maternal safety bundles by developing data metrics, testing the bundles' effectiveness in outpatient settings and community-based organizations, and implementing the bundles in medical facilities outside of birthing facilities and hospitals. The initiative recipient is to collaborate with key stakeholders, including other HRSA grant recipients that address maternal and child health issues, on ways to address preventable SMM and maternal deaths among pregnant and postpartum women who receive care outside of birthing facilities and hospitals. In addition, the awardee is to collaborate with the recipient of the Supporting Maternal Health Innovation Program (discussed in the \" Supporting Maternal Health Innovation (MHI)Â Program \" section of this report). The two recipients are to work in partnership to develop resource materials for nonhospital-focused maternal safety bundles. After developing the resources, the Supporting MHI recipient is to assist the AIMâCommunity Care Initiative recipient with disseminating resource materials and other evidence-informed strategies to communities that experience disparities in U.S. maternal morbidity and mortality. The AIMâCommunity Care Initiative has a five-year period of performance of September 30, 2019, through September 29, 2024. Under this program, the recipient of the AIMâCommunity Care Initiative is to perform three core activities: (1) establishing and convening a maternal safety workgroup, (2) facilitating the national implementation of two maternal safety bundles, and (3) collecting and analyzing data. The overall goal of the core activities is to achieve the program's outcomes. According to HRSA, the program objectives are to do the following: Increase knowledge and awareness of nonhospital-focused maternal safety bundles, and identify how bundle contents are related to best practices among providers, community-based organizations, outpatient clinical settings, etc. Increase the capacity to implement and test nonhospital-focused maternal safety bundles. Increase the number of nonhospital-focused maternal safety bundles developed that address emerging topics in the provision of maternal care services. Increase implementation of the nonhospital-focused maternal safety bundles within nonclinical community-based organizations and outpatient clinical settings across states/communities. Increase awareness of staff and providers in both inpatient and outpatient clinical settings regarding the need to address racial/ethnic disparities when implementing all nonhospital-focused maternal safety bundles. Increase the evidence base on the implementation of nonhospital-focused maternal safety bundles. The first core activity requires the AIMâCommunity Care Initiative award recipient to establish a maternal safety workgroup to guide the activities of the program. Members of the maternal safety workgroup must include community-focused public health and clinical experts in the field of maternal health. The second core activity requires the award recipient to facilitate the national implementation of nonhospital maternal safety bundles at approximately five test sites. The test sites, which subrecipients will manage, are to be located at outpatient clinical settings and nonclinical organizations. The test sites must provide health care services to pregnant and postpartum women. The award recipient is to collaborate with the initial AIM program's state-based teams and other key stakeholders to determine how to best disseminate the nonhospital maternal safety bundles nationwide. Like the test sites, the nonhospital maternal safety bundles are to be adopted by outpatient clinical settings and community-based organizations that provide health care services to pregnant and postpartum women. HRSA expects the recipient of the AIMâCommunity Care Initiative to collaborate with the current AIM program award recipient. The AIM program is to maintain a public website containing materials on non-hospital focused maternal safety bundles. The website would be further developed and maintained by the AIMâCommunity Care Initiative recipient, who would also support the collaboration of the AIM website and the Supporting MHI program website. The third core activity requires the award recipient to collect and analyze structure, process, and outcome data. According to HRSA, the recipient will collect and analyze \"quality improvement baseline, process, structure, and outcome data on the implementation of non-hospital focused maternal safety bundles, both within test sites and during national rollout.\" Domestic public and private entities are eligible to apply for the AIMâCommunity Care Initiative. Eligibility extends to tribes, tribal organizations, community-based organizations, and faith-based organizations. The AIMâCommunity Care Initiative awardee is required to provide HRSA with annual progress reports, performance reports, and a final report narrative. The recipient is to submit annual reports on progress made toward achieving the program outcomes/objectives (as described in the \" Three Core Activities \" section above). The performance reports would examine measures such as quality improvement, health equity in maternal health outcomes, sustainability, and well-woman visit/preventive care. The final performance report must include the project's abstract, expenditure data for the final year of the performance period, and the final scores for the performance measures. According to HRSA, \"the Project Officer will provide additional information about [the final report narrative] after HRSA makes the award.\" HRSA may annually allocate approximately $1,830,000 to the sole recipient of the AIMâ Community Care Initiative. This funding is dependent upon the availability of appropriated funds, recipient's satisfactory progress in meeting program's objectives, and the interest of the federal government. The program has no cost-sharing or matching requirements. The recipient may use the funds for direct, indirect, facility, and administrative costs. Annually, approximately 40% to 50% of the award must cover the costs of subrecipients' test sites and travel/meeting compensation for members of the maternal safety workgroup. In FY2019, HRSA awarded $1.8 million to one recipient. The Rural Maternity and Obstetrics Management Strategies (RMOMS) program is a maternal health care pilot program that funds up to three cooperative agreements for the development, implementation, and testing of models that aim to improve access to and continuity of maternal and obstetrics care in rural communities. RMOMS program recipients serve communities based on factors such as disparities in ethnicity/race, socioeconomic status, primary language, access to maternal health care, and coordinated/continuing maternal and obstetrics care. According to HRSA, the RMOMS program has four goals: 1. improve maternal and neonatal health care outcomes, 2. develop sustainable financing models, 3. develop a network whereby coordination of maternal and obstetric care is sustainable within a rural region, and 4. increase access to and the delivery of preconception, pregnancy, labor and delivery, and postpartum health care services. The FY2019 RMOMS program has a four-year performance period, September 1, 2019, through August 31, 2023. The program occurs in two phases. Phase one. The first phase occurs during the first year of the performance period. During this year, RMOMS program recipients develop baseline data, models, and work plans. In addition, the program recipients participate in the development of network capacity building and infrastructure. RMOMS program recipients collaborate with HRSA to assess the program's impact using specific measures and data elements, including access, workforce proficiency, cost and cost-effectiveness, clinical outcomes, quality of care, and healthy behaviors. The models are designed to address the four RMOMS focus areas described below in the \" Four RMOMS Focus Areas \" section of this report. In addition, each model addresses payment and reimbursement options, workforce skills required of maternal health care providers, and women's access to maternal health care services, including telehealth . According to HRSA, telehealth refers to \"the use of electronic information and telecommunication technologies to support long-distance clinical health care, patient and professional health-related education, public health, and health administration.\" Â (Of the $23 million that Congress provided to SPRANS for the establishment of new maternal health grants in FY2019, Congress reserved $1 million for the purchase and implementation of telehealth and to, support coordination of rural obstetric care.) RMOMS program award recipients are to develop and submit to HRSA three-year work plans, which include the baseline data and strategic plans to implement the model. Phase two. The second phase occurs during the remaining second through fourth years of the pilot program. During these years, RMOMS program award recipients implement the models based on the recipients' work plans. In addition, the recipients are to provide mothers and infants with case management and care coordination services. The recipients would collaborate with HRSA to identify the data elements to monitor and measure through the model. Each RMOMS program award recipient creates strategies to address each of the four RMOMS focus areas: (1) rural hospital obstetric service aggregation, (2) network approach to coordinating a continuum of care, (3) leveraging telehealth and specialty care, and (4) financial sustainability. Domestic public or private and nonprofit or for-profit entities are eligible to apply for the RMOMS program. Eligibility extends to tribes, tribal organizations, community-based organizations, and faith-based organizations. Eligible entities, which HRSA refers to as \"applicant organizations,\" are equipped with necessary staff and infrastructure to direct the administrative and programmatic activities of the program. The applicant organization may be located in either an urban or a rural area. However, the application organization must serve a population either in HRSA-designated rural counties or rural census tracts in urban counties. (The Office of Rural Health Policy within HRSA funded the development of Rural Urban Area Codes to classify areas within metropolitan areas as HRSA-designated rural counties and rural census tracts in urban counties.) An entity could have applied twice for the FY2019 RMOMS program: (1) as an applicant organization and (2) as part of a network organization under a different applicant organization. RMOMS applicant organizations must be part of either a formal or an established network. HRSA refers to a network as an organizational arrangement among three or more separately owned domestic public and/or private entities, including the applicant organization. For the purposes of this program, the applicant must have a network of composition that includes: (1) at least two rural hospitals or [critical access hospitals (CAHs)]; (2) at least one health center under section 330 of the Public Health Service Act (Federally Qualified Health Center [FQHC]) or FQHC look-alike; (3) state Home Visiting and Healthy Start Program if regionally available; and (4) the state Medicaid agency. A formal network is a RMOMS Network organization that has signed bylaws, a governing body, and either a memorandum of agreement, memorandum of understanding, or other formal collaborative agreements. HRSA identifies a formal network that has a history of working together as an established network. At least one entity, aside from the applicant organization, within the network must be located in an HRSA-designated rural county or rural census tract in an urban county. Each RMOMS applicant organization and the entities that are part of a network must have separate and different Employer Identification Numbers (EINs) from the Internal Revenue Service. Separate and different EINs are required in order to receive RMOMS program funds. Figure 2 illustrates an example of a RMOMS network. RMOMS program award recipients are required to provide HRSA with annual progress reports, a performance measure report, a sustainability report, and a final closeout report. Recipients are to submit annual reports on progress in achieving the program's four goals (as described in the \" Rural Maternity and Obstetrics Management Strategies (RMOMS) Program \" section of this report). In addition, the annual reports must specifically include progress toward addressing the third RMOMS focus area, \"leveraging telehealth and specialty care.\" After the end of each budget period, RMOMS program recipients are to submit reports on performance measures. HRSA is to inform the program recipients of the performance measures to report on, during the first year of performance. HRSA provides guidance to RMOMS program recipients on how to complete the sustainability report, which is due during the final year of the performance period. Each RMOMS program award recipient is to provide the MCHB with a final closeout report within 90 days after the end of the performance period. The final report must include information and data such as barriers encountered, core performance data, and the impact of the overall project. The Notice of Award provides program recipients with additional information about the final report. HRSA uses two authorities to administer and fund the RMOMS program, according to the program's Notice of Funding Opportunity (see Table 1 ). Using its authority for SPRANS (SSA Section 501(a)(2)), HRSA may provide up to $150,000 to RMOMS program recipients to carry out activities under the RMOMS focus area \"leveraging telehealth and specialty care\" for each year of the pilot program. Using its authority for the Office of Rural Health Policy within HRSA (SSA Â§711(b)(5)), HRSA may provide up to $450,000 for recipients to carry out the activities under each of the four RMOMS focus areas for the first year of the pilot program. For each of the remaining years of the pilot program, RMOMS may award recipients receive up to $650,000 to carry those activities. Each RMOMS recipient may receive up to $1.8 million per year. This funding is dependent upon the availability of appropriated funds, satisfactory recipient performance, and the interest of the federal government. RMOMS program award recipients can use funds for direct and indirect costs. In addition, recipients may use funds to cover staff travel expenses to conferences and/or technical assistance workshops. HRSA expects RMOMS program recipients to set-aside funds each year for up to two program staff members to attend a two-and-a-half day technical workshop in Washington, DC. There are no cost-sharing or matching requirements for this program. According to HRSA, the total program costs incurred by the supporting MHI satisfies a cost-sharing or matching requirement. In FY2019, HRSA awarded $9 million to the RMOMS program. The State Maternal Health Innovation (MHI) program is a maternal health program that funds up to nine cooperative agreements for state-focused demonstration projects, with the goal of improving U.S. maternal health outcomes. State MHI award recipients are to establish demonstration projects within a state or group of states. The demonstration projects are responsible for converting recommendations on SMM and maternal mortality into actionable items that can be implemented by the states or groups of states. Recommendationsâsuch as providing maternal women with continuous team-based support, improving quality of maternity health care services, and engaging in productive collaborationsâderive from HRSA's Maternal Mortality Summit, held in June 2018. State MHI program recipients are required to collaborate with other HRSA program awardees of programs such as AIM, the Healthy Start Program (Healthy Start), and Maternal, Infant, and Early Childhood Home Visiting (MIECHV) programs in their state. The FY2019 State MHI program has a five-year performance period, September 30, 2019, through September 29, 2024. Each state-focused demonstration project undertakes three core functions: (1) establishing a state-focused Maternal Health Task Force, (2) improving state-level maternal health data and surveillance, and (3) promoting and executing innovation in maternal health service delivery. Each State MHI award recipient is responsible for establishing, and each state-focused demonstration project operates through, a state-focused Maternal Health Task Force (Task Force). The Task Force comprises multidisciplinary stakeholders, including representatives from the state legislature and local public health professionals from state and federal programs, such as the State Department of Health and MCH Services Block Grant Program (Title V). The Task Force is responsible for carrying out two main objectives. First, the Task Force is responsible for identifying maternal health-related gaps at the state level. Examples of such gaps include a state's limited ability to monitor maternal health outcomes and the access barriers that women experience when accessing quality prenatal and maternity care services. Second, the Task Force is responsible for creating and implementing a maternal health strategic plan. The strategic plan must include the maternal health care activities outlined in the most recent State Title V Needs Assessment of each state or group of states. However, state-focused demonstration projects are encouraged not to duplicate the maternal mortality-related activities of the MCH Services Block Grant program. State MHI award recipients must develop their strategic plans by September 29, 2020, and update the plans by including additional actionable recommendations by September 29, 2021. Although not a core function, the Task Force is required to participate in the community of learners' sessions, which are convened by the recipient of the Supporting MHI Program. The goal of convening the community is to encourage peer-to-peer learning, including collective problem-solving and brainstorming sessions on ways the State MHI program recipients can effectively implement their program activities. Each State MHI award recipient is to aim to improve state-level data on maternal health data and surveillance through the state-focused demonstration project. To do so, the award recipient is to identify the leading factors of maternal deaths in the respective state or groups of states. A state-focused demonstration project can address the state or group of states' need for maternal health data and surveillance by conducting at least one of three activities. The demonstration project can coordinate with another state-focused initiative to collect, analyze, and report maternal morbidity and mortality data. The demonstration project may also coordinate with a multidisciplinary state-focused maternal mortality review committee (MMRC). An MMRC is a multidisciplinary team composed of maternal clinical health experts. Generally, an MMRC team researches and makes recommendations on maternal mortality-related issues such as racial maternal health disparities. In addition, the demonstration project can analyze valid and reliable data on U.S. maternal health outcomes. For example, the goal of the analysis is to determine the preventability of certain maternal deaths and to establish best practices on how to prevent future deaths. The demonstration project can also publish an annual report on maternal death that includes a discussion on how to prevent such deaths from a policy standpoint. Each State MHI award recipient is to promote and execute innovation in maternal health service delivery, for example, by implementing strategies to address gaps in the delivery of maternal health care. State-focused demonstration projects can implement innovative strategies by conducting at least one of the following three activities: (1) identifying critical gaps in access to comprehensive, continuous, and high-quality maternal health care services; (2) identifying critical gaps in maternal health workforce needs; and (3) identifying critical gaps in comprehensive postpartum and interconception care interventions. For example, a state-focused demonstration project can assist state birthing facilities with implementing and adopting AIM maternal safety bundles, address access to maternal health care by convening a state advisory panel on innovation payment models for maternal care, address maternal health workforce needs by identifying legislative mandates that affect maternal women accessing maternal health care services, and address comprehensive postpartum and interconception care intervention by disseminating patient educational information on preventing obstetric emergencies. HRSA encourages award recipients to include the use of telehealth as a component of their demonstration projects. The Supporting MHI program recipient hosts the web-based platform, which the State MHI program recipients use to consolidate their work. In addition, the Supporting MHI recipient plans, hosts, and facilitates the annual in-person meetings for State MHI award recipients. Domestic public and private entities are eligible to apply for the State MHI Program. Eligibility extends to tribes, tribal organizations, community-based organizations, and faith-based organizations. State MHI Program award recipients are required to provide HRSA with annual progress reports, performance reports, and a final report narrative. By September 29, 2020, award recipients must submit annual reports on the maternal deaths and ways to prevent future maternal deaths in the state. Award recipients must include data in their reports that HRSA can measure under the State Title V Needs Assessment. By that same date, according to HRSA, the award recipients must report the following two sets of performance data to the agency: 1. Increases within the state from baseline on September 30, 2019, for the following: percentage of women covered by health insurance, percentage of women who receive an annual well-woman visit, percentage of pregnant women who receive prenatal care, percentage of pregnant women who receive prenatal care in the first trimester, percentage of pregnant women who receive a postpartum visit, and percentage of women screened for perinatal depression. 2. Decreases within the state from baseline on September 30, 2019, for the following: rate of pregnancy-related deaths, and racial, ethnic, and/or geographic disparities in pregnancy-related mortality rates. The Supporting MHI award recipient is required to help the State MHI award recipients achieve their performance milestones. The performance reports examine measures such as quality improvement, state capacity for advancing the health of maternal and child health populations, prenatal care, well-woman visit/preventive care, and adequate health insurance coverage. The final performance report must include the project's abstract, expenditure data for the final year of the period of performance, and the final scores for the performance measures. Each State MHI award recipient must submit its final report narrative to HRSA at the end of the project. HRSA may annually allocate approximately $18,650,000 to fund up to nine cooperative agreements under the State MHI program. This funding is dependent upon the availability of appropriated funds, satisfactory recipient performance, and the interest of the federal government. In FY2019, the awards ranged from $1.9 million to $2.1 million. State MHI program award recipients can use funds to address state and local priorities. There are no cost-sharing or matching requirements for this program. The Supporting Maternal Health Innovation (MHI) program funds up to one cooperative agreement to help states, stakeholders, and recipients of HRSA-administered awards reduce and prevent U.S. cases of SMM and maternal mortality, and improve U.S. maternal health outcomes. States and stakeholders include state health agencies, community-based organizations, and pregnant and postpartum women and their families. HRSA recipients include those of the initial AIM program, AIMâCommunity Care Initiative, Healthy Start, and MCH Services Block Grant program. Supporting MHI program award recipients aim to achieve the following three program objectives by calendar year 2024: Ensure that 75% of HRSA award recipients report improvement in their ability to implement evidence-informed strategies, with the goal of reducing and preventing maternal morbidity and mortality. Support the State MHI program by ensuring that 75% of HRSA award recipients that aim to improve maternal health outcomes can access the peer-to-peer learning opportunities and resources available through the State MHI program. Support the AIMâCommunity Care Initiative by (1) increasing the dissemination of resource materials to support the adoption of nonhospital-focused maternal safety bundles, and (2) increasing the dissemination of evidence-informed strategies in communities that experience disparities in U.S. maternal morbidity and mortality. The FY2019 Supporting MHI program has a five-year performance period, September 30, 2019, through September 29, 2024. The State MHI program funds a single project that undertakes two core functions: (1) providing capacity-building assistance, and (2) establishing a national resource center. The Supporting MHI project provides capacity-building assistance to the state-focused demonstration projects under the State MHI program and to the recipients under the RMOMS program. In this context, capacity-building assistance refers to technical assistance, training, and dissemination of information. The Supporting MHI program grantee provides the State MHI program and the RMOMS program with technical assistance in the form of programmatic, scientific, and mentoring support. Both programs receive training assistance to develop and deliver curricula. The programs also receive support to disseminate evidence-informed strategies to communities that experience disparities in U.S. maternal morbidity and mortality. The Supporting MHI recipient is to provide capacity-building assistance on 10 topic areas, listed below. The Supporting MHI program award recipient is to gather the community of learners for the State MHI program recipients. The goal of convening the community of learners is to encourage peer-to-peer learning, including collective problem-solving and brainstorming sessions on ways the State MHI program recipients can effectively implement program activities. In addition, the Supporting MHI program recipient is to help the State MHI program recipients assess their progress in meeting program goals and planning and facilitating annual in-person meetings for the recipients. The Supporting MHI program recipient is responsible for establishing a national resource center where states, HRSA award recipients, and key stakeholders can access guidance on reducing and preventing U.S. cases of SMM and maternal mortality. The resource center offers assistance with trainings/technical issues, partnership building, policy analysis, and dissemination of information. Trainings and technical assistance are provided to stakeholders and HRSA award recipients on topic areas similar to the 10 topic areas described above. HRSA award recipients under this program may include grantees of Healthy Start, the MIECHV program, and the MCH Services Block Grant program. The Supporting MHI program recipient, through the resource center, would collaborate with stakeholders that serve underserved populations to encourage partnership building. Key stakeholders and HRSA award recipients may reach out to the resource center for assistance with developing partnerships with national maternal health organizations (e.g., ACOG, the Association of Women's Health, Black Mamas Matter Alliance, Society for Maternal Fetal Medicine, and Telehealth Resource Centers). The resource center offers policy analysis assistance to stakeholders and HRSA award recipients. For example, the AIMâCommunity Care Initiative award recipient can receive assistance in determining whether any of the nonhospital maternal safety bundles are evidence-informed and could reduce U.S. cases of SMM and maternal mortality. In addition, the resource center develops and maintain a public-facing web-based clearinghouse where key stakeholders can access pertinent resources, such as training materials and evidence-informed practices. The website must have the capability to host the State MHI program recipient's online platform. The Supporting MHI program is also responsible for creating and implementing national guidance on reducing U.S. cases of maternal morbidity and mortality. Education and training are the foci of the national guidance. The national guidance provides learning opportunities to key stakeholders on the following nine topic areas: The national guidance is intended to help key stakeholders with related activities, such as creating tools for collaborations, disseminating information about the project, and providing culturally competent technical assistance to key stakeholders that provide maternal health services to populations that experience disparities in U.S. maternal morbidity and mortality. Domestic public and private entities are eligible to apply for the Supporting MHI Program. Eligibility extends to tribes, tribal organizations, community-based organizations, and faith-based organizations. Eligible applicants must be aware of the different HRSA award recipients that address U.S. maternal health outcomes. The Supporting MHI Program awardee is required to provide HRSA with annual progress reports, performance reports, and a final report narrative. By 2024, according to HRSA, the award recipient must submit annual reports on progress made toward achieving the three program objectives listed under the \" Supporting Maternal Health Innovation (MHI)Â Program \" section in this report. The performance reports must examine measures such as technical assistance, health equity in maternal health outcomes, state capacity for advancing the health of maternal and child health populations, perinatal and postpartum care, depression screening, and adequate health insurance coverage. The final performance report must include the project's abstract, expenditure data for the final year of the performance period, and the final scores for the performance measures. Each State MHI awardee must submit its final report narrative to HRSA within 90 days from the end of the performance period. HRSA may annually award approximately $2.6 million to the sole recipient, as the agency did in FY2019. This funding is dependent upon the availability of appropriated funds, satisfactory recipient performance, and the interest of the federal government. The Supporting MHI program recipient can use the funds for administrative and facility costs. There are no cost-sharing or matching requirements for this program. According to HRSA, the total program costs incurred by the Supporting MHI satisfies a cost-sharing or matching requirement. ", "summary": "The Health Resources and Services Administration (HRSA) of the Department of Health and Human Services (HHS) is one of the federal agencies charged with addressing U.S. maternal health outcomes. HRSA's Improving Maternal Health in America initiative aims to address U.S. maternal health issues by, among other approaches, improving maternal health data, increasing maternal health research, and prioritizing quality improvement in maternal health care services. The FY2019 appropriations report language for the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019, and Continuing Appropriations Act, 2019 ( P.L. 115-245 ), reserved $26 million within the Special Projects for Regional and National Significance (SPRANS) program for, among other things, the Alliance for Innovation on Maternal Health (AIM) program and the establishment of new maternal health programs under HRSA. Using the SPRANS authority, HRSA established four new maternal health programs designed to improve maternal health outcomes and to prevent and reduce U.S. cases of maternal mortality and severe maternal morbidity (SMM) . SMM refers to medical conditions that adversely affect the maternal health care outcome of labor and delivery, resulting in either short-term or long-term consequences for pregnant and postpartum women. For FY2019, HRSA made awards under each of the four programs, via cooperative agreements, in which HRSA provided financial assistance to the recipients and is involved in program activities. The recipients of awards made under the previously existing AIM program and each of the four new maternal health programs must collaborate with each other. Previously Existing Maternal Health Program: Alliance for Innovation on Maternal Health (AIM). This five-year maternal health program funds a single project that promotes the adoption and implementation of hospital-focused maternal safety bundles (evidence-based practices) for health care providers in birthing facilities and hospitals. Maternal Health Program 1: Alliance for Inn ovation on Maternal Health (AIMâ Community Care Initiative ) . This five-year maternal health program funds a single project that expands upon the work of the initial AIM program. The program award recipient supports the development, adoption, and implementation of nonhospital maternal safety bundles for health care providers in community-based organizations and outpatient settings. Maternal Health Program 2: Rural Maternity and Obstetrics Management Strategies (RMOMS) Program. This four-year maternal health pilot program funds the development, testing, and implementation of service models, with the goal of improving access to, and continuity of, maternal and obstetrics care in rural communities. Program award recipients create strategies to address each of the following four RMOMS focus areas: (1) rural hospital obstetric service aggregation, (2) network approach to coordinating a continuum of care, (3) leveraging telehealth and specialty care, and (4) financial sustainability. Maternal Health Program 3: State Maternal Health Innovation (MHI) Program. This five-year maternal health program funds state-focused demonstration projects, with the goal of improving U.S. maternal health outcomes. State-focused demonstration projects undertake three core functions: (1) establishing a state-focused Maternal Health Task Force, (2) improving state-level maternal health data and surveillance, and (3) promoting and implementing innovations in the health care delivery of maternal health care services. Maternal Health Program 4: Supporting Maternal Health Innovation (MHI) Program. This five-year maternal health program aims to support states, key stakeholders, and recipients of HRSA-administered awards, with the goal of reducing and preventing U.S. cases of SMM and maternal mortality, and improving U.S. maternal health outcomes. For example, the Supporting MHI program provides capacity-building assistance to the state-focused demonstration projects under the State MHI program and to RMOMS program recipients. In addition, the Supporting MHI program is expected to establish a national resource center designed to help the AIMâCommunity Care Initiative recipient determine whether any of the nonhospital maternal safety bundles are evidence-informed and could reduce U.S. SMM and maternal mortality. To assist Congress as it considers measures on U.S. maternal health, this report provides an overview and the funding history of the five maternal health programs that HRSA administers. For each of the five maternal health programs, the report provides an overview of the program, discusses the main core activities and functions of the program, provides the program's criteria of eligibility and reporting requirements, and discusses the program's funding allocations.", "document_type": "crs"}
{"report": "The purpose of this report is to provide information and analysis for Congress on Afghanistan and the nearly two-decade U.S. project there. Topics covered include U.S. military engagement and security dynamics; the regional context; reconciliation efforts; Afghan politics and governance; foreign assistance; and social and economic development. Supplementary materials, including a historical timeline and background on the Soviet war in Afghanistan, are included as appendices. This information is meant to provide background and context for lawmakers as they consider administration budget requests, oversee U.S. military operations and aid programs, and examine the U.S. role in South Asia and the world. For a more frequently updated treatment of current events in Afghanistan and developments in U.S. policy, refer to CRS Report R45122, Afghanistan: Background and U.S. Policy In Brief , by Clayton Thomas. The U.S. and Afghan governments, along with partner countries, remain engaged in combat with a robust Taliban-led insurgency. While U.S. military officials maintain that Afghan forces are \"resilient\" against the Taliban, by some measures insurgents are in control of or contesting more territory today than at any time since 2001. The conflict also involves an array of other armed groups, including active affiliates of both Al Qaeda (AQ) and the Islamic State (IS, also known as ISIS, ISIL, or by the Arabic acronym Da'esh ). Since early 2015, the North Atlantic Treaty Organization (NATO)-led mission in Afghanistan, known as \"Resolute Support Mission\" (RSM), has focused on training, advising, and assisting Afghan government forces. Combat operations by U.S. counterterrorism forces, along with some partner forces, have increased since 2017. These two \"complementary missions\" make up Operation Freedom's Sentinel (OFS). Simultaneously, the United States is engaged in a diplomatic effort to end the war, most notably through direct talks with Taliban representatives (a reversal of previous U.S. policy). In January 2019, U.S. and Taliban negotiators reached a draft framework, in which the Taliban would prohibit terrorist groups from operating on Afghan soil in return for the eventual withdrawal of U.S. forces, though lead U.S. envoy Zalmay Khalilzad insists that \"nothing is agreed until everything is agreed.\" As of July 2019, negotiations do not directly involve representatives of the Afghan government, leading some Afghans to worry that the United States will prioritize a military withdrawal over a complex political settlement that preserves some of the social, political, and humanitarian gains made since 2001. A major complicating factor underlying the negotiations is the unsettled state of Afghan politics; Afghanistan held inconclusive parliamentary elections in October 2018 and the presidential election, originally scheduled for April 2019, has been postponed until September 2019. The Afghan government has made some notable progress in reducing corruption and implementing its budgetary commitments, but faces domestic criticism for its failure to guarantee security and prevent insurgent gains. The United States has spent more than $132 billion in various forms of reconstruction aid to Afghanistan over the past decade and a half, from building up and sustaining the Afghan National Defense and Security Forces (ANDSF) to economic development. This assistance has increased Afghan government capacity, but prospects for stability in Afghanistan still appear distant. Some U.S. policymakers hope that the country's largely underdeveloped natural resources and geographic position at the crossroads of future global trade routes might improve the economic life of the country, and, by extension, its social and political dynamics. Nevertheless, in light of the ongoing hostilities Afghanistan's economic and political prospects remain uncertain at best. On September 11, 2001, the United States suffered a series of coordinated terrorist attacks executed by the Islamist terrorist group Al Qaeda. Al Qaeda leadership was based in Afghanistan and protected by the Taliban government that ruled most of that country (see textbox below). U.S. President George W. Bush articulated a policy that equated those who harbor terrorists with terrorists themselves, and asserted that a friendly regime in Kabul was needed to enable U.S. forces to search for Al Qaeda members there. On September 14, 2001, in Congress, S.J.Res. 23 ( P.L. 107-40 ), passed 98-0 in the Senate and with no objections in the House, authorized the use of military force, stating that: [t]he President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001 or harbored such organizations or persons in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons. The Administration also sought United Nations (U.N.) backing for military action. On September 12, 2001, the U.N. passed Security Council Resolution 1368, expressing the Council's \"readiness to take all necessary steps to respond to the September 11 attacks.\" When the Taliban refused the Bush Administration's demand to extradite Al Qaeda leader Osama bin Laden, the Administration launched military operations against the Taliban to \"disrupt the use of Afghanistan as a terrorist base of operations, and to attack the military capability of the Taliban regime.\" Combat operations in Afghanistan began on October 7, 2001, with the launch of Operation Enduring Freedom (OEF). Initial military operations initially consisted primarily of U.S. air strikes on Taliban and Al Qaeda forces, facilitated by the cooperation between reported small numbers (about 1,000) of U.S. special operations forces and Central Intelligence Agency operatives. The purpose of these operations was to help Afghan forces opposed to the Taliban (led by an armed coalition known as the Northern Alliance) advance by directing U.S. air strikes on Taliban positions. In October 2001, about 1,300 Marines were deployed to pressure the Taliban in the southern province of Kandahar, but there were few pitched U.S.-Taliban battles. Northern Alliance forcesâdespite promises that they would not enter Kabulâdid so on November 12, 2001, to widespread popular approval. The Taliban subsequently lost the south and east to U.S.-supported Pashtun leaders, including Hamid Karzai. The Taliban regime ended on December 9, 2001, when Taliban head Mullah Omar and other leaders fled Kandahar, leaving it under tribal law. A provisional government was set up (see \" Constitution and Political System ,\" below) and on May 1, 2003, U.S. officials declared an end to \"major combat.\" From 2003 to mid-2006, U.S. and international troops (as part of the U.N.-mandated and NATO-led International Security Assistance Force, ISAF) trained nascent Afghan forces and fought relatively low levels of insurgent violence with focused combat operations mainly in the south and east. By late 2005, U.S. and partner commanders considered the insurgency mostly defeated and NATO assumed lead responsibility for security in all of Afghanistan during 2005-2006. Those optimistic assessments proved misplaced when violence increased in mid-2006. NATO-led operations during 2006-2008 cleared Taliban fighters from some areas but did not prevent subsequent reinfiltration by the Taliban, nor did preemptive combat and increased development work produce durable success. Taking into account the deterioration of the security situation, the United States and its partners decided to increase force levels. Upon taking office, the Obama Administration declared that the Afghanistan mission was a high priority, but that the U.S. level of effort there would eventually need to be reduced. The Administration convened a 60-day inter-agency \"strategy review,\" chaired by former CIA analyst Bruce Riedel and co-chaired by then-Special Representative for Afghanistan and Pakistan Richard Holbrooke and then-Under Secretary of Defense for Policy Michele Flournoy. In response to that review, President Barack Obama announced a \"comprehensive\" strategy on March 27, 2009, that would require the deployment of an additional 21,000 U.S. forces. In June 2009, U.S. Army General Stanley McChrystal, who headed U.S. Special Operations forces from 2003 to 2008, became the top U.S. and NATO commander in Afghanistan. In August 2009, General McChrystal delivered a strategy assessment recommending that the goal of the U.S. military should be to protect the population rather than to search out and combat concentrations of Taliban fighters, warning of the potential for \"mission failure\" in the absence of a fully resourced, comprehensive counterinsurgency strategy. His assessment stated that about 44,000 additional U.S. combat troops would be needed to provide the greatest chance for success. The assessment set off debate within the Administration and launched another policy review. Some senior U.S. officials argued that adding many more U.S. forces could produce a potentially counterproductive sense of U.S. occupation. President Obama announced the following at West Point on December 1, 2009: 30,000 additional U.S. forces (a \"surge\") would be sent to \"reverse the Taliban's momentum\" and strengthen the Afghan National Defense and Security Forces (ANDSF); and beginning in July 2011, there would be a transition to Afghan security leadership and a corresponding drawdown of U.S. forces. The troop surge brought U.S. force levels to 100,000, with most of the additional forces deployed to the south. When the surge was announced, the Afghan Interior Ministry estimated that insurgents controlled 13 of the country's 356 districts and posed a \"high-risk\" to another 133. The Taliban had named \"shadow governors\" in 33 out of 34 of Afghanistan's provinces, although some were merely symbolic. Operations by U.S., NATO, and Afghan forces throughout 2010 and 2011 reduced areas under Taliban control substantially and the transition to Afghan security leadership began on schedule in July 2011. In concert with the transition, and asserting that the killing of Osama bin Laden represented a key accomplishment of the core U.S. mission, President Obama announced on June 22, 2011 that: U.S. force levels would fall to 90,000 (from 100,000) by the end of 2011. U.S. force levels would drop to 68,000 by September 2012. In his February 2013 State of the Union message, President Obama announced that the U.S. force level would drop to 34,000 by February 2014, which subsequently occurred. Most partner countries drew down their forces at roughly the same rate and proportion as the U.S. drawdown, despite public pressure in some European countries to more rapidly reduce or end military involvement in Afghanistan. During 2010-2012, the Netherlands, Canada, and France ended their combat missions, but they continued to train the ANDSF until the end of 2014. On June 18, 2013, NATO and Afghanistan announced that Afghan forces were now taking the lead on security throughout all of Afghanistan. As international forces were reduced in 2014, Afghan and international officials expressed uncertainty about U.S. and partner plans for the post-2014 period. On May 27, 2014, President Obama clarified Administration plans by announcing the size of the post-2014 U.S. force and plan for a U.S. military exit according to the following timeline: The U.S. military contingent in Afghanistan would be 9,800 in 2015, deployed in various parts of Afghanistan, consisting mostly of trainers in the NATO-led \"Resolute Support Mission\" (RSM). The U.S. force would decline to about 5,000 by the end of 2016 and consolidate in Kabul and at Bagram Airfield. After 2016, the U.S. military presence would be consistent with normal security relations with Afghanistan (about 1,000 military personnel) under U.S. Embassy authority (without a separate military chain of command in country). Their mission would be to protect U.S. installations, process Foreign Military Sales (FMS) of weaponry to Afghanistan, and train the Afghans on that weaponry. During 2014, the United States and its partners prepared for the end of the ISAF mission. U.S. airpower in country was reduced, ISAF turned over the vast majority of about 800 bases to the ANDSF, and the provincial reconstruction teams (PRTs) were turned over to Afghan institutions. On May 1, 2012, President Obama and then-President Hamid Karzai signed an Enduring Strategic Partnership Agreemen t (SPA) between Afghanistan and the United States. The signing followed a long negotiation that focused on resolving Afghan insistence on control over detention centers and a halt to or control over nighttime raids on insurgents by U.S. forces. In addition to provisions designating Afghanistan as a Major Non-NATO Ally, the agreement committed the two countries to negotiating a Bilateral Security Agreement (BSA ) that would detail the terms of U.S. engagement in Afghanistan. The BSA was approved by a loya jirga (consultative assembly) called by then-President Karzai in November 2013, though he then refused to sign; the agreement was eventually signed by President Ashraf Ghani as one of his first acts after taking office in September 2014. The BSA was considered as an executive agreement was not submitted for congressional approval. The BSA governs the United States' post-2014 presence in Afghanistan through the end of 2024 \"and beyond\" unless terminated by mutual written agreement or by either country with two years' written notice. The agreement does not set (or otherwise refer to) U.S. and partner force levels, but lays out the parameters and goals of the U.S. military mission and provides for U.S. access to Afghan bases. The BSA also stipulates that \"the United States shall have the exclusive right to exercise jurisdiction over such [U.S.] persons in respect of any criminal or civil offenses committed in the territory of Afghanistan.\" The BSA does not commit the United States to defend Afghanistan from attack from another country, but states that \"the United States shall regard with grave concern any external aggression or threat\" thereof. Some Afghan figures, including Karzai (who remains active in Afghan politics), advocate revising the BSA, but such efforts do not appear to have the support of the current Afghan government. The NATO-led ISAF ended at the close of 2014, and was replaced by Resolute Support Mission (RSM) on January 1, 2015. The legal framework for NATO's presence is based on a Status of Forces Agreement signed between the Afghan government and NATO in September 2014 and ratified by the Afghan parliament in November 2014. That agreement defines RSM as a \"non-combat training, advising and assistance mission,\" though combat operations by some U.S. forces, in support of Afghan forces, continue. Concerns about Taliban gains after 2015 led to several changes to the U.S. mission in the final two years of the Obama Administration. On March 24, 2015, in concert with the visit to Washington, DC of President Ghani and Chief Executive Officer Abdullah Abdullah, President Obama announced that U.S. forces would remain at a level of about 9,800 for all of 2015, rather than being reduced to 5,500 by the end of the year, as originally announced. In January 2016, the Obama Administration authorized U.S. commanders in Afghanistan to attack the local Islamic State affiliate, Islamic State-Khorasan Province (ISKP, more below) forces. In June 2016, President Obama authorized U.S. forces to conduct preemptive combat. According to then-Secretary of Defense Ashton Carter on July 12, 2016, U.S. forces were enabled to \"anticipate battlefield dynamics and ... deploy and employ their forces together [with the ANDSF] in a way that stops a situation from deteriorating [or] interrupts an enemy in the early stages of planning and formulating an attack.\" On July 6, 2016, President Obama again adjusted planned U.S. force levels, stating that the level would drop to 8,400 at the end of 2016, rather than to the 5,500 that was previously announced. The communique of the NATO summit in Warsaw, Poland (July 8-9, 2016), announced that other NATO countries would continue to support RSM beyond 2016, both with force contributions and donations to the ANDSF (the latter until 2020). No force or budget levels were specified in the declaration. In a national address on August 21, 2017, President Donald Trump announced a \"new strategy\" for Afghanistan and South Asia. Despite expectations that he would describe specific elements of his new strategy, particularly the prospects for additional troops, President Trump declared \"we will not talk about numbers of troops or our plans for further military activities.\" Some policymakers characterized the strategy as \"short on details\" and serving \"only to perpetuate a dangerous status quo.\" Others welcomed the decision, contrasting it favorably with proposed alternatives such as a full withdrawal of U.S. forces (which President Trump conceded was his \"original instinct\") or heavy reliance on contractors. Beyond additional troops, the strategy also gave broader authority for U.S. forces to operate independently of Afghan forces and \"attack the enemy across the breadth and depth of the battle space,\" expanding the list of targets to include those related to \"revenue streams, support infrastructure, training bases, [and] infiltration lanes.\" This was exercised in a series of operations, beginning in fall 2017, against Taliban drug labs. These operations, often highlighted by U.S. officials, sought to degrade what is widely viewed as one of the Taliban's most important sources of revenue, namely the cultivation, production, and trafficking of narcotics. Some analysts have questioned the impact of these strikes, which ended in late 2018. Decades of instability, civil war, and weak central government control have contributed to the existence of a complex web of militant groups in Afghanistan. While the Taliban are by far the largest and best-organized, they operate alongside (and sometimes in competition with) other armed groups, including regional affiliates of both the Islamic State and Al Qaeda. While U.S. commanders have asserted that the ANDSF performs well despite taking heavy casualties, Taliban forces have retained, and by some measures are increasing, their ability to contest and hold territory and to launch high-profile attacks. U.S. officials often have emphasized the Taliban's failure to capture a provincial capital since their week-long seizure of Kunduz city in northern Afghanistan in September 2015, but Taliban militants briefly overran two capitals, Farah and Ghazni, in May and August 2018, respectively. Then-Secretary of Defense James Mattis described the Taliban assault on Ghazni, which left hundreds dead, as a failure for the Taliban, saying \"every time they take [a city] ... they're unable to hold it.\" Since at least early 2017, U.S. military officials have stated that the conflict is \"largely stalemated.\" Arguably complicating that assessment, the extent of territory controlled or contested by the Taliban has generally grown since 2016 by most measures (see Figure 3 ). In November 2015, the Special Inspector General for Afghanistan Reconstruction (SIGAR) began publishing in its quarterly reports a district-level assessment of stability in Afghanistan produced by the U.S. military. This assessment estimated the extent of Taliban control and influence in terms of both territory and population, and was typically accompanied by charts portraying those trends over time as well as a color-coded map of control/influence by district (see Figure 4 ). That data showed a gradual increase in the share of Afghan districts controlled, influenced, or contested by insurgents (46% as of October 2018, the last month such data was evidently collected, compared to 28% in November 2015). According to SIGAR's April 30, 2019 quarterly report, the U.S. military is \"no longer producing its district-level stability assessments of Afghan government and insurgent control and influence.\" SIGAR reports that it was told by the U.S. military that the assessment is no longer being produced because it \"was of limited decision-making value to the [U.S.] Commander.\" The Taliban have demonstrated considerable, and some observers would argue growing, tactical capabilities. Due to the high levels of casualties inflicted by the Taliban, the Trump Administration has reportedly urged Afghan forces to pull out of some isolated outposts and rural areas. Reports indicate that ANDSF fatalities have averaged 30-40 a day in recent months, and President Ghani confirmed in November 2018 that Afghan forces had suffered more than 28,000 fatalities since 2015. So-called \"green on blue\" attacks (insider attacks on U.S. and coalition forces by Afghan nationals) are a sporadic, but persistent, problemâseveral U.S. servicemen died in such attacks in 2018, as did 85 Afghan soldiers. In October 2018, General Miller was present at an attack inside the Kandahar governor's compound by a Taliban infiltrator who killed a number of provincial officials, including the powerful police chief Abdul Raziq; Miller was unhurt but another U.S. general was wounded. The May 2016 death of then-Taliban head Mullah Mansour in a U.S. drone strike demonstrated Taliban vulnerabilities to U.S. intelligence and combat capabilities, although his death did not appear to have a measurable effect on Taliban effectiveness; it is unclear to what extent current leader Haibatullah Akhundzada exercises effective control over the group and how he is viewed within its ranks. Founded by Jalaluddin Haqqani, a mujahideen commander and U.S. ally during the war against the Soviet occupation, the Haqqani Network is a semiautonomous wing of the Afghan Taliban. As such, it has been cited by U.S. officials as a potent threat to U.S. and allied forces and interests, as well as a \"critical enabler of Al Qaeda.\" Jalaluddin Haqqani served as a minister in the Taliban regime, and after 2001 reestablished a presence in the Pakistani tribal territory of North Waziristan. By 2006, he was credited as \"the architect of the Taliban's current attacks on U.S. and coalition forces in Afghanistan.\" Within a few years, Jalaluddin's son Sirajuddin took over the group's operations, becoming increasingly influential in setting overall insurgency strategy, and was selected as deputy leader of the Taliban in 2015. The Taliban announced the death of Jalaluddin, who reportedly had been ill for years, in September 2018. The Haqqani network is blamed for a number of major attacks, including a devastating May 2017 bombing in Kabul's diplomatic district that left over 150 dead and sparked violent protests against the government. The Haqqani network has historically targeted Indian interests in Afghanistan, reinforcing perceptions by some observers and officials that the group often acts as a tool of Pakistani foreign policy. In September 2011, then-Chairman of the Joint Chiefs of Staff Michael Mullen testified in front of the Senate Armed Services Committee that the Haqqani network acts \"as a veritable arm\" of Pakistan's main intelligence agency, the Inter-Services Intelligence Directorate (ISI). Additionally, it reportedly holds captive two professors (Timothy Weeks, an Australian, and American citizen Kevin King, who is reportedly seriously ill) kidnapped from the American University of Afghanistan in August 2016; and a journalist (Paul Overby) seized in 2014 after crossing into Afghanistan to try to interview the Haqqani leadership. The faction's participation in a political settlement potentially could be complicated by its designation as a Foreign Terrorist Organization (FTO) under the Immigration and Naturalization Act. That designation was made on September 9, 2012, after the 112 th Congress enacted S. 1959 (Haqqani Network Terrorist Designation Act of 2012, P.L. 112-168 ), requiring an Administration report on whether the group met the criteria for FTO designation. Beyond the Taliban, a significant share of U.S. operations are aimed at the local Islamic State affiliate, known as Islamic State-Khorasan Province (ISKP, also known as ISIS-K), although experts debate the degree of threat the group poses. ISKP (also referred to as ISIS-K) has been active in Afghanistan since mid-2014. ISKP was named as an FTO by the State Department on January 14, 2016. The group's presence in Afghanistan crystallized from several small Afghan Taliban and other militant factions that announced affiliation with the organization in 2013; ISKP presence grew further as additional Taliban factions defected to the group and captured some small areas primarily in eastern Afghanistan. ISKP has reportedly received financial assistance from the core organization formerly located in the self-declared \"caliphate\" in parts of Iraq and Syria. Estimates of the number of ISKP fighters generally range from 1,000 to 3,000. To address the ISKP threat, U.S. commanders have had authorization since December 2015 to combat ISKP fighters by virtue of their affiliation with the Islamic State, whether or not these fighters pose an immediate threat to U.S. and allied forces. U.S. operations have repeatedly targeted the group's leaders, with three killed in less than a year: Hafiz Saeed Khan died in a July 2016 U.S. airstrike and successors Abdul Hasib and Abu Sayed were killed in April and July 2017, respectively. ISKP has survived these leadership losses and appears to be a growing factor in U.S. and Afghan strategic planning. ISKP was the target of the much publicized April 2017 use of a GBU-43 (also known as a Massive Ordnance Air Blast, or MOAB), reportedly the first such use of the weapon in combat. A number of U.S. military, as well as CIA personnel, have been killed in anti-ISKP operations. ISKP and Taliban forces have sometimes fought over control of territory or because of political or other differences. In April 2018, a U.S. air strike killed the ISKP leader (himself a former Taliban commander) in northern Afghanistan, Qari Hekmatullah. NATO described neighboring Jowzjan province as \"the main conduit for external support and foreign fighters from Central Asian states into Afghanistan.\" ISKP also has claimed responsibility for a number of large-scale attacks, many targeting Afghanistan's Shia minority. ISKP is also reported to have ambitions beyond Afghanistan; an unnamed U.S. intelligence officials was quoted in June 2019 as saying that, absent sustained counterterrorism pressure, \"Afghanistan's IS affiliate will be able to carry out a large-scale attack in the U.S. or Europe within the next year.\" While the Al Qaeda attacks of September 11 precipitated U.S. military operations in Afghanistan, the group has been a relatively minor player on the Afghan battlefield since. However, the relationship between Al Qaeda and the Taliban has important implications for U.S.-Taliban negotiations and a potential settlement. From 2001 until 2015, Al Qaeda was considered by U.S. officials to have only a minimal presence (fewer than 100 members) within Afghanistan, operating mostly as a facilitator for insurgent groups and mainly in the northeast. However, in late 2015 U.S. Special Operations forces and their ANDSF partners discovered and destroyed a large Al Qaeda training camp in Kandahar Provinceâa discovery suggesting a stronger Al Qaeda presence in Afghanistan than had been generally understood. In April 2016, U.S. commanders publicly raised their estimates of Al Qaeda fighters in Afghanistan to 100-300, and said that relations between Al Qaeda and the Taliban had become increasingly close; Afghan estimates are generally higher. The United Nations reports that Al Qaeda, while degraded in Afghanistan and facing competition from ISKP, \"remains a longer-term threat.\" U.S. efforts to find remaining senior Al Qaeda leaders reportedly focus on bin Laden's successor Ayman al-Zawahiri, who is presumed to be on the Pakistani side of the border. While most successful U.S. strikes on high-ranking Al Qaeda operatives have taken place in Pakistan, several have been killed in Afghanistan in recent years, including operative Abu Bara Al Kuwaiti (October 2014, in Nangarhar Province); and Al Qaeda's commander for northeastern Afghanistan, Faruq Qahtani (October 2016). Al Qaeda is allied with the Taliban; bin Laden pledged allegiance to Taliban founder Mullah Omar and bin Laden successor Ayman al Zawahiri has done the same with Omar's two successors, in turn. According to a January 2019 U.N. report, Al Qaeda \"continues to see Afghanistan as a safe haven for its leadership, based on its long-standing, strong ties with the Taliban.\" Some observers have noted operational cooperation between Al Qaeda and the Taliban, particularly in the east, in recent years. The AQ-Taliban alliance may complicate U.S. demands that the Taliban foreswear support for terrorism as part of a potential U.S. troop withdrawal deal; some analysts have recommended that \"as part of any final deal, the Taliban should be required to state, in no uncertain terms, its official position\" on Al Qaeda. Al Qaeda in the Indian Subcontinent (AQIS) is an affiliate of Al Qaeda based in and including members from various terrorist groups in South and Central Asia. Zawahiri announced the group's formation in 2014. In June 2016, the State Department designated the group as an FTO and its leader, Asim Umar, as a specially designated global terrorist. The large terrorist training camp found in Kandahar in 2015 was attributed by U.S. military officials to AQIS. The primary objective of the post-2015 NATO-led Resolute Support Mission in Afghanistan is training, advising, and assisting the Afghan National Defense and Security Forces (ANDSF) in their struggle against the Taliban and other armed groups. Funding the ANDSF costs an estimated $6 billion per year, of which the U.S. has provided about $4.5 billion in recent years. At the NATO summit in Warsaw in July 2016, U.S. partners pledged $1 billion annually for the ANDSF during 2017-2020. U.S. officials assess that Afghanistan is contributing its pledged fundsâ$500 million (as calculated in Afghan currency)âdespite budgetary difficulties. At the 2012 NATO summit in Chicago, Afghanistan agreed to assume full financial responsibility for the ANDSF by 2024, though current security dynamics and economic trends make that unlikely. The Department of Defense (DOD), SIGAR, and others have reported on deficiencies of the ANDSF, citing challenges such as absenteeism, high casualties, illiteracy, inconsistent leadership, and a deficit of logistical capabilities, such as airlift, medical evacuation, resupply, and other associated functions. ANDSF units and personnel also have been associated with credible allegations of child sexual abuse and other potential human rights abuses. A number of metrics related to ANDSF performance have been classified in recent years. In October 2017, SIGAR reported that \"in a significant development,\" U.S. officials \"classified or otherwise restricted information\" SIGAR had previously reported, such as casualty rates, personnel strength, and attrition within the ANDSF. U.S. officials have cited a request from the Afghan government as justification for the decision. Personnel figures and attrition rates for some ANDSF components have since been made available in SIGAR reports. Other public information about ANDSF capabilities is also generally not encouraging. Media reports indicate that ANDSF fatalities have averaged 30-40 a day in recent months, and President Ghani stated in January 2019 that more than 45,000 security personnel had paid \"the ultimate sacrifice\" since he took office in September 2014. Partly in response to those casualty rates, Afghan forces are reportedly shuttering small checkpoints (where the majority of successful Taliban attacks take place) in favor of larger bases in more secure territory. U.S. advisors have long advocated for such moves, although critics claim that these steps effectively cede swaths of the country to the Taliban. The major components of the ANDSF are: Afghan National Army (ANA). The Afghan National Army has been built from scratch since 2002âit is not a direct continuation of the national army that existed from the nineteenth century until the Taliban era. That army disintegrated during the 1992-1996 mujah i d ee n civil war and the 1996-2001 Taliban period. Of its authorized size of 195,000, the ANA (all components) had about 190,000 personnel as of January 2019. Its special operations component, known as the Afghan Special Security Forces (ASSF) numbers nearly 21,000. The ASSF is trained by U.S. Special Operations Forces, and U.S. commanders say it might be one of the most proficient special forces in the region. Afghan special forces are utilized extensively to reverse Taliban gains, and their efforts reportedly have reportedly made up 70% to 80% of the fighting in recent years. A December 2018 DOD report assessed that ASSF \"misuse increased to unsustainable levels\" in late 2018, saying that the ASSF's deployment for such missions as static defense operations (in lieu of the conventional ANA) undermines anti-Taliban efforts. Afghan Air Force (AAF) . Afghanistan's Air Force is emerging as a key component of the ANDSF's efforts to combat the insurgency. The AAF has been mostly a support force but, since 2014, has increased its bombing operations in support of coalition ground forces, mainly using the Brazil-made A-29 Super Tucano. The force is a carryover from the Afghan Air Force that existed prior to the Soviet invasion, though its equipment was virtually eliminated in the 2001-2002 U.S. combat against the Taliban regime. Since FY2010, the United States has appropriated about $8.4 billion for the AAF, including $1.7 billion in FY2019. Still, equipment, maintenance, logistical difficulties, and defections continue to plague the Afghan Air Force, which has about 104 aircraft including four C-130 transport planes and 46 Mi-17 (Russian-made) helicopters. DOD plans to purchase up to 159 UH-160 Black Hawk helicopters for the AAF have been complicated by shortages of Afghan engineers and pilots. Afghan National Police (ANP) . U.S. and Afghan officials believe that a credible and capable national police force is critical to combating the insurgency. DOD reports on Afghanistan assess that \"significant strides have been made in professionalizing the ANP.\" However, many outside assessments of the ANP are negative, asserting that there is rampant corruption to the point where citizens mistrust and fear the ANP. According to SIGAR, as of 2019, the U.S. has obligated $21.4 billion (in Afghanistan Security Forces Funds, ASFF) to support the ANP since FY2005. The force is largely supported by the U.N.-managed Law and Order Trust Fund for Afghanistan (LOTFA). The U.S. police training effort was first led by State Department/Bureau of International Narcotics and Law Enforcement (INL), but DOD took over the lead role in April 2005. Police training has been highlighted by SIGAR and others as a potentially problematic area where greater interagency cooperation is needed. The target size of the ANP, including all forces under the ANP umbrella (except the Afghan Local Police, which are now under the command of the Ministry of the Interior), is 124,000; as of December 2018, it has 116,000 personnel. According to a December 2018 DOD assessment, women reportedly have a higher presence in the ANP than they do in the ANA. Afghan Local Police (ALP) . In 2008, the failure of several police training efforts led the Afghan government, with U.S. assistance, to support local forces in protecting their communities, despite some reluctance to create local militias, which previously had been responsible for human rights abuses in Afghanistan. The ALP concept grew out of earlier programs to organize and arm local civilians to provide security in their home districts; fighters are generally selected by local elders. The current number of ALP members (known as \"guardians\") is around 28,000. The ALP have the authority to detain criminals or insurgents temporarily, and transfer them to the ANP or ANA, but have been cited by Human Rights Watch and other human rights groups, as well as by DOD investigations, for killings, rapes, arbitrary detentions, land grabs, and sexual abuse of young boys. Others criticize the ALP as incompatible with the goal of creating nationalized defense and security forces and characterize ALP forces as unaccountable militias serving the interests of local strongmen. There have been discussions around incorporating ALP elements into the ANDSF. The ALP are funded by the United States at approximately $60 million a year (ASFF funds disbursed by CSTC-A). Regional developments and relationships have long influenced events inside Afghanistan. The Trump Administration has linked U.S. policy in Afghanistan to broader regional dynamics, particularly as they relate to South Asia. Key states include Afghanistan's most important neighbors, Pakistan and Iran; the larger regional players India, Russia, and China; and the politically influential Gulf States. The neighbor that is considered most crucial to Afghanistan's security is Pakistan, which has played an active and, by many accounts, negative role in Afghan affairs for decades. Experts and officials debate the extent of Pakistan's commitment to Afghan stability in light of its attempts to exert control over events in Afghanistan through ties to insurgent groups. DOD reports on Afghanistan's stability repeatedly have identified Afghan militant safe havens in Pakistan as a key threat to Afghan stability. Afghanistan-Pakistan Relations. Many Afghans approved of Pakistan's backing the mujahideen that forced the Soviet withdrawal in 1988-1989, but later came to resent Pakistan as one of three countries to formally recognize the Taliban as the legitimate government. (Saudi Arabia and the United Arab Emirates are the others.) Relations improved after Pakistani President Pervez Musharraf left office in 2008 but remain troubled as Afghan leaders continue to accuse Pakistan of supporting the Taliban and meddling in Afghan affairs. On several occasions, President Ghani has accused Pakistan of waging an \"undeclared war\" on Afghanistan. Some analysts argue that Pakistan sees Afghanistan as potentially providing it with \"strategic depth\" against India. Pakistan has long asserted that India uses its diplomatic facilities in Afghanistan to recruit anti-Pakistan insurgents, and that India is using its aid programs to build anti-Pakistan influence there. Long-standing Pakistani concerns over Indian activities in Afghanistan are being exacerbated by President Trump's pledge to further develop the United States' strategic partnership with India as part of the new U.S. approach to Afghanistan and South Asia. About 2 million Afghan refugees have returned from Pakistan since the Taliban fell, but 1.4 million registered refugees remain in Pakistan, according to the United Nations, along with perhaps as many as 1 million unregistered refugees. Many of these refugees are Pashtuns, the ethnic group that makes up about 40% of Afghanistan's 35 million people and 15% of Pakistan's 215 million; Pashtuns thus represent a plurality in Afghanistan but are a relatively small minority among many others in Pakistan, though Pakistan's Pashtun population is considerably larger than Afghanistan's. Pakistan condemns as interference statements by President Ghani (who is Pashtun) and other Afghan leaders about an ongoing protest campaign by Pakistani Pashtuns for greater civil and political rights. Afghanistan-Pakistan relations are also complicated by the two countries' long-running dispute over their shared 1,600-mile border, the \"Durand Line.\" Pakistan, the United Nations, and others recognize the Durand Line as an international boundary, but Afghanistan does not. Afghanistan contends that the Durand Line, a border agreement reached between the British Empire and Afghanistan in 1893, was drawn unfairly to separate Pashtun tribes and should be renegotiated. Tensions between the two neighbors have erupted several times in recent years, most recently in 2017, when clashes at the Chaman border crossing (which sits on the Durand Line) reportedly led to civilian and military casualties on both sides. Previous agreements led to efforts to deconflict the situation, but such bilateral mechanisms evidently have proven insufficient. Pakistan claims to have established nearly 1,000 border posts along the Durand Line, nearly five times as many as operated by Afghanistan. Pakistan and U.S. Policy in Afghanistan. For several years after the September 11, 2001 attacks, Pakistani cooperation with the United States against Al Qaeda was, arguably, relatively effective. Pakistan arrested more than 700 Al Qaeda figures after the September 11 attacks and allowed U.S. access to Pakistani airspace, some ports, and some airfields for the major combat phase of OEF. However, traditional support for the Taliban by elements of the Pakistani government and security establishment caused strains with the U.S. that were compounded by the May 1, 2011, U.S. raid that killed Osama bin Laden in Pakistan. Relations worsened further after a November 26, 2011, incident in which a U.S. airstrike killed 24 Pakistani soldiers, and Pakistan responded by closing border crossings, suspending participation in the border coordination centers, and boycotting the December 2011 Bonn Conference. Relations improved from the 2011 low in subsequent years but have remained tense. President Trump, in announcing a new Afghanistan strategy in August 2017, declared that \"we can no longer be silent about Pakistan's safe haven for terrorist organizations,\" and that while \"in the past, Pakistan has been a valued partner ... it is time for Pakistan to demonstrate its commitment to civilization, order, and to peace.\" Despite that praise for Pakistan as a \"valued partner,\" and U.S. other officials hailing successful Pakistani efforts to secure the release of several Americans held by the Haqqanis in Afghanistan in October 2017, the Trump Administration announced plans in January 2018 to suspend security assistance to Pakistan. That decision has impacted hundreds of millions of dollars of aid. Beyond the issue of aid (which had been withheld in the past, to little apparent effect), observers have speculated about such measures as reexamining Pakistan's status as a major non-NATO ally, increasing U.S. drone strikes on targets within Pakistan, and imposing sanctions on Pakistani officials. Pakistani officials and others warn that such measures could be counterproductive, highlighting the potential geopolitical costs of increasing pressure on Pakistan, especially as they relate to U.S. counterterrorism efforts and Pakistan's critical role in facilitating U.S. ground and air lines of communication to landlocked Afghanistan. Iran has long sought to exert its historic influence over western Afghanistan and to protect Afghanistan's Shia minority. Tensions between Iran and the U.S., whose presence in Afghanistan has long concerned Tehran, may be driving Iran's reported attempts to support the Taliban, its erstwhile foe. Iran historically opposed the Taliban, which Iran saw as a threat to its interests in Afghanistan, especially after Taliban forces captured the western city of Herat in September 1995, and Iran supported the anti-Taliban Northern Alliance with fuel, funds, and ammunition. In September 1998, Iranian and Taliban forces nearly came into direct conflict when Taliban forces killed several Iranian diplomats in the course of the Taliban's offensive in northern Afghanistan. Iran massed forces at the border and threatened military action, but the crisis cooled without a major clash. Iran offered search and rescue assistance in Afghanistan during the U.S.-led war to topple the Taliban, and it also allowed U.S. humanitarian aid to the Afghan people to transit Iran. Iran helped broker Afghanistan's first post-Taliban government, in cooperation with the United States, at the December 2001 Bonn Conference. At the same time, Iran has had diplomatic contacts with the Taliban since at least 2012, when Iran allowed a Taliban office to open in Iran, and high-level Taliban figures have visited Iran. While some analysts see the contacts as Iranian support of the insurgency, others see them as an effort to exert some influence over reconciliation efforts. Iran likely seeks to ensure that U.S. forces cannot use Afghanistan as a base from which to pressure or attack Iran. Since at least early 2017, however, U.S. officials have reported more active Iranian backing for Taliban elements, particularly in western Afghanistan. In November 2018, Trump Administration officials displayed a number of Iranian-origin rockets that they alleged had been provided to the Taliban. Iran's support of Taliban fighters, many of whom are Pashtun, is in contrast with Iran's traditional support of non-Pashtun Persian-speaking and Shia factions in Afghanistan. For example, Iran has funded pro-Iranian armed groups in the west and has supported Hazara Shias in Kabul and in Hazara-inhabited central Afghanistan, in part by providing scholarships and funding for technical institutes as well as mosques. There are consistent allegations that Iran has funded Afghan provincial council and parliamentary candidates in areas dominated by the Persian-speaking and Shia minorities. Even as it funds anti-government groups as a means of pressuring the United States, Iran has built ties to the Afghan government. President Ghani generally has endorsed his predecessor's approach on Iran; Karzai called Iran a \"friend\" of Afghanistan and said that Afghanistan must not become an arena for disputes between the United States and Iran. At other times, Afghanistan and Iran have had disputes over Iran's efforts to expel Afghan refugees. There are approximately 1 million registered Afghan refugees in Iran, with as many as 2 million more unregistered. Iran's ties to the Shia community in Afghanistan have facilitated its recruitment of Afghan Shias to fight on behalf of the Asad regime in Syria, though there is some evidence that Shia Afghan refugees have been coerced into joining the war effort (see textbox). India's past involvement in Afghanistan reflects its long-standing concerns about potential Pakistani influence and Islamic extremism emanating from Afghanistan, though its current role is focused on development. India also views Afghanistan as a trade and transit gateway to Central Asia, but Pakistan blocks a direct route, so India has sought to develop Iran's Chabahar Port. India supported the Northern Alliance against the Taliban in the mid-1990s and retains ties to Alliance figures. India saw the Afghan Taliban's hosting of Al Qaeda during 1996-2001 as a major threat because of Al Qaeda's association with radical Islamic organizations in Pakistan that seek to end India's control of part of the disputed territories of the former princely state of Jammu and Kashmir. Some of these groups have committed major acts of terrorism in India, including the attacks in Mumbai in November 2008 and in July 2011. Afghanistan has sought to strengthen its ties to Indiaâin large part to access India's large and rapidly growing economyâbut has sought to do so without causing a backlash from Pakistan. In October 2011, Afghanistan and India signed a \"Strategic Partnership.\" The pact affirmed Pakistani fears by giving India, for the first time, a formal role in Afghan security; it provided for India to train ANDSF personnel, of whom thousands have been trained since 2011. However, India has resisted playing a greater role in Afghan security, probably to avoid becoming ever more directly involved in the conflict in Afghanistan or inviting Pakistani reprisals. India's involvement in Afghanistan is dominated by development issues. India is the fifth-largest single country donor to Afghan reconstruction, funding projects worth over $3 billion. Indian officials assert that their projects are focused on civilian, not military, development and are in line with the development priorities set by the Afghan government. As part of the new U.S. strategy for Afghanistan, President Trump called in August 2017 for India to \"help us more with Afghanistan, especially in the area of economic assistance and development,\" though he also derided Indian aid to Afghanistan in January 2019. Prime Minister Modi visited Afghanistan in December 2015 and June 2016 to inaugurate major India-sponsored projects, including the new parliament complex in Kabul and the Afghan-India Friendship Dam in Herat province. In May 2016, India, Iran and Afghanistan signed the Chahbahar Agreement, under which India is to invest $500 million to develop Iran's Chahbahar port on the Arabian Sea. That port is designed to facilitate increased trade between India and Afghanistan, bypassing Pakistan. The Trump Administration is providing India with a waiver under applicable Iran sanctions laws to be able to continue to develop the port. For years Russia tacitly accepted the U.S. presence in Afghanistan as furthering the battle against radical Islamists in the region. Recently, however, in the context of renewed U.S.-Russian rivalry, Russia has taken a more active role both in the conflict (including providing some political and perhaps material support for the Taliban) and in efforts to bring it to a negotiated end. During the 1990s, after the Soviet Union's 1989 withdrawal from Afghanistan and subsequent breakup (see Appendix B ), Russia supported the Northern Alliance against the Taliban with some military equipment and technical assistance in order to blunt Islamic militancy emanating from Afghanistan. After 2001, Russia agreed not to hinder U.S. military operations, later cooperating with the United States in developing the Northern Distribution Network supply line to Afghanistan. About half of all ground cargo for U.S. forces in Afghanistan flowed through the Northern Distribution Network from 2011 to 2014, despite the extra costs as compared to the route through Pakistan. Nevertheless, Russian-U.S. collaboration in Afghanistan, a relative bright spot in the two countries' relationship, has suffered in light of a more general deterioration of bilateral ties. Moscow has taken a markedly more assertive role in Afghanistan since at least late 2015. U.S. officials have differed in how they characterize both the nature of and motivation for Russia's actions, but there appears to be widespread agreement that they represent a challenge to U.S. goals. Former Secretary Mattis said that Russia was \"choosing to be strategic competitors\" with the United States in Afghanistan, while former U.S. commander General Nicholson said the Russians were motivated by a desire to \"undermine the United States and NATO.\" Other analysts have noted Russian anxieties about a potential long-term U.S. military presence in Central Asia, a region that has been in Moscow's sphere of influence since the 19 th century. The Russian government frames its renewed interest in Afghanistan as a reaction to the growth of ISKP, for which Russia faults the United States. However, Russian descriptions of ISKP strength and geographic location generally surpass estimates by the United States and others, perhaps overstating the threat to justify supporting the Taliban, which Russia may see as less of a direct danger. The Washington Post, citing unnamed U.S. defense officials, reported in 2017 that Russia had provided weapons (including heavy machine guns) to the Taliban ostensibly to be used against the Islamic State affiliated fighters, but that the weapons had surfaced in places far from ISKP strongholds, like Helmand province. Russia had previously condemned such claims as \"groundless\" and \"absurd fabrications;\" a Taliban spokesman also denied the reports, saying \"our contacts with Russia are for political and diplomatic purposes only.\" General Nicholson echoed such reports in a March 2018 interview, saying, \"We've had weapons brought to this headquarters and given to us by Afghan leaders and said, this was given by the Russians to the Taliban.\" Russia also has sought to establish itself as a player in Afghanistan by its efforts to bring about a negotiated settlement. In December 2016, Moscow hosted Chinese and Pakistani officials in a meeting that excluded Afghan representatives, drawing harsh condemnation from the Afghan government. Significantly, Russia has also hosted Taliban officials for talks in Moscow, in February and May 2019âmeetings in which Afghan government representatives did not participate. China's involvement in Afghanistan, with which it shares a small, remote border, is motivated by several interests, of which reducing what China perceives as a threat from Islamist militants in Afghanistan and securing access to Afghan minerals and other resources are considered the most important. Since 2012, China has deepened its involvement in Afghan security issues and has taken on a more prominent role as a potential mediator in Afghan reconciliation, though its role in both is still relatively modest. In 2012, China signed a series of agreements with Afghanistan, one of which reportedly promised Chinese training and funding for Afghan forces, though some reports, citing participants, question how beneficial that training is. Â In October 2014, China hosted Ghani for his first working trip abroad as president, during which China agreed to provide $330 million in bilateral aid over the coming three years, in addition to other forms of support. As a consequence of that visit, some Taliban figures reportedly visited China, apparently accompanied by Pakistani security officials, as part of an effort to promote an Afghan political settlement. In 2018, Chinese officials denied reports of plans to build a military base in the Wakhan Corridor, a sparsely inhabited sliver of Afghanistan with which China has a 47-mile border, saying, \"no Chinese military personnel of any kind on Afghan soil at any time.\" China did agree to help Afghanistan stand up a \"mountain brigade\" in the Wakhan Corridor to take on any Islamist fighters who return to the country from the Middle East. China fears that some of the returned fighters may be Chinese nationals who may be planning attacks in China's northwestern region of Xinjiang, across the border from Afghanistan. In a September 2018 interview with Reuters, Afghanistan's ambassador to Beijing said China will be doing \"some training\" of Afghan troops as part of that effort, but in China, rather than in Afghanistan, as some reports had suggested. Looking ahead, China may be seeking to play a larger role in reconciliation efforts in Afghanistan; China has considerable influence with its ally Pakistan, which is generally considered the most important regional player in the Afghan conflict. China participates in various multilateral fora dedicated to fostering Afghan peace talks, such as the Quadrilateral Coordination Group (comprising representatives from Afghanistan, China, Pakistan, and the United States). Chinese officials reportedly have met with Taliban representatives several times in the past year as well. Many experts see China's activities in Afghanistan as primarily economically driven. Chinese delegations continue to assess the potential for new investments in such sectors as mining and energy. The cornerstone of China's investment to date has been the development of the Aynak copper mine south of Kabul, but that project has stalled over contractual disputes, logistical problems, and some security issues. Additionally, prospective transportation and trade routes through Afghanistan comport with China's Belt and Road Initiative and previous U.S. efforts to establish a similar New Silk Road. Some experts argue that shared U.S. and Chinese interests in a stable Afghanistan represent a potential area for Sino-American cooperation. At times the Gulf States have been considered a key part of the effort to stabilize Afghanistan, though donations by Gulf residents have been a major source of Taliban funding. Gulf States have also contributed development funds and have influence with some Afghan clerics and factions. Saudi Arabia has a long history of involvement in Afghanistan; it channeled hundreds of millions of dollars to the mujahideen in the 1980s during the war against the Soviet occupation, and was one of three countries to formally recognize the Taliban government. Saudi Arabia later brokered some of the negotiations between the Afghan government and \"moderate\" Taliban figures. More recently, however, Saudi officials have described the Taliban as \"armed terrorists,\" though some critics allege that the kingdom has not taken measures to stop private donors in the Kingdom from giving financial support to the Taliban. The United Arab Emirate s (UAE) , another country that recognized the Taliban regime, deployed a limited number of troops and aircraft to support NATO security missions in southern Afghanistan. The UAE has donated over $250 million to Afghanistan since 2002 for housing, health care, and education projects. UAE officials were reportedly discussing the UAE aid program for southern Afghanistan at the time of the January 10, 2017 bombing at the Kandahar governor's guest house that killed at least six UAE diplomats, including the UAE's Ambassador to Afghanistan. Qatar did not recognize the Taliban and was not regarded as a significant player on the Afghanistan issue until 2011. Senior Taliban figures opened an informal \"political office\" in Doha, with U.S. acquiescence, as part of efforts to establish talks with the Taliban in 2013. Qatar also has played host to most of the substantive U.S.-Taliban talks being overseen by Special Representative Khalilzad. The United States has encouraged Afghanistan's neighbors to support a stable and economically viable Afghanistan and to include Afghanistan in regional security and economic organizations and platforms. Afghanistan has sought to increase its integration with neighboring states through participation in other international fora, including the Shanghai Cooperation Organization (SCO), a security coordination body that includes Russia, China, Uzbekistan, Tajikistan, Kazakhstan, and Kyrgyzstan, to which Afghanistan was granted full observer status in 2012. In addition, several regional meetings series have been established between the leaders of Afghanistan and neighboring countries. These include summit meetings between Afghanistan, Pakistan, the U.S., and China (the Quadrilateral Coordination Group, or QCG). The Quadrilateral Coordination Group met for the sixth time in October 2017. Russia convened a meeting with Pakistan and China to discuss Afghanistan in December 2016 (more below), drawing condemnation from the Afghan government, which was not invited to participate; Afghanistan was invited to, and attended, the second (February 2017) and third (April 2017) meetings, though the United States declined to attend. Economically, the U.S. has emphasized the development of a Central Asia-South Asia trading corridor in an effort to keep Afghanistan stable and economically vibrant as donors wind down their involvement. For years, the Afghan government, the United States, and various neighboring states have engaged in efforts to bring about a political settlement with insurgents. As of July 2019, U.S. officials, led by Special Representative for Afghanistan Reconciliation Zalmay Khalilzad, are currently engaged in direct talks with the Taliban in the most serious discussions to end the U.S. military effort there since it began. However, the Taliban still refuse to negotiate with representatives of the Afghan government , which they seek to delegitimize. The Afghan government has overseen several initiatives aimed at bringing the war to an end, including a February 2018 offer from President Ghani to negotiate with the Taliban without preconditions, but there does not appear to have been any substantive engagement between Taliban and Afghan leaders to date. On September 5, 2010, an \"Afghan High Peace Council\" (HPC) was formed to oversee the settlement and reintegration process. Then-President Karzai appointed former president Burhanuddin Rabbani to head it, in part to gain crucial support for negotiations with the Taliban; Rabbani was assassinated in September 2011. The HPC was significantly reorganized and effectively relaunched in 2016; at the time, one prominent Afghanistan analyst described it as a \"side-show in the peace process,\" a position that seemed to be confirmed in 2018 when that same analyst assessed that \"there will be no HPC role in the negotiations\" the Afghan government is attempting to start with the Taliban. The 2016 reconciliation with the government of one insurgent faction, Hizb-e-Islami-Gulbuddin (HIG), led by former mujah ideen party leader Gulbuddin Hekmatyar, was seen as a possible template for further work toward a political settlement. A former muja hideen commander who is accused of committing human rights abuses during the Afghan civil war of the 1990s, Hekmatyar allied his fighters with the Taliban after 2001, although HIG was not a major factor on the Afghanistan battlefield. In 2010, Hekmatyar signaled his openness to reconciliation with Kabul, and Hekmatyar instructed followers to vote in the 2014 presidential elections. On September 22, 2016, after months of negotiations, Afghan officials and Hekmatyar representatives signed a 25-point reconciliation agreement; U.N. sanctions against Hekmatyar were dropped in February 2017. In May 2017, Hekmatyar returned to Kabul, rallying thousands of supporters at a speech in which he criticized the Afghan government. Hekmatyar declared his candidacy for the 2019 presidential election in January 2019. The Taliban have maintained their long-standing refusal to negotiate with representatives of the Afghan government, which they characterize as a corrupt and illegitimate puppet of foreign powers, and Kabul is not directly involved in the ongoing U.S.-Taliban negotiations (more below). Some observers have criticized that arrangement; former U.S. Ambassador to Afghanistan Ryan Crocker argued that by not insisting on the inclusion of the Afghan government in these negotiations \"we have ourselves delegitimized the government we claim to support,\" and advocated that the U.S. halt talks until the Taliban agree to include the Afghan government. A planned meeting between as many as 200 Afghan delegates, including some Afghan officials (in their personal capacity), and the Taliban in Doha collapsed in April 2019 when Taliban representatives objected at the last minute to the size and makeup of the group; that meeting has been postponed indefinitely. A meeting between 50 Afghans and 17 Taliban representatives took place in July 2019; the Afghan delegation included some government officials, who participated in a personal capacity. The two-day \"Intra-Afghan Conference for Peace\" concluded with a joint statement that stressed the importance of an intra-Afghan settlement, and was hailed by Khalilzad as a \"big success.\" Afghan President Ashraf Ghani has promised that his government will not accept any settlement that limits Afghans' rights. In a January 2019 televised address, he further warned that any agreement to withdraw U.S. forces that did not include Kabul's participation could lead to \"catastrophe,\" pointing to the 1990s-era civil strife following the fall of the Soviet-backed government that led to the rise of the Taliban (see textbox above). President Ghani's concern about being excluded from the talks surfaced in mid-March when his national security advisor accused Khalilzad of \"delegitimizing the Afghan government and weakening it,\" and harboring political ambitions within Afghanistan, leading to a sharp rebuke from the State Department. According to a former State Department official, \"The real issue is not the personality of an American diplomat; the real issue is a policy divergence,\" namely, Afghans' concerns about the potential U.S. withdrawal. The first direct meetings between U.S. and Taliban representatives began in 2010, centered largely on the issues of a prisoner exchange and the opening of a Taliban political office in Doha, Qatar. Multiple factors, including opposition from the Afghan government led by then-President Hamid Karzai, caused the collapse of talks in March 2012. Qatari and Pakistani mediation led to a 2013 agreement to allow the Taliban to open the Doha office, but because the Taliban opened that office in June 2013 with the trappings of an official embassy, in direct violation of the terms of the agreement, the Qatari government shuttered the office less than a month later. In June 2014, Qatar coordinated the release of U.S. prisoner Bowe Bergdahl in exchange for five high-ranking Taliban officials imprisoned at Guantanamo Bayâindividuals who are now part of the Taliban team negotiating with the United States in Doha. No further talks between U.S. and Taliban officials occurred under the Obama Administration. In President Trump's August 2017 speech laying out the new strategy for Afghanistan, he referred to a \"political settlement\" as an outcome of an \"effective military effort,\" but did not elaborate on what U.S. goals or conditions might be as part of this putative political process. In remarks the next day, then-Secretary of State Rex Tillerson rejected the idea of preconditioning talks on the Taliban's acceptance of certain arrangements, saying \"the Government of Afghanistan and the Taliban representatives need to sit down and sort this out. It's not for the U.S. to tell them it must be this particular model, it must be under these conditions.\" The Trump Administration decided in July 2018 to enter into direct negotiations with the Taliban, without Afghan government representatives. This came almost a year after the President announced a new strategy for South Asia that many interpreted as a sign of renewed American commitment to Afghanistan. With no progress on the battlefield, the Trump Administration reversed the long-standing U.S. position that any peace process would have to be \"Afghan owned and Afghan led,\" and the first high-level, direct U.S.-Taliban talks occurred in Doha in July 2018. The September 2018 appointment by Secretary of State Mike Pompeo of Ambassador Zalmay Khalilzad, the Afghan-born former U.S. Ambassador to Afghanistan under President George W. Bush, as Special Representative for Afghanistan Reconciliation added more momentum to this effort. Since his appointment, Khalilzad has held a near-continuous series of meetings with the Afghan, Pakistani, and other regional governments, as well as with Taliban representatives. After six days of negotiations in Doha in January 2019, Khalilzad stated that, \"The Taliban have committed, to our satisfaction, to do what is necessary that would prevent Afghanistan from ever becoming a platform for international terrorist groups or individuals,\" in return for which U.S. forces would eventually fully withdraw from the country. Khalilzad later cautioned that \"we made significant progress on two vital issues: counter terrorism and troop withdrawal. That doesn't mean we're done. We're not even finished with these issues yet, and there is still work to be done on other vital issues like intra-Afghan dialogue and a complete ceasefire.\" After a longer series of talks that ended on March 12, 2019, Khalilzad announced that an agreement \"in draft\" had been reached on counterterrorism assurances and U.S. troop withdrawal. He noted that after the agreement is finalized, \"the Taliban and other Afghans, including the government, will begin intra-Afghan negotiations on a political settlement and comprehensive ceasefire.\" It remains unclear what kind of political arrangement could satisfy both Kabul and the Taliban to the extent that the latter fully abandons its armed struggle. The Taliban have given contradictory signs, with one spokesman saying in January 2019 that the group is \"not seeking a monopoly on power\" and another in May speaking of the group's \"determination to re-establish the Islamic Emirate in Afghanistan.\" Still, many Afghans, especially women, who remember Taliban rule and oppose the group's policies and beliefs, remain wary. Political contention among Afghans can be seen as both a sign of the country's U.S.- and internationally supported democratic development as well as a troubling reminder of the country's fractured past and a potential impediment to peace. During Taliban rule (1996-2001), Afghanistan was run by a small group of mostly Pashtun clerics loyal to Mullah Mohammad Omar, who remained based in Kandahar. No representative body was functioning, and government offices were minimally staffed and lacked modern equipment. The ouster of that government by U.S. forces and their Afghan partners in late 2001 paved the way for the success of a long-stalled U.N. effort to form a broad-based Afghan government. In November 2001, after the Taliban government collapsed, the United Nations invited major Afghan factions, most prominently the Northern Alliance and allies of former King Zahir Shahâbut, notably, not the Talibanâto an international conference in Bonn, Germany. There, on December 5, 2001, the factions signed the \"Bonn Agreement\" which authorized an international peacekeeping force and called for a loya jirga (consultative assembly) to establish a Transitional Authority to administer the country until a new constitution could be drafted. That loya jirga elected Afghan Interim Administration chairman Hamid Karzai as president in June 2002, and a subsequent jirga approved a new constitution, establishing the Islamic Republic of Afghanistan, in January 2004. The Afghan constitution sets up a presidential system, with an elected president and bicameral national legislature, the 259-seat lower house of which ( Wolesi Jirga ) is popularly elected. The president serves a five-year term, with a two-term limit, and there are two vice presidents. The president has broad powers. Under article 64, he has the power to appoint all \"high-ranking officials,\" which includes not only cabinet ministers but also members of the Supreme Court, judges, provincial governors and district governors, local security chiefs, and members of supposedly independent commissions such as the Independent Election Commission and the Afghan Independent Human Rights Commission (AIHRC). These appointments are constitutionally subject to confirmation by the National Assembly. To some extent, the National Assembly can check the powers of the president, although many observers assert that it has been unable to limit presidential authority. Both the upper and lower houses are required to pass laws and the national budget. The National Assembly has often tried to assert its institutional strength, such as by holding a March 2006 vote to require the cabinet to be approved individually, rather than en bloc , increasing opposition leverage. Votes of no-confidence against ministers, which under Article 92 of the Afghan constitution can be proposed by 20% of lower house members, have often affirmed these powers, with several of Karzai's and Ghani's ministers blocked or removed from office. Because it tends to be composed of more established, notable Afghans who are traditionalist in their political outlook, the upper house has tended to be more politically conservative than the lower house, and more supportive of the president (who appoints a third of its members under the constitution). Afghanistan's active political scene is often viewed through the prism of the country's complex ethnic makeup, itself a sensitive political issue. The Afghan constitution references 14 ethnicities as well as \"other tribes,\" (Article 4) and designates six languages (Uzbek, Turkmen, Pachaie, Nuristani, Baluchi, and Pamiri) as possible third official languages (Article 16) after the two official national languages, Pashto and Dari (the Afghan variant of Persian). Reliable figures for the ethnic breakdown of Afghanistan are difficult to come by and, as in many other parts of the world, are heavily freighted with political ramifications. For example, the CIA World Factbook does not provide any estimates at all, stating that \"current statistical data on the sensitive subject of ethnicity in Afghanistan are not available.\" There is generally widespread agreement that four ethnic groups are most dominant in Afghanistan. In descending order of size, they are Pashtuns, Tajiks, Hazaras, and Uzbeks. One representative estimate gives their size as 42%, 27%, 9%, and 9% of the Afghan population, respectively. Pashtuns are generally acknowledged to be the largest ethnic group in Afghanistan, and have traditionally dominated Afghan governance; Presidents Hamid Karzai (2003-2014) and Ashraf Ghani (2014-present) are both ethnic Pashtuns. Pashtuns are concentrated in the south and east of the country, along the border with Pakistan, which has a sizeable Pashtun minority of its own. The Taliban is largely, though not exclusively, Pashtun. Tajiks , who generally speak Dari, are thought to be the second largest group in Afghanistan. The Northern Alliance that opposed the Taliban was led by Tajiks like Ahmad Shah Massoud, and today's Tajik-dominated Jamiat-e-Islami party features significant figures like Foreign Minister Salahuddin Rabbani, former Balkh governor Atta Mohammad Noor, and national Chief Executive Officer (CEO) Abdullah (who is of mixed Tajik-Pashtun ancestry). The Persian-speaking Hazara people live mostly in central Afghanistan and represent most of Afghanistan's Shia minority. They have periodically suffered discrimination, persecution, and violence. Deputy CEO Mohammad Mohaqiq is an ethnic Hazara. They are generally considered to be the most socially liberal ethnic group in Afghanistan. Uzbeks represent Afghanistan's largest Turkic minority population (other Turkic groups in Afghanistan include Turkmen and Kyrgyz), concentrated mostly in the country's north, where they have sometimes come into conflict with Tajiks and other groups. Vice President Abdul Rashid Dostum is generally considered the leader of Afghanistan's Uzbek community. Hamid Karzai won the first nationwide presidential election in October 2004, and reelection in 2009; the latter election, the first to be administered by the Afghan government, was clouded by widespread fraud allegations. The election system (a runoff between the top two candidates if no majority is achieved in the first round) favors the likelihood the president will be an ethnic Pashtun. This was seemingly confirmed in 2014, when Abdullah Abdullah (of mixed ancestry, but associated with the Tajik community) won a plurality of votes with 45% in the first round and then lost with 44% in the second round to now-President Ghani, an ethnic Pashtun. The 2014 presidential election was seen as a major test for Afghanistan as the U.S. and international partners drew down in advance of a planned transfer of responsibility for security to Afghan forces. In the first round, held in April 2014, violence was relatively low and there were fewer fraud complaints and deducted votes than in the 2009 election. The second round of voting, in June 2014, was extremely contentious and Abdullah alleged that fraud was responsible for preliminary results that showed him losing to Ghani, with Abdullah supporters reportedly threatening to seize power by force. Intense U.S. involvement, including calls from President Barack Obama and negotiations mediated by Secretary of State John Kerry, eventually led to a September 2014 power sharing agreement between the two men. As part of that accord, Ghani was inaugurated as president and appointed Abdullah as Chief Executive Officer (CEO), a new, extraconstitutional position with powers approximating those of a prime minister. This arrangement, known as the national unity government, remains intact but has encountered extensive difficulties. Abdullah publicly accused Ghani in August 2016 of acting unilaterally and refusing to meet regularly with him. Outward signs of friction seem to have receded since 2017, though tensions clearly remain. A trend in Afghan society and governance that worries some observers is the increasing fragmentation along ethnic and ideological lines. Such fractures have long existed in Afghanistan but were largely contained during Hamid Karzai's presidency. These divisions are sometimes seen as a driving force behind some of the contentious episodes that have challenged Ghani. Vice President Abdul Rashid Dostum, who has criticized Ghani's government for favoring Pashtuns at the expense of the Uzbek minority he is seen to represent, left Afghanistan for Turkey in May 2017. Dostum's departure came in the wake of accusations that he engineered the kidnapping and assault of a political rival, prompting speculation that his departure was an attempt to avoid facing justice in Afghanistan. Dostum returned to Afghanistan in July 2018, quelling protests by his supporters; he remains under indictment but no legal proceedings against him have taken place. Â  Ghani's December 2017 dismissal of Atta Mohammad Noor, the powerful governor of the northern province of Balkh who defied Ghani by remaining in office for several months before resigning in March 2018, was another sign of serious political divisions, possibly along ethnic lines. Noor is one of the most prominent members of the Jamiat-e-Islami party, which is seen to represent the country's Tajik minority. After multiple delays, elections for the 249-seat Wolesi Jirga (the lower house of Afghanistan's bicameral legislature) were held in October 2018. District council elections, originally scheduled to take place at the same time, were delayed due to a lack of candidates. The elections were preceded by contention among electoral commissioners and an ethnically charged dispute over electronic identity cards. Various technical and logistical challenges have exposed the Independent Election Commission (IEC) to widespread criticism, with one observer describing the process as a \"triumph of administrative chaos.\" Instability marred the election results as well: elections were held a week late in Kandahar and indefinitely postponed in Ghazni, and hundreds of polling stations in areas outside of the government's control were closed. Additionally, ten candidates were assassinated during the campaign and dozens of civilians were killed and hundreds wounded in election-day violence. Still, most reports indicated at least some measure of voter enthusiasm, especially in urban areas; turnout was estimated at around 4 million of 9 million registered voters. Afghanistan scholar Barnett Rubin observed, \"The main obstacle to democracy in Afghanistan is not the willingness of the people to participate, but the capacity of the state to make their participation meaningful.\" Final nationwide results (except for Ghazni, parliamentary elections for which are supposed to be run alongside the 2019 presidential election) were released in May 2019. President Ghani and CEO Abdullah, along with over a dozen other candidates, are running in the presidential election now scheduled, after two postponements, for September 2019. President Ghani's mandate expired on May 22, 2019. Many of his chief rivals have said that his government is no longer legitimate and have called for him to step down in favor of an alternate political arrangement. On April 20, 2019, the Afghan Supreme Court reportedly issued a ruling extending the president's term until the election (along with those of his vice presidents; it is unclear what the CEO's status will be), citing a similar 2009 ruling that extended then-President Karzai's term to cover a postponement of the 2009 presidential election. It is unclear whether delays to the presidential election are related to ongoing U.S.-Taliban talks. U.S. officials have denied that the establishment of an interim government is part of their negotiations with the Taliban, but some observers speculate that such an arrangement (which Ghani has rejected) might be necessary to accommodate the reentry of Taliban figures into public life. An interim government, or some other broad national political arrangement, might also facilitate the establishment of a new political system, which a putative settlement might require. The Taliban have stated their intention to replace the 2004 Afghan constitution, which they characterize as \"invalid\" and \"imported from the West,\" with an Islamic system. President Ghani has responded by pointing out that Afghanistan is an Islamic republic and that the constitution prohibits any laws that \"contravene the tenets and provisions\" of Islam, though he has stated his openness to reviewing and amending it within legal processes. Some analysts have argued that the Afghan constitution breeds ethnic conflict by investing the president with considerable powers (including the ability to appoint all provincial governors) and that a more decentralized system is necessary. Since the United States and its partners intervened in 2001, the international community has contributed tens of billions of dollars in economic and development assistance to Afghanistan. At the height of this effort, donor aid accounted for more than 75% of Afghanistan's GDP. As of early 2018, donor aid still accounts for about 60% of total Afghan government expenditures (both operating budget and development budget), with domestic revenues making up the rest. Experts and policymakers have debated many aspects of aid to Afghanistan, including amounts, mechanisms for delivery, donor coordination, and distribution within Afghanistan. Between 1985 and 1994, the United States had a cross-border aid program for Afghanistan, implemented by USAID personnel based in Pakistan. Citing the difficulty of administering this program, there was no USAID mission for Afghanistan from the end of FY1994 until the reopening of the U.S. Embassy in Afghanistan in late 2001. During the 1990s, the United States was the largest single provider of assistance to the Afghan people even though no U.S. aid went directly to the Taliban government when it was in power during 1996-2001; monies were provided through relief organizations. Since 2001, the United States has been by far the largest international donor to Afghanistan, spending over $132 billion for development assistance since FY2001 according to SIGAR. U.S. aid has been primarily focused on security assistance, accounting for nearly 63% of those funds (see Figure 6 ). Appendix C at the end of this report portrays U.S. assistance to Afghanistan by year since the fall of the Taliban. The cited figures do not include costs for U.S. combat operations. The United States and other donors have been working to transition assistance away from off-budget (internationally managed, excluded from the Afghan national budget) expenditures to on-budget (managed by the Afghan government, also referred to as \"direct contributions\"). About $14.5 billion of U.S. assistance provided to Afghanistan has been directly to the Afghan government ($9.2 billion directly to the Afghan government, $5.3 billion through international trust funds). Since 2010, donors have aimed to increase to half the portion of development assistance delivered on-budget. SIGAR has expressed misgivings about this goal, arguing that \"the Afghan government often lacks both the will and the necessary internal controls to ensure that those funds are spent on what the donor intended\" and that \"should U.S. military and civilian personnel levels decrease, the ability to track on-budget assistance will inevitably suffer.\" Some laws have required the withholding of U.S. aid subject to Administration certification of Afghan compliance on a variety of issues, including counternarcotics efforts, corruption, vetting of the Afghan security forces, human rights practices, protection of women's rights, and other issues. Successive measures included in annual appropriations measures and National Defense Authorization Acts have conditioned Economic Support Funds (ESF) and International Narcotics Control and Law Enforcement (INCLE) funding to Afghanistan on various requirements, including the submission of various reports, and the certification that the Afghan government is meeting certain benchmarks related to metrics including corruption, democratic development, and women's rights. All the required certifications have been made, and virtually no U.S. funds have been withheld from Afghanistan. The FY2008 defense authorization bill ( P.L. 110-181 ) established a \"Special Inspector General for Afghanistan Reconstruction\" modeled on a similar outside auditor for Iraq. The SIGAR issues quarterly reports and specific audits of aspects of Afghan governance and security, with particular attention to how U.S.-provided funds have been used. The SIGAR, as of July 2019, is John Sopko. Some executive branch agencies have periodically criticized SIGAR audits as inaccurate or as highlighting problems that the agencies are already correcting. For example, DOD took strong exception to a December 4, 2013, audit by the SIGAR that asserted that the U.S. military had failed to adequately manage risk accounting for $3 billion in DOD funds for the ANDSF. SIGAR's annual operations are funded at around $55 million. H.Rept. 116-78 , accompanying the House Appropriations Committee-reported FY2020 State, Foreign Operations, and Related Programs Appropriations bill, directs that \"Not later than 180 days after enactment of this Act, the SIGAR shall submit to the Committees on Appropriations a detailed plan, including funding requirements and personnel data, for the complete drawdown of operations in Afghanistan by the end of fiscal year 2021.\" Non-U.S. donors, including such institutions as the EU and the Asian Development Bank, have provided substantial funds for Afghanistan's development. According to SIGAR, most of those funds are through three major international funds: the World Bank-managed Afghanistan Reconstruction Trust Fund (ARTF), the UNDP-managed Law and Order Trust Fund for Afghanistan, and the NATO-managed Afghan National Army Trust Fund (ANATF). As of late 2018, the largest donors to these funds, after the U.S., are the UK, Japan, Germany, the EU, and Canada (see Figure 7 ). Major pledges have been made primarily at donor conferences such as Tokyo (January 2002), Berlin (April 2004), Kabul (April 2005), London (February 2006), Paris (June 2008), London (January 2010), Tokyo (July 2012), and Brussels (October 2016). At the 2012 Tokyo conference, the United States and its partners pledged a total of $16 billion in aid to Afghanistan through 2015 ($4 billion per year for 2012-2015) and agreed to sustain support through 2017 at levels at or near the past decade. Among other major pledges, Japan pledged $3 billion through 2016, and Germany pledged $550 million over four years. The Tokyo Mutual Accountability Framework (TMAF) that resulted from the conference stipulated requirements of the Afghan government in governance, anti-corruption, holding free and fair elections, and human rights practices. As an incentive, if Afghanistan meets the benchmarks, the TMAF increases (to 20% by 2024) the percentage of aid provided through the ARTF and other mechanisms that give Kabul discretion in the use of donated funds. Donors met to assess progress on the TMAF benchmarks and pledged more funds for Afghanistan at a donors meeting in Brussels in October 2016. The conference welcomed Afghanistan's new \"National Peace and Development Framework\" and its efforts to fight corruption. At the conclusion of the meeting, donors announced pledges of $15.2 billion for the period of 2017-2020 (and support at lower levels thereafter through 2024). In November 2018, 61 countries and 35 international organizations met in Geneva to measure progress on development and reform in light of the Brussels pledges. At the conference, donor nations reaffirmed their commitment to continue support through 2020 and praised some successes (such as \"bold and important steps\" on the peace process taken by the Afghan government) but left some key issues unaddressed, according to one analyst. Economic development is pivotal to Afghanistan's long-term stability. Some economic sectors in Afghanistan have been developed largely with private investment, including by well-connected Afghan officials or former officials who founded companies. Promoting economic growth has been a major goal of U.S. development assistance, mostly by USAID, but also by other departments. For example, the DOD Task Force for Business and Stability Operations (TFBSO) sought to facilitate additional private investment in Afghanistan. However, A SIGAR report of November 2014 assessed that the Task Force's efforts yielded very little result, and the TFBSO concluded its operations in March 2015. Decades of war have stunted the development of most domestic industries. More recently, the economy also has been hurt by a decrease in aid provided by international donors since 2014. Afghanistan's Gross Domestic Product (GDP) has grown an average of 7% per year since 2003, but growth slowed to 2% in 2013 due to aid cutbacks and political uncertainty about the post-2014 security situation. Since 2015, Afghanistan has experienced a \"slight recovery\" with growth of between 2% and 3% in 2016 and 2017, though the increase in the poverty rate (55% living below the national poverty line in 2016-2017 compared to 38% in 2012-2013) complicates that picture. On the other hand, the Afghan government has made progress in increasing revenue (though as mentioned above, the percentage of total budgetary expenditures funded by donor grants is still above 60%). In any event, \"for the foreseeable future, and barring a breakthrough in reconciliation and an end to or at least a substantial reduction in the level of conflict, Afghanistan will remain highly aid dependent.\" Efforts by the U.S. and others to build the legitimate economy are showing some results, by some accounts, and are outlined by sector below. U.S. aid has been key to a number of infrastructure initiatives, most notably in constructing roads, improving the electric grid, and developing the telecommunications sector. Roads. Road building in Afghanistan, which reportedly had less than 50 miles of paved roads in 2001, was a major development priority; as former commander of U.S. forces in Afghanistan General Eikenberry (later Ambassador) has said, \"where the roads end, the Taliban begin.\" USAID has spent about $2.1 billion on road construction and maintenance projects, with DOD funding an additional $850 million in such work, according to an October 2016 SIGAR audit report. The major road, the Ring Road (which links the country's five major cities), has been completely repaved using funds from various donors, including substantial funds from the Asian Development Bank, at a total expense of about $4 billion (all donors). Some observers warn that the Afghan government lacks the resources to adequately maintain the roads built with international funds. Many of the roads built have fallen into disrepair and are marked with major potholes, as discussed in detail in the October 2016 SIGAR audit report. As of July 2019, USAID does not appear to have any ongoing roadbuilding projects. Electricity. Considerable U.S. efforts in the energy sector since 2001 arguably have yielded mixed results. According to the January 2019 SIGAR report, total U.S. disbursements for power projects total over $2 billion, including $1.5 billion in USAID Economic Support Funds (ESF) since FY2002 (with $626 million in active power-infrastructure programs) and about $565 million in DOD Afghanistan Infrastructure Funds. While the percentage of Afghans with access to electricity has increased due to these and other development efforts, by most estimates a majority remains without grid-connected power. Afghanistan has a complex power system, operating in nine separate, unconnected grids, and is still largely dependent on the sale of surplus power from its neighbors, importing 80% of its energy. The vast majority (95%) of Afghanistan's domestically generated electricity is provided by hydropower. The United States has worked to create a more independent and cohesive system by assisting in the development of indigenous power production and management capabilities and by connecting Afghanistan's disparate power grids. Telecommunications. Several Afghan telecommunications firms (e.g., Roshan, MTN, and Afghan Wireless) have formed since 2002 and more than $2 billion in private investment has flowed into this sector, according to a 2016 SIGAR report. Cellular networks now reach approximately 90% of Afghans, and the Asia Foundation found in 2018 that over 89% of respondents reported that their household owned at least one mobile phone, up from 52% in 2009. This rapid development, aided by tens of millions of dollars in support from DOD, State, and USAID, has made telecommunications a key driver of the Afghan economy. Various observers have assessed in recent years that the sector contributes millions in tax revenues to the Afghan government, and provides employment to tens of thousands of Afghans, though doubts about its sustainability exist. Agriculture has always been key to Afghanistan's economy and stability; even though only about 12% of Afghanistan's land is arable, about 70% of Afghans live in rural areas. Non-opium agriculture contributes about 25% of Afghanistan's GDP (down from around 70% as late as the mid-1990s). Because most GDP gains since 2001 have come from other sectors, experts have identified agriculture as a key potential growth area. Agriculture continues to employ around 40% of Afghanistan's labor force, but policies to encourage the growth of such subindustries as intensive livestock production and horticultural crops could double agriculture GDP and add more than a million jobs in that sector over the next decade, according to the World Bank. U.S. policy to boost Afghanistan's agriculture sector is aimed not only at reducing drug production but also at contributing to economic growth. Prior to the turmoil that engulfed Afghanistan in the late 1970s, Afghanistan was a major exporter of agricultural products. Since 2002, USAID has disbursed more than $2 billion on almost 60 agriculture programs for such goals as increasing access to markets and providing alternatives to poppy growing, according to July 2018 SIGAR audit. According to a 2019 factsheet, USAID programs have facilitated over $845 million in increased sales of agriculture products, supporting the equivalent of 647,000 full time equivalent jobs. Afghanistan's mining sector has been largely dormant since the Soviet invasion. Some Afghan leaders complain that not enough has been done to support the potentially lucrative mining sector. The issue became more prominent in June 2010 when the DOD Task Force for Business and Stability Operations announced, based on surveys, that Afghanistan may have untapped minerals, including copper, iron, lithium, gold, and precious gems, worth over $1 trillion. Some experts assert that U.S. hopes for this sector as a driver of long-term economic sustenance for Afghanistan are misplaced. Instability and poor infrastructure are the most important impediments to the development of this sector, but questions about the legality of some projects, and the overall legal framework, have led some to question whether profits will actually support the Afghan people. Years of war have stunted development of a hydrocarbons energy sector in Afghanistan. The country has no hydrocarbons export industry, only a small refining sector that provides some of Afghanistan's needs for gasoline or other fuels. Nevertheless, Afghanistan's prospects in this sector appeared to brighten by the 2006 announcement of an estimated 3.6 billion barrels of oil and 36.5 trillion cubic feet of gas reserves, amounts that could make Afghanistan self-sufficient in energy or even able to export. USAID has funded test projects to develop gas resources in northern Afghanistan, including a $120 million contribution to the $580 million Sheberghan Gas Development Project, which consisted of a number of gas wells and, in partnership with the private sector, building a 200 megawatt gas-fired thermal plant and associated transmission lines in northern Afghanistan. Afghanistan's geographic location could also let it become a transit hub for Central Asian natural gas. The most important current gas project is the Turkmenistan-Afghanistan-Pakistan-India, or TAPI, pipeline. In 2002, the leaders of Turkmenistan, Afghanistan, and Pakistan signed preliminary agreements on a gas pipeline that would originate in southern Turkmenistan and pass through Afghanistan to Pakistan, with possible extensions into India. The leaders of the four countries involved formally \"broke ground\" on the pipeline at a ceremony in Turkmenistan in 2015, and work on the Afghan section began in February 2018. Afghanistan stands to gain access to gas, as well as earn hundreds of millions annually in transit fees, but some describe claims of progress on the project as \"dubious,\" and point to security concerns along the pipeline's intended route through Afghanistan, among other potential issues, as causes for skepticism. With more than 60% of Afghans under the age of 24, strengthening the education system is recognized as key to Afghanistan's future but, as in other areas, prospects depend largely on security dynamics. While most sources (including USAID and others) give a figure of 9 million children enrolled in school, the January 2017 SIGAR report relays a December 18, 2016 interview with the Afghan Minister of Education, who said that \"after adjusting numbers for more than 3 million permanently absent registered students from school records, only 6 million students were actually attending classes in Afghanistan.\" Continuing Taliban attacks on schools have caused some (\"over 1,000\" according to a January 2017 address by the acting Minister of Education) to close and hindered efforts to enroll Afghan students. Attacks tripled in 2018, according to a UNICEF report (though at least some of that rise is attributable to violence surrounding the 2018 parliamentary elections, during which many schools were used as polling centers). U.S. policy has been to encourage Afghanistan's trade relationships, particularly those with its neighbors. Afghanistan took a major step forward on building its trade relationships with its accession to the World Trade Organization (WTO) in July 2016, over a decade after it first applied. USAID has funded a number of projects to increase the competitiveness of Afghan products in international markets, which have shown some results; the value of Afghan exports rose from $600 million in 2016 to an estimated $1 billion in 2018. In September 2004, the United States and Afghanistan signed a bilateral trade and investment framework agreement (TIFA), and most of Afghanistan's exports are eligible for duty free treatment under the enhanced Generalized System of Preferences (GSP) program. Still, Afghanistan is a relatively minor trading partner of the United States, with U.S. exports totaling $1.2 billion in 2018 and imports from Afghanistan totaling just $29 million. U.S. assistance has also been used to promote the broader U.S. policy of enhancing and protecting human rights in Afghanistan and promoting the government's adherence to international standards of human rights practices. Like previous years' State Department human rights reports on Afghanistan, the report for 2018 attributes most of Afghanistan's human rights deficiencies to overall lack of security, loose control over the actions of Afghan security forces, corruption, and cultural norms such as the preclusion of male-female interactions. Successive State Department reports cite torture, rape, and other abuses by officials, security forces, detention center authorities, and police. Afghanistan has a free press, and Afghans freely express a variety of views, including criticism of the central government, in Afghanistan's numerous independent media outlets (though local media may be more constrained by local powerbrokers). Journalists have been targeted by insurgent groups, including in an April 30, 2018, suicide attack that killed nine reporters and photographers in Kabul. Numerous peaceful protests, marches, and sit-ins over the past year are a testament to the government's general respect for freedom of assembly. Several other issues related to the status of human rights in Afghanistan are outlined below. Freedoms for women have expanded since the fall of the Taliban. The advancement of Afghan women has been a stated U.S. policy interest and goal of U.S. assistance efforts, though it is unclear how sustainable these gains are, particularly given ongoing U.S.-Taliban negotiations. Despite these gains, and an expenditure by the U.S. government of roughly $1 billion on programs for which the advancement of women was a component, the U.N. still ranks Afghanistan 163 rd of 164 countries on its 2017 gender development index. Potential changes to the status of women in Afghanistan under a prospective political settlement have drawn scrutiny and speculation from Afghans and outside observers alike. Selected Metrics Female literacy: 6% (2001) vs. 16% (2017). Girls in school: 3.5 million enrolled, 2.2 million out-of-school. The Taliban claim to have lifted the ban on educating girls, and in Taliban-controlled areas some girls are attending primary school. Civil service: 22% female (30% target level set in the Tokyo Mutual Accountability Framework). Women in parliament: Article 83 of the Afghan constitution directs that on average at least two women be elected to the lower house of parliament from each of Afghanistan's 34 provinces, creating a quota of 68 women out of 250 seats (about 27%). One third of the upper house of parliament (34 of 102 seats) is selected by the president, and Article 84 directs that half of these seats (17) be filled by women. As of November 2018, 4,735 women serve in the Afghanistan National Defense and Security Forces (ANDSF), making up slightly less than 2% of the force. Afghan Government E fforts The Afghan government pursues a policy of promoting equality for women under its National Action Plan for Women of Afghanistan (NAPWA) as required by the Tokyo Mutual Accountability Framework. Afghanistan has a Ministry of Women's Affairs, the primary function of which is to promote public awareness of relevant laws and regulations concerning women's rights. It plays a key role in trying to protect women from domestic abuse by overseeing the operation of as many as 29 women's shelters across Afghanistan. Despite gains since 2001, numerous abuses, such as denial of educational and employment opportunities, forced marriage, and honor killings, continue primarily because of conservative traditions. On August 6, 2009, then-President Karzai issued, as a decree, the \"Elimination of Violence Against Women\" (EVAW) law that makes many of the practices mentioned above unlawful. Efforts by the National Assembly to enact the EVAW in 2010 and in 2013 failed due to opposition from religious conservatives. While prosecutions of abuses against women are increasingly obtaining convictions, a relatively small percentage of reports of violence against women are registered with the judicial system; about one-third of those proceed to trial. President Ghani has signaled his support for women's rights by publicly highlighting the support he receives from his wife, despite the Afghan cultural taboo about mentioning wives and female family members in public. Ghani nominated a woman to Afghanistan's Supreme Court, but the National Assembly rejected her nomination in July 2015. He has also appointed two female governorsâone more than during Karzai's presidencyâ and three (of 25) cabinet ministers. In February 2018, hundreds of Afghan women gathered at a conference in Kabul to urge Ghani's government to reject any potential peace deal that does not safeguard women's rights. While women are not included in the current U.S.-Taliban negotiations, they comprise 26% of Afghan High Peace Council, and 20% of provincial peace councils, which lead local peacebuilding efforts. A number of women participated in July 2019 talks between Taliban and Afghan representatives (including some government officials who attended in a personal capacity). U . S . Policy Successive SIGAR audits and reports have identified issues with U.S.-funded programs to support Afghan women. According to SIGAR, Congress appropriated $627 million to address the needs of Afghan women and girls from FY2003 through FY2010; SIGAR reported at least $64.8 million in the three subsequent fiscal years but stated that the \"full extent of [DOD, State, and USAID] efforts was unclear.\" In late 2018, SIGAR assessed that the most prominent and highly funded initiative in this area, USAID's Promoting Gender Equity in National Priority Programs (Promote), is hindered by insufficient evaluation efforts and noted that it was \"unclear whether the Afghan government has the institutional capacity to continue Promote's activities once the program ends.\" For several successive years, including in its 2018 annual report, the U.S. Commission on International Religious Freedom (USCIRF) has identified Afghanistan as a \"Tier 2\" country, meaning that the government \"engaged in or toleratedâ¦serious\" violations that are \"characterized by at least one of the elements of the 'systematic, ongoing, and egregious'\" standard. According to USCIRF, \"aspects of the country's constitution and other laws are contrary to international standards for freedom of religion.\" Members of minority religions, including Christians, Sikhs, Hindus, and Baha'i's, often face discrimination, but members of these communities also sometimes serve at high levels of government. According to USCIRF, the number of Hindus and Sikhs in Afghanistan has dwindled from nearly 200,000 in 1992 to between 3,000 and 7,000 today. These groups were targeted in a July 2018 ISKP attack against a campaign rally in Jalalabad that killed more than 20, including a Sikh candidate for parliament. ISKP has also aggressively targeted Afghanistan's Shia minority (10-20% of the population), most of which are ethnic Hazaras. Afghan Shia leaders appreciated the July 2009 enactment of a \"Shia Personal Status Law\" that gave Afghan Shias the same degree of recognition as the Sunni majority, and provided a legal framework for Shia family law issues. Some rights groups characterized the law as formalizing discrimination against Shia women. Afghanistan was ranked as \"Tier 2\" in the State Department Trafficking in Persons Report for 2018, a continuation of its 2017 ranking and an improvement from 2016 when Afghanistan was ranked as \"Tier 2: Watch List\" on the grounds that the Afghan government was not complying with minimum standards for eliminating trafficking and had not demonstrated increased efforts against trafficking since the prior reporting period. As part of the government's significant efforts to combat trafficking, the 2018 report cites a revision to the penal code that increases penalties for human trafficking and a new training manual for combating trafficking. Nevertheless, the report says that the government did not report any new prosecutions or convictions of officials involved in trafficking, despite credible allegations. The report asserts that Afghanistan is a source, transit, and destination country for trafficked persons, though trafficking within Afghanistan is more common than trafficking across its borders. Related abuses prevalent in Afghanistan include forced or bonded labor; sex trafficking, including for bacha bazi , a practice in which wealthy men use groups of young boys for social and sexual entertainment (see textbox below); and the recruitment and use of children in combat. Insurgents and terrorist groups have demonstrated considerable capabilities in 2018 and 2019, throwing into sharp relief the daunting security challenges that the Afghan government and its U.S. and international partners face. At the same time, prospects for a negotiated settlement have risen, driven by direct U.S.-Taliban talks, though the prospects for such negotiations to deliver a settlement are uncertain. Those talks currently are centered on the U.S. and Taliban priorities, namely counterterrorism and the withdrawal of foreign troops, respectively. Special Representative for Afghan Reconciliation Khalilzad and other U.S. officials maintain that facilitating an intra-Afghan settlement is also a U.S. objective, but the means by which the U.S. could force the Taliban into dialogue with the Afghan government (let alone guarantee the Taliban's adherence to certain political or other conditions) is unclear, especially after a U.S. withdrawal from the country. Observers differ on whether or not the Taliban pose an existential threat to the Afghan government, given the current military balance, but generally agree that alterations to U.S. troop deployments or, perhaps more importantly, U.S. funding for the ANDSF, would pose a challenge to the Afghan government. As President Ghani said in 2018, \"[W]e will not be able to support our army for six months without U.S. [financial] support.\" Increased political instability, fueled by questions about the central government's authority and competence and rising ethnic tensions, may pose as serious a threat to Afghanistan's future as the Taliban does. A potential collapse of the Afghan military and/or the government that commands it could have significant implications for the United States, particularly given the nature of negotiated security arrangements. Regardless of how likely the Taliban would be to gain full control over all, or even most, of the country, the breakdown of social order and the fracturing of the country into fiefdoms controlled by paramilitary commanders and their respective militias may be plausible, even probable; Afghanistan experienced a similar situation nearly thirty years ago during its post-Soviet civil war. Under a more unstable future scenario, alliances and relationships among extremist groups could evolve, as could security conditions, offering new opportunities to transnational terrorist groups, whether directly or by default. Human rights would be likely to suffer as well. In light of these uncertainties, Members of Congress and other U.S. policymakers may reassess notions of what success in Afghanistan looks like, examining how potential outcomes might harm or benefit U.S. interests, and the relative levels of U.S. engagement and investment required to attain them. The present condition, which is essentially a stalemate that has endured for several years, could persist; some argue that the United States \"has the capacity to sustain its commitment to Afghanistan for some time to come\" at current levels. In May 2019, former National Security Advisor H.R. McMaster compared the U.S. effort in Afghanistan to an \"insurance policy\" against the negative consequences of the government's collapse. Other analysts counter that \"the threat in Afghanistan doesn't warrant a continued U.S. military presence and the associated costsâwhich are not inconsequential.\" The Trump Administration has described U.S. policy in Afghanistan as \"grounded in the fundamental objective of preventing any further attacks on the United States by terrorists enjoying safe haven or support in Afghanistan.\" For years, some analysts have challenged that line of reasoning, describing it as a strategic \"myth\" and arguing that \"the safe haven fallacy is an argument for endless war based on unwarranted worst-case scenario assumptions.\" Some of these analysts and others dismiss what they see as a disproportionate focus on the military effort, citing evidence that \"the terror threat to Americans remains low\" to argue that \"a strategy that emphasizes military power will continue to fail.\" Core issues for Congress in Afghanistan include Congress's role in authorizing, appropriating funds for, and overseeing U.S. military activities, aid, and regional policy implementation. Additionally, Members of Congress may examine how the United States can leverage its assets, influence, and experience in Afghanistan, as well as those of Afghanistan's neighbors and international organizations, to encourage more equal, inclusive, and effective governance. Congress also could seek to help shape the U.S. approach to talks with the Taliban, or to potential negotiations aimed at altering the Afghan political system, through oversight, legislation, and public statements. How Afghanistan fits into broader U.S. strategy is another issue on which Members might engage, especially given the Administration's focus on strategic competition with other great powers. Some recognize fatigue over \"endless wars\" like that in Afghanistan but argue against a potential U.S. retrenchment that could create a vacuum Russia or China might fill. Others describe the U.S. military effort in Afghanistan as a \"peripheral war,\" and suggest that \"the billions being spent on overseas contingency operation funding would be better spend on force modernization and training for future contingencies.\" Appendix A. Historical Timeline, 1747-2001 This timeline briefly describes the major political and military events that have shaped Afghanistan's modern trajectory from the Durrani Empire to the U.S. invasion in 2001. Appendix B. Soviet War in Afghanistan The Soviet Union's invasion of, and withdrawal from, Afghanistan has emerged as a frequently referenced possible historical analogue for the U.S. experience there. While there are clear and dramatic differences between the U.S. and Soviet experiences in Afghanistan, they also share some similarities that are of potential value in assessing various U.S. policy options. The Soviet Union deployed troops into Afghanistan in December 1979 to buttress the communist People's Democratic Party of Afghanistan (PDPA) government, which had been established after the 1978 Saur (April) Revolution. Growing instability in Afghanistan, including a nascent grassroots popular uprising against the PDPA's reform program and factional fighting within the PDPA, led Soviet leaders to order the initial invasion of about 80,000 Soviet troops, which quickly took control of urban centers, major lines of communication, and other strategic points. Soviet troops, which numbered over 100,000 at their peak, partnered with Afghan government forces and various paramilitaries but generally bore the brunt of fighting against armed opposition groups, collectively known as the mujahideen . Mujahideen groups, supported by Pakistan, the United States, Saudi Arabia, and others, led a guerilla campaign against Soviet and Afghan government forces characterized by sabotage operations, attacks against military and government sites, and attacks against some civilian targets. The Soviet effort was not just military in nature. The USSR also \"sent thousands of technical specialists and political advisors\" to Afghanistan to \"help stabilize the government and broaden its base of support,\" though these missions were often undermined by \"infighting and lack of coordination among advisers and other Soviet officials.\" By 1985, newly installed Soviet leader Mikhail Gorbachev had decided to seek a withdrawal from Afghanistan. Soviet military losses were substantial (around 13,000 Soviet troops killed and 40,000 wounded over the course of the decade-long intervention), but experts disagree about the extent to which these casualties motivated the decision to withdraw. Other reasons cited include international isolation, the economic cost of the war effort, the potential for political unrest within the USSR, and the greater importance Gorbachev placed on his reform program. Increasingly, Soviet attention turned to both pressuring squabbling Afghan leaders to unify and building up the Afghan military, which suffered from high rates of desertion, attrition, and casualties. U.N.-mediated talks in Geneva between delegations from the governments of Afghanistan (supported by the USSR) and Pakistan (supported by the U.S.) began in March 1982 and continued fitfully until the signing of the Geneva Accords in April 1988. The Soviet withdrawal began in May, per the Accords, and finished on February 15, 1989, when the last Soviet soldier crossed back into the Soviet Union (now Uzbekistan) from Afghanistan. In late 1988, some Soviet officials advocated maintaining a residual force in Afghanistan, citing violations of the Geneva Accords by Pakistan, and the withdrawal was briefly paused. However, the United States and Pakistan, perceiving that the Soviet impulse to pull out would trump concerns about the post-withdrawal political situation, maintained aid to the mujahideen and \"the bluff failed to work.\" Mujahideen forces, as a nonstate movement, were excluded from U.N. negotiations and continued to receive support from the United States, Pakistan, and other backers after the Soviet withdrawal, as the Afghan government continued to receive military and financial support from Moscow. With this support, the Afghan government (led by Najibullah Ahmadzai, commonly known by his first name) defied expectations among some in the U.S. that it would quickly collapse after the Soviet pullout and maintained its position for several years. In September 1991, as the Soviet Union was being engulfed in a major political crisis that would eventually lead to its dissolution in December 1991, Soviet and U.S. officials announced a final cutoff in their countries' support to their respective clients, effective January 1992. With the help of key defections including current Vice President Abdul Rashid Dostum, m ujah i deen and other Afghan groups displaced Najibullah in April 1992, and the country sank into a civil war from which the Taliban would emerge and eventually take control of most of the country. Upon their entry to Kabul in September 1996, one of the Taliban's first acts was to torture and publicly hang Najibullah. Appendix C. U.S. Reconstruction Assistance to Afghanistan (SIGAR)", "summary": "Afghanistan has been a significant U.S. foreign policy concern since 2001, when the United States, in response to the terrorist attacks of September 11, 2001, led a military campaign against Al Qaeda and the Taliban government that harbored and supported it. In the intervening 18 years, the United States has suffered approximately 2,400 military fatalities in Afghanistan, with the cost of military operations reaching nearly $750 billion. Congress has appropriated approximately $133 billion for reconstruction. In that time, an elected Afghan government has replaced the Taliban, and most measures of human development have improved, although Afghanistan's future prospects remain mixed in light of the country's ongoing violent conflict and political contention. Topics covered in this report include: Security dynamics . U.S. and Afghan forces, along with international partners, combat a Taliban insurgency that is, by many measures, in a stronger military position now than at any point since 2001. Many observers assess that a full-scale U.S. withdrawal would lead to the collapse of the Afghan government and perhaps even the reestablishment of Taliban control over most of the country. Taliban insurgents operate alongside, and in periodic competition with, an array of other armed groups, including regional affiliates of Al Qaeda (a longtime Taliban ally) and the Islamic State (a Taliban foe and increasing focus of U.S. policy). U.S. military engagement . The size and goals of U.S. military operations in Afghanistan have evolved over the course of the 18-year war, the longest in American history. Various factors, including changes in the security situation and competing U.S. priorities, have necessitated adjustments. While some press reports indicate that the Trump Administration may be considering at least a partial withdrawal, U.S. officials maintain that no decision has been made to reduce U.S. force levels. Regional context . Afghanistan has long been an arena for, and victim of, regional and great power competition. Pakistan's long-standing, if generally covert, support for the Taliban makes it the neighbor whose influence is considered the most important. Other actors include Russia and Iran (both former Taliban foes now providing some measure of support to the group); India (Pakistan's main rival); and China. Reconciliation efforts. U.S. officials have long contended that there is no military solution to the war in Afghanistan. Direct U.S.-Taliban negotiations, ongoing since mid-2018, on the issues of counterterrorism and the presence of U.S. troops could offer greater progress than past efforts. However, U.S. negotiators caution that the Taliban's continued refusal to negotiate with the Afghan government could preclude the stated U.S. goal of a comprehensive settlement. Afghan governance and politics. Afghanistan's democratic system has achieved some success since its post-2001 establishment, but corruption, an evident failure to provide sufficient security and services, and infighting between political elites has undermined it. The unsettled state of Afghan politics complicates ongoing efforts to negotiate a settlement: the presidential election has been postponed twice and is now scheduled for September 2019. U.S. and foreign assistance. Military operations have been complemented by large amounts of development assistance; since 2001, Afghanistan has been the largest single recipient of U.S. aid. Most of that assistance has been for the Afghan military (a trend particularly pronounced in recent years), but aid has also supported efforts to build Afghan government capacity, develop the Afghan economy, and promote human rights.", "document_type": "crs"}
{"report": "This report discusses twenty criminal law cases the United States Supreme Court decided during its 2018 term (Term). Twelve of the cases addressed sentencing issues: capital punishment, violent crime enhancements, supervised release, and excessive fines. Five featured the Court's analysis of pretrial questions associated with drunk driving, double jeopardy, and suits against law enforcement officers. Two decisions sought to discern congressional intent in cases involving firearms and sex offenders. An ineffective of assistance of counsel decision rounded out the Term. The High Court largely relied on existing case law to dispense with capital punishment cases on its 2018 docket. Thus, it held: (1) The prosecution's repeated, racially motivated misconduct during the defendant's six trials for the same murders precluded a creditable Batson finding that the prosecutor's challenge of an African-American prospective juror was based on race-neutral factors ( Flowers v. Mississippi ); (2) Ford and Panetti barred executing a death row inmate with a deteriorating mental condition that prevented him from understanding that he was being punished for his misconduct, regardless of the cause of his condition, but not if he could merely no longer remember the facts surrounding his offense ( Madison v. Alabama ); (3) A state's resubmission of previously rejected intellectual-disability analysis did not change the result ( Moore v. Texas ); (4) The \"clearly established Supreme Court precedent\" exception to the bar on federal habeas relief for state inmates only applies to precedents in place at the time of state proceedings ( Shoop v. Hill ); and (5) The Baze-Glossip standards apply with equal force both to a general challenge to a method of execution and to an \"as-applied\" challenge based on an inmate's individual circumstances ( Bucklew v. Precythe ). Holding : \"[T]he trial court at Flowers' sixth trial committed clear error in concluding that the State's peremptory strike of [a] black prospective juror â¦ was not motivated in substantial part by discriminatory intent.\" Background : State authorities prosecuted Flowers six times for an offense in which a furniture store owner and three employees were shot to death. The state supreme court reversed Flowers' first and second convictions \"due to numerous instances of prosecutorial misconduct.\" The state supreme court overturned Flowers' third conviction on the grounds of discriminatory jury selection. The fourth and fifth trials ended in hung juries. A sixth jury convicted Flowers of murder and sentenced him to death. Flowers argued that the prosecutor in his sixth trial used peremptory challenges in a racially discriminatory manner. Peremptory challenges allow prosecutors to have prospective jurors dismissed without having to explain the reason for the challenge. A prosecutor may not exercise peremptory challenges in a racially discriminatory manner. The Supreme Court in Batson v. Kentucky established a three-part test to assess claims of racially discriminatory use of peremptory challenges. First, the accused must make a prima facie showing that the challenge was made for discriminatory reasons. Second, the prosecutor has the burden of proving a race-neutral justification for the challenge. Third, the trial court must determine whether the prosecutor has satisfied his burden. The Mississippi Supreme Court considered the prosecutor's peremptory challenges to be race neutral based on valid and not pretextual reasons. The U.S. Supreme Court initially returned Flowers to the state courts for reconsideration in light of its decision in Foster v. Chatman . In Foster , the High Court held that the record demonstrated that the state judiciary had failed the third Batson testâdetermining whether the state had satisfied the standard that its peremptory strikes be race-neutral. On remand, the Mississippi Supreme Court maintained its earlier assessmentâFlowers' trial court had not erred in finding that the prosecution's peremptory challenges were race-neutral. Supreme Court : The U.S. Supreme Court again reversed and returned the case to the Mississippi courts. The Court, speaking through Justice Kavanaugh, declared \"[f]our critical facts, taken together, require reversal: First , in the six trials combined, the State employed its peremptory challenges to strike 41 of the 42 black prospective jurors that it could have struck. â¦ Second , in the most recent trial, the sixth trial, the State exercised peremptory strikes against five of the six black prospective jurors. Third , at the sixth trial, in an apparent attempt to find pretextual reasons to strike black prospective jurors, the State engaged in dramatically disparate questioning of black and white prospective jurors. Fourth , the State then struck at least one black prospective juror, Carolyn Wright, who was similarly situated to white prospective jurors who were not struck by the State. Justice Alito concurred because of the \"unique combinations of circumstances present.\" Justices Thomas and Gorsuch dissented on the grounds that the prosecutor had presented sufficient race-neutral reasons for the challenges. Holding : \"First, under Ford and Panetti , the Eighth Amendment may permit executing Madison even if he cannot remember committing his crime. Second, under those same decisions, the Eighth Amendment may prohibit executing Madison even though he suffers from dementia, rather than delusions. The sole question on which Madison's competency depends is whether he can reach a 'rational understanding' of why the State wants to execute him.\" Background : The Supreme Court's Ford and Panetti decisions lie at the heart of the Court's decision in Madis on . In Ford v. Wainwright , the Court held that the Eighth Amendment prohibits executing a defendant who is insane. In Panetti v. Quarterman , the Court held that the state may not execute a death-row inmate \"whose mental illness deprives him of 'the mental capacity to understand that [he] is being executed as a punishment for crime.\" During a dispute with his former girlfriend, Madison murdered a police officer. He was convicted and sentenced to death. As his case passed through the various stages of state and federal review, Madison suffered a series of strokes leaving him with a continuously eroding mental condition that he asserted precluded his execution. After Alabama set Madison's execution date, he petitioned the state court for a stay on the grounds of his mental health. The state court denied his petition. Madison then sought federal habeas corpus relief. The district court concluded that the state court had correctly interpreted federal law. The U.S. Court of Appeals for the Eleventh Circuit, however, held that if Madison could not remember the facts of his crime, he could not understand the link between his crime and the decision to execute him. The Supreme Court reversed and remanded the case with the observation that \"[n]either Panetti nor Ford 'clearly established' that a prisoner is incompetent to be executed because of a failure to remember his commission of the crime, as distinct from a failure to rationally comprehend the concepts of crime and punishment as applied in his case.\" Back in state court, the government contended that: (1) neither Madison's memory loss nor any dementia barred his execution and (2) he had failed to prove that he was either delusional or psychotic which might have provided the grounds to stay his execution. The state court agreed and Madison asked the Supreme Court for review. Supreme Court : Speaking for the Court, Justice Kagan emphasized that the critical question was whether Madison lacked the mental capacity to \"reach a 'rational understanding' of why the State wants to execute him.\" The Court returned the case to state court to determine with a reminder that Madison's loss of memory, alone, does not bar his execution but a want of mental capacity would bar to execution regardless of whether the incapacity resulted from dementia or delusion. In dissent, Justice Alito, joined by Justices Gorsuch and Thomas, objected that the case should be resolved solely on the basis for which certiorari was granted: \"Does the Eighth Amendment prohibit the execution of a murderer who cannot recall committing the murder for which the death sentence was imposed?\" Holding : The Texas Court of Criminal Appeals again erred in assessing and denying a death-row inmate's claim of intellectual disability. Background : In 1980, a Texas state court convicted Moore and sentenced him to death for a murder committed during an attempted robbery. In 2002, the Supreme Court held in Atkins that the Eighth Amendment bars executing an intellectually-disabled death row inmate. In 2014, the Court in Hall held unconstitutional a \"rigid rule\" under which no one with an IQ above 70 could be considered \"intellectually-disabled\" for death penalty purposes. In the same year, a Texas state habeas court found Moore to be intellectually disabled and recommended that he be declared ineligible for the death penalty. The Texas Court of Criminal Appeals declined to do this in Moore I . Moore I : The Texas Court of Criminal Appeals faulted the state habeas court for failing to apply the Texas appellate court's Briseno standard for intellectual disability and applying the American Association on Intellectual and Developmental Disabilities' [AAIDD] standards instead. The Supreme Court vacated and remanded the case, faulting the Texas Court of Criminal Appeals' for, among other things, relying on unadjusted IQ scores in spite of the Court's Hall decision and using a lay assessment of intellectual disability in its Briseno standard. Moore II : On remand, the Texas Court of Criminal Appeals again concluded that Moore was not intellectually disabled for capital punishment purposes. The Supreme Court reversed and remanded the case to the Texas Court of Criminal Appeals with a per curiam opinion, which reiterated the standard that the lower court should use and identified instances in which the Texas court had applied the standard improperly. â The Supreme Court explained that to designate a death row inmate to be ineligible for execution, \"a court must see: (1) deficits in intellectual functioningâprimarily a test related criterion; (2) adaptive deficits, 'assessed using both clinical evaluation and individualized â¦ measures;' and (3) the onset of these deficits while the defendant was still a minor.\" The Supreme Court cited \"at least\" five instances of the lower court misapplying the standard: First, the Texas Court of Criminal Appeals \"overemphasized Moore's perceived adaptive strengths. But the medical community,\" we said, \"focuses the adaptive-functioning inquiry on adaptive deficits.\" Second, the appeals court \"stressed Moore's improved behavior in prison.\" But \"[c]linicians â¦ caution against reliance on adaptive strengths developed \"in a controlled setting,\" as a prison surely is. Third, the appeals court \"concluded that Moore's record of academic failure â¦ childhood abuse [,] and suffering â¦ detracted from a determination that his intellect and adaptive deficits were related.\" But \"in the medical community,\" those \"traumatic experiences\" are considered \"' risk factors' for intellectual disability.\" Fourth, the Texas Court of Criminal Appeals required \"Moore to show that his adaptive deficits were not related to 'a personality disorder.' But clinicians recognize that the \"existence of a personality disorder or mental-health issue â¦ is 'not evidence that a person does not also have intellectual disability.'\" Fifth, the appeals court directed state courts, when examining adaptive deficits, to rely upon certain factors set forth in a Texas case called Ex parte Briseno . â¦ We criticized the use of these factors both because they had no grounding in prevailing medical practice, and because they invited \"lay stereotypes\" to guide assessment of intellectual disability. Emphasizing the Briseno factors over clinical factors, we said, \"creat[es] an unacceptable risk that person with intellectual disability will be executed.\" Chief Justice Roberts, who had dissented earlier, concurred in the decision as the arguments the Court rejected earlier were no more persuasive when presented a second time. Justice Alito, joined by Justices Thomas and Gorsuch, contended that the Court had given the lower court insufficient guidance in Moore I and that the case should be returned with clearer instructions. Holding : Federal courts may not grant state prisoners habeas relief based on \"clearly established\" Supreme Court precedent when the precedent is established after the state proceedings concluded. Background : In 1986, an Ohio state court convicted Hill, and sentenced him to death, for kidnaping, raping, and murdering a 12-year old. Hill petitioned for federal habeas corpus relief following his unsuccessful state court appeals. In 2002, the U.S. Court of Appeals for the Sixth Circuit (Sixth Circuit) returned Hill's habeas case to state court to address Hill's claim that his mental retardation prevented his execution in light of Atkins . The state courts found Hill competent for execution, and Hill again filed for federal habeas relief. Ordinarily, a federal court may not grant a state prisoner habeas relief unless the state courts have failed to follow clearly established Supreme Court precedent. Although Moore I occurred after the state court proceedings, the Sixth Circuit thought Moore I showed that Atkins was \"clearly established.\" Supreme Court : The Sixth Circuit's reasoning did not convince the Supreme Court. The Court's per curiam opinion noted that following Atkins , the Supreme Court continued to elaborate on Atkins in both H a ll and Moore I . In addition, the Court noted the Sixth Circuit's use of Moore I 's analysis in its proceedings and opinion, concluding that, \"[b]ecause the reasoning of the Court of Appeals leans so heavily on Moore [I] , its decision must be vacated.\" Holding : A death-row inmate challenging the state's method of execution must show that the state's method involves a risk of severe pain and that a feasible, readily available alternative method will significantly reduce the risk of pain. The Supreme Court reasoned, \"[E]ven if execution by nitrogen hypoxia were a feasible and readily implemented alternative to the State's chosen method, Mr. Bucklew has still failed to present any evidence suggesting that it would significantly reduce his risk of pain.\" Background : In 1996, Bucklew stole a car; kidnapped, beat, and raped his former girlfriend; murdered a man from whom she had sought refuge; attacked her mother with a hammer; and wounded an officer during the shootout that lead to his capture. Having exhausted his direct appeals and opportunities for collateral review, Bucklew sought a preliminary injunction at the eleventh hour to block his execution, claiming that an unusual medical condition would render the state's method of execution particularly painful and therefore uniquely cruel and unusual in violation of the Eighth Amendment. The federal district court granted the state's motion for summary judgment and the U.S. Court of Appeals for the Eighth Circuit affirmed. Supreme Court : The Supreme Court agreed. A decade earlier, Chief Justice Roberts and two colleagues in Baze v. Rees identified an Eighth Amendment standard governing challenges to methods of execution. First, the state's method must involve a risk of severe pain. Second, \"[t]o qualify, the [proffered] alternative procedure must be feasible, readily implemented, and in fact significantly reduce a substantial risk of severe pain.\" Third, the state must unjustifiably persist in using its more painful method. Justices Thomas and Scalia had concurred in the result, reasoning that \"a method of execution only violates the Eighth Amendment if it is deliberately designed to inflict pain.\" Several years later in Glossip v. Gross , when a second method of execution became more common, the Court applied the same standard (the \"inmates did not show that the risks they identified were substantial and imminent â¦ and â¦ they did not establish the existence of a known and available alternative method of execution that would entail significantly less severe risk.\"). In 2019, Justice Gorsuch, writing for the Court, rejected Bucklew's contention that his unique situation warranted applying a standard other than that formulated in Baze and Glossip . From Justice Gorsuch's perspective, Baze-Glossip established that an Eighth Amendment analysis always involves comparing alternative levels of suffering. Bucklew failed to present evidence of a feasible, readily available alternative execution method or to establish that any such alternative would significantly reduce the risk of severe pain. The four dissenters argued that Glossip's sweeping language regarding its standard's applicability in all cases must be put in context and subject to the kind of exceptions that Bucklew raised. Among other things, the Supreme Court's 2019 violent crime cases explored what constitutes a violent crime with respect to three statutes: 18 U.S.C. Â§ 924(e) (The Armed Career Criminal Act (ACCA)), 18 U.S.C. Â§ 924(c) (the firearm-in-furtherance statute), and 18 U.S.C. Â§ 16 (the general definition statute). These provisions are similar with each having an elements clause and a residual clause. The ACCA defines the term \"violent felony\" as a felony that: (i) has as an element the use, attempted use, or threatened use of physical force against the person of another [the elements clause]; or (ii) is burglary, arson, or extortion, involves use of explosives [the specific offense clause], or otherwise involves conduct that presents a serious potential risk of physical injury to another [the residual clause]. Section 924(c) defines the term \"crime of violence\" to be \"an offense that is a felony and: (A) has as an element the use, attempted use, or threatened use of physical force against the person or property of another, or (B) that by its nature, involves a substantial risk that physical force against the person or property of another may be used in the course of committing the offense. Section 16 defines the term \"crime of violence\" as: (a) an offense that has as an element the use, attempted use, or threatened use of physical force against the person or property of another, or (b) any other offense that is a felony and that, by its nature, involves a substantial risk that physical force against the person or property of another may be used in the course of committing the offense. In 1990, the Supreme Court addressed an ACCA case in Taylor v. United States . Under the ACCA, courts must sentence defendants convicted of federal unlawful possession of a firearm to prison for at least 15 years if the defendant has three or more prior violent felony convictions. Taylor had a prior state burglary conviction in addition to other offenses. The ACCA defines violent felony to include \"burglary,\" which the Court found to mean \"unlawful or unprivileged entry into, or remaining in, a building or structure, with intent to commit a crime.\" To decide whether Taylor's state burglary conviction constituted an ACCA burglary conviction, the Court examined the state burglary statute to determine whether a jury would have to find each element of an ACCA burglary offense. The Court held that Taylor's state burglary conviction did not qualify as an ACCA predicate because his state conviction might not have required proof of each element of the ACCA offense ( e.g ., the state statute covered burglarizing a vehicle, while the ACCA limited burglaries to \"building[s] or structure[s]\"). Following Taylor , the Court declared the ACCA residual clause (\" otherwise involves conduct that presents a serious potential risk of physical injury \") unconstitutionally vague in Johnson v. United States . Three years later in Sessions v. Dimaya , the Court found the residual clause in 18 U.S.C. Â§ 16(b) (\" any offense that â¦ by its nature, involves a substantial risk that physical force against the person or property of another may be used in the course of committing the offense \") to be unconstitutionally vague. In 2019, the Court found that Section 924(c)'s language (\" involves a substantial risk that physical force against the person or property of another may be used in the course of committing the offense \") to be unconstitutionally vague in United States v. Davi s . At the same time, the High Court endorsed penalties under the elements and specific offenses clauses of the ACCA in Stokeling v. United Stat es , United States v. Stitt , and Quarles v. United States . Holding : Section 924(c)'s residual clause is constitutionally vague. Background : In Davis , the government argued that the vagueness issue that permeated the residual clauses in the ACCA and Section 16(b) cases could be avoided if the courts abandoned the categorical approach and examined the facts underlying a particular conviction to determine whether the offense actually involved a substantial risk of injury to another. Davis committed a series of gas station robberies armed with a sawed off shotgun. He was convicted and sentenced for multiple Hobbs Act robbery offenses, possession of a firearm by a felon, and under Section 924(c)'s residual clause. The U.S. Court of Appeals for the Fifth Circuit held the residual clause to be unconstitutionally vague and vacated the Section 924(c) conviction. Supreme Court : The Supreme Court affirmed the Fifth Circuit's conclusion and returned the case to the lower courts for resentencing. The government had urged the Supreme Court to analyze the case using a \"case-specific\" approach rather than the \"categorical\" approach, conceding that the residual clause is unconstitutionally vague under the categorical standard. The Court acknowledged that a case-specific standard would alleviate at least some constitutional concerns. Justice Gorsuch, writing for the majority, explained that Section 924(c)'s text, context, and history preclude a case-specific approach. First, the residual clause refers to an \"offense\" that risks the use of physical force \"by its nature.\" As Justice Gorsuch stated, \"[I]n plain English, when we speak of the nature of an offense, we're talking about 'what an offense normally â¦ entails, not what happened to occur on one occasion.'\" Second, in the federal criminal code, statutes may refer to one of the twin definitions of a \"crime of violence\" in Sections 16 and 924(c). Justice Gorsuch stated: \"To hold, as the government urges, that Â§ 16(b) [the section's residual clause] requires the categorical approach while Â§ 924(c)(3)(B) [that section's residual clause] requires the case-specific approach would make a hash of the federal criminal code.\" Third, Congress initially created the two sections within the same statute. At first, relying on the Section 16 definition for Section 924(c), and soon thereafter copying Section 16's definition into Section 924(c)(3). The Court stated: \"What's more, when Congress copie[d] Â§ 16(b)'s language into Â§ 924(c) in 1986, it proceeded on the premise that the language required a categorical approach. By then courts had, as the government puts it, 'beg[u]n to settle' on the view that Â§ 16(b) demanded a categorical analysis.\" Writing for the four dissenting Justices, Justice Kavanaugh favored a case-specific approach as consistent with Section 924(c)'s language and the principle of constitutional avoidance. Holding : Under the ACCA's specific crimes clause, the generic crime of \"burglary\" covers unlawfully entering, or remaining in, a building or structure, including mobile homes, trailers, tents, or vehicles, if they are designed, adapted, or customarily used for overnight accommodations of individuals. Background : In Stitt, the Supreme Court expanded on Mathis v. United States in which it had held that merely breaking into a plane, boat, or truck may not constitute burglary under the ACCA. In Stitt , the Court said that breaking into a plane, boat, or truck that is designed or adapted for overnight accommodation is ACCA burglary. A federal jury convicted Stitt, who had six previous Tennessee aggravated burglary convictions, on a charge of being a felon in possession of a firearm. The Tennessee aggravated burglary statute outlaws \"burglary of a habitation and defines 'habitation' as 'any structure â¦ which is designed or adapted for the overnight accommodation of persons.' The term 'habitation' includes 'mobile homes, trailers, and tents,' as well as any 'self-propelled vehicle that is designed or adapted for the overnight accommodation of persons and is actually occupied at the time of initial entry by the defendant.'\" The U.S. Court of Appeals for the Sixth Circuit concluded that the Tennessee statute was broader than the ACCA generic burglary definition and consequently could not serve as an ACCA predicate. Sims, whose case the Supreme Court joined with Stitt's, pleaded guilty to a felon-in-possession charge. His record included two ACCA predicate drug convictions and two convictions under the Arkansas residential burglary statute, which provides that residential burglary occurs when an individual \"enters or remains unlawfully in a residential occupiable structure of another person with the purpose of committing â¦ any offense punishable by imprisonment.\" A \"'residential occupiable structure' means a vehicle, building, or other structure: (i)[i]n which any person lives; or (ii) [t]hat is customarily used for overnight accommodation of a person whether or not a person is actually present.\" The U.S. Court of Appeals for the Eighth Circuit \"conclude[d] that Arkansas residential burglary categorically sweeps more broadly than [ACCA] generic burglary. Accordingly, Sims's Arkansas residential burglary convictions do not qualify as ACCA predicate offenses.\" Supreme Court : The Supreme Court unanimously overturned both appellate court decisions. In the opinion for the Court, Justice Breyer pointed out that the ACCA generic burglary definition represented an assumption of Congress's understanding of state law at the time of ACCA's enactment. In 1986, a majority of the states included vehicles, designed or adapted for overnight occupancy, within burglary's location element. He also noted that Congress crafted the ACCA with an eye to the risk of violent confrontations between an intruder and an occupant, a risk little altered by the physical characteristics of the lodging where the clash occurs. Holding : Under the ACCA's specific crimes clause, the generic burglary definition includes entry or remaining in a building or structure with the intent to commit a crime formed while remaining unlawfully present. Background : Grand Rapids, Michigan police officers arrested Quarles after he assaulted his girlfriend and threatened her with a gun. Quarles had previously committed third-degree home invasion and on two occasions committed assault with a deadly weapon. Third-degree home invasion occurs when an individual \"breaks and enters a dwelling or enters a dwelling without permission, and, at any time while he or she is entering, present in, or existing the dwelling, commits a misdemeanor.\" Quarles argued that his home invasion conviction could not count as an ACCA predicate offense because the Michigan statute permitted conviction for conduct that the ACCA did not cover under its generic definition of burglary, which is \"unlawful or privileged entry into, or remaining in, a building or structure, with intent to commit a crime.\" Neither the federal district court nor the U.S. Court of Appeals for the Sixth Circuit accepted Quarles' contention. Supreme Court : The Supreme Court affirmed. Writing for a unanimous Court, Justice Kavanaugh noted that, because \"remaining\" is continuous, the generic definition by condemning unlawfully remaining -in refutes \"that burglary only occurs when the defendant has the intent to commit a crime at the exact mome nt when he or she fir st unlawfully remains in a building or structure.\" Justice Kavanaugh encapsulated the Court's view, stating: The Armed Career Criminal Act does not define the term \"burglary.\" In Taylor , the Court explained that 'Congress did not wish to specify an exact formulation that an offense must meet in order to count as \"burglary\" for enhancement purposes. And the Court recognized that the definitions of burglary \"vary\" among the States. The Taylor Court therefore interpreted the generic term \"burglary\" in Â§ 924(e) in light of: the ordinary understanding of burglary as of 1986 [when the ACCA was enacted]; the States' laws at that time Congress' recognition of the dangers of burglary; and Congress' stated objective of imposing increased punishment on armed career criminals who had committed prior burglaries. Looking at those sources, the Taylor Court interpreted generic burglary under Â§ 924(e) to encompass remaining-in burglary. Looking at those same sources, we interpret remaining in-in burglary under Â§ 924(e) to occur when the defendant forms the intent to commit a crime at any time while unlawfully present in a building or structure. Holding : Conviction under Florida robbery statute qualifies as a crime of violence under the ACCA elements clause. Backgrou nd : Police discovered a firearm in Stokeling's possession while investigating a burglary of a restaurant where he worked. At the time, he had already been convicted of home invasion, kidnapping, and robbery. At sentencing for the federal firearms charge, Stokeling challenged application of the ACCA. He argued that the Florida robbery statute under which he was convicted included \"sudden snatch\" robbery. Robbery under the ACCA's element clause reached only robberies that had \"as an element the use, attempted use, or threatened use of physical force.\" Thus, he contended the broader Florida robbery statute did not qualify as a crime of violence under the ACCA's element clause. The district court agreed, but the U.S. Court of Appeals for the Eleventh Circuit reversed based on its earlier decisions. Supreme Court : The Supreme Court affirmed the Eleventh Circuit's opinion. Writing for the Court, Justice Thomas concluded \"that the elements clause encompasses robbery offenses that require the criminal to overcome the victim's resistance.\" He noted that, as originally crafted, the ACCA recognized only prior robbery and burglary predicate convictions and defined \"robbery\" in terms that \"mirrored the elements of the common-law crime of robbery, which has long required force or violence. At common law, an unlawful taking was merely larceny unless the crime involved 'violence.' And 'violence' was 'committed if sufficient force [was] exerted to overcome the resistance encountered.'\" \"Thus,\" Justice Thomas explained, \"the application of the categorical approach to the Florida robbery statute is straightforward. Because the term 'physical force' in [the] ACCA encompasses the degree of force necessary to commit common-law robbery, and because Florida robbery requires the same degree of 'force,' Florida robbery qualifies as an ACCA-predicate offense under the elements clause.\" Joined by three members of the Court, Justice Sotomayor dissented, writing that the Florida statute allowed conviction based on a minimal level of force while the elements clause did not. Holding : The Eighth Amendment's Excessive Fines Clause is incorporated in the Fourteenth Amendment's Due Process Clause and therefore binds the States. Background : The Eighth Amendment denies federal officials authority to require excessive bail, impose excessive fines, or inflict cruel and unusual punishments. The Due Process Clause of the Fourteenth Amendment imposes on states many Bill of Rights limits on the federal government. The Supreme Court has held that the Due Process Clause incorporates the Eighth Amendment's Cruel and Unusual Punishment Clause. With insurance policy proceeds, Timbs bought a new Land Rover to use in his drug trafficking enterprise. Following his conviction, the state trial court did not order confiscation of the Land Rover, reasoning that the vehicle's forfeiture would violate the Eighth Amendment's Excessive Fines Clause as applied to the state through the Fourteenth Amendment. The Indiana Court of Appeals concurred. The Indiana Supreme Court, however, reversed the trial court's decision because it \"decline[d] to find or assume incorporation until the [U.S.] Supreme Court decides the issue authoritatively,\" which the U.S. Supreme Court did in Timbs v. Indiana . Supreme Court : Writing for the Court, Justice Ginsburg traced the concept of excessive fines from the Magna Carte to the English Bill of Rights to the laws of a majority of the original thirteen states at the Constitution's ratification and finally to the laws of a vast majority of the states at the Fourteenth Amendment's ratification. Justice Ginsburg wrote: Like the Eighth Amendment's proscriptions of \"cruel and unusual punishment\" and \"[e]xcessive bail,\" the protection against excessive fines guards against abuses of government's punitive or criminal-law-enforcement authority. This safeguard, we hold, is \"fundamental to our scheme of ordered liberty,\" with \"dee[p] root[s] in [our] history and tradition.\" The Excessive Fines Clause is therefore incorporated by the Due Process Clause of the Fourteenth Amendment. While the Justices agreed that the Fourteenth Amendment incorporates the Eighth Amendment's Excessive Fines Clause, Justices Thomas and Gorsuch viewed this as resulting from the Privileges and Immunities Clause rather than the Due Process Clause. In the Supreme Court, the State unsuccessfully challenged a feature of Eighth Amendment law, rather than incorporation itself. In Austin v. United States , the Court had held that forfeitures, authorized at least in part with punitive intent and effect, constitute fines for purposes of the Excessive Fines Clause, regardless of whether confiscation occurs by criminal trial or a civil in rem proceeding. The Court declined to re-examine Austin or to endorse less than full incorporation. Holding : By imposing a mandatory term of imprisonment after revoking supervised release based on finding by a preponderance of the evidence that Haymond had breached his conditions of supervised release, a federal court violated the Sixth Amendment's jury trial guarantee and the Fifth Amendment Due Process proof beyond-a-reasonable doubt standard for criminal cases. The Court left for the lower court to determine whether the error was harmless and, if not, the appropriate remedy. Background : Haymond involved the federal supervised release statute, 18 U.S.C. Â§ 3583, which subjects federal inmates on their release from prison to certain conditions usually for a maximum of five years. For certain sex offenses, however, the supervised release term is at least five years and may be for the sex offender's entire life. Under the statute, a court may revoke an individual's supervised release and return him to prison if, by a preponderance of the evidence, the court finds that the individual has violated a condition of his release. Ordinarily, when a court revokes supervised release, it re-imprisons the individual for no longer than his remaining time of supervised release and, in any event, for no longer than five years. Under Subsection 3583(k), a court must sentence a sex offender registrant to re-imprisonment for at least five years when the court revokes his supervised release based on a sex offense. A federal jury convicted Haymond of possessing child pornography, which is punishable by imprisonment for not more than 10 years. The district court sentenced him to 38 months in prison and supervised release for 10 years thereafter. The court conditioned Haymond's supervised release on him committing no further crimes, submitting to periodic polygraph examinations, and consenting to searches by his probation officer. Haymond passed several polygraph tests, suggesting he had neither viewed nor possessed child pornography since his release. Yet, when Haymond's probation officer seized Haymond's cell phone, he found images of child pornography cached there. At his revocation hearing, Haymond presented expert testimony that the material could have been put on his cell phone without his knowledge. Nevertheless, the court concluded that it was more likely than not that Haymond had knowingly possessed child pornography in violation of a condition of his release. The court \"with reservations\" ordered him returned to prison for the mandatory minimum five years. The U.S. Court of Appeals for the Tenth Circuit reversed holding the mandatory minimum feature of the sentencing revocation procedure violates the Fifth and Sixth Amendments. Supreme Court : While five Justice agreed that Subsection 3583(k) is unconstitutional, they did not agree why. Joined by Justices Ginsburg, Sotomayor, and Kagan, Justice Gorsuch concluded that the subsection, which increased Haymond's term of imprisonment, applied a preponderance of the evidence standard, rather than providing for a jury to find guilt beyond a reasonable doubt: Based on the facts reflected in the jury's verdict, Mr. Haymond faced a lawful prison term of between zero and 10 yearsâ¦ But then a judgeâacting without a jury and based only on a preponderance of the evidenceâfound that Mr. Haymond had engaged in additional conduct in violation of the terms of his supervised release. Under Â§ 3583(k), that judicial factfinding triggered a new punishment in the form of a prison term of at least five years and up to life. So â¦ the facts the judge found here increased 'the legally prescribed range of allowable sentences in violation of the fifth and Sixth Amendments. In this case, that meant Mr. Haymond faced a minimum of five years in prison instead of a little as none. Justice Breyer concurred in the judgment but not the rationale. For Justice Breyer, Subsection 3583(k) has three characteristics that together suggest the punishment is for a new crime rather than a continuation of punishment for the crime for which the jury convicted him: First , Â§3583(k) applies only when a defendant commits a discrete set of federal criminal offenses specified in the statute. Second , Â§3583(k) takes away the judge's discretion to decide whether violation of a condition of supervised release should result in imprisonment and for how long. Third , Â§3583(k) limits the judge's discretion in a particular manner: by imposing a mandatory minimum term of imprisonment of 'not less than 5 years' upon a judge's finding that a defendant 'has commit[ted] any' listed 'criminal offense.' Taken together, these features of Â§3583(k) more closely resemble the punishment of new criminal offenses, but without granting a defendant the rights including the jury right, that attend a new criminal prosecution. The plurality agreed to remand the case to the lower court to address whether the issue could be resolved by requiring that Subsection 3583(k) revocation hearings be conducted before a jury using the standard of proof beyond a reasonable doubt. Joined by Justices Thomas and Kavanaugh, Justice Alito wrote a dissent maintaining that a jury and \"proof beyond a reasonable doubt\" are not constitutionally required for supervisory release revocation proceedings and that to suggest otherwise has serious implications. Holding : Time served in state pretrial detention while on federal supervised release tolls the running of the term of federal supervised release if time in state pretrial detention counts as time served for state conviction purposes. Background : On March 6, 2012, U.S. prison officials released Mont and he began serving a five-year term of federal supervised release, conditioned on not committing any new federal or state crimes. On June 1, 2016, state authorities arrested Mont on drug trafficking charges and held him in pretrial detention. On March 21, 2017, 15 days after Mont's term of supervised release was scheduled to expire, a state trial court sentenced him to six years in prison on state charges with credit for the 10 months he had served in state pretrial detention. On March 30, 2017, the U.S. District Court scheduled a supervisory release revocation hearing. Although Mont argued his term of supervised release had expired, the court revoked his supervised release and sentenced him to an addition 42 months in federal prison to be served upon completing his state sentence. The U.S. Court of Appeals for the Sixth Circuit (Sixth Circuit) affirmed on the basis of Sixth Circuit precedent interpreting the law governing supervised release. The statute stated, \"[a] term of supervised release does not run during any period in which the person is imprisoned in connection with a conviction for a Federal, State, or local crime unless the imprisonment is for a period of less than 30 consecutive days.\" An earlier Sixth Circuit decision had concluded that, \"[1] when a defendant is held for thirty days or longer in pretrial detention, and [2] he is later convicted for the offense for which he was held, and [3] his pretrial detention is credited as time served toward his sentence, then the pretrial detention is 'in connection with' a conviction and tolls the period of supervised release under Â§ 3624.\" Supreme Court : In Mont, interpreting Section 3624 divided both the federal courts of appeals and the Supreme Court , a majority of which sided with the Sixth Circuit. Writing for the Court, Justice Thomas explained that a person in pretrial detention is \"imprisoned,\" and such imprisonment may be \"in connection with a conviction,\" albeit after the fact. Justice Thomas also noted that Section 3624 does not qualify imprisonment with \" after conviction.\" While the statute identifies a precise point at which supervised release begins, it is less clear where it ends. Referring to the section's statutory setting and purpose, Justice Thomas recognized supervised release to be a \"conditional liberty\" during time of good behavior, but punishment nonetheless. Justice Thomas stated: \"[I]t would be an exceedingly odd construction of the statute to give a defendant the windfall of satisfying a new sentence of imprisonment and an old sentence of supervised release with the same period of pretrial detention.\" Joined by Justices Breyer, Kagan, and Gorsuch, Justice Sotomayor dissented, observing, \"I cannot agree that a person 'is imprisoned in connection with a conviction' before any conviction has occurred.\" The Supreme Court examined the scope of federal statutes that establish various criminal offenses in two cases. In the first, the Court held that, in order to convict a foreign national unlawfully present in the United States with knowingly possessing a firearm, the government must prove that the defendant knew both that he was in possession of a firearm and that he was unlawfully present in the country ( Rehaif v. United States ). In the second, the Justices held that Congress had validly authorized the Attorney General to apply the Sex Offender Registration and Notification Act (SORNA) to offenders convicted before SORNA's enactment ( Gundy v. United States ). Holding : Conviction of an alien unlawfully present in the United States for unlawful firearms possession requires proof that the alien knew both that he was in possession of a firearm and that he was unlawfully present. Background : Rehaif entered the United States on a student visa. When the university to which he was admitted dismissed him for poor performance, it advised him that he would lose his immigration status unless he enrolled elsewhere, which he did not do. He went to a shooting range where he purchased ammunition and practiced using the range's firearms. The ammunition he bought came from out-of-state and the firearms he used were from Austria. Federal law declares it unlawful for an individual, unlawfully present in the United States, to possess a firearm or ammunition that has been transported or shipped in interstate or foreign commerce. A second statute makes it a federal crime to knowingly engage in such unlawful possession. At his trial, the U.S. district court advised the jury that the government did not have to prove that Rehaif knew that he was in the U.S. unlawfully. The jury convicted Rehaif, and the court sentenced him to prison for 18 months. The U.S. Court of Appeals for the Eleventh Circuit (Eleventh Circuit) affirmed Rehaif's conviction on several grounds. The Eleventh Circuit noted that conviction requires proof of three elements: \"(1) the defendant falls within one of the categories [of disqualified possessors] â¦ ('the status element'); (2) the defendant possessed a firearm or ammunition ('the possession element'); and (3) the possession was 'in or affecting [interstate or foreign] commerce [(the jurisdictional element)].'\" With regard to the status element, binding Eleventh Circuit case law dispensed with a mens rea requirement (sometimes referred to as a scienter, state of mind, or knowledge requirement). Supreme Court : The Supreme Court held that \"the Government therefore must prove both that the defendant knew he possessed a firearm and also that he knew he belonged to the relevant category of persons barred from possessing a firearm,\" and reversed Rehaif's conviction. Speaking for a majority of the Court, Justice Breyer pointed out that mens rea questions are first and foremost a matter of congressional intent. He noted that the \"longstanding presumption, traceable to the common law, that Congress intends to require a defendant to possess a culpable mental state regarding 'each of the statutory elements that criminalize otherwise innocent conduct.'\" Nevertheless, he explained that the presumption does not necessarily apply to all of a crime's elements. For example, it rarely attaches to jurisdictional elements, such as interstate shipment or use of the mail, that \"do not describe the 'evil Congress seeks to prevent,' but instead simply ensure that the Federal Government has the constitutional authority to regulate the defendant's conduct.\" Justice Breyer acknowledged that the Court has \"typically declined to apply the presumption in favor of scienter in cases involving statutory provisions that form part of a 'regulatory' or 'public welfare' program and carry only minor penalties.\" Public welfare offenses generally involve a regulatory regime designed to protect the public from some exceptionally harmful product or device, such as mislabeled drugs, sulfuric acid, or hand grenades. These offenses ordinarily expose to criminal liability only those, such as manufacturers or shippers, who have placed themselves in a responsible relationship to such a public danger. Qualified regulatory statutes usually proscribe conduct that was innocent at common law and punish offenders relatively lightly. Here, Justice Breyer emphasized, the public welfare exception did not apply because the \"firearms provisions before us are not part of a regulatory or public welfare program, and they carry a potential penalty of 10 years in prison that we have previously described as 'harsh.'\" Consequences : On remand, the Court left the Eleventh Circuit to determine whether the erroneous jury instruction constituted harmless error. The Court left unresolved what is required to show that a defendant knew of his status. Federal law bars firearm possession by classes of individuals other than illegal aliens, i.e ., (1) convicted felons; (2) fugitives; (3) drug addicts; (4) the mentally disabled; (5) those dishonorably discharged from the armed services; (6) those who have denounced their U.S. citizenship; (7) those under certain restraining orders; and (8) those convicted of misdemeanor domestic violence. The Court \"express[ed] no view, however, about what precisely the Government must prove to establish a defendant's knowledge of status\" in the case of these other instances of disqualifying status. Justice Alito's dissent, which Justice Thomas joined, may have influenced the Court to limit the opinion's scope. Among other criticisms, Justice Alito focused on unlawful possession by others in addition to unlawfully present foreign nationals, stating: It [the unlawful possession statute] probably does more to combat gun violence than any other federal law. It prohibits the possession of firearms by, among others, convicted felons, mentally ill persons found by a court to present a danger to the community, stalkers, harassers, perpetrators of domestic violence, and illegal aliens. Today's decision will make it significantly harder to convict persons falling into some of these categories, and the decision will create a mountain of problems with respect to the thousands of prisoners currently serving terms for [unlawful possession] convictions. H olding : Authorizing the Attorney General to issue regulations, as soon as feasible, governing the registration requirements under the Sex Offender Registration and Notification Act (SORNA) for pre-Act offenders did not violate the nondelegation doctrine. Background : In Gundy v. United States , the defendant argued unsuccessfully that the federal statute featured an unconstitutional delegation of Congress's legislative authority. The alignment of the Justices, however, suggests that the Court may revisit the issue in the near future. Four Justices considered the delegation proper; three did not; one joined the Court too late to participate fully; and one voted with the four based on precedents that he considered occasionally marked by \"extraordinarily capacious standards\" and would have voted to reexamine. SORNA : Congress passed SORNA in 2006. Congress designed SORNA in order to provide a publicly available, online gateway to federal, state, tribal, and territorial registration systems that met certain minimum federal standards. It authorized the Attorney General to promulgate implementing regulations including provisions concerning SORNA's retroactive application. An individual with a qualifying state offense, who fails to follow SORNA's registration and updating requirements and subsequently travels interstate, is guilty of a federal crime. An individual with a qualifying federal, tribal, or territorial sex offense conviction, who fails to follow SORNA's registration and updating requirements, is also guilty of a federal offense . Second Circuit : While Gundy was on federal supervised release, a Maryland state court convicted him of a state sex offense and a federal court determined that he had violated the terms of his supervised release as a consequence. The federal court sentenced him to prison for two years to be served when he completed his Maryland sentence. While Gundy was serving time in Maryland, Congress passed SORNA and the Attorney General activated its retroactive application. Maryland prison authorities subsequently transferred Gundy to a federal correctional facility in Pennsylvania to serve his federal sentence. Gundy did not register under SORNA either while in state or federal custody. Towards the end of his sentence, federal authorities transferred him to a federal half-way house in New York and approved his request to travel unescorted from Pennsylvania to the half-way house. Thereafter, federal authorities charged him with interstate travel while failing to register as a sex offender. The district court dismissed the indictment under the misimpression that Gundy was not required to register. The U.S. Court of Appeals for the Second Circuit (Second Circuit) reversed. On remand from the Second Circuit, the district court convicted Gundy on the failure to register charge. The Second Circuit rejected his statutory interpretation arguments and observed that Gundy's other arguments on appeal were without merit \"includ[ing] Gundy's argumentââ¦ made only for preservation purposesâthat SORNA violates antidelegation principles.\" Supreme Court : Gundy asked the Court to review four questions: (1) Whether convicted sex offenders are 'required to register' under the federal Sex Offender Notification and Registration Act ('SORNA') while in custody, regardless of how long they have until release. (2) Whether all offenders convicted of a qualifying sex offense prior to SORNA's enactment are 'required to register' under SORNA not later than August 1, 2008. (3) Whether a defendant violates 18 U.S.C. Â§ 2250(a), which requires interstate travel, where his only movement between states occurs while he is in the custody of the Federal Bureau of Prisons and serving a prison sentence. (4) Whether SORNA's delegation of authority to the Attorney General to issue regulations under 42 U.S.C. Â§ 16913(d) [now 34 U.S.C. Â§ 20913(d)] violates the nondelegation doctrine. The Justices addressed only the nondelegation question. While a majority agreed on the result, they did not agree on a rationale. Joined by Justices Ginsburg, Breyer, and Sotomayor, Justice Kagan declared that the \"delegation easily passes constitutional muster\" and voted to affirm the Second Circuit's pronouncement. Justice Alito also voted to affirm but did not join Justice Kagan's opinion, perhaps to avoid a 4-4 split on the Court. He explained that he thought the result was consistent with the Court's earlier cases, although he would prefer to reconsider them. Justice Gorsuch, joined by the Chief Justice and Justice Thomas, dissented. Justice Kavanaugh, who was seated late in the Court's term, did not participate in the case. The participating Justices read the Court's earlier cases differently. Justice Kagan pointed to the low bar the Court's earlier delegation decisions had set but conceded that the decisions had required a guiding \"intelligible principle\" or limiting policy statement to accompany the delegation. Justice Kagan noted, however, that the Court had only held a delegation to be invalid twice and then only because Congress had failed to provide \"' any policy or standard' to confine discretion.\" She concluded that SORNA's direction to the Attorney General \"to require pre-Act offenders to register as soon as feasible\" was a far more confining policy statement than the \"very broad delegations\" the Court had approved in the past. Justice Gorsuch disputed the comparison, stating: \"SORNA leaves the Attorney General free to impose on 500,000 pre-Act offenders all of the statute's requirements, some of them, or none of them. . . . In the end, there isn't â¦ a single other case where we have upheld executive authority over matters like these on the ground they constitute mere 'details.'\" He found none of the executive fact-finding or overlapping legislative-executive powers in SORNA's delegation to the Attorney General that he discerned in the Court's precedents. Justices Kagan and Alito's opinions looked only at Court precedents. Examining these, Justice Gorsuch declared that, as least in the case of SORNA, his colleagues should have been more demanding. He stated: \"[W]hile Congress can enlist considerable assistance from the executive branch in filling up details and finding facts, it may never hand off to the nation's chief prosecutor the power to write his own criminal code. That 'is delegation running riot.'\" Five decisions in the Supreme Court's most recent term dealt with pre-trial matters. One confirmed the continued validity of the double jeopardy dual sovereign doctrine ( Gamble v. United States ). A second addressed circumstances under which the Fourth Amendment permits the warrantless performance of a blood alcohol test on an individual suspected of drunk driving ( Mitchell v. Wisconsin ). Three others discussed the obstacles individuals face when they seek to sue officers for the manner in which the officers performed their law enforcement duties ( Nieves v. Bartlett ; McDonough v. Smith ; and City of Escondido v. Emmons ). Holding : The dual sovereign doctrine of the Fifth Amendment's Double Jeopardy Clause, which permits successive state and federal prosecutions for the same misconduct, remains in force. Background : Police stopped Gamble for a traffic violation, smelled marijuana, and searched his car, uncovering a handgun. State authorities prosecuted him for unlawful firearm possession under state law. Federal authorities also prosecuted him for unlawful firearm possession under federal law based on the same incident. Gamble challenged his federal indictment on double jeopardy grounds. In light of the Double Jeopardy Clause's dual sovereignty doctrine, the district court refused to dismiss the indictment and the U.S. Court of Appeals for the Eleventh Circuit (Eleventh Circuit) affirmed. Gamble petitioned the Supreme Court to reconsider the validity of the dual sovereignty doctrine, and the Court agreed. Supreme Court : Gamble continues the status quo. All but two members of the Court voted to continue the dual sovereignty doctrine. Writing the majority opinion, Justice Alito noted that the Double Jeopardy Clause's reference to the \"same offence\" implies a ban only on prosecution under the laws of the same sovereign. Justice Alito reviewed a continuous line of cases beginning in the early Nineteenth Century that endorsed the dual sovereignty doctrine. These precedents pose an obstacle to rejecting the doctrine because s tare decisis counsels against abandoning earlier precedents, which the majority declined to do. Justices Ginsburg and Gorsuch dissented separately because they considered the doctrine \"misguided\" and \"wrong.\" Holding : A suspect's loss of consciousness following a probable cause arrest for drunk driving will almost always qualify for the exigent circumstances exception to the Fourth Amendment's warrant requirement. (Plurality). Ba ckground : Mitchell is the latest case in which the Court has wrestled with Fourth Amendment requirements in drunk driving cases. In the 1966 decision Schmerber v. California , the defendant hit a tree while drunk and was taken to the hospital. There, the arresting police officer directed a doctor to take a sample of Schmerber's blood for a blood alcohol test. The Supreme Court recognized that the Fourth Amendment protects against warrantless bodily intrusions in drunk driving cases, but it held admissible the test results based on the circumstances. In 2013, the Court held that the natural dissipation of alcohol in blood, without more, does not justify warrantless blood alcohol tests in drunk driving cases. Three years later, the Court decided that officers with probable cause might conduct warrantless breath tests incident to an arrest but they could not administer warrantless blood tests incident to an arrest for drunk driving or under an implied consent theory. In Mitchell , officers, acting on a complaint, discovered the defendant stumbling around the edge of a lake with his van parked nearby. They arrested him after he failed a preliminary field breath test and took him to the police station for a more exacting breath test. Along the way, Mitchell became unconscious. When the officers were unable to administer a second breath test at the station because Mitchell had passed out, they took him to a hospital for a blood test. As a result of the test, officials charged him with drunk driving. Mitchell sought unsuccessfully to suppress the results of the blood tests. Wisconsin appellate courts affirmed his conviction, as did a divided U.S. Supreme Court. Supreme Court : For four of the Justices, the issue was a matter of balance. Justice Alito, speaking for the four, listed a series of factors documenting the states' compelling interest in access to a reliable test to determine the extent of a suspect's intoxication: Highway safety is a legitimate public interest; In a good year, alcohol-related deaths occur at the rate of no more than one per hour; States rely heavily on blood alcohol limits as an effective means of promoting highway safety; Enforcing blood alcohol limits depends on reliable testing methods; Alcohol in the blood dissipates rapidly so speed is of the essence; When a reliable breathalyzer test cannot be administered, a blood test is the only comparable alternative; and Drivers who cannot remain conscious represent an even greater threat. In the eyes of the four, \"the only question left, under our exigency doctrine, is whether this compelling need justifies a warrantless search because there is, furthermore, 'no time to secure a warrant.'\" And they concluded, \"[w]hen police have probable cause to believe a person has committed a drunk-driving offense and the driver's unconsciousness or stupor requires him to be taken to the hospital or similar facility before police have a reasonable opportunity to administer a standard evidentiary breath test, they may almost always order a warrantless blood test to measure the driver's BAC [blood alcohol content] without offending the Fourth Amendment.\" Justice Alito acknowledged that the case should be remanded to the Wisconsin courts to permit Mitchell to offer any evidence that the \"police could not have reasonably judged that a warrant application would interfere with other pressing need or duties.\" Justice Thomas concurred in the result because he would have recognized a per se rule under which the dissipation of alcohol in blood would always justify a warrantless, probable cause test. With Justices Ginsburg and Kagan, Justice Sotomayor noted that, because Wisconsin admitted there was time to get a warrant, she would have held that \"the Fourth Amendment â¦ requires police officers seeking to draw blood from a person suspected of drunk driving to get a warrant if possible.\" Because the lower courts had not addressed the exigent circumstance exception, Justice Gorsuch dissented on the grounds that the decision should have been postponed until the issue had been more fully developed below. Section 1983 establishes a cause of action for those deprived, under color of law, of some right under the U.S. Constitution or other federal law. The successful plaintiff must overcome at least three hurdles: He must (1) establish that he has been deprived of a right under color of law, e.g ., Nievers v. Bartlett ; (2) satisfy Section 1983's procedural requirements, e.g ., McDonald v. Smith ; and (3) overcome any claim of qualified immunity, e.g., City of Escondido v. Emmons . Holding : The existence of probable cause to arrest precludes a Section 1983 civil liability claim based on an alleged First Amendment retaliatory arrest, unless \"a plaintiff presents objective evidence that he was arrested when otherwise similarly situated individuals not engaged in the same sort of protected speech had not been.\" Background : Officers arrested Bartlett at a raucous \"Arctic Man\" sports festival and \"beer blast\" in a remote area of Alaska. In an earlier encounter with Officer Nieves, Bartlett had refused to speak to Officer Nieves. Bartlett and the officers disputed whether Bartlett: (1) was drunk; (2) was loud and belligerent on two occasions; (3) got into Officer Wright's face to provoke a confrontation, or spoke closely to the officer in order to be heard over the loud music; and (4) refused to back away from Officer Wright, or was slow to back away because of a bad back. Charges against Bartlett were later dismissed, and he sued the officers under Section 1983 on several grounds, including a retaliatory arrest claim. Bartlett alleged that, at the time of his arrest, Officer Nieves said: \"[B]et you wish you would have talked to me now.\" The U.S. District Court dismissed the complaint because it found that the officers had probable cause to arrest Bartlett. The U.S. Court of Appeals for the Ninth Circuit reversed based on Ford v. City of Yakima in which the Ninth Circuit had ruled that probable cause does not preclude a Section 1983 retaliatory arrest claim. Supreme Court : The Supreme Court disagreed, stating: \"Because there was probable cause to arrest Bartlett, his retaliatory arrest claim fails as a matter of law.\" Writing for the Court, Chief Justice Roberts, acknowledged that, as a general rule, a First Amendment retaliatory arrest claim will survive in the face of probable cause to arrest, if the arrestee demonstrates that similarly situated, but silent, individuals had not been arrested. The case triggered four individual opinions. Justice Thomas concurred in part and in the judgment, disagreeing with the majority's disparate-application exception. Justice Gorsuch and Justice Ginsburg concurred in part and dissented in part. Justice Gorsuch's position was that \"the absence of probable cause is not an absolute requirement of such a claim, and its presence is not an absolute defense.\" Justice Ginsburg questioned whether the case was the appropriate vehicle for the rule the majority announced. Justice Sotomayor, in dissent, took the position that probable cause does not always doom a Section 1983 First Amendment retaliatory arrest claim. Holding : Statute of limitations for a Section 1983 cause of action alleging falsification of evidence \"began to run when criminal proceedings against him terminated in his favor.\" Background : McDonough was a commissioner on a local board of elections when allegations of forged absentee ballots surfaced. A grand jury indicted McDonough. He was arrested and held for bail. His first trial ended in a mistrial. The jury acquitted him in a second trial. Just short of three years after his acquittal, McDonough sued the special prosecutor in federal court under Section 1983, claiming denial of due process in the form of malicious prosecution and fabrication of evidence. The U.S. District Court dismissed the malicious prosecution claim against the special prosecutor on the grounds of absolute prosecutorial immunity. The court also ruled that the three-year statute of limitations on McDonough's fabrication claim began to run when McDonough became aware of the fabrication not when he was acquitted. Thus, the statute of limitations had expired by the time McDonough filed his Section 1983 complaint. The U.S. Court of Appeals for the Second Circuit (Second Circuit) affirmed. Supreme Court : The Second Circuit noted a circuit split over whether the statute of limitations on due process fabrication claims begins to run with the claimant's exoneration or with his knowledge of the fabrication and its improper use. The Supreme Court agree to hear the case in order to resolve the issue. Writing for the Court, Justice Sotomayor explained that state law governs the length of the statute of limitations in Section 1983 cases. Federal law, however, determines when the statute of limitations begins to run based on \"common-law principles governing analogous torts.\" The inquiry starts with identifying the constitutional or other federal right said to have been abridged under color of law. Justice Sotomayor accepted the Second Circuit's presumption that the Due Process Clause was the basis for McDonough's fabrication claim. While the Second Circuit had decided that common-law malicious prosecution, with its \"end-of-game\" exoneration requirement, did not match McDonough's fabrication claim, the Court ruled that common-law malicious prosecution was the most closely analogous tort to McDonough's fabrication claim. Justice Sotomayor pointed out that one involves a malice-driven, groundless prosecution, the other a thrust for conviction slaked by the use of fabricated evidence. \"At bottom,\" she declared, \"both claims challenge the integrity of criminal prosecutions undertaken 'pursuant to legal process.'\" Moreover, she noted, the Second Circuit's approach would mean starting the statute of limitations clock when use of the fabricated evidence became obviousâat trial or the return of the indictment. Either alternative presents the risk of parallel criminal and civil proceedings, and worse yet, the risk of inconsistent results. Holding : \"The Court of Appeals should have asked whether clearly established law prohibited the officers from stopping and taking down a man in these circumstances. Instead, the Court of Appeals defined the clearly established right at a high level of generality by saying only that the 'right to be free of excessive force' was clearly established.\" Background : Ametria Douglas shared an apartment with Maggie Emmons and Emmons' two children. Douglas' mother called 911 after hearing the sounds of fighting and a plea for help during an interrupted telephone conversation with her daughter. When officers arrived they found Douglas outside in the pool with the children. She assured them it was a false alarm. Nevertheless, the officers went to the apartment in order to conduct a \"welfare check\" (to make sure no one inside was injured or in danger). Emmons, who had charged her husband with domestic violence a month earlier, refused to let them in without a warrant. Then, Marty Emmons, who had been visiting his daughter, came out of the apartment and closed the door behind him. Officer Craig, who had instructed him to leave the door open, threw Marty Emmons to the ground. Marty Emmons subsequently sued Officer Craig and his fellow officers for unlawful search and seizure and the use of excessive force. Each of the parties moved for summary judgment in federal district court. Police officers and other public officials \"performing discretionary functions, generally are shielded from liability for civil damages insofar as their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known.\" The district court granted Officer Craig's motion of summary judgment on the excessive use of force claim because it concluded that \"relevant legal authorities do not establish that the underlying conduct violate[d] clearly established law.\" The U.S. Court of Appeals for the Ninth Circuit (Ninth Circuit) reversed and held that Officer Craig was not entitled to qualified immunity because the \"right to be free of excessive force was clearly established at the time of the events in question.\" Supreme Court : The Supreme Court reversed and sent the case back to the Ninth Circuit. As it has done in a number of recent cases, the Court reminded the Ninth Circuit that the circumstances of the cases that \"clearly establish\" a constitutional right must be closely analogous to the circumstance of the case at issue. The Court stated: \"This Court has repeatedly told courts â¦ not to define clearly established law at a high level of generality.\"â¦ 'An officer cannot be said to have violated a clearly established right unless the right's contours were sufficiently definite that any reasonable official in the defendant's shoes would have under that he was violating it.'\" Rather than ask whether the right to be free of excessive force was clearly established, the Ninth Circuit \"should have asked whether clearly established law prohibited the officers from stopping and taking down a man in these circumstances.\" On remand, the Ninth Circuit concluded that Officer Craig was entitled to qualified immunity, since it could find no case \"so precisely on point with this one as to satisfy the Court's demand for specificity.\" Holding : A defense attorney's failure to appeal in spite of a client request is presumptively prejudicial ineffective assistance of counsel \"even when the defendant has signed an appeal waiver.\" Background : Garza entered into plea agreements covering state aggravated assault and possession of controlled substance charges. Garza waived his right to appeal in the agreements and his counsel did not file a notice of appeal. Thereafter, Garza sought post-conviction review (state habeas corpus) asserting his trial attorney had ignored his request to appeal and claiming ineffective assistance of counsel. The Sixth Amendment provides the criminally accused the right to \"reasonably effective\" assistance of counsel for his defense. Appellate courts overturn convictions or sentences when the defense counsel made \"errors so serious that counsel was not functioning as the 'counsel' guaranteed the defendant by the Sixth Amendment\" if \"the deficient performance prejudiced the defense.\" Prejudice occurs when \"counsel's errors were so serious as to deprive the defendant of a fair trial, a trial whose result is reliable.\" The Court has held that prejudice may be assumed, stating: \"[W]hen counsel's deficient performance deprives a defendant of an appeal that he otherwise would have taken, the defendant has made out a successful ineffective assistance of counsel claim entitling him to an appeal.\" Denying Garza's petition for relief, the trial court stated that Garza's waiver precluded him being a victim of ineffective assistance. The Idaho Court of Appeals and the Idaho Supreme Court affirmed. The U.S. Supreme Court reversed and remanded. Supreme Court : In the opinion, Justice Sotomayor focused on two conceptsânotice of appeal and waiver of appealâto rebut that Garza's filing a notice of appeal would breach his plea agreements and deny him their benefits. She explained that a notice of appeal is ministerial being \"a simple, nonsubstantive act that is within the defendant's prerogative.\" She noted: (1) any \"waiver of appeal\" is limited to the language of the particular agreement; (2) some appellate issues cannot be waived; and (3) matters that are within the scope of the waiver are only binding if the prosecution elects to stand on its rights. Thus, she concluded, \"simply filing a notice of appeal does not necessarily breach a plea agreement, given the possibility that the defendant will end up raising claims beyond the waiver's scope. And in any event, the bare decision whether to appeal is ultimately the defendant's, not counsel's, to make.\" Justice Sotomayor further found that Idaho's approach was inconsistent with precedent. Justice Sotomayor recalled the Flores-Ortega holding that \"'a lawyer who disregards specific instructions from the defendant to file a notice of appeal acts in a manner that is professionally unreasonable.'\" She stated: \" Flores-Ortega 's reasoning shows why an appeal waiver does not complicate [a] straightforward application\" and further commented: \"As the Court explained, given that past precedents call for a presumption of prejudice whenever 'the accused is denied counsel at a critical state' it makes even greater sense to presume prejudice when counsel's deficiency forfeits an 'appellate proceeding altogether.'\" She noted, \"[a]fter all, there is no disciplined way to 'accord any presumption of reliability â¦ to judicial proceedings that never took place,'\" concluding \"[t]hat rationale applies just as well here because â¦ Garza retained a right to appeal at least some issues despite the waivers he signed. In other words, Garza had a right to a proceeding and he was denied that proceeding altogether as a result of counsel's deficient performance.\"", "summary": "In 2019, the Supreme Court issued a sizeable number of criminal law decisions, which addressed several topics, including sentencing, pretrial, statutory construction, and ineffective assistance of counsel. This report discusses the following Supreme Court holdings in greater detail: Racially Discriminatory Jury Selection : \"[T]he trial court at Flowers' sixth trial committed clear error in concluding that the State's peremptory strike of [a] black prospective juror â¦ was not motivated in substantial part by discriminatory intent.\" Flowers v. Mississippi , 139 S. Ct. 2228 (2019). Execution of the Mentally Inc ompetent : \"First, under Ford and Panetti , the Eighth Amendment may permit executing Madison even if he cannot remember committing his crime. Second, under those same decisions, the Eighth Amendment may prohibit executing Madison even though he suffers from dementia, rather than delusions. The sole question on which Madison's competency depends is whether he can reach a 'rational understanding' of why the State wants to execute him.\" Madison v. Alabama , 139 S. Ct. 718 (2019). Execution of the Intellectually Disabled : Texas Court of Criminal Appeals erred in assessing and denying a death-row inmate's claim of intellectual disability. Moore v. Texas , 139 S. Ct. 666 (2019). Habeas Jurisdiction : Federal courts may not grant state prisoners habeas relief based on Supreme Court precedent established after the completion of state proceedings. Shoop v. Hill , 139 S. Ct. 504 (2019). Method of Execution : A death row inmate challenging the state's method of execution must show that the state's method involves a risk of severe pain and that a feasible, readily available alternative method will significantly reduce the risk of pain. \"[E]ven if execution by nitrogen hypoxia were a feasible and readily implemented alternative to the State's chosen method, Mr. Bucklew has still failed to present any evidence suggesting that it would significantly reduce his risk of pain.\" Bucklew v. Precythe , 139 S. Ct. 1112 (2019). Violent Crime Sentencing : The Armed Career Criminal Act's (ACCA) Section 924(c) residual clause purporting to provide an alternative definition for \"crime of violence\" is constitutionally vague. United States v. Davis , 139 S. Ct. 2319 (2019). Conviction under Florida robbery statute qualifies as a crime of violence under ACCA elements clause. Stokeling v. United States , 139 S. Ct. 544 (2019). Under the ACCA's specific crimes clause, the generic crime of \"burglary\" covers unlawfully entering, or remaining in, a building or structure, including mobile homes, trailers, tents, or vehicles, if they are designed, adapted, or customarily used for overnight accommodations of individuals. United States v. Stitt , 139 S. Ct. 399 (2018). Under the ACCA's specific crimes clause, the generic burglary definition includes entering with an intent to commit a crime or remaining in a building or structure after forming an intent to commit a crime . Quarles v. United , 139 S. Ct. 1872 (2019). Excessive Fines : The Eighth Amendment's Excessive Fines Clause is incorporated in the Fourteenth Amendment's Due Process Clause and is therefore binding on the States. Timbs v. Indiana , 139 S. Ct. 682 (2019). Supervised Release : Imposing a mandatory term of imprisonment after revoking supervised release, based on finding by a preponderance of the evidence that Haymond had breached the conditions of his supervised release, violated the Sixth Amendment's jury trial guarantee and the Fifth Amendment's Due Process beyond-a-reasonable doubt standard for criminal cases. The lower court will decide, at least initially, whether the error was harmless and, if not, the appropriate remedy. United State s v. Haymond , 139 S. Ct. 2369 (2019). A federal supervised release term does not run for a convict held in state pretrial detention if the time in state pretrial detention counts as time served for state conviction purposes. Mont v. United States , 139 S. Ct. 1826 (2019). Mens Rea : Conviction of an alien unlawfully present in the United States for unlawful firearms possession requires proof that the alien knew both that (1) he was in possession of a firearm and (2) he was unlawfully present. Rehaif v. United States , 139 S. Ct. 2191 (2019). Nondelegation : Authorizing the Attorney General to issue regulations governing registration requirements under the Sex Offender Registration and Notification Act (SORNA) for pre-Act offenders as soon as feasible did not violate the nondelegation doctrine. Gundy v. United States , 139 U.S. 2116 (2019). Double Jeopardy : The dual sovereign doctrine of the Fifth Amendment's Double Jeopardy Clause permits successive state and federal prosecutions for the same misconduct. Gamble v. United States , 139 S. Ct. 1960 (2019). Drunk Driving : A suspect's loss of consciousness following his probable cause arrest for drunk driving will almost always qualify for the exigent circumstances exception to the Fourth Amendment's warrant requirement. Mitchell v. Wisconsin , 139 S. Ct. 2525 (2019) (plurality). Section 1983 Litigation : Probable cause to arrest precludes a Section 1983 civil liability claim based on alleged First Amendment retaliation unless \"a plaintiff presents objective evidence that he was arrested when otherwise similarly situated individuals not engaged in the same sort of protected speech had not been.\" Nieves v. Bartlett , 139 S. Ct. 1715 (2019). The statute of limitations for a Section 1983 cause of action alleging falsification of evidence \"began to run when criminal proceedings against him terminated in his favor.\" McDonough v. Smith , 139 S. Ct. 2149 (2019). In assessing a Section 1983 qualified official immunity claim, \"[t]he Court of Appeals should have asked whether clearly established law prohibited the officers from stopping and taking down a man in these circumstances. Instead, the Court of Appeals defined the clearly established right at a high level of generality by saying only that the 'right to be free of excessive force' was clearly established.\" City of Escondido v. Emmons , 139 S. Ct. 500 (2019). Ineffective Assistance of Counsel : A defense attorney's failure to honor his client's request to appeal is presumptively prejudicial ineffective assistance of counsel \"even when the defendant has signed an appeal waiver.\" Garza v. Idaho , 139 S. Ct. 738 (2019).", "document_type": "crs"}
{"report": "Beginning with the campaign to eradicate smallpox in the 1960s, the United States has been interested in the eradication of vaccine-preventable diseases (VPDs) in children worldwide, as well as vaccine research and development. The success of the smallpox eradication campaign led to the establishment of the World Health Organization's Expanded Programme on Immunization in 1974. Since then, global vaccination campaigns have been broadened and garnered near universal international support. Today, the U.S. government is a leading donor to global vaccination campaigns ( Figure 3 ). In FY2019, Congress appropriated $290 million in foreign aid for the Global Alliance for Vaccines and Immunization (GAVI, now called GAVI, the Vaccine Alliance) and $226 million for Department of Health and Human Services (HHS) to support child vaccine campaigns abroad. The authorization, appropriation, and oversight of U.S. funding for global child vaccination is thus an ongoing area of concern for many in Congress, as is the extent of donor coordination and burden-sharing for such efforts. Additional potential issues include the extent to which global child vaccination promotes U.S. foreign policy, development, and domestic health security (i.e., pandemic preparedness) goals. Donor-backed child vaccination campaigns have reduced mortality in poor countries, though occasionally they have faced setbacks. In the early 1990s, U.S. foreign assistance for large-scale vaccination campaigns led by the World Health Organization (WHO) and the United Nations Children's Fund (UNICEF), and with significant U.S. funding and technical support, contributed to an approximately 80% immunization rate for three doses of the diphtheria, tetanus, and pertussis vaccine (DTP3). Progress, as measured by vaccination rates, stalled on certain vaccinesânotably the diphtheria, tetanus, pertussis, and measles vaccinesâin the late-1990s for a variety of reasons, including management of vaccine stocks, effective vaccine delivery, and cost of vaccinations. In 2000, a public-private partnership, the Global Alliance for Vaccines and Immunization (GAVI) was launched to address both declining global momentum for child immunization campaigns and declining funding for these programs. Since its inception, GAVI has supported the immunization of 700 million children. As a founding member of GAVI, the United States holds a rotating seat on GAVI's board and provides it with funding (see \" U.S. Role and Funding \"). Vaccinations are considered one of the most cost-effective ways to prevent infectious disease and associated morbidity and mortality. WHO recommends that all children receive 10 vaccines ( Table 1 ). Receiving the recommended childhood vaccinations can protect the recipient from illness and death associated with VPDs, and can reduce infectious disease spread. According to UNICEF, these immunizations save around 3 million lives per year. Globally, coverage of recommended childhood vaccines vary, with VPDs causing high levels of morbidity (illness) and mortality (death), primarily in certain low- and middle-income countries that have had limited success in achieving universal coverage. Recently, some high-income countries, for example France and the United States, have seen exponential increases in cases of VPDs, due primarily to vaccine hesitancy. According to GAVI, from 2000 through 2018, more than 760 million children worldwide were immunized against VPDs, including 66 million children in 2018. Approximately 100 million children are immunized each year. At the end of 2018, 20 million infants and children worldwide had not received the full schedule of recommended vaccines. According to GAVI, full vaccination coverage could prevent one in seven deaths in under-5 children. Over 1.5 million children die every year from VPDs. Nearly 60% of these children live in 10 countries: Angola, Brazil, DRC, Ethiopia, India, Indonesia, Nigeria, Pakistan, the Philippines, and Vietnam. From 1990 to 2017, overall child deaths fell from 12.7 million to 5.8 million, largely due to gains made by global immunization campaigns and expanded national immunization programs. For example, from 2000 to 2017, scaled-up measles vaccination coverage averted an estimated 15.6 million deaths from the disease. Global coverage for several recommended vaccines has continued to climb over the past decade (see Figure 1 ); however, progress in expanding the number of children vaccinated with DTP3 (a three-dose diphtheria, tetanus and pertussis vaccine) has stagnated in recent years, though its coverage remains higher than coverage for other required vaccinations (see Figure 2 ). GAVI reports recent stagnation in coverage is due to \"acute problems that a small number of previously high performing countries have faced.\" Diphtheria, tetanus and pertussis are particularly fatal to neonates, new mothers, and pregnant women. Maternal and neonatal tetanus (MNTE) has been almost eliminated globally, and since 2000 there has been an 85% reduction in newborn deaths from tetanus. As of March 2019, MNTE remains present in 14 countries. In 2018, 86% of children under the age of one received all three doses of the DTP3 vaccine. As global uptake of childhood vaccines improves, an increasing proportion of child deaths are concentrated in sub-Saharan Africa and Southern Asia: four out of every five under-5 child deaths occur in these regions. Figure 2 displays geographical immunization coverage for three doses of the DTP3 vaccine. DTP3 immunization coverage is used as a proxy indicator to estimate the proportion of children vaccinated within their first year of life. In 2015, U.N. member states adopted the Sustainable Development Goals (SDG) as a common agenda to help alleviate global poverty, improve health and education, reduce inequality, and spur economic growth by 2030. SDG Goal 3 is to end preventable deaths of newborns and under-5 children by 2030, with a targeted reduction of under-5 mortality to 25 per 1,000 live births in every country. (According to 2018 figures, 80 countries worldwide have under-5 mortality rates that are higher than 25 per 1,000 live births.) International efforts to decrease vaccine-preventable deaths among children younger than five years are led by international organizations such as WHO, UNICEF, and GAVI, with significant U.S. support (detailed in the section on U.S. role and funding). Several multilateral initiatives and commitments frame these efforts. UNICEF. UNICEF supports immunization programs globally and is the biggest single global purchaser of vaccines. The organization focuses on providing vaccinations, monitoring and improving vaccine supply and quality (e.g., ensuring that vaccines are consistently stored at an appropriate temperature, known as \"the cold chain\"), vaccine innovation (e.g., research and development), and disease eradication and elimination programs. UNICEF has a permanent seat on GAVI's board and procures all vaccines for GAVI-supported programs to ensure a reliable supply of high-quality and affordable vaccines. UNICEF's immunization goals align with WHO targets outlined in the Global Vaccine Action Plan (GVAP) 2011-2020; to reach 90% of children under the age of one with routine immunization, and achieve 80% immunization coverage for every country district by 2020. WHO . The WHO launched its first 10-year strategic framework on vaccines in 2005. The Global Immunization Vision and Strategy Immunization was intended to extend immunization achievements and to continue encouraging governments to maintain a commitment to protect their populations from VPDs. The GVAP for 2011-2020 was released in 2010 to build on the 2005 strategic framework. The GVAP aligns with the WHO's 2015-2030 strategic goals, which include promoting the development of new vaccines and vaccine delivery technologies to meet public health priorities, establishing norms and standards for vaccines and vaccine delivery technology, and ensuring quality. The WHO also develops evidence-based immunization policy recommendations for member states through an independent advisory group, the Strategic Advisory Group of Experts on Immunization (SAGE). SAGE meets biannually to develop recommendations based on available evidence on immunization and vaccines. It also convenes on an emergency basis to discuss disease outbreaks and vaccine-related concerns (e.g., experimental Ebola vaccines). GAVI , the Vaccine Alliance. GAVI is a multilaterally funded public-private partnership. It was founded in 2000 by the United States, the WHO, the United Nations, the World Bank, and the Bill and Melinda Gates Foundation to expand global access to vaccines and prevent deaths from VPDs. GAVI is guided by five year strategic plans, the Phase IV strategy for 2015-2020 aligns with the goals outlined in the GVAP. In 2019, GAVI set the overall goal to immunize 300 million children by 2025, and save 5-6 million lives in the long term. For more information on GAVI, see the section under U.S. Funding for Multilateral Initiatives. Various factors affect global immunization coverage, including vaccine hesitancy and stigma, geographic location, inadequate country capacity, and poverty and socioeconomic status. Vaccine hesitancy and stigma. Recently, a resurgence of certain VPDs has caused concern among public health officials and drawn attention to the challenges of vaccine hesitancy and stigma. For example, polio continues to elude global eradication, and in 2019 some middle- and high-income countries experienced a resurgence of measles, due to a variety of factors, including reluctance among some individuals and religious communities to vaccinate their children. In April 2019, the WHO reported a 300% increase in global measles cases compared to the same period in 2018, with the greatest surges in cases in the Americas, the Middle East, and Europe. Prompted in part by this resurgence, the WHO listed \"vaccine hesitancy\" as one of the 10 biggest global public health threats. Corruption, authoritarian governance, and social or political discrimination can fuel vaccine hesitancy by undermining citizens' trust in authority figures (including government officials and health workers involved in vaccine campaigns). For example, Nigeria was close to eliminating polio for many years but did not do so until recently. Vaccination campaign efforts were hampered in part by conspiracy theories, \"vaccine stigma,\" as well as by ethical concerns about government regulations and pharmaceutical industry practices. Vaccine stigma, for its part, arises when a community normalizes vaccine denial. Geographic location . Geographical distance from health centers negatively impacts vaccination coverage. Underserved populations within any given country often shoulder a heavier burden of disease, and they may lack access to basic medical care. Notably, vaccine coverage disparities between children in urban and rural areas persist throughout the world, and commonly exacerbate disease spread within a certain geographical area. For example, according to the WHO, in some countries (e.g., Nigeria and Indonesia), coverage of the measles vaccine in rural areas is 33% lower than in urban areas. Poverty, s ocioeconomic status , and social determinants of health. Vaccination coverage in low-income countries (41%) lags behind coverage in high-income countries (90%). Medical systems in many low-income countries are often underfunded and unable to vaccinate enough children to stop a virus's spread even with donor aid. In addition, researchers have found that inequities in vaccination coverage are associated with individual socioeconomic determinants, such as a family's income level and the educational status of a child's mother. Children born into poverty are almost twice as likely to die before the age of five as those from wealthier families, and researchers suggest that unequal access to vaccines is a key factor. Vaccine coverage for the richest fifth of the population in some countries is up to 58% higher than for the poorest fifth. Fragile and conflict settings . UNICEF reports that 40% of unvaccinated children live in countries affected by armed conflict or other humanitarian challenges. Often, already fragile health care infrastructure is further crippled by armed conflict, which can hinder health workers in carrying out vaccinations and interfere with proper disease treatment and containment. Humanitarian settings such as refugee and internal displacement camps can also foster conditions (e.g., poor nutrition, overcrowding, and unsanitary conditions) conducive to the rapid spread of infectious diseases. According to UNICEF estimates, as of 2015, half of the 10 countries that had under 50% diphtheria, tetanus, and pertussis vaccine coverageâthe Central African Republic, Somalia, South Sudan, Syria, and Ukraineâhad experienced conflicts or other humanitarian emergencies. Other conflict-affected countries have seen spikes in VPD cases, such as a 2019 surge in measles cases in the Democratic Republic of Congo (DRC), which has killed more people than the ongoing Ebola outbreak in that country. Congress has historically supported global child vaccination programs, both as a component of U.S. foreign assistance and as part of efforts to eradicate infectious diseases that might affect Americans at home or abroad. Through annual appropriations for the Department of Health and Human Services and the Department of State and Foreign Operations (SFOPS), Congress funds global immunization activities through the Centers for Disease Control (CDC), the United States Agency for International Development (USAID), and the Global Alliance for Vaccines and Immunization (GAVI, now called GAVI, the Vaccine Alliance). The U.S. Agency for International Development (USAID) and the Centers for Disease Control and Prevention (CDC) are the primary U.S. federal agencies involved in international vaccination provision and immunization campaigns. These campaigns support the 2016-2020 Strategic Framework for Global Immunization and the WHO's 2011-2020 Global Vaccine Action Plan , the agencies work with country governments to strengthen immunization programs by bolstering infectious disease surveillance, increasing laboratory capacity, and strengthening public health workforce capacity. The efforts of both agencies align with the 2010 HHS National Vaccine Plan, the Global Health Security Agenda, and the U.N.'s 2030 Sustainable Development Goals. CDC and USAID also support routine immunizations worldwide through enhanced supply chain management and product procurement assistance. Related efforts are implemented bilaterally and through international partnerships with the WHO, UNICEF, the World Bank, and others. In addition, CDC, along with the Department of Defense, finances the research and development of new vaccines. The CDC has played a central role in controlling vaccine-preventable diseases since it established the CDC Smallpox Eradication Program in January 1966. The Global Immunization Division of the CDC's Center for Global Health is responsible for coordinating CDC's global immunization activities. To support these activities, the CDC provides scientific and public health expertise in infectious disease epidemiology and surveillance by building laboratory capacity and helping to implement evidence-based prevention strategies. CDC also carries out clinical trials and epidemiologic studies. Funding for the CDC's Global Immunization Program is detailed in Table 2 . The majority of CDC's efforts are focused on polio, with smaller funding allocations for measles and other VPDs. Global vaccination campaigns against polio have lowered the worldwide incidence of polio by 99% compared with that of 1988, and in 2018 only two countries recorded wild polio cases: Afghanistan and Pakistan. Vaccine-derived poliovirus continues to be detected in Nigeria, but as of August 21, 2019, no cases had been confirmed there in three years. The CDC's programming is based on its 2016-2020 Strategic Framework for Global Immunization , which builds on three previous strategic frameworks and outlines five goals: 1. Control, eliminate, or eradicate vaccine-preventable diseases to reduce death and disability globally. 2. Strengthen country ownership, policy and practices, and partnerships. 3. Ensure quality of vaccination delivery to achieve high and equitable coverage. 4. Strengthen surveillance and immunization information to prevent, detect, and respond to vaccine-preventable diseases. 5. Conduct and promote research, innovation, and evaluation. To implement the strategic framework, the CDC works with USAID, UNICEF, GAVI, and other stakeholders. The strategy is aligned with the HHS National Vaccine Plan 2010, the Global Health Security Agenda, and the WHO Global Vaccine Action Plan 2011-2020. In FY2019, Congress appropriated more funding for CDC global immunization programs than the Trump Administration sought and more than was appropriated in prior years ( Table 2 ). The Administration's FY2019 and FY2020 budget requests would have reduced funding for global immunization activities and proposed that the CDC \"focus its global immunization activities to continue progress towards polio eradication, as well as measles and rubella elimination in countries with the highest disease burden.\" To strengthen routine immunization campaigns and community-based disease surveillance, USAID works with foreign countries' ministries of health and provides funding to GAVI. These actions are part of the agency's strategy to prevent child and maternal deaths, which it also supports through capacity building for foreign health systems. For example, in Ethiopia, the agency works with Ethiopia's Ministry of Health to train community volunteers to identify symptoms of vaccine-preventable diseases (e.g., paralysis due to polio) and track \"vaccine defaulters\" (individuals who do not receive the full schedule of immunizations) to keep them on schedule. The United States, through contributions to international organizations and GAVI, provides significant support for multilateral immunization and vaccination programs ( Figure 3 ). Such support is intended to complement U.S. bilateral efforts in this arena while enabling the United States to expand its reach and provide opportunities for collaboration and burden sharing. GAVI is a multilaterally funded public-private partnership. It was founded in 2000 by the United States, the WHO, the United Nations, the World Bank, and the Bill and Melinda Gates Foundation to expand global access to vaccines and prevent deaths from VPDs. The United States played a central role in the creation of GAVI and continues to be involved in GAVI's governance, strategic planning, and funding. U.S. support of GAVI is intended to accelerate access to vaccines, strengthen vaccine delivery platforms, and work with country governments to sustain immunization programs. The United States is GAVI's third largest donor, having provided nearly $2 billion of the $21 billion donated to GAVI since its founding ( Figure 3 ). Congress appropriates U.S. funding for GAVI via USAID's Global Health Programs (GHP) account in annual SFOPS appropriations measures. In turn, the United States holds a seat on GAVI's board, as do the WHO and UNICEF, which also receive U.S. funding ( Figure 4 ). Table 3 details U.S. budget requests and enacted appropriations for GAVI from FY2015 to FY2020. During the Obama Administration, congressional appropriators met the Administration's requests to increase funding for GAVI year on year. In line with the Trump Administration's broad calls for cuts to foreign assistance, the Administration proposed $250 million for GAVI in FY2019 and in FY2020, a $40 million decrease from the FY2018-enacted level. In FY2019, Congress appropriated $290 million for GAVI, the same level as in FY2018. Congress has continued to demonstrate interest in supporting child vaccinations for VPDs overseasâfor example, by appropriating increasing levels of funding for related programs. However, numerous global outbreaks of VPDs have raised concerns about whether the progress made in preventing and eradicating communicable diseases can be maintained. In light of recent events, and in the context of the FY2020 appropriations process (and beyond), Congress may examine a few additional issues. One area that could be explored is the effectiveness of global vaccination campaigns as a tool of domestic pandemic preparedness. U.S. government public health officials have argued that the global resurgence of certain vaccine-preventable diseases, particularly measles and mumps, may threaten U.S. public health. Recent outbreaks of vaccine-preventable diseases in the United States have been traced to travelers from Europe and abroad, and the CDC reports that these travelers, coupled with domestic vaccine hesitancy, are the main cause of outbreaks in the United States. In March 2019, the full Senate Committee on Health, Education, Labor and Pensions (HELP) held a hearing to discuss the reasons behind preventable disease outbreaks, including imported cases of vaccine-preventable diseases linked to international travelers. As these outbreaks continue, Congress may continue to consider its oversight of, and federal government involvement in, issues surrounding vaccines, such as misinformation campaigns and their role in vaccine hesitancy. Another core area of interest relates to U.S. funding, foreign policy objectives, and foreign aid programs supporting immunization. The U.S. government has long-included vaccination as a core component of foreign policy, and as a foreign aid priority. Recently, the Trump Administration requested cuts to global health funding, including for U.S. agencies involved in global vaccination campaigns. The Administration contends that the funding requests will not affect programs and that \"the reduction reflects the Administration's intent to further focus funds on countries, populations, and programs where resources will have the greatest public health impact ... [and] CDC will focus its global immunization activities to continue progress towards polio eradication, as well as measles and rubella elimination in the countries with the highest disease burden.\" Some experts argue that stagnation in vaccination coverage and the resurgence of some vaccine-preventable diseases are \"alarm bells,\" and have expressed concern about flat support for global vaccine campaigns leading to a continued resurgence of vaccine-preventable diseases. These issues raise questions about burden sharing and the role of other high-income country donors in global immunization funding, as well as factors affecting the efficacy of global campaigns to increase vaccination rates. ", "summary": "For more than 50 years, the United States has taken an interest in the eradication of vaccine-preventable diseases (VPDs) in children worldwide, as well as vaccine research and development, particularly since playing a vital role in the global campaign to eradicate smallpox in the 1960s. Since then, vaccinating children against VPDs has been a major U.S. foreign policy effort. Vaccinations are one of the most cost-effective ways to prevent infectious disease and associated morbidity and mortality. According to UNICEF, immunizations save around 3 million lives per year. As of 2019, VPDs continue to cause high levels of morbidity (illness) and mortality (death), and the World Health Organization (WHO) notes that the adoption of new vaccines by low- and middle-income countries (which often have the highest disease burdens) has been slower than in high-income countries. Receiving a vaccination during childhood can protect the recipient from VPDs, decrease the spread of related diseases, and improve child survival prospects (as children, particularly those under five years old, are more likely than adults to die from VPDs). Recently, a global resurgence of certain VPDs has caused concern among public health officials and drawn attention to the challenges of vaccine hesitancy and stigma. For example, polio continues to elude global eradication and remains endemic in three countries. In 2019 measles has seen a resurgence in some middle- and high-income countries due to a variety of factors, including reluctance among some individuals and religious communities to vaccinate their children. In April 2019, the WHO reported a n increase in global measles cases compared to the same period in 2018, with the greatest surges in cases in the Americas, the Middle East, and Europe. A number of European countries are at risk of or have lost their measles eradication certificate from the WHO, raising questions about global consensus on the use of vaccines, participation in and support for the Global Alliance for Vaccines and Immunization (GAVI, now called GAVI, the Vaccine Alliance) and other global immunization efforts. Prompted in part by this global resurgence, the WHO has listed \"vaccine hesitancy\" as one of the 10 biggest global public health threats. The U.S. government is the second-leading government donor to global vaccination campaigns. Through annual appropriations to the Department of Health and Human Services (HHS) and the Department of State, Congress funds global immunization activities through the Centers for Disease Control and Prevention (CDC), the United States Agency for International Development (USAID), and GAVI. In recent years, annual appropriations by Congress for multilateral immunizations campaigns led by GAVI have averaged $290 million and $226 million for bilateral campaigns led by CDC. USAID works to support routine immunization overseas through health systems strengthening, and Global Polio Eradication Initiative Activities. The authorization, appropriation, and oversight of U.S. funding for global child vaccination is thus an ongoing area of concern for many in Congress. Other key issues for Congress include the extent of donor coordination and burden-sharing for such efforts, and the extent to which global child vaccination promotes U.S. foreign policy, development, and domestic health security (i.e., pandemic preparedness) goals.", "document_type": "crs"}
{"report": "Multiple decades of scientific studies find that human activities induce global climate change by emitting greenhouse gases (GHGs) from fuel combustion, certain industries, deforestation, and other activities. Scientists researched and assessed the science of GHG-induced climate change for more than 150 years before government policymakers around the world agreed to cooperate to consider how to address its risks to humans and ecosystems. Following several international scientific meetings in 1985-1987, governments decided to establish the Intergovernmental Panel on Climate Change (IPCC), under the auspices of the United Nations Environment Programme and the World Meteorological Organization, to provide them with assessments of climate change science, projected social and economic impacts, and potential response strategies. In 1989, the U.N. General Assembly provided a mandate to negotiate what became, in 1992, the U.N. Framework Convention on Climate Change (UNFCCC). The UNFCCC has been the primary multilateral vehicle since 1992 for international cooperation among national governments to address GHG-induced climate change. While the UNFCCC is a focal point for national governments, its periphery is one forum, among others, for information sharing, collaboration, and activism also for subnational governments, financial institutions, the private sector, and nongovernmental organizations. This report is not describing these other, increasingly important aspects of international cooperation on climate change. This report summaries the content of the UNFCCC and its two subsidiary international treaties: the 1997 Kyoto Protocol (KP) and the 2015 Paris Agreement (PA). It also describes the existing guidelines to implement the PA, known as the 2018 Katowice Climate Package. The report highlights information relevant to the 2019 climate change conference, known as COP25. This report is not comprehensive. A number of other CRS reports provide greater detail and nuance on these and other aspects of the international climate change negotiations and cooperation. Some are listed at the end of this report. The UNFCCC has been the primary multilateral vehicle since 1992 for international cooperation to address GHG-induced climate change. As of January 1, 2020, there are 197 Parties to the UNFCCC that have ratified, accepted, or acceded to the international treaty, including the United States. There is broad agreement that participation of all countries would be necessary to achieve the objective of the UNFCCC, which is stated as follows: to stabilize greenhouse gas concentrations in the atmosphere at a level that will prevent dangerous human interference with the climate system, in a time frame which allows ecosystems to adapt naturally and enables sustainable development. Achieving the objective would require both abatement of GHG emissions and facilitation of adaptation to adverse impacts of climate change in order to enable sustainable development. Stabilizing GHG concentrations in the atmosphere requires that net GHG emissionsâthe balance of \"gross\" emissions of GHG to the atmosphere and removals of GHG from the atmosphereâreach \"net zero\" or \"carbon neutrality.\" Removals and sequestration can occur by photosynthesis (vegetation, sea algae) or through advanced technologies. Some increased level of removals, or \"sinks,\" could allow for some amount of human-related GHG emissions to continue. The United States and other Parties to the UNFCCC agreed to this objective when they ratified the treaty. As a framework convention, this international treaty provides the structure for collaboration and evolution of efforts over decades, as well as the first qualitative step in that collaboration. The UNFCCC does not, however, include quantitative and enforceable objectives and commitments for any Party. The UNFCCC was adopted in 1992 and entered into force in 1994. The UNFCCC's governing body, the Conference of the Parties (COP), met in its 25 th session (COP25) from December 2 to 13, 2019, in Madrid, Spain. Initially, Chilean President SebastiÃ¡n PiÃ±era stepped forward to host COP25 in place of Brazil following the election of President Jair Bolsonaro. PiÃ±era sought to underscore his efforts to address climate change but ultimately decided that the summit should take place elsewhere due to mass protests in Chile. All Parties to the UNFCCC, including the United States, have a set of common obligations under the treaty: to inventory, report, and mitigate their human-related GHG emissions, including emissions and removals from land uses; to cooperate in preparing to adapt to climate change; and to assess and review, through the COP, the effective implementation of the UNFCCC, including the commitments therein. Certain obligations are additional or more specific for the countries that had higher incomes in 1992, and those countries are listed in Annex I of the Agreement. They are commonly referred to as Annex I Parties. All others are non-Annex I Parties. These additional or more specific obligations included more frequent reporting and providing financing and technology transfers, among others. The bifurcation of Parties and commitments has been a major point of contention and, some would argue, delay in negotiation and implementation of the climate change agreements (see text box). The UNFCCC and its subsidiary agreements do not define the terms developing country or developed country . In the 1990s, the Annex I Parties anticipated that developing country Parties would \"graduate\" into specific commitments and become donor countries as their incomes and emissions grew. As discussed later, related disagreements directly contributed to U.S. nonparticipation in the KP, the collapse of negotiations in Copenhagen in 2009, and the withdrawal or decision of some Parties not to adopt GHG abatement targets in the second period of the KP from 2013 to 2020. In Copenhagen at COP15 in 2009, the COP was unable to adopt an agreement among all Parties as Bolivia, Cuba, Peru, and Venezuela opposed the text. The decision of the COP included a nonbinding political statement, the Copenhagen Accord, which began a turn toward more explicit commitments by non-Annex I Parties to GHG mitigation under the UNFCCC. The Copenhagen Accord specified that the Annex I Parties would implement quantified economy-wide GHG targets for 2020 in an agreed reporting format. Non-Annex I Parties to the UNFCCC would commit to implement mitigation actions to be submitted in an alternative agreed format. At least 43 Annex I Parties (15 Parties, including the United States, plus the EU-28 jointly submitting a pledge) and 47 non-Annex I Parties had submitted nonbinding pledges. While most countries participated, the pledges remained bifurcated by both the type of action and the reporting requirements. Among other differences, Annex I Parties were to submit quantified economy-wide GHG emissions targets for 2020 relative to a baseyear, while non-Annex I Parties were to submit \"nationally appropriate mitigation actions\" with no associated dates. The submissions would be compiled separately by the Secretariat of the UNFCCC. The first subsidiary agreement to the UNFCCC was the 1997 KP, which entered into force in 2005. The United States signed but did not ratify the KP and so is not a Party to it. The KP established legally binding targets for 37 high-income countries and the European Union (EU) to reduce their GHG emissions on average by 5% below 1990 levels during 2009-2012. It precluded GHG mitigation obligations for developing countries. All Parties with the Quantified Emissions Limitation and Reduction Obligations (QELROS) under the KP (i.e., GHG targets) were judged in compliance after the end of the first commitment period of 2009-2012. The domestic GHG emissions of some Parties were higher than their targets, but as envisioned under the KP, Parties could fulfil their obligations by acquiring emission reduction credits through the three market mechanisms of the treaty: the Clean Development Mechanism, Joint Implementation, and emissions trading. Most of the high-income Partiesâmostly the EU members and other European nationsâtook on further GHG reduction targets for 2013-2020. The Secretariat's assessment of the emissions of the KP Parties with QELROS, as of November 2018, found: Annex I Parties are progressing towards their 2020 targets but gaps remain. Individual Parties have made varying progress towards their 2020 targets: most Parties' emission levels are already below their 2020 targets; some Parties must make further efforts to meet their targets by strengthening implementation of their existing [policies and measures]; and using units from MBMs [market-based mechanisms], if needed, and the contribution from LULUCF [land use, land use change, and forestry], if applicable; other Parties' emissions remained above their base-year level, owing mainly to inadequacy of domestic [policies and measures], high marginal mitigation costs or energy system constraintsâthey indicated that the use of units from MBMs and, if applicable, the contribution from LULUCF are expected to make a sizable contribution towards achieving their targets. The United States did not join the KP, and Canada withdrew before the end of the first commitment period. At least in part, their reasons for disengaging from the KP included the non-Annex I Parties' objections to acceding to quantified GHG reduction commitments. While negotiating the second KP commitment period, Australia, Japan, and other Parties also decided to seek an agreement that included commitments on the same terms from all Parties. This led to a mandate, negotiated at the 2011 COP17 in Durban, South Africa, to develop a protocol, another legal instrument, or an agreed outcome with legal force under the UNFCCC applicable to all Parties no later than 2015. The Durban Mandate resulted in the 2015 PA, discussed below. The PA is the second major subsidiary agreement under the UNFCCC. The PA is to eventually replace the KP as the primary subsidiary vehicle for process and actions under the UNFCCC. Obama Administration officials stated that the PA is not a treaty requiring Senate advice and consent to ratification. The U.N. Climate Conference in Madrid included COP25 and the second session of the \"Conference of the Parties serving as the meeting of the Parties to the Paris Agreement\" (CMA2), along with meetings of other related bodies. Though the United States has given notice of withdrawal from the PA, its withdrawal is to take effect no earlier than November 4, 2020. Until then, the United States may participate as a Party. After withdrawal takes effect, the United States may participate in a more limited way as an Observer State. The PA was intended to be legally binding on its Parties, though not all provisions in it are mandatory. The PA requires that Parties submit nonbinding pledges, in NDCs, to mitigate their GHG emissions and enhance removals. NDCs may also articulate goals to adapt to climate change and cooperate toward these ends, including mobilization of financial and other support. Some provisions are binding, such as those regarding reporting and review, while others are recommendations or collective commitments to which it would be difficult to hold an individual Party accountable. Key aspects of the agreement include: Temperature goal. The PA defines a collective, long-term objective to hold the GHG-induced increase in temperature to well below 2 o Celsius (C) and to pursue efforts to limit the temperature increase to 1.5 o C above the pre-industrial level. As discussed below, a periodic \"Global Stocktake\" is to assess progress toward the goals. Single GHG mitigation framework. The PA establishes a process, with a ratchet mechanism in five-year increments, for all countries to set and achieve GHG emission mitigation pledges until the long-term goal is met. For the first time under the UNFCCC, all Parties participate in a common framework with common guidance, though some Parties are allowed flexibility in line with their capacities. Accountability framework. To promote compliance, the PA balances accountability to build and maintain trust (if not certainty) with the potential for public and international pressure (\"name-and-shame\"). Also, the PA establishes a compliance mechanism designed to use expert-based and facilitative review and response rather than punitive measures. Many Parties and observers are to closely monitor the effectiveness of this strategy. Adaptation. The PA also requires \"as appropriate\" that Parties prepare and communicate their plans to adapt to climate change. Parties agreed that adaptation communications would be recorded in a public registry. Collective financial obligation. The PA reiterates the collective obligation in the UNFCCC for developed country Parties to provide financial resourcesâpublic and privateâto assist developing country Parties with mitigation and adaptation efforts. It urges scaling up from past financing. The Parties agreed to set, prior to their 2025 meeting, a new collective quantified goal for mobilizing financial resources of not less than $100 billion annually to assist developing country Parties. At COP24/CMA1 in Katowice, Poland, in 2018, the PA Parties agreed to many of the guidelines and processes so that Parties may implement the PA as intended. Despite these agreements, Parties did not resolve several issues of significance. Negotiations on these issues will likely continue at COP26/CMA3 in Glasgow, Scotland, in November 2020. The Katowice Package, as it is often called, clarified some ambiguities in the PA that were considered important to U.S. interests, including guidelines for Parties to report their NDCs, and the Enhanced Transparency Framework (ETF) with guidelines and formats to allow a Party's NDC to be clearly understood. The Katowice Package thereby supports the effectiveness of the consultative compliance mechanism of the PA (discussed below). Below are brief summaries of key aspects of the Katowice Package. The Parties to the PA agreed to new guidelines on how to report NDCs. NDCs are to be updated every five years and \"will\" represent a progress in ambition to abate GHG emissions beyond the previous NDC. While Parties agreed that they \"should\" use a prescribed format for communicating NDCs, the details are still to be worked out. There is not agreement yet on \"common timeframes\" for NDCsâwhether NDCs should look five or 10 years into the future. Those Parties that submitted NDCs with time frames up to 2025 (including the United States) must communicate \"new\" NDCs by 2020. Those Parties with NDCs with time frames up to 2030 must communicate or update their NDC in 2020. Were the United States to remain in the PA, it would be required to submit a new NDC in 2020. The content of NDCs continues to be nationally determined and nonbinding, but it should reflect what a Party intends to achieve. The guidelines apply to NDCs submitted in 2025, but Parties are invited to use an agreed format in updating their NDCs in 2020. The guidelines also address how to report adaptation measures for Parties that wish to include them in their NDCs. The PA provides in Article 6 for Parties to choose voluntary cooperation with other Parties to implement their NDCs. The purpose is to allow \"higher ambition in their mitigation and adaptation actions and to promote sustainable development and environmental integrity\" (Article 6.1). This article, in other words, allows the use of market mechanisms to achieve GHG mitigation at the lowest possible cost and in concert with sustainable development. This, in theory, can induce Parties to take on stronger GHG mitigation commitments while ensuring that the GHG mitigation constitutes real emission reductions. The debate about the purpose for voluntary cooperation and market mechanismsâand the rules by which they are put into operationâwas a major area of work undecided in Katowice. Parties agreed to provide information on adaptation priorities, needs, plans, and actions in new \"adaptation communications,\" as well as through the NDCs. Parties agreed in Katowice that the Adaptation Fund, originally established under the 1997 Kyoto Protocol, will serve the PA. It will be one of the operating entities to the financial mechanism of the PA in addition to the Global Environment Facility and the Green Climate Fund, discussed below As prescribed by the PA, a Global Stocktake is to be held every five years. Parties agreed that the Global Stocktake will consider progress toward the UNFCCC's objective and the PA's aims overall. It will use best available science and will cover mitigation, adaptation, financial flows, equity, and means of implementation and support. It will not examine the situations of individual Parties. Parties decided that the next Global Stocktake would be held in 2023. A number of decisions were reached regarding the Global Stocktake, including the information it is expected to receive from the ETF (discussed below) and other sources from PA processes. Input may also come from nonstate actors, including non-Parties, localities and subnational governments, the business community, and all parts of civil society. Setting strong requirements for the transparency of each Party's efforts has been a priority of the United States since the negotiation of the UNFCCC. ETF guidelines specify the information that Parties must report with their NDCs. That information is expected to support a \"facilitative multilateral consideration of progress,\" along with biennial transparency reports. Methods for GHG emission estimation and other technical issues will continue to rely on the IPCC's technical advice. According to the U.N. Climate Change Secretariat, all Parties must provide information on the following, as applicable to their NDCs: Quantifiable information on the reference point for GHG mitigation actions or targets; Time frame and/or periods (i.e., the start and end dates) for implementation; Scope and coverage of the NDC (i.e., the quantitative target, which sources and gases are covered); National planning processes for developing the NDC and, if available, implementation plans taking into account national circumstances; All assumptions and methodological approaches; How the Party determines that its NDC is fair and ambitious; and How the NDC contributes toward achieving the objective of the UNFCCC. The guidelines are to facilitate review and, under the committee (below), consultation intended to encourage compliance with commitments. Whether a Party supplies a timely NDC and reports its NDC according to the guidelines is subject to review by a technical group of experts. The adequacy and appropriateness of Parties' NDCs are not subject to review under the ETF. Flexibility in reporting under the PA is afforded only for those provisions in the modalities, procedures, and guidelines that are specified to allow flexibility. These provisions include (1) the frequency and level of details of reporting, (2) the modalities of the review, and (3) the modalities of the facilitative multilateral consideration of progress. A Party may determine whether to make use of flexibilities. That said, using the flexibilities is not without checks in the review processes. A developing country that claims inadequate capacity to meet the guidelines and elects to apply a flexibility must make clear in its Biennial Transparency Report that it has applied a flexibility. It must explain the capacity constraint, how it intends to address the constraint, and its intended time frame to make improvements to the constraint(s). The technical review teams may not review these flexibilities. The Parties established a 12-member committee to \"facilitate implementation\" of the PA. The committee is intended to support Parties' efforts to meet their obligations under the PA as a soft, pro-compliance mechanism. The PA's compliance processes are consultative, not punitive. The committee may initiate a \"consideration\" should a Party not submit or update its NDC as required or provide mandatory communications. In 2009 and 2010, developed countries pledged collectively to mobilize US$100 billion per year by 2020, from public and private sources, to support mitigation and adaptation activities in low-income countries. COP decision 1/CP.21 to adopt the PA (not the PA itself) stated that developed countries intend to continue their existing collective mobilization goal through 2025. Prior to 2025, the Parties shall set a new collective quantified goal for financial resources from a floor of US$100 billion per year. The goal should take into account the needs and priorities of developing countries. Parties may take into consideration the information from the Warsaw International Mechanism for Loss and Damage associated with Climate Change Impacts. The financial pledges are not an enforceable commitment by developed country Parties. Many stakeholders argue, nonetheless, that the resources are essential to help low-income countries contribute to GHG abatement and adaptation in the context of sustainable development. The financial flows are also important politicallyâin part to build confidence in the functionality of the UNFCCC and PA and to build trust between the lower and higher income economies. At COP24 and since then, some countries made pledges toward this goal. Some developing country Parties submitted NDCs with GHG mitigation targets they would achieve unconditionally and more ambitious targets that they would achieve with adequate financial and technical support. The Green Climate Fund (GCF) was proposed, during the 2009 COP in Copenhagen to be a new international financial institution connected to the UNFCCC. The fund and its design was agreed during the 2011 COP in Durban, South Africa. The GCF was made operational in 2014. The GCF aims to assist lower-income countries in their efforts to combat climate change through the provision of grants and other concessional financing for mitigation and adaptation projects, programs, policies, and activities. The GCF is capitalized by contributions from donor countries and other sources, potentially including innovative mechanisms and the private sector. The GCF officially opened for capitalization at the U.N. Climate Summit in September 2014. The GCF's initial resource mobilization lasted from 2015 to 2018. As of the most recent published reporting (April 30, 2019), the GCF had raised over $10.2 billion in signed pledges from 48 countries/regions/cities during the resource mobilization period. The GCF board recently approved 10 new projects, increasing the GCF portfolio to 111 projects and increasing the level of related GCF funding to over $5.2 billion in 99 developing countries. On October 25, 2019, during the Pledging Conference for GCF's First Replenishment in Paris, 27 countries made pledges totaling $9.8 billion to cover the next four years of the fund. Parties agreed in Katowice that the Adaptation Fund, which was established under the KP, will serve the PA, in addition to the Global Environmental Facility and the GCF. Thus far, the Adaptation Fund has been financed by a share of the proceeds of the emissions trading mechanisms under the KP, as well as by voluntary contributions. With a transition from the KP to the PA, arrangements for the flow of funds are not completely agreed upon. Parties agreed that a share of the proceeds from one of the new cooperative mechanisms will continue to provide a share of its proceeds to the Adaptation Fund. A number of Parties oppose proposalsâparticularly from Parties that are relatively small and perceived to be especially vulnerable to climate changeâto use the other two market mechanisms under Article 6 to finance the Adaptation Fund. Beginning in 2020, developed countries are to submit biennial communications on expected levels of climate finance. The communications are to contain both quantitative and qualitative information. The biennial communications and Secretariat synthesis of the information therein is to inform the Global Stocktakes. Starting in 2020, the Standing Committee on Finance is to report on the determination of support needs of developing countries to implement the UNFCCC and the PA. The committee is also to consider financial needs consistent with long-term low-emissions and sustainable development pathways. The Technology Framework of the PA is to provide overall guidance to the Technology Mechanism that was established under the UNFCCC. The purpose of both is to foster sharing of information and cooperation to develop new, low-emission technologies and technologies to increase resilience to climate change. Supporters viewed the technology mechanisms as important in transforming the set of technologies available, and the economies that use them, as a means to meet the objective of the UNFCCC. The Technology Framework is to have five focus areas: (1) innovation, (2) implementation, (3) enabling environments and capacity-building, (4) collaboration and stakeholder engagement, and (5) support. The Parties intend that the framework should facilitate the active participation of all relevant stakeholders and take into account sustainable development, gender, the special circumstances of the least developed countries and small island developing states, and the enhancement of capacities of indigenous people and \"endogenous technologies.\" The Executive Committee of the Technology Framework is expected to report on the progress and challenges of its work in joint annual reports with the Climate Technology Centre established under the UNFCCC. CRS Report R44609, Climate Change: Frequently Asked Questions About the 2015 Paris Agreement , by Jane A. Leggett and Richard K. Lattanzio CRS In Focus IF10239, President Obama Pledges Greenhouse Gas Reduction Targets as Contribution to 2015 Global Climate Change Deal , by Jane A. Leggett CRS Report R44092, Greenhouse Gas Pledges by Parties to the United Nations Framework Convention on Climate Change , by Jane A. Leggett CRS In Focus IF10668, Potential Implications of U.S. Withdrawal from the Paris Agreement on Climate Change , by Jane A. Leggett CRS Report R44761, Withdrawal from International Agreements: Legal Framework, the Paris Agreement, and the Iran Nuclear Agreement , by Stephen P. Mulligan CRS Legal Sidebar WSLG1836, Constitutional Limits on States' Efforts to \"Uphold\" the Paris Agreement , by Stephen P. Mulligan CRS Report R41889, International Climate Change Financing: The Green Climate Fund (GCF) , by Richard K. Lattanzio CRS Report R41845, The Global Climate Change Initiative (GCCI): Budget Authority and Request, FY2010-FY2016 , by Richard K. Lattanzio CRS In Focus IF10248, China's \"Intended Nationally Determined Contribution\" to Addressing Climate Change in 2020 and Beyond , by Jane A. Leggett CRS In Focus IF10296, New Climate Change Joint Announcement by China and the United States , by Jane A. Leggett CRS Report R40001, A U.S.-Centric Chronology of the United Nations Framework Convention on Climate Change , by Jane A. Leggett CRS In Focus IF10904, Potential Hydrofluorocarbon Phase Down: Issues for Congress , by Jane A. Leggett", "summary": "The United Nations Framework Convention on Climate Change (UNFCCC) has been the principle forum for cooperation among nations on greenhouse gas (GHG)-induced climate change since its adoption in 1992. Its objective is \"to stabilize greenhouse gas concentrations in the atmosphere at a level that will prevent dangerous human interference with the climate system, in a time frame which allows ecosystems to adapt naturally and enables sustainable development.\" Stabilizing GHG concentrations in the atmosphere requires that the balance of \"gross\" emissions of GHG minus the removals of GHG from the atmosphere reach \"net zero.\" Two principles agreed in the UNFCCC are that (1) Parties should act \"on the basis of equity and in accordance with their common but differentiated responsibilities and respective capabilities\" and (2) developed country Parties should take the lead in combating climate change. The bifurcation of responsibilities among Parties into developed (Annex I) and developing countries has been a major point of contention. Annex I Parties, including the United States, had stronger obligations, such as more rigorous reporting and reviews. A subset listed in Annex II, including the United States, committed to provide agreed financial resources and technology transfers. The commitments are qualitative and collective, not binding on individual Parties. The first subsidiary agreement to the UNFCCC was the 1997 Kyoto Protocol (KP), which entered into force in 2005. The United States signed but did not ratify the KP and so is not a Party. The developed Parties agreed to reduce GHG emissions by 5% below their 1990 levels, with different targets for each Party. In 2009, a political declaration, the Copenhagen Accord, led to explicit pledges from many Parties to mitigate GHG, though they remained bifurcated as Annex I and non-Annex I (i.e., developing countries) by both the type of action and the frequency and format of the reporting requirements. In 2010, the Cancun agreements took note of a Copenhagen pledge by developed country Parties to jointly mobilize $100 billion per year by 2020. Funds provided \"may come from a wide variety of sources, public and private, bilateral and multilateral, including alternative sources.\" The Paris Agreement (PA) is the second major subsidiary agreement under the UNFCCC. The PA defines a collective, long-term objective to hold the GHG-induced increase in temperature to well below 2 o Celsius (C) and to pursue efforts to limit the temperature increase to 1.5 o C above the pre-industrial level. In the PA, for the first time under the UNFCCC, all Parties participate in a common framework with common guidance, though some Parties are allowed limited flexibility. The negotiators intended the PA to be legally binding on its Parties, though not all provisions are mandatory. All Parties must submit \"Nationally Determined Contributions\" (NDCs) containing nonbinding pledges to mitigate GHG emissions. The Parties are to update or submit new NDCs by 2020 and every five years thereafter. Each successive NDC of a Party \"will represent a progression\" and \"reflect its highest possible ambition, reflecting its common but differentiated responsibilities and respective capabilities, in light of different national circumstances.\" The PA reiterates the obligation in the UNFCCC for developed country Parties to seek to mobilize financial support to assist developing country Parties with climate change mitigation and adaptation efforts, encouraging all Parties to provide financial support voluntarily. The decision to carry out the PA calls for continuing the Cancun collective mobilization through 2025. The Parties agree to set, prior to their 2025 meeting, a new collective, quantified goal of not less than $100 billion annually to assist developing country Parties. President Trump announced his intention in 2017 to withdraw the United States from the PA as soon as it was eligible. The U.S. Department of State notified the United Nations of U.S. withdrawal on November 4, 2019. The withdrawal takes effect on November 4, 2020, unless the U.S. government postpones or rescinds the withdrawal. A Party may reenter the PA 30 days after depositing notice that it has ratified, accepted, or acceded to the PA.", "document_type": "crs"}
{"report": "U.S.-Iran relations have been mostly adversarial since the 1979 Islamic Revolution in Iran. U.S. officials and official reports consistently identify Iran's support for militant armed factions in the Middle East region a significant threat to U.S. interests and allies. Attempting to constrain Iran's nuclear program took precedence in U.S. policy after 2002 as that program advanced. The United States also has sought to thwart Iran's purchase of new conventional weaponry and development of ballistic missiles. In May 2018, the Trump Administration withdrew the United States from the 2015 nuclear agreement (Joint Comprehensive Plan of Action, JCPOA), asserting that the accord did not address the broad range of U.S. concerns about Iranian behavior and would not permanently preclude Iran from developing a nuclear weapon. Senior Administration officials explain Administration policy as the application of \"maximum pressure\" on Iran's economy to (1) compel it to renegotiate the JCPOA to address the broad range of U.S. concerns and (2) deny Iran the revenue to continue to develop its strategic capabilities or intervene throughout the region. Administration officials deny that the policy is intended to stoke economic unrest in Iran. As the Administration has pursued its policy of maximum pressure, including imposing sanctions beyond those in force before JCPOA went into effect in January 2016, bilateral tensions have escalated significantly. Key developments that initially heightened tensions include the following. On April 8, 2019, the Administration designated the Islamic Revolutionary Guard Corps (IRGC) as a Foreign Terrorist Organization (FTO), representing the first time that an official military force was designated as an FTO. The designation stated that \"The IRGC continues to provide financial and other material support, training, technology transfer, advanced conventional weapons, guidance, or direction to a broad range of terrorist organizations, including Hezbollah, Palestinian terrorist groups like Hamas and Palestinian Islamic Jihad, Kata'ib Hezbollah in Iraq, al-Ashtar Brigades in Bahrain, and other terrorist groups in Syria and around the Gulf.... Iran continues to allow Al Qaeda (AQ) operatives to reside in Iran, where they have been able to move money and fighters to South Asia and Syria.\" As of May 2, 2019, the Administration ended a U.S. sanctions exception for any country to purchase Iranian oil, aiming to drive Iran's oil exports to \"zero.\" Since May 2019, the Administration has ended five out of the seven waivers under the Iran Freedom and Counter-Proliferation Act (IFCA, P.L. 112-239 )âwaivers that allow countries to help Iran remain within limits set by the JCPOA. On May 5, 2019, citing reports that Iran or its allies might be preparing to attack U.S. personnel or installations, then-National Security Adviser John Bolton announced that the United States was accelerating the previously planned deployment of the USS Abraham Lincoln Carrier Strike Group and sending a bomber task force to the Persian Gulf region. On May 24, 2019, the Trump Administration notified Congress of immediate foreign military sales and proposed export licenses for direct commercial sales of defense articlesâ training, equipment, and weapons â with a possible value of more than $8 billion, including sales of precision guided munitions (PGMs) to Saudi Arabia and the United Arab Emirates (UAE). In making the 22 emergency sale notifications, Secretary of State Pompeo invoked emergency authority codified in the Arms Export Control Act (AECA), and cited the need \"to deter further Iranian adventurism in the Gulf and throughout the Middle East.\" Iran responded to the additional steps in the U.S. maximum pressure campaign in part by demonstrating its ability to harm global commerce and other U.S. interests and to raise renewed concerns about Iran's nuclear activities. Iran apparently has sought to cause international actors, including those that depend on stable oil supplies, to put pressure on the Trump Administration to reduce its sanctions pressure on Iran. On May 12-13, 2019, four oil tankers â two Saudi, one Emirat i , and one Norwegian ship â were damaged . Iran denied involvement, but a Defense Department (DOD) official on May 24, 2019, attributed the tanker attacks to the IRGC. A report to the United Nations based on Saudi, UAE, and Norwegian information found that a \"state actor\" was likely responsible, but did not name a specific perpetrator. On June 13, 2019, two Saudi tankers in the Gulf of Oman were attacked. Secretary of State Michael Pompeo stated, \"It is the assessment of the U.S. government that Iran is responsible for the attacks that occurred in the Gulf of Oman todayâ¦.based on the intelligence, the weapons used, the level of expertise needed to execute the operation, recent similar Iranian attacks on shipping, and the fact that no proxy group in the area has the resources and proficiency to act with such a high degree of sophistication.... \" Iran's allies in the region have been conducting attacks that might be linked to U.S.-Iran tensions, although it is not known definitively whether Iran directed or encouraged each attack (see Figure 1 for a map of Iran-supported groups). Trump Administration officials, particularly Secretary of State Pompeo, has stated that the United States will hold Tehran responsible for the actions of its regional allies. Some of the most significant actions by Iran-linked forces during mid-2019 are the following: On May 19, 2019, a rocket was fired into the secure \"Green Zone\" in Baghdad but it caused no injuries or damage. Iran-backed Iraqi militias were widely suspected of the firing and U.S. Defense Department officials attributed it to Iran. The incident came four days after the State Department ordered \"nonemergency U.S. government employees\" to leave U.S. diplomatic facilities in Iraq, claiming a heightened threat from Iranian allies. An additional rocket attack launched from Iraq included a May 2019 attack on Saudi pipeline infrastructure in Saudi Arabia with an unmanned aerial aircraft, first considered to have been launched from Yemen. Further attacks, discussed below, have led to U.S.-Iran hostilities. In June 2019 and periodically thereafter, the Houthis, who have been fighting against a Saudi-led Arab coalition that intervened in Yemen against the Houthis in March 2015, claimed responsibility for attacks on an airport in Abha, in southern Saudi Arabia, and on Saudi energy installations and targets. The Houthis claimed responsibility for the large-scale attack on Saudi energy infrastructure on September 14, 2019, but, as discussed below, U.S. and Saudi officials have concluded that the attack did not originate from Yemen. In a June 13, 2019, statement, Secretary of State Pompeo asserted Iranian responsibility for a May 31, 2019, car bombing in Afghanistan that wounded four U.S. military personnel. Administration reports have asserted that Iran was providing materiel support to some Taliban militants, but outside experts asserted that the Iranian role in that attack is unlikely. In subsequent weeks, U.S.-Iran tensions erupted into direct hostilities as well as further Iranian actions against U.S. partners. On June 20, 2019, Iran shot down an unmanned aerial surveillance aircraft (RQ-4A Global Hawk Unmanned Aerial Vehicle) near the Strait of Hormuz, claiming it had entered Iranian airspace over the Gulf of Oman. U.S. Central Command officials stated that the drone was over international waters. Later that day, according to his posts on the Twitter social media site, President Trump ordered a strike on three Iranian sites related to the Global Hawk downing, but called off the strike on the grounds that it would have caused Iranian casualties and therefore been \"disproportionate\" to the Iranian shoot down. The United States did reportedly launch a cyberattack against Iranian equipment used to track commercial ships. On July 18, 2019, President Trump announced that U.S. forces in the Gulf had downed an Iranian drone via electronic jamming in \"defensive action\" over the Strait of Hormuz (see Figure 3 ). Iran denied that any of its drones were shot down. U.S.-Iran tensions spilled over into confrontations between Iran and the UK. On July 4, 2019, authorities from the British Overseas Territory Gibraltar, backed by British marines, impounded an Iranian tanker, the Grace I , off the coast of Gibraltar for allegedly violating an EU embargo on the provision of oil to Syria. Iranian officials termed the seizure an act of piracy, and in subsequent days, the IRGC Navy sought to intercept a UK-owned tanker in the Gulf, the British Heritage , but the force was reportedly driven off by a British warship. On July 19, the IRGC Navy seized a British-flagged tanker near the Strait of Hormuz, the Stena Impero , claiming variously that it violated Iranian waters, was polluting the Gulf, collided with an Iranian vessel, or that the seizure was retribution for the seizure of the Grace I . On July 22, 2019, the UK's then-Foreign Secretary Jeremy Hunt explained the government's reaction to the Stena Impero seizure as pursuing diplomacy with Iran to peacefully resolve the dispute, while at the same time sending additional naval vessels to the Gulf to help secure UK commercial shipping. On August 15, 2019, following a reported pledge by Iran not to deliver the oil cargo to Syria, a Gibraltar court ordered the ship (renamed the Adrian Darya 1) released. Gibraltar courts turned down a U.S. Justice Department request to impound the ship as a violator of U.S. sanctions on Syria and on the IRGC, which the U.S. filing said was financially involved in the tanker and its cargo. The ship apparently delivered its oil to Syria despite the pledge and, as a consequence, the United States imposed new sanctions on individuals and entities linked to the ship and to the IRGC. On September 22, 2019, Iran released the Stena Impero . Separate from the UK-Iran dispute over the Grace I and the Stena Impero , Iran seized an Iraqi tanker on August 5, 2019, for allegedly smuggling Iranian diesel fuel to \"Persian Gulf Arab states.\" Iran appeared to escalate tensions significantly by conducting an attack, on September 14, 2019, on multiple locations within critical Saudi energy infrastructure sites at Khurais and Abqaiq. The Houthi movement in Yemen, which receives arms and other support from Iran, claimed responsibility but Secretary of State Pompeo stated \"Amid all the calls for de-escalation, Iran has now launched an unprecedented attack on the world's energy supply. There is no evidence the attacks came from Yemen.\" Press reports stated that U.S. intelligence indicates that Iran itself was the staging ground for the attacks, in which cruise missiles, possibly assisted by unmanned aerial vehicles, struck nearly 20 targets at those Saudi sites. Iranian officials denied responsibility for the attack. The attack shut down a significant portion of Saudi oil production and, whether conducted by Iran itself or by one of its regional allies, escalated U.S.-Iran and Iran-Saudi tensions and demonstrated a significant capability to threaten U.S. allies and interests. President Trump stated on September 16, 2019, that he would \"like to avoid\" conflict with Iran and the Administration did not retaliate militarily. U.S. officials did announce modest increases in U.S. forces in the region and some new U.S. sanctions on Iran. The attacks on the Saudi infrastructure raised several broad questions, including What is the extent and durability of the long-standing implicit and explicit U.S. security guarantees to the Gulf states? Have Iran's military technology capabilities advanced further than has been estimated by U.S. officials and the U.S. intelligence community? As tensions with Iran increased, the Trump Administration increased economic pressure on Iran to weaken it strategically, and compel it to negotiate a broader resolution of U.S.-Iran differences. On May 8, 2019, the President issued Executive Order 13871, blocking U.S.-based property of persons and entities determined to have conducted significant transactions with Iran's iron, steel, aluminum, or copper sectors. On June 24, 2019, President Trump issued Executive Order 13876, blocking the U.S.-based property of Supreme Leader Ali Khamene'i and his top associates. Sanctions on several senior officials, including Iran's Foreign Minister Mohammad Javad Zarif, have since been imposed under that Order. On September 4, 2019, the State Department Special Representative for Iran and Senior Advisor to the Secretary of State Brian Hook said the United States would offer up to $15 million to any person who helps the United States disrupt the financial operations of the IRGC and its Qods Forceâthe IRGC unit that assists Iran-linked forces and factions in the region. The funds are to be drawn from the long-standing \"Rewards for Justice Program\" that provides incentives for persons to help prevent acts of terrorism. On September 20, 2019, the Trump Administration imposed additional sanctions on Iran's Central Bank by designating it a terrorism supporting entity under Executive Order 13224. The Central Bank was already subject to a number of U.S. sanctions, rendering unclear whether any new effect on the Bank's ability to operate would result. Also sanctioned was an Iranian sovereign wealth fund, the National Development Fund of Iran. In early 2020, U.S. officials indicated that they would use all available options to achieve an extension of the arms transfer ban on Iran provided by U.N. Security Council Resolution 2231, and which expires on October 18, 2020. U.S. officials insisted that the ban be extended in order to prohibit Russia and China from proceeding with planned arms sales to Iran, which would have the effect of increasing the conventional military threat from Iran. See CRS In Focus IF11429, U.N. Ban on Iran Arms Transfers , by Kenneth Katzman. Since the Trump Administration's May 2018 announcement that the United States would no longer participate in the JCPOA, Iranian officials repeatedly have rejected renegotiating the agreement or discussing a new agreement. Tehran also has conditioned its ongoing adherence to the JCPOA on receiving the agreement's benefits from the remaining JCPOA parties, collectively known as the \"P4+1.\" On May 10, 2018, Iranian Foreign Minister Mohammad Javad Zarif wrote that, in order for the agreement to survive, \"the remaining JCPOA Participants and the international community need to fully ensure that Iran is compensated unconditionally through appropriate national, regional and global measures.\" He added that Iran has decided to resort to the JCPOA mechanism [the Joint Commission established by the agreement] in good faith to find solutions in order to rectify the United States' multiple cases of significant non-performance and its unlawful withdrawal, and to determine whether and how the remaining JCPOA Participants and other economic partners can ensure the full benefits that the Iranian people are entitled to derive from this global diplomatic achievement. Tehran also threatened to reconstitute and resume the country's pre-JCPOA nuclear activities. Several meetings of the JCPOA-established Joint Commission since the U.S. withdrawal have not produced a firm Iranian commitment to the agreement. Tehran has argued that the remaining JCPOA participants' efforts have been inadequate to sustain the agreement's benefits for Iran. In May 8, 2019, letters to the other JCPOA participant governments, Iran announced that, as of that day, Tehran had stopped \"some of its measures under the JCPOA,\" though the government emphasized that it was not withdrawing from the agreement. Specifically, Iranian officials said that the government will not transfer low enriched uranium (LEU) or heavy water out of the country in order to maintain those stockpiles below the JCPOA-mandated limits. A May 8, 2019, statement from Iran's Supreme National Security Council explained that Iran \"does not anymore see itself committed to respecting\" the JCPOA-mandated limits on LEU and heavy water stockpiles. Beginning in July 2019, the International Atomic Energy Agency (IAEA) verified that some of Iran's nuclear activities were exceeding JCPOA-mandated limits; the Iranian government has since increased the number of such activities. Specifically, according to IAEA reports, Iran has exceeded JCPOA-mandated limits on its heavy water stockpile, the number of installed centrifuges in Iran's pilot enrichment facility, Iran's LEU stockpile, and the LEU's concentration of the relevant fissile isotope uranium-235. In addition, Tehran is conducting JCPOA-prohibited research and development activities, as well as centrifuge manufacturing, and has also begun to enrich uranium at its Fordow enrichment facility. The Iranian government announced in a January 5, 2020, statement \"the fifth and final step in reducing\" Tehran's JCPOA commitments, explaining that Tehran would \"set aside the final operational restrictions under the JCPOA which is 'the restriction on the number of centrifuges.' \" The statement provided no details regarding concrete changes to Iran's nuclear program, but the term \"restrictions\" may refer to the JCPOA-mandated limits on installed centrifuges at the country's commercial enrichment facility. According to a March report from the IAEA Director General., Iran has not exceeded these limits. The January 5 announcement added that \"[i]n case of the removal of sanctions and Iran benefiting from the JCPOA,\" Iran \"is ready to resume its commitments\" pursuant to the agreement. In a May 6 speech, Iranian President Hassan Rouhani characterized Tehran's aforementioned actions as a withdrawal from the government's JCPOA commitments \"in an equal scale,\" Whenever the United States and P4+1 \"are ready to observe their full commitments under the JCPOA,\" Iran \"will return to the JCPOA the same day,\" he added. According to an article published May 6, Iran's Permanent Representative to the IAEA Kazzem Gharibabdi stated that Iran could reduce or end its cooperation with the IAEA if the United States and P4+1 continue actions which, Tehran argues, damage the JCPOA. In early December 2019, press reports and U.S. officials indicated that Iran was supplying short- range missiles to allied forces inside Iraq. A series of indirect fire attacks in mid-December 2019 targeted Iraqi military facilities where U.S. forces are co-located. In response, Secretary Pompeo issued a statement saying, \"We must also use this as an opportunity to remind Iran's leaders that any attacks by them, or their proxies of any kind, that harm Americans, our allies, or our interests will be answered with a decisive U.S. response.\" Secretary of Defense Mark Esper stated that he urged then-Iraqi Prime Minister Adel Abd Al Mahdi to \"take proactive actionsâ¦to get that under control.\" On December 27, 2019, a rocket attack on a base near Kirkuk in northern Iraq killed a U.S. contractor and wounded four U.S. service members and two Iraqi service members. Two days later, the U.S. launched retaliatory airstrikes on five facilities (three in Iraq, two in Syria) used by the Iran-backed Iraqi armed group Kata'ib Hezbollah (KH), a U.S.-designated Foreign Terrorist Organization to which the U.S. attributed the attack. KH leader and leading figure in the Iraqi-state affiliated Popular Mobilization Forces Abu Mahdi al Muhandis said dozens of fighters were killed and injured and promised a \"very tough response\" on U.S. forces in Iraq. Iraqi leaders, including those who want to maintain good relations with both the United States and Iran, criticized the strikes as a \"violation of Iraqi sovereignty.\" The hostilities came as Iran sought to preserve its political influence amidst large-scale demonstrations in which hundreds of protestors were killed by security forces and which contributed to Abd Al Mahdi's resignation that month. He continues to serve in a caretaker role while Iraqi political leaders negotiate a transition. In a December 6, 2019 press briefing announcing sanctions designations of several Iran-linked Iraqi groups and individuals, Assistant Secretary of State for Near Eastern Affairs David Schenker said the United States Government will work with anyone in the Iraqi Government who is willing to put Iraqi interests first.... This is a sine qua non . But we see in the process of establishing a new government or determining who the next prime minister will be that [IRGC-QF commander] Qasem Soleimani is in Baghdad working this issue. It seems to us that foreign terrorist leaders, or military leaders, should not be meeting with Iraqi political leaders to determine the next premier of Iraq, and this is exactly what the Secretary says about being perhaps the textbook example of why Iran does not behave and is not a normal state. This is not normal. This is not reasonable. This is unorthodox and it is incredibly problematic, and it is a huge violation of Iraqi sovereignty. On December 31, 2019, two days after the U.S. airstrikes against KH targets in Iraq and Syria, supporters of KH and other Iran-backed Iraqi militias surrounded and then entered the U.S. Embassy in Baghdad, setting some outer buildings on fire. The militiamen withdrew after their leaders said they obtained acting Prime Minister Abdul Mahdi's promise for \"serious work\" on a parliamentary vote to expel U.S. forces from the country, a long-sought goal of Iran and its Iraqi allies. President Trump tweeted that Iran, which \"orchestrat[ed the] attack,\" would \"be held fully responsible for lives lost, or damage incurred, at any of our facilities. They will pay a very BIG PRICE!\" On January 3, 2020, Iraq time, a U.S. military armed drone strike killed IRGC-QF Commander Major General Qasem Soleimani in what the Defense Department termed a \"defensive action.\" The statement cited Soleimani's responsibility for \"the deaths of hundreds of Americans and coalition service members\" and his approval of the Embassy blockade, and stated that he was \"actively developing plans to attack American diplomats and service members in Iraq and throughout the region.\" The strike, conducted while Soleimani was leaving Baghdad International Airport, also killed KH leader Abu Mahdi al-Muhandis, who also headed the broader Popular Mobilization Forces (PMF) made up mostly of militia fighters, and other Iranian and Iraqi figures. Iraq's Council of Representatives (CoR) on January 5, 2020, voted to direct the government \"to work towards ending the presence of all foreign troops on Iraqi soil,\" according to the media office of the Iraqi Parliament. Soleimani was widely regarded as one of the most powerful and influential figures in Iran, with a direct channel to Khamene'i, who serves as Commander-in-Chief of all Iranian armed forces. One expert described him as \"the military center of gravity of Iran's regional hegemonic efforts\" and \"an operational and organization genius who likely has no peer in the upper ranks of the Islamic Revolutionary Guard Corps.\" Others contend that \"he was only the agent of a government policy that preceded him and will continue without him.\" Secretary of State Pompeo underscored that the United States is not seeking further escalation, but Iran's leaders, including Supreme Leader Ali Khamene'i, threatened to retaliate for the Soleimani killing. That retaliation, codenamed \"Operation Martyr Soleimani\" came on January 8, 2020, in the form of an Iranian ballistic missile strike on two Iraqi bases â Ayn al-Asad in western Iraq and an airbase near Irbil, in Kurdish-controlled northern Iraq. The United States reported no \"casualties,\" according to a statement by President Trump on January 8, 2020, and the United States reportedly had some advanced warning of the attack, via Iraqi officials. The President added that \"Iran appears to be standing down, which is a good thing for all parties concerned and a very good thing for the world,\" and there was no U.S. military retaliation for Iran's missile strike. Still, over the coming weeks, about 110 U.S. military personnel were diagnosed with various forms of traumatic brain injury, mostly concussions from the blast. Iran's ability to hit Ayn al-Asad with some degree of precision indicated growing capability in Iran's missile capabilities. For the past several years, the U.S. intelligence community, in its annual worldwide threat assessment briefings for Congress, has assessed that Iran has \"the largest inventory of ballistic missiles in the region,\" and the 2019 version of the annual, congressionally-mandated report on Iran's military power by the Defense Intelligence Agency indicated that Iran is advancing its drone technology and the precision targeting of the missiles it provides to its regional allies. Israel asserts that these advances pose a sufficient threat to justify Israeli attacks against Iranian and Iran-allied targets in the region, including in Lebanon, Syria, and Iraq. After about two months marked only by casualty-free occasional rocket attacks in Iraq by Iran-backed factions, U.S.-Iran tensions began to rise again in March 2020. On March 11, 2020, a rocket attack on Camp Taji in Iraq, allegedly by KH, killed two U.S. military personnel and one British medic serving with the U.S.-backed coalition fighting the Islamic State organization. On March 13, 2020, the commander of U.S. Central Command (CENTCOM), Gen. Kenneth McKenzie, said the United State used manned aircraft to strike several sites near Baghdad that KH uses as storage areas for advanced conventional weapons, heavy rockets, and associated propellant. According to McKenzie: \"We also assessed that the destruction of these sites will degrade Kata'ib Hezbollah's ability to conduct future strikes.\" However, the deterrent effect of the U.S. strikes appear limited. On March 15, 2020, according to the Defense Department, three U.S. service personnel were injured in another rocket attack on the same location, Camp Taji, of which two were seriously wounded. Some Iraqi military personnel were also wounded. The United States did not retaliate. The new hostilities in Iraq came amid Iraq's struggles to establish a government to succeed that of Adel Abdul Mahdi, who remains a caretaker prime minister. Soleimani's successor, Esmail Qaani, made his first reported visit to Iraq in late March, reportedly in an effort to unite Iran-backed factions on a successor to Abdul Mahdi. The Iraqi political struggles to form a new government reflect the continuing Iranian and U.S. effort to limit each other's influence on Iraqi politics. Several weeks after the Iraq rocket attacks, Iran resumed some provocations in the Persian Gulf. On April 14, 2020, the IRGC Navy forcibly boarded and steered into Iranian waters a Hong Kong-flagged tanker. The next day, eleven IRGC Navy small boats engaged in what the State Department called \"high speed, harassing approaches\" of five U.S. naval vessels conducting routine exercises in the Gulf.\" The United States, either separately or as part of the IMSC Gulf security mission discussed above, did not respond militarily to the Iranian actions. However, on April 22, President Trump posted a message on Twitter saying: \"I have instructed the United States Navy to shoot down and destroy any and all Iranian gunboats if they harass our ships at sea.\" U.S. defense officials characterized the President's message as a warning Iran against further such actions, but they stressed that U.S. commanders have discretion about how to respond to future provocative actions by Iran. Also on April 22, the IRGC announced that it had launched a \"military satellite\" into orbit. Secretary of State Pompeo reacted by stating \"I think today's launch proves what we've been saying all along here in the United States [that Iran's space launches are not for purely commercial purposes].\" On May 6, 2020, the Chairman of the Joint Chiefs of Staff Gen. Mark Milley stated \"Well, let me put it this way, they launched a satellite vehicle, I think we publicly had stated it was tumbling. So the satellite itself, not overly concerned about it, but the missile technology, the secondary and second and third order missile technology and the lesson learned from that, that is a concern because, you know, different missiles can do different things and one can carry a satellite, another can carry some sort of device that can explode. So, the bottom line is yes, it is a security concern any time Iran is testing any type of long-range missile.\" U.S. partner countries and U.N. officials have consistently called for the de-escalation of tensions and the avoidance of war. The EU countries have refused to join the U.S. maximum pressure campaign as a consequence of Iran's provocative acts, although the UK, France, and Germany have urged Iran to negotiate a new JCPOA that includes limits on Iran's missile development. Some U.S. allies have joined a U.S. effort to deter Iran from further attacks on shipping in the Gulf. EU officials have said that they still hope to preserve the JCPOA could be preserved. The United States and Iran do not have diplomatic relations and there have been no known high-level talks between Iran and Administration officials since the Trump Administration withdrew from the JCPOA. Prior to the Soleimani killing, various third country leaders, such as Japanese Prime Minister Shinzo Abe in mid-2019 and again in a visit to Iran in December 2019, have sought to move Tehran and Washington toward direct talks. Several Gulf countries have sent delegations to Iran to try to ease U.S.-Iran tensions that the Gulf leaders say could lead to severe destruction in the Gulf states themselves in the event of conflict. A UAE delegation that visited Tehran in late July 2019 undertook the first UAE security talks with Iran since 2013. In late 2019, Saudi Arabia reportedly sought help from Pakistan and Iraq in undertaking talks with Iran to lower tensions. In August 2019, French President Macron appeared to make progress but ultimately did not produce U.S.-Iran talks. While hosting the G-7 summit in Biarritz, Macron invited Foreign Minister Zarif to meet with him there. No Trump-Zarif meeting took place in Biarritz but, at a press conference at the close of the summit, President Trump reiterated his willingness, in principle, to meet with Iranian President Hassan Rouhani, presumably during the U.N. General Assembly meetings in New York in September. President Trump reportedly considered supporting a French proposal to provide Iran with a credit line as an incentive for Iran to meet with him. However, in the wake of the September 14, 2019 attacks in Saudi Arabia and since, the Supreme Leader has stated that there would be no U.S.-Iran talks and Rouhani and Zarif have since repeatedly restated the view that U.S. sanctions be lifted before any such talks. For the stated purpose of trying to deter further Iranian attacks and protecting U.S. forces already in the region, the United States added forces and military capabilities in the region. As of early 2020, approximately 14,000 U.S. military personnel had been added to a baseline of more than 60,000 U.S. forces in and around the Persian Gulf, which include those stationed at military facilities in the Arab states of the Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Oman, and Bahrain), and those in Iraq and Afghanistan. Defense Department officials indicated that the additional deployments mostly restored forces who were redeployed from the region a few years ago, and did not represent preparation for any U.S. offensive against Iran. Among the additional deployments, the United States sent additional Patriot and Terminal High Altitude Area Defense (THAAD) missile defense systems in the region. Some of the additional forces sent deployed to Prince Sultan Air Base in Saudi Arabia, which is south of Riyadh. U.S. forces used the base to enforce a no-fly zone over southern Iraq during the 1990s, but left there after Saddam Hussein was ousted by Operation Iraqi Freedom in 2003. As 2020 progressed, some U.S. deployments changed. In March 2020, hundreds of U.S forces in Iraq were redeployed from smaller bases in Iraq to larger ones, and some were withdrawn to locations elsewhere in the region. The redeployments reportedly were due to a waning threat in Iraq from the Islamic State organization as well as the apparent need to better defend U.S. forces from attacks by Iran-backed militias. In early May 2019, it was reported that the United States had withdrawn some Patriot air defenses and combat aircraft from Saudi Arabia and other locations in the Gulf, although U.S. officials denied that the deployments signaled an altered assessment of the Iran threat or would degrade U.S. capabilities to deter Iran. Iran's naval actions in the Gulf in mid-2019 prompted the formation of a new, U.S.-led military operation to protect commercial shipping in the Gulf. The maritime security and monitoring initiative for the Gulf, the Bab el-Mandeb Strait, and the Suez Canal was termed \"Operation Sentinel.\" Operation Sentinel began activities in August 2019 and was then formally inaugurated as the International Maritime Security Construct (IMSC) in Bahrain in November 2019. It consists of: the United States, the UK, the UAE, Saudi Arabia, Bahrain, Qatar, Kuwait, Albania, and Australia) operating four sentry ships at crucial points in the Gulf. Additionally, Israeli Foreign Minister Yisrael Katz said Israel would join the coalition, but Defense Department officials have not listed Israel as a participant in IMSC to date. China's ambassador to the UAE said in early August 2019 that China was considering joining the mission, although no announcement of China's participation has since been made. The IMSC supplements longstanding multilateral Gulf naval operations that have targeted smuggling, piracy, the movement of terrorists and weaponry, and other potential threats in the Gulf. Other countries have started separate maritime security missions in the Gulf. France leads a maritime security mission, headquartered in Abu Dhabi, that began activities in early 2020. India has sent some naval vessels to the Gulf to protect Indian commercial ships. In December 2019, Japan sent vessels to protect Japanese shipping, also separate from the IMSC. The military is a tool of national power that the United States can use to advance its objectives, and the design of a military campaign and effective military options depend on the policy goals that U.S. leaders seek to accomplish. The Trump Administration has stated that its \"core objective ... is the systemic change in the Islamic Republic's hostile and destabilizing actions, including blocking all paths to a nuclear weapon and exporting terrorism.\" As such, the military could be used in a variety of ways to try to contain and dissuade Iran from prosecuting its \"hostile and destabilizing actions.\" These ways range from further increasing presence and posture in the region to use of force to change Iran's regime. As with any use of the military instrument of national power, any employment of U.S. forces in this scenario could result in further escalation of a crisis. U.S. military action may not be the appropriate tool to achieve systemic change within the Iranian regime, and may potentially set back the political prospects of Iranians sympathetic to a change of regime. Some observers question the utility of military power against Iran due to global strategic considerations. The 2017 National Security Strategy and 2018 National Defense Strategy both noted that China and Russia represent the key current and future strategic challenges to the United States. As such, shifting additional military assets into the United States Central Command (CENTCOM) area of responsibility requires diverting them from use in other theaters such as Europe and the Pacific, thereby sacrificing other long-term U.S. strategic priorities. Secretary of Defense Mark Esper and other U.S. officials have stated that the additional U.S. deployments since May 2019 are intended to deter Iran from taking any further provocative actions and position the United States to defend U.S. forces and interests in the region. Iranian attacks after previous U.S. deployments could suggest that deploying additional assets and capabilities might not necessarily succeed in deterring Iran from using military force. On the other hand, there are risks to military inaction that might potentially outweigh those associated with the employment of force. For example, should Iran acquire a nuclear weapons capability, U.S. options to contain and dissuade it from prosecuting hostile activities could be significantly more constrained than they are at present. For illustrative purposes only, below are some potential additional policy options related to the possible use of military capabilities against Iran. Not all of these options are mutually exclusive, nor do they represent a complete list of possible options, implications, and risks. Congress has assessed its role in any decisions regarding whether to undertake military action against Iran, as discussed later in this report. The following discussion is based entirely on open-source materials. Operations against Iranian a llies or proxies . The Administration might decide to take additional action against Iran's allies or proxies, such as Iran-backed militias in Iraq, Lebanese Hezbollah, or the Houthi movement in Yemen. Such action could take the form of air operations, ground operations, special operations, or cyber and electronic warfare. Further attacks on Iranian allies could be intended to seriously degrade the military ability of the Iranian ally in question and undertaken by U.S. forces, partner government forces, or both. At the same time, military action against Iran's allies could harm the prospects for resolution of the regional conflicts in which Iranian allies operate. Retaliatory Action against Iranian Key Targets and Facilities. The United States retains the option to undertake air and missile strikes, as well as special operations and cyber and electronic warfare against Iranian targets, such as IRGC Navy vessels in the Gulf, nuclear facilities, military bases, ports, oil installations, and any number of other targets within Iran itself. Iran's major Gulf ports are shown in Figure 2 . Blockade. Another option could be to establish a naval and/or air quarantine of Iran. Iran has periodically, including since mid-2019, threatened to block the vital Strait of Hormuz. Some observers have in past confrontations raised the prospect of a U.S. closure of the Strait or other waterways to Iranian commerce. Under international law, blockades are acts of war. Invasion. Although apparently far from current consideration because of the potential risks and costs, a U.S. invasion of Iran to oust its regime is among the options. Press reports in May 2019 indicated that the Administration was considering adding more than 100,000 military forces to the Gulf to deter Iran from any attacks. Such an option, if exercised, might be interpreted as potentially enhancing the U.S. ability to conduct ground attacks inside Iran, although military experts have indicated that a U.S. invasion and/or occupation of Iran would require many more U.S. forces than those cited. Iran's population is about 80 million, and its armed forces collectively number about 525,000, including 350,000 regular military and 125,000 IRGC forces. There has been significant antigovernment unrest in Iran over the past 10 years, but there is no indication that there is substantial support inside Iran for a U.S. invasion to change Iran's regime. Without a more detailed articulation of how the military might be employed to accomplish U.S. objectives vis-a-vis Iran, and a reasonable level of confidence about how any conflict might proceed, it is difficult to assess with any precision the likely fiscal costs of a military campaign, or even just heightened presence. Still, any course of action listed in this report is likely to incur significant additional costs. Factors that might influence the level of expenditure required to conduct operations include, but are not limited to, the following: The number of additional forces, and associated equipment, deployed to the Persian Gulf or the CENTCOM theater more broadly. In particular, deploying forces and equipment from the continental United States (if required) would likely add to the costs of such an operation due to the logistical requirements of moving troops and materiel. The mission set that U.S. forces are required to prosecute and its associated intensity. Some options leading to an increase of the U.S. posture in the Persian Gulf might require upgrading existing facilities or new construction of facilities and installations. By contrast, options that require the prosecution of combat operations would likely result in significant supplemental and/or overseas contingency operations requests, particularly if U.S. forces are involved in ground combat or post-conflict stabilization operations. The time required to accomplish U.S. objectives. As demonstrated by operations in Iraq and Afghanistan, the period of anticipated involvement in a contingency is a critical basis for any cost analysis. On one hand, a large stabilizing or occupying ground force to perform stabilization and reconstruction operations, for example, would likely require the expenditure of significant U.S. resources. At the same time, there is potential for some U.S. costs to be offset by contributions. The Persian Gulf states and other countries have a track record of offsetting U.S. costs for Gulf security. In the current context, President Trump stated in October 2019 that Saudi Arabia would pay for the deployment of additional U.S. troops and capabilities to assist with the territorial defense of Saudi Arabia and the deterrence of Iranian aggression in the region overall, and subsequent reports indicate that U.S. and Saudi officials are negotiating a cost-sharing arrangement for the new deployments. Members of Congress have responded in different ways to tensions with Iran and to related questions of authorization for the use of military force. Various instances of increased U.S.-Iran tensions in the past year have prompted some Members to express concern about or support for potential military operations against Iran. These episodes include the June 2019 attacks against tankers in the Gulf of Oman and Iran's shoot down of a U.S. military drone; the September 2019 attacks on Saudi oil facilities at Abqaiq and Khurais; and the buildup of U.S. forces in the region in response to Iranian activities. Throughout this period, Congress passed legislation with provisions specifying that authorization for the use of force against Iran is not granted. For instance, Section 1284 of the FY2020 NDAA ( P.L. 116-92 , December 2019) states that \"Nothing in this Act, or any amendment made by this Act, may be construed to authorize the use of military force, including the use of military force against Iran or any other country.\" Similarly, Section 9024 of Division A of H.R. 1158 , the Consolidated Appropriations Act, 2020, ( P.L. 116-89 , December 2019) states that \"Nothing in this Act may be construed as authorizing the use of force against Iran.\" However, Congress has not prohibited the use of funds for operations against Iran, despite the introduction of several standalone measures that would do so, such as the Prevention of Unconstitutional War with Iran Act of 2019 ( H.R. 2354 / S. 1039 ).While the House did pass legislation that included a prohibition on funding for the use of force against Iran, including Section 1229 of H.R. 2500 , the National Defense Authorization Act (NDAA) for FY2020, the Senate rejected by a 50-40 vote an amendment ( S.Amdt. 883 ) that would have added similar text to its version of the FY2020 NDAA, and the House-passed language was not included in conference text of the bill. In response to these moves, President Trump stated that he had wide-ranging authority to unilaterally initiate the use of military force, as successive Administrations have maintained. For instance, in a June 24 interview, President Trump reiterated that he believed he had the authority to order military action against Iran without congressional approval, adding, \"I do like keeping them [Congress] abreast, but I don't have to do it, legally.\" Secretary Pompeo suggested in an April 2019 hearing that the 2001 authorization for use of military force (AUMF, P.L. 107-40 ) against those responsible for the September 11 terrorist attacks could potentially apply to Iran based on the country's ties with Al Qaeda. However, in a June 28, 2019, letter to House Foreign Affairs Committee Chairman Eliot Engel, Assistant Secretary of State for Legislative Affairs Mary Elizabeth Taylor stated that \"the Administration has not, to date, interpreted either [the 2001 or 2002] AUMF as authorizing military force against Iran, except as may be necessary to defend U.S. or partner forces engaged in counterterrorism operations or operations to establish a stable, democratic Iraq.\" The killing of IRGC-QF Commander Soleimani in a U.S. drone strike in Baghdad in January 2020 dramatically increased congressional attention to U.S.-Iran tensions and specifically to the authority under which Soleimani was killed and whether that authority might be used to justify further military action. Immediately after the strike, House Speaker Nancy Pelosi said in a statement that the Administration launched the strike that killed Soleimani \"without an Authorization for Use of Military Force (AUMF) against Iran\" and \"without the consultation of the Congress,\" and called for Congress to be \"immediately briefed on this serious situation.\" Two days later, on January 4, 2020, President Trump submitted a notification to the Speaker of the House and President Pro Tempore of the Senate of the Soleimani drone strike, as pursuant to the War Powers Resolution ( P.L. 93-148 ), including the constitutional and legislative authority for the action. However, according to a media report, the notification \"only contained classified information, according to a senior congressional aide, likely detailing the intelligence that led to the action.\" Speaker Nancy Pelosi criticized the decision to classify the notification in its entirety as \"highly unusual.\" In statements after the strike, National Security Adviser Robert O'Brien asserted that the Authorization for Use of Military Force Against Iraq Resolution of 2002 (\"2002 AUMF\"; P.L. 107-243 ) provided the President authority to direct the strike against General Soleimani in Iraq. The House voted to repeal the 2002 AUMF on January 30, 2020, when it passed the No War Against Iran Act ( H.R. 550 ); no action has been taken by the Senate. In response to the strike, numerous pieces of legislation were introduced both commending and condemning the Administration for the action (for more, see CRS Report R46148, U.S. Killing of Qasem Soleimani: Frequently Asked Questions ). Perhaps most significant were two resolutions that would direct the President to terminate the involvement of U.S. forces in conflict with Iran. H.Con.Res. 83 , introduced by Representative Elissa Slotkin on January 8, 2020, pursuant to Section 5(c) of the War Powers Resolution. The resolution would direct the President \"to terminate the use of United States Armed Forces to engage in hostilities in or against Iran or any part of its government or military,\" unless Congress specifically authorizes such use of the armed forces, or if such force is necessary and appropriate to defend the United States or its armed forces against \"imminent attack.\" The House voted to adopt H.Con.Res. 83 by a 224-194 vote on January 9, 2020; no action has been taken by the Senate. Questions have been raised about the constitutionality and effect of Section 5(c) concurrent resolutions. S.J.Res. 68 , introduced by Senator Tim Kaine on January 9, 2020, pursuant to Section 1013 of the Department of State Authorization Act, Fiscal Years 1984 and 1985 (50 U.S.C. Â§ 1546a). The resolution would have directed the President to \"terminate the use of U.S. armed forces for hostilities\" with Iran (changed from an earlier version that would have required \"removal\" of U.S. armed forces, perhaps a reflection of concern that the original language might precipitate changes in current deployments). The Senate voted to adopt the resolution by a 55-45 vote on February 13, and the House passed it by a 227-186 vote on March 11. President Trump vetoed the resolution on May 6, 2020, describing it as an \"insulting\" election ploy by congressional Democrats. The statement also stated that the resolution's implication that \"the President's constitutional authority to use military force is limited to defense of the United States and its forces against imminent attack\" was \"incorrect.\" The Senate failed to override the veto by a vote of 49-44 on May 7, 2020. Given ongoing tensions with Iran, Members are likely to continue to assess and perhaps try to shape the congressional role in any decisions regarding whether to commit U.S. forces to potential hostilities. In assessing its authorities in this context, Congress might consider, among other things, the following: Does the President require prior authorization from Congress before initiating hostilities with Iran? If so, what actions, under what circumstances, ought to be covered by such an authorization? If not, what existing authorities provide for the President to initiate hostilities? If the executive branch were to initiate and then sustain hostilities against Iran without congressional authorization, what are the implications for the preservation of Congress's role, relative to that of the executive branch, in the war powers function? How, in turn, might the disposition of the war powers issue in connection with the situation with Iran affect the broader question of Congress's status as an equal branch of government, including the preservation and use of other congressional powers and prerogatives? The Iranian government may continue to take aggressive action short of directly threatening the United States and its territories while it continues policies opposed by the United States. What might be the international legal ramifications for undertaking a retaliatory, preventive, or preemptive strikes against Iran in response to such actions without a U.N. Security Council mandate? Conflict with, or increased military activity in or around, Iran could generate significant costs, financial and otherwise. With that in mind, Congress could consider the following: The potential costs of heightened U.S. operations in the CENTCOM area of operations, particularly if they lead to full-scale war and significant postconflict operations. The need for the United States to reconstitute its forces and capabilities, particularly in the aftermath of a major conflict. The impact of the costs of war and post conflict reconstruction on U.S. deficits and government spending. The costs of persistent military confrontation and/or a conflict in the Gulf region to the global economy. The extent to which regional allies, and the international community more broadly, might contribute forces or resources to a military campaign or its aftermath.", "summary": "Since May 2019, U.S.-Iran tensions have heightened significantly, and evolved into conflict after U.S. military forces killed Qasem Soleimani, the commander of the Iran's Islamic Revolutionary Guard Corps-Quds Force (IRGC-QF) and one of Iran's most important military commanders, in a U.S. airstrike in Baghdad on January 3, 2020. The United States and Iran have appeared to be on the brink of additional hostilities since, as attacks by Iran-backed groups on bases in Iraq inhabited by U.S. forces have continued. The background to the U.S.-Iran tensions are the 2018 Trump Administration withdrawal from the 2015 multilateral nuclear agreement with Iran (Joint Comprehensive Plan of Action, JCPOA), and Iran's responses to the U.S. policy of applying \"maximum pressure\" on Iran. Since mid-2019, Iran and Iran-linked forces have attacked and seized commercial ships, destroyed some critical infrastructure in the Arab states of the Persian Gulf, conducted rocket and missile attacks on facilities used by U.S. military personnel in Iraq, downed a U.S. unmanned aerial vehicle, and harassed U.S. warships in the Gulf. As part of an effort it terms \"maximum resistance,\" Iran has also reduced its compliance with the provisions of the JCPOA. The Administration has deployed additional military assets to the region to try to deter future Iranian actions. The U.S.-Iran tensions still have the potential to escalate into all-out conflict. Iran's materiel support for armed factions throughout the region, including its provision of short-range ballistic missiles to these factions, and Iran's network of agents in Europe, Latin America, and elsewhere, give Iran the potential to expand confrontation into areas where U.S. response options might be limited. Iran has continued all its operations in the region despite wrestling with the COVID-19 pandemic that has affected Iran significantly. United States military has the capability to undertake a range of options against Iran, both against Iran directly and against its regional allies and proxies. A September 14, 2019, attack on critical energy infrastructure in Saudi Arabia demonstrated that Iran and/or its allies have the capability to cause significant damage to U.S. allies and to U.S. regional and global economic and strategic interests, and raised questions about the effectiveness of U.S. defense relations with the Gulf states. Despite the tensions and some hostilities with Iran since 2020 began, President Donald Trump continued to state that his policy goal is to negotiate a revised JCPOA that encompasses not only nuclear issues but also Iran's ballistic missile program and Iran's support for regional armed factions. High-ranking officials from several countries have sought to mediate to try to de-escalate U.S.-Iran tensions by encouraging direct talks between Iranian and U.S. leaders. President Trump has stated that he welcomes talks with Iranian President Hassan Rouhani without preconditions, but Iran insists that the United States lift sanctions as a precondition for talks, and no U.S.-Iran talks have been known to take place to date. Members of Congress have received additional information from the Administration about the causes of the U.S.-Iran tensions and Administration responses. They have responded in a number of ways; some Members have sought to pass legislation requiring congressional approval for any decision by the President to take military action against Iran. Additional detail on U.S. policy options on Iran, Iran's regional and defense policy, and Iran sanctions can be found in CRS Report RL32048, Iran: Internal Politics and U.S. Policy and Options , by Kenneth Katzman; CRS Report RS20871, Iran Sanctions , by Kenneth Katzman; CRS Report R44017, Iran's Foreign and Defense Policies , by Kenneth Katzman; and CRS Report R43983, 2001 Authorization for Use of Military Force: Issues Concerning Its Continued Application , by Matthew C. Weed.", "document_type": "crs"}
{"report": "On December 20, 2019, Congress passed and the President signed into law a full-year FY2020 appropriationâthe Further Consolidated Appropriations Act ( P.L. 116-94 , Committee Print 38-679 )âthat included Agriculture appropriations in Division B ( Table 1 ). During the regular appropriations cycle, the House passed a five-bill minibus appropriation on June 25, 2019 ( H.R. 3055 ), and the Senate passed a four-bill minibus on October 31, 2019 ( H.R. 3055 ). In both cases, Agriculture was in Division B. To develop these bills, the House and Senate Appropriations Committees reported Agriculture subcommittee bills ( H.R. 3164 and S. 2522 , respectively) with their own more detailed reports ( H.Rept. 116-107 and S.Rept. 116-110 , respectively). See Figure 1 for a comparison of timelines and Appendix D for more details. The Administration released its budget request in two parts: an overview on March 11, 2019, and more detailed documents on March 18, 2019. In the absence of an enacted appropriation at the beginning of the fiscal year, FY2020 began with two continuing resolutions (CRs). For overall spending levels, the House set its subcommittee allocations on May 14, 2019 ( H.Rept. 116-59 ). The Senate set its subcommittee allocation on September 12, 2019 ( S.Rept. 116-104 ), after the Bipartisan Budget Act of 2019 ( P.L. 116-37 ) raised caps on discretionary spending. The discretionary total of the FY2020 Agriculture appropriations act is $23.5 billion. This is $183 million more than the comparable amount for FY2019 (+0.8%) that includes the Commodity Futures Trading Commission (CFTC). The appropriation also carries about $129 billion of mandatory spending that is largely determined in authorizing laws ( Table 2 ). The Agriculture appropriations billâformally known as the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Actâfunds all of the U.S. Department of Agriculture (USDA), excluding the U.S. Forest Service. It also funds the Food and Drug Administration (FDA) in the Department of Health and Human Services and, in even-numbered fiscal years, CFTC. Jurisdiction is with the House and Senate Committees on Appropriations and their Subcommittees on Agriculture, Rural Development, Food and Drug Administration, and Related Agencies. The bill includes mandatory and discretionary spending, but the discretionary amounts are the primary focus ( Figure 2 ). Some programs are not in the authorizing jurisdiction of the House or Senate Agriculture Committees, such as FDA, Special Supplemental Nutrition Program for Women, Infants, and Children (WIC), or child nutrition (checkered regions in Figure 2 ). The federal budget process treats discretionary and mandatory spending differently: Discretionary spending is controlled by annual appropriations acts and receives most of the attention during the appropriations process. The annual budget resolution process sets spending limits for discretionary appropriations. Agency operations (salaries and expenses) and many grant programs are discretionary. Mandatory spending is carried in the appropriation and usually advanced unchanged, since it is controlled by budget rules during the authorization process. Spending for so-called entitlement programs is determined in laws such as the 2018 farm bill and 2010 child nutrition reauthorizations. In the FY2020 appropriation ( P.L. 116-94 ), the discretionary amount is 15% ($23 billion) of the $153 billion total. Mandatory spending carried in the act comprised $129 billion, about 85% of the total, of which about $106 billion is attributable to programs in the 2018 farm bill. Within the discretionary total, the largest spending items are WIC; agricultural research; rural development; FDA; foreign food aid and trade; farm assistance loans and salaries; food safety inspection; animal and plant health programs; and technical assistance for conservation program. The main mandatory spending items are the Supplemental Nutrition Assistance Program (SNAP) and other food and nutrition act programs, child nutrition (school lunch and related programs), crop insurance, and farm commodity and conservation programs that are funded through USDA's Commodity Credit Corporation (CCC). SNAP is referred to as an \"appropriated entitlement\" and requires an annual appropriation. Amounts for the nutrition program are based on projected spending needs. In contrast, the CCC appropriations reimburse spending from a line of credit. Discretionary Agriculture appropriations were at an all-time high in FY2010, declined through FY2013, and have gradually increased since then. Changes within titles have generally been proportionate to changes in the overall bill, though some areas have sustained relative increases, such as FDA and rural development. The stacked bars in Figure 3 represent the discretionary authorization for each appropriations title. The total of the positive stacked bars is the budget authority in Titles I-VI. In FY2018, USDA reorganization affected the placement of some programs between Titles I and II of the bill (most noticeably, the Farm Service Agency). In most years, the cumulative appropriation for the agencies is higher than the official discretionary total in the spending allocation (the blue line) because of the budgetary offset from negative amounts in Title VII (general provisions) and other negative scorekeeping adjustments. These negative offsets are mostly due to rescissions of prior-year unobligated funds and, before FY2018, limits placed on mandatory programs. Historical trends may be tempered by inflation adjustments, as shown in the dotted line. The inflation-adjusted totals from FY2011-FY2017 had been fairly steady until increases in the FY2018-FY2020 appropriations. The Trump Administration released a general overview of its FY2020 budget request on March 11, 2019, and a detailed budget proposal to Congress on March 18, 2019. USDA released its more detailed budget summary and justification, as did the FDA, and the independent agencies of the CFTC and the Farm Credit Administration. The Administration also highlighted separately some of its proposed reductions and eliminations. For accounts in the jurisdiction of the Agriculture appropriations bill, the Administration's budget requested $19.2 billion, a $4.1 billion reduction from FY2019 (-18%; Table 2 , Figure 3 ). The Administration released its budget request for FY2020 after Congress had enacted the omnibus FY2019 appropriation in February 2019 ( P.L. 116-6 ). Amounts in the FY2019 column of the Administration's budget documents are based on FY2018 levels, not enacted FY2019 amounts. Budget enforcement has procedural and statutory elements. The procedural elements relate to a budget resolution and are enforced with points of order. The statutory elements impose discretionary spending limits and are enforced with budget caps and sequestration. Typically, each chamber's Appropriations Committee receives a top-line limit on discretionary budget authority, referred to as a \"302(a)\" allocation, from the Budget Committee via an annual budget resolution. The Appropriations Committees then in turn subdivide the allocation among their subcommittees, referred to as the \"302(b)\" allocations. For FY2020, the House did not report or pass a budget resolution. The Senate Budget Committee reported S.Con.Res. 12 , though it received no further action. The Budget Control Act of 2011 (BCA, P.L. 112-25 ) set discretionary budget caps through FY2021 as a way of reducing federal spending. Sequestration is an across-the-board backstop to achieve budget reductions if spending exceeds the budget caps (2 U.S.C. Â§901(c)). Bipartisan Budget Acts (BBAs) have avoided sequestration on discretionary spendingâwith the exception of FY2013âby raising those caps four times in two-year increments in 2013, 2015, 2018, and 2019 ( Figure 4 ). Most recently, the BBA of 2019 ( P.L. 116-37 ) raised the cap on nondefense discretionary spending by $78 billion for FY2020 (to $621 billion) and by $72 billion for FY2021 (to $627 billion). The amount for FY2020 is 4.1% greater than the nondefense cap in FY2019. The BBA also provides language to execute (or \"deem\") those higher caps for the appropriations process without a budget resolution. In the absence of a budget resolution and before the BBA that occurred in August, the House Appropriations Committee on May 14, 2019, set an overall discretionary target and provided subcommittee allocations ( H.Rept. 116-59 ). The allocation for Agriculture appropriations was $24.3 billion, $1 billion greater (+4.3%) than the comparable amount for FY2019 ( Table 2 ). The Senate waited for the overall budget agreement in the BBA of 2019 before setting subcommittee allocations or proceeding to mark up appropriations bills. On September 12, 2019, the Senate Appropriations Committee set its subcommittee allocations ( S.Rept. 116-104 ). The subcommittee allocation was $23.1 billion, $0.1 billion greater (+0.3%) than FY2019. Without Congress having agreed on a joint budget resolution, different subcommittee allocations between the chambers further necessitated reconciliation in the final appropriation. Despite the BBA agreements that raise discretionary spending caps and avoid sequestration on discretionary accounts, sequestration still impacts mandatory spending through FY2029. Sequestration on mandatory accounts began in FY2013, continues to the present, and has been extended five times beyond the original FY2021 sunset of the BCA. See Appendix C for effects. The House Agriculture Appropriations Subcommittee marked up its FY2020 bill on May 23, 2019, by voice vote. On June 4, 2019, the full Appropriations Committee passed and reported an amended bill ( H.R. 3164 , H.Rept. 116-107 ) by a vote of 29-21. The committee adopted four amendments by voice vote. On June 25, 2019, the House passed a five-bill minibus appropriation ( H.R. 3055 ) with the Agriculture bill as Division B ( Table 1 , Figure 1 ). Under a structured rule, the Rules Committee allowed 35 amendments for floor debate (H.Res. 445, H.Rept. 116-119 ). The House considered 33 of those amendments, of which 31 were adopted and two were rejected. Of the 31 amendments that were adopted, 28 were adopted en bloc by voice vote, two were adopted by recorded votes, and another was adopted separately by voice vote. Of the 31 amendments that were adopted, 14 revised funding amounts with offsets, three added policy statements, and 14 made no substantive changes but were for the purposes of discussion. The $24.3 billion discretionary total in the House-passed FY2020 Agriculture appropriation would have been $1 billion more than (+4%) the comparable amount enacted for FY2019 that includes the CFTC ( Table 2 , Figure 3 ). Generally speaking, the House-passed bill did not include most of the reductions proposed by the Administration. Table 3 provides details of the House-passed bill at the agency level. The primary changes from FY2019 that comprised the $1 billion increase, ranked by increases and decreases, include the following: Increase Rural Development accounts by $412 million (+14%), including a $144 million increase for the Rural Housing Service (+9%) and a $238 million increase for the Rural Utilities Service (+38%) to support rural water and waste disposal and rural broadband. In addition, the General Provisions title included a $393 million increase for the ReConnect Broadband Pilot Program (+314%). Increase foreign agricultural assistance by $377 million (+19%), including increasing Food for Peace humanitarian assistance by $350 million and McGovern-Dole Food for Education by $25 million. In FY2019, Food for Peace had received a temporary increase of $216 million in the General Provisions title. The larger FY2020 amount would have been to the program's base appropriation rather than the FY2019 approach that used the General Provisions. Increase related agencies appropriations by $232 million, including raising FDA appropriations by $185 million (+6%) and the CFTC by $47 million (+18%). Increase other agricultural program appropriations by $151 million, including the following: Increase departmental administration accounts by a net $205 million (+53%), including funding most of the Administration's request for a $271 million increase for construction to renovate USDA headquarters. Increase USDA regulatory programs by $56 million, including increasing the Animal and Plant Health Inspection Service by $23 million (+2%) and the Agricultural Marketing Service by $33 million (+20%). Decrease agricultural research by a net $134 million (-4%). Agricultural Research Service (ARS) construction would have been reduced by $331 million from FY2019 (-87%), while salaries and expenses would have increased for ARS (+$44 million, +3%) and the National Institute of Food and Agriculture (NIFA) (+$146 million, +10%). Some of these increases would have been offset by a net change of -$175 million in budget authority through the General Provisions title. This was mostly a combination of greater rescissions of carryover balances in WIC (-$300 million) and the absence of continuing the FY2019 appropriations in the General Provisions for Food for Peace (-$216 million, as mentioned above) and rural water and waste disposal (-$75 million). The General Provisions would have provided increases in funding for rural broadband (+$393 million, as mentioned above) and several appropriations for miscellaneous programs (+$33 million). In addition to discretionary spending, the House-passed bill also carried mandatory spending that totaled $131 billion. This was about $2 billion more than in FY2019 generally because of automatic changes from economic conditions and expectations about enrollment in entitlement programs. Reimbursement for the CCC was projected to increase by $10 billion, mostly due to the cost of the first year of the Trump Administration's trade aid assistance package . Estimates for child nutrition programs would have increased by $0.9 billion. Crop insurance spending would have decreased by $6.4 billion, and SNAP spending decreased by about $2.4 billion. The Senate Agriculture Appropriations Subcommittee marked up its FY2020 bill on September 17, 2019. On September 19, 2019, the full Appropriations Committee passed and reported an amended bill ( S. 2522 , S.Rept. 116-110 ) by a vote of 31-0. The committee adopted a manager's amendment with three additions to bill text and 19 additions to report language. On October 31, 2019, the Senate passed a four-bill minibus appropriation ( H.R. 3055 , after adopting S.Amdt. 948 , which was composed of four Senate-reported bills and amended by floor amendments). The Agriculture bill is Division B ( Table 1 , Figure 1 ). The Senate adopted 16 amendments to Division B, of which 14 were adopted en bloc by unanimous consent and two were adopted by recorded votes. Of these 16 amendments, eight revised funding amounts with offsets, three revised funding amounts within an existing appropriation, three changed the terms of an appropriation, and two required reports or studies. The $23.1 billion discretionary total in the Senate-passed FY2020 Agriculture appropriation would have been $57 million more than (+0.2%) the amount enacted for FY2019 ( Table 2 , Figure 3 ). The Senate bill was $894 million less than (-3.7%) the House-passed bill on a comparable basis without CFTC. Generally speaking, the Senate-passed bill did not include most of the reductions proposed by the Administration. Table 3 provides details of the Senate-passed bill at the agency level. Compared to the House-passed bill and ranked by increases and decreases, the primary changes in the Senate-passed bill that comprised the -$894 million difference from the House bill included the following: Agricultural research would have been $193 million greater in the Senate-passed bill than in the House-passed bill. ARS buildings and facilities would have been $255 million greater than in the House-passed bill, ARS salaries and expenses $77 million greater, and NIFA $132 million less. Departmental administration accounts would have been $97 million greater in the Senate bill than in the House bill, mostly by maintaining appropriations for the Chief Information Officer, General Counsel, and Departmental Administration that would have been reduced as offsets to pay for floor amendments that were adopted in the House bill. Rural Development would have been $407 million less in the Senate-passed bill than in the House-passed bill, mostly by a $300 million less for the Rural Utilities Service ($233 million less for rural water and waste disposal grants, $41 million less for distance learning and telemedicine, and $25 million less for existing non-pilot rural broadband programs), $70 million less for Rural Housing Service, and $22 million less for the Rural Business-Cooperative Service. In addition, for the separate ReConnect Broadband Pilot Program, the General Provisions title in the Senate-passed bill would not have provided for any of the $518 million that the House bill contained. Foreign agricultural assistance would have been $159 million less in the Senate bill than in the House bill, mostly by not increasing Food for Peace as much as in the House bill, and maintaining the McGovern-Dole program at a constant level. FDA appropriations would have been $105 million less in the Senate-passed bill than in the House-passed bill. In addition to discretionary spending, the Senate-passed bill also carried mandatory spending that totaled $129 billion. This was $153 million less than in FY2019 and $2.3 billion less than in the House-passed bill. Compared to the House-passed bill, amounts for CCC and crop insurance were the same. Mandatory amounts for the child nutrition programs were about $400 million less than the House bill, and the amount for SNAP was about $1.9 billion less than in the House bill. In the absence of a final Agriculture appropriation at the beginning of FY2020 on October 1, 2019, Congress passed a CR to continue operations and prevent a government shutdown ( P.L. 116-59 , Division A). The first CR lasted nearly eight weeks until November 21, 2019. On November 21, a second CR ( P.L. 116-69 ) was enacted to last until December 20, 2019. On December 20, Congress passed and the President signed a full-year FY2020 appropriation. In general, a CR continues the funding rates and conditions that were in the previous year's appropriation. The Office of Management and Budget (OMB) may prorate funding to the agencies on an annualized basis for the duration of the CR through a process known as apportionment. For the first 52 days (about 14% of FY2020) through November 21, 2019, and the next 29 days (about 8% of FY2020) through December 20, 2019, the CRs continued the terms of the FY2019 Agriculture appropriations act (Â§101) with a proviso for rural development in the anomalies below; and provided sufficient funding to maintain mandatory program levels, including for nutrition programs (Â§111). This is similar to the approach taken in recent years. CRs may adjust prior-year amounts through anomalies or make specific administrative changes. Five anomalies applied specifically to the Agriculture appropriation during the first CR: Rural Water and Waste Disposal Program (Â§101(1)) . Allowed the CR to cover the cost of direct loans in addition to loan guarantees and grants. In FY2019, direct loans did not require appropriation because they had a negative subsidy rate (i.e., fees and repayments more than covered the cost of loan making). In FY2020, OMB estimated a need for a positive subsidy rate. Disaster Assistance for Sugar Beet Processors (Â§116) . Amended the list of eligible losses that may be covered under the Additional Supplemental Appropriations for Disaster Relief Act of FY2019 ( P.L. 116-20 , Title I) to include payments to cooperative processors for reduced sugar beet quantity and quality. The FY2019 supplemental provided $3 billion to cover agricultural production losses in 2018 and 2019 from natural disasters. Agricultural Research (Â§117) . Allowed USDA to waive the nonfederal matching funds requirement for grants made under the Specialty Crop Research Initiative (7 U.S.C. Â§7632(g)(3)). The requirement was added in the 2018 farm bill. Summer Food for Children Demonstration Projects (Â§118) . Allocated funding for the Food and Nutrition Service summer food for children demonstration projects at a rate so that projects could fully operate by May 2020 (prior to summer service, which typically starts in June). Similar provisions have been part of previous CRs. These projects, which include the Summer Electronic Benefit Transfer (EBT) demonstration, have operated in selected states since FY2010. C ommodity C redit C orporation ( Â§119 ) . Allowed CCC to receive its appropriation about a month earlier than usual so that it could reimburse the Treasury for a line of credit prior to a customary final report and audit. Many payments to farmers were due in October 2019, including USDA's plan to make supplemental payments under its trade assistance program. Without the anomaly, CCC might have exhausted its $30 billion line of credit in October or November 2019 before the audit was completed, which could have suspended payments. A similar provision was part of a CR in FY2019. In addition, the FY2020 CR required USDA to submit a report to Congress by October 31, 2019, with various disaggregated details about Market Facilitation Program payments, trade damages, and whether commodities were purchased from foreign-owned companies under the program. Hemp (Â§120) . Provided $16.5 million on an annualized basis to the USDA Agricultural Marketing Service to implement the Hemp Production Program ( P.L. 115-334 , Â§10113), which was created in the 2018 farm bill. The second CR continued the terms of the first CR until December 20, 2019. It added one new anomaly for Agriculture appropriations: Commodity Assistance Program (Â§146). Allowed funding for the Commodity Supplemental Food Program (CSFP) to be apportioned at a rate to maintain current program caseload. This meant that funding available under the second CR could exceed amounts that would otherwise would have been available. On December 20, 2019, Congress passed and the President signed a full-year FY2020 appropriationâthe Further Consolidated Appropriations Act ( P.L. 116-94 , Committee Print 38-679 ) âthat included Agriculture appropriations in Division B. This was the second of two consolidated appropriations acts that were passed in tandem: P.L. 116-93 , which covered four appropriations subcommittee bills, and P.L. 116-94 , which covered eight appropriations subcommittee bills. The official discretionary total of the FY2020 Agriculture appropriation is $23.5 billion. This is $183 million more than (+0.8%) the comparable amount for FY2019 that includes CFTC. The appropriation also carries about $129 billion of mandatory spending that is largely determined in authorizing laws. Thus the overall total of the agriculture portion is $153 billion. In addition to these amounts, the appropriation includes budget authority that is designated as emergency spending and does not count against discretionary spending caps. These include $535 million to FDA for Ebola prevention and treatment, and $1.5 billion to USDA for the Wildfires and Hurricanes Indemnity Program (WHIP). The latter amount was offset by a $1.5 billion rescission of unobligated WHIP funding from a prior appropriation and emergency designation. Table 3 provides details of the enacted FY2020 Agriculture appropriation at the agency level, and compared with the House- and Senate-passed bills, the Administration's request, and three prior years. The primary changes from FY2019 that comprised the overall $183 million increase, ranked by increases and decreases, include the following: Increase foreign agricultural assistance by $235 million (+12%), including increasing Food for Peace humanitarian assistance by $225 million and McGovern-Dole Food for Education by $10 million. In FY2017-FY2019, Food for Peace had received temporary increases in the General Provisions title, including $216 million in FY2019. The larger FY2020 amount replaces the temporary amount with an increase in the program's base appropriation. Increase Rural Development accounts by $229 million (+8%), including a $130 million increase for the Rural Utilities Service (+21%) to support rural water and waste disposal and telemedicine and an $81 million increase for the Rural Housing Service (+5%). In addition, the General Provisions title included a $175 million increase for a rural broadband pilot program (+140%). Increase related agencies appropriations by $138 million, including raising FDA appropriations by $91 million (+3%) and the CFTC by $47 million (+18%). Increase other agricultural program appropriations by $199 million, including the following: Increase departmental administration accounts by a net $82 million (+21%), including funding for construction to renovate USDA headquarters. Increase USDA regulatory programs by $59 million, including increasing the Animal and Plant Health Inspection Service by $32 million (+3%) and the Agricultural Marketing Service by $28 million (+17%). Decrease agricultural research by a net $18 million (-0.5%). Agricultural Research Service (ARS) construction is reduced by $189 million compared with FY2019 (-49%), while salaries and expenses are increased for ARS (+$111 million, +9%) and grants for the National Institute of Food and Agriculture (NIFA) (+$56 million, +4%). Increase Farm Service Agency salaries and expenses by $47 million (+3%). Increase Natural Resources Conservation Service appropriations by $35 million, including Watershed and Flood Prevention by $25 million (+17%), and Conservation Operations by $10 million (+1%). Decrease Food and Nutrition Service discretionary appropriations by $54 million, including decreasing WIC by $75 million (-1%) and increasing Commodity Assistance Programs by $22 million (+7%). Some of these increases are offset by a net change of -$570 million in budget authority through the General Provisions title. This was mostly a combination of greater rescissions of carryover balances in WIC (-$500 million) and the absence of continuing the FY2019 appropriations in the General Provisions for Food for Peace (-$216 million, as mentioned above) and rural water and waste disposal grants (-$75 million). The General Provisions provides increases in funding for rural broadband (+$175 million, as mentioned above) and several appropriations for miscellaneous programs (+$63 million over FY2019). Not included above is emergency funding that is not subject to discretionary budget caps. This includes funding for Ebola ($535 million) and the Wildfires and Hurricanes Indemnity Program (WHIP, $1.5 billion). The latter emergency authorization was offset by an identically sized rescission of prior-year emergency funding for WHIP. In addition to discretionary spending, the House-passed bill also carried mandatory spendingâlargely determined in separate authorizing lawsâthat totals $129 billion. This is about $354 million more than (+0.3%) FY2019, generally due to automatic changes from economic conditions and expectations about enrollment in entitlement programs. Reimbursement to the Treasury for the CCC increased by $10.9 billion (+71%), mostly due to the cost of the Trump Administration's trade aid assistance that was announced in 2018. Child nutrition programs increase by $0.5 billion (+2%). Crop insurance spending decreases by $5.5 billion (-35%), and SNAP spending decreases by about $5.6 billion (-8%). Besides setting spending authority, appropriations acts are also a vehicle for policy-related provisions that direct executive branch actions. These provisions, limitations, or riders may have the force of law if they are included in the act's text, but their effect is generally limited to the current fiscal year unless they amend the U.S. Code , which is rare in appropriations acts. Table 4 compares some of the primary policy provisions that are included directly in the FY2020 Agriculture appropriations act, and its development in the House and Senate bills. Report language may also provide policy instructions. Although report language does not carry the force of text in an act, it often explains congressional intent, which the agencies may be expected to follow. Statements in the joint explanatory statement and the committee reports are not included in Table 4 . In the past, Congress has said that committee reports and the joint explanatory statement need to be read together to capture all of the congressional intent for a fiscal year. For example, the explanatory statement for the FY2020 Further Consolidated Appropriations act instructs that the House and Senate reports should be read together with the conference agreement: Congressional Directives. The statement is silent on provisions that were in both the House Report ( H.Rept. 116-107 ) and Senate Report ( S.Rept. 116-110 ) that remain unchanged by this agreement, except as noted in this statement. The House and Senate report language that is not changed by the statement is approved and indicates congressional intentions. The statement, while repeating some report language for emphasis, does not intend to negate the language referred to above unless expressly provided herein. Appendix A. Appropriations in Administrative Accounts Appendix B. Appropriations in General Provisions Appendix C. Budget Sequestration Sequestration is a process to reduce federal spending through automatic, largely across-the-board reductions that permanently cancel mandatory and/or discretionary budget authority. Sequestration is triggered as a budget enforcement mechanism when federal spending would exceed statutory budget goals. Sequestration is currently authorized by the BCA ( P.L. 112-25 ). A sequestration rate is the percentage reduction that is subtracted from an appropriated budget authority to achieve an intended budget goal. OMB computes these rates annually. Table C-1 shows the rates of sequestration that have been announced and the total amounts of budget authority that have been cancelled from accounts in Agriculture appropriations. Table C-2 provides additional detail at the program level for mandatory accounts. Discretionary Spending For discretionary spending, sequestration is authorized through FY2021 if discretionary defense and nondefense spending exceed caps that are specified in statute (2 U.S.C. Â§901(c)). In FY2013, the timing of the appropriations acts and the first year of sequestration resulted in triggering sequestration on discretionary spending. In FY2014-FY2019, BBAs in 2013, 2015, and 2018 ( P.L. 113-67 , P.L. 114-74 , and P.L. 115-123 , respectively) have avoided sequestration on discretionary spending. These BBAs raised the discretionary budget caps that were placed in statute by the BCA and allowed Congress to enact larger appropriations than would have been allowed. The enacted appropriations in FY2014-FY2019 met the spending limitations of the revised budget caps, and therefore no sequestration on discretionary accounts was necessary. For FY2020-FY2021, the BBA of 2019 ( P.L. 116-37 ) similarly provides a higher discretionary cap that may avoid sequestration (see \" Discretionary Budget Caps and Subcommittee Allocations \"). Mandatory Spending Sequestration Occurs and Continues For mandatory spending, sequestration is presently authorized and scheduled to continue through FY2029, having been amended and extended by budget acts that were subsequent to the BCA (2 U.S.C. Â§901a(6)). That is, sequestration of mandatory spending has not been avoided by the BBAs and continues to apply annually to certain accounts ( Table C-2 ). The original FY2021 sunset on the sequestration of mandatory accounts has been extended five times as an offset to pay for raising the caps on discretionary spending to avoid sequestration in the near term (or as a general budgetary offset for other authorization acts): 1. Congress extended the duration of mandatory sequestration by two years (until FY2023) as an offset in BBA 2013. 2. Congress extended it by another year (until FY2024) to maintain retirement benefits for certain military personnel ( P.L. 113-82 ). 3. Congress extended sequestration on nonexempt mandatory accounts another year (until FY2025) as an offset in BBA 2015. 4. Congress extended sequestration on nonexempt mandatory accounts for two years (until FY2027) as an offset in BBA 2018 ( P.L. 115-123 , Â§30101(c)). 5. Congress extended sequestration on nonexempt mandatory accounts by another two years (until FY2029) as an offset in BBA 2019 ( P.L. 116-37 , Â§402). Exemptions from Sequestration Some USDA mandatory programs are statutorily exempt from sequestration. Those expressly exempt by statute are the nutrition programs (SNAP, the child nutrition programs, and the Commodity Supplemental Food Program) and the Conservation Reserve Program. Some prior legal obligations in the Federal Crop Insurance Corporation and the farm commodity programs may be exempt as determined by OMB. Generally speaking, the experience since FY2013 is that OMB has ruled that most of crop insurance is exempt from sequestration, while the farm commodity programs, disaster assistance, and most conservation programs have been subject to it. Implementation of Sequestration Nonexempt mandatory spending in FY2020 is to be reduced by a 5.9% sequestration rate ( Table C-1 ) and thus would be paid at 94.1% of what would otherwise have been provided. This is projected to result in a reduction of about $1.4 billion from mandatory agriculture accounts in FY2020, including over $900 million from amounts paid by the CCC ( Table C-2 ). For example, for the farm commodity programs that support farm income such as the Agricultural Risk Coverage and Price Loss Coverage programs, payments to farmers are computed by a regular formula authorized in the farm bill, and the final actual payment to the farmer is reduced by the sequestration rate. For programs that operate on a fixed budget authority, such as the Environmental Quality Incentives Program and the Market Assistance Program, the sequestration rate is applied to the available budget authority for the fiscal year. Appendix D. Action on Agriculture Appropriations, FY1996-FY2020", "summary": "The Agriculture appropriations bill funds the U.S. Department of Agriculture (USDA) except for the U.S. Forest Service. It also funds the Food and Drug Administration (FDA) andâin even-numbered fiscal yearsâthe Commodity Futures Trading Commission (CFTC). Agriculture appropriations include both mandatory and discretionary spending. Discretionary amounts, though, are the primary focus during the bill's development. The largest discretionary spending items are the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC); agricultural research; rural development; FDA; foreign food assistance and trade; farm assistance loans and salaries; food safety inspection; animal and plant health programs; and technical assistance for conservation programs. Congress passed and the President signed a full-year FY2020 appropriation on December 20, 2019âthe Further Consolidated Appropriations Act ( P.L. 116-94 , Committee Print 38-679 )âthat included Agriculture appropriations in Division B. The discretionary total of the FY2020 Agriculture appropriations act is $23.5 billion. This is $183 million more than the comparable amount for FY2019 (+0.8%) that includes the Commodity Futures Trading Commission (CFTC). The appropriation also carries about $129 billion of mandatory spending that is largely determined in authorizing laws. Thus, the overall total of the agriculture portion is $153 billion. In addition to these amounts, the FY2020 Further Consolidated Appropriations Act includes budget authority that is designated as emergency spending and does not count against discretionary spending caps. These include $535 million to FDA for Ebola prevention and treatment, and $1.5 billion to USDA for the Wildfires and Hurricanes Indemnity Program (WHIP). The latter amount was offset by a $1.5 billion rescission of unobligated WHIP funding from a prior appropriation and emergency designation. The primary components of the $183 million overall increase in the regular appropriation from FY2019 include increases to foreign agricultural assistance (+$235 million), rural development (+$229 million), rural broadband (+$175 million, separate from the rural development increase), agricultural research salaries and grants (+$167 million), FDA (+$91 million), departmental administration (+$82 million), Farm Service Agency (+$47 million), CFTC (+$47 million), the Natural Resources Conservation Service (+$35 million), Animal and Plant Health Inspection Service (+$32 million) and the Agricultural Marketing Service (+$28 million), and miscellaneous appropriations (+$63 million). Most of these increases are offset by decreases such as for construction for agricultural research facilities (-$189 million), Food and Nutrition Service discretionary appropriations (-$54 million), increasing a rescission of carryover balances in WIC (-$500 million), and not renewing temporary appropriations for Food for Peace and rural water and waste disposal grants (-$291 million). The Trump Administration had requested $19.2 billion for discretionary-funded accounts within the jurisdiction of Agriculture appropriations subcommittees. The request would have been a reduction of $4.1 billion from FY2019 (-18%). Policy provisions are also included that affect how the appropriation is delivered. This year, these provisions include issues such as the relocation of USDA agencies, disaster programs, rural definitions, livestock regulations, nutrition programs, and dietary guidelines. Budget sequestration continues to affect mandatory agricultural spending accounts. Sequestration refers to automatic across-the-board reductions in spending authority. In FY2020, sequestration on mandatory spending accounts is 5.9% and totals about $1.4 billion for agriculture accounts. Recent budget acts have extended sequestration through FY2029.", "document_type": "crs"}
{"report": "Many Members of the 116 th Congress have demonstrated an ongoing interest in Trump Administration efforts to reform the U.S. Agency for International Development (USAID). The reforms, branded Transformation at USAID , target a broad range of programs, structures, and processes in an effort to improve the agency's efficiency and effectiveness. The reform process was initiated by an executive order and an Office of Management and Budget (OMB) memorandum, both issued in 2017. The OMB memorandum called on U.S. government agencies to submit reform plans focused on making the government \"lean, accountable, and more efficient.\" USAID provided several preliminary plans to the State Department (to which USAID reports) and OMB in the summer of 2017, but the internal restructuring initiative began in earnest after Mark Green was confirmed as USAID Administrator in August 2017. USAID submitted its own reform plan to OMB, separate from State, though USAID cooperated with the State Department's \"redesign\" initiative as well. OMB's government-wide reform plan, \"Delivering Government Solutions in the 21 st Century,\" released in June 2018, prescribed 32 government-wide reforms, several of which directly related to USAID. These included restructuring U.S. humanitarian assistance programs, establishing a new Development Finance Institution to incorporate USAID credit programs, and changing USAID's Washington, DC-based bureau structure. Soon after the release of the OMB report, USAID finalized and began implementing its reforms, newly branded as Transformation . No single public report or other document comprehensively details the Transformation effort or what it encompasses. This CRS report relies on various publications on the USAID website focused on specific reforms or priorities described as being part of the Transformation , the testimony of USAID Administrator Mark Green before Congress on multiple occasions, implementation documents such as the Country Roadmaps and the Private Sector Engagement Strategy, and the new USAID Policy Framework. Each of these sources differs in what they include, and in the emphasis given to different reform components, making it difficult to ascertain the full picture and the prioritization USAID ascribes to the various elements. Role of Congress . Most of the reforms proposed under Transformation do not require congressional approval, but some require advance notification to Congress. Notification does not require congressional action, but it gives Congress the opportunity to weigh in on the action being notified and to apply \"holds\" (nonbinding but generally respected requests that action be deferred until a related Member concern is resolved). Nevertheless, Administrator Green appears to have actively involved Congress in the shaping and implementation of Transformation and has suggested that he does not intend to move forward without congressional support. Congress has the power to shape USAID reforms through both oversight activities and funding requirements and restrictions. This report analyzes key elements of current USAID reform efforts under the Transformation umbrella. Although the report highlights key reforms and changes in USAID policy and practice, it is not a comprehensive overview of this broad initiative. The report first discusses key objectives of Transformation , then describes several process, structure, and workforce reforms intended to support these objectives, with an emphasis on reforms that are distinct from prior USAID reform efforts. The report concludes with a discussion of broader issues that may be relevant to congressional perspectives on USAID reforms . Transformation at USAID is an implementation framework for reforms that are multifaceted and still evolving. Administrator Green's testimony at April 2018 budget hearings described Transformation as \"experience-informed, innovation-driven reforms to optimize our structures and procedures and maximize our effectiveness.\" In these broad terms, many of the reforms are similar to general government or organization reform efforts in their focus on efficiency and effectiveness. While much of Transformation reflects incremental policy adjustments, several components signal a distinct vision for USAID's role in foreign affairs. As noted, no single public document comprehensively details the components and objectives of Transformation . However, various USAID fact sheets, videos, and statements by Administrator Green since 2018 suggest some of the initiative's key objectives: supporting country transitions toward self-reliant, locally led development; increasing USAID-private sector collaboration in development; supporting U.S. national security strategy; enhancing USAID's core capabilities and strengthening leadership; and using taxpayer dollars more efficiently and effectively. A consistent emphasis across USAID policy documents, including those describing Transformation , is the core objective of \"ending the need for foreign assistance\" by supporting partner countries' \"Journey to Self-Reliance.\" As Transformation has evolved, moving partner countries toward economic self-sufficiency has become the primary reform objective cited by USAIDâthe one that all the specific reform proposals are designed to support. Other stated objectives, such as advancing national security goals, are deemphasized in later Transformation materials. Many of the proposed Transformation reforms are consistent with efforts by past USAID Administrators. For example, successive Administrations have sought to refine the deployment of foreign assistance to advance U.S. national security, asserting that it should be a major component of U.S. foreign policy strategy. The Obama Administration's USAID Forward initiative focused on bringing new partnerships, innovation, and a renewed focus on results to USAID's work. Under the George W. Bush Administration and Administrator Henrietta Fore, USAID's Development Leadership Initiative focused on building USAID's workforce capacity and leadership. The self-reliance objective at the center of Transformation has been cited as a goal in various USAID document for decades. Nearly every Administration and USAID Administrator has proposed reforms intended to improve USAID's efficiency and effectiveness, and Transformation may be viewed as the latest step in the agency's evolution. To implement the objectives and strategic priorities of Transformation , the agency is making several changes to its programs and work processes intended to establish a more flexible and field-responsive approach to programming. Much like the strategic objectives described above, these adjustments build on efforts by previous Administrations, aiming to align USAID's approach to development with the current global landscape. The organizing principle for USAID policy reforms under Transformation is the \"Journey to Self-Reliance.\" Self-reliance is Transformation's term for a country's ability to plan, finance, and implement solutions to address their own development challenges absent foreign assistance. To operationalize the concept, USAID produced a matrix comprising 17 existing indicators to quantify countries' progress toward ending their need for foreign assistance. These indicators are maintained by third-party sources, including multilateral institutions, think tanks, and nongovernmental organizations (NGOs). USAID selected these indicators based on their perceived alignment with the self-reliance concept, the reputation of reporting institutions, public availability of the underlying data and methodology, comparability across countries, and comprehensiveness of reporting across countries. This matrix, on which all less-developed countries have been plotted (including nonrecipients of U.S. foreign assistance), divides the indicators into two quantitative measures (see Figure 2 ): Commitment is meant to indicate whether a country's government and its people demonstrate a desire to rise beyond their current condition. Capacity is meant to illustrate whether a country has sufficient resources to assist itself in moving beyond poverty. Taken together, these two indices are meant to provide a comprehensive portrait of a country's development status to inform country-level planning. Under this new approach, USAID's five-year country plans, called Country Development Cooperation Strategies, are to prioritize approaches centered on advancing a country's commitment to self-reliance and augmenting its capacity to achieve it. While USAID has long supported efforts to build partner countries' capacity and emphasized their \"ownership\" of development programs, the \"Journey to Self-Reliance\" may be unique in making self-sufficiency the primary goal shaping USAID country strategies. This matrix approach reflects a sweeping theory of development that policymakers and observers have long debated. USAID asserts that the \"Journey to Self-Reliance\" allows for greater tailoring of country-level programming to the unique challenges facing a given country, while also establishing a common metric applicable across all countries. Although the self-reliance indicators are ostensibly a succinct but holistic portrait of a country's development along 17 indicators, they in fact comprise a wide array of issues. USAID argues that this inclusivity strives for an \"absence of judgment\" about the relative importance of each metric, which may be interpreted as an effort to integrate many theories of development into the framework. In fact, the indicators selected are especially oriented toward theories that connect economic growth to a country's democratic institutions and its markets. The indicators USAID has selected reflect theories of development that continue to generate debate among researchers and practitioners. For example, the theory that a country must lower its trade barriers (measured by the \"Trade Freedom\" indicator) to achieve prosperity remains heavily contested in academic circles, particularly for developing countries. In addition, the choice to aggregate these indicators into the two composites of \"commitment\" and \"capacity,\" rather than a single indicator, reflects some weighting: each of the seven \"commitment\" indicators contributes relatively more to a country's score than each of the 10 \"capacity\" indicators. To address such concerns, USAID argues that missions should examine these indicators in their local context and evaluate them based on each country's unique conditionâand that these indicators do not reflect a comprehensive diagnosis of the causes of development. The Administration's attention to country-level indicators suggests a reorientation from recent approaches. Recent Administrations have focused on broad, global development challenges, such as climate change and the HIV/AIDS crisis, while implementing such initiatives in targeted subnational regions and municipalities. Together, these global challenges and targeted interventions refocused strategic planning away from the country level. USAID describes the \"Journey to Self-Reliance\" as a high-level profile of a country's national policy and its institutions, in contrast to past initiatives focused on subnational regions. While USAID notes that progress emerges locally, these indicators track progress only at the national level. It is unclear if this approach will affect USAID's relationship with municipal and regional governments. In the past, commentators have expressed concern that such metrics could be used to cut aid to poor performers, punishing people in need for the actions of their national leaders. USAID asserts that these matrices are not scorecards to determine which countries are \"deserving\" of aid, but instead are a quantitative tool to inform programmatic allocations. Thus, for example, a poor score on open government may cause a mission to direct farmer-support programs through independent NGOs rather than the national government, as the central government may not be trusted to administer its services effectively. While USAID states that it is definitively not grading countries' performance, it is unclear whether the agency will be plotting countries' advancement over time along the self-reliance matrices, as \"journey\" implies. Considering the significant lag time in many indicators' reporting, as well as variance in reporting periods across indicators, it may be difficult to draw straightforward conclusions about the effect of any program or policy (whether the partner government's or USAID's) upon a country's self-reliance. Within the \"Journey to Self-Reliance\" framework, Transformation emphasizes two primary tools for ending the need for foreign assistance: financing self-reliance and private sector engagement. While many of the self-reliance indicators seek to describe the landscape against which USAID is to deploy its programs, these two components of Transformation seek to provide the tools with which to implement those programs. Financing self-reliance focuses on a country's ability to generate sufficient capital to invest in self-reliance, and private sector engagement seeks to create and partner with a private sector entity through which capital can be invested. A key component of USAID's self-reliance approach is facilitating access to capital for countries to reinvest in their own progress, in line with broader recent trends in development finance. This investment approach occupies a central place in several global development frameworks, including the U.N. Sustainable Development Goals (SDG) agenda and multilateral development banks' \"billions to trillions\" agenda, which seeks to leverage \"billions\" of Official Development Assistance (ODA) dollars to mobilize \"trillions\" of private sector investments in developing countries. Similarly, the 2015 Addis Ababa Action Agenda on financing for development affirmed the importance of strong local enabling environments and responsible fiscal policy to encourage country-owned growth strategies. Transformation 's focus on financing self-reliance builds upon existing U.S. approaches and commitments toward achieving the SDGs. It combines efforts to advance domestic resource mobilization (e.g., tax collection) with strong management of public finances and fiscal transparency to enable effective and accountable administration of the public sector. This approach is designed to create a strong market-based \"enabling environment\" for private investment, that is, one in which private investors are able to operate with reasonable confidence in the rule of law and protection for their investments. The initiative also prioritizes effective financial markets to enable capital access for economic development investments. Private sector engagement is a central conduit through which Transformation envisions repositioning USAID's role in development and supporting partner country self-sufficiency. USAID released a new Private Sector Engagement Policy (PSE Policy) in April 2019. The approach it outlines is not new, but rather builds on longstanding efforts to leverage the resources of nongovernmental actors, including businesses and charitable foundations, to advance international development. The Global Development Alliance (GDA) program, launched in 2001, has long been USAID's flagship mechanism for incubating and executing public-private partnerships for development assistance. The Obama Administration elevated several such programs when launching the U.S. Global Development Lab (the Lab), an innovation-oriented bureau intended to source breakthrough innovations to address development challenges. The Lab's Development Innovation Ventures (DIV) program, for example, seeks to integrate venture capital approaches into USAID's programs. The Transformation focus on private sector engagement tweaks the existing approach and includes several components not seen in previous Administrations. The Obama Administration generally viewed private sector partnerships as one component of a broader Science, Technology, Innovation, and Partnerships (STIP) agenda. This PSE Policy emphasizes business partnerships as a mechanism to attract solutions from scientists and technology innovators. The \"enterprise-driven development\" approach articulated in the PSE Policy may be a shift from economic development programs' focus on the market system to a focus on individual enterprises as their programmatic target. While past efforts, such as the GDA program, created partnerships with the private sector to address individual development challenges, the new PSE Policy seeks to infuse a private sector engagement orientation across all programming. The PSE Policy does not clarify the types of private sector partners to be favored. Micro, small, and medium enterprises (MSMEs), for example, a historical focus of USAID programming, are not specifically highlighted, suggesting that this policy may seek to support USAID collaboration with enterprises ranging from multinational corporations to smallholder farmers. Private sector engagement, then, is expected to broaden USAID's partner makeup, integrating nontraditional partners, both in the United States and overseas, by changing the way USAID engages its partners in program design. The PSE Policy is still in early stages of implementation. Many of the tools cited in the strategy have been in place at USAID for several years. The scope and depth of changes in USAID's implementation approach may emerge in the coming months. The USAID Acquisition and Assistance Strategy (A&A Strategy), released in February 2019, gives some indication of the shift in private sector engagement envisioned by Transformation . Restructuring USAID's engagement methodology and sourcing mechanisms is another means by which Transformation aims to build partnerships and promote partner self-sufficiency. Noting that more than 80% of USAID program funds are issued in award and assistance mechanisms to NGOs, the A&A Strategy lays out several shifts to its partnering approach: diversifying USAID's partner base, which has steadily shrunk since 2011; supporting the self-reliance of local partners through capacity building; and establishing a more flexible partnering approach through more collaborative and adaptive award management principles. Reforms from this initiative are still in progress, including the recent launch of a New Partnerships Initiative and expected revisions to USAID's internal series of operational policies, the Automated Directive System. Past experience may inform A&A Strategy implementation. USAID has attempted to expand its partner base in the past, notably under the Obama Administration's USAID Forward initiative. USAID Forward sought to shift funding away from longtime international development firms and NGOs in the U.S. toward organizations based in developing countries, as a means of promoting recipient country \"ownership\" of their development. The Lab also contributed to new partnering modalities and frameworks such as \"co-creation,\" a model for collaborative program design that is increasingly referenced in USAID's public solicitations. Transformation aims to build on these efforts by highlighting tools that encourage greater collaboration with partners and more adaptive management, consistent with revisions to USAID's process for developing and implementing programs (the \"Program Cycle\"). The structural component of Transformation is meant to align the agency's organization with the Administration's stated goals for U.S. international development and humanitarian assistance. This part of Transformations has been subject to the most direct congressional oversight. USAID submitted nine Congressional Notifications (CN) to the appropriate committees in July and August 2018 detailing the proposed structural changes. Upon receipt, each CN was put on \"hold,\" signaling that committee members wanted to look into the proposed changes further. The Administrator has signaled that he will not make changes without the approval of all four congressional oversight committees. Organizationally, USAID is split into two sectionsâfield missions, and headquarters' bureaus and independent officesâeach with its own key functions and personnel. The headquarters' bureaus and offices are divided among four categories: (1) geographic bureaus, (2) functional bureaus, (3) central bureaus, and (4) independent offices (see Figure 3 ). The geographic bureaus directly correspond with country field missions, while the functional bureaus manage cross-cutting sectoral issues, including education, global health, and humanitarian assistance, among others. The central bureaus and independent offices manage day-to-day agency operations, including human resources, security, legislative affairs, and financial management. Under Transformation , USAID is seeking to amend the chain of command to include two new Administration-appointed Associate Administrators. Currently, all bureaus report directly to the Administrator and Deputy Administrator. In the reorganization proposal, the Associate Administrators would each be responsible for three bureaus: The Associate Administrator for Relief, Response and Resilience (R3) would manage the Bureaus for Humanitarian Assistance (HA), Conflict Prevention and Stabilization (CPS), and Resilience and Food Security (RFS). The Associate Administrator for Strategy and Operations would oversee the Bureaus for Legislative and Public Affairs (LPA), Policy, Resources and Performance (PRP), and Management (M). By adding the two Associate Administrators, the Deputy Administrator would be responsible only for overseeing the remaining functional bureaus (Global Health and Development, Democracy and Innovation) and geographic bureaus. In establishing this three-pronged oversight structure, USAID aims to relieve the Administrator of some day-to-day oversight responsibilities, allowing the Administrator greater ability to focus on agency-wide management priorities, and to enable additional, functionally specialized leadership voices to represent the agency on the global stage. Some observers and policymakers have expressed concern with these changes; they worry that adding two political appointees might increase politicization of the agency's development decisions. Beyond the proposed leadership additions, reorganization proposals under Transformation are primarily focused on the headquarters' functional and central bureaus and their respective offices. In broad strokes, the agency is moving from four functional bureaus, six central bureaus/offices, and six independent offices to five functional bureaus, three central bureaus, and four independent offices. (For a detailed chart of the proposed structural changes, see the Appendix . ) Two of the proposed changes are presented in greater detail below. Perhaps the most publicized reorganization proposal is the creation of a Bureau for Humanitarian Assistance (HA). This proposal would take the Offices of Food for Peace (FFP) and U.S. Foreign Disaster Assistance (OFDA) out of the Bureau for Democracy, Conflict, and Humanitarian Assistance (DCHA) and combine them into HA. FFP and OFDA would no longer remain separate offices with independent functions; instead, they would be consolidated into one bureau made up of eight officesâthree geographically focused and five technical. USAID cites two primary reasons for the creation of HA: Elevating U.S. humanitarian assistance on the global stage. The Trump Administration maintains that it has placed a greater emphasis on humanitarian assistance than previous Administrationsâalthough such claims are open to debateâbut that having two separate offices within USAID leads to confusion when articulating U.S. humanitarian efforts to the international community. In merging FFP and OFDA and creating HA, USAID contends that it will have one unified, and more prominent, voice on humanitarian assistance on the global stage. Removing duplication of efforts. FFP and OFDA currently share some of the funding appropriated under the international disaster assistance (IDA) account. In combining the two offices, USAID asserts that it can better manage IDA funds by removing the distinction between food and nonfood assistance. In doing so, USAID states that it will be able to respond more quickly and effectively to today's increasingly complex humanitarian emergencies. Housing the humanitarian offices in a stand-alone bureau is not new to USAID. In the 1990s, the agency had a Bureau for Humanitarian Response, which included both FFP and OFDA as distinct offices. It was not until 2001, after a reorganization, that the humanitarian offices were combined with other functions to become the current DCHA Bureau. The HA structural proposal differs from the Bureau for Humanitarian Response in that it dissolves the FFP and OFDA offices as they currently exist. For a number of years, the humanitarian community has engaged with the U.S. government on issues of efficiency, effectiveness, and coordination of humanitarian assistance. Consultations within the U.S. government, Congress, and the broader humanitarian community continue on HA. Specifically, some say the proposed HA elevates USAID's humanitarian functions and is a positive step forward on reform, while others are more skeptical about its broader impact on interagency cooperation, levels of global humanitarian funding, and U.S. leadership and priorities. Food assistance stakeholders, for example, have raised concerns about the dissolution of FFP. Because FFP receives approximately half of its funding through Title II of the Food for Peace Act, most of which must be used to buy U.S. agricultural commodities, some have expressed concern that without the designation of FFP as an independent office, the provision of U.S. in-kind commodities will decline as a percentage of U.S. emergency food assistance. Further, while the proposal notes that FFP's mandated nonemergency programs would remain in HA, some are concerned that the nonemergency programs will be deemphasized in the new bureau context. These FFP-related concerns have been exacerbated by the Administration's repeated requests to eliminate Title II funding in its annual budget requests. The prospective creation of the Bureau for Democracy, Development, and Innovation (DDI) is the largest structural change proposed. It seeks to consolidate the agency's \"cross-cutting and sector-specific learning and knowledge management, and other technical assistance,\" noting that the current structure has left these functions \"scattered â¦ inconsistent and uncoordinated.\" The proposal pulls technical staff from regional bureaus and moves offices from three different bureaus into one. The new bureau would include 10 offices from the Bureau for Economic Growth, Education, and Environment (E3), two offices from DCHA, and four centers currently housed in the Global Development Lab. In addition, the bureau would include technical experts previously embedded in regional bureaus. These changes are intended to make DDI the technical \"one-stop-shop\" for missions in the field. The new DDI would comprise \"centers\" and \"hubs\" to provide \"missions with coordinated consultancy services,\" from education and environment to private sector engagement, youth, and gender equality. DDI has emerged as a controversial component of the structural proposal for Transformation . Supporters believe that in creating one place for \"centers\" and \"hubs,\" field offices will be able to garner more cohesive technical support for their respective programs. Detractors worry that DDI is an amalgamation of offices with unrelated functions, and that its various components will be unwieldy to manage. The Global Development Lab's absorption into a larger bureau, in particular, may cause concern among supporters that innovation in development is set for a demotion among agency priorities. Through Transformation , USAID seeks to modify its workforce management structures and processes to strengthen \"the ability of its entire workforce to thrive in, and adapt to, increasingly complex and challenging situations and opportunities.\" These changes include developing and piloting a new noncareer hiring mechanism, developing and operationalizing a leadership philosophy, and establishing and implementing a knowledge management framework. Much like the rest of Transformation , these pieces are described by the agency as being \"employee-led,\" developed by working groups comprising employees from across the agency. USAID staff are hired under more than 20 different hiring mechanisms. These include direct-hire (DH) positions, like Civil and Foreign Service, and non-DH positions, including U.S. personal services contractors (USPSCs), fellows, and institutional support contractors (ISCs), among others. DH positions are generally funded using USAID's Operating Expenses (OE) account and come with the full suite of U.S. government benefits. The non-DH positions are primarily funded using program funds, and benefits vary depending on the mechanism. For example, USPSCs have time-limited contracts and receive a subsidy to arrange for their own health care and life insurance on the open market. ISCs are hired through a parent firm and receive their paychecks, health care, and other benefits through that entity. A key element of the Transformation workforce reforms is a new hiring mechanism designed to address staffing concerns raised in the aftermath of USAID's 2014-2016 West Africa Ebola response. At the peak of that outbreak, the agency deployed 94% of its crisis roster, leaving the agency with little capacity to respond to other crises. Recognizing that this staffing challenge could easily arise again, the agency convened a working group in late 2016 to start developing a new hiring mechanism for crisis response. By 2018, the working group comprised approximately 80 USAID employees from different bureaus and under different employment mechanisms (e.g., DHs, USPSCs) and was supported by experts from the National Academy of Public Administration (NAPA). Since its creation, the working group and consequent plans have been folded into the larger context of Transformation . The new proposed mechanism is the Adaptive Personnel Project (APP), a noncareer, excepted service (potentially Schedule B) mechanism. (Excepted service positions are those not in the Senior Executive or competitive services.) USAID contends that the APP would provide the agency with more workforce flexibility, allowing it to more easily surge and contract with the agency's needs and resources. A few USAID-identified features of the APP include the following: Flexible tenure . Positions could be time-limited, much like current USPSC or Foreign Service Limited (FSL) positions (limited to five years and nine years, respectively), but the time limitations would be determined by the relevant hiring managers. This means that the APP could accommodate a 1-year position for a discrete project or a 10-year tenure with an office if the need for the role continues. \"Talent-based . \" Nonexcepted federal positions are required to be classified, with each role assigned to a group, series, title, and pay band. Once in a group and series, an employee is effectively locked in; in order to move into a different group and series, the employee would need to apply for the new position. USAID is working with the Office of Personnel Management (OPM) to structure the APP to either use a multidisciplinary approach to the classification system or not adhere to the classification system, allowing APP employees to move across different functional areas with relative ease. Equity in benefits . Even though APP would be noncareer, APP employees would receive government benefits like their career counterparts. This is a departure from the USPSC structure. Streamlined processes . USAID would create a common performance management system for all APP hires. The APP pilot would establish 300 positions for the crisis response offices, including FFP and OFDA (the proposed HA Bureau), OTI, and the Bureau for Global Health. USAID anticipates that many current USPSCs, ISCs, and Participating Agency Service Agreement employees (PASAs) would move into these APP positions, ultimately changing the agency's balance of hiring mechanisms. USAID has determined that it requires congressional approval to use program funds for the APP pilot. It notes that it does not have funds from the Operating Expenses account available to fund the pilot and meet the agency's other personnel needs (i.e., funding DH positions). If it receives approvals from Congress and OPM, USAID states that it will move forward with drafting internal policies and procedures to guide the new personnel system. The agency seeks to have the 300 APP positions filled in 2020. If those positions are filled and the onboarding of APP personnel provides the intended flexibilities, USAID is to expand the project to include an additional 1,200 positions in the following two years. Congress may have several ongoing areas of interest related to U.S. foreign assistance policy and USAID operations and budget. As Members of Congress consider proposed and ongoing USAID reform activities, several cross-cutting issues may emerge, including the following: Role of foreign assistance in broader U.S. foreign policy. At a time when many in Congress have expressed significant concern about the influence of rival powers such as China and Russia in regions in which USAID is active, Members may consider whether the overarching Transformation goal of ending the need for foreign assistance is consistent with U.S. foreign policy and national security interests. U.S. foreign assistance programs are driven by multiple rationales, including supporting U.S. security and diplomatic and commercial interests. Foreign assistance also is widely recognized as a tool of foreign policy, which promotes social and economic development in partner countries, while also enhancing U.S. influence and leverage in those countries. If USAID is successful in ending the need for foreign assistance, Congress and the Administration may consider alternative forms of engagement with current aid partners to maintain U.S. influence and presence. For example, a reorientation to cultural exchange programs like the Fulbright program, as well as increased business ties and investment agreements, may help maintain strong relationships and U.S. influence in countries transitioning away from U.S. aid. USAID f unding . USAID is carrying out Transformation at the same time that the Administration, for a third straight year, has proposed cuts of over 20% to the agency's annual budget. While some of the proposed reforms could reduce agency costs over time, Transformation documents do not appear to specify how the proposed budget cuts, if enacted, would be reflected in program allocation. To date, Congress has not supported the proposed cuts, and appropriations for USAID have remained fairly level in recent years. New positions from r estructuring . The Transformation proposal to add two new Associate Administrator positions at USAID would increase the number of political appointees at the agency, potentially raising concerns about the politicization of USAID's development decisions. Given the challenges some Administrations have faced in filling existing high-level positions, some observers are concerned that the new positions could sit vacant for months or even yearsâpossibly further hamstringing future Administrations' policy crafting and implementation. Impact on existing USAID activities. Overall, Transformation focuses on the newânew strategies, new indicators, and new hiring mechanisms. There is less discussion of what, if anything, may fall away. For example, in staffing, the agency is creating a hiring mechanism to \"streamline\" the workforceâit discusses plans to eventually phase out one hiring mechanism. This means that as the new hiring mechanism is getting off the ground, the agency would still be managing more than 20 others. Congress may consider asking the agency what other strategies, structures, and processes the agency may plan to phase out or integrate as a result of Transformation . Self- r eliance goals versus c ongressional p riorities. Administrator Green has argued that the self-reliance roadmaps are not just to be used after taking into account congressional directives and country/technical allocations, but as a guide for congressional allocation decisions as well. Congress typically appropriates funds to support priority accounts and sectors (such as global health, basic education, agricultural development, democracy promotion, and women's empowerment) rather than countries. The seeming shift under Transformation to a country-specific aid agenda may conflict with congressional funding of transnational programming, such as countering trafficking and regional trade hubs. Furthermore, the self-reliance indicators themselves may warrant attention. Advising countries that lowering their tariff barriers will signal their commitment to economic prosperity may be difficult to sustain, some may argue, in light of other actions of the Trump Administration, for example. Congress may consult with USAID to ensure its indicator configuration is consistent with its priorities. Other initiatives in Transformation . Transformation was initially launched with several other priorities that do not feature prominently in recent media on the initiative. For example, USAID operational flexibility in nonpermissive environments and programmatic effectiveness in countering violent extremism were core features of Transformation at launch. It is unclear whether these and other priorities have fallen in prominence because they require more interagency coordination, because solutions have been fairly straightforward, because the challenges in those sectors are too intractable to address, or because of other reasons. Congress may also consider seeking additional information on how Transformation would align with the Administration's planned Prosper Africa trade and investment initiative, which is expected to focus, in part, on USAID's three trade hubs in Africa and elements of its trade capacity-building programs. Alignment with State Department . The State Department's Office of Foreign Assistance Resources (F) has maintained a comprehensive database of indicators to quantify the results of U.S. foreign assistance programs since 2006. It is unclear how these indicators, or those used by the Millennium Challenge Corporation, will be used in conjunction with USAID's new self-reliance indicators, if at all. Also unclear is the extent to which the State Department has been engaged with Transformation at USAID, and whether these reforms are aligned with Secretary Pompeo's vision for the future of U.S. diplomatic engagement. Congress may consider whether certain reforms should be broadened to include State Department policies and structure, or elsewhere in government. Impact on Food for Peace programming . The proposed merger of the Offices of U.S. Foreign Disaster Assistance and Food for Peace into the Bureau of Humanitarian Assistance has raised questions about the future of Food for Peace Act Title II programming. The Office of Food for Peace is currently dual-funded, receiving approximately half of its funding through the agriculture appropriations bill and its authorization from regular farm bills. In the proposed HA Bureau, the Office of Food for Peace would cease to exist in name and program officers would be programming food and nonfood assistance side-by-side. Congress has not adopted proposals by multiple Administrations to eliminate Title II programs, and it may seek to further understand how the HA Bureau would be structured to ensure it meets its mandates outlined in the farm bill, including the minimum level of nonemergency programming. ", "summary": "The U.S. Agency for International Development (USAID) has initiated a series of major internal reforms, branded as Transformation at USAID . The reforms are largely in response to Trump Administration directives aimed at making federal agencies more efficient, effective, and accountable. Most of the reforms proposed under this initiative do not involve statutory reorganization, but USAID Administrator Mark Green has sought congressional input as the reform process is developed and launched, especially in the area of changes to USAID organizational structure. Congress has the power to shape USAID reforms through oversight activities, and through funding requirements and restrictions. Some of these proposed reforms are consistent with efforts by past USAID Administrators and do not represent major changes of course for USAID. At the same time, USAID policy documents signal a consistent emphasis on \"ending the need for foreign assistance\" by supporting partner countries' \"journey to self-reliance.\" This report highlights reforms that represent new or enhanced approaches to achieving longstanding objectives, including the following: Process and p olicy reforms focused on promoting and measuring partner country progress toward economic self-reliance, engaging the private sector in international development, and reforming procurement practices to better support these broader goals. Organizational s tructure reforms intended to enhance the agency's leadership structure, improve the efficiency of humanitarian assistance programming, and consolidate technically specialized offices within the agency. Workforce management reforms, including the creation of a new noncareer hiring mechanism. The figure below depicts the timing of key events of Transformation implementation to date. Congress may view USAID's reform initiatives through longstanding areas of interest and policy questions, including the relationship between the \"journey to self-reliance\" and broader U.S. foreign policy concerns, including great power competition; the consistency of the \"self-reliance\" goal with foreign assistance priorities identified by Congress in annual appropriations legislation; potential impacts of significant USAID funding cuts repeatedly proposed by the Trump Administration; potential impacts of proposed new Senate-confirmed management positions on agency operations; implications of replacing existing strategies, indicators, and mechanisms with new strategies, indicators, and mechanisms proposed in the Transformation initiative; the means for prioritizing goals identified in the new USAID Policy Framework and initiatives such as Prosper Africa, which do not seem appear to fall under the Trans formation umbrella; alignment of USAID policies and foreign assistance indicators with those of other U.S. agencies funding and implementing assistance, including the State Department and the Millennium Challenge Corporation; and the effect on food assistance funded by Congress through multiple channels, including the Food for Peace account, of the proposed bureau restructuring and consolidation of the Offices of U.S. Foreign Disaster Assistance and Food for Peace.", "document_type": "crs"}
{"report": "The United States and the People's Republic of China (PRC or China) are involved in a prolonged stand-off over trade, and in competition that is spilling from political and military areas into a growing number of other spheres, including technology, finance, and education, severely straining ties on the 40 th anniversary of the two countries' establishment of diplomatic relations. The two countries lead the world in the size of their economies, their defense budgets, and their global greenhouse gas emissions. Both countries are permanent members of the United Nations (U.N.) Security Council. In 2018, they were each other's largest trading partners. Trump Administration strategy documents have set the tone for U.S. policy toward China. The December 2017 National Security Strategy (NSS) describes both China and Russia as seeking to \"challenge American power, influence, and interests, attempting to erode American security and prosperity.\" An unclassified summary of the January 2018 U.S. National Defense Strategy describes China as a \"strategic competitor\" and charges that it is pursuing a military modernization program that \"seeks Indo-Pacific regional hegemony in the near-term and displacement of the United States to achieve global preeminence in the future.\" The Department of Defense's (DOD's) June 2019 Indo-Pacific Strategy Report identifies \"the primary concern for U.S. national security\" as \"inter-state strategic competition, defined by geopolitical rivalry between free and repressive world order visions.\" The Trump Administration has leveled its strongest criticism at China's economic practices. In a major October 4, 2018, address on China policy, Vice President Mike Pence charged that China has used \"an arsenal of policies inconsistent with free and fair trade\" to build its manufacturing base, \"at the expense of its competitorsâespecially the United States of America.\" In their public statements on the United States, China's top leaders have generally refrained from direct criticism. In July 2019, PRC Vice President Wang Qishan stated that \"profound shifts are taking place in the relations between major countries,\" noting \"mounting protectionism and populist ideologies\" and \"intensifying geopolitical rivalry and regional turbulence.\" PRC Vice Foreign Minister Le Yucheng, speaking at the same forum, addressed U.S.-China relations directly. The bilateral relationship, Le asserted, is \"now going through the most complex and sensitive period since diplomatic relations were formalized four decades ago.\" Le called for \"a China-US relationship based on coordination, cooperation and stability,\" and pushed back at the idea that China is responsible for U.S. \"challenges.\" The wars in Afghanistan and Iraq \"sapped [U.S.] strategic strength,\" Le asserted, and the global financial crisis \"exposed the deep-seated imbalances in the U.S. economy and society.\" The United States should not make China \"a scapegoat,\" Le argued, for \"[p]roblems such as economic disparity, widening wealth gap and aging infrastructure.\" U.S.-China tensions predated the Trump Administration. Frictions over such issues as Taiwan, trade, and China's human rights record have been long-standing, as have been U.S. concerns about the intentions behind China's ambitious military modernization efforts. United States Trade Representative (USTR) reports to Congress going back to the last years of the George W. Bush Administration document mounting U.S. frustrations with China's failure to implement market-opening commitments it made when it acceded to the World Trade Organization (WTO) in December 2001. Previous Administrations concluded, however, that a modus vivendi with China was necessary for a broad array of U.S. policy objectives in the world, and they thus sought to balance competition and cooperation in the U.S.-China relationship. During the Trump Administration, competition has dominated the relationship and areas of cooperation have shrunk. To pressure China to change its economic practices, the United States has imposed tariffs on hundreds of billions of dollars of U.S. imports from China, with almost all imports from China scheduled to be subject to additional tariffs by December 15, 2019. U.S. tariffs and China's retaliatory tariffs have reordered global supply chains and hit U.S. farmers and manufacturers particularly hard. Twelve rounds of negotiations have not resolved the dispute. On August 5, 2019, the U.S. Treasury Department labeled China a currency manipulator for the first time in a quarter century. The Administration has placed restrictions on the ability of U.S. firms to supply PRC telecommunications giant Huawei. The United States has also sought to warn other nations away from business dealings with Huawei and from cooperation with China on infrastructure projects under the framework of China's Belt and Road Initiative (BRI). Feeding a persistent narrative that the Administration seeks to \"decouple\" the U.S. and Chinese economies, on August 23, 2019, President Trump wrote on Twitter, \"Our great American companies are hereby ordered to immediately start looking for an alternative to China, including bringing your companies HOME and making your products in the USA.\" As his authority for such an order, the President cited the International Emergency Economic Powers Act ( P.L. 95-223 ), though he said on August 25, 2019, that he had \"no plan right now\" to trigger the law. Many analysts ascribe the rising friction in the relationship today not only to the arguably more confrontational inclinations of the Trump Administration, but also to more assertive behavior by China under President Xi Jinping. Xi assumed the top posts in the Communist Party of China in November 2012 and added the state presidency in March 2013. Later in 2013, China began building military outposts in the South China Sea and Xi launched BRI, an ambitious effort to boost economic connectivityâand China's influenceâacross the globe. In 2015, China began enacting a suite of national security legislation that shrank the space for independent thought and civil society, subjected ordinary citizens to stepped-up surveillance, and imposed onerous conditions on foreign firms operating in China. The same year, China launched its \"Made in China 2025\" plan, seeking to reduce China's reliance on foreign technology and directing the considerable resources of the state toward supporting the development of \"national champion\" Chinese firms in 10 strategic industries. In 2017, at the end of his first five-year term in his Party posts, Xi tasked China's military with turning itself into a \"world-class\" force by mid-century. That year, his government also began forcing more than 1 million of his Turkic Muslim fellow citizens in the northwest region of Xinjiang into reeducation camps. In March 2018, China's Communist Party-controlled legislature amended the state constitution to remove presidential term-limits, opening the way for Xi to stay in office indefinitely. Increasingly, the United States and China appear to be seeking to draw other countries into competing campsâthose who agree to sign (often vague) BRI cooperation agreements with China (some 125 countries as of April 2019, by China's count), and those who, at the U.S. government's behest, do not; those who do business with Huawei, and those who, similarly at the U.S. government's behest, do not; those who publicly censure China for its actions in Xinjiang, and those who offer support. U.S. allies are sometimes in China's \"camp.\" China represents \"a new kind of challenge,\" Secretary of State Michael R. Pompeo has suggested, because, \"It's an authoritarian regime that's integrated economically into the West in ways the Soviet Union never was.\" Important areas of remaining U.S.-China cooperation include maintaining pressure on North Korea to curb its nuclear weapons and missile programs; supporting the Afghanistan peace process; managing international public health challenges, from tuberculosis to influenza; and stemming the flow into the United States of China-produced fentanyl, a class of deadly synthetic opioids. Many of the Trump Administration's critics share the Administration's concerns about PRC policies and actions, but disagree with the Administration's framing of the relationship and with specific Administration policies. Signatories to an open letter on China addressed to the President and Members of Congress and published in The Washington Post on July 3, 2019, acknowledge \"troubling behavior\" by China. They argue, nonetheless, that China is not \"an economic enemy or an existential national security threat that must be confronted in every sphere; nor is China a monolith, or the views of its leaders set in stone.\" They warn, \"If the U.S. presses its allies to treat China as an economic and political enemy, it will weaken its relations with those allies and could end up isolating itself rather than Beijing.\" Former Obama Administration officials Kurt M. Campbell and Jake Sullivan argue that, \"The basic mistake of engagement was to assume that it could bring about fundamental changes to China's political system, economy, and foreign policy.\" They warn that, \"Washington risks making a similar mistake today, by assuming that competition can succeed in transforming China where engagement failedâthis time forcing capitulation or even collapse.\" Campbell and Sullivan call for \"a steady state of clear-eyed coexistence on terms favorable to U.S. interests and values,\" with elements of competition and cooperation in four domains: military, economic, political, and global governance. Peter Varghese, a former senior diplomat for Australia, a U.S. ally, asserts that, \"it would be a mistake for the US to cling to primacy by thwarting China. Those of us who value US leadership want the US to retain it by lifting its game, not spoiling China's.\" Many analysts fault the Trump Administration for giving up leverage against China by withdrawing from international agreements and institutions, by allegedly paying insufficient attention to maintaining strong relationships with allies, and by engaging in inconsistent messaging around trade, human rights, and other issues. In January 2017, the Administration notified the 11 other signatories to the Trans-Pacific Partnership (TPP), a proposed free trade agreement (FTA) of Asia-Pacific countries (not including China), that it would not be ratifying the agreement. In June 2018, the Administration announced its withdrawal from the U.N. Human Rights Council. Signatories of another high-profile open letter addressed to the President urge him, however, to \"stay the course on your path of countering Communist China.\" The letter states that supporters of engagement with China told American policymakers \"that the PRC would become a 'responsible stakeholder' once a sufficient level of economic modernization was achieved.\" The letter argues, \"This did not happen and cannot so long as the CCP [Chinese Communist Party] rules China.\" The letter assures the President, \"We welcome the measures you have taken to confront Xi's government and selectively to decouple the U.S. economy from China's insidious efforts to weaken it.\" The Communist Party of China (CPC) established the PRC 70 years ago, on October 1, 1949, after winning a civil war against the Nationalist (also known as Kuomintang or KMT) forces of the Republic of China (ROC) led by Chiang Kai-shek. Today, China is the world's most populous nation (with a population of 1.39 billion), the world's largest emitter of greenhouse gases (responsible for approximately 30% of global energy-related carbon dioxide emissions in 2016), the world's second-largest economic power (in nominal terms, with a gross domestic product or GDP of $13.6 trillion), and the only Communist Party-led state in the G-20 grouping of major economies. With the United States, France, Russia, and the United Kingdom, China is also one of five permanent members of the U.N. Security Council. Since 2012, Xi Jinping (his family name, Xi, is pronounced \"shee\") has been China's top leader. He holds a troika of top positions: Communist Party General Secretary, Chairman of the Party's Central Military Commission, and State President. In 2018, China's unicameral legislature, the National People's Congress (NPC), amended the PRC constitution to include a reference to \"Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era,\" putting Xi's guiding philosophy on a par with the philosophies of two powerful predecessors, Mao Zedong and Deng Xiaoping. Another constitutional amendment removed term limits for the state presidency, opening the way for Xi to stay in the position indefinitely after the conclusion of his second five-year term in 2023. Xi is the top official in China's most senior decisionmaking body, the seven-man Communist Party's Politburo Standing Committee (see Figure 1 ), which is drawn from the larger 25-person Politburo. Xi personally chairs multiple Communist Party policy committees, including those on foreign affairs, Taiwan, \"deepening overall reform,\" financial and economic affairs, cyberspace, and \"comprehensive rule of law.\" Some foreign observers refer to him as \"chairman of everything.\" Other members of the Politburo Standing Committee concurrently lead China's other major political institutions, including the State Council, China's cabinet; the NPC; and a political advisory body, the Chinese People's Political Consultative Conference (CPPCC). The arrangement ensures that the Communist Party maintains firm control over all the country's political institutions. Xi has repeatedly reminded his countrymen that, \"The Party exercises overall leadership over all areas of endeavor in every part of the country.\" China presents itself as comprised of 34 provincial-level administrative units (see Figure 2 ). They include 23 provinces; five geographic entities that China calls \"autonomous regions,\" all of which have significant ethnic minority populations (Guangxi, Inner Mongolia, Ningxia, Tibet, and Xinjiang); four municipalities that report directly to the central government (Beijing, Chongqing, Shanghai, and Tianjin); and the two special administrative regions of Hong Kong and Macau, which were returned to China in the 1990s by the governments of the United Kingdom and Portugal respectively. The PRC's count of 23 provinces includes Taiwan, an island democracy of 23 million people that the PRC has never controlled, but over which it claims sovereignty. Taiwan calls itself the Republic of China. Provinces have their own revenue streams, and governments at the provincial level and below are responsible for the lion's share of the country's public expenditure, including almost all public spending on education, health, unemployment insurance, social security, and welfare. Provinces also have the right to pass their own laws and regulations, which may extend national laws and regulations, but not conflict with them. Beijing gives provinces considerable leeway in adopting policies to boost economic growth and encourages provinces to undertake approved policy experiments. Provinces do not have their own constitutions, however, and do not have the power to appoint their own leaders. President Xi has sought to rally China's citizens around a \" China Dream of Great Rejuvenation of the Chinese Nation .\" The China Dream incorporates a pledge to build \"a moderately prosperous society in all respects\" by 2021, the centenary of the Party's founding, in part by doubling China's 2010 GDP and per capita income for both urban and rural residents. It also includes a pledge to make China, \"a modern socialist country that is prosperous, strong, democratic, culturally advanced, and harmonious\" by 2049, the centenary of the founding of the People's Republic of China. (The term \"democratic\" refers to Chinese-style \"socialist democracy\" under uncontested Communist Party rule.) The \"China Dream\" includes a \"dream of a strong military.\" Externally, Xi has promoted his vision of a \" community with a shared future for mankind \" (also translated as \"community of common destiny for mankind\"). In a January 2017 speech at the U.N. office in Geneva, Xi described the \"community with a shared future\" as an effort to \"establish a fair and equitable international order.\" In such an order, he said, there should be no interference in countries' internal affairs, and all countries should \"have the right to independently choose their social system and development path,\" an implicit rejection of U.S.-led democracy-promotion efforts around the world. Appearing to address the United States directly, he stated, \"Big countries should treat smaller ones as equals instead of acting as a hegemon imposing their will on others. No country should open the Pandora's box by willfully waging wars or undermining the international rule of law.\" At the CPC's 19 th Congress in late 2017, the CPC incorporated the \"community with a shared future for mankind\" into its charter. Xi boasted of \"a further rise in China's international influence, ability to inspire, and power to shape\" and said China was \"moving closer to center stage.\" In March 2018, China incorporated the \"community with a shared future for mankind\" into the state constitution. Later that year, Xi pledged that China would play \"an active part in leading the reform of the global governance system, and build a more complete network of global partnerships.\" After the Communist Party took power in China in 1949, the United States continued to recognize Chiang Kai-shek's ROC government on Taiwan as the legitimate government of all China. A year later, the United States and China found themselves on opposite sides of the Korean War, a conflict that killed 36,547 U.S. military personnel and at least 180,000 Chinese military personnel. China's name for the conflict is the \"War to Resist U.S. Aggression and Aid Korea.\" Early in the conflict, the United States sent its Seventh Fleet to the Taiwan Strait \"to prevent the Korean conflict from spreading south,\" effectively preventing Communist forces from realizing their goal of finishing the Chinese Civil War by wresting control of Taiwan from Chiang's forces. In 1971, changing Cold War dynamics, including the Sino-Soviet split, led the Nixon Administration to undertake a profound shift in U.S. policy. Then-Secretary of State Henry Kissinger made a secret visit to China in July 1971. In October of the same year, the United States supported U.N. General Assembly Resolution 2758, recognizing the PRC's representatives as \"the only legitimate representatives of China to the United Nations,\" and expelling \"the representatives of Chiang Kai-shek.\" President Richard Nixon formally ended nearly a quarter of a century of estrangement between the United States and the PRC with his historic visit to China in February 1972. On January 1, 1979, President Jimmy Carter and China's Deng Xiaoping presided over the establishment of diplomatic relations between their two nations. The joint communiquÃ© they signed, one of three that China considers to lay the foundation for the U.S.-China relationship, states that the United States \"acknowledges the Chinese position that there is but one China and Taiwan is part of China.\" It also states that \"the people of the United States will maintain cultural, commercial, and other unofficial relations with the people of Taiwan.\" In April 1979, Carter signed the Taiwan Relations Act (P.L. 96-8, U.S.C. 3301 et seq.), providing a legal basis for the unofficial U.S. relationship with Taiwan and committing the United States to sell defensive arms to Taiwan. The same year, Deng launched a bold program of \"reforming and opening\" to the outside world that would transform China from a backward, isolated country into the economic powerhouse, emerging military power, and shaper of global institutions that it is today. Through the 1970s and 1980s, the overriding strategic rationale for the U.S.-China relationship was counterbalancing a shared enemy, the Soviet Union. With the collapse of the Soviet Union in 1991, U.S. and Chinese leaders cast about for a new rationale for their relationship. President Bill Clinton and China's then-leader Jiang Zemin both came to see benefits in expanding bilateral economic ties, including by working together to bring China into the WTO. On October 10, 2000, Clinton signed into law P.L. 106-286 , granting China permanent normal trade relations and paving the way for China to join the WTO, which it did in December 2001. In 2018, the Trump Administration argued that \"the United States erred in supporting China's entry into the WTO on terms that have proven to be ineffective in securing China's embrace of an open, market-oriented trade regime.\" A former George W. Bush Administration official suggests that \"identifying a preferable alternative, even with the benefit of hindsight, is surpassingly difficult.\" After the terrorist attacks of September 11, 2001, the George W. Bush Administration settled on counterterrorism cooperation as a new strategic rationale for the U.S.-China relationship, but China complicated that rationale when it persuaded the United States to apply a terrorist label to separatist ethnic Uyghurs from its northwest Xinjiang region. During the Obama Administration, even as U.S.-China friction mounted over economic issues, cyber espionage, human rights, and the South China Sea, the two sides embraced as a strategic rationale for their relationship the need for their cooperation to address some of the world's most pressing challenges, including weak global economic growth, climate change, and nuclear proliferation. Observers broadly credited U.S.-China cooperation for contributing to the conclusion of the July 2015 Joint Comprehensive Plan of Action (JCPOA) nuclear deal with Iran and the December 2015 Paris Agreement under the U.N. Framework Convention on Climate Change. Over the past four decades, the U.S.-China relationship has faced some high-profile tests: In June 1989, a decade after normalization of U.S.-China relations, China's leaders ordered the People's Liberation Army (PLA) to clear Beijing's Tiananmen Square of peaceful protestors, killing hundreds, or more. In response, the United States imposed sanctions on China, some of which remain in place today. In 1995-1996, a U.S. decision to allow Taiwan President Lee Teng-hui to make a private visit to the United States and deliver a speech at his alma mater, Cornell University, led to what became known as the Third Taiwan Strait Crisis. China expressed its anger at the visit by conducting a series of missile exercises around Taiwan, prompting the Clinton Administration to dispatch two aircraft carrier battle groups to the area. In May 1999, two decades after normalization of U.S.-China relations, a U.S. Air Force B-2 bomber involved in North Atlantic Treaty Organization (NATO) operations over Yugoslavia mistakenly dropped five bombs on the Chinese Embassy in Belgrade, killing three Chinese journalists and injuring 20 embassy personnel. The event set off anti-U.S. demonstrations in China, during which protestors attacked U.S. diplomatic facilities. In April 2001, a PLA naval J-8 fighter plane collided with a U.S. Navy EP-3 reconnaissance plane over the South China Sea, killing the Chinese pilot. The U.S. crew made an emergency landing on China's Hainan Island, where Chinese authorities detained them for 11 days. Negotiations for return of the U.S. plane took much longer. In February 2012, a Chongqing Municipality Vice Mayor sought refuge in the U.S. consulate in the western China city of Chengdu, where he is believed to have shared explosive information about wrongdoing by his then-boss, an ambitious Politburo member. Thirty-six hours later, U.S. officials handed the Vice Mayor over to officials from Beijing. The Politburo member, Bo Xilai, soon fell from grace in one of the most spectacular political scandals in PRC history. In April 2012, after Chinese legal advocate Chen Guangcheng, who is blind, escaped house arrest in China's Shandong Province, the U.S. Embassy in China rescued him from the streets of Beijing and brought him into the U.S. Embassy compound, where he stayed for six days. High-stakes negotiations between U.S. and PRC diplomats led to Chen moving first to a Beijing hospital, and then, in May 2012, to the United States. Presidents Trump and Xi have met face-to-face five times: three times in 2017, once in 2018, and once in 2019 (see Table 1 ). Three of their five meetings have been on the sidelines of summits of the G-20 nations. Even as he has excoriated PRC policies, Trump has generally described his relationship with Xi in warm terms, frequently referring to Xi as \"my friend.\" Writing on Twitter on August 23, 2019, he questioned whether the Federal Reserve chairman or Xi \"is our bigger enemy.\" Three days later, however, the President wrote on Twitter that Xi is \"a great leader & representing a great country\" and stated publicly, \"I have great respect for President Xi.\" In their April 2017 meetings, Trump and Xi agreed to establish four high-level dialogues to manage the U.S.-China relationship, replacing dialogues that operated during the Obama Administration (see Table 2 ). All of the dialogues convened in 2017. Perhaps reflecting vacancies in senior positions in the Trump Administration and rising tensions in the U.S.-China relationship, only the Diplomatic and Security Dialogue (D&SD) convened in 2018. None of the dialogues has convened in 2019. U.S.-China trade and economic relations have expanded significantly over the past three decades. In 2018, China wasâin terms of goodsâthe United States' largest trading partner, third-largest export market, and largest source of imports. China is also the largest foreign holder of U.S. Treasury securities. The economic relationship has grown increasingly fraught, however. In 2017, the Trump Administration launched an investigation into China's policies on intellectual property (IP), subsidies, advancing technology, and spurring innovation. Beginning in 2018, the Trump Administration imposed tariffs on $250 billion worth of Chinese imports. Tariffs appear to have contributed to a sharp contraction in U.S.-China trade in the first half of 2019. On August 1, 2019, President Trump stated that beginning on September 1, 2019, the United States would impose 10% tariffs on nearly all remaining imports from China. His Administration later exempted some goods from the 10% tariffs and delayed the imposition of tariffs on other goods, but on August 23, 2019, the President also announced his intention to raise the tariff rate for these remaining imports from 10% to 15%. The President has sometimes suggested what some observers characterize as an ambivalence toward the trade relationship. In reference to the persistent large size of the U.S. trade deficit with China, the President stated on August 1, 2019, \"If they don't want to trade with us anymore, that would be fine with me. We'd save a lot of money.\" According to U.S. trade data, U.S. exports of goods and services to China totaled $178.0 billion (7.1% of total U.S. exports) in 2018, while imports from China amounted to $558.8 billion (17.9% of total U.S. imports). As a result, the overall bilateral deficit was $380.8 billion, up $43.6 billion (12.9%) from 2017. U.S. goods exports to China totaled $120.8 billion in 2018, a 7.3% ($9.4 billion) decrease from the 2017 level (see Table 3 ). The value of U.S. goods imports from China was $540.4 billion over the same period, up 6.8% ($34.4 billion) from 2017. The decrease in U.S. exports and increase in U.S. imports resulted in a $43.8 billion (11.7%) increase in the bilateral trade deficit, to $419.6 billion. Exports to China accounted for 7.2% of all U.S. goods exports, while imports from China accounted for 21.1% of all U.S. goods imports. Top U.S. goods exports to China in 2018 were capital goods, not including automotive products ($52.9 billion or 43.8% of U.S. goods exports to China), industrial supplies ($40 billion or 33.1%), and automotive vehicles and parts ($10.4 billion or 8.6%). Leading U.S. goods imports from China were consumer goods, not including food and automotive ($248.2 billion or 45.9% of U.S. goods imports from China), industrial supplies ($55.6 billion or 10.3%), and automotive vehicles and parts ($23.1 billion or 4.28%). China has levied retaliatory tariffs on most U.S. agricultural and food products. The tariffs reportedly contributed to the sharp overall decline of these exports to China (particularly of U.S. soybeans) in 2018. Total U.S. agricultural exports to China amounted to $9.1 billion, a decline of 53.0% from 2017, while the value of U.S. agricultural imports from China was $4.9 billion, up 8.9% from 2017. China's share of total U.S. agricultural exports declined from 14.1% in 2017 to 6.6% in 2018. In 2018, U.S. services exports to China totaled $57.1 billion (up 2.0% or $1.1 billion), while U.S. imports of services from China grew 5.1% ($887 million) to $18.3 billion. The bilateral trade surplus in services stood at $38.8 billion (up 0.6% from 2017). Exports to China accounted for 6.9% of all U.S. services exports, while imports from China accounted for 3.2% of all U.S. services imports. Travel represented the largest category of U.S. services exports to China, accounting for 56.1% ($32.1 billion). Other significant categories were charges for the use of IP rights (14.8% of all services exports to China or $8.5 billion) and transport (9.3% or $5.3 billion). Leading U.S. services imports from China were transport (27.4% of all services imports from China or $5.0 billion) and travel (24.7% or $4.5 billion). Despite a surge in U.S. foreign direct investment (FDI) in China following the PRC's entry into the World Trade Organization (WTO) in 2001, levels of investment have remained relatively low. China's foreign investment regulatory regime, combined with policies or practices that favor state-owned enterprises (SOEs), has traditionally limited the sectors open toâand levels ofâforeign investment. Amid trade tensions, a U.S. vetting regime with a newly broadened scope for reviewing certain foreign investments for national security implications, and tighter Chinese regulations on capital outflows, Chinese FDI in the United States has slowed since 2016. According to the U.S. Bureau of Economic Analysis, net U.S. FDI flows to China in 2018âthe most recent year for which data are availableâwere $7.6 billion (down 22.9% from 2017), while net Chinese FDI flows into the United States were negative (-$754 million, compared to $25.4 billion in 2016), as outflows exceeded inflows (e.g., asset divestitures). Additionally, the stock of U.S. FDI in China was $116.5 billion (up 8.3% from 2017), while that of China in the United States was $60.2 billion (up 3.7%), on an ultimate beneficiary ownership (UBO) basis. China accounts for approximately 2.0% of total U.S. FDI stock abroad. As of May 2019, approximately three-fourths (or $1.1 trillion) of China's total U.S. public and private holdings are Treasury securities, which investors generally consider to be \"safe-haven\" assets. Chinese ownership of these securities has decreased in recent years from its peak of $1.3 trillion in 2011. Nevertheless, it remains significantly higher than in 2002, both in dollar terms (up over $1 trillion) and as a percentage of total foreign holdings (from 8.5% to 17.0%). In 2009, China overtook Japan to become the largest foreign holder of Treasury securities. The United States and China formalized military ties in 1979, the year the two countries established diplomatic relations, although they had cooperated on some security issues previously. The two countries enjoyed high levels of military cooperation until the PRC's 1989 military crackdown in Tiananmen Square, after which the United States suspended military engagement. The Clinton Administration in 1993 resumed military ties, reportedly in an attempt to reassure Chinese military leaders of the United States' benign intentions toward China, but military relations never again achieved the scope and depth of the previous decade. China on several occasions suspended military ties when it perceived the United States to have harmed Chinese interests (for example, in response to U.S. arms sales to Taiwan). In 1999, Congress included a provision in the National Defense Authorization Act for FY2000 ( P.L. 106-65 ) placing restrictions on military relations with China. The act states that the Secretary of Defense may not authorize any military contact with the PLA that would \"create a national security risk due to an inappropriate exposure\" of the PLA to 12 operational areas of the U.S. military. In recent years, U.S.-China military exchanges have included high-level visits, recurrent exchanges between defense officials, and functional and academic exchanges (see Table 4 ). According to U.S. Department of Defense (DOD) reports, the frequency of these engagements has declined in recent years, from 30 in 2016 to 12 planned for 2019. The two militaries also occasionally engage in multilateral fora, such as multinational military exercises, and coordinate or de-conflict activities such as counterpiracy patrols in the Gulf of Aden. DOD reporting indicates U.S. objectives for military-to-military relations with China have narrowed in recent years from a broader focus on building trust and fostering cooperation on security issues of mutual interest to a narrower focus on risk reduction. The Trump Administration has been more vocal than past Administrations in expressing its concerns about China's military, and frictions have occasionally flared into public view. Eighteen \"unsafe and/or unprofessional interactions\" between U.S. and PRC military forces in the maritime realm have occurred since 2016, according to a U.S. Pacific Fleet spokesperson. In late May 2018, the United States disinvited China from the 2018 iteration of the biennial U.S.-led multinational Rim of the Pacific (RIMPAC) maritime exercise in response to China's continued militarization of its outposts in the South China Sea. In September 2018, the U.S. Treasury Department sanctioned the PLA's Equipment Development Department and its head for arms purchases from Russia under the Countering America's Adversaries through Sanctions Act (CAATSA) ( P.L. 115-44 ). The PRC's response to that action, and a September 2018 U.S. arms sale to Taiwan, included suspension of the two militaries' year-old Joint Staff Dialogue. These tensions notwithstanding, both countries appear committed to military-military engagement. Then-U.S. Secretary of Defense Jim Mattis and Chinese Defense Minister Wei Fenghe met three times in 2018. At a meeting of the two countries' Diplomatic and Security Dialogue in November 2018, they \"recognized that the U.S.-China military-to-military relationship could be a stabilizing factor for the overall bilateral relationship, and committed to a productive mil-mil relationship.\" In May 2019 remarks, Assistant Secretary of Defense for Indo-Pacific Security Affairs Randall Schriver echoed this sentiment, saying, \"We continue to pursue a constructive result-oriented [military-to-military] relationship between our countries.\" Since 2001, U.S. assistance efforts in China have aimed to support human rights, democracy, rule of law, and environmental programs and to promote sustainable development and environmental conservation and preserve indigenous culture in Tibetan areas in China. The U.S. government does not provide assistance to PRC government entities or directly to Chinese NGOs. The direct recipients of Department of State and U.S. Agency for International Development (USAID) grants have been predominantly U.S.-based nongovernmental organizations (NGOs) and universities. Between 2001 and 2018, the U.S. government provided approximately $241 million for programs in China administered by the Department of State's Bureau of Democracy, Human Rights, and Labor (DRL); $99 million for Tibetan programs; $72 million for rule of law and environmental efforts in the PRC; $43 million for health programs in China focused upon HIV/AIDS prevention, care, and treatment and countering the spread of pandemic diseases; and $8.0 million for criminal justice reform. DRL programs across China have supported rule of law development, civil society, government transparency, public participation in government, and internet freedom. Since 1993, Peace Corps volunteers have engaged in environmental awareness programs and teaching English as a second language in China. Since 2015, Congress has appropriated funds for Tibetan communities in India and Nepal ($6 million in FY2019). Since 2018, Congress has provided an additional $3 million annually to strengthen institutions and governance in the Tibetan exile communities. (See Table 5 .) The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) appropriated an estimated $25.8 million for programs in China. This total includes ESF funding of $17 million for programs in China (non-Tibetan areas), ESF of $8 million for Tibetan areas in China, and INCLE funding of $800,000 for rule of law programs. Of the ESF appropriation for non-Tibetan areas, DRL administers human rights and democracy programs amounting to $11 million. In addition, P.L. 116-6 provided $17.5 million for Global Internet Freedom efforts, of which China programs are a major recipient. The FY2020 Department of State foreign operations budget justification does not include a funding request for programs in China. Appropriations for such programs are determined largely by congressional foreign operations appropriations legislation. In March 2018, the USTR released the findings of an investigation into PRC policies related to technology transfer, IP, and innovation under Sections 301-308 of the Trade Act of 1974 (19 U.S.C. 2411-2418). The investigation concluded that four IP rights-related PRC policies justified U.S. action: forced technology transfer requirements; cyber-enabled theft of U.S. IP and trade secrets; discriminatory and nonmarket licensing practices; and state-funded strategic acquisition of U.S. assets. Subsequently, the Trump Administration imposed increased 25% tariffs on three tranches of imports from China worth approximately $250 billion (see Table 6 ). China in turn raised tariffs (at rates ranging from 5% to 25%) on approximately $110 billion worth of U.S. products. After negotiations to resolve the standoff broke down in May 2019, the President ordered the USTR to begin the process of levying increased 25% tariffs on nearly all remaining imports from China. Following a 12 th round of talks between U.S. and Chinese trade negotiators in Shanghai at the end of July 2019, the President on August 1, 2019, announced that the United States would impose additional 10% tariffs on these remaining imports beginning September 1, 2019. On August 13, 2019, the Trump Administration announced that some imports from China previously identified as potentially subject to the additional 10% tariffs would be exempted \"based on health, safety, national security and other factors,\" and that for some other imports from China, including cell phones, laptop computers, video game consoles, computer monitors, and some toys and footwear and clothing items, the additional 10% tariffs would be delayed until December 15. China responded to the President's August 1, 2019, announcement by allowing its currency, the renminbi or RMB, to weaken against the U.S. dollar, making Chinese exports more competitive abroad, and in part \"offsetting\" the impact of U.S. tariffs. Chinese companies also suspended new purchases of U.S. agricultural products. On August 23, 2019, China's Ministry of Finance announced plans to impose retaliatory tariffs of 5% to 10% on $75 billion worth of imports from the United States. Tariffs on some products took effect on September 1, 2019; tariffs on the rest are to go into effect on December 15, 2019. The Ministry also announced restoration of 5%-25% tariffs on U.S. autos and auto parts, to go into effect December 15, 2019. President Trump responded, in turn, to China's tariff announcements by stating that he would increase the tariff rate for $250 billion worth of imports from China from 25% to 30%, effective October 1, 2019, and that he would increase the proposed tariff rate for the remaining imports from China from 10% to 15%, to go into effect for some products on September 1, 2019, and for other products on December 15, 2019. Trade negotiators from the two sides are scheduled to meet for a 13 th round of negotiations in Washington, DC, in September 2019. In March 2018, President Trump issued a proclamation imposing a 10% tariff on aluminum and a 25% tariff on steel products from most countries, including China, based on \"national security\" justifications under Section 232 of the Trade Act of 1962 (P.L. 87-794; 19 U.S.C. Â§1862). In response, China raised tariffs by 15% to 25% on $3 billion worth of U.S. imports. China is also pursuing legal action against the United States at the WTO. In turn, the United States filed its own WTO complaints over China's retaliatory tariffs. On August 5, the U.S. Treasury Department labeled China a currency manipulator under Section 3004 of the Omnibus Trade and Competitiveness Act of 1988 ( P.L. 100-418 ) and announced that Treasury Secretary Steven Mnuchin would \"engage with the International Monetary Fund [IMF] to eliminate the unfair competitive advantage created by China's latest actions.\" In its annual review of China's economic policies, released on August 9, 2019, however, the IMF stated, \"[e]stimates suggest little FX [foreign exchange] intervention by\" China's central bank, the People's Bank of China. President Trump has raised concerns about U.S. bilateral trade imbalances, particularly with China. Some policymakers view the large U.S. trade deficit as an indicator of an unfair trade relationship resulting from Chinese trade barriers, such as comparatively high tariffs, and currency manipulation. Others view conventional bilateral trade deficit data as misleading, given multinational firms' growing use of global supply chains. Supporters of the latter view note that products may be invented or developed in one country and manufactured or assembled elsewhereâusing imported components from multiple foreign sourcesâand then exported. Conventional U.S. trade data may not fully reflect the value added in each country, and thus are often a relatively poor indicator of who benefits from global trade. Economists generally agree that the overall size of the trade deficit stems largely from U.S. macroeconomic policies and an imbalance between saving and investment in the economy, rather than from foreign trade barriers. The Trump Administration, some Members of Congress, and others charge that the Chinese government employs policies, including subsidies, tax breaks, low-cost loans, trade and investment barriers, discriminatory IP and technology practices, and technology transfer mandates, to support and protect domestic firms, especially state-owned enterprises (SOEs). Chinese government plans, such as \"Made in China 2025,\" appear to signal an expanded role for the government in the economy, which many analysts fear could distort global markets and hurt the global competitiveness of U.S. firms. Separately, some U.S. officials are concerned that participation by Chinese firms in certain global supply chains, such as information and communications technology (ICT) products and services, could pose risks to U.S. national security, primarily because of PRC firms' relationships with the Chinese state. As noted in the Section 301 investigation, the Trump Administration considers Chinese IPR violations to be a major source of U.S. economic losses. U.S. firms cite lax IPR enforcement as one of the biggest challenges to doing business in China, and some view the enforcement shortfalls as a deliberate effort by the Chinese government to give domestic firms an advantage over foreign competitors. In 2018, the U.S. National Counterintelligence and Security Center described China as having \"expansive efforts in place to acquire U.S. technology to include sensitive trade secrets and proprietary information.\" It warned that if the threat is not addressed, \"it could erode America's long-term competitive economic advantage.\" The U.S. government's first charges against a state actor for cyber-enabled economic espionage were against China. In May 2014, the Obama Administration Justice Department indicted five PRC military officers for hacking into and stealing secrets from U.S. firms in the nuclear power, metals, and solar products industries. All those indicted remain at large. In September 2015, the Obama Administration and China reached a bilateral agreement on cybersecurity during President Xi's state visit to the United States. Under that agreement, Presidents Xi and Obama pledged that neither country's government would conduct or knowingly support cyber-enabled theft of intellectual property for commercial purposes. In February 2018 testimony to Congress, the U.S. intelligence community assessed that PRC cyber activity continued, but at \"volumes significantly lower than before\" the 2015 agreement. In October 2018, however, the cofounder of cybersecurity firm CrowdStrike asserted that after a lull, China was \"back to stealing intellectual property on a massive scale.\" In 2019, the intelligence community's testimony to Congress stated, \"China remains the most active strategic competitor responsible for cyber espionage against the US Government, corporations, and allies.\" The Trump Administration has raised national security concerns over global supply chains of advanced technology products, such as ICT equipment, where China is a major global producer and supplier. In 2017, the President blocked a proposed Chinese acquisition of a U.S. semiconductor firm on national security grounds. On May 15, 2019, citing a \"national emergency,\" President Trump signed Executive Order 13873, authorizing the Secretary of Commerce to ban certain technology transactions involving \"foreign adversaries.\" The Trump Administration has subjected Chinese telecommunications firm Huawei Technologies Co., Ltd. to particular scrutiny. On May 16, 2019, the U.S. Department of Commerce added Huawei and 68 of its non-U.S. affiliates to the Bureau of Industry and Security's (BIS's) Entity List, generally requiring U.S. companies to apply for an export license for the sale or transfer of U.S. technology to those entities, with a \"presumption of denial\" for such applications. The BIS entity list decision cites \"reasonable cause to believe Huawei has been involved in activities contrary to the national security or foreign policy interests of the United States,\" and notes Huawei's indictment in the U.S. District Court for the Eastern District of New York on charges of violating Iran sanctions. On May 20, 20 19, BIS eased the effect of the entity list decision by issuing a three-month temporary general license authorizing some continued transactions with Huawei and its non-U.S. affiliates. On August 19, 2019, BIS added an additional 46 non-U.S. Huawei affiliates to the entity list, while also extending the temporary general license for another three months, to November 18, 2019. In apparent response to U.S. actions, China's Ministry of Commerce in June 2019 announced plans for its own \"unreliable entities list,\" to include foreign entities that damage \"the legitimate rights and interests\" of Chinese firms or \"boycott or cut off supplies to Chinese companies for non-commercial reasons.\" Vice President Pence and U.S. Secretary of State Pompeo have repeatedly urged allies not to work with Huawei. In Ottawa, Canada, in May 2019, Pence argued, \"The simple fact is that the legal framework within China gives the Chinese government access to information and data that is collected by Chinese companies like Huawei,\" making Huawei \"incompatible with the security interests of the United States of America or our allies in freedom-loving nations across the world.\" Pompeo warned European allies, partners, and friends in June 2019, \"don't do anything that would endanger our shared security interests or restrict our ability to share sensitive information.\" Of U.S. allies, only Australia has so far barred Huawei completely from its networks. China's Foreign Ministry accuses the United States of seeking to \"strangle [Chinese companies'] lawful and legitimate operations.\" The Huawei issue has spilled into U.S.-Canada and Canada-China relations. In 2018, the United States requested that Canada detain top Huawei executive Meng Wanzhou, a daughter of Huawei's founder, and charged her with financial fraud related to alleged violation of Iran sanctions. She faces possible extradition to the United States. China has retaliated against Canada by detaining and later arresting Canadians Michael Kovrig and Michael Spavor on state secrets charges and cutting off imports first of Canadian canola seed, and then of Canadian meat. The 164-member WTO allows members to designate themselves as either developed or developing economies, with the latter eligible for special and differential treatment (SDT) both in the context of existing WTO obligations and in new negotiations. Developed countries, including the United States and the European Union, have expressed frustration at those rules, under which two-thirds of WTO members, including China, have designated themselves as \"developing.\" On July 26, 2019, President Trump issued a \"Memorandum on Reforming Developing-Country Status in the World Trade Organization.\" The President stated that the WTO dichotomy between developed and developing countries is outdated and \"has allowed some WTO Members to gain unfair advantages in the international trade arena.\" He specifically called out China, stating that \"the United States has never accepted China's claim to developing-country status, and virtually every current economic indicator belies China's claim.\" The President instructed USTR to work to reform the WTO self-declaration practice and, if no substantial progress is made within 90 days, to take certain unilateral actions, such as no longer treating a country as developing if the USTR believes that designation to be improper, and to publish a list of all economies USTR believes to be \"inappropriately\" claiming developing-economy status. Responding to the U.S. memorandum, a PRC Foreign Ministry spokesperson insisted that the principle of SDT \"reflects the core values and basic principles of the WTO\" and \"must be safeguarded no matter how the WTO is reformed.\" At the same time, she stated that in claiming the status, \"China does not intend to shy away from its due international responsibilities.\" The U.S. position, she said, shows the United States to be \"capricious, arrogant and selfish.\" In 2013, President Xi launched two projects aimed at boosting economic connectivity across continents by land, an effort known as the \"Silk Road Economic Belt,\" and by sea, an effort known as the, \"21 st Century Maritime Silk Road.\" Collectively, China refers to the two projects as the \"Belt and Road Initiative\" (BRI). Under the initiative, PRC institutions are financing transportation and energy infrastructure projects in dozens of countries and PRC government agencies are working to reduce investment and trade barriers and boost people-to-people ties. BRI is also intended to alleviate overcapacity in the Chinese economy, bring new economic activity to China's western provinces, and promote PRC diplomatic and security interests, including securing energy supply routes and perhaps facilitating future Chinese military or intelligence use of Chinese-built ports and other infrastructure around the world. The size and scale of PRC financing, investments, and loans issued under BRI is debated. China does not issue its own authoritative figures. PRC financing has the potential to address serious infrastructure shortfalls in recipient countries, but China's initial implementation of BRI has sometimes been rocky. A June 2019 Asia Society Policy Institute report examines BRI projects in Southeast Asia and faults China for a \"laissez-faire approach\" that allows mainly Chinese developers \"to benefit by cutting corners and evading responsibility for legal, social, labor, environmental, and other issues.\" The report identifies such problems as rushed agreements, a failure to conduct feasibility studies and environmental and social impact assessments, and financing terms that create unsustainable debt for host governments. All those issues \"have begun to alienate local communities and taint the BRI brand,\" the report asserts. Some countries have sought to renegotiate the terms of their BRI agreements. The Trump Administration has adopted a sharply critical stance toward BRI. In his October 4, 2018, speech on China policy, Vice President Pence accused China of engaging in \"so-called 'debt diplomacy.'\" The terms of PRC loans, he said, \"are opaque at best, and the benefits flow overwhelmingly to Beijing.\" In Congress, the Better Utilization of Investments Leading to Development (BUILD) Act of 2018 ( P.L. 115-254 ) established a new U.S. International Development Finance Corporation (IDFC) by consolidating existing U.S. government development finance functions. It is widely portrayed as a U.S. response to BRI. At the Second Belt and Road Forum in Beijing in April 2019, Xi appeared to respond to criticism from the United States and other countries when he referenced the \"need to ensure the commercial and fiscal sustainability of all projects so that they will achieve the intended goals as planned.\" He declared that in pursuing BRI, \"everything should be done in a transparent way, and we should have zero tolerance for corruption.\" He also vowed to \"adopt widely accepted standards and encourage participating companies to follow general international rules and standards in project development, operation, procurement and tendering and bidding.\" Â  U.S. policymakers are concerned about the challenges that China's ambitious military modernization program is now posing to U.S. interests in Asia and elsewhere. China's military modernization program has emerged in recent years as a significant influence on U.S. defense strategy, plans, budgets, and programs, and the U.S.-China military competition has become a major factor in overall U.S.-China relations. Since 1978, the PRC has worked to transform the PLA from an infantry-heavy, low-technology, ground forces-centric military into a high-technology, networked force with an increasing emphasis on joint operations, maritime and information domains, offensive air operations, power projection, and cyber and space operations. The PLA is becoming a global military, as demonstrated by a navy increasingly capable of operating far from home. The PLA undertakes counterpiracy patrols in the Gulf of Aden, regular patrols in places like the South China Sea and the Indian Ocean, and task group and goodwill deployments all over the world, and in 2017 established China's first-ever overseas military base in Djibouti. President Xi has set two major deadlines for the PLA: to complete its modernization process by 2035, and to become a \"world class\" military by 2049, the centenary of the establishment of the PRC. According to China's July 2019 defense white paper, China seeks to build \"a fortified national defense and a strong military commensurate with the country's international standing and its security and development interests\" in service of several national defense aims. According to DOD, the PLA is seeking to develop \"capabilities with the potential to degrade core U.S. operational and technological advantages.\" As China's military advances, it increasingly is in a position to challenge U.S. dominance in certain domains, including air, space, and cyberspace, where the PLA has directed significant political, organizational, and financial resources in recent years. China also is investing heavily in advanced military technologies such as autonomous and unmanned systems, maneuverable reentry vehicles (including hypersonic missiles), and artificial intelligence and other enabling technologies. Chinese officials insist China's military posture is defensive in nature. In January 2018, a spokesperson for China's Ministry of National Defense stated, \"China resolutely follows the path of peaceful development and upholds a defensive national defense policy.\" The spokesperson added, \"China is not interested in dominance.\" The United States and China have both committed to the goal of denuclearization of North Korea, but have sometimes disagreed on the best path toward that goal. Between 2006 and 2017, China voted for U.N. Security Council Resolutions imposing ever stricter sanctions on North Korea over its nuclear weapons and missile programs, though it often sought to weaken the resolutions first. With China sharing a 880-mile border and serving as North Korea's primary trading partner, the Trump Administration deems China's sanctions implementation to be \"at times inconsistent, but critical.\" The Treasury Department has designated mainland China-based companies, Hong Kong-based shipping companies, and PRC nationals for alleged violations of U.S. North Korea sanctions. In both 2018 and 2019, the United States led efforts to request that a U.N. sanctions committee declare that North Korea had procured refined petroleum products at levels greater than U.N. sanctions permit, and to halt all new deliveries. Both times, China and Russia are reported to have blocked the effort. North Korea is alleged to have obtained the above-quota petroleum products through illegal ship-to-ship transfers at sea. The announcement of President Trump's June 2018 summit with North Korean leader Kim Jong-un led to a thaw in previously frosty China-North Korea ties. Since March 2018, Kim has visited China four times and President Xi has visited North Korea once, in June 2019. China urges all parties to undertake \"phased and synchronized steps\" in a \"dual-track approach\" to a political settlement of issues on the Korean Peninsula, with one track focused on denuclearization and the other on establishing a peace mechanism. In the East China Sea, the PRC is involved in a territorial dispute with Japan over the sovereignty of uninhabited land features known in Japan as the Senkaku Islands and in the PRC as the Diaoyu Dao. The features are also claimed by Taiwan, which refers to them as the Diaoyutai. The United States does not take a position on the sovereignty dispute over the Senkakus, but it does recognize Japanese administration of the features. That recognition, reaffirmed by every U.S. Administration since Nixon, has given the United States a strong interest in the issue because Article 5 of the U.S.-Japan Treaty of Mutual Cooperation and Security covers areas under Japanese administration. The U.S. military regularly conducts freedom of navigation operations (FONOPs) and presence operations, as well as combined exercises with the Japan Self-Defense Force, in and above the East China Sea. Since 2012, China has stepped up what it calls \"routine\" patrols to assert jurisdiction in China's \"territorial waters off the Diaoyu Islands.\" In November 2013, China established an air defense identification zone (ADIZ) in the East China Sea covering the Senkakus as well as airspace that overlaps with the existing ADIZs of Japan, South Korea, and Taiwan. China makes extensive, though imprecise, claims in the South China Sea, which is believed to be rich in oil and gas deposits as well as fisheries, and through which a major portion of world's trade passes. On maps, China depicts its claims with a \"nine-dash line\" that, if connected, would enclose an area covering approximately 90% of the sea. China physically controls the Paracel (known in China as the Xisha) Islands in the northern part of the sea, seven of the approximately 200 geographic features in the Spratly (Nansha) Islands chain in the southern part of the sea, and Scarborough Shoal (Huangyan Island) in the eastern part of the sea (see Figure 3 ). Areas claimed by the PRC are also claimed in part by Brunei, Malaysia, the Philippines, and Vietnam, and in entirety by Taiwan, with the fiercest territorial disputes being those between China and Vietnam and China and the Philippines. The South China Sea is bordered by a U.S. treaty ally, the Philippines, and is a key strategic waterway for the U.S. Navy. Since 2013, the PRC has built and fortified artificial islands on seven sites in the Spratly Island chain, and sought to block other countries from pursuing economic or other activity within the exclusive economic zones (EEZs) they are entitled to under the U.N. Convention on the Law of the Sea (UNCLOS). According to DOD, China has placed anti-ship cruise missiles and long-range surface-to-air missiles on the artificial islands and is \"employing paramilitary forces in maritime disputes vis-Ã -vis other claimants.\" In May 2018, the United States disinvited the PRC from the 2018 edition of the U.S.-hosted RIMPAC maritime exercise over the PRC's continued militarization of the sites. To challenge what the United States considers excessive maritime claims and to assert the U.S. right to fly, sail, and operate wherever international law allows, the U.S. military undertakes both FONOPs and presence operations in the sea. In June 2019, Chinese Minister of National Defense Wei appeared to refer to those operations when he complained that \"some countries outside the region come to the South China Sea to flex muscles, in the name of freedom of navigation.\" He declared that, \"The large-scale force projection and offensive operations in the region are the most serious destabilizing and uncertain factors in the South China Sea.\" China and members of the Association of Southeast Asian Nations (ASEAN) are involved in negotiations over a Code of Conduct for the South China Sea. In November 2018, China's Premier, Li Keqiang, set a deadline of 2021 to complete the negotiations. The parties have not made public the latest draft of their negotiating text, but an initial August 2018 draft reportedly included proposed language from China stating that, \"The Parties shall not hold joint military exercises with countries from outside the region, unless the parties concerned are notified beforehand and express no objection.\" Such language would appear to target U.S. military exercises with allies and partners, including such ASEAN members as the Philippines, Thailand, and Vietnam. In 2013, the Philippines sought arbitration under UNCLOS over PRC actions in the South China Sea. An UNCLOS arbitral tribunal ruled in 2016 that China's nine-dash line claim had \"no legal basis.\" The ruling also stated that none of the land features in the Spratlys is entitled to any more than a 12-nautical mile territorial sea; that three of the Spratlys features that China occupies generate no entitlement to maritime zones; and that China violated the Philippines' sovereign rights in various ways. China declined to participate in the arbitration process and declared the ruling \"null and void.\" After consolidating power in 2013, Xi Jinping intensified and expanded the reassertion of party control over society that began during the final years of his predecessor, Hu Jintao, who served as CPC General Secretary from 2002 to 2012. Since 2015, China's government has enacted new national laws that strengthen the role of the state over a wide range of social activities in the name of national security and authorize greater controls over the Internet and ethnic minority groups. Government arrests of human rights advocates and lawyers, which intensified in 2015, were followed by Party efforts to instill ideological conformity in various spheres of society. In 2016, Xi launched a policy known as \"Sinicization,\" by which China's religious populations, particularly Tibetan Buddhists, Muslims, and Christians who worship in churches that are not registered with the government, are required to conform to Han Chinese culture, the socialist system, and Communist Party policies. In the name of combating terrorism and religious extremism, authorities in China's northwest region of Xinjiang have since 2017 undertaken the mass internment of Turkic Muslims, mainly ethnic Uyghurs (also spelled \"Uighurs\"), in ideological reeducation centers. Scholars, human rights activists, and the U.S. government allege that those detained without formal charges include an estimated 1.5 million Uyghurs out of a population of about 10.5 million, and a smaller number of ethnic Kazakhs. Nearly 400 prominent Uyghur intellectuals reportedly have been detained or their whereabouts are unknown. Many detainees reportedly are forced to express their love of the Communist Party and Xi, sing patriotic songs, and renounce or reject many of their religious beliefs and customs. According to former detainees, treatment and conditions in the camps include beatings, food deprivation, and crowded and unsanitary conditions. PRC officials describe the Xinjiang camps as \"vocational education and training centers\" in which \"trainees\" undertake a curriculum of \"standard spoken and written Chinese, understanding of the law, vocational skills, and deradicalization.\" In July 2019, a Xinjiang official claimed that the majority of those who return from the camps \"find suitable jobs that they really like, and they can earn a satisfactory living.\" Many Uyghurs living abroad say they still have not heard from missing relatives in Xinjiang. In July 2019, at the second Ministerial to Advance Religious Freedom hosted by the Department of State, Secretary of State Mike Pompeo said, \"China is home to one of the worst human rights crises of our time; it is truly the stain of the century.\" The Administration was reported to be considering sanctions under the Global Magnitsky Human Rights Accountability Act against officials in Xinjiang, but these actions reportedly were set aside during the U.S.-China bilateral trade negotiations, possibly for fear of disrupting progress. On July 8, 2019, 22 nations at the United Nations Human Rights Council (UNHRC) issued a joint statement to the UNHRC president and U.N. High Commissioner on Human Rights calling on China to \"refrain from the arbitrary detention and restrictions on freedom of movement of Uighurs, and other Muslim and minority communities in Xinjiang\" and to \"allow meaningful access to Xinjiang for independent international observers.\" On July 12, 2019, envoys from 37 countries, including over one dozen Muslim-majority countries, cosigned a counter-letter to the UNHRC in support of China's policies in Xinjiang. As of July 29, 2019, China said the number of countries signing the counter-letter had risen to 50. Hong Kong is a Special Administrative Region (SAR) of the PRC located off China's southern coast with a population of 7.5 million people, including about 85,000 U.S. citizens. Sovereignty of the former British colony reverted to the PRC on July 1, 1997, under the provisions of a 1984 international treatyâknown as the \"Joint Declaration\"ânegotiated between China and the United Kingdom. Among other things, the Joint Declaration promises Hong Kong a \"high degree of autonomy, except in foreign and defence affairs\" and pledges that Hong Kong's \"current social and economic systems\" will remain unchanged for at least 50 years. As required by the Joint Declaration, on April 4, 1990, China's National People's Congress passed the Basic Law of the Hong Kong Special Administrative Region of the People's Republic of China (Basic Law), which serves as a mini-constitution for the city. The United States-Hong Kong Policy Act of 1992 ( P.L. 102-383 , 22 U.S.C. 5701-5732) affords Hong Kong separate treatment from China in a variety of political, economic, trade, and other areas so long as the HKSAR remains \"sufficiently autonomous.\" Since June 2019, hundreds of thousands of Hong Kongers have joined large rallies and marches against proposed legal amendments that would for the first time allow extraditions to Mainland China. Chief Executive Carrie Lam Cheng Yuet-ngor suspended consideration of the amendments in response to the demonstrations in early June, but has also characterized the demonstrations as \"riots,\" and authorized the Hong Kong Police Force to use tear gas, rubber bullets, pepper spray, and truncheons to break up the protests. In response, the demonstrators have expanded their demands to include that Lam fully withdraw the amendments, drop all charges against arrested protesters, renounce her characterization of the demonstrations as \"riots,\" set up an independent commission to investigate alleged police misconduct, and implement the election of the Chief Executive and Legislative Council by universal suffrage, as promised in the Basic Law. China's state media have accused the United States of covertly instigating and directing the unrest in Hong Kong. On August 8, 2019, they circulated a photograph of a political officer at the U.S. Consulate General in Hong Kong meeting with opposition leaders at a hotel, accusing her of being \"the behind-the-scenes black hand creating chaos in Hong Kong.\" Like Chief Executive Lam, President Trump has termed the demonstrations in Hong Kong \"riots.\" The President has indicated that the situation is for China's central government and the HKSAR government to work out, has praised President Xi's handling of the Hong Kong protests, and stated that he does not see the situation in Hong Kong providing leverage in ongoing talks with China. He has also indicated, however, that \"it would be very hard to deal if they [China] do violence. I mean, if it's another Tiananmen Square, it'sâI think it's a very hard thing to do if there's violence.\" The cochairs of the Tom Lantos Human Rights Commission and other Members of Congress have called for the Trump Administration to stop U.S. sales of tear gas, pepper spray, and other riot gear to the Hong Kong Police Force. Hong Kongers have taken to the streets in large numbers twice before to protest China's alleged failure to fulfill its obligations under the Joint Declaration or to abide by the provisions of the Basic Law. On July 1, 2003, an estimated 500,000 Hong Kong residents rallied against a proposed antisedition bill that they believed would sharply curtail their rights. Large numbers of Hong Kong residents protested again beginning on September 26, 2014, against PRC restrictions on a proposal to elect the Chief Executive by universal suffrage. Those protests became known as the \"Umbrella Movement.\" U.S. policy toward Tibet is guided by the Tibetan Policy Act of 2002 ( P.L. 107-228 ), which requires the U.S. government to promote and report on dialogue between Beijing and Tibet's exiled spiritual leader, the Dalai Lama, or his representatives; to help protect Tibet's religious, cultural, and linguistic heritages; and to support development projects in Tibet. The act requires the State Department to maintain a Special Coordinator for Tibetan Issues. (The position has been vacant throughout the Trump Administration.) The act also calls on the Secretary of State to \"make best efforts\" to establish a U.S. consular office in the Tibetan capital, Lhasa; and directs U.S. officials to press for the release of Tibetan political prisoners in meetings with the Chinese government. The U.S. government and human rights groups have been critical of increasingly expansive official Chinese controls on religious life and practice in Tibetan areas of China instituted in the wake of anti-Chinese protests in 2008. Human rights groups have catalogued arbitrary detentions and disappearances; a heightened Chinese security presence within monasteries; continued \"patriotic education\" and \"legal education\" campaigns that require monks to denounce the Dalai Lama; strengthened media controls; and policies that weaken Tibetan-language education. PRC restrictions on access to Tibet for foreigners prompted Congress to pass, and the President to sign, the Reciprocal Access to Tibet Act (RATA) ( P.L. 115-330 ). Enacted in December 2018, RATA requires the Department of State to report to Congress annually regarding the level of access PRC authorities granted U.S. diplomats, journalists, and tourists to Tibetan areas in China. It also states that no individual \"substantially involved in the formulation or execution of policies related to access for foreigners to Tibetan areas\" may be granted a visa or admitted to the United States so long as restrictions on foreigners' access to Tibet remain in place. The Department of State is required to submit annually a list of PRC officials \"substantially involved\" in such policies, and to identify those whose visas were denied or revoked in the previous year. Of growing concern to human rights groups and foreign governments is China's insistence on controlling the succession process for the Dalai Lama. Now aged 84, the Dalai Lama is the 14 th in a lineage that began in the 14 th century, with each new Dalai Lama identified in childhood as the reincarnation of his predecessor. As a spokesperson for China's Foreign Ministry restated in March 2019, the PRC's position is that, \"reincarnation of living Buddhas including the Dalai Lama must comply with Chinese laws and regulations and follow religious rituals and historical conventions.\" In July 2019, a Chinese official told visiting Indian journalists that the Dalai Lama's reincarnation would be required to be found in China and approved by the central government in Beijing, adding, \"The Dalai Lama's reincarnation is not decided by his personal wish or by some group of people living in other countries.\" In 2011, however, the Dalai Lama asserted that, \"the person who reincarnates has sole legitimate authority over where and how he or she takes rebirth and how that reincarnation is to be recognized.\" China lobbies strenuously to prevent world leaders from meeting with the Dalai Lama, the 1989 Nobel Peace Prize winner and 2006 recipient of the Congressional Gold Medal. U.S. Presidents since George H. W. Bush have met with the Dalai Lama. President Trump has not so far done so. PRC methods of social and political control are evolving to include the widespread use of sophisticated surveillance and big data technologies. Chinese authorities and companies have developed and deployed tens of millions of surveillance cameras, as well as facial, voice, iris, and gait recognition equipment, to reduce crime. The government uses the same equipment to target and track the movements and internet-use of ethnic Tibetans and Uyghurs and critics of the regime. In addition, the government is developing a \"social credit system,\" involving aggregating data on companies and individuals across geographic regions and industries, and \"creating measures to incentivize 'trustworthy' conduct, and punish 'untrustworthy' conduct.\" Increasingly, Chinese companies are exporting data and surveillance technologies around the world. In April 2019, the Australian Strategic Policy Institute (ASPI), an Australian-based nonpartisan think tank, launched a public database, funded by the U.S. Department of State, mapping the overseas activities of a dozen leading Chinese technology companies. Among other projects, it shows Chinese firms involved in installing 5G networks in 34 countries and deploying so-called \"safe cities\" surveillance technologies in 46 countries. In an October 2018 report partly funded by the U.S. Department of State, independent research and advocacy organization Freedom House identified 38 countries in which Chinese companies had installed internet and mobile networking equipment, 18 countries that had deployed intelligent monitoring systems and facial recognition developed by Chinese companies, and 36 countries in which media elites and government officials had traveled to China for trainings on new media or information management. The same report, Freedom on the Net 2018 , ranked China last in internet and digital media freedom of 65 countries tracked, just ahead of Iran, Syria, and Ethiopia, the fourth year China held that position in Freedom House's rankings. When the Carter Administration established diplomatic relations with the PRC on January 1, 1979, it terminated formal diplomatic ties with self-ruled Taiwan, over which the PRC claims sovereignty. In joint communiques with China signed in 1978 and 1982, the United States stated that it \"acknowledges the Chinese position that there is but one China and Taiwan is part of China,\" but did not state its own position on Taiwan's status. Under the U.S. \"one-China\" policy, the United States maintains only unofficial relations with Taiwan, while upholding the 1979 Taiwan Relations Act ( P.L. 96-8 ), which provides a legal basis for the unofficial relationship and includes commitments related to Taiwan's security. The PRC frequently reminds the United States that, for Beijing, \"The Taiwan question is the most important and sensitive one in China-US relations.\" Beijing is particularly wary of U.S. moves that the PRC sees as introducing \"officiality\" into the U.S.-Taiwan relationship, and regularly protests U.S. legislation supporting Taiwan, U.S. arms sales to Taiwan, and U.S. Navy transits of the Taiwan Strait. (The U.S. Navy conducted seven such transits between January and August 2019.) The United States objects to PRC efforts to isolate Taiwan internationally and to the PRC's real and implied threats of force against Taiwan, including bomber, fighter, and surveillance aircraft patrols around and near the island. After initially questioning the U.S. \"one-China\" policy after his November 2016 election victory, President Trump used a February 9, 2017, telephone call with President Xi to recommit the United States to it. The Trump Administration's NSS states that the United States \"will maintain our strong ties with Taiwan in accordance with our 'One China' policy, including our commitments under the Taiwan Relations Act to provide for Taiwan's legitimate defense needs and deter coercion.\" Trump Administration language on Taiwan has evolved since 2017. DOD's June 2019 Indo-Pacific Strategy Report discusses Taiwan without referencing the U.S. \"one-China\" policy. In a first for a high-profile U.S. government report in the era of unofficial relations, it also refers to Taiwan as a \"country.\" The strategy presents Taiwan, along with Singapore, New Zealand, and Mongolia, as Indo-Pacific democracies that are \"reliable, capable, and natural partners of the United States.\" The document asserts that, \"The United States has a vital interest in upholding the rules-based international order, which includes a strong, prosperous, and democratic Taiwan.\" In 2018, the 115 th Congress passed and President Trump signed the Taiwan Travel Act ( P.L. 115-135 ), stating that it should be U.S. policy to allow U.S. officials at all levels, \"including Cabinet-level national security officials, general officers, and other executive branch officials,\" to travel to Taiwan for meetings with counterparts, and to allow high-level Taiwan officials to enter the United States under respectful conditions to meet with U.S. officials, \"including officials from the Department of State and the Department of Defense and other Cabinet agencies.\" In May 2019, the United States hosted a meeting between the U.S. and Taiwan National Security Advisors, the first such meeting publicly disclosed since the United States broke diplomatic relations with Taiwan in 1979. In July 2019, the Trump Administration allowed Taiwan President Tsai Ing-wen to make high-profile \"transit\" visits through New York City and Denver, CO, on her way to and from visiting diplomatic allies in the Caribbean. Each visit spanned three days. The New York City transit included a brief closed-door speech at Columbia University, a walk in Central Park, and an event at Taiwan's representative office for the U.N. representatives of Taiwan's diplomatic partners. Since 1995, U.S. policy has allowed Taiwan presidents to visit the United States only on transit visits through the United States on their way to other locations. The Trump Administration has notified Congress of 11 Taiwan FMS cases on five separate dates. The combined value of the 11 FMS cases is about $11.76 billion. (See Table 7 .) On July 12, 2019, in apparent response to Tsai's visit to New York City and the Administration's July 8, 2019, arms sale notification, China's Ambassador to the United States, Cui Tiankai, wrote on Twitter, \"Taiwan is part of China. No attempts to split China will ever succeed. Those who play with fire will only get themselves burned. Period.\" In response to the Administration's August 20, 2019, notification of the proposed sale of F-16C/D Block 70 fighter planes to Taiwan, Chinese Foreign Ministry spokesperson Geng Shuang said China might sanction U.S. companies, stating, \"China will take every necessary measure to safeguard its interests, including sanctioning American companies involved in the arms sale this time.\" Both China and the United States are parties to the 1992 United Nations Framework Convention on Climate Change (UNFCCC), the objective of which is to stabilize human-induced climate change. The two countries are widely viewed as having pivotal roles to play in efforts to achieve that goal as they are, respectively, the first- and second-ranking contributors to global greenhouse gas (GHG) emissions. While China emits more than twice as much carbon dioxide (CO 2 , the major human-related GHG) as the United States, comparing the nations' levels of effort to address their GHG emissions can be complicated. For example, while China emits more CO 2 to produce a unit of GDP (its \"energy intensity\"), China has reduced and continues to reduce its energy intensity more rapidly due to structural changes and policies. The United States is one of the highest global emitters of GHG per person, at twice China's rates, due in large part to higher incomes and rates of consumption. Some U.S. consumption results in GHG emissions from manufacturing in China. China's emissions per person have been rising with incomes and consumption; its total emissions may continue to rise with incomes and the size of its economy. Under current policies, U.S. emissions may remain largely flat through the 2020s and could grow from the 2030s. China has pledged that its emissions will peak before 2030. Under current projections and pledges, it is unclear whether China's GHG emissions will grow, remain stable, or decline toward the \"net zero\" emissions that would be required to stabilize human-induced climate change. China has set ambitious targets for expanding its supply of energy from non-GHG-emitting sources, improving energy efficiency, and reducing air pollution coemitted with GHG. In this decade, China's efforts have demonstrated measurable effects in reducing the penetration of coal use, energy intensity, and air pollution. Policies in place would not likely reduce GHG emissions toward near-zero, however. The United States and China have cooperated on environmental and energy projects for several decades. Although U.S. policy attention to the two countries' Clean Energy Cooperation program has declined, joint research continues on Carbon Capture and Storage (CCS) technologies, energy efficiency, vehicles, water-energy, and nuclear energy. China is developing a national GHG cap and emissions trading system, building on programs in seven regions of the country, but has delayed its target start date several timesâcurrently to 2020. The future of U.S.-China relations with regard to climate change is unclear. China appears to have maintained or increased its leadership under the UNFCCC's 2015 Paris Agreement, a framework for cooperatively addressing climate change through coming decades. The U.S. government has indicated its intention to withdraw from the agreement when it becomes eligible to do so in November 2020. Neither government has produced long-term national-level policies and plans to address its country's GHG emissions or to adapt to expected climate changes. Given the size of their economies and their investments in advancing key technologies, the United States' and China's roles in assisting less-developed countries to address climate change could be important for minimizing long-term global costs. An ongoing source of friction in the U.S.-China relationship is the PRC's alleged violations of the Vienna Consular Convention and the 1980 U.S.-China Bilateral Consular Convention in its handling of U.S. citizens. One such apparent violation is China's use of exit bans \"to prevent U.S. citizens who are not themselves suspected of a crime from leaving China as a means to pressure their relatives or associates who are wanted by Chinese law enforcement in the United States,\" according to the U.S. mission in China. The mission states that PRC authorities \"also arbitrarily detain and interrogate U.S. citizens for reasons related to 'state security'\" and subject U.S. citizens \"to overly lengthy pre-trial detention in substandard conditions while investigations are ongoing.\" Separately, the United States government is seeking China's cooperation in issuing travel documents to PRC nationals whom the United States seeks to repatriate to China. The U.S. mission in China states that as of July 10, 2018, the U.S. government was awaiting travel documents for approximately 2,200 PRC nationals with criminal convictions who were not in Immigration and Customs Enforcement (ICE) custody, and another 139 PRC nationals who were in ICE custody with removal orders. According to the U.S. mission in China, \"The Chinese government consistently refuses to issue travel documents to an overwhelming majority of these individuals.\" According to provisional data from the U.S. Centers for Disease Control and Prevention, synthetic opioids, primarily fentanyl, accounted for more than 31,000 U.S. drug overdose deaths in 2018. The Drug Enforcement Administration (DEA) states, \"Clandestinely produced fentanyl is trafficked into the United States primarily from China and Mexico, and is responsible for the ongoing fentanyl epidemic.\" Responding to pressure from the Trump Administration, China on May 1, 2019, added all fentanyl-related substances to a controlled substances list, the \"Supplementary List of Controlled Narcotic Drugs and Psychotropic Substances with Non-Medical Use.\" Li Yuejin, Deputy Director of China's National Narcotics Control Commission, presented the move as \"an important manifestation of China's participation in the global control of illicit drugs and the maintenance of international security and stability.\" He also said it was \"based on the painful lesson from the United States.\" In April 2019, the DEA welcomed the announcement of China's plan to control all fentanyl substances, saying, \"This significant development will eliminate Chinese drug traffickers' ability to alter fentanyl compounds to get around the law.\" On August 1, 2019, however, President Trump criticized China's record, saying of President Xi, \"He said he was going to stop fentanyl from coming into our countryâit's all coming out of China; he didn't do that. We're losing thousands of people to fentanyl.\" A spokesperson for China's Foreign Ministry responded, \"The root cause of the fentanyl issue in the United States does not lie with China. To solve the problem, the United States should look harder for the cause at home.\" The spokesperson's comments appeared to refer to China's position that the U.S. opioid epidemic is being driven by U.S. demand, rather than by Chinese supply. In the 116 th Congress, more than 150 bills and resolutions have been introduced with provisions related to China. For details, see Table 8 below. A major vehicle for legislation related to China is the annual National Defense Authorization Act. As of early August 2019, the National Defense Authorization Act for FY2020 is engrossed in the House of Representatives and the Senate ( H.R. 2500 and S. 1790 ). Table 9 , Table 10 , Table 11 , and Table 12 identify provisions in the two bills that explicitly reference China, as well as several provisions potentially related or relevant to China.", "summary": "The United States and the People's Republic of China (PRC or China) are involved in a prolonged stand-off over trade and in competition that is spilling from political and military areas into a growing number of other spheres, including technology, finance, and education, severely straining ties on the 40 th anniversary of the two countries' establishment of diplomatic relations. The two lead the world in the size of their economies, their defense budgets, and their global greenhouse gas emissions. Both countries are permanent members of the United Nations (U.N.) Security Council. In 2018, they were each other's largest trading partners. During the Trump Administration, competition has dominated the relationship and areas of cooperation have shrunk. The 2017 National Security Strategy (NSS) describes both China and Russia as seeking to \"challenge American power, influence, and interests, attempting to erode American security and prosperity.\" To pressure China to change its economic practices, the United States has imposed tariffs on hundreds of billions of dollars of U.S. imports from China, with almost all imports from China scheduled to be subject to additional tariffs by December 15, 2019. U.S. tariffs and China's retaliatory tariffs have reordered global supply chains and hit U.S. farmers and manufacturers particularly hard. Twelve rounds of negotiations have not resolved the dispute. On August 5, 2019, the U.S. Treasury Department labeled China a currency manipulator for the first time in a quarter century. The Administration has placed restrictions on the ability of U.S. firms to supply PRC telecommunications giant Huawei. The United States has also sought to warn other nations away from business dealings with Huawei and from cooperation with China on infrastructure projects under the framework of China's Belt and Road Initiative (BRI). Many analysts ascribe the rising friction in the relationship today not only to the arguably more confrontational inclinations of the Trump Administration, but also to more assertive behavior by China under President Xi Jinping. Xi assumed the top posts in the Communist Party of China in November 2012 and added the state presidency in March 2013. Later in 2013, China began building military outposts in the South China Sea and Xi launched BRI, an ambitious effort to boost economic connectivityâand China's influenceâacross the globe. In 2015, China began enacting a suite of national security legislation that shrank the space for independent thought and civil society, subjected ordinary citizens to stepped-up surveillance, and imposed onerous conditions on foreign firms operating in China. The same year, China launched its \"Made in China 2025\" plan, seeking to reduce China's reliance on foreign technology and directing the considerable resources of the state toward supporting the development of \"national champion\" Chinese firms in 10 strategic industries. In 2017, at the end of his first five-year term in his Party posts, Xi tasked China's military with turning itself into a \"world-class\" force by mid-century. Also in 2017, his government began forcing more than 1 million of his Turkic Muslim fellow citizens in the northwest region of Xinjiang into reeducation camps. Increasingly, the United States and China appear to be seeking to draw other countries into competing campsâthose who agree to sign (often vague) BRI cooperation agreements with China (some 125 countries as of April 2019, by China's count), and those who, at the U.S. government's behest, do not; those who do business with Huawei, and those who, similarly at the U.S. government's behest, do not; those who publicly censure China for its actions in Xinjiang, and those who offer support. U.S. allies are sometimes in China's \"camp.\" China represents \"a new kind of challenge,\" Secretary of State Michael R. Pompeo has suggested, because \"It's an authoritarian regime that's integrated economically into the West in ways the Soviet Union never was.\" Important areas of remaining U.S.-China cooperation include maintaining pressure on North Korea to curb its nuclear weapons and missile programs; supporting the Afghanistan peace process; managing international public health challenges, from tuberculosis to influenza; and stemming the flow into the United States of China-produced fentanyl, a class of deadly synthetic opioids.", "document_type": "crs"}
{"report": "This report provides background information and potential issues for Congress for three types of large unmanned vehicles (UVs) that the Navy wants to develop and procure in FY2021 and beyond: Large Unmanned Surface Vehicles (LUSVs); Medium Unmanned Surface Vehicles (MUSVs); and Extra-large Unmanned Undersea Vehicles (XLUUVs). The Navy wants to acquire these large UVs as part of an effort to shift the Navy to a new fleet architecture (i.e., a new combination of ships and other platforms) that is more widely distributed than the Navy's current fleet architecture. The Navy is requesting $579.9 million in FY2021 research and development funding for these large UVs and their enabling technologies. The issue for Congress is whether to approve, reject, or modify the Navy's acquisition strategies and FY2021 funding requests for these large UVs. The Navy's proposals for developing and procuring them pose a number of oversight issues for Congress. Congress's decisions on these issues could substantially affect Navy capabilities and funding requirements and the shipbuilding and UV industrial bases. In addition to the large UVs covered in this report, the Navy also wants to develop and procure smaller USVs and UUVs, as well as unmanned aerial vehicles (UAVs) of various sizes. Other U.S. military services are developing, procuring, and operating their own types of UVs. Separate CRS reports address some of these efforts. UVs are one of several new capabilitiesâalong with directed-energy weapons, hypersonic weapons, artificial intelligence, and cyber capabilitiesâthat the Navy says it is pursuing to meet emerging military challenges, particularly from China. UVs can be equipped with sensors, weapons, or other payloads, and can be operated remotely, semi-autonomously, or (with technological advancements) autonomously. They can be individually less expensive to procure than manned ships and aircraft because their designs do not need to incorporate spaces and support equipment for onboard human operators. UVs can be particularly suitable for long-duration missions that might tax the physical endurance of onboard human operators, or missions that pose a high risk of injury, death, or capture of onboard human operators. Consequently UVs are sometimes said to be particularly suitable for so-called \"three D\" missions, meaning missions that are \"dull, dirty, or dangerous.\" The Navy has been developing and experimenting with various types of UVs for many years, and has transitioned some of these efforts (particularly those for UAVs) into procurement programs. The Department of the Navy states, for example, that its inventory of 4,094 aircraft at the end of FY2019 included 99 UAVs, that its projected inventory of 3,912 aircraft at the end of FY2020 will include 45 UVs, and that its projected inventory of 4,075 aircraft at the end of FY2021 will include 57 UVs. Even so, some observers have occasionally expressed dissatisfaction with what they view as the Navy's slow pace in transitioning UV development efforts into programs for procuring UVs in quantity and integrating them into the operational fleet. As shown in Figure 1 and Figure 2 , the Navy organizes its USV acquisition programs into four size-based categories that the Navy calls large, medium, small, and very small, and its UUV acquisition programs similarly into four size-based categories that the Navy calls extra-large, large, medium, and small. The large UVs discussed in this CRS report fall into the top two USV categories in Figure 1 and the top UUV category in Figure 2 . The smaller UVs shown in the other categories of Figure 1 and Figure 2 , which are not covered in this report, can be deployed from manned Navy ships and submarines to extend the operational reach of those ships and submarines. The large UVs covered in this CRS report, in contrast, are more likely to be deployed directly from pier to perform missions that might otherwise be assigned to manned ships and submarines. Because the large UVs covered in this report can be deployed directly from pier to perform missions that might otherwise be assigned to manned ships and submarines, some observers have a raised a question as to whether the large UVs covered in this report should be included in the top-level count of the number of ships in the Navy. Navy officials state that they have not yet decided whether to modify the top-level count of the number of ships in the Navy to include these large UVs. The Navy wants to acquire the large UVs covered in this report as part of an effort to shift the Navy to a new fleet architecture that is more widely distributed than the Navy's current architecture. Compared to the current fleet architecture, this more distributed architecture is to include proportionately fewer large surface combatants (or LSCs, meaning cruisers and destroyers), proportionately more small surface combatants (or SSCs, meaning frigates and Littoral Combat Ships), and the addition of significant numbers of large UVs. Figure 3 provides, for the surface combatant portion of the Navy, a conceptual comparison of the current fleet architecture (shown on the left as the \"ship centric force\") and the new, more distributed architecture (shown on the right as the \"distributed/nodal force\"). The figure does not depict the entire surface combatant fleet, but rather a representative portion of it. In the figure, each sphere represents a manned ship or USV. (Since the illustration focuses on the surface combatant force, it does not include UUVs.) As shown in the color coding, under both the current fleet architecture and the more distributed architecture, the manned ships (i.e., the LSCs and SSCs) are equipped with a combination of sensors (green), command and control (C2) equipment (red), and payloads other than sensors and C2 equipment, meaning principally weapons (blue). Under the more distributed architecture, the manned ships would be on average smaller (because a greater share of them would be SSCs), and this would be possible because some of the surface combatant force's weapons and sensors would be shifted from the manned ships to USVs, with weapon-equipped LUSVs acting as adjunct weapon magazines and sensor-equipped MUSVs contributing to the fleet's sensor network. As shown in Figure 3 , under the Navy's current surface combatant force architecture, there are to be 20 LSCs for every 10 SSCs (i.e., a 2:1 ratio of LSCs to SSCs), with no significant contribution from LUSVs and MUSVs. This is consistent with the Navy's current force-level objective, which calls for achieving a 355-ship fleet that includes 104 LSCs and 52 SSCs (a 2:1 ratio). Under the more distributed architecture, the ratio of LSCs to SSCs would be reversed, with 10 LSCs for every 20 SSCs (a 1:2 ratio), and there would also now be 30 LUSVs and 40 MUSVs. A January 15, 2019, press report states The Navy plans to spend this year taking the first few steps into a markedly different future, which, if it comes to pass, will upend how the fleet has fought since the Cold War. And it all starts with something that might seem counterintuitive: It's looking to get smaller. \"Today, I have a requirement for 104 large surface combatants in the force structure assessment; [and] I have [a requirement for] 52 small surface combatants,\" said Surface Warfare Director Rear Adm. Ronald Boxall. \"That's a little upside down. Should I push out here and have more small platforms? I think the future fleet architecture study has intimated 'yes,' and our war gaming shows there is value in that.\" Another way of summarizing Figure 3 would be to say that the surface combatant force architecture (reading vertically down the figure) would change from 20+10+0+0 (i.e., a total of 30 surface combatant platforms, all manned, and a platform ratio of 2-1-0-0) for a given portion of the surface combatant force, to 10+20+30+40 (i.e., a total of 100 surface combatant platforms, 70 of which would be LUSVs and MUSVs, and a platform ration of 1-2-3-4) for a given portion of the surface combatant force. The Navy refers to the more distributed architecture's combination of LSCs, SSCs, LUSVs, and MUSVs as the Future Surface Combatant Force (FSCF). Figure 3 is conceptual, so the platform ratios for the more distributed architecture should be understood as notional or approximate rather than exact. The point of the figure is not that relative platform numbers under the more distributed architecture would change to the exact ratios shown in the figure, but that they would evolve over time toward something broadly resembling those ratios. Some observers have long urged the Navy to shift to a more distributed fleet architecture, on the grounds that the Navy's current architectureâwhich concentrates much of the fleet's capability into a relatively limited number of individually larger and more expensive surface shipsâis increasingly vulnerable to attack by the improving maritime anti-access/area-denial (A2/AD) capabilities (particularly anti-ship missiles and their supporting detection and targeting systems) of potential adversaries, particularly China. Shifting to a more distributed architecture, these observers have argued, would complicate an adversary's targeting challenge by presenting the adversary with a larger number of Navy units to detect, identify, and track; reduce the loss in aggregate Navy capability that would result from the destruction of an individual Navy platform; give U.S. leaders the option of deploying USVs and UUVs in wartime to sea locations that would be tactically advantageous but too risky for manned ships; and increase the modularity and reconfigurability of the fleet for adapting to changing mission needs. For a number of years, Navy leaders acknowledged the views of those observers but continued to support the current fleet architecture. More recently, however, Navy have shifted their thinking, with comments from Navy officials like the one quoted above and Navy briefing slides like Figure 3 indicating that Navy leaders now support moving the fleet to a more distributed architecture. The views of Navy leaders appear to have shifted in favor of a more distributed architecture because they now appear to believe that such an architecture will be increasingly neededâas the observers have long arguedâto respond effectively to the improving maritime A2/AD capabilities of other countries, particularly China; technically feasible as a result of advances in technologies for UVs and for networking widely distributed maritime forces that include significant numbers of UVs; and no more expensive, and possibly less expensive, than the current architecture. The more distributed architecture that Navy leaders now appear to support may differ in its details from distributed architectures that the observers have been advocating, but the general idea of shifting to a more distributed architecture, and of using large UVs as a principal means of achieving that, appears to be similar. The Navy's FY2020 30-year shipbuilding plan mentions a new overarching operational concept for the Navy (i.e., a new general concept for how to employ Navy forces) called Distributed Maritime Operations (DMO). A December 2018 document from the Chief of Naval Operations states that the Navy will \"continue to mature the Distributed Maritime Operations (DMO) concept and key supporting concepts\" and \"design and implement a comprehensive operational architecture to support DMO.\" While Navy officials have provided few details in public about DMO, the Navy does state in its FY2021 budget submission that \"MUSV and LUSV are key enablers of the Navy's Distributed Maritime Operations (DMO) concept, which includes being able to forward deploy and team with individual manned combatants or augment battle groups. Fielding of MUSV and LUSV will provide the Navy increased capability and necessary capacity at lower procurement and sustainment costs, reduced risk to sailors and increased readiness by offloading missions from manned combatants.\" The Navy wants to employ accelerated acquisition strategies for procuring large UVs, so as to get them into service more quickly. The Navy's desire to employ these accelerated acquisition strategies can be viewed as an expression of the urgency that the Navy attaches to fielding large UVs for meeting future military challenges from countries such as China. The LUSV and MUSV programs are building on USV development work done by the Strategic Capabilities Office (SCO) within the Office of the Secretary of Defense (OSD). SCO's effort to develop USVs is called Ghost Fleet, and its LUSV development effort within Ghost Fleet is called Overlord. As shown in Figure 4 , the Navy has identified five key enabling groups of technologies for its USV and UUV programs. Given limitations on underwater communications (most radio-frequency electromagnetic waves do not travel far underwater), technologies for autonomous operations (such as artificial intelligence) will be particularly important for the XLUUV program (and other UUV programs). In May 2019, the Navy established a surface development squadron to help develop operational concepts for LUSVs and MUSVs. The squadron will initially consist of a Zumwalt (DDG-1000) class destroyer and one Sea Hunter prototype medium displacement USV ( Figure 5 ). A second Sea Hunter prototype will reportedly be added around the end of FY2020, and LUSVs and MUSVs will then be added as they become available. The Navy envisions LUSVs as being 200 feet to 300 feet in length and having full load displacements of 1,000 tons to 2,000 tons, which would make them the size of a corvette. Figure 6 shows a detail from a Navy briefing slide showing images of prototype LUSVs and silhouettes of a notional LUSV and a notional MUSV. In unclassified presentations on the program, the Navy has used images of offshore support ships used by the oil and gas industry to illustrate the kinds of ships that might be used as the basis for LUSVs. The Navy wants LUSVs to be low-cost, high-endurance, reconfigurable ships based on commercial ship designs, with ample capacity for carrying various modular payloadsâparticularly anti-surface warfare (ASuW) and strike payloads, meaning principally anti-ship and land-attack missiles. The Navy wants LUSVs to be capable of operating with human operators in the loop, or semi-autonomously (with human operators on the loop), or fully autonomously, and to be capable of operating either independently or in conjunction with manned surface combatants. Although referred to as UVs, LUSVs might be more accurately described as optionally or lightly manned ships, because they might sometimes have a few onboard crew members, particularly in the nearer term as the Navy works out LUSV enabling technologies and operational concepts. LUSVs are to feature both built-in capabilities and an ability to accept modular payloads, and are to use existing Navy sensors and weapon launchers. In marking up the Navy's proposed FY2020 budget, some of the congressional defense committees expressed concerns over whether the Navy's accelerated acquisition strategies provided enough time to adequately develop concepts of operations and key technologies for large UVs, particularly the LUSV. In its report ( S.Rept. 116-48 of June 11, 2019) on the FY2020 National Defense Authorization Act ( S. 1790 ), the Senate Armed Services Committee stated: The committee is concerned that the budget request's concurrent approach to LUSV design, technology development, and integration as well as a limited understanding of the LUSV concept of employment, requirements, and reliability for envisioned missions pose excessive acquisition risk for additional LUSV procurement in fiscal year 2020. The committee is also concerned by the unclear policy implications of LUSVs, including ill-defined international unmanned surface vessel standards and the legal status of armed or potentially armed LUSVs. Additionally, the committee notes that the Navy's \"Report to Congress on the Annual Long-Range Plan for Construction of Naval Vessels for Fiscal Year 2020\" acknowledges similar issues: \"Unmanned and optionally-manned systems are not accounted for in the overall battle force[.] ... The physical challenges of extended operations at sea across the spectrum of competition and conflict, the concepts of operations for these platforms, and the policy challenges associated with employing deadly force from autonomous vehicles must be well understood prior to replacing accountable battle force ships.\" The committee believes that further procurement of LUSVs should occur only after the lessons learned from the current SCO initiative have been incorporated into the next solicitation to enable incremental risk reduction. In addition, the committee believes that the LUSV program, which appears likely to exceed the Major Defense Acquisition Program cost threshold, would benefit from a more rigorous requirements definition process, analysis of alternatives, and deliberate acquisition strategy. S.Rept. 116-48 also stated: While recognizing the need for prototypes to reduce acquisition risk, the committee is concerned that the acquisition strategies for the Large USV, Medium USV, Orca UUV, and Snakehead UUV could lead to procurement of an excessive number of systems before the Navy is able to determine if the USVs and UUVs meet operational needs. Therefore, the committee directs the Secretary of the Navy to submit a report to the congressional defense committees, not later than November 1, 2019, that provides acquisition roadmaps for the Large USV, Medium USV, Orca UUV, and Snakehead UUV. In its report ( S.Rept. 116-103 of September 12, 2019) on the FY2020 DOD Appropriations Act ( S. 2474 ), the Senate Appropriations Committee stated that the Committee is concerned that for several unmanned programs the Navy is pursuing acquisition strategies that would limit future competitive opportunities by awarding system-level prototypes early in the acquisition process and failing to articulate capability, requirements or technology roadmaps to encourage industrial innovation. The Assistant Secretary of the Navy (Research, Development and Acquisition) is directed to submit to the congressional defense committees with the fiscal year 2021 President's budget request such acquisition roadmaps for each unmanned acquisition program that include no less than mission requirements, program requirements for each increment, key technologies, acquisition strategies, test strategies, sub-system and system-level prototyping plans, and cost estimates. S.Rept. 116-103 also stated The Committee fully supports additional investments in unmanned and autonomous technologies, systems and sub-systems, including surface and sub-surface vessels. However, the Committee is concerned with the proposed acquisition and funding strategies for the MUSV and LUSV in this budget request, to include the Future Years Defense Program. Therefore, the Committee recommends several adjustments, as detailed elsewhere in this report, and directs the Assistant Secretary of the Navy (Research, Development and Acquisition) to review the acquisition strategies for these programs to address congressional concerns, as appropriately balanced with warfighter needs. (Page 194) The explanatory statement for the final version of the FY2020 DOD Appropriations Act (Division A of H.R. 1158 / P.L. 116-93 of December 20, 2020) stated: The Secretary of the Navy is directed to comply with the full funding policy for LUSVs in future budget submissions. Further, the agreement recommends $50,000,000 for the design of future LUSVs without a vertical launch system [VLS] capability in fiscal year 2020. Incremental upgrade capability for a vertical launch system may be addressed in future fiscal years. It is directed that no funds may be awarded for the conceptual design of future LUSVs until the Assistant Secretary of the Navy (Research, Development and Acquisition) briefs the congressional defense committees on the updated acquisition strategy for unmanned surface vessels. In response to the markups from the congressional defense committees, the Navy's FY2021 budget submission proposes to modify the acquisition strategy for the LUSV program so as to provide more time for developing operational concepts and key technologies before entering into serial production of deployable units. Under the Navy's proposed modified LUSV acquisition strategy, the Navy is proposing to use research and development funding to acquire two additional prototypes in FY2021 and one more additional prototype in FY2022 before shifting in FY2023 to the use of procurement funding for the procurement of deployable LUSVs at annual procurement rates in FY2023-FY2025 of 2-2-3. The Navy's FY2021 budget submission states: Major changes [in the LUSV program] from [the] FY 2020 President's Budget request to [the] FY 2021 President's Budget request [include the following]: (1) The program will award Conceptual Design (CD) contracts to multiple vendors in FY20. The CD effort will support refinement of a LUSV Performance Specification that does not include the Vertical Launch System (VLS). The final Performance Specification will define a LUSV with reservations in the design to support integration of a variety of capabilities and payloads. This effort, which was originally planned to award in Q2 [the second quarter of] FY 2020 will be delayed until early Q4 [the fourth quarter of] FY 2020 in order to support amendment of the CD Request for Proposals (RFP), Performance Specification, and associated artifacts. (2) The delay in award of the LUSV CD effort will delay follow-on activities (RFP [Request for Proposals], [and] source selection) leading up to the award of the LUSV Detail Design and Construction (DD&C) contract. DD&C award will be delayed one year, from FY 2021 to FY 2022. The DD&C award will deliver a non-VLS LUSV prototype based on the Performance Specification developed during the CD effort. (3) In lieu of the FY 2020 President's Budget request plan of awarding the LUSV DD&C contract in FY21, the Navy is planning to procure up to two additional Overlord prototypes, building on the lessons learned through the Ghost Fleet program and advances in C4I and combat system prototyping efforts. (4) The Navy plans to transition LUSV to a program of record in FY 2023 and align [the program's] procurement funding to the Shipbuilding and Conversion, Navy (SCN) account. A January 13, 2020, press report stated that the Navy plans to submit a report on the Navy's concepts of operations for LUSVs and MUSVs in April 2020. The Navy defines MUSVs as being 45 feet to 190 feet long, with displacements of roughly 500 tons. The Navy wants MUSVs, like LUSVs, to be low-cost, high-endurance, reconfigurable ships that can accommodate various payloads. Initial payloads for MUSVs are to be intelligence, surveillance and reconnaissance (ISR) payloads and electronic warfare (EW) systems. The Navy is pursuing the MUSV program as a rapid prototyping effort under what is known as Section 804 middle tier acquisition authority. The first MUSV prototype was funded in FY2019 and the Navy wants fund the second prototype in FY2023. The MUSV program is building on development work by the Defense Advanced Research Projects Agency (DARPA) under its Anti-Submarine Warfare Continuous Trail Unmanned Vessel (ACTUV) effort and the Office of Naval Research (ONR) under its Medium Displacement USV effort. As shown in Figure 1 , this work led to the design, construction, and testing of the prototype Sea Hunter medium displacement USV, which has a reported length of 132 feet (about 40.2 meters) and a displacement of about 140 tons. The Navy's MUSV program is also to employ a fleet-ready command and control (C2) solution for USVs that was developed by the Strategic Capabilities Office for the LUSV program. The XLUUV program, also known as the Orca program, was established to address a Joint Emergent Operational Need (JEON). As shown in Figure 2 , the Navy defines XLUUVs as UUVs with a diameter of more than 84 inches, meaning that XLUUVs are to be too large to be launched from a manned Navy submarine. Consequently, XLUUVs instead will transported to a forward operating port and then launched from pier. The Navy wants XLUUVs to be equipped with a modular payload bay for carrying mines and other payloads. The first five XLUUVs were funded in FY2019 through the Navy's research and development appropriation account. The Navy conducted a competition for the design of the XLUUV, and announced on February 13, 2019, that it had selected Boeing to fabricate, test, and deliver the first four Orca XLUUVs and associated support elements. (The other bidder was a team led by Lockheed Martin.) On March 27, 2019, the Navy announced that the award to Boeing had been expanded to include the fifth Orca. Boeing has partnered with the Technical Solutions division of Huntington Ingalls Industries (HII) to build Orca XLUUVs. (A separate division of HIIâNewport News Shipbuilding (NNS) of Newport News, VAâis one of the Navy's two submarine builders.) The Navy wants procure additional XLUUVs at a rate of two per year starting in FY2023. The Navy's FY2021 budget submission does not include funding for the procurement of additional XLUUVs in FY2021 or FY2022. The Navy is proposing to fund the procurement of XLUUVs in FY2023 and subsequent years through the Other Procurement, Navy (OPN) appropriation account. Boeing's Orca XLUUV design will be informed by (but likely differ in certain respects from) the design of Boeing's Echo Voyager UUV ( Figure 7 , Figure 8 , and Figure 9 ). Echo Voyager is 51 feet long and has a rectangular cross section of 8.5 feet by 8.5 feet, a weight in the air of 50 tons, and a range of up to 6,500 nautical miles. It can accommodate a modular payload section up to 34 feet in length, increasing its length to as much as 85 feet. A 34-foot modular payload section provides about 2,000 cubic feet of internal payload volume; a shorter (14-foot) section provides about 900 cubic feet. Echo Voyager can also accommodate external payloads. Table 1 shows FY2021-FY2025 requested and programmed funding for the large UV programs covered in this report. The Navy's proposals for developing and procuring the large UVs covered in this report pose a number of oversight issues for Congress, including those discussed below. One potential oversight issue for Congress concerns the analytical basis for the Navy's desire to shift to a more distributed fleet architecture featuring a significant contribution from large UVs. Potential oversight questions for Congress include the following: What Navy analyses led to the Navy's decision to shift toward a more distributed architecture? What did these analyses show regarding the relative costs, capabilities, and risks of the Navy's current architecture and the more distributed architecture? How well developed, and how well tested, are the operational concepts associated with the more distributed architecture? Another potential oversight issue for Congress concerns the accelerated acquisition strategies that the Navy wants to use for these large UV programs. Potential oversight questions for Congress include the following: What are the potential costs, benefits, and risks of pursuing these accelerated strategies rather than a more traditional acquisition approach that would spend more time developing the technologies and operational concepts for these UVs prior to putting them into serial production? How are those considerations affected by the shift in the international security environment from the post-Cold War era to the new era of renewed major power competition? Are the Navy's proposed changes to the LUSV's accelerated acquisition strategy appropriate and sufficient? To what degree, if any, can these large UV programs contribute to new approaches for defense acquisition that are intended to respond to the new international security environment? Another potential oversight issue for Congress concerns the amount of technical, schedule, and cost risk in these programs. Potential oversight questions for Congress include the following: How much risk of this kind do these programs pose, particularly given the enabling technologies that need to be developed for them? In addition to the Navy's proposed changes to the LUSV's acquisition strategy, what is the Navy doing to mitigate or manage cost, schedule, and technical risks while it seeks to deploy these UVs on an accelerated acquisition timeline? Are these risk-mitigation and risk-management efforts appropriate and sufficient? At what point would technical problems, schedule delays, or cost growth in these programs require a reassessment of the Navy's plan to shift from the current fleet architecture to a more distributed architecture? Another oversight issue for Congress concerns the Navy's planned annual procurement rates for the LUSV and XLUUV programs during the period FY2021-FY2025. Potential oversight questions for Congress include, What factors did the Navy consider in arriving at them, and in light of these factors, are these rates too high, too low, or about right? Another oversight issue for Congress concerns the potential industrial base implications of these large UV programs as part of a shift to a more distributed fleet architecture, particularly since UVs like these can be built and maintained by facilities other than the shipyards that currently build the Navy's major combatant ships. Potential oversight questions for Congress include the following: What implications would the more distributed architecture have for required numbers, annual procurement rates, and maintenance workloads for large surface combatants (i.e., cruisers and destroyers) and small surface combatants (i.e., frigates and Littoral Combat Ships)? What portion of these UVs might be built or maintained by facilities other than shipyards that currently build the Navy's major combatant ships? To what degree, if any, might the more distributed architecture and these large UV programs change the current distribution of Navy shipbuilding and maintenance work, and what implications might that have for workloads and employment levels at various production and maintenance facilities? Another oversight issue for Congress concerns the potential implications of large UVs, particularly large USVs, for the chance of miscalculation or escalation in when U.S. Navy forces are operating in waters near potential adversaries. Some observers have expressed concern about this issue. A June 28, 2019, opinion column, for example, states The immediate danger from militarized artificial intelligence isn't hordes of killer robots, nor the exponential pace of a new arms race. As recent events in the Strait of Hormuz indicate, the bigger risk is the fact that autonomous military craft make for temping targetsâand increase the potential for miscalculation on and above the high seas. While less provocative than planes, vehicles, or ships with human crew or troops aboard, unmanned systems are also perceived as relatively expendable. Danger arises when they lower the threshold for military action. It is a development with serious implications in volatile regions far beyond the Gulfânot least the South China Sea, where the U.S. has recently confronted both China and Russiaâ¦. As autonomous systems proliferate in the air and on the ocean, [opposing] military commanders may feel emboldened to strike these platforms, expecting lower repercussions by avoiding the loss of human life. Consider when Chinese naval personnel in a small boat seized an unmanned American underwater survey glider in the sea approximately 100 kilometers off the Philippines in December 2016. The winged, torpedo-shaped unit was within sight of its handlers aboard the U.S. Navy oceanographic vessel Bowditch, who gaped in astonishment as it was summarily hoisted aboard a Chinese warship less than a kilometer distant. The U.S. responded with a diplomatic demarche and congressional opprobrium, and the glider was returned within the weekâ¦. In coming years, the Chinese military will find increasingly plentiful opportunities to intercept American autonomous systems. The 40-meter prototype trimaran Sea Hunter, an experimental submarine-tracking vessel, recently transited between Hawaii and San Diego without human intervention. It has yet to be used operationally, but it is only a matter of time before such vessels are deployedâ¦. China's navy may find intercepting such unmanned and unchaperoned surface vessels or mini-submarines too tantalizing to pass up, especially if Washington's meek retort to the 2016 glider incident is seen as an indication of American permissiveness or timidity. With a captive vessel, persevering Chinese technicians could attempt to bypass anti-tamper mechanisms, and if successful, proceed to siphon off communication codes or proprietary artificial intelligence software, download navigational data or pre-programmed rules of engagement, or probe for cyber vulnerabilities that could be exploited against similar vehiclesâ¦. Nearly 100,000 ships transit the strategically vital Singapore Strait annually, where more than 75 collisions or groundings occurred last year alone. In such congested international sea lanes, declaring a foreign navy's autonomous vessel wayward or unresponsive would easily serve as convenient rationale for towing it into territorial waters for impoundment, or for boarding it straightawayâ¦. A memorandum of understanding signed five years ago by the U.S. Department of Defense and the Chinese defense ministry, as well as the collaborative code of naval conduct created at the 2014 Western Pacific Naval Symposium, should be updated with an expanded right-of-way hierarchy and non-interference standards to clarify how manned ships and aircraft should interact with their autonomous counterparts. Without such guidance, the risk of miscalculation increases. An incident without any immediate human presence or losses could nonetheless trigger unexpected escalation and spark the next conflict. Another oversight issue for Congress concerns the potential personnel implications of incorporating a significant number of large UVs into the Navy's fleet architecture. Potential questions for Congress include the following: What implications might these large UVs have for the required skills, training, and career paths of Navy personnel? Within the Navy, what will be the relationship between personnel who crew manned ships and those who operate these large UVs? Another oversight issue for Congress concerns the funding amounts for these programs that the Navy has requested for these programs for FY2021. Potential oversight questions for Congress include the following: Has the Navy accurately priced the work on these programs that it is proposing to do in FY2021? To what degree, if any, has funding been requested ahead of need? To what degree, if any, is the Navy insufficiently funding elements of the work to be done in FY2021? How might the timelines for these programs be affected by a decision to reduce (or add to) the Navy's requested amounts for these programs? Table 2 summarizes congressional action on the Navy's FY2021 funding request for the LUSV, MUSV, and XLUUV programs and their enabling technologies.", "summary": "The Navy in FY2021 and beyond wants to develop and procure three types of large unmanned vehicles (UVs). These large UVs are called Large Unmanned Surface Vehicles (LUSVs), Medium Unmanned Surface Vehicles (MUSVs), and Extra-Large Unmanned Undersea Vehicles (XLUUVs). The Navy is requesting $579.9 million in FY2021 research and development funding for these large UVs and their enabling technologies. The Navy wants to acquire these large UVs as part of an effort to shift the Navy to a more distributed fleet architecture. Compared to the current fleet architecture, this more distributed architecture is to include proportionately fewer large surface combatants (i.e., cruisers and destroyers), proportionately more small surface combatants (i.e., frigates and Littoral Combat Ships), and the addition of significant numbers of large UVs. The Navy wants to employ accelerated acquisition strategies for procuring these large UVs, so as to get them into service more quickly. The Navy's desire to employ these accelerated acquisition strategies can be viewed as an expression of the urgency that the Navy attaches to fielding large UVs for meeting future military challenges from countries such as China. The Navy envisions LUSVs as being 200 feet to 300 feet in length and having full load displacements of 1,000 tons to 2,000 tons. The Navy wants LUSVs to be low-cost, high-endurance, reconfigurable ships based on commercial ship designs, with ample capacity for carrying various modular payloadsâparticularly anti-surface warfare (ASuW) and strike payloads, meaning principally anti-ship and land-attack missiles. Although referred to as UVs, LUSVs might be more accurately described as optionally or lightly manned ships, because they might sometimes have a few onboard crew members, particularly in the nearer term as the Navy works out LUSV enabling technologies and operational concepts. In marking up the Navy's proposed FY2020 budget, some of the congressional defense committees expressed concerns over whether the Navy's accelerated acquisition strategies provided enough time to adequately develop concepts of operations and key technologies for these large UVs, particularly the LUSV. In response, the Navy's FY2021 budget submission proposes to modify the acquisition strategy for the LUSV program so as to provide more time for developing operational concepts and key technologies before entering into serial production of deployable units. Under the Navy's proposed modified LUSV acquisition strategy, the Navy is proposing to use research and development funding to acquire two additional prototypes in FY2021 and one more additional prototype in FY2022 before shifting in FY2023 to the use of procurement funding for the procurement of deployable LUSVs at annual procurement rates in FY2023-FY2025 of 2-2-3. The Navy defines MUSVs as being 45 feet to 190 feet long, with displacements of roughly 500 tons. The Navy wants MUSVs, like LUSVs, to be low-cost, high-endurance, reconfigurable ships that can accommodate various payloads. Initial payloads for MUSVs are to be intelligence, surveillance and reconnaissance (ISR) payloads and electronic warfare (EW) systems. The Navy is pursuing the MUSV program as a rapid prototyping effort under what is known as Section 804 acquisition authority. The first MUSV prototype was funded in FY2019 and the Navy wants fund the second prototype in FY2023. The first five XLUUVs were funded in FY2019; they are being built by Boeing. The Navy wants procure additional XLUUVs at a rate of two per year starting in FY2023. The Navy's FY2021 budget submission does not include funding for the procurement of additional XLUUVs in FY2021 or FY2022. The Navy's large UV programs pose a number of oversight issues for Congress, including issues relating to the analytical basis for the more distributed fleet architecture; the Navy's accelerated acquisition strategies for these programs; technical, schedule, and cost risk in the programs; the proposed annual procurement rates for the programs; the industrial base implications of the programs; potential implications for miscalculation or escalation at sea; the personnel implications of the programs; and whether the Navy has accurately priced the work it is proposing to do in FY2021 on the programs.", "document_type": "crs"}
{"report": "This report provides an overview of the FY2020 National Defense Authorization Act ( H.R. 2500 , S. 1790 , P.L. 116-92 ) and serves as a portal to other CRS products providing additional context, detail, and analysis concerning particular aspects of that legislation. Enacted annually to cover every defense budget since FY1962, the NDAA authorizes funding for the Department of Defense (DOD) activities at the same level of detail at which budget authority is provided by the corresponding defense, military construction, and other appropriations bills. While the NDAA does not provide budget authority, historically it has provided a fairly reliable indicator of congressional sentiment on funding for particular programs. The bill also incorporates provisions of law governing military compensation, the DOD acquisition process, and aspects of DOD policy toward other countries, among other subjects. Of the $761.8 billion requested by the Trump Administration for National Defense-related activities in FY2020, $750.0 billion is discretionary spending, of which approximately $741.9 billion falls within the scope of the annual NDAA. This includes $718.4 billion for DOD operations and $23.2 billion for defense-related work by the Energy Department involving nuclear energy, mostly related to nuclear weapons and nuclear power plants for warships. Other funding for defense-related activities, such as counter-intelligence work of the Federal Bureau of Investigation (FBI), falls mostly under the jurisdiction of other congressional committees. (See Figure 1 .) The following overview reviews the strategic and budgetary context within which Congress debated the FY2020 NDAA. Subsequent sections of the report summarize the bill's treatment of major components of the Trump Administration's FY2020 budget request as well as provisions attached to the final bill that deal with other issues. As enacted, the FY2020 NDAA authorizes a total of $729.9 billion for national defense-related activities, which is $12.0 billion (1.6%) less than the Administration requested. The request included $568.1 billion to be designated as base budget funds to cover the routine, recurring costs to man, train, and operate U.S. forces. The request also included an additional $173.8 billion to be designated as Overseas Contingency Operations (OCO) funds to cover costs associated with the aftermath of the terrorist attacks of September 11, 2001, and other activities. OCO-designated funds are exempt from the binding caps on defense spending set by the Budget Control Act of 2011 ( P.L. 112-25 ) and the Administration's request included $97.7 billion to be designated as OCO funding but intended to pay base budget expenses. ( Table 1 .) The Senate Armed Services Committee reported its version of the FY2020 NDAA ( S. 1790 , S.Rept. 116-48 ) on June 11, 2019 and the Senate passed the bill on June 27, 2019. The House Armed Services Committee (HASC) reported its version ( H.R. 2500 , H.Rept. 116-120 ) on June 19, 2019 and the House passed the bill on July 12, 2019. On September 17, 2019, the House took up the Senate-passed S. 1790 , amended it by eliminating the Senate-passed provisions and replacing them with the provisions of the House-passed H.R. 2500 , and then passed the amended bill by voice vote. House and Senate conferees worked to produce a conference version of S. 1790 . The conference report ( H.Rept. 116-333 ) was agreed to by the House on December 11, 2019 by a vote of 377-48 and agreed to by the Senate on December 17, 2019 by a vote of 86-8. ( Table 2 .) According to the Administration, the FY2020 budget request for DOD reflects a shift in strategic emphasis based on the 2018 National Defense Strategy (NDS), which called for \"increased and sustained investment\" to counter evolving threats from China and Russia. This would mark a change from the focus of U.S. national security policy for nearly the past three decades and a renewed emphasis on competition between nuclear-armed superpowers, which had been the cornerstone of U.S. strategy for more than four decades after the end of World War II. During the Cold War, U.S. national security policy and the design of the U.S. military establishment were strategically focused on competing with the Union of Soviet Socialist Republics and containing the global spread of communism. In the years following the collapse of the Soviet Union, U.S. policies were designedâand U.S. forces were trained and equippedâlargely with a focus on dealing with potential regional aggressors such as Iraq, Iran, and North Korea and on recalibrating relations with China and Russia. After the terrorist attacks of September 11, 2001, U.S. national security policy and DOD planning focused largely on countering terrorism and insurgencies in the Middle East while containing, if not reversing, North Korean and Iranian nuclear weapons programs. However, as a legacy of the Cold War, U.S. and allied military forces had overwhelming military superiority over these adversaries and, accordingly, operations were conducted in relatively permissive environments. The 2014 Russian invasion of the Crimean peninsula and subsequent proxy war in eastern Ukraine fostered a renewed concern in the United States and Europe about an aggressive and revanchist regime in Moscow. Meanwhile, China began building and militarizing islands in the South China Sea in order to lay claim to key shipping lanes. Together, these events highlighted anew the salience in the U.S. national security agenda of dealing with other great powers , that is, states able and willing to use military force unilaterally to accomplish their objectives. At the same time, the challenges that had surfaced at the end of the Cold Warâfragile states, genocide, terrorism, and nuclear proliferation, to name a fewâremained serious threats to U.S. interests. In some cases, adversaries appear to be collaborating to achieve shared or compatible objectives and to take advantage of social and economic tools to advance their agendas. Some states are also collaborating with non-state proxies (including, but not limited to, militias, criminal networks, corporations, and hackers) and deliberately blurring the lines between conventional and irregular conflict and between civilian and military activities. In this complex security environment, it is arguably more difficult than in past eras to manage these myriad problems. The Trump Administration's December 2017 National Security Strategy (NSS), the 11-page unclassified summary of the January 2018 National Defense Strategy (NDS), and the 2019 National Intelligence Strategy explicitly reorient U.S. national security strategy (including defense strategy) toward a primary focus on great power competition with China and Russia and on countering their military capabilities. In addition to explicitly making the great power competition the primary U.S. national security concern, the NDS also argues for a focus on bolstering the competitive advantage of U.S. forces, which, the document contends, has eroded in recent decades vis-Ã -vis the Chinese and Russian threats. The NDS also maintains that, contrary to what was the case for most of the years since the end of the Cold War, U.S. forces now must assume that their ability to approach military objectives will be vigorously contested. The Trump Administration's strategic orientation as laid out in the NSS and NDA is consistent with the strategy outlined in comparable documents issued by prior Administrations, in identifying five significant external threats to U.S. interests: China, Russia, North Korea, Iran, and terrorist groups with global reach. In a break from previous Administrations, however, the NDS views retaining the U.S. strategic competitive edge relative to China and Russia as a higher priority than countering violent extremist organizations. Accordingly, the new orientation for U.S. strategy is sometimes referred to a \" 2+3 \" strategy, meaning a strategy for countering two primary challenges (China and Russia) and three additional challenges (North Korea, Iran, and terrorist groups). In the four decades since the end of U.S. military involvement in Vietnam, annual outlays by the federal government have increased by a factor of nine. The fastest growing segment of federal spending during that period has been mandatory spending for entitlement programs such as Social Security, Medicare, and Medicaid. (See Figure 2 .) The Budget Control Act (BCA) of 2011 (P.L. 112-25) was intended to reduce spending by $2.1 trillion over the period FY2012-FY2021, compared to projected spending over that period. One element of the act established binding annual limits (or caps) to reduce discretionary federal spending through FY2021 by $1.0 trillion. Separate annual caps on discretionary appropriations for defense-related activities and nondefense activities are enforced by a mechanism called sequestration . Sequestration provides for the automatic cancellation of previous appropriations, to reduce discretionary spending to the BCA cap for the year in question. The caps on defense-related spending apply to discretionary funding for DOD and for defense-related activities of other agencies, comprising the national defense budget function which is designated budget function 050 . Compliance with the BCA defense caps would have required DOD to reduce its planned spending by tens of billions of dollars per year through FY2021. Congress repeatedly has raised the annual spending caps to reduce their impact on projected spending. Nevertheless, the defense cap in effect when the Trump Administration submitted its FY2020 budget request was $576 billionâ$97.9 billion less than the Administration requested for base budget spending. To avoid breaking that cap, the Administration designated as OCO funding a total of $97.9 billion to fund base budget activities. In marking up their respective versions of the FY2020 NDAA, the Armed Services Committees of the House and Senate each treated those funds as part of the base budget. The issue became moot after the defense spending cap was raised by the Bipartisan Budget Act of 2019 (P.L. 116-37), enacted on August 2, 2019. The total FY2020 DOD requestâincluding both base budget and OCO fundingâcontinued an upswing that began with the FY2016 budget, which marked the end of a relatively steady decline in real (that is, inflation-adjusted) DOD purchasing power. Measured in constant dollars, DOD funding peaked in FY2010, after which the drawdown of U.S. troops in OCO operations drove a reduction in DOD spending. ( Figure 3 .) The enacted version of the FY2020 NDAA â like the House and Senate versions of the bill -- approves the Administration's proposal for a relatively modest net increase in the number of active-duty military personnel. It also authorizes the Administration's proposed reduction in the end-strength of the Selected Reserveâthose members of the military reserve components and the National Guard who are organized into operational units that routinely drill, usually on a monthly basis. ( Ta b le 3 .) Section 609 of the enacted FY2020 NDAA authorizes a 3.1% increase in military basic pay, as was requested by the Administration. It is the same increase that would have occurred if neither Congress nor the President had taken any action on the subject. By law, military personnel receive an annual increase in basic pay that is indexed to the annual increase in the Labor Department's Employment Cost Index (ECI) unless either (1) Congress passes a law to provide otherwise; or (2) the President specifies an alternative pay adjustment. The initial Senate version of the NDAA was silent regarding the pay raise. The initial House version of the bill would have: Mandated a 3.1% raise (Section 606); and Authorized the same 3.1% raise, even if the President had specified a different increase (Section 607). This provision was not included in the final version of the bill. Following the death of a servicemember, certain beneficiaries may be eligible for survivor benefits from both DOD (under the Survivors Benefit Program or SBP) and the Department of Veterans Affairs (under the Dependency and Indemnity Compensation or DIC). However, by law, surviving spouses who receive both annuities must have their SBP payments reduced by the amount of DIC they receive. Critics refer to this offset as aÂ  widows' tax . Section 622 of the enacted version of the FY2020 NDAA phases out the DIC offset requirement over a period of three years. Section 630A of the initial House-passed version would have repealed the offset, outright. The initial Senate-passed version was silent on the issue. A DOD policy adopted on April 12, 2019, prohibits entry into military service of any person who identifies as transgender. The policy allows transgender individuals to apply for a waiver of that prohibition. The enacted version of the bill does not challenge the Administration's policy. However, Section 596 of the NDAA conference report requires DOD to report on the number of requested waivers to the transgender ban that have been denied. Section 596 of the House-passed version of the bill would have established a similar reporting requirement. Section 530B of the House-passed version of the bill, which was not included in the conference report, would have nullified the transgender ban, extending to gender identity the same legal protection against discrimination that current law provides for race and sex. The Senate version of the NDAA contained no provisions relevant to this issue. Section 731 of the NDAA conference report authorizes the Secretary of Defense to pay a claim for the death or personal injury of a servicemember resulting from medical malpractice by a DOD health care provider. This addresses a legal doctrine rooted in the Supreme Court's 1950 ruling, in the case of Feres v. United States , that the federal government is immunized from liability \"for injuries to servicemen where the injuries arise out of or are in the course of activity incident to service.\" Many lower federal courts have concluded that this principle, known as the Feres doctrine, generally prohibits military servicemembers from asserting malpractice claims against the United States based on the negligent actions of health care providers employed by the military. Section 729 of the House version of the NDAA bill would have overturned the Feres doctrine by amending the Federal Tort Claims Act to allow servicemembers to pursue tort claims against the United States for medical malpractice committed by health care provider in a Military Treatment Facility (MTF). The Senate bill had no provision covering this subject. In general, the conference report on the FY2020 NDAA supported the Trump Administration's budget request for nuclear and other long-range strike weapons. This program continues an across the board modernization of the nuclear triad: ballistic missile-launching submarines, long-range bombers, and intercontinental ballistic missiles (ICBMs). However, the Trump program also included proposals to diversify the arsenal of nuclear weapons that the triad might deliver. The conference report did not include provisions of the House version of the bill that would have limited some of those efforts. The NDAA conference report authorizes $29.6 million requested to deploy on some Trident II submarine-launched missiles nuclear warheads with significantly less explosive power than those now in service. According to unclassified sources, each of the several W-76 warheads currently carried by a single Trident II currently has an explosive power (or yield) approximately equal to that of 100 thousand tons of TNT (100 kilotons). The intended yield of the new \"low-yield\" warhead is reported to be about 10 kilotons. The atomic weapons detonated at Hiroshima and Nagasaki were roughly 15 kilotons and 20 kilotons, respectively. As requested, the enacted NDAA authorizes $10 million in the Energy Department's national security budget to modify existing warheads and $19.6 million to install them in deployed missiles. The Trump Administration contends that a low-yield warhead would discourage potential adversaries from thinking that, if they used relatively small nuclear weapons in a regional conflict, the United States would shrink from retaliating (or threatening to respond) if the only nuclear weapons at its disposal were the considerably more destructive warheads currently in the U.S. arsenal. Critics of the proposal contend that deployment of new, low-yield weapons could increase the risk of nuclear war by making it easier for U.S. officials to consider their use in a limited conflict. The House bill would have denied all funds requested for the program and included a provision (Section 1646) that would have barred the use of any funds for this purpose. A floor amendment to strike this provision was rejected by the House on a near-party-line vote of 201-221. The provision was not included in the enacted bill. As enacted, the FY2020 NDAA authorizes more than 97% of the $682.4 million requested to develop a fleet of new ICBMs to replace the 400 Minuteman missiles currently deployed in silos located in Montana, North Dakota, and Wyoming. This total includes $552.4 million of the $570.4 million requested to continue development of the new missile, designated the Ground Based Strategic Defense (GBSD). It also includes, in the Energy Department's national security budget, $112.0 million â the entire amount requested -- to develop a new warhead (designated W87-1) to equip the new missile, in lieu of the W78 warhead carried by the Minuteman. Section 1672 of the enacted bill prohibits any reduction in the number of deployed U.S. ICBMs, currently 400 missiles. The Senate version of the bill would have authorized $22 million more than was requested for GBSD. Section 1664 of the Senate bill would have prohibited any reduction in the number of ICBMs The House bill would have imposed a reduction of $140.0 million on the $682.4 million request for R&D related to a new ICBMâa cut of about 20%. This included a net reduction of $81.0 million for GBSD and a reduction of $59.0 million for the warhead. The House rejected by a vote of 164-264 an amendment to the House version of the bill that would have delayed the GBSD program and required an independent study of options to extend the service life of the currently deployed Minuteman missiles. The NDAA conference report authorizes $712.4 million as requested to continue expanding the Energy Department's capacity for manufacturing so-called plutonium pits â the nuclear triggers that initiate the explosion of a thermonuclear bomb or missile warhead. This includes $241.1 million to begin construction of a new pit production facility at the Energy Department's Savannah River Site, near Aiken, GA. The new facility would put the Energy Department on track to meet a goal of being able to produce 80 pits per year by 2030, a goal set the by Trump Administration in 2018. The House bill would have denied authorization of the $241.1 million requested for the Savanah River facility. Section 3114 of the House bill would have repealed a provision of law that codifies the 80 pit per year goal. In general, the NDAA conference report support's the Administration requests to expand the U.S. arsenal of guided missiles that could accurately strike targets at ranges of 100 miles and more with conventional (that is, nonnuclear) warheads. ( Table 5 .) As U.S. strategy has focused more sharply on Russia and China as potential adversaries, DOD has placed increasing emphasis on developing such weapons, partly because those two countries are developing defenses intended to keep U.S. forces at a distance. The enacted version of the FY2020 NDAA authorizes the bulk of the Administration's $14.1 billion request for National Security Space operations, which includes funds for DOD's satellite acquisition, space launches, and other space-oriented activities. The requested amount is 17% higher than the amount appropriated for these activities in FY2019âa rate of increase more than triple the Administration's proposed 4.9% increase in the overall DOD budget. The final bill authorizes most of the funds requested for DOD's most expensive acquisition programs for space systems, as the House and Senate versions would have done. (See Table 6 .) As proposed by the Administration, the FY2020 NDAA establishes the U.S. Space Force as a separate armed service within the Department of the Air Force (a status analogous to that of the Marine Corps as a separate service within the Department of the Navy). The bill authorizes $72.4 million, as requested, to fund operation of the new organization. The new organization is to be headed by a four-star general (designated Chief of Space Operations) who is to report directly to the Secretary of the Air Force. After one year, that officer is to become a member of the Joint Chiefs of Staff (JCS), in which capacity he or she may provide advice to the President, without going through the Air Force chain of command, after first informing the Secretary of Defense and the Chairman of the Joint Chiefs of Staff. Similarly, as a member of the JCS, the Chief of Space Operations may make recommendations to Congress, after informing the Secretary of Defense. The enacted NDAA authorizes the Secretary of the Air Force to transfer into the new organization all military personnel currently assigned to the Air Force Space Command and other Air Force military personnel. The Administration had proposed transferring into the Space Force personnel currently assigned to all of DOD's space-oriented organizations. The earlier House and Senate versions of the FY2020 NDAA each would have approved some elements of the proposed consolidation, though neither bill would have afforded the new space organization the degree of bureaucratic independence that the Administration proposed. The Senate bill would have authorized the requested $72.4 million for a Space Force within the Air Force to be overseen by a less senior civilian political appointee (an assistant secretary rather than an undersecretary). The House bill would have authorized $15.0 million for the new organization, which would have been designated a Space Corps and which would have had no civilian political overseer. The enacted FY2020 NDAA approves the broad thrusts â and most of the detailsâ of the Administration's FY2020 anti-missile defense budget request. The request reflected the results of the Administration's Missile Defense Review, published in January 2019. That study reaffirmed ongoing DOD efforts to (1) expand and improve a network of interceptor missiles that could protect U.S. territory against a relatively small number of intercontinental ballistic missiles (ICBMs) and (2) deploy systems to defense U.S. allies and U.S. forces stationed abroad against attack by missiles of shorter range. ( Table 7 .) Many of the enacted bill's differences with the budget request were linked to delays in the development of a more reliable warhead, designated the Redesigned Kill Vehicle (RKV), to be carried by the homeland defense system's interceptor missiles. On August 21, 2019, after the House and Senate each had passed their respective versions of the FY2020 NDAA, DOD cancelled the RKV project. The enacted bill authorizes a total of $602.7 million of the $843.8 million requested to develop an improved missile defense for U.S. territory that would include a new interceptor missile carrying the planned new warhead (RKV). The largest component of the net reduction from the request is a transfer of $140.0 million, associated with the RKV project, to develop improvements to the currently deployed homeland defense system. The bill also authorizes $173.4 million ($101.0 less than requested) for development work on a new radar to be located in Hawaii. The House bill would have authorized $150.0 million less than requested for development of the new interceptor. The Senate bill would have authorized the amount requested. The enacted bill authorizes a total of $53.8 million, distributed over several funding lines, to test the Navy's Standard missile against an ICBM. The Standard, which is part of the Navy's Aegis anti-missile system, was designed to intercept missiles of shorter range than ICBMs. However, new versions of the Standard theoretically would be capable of ICBM intercepts. Section 1680 of the FY2018 NDAA ( P.L. 115-91 ) directed DOD to conduct a test of Aegis against an ICBM-range target. The House version of the bill would have eliminated the planned ICBM intercept test of Aegis, authorizing $12.1 million of the amount requested. The Army presented its FY2020 budget request for weapons acquisition as \"a bold shift\" intended to place greater emphasis on shaping the force to deal with potential threats from Russia and China, as called for by the Administration's FY2018 National Defense Strategy. Compared with the five-year defense plan (FYDP) that had accompanied the Army's FY2019 budget request, the FY2020 FYDP would reduce previously planned spending for many systems currently in production to make funds available for accelerated development of successor weapons, better adapted to the newly emphasized \"peer competitors.\" The enacted version of the FY2020 NDAA largely supported the Army's revised spending plans for ground combat vehicles, anti-aircraft defenses, and long-range precision strike weapons. The versions passed initially by the House and Senate would have done likewise. (See Table 8 .) The Army's modernization plan would reconstitute the service's short-range anti-aircraft defenses which had atrophied after the Soviet Union collapsed and DOD focused on counter-terrorism and related missions in the aftermath of 9/11. In this period, the Patriot missileâdesigned in the 1970s to intercept aircraftâwas adapted to intercept long-range ballistic missiles as the shortest-range component of a layered defense. Since the turn of the century, DOD has focused more attention on other types of aerial threats which (because of their relatively short range or for other reasons) would challenge or thwart existing U.S. anti-missile/anti-aircraft defenses. These threats include unguided, short-range rockets and mortar shells used by insurgents; swarms of relatively small, armed drone aircraft; and technologically sophisticated cruise missiles, such as are deployed by Russia and China. The conference report on the bill â like the House and Senate versions â generally support this renewed focus on anti-aircraft defense, which includes: M-SHORAD (Maneuver-Short Range Air Defense), a variant of the Stryker combat vehicle equipped with and array of guns and guided missiles to protect maneuvering combat units against aerial threats; and IFPC (Indirect Fire Protection Capability), an array of sensors, missile launchers and various types of missiles to protect fixed sites. The Navy's $23.8 billion shipbuilding budget request for FY2020 reflects a 2016 plan to increase the size of the fleet to 355 ships, a target some 15% higher than the force goal set by the previous Navy plan. The enacted version of the FY2020 NDAA â like the versions of the bill passed by the House and the Senate â generally supports the Navy program. The House-passed bill would have cut a total of $1.6 billion from the shipbuilding request, most of which the House Armed Services Committee justified as reflecting \"excess cost growth.\" (See Table 9 .) As enacted, the NDAA authorized the $2.35 billion requested for construction of two nuclear-powered aircraft carriers. The funding will be split between two carriersâcosting roughly $12 billion apieceâfor which a contract was signed in January 2019. One of the ships is slated for delivery to the Navy in 2028 and the other in 2032. As a general rule, Congress requires DOD to budget for the entire cost of any weapon in a single year, with limited exceptions. However, in the case of certain high-priced items, such as carriers, Congress allows DOD to use incremental funding âspreading the cost of a ship or other item across the budgets of several fiscal years. The enacted FY2020 NDAA would rein in spending on the Navy's plan to speed development of several types of relatively large, unmanned surface ships and submarines that could supplement the current force by distributing its firepower and sensor network across a larger number of platforms. The FY2020 budget request includes a total of $628.8 million to develop these items, of which more than halfâ$372.5 millionâis to jump-start the acquisition of Large Unmanned Surface Vehicles (LUSVs), based on commercial ship designs and able to carry modular payloads including various types of anti-ship and land attack missiles. Reportedly, the Navy envisions LUSVs as being as long as 300 feet in length and displacing 2,000 tons, in which case they would be roughly half the size of the Perry -class missile frigates the Navy used in the 1980s and 1990s. The conference report on the FY2020 NDAA authorizes the full amounts requested to develop a smaller unmanned surface vessel (designated MUSV) and a relatively large robot submarine with a payload volume of up to 2,000 cubic feet. However, it authorizes $196.5 millionâslightly more than half the requestâfor the LUSV project, funding one of the two vessels requested. The joint explanatory statement accompanying the conference report on the bill did not discuss conferees' rationale for the cut. The Senate Armed Services Committee, in its report on the original, Senate-passed version of the bill had questioned the Navy's plan to develop and procure these ships on an accelerated schedule, given their technological and operational novelty. The FY2020 budget request sought to fund the procurement of 385 aircraft across the military services; this is 71 aircraft more than the total included in the projected FY2020 budget request published in early 2018. Generally speaking, the enacted version of the bill, like the versions passed earlier by the House and Senate -- authorizes the Administration's requests, subject to relatively minor additions and reductions reflecting routine congressional oversight. One major departure from the request is an increase in the number of F-35 Joint Strike Fighters authorized. To construct a barrier along the U.S.-Mexican border, which Congress has not explicitly authorized as military construction, the Trump Administration used various budget transfer and reprogramming authorities to make available a total of $6.1 billion comprising DOD program savings and unobligated funds from prior fiscal years. In addition, its FY2020 budget request sought $7.2 billion in barrier-related military construction funding, of which $3.6 billion would replenish prior year funds that were transferred to barrier construction and $3.6 billion that would fund new barrier construction in FY2020. The enacted version of the FY2020 NDAA reduces from $8.0 billion (in FY2019) to $5.5 billion the total amount of DOD funding that could be transferred. It authorizes none of the $7.2 billion request in connection with the border barrier project. The Senate bill would have reduced transfer authority by a smaller amount, the House bill by a larger amount. In addition, Sections 1046 and 2801 of the House bill would have prohibited the use of defense funds appropriated between FY2015 and FY2020 for barrier construction. ( Table 11 .) PFAS (per- and polyfluoroalkyl substances) are a large, diverse group of fluorinated compounds that have been used for several decades in numerous commercial, industrial, and U.S. military applications including use as an ingredient in aqueous film forming foam (AFFF) for extinguishing petroleum-based liquid fuel fires. Releases of certain PFAS have been detected in drinking water sources, other environmental media, and dairy milk at various locations, some of which have been associated with the use of AFFF at U.S. military installations. The House and Senate versions of the FY2020 NDAA each contained multiple provisions related to PFAS that would require DOD, the U.S. Environmental Protection Agency, and other agencies to address potential risks of these chemicals under existing laws or new authorities. The conference agreement includes PFAS provisions related to drinking water and agricultural water sources, reporting of releases on the Toxics Release Inventory, data calls and significant new use notices under the Toxic Substances Control Act, environmental remediation at active and decommissioned U.S. military installations and National Guard facilities, DOD use and disposal of AFFF, and other purposes. The conference agreement does not include provisions regarding PFAS standards under the Clean Water Act or Safe Drinking Water Act, or liability for PFAS releases under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA often referred to as \"Superfund\"). Sections 1121-1126 of the initial House-passed bill would have provided 12 weeks of paid leave to federal government employees covered by Title V, Chapter 63 of the U.S. Code for reasons covered by the Family and Medical Leave Act of 1993 (FMLA), as amended ( P.L. 103-3 ). That legislation provides entitlement for such leave in the event of the employee's own serious health condition and certain family-related situations including the birth, adoption, or fostering of a child; the serious illness of certain family members; and military family needs. The bill would have permitted the Office of Personnel Management to increase the amount of such paid leave to a total of 16 weeks. The same paid leave entitlement would have been provided to Legislative Branch employees covered by the Congressional Accountability Act (CAA) of 1995. Conforming amendments would have been included to extend benefits to Government Accountability Office (GAO) employees and certain TSA employees. The initial Senate-passed bill included no provision related to this subject. Sections 7601-7606 of the enacted version of the bill entitle federal employees (as described above) to 12 weeks of paid parental leave in connection with the birth, adoption, or fostering of a child. Federal civil service employees must meet the FMLA 12-months-of-service requirements before becoming eligible for the paid parental leave benefit; by contrast the FMLA eligibility requirements for Legislative Branch employees covered by the CAA and for GAO employees do not apply to the paid parental leave benefit. In addition, use of the paid parental leave benefit by federal civil service employees is conditioned upon an agreement from the employee that he or she will return to work for the employing agency for 12 workweeks following the conclusion of that leave. Should an employee fail to do so and if certain conditions enumerated in the bill do not apply, the employing agency may recoup its contributions to the employee's health care premiums made during the period of leave. No such requirement is provided for Legislative Branch employees covered by the CAA nor for GAO employees. Following, in numerical order, are CRS products cited in this report, including those cited in tables by only their reference number: CRS Reports CRS Report RS20643, Navy Ford (CVN-78) Class Aircraft Carrier Program: Background and Issues for Congress , by Ronald O'Rourke CRS Report RL30563, F-35 Joint Strike Fighter (JSF) Program , by Jeremiah Gertler CRS Report RL32109, Navy DDG-51 and DDG-1000 Destroyer Programs: Background and Issues for Congress , by Ronald O'Rourke CRS Report RL32418, Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress , by Ronald O'Rourke CRS Report RL32665, Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress , by Ronald O'Rourke CRS Report RL33640, U.S. Strategic Nuclear Forces: Background, Developments, and Issues , by Amy F. Woolf CRS Report RL33745, Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress , by Ronald O'Rourke CRS Report R41129, Navy Columbia (SSBN-826) Class Ballistic Missile Submarine Program: Background and Issues for Congress , by Ronald O'Rourke CRS Report R41909, Multiyear Procurement (MYP) and Block Buy Contracting in Defense Acquisition: Background and Issues for Congress , by Ronald O'Rourke CRS Report R42972, Sequestration as a Budget Enforcement Process: Frequently Asked Questions , by Megan S. Lynch CRS Report R43049, U.S. Air Force Bomber Sustainment and Modernization: Background and Issues for Congress , by Jeremiah Gertler CRS Report R43240, The Army's Armored Multi-Purpose Vehicle (AMPV): Background and Issues for Congress , by Andrew Feickert CRS Report R43543, Navy LPD-17 Flight II and LHA Amphibious Ship Programs: Background and Issues for Congress , by Ronald O'Rourke CRS Report R43546, Navy John Lewis (TAO-205) Class Oiler Shipbuilding Program: Background and Issues for Congress , by Ronald O'Rourke CRS Report R43838, Renewed Great Power Competition: Implications for DefenseâIssues for Congress , by Ronald O'Rourke CRS Report R44039, The Defense Budget and the Budget Control Act: Frequently Asked Questions , by Brendan W. McGarry CRS Report R44274, The Family and Medical Leave Act: An Overview of Title I , by Sarah A. Donovan CRS Report R44442, Energy and Water Development Appropriations: Nuclear Weapons Activities , by Amy F. Woolf CRS Report R44463, Air Force B-21 Raider Long-Range Strike Bomber , by Jeremiah Gertler CRS Report R44835, Paid Family Leave in the United States , by Sarah A. Donovan CRS Report R44891, U.S. Role in the World: Background and Issues for Congress , by Ronald O'Rourke and Michael Moodie CRS Report R44968, Infantry Brigade Combat Team (IBCT) Mobility, Reconnaissance, and Firepower Programs , by Andrew Feickert CRS Report R44972, Navy Frigate (FFG[X]) Program: Background and Issues for Congress , by Ronald O'Rourke CRS Report R45349, The 2018 National Defense Strategy: Fact Sheet , by Kathleen J. McInnis CRS Report R45519, The Army's Optionally Manned Fighting Vehicle (OMFV) Program: Background and Issues for Congress , by Andrew Feickert CRS Report R45757, Navy Large Unmanned Surface and Undersea Vehicles: Background and Issues for Congress , by Ronald O'Rourke CRS Report R45793, PFAS and Drinking Water: Selected EPA and Congressional Actions , by Elena H. Humphreys and Mary Tiemann CRS Report R45937, Military Funding for Southwest Border Barriers , by Christopher T. Mann CRS Report R45986, Federal Role in Responding to Potential Risks of Per- and Polyfluoroalkyl Substances (PFAS) , coordinated by David M. Bearden CRS Report R45996, Precision-Guided Munitions: Background and Issues for Congress , by John R. Hoehn CRS Report R45998, Contaminants of Emerging Concern under the Clean Water Act , by Laura Gatz CRS Report R46107, FY2020 National Defense Authorization Act: Selected Military Personnel Issues , coordinated by Bryce H. P. Mendez CRS In Focus CRS In Focus IF10541, Defense Primer: Ballistic Missile Defense , by Stephen M. McCall CRS In Focus IF10999, Defense's 30-Year Aircraft Plan Reveals New Details , by Jeremiah Gertler CRS In Focus IF11102, Military Medical Malpractice and the Feres Doctrine , by Bryce H. P. Mendez and Kevin M. Lewis CRS In Focus IF11143, A Low-Yield, Submarine-Launched Nuclear Warhead: Overview of the Expert Debate , by Amy F. Woolf CRS In Focus IF11203, Proposed Civilian Personnel System Supporting \"Space Force , \" by Alan Ott CRS In Focus IF11219, Regulating Drinking Water Contaminants: EPA PFAS Actions , by Mary Tiemann and Elena H. Humphreys CRS In Focus IF11244, FY2020 National Security Space Budget Request: An Overview , by Stephen M. McCall and Brendan W. McGarry CRS In Focus IF11326, Military Space Reform: FY2020 NDAA Legislative Proposals , by Stephen M. McCall CRS In Focus IF11353, Defense Primer: U.S. Precision-Guided Munitions , by John R. Hoehn CRS In Focus IF11367, Army Future Vertical Lift (FVL) Program , by Jeremiah Gertler Congressional Insight CRS Insight IN10931, U.S. Army's Initial Maneuver, Short-Range Air Defense (IM-SHORAD) System , by Andrew Feickert CRS Insight IN11052, The Defense Department and 10 U.S.C. 284: Legislative Origins and Funding Questions , by Liana W. Rosen Legal Side Bar CRS Legal Sidebar LSB10242, Can the Department of Defense Build the Border Wall? , by Jennifer K. Elsea, Edward C. Liu, and Jay B. Sykes CRS Legal Sidebar LSB10305, The Feres Doctrine: Congress, the Courts, and Military Servicemember Lawsuits Against the United States , by Kevin M. Lewis CRS Legal Sidebar LSB10316, Eliminating the SBP-DIC Offset for Surviving Spouses of Military Servicemembers: Current Proposals and Related Issues , by Mainon A. Schwartz ", "summary": "The Administration's FY2020 NDAA request would have authorized $568.1 billion designated as base budget funds to cover the routine, recurring costs to man, train, and operate U.S. forces. The request would have authorized an additional $173.8 billion designated as Overseas Contingency Operations (OCO) funds, of which $97.9 billion was requested for base programs. As enacted, the FY2020 NDAA authorizes a total of $729.9 billion for national defense-related activities, which is $12.0 billion (1.6%) less than the Administration requested.", "document_type": "crs"}
{"report": "Program eligibility requirements and payment limits are central to how various U.S. farm programs operate. These requirements fundamentally address various equity concerns and reflect the goals of government intervention in agriculture. They determine who receives federal farm program payments and how much they receive. Eligibility requirements and payment limits are controversial because they influence what size farms are supported. Policymakers have debated what limit is optimal for annual payments, whether payments should be proportional to production or limited per individual or per farm operation, and whether the limit should be specific to each program or cumulative across all programs. Furthermore, program eligibility requirements and payment limits generate considerable congressional interest because their effects differ across regions and by type of commodities produced and because a substantial amount of annual U.S. farm program payments are at stake: Direct federal outlays have averaged $13.7 billion per year from 1996 through 2018. When federal crop insurance premium subsidies are included, annual farm payments have averaged $17.6 billion over the same period. This report discusses various eligibility factors and their interaction with current farm programs, including those authorized under the 2018 farm bill as well as several disaster assistance and other ad hoc payment programs initiated under different authorities. It describes current restrictions that limit or preclude payments to farmers based on a number of factors as well as areas where few, if any, restrictions limit farmers' access to such benefits or to the amount of benefits. Much of the information on farm programs and their eligibility criteria and payment limits is summarized in Table A-1 . A second appendix table, Table A-2 , provides a brief history of the legislative evolution of the income eligibility thresholdsâthat is, means testing. A final appendix table, Table A-3 , contains a history of the legislative evolution of annual payment limits for major commodity programs. This report concludes with a discussion of several issues related to farm program payment limits, including policy design issues, that may be of interest to Congress. Farm program payment limits and eligibility requirements may differ by both type of program and type of participating legal entity (e.g., an individual, a partnership, or a corporation). The Farm Service Agency (FSA) has administrative responsibility for collecting and maintaining data used to make eligibility and payment limit determinations for U.S. Department of Agriculture (USDA) farm programs. FSA provides this data to the Natural Resources Conservation Service (NRCS) to administer conservation programs for which they have responsibility. Congress first added payment limits as part of farm commodity programs in the 1970 farm bill (P.L. 91-524). However, such limits have evolved over time in both scope and amount ( Table A-1 ) as the structure of U.S. agriculture, farm policies, and commodity support programs has changed. With each succeeding farm bill, and occasionally via other legislation, Congress has addressed anew who is eligible for farm payments and how much an individual recipient should be permitted to receive in a single year. In recent years, congressional debate has focused on attributing payments directly to individual recipients, ensuring that payments go to persons or entities currently engaged in farming, capping the amount of payments that a qualifying recipient may receive in any one year, and excluding farmers or farming entities with incomes above a certain levelâas measured by their adjusted gross income (AGI)âfrom payment eligibility. Each of these policy measuresâdepending on how they are designed and implementedâcan have consequences, both intended and unintended, for U.S. agriculture. These consequences include, but are not limited to, farm management structure, crop choices, and farm size. Because U.S. farm program eligibility requirements and annual payment limit policy have such broad potential consequences for U.S. agriculture, a review of both current policies and related issues is of potential interest to Congress. Not all farm businesses are eligible to participate in federal farm programs. A number of statutory and regulatory requirements govern federal farm program eligibility for benefits under various programs. Some farm businesses, although eligible to participate, are restricted from receiving certain benefits or may be limited in the extent of program payments that they may receive. Over time, program eligibility rules have evolved, expanding to more programs and including more limitations. Cross-cutting methods of determining program eligibilityâsuch as AGI thresholdsâare relatively new. Discussed below are cross-cutting eligibility requirements that affect multiple programs, including participant identification, foreign ownership, nature and extent of participation (i.e., AEF criteria), means tests, and conservation requirements. Generally, program eligibility begins with identification of participants. Identifying who or what entity is participating and therefore how payments may be attributed is the cornerstone of most farm program eligibility. To be eligible to receive any farm program payment, every person or legal entityâincluding both U.S. citizens and noncitizensâmust provide a name and address and have either a Social Security number (SSN), in the case of a person, or a Taxpayer Identification Number (TIN) or Employee Identification Number (EIN), in the case of a legal entity with multiple persons having ownership interests. In this latter situation, each person with an interest must have a TIN or EIN and must declare his or her interest share in the joint entity using the requisite USDA forms. All participants in programs subject to payment eligibility and payment limitation requirements must submit to USDA two completed forms. The first, CCC-901 (Members' Information), identifies the participating persons and/or entities (through four levels of attribution if needed) and their interest share in the operation. The second form, CCC-902 (Farm Operating Plan), identifies the nature of each person's or entity's stakeâthat is, capital, land, equipment, active personal labor, or active personal managementâin the operation. These forms need to be submitted only once (not annually) but must be kept current in regard to any change in the farming operation. Critical changes to a farming operation might include expanding the number of limitations for payment, such as by adding a new family member, changing the land rental status from cash to share basis, purchasing additional base acres equivalent to at least 20% of the previous base, or substantially altering the interest share of capital or equipment contributed to the farm operation. This information is critical in determining the extent to which each person is actively engaged in the farming operation, as described below. Many types of farm business entities own operations engaged in agricultural production. For purposes of determining the extent to which the participants of a farm operation qualify as potential farm program participants, three major categories are considered ( Table 1 ): 1. Sole proprietorship or family farm. The farm business is run by a single operator or multiple adult family membersâthe linkage being common family lineageâwhereby each qualifying member is subject to an individual payment limit. Thus, a family farm potentially qualifies for an additional payment limit for each family member (18 years or older) associated with the principal operator. Family farms or sole proprietorships comprised nearly 86% of U.S. farm operations in 2017. 2. Joint operation . Each member of a joint operationâwhere members need not have a common family relation or lineageâis treated separately and individually for purposes of determining eligibility and payment limits. Thus, a partnership's potential payment limit is equal to the number of qualifying members (plus any special designees such as spouses) times the individual payment limit. 3. Corporation. A legally defined association of joint owners or shareholders that is treated as a single person for purposes of determining eligibility and payment limits. This includes corporations, limited liability companies, and similar entities. Nearly 90% of incorporated farm operations are family held. As of 2017, these three categories represented nearly 98% of U.S. farm operations ( Table 1 ). In addition, federal regulations exist for evaluating both the eligibility of and relevant payment limits for other exceptional types of potential recipients, including a spouse, minor children, and other family members, as well as marketing cooperatives, trusts and estates, cash-rent tenants, sharecroppers, landowners, federal agencies, and state and local governments. These institutional arrangements represent a small share (2.2%) of U.S. farm operations, according to USDA's 2017 Census of Agriculture . Special rules also describe eligibility and payment limits in the event of the death of a previously eligible person. To be eligible for certain farm program benefits, participantsâindividuals as well as other types of legal entitiesâmust meet AEF requirements. The AEF requirements (where applicable) apply equally to U.S. citizens, resident aliens, and foreign entities. This section briefly reviews the specific requirements for each type of legal entityâperson, partnership, or corporationâto qualify as \"actively engaged in farming.\" An individual producer must meet three AEF criteria: 1. The person, independently and separately, makes a significant contribution to the farming operation of (a) capital, equipment, or land; and (b) active personal labor, active personal management, or a combination of active personal labor and management. 2. The person's share of profits or losses is commensurate with his/her contribution to the farming operation. 3. The person shares in the risk of loss from the farming operation. In general, family farms receive special treatment whereby every adult member (i.e., 18 years or older) is deemed to meet the AEF requirements. Family membership is based on lineal ascendants or descendants but is also extended to siblings and spouses. Furthermore, under the 2018 farm bill (Â§1703), for purposes of assessing the availability of individual payment limits, the definition of family member has been extended to include first cousins, nieces, and nephews. Current law also allows for special treatment of a spouse: If one spouse is determined to be actively engaged in farming, then the other spouse shall also be determined to have met the requirement. The spousal exception applies to both individual producers (as in a family farm) and producers operating within a partnership. An additional exception is made for landowners who may be deemed in compliance with all AEF requirements if they receive income based on the farm's operating results without providing labor or management. In a general partnership, each member is treated separately for purposes of meeting the AEF criteria and determining eligibility. In particular, each partner with an ownership interest must contribute active personal labor and/or active personal management to the farming operation on a regular basis. The contribution must be identifiable, documentable, separate, and distinct from the contributions made by any other partner. Each partner who fails to meet the AEF criteria is ineligible to participate in the relevant farm program. A corporation, as an association of joint owners, is treated as a single person for purposes of meeting the AEF criteria and determining eligibility. In addition to the AEF criteria cited for a personâof sharing commensurate profits or losses and bearing commensurate riskâeach member with an ownership interest in the corporation must make a significant contribution of personal labor or active personal managementâwhether compensated or notâto the operation that is (a) performed on a regular basis, (b) identifiable and documentable, and (c) separate and distinct from such contributions of other stockholders or members. Furthermore, the collective contribution of corporate members must be significant and commensurate with contributions to the farming operation. If any member of the legal entity fails to meet the labor or management contribution requirements, then any program payment or benefit to the corporation will be reduced by an amount commensurate with the ownership share of that member. An exception applies if (a) at least 50% of the entity's stock is held by members that are \"actively engaged in providing labor or management\" and (b) the total annual farm program payments received collectively by the stockholders or members of the entity are less than one payment limitation. Prior to the 2014 farm bill ( P.L. 113-79 ), the definition of active personal labor or management was broad and could be satisfied by undertaking passive activities without visiting the operation, thus enabling individuals who lived significant distances from an operation to claim such labor or management contributions. This was often seen as problematic, as passive investors were receiving farm program payments without actively contributing to the farming operation. Recent farm bills have amended the AEF criteria in an attempt to tighten the requirements. However, the issue remains controversial. In particular, the 2014 farm bill (Â§1604) required USDA to add more specificity to the role that a nonfamily producer must play to qualify for farm program benefits. These AEF regulations were not changed under the 2018 farm bill. As a result of the rule, a limit is placed on the number of nonfamily members of a farming operation who can qualify as a farm managerâdepending on the size and complexity of the farm operation. Also, additional recordkeeping requirements now apply for each nonfamily member of a farming operation claiming active personal management status. No such limit applies to the potential number of qualifying family members. Generally, foreign persons (or foreign legal entities) are eligible to participate if they meet a particular farm program's eligibility requirements. Exceptions include the four permanent disaster assistance programsâEmergency Assistance for Livestock, Honey Bees, and Farm-Raised Fish Program (ELAP); Livestock Forage Disaster Program (LFP); Livestock Indemnity Program (LIP); and Tree Assistance Program (TAP)âand the Noninsured Crop Disaster Assistance Program (NAP), which explicitly prohibit payments to foreign entities other than resident aliens. As of December 31, 2018, foreign persons held an interest in 31.8 million acres of U.S. agricultural land (including forest land). This accounts for 2.5% of all privately held agricultural land in the United States and approximately 1% of total U.S. land. Foreign persons or entities can become eligible for most farm program benefits if they have the requisite U.S. taxpayer ID and meet the AEF criteria discussed earlier. In the case where a foreign corporation or similar entity fails to meet the AEF criteria but has shareholders or partners with U.S. residency status, then the foreign entity mayâupon written request to USDAâreceive payments representative of the percentage ownership interest by those U.S. citizens or U.S. resident aliens that do meet the AEF criteria. Current law imposes no specific restrictions on foreign persons or entities with respect to eligibility for crop and livestock insurance premium subsidies. Also, the Dairy Margin Coverage (DMC) program makes no distinction about producer or owner citizenship. Instead, the law states that all dairy operations in the United States shall be eligible to participate in the DMC program to receive margin protection payments. Similarly, no citizenship requirement exists for a sugar processor or a cane or beet producer operating under the U.S. sugar program price guarantees. However, the sugarcane and sugar beets being processed must be of U.S. origin. Generally, means testing prohibits persons or legal entities from being eligible to receive any benefit under certain commodity and conservation programs during a crop, fiscal, or program year as appropriate if their income is above an established level. The first means test for farm programs was established by the 2002 farm bill ( P.L. 107-171 ). Income is measured by an individual's or entity's average AGI from the previous three-year period but excluding the most recent complete taxable year. A brief history of the legislative evolution of the AGI threshold is provided in Table A-2 . Means testing has recently been applied as a determining factor for the level of payment limit rather than a threshold for eligibility. Supplemental disaster assistance authorized in 2018 and 2019 uses an individual's or entity's average AGI over a three-year period to determine the total payment limits depending on how much of that income is derived from farming. This is discussed further in the \" Payment Limits \" section below. Recent farm bills, including the 2018 farm bill, have preserved the three-year average AGI as the relevant measure of income. Now that an AGI limit appears acceptable, the debate has shifted to which programs are covered by the means test and what income level is an appropriate threshold. Since most U.S. farms are operated as sole proprietorships or partnerships ( Table 1 ), most farm households are taxed under the individual income tax rather than the corporate income tax. For an individual, AGI is the Internal Revenue Service (IRS) reported AGI. AGI measures net incomeâthat is, income after expenses. Farm income is reported on the IRS Schedule F where AGI is net of farm operating expenses. For an incorporated business, a comparable measure to AGIâas determined by USDAâis used to measure income. Since the household is the typical unit of taxation, farm and nonfarm income are combined when computing federal income taxes for farm households. In fact, most federal income tax paid by farm households (80% in 2019) can be attributed to nonfarm income. Farm operations overwhelmingly report operating losses for tax purposes. For example, in 2015, two-thirds of farm sole proprietors reported a net farm loss for tax purposes. The substantial portion of capital investment that can be expensed in the first year is an important determinant of the large loss reporting, along with cash accounting and other practices. Program participants are required to give their consent to the IRS annually to verify that they are in compliance with their AGI limit provisions using a specific USDA form (CCC-941). Failure to provide the consent and subsequent certification of compliance results in ineligibility for program payments and a required refund of any payments already received for the relevant year. The 2002 farm bill (Â§1604) established the initial AGI threshold for program eligibility at $2.5 million. This AGI criterion applied to most farm programs (listed in Table A-2 ). However, the 2002 farm bill included an exemption if at least 75% of AGI was from farming. The 2008 farm bill (Â§1604) replaced the single AGI limit of the 2002 farm bill with three separate AGI limits that distinguished between farm and nonfarm AGI: 1. First, a nonfarm AGI limit of $500,000 applied to eligibility for selected farm commodity program benefits, including the Milk Income Loss Contract program, NAP, and the disaster assistance programs. 2. Second, a farm-specific AGI limit of $750,000 applied to eligibility for direct payments. 3. Third, a nonfarm AGI limit of $1 millionâbut subject to an exclusion if 66.6% of total AGI was farm-related incomeâapplied to eligibility for benefits under conservation programs. However, the AGI limit could be waived in its entirety on a case-by-case basis if implementing a particular conservation program would protect environmentally sensitive land of special significance. The 2008 farm bill also added a provision for married individuals filing a joint tax return whereby the joint AGI could be allocated as if a separate return had been filed by each spouse. This would potentially allow the farmer to exclude any earned income from a spouse as well as a share of any unearned income from jointly held assets for purposes of the eligibility cap. This provision had the potential to significantly reduce the share of farms affected by the AGI cap. The 2014 farm bill (Â§1605) returned the eligibility threshold to a single total AGI limit but at a level of $900,000 for individuals and incorporated businesses. It also retained the provision for married individuals filing a joint tax return to allocate the AGI as if a separate return had been filed by each spouse. In the case of a payment to a general partnership or joint venture comprising multiple individuals, the payment would be reduced by an amount that is commensurate with the share of ownership interest of each person who has an average AGI in excess of $900,000. The 2018 farm bill retained the AGI provisions from the 2014 farm bill but added the 2008 farm bill's case-by-case waiver for conservation programs that would protect environmentally sensitive land of special significance. In July 2018, USDA announced financial assistance under a new Market Facilitation Program (MFP) in response to retaliatory tariffs targeting various U.S. agricultural commodities. The MFP provides direct payments to producers of selected commodities. To qualify, USDA requires that MFP recipients meet AEF, AGI, and conservation compliance (see below) criteria. For payments under the 2018 MFP, a producer's average AGI for tax years 2014, 2015, and 2016 must be less than $900,000. However, Congress amended the AGI criterion as it applies to MFP payments in the FY2019 Supplemental Appropriations for Disaster Relief Act ( P.L. 116-20 , Â§103). The MFP-relevant AGI criterion was amended to (1) use the tax years 2013, 2014, and 2015 to calculate average AGI for evaluating eligibility for 2018 MFP payments and (2) allow eligibility for AGI in excess of $900,000 if at least 75% came from farming, ranching, or forestry-related activities. It is unclear if MFP payments made in 2018 under the previous AGI criteria would be re-evaluated against the new AGI specification and would then be subject to repayment if the new AGI formulation made a producer ineligible. In May 2019, USDA announced a second round of MFP paymentsâreferred to as 2019 MFP payments. To qualify, USDA requires 2019 MFP recipients to meet AEF, AGI, and conservation compliance criteria. However, the AGI criteria to assess eligibility for the 2019 MFP payments would use the 2015, 2016, and 2017 tax years. Two provisionsâhighly erodible land conservation (Sodbuster) and wetland conservation (Swampbuster)âare collectively referred to as conservation compliance. To be eligible for certain USDA program benefits, a producer agrees to conservation complianceâthat is, to maintain a minimum level of conservation on highly erodible land and not to convert or make production possible on wetlands. Conservation compliance has been in effect since the 1985 farm bill ( P.L. 99-198 ). The majority of farm program payments, loans, disaster assistance, and conservation programs are benefits that may be lost if a participant is out of compliance with the conservation requirements. The 2014 farm bill extended conservation compliance to federal crop insurance premium subsidies, and the 2018 farm bill retains this compliance requirement. Most recently, the 2018 farm bill made relatively minor amendments to the compliance provisions. Within U.S. farm policy, conservation compliance continues to be one of the only environmentally based requirements for program participation. The process of tracking payments to an individual through various levels of ownership in single and multiperson legal entities is referred to as \"direct attribution.\" Several types of legal entities may qualify for farm program payments. However, ultimately every legal entity represents some combination of individuals. For example, a joint operation can be made up of a combination of individuals, partnerships, and/or corporate entities. A particular individual may be part of each of these three component entities, as well as additional subentities within each of these components. Farm payments flow down through these arrangements to individual recipients. Congress defines legal entity as an entity created under federal or state law that (1) owns land or an agricultural commodity or (2) produces an agricultural commodity. This broad definition encompasses the multiperson legal entities discussed earlier such as family farm operations, joint ventures, corporations, and institutional arrangements. Ownership shares in a multiperson legal entity are tracked via a person's SSN or EIN as reported in CCC-901 and CCC-902. Identification at the individual payment recipient level is critical for assessing the cumulative payments of each individual against the annual payment limit. Direct attribution was originally authorized in the 2008 farm bill (Â§1603(b)(3)). All farm program payments made directly or indirectly to an individual associated with a specific farming operation are combined with any other payments received by that same person from any other farming operationâbased on that person's pro rata interest in those other operations. It is this accumulation of an individual's paymentsâtracked through four levels of ownership in multiperson legal entitiesâthat is subject to the annual payment limit (see text box below). The first level of attribution is an individual's personal farming operation. Subsequent levels of attribution are related to those legal entities in which an individual has an ownership share. If a person meets his or her payment limit at the first level of attribution (i.e., on his or her own personal farming operation), then any payments to legal entities at lower levels of attribution are reduced by that person's pro rata share. When the eligibility criteriaâincluding AEF, AGI, conservation compliance, and othersâare met, the cumulative benefits across certain farm programs are subject to specific annual payment limits (detailed in Table A-1 ) that can be received by an individual or legal entity in a year. Explicit payment limits date back to the 1970s. Despite their longevity, payment limits are not universal among programs. Payment limits are also enforced differently for different types of legal entities (as mentioned earlier and summarized below). For example, certain program limits may be expanded depending on the number of participants, or they may be subject to exceptions, or they may not exist. The major categories of farm program support and the applicability of annual payment limits, if any, are briefly discussed below. Traditionally, much attention focuses on the annual payment limits for the Title I commodity programs, largely because this has been the conduit for the majority of farm program expenditures. Title I commodity program payment limits were first included in a farm bill in 1970 but have evolved substantially since that initial effort ( Table A-1 ). Several major farm support programsâas defined by specific titles of the 2018 farm billâare currently subject to annual payment limits. Title I (Subtitle A): ARC and PLC . Payments for the two revenue-support programsâAgriculture Risk Coverage (ARC) and Price Loss Coverage (PLC)âmust be combined for all covered commodities (except peanuts) and reduced by any sequestration prior to assessing whether they are within the $125,000 annual payment limit for an individual. Peanuts are a notable exception to this rule in that ARC and PLC payments for peanuts (after sequestration) are subject to their own annual payment limit of $125,000 per individual. Title I (Subtitle E): LFP . The LFP program is subject to an annual limit of $125,000 per person. Title I (Subtitle F ) : NAP . Available for crops not currently eligible for crop insurance. Payments for catastrophic coverage are limited to $125,000 per crop year per individual or entity. Payments for additional coverage (referred to as buy-up coverage) have a separate limit of $300,000 per crop year per individual or entity. In addition to commodity programs authorized in periodic farm bills, the Secretary of Agriculture has broad authority under the CCC charter to make payments in support of U.S. agriculture. These payments may be purely ad hoc in nature, or they may be made according to a formula as part of a temporary program. Payments under this type of authority may or may not be subject to payment limits in accordance with the program's specification. Three such programs have been initiated since 2016âall subject to annual payment limits. 1. Cotton Ginning Cost Share (CGCS) Program. The CGCS program has been available only in the 2016 and 2018 crop years. Payments under the CGCS program are subject to an annual payment limit of $40,000 per person. 2. 2018 MFP. USDA established the MFP program in August 2018 as a one-time payment program to help offset the financial losses associated with lost agricultural trade to China as a result of a trade dispute with the United States. MFP payments are subject to a per-person payment limit of $125,000. However, the limit applies separately to three categories of commoditiesâfield crops (corn, sorghum, soybeans, upland cotton, and wheat); livestock (dairy and hogs); and specialty crops (shelled almonds and fresh, sweet cherries). 3. 2019 MFP. In July 2019 USDA established a second round of MFP payments, again subject to per-person payment limits but at a higher rate of $250,000 per commodity category with an overall cap of $500,000 per person. The three eligible categories included non-specialty crops (primarily grain and oilseed crops), specialty crops (selected tree nuts, cranberries, ginseng, sweet cherries, and table grapes), and livestock (hogs and dairy). When the farm program benefits for a qualifying recipient exceed the annual limits (as listed in Table A-1 ) for a given year, then that individual is no longer eligible for further benefits under that particular program during that year and is required to refund any payments already received under that program that are in excess of the relevant payment limit for that year. As mentioned earlier, family farms receive special treatment whereby every adult memberâ18 years or olderâis deemed to meet the AEF requirements and is potentially eligible to receive farm program payments in an amount up to the individual payment limit. Furthermore, under the 2018 farm bill (Â§1703(a)(1)), the definition of family member was extended to include first cousins, nieces, and nephews. Thus, a family farm with a single active farm operator may still qualify for multiple payment limits based on the number of immediate and extended family members. For example, suppose that a farmer who is married with two adult children also has two neighboring married cousins, each with two children, that occasionally help out with farm work. This farm operation could potentially be eligible for 12 individual payment limits (four on the core farm operation and four from each of the cousin's families) for a total of $1.5 million in program payments. A partnership's potential payment limit is equal to the limit for a single person times the number of persons or legal entities that comprise the ownership of the joint operation plus any additional exemptions or exceptions. Adding a new member can provide one or two (with qualifying spouse) additional payment limits. Each member of a partnership or joint venture must meet the AEF criteria and must be within the AGI limit. Furthermore, the partnership's total payment limit is reduced by the share of each single member who has already met his or her payment limit (or portion thereof) on another farm operation outside of the partnership. A corporation is treated as a single person for purposes of determining eligibility and payment limitsâprovided that the entity meets the AEF criteria. Adding a new member to the corporation generally does not affect the payment limit but only increases the number of members that can share a single payment limit. In FY2018 and FY2019, Congress provided several supplemental appropriations for production losses resulting from natural disasters and not covered by NAP or crop insurance. The majority of the supplemental funding has been administered by USDA through two versions of a similar programâthe Wildfires and Hurricanes Indemnity Program (WHIP). Losses occurring in 2017 were eligible for the \"2017 WHIP.\" An expanded set of losses occurring in 2018 and 2019 are eligible for \"WHIP Plus\" (referred to as WHIP+). In addition to WHIP+, USDA implemented two other ad hoc programsâthe On-Farm Storage Loss Program and the Milk Loss Programâas well as block grants with states. USDA established payment limits for WHIP under authority granted to the Secretary in authorizing legislation. Payment limits for 2017 WHIP and WHIP+ are based on an individual's or entity's average AGI over a three-year period depending on how much of that income is derived from farming ( Table 2 ). Producers are assumed to be in the lowest payment limit category unless an exception to the payment limit is filed using a USDA form and documentation from a certified public accountant or attorney that at least 75% of the person's or legal entity's average AGI was from adjusted gross farm income. Unlike the aforementioned AGI consent form (CCC-941), verification of payment limit exceptions is not submitted to the IRS for the WHIP programs. Direct attribution applies for both payment limits and determining average AGI. Limits on conservation programs have existed long before limits on farm support programs have. Most current conservation programs include some limit on the amount of funding a participant may receive, but these limits vary by program. Some programs have multiple limits that vary based on activity or practice implemented. Several major conservation programs in Title II of the 2018 farm bill are currently subject to payment limits. Conservation Reserve Program (CRP) . Payments for CRP can vary based on the type of contract and type of payment. In general, annual rental payments for general enrollment contracts and continuous enrollment contracts are limited to 85% and 90% of the average county rental rate, respectively, and not more than $50,000 total per year. Cost-share payments and incentive payments are also limited and may be waived or applied at different levels under subprograms of CRP, such as land enrolled under the Conservation Reserve Enhancement Program or the Soil Health and Income Protection Pilot. Environmental Quality Incentives Program (EQIP). Total cost-share and incentive payments are limited to $450,000 for all EQIP contracts entered into by a person or legal entity between FY2019 and FY2023. Additional limits apply to select EQIP contract payments, including incentive contract payments, which are limited to a total of $200,000 between FY2019 and FY2023; payments for EQIP conservation practices related to organic production, which are limited to a total of $140,000 between FY2019 and FY2023; and eligible water management entity payments, which are limited to a total of $900,000 between FY2019 and FY2023. Conservation Stewardship Program (CSP). A person or legal entity may not receive more than a total of $200,000 for all CSP contracts between FY2019 and FY2023. A CSP contract with any joint operation is limited to $400,000 over the term of the contract period. These limits do not apply to the CSP Grassland Conservation Initiative, in which annual payments are limited to $18 per acre, not to exceed the number of base acres on a farm. Payments under certain Title I and Title II programs in the 2018 farm bill are excluded from annual payment limits. These exceptions are described below. Another exception to payment limits could result if the principal operator or a major partner of a farm operation dies during the course of a program year and any associated program benefits for the deceased are transferred to another farm operator or partner. Certain farm programs are not subject to annual payment limits. This includes any benefits obtainable under the Marketing Assistance Loan (MAL) program, the sugar program, the dairy program, and three of the four disaster assistance programs (ELAP, LIP, and TAP). Also, benefits from crop insurance premium subsidies and indemnity payments on loss claims are not subject to any limits. Finally, any payments made under the Emergency Watershed Protection Program (EWP) are not subject to payment limits. Title I (Subtitle B) MAL program. Benefits under the MAL program include loan deficiency payments (LDP), marketing loan gains (MLG), and gains under forfeiture or commodity certificate exchanges. Traditionally, MAL benefits in the form of LDPs and MLGs have been subject to payment limits, whereas MAL benefits derived from forfeiting to the CCC the quantity of a commodity pledged as collateral for a marketing assistance loan or from use of commodity certificates to repay a marketing assistance loan have traditionally been excluded from payment limits. However, the 2018 farm bill (Â§1703(a)(2)) excluded all MAL benefits from payment limits. Title I (Subtitle C) sugar program. The U.S. sugar program does not rely on direct payments from USDA and generally operates with no federal budget outlays. Instead, the sugar program provides indirect price support to producers of sugar beets and sugarcane and direct price guarantees to the processors of both crops in the form of a marketing assistance loan at statutorily fixed prices. Congress has directed USDA to administer the U.S. sugar program at no budgetary cost to the federal government by limiting the amount of sugar supplied for food use in the U.S. market, thus indirectly supporting market prices. This indirect subsidy is implicit and not subject to budgetary restrictions. Furthermore, there is no citizenship requirement for a sugar processor, but the sugarcane and sugar beets being processed under the U.S. sugar program price guarantees must be of U.S. origin. Title I (Subtitle D) dairy program . The margin-based dairy support program was first established under the 2014 farm bill (Â§Â§1401-1431) without payment limits as the Margin Protection Program (MPP) for dairy. The MPP was revised and renamed as the Dairy Margin Coverage (DMC) program by the 2018 farm bill. Under the DMC, participants benefit from two potential types of support: an implicit premium subsidy and an indemnity-like payment made when program price triggers are met. The fees or premiums charged for participating in the DMC are set in statute rather than being set annually based on historical data and market conditions. Thus, the subsidy is implicit to the premium paid with no limit on the level of participation. Similarly, any payments made under the DMC are not subject to payment limits. Title I (Subtitle E ) disaster assistance program s: ELAP, LIP, and TAP . Payments under three of the disaster assistance programs in Title I of the 2018 farm bill are excluded from any payment limits. This includes ELAP, LIP, and TAP. Title II conservation programs. Total payments under certain conservation programs are limited to the value or cost of the specific conservation measure that the program is paying for rather than a fixed limit. Under the Agricultural Conservation Easement Program and the EWP program, payments are limited to a portion of the total cost of the easement or project rather than a total funding amount. In the case of the Regional Conservation Partnership Program (RCPP), USDA may make payments to producers in an amount necessary to achieve the purposes of the program with no statutory limit on the total amount. Title XI crop- and livestock-related insurance premium subsidies and indemnity payments . The principal support provided for farmers under the federal crop insurance program are federal premium subsidies for both catastrophic and buy-up insurance coverage. Premium subsidies are not subject to any limit on the level of participation or underlying value. Crop insurance indemnities are payments made to cover insurable losses and thus are not subject to any payment limit. To be eligible to purchase catastrophic risk protection coverage, the producer must be a \"person\" as defined by USDA, and to be eligible to purchase any other plan of insurance (such as buy-up coverage, among others), the producer must be at least 18 years of age and have a bona fide insurable interest in a crop as an owner-operator, landlord, tenant, or sharecropper. A noteworthy exception to payment limits may occur if the principal operator should die during the crop year. In particular, payments received directly or indirectly by a qualifying person (i.e., someone who meets AEF, AGI, and any other eligibility requirements) may exceed the applicable limitation if all of the following apply: ownership interest in farmland or agricultural commodities was transferred because of death, the new owner is the successor to the previous owner's contract, and the new owner meets all other eligibility requirements. This provision also applies to an ownership interest in a legal entity received by inheritance if the legal entity was the owner of the land enrolled in an annual or multiyear farm program contract or agreement at the time of the shareholder's death. The new owner cannot exceed the payment amount that the previous owner was entitled to receive under the applicable program contracts at the time of death. However, the new payment limit associated with this transfer would be in addition to the payment limit of the person's own farm operation. If the new owner meets all program and payment eligibility requirements, this provision applies for one program year for ARC and PLC. This reflects the idea that individual resources were committed by both farming operations (the deceased's and the inheritor's) during the growing season with no expectation of death and that individual payment limits should reflect that resource commitment and not impose an unnecessary and unexpected burden on the inheritor. Limitations on farm program payments raise a number of issues that have led to debate among farm policymakers and agricultural stakeholders and may continue to be of interest to Congress as it considers issues of equity and efficiency in farm programs. Theoretically, market pricesâbased on relative supply and demand conditions under competitive market conditions âprovide the most useful signals for allocating scarce resources. In other words, in a situation where no policy support is available, most producers would make production decisions based primarily on market conditions. If these conditions hold, then tighter payment limits (i.e., a smaller role for government support policies and production incentives) would imply that more land would be farmed based on market conditions and less land would be farmed based on policy choices. Supporters of payment limits use both economic and political arguments to justify tighter limits. Economically, they contend that large payments facilitate consolidation of farms into larger units, raise the price of land, and put smaller, family-sized farming operations and beginning farmers at a disadvantage. Even though tighter limits would not redistribute benefits to smaller farms, they say that tighter limits could help indirectly by reducing incentives to expand, thus potentially reducing upward price pressure on land markets. This could help small and beginning farmers buy and rent land. Politically, they believe that large payments undermine public support for farm subsidies and are costly. In the past, newspapers have published stories critical of farm payments and how they are distributed to large farms, nonfarmers, or landowners. Limits increasingly appeal to urban lawmakers and have advocates among smaller farms and social interest groups. Critics of payment limits (and thus supporters of higher limits or no limits) counter that all farms are in need of support, especially when market prices decline, and that larger farms should not be penalized for the economies of size and efficiencies they have achieved. They say that farm payments help U.S. agriculture compete in global markets and that income testing is at odds with federal farm policies directed toward improving U.S. agriculture and its competitiveness. In addition to these concerns, this section briefly reviews other selected payment limit issues and eligibility requirements. The majority of farm payments go to a small share of large operators. According to USDA's 2017 Agricultural Census, farms with market revenue equal to or greater than $250,000 accounted for 12% of farm households but produced 90% of the value of total U.S. agricultural production and received 62% of federal farm program payments. Selecting a particular dollar value as a limit on annual government support payments involves a fundamental choice about who should benefit from farm program payments. This has important, but complex, policy implications. For example, numerous academic studies have shown that government payments are usually capitalized into cropland values, thus raising rental rates and land prices. Higher land values disfavor beginning and small farmers, who generally have limited access to capital. As a result, critics contend that there is a lack of equity and fairness under the current system of farm program payments that appears to favor large operations over small and that payment limits are really about farm size. In contrast, supporters of the current system argue that larger farms tend to be more efficient operators and that altering the system in favor of smaller operators may create inefficiencies and reduce U.S. competitiveness in international markets. Furthermore, they contend that tightening payment limits will have different effects across crops, thus resulting in potentially harmful regional effects. Tighter payment limits do not affect all crops and regions equally. As limits are tightened, they will likely first impact those crops with higher per-unit and per-acre production value. Among the major U.S. program crops, higher valued crops include rice, peanuts, and cotton, all of which tend to be produced in the Southeast, the Mississippi Delta, and western states. Furthermore, payment limits may influence local economic activity. In particular, payment limits are likely to have a larger economic impact in regions where agricultural production accounts for a larger share of economic outputâthat is in rural, agriculture-based countiesâand where there may be fewer opportunities for diversification to offset any payment-limit-induced reduction in agricultural incomes. Under current law, peanuts have a separate program payment limitâa consequence of the 2002 federal quota buyout ( P.L. 107-171 , Â§1603). This separate payment limit affords peanut production an advantage over production of other program crops that are subject to combined payments for ARC and PLC under a single limit. As a result of this feature, a farmer who grows multiple program crops including peanuts has essentially two different program payment limits: 1. $125,000 per person for an aggregation of ARC and PLC program payments made to all program crops other than peanuts, and 2. $125,000 per person for ARC and PLC program payments made exclusively to peanuts. Thus, under an extreme scenario involving large payments for both peanuts and other program crops, this could potentially double a peanut farmer's payment limits to as much as $250,000. The 2018 farm bill (Â§1703) excluded MAL benefits from any payment limit while also raising the MAL rates for several program crops (Â§1202), including barley, corn, grain sorghum, oats, extra-long-staple cotton, rice, soybeans, dry peas, lentils, and small and large chickpeas. Raising MAL rates has two potential program effects. First, since MAL rates function as floor prices for eligible loan commodities, higher rates increase the potential for greater USDA outlays under MAL. Second, MAL rates are used to establish the floor price in calculating the maximum payment under PLC. Thus, raising the loan rate for a program commodity lowers its potential PLC program payment rate. The absence of a limit on benefits received under the MAL program creates the potential for unlimited, fully coupled USDA farm support outlays. As a result, an apparent equity issue emerges when comparing program benefits of a producer facing a hard cap for ARC and PLC payments as compared to a producer with access to MAL benefits. Because MAL payments are fully coupledâthat is, tied to the production of a specific cropâMAL program outlays count directly against U.S. amber box spending limits under World Trade Organization (WTO) commitments. To the extent that such program outlays might induce surplus production and depress market prices, they could result in potential challenges under the WTO's dispute settlement mechanism. When eligibility requirements or payment limits are changed, economically rational producers are likely to alter their behavior to make adjustments to optimize net revenue under the new set of policy and market circumstances. For example, new eligibility requirements or tighter payment limits may result in a reorganization of the farm operation to increase the number of eligible persons or to lower the income that counts against a new AGI limit or the farm program payments that count against a smaller payment limit; a change in the crop and program choices or marketing practices, for example, to take advantage of the absence of a payment limit on MAL benefits; a change in crop choices, as agronomic and marketing opportunities allow, to favor a crop with an expanded limit (e.g., peanuts) over crops with more restricted program payment opportunities; or a change in land use, such as instead of farming the same acreage, renting out or selling some land to farmers who have not hit their payment limits. Payment limits applied per unit or per base acre represent an alternative to per-person payment limits that may mitigate some potential distortions to producer behavior. An example of such a per-unit payment limit is the 85% payment reduction factor applied to base acres receiving payments under either the PLC or ARC programs. The reduction factor is applied equally across all program payments irrespective of crop choice, farm size, AGI, or total value of payments. Some economists contend that such a payment reduction factor is generally applied for cost-saving reasons rather than for \"fairness\" or equity reasons that at least partially motivate per-person payment limits. The 2018 farm bill retained the $900,000 AGI limit established under the 2014 farm bill. This AGI limit applies to all farm income whether earned on the farm or off. Under the 2008 farm bill, the AGI limit was divided into two components: a $500,000 AGI limit for farm-earned income and a $750,000 AGI cap on nonfarm-earned income. Analysis by USDA (2016) found that fewer farms are affected by the single AGI cap ($900,000) compared with the multiple farm ($500,000) and nonfarm ($750,000) AGI caps of the 2008 farm bill. For example, while federal income tax data are not available for the $900,000 cap level, published data from 2013âa year of record-high farm incomeâfound that only about 0.7% of all farm sole proprietors and share rent landlords reported total AGI in excess of $1 million. Thus, it is likely that consolidating the separate AGI farm and nonfarm limits into a single AGI limit with a higher bound has restored eligibility for farm program payments to some farm operations that had previously been disqualified. Other major exemptions from the AGI limit include state and local governments and agencies, federally recognized Indian tribes, and waivers under RCPP. The 2014 farm bill shifted the farm safety net focus away from traditional revenue support programs and toward crop insurance programs, which are not subject to the AGI cap. The 2018 farm bill maintains this emphasis on crop insurance as the foundational farm safety net program. During the eight-year period of 2011-2018, federal crop insurance premium subsidies averaged $6.4 billion annually. Extending the AGI cap to crop insurance subsidies was considered during both the 2014 and 2018 farm bill debates. However, concerns were raised that the elimination of subsidies for higher-income participants could affect overall participation in crop insurance and damage the soundness of the entire program. However, USDA has estimated that in most years, less than 0.5% of farms and less than 1% of premiums would be affected by the $900,000 income cap if it were extended to crop insurance subsidies as well as to farm program payments. Appendix A. Appendix B. Supplementary Tables", "summary": "Under the Agricultural Improvement Act of 2018 ( P.L. 115-334 , 2018 farm bill), U.S. farm program participantsâwhether individuals or multiperson legal entitiesâmust meet specific eligibility requirements to receive benefits under certain farm programs. Some requirements are common across most programs, while others are specific to individual programs. In addition, program participants are subject to annual payment limits that vary across different combinations of farm programs. Since 1970, Congress has used various policies to address the issue of who should be eligible for farm payments and how much an individual recipient should be permitted to receive in a single year. In recent years, congressional policy has focused on tracking payments through multiperson entities to individual recipients (referred to as direct attribution), ensuring that payments go to persons or entities actively engaged in farming (AEF), capping the amount of payments that a qualifying recipient may receive in any one year, and excluding farmers or farming entities with large average incomes from payment eligibility. Every participating person or legal entity that participates in a farm program must submit identification information. Other eligibility requirementsâwhich may vary across programsâinclude U.S. citizenship; the nature and extent of an individual's participation (i.e., AEF criteria), including ownership interests in multiperson entities and personal time commitments (whether as labor or management); means testing (persons with combined farm and nonfarm adjusted gross income [AGI] in excess of $900,000 are ineligible for most program benefits); and conservation compliance requirements. For example, under the FY2019 Additional Supplemental Appropriations for Disaster Relief Act ( P.L. 116-20 ), the AGI requirement as it applies to payments under the Market Facilitation Program may be waived if at least 75% of AGI is from farming, ranching, or forestry-related activities. In general, foreign persons (or foreign legal entities) are eligible to participate in farm programs if they meet the eligibility requirements. Exceptions are the four permanent disaster assistance programs created under the 2014 farm bill ( P.L. 113-79 ) and the Noninsured Crop Disaster Assistance program (NAP), which exclude nonresident aliens. Current law requires tracking payments through four levels of ownership in multiperson legal entities to the individual recipients. Current payment limits include a cumulative limit of $125,000 for all covered commodities under the Price Loss Coverage (PLC) and Agricultural Risk Coverage (ARC) support programs, with the exception of peanuts, which has its own $125,000 limit. Only one permanent disaster assistance programâthe Livestock Forage Disaster Program (LFP)âis subject to a payment limit ($125,000 per crop year). NAP is also subject to a $125,000 per crop year limit per person for catastrophic coverage. Family farms receive special treatment with respect to payment limitsâevery adult member (18 years or older) is deemed to meet the AEF requirements and is potentially eligible to receive farm program payments in an amount up to the individual payment limit. Furthermore, the 2018 farm bill extended the definition of family member to include first cousins, nieces, and nephews. Thus, a family farm with a single active farm operator may still qualify for multiple payment limits based on the number of immediate and extended adult family members. Congress addresses program eligibility and payment limit issues in periodic farm legislation. Supporters of payment limits contend that large payments facilitate consolidation of farms into larger units, raise the price of land, and put smaller, family-sized farming operations and beginning farmers at a disadvantage. In addition, they argue that large payments undermine public support for farm subsidies and are costly. Critics of payment limits counter that all farms need support, especially when market prices decline, and that larger farms should not be penalized for the economies of size and efficiencies they have achieved. Further, critics argue that farm payments help U.S. agriculture compete in global markets and that income testing is at odds with federal farm policies directed toward improving U.S. agriculture and its competitiveness. Congress may continue to address these issues, as well as related questions, such as: How does the current policy design of payment limits relate to their distributional impact on crops, regions, and farm size? Is there an optimal aggregation of payment limits across commodities or programs? Do unlimited benefits under the Marketing Assistance Loan (MAL) program reduce the effectiveness of overall payment limits?", "document_type": "crs"}
{"report": "When a non-U.S. national (alien) enters the United States illegally or overstays a temporary visa, her presence in the country violates the Immigration and Nationality Act (INA). She is subject to removal from the country on that basis alone, regardless of whether she has a criminal history or other factors, and there are few circumstances in which she can legalize her presence to extinguish the statutory basis for her removal. The population of aliens in this situationâthat is, aliens whose presence in the United States violates the INA, referred to here as \"unlawfully present aliens\" âcurrently numbers between ten million and twelve million, according to some recent estimates. About 80% of unlawfully present aliens have been in the United States for more than ten years, according to a study by the Department of Homeland Security (DHS). The issue of whether and to what extent to legalize or provide other relief from removal to unlawfully present aliens is a frequent topic of debate in Congress. The issue is sometimes called the \"third leg of the stool\" of immigration reform, after the issues of border enforcement and legal admissions. Many (but not all) proposals for comprehensive immigration reform include provisions that would create pathways to lawful permanent residence for unlawfully present aliens in significant numbers. These bills generally follow a model for one-time legalization programs exemplified by the Immigration Reform and Control Act of 1986, which offered the prospect of lawful permanent resident (LPR) status to much of the unlawfully present population in the United States at that time. Other bills would create legalization programs for discrete segments of the unlawfully present population; the various Dream Act proposals, for example, would offer relief to many childhood arrivals. These legislative proposals contemplate ad hoc legalization measures: they would offer relief to extant populations of unlawfully present aliens, but the proposals would not change generally applicable law concerning legalization going forward. The version of the DREAM Act recently passed by the House of Representatives, for example, would create a pathway to LPR status for some unlawfully present childhood arrivals who entered the United States at least four years before enactment; the bill would not, however, change the INA's approach to future childhood arrivals. This report covers the current law that underlies the ad hoc legalization debate. It reviews the limited extent to which, under the INA, an unlawfully present alien can obtain a legal immigration status that extinguishes the statutory basis for removal. In other words, the report explains the narrow circumstances in which unlawfully present aliens can legalize under current law. As used here, \"legalization\" means the acquisition of a lawful immigration status by an unlawfully present alien so that he or she is no longer subject to removal under the INA. Because the INA takes a restrictive approach to legalization, the term is often used synonymously with ad hoc legalization to refer to proposals for programs of one-time relief. This report, in contrast, focuses on legalization under current law. To the exclusion of other issues, this report focuses on the circumstances in which the INA allows acquisition of legal status notwithstanding unlawful presence. Many of the statutory provisions discussed that allow legalization in limited circumstancesâsuch as adjustment of status, asylum, and cancellation of removalâapply to lawfully present aliens as well, but those aspects of the statutes are not explored here. Further, most of the statutory provisions treated here have requirements that disqualify aliens with certain criminal convictions or immigration violations. Those requirements are referenced but not analyzed here; another CRS report discusses them in more depth. The INA takes three primary approaches to regulating the unlawfully present population: removal, deterrence, andâto a lesser extentâlegalization. First, unlawfully present aliens are subject to removal for as long their presence violates the INA; no statute of limitations applies. This regime of perpetual removability has been a feature of U.S. immigration law since 1924. Under it, aliens who enter the country surreptitiously or overstay nonimmigrant visas may be removed even after many years in the United States, whether or not they have committed other crimes or offenses. Enforcement of this legal regime comes with a well-known catch: the federal government does not allocate enough resources to make the removal of all unlawfully present aliens possible. According to DHS estimates and removal statistics, the agency's resources allow it to pursue removal each year of only a small fraction of the approximately ten million to twelve million unlawfully present aliens in the United States. There is an enforcement gap, in other words. In response, executive branch administrations have, to varying degrees, established enforcement priorities to focus their removal resources on aliens who have committed crimes or who meet other criteria. But the point remains that unlawfully present aliens face perpetual risk of removal under the INA, even if only a small percentage are actually placed in removal proceedings each year. Second, the INA seeks to deter the arrival or continued presence of unlawfully present aliens. It criminalizes some immigration violations, such as illegal entry and reentry, and bars most aliens who lack lawful immigration status from working or receiving federal public benefits. The INA renders aliens who commit some immigration violations inadmissible (i.e., ineligible for admission), either for a specified time period or for life. Aliens who are unlawfully present in the United States for one year or more, for example, are inadmissible for ten years once they depart, subject to some waiver provisions. Aliens who reenter the country illegally after being removed are inadmissible for life, also subject to limited waiver. Finally, legalization: as this report explains, the INA offers limited opportunities for unlawfully present aliens to acquire legal immigration status that extinguishes the statutory basis for their removal. An alien who overstays a nonimmigrant visa and later marries a U.S. citizen (or otherwise becomes the immediate relative of a U.S. citizen) can legalize through the adjustment of status process, so long as he or she has not committed certain crimes and does not fall within other eligibility bars. Beyond that notable exception, the legalization mechanisms in the INA exist mainly to relieve specific types of hardships such as persecution abroad (asylum) or the extreme hardship that U.S. citizens or LPRs would suffer due to the removal of their parents (cancellation of removal). Where these forms of relief do not apply, unlawfully present aliens may seek to legalize by leaving the country and applying for an immigrant visa abroad on the basis of a qualifying family relationship or in an employment or diversity category. In most cases, however, their prior unlawful presence in the United States will make them ineligible to return for ten years. As such, under current law, it is generally more difficult for unlawfully present aliens in the United States to obtain legal immigration status on generally applicable grounds, such as qualifying family relationships, than it is for aliens abroad applying to immigrate on the same grounds. U.S. immigration law developed its current stance toward the unlawfully present population in the middle period of the twentieth century, when Congress strengthened removal statutes and allowed the primary legalization statuteâknown as the registry statute, which provided for legalization based on long-standing presenceâto become obsolete. Illegal immigration emerged as a significant issue in the United States with the advent of quantitative immigration restrictions in the 1920s. Until 1875, the only restrictions on immigration into the United States came from state laws providing for the exclusion or expulsion of convicts, paupers, and people with contagious diseases. The Page Act of 1875 imposed the first federal restrictions when it barred convicts and prostitutes. Additional qualitative restrictions, including bars against Chinese laborers and aliens \"likely to become public charges,\" followed in the ensuing decades, culminating in the imposition of a literacy test in 1917. The first numerical restrictions on immigration were not imposed until 1921, when the temporary measures of the Emergency Quota Act capped new admissions by nationality (at 3% of the foreign-born population of each nationality, as reflected in the census of 1910). Congress established a permanent and generally more restrictive system of national origins quotas in the Immigration Act of 1924, also known as the Johnson-Reed Act. Numerical limitations of some form have remained a fixture of U.S. immigration law ever since. Some illegal immigration had existed during the regime of qualitative restrictions that began in 1875, but it increased with the introduction of numerical caps. The 1924 Act, beyond establishing a permanent quota system, was also notable for its removal provisions. The act rendered aliens who entered or remained in the country in violation of its restrictions subject to deportation \"at any time after entering,\" which meant that no limitations period applied and even long-standing unlawfully present aliens could be deported. This marked a significant change from earlier deportation statutes, which had imposed limitations periods of between one and five years for the removal of illegal entrants. Aliens physically present for longer than the limitations period could not be deported under those laws on the ground that their presence violated the immigration statutes. The 1924 Act eliminated this limitations period going forward. Yet soon after U.S. immigration law settled upon this regime of perpetual deportability of unlawfully present aliens, the law also developed a mechanism called \"registry\" for such aliens to legalize on the basis of long-standing presence. Congress enacted the first registry statute in 1929 and revised it periodically thereafter. Generally speaking, the registry statute authorized immigration officials to grant lawful permanent residence to aliens who entered the United States before a date specified in the statute and who resided in the country continuously after entry. To qualify, aliens also had to demonstrate \"good moral character\" and not be ineligible on certain grounds that changed over time (e.g., not have certain criminal convictions). Unlawful presenceâwhether as a result of surreptitious entry or the overstay of a visaâwas not a bar to registry. In plain terms, then, the registry statute provided for the legalization of unlawfully present aliens who had been in the United States since a given cutoff date. The first cutoff date, under the 1929 statute, was June 3, 1921. Congress apparently sought to provide relief to aliens who entered the United States before the first numerical restrictions went into effect in 1921 and before immigration officials began systematically recording alien admissions at ports of entry. In 1939, Congress advanced the cutoff date to 1924. About 200,000 aliens appear to have legalized through registry between 1929 and 1945. A few more changes to the cutoff date followed in later decades. A 1958 law advanced the date from 1924 to 1940; a 1965 law moved it up to 1948; and in 1986, the Immigration Reform and Control Act (IRCA) set the current date of 1972. Under current law, the registry statute remains in effect, but the 1972 cutoff date renders it mostly obsolete. Registry applications surged on the heels of the 1986 update that set the date at 1972, but applications dwindled to a trickle as the date grew more distant. In 2004, the last year for which DHS published separate statistics on registry in its statistical yearbook, 205 aliens became LPRs through registry. Thus, while the concept of registry persists in U.S. law as a legalization mechanism based on long-standing presence, few (if any) unlawfully present aliens qualify to legalize through registry because few have been present since the 1972 cut-off date. Perhaps the most significant body of legalization principles in the INA governs the extent to which unlawful presence disqualifies an alien from obtaining LPR status through family relationships or on other generally applicable grounds. With the registry statute effectively obsolete, federal law no longer provides for the legalization of unlawfully present aliens based on the duration of their presence in the country alone. But unlawfully present aliens often come within the generally applicable criteria that the law uses to select aliens for immigration to the United States. The INA allocates immigrant visas to three major categories of aliens: family-based immigrants, employment-based immigrants, and diversity-based immigrants. Family-based immigrants account for about two-thirds of permanent immigration to the United States each year; employment-based immigrants account for about 12%; and diversity-based immigrants account for about 4% (refugees, asylees, and some other categories account for the remainder). An unlawfully present alien would come within one of these categories, to give some examples, by marrying a U.S. citizen, having a U.S. citizen son or daughter who turns twenty-one, obtaining an offer of employment that qualifies for an employment-based immigrant visa, or entering and winning a visa slot in the diversity lottery program. The law's approach to aliens in this situationâthat is, aliens who become eligible for an immigrant visa while living in the United States in violation of the INAâis to impose two interlinking obstacles to their acquisition of LPR status. First , current law prohibits most (but not all) such aliens from obtaining LPR status unless they depart the United States to apply for the immigrant visa at a U.S. consulate abroad. As discussed below, exceptions to this prohibition allow some groups of unlawfully present aliens who are eligible for immigrant visas to become LPRs by adjusting their status from within the United States. The most notable exception benefits those aliens who enter on a nonimmigrant visa, overstay, and then marry a U.S. citizen or otherwise become the immediate relative of a U.S. citizen. Second , most unlawfully present aliens who depart the United States to apply for immigrant visas abroad will face a bar on readmission of three years from the date of their departure (for aliens unlawfully present for more than 180 days) or ten years from the date of their departure (for aliens unlawfully present for one year or more). Unless they receive a discretionary waiver of the ineligibilityâa remedy with narrow eligibility criteriaâthey generally must wait out the bars abroad. In general, then, the INA imposes a double barrier to the legalization of unlawfully present aliens who come within an immigrant visa category: the law prohibits such aliens from seeking LPR status unless they apply from abroad (the first barrier) and then bars their readmission for three or ten years once they depart the United States (the second barrier). Crucially, the three- and ten-year bars on readmission apply only if the alien departs the United States following the period of unlawful presence. The law that governs an alien's eligibility to adjust status from within the United Statesâthat is, to obtain LPR status without departingâis therefore hugely important, because in most cases it determines whether an unlawfully present alien in an immigrant visa category must face the three- and ten-year bars before obtaining legal status. In many cases, a grant of advance paroleâessentially, an assurance from DHS that it will allow an alien to reenter the country on immigration parole after a trip abroadâcan help an unlawfully present alien become eligible to adjust status, as discussed further below. Adjustment of status under INA Â§ 245 is the legal mechanism that makes it possible for an alien who is present in the United States and qualifies for an immediately available immigrant visa to acquire LPR status without leaving the country. Like most immigration benefits, adjustment of status is a discretionary remedy: the INA authorizes but does not require immigration authorities to grant it to eligible aliens. This mechanism did not exist in federal immigration statute until 1952. Its inexistence before that date sometimes forced creative administrative maneuverings. In the early 1940s, people fleeing German-occupied Europe who entered the United States on temporary visas or on immigration parole, and who qualified for and had the government's support to acquire LPR status, could gain such status only by departing the country to apply for U.S. immigrant visas. A special arrangement between the U.S. and Canadian governments facilitated such persons' entry into Canada to apply for the visas at the U.S. embassy there, with the understanding that they would return to the United States as LPRs. In 1945, President Truman issued a presidential declaration to exempt from this exit-to-enter procedureâwhich he considered \"wasteful\"âa group of about 1,000 displaced persons who had been brought from camps in Italy to a War Relocation Camp near Oswego, New York. The first version of the adjustment of status statute was enacted seven years later. Under current law, an alien seeking to adjust to LPR status within the United States must meet several requirements, two of which have outsize implications for the unlawfully present population: (1) the alien must have been \"inspected and admitted or paroled into theÂ  United States ,\" and (2) the alien must have maintained \"lawful status,\" including by not accepting unlawful employment after entry. Accordingly, aliens who entered the United States surreptitiously generally cannot adjust status, because they were neither \"inspected and admitted\" nor \"paroled\" into the United States, and also because they have not maintained lawful status after entry. Similarly, aliens present in the United States after overstaying their nonimmigrant status generally cannot adjust: although they were \"inspected and admitted,\" they failed to maintain lawful status by overstaying. Exceptions exist to both requirements, however, as do administrative procedures that provide relief from them, as explained below. Perhaps most notably, the second requirementâmaintenance of lawful statusâdoes not apply to the immediate relatives of U.S. citizens. One significant statutory provisionâINA Â§ 245(i)âchanged the adjustment of status framework by lifting the lawful entry and maintenance of status requirements for aliens eligible for family-based or employment-based immigrant visas, provided they paid a $1,000 fine and met certain other requirements. INA Â§ 245(i) thus cleared the way for many unlawfully present aliens, including unlawful entrants, to adjust status. However, the provision has a cutoff dateâit applies only to aliens for whom a visa petition or application for labor certification was submitted before April 30, 2001âthat makes it inapplicable to most cases today. Accordingly, under current law, aliens generally may adjust status only if they meet the lawful entry and maintenance of status requirements or fall within an exception to those requirements. Exceptions to the lawful entry requirement (i.e., the requirement that an alien must have been \"inspected and admitted or paroled\" in order to adjust status) exist for victims of domestic violence, certain statutorily defined \"special immigrants\" who are juveniles or have affiliations with the U.S. Armed Forces, and aliens who meet the INA Â§ 245(i) cutoff date. To illustrate with a domestic violence example, if an alien enters surreptitiously and suffers domestic violence in the United States at the hands of an immediate relative who is a U.S. citizen or LPR, the alien may apply to adjust status notwithstanding the surreptitious entry. Some (but not all) federal courts have held that aliens who acquire Temporary Protected Status (TPS) meet the lawful entry requirement, even if they are present in the United States following a surreptitious entry. Where none of these narrowly drawn exceptions applies, however, a grant of immigration parole from DHS can enable an alien who entered the country surreptitiously to adjust status. In other words, a grant of parole can function as a work-around for the bar that unlawful entry typically poses to adjustment of status. This is because, even if the alien was not \"inspected and admitted,\" the alien can qualify to adjust status by being \"paroled.\" DHS most commonly exercises the parole power to permit entry to aliens not yet on U.S. territory who are (or may be) inadmissible. In some circumstances, however, DHS also grants parole to unlawfully present aliens. Grants of parole to aliens physically present in the U.S. come in two forms: (1) \"parole in place,\" which confers parole status on physically present aliens without requiring them to leave and come back; and (2) \"advance parole,\" which allows unlawfully present aliens to depart the United States with an assurance that they will be permitted to reenter on parole. Both varieties of parole satisfy the lawful entry requirement for adjustment of status, even when granted to an alien present following a surreptitious entry, although for advance parole the alien must actually leave and be paroled back into the country. The eligibility criteria for both of these parole programs are set by DHS and recorded in internal memoranda and agency manuals; no statute or regulation spells out which aliens may qualify for parole in place or advance parole. Accordingly, it can sometimes be difficult to track DHS's practice in granting these forms of relief. The agency appears, however, to place narrow parameters on both programs. Agency materials state that parole in place is granted \"only sparingly\" and affirmatively endorses granting it only to the immediate relatives of members of the U.S. armed forces. When DHS does grant parole in place to an unlawfully present alien, however, the primary purpose is apparently to help the recipient to adjust status. Advance parole, according to agency materials, is available to unlawfully present aliens who receive many types of discretionary reprieves from removal (such as TPS and Deferred Enforced Departure), although DHS sometimes makes clear that it grants advance parole only for a narrow set of travel purposes, including to visit ill family members or attend their funeral. DHS does not appear to grant advance parole for the purpose of facilitating adjustment of status applications by unlawful entrants, but advance parole has that effect. An unlawfully present alien who receives a grant of advance parole and then leaves and reenters the United States pursuant to that grant is not subject to the three- or ten-year bar for unlawful presence. Those bars apply only to aliens who \"depart\" the United States after the period of unlawful presence, and under current case law, a trip abroad pursuant to a grant of advance parole does not count as a \"departure\" for purposes of those bars. The applicability of these forms of parole to unlawfully present aliens has generated controversy on both sides of the immigration debate. Some Members of Congress have criticized advance parole and its facilitation of adjustment of status applications as a loophole that subverts enforcement of the statutory bars for unlawful presence. The former INS, pursuing a similar theory, issued a regulation in 1997 that made many parolees ineligible for adjustment of status under INA Â§ 245(a), but multiple federal appellate courts struck down the regulation as incompatible with the statute and DHS repealed the regulation in 2006. On the other side of the debate, some immigration advocates have called for the expansion of parole in place and advance parole as a way to clear a path to legalization for a large segment of the unlawfully present population (namely, those eligible for immigrant visas on the basis of family relationships or other grounds). Even if the lawful entry requirement is met, INA Â§ 245(c)(2) generally bars aliens from adjusting status if they fail to maintain lawful status in any of three ways: (1) if they are \"in unlawful immigration status on the date of filing the application for adjustment\"; (2) if they have failed \"to maintain continuously a lawful status since entry into the United States\"; or (3) if they have engaged in \"unauthorized employment.\" As such, Â§ 245(c)(2) generally bars unlawfully present aliens from adjusting status, even if they satisfy the lawful entry requirement, due to their lack of lawful immigration status. The Â§ 245(c)(2) bar does have exceptions, however. It does not apply to the immediate relatives of U.S. citizens. Thus, as already mentioned, if an alien overstays a nonimmigrant visa and then marries a U.S. citizen, the alien's failure to maintain lawful status does not bar an application for adjustment. Under other exceptions, the bar for failure to maintain lawful status also does not apply to certain domestic violence victims, certain \"special immigrants,\" applicants for employment-based immigrant visas with a lapse or lapses in status not exceeding 180 days in the aggregate, and aliens who meet the April 30, 2001, cutoff date of INA Â§ 245(i). As the prior section explains, many unlawfully present aliens who are eligible to immigrate based on family relationships or other grounds do not qualify for adjustment of status because of the statutory requirements concerning lawful entry and maintenance of lawful status. These aliens, therefore, cannot obtain LPR status from within the United States. Such aliens may still pursue LPR status by departing the country and applying for an immigrant visa at a U.S. consulate abroad. Most unlawfully present aliens who take this route, however, encounter a significant obstacle: their departure from the United States triggers the three-year unlawful presence bar (for those who were unlawfully present for between 180 and 365 days) or the ten-year unlawful presence bar (for those who were unlawfully present for more than year). Aliens qualify for a discretionary waiver of these bars only if (1) they are the \"spouse or son or daughter\" of a U.S. citizen or LPRâthe parents of U.S. citizens or LPRs do not qualify; and (2) their inability to return to the United States during the applicable time bar (three or ten years from the date they departed the United States) would \"result in extreme hardship\" to their U.S. citizen (or LPR) parent or spouse. DHS interprets extreme hardship to mean \"more than the usual level of hardshipÂ that commonly results from family separationÂ or relocation.\" Aliens who do not receive discretionary waivers must remain outside the United States for the duration of the bar, unless DHS grants them parole or they receive a discretionary waiver on a future visa application. Although the eligibility criteria for the unlawful presence waivers are narrow, DHS allows unlawfully present aliens to apply for the waivers from within the United States, before they depart for their visa interviews abroad, so long as the aliens are not inadmissible on other grounds and meet other requirements. This \"provisional waiver\" program mitigates the uncertainty that unlawfully present aliens face as to how long they will have to remain abroad if they leave the United States to apply for an immigrant visa. DHS introduced the provisional waiver program in 2013, but immigration authorities provided relief of a similar nature as early as 1935, when the Immigration and Naturalization Service (INS) began the practice of \"pre-examining\" unlawfully present aliens domestically before channeling them into immigrant visa application procedures in Canada. The following hypotheticals are intended to demonstrate how the INA provisions described in this section work in practice. Each hypothetical assumes that the alien (1) has not departed the United States after entry and (2) is not inadmissible to the United States for reasons other than unlawful entry or unlawful presence (such as a conviction for a crime of moral turpitude). 1. An alien is admitted to the United States on a B-2 tourist visa for six months. He overstays. Ten years later, he marries a U.S. citizen, who obtains an approved immigrant visa petition on his behalf. Even though the alien has been out of legal status for ten years, he is eligible to adjust to LPR status. He will not face the ten-year unlawful presence bar unless he departs the United States before obtaining LPR status. 2. Same facts as the previous example, except that the alien enters the United States surreptitiously rather than on a visitor visa. Even with an approved immigrant visa petition as the spouse of a U.S. citizen, he is not eligible to adjust status because of his unlawful entry. To obtain LPR status, he must apply for an immigrant visa at a U.S. consulate abroad. His departure from the country will trigger the ten-year unlawful presence bar. He may apply for a provisional waiver of the bar before departing, but he must show \"extreme hardship\" to his spouse to succeed on the application. 3. An alien enters the United States surreptitiously and subsequently has a daughter. After the daughter (a U.S. citizen) turns twenty-one, she obtains an approved immigrant visa petition for her mother. The mother is not eligible to adjust status due to her unlawful entry. To obtain LPR status, she must apply for an immigrant visa at a U.S. consulate abroad. Her departure from the country will trigger the ten-year unlawful presence bar, and she is not eligible for a waiver. 4. Same facts as the previous example, except that the U.S. citizen daughter is in the military. Her mother may qualify for parole in place, which would make her eligible to adjust status. In that scenario, the mother would not face the ten-year unlawful presence bar unless she departs the United States before obtaining LPR status. 5. An alien enters the United States surreptitiously at age eight. At age twenty-two, he receives a grant of Deferred Action for Childhood Arrivals (DACA). At age twenty-three, he marries a U.S. citizen, who obtains an approved immigrant visa petition on his behalf. The alien is not eligible to adjust status due to his unlawful entry. To obtain LPR status, he must apply for an immigrant visa at a U.S. consulate abroad. His departure from the country will trigger the ten-year unlawful presence bar. He may apply for a provisional waiver of the bar before departing, but he must show \"extreme hardship\" to his spouse to succeed on the application. 6. Same facts as the previous example, except that the alien, after receiving DACA and after the immigrant visa petition is approved, was granted advance parole to visit a sick family member abroad. Upon being paroled back into the United States following his trip abroad, he became eligible to adjust status. He will not face the ten-year unlawful presence bar unless he departs the United States before obtaining LPR status. The INA's cancellation of removal provision authorizes immigration judges to grant LPR status to some unlawfully present aliens who are in removal proceedings and who have lived in the United States for at least ten years. Aliens qualify, however, only if, aside from meeting other requirements, they show that their removal would cause \"exceptional and extremely unusual hardship\" to immediate relatives who are U.S. citizens or LPRs. The lineage of this form of relief extends back at least to 1935, when two members of President Franklin Roosevelt's cabinet, frustrated by the lack of a statutory mechanism to grant relief from deportation in hardship cases, used bureaucratic ingenuity to implement \"a two-step procedure whereby the secretary [of labor] granted [an] illegal alien a waiver from deportation and allowed him or her to depart to Canada and to reenter the United States as a legal permanent resident.\" In 1940, Congress rendered this arrangement unnecessary by enacting the first clearly delineated statutory form of relief from deportation in hardship cases, which was called \"suspension of deportation\" until 1996. The Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) of 1996 replaced \"suspension of deportation\" with \"cancellation of removal,\" a more restrictive form of relief due in part to its higher threshold for qualifying hardship and its omission of hardship to the alien (as opposed to the alien's U.S. family) as a basis for relief. Under the current version of the INA, one form of cancellation of removal exists for LPRs in removal proceedings, and one exists for non-LPRs, including unlawfully present aliens. To qualify for non-LPR cancellation of removal, aliens must have been physically present in the United States for the ten years preceding their application, and, critically, they must make the requisite showing of \"exceptional and extremely unusual hardship\" to their U.S. citizen or LPR immediate relatives. \"Exceptional and unusual hardship\" means a level of hardship to an immediate relative that is \"'substantially' beyond the ordinary hardship that would be expected when a close family member leaves this country.\" The paradigmatic case involves \"a U.S. citizen child with a serious medical condition who, if [cancellation of removal] is denied, would be either involuntarily separated from her parent or relocated to a country where adequate medical treatment is not available.\" Aliens also must show good moral character and not have certain types of criminal convictions. Like adjustment of status, cancellation of removal is a discretionary form of relief, meaning that immigration judges retain discretion to deny it even to aliens who meet the statutory criteria. The INA caps cancellations of removal for non-LPRs at 4,000 per year, although the cap does not apply to some groups. If the cap has been reached in a particular fiscal year but the immigration judge determines that a cancellation of removal application should be granted, the judge must reserve decision until a subsequent fiscal year when cap spaces are available. Finally, cancellation of removal is available only as a defense to removal, meaning that aliens can apply for cancellation only if they are in removal proceedings. They cannot apply for relief affirmatively (i.e., outside of removal proceedings). When an immigration judge grants cancellation of removal to an unlawfully present alien, the alien becomes an LPR. Some commentators have thus called cancellation of removal a mechanism for \"case-by-case legalization.\" But the major parameters for this mechanismâthe annual cap, the fact that aliens cannot apply for it affirmatively but instead only in removal proceedings, and the required hardship showingâsharply limit its availability. The lack of an affirmative channel for requesting cancellation of removal, in particular, has prompted some aliens who believe they clearly qualify for cancellation to proactively prompt DHS to initiate removal proceedings against them. The aliens do this, through their counsel, by making a special request to DHS or by filing an affirmative application for asylum, which upon denial triggers an automatic referral to removal proceedings. This strategy has pitfalls, however: it affirmatively triggers proceedings that could end in removal, and, in any event, immigration judges have discretion to dismiss the proceedings without granting cancellation upon determining that the alien filed \"a meritless asylum application with the USCIS for the sole purpose of seeking cancellation of removal in the Immigration Court.\" Other mechanisms in the INA provide for the legalization of unlawfully present aliens who suffer particular types of harms. Asylum offers the prospect of LPR status to unlawfully present aliens who would face a risk of persecution if returned to their countries of origin, while the related protections of withholding of removal and relief under the Convention against Torture (CAT) offer more limited relief from persecution or torture. A series of nonimmigrant visas, including the U visa, offer the prospect of relief to unlawfully present aliens who are the victims or witnesses of certain crimes. Unlawfully present aliens may qualify for asylum, a lawful immigration status with a pathway to LPR status and citizenship, if they have suffered persecution in their country of origin or have a well-founded fear of suffering such persecution upon returning to that country. The general eligibility criteria for asylum include a requirement that the persecution be on account of an enumerated statutory ground (race, religion, nationality, membership in a particular social group, or political opinion). Aliens who have persecuted others or committed \"serious crimes\" are not eligible. The law of asylum is a broad subject that in most respects is conceptually distinct from the issue of legalization. Asylum is a general remedy for aliens in or at the threshold of the United States who suffer persecution, not a form of relief designed specifically for the unlawfully present population. However, asylum can work as a legalization mechanism in some cases. Lawful entry and maintenance of lawful status are not prerequisites to asylum. Periods of unlawful presence do not affect an alien's eligibility. Put differently, aliens present within the United States may qualify for asylum regardless of surreptitious entry or unlawful presence. Thus, for those unlawfully present aliens who have suffered persecution and meet the other statutory requirements, asylum, much like cancellation of removal, offers a path to LPR status. Unlike cancellation of removal, however, unlawfully present aliens may apply for asylum affirmatively. As relevant here, a few aspects of asylum law bear directly on the nature and availability of this form of relief to unlawfully present aliens. First, eligibility to apply for asylum is time-restricted. Although aliens may apply for asylum either affirmatively (i.e., on their own accord, even if the government is not seeking to remove them) or defensively (i.e., as a defense in removal proceedings), generally they must apply within one year of arriving in the United States. Thus, asylum is not available to most unlawfully present aliens who have been in the United States for long periods of time. Second, asylum offers a secure form of relief to unlawfully present aliens. Asylees are not subject to removal unless their status is terminated for a specified statutory reason; their spouses and minor children may apply to join them in the United States in asylee status; asylees are authorized to work; and, as already mentioned, they have a direct pathway to LPR status and therefore to citizenship. Unlawfully present aliens who do not obtain asylum may qualify for a more limited form of relief under the INA's provision for \"restriction on removal\" (commonly called \"withholding of removal\"), which prohibits the removal of aliens to a country where their \"life or freedom would be threatened\" on account of \"race, religion, nationality, membership in a particular social group, or political opinion.\" Somewhat similarly, statutory and regulatory provisions implementing the Convention Against Torture prohibit the removal of aliens to any country in which there is substantial reason to believe they could be tortured. Unlike asylum, these two forms of relief do not create an avenue to LPR status and do not confer many of the other advantages typically associated with lawful immigration status, such as the ability to seek admission to the United States following a trip abroad or the ability to sponsor family members for admission. As such, withholding of removal and CAT protection arguably do not constitute legalization mechanisms, although they do confer a defense to removal and work authorization on recipients. Withholding and CAT protection also have a stricter burden of proof than asylum. In a different vein, unlike asylum, which is a discretionary form of relief, these two forms of relief are mandatoryâimmigration judges must grant them to eligible aliens. Nor do withholding of removal or CAT relief have one-year application deadlines. The INA authorizes DHS to grant three special nonimmigrant statuses to unlawfully present aliens who are victims or witnesses of certain crimes and who provide assistance to law enforcement. First and most broadly, aliens who suffer \"substantial physical or mental abuse\" from certain crimes committed against them in the United States (including rape, domestic violence, and kidnapping, among other qualifying offenses) and who assist in the investigation or prosecution of those crimes may qualify for nonimmigrant U visa status. Second, victims of sex trafficking or slavery trafficking who comply with \"reasonable requests for assistance\" from law enforcement may qualify for nonimmigrant T visa status if removal would cause them \"extreme hardship.\" Third, aliens willing to provide \"critical reliable information\" about criminal or terrorist organizations may qualify for nonimmigrant S visa status. The INA caps U visas at 10,000 per year, T visas at 5,000 per year, and S visas at 250 per year across two subcategories (these caps do not apply to immediate family members who qualify derivatively). Recipients of each of the three statuses may adjust to LPR status if they satisfy specific statutory requirements. Of these three nonimmigrant statuses, U visa status has the broadest eligibility criteria and, as such, is the most frequently sought by unlawfully present aliens and also the most frequent subject of litigation and commentary. DHS has reached the statutory cap of 10,000 U visas in every fiscal year since 2010 and, as of the first quarter of FY2019, had a backlog of 234,114 pending U visa applications. Unlawfully present aliens on the waiting list for a U visa typically receive a discretionary reprieve from removalâdeferred action or parole. However, it takes an average of four years for DHS to vet applicants for eligibility before placing them on the waiting list and granting them deferred action or parole. Although the legalization mechanisms in the INA are narrow, U.S. immigration law has used two other methods to confer legal immigration status or other protections from removal on segments of the unlawfully present population: (1) ad hoc legalization laws that, rather than reforming the INA's generally applicable legalization provisions going forward, offer one-time relief or offer relief only for discrete populations, and (2) discretionary reprieves from removal, such as deferred action, that confer weaker protection sometimes described as \"quasi-legal status.\" In the second half of the twentieth century, Congress enacted a major one-time legalization program and also enacted other ad hoc legalization measures for narrowly defined populations. The Immigration Reform and Control Act (IRCA) of 1986 contained two primary legalization measures that offered the prospect of LPR status to much of the population of aliens without legal status in the United States at that time. These were one-time legalization measures: they benefited only those aliens without legal status who had been in the United States since 1982 or who had performed agricultural work in the United States for at least ninety days between May 1985 and May 1986. The law specified a limited application period for both programs. The major rationale appears to have been that one-time legalization relief would not undermineâand might even advanceâthe deterrence of future illegal immigration, which was another major goal of IRCA. In other words, Congress appears to have reasoned that a one-time legalization program for aliens already in the United States, unlike a legalization mechanism baked into the regular framework of the INA, would not encourage aliens to enter or remain in the country in violation of the INA in the future. Aside from IRCA, Congress also enacted other legalization laws in the second half of the twentieth century that targeted particular nationalities rather than aliens present at a particular juncture. For example, the Cuban Adjustment Act of 1966, the Nicaraguan Adjustment and Central American Relief Act, and the Chinese Student Protection Act of 1992 all created special mechanisms for some aliens without legal status of particular nationalities to acquire LPR status or to seek LPR status under less exacting criteria than those generally applicable under the INA. A more recent law created a special permanent resident status for long-time residents of the Commonwealth of the Northern Mariana Islands facing revocation of immigration parole. Somewhat like IRCA, these laws created targeted relief for aliens who fell within specific parameters but did not alter the INA's generally restrictive approach to legalization for all other aliens. Proposed legalization legislation in the 21st century has generally followed the ad hoc mold of offering relief only to aliens who were unlawfully present in the United States during a specified time period or who fit within narrowly defined groups, or both. The various Dream Act proposals to create a pathway to LPR status for aliens without legal status who were brought to the United States as children, for example, would cover aliens who entered the United States before a particular date (usually several years before enactment) and who have resided in the United States since entry. Legalization provisions in comprehensive immigration reform bills that the Senate passed in 2006 and 2013, beyond providing for relief to childhood arrivals, also would have provided for relief to many or most unlawfully present aliens who lived in the United States during a specified time period and to certain agricultural workers. Other bills would create special adjustment of status mechanisms for recipients of TPS and Deferred Enforced Departure. All of these ad hoc proposals stand in contrast to less common proposals to amend the generally applicable legalization mechanisms in the INA going forward, such as proposals to advance the cutoff date for registry under INA Â§ 249 or for the adjustment of status mechanism for unlawfully present aliens in INA Â§ 245(i). In recent decades immigration authorities have increasingly exercised their enforcement discretion to grant unlawfully present aliens temporary reprieves from removal, such as deferred action, DACA, or TPS. These and other types of discretionary reprieves from removal, which are covered at more length in another CRS report, have thus become a significant aspect of the federal government's regulation of the unlawfully present population. Two events, in particular, did much to increase the number of aliens receiving discretionary reprieves: (1) the enactment of the TPS statute in 1990, which created a discretionary reprieve program for nationals of countries that the Secretary of DHS designates as unsafe for return because of armed conflict, natural disaster, or other extraordinary conditions, and (2) the executive branch's implementation of the DACA program in 2012 for certain unlawfully present aliens brought to the United States as children. Together, TPS and DACA appear to cover more than one million aliens whose presence in the United States violates the INA, although that figure may well decline in the near term as a result of recent executive branch efforts to terminate or curtail these reprieve programs. The grant of a discretionary reprieve constitutes an assurance from DHS that the recipient does not face imminent removal. Discretionary reprieves are not legalization mechanisms because they do not extinguish the basis of the alien's removability under the INA. They therefore do not offer steadfast protection from removal. For example, if an alien overstays a nonimmigrant visa and then receives a grant of deferred action from DHS, the risk remains that DHS will decide to pursue the alien's removal in the future. Yet discretionary reprieves typically confer other advantages, including eligibility for work authorization and the nonaccrual of unlawful presence during the duration of the reprieve. Legal scholars use an array of terms for the peculiar sort of relief that discretionary reprieves provide: \"quasi-legal status,\" \"liminal\" or \"twilight\" status, and the \"status of nonstatus.\" The INA subjects the more than ten million unlawfully present aliens in the United States to removal without a limitations period and gives them few opportunities to legalize. Political views of this generally restrictive approach to legalization differ: some favor creating expanded, mostly ad hoc pathways to legalization; others find the extant pathways to legalization too permissive and seek to curtail them. The debate is informed by the INA's current approach to legalization. The INA does not provide an avenue for an appreciable number of unlawfully present aliens to obtain lawful status based on long-standing presence, as the registry statute once did. The INA's penalties for unlawful entry and unlawful presence make it difficult for unlawfully present aliens to obtain lawful status based on qualifying family relationships (except, most notably, for nonimmigrant overstays who become immediate relatives of U.S. citizens). And it allows legalization on hardship grounds only in cases of truly extreme hardship to immediate relatives who are U.S. citizens or LPRs. Forms of humanitarian relief from persecution and other harms, such as asylum and the U visa program, do not exclude unlawfully present aliens from their reach but nonetheless have specific objectives and tailored eligibility criteria. Meanwhile, discretionary reprieves from removal and the quasi-legal status they confer upon unlawfully present aliens have become major components of the U.S. immigration system.", "summary": "The population of unlawfully present aliens in the United States numbers between ten million and twelve million, according to recent estimates. The Immigration and Nationality Act (INA) takes three primary approaches to regulating this population: removal, deterrence, andâto a lesser extentâlegalization. Legalization, as used here, means the granting of a lawful immigration status to an unlawfully present alien so that he or she is no longer subject to removal under the INA. Put differently, an unlawfully present alien \"legalizes\" by obtaining lawful permanent resident status (LPR or \"green card\" status) or any other status (such as a nonimmigrant status) that extinguishes the statutory basis for his or her removal. The INA takes a generally restrictive approach to legalization. During much of the 20th century, a statutory provision called \"registry\" allowed unlawfully present aliens to obtain LPR status based on their long-standing presence in the United States. If unlawfully present aliens had entered the United States before a fixed cutoff date and satisfied other requirements, such as a lack of certain types of criminal convictions, they could apply to the Attorney General for LPR status. The registry statute is now effectively obsolete because its cutoff date, which Congress last updated in 1986, remains fixed at 1972. The most consequential body of legalization principles in the INA governs when unlawfully present aliens may obtain LPR status through qualifying family relationships or on other qualifying grounds. In general, the INA imposes barriers to the acquisition of LPR status for unlawfully present aliens who come within one of the three major categories that the law uses to select aliens for immigration to the United States: family-based immigrants, employment-based immigrants, and diversity immigrants. Specifically, most unlawfully present aliens who come within these categories must pursue LPR status by departing the United States to apply for an immigrant visa abroad (rather than applying to adjust status within the United States), and their departure typically triggers a ten-year bar on readmission to the United States. There are important exceptions to this general framework, however. In particular, an alien who overstays a nonimmigrant visa and then becomes the immediate relative of a U.S. citizen (through marriage, for example) may generally apply to adjust to LPR status without leaving the country and without facing any time bars on admission. Other INA provisions allow for legalization on hardship or humanitarian grounds. Cancellation of removal allows for legalization where the removal of an unlawfully present alien would cause hardship to immediate relatives who are U.S. citizens or LPRs, but the hardship must be \"exceptional and extremely unusual.\" Cancellation of removal also is generally only available as a defense in removal proceedings (aliens cannot apply for it affirmatively), is subject to an annual cap, and, among other requirements, is only available to unlawfully present aliens who have been in the United States for at least ten years. As for humanitarian relief, asylum creates a pathway to LPR status for unlawfully present aliens who have a well-founded fear of persecution or suffered past persecution in their countries of origin. However, aliens generally must apply for asylum within one year of arriving in the United States (unless an exception applies), so asylum is not available to most unlawfully present aliens who have been in the country for long periods of time. Subsidiary protections from persecution and tortureâwithho lding of removal and protection under the Convention Against Torture (CAT)âdo not have the one-year application deadline, but they offer more limited relief that arguably does not qualify as lawful immigration status. Separately, a series of nonimmigrant statuses, including the U visa, offer the prospect of lawful immigration status to unlawfully present aliens who are victims or witnesses of certain crimes. U.S. immigration law has also taken other approaches to legalization, separate and apart from the narrow legalization provisions in the INA. First, Congress occasionally has enacted ad hoc legalization laws that, rather than reforming the INA's generally applicable provisions going forward, have offered one-time relief or relief only for discrete populations. Second, executive branch agencies have exercised enforcement discretion to grant unlawfully present aliens discretionary reprieves from removal, such as deferred action or the Deferred Action for Childhood Arrivals (DACA) initiative, which have conferred a weaker form of protection than lawful immigration status. This weaker form of protection is sometimes known as \"quasi-legal status\" and, although it typically confers work authorization and gives an unlawfully present alien an assurance that immigration authorities will not pursue his or her removal during a certain time, it does not extinguish the statutory basis for the alien's removal.", "document_type": "crs"}
{"report": "Congress is currently considering legislation for a long-term reauthorization of the National Flood Insurance Program (NFIP). The last long-term reauthorization of the NFIP was by the Biggert-Waters Flood Insurance Reform Act of 2012 (hereinafter BW-12), from July 6, 2012, to September 30, 2017. Congress amended elements of BW-12, but did not extend the NFIP's authorization further, in the Homeowner Flood Insurance Affordability Act of 2014 (HFIAA). Since the end of FY2017, 15 short-term NFIP reauthorizations have been enacted. The NFIP is currently authorized until September 30, 2020. The NFIP is managed by the Federal Emergency Management Agency (FEMA). The general purpose of the NFIP is both to offer primary flood insurance to properties with significant flood risk and to reduce flood risk through the adoption of floodplain management standards. A longer-term objective of the NFIP is to reduce federal expenditure on disaster assistance after floods. The NFIP is discussed in more detail in CRS Report R44593, Introduction to the National Flood Insurance Program (NFIP) , by Diane P. Horn and Baird Webel. The NFIP is the primary source of flood insurance coverage for residential properties in the United States. As of December 2019, the NFIP had more than 5 million flood insurance policies providing over $1.3 trillion in coverage. The program collects about $4.6 billion in annual revenue from policyholders' premiums, fees, and surcharges. Over 22,000 communities in 56 states and jurisdictions participate in the NFIP. According to FEMA, the program saves the nation an estimated $1.87 billion annually in flood losses avoided because of the NFIP's building and floodplain management regulations. Floods are the most common natural disaster in the United States. All 50 states, plus the District of Columbia (DC), Puerto Rico, Guam, American Samoa, the U.S. Virgin Islands, and the Northern Mariana Islands have experienced flood events since May 2018. Total U.S. flood losses in 2016 were about $28 billion. 2017 was the most costly year for U.S. flood losses on record, with total losses estimated at $276.3 billion. The total for the 2017 hurricanes significantly exceeded the previous record of $214.8 billion (CPI-adjusted), from the 2005 hurricane season. Total U.S. flood losses for 2018 are estimated at $49.4 billion. All of these losses are greater than the $20.3 billion annual average flood losses estimated by the Congressional Budget Office in April 2019. The statute for the NFIP does not contain a comprehensive expiration, termination, or sunset provision for the whole of the program. Rather, the NFIP has multiple different legal provisions that generally tie to the expiration of key components of the program. Unless reauthorized or amended by Congress, the following will occur after September 30, 2020: The authority to provide new flood insurance contracts will expire. Flood insurance contracts entered into before the expiration would continue until the end of their policy term of one year. The authority for NFIP to borrow funds from the Treasury will be reduced from $30.425 billion to $1 billion. Other activities of the program would technically remain authorized following September 30, 2020, such as the issuance of Flood Mitigation Assistance (FMA) grants. However, the expiration of the key authorities described above would have varied, generally serious effects on these remaining NFIP activities. The House Financial Services Committee amended and ordered reported a bill for the long-term reauthorization of the NFIP, the National Flood Insurance Program Reauthorization Act of 2019 ( H.R. 3167 ), on June 11, 2019. H.R. 3167 was reported, as amended, on October 28, 2019 ( H.Rept. 116-262 , Part 1). H.R. 3167 would reauthorize the NFIP until September 30, 2024. One bill has been introduced in the Senate, on July 18, 2019, to reauthorize the expiring provisions of the NFIP, the National Flood Insurance Program Reauthorization and Reform Act of 2019 ( S. 2187 ), with a companion bill in the House, H.R. 3872 . These bills have not yet been considered by the committees of jurisdiction. S. 2187 and H.R. 3872 would also reauthorize the NFIP until September 30, 2024. The remainder of this report will summarize relevant background information and proposed changes to selected areas of the NFIP in H.R. 3167 and S. 2187 . The report does not examine every provision in detail, but focuses on selected provisions that would introduce significant changes to the NFIP, particularly those related to the issues identified by the Government Accountability Office (GAO) described below. The provisions in H.R. 3167 and S. 2187 are listed in Table 1 at the end of the report. In a 2017 report, GAO examined actions which Congress and FEMA could take to reduce federal fiscal exposure and improve national resilience to floods, and recommended that Congress should consider comprehensive reform covering six areas: (1) outstanding debt; (2) premium rates; (3) affordability; (4) consumer participation; (5) barriers to private sector involvement; and (6) NFIP flood resilience efforts. As a public insurance program, the goals of the NFIP were originally designed differently from the goals of private-sector companies. As currently authorized, the NFIP also encompasses social goals to provide flood insurance in flood-prone areas to property owners who otherwise would not be able to obtain it, and reduce government's cost after floods. The NFIP also engages in many \"non-insurance\" activities in the public interest: it disseminates flood risk information through flood maps, requires communities to adopt land use and building code standards in order to participate in the program, potentially reduces the need for other post-flood disaster aid, contributes to community resilience by providing a mechanism to fund rebuilding after a flood, and may protect lending institutions against mortgage defaults due to uninsured losses. The benefits of such tasks are not directly measured in the NFIP's financial results from underwriting flood insurance. From the inception of the NFIP, the program has been expected to achieve multiple objectives, some of which may conflict with one another: To ensure reasonable insurance premiums for all; To have risk-based premiums that would make people aware of and bear the cost of their floodplain location choices; To secure widespread community participation in the NFIP and substantial numbers of insurance policy purchases by property owners; and To earn premium and fee income that, over time, covers claims paid and program expenses. On December 21, 2018, Congress passed a stand-alone reauthorization bill, the National Flood Insurance Program Extension Act, to ensure that NFIP did not lapse during the funding gap that led to a partial government shutdown from December 21, 2018, to January 25, 2019. However, on December 26, 2018, FEMA announced changes to the operation of the NFIP in response to the shutdown, advising Write-Your-Own (WYO) companies to suspend sales operations, including the sale of new policies and the renewal of existing policies. FEMA's reason for suspending sales operations, despite the reauthorization of the NFIP, was that the WYO companies were entitled to a fee from the sale or renewal of flood insurance policies and that such a fee may be considered an impermissible funding obligation during a lapse in annual appropriations. Following protests from a number of congressional offices, the insurance industry, and the real estate industry, on December 28, 2018, FEMA rescinded the guidance and directed all NFIP insurers to resume normal operations immediately, advising that the NFIP would be considered operational since December 21, 2018, without interruption. Both H.R. 3167 and S. 2187 include a provision to reduce the impact of a future government shutdown on NFIP operations. Section 101 would allow for a retroactive effective date in the event of a lapse in appropriations of the NFIP. Section 101 would allow for continuous operation during any lapse in appropriations, with a provision that amounts in the Reserve Fund may be credited to the National Flood Insurance Fund (NFIF) to enter into and renew contracts for flood insurance. GAO noted that competing aspects of the NFIP, notably the desire to keep flood insurance affordable while making the program fiscally solvent, have made it challenging to reform the program. Promoting participation in the program, while at the same time attempting to fund claims payments with the premiums paid by NFIP policyholders, provides a particular challenge. Throughout its history, the NFIP has been asked to set premiums that are simultaneously \"risk-based\" and \"reasonable.\" Different Administrations and Congresses have placed varied emphases and priorities on those goals for premium setting. GAO has reported in several studies that NFIP's premium rates do not reflect the full risk of loss because of various legislative requirements, which exacerbates the program's fiscal exposure. GAO also noted in several reports that while Congress has directed FEMA to provide subsidized premium rates for policyholders meeting certain requirements, it has not provided FEMA with funds to offset these subsidies and discounts, which has contributed to FEMA's need to borrow from the U.S. Treasury to pay NFIP claims. The Congressional Budget Office analysis of H.R. 3167 estimated that enacting the changes that are not related to extending the program would increase direct spending by $678 million over the 2020-2029 period. As of June 2019, the written premium on just over 5 million policies in force was $3.5 billion, with an additional $1.09 billion from fees and surcharges. The maximum coverage for single-family dwellings (which also includes single-family residential units within a 2-4 family building) is $100,000 for contents and up to $250,000 for buildings coverage. The maximum available coverage limit for other residential buildings is $500,000 for building coverage and $100,000 for contents coverage, and the maximum coverage limit for non-residential business buildings is $500,000 for building coverage and $500,000 for contents coverage. Included within NFIP premiums are several fees and surcharges mandated by law on flood insurance policies. First, the Federal Policy Fee (FPF) was authorized by Congress in 1990 and helps pay for the administrative expenses of the program, including floodplain mapping and some of the insurance operations. The amount of the Federal Policy Fee is set by FEMA and can increase or decrease year to year. Since October 2017, the FPF has been $50 for Standard Flood Insurance Policies (SFIPs), $25 for Preferred Risk Policies (PRPs), and $25 for contents-only policies. Second, a reserve fund assessment was authorized by Congress in BW-12 to establish and maintain a reserve fund to cover future claim and debt expenses, especially those from catastrophic disasters. By law, FEMA is required to maintain a reserve ratio of 1% of the total loss exposure through the reserve fund assessment. As of June 2019, the amount required for the reserve fund ratio was approximately $13.16 billion. However, FEMA is allowed to phase in the reserve fund assessment to obtain the ratio over time, with an intended target of not less than 7.5% of the 1% reserve fund ratio in each fiscal year (so, using June 2019 figures, not less than approximately $986.8 million each year). The reserve fund assessment has increased from its original status, in October 2013, of 5% on all SFIPs and 0% on PRPs. Since April 2016, FEMA has charged every NFIP policy a reserve fund assessment equal to 15% of the premium. However, FEMA has stated that as long as the NFIP maintains outstanding debt, it would expect that the reserve fund will not reach the required balance, as amounts collected may be periodically transferred to Treasury to reduce the NFIP's debt. In addition to the reserve fund assessment, all NFIP policies are also assessed a surcharge following the passage of HFIAA. The amount of the surcharge is dependent on the type of property being insured. For primary residences, the charge is $25; for all other properties, the charge is $250. Revenues from the surcharge are deposited into the reserve fund. The HFIAA surcharge is not considered a premium and is currently not included by FEMA when calculating limits on insurance rate increases. In April 2019, FEMA began charging a 5% premium on all severe repetitive loss properties. One additional surcharge may be levied if a community is on probation from the NFIP. All policyholders in that community will be charged a probation surcharge of $50 for a full one-year period, even if the community brings its program into compliance and is removed from probation. Except for certain subsidies, flood insurance rates in the NFIP are directed to be \"based on consideration of the risk involved and accepted actuarial principles,\" meaning that the rate is reflective of the true flood risk to the property. However, Congress has directed FEMA not to charge actuarial rates for certain categories of properties and to offer discounts to other classes of properties in order to achieve the program's objective that owners of existing properties in flood zones could afford flood insurance. There are three main categories of properties which pay less than full risk-based rates. Pre-FIRM properties are those which were built or substantially improved before December 31, 1974, or before FEMA published the first Flood Insurance Rate Map (FIRM) for their community, whichever was later. By statute, pre-FIRM structures are allowed to have lower premiums than what would be expected to cover predicted claims. The availability of this pre-FIRM subsidy was intended to allow preexisting floodplain properties to contribute in some measure to pre-funding their recovery from a flood disaster instead of relying solely on federal disaster assistance. In essence, the flood insurance could distribute some of the financial burden among those protected by flood insurance and the public. As of September 2018, approximately 13% of NFIP policies received a pre-FIRM subsidy. Historically, the total number of pre-FIRM policies is relatively stable, but the percentage of those policies as a share of the total policy base has decreased. BW-12 phased out almost all subsidized insurance premiums, requiring FEMA to increase rates on certain subsidized properties at 25% per year until full-risk rates were reached: these included secondary residences, businesses, severe repetitive loss properties, and properties with substantial cumulative damage. Subsidies were eliminated immediately for properties where the owner let the policy lapse, any prospective insured who refused to accept offers for mitigation assistance, and properties purchased after or not insured by NFIP as of July 6, 2012. All properties with subsidies not being phased out at higher rates, or already eliminated, were required to begin paying actuarial rates following a five-year period, phased in at 20% per year, after a revised or updated FIRM was issued for the area containing the property. Thus the subsidies on pre-FIRM properties would have been eliminated within five years following the issuance of a new FIRM to a community. As BW-12 went into effect, constituents from multiple communities expressed concerns about the elimination of lower rate classes, arguing that it created a financial burden on policyholders, risked depressing home values, and could lead to a reduction in the number of NFIP policies purchased. Concerns over the rate increases created by BW-12 led to the passage of HFIAA, which reinstated certain premium discounts and slowed down some of the BW-12 premium rate increases. HFIAA repealed the property-sale trigger for an automatic full-risk rate and slowed the rate of phaseout of the pre-FIRM subsidy for most primary residences, allowing for a minimum and maximum increase in the amount for the phaseout of pre-FIRM subsidies for all primary residences of 5%-18% annually. HFIAA retained the 25% annual phaseout of the subsidy from BW-12 for all other categories of properties. HFIAA established a new subsidy for properties that are newly mapped into a Special Flood Hazard Area (SFHA) on or after April 1, 2015, if the applicant obtains coverage that is effective within 12 months of the map revision date. Certain properties may be excluded based on their loss history. The rate for eligible newly mapped properties is equal to the PRP rate, but with a higher Federal Policy Fee, for the first 12 months following the map revision. After the first year, the newly mapped rate begins to transition to a full-risk rate, with annual increases to newly mapped policy premiums calculated using a multiplier that varies by the year of the map change. As of September 2018, about 4% of NFIP policies receive a newly mapped subsidy. Using the authority to set rate classes for the NFIP and to offer lower than actuarial premiums, FEMA allows owners of properties that were built in compliance with the FIRM in effect at the time of construction to maintain their old flood insurance rate class if their property is remapped into a new flood rate class. This practice is colloquially referred to as \"grandfathering,\" \"administrative grandfathering,\" or the \"grandfather rule,\" and is separate and distinct from the pre-FIRM subsidy. FEMA does not consider the practice of grandfathering to be a subsidy for the NFIP, per se, because the discount provided to an individual policyholder is cross-subsidized by other policyholders in the NFIP. Thus, while grandfathering does intentionally allow policyholders to pay premiums that are less than their actuarial rate, the discount is offset by others in the same rate class as the grandfathered policyholder. Congress implicitly eliminated the practice of offering grandfathering to policyholders after new maps were issued in BW-12, but then subsequently reinstated the practice in HFIAA, which repealed the BW-12 provision that terminated grandfathering and allowed grandfathered status to be passed on to the new owners when a property is sold. As of September 2018, about 9% of NFIP policies were grandfathered. FEMA is planning to introduce the biggest change to the way the NFIP calculates flood insurance premiums since its inception, known as Risk Rating 2.0 . The new rates are scheduled to go into effect on October 1, 202 1, for all NFIP policies. The NFIP's current rating structure follows general insurance practices in place at the time that the NFIP was established and has not fundamentally been changed since the 1970s . FEMA uses a nationwide rating system that combines flood zones across many geographic areas, and individual policies do not necessarily reflect topographical features that affect flood risk. FEMA models expected losses for groups of structures that are similar in flood risk and key structural aspects, and assigns the same rate to all policies in a group. For example, two properties that are rated as the same NFIP risk (i.e., both are one-story, single-family homes with no basement and are elevated the same number of feet above the Base Flood Elevation ( BFE )) are charged the same rate per $100 of insurance, although they may be located in different states with differing flood histories or rest on different topography, such as a shallow floodplain versus a steep river valley. In addition, two properties in the same flood zone are charged the same rate, regardless of their location within the zone. To calculate the premium, the current rating system considers the flood zone , the building occupancy type , the foundation type, whether the property is pre-FIRM or post-FIRM, whether or not the property is a primary residence , and the property elevation relative to the BFE for properties in an SFHA. The amount and type of coverage and the deductible will also affect the premium. NFIP premiums calculated under Risk Rating 2.0 are to reflect an individual property's flood risk, in contrast to the current rating system in which properties with the same NFIP flood risk are charged the same rates. This will involve the use of a larger range of variables than in the current rating system. The current rating system uses two sources of flooding, coastal and fluvial (river). In contrast, Risk Rating 2.0 is to incorporate a broader range of flood frequencies and sources, including pluvial flooding (flooding due to heavy rainfall) , urban flooding , and coastal erosion outside the V-zone (the coastal high - hazard area) . Geographical variables to be used in Risk Rating 2.0 are to include the distance to the water and the type of water (i.e., river, stream, coast), the elevation of the property relative to the flooding source, and the stream order , which is a measure of the relative size of streams and rivers. The structural variables which have been identified by FEMA for use in Risk Rating 2.0 include the foundation type of the structure, the height of the lowest floor of the structure relative to BFE, and the replacement cost value of the structure. The use of distance to water as a variable may mean that premiums for properties at the landward boundary of a SFHA could go down, while premiums for a property at the water boundary could go up. Under the current rating system, NFIP premium rates are based on the amount of insurance purchased for a structure, not the replacement cost for that structure. For example, for most actuarially rated structures in the A zone, the NFIP currently classifies the first $60,000 of building coverage for single-family residences ($175,000 for businesses) and $25,000 of contents coverage as the basic limit. It charges higher rates for coverage under this amount, because losses are more likely to occur in this range. Rates for additional coverage above the basic limit are lower. The basic and additional rates are loaded to account for the average tendency to buy less insurance than the replacement value. For example, a post-FIRM single-family property in the A-zone , with $250,000 of buildings coverage and a deductible of $3,000, would currently pay a rate of 3% on the first $60,000 and a rate of 2% on the additional $190,000 (plus the Increased Cost of Compliance (ICC) premium and the reserve fund assessment). The two-tiered rating structure was used in the industry for two reasons. First, it ensured that the premium collected is sufficient to cover the typical claim even if a policy is under-insured; according to FEMA, most NFIP claims are below $60,000. By charging a high rate for coverage up to $60,000, a policyholder's premium is likely to be sufficient to cover a typical claim. Secondly, it encouraged policyholders to fully insure their structure. By charging a low additional rate, policyholders are encouraged not just to insure a typical claim, but to insure against the unlikely but possible higher claim. For much of the NFIP's existence, the two-tiered rating structure operated with minimal inequity. However, as the range of replacement values widened, particularly through the 2000s, the potential for inequity caused by rating based on coverage instead of structure value grew. Two groups are most subject to inequity. First, structures whose value is closer to the $60,000 basic limit pay more than they would if their rate was based on their structure value because most of their rate is comprised of the lower additional rate. Second, structures whose value is above the $250,000 cap pay less than they would if their rate was based on structure value, because their rate is based on an average structure value that is much less than their actual structure value. In addition, high-valued structures can produce much higher claims than lower-valued structures with the same intensity of damage. If replacement cost value were to be used in setting NFIP premium rates, it is anticipated that those structures with higher replacement costs than current local or national averages would begin paying more for their NFIP coverage than those structures that are below the average, which would pay less. How much more, or how much less, is uncertain. The limitations on annual premium increases are set in statute and Risk Rating 2.0 will not be able to increase rates beyond these caps. Rate increases for primary residences are restricted to 5%-18% per year. Individual property increases of up to 18% are allowed, but rate class increases are limited to 15% per year. Other categories of properties are required to have their premium increased by 25% per year until they reach full risk-based rates: this includes non-primary residences , nonresidential properties , business properties , properties with severe repetitive loss , properties with substantial cumulative damage , and properties with substantial damage or substantial improvement after July 6, 2012. However, FEMA does not consider everything that policyholders pay to the NFIP to be part of the premium and therefore subject to these caps. When premium rates are calculated for compliance with the statutory caps, FEMA only includes the building and contents coverage , the ICC coverage, and the reserve fund assessment . Other fees and surcharges are not considered premium and, therefore, are not subject to the premium cap limitations, including the FPF, the HFIAA surcharge and, if applicable, the 5% Severe Repetitive Loss premium and/or probation surcharge . The current categories of properties which pay less than the full risk-based rate are determined by the date when the structure was built relative to the date of adoption of the FIRM, rather than the flood risk or the ability of the policyholder to pay. This will not change fully with the introduction of Risk Rating 2.0; although premiums for individual properties will be tied to their actual flood risk, the rate at which the subsidies will be phased out will not change. The move towards actuarially sound rates could place the NFIP on a more financially sustainable path; risk-based price signals could give policyholders a clearer understanding of their true flood risk; and a reformed rate structure could encourage more private insurers to enter the market. However, charging actuarially sound premiums may mean that insurance for some properties is considered unaffordable, or that premiums increase at a rate which may be considered to be politically unacceptable. Section 103 would repeal the HFIAA surcharge, which is $25 for primary residences and $250 for all other properties. This provision would decrease the amount that policyholders pay for flood insurance, but would benefit primary residences less than other categories of property. FEMA does not include the HFIAA surcharge in their calculation of premium rate increases, so this change would not have any impact on the rate at which premiums might increase with Risk Rating 2.0. Section 104 would authorize monthly installment payments of NFIP premiums rather than the current annual payment of premiums. The fee for making monthly payments during the first year of implementation could not exceed $25 per year. Section 304 would allow an owner of a share of a cooperative building to purchase flood insurance coverage under the NFIP on the same terms as a condominium owner. Section 402 would authorize FEMA to offer one umbrella policy to owners of multiple structures on the same property. This would apply to both commercial properties and residential properties, including agricultural structures and multi-family rental properties. This could have the effect of making flood insurance easier to buy for the relevant properties. Section 102 would prohibit FEMA from increasing the amount of covered costs above 9% per year on any policyholder during the five-year period beginning on the date of enactment. Covered costs include premiums, surcharges (including the surcharge for ICC coverage and the HFIAA surcharge), and the Federal Policy Fee. This would limit the rate of increase of covered costs for all categories of policies, not just policies for primary residences, and would be particularly significant for those policies where the pre-FIRM subsidy is currently being phased out at 25% per year. This cap on premium increases could potentially limit FEMA's ability to implement rate increases under Risk Rating 2.0. Section 102 would also amend the basis on which premiums are determined so that the calculation of an average historical loss year would exclude catastrophic loss years. This would probably lower premiums for all policyholders. Section 104 would authorize monthly installment payments of NFIP premiums rather than the current annual payment of premiums. The fee for making monthly payments during the first year of implementation could not exceed $15 per year. Section 106 would allow an owner of a share of a cooperative building to purchase flood insurance coverage under the NFIP on the same terms as a condominium owner. Section 107 would establish a baseline amount, defined as the maximum original principal obligation of a standard mortgage that may be purchased by the Federal National Mortgage Association (Fannie Mae) in the area where the property is located. The baseline amount would track the Fannie Mae maximum loan limits for single-family dwellings. This section would set the contents coverage limits at 50% of the baseline amount. The coverage limit for single-family dwellings would be set at the baseline amount and the coverage limit for other residential and non-residential properties at 200% of the baseline amount. This provision would increase coverage limits for both buildings and contents insurance, with a larger increase in high-cost areas. Section 306 would increase premiums by 25% each year on any property for which a policyholder refuses a bona fide offer of mitigation assistance until the policyholder accepts the bona fide offer of assistance or the chargeable risk premium is actuarially sound. The funding for the NFIP is primarily maintained in an authorized account called the National Flood Insurance Fund (NFIF). Generally, the NFIP has been funded through three methods: receipts from the premiums of flood insurance policies, including fees and surcharges; direct annual appropriations for specific costs of the NFIP; and borrowing from the U.S. Treasury when the balance of the NFIF has been insufficient to pay the NFIP's obligations (e.g., insurance claims). As provided for in law, all premiums from the sale of NFIP insurance are transferred to FEMA and deposited in the NFIF. Congress then authorizes FEMA to withdraw funds from the NFIF, and use those funds for specified purposes needed to operate the NFIP. In addition to premiums, Congress also provides annual appropriations to supplement floodplain mapping activities. In addition to the mix of discretionary and mandatory funding which are set in appropriations legislation, fluctuating levels of mandatory spending occur in the NFIP in order to pay and adjust claims on affected NFIP policies. The NFIP was not designed to retain funding to cover claims for truly extreme events; instead, the National Flood Insurance Act of 1968 allows the program to borrow money from the Treasury for such events. For most of the NFIP's history, the program has generally been able to cover its costs, borrowing relatively small amounts from the Treasury to pay claims, and then repaying the loans with interest. Currently, Congress has authorized FEMA to borrow no more than $30.425 billion from the U.S. Treasury in order to operate the NFIP. The NFIP's debt to the U.S. Treasury cannot be tied directly to any single incident, as any insurance claim paid by the NFIP is in some way responsible for the existing debt of the NFIP (i.e., a dollar paid in claims, and therefore expended by the NFIP, following a minor flooding incident is no different than a dollar paid following a major hurricane). However, the NFIP was forced to borrow heavily to pay claims in the aftermath of three catastrophic flood seasons, the 2005 hurricane season (particularly Hurricanes Katrina, Rita, and Wilma), Hurricane Sandy in 2012, and the 2017 hurricane season (Hurricanes Harvey, Irma, and Maria). The 2017 hurricane season brought the NFIP up to the $30.425 billion borrowing limit for the first time. At the start of the 2017 hurricane season, the NFIP owed $24.6 billion. On September 22, 2017, the NFIP borrowed the remaining $5.825 billion from the Treasury to cover claims from Hurricane Harvey, Hurricane Irma, and Hurricane Maria, reaching the NFIP's authorized borrowing limit of $30.425 billion. On October 26, 2017, Congress cancelled $16 billion of NFIP debt, making it possible for the program to continue to pay claims for Hurricanes Harvey, Irma, and Maria. FEMA borrowed another $6.1 billion on November 9, 2017, to fund estimated 2017 losses, including those incurred by Hurricanes Harvey, Irma, and Maria, and anticipated programmatic activities, bringing the debt up to $20.525 billion. The NFIP currently has $9.9 billion of remaining borrowing authority, and did not need to borrow to pay claims for the 2018 hurricane season or other floods in 2018. Only current and future participants in the NFIP are responsible for repaying NFIP debt, as the insurance program itself owes the debt to the Treasury and pays for accruing interest on that debt through the premium revenues of policyholders. For example, from FY2006 to FY2016 (i.e., since the NFIP borrowed funds following Hurricane Katrina), the NFIP has paid $2.82 billion in principal repayments and $4.4 billion in interest to service the debt through the premiums collected on insurance policies. The NFIP is currently paying $375-$400 million a year in interest. In a report on NFIP solvency, GAO noted that charging current policyholders to pay for debt incurred in past years is contrary to actuarial principles and insurers' pricing practices. According to actuarial principles, a premium rate is based on the risk of future losses and does not include past costs. GAO also argued that this creates a potential inequality because policyholders are charged not only for the flood losses that they are expected to incur, but also for losses incurred by past policyholders. The cancellation of $16 billion of NFIP debt in October 2017 represents the first time that NFIP debt has been cancelled, although Congress appropriated funds between 1980 and 1985 to repay NFIP debt. Earlier in 2017, GAO had considered the option of eliminating FEMA's debt to the Treasury, suggesting that if the debt were eliminated, FEMA could reallocate funds used for debt repayment for other purposes such as building a reserve fund and program operations, and arguing that this would also be more equitable for current policyholders and consistent with actuarial principles. Eliminating the entire NFIP debt would require Congress to cancel debt outright, to appropriate funds for FEMA to repay the debt, or to change the law to eliminate the requirement that FEMA repay the accumulated debt. Under its current authorization, the only means the NFIP has to pay off the debt is through the accrual of premium revenues in excess of outgoing claims, and from payments made out of the Reserve Fund. As required by law, FEMA submitted a report to Congress in May 2018 on how the borrowed amount from the U.S. Treasury could be repaid within a 10-year period. The key conclusion of this and past reports is that it is unlikely that the NFIP will be able to repay its current debt fully. If interest rates were to rise, debt payments would increase significantly and FEMA might not be able to retire any of its debt, even in low-loss years. No projections of the NFIP debt have yet been made that take account of the cancellation of $16 billion of NFIP debt or the $10.83 billion in claims from the 2017 hurricane season. However, since 2005 the program has devoted more resources to interest payments than to repaying the debt, and it seems unlikely that this would be different in the future without congressional action. Section 301 would freeze interest accrual on the NFIP's debt to the Treasury for five years after enactment and provides that interest that would have accrued during this period would not have to be repaid in future. This section would also require FEMA to deposit the amount equal to the interest that would have accrued on the borrowed amounts during the five-year period into the National Flood Mitigation Fund and use this funding to carry out the Flood Mitigation Assistance Grant Program. A long-standing objective of the NFIP has been to increase purchases of flood insurance policies, and this objective of widespread NFIP purchase was one motivation for keeping NFIP premiums reasonable. It was also a motivation for introducing the requirement, in the Flood Disaster Protection Act of 1973, to purchase flood insurance as a condition of receiving a federally backed mortgage for properties in a SFHA, commonly referred to as the mandatory purchase requirement. In a community that participates or has participated in the NFIP, owners of properties in the mapped SFHA are required to purchase flood insurance as a condition of receiving a federally backed mortgage. Federal agencies, federally regulated lending institutions, and government-sponsored enterprises (GSE) must require these property owners to purchase flood insurance as a condition of any mortgage that these entities make, guarantee, or purchase. However, there are no official statistics available from the federal mortgage regulators responsible for compliance with the mandate, and no up-to-date data on national compliance rates with the mandatory purchase requirement. A 2006 study commissioned by FEMA found that compliance with this mandatory purchase requirement may be as low as 43% in some areas of the country (the Midwest), and as high as 88% in others (the West). A more recent study of flood insurance in New York City found that compliance with the mandatory purchase requirement by properties in the SFHA with mortgages increased from 61% in 2012 to 73% in 2016. The escrowing of insurance premiums, which began in January 2016, may increase compliance with the mandatory purchase requirement, but no data on this are available. Section 103 would increase the minimum loan amount that triggers the mandatory purchase requirement to $25,000. Currently, loans with an outstanding balance less than $5,000 or a repayment term less than one year are exempted from the mandatory purchase requirement. This provision would potentially allow homeowners and businesses to drop their flood insurance earlier than is currently possible. Section 408 would require GAO to determine the percentages of properties with federally backed mortgages located in SFHAs that satisfy the mandatory purchase requirement, and the percentage of properties with federally backed mortgages located in the 500-year floodplain that would satisfy the mandatory purchase requirement if the mandatory purchase requirement applied to such properties. Section 108 would require GAO to determine the percentages of properties with federally backed mortgages located in SFHAs that satisfy the mandatory purchase requirement, and the percentage of properties with federally backed mortgages located in the 500-year floodplain that would satisfy the mandatory purchase requirement if the mandatory purchase requirement applied to such properties. Both the GAO report and the NFIP report to Congress on options for privatizing the NFIP suggested that the mandatory purchase requirement could potentially be expanded to more (or all) mortgage loans made by federally regulated lending institutions for properties in communities participating in the NFIP. This would increase the consumer participation rate in the NFIP and potentially balance the NFIP portfolio with an increased number of lower-risk properties. According to GAO, some private insurers have indicated that such a federal mandate could help achieve the level of consumer participation necessary to make the private sector comfortable with providing flood insurance coverage by increasing the number of policyholders, which would allow private insurers to diversify and manage the risk of their flood insurance portfolio and address concerns about adverse selection. The Association of State Floodplain Managers also suggested that all properties within the SFHA should be required to have flood insurance, not just those with federally backed mortgages. NFIP policies are not distributed evenly around the country; about 37% of the policies are in Florida, with 11% in Texas and 9% in Louisiana, followed by California with 5% and New Jersey with 4%. These five states account for approximately 66% of all of the policies in the NFIP. NFIP participation rates are higher in coastal locations than in inland locations, and are highest in the most risky areas due to mandatory purchase requirements. The NFIP could potentially be financially improved with a more geographically diverse policy base and, in particular, through finding ways to increase coverage in areas perceived to be at lower risk of flooding than those in the SFHA. FEMA has identified the need to increase flood insurance coverage across the nation as a major priority for the current reauthorization and beyond, and has set a goal of doubling flood insurance coverage by 2023, through the increased sale of both NFIP and private policies. Closing the insurance gap is one of the key objectives of FEMA's 2018-2022 strategic plan. Section 408 would require GAO to conduct a study to address how to increase participation rates through programmatic and regulatory changes, and report to Congress no later than 18 months after enactment. Section 108 would require GAO to conduct a study to address how to increase participation rates through programmatic and regulatory changes, and report to Congress no later than 18 months after enactment. Some stakeholders have expressed concern related to the perceived affordability of flood insurance premiums and the balance between actuarial soundness and other goals of the NFIP. Particularly following the increase in premiums associated with BW-12 and HFIAA, concerns were raised that risk-based premiums could be unaffordable for some households. Section 100236 of BW-12 called for an affordability study by FEMA and also a study by the National Research Council of the National Academy of Sciences (NRC) regarding participation in the NFIP and the affordability of premiums, which was published in 2015. The NRC report was published in two parts. The first NRC report considered the many ways in which to define affordability and identify which households need financial assistance with premiums. They noted that there are no objective definitions of affordability for flood insurance, nor is there an objective threshold that separates affordable premiums from unaffordable premiums and thus defines affordability either for an individual property owner or renter, or for any group of property owners or renters. They suggested that if affordability were to be addressed through some form of government assistance, a number of questions would need to be answered by Congress or FEMA: (1) Who will receive assistance? (2) What assistance will be provided? (3) How will assistance be provided? (4) How much assistance will be provided? (5) Who will pay for the assistance? (6) How will assistance be administered? The NRC report suggested that eligibility for assistance could be based on (1) being cost-burdened by flood insurance, (2) the loss of pre-FIRM subsidies or grandfathered cross-subsidies, (3) the requirement to purchase flood insurance, (4) housing tenure, (5) household income, (6) mitigation, or (7) community characteristics. The first NRC report identified potential policy measures that might reduce the burden of premium payments, or that might direct mitigation assistance towards households that qualify for assistance. These included means-tested mitigation grants, mitigation loans, means-tested vouchers, federal tax deductions and credits, disaster savings account, expanding the variety of individual mitigation measures that reduce premiums, encouraging the selection of higher premium deductibles, reducing NFIP administrative cost loadings in premiums, eliminating the mandatory purchase requirement, or relying on the Treasury to help pay claims in catastrophic loss years. The report concluded that policymakers will need to decide whether they want to define cost burden with reference to income, housing costs in relation to income, premium paid in relation to property value, or some other measure. GAO also considered the issue of affordability, suggesting that an affordability program that addresses the goals of encouraging consumer participation and promoting resilience would provide means-tested assistance through appropriations rather than through discounted premiums, and prioritize it to mitigate risk. They argued that providing premium assistance through appropriations rather than discounted premiums would address the policy goal of making the fiscal exposure more transparent because any affordability discounts on premium rates would be explicitly recognized in the budget each year. GAO suggested that linking subsidies to ability to pay rather than the existing approach to subsidies would make premium assistance more transparent and thus more open to oversight by Congress and the public. They also argued that means-testing premium assistance would help ensure that only those who could not afford full-risk rates would receive assistance, which could lower the number of policyholders receiving a subsidy and thus increase the amount that the NFIP receives in premiums and reduce the program's federal fiscal exposure. GAO estimated that 47%-74% of policyholders could be eligible for subsidy if income eligibility was set at 80% or 140% of area median income (AMI), respectively. GAO also suggested that instead of premium assistance, it would be preferable to address affordability by providing assistance for mitigation measures that would reduce the flood risk of the property, thus enhancing resilience, and ultimately result in a lower premium rate. Reducing flood risk through mitigation could also reduce the need for federal disaster assistance, further decreasing federal fiscal exposure. In HFIAA Section 9, Congress also required FEMA to develop a Draft Affordability Framework \"that proposes to address, via programmatic and regulatory changes, the issues of affordability of flood insurance sold under the National Flood Insurance Program, including issues identified in the affordability studyâ¦.\" FEMA published its Affordability Framework on April 17, 2018. FEMA started the development of the affordability framework by consulting other federal agencies on how to define affordability, noting that neither BW-12 nor HFIAA provided a definition of flood insurance affordability. Based on the guidance of other agencies, they chose to define the concept of affordability from a cost burden or ability to pay perspective. They analyzed the 2015 NFIP portfolio of 4.8 million policies (4.5 million residential policies, of which 90% were single-family homes). In particular, they used American Community Survey (ACS) data to analyze how ACS respondents intersect with the SFHA, using the National Flood Hazard Layer (NFHL) to determine whether there were differences in income between those who live inside and outside the SFHA. They also looked at the difference between NFIP policyholders and potential policyholders, differentiating between flood risk, income, and mortgage status. They used the AMI to identify low-income policyholders. FEMA also classified flood risk in SFHAs as coastal or noncoastal in order to determine whether incomes are higher in areas subject to coastal flooding for the matched NFIP and census data. They found that generally incomes are higher outside the SFHA than they are inside the SFHA. Median income is higher for policyholders and non-policyholders exposed to coastal risk for both homeowners and renters. However, the income differences by source of flood risk were not found to be sizable compared to the differences in income between mortgage holders, outright homeowners, and renters. The data supported FEMA's extensive anecdotal evidence that there is a significant population in the SFHA of lower-income families who have either inherited their homes or are retirees, who are particularly sensitive to the financial burden of flood insurance. FEMA does not currently have the authority to implement an affordability program, nor does FEMA's current rate structure provide the funding required to support an affordability program. If an affordability program were to be funded from NFIP funds, this would require either raising flood insurance rates for NFIP policyholders or diverting resources from another existing use. Alternatively, an affordability program could be funded fully or partially by congressional appropriations. Section 102 would create a five-year affordability demonstration program to determine the effectiveness of providing means-tested discounted rates for NFIP policies, with the authority to provide discounted premium rates terminating on May 31, 2024. The discounted premium rates would only be available to owner-occupants of residences with no more than four units, with the further requirement that the property is the primary residence of a household whose income does not exceed 80% of the area median income (AMI). The chargeable premium rate made available under this section would be an amount that does not exceed 2% of the annual AMI for the area in which the property is located. FEMA would be required to provide all participants in this program with a written statement detailing the full actuarial premium rate for the coverage. Within 12 months of enactment, FEMA would be required to issue guidance for the establishment of the affordability demonstration program, and not later than five years after the start of the implementation of the program, FEMA would be required to submit a report to Congress evaluating the effectiveness of the program. This report would include a statement of the number of households participating in the program and the rates of participation by communities participating in the NFIP, including whether such rates of participation have changed by year, and an estimate of the cost of the program to the NFIP. This affordability program could have the potential to benefit areas with low median incomes more than those with high median incomes. In particular, households in an area where 2% of the AMI is more than the average flood insurance premium may not benefit from this provision. For example, The AMI for Washington, DC, in 2017 dollars, is $77,649. Two percent of the AMI is $1,552.98; anyone paying more than this amount would receive a discount so that they would pay no more than $1,552.98. However, the average NFIP premium in Washington, DC is $720.68, so a household with a low income paying this average flood insurance premium of $720.68 in Washington, DC, would not have any chargeable premium rate in excess of 2% of the annual area median income, and thus would not receive a discount. The AMI for Detroit in 2017 dollars is $27,838, and 2% of the AMI is $556.76. The average premium for Detroit is $633.69, so a household with a low income paying the average flood insurance premium would receive a discount of $76.93. Section 106 would authorize FEMA, where appropriate, to consider the impact of the inclusion of replacement cost value of a structure in setting the NFIP premium rate in determining the affordability of flood insurance premiums. Section 103 would require FEMA to establish an Affordability Assistance Fund which would be separate from other NFIP funds and available without fiscal year limitation. This Affordability Assistance Fund would be credited with the amounts saved as a direct result of the limitation on the operating costs of Write-Your-Own companies. This section would require FEMA to provide financial assistance in the form of a voucher, grant, or premium credit to an eligible household, defined as one where (1) housing costs exceed 30% of the household's adjusted gross income for the year and the total assets owned by the household are not greater than 22% of the median income of the state in which the household is located; or (2) if the total household income is less than 120% of the AMI, the amount of the premiums, surcharges, and fees for an annual flood insurance policy exceeds 1% of the coverage limit of that policy. The voucher, grant or premium credit would provide an amount equal to the lesser of the difference between either the annual housing expenses or 30% of the annual adjusted gross income of the household and the costs of NFIP premiums. The amount of the assistance would be reduced by 1% for each percent that the income of the eligible household exceeds 120% of the state median income. One of the reasons that the NFIP was originally created was because private flood insurance was widely unavailable in the United States. Until recently the role of the private market in primary residential flood insurance has been relatively limited. The main role of private insurance companies has been in the operational aspect of the NFIP. FEMA provides the overarching management and oversight of the NFIP, and retains the actual financial risk of paying claims for the policy. However, the bulk of the day-to-day operation of the NFIP, including the marketing, sale, writing, and claims management of policies, is handled by private companies. This occurs primarily through the Write-Your-Own (WYO) Program, where private insurance companies are paid to write and service the policies themselves. Roughly 86% of NFIP policies are sold by the private insurance companies participating in the WYO Program. Companies participating in the WYO program are compensated through a variety of methods. Some have argued that the levels of WYO compensation are too generous, while others have argued that reimbursement levels are insufficient to cover all expenses associated with servicing flood policies under the procedures set by FEMA. In BW-12, Congress required FEMA to issue a rulemaking on a \"methodology for determining the appropriate amounts that property and casualty insurance companies participating in the Write Your Own program should be reimbursed for selling, writing, and servicing flood insurance policies and adjusting flood insurance claims on behalf of the National Flood Insurance Program.\" This rulemaking was required within a year of enactment of BW-12. FEMA published an Advanced Notice of Proposed Rulemaking on revisions to the methodology for payments to WYO companies on July 8, 2019. A small private flood insurance market exists, which most commonly provides commercial coverage, coverage above the NFIP maximums, or coverage in the lender-placed market. At the moment relatively few private insurers compete with the NFIP in the primary voluntary flood insurance market. Some suggest that this lack of competition has partly developed because the \"non-compete clause\"âa contractual restriction placed on WYO carriers against offering standalone private flood products that compete with the NFIPâhas in the past curtailed the potential involvement of the WYO companies. In FY2019, however, FEMA removed restrictions on WYO companies choosing to offer private flood insurance, while maintaining requirements that such private insurance lines remain entirely separate from a WYO company's NFIP insurance business. Private insurer interest in providing flood coverage has increased in recent years. Advances in the analytics and data used to quantify flood risk mean that a number of private insurance companies and insurance industry organizations have expressed interest in private insurers offering primary flood insurance in competition with the NFIP. Private insurance is seen by many as a way of transferring flood risk from the federal government to the private sector. FEMA's subsidized rates are often seen as the primary barrier to private sector involvement in flood insurance. Even without the subsidies mandated by law, the NFIP's definition of full-risk rates differs from that of private insurers. Whereas the NFIP's full-risk rates must incorporate expected losses and operating costs, a private insurer's full-risk rates must also incorporate a return on capital. As a result, even those NFIP policies which are considered to be actuarially sound from the perspective of the NFIP may still be underpriced from the perspective of private insurers. FEMA's new rating system, Risk Rating 2.0, which aims to more closely align premiums and an individual property's flood risk, could affect the competitive balance between the NFIP and private insurers. The rules on the acceptance of private insurance for the mandatory purchase requirement have had a significant impact on the market potential for private insurers. In BW-12, Congress explicitly provided for the acceptance of private flood insurance to fulfill the mandatory purchase mortgage requirement as long as the private flood insurance \"provides flood insurance coverage which is at least as broad as the coverage\" of the NFIP, among other conditions. A final rule implementing this requirement was announced in February 2019 and took effect on July 1, 2019. Press reports described it as generally welcomed by the banking industry, but it is unclear to what extent this new rule will encourage private flood insurance or whether additional legislative changes might be needed if Congress seeks to further encourage development of the private flood insurance market. Another barrier to the growth of the private insurance market has been FEMA's policy on continuous coverage. Continuous coverage is required for property owners to retain any subsidies or cross-subsidies in their NFIP premium rates. A borrower may be reluctant to purchase private insurance if doing so means they would lose their subsidy should they later decide to return to NFIP coverage. Many insurers also view the lack of access to NFIP data on flood losses and claims as a barrier to more private companies offering flood insurance. It is argued that increasing access to past NFIP claims data would allow private insurance companies to better estimate future losses and price flood insurance premiums, and ultimately to determine which properties they might be willing to insure. However, FEMA's view is that the agency would need to address privacy concerns in order to provide property level information to insurers, because the Privacy Act of 1974 prohibits FEMA from releasing policy and claims data which contains Personally Identifiable Information. In HFIAA, Congress revised the authority of FEMA to secure reinsurance for the NFIP from the private reinsurance and capital markets. FEMA began larger-scale purchases of reinsurance in 2017. The specifics of each reinsurance purchase has varied, but in general, the reinsurance has been designed to pay a certain percentage of the losses from a single, large-scale event, with a higher percentage if losses are higher. Coverage has typically started after $4 billion in losses, a loss level that has only been reached by the NFIP in three eventsâHurricane Katrina, Hurricane Sandy, and Hurricane Harvey. As of December 2019, the reinsurance purchases have been a net fiscal positive for the NFIP with a total of $655 million in premiums paid and $1.042 billion received from claims. This is due to the extremely high losses experienced after Hurricane Harvey, which resulted in over $9 billion paid by the NFIP to policyholders. Unless another large-scale flooding event occurs, the balance of premiums versus claims is likely to turn negative in the next two to three years if FEMA continues similar reinsurance purchases. The purchase of private market reinsurance reduces the likelihood of FEMA needing to borrow from the Treasury to pay claims. Because reinsurers understandably charge FEMA premiums to compensate for the risk they assume, the primary benefit of reinsurance is to transfer and manage risk rather than to reduce the NFIP's long-term fiscal exposure. Section 107 would direct FEMA, if an NFIP policyholder switches to private flood insurance but has already paid the NFIP premiums for the whole year up front, to provide a prorated refund of the NFIP premium. This section would also direct that Increased Cost of Compliance (ICC) premiums would not be refunded if measures had been implemented using ICC coverage, and that premiums would not be refunded if a claim has been paid or is pending under the policy term for which the refund is sought. Section 401 would direct FEMA to consider private flood insurance that satisfies the mandatory purchase requirement as also satisfying the continuous coverage requirement to keep NFIP premium subsidies in place. Section 404 would allow FEMA to provide current and historical property-specific information on flood insurance program coverage, flood damage assessments, and payment of claims to private insurers, on the condition that private insurers provide the same information to FEMA, homeowners and home buyers. Section 404 could potentially create conflicts with the Privacy Act of 1974, which prohibits federal agencies from releasing data which contains Personally Identifiable Information. In addition, although these data could be used to better inform the participation of private insurers in offering private flood insurance, the availability of NFIP data could make it easier for private insurers to identify the NFIP policies that are \"overpriced\" due to explicit cross-subsidization or imprecise flood insurance rate structures, and adversely select these properties, while the government would likely retain those policies that benefit from those subsidies and imprecisions, potentially increasing the deficit of the NFIP. Section 406 would require FEMA annually to evaluate ceding a portion of the risk of the NFIP to the private reinsurance or capital markets. Section 407 would give FEMA the authority to terminate any WYO arrangement in its entirety upon 30 days written notice for (1) fraud or misrepresentation; (2) nonpayment to FEMA of any amount due; or (3) material failure to comply with the requirements of the arrangement or with the written standards, procedures, or guidance by FEMA. Section 302 would establish that the total amount of reimbursement paid to WYO companies could not be greater than 22.46% of the aggregate amount of premiums charged by the company. It would also require FEMA to ensure that the commission paid by a WYO company to agents of the company would not be less than 15%. Section 304 would require FEMA, within 12 months of enactment, to develop a schedule to determine the actual costs of WYO companies and reimburse the WYO companies only for the actual costs of the service or products. It would require that all reimbursements made to WYO companies be made public, including a description of the product or service provided to which the reimbursement pertains. Section 305 would require FEMA to report on the feasibility of selling or licensing the use of historical structure-specific NFIP claims data to non-governmental entities, while reasonably protecting policyholder privacy. Section 405 would require FEMA to establish penalties for underpayment of claims by WYO companies that are not less than the penalty for overpayment of a claim. Section 408 would give FEMA the authority to direct a WYO company, on 14 days' notice, to terminate a contract or other agreement with any covered entity that provides services to the WYO company, if FEMA determines that the covered entity has engaged in conduct that is detrimental to the NFIP. Section 415 would authorize FEMA to create a pilot program under which WYO companies and NFIP direct servicers would be required to investigate pre-existing structural conditions that might result in the denial of an NFIP claim, at the request of a policyholder or potential policyholder, before providing or renewing flood insurance coverage. In the debate about the future of the NFIP, the fact that flood insurance is only one of the functions of the NFIP's key responsibilities is sometimes overlooked; the NFIP has always been more than just an insurance program. The main non-insurance policy goal of the NFIP is to mitigate and reduce the nation's comprehensive flood risk through the development and implementation of floodplain management standards. To do this, FEMA develops, in coordination with participating communities, flood maps called Flood Insurance Rate Maps (FIRMs) that depict the community's floodplain and flood risk zones. Currently FIRMs provide the basis for setting insurance rates, although this is to change with Risk Rating 2.0, and identifying properties whose owners are required to purchase flood insurance. The FIRMs also provide the basis for establishing floodplain management standards that communities must adopt and enforce as part of their participation in the NFIP. Flood maps adopted across the country vary considerably in age and in quality, and there is no consistent, definitive timetable for when a particular community will have its maps revised and updated. By law, once every five years, FEMA is required to assess the need to revise and update all floodplain areas and flood-risk zones defined, delineated, or established by the mapping program, based on an analysis of all natural hazards affecting flood risks. This requirement does not dictate, however, that the FIRMs actually be updated once every five years. Generally, flood maps may require updating when there have been significant new building developments in or near the flood zone, changes to flood protection systems (e.g., levees, sea walls, sand dunes), or environmental changes in the community. The FEMA mapping process, and some NFIP flood maps, have been criticized for being out of date, using poor quality data or methods, or not taking account of changed conditions. In addition, the procedure to update maps is time consuming, in large part due to the lengthy statutory consultation and appeals process. In BW-12, Congress reestablished and reauthorized a body called the Technical Mapping Advisory Council (TMAC). The TMAC is a federal advisory committee established to review and make recommendations to FEMA on matters related to the national flood mapping program. The TMAC is broadly authorized to review and recommend improvements to how FEMA produces and disseminates flood hazard, flood risk, and flood map information. The TMAC is required to submit an annual report to the FEMA Administrator summarizing its activities, its evaluation of FIRMs and FEMA's mapping activities, and its recommendations for improving elements of the mapping program. Within a year of passage of BW-12, the TMAC was also required to submit to the FEMA Administrator a one-time report with recommendations on how to ensure that FIRMs incorporate the best available climate science to assess flood risks and ensure that FEMA uses the best available methodology to consider the impact of sea level rise and future development on flood risk. This report, the Future Conditions report, was submitted in final form in February 2016. FEMA is legally required to \"incorporate any future risk assessment\" by the TMAC in the Future Conditions report into any revision or update of the NFIP's FIRMs. Further, among the information FEMA is required to include in the updating of FIRMs, is \"any other relevant information as may be recommended by the [TMAC].\" The statute does not provide guidance on how or when the Administrator should act on the TMAC recommendations. However, on an annual basis, BW-12 required FEMA to report to the authorizing committees of jurisdiction in Congress and the Office of Management and Budget (OMB) on the recommendations from the TMAC and how FEMA is addressing TMAC recommendations to improve flood insurance rate maps and flood risk data. If FEMA does not act or defers to act on certain TMAC recommendations, FEMA is also required to explain that decision in the BW-12 mandated annual report. In addition to the Future Conditions report and the 2016 National Flood Mapping Program Review , TMAC has produced three annual reports, for 2015, 2016, and 2017, and a summary of the 2018 annual report. NFIP flood mapping is currently funded in two ways, through (1) annual discretionary appropriations and (2) discretionary spending authority from offsetting money collected from the Federal Policy Fee (FPF). In FY2015, $100 million was appropriated for flood hazard mapping and risk analysis; in FY2016, $190 million was appropriated; in FY2017, $175.5 million; in FY2018, $262.6 million; and in FY2019, $262.5 million. The FPF is paid to FEMA and deposited in the National Flood Insurance Fund (NFIF). FEMA has the authority to set the amount charged for the FPF, but Congress retains the authority to determine how much to spend, and on what, from the fees collected. The monies available in the NFIF, other than those used to pay claims, are available only to the extent approved in appropriation acts as offsetting collections. In recent years, Congress has generally followed the budget request from FEMA with relation to the authorized offsetting collections appearing in appropriations bills that are funded using the FPF revenue. In addition, Congress generally directs in appropriations law that FPF revenue in excess of the authorized offsetting collection amounts should be spent on floodplain management and mapping. In FY2017, FEMA received $195 million from the FPF and $188.2 million in FY2018. About 66% of the resources from the FPF are allocated to flood mapping, with floodplain management receiving about 19% of the overall income from the FPF. To the extent that the private flood insurance market grows and policies move from the NFIP to private insurers, FEMA will no longer collect the FPF on those policies and less money will be available for floodplain mapping and management. Concerns have been raised about maintaining the activities funded by the FPF, with some stakeholders arguing that a form of FPF equivalency, or some form of user fee, should be applied to private flood insurance. The section below describes selected provisions in H.R. 3167 and S. 2187 related to flood mapping. Additional provisions not described here relate to appeals and publication of projected Special Flood Hazard Areas, communication and outreach regarding map changes, adoption of partial flood maps, and membership of the TMAC. (See Table 1 ). Section 201 would reauthorize the National Flood Mapping Program at $500 million annually for each of fiscal years 2019 to 2023. Section 202 would require FEMA, when updating maps, to include cadastral features with the associated parcel identification data and, where practicable, the address of such features. This section would also require FEMA to coordinate with the U.S. Geological Survey for the sharing of data from stream flow networks, and make a national geospatial data repository available to the public on the FEMA website. This data repository would be required to provide access to the raw data used to include the cadastral features and parcel identification data in FIRMs. Section 202 would also require FEMA, at least every five years, to verify that each FIRM contains data that is current and credible. This last provision would place additional responsibility on FEMA in relation to map updates. Currently FEMA is only required, once every five years or more often as the Administrator determines necessary, to assess the need to revise and update all floodplain areas and flood-risk zones defined, delineated, or established by the mapping process, based on an analysis of all natural hazards affecting flood risks. FEMA could also incur additional costs associated with the acquisition of parcel identification. Section 202 could also create conflicts with the Privacy Act of 1974, which prohibits federal agencies from releasing data which contains Personally Identifiable Information. Section 203 would authorize FEMA to carry out a pilot program to make grants to units of local government to enhance the mapping of urban flooding and associated property damage and the availability of such mapped data to homeowners, businesses, and units of local government to enable them to minimize the risk of such flooding. Section 203 would also require FEMA to submit biennial progress reports to Congress and a final report to include recommendations for implementing strategies, practices, and technologies to mitigate the effects of urban flooding. This section would authorize to be appropriated $1.2 million for FY2020 and $4.3 million for FY2021, to remain available through 2023. This program would provide new information on urban flood risk, which is currently not addressed in NFIP flood models. Section 204 would expand mapping to all areas of the United States and would require FEMA, as soon as practicable, to (1) modernize the flood mapping inventory for communities for which FIRMs have not been modernized; (2) use the most current and most appropriate remote sensing or other geospatial mapping technology; (3) establish a digital display environment and building-specific flood hazard and risk information, not later than five years after enactment; and (4) use this digital display environment to produce, store, and disseminate flood hazard data, models, and maps. Section 204 also prohibits FEMA from disseminating the data collected for the digital display environment to the public or to a private company in a manner that violates the Privacy Act of 1974. This section would also require FEMA, with TMAC, to submit an annual report regarding progress achieved under this section and provide financial and technical assistance to communities to incorporate future flood hazard conditions as an informational layer on their FIRMs. Section 205 would create a new appeal process if FEMA denies a request to update a flood map based on new information regarding flood elevations or other flood mitigation factors. The initial appeal would be through a FEMA administrative process, with the possibility of a further appeal to the Scientific Resolution Panel. Certain expenses would also be refunded or reimbursed under this provision. Section 209 would require FEMA to develop a new flood zone designation for areas behind non-accredited levees, and make flood insurance available to properties located within those levee-impacted areas. Until FEMA develops rates for this new flood zone, a structure located behind a non-accredited levee would be eligible for rates associated with areas of moderate flood hazards. Section 208 would continue existing authorization of the National Flood Mapping Program at $400 million annually for each of fiscal years 2020 through 2025. This section would also require the TMAC to establish a set of standards for states and local governments and organizations to use in mapping risk and developing alternative maps to NFIP Flood Insurance Rate Maps (FIRMs) within one year after enactment. This section would also require TMAC to develop a procedure for certification of such maps by FEMA within 90 days of submission in the case of any area covered by a FIRM that has not been updated or reissued during the preceding three-year period. Upon certification, the map would be considered the FIRM in effect for all purposes for the NFIP and would not be able to be revised, updated, or replaced before the expiration of the three-year period beginning on the date of submission to FEMA. Section 208 would also authorize partnerships with other federal agencies and private entities to facilitate mapping and require FEMA to use the most up-to-date remote sensing and mapping technology. Section 208 would require FEMA to establish a digital display environment incorporating building-specific flood hazard and risk information, not later than five years after enactment. FEMA would not be allowed to disseminate this database to any person other than the owner or leaseholder of a property contained in the database. Section 208 also would offer an NFIP policyholder a one-time premium credit of not more than $500 to be used for either the purchase of an elevation certificate or for appealing the chargeable premium rate for the property. This section would create a new appeal process if FEMA denies a request to update a flood map based on new information regarding flood elevations or other flood mitigation factors. Certain expenses also would be refunded or reimbursed under this provision. Section 209 would require FEMA to develop a new flood zone designation for areas behind non-accredited levees, and make flood insurance available to properties located within those levee-impacted areas at actuarial rates based upon the risks appropriate for the level of protection that the levee affords. Until FEMA develops rates for this new flood zone, a structure located behind a non-accredited levee would be eligible for rates associated with areas of moderate flood hazards. Section 303 would require FEMA to develop a fee schedule based on recovering the actual costs of providing FIRMs and charge any private entity an appropriate fee for use of such maps. This requirement could provide a mechanism by which private insurance companies could contribute to the costs of floodplain mapping in lieu of paying the FPF. Flood insurance does not prevent flooding; it merely makes it possible to recover more rapidly financially after a flood. It is better to avoid being flooded than to receive funding for flood recovery after a disaster. Flood mitigation creates safer communities and can save money for individuals and taxpayers. The importance of FEMA's mitigation program is illustrated by research findings that for every $1 invested by FEMA in flood mitigation between 1993 and 2003, society as a whole saved $7 due to reduced future flood losses. The NFIP encourages communities to adopt and enforce floodplain management regulations such as zoning codes, subdivision ordinances, building codes, and rebuilding restrictions. Internal FEMA studies have found that structures built to FEMA standards experience 73% less damage than structures not built to those standards. For example, FEMA conducted a \"losses avoided\" study which reviewed 2,240 of the 6,000 mitigated properties in North Carolina and estimated that those mitigation activities avoided losses of $206 million to $234 million. Mitigation activities, however, form only a small part of the NFIP activities and are funded entirely by premiums and fees paid by NFIP policyholders. The NFIP offers three programs which encourage communities to reduce flood risk: the Community Rating System (CRS), the FMA Grant Program, and ICC coverage. A greater linkage between insurance risk transfer and physical risk reduction measures could help to address concerns about increasing flood risk. By rewarding behavior that reduces risks through pricing, insurance has the potential to incentivize or even require policyholders and communities to address the underlying flood risk. Insurance provisions could also provide incentives to limit flood damage by rewarding well-designed buildings with lower premiums, lower deductibles, or higher coverage limits. However, a recent study of residential flood insurance markets in 25 countries found little evidence of either governments or insurance companies actively encouraging risk reduction by linking the cost of insurance to mitigation activities, with the sole exception of the NFIP through the CRS. The CRS is a program offered by FEMA to incentivize the reduction of flood and erosion risk, as well as the adoption of more effective measures to protect natural and beneficial floodplain functions. As of June 2017, FEMA estimated that only 5% of eligible NFIP communities participated in the CRS program. However, these communities have a large number of flood policies, so more than 69% of all flood policies are written in CRS-participating NFIP communities. Although the CRS discounts reduce flood insurance premiums for individual communities, CRS discounts are cross-subsidized into the NFIP program, such that the discount for one community ends up being offset by increased premium rates in all communities across the NFIP. For example, the average 11.4% discount for CRS communities is cross-subsidized and shared across NFIP communities through a cost (or load) increase of 13.3% to overall premiums. To reduce comprehensive flood risk, FEMA also operates an FMA Grant Program that is funded through revenue collected by the NFIP, with the goal of mitigating flood-damaged properties to reduce or eliminate NFIP claims. The FMA Program awards grants for a number of purposes, including state and local mitigation planning; the elevation, relocation, demolition, or flood proofing of structures; the acquisition of properties; and other activities. In FY2019, the FMA Program was authorized to use $175 million of NFIP revenue, with $160 million available for FMA grants. States, tribal governments, territories, and local communities can apply for FMA grants. Generally, federal funding is available for up to 75% of eligible costs. However, FEMA may contribute up to 90% for repetitive loss properties and up to 100% for severe repetitive loss properties. An area of controversy involves NFIP coverage of properties that have suffered multiple flood losses, which are at greater risk than the average property insured by the NFIP. One concern is the cost to the program; another is whether the NFIP should continue to insure properties that are likely to have further losses. The NFIP currently uses more than one definition of repetitive loss. The statutory definition of a repetitive loss structure is used for applications for FMA grants. A slightly different definition is used for ICC coverage. A third definition is used for internal tracking of insurance data, with a slightly different definition used for the CRS. The definition of severe repetitive loss property is consistent across program elements in the NFIP, using the statutory definition. Section 105 would authorize FEMA to enter into agreements with eligible states and insular areas to provide capitalization grants for the eligible state to establish a state revolving fund for flood mitigation. These state revolving funds would be used to assist homeowners, businesses, certain non-profit organizations, and communities to reduce flood risk in order to decrease the loss of life and property, the cost of flood insurance, and federal disaster payments. A participating state would not be able to receive more than 15% of the total fund in a given fiscal year, with any remainder above this limit to be reallocated to the non-capped states. FEMA would be required to reserve at least 5% of the amount made available in a given fiscal year for tribal governments and insular areas. All participating states would be required to provide matching funds from nonfederal sources in an amount equal to 15% of the amount that the state receives for the revolving fund. States would be required to give priority, to the maximum amount practicable, to projects that (1) address severe repetitive loss and repetitive loss structures; (2) assist low-income homeowners and low-income geographical areas; and (3) address flood risk for pre-FIRM buildings. States would be authorized to provide additional subsidization to recipients from low-income households or geographical areas, including forgiveness of the principal of a loan. Finally, section 105 would authorize to be appropriated $50 million for each of fiscal years 2020 through 2024. Although state revolving funds have a long history related to clean water and drinking water, this would be the first time that such a fund has been set up at the national level to fund flood mitigation. Section 210 would allow state or local zoning authorities to grant local variances for agricultural structures in SFHAs if they determine that (1) elevation or flood-proofing of such a structure is not practicable; (2) the repair or improvement of the structure would not result in any increase in base flood levels during the base flood discharge, threats to public safety, or extraordinary public expense; and (3) not more than one NFIP claim payment exceeding $1,000 has been made for the structure within the 10 years prior to the granting of the variance. Section 302 would define a new \"multiple-loss property\" category, which would include three types of properties: (1) a revised definition of repetitive loss property; (2) a severe repetitive loss property, with the same definition as the existing statutory definition; and (3) a new category of extreme repetitive loss property. The new definition of a repetitive loss property would be a structure that has incurred flood damage for which two or more separate claims of any amount in excess of the loss-deductible have been made. The new definition of an extreme repetitive loss property would be a structure which has incurred flood damage for which at least two separate claims have been made with the cumulative amount of such claims payments exceeding 150% of the maximum coverage available for the structure. Section 302 would also allow FEMA to consider the extent to which a community is working to remedy problems with addressing repeatedly flooded areas in making determinations regarding financial assistance. This section would establish a broader definition of repetitive loss properties than the current definition, which would bring more properties into the multiple-loss categories. Section 303 would require FEMA to offer policyholders a reduction of the risk premium rate, as determined by the Administrator, for the use of approved actions that mitigate the flood risk of their property, including mitigation techniques for buildings in dense urban environments, methods that can be deployed on a block or neighborhood scale, and the elevation of mechanical or other critical systems. This would expand on existing statutory authority by specifically requiring FEMA to provide the premium reduction for approved mitigation methods. Section 305 would require FEMA to create a voluntary community-based flood insurance pilot project to make available, for purchase by participating communities, a single community-wide flood insurance policy. This community policy would cover all residential and non-residential properties in the community and would satisfy the mandatory purchase requirement. A community flood insurance policy would have to include a method of preventing redundant claims payments (in the case of an individual property owner who is covered by both a community flood insurance policy and an individual NFIP policy). FEMA would be required to establish the pilot program within 180 days of enactment, and the program would terminate on September 30, 2022. There is no mention of how the pilot program would treat residents of a community with a community-wide NFIP policy who are also covered by private flood insurance. Section 306 would authorize to be appropriated $200 million per year for each of the first five fiscal years after enactment to carry out the Flood Mitigation Grant Assistance Program (FMA); this is an increase compared to the authorization of $160 million in FY2019. Section 307 would require FEMA to provide Community Rating System (CRS) credits for measures that protect natural and beneficial floodplain functions, and would also require FEMA to provide CRS credits to the maximum number of communities practicable. It would also require FEMA to carry out a program to make grants to consortia of states and communities for the cost of employing or retaining an individual or individuals to coordinate and carry out responsibilities related to participation in the CRS. This section would authorize $7 million per fiscal year for five fiscal years to be appropriated for these grants. Section 308 would require FEMA to develop a community assistance program to increase the capacity of states, tribes, and communities to manage flood risk effectively and participate in the NFIP. This section would authorize to be appropriated $20 million per year for each of fiscal years 2019 through 2024. Section 308 also authorizes FEMA to set aside such amounts as the Administrator considers appropriate for additional assistance to states that exceed the criteria for awarding these grants. Section 201 would require the President to set aside from the Disaster Relief Fund (DRF) an amount equal to 10% of the average amount appropriated to the DRF during the previous 10 fiscal years to provide assistance for mitigation activities for severe repetitive loss structures and properties insured under the NFIP with the largest increase in actuarial risk for the property compared to the actuarial risk for the previous fiscal year as a result of Risk Rating 2.0, as in effect on October 1, 2020. This would represent the first time in which the NFIP would receive any funding from the DRF. Section 203 would give priority under the FMA program to grants for carrying out mitigation activities that reduce flood damage to (1) repetitive-loss properties; (2) properties for which FEMA determines the premium rates are unaffordable or will soon become unaffordable as a result of a risk adjustment under Risk Rating 2.0; and (3) properties for which aggregate losses exceed the replacement value of the properties. In this context, unaffordable is defined as premium rates that are in such an amount that they cause housing costs to exceed 30% of the household's adjusted gross income for the year. This section would also authorize to be appropriated $1 billion for each of the first five full fiscal years after the date of enactment to provide mitigation assistance under this section; this is an increase compared to the authorization of $160 million in FY2019. Section 204 would require FEMA to offer policyholders a reduction of the risk premium rate that is not less than 10% of that rate for the use of approved actions that mitigate the flood risk of their property, including innovative mitigation techniques for buildings in dense urban environments and the elevation of mechanical systems. This would expand on existing statutory authority by specifically requiring FEMA to provide the premium reduction for approved mitigation methods. Section 205 would require FEMA to appoint a regional coordinator in each region served by a FEMA Regional Office to provide technical assistance to small communities to enable those communities to effectively participate in and benefit from the CRS program, and would authorize to be appropriated such sums as may be necessary to carry this out. Because FEMA only has 10 regions, this provision would allow for a smaller number of CRS coordinators than could potentially be appointed under Section 307 of H.R. 3167 , as described above. Section 206 would authorize FEMA to create a low-interest mitigation loan program for NFIP policyholders to be used to undertake mitigation measures with respect to the insured property that cost less than the overall reduction in the risk of the property over 50 years. These loans would be available to all types of residences. Section 207 would authorize FEMA to enter into agreements with eligible states and insular areas to provide capitalization grants for the eligible state to establish a state revolving fund for flood mitigation. The provisions in this section are the same as those in Section 105 of H.R. 3167 , except that Section 207 authorizes to be appropriated such sums as may be necessary to carry out this section for fiscal years 2020 through 2029. Section 207 would also require FEMA to consider activities funded through amounts for a state loan fund in setting NFIP premium rates. This would be the first time that a state revolving fund has been set up at the national level to fund flood mitigation. Section 210 would require FEMA to give priority to flood mitigation activities that provide benefits to an entire floodplain or community, or to a portion of such a community. The NFIP requires most policyholders to purchase ICC coverage, which is in effect a separate insurance policy to offset the expense of complying with more rigorous building code standards when local ordinances require them to do so. This ICC coverage is authorized in law, with rates for the coverage as well as how much can be paid out for claims, set by FEMA. The amount that can be charged for ICC coverage is capped in law at $75 per year; currently, ICC premiums vary between $4 and $70. ICC coverage provides an amount up to $30,000 in payments for certain eligible expenses. For example, ICC claims payments may be used toward the costs of elevating, demolishing, relocating, or flood-proofing non-residential buildings, or any combination of these actions. FEMA's current policy is that the payment on the building claim plus the ICC claim cannot exceed the statutory maximum payment of $250,000 for residential structures or $500,000 for non-residential structures. According to ICC data, elevation is the most common form of mitigation. Approximately 61% of all ICC claims closed with payment are single family residential claims involving compensation for elevation of a structure to or above the Base Flood Elevation (BFE). Although the cost of elevating a structure depends on the type of building and elevation requirement, the average cost of elevating an existing property has been estimated at $33,239 to $91,732, and suggestions have been made for years that the amount of ICC coverage should be raised. Section 301 would increase the amount of ICC coverage to $60,000, and would exempt the ICC payment amount from the maximum payout of an NFIP policy. This section would also make ICC coverage available to properties identified by FEMA as priorities for mitigation activities before the occurrence of damage. This may allow policyholders to claim ICC coverage in certain circumstances to mitigate their property before a flood, rather than waiting until after they had been flooded. Section 301 would also allow policyholders to use ICC coverage for alternative mitigation methods to reduce flood risk for residential buildings that cannot be elevated due to their structural characteristics, for pre-disaster mitigation projects, and for costs associated with the purchase, clearing, and stabilization of property that is part of an acquisition or relocation program that complies with the provisions set out in Section 301. Section 202 would increase ICC coverage to $60,000 and would exempt ICC payment amounts from the maximum payout of an NFIP policy. This section would also make ICC coverage available to properties identified by FEMA as priorities for mitigation activities before the occurrence of damage, which may allow policyholders to claim ICC coverage in certain circumstances to mitigate their property before a flood, rather than waiting until after they had been flooded. Section 202 would also allow policyholders to use ICC coverage for alternative mitigation methods to reduce flood risk for residential buildings that cannot be elevated due to their structural characteristics, for pre-disaster mitigation projects, and for costs associated with the purchase, clearing, and stabilization of property that is part of an acquisition or relocation program that complies with the provisions set out in this section. Section 202 would make ICC coverage available to all NFIP policyholders, in and out of SFHAs, if the community has established land use and control measures for the area in which the property is located. Only the disclosure requirements and requirements for studies of the NFIP will be discussed in this report. Table 1 identifies all of the provisions in H.R. 3167 and S. 2187 which are related to administrative reform. Although some individual states require real estate transactions to be accompanied by a disclosure of information pertaining to flood or other hazards, there is currently no federal requirement for sellers to disclose flood risk and flood history. Property owners may not have knowledge of the entire past flood history of their property. Under the mandatory purchase requirement, lenders are only required to inform buyers of flood hazards before closing on the loan. The primary purpose of this disclosure is to notify properties located within a SFHA that flood insurance is required as a condition of the loan. This disclosure, late in the process of buying a property, may mean that the buyer has put down money or otherwise committed to purchasing the property. Lenders are not necessarily required to disclose the full flood history of a property, but only the requirement to purchase flood insurance based on its location in a SFHA. Section 404 would require FEMA to provide information on flood insurance program coverage, flood damage assessments, and payment of claims on a property to homeowners, with an additional requirement to provide information on whether the property owner may be required to purchase flood insurance due to a previous receipt of federal disaster assistance. This section would also require FEMA to provide information on the number and dollar value of flood insurance claims filed for a property over the life of the property, and other available information to characterize the true flood risk of the property, within 14 days of a request for such information by a buyer under contract for purchase of a property. This disclosure requirement may affect properties with a flood history during real estate transactions by reducing the likelihood of the sale of the property or reducing its value. Section 417 would require that no new flood insurance coverage may be provided after September 30, 2022, unless the relevant public body has imposed, by statute or regulation, a duty on any seller or lessor of improved real estate to provide to any purchaser or lessee a property flood hazard disclosure. The same requirements would apply to lessors of a rental property with a lease of 30 days or longer. This disclosure requirement may affect properties with a flood history during real estate transactions by reducing the likelihood of the sale of the property or reducing its value, or causing prospective lessors to reject the lease. However, this provision could also encourage a higher take-up of contents coverage by renters. Section 403would require FEMA to provide for an independent actuarial study of the financial position of the NFIP to be conducted annually and submit a report to Congress describing the results of the study. Section 105 would require FEMA to conduct a study by September 30 of the second full fiscal year after enactment on the benefits and feasibility of offering coverage for business interruption losses caused by floods in NFIP policies. Section 402 would require FEMA to conduct a study within one year of enactment on the consequences of street-raising on flood insurance coverage for affected properties, including the cost implications for the property owner. The findings of this study would be particularly relevant for policyholders with ground floor residential and business properties which could become basement properties if the adjacent street were to be raised. Section 405 would require GAO to submit a report not later than two years after enactment on any fines or other penalties imposed by FEMA for the underpayment of claims by WYO companies. In the future, and in the context of land development, improved flood mapping, and climate change, an increased number of properties are likely to be identified as at risk of flooding. A 2013 report on the impact of climate change and population growth on the NFIP concluded that by 2100, the 1% annual-chance fluvial floodplain area is projected to grow nationally by about 45%. The study found that no significant decreases in floodplain depth or area are anticipated for any region of the nation at the median estimates; median flows may increase even in areas that are expected to become drier on average. In the populated areas of most interest to the NFIP, about 30% of these increases may be attributed to increased runoff caused by the increase in impermeable land surfaces caused by population growth and development, while the remaining 70% represents the influence of climate change. The implication of this is that, on a national basis, approximately 13.5% of the growth in the fluvial SFHA is likely to be due to population growth and would occur even without any climate change. NFIP models currently do not include pluvial flood risk, but are to include such risks in premium rates with the introduction of Risk Rating 2.0. The National Academies of Science has warned that a warming climate will likely increase the risk of pluvial flooding, as a warmer atmosphere holds more moisture, increasing the frequency and/or intensity of heavy rainfall events. The number and intensity of heavy precipitation events, as well as precipitation totals, have increased across most of the United States since 1950. The largest increases in heavy precipitation events have occurred in the Midwest and Northeast, and such events are predicted to increase in those areas by 40% by 2100. For the coastal environment, the typical increase in the coastal SFHA is projected to be about 55% by 2100, with model results indicating increased variability in expected total losses in any given year, which may be greater than the NFIP's current funding borrowing structure accommodates. Increased flooding is not only a concern for the future; many areas are already experiencing 'nuisance flooding' or 'sunny day flooding' from minor tidal flooding or rainstorms. The frequency and duration of minor tidal flooding has increased significantly in recent decades along many U.S. coasts. While not catastrophic, such flooding can significantly disrupt normal commerce and activity, and the seemingly minor inconveniences and local economic losses from each event can have a cumulative effect that results in considerable hidden costs to residents and businesses. Flood costs can be considerable even in years without a named storm or event. For example, storms like the South Carolina floods in 2015 and the Louisiana floods in 2016 have demonstrated the scale of losses possible from heavy rainfall. In addition, Hurricanes Harvey (2017) and Florence (2018) showed that losses from pluvial flooding can rival or exceed coastal flood losses in a hurricane. Currently the NFIP distinguishes between the SFHA (1%-annual-chance-floodplain) and the area beyond the SFHA, yet approximately 33% of NFIP claims are for properties outside SFHAs. Recent floods have significantly affected properties which were not mapped in SFHAs. The SFHA boundary can create a false belief that flood risk changes abruptly at the line, and that properties outside the SFHA are safe. In reality, flood risk varies both inside and outside the SFHA. Although the introduction of Risk Rating 2.0 will eliminate the \"in/out\" line for premium rates, the SHFA boundary will continue to be used for the mandatory purchase requirement. Future flood maps may also need to find a way to communicate temporal variation in flood risk. Under Risk Rating 2.0, FIRMs will continue to be used for floodplain management; however, FIRMs represent a 'snapshot' of the flood risk at the time of mapping. They are not an indication of the flood risk decades into the future and thus are not necessarily the best guide for future land-use decisions. For example, New York City and FEMA have developed a new map product to be used for planning and building purposes to better account for future flood risk due to climate change and sea level rise. This map will not be used to price flood insurance premiums. Floodplains and coastal areas across the United States will likely continue to be inhabited and sustain damages from floods, some of which may be catastrophic. Flooding is different from many other risks in that the distribution of potential losses is skewed in a way that certain low-frequency, high-magnitude events may have the potential to exceed the aggregate capacity of private insurers and render the market insolvent. A large pool of flood risk does not result in a normally distributed portfolio of risks over the long run. Flood risks are highly correlated: when a large flood occurs, many geographically adjacent properties are affected. FEMA's report to Congress on privatization of the NFIP concluded that it is difficult to imagine a practical system of flood insurance in which there is not some level of government involvement in the flood risk financing chain. They argued that when low-frequency, high-magnitude events occur with a portfolio of highly correlated risks, the government will ultimately play a role in paying for the economic costs associated with a catastrophic flood, whether or not it chooses to underwrite the risk. Although the NFIP has always had borrowing authority from Congress, a robust approach has not been developed by which the NFIP can repay catastrophic flood losses, although the program has taken steps in this direction with the reserve fund assessment, the HFIAA surcharge, and the purchase of reinsurance. The National Research Council affordability report considered the option of forgiving all or part of the NFIP debt within a larger affordability context. In this report, the NRC suggested that after forgiving all or part of the NFIP debt, Congress could designate the Treasury as reinsurer for the NFIP as was the case in the original legislation. The NRC suggested that Congress could, for example, explicitly state that when the total annual losses in the NFIP exceeded some designated threshold (for example, $2 billion to $6 billion, perhaps on the basis of the average of non-catastrophic historical claims years), the Treasury could provide funds for the NFIP to honor all of the claims. The funds could be provided through the Disaster Relief Fund, and, if needed, by an emergency supplemental appropriation. Taken together, the NRC argued, those two actions could result in lower NFIP premiums, enhance affordability, and in turn lead to less spending on disaster assistance. Congress would incur occasional costs by designating the Treasury as the source of funds for payment of claims above the defined threshold in high-loss years but would not need to draw on the Treasury each year to provide assistance to policyholders who face unaffordable premiums. The American Academy of Actuaries (AAA) argued that neither private insurers nor government entities can fully absorb any level of catastrophic loss and continue to operate. It noted that private insurance systems have a trigger for socializing risk of extreme events, such as a solvency standard based on a particular event (for example, the 200-year flood), beyond which mechanisms like guaranty funds pay losses. In the case of the NFIP, the premiums charged to policyholders would require a volatility loading large enough to service and eventually repay any debt generated by catastrophic debts over a multi-decadal time horizon. The AAA report suggested that prospectively addressing this requires recognition that there is a maximum amount of short-term loss that can be fully funded by NFIP revenue. One approach would be to establish a sufficiency standard for the loss level that the NFIP revenue would be expected to fund fully. For example, this could be expressed as a maximum loss amount per catastrophic event, determined on the basis of an acceptable annual probability, or a maximum aggregate amount of annual loss. Any losses exceeding the defined sufficiency standard incurred by the NFIP could be agreed to be funded publicly. The AAA report argued that private insurers are held to an analogous standard, after which state guarantee funds reimburse policyholders for claims from insolvent private insurers using funds from assessments paid by solvent insurers. It concluded that adopting an explicit standard of this type for the NFIP would provide clarity as to what its funding sources should be and give taxpayers an understanding of when public contributions to NFIP finances are appropriate. The NFIP currently has no financial structure in place, other than borrowing from the Treasury, to guarantee it can pay claims from a catastrophic loss year. To ensure the future financial solvency of the NFIP after catastrophic events, FEMA has suggested that a systematic analysis may consider the costs and benefits of using the reserve fund, borrowing authority, reinsurance, other forms of risk transfer, and perhaps a Treasury backstop at some catastrophic loss level. It may also include a metric for communicating the resiliency of the system to different levels of catastrophic events, in order to define the scenarios that the system can sustain and those it cannot. GAO concluded that the sequence of actions taken by Congress in NFIP reform is important; for example, requiring full-risk rates for all policyholders and expanding the mandatory purchase requirement would create affordability concerns which would warrant having an affordability assistance program already in place. According to GAO, when addressing barriers to private sector involvement, it would be important to protect NFIP's flood resilience activities at the same time; and addressing the outstanding debt would be best accompanied by premium rate reform to help reduce the likelihood of a recurrence of another unpayable debt buildup. As Congress considers a long-term reauthorization of the NFIP, a central question may be who should bear the costs of floodplain occupancy in the future. The NRC study on affordability concluded that the costs of floods can be borne in three possible ways, or in some combination of them. The first scenario is that individual policyholders (whether NFIP or private) bear location cost in the form of insurance premiums paid and damages falling within policy deductible amounts. The second possibility is that the federal taxpayers bear floodplain location costs in several possible ways: if the federal government develops a premium assistance program, or makes up for NFIP premium revenue shortfalls, or pays for pre-flood mitigation, or makes post-flood disaster assistance payments to individual households. In the third scenario, property owners and other floodplain or coastal zone inhabitants bear the costs for losses that are uninsured or otherwise uncompensated. While there are many ways to finance flood risk, the majority of the cost will likely ultimately be allocated across these three stakeholder groups: policyholders (the insured), taxpayers, and the uninsured, requiring potentially difficult policy choices by Congress. ", "summary": "The National Flood Insurance Program (NFIP) was established by the National Flood Insurance Act of 1968 (NFIA; 42 U.S.C. Â§4001 et seq.), and was most recently reauthorized until September 30, 2020 ( P.L. 116-93 ). The general purpose of the NFIP is both to offer primary flood insurance to properties with significant flood risk, and to reduce flood risk through the adoption of floodplain management standards. A longer-term objective of the NFIP is to reduce federal expenditure on disaster assistance after floods. The NFIP also engages in many \"non-insurance\" activities in the public interest: it disseminates flood risk information through flood maps, requires community land use and building code standards, and offers grants and incentive programs for household- and community-level investments in flood risk reduction. Unless reauthorized or amended by Congress, the following will occur on September 30, 2020: (1) the authority to provide new flood insurance contracts will expire and (2) the authority for NFIP to borrow funds from the Treasury will be reduced from $30.425 billion to $1 billion. Issues that Congress may consider in the context of reauthorization include (1) NFIP solvency and debt; (2) premium rates and surcharges; (3) affordability of flood insurance; (4) increasing participation in the NFIP; (5) the role of private insurance and barriers to private sector involvement; (6) non-insurance functions of the NFIP such as floodplain mapping and flood mitigation; and (7) future flood risks, including future catastrophic events. The Federal Emergency Management Agency (FEMA) has identified the need to increase flood insurance coverage across the nation as a major priority for the current reauthorization and beyond, with a goal of doubling flood insurance coverage by 2023 through the increased sale of both NFIP and private policies. The NFIP's premium rates do not reflect the full risk of loss because of various legislative requirements, which may exacerbate the program's fiscal exposure. The categories of properties which pay less than the full risk-based rate are determined by the date when the structure was built relative to the date of adoption of a Flood Insurance Rate Map, rather than the flood risk or the ability of the policyholder to pay. A reformed NFIP rate structure could have the effect of encouraging more private insurers to enter the primary flood market; however, full risk-based premiums could be unaffordable for some households. Although the NFIP has always had borrowing authority from Congress, an approach has not been developed by which the NFIP can repay catastrophic flood losses. To ensure the future financial solvency of the NFIP after catastrophic events, FEMA has suggested that a systematic analysis may consider the costs and benefits of using the reserve fund, borrowing authority, reinsurance, other forms of risk transfer, and perhaps a Treasury backstop at some catastrophic loss level. The House Financial Services Committee reported a bill for the long-term reauthorization of the NFIP, the National Flood Insurance Program Reauthorization Act of 2019 ( H.R. 3167 ), on October 28, 2019. One bill has been introduced in the Senate, on July 18, 2019, to reauthorize the expiring provisions of the NFIP: the National Flood Insurance Program Reauthorization and Reform Act of 2019 ( S. 2187 ), with a House companion bill ( H.R. 3872 ) introduced on July 22, 2019. This report identifies issues for congressional consideration as part of the possible reauthorization of the NFIP and outlines selected provisions that relate to the issues listed above in the bills to reauthorize the NFIP in the 116 th Congress ( H.R. 3167 and S. 2187 ).", "document_type": "crs"}
{"report": "For several decades the federal government has funded efforts to explore the feasibility of mitigating the release of greenhouse gases (GHGs) while burning fossil fuels as a source of energy. Carbon capture and storage (CCS)âthe process of capturing manmade carbon dioxide (CO 2 ) at its source, such as a coal-fired power plant, and storing it underground instead of releasing into the atmosphereâhas been proposed as a technological solution for mitigating emissions while using fossil energy. Federal policies on CCS have received support in recent Congresses, including support for research and development (R&D) and expansion of tax credits for carbon storage. The U.S. Fourth National Climate Assessment, released in 2018, states that \"the impacts of global climate change are already being felt in the United States and are projected to intensify in the futureâbut the severity of future impacts will depend largely on actions taken to reduce greenhouse gas emissions and to adapt to the changes that will occur.\" This report focuses on federal policy regarding the underground carbon storage stage of CCS. Underground carbon storage is achieved through geologic sequestration and as an incidental benefit of enhanced oil recovery (EOR), which both use injection by well to place CO 2 into deep subsurface geologic formations. Geologic sequestration involves storing CO 2 by placing it permanently in an underground formation. This process is being tested in the United States and several other countries, including several large-scale late-stage R&D projects. EOR involves injecting CO 2 to produce additional oil and gas from underground reservoirs and has been used in the United States since the 1970s. Both geologic sequestration and EOR are regulated under the Safe Drinking Water Act (SDWA) for the purpose of protecting underground sources of drinking water (USDWs). The U.S. Environmental Protection Agency (EPA) and delegated states administer sections of SDWA relevant to underground injection and carbon storage. The U.S. Department of Energy (DOE) also engages in underground carbon storage through supporting R&D activities. Congress has supported carbon storage via underground injection through recent legislation directing DOE to expand R&D activity and increasing the federal tax credit for underground carbon storage. As Congress considers policies on underground carbon storage, including geologic sequestration and EOR, Members may wish to consider the current regulatory framework and status of federal and federally sponsored activities in this area. This report provides background on underground injection and geologic sequestration processes and related federal R&D. It then analyzes the federal framework for regulating land-based underground injection of CO 2 both for geologic sequestration and EOR. Finally, it includes a discussion of several policy issues for Congress and recent relevant federal legislation. Not covered in this report are research and management of CCS elements not directly related to underground injection, including carbon capture and the pipeline and transportation infrastructure for captured CO 2 . Regulation of geologic sequestration on federal land and offshore geologic sequestration of CO 2 are also beyond the scope of this report. For additional information on the technical aspects of CCS, see CRS Report R44902, Carbon Capture and Sequestration (CCS) in the United States , by Peter Folger. Underground injection has been used for decades to dispose of a variety of fluids, including oil field brines (salty water) and industrial, manufacturing, mining, pharmaceutical, and municipal wastes. Injection wells are also used to enhance oil and gas recovery; for solution mining; and, more recently, to inject CO 2 for geologic sequestration. As of 2018, EPA estimated that there were more than 734,000 permitted injection wells in the United States. According to one estimate, approximately 750 billion gallons (2.8 million tons) of oil field brine are injected underground each year in the United States. CO 2 injection wells are a type of deep injection well used for injection into deep-isolated rock formations. These wells can reach thousands of feet deep. More details on specific well types are provided later in this report. Geologic sequestration is the long-term containment of a fluid (including a gas, liquid, or supercritical CO 2 stream) in subsurface geologic formations. The goal of geologic sequestration of CO 2 is to trap or transform CO 2 emitted from stationary anthropogenic sources permanently underground and ultimately reduce emissions of GHGs from these sources into the atmosphere. CO 2 for sequestration is first captured from a large stationary source, such as a coal-fired power plant or chemical production facility. Although CO 2 is initially captured as a gas, it is compressed into a supercritical fluidâa relatively dense fluid intermediate to a gas and a liquidâbefore injection and remains in that state due to high pressures in the underground formation. The CO 2 is injected through specially designed wells into geologic formations, typically a half a mile or more below the Earth's surface. These formations include, for example, large deep saline reservoirs (underground basins containing salty fluids) and oil and gas reservoirs no longer in production. Research shows that CO 2 could also be sequestered in deep ocean waters or mineralized. Impermeable rocks above the target reservoir, combined with high CO 2 pressures, keep the CO 2 in a supercritical fluid state and prevent migration into shallower groundwater or into other formations. The National Energy Technology Laboratory (NETL) estimates that the total onshore storage capacity in the United States ranges between about 2.6 trillion and 22 trillion metric tons (hereinafter tons in this report) of CO 2 . (For more details, see Appendix A .) By comparison, U.S. energy-related CO 2 emissions in 2018 totaled 5,269 million tons. Theoretically, the United States contains storage capacity to store all CO 2 emissions from large stationary sources (such as power plants), at the current rate of emissions, for centuries. For additional information on the technical aspects of CCS, see CRS Report R44902, Carbon Capture and Sequestration (CCS) in the United States , and CRS Report R41325, Carbon Capture: A Technology Assessment , by Peter Folger. Use of wells to inject CO 2 builds on known processes. Much of the technology is adopted from well-established experience in the oil and gas industry, which as of 2014, injected approximately 68 million tons of CO 2 underground each year in a process known as EOR. Enhanced recovery is also used occasionally in natural gas development. EOR can significantly increase the amount of oil or gas produced from a reservoir. CO 2 is the most common injection agent used in EOR projects. CO 2 injected for EOR most commonly comes from natural sources, such as underground CO 2 reservoirs, but some is also captured from anthropogenic sources, such as natural gas production, ammonia production, and coal gasification facilities. In many cases, the CO 2 is transferred from the source to the injection site by pipeline. The CO 2 is typically injected into depleted oil or gas reservoirs using the existing well infrastructure from the original production process. The injected CO 2 travels through the pore spaces of the formation, where it combines with residual oil. The mixture is then pumped to the surface, where the CO 2 is separated from other fluids, recompressed, and reinjected. Through repeated EOR cycles, CO 2 is gradually stored in the reservoir. NETL reports that generally, between 30% and 40% of the CO 2 is stored in each injection cycle, depending on the reservoir characteristics, through what it terms \"incidental storage.\" This portion of the CO 2 \"will be contained indefinitely within the reservoir,\" according to NETL. In 2017, commercial CO 2 -EOR projects were operating in 80 oil fields in the United States, primarily located in the Permian Basin of western Texas. Some analysts project that the federal tax credit for carbon storage and the potential increased supply of CO 2 from carbon capture could lead to expansion in both the number and locations of CO 2 injection for EOR operations. Over the last decade, the focus of federal carbon storage R&D efforts, including geologic sequestration and EOR, has shifted from small demonstration projects to exploration of its technical and commercial viability for storing large volumes of captured CO 2 . DOE leads the federal government's underground carbon storage R&D as part of the agency's fossil energy programs. DOE's work includes conducting fundamental laboratory research on wells, storage design, geologic settings, and monitoring and assessment of the injected CO 2 . In 2003, DOE created the Regional Carbon Sequestration Partnerships (RCSP) programâa set of public-private partnerships across the United States to characterize, validate, and develop large-scale field testing of CO 2 injection and storage methods. The RCSP program supports these R&D projects, which include carbon storage through geologic sequestration and EOR, through partnerships with the petroleum and chemical industries and public and private research institutions. Congress has supported DOE's carbon storage work through appropriations and, beginning in 2005, through enacting legislation directing DOE to establish programs in this area. The Energy Policy Act of 2005 (EPAct, P.L. 109-58 ), Section 963, directed DOE to carry out a 10-year carbon capture R&D program to develop technologies for use in new and existing coal combustion facilities. Among the specified objectives of this program, Congress directed DOE, \"in accordance with the carbon dioxide capture program, to promote a robust carbon sequestration program\" and continue R&D work through carbon sequestration partnerships. EPAct Section 354 directed the agency to establish a demonstration program to inject CO 2 for the purposes of EOR while increasing the sequestration of CO 2 . The Energy Independence and Security Act of 2007 (EISA, P.L. 110-140 ) amended EPAct Section 963 and expanded DOE's work in carbon sequestration R&D and demonstration. EISA Title VII, Subtitle A, directed DOE to conduct fundamental science and engineering research in carbon capture and sequestration and to conduct geologic sequestration training and research. Subtitle A also specifically directed DOE to carry out at least seven large-scale projects testing carbon sequestration systems in a diversity of formations, which could include RCSP projects. Subtitle B directed DOE to conduct a national assessment for onshore capacity for CO 2 sequestration. To date in the United States, nine DOE-supported projects have injected large volumes of CO 2 into underground formations as part of CCS systems or related EOR R&D projects (see Appendix B ). Three of these active projects involve injection into saline formations for geologic sequestration (for demonstration purposes), five involve injection for EOR purposes, and one involves both sequestration and EOR. Four of these projects are currently injecting and/or storing CO 2 . The Petra Nova facility in Texas is the first operating industrial-scale coal-fired electricity generating plant with a CCS system in the United States. The captured CO 2 is transported by pipeline to an oil field where it is injected for EOR. The project is jointly owned by several energy companies and was partially funded by DOE. In Decatur, IL, ADM is injecting CO 2 from its ethanol production plant into an onsite sandstone formation for geologic sequestration. The Air Products Carbon Capture Project in Port Arthur, TX, has been injecting CO 2 captured from steam methane reformers since 2013 as part of EOR operations. Each of these projects received funds from the American Recovery and Reinvestment Act (ARRA, P.L. 111-5 ). The Michigan Basin Project in Otsego County, MI, is injecting CO 2 from a natural gas facility for EOR. DOE provides partial funding for this project through the RCSP program. All of the projects operate through collaborations among DOE, industry, and local research institutions. Five other projects that injected CO 2 were implemented through the RCSP program. The projects included sequestration into various underground formations and storage associated with EOR with volumes of CO 2 injected and stored ranging from a few hundred tons to over 1 million tons (considered commercial-scale). The RCSP program is currently in the development phase, which DOE defines as large-scale field testing of high volumes of CO 2 storage. These projects have completed injection and are now in the post-injection monitoring phase. All of the existing RCSP projects are scheduled to end by July 2022, but DOE is in the process of selecting additional projects for the program. In the United States, while numerous large-scale storage R&D projects are ongoing, none of the projects injecting CO 2 solely for geologic sequestration are operating in a commercial capacity. Worldwide, public-private partnerships have implemented several CO 2 geologic sequestration projects in diverse regions. There are two active projects, both in Norway, where facilities at the Sleipner Gas Field in the North Sea and Snohvit in the Barents Sea conduct offshore sequestration under the Norwegian continental shelf. Chevron's Gorgon Injection Project, a natural gas production facility in Australia, plans to begin sequestering CO 2 in 2020 and store a total of 100 million tons of CO 2 . Canada, Japan and Algeria have carried out smaller-scale CCS projects with sequestration in saline reservoirs. This section provides an overview of the federal framework for regulating underground injection of CO 2 for both geologic sequestration and EOR. It describes the primary federal statute for underground injection control (UIC), the general federal and state roles in developing and implementing UIC regulations, and the UIC well classes. The section analyzes the differences between wells used solely for geologic sequestration and wells used for EOR. It also outlines the regulatory requirements for transitioning from EOR wells to geologic sequestration wells. SDWA is the primary federal statute governing underground injection activities in the United States, including those associated with geologic sequestration of CO 2 . SDWA Section 1421 directs EPA to promulgate regulations for state UIC programs to protect underground sources of drinking water and prohibits any underground injection activity except when authorized by a permit or rule. The statute defines underground injection as \"the subsurface emplacement of fluids by well injection.\" EPA issues regulations for underground injection, issues guidance to support state program implementation, and in some cases, directly administers UIC programs in states. The agency has established minimum requirements for state UIC programs and permitting for injection wells. These requirements include performance standards for well construction, operation and maintenance, monitoring and testing, reporting and recordkeeping, site closure, financial responsibility, and (for some types of wells) post-injection site care. Most states implement the day-to-day program elements for most categories of wells, which are grouped into \"classes\" based on the type of fluid injected. Owners or operators of underground injection wells must follow the permitting requirements and standards established by the UIC program authorities in their states. SDWA authorizes EPA to delegate primary enforcement authority for UIC programs, known as primacy , to individual states (see Figure 2 ). Section 1422 mandates that states seeking primacy adopt and implement UIC programs that meet all minimum federal requirements under Section 1421. For wells other than certain oil- and gas-related injection wells, states must adopt laws and regulations at least as stringent as EPA regulations and meet other statutory requirements to be granted primacy. EPA grants a state primacy through a federal rulemaking process for one or more classes of wells. If granted primacy for a class of wells, a state administers that UIC program, develops its own requirements, and allows well injection by state rule or by issuing permits. If a state's UIC plan has not been approved or the state has chosen not to assume program responsibility, SDWA requires that EPA directly implement the program in that state. Under SDWA authority, EPA has established six classes of underground injection wells based on similarity in the fluids injected. Construction, injection depth, design requirements, and operating techniques vary among well classes. Some wells are used to inject fluids into formations below USDWs, while others involve injection into or above USDWs. EPA regulations set out specific permitting and performance standards for each class of wells. In 2010, EPA issued the first federal rule specific to underground injection of CO 2 , Federal Requirements Under the Underground Control (UIC) Program for Carbon Dioxide (CO 2 ) Geological Sequestration (Class VI Rule). In the rule, the agency promulgated regulations for underground injection of CO 2 for long-term storage and established UIC Class VI, a new class of wells for geologic sequestration of CO 2 . Prior to the Class VI rule's effective date in January 2011, injection of CO 2 was permitted under Class II if used for EOR or Class V if the well was experimental (e.g., DOE-supported research wells). Table 1 lists the classes of UIC wells. EPA has delegated UIC program primacy for well Classes I-V to 32 states (see Figure 2 ). EPA has delegated primacy for all six well classes to one state, North Dakota. Seven states and two tribes have primacy for Class II wells only. Including those states, a total of 40 states have primacy for Class II. For Class VI, EPA has direct implementation authority in 49 states and for all territories. For Classes I, III, IV and V only, the agency has delegated primacy for two states. EPA shares UIC implementation responsibility with seven states and two Indian tribes and implements the UIC program for all classes in eight states. Additional states are pursuing Class VI primacy: EPA is reviewing Wyoming's application for Class VI primacy, and Louisiana is in a pre-application phase. As with regulations for other well classes, the Class VI rule allows states to apply for primacy for Class VI wells without applying for primacy for other well classes. Underground injection for the purpose of long-term geologic sequestration of CO 2 is subject to SDWA UIC regulations for Class VI wells. Class VI requirements may also apply to CO 2 injection for EOR using Class II wells when EPA or the delegated state determines that there is an increased risk to USDWs. Two Class VI wells, both in Illinois, are currently permitted in the United States. EPA issued these final permits in 2017 for two wells injecting CO 2 into a saline aquifer at the ADM ethanol plant in Illinois. In 2015, EPA issued a final Class VI permit for the FutureGen project, but the permit expired after the project was cancelled without any CO 2 injection taking place. No state has issued a permit for a Class VI well. EPA requires that state primacy for Class VI wells would be implemented under SDWA Section 1422. When developing minimum federal requirements for Class VI wells, EPA generally built upon Class I hazardous waste requirements. The agency added new requirements to address the unique properties of CO 2 and geologic sequestration in the Class VI rule. In the preamble to the Class VI rule, EPA noted that \"tailored requirements, modeled on the existing UIC regulatory framework, are necessary to manage the unique nature of CO 2 injection for geologic sequestration.\" EPA bases the regulation of CO 2 injection as a separate class of wells on several unique risk factors to USDWs: Â  the large volumes of CO 2 expected to be injected through wells; the relative buoyancy of CO 2 in underground geologic formations; the mobility of CO 2 within subsurface formations; the corrosive properties of CO 2 in the presence of water that can effect well materials; and the potential presence of impurities in the injected CO 2 stream. Due to all of these properties, Class VI requirements establish a larger injection site \"area of review\" compared to requirements for other classes. The area of review for Class VI wells \"includes the subsurface three-dimensional extent of the carbon dioxide plume, associated area of elevated pressure, and displaced fluids, as well as the surface area above that delineated region.\" The requirements also obligate well owners or operators to track, model, and predict CO 2 plume movement. The monitoring and post-injection site care requirements in the regulations are based on estimates that commercial-scale CO 2 injection projects are expected to operate between 30 and 60 years. Appendix C compares the major permitting requirements and technical standards for Class II wells related to oil and gas production, which are used for EOR, and Class VI wells for geologic sequestration of CO 2 . To assist states and owner operators with the permitting process, EPA has also issued 11 technical guidance documents on Class VI wells. These documents are not legally enforceable but provide additional information on site characterization, area of review, construction, reporting and recordkeeping, site closure, financial responsibility, and other permit elements. Class II wells are used to inject fluids associated with oil and gas production, including wells injecting CO 2 for EOR. EOR wells are the most common type of Class II wells. As of 2018, there were approximately 178,000 permitted Class II wells, approximately 135,600 (76%) of which were recovery wells. Most of these wells are located in California, Texas, Kansas, Illinois, and Oklahoma. Approximately 20% of Class II wells are disposal wells and hydrocarbon storage wells. States may request primacy for Class II oil- and gas-related injection operations under SDWA Section 1422 or Section 1425. Section 1422 mandates that state programs meet EPA requirements promulgated under Section 1421 and prohibits underground injection that is not authorized by permit or rule. EPA regulations under Section 1421 specify requirements for siting, construction, operation, monitoring and testing, closure, corrective action, financial responsibility, and reporting and recordkeeping. Sixteen states and three territories have Class II primacy under Section 1422. Section 1425 allows states to administer their own Class II UIC programs using state rules in lieu of EPA regulations provided a state demonstrates that it has an effective program that prevents underground injection that endangers drinking water sources. To receive approval under Section 1425's optional demonstration provisions, a state program must include permitting, inspection, monitoring, and recordkeeping and reporting requirements. Twenty-four states and two tribes have Class II primacy under Section 1425. Most oil- and gas-producing states have primacy for Class II under this section. Overall, nearly 99% of EOR wells are located in states with primacy under Section 1425. For the 10 states without Class II primacy, the District of Columbia, and most tribes, EPA directly implements the Class II program, and federal regulations apply. While both Class II and Class VI wells involve injection of CO 2 into underground reservoirs, the purposes and regulations of these two classes are different. Class II wells inject primarily into oil or gas fields for the purposes of enhancing production from an underground oil and gas reservoir. In Class II wells, only some of the CO 2 stays in the reservoir during each recovery cycle, gradually increasing the total volume of CO 2 stored. In Class VI wells, all of the injected CO 2 is intended to remain in the reservoir for sequestration. CO 2 sequestration in Class VI wells generally involves higher injection pressures, larger expected fluid volumes, and different physical and chemical properties of the injection stream compared to Class II wells. Given these differences between the two well classes, EPA Class II regulations specify different requirements than Class VI regulations. Generally, EPA Class II requirements impose less comprehensive performance requirements and provide longer time periods between mandatory testing and reporting compared to EPA Class VI requirements. Unlike EPA Class VI requirements, EPA Class II requirements do not include providing seismicity information, continuous monitoring of the injection pressure and CO 2 stream, monitoring of the CO 2 plume and pressure front, or monitoring of groundwater quality throughout the lifetime of the project. EPA Class II requirements also do not impose post-injection site care or emergency and remedial response requirements, which are included in EPA Class VI requirements. Class II wells can be granted a permit or authorized by rule by either a primacy state or EPA, while Class VI wells cannot be authorized by rule. See Appendix C for more information on EPA Class II well requirements. Class II EOR wells have a different primary purpose than Class VI wells and must transition to a Class VI permit under certain conditions. EPA has determined that \"owners or operators of Class II wells that are injecting carbon dioxide for the primary purpose of long-term storage into an oil or gas reservoir must apply for and obtain a Class VI permit where there is an increased risk to USDWs compared to traditional Class II operations.\" EPA recognizes that there may be some CO 2 trapped in the subsurface at EOR operations. However, if the Class VI UIC program director (either EPA or the primacy state) has determined that there is no increased risk to USDWs, then these operations would continue to be permitted under the Class II requirements. To date, no Class II wells have been transitioned to Class VI. Regulations promulgated under most other federal environmental statutes have generally not applied to underground injection or geologic sequestration of CO 2 . If the well owner or operator constructs, operates, and closes the injection well in accordance with a UIC Class II or Class VI permit, the injection and storage would typically not be subject to other federal air quality, waste management, or environmental response authorities and related liability. For example, a release of a hazardous substance in compliance with a UIC permit would be exempt as a \"federally permitted release\" from liability and reporting requirements of the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA). Such federally permitted releases would also be exempt from emergency notification requirements of the Emergency Planning and Community Right-to-Know Act (EPCRA). During the development of the UIC Class VI final rule, some stakeholders in the CCS industry asked EPA for clarification on how hazardous waste requirements, established under the Resource Conservation and Recovery Act (RCRA), may apply to CO 2 streams that are geologically sequestered. In response, EPA promulgated a rule excluding CO 2 from RCRA's hazardous waste management requirements when injected into UIC Class VI wells. As a result, when geologically sequestered in compliance with a UIC Class VI well permit, CO 2 streams are not separately subject to RCRA requirements applicable to the management of hazardous waste. Certain federal regulations may apply to CCS processes or facilities that support CO 2 injection and sequestration, such as carbon capture and CO 2 transportation and compression. The regulatory frameworks of these activities are beyond the scope of this report. The Greenhouse Gas Reporting Program (GHGRP) established by EPA under the authority of the Clean Air Act, requires certain sources of GHGs to report emissions data. In 2010, EPA promulgated a rule to include injection and geologic sequestration of CO 2 in the GHGRP. In this rule, the agency determined that facilities that inject CO 2 for long-term sequestration and all other facilities that inject CO 2 underground fall within the GHGRP covered source categories. Therefore, reporting requirements apply to both Class VI wells and Class II wells that inject CO 2 . EPA's purpose for collecting this information is two-fold: to track CO 2 emissions and to quantify the amount of CO 2 being sequestered. Under the GHGRP Rule Subpart RR, facilities that inject a CO 2 stream for long-term containment (i.e., geologic sequestration) must develop and implement a monitoring, reporting, and verification plan. The purpose of this plan is to verify the amount of CO 2 sequestered and collect data on any CO 2 surface emissions from geologic sequestration facilities. Any facility holding a Class VI permit would be subject to Subpart RR and be required to report the mass of CO 2 that is received, injected into the subsurface, produced, emitted by surface leakage, emitted by leaks in equipment, and emitted by venting. Facilities must also report the mass of CO 2 sequestered in subsurface geologic formations. Subpart UU of the rule applies to Class II wellsâfor the injection of CO 2 for EOR and for small and experimental sequestration projects exempted under Subpart RR. Subpart UU does not require a monitoring, reporting, and verification plan and sets forth different requirements for monitoring and reporting. If Congress were to address carbon storage through underground injection, there are a variety of policy issues Members may consider. Several policy issues relate to the current SDWA UIC regulatory framework and what elements of CO 2 injection are covered under the statute's purpose and approach. Congress may also wish to consider other issues that may have implications for CO 2 injection and storage policy, including current pathways of federal support for CCS and underground carbon storage, project cost, and stakeholder perspectives on CCS and fossil fuels. SDWA currently serves as the major federal authority for regulating injection of CO 2 for geologic sequestration and carbon storage in general. However, the major purpose of the act's UIC provisions is to prevent endangerment of public water supplies and sources from injection activities. In the preamble to the proposed Class VI Rule, EPA states, \"While the SDWA provides EPA with the authority to develop regulations to protect USDWs from endangerment, it does not provide authority to develop regulations for all areas related to GS [geologic sequestration].\" The agency identified specific policy areas related to geologic sequestration that are beyond the agency's authority, including (but not limited to) capture and transport of CO 2 , managing human health and environmental risks other than drinking water endangerment, determining property rights, and transfer of liability from one entity to another. The agency acknowledges the challenge of balancing SDWA goals with broader efforts to support geologic sequestration. In the preamble to the Class VI Rule, EPA noted that the rule \"ensures protection of USDWs while also providing regulatory certainty to industry and permitting authorities and an increased understanding of GS through public participation and outreach.\" Federal agencies, external analysts, and other stakeholders have expressed a variety of viewpoints on the potential risks associated with injection and geologic sequestration of CO 2 . EPA, the Interagency Task Force on Carbon Capture and Storage, and others have recognized that CO 2 injection and sequestration activities may convey risks to the environment and human health. Some of these risks involve potential endangerment of USDWs that would be covered by SDWA. Other potential impacts, however, are not covered by SDWA or the UIC implementing regulations. For groundwater-related risks, EPA has noted that expansion of CO 2 -EOR and associated CO 2 storage could increase the risk of endangerment to USDWs due to increased injection zone pressures and the large number of wells in oil and gas fields that could serve as leakage pathways. Injected CO 2 could also force brine from the target formation into USDWs, which could affect drinking water. To address potential releases or leakage that could endanger USDWs, in the Class VI rule, EPA included monitoring, reporting, and recordkeeping requirements specific to CO 2 injection. Class VI construction and testing requirements, which are generally more stringent than Class II requirements for EOR, are also intended to prevent USDW endangerment. Regarding other types of risk from improperly managed projects, EPA identified risks to air quality, human health, and ecosystems as potential concerns not addressed by SDWA authorities. In its 2010 report, the Task Force concluded that SDWA's limited application to only those groundwater formations that meet the specific statutory definition of USDWs may \"require clarification to support actions to address or remedy ecological or non-drinking water human health impacts arising from the injection and sequestration of CO 2 .\" The Task Force also stated that an accidental large release could result in risks to surface water, local ecology, and human health. (See text box Human Health and Environmental Considerations of CO 2 and Geologic Sequestration .) An additional concern with injection and sequestration of CO 2 is the increased potential for earthquakes associated with deep-well injection. Earthquakes induced by CO 2 injection could fracture the rocks in the reservoir or, more importantly, the caprock above the reservoir. Class VI well regulations require that information on earthquake-related history be included in the permit application and that owners or operators not exceed injection pressure that would induce seismicity or initiate fractures. NETL and other stakeholders offer other perspectives on potential health and environmental risks. Regarding the risks of CO 2 leakage, NETL outlines several case studies on leakage related to underground carbon storage in a 2019 report. The report states that use of EOR in the United States \"has demonstrated that large volumes of gas can be stored safely underground and over long timeframes when the appropriate best-practices are implemented.\" According to the report, \"Despite over 40 years of operating CO 2 EOR projects, leakage events have rarely been reported,\" although the authors also note that \"there has been no official mechanism for reporting leaks of CO 2 until recently.\" Other stakeholders have also commented that, even given potential health and environmental risks, the benefits of CO 2 sequestration in reducing GHG emissions as part of climate change mitigation efforts outweigh such risks. In the Class VI rule, EPA acknowledged stakeholder interest in liability and long-term stewardship but noted that that the agency does not have the authority to determine property rights or transfer liability from one owner or operator to another. In its report, the Task Force also identified that \"the existing Federal framework largely does not provide for a release or transfer of liability from the owner/operator to other persons\" and noted that some stakeholders view these issues as a barrier to future CCS project deployment. Specific policy questions regarding property rights include who owns and controls the subsurface formations (known as the pore space) targeted for CO 2 sequestration, if and how such property can be transferred or aggregated, and how underground reservoirs that cross state and tribal boundaries should be regulated. State laws and contractual property arrangements, similar to those established for oil and gas development, may address some of these questions, but some analysts identify the need for more clarity. Issues of financial liability and long-term stewardship of injection sites and storage reservoirs also remain largely unresolved. Analysts have raised questions such as (1) who is responsible for the site and reservoir after the 50-year mandated post-injection site care period, (2) what is the role of the federal or state government in assisting site developers and operators with managing the risks associated with sequestration activities, and (3) whether the federal government should be involved in taking on some or all financial responsibility during the life-cycle of sequestration projects. Large-scale commercial geologic sequestration projects would likely require unique liability and stewardship structures that address issues such as the particular characteristics of CO 2 , the entire life-cycle of sequestration projectsâfrom site selection to periods beyond site closureâand the geologic time frame (hundreds or thousands of years) over which sequestration occurs. For more information on legal sequestration issues, see CRS Report RL34307, Legal Issues Associated with the Development of Carbon Dioxide Sequestration Technology , by Adam Vann and Paul W. Parfomak. EPA has stated that \"a supporting regulatory framework for the future development and deployment of [carbon storage] technology can provide the regulatory certainty needed to foster industry adoption of CCS, which is crucial to supporting the goal of any climate change legislation.\" Even with the completion of several large-scale demonstration field projects, analysts recognize uncertainties regarding wide-spread commercial CCS operation in the United States. These technical issues include uncertainties in operations, such as how much CO 2 would be injected, CO 2 sources, availability of appropriate locations, and the exact constituents of CO 2 injection streams. A lack of existing infrastructure for CCS systemsâfrom capture technology to pipelines to transport CO 2 âmay also act as barriers to future CCS deployment. Congress has directly supported federal activities in both geologic sequestration of CO 2 and EOR through the EPAct in 2005 and EISA in 2007, directing DOE to carry out R&D activities to further technical knowledge and deployment of CCS. Several bills in the 116 th Congressâincluding H.R. 1166 / S. 383 , H.R. 3607 , and S. 1201 âwould continue or expand DOE's CCS programs, including carbon storage programs. Some of these bills would direct EPA to conduct CCS research and/or direct DOE to develop and implement R&D programs related to geologic sequestration methods, storage siting, and assessment of potential impacts. Provisions in some of these bills would also direct DOE to continue its partnership programs for large-scale sequestration demonstration projects. Other relevant provisions include provisions that would require actions from the Council on Environmental Quality, such as publishing guidance and submitting reports to Congress on CCS research and development. The cost of constructing and operating a new CCS system or retrofitting an existing facility, such as a coal-fired power plant, with CCS is likely to play a major role in the future deployment of commercially viable sequestration projects. Costs for large-scale geologic sequestration or EOR include expenses directly related to injection and storage, as well as costs of investing in sufficient carbon capture and transportation infrastructure and maintaining ongoing facility operations. Regarding regulatory costs associated with geologic sequestration, in the preamble to the Class VI rule, EPA specified the agency's intention that the rule would not impede geologic sequestration: Should this rule somehow impede GS from happening, then the opportunity costs of not capturing with the benefits associated with GS could be attributed to this regulation; however the Agency has tried to develop a rule that balances risk with practicability, site specific flexibility and economic considerations and believes the probability of such impedance is low. Analysts expect that the costs of CCS, whether new system or retrofitting of an existing facility, are likely to total several billion dollars per project, which could act as a barrier to future CCS deployment without the continuation of subsidies. Recently, Public Service Company of New Mexico reportedly estimated that retrofitting a 500-megawatt coal-fired power plant with CCS technology could cost between $5 billion and $6 billion. The company reportedly stated that its evaluations showed that it would be more cost effective to switch to another source of energy (such as renewable energy) rather than continue to use coal with the addition of CCS. Examples of completed commercial-scale CCS operations and associated costs are limited, causing some uncertainty regarding future investments and the scale of project deployment in the coming decades. In a 2019 report, NETL indicated that \"the potential costs of commercial-scale CCS are still not fully understood, particularly from a fully integrated (capture, transportation, and storage) perspective.\" Costs could vary greatly due to a variety of site-specific factors. The type of capture technology is the largest component of costs, possibly accounting for as much as 80% of the total. The variations in the geology of storage formations also make predicting future geologic sequestration costs particularly difficult. Projects that inject some or all the CO 2 for EOR (with incidental carbon storage) involve different cost implications and economic factors from projects injecting solely for permanent CO 2 sequestration. These factors could influence future deployment of these types of projects, as facility owners and operators may consider cost implications when deciding whether to invest in EOR or when deciding between investing projects for EOR or permanent geologic sequestration. EOR operations typically use the existing injection infrastructure in place from earlier oil and gas production activities. Thus, the well exploration and construction costs are \"sunk costs.\" Unlike geologic sequestration projects, these expenses may not be included in total project cost calculations, resulting in comparatively lower costs for injecting and storing the CO 2 . In addition, for EOR projects, overall project costs could be influenced by revenue for the owner or operator from additional oil and gas production. EOR project costs may also be subject to variability and uncertainty, however. NETL notes that the price of oil and the cost and availability of CO 2 are key drivers in the economics of CO 2 EOR. Federal tax credits for carbon storage, available since 2009 for both EOR and geologic sequestration, may also play a role in underground injection and storage of CO 2 project costs and investment decisions . These credits are discussed later in this report. In the preamble to the proposed Class VI rule, EPA noted that \"GS of CO 2 is a new technology that is unfamiliar to most people, and maximizing the public's understanding of the technology can result in more meaningful public input and constructive participation as new GS projects are proposed and developed.\" EPA also stated that \"the agency expects that there will be higher levels of public interest in GS projects than for other injection activities.\" In the Class VI rule, EPA adopted the existing UIC public participation requirements, which require permitting authorities to provide public notice of pending actions, hold public hearings if requested, solicit and respond to public comments, and involve a broad range of stakeholders. At least two cases involving Class VI permits have come before EPA's Environmental Appeals Board. The first case involved the permit for the FutureGen facility, which was never constructed. The second case involved ADM's Illinois facility, currently operating and permitted in Illinois. Public concerns centered on safety and environmental protection issues, including air quality, groundwater quality, and protection of endangered species. Local landowners claimed that the permits do not adequately address how the facility will ensure these protections in the event of leakage or well failure. They also raised concerns about property rights (including mineral rights), potential decreases in property value, and increased traffic associated with the facilities. In the EPAct in 2005 and EISA in 2007, Congress recognized connections between geologic sequestration of CO 2 and the continued use of fossil fuel as a major source of electricity in the United States. Consistent with Congress's directives, DOE's CCS research identifies that the purpose of its CCS research, technology development, and testing is \"to benefit the existing and future fleet of fossil fuel power generating facilities by creating tools to increase our understanding of geologic reservoirs appropriate for CO 2 storage and the behavior of CO 2 in the subsurface.\" In the preamble to the proposed Class VI rule, EPA stated that, \"the capture and storage of CO 2 would enable the continued use of coal in a manner that greatly reduces the associated CO 2 emissions while other safe and affordable energy sources are developed in the coming decades.\" Some stakeholders have argued for further research, development and deployment of CCS (when coupled with negative carbon technology, such as direct air capture) as a method for achieving the negative emissions trajectories modeled by the IPCC. Some of these stakeholders state that CCS is an appropriate transitional technology to reduce CO 2 emissions from electricity generation and other industrial sources while expanding the capacity of low or zero-carbon power sources, such as renewable energy. In contrast, other stakeholders have argued that CO 2 sequestration could create a disincentive to reduce fossil-fuel-based power plant emissions or shift to renewable energy sources. In particular, some stakeholders note that injecting CO 2 for EOR may actually increase net GHG emissions, as it produces additional oil and gas to be burned as fuel. CCS systems also require energy to compress, transport, and inject the CO 2 , which, if derived from fossil fuel combustion, could detract from the net GHG reduc tion benefits of sequestration. Federal tax credits for carbon storage were first enacted in 2008 by the Energy Improvement and Extension Act ( P.L. 110-343 ). This act added Section 45Q to the Internal Revenue Code, which established tax credits for CO 2 storage through both EOR and geologic sequestration. For EOR, only the CO 2 that is used as tertiary injectant and remains in the reservoir qualifies for the tax credit. CO 2 recaptured or recycled does not qualify. The Bipartisan Budget Act of 2018 (BBA) amended Section 45Q to increase the amount of these tax credits from $22.66 to $50 per ton over time for sequestered CO 2 and from $12.83 to $35 per ton over time for CO 2 used in EOR. The BBA also removed a 75-million-ton cap on total qualified CO 2 captured or injected but required the relevant taxpayer to claim the credit over a 12-year period after operations begin. Additionally, eligible facilities must be operating or must begin construction before 2024. The U.S. Department of the Treasury is currently considering comments on proposed implementing regulations for the BBA tax credit provision and has not released a final rule. In response to the 2019 Internal Revenue Service notice requesting comments on carbon credits for future regulations and guidance, some oil and gas industry commenters expressed concerns with Treasury's proposed approach to measuring \"secure geological storage\" and other requirements, which they assert would impact their ability to plan and invest in CCS projects. In the meantime, the tax credit as authorized in the BBA is available to qualified entities. Treasury estimates that in FY2019, the credit will reduce federal income tax revenue by $70 million. Over the FY2020-FY2029 budget window, Treasury estimates that the tax credit will reduce federal income tax revenue by a total of $2.3 billion. As of May 2019, the amount of stored carbon oxide claimed for 45Q credits since 2011 totaled 62,740,171 tons. In legislation pending in the 116 th Congress, H.R. 5156 would extend the deadline for the start of construction of a qualified facility to January 1, 2025. S. 2263 would revise the requirements for the secure geologic storage of carbon oxide for EOR and sequestration. Table 2 , below, lists legislation introduced in the 116 th Congress that includes provisions relating to geologic sequestration of CO 2 (as of date of report publication). Legislation in the 116 th Congress has focused on research and development of CCS, including carbon storage through EOR and geologic sequestration, and adjustments to the 45Q carbon storage tax credit. Appendix A. Estimates of U.S. Storage Capacity forÂ CO 2 Appendix B. Large Scale Injection and Geologic Sequestration of CO 2 Projects in the United States Appendix C. Comparison of Class II and Class VI Wells", "summary": "For several decades the federal government has funded efforts to explore the feasibility of mitigating the release of greenhouse gases (GHGs) while burning fossil fuels as a source of energy. Carbon capture and storage (CCS)âthe process of capturing manmade carbon dioxide (CO 2 ) at its source, such as a coal-fired power plant, and storing it before its release into the atmosphereâhas been proposed as a technological solution for mitigating emissions into the atmosphere while continuing to use fossil energy. Underground carbon storage, known as geologic sequestration, is the long-term containment of a fluid (including gas or liquid CO 2 in subsurface geologic formations). Long-term storage of CO 2 can also occur incidentally through enhanced oil recovery (EOR), a process of injecting CO 2 into an oil or gas reservoir that can significantly increase the amount of oil or gas produced. The U.S. Department of Energy (DOE) leads the federal government's carbon storage research and development (R&D) as part of the agency's fossil energy programs. The agency conducts research on geologic sequestration and EOR, and carries out the Regional Carbon Sequestration Partnerships (RCSP) programâa set of public-private partnerships across the United States to deploy testing and development of CO 2 injection and storage. To date in the United States, nine projects have injected large volumes of CO 2 into underground formations as demonstrations of potential commercial-scale storage. Four of these projects are actively injecting and storing CO 2 âone in an underground saline reservoir to demonstrate geologic sequestration and three in oil and gas reservoirs as part of EOR. Currently, while numerous large-scale storage R&D projects are ongoing in the United States, none of the projects injecting CO 2 solely for geologic sequestration are operating in a commercial capacity. The Safe Drinking Water Act (SDWA), administered by the U.S. Environmental Protection Agency (EPA), provides authorities for regulating underground injection of fluids and serves as the framework for regulation of geologic sequestration of CO 2 and EOR. The major purpose of the act's Underground Injection Control (UIC) provisions is to prevent endangerment of underground sources of drinking water from injection activities. EPA has promulgated regulations and established minimum federal requirements for six classes of injection wells. In 2010, EPA promulgated regulations for the underground injection of CO 2 for long-term storage and established UIC Class VI, a new class of wells solely for geologic sequestration of CO 2 . The well performance standards and other requirements established in the Class VI rule are based on the distinctive features of CO 2 injection compared to other types of injection. Two Class VI wells, both in Illinois, are currently permitted by EPA in the United States. No state has issued a permit for a Class VI well. CO 2 injection for EOR is conducted using Class II wells (associated with oil and gas production). SDWA also authorizes states to administer UIC programs in lieu of EPA, known as primacy . For Class VI CO 2 geologic sequestration wells, only North Dakota has primacy. Most oil and gas producing states have primacy for Class II wells and regulate these wells under their own state programs. Congress has supported carbon storage via underground injection through recent legislation directing DOE to expand R&D activity and increasing the federal tax credit for underground carbon storage. A policy challenge that Congress may face with underground carbon storage is balancing protection of underground sources of drinking water with supporting and encouraging the development of cost-effective CCS technology. If Congress were to explore future policy in this area, Members may consider the potential health and environmental risks (beyond any related risks to underground sources of drinking water) not addressed by SDWA. Other issues for Congress include unresolved liability and property rights issues, overall CCS project cost, public acceptance of these sequestration projects and participation in their planning, and the relationship of the growth of underground carbon storage with continuing to burn fossil fuels for generating electricity.", "document_type": "crs"}
{"report": "This report describes the structure, activities, legislative history, and funding history of seven federally-chartered regional commissions and authorities: the Appalachian Regional Commission (ARC); the Delta Regional Authority (DRA); the Denali Commission; the Northern Border Regional Commission (NBRC); the Northern Great Plains Regional Authority (NGPRA); the Southeast Crescent Regional Commission (SCRC); and the Southwest Border Regional Commission (SBRC) ( Table A-1 ). The federal regional commissions are also functioning examples of place-based and intergovernmental approaches to economic development, which receive regular congressional interest. The federal regional commissions and authorities integrate federal and state economic development priorities alongside regional and local considerations ( Figure A-1 ). As federally-chartered agencies created by acts of Congress, the federal regional commissions and authorities depend on congressional appropriations for their activities and administration, and are subject to congressional oversight. Seven federal regional commissions and authorities were authorized by Congress to address instances of major economic distress in certain defined socio-economic regions, with all but one (Alaska's Denali Commission) being multi-state regions ( Figure B-1 ). The first such federal regional commission, the Appalachian Regional Commission, was founded in 1965. The other commissions and authorities may have roots in the intervening decades, but were not founded until 1998 (Denali), 2000 (Delta Regional Authority), and 2002 (the Northern Great Plains Regional Authority). The most recent commissionsâNorthern Border Regional Commission, Southeast Crescent Regional Commission, and Southwest Border Regional Commissionâwere authorized in 2008. Four of the seven entitiesâthe Appalachian Regional Commission, the Delta Regional Authority, the Denali Commission, and the Northern Border Regional Commissionâare currently active and receive regular annual appropriations. Certain strategic emphases and programs have evolved over time in each of the functioning federal regional commissions and authorities. However, their overarching missions to address economic distress have not changed, and their associated activities have broadly remained consistent to those goals as funding has allowed. In practice, the functioning federal regional commissions and authorities engage in their respective economic development efforts through multiple program areas, which may include, but are not limited to basic infrastructure; energy; ecology/environment and natural resources; workforce/labor; and business development. The Appalachian Regional Commission was established in 1965 to address economic distress in the Appalachian region. The ARC's jurisdiction spans 420 counties in Alabama, Georgia, Kentucky, Maryland, Mississippi, New York, North Carolina, Ohio, Pennsylvania, South Carolina, Tennessee, Virginia, and West Virginia ( Figure 1 ). The ARC was originally created to address severe economic disparities between Appalachia and that of the broader United States; recently, its mission has grown to include regional competitiveness in a global economic environment. According to the authorizing legislation, the Appalachian Regional Development Act of 1965, as amended, the ARC is a federally-chartered, regional economic development entity led by a federal co-chair, whose term is open-ended, and the 13 participating state governors, of which one serves as the state co-chair for a term of \"at least one year.\" The federal co-chair is appointed by the President with the advice and consent of the Senate. The authorizing act also allows for the appointment of federal and state alternates to the commission. The ARC is a federal-state partnership, with administrative costs shared equally by the federal government and member states, while economic development activities are funded by congressional appropriations. According to authorizing legislation and the ARC code, the ARC's programs abide by a Regional Development Plan (RDP), which includes documents prepared by the states and the commission. The RDP is comprised of the ARC's strategic plan, its bylaws, member state development plans, each participating state's annual strategy statement, the commission's annual program budget, and the commission's internal implementation and performance management guidelines. The RDP integrates local, state, and federal economic development priorities into a common regional agenda. Through state plans and annual work statements, states establish goals, priorities, and agendas for fulfilling them. State planning typically includes consulting with local development districts (LDDs), which are multicounty organizations that are associated with and financially supported by the ARC and advise on local priorities. There are 73 ARC-associated LDDs. They may be conduits for funding for other eligible organizations, and may also themselves be ARC grantees. State and local governments, governmental entities, and nonprofit organizations are eligible for ARC investments, including both federal- and also state-designated tribal entities. Notably, non-federally recognized, state-designated tribal entities are eligible to receive ARC funding, which is an exception to the general rarity of federal funds being available to non-federally recognized tribal entities. ARC's strategic plan is a five-year document, reviewed annually, and revised as necessary. The current strategic plan, adopted in November 2015, prioritizes five investment goals: 1. entrepreneurial and business development; 2. workforce development; 3. infrastructure development; 4. natural and cultural assets; and 5. leadership and community capacity. The ARC's investment activities are divided into 10 program areas: These program areas can be funded through five types of eligible activities: 1. business development and entrepreneurship, through grants to help create and retain jobs in the region, including through targeted loan funds; 2. education and training, for projects that \"develop, support, or expand education and training programs\"; 3. health care, through funding for \"equipment and demonstration projects\" and sometimes for facility construction and renovation, including hospital and community health services; 4. physical infrastructure, including funds for basic infrastructure services such as water and sewer facilities, as well as housing and telecommunications; and 5. leadership development and civic capacity, such as community-based strategic plans, training for local leaders, and organizational support. While most funds are used for economic development grants, approximately $50 million is reserved for the Partnerships for Opportunity and Workforce and Economic Revitalization (POWER) Initiative. The POWER Initiative began in 2015 to provide economic development funding for addressing economic and labor dislocations caused by energy transition principally in coal communities in the Appalachian region. The ARC is statutorily obligated to designate counties according to levels of economic distress. Distress designations influence funding priority and determine grant match requirements. Using an index-based classification system, the ARC compares each county within its jurisdiction with national averages based on three economic indicators: (1) three-year average unemployment rates; (2) per capita market income; and (3) poverty rates. These factors are calculated into a composite index value for each county, which are ranked and sorted into designated distress levels. Each distress level corresponds to a given county's ranking relative to that of the United States as a whole. These designations are defined as follows by the ARC, starting from \"worst\" distress: distressed counties, or those with values in the \"worst\" 10% of U.S. counties; at-risk , which rank between worst 10% and 25%; transitional , which rank between worst 25% and best 25%; competitive , which rank between \"best\" 25% and best 10%; and attainment , or those which rank in the best 10%. The designated level of distress is statutorily tied to allowable funding levels by the ARC (funding allowance), the balance of which must be met through grant matches from other funding sources (including potentially other federal funds) unless a waiver or special dispensation is permitted: distressed (80% funding allowance, 20% grant match); at-risk (70%); transitional (50%); competitive (30%); and attainment (0% funding allowance). Exceptions can be made to grant match thresholds. Attainment counties may be able to receive funding for projects where sub-county areas are considered to be at higher levels of distress, and/or in those cases where the inclusion of an attainment county in a multi-county project would benefit one or more non-attainment counties or areas. In addition, special allowances may reduce or discharge matches, and match requirements may be met with other federal funds. In 1960, the Alabama, Georgia, Kentucky, Maryland, North Carolina, Pennsylvania, Tennessee, Virginia, and West Virginia governors formed the Council of Appalachian Governors to highlight Appalachia's extended economic distress and to press for increased federal involvement. In 1963, President John F. Kennedy formed the President's Appalachian Regional Commission (PARC) and charged it with developing an economic development program for the region. PARC's report, issued in 1964, called for the creation of an independent agency to coordinate federal and state efforts to address infrastructure, natural resources, and human capital issues in the region. The PARC also included some Ohio counties as part of the Appalachian region. In 1965, President Lyndon Johnson signed the Appalachian Regional Development Act, which created the ARC to address the PARC's recommendations, and added counties in New York and Mississippi. The ARC was directed to administer or assist in the following initiatives: The creation of the Appalachian Development Highway System; Establishing \"Demonstration Health Facilities\" to fund health infrastructure; Land stabilization, conservation, and erosion control programs; Timber development organizations, for purposes of forest management; Mining area restoration, for rehabilitating and/or revitalizing mining sites; A water resources survey; Vocational education programs; and Sewage treatment infrastructure. In 1975, the ARC's authorizing legislation was amended to require that state governors themselves serve as the state representatives on the commission, overriding original statutory language in which governors were permitted to appoint designated representatives. The amendments also included provisions to expand public participation in ARC plans and programs. They also required states to consult with local development districts and local governments and authorized federal grants to the ARC to assist states in enhancing state development planning. Legislative reforms in 1998 introduced county-level designations of distress. The legislation organized county-level distress into three bands, from \"worst\" to \"best\": distressed counties; competitive counties; and attainment counties. The act imposed limitations on funding for economically strong counties: (1) \"competitive,\" which could only accept ARC funding for 30% of project costs (with the 70% balance being subject to grant match requirements); and (2) \"attainment,\" which were generally ineligible for funding, except through waivers or exceptions. In addition, the act withdrew the ARC's legislative mandate for certain programs, including the land stabilization, conservation, and erosion control program; the timber development program; the mining area restoration program; the water resource development and utilization survey; the Appalachian airport safety improvements program (a program added in 1971); the sewage treatment works program; and amendments to the Housing Act of 1954 from the original 1965 act. Legislation in 2002 expanded the ARC's ability to support LDDs, introduced an emphasis on ecological issues, and provided for a greater coordinating role by the ARC in federal economic development activities. The amendments also provided new stipulations for the ARC's grant making, limiting the organization to funding 50% of project costs or 80% in designated distressed counties. The amendments also expanded the ARC's efforts in human capital development projects, such as through various vocational, entrepreneurial, and skill training initiatives. The Appalachian Regional Development Act Amendments of 2008 is the ARC's most recent substantive legislative development and reflects its current configuration. The amendments included: 1. various limitations on project funding amounts and commission contributions; 2. the establishment of an economic and energy development initiative; 3. the expansion of county designations to include an \"at-risk\" designation; and 4. the expansion of the number of counties under the ARC's jurisdiction. The 2008 amendments introduced funding limitations for ARC grant activities as a whole, as well as to specific programs. According to the 2008 legislation, \"the amount of the grant shall not exceed 50 percent of administrative expenses.\" However, at the ARC's discretion, an LDD that included a \"distressed\" county in its service area could provide for 75% of administrative expenses of a relevant project, or 70% for \"at-risk\" counties. Eligible activities could only be funded by the ARC at a maximum of 50% of the project cost, or 80% for distressed counties and 70% for \"at-risk\" counties. The act introduced special project categories, including (1) demonstration health projects; (2) assistance for proposed low- and middle-income housing projects; (3) the telecommunications and technology initiative; (4) the entrepreneurship initiative; and (5) the regional skills partnership. Finally, the \"economic and energy development initiative\" provided for the ARC to fund activities supporting energy efficiency and renewable technologies. The legislation expanded distress designations to include an \"at-risk\" category, or counties \"most at risk of becoming economically distressed.\" This raised the number of distress levels to five. The legislation also expanded ARC's service area. Ten counties in four states were added to the ARC, which represents the most recent expansion. The ARC is a federal-state partnership, with administrative costs shared equally by the federal government and states, while economic development activities are federally funded. The ARC is also the highest-funded of the federal regional commissions and authorities. Its funding ( Table 1 ) has increased 126% from approximately $73 million in FY2008 to $165 million in FY2019. The ARC's funding growth is attributable to incremental increases in appropriations along with an approximately $50 million increase in annual appropriated funds in FY2016 set aside to support the POWER Initiative. The POWER Initiative was part of a wider federal effort under the Obama Administration to support coal communities affected by the decline of the coal industry. The FY2018 White House budget proposed to shutter the ARC as well as the other federal regional commissions and authorities. Congress did not adopt these provisions from the President's budget, and continued to fund the ARC and other commissions. The Delta Regional Authority was established in 2000 to address economic distress in the Mississippi River Delta region. The DRA aims to \"improve regional economic opportunity by helping to create jobs, build communities, and improve the lives of the 10 million people\" in 252 designated counties and parishes in Alabama, Arkansas, Illinois, Kentucky, Louisiana, Mississippi, Missouri, and Tennessee ( Figure 2 ). Like the ARC, the DRA is a federal-state partnership that shares administrative expenses equally, while activities are federally funded. The DRA consists of a federal co-chair appointed by the President with the advice and consent of the Senate, and the eight state governors, of which one is state co-chair. The governors are permitted to appoint a designee to represent the state, who also generally serves as the state alternate. Entities that are eligible to apply for DRA funding include: 1. state and local governmentsÂ (state agencies, cities and counties/parishes); 2. public bodies; and 3. non-profit entities. These entities must apply for projects that operate in or are serving residents and communities within the 252 counties/parishes of the DRA's jurisdiction. Funding determinations are assessed according to the DRA's authorizing statute, its strategic plan, state priorities, and distress designation. The DRA strategic plan articulates the authority's high-level economic development priorities. The current strategic planâ Moving the Delta Forward , Delta Regional Development Plan IIIâwas released in April 2016 and is in effect through 2021. The strategic plan lists three primary goals: 1. workforce competitiveness, to \"advance the productivity and economic competitiveness of the Delta workforce\"; 2. strengthened infrastructure, to \"strengthen the Delta's physical, digital, and capital connections to the global economy\"; and 3. increased community capacity, to \"facilitate local capacity building within Delta communities, organizations, businesses, and individuals.\" State development plans are required by statute every five years to coincide with the strategic plan, and reflect the economic development goals and priorities of member states and LDDs. The DRA funds projects through 44 LDDs, which are multicounty economic development organizations financially supported by the DRA and advise on local priorities. LDDs \"provide technical assistance, application support and review, and other services\" to the DRA and entities applying for funding. LDDs receive administrative fees paid from awarded DRA funds, which are calculated as 5% of the first $100,000 of an award, and 1% for all dollars above that amount. The DRA determines a county or parish as distressed on an annual basis through the following criteria: 1. an unemployment rate of 1% higher than the national average for the most recent 24-month period; and 2. a per capita income of 80% or less than the national per capita income. The DRA designates counties as either distressed or not, and distressed counties received priority funding from DRA grant making activities. By statute, the DRA directs at least 75% of funds to distressed counties; half of those funds must target transportation and basic infrastructure. As of FY2018, 234 of the DRA's 252 counties are considered distressed. The principal investment tool used by the DRA is the States' Economic Development Assistance Program (SEDAP), which \"provides direct investment into community-based and regional projects that address the DRA's congressionally mandated four funding priorities.\" The DRA's four funding priorities are: 1. (1) basic public infrastructure; 2. (2) transportation infrastructure; 3. (3) workforce development; and 4. (4) business development (emphasizing entrepreneurship). The DRA's SEDAP funding is made available to each state according to a four-factor, formula-derived allocation that balances geographic breadth, population size, and economic distress ( Table 2 ). The factors and their respective weights are calculated as follows: Equity Factor (equal funding among eight states), 50%; Distressed Population (DRA counties/parishes), 20%; Distressed County Area (DRA counties/parishes), 20%; and Population Factor (DRA counties/parishes), 10%. DRA investments are awarded from state allocations. SEDAP applications are accepted through LDDs, and projects are sorted into tiers of priority. While all projects must be associated with one of the DRA's four funding priorities, additional prioritization determines the rank order of awards, which include county-level distress designations; adherence to at least one of the federal priority eligibility criteria (see below); adherence to at least one of the DRA Regional Development Plan goals (from the strategic plan); and adherence to at least one of the state's DRA priorities. The federal priority eligibility criteria are as follows: The DRA is also mandated to expend 50% of its appropriated SEDAP dollars on basic public and transportation infrastructure projects, which lend additional weight to this particular criterion. In 1988, the Rural Development, Agriculture, and Related Agencies Appropriations Act for FY1989 ( P.L. 100-460 ) appropriated $2 million and included language that authorized the creation of the Lower Mississippi Delta Development Commission. The LMDDC was a DRA predecessor tasked with studying economic issues in the Delta and developing a 10-year economic development plan. The LMDDC consisted of two commissioners appointed by the President as well as the governors of Arkansas, Illinois, Kentucky, Louisiana, Mississippi, Missouri, and Tennessee. The commission was chaired by then-Governor William J. Clinton of Arkansas, and the LMDDC released interim and final reports before completing its mandate in 1990. Later, in the White House, the Clinton Administration continued to show interest in an expanded federal role in Mississippi Delta regional economic development. In 1994, Congress enacted the Lower Mississippi Delta Region Heritage Study Act, which built on the LMDDC's recommendations. In particular, the 1994 act saw the Department of the Interior conduct a study on key regional cultural, natural, and heritage sites and locations in the Mississippi Delta region. In 1999, the Delta Regional Authority Act of 1999 was introduced in the House ( H.R. 2911 ) and Senate ( S. 1622 ) to establish the DRA by amending the Consolidated Farm and Rural Development Act. Neither bill was enacted, but they established the structure and mission later incorporated into the DRA. In 2000, the Consolidated Appropriations Act for FY2001 ( P.L. 106-554 ) included language authorizing the creation of the DRA based on the seven participating states of the LMDDC, with the addition of Alabama and 16 of its counties. The Farm Security and Rural Investment Act of 2002, or 2002 farm bill ( P.L. 107-171 ), amended voting procedures for DRA states, provided new funds for Delta regional projects, and added four additional Alabama counties to the DRA. The Food, Conservation, and Energy Act of 2008, or 2008 farm bill ( P.L. 110-234 ) reauthorized the DRA from FY2008 through FY2012 and expanded it to include Beauregard, Bienville, Cameron, Claiborne, DeSoto, Jefferson Davis, Red River, St. Mary, Vermillion, and Webster Parishes in Louisiana; and Jasper and Smith Counties in Mississippi. The Agricultural Act of 2014, or 2014 farm bill ( P.L. 113-79 ) reauthorized the DRA through FY2018. The Agriculture Improvement Act of 2018, or 2018 farm bill ( P.L. 115-334 ), reauthorized the DRA from FY2019 to FY2023, and emphasized Alabama's position as a \"full member\" of the DRA. Under \"farm bill\" legislation, the DRA has consistently received funding authorizations of $30 million annually since it was first authorized. However, appropriations have fluctuated over the years. Although the DRA was appropriated $20 million in the same legislation authorizing its creation, that amount was halved in 2002, and continued a downward trend through its funding nadir of $5 million in FY2004. However, funding had increased by FY2006 to $12 million. Since FY2008, DRA's annual appropriations have increased from almost $12 million to the current level of $25 million ( Table 3 ). The Denali Commission was established in 1998 to support rural economic development in Alaska. It is \"designed to provide critical utilities, infrastructure, and economic support throughout Alaska.\" The Denali Commission is unique as a single-state commission, and in its reliance on federal funding for both administration and activities. The commission's statutory mission includes providing workforce and other economic development assistance to distressed rural regions in Alaska. However, the commission no longer engages in substantial activities in general economic development or transportation, which were once core elements of the Denali Commission's activities. Its recent activities are principally limited to coastal infrastructure protection and energy infrastructure and fuel storage projects. The Denali Commission's structure is unique as the only commission with a single-state mandate. The commission is comprised of seven members (or a designated nominee), including the federal co-chair, appointed by the U.S. Secretary of Commerce; the Alaska governor, who is state co-chair (or his/her designated representative); the University of Alaska president; the Alaska Municipal League president; the Alaska Federation of Natives president; the Alaska State AFL-CIO president; and the Associated General Contractors of Alaska president. These structural novelties offer a different model compared to the organization typified by the ARC and broadly adopted by the other functioning federal regional commissions and authorities. For example, the federal co-chair's appointment by the Secretary of Commerce, and not the President with Senate confirmation, allows for a potentially more expeditious appointment of a federal co-chair. The Denali Commission is required by law to create an annual work plan, which solicits project proposals, guides activities, and informs a five-year strategic plan. The work plan is reviewed by the federal co-chair, the Secretary of Commerce, and the Office of Management and Budget, and is subject to a public comment period. The current FY2018-FY2022 strategic plan, released in October 2017, lists four strategic goals and objectives: (1) facilities management; (2) infrastructure protection from ecological change; (3) energy, including storage, production, heating, and electricity; and (4) innovation and collaboration. The commission's recent activities largely focus on energy and infrastructure protection. The Denali Commission's authorizing statute obligates the Commission to address economic distress in rural areas of Alaska. As of 2018, the Commission utilizes two overlapping standards to assess distress: a \"surrogate standard,\" adopted by the Commission in 2000, and an \"expanded standard.\" These standards are applied to rural communities in Alaska and assessed by the Alaska Department of Labor and Workforce Development (DOL&WD), Research and Analysis Section. DOL&WD uses the most current population, employment, and earnings data available to identify Alaska communities and Census Designated Places considered \"distressed.\" Appeals can be made to community distress determinations, but only through a demonstration that DOL&WD data or analysis was erroneous, invalid, or outdated. New information \"must come from a verifiable source, and be robust and representative of the entire community and/or population.\" Appeals are accepted and adjudicated only for the same reporting year in question. The Denali Commission's scope is more constrained compared to the other federal regional commissions and authorities. The organization reports that due to funding constraints, the commission reduced its involvement in what might be considered traditional economic development and, instead, focused on rural fuel and energy infrastructure and coastal protection efforts. Since the Denali Commission's founding, bulk fuel safety and security, energy reliability and security, transportation system improvements, and healthcare projects have commanded the vast majority of Commission projects. Of these, only energy reliability and security and bulk fuel safety and security projects remain active and are still funded. Village infrastructure protectionâa program launched in 2015 to address community infrastructure threatened by erosion, flooding and permafrost degradationâis a program that is relatively new and still being funded. By contrast, most \"traditional\" economic development programs are no longer being funded, including in housing, workforce development, and general economic development activities. In 1999, the Consolidated Appropriations Act, 2000 ( P.L. 106-113 ) authorized the commission to enter into contracts and cooperative agreements, award grants, and make payments \"necessary to carry out the purposes of the commission.\" The act also established the federal co-chair's compensation schedule, prohibited using more than 5% of appropriated funds for administrative expenses, and established \"demonstration health projects\" as authorized activities and authorized the Department of Health and Human Services to make grants to the commission to that effect. The Consolidated Appropriations Act, 2004 ( P.L. 108-199 ) created an Economic Development Committee within the commission chaired by the Alaska Federation of Natives president, and included the Alaska Commissioner of Community and Economic Affairs, a representative of the Alaska Bankers Association, the chairman of the Alaska Permanent Fund, a representative from the Alaska Chamber of Commerce, and representatives from each region. In 2005, the Safe, Accountable, Flexible, Efficient Transportation Equity Act: A Legacy for Users, or SAFETEA-LU ( P.L. 109-59 ), established the Denali Access System Program among the commission's authorized activities. The program was part of its surface transportation efforts, which were active from 2005 through 2009. 2012's Moving Ahead for Progress in the 21 st Century Act, or MAP-21 ( P.L. 112-141 ), authorized the commission to accept funds from federal agencies, allowed it to accept gifts or donations of \"service, property, or money\" on behalf of the U.S. government, and included guidance regarding gifts. In 2016, the Water Infrastructure Improvements for the Nation Act, or the WIIN Act ( P.L. 114-322 ), reauthorized the Denali Commission through FY2021, and established a four-year term for the federal co-chair (with allowances for reappointment), but provided that other members were appointed for life. The act also allowed for the Secretary of Commerce to appoint an interim federal co-chair, and included clarifying language on the non-federal status of commission staff and ethical issues regarding conflicts of interest and disclosure. Under its authorizing statute, the Denali Commission received funding authorizations for $20 million for FY1999, and \"such sums as necessary\" (SSAN) for FY2000 through FY2003. Legislation passed in 2003 extended the commission's SSAN funding authorization through 2008. Its authorization lapsed after 2008; reauthorizing legislation was introduced in 2007, but was not enacted. The commission continued to receive annual appropriations for FY2009 and several years thereafter. In 2016, legislation was enacted reauthorizing the Denali Commission through FY2021 with a $15 million annual funding authorization ( Table 4 ). The Northern Border Regional Commission (NBRC) was created by the Food, Conservation, and Energy Act of 2008, otherwise known as the 2008 farm bill. The act also created the Southeast Crescent Regional Commission (SCRC) and the Southwest Border Regional Commission (SBRC). All three commissions share common authorizing language modeled after the ARC. The NBRC is the only one of the three new commissions that has been both reauthorized and received progressively increasing annual appropriations since it was established in 2008. The NBRC was founded to alleviate economic distress in the northern border areas of Maine, New Hampshire, New York, and, as of 2018, the entire state of Vermont ( Figure 4 ). The stated mission of the NBRC is \"to catalyze regional, collaborative, and transformative community economic development approaches that alleviate economic distress and position the region for economic growth.\" Eligible counties within the NBRC's jurisdiction may receive funding \"for community and economic development\" projects pursuant to regional, state, and local planning and priorities ( Table C-4 ). The NBRC is led by a federal co-chair, appointed by the President with the advice and consent of the Senate, and four state governors, of which one is appointed state co-chair. There is no term limit for the federal co-chair. The state co-chair is limited to two consecutive terms, but may not serve a term of less than one year. Each of the four governors may appoint an alternate; each state also designates an NBRC program manager to handle the day-to-day operations of coordinating, reviewing, and recommending economic development projects to the full membership. While program funding depends on congressional appropriations, administrative costs are shared equally between the federal government and the four states of the NBRC. Through commission votes, applications are ranked by priority, and are approved in that order as grant funds allow. All projects are required to address at least one of the NBRC's four authorized program areas and its five-year strategic plan. The NBRC's four program areas are: (1) economic and infrastructure development (EID); (2) comprehensive planning for states; (3) local development districts; and (4) the regional forest economy partnership. The NBRC's state EID investment program is the chief mechanism for investing in economic development programs in the participating states. The EID program prioritizes projects focusing on infrastructure, telecommunications, energy costs, business development, entrepreneurship, workforce development, leadership, and regional strategic planning. The EID program provides approximately $3.5 million to each state for such activities. Eligible applicants include public bodies, 501(c) organizations, Native American tribes, and the four state governments. EID projects may require matching funds of up to 50% depending on the level of distress. The NBRC may also assist states in developing comprehensive economic and infrastructure development plans for their NBRC counties. These initiatives are undertaken in collaboration with LDDs, localities, institutions of higher education, and other relevant stakeholders. The NBRC uses 16 multicounty LDDs to advise on local priorities, identify opportunities, conduct outreach, and administer grants, from which the LDDs receive fees. LDDs receive fees according to a graduated schedule tied to total project funds. The rate is 5% for the first $100,000 awarded and 1% in excess of $100,000. Notably, this formula does not apply to Vermont-only projects. Vermont is the only state where grantees are not required to contract with an LDD for the administration of grants, though this requirement may be waived. The RFEP is an NBRC program to address economic distress caused by the decline of the regional forest products industry. The program provides funding to rural communities for \"economic diversity, independence, and innovation.\" The NBRC received $7 million in FY2018 and FY2019 to address the decline in the forest-based economies in the NBRC region. The NBRC's activities are guided by a five-year strategic plan, which is developed through \"extensive engagement with NBRC stakeholders\" alongside \"local, state, and regional economic development strategies already in place.\" The 2017-2021 strategic plan lists three goals: 1. modernizing infrastructure; 2. creating and sustaining jobs; and 3. anticipating and capitalizing on shifting economic and demographic trends. The strategic plan also lists five-year performance goals, which are: 5,000 jobs created or retained; 10,000 households and businesses with access to improved infrastructure; 1,000 businesses representing 5,000 employees benefit from NBRC investments; 7,500 workers provided with skills training; 250 communities and 1,000 leaders engaged in regional leadership, learning and/or innovation networks supported by the NBRC; and 3:1 NBRC investment leverage. The strategic plan also takes stock of various socioeconomic trends in the northern border region, including (1) population shifts; (2) distressed communities; and (3) changing workforce needs. The NBRC is unique in that it is statutorily obligated to assess distress according to economic as well as demographic factors ( Table C-4 ). These designations are made and refined annually. The NBRC defines levels of \"distress\" for counties that \"have high rates of poverty, unemployment, or outmigration\" and \"are the most severely and persistently economic distressed and underdeveloped.\" The NBRC is required to allocate 50% of its total appropriations to projects in distressed counties. The NBRC's county designations are as follows, in descending levels of distress: Distressed counties (80% maximum funding allowance); Transitional counties (50%); and Attainment (0%). Transitional counties are defined as counties that do not exhibit the same levels of economic and demographic distress as a distressed county, but suffer from \"high rates of poverty, unemployment, or outmigration.\" Attainment counties are not allowed to be funded by the NBRC except for those projects that are located within an \"isolated area of distress,\" or have been granted a waiver. Distress is calculated in tiers of primary and secondary distress categories and constituent factors: Primary Distress Categories 1. Percent of population below the poverty level 2. Unemployment rate 3. Percent change in population Secondary Distress Categories 4. Percent of population below the poverty level 5. Median household income 6. Percent of secondary and/or seasonal homes Each county is assessed by the primary and secondary distress categories and factors and compared to the figures for the United States as a whole. Designations of county distress are made by tallying those factors against the following criteria: Distressed counties are those with at least three factors from both primary and secondary distress categories and at least one from each category; Transitional counties are those with at least one factor from either category; and Attainment counties are those which show no measures of distress. The NBRC was first proposed in the Northern Border Economic Development Commission Act of 2007 ( H.R. 1548 ), introduced on March 15, 2007. H.R. 1548 proposed the creation of a federally-chartered, multi-state economic development organizationâmodeled after the ARCâcovering designated northern border counties in Maine, New Hampshire, New York, and Vermont. The bill would have authorized the appropriation of $40 million per year for FY2008 through FY2012 ( H.R. 1548 ). The bill received regional co-sponsorship from Members of Congress representing areas in the northern border region. The NBRC was reintroduced in the Regional Economic and Infrastructure Development Act of 2007 ( H.R. 3246 ), which would have authorized the NBRC, the SCRC, and the SBRC, and reauthorized the DRA and the NGPRA (discussed in the next section) in a combined bill. H.R. 3246 won a broader range of support, which included 18 co-sponsors in addition to the original bill sponsor, and passed the House by a vote of 264-154 on October 4, 2007. Upon House passage, H.R. 3246 was referred to the Senate Committee on Environment and Public Works. The Senate incorporated authorizations for the establishment of the NBRC, SCRC, and the SBRC in the 2008 farm bill. The 2008 farm bill authorized annual appropriations of $30 million for FY2008 through FY2012 for all three new commissions. The only major changes to the NBRC since its creation were made in the Agriculture Improvement Act of 2018 ( P.L. 115-334 ), or the 2018 farm bill, which authorized the state capacity building grant program. In addition, the 2018 farm bill expanded the NBRC to include the following counties: Belknap and Cheshire counties in New Hampshire; Genesee, Greene, Livingston, Montgomery, Niagara, Oneida, Orleans, Rensselaer, Saratoga, Schenectady, Sullivan, Washington, Warren, Wayne, and Yates counties in New York; and Addison, Bennington, Chittenden, Orange, Rutland, Washington, Windham, and Windsor counties in Vermont, making it the only state entirely within the NBRC. Since its creation, the NBRC has received consistent authorizations of appropriations ( Table 5 ). The 2008 farm bill authorized the appropriation of $30 million for the NBRC for each of FY2008 through FY2013 ( P.L. 110-234 ); the same in the 2014 farm bill for each of FY2014 through FY2018 ( P.L. 113-79 ); and $33 million for each of FY2019 through FY2023 ( P.L. 115-334 ). Due to its statutory linkages to the SCRC and SBRC, all three commissions also share common authorizing legislation and identical funding authorizations. To date, the NBRC is the only commission of the three to receive substantial annual appropriations. Congress has funded the NBRC since FY2010 ( Table 5 ). The NBRC's appropriated funding level has increased from $5 million in FY2014, to $7.5 million in FY2016, $10 million in FY2017, $15 million in FY2018, and $20 million in FY2019. The Northern Great Plains Regional Authority was created by the 2002 farm bill. The NGPRA was created to address economic distress in Iowa, Minnesota, Missouri (other than counties included in the Delta Regional Authority), North Dakota, Nebraska, and South Dakota. The NGPRA appears to have been briefly active shortly after it was created, when it received its only annual appropriation from Congress. The NGPRA's funding authorization lapsed at the end of FY2018; it was not reauthorized. The NGPRA featured broad similarities to the basic structure shared among most of the federal regional authorities and commissions, being a federal-state partnership led by a federal co-chair (appointed by the President, with the advice and consent of the Senate) and governors of the participating states, of which one was designated as the state co-chair. Unique to the NGPRA were certain structural novelties reflective of regional socio-political features. The NGPRA also included a Native American tribal co-chair, who was the chairperson of an Indian tribe in the region (or their designated representative), and appointed by the President, with the advice and consent of the Senate. The tribal co-chair served as the \"liaison between the governments of Indian tribes in the region and the [NGPRA].\" No term limit is established in statute; the only term-related proscription is that the state co-chair \"shall be elected by the state members for a term of not less than 1 year.\" Another novel feature among the federal regional commissions and authorities was also the NGPRA's statutory reliance on a 501(c)(3) non-profit corporationâNorthern Great Plains, Inc.âin furtherance of its mission. While Northern Great Plains, Inc. was statutorily organized to complement the NGPRA's activities, it effectively served as the sole manifestation of the NGPRA concept and rationale while it was active, given that the NGPRA was only once appropriated funds and never appeared to exist as an active organization. The Northern Great Plains, Inc. was active for several years, and reportedly received external funding, but is currently defunct. Under its authorizing statute, the federal government would initially fund all administrative costs in FY2002, which would decrease to 75% in FY2003, and 50% in FY2004. Also, the NGPRA would have designated levels of county economic distress; 75% of funds were reserved for the most distressed counties in each state, and 50% reserved for transportation, telecommunications, and basic infrastructure improvements. Accordingly, non-distressed communities were eligible to receive no more than 25% of appropriated funds. The NGPRA was also structured to include a network of designated, multi-county LDDs at the sub-state levels. As with its sister organizations, the LDDs would have served as nodes for project implementation and reporting, and as advisors to their respective states and the NGPRA as a whole. The Northern Great Plains Rural Development Act ( P.L. 103-318 ), which became law in 1994, established the Northern Great Plains Rural Development Commission to study economic conditions and provide economic development planning for the Northern Great Plains region. The Commission was comprised of the governors (or designated representative) from the Northern Great Plains states of Iowa, Minnesota, North Dakota, Nebraska, and South Dakota (prior to Missouri's inclusion), along with one member from each of those states appointed by the Secretary of Agriculture. The Agricultural, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act, 1995 ( P.L. 103-330 ) provided $1,000,000 to carry out the Northern Great Plains Rural Development Act. The Commission produced a 10-year plan to address economic development and distress in the five states. After a legislative extension ( P.L. 104-327 ), the report was submitted in 1997. The Northern Great Plains Initiative for Rural Development (NGPIRD), a non-profit 501(c)(3), was established to implement the Commission's advisories. The Farm Security and Rural Investment Act of 2002, or 2002 farm bill ( P.L. 107-171 ), authorized the NGPRA, which superseded the Commission. The statute also created Northern Great Plains, Inc., a 501(c)(3), as a resource for regional issues and international trade, which supplanted the NGPIRD with a broader remit that included research, education, training, and issues of international trade. The Food, Conservation, and Energy Act of 2008, or 2008 farm bill ( P.L. 110-246 ), extended the NGPRA's authorization through FY2012. The legislation also expanded the authority to include areas of Missouri not covered by the DRA, and provided mechanisms to enable the NGPRA to begin operations even without the Senate confirmation of a federal co-chair, as well as in the absence of a confirmed tribal co-chair. The Agricultural Act of 2014, or 2014 farm bill ( P.L. 113-79 ), reauthorized the NGPRA and the DRA, and extended their authorizations from FY2012 to FY2018. The NGPRA was authorized to receive $30 million annually from FY2002 to FY2018. It received appropriations once for $1.5 million in FY2004. Its authorization of appropriations lapsed at the end of FY2018. The Southeast Crescent Regional Commission (SCRC) was created by the 2008 farm bill, which also created the NBRC and the Southwest Border Regional Commission. All three commissions share common authorizing language modeled after the ARC. The SCRC is not currently active. The SCRC was created to address economic distress in areas of Virginia, North Carolina, South Carolina, Georgia, Alabama, Mississippi, and Florida ( Figure 6 ) not served by the ARC or the DRA ( Table 13 ). As authorized, the SCRC would share an organizing structure with the NBRC and the Southwest Border Regional Commission, as all three share common statutory authorizing language modeled after the ARC. As authorized, the SCRC would consist of a federal co-chair, appointed by the President with the advice and consent of the Senate, along with the participating state governors (or their designated representatives), of which one would be named by the state representatives as state co-chair. There is no term limit for the federal co-chair. However, the state co-chair is limited to two consecutive terms, but may not serve a term of less than one year. However, no federal co-chair has been appointed since the SCRC was authorized; therefore, the commission cannot form and begin operations. The SCRC concept was first introduced by university researchers working on rural development issues in 1990 at Tuskegee University's Annual Professional Agricultural Worker's Conference for 1862 and 1890 Land-Grant Universities. In 1994, the Southern Rural Development Commission Act was introduced in the House Agricultural Committee, which would provide the statutory basis for a \"Southern Black Belt Commission.\" While the concept was not reintroduced in Congress until the 2000s, various nongovernmental initiatives sustained discussion and interest in the concept in the intervening period. Supportive legislation was reintroduced in 2002, which touched off other accompanying legislative efforts until the SCRC was authorized in 2008. Congress authorized $30 million funding levels for each fiscal year from FY2008 to FY2018, and $33 million in FY2019, and appropriated $250,000 in each fiscal year from FY2010 to FY2019 ( Table 5 ). Despite receiving regular appropriations since it was authorized in 2008, a review of government budgetary and fiscal sources yields no record of the SCRC receiving, obligating, or spending funds appropriated by Congress. In successive presidential administration budget requests (FY2013, FY2015-FY2017), no funding was requested. In the U.S. Treasury 2018 Combined Statement of Receipts, Outlays, and Balances, Part III, the SCRC does not appear, further indicating that the SCRC remains unfunded. Notably, the Commission for the Preservation of America's Heritage Abroad, which has periodically shared a common section with the SCRC in presidential budgets, is listed in the 2018 Combined Statement, as it is elsewhere. The Southwest Border Regional Commission (SBRC) was created with the enactment of the Food, Conservation, and Energy Act of 2008, or the 2008 farm bill ( P.L. 110-234 ), which also created the NBRC and the SCRC. All three commissions share common statutory authorizing language modeled after the ARC. The SBRC was created to address economic distress in the southern border regions of Arizona, California, New Mexico, and Texas ( Figure 7 ; Table 1 5 ). The SBRC has not received an annual appropriation since it was created and is not currently active. As authorized, the SBRC would share an organizing structure with the NBRC and the SCRC, as all three commissions share common statutory authorizing language modeled after the ARC. By statute, the SBRC consists of a federal co-chair, appointed by the President with the advice and consent of the Senate, along with the participating state governors (or their designated representatives), of which one would be named by the state representatives as state co-chair. As enacted in statute, there is no term limit for the federal co-chair. However, the state co-chair is limited to two consecutive terms, but may not serve a term of less than one year. However, as no federal co-chair has been appointed since the SCRC was authorized, it is not operational. The concept of an economic development agency focusing on the southwest border region has existed at least since 1976, though the SBRC was established through more recent efforts. Executive Order 13122 in 1999 created the Interagency Task Force on the Economic Development of the Southwest Border, which examined issues of socioeconomic distress and economic development in the southwest border regions and advised on federal efforts to address them. In February 2003, a \"Southwest Regional Border Authority\" was proposed in S. 548 . A companion bill, H.R. 1071 , was introduced in March 2003. The SBRC was reintroduced in the Regional Economic and Infrastructure Development Act of 2003 ( H.R. 3196 ), which would have authorized the SBRC, the DRA, the NGPRA, and the SCRC. In 2006, the proposed Southwest Regional Border Authority Act would have created the \"Southwest Regional Border Authority\" ( H.R. 5742 ), similar to S. 458 in 2003. In 2007, SBRC was reintroduced in the Regional Economic and Infrastructure Development Act of 2007 ( H.R. 3246 ), which would have authorized the SBRC, the SCRC, and the NBRC, and reauthorized the DRA and the NGPRA in a combined bill. Upon House passage, the Senate incorporated authorizations for the establishment of the NBRC, SCRC, and SBRC in the 2008 farm bill. The 2008 farm bill authorized annual appropriations of $30 million for FY2008 through FY2012 for all three of the new organizations. Congress authorized annual funding of $30 million for the SBRC from FY2008 to FY2018, and $33 million in FY2019. The SBRC has never received annual appropriations and is not active. Given their geographic reach, broad activities, and integrated intergovernmental structures, the federal regional commissions and authorities are a significant element of federal economic development efforts. At the same time, as organizations that are largely governed by the respective state-based commissioners, the federal regional commissions and authorities are not typical federal agencies but federally-chartered entities that integrate federal funding and direction with state and local economic development priorities. This structure provides Congress with a flexible platform for economic development efforts. The intergovernmental structure allows for strategic-level economic development initiatives to be launched at the federal level and implemented across multi-state jurisdictions with extensive state and local input, and more adaptable to regional needs. The federal regional commissions and authorities reflect an emphasis by the federal government on place-based economic development strategies sensitive to regional and local contexts. However, the geographic specificity and varying functionality of the statutorily authorized federal regional commissions and authorities, both active and inactive, potentially raise questions about the efficacy and equity of federal economic development policies. More in-depth analysis of these and other such issues related to the federal regional authorities and commissions, and their role as instruments for federal economic development efforts, is reserved for possible future companion products to this report. Appendix A. Basic Information at a Glance Contact Information (for active commissions and authorities) Appalachian Regional Commission Address:1666 Connecticut Avenue, NW Suite 700 Washington, DC 20009-1068 Phone:[phone number scrubbed] Website: http://www.arc.gov Delta Regional Authority Address:236 Sharkey Avenue Suite 400 Clarksdale, MS 38614 Phone:[phone number scrubbed] Website: http://www.dra.gov Denali Commission Address:510 L Street Suite 410 Anchorage, AK 99501 Phone:[phone number scrubbed] Website: http://www.denali.gov Northern Border Regional Commission Address:James Cleveland Federal Building, Suite 1201 53 Pleasant Street Concord, NH 03301 Phone:[phone number scrubbed] Website: http://www.NBRC.gov Appendix B. Map of Federal Regional Commissions and Authorities Appendix C. Service Areas of Federal Regional Commissions and Authorities Appalachian Regional Commission Delta Regional Authority Denali Commission Northern Border Regional Commission Northern Great Plains Regional Authority Southeast Crescent Regional Commission Southwest Border Regional Commission", "summary": "This report describes the structure, activities, legislative history, and funding history of seven federal regional commissions and authorities: the Appalachian Regional Commission; the Delta Regional Authority; the Denali Commission; the Northern Border Regional Commission; the Northern Great Plains Regional Authority; the Southeast Crescent Regional Commission; and the Southwest Border Regional Commission. All seven regional commissions and authorities are broadly modeled after the Appalachian Regional Commission structure, which is composed of a federal co-chair appointed by the president with the advice and consent of the Senate, and the member state governors, of which one is appointed the state co-chair. This structure is broadly replicated in the other commissions and authorities, albeit with notable variations and exceptions to local contexts. In addition, the service areas for all of the federal regional commissions and authorities are defined in statute and thus can only be amended or modified through congressional action. While the service areas for the federal regional commissions and authorities have shifted over time, those jurisdictions have not changed radically in their respective service lives. Of the seven federal regional commissions and authorities, four could be considered active: the Appalachian Regional Commission; the Delta Regional Authority; the Denali Commission; and the Northern Border Regional Commission. The four active regional commissions and authority received $15 million to $165 million in congressional appropriations in FY2019 for their various activities. Each of the four functioning regional commissions and authority engage in economic development to varying extents, and address multiple programmatic activities in their respective service areas. These activities may include, but are not limited to: basic infrastructure; energy; ecology/environment and natural resources; workforce/labor; and business development. Though they are federally-chartered, receive congressional appropriations for their administration and activities, and include an appointed federal representative in their respective leadership structures (the federal co-chair and his/her alternate, as applicable), the federal regional commissions and authorities are quasi-governmental partnerships between the federal government and the constituent state(s) of a given authority or commission. This partnership structure, which also typically includes substantial input and efforts at the sub-state level, represents a unique federal approach to economic development and a potentially flexible mechanism for coordinating strategic economic development goals to local, state, and multi-state/regional priorities and contexts. Congress has expressed interest in the federal regional commissions and authorities pursuant to its appropriations and oversight authority, as well as its interest in facilitating economic development programming. Given relevant congressional interest, the federal regional commissions and authorities provide a model of functioning economic development approaches that are place-based, intergovernmental, and multifaceted in their programmatic orientation (e.g., infrastructure, energy, environment/ecology, workforce, business development).", "document_type": "crs"}
{"report": "The primary source of federal aid in support of elementary and secondary education is the Elementary and Secondary Education Act (ESEA)âparticularly its Title I-A program, which authorizes federal aid for the education of disadvantaged students. The ESEA was initially enacted in 1965 (P.L. 89-10) \"to strengthen and improve educational quality and educational opportunities in the Nation's elementary and secondary schools.\" It was most recently comprehensively amended and reauthorized by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), which was enacted \"to ensure that every child achieves.\" The ESSA authorized appropriations for ESEA programs through FY2020. FY2020 appropriations for ESEA programs were $25.9 billion. The ESSA also enacted a series of revisions to educational accountability requirements that are applicable to recipients of ESEA funds. Under Title I-A of the ESEA, as amended by the ESSA, if a state accepts Title I-A funds then the state, its local educational agencies (LEAs), and its public schools are required to focus on educational accountability as a condition of receiving federal grant funds. States, LEAs, and individual public schools are held accountable for monitoring and improving achievement outcomes for students and closing achievement gaps. Each state is required to have content standards, academic achievement standards, and aligned assessments in reading/language arts (RLA), mathematics, and science for specific grade levels. States must also have an accountability system that incorporates (1) long-term and interim performance goals for specified measures; (2) weighted indicators based, in part, on these goals; and (3) an annual system for meaningful differentiation that is used to identify schools that need additional support to improve student achievement. These academic accountability requirements must be detailed in each state's Title I-A state plan. Each state educational agency (SEA) is required to submit a state plan delineating its academic accountability system, among other state plan requirements, for approval by the U.S. Department of Education (ED) in order to receive Title I-A funds. This plan must be developed by the SEA with \"timely and meaningful consultation\" with other education stakeholders, including the governor, the state board of education, members of the state legislature, school staff, and parents. The plan must be peer-reviewed through a process established by the Secretary of Education (hereinafter referred to as the Secretary) and then approved by the Secretary. The state plan will remain in effect for the duration of the state's participation in Title I-A and must be periodically reviewed and revised as necessary by the SEA to reflect any changes in the state's strategies or programs under Title I-A. As part of this plan, the SEA is required to provide information on its standards, assessments, and academic accountability system. State plans can be submitted for individual formula grant programs or, if permitted by the Secretary, the SEA may submit a consolidated state plan based on requirements established by the Secretary. Following the enactment of the ESSA, all SEAs submitted consolidated state plans. The Secretary has approved these plans for all 50 states, the District of Columbia, and Puerto Rico. This report discusses the Title I-A requirements related to academic standards, assessments, and state accountability systems that are in effect under current law. This is followed by a brief discussion of special rules that apply to schools operated or funded by the Bureau of Indian Education (BIE), and an examination of SEA and LEA report card and reporting requirements related to standards, assessments, and accountability systems. Frequently asked questions (FAQs) related to each of these areas are included at the end of the report. As a condition of receiving Title I-A funds, each state must have state standards in specific subject areas that meet certain requirements. This section discusses general requirements related to standards, as well as alternate achievement standards for students with the most significant cognitive disabilities and English language proficiency standards. Each state receiving Title I-A funds is required to provide an assurance in its state plan that it has adopted challenging academic content standards and aligned academic achievement standards in RLA, mathematics, and science (and any other subject selected by the state). The achievement standards must include at least three levels of achievement (e.g., basic, proficient, and advanced). Except as discussed below, the same standards and achievement levels must be applied to all public schools and all public school students. The standards must include the same knowledge, skills, and levels of achievement expected of all public school students in the state. In addition, states are required to demonstrate that these academic standards are aligned with entrance requirements for credit-bearing coursework in the state's system of public higher education and relevant state career and technical education standards. States may adopt alternate achievement standards for students with the most significant cognitive disabilities. The term most significant cognitive disabilities is not defined in federal legislation. States are required to define the term relative to a student's cognitive functioning and adaptive behavior. Alternate achievement standards must be aligned with state academic content standards, promote access to the general education curriculum, and reflect professional judgment as to the highest possible standards achievable by such students. The standards must be designated for use in the student's individualized education program (IEP) and developed in accordance with the Individuals with Disabilities Education Act (IDEA). Alternate achievement standards must also ensure that a student is on track to pursue postsecondary education or employment. States must adopt English language proficiency (ELP) standards that cover the four domains of language: speaking, listening, reading, and writing. The standards must address different proficiency levels of English learners (ELs) and be aligned with the state academic content standards. States must implement a set of high-quality academic assessments in mathematics, RLA, science, and any other subject chosen by the state. The assessments must be the same academic assessments used to measure the achievement of all public elementary and secondary schools in the state and be administered to all students in the state within the required grades and subjects. Academic assessments must be aligned with state academic content standards and provide coherent and timely information about student attainment of the academic standards and whether a student is performing at grade level. The state assessments must be the same for all public elementary and secondary school students in the state. Assessments must be used for purposes for which they are reliable and valid and be of adequate technical quality for each purpose required by the ESEA. Assessments must objectively measure academic achievement, knowledge, and skills without assessing personal or family beliefs and attitudes. They must involve multiple up-to-date measures of student academic achievement, including measures that assess higher-order thinking. Assessments may be administered through a single summative assessment or through multiple statewide interim assessments during the academic year that result in a single summative score. The format of assessments may be \"partially delivered\" in the form of portfolios, projects, or extended performance tasks. In general, a state is required to administer mathematics and RLA assessments in grades 3 through 8 and once in high school. For science, the assessment must be administered at least once in each of three grade spans (3-5, 6-9, and 10-12). For any other subjects chosen by the state, assessments are administered at the discretion of the state. Thus, for any given school year, a state must administer 17 assessments to comply with these Title I-A requirements but no student would be required by federal legislation to take more than 3 assessments (mathematics, RLA, and science). The assessments must allow for the participation of all students, including students with disabilities and ELs by using principles of universal design and allowing appropriate accommodations. States, however, may exempt students with the most significant cognitive disabilities, provided these students participate in an alternate assessment based on alternate achievement standards. States may provide the RLA assessment in another language or form for ELs if (1) a student has attended school in the United States for less than three consecutive years, and (2) doing so \"would likely yield more accurate and reliable information on what such student knows and can do.\" Furthermore, an LEA may, on a case-by-case basis, extend the time period during which a student is assessed in a language other than English by up to an additional two years if the student has not reached a level of English language proficiency sufficient to yield valid and reliable results on a test administered in English. Under the ESEA, states are required to use assessment results for accountability purposes, reporting purposes, or both. Assessment results for accountability purposes inform the statewide accountability system. Some assessment results are used for reporting purposes only and have no bearing on the statewide accountability system. For accountability purposes, assessments must enable results to be disaggregated within the SEA, LEAs, and schools by the following groups (commonly referred to as subgroups ): (1) each major racial and ethnic group, (2) economically disadvantaged students compared to students who are not economically disadvantaged, (3) students with disabilities compared to students without disabilities, and (4) English proficiency status. For reporting purposes, in addition to the four aforementioned subgroups of students, assessment results must also be disaggregated by gender, migrant status, homeless status, foster care status, and whether a student has a parent who is a member of the Armed Forces on active duty, including a parent on full-time National Guard duty. For reporting purposes, assessments must also provide for timely individual student reports regarding achievement that allow parents, teachers, principals, and other school leaders to understand and address specific academic needs of a student. Individual student reports of achievement must allow for itemized score analyses to assist LEAs and schools in addressing the needs of students based on their responses to specific assessment items, provided that personally identifiable information is not publicly disclosed. States must include all ELs in their statewide assessment systems and disaggregate results for these students. Under certain circumstances, the ESEA allows ELs to participate in assessments in a language other than English. ELs also participate in other English language proficiency assessments. ELs participate in statewide assessment and accountability systems in different ways, depending on their level of language proficiency and number of years of schooling in the United States. The following sections describe the statutory requirements regarding the assessment of ELs. Each state plan must identify languages other than English that are spoken \"to a significant extent\" in the student population of the state and indicate the languages for which state assessments are not available and are needed. The state must make every effort to develop such assessments that are needed. The state may request assistance from the Secretary to identify appropriate assessments, but the Secretary shall not mandate a specific assessment. Each state plan must demonstrate that LEAs will administer an annual assessment of English proficiency of all ELs in the schools served by the SEA. Such assessments must be aligned with the state's ELP standards. Regulations reiterate that English proficiency assessments must be administered annually in each domain (reading, writing, speaking, and listening) for all ELs in kindergarten through grade 12 served by the LEA. ELP scores from previous years may not be banked and counted as proficient for a student in the following year. For example, proficient listening scores and speaking scores cannot be banked in first grade and allow for an EL to be administered only reading and writing assessments in the following year. All domains must be assessed annually. The ESEA includes provisions regarding recently arrived ELs. As was previously permitted prior to the enactment of the ESSA, a state may exclude an EL from one administration of the RLA assessment if the student has been enrolled in school in the United States for less than 12 months and may exclude the EL's performance on the mathematics or ELP assessment for the first year of the EL's enrollment in school for accountability purposes. However, the EL does still have to participate in the mathematics and ELP assessments. The ESSA added a second option regarding the assessment of recently arrived ELs. A state may choose to assess and report the performance of a recently arrived EL on the statewide RLA and mathematics assessments for each year of the student's enrollment. However, for the first year of the student's enrollment, the state may exclude his or her results on the RLA and mathematics assessments from the state's accountability system. In the second year of the student's enrollment, the state must include a measure of student growth on the RLA and mathematics assessments. In the student's third year of enrollment and all subsequent years, the state must include his or her performance on the RLA and mathematics assessments in the state's accountability system. The results of statewide academic assessments must be disaggregated for ELs. A state may include the scores of formerly identified ELs in the EL subgroup for a period of four years after the student ceases to be identified an EL. That is, once an EL becomes proficient in English, his or her score may still be included in the \"EL subgroup\" for RLA and mathematics assessment results for four years. States are required to include all students with disabilities in the statewide assessment system. Furthermore, states are required to disaggregate assessment results for students with disabilities. The majority of students with disabilities participate in the general academic assessment with their peers. However, the ESEA allows students with the most significant cognitive disabilities to participate in an alternate assessment based on alternate achievement standards. The following sections describe the statutory requirements regarding the assessment of students with disabilities. Students with the most significant cognitive disabilities may be eligible to participate in an alternate assessment. As mentioned above, the term most significant cognitive disabilities is not defined in federal legislation. States are required to define the term relative to a student's cognitive functioning and adaptive behavior. The IEP team for a student with a disability determines when the student shall participate in an alternate assessment, using guidelines provided by the state. In this situation, parents must be notified (1) that their child's achievement will be measured with an alternate assessment based on alternate achievement standards, and (2) how participation in an alternate assessment may affect the attainment of a regular high school diploma. A state must ensure that alternate assessments are administered in accordance with ESEA requirements. Alternate assessments must be aligned with alternate achievement standards. The ESEA requires that within a state, the number of students assessed in each subject with alternate assessments does not exceed 1% of the total number of students in the state who are assessed in that subject. A state may request a waiver from the Secretary to exceed the 1% cap. The 1% cap, however, does not apply at the LEA level. An LEA may administer alternate assessments to more than 1% of students, provided that the LEA submits information to the SEA justifying the need to exceed the cap. More specifically, if a state anticipates that it will exceed the 1% cap, it must submit a waiver request to the Secretary. The waiver request must meet the following criteria: It must be submitted at least 90 days prior to the start of the state's testing window. It must include (1) the number and percentage of students in each subgroup of students who took the alternate assessment, and (2) data demonstrating that the state has measured the achievement of at least 95% of students in the \"children with disabilities\" subgroup for all grades in which the alternate assessment is administered. It must include state assurances that the state is appropriately monitoring its LEAs. If an LEA anticipates that it will assess more than 1% of students with disabilities using an alternate assessment, the state must ensure that the LEA followed the state's guidelines and the LEA will address any issues of disproportionality in the percentage of students participating in alternate assessments. It must include a plan and timeline for improving the implementation of state guidelines regarding alternate assessments. Such a plan may include revising the definition of students with the \"most significant cognitive disabilities.\" The state must take additional steps to support LEAs and describe how LEAs that assess more than 1% of students will be monitored and evaluated. The state will address any disproportionality in the percentage of students participating in alternate assessments. If the state is requesting to extend the waiver for an additional year, the state must meet all requirements described above and demonstrate substantial progress towards achieving each component of the prior year's plan and timeline. The use of alternate assessments must be consistent with tenets of IDEA that emphasize that students with disabilities have access to the general education curriculum. That is, if a student is selected to participate in an alternate assessment, he or she must not be excluded from involvement and progress within the general education curriculum. The state must also describe within the state plan (1) how it has incorporated universal design in alternate assessments, and (2) that general and special educators know how to administer the alternate assessment and provide appropriate accommodations. The ESEA, as amended by the ESSA, provides for some additional flexibility in assessment systems. New provisions allow states to (1) administer advanced mathematics assessments in middle school, (2) administer locally selected assessments in high school, (3) administer computer adaptive assessments, and (4) design an innovative assessment and accountability program. The following sections describe each flexibility. A state may exempt any 8 th -grade student from the regular mathematics assessment if the student participates in a more advanced end-of-course assessment that can be used to measure mathematics achievement within the state's Title I-A accountability system. This flexibility allows the state to avoid double testing students who take advanced mathematics courses in 8 th grade. When the student is in high school, however, he or she must take another mathematics end-of-course or other assessment that is more advanced than the assessment administered in middle school and is used to determine a student's mathematics proficiency in grades 9-12 for Title I-A accountability purposes. An LEA may administer a locally selected, nationally recognized high school academic assessment (hereinafter referred to as a locally selected high school assessment ) in lieu of the state test in high school, provided that the assessment has been approved by the state. Though specific locally selected high school assessments are not referenced in legislation, education groups posit that the term generally refers to the SAT and ACT, as well as several other types of assessments, such as Advanced Placement or International Baccalaureate exams, ACCUPLACER, and the Armed Services Vocational Aptitude Battery (ASVAB). If a state has already approved one of the above mentioned assessments as the high school assessment used for accountability, the LEA is not required to request using it. For example, if the SAT or ACT is already approved as the statewide assessment in high school, an LEA would not need to request its use as a locally selected high school assessment. In other cases where a state uses a state assessment, such as PARCC or Smarter Balanced, the LEA may request the use of another test like the SAT or ACT in lieu of the state test provided the assessment meets the requirements discussed below. Before LEAs may use this flexibility, the state must approve the assessment for use. The SEA is required to establish technical criteria to determine whether a locally selected high school assessment meets the requirements of the statutory flexibility. At a minimum, the SEA must (1) conduct a review of the assessment to determine whether it meets or exceeds the technical criteria established by the SEA, (2) submit evidence for peer review, and (3) approve such assessment for selection and use by any LEA that requests to use it. To receive approval from the SEA, a locally selected high school assessment must meet the following criteria: be aligned with the state's academic content standards, address the depth and breadth of the standards, and be equivalent to the state assessment with regard to content coverage, difficulty, and quality; provide comparable, valid, and reliable data on academic achievement as compared to the state assessment (for all students and each subgroup of students) and results must be expressed in terms consistent with the state academic achievement standards; meet the general requirements of assessment systems, including technical criteria, with the exception that the locally selected high school assessment need not be the same assessment used for all students in the state and administered to all students in the state; and provide unbiased, rational, and consistent differentiation between schools within the state. The LEA may choose to submit a locally selected high school assessment to the SEA for approval. If the LEA requests to use a locally selected high school assessment, it must notify parents of its request and, upon approval of the request and at the beginning of each subsequent school year in which the assessment is used, inform them that the locally selected high school assessment is different from the state high school assessment. States may develop and administer computer adaptive assessments, provided that these assessments meet the general requirements of state assessment systems. A computer adaptive assessment can measure a student's academic ability above and below the student's current grade level. Because of this assessment property, the ESEA specifies additional requirements to ensure compliance with the general assessment requirements. The provision allowing states to use computer adaptive assessments clarifies that the language in Section 1111(b)(2)(B)(i) requiring that all students participate in same academic assessment shall not be interpreted as requiring that all students be administered the same assessment items. The computer adaptive assessment must, at a minimum, measure each student's academic proficiency with respect to state academic standards for the student's grade level and growth toward such standards. Once the assessment has measured the student's proficiency at grade level, it may measure the student's level of academic proficiency above or below his or her grade level. States may use computer adaptive assessments for students with the most significant cognitive disabilities, provided that the assessments (1) meet the legislative requirements for alternate assessments, and (2) assess the student's academic achievement and whether the student is performing at grade level. States may also use computer adaptive assessments to assess English language proficiency, provided that the assessments (1) meet the requirements for the assessment of English language proficiency, and (2) assess the student's language proficiency, which may include growth towards proficiency. ESEA, Section 1204 includes a new demonstration authority for the development and use of an innovative assessment system . Over time, the innovative assessment system could replace assessments required by Title I-A. States or consortia of states may apply for the demonstration authority to develop an innovative assessment system that \"may include competency-based assessments, instructionally embedded assessments, interim assessments, cumulative year-end assessments, or performance based assessments that combine into an annual summative determination for each student\" and \"assessments that validate when students are ready to demonstrate mastery or proficiency and allow for differentiated student support based on individual learning needs.\" A maximum of seven SEAs, including not more than four states participating in consortia, may receive this authority. Separate funding is not provided under the demonstration authority; however, states may use formula and competitive grant funding provided through the State Assessment Grant program to carry out this demonstration authority. States and consortia may apply for an initial demonstration period of three years to develop innovative assessment systems and implement them in a subset of LEAs. If the initial demonstration period is successful, states and consortia may apply for a two-year extension in order to transition the innovative assessment system into statewide use by the end of the extension period. If the SEA meets all relevant requirements and successfully scales the innovative assessment system for statewide use, the state may continue to operate the innovative assessment system. In general, applications for the demonstration authority must show that the innovative assessments meet all the general requirements of Title I-A state assessments discussed above. The only explicit differences between state assessment systems and innovative assessment systems are the format of the innovative assessment (i.e., competency-based assessments, instructionally embedded assessments, interim assessments, cumulative year-end assessments, and performance-based assessments) and that the reporting of results from the innovative assessments may be expressed in terms of student competencies aligned with the state's achievement standards. There are several additional considerations in the administration of state assessments. Specifically, there are provisions relevant to parent rights regarding student assessment, limitations on assessment time, and participation in the National Assessment of Educational Progress (NAEP). The ESEA does not preempt a state or local law regarding the decision of a parent not to have his or her child participate in an academic assessment. If a state or local law allows parents to permit their student to \"opt-out\" of an assessment, the student cannot be required to participate in a state assessment. There have been concerns over the amount of time schools spend on assessment and assessment preparation activities. Each state may set a limit on the total amount of time devoted to the administration of assessments for each grade, expressed as a percentage of annual instructional hours. As a condition of receiving Title I-A funds, a state must agree to participate in the biennial state NAEP assessments in reading and mathematics in grades 4 and 8 if the Secretary pays the costs of administering these assessments. NAEP is referred to as the \"Nation's Report Card\" because it is the \"largest nationally representative and continuing assessment of what America's students know and can do in various subject areas.\" A sample of public schools and students are selected for the assessments to create a representative sample of students within each state. Participation in the NAEP assessments is voluntary at the individual level. Results are reported at the national and state levels, as well as at the LEA level for a limited number of LEAs that participate in the trial urban district assessment (TUDA). Results are not reported at the school or individual student levels. In order to receive funds under Title I-A, each state is required to submit a plan to ED that, among other items, describes its accountability system. The system must incorporate the state's academic standards and aligned assessments in RLA and mathematics. In addition, the system must meet numerous requirements discussed below. Each state's accountability system must disaggregate data by specified student subgroups. These subgroups, which must receive separate accountincludeability determinations, include (1) economically disadvantaged students, (2) students from major racial/ethnic groups, (3) children with disabilities, and (4) English learners, provided the number of students in each subgroup meets the state's minimum number of students (also referred to as minimum group size) for inclusion in accountability determinations. Each state establishes its own minimum group size. In selecting its minimum group size, each state is required to describe the minimum number of students that are necessary to implement requirements related to the disaggregation of data by subgroup and how the number selected is statistically sound. The state must explain how the minimum number of students was determined, including whether stakeholders were included in the determination process, and how the state ensures that the selected minimum number of students is sufficient to not reveal any personally identifiable information. The same state determined minimum group size number must be used for all students and for each subgroup of students in the state. The system must include state established long-term goals (and measures of interim progress) for all students, and separately for subgroups of students, for academic achievement as measured by proficiency on the state RLA and mathematics assessments and high school graduation rates. In addition, the goals for subgroups of students who are behind on any of these measures must take into account the improvement needed to close statewide achievement gaps. Also, the system must include long-term goals (and measures of interim progress) for increases in the percentage of English learners making progress in achieving English proficiency, as defined by the state. A state must then use a set of indicators that are based, in part, on the long-term goals established by the state to annually measure the performance of all students and each subgroup of students to evaluate public schools. These indicators must include the following: 1. Student Proficiency on RLA and Mathematics Assessments. For all public schools, student performance on the RLA and mathematics assessments as measured by student proficiency, and for high schools may also include a measure of student growth on such assessments. 2. Measure s of Student Growth or Another Indicator of School Performance . For public elementary and secondary schools that are not high schools, a measure of student growth or another indicator that allows for meaningful differentiation in school performance. 3. Graduation Rates. For public high schools only. 4. English Language Proficiency. For all public schools, ELs' progress in achieving English language proficiency. 5. School Quality or Student Success. For all public schools, at least one indicator of school quality or student success (e.g., measure of student engagement, postsecondary readiness, school climate) that allows for meaningful differentiation in school performance. Each state is required annually to measure the performance of not less than 95% of all public school students and not less than 95% of all public school students in each subgroup on the mathematics and RLA assessments. For example, assume a school had 100 students enrolled in grades where state RLA and mathematics assessments were required (e.g., grades 3-6), but only 80 students participated in the RLA assessment. The school's participation rate for the RLA assessment would be 80% (80/100). The state is required to provide a clear and understandable explanation of how it will factor the participation rate requirement into the state's accountability system. Thus, each state is able to determine the extent to which failing to meet the 95% participation rate will be factored into its accountability system for evaluating school performance. For example, a state might decide that failing to meet the 95% participation rate requirement only has consequences if a school fails to meet it for the all students group or a subgroup for multiple years. Alternatively, a state could decide that for any year, failing to meet the participation rate requirement means that a school cannot receive the highest rating level in the state's accountability system. For the purposes of measuring, calculating, and reporting student proficiency on the mathematics and RLA assessments, the state must use as the denominator the greater of either (1) 95% of all public school students or 95% of all public school students in the subgroup (whichever is applicable to the calculation), or (2) the number of students participating in the assessments. Returning to the previous example, the school's maximum proficiency rate for the RLA assessment would be calculated by dividing the 80 participating students by 95% of all students in the school (i.e., 95 students) as 95% of the students is higher than the number of participating students. This would mean that the school's proficiency rate on the RLA assessment could be no higher than 84.2%. Based on the aforementioned indicators, the SEA must establish an annual system for meaningfully differentiating all public schools that gives substantial weight to each indicator but in the aggregate provides greater weight to the first four indicators than to the measure of school quality or student success. The system must also identify any school in which any subgroup of students is \"consistently underperforming, as determined by the state,\" based on all the aforementioned indicators and the system for annual meaningful differentiation (AMD). Based on the state's system for AMD, each SEA must establish a state-determined methodology to identify schools for comprehensive support and improvement (CSI), beginning with school year 2018-2019, and at least once every three years thereafter, 1. at least the lowest-performing 5% of all schools receiving Title I-A funds, 2. all public high schools failing to graduate 67% or more of their students, 3. schools required to implement additional targeted support and improvement (see below) that have not improved in a state-determined number of years, and 4. additional statewide categories of schools, at the state's discretion. The first category of CSI schools is the only category strictly limited to Title I-A schools. High schools can be identified for CSI regardless of whether they receive Title I-A funds or not. The third category of schools only includes Title I-A schools that have been identified for additional targeted support and improvement (ATSI) but have failed to improve within a state determined number of years. States have the discretion to determine whether any other schools will be identified for CSI. The statutory language does not specify whether this category of schools must be limited to only schools receiving Title I-A funds. Non-Title I-A schools that are identified for CSI are eligible to receive school improvement funds under Section 1003. However, the receipt of school improvement funds does not make a non-Title I-A school a Title I-A school. Each SEA is required to notify each LEA in the state if any of the schools served by the LEA have been identified for CSI. The LEAs in which schools are identified for CSI are then required to work with stakeholders, including principals or other school leaders, teachers, and parents, to develop a comprehensive support and improvement plan that meets the following requirements: is informed by all of the aforementioned indicators; includes evidence-based interventions; is based on a school-level needs assessment; identifies resource inequities to be addressed through the comprehensive support and improvement plan; is approved by the school, LEA, and SEA; and upon approval and implementation, is monitored and periodically reviewed by the SEA. The ESEA includes a definition of evidence-based . In general, when the term is used with respect to a state, LEA, or school activity, it means an \"activity, strategy, or intervention\" that (1) demonstrates a statistically significant effect on improving student outcomes or other relevant outcomes based on one of three levels of evidence, or (2) demonstrates a \"rationale based on high-quality research findings or positive evaluation that such activity, strategy, or intervention is likely to improve student outcomes or other relevant outcomes.\" The three levels of evidence for demonstrating a statistically significant effect are the following: 1. \"strong evidence from at least 1 well-designed and well-implemented study\"; 2. \"moderate evidence from at least 1 well-designed and well-implemented quasi-experimental study\"; and 3. \"promising evidence from at least 1 well-designed and well-implemented correlational study with statistical controls for selection bias.\" For activities, strategies, or interventions funded under Section 1003 (School Improvement), which can be used to support CSI and other support and improvement activities, the term evidence-based only includes activities, strategies, or interventions that meet one of the three levels of evidence for a statistically significant effect. School improvement funds may not be used for activities, strategies, or interventions that are likely to improve outcomes based only on a rationale constructed from high-quality research findings or positive evaluations. For high schools that are identified for CSI, the SEA may permit differentiated improvement activities that use evidence-based interventions at a school that predominantly serves students who (1) have returned to high school after previously leaving secondary school without a regular high school diploma, or (2) \"based on the grade or age, are significantly off track to accumulate sufficient academic credits to meet high school graduation requirements.\" In addition, if a high school serves fewer than 100 students, the SEA may permit the LEA to \"forego implementation\" of CSI activities. An LEA may offer students enrolled in a school identified for CSI the option to transfer to another public school served by the LEA, unless doing so is prohibited by state law. If an LEA offers public school choice, it must give priority to the lowest-achieving children from low-income families. A student who opts to transfer to another school must be permitted to remain in that school until he or she has completed the highest grade available at it. The student must also be permitted to enroll in classes and other activities in the same manner as all other students at the school. An LEA may use not more than 5% of its Title I-A allocation to pay for transportation costs associated with the public school choice option. States are also required to identify for targeted support and improvement (TSI) any school in which a subgroup of students is consistently underperforming. As previously discussed, the state has sole discretion to determine how the term consistently underperforming is defined. SEAs must notify each LEA in the state if a school served by the LEA has been identified as having at least one subgroup that is consistently underperforming and ensure that the LEA notifies such school with respect to which subgroup(s) is consistently underperforming. Once an LEA notifies a school that it has been identified for TSI, the school is required to work in partnership with stakeholders, including principals and other school leaders, teachers, and parents, to develop a school-level TSI plan to improve student outcomes based on the aforementioned indicators for each subgroup of students that was the subject of the notification provided by the SEA. The TSI plan must meet the following requirements: is informed by all of the aforementioned indicators; includes evidence-based interventions; is approved by the LEA prior to implementation; upon submission and implementation, is monitored by the LEA; and results in additional action, should implementation of the plan be unsuccessful after a number of years determined by the LEA. For a school in which one or more subgroups is performing at a level that, if reflective of an entire school's performance, would result in its identification for CSI as one of the lowest performing 5% of schools in the state, the school must be identified for additional targeted support and improvement (ATSI) activities. Schools identified for ATSI must include an identification of resource inequities as one of its activities. If a Title I-A school identified for ATSI does not improve within a state-determined number of years, the state is required to identify the school for CSI. Statutory language includes a special rule with respect to the identification of schools for ATSI. For the 2017-2018 school year, based on the state's system of meaningful differentiation, the SEA was required to notify an LEA if any of its schools met the ATSI identification requirements, as SEAs did not have to identify schools for TSI for the 2017-2018 school year. ED subsequently provided SEAs with an extra year to meet this requirement, so SEAs had to begin identifying schools for ATSI by the 2018-2019 school year. In some states, ATSI schools were identified prior to any TSI schools being identified, as statutory language did not include a requirement for when TSI schools had to be identified for the first time. For subsequent years, schools are required to be identified for ATSI following their initial identification for TSI based on the requirements of Section 1111(c)(4)(C)(iii). Thus, the frequency with which additional schools are identified for ATSI will depend on the frequency with which states identify schools for TSI. In determining which schools identified for TSI will also have to meet the additional ATSI requirements, each school is to be evaluated individually. If a school meets the ATSI criteria, then it is subject to the additional requirements and could ultimately be identified for CSI if it is a Title I-A school and fails to improve. There is no cap on the number of schools identified for TSI that may also be identified for ATSI. Thus, it is possible that every school identified for TSI could also be identified for ATSI, depending on how the state chooses to define consistently underperforming , when identifying TSI schools. However, if the state establishes a definition of consistently underperforming that is more restrictive than the ATSI requirement, it is possible that schools that would otherwise qualify for ATSI would not be identified for ATSI, as they would not be identified for TSI. If schools identified for CSI fail to improve in a state-determined number of years (not to exceed four years), the state must implement more rigorous State-determined action , and Title I-A schools identified for ATSI that fail to improve within a state-determined number of years must be identified for CSI. In addition, SEAs are required to periodically review the resource allocation to support school improvement in each LEA that serves a \"significant number\" of schools identified for CSI and a \"significant number\" of schools implementing TSI. SEAs are also required to provide technical assistance to each LEA serving a \"significant number\" of schools implementing CSI plans or TSI plans. SEAs have the option to initiate additional improvement in any LEA with (1) a \"significant number of schools that are consistently identified\" for CSI and are not meeting the exit criteria to be removed from this status, or (2) a \"significant number of schools\" implementing TSI plans. As part of these efforts, SEAs may establish alternative evidence-based state-determined strategies for use by LEAs to assist schools identified for CSI. The statutory language does not specify whether LEAs would have to use one or more of the strategies, or whether these would be the only strategies that could be used. Statutory language also does not address the state establishing alternative evidence-based state-determined strategies for LEAs to use to assist schools implementing TSI plans. Section 1003 of the ESEA provides for a state reservation of Title I-A funds for school improvement. An SEA is required to reserve the greater of (1) 7% of the amount the state receives under Title I-A, or (2) the sum of the amount the state reserved for school improvement under Title I-A in FY2016, and the amount the state received under the School Improvement Grants (SIG) program in FY2016. No LEA is permitted to receive less Title I-A funding than it received in the prior year as a result of this provision in FY2018 and subsequent fiscal years. Of the funds reserved for school improvement, states are required under ESSA provisions to provide at least 95% to LEAs through formula or competitive grants to serve schools that are implementing CSI activities or TSI activities. In allocating funds, an SEA must give priority to LEAs that serve high numbers or a high percentage of schools implementing CSI and TSI plans; demonstrate the strongest need for the funds, as determined by the state; and demonstrate the strongest commitment to using the funds to help the lowest-performing schools to improve student achievement and outcomes. Funds reserved by the SEA must be used for establishing the method by which funds will be allocated to LEAs; monitoring and evaluating the use of funds by LEAs; and, as appropriate, \"reducing barriers and providing operational flexibility to schools\" to implement CSI and TSI activities. In addition to the required reservation of Title I-A funds for school improvement, SEAs have the option of reserving up to 3% of the Title I-A funds they receive for direct student services. This optional reservation of funds was not included in the law prior to the ESSA. Of the funds reserved, states must distribute 99% to geographically diverse LEAs using a competitive grant process that prioritizes grants to LEAs that serve the highest percentages of schools identified for CSI or that are implementing TSI plans. Funds may be used by LEAs for a variety of purposes, including to pay the costs associated with the enrollment and participation of students in academic courses not otherwise available at the students' school; credit recovery and academic acceleration courses that lead to a regular high school diploma; activities that lead to the successful completion of postsecondary level instruction and examinations that are accepted for credit at institutions of higher education (IHEs), including reimbursing low-income students for the costs of these examinations ; and public school choice if an LEA does not reserve funds for this purpose under Section 1111. Title I-A also holds states accountable for teachers and paraprofessionals working in a program supported with Title I-A funds. These teachers or paraprofessionals must meet applicable state certification and licensure requirements. In addition, states participating in Title I-A must describe in their state plans how low-income and minority children enrolled in Title I-A schools are not served at disproportionate rates by \"ineffective, out-of-field, or inexperienced teachers.\" The state must also describe the measures that will be used to measure and evaluate the state's success in this area. The BIE oversees a total of 183 elementary, secondary, residential, and peripheral dormitory (i.e., \"boarding\") schools across 23 states. Of these 183 schools, 130 are tribally controlled and 53 are operated by the BIE. There are special rules regarding standards, assessment, and accountability for schools operated or funded by the BIE included in Section 1111(k) that apply until the requirements of Section 8204 (discussed below) are met. The special rules are as follows: Each BIE school accredited by the state in which it is operating shall use the assessments and other academic indicators the state has developed and implemented to meet the requirements of Section 1111, or such other appropriate assessment and academic indicators as approved by the Secretary of the Interior. Each BIE school that is accredited by a regional accrediting organization (in consultation with and with the approval of the Secretary of the Interior, and consistent with assessments and academic indicators adopted by other schools in the same state or region) shall adopt an appropriate assessment and other academic indicators that meet the requirements of Section 1111. Each BIE school that is accredited by a tribal accrediting agency or tribal division of education shall use an assessment and other academic indicators developed by such agency or division, except that the Secretary of the Interior shall ensure that such assessment and academic indicators meet the requirements of Section 1111. ESEA, Section 8204 contains provisions related to the setting aside of funds for the Department of the Interior to participate in the development of standards, assessments, and accountability systems in BIE-funded schools. For the purposes of Title I-A, the Secretary of the Interior, in consultation with the Secretary of Education (if requested by the Secretary of the Interior), shall use a negotiated rulemaking process to develop regulations that define the standards, assessments, and accountability systems for schools funded by the BIE. Using the negotiated rulemaking process, the Secretary of the Interior was required to develop regulations for implementation no later than the 2017-2018 school year. The tribal governing body or school board of a school funded by the Bureau of Indian Affairs may waive the aforementioned requirements if they are determined by such body to be inappropriate. If the requirements are waived, the tribal governing body or school board must submit a proposal to the Secretary of the Interior for alternative standards, assessments, and accountability systems within 60 days. The Secretary of the Interior and the Secretary of Education shall approve such standards, assessments, and accountability systems unless the Secretary of Education determines that they do not meet the requirements of ESEA, Section 1111, while taking into account the unique circumstances and needs of the schools and students served. The Secretary of the Interior and the Secretary of Education shall provide technical assistance, either directly or through a contract, to a tribal governing body or school board (if requested by such body) to develop alternative standards, assessments, and accountability systems. Section 1111 includes specific requirements related to annual SEA, LEA, and school public report cards. It also includes requirements related to reporting data to the Secretary and Congress. This section discusses these requirements as well as privacy requirements that apply to Section 1111. States and LEAs are required to prepare and disseminate annual report cards that include a range of information. LEAs are also required to prepare and disseminate report cards for each of their public schools. Any state that receives Title I-A funding is required to prepare and widely disseminate an annual, overall state report card. The report card must be concise. It must be presented in an \"understandable and uniform\" format that is developed in consultation with parents. And, to the extent practicable, it must be made available in a language that parents can understand. With respect to the dissemination of the document, an SEA is required to have a single page on its website that includes the state report card, all LEA report cards, and the annual report that the SEA must submit to the Secretary. The state report card must include, at a minimum, several elements ranging from information about the state's accountability system to teacher qualifications. Each required element is discussed briefly below. In guidance issued in September 2019, ED included a table that summarizes subgroup disaggregation reporting requirements for each data element. Each state report card must include a \"clear and concise\" description of the state's accountability system required under Title I-A. This includes a description of the minimum number of students for each subgroup for use in the accountability system. The report card must also include the long-term goals and measures of interim progress for all students and the subgroups for which the SEA is held accountable. In addition, the report card must include a description of the state's system for meaningfully differentiating all public schools in the state, including the following: The specific weight assigned to each of the indicators in the state's system for meaningful differentiation. The methodology used by the state to differentiate among schools; The methodology by which a state differentiates a school as \"consistently underperforming\" for any subgroup of students for which the SEA is held accountable. The report card must also indicate the number of years used in determining whether a school is consistently underperforming. The methodology used by the state to identify a school for CSI. The report card must include the number and names of all public schools in the state identified for CSI or implementing TSI. There is no separate reporting requirement for schools implementing ATSI. The report card must also provide a description of the exit criteria established by the state for exiting CSI status and the number of years that ATSI schools have to fail to improve before being identified for CSI. Each state report card is required to include information about student performance. The report must include data for all students and data disaggregated by each major racial/ethnic group, economically disadvantaged students, children with disabilities, English proficiency status, gender, migrant status, homeless status, foster care status, and status as a student with a parent who is a member of the Armed Forces on activity duty on student achievement on the mathematics, RLA, and science assessments required under Title I-A at each level of achievement. Further, for the (1) \"all students\" group, (2) student subgroups with separate accountability determinations, (3) students who are homeless, and (4) students in foster care, the state report card must include information on performance on the other academic indicator included in the state's accountability system for elementary schools and secondary schools that are not high schools. For the same groups of students, the state report card must report on high school graduation rates, including the four-year adjusted cohort graduation rate and, at the state's discretion, any extended-year adjusted cohort graduation rates used by the state. The state report card must also include other student-specific data. For only students in the EL subgroup, state report cards must provide data on the number and percentage of ELs achieving English language proficiency. For the (1) \"all students\" group, and (2) student subgroups with separate accountability determinations (with the exception of ELs), the state report card must include information on performance on the indicator(s) of school quality or student success used in the state's accountability system, as well as their progress toward meeting the state's long-term accountability system goals, including interim progress. And for the (1) \"all students\" group, (2) student subgroups with separate accountability determinations, (3) gender subgroups, and (4) migrant status group, the state report card must include data on the percentage of students assessed and not assessed. The state report card is required to include information submitted by the SEA and each LEA in the state pursuant to Section 203(c)(1) of the Department of Education Organization Act (DEOA), which is a reference to data collected through the Civil Rights Data Collection (CRDC) administered by the Office of Civil Rights at ED. The CRDC is conducted every other year and the next CRDC is scheduled to collect data from the 2019-2020 school year. From the data reported on the CRDC, the state report card must include the following information: \"measures of school quality, climate, and safety, including rates of in-school suspensions, out-of-school suspensions, expulsions, school-related arrests, referrals to law enforcement, chronic absenteeism (including both excused and unexcused absences), incidences of violence, including bullying and harassment;\" the number and percentage of students in preschool programs; and the number and percentage of students in accelerated coursework to earn postsecondary credit while in high school (e.g., Advanced Placement, International Baccalaureate, dual or concurrent enrollment). For some of the reporting requirements related to the CRDC, the CRDC collects multiple measures from which SEAs and LEAs must select at least one to include on the required report cards. The ESEA requires that these data be included annually on report cards. As the CRDC reports data biennially, SEAs and LEAs are permitted to include the same information for consecutive years provided it is the most recent data provided by ED. SEAs and LEAs also have the option to report, in addition to the ED-provided data, more recent data that the SEAs and LEAs have provided to ED through a more recent CRDC data collection as long as the data provided are reported separately from the ED-provided data. Additional statutory language reinforces that the reporting requirement related to the aforementioned data elements is limited to data collected under the authority of Section 203(c)(1) of the DEOA and cannot require disaggregation for subgroups beyond economically disadvantaged students, students from major racial/ethnic groups, children with disabilities, and ELs, as well as by homeless status and foster care status. State report cards must provide data, in the aggregate, and disaggregated by high-poverty as compared to low-poverty schools, on the professional qualifications of teachers. More specifically, data must be provided on the number and percentage of inexperienced teachers, principals, and other school leaders; teachers teaching with emergency or provisional credentials; and teachers who are not teaching in the subject or field for which they are certified or licensed. Several of the terms related to the reporting of these data elements, such as high-poverty schools , low-poverty schools , and teachers who are not teaching in the subject or field for which the teacher is certified or licensed are not defined in statutory language. In its guidance, ED suggests that SEAs may want to develop uniform definitions for the undefined terms. The state report card must provide data on LEA- and school-level per-pupil expenditures of federal, state, and local funds, including actual personnel expenditures and actual nonpersonnel expenditures of these funds, disaggregated by the source of funds for the preceding fiscal year. The data reported to meet the requirements of Section 1111 cannot be based on average staff salary data. The data must be reported for every LEA and public school in the state. An SEA may provide LEAs with the flexibility to develop their own procedures for calculating per-pupil expenditures or could opt to establish uniform statewide procedures for making these calculations. Per-pupil expenditure data have not been reported for LEAs and public schools in the past. Based on guidance issued by ED, SEAs and LEAs may delay reporting per-pupil expenditures until they issue report cards for the 2018-2019 school year. However, if an LEA decides to delay the reporting of per-pupil expenditures, the SEA and its LEAs are required to provide information on their report cards for the 2017-2018 school year about the steps they are taking to provide such information on the 2018-2019 school year report card. ED has indicated that it expects SEAs and LEAs to make these data public by the end of the school year during which the other report card data are released. The state report card must include additional information related to student assessments. It must include the number and percentage of students with the most significant cognitive disabilities who take an alternate assessment (see previous discussion) by grade and subject. It must also include the results on the state's National Assessment of Education Progress (NAEP) for reading and mathematics in grades 4 and 8 compared to the national average. As NAEP is administered biennially, report cards should reflect the most recent data available. In states where data are available, SEAs must include data on the cohort rate for all students and disaggregated for economically disadvantaged students, students from major racial/ethnic groups, children with disabilities, and English learners who graduate from high school and enroll, for the first academic year following the students' graduation, (1) in public postsecondary education programs in the state, and (2) if data are available and to the extent practicable, in private postsecondary education programs in the state or in postsecondary education programs outside of the state. The state may include any additional information on its state report card that it believes will provide members of the public, including parents and students, with information about the progress of each of the state's elementary and secondary schools. Statutory language notes that this may include the number and percentage of students attaining career and technical proficiencies. SEAs are required to provide specific information included on the state report card to the public in an \"easily accessible and user-friendly manner\" that allows the data to be cross-tabulated by, at a minimum, each major racial and ethnic group, gender, English proficiency status, and children with or without disabilities. The ability to cross-tabulate data applies to data reported on student achievement on the RLA, mathematics, and science assessments at all achievement levels; performance on the other academic indicator used for public elementary schools and secondary schools that are not high schools; high school graduation rates, including the four-year adjusted cohort graduation rate and, at the state's discretion, any extended-year adjusted cohort graduation rates used by the state; and the percentage of students assessed and not assessed. SEAs may choose to include this information in the annual state report card. The data provided for cross-tabulation purposes must not reveal any personally identifiable information about an individual student and cannot include a number of students in any cross-tabulation that is insufficient to provide statistically reliable information or that would reveal any personally identifiable information about an individual student. It must also be consistent with the Family Educational Rights and Privacy Act (FERPA) of 1974. An LEA that receives Title I-A funds is required to prepare and disseminate an annual LEA report card that includes information on the LEA overall and each public school it serves. Similar to the requirements for state report cards, an LEA report card must be concise. It must be presented in an understandable and uniform format and, to the extent practicable, in a language that parents can understand. The report card must also be publicly accessible, including on the LEA's website. An SEA is required to ensure that each of its LEA collects necessary data and includes information on all of the items that are also required to be reported on the state report card, including the disaggregation of data as specified above, with one exception: the LEA report card does not have to include NAEP scores, as these scores are only available at the LEA level for a subset of all LEAs in the United States. In addition, requirements for the state report card that require comparisons between the state and the nation as a whole are modified to be a comparison between an LEA and the state as a whole in the case of LEA report cards, and a comparison between a school and the LEA as a whole and the state as a whole in the case of school report cards. LEAs are permitted to include additional information on their report cards that the LEA determines will provide members of the public, including parents and students, with information about the progress of each of the state's elementary and secondary schools, regardless of whether the information is also included on the state report card. Each SEA receiving Title I-A funds is required annually to report to the Secretary, and make several pieces of information \"widely available\" in the state. The SEA must provide information on student achievement on the mathematics, RLA, and science assessments required under Title I-A, and must disaggregate the results for student subgroups with separate accountability determinations. The report must also include information on the acquisition of English proficiency by ELs. The SEA must include the number and names of each public school in the state that has been identified for CSI and the number and names of each public school in the state that is implementing TSI. There is no separate reporting requirement for schools identified for or implementing ATSI. In addition, the report must include information on the professional qualifications of teachers, including the number and percentage of inexperienced teachers, teachers teaching with emergency or provisional credentials, and teachers who are not teaching in the subject or field in which they are certified or licensed. The Secretary is required annually to submit a report to the House Committee on Education and the Workforce and the Senate Committee on Health, Education, Labor, and Pensions that provides national and state-level data based on the data that were submitted to the Secretary by the states. The report must be submitted electronically only. There is no requirement that the report be made available publicly. Any information collected and disseminated in response to the aforementioned reporting requirements must be collected and disseminated in such a way that it protects the privacy of individuals consistent with FERPA. In addition, the report cards and reports shall only include data that \"are sufficient to yield statistically reliable information.\" Data reported in the report cards and reports do not have to be disaggregated if doing so will reveal personally identifiable information about a student, teacher, principal, or other school leader. Data also do not have to be disaggregated if doing so will provide data that are insufficient to yield statistically reliable information. The last part of this report provides responses to frequently asked questions (FAQs) about various aspects of the educational accountability requirements enacted in the ESEA, as amended by the ESSA. In particular, FAQs related to academic content standards, assessment, accountability systems, and report cards are addressed. This section highlights two frequently asked questions with respect to the state standards requirements under Title I-A. The ESEA explicitly says that a state is not required to submit its challenging state academic standards, alternate achievement standards, or English language proficiency standards to the Secretary for review or approval. The Secretary also does not have the authority \"to mandate, direct, control, coerce, or exercise any direction or supervision over any of the challenging State academic standards adopted or implemented by a State.\" Concerns related to the diversity of accountability systems, student mobility, consistent expectations for students, preparation of students for global competition, and skills students need for employment spurred an effort led by the National Governors Association and the Council of Chief State School Officers to develop common standards for English language arts/literacy and mathematics in grades K-12 (referred to as the Common Core State Standards). This effort is referred to as the Common Core State Standards Initiative (CCSSI). According to the CCSSI, The purpose of this state-led initiative ... is to create a rigorous set of shared standards that states can voluntarily adopt. The standards are crafted to \"define the knowledge and skills students should have within their K-12 education careers so they graduate from high school able to succeed in entry-level, credit-bearing academic college courses and workforce training programs.\" Overall, 45 states, the District of Columbia, four outlying areas, and the Department of Defense Education Activity (DoDEA) adopted the Common Core State Standards at some point in time. Adoption of the Common Core State Standards has always been optional. However, some federal initiatives such as the Race to the Top (RTT) State Grant competition that began in 2009 provided substantial incentives to states that had adopted college- and career-ready standards that met specified requirements, and the Common Core State Standards was the most widely available set of standards that met such requirements. As discussed above, however, the Secretary does not have the authority to tell states what standards they must use to comply with the requirements of Title I-A. Thus, the decision to adopt (or not adopt) the Common Core State Standards as a state's standards rests solely with the state. This section discusses some examples of FAQs that have arisen as SEAs and LEAs implement the assessment requirements. The FAQs are related to the use specific assessments, assessment of students with disabilities, and the new assessment flexibilities. The ESEA contains multiple provisions that prohibit the Secretary from specifying the assessments that a state must use to comply with the requirements of Title I-A. As previously discussed, the Secretary is prohibited from prescribing which assessments a state must use, provided the assessments selected by the state meet statutory requirements. Through the Race to the Top Assessment Grant competition, the Partnership for the Assessment of Readiness for College and Careers (PARCC) and the SMARTER Balanced Assessment Consortium (Smarter Balanced) received grants to develop assessments aligned with the Common Core State Standards. Many states continue to use assessments developed by these organizations, but doing so is optional. A state may use the SAT or ACT for its high school assessment in its statewide accountability system, provided that the assessment is approved for use in the state plan. In short, the state must provide evidence that the SAT or ACT (1) is aligned with and equivalent to the state's academic content standards; (2) provides comparable, valid, and reliable data compared to the state assessment; (3) meets the general requirements of assessment systems with the exception that it need not be administered to all students in the state; and (4) provides unbiased, rational, and consistent differentiation between schools within the state. While the use of the SAT or ACT is a potentially viable option, the alignment evidence that must be collected and submitted to ED may be a barrier to implementing the flexibility. In March 2016, the SAT administered a newly redesigned assessment, which made a more focused effort to align itself with the Common Core Academic Standards. If there is a high degree of alignment between a state's academic content standards and the Common Core Academic Standards, the SAT may be suitable for use in accountability systems (provided the SAT meets the other requirements). The ACT was redesigned prior to the development of the Common Core Academic Standards; however, a representative from the ACT maintains that there is \"significant overlap\" between the common core and the college- and career-readiness constructs measured by the ACT. An Education Week survey of the states found that 25 require students to take the SAT or ACT, and 12 currently use the SAT or ACT for federal reporting and statewide accountability systems. If the SAT or ACT is not already used by the state in its accountability system, an LEA may request the use of a locally selected high school assessment (such as the SAT, ACT, Advanced Placement or International Baccalaureate exams, ACCUPLACER, or the ASVAB). The locally selected high school assessment must be approved by the state before an LEA uses it for accountability purposes. An Education Week article cites several reasons why states may not be adopting this flexibility more quickly, including the requirements that a state (1) figure out how to pay for the flexibility, (2) design a process for districts to apply for the flexibility, and (3) collect evidence that compares data from the statewide assessment and the locally selected high school assessment. Furthermore, an assessment expert explains in the article that it is difficult to have this flexibility and a comparable accountability system. By allowing the flexibility, states are opening the door to LEAs requesting different assessments from one year to the next. While the locally selected high school assessment must be comparable to the statewide assessment, it will not overlap 100% with the statewide assessment. If assessments continue to change from one year to the next, it may be more difficult to compare results across assessments and track progress over time than if only one assessment was allowed. Some states have applied for waivers of the locally selected high school assessments requirements. In one case, a state requested a waiver because an LEA requested to administer the ACT in lieu of the high school assessment before the state approval process was completed. The waiver was not approved, in part because the state had not submitted a timely request and did not demonstrate how the results of the ACT would be comparable to the results of the state test used in other high schools. For school year 2017-2018, 28 states requested a waiver to exceed the 1% cap for alternate assessments. Of the 28 states that requested waivers, 23 received them. At least 19 of the 23 states were granted a one-year extension of the waiver for school year 2018-2019, and 3 additional states were granted new waivers for school year 2018-2019. The National Center on Educational Outcomes (NCEO) tracks student participation in alternate assessments by state. The most recent NCEO publication reports on participation from school year 2015-2016, before the new alternate assessment requirements were in place. These data provide a baseline for expected rates of participation in alternate assessment in the short term. In general, most states reported alternate assessment participation rates between less than 1% and 2.5%; a participation rate of 2% is twice the allowable rate in statutory language. The ESEA, as amended by the ESSA, no longer allows the use of modified achievement standards (AA-MAS). Assessment options for students with disabilities have changed over the last several years. In the past, students with disabilities could participate in the general state assessment, alternate assessments based on alternate achievement standards (AA-AAS), or alternate assessments based on AA-MAS. States have been transitioning away from AA-MAS since around 2014. Therefore, students with disabilities who previously participated in AA-MAS are now required to participate either in the general state assessment or the AA-AAS (if they are determined to be students with the most significant cognitive disabilities and eligible to participate in an alternate assessment). The prohibition on the use of modified achievement standards (and therefore the AA-MAS option) may have led to an overidentification of students found eligible to participate in AA-AAS. As discussed above, approximately 40% of states have requested waivers to the 1% cap on AA-AAS, which may suggest that some of the students who were once eligible for AA-MAS are now eligible for AA-AAS. States may need to consider revising their definition of most significant cognitive disability and consider strategies for successfully transitioning students who took the AA-MAS to the general assessment. As of September 2019, the Secretary has granted innovative assessment and accountability demonstration authority to four states: Georgia, Louisiana, New Hampshire, and North Carolina. , , Georgia is piloting two technology-based assessments designed to provide educators with data that can be used to target instruction during the school year. Louisiana is developing a new format for the Louisiana Educational Assessment Program (LEAP) in ELA and social studies. New Hampshire is building on its Performance Assessment for Competency Education (PACE) system. North Carolina is using a customized, end-of-year assessment (referred to as the \"route\"), which is developed for individuals based on their performance on two formative assessments administered during the school year. Excessive numbers of opt-outs may have consequences for both assessment and accountability purposes. In terms of assessment, excessive numbers of opt-outs may undermine the validity of the measurement of student achievement because they may create a scenario in which states are measuring student achievement that is not representative of the whole student population. When at least 95% of all students and 95% of students in each student subgroup participate in the assessments, the conclusions based on the results are more likely to be valid and reliable for differentiating schools based on academic achievement. In terms of accountability, excessive numbers of opt-outs may lead to states failing to meet the requirement that 95% of all students and 95% of students in each student subgroup are assessed in the Title I-A assessment and accountability system. The specific consequences for failing to meet this 95% threshold for accountability purposes are determined by the state. This section includes FAQs that have arisen as SEAs, LEAs, and schools implement ESEA accountability requirements. They cover topics such as the use of student growth measures, the identification of schools for improvement, and whether accountability requirements can be waived. No, but states have the discretion to do so. Statutory language requires that the proficiency of students on the RLA and mathematics assessments be included as an indicator for all public schools in a state. It provides states with the option to use measures of student growth on the state assessments for high school students. The use of these growth measures would be in addition to the use of the proficiency measures. Public elementary and secondary schools that are not high schools are required to use, in addition to the proficiency measures, either a measure of student growth, \"if determined appropriate by the state,\" or another \"valid and reliable statewide indicator that allows for meaningful differentiation in school performance.\" Thus, the state also has the option to use student growth as measured by the RLA and mathematics assessments as an indicator for elementary and secondary schools that are not high schools. An LEA may use measures of student growth only for limited purposes if the state chooses not to use them. As previously discussed, the SEA is charged with developing and implementing the state accountability system, including selecting the indicators that will be included in the system. The use of student growth measures as indicators in the accountability system is left to the SEA's discretion. If an SEA does not choose to incorporate these measures into the accountability system that is used by the state to meaningfully differentiate schools and identify schools for CSI or TSI, then student growth is not an accountability system indictor. However, an LEA could choose to include student growth measures, for example, in the data that it uses at the LEA level for data analysis purposes or makes publicly available. An LEA may only use additional indicators for limited purposes. Statutory language requires SEAs to include specific indicators in the state accountability system and provides SEAs with some flexibility in including other indicators. The indicators included in the state accountability system are required to apply to all public schools in the state. The SEA is required to use its accountability system to determine which schools in the state will be identified for CSI or TSI. While an LEA could choose to add additional indicators, for example, in the data that it uses at the LEA level for data analysis purposes or makes publicly available, the LEA could not use these additional indicators as replacements for the SEA-selected indicators. Yes. Section 8401 provides the Secretary with the authority to waive various ESEA statutory and regulatory provisions. An SEA or Indian tribe that receives funds under any ESEA program may submit a request to the Secretary to waive any statutory or regulatory requirement pertaining to the ESEA, unless the Secretary is prohibited by law from waiving such provision. An LEA that receive funds under any ESEA program may also request a waiver of ESEA statutory and regulatory provisions, but the LEA must submit its request to its SEA. The SEA then has the option of submitting the LEA's waiver request if the SEA \"determines the waiver appropriate.\" Thus, an SEA could request a waiver related to its accountability system. For example, an SEA could request that only measures of student growth rather than student proficiency be used in the accountability system or that the SEA be permitted to create a combined measure based on student proficiency and student growth. An LEA could submit a waiver request to operate under a modified accountability system, such as an accountability system where the LEA uses different indicators than those selected by the state. However, as the LEA waiver request would have to be approved by the SEA prior to being submitted to the Secretary, it is possible that an SEA would deny the request and require that all public schools be evaluated using the state established accountability system, as is currently required by statutory language. In identifying the lowest-performing 5% of Title I-A schools for CSI, statutory language requires each state to select these schools using a \"state-determined methodology\" that is based on the \"system of meaningful differentiation.\" As there are no regulations clarifying the identification of schools for CSI, based on ED's approval of state plans it appears that a state can decide whether to use all of the data included in the system of meaningful differentiation, including data for subgroups, or use only selected elements from the system of meaningful differentiation in its state-determined methodology for identifying CSI schools. There are ED-approved state plans that include subgroup performance in the identification of the lowest performing 5% of schools for CSI and also approved state plans that do not include it. For example, the District of Columbia's state plan bases 25% of a school's overall accountability framework rating on student subgroup performance. Based on this accountability framework, the lowest performing 5% of schools are identified for CSI. On the other hand, North Carolina's state plan only considers a school's total score on the state accountability model for the all students group when identifying the lowest performing 5% of schools. For all years following the first school year in which schools are identified for ATSI, the methodology for identifying schools for TSI begins with an SEA's identification of schools with at least one subgroup that is \"consistently underperforming, as determined by the state.\" As such, an SEA has the flexibility to define this group of schools as broadly or as narrowly as it chooses. This could result in a large group of schools being identified for TSI, of which only a subset will be identified for ATSI. It could also result in an SEA identifying schools for TSI in such a way that every one of these schools would also meet the requirements for being identified for ATSI. Because a school's designation for ATS I hinges on being identified for TSI afte r the first sc hool year in which schools are identified for ATSI , ATS I schools are a subset of TSI schools. Because the ESEA allows SEAs to define what a consistently underperforming subgroup of students means for designation as a TSI school, it appears that an SEA could use the ATS I criteriaâa school having at least one subgroup of students whose level of performance, if reflective of the entire school's performance, would cause the school to be among the lowest-performing 5% of schools receiving Title I-A funds in the stateâas its definition of a school having a consistently underperforming subgroup of student s. Under such circumstances, the SEA 's TSI and ATS I schools would be the same. A state could also choose to implement a more restrictive definition of a consistently underperforming subgroup of students than the ATSI definition, resulting in fewer schools being identified for ATSI than would otherwise be identified if schools did not have to be initially identified for TSI. As previously discussed, there are special rules regarding standards, assessment, and accountability for schools operated or funded by the BIE that apply until the requirements of Section 8204 are met. Section 8204 requires the Department of the Interior to participate in the development of standards, assessments, and accountability systems in BIE-funded schools using a negotiated rulemaking process. The process was required to result in the development of regulations for the implementation of standards, assessments, and accountability systems no later than the 2017-2018 school year. On June 10, 2019, the Bureau of Indian Education proposed a rule developed using a negotiated rulemaking process as required by the ESEA to meet the Secretary of the Interior's obligation to define standards, assessments, and accountability system consistent with the ESEA for BIE-funded schools. Comments on the rule were due on August 9, 2019. A final rule had not been issued as of February 14, 2020. This section includes two FAQs related to state and LEA report cards. SEA and LEA report cards for the 2017-2018 school year must include the information required by ESSA with the exception of the per-pupil expenditures data. ED is allowing SEAs and LEAs to delay reporting per-pupil expenditures data until report cards for the 2018-2019 school year. SEAs and LEAs are required to explain the delay in reporting per-pupil expenditures if the data are not being reported until the 2018-2019 school year. In addition, while the per-pupil expenditures data do not have to be reported at the same time as other report card data are released, ED expects SEAs and LEAs to make these data public by the end of the school year during which the other report card data are released. SEAs and LEAs are not required to say why a school was identified for CSI, TSI, or ATSI. For example, a report card does not have to indicate whether a school was identified for CSI because it was one of the lowest-performing 5% of Title I-A schools, had a graduation rate of 67% or less, or failed to exit ATSI status in a state-determined number of years. In its report card guidance, ED indicates that SEAs and LEAs \"may wish\" to provide this information on report cards and provides examples of the types of information that an SEA or LEA might consider including. For example, an SEA or LEA might indicate which subgroup(s) led to the school's identification for TSI.", "summary": "The Elementary and Secondary Education Act (ESEA), as amended by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), provides federal aid for elementary and secondary education. The largest ESEA program is Title I-A, Improving the Academic Achievement of the Disadvantaged. As a condition of receiving Title I-A funds, states and local educational agencies (LEAs) must meet requirements related to academic standards, assessments, accountability, and reporting. Academic Standards Each state must adopt (1) challenging academic content standards in reading/language arts (RLA), mathematics, and science; and (2) achievement standards representing three levels of achievement. States must also adopt English language proficiency standards for English Learners (ELs), covering four domains: speaking, listening, reading, and writing. States may adopt alternate achievement standards for students with the most significant cognitive disabilities. Academic Assessments Each state must administer academic assessments in RLA, mathematics, and science. The state is required to administer RLA and mathematics assessments in grades 3 through 8 and once in high school, and it is required to administer science assessments once in each of three grade spans (3-5, 6-8, and 10-12). Each state may assess a certain percentage of students with the most significant cognitive disabilities with an alternate assessment based on alternate achievement standards. Each state must administer an annual assessment of English proficiency to all ELs. Accountability Systems Each state must submit a plan that describes its accountability system. Accountability systems must establish long-term goals and include indicators based on these long-term goals. The indicators must include (1) student performance on RLA and mathematics assessments in all public schools and may include a measure of student growth for public high schools, (2) a measure of student growth or another indicator that allows for meaningful differentiation in school performance for all public elementary and secondary schools that are not high schools, (3) graduation rates for public high schools, (4) progress in English language proficiency by English learners in all public schools, and (5) at least one indicator of student school quality or student success that allows for meaningful differentiation in all public schools. The accountability systems must provide data for all students and allow for the disaggregation of student performance by subgroups: (1) economically disadvantaged students, (2) students from major ethnic/racial groups, (3) children with disabilities, and (4) ELs. States must establish a system of meaningfully differentiating among all public schools in the state based on established indicators. The differentiation among schools must include any school in which any subgroup is consistently underperforming. Using the system of meaningful differentiation, a state must identify schools that require comprehensive support and improvement (CSI), including (1) the lowest performing 5% of all schools receiving Title I-A funds, (2) all public high schools failing to graduate 67% or more of their students, (3) schools required to implement additional targeted support and improvement that have not improved in a state-determined number of years, and (4) additional statewide categories of schools (at the state's discretion). Additionally, states are required to identify schools for targeted support and improvement (TSI), which includes any school in which a subgroup of students is consistently underperforming. Schools may also be identified for additional targeted support and improvement (ATSI), which includes any school in which one or more subgroups performs at a level that, if reflective of an entire school's performance, would result in its identification for CSI. Report Cards Each state is required to prepare and disseminate an annual r eport card . The report card must include (1) information about the s tate's accountability system; (2) schools identified for CSI or schools implementing TSI; (3) information on student performance dis aggregated by various subgroups; (4) teacher qualifications; (5) LEA- and school-level per pupil expenditures of federal, state, and local funds; and (5) additional information related to student assessments. Each LEA that receives Title I-A funds is required to prepare and disseminate an an nual LEA report card that includ es information on the LEA and each public school served by the LEA .", "document_type": "crs"}
{"report": "Congress established the Office of Technology Assessment (OTA) in October 1972 in the Technology Assessment Act of 1972 (P.L. 92-484) to provide competent, unbiased information concerning the physical, biological, economic, social, and political effects of [technological] applications\" [to be used as a] \"factor in the legislative assessment of matters pending before the Congress, particularly in those instances where the Federal Government may be called upon to consider support for, or management or regulation of, technological applications. The agency operated for more than two decades, producing approximately 750 full assessments, background papers, technical memoranda, case studies, and workshop proceedings. In 1995, amid broader efforts to reduce the size of government, Congress eliminated funding for the operation of the agency. Congress appropriated funding for FY1996 \"to carry out the orderly closure\" of OTA. Although the agency ceased operations, the statute authorizing OTA's establishment, structure, functions, duties, powers, and relationships to other entities was not repealed. Since OTA's defunding, some Members of Congress, science and technology advocates, and others have sought to reestablish OTA or to establish similar analytical functions in another agency or nongovernmental organization. This report describes the OTA's historical mission, organizational structure, funding, staffing, operations, and perceived strengths and weakness. The report concludes with a discussion of issues and options surrounding reestablishing the agency or its functions. The report also includes three appendices. Appendix A provides a historical overview of discussions about the definition of \"technology assessment,\" a topic fundamental to OTA's mission and to any organization that would seek to fulfill OTA's historic role. Appendix B describes selected trends and factors that may contribute to a perceived need for technology assessment. Appendix C provides a history of legislative efforts to reestablish OTA or its functions since the agency was defunded. Appendix D provides a list of technology assessment products produced from 2002 to 2019 by the Government Accountability Office (GAO). Congress's guidance to GAO on technology assessment during this period is provided in the section \" Congress, GAO, and Technology Assessment .\" Groundbreaking emerging technologiesâin fields such as artificial intelligence, quantum computing, gene editing, hypersonics, autonomy, and nanotechnologyâare widely anticipated to have substantial economic and social impacts, affecting the ways people work, travel, learn, live, and engage with others and the surrounding world. The impacts are likely to be felt by people of all ages, across most industries, and by government. Science, technology, and innovation have been of interest to government leaders throughout the nation's history. The federal government has looked to people and organizations with expertise in the development and application of new technologies to gain insights into their implications and potential public policy responsesâboth to accelerate and maximize their expected benefits and to reduce or eliminate expected adverse effects. Such policies may include, among other things the funding of research and development (R&D) to accelerate the arrival and deployment of technologies and to identify their uses and potential implications; infrastructure policies, such as \"smart\" highways and cities, focused on creating environments where new technologies can flourish; regulations to guide and govern the development and use of technologies to ensure human health and public safety and to protect the environment; tax policies and other incentives to encourage investment in technology development and adoption; trade policies to maximize the global economic and societal potential of new technologies by fostering market access and eliminating tariff and nontariff barriers; intellectual property policies to protect the interests of those investing in technology development and commercialization; and education and training programs to promote U.S. leadership in innovation and ensure the adequacy of the science and technology workforce, as well as to help those who are displaced by new technologies to attain the knowledge and skills needed for other jobs. In some cases, a specific science or technology outcome may be the primary objective of a proposed policy, while in other cases science and technology may play a role in a broader policy effort to achieve other societal goals, such as environmental quality, public health and safety, economic competitiveness, or national security. Science and technology activities, programs, and sectors can be affected by tradeoffs resulting from multiple policy objectives. For example, U.S. trade policy for high technology goods and services may involve complementary and competing policy objectives related to intellectual property protection, expansion of markets, protection of U.S. national security, and advancement of geopolitical objectives. U.S. government efforts to obtain guidance on scientific and technical issues and their policy implications extend back to the nation's founding. Some of these efforts were informal, with Presidents, Members of Congress, and executive branch officials seeking out insights of knowledgeable individuals on an ad hoc basis. Presidents and congressional leaders also relied on more formal advice from scientific and technical societies, and business and professional organizations for insights and guidance on science, technology, and innovation-related issues. A number of organizations and their members helped fill this role in the early years of the country's development, including the American Philosophical Society, co-founded by Benjamin Franklin in 1743; the American Academy of Arts and Sciences, founded in 1780 in Boston, whose charter members included John Adams and Samuel Adams; the Academy of Natural Sciences of Philadelphia, founded in 1812; the Smithsonian Institution, established by an act of Congress in 1846; and the American Association for the Advancement of Science, founded in 1848. In 1863, Congress chartered the National Academy of Sciences and directed that \"the academy shall, whenever called upon by any department of the Government, investigate, examine, experiment, and report upon any subject of science or art, the actual expense of such investigations, examinations, experiments, and reports to be paid from appropriations which may be made for the purpose, but the Academy shall receive no compensation whatever for any services to the Government of the United States.\" Three related entities were subsequently formed to complement the knowledge and capabilities of the National Academy of Sciences: the National Academy of Engineering, the National Academy of Medicine, and the National Research Council. These four organizations are collectively referred to as the National Academies of Science, Engineering, and Medicine (NASEM) or simply, the National Academies. They are nonprofit, nongovernmental entities. In addition, throughout the 20 th century, Congresses and Presidents, using statutory and executive authorities, respectively, established executive branch organizations to provide scientific insight and advice to the President, as well as informing Congress and federal departments and agencies. Advisory and coordinating organizations included the National Advisory Committee for Aeronautics (NACA, est. 1915), the Science Advisory Committee (SAC, est. 1951), the President's Science Advisory Committee (PSAC, est. 1956), the Intergovernmental Science, Engineering, and Technology Panel (ISETAP, est. 1976), the President's Committee on Science and Technology (PCST, est. 1976), and the President's Council of Advisors on Science and Technology (PCAST, est. 1990). Other organizations were established in statute. For example, the National Science Board (NSB, which oversees the National Science Foundation) was established by the National Science Foundation Act of 1950; a key statutory mandate of the NSB is to \"render to the President and to the Congress reports on specific, individual policy matters related to science and engineering and education in science engineering, as Congress or the President determines the need for such reports.\" In addition, many science and technology agencies in the executive branch have deep expertise across a wide spectrum of technologies; several of these have policy-oriented offices or programs. While Congress had its own science and technology advisory resourcesâincluding the Congressional Research Service (CRS) and the General Accounting Office (GAO, now the Government Accountability Office )âprior to the establishment of OTA, many federal science and technology advisory organizations and agencies were under the authority and direction of the President. Accordingly, during the decade preceding the establishment of OTA, a number of lawmakers expressed a need for Congress to have its own agency to conduct detailed science and engineering analyses and provide information tailored to legislative needs and the legislative processâto supplement the functions performed by GAO and CRS. For example, in a 1963 hearing, Representative George Miller, chairman of the House Committee on Science and Astronautics, stated We are concerned with whether or not hasty decisions are handed down to us, but one of our difficulties is how to evaluate these decisions. We have to take a great deal on faith. We are not scientists â¦ [but] I want to say that in our system of government we have our responsibility. We are not the rubber stamps of the administrative branch of Governmentâ¦ [We] recognize our responsibility to the people and the necessity for making some independent judgments â¦ [but] we do not particularly have the facilities nor the resources that the executive department of the government has. In August 1963, Senator Edward L. Bartlett, introduced a bill to establish in the legislative branch a congressional Office of Science and Technology: The scientific revolution proceeds faster and faster â¦ and the President, in requesting authority for these vast scientific programs undertaken by the Government,â¦ has available to him the full advice and counsel of the scientific communityâ¦. The Congress has no such help. The Congress has no source of independent scientific wisdom and advice. Far too often congressional committees for expert advice rely upon the testimony of the very scientists who have conceived the program, the very scientists who will spend the money if the program is authorized and appropriated for.â¦ Congress as a body must equip itself to legislate on technological matters with coherence and comprehension. In December 1963, Senator Bartlett testified at a hearing of the Committee on House Administration Subcommittee on Accounts on the establishment of a congressional science advisory staff: Faceless technocrats in long, white coats are making decisions today which rightfully and by law should be made by the Congress. These decisions dealing with the allocation of our scientific and technical resources must be madeâ¦. I think the Congress should make these decisions. I think they should be made in a rational manner. I think they should be made by an informed legislature which understands the implications, the costs, and the priorities of its judgments. Similarly, in a 1970 hearing of the House Subcommittee on Science, Research, and Development on H.R. 17046 (91 st Congress), a bill to establish OTA, subcommittee chair Representative Emilio Daddario stated This Subcommittee has recognized a need to pay more attention to the technological content of legislative issues. Since 1963, a large portion of the Subcommittee efforts have been to develop avenues of information and advice for the Congress with outside groups, We have recognized the important need for developing Independent means of obtaining necessary and relevant technological Information for the Congress, without having to depend almost solely on the Executive Branch. In my view, it is only with this capability that Congress can assure its role as an equal branch in our Federal structure. During the 1972 House debate on establishing OTA, Representative Chuck Mosher reiterated the need for Congress to have its own science and technology advisory responsive solely to Members of Congress and congressional committees: Let us face it, Mr. Chairman, we in the Congress are constantly outmanned and outgunned by the expertise of the executive agencies. We desperately need a stronger source of professional advice and information, more immediately and entirely responsible to us and responsive to the demands of our own committees, in order to more nearly match those resources in the executive agencies. Many, perhaps most, of the proposals for new or expanding technologies come to us from the executive branch; or at least it is the representatives of those agencies who present expert testimony to us concerning such proposals. We need to be much more sure of ourselves, from our own sources, to properly challenge the agency people, to probe deeply their advice, to more efficiently force them to justify their testimonyâto ask sharper questions, demand more precise answers, to pose better alternatives. Peter Blair, author of Congress' Own Think Tank: Learning from the Legacy of the Office of Technology Assessment, asserts that this perspective contributed to the establishment of OTA and other congressional science and technology analytical functions: [Many] viewed the creation of OTA, as well as the subsequent creation of CBO, and the expansion of [the Congressional Research Service] and [General Accounting Office] at around the same time, as part of a congressional reassertion of authority responding to Richard Nixon's presidency. While advocates for the creation of OTA asserted that its functions would be complementary to GAO and CRS, others expressed concerns about the costs of setting up another bureaucracy and suggested that the roles envisioned for OTA might be done by the existing agencies, perhaps at a lower cost. Some proposed, instead, that the functions intended for OTA be given to CRS or GAO. For several years in the late 1960s and early 1970s, Congress explored and deliberated on the need for, and value of, technology assessment as an aid in policymaking decisions. In 1972, Congress enacted the Technology Assessment Act of 1972 (P.L. 92-484, codified at 2 U.S.C. Â§Â§471 et seq.), establishing the Office of Technology Assessment as a legislative branch agency. The meaning of the term \"technology assessment\" is fundamental to the types of research and analysis that OTA or a successor organization might perform. There is no single authoritative definition of the term. In practice, an implicit definition is provided in the Technology Assessment Act of 1972: The basic function of the Office shall be to provide early indications of the probable beneficial and adverse impacts of the applications of technology and to develop other coordinate information which may assist the Congress. In the act, Congress found and declared that technological applications were \"large and growing in scale; and increasingly extensive, pervasive, and critical in their impact, beneficial and adverse, on the natural and social environment.\" Accordingly, Congress deemed it \"essential that, to the fullest extent possible, the consequences of technological applications be anticipated, understood, and considered in determination of public policy on existing and emerging national problems.\" Further, Congress found that existing legislative branch agencies were not designed to provide Congress with independently developed, adequate, and timely information related to the potential impact of technological applications. For these reasons, Congress authorized the establishment of OTA to \"equip itself with new and effective means for securing competent, unbiased information concerning the physical, biological, economic, social, and political effects of such applications.\" The information provided by OTA would serve \"whenever appropriate, as one factor in the legislative assessment of matters pending before the Congress, particularly in those instances where the Federal Government may be called upon to consider support for, or management or regulation of, technological applications.\" In assigning functions, duties, and powers to OTA, Congress further refined its concept of technology assessment; these are described later in this report. For a discussion of the history and varying perspectives on the meaning of the term, see Appendix A . As previously noted, the authorization for OTA's existence, structure, and functions remains in effect. This section provides an overview of OTA's structure, function and duties, powers, components and related organizations, and other information, as articulated in the agency's organic statute and codified at 2 U.S.C. Â§Â§471-481. Because these authorities remain in effect, despite the fact that OTA itself no longer exists, this section describes the authorities using the present tense. The Technology Assessment Act of 1972 authorizes the establishment of an Office of Technology Assessment, composed of a Director and a Technology Assessment Board (TAB). The TAB is to \"formulate and promulgate the policies\" for OTA to be carried out by the Director. OTA's functions and duties include identifying existing or probable impacts of technology or technological programs; ascertaining cause-and-effect relationships, where possible; identifying alternative technological methods of implementing specific programs; identifying alternative programs for achieving requisite goals; making estimates and comparisons of the impacts of alternative methods and programs; presenting findings of completed analyses to the appropriate legislative authorities; identifying areas where additional research or data collection is required to provide adequate support for its assessments and estimates; and undertaking such additional associated activities as directed by those authorized to initiate assessments (see below). The statute authorizes OTA \"to do all things necessary\" to carry out its functions and duties including, but not limited to making full use of competent personnel and organizations outside of OTA, public or private, and forming special ad hoc task forces or making other arrangements when appropriate; entering into contracts or other arrangements for the conduct of the work of OTA with any agency of the United States, with any state, territory, or possession, or with any person, firm, association, corporation, or educational institution; making advance, progress, and other payments which relate to technology assessment; accepting and utilizing the services of voluntary and uncompensated personnel necessary for the conduct of the work of OTA and providing transportation and subsistence for persons serving without compensation; acquiring by purchase, lease, loan, or gift, and holding and disposing of by sale, lease, or loan, real and personal property necessary for exercising the OTA's authority; and prescribing such rules and regulations as it deems necessary governing the operation and organization of OTA. The act also authorizes OTA \"to secure directly from any executive department or agency information, suggestions, estimates, statistics, and technical assistance for the purpose of carrying out its functions.\" It also requires executive departments and agencies to furnish such information, suggestions, estimates, statistics, and technical assistance to OTA upon its request. Other provisions prohibit OTA from operating any laboratories, pilot plants, or test facilities, and authorize the head of any executive department or agency to detail personnel, with or without reimbursement, to assist OTA in carrying out its functions. Under the act, the Technology Assessment Board (TAB) is to consist of 13 members: six Senators (three from the majority party and three from the minority party), six Members of the House of Representatives (three from the majority party and three from the minority party), and the OTA Director. The Director is to be a nonvoting member. The Senate members are to be appointed by the President pro tempore of the Senate; House members are to be appointed by the Speaker of the House of Representatives. The act authorizes the TAB to \"formulate and promulgate the policies\" of OTA. It also authorizes the TAB, upon majority vote, to \"require by subpoena or otherwise the attendance of such witnesses and the production of such books, papers, and documents, to administer such oaths and affirmations, to take such testimony, to procure such printing and binding, and to make such expenditures, as it deems advisable.\" It authorizes the TAB to make rules for its organization and procedures and authorizes any voting member of the TAB to administer oaths or affirmations to witnesses. The chair and vice chair of the TAB are to alternate between the House and Senate each Congress. During each even-numbered Congress, the chair is to be chosen from the House members of the TAB, and the vice chair is to be chosen from the Senate members. In each odd-numbered Congress, the chair is to be chosen from the Senate members of the TAB, and the vice chair is to be chosen from among the House members. No TAB was established after the 104 th Congress. The House did not formally appoint members in the 104 th Congress, but Senate membership in the TAB was continuous and therefore the Senate members served as OTA's board until the agency ceased operations in 1995. Under the act, the TAB is to appoint the OTA Director for a term of up to six years. The act authorizes the Director to exercise the powers and duties provided for in the act, as well as such powers and duties as may be delegated to the Director by the TAB. The TAB has the authority to remove the Director prior to the end of the six-year term. The act authorizes the Director to appoint a Deputy Director. The Director and the Deputy Director are prohibited from engaging in any other business, vocation, or employment; nor is either allowed to hold any office in, or act in any capacity for, any organization, agency, or institution with which OTA contracts or otherwise engages. The Director is to be paid at level III of the Executive Schedule and the Deputy Director is to be paid at level IV. The act authorizes the Director to appoint and determine the compensation of additional personnel to carry out the duties of OTA, in accordance with policies established by the TAB. Under the act, OTA may conduct technology assessments only at the request of the chair of any standing, special, or select committee of either chamber of Congress, or of any joint committee of the Congress, acting on his or her own behalf or at the request of either the ranking minority member or a majority of the committee members; the TAB; or the Director, in consultation with the TAB. Under the act, OTA is to establish a Technology Assessment Advisory Council (TAAC). The TAAC shall, upon request by the TAB, review and make recommendations to the TAB on activities undertaken by OTA; review and make recommendations to the TAB on the findings of any assessment made by or for OTA; and undertake such additional related tasks as the TAB may direct. Under the act, the TAAC is to be composed of 12 members: 10 members from the public, to be appointed by the TAB, who are to be persons \"eminent in one or more fields of the physical, biological, or social sciences or engineering or experienced in the administration of technological activities, or who may be judged qualified on the basis of contributions made to educational or public activities\"; the Comptroller General, who heads GAO; and the Director of the Congressional Research Service. The public members of the TAAC are to be appointed to four-year terms. They are to receive compensation for each day engaged in the actual performance of TAAC duties at the highest rate of basic pay in the General Schedule. The law authorizes reimbursement of travel, subsistence, and other necessary expenses for all TAAC members. Under the act, a TAAC member appointed from the public may be reappointed for a second term, but may not be appointed more than twice. The TAAC is to select its chair and vice chair from among its appointed members. The terms of TAAC members are to be staggered, according to a method devised by the TAB. The act authorizes the Librarian of Congress to make available to OTA such services and assistance of the Congressional Research Service as are appropriate and feasible, including, but not limited to, all of the services and assistance which CRS is otherwise authorized to provide to Congress. The Librarian is authorized to establish within CRS such additional divisions, groups, or other organizational entities as necessary for this purpose. Services and assistance made available to OTA by CRS may be provided with or without reimbursement from OTA, as agreed upon by the TAB and the Librarian. Similarly, the act directs the Government Accountability Office to provide to OTA financial and administrative services (including those related to budgeting, accounting, financial reporting, personnel, and procurement) and such other services. Such services and assistance to OTA include, but are not limited to, all of the services and assistance that GAO is otherwise authorized to provide to Congress. Services and assistance made available to OTA by GAO may be provided with or without reimbursement from OTA, as agreed upon by the TAB and the Comptroller General. Under the act, OTA is to maintain a continuing liaison with the National Science Foundation with respect to grants and contracts for purposes of technology assessment, promotion of coordination in areas of technology assessment, and avoidance of unnecessary duplication or overlapping of research activities in the development of technology assessment techniques and programs. The act requires that OTA assessmentsâincluding information, surveys, studies, reports, and related findingsâshall be made available to the initiating committee or other appropriate committees of Congress. In addition, the act authorizes the public release of any information, surveys, studies, reports, and findings produced by OTA, except when doing so would violate national security statutes or when the TAB deems it necessary or advisable to withhold such information under the exemptions provided by the Freedom of Information Act. The act requires OTA's contractors and certain other parties to maintain books and related records needed to facilitate an effective audit in such detail and in such manner as shall be prescribed by OTA. These books and records (and related documents and papers) are to be available to OTA and the Comptroller General, or their authorized representatives, for audits and examinations. Congress appropriated funds for OTA from FY1974 to FY1996 in annual legislative branch appropriations acts. Funding was provided mainly through regular appropriations acts, but additional funding was provided in some years through supplemental appropriations acts. In some fiscal years, Congress reappropriated unused OTA funds from earlier appropriations, essentially carrying the funds over to the next year. In some years, appropriations were reduced through sequestration or rescission. OTA's funding grew steadily throughout its existence, from an initial appropriation of $2 million in FY1974 ($8.6 million in constant FY2019 dollars) to a current dollar peak of $21.3 million in FY1995 ($33.4 million in constant FY2019 dollars). See Figure 1 (current dollars) and Figure 2 (constant FY2019 dollars). OTA's budget peaked in constant dollars in FY1992 at $35.1 million in constant FY2019 dollars. OTA received $3.6 million ($5.6 million in constant FY2019 dollars) in FY1996 to close out its operations. According to the Office of Management and Budget, OTA was not funded beyond February 1996. CRS was unable to identify a consistent measurement of OTA staffing that spans the period during which Congress appropriated funds for the agency. Figure 3 includes OTA staffing levels using three different characterizations that were consistent during parts of this time period. The data are from the Budget of the United States Government for fiscal years 1976-1998. Using these measures, staffing was first reported for FY1974 at 42, and rose to 151 in FY1977. Staffing then fell through 1980 before rising again, but remained between 123 and 143 from FY1978 to FY1991. In FY1992, reported staffing jumped to 193, and rose to a reported 210 in FY1993. In FY1994, staffing fell to a reported 197 and continued to drop through the end of the agency's funding in FY1996. During most years of OTA's operations, Congress included an annual cap on the agency's total number of \"staff employees\" in annual appropriations laws, beginning with a cap of 130 in the FY1978 Legislative Branch Appropriations Act ( P.L. 95-94 ). This cap was included in subsequent appropriations bills through FY1983. Congress increased the cap to 139 staff employees for FY1984, then increased it again to 143 for FY1985 and maintained this level through FY1995. The cap established a maximum limit on the number of OTA staff employees. In addition to full-time and temporary staff employees, OTA made extensive use of contractors. As shown in Figure 3 , OTA reported the statutory maximum of 143 employees from FY1985 to FY1991. In FY1992, a change in practice may have led to the reporting of contractors in its staffing level, resulting in the reported number of total compensable workyears exceeding total authorized (143) positions. Contractors supplemented the knowledge base of staff employees and were seen by OTA management as critical to the agency's ability to deliver authoritative products on emerging scientific and technological fields, especially with respect to OTA's technology scanning products that sought to characterize possible future science and technology paths and their potential implications. Peter Blair, in Congress' s Own Think Tank , noted that OTA was designed with the intention of serving the unique needs of Congress: The agency's architects intended the reports and associated information OTA produced to be tuned carefully to the language and context of Congress. OTA's principal productsâtechnology assessmentsâwere designed to inform congressional deliberations and debate about issues that involved science and technology dimensions but without recommending specific policy actions. Supporters, critics, and analysts have offered a variety of views on the strengths and weaknesses of OTA. Some have found OTA's work to be professional, authoritative, and helpful to Congress. For example, in a 1979 hearing of the Senate Committee on Appropriations, Subcommittee on Legislative Branch Appropriations, Representative Morris Udall, serving as chairman of the OTA Technology Assessment Board, testified that The usefulness of the OTA is clear. The office has a place in the legislative processâ¦. During my tenure on the Board, I have enjoyed watching OTA develop and building this record to the point where it is now on a decisive and effective course. Others offered a variety of criticisms, including issues related to uniqueness/duplication, timeliness, objectivity, and other factors, which likely helped to lay a foundation for its defunding. These are discussed below. Some supporters of OTA asserted that the agency served a unique mission, complementary to those of its sister congressional agencies. A 1978 report of the House Committee on Science and Technology Subcommittee on Science, Research, and Technology reporting on its 1977-1978 oversight hearings on OTA stated OTA has been set up to do a job for the Congress which is: (a) essential, (b) not capable of being duplicated by other legislative entities, and (c) proving useful and relied upon. OTA should retain its basic operating method of depending to a large extent on out-of-house professional assistance in performing its assessments. Continued congressional support for OTA is warranted. Subcommittee chairman Representative Ray Thornton subsequently stated that this report \"doesn't leave much doubt that the office is a valuable asset to the Congress.\" However, some critics asserted that the OTA mission and the work it did were already performed, or could be performed, by other organizationsâsuch as GAO (then the General Accounting Office), CRS, or the National Academies. This perspective was expressed by Senator Jim Sasser, chairman of the Senate Committee on Appropriations Subcommittee on the Legislative Branch, in a 1979 hearing: I am, frankly, troubled by the Office of Technology Assessment. This letter from Chairman Magnuson is just one more example of the type and tenor of questioning I receive from my colleagues and others about the Office of Technology Assessment. Franklyâ¦this recurring questioning raises doubts in my mind about the need for the Office of Technology Assessment. From time to time I hear that OTA very often duplicates studies conducted by the three other congressional analytical agencies, that is, the General Accounting Office, the Congressional Research Service and the Congressional Budget Office, or [by] executive branch agencies, such as the National Science Foundation. Concerns about duplication continued. During House floor debate on the Legislative Branch Appropriations Act, 1995, that eliminated funding for OTA, Representative Ron Packard, chairman of the Legislative Branch Subcommittee, stated In our efforts in this bill we have genuinely tried to find where there is duplication in the legislative branch of Government. This is one area where we found duplication, serious duplication. We have several agencies that are doing very much the same thing in terms of studies and reports. I am aware of the invaluable service of OTA, but there are other agencies that do the same thing. The CRS has a science division of their agency. GAO has a science capability in their agency. They can do the same thing as OTAâ¦. We ought to eliminate those agencies where duplication exists. This is one of those areas. In 2006, Carnegie Mellon University professor Jon M. Peha asserted that, while nonfederal organizations produce high-quality work similar to that performed by OTA, their work is not necessarily duplicative of the type of work OTA was established to perform as the characteristics of their analyses (e.g., directive recommendations, timeliness, format) are qualitatively different and their motivations may be subject to question: There still are more sources of information outside of government. These tend to be inappropriate for different reasons. The National Academies sometimes are an excellent resource for Congress, but for a different purpose. The National Academies generally attempt to bring diverse experts together to produce a consensus recommendation about what Congress should do. In many cases, Members of Congress do not want to be told what to do. Instead, they want a trustworthy assessment of their options, with the pros and cons of each, so they can make up their own minds. Universities and research institutes also produce valuable work on some important issues, but it rarely is generated at a time when Congress most needs it, or in a format that the overworked generalists of Congress can readily understand and apply. Moreover, Members of Congress must be suspicious that the authors of any externally produced report have an undisclosed agenda. Congress established OTA to help it anticipate, understand, and consider \"to the fullest extent possible, the consequences of technological applications â¦ in determination of public policy on existing and emerging national problems.\" To do this effectively, Congress needs information, analysis, and options on a timetable with the development and consideration of legislation. OTA supporters have noted that in recognizing the need for timeliness, the agency sought to inform congressional decisionmaking through a number of other mechanisms beyond its formal assessments. In addition to its formal assessments and summaries, OTA used the following additional mechanisms to inform Congress: technical and other memoranda, testimony, briefings, presentations, workshops, background papers, working papers, and informal discussions. Representative Rush Holt commented in 2006 that OTA's reports \"were so timely and relevant that many are still useful today.\" While OTA reports were often lauded for being authoritative and comprehensive, some critics asserted that the time it took for OTA to define a report, collect information, gather expert opinions, analyze the topic, and issue a report was not consistent with the faster pace of legislative decisionmaking: Probably the most frequent criticism of OTA from supporters and detractors alike is that it was too slow; some studies took so long that important decisions already were made when the relevant reports were released. In its early years, some criticized OTA for producing too many short analyses; later others criticized the agency for concentrating on long-range studies and neglecting committee needs. In 2001, the former chairman of the House Committee on Science Robert Walker noted Too often the OTA process resulted in reports that came well after the decisions had been made. Although it can be argued that even late reports had some intellectual value, they did not help Congress, which funded the agency, do its job. Georgetown Law's Institute for Technology Law and Policy published a report on a June 2018 workshop on strategies for improving science and technology policy resources for Congress. Several participants asserted that \"OTA's model often failed to deliver timely information to Congress, as the comprehensiveness of the studies and the rigor of the peer review process meant that reports could take 18 months or more to publish.\" Some criticisms related to the quality and utility of OTA reports to the legislative process. This concern, and others, were reflected in a 1979 statement by Senator Jim Sasser, chairman of the Senate Appropriations Subcommittee on the Legislative Branch: The accusations are leveled that OTA studies are mediocre, and they are not used in the legislative process, but rather, most of them end up in the warehouse gathering dust, as so many government studies doâ¦. I am not being personally critical of you at all, but it falls to me to respond to these criticisms which I hear from my colleagues and others. In 1984 the Heritage Foundation, a think tank, published a paper, Reassessing the Office of Technology Assessment , lauding the agency's independence and quality: OTA performs an important function for Congress. In an increasingly complex age, Congress needs the means to conduct analyses independent of those produced by industry, lobbies, and the executive branch. The quality control procedures of OTA, as a whole, seem as careful and complete as those of its sister agencies, the General Accounting Office and the Congressional Budget Office. There was and is a consensus that objectivity is essential to technology assessment if it is to serve as a foundation (among others) for congressional decision making. However, not all agree that objectivity is necessary to technology assessment, or even possible. Some assert OTA's work to have been objective. This perspective is reflected in comments by Representative Mark Takano who has stated, \"The foundation for good policy is accurate and objective analysis, and for more than two decades the OTA set that foundation by providing relevant, unbiased technical and scientific assessments for Members of Congress and staff.\" Similarly, Representative Sean Casten has stated, \"OTA gave us an objective set of truths. We may have creative ideas about how to deal with that truth, but let's not start by arguing about the laws of thermodynamics.\" A report for the Woodrow Wilson International Center for Scholars by Richard Sclove asserted that OTA's work implied a misleading presentation of objectivity: The OTA sometimes contributed to the misleading impression that public policy analysis can be objective, obscuring the value judgments that go into framing and conducting any [technology assessment] studyâ¦. In this regard an authoritative European review of [technology assessment] methods published in 2004 observes that [OTA] â¦ represents the 'classical' [technology assessment] approach.... The shortcomings of the classical approach can be summarized in the fact that the whole [technology assessment] process â¦ needs relevance decisions, evaluations, and the development of criteria, which is at least partially normative and value loaded. Another scholar framed concerns about objectivity as a structural issue arising, in part, from single-party control of Congress during OTA's existence. The author noted the need for careful bipartisan and bicameral oversight to overcome perceptions and accusations of bias: Some Members of Congress raised noteworthy concerns. The most serious allegation was bias. It is not surprising that the party in the minority (before 1995) would raise concerns about bias, given that the other party had dominated Congress throughout OTA's existenceâ¦. Bias or the appearance of bias can be devastating. An organization designed to serve Congress must be both responsive and useful to the minority, as well as the majority. Representatives of both parties and both houses must provide careful oversight, so that credit or blame for the organization's professionalism is shared by all. Some critics have asserted that OTA was responsive principally to the TAB, \"limiting its impact to a very narrow constituency.\" While the TAB membership was bipartisan and bicameral, this criticism implied that OTA's objectivity was affected to some degree by the perspectives of those serving on the TAB, adding to the notion of structural challenges faced by OTA in achieving objectivity or the appearance of objectivity. In the 1980 book, Fat City : How Washington Waste s Your Taxes , author Donald Lambro, a Washington Times reporter, criticized OTA's work as partisan: Many of OTA's studies and reports â¦ concentrated on issues that were of special concern to [Senator Ted Kennedy]. The views expressed in them were always, of course, right in line with Kennedy's views (or any liberal's, for that matter)â¦. The agency's studies have proven to be duplicative, frequently shoddy, not altogether objective, and often ignored. The 1984 Heritage Foundation paper Reassessing the Office of Technology Assessment asserted that despite OTA's quality control procedures, balance and objectivity concerns remained: Enough questions have been raised about OTA's procedures and possible biases, therefore, to warrant a thorough congressional review of OTA. This was particularly the case, according to the Heritage paper, for products not requested or reviewed by OTA's congressional oversight board, the TAB. The paper singled out for criticism OTA's assessment of the Strategic Defense Initiative (SDI), President Reagan's plan for a weapon system that would serve as a shield from ballistic missiles. The Heritage Foundation paper asserted that the OTA report on SDI was marred by intentional political bias: In the [SDI] study, for example, at least one OTA program division placed the political goal of discrediting SDI ahead of balanced and objective analysis. Further, the Heritage paper asserted It is also difficult to believe that the flaws in Carter's study and its disclosure of highly sensitive information are the result of naivete and misunderstanding on the part of the OTA. The evidence that some OTA staffers oppose the Administration's Strategic Defense Initiative seems clear and compelling.\" The Heritage report notes that experts from the SDI office and from Los Alamos National Laboratory questioned the technical accuracy of the report. The report then notes that three analysts selected by OTA Director Jack Gibbons to review the report (described in the report as having been \"unsympathetic to strategic defense\") commended Carter's study and told Gibbons that he should not withdraw the report. In 1988, citing the controversy over the OTA SDI report, Senator Jesse Helms asserted that OTA's work was not objective: OTA has been obsessed with proving that President Reagan's strategic defense initiative is both wrongheaded and dangerous almost since the very moment Mr. Reagan announced it in 1983. OTA has long ago lost its pretense that it is an objective scientific analysis group. By and large its reports are useless or irrelevant, but it has demonstrated over and over again that its work on SDI is both pernicious and distorted. In 2016, Representative Rush Holt disagreed with the assertion of bias in OTA's SDI report asserting, \"When it came to missile defense, it was pretty clear to [OTA] that [the technology] wouldn't work as claimed, so they said so.\" A 2004 article in the journal The New Atlantis, \"Science and Congress,\" stated that \"the most significant reason for Republican opposition [to reestablishing OTA] is the belief that OTA was a biased organization, and that its whole approach was misguided: a way of giving a supposedly scientific rationale for liberal policy ideas and prejudices.\" The author offered several examples which, if viewed \"through Republican eyes\" support this belief. According to a report published by Georgetown Law's Institute for Technology Law and Policy, participants in a June 2018 workshop identified \"the perception of partisanship\" as one of two OTA weaknesses. The issue of the costs of OTA studies was a factor in early oversight of OTA by Congress. On behalf of the chairman of the Senate Appropriations Committee, the chairman of the Legislative Branch subcommittee raised concerns about \"allegations that OTA had either cost or time overruns on a large number of their contracts\" in a 1979 appropriations hearing. OTA responded that contract overruns had stemmed primarily from modification of the scope of contracts. The agency asserted that its operation was based on the extensive use of outside talent, and that contractors were engaged early in an assessment to help OTA staff and supporting panels to define in more detail the nature of the assessment. This could lead to additional contractor work assignments, requiring modifications to contracts or additional contracts to enable completion of assessments. When OTA was established, analysts argued that public input into the technology assessment process was important. The efficacy of the OTA process for gaining such input has been a topic of debate. Some have asserted in retrospect that OTA did not have an effective mechanism for taking in public comments. Some former OTA staff have disputed this perception. One characterized the charge that OTA lacked citizen participation as \"outrageousâ¦. The OTA process was nothing if not participatory.\" Another former OTA staffer, Fred Wood, recognized OTA's efforts in seeking public participation, but lamented that these efforts fell short at times: Public participation [by representatives of organized stakeholder groups] was one of the bedrock principles of the OTA assessment process.... Yet this aspect of OTA's methodology could be time consuming and still fall short of attaining fully balanced participation, while leaving some interested persons or organizations unsatisfied. The TAAC served as one vehicle for nongovernmental input into OTA's work. However, in a 1977 hearing, former Representative Emilio Daddario, who introduced the legislation first proposing the creation of an Office of Technology Assessment, testified that the TAAC had been invented in \"a hurried effort to provide for some new method of public input into OTA activities, even though unfortunately its role was ill-defined.\" Some have offered other criticisms of OTA. For example, a Wilson Center report identified the following additional criticisms of OTA: inconsistency in fully identifying and articulating technologies' ethical and social implications; failure to identify social repercussions that could arise from interactions among complexities of seemingly unrelated technologies; a lack of elucidation of circumstances in which a technology can induce a cascade of follow-on socio-technological developments; and failure to develop a \"capacity to cultivate, integrate or communicate the informed views of laypeople.\" At the time of OTA's defunding, some Members of Congress expressed views on which other agencies and organizations might serve the functions performed by OTAâor however much of those functions was still deemed necessary. The following excerpts from the House and Senate reports accompanying the Legislative Branch Appropriations Act, 1996 ( H.R. 1854 , 104 th Congress) and from floor debate on the bill provide insight into these post-OTA perspectives: The report of the House Committee on Appropriations on H.R. 1854 directed that following the defunding of OTA, any of its necessary functions would be performed by other agencies, such as CRS and GAO, and that supplemental information would be provided by nongovernment organizations: If any functions of OTA must be retained, they shall be assumed by other agencies such as Congressional Research Service or the General Accounting Office. Alternatively, the National Academy of Sciences, university research programs, and a variety of private sector institutions will be available to supplement the needs of Congress for objective, unbiased technology assessments. In its report on the bill, the Senate Committee on Appropriations report stated its disagreement with the House's intent to transfer OTA functions to CRS. The report asserted a variety of differences between OTA and CRS and stated that assigning OTA functions to CRS would harm CRS: During consideration of the bill by the House of Representatives, an amendment was adopted transferring the functions of the Office of Technology Assessment to the Congressional Research Service. The Committee disagrees with this proposal. The purposes, procedures, methodologies, management, and governance of the CRS and the OTA are quite different, and the Committee believes the merger of the two would substantially harm the Congressional Research Service. In debate on the Senate version of the bill, Senator Daniel Inouye asserted that OTA filled a unique and important role for which other legislative branch agencies were not suited: Some of my colleagues have suggested that we don't need an OTA.... How many of us are able to fully grasp and synthesize highly scientific information and identify the relevant questions that need to be addressed? The OTA was created to provide the Congress with its own source of information on highly technical matters. Who else but a scientifically oriented agency, composed of technical experts, governed by a bipartisan board of congressional overseers, and seeking information directly under congressional auspices, [can give] the Congress and the country accurate and essential information on new technologies? Can other congressional support agencies and staff provide the information we need? I am second to none in my high regard for these agencies, but each has its own distinct role. The U.S. General Accounting Office is an effective organization of auditors and accountants, not scientists. The Congressional Research Service is busy responding to the requests of members for information and research. The Congressional Budget Office provides the Congress with budget data and with analyses of alternative fiscal and budgetary impacts of legislation. Furthermore, each of these agencies is likely to have its budget reduced, or to be asked to take on more responsibilities, or both, and would find it extremely difficult to take on the kinds of specialized work that OTA has contributed. Representative Ron Packard, chair of the House Appropriations Committee's Legislative Branch subcommittee, described the elimination of OTA as \"legislative rightsizing\" and asserted the availability of other congressional agencies to fill OTA's role: In our efforts in this bill we have genuinely tried to find where there is duplication in the legislative branch of Government. This is one area where we found duplication, serious duplication. We have several agencies that are doing very much the same thing in terms of studies and reportsâ¦. I am aware of the invaluable service of OTA, but there are other agencies that do the same thing. The CRS has a science division of their agency. GAO has a science capability in their agency. They can do the same thing as OTA. We evaluated how to best consolidate, and it was our conclusion as a committee that to eliminate OTA and absorb the essential functions into some of these other agencies that are going to continue was the best way to goâ¦. I admit OTA has done a good job. They have good, solid professionals, but those professionals can work with other agencies that will do those same functions, if they are essential. We also have the CRS, GAO, and other agencies, such as the National Academy of Sciences. There are many alternatives, or this work can even be privatized and contracted out for the services. But we do not need this agency that has now outgrown its usefulness â¦ has now increased its mission to other areas beyond science. In the House, Representative Henry Hyde stated his support for an amendment submitted by Representative Amo Houghton that would have transferred most of the funds and analysts to CRS: [The amendment] cuts 50 of 190 jobs. It cuts the budget by 32 percent, from $22 million down to $15 million. And it folds its functions into the Congressional Research Service. So we cut down on the money, we cut down on the personnel, we downsize to the bone, but we do not lose the function. It just seems to me in this era of fiber optics and lasers and space stations, we need access to an objective, scholarly source of information that can save us millions and billions. The amendment to transfer funds and personnel to CRS was not passed. Following the defunding of OTA, Congress sought help from other organizations to fill a gap for scientific and technical information that previously would have been performed by OTA. According to one analysis, Congress initially increased its use of the National Academies for obtaining such information, though shortly thereafter its usage of the National Academies returned to pre-OTA defunding levels. Another option employed by Congress for technology assessment capabilities has been reliance on the GAO. Beginning in the early 2000s, GAO undertook efforts to develop and improve its technology assessment capabilities. Some of these efforts were initiated by GAO itself, other efforts were initiated at Congress's direction. Congress has not given GAO statutory authority to conduct technology assessments. Rather, Congress provided GAO guidance with respect to its technology assessments and related activities in the form of reports accompanying annual Legislative Branch Appropriations bills since at least 2001. In 2000, five years after Congress defunded OTA, GAO established the Center for Technology and Engineering in its Applied Research and Methods team. This center, led by GAO's Chief Technologist, later became GAO's Center for Science, Technology, and Engineering. Shortly thereafter, Congress began to task GAO with technology assessment activities. In 2001, conferees on the Legislative Branch Appropriations Act, 2002 directed in report language that up to $500,000 of GAO's appropriation be obligated to conduct a technology assessment pilot project and that the results be reported to the Senate by June 15, 2002. The conference report did not authorize an assessment topic, but three Senators requested GAO to assess technologies for U.S. border control together with a review of the technology assessment process. At the same time, six House Members wrote to GAO supporting the pilot technology assessment project. After consulting congressional staff, GAO agreed to assess biometric technologies. It used its regular audit processes and also its standing contract with The National Academies to convene two meetings that resulted in advice from 35 external experts on the use of biometric technologies and their implications on privacy and civil liberties. The resulting report was issued in November 2002 as Technology Assessment: Using Biometrics for Border Security (GAO-03-174). The FY2003 Senate legislative branch appropriations report noted the utility of GAO's work and said that it was providing $1 million for three GAO studies in order to maintain an assessment capability in the legislative branch and to evaluate the GAO pilot process. However, this language was not included in the Senate bill ( S. 2720 , 107 th Congress); the House bill ( H.R. 5121 , 107 th Congress) or the accompanying report; or in P.L. 108-7 , which included as Title H, the Legislative Branch Appropriations Act, 2003. Although funds were not provided for a study, GAO conducted a technology assessment that was published in May 2004 as Cybersecurity for Cri tical Infrastructure Protection . For FY2004, the Senate Committee on Appropriations recommended $1 million for two or three technology assessments by GAO, but directed the agency only to conduct this technology assessment work if it was consistent with GAO's mission. The conference report for the Legislative Appropriations Branch, 2004 ( P.L. 108-83 ) noted that For the past two years the General Accounting Office (GAO) has been conducting an evaluation of the need for a technology assessment capability in the Legislative Branch. The results of that evaluation have generally concluded that such a capability would enhance the ability of key congressional committees to address complex technical issues in a more timely and effective manner. Further, the conferees directed GAO to report by December 15, 2003, to the House and Senate Committees on Appropriations \"the impact that assuming a technology assessment role would have on [GAO's] current mission and resources.\" In 2004, a bill was introduced in the Senate ( S. 2556 , 108 th Congress) to establish a technology assessment capability within GAO. The bill would have authorized the Comptroller General to initiate technology assessment studies or to do so at the request of the House, Senate, or any committee; to establish procedures to govern the conduct of assessments; to have studies peer reviewed; to avoid duplication of effort with other entities; to establish a five-member technology assessment advisory panel; and to have contracting authority to conduct assessments. In addition, the bill would have authorized $2 million annually to GAO to conduct assessments. The bill was referred to the Committee on Governmental Affairs and no further action was taken. A similar bill was introduced in the House ( H.R. 4670 , 108 th Congress) and referred to the House Committee on Science; no further action was taken. For FY2005, GAO requested $545,000 in appropriations for four new full-time equivalent (FTE) positions and contract support to establish a baseline technology assessment capability that would allow the agency to conduct one assessment per year. In its report, the House Appropriations Committee did not address funding for GAO for technology assessment, but encouraged GAO to \"... retain its core competency to undertake additional technology assessment studies as might be directed by Congress.\" An amendment to add $30 million to GAO's FY2005 appropriations for the purpose of establishing a Center for Science and Technology Assessment was rejected by the House. The Senate Committee on Appropriations report on the Legislative Branch Appropriations Act, 2005 ( S. 2666 , 108 th Congress) provided additional guidance to GAO with respect to its technology assessment activities, limiting future technology assessments to those having the support of leadership of both houses of Congress and to technology assessments that \"are intended to address significant issues of national scope and concern.\" In addition, the report directed the GAO Comptroller General to consult with the committee \"concerning the development of definitions and procedures to be used for technology assessments by GAO.\" In 2007, the House Committee on Appropriations recommended $2.5 million for GAO for technology assessments in FY2008, stating that as technology continues to change and expand rapidly it is essential that the consequences of technological applications be anticipated, understood, and considered in determination of public policy on existing and emerging national problems. The Committee believes it is necessary for the Congress to equip itself with effective means for securing competent, timely and unbiased information concerning the effects of scientific and technical developments and use the information in the legislative assessment of matters pending before the Congress. That same year, the Senate committee report on the Legislative Branch Appropriations Act, 2008 ( S. 1686 , 110 th Congress) recommended $750,000 and four FTE employees to establish a permanent technology assessment function in the GAO. The report also stated that the committee had \"decided not to establish a separate entity to provide independent technology assessment for the legislative branch owing to budget constraints.\" Further, it asserted that GAO's focus on \"producing quality reports that are professional, objective, fact-based, fair, balanced, and nonpartisan is consistent with the needs of an independent legislative branch technology assessment function.\" In addition, the committee directed GAO \"to define an operational concept for this line of work, adapted from current tested processes and protocols,\" and to report to Congress on the concept. Conferees on the Consolidated Appropriations Act, 2008 ( H.R. 2764 , 110 th Congress; P.L. 110-161 ) agreed to provide $2.5 million for GAO for technology assessments in FY2008, asserted the importance of technology assessment to Congress's public policy deliberations, and directed the Comptroller General to ensure that \"GAO is able to provide effective means for securing competent, timely and unbiased information to Congress regarding the effects of scientific and technical developments.\" For FY2009, conferees continued funding for GAO's technology assessment and reminded the agency that \"for the assessments to be of benefit to the Congress, GAO must reach out and work with both bodies of Congress regarding these studies.\" For FY2010, the House Committee on Appropriations recommended continuing GAO technology assessment funding at the FY2009 level. The conference report on Legislative Branch Appropriations Act, 2010, endorsed the chamber reports. No direction was given by Congress to GAO in House, Senate, or conference appropriations reports regarding technology assessment for FY2011, FY2012, FY2013, or FY2014. In its report on the Legislative Branch Appropriations Act, 2015 ( H.R. 4487 , 113 th Congress), the Senate Committee on Appropriations commended GAO for the technology assessment advice it provided to Congress for a decade, but asserted that the scale and scope of that work has been limited due to budget constraints. The committee recommended an increase in GAO funding to enhance the agency's technology assessment capabilities and directed GAO to submit a strategic plan for its technology assessment program. The strategic plan was to include proposed solutions to challenges constraining the GAO's technology assessment capabilities, approaches to increase responsiveness to congressional needs and priorities, and strategies to improve technology assessment procedures and methodologies, as well as identify additional authorities and resources that may be needed. In its report on the Legislative Branch Appropriations Act, 2016 ( H.R. 2250 , 114 th Congress), the Senate Committee on Appropriations commended GAO for implementing a new strategic plan for its technology assessment program that expanded the scale and scope of its assessment analysis. Additionally, the committee encouraged GAO to focus hiring efforts on increasing technology assessment staff capacity. Conferees on the Consolidated Appropriations Act, 2017 ( H.R. 244 , 114 th Congress) lauded GAO's technology assessment work and encouraged GAO to increase its scientific and technical capacity as its work portfolio requires: GAO's work is recognized in the area of technology assessment, since being tasked with this responsibility in 2002. GAO has produced highly technical and scientific reports in response to Congressional requests and statutory requirements. These reports have included technology assessments (TA), and other reports to Congress that incorporate analysis of scientific, technological and engineering issues in their evaluations of federal programs. GAO has also produced best practice guides for use across government on the topics of lifecycle cost estimating, project scheduling, and technology readiness assessment. GAO's work in these areas is led by GAO's Center for Science, Technology, and Engineering (CSTE). GAO's CSTE provides wide-ranging technical expertise across all of GAO's areas of work, including support to various studies of federal programs with science and technology elements, such as cybersecurity, nuclear and environmental issues, and major technical systems acquisitions, among others. Also noted is the work of CSTE's e-Security laboratory and Cost Engineering Sciences groups which conduct computer and network security evaluations and advanced operations research analyses (including cost, schedule, and technical performance), respectively. GAO has provided direct support to the Congress via congressional testimony, review of draft legislation, and the adoption of various report recommendations by Executive Branch agencies. GAO is commended for providing key direct technical support to various congressional committees on technology-focused topics such as the U.S. Capitol Police radio systems acquisition. It is noted that GAO is using rigorous methods in its technical reports, including engaging key external technical experts via group meetings conducted in partnership with the National Academies, cost-benefit analysis, risk analysis, technology maturity assessment, and scenario-based trend identification. Given the persistent and growing demand for this technical work, the Comptroller General is commended for his strategic initiative to build the scientific and technical capacity within GAO and encouraging further growth as the work portfolio requires. GAO is encouraged to continue a communication effort with Congress to ensure lawmakers are aware of these services. No direction was given by Congress to GAO in FY2018 appropriations report language regarding technology assessment. Conferees on the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019, directed GAO to expand its technology assessment capacity by reorganizing its S&T function and to create a more prominent office for this purpose within GAO. Congress directed GAO to provide, within 180 days, a plan and timetable for how the new office could expand and enhance GAO's capabilities in scientific and technological assessments: Technology Assessment : There is general support in Congress to bolster capacity of and enhance access to quality, independent science and technological expertise. Since 2002, GAO has provided direct support to Congress in the area of technology assessment through objective, rigorous, and timely assessments of emerging science and technologies. The Center for Science, Technology, and Engineering (CSTE) within GAO has developed such a capacity, providing wide-ranging technical expertise across all of GAO's areas of work. However, because the scope of technological complexities continues to grow significantly, the conferees seek opportunities to expand technology assessment capacity within the Legislative Branch. The conferees encourage GAO to reorganize its technology and science function by creating a new more prominent office within GAO. GAO is directed to provide the Committees a detailed plan and timeline describing how this new office can expand and enhance GAO's capabilities in scientific and technological assessments. This plan should be developed in consultation with internal stakeholders of the Legislative Branch such as congressional staff and Members of Congress in addition to external stakeholders, including nonprofit organizations and subject matter experts knowledgeable in the field of emerging and current technologies. Further, such a plan should include a description of the revised organizational structure within GAO, provide potential cost estimates as necessary, and analyze the following issues: the appropriate scope of work and depth of analysis; the optimum size and staff skillset needed to fulfill its mission; the opportunity and utility of shared efficiencies within GAO; and the opportunities to increase GAO's engagement and support with Congress. GAO is directed to submit this report to the Committees within 180 days of enactment. In January 2019, GAO announced plans to double the size of its current combined science and technology workforce. It also announced the establishment of a new Science, Technology Assessment, and Analytics (STAA) team focused on technology assessments and technical services for the Congress; auditing federal science and technology programs; compiling and utilizing best practices in the engineering sciences; and establishing an audit innovation lab to explore, pilot, and deploy new advanced analytic capabilities, information assurance auditing, and emerging technologies expected to affect auditing practices. In April 2019, GAO issued its expansion and enhancement plan, GAO Science, Technology Assessment, and Analytics Team: Initial Plan and Considerations Moving Forward. According to the plan, the new GAO STAA office would perform the agency's existing science- and technology-focused work, as well as its new technology assessment activities. The GAO plan states that the number of STAA staff will increase from 49 to 70 by the end of FY2019 under the plan. STAA staff would eventually grow to as many as 100-140, depending on congressional requests for technology assessments and technical assistance. Functions to be performed by STAA include providing technology assessments and technical assistance to Congress; evaluation of S&T programs within the federal government; best practices guides in the engineering sciences, including cost, schedule, and technology readiness assessments; and an audit innovation lab. From 2002 through April 14, 2020, GAO published 16 technology assessment reports, including two in 2019. Appendix D provides a complete list of GAO technology assessments. In 2018, conferees on the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019 ( H.R. 5895 , P.L. 115-244 ) noted recent testimony and requests for restoring funding for OTA and the need for Congress to have \"deep technical advice necessary to understand and tackle the growing number of science and technology policy challenges.\" In this regard, Congress directed CRS to contract with the National Academy of Public Administration (NAPA) or a similar external entity to produce a report detailing the current resources available to Members of Congress within the Legislative Branch regarding science and technology policy, including the GAO. This study should also assess the potential need within the Legislative Branch to create a separate entity charged with the mission of providing nonpartisan advice on issues of science and technology. Furthermore, the study should also address if the creation of such entity duplicates services already available to Members of Congress. CRS should work with the Committees in developing the parameters of the study and once complete, the study should be made available to relevant oversight Committees. In 2018, CRS engaged NAPA to conduct the study and produce a report. In October 2019, NAPA published its report, Science and Technology Policy Assessment: A Congressionally Directed Review . NAPA articulated its mission in addressing the congressional direction as threefold: to detail the current resources available to Members of Congress within the legislative branch regarding science and technology policy, including GAO; to assess the potential need within the legislative branch to create a separate entity charged with the mission of providing nonpartisan advice on issues of science and technology, such as the former Office of Technology Assessment; and to address whether the creation of a separate legislative branch entity would duplicate services already available to Members of Congress. In evaluating Congress's need for additional S&T advice, the NAPA study found that \"The range, speed, and impact of technical developments suggest a greater congressional need for internal expertise on S&T related issues,\" but that \"nearly every indictor of congressional capacity is moving the wrong way.\" The report identified three types of congressional clients that need such information: Members of Congress, personal office staff, and committee staff. Broadly, NAPA found that most Members are reliant on staff and legislative support agencies (e.g., CRS, GAO) for science and technology policy support, but that the number of committee and personal office staff available for S&T policy work has decreased. NAPA also noted reductions in the number of CRS and GAO staff over 35 years. The report noted that Members typically do not have professional backgrounds in science and technology and states that Members \"often do not have the subject matter expertise to understand fast-moving, complex S&T issues.\" Therefore, Members without S&T backgrounds, \"rely on expert advisors like personal and committee staff and on legislative branch support agencies like the CRS and the GAO to help them understand technical policy issues.\" The report also cites a 2016 survey of senior congressional staff by the Congressional Management Foundation that found that \"Senators and Representatives lack the time and resources they need to understand, consider, and deliberate public policy and legislation.\" NAPA found that committee staff are a critical source of policy expertise, but that the number of committee staff fell by 38% between 1981 and 2015, and by even more in some committees engaged in S&T policy matters. The report also noted the number of hearingsâwhich NAPA describes as an opportunity to \"build subject matter expertise\"âfell by 63% between the 96 th Congress and 114 th Congress. NAPA found that congressional offices are \"overwhelmed by constituent communication\" due to growth in digital communications and increases in population, and noted a finding by the Congressional Management Foundation that \"Congressional offices are devoting more resources to managing the growing volume of constituent communications.\" NAPA asserts that this trend, combined with fixed budgets, means that fewer staff are available for policy work. In its report, NAPA concluded that \"as the Nation experiences accelerated S&T developments, certain indicators of Congress' ability to absorb, understand, analyze, and deal with the developments have declined.\" The report posited three options that it considered to address the gaps it had identified: Option 1. Enhance Existing Entities Enhance the capabilities of existing Legislative Branch support agencies, including GAO and CRS, including potential changes to current models; Option 2. Create a New Agency Create a separate agency to fill any existing gaps, with attention given to avoiding duplication of effort; and Option 3. Enhance Existing Entities and Create an Advisory Office Both enhance existing entities and create an S&T advisory office, led by a Congressional S&T Advisor, which focuses on strengthening the capacity of Congress to absorb and utilize science and technology policy information provided by GAO, CRS, and other sources. The NAPA report recommended option 3 with the following elements: GAO should further develop the capability of its Science, Technology Assessment, and Analytics mission team to meet some of the supply gaps identified in the NAPA report, including the need for technology assessments, and make appropriate changes in its organization and operating policies to accommodate the distinctive features of technology assessments and other foresight products. CRS should enhance and expand its quick-turnaround and consultative services in S&T-related policy issues. Congress should create an Office of the Congressional S&T Advisor (OCSTA), which would focus on efforts to build the absorptive capacity of Congress, to include supporting the recruitment and hiring of S&T advisors for House and Senate committees with major S&T oversight responsibilities. OCSTA would also be responsible for horizon scanning. Congress should create a Coordinating Council to be led by the Advisor and that includes representatives from CRS and GAO's STAA, and a National Academies ex officio member with the objective to limit duplication and coordinate available resources to most benefit the Congress. In its report, NAPA differentiates between technology assessments and \"horizon scans.\" NAPA states that horizon scans are reports 20-60 pages in length that seek to identify S&T issues that might arise in the future, including broad developments and important innovations, as well as estimating the timeframes for such developments. NAPA asserts that such information would allow Congress to know whether it is positioned to be successful in responding to such issues in terms of its structure, activities, and agenda. NAPA also states that horizon scanning can serve as an effective early warning system. While the NAPA report asserts that \"no agency expressly claims responsibility for preparing horizon scanning reports as distinct products for Congress,\" it later offers several examples of horizon scanning efforts undertaken by GAO and argues that these efforts \"provide a foundation to further expand capacity in this area.\" Following release of the report, NAPA panel members stated that it did not evaluate the need for reestablishing the Office of Technology Assessment. In this regard, NAPA asserted that it believed Congress had made clear its intent over the last two decades for technology assessment to be a mission of GAO. In testimony, panel member Michael McCord asserted that the inability of Congress to reach a consensus about reestablishing OTA for more than two decades shaped the panel's perspective on considering the option. He further asserted that the absence of a consensus in this regard could undermine a reestablished OTA's ability to fulfill the mission its advocates seek. In response to a Member's question as to why the NAPA report did not recommend reinstating OTA or something similar, McCord responded We did not recommend [reestablishing OTA]. [However,] it would be, I think, incorrect to say that [NAPA] would think it's a terrible idea if Congress did that. But you can't help but notice that for 25 years Congress has chosen not to do that. So the question whether the support is there to go that route and sustain it, that's a serious question for us, the viability of doing something that you consistently have chosen not to doâ¦. You could go that route eventually. In addition to NAPA, other organizations have produced reports on the value of reestablishing OTA and the broader question of the adequacy of S&T advice to Congress. In 2018, the R Street Institute (R Street), a nonprofit, nonpartisan, public policy research organization, proposed reestablishment of OTA in its report Bring i n the Nerds: Reviving the Office of Technology Assessmen t . The report identifies and addresses a number of rationales that have been put forth by others as to why OTA should not be reestablished, including cost, political loss of face, perception by some of an ideological bias in OTA's work, providing a foundation for encouraging additional government intervention, and adding another governmental expert bureaucracy. The report concludes that \"Congress can most easily bolster its technology policy knowledge by reviving the OTA.\" In September 2019, the Belfer Center for Science and International Affairs of Harvard's Kennedy School published a report, Building a 21 st Century Congress: Improving Congress's Science and Technology Expertise , focused on providing an overview of Congress's S&T-relevant needs and resources identifying potential actions to address what it perceives as gaps in meeting Congress's needs. The Belfer Center report asserted that \"Congress is one of the most advised bodies in the world.\" In this regard, Belfer identifies internal resources available to Membersâincluding GAO, CRS, and personal and committee staffâas well as external resources, such as executive branch agencies, think tanks, universities, civil society and nonprofit organizations, lobbyists, industry associations, and the National Academies. Yet, even though Congress is provided with such advice and resources, Belfer asserted that significant gaps remain that hinder Congress's ability to produce timely, thoughtful, and comprehensive legislation on S&T issues. This results in a multitude of negative and many times public outcomes, such as ineffective or absent S&T legislation. The report concluded that \"the core of the problem is a divide between what Congress can absorb and what information it receives.\" This finding is similar to that asserted by NAPA in its October 2019 report, Science and Technology Policy Assessment: A Congressionally Directed Review , on the need for improving the \"absorptive capacity of Congress\" (discussed in the previous section). To address these gaps, the Belfer Center report proposed four actions: (1) Congress should create a legislative support body focused on S&T issues; (2) Congress should hire additional S&T talent in personal offices and committees; (3) Congress should provide committee and support agencies with increased funding to allow them to hire additional staff and pay a more competitive salary; and (4) external information providers should produce information in formats that are useful to Congress, generally products that are short, concise, customized for the audience, consistently offered, and timely. An earlier report by the Belfer Center describes a \"widening gap between responsive lawmaking in Congress and the deepening complexity of advancements in science and technology\" and that \"certain weakened capabilities have atrophied the organization's absorptive capacity , or the ways by which it recognizes the value of, assimilates, and makes use of knowledge outside of itself.\" The report called for the establishment of a Congressional Futures Office that it describes as \"a new and deeply embedded internal support body\" that would gradually strengthen its \"capabilities through open-ended product-service design and dispersed global networks of expertise.\" A 2019 report, Evaluating the 2019 NAPA Report on S&T Policy Assessment and Resources for Congress , by the Lincoln Network and Demand Progress lauded the NAPA report for recognizing that Congress's S&T capacity gap is broader than just technology assessment and recognizing Congress's need for a mechanism to increase what NAPA referred to as Congress's absorptive capacity. The report agreed with NAPA with respect to its praise of GAO's outreach and transparency in its technology assessments activities. However, the report questioned \"whether GAO's culture will be able to adapt to effectively cover the full range of OTA's work (particularly that part concerning non-technical values and horizon scanning).\" In addition, the Lincoln Network and Demand Progress report was critical of the absence of details on key features of NAPA's recommendation for an Office of the Congressional S&T Advisor (OCSTA). In particular, the report questioned how OCSTA would pick topics; how it would integrate new resources into committees; how it would engage in horizon scanning; issues related to OCSTA's oversight, statutory powers, and mechanism for coordinating with other legislative support agencies; and whether OCSTA is the right organization for the horizon scanning function. The Lincoln Network and Demand Progress also recommended additional analysis on reviving and modernizing OTA, and on evaluating political considerations related to the feasibility of building congressional S&T capacity and the viability of maintaining it. Further, the report noted that NAPA recommended \"beefing up CRS in several areas,\" but noted that NAPA did \"not assess CRS's current capacity for S&T work versus the volume and type of congressional demands.\" The report cited assertions by one former CRS employee that CRS is risk-averse and increasingly politicized, leading to a loss of talent, and by another former CRS employee who asserted that CRS has moved from a policy of nonpartisan advice to one of neutrality which, in his view, has undermined CRS's analytical capabilities. The report recommended additional analysis of any CRS institutional challenges prior to making significant new investments in CRS. Since 1995, several Members of Congress have undertaken numerous legislative efforts to restore funding for OTA or to affirm the need for an OTA-like technology assessment function. Appendix C , \"OTA/Technology Assessment-Related Legislation in the 107 th -116 th Congresses,\" describes each of these efforts. Options for Congress, if it chooses to reestablish an organizational capability with statutory authorization for conducting technology assessments, include reestablishing OTA without any changes to its statute, reestablishing OTA with changes to its statute, charging an existing legislative branch agency with new or expanded technology assessment authority and duties, or seeking technology assessments on a contractual basis from a nongovernmental organization such as the National Academies of Science, Engineering, and Medicine (National Academies). Alternatively, Congress could choose to rely on existing sources of scientific and technological analysis and technology assessment. Such sources include, but are not limited to, CRS, GAO federal executive branch agencies, federally chartered advisory committees, federally funded research and development centers, the National Academies, academic researchers, industry and trade associations, professional organizations, businesses, not-for-profit organizations, advocacy groups, think tanks, and labor organizations. This section analyzes these options and their purported advantages and disadvantages. Though OTA was defunded, its statutory authorities remain law. If Congress opts to reestablish OTA without changes to its statutory authority, it may be able to do so solely by appropriating funds to the agency. However, given past report language about closure and abolition, Congress might choose to provide an explicit statement of its intent to reestablish OTA and/or guidance on its reestablishment. Since 1995, some Members of Congress have undertaken a variety of legislative efforts seeking to reestablish OTA by authorizing or appropriating funding for OTA or to express a \"sense of the House\" or a \"sense of the Senate\" that OTA should be reestablished. Most recently, in the 116 th Congress, the House approved appropriations of $6 million for OTA in the Legislative Branch Appropriations Act, 2020 ( H.R. 2779 ); these funds were not included in the final legislative branch appropriations act for FY2020 ( P.L. 116-94 ). While OTA's statutory authorities remain in law, the appropriations act in which it was defunded referred to the \"orderly closure\" of OTA and the \"abolition of the Office of Technology Assessment,\" and provided for the disposition of \"all records and property of the Office (including the Unix system, all computer hardware and software, all library collections and research materials, and all photocopying equipment)\" If Congress intends to rely on the existing statute to reestablish OTA, then in addition to providing funds for its establishment and operations it might wish to reaffirm that it intends for the office to operate in accordance with the statute as it existed prior to the enactment of P.L. 104-53 . Also, because OTA and certain entities currently exist only in statute, the organization would need to be reestablished as provided for in the statute. For example, Congress would face the need to reestablish and appoint members of the TAB. The TAB would need to appoint an OTA Director. The OTA Director would need to hire OTA analysts and support staff, and possibly contract for additional analytical work. In addition, the newly formed organization would need to obtain office space, acquire assets such as furniture and equipment, and secure information and communications services, among other things. A chief advantage of this approach is simplicity, as it would simply require an appropriation and possibly a statement of Congress' intent to restart the agency and guidance regarding aspects of the restarting of the agency. Another potential advantage of this approach is that it might make the agency operational more quickly by avoiding lengthy and possibly contentious debate regarding new or revised authorities or other topics. Disadvantages of this approach include reliance on the original design of OTA, including its structure, management, and performance, without taking efforts to address past and contemporary analyses and criticisms of the agency. An OTA reestablished without addressing these critiques might be subject to criticism from congressional and external skeptics about the need for such an agency and its ability to effectively fulfill its statutory duties. Fiscal constraints may also continue to be a concern to some Members of Congress. Reestablishing OTA at a size comparable to the time of its defunding would require annual appropriations of tens of millions of dollars; OTA funding in FY1995 was $33.4 million in FY2018 dollars. OTA could be established over time with initial funding provided for office space, equipment, management, operational costs, and a small staff of analysts. Congress could gradually provide additional resources to grow the agency's analytical capabilities (e.g., additional analysts, management, contractors) as necessary to meet congressional demand for technology assessment products. For example, Congress defunded the Administrative Conference of the United States (ACUS), like OTA, in 1995. ACUS was reestablished in 2009 through an appropriation of $1.5 million. In FY2019, Congress appropriated $3.1 million for ACUS. Congress could provide funding for the reestablishment of OTA through several mechanisms, for example by allocating additional budget authority to Legislative Branch Appropriations that could be appropriated to OTA or by reallocating funding in the budget and appropriations process from one or more executive branch or legislative branch agency to OTA. A second option for Congress is to reestablish OTA by providing funding while also reauthorizing the agency with amendments to its organic statute to address past or contemporary criticisms (\" Observations on OTA's Design and Operations \"). In such an undertaking, Congress might consider statutory changes that address past criticisms of OTA by helping to ensure that, for example OTA provides a unique function, differentiated from similar functions performed by other agencies; OTA delivers information, analysis, and options in a timely manner, consistent with the pace of legislative decisionmaking; OTA's technology assessments are relevant to the development and consideration of legislation; OTA's technology assessments are authoritative, thorough, and of high quality; the agency's composition of career civil servants, temporary staff, and contractors aligns with the needs of OTA over the short term and longer term; the public has appropriate opportunity for input; and OTA selects topics and conducts technology assessments in an objective manner, free from potential ideological, political, or other bias. Congress may wish to consider the merits of changes in the following areas: The definition of technology assessment. A topic of intense discussion and debate in the period prior to OTA's establishment, the definition of technology assessmentâin general and specifically with regard to advice for policymakersâremains a topic of discussion today. Congress might take into consideration past and current dialogue and analysis on this topic and whether there is a need to clarify the definition of the term in the context of the work to be performed by OTA. Appendix A provides a sampling of historical congressional and public discussion of the meaning of technology assessment. I nternal organization al structure . A number of the criticisms of OTA were, in part, related to structural issues. For example, as mentioned earlier, some have criticized OTA's focus on meeting the objectives of the TAB as greatly narrowing the agency's constituency. Others have noted that long-term, one-party control of both houses of Congress, regardless of which party is in control, can result in members of the minority party feeling that OTA's work favors the party in power. Congress may wish to consider structural changes that provide for broader input from outside the TAB or mechanisms for bipartisan approval of decisions on reports to be undertaken. Also, the current statute provides for a Director to be appointed by the TAB, and a Deputy Director to be appointed by the Director with TAB approval. Congress may wish to consider whether the positions, appointment processes, and powers of each are appropriate and adequate for accomplishing the mission of OTA. OTA conducted technology assessments on a wide range of topics, making it cost prohibitive to have permanent staff with deep expertise on each topic. OTA met its needs for specialized expertise for particular assessments through the use of contractors with specialized expertise. ( Figure 3 provides a quantitative window into the balance of staff effort and contractor effort at OTA for FY1992-FY1995.) Congress might opt to provide additional guidance to OTA on the composition of the agency's staff (full-time and part-time), the use of contractors (individuals and organizations), and approaches to managing the conduct of technology assessments. External structure . The current statute establishes the TAB, composed of equal numbers of House and Senate members from each party, to formulate and promulgate OTA policies. Congress may wish to consider whether the TAB is the best approach for this function or whether it might be performed by existing committees or subcommittees of Congress, by House and Senate leadership, by agency management, or through another mechanism. The current statute also establishes a TAAC to provide OTA access to external scientific, technical, and management expertise. Congress might consider whether the TAAC was effective in this role, other roles the TAAC might play (e.g., in reviewing proposed technology assessments), and the potential use of other mechanisms to obtain external expertise. Public participation. Some have suggested that OTA lacked a strong public input mechanism and have asserted that modern information and communication technology could be used to facilitate a much broader range of public input than was possible in 1995. The Wilson Center's report, Reinventing Technology Assessment: A 21 st Century Model, suggested that a reestablished U.S. technology assessment agency employ an approach used by a number of parliamentary technology assessment agencies in Europe known as participatory technology assessment (pTA): Participatory technology assessment (pTA) enables laypeople, who are otherwise minimally represented in the politics of science and technology, to develop and express informed judgments concerning complex topics. In the process, pTA deepens the social and ethical analysis of technology, complementing the expert-analytic and stakeholder-advised approaches to [technology assessment] used by the former OTA. Initiation of technology assessments . The current statute authorizes the following officials and organizations to initiate a technology assessment: the chair of any standing, special, or select committee of either chamber of Congress, or of any joint committee of the Congress, acting on their own behalf or at the request of either the ranking minority member or a majority of the committee members; the TAB; or the Director, in consultation with the TAB. Congress might opt to expand this list to include any Member of Congress or at the request of a certain number of Members of Congress; reduce the list to include only some or one of those currently authorized; or to authorize the OTA Director to initiate assessments without any additional approval. Congress might also provide guidance to the OTA Director on prioritization of requests for technology assessment. Administrative provisions. The statute currently provides a variety of administrative authorities in areas such as personnel; contracting; real and personal property acquisition; recordkeeping; cooperation with executive and legislative branch agencies; and a proscription on operating laboratories, pilot plants, and test facilities. Congress may wish to review the existing authorities with respect to possible modifications, eliminations, or additions to these provisions. Potential advantages of this approach include the opportunity to address previously identified OTA issues, to improve agency performance, and to address concerns during debate on reestablishment. One disadvantage to this approach may be an inability to achieve a consensus on how the OTA statute should be revised, reducing the likelihood of the agency's reestablishment. For those who see an immediate need for OTA-type analyses, a second disadvantage is that the agency's reestablishment could be delayed by hearings or studies on proposed changes, as well as consideration of amendments that might be offered to the revisions. At the time OTA was defunded, some Members of Congress anticipated that one or more government agencies might expand their capabilities to meet Congress's need for technology assessments. This section describes options for establishing technology assessment functions within two legislative agencies, GAO and CRS. In FY2002, at the direction of Congress, GAO began developing a technology assessment capability, publishing reports intended to \"explain the consequences that certain technology will have on the federal governmentâand on society as a whole.\" Congress might leverage or authorize these efforts. One advantage of this approach is that it would build on an existing capability within the legislative branch. At Congress's direction, GAO has produced technology assessments since 2002 and has recently established a new STAA team with a growing staff of science and technology experts. Another advantage would be GAO's reputation for high quality analytical work. One potential disadvantage is that, unlike the singular focus of OTA on technology assessment, this would be only one of several functions of GAO. A Washington Post editorial in 2018 noted that GAO has an institutional culture centered on audits and investigations, and asserted that it lacks \"a larger permanent staff of subject experts with whom legislators can build relationships, as well as the independence to better compete for resources.\" An analysis of technology assessment options for Congress written by the American Action Forum, a not-for-profit organization, identified other potential weaknesses. The analysis asserted that GAO reports do not feature many policy options, unlike OTA reports; GAO lacks the in-house expertise OTA had, limiting its ability to counsel Members of Congress; and GAO's consultancy servicesâ\"arguably the most important part of any technology assessment program, given the fast pace of technology policy\"âneed reform. The analysis suggested, however, that GAO could potentially address these shortcomings with additional congressional direction and resources. The Congressional Research Service, a service unit of the Library of Congress, provides comprehensive research and analysis on all legislative and oversight issues of interest to Congress. CRS has a staff of about 600, including approximately 320 analysts and attorneys and 100 information professionals. CRS has expertise in a variety of policy fields, including many fields of science, engineering, and technology as well as S&T policy. Much of CRS's work is provided in the form of consultancy in response to inquiries from Members of Congress, their personal staff, and congressional committee staff. Most of the analytical work of CRS experts is short-term in natureâmeasured in hours, days, or weeksâand conducted to meet specific requests of staff working on legislative or oversight issues. Some of CRS's longer and more analytically complex reports may take several months to produce. In contrast, OTA reports generally took 18 months or longer to produce. CRS does not have a statutory mission to perform technology assessments, nor has CRS otherwise received direction from Congress to conduct technology assessments. CRS has a statutory mission to prepare and provide information, research, and reference materials and services to Congressâto include House and Senate committees, joint committees of Congress, and Members of the Senate and House of Representatives. CRS serves Congress and not the public. At the time Congress defunded OTA, some Members of Congress, including those on the House Appropriations Committee, anticipated that the Congressional Research Service might undertake some of the work performed by OTA. In 1999, CRS reorganized its operational structure and embedded science and technology analysts in CRS units in which science and technology issues were an important part of broader issue areas (e.g., energy, environment, health, defense). A smaller cadre of analysts in a discrete science and technology unit focused primarily on science and technology policy issues writ-large (e.g., policies associated with research and development funding and activities, technology transfer, innovation). Some have asserted that this change diminished CRS's ability to fill the gap left by OTA's closure. In his book, Congress's Own Think Tank , Peter Blair asserted that The unintended result was a significant dilution of CRS's capability to cover science and technology policy issues. It was never realistic to presume that CRS was in a position to fill the void left by OTA's closure. Alternatively, CRS management and some policy analysts believed that the reorganization improved CRS's ability to provide more comprehensive analysis to Congress. Potential advantages of using CRS to conduct technology assessments might include CRS's reputation for providing Congress with authoritative, confidential, objective, timely, and nonpartisan analysis in support of congressional legislative and oversight activities, as well as CRS's current cadre of experts in science, engineering, technology, and S&T policy. Disadvantages include CRS's lack of experience and expertise in conducting in-depth technology assessments of the type historically performed by OTA. While CRS could potentially acquire such experience and expertise, this approach would require a departure from CRS's current work and organizational culture. It might also require additional financial resources, expanded facilities, the hiring of additional management and staff, and potentially the establishment of a new organizational unit within CRS devoted to technology assessment. While current staff with science, engineering, and technology expertise could contribute to the establishment of such a unit within CRS, that might detract from their ability to provide the analyses and services the agency currently provides to Congress. Since its founding under a congressional charter in 1863, the National Academies have been an authoritative source of high-quality expertise on science, engineering, and health matters for Congress and the nation. The National Academies produces analyses in seven major program areas: Behavioral and Social Sciences and Education, Earth and Life Studies, Engineering and Physical Sciences, Gulf Research, Health and Medicine, Policy and Global Affairs, and Transportation Research. Members of each component of the National Academiesâthe National Academy of Sciences, National Academy of Engineering, and National Academy of Medicineâelect new members based on outstanding and continuing achievements in their fields. Academy members, together with other experts, serve pro bono on committees conducting National Academies studies and reports: Each year more than 6,000 of the world's foremost scientists, engineers, and health professionals volunteer their time to address some of society's toughest challenges by serving on the hundreds of study committees that are convened to answer specific sets of questions. Our peer-reviewed reports present the evidence-based consensus of these committees of experts. At the time of OTA's defunding, some policymakers and analysts postulated that the National Academies (as well as other nongovernmental organizations such as universities) might undertake technology assessments. Representative Jack Kingston, chairman of the Subcommittee on Legislative Branch Appropriations, reiterated this perspective in House floor debate on FY2005 legislative branch appropriations: In 1995 on a bipartisan level, we eliminated [OTA], and the belief at that time was that there were other committees that we could turn to to get technology studies and technology assessment. Some of these, for example, are the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council. All of them have hundreds of people who are technically educated. However, according to author Peter Blair, while the National Academies saw a short-term increase in congressional requests for reports following the closure of OTA, demand returned to its previous levels shortly thereafter: The increased use of the [National Academies], however, was short-lived, lasting only one yearâthe number of congressionally mandated or requested [National Academies] reports doubled in the 105 th Congress (1997-1998) to 59, up from the historical average of about 22 studies (e.g., in the 104 th Congress [1995-1996] as OTA was closing down), but interestingly then dropped back to the historical average by the 107 th Congress (2001-2002). It is unclear why the number of requests for National Academies fell after the initial increase. Among the possibilities: a decrease in demand for science and technology information and advice; a perception that such reports were not meeting Congress's needs in terms of factors such as relevance, timeliness, or actionability; and increased fiscal constraints. The National Academies study process is highly structured, methodical, and deliberate. The process includes four major stages: defining the study; committee selection and approval; committee meetings, information gathering, deliberations, and drafting of the report; and report review. This process includes checks and balances \"at every step in the study process to protect the integrity of the reports and to maintain public confidence in them.\" Accordingly, some assert that the National Academies is not structured to respond to congressional needs in a timeframe consistent with the pace of legislative decisionmakingâa criticism also made of OTA. In 2006, Peter Blair, in his capacity as executive director of the National Academy of Sciences' Division of Engineering and Physical Sciences, testified at a House Science Committee hearing on scientific and technical advice for Congress. In his written statement, Blair cited timeliness and cost as factors that could impede the National Academies' utility to legislative decisionmakers. With respect to timeliness, Blair stated that the average time for completion of a National Research Council (NRC) study was 18 months, but that it can take longer. He attributed this lengthiness to the study process (described above), coordination of the schedules of busy study committee members, and the time required for peer review, editing, production, and release. Blair noted further that, before a study can even begin, each congressionally mandated National Academies study must be defined and funded under negotiated contracts with federal agency sponsors: [It] often takes six to nine months [to move] through a government procurement process to initiate an NRC study even after a mandated study has been enacted in law (or included in report language). For those studies mandated by Congress, an additional delay often results from the time needed to enact the relevant legislation. With respect to cost, Blair noted a widely held perception that the cost of National Academies studies was high, attributing this in part to the negotiation of separate contracts \"for each study, unlike the central funding for agency advisory committees.\" Further, Blair noted that it is difficult for an organization to serve many different types of needs: Like any process designed to serve many needs, the NRC study process is not perfectly tuned to serve all government needs. For example, our process is less well equipped, currently, to go beyond technical analysis, to gauge the broader policy implications of alternative actions, especially those implications that may involve fundamental value judgments or tradeoffs for which it may be difficult or impossible to achieve consensus. To address some of these perceived shortcomings, Blair suggested the potential utility of establishing a sub-unit of the National Academies that would employ \"a study process specifically adapted to congressional needs, adopting more of an OTA-like study model with base support and contracting capability as well as a task-order like funding mechanism.\" Potential advantages of using the National Academies to perform technology assessments include the organization's long-standing credibility and strong reputation for technical expertise and authoritative, objective, high-quality scientific and technical analysis; its congressional charter to help inform public policymakers on matters of science and technology; and its members' depth and breadth of knowledge across the spectrum of science and engineering disciplines. As discussed above, potential disadvantages of relying on the National Academies to provide technology assessments to Congress include concerns about its cost, timeliness, and ability to assess and advise on implications involving non-scientific, non-technical value judgements and trade-offs. Ultimately, the National Academies serves Congress as a private, nonprofit corporation negotiating a contract with the governmentâwith all the advantages and disadvantages that process involvesâand does not serve as a part of the legislative branch. While some identify a need for an organization to produce the types of technology assessments previously produced by OTA, others assert that Congress already has access to all of the scientific and technical advice it needs. Still others assert that the issue is not a lack of S&T information, but rather whether Congress uses existing sources effectively when making policy decisions. Congress may obtain scientific and technical analysis (and, in some cases, advice and recommendations) from a wide array of entities, including federal executive branch agencies, GAO, CRS, federally chartered advisory committees, federally funded research and development centers, the National Academies, academic researchers, industry and trade associations, professional organizations, businesses, not-for-profit organizations, advocacy groups, think tanks, labor organizations, and others. The types of information and analysis these organizations provide, and their authoritativeness, objectivity, independence, timeliness, and cost, vary widely. A key advantage of relying on existing agencies is that the infrastructure, people, and processes are currently in place, reducing the time and logistical complexities (e.g., hiring, acquiring space, establishing processes and procedures) associated with establishing new organization. In addition, relying on existing organizations may also reduce legislative hurdles associated with establishing a new organization. The primary disadvantage of this approach, according to some, is that the information some of these entities currently provide to Congress may lack authoritativeness, objectivity, or independence. A key factor in the creation of OTA in 1972 was a perceived need for Congress to have its own, independent source of scientific and technical expertise, capable of providing in-depth technology assessments, provided by an institution responsive to the needs and timing of the legislative process. Some of the entities identified above, and the analysis they perform, may not embody all these characteristics. Congress uses information and analysis about science and technology and its implications to inform its deliberations and decisions that affect the U.S. economy, national security, quality of life, standard of living, public health and well-being, and other matters of national policy. A wide range of organizations provide science and technology information and analysis directly and indirectly to Congress. Some of these organizations are public, some private, and some quasi-governmental. Among the public organizations, some are part of the executive branch and others are in the legislative branch (i.e., CBO, CRS, and GAO). Some in Congress believe that there is a need to re-create OTA or an OTA-like organization, or to assign OTA-like responsibilities to an existing organization to meet Congress's unique information needs and produce analysis not currently being provided by existing organizations; others disagree. Some believe that a new organization should be established to handle some or all of the science and technology information and analysis services OTA was authorized to provide. Duplication of capabilities has been a concern expressed by some within Congress and external observers during debate about the establishment of OTA, during debate about the defunding of OTA, and during subsequent debate and discussions about reestablishing OTA or OTA-like capabilities. Most parties agree on the need to prevent the creation of duplicative organizations or functions, and to eliminate (or at least minimize) duplicative organizations, duplicative functions within organizations, and duplicative work, along with the costs associated with them. To avoid duplication and meet its information and analysis needs, Congress may wish to further the process of identifying the science and technology analysis it needs to support its deliberative processes and decisions; determining which federally funded organizations (e.g., federal agencies, quasi-public, and other nonprofit organizations) are currently charged with addressing the identified needs and how effectively the organizations address these needs; identifying areas of overlap or duplication of authorities and activities of the organizations and their components; identifying areas of need that are not being addressed by these organizations; and determining whether such needs can best be met by an existing organization or organizations; whether the identified needs merit the creation of a new organization, organizations, or the extension of the capabilities of an existing organization; or whether the costs of obtaining additional science and technology information and analysis outweighs the need. Appendix A. An Historical Overview of the Definition of Technology Assessment The definition of the term technology assessment has a long history of discussion and debate. Much of this discussion occurred in the late 1960s and early 1970s during the efforts that ultimately led to the establishment of the Office of Technology Assessment in 1972. This appendix offers a variety of perspectives on the meaning of technology assessment in the context of public policy. In the House of Representatives, the Committee on Science and Astronautics' Subcommittee on Science, Research, and Development played a leading role in the exploration of technology assessment to assist policymakers. In 1969, Representative Emilio Q. Daddario, chairman of the subcommittee, stated that technology assessment was identified as a major activity of the subcommittee in 1965. In 1967, Representative Daddario introduced H.R. 6698 (90 th Congress) to establish a Technology Assessment Board for the purpose of identifying the potentials of applied research and technology and promoting ways and means to accomplish their transfer into practical use, and identifying the undesirable by-products and side-effects of such applied research and technology in advance of their crystallization and informing the public of their potential in order that appropriate steps may be taken to eliminate or minimize them. That same year, Representative Daddario put forth in a written statement, published as a committee print, the following definition of technology assessment: Technology Assessment is a form of policy research which provides a balanced appraisal to the policymaker. Ideally, it is a system to ask the right questions and obtain correct and timely answers. It identifies policy issues, assesses the impact of alternative courses of action and presents findings. It is a method of analysis that systematically appraises the nature, significance, status, and merit of a technological program. The method may well vary from case to caseâ¦. Technology Assessment is designed to uncover three types of consequencesâdesirable, undesirable, and uncertain. The benefits that accrue from technology are naturally the driving force for its application. Economic growth is fostered by more convenient and efficient services or by new and less expensive goods. Society benefits when technology is developed around some value or goal, consistent with democracy. Undesirable consequences, sometimes played down by calling them harmful side effects, can be expected with most innovations. Technology means changeâchange to the natural environment, change in personal habits and behavior, change in social and economic patterns, and not infrequently, change in the legal and political processes. While many of these changes are beneficial, many are disruptive and dislocative. They change situations more rapidly than the pace at which individuals can adjust. The well-known cultural lag finds its logical beginnings in the phenomena. Assessment of the risks is a necessary concomitant to assessment of the benefits. Uncertain consequences are the third type to be identified and assessed. Available information may point out early that an effect will occur and can give no idea of the degree of impact. When the severity of impact is not known further research is often warrantedâ¦. In general, experimentation and pilot projects are required to determine what proscriptions might be necessary before the technology is able to successfully diffuse through society. If assessment is a method of policy research that identifies the amount and type of change for alternative course of action and provides a balanced appraisal of each alternative, then what is the scope of technology assessment? What will it try to measure? What timeframe will it consider? What yardsticks will be used? How does assessment differ from other methods of analysis? Answers to these questions will more concisely define Technology Assessment and more closely show its relationship to the policymaking process. Technology Assessment for the Congress will deal for the most part with applications in the United States. It is worth noting though, that the entire world, and even outer space, is the system with which we are concernedâ¦. The international aspects of Technology Assessment will become more important as the power and ubiquity of man-made forces continue to increaseâ¦. To assess technology one has to establish cause and effect relationships from the action or project source to the locale of consequences. A direct or immediate effect is easy to spot and assess. The direct effects, in turn, will cause other consequencesâindirect or derivative effects. As the scope of assessment moves outward in time the derivative effects become the result of many causes and not of one specific technological changeâ¦. The function of technology assessment is to identify all of these [impacts and trends]âboth short-term and long range. The emphasis though will be on the short-term impacts that can be measured by natural science parameters. That is, the focus of Technology Assessment will be on those consequences that can be predicted with a useful degree of probability. Possible changes in values, attitudes, or motivations are important but not easily predicted. These changes are usually long term and fall beyond the primary focus of Technology Assessment. Therefore, because of their slow evolution, present human values and political motivations will serve as the frame of reference for purposes of measurement and appraisal. Assessment is a form of policy research and is not technological forecasting or program planning. It is a balanced analysis of how a technological program could proceed with the benefits and risks of each policy alternative carefully described. It incorporates prediction and planning, but only to expose the potential consequences of the program. Assessment is an aid to, and not a substitute for, judgment. Technology Assessment provides the decision maker with a list of future courses of action backed up by systematic analysis of the consequences. In this sense it is an analytical study that could be prepared by anyone. Its utility would be enhanced if it was undertaken for a particular policymaking group that could sketch in the nature of the problem for the study team beforehand. In a broader sense, assessment is part of the legislative process. Our subcommittee will gather and assess information before we can make any judgments. Part of this information will be actual assessment studies prepared for the subcommittee by scientific community and the Science Policy Research Division [of the Legislative Research Service, later renamed the Congressional Research Service]. When viewed as either a method of research or a part of the legislative process, Technology Assessment serves to provide information tailored to the constraints and needs of the policymaking process. Shortly after assuming office in 1969, President Richard Nixon established the National Goals Research Staff, \"a small, highly technical staff, made up of experts in the collection, correlation and processing of data relating to social needs, and in the projection of social trends.\" The announcement of its formation offers a perspective on the Nixon Administration's view of the importance and role of technology assessment: We can no longer afford to approach the long-term future haphazardly. As the pace of change accelerates, the processes of change become more complex. Yet at the same time, an extraordinary array of tools and techniques has been developed by which it becomes increasingly possible to project future trendsâand thus to make the kind of informed choices which are necessary if we are to establish mastery over the process of change. The functions of the National Goals Research Staff will include forecasting future developments, and assessing the long-range consequences of present social trends; measuring the probable future impacts of alternative courses of action, including measuring the degree to which changes in one area would likely affect another; estimating the actual range of social choiceâthat is, what alternative sets of goals might be attainable, in light of the availability of resources and possible rates of progress; developing and monitoring social indicators that can reflect the present and future quality of American life, and the direction and rate of its change; and summarizing, integrating, and correlating the results of related research activities being carried on within the various Federal agencies, and by State and local governments and private organizations. The National Goals Research Staff was directed to produce a report by July 4, 1970, \"to help illuminate a possible range of national goals for [the U.S. Bicentennial].\" In July 1970, the organization released its first (and only) report, Towards Balanced Growth: Quantity with Quality , describing technology assessment: Advanced technology of all sorts produces unexpected and often unwanted indirect consequences. A movement called \"technology assessment\" now advocates a more pervasive and systematic assessment of the social costs and benefits of both new and existing technology. The main issues are: To what extent should the use of new and old technology be restricted because of adverse side effects? What institutional mechanisms might assess and regulate technology? What effect would such a policy have on economic growth and on the size and nature of our technological and scientific establishments?â¦ In short, what is meant by technology assessment is nothing more than a systematic planning or forecasting process that delineates options and costs, encompassing economic, environmental, and social considerations (both external and internal) and with special focus on technology-related \"bad,\" as well as \"good,\" effects. In moving toward the establishment of the Office of Technology Assessment, Congress sought and received input from a number of sources about technology assessment in the context of public policy. At the request of the House Committee on Science and Astronautics, reports on technology assessment were delivered by the National Academy of Sciences (NAS) and the National Academy of Engineering (NAE) in 1969, and the National Academy of Public Administration (NAPA) in 1970. The National Academy of Sciences' report, Technology: Processes of Assessment and Choice , emphasizes the absence of a unitary concept of technology assessment and emphasizes that different views vary with the interests and perspectives of the proponent: The choice â¦ is between technological advance that proceeds without adequate consideration of its consequences and technological change that is influenced by a deeper concern for the interaction between man's tools and the human environment in which they do their work. For those who hold this more balanced view, the expression \"technology assessment\" may acceptably describe what occurs when the likely consequences of a technological development are explored and evaluated. Their objective is to improve the quality of such efforts at exploration and evaluation of our technological order. But the concept of improved technology assessment is by no means a unitary one; it suggests different things to different people. The contents and focus of the notion vary with the vital interests and perspectives of its many proponents. To some, concerned primarily with the preservation and enhancement of environmental quality , technology assessment suggests evaluation of technical changes or applications from the perspective of their likely impact on various environmental goals and resourcesâor the exploration of how particular environmental objectives might be affected, beneficially or adversely, by the growth and speed of various technologiesâ¦. To others, concerned with the measurement of social change as a step toward the achievement of broad national goals, technology assessment connotes the use of new tools to monitor the impacts on society of technical changes (among others) and to improve the quality of feedback from social effects to technological (and other) developmentsâ¦. Yet another group is concerned broadly with the need for greater foresight and planning to guide technological change with more timely and comprehensive balancing of total costs against total benefits. To this group, technology assessment means an attempt to project the likely growth and probable impacts of specific technologies.â¦ Another group, concerned with improving the allocation of public resources, views technology assessment as a means of identifying and measuring the possible uses of technologies generated by federally supported research and development activities. Of special concern to this group is the supposed transfer of space and defense technology and management techniques to the civilian sector, particularly for the solution of major social problems related to urbanization, such as housing, crime, transportation, and municipal services. And to still others, whose concerns lie with better program and policy evaluation and who do not restrict their attention to resource allocation, technology assessment represents one component of planning-programming-budgeting (PPB). Their emphasis is upon developing more precise definitions of program objectives as they related to national goals and priorities; more specific and unbiased criteria for assessing program potentiality and performance in cost-benefit terms; and more successful ways of modifying old programs or proposing new programs with the help of such analytic devices. The National Academy of Engineering's report, A Study of Technology Assessment , states that one of its underlying concerns entering the studyâa concern expressed by a number of technology assessment skepticsâwas that the outcome of such assessments would primarily be to impede technology commercialization. Nevertheless, the NAE report concluded that technology assessment could prove a useful tool for legislators: When the Committee on Public Engineering Policy first undertook its assignment to explore the concept of technology assessment, we were concerned about the concept's utility and practicality. Prior to our feasibility studies, we feltâperhaps as others may haveâthat results from such assessments might become primarily impediments to the uses of technology. We can now reflect on the collective experience of nearly 50 participants in this work, which is summarized in this report. First of all, we now feel that useful methodologies are available for technology assessment and that more adequate ones can be developed through practice. Second, our experiences show that task forces of experts specifically constituted for particular technology assessments can accumulate data and develop insight on the potential impacts of technology on society. Third, our preliminary work shows that such task forces can propose a variety of national strategies for modulating the effects of technology or society, thereby providing the legislator with a better base for his judgments on the role of government in influencing technology. The National Academy of Public Administration's report, A Technology Assessment System for the Executive Branch , noted that assessment at that time had only dealt with narrow first-order effects within the assessing agency's scope of interest, and only technical and economic second-order effects. The report advocates a wider, systemic, and more complex perspective approach to technology assessments: Simply stated, technology assessment is the evaluation of the impacts of new, developing, or established technologies, including, but not limited to, those which the Federal Government may support or regulateâ¦. Most assessments of the consequences of introducing a technology are incomplete, if not superficial. Commonly, they include few first-order consequences outside the assessing agency's program interests or statutory responsibility, and only technical and economic analyses of second-order consequences. Good assessments should consider the interactions of population, environment, technology, society, and the economy. The House Subcommittee on Science, Research, and Development also requested a report from the Legislative Reference Service (LRS, later the Congressional Research Service) of the Library of Congress, which was delivered in 1971. The report, Technical Information for Congress, included the following description of technology assessment: Before, during, and after the building of a technological system, it is necessary to identify and study the consequences of its operation. The objective is to improve the management of the total technological society, including the minimizing of consequences which are unintended, unanticipated, and unwanted. Assessment includes forecasting and prediction, retroactive evaluation, and current monitoring and analysis. Measurements involve non-economic, subjective values as well as direct, tangible quantifications. Above all, assessment requires that catastrophic consequences of each proposed new technology be foreseen and avoided before the new technology becomes entrenched in the socioeconomic complex of human organization. During this period, other organizations offered their views of technology assessment. In December 1971, The Futurist, a bi-monthly magazine with articles on technological, societal, and public policy trends, offered this definition: [Technology assessment is] a reasoned response to the stress that a rapidly changing and expanding technology puts on our complex and increasingly industrialized, urbanized, and densely populated society. It attempts to make the process of coping with technological development more systematic and rational. Technology assessment can be viewed as a mixture of early warning signals and visions of opportunity. Or as a device for protecting man from his own technological creativity. Or as a formal mechanism for allocating scientific resources, setting technological priorities, and seeking more benign alternatives for technologies already in use. Or as an attempt to control and direct emerging technologies so as to maximize the public benefits while minimizing public risks. In the act establishing OTA in 1972 (P.L. 92-484), Congress implicitly defined technology assessment in its findings and declaration of purpose for the agency: As technology continues to change and expand rapidly, its applications are large and growing in scale and increasingly extensive, pervasive, and critical in their impact, beneficial and adverse, on the natural and social environment. Therefore, it is essential that, to the fullest extent possible, the consequences of technological applications be anticipated, understood, and considered in determination of public policy on existing and emerging national problems.... [I]t is necessary for Congress to equip itself with new and effective means for securing competent, unbiased information concerning the physical, biological, economic, social, and political effects of such applications; and utilize this information, whenever appropriate, as one factor in the legislative assessment of matters pending before the Congress, particularly in those instances where the Federal Government may be called upon to consider support for, or management or regulation of, technological applications. In 1973, the Congressional Research Service, in response to a request from the House Subcommittee on Science, Research, and Development of the Committee on Science and Astronautics, prepared Science Policy: A Working Glossary . This glossary, published as a committee print, included the following definition for technology assessment: A generalized process for the generation of reliable, comprehensive information about the chain of technical, social, economic, environmental, and political consequences of the substantial use of a technology, to enable its effective social management by decisionmakers. Initially advanced as an instrument to provide advice to political decisionmakers, the concept has been increasingly accepted as a policy service within corporate management of private businesses. In one of its first reports, Requirements for Fulfilling a National Materials Policy , published in August 1974, the Office of Technology Assessment stated its mandate as being directed to provide early indication of the probable benefits and adverse impacts of technology and to develop other coordinate information which assists the Congress. Among other specific functions the OTA is charged with identifying impacts of technology, ascertaining cause and effect relationships, identifying alternate technological methods, identifying alternate programs, comparing the impacts of alternate programs, presenting analysis to appropriate legislative bodies, and identifying areas where additional research or data collection is required. In 1975, the American Bar Association's Section of Science and Technology held a program on \"Technology AssessmentâLegal and Policy Implications\" at the organization's annual meeting. In his opening statement, the chair of the section, Ronald A. May, relied on the definition of technology assessment used in a survey conducted on behalf of the National Science Foundation: Technology Assessment is \"the process of identifying actual or potential secondary effects of a technological development (or of a set of interrelated technological developments) on social, political, economic, and/or environmental values or institutions.\" In his remarks, May posed the question: What does technology assessment mean for lawyers? In response to this question, May noted that Ten times as many [technology assessments] that were studied in this survey were \"problem initiated\" as opposed to \"technology initiated.\" In other words, only one out of ten [technology assessments] had been done because somebody developed a new technology and decided they wanted to assess its impact. Stated conversely, in nine out of ten [technology assessments] there was a problem, and the technology was studied on that account. Lawyers are problem solvers, so this is significant. May also observed that while technology assessments were performed for the purpose of influencing executive decisions in corporations and to influence agency and legislative decisionmakers, \"very little [technology assessment] was done to influence judicial decision-making.\" In 1995, during the period in which Congress was considering whether to discontinue funding for OTA, one critic reflected back to the time leading up to the establishment of OTA, noting concerns held by some that technology assessments would become a tool to stifle innovation and technological commercialization. Alan Porter, director of the Georgia Tech Technology Policy and Assessment Center, noted both the ambiguity of the term technology assessment and those concerns: It should not shock us that two general, widely used, and ambiguous termsâ'technology' and 'assessment'âwhen combined, do not yield a singular meaning. Nonetheless, we can track and even, perhaps, make sense of the usage of 'technology assessment'. The initiation of [technology assessment] in the late 1960s in the USA engendered lively discussion along two distinct streams. The more direct sought to devise an effective policy analysis mechanism to help the U.S. Congress better cope with executive branch proposals. The other, philosophical in bent, concerned the broad roles of technology in society, seeking to help society better manage technology. Both streams struck fear in those committed to technology-based free enterprise, as expressed in charges that TA meant 'technology arrestment.' In a 1970 House Subcommittee on Science, Research, and Development field hearing to explore the relationship between technology assessment and environmental problems, one academic critic asserted that technology assessment as proposed by subcommittee chairman Representative Emilio Daddario was \"conceptually impossible\" and that instead market forces should be used to guide and control technology: I feel I cannot let pass unchallenged the assumption that technology assessment of the type described [by the chairman] is a useful or even a harmless exercise, or is, indeed, possibleâ¦. I am not suggesting a less ambitious role for Congress because I think the impact of technology on society is unimportant, but precisely because I think it is extremely importantâso important in fact that it should be not left to the Congress of the United States to assess and control technology.â¦ The first problem confronting anyone who attempts technology assessment is that it can't be done. It is conceptually and practically impossible to determine what the impact of any particular technological gadget will be, let alone evaluate these effects and find benefit/cost or benefit/risk ratios. Even if our foresight were as good as our hindsight it would be impossibleâ¦. The world, and especially human societies, are just too complex and interrelated for anyone, or any committee, to determine the direct and derivative effects of technology, even in the pastâ¦. Everybody knows, of course, that technology assessment is at best a very difficult task; I am suggesting it is more than difficult, it is conceptually impossibleâ¦. [However,] technology can be and has been guided and controlled, by social institutions which encourage its development and application in socially desirable ways. The primary social institution which has guided technology has been the marketâ¦. On the whole, this system has worked very well, without the need for any official body to assess all the long-term effects of each new technological process as it appeared. More recent definitions of technology assessment are also varied and echo the same themes present in the definitions from the 1960s and 1970s. Appendix B. Selected Trends and Factors That May Contribute to a Perceived Need for Technology Assessment A variety of reports published in 2019, together with proposals by some Members of Congress and others outside of Congress, have asserted that Congress needs a bolstered technology assessment capability to inform its policy decisions. This section describes selected trends and factors that may contribute to this perspective, including the rapid pace of technological change, the globalization of R&D, the role of science and technology (S&T) in the U.S. economy, the role of S&T in national security, the increasing complexity of technology, the advent of new information and communications technologies, and the role of S&T in other aspects of public policy. The role of new and powerful technologies in industry, national security, society, and the global balance of power may have important implications for congressional policy decisions, including policies related to their development and application, as well as in preventing, mitigating, and remediating potential adverse effects. Rapid Pace of Technological Change Technologyâthe application of scientific and other knowledge for practical purposesâis advancing rapidly, and by some measures it is growing at an accelerating pace. This growth is fueled, in part, by increased public and private investments in R&D. A variety of technologies have seen rapid growthâmagnetic data storage, DNA sequencing, wired and wireless data transmission technologiesâsome continuing this growth over multiple decades. For example, as illustrated in Figure B-1 , the number of transistors on a microchip since 2001 has grown exponentially. While this chart only shows data since 1971, the rapid growth can be traced back to the invention of the integrated circuit. Similarly, Figure B-2 shows rapid growth in the number of human genome base pairs that can be sequenced per dollar. (Note: Figure B-1 and Figure B-2 show growth on a logarithmic scale where each increment on the y-axis represents a 10-fold increase. A logarithmic scale is often used when analyzing a large range of data.) Countries are aggressively pursuing R&D directed at goals such as innovation, competitiveness, economic growth, wealth creation, productivity improvements, national security, and quality of life. Companies are pursing R&D for innovations that yield new and better products and processes, market advantage, and cost reductions, enabling them to serve new and existing markets and increase their profitability. Since OTA was defunded, total global gross expenditures on research and development (GERD) have grown rapidly. In 2017 total GERD was $1.9 trillion, more than 3.9 times its level in 1996 ($504 billion), measured in current purchasing power parity dollars. Measured in constant dollars, the real purchasing power of global R&D increased more than 150% between 1996 and 2017. (See Figure B-3 .) These growing global investments in R&D are delivering new technologies, products, and services with potentially substantial societal implications. Some of these advances are evolutionaryâoffering incremental improvements on the technologies, products, and services already in useâwhile other advances are revolutionary with the potential, according to some analysts, to disrupt markets, companies, industries, occupations, and the balance of economic and military power. Figure B-4 shows the number of utility patents (\"patents for inventions\") granted by the U.S. Patent and Trademark Office each year from its establishment in 1790 to 2015, another metric illustrating rapid growth in the development of new technology. It took more than 200 years for USPTO to issue its 5 millionth patent; 27 years later, on June 19, 2018, the USPTO issued its 10 millionth patent. While there is consensus on the rapid growth in technology, not all agree that the pace of technological change is accelerating. For example, considering technological change through the lens of technology adoption, one information technology expert notes that The time it takes for a new technology to be used in 50 percent of U.S. homes has long been used as a comparative adoption benchmark. By this standard, both radio and television were accepted faster than personal computers or mobile phones. More importantly, most Internet of Things (IoT) technologiesâFitbits, smart watches, 3D printersâare being adopted even more slowly. Globalization of Research and Development The United States' share of global R&D expenditures fell from 69% in 1960 to 28% in 2017 as other countries increased their R&D investments, both public and private, some quite substantially. In recent years, China has accounted for a large share of global R&D growth. Between 1996 and 2016, China increased its investments from $14.2 billion to $451.2 billion (measured in current PPP dollars), an increase of more than 3,000%, to become the world's second largest funder of R&D, behind only the United States. (See Table B-1 .) During the same period, U.S. R&D grew 158%. In constant 2010 PPP dollars, between 1996 and 2017 China's R&D investment grew by 2,279% while investment by the U.S. in R&D measured in constant 2010 PPP dollars grew by 86%. In addition to developing new technologies, nations around the world are adopting and deploying these technologies to meet their economic, social, and military objectives. This development, adoption, and deployment may have significant implications for not only their own countries, but for the United States as well. On the one hand, for example, the adoption of these technologies could increase the prosperity of other countries, creating potential new markets for American products and services. On the other hand, the indigenous development of technological capabilities in countries other than the United States and its allies may limit the United States' ability to control access to military technologies and may reduce the influence of the United States in the establishment of standards for the ethical and safe use of new technologies. The United States might also lose its technology leadership in key fields, long considered a key component in the strength of the U.S. economy. Role of Science and Technology in the U.S. Economy Economists have long maintained that advances in science and technology play an important role in U.S. and global economic growth, productivity, job creation, and standard of living. These benefits flow from factors such as new and improved products, improvements in manufacturing technologies, the reorganization of work, and enabling and improving services. For example, S&T discovery has played an important role in extracting and exploiting America's energy resourcesâthrough the advancement of fracking, horizontal drilling, and sonic imaging technologies used in oil and gas productionâand in reducing the cost and improving the performance of alternative energy sources such as solar and wind. Role of Science and Technology in National Security Science and technology have played a central role in U.S. national security and military strengthâfrom the weapons systems developed during World War II (e.g., nuclear weapons, radar, sonar, microelectronics) to those developed during the Cold War period and after (e.g., advanced nuclear weapons, intercontinental ballistic missiles (ICBMs), multiple independently targetable reentry vehicles (MIRVs), satellites, stealth fighter and bomber aircraft, nuclear-powered naval vessels, precision targeting, and information- and network-centric systems for intelligence, surveillance, and reconnaissance). Military strategists and analysts anticipate future U.S. defense capabilities are likely to rely heavily on advances in leading-edge technologies such as artificial intelligence, autonomy, nanotechnology, advanced computing and communications, augmented reality, and hypersonics. Increasing Complexity of Technology Innovation has become increasingly multidisciplinary. Some of the most promising fields involve the intersection of two or more powerful technologies, such as artificial intelligence and autonomy (e.g., driverless cars, package delivery by drones); high-speed computing, big data, and biotechnology (e.g., personalized medicine, synthetic biology, epidemiology, identifying the relationships between genes and particular diseases); and sensors and the internet (e.g., supply chain management and optimization, health self-monitoring, persistent scientific observation). The marriage of disparate technologies may lead to powerful and unanticipated new technologies with widespread societal implications. Role of Science and Technology in Other Aspects of Public Policy Science and technology also play key roles in many other aspects of public policy. For example, biomedical R&D contributes to the development of new drugs and treatments for illness, disease, and other medical issues. Advances in science and technology in the biomedical field may contribute to human longevity, healthiness, and quality of life. Consequently, they may have implications for a wide array of federal programs. Similarly, advances in science and technology in a variety of fields may contribute to meeting a wide range of public policy objectives: in agriculture, advances could contribute to ensuring national and global food and nutrition needs are met; in transportation, advances may help to save lives and reduce the environmental impacts of automobiles, trucks, trains and other modes of transportation; in energy, advances may help to make energy sources less costly and more abundant, to cost-efficiently tap renewable sources of energy, and to reduce the environmental impacts of its use; advances in understanding weather and climate may help reduce the loss of lives, the cost of property damage, and the time required for recovery; in criminal justice, advances may help to quickly and more accurately identify criminals and to prevent the prosecution of the innocent; and in industrial applications, advances may contribute to economic growth and job creation. At the same time, advances in science and technology can also raise complex societal, ethical, and legal challenges with which legislators grapple. Appendix C. OTA/Technology Assessment-Related Legislation in the 107 th -116 th Congresses 116 th Congress The House Select Committee on the Modernization of Congress voted out recommendations that included \"reestablishing and restructuring an improved Office of Technology Assessment.\" This specific recommendation was not included in the recommendations included in the Moving Our Democracy and Congressional Operations Towards Modernization Resolution ( H.Res. 756 ) which was passed by the House on March 10, 2020. The Legislative Branch Appropriations Act, 2020 ( H.R. 2779 ) would have provided $6.0 million in initial funding to reestablish the Office of Technology Assessment. The House Committee on Appropriations reported the bill on May 16, 2019, accompanied by H.Rept. 116-64 , which states As requested by a number of Members of Congress, the Committee bill includes $6,000,000 in initial funding to reestablish the Office of Technology Assessment (OTA). This Legislative Branch agency was created in 1972 and operated until funding was discontinued in 1995. To do its job in this modern era, Congress needs to understand and address the issues and risks resulting from a wide range of rapid technological developments such as cryptocurrencies, autonomous vehicles, gene editing, artificial intelligence, and the ever-expanding use of social media platforms, to give just a few examples. A re-opened OTA will play an important role in providing accurate, professional, and unbiased information about technological developments and policy options for addressing the issues those developments raise. In that role, OTA will complement the work of the Government Accountability Office in the area of science and technology. P.L. 116-94 , the Further Consolidated Appropriations Act, 2020, which included the Legislative Branch Appropriations Act, 2020, as Division E, was enacted December 20, 2019. The act did not include an appropriation for reestablishing OTA. On September 19, 2019, Representative Mark Takano introduced H.R. 4426 , the Office of Technology Assessment Improvement and Enhancement Act. On the same day, Senator Thom Tillis introduced S. 2509 , a nearly identical bill with the same title. Both bills bill would amend OTA's statute in a variety of ways, including renaming OTA as the Congressional Office of Technology (the office); directing that the work of the office \"be provided as expeditiously, effectively, and efficiently as possible while maintaining a forward-looking, holistic, and rigorous approach to the assessment of the impacts of technology\"; expanding office reporting to Congress from \"completed analysis\" to \"completed analyses, as well as preliminary findings of ongoing analyses\"; adding three additional duties of the office: \"provide information to Members and committees of Congress in the form of briefings, informal conversations, documents, and similar formats which may be provided expeditiously on the basis of existing research and staff expertise without the need for review by the Board; provide technical assistance to Members of Congress on legislation related to science and technology which may be provided expeditiously on the basis of existing research and staff expertise without the need for review by the Board; and, when requested, provide objective policy options to Members on how Members may achieve goals with respect to science and technology policy\"; expanding the list of who may initiate assessment activities to include any Member of Congress, including a Delegate or Resident Commissioner, and providing the office the authority to determine whether to undertake an assessment according to a number of specified criteria; requiring completed analyses be made available to the public, subject to certain restrictions; authorizing the director of the office to make limited term or temporary appointments scientists, engineers, and other technical and professional personnel on leave of absence from academic, industrial, or research institutions to work for the office; requiring the office to coordinate with CRS and GAO to avoid unnecessary duplication or overlapping of research activities; changing the authority for House and Senate appointments to the Technology Assessment Board to be made jointly by leaders of the majority and minority parties in each body; and requiring the TAB to hold at least one meeting each year at which Members of Congress may appear and present information to the TAB about any technology assessment activities the Members would like the TAB to undertake, and requiring an annual report by the TAB to the Subcommittees on the Legislative Branch of the Committees on Appropriations of the House of Representatives and Senate on the activities of the office during the year, including a description of the technology assessment activities undertaken during the year. H.R. 4426 was referred to the House Committee on House Administration; no further action had been taken at the time of this report. S. 2509 was referred to the Senate Committee on Rules and Administration; no further action had been taken at the time of this report. 115 th Congress In September 2018, H.Rept. 115-929 , accompanying the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019 ( P.L. 115-244 ), provided direction to both CRS and GAO on matters related to providing science and technology policy support and technology assessment to Congress. In the report, Congress directed CRS to engage with the National Academy of Public Administration (NAPA) or another external organization to produce a report that identifies resources available to Congress on science and technology policy; assesses the need for a separate entity to provide nonpartisan advice on issues of science and technology to Congress; determines whether such an organization would duplicate services already available to Members. In H.Rept. 115-929 , Congress also expressed its interest in GAO growing its current capabilities to provide expanded technology assessment capacity by reorganizing its technology and science function by creating a new more prominent office within GAO. Congress directed GAO to provide within 180 days a plan and timetable for how the new office could expand and enhance GAO's capabilities in scientific and technological assessments. Other amendments and resolutions introduced in the 115 th Congress also sought to provide funding to reestablish OTA or to affirm the need for its reestablishment: Representative Mark Takano introduced H.Amdt. 219 to H.R. 3219 , the Defense, Military Construction, Veterans Affairs, Legislative Branch, and Energy and Water Development National Security Appropriations Act, 2018, on July 26, 2017. The amendment would have provided $2.5 million to reinstitute OTA, offset by funds from the Architect of the Capitol's Capital Construction and Operations Account. The amendment was not agreed to. Representative Mark Takano introduced H.Amdt. 761 to H.R. 5895 , the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019, to reinstitute OTA, offset by funds from an administrative account within the Architect of the Capitol. The amendment was not agreed to. Representative Bill Foster introduced H.Res. 849, a resolution \"expressing the sense of the House of Representatives that the Office of Technology Assessment should be reestablished,\" on April 26, 2018, with 21 cosponsors. The resolution would have expressed the sense of the House of Representatives that \"the legislative process would greatly benefit from once again having an office dedicated to giving nonpartisan, technical advice to Congress; the Office of Technology Assessment represents a cost-effective improvement to the governance of the United States; and funding should be restored for the Office of Technology Assessment.\" The resolution was referred to the House Committee on Administration. No further action was taken. Earlier Congresses In the 107 th -114 th Congresses, there were a number of efforts to reestablish OTA by authorizing or appropriating funding. Other legislative efforts have sought to express a \"sense of the House\" or \"sense of the Senate\" that OTA should be reestablished. A summary of each of these efforts is provided below, in reverse chronological order: In the 114 th Congress, Representative Mark Takano introduced H.Amdt. 117 to H.R. 5325 , the Continuing Appropriations and Military Construction, Veterans Affairs, and Related Agencies Appropriations Act, 2017, and Zika Response and Preparedness Act, on June 10, 2016. The amendment would have provided $2.5 million to reinstitute OTA, offset by funds from the Architect of the Capitol's Capital Construction and Operations Account. The amendment was not agreed to by the House, by a vote of 179-223. In the 114 th Congress, Representative Bill Foster introduced H.Res. 605, a resolution \"expressing the sense of the House of Representatives that the Office of Technology Assessment should be reestablished,\" on February 4, 2016, with 14 cosponsors. The resolution would have expressed the sense of the House of Representatives that \"the legislative process would greatly benefit from once again having an office dedicated to giving nonpartisan, technical advice to Congress; the Office of Technology Assessment represents a cost-effective improvement to the governance of our country; and funding should be restored to the Office of Technology Assessment.\" The resolution was referred to the House Committee on Administration. No further action was taken. In the 113 th Congress, Representative Rush Holt introduced H.Amdt. 649 to H.R. 4487 , the Legislative Branch Appropriations Act, 2015, on May 1, 2014. The amendment would have provided $2.5 million to reinstitute OTA, offset by funds from the House Historic Buildings Revitalization Trust Fund. The amendment was not agreed to. In the 112 th Congress, Representative Rush Holt introduced H.Amdt. 711 to H.R. 2551 , the Legislative Branch Appropriations Act, 2012, on July 22, 2011. The amendment would have provided $2.5 million to reinstitute OTA, offset by funds from the House Historic Buildings Revitalization Trust Fund. The amendment was not agreed to. In the 110 th Congress, S. 1602 , the Clean, Reliable, Efficient and Secure Energy Act of 2007, was introduced by Senator Chuck Hagel on June 12, 2007. Title V, Subtitle C of the bill would have renamed the Technology Assessment Act of 1972 as the Office of Technology Assessment Reestablishment Act of 2007, and would have authorized appropriations of $25 million per year for OTA for FY2008 through FY2013. The bill was referred to the Senate Committee on Energy and Natural Resources. No further action was taken. In the 108 th Congress, H.R. 125 , a bill \"to reestablish the Office of Technology Assessment,\" was introduced by Representative Rush Holt on January 7, 2003, with 65 cosponsors. The bill would have renamed the Technology Assessment Act of 1972 as the Office of Technology Assessment Reestablishment Act of 2003, and would have authorized appropriations of $20 million per year for OTA for FY2004 through FY2009. The bill was referred to the House Committee on Science's Subcommittee on Space and Aeronautics. No further action was taken. In the 107 th Congress, H.R. 2148 , a bill \"to reestablish the Office of Technology Assessment,\" was introduced by Representative Rush Holt on June 13, 2001, with 87 cosponsors. The bill would have renamed the Technology Assessment Act of 1972 as the Office of Technology Assessment Reestablishment Act of 2001, and would have authorized appropriations of $20 million per year for OTA for FY2002 through FY2007. The bill was referred to the House Committee on Science's Subcommittee on Space and Aeronautics. No further action was taken. A CRS search of Congress.gov identified no legislation seeking to reestablish OTA during either the 105 th Congress or 106 th Congress. Appendix D. GAO Technology Assessments 2019 /2020 Artificial Intelligence in Health Care: Benefits and Challenges of Machine Learning in Drug Development , GAO-20-215SP, December 20, 2019. (This product was reissued with revisions on January 31, 2020.) Irrigated Agriculture: Technologies, Practices, and Implications for Water Scarcity , GAO-20-128SP, November 12, 2019. 2018 Critical Infrastructure Protection: Protecting the Electric Grid from Geomagnetic Disturbances , GAO-19-98, December 19, 2018. Technology Assessment: Artificial Intelligence: Emerging Opportunities, Challenges, and Implications , GAO-18-142SP, March 28, 2018. Chemical Innovation: Technologies to Make Processes and Products More Sustainable , GAO-18-307, February 8, 2018. 2017 Medical Devices: Capabilities and Challenges of Technologies to Enable Rapid D iagnoses of I nfectious D iseases , GAO-17-347, August 14, 2017. Internet of Things: Status and Implications of an Increasingly Connected W orld , GAO-17-75, May 15, 2017. 2016 Technology Assessment: Municipal F reshwater S carcity: Using T echnology to I mprove D istribution S ystem E fficiency and T ap N ontraditional W ater S ources , GAO-16-474, April 29, 2016. 2015 Technology Assessment: Water in the Energy Sector: Reducing Freshwater Use in Hydraulic Fracturing and Thermoelectric Power Plant Cooling , GAO-15-545, August 7, 2015. Technology Assessment: Nuclear Reactors: Status and Challenges in Development and Deployment of New Commercial Concepts , GAO-15-652, July 28, 2015. 2011 Technology Assessment: Neutron Detectors: Alternatives to Using Helium-3 , GAO-11-753, September 29, 2011. Technology Assessment: Climate Engineering: Technical Status, Future Directions, and Potential Responses , GAO-11-71, July 28, 2011. 2010 Technology Assessment: Explosives Detection Technologies to Protect Passenger Rail , GAO-10-898, July 28, 2010. 2005 Technology Assessment: Protecting Structures and Improving Communications D uring Wildland Fires , GAO-05-380, April 26, 2005. 2004 Technology Assessment: Cybersecurity for Critical Infrastructure Protection , GAO-04-321, May 28, 2004. 2002 Technology Assessment: Using Biometrics for Border Security , GAO-03-174, November 15, 2002.", "summary": "Congress established the Office of Technology Assessment (OTA) as a legislative branch agency by the Office of Technology Assessment Act of 1972 (P.L. 92-484). OTA was created to provide Congress with early indications of the probable beneficial and adverse impacts of technology applications. OTA's work was to be used as a factor in Congress' consideration of legislation, particularly with regard to activities for which the federal government might provide support for, or management or regulation of, technological applications. The agency operated for more than two decades, producing approximately 750 full assessments, background papers, technical memoranda, case studies, and workshop proceedings spanning a wide range of topics. In 1995, amid broader efforts to reduce the size of government, Congress eliminated funding for the agency. Although the agency ceased operations, the statute authorizing OTA's establishment, structure, functions, duties, powers, and relationships to other entities (2 U.S.C. Â§Â§471 et seq.) was not repealed. Since OTA's defunding, there have been several attempts to reestablish OTA or to create an OTA-like function for Congress. During its years of operations, OTA was both praised and criticized by some Members of Congress and outside observers. Many found OTA's reports to be comprehensive, balanced, and authoritative; its assessments helped shaped public debate and laws in national security, energy, the environment, health care and other areas. Others identified a variety of shortcomings. Some critics asserted that the time it took for OTA to define a report, collect information, gather expert opinions, analyze the topic, and issue a report was not consistent with the fast pace of legislative decisionmaking. Others asserted that some of OTA's reports exhibited bias and that the agency was responsive only to a narrow constituency in Congress, that reports were costly and not timely, that there were insufficient mechanisms for public input, and that the agency was inconsistent in its identification of ethical and social implications of developments in science and technology. In debate leading to OTA's defunding, a central assertion of its critics was that the agency duplicated the work of other federal agencies and organizations. Those holding this position asserted that other entities could take on the technology assessment function if directed to do so by Congress. Among the entities identified for this role were the Government Accountability Office (then the General Accounting Office), the Congressional Research Service, the National Academies, and universities. Congress has multiple options for addressing its technology assessment needs. Congress could opt to reestablish OTA by appropriating funds for the agency's operation, potentially including guidance for its reestablishment in the form of report language. If it pursues this option, Congress would need to reestablish two related statutorily mandated organizations: the Technology Assessment Board (TAB), OTA's bipartisan, bicameral oversight body; and the Technology Assessment Advisory Council (TAAC), OTA's external advisory body. In 2019, the House included $6.0 million for OTA in the House-passed version of the Legislative Branch Appropriations Act, 2020 ( H.R. 2779 ); no funding was provided in the final act. Congress might also opt to amend OTA's authorizing statute to address perceived shortcomings; to revise its mission, organizational structure, or process for initiation of technology assessments; or to make other modifications or additions. Alternatively, Congress could choose to create or develop an existing technology assessment capability in another legislative branch agency, such as the Government Accountability Office (GAO) or Congressional Research Service. Since FY2002, Congress has directed GAO to bolster its technology assessment capabilities. From 2002 to 2019, GAO produced 16 technology assessments. In 2019, GAO, at the direction of Congress, created a new office, Science, Technology Assessment, and Analytics (STAA), and announced plans to increase the number of STAA analysts over time from 49 to 140. In addition, Congress could increase its usage of the National Academies of Science, Engineering, and Medicine by funding an expanded number of congressionally mandated technology assessments. Alternatively, Congress could opt to take no action and instead rely on current sources of informationâgovernmental and nongovernmentalâto meet its needs. In 2018, Congress directed CRS to contract with the National Academy of Public Administration (NAPA) for a study to \"assess the potential need within the Legislative Branch to create a separate entity charged with the mission of providing nonpartisan advice on issues of science and technology. Furthermore, the study should also address if the creation of such entity duplicates services already available to Members of Congress.\" The NAPA study recommended bolstering the science and technology policy efforts of CRS and GAO, as well as the establishment of an Office of the Congressional Science and Technology Advisor (OCSTA) and a coordinating council. NAPA stated that it did not evaluate the option of reestablishing OTA due to Congress' efforts since 2002 to build a technology assessment capability within GAO.", "document_type": "crs"}
{"report": "Personal property management is a complex undertaking, as federal agencies must track, evaluate, dispose of, and replace a vast array of items. Personal property is defined as any property that is not real property (land, buildings, and structures), with the exception of certain naval vessels (battleships, cruisers, aircraft carriers, destroyers, and submarines). Everything else that an agency owns is considered personal property: Desks, computers, vehicles, and laboratory equipment are common examples. Given the size and distribution of the federal workforceâmore than 4 million federal civilian and military full-time equivalents are housed at thousands of locations across the country and overseasâthe acquisition and maintenance of personal property has required sustained investment by the government. In FY2017, federal agencies reported $1.3 trillion in personal property assets. Effective management of federal personal property is necessary to prevent waste, fraud, and loss. Each agency is responsible for implementing policies and proceduresâknown as internal controlsâthat mitigate risk and promote the efficient use of federal assets. Internal controls help an agency answer fundamental questions about its personal property inventory, such as: Does the agency know what it owns? Does the agency need everything it has? Is the agency disposing of unneeded assets so that other agencies or the public may make use of them? Is the agency getting the best price on replacement items? What safeguards are in place to make it difficult to steal or misuse personal property? The Office of Management and Budget (OMB) provides agencies with broad guidance on establishing internal controls via Circular A-123. Specific guidance for agency personal property policies and procedures is primarily located in the Federal Management Regulation, which is promulgated by the General Services Administration (GSA). In addition, Appendix B of Circular A-123 establishes requirements for internal controls over the management of federal charge cards, which includes safeguards for the receipt of personal property acquired with purchase cards. Personal property management is a relatively decentralized process, and there is no government-wide source of data on agency inventories. Policymakers and federal auditors have shown particular interest in the disposal of personal property, as recent assessments demonstrate that agencies fail to identify and dispose of items they no longer need. Agencies must continually survey their property holdings, identify items that are not needed, and dispose of any unneeded property by transferring it at no cost to other federal agencies, donating it to state or local entities, selling it to the public, or abandoning or destroying it. Executive agencies use this process to dispose of tens of thousands of items a year. When agencies do not efficiently track, inventory, and dispose of unneeded (excess) property, agencies increase federal expenditures and waste the unused value of personal property assets. For example, an agency may purchase items they could have obtained at no cost from another agency's excess inventory, and property that is lost or stolen when not properly inventoried may need to be replaced. When federal agencies do not follow a sound property management process, state and local entities may lose the opportunity to acquire excess federal property at no charge, resulting in higher costs for them when serving the public. The federal government also incurs greater storage expenses when agencies hold onto excess property and loses revenue from potential sales. To address these concerns, Congress passed the Federal Personal Property Management Act of 2018 (Personal Property Act; P.L. 115-419 ), which establishes new inventory tracking and assessment requirements for federal agencies. This report begins with a discussion of federal personal property management guidance, then examines weaknesses in agency policies and procedures. Next, the report analyzes the Personal Property Act and how it may address weaknesses in the personal property disposal process. The report concludes with observations on the intersection of real property and personal property. The personal property disposal process begins when an agency determines it no longer needs certain items. To ensure that agencies are able to identify unneeded or \"excess\" personal property in a timely manner, they are required to maintain adequate property controls and continually survey their inventories to determine the utility of each item. When an agency identifies excess property, it has the option to transfer an item directly to another federal agency, provided the item had an acquisition cost of less than $10,000. Excess property with an acquisition cost of $10,000 or more may be transferred directly to another federal agency with verbal approval from the appropriate GSA regional office. Generally, direct transfers are made at no charge for the property itself, but the requesting agency is responsible for transportation and shipping costs. Agencies may also perform a direct transfer of computers or peripheral tools (e.g., modems and printers) to schools or educational nonprofits through the Computers for Learning Program, which was established pursuant to Executive Order 12999, \"Educational Technology: Ensuring Opportunities for All Children in the Next Century,\" and encompasses educational institutions for children in pre-kindergarten through secondary school. If an agency does not perform a direct transfer of excess personal property, it must promptly report the property to GSA. Excess property may be reported online through the GSAXcess system, electronic batch, or hard copy. Once excess property is reported to GSA, it undergoes a 21-day screening process, during which the property may be viewed online (if it was entered into GSAXcess by the reporting agency) or inspected onsite (at the agency). During the 21-day period, excess personal property may be transferred to other federal agencies as well as to the Senate, the House of Representatives, the Architect of the Capitol, the District of Columbia government, and certain mixed-ownership government corporations. If no federal agency requests the excess property, then it is declared \"surplus,\" and GSA has five days to donate it at no charge to eligible recipients. Such recipients include state and local governments; municipal agencies; and nonprofits that provide support for education, public health, or veterans groups. The surplus personal property is not transferred directly to the recipients. Rather, each state has a State Agency for Surplus Property (SASP), which receives the property and distributes it to qualified agencies and organizations. Surplus personal property that is not donated within the five-day period may be sold to the general public. GSA makes surplus property for sale available on its public auction website and may also sell property through live auctions, fixed price or negotiated sales, sealed bids, or spot bids. Generally, proceeds from the sale of surplus property are deposited into the U.S. Treasury, less the cost of disposition. Items that do not sell may be recycled, abandoned, or destroyed if they have no value or the estimated cost of their continued care and handling exceeds the estimated proceeds from sale. At times, agencies may need to replace personal property that is not excess or surplus. This occurs when an agency still needs a certain category of property to achieve its mission, but some items are no longer able to adequately perform the job, perhaps due to their age or lack of needed functionality. Vehicles that are near the end of their useful lives fit into this category, as does aging medical equipment. In this instance, executive branch agencies have the authority to exchange (trade in) or sell the old property and apply the exchange allowance or sales proceeds toward the purchase of similar items. The purpose of this authority is to reduce the cost of acquisition, and agencies are required to choose the optionâexchange or saleâthat results in the greatest savings. An agency that opts to sell personal property must use the proceeds to purchase a new similar item within one year. Federal agencies generated $3.1 billion in exchange allowances and sales proceeds that were applied to new purchases between FY2013 and FY2017. Of this total, sales accounted for $2.9 billion and exchanges accounted for $275 million. GSA accounted for 60% of the total allowances and sales proceeds ($1.9 billion), while four other agenciesâthe Departments of Homeland Security, Agriculture, Defense, and the Interiorâtogether accounted for $934 million. Vehicle sales were the primary source of exchange allowances and sales proceeds, accounting for 71% ($2.6 billion) of the total. While GSA plays a central role in screening and transferring excess personal property, each executive agency is responsible for continually surveying its own inventory and declaring unneeded property \"excess\" in a timely manner. When agencies do not fulfill these duties, government resources are not used efficiently, and public funds may be expended unnecessarily. A federal agency may purchase items that could have been obtained at no charge from another agency's excess inventory, for example, or a state government may expend public funds to acquire equipment it could have obtained for free from a federal warehouse. In addition, agencies did not always obtain the maximum exchange allowance or sales price when replacement items were needed. The variance in agency disposal policies and practices likely contributes to wasteful and inefficient use of federal personal property. Generally, agencies designate officials, known as property custodians, who are responsible for personal property management and disposal. A 2018 report by the Government Accountability Office (GAO) examined the personal property policies of five agencies and found that while all five had broad policies that required ongoing surveys of personal property, only one specified that their custodians were responsible for doing so. A separate audit of the Environmental Protection Agency (EPA) found that while EPA's policies required annual inventories, the agency did not provide adequate oversight of the contractors hired to perform them. As a consequence, the annual inventories were inaccurate and incomplete. When surveys are performed irregularly, or records are of poor quality, an agency is at risk of holding onto excess property that could be better used elsewhere. An audit of the Federal Aviation Administration (FAA) found that the agency's organizational structure created problems for implementing the continual survey requirement. Personal property policies at FAA were developed by the Aviation Logistics Organization, but the custodians who were supposed to follow those policies were not subject to the organization's authority. Moreover, auditors found that custodians were not evaluated by their direct supervisor on how well they performed their personal property duties. This lack of oversight may have contributed to the auditor's findings that FAA property custodians did not perform required inventories or maintain accurate records of equipment. Of the FAA's 2,330 cost centers (subdivisions with personal property), nearly 8% had never been inventoried, resulting in thousands of items worth tens of millions of dollars being retained by the agency regardless of FAA's need for them. The misalignment of policies and internal structure resulted in the agency potentially holding onto property it did not need, thereby limiting opportunities for other entities to access these assets and driving up storage costs unnecessarily. In some cases, agencies did not provide sufficiently detailed guidance on the types of personal property to survey. Agencies typically divide their inventories into three accounting categories: 1. Capitalized property generally has the highest original acquisition cost. Property in this category has the longest useful expected life and is depreciated and reported as an asset in an agency's annual financial statement. An example would be equipment with an original acquisition cost above the capitalization threshold. 2. Accountable property is nonexpendable personal property with an expected useful life of two years or longer that an agency decides should be tracked in its property records based on its original acquisition cost and sensitivity. Agencies typically record capitalized property as accountable property because of its high acquisition costs, while laptops are considered accountable because of the sensitive information they may contain, regardless of original cost. Agency vehicles that fall below the capitalization threshold are typically considered accountable property. 3. Non-accountable property falls below the accountable property threshold and is not considered sensitive. Desks and chairs are common examples of non-accountable property, provided they fall below the accountability threshold. Agencies are allowed to set their own personal property capitalization and accountability thresholds, which vary across the government. EPA, for example, set its capitalization threshold at $25,000, while the FAA set its capitalization threshold at $100,000. Similarly, the Department of Housing and Urban Development set its threshold for accountable property at $5,000, while GSA set its accountable property threshold at $10,000. The variation in thresholds leads to a variation in inventory management, particularly as it relates to disposal: Agencies often do not track or assess the need for non-accountable items. Some agencies argue that the amount of manpower needed to track low-value items is too high to make it cost-effective, while others say it is not required by law, so they choose not to do so. OMB has taken the position that assessing non-accountable property is necessary for effective internal controls. For example, tracking non-accountable property may prevent unnecessary purchases. After an audit of EPA's Landover warehouse determined that the property stored there had not been fully assessed for need, the agency inventoried thousands of items of non-accountable personal property and transferred $90,000 in excess furniture and carpet to its Research Triangle Park campus and $137,000 in property to another federal agency. Additional cost savings may result from the reduced need for warehouse space. Auditors estimated that disposing of excess non-accountable property at EPA's Landover and Cincinnati warehouses could save $5.8 million in warehouse lease costs over a five-year period. Agencies may also lack policies that provide custodians with criteria for determining whether personal property is excess, which can result in inconsistent practices across the government. One exception is the Internal Revenue Service, which provides guidance on assessing need, such as whether an item is still needed in its current location and, if not, whether it would be cost-effective to transport the item to another location. Without clear criteria, it is possible that custodians have deemed property as non-excess that may, in fact, be unneeded by the agencyâthereby reducing disposals and increasing the likelihood that agencies will make unnecessary purchases and rent more warehouse space than they would have if the inventory had been performed with more specific guidance. One consequence of failing to regularly survey accountable and non-accountable property is that agencies do not report excess property in a timely manner. Some unneeded property may sit in warehouses for long periods of time. EPA, for example, kept multiple refrigerators in storage at its Landover warehouse for seven years. During that time, the agency expended funds unnecessarily on storage space for the refrigerators and lost the opportunity to dispose of them to another government agency or nonprofit that serves the public. In many cases, agencies do not report excess property until a \"triggering event\" forces the issue, such as an office relocation, consolidation, or renovation. Typically, agencies try establish a plan to dispose of items such as unneeded furniture or computers during a triggering event to make the transition easier and to make space for new property that may be part of the move. A disposal plan sets milestones, identifies the staff and other resources needed, and gives specific directions on what needs to be done to complete disposition in a timely manner. The amount of excess personal property identified during a triggering event may grow as some agencies implement OMB's Reduce the Footprint (RTF) initiative. In an effort to decrease the amount of space federal agencies own and lease, RTF requires each agency subject to the Chief Financial Officers Act to submit an annual Real Property Efficiency Plan. The plan must include new design standards for employee workstations. GSA, for example, reduced its standard for usable square feet in new or renovated offices from 150 per person to 136. (Agencies do not have to retrofit existing buildings under RTF. ) When agencies relocate or renovate, their existing furniture may not fit the reduced space allotments, thereby rendering hundreds or thousands of items of personal property excess at one time. Without careful planning, agencies may find it challenging to dispose of their existing furniture and acquire new furniture during a transition. As noted, executive agencies have the authority to exchange (trade in) or sell used property and apply the exchange allowance or sales proceeds to the cost of acquiring replacement items. According to federal auditors, not all agencies use this authority to maximize the benefits it affords, and many agencies use the authority sparingly, if at all. Knowledge of how to use the exchange/sale authority varies across and within agenciesâespecially when an agency has a decentralized disposal process. Each of the 172 medical centers of the Department of Veterans Affairs (VA), for example, monitors its needs and orders replacement equipment, but VA officials reported that the exchange/sale process was not well understood in some centers. As a consequence, some medical centers opted to exchange equipment that would have generated a greater monetary return had it been sold, while others were not clear on whether they were permitted to sell equipment when exchange was also an option. Some agencies may need additional guidance or training to facilitate greater use of the exchange/sale authority. GAO found that of the 27 agencies that reported exchange/sale transactions from FY2013 through FY2017, a subset of 10 agencies used the authority on a limited basis. While these agencies may not use the authority because they do not have suitable property to sell or exchange, GSA officials said they believe that a primary factor is lack of knowledge. Similarly, a VA official stated that if VA medical centers had better guidance, their use of the exchange/sale authority might increase. Auditors have found that some agencies, notably GSA and VA, have not monitored and reported their exchange/sale transactions correctly. GSA officials said they do not know the extent to which internal offices have, or should be using, the authority. Officials stated that the lack of monitoring has been due to the low level of priority that GSA has placed on personal property management in general. VA officials conducted limited monitoring of their use of the authority, and audits found widespread reporting errors. One medical center reported about 1,000 sales transactions under the exchange/sale authorityâall of which were incorrect. The medical center had mistaken sales of surplus property for sales of needed (non-excess, non-surplus) property that was being replaced. Another medical center reported no exchange transaction, but auditors found several, including one valued at $500,000. It may be difficult to assess the effectiveness of the authorityâincluding the savings it generatesâwhen monitoring is limited and reporting is inaccurate. The Personal Property Act ( P.L. 115-419 ) was written to address the inconsistent standards in agency inventory practices and thresholds. To that end, Section 2 of the legislation requires the GSA administrator to issue guidance that will direct agencies to conduct an annual inventory and assessment of capitalized personal property to identify which items, if any, are no longer needed and should be declared excess. The guidance also requires agencies to regularly inventory and assess their accountable personal property. The evaluation of need for both capitalized and accountable personal property must consider: the age and condition of the personal property, the extent to which the executive agency uses the personal property, the extent to which the mission of the executive agency is dependent on the personal property, and any other aspect of the personal property that the administrator determines is useful or necessary for the executive agency to evaluate. Section 2 further requires agencies to establish capitalization and accountability thresholds for acquisitions of personal property. Agencies are also required to establish and maintain records of accountable property in a centralized system. The Personal Property Act was enacted in January 2019. GSA has not issued the required guidance as of the date of this report. The Personal Property Act is designed to address several weaknesses in the property disposal process. It requires GSA to give better guidance to agencies for inventorying and assessing their capitalized and accountable property. A concern repeatedly voiced by agency officials and auditors was the lack of clear direction on how to set up an effective property oversight program, particularly with regard to assessing items for continued need. The determination that property is in excess initiates the disposal process, so improving agency assessment policies and practices may reduce the amount of unneeded property that agencies store and result in cost savings for warehouse space. By moving more excess property through the screening process, federal agencies, state and local governments, and nonprofits may have more opportunities to acquire personal property items at no cost, thereby reducing their expenditures as well. While the new guidance requirements do not extend to non-accountable property, they focus on the highest-value items in an agency's inventory. Given that some agencies may lack the manpower to perform ongoing surveys of all of their property, emphasizing management of capitalized and accountable property may be seen as a cost-effective use of limited resources. The Personal Property Act also requires GSA to set capitalization and accountability thresholds. Currently, agency thresholds may vary widely. As a result, agencies may treat the same property differently. An item that cost $7,500 might be above the accountability threshold at one agencyâand be subject to more stringent inventory and assessment rules of the Personal Property Actâbut below the threshold at another. Similarly, capitalized property must be recorded on an agency's balance sheet as an asset. The higher the capitalization threshold, the fewer assets are reported, which in turn affects the representation of the agency's financial position. Capitalized assets must also be depreciatedâthat is, the cost of an asset must be allocated to the programs and operating periods benefitting from use of the asset. By understating the number of assets an agency owns, high capitalization thresholds also reduce depreciation data, and the full cost of programs and operations may not be captured. Standardizing capitalization thresholds may improve agency financial reporting and program management by capturing a larger number of personal property assets. Standardizing accountability thresholds may also result in more consistent treatment of items with the same acquisition cost. Agencies with accountability thresholds above the level that GSA establishes may be required to expand the scope of their inventory surveys. If so, they may increase the number of items determined to be excess, resulting in reduced expenditures for storage, among other potential benefits. The disposal of excess personal property is often initiated by \"triggering events,\" such as relocation, reconfiguration, or consolidation. In such cases, agencies appear to be unaware of the full scope of excess property in their inventories until they are tasked with moving or replacing it. If an agency is unprepared to manage the disposal of excess property during a transition to new space, whether temporary or permanent, it may cause delays or increase the costs associated with the move. In August 2017, for example, GSA began the process of reconfiguring federally leased space at 26 Federal Plaza in New York City. The project, which has an estimated completion date of February 2020, required GSA to relocate several federal agencies to One World Trade Center during the reconfiguration. GSA did not have a plan to dispose of the excess personal property left behind at 26 Federal Plaza. Without a disposal plan in place, GSA did not ensure that sufficient staff were available to adequately manage the disposition of so many items. Moreover, GSA did not follow the required screening process in which unneeded property is first offered to federal agencies for 21 days, then offered to SASPs, then for put up for sale to the public, then considered for abandonment or destruction. Instead, GSA primarily relied on informal \"word of mouth\" communication with other federal agencies for disposition. The disposal process was further delayed by inadequate personal property records, which forced the relocated agencies to reassess their inventories. One year after the relocation was complete, \"a large volume of excess personal property\" remained at 26 Federal Plaza. This may delay the reconfiguration and increase the costs associated with the project. The issues observed during the 26 Federal Plaza reconfiguration may be experienced on a broader scale during implementation of the Federal Assets Sale and Transfer Act of 2016 (FASTA, P.L. 114-287 ), a sweeping piece of real property management legislation. FASTA requires federal landholding agencies to submit recommendations for the sale, transfer, conveyance, renovation, reconfiguration, or consolidation of unneeded real property. These recommendations are submitted to the GSA administrator, who reviews and edits them and then passes a government-wide list of proposals on to a newly established Public Buildings Reform Board. The board examines GSA's list of proposals, holds hearings on them, solicits additional proposals from the public, and compiles a revised list of recommendations to send to the director of OMB, who may approve or reject the board's recommendations in whole. If they are rejected, the board may resubmit its recommendations after reviewing the OMB director's explanation for the rejection. If the OMB Director approves either the initial or revised list, agencies must begin planning the implementation of all of the recommendations. Initial steps toward implementation must begin within two years and be completed within six years. The FASTA process could result in dozensâperhaps hundredsâof real property transitions taking place during the same time period. Many executive agencies may not have accurate inventories of their personal property, may not know the volume of excess inventory they may be required to dispose of, or may lack the resources to manage the disposal of excess personal property at multiple locations. Without adequate preparation, agencies may not be able to dispose of excess personal property in a timely manner, thereby disrupting the transition schedule. One possible way to mitigate these concerns would be for OMB and GSA to develop implementation guidance specific to managing personal property. The guidance might require agencies to prioritize property inventories at sites included in their FASTA recommendations and incorporate personal property disposal into their transition plans. In addition, the guidance might require agencies to request assistance from GSA if they lack the expertise or manpower to effectively dispose of excess property at given sites. In the future, policymakers might examine the potential benefits of expanding the Federal Real Property Profile (FRPP) to include personal property as well. The FRPP is a comprehensive, publicly accessible database of federally owned and leased buildings, structures, and land. Among other things, it provides data on the size and status of each property, such as square footage and whether it is needed, excess, or surplus. When populated with accurate data, the FRPP enhances the transparency of the federal real property inventory, facilitates policy analysis, and enables the public to search for information about properties that are currently or may become available for conveyance or purchase. Arguably, adding personal property data to the FRPP may provide similar benefits. An expanded FRPP could include agency inventories of capitalized property, thereby giving the public and policymakers a single source for data on much of the government's most expensive plant, property, and equipment investments. The Personal Property Act requires agencies to have complete inventories of accountable property. Typically, accountable property (e.g., cars, medical equipment) has a shorter useful life than capitalized property and becomes excess sooner. By including data on accountable property, an expanded FRPP might enable policymakers to better evaluate the funding needs of agencies that face aging assets. It might also assist certain government agencies and nonprofits, as they may use the information to estimate when accountable federal property might be declared excess and therefore become available to them. The expanded FRPP might also include information on excess property, although it would need to be updated regularly to reflect the movement of property through the disposal process. Publishing data on excess property in this manner might help hold agencies accountable for completing their inventories and ensuring that disposal is completed in a timely manner.", "summary": "Federal personal property is generally defined as anything the government owns that is not real property. Common examples of personal property include furniture, cars, laptops, scientific equipment, and machinery. Sound management of the government's personal property inventoryâwhich is valued at more than $1 trillionâis necessary to mitigate the risk of waste, fraud, and loss. Federal statutes and regulations require agencies to regularly survey their personal property inventories and dispose of items they no longer need (excess personal property). When an agency identifies excess property, it must first offer it at no charge to other federal agencies. If excess property is not transferred to another federal agency, it is then declared \"surplus\" and may be transferred to a State Agency for Surplus Property (SASP) for distribution to state and local governments and nonprofits. Surplus personal property that is not donated may be sold to the public. Unsold surplus property may be abandoned or destroyed (including through recycling). Personal property surveys may identify items that are still needed, are near the end of their useful lives, and need to be replaced. Agencies have the authority to exchange (trade in) or sell the items that need to be replaced and apply the credit (from an exchange) or sales proceeds to the acquisition of similar items. The method of replacement chosenâexchange or saleâshould maximize the potential offset to the cost of acquiring new items. The government may realize cost savings when agencies regularly survey their inventories and dispose of excess and surplus property in a timely manner. Federal expenditures may be reduced when one agency's excess personal property is used to fill another agency's need and when replacement items are acquired in the most cost-effective manner. Federal expenditures may be further reduced if, as a result of disposing of unneeded items, agencies are able to decrease the amount of space needed to store personal property. Similarly, state and local governments and nonprofits may be able to reduce their expenditures if they obtain surplus federal personal property at no charge. According to federal auditors, agencies do not consistently fulfill the government's personal property disposal requirements. Some agencies do not regularly survey their inventoriesâoften because they have not identified who is responsible for implementing the surveys. Agencies have been allowed to establish their own threshold for accountable personal propertyâitems with longer useful lives and higher acquisition costsâbelow which items are not tracked. As a consequence, some agencies have set accountability thresholds higher than others, thereby excluding more items from regular monitoring and disposition. Agencies have also been able to set their own thresholds for capitalized personal property, which are the items with the longest lives and highest acquisition costs. Capitalized personal property is subject to additional reporting and evaluation requirements, so higher thresholds reduce the scope of oversight. Similarly, some agencies do not identify and dispose of unneeded personal property on an ongoing basis. Rather, they may wait until they face a \"triggering event,\" such as an office relocation or other real property transition. Without adequate planning for these events, the disposal of unneeded personal property could potentially delay the project and increase costs. Many agencies are unclear on how to use their exchange/sale authorities and often do not choose the option that would provide the greatest potential financial benefits to the government. The Federal Personal Property Management Act of 2018 ( P.L. 115-419 ) seeks to address these inconsistent policies and practices. The legislation requires the General Services Administration (GSA) to establish government-wide capitalization and accountability thresholds. It also requires GSA to issue guidance that directs agencies to conduct an annual inventory and assessment of capitalized personal property to identify which items, if any, are no longer needed and should be declared excess. The guidance must also require agencies to regularly inventory and assess their accountable personal property. Implementation of the Federal Assets Sale and Transfer Act of 2017 (FASTA; P.L. 114-287 ) may result in the disposal of dozens or hundreds of government buildings within the same time frame. FASTA requires agencies to work with GSA to develop a list of recommended real property projects, including the sale, conveyance, consolidation, and reconfiguration of space. GSA submits the recommendations to a newly established Public Buildings Reform Board, which reviews them and submits a revised list to the Office of Management and Budget (OMB) director. If the OMB director approves of the list in its entirety, then all of the recommendations must be implemented within six years. Incorporating personal property plans into the FASTA process may mitigate the risk of delays resulting from the disposition of excess items.", "document_type": "crs"}
{"report": "P rescription drugs play a vital role in American public health. The Centers for Disease Control and Prevention (CDC) estimates that between 2011 and 2014 just under half of all Americans had used one or more prescription drugs in the last 30 days. On the other hand, unfettered access to drugs may pose serious public health risks. The CDC reports that in 2017 over 70,000 Americans died of overdoses on prescription and nonprescription drugs. The Controlled Su bstances Act (CSA or the Act) seeks to balance those competing interests. The CSA regulates controlled substances âprescription and nonprescription drugs and other substances that are deemed to pose a risk of abuse and dependence. By establishing rules for the proper handling of controlled substances and imposing penalties for any illicit production, distribution, and possession of such substances, the Act seeks to protect the public health from the dangers of controlled substances while also ensuring that patients have access to pharmaceutical controlled substances for legitimate medical purposes. This report provides an overview of the CSA and select legal issues that have arisen under the Act, with a focus on legal issues of concern for the 116th Congress. The report first summarizes the history of the CSA and explains how the regulation of drugs under the CSA overlaps with other federal and state regulatory regimes. It then outlines the categoriesâknown as sch edules âinto which controlled substances subject to the Act are divided and discusses how substances are added to the schedules. The report next summarizes the CSA's registration requirements, which apply to entities that register with the government to legally handle pharmaceutical controlled substances, before summarizing the CSA's criminal trafficking provisions, which apply to activities involving controlled substances that are not sanctioned under the Act. Finally, the report outlines select legal issues for Congress related to the CSA, including issues related to the response to the opioid crisis, the control of analogues to the potent opioid fentanyl, the growing divergence between the treatment of marijuana under federal and state law, and the legal limits on clinical research involving certain controlled substances. Congress has regulated drugs in some capacity since the 19th century. Federal drug regulation began with tariffs, import and export controls, and purity and labeling requirements applicable to narcotic drugs including opium and coca leaves and their derivatives. With the passage of the Harrison Narcotics Tax Act of 1914, Congress began in earnest to regulate the domestic trade in narcotic drugs. The Harrison Act provided for federal oversight of the legal trade in narcotic drugs and imposed criminal penalties for illicit trafficking in narcotics. Over the course of the 20th century, the list of drugs subject to federal control expanded beyond narcotic drugs to include marijuana, depressants, stimulants, and hallucinogens. Congress revamped federal drug regulation by enacting the Comprehensive Drug Abuse Prevention and Control Act of 1970. The Comprehensive Drug Abuse Prevention and Control Act repealed nearly all existing federal substance control laws and, for the first time, imposed a unified framework of federal controlled substance regulation. Title II of the Comprehensive Drug Abuse Prevention and Control Act is known as the Controlled Substances Act. The CSA regulates certain drugs âwhether medical or recreational, legally or illicitly distributedâthat are considered to pose a risk of abuse and dependence. In enacting the CSA, Congress recognized two competing interests related to drug regulation: on the one hand, many drugs \"have a useful and legitimate medical purpose and are necessary to maintain the health and general welfare of the American people.\" On the other hand, \"illegal importation, manufacture, distribution, and possession and improper use of controlled substances have a substantial and detrimental effect on the health and general welfare of the American people.\" Accordingly, the Act simultaneously aims to protect public health from the dangers of controlled substances while also ensuring that patients have access to pharmaceutical controlled substances for legitimate medical purposes. To accomplish those two goals, the statute creates two overlapping legal schemes. Registration provisions require entities working with controlled substances to register with the government, take steps to prevent diversion and misuse of controlled substances, and report certain information to regulators. Trafficking provisions establish penalties for the production, distribution, and possession of controlled substances outside the legitimate scope of the registration system. The CSA does not apply to all drugs. As discussed below, substances must be specifically identified for control (either individually or as a class) to fall within the scope of the Act. For medical drugs, the CSA primarily applies to prescription drugs, not drugs available over the counter. Moreover, the statute does not apply to all prescription drugs, but rather to a subset of those drugs deemed to warrant additional controls. As for nonpharmaceutical drugs, well-known recreational drugs such as marijuana, cocaine, heroin, and lysergic acid diethylamide (LSD) are all controlled substances, as are numerous lesser-known substances, some of which are identified only by their chemical formulas. Some recreational drugs are not classified as federally controlled substances. Alcohol and tobacco, which might otherwise qualify as drugs potentially warranting control under the CSA, are explicitly excluded from the scope of the Act, as is hemp that meets certain statutory requirements. Finally, it is possible for legitimate researchers and illicit drug manufacturers to formulate new drugs not contemplated by the Act. Those drugs may fall outside the scope of the CSA unless they are classified as controlled substances. Many drugs classified as controlled substances subject to the CSA are also subject to other legal regimes. For example, all prescription drugs, including those subject to the Act, are subject to the Federal Food, Drug, and Cosmetic Act (FD&C Act). The U.S. Food and Drug Administration (FDA) is the agency primarily responsible for enforcing the FD&C Act, which prohibits the \"introduction or delivery for introduction into interstate commerce of any . . . drug . . . that is adulterated or misbranded.\" The FD&C Act defines misbranding broadly: a drug is considered misbranded if, among other things, its labeling, advertising, or promotion \"is false or misleading in any particular.\" Unlabeled drugs are considered misbranded, as are prescription drugs that FDA has not approved, including imported drugs. In addition, misbranding may include misrepresenting that a substance offered for sale is a brand-name drug (even if the seller believes the substance for sale is chemically identical to the brand-name drug). The FD&C Act provides that a drug is deemed to be adulterated if, among other things, it \"consists in whole or in part of any filthy, putrid, or decomposed substance,\" \"it has been prepared, packed, or held under insanitary conditions,\" its container is made of \"any poisonous or deleterious substance,\" or its strength, quality, or purity is not as represented. The key aims of the FD&C Act are related to but distinct from those of the CSA. The CSA establishes distribution controls to prevent the misuse of substances deemed to pose a potential danger to the public welfare. The FD&C Act, by contrast, is a consumer protection statute that seeks to prevent harm to consumers who obtain drugs (and other public health products) through commercial channels. Any person or organization that produces, distributes, or otherwise works with prescription drugs that are also controlled substances must comply with the requirements of both the CSA and the FD&C Act. With respect to both pharmaceutical and nonpharmaceutical drugs, many drugs subject to the Act are also subject to state drug laws. State substance control laws often mirror federal law and are relatively uniform across jurisdictions because almost all states have adopted a version of the Uniform Controlled Substances Act (UCSA). However, states are free to modify the UCSA, and have done so to varying extents. Moreover, the model statute does not specify sentences for violations, so penalties for state controlled substance offenses vary widely. There is not a complete overlap between drugs subject to federal and state control for several reasons. First, states may elect to impose controls on substances that are not subject to the CSA. For example, some states have controlled the fentanyl analogues benzylfentayl and thenylfentanyl, but those substances are not currently subject to federal control. Second, states may wish to adopt federal scheduling decisions at the state level but lag behind federal regulators due to the need for a separate state scheduling process. Third, states may decide not to impose state controls on substances subject to the CSA, or they may choose to impose modified versions of federal controls at the state level. Crucially, however, the states cannot alter federal law, and when state and federal law conflict, the federal law controls. Thus, when states \"legalize\" or \"decriminalize\" a federally controlled substance (as many have done recently with respect to marijuana), the sole result is that the substance is no longer controlled under state law. Any federal controls remain in effect and potentially enforceable in those states. The heart of the CSA is its system for classifying controlled substances, as nearly all the obligations and penalties that the Act establishes flow from the classification system. Drugs become subject to the CSA by being placed in one of five lists, referred to as \"schedules.\" Both the Administrator of the Drug Enforcement Administration (DEA)âan arm of the Department of Justice (DOJ)âand Congress can place a substance in a schedule, move a controlled substance to a different schedule, or remove a controlled substance from a schedule. As discussed below, scheduling decisions by Congress and DEA follow different procedures. The CSA establishes five categories of controlled substances, referred to as Schedules I through V. The schedule on which a controlled substance is placed determines the level of restriction on its production, distribution, and possession, as well as the penalties applicable to any improper handling of the substance. As Figure 1 describes, each controlled substance is assigned to a schedule based on its medical utility and its potential for abuse and dependence. A lower schedule number corresponds to greater restrictions, so controlled substances in Schedule I are subject to the most stringent controls, while substances in Schedule V are subject to the least stringent. Notably, because substances in Schedule I have no accepted medical use, it is only legal to produce, dispense, and possess those substances in the context of federally approved scientific studies. In addition to the controlled substances listed in Schedules I through V, the CSA also regulates (1)Â  controlled substance analogues and (2) listed chemicals . Under the CSA, a controlled substance analogue is a substance that FDA has not approved and that is not specifically scheduled under the Act, but that has (1) a chemical structure substantially similar to that of a controlled substance in Schedule I or II, or (2) an actual or intended effect that is \"substantially similar to or greater than the stimulant, depressant, or hallucinogenic effect on the central nervous system of a controlled substance in schedule I or II.\" A substance that meets those criteria and is intended for human consumption is treated as a controlled substance in Schedule I. Listed chemicals subject to the CSA are precursor chemicals for controlled substances. They may be placed on one of two lists: List I Chemicals âdesignated chemicals that, in addition to legitimate uses, are used in manufacturing a controlled substance in violation of the CSA and are important to the manufacture of a controlled substance. List II Chemicals âdesignated chemicals that, in addition to legitimate uses, are used in manufacturing a controlled substance in violation of the CSA. List I chemicals include substances such as ephedrine, white phosphorous, and iodine, which are used to produce methamphetamine, as well as chemicals used to manufacture LSD, MDMA, and other drugs. List II chemicals include, among others, solvents such as acetone, hydrochloric acid, and sulfuric acid. Listed chemicals are subject to some of the same controls as controlled substances. In addition, entities that sell listed chemicals must record the transactions, report them to regulators, and comply with statutory limits on sales to a single purchaser. There are a number of differences between how controlled substance analogues and listed chemicals are regulated. A key difference between controlled substance analogues and listed chemicals is that a substance does not qualify for control as an analogue unless it is intended for human consumption as a substitute for a controlled substance, while listed chemicals generally are not intended for human consumption standing alone but are used as ingredients in the manufacture of controlled substances. In addition, listed chemicals include only specific substances identified for control under the CSA by statute or rulemaking. By contrast, controlled substance analogues need not be individually scheduled; they need only satisfy the statutory criteria. Substances may be added to or removed from a schedule or moved to a different schedule through agency action or by legislation. Perhaps the most straightforward way to change a substance's legal status under the CSA is for Congress to pass legislation to place a substance under control, alter its classification, or remove it from control. The procedural requirements for administrative scheduling discussed in the following section do not apply to legislative scheduling. Thus, Congress may use its legislative scheduling power to respond quickly to a drug it views as posing an urgent concern. For example, the Synthetic Drug Abuse Prevention Act of 2012 permanently added two synthetic cathinones (central nervous system stimulants) and certain cannabimimetic substances (commonly referred to as synthetic marijuana) to Schedule I. DEA makes scheduling decisions through a complex process requiring participation by other agencies and the public. DEA may undertake administrative scheduling on its own initiative, at the request of the U.S. Department of Health and Human Services (HHS), or \"on the petition of any interested party.\" With regard to the last route for initiating administrative scheduling, the DEA Administrator may deny a petition to begin scheduling proceedings based on a finding that \"the grounds upon which the petitioner relies are not sufficient to justify the initiation of proceedings.\" Denial of a petition to initiate scheduling proceedings is subject to judicial review, but courts will overturn a denial only if it is arbitrary and capricious. Before initiating rulemaking proceedings, DEA must request a scientific and medical evaluation of the substance at issue from the Secretary of HHS. The Secretary has delegated the authority to prepare the scientific and medical evaluation to FDA. In preparing the evaluation, FDA considers factors including the substance's potential for abuse and dependence, scientific evidence of its pharmacological effect, the state of current scientific knowledge regarding the substance, any risk the substance poses to the public health, and whether the substance is an immediate precursor of an existing controlled substance. Based on those factors, FDA makes a recommendation on whether the substance should be controlled and, if so, in which schedule it should be placed. FDA's scientific and medical findings are binding on DEA. And if FDA recommends against controlling the substance, DEA may not schedule it. Upon receipt of FDA's report, the DEA Administrator evaluates all of the relevant data and determines whether the substance should be scheduled, rescheduled, or removed from control. Before placing a substance on a schedule, the DEA Administrator must make specific findings that the substance meets the applicable criteria related to accepted medical use and potential for abuse and dependence. DEA scheduling decisions are subject to notice-and-comment rulemaking, meaning that interested parties must have the opportunity to submit comments on the DEA Administrator's decision before it becomes final. The DEA Administrator's decision whether to schedule, reschedule, or deschedule a substance through the ordinary administrative process is subject to judicial review. Such review is generally deferential: courts accept DEA's interpretation of the CSA as long as the interpretation of ambiguous statutory text is reasonable, and the CSA provides that the DEA Administrator's findings of fact are \"conclusive\" on judicial review if the findings are supported by substantial evidence. Ordinary DEA scheduling decisions are made through notice-and-comment rulemaking and can take years to consider and finalize. Recognizing that in some cases faster scheduling may be appropriate, Congress amended the CSA through the Comprehensive Crime Control Act of 1984 to allow the DEA Administrator to place a substance in Schedule I temporarily when \"necessary to avoid an imminent hazard to the public safety.\" Further amendments enacted in the Synthetic Drug Abuse Prevention Act of 2012 extended the maximum length of the temporary scheduling period. Before issuing a temporary scheduling order, the DEA Administrator must provide 30 days' notice to the public and the Secretary of HHS stating the basis for temporary scheduling. In issuing a temporary scheduling order, the DEA Administrator must consider only a subset of the factors relevant to permanent scheduling: the history and current pattern of abuse of the substance at issue; the scope, duration, and significance of abuse; and the risk to the public health. The DEA Administrator must also consider any comments from the Secretary of HHS. A substance may be temporarily scheduled for up to two years; if permanent scheduling proceedings are pending, the DEA Administrator may extend the temporary scheduling period for up to one additional year. A temporary scheduling order is vacated once permanent scheduling proceedings are completed with respect to the substance at issue. The CSA provides that emergency scheduling orders are not subject to judicial review. DEA has recently used its emergency scheduling power to temporarily control certain analogues to the opioid fentanyl and several synthetic cannabinoids. The United States is a party to the Single Convention on Narcotic Drugs of 1961, which was designed to establish effective control over international and domestic traffic in narcotics, coca leaf, cocaine, and marijuana. That treaty requires signatories, among other things, to criminalize \"cultivation, production, manufacture, extraction, preparation, possession, offering, offering for sale, distribution, purchase, sale, . . . importation and exportation of drugs\" contrary to the Convention. The United States is also party to the Convention on Psychotropic Substances of 1971, which was designed to establish similar control over stimulants, depressants, and hallucinogens. The Convention on Psychotropic Substances requires parties to adopt various controls applicable to controlled substances, including mandating licenses for manufacture and distribution, requiring prescriptions for dispensing such substances, and adopting measures \"for the repression of acts contrary to laws or regulations\" adopted pursuant to treaty obligations. If existing controls of a drug are less stringent than those required by the United States' treaty obligations, the CSA directs the DEA Administrator to \"issue an order controlling such drug under the schedule he deems most appropriate to carry out such obligations.\" Scheduling pursuant to international treaty obligations does not require the factual findings that are necessary for other administrative scheduling actions, and may be implemented without regard to the procedures outlined for regular administrative scheduling. Once a substance is brought within the scope of the CSA, almost any person or organization that handles that substance, except for the end user, becomes subject to a comprehensive system of regulatory requirements. The goal of the regulatory scheme is to create a \"closed system\" of distribution in which only authorized handlers may distribute controlled substances. Central to the closed system of distribution is the requirement that individuals or entities that work with controlled substances register with DEA. Those covered entities, which include manufacturers, distributors, practitioners, and pharmacists, are referred to as registrants . As DEA has described the movement of a pharmaceutical controlled substance from the manufacturer to the patient, [A] controlled substance, after being manufactured by a DEA-registered manufacturer, may be transferred to a DEA-registered distributor for subsequent distribution to a DEA-registered retail pharmacy. After a DEA-registered practitioner, such as a physician or a dentist, issues a prescription for a controlled substance to a patient . . . , that patient can fill that prescription at a retail pharmacy to obtain that controlled substance. In this system, the manufacturer, the distributor, the practitioner, and the retail pharmacy are all required to be DEA registrants, or to be exempted from the requirement of registration, to participate in the process. As discussed further below, registrants must maintain records of transactions involving controlled substances, establish security measures to prevent theft of such substances, and monitor for suspicious orders to prevent misuse and diversion. Thus, the registration system aims to ensure that any controlled substance is always accounted for and under the control of a DEA-registered person until it reaches a patient or is destroyed. Under the CSA, every person who produces, distributes, or dispenses any controlled substance, or who proposes to engage in any of those activities, must register with DEA, unless an exemption applies. Significantly, the CSA exempts from registration individual consumers of controlled substances, such as patients and their family members, whom the act refers to as \"ultimate users.\" DEA has explained that ultimate users need not register because the controlled substances in their possession \"are no longer part of the closed system of distribution and are no longer subject to DEA's system of corresponding accountability.\" Manufacturers and distributors of controlled substances, such as pharmaceutical companies, must register with DEA annually. By contrast, entities that dispense controlled substances, such as hospitals, pharmacies, and individual medical practitioners and pharmacists, may obtain registrations lasting between one and three years. Registrations specify the extent to which registrants may manufacture, possess, distribute, or dispense controlled substances, and each registrant may engage only in the specific activities covered by its registration. In some instances, applicants must obtain more than one registration to comply with the CSA. For example, separate registrations are required for each principal place of business where controlled substances are manufactured, distributed, imported, exported, or dispensed. And certain activities can give rise to additional registration requirements. For instance, a special registration is required to operate an opioid treatment program such as a methadone clinic. The CSA directs the DEA Administrator to grant registration if it would be consistent with the public interest, outlining the criteria the DEA Administrator must consider when evaluating the public interest. The criteria vary depending on (1) whether the applicant is a manufacturer, distributor, researcher, or practitioner, and (2) the classification of the controlled substances that are the focus of the application. However, the requirements generally serve to help DEA determine whether the applicant has demonstrated the capacity to maintain effective controls against diversion and comply with applicable laws. The registration of an individual or organization expires at the end of the registration period unless it is renewed. Registration also ends when the registrant dies, ceases legal existence, or discontinues business or professional practice. A registration cannot be transferred to someone else without the express, written consent of the DEA Administrator. The CSA and its implementing regulations impose multiple recordkeeping and reporting requirements on registrants. Registrants must undertake a biennial inventory of all stocks of controlled substances they have on hand, and maintain records of each controlled substance they manufacture, receive, sell, deliver, or otherwise dispose of. In addition, controlled substances in Schedules I and II may only be distributed pursuant to a written order. Copies of each order form must be transmitted to DEA. Records of orders must be preserved for two years and made available for government review upon request. Registrants are also required to \"design and operate a system to identify suspicious orders\" and to notify DEA of any suspicious orders they detect. DEA regulations provide that \"[s]uspicious orders include orders of unusual size, orders deviating substantially from a normal pattern, and orders of unusual frequency.\" That list is not exhaustive, howeverâorders may also be deemed suspicious if, for example, a pharmacy mostly sells controlled substances rather than a more typical mix of controlled and noncontrolled medications, if many customers pay for controlled substances with cash, or if pharmacies purchase drugs at a price higher than insurance would reimburse. The CSA permits the DEA Administrator to inspect the establishment of any registrant or applicant for registration. DEA regulations express the intent of the agency \"to inspect all manufacturers of controlled substances listed in Schedules I and II and distributors of controlled substances listed in Schedule I once each year,\" and other manufacturers and distributors of controlled substances \"as circumstances may require.\" Absent the consent of the registrant or special circumstances such as an imminent danger to health or safety, a warrant is required for inspection. \"Any judge of the United States or of a State court of record, or any United States magistrate judge\" may issue such a warrant \"within his territorial jurisdiction.\" Issuance of a warrant requires probable cause. The CSA defines probable cause as \"a valid public interest in the effective enforcement of this subchapter or regulations thereunder sufficient to justify\" the inspection at issue. The CSA's implementing regulations require all registrants to \"provide effective controls and procedures to guard against theft and diversion of controlled substances.\" The regulations establish specific physical security requirements, which vary depending on the type of registrant and the classification of the controlled substance at issue. For example, nonpractitioners must store controlled substances in Schedules I and II in a safe, steel cabinet, or vault that meets certain specifications. Nonpractitioners must further ensure that controlled substance storage areas are \"accessible only to an absolute minimum number of specifically authorized employees.\" Practitioners must store controlled substances \"in a securely locked, substantially constructed cabinet.\" In addition to those physical security requirements, practitioners subject to CSA registration may not \"employ, as an agent or employee who has access to controlled substances\" any person who has been convicted of a felony related to controlled substances, had an application for CSA registration denied, had a CSA registration revoked, or surrendered a CSA registration for cause. To prevent the production of excess amounts of controlled substances, which may be prone to diversion, the CSA directs DEA to set production quotas for controlled substances in Schedules I and II and for ephedrine, pseudoephedrine, and phenylpropanolamine. The DEA Administrator is also required to set individual quotas for each registered manufacturer seeking to produce such substances and to limit or reduce individual quotas as necessary to prevent oversupply. With respect to certain opioid medications, the Act further directs the DEA Administrator to estimate the amount of diversion of each opioid and reduce quotas to account for such diversion. Relatedly, the Controlled Substances Import and Export Act allows the importation of certain controlled substances and listed chemicals only in amounts the DEA Administrator determines to be \"necessary to provide for the medical, scientific, or other legitimate needs of the United States.\" Under the CSA, controlled substances in Schedules II through IV must be provided directly to an ultimate user by a medical practitioner or dispensed pursuant to a prescription. The Act does not mandate that Schedule V substances be distributed by prescription, but such substances may be dispensed only \"for a medical purpose.\" As a practical matter, Schedule V substances are almost always dispensed pursuant to a prescription due to separate requirements under the FD&C Act or state law. DEA is the federal agency primarily responsible for enforcing the CSA's registration requirements. If a registrant contravenes the Act's registration requirements, DEA may take formal or informal administrative action including issuing warning letters, suspending or revoking an entity's registration, and imposing fines. The DEA Administrator may suspend or revoke a registration (or deny an application for registration) on several bases, including findings that a registrant or applicant has falsified application materials, been convicted of certain felonies, or \"committed such acts as would render his registration . . . inconsistent with the public interest.\" Unless the DEA Administrator finds that there is an imminent danger to the public health or safety, the DEA Administrator must provide the applicant or registrant with notice, the opportunity for a hearing, and the opportunity to submit a corrective plan before denying, suspending, or revoking a registration. Imminent danger exists when, due to the failure of the registrant to comply with the registration requirements, \"there is a substantial likelihood of an immediate threat that death, serious bodily harm, or abuse of a controlled substance will occur in the absence of an immediate suspension of the registration\" Those conditions are satisfied, for example, when a practitioner prescribes controlled substances outside the usual course of professional practice without a legitimate medical purpose in violation of state and federal controlled substances laws. A violation of the CSA's registration requirementsâincluding failure to maintain records or detect and report suspicious orders, noncompliance with security requirements, or dispensing controlled substances without the necessary prescriptionsâgenerally does not constitute a criminal offense unless the violation is committed knowingly. However, in the event of a knowing violation DEA, through DOJ, may bring criminal charges against both individual and corporate registrants. Potential penalties vary depending on the offense. For example, a first criminal violation of the registration requirements by an individual is punishable by a fine or up to a year in prison. If \"a registered manufacturer or distributor of opioids\" commits knowing violations such as failing to report suspicious orders for opioids or maintain effective controls against diversion of opioids, it may be punished by a fine of up to $500,000. In addition to the registration requirements outlined above, the CSA also contains provisions that define multiple offenses involving the production, distribution, and possession of controlled substances outside the legitimate confines of the registration system, that is, the Act's trafficking provisions . Although the word \"trafficking\" may primarily call to mind the illegal distribution of recreational drugs, the CSA's trafficking provisions in fact apply to a wide range of illicit activities involving either pharmaceutical or nonpharmaceutical controlled substances. The CSA's trafficking provisions make it illegal to \"manufacture, distribute, or dispense, or possess with intent to manufacture, distribute, or dispense, a controlled substance,\" except as authorized under the Act. They also make it unlawful \"knowingly or intentionally to possess a controlled substance,\" unless the substance was obtained in a manner authorized by the CSA. Penalties vary based on the type and amount of the controlled substance in question. Other sections of the CSA define more specific offenses, such as distributing controlled substances at truck stops or rest areas, at schools, or to people under age 21; endangering human life while manufacturing a controlled substance; selling drug paraphernalia; and engaging in a \"continuing criminal enterprise\"âthat is, an ongoing, large-scale drug dealing operation. An attempt or conspiracy to commit any offense defined under the Act also constitutes a crime. DOJ enforces the CSA's trafficking provisions by bringing criminal charges against alleged violators. Notably, the CSA's registration system and its trafficking regime are not mutually exclusive, and participation in the registration system does not insulate registrants from the statute's trafficking penalties. In United States v. Moore , the Supreme Court rejected a claim that the CSA \"must be interpreted in light of a congressional intent to set up two separate and distinct penalty systems,\" one for registrants and one for persons not registered under the Act. The Court in Moore held that physicians registered under the CSA can be prosecuted under the Act's general drug trafficking provisions \"when their activities fall outside the usual course of professional practice.\" Numerous judicial opinions provide guidance on what sorts of conduct fall outside the usual course of professional practice. The defendant in Moore was a registered doctor who distributed large amounts of methadone with inadequate patient exams and no precautions against misuse or diversion. The Court held that \"[t]he evidence presented at trial was sufficient for the jury to find that respondent's conduct exceeded the bounds of 'professional practice'\" because, \"[i]n practical effect, he acted as a large-scale 'pusher' not as a physician.\" Appellate courts have relied on Moore to uphold convictions of a pharmacist who signed thousands of prescriptions for sale through an online pharmacy, and a practitioner who \"freely distributed prescriptions for large amounts of controlled substances that are highly addictive, difficult to obtain, and sought after for nonmedical purposes,\" including prescribing one patient more than 20,000 pills in a single year. But several courts have cautioned that a conviction under Moore requires more than a showing of mere professional malpractice. For instance, the U.S. Court of Appeals for the Ninth Circuit (Ninth Circuit) has held that the prosecution must prove that the defendant \"acted with intent to distribute the drugs and with intent to distribute them outside the course of professional practic e ,\" suggesting that intent must be established with respect to the nature of the defendant's failure to abide by professional norms. For decades, DOJ has brought criminal trafficking charges against doctors and pharmacists who dispensed pharmaceutical controlled substances outside the usual course of professional practice. In April 2019, DOJ for the first time brought criminal trafficking charges against a pharmaceutical companyâRochester Drug Cooperativeâand two of its executives based on the company's sale of the opioids oxycodone and fentanyl to pharmacies that illegally distributed the drugs. Similarly, in July 2019, a federal grand jury indicted defendants including two former executives at the pharmaceutical distributor Miami-Luken, Inc. for conspiracy to violate the CSA's trafficking provisions. Violations of the CSA's trafficking provisions are criminal offenses that may give rise to large fines and significant jail time. Penalties vary according to the offense and may further vary based on the type and amount of the controlled substance at issue. Unauthorized simple possession of a controlled substance may prompt a minimum fine of $1,000 and a term of up to a year in prison. Distribution of large quantities of certain drugsâincluding Schedule I controlled substances such as heroin and LSD and Schedule II controlled substances such as cocaine and methamphetamineâcarries a prison sentence of 10 years to life and a fine of up to $10 million for an individual or a fine of up to $50 million for an organization. Penalties increase for second or subsequent offenses, or if death or serious bodily injury results from the use of the controlled substance. Compared with the CSA's registration provisions, prosecution under the Act's trafficking provisions generally entails greater potential liabilityâparticularly for individual defendantsâbut also entails a more exacting burden of proof. The CSA is not the only means to target misconduct related to the distribution of pharmaceutical and nonpharmaceutical controlled substances. Rather, such conduct can give rise to liability under numerous other provisions of federal and state law. For example, drug companies may face administrative sanctions or criminal charges under the FD&C Act. Companies and criminal organizations may be subject to federal charges under the Racketeer Influenced and Corrupt Organizations Act. And manufacturers and distributors of opioids currently face numerous civil suits under federal and state law based on the companies' marketing and distribution of prescription opioids. Drug regulation has received significant attention from Congress in recent years, prompting a range of proposals concerning the opioid epidemic; the proliferation of synthetic drugs, in particular analogues to the opioid fentanyl; the divergence between the status of marijuana under state and federal law; and the ability of researchers to conduct clinical research involving Schedule I controlled substances. One of the most salient current issues in the realm of controlled substance regulation is the opioid epidemic. Opioids are drugs derived from the opium poppy or emulating the effects of opium-derived drugs. Some opioids have legitimate medical purposes, primarily related to pain management, while others have no recognized medical use. Both pharmaceutical opioidsâsuch as oxycodone, codeine, and morphineâand nonpharmaceutical opioidsâsuch as heroinâmay pose a risk of abuse and dependence and may be dangerous or even deadly in excessive doses. The CDC reports that overdoses on prescription and nonprescription opioids claimed a record 47,600 lives in 2017. The CDC further estimates that the misuse of prescription opioids alone costs the United States $78.5 billion per year. In recent years, the opioid crisis has prompted various legislative proposals aiming to prevent the illicit distribution of opioids; curb the effects of the crisis on individuals, families, and communities; and cover the costs of law enforcement efforts and treatment programs. In 2016, Congress enacted the Comprehensive Addiction and Recovery Act of 2016 (CARA) and the 21st Century Cures Act (Cures Act). CARA authorized grants to address the opioid crisis in areas including abuse prevention and education, law enforcement, and treatment, while the Cures Act, among other things, provided additional funding to states combating opioid addiction. In 2018, Congress enacted the Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (SUPPORT Act), which sought to address the opioid crisis through far-ranging amendments to the CSA, the FD&C Act, and other statutes. Key amendments to the CSA under the SUPPORT Act included provisions expanding access to medication-assisted treatment for opioid addiction, specifying the factors for determining whether a controlled substance analogue is intended for human consumption, revising the factors DEA considers when establishing opioid production quotas, and codifying the definition of \"suspicious order\" and outlining the CSA's suspicious order reporting requirements. Notwithstanding the flurry of recent legal changes, many recent legislative proposals seek to further address the opioid crisis by amending the CSA. For example, the DEA Enforcement Authority Act of 2019 would revise the standard for \"imminent danger\" required to support an immediate suspension of DEA registration. Specifically, the bill would lower the threshold for what constitutes imminent danger, requiring \" probable cause that death, serious bodily harm, or abuse of a controlled substance will occur in the absence of an immediate suspension of the registration,\" rather than the current statutory requirement that \" a substantial likelihood of an immediate threat that death, serious bodily harm, or abuse of a controlled substance will occur in the absence of an immediate suspension of the registration.\" In addition, the John S. McCain Opioid Addiction Prevention Act would, as part of the CSA's registration regime, require medical practitioners applying for new or renewed CSA registration to certify that they will not prescribe more than a seven-day supply of opioids for the treatment of acute pain. The LABEL Opioids Act would amend the CSA to require that opioids in Schedules I through V bear labels warning that they can cause dependence, addiction, and overdose. Failure to comply with the labeling requirements would violate the CSA's registration requirements. Some proposals target specific opioids, especially fentanyl. For instance, the Ending the Fentanyl Crisis Act of 2019 would amend the CSA to reduce the amounts of fentanyl required to constitute a trafficking offense. The Comprehensive Fentanyl Control Act, introduced in the 115th Congress, would likewise have reduced the amount of fentanyl triggering criminal liability. That bill would have also increased penalties applicable to offenses involving fentanyl and provided separate procedures for emergency scheduling of synthetic opioids. The Screening All Fentanyl-Enhanced Mail Act of 2019 seeks to require screening of all inbound international mail and express cargo from high-risk countries to detect and prevent the importation of illicit fentanyl and other synthetic opioids. Finally, the Blocking Deadly Fentanyl Imports Act would aim to gather information about the illicit production of illicit fentanyl in foreign countries and to withhold bilateral assistance from countries that fail to enforce certain controlled substance regulations. A related issue currently before Congress is the proliferation of synthetic drugs, especially synthetic opioids. Synthetic drugs are drugs that are chemically produced in a laboratory; they may have a chemical structure identical to or different from that of a natural drug. Synthetic drugs are often intended to mimic or enhance the effects of natural drugs, but have chemical structures that have been slightly modified to circumvent existing drug laws. One particular concern in this area relates to synthetic opioids, including fentanyl analogues and other fentanyl-like substances. Fentanyl is a powerful opioid that has legitimate medical uses including pain management for cancer patients. But, due to its potency, it also poses a particularly high risk of abuse, dependency, and overdose. Prescription fentanyl is a Schedule II controlled substance; multiple nonpharmaceutical substances related to fentanyl are controlled in Schedule I. However, experts have noted that it is relatively easy to manipulate the chemical structure of fentanyl in order to produce new substances that may have similar effects to fentanyl or pose other dangers if consumed but that are not included in the CSA's schedules. Since March 2011, DEA has used its emergency scheduling authority 23 times to impose temporary controls on 68 synthetic drugs, including 17 fentanyl-like substances. Most recently, in February 2018, DEA issued an emergency scheduling order that applies broadly to all \"fentanyl-related substances\" that meet certain criteria related to their chemical structure. Absent further action by DEA or Congress, the temporary scheduling order will expire in February 2020. Even if not individually scheduled on a temporary or permanent basis, fentanyl-related substances may still be subject to DEA control as controlled substance analogues. However, to secure a conviction for an offense involving an analogue controlled substance, DOJ must, among other elements, prove beyond a reasonable doubt that the substance at issue (1) is intended for human consumption and (2) has either a chemical structure substantially similar to the chemical structure of a Schedule I or II controlled substance or an actual or intended effect similar to or greater than that of a Schedule I or II controlled substance. Thus, DOJ has stated that analogue controlled substance prosecutions can be burdensome because they raise \"complex chemical and scientific issues,\" and has argued that permanent scheduling of fentanyl analogues will reduce uncertainty and aid enforcement. Several proposals in the 116th Congress would seek to permanently schedule fentanyl analogues. For instance, the Stopping Overdoses of Fentanyl Analogues Act would permanently add to Schedule I certain specific synthetic opioids, as well as the whole category of \"fentanyl-related substances,\" as defined in the February 2018 emergency scheduling order. The Modernizing Drug Enforcement Act of 2019 would amend the CSA to add to Schedule I all \"mu opioid receptor agonists\" not otherwise scheduled, subject to certain exceptions. One of the sponsors of the Modernizing Drug Enforcement Act has stated that the bill's aim is \"to automatically classify drugs or other substances that act as opioids, such as synthetic fentanyl, as a schedule I narcotic based on their chemical structure and functions,\" avoiding the need for such substances to be individually scheduled. A key challenge in permanently scheduling fentanyl analogues is how to define the substances subject to regulation. Not all analogues of fentanyl have effects similar to fentanyl itself, and due to the large number of potential analogues there are many whose effects are unknown. Defining covered substances based on chemical structure may be overinclusive because the definition may include inactive substances, potentially allowing for prosecution of individuals who possess substances that pose no threat to public health and safety. On the other hand, such a definition may also be underinclusive because it excludes opioids that are not chemically related to fentanyl or that are made using different modifications to fentanyl's chemical structure. Alternatively, defining covered opioids based on their effects rather than their chemical structure could impose a heavy burden on prosecutors, similar to the burden they currently face when bringing analogue controlled substance charges. Another area raising a number of legal considerations for the 116th Congress is the marijuana policy gapâthe increasing divergence between federal and state law in the area of marijuana regulation. As of June 2019, 11 states and the District of Columbia have passed laws removing state prohibitions on medical and recreational marijuana use by adults age 21 or older. An additional 35 states have passed laws permitting medical use of marijuana or CBD. However, marijuana remains a Schedule I controlled substance under federal law, and state legislation decriminalizing marijuana has no effect on that status. Because of resource limitations, DOJ typically has not prosecuted individuals who possess marijuana for personal use on private property, but instead has \"left such lower-level or localized marijuana activity to state and local authorities through enforcement of their own drug laws.\" Moreover, in each budget cycle since FY2014 Congress has passed an appropriations rider preventing DOJ from using taxpayer funds to prevent the states from \"implementing their own laws that authorize the use, distribution, possession, or cultivation of medical marijuana.\" The current appropriations rider is in effect through November 21, 2019. Several courts have interpreted the appropriations rider to bar DOJ from expending any appropriated funds to prosecute activities involving marijuana that are conducted in \"strict compliance\" with state law. However, activities that fall outside the scope of state medical marijuana laws remain subject to prosecution. For example, in United States v. Evans , the Ninth Circuit upheld the prosecution of medical marijuana growers who smoked some of the marijuana they grew because the defendants failed to show they were \"qualifying patients\" who acted in strict compliance with state medical marijuana law. Notwithstanding the appropriations rider, marijuana-related activity may still give rise to serious legal consequences under federal law. DOJ issued guidance in 2018 reaffirming the authority of federal prosecutors to exercise prosecutorial discretion to target federal marijuana offenses \"in accordance with all applicable laws, regulations, and appropriations.\" Furthermore, regardless whether they are subject to criminal prosecution, participants in the cannabis industry may face numerous collateral consequences arising from the federal prohibition of marijuana because other federal laws impose noncriminal consequences based on criminal activity, including violations for the CSA. For example, cannabis businesses that are legal under state law may be unable to access banking services due to federal anti-money laundering laws, and those businesses may be ineligible for certain federal tax deductions. The involvement of income from a cannabis-related business may also prevent a bankruptcy court from approving a bankruptcy plan. And participation in the cannabis industry, even if legal under state law, may have adverse immigration consequences. Numerous proposals currently before Congress aim to address issues related to the marijuana policy gap. Some proposals target specific issues that arise from the divergence between federal and state law. For instance, the Secure And Fair Enforcement Banking Act of 2019 (SAFE Banking Act) would seek to protect depository institutions that provide financial services to cannabis-related businesses from regulatory sanctions. The Ensuring Safe Capital Access for All Small Businesses Act of 2019 would make certain loan programs of the Small Business Administration (SBA) available to cannabis-related businesses. Other proposals would seek to address the marijuana policy gap more broadly by attempting to mitigate any conflict between federal and state law. For example, the Strengthening the Tenth Amendment Through Entrusting States Act (STATES Act) would amend the CSA to provide that most provisions related to marijuana \"shall not apply to any person acting in compliance with State law relating to the manufacture, production, possession, distribution, dispensation, administration, or delivery\" of marijuana. The STATES Act would remove the risk of federal prosecution under the CSA for individuals and entities whose marijuana-related activities comply with state law, but the bill does not specifically address the potential consequences of such activity under other areas of federal law. The Responsibly Addressing the Marijuana Policy Gap Act of 2019 would both remove marijuana-related activities that comply with state law from the scope of the CSA and seek to address specific collateral consequences of such activity, including access to banking services, bankruptcy proceedings, and certain tax deductions. By contrast, the State Cannabis Commerce Act would take an approach similar to the current DOJ appropriations rider with respect to all federal agencies: while it would not alter the scope of the CSA's restrictions on marijuana, the State Cannabis Commerce Act would prevent any agency from using appropriated funds \"to prevent any State from implementing any law of the State that .Â .Â . authorizes the use, distribution, possession, or cultivation of marijuana\" within the state. Additional proposed legislation could address the marijuana policy gap by altering the status of marijuana under the CSA across the board. Some proposals would move marijuana from Schedule I to a less restrictive schedule. Others would remove marijuana from the CSA's schedules completely. Removing marijuana from the coverage of the CSA could, however, raise new legal issues. For instance, by default, the repeal of federal criminal prohibitions rarely applies retroactively. As a result, if Congress were to remove marijuana from the CSA, it might want to consider how to address past criminal convictions related to marijuana and whether to take any action to mitigate the effects of past convictions. In addition, Congress would not be precluded from regulating marijuana in other ways if it were to remove the drug from the ambit of the CSA. For instance, legislation has been introduced that would impose new federal regulations on marijuana akin to those applicable to alcohol and cigarettes. In addition, descheduling marijuana would not, standing alone, alter the status of the substance under the FD&C Act and, thus, would not bring the existing cannabis industry into compliance with federal law. FDA has explained that it \"treat[s] products containing cannabis or cannabis-derived compounds as [it does] any other FDA-regulated products,\" and that it is \"unlawful under the FD&C Act to introduce food containing added CBD or THC into interstate commerce, or to market CBD or THC products as, or in, dietary supplements, regardless of whether the substances are hemp-derived.\" FDA is currently engaged in \"consideration of a framework for the lawful marketing of appropriate cannabis and cannabis-derived products under our existing authorities.\" Congress could also pass legislation to alter FDA regulation of cannabis-based products. For example, the Legitimate Use of Medicinal Marihuana Act would provide that neither the CSA nor the FD&C Act \"shall prohibit or otherwise restrict\" certain activities related to medical marijuana that are legal under state law. Reducing or removing federal restrictions on marijuana might also create tension with certain treaty obligations of the United States. The United States is a party to the Single Convention on Narcotic Drugs of 1961, which requires signatories, among other things, to criminalize \"cultivation, production, manufacture, extraction, preparation, possession, offering, offering for sale, distribution, purchase, sale, . . . importation and exportation of drugs\" contrary to the provisions of the Convention. The United States is also party to the Convention on Psychotropic Substances of 1971, which requires parties to impose various restrictions on controlled substances, including measures \"for the repression of acts contrary to laws or regulations\" adopted pursuant to treaty obligations. The two treaties are not self-executing, meaning that they do not have the same status as judicially enforceable domestic law. However, failure to abide by its treaty obligations could expose the United States to international legal consequences. Another significant legal issue before the 116th Congress is the effect of the CSA on researchers' ability to conduct clinical research involving Schedule I controlled substances, including marijuana. Because substances in Schedule I have no accepted medical use, it is only legal to produce, dispense, and possess those substances in the context of federally approved scientific studies. In addition, federal law generally prevents the use of federal funding for such research: a rider to the appropriations bill for FY2019 provides that no appropriated funds may be used \"for any activity that promotes the legalization of any drug or other substance included in schedule I\" of the CSA, except \"when there is significant medical evidence of a therapeutic advantage to the use of such drug or other substance or . . . federally sponsored clinical trials are being conducted to determine therapeutic advantage.\" Some commentators have expressed concerns that the CSA places too many restrictions on research involving controlled substances, particularly Schedule I controlled substances that might have a legitimate medical use. With respect to clinical research involving marijuana specifically, currently there is one farm that legally produces marijuana for research purposes, and researchers have complained that such marijuana is deficient in both quality and quantity. In 2015, Congress passed the Improving Regulatory Transparency for New Medical Therapies Act, which imposes deadlines on DEA to issue notice of each application to manufacture Schedule I substances for research and then act on the application. In 2016, DEA stated that it planned to grant additional licenses to grow marijuana for research purposes; however, as of June 2019 no new licenses had been granted. One applicant for a license petitioned the U.S. Court of Appeals for the D.C. Circuit (D.C. Circuit) for a writ of mandamus compelling DEA to issue notice of its application. In July 2019, the D.C. Circuit ordered DEA to respond to the petition. On August 27, 2019, DEA published a notice in the Federal Register (1) providing notice of the 33 applications it has received to manufacture Schedule I controlled substances for research purposes and (2) announcing the agency's intent to promulgate regulations governing the manufacture of marijuana for research purposes. The next day, DEA filed a response to the mandamus petition in the D.C. Circuit, asserting that the petition was moot because DEA had issued the requested notice of application. The petitioner disputes that the matter is moot and asks the court to retain jurisdiction \"to ensure the agency acts with dispatch and processes [petitioner's] application promptly.\" The court has yet to rule on the petition. DEA's Federal Register notice stated that the agency intends to review all pending applications and grant \"the number that the agency determines is necessary to ensure an adequate and uninterrupted supply of the controlled substances at issue under adequately competitive conditions.\" The notice further explained that DEA is engaged in an ongoing \"policy review process to ensure that the [marijuana] growers program is consistent with applicable laws and treaties.\" It remains to be seen how many applications DEA will grant and what new regulations will apply to the successful applicants. As it did with the Improving Regulatory Transparency for New Medical Therapies Act, Congress could pass further legislation to guide DEA's consideration of applications to manufacture marijuana for research purposes. For instance, the Medical Cannabis Research Act of 2019, which was introduced before the recent developments in the D.C. Circuit and remains pending before Congress, would aim to increase the number of licenses to produce cannabis for research purposes, requiring DEA to approve at least three additional manufacturers within a year of passage. Congress could also legislate more broadly to facilitate research involving controlled substances. For example, a proposed amendment to the appropriations bill for FY2020 would have eliminated the appropriations rider restricting the use of federal funding for research involving Schedule I substances. That amendment, which would have applied to research involving all Schedule I controlled substances, was intended to facilitate research involving not only marijuana but also psilocybin, MDMA, and other Schedule I drugs that might have legitimate medical uses.", "summary": "The Controlled Substances Act (CSA) imposes a unified legal framework to regulate certain drugsâwhether medical or recreational, legally or illicitly distributedâthat are deemed to pose a risk of abuse and dependence. The CSA does not apply to all drugs. Rather, it applies to specific substances and categories of substances that have been designated for control by Congress or through administrative proceedings. The statute also applies to controlled substance analogues that are intended to mimic the effects of controlled substances and certain precursor chemicals commonly used in the manufacturing of controlled substances. Controlled substances subject to the CSA are divided into categories known as Schedules I through V based on their medical utility and their potential for abuse and dependence. Substances considered to present the greatest risk to the public health and safety are subject to the most stringent controls and sanctions. A lower schedule number corresponds to greater restrictions, so substances in Schedule I are subject to the strictest controls, while substances in Schedule V are subject to the least strict. Most substances subject to the CSA are also subject to other federal or state regulations, including the Federal Food, Drug, and Cosmetic Act (FD&C Act). The Drug Enforcement Administration (DEA) is the federal agency primarily responsible for implementing and enforcing the CSA. DEA may designate a substance for control through notice-and-comment rulemaking if the substance satisfies the applicable statutory criteria. The agency may also place a substance under temporary control on an emergency basis if the substance poses an imminent hazard to public safety. In addition, DEA may designate a substance for control under the United States' international treaty obligations. In the alternative, Congress may place a substance under control by statute. The CSA simultaneously aims to protect public health from the dangers of controlled substances diverted into the illicit market while also seeking to ensure that patients have access to pharmaceutical controlled substances for legitimate medical purposes. To accomplish those two goals, the statute creates two overlapping legal schemes. Registration provisions require entities working with controlled substances to register with DEA and implement various measures to prevent diversion and misuse of controlled substances. Trafficking provisions establish penalties for the production, distribution, and possession of controlled substances outside the legitimate scope of the registration system. DEA is primarily responsible for enforcing the registration provisions and works with the Criminal Division of the Department of Justice to enforce the trafficking provisions of the CSA. Violations of the registration provisions generally are not criminal offenses, but certain serious violations may result in criminal prosecutions, fines, and even short prison sentences. Violations of the trafficking provisions are criminal offenses that may result in large fines and lengthy prison sentences. Drug regulation has received significant attention from Congress in recent years, with a number of bills introduced in the 116th Congress that would amend the CSA in various ways. For example, after Congress passed several bills in recent years in response to the opioid crisis, additional proposals aimed at addressing the crisis are pending before the 116th Congress, including the John S. McCain Opioid Addiction Prevention Act ( H.R. 1614 , S. 724 ), which would limit practitioners' ability to prescribe opioids; the LABEL Opioids Act ( H.R. 2732 , S. 1449 ), which would require prescription opioids to bear certain warning labels; and the Ending the Fentanyl Crisis Act of 2019 ( S. 1724 ), which would increase criminal liability for illicit trafficking in the powerful opioid fentanyl. The 116th Congress has also considered measures specifically seeking to address the proliferation of synthetic drugs that mimic the effects of fentanyl, including the Stopping Overdoses of Fentanyl Analogues Act ( H.R. 2935 , S. 1622 ) and the Modernizing Drug Enforcement Act of 2019 ( H.R. 2580 ). In addition, multiple recent proposals would seek to address the divergence between federal and state marijuana laws. For example, the Secure And Fair Enforcement Banking Act of 2019 (SAFE Banking Act) ( H.R. 1595 , S. 1200 ) would seek to protect depository institutions that provide financial services to cannabis-related businesses from regulatory sanctions, and the Strengthening the Tenth Amendment Through Entrusting States Act (STATES Act) ( H.R. 2093 , S. 1028 ) would amend the CSA so that most provisions concerning marijuana do not apply to marijuana-related activities that comply with state law. Other proposals, such as the Legitimate Use of Medicinal Marihuana Act ( H.R. 171 ) and the Marijuana Justice Act of 2019 ( H.R. 1456 , S. 597 ) could address the gap between federal and state law in the area of marijuana regulation by moving marijuana from Schedule I to a less restrictive schedule or remove marijuana from the CSA's schedules. Finally, recent legislative proposals would aim to facilitate clinical research involving controlled substances, particularly marijuana. These various proposals raise a number of legal questions as Congress contemplates whether to change the laws governing controlled substances.", "document_type": "crs"}
{"report": "Cigarette use remains the leading cause of preventable death in the United States, claiming an estimated 480,000 lives or more each year. Further, between 2009 and 2012, cigarette smoking-attributable economic costs totaled over $289 billion in the United States. Although cigarette use in the United States continues to decline, according to Centers for Disease Control and Prevention (CDC) analyses, 34.2 million American adults smoked cigarettes every day or some days in 2018, and nearly 1.2 million American middle and high school students smoked cigarettes in the past 30 days in 2019. Electronic nicotine delivery systems (ENDS) have become popular in recent years, particularly among youth. ENDS is an umbrella term for various types of electronic tobacco products, including electronic cigarettes (e-cigarettes). An e-cigarette is a battery-operated device typically containing nicotine, flavorings, and other chemicals that, when heated, creates inhalable aerosol (i.e., vapor). According to CDC analyses, 8.1 million American adults used e-cigarettes every day or some days in 2018. About 5.4 million American middle and high school students used an e-cigarette in the past 30 days in 2019. There has been debate in the public health community regarding the public health impact of ENDS products. Some view them as a safer alternative for adults who smoke cigarettes because the aerosol produced from e-cigarettes is considered less harmful in the short-term than combusted smoke produced from cigarettes. However, others are alarmed by the marked increase in ENDS use among youth, and are concerned that these products may undo the years of tobacco control efforts that have successfully reduced cigarette smoking among both youth and adults. Further, the emergence of e-cigarette, or vaping, product use-associated lung injury (EVALI) that has resulted in 60 deaths and 2,711 hospitalizations as of January 21, 2020 has raised concern among public health stakeholders, Congress, and the general public. The Food and Drug Administration (FDA), an agency within the Department of Health and Human Services (HHS), is responsible for regulating the manufacture, marketing, distribution, and sale of tobacco products. FDA's Center for Tobacco Products (CTP)âestablished in 2009 pursuant to the Family Smoking Prevention and Tobacco Control Act of 2009 (TCA; P.L. 111-31 )âis primarily responsible for tobacco product regulation. The TCA established FFDCA chapter IX, under which FDA is authorized to regulate tobacco products. Within CTP, the Tobacco Products Scientific Advisory Committee (TPSAC) provides recommendations on tobacco regulatory decisions or any other matter listed in chapter IX of the FFDCA. The TPSAC includes 12 members with diversified experience and expertise. Because tobacco products have no added health benefits, FDA's regulation of these products differs in certain respects from FDA's regulation of medical products under its jurisdiction (e.g., prescription drugs, biologics, and medical devices). Similar to medical product manufacturers, tobacco product manufacturers are subject to manufacturer requirements, including payment of user fees, registration establishment, and premarket review, among others. However, while medical product manufacturers are generally required to meet a standard of safety and effectiveness to receive premarket approval from FDA, tobacco product manufacturers are instead generally required to meet a standard of \"appropriate for the protection of public health\" to receive marketing authorization. In addition, tobacco product manufacturers, importers, distributors, and retailers are required to comply with certain tobacco-specific requirements that have been authorized under the TCA as a result of the unique harms that tobacco products pose to human health. Examples of such requirements include the development of tobacco product standards, testing and reporting of ingredients, submission of health information to the agency, and distribution and promotion restrictions, among others. This report describes (1) FDA's authority to regulate tobacco products; (2) general requirements for manufacturers of tobacco products, many of which are modeled after medical product requirements; (3) requirements that are unique to tobacco product manufacturers, distributors, importers, and retailers; and (4) compliance and enforcement. The report concludes with a discussion of policy issues and considerations for Congress. Appendix A describes the IQOS Tobacco Heating System, Appendix B briefly summarizes the Tobacco Master Settlement Agreement of 1998, Appendix C provides definitions of terms used in this report, and Appendix D provides acronyms used in this report. As amended by the TCA, Section 901 of the FFDCA gives FDA the authority to regulate the manufacture, marketing, sale, and distribution of tobacco products. A tobacco product is defined as \"any product made or derived from tobacco that is intended for human consumption, including any component, part, or accessory of a tobacco product (except for raw materials other than tobacco used in manufacturing a component, part, or accessory of a tobacco product).\" Any article that is a drug, device, or combination product (a combination of a drug, device, or biological product) is excluded from the definition of tobacco product. Drugs, devices, and combination products are subject to chapter V authorities under the FFDCA. However, it is not always clear whether a product that is derived from tobacco should be regulated as a drug, device, combination product, or a tobacco product (e.g., an ENDS product that makes certain health claims). As such, FDA has promulgated regulations to provide assistance to manufacturers intending to market products that are made or derived from tobacco based on the products' \"intended uses.\" Upon enactment, the TCA explicitly covered the following tobacco products: cigarettes and cigarette tobacco, roll-your-own tobacco, and smokeless tobacco. However, the TCA gave FDA the broad authority to regulate any other tobacco products deemed by the agency to meet the definition of a tobacco product and thus subject to chapter IX of the FFDCA. In 2016, FDA promulgated regulations (known as \"the deeming rule\") that extended the agency's authority over all tobacco products that were not already subject to the FFDCA, including ENDS, cigars, pipe tobacco, hookah tobacco, nicotine gels, dissolvable tobacco, and other tobacco products that may be developed in the future. Figure 1 shows each of the tobacco products currently under FDA's authority. Tobacco product manufacturers are subject to certain requirements, including payment of user fees, registration establishment, premarket review, and postmarket surveillance, among others. In the sections below, manufacturer requirements are discussed for tobacco products overall, with exceptions for issues unique to certain classes of tobacco products. Pursuant to its authorities in the FFDCA, FDA is required to assess and collect user fees from domestic manufacturers and importers of tobacco products and use the funds to support CTP's activities. Similar to FDA's other user fee programs, the agency assesses and collects fees from industry sponsors of certain FDA-regulated productsâin this case, tobacco manufacturers and importersâand uses those funds to support statutorily defined activities. However, in contrast to other FDA centers that are generally funded by a combination of discretionary appropriations from the General Fund and user fees, CTP is funded solely by user fees. The tobacco product fee authorities are also indefinite. Thus, unlike medical product fees that are authorized in legislation on a five-year cycle, tobacco product fees do not require reauthorization. As with other FDA user fees, the tobacco fees are only available pursuant to an annual appropriation from Congress, which provides FDA the authority to collect and spend fees. Tobacco user fees are assessed and collected quarterly, and the total user fee amount that can be authorized and collected each year is specified in statute. For fiscal year (FY) 2019 and subsequent fiscal years, this amount is $712 million. The total user fee amount is assessed among six tobacco product classes specified in statute: (1) cigarettes, (2) cigars (including small cigars and cigars other than small cigars), (3) snuff, (4) chewing tobacco, (5) pipe tobacco, and (6) roll-your-own tobacco (see Table 1 for FY2020 data). The FFDCA requires that FDA use the Fair and Equitable Tobacco Reform Act of 2004 (FETRA)âenacted as Title VI of the American Jobs Creation Act of 2004 ( P.L. 108-357 )âframework to assess user fees on six classes of tobacco products, and these are the same six classes that are specified in the FETRA provisions. The FETRA provisions specify a two-step formula. The first step determines the allocations for each of the six tobacco product classes, and the second step determines the individual domestic manufacturer and importer allocations within each respective tobacco product class. Because FETRA did not account for the differential taxing of cigars compared to the other tobacco product classes, the FFDCA specifies how user fees will be assessed for cigars. FDA has determined that it currently does not have the authority to assess user fees on ENDS manufacturers and importers, or manufacturers or importers of certain other newly deemed tobacco products (e.g., hookah tobacco). This determination was made by FDA because Congress did not specify enumerated classes for these products and did not provide a framework by which FDA could potentially assess user fees for such products. Owners and operators of domestic tobacco product manufacturers are required to immediately register with FDA upon beginning operations and to subsequently register their establishments by the end of each year. FDA is required to make this registration information public. As part of the registration requirements, domestic tobacco product manufacturers must also submit product listing information, which includes a list of all tobacco products manufactured for commercial distribution. The listing for each tobacco product must be clearly identified by the product category (e.g., smokeless tobacco) and unique name (i.e., brand/sub-brand). If the listed tobacco products differ in any way, such as a difference in a component or part, manufacturers are encouraged to list each tobacco product separately. In addition, the listing must include a reference for the authority to market the tobacco product, and it must provide all consumer information for each tobacco product, such as labeling and a \"representative sampling of advertisements.\" However, given the potential administrative burden on the registrant, FDA specifies in a guidance document that labeling for each individually listed tobacco product is not necessary if information that represents the labeling for a selected set of related products is provided. Registrants are encouraged to submit their materials online using FDA's Unified Registration and Listing System (FURLS) Tobacco Registration and Product Listing Module (TRLM). Every tobacco product manufacturer that registers with FDA is subject to biennial inspections. This inspection requirement starts on the date the establishment registers, and FDA must conduct an inspection at least once in every successive two-year period thereafter. The goal of such inspections is to review processes and procedures, observe and evaluate operations, document and collect information, identify any violations, communicate those violations to the manufacturer, and document any proposed corrective action plans. FDA personnelâupon presenting appropriate credentials and a written notice to the owner, operator, or agent in chargeâare authorized to enter the tobacco product manufacturer to inspect the factory and all pertinent equipment and materials \"at reasonable times and within reasonable limits and in a reasonable manner.\" Upon completing the inspection and prior to leaving the premises, FDA is required to produce a written report describing any observed conditions or practices indicating that any tobacco product has been prepared in a way that is injurious to health. FDA is required to promulgate regulations that outline good manufacturing practices (GMPs) to ensure that \"the public health is protected and that the tobacco product is in compliance\" with chapter IX of the FFDCA. Specifically, statute specifies that the regulations should include the methods, facilities, and controls involved in the manufacture, packing, and storage of a tobacco product. Prior to promulgating the regulations, TPSAC and the public (through an oral hearing) have an opportunity to recommend modifications to the proposed regulations. In addition, the regulations are required to take into account different types of tobacco products, the financial resources of different tobacco manufacturers, and reasonable time for manufacturers to comply with GMPs. A manufacturer may petition to be exempt from such requirements and receive approval from FDA if the agency determines that compliance with GMPs is not required to ensure that the tobacco product would be in compliance with chapter IX of the FFDCA. To date, FDA has not promulgated GMP regulations. In 2012, 13 tobacco companies submitted recommendations to be included in the GMP regulations and subsequently met with FDA to review their recommendations and approach to developing them. FDA then established a public docket for additional comments on the tobacco companies' recommendations in 2013. However, FDA did not take further action specific to promulgating GMP regulations after these actions. FDA's 2016 deeming rule stated that \"FDA will have the authority to issue tobacco product manufacturing practice regulations under section 906(e)\" of the FFDCA for ENDS and other newly deemed products. Following the issuance of this rule, numerous ENDS industry stakeholders submitted recommendations to FDA highlighting differences between GMP regulations for ENDS products and other tobacco products (cigarettes, cigarette tobacco, roll-your-own tobacco, and smokeless tobacco). FDA then opened a public docket in November 2017 to allow for comment on these proposed ENDS GMPs, but the agency has not taken further action since then. There are four different premarket review pathways for tobacco products: (1) premarket tobacco application (PMTA), (2) substantial equivalence (SE), (3) substantial equivalence (SE) exemption, and (4) modified risk tobacco product (MRTP). To legally market a new tobacco product, a manufacturer must receive a PMTA marketing authorization order, unless FDA determines that the new tobacco product is substantially equivalent to a predicate tobacco product or is exempt from substantial equivalence. To legally market a new tobacco product with reduced risk claims or modify a legally marked tobacco product to make reduced risk claims, a manufacturer must receive an MRTP order. All tobacco products originally covered by the TCA are required to undergo premarket review, unless they are \"grandfathered products.\" Following the 2016 deeming rule, all newly deemed tobacco products became subject to premarket review requirements as well. In July 2017, FDA announced its Comprehensive Plan for Tobacco and Nicotine Regulation (Comprehensive Plan). A s part of its Comprehensive Plan, FDA issued guidance that pushed back premarket review application deadlines to August 2021 for newly deemed combustible tobacco products (e.g., cigars) and August 2022 for newly deemed noncombustible tobacco products (e.g., ENDS) on the market as of August 8, 2016. This administrative action was subject to legal challenge , after several public health groups (e.g., A merican Academy of Pediatrics, Campaign for Tobacco-Free Kids) filed a lawsuit against FDA . In May 2019, the U.S. District Court for Maryland ruled in favor of the public health organizations, and in July 2019, imposed a 10-month deadline for application submissions for all newly deemed tobacco products (i.e., May 2020) and a one-year deadline for reviewing the applications (i.e., May 2021). As shown in Tab le 2 , since 2014, most new tobacco products have been legally marketed through the SE pathway. However, only requirements for the SE exemption pathway have been promulgated in regulations. This has posed some challenges for manufacturers when preparing application submissions for the PMTA, SE, and MRTP pathways. In April 2019, FDA issued a proposed rule on the content and format of SE reports, with public comment open until June 2019. Also in June 2019, FDA finalized its guidance on PMTA submissions specific to ENDS. In September 2019, FDA issued a proposed rule on the content and format of PMTA applications, with public comment open until November 2019. As of February 2020, FDA has not publicly indicated a timeline for issuance of a final rule. A manufacturer must submit a PMTA and receive a PMTA marketing authorization order to legally market a new tobacco product that is not substantially equivalent to a predicate tobacco product or exempt from substantial equivalence. To receive a PMTA order, the application must demonstrate that the product is \"appropriate for the protection of public health.\" This determination is made based on the risks and benefits to the whole population of users and nonusers of the product, while taking into account the increased or decreased likelihood that existing users of tobacco products will stop using such products; and the increased or decreased likelihood that those who do not use tobacco products will start using such products. PMTA applications must include, among other things, full reports of health risk investigations; a full statement of what is in the product (e.g., components, additives); a full description of manufacturing and processing methods; compliance with tobacco product standards; samples and components of the product; and proposed labeling of the product. FDA has 180 days after receipt of the complete application to determine whether the product will receive a PMTA order. If marketing is authorized, FDA can require that the sale and distribution of the tobacco product is restricted. FDA can deny a PMTA application for various reasons. These include if the agency determines that marketing the new tobacco product would not be appropriate for the protection of public health; the methods used for manufacturing, processing, or packing the tobacco product do not align with good manufacturing practices; the proposed labeling of the tobacco product is false or misleading; or the tobacco product does not conform with regulations specifying tobacco product standards. FDA can withdraw or temporarily suspend a PMTA order if the agency finds that the continued marketing of the tobacco product is no longer appropriate for the protection of public health; the PMTA application contained false material; the applicant does not maintain records or create reports about its tobacco product; the labeling of the tobacco product becomes false or misleading; or the tobacco product does not conform to a tobacco product standard without appropriate justification. To determine if there are grounds to withdraw or temporarily suspend a PMTA order, FDA can require by regulation, or on an application-by-application basis, that applicants establish and maintain records, and provide postmarket surveillance reports to FDA following PMTA marketing authorization. A new tobacco product is considered to be substantially equivalent to a predicate tobacco product if it has the same characteristics as the predicate tobacco product or if it has different characteristics that do not raise different questions of public health. A product may serve as a predicate tobacco product if it was commercially marketed as of February 15, 2007, or if it has previously been determined as substantially equivalent to another predicate tobacco product. A tobacco product may not serve as a predicate product if it has been removed from the market or has been determined to be adulterated or misbranded. If a new tobacco product is considered substantially equivalent to the predicate tobacco product, the manufacturer is required to submit an SE report to FDA justifying a substantial equivalence claim at least 90 days prior to the introduction of the new tobacco product into the market. To accommodate manufacturers following enactment of the TCA, a new tobacco product that was introduced after February 15, 2007, but before March 22, 2011, could stay on the market while FDA reviewed the manufacturer's SE report, provided the report was submitted before March 23, 2011. However, if a manufacturer did not submit the SE report before March 23, 2011, or if the new tobacco product has been on the market since March 22, 2011, the product is not permitted to be marketed without an SE order from FDA, even if FDA takes longer than 90 days to approve and issue the order. The contents of SE reports are not specified in statute or regulation, but FDA has provided content recommendations for SE reports in guidance. Among other things, SE reports should include a summary, listing of design features, ingredients and materials, a description of the heating source and composition, and health information. Upon acceptance of the SE report application and FDA's evaluation that the predicate tobacco product selected is eligible, FDA evaluates the scientific data and information in the SE report. FDA will then issue a SE order letter or not substantially equivalent order (NSE order) letter. A new tobacco product that has been modified from a legally marketed tobacco product by either adding or removing a tobacco additive, or by increasing or decreasing the quantity of an existing tobacco additive, may be exempt from demonstrating substantial equivalence. For such a product to be exempt, FDA must determine that (1) the modification would be considered minor, (2) an SE report that demonstrates substantial equivalence would not be necessary to ensure that marketing the tobacco product would be appropriate for protection of public health, and (3) an \"exemption is otherwise appropriate.\" Before the product can be legally marketed, FDA must first grant the product an exemption from demonstrating substantial equivalence. Following this, a manufacturer must submit a SE exemption report detailing the minor modification and establishing that FDA has determined that the product is exempt from demonstrating substantial equivalence to a predicate product. The content requirements for SE exemption reports are specified in regulation. Among other things, SE exemption reports must contain a detailed explanation of the purpose of the modification; a detailed description of the modification; a detailed explanation of why the modification is minor; a detailed explanation of why a SE report is not necessary; and a certification (i.e., signed statement by a responsible official of manufacturer) summarizing why the modification does not increase the tobacco product's appeal to or use by minors, toxicity, addictiveness, or abuse liability. A modified risk tobacco product (MRTP) is defined as \"any tobacco product that is sold or distributed for use to reduce harm or the risk of tobacco-related disease associated with commercially marketed tobacco products.\" For example, some ENDS manufacturers may decide to submit an ENDS product through the MRTP pathway if the application can justify that the product reduces the risk of tobacco-related disease compared with other tobacco products (e.g., cigarettes). However, an MRTP may not be introduced or delivered into interstate commerce until FDA has issued an MRTP order, regardless if it was already legally on the market through another pathway (e.g., SE or SE exemption). Further, any manufacturer that has not received an MRTP order for its tobacco product may not market the product with a label, labeling, or advertising that implies the product has a reduced risk of harm or that uses the words \"light,\" \"mild,\" \"low,\" or similar descriptions. Smokeless tobacco products that use certain descriptors, such as \"does not produce smoke\" or \"smoke-free,\" are not automatically considered MRTPs unless a manufacturer receives MRTP orders for those products. In addition, products that are intended to treat tobacco dependence are not considered MRTPs if they have been approved as a drug or device. Manufacturers must include certain information in a MRTP application, including a description of the proposed product and any proposed advertising and labeling; the conditions for using the product; the formulation of the product; sample product labels and labeling; all documents (including underlying scientific information) relating to research findings conducted, supported, or possessed by the tobacco product manufacturer relating to the effect of the product on tobacco-related diseases and health-related conditions, including information both favorable and unfavorable to the ability of the product to reduce risk or exposure and relating to human health; data and information on how consumers actually use the tobacco product; and such other information as the Secretary [FDA] may require. FDA must refer all complete MRTP applications to TPSAC given the health claims that need to be evaluated and verified in applications for these products. TPSAC then has 60 days to provide recommendations on the application to FDA. FDA can issue an MRTP order for a specified period of time (but not more than five years at one time ) if, among other things, it determines that the tobacco product will significantly reduce harm and the risk of tobacco-related disease to individual tobacco users and benefit the health of the population as a whole by taking into account users and nonusers of tobacco products. To continue to market a MRTP after the order's set term, a manufacturer would need to seek renewal of the MRTP order. However, FDA may issue an order for certain tobacco products that may not meet the standard of significantly reducing harm to individual users and benefiting population health as a whole. This is possible if, among things, the manufacturer can demonstrate that the MRTP order for the tobacco product would be appropriate to promote public health; the label, labeling, and advertising for the tobacco product are limited to claims that the product presents less exposure to a substance; scientific evidence is not available and cannot be made available without conducting the long-term epidemiologic studies required to meet the MRTP standard; and the scientific evidence that is available demonstrates if future studies are conducted, they would likely demonstrate a measurable and substantial reduction in morbidity or mortality among users of the tobacco product. To market a tobacco product that has received an MRTP order, the manufacturer must agree to certain postmarket surveillance and studies that examine consumer perception, behavior, and health pertaining to the product. Manufacturers required to conduct surveillance must submit the surveillance protocol to FDA within 30 days of receiving notice from FDA that such studies are required. Upon receipt of the protocol, FDA has 60 days to determine whether the protocol is sufficient to collect data that will allow FDA to determine if the MRTP order is necessary to protect public health. FDA can also require that labeling and advertising of the product enable the public to understand the significance of the presented information to the consumer's health. Further, FDA can impose conditions on the use of comparing claims between the tobacco product with an MRTP order and other tobacco products on the market, and require that the label of the product disclose substances in the tobacco product that could affect health. FDA must withdraw the MRTP order, after the opportunity for an informal hearing, under specified circumstances. Examples of such circumstances include if new information becomes available that no longer make an MRTP order permissible, if the product no longer reduces risk or exposure based on data from postmarket surveillance or studies, or if the applicant failed to conduct or submit postmarket surveillance or studies. FDA's Center for Drug Evaluation and Research (CDER) is generally responsible for regulating tobacco-derived products that make health or cessation (i.e., quitting) claims, such as nicotine replacement therapies (NRTs). NRTs contain nicotine as an active ingredient. Two types of prescription NRT products (nasal spray and nicotine inhaler) and three types of over-the-counter (OTC) NRT products have been approved by FDA through CDER, and most of these products have been approved for over 20 years. The three types of OTC products include a nicotine gum, a transdermal nicotine patch, and a nicotine lozenge. Prescription medications that do not have nicotine as an active ingredient have also been approved by CDER for smoking cessation. These medications include Chantix (varenicline tartrate) and Zyban (buproprion hydrochloride). In the future, ENDS manufacturers who make health or cessation claims for their products would likely need to receive approval for marketing from CDER (rather than marketing authorization from CTP). Tobacco product manufacturers, importers, distributors, and retailers are required to comply with certain tobacco-specific requirements as a result of the unique harms that tobacco products pose to human health. Each of these requirements is described below, and most requirements apply to all tobacco products, with some specified exceptions. Prior to enactment of the TCA, Congress was concerned that the tobacco industry had the ability to design new tobacco products or modify existing ones that might appeal to children or increase exposure to harmful tobacco product constituents. The TCA gave FDA the authority to adopt tobacco product standards that it deems necessary to protect the public's health, but it explicitly prohibited FDA from creating a standard that bans cigarettes, smokeless tobacco products, cigars, pipe tobacco, or roll-your-own tobacco products. Congress could choose to amend this language at any time. A new tobacco product standard can set certain manufacturing, packaging, and distribution and sale requirements for tobacco products. For example, FDA can set requirements for ingredients, additives, components, or parts allowed in a tobacco product; testing of the tobacco product and test results demonstrating compliance with the standard; measurement of characteristics of the tobacco product; appropriate labeling of the tobacco product; and limited sale and distribution of the tobacco product. To adopt a tobacco product standard, FDA is required to consider scientific evidence on the risks and benefits to the population as a whole, including users and nonusers of tobacco products, of the proposed standard; the increased or decreased likelihood that existing users of tobacco products will stop using such products; and the increased or decreased likelihood that those who do not use tobacco products will start using such products. To propose a new tobacco product standard, FDA is required to publish a proposed rule in the Federal Register and allow for a public comment period of no less than 60 days. If FDA determines that the tobacco product standard is appropriate for the protection of public health based on an evaluation of public comments, a report from TPSAC (if the standard was referred to them), and other evidence, the agency must promulgate a final regulation to establish the standard. This regulation cannot take effect until at least one year after its publication, unless FDA determines that \"an earlier effective date is necessary for the protection of public health.\" FDA is required to periodically reevaluate tobacco product standards to determine if new data need to be reflected. In addition, a tobacco product standard may be amended or revoked either on the initiative of FDA or an interested party via petition (i.e., citizen petition). If FDA or a citizen petition calls for an amendment to or revocation of an existing tobacco product standard, a proposed rule would be issued in the Federal Register for public comment. As with a new tobacco product standard, FDA would make a determination regarding the existing standard based on review of the public comments, a TPSAC report (if relevant), and other evidence. For FDA to revoke a standard, the agency must find that the standard is \"no longer appropriate for the protection of public health.\" When enacting the TCA, Congress recognized that flavors, specifically, can make tobacco products more appealing to youth and expose tobacco users to additional carcinogens or other toxic constituents. Although FDA has the authority to establish new tobacco product standards (as previously described), Section 907 of the FFDCA establishes a tobacco product standard explicitly banning characterizing artificial or natural flavors (other than tobacco or menthol), herbs, or spices in any constituent, additive, and component or part of a cigarette. While tobacco and menthol flavors are not included in the prohibition on characterizing flavors in cigarettes, FDA may be able to establish a tobacco product standard addressing menthol in cigarettes. Within one year of its establishment, TPSAC was required to submit a report and recommendations to the Secretary of HHS regarding the impact of menthol cigarette use on public health, specifically addressing use among youth and racial and ethnic minorities. In its final report released in July 2011, TPSAC concluded that \"removal of menthol cigarettes from the marketplace would benefit public health in the United States.\" In July 2013, FDA released an advance notice of public rulemaking (ANPRM) on a tobacco product standard for menthol in cigarettes, seeking comments, data, research, and any other relevant information. A final regulation has not yet been promulgated; however, Former Commissioner Gottlieb expressed interest in accelerating the promulgation of this tobacco product standard. FDA released an ANPRM in March 2018, \"Regulation of Flavors in Tobacco Products,\" that requested public comments, data, research results, and other information related to the role of flavors generally in tobacco products, among other things. After one extension, the comment period closed in July 2018 and the agency had received over 500,000 comments. In January 2020, FDA stated its intention to issue a proposed rule that would \"ban the use of characterizing flavors in cigars,\" but did not speak to characterizing flavors in other tobacco products. Nicotine is the naturally occurring drug in tobacco that can cause addiction to the product. The FFDCA allows FDA to address nicotine yields of a tobacco product through development of a tobacco product standard, but it prohibits the agency from establishing a tobacco product standard that would require the reduction of nicotine yields to zero. A key feature of FDA's Comprehensive Plan is to implement regulatory policies on addiction, appeal, and cessation based on scientific evidence and public input. One stated goal was to lower nicotine in cigarettes to a minimally or non-addictive level to benefit the public's health. In March 2018, FDA released an ANPRM for development of a tobacco product standard that would set a maximum nicotine level for cigarettes. The ANPRM seeks public comment on whether a tobacco product standard should apply to other combusted tobacco products (e.g., cigars, pipe tobacco); what a non-addictive level of nicotine would be; and other feasibility issues if such a tobacco product standard is implemented. The comment period closed in July 2018, after an extension, with nearly 8,000 comments received. As of February 2020, FDA has not taken further regulatory action. FDA has the authority to conduct or to require testing, reporting, or disclosure of tobacco product constituents, including smoke constituents. Pursuant to FFDCA Section 915, FDA is required to promulgate regulations that require the testing and reporting of components or parts of a tobacco product to protect the public health. Because FDA has not yet promulgated these testing and reporting regulations, tobacco product manufacturers are not currently subject to these requirements. As part of these regulations, once they are promulgated, FDA may require tobacco product manufacturers to disclose the results of the testing of tar and nicotine through labels, advertising, or other means to protect public health and not mislead consumers about harms associated with use of the tobacco product. Small tobacco product manufacturers would be given additional time to comply, and FDA could additionally delay compliance on a case-by-case basis for small tobacco product manufacturers. Tobacco product manufacturers are required to submit specified health information to FDA. This health information includes a list of all ingredients, such as substances, compounds, and additives that are added to the tobacco product by the manufacturer. Health information also includes \"a listing of all constituents, including smoke constituents as applicable, identified by the Secretary as harmful or potentially harmful to health in each tobacco product.\" Manufacturers must provide this information within each brand of the tobacco product, and the quantity included in each brand (e.g., Marlboro) and sub-brand (e.g., Marlboro Gold). FDA's compliance policy for ingredient listings, as specified in guidance, focuses on finished tobacco products (i.e., tobacco products packaged and ready for consumption), including cigarettes, cigarette tobacco, roll-your-own tobacco, smokeless tobacco, and newly deemed tobacco products (e.g., ENDS). Further, FDA is focusing on components or parts of finished tobacco products that are made or derived from tobacco or contain ingredients that are burned, aerosolized, or ingested while the tobacco product is being used. As an example, e-liquids of ENDS are currently subject to this ingredient listing requirement, while batteries of ENDS are not. As interpreted by FDA in guidance, the phrase harmful and potentially harmful constituents (HPHCs) refers to any chemical or chemical compound in a tobacco product or in tobacco smoke that is, or potentially is, inhaled, ingested, or absorbed into the body, including as an aerosol (vapor) or any other emission; and causes or has the potential to cause direct or indirect harm to users or non-users of tobacco products. Examples of HPHCs include toxicants, carcinogens, and addictive chemicals and compounds. By 2012 (three years after enactment of the TCA), FDA was required to establish a list of HPHCs in each tobacco product and, as applicable, to identify HPHCs by brand and sub-brand of tobacco products. Based on TPSAC's recommendations and after receiving multiple rounds of public comment on these recommendations, FDA established a list of 93 HPHCs in tobacco products. This list specifies whether the HPHC is a carcinogen, respiratory toxicant, cardiovascular toxicant, reproductive or developmental toxicant, and/or addictive. Using FDA's list, manufacturers are required to report HPHCs by brand and quantity of HPHCs in each brand and sub-brand. Given potential monetary and feasibility challenges that were associated with reporting all 93 HPHCs on FDA's list, FDA released an accompanying 2012 draft guidance that provided an abbreviated list of HPHCs that manufacturers of cigarettes, smokeless tobacco, and roll-your-own tobacco would be required to report to FDA. FDA has not issued an update to the 2012 draft guidance. As a result, FDA does not intend to enforce this requirement for newly deemed tobacco products (e.g., ENDS) until after the publication date of the final guidance. However, in August 2019, FDA announced that, for the first time, it is seeking public comment on 19 additional HPHCs that can be found in ENDS products. The public comment period closed in October 2019. Tobacco product manufacturers are required to submit to FDA all documents developed by the manufacturer or any other party on health, toxicological, behavioral, or physiologic effects of current or future tobacco products, including constituents, ingredients, components, and additives. FDA interprets these documents to include \"cell-based, tissue-based, animal, or human studies, computational toxicology models, information on addiction, intentions to use, cognition, emotion, motivation, and other behavioral effects at both the population-level (epidemiology) as well as the individual level (such as abuse liability).\" FDA has the authority to require, by regulation, tobacco product manufacturers and importers to establish and maintain records to ensure that tobacco products are not adulterated or misbranded and to otherwise protect public health. Through such regulations, FDA can also require manufacturers and importers to report if a tobacco product may have caused or contributed to a \"serious unexpected adverse experience or any significant increase in the frequency of a serious, expected adverse product experience.\" Required reports cannot be overly burdensome and cannot disclose the identity of a patient, except under certain circumstances. FDA has not yet promulgated regulations specifying these requirements. However, FDA issued a proposed rule in April 2019 on the content of a SE report. The proposed rule would require applicants submitting an SE report and receiving an SE order to maintain all records supporting the SE report for at least 4 years. FDA also issued a proposed rule in September 2019 for PMTAs that, among other things, would require manufacturers to \"keep records regarding the legal marketing of certain tobacco products without a PMTA.\" Prior to 2009, restrictions on the distribution of tobacco products were largely enforced at the state level, and promotion of cigarettes and smokeless tobacco was largely overseen by the Federal Trade Commission (FTC). However, in 2009, the TCA explicitly gave FDA the authority to require, by regulation, restrictions on the sale and distribution of a tobacco product if such a regulation would be appropriate for the protection of public health. In addition, the FFDCA specifies that FDA can impose restrictions, by regulation, on the advertising and promotion of a tobacco product consistent with the First Amendment. In addition to authorizing FDA to regulate the sale and distribution of tobacco products, the TCA also directed FDA to reissue its 1996 Tobacco Rule. Among other things, the 1996 Tobacco Rule imposed requirements on the sale, labeling, and advertising of cigarettes and smokeless tobacco. The TCA provided that the final rule must be identical to the 1996 rule, with specified exceptions. FDA reissued the 1996 rule in March 2010, and the 2016 deeming rule extended the applicability of sale and distribution restrictions, as well as certain labeling and advertising requirements to newly deemed tobacco products (e.g., ENDS). In FY2020 appropriations, Congress amended the federal minimum age of tobacco product purchasing from 18 to 21. Current law and regulations restricting the sale and distribution of tobacco products will be discussed first, followed by current law and regulations on the labeling and advertising of tobacco products. The FFDCAâpursuant to changes made by the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 )âprohibits retailers from selling tobacco products to any person younger than 21 years of age and limits FDA's ability to promulgate regulations that restrict the sale of tobacco products to those over 21 years of age. FDA has stated that this new age sales restriction is currently in effect. Prior to this statutory change, the minimum age of sale of tobacco products under federal regulations was 18 years of age, and the FFDCA precluded FDA from promulgating regulations restricting the sale of tobacco products to those over 18. As such, current federal regulations, which were promulgated in 2016 prior to the enactment of P.L. 116-94 , prohibit retailers from selling cigarettes, smokeless tobacco products, and newly deemed tobacco products to anyone younger than 18, and require retailers to verify the age of persons purchasing these products who are younger than 27. To conform these regulations to changes made by P.L. 116-94 , FDA is required to update the regulations by June 20, 2020 to specify that retailers may not sell tobacco products to those under 21 years of age and that retailers are required to verify the age of individuals attempting to purchase tobacco products who are younger than 30. The final rule is to take effect not later than September 20, 2020. Regulations also specify that manufacturers, distributors, or retailers may not distribute free samples of cigarettes, smokeless tobacco products, and newly deemed tobacco products, with the exception of smokeless tobacco in qualified adult-only facilities. Vending machine sales of cigarettes, smokeless tobacco, and newly deemed tobacco products are prohibited, unless the vending machine is located in a qualified adult-only facility. Consistent with the limitations specified in statute, these regulations do not prohibit the sale of tobacco products in specific categories of retail outlets (e.g., pharmacies, specialty stores). As mentioned, prior to the enactment of the TCA, restrictions on the sale and distribution of tobacco products were primarily enforced at the state level, and compliance with state laws prohibiting tobacco sales to minors varied. Evidence emerged about health problems associated with tobacco use by youth and about the ease with which youth could purchase tobacco products through retail sources. In 1992, the Alcohol, Drug Abuse, and Mental Health Administration (ADAHMA) Reorganization Act ( P.L. 102-321 ) was signed into law, and it included an amendment aimed at decreasing youth access to tobacco. More specifically, Section 1926 (known as the Synar amendment ) of the ADAHMA Reorganization Act required that the Substance Abuse and Mental Health Services Administration (SAMHSA) make available the full Substance Abuse Prevention and Treatment Block Grant (SABG) award funding to states and U.S. territories only if they had laws in effect that prohibit the sale or distribution of tobacco products to individuals younger than 18 years old. The SABG is a block grant program that distributes funds to 60 eligible states, U.S. territories, and freely associated states to plan, execute, and evaluate substance use prevention, treatment, and recovery support services for affected individuals, families, and communities. The SABG provides a consistent federal funding stream to states through formula grants, and it is one of SAMHSA's largest programs. The Synar regulations were promulgated by SAMHSA in 1996 to provide further guidance to states on implementation of the Synar amendment. The regulation requires, among other things, that states enact and enforce laws that prohibit the sale or distribution of tobacco products to individuals younger than 18; conduct annual inspections of retailers that are representative of retail outlets accessible to minors; and submit an annual report to SAMHSA on enforcement and compliance actions in order to receive their full SABG funding. As the term tobacco product , is not defined in the regulation, SAMHSA has indicated that each state may decide which tobacco products should be included in tobacco retailer inspections, but encourages states to include tobacco products being used most often by youth. In FY2020 appropriations, Congress further amended the Synar amendment to require states, as a condition of receiving SABG funding, to conduct annual, random inspections of retail outlets to ensure that such outlets are not selling tobacco products to those under age 21 and comply with annual reporting requirements to SAMHSA on enforcement and compliance actions. SAMSHA will be required to update the Synar regulations by June 20, 2020 to account for these changes. The Federal Cigarette Labeling and Advertising Act of 1965 (FCLAA) and the Comprehensive Smokeless Tobacco Health Education Act of 1986 (CSTHEA) include certain labeling requirements and advertising restrictions on cigarettes and smokeless tobacco, respectively. FTC generally oversees these two acts. For example, one advertising restriction within these acts includes a ban on advertising cigarettes, little cigars, and smokeless tobacco products on radio, television, or other media subject to the jurisdiction of the Federal Communications Commission (FCC). In addition, manufacturers, distributors, and retailers may not sell or distribute tobacco products with labels, labeling, or advertising that are not in compliance with the FFDCA and accompanying FDA regulations. Certain labeling and advertising requirements specific to cigarettes and smokeless tobacco include: Manufacturers, distributors, and retailers may not sponsor any athletic, musical, or other social or cultural event with the brand name of a cigarette or smokeless tobacco product. Manufacturers and distributors of imported cigarettes and smokeless tobacco may not market, license, distribute, or sell any product that bears the brand name, logo, or any other identifying patterns associated with the brand name. Labeling and advertising in audio and video formats are limited. For example, audio formats cannot include music or sound effects. Tobacco product package labeling and advertisements must also include warning statements. Table 3 lists the different health warning statements required to be displayed on tobacco product package labeling and in tobacco product advertisements, by product. For example, all ENDS package labeling and advertising is required to include \"WARNING: This product contains nicotine. Nicotine is an addictive chemical.\" The TCA required FDA to promulgate regulations requiring color graphics depicting the negative health consequences of cigarette smoking. In 2011, FDA published a final rule requiring graphic warning labels on cigarette packagingâin addition to nine new warning statements proposed in textâthat would take effect 15 months after it was promulgated. The final rule was challenged in court, and in 2012, an appeals court vacated the rule on First Amendment grounds and remanded the issue to the agency. Ultimately, FDA did not seek further judicial review. FDA planned to develop and propose a new graphic warning rule and has continued to conduct research for this rule since 2013. In 2016, multiple health organizations filed a suit against FDA to compel the agency to promulgate a final rule more quickly. In March 2019, FDA was ordered to issue a proposed rule by mid-August 2019 and a final rule by mid-March 2020. The proposed rule, issued on August 16, 2019, specifies requirements for new cigarette health warnings. Among other things, the warnings would occupy the top 50% of the front and rear panels of cigarette packages, and at least 20% of the top area of cigarette advertisements. However, it is to be determined whether this proposed rule will be subject to further litigation. If FDA finds that a retailer, manufacturer, importer, or distributor is not complying with FFDCA chapter IX requirements or FDA regulations, the agency can take corrective action. Such corrective actions include warning letters, civil money penalty (CMP) complaints, and no-tobacco-sale order (NTSO) complaints , as well as seizures, injunctions, and criminal prosecution (with the Department of Justice). The FFDCA prohibits the adulteration and misbranding of tobacco products, as well as the introduction, receipt, and delivery of adulterated or misbranded tobacco products into interstate commerce. In general, a tobacco product is deemed adulterated if it is contaminated by any substance that may render the product injurious to health; it has been prepared in unsanitary conditions that may have contaminated the product; its packaging is composed of any substance that could be harmful to health; and/or if a manufacturer does not comply with user fee, tobacco product standard, premarket review, and/or GMP requirements (when promulgated). A tobacco product is deemed misbranded if the labeling is false or misleading in any way; its package labeling does not include specified manufacturing information, statements, or warnings required by regulation, or does not comply with an established tobacco product standard; the labeling, packaging, and shipping containers of tobacco products do not contain the label \"sale only allowed in the United States\"; it was manufactured, prepared, propagated, compounded, or processed in a facility that was not registered with FDA; its advertising is false or misleading in any way; and/or it is sold by a retailer to an individual under 21 years of age or is sold in violation of regulations promulgated on the sale and distribution of tobacco products. FDA may, by regulation, require prior approval of statements made on labels of tobacco products to ensure that the tobacco product is not misbranded. However, such a regulation cannot require prior approval of an advertisement, except for MRTPs. To date, FDA has not issued such regulations. FDA is required to contract with states and territories to carry out compliance check inspections of tobacco retailers. In some instances, FDA has awarded contracts to third-party entities that hire commissionable inspectors to conduct compliance check inspections of tobacco retailers in states and territories where FDA has not been able to contract with a state or territory agency. FDA personnel may also conduct their own investigations. FDA ensures that tobacco retailers are in compliance with federal law and regulations through undercover buy inspections. During these inspections, the retailer is unaware an inspection is taking place. A trained minor, in consultation with a commissioned FDA inspector, attempts to purchase a tobacco product. If a first-time violation is reported (e.g., sale to a minor, illegal advertising), a warning letter is sent to the tobacco retailer, and the addressee has 15 working days to respond to the letter, with no associated fines involved. When subsequent violations of tobacco regulations or requirements are detected during these undercover buy inspections, FDA files a CMP complaint. The associated fines vary based on the number of regulation violations and the time period in which the violations occurred. If retailers have repeated violations of the restrictions on the sale and distribution of tobacco products, FDA may seek a NTSO, which would prohibit sale of tobacco products at that retail outlet. A NTSO could be separate or combined with CMPs. According to FDA, as of June 2019, the agency has \"conducted more than a million compliance check inspections and issued nearly 88,000 Warning Letters, 22,000 [CMPs], and 160 [NTSOs].\" As mentioned, in FY2020 appropriations, Congress amended the federal minimum age of tobacco product purchasing from 18 to 21. FDA has stated that this new age sales restriction is currently in effect, but also recognizes that the agency and retailers will need to update current practices to account for these changes. As such, FDA has stated that \"during this ramp-up period, FDA will continue to only use minors under the age of 18 in its compliance check program.\" FDA has the authority to issue notifications and recalls of tobacco products once they are on the market. FDA can issue a notification through a public service announcement if the tobacco product \"presents an unreasonable risk of substantial harm to the public health,\" provided that FDA determines there are no other practical means to eliminate such risk. A tobacco product manufacturer can initiate or FDA can request a (voluntary) recall if the tobacco product is thought to be in violation of the FFDCA. In addition, FDA has the authority to mandate a tobacco product recall under specified circumstances. If FDA determines that a tobacco product contains a manufacturing or other defect that would \"cause serious, adverse health consequences or death,\" the agency can issue an order requiring the appropriate person (e.g., the manufacturer, retailer, importer, or distributor) to immediately stop distribution of the tobacco product. FDA is required to provide the person subject to the order an opportunity for an informal hearing not later than 10 days after the order is issued. Following the hearing, FDA is required to vacate the order if the agency determines that there is insufficient evidence to maintain the order. If after the informal hearing FDA determines that the order should be amended to include a recall of the tobacco product, FDA must amend the order to require such recall, specifying a timetable for and requiring periodic progress reports on the recall. Although the TCA expanded FDA's authority to regulate tobacco products in 2009, stakeholders have recently identified several issues related to the regulation of these products that may be of interest to Congress: FDA and public health stakeholders remain concerned about the marked increase in use of ENDS among youth over the past few years, and many in the public health community argue that this increase is largely driven by the availability of youth-friendly flavors in these products. While the public health community generally views ENDS as a safer alternative for adult cigarette smokers, there is concern that increased use of ENDS among youth may undo the years of tobacco control efforts that have successfully reduced cigarette smoking among both youth and adults. The emergence of EVALI has further heightened concern among public health stakeholders, Congress, and the general public. Public health stakeholders have been concerned about youth access to tobacco products more broadly and expressed support for raising the minimum age of access for tobacco products from 18 to 21 years of age. Congress recently made this change legislatively, but some want Congress to take further action to address tobacco use among youth. The remote sales of tobacco productsâincluding ENDSâmay be an opportunity for youth to purchase tobacco products illegally, due to difficulties in enforcing purchasing restrictions through this medium. Generally separate from the aforementioned public health issues, another issue concerns FDA's authority to collect tobacco user fees. More specifically, FDA has determined that it currently does not have the authority to assess user fees from ENDS manufacturers and importers, despite these products being deemed subject to FDA regulation. These four issues are discussed in detail below, along with potential considerations for policymakers. Since the emergence of ENDS in the tobacco marketplace, there has been ongoing debate regarding their public health impact. The public health community generally views them as a harm reduction tool for adults who specifically smoke cigarettes. Harm reduction refers to the replacement of a more harmful activity with a less harmful one when elimination of the activity is difficult or infeasible. ENDS have the potential to reduce harm among adult cigarette smokers who have experienced difficulty quitting, as the aerosol from ENDS \"contains fewer numbers and lower levels of most toxicants than does smoke from combustible tobacco cigarettes.\" Yet the data are complex regarding the effectiveness of ENDS as a harm reduction or cessation tool for adults who smoke cigarettes. As of early 2018, the National Academies of Sciences, Engineering, and Medicine (NASEM) concluded that \"there is general agreement that the number, size, and quality of studies for judging the effectiveness of e-cigarettes as cessation aids in comparison with cessation aids of proven efficacy are limited, and therefore there is insufficient evidence to permit a definitive conclusion at this time.\" Further, the long-term health effects associated with use of ENDS are still largely unknown, and FDA has not yet approved any ENDS products as cessation devices. In spite of these questions, many adult cigarette smokers have expressed an interest in ENDS as a way to quit cigarette smoking. Some argue that having adults completely switch from cigarettes to ENDS can generally be viewed as positive for the public's health, given the morbidity and mortality associated with cigarette smoking. However, many in the public health community are alarmed by the marked increase in use of ENDS products among youth, which are now the most popular tobacco product used among this age group. Research studies suggest that this change has occurred, in large part, as a result of access to flavored ENDS products. The availability of flavored ENDS products has created tension between industry and the public health community. Industry-funded research suggests that availability of flavored ENDS may be more appealing to adult cigarette smokers (in comparison to nonsmoking teens) and could help adult cigarette smokers quit cigarette smoking. Conversely, one systematic review of the literature found that both youth and adults enjoy flavors in e-cigarettes. However, the authors of this review stated that \"in terms of whether flavored e-cigarettes assisted [adults] quitting smoking, we found inconclusive evidence.\" In combination, numerous studies have documented that flavors entice youth to initiate and continue using tobacco products, including ENDS. Further, the NASEM concluded that there is substantial evidence that ENDS use among youth increases the risk of such youth ever using cigarettes, leading to concern that tobacco control efforts that have successfully reduced cigarette smoking among both youth and adults will be diminished. The culmination of these factors raises questions about how to regulate ENDS products going forward and, specifically, how to address flavors in tobacco products (including ENDS). In March 2019, FDA released a draft guidance document specifying its intended enforcement activities related to flavored ENDS. This guidance specified that FDA would prioritize enforcement of premarket review, distribution, and sale requirements related to certain flavored ENDS products that may be most accessible to youth. For example, FDA would prioritize enforcement of distribution and sale requirements in retail locations where certain flavored ENDS products may be most accessible to youth, such as in convenience stores and gas stations that do not have adult-only sections. In September 2019, FDA announced that it would finalize this guidance document \"in the coming weeks,\" with the intention of clearing \"the market of flavored e-cigarettes to reverse the deeply concerning epidemic of youth e-cigarette use.\" Delays in guidance finalization led to a Congressional hearing on December 4, 2019 to investigate the cause for delay. In January 2020, FDA released the final guidance document, with some changes compared to the draft guidance. Specifically, the March 2019 draft guidance focused enforcement of premarket authorization requirements based on how and where ENDS products are sold, while the final guidance focuses enforcement of premarket authorization requirements based on ENDS product characteristics (e.g., cartridge-based products). Some public health stakeholders expressed concern that the final guidance does not go far enough to reduce ENDS use among youth. In response to concerns regarding youth access to ENDS products, including flavored ENDS products, Congress may consider further limiting when flavors can be used in ENDS. Congress may also choose to outright ban all flavors (including menthol) in ENDSâas well as in other tobacco productsâas some legislation introduced in the 116 th Congress has proposed. Congress may consider proposals that reduce any tobacco product use, including ENDS, among youth while leaving the option of ENDS use open for adult cigarette smokers in order to benefit the public's health. Congress may also consider how availability of flavored tobacco products would fit into those proposals. Amidst a rise in ENDS use among youth, the emergence of EVALI has raised concern among public health stakeholders, the general public, and Congress. According to CDC, data suggest that the outbreak began in June 2019. Emergency department (ED) visits reached a peak in September 2019, but have since declined. As of January 21, 2020, 60 deaths have been confirmed in 27 states and DC, and 2,711 hospitalized EVALI cases have been reported to CDC in all 50 states, DC, Puerto Rico, and the U.S. Virgin Islands. Among hospitalized EVALI patients with available data, 66% were male and 76% were under 35 years old. Further, among a subset of hospitalized EVALI patients, 82% reported using tetrahydrocannabinol (THC)-containing products. Although the causes of EVALI are still unknown, laboratory data suggest that vitamin E acetateâan additive found in some THC-containing ENDS productsâis closely associated with EVALI. Vitamin E acetate is commonly used as a dietary supplement and in skin creams. While the ingestion and dermal use of vitamin E acetate is not generally associated with adverse health effects, the safety of inhaling vitamin E acetate has not been closely examined. FDA and CDC, along with state and local health departments, have been working together closely to investigate the issue. FDA, the Drug Enforcement Administration (DEA), and local and state authorities have also been investigating the supply chain of ENDS associated with EVALI. FDA and DEA announced that they have seized 44 websites that were advertising the sale of illicit THC-containing vape cartridges, although none of the products advertised on the websites have been linked to any cases of EVALI. Such THC-containing products may raise a larger question of federal oversight pertaining to these products that are available in states permitting the sale of marijuana for recreational or medicinal purposes. Marijuanaâincluding marijuana-derived compounds such as THCâis an illicit substance at the federal level subject to DEA enforcement and regulatory control. However, some states have implemented their own laws on marijuana pertaining to recreational and medicinal use, and the DEA has largely focused resources on criminal networks involved in the illicit marijuana trade. Therefore, THC-containing ENDS products available for sale in states that are allowing recreational and medicinal marijuana may not be the focus of DEA's current enforcement efforts and regulation. Further, ENDS products that do not contain any components, parts, or accessories that are derived from tobacco (e.g., do not contain nicotine) and are not expected to be consumed like a tobacco product may not meet the definition of a tobacco product under the FFDCA. Therefore, such products may not be subject to FDA regulatory requirements pertaining to tobacco products. FDA has indicated that the agency would regulate such products on a \"case-by-case basis, based on the totality of the circumstances.\" Many public health stakeholders have been concerned about youth access to tobacco products more broadly and expressed support for raising the minimum age of purchasing tobacco products from 18 to 21. Numerous scientific studies and Surgeon General Reports have documented that tobacco product use often begins before the age of 18. Nearly 90% of cigarette smokers have tried their first cigarette by age 18, and 98% have tried their first cigarette by age 26. The TCA required FDA to commission a report on the public health impact of raising the minimum age of tobacco product sales. FDA contracted with the Institute of Medicine (now known as the National Academy of Medicine), and concluded in a 2015 report that \"increasing the minimum age of legal access to tobacco products will likely prevent or delay the initiation of tobacco use by adolescents and young adults.\" However, the report noted that \"the impact on initiation of tobacco use of raising the minimum age of legal access to tobacco products to 21 will likely be substantially higher than raising it to 19, but the added effect of raising the minimum age of legal access beyond age 21 to age 25 will likely be considerably smaller.\" In FY2020 appropriations, Congress amended the FFDCA to raise the federal minimum age of tobacco product sales to 21. FDA is also required to update its regulations by June 20, 2020 to reflect the new federal minimum age of tobacco purchasing, as well as the federal minimum age verification requirement (age verification required for individuals less than 30 years of age). The final rule is required to take effect by September 20, 2020. While public health stakeholders view this development in a positive light, some are concerned that the tobacco industry supported this initiative to avoid other measures that could also curb tobacco useâincluding ENDS useâamong youth. Related to the issue of youth access to tobacco productsâincluding ENDSâsome have identified remote sales (i.e., non-face-to-face sales) as an opportunity for minors to illegally purchase tobacco products, due to difficulties in enforcing purchasing restrictions through this medium. While the Prevent All Cigarette Trafficking (PACT) Act of 2009 ( P.L. 111-154 ) placed certain restrictions on remote sales of cigarettes and smokeless tobacco, it did not outright prohibit them. Further, the PACT Act limits the ability of states and local governments to regulate the delivery carriers involved in remote salesâcomplicating enforcement effortsâand did not place such restrictions on other tobacco products, such as ENDS. Section 906 of the FFDCA requires FDA to promulgate regulations on remote sales of tobacco products, including age verification requirements. In 2011, FDA issued an ANPRM regarding remote sales and distribution of tobacco products, but has not taken further regulatory action since that time. Legislation has been introduced in the 116 th Congress that would ban all tobacco product remote sales, including remote sales of ENDS. As has been proposed previously, Congress may also consider amending the PACT Act to extend its provisions to other tobacco products beyond cigarettes and smokeless tobacco, such as ENDS. As mentioned, FDA does not collect user fees from ENDS manufacturers and importers. Given recent concerns around ENDS products, CTP has dedicated a portion of its user fees paid by other tobacco product manufacturers and importers to address ENDS-specific issues. Therefore, some stakeholders have suggested that manufacturers and importers of ENDS products be subject to tobacco user fees to offset costs associated with FDA's current and future ENDS-specific activities. However, FDA has determined that it currently does not have the authority to assess user fees from ENDS manufacturers and importers because Congress did not specify an enumerated class for ENDS products and did not provide a framework by which FDA could potentially assess user fees for ENDS products. Based on FDA's interpretation, in order for ENDS manufacturers to be subject to the tobacco product user fees, Congress would need to provide FDA with the statutory framework for doing so. For example, Congress may consider amending both the FETRA formula and Section 919 of the FFDCA. However, ENDS products are not currently subject to federal excise taxes, and such taxes are a critical component of the FETRA formula (see \" User Fees \"). Therefore, if Congress were to amend FETRA and the FFDCA to explicitly provide FDA the authority to assess user fees on ENDS manufacturers and importers, Congress would likely need to amend the Internal Revenue Code (IRC) to make ENDS products subject to federal excise taxes. Another option for Congress may be to create a new, separate ENDS user fee program. There has been recent congressional and executive branch interest in requiring ENDS manufacturers and importers to pay user fees. Legislation has been introduced in the 116 th Congress that would either amend the FFDCA's current user fee structure by striking the FETRA provisions to allow for assessment of ENDS user fees, or create a new, separate ENDS user fee program. The FY2021 President's budget request also proposes requiring ENDS manufacturers and importers (along with manufacturers and importers of certain other deemed products) to pay $100 million in user fees starting in FY2021. However, based on FDA's current interpretation, user fees could not be collected from ENDS manufacturers and importers without first enacting authorizing legislation. Appendix A. The IQOS Tobacco Heating System The IQOS Tobacco Heating System (IQOS) is commonly referred to as a \"heat-not-burn\" tobacco product. This new technology differs from ENDS technology because it aerosolizes the tobacco plant itself, rather than a tobacco-derived e-liquid. FDA has determined that the IQOS meets the definition of a cigarette and, as such, is subject to additional FFDCA requirements and regulations specific to cigarettes, such as advertising restrictions. The IQOS is composed of three main components: The IQOS Heatstick is a filtered, noncombusted cigarette. A Heatstick is designed to be electrically heated to release nicotine-containing aerosol. The nicotine is derived from a reconstituted tobacco sheet made from ground tobacco powder. The IQOS Holder is an electrically powered and rechargeable unit that holds and warms the Heatstick. The Holder is used for a single Heatstick for about six to seven minutes, after which the Holder needs to be charged and the used Heatstick is discarded. The IQOS Charger recharges and cleans the Holder after each use. Given the novel technology of the IQOS, some industry stakeholders see this product as a potential precedent for the premarket review process that ENDS products will eventually undergo. On May 15, 2017, FDA received PMTAs from Phillip Morris International (PMI) for the IQOS Tobacco Heating System (IQOS). PMI filed four PMTA applications for the IQOS. Three PMTA applications were for the Heatstickâtwo of which were for menthol flavored heatsticksâand one PMTA application was for the Holder and Charger. Nearly two years later, on April 30, 2019, FDA authorized the IQOS Tobacco Heating System for marketing through these PMTAs. Based on the substantial back and forth between PMI and FDA to elicit the information needed for the complete PMTA applications, there is concern that small ENDS manufacturers may not have the resources to engage in the PMTA process in the future. There is also concern that FDA may need additional resources to accommodate the inevitable influx of lengthy ENDS PMTA applications. Appendix B. Tobacco Master Settlement Agreement of 1998 On November 23, 1998, attorneys general from 46 states, the District of Columbia, and the U.S. territories signed a contractual agreement (the Master Settlement Agreement, or MSA) with the major cigarette companies to settle state lawsuits to recover the costs, borne by Medicaid and other public programs, of treating smoking-related illnesses. The remaining four states â Mississippi, Florida, Texas, and Minnesota â had settled individually with the companies prior to the MSA. Under the terms of the MSA, the companies agreed to make annual payments in perpetuity and accept certain restrictions on tobacco product advertising, marketing, and promotion. Specifically, the MSA: prohibited cigarette companies from targeting youth in the advertising, promotion, or marketing of their products; banned the use of cartoons in advertising; limited each company to brand-name sponsorship of one sporting or cultural event a year, excluding concerts, team sports, events with a significant youth audience, or events with underage contestants; banned public transit advertising; banned outdoor billboard advertising, excluding billboard advertising for brand-name sponsored events; limited advertising outside retail stores to signs no bigger than 14 sq. ft; banned company payments to promote cigarettes in various media, including movies and TV; banned non-cigarette apparel with brand-name logos except at brand-name sponsored events; banned gifts of non-cigarette items to youth in exchange for cigarettes; restricted the use of nationally recognized non-tobacco brand names for cigarettes; and limited free samples of cigarettes to adult-only facilities. Appendix C. Definitions of Terms Used in ThisÂ Report Appendix D. Acronyms Used in This Report On November 23, 1998, attorneys general from 46 states, the District of Columbia, and the U.S. territories signed a contractual agreement (the Master Settlement Agreement, or MSA) with the major cigarette companies to settle state lawsuits to recover the costs, borne by Medicaid and other public programs, of treating smoking-related illnesses. The remaining four states â Mississippi, Florida, Texas, and Minnesota â had settled individually with the companies prior to the MSA. Under the terms of the MSA, the companies agreed to make annual payments in perpetuity and accept certain restrictions on tobacco product advertising, marketing, and promotion. Specifically, the MSA: prohibited cigarette companies from targeting youth in the advertising, promotion, or marketing of their products; banned the use of cartoons in advertising; limited each company to brand-name sponsorship of one sporting or cultural event a year, excluding concerts, team sports, events with a significant youth audience, or events with underage contestants; banned public transit advertising; banned outdoor billboard advertising, excluding billboard advertising for brand-name sponsored events; limited advertising outside retail stores to signs no bigger than 14 sq. ft; banned company payments to promote cigarettes in various media, including movies and TV; banned non-cigarette apparel with brand-name logos except at brand-name sponsored events; banned gifts of non-cigarette items to youth in exchange for cigarettes; restricted the use of nationally recognized non-tobacco brand names for cigarettes; and limited free samples of cigarettes to adult-only facilities.", "summary": "Cigarette use remains the leading cause of preventable death in the United States, claiming an estimated 480,000 lives or more each year. Although cigarette use in the United States continues to decline, according to the Centers for Disease Control and Prevention (CDC), 34.2 million American adults smoked cigarettes every day or some days in 2018, and nearly 1.2 million American middle and high school students smoked cigarettes in the past 30 days in 2019. In recent years, electronic nicotine delivery systems (ENDS) have become increasingly popular. ENDS is an umbrella term for various types of electronic tobacco products, including electronic cigarettes (e-cigarettes). An e-cigarette is a battery-operated device typically containing nicotine, flavorings, and other chemicals that, when heated, creates inhalable vapor. According to CDC analyses, 8.1 million American adults used e-cigarettes every day or some days in 2018, and about 5.4 million American middle and high school students used an e-cigarette in the past 30 days in 2019. There has been debate in the public health community regarding the impact of ENDS on public health. Some view ENDS as a safer alternative for adult cigarette smokers, while others are alarmed by increased use among youth. Further, the emergence of e-cigarette, or vaping, product use-associated lung injury (EVALI) that has resulted in 60 deaths and the hospitalization of 2,711 individuals as of January 21, 2020 has raised further concern among public health stakeholders, Congress, and the general public. FDA Regulation of Tobacco Products The Food and Drug Administration (FDA), an agency within the Department of Health and Human Services (HHS), is responsible for regulating the manufacture, marketing, distribution, and sale of tobacco products. FDA's Center for Tobacco Products (CTP)âestablished in 2009 pursuant to the Family Smoking Prevention and Tobacco Control Act of 2009 (TCA; P.L. 111-31 )âis primarily responsible for tobacco product regulation. The TCA amended the Federal Food, Drug, and Cosmetic Act (FFDCA) to establish a new chapter IX (\"tobacco products\"), which, as enacted, applied to cigarettes, cigarette tobacco, roll-your-own tobacco, and smokeless tobacco. However, FDA has the broad authority to regulate any other tobacco products deemed by the agency to meet the definition of a tobacco product and thus to be subject to chapter IX of the FFDCA. In 2016, pursuant to this authority, FDA promulgated regulations (known as \"the deeming rule\") that extended the agency's authority over all tobacco products that were not already subject to the FFDCA, including ENDS. Because tobacco products have no reported health benefits, FDA's regulation of these products differs in certain respects from FDA's regulation of medical products (e.g., prescription drugs, medical devices). Similar to medical product manufacturers, tobacco product manufacturers are subject to manufacturer requirements, including payment of user fees and premarket review, among other requirements. However, while medical product manufacturers are generally required to meet a standard of safety and effectiveness to receive premarket approval from FDA, tobacco product manufacturers are instead generally required to meet a standard \"appropriate for the protection of public health\" to receive marketing authorization. Tobacco product manufacturers, importers, distributors, and retailers are also required to comply with tobacco-specific requirements as a result of the harm that tobacco products pose to human health. Examples of such requirements include the development of tobacco product standards, submission of health information to the agency, and distribution and promotion restrictions, among others. Policy Considerations Both FDA and Congress have taken steps to address regulation of ENDS in light of EVALI and the youth ENDS epidemic. FDA recently finalized a guidance document expressing its enforcement priorities pertaining to certain ENDS products. Some public health stakeholders contend that the policy will not effectively address youth use of ENDS. In parallel, legislation introduced in the 116 th Congress includes more stringent proposals than those planned by FDA to address youth ENDS use, such as banning all flavors in tobacco products (including ENDS). In FY2020 appropriations, Congress enacted provisions raising the federal age of tobacco purchasing from 18 to 21. To apply certain existing FFDCA requirements to tobacco product manufacturers and retailers, such as requiring ENDS manufacturers and importers to pay user fees, Congressional action would need to be taken.", "document_type": "crs"}
{"report": "This report provides analysis of relevant background information and considerations for Congress associated with ongoing Department of Defense (DOD) efforts to obtain enterprise-wide cloud computing services through the Joint Enterprise Defense Infrastructure (JEDI) Cloud acquisition program. In September 2017, then-Deputy Secretary of Defense (DSD) Patrick Shanahan issued a memorandum calling for the accelerated adoption of a DOD enterprise-wide cloud services solution as a key component of ongoing DOD modernization efforts. DOD views this adoption process as a two part effort: in the first phase, DOD is seeking to acquire a cloud services solution accessible to the entirety of the Department that can support Unclassified, Secret, and Top Secret requirements, focusing on commercially available cloud service solutions, through the JEDI Cloud acquisition program. In the second phase, DOD seeks to transition selected existing data and applications maintained by the military departments and agencies to the cloud. Broadly speaking, cloud computing refers to the practice of remotely storing and accessing information and software programs on demand through the internet, instead of storing data on a computer's hard drive or accessing it through an organization's intranet. It relies on a cloud infrastructure , a collection of hardware and software that may include components such as servers and a network. This infrastructure can be deployed privately to a select user group, publicly through subscription-based commercial services available to the general public, or through hybrid deployments that combine aspects of both private and public cloud infrastructure. Cloud computing capabilities are delivered to end users through three main service models: Software as a Service (SaaS) , which provides end users with access to software applications hosted and managed by the cloud computing provider (such as Dropbox, Slack, or Google web-based applications); Platform as a Service (PaaS) , which provides end users with the ability to construct and distribute web-based software applications through a common interface hosted and managed by the cloud computing provider (such as Google App Engine, Amazon Web Services Elastic Beanstalk, Microsoft Azure, and Oracle Cloud); and Infrastructure as a Service (IaaS) , which provides end users with remote access to infrastructure componentsâsuch as servers, virtual machines, and storageâmaintained by the cloud computing provider (such as Amazon Elastic Compute Cloud, Google Compute Engine, and Microsoft Azure). Many major cloud vendors, such as Microsoft and Amazon, are increasingly offering products and services that combine aspects of these service models. Cost, efficiency, accessibility, agility of improvements, security, and reliability are all considerations in public and private sector decisions about cloud service adoption. For a more in-depth discussion of these factors and cloud computing characteristics, deployment models, and service models, see CRS Report R42887, Overview and Issues for Implementation of the Federal Cloud Computing Initiative: Implications for Federal Information Technology Reform Management , by Patricia Moloney Figliola and Eric A. Fischer. Since the establishment of the Federal Cloud Computing Initiative (FCCI) in 2009, the federal governmentâincluding DODâhas actively worked to shift portions of its information technology (IT) needs to cloud-based services through strategies such as \"Cloud First,\" which required federal agencies to prioritize the use of cloud-based solutions whenever a secure, reliable, and cost-effective option existed. This move was intended in part to reduce the total investment by the federal government in physical information technology (IT) infrastructureâthrough actions such as reducing or eliminating data storage at agency-owned and operated data centersâas well as capitalizing on other advantages of cloud adoption. DOD efforts to acquire cloud services have been ongoing; however, DOD has described its current cloud services use as \"decentralized\" and \"disparate,\" creating \"additional layers of complexity\" that impede shared access to common applications and data across the Department. As of mid-2018, DOD reported maintaining more than 500 public and private cloud infrastructures that support Unclassified and Secret requirements. DOD has also acknowledged that its prior lack of \"clear guidance on cloud computing, adoption, and migration,\" as well as acquisition guidance that allowed DOD components to independently pursue the procurement of cloud-based services, has led to \"disjointed implementations with limited capability, siloed data, and inefficient acquisitions that cannot take advantage of economies of scale.\" DOD publicly released its current \"Cloud Strategy\" in February 2019. As part of its cloud strategy, DOD identifies the need to adopt cloud computing services across the Department as a priority, and articulates its intent to develop a \"multi-cloud, multi-vendor â¦ ecosystem composed of a General Purpose and [multiple] Fit For Purpose\" (see Figure 1 ) clouds. DOD anticipates that the JEDI Cloud acquisition program will ultimately lead to a foundational enterprise-wide \"General Purpose\" cloud suitable for the majority of DOD systems and applications, enabling DOD to offer IaaS and PaaS at all classification levels. \"Fit For Purpose\" clouds, on the other hand, are envisioned as task-specific \"commercial solution[s]\"âsuch as the ongoing Defense Enterprise Office Solutions (DEOS) SaaS acquisition program that will create a cloud-based replacement for certain DOD software-based applications such as email and instant messaging servicesâor \"on-premises cloud solution[s],\" such as DISA's milCloud 2.0, which provides IaaS, to be used in limited situations where the \"General Purpose\" cloud cannot adequately support mission needs.\" While the Federal Acquisition Regulation (FAR) does not explicitly provide acquisition guidance for cloud computing services, certain sections (e.g., FAR Part 39, Acquisition of Information Technology or FAR Part 12, Acquisition of Commercial Items ) may apply depending on the specific acquisition strategy for a particular contract. Certain other government-wide acquisition policies for cloud services, such as the Federal Risk and Authorization Management Program (FedRAMP) security assessment process, apply. DOD-specific policies for acquiring cloud services are prescribed in part by Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 239.76, which states that DOD must generally acquire cloud services using commercial terms and conditionsâsuch as license agreements, end user license agreements, terms of service, or other similar legal instrumentsâconsistent with federal law and DOD's needs. A contract to acquire cloud services may generally only be awarded to a provider with provisional Defense Information Security Agency (DISA) authorization to provide such services, consistent with the current version of the DOD Cloud Computing Security Requirements Guide (SRG). To maintain legal jurisdiction over information and data accessed via a cloud services solution, all data stored and processed by or for DOD must reside in a facility under the exclusive legal jurisdiction of the United Statesâmeaning that cloud computing service providers are generally required to store government data that is not physically located on DOD premises at locations within the United States or outlying areas of the United States. All cloud services must have an Authorization to Operate (ATO), an official decision made by a senior official that explicitly accepts any associated operational risks (i.e., risks to organizational operations or assets; individuals; other organizations; or the United States). An ATO is based on the implementation of an agreed-upon set of security controls. The 2014 DOD Memorandum Updated Guidance on the Acquisition and Use of Commercial Cloud Computing Services authorized the direct acquisition of cloud services by DOD components, and provided additional guidance for the acquisition of commercial cloud services. In the unclassified summary of the 2018 National Defense Strategy (NDS), the Department articulates the need for significant DOD investment in key technology capabilities such as \"cyber defense, resilience, and the continued integration of cyber capabilities into the full spectrum of military operations,\" as well as \"military application of autonomy, artificial intelligence, and machine learning\" in order to maintain military superiority against near-peer adversaries such as China and Russia. The Department views the cloud computing and data storage capabilities to be acquired through the JEDI Cloud procurement as providing \"foundational technologies\" for these investments. The Joint Chiefs of Staff has also stated that \"efforts for accelerating [cloud adoption] are critical in creating a global, resilient, and secure information environment that enables warfighting and mission command.\" DOD Chief Information Officer (CIO) Dana Deasy has further contended that the Department requires an enterprise-wide cloud \"that allows for data-driven decision making [and] enables DOD to take advantage of our applications and data resources,\" in part to provide worldwide support for DOD operations. In recent public statements DOD CIO Deasy, as well as Lt. Gen. Bradford J. Shwedo, Director for Command, Control, Communications and Computers/Cyber of the J6 Command, Control, Communications, and Computers (C4) and Cyber Directorate of the Joint Staff, have also emphasized that delays in pursuing the capabilities included in the JEDI Cloud procurement may adversely affect ongoing Department activities, such as the recently established Joint Artificial Intelligence Center, which seeks to accelerate the delivery of artificial intelligence-enabled capabilities to DOD. Initially, the Cloud Executive Steering Group (CESG) oversaw DOD's cloud adoption initiative. The CESG, established in September 2017, reported directly to the Deputy Secretary of Defense (DSD). The CESG was originally chaired by Ellen Lord, then the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD (AT&L)). At first, the CESG included the Director of the Strategic Capabilities Office (SCO), the Managing Partner of the Defense Innovation Unit Experimental (DIUx, now known as the Defense Innovation Unit, or DIU), the Director of the Defense Digital Service (DDS), and the Executive Director of the Defense Innovation Board (DIB) as voting members (see Table 1 ). The DDS Director was tasked with leading phase one of DOD's cloud adoption initiative: the JEDI Cloud program. In January 2018, the DSD announced changes to the membership and leadership of the CESG; the Deputy Chief Management Officer (DCMO; Jay Gibson, who was serving as DCMO at the time, would later become DOD's first CMO) would chair the group, with the Director of Cost Assessment and Program Evaluation (CAPE) and the DOD CIO added to the group's members. In June 2018, the DSD announced that the DOD CIO, as the principal staff assistant and senior advisor to the Secretary of Defense for information technology, would oversee all aspects of DOD's cloud adoption initiative, to include the JEDI Cloud acquisition program. The Cloud Computing Program Office (CCPO), which was established by DDS to serve as the program office for the JEDI Cloud program, was also transitioned to the Office of the CIO at that time. A Request for Information (RFI) for the JEDI Cloud program was issued in October 2017; the Department held an industry day event and issued a draft Request for Proposal (RFP) in early March 2018, with a second draft RFP issued in April 2018. The final JEDI RFP was issued on July 26, 2018, and closed on October 9, 2018. In early April 2019, DOD announced that the Department had completed an initial downselect from four qualified proposals submitted by IBM, Amazon Web Services, Microsoft, and Oracle America. Amazon Web Services and Microsoft remain in contention for the contract. The Department is in the final stages of evaluating proposals, and originally anticipated announcing a contract award decision in August 2019. However, Secretary of Defense Dr. Mark T. Esper is reportedly currently reviewing the JEDI Cloud program, which may delay the award. DOD requested $61.9 million in funding for the JEDI Cloud acquisition program for Fiscal Year (FY) 2020. Through the JEDI Cloud contract, DOD intends to conduct a full and open competition that will result in a single award Indefinite Delivery/Indefinite Quantity (ID/IQ) firm-fixed price contract for commercial items (i.e., IaaS and PaaS). DOD wants the JEDI Cloud to provide worldwide cloud computing servicesâincluding in austere environmentsâcomparable to those made available through commercial cloud services. Accordingly, the Department has specified that an offeror does not need to maintain dedicated or exclusive infrastructure for unclassified services. However, offerors must comply with the JEDI Cloud Cyber Security Plan, and must provide dedicated, exclusive infrastructure for classified services. DOD is further requiring any successful offeror to provide rapid deployment of new commercially available cloud-related services to JEDI Cloud users, and expects ongoing parity with public commercial prices. DOD indicated that the minimum guaranteed award is $1 million. The contract is expected to have a maximum ceiling of $10 billion across a potential 10-year period of performance. Under an ID/IQ contract, the government is only required to purchase the minimum amount specified in the contract, and may ultimately choose not to reach the contract ceiling. The contract period of performance is structured as a two-year base ordering period, with three additional option periods (two three-year options and one two-year option), for a potential total of 10 years (see Table 1 ). DOD indicated that it will award the JEDI Cloud contract to the offeror whose proposal meets specified requirements and represents the best value to the government, based on a two-step evaluation process. In the first step, offerors were evaluated against seven performance-based criteria (see Figure 2 for a full listing).3 Proposals were deemed acceptable or unacceptable for each individual sub-factor as considered sequentially: a judgement of unacceptable immediately disqualified a proposal from further consideration. For example, performance sub-factor 1.1, \"Elastic Usage,\" requires offerors to provide summary data for the months of January and February 2018 in order to demonstrate that additional traffic generated by unclassified usage of the JEDI Cloud would not represent a majority of a proposed solution's commercially available network, computational, and storage capacity. Performance sub-factor 1.2, \"High Availability and Failover,\" in part requires offerors to have no fewer than three existing physical data centers at least 150 miles apart within the United States or outlying areas of the United States. If a proposal received a mark of \"acceptable\" for each sub-factor, it proceeded to the second phase of the source selection process, where it was then evaluated against five additional technical factors, together with submitted price proposals, to determine a \"competitive range\" of offerors. Qualifying offerors within the competitive range were next evaluated against two additional factors: the offeror's approach to meeting small business participation goals and a demonstration of the proposed solution's capabilities. DOD received more than 1,500 comments in response to its draft RFPs. Companies including Amazon Web Services, Google, IBM, and Microsoft initially expressed interest in competing for the JEDI Cloud contract. However, DOD's acquisition strategy also sparked resistance from those who opposed DOD's intent to award the contract to a single company. This concern led some industry associations to publicly contest a single award, arguing that it would be inconsistent with broader federal cloud computing implementation guidance, and could unfairly restrict future competition for DOD cloud services. For example, the trade group ITAPS (IT Alliance for Public Sector) sent a letter to the House and Senate Armed Services committees stating in part that the deployment of a single cloud conflicts with established best practices and industry trends in the commercial marketplace, as well as current law and regulation, which calls for the award of multiple task or delivery order contracts.... Further, the speed of adoption of innovative commercial solutions, like cloud, is facilitated by the use of these best practices. In October 2018, Google announced that it would not be submitting a bid for the contract, citing possible conflict with its corporate principles, along with DOD's plans to award the contract to a single vendor, among its reasons for withdrawing. Oracle America and IBM both filed pre-award bid protests with the Government Accountability Office (GAO) against the JEDI Cloud solicitation; GAO denied Oracle America's protests on November 14, 2018, and dismissed IBM's protests on December 11, 2018. Subsequently, Oracle America filed a bid protest lawsuit with the U.S. Court of Federal Claims. In filings associated with its bid protest lawsuit, Oracle America in part alleged that (1) the performance-based criteria include in the first step of the contract source selection process were \"unduly restrictive and arbitrary\" and (2) the JEDI Cloud acquisition process was unfairly skewed in favor of Amazon Web Services through potential organizational conflicts of interest associated with three former DOD employees, each of whom was involved to greater or lesser degrees in the early development of the program. Two of these former DOD employees were subsequently employed by Amazon Web Services. These claims attracted significant media and congressional attention. DOD investigations determined that Amazon Web Services had no unmitigated organizational conflicts of interest, and established that the actions of the individuals identified by Oracle America did not negatively impact the procurement or grant Amazon Web Services an unfair competitive advantage. However, the investigations did identify individual violations of ethical standards established by FAR Part 3.101-1, which directs government procurement activities to be \"conducted in a manner above reproach,\" and for government employees to strictly \"avoid â¦ any conflict of interest or even the appearance of a conflict of interest in Government-contractor relationships.\" These findings were reportedly referred to the DOD Inspector General for further review. The U.S. Court of Federal Claims ruled against Oracle America in a July 12, 2019, decision, finding in part that sub-factor 1.2 of the sequentially considered performance-based criteria included in the Department's source selection process was \"enforceable,\" and noting that as Oracle America admitted that its services did not \"meet that criteria at the time of proposal submission, [the Court] conclude[s] that it cannot demonstrate prejudice as a result of other possible errors in the procurement process .\" DOD officials have repeatedly described JEDI Cloud as a test model for DOD's future transition of legacy information technology systems to the cloud and have stressed that it is not intended to be a final solution. DOD CIO Dana Deasy has also highlighted the Department's lack of experience in deploying an enterprise-wide cloud solution, arguing that \"starting with a number of firms while at the same time trying to build out an enterprise capability\" would \"double or triple\" the technical complexity of the program. In the Department's May 2018 report to Congress, DOD indicated that the JEDI Cloud contract would include multiple mechanisms to â¦ maximize DOD's flexibilities going forward â¦ the initial base ordering period is limited to 2 years, which will allow for sufficient time to validate the operational capabilities of JEDI Cloud and the DOD enterprise-wide approach. Option periods ... will only be exercised if doing so is the most advantageous method for fulfilling the DOD's requirements when considering the market conditions at the time of option exercise. As detailed in the JEDI Cloud RFP, offerors submitting a proposal to DOD were required to provide detailed transition and data portability plans, to include the complete set of processes and procedures necessary to extract all relevant data (such as system and network configurations, activity logs, source code, etc.) from the JEDI Cloud environment and systematically migrate to another cloud environment. Section 2304a of Title 10, U.S. Code establishes a preference for making multiple awards for task or delivery order contracts, and separately prohibits DOD from awarding task or delivery order contracts exceeding $112 million (including all option periods) to a single source unless the head of the agency determines in writing that one or more of four specified circumstances apply. DOD detailed the rationale for using a single-award ID/IQ contract for the JEDI Cloud procurement, pursuant to 10 U.S.C.2304a(d)(4) and the provision's implementing FAR requirements, noting that while the FAR establishes a general preference for multiple award ID/IQ contracts, the FAR also establishes that a contracting officer must not use a multiple award approach if one or more of six conditions apply. Accordingly, the JEDI Cloud contracting officer determined that more favorable terms and conditions, including pricing, would be provided through a single award; the expected higher cost of administering multiple contracts \"outweigh[ed] the expected benefits of making multiple awards\" with a DOD-estimated additional cost of $500 million associated with administering multiple contracts; and multiple awards would not be in the best interests of DOD in this particular instance, as a multi-cloud environment could potentially \"create seams between clouds that increase security risks â¦ frustrate DOD's attempts to consolidate and pool data â¦ [and could] exponentially increase the technical complexity require to realize the benefit of cloud technology.\" Together with the JEDI Cloud RFP, the Department also released its determination pursuant to 10 U.S.C. 2304a(d)(3), which prohibits DOD from awarding large task or delivery order contracts to a single source unless a senior official determines if at least one of four exceptions to the prohibition is present, that the JEDI Cloud contract provides only for firm-fixed price task orders or delivery orders for services for which prices are established in the contract for the specified tasks to be performed. However, the JEDI Cloud contract will also contain pricing related clauses intended to allow the Department to benefit from future marketplace competition driving commercial sector cloud services pricing downward, and to provide DOD with access to new cloud services as they become available to the commercial market the contract automatically lower DOD's prices when the contractor's public commercial prices are lowered. The lower unit price is fixed. â¦ [T]o achieve commercial parity over time, the contract contemplates adding new or improved cloud services to the contract. The new services clause requires â¦ approval for the addition of new services and includes mechanisms to ensure that the fixed unit price for the new service cannot be higher than the price that is publicly available in the commercial marketplace in the continental United States. This same clause requires that, if a service â¦ is eliminated from the Contractor's publicly available commercial catalog, the Contractor shall offer replacement service(s) â¦ at a price no higher than, the service being eliminated. As with any other cloud offering, once the new service is added to the catalog, the unit price is fixed and cannot be changed without contracting officer approval. The U.S. Court of Federal Claims questioned DOD's use of the 10 U.S.C. 2304a(d)(3) exception for firm fixed-price task or delivery orders in its determination in tandem with the JEDI Cloud contract's price adjustment clauses, noting that \"prices for new, additional services to be identified and priced in the future, even if they may be capped in some cases, are not, by definition, fixed or established at the time of contracting.\" Section 1064 of P.L. 115-232 , the John S. McCain National Defense Authorization Act (NDAA) for FY2019, required the DOD CIO to conduct activities supporting DOD's cloud adoption initiative: developing an approach to rapidly acquire advanced network capabilities, including software-defined networking, on-demand bandwidth, and aggregated cloud access gateways, through commercial service providers; and conducting an analysis of existing systems and applications that would be migrated to the JEDI Cloud environment. Section 1064 required the DOD CIO to submit a report on the current status and anticipated implementation of DOD's cloud adoption initiative, and limited the use of authorized FY2019 funds for DOD's cloud adoption until the required report's submission. The Department submitted the required report in January 2019. Section 1064 further required DOD to complete an assessment to determine whether an information system or application is already, or can and would be cloud-hosted, prior to approving any new system or application for development or modernization. Finally, and pointedly, Section 1064 requires the Deputy Secretary of Defense to \"ensure that the acquisition approach of the Department [for the JEDI Cloud procurement] continues to follow the [FAR] with respect to competition.\" In the conference report accompanying the FY2019 NDAA ( H.Rept. 115-874 ), the conferees emphasize the importance of modernizing networks by adopting advancing [sic] commercial capabilities to achieve DOD's cloud transition and enterprise efficiency goals. â¦ The conferees encourage the Department to continue to ensure that cloud technologies are technically suitable, appropriately tested for security and reliability, and integrated with other DOD information technology efforts so as to optimize effective and efficient procurement of such technologies and services and their performance in support of DOD missions. Finally, the conferees note that although transparency and information sharing by the Department on the Cloud Initiative has slightly improved, it continues to be insufficient for conducting congressional oversight. The conferees expect the Department to improve communication with Congress on this issue and will consider additional legislation if an improvement is not seen. Section 8137 of P.L. 115-245 , which provided FY2019 DOD appropriations, prevented the obligation or expenditure of FY2019 funds to \"migrate data and applications to the proposed [JEDI] ... cloud computing services\" until 90 days after the Secretary of Defense submitted (1) a plan to establish a DOD-wide budget accounting system for funds requested and expended for cloud services, as well as funds requested and expended to migrate to a cloud environment; and (2) a detailed description of DOD's strategy to implement enterprise-wide cloud computing to the congressional defense committees. The Department submitted the required report in January 2019. The House Armed Services Committee report ( H.Rept. 116-120 ) accompanying the House-passed FY2020 NDAA ( H.R. 2500 ), includes the committee's commendation for DOD's cloud strategy Cloud infrastructure, such as [JEDI], allows users to access information from anywhere at any time, effectively removing the need for the user to be in the same physical location as the hardware that stores the data. â¦ The ability of cloud infrastructure to scale ensures that the Department efficiently manages and modernizes its information technology needs and demands. The committee endorses the Department's strategy and concept for a flexible enterprise cloud architecture that enshrines the need and value for both general purpose and fit-for-purpose cloud solutions through a multi-cloud, multi-vendor approach. Section 1035 of S. 1790 , the Senate-passed FY2020 NDAA, would specify that the DOD CIO and the DOD Chief Data Officer, in consultation with the J6 Command, Control, Communications, and Computers (C4) and Cyber Directorate of the Joint Staff and the DOD CMO, must develop and issue DOD-wide policy and implementing instructions regarding the transition of data and applications to the cloud. Such a policy would be required to \"dramatically improve support to operational missions and management processes, including by the use of artificial intelligence and machine learning technologies.\" In its \"Items of Special Interest\" for Title XVI (\"Strategic Programs, Cyber, and Intelligence Matters\"), the Senate Armed Services Committee report ( S.Rept. 116-48 ) for the FY2020 NDAA notes the committee's understanding for the \"potential of commercial clouds to provide cost-effective, state-of-the-art capabilities,\" but highlights the committee's view that tDOD must be able to \"conduct cybersecurity testing\" for commercial cloud products and services, \"including threat-realistic cyberattacks, to assess the cybersecurity of the Department's data and the cyber defense response to the attacks.\" The report directs the Secretary of Defense to provide a related briefing to the House and Senate Armed Services Committees, and recommends the inclusion of information regarding independent cyber assessments for commercially provided infrastructure in Director of Operational Test and Evaluation annual reports. The House Appropriations Committee report ( H.Rept. 116-84 ) accompanying H.R. 2968 , the House-passed FY2020 Department of Defense appropriations act, highlights the committee's skepticism of DOD's pursuit of a \"single vendor contract strategy\" for the JEDI Cloud procurement The Committee continues to be concerned with this approach given the rapid pace of innovation in the industry and that this approach may lock the [DOD] into a single provider for potentially as long as ten years. Since the [DOD] adopted its single vendor strategy in 2017, other federal agencies â¦ have decided to pursue a multiple vendor cloud strategy as recommended by the [OMB] \"Cloud Smart\" strategy â¦ the Committee believes the [DOD] is deviating from established OMB policy and industry best practices, and may be failing to implement a strategy that lowers costs and fully supports data innovation for the warfighter. Accordingly, the House Appropriations Committee report would direct that no funds may be obligated or expended to migrate data and applications to the JEDI Cloud until the DOD CIO provides a report to the congressional defense committees expanding on the Department's plans to transition to a \"multi-cloud, multi-vendor\" environment. The DOD CIO would be directed to provide a listing of anticipated contracting opportunities for the acquisition of commercial cloud services by the Department over the next two years, to include specified elements such as planned contract type and structure; whether the procurement is anticipated to be conducted as a full and open competition or as a sole source award; the estimated timeframe for the release of related solicitations; and the estimated maximum contract value and period of performance, including option periods. The DOD CIO would also be directed to submit quarterly reports on the implementation of its cloud adoption and implementation strategy to the House and Senate Appropriations Committees, beginning 30 days after the enactment of a FY2020 defense appropriations act. Various Members of Congress have also individually and collectively advocated for the Department to take certain actions relating to the JEDI Cloud procurement. For example, some Members have urged DOD to delay or postpone awarding the JEDI Cloud contract to accommodate an alternate acquisition strategy, or the conclusion of the DOD Inspector General's investigation into the potential violations of ethical standards by former DOD employees. Other Members have supported DOD's acquisition strategy, advocating for the Department to award the JEDI Cloud contract as soon as possible. Significant attention has focused on DOD's intent to award the JEDI Cloud contract to a single company. Some observers contend that an initial single award appears to contradict broader federal cloud computing implementation guidance and industry best practices that stress the importance of multi-cloud solutions. Other experts point to the implementation approaches identified by DOD's Cloud Strategy as an indication that the Department expects the JEDI Cloud to serve certain enterprise-wide functions, performing as one component of a broader multi-cloud, multi-vendor system. Some observers, however, have concluded that the JEDI Cloud requirements are misaligned with DOD's Cloud Strategy, and have urged the Department to rescind and revise the JEDI Cloud RFP. Those opposed to DOD's use of a single-award contract for the JEDI Cloud program have suggested that a single-award contract could potentially restrict future competition for enterprise-wide DOD IaaS and PaaS cloud services. Supporters of DOD's approach argue that the JEDI Cloud program's requirement for offerors to develop platform-agnostic applications and data schema suggests that the Department will be well equipped to migrate from any service environment developed under the JEDI Cloud contract to another such environment. Potential considerations for Congress concerning the ongoing JEDI Cloud acquisition process, as well as any follow-on efforts, include the following issues. As DOD has indicated that it believes the initial two-year base ordering period is sufficient time to validate the JEDI Cloud test model, Congress may consider directing DOD to provide detailed rationale and justification for any extension of the JEDI Cloud contract prior to the exercise of contract options. At the time of option exercise, Congress may also consider directing the Department to report on any notable lessons learned or challenges experienced in the execution of the JEDI Cloud contract. As emphasized in the conference report accompanying the FY2019 NDAA ( H.Rept. 115-874 ), Congress may also wish to monitor the extent to which the Department has \"improved communication with Congress\" to enable sufficient congressional oversight of the JEDI Cloud program and DOD's cloud adoption initiative. The U.S. Court of Federal Claims decision agreed with the Department's finding that the actions of the individuals identified by Oracle America in its bid protest lawsuit did not negatively impact the procurement or grant Amazon Web Services an unfair competitive advantage. However, the individual violations of ethical standards for federal employees involved in the acquisition of goods and services for the U.S. governmentâwhich generated the appearance of unresolved conflicts of interestâidentified by DOD in the course of its investigations delayed the JEDI Cloud procurement process. The FAR directs government procurement activities to be \"conducted in a manner above reproach,\" and for government employees to strictly \"avoid â¦ even the appearance of a conflict of interest.\" Congress may accordingly consider directing DOD to examine the current emphasis on ethical conduct and the Procurement Integrity Act in education, training, and qualification requirements for designated acquisition positionsâas well as considering the need to include equivalent training for DOD servicemembers and civilian employees outside of the defense acquisition workforce who may provide technical expertise or other support for procurement programsâand determine what, if any, changes should be made to associated curriculum and certification requirements.", "summary": "In September 2017, the Deputy Secretary of Defense issued a memorandum calling for the accelerated adoption of a Department of Defense (DOD) enterprise-wide cloud services solution as a fundamental component of ongoing DOD modernization efforts. As a component of this effort, DOD is seeking to acquire a cloud services solution accessible to the entirety of the Department that can support Unclassified, Secret, and Top Secret requirements, focusing on commercially available cloud service solutions, through the Joint Enterprise Defense Infrastructure (JEDI) Cloud acquisition program. DOD intends to conduct a full and open competition that is expected to result in a single award Indefinite Delivery/Indefinite Quantity firm-fixed price contract for commercial items. DOD has indicated that the minimum guaranteed award is $1 million, and that the initial period of performance is two years. The contract is expected to have a maximum ceiling of $10 billion across a potential 10-year period of performance. DOD is in the final stages of evaluating proposals, with Amazon Web Services and Microsoft remaining in contention for the contract. The Department originally expected to award the contract in August 2019. However, Secretary of Defense Dr. Mark T. Esper is reportedly currently reviewing the JEDI Cloud program, which may delay the award. Significant industry and congressional attention has been focused on DOD's intent to award the JEDI Cloud contract to a single company. Oracle America filed multiple pre-award bid protests with the Government Accountability Office, which were denied. Oracle America then filed a bid protest lawsuit with the U.S. Court of Federal Claims; the court ruled against Oracle in a July 12, 2019, decision. In filings associated with its bid protests, Oracle America alleged in part that the JEDI Cloud acquisition process was unfairly skewed in favor of Amazon Web Services through potential organizational conflicts of interest associated with three former DOD employees, each of whom was involved to greater or lesser degrees in the early development of the program. DOD investigations determined that Amazon Web Services had no conflicts of interest and established that the actions of the individuals identified by Oracle America did not negatively impact the procurement or grant Amazon Web Services an unfair competitive advantage. However, the investigations did identify individual violations of ethical standards established by the Federal Acquisition Regulation. Some industry observers contend that an initial single award appears to contradict broader federal cloud computing implementation guidance and industry best practices that stress the importance of multi-cloud solutions. Others point to the implementation approaches identified by DOD's 2019 Cloud Strategy as evidence that the Department expects the JEDI Cloud to serve certain enterprise-wide functions, performing as one component of a broader multi-cloud, multi-vendor system. Opponents of DOD's use of a single-award contract for the JEDI Cloud program have suggested that this tactic could restrict future competition for enterprise-wide DOD cloud services. Supporters of DOD's approach argue that the JEDI Cloud program's requirement for offerors to develop applications and data schema easily transferable to different platforms suggests that the Department may be equipped to migrate from any service environment developed under the JEDI Cloud contract to another such environment. Several Members of Congress have engaged the Administration to express their views regarding the JEDI Cloud acquisition program and pending contract award. The 116 th Congress is considering related authorization and appropriations legislation that could shape future implementation of the program ( H.R. 2740 , H.R. 2500 , and S. 1790 ).", "document_type": "crs"}
{"report": "The Federal Bureau of Investigation (FBI) administers a computer system of systems that is used to query federal, state, local, tribal, and territorial criminal history record information (CHRI) and other records to determine if an indiv idual is eligible to receive and possess a firearm. This FBI-administered system is the National Instant Criminal Background Check System (NICS). This system, or parallel state systems, must be checked and the transfer approved by an FBI NICS examiner or state point of contact (POC) before a federally licensed gun dealer may transfer a firearm to any customer who is not similarly licensed federally as a gun dealer. Under current law, persons who buy and sell firearms repeatedly for profit and as a principal source of their livelihood must be licensed federally as gun dealers. Federally licensed gun dealersâotherwise known as federal firearms licensees (FFLs)âare permitted to engage in interstate and, by extension, intrastate (i.e., within a state) firearms commerce with certain restrictions. For example, they may not transfer a handgun to an unlicensed, out-of-state resident. Conversely, persons who occasionally buy and sell firearms for personal use, or to enhance a personal collection, are not required to be licensed federally as a gun dealer. Those unlicensed persons, however, are prohibited generally from making interstate firearms transactionsâthat is, engaging in interstate firearms commerceâwithout engaging the services of a federally licensed gun dealer. On the other hand, current law does not require background checks for intrastate, private-party firearms transactions between nondealing, unlicensed persons, though such checks might be required under several state laws. Nevertheless, it is unlawful for anybody, FFLs or private parties, to transfer a firearm or ammunition to any person they have reasonable cause to believe is a prohibited person (e.g., a convicted felon, a fugitive from justice, or an unlawfully present alien). In the 116 th Congress, the House of Representatives has passed three bills that would significantly expand the federal firearms background check requirements and the current prohibitions on the transfer or receipt and possession of firearms related to domestic violence. Those bills are the Bipartisan Background Checks Act of 2019 ( H.R. 8 ), a bill to expand federal firearms recordkeeping and background check requirements to include private-party, intrastate firearms transfers; Enhanced Background Checks Act of 2019 ( H.R. 1112 ), a bill to extend the amount of time allowed to delay a firearms transfer, pending a completed background check to determine an individual's eligibility; and Violence Against Women Reauthorization Act of 2019 ( H.R. 1585 ), a bill to expand firearms transfer or receipt and possession prohibitions to include dating partners with histories of domestic violence and stalking misdemeanors. In addition, several multiple-casualty shootings have highlighted possibly systemic vulnerabilities in the NICS-related federal background check procedures, particularly with regard to making records on prohibited persons accessible to federal data systems queried as part of the federal background check process. This report provides an overview of federal firearms statutes related to firearms transactions in interstate and intrastate commerce, dealer licensing, receipt and possession eligibility, NICS background check procedures, analysis of recent legislative action, and discussion about possible issues for Congress. Two major federal statutes regulate firearms commerce and possession in the United States. The Gun Control Act of 1968 (GCA; 18 U.S.C. Â§921 et seq.) regulates all modern (nonantique) firearms. In addition, the National Firearms Act, enacted in 1934 (NFA; 26 U.S.C. Â§5801 et seq.), regulates certain other firearms and devices that Congress deemed to be particularly dangerous because they were often the weapons of choice of gangsters in the 1930s. Such weapons include machine guns, short-barreled rifles and shotguns, suppressors (silencers), a catch-all class of concealable firearms classified as \"any other weapon,\" and destructive devices (e.g., grenades, rocket launchers, mortars, other big-bore weapons, and related ordnance). Congress passed both the NFA and GCA to reduce violent crimes committed with firearms. More specifically, the purpose of the GCA is to assist federal, state, local, tribal, and territorial law enforcement in the ongoing effort to reduce crime and violence. It is not intended to place any undue or unnecessary federal restrictions or burdens on citizens in regard to lawful acquisition, possession, or use of firearms for hunting, trapshooting, target shooting, personal protection, or any other lawful activity. Many observers have long noted that the assassinations of President John F. Kennedy and his brother, Senator Robert F. Kennedy, and civil rights leader Martin Luther King provided the impetus to pass the GCA. Perhaps equally compelling were the August 1, 1966, University of Texas tower mass shooting and social unrest that accompanied the 1960s. Under the Attorney General's delegation, the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) is the principal agency that administers and enforces these statutes. In addition, ATF administers several provisions of the Arms Export Control Act of 1976 (AECA) with regard to the importation of certain firearms, firearms parts, and ammunition that are also regulated under the GCA and NFA. For the most part, however, the FBI maintains NICS and administers the background check provisions of the GCA. Nonetheless, as discussed below, ATF is charged with investigating whether denied persons made false statements in connection with a firearms transfer; when filling out federal firearms transaction forms. In addition, ATF is also charged with firearms retrieval actions, whenever delayed transactions and incomplete background checks possibly result in prohibited persons acquiring firearms. The GCA sets firearms eligibility age restrictions under certain circumstances, as well as prohibits various categories of persons from firearms receipt and possession, among other factors. For example, as enacted, the GCA prohibits federally licensed gun dealers (i.e., FFLs) from transferring a long gun (shoulder-fired rifle or shotgun) or ammunition to anyone under 18 years of age; and a handgun or ammunition suitable for a handgun to anyone under 21 years of age. In 1994, Congress amended the GCA to prohibit anyone from transferring a handgun to a juvenile, or anyone under 18 years of age. Congress also made it unlawful for a juvenile to possess a handgun. Congress also provided exceptions to these juvenile transfer and possession prohibitions. Exceptions include temporary transfers in the course of employment in ranching or farming, in target practice, or hunting, all with the written consent of the parents or guardians and in accordance with federal and state laws; for self- or household-defense; or in other specified situations. Under the GCA, as amended, there are 10 categories of persons prohibited from receiving firearms. For 9 of those categories, those persons are also prohibited from possessing a firearm. More specifically, under 18 U.S.C. Â§922(g), there are nine categories of persons prohibited from shipping, transporting, receiving, or possessing a firearm or ammunition, which has been shipped or transported in interstate or foreign commerce: 1. persons convicted in any court of a felony crime punishable by imprisonment for a term exceeding one year and state misdemeanors punishable by imprisonment for a term exceeding two years; 2. fugitives from justice; 3. unlawful users or addicts of any controlled substance; 4. persons adjudicated as \"a mental defective,\" found not guilty by reason of insanity, or committed to mental institutions; 5. unauthorized immigrants and nonimmigrant visa holders (with exceptions in the latter case); 6. persons dishonorably discharged from the U.S. Armed Forces; 7. persons who have renounced their U.S. citizenship; 8. persons under court-order restraints related to harassing, stalking, or threatening an intimate partner or child of such intimate partner; and 9. persons convicted of a misdemeanor crime of domestic violence. Under 18 U.S.C. Â§922(n), there is a 10 th class of persons prohibited from shipping or transporting firearms or ammunition, or from receiving (but not possessing) firearms or ammunition that had been shipped or transported in interstate or foreign commerce: 1. persons under indictment in any court of a crime punishable by imprisonment for a term exceeding one year. It is unlawful for any person under any circumstances to sell or otherwise dispose of a firearm or ammunition to any of the prohibited persons enumerated above, if the transferor (seller, federally licensed or unlicensed) has reasonable cause to believe that the transferee (buyer/recipient) is prohibited from receiving those items. Under the GCA as enacted, persons who, or firms that, are \"engaged in the business\" of importing, manufacturing, or selling firearms must be federally licensed. In 1986, Congress amended the GCA to define the term \"engaged in the business.\" For dealers it means: a person who devotes time, attention, and labor to dealing in firearms as a regular course of trade or business with the principal objective of livelihood and profit through the repetitive purchase and resale of firearms, but such term shall not include a person who makes occasional sales, exchanges, or purchases of firearms for the enhancement of a personal collection or for a hobby, or who sells all or part of his personal collection of firearms. ATF issues federal firearms licenses to firearms importers, manufacturers, dealers, pawnbrokers, and collectors. As summarized by ATF in January 2016 guidance: A person engaged in the business of dealing in firearms is a person who \"devotes time, attention and labor to dealing in firearms as a regular course of trade or business with the principal objective of livelihood and profit through the repetitive purchase and resale of firearms.\" Conducting business \"with the principal objective of livelihood and profit\" means that \"the intent underlying the sale or disposition of firearms is predominantly one of obtaining livelihood and pecuniary gain, as opposed to other intents, such as improving or liquidating a personal firearms collection.\" Consistent with this approach, federal law explicitly exempts persons \"who make occasional sales, exchanges, or purchases of firearms for the enhancement of a personal collection or for a hobby, or who sells all or part of his personal collection of firearms.\" Under the GCA, only FFLs are allowed to transfer firearms commercially from one state to another, that is, to engage in interstate (or foreign) firearms commerce. At the same time, it would be highly improbable for any firearms business to compete successfully in the U.S. civilian gun market by only selling firearms manufactured in the state in which it does business; that is, to engage exclusively in intrastate commerce. As a practical matter, any person who deals in firearms as a business, either in interstate or intrastate commerce, needs to be federally licensed firearms manufacturer, importer, or dealer. FFLs may transfer a long gunâa shoulder-fired rifle or shotgunâto unlicensed persons from another state as long as such transfers are legal in both states and they meet in person to make the transfer. However, FFLs may not transfer a handgun to any unlicensed resident of another state. Since 1986 there have been no similar restrictions on the interstate transfer of ammunition, because Congress repealed those restrictions at the request of ATF. Furthermore, a federal firearms license is not required to sell ammunition; however, such a license is required to either manufacture or import ammunition. In addition, FFLs are required to maintain bound logs of firearms acquisitions and dispositions to and from their business inventories by date, make, model, and serial number of individual firearms and transactions records for firearms sales to unlicensed, private persons. ATF periodically inspects these FFLs to monitor their compliance with federal and state law. Under current law, there are statutory prohibitions against ATF, or any other federal agency, maintaining a registry of firearms or firearms owners. Nevertheless, the system of recordkeeping described above allows ATF agents to trace, potentially, the origins of a firearm from manufacturer or importer to a first retail sale and buyer. ATF agents assist other federal agencies, as well as state and local law enforcement, with criminal investigations. The ATF also makes technical judgements about firearms, including the appropriateness of manufacturing and importing certain makes and models of firearms and firearms parts. As described in greater detail below, since November 30, 1998, all FFLs are required to initiate a background check for both handguns and long guns on any prospective firearms purchaser who is otherwise unlicensed federally to engage in firearms commerce as a business. The FBI facilitates these background checks nationwide through NICS. However, for some states, these FBI-facilitated background checks are routed to state or local authorities (points of contact, or POCs) for all firearms (handguns and long guns), or just for handgun transfers or permits for other states. For the most part, the GCA does not regulate firearms transactions between two unlicensed persons, who reside in the same state; that is, private-party, intrastate firearms transfers. Such transfers are not covered under current federal law as long as the parties are: not \"engaged in the business\" of dealing in firearms \"as a regular course of trade or business with the principal objective of livelihood and profit\"; residents of the same state, where the transfer is made; not prohibited from receiving or possessing firearms; and the recipients are of age (at least 18 years old). It follows, therefore, that private firearms transactions between persons who are not \"engaged in the business\" of firearms dealing and, thus, who are not required to be federally licensed, are not covered by the recordkeeping or the background check provisions of the GCA if those parties reside in the same state. The meaning of \"state of residence\" is not defined in the GCA, but ATF has defined the term to mean: The State in which an individual resides. An individual resides in a State if he or she is present in a State with the intention of making a home in that State. If an individual is on active duty as a Member of the Armed Forces, the individual's State of residence is the State in which his or her permanent duty station is located. An alien who is legally in the United States shall be considered to be a resident of a State only if the alien is residing in the State and has resided in the State for a period of at least 90 days prior to the date of sale or delivery of a firearm. However, these intrastate, private firearms transactions and other matters such as possession, registration, and the issuance of licenses to firearms owners may be covered by state laws or local ordinances. As noted above, unlicensed persons are prohibited generally from engaging in interstate and intrastate firearms commerce as a business; however, they are permitted to change state residences and take their privately owned non-NFA firearms with them under federal law, but they must comply with the laws of their new state of residence. The GCA generally prohibits an unlicensed person from directly transferring any firearmâhandgun or long gunâto any other unlicensed person who resides in another state. Similarly, it is unlawful for an unlicensed person to receive a firearm from any unlicensed person who resides in another state. On the other hand, the GCA does not prohibit an unlicensed person from transferring a firearm to an out-of-state FFL, who may be willing to serve as a proxy for an unlicensed person to transfer a firearm or firearms to another unlicensed person who resides in the state where the FFL is licensed federally to do business. The facilitating, out-of-state FFL, in turn, must treat that firearm as if it were part of his business inventory, triggering the recordkeeping and background check provisions of the GCA. Generally, the facilitating FFL will charge a fee for such transactions conducted on behalf of an unlicensed person, which would likely be passed on to the unlicensed buyer/transferee in most cases. According to a 2015 survey, about one-in-five firearms transfers (22%) are conducted privately between unlicensed persons. In addition, a 2016 survey of state and federal prisonersâconducted by the Department of Justice (DOJ), Bureau of Justice Statistics (BJS)âwho possessed a firearm during the offense for which they were serving time suggested that more than half (56%) had either stolen the firearm (6%), found it at the scene of the crime (7%), or obtained it off the street or from the underground market (43%); most of the remainder (25%) had obtained the firearm from a family member or friend, or as a gift; and seven percent had purchased the firearm under their own name from a licensed firearm dealer, or FFL. Based on this survey data, private firearms sales at gun shows or any similar venue did not appear to be a significant source of guns carried by these offenders, while private transfers among family members, friends, and acquaintances did appear to account for a significant source of such firearms. The ATF Form 4473 and bound log of firearms acquisitions and dispositions are the essential federal documents underlying the recordkeeping process mandated by the GCA. Both FFLs and prospective, federally unlicensed purchasers must truthfully and completely fill out, and sign, an ATF Form 4473. Prospective purchasers attest to three things: 1. they are not prohibited persons, 2. they are who they say they are, and 3. they are the actual buyers. Straw purchases are a federal crime. It is illegal for anybody to pose as the actual buyer, when in fact he is buying the firearm for someone else. Making any materially false statement to an FFL is punishable by a fine and/or up to 10 years imprisonment. There is also a lesser penalty for making any false statement or representation in any record (e.g., the Form 4473) that an FFL is required to maintain. Some straw purchases are also prosecuted under this provision. Violations are punishable by a fine and up to five years imprisonment. For their part, FFLs must verify a prospective purchaser's name, date of birth, state residency, and other information by examining government-issued identification, which most often include a state-issued driver's license. FFLs must also file completed Form 4473s in their records. If a purchased firearm from FFLs should be recovered at any crime scene, ATF can trace a firearm from its original manufacturer or importer to the first-time FFL retail seller and the first-time private buyer (by the make, model, and serial number of the firearm). Successful firearms traces have generated leads in criminal investigations. In addition, aggregated firearms trace data provide criminal intelligence on illegal firearms trafficking patterns. After six years of debate, Congress passed the Brady Handgun Violence Prevention Act, 1993 (Brady Act). Sponsors of the Brady Act initially proposed requiring a seven-day waiting period for handgun transfers. Instead, Congress amended the GCA with the Brady Act to require electronic background checks on any federally unlicensed individual seeking to acquire a firearm from an FFL. The Brady Act included both interim and permanent provisions. Under the interim provisions, FFLs were required to contact local chief law enforcement officers (CLEOs) to determine the eligibility of prospective customers to be transferred a handgun. CLEOs were given up to five business days to make such eligibility determinations. From February 28, 1994, to November 29, 1998, under the interim provisions, 12.7 million firearms background checks (for handguns) were completed, resulting in 312,000 denials. The permanent provisions of the Brady Act became effective when the FBI activated the National Instant Criminal Background Check System (NICS) on November 30, 1998. Under these provisions, FFLs are required to initiate a background check through NICS on any prospective unlicensed customer, who seeks to acquire a firearm from them through a sale, trade, or redemption of firearms exchanged for collateral. Failure to conduct a NICS check is punishable by a fine of up to $1,000 and one year imprisonment, or both. FFLs may engage in firearms transfers among themselves without conducting background checks. The Brady Act includes a provision that prohibits the establishment of a registration system of firearms, firearms owners, or firearms transactions or dispositions with NICS-generated records, except for records on NICS denials for persons who are prohibited from receiving or possessing firearms under the GCA. In addition, in the FY2012 Consolidated Appropriations Act, Congress included a permanent appropriations limitation that requires the FBI to destroy background check records within 24 hours on persons who are eligible to receive firearms. From November 30, 1998, through 2018, the FBI NICS Section facilitated nearly 305 million firearms-related background checks transactions. Corresponding data on individual background checks and denials under the permanent provisions of the Brady Act are given and discussed below for both the FBI and for point of contact states that have chosen to either fully or partially implement the Brady Act. Building on the GCA firearms transaction recordkeeping process, the completed and signed ATF Form 4473 serves as the authorization for an FFL to initiate a check through NICS. The FFL submits a prospective firearms transferee's name, sex, race (or ethnicity), complete date of birth, and state of residence to the FBI through NICS. Social security numbers and other numeric identifiers are optional, but the submission of these data could possibly increase the timeliness of the background check and reduce misidentifications. The NICS Section is to respond to an FFL or POC state official with a NICS Transaction Number (NTN) and one of four outcomes as follows, as described in greater detail below: 1. \"proceed\" with transfer or permit/license issuance, because a prohibiting record was not found; 2. \"denied,\" indicating a prohibiting record was found; 3. \"delayed proceed,\" indicating that the system produced information that suggested the prospective purchaser could be prohibited; or 4. \"canceled\" for insufficient information provided. In the case of a \"proceed,\" the background check record is purged from NICS within 24 hours; \"denied\" requests are kept indefinitely. Under the third outcome, \"delayed proceed,\" a firearms transfer may be \"delayed\" for up to three business days while NICS examiners or state designees (i.e., POCs) attempt to ascertain whether the person is prohibited. \"Delayed proceeds\" are often the result of partial, incomplete, and/or even ambiguous criminal history records. The FBI NICS Section often must contact state and local authorities to make final firearms eligibility determinations. Under federal law, at the end of the three-business-day period following a \"delayed proceed,\" FFLs may proceed with the transfer at their discretion if they have not heard from the NICS Section about those matters. The NICS Section, meanwhile, will continue to work the NICS adjudications for up to 30 days, at which point the background checks will drop out of the NICS examiner's queue if unresolved. At 88 days, all pending background check records are purged from NICS, even when they remain unresolved. About two-thirds of FBI NICS Section-administered background checks are completed within hours, if not minutes. Nearly one-fifth are delayed, but are completed within the three-business-day delayed transfer period. If the FBI ascertains that the person is not in a prohibited status at any time within this 88-day period, then the FBI contacts the FFL through NICS with a \"proceed\" response. If the person is subsequently found to be prohibited, the FBI also contacts the FFL to ascertain whether a firearms transfer had been completed following the three-business-day \"delayed transfer\" period. If so, the FBI makes a referral to ATF. In turn, ATF initiates a firearms retrieval process. Such circumstances are referred as a \"delayed denial,\" or more colloquially described as \"lying and buying.\" By comparison, standard denials are known as \"lying and trying,\" under the supposition that most persons knew they were prohibited before they filled out the ATF Form 4473 and underwent a background check. ATF is also responsible for investigating standard denials based on FBI NICS Section referrals. As noted above, making any false statement to an FFL in connection with a firearms transfer is punishable under two GCA provisions. As part of the NICS process, under no circumstances are FFLs informed about the prohibiting factor upon which denials are based. However, denied persons may challenge the accuracy of the underlying record(s) upon which their denials are based. They would initiate this process by requesting (usually in writing) the reason for their denial from the agency that initiated the NICS check (the FBI or POC). Under the Brady Act, the denying agency has five business days to respond to the request. Upon receipt of the reason and underlying record for their denials, the denied persons may challenge the accuracy of that record. If the records are found to be inaccurate, the denying agency is legally obligated under the Brady Act to correct that record. If the denials are overturned within 30 days, the transfers in question may proceed. Otherwise, FFLs must initiate another background check through NICS on the previously denied prospective purchaser. The feasibility of establishing NICS was largely founded upon the interstate sharing of federal, state, local, tribal, and territorial criminal history record information (CHRI) electronically through FBI computer systems and wide area network (WAN). Based on the prospective customer's name and other biographical descriptors, NICS queries four national data systems for records that could disqualify a customer from receiving and possessing a firearm under federal or state law. Those systems include the: Interstate Identification Index (III) for records on persons convicted or under indictment for felonies and serious misdemeanors; National Crime Information Center (NCIC) for files on persons subject to civil protection orders and arrest warrants, immigration law violators, and known and suspected terrorists; NICS Indices for federal and state record files on persons prohibited from possessing firearms, which would not be included in either III or NCIC; and Immigration-related databases maintained by the Department of Homeland Security's Immigration and Customs Enforcement (ICE) for non-U.S. citizens. An internal FBI inspections report found that access to N-DEx could have helped reveal that the individual, who later shot and killed nine people in a Charleston, SC, church, had an arrest record that was possibly sufficient grounds to deny him a firearms transfer. N-DEx is a repository of unclassified criminal justice files that can be shared, searched, and linked across jurisdictional boundaries. For more information about these computer systems and files see Appendix B . As shown in Figure 1 , under the Brady Act, states may opt to conduct firearms-related background checks entirely or partially for themselves through state and local agencies serving as POCs, or they may opt to have such checks handled entirely by the FBI, through its NICS Section, which is part of the FBI's Criminal Justice Information Services (CJIS) Division. In 13 full POC states, an FFL initiates a firearms-related background check under the Brady Act by contacting a state or local agency serving as a POC for both long gun- and handgun-related transfers. These states are CA, CO, CT, FL, HI, IL, NJ, NV, OR, PA, TN, UT, and VA. In four partial POC states, an FFL initiates a firearms-related background check by contacting the state and local agencies serving as POCs for handgun transfers, and by contacting the NICS Section through a call center for long gun transfers. These states are MD, NH, WA, and WI. In three partial POC states, an FFL initiates a firearms-related background check under the Brady Act by contacting the state and local agencies serving as POCs for handgun permits, and contacts the NICS Section through a call center for long gun transfers. These states include IA, NC, and NE. In 36 jurisdictions (30 states, the District of Columbia, and the five U.S. territories), an FFL initiates a firearms-related background check by contacting the NICS Section through a call center for all firearms-related background checks, both long gun and handgun transfers. These thirty states are AK, AL, AR, AZ, DE, GA, ID, IN, KS, KY, LA, MA, ME, MI, MN, MO, MS, MT, ND, NM, NY, OH, OK, RI, SC, SD, TX, VT, WY, and WV. The five territories are AS, GU, MP, PR, and VI. Twenty-five states are \"Brady exempt,\" meaning that certain valid, state-issued handgun and concealed carry weapons (CCW) permits may be presented to the FFL in lieu of a background check for firearms transfers through the NICS Section or state and local agencies serving as POCs. Those states are AK, AR, AZ, CA, GA, HI, IA, ID, KS, KY, LA, MI, MS, MT, NC, ND, NE, NV, OH, SC, SD, TX, UT, WV, and WY. For further information, see Appendix C . Figure 2 shows annual NICS transactions from November 30, 1998, through 2018 (20 years and one month). FBI transactions are shown on the base of the columns and the state and local POC transactions are shown on the top of the columns. Over this period, the FBI NICS Section and state and local agencies serving as POCs made 304.6 million NICS transactions. The NICS Section handled 128.6 million of these transactions (42.2% of all NICS transactions), whereas POCs initiated 176 million transactions (57.8% of all NICS transactions). There is a one-to-one correspondence between FBI NICS transactions and individual background checks, and the 128.6 million FBI transactionsâthat is, background checksâresulted in 1.6 million denials (1.24%). Some of these FBI NICS Section-administered background checks were for firearms transactions involving multiple firearms; consequently, NICS transactions/background checks serve as an imperfect proxy for firearms sales. Unlike FBI NICS background checks, some state background checks involved more than one background check transaction. In some states, for example, there may be permitting or licensing processes that could take several weeks and administrators would run multiple NICS queries on a single applicant. In other cases, a background check administrator might be unclear about an applicant's first and last name and would run two NICS queries on the applicant, reversing both names as first and last names. More fundamentally, some states are running periodic NICS queries on concealed carry permit holders. These periodic rechecks are not considered individual background checks. The FBI does not have the state data to report on how many state and local background checks correspond with those transactions. Nor does the FBI report the total number of state and local firearms transfer or license denials. The Bureau of Justice Statistics (BJS), however, collects and analyzes the data as part of its Firearm Inquiry Statistics Program and reports annually on the total number of firearms-related background checks and related denials conducted under the Brady Handgun Violence Prevention Act ( P.L. 103-159 ). In June 2017, BJS reported that state and local POCs had conducted 81.7 million firearms-related background checks from November 30, 1998, through 2015. According to the FBI, these POC-conducted background checks corresponded with 123.3 million NICS transactions. About 54.9% of these state transactions involved background checks related to firearms permits/licenses, an unreported percentage of which were for concealed carry permits. It is also noteworthy that some state-issued concealed-carry permits exempt the holder from any further background checks for non-NFA firearms. Hence, state and local NICS transactions also serve as an imperfect proxy for firearms sales. See Appendix C for a list of state permits that have been certified by ATF as Brady exempt. From 2006 through 2018, total NICS transactions more than doubled from 10 million to 26 million or more, peaking in 2016 at 27.5 million and then dropping to 25.2 million in 2017, and rising again to 26.2 million in 2018. For the same years, total NICS transactions/checks handled entirely by the FBI NICS Section increased from 5.3 million to 9.4 million from 2006 to 2016, then dropped to 8.6 million in 2017, and dropped again to 8.2 million in 2018. In addition, NICS transactions handled by state and local agencies increased from 4.8 million to 18.2 million from 2006 to 2016, then dropped to 16.6 million in 2017, but rose again to 17.9 million in 2018. In Figure 2 POC transactions account for an increasing proportion of all NICS transactions, but as discussed above some POC background checks involve more than one NICS transaction, whereas each NICS Section transaction corresponds with a single background check. As shown in Figure 3 , for the years 1999 through 2015, the FBI CJIS Division's NICS Section conducted as many or more background checks than state or local POC agencies. Figure 3 also shows the number of annual denials made pursuant to federal or state law. As noted above, over the 20 years and one month, the FBI CJIS Division's NICS Section conducted 128.7 million background checks, resulting in nearly 1.6 million denials, for an overall initial denial rate of 1.2%. As discussed below, about 2.7% of those denials were appealed and eventually overturned. BJS reported that state and local POC agencies conducted nearly 81.7 million background checks from November 30, 1998, through 2015 for firearms transfers and permits. To date, BJS has not published any data for state and local POC agencies for 2016, 2017, and 2018. Nevertheless, for those 17 years and one month, POC checks resulted in nearly 1.46 million denials, for an overall denial rate of 1.8%, according to BJS. For the same years (and one month), the FBI NICS Section processed 102.4 million background checks, resulting in 1.27 million denials of firearms transfers, for an overall denial rate of 1.2%. See Appendix A for the data shown in Figure 3 , as well as FBI and POC denials by prohibiting categories. As with other screening systems, particularly those that are largely name-based, false positives occur as part of the NICS process, but the frequency of these misidentifications is unreported. Nevertheless, the FBI has taken steps to mitigate false positives (i.e., denying a firearms transfer to an otherwise eligible person). In July 2004, DOJ issued a regulation that established the NICS Voluntary Appeal File (VAF), which is part of the NICS Indices (described above). DOJ was prompted to establish the VAF to minimize the inconvenience incurred by some prospective firearms transferees (purchasers) who have names or birth dates similar to those of prohibited persons. So as not to be misidentified in the future, these persons agree to authorize the FBI to maintain personally identifying information about them in the VAF as a means to avoid future delayed transfers. As noted above, current law requires that NICS records on approved firearm transfers, particularly information personally identifying the transferee, be destroyed within 24 hours. Figure 4 shows annual NICS Section denials, denials appealed but sustained, and denials overturned from November 30, 1998, through 2018. During this time, it appears that about one-fifth of NICS Section denials were appealed, and about one-tenth of those appealed denials were overturned, or an estimated 2.7% of NICS Section denials, according to the annual CJIS Division's NICS operations reports. The majority of these overturned denials were due to misidentifications. In any screening system, such as NICS, there is a balance between false positives and false negatives. Misidentifications and improperly interpreted criminal history and other records would constitute false positives. Allowing an otherwise prohibited person to acquire a firearm would constitute a false negative. Under the GCA, there is also a provision that allows the Attorney General (previously, the Secretary of the Treasury) to consider petitions from a prohibited person for \"relief from disabilities\" and to have his firearms transfer and possession eligibility restored. Since FY1993, however, a limitation (or \"rider\") on the ATF annual appropriations for salaries and expenses has prohibited the expenditure of any appropriated funding for ATF to process such petitions from individuals. Conversely, under the NICS Improvement Amendments Act of 2007 ( P.L. 110-180 ), any federal agency that submits any records on individuals considered to be too mentally incompetent to be trusted with a firearm under the GCA must provide an avenue of administrative relief to those individuals, so if their mental health or other related conditions improve, their firearms rights and privileges may be restored. As a condition of grant eligibility, as described below, states must provide similar administrative avenues of relief for those purposes, that is, \"disability relief.\" See Appendix D for a list of states that have enacted and implemented ATF-certified relief from disability programs under P.L. 110-180 . Figure 5 shows annual NICS denials and firearm retrieval action from November 30, 1998, through 2018. For the 20 years and one month, the NICS section made an average of 3,600 firearm retrieval action referrals to the ATF annually for follow-up. In many of these cases, an otherwise prohibited person had been transferred a firearm. According to the Government Accountability Office (GAO), following up on these possibly illegal firearms receiptsâor \"delayed denial investigations\"âconsumes an increasing and considerable amount of ATF resources. For example, such investigations accounted for 32% of ATF investigations opened in FY2003 and 53% in FY2013. It appears that in a relatively small percentage of cases the suspected offenders have been prosecuted federally for what is commonly known as either \"lying and buying\" or \"lying and trying.\" According to the Government Accountability Office (GAO), ATF processed 3,933 delayed denials in FY2017. Of those denials, 38 cases were referred to U.S. Attorney's Offices for prosecution. Nine of those cases were federally prosecuted. Also in a relatively small percentage of cases, an FFL could potentially proceed with a firearms transfer after the three-business-day delayed transfer period has expired, but never receive a final NICS determination; or the FFL could potentially decline to transfer the firearm to an unlicensed customer until he received a definitive NICS Section response, which the FFL may not receive from the FBI. NICS is maintained and administered by the FBI Criminal Justice Information Services (CJIS) Division and its NICS Section, located in Clarksburg, WV. Recent increases in the volume of firearms-related commerce and attendant background checks have strained the NICS Section and additional staff and funding has been requested by the FBI, which Congress has provided through appropriated funding. For FY2016, the NICS Section program budget allocation was $81 million and 668 funded permanent positions. As described below, for FY2019, the FBI anticipated that the NICS Section program budget would be allocated $103 million and 679 positions, representing a $22 million and 11 position increase over FY2016. The Administration's FY2020 request would increase FY2020 NICS Section program budget to $115 million and 719 positions. For FY2017, the Obama Administration requested $121.1 million for the NICS program, including an additional $35 million. Of this budget increase $15 million was requested to sustain 75 professional support positions funded for FY2016; and another $20 million was requested to hire 160 contractors to support NICS firearms background checks and related activities. The remaining $5.1 million was requested to annualize operational costs associated with the NICS base budget. Report language accompanying both the Senate- and House-reported FY2017 Commerce, Justice, Science, and Related Agencies appropriations bills ( S. 2837 and H.R. 5393 ) indicated that those bills would have provided the requested $35 million for NICS. The Explanatory Statement accompanying H.R. 244 , submitted by the House Committee on Appropriations Chair, Representative Rodney Frelinghuysen, indicated that P.L. 115-31 included $511.3 million for CJIS, and that this amount would fully support CJIS programs, including NICS. For FY2018, the Trump Administration requested $79.2 million for the NICS program, including an additional $8.9 million to fund an additional 85 permanent positions. Such an increase would have brought the number of funded permanent positions for the NICS program to 676. According to the FBI, the enacted NICS budget allocation for FY2018 was $111.3 million and 679 positions. For FY2019, the Administration did not request any budget increases for the FBI or NICS. The FBI anticipated that the FY2019 NICS budget and staff allocation would be about $103 million and 679 positions. For FY2020, the Administration has requested a NICS budget increase of $4.23 million and 40 positions and $7.8 million in base budget increases, which would bring the total FY2020 NICS budget to $115 million and 719 positions. House-report language accompanying the FY2020 Commerce, Justice, Science, and Related Agencies Appropriations Act ( H.R. 3055 ) indicates that this bill would fully support the NICS Section operations and activities for the upcoming fiscal year. The efficacy of NICS and firearms-related background checks is dependent in large part on state and local governments making criminal history record information (CHRI), as well as other disqualifying records (e.g., mental incompetency records), accessible electronically to several different national data sharing systems maintained by the FBI. As described above, those systems include principally the III, NCIC, and the NICS Indices. Congress, meanwhile, has authorized two grant programs to incentivize state and local governments to maintain CHRI and other disqualifying records and make them accessible to NICS in a timely manner. Under the Brady Act, Congress authorized a grant program known as the National Criminal History Improvement Program (NCHIP), the initial goal of which was to improve electronic access to firearms-related disqualifying records, felony indictment, and conviction records, for the purposes of both criminal and noncriminal background checks. Congress passed the NICS Improvement Amendments Act (NIAA) of 2007 ( P.L. 110-180 ) following the April 16, 2007, Virginia Tech tragedy. Along the lines of the Brady Act, the NIAA included provisions designed to encourage states, tribes, and territories to make available to the Attorney General certain records related to persons who are disqualified from acquiring a firearm, particularly records related to domestic violence misdemeanor convictions and restraining orders, as well as mental health adjudications. As a framework of incentives and disincentives, the Attorney General was authorized to make grants, waive grant match requirements, or reduce law enforcement grant assistance depending upon a state's compliance with the act's goals of bringing firearms-related disqualifying records online. The Attorney General was required to report annually to Congress on federal department and agency compliance with the act's provisions. The Attorney General, in turn, has delegated responsibility for grant-making and reporting to DOJ's Bureau of Justice Statistics (BJS). BJS designated the grant program under the act as the \"NICS Act Record Improvement Program (NARIP),\" although congressional appropriations documents generally referred to it as \"NICS improvement\" or the \"NICS Initiative\" program. Figure 6 shows annual congressional appropriations for NCHIP and NARIP for FY1995-FY2019. Over this 25-year period, Congress has appropriated nearly $859 million for NCHIP and $201 million for NARIP, for a total of $1.06 billion. During this time period, NCHIP grants were made available to states for purposes other than just identifying persons ineligible to receive firearms, such as identifying persons ineligible to hold positions involving vulnerable populations (e.g., children, disabled, and elderly). Nevertheless, the principal purpose of NCHIP was to improve the accuracy and timeliness of background checks, particularly those administered pursuant to the Brady Act. For FY2009 through FY2013, Congress authorized $1.3 billion in appropriations for NARIP. Actual appropriations, however, fell short of such authorizations. For those fiscal years, Congress appropriated $63.6 million for NARIP, although neither the House nor Senate Committee on Appropriations adopted \"NARIP\" as a grant program designation. Instead, the appropriations statute provided such funding for the grant-making activities authorized under P.L. 110-180 . For FY2014 through FY2019, Congress continued to appropriate funding for both NCHIP and the grant-making activities authorized under P.L. 110-180 (i.e., NARIP) under the \"NICS Initiative,\" even though the authorization for appropriations under P.L. 110-180 had lapsed. For those years, Congress appropriated $429.5 million for NCHIP and NARIP, or the \"NICS Initiative,\" of which $137 million was set aside for purposes authorized under NIAA, bringing total appropriated NARIP funding for FY2009 through FY2019 to $200.6 million. Under the NICS Initiative, BJS has awarded a total of $142 million in NARIP grants to 30 states and one Native American tribe from FY2009 through FY2018. To date, however, BJS has not levied any of the reward and penalty provisions of NIAA, possibly because of methodological difficulties in ascertaining state progress towards meeting the goals of this act. With NICS Initiative grants (NCHIP and NARIP) in part, state and local governments have increased the availability of mental health- and domestic violence-related records to NICS Indices and other data systems queried by NICS. For example, from CY2007 to CY2018, the number of mental health records in the NICS Indices increased from 518,499 to 5,419,894, a 9.5-fold increase. The number of misdemeanor crime of domestic violence (MCDV) records in the NICS Indices increased from 46,286 to 175,376, nearly tripling (a 278.9% increase). Many instances domestic violence misdemeanor crimes are serious enough in nature that the records are deposited in the III, meaning the offenders were fingerprinted. A Department of Justice-sponsored report found that in many cases such criminal records are not adequately flagged in the III for firearms eligibility determination purposes, leading to NICS delayed transfers in some cases. Inadequately flagged records in the III increase the possibility that a prohibited person might be transferred a firearm after the NICS three-business-day delayed transfer period expires. Similarly, it was reported that domestic violence protection orders are increasingly being placed in the NICS Indices, even though the authors of the report argued that it would probably be most appropriate to place such records in the National Crime Information Center (NCIC), so that such records would be available to law enforcement for purposes besides firearms-related background checks. Responding to these issues in part, Congress passed the Fix NICS Act of 2018 ( P.L. 115-141 ). The act reauthorized NARIP, as well as authorized appropriations of $125 million annually for FY2018 through FY2022. It also reauthorized NCHIP itself, as well as authorized appropriations of $250 million annually for FY2018 through FY2022. For FY2018, Congress appropriated $75 million for the \"NICS Initiative,\" of which $25 million was set aside for purposes authorized under NIAA, as amended by the Fix NICS Act (or NARIP). For FY2019, Congress appropriated the same amount and set aside. For FY2020, the Administration has requested $65 million for NCHIP and $10 million for NARIP. The House-reported Commerce, Justice, Science, and Related Agencies Appropriations bill ( H.R. 3055 ; H.Rept. 116-101 ) would provide $80 million for these grant programs under the \"NICS Initiative,\" of which $27.5 million would be set aside for purposes authorized under NIAA, as amended by the Fix NICS Act (or NARIP). This final section of the report briefly summarizes NICS-related legislative action to date in the 116 th Congress. It then provides a summary and some analysis of three bills that have passed the House and await Senate action. In the 116 th Congress, the House has passed three bills that would expand federal firearms-related background check requirements. On January 8, 2019, Representative Mike Thompson introduced the Bipartisan Background Checks Bill of 2019 ( H.R. 8 ), a bill that would require a background check for most private-party, intrastate firearms sale, or \"universal\" background checks. On February 6, 2019, the House Committee on the Judiciary held a hearing on \"Preventing Gun Violence in America.\" On February 8, 2019, Representative James Clyburn introduced the Enhanced Background Checks Act of 2019 ( H.R. 1112 ), a bill to lengthen the number of days a firearms transfer could be delayed pending a final firearms eligibility determination. On February 13, 2019, the House Committee on the Judiciary amended and ordered reported both bills: H.R. 8 ( H.Rept. 116-11 ) and H.R. 1112 ( H.Rept. 116-12 ). On February 27 and 28, 2019, respectively, the House amended and passed H.R. 8 and H.R. 1112 . On March 7, 2019, Representative Karen Bass introduced the Violence Against Women Reauthorization Act of 2019 ( H.R. 1585 ). On March 27, 2019, the House Committee on the Judiciary amended and reported H.R. 1585 . This bill includes provisions that would expand existing firearms transfer/receipt and possession prohibitions to include dating partners with histories of domestic violence and persons convicted of stalking-related misdemeanor offenses. The House passed H.R. 1585 on April 4, 2019. Also, of note, on March 13, 2019, the House Appropriations Subcommittee on Commerce, Justice, Science, and Related Agencies held a hearing on \"Gun Violence Prevention and Enforcement.\" On March 18, 2019, the Federal Bureau of Investigation (FBI) released its FY2020 congressional budget request that includes a $4.2 million increase for the NICS, which would bring the total program budget to $114.7 million for FY2020. On the same date, the Office of Justice Programs (OJP) released its congressional budget request that includes $75 million for state, local, tribal, and territorial governments to upgrade criminal and mental incompetency records and make those records accessible to NICS for firearms eligibility determination purposes. On June 3, 2019, the House Committee on Appropriations reported an FY2020 Commerce, Justice, Science, and Related Agencies (CJS) Appropriations bill ( H.R. 3055 , H.Rept. 116-101 ). House report language indicates that the bill would fully support the FBI request for increased NICS funding. The bill would also provide $80 million for OJP-administered NICS improvement grants under NCHIP and NARIP. On September 26, 2019, Senate Committee on Appropriations reported an FY2020 CJS Appropriations bill ( S. 2584 ; S.Rept. 116-127 ). Senate report language indicates that the bill $131 million to increase NICS capacity and efficacy. This amount is $16.3 million above the Trump Administration's FY2020 request. The bill would also provide $78.3 million for OJP-administered NICS improvement grants under NCHIP and NARIP, of which $25 is for the latter program. In addition, on March 26, 2019, the Senate Committee on the Judiciary held a hearing on \"Red Flag Laws: Examining Guidelines for State Action.\" Seventeen states and the District of Columbia have passed \"Red Flag\" laws. These laws essentially allow concerned persons, including family members in some cases, to petition a court to file an extreme risk protection order against an individual that would allow for the suspension of that individual's firearms eligibility under certain circumstances. These state laws vary considerably from state to state. Related proposals in the 116 th Congress would make subjects of such protective orders ineligible to receive or possess firearms under federal law in any state or would establish grant programs to encourage states to adopt such laws. On September 10, 2019, the House Committee on the Judiciary ordered reported such a bill, the Extreme Risk Protection Order Act ( H.R. 1236 ). In addition, this Committee also ordered reported the Disarm Hate Act ( H.R. 2708 ), which make persons convicted of a misdemeanor hate crime ineligible to receive or possess a firearm or ammunition. The Bipartisan Background Checks Act of 2019 ( H.R. 8 ), a \"universal\" background check bill, would expand federal firearms background checks and, hence, recordkeeping requirements under the Gun Control Act of 1968 (GCA; 18 U.S.C. Â§921 et seq.) to include firearms transfers made in the same state (intrastate) between unlicensed persons. H.R. 8 would essentially prohibit unlicensed persons from transferring a firearm to any other unlicensed person, unless a federally licensed firearms dealer, or FFL, takes possession of such firearm and facilitates such a transaction by running a background check on the unlicensed prospective transferee (buyer). H.R. 8 includes exceptions for transfers between immediate family members; U.S. military, law enforcement members, or armed private security professionals in the course of official duties; temporary transfers under circumstances involving an imminent threat of bodily harm or death; and legitimate activities involving target shooting, hunting, trapping, or fishing. H.R. 8 would prohibit any implementing regulations that would (1) require FFLs to facilitate private firearms transactions; (2) require unlicensed sellers or buyers to maintain any records with regard to FFL-facilitated background checks; or (3) place a cap on the fee FFLs may charge for facilitating a private firearms transfer. H.R. 8 would also prohibit FFLs from transferring possession of, or title to, any firearm to any unlicensed person, unless the FFL provides notice of the proposed private firearm transfer prohibition under this bill. Further, H.R. 8 would extend a provision of current law that prohibits the DOJ from charging a fee for a NICS background check. Under H.R. 8 , facilitating FFLs would be required to treat firearms to be transferred on behalf of any unlicensed persons as if they were part of their business inventory. Thus, they would be required to comply with the GCA recordkeeping and background check requirements. As part of this process, FFLs would enter the firearm(s) to be exchanged into their bound log of firearms acquisitions and dispositions. The FFLs and unlicensed prospective transferees would then complete and sign a firearms transaction forms (ATF Form 4473) under penalty of law that everything entered onto that form was truthful. FFLs would then initiate a background check on the intending transferee through NICS. And either the FBI NICS Section or a state or local authorityâpoint of contact (POC)âwould conduct a background check to determine an intending transferee's firearms eligibility. Such a requirement, if enacted, would close off what some have long characterized as the \"Gun Show loophole.\" For the past two decades, many gun control advocates have viewed the legal circumstances that allow individuals to transfer firearms intrastate among themselves without being subject to the licensing, recordkeeping, and background check requirements of the GCA as a \"loophole\" in the law, particularly within the context of these intrastate, private transactions at gun shows and other public venues or through the internet. Gun control advocates also maintain that expanding background checks to cover intrastate, private-party firearms sales would help stem gun trafficking; that is, the illegal diversion of firearms from legal channels of commerce to the black market, where federal, state, local, tribal, and territorial laws could be evaded. They maintain that prohibited persons or their friends or acquaintances could easily buy a firearm at a gun show, from an online seller, or in a person-to-person \"private\" sale. They also point to studies that suggest that there is moderate evidence that expanded background checks might reduce firearms-related homicides and suicides. Gun control advocates underscore that 20 states and the District of Columbia (DC) currently have laws that require background checks for certain types of firearms transfers not currently covered by federal law. Although these laws vary considerably from state to state, 11 states and DC require background checks for nearly all firearms transfers. Gun rights advocates contend that intrastate, private transfers are regulated already under federal law, in that it is a felony to transfer a firearm or ammunition knowingly to an underage or prohibited person. They contend further that most criminals would not submit to a background check. They ask, \"Why would anyone submit to a background check unless they believed they were not prohibited and would pass?\" Moreover, they argue that making private-party, intrastate transfers subject to the recordkeeping and background check provisions of the GCA could potentially criminalize firearms transfers under circumstances that could be characterized as legitimate and lawful. For example, it has been argued that H.R. 8 might prohibit a person from sharing a firearm with another person while target shooting on one's own property. Although H.R. 8 would provide exceptions for \"temporary transfers\" for target shooting and other related activities, some gun rights advocates argue that such exceptions are too narrow. For example, they argue further that H.R. 8 would prohibit a person from loaning a neighbor a firearm for a hunting trip with a background check being required for both the loan to the neighbor and the return of the firearm to its lawful owner. Perhaps more fundamentally, H.R. 8 would prohibit a person from loaning a firearm to another personâwho may be facing some threat of death or serious bodily injuryâfor self-defense purposes, unless that threat were \"imminent.\" Gun rights advocates might also see such a measure as a significant step towards a nationalâalbeit decentralizedâregistry of firearms and firearms owners, since its practical implementation would likely necessitate recordkeeping on such transfers. Such advocates cite an Obama Administration, Department of Justice official who observed that \"universal background checks\" are unenforceable without a comprehensive registry of firearms. Legislation to expand federal recordkeeping and background check requirements to cover private, intrastate firearms transfers saw action in the 106 th and 108 th Congresses following the April 20, 1999, Columbine, CO, high school mass shooting; in the 113 th Congress following the December 14, 2012, Newtown, CT, elementary school mass shooting; and in the 114 th Congress following the December 2, 2015, San Bernardino, CA, social services center all-staff meeting and June 12, 2016, Orlando, FL, Pulse night club mass shootings. Over time, related legislative proposals have varied in the scope and type of intrastate, private party (nondealer) firearms exchanges between federally unlicensed persons that would fall under their respective background check provisions. Since the 113 th Congress, such proposals fall under two basic types that, respectively, have been labeled as either \"Universal\" or \"Comprehensive\" background check bills. \"Comprehensive\" background checks would cover transfers at gun shows and similar public venues (e.g., flea markets and public auctions) and firearms that are advertised via some public fora, including newspaper advertisements and the Internet. \"Universal\" background checks would cover private transfers under a much wider set of circumstances (sales, trades, barters, rentals, or loans), with more limited exceptions. In the Senate, from the 113 th Congress forward, the principal sponsors of \"universal\" background check bills have been Senators Charles Schumer, Christopher Murphy, and Richard Blumenthal. The principal sponsors of \"comprehensive\" background check amendments have been Senators Joe Manchin and Pat Toomey. \"Universal\" background check bills were introduced in the House in the 113 th and 114 th Congresses. While Representatives Peter King and Mike Thompson introduced proposals that were similar to Manchin-Toomey \"comprehensive\" background check bills in the past three Congresses, they have sponsored and supported a \"universal\" background check proposal ( H.R. 8 ) in the 116 th Congress. The House-passed Enhanced Background Checks Act of 2019 ( H.R. 1112 ) would revise the GCA background check provision to lengthen the delayed sale period, which is three business days under current law. Under H.R. 1112 , for background checks that do not result in a \"proceed with transfer\" or \"transfer denied,\" the FBI NICS Section and POC state officials would have 10 business days to place a hold on a firearms-related transaction. At the end of 10 business days, the prospective transferee could petition the Attorney General for a final firearms eligibility determination. If the FFL does not receive a final determination within 10 days of the date of the petition, he or she could proceed with the transfer. The timeliness and accuracy of FBI-administered firearms background checks through NICSâparticularly with regard to \"delayed proceeds\"âbecame a matter of controversy following the June 17, 2015, Charleston, SC, mass murder at the Emanuel African Methodist Episcopal Church. The assailant had acquired a handgun from an FFL in the Columbia, SC, area. According to press accounts, the NICS check on the assailant was initiated on April 11, 2015 (a Saturday). The FBI found an arrest record for him, but the arrest record was ambiguous with regard to the arrest's final disposition and the assailant's firearms receipt and possession eligibility. Therefore, the NICS response to the FFL was to delay the transfer for three business days as required under federal law. At his discretion, the FFL made the transfer on April 16, 2015 (a Thursday) as allowed under federal law. According to FBI, the NICS check would have remained active in the NICS examiner's queue for 30 days (until May 11, 2015), and would have remained in an \"active status\" in the NICS system for 88 days (until July 8, 2015). According to the assailant's arrest record, he had been processed for arrest by the Lexington County, SC, Sheriff's Department, so the FBI contacted the Lexington County court, sheriff's department, and prosecutor's office. The Lexington County Sheriff's Department responded that it did not have a record on the alleged assailant and advised the NICS examiner to contact the City of Columbia, SC, Police Department. However, the NICS examiner contacted the West Columbia, SC, Police Department, because it was listed on the NICS contact sheet for Lexington County. In turn, the West Columbia Police Department responded that it did not have a record on the alleged assailant either. The NICS examiner reportedly focused on Lexington County and missed the fact that the City of Columbia, SC, Police Department was listed as the contact for Richland County, the county in which most of the City of Columbia, SC, is located. Consequently, the NICS examiner did not contact the Columbia, SC, Police Department, the agency that actually held the arrest record for the assailant. If the FBI had ascertained during the 88 days that this person was prohibited, the NICS examiner would have likely contacted the FFL to verify whether a firearms transfer had been made after the three-business-day delay, and then would have notified the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) and a firearms retrieval action would have possibly been taken by that agency. In this case, the FBI did not ascertain that the assailant was possibly a prohibited person until after the June 17, 2015, mass shooting. Some gun control advocates have characterized these circumstances as the \"Charleston loophole.\" In addition to the \"Charleston loophole,\" gun control advocates sometimes refer to \"delayed proceeds\" that could result in a possibly prohibited person acquiring a firearm after three business days have expired as \"default proceeds.\" They argue that extending the delayed proceed period would reduce the chance that an otherwise prohibited person might inadvertently be transferred a firearm, a circumstance that would likely necessitate an ATF firearms retrieval action had more time been allotted to complete the background check. According to data acquired by a gun control advocacy group, about 3.59% of FBI-administered background checks in 2017 were unresolved after a delayed proceed response and the three-business-day window had passed. To this advocacy group, this suggested that a relatively small number of people (310,232) would be affected, and any inconvenience to them would be outweighed by increasing the probability that a prohibited person might be prevented from acquiring a firearm. According to the FBI, it referred 6,004 \"delayed denial\" cases to the ATF in 2017 that could have possibly resulted in a finding of ineligibility and subsequent firearms retrieval action. In addition, the FBI reported that 4,864 of those cases involved individuals who were possibly prohibited and had probably acquired a firearm. Gun rights advocates would counter that a large percentage (98.1%) of background checks that resulted in a delayed proceed response involved persons who were not actually ineligible, prompting them to refer to such default proceed responses as \"default infringements.\" They maintain that the \"delayed proceeds\" should be viewed as an indicator of understaffing and incomplete recordkeeping on prohibited persons. Gun rights advocates underscore further that if the overall timeliness and accuracy of FBI background checks were improved, the process would be less likely to inconvenience an otherwise eligible person and, at the same time, less likely to allow a firearm to be transferred to a prohibited person. According to the GAO, ATF processed 3,933 delayed denials in FY2017. Of those denials, 38 cases were referred to U.S. Attorney's Offices for prosecution. Nine of those cases were federally prosecuted. The House-passed Violence Against Women Reauthorization Act of 2019 ( H.R. 1585 ) includes several provisions that seek to reduce firearms-related intimate partner violence (homicides and injury) by amending federal law to prohibit persons convicted of misdemeanor stalking crimes from receiving or possessing a firearm or ammunition. This bill would also revise provisions related to domestic violence protection orders and a definition of \"intimate partner\" under current law. The bill also includes other provisions related to leveraging state, local, tribal, and territorial resources to increase federal investigations and prosecutions of firearms-related eligibility offenses related to domestic violence and stalking. As discussed earlier, there are nine categories of persons prohibited under current law (18 U.S.C. Â§922(g)) from receiving or possessing firearms or ammunition (e.g., convicted felons, fugitives from justice, and unlawfully present aliens). Under 18 U.S.C. Â§922(n), a tenth category of prohibited personsâthose under felony indictmentâare prohibited from receiving, but not possessing firearms. In addition, under 18 U.S.C. Â§922(d), it is unlawful for any person to transfer or otherwise dispose of a firearm or ammunition to any person, if the transferor has reasonable cause to believe the transferee would be prohibited under one of those 10 categories. Two of the categories speak directly to domestic violence: persons under court-order restraints related to harassing, stalking, or threatening an intimate partner or child of such intimate partner (18 U.S.C. Â§Â§922(d)(8) and (g)(8)); and persons convicted of a misdemeanor crime of domestic violence (MCDV) (18 U.S.C. Â§Â§922(d)(9) and (g)(9)). According to ATF, a qualifying DVPO order includes the following elements. The defendant/respondent must receive actual notice and opportunity to participate in a hearing before a judge, magistrate, or other judicial official. After such hearing, a DVPO may be issued by a criminal or civil court, such as a divorce court, family court, magistrate, or general jurisdiction court. The plaintiff/petitioner is an \"intimate partner\" of the defendant/respondent (subject). An intimate partner includes: 1. a spouse or former spouse of the subject; a person who cohabitates or cohabitated with the subject, who resides or resided in a sexual/romantic relationship with the subject, or 2. a person with whom the subject has or had a child in common (regardless of whether they ever married or cohabitated). A qualifying court order must also restrain the subject from harassing, stalking, or threatening an intimate partner or child of that intimate partner, or engaging in conduct that would place either of them in reasonable fear of bodily injury. There must also be a finding that the subject is a credible threat to the physical safety of the intimate partner or child, or explicitly prohibit the use of physical force. According to ATF, a qualifying misdemeanor conviction of domestic violence (MCDV) must include the following elements. Such offense is a misdemeanor crime under federal, state, or tribal law and involves the use or attempted use of physical force, or the threatened use of a deadly weapon. At the time of the offense, the offender must have been: 1. A current or former spouse, parent, or guardian of the victim; 2. A person with who the victim shared a child in common; 3. A person who was cohabitating with or had cohabitated with the victim as a spouse, parent, or guardian; or 4. A person who was or had been similarly situated to a spouse, parent, or guardian of the victim. Under current law, the term \"intimate partner\" means, with respect to a person, the spouse of the person, a former spouse of the person, an individual who is a parent of a child of the person, and an individual who cohabitates or has cohabitated with the person (18 U.S.C. Â§921(a)(32)). H.R. 1585 would expand the \"intimate partner\" definition to include a dating partner or former dating partner (as defined in section 2266 [of Title 18, United States Code]); and any other person similarly situated to a spouse who is protected by the domestic or family violence laws of the State or tribal jurisdiction in which the injury occurred or where the victim resides. Under 18 U.S.C. Â§2266(a)(10), the term \"dating partner\" refers to a person who is or has been in a social relationship of a romantic or intimate nature with the abuser; and the existence of such a relationship is based on a consideration of (1) the length of the relationship; (2) the type of relationship; and (3) the frequency of interaction between the persons involved in the relationship. H.R. 1585 would make any person convicted of a \"misdemeanor crime of stalking\" a tenth category of persons prohibited from receiving and possessing a firearm under 18 U.S.C. Â§922(g). The bill would define such a crime as any misdemeanor stalking offense under federal, state, tribal, or municipal law; and one that in a course of harassment, intimidation, or surveillance of another person, places that person in reasonable fear of material harm to the health or safety of her- or himself, an immediate family member of that person, a household member of that person, or a spouse or intimate partner of that person; or that causes, attempts to cause, or would reasonably be expected to cause emotional distress to any of those persons. The proposed definition is subject to certain mitigating factors. A person would not be considered to have been convicted of a misdemeanor crime of stalking unless (1) the person was represented by counsel in the case, or (2) they knowingly and intelligently waived the right to counsel in the case. In the case of a prosecution for a misdemeanor crime of stalking for which a person was entitled to a jury trial, a person would not be considered convicted in the jurisdiction in which the case was tried, unless (1) the case was tried by a jury; or (2) the person knowingly and intelligently waived the right to have the case tried by a jury, by guilty plea, or otherwise. H.R. 1585 would also expand the scope of \"protection orders\" or \"court-order restraints\" under 18 U.S.C. Â§Â§922(d)(8) and (g)(8). Under current law these provisions prohibit any person from firearms receipt, possession, or transfer, who is subject to a court order that: (A) was issued after a hearing of which such person received actual notice, and at which such person had an opportunity to participate; (B) restrains such person from harassing, stalking, or threatening an intimate partner of such person or child of such intimate partner or person, or engaging in other conduct that would place an intimate partner in reasonable fear of bodily injury to the partner or child; and (C) includes a finding that such person represents a credible threat to the physical safety of such intimate partner or child; or by its terms explicitly prohibits the use, attempted use, or threatened use of physical force against such intimate partner or child that would reasonably be expected to cause bodily injury. H.R. 1585 would substantively amend the domestic violence protection order prohibition (18 U.S.C. Â§922(g)(8), and Â§922(d)(8), by reference) to specifically include restraining orders under state, tribal, or territorial law that are issued after an \"ex parte\" hearing, and to expand it to include restraining orders related to \"witness intimidation.\" The legal term \"ex parte\" (\"for one party\") refers generally to court motions, hearings, or orders granted on the request of and for the benefit of one party only without the respondent/defendant being present. H.R. 1585 would add the following at the end of 18 U.S.C. Â§922(g)(8)(A): in the case of an ex parte order, relative to which notice and opportunity to be heard are providedâ(I) within the time required by State, tribal, or territorial law; and (II) in any event within a reasonable time after the order is issued, sufficient to protect the due process rights of the person. Notwithstanding the reference to \"due process\" in the amending language, this language could potentially generate considerable debate about the balance between due process and public safety. In addition, at the end of clause 18 U.S.C. Â§922(g)(8)(B), it would add, \"intimidating or dissuading a witness from testifying in court,\" which may appear less controversial, but critics might argue that such language has little to do with domestic violence. As discussed in the body of this report, Congress has passed legislation to encourage states to make DVPO and MCDV records accessible promptly to NICS. Progress has been made, but many state, tribal, and territorial authorities still find such reporting challenging, if not daunting. Gun control advocates, meanwhile, have argued that the definition of \"intimate partner\" ought to be expanded under the DVPO and MCDV definitions of \"intimate partner\" to include current and former dating partners, as well as persons convicted of misdemeanor stalking offenses. Expanding the grounds for firearms transfer or receipt and possession ineligibility is one avenue along which intimate partner gun violence could be addressed, perhaps effectively, but such an expansion could also strain ongoing federal-state efforts to ensure that prohibiting records under current law are accurate and reported to NICS in a timely manner in order to be accessible electronically during background checks. Appendix A. FBI and POC Firearms-Related Background Checks Pursuant to the Brady Act FBI NICS Section Checks and Denials, November 30, 1998, Through 2018 As Table A-1 shows, from November 30, 1998, through 2018, the FBI CJIS Division's NICS Section conducted 128.7 million background checks, resulting in nearly 1.6 million denials, for an overall initial denial rate of 1.2%. About 2.7% of those denials were appealed and eventually overturned. Table A-2 shows FBI NICS Section denials by prohibiting category. Over the 20-year and one month period (November 30, 1998, through 2018) that NICS has been in operation, over half of FBI firearms transfer denials were based on a prior felony conviction. For 2018, by comparison, a smaller percentage (45.1%) were based on a felony conviction. This percentage decrease can be attributed to at least two factors. One, over time, persons with past felony convictions could be less likely to risk a background check through NICS. Two, since the establishment of NICS, state and local government submissions of prohibiting recordsâparticularly those related to mental incompentencyâhave increased. As shown in Table A-2 , such records accounted for 2.5% of denials over the 20-year period, but accounted for 6.1% of denials for 2018. As discussed below, Congress prioritized such reporting as part of the NICS Improvement Amendments Act of 2007 ( P.L. 110-180 ), in the aftermath of the April 20, 2007, VA Tech mass shooting. Ten years later, Congress passed the Fix NICS Act of 2017 in an effort to strengthen and streamline provisions previously enacted under P.L. 110-180 , and authorize future appropriations for grant and other programs designed to assist state, tribes, and territories with improving the quality of prohibiting records and increasing their accessibility to NICS ( P.L. 115-141 , Div. S, Title VI). State and Local POC Background Checks and Denials, November 30, 1998, Through 2015 As shown in the Table A-3 below, the Bureau of Justice Statistics (BJS) has reported that state and local POC agencies conducted nearly 81.7 million background checks from November 30, 1998, through 2015 for firearms transfers and permits. These checks resulted in nearly 1.46 million denials, for an overall denial rate of 1.8%, according to BJS. Over the same time period, the FBI NICS Section processed 102.4 background checks, resulting in 1.27 million denials of firearms transfers, for an overall denial rate of 1.2%. BJS also reports on the reasons (prohibitors) for some, but not all, state and local POC denials. For example, as shown in Table A-3 , while state and local POCs made 119,368 denials for firearms transfers and permits in 2015, BJS reported the reason for 84,199 (70.5%) of such denials. Similarly, state and local POCs made 102,468 denials in 2014, but BJS reported the reason for 57,001 (55.6%) of them. In addition, over the years, BJS sometimes reported for both state and local POC agencies, and in other years only for state POC agencies. Moreover, BJS's methodology for making estimates about state and local POC background checks and denials over the years has been revised. Notwithstanding these data limitations, Table A-4 shows the BJS-reported reasons for some, but not all denials made by state and local POCs for 2014 and 2015. Looking at the data in Table A-4 , it is notable that there either appears to be no denials based upon dishonorable discharges or renounced U.S. citizenship, or such denials were not estimated by BJS based on data submitted by state and local POC agencies. In addition, the percentages of felony conviction denials for either year, 2014 or 2015, are roughly half of the percentages of federal denials made by the FBI NICS Section. As a percentage of the total, it could be that these percentages are based on incomplete data and, therefore, are not particularly comparable with the percentages for federal denials, which are based on complete data. Appendix B. NICS-Queried Computer Systems and Files As part of a NICS check, the transferee's information is crosschecked against three computerized databases/systems to determine firearms transfer and possession eligibility. Those systems are the Interstate Identification Index (III), the National Crime Information Center (NCIC), and the NICS Indices. If prospective transferees indicate that they are non-U.S. citizens, then their information is also checked against the immigration and naturalization databases maintained by the Department of Homeland Security (DHS), Immigration and Customs Enforcement (ICE). Interstate Identification Index (III) The III, or \"Triple I,\" is a computerized criminal history index pointer system that the FBI maintains so that records on persons arrested and convicted of felonies and serious misdemeanors at either the federal or state level can be shared nationally. This criminal history records exchange system includes arrest and disposition information on individuals charged with felonies and certain misdemeanors. Felony crimes generally include any offense that is punishable by a term of imprisonment exceeding one year. Under state law, there are misdemeanor crimes that are punishable by a term of imprisonment exceeding two years, which are also shared nationally through the III. By virtue of this record sharing, other information accessible through III also includes records on persons under felony indictment, fugitives from justice, persons found not guilty by reason of insanity or adjudicated incompetent to stand trial, persons convicted of misdemeanor crimes of domestic violence, and persons subject to domestic violence protection orders. All records in III are supported by fingerprint records which are exchanged through the Interstate Automated Fingerprint Identification System (IAFIS), though NICS checks do not entail fingerprint-based background checks under current law. National Crime Information Center (NCIC) The NCIC is a database of documented criminal justice information that is made available to law enforcement and authorized agencies, with the goal of assisting law enforcement in apprehending fugitives, finding missing persons, locating stolen property, and further protecting law enforcement personnel and the public. NCIC includes 21 files, 10 of which are queried by NICS. Those 10 NCIC files include Wanted Persons; Protection Orders; Immigration Violators; Protective Interest; Foreign Fugitive; Supervised Release; National Sex Offender Registry; Gang File; Known/Appropriately Suspected Terrorist (KST); and Violent Person. NICS Indices The NICS Indices contain records of persons prohibited from receiving or possessing firearms under federal, state, local, tribal, or territorial law that are not shared nationally in either the III or NCIC. Those records include felony arrest and disposition records (not included in the III); felony indictments; fugitives from justice; addicts and other unlawful users of controlled substances; involuntary commitments to mental institutions and other related adjudications; illegal or unlawful aliens; dishonorable discharges; renunciations of U.S. citizenship; domestic violence protection orders; domestic violence misdemeanor convictions; previous NICS denials under state laws (by POCs); and previous NICS denials made federally (by NICS Section). Appendix C. ATF-Certified Permanent Brady Permits Appendix D. ATF-Certified State Relief from Disabilities Statutes", "summary": "The Federal Bureau of Investigation (FBI) administers a computer system of systems that is used to query federal, state, local, tribal, and territorial criminal history record information (CHRI) and other records to determine an individual's firearms transfer/receipt and possession eligibility. This FBI-administered system is the National Instant Criminal Background Check System (NICS). NICS, or parallel state systems, must be checked and the pending transfer approved by the FBI or state point of contact before a federally licensed gun dealer may transfer a firearm to any customer who is not also a federally licensed gun dealer. Current federal law does not require background checks for intrastate (same state), private-party firearms transactions between nondealers, though such checks are required under several state laws. In the 116 th Congress, the House of Representatives passed three bills that would expand federal firearms background check requirements and firearms transfer/receipt and possession ineligibility criteria related to domestic violence. The Bipartisan Background Checks Act of 2019 ( H.R. 8 ), a \"universal\" background check bill, would make nearly all intrastate, private-party firearms transactions subject to the recordkeeping and NICS background check requirements of the Gun Control Act of 1968 (GCA). For the past two decades, many gun control advocates have viewed the legal circumstances that allow individuals to transfer firearms intrastate among themselves without being subject to the licensing, recordkeeping, and background check requirements of the GCA as a \"loophole\" in the law, particularly within the context of gun shows. Gun rights supporters often oppose such measures, underscoring that it is already unlawful to knowingly transfer a firearm or ammunition to a prohibited person. In addition, some observers object to these circumstances being characterized as a loophole, in that the effects of the underlying provisions of current law are not unintended or inadvertent. The Enhanced Background Checks Act of 2019 ( H.R. 1112 ) would lengthen the amount of time firearms transactions could be delayed pending a completed NICS background check from three business days under current law to several weeks. The timeliness and accuracy of FBI-administered firearms background checks through NICSâparticularly with regard to \"delayed proceeds\"âbecame a matter of controversy following the June 17, 2015, Charleston, SC, mass shooting at the Emanuel African Methodist Episcopal Church. The assailant in this incident had acquired a pistol following a three-business-day-delayed sale under current law and an unresolved background check. While it has never been definitely determined whether the assailant's arrest record would have prohibited the firearms transfer, this incident prompted gun control advocates to label the three-business-day delayed transfer provision of current law as the \"Charleston loophole.\" Gun rights supporters counter that firearms background checks should be made more accurate and timely, so that otherwise eligible customers are not wrongly denied a firearms transfer, and ineligible persons are not allowed to acquire a firearm. The Violence Against Women Reauthorization Act of 2019 ( H.R. 1585 ) would expand federal firearms ineligibility provisions related to domestic violence to include former dating partners under court-ordered restraints or protective orders and persons convicted of misdemeanor stalking offenses. Gun control advocates see this proposal as closing off the \"boyfriend loophole.\" Gun rights supporters are wary about certain provisions of this proposal that would allow a court to issue a restraining order ex parte ; that is, without the respondent/defendant having the opportunity for a hearing before a judge or magistrate. This report provides an overview of federal firearms background check procedures, analysis of recent legislative action, discussion about possible issues for Congress, and related materials.", "document_type": "crs"}
{"report": "The United States has been a steadfast supporter of North Macedonia since its independence from Yugoslavia in 1991 and strongly backs its European Union (EU) and NATO membership ambitions. (North Macedonia's constitutional name was \"Republic of Macedonia\" until February 2019.) Many Members of Congress have supported North Macedonia's aspirations for integration into Euro-Atlantic institutions. On multiple occasions, U.S. leadership was critical to defusing political crises and interethnic tensions in the country As North Macedonia moves closer to NATO membership, and potentially EU membership, the country shows signs of renewed stability following a political crisis from 2015 to 2017. The years 2019-2020, in which North Macedonia is expected to become NATO's 30 th member and the EU will likely determine whether to launch accession negotiations, are considered key to consolidating the country's recent breakthrough in its relations with Greece and sustaining its reform momentum. North Macedonia is a small, landlocked country in southeastern Europe (see Figure 1 ). For most of recorded history, its present-day territory was part of empires and kingdoms centered on or near the Balkan Peninsula. The Ottoman Empire ruled the area from the 14 th century until the 1912-1913 Balkan wars. Beginning in the 19 th century, this territory (and surrounding territory also referred to as \"Macedonia\") was claimed by Bulgaria, Greece, and Serbia, whose leaders regarded the local Orthodox Christian population as their own kin. After World War I, the territory of present-day North Macedonia was incorporated into the newly created Kingdom of Serbs, Croats, and Slovenes. Following World War II, Macedonia became one of six constituent republics of the Socialist Federal Republic of Yugoslavia. In 1991, it declared independence as the Republic of Macedonia, following Slovenia and Croatia, two other Yugoslav republics. For much of the 20 th and 21 st centuries, Macedonian identity and statehood have been challenged or denied by officials in its larger neighbors, including Serbia (until the creation of Yugoslavia), Greece, and Bulgaria. Some analysts believe that the comparatively small size of the population that identifies as Macedonian, coupled with external challenges to the legitimacy of Macedonian identity and statehood, imbues Macedonian nationalism with a sense of vulnerability. This, in turn, has made many Macedonian nationalists reluctant to make concessions on the country's name, most notably in the course of the country's nearly three-decade dispute with Greece (see \"Rapprochement with Greece,\" below). Although North Macedonia largely avoided the conflict that devastated other parts of Yugoslavia in the 1990s, it has been destabilized by periods of tension between its Slavic Macedonian majority (nearly 65% of the population) and ethnic Albanian minority (25%). Tensions between Macedonians and Albanians partly reflect diverging views about whether North Macedonia should be the homeland of and for ethnic Macedonians or a multiethnic state with protections for its ethnolinguistic minority communities. Some Macedonian nationalists fear that extending further cultural rights or autonomy to Albanians would change the character of North Macedonia or result in its dismemberment. Many Albanians, on the other hand, fear marginalization. During the 1990s, Albanian leaders in North Macedonia criticized language, citizenship, education, and cultural policies that they believed made Albanians second-class citizens and contributed to their underrepresentation in the public administration. Interethnic clashes periodically occurred but stopped short of full-scale violence. In 2001, however, Albanian insurgents waged a months-long armed campaign against state security forces over what they viewed as systematic discrimination against Albanians. At the government's request, NATO deployed several peacekeeping missions to the country between 2001 and 2003. U.S. and EU officials helped broker the 2001 Ohrid Framework Agreement, which provides for partial devolution of power to municipalities, equal minority representation in the public administration, and greater rights to use the Albanian language and symbols in official settings. While interethnic relations have largely stabilized since 2001, political crises periodically created strain. North Macedonia is a parliamentary republic with a unicameral, 120-member legislature. The prime minister serves as head of government, while the directly elected president is mostly a ceremonial position. Since independence, political competition has largely centered on the rivalry between North Macedonia's two largest parties: the Social Democratic Union of Macedonia (SDSM) and the center-right, nationalist VMRO-DPMNE. Both parties are considered to be \"ethnic Macedonian\" parties in that they typically field ethnic Macedonian candidates and seek ethnic Macedonians' votes. Some observers contend that competition between SDSM and VMRO-DPMNE has often been a greater source of instability than interethnic tensions. Almost all governments have been led by either SDSM or VMRO-DPMNE, usually in coalition with one or more ethnic Albanian parties. Since 2017, Prime Minister Zoran Zaev has led a coalition government comprised of the SDSM, the Albanian Democratic Union for Integration (DUI), and several smaller parties. The coalition holds a slim majority of seats in parliament. The largest opposition party is VMRO-DPMNE. On May 5, 2019, Stevo Pendarovski (SDSM) was elected president of North Macedonia, replacing Gjorge Ivanov (VMRO-DPMNE), who had opposed many of the Zaev government's initiatives. In 2018, the Zaev government reached an agreement with Greece to resolve a nearly 30-year dispute (see below, \"Rapprochement with Greece\") and lift Greece's veto over North Macedonia's NATO and EU membership bids. North Macedonia signed its NATO accession protocol in February 2019, and the government has pledged to implement economic and political reforms required for EU membership. Some observers believe that North Macedonia's reform-oriented political climate could grow fragile if the EU delays the country's long-awaited accession negotiations beyond 2019 (see below, \"NATO and EU Membership\"). North Macedonia's reform record and relative stability in the 1990s made it an early Western Balkan frontrunner for EU and NATO membership. Its NATO Membership Action Plan was launched in 1999. In 2004, it became the first Western Balkan country to have its Stabilization and Association Agreement with the EU—considered a first step toward membership—enter into force. North Macedonia became a candidate for EU membership the following year. In the late 2000s, however, the introduction and implementation of reforms began to lag and the country's democracy experienced setbacks. These trends culminated in a political crisis from 2015 to 2017. Some analysts believe Greece's veto of North Macedonia's NATO membership bid at the alliance's 2008 Bucharest Summit triggered this period of backsliding. According to the International Crisis Group, Nikola Gruevski (VMRO-DPMNE), who became North Macedonia's prime minister in 2006 and held the position for the following decade, responded to the \"huge shock\" of the veto by escalating a state-backed \"antiquisation\" campaign that promoted \"an idiosyncratic view of [ethnic] Macedonians' glorious ancient past.\" The initiative alienated the country's Albanian population and widened the rift with Greece. In addition to Gruevski's controversial appeals to Macedonian nationalism, international and domestic NGOs expressed concern over setbacks in the rule of law, judicial independence, and media freedom. Corruption and the ruling party's reported abuse of public institutions also became problematic issues. As a result of these developments and Greece's continued veto threats, North Macedonia's EU and NATO membership bids lagged behind those of its neighbors: Croatia and Albania joined NATO in 2009 and Montenegro in 2017, Croatia became an EU member in 2013, and the EU launched accession negotiations for Montenegro and Serbia in 2012 and 2014, respectively. In 2015, a two-year political crisis was triggered when opposition parties, led by Zaev, accused the Gruevski government of orchestrating an illegal wiretapping network that targeted more than 20,000 individuals, including opposition and government officials, activists, diplomats, and journalists. Transcripts of allegedly wiretapped conversations implicated top government officials in abuses of office, including extortion, blackmail, and electoral fraud, among others. An EU-backed Senior Experts' Group viewed the recordings as the government's attempt to gain leverage over its rivals, judges and prosecutors, and its own officials. The scandal triggered pro- and anti-government protests that threatened to turn violent and renew interethnic tensions. The United States and the EU helped defuse the crisis by brokering the 2015 Przino Agreement, which established a timeline for early elections. These elections, held in 2016, had mixed results: Gruevski's VMRO-DPMNE and Zaev's SDSM were virtually tied with vote shares of 38% (51 seats) and 37% (49 seats), respectively. The SDSM ultimately reached a coalition agreement with the DUI and the Alliance for Albanians. However, the United States and the EU again intervened when President Ivanov refused to give Zaev the mandate to form a government and, shortly thereafter, when a violent mob assaulted SDSM lawmakers and allies in the parliamentary chamber. Several VMRO-DPMNE lawmakers were accused of aiding the attack. In May 2017, the SDSM-led coalition formed a government under Zaev. Since then, the political situation in North Macedonia has largely stabilized. Local elections in October 2017 further cemented the SDSM's position: It won mayoral elections in 57 out of 81 municipalities, including most urban areas. The VMRO-DPMNE won just five mayoral elections. These poor results prompted Gruevski to resign as party leader. Hristijan Mickoski was elected to replace him. Prime Minister Zaev has pledged to enact reforms to meet EU and NATO membership requirements, with strong backing from the EU, NATO, and the United States. Zaev considered repairing North Macedonia's bilateral relations with Bulgaria and Greece—EU and NATO members with veto power in both organizations—as a key step to renewing progress toward Euro-Atlantic integration. In 2017, North Macedonia and Bulgaria agreed to a Friendship Treaty (ratified in 2018) that established a framework to improve bilateral relations, which were historically fraught due in part to Bulgaria's non-recognition of Macedonian language and identity. While most regarded the treaty as a positive development, resolving North Macedonia's dispute with Greece was generally considered a greater challenge. Greece strongly objected to North Macedonia's adoption of the name Republic of Macedonia upon its 1991 independence, viewing it as an implicit territorial claim to Greece's northern region bearing the same name as well as an appropriation of the cultural heritage of ancient Macedon. For nearly three decades, North Macedonia's goal of EU and NATO membership was stymied by Greece's veto threat in both organizations. The unresolved dispute adversely affected North Macedonia's Euro-Atlantic ambitions and undercut reform momentum. The Zaev government's EU and NATO accession platform, as well as receptiveness under Greek Prime Minister Alexis Tsipras, created an opening for a new round of negotiations. North Macedonia and Greece reached the historic Prespa Agreement in June 2018, whereby Macedonia would change its name to North Macedonia and Greece would lift its veto over North Macedonia's Euro-Atlantic integration, among other provisions. The agreement's final enactment, however, was far from certain. It required legislative action in Greece's and North Macedonia's parliaments, where both governments faced sharp challenges from nationalist opponents. To the surprise of some observers, in January 2019 parliaments in both countries passed the required measures, albeit with razor-thin vote margins. U.S. and EU officials have praised Zaev and Tsipras for demonstrating leadership by making concessions that were politically controversial but viewed as important for the long-term prosperity of both countries. Nevertheless, Zaev and Tsipras expended political capital in the process. Zaev's government accepted a controversial partial amnesty of individuals involved in the 2017 attack in parliament in exchange for the support of some VMRO-DPMNE lawmakers, while some Albanian parties made their support contingent on legislation to expand the official use of the Albanian language. Tsipras narrowly survived a no-confidence vote. In another sign of improved ties, in April 2019 Tsipras became the first Greek leader to visit North Macedonia. Analysts note, however, that improved bilateral relations could be tested by parliamentary elections due to be held in Greece by October 2019. Public opinion polls indicate that Tsipras could lose power. His most probable successor, Kyriakos Mitsotakis of the New Democracy party, opposed the Prespa Agreement. While Mitsotakis has since conceded that the agreement is binding and applies to North Macedonia's NATO accession, some observers expressed concern when he stated that a New Democracy–led government would block North Macedonia's EU accession progress if Greek interests are threatened, including commercial interests for products from Greece's Macedonia region. Following the breakthrough in North Macedonia's bilateral relations with Bulgaria and Greece, U.S. and EU officials encouraged the Zaev government to implement political and economic reforms. Political instability, weak rule of law, corruption, a large shadow economy, and skilled labor shortages are viewed as impediments to improving conditions in North Macedonia. One of the key challenges will be surmounting the \"deep-seated culture of state capture, cronyism, and corruption\" that took root under previous governments. In 2015, the EU identified Urgent Reform Priorities for North Macedonia. These priorities, along with others from the EU-backed Senior Experts' Group, continue to guide the reform agenda. Priorities include improving judicial independence, implementing public administration and public financial oversight strategies to depoliticize appointments, updating the voters' list to improve trust in elections, and strengthening anticorruption institutions. Analysts believe that the governing coalition's slim majority in parliament may make it difficult to pass reforms without partial support from the opposition VMRO-DPMNE. On May 5, 2019, Stevo Pendarovski, a candidate backed by Zaev's SDSM, was elected president of North Macedonia. The presidency is a largely ceremonial office, but relations between the Zaev government and former President Gjorge Ivanov (2009-2019), an ally of former Prime Minister Gruevski, were fraught due to Ivanov's refusal to sign numerous laws backed by the Zaev government. He also opposed the Prespa Agreement. Pendarovski received 52% of the vote, while Gordana Siljanovska-Davkova, the candidate backed by VMRO-DPMNE, received 45%. Pendarovski's campaign centered on the government's progress in guiding North Macedonia to NATO membership, while Siljanovska-Davkova's criticized the Prespa Agreement and pledged to \"use all legal means to prove that it is not in accordance with international law.\" Analysts viewed the presidential elections as a litmus test of public support for the government after the Prespa Agreement and amid broad dissatisfaction over corruption, high unemployment, and poverty. Despite Pendarovski's victory, SDSM officials reportedly believe that the results depict a narrowing pro-government support base. While foreign leaders herald the breakthrough with Greece, voters in North Macedonia are likely eager for the government to implement economic and political reforms that have a more tangible impact on their quality of life—but have received less attention thus far. North Macedonia was one of Yugoslavia's poorest and most underdeveloped regions. Its economy experienced sharp decline during the 1990s. In the 2000s and 2010s, its GDP growth rate fluctuated in response to political instability and global economic trends. With the 2015-2017 political crisis seemingly resolved, the International Monetary Fund projects real GDP growth to be 2% or slightly higher in 2019 and 2020. In its 2018 report on North Macedonia, the European Commission lauded the country's public finance transparency reforms but expressed concern over unemployment, infrastructure deficiencies, weak contract enforcement, and large informal economy. Renewed crisis is one of the greatest risks to economic health going forward. Unemployment decreased from over 30% in 2010 to just over 20% in 2018. However, youth unemployment is more than twice as high. Over 20% of the population lives below the poverty line. Unemployment and poverty contribute to high rates of emigration from North Macedonia. An estimated 20%-30% of the population (450,000-630,000 people) emigrated between 1994 and 2013, mostly to Western Europe. The EU is North Macedonia's most important economic partner. Of North Macedonia's total trade in 2017, 70% was with EU member states, while over 80% of North Macedonia's exports went to EU countries. Trade between the two is almost fully liberalized. Successive governments in North Macedonia have prioritized foreign direct investment, which has increased somewhat since the late 1990s due in part to a low corporate tax rate, low labor costs, and free trade zones. In 2017, the top five source countries of foreign direct investment in North Macedonia were EU member states. North Macedonia was rated 10 th in the World Bank's 2019 Ease of Doing Business rankings, the best ranking of any country in the Balkans and East-Central Europe and the fifth-highest in Europe. The Zaev government's 2018 Plan for Economic Growth includes incentives for foreign firms that operate in the country's free economic zones. Since independence, successive governments in North Macedonia have viewed NATO and EU membership as the country's top foreign policy priority. The United States strongly supports North Macedonia's prospective membership in both organizations, and U.S. and EU officials consider the Euro-Atlantic integration process to be a source of stability and a driver of political and economic reforms in North Macedonia. Anchoring North Macedonia in Euro-Atlantic institutions is viewed as a way to help prevent the emergence of a strategic vacuum in the Western Balkans. The fixed goal of EU and NATO membership has helped guide reforms under the Zaev government by establishing a reform framework and identifying policy priorities. North Macedonia appears likely to become NATO's 30 th member in late 2019 or early 2020. On February 6, 2019, following the finalization of the Prespa Agreement with Greece, North Macedonia signed its NATO accession protocol. For North Macedonia to join the alliance, all 29 NATO allies must first ratify the protocol in accordance with domestic procedures. On February 8, Greece became the first NATO member to ratify it. In the United States, the Senate is responsible for protocol ratification (by two-thirds majority). President Trump formally transmitted the protocol to the Senate on April 29, 2019. If all 29 NATO members approve the protocol, the NATO secretary general would formally invite North Macedonia to accede to the treaty. In the final step , North Macedonia would need to approve its NATO membership through a referendum or a parliamentary vote. North Macedonia launched its NATO Membership Action Plan in 1999. North Macedonia has contributed to NATO missions in Afghanistan and Kosovo. Its 2018 Strategic Defense Review establishes a timeline for increasing defense spending from its 2013-2017 average of 1.1% of GDP to NATO's 2% target by 2024. The government plans to reach 2% by annually increasing defense spending by 0.2%. The government includes equipment modernization and streamlining the armed forces from approximately 8,200 to 6,800 active personnel as reform priorities. North Macedonia's short-term prospects for EU membership are less certain. It has been an EU candidate since 2005, but its progress toward membership stalled largely due to the name dispute with Greece. Opinion polls indicate a strong base of popular support among Macedonians for EU membership in part due to the widespread belief that membership will improve their quality of life. Many observers, however, question whether there is unanimous support for enlargement among the leaders of the EU's 28 member states. The next step in North Macedonia's membership bid would be for the EU to open accession negotiations. (Montenegro and Serbia's accession negotiations were launched in 2012 and 2014, respectively.) This would begin the lengthy process of harmonizing North Macedonia's domestic legislation with the body of EU treaties, laws, and rules known as the acquis communautaire , which is subdivided into 35 thematic \"chapters.\" In order to open North Macedonia's accession negotiations, leaders from all 28 EU member states must agree. Although the European Commission (the EU's executive) recommended launching accession negotiations with North Macedonia in 2018, France, Denmark, and the Netherlands were reportedly opposed, citing the need for continued reform progress in North Macedonia. As a result, EU leaders delayed launching negotiations and set 2019 as the target date for opening them. However, recent statements from French President Emmanuel Macron have prompted some observers to speculate that France may again seek to delay negotiations. Although the EU asserts that it is committed to further enlargement, analysts suggest that some European leaders and publics are wary amid various concerns about the EU's future and issues such as migration. Observers have expressed concern that another delay in opening accession negotiations could deflate the Zaev government's reform agenda, damage the EU's reputation in the country, and enable Zaev's critics to charge that he sacrificed the country's name without any reward from the EU. It would likely add to the sense of uncertainty as to whether the EU would admit North Macedonia even if it met all membership requirements. Some analysts cite the reform drift, corruption, and democratic setbacks that followed NATO's 2008 Bucharest Summit—when Greece vetoed North Macedonia's membership invitation—as evidence of the backsliding that can occur when EU and NATO membership are perceived as being beyond reach. As a candidate country, North Macedonia is eligible for assistance from the EU's Instrument for Pre-Accession Assistance II (IPA II). Between 2014 and 2020, North Macedonia is expected to receive €664 million ($744 million at current exchange rate) in IPA II allocations. Some EU members provide additional aid to North Macedonia through national assistance programs. Many analysts believe that EU and NATO membership would help build resilience against Russian influence in North Macedonia. Russia, which opposes NATO enlargement in the Balkans, was critical of the Prespa Agreement. In July 2018, Greece expelled two Russian diplomats in response to accusations that the Kremlin was aiding anti-Prespa protests. Prime Minister Zaev likewise accused a Kremlin-linked businessmen of funding a campaign that urged voters to boycott a referendum on changing the country's name. Pro-boycott narratives were spread through social media. Intelligence officials in North Macedonia and the West reportedly attributed online disinformation campaigns to pro-Russia groups. A U.S. diplomat described the campaign as \"an extraordinarily complex, organized, and toxic amount of disinformation.\" In September, then-U.S. Secretary of Defense James Mattis echoed these concerns during a visit to Skopje. Russia continues to challenge the legitimacy of the Prespa Agreement and push the narrative that the West \"forced\" North Macedonia into NATO. Russia's ability to exert influence in the aftermath of the Prespa Agreement's signing may have been facilitated by a reportedly years-long campaign to increase Russia's intelligence footprint in the country, project soft power through Russian-Macedonian friendship organizations and Kremlin-linked media such as Sputnik and RT , forge alliances with local anti-establishment politicians and groups, and propagate anti-Western narratives that tap into nationalist fears. Russian soft power draws on cultural kinship and shared Orthodox Christian religious tradition with ethnic Macedonians, although Russian-Macedonian ties are less established and historically grounded than Russian ties to other Orthodox Christian populations such as Greeks, Bulgarians, and Serbs. Analysts believe that Russia's goal was to sustain instability and widen political and social divisions in order to undermine North Macedonia's Euro-Atlantic integration. U.S. and EU officials have voiced concern over China's growing economic clout in the Western Balkans. China has invested in regional infrastructure, energy initiatives, and other sectors as part of its Belt and Road Initiative, an ambitious transcontinental project to expand Chinese trade and investment. In 2016, China's state-owned COSCO Shipping acquired majority stakes in the Piraeus Port Authority in Greece, reportedly with ambitions of using it as an entry point for container shipping to Western Europe via the Balkans. Within the Belt and Road Initiative framework, China established the \"16+1\" group in 2012 (now 17+1) to convene EU and non-EU countries in the Balkans and Central Europe, including North Macedonia, through annual leader summits. China has not invested as heavily in North Macedonia as it has in other Western Balkan countries. The most significant investment thus far is a 2013 loan worth €580 million ($648 million at exchange current rate) from China's ExIm Bank to help fund two highway projects: Miladinovci-Stip (completed) and Kicevo-Ohrid (under construction). Chinese engineering and construction company Sinhydro was awarded the contract for construction, which began in 2014. Some observers caution that the highway segments may highlight potential perils of Chinese investment in the region. The projects have been mired in several controversies. North Macedonia's Special Prosecutor Office—tasked with investigating abuses of office raised in the wiretapping scandal (see above)—filed unlawful influence charges against Gruevski and the former transport minister for allegedly violating procurement rules by awarding the contract to Sinohydro despite receiving a lower bid from another contractor. Officials reportedly extorted millions of euros from an intentionally inflated project budget. Some of the recordings capture alleged conversations between top officials \"discussing direct payments from\" Sinohydro. Furthermore, the relative ease of receiving Chinese financing, as well as the requirement that the recipient government serve as loan guarantor, could lead to an untenable public debt burden, particularly when project costs unexpectedly increase. Highway construction was halted in 2017 due to planning errors. After the delay, the contract with Sinohydro was amended with a three-year extension, and the Chinese firm reportedly sought an additional $160 million to complete the Kicevo-Ohrid segment, raising the construction costs by 10% over the initial estimate. The United States and North Macedonia enjoy good relations. The United States strongly supports North Macedonia's NATO and EU membership bids. After Greece blocked North Macedonia's NATO entry in 2008, the United States signed a \"Declaration of Strategic Partnership and Cooperation\" with North Macedonia to signal U.S. commitment to expeditiously securing North Macedonia's NATO membership. Furthermore, the United States has cooperated with the EU to defuse political crises in North Macedonia, most recently in 2017. The United States also assists North Macedonia with security challenges, including returned foreign fighters, trafficking, and cybersecurity. North Macedonia's Ministry of Interior estimates that 150 or more of its citizens fought with the Islamic State in Iraq and Syria, of which roughly 80 have since returned. The United States has cooperated with law enforcement and intelligence officials in North Macedonia to identify threats, provided training for judges and prosecutors involved in terrorism cases, and supported organizations that work toward countering violent extremism. The U.S. State Department classifies North Macedonia as a Tier 2 country with regard to trafficking in persons: Despite improvements in its efforts to combat trafficking, the government does not meet the State Department's minimum conditions for its elimination. Finally, U.S. Cyber Command, a unit in the Department of Defense, has worked with authorities in North Macedonia to improve cyber defense capabilities and is reportedly deploying one or more experts for on-site assistance. The United States has provided significant amounts of foreign assistance to North Macedonia. From the country's independence in 1991 through FY2015, the United States obligated about $819 million in aid to North Macedonia, according to the USAID Greenbook. In 2007, the NATO Freedom Consolidation Act ( P.L. 110-17 ) was passed, making North Macedonia eligible for assistance under the NATO Participation Act of 1994. As a candidate for EU and NATO membership, North Macedonia is eligible for assistance through the Countering Russian Influence Funds under the Countering America's Adversaries Through Sanctions Act enacted in 2017 ( P.L. 115-44 ). The United States provided $21.6 million in foreign assistance to North Macedonia in FY2017 and $15.3 million in FY2018. The Trump Administration's proposal to decrease foreign assistance levels, however, includes North Macedonia: The Administration requested $6.3 million for FY2019 and $5.7 million for FY2020. Many Members of Congress supported Greece and North Macedonia's negotiations to resolve their bilateral dispute. Resolutions were sponsored in both chambers to support North Macedonia's landmark agreement with Greece and back its NATO membership bid. On February 6, 2019, the chairman and ranking member of the House Committee on Foreign Affairs wrote an open letter to Secretary of State Mike Pompeo urging the Administration to back North Macedonia's accession. With growing concern over Chinese and Russian global influence, some Members have expressed concern over external influence in the Western Balkans region—including North Macedonia. Finally, some observers contend that North Macedonia's strong desire for EU and NATO membership serves as a reminder to officials on both sides of the Atlantic of the worth of the transatlantic partnership, particularly at a time when it has grown strained. North Macedonia Foreign Minister Nikola Dimitrov has often remarked that \"those on the inside forget how cold it is outside.\"", "summary": "The United States has supported North Macedonia since its independence from Yugoslavia in 1991 and strongly backs its European Union (EU) and NATO ambitions. (The country's constitutional name was the Republic of Macedonia until February 2019, when it was renamed the Republic of North Macedonia.) On multiple occasions, the United States played a key role in defusing political crises and interethnic tensions in North Macedonia. For more than two decades, a U.S. diplomat led United Nations–brokered negotiations between Greece and then-Macedonia to resolve their bilateral dispute over the latter's use of the name Macedonia. With strong U.S. support, in 2018 North Macedonia and Greece reached the landmark Prespa Agreement, which resulted in the name change and resolved their bilateral dispute. Many Members of Congress have supported North Macedonia's integration into Euro-Atlantic institutions. In 2007, the NATO Freedom Consolidation Act (P.L. 110-17) was passed to affirm congressional support for enlargement and make North Macedonia eligible for assistance under the NATO Participation Act of 1994. Resolutions were also sponsored in both chambers in 2018 to support the Prespa Agreement with Greece and endorse North Macedonia's bid for NATO membership. Congressional interest in North Macedonia is also connected to broader policy concerns over the influence of Russia, China, and other external actors in the Western Balkans. In 2017, North Macedonia emerged from a destabilizing two-year crisis with a new government that pledged to redouble the country's Euro-Atlantic integration efforts and enact reforms to tackle the corruption and state capture that took root under previous governments. The Prespa Agreement removes Greece's veto over North Macedonia's NATO and EU membership bids. Many expect North Macedonia to become NATO's 30th member in 2019 or 2020 and the EU to decide in 2019 whether to launch formal accession negotiations with the country. Despite positive assessments of North Macedonia's progress, the forthcoming period is generally viewed as critical to consolidating North Macedonia's recent gains and implementing reforms to bolster economic growth, reduce unemployment, and depoliticize state institutions. Given U.S. and NATO involvement in conflicts in the Balkans in the 1990s, as well as the U.S. role in defusing crises in North Macedonia, Members of Congress may be interested in North Macedonia's stability during what many U.S. and EU officials consider to be a crucial, albeit fragile, opening for reforms. Members may also consider the role that external actors such as Russia and China have played in recent years or could play going forward, particularly if North Macedonia's EU accession negotiations are further delayed.", "document_type": "crs"}
{"report": "Congress has shown an interest in the Department of Defense's (DOD's) electronic warfare (EW) portfolio, requiring an independent assessment of EW plans and programs in the FY2019 National Defense Authorization Act (NDAA). This report addresses U.S. military EW funding across research, development, test, and evaluation (RDT&E) and procurement appropriations. Using the FY2019 through FY2021 budget request documents, this analysis compares funding profiles between fiscal years, as well as projected funding across the future years defense program (FYDP). Using unclassified sources, CRS estimates that DOD seeks to invest approximately $9.7 billion in FY2021 funding for EW programs. Discussion of specific EW-related programs, as well as an overview of electronic warfare, are outside the scope of this report. The following analysis looks at EW funding identified by the DOD's EW Executive Commission (EW EXCOM). The EW EXCOM identified a series of RDT&E program elements from three of the military services (Air Force, Army and Navy), as well as several defense agencies (Defense Advanced Research Projects Agency, Defense Information Systems Agency, the Joint Staff, Office of the Secretary of Defense Operational Test and Evaluation, and U.S. Special Operations Command). Using the program elements identified, this analysis extrapolates procurement funding to provide an overview of DOD investments in electronic warfare in FY2019 and FY2020 and requested investments in FY2021. Over the past two decades, China and Russia have seen U.S. military command and control, intelligence surveillance, and reconnaissance (C2ISR) networks as a critical capability that they must develop capabilities against which to effectively compete. Both countries, as a result, have invested heavily in EW-related systems. According to one analyst, the Russian military views electronic warfare as a \"type of armed struggle using electronic means against enemy C4ISR [command, control, communications, computers] to 'change the quality of information,' or using electronic means against various assets to change the condition of the operational environment.\" Similarly, China has developed sophisticated EW capabilities to disrupt and deny adversary access to command and control systemsâparticularly space-based systems. Not only has the Chinese military been developing new systems, but it routinely exercises with them. In its most recent annual report to Congress, DOD documented at least four major exercises the People's Liberation Army used to test and demonstrate their capabilities. The National Defense Strategy Commission , an independent Congressional commission charged with evaluating the DOD's National Defense Strategy, identified EW as a critical capability to achieve the goals of the National Defense Strategy. Similarly, in its FY2019 through FY202 1 Defense Budget Overview request documents, DOD identified EW as a priority to improve platform and network survivability; provide advanced jamming techniques to disrupt radars, communications, and command and control systems; and provide measures to defend the space domain and maintain power projection forces. The Executive Branch and the Congress have placed a higher priority on EW programs in recent years. In 2015, the Deputy Secretary of Defense established the EW EXCOM âco-chaired by the Under Secretary of Defense for Acquisition and Sustainment (USD A&S) and Vice Chairman of the Joint Chiefs of Staffâto identify emerging EW technologies. The FY2017 NDAA required the EW EXCOM to develop an EW Strategy. In its strategy, the EW EXCOM identified program elements and projects with EW facets in each of the services' and Defense-wide Research, Development, Test and Evaluation (RDT&E) appropriations. It did not, however, identify procurement lines due to complexity and classification issues . Furthermore, some program elements the EXCOM identified might not clearly refer to EW capabilities, like DARPA's Electronics Technology. Other program elements that support EW operations, however, such as the Navy's E-2D Hawkeye, are not included in the EXCOM's program list. With these methodological limitations, this report treats the EW EXCOM's list of 65 program elements and projects as encompassing DOD EW programs. The following analysis compares the FY2019 budget request for these programs with the FY2020 and FY2021 requests. The analysis includes funding for the Army, Navy, Air Force, DARPA, Defense Information Systems Agency (DISA), the Joint Staff, Office of the Secretary of Defense (OSD), Operational Test and Evaluation (OT&E), and Special Operations Command (SOCOM), using program elements identified by EXCOM in its strategy document, which are aggregated at the department or agency level. The FY2021 request includes Space Force programs, which had been part of the Air Force request in prior years. Though the EW EXCOM did not identify EW procurement programs, DOD procurement justification documents (P-40s) identify related research and development program elements. Using the Defense Technical Information Center investment budget search tool, this analysis identified the associated EW procurement programsâ28 in FY2019, 36 in FY2020, and 33 in FY2021. Some research and development effortsâsuch as the F/A-18 Hornet fighter jet and MQ-9 Reaper droneâdid not differentiate funding for EW-specific procurement and therefore included procurement for aircraft. These procurements were excluded so as not to artificially inflate the funding profile. Based on the RDT&E profiles and program element searches, CRS did not identify DISA, Joint Staff, OSD, and DARPA programs with procurement appropriations. DOD has stated that it has prioritized EW funding above other programs. This report compares funding requests between the three fiscal years to assess if DOD seeks to increase funding of the EW portfolio (by increasing funding), decrease funding, or keep the portfolio relatively unchanged. To assess these changes, the percentage change from FY2019 to FY2020 is calculated for each appropriations category, and then compared to an overall DOD percentage change. Table 1 , above, provides an overview of the FY2019 EW RDT&E funding request, FY2019-enacted funding, and projected funding for EW program elements in each of the departments and agencies. The FY2019 request serves as a baseline to compare how DOD changed its funding priorities for FY2020. Of note, DOD requested $5.53 billion in EW RDT&E for FY2019 and planned on spending approximately $24.5 billion across the FYDP. The Navy requested the most funding in FY2019 ($2.44 billion), followed by the Air Force ($1.14 billion), the Army ($859.7 million), DARPA ($740 million), and other organizations ($341 million). EW funding was anticipated to peak in FY2019 then curtail through FY2022, followed by a slight increase in FY2023. Figure 1 , above, shows the difference between the Administration's FY2019 DOD request and the enacted amount of EW RDT&E. DOD requested a total of approximately $5.5 billion in FY2019; Congress enacted approximately $5.8 billion, $263 million above the requested amount. Of particular note, OSD OT&E received additional funding for subsequent testing. The largest increases between the FY2019 request and enacted levels were for \"Other\" agenciesâprimarily Operational Test and Evaluationâand the Army. The Navy and DARPA saw slight decreases from their requested levels. Table 2 provides the FY2020 request and projected future year funding levels for EW RDT&E appropriations in DOD's FY2020 budget request. Of particular note, the Administration's DOD budget requested $504 million in additional RDT&E funding for FY2020 compared with the FY2019 request. While it would follow a trend line similar to FY2019's projection, DOD's plan adds additional money to EW capabilities in each of the out-years of the FYDP. This increase can primarily be attributed to the Navy's start of the Next Generation Jammer-Low Band program, as well as the Army's renewed focus on EW capabilities. Figure 2 provides a comparison between requested and appropriated amounts by military department for FY2020. There was an overall increase in $140 million in EW research and development efforts. The Air Force received approximately $139 million in additional funding compared to the requested amount, with the largest increases for Advanced Aerospace Sensor Technologies and EW Quick Reaction Capabilities. The Navy received an additional $58 million for EW research and development efforts, including more funding for the F/A-18 Infrared Search and Track development and Shipboard Information Warfare Exploitation programs. These increases were partially offset by a $31 million reduction in DARPA funding for EW research and development and a $26 million reduction in Army funding for such efforts. DARPA programs all saw relatively small decreases in funding. Army funding decreases included reductions to assured Precision, Navigation and Timing equipment development. The FY2021 RDT&E request includes approximately $5.7 billion across all military departments and agencies. The Navy requested the most, following a similar trend in FY2019 and FY2020. The Army requested the second most, replacing the Air Force in prior years. Table 3 provides an overview of the FY2021 request. The Army increased EW RDT&E funding by $305 million when comparing what was projected from the FY2020 request and what was requested in FY2021. The Air Force experienced the most changes, restructuring several program elements and transferring others to the Space Force. The top three programs that received increased funding include (1) the Army's Rapid Capability Development and Maturation program (increased by $247 million compared to the FY2020 projection for FY2021), (2) the F/A-18 Infrared Search and Track (IRST) development (increased $168 million), and (3) the Eagle Passive Active Warning System (increased by $146 million). Programs that saw the largest reductions include the B-2 Defensive Management System (reduced by $164 million), DARPA's Sensors and Processing Systems program (reduced by $142 million), and the Space Force's Protected Tactical Satellite Communications (reduced $48 million). CRS assesses that the FY2021 request includes 93 program elements associated with electronic warfare and 157 related projects. This represents a slight increase from previous years, partly as a result of the newly established Space Force, the Air Force restructuring research projects, and the Army's restructuring of programs. Figure 3 depicts funding projections from the FY2019, FY2020, and FY2021 requests. The FY2021 request aligns closely with the FY2020 request, reducing funding by $104 million from projections in FY2020. The FY2021 request projects $25.6 billion over five years; FY2019 projected $24.6 billion over the FYDP, FY2020 similarly projected $25.6 billion. DOD has increased planned EW RDT&E funding from $4.9 billion in its FY2019 request to $5.6 billion in its FY2020 request, then down to $5.5 billion in the FY2021 request. The FY2021 request represents an 11.7% increase in funding when compared to FY2019 projections, but a 1.7% decrease from the projected funding from FY2020 request. The overall change from FY2019 to FY2021 (11.7%) is double the requested 4.9% increase in overall DOD funding from FY2019 to FY2020. Table 4 , above, provides an overview of the FY2019 EW procurement request along with enacted procurement appropriations. Overall, the Administration requested $4.55 billion for EW-related procurement activities. The Navy requested the most ($2.43 billion), followed by the Air Force ($919 million) and the Army ($743 million). Funding was projected to decline through FY2021 before increasing in FY2022 and FY2023, as a result of the first increment of the Next Generation Jammer (NGJ) entering production. The NGJ is a series of jamming pods designed to disrupt air defense radars and comminutions, replacing the Vietnam-era ALQ-99 jammers. Congress added $431 million in appropriations, representing a 9.5% increase over what the Administration requested. Figure 4 provides the differences between what was requested versus enacted. Of note, the Air Force received an additional $444 million over the requested amount due to Congress funding an additional EC-37B aircraftâwhich is designed to jam air defense radars and command and control systemsâas well as increases to combat training ranges and simulations and adjustments to the F-15 defensive systems. The Navy and SOCOM saw minor decreases in appropriations. The Administration requested $4.56 billion in EW procurement for FY2020, adding an additional $303 million compared to what was planned in FY2019. Table 5 provides an overview of the overall FY2020 request. The Navy again requested the largest amount ($2.44 billion), followed by the Air Force ($1.21 billion) and the Army ($574 million). The Air Force's request increased the most (by $306 million) compared with what had been planned for FY2020 in the previous FY2019 request, followed by the Army (by $224 million). This requested increase can be partially attributed to the Army starting a new program for Assured Positioning, Navigation and Timing and the Air Force's transition of the E-11 Battlefield Airborne Communications Node (BACN) to a program of record and increases to E-3 Airborne Warning and Control System (AWACS) modifications. Procurement for EW equipment was $4.2 billion. The Navy and the Air Force requested the largest proportions of the request, following similar trends identified in FY2019 and FY2020. New to the FY2021 request was funding for the Space Forceâthe newest military service and authorized in the FY2020 National Defense Authorization Act ( P.L. 116-92 ). Table 6 provides an overview of the FY2021 procurement request. Procurement in FY2021 is the lowest of the three fiscal years tracked in this report, only slightly higher than funding levels projected from the FY2019 request. There are a few trends to highlight from the FY2021 request. First, Navy procurement saw the largest decreases. The primary programs with significant reductions include MQ-4 Triton procurement (reduced $543 million compared to projections for FY2021 from the FY2020 request), MQ-4 Triton procurement (reduced $373 million), and AN/ALQ-32s (reduced $159 million). Procurement for Assured Precision Navigation, and Timing (PNT) equipment (increased $93 million), Patriot Modifications (increased $85 million), and the Integrated Fire Protection (IFPC) Family of Systems (increased $46 million) received the largest increases compared to the FY2020 request. The funding data suggest the Navy is reevaluating its EW programs, particularly for the surface fleet. The FY2021 request included approximately $3.7 billion to procure electronic warfare capabilities. This represents a 22.5% reduction in procurement funding compared to what was projected for FY2021 in the FY2020 request ($4.8 billion). The FY2021 FYDP projects $22.8 billion in funding over the next five years; this is compared to the FY2019 FYDP, which projected $22.5 billion, and the FY2020 FYDP, which projected $26.3 billion. Figure 5 depicts each of the FYDPs as a comparison. Figure 5 illustrates the differences between the Administration's plans for EW procurement from FY2019 to FY2021. The FY2020 request added an additional $5.23 billion across the FYDP compared with the FY2019 FYDP. FY2021 added $94 million compared to the FY2019 request, but reduced procurement by $491 million compared to projections from the FY2020 request. The Navy observed the largest decrease in procurement funding, resulting in a reduction of $489 million. The Air Force saw a reduction of $81 million as well, primarily due to the introduction of the Space Force. The Army saw the largest increase, approximately $53 million. It might be argued that DOD is making EW procurement a priority, which is aligned with the strategic direction in the National Defense Strategy and recommendations by the National Defense Strategy Commission. DOD requested an additional 4.9% increase in funding compared to what it projected in FY2019. EW procurement, however, increased by 7.1% from the FY2019 request compared to what was requested in FY2020âa 2.2% increase over the DOD request. Figure 6 , above, shows the relationship between RDT&E and procurement. Some might be concerned looking exclusively at the planned funding levels for RDT&E since this appropriation declines over the FYDP. However, several programs currently receiving RDT&E fundingâsuch as the NGJ and the E-11 BACNâtransition from being developmental programs to fielded systems. Also of note, it appears that the Administration may have changed its plans on fielding new programs. Based on funding projections the Administration plans on accelerating the Next Generation Jammer quicker than previously anticipated. In addition, it appears the Administration decided to accelerate the F-15 electronic warfare systems (F-15 EPAWS). The increase in planned procurement funding in FY2020 is particularly significant compared to the planned funding profile in FY2019. Combining both appropriations, DOD requested an additional $662.5 million for EW in FY2021 compared to what it had initially projected in the FY2019 request; however, the FY2021 request is $591.3 million lower than had been projected from the FY2020 request. This represents a 7.3% increase in the portfolio from FY2019 projections but a 5.7% decrease compared to projections from the FY2020 projections. One potential issue for Congress is the overall funding level for EW programs. DOD requested approximately $9.7 billion dollars in FY2021 for the EW portfolio, based on unclassified budget request documents. Historically, individual EW programs have not been generally seen as large enough for in-depth congressional scrutiny; however, combined, these programs represent funding levels nearly as much as an aircraft carrier ($12.5 billion in total procurement for CVN-80) or the F-35 Joint Strike Fighter procurement ($10.7 billion in FY2019). Congress may ask whether $10.2 billion is sufficient for DOD to execute its missions, or, conversely, whether this funding level is too much. Second, Congress may ask whether each of the military services is funding unique programs, or whether there are overlapping programs that provide similar capabilities. To understand these questions, Congress may consider a historical perspective on how much the DOD allocated for EW to compare if current funding exceeds or under resources the portfolio. A second metric Congress may potentially consider using is the ratio of spending for procurement and RDT&E appropriations to understand where in the lifecycle EW programs currently are, and if the current portfolio is an anomaly. Many EW programs are highly classified due to their close relationship with intelligence and command and control programs. As a result, there is potentially insufficient unclassified information to assess how much DOD is currently spending on EW. This limitation of data presents a potential oversight issue for Congress. Some have argued that DOD has not adequately prioritized EW over the past several years. The budget projections described above may support the argument that DOD is now prioritizing investment in EW funding. Congress may consider whether DOD uses research and development funding to procure new electronic components. Congress might consider requiring DOD to report all EW-related funding for procurements, as well as ensuring that DOD is not procuring new or advanced electronics through other appropriations. The EW EXCOM has stated that many procurement programs have EW-related spending, and it is difficult and complex to differentiate among them . As a result, this report does not include all EW-related procurement programs, and therefore does not account for all EW funding. If Congress maintains interest in EW procurement, it may consider requiring DOD to report all EW-related procurement programs, as well as to break out specific EW-related initiatives within a larger procurement program. Congress has shown an interest in developing a comprehensive assessment of EW plans and programs across each of the DOD services and agencies. The FY2019 NDAA ( P.L. 115-232 ) required DOD to contract with a scientific organization to perform an independent assessment of DOD-related EW plans and programs. According to the legislation, this assessment identified U.S. programs, orders of battle and doctrine; analyze adversary programs, orders of battle and doctrine; and make recommendations for how the U.S. military might counteract adversary plans and programs. The Center for Strategic and Budgetary Assessments delivered the NDAA mandated study in December 2019; however, the FY2020 NDAA required a similar study to be performed. In addition to requesting an independent assessment of EW programs and plans, the FY2019 NDAA required DOD to update its Electronic Warfare Strategy from 2017 and submit it to Congress. Congress has expressed concern that DOD has not synchronized its efforts to ensure its dominance in the electromagnetic spectrum. For DOD to remain competitive, Congress directed the Secretary of Defense and a senior designated official to develop a process and procedure to integrate and enhance EW mission areas across DOD (i.e., to ensure each of the services cooperates and is integrated in the Joint force, as opposed to having service-specific solutions). This section of the NDAA requires DOD to develop a \"defense-wide strategy, planning, and budgeting [process and procedures] with respect to conduct of such operations [electronic attack] by the Department, including activities conducted to counter and deter such operations by malign actors.\" The strategy was delivered in 2019; however, much of the detail of this particular strategy is classified.", "summary": "Congress, in the FY2019 National Defense Authorization Act, and the Department of Defense (DOD) has identified electronic warfare (EW) as a critical capability supporting military operations to fulfil the current National Defense Strategy. Collectively, DOD considers procurement appropriations and research, development, test and evaluation (RDT&E) appropriations as part of its investment accounts. Using programs identified by the EW Executive Commission (EW EXCOM), this report traces funding for three of the military services (Air Force, Army, and Navy) along with several defense agencies (Defense Advanced Research Projects Agency, Defense Information Systems Agency, the Joint Staff, Office of the Secretary of Defense Operational Test and Evaluation, and U.S. Special Operations Command). This report compares DOD's funding requests for FY2019, FY2020, and FY2021 to assess if DOD seeks to increase the funding of the EW portfolio (by increasing funding), decrease its funding, or keep the portfolio relatively unchanged. Insights into EW Program Funding This report tracks DOD funding requests for approximately 65 research and develop program elements and 30 procurement line items across FY2019 and FY2021. Reviewing these three fiscal years request allows for comparisons across the EW portfolio and provides insights into how EW was prioritized relative to the overall DOD budget. In addition to tracking funding requests in each of the respective fiscal years and identifying what Congress appropriated in FY2019 and FY2020, this report looks at the future years defense program (FYDP) to identify potential trends in the EW portfolio. This report looks at the combination of the procurement and RDT&E budget requests to provide a comprehensive, unclassified overview of the total EW program requests within DOD. DOD requested at least $10.1 billion in FY2019, $10.2 billion in FY2020, and $9.7 billion in FY2021 for EW, an amount analogous to the F-35 Joint Strike Fighter program ($10.7 billion in FY2019) or a Ford-class aircraft carrier ($12.5 billion in total ship-building procurement). Based on statements by several senior defense officials and the conclusions of the National Defense Strategy Commission, it could be expected that DOD is likely to substantially increase funding for EW programs. CRS assesses that DOD requested 11.5% more funding for EW RDT&E in FY2021 than what was projected in the FY2019 budget, but 1.7% less than what was projected in the FY2020 budget. Comparing the procurement budget, the FY2021 request seeks to increase funding by 2.2% compared to FY2019 projections, but decrease funding by 10.3% compared to what was projected in the FY2020 request. From a portfolio perspective, CRS assesses that the Administration projects $51.7 billion over the FY2021 Future Years Defense Program (FYDP), $259 million less than the FY2020 FYDP, but $4.5 billion more than the FY2019 FYDP. Overall, it appears the Administration is prioritizing research and development for EW programs, while decreasing procurement, which aligns with the overall FY2021 DOD budget request. Potential Issues for Congress Based on this analysis, this report identifies three potential issues for Congress Is DOD appropriately funding the EW portfolio? How does DOD use appropriated funds for EW programs? Is DOD potentially buying new capabilities with research and development funds, when it should use procurement funding? Does DOD understand what it is developing and procuring within the EW portfolio?", "document_type": "crs"}
{"report": "T he statutory language governing patent-eligible subject matterâthat is, the types of inventions that may be patentedâhas remained remarkably constant over the nearly 250-year history of U.S. patent law. Under the Patent Act of 1793, which Thomas Jefferson authored, \"any new and useful art, mac hine, manufacture or composition of matter, or any new and useful improvement [of the same]\" was patentable. Current lawâSection 101 the Patent Act of 1952âpermits the patenting of \"any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.\" Through these four expansive statutory categories, Congress sought to ensure that nearly \"anything under the sun made by man\" is patentable if it meets all the requirements for patentability, such as novelty, enablement, and nonobviousness. Consistent with the broad statutory language, Section 101 permits patenting in fields of applied technology such as pharmaceuticals, biotechnology, chemistry, computer hardware and software, electrical engineering, agriculture, mechanical engineering, and manufacturing processes. However, the Supreme Court has long read Section 101 to categorically prohibit patents on three types of discoveries: \"laws of nature, natural phenomena, and abstract ideas.\" Even if \"not required by the statutory text\" of Section 101, the Court has held that these three judicial exceptions \"define[] the reach of the statute as a matter of statutory stare decisis going back 150 years.\" In a recent series of decisions, the Supreme Court relied on Section 101 to reject patent claims on a method for hedging price-fluctuation risks in commodity markets; a method for measuring metabolites in human blood for the purpose of calibrating the dosage of particular drug; isolated human DNA segments; and a method of mitigating settlement risk in financial transactions using a computer. These decisions established a two-step test for patentable subject matter sometimes called the \" Alice/Mayo test\" or the \" Alice / Mayo framework.\" These cases have been widely recognized to effect a significant change in the scope of patentable subject matter, restricting the sorts of inventions that are patentable in the United States. The Alice / Mayo framework has thus shifted, for better or worse, the balance between providing incentives to innovate and the social costs of exclusive rights that is at the heart of patent law. The effects of this change have been particularly pronounced in the fields of computer technology and biomedical technology. As a result, there is a significant and ongoing debate about the effects of Alice / Mayo framework, with a number of patent law stakeholders raising concerns about recent patentable subject matter rulings. Critics argue that the Alice/Mayo framework is vague, unpredictable, and not administrable ; muddies patent law by confusing patent eligibility with distinct patent law concerns, such as nonobviousness ; reduces incentives to innovate and invest in particular industries, such as biotechnology; or puts the U.S. industry at a disadvantage with respect to international competitors. Other stakeholders defend the Alice / Mayo framework, arguing that the Court's recent decisions are a part of the ordinary common law development of Section 101; an important tool for combating unmeritorious litigation or preventing overbroad or otherwise harmful patents ; or beneficial to American consumers by lowering prices. In response to the concerns of some stakeholders, there have been several significant recent administrative and legislative developments that aim to clarify and/or reform the law of Section 101. On January 7, 2019, the Patent and Trademark Office (PTO) issued Revised Patent Subject Matter Eligibility Guidance designed to assist PTO patent examiners in determining patent eligibility with greater clarity and predictability. On April 17, 2019, Senators Thom Tillis and Chris Coons, along with Representatives Doug Collins, Hank Johnson, and Steve Stivers, released a \"bipartisan, bicameral framework\" for legislative Section 101 reform. On May 22, 2019, following feedback on their first draft framework, the same group of Members released a \"bipartisan, bicameral draft bill\" to reform Section 101. After the release of the draft bill, the Senate Judiciary Committee's Intellectual Property Subcommittee held a series of three public hearings on Section 101 reform, soliciting the views of 45 patent law stakeholders. Senators Tillis and Coons continue to seek input from stakeholders following the hearings, and are expected to make further changes before introducing a formal bill. This report provides the necessary background and context to understand the legal and practical effects that these legislative reforms would have if enacted. First, the report reviews the basic legal principles of the U.S. patent system. Second, it examines the historical development and current state of patentable subject matter law. Third, it reviews several articulated rationales for Section 101 and theoretical options for Section 101 reform. Finally, it examines the specifics of the PTO guidance and proposed legislative reforms to Section 101. Congress's authority to grant patents derives from the Intellectual Property (IP) Clause of the U.S. Constitution, which grants Congress the power \"[t]o promote the Progress of Science and useful Arts, by securing for limited Times to . . . Inventors the exclusive Right to their . . . Discoveries.\" Patents are generally available to any person who \"invents or discovers any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.\" Patent rights do not arise automatically. Rather, to obtain patent protection under the Patent Act, an inventor must formally apply for a patent with the PTO, beginning a process called patent prosecution. During prosecution, a patent examiner at the PTO evaluates the patent application to ensure that it meets all the applicable legal requirements to merit the grant of a patent. To be patentable, an invention must be (1)Â directed at patent-eligible subject matter, (2)Â useful, (3) new, (4)Â nonobvious, and (5) adequately disclosed and claimed in the patent application. If the PTO finds these requirements met, it will issue (i.e., grant) the patent. Patents typically expire 20 years after the date of the initial patent application. The current law of patent-eligible subject matter will be discussed separately in detail below. The remainder of this section briefly reviews the other requirements for patentability, the scope and effect of patent claims, and the legal rights granted to the holder of a valid patent. In addition to subject matter requirements, Section 101 also contains a requirement that a patented invention must be \"useful.\" In particular, courts have held that an invention must have both a specific and substantial utility to be patentable. The utility requirement derives from the Constitution's command that patent laws exist to \"promote the Progress of . . . useful Arts.\" The constitutional purpose of patent law thus requires a \"benefit derived by the public from an invention with substantial utility,\" where the \"specific benefit exists in currently available form.\" This standard for utility is relatively low, however, requiring only that the claimed invention have some \"significant and presently available benefit to the public\" that \"is not so vague as to be meaningless.\" Perhaps the most fundamental requirement for patentability is that the claimed invention must be new . Specifically, the PTO will not issue a patent if \"the claimed invention was patented, described in a printed publication, or in public use, on sale, or otherwise available to the public before the effective filing date of the claimed invention.\" In other words, if every limitation of the claimed invention is already disclosed in the \"prior art\"âthe information available to the public at the time of the patent applicationâthen the alleged inventor \"has added nothing to the total stock of knowledge,\" and no valid patent may issue to her. Even if a claimed invention is novel in the narrow sense that it is not \"identically disclosed\" in a prior-art reference (such as an earlier patent or publication), the invention must further be nono bvious to be patentable. Specifically, an invention cannot be patented if \"the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious . . . to a person having ordinary skill\" in the relevant technology. When determining obviousness, courts may evaluate considerations such as \"commercial success, long felt but unsolved needs, [or] failure of others . . . to give light to the circumstances surrounding the origin of the subject matter sought to be patented.\" By its nature, obviousness is an \"expansive and flexible\" inquiry that cannot be reduced to narrow, rigid tests. Nonetheless, if an invention merely combines \"familiar elements according to known methods,\" yielding only \"predictable results,\" it is likely to be obvious. Finally, the Patent Act imposes several requirements relating to the technical disclosures in the patent application. These provisions are intended to ensure that the patent adequately describes the invention such that the public can use the invention after the expiration of the patent term. Section 112(a) of the Patent Act requires that patents must contain a \"specification\" that includes a written description of theÂ  invention , and of the manner and Â processÂ  of making and using it, in such full, clear, concise, and exact terms as to enable any person skilled in the art to .Â .Â .Â make and use the same, and shall set forth the best mode contemplated by the Â inventorÂ  orÂ  joint inventor Â of carrying out the Â invention. This statutory language yields three basic disclosure requirements for patentability. First, to satisfy the written description requirement , the specification must \"reasonably convey[] to those skilled in the art that the inventor had possession of the claimed subject matter as of the filing date\" of the patent application. Second, to satisfy the enablement requirement , the specification must contain enough information to teach a person skilled in the art how \"to make and use the invention without undue experimentation.\" Finally, to satisfy the best mode requirement , if the inventor knew of a preferred way of practicing her invention at the time of the patent application, the specification must disclose that \"preferred embodiment[]\" of the invention. If granted, the legal scope of the patent is defined by the patent claims , a sequence of statements that formally defines the legal scope of the patentee's asserted rights. In essence, while the specification explains the invention in a technical sense, the claims set forth the legal effect of the patent. Much as a deed may describe the boundaries of a tract of land, the claims define the \"metes and bounds\" of the patent right. Patent claims must be sufficiently definite to be validâthat is, they must \"particularly point[] out and distinctly claim[] the subject matter which the inventor . . . regards as the invention.\" In other words, when the claims are read in context, they must \"inform, with reasonable certainty, those skilled in the art about the scope of the invention.\" For the most part, the current Patent Act uses a system of peripheral claiming , in which the patent claims formally set out the outer boundaries of the patentee's rights. However, the Patent Act still retains elements of its former system of central claiming , in which the patentee would describe the core principles or examples of what he had invented, but need not formally delineate the outer boundaries of his rights. For example, under the doctrine of equivalents, an accused infringer may be found liable even if his product does not literally meet every element of the patent claims, if the differences between a claim element and its alleged equivalent in the accused product are \"insubstantial.\" A potential danger of a peripheral claiming system is that patentees may seek to claim more than they invented by couching the patent claims in broad, functional languageâthat is, by claiming a result or goal without limitation to any specific structure or device that accomplishes the result. In Halliburton Oil Well Cementing Co. v. Walker , the Supreme Court limited this practice, invalidating as indefinite a \"functional\" patent claim, in which the inventionâan apparatus for determining the location of an obstruction in an oil wellâwas claimed not in terms of specific machinery, but instead as a \"means for\" performing various functions. Functional claims (also known as \"means-plus-function\" claims) such as those in Halliburton may be convenient for the patentee, who can express a claim element in terms of a general end, as opposed to an \"exhaustive list\" of every possible apparatus that could be used to perform that goal. On the other hand, as Halliburton recognized, functional claims may be overbroad and ambiguous, or permit the patentee to claim more than he actually invented. In the Patent Act of 1952, Congress enacted current Section 112(f) as a compromise for functional claims, overruling Halliburton but providing a standard to make functional claims more definite. Under Section 112(f), a patentee may opt to express a claim element as \"a means or step for performing a specified function without the recital of structure, material, or acts in support thereof.\" If the patentee chooses to claim functionally, however, the claim is construed not to cover all possible means of performing the function, but only \"the corresponding structure, material, or acts described in the specification and equivalents thereof.\" Courts have held that a patentee is presumed to invoke Section 112(f) when the term \"means\" is used in the claims. Conversely, there is a presumption that the patentee does not invoke Section 112(f) if she does not use the term \"means,\" but that presumption may be overcome, such that Section 112(f) will apply to any claim that fails to recite a \"sufficiently definite structure\" for performing a function. With some exceptions, a patent is generally granted \"for a term beginning on the date on which the patent issues and ending 20 years from the date on which the application for the patent was filed.\" The Patent Act includes provisions that may modify the 20-year term, including to account for excessive delays in patent examination at the PTO, or delays associated with obtaining marketing approval from other federal agencies. Once granted, the holder of a valid patent has the exclusive right to make, use, sell, or import the invention in the United States until the patent expires. Any other person who practices the invention (i.e., makes, uses, sells, offers to sell, or imports it) without permission from the patent holder infringes the patent and is potentially liable for monetary damages and injunctive relief if sued by the patentee. To obtain relief from infringement, the patentee must generally sue in court. Patent law is an area of exclusive federal jurisdiction, and the traditional forum for most patent disputes is federal district court. Although patent suits may be filed in any district court across the country with jurisdiction over the defendant and proper venue, a single specialized court, the U.S. Court of Appeals for the Federal Circuit (Federal Circuit), hears all appeals in patent cases. Parties accused of patent infringement may defend on several grounds. First, although patents benefit from a presumption of validity, the accused infringer may assert that the patent is invalid . To prove invalidity, the accused infringer must show, by clear and convincing evidence, that the PTO should never have granted the patent because it failed to meet the requirements for patentability. Thus, for example, the accused infringer may argue that the invention lacks novelty, is obvious, or claims nonpatentable subject matter; that the patent fails to enable the invention; or that the patent claims are indefinite. Second, the accused infringer may claim an \"absence of liability\" because of noninfringement . In other words, even presuming the patent is valid, the patentee may fail to prove that the activities of the accused infringer fall within the scope of the patent claimsâthat is, the accused infringer is not making, using, selling, or importing the patented invention. Finally, the accused infringer may argue that the patent is unenforceable based on the inequitable or illegal activities of the patent holder, such as obtaining the patent through fraud on the PTO. Following the passage of the 2011 Leahy-Smith America Invents Act (AIA), the Patent Trial and Appeal Board (PTAB) has become an increasingly important forum for patent disputes. The AIA created several new administrative procedures for challenging patent validity, including (1) post-grant revie w (PGR), which allows any person to challenge patent validity based on any of the requirements of patentability if the PGR petition is filed within nine months of the patent's issuance; (2) inter partes review (IPR), which allows any person other than the patentee to challenge patent validity on limited grounds (novelty or obviousness based on prior patents or printed publications) at any time after nine months following the patent's issuance; and (3) a transitional program for covered business method patents (CBM), a PGR-like process limited to certain patents claiming \"business methods\" that will be available only through September 2020. Of these procedures, IPR is by far the most widely used. At the most general level, there are two basic requirements for an invention to claim patent-eligible subject matter. First, the invention must fit into one or more of the four statutory categories in Section 101âthe claimed invention must be a (1) process, (2) machine, (3)Â manufacture, or (4) composition of matter. Given the (intentionally) expansive nature of these terms, nearly all claimed inventions will satisfy this requirement. Nonetheless, exceptions to this rule do exist. For example, in In re Nuijt en , the Federal Circuit held that a transitory electromagnetic signal was neither a process, manufacture, machine, or composition of matter, and was therefore not patent-eligible subject matter. Because most claimed inventions fit into one of the four statutory categories, the second requirement tends to be more practically important, and receives most of the attention. The second patentable subject matter requirement is that the invention cannot claim one of the judicially created categories of ineligible subject matterâthe claimed invention must not be a (1)Â law of nature; (2) natural phenomenon; or (3) abstract idea. As explained below, the modern Supreme Court has articulated a two-step test for this second requirement, known as the Alice / Mayo framework. The Supreme Court has justified the three ineligible categories as necessary to prevent patent monopolies on the \"'basic tools of scientific and technological work,'\" which \"might tend to impede innovation more than it would tend to promote it.\" Thus, the Court has explained that \"a new mineral discovered in the earth or a new plant found in the wild is not patentable subject matter. Likewise, Einstein could not patent his celebrated law that E=mc 2 ; nor could Newton have patented the law of gravity.\" At the same time, the Court has said that even if a mathematical formula or law of nature is not patentable \"in the abstract,\" a practical application of such a principle or law \"to a new and useful end\" is patent-eligible. Beyond such broad illustrations, it is not easy to precisely define what an \"abstract idea,\" \"law of nature,\" or \"natural phenomenon\" is. Because these exceptions to patent-eligible subject matter are judicially created, they have no formal statutory definition; their meaning has instead been developed through two centuries of \"common law\" case-by-case adjudication in the federal courts. As such, the scope of patentable subject matter has waxed and waned over time, depending on the trends of recent judicial decisions. This section overviews the leading Supreme Court cases addressing patent-eligible subject matter, beginning with formative cases from the 19th century and culminating in the series of recent Supreme Court decisions that have led some to call for legislative reform of Section 101. Table 1 summarizes the facts and holdings of the major cases. The 1853 case of Le Roy v. Tatham , the \"fountainhead\" of American patentable subject matter jurisprudence, concerned a patent on machinery to manufacture metal pipes that exploited a newly developed property of lead. Although the Court ultimately did not decide the case on subject matter grounds, Le Roy relied on influential English patent cases to set forth a basic distinction between abstract \"principles\" and natural laws (which may not be patented) and practical applications of those principles (which may be patented). The Court stated that \"[a] principle, in the abstract, is a fundamental truth; an original cause; a motive; these cannot be patented, as no one can claim in either of them an exclusive right.\" On the other hand, a \"new property discovered in matter, when practically applied, in the construction of a useful article of commerce or manufacture, is patentable,\" for the \"invention is not in discovering [the natural principles], but in applying them to useful objects.\" In its next term, the Court applied this rule in the famous case of O'Reilly v. Morse , concerning Samuel Morse's patent on the telegraph. Although the Court found that Morse was the first inventor of the telegraph and sustained much of his patent, the Court rejected Morse's eighth claim to any \"use of the motive power of the electric or galvanic current . . . however developed for marking or printing intelligible characters, signs, or letters, at any distances, being a new application of that power of which I claim to be the first inventor or discoverer.\" Observing that \"the discovery of a principle in natural philosophy or physical science, is not patentable,\" Chief Justice Taney's majority opinion held that Morse's eighth claim was \"too broad\" because he had not discovered \"that the electric or galvanic current will always print at a distance, no matter what may be the form of the machinery\" used, but only that the specific \"complicated and delicate machinery\" disclosed in the patent specification would do so. In the second half of the nineteenth century, the Court issued a series of important decisions on the patentability of processes. The end result of these cases was a move away from an earlier rule that prohibited \"pure\" method patents as ineligible (i.e., a process claimed independently of the specific machinery used to accomplish the method) either by construing nominal process patents as claiming a machine or limiting the process patents to the machinery disclosed and its equivalents. In Cochrane v. Deener , which involved a patent on an improved manufacturing process for flour, the Court defined a patentable process as \"a mode of treatment of certain materials to produce a given result. It is an act, or a series of acts, performed upon the subject-matter to be transformed and reduced to a different state or thing.\" Cochrane held that such methods are patentable \"irrespective of the particular form of the instrumentalities used.\" Similarly, in Tilghman v. Proctor , the Court held that a method for separating fat into glycerin and fatty acids using water, pressure, and heat was patentable. In The Telephone Cases , the Court distinguished Morse to allow Alexander Graham Bell's patent claim on a \"method of and apparatus for transmitting vocal or other sounds telegraphically, as herein described, by causing electrical undulations, similar in form to the vibrations of the air accompanying the said vocal or other sounds, substantially as set forth.\" Chief Justice White interpreted Morse as holding that \"the use of magnetism as a motive power, without regard to the particular process with which it was connected in the patent, could not be claimed, but that its use in that connection could.\" The Court found that Bell's claim, in contrast to Morse's, did not reach uses of electricity to transmit speech that are \"distinct from the particular process with which it is connected in [Bell's] patent,\" and upheld the claim, so construed. In the first half of the 20th century, the Court decided two major cases on the patentability of natural phenomena. In American Fruit Growers v. Brogdex Co. , the Court rejected patent claims on citrus fruit treated with a solution of borax to render it resistant to mold. The Court held that treated fruit was not a \"manufacture\" under Section 101, but a patent-ineligible \"natural article\"; treatment with borax did not \"change in the name, appearance, or general character of the fruit\" or imbue it with a \"new or distinctive form, quality, or property.\" In Funk Brothers Seed Co. v. Kalo Inoculant Co. , the Court rejected patent claims on an inoculant for leguminous plants consisting of multiple species of bacteria, where the particular bacterial strains were selected so as not to inhibit each other (as prior multispecies combinations had). Because the patentee's combination \"produces no new bacteria [and] no change in the six species of bacteria,\" Justice Douglas's majority opinion held that it was only \"the discovery of some of the handiwork of nature and hence is not patentable.\" From 1972 to 1981, the Supreme Court decided four patentable subject matter cases. In Gottschalk v. Benson , the Court held that an algorithm for converting binary-coded decimal numerals into pure binary numerals (either by hand, or, more practically, on a computer) was patent-ineligible. Justice Douglas reasoned that \"one may not patent an idea\" and that upholding this patent would \"wholly pre-empt the mathematical formula and in practical effect would be a patent on the algorithm itself.\" Second, in Parker v. Flook , the Court rejected a patent on a method for updating alarm limits during catalytic conversion of hydrocarbons (such as petroleum), which relied in part on a mathematical formula, because the only novel feature of the method was the mathematical formula. Third, in Diamond v. Chakrabarty , the Court upheld a patent on a genetically engineered bacterium useful in breaking down oil (e.g., in cleaning up oil spills). Chief Justice Burger distinguished American Fruit Growers and Funk Brothers because this bacterium, although a living organism, was human-made and possessed \"markedly different characteristics from any [bacteria] found in nature.\" Finally, in Diamond v. Diehr , the Court distinguished Flook to uphold a patent on a process for molding synthetic rubber that relied on a mathematical formula (the Arrhenius equation). Justice Rehnquist's majority opinion reached back to Cochrane v. Deener , holding that the process at issue was patentable because it transformed an article (uncured rubber) into a different state or thing. Even though the method used a mathematical formula, the patent in Diehr did not claim the formula itself and would not \"pre-empt the use of that equation\" in other fields. After Diehr , the Court did not decide a major patentable subject matter case for nearly 30 years. Development of the patent-eligible subject matter law was primarily left to the Federal Circuit, whose decisions generally expanded patentable-eligible subject matter, such that by the late 1990s Section 101 became perceived as \"a dead letter.\" In 2010, the Supreme Court reentered the field of patent-eligible subject matter, deciding four cases on the issue within five years. These cases established the two-step Alice / Mayo test for patentable subject matter. The first step of the Alice / Mayo test addresses whether the patent claims are \"directed to\" an ineligible concept: a law of nature, a natural phenomenon, or an abstract idea. The inquiry at step one focuses on the \"claim as whole.\" To be \"directed to\" an eligible concept at step one of Alice / Mayo , the claims must not simply inv olve a patent-ineligible concept. Rather, the \"focus on the claims\" must be a patent-ineligible concept, as opposed to the improvement of a technological process. If the patent claims are not directed to an ineligible concept, then the subject matter is patent-eligible. If the claims are directed to an ineligible category, then the invention is not patentable unless the patent claims have an \"inventive concept\" under the second step of the Alice / Mayo test. Step two of Alice / Mayo considers the elements of each patent claim both individually and as an ordered combination in the search for an \"inventive concept\"âadditional elements that \"transform the nature of the claim\" into a patent-eligible application of an ineligible concept. To have an \"inventive concept,\" the patent claims must contain elements \"sufficient to ensure that the patent in practice amounts to significantly more than a patent upon the [ineligible concept] itself.\" Claim limitations that are \"conventional, routine and well understood,\" such as generic computer implementation, cannot supply an inventive concept. Bilski v. Kappos , the Supreme Court's first modern foray into patentable subject matter doctrine, concerned a patent on a business method for hedging against price-fluctuation risks in energy and commodity markets. The Federal Circuit had held that this method was not patentable as a \"process\" under Section 101 because it failed the \"machine-or-transformation test\"âthat is, it was neither \"tied to a particular machine or apparatus\" nor \"transform[ed] a particular article into a different state or thing.\" All nine members of the Supreme Court agreed with that resultâthat the business method at issue was not patent-eligibleâbut differed significantly as to their reasoning. Writing for five Justices, Justice Kennedy held that the machine-or-transformation test was not the \"sole test\" for determining whether a process is patent-eligible but nonetheless \"a useful and important clue.\" While the majority rejected the \"atextual\" notion that business methods were categorically unpatentable under Section 101, it relied on Benson and Flook to conclude that this particular patent attempted to claim an unpatentable abstract idea: the \"concept of hedging risk.\" Concurring only in the judgment, Justice Stevens wrote for four Justices who would have held, based on the history of the Patent Act and its constitutional purpose, that business methods were categorically patent-ineligible. In Mayo Collaborative Services v. Prometheus Laboratories , the Court addressed the scope of the \"law of nature\" exception. The patent in Mayo claimed a method for measuring metabolites in human blood in order to calibrate the dosage of thiopurine drugs in the treatment of autoimmune disorders. Writing for a unanimous Court, Justice Breyer's opinion held that the patent claims were addressed to a law of nature: \"namely, relationships between concentrations of certain metabolites in the blood and the likelihood that a dosage of a thiopurine drug will prove ineffective or cause harm.\" Because the claims were little \"more than an instruction to doctors to apply the applicable laws when treating their patients,\" the patent lacked any inventive concept and was held to be patent-ineligible. The next case, Association for Molecular Pathology v. Myriad Genetics, Inc. , concerned the applicability of the \"natural phenomena\" exception to the patentability of human DNA. The inventor in Myriad had discovered the precise location and genetic sequence of two human genes associated with an increased risk of breast cancer. Based on this discovery, the patentee claimed two molecules associated with the genes: (1) an isolated DNA segment and (2)Â a complementary DNA (cDNA) segment, in which the nucleotide sequences that do not code for amino acids were removed in the laboratory. Justice Thomas's unanimous opinion in Myriad held that isolated DNA segments were nonpatentable products of nature because the patent claimed naturally occurring genetic information. The Court concluded, however, that cDNA, as a synthetic molecule distinct from naturally occurring DNA, was patentable even though the underlying nucleotide sequence was dictated by nature. Most recently, Alice Corp. v. CLS Bank International examined the scope of the \"abstract idea\" category of nonpatentable subject matter. Alice concerned a patent on a system for mitigating \"settlement risk\"âthe risk that only one party to a financial transaction will pay what it owesâusing a computer as an intermediary. The Court first held, relying on Bilski , that the invention was directed at \"the abstract idea of intermediated settlement.\" Although this idea was implemented on a computer (which is, of course, a physical machine), the patent lacked an inventive concept because the claims merely \"implement[ed] the abstract idea of intermediated settlement on a generic computer.\" Table 1 summarizes the facts and holding of the Supreme Court's major patentable subject matter cases, in reverse chronological order. A substantial group of patent law stakeholders, including inventors, academics, industry representatives, patent attorneys, current and former Federal Circuit judges, and former PTO officials, has criticized the Alice / Mayo framework on various grounds. However, other patent law stakeholders defend the Supreme Court's recent Section 101 decisions. Generally, critics of the Court's recent patentable subject matter jurisprudence raise four principal concerns. First, the Alice / Mayo framework is criticized as excessively vague, subjective, and/or unpredictable in application. For example, the Federal Circuit has indicated that when determining whether a patent claim is \"directed to\" an ineligible concept at step one, the court must determine whether the \"focus\" of the claims is on that concept. At the same time, the Federal Circuit has cautioned that this \"focus\" must be articulated \"with enough specificity to ensure the step one inquiry is meaningful.\" But the appropriate level of specificity can vary from patent to patent and from judge to judge. Thus, in the view of many stakeholders, the Supreme Court's patentable subject matter case law and the Federal Circuit's implementation of the Alice / Mayo framework fail to articulate \"objective, predictable criteria\" for making patent-eligibility determinations. Key terms, such as what an \"abstract idea\" is, or precisely how claim elements can make an invention \"significantly more\" than an ineligible category (the \"inventive concept\"), are largely left undefined, making it difficult for patent applicants and litigants to know whether their patent claims will survive judicial scrutiny. Moreover, the Federal Circuit has explicitly recognized that the two steps of the analysis are not clearly defined and may overlap. As a result, many observers characterize the court's Section 101 jurisprudence as a \"highly subjective,\" \"I know it when I see it\" approach. This subjectivity, in the view of critics, injects unpredictability and uncertainty into whether an invention is of a type that is patentable. Second, the Alice / Mayo framework is criticized as legally flawed on various grounds. Some stakeholders argue that the Alice / Mayo framework misinterprets Section 101, imposing \"extra-statutory\" requirements for patent eligibility, contrary to congressional intent or the constitutional purpose of patent law. Others argue that Mayo 's requirement of an \"inventive concept\" rests on a historically inaccurate understanding of 19th century English patent law, first imported into American jurisprudence in cases such as Le Roy and Morse . Finally, many commentators and stakeholders argue that the Alice / Mayo framework confuses patent law by conflating eligibility under Section 101 with policy concernsâsuch as the obviousness of the invention and claim breadthâthat are better addressed by other provisions in the Patent Act, such as Sections 102, 103, and 112. For example, patent claims have been found to lack an inventive concept at Alice / Mayo step two where they implement an abstract idea on conventional computer hardware. Issues about what was \"conventional\" or \"well-understood\" at the time of the invention, however, are questions usually reserved for novelty or nonobviousness analysis. Third, the Alice / Mayo framework is alleged to have detrimental effects on incentives to innovate, especially in the biotechnology and computer software industries. Given the patent claims at issue in Alice (a computer-implemented business method), Myriad (an isolated human DNA segment), and Mayo (a drug dose optimization method), most observers agree that these two industries have been the most affected by the Supreme Court's recent Section 101 rulings. In the biotechnology industry, stakeholders argue that the Alice / Mayo framework has limited their ability to obtain patents on diagnostic methods and kits, personalized medicine, and isolated natural substances. Views in the computer industry are \"sharply divided,\" but at least some stakeholders argue that Alice has devalued their patents and/or created uncertainty for their business. In both fields, some stakeholders argue that the law of Section 101 is reducing incentives to innovate in these areas and driving investment elsewhere. Finally, the uncertainty and unpredictability caused by Alice/Mayo is alleged to put the United States at a disadvantage relative to international competitors. Some stakeholders argue that U.S. competitiveness may be harmed because a lack of patent availability will drive investment in certain industries to other countries where such inventions are more clearly patent-eligible. Others argue that one effect of Alice / Mayo is a loss of any patent protection for certain inventions, which will enable competitors to \"free ride\" off of American innovation. Defenders of the current law of Section 101 respond that these criticisms of Alice / Mayo are overstated, and/or that the Supreme Court's reinvigoration of Section 101 has important benefits for the patent system. As to the subjective or unpredictable nature of Section 101 doctrine, there is some indication that the Alice / Mayo framework is not quite as unpredictable as is sometimes claimed. Some commentators also observe uncertainty in patentable subject matter law is hardly a new phenomenon, and may even be \"inevitable.\" A subjective or \"amorphous\" approach to patentable subject matter, on this view, may have certain benefits, including flexibility and adaptability to new technologies. Moreover, even if one views the current state of the law as unacceptably vague, courts may eventually clarify or change Section 101 doctrine in line with the long history of common law development in this area. As to legal correctness of Alice / Mayo , defenders of the framework note that while the judicially created categories are not directly grounded in the text of Section 101, they have been treated as part of the law \"as a matter of statutory stare decisis going back 150 years.\" As to Mayo 's reliance on 19th century English patent law, some commentators defend the Supreme Court's \"inventive application\" requirement as a faithful reading of this precedent. Finally, although the Alice / Mayo framework may overlap with other patent law doctrines, several commentators and judges of the Federal Circuit argue that Section 101 serves purposes that are distinct from Sections 102, 103, and 112. For example, even if the invention in Myriad âan isolated human DNA sequence discovered to be associated with increased breast cancer riskâwas novel, nonobvious, and sufficiently disclosed, some commentators would still argue that the invention should not be patented based on detrimental effects for future innovation or moral concerns about patenting human DNA. As to the alleged detrimental effects of the Court's recent Section 101 law on innovation, some stakeholders point to countervailing benefits in either certain industries or more generally. In particular, some stakeholders in industries (such as computer software) affected by litigation by patent assertion entities argue that Section 101 is a useful and important tool for weeding out overly broad or vague patents at the outset of litigation. Other commentators point to general utilitarian or moral benefits of robust exclusions for patents on basic discoveries in science and nature. As to concerns about the Alice / Mayo framework's effect on international competitiveness, some commentators view these changes as good for the United States as a geopolitical matter. In particular, restricted patent-eligibility standards may benefit U.S. consumers if a lack of patent protection leads to increased competition and lower prices for certain products without harming innovation. More broadly, there is a long-running and thoughtful debate over the functions and purposes that Section 101 serves in the patent system. For its part, the modern Supreme Court has largely settled on the \"preemption rationale\" for the judicially created subject matter exclusions. Recent decisions assert that abstract ideas, laws of nature, and natural phenomena should not be patentable because permitting a monopoly on the \"'basic tools of scientific and technological work' .Â . . might tend to impede innovation more than it would tend to promote it,\" in that such patents would \"significantly impede future innovation.\" The gist of the preemption rationale is that Section 101 functions to prevent patents that reach so broadly that they \"threaten downstream innovation\" by preempting all uses of a natural law, abstract idea, or fundamental research tools. The preemption rationale is not the only potential justification for Section 101, however. Although a complete survey of the various rationales proffered for Section 101 is beyond the scope of this report, at least four broad categories of rationales for Section 101 have been proposed. First, some commentators argue that Section 101's purpose is to identify certain patents or categories of patents that should not be granted because their economic harms exceed their benefitsâthat is, their net social costs are negative with respect to innovation, or more generally. Preemption theory, which claims that certain overbroad patents should be denied patent protection under Section 101 because of their negative effects on downstream innovation, is an example from this group. Secondâin what is in some sense a special case of the first rationaleâother commentators assert that Section 101's purpose is to identify and deny patents to categories of inventions that would have been developed even without a patent incentive. For example, several commentators have argued the patents on business methods should be excluded under Section 101 either because they affirmatively harm innovation and the economy, or because they are simply unnecessary because sufficient incentives to create business methods would exist even if patents are unavailable. Third, some commentators assert that Section 101 (or elements of Section 101 doctrine) are based not on economic considerations but on moral or ethical concerns. For example, the judicial prohibition on patenting products of natureâsuch as human DNA sequencesâmay be motivated by noneconomic, deontological notions of human dignity, or the inviolability of natural creation. Finally, some commentators believe that Section 101 serves no independent purpose in patent law not already better served by other patentability requirements. On this view, Section 101's judicially created exceptions to patentable subject matter should simply be eliminated as an independent requirement for patentability, in favor of a rigorous application of the other patentability requirements in Sections 102, 103, and 112 of the Patent Act. Before examining the particular approaches introduced by the PTO and in the 116th Congress, this section will review some of the general ways in which Section 101 may or may not be reformed. These different paths are introduced to contextualize the current Section 101 reform proposals within the universe of possible reforms. This list is not exhaustive, nor are each of these options necessarily mutually exclusive. At a general level, most of the proposed paths forward for Section 101 fall into one of four categories. First, some oppose any legislative intervention, proposing instead to allow the courts to continue to develop and refine the standards for patent eligibility. Second, some propose replacing the Alice / Mayo framework with an explicit list of subject matter that is patent-eligible or -ineligible, perhaps along the lines of an approach that is used for European patents. Third, some propose replacing the Alice / Mayo framework with a different, usually lower, standard for patent eligibility, such as a requirement that the invention result from human effort, exist outside the human mind, or contribute to the technological arts. Fourth, some propose to do away with any limitations on patentable subject matter, beyond the four statutory categories and other existing statutory patentability requirements. One option is for Congress to leave Section 101 as it is, and allow the courts (and/or the PTO) to continue developing the law of patent-eligible subject matter. Stakeholders and commentators may support this option for several different reasons. Some may disagree that the Alice / Mayo framework is as indeterminate or as harmful to innovation as the critics claim. Other commentators, even if they accept the criticisms directed at Alice / Mayo , may nonetheless believe that the courts will eventually refine, clarify, or otherwise improve the law of patentable subject matter given more time for judicial development. Still other commentators support the current law of Section 101 as affirmatively good for innovation and society because it precludes property rights in fundamental aspects of science, nature, and ideas, or serves as an important mechanism to weed out overly broad patents or obtain early dismissal of unmeritorious patent litigation. Supporters of continued judicial development may point to the recent administrative guidance put forth by the PTO and significant Section 101 decisions of the Federal Circuit over the past five years as promising steps in the administrative and common law development of Section 101 after the Alice , Mayo , and Myriad decisions. Opponents of maintaining the legal status quo, for their part, observe that the Supreme Court has not shown much interest in revisiting its Section 101 jurisprudence despite many opportunities, and that several current and former Federal Circuit judges have called for legislative amendment of Section 101. Another potential route for reform would be to amend Section 101 to replace the Alice / Mayo framework with a more specific list of subject matter that is patent-eligible and/or patent-ineligible. Currently, Section 101 contains a broad list of included subject matter categories (processes, machines, manufactures, and compositions of matter), but most of the doctrine focuses on the three judicially created ineligible categories: laws of nature, natural phenomena, and abstract ideas. The \"laundry list\" approach would seek to make Section 101 clearer and more predictable by specifically defining categories of eligible and/or ineligible subject matter. Depending on how this sort of proposal is structured, it would retain the notion of ineligible classes of subject matter, but define such categories differently, more precisely, and perhaps more narrowly than the common law exceptions under the Alice / Mayo framework. The European Patent Convention's (EPC's) approach to patent eligibility offers a potential model for this type of approach. Under EPC article 52(1), patent-eligible subject matter reaches \"all fields of technology, provided that they are new, involve an inventive step and are susceptible of industrial application.\" However, EPC article 52(2) defines specific subject matter that is not patentable when claimed \"as such\": (a) discoveries, scientific theories and mathematical methods; (b) aesthetic creations; (c) schemes, rules and methods for performing mental acts, playing games or doing business, and programs for computers; (d) presentations of information. EPC article 53 further denies patents on inventions that are \"contrary to [public order] or morality,\" or that claim \"plant and animal varieties,\" or \"methods for treatment of the human or animal body by surgery or therapy and diagnostic methods practised on the human or animal body.\" Assuming that the new statutory categories are more clearly delineated than existing judicial categories like the \"abstract idea\" exception, a potential virtue of the laundry-list approach is greater clarity and predictability in the sort of inventions that are patentable. This approach would also more firmly ground subject matter determinations in explicit statutory language. On the other hand, the list-of-specific-exclusions approach would potentially be less flexible and less able to adapt to unforeseen new technologies than other reform options. It might also, to some degree, replace case-by-case judicial judgments of eligibility with more categorical legislative ones, which may be a virtue or a vice depending upon one's perspective. A third group of proposed Section 101 reforms seeks to replace the Alice / Mayo framework with a new statutory standard for assessing patent eligibility. Proposals in this category are fairly diverse, but common elements in proposed new standards would limit patent eligibility to inventions that result from human effort; contribute to the technological arts; have practical utility or application; cannot be solely performed in the human mind; do not preempt all practical uses of a law of nature, abstract idea, or natural phenomenon. Usually, the proposed new patentability standard would supersede the three judicially created subject matter exclusions and the two-step Alice / Mayo test. Several proposed new standards blend more than one of these elements. For example, the American Intellectual Property Law Association has submitted a Section 101 reform proposal that replaces the Alice/Mayo framework with a single exception to patent eligibility if an invention \"exists in nature independently of and prior to any human activity\" or \"is performed solely in the human mind.\" A 2017 proposal by the American Bar Association would explicitly allow patenting \"practical applications\" of laws of nature, natural phenomena, and abstract ideas, so long as the patent claim does not \"preempt the use by others of all practical applications of the law of nature, natural phenomenon, or abstract idea.\" It is difficult to generalize given the significant differences among the various proposals in this category, but commentators may debate whether proposed new standards would provide greater clarity and predictability in patent-eligibility law, while still being flexible enough to adapt to new technologies. A final option is to eliminate the Alice / Mayo framework and judicially created exceptions to patent eligibility altogether, without replacing them with a new standard. Several commentators have argued that patent-eligibility doctrine serves no purpose that is not already served by the existing statutory patentability requirements of utility, novelty, obviousness, written description, definiteness, and enablement. On this view, the appropriate course would be for Congress to simply eliminate the nonstatutory eligibility requirements (i.e., the judicial prohibitions on patenting laws of nature, natural phenomena, and abstract ideas) in favor of \"rigorous\" application of the patentability requirements of Sections 102, 103, and 112 of the Patent Act. Supporters of this approach argue that it advances the underlying policy concerns motivating Section 101 law, but does so in a \"more consistent and more rigorous\" manner. Opponents argue that Section 101 serves important purposes that are distinct from the other patentability requirements, which would be lost if the judicial exceptions were entirely eliminated. The Supreme Court's recent patentable subject matter jurisprudence has inspired a number of proposed Section 101 reforms from academics, practitioners, and other stakeholders. The specifics of many of these proposals have been reviewed elsewhere. This section examines two major developments in this area in 2019. First, it reviews the PTO's Revised Subject Matter Eligibility Guidance, which seeks to offer clearer guidelines to PTO patent examiners in making Section 101 determinations. Second, this section examines a series of draft legislative proposals put forth by a bipartisan and bicameral group of legislators, which have been the subject of a series of roundtables and congressional hearings on patentable subject matter reform. On January 7, 2019, the PTO issued Revised Patent Subject Matter Eligibility Guidance (the PTO's Revised Guidance) to assist PTO patent examiners in determining subject matter eligibility for patent applications. The PTO noted that the \"legal uncertainty\" surrounding the Alice / Mayo framework \"poses unique challenges\" for the agency, which has thousands of patent examiners who must make patent-eligibility determinations on hundreds of thousands of applications each year. Accordingly, the PTO issued revised guidance to its patent examiners to provide \"more clarity and predictability\" in their Section 101 determinations. The PTO's Revised Guidance made two major changes to how patent examiners evaluate whether a patent application claims patent-ineligible subject matter. First, the guidance attempts to provide a clearer definition of what constitutes an ineligible \"abstract idea.\" Previously, examiners would make that determination by comparing the patent claim at issue to those found to be ineligible \"abstract ideas\" in previous judicial cases. The PTO found that this approach had become \"impractical\" because of an expanding volume of sometimes contradictory Section 101 case law. The PTO's Revised Guidance \"synthesizes\" the case law into three categories that examiners will treat as \"abstract ideas\": (a) Mathematical conceptsâmathematical relationships, mathematical formulas or equations, mathematical calculations; (b) Certain methods of organizing human activityâfundamental economic principles or practices (including hedging, insurance, mitigating risk); commercial or legal interactions (including agreements in the form of contracts; legal obligations; advertising, marketing or sales activities or behaviors; business relations); managing personal behavior or relationships or interactions between people (including social activities, teaching, and following rules or instructions); and (c) Mental processesâconcepts performed in the human mind (including an observation, evaluation, judgment, opinion). Under the Revised Guidance, patent claims that do not recite matter that falls into one of these three groupings should not be treated as an \"abstract idea\" except in \"rare circumstance[s].\" Second, the PTO's Revised Guidance clarifies when examiners will treat a patent claim as \"directed to\" an ineligible category (abstract ideas, laws of nature, or natural phenomena) under step one of the Alice / Mayo test. In particular, the PTO will not treat a claim as \"directed to\" an ineligible concept if \"the claim as a whole integrates the recited judicial exception into a practical application of the exception .\" If the claim does integrate such a practical applicationâsuch as improving the functioning of a computer, effecting a particular treatment for a disease, or implementing the exception into a particular machine or manufactureâthen the PTO will treat the claim as patent-eligible, without having to examine the patent application for an \"inventive concept\" under step two of the Alice / Mayo framework. PTO's Revised Guidance was generally perceived as lowering Section 101 barriers to patentability, especially with respect to computer-related inventions. Some commentators praised the Revised Guidance for providing greater clarity to patent examiners, while other stakeholders criticized the guidance as inconsistent with the Supreme Court's Section 101 decisions. Although the PTO's Revised Guidance changes how PTO examiners review new patent applications, it is important to note that the guidance, unlike judicial decisions or statutory reforms, lacks formal legal forceâthat is, the guidance is not binding on the courts when patents are challenged in litigation. The PTO lacks general substantive rulemaking authority, and Revised Guidance itself states that it is only a \"tool for internal [PTO] management\" that lacks \"the force and effect of law.\" Although the Federal Circuit has issued somewhat contradictory signals on this point, the Guidance would receive, at the most, \"some deference\" if a court found its reasoning to be persuasive. On April 17, 2019, Senators Tillis and Coons, along with Representatives Collins, Johnson, and Stivers, released a \"bipartisan, bicameral framework\" for legislative Section 101 reform (the First Tillis-Coons Proposal). The framework's release followed multiple roundtables with patent law stakeholders on Section 101 and the impact of the Alice/Mayo framework on, for example, innovation in artificial intelligence, medical diagnostics, and personalized medicine. The First Tillis-Coons Proposal would have retained the four statutory categories of patentable inventions, but removed the requirement that the invention or discovery be \"new and useful\" from Section 101. Patent eligibility would have instead been determined \"by considering each and every element of the claim as a whole and without regard for considerations properly addressed by [Sections] 102, 103 and 112 [of the Patent Act].\" In place of the judicially created exceptions to patent eligibility, which the First Tillis-Coons Proposal would have abrogated by statute, the proposal would have defined, \"in a closed list,\" five \"exclusive\" categories of patent-ineligible subject matter: (1) fundamental scientific principles; (2) products that exist solely and exclusively in nature; (3) pure mathematical formulas; (4) economic or commercial principles; and (5) mental activities. Effectively, this would have codified the judicial exceptions in a narrower form, with the first two ineligible categories roughly corresponding to the \"law of nature\" and \"natural product\" judicial exceptions, and the final three to the types of \"abstract ideas\" identified by the PTO in its 2019 Guidance. The Proposal would have narrowed the construction of these ineligible categories by creating a \"practical application\" test, presumably along the lines of the ABA proposal to expressly permit patenting of a practical application of ineligible subject matter. However, \"simply reciting generic technical language or generic functional language\" would have been insufficient to \"salvage an otherwise ineligible claim.\" The First Tillis-Coons Proposal thus blended elements of the PTO's 2019 Revised Guidance with a \"laundry list\" approach of specific ineligible categories, plus new statutory standards for how to apply the list of exceptions to patentable subject matter. The overall effect would be to lower Section 101 barriers to patentability, while still retaining more narrowly defined classes of ineligible subject matter. Reactions to the First Tillis-Coons Proposal were mixed. Some argued that the draft proposal was a promising start for much-needed congressional intervention. On the pro- Alice side of the debate, the Electronic Frontier Foundation, for example, criticized the First Tillis-Coons Proposal as a \"disaster\" for innovation because it would eliminate a powerful tool to combat bad patents and patent troll litigation. On the other side of the debate, critics of the Alice/ Mayo framework argued that the First Tillis-Coons Proposal did not go far enough, and urged elimination of any ineligible categories of patentable subject matter. On May 22, 2019, following feedback on their first draft framework, the same group of Members released a \"draft bill\" to reform Section 101 (the Second Tillis-Coons Proposal). The Second Tillis-Coons Proposal was released in advance of a series of three hearings held in June before the Senate Judiciary Committee's Subcommittee on Intellectual Property, which were designed to solicit feedback on the draft legislative language. In the subsequent hearings, 45 witnesses testified over three days, with representatives from industry, academia, bar associations, and trade groups; former Federal Circuit Judges and PTO officers; and other patent law stakeholders expressing various views on Section 101 reform. As compared to the first proposal, the Second Tillis-Coons Proposal, generally speaking, would make more sweeping changes to Section 101 to expand patent eligibility. Like the First Tillis-Coons Proposal, the draft bill has several provisions that would attempt to separate the Section 101 inquiry from other patentability requirements. Specifically, the draft bill would strike the word \"new\" from Section 101 and establish that patent subject matter eligibility must be determined \"considering the claimed invention as a whole\" and without regard to \"considerations relating to section 102, 103, or 112 of [the Patent Act].\" The Second Tillis-Coons Proposal would further provide that eligibility determinations shall not depend on the \"manner in which the claimed invention was made; whether individual limitations of a claim are well known, conventional or routine; the state of the art at the time of the invention.\" The draft bill also explicitly provides that Section 101 \"shall be construed in favor of eligibility.\" Instead of codifying and narrowing the judicial exceptions to patentability, the Second Tillis-Coons Proposal would eliminate them altogether. The draft bill provides that No implicit or other judicially created exceptions to subject matter eligibility, including \"abstract ideas,\" \"laws of nature,\" or \"natural phenomena,\" shall be used to determine patent eligibility under section 101, and all cases establishing or interpreting those exceptions to eligibility are hereby abrogated. This language would appear to overturn by statute not only the Alice / Mayo framework, but over two centuries of judicial decisions interpreting the \"common law\" exceptions to Section 101. The Second Tillis-Coons Proposal would replace the judicial exceptions with a new statutory definition of utility that incorporates elements of various prior proposals for a new Section 101 standard. To be patent-eligible subject matter under the Second Tillis-Coons Proposal, the invention would need to fit into one of the four statutory categories of eligible subject matter (which remain unchanged) and be \"useful.\" To be \"useful,\" an invention or discovery would need to provide \"specific and practical utility in any field of technology through human intervention.\" Finally, to combat overbroad patent claims, the Second Tillis-Coons Proposal would alter the functional claiming rules under Section 112(f), which permits patentees to claim their invention in functional terms as opposed to reciting specific physical structures. In particular, the draft bill provides that if any patent claim element is \"expressed as a specified function without the recital of structure, material, or acts in support thereof,\" then that claim element will be limited to the \"corresponding structure, material, or acts described in the specification\" and their equivalents. Consistent with a recent decision of the Federal Circuit, this language would clarify that Section 112(f) applies to any claim element that fails to sufficiently recite a structure for performing a function. This change would arguably make it more difficult for a patentee to avoid the limiting effects of Section 112(f), even if the words \"means for\" are not used in the claim language. As with the first proposal, reactions to the Second Tillis-Coons Proposal from patent law stakeholders were mixed. Critics of the Alice/Mayo framework generally applauded the draft bill as bringing much needed clarity and certainty to the law of patent eligibility, particularly with respect to biotechnology innovation. Opponents of the draft bill expressed concern that changes to the Alice / Mayo framework would eliminate an important tool against unmeritorious patent litigation. Critics also questioned the necessity and advisability of such a sweeping change to Section 101 law. Both supporters and opponents raised concerns about potential ambiguities in the proposed definition of \"useful,\" particularly the terms \"human intervention,\" \"practical utility,\" and \"field of technology.\" Stakeholders also debated the specific practical effects of the legislative changes at the hearings, such as the effect of elimination of the judicial exceptions on basic scientific research. One notable concern, raised by the American Civil Liberties Union in opposition to the draft bill, was that the Second Tillis-Coons Proposal, by abrogating the Myriad decision, would permit the patenting of human genes. Several witnesses denied that the draft bill would lead to that result because of the bill's \"human intervention\" requirement or other patent law principles. For their part, Senators Tillis and Coons made clear that they have \"no intention\" of overruling the holding of Myriad that no one may patent \"genes as they exist in the human body.\" Following the hearings, Senators Tillis and Coons indicated that what they heard reinforced their view that \"patent eligibility is broken and desperately needs to be repaired,\" and that there is a \"necessity for Congress to intervene\" to bring greater clarity to Section 101. Moving forward, they indicated they were \"considering a provision that would exempt research and experimentation from infringement liability\" in response to concerns about inhibiting scientific research. The Senators also indicated that they would continue to welcome input from all stakeholders and would seek to \"clarify\" the proposal regarding the eligibility of gene patents, and potentially \"sharpen the 'field of technology' requirement to ensure that critical advances like artificial intelligence and medical diagnostics qualify [as patent-eligible].\" At the same time, the Senators expressed their view that certain concepts should remain patent-ineligible under a revised Section 101, such as \"economic transactions or social interactions.\" Observers expect a revised formal bill reflecting these provisions this fall.", "summary": "The statutory definition of patent-eligible subject matter under Section 101 of the Patent Act has remained essentially unchanged for over two centuries. As a result, the scope of patentable subject matterâthat is, the types of inventions that may be patentedâhas largely been left to the federal courts to develop through \"common law\"-like adjudication. In the 20th century, the U.S. Supreme Court established that three main types of discoveries are categorically patent-ineligible: laws of nature, natural phenomena, and abstract ideas. Recent Supreme Court decisions have broadened the scope of these three judicial exceptions to patent-eligible subject matter. Over a five-year period, the Supreme Court rejected, as ineligible, patents on a business method for hedging price-fluctuation risk; a method for calibrating the dosage of a particular drug; isolated human DNA segments; and a method of mitigating settlement risk in financial transactions using a computer. These cases established a new two-step test, known as the Alice / Mayo framework, for determining whether a patent claims ineligible subject matter. The first step of the Alice / Mayo test addresses whether the patent claims are \"directed to\" a law of nature, natural phenomenon, or abstract idea. If not, the invention is patentable. If the claims are directed to one of the ineligible categories, then the second step of the analysis asks whether the patent claims have an \"inventive concept.\" To have an inventive concept, the patent claim must contain elements that transform the nature of the claim into a patent-eligible application of the ineligible concept, so that the claim amounts, in practice, to something \"significantly more\" than a patent on the ineligible concept itself. If the invention fails the second step of Alice / Mayo , then it is patent-ineligible. The Supreme Court's decisions have been widely recognized to effect a significant change in the scope of patentable subject matter, restricting the sorts of inventions that are patentable in the United States. The Alice / Mayo test has been the subject of criticism, with some stakeholders arguing that the Alice / Mayo framework is vague and unpredictable, unduly restricts the scope of patentable subject matter, reduces incentives to invest and innovate, and harms American industry's competitiveness. In particular, the Alice / Mayo test has created uncertainty in the computer technology and biotechnology industries as to whether innovations in medical diagnostics, personalized medicine, methods of treatment, computer software, and artificial intelligence are patent-eligible. As a result, some patent law stakeholders, including academics, bar associations, industry representatives, judges, and former Patent and Trademark Office (PTO) officials, have called for the Supreme Court or Congress to act to change the law of patentable subject matter. However, other stakeholders defend the legal status quo, arguing that the Alice / Mayo framework provides an important tool for combating unmeritorious patent litigation, or that the revitalized limits on patentable subject matter have important benefits for innovation. Recently, there have been several substantial administrative and legislative efforts to clarify or reform patent-eligible subject matter law. In January 2019, the PTO issued revised guidance to its patent examiners with the aim of clarifying and improving predictability in how PTO patent examiners make Section 101 determinations. In April and May of 2019, a bipartisan and bicameral group of Members released draft legislative proposals that would abrogate the Alice / Mayo framework and transform the law of Section 101 and related provisions of the Patent Act. Following a series of hearings in June 2019, many expect a bill to reform Section 101 to be introduced this fall. These proposed changes could have significant effects as to the types of technologies that are patentable. The availability of patent rights, in turn, affects incentives to invest and innovate in particular fields, as well as consumer costs and public access to technological innovation. Understanding the legal background and context can aid Congress as it debates the legal and practical effects that legislative Section 101 reforms would have if enacted.", "document_type": "crs"}
{"report": "This report reviews the process and procedures that currently apply to congressional consideration of foreign arms sales proposed by the President. This includes consideration of proposals to sell major defense equipment, defense articles and services, or the retransfer to other states of such military items. In general, the executive branch, after complying with the terms of applicable U.S. law, principally contained in the Arms Export Control Act (AECA) (P.L. 90-629, 82 Stat. 1320), is free to proceed with an arms sales proposal unless Congress passes legislation prohibiting or modifying the proposed sale. The President has the obligation under the law to submit the arms sale proposal to Congress, but only after he has determined that he is prepared to proceed with any such notifiable arms sales transaction. The Department of State (on behalf of the President) submits a preliminary or informal notification of a prospective major arms sale 20 calendar days before the executive branch takes further formal action. This informal notification is provided to the committees of primary jurisdiction for arms sales issues. In the Senate, this is the Senate Foreign Relations Committee; in the House, it is the Foreign Affairs Committee. It has been the practice for such informal notifications to be made for arms sales cases that would have to be formally notified to Congress under the provisions of Section 36(b) of the AECA. The informal notification practice stemmed from a February 18, 1976, letter from the Department of Defense making a nonstatutory commitment to give Congress these preliminary classified notifications. Beginning in 2012, the State Department implemented a new informal notification process, which the department calls a \"tiered review,\" in which the relevant committees are notified between 20 and 40 calendar days before receiving formal notification, depending on the system and destination in question. During June 2017 testimony, Acting Assistant Secretary of State Tina Kaidanow described this process as Congressional review period during which the Committees can ask questions or raise concerns prior to the Department of State initiating formal notification. The purpose is to provide Congress the opportunity to raise concerns, and have these concerns addressed, in a confidential process with the Administration, so that our bilateral relationship with the country in question is protected during this process. If a committee \"raises significant concerns about a sale or [export] license,\" the State Department \"will typically extend the review period until we can resolve those concerns,\" Kaidanow explained. Under Section 36(b) of the AECA, Congress must be formally notified 30 calendar days before the Administration can take the final steps to conclude a government-to-government foreign military sale of major defense equipment valued at $14 million or more, defense articles or services valued at $50 million or more, or design and construction services valued at $200 million or more. In the case of such sales to NATO member states, NATO, Japan, Australia, South Korea, Israel, or New Zealand, Congress must be formally notified 15 calendar days before the Administration can proceed with the sale. However, the prior notice threshold values are higher for NATO members, Japan, Australia, South Korea, Israel, or New Zealand. These higher thresholds are $25 million for the sale, enhancement, or upgrading of major defense equipment; $100 million for the sale, enhancement, or upgrading of defense articles and defense services; and $300 million for the sale, enhancement, or upgrading of design and construction services, so long as such sales to these countries do not include or involve sales to a country outside of this group of states. Section 36(i) requires the President to notify both the Senate Foreign Relations Committee and House Foreign Affairs Committee at least 30 days in advance of a pending shipment of defense articles subject to the 36(b) requirements if the chairman and ranking member of either committee request such notification. Certain articles or services listed on the Missile Technology Control Regime are subject to a variety of additional reporting requirements. Commercially licensed arms sales also must be formally notified to Congress 30 calendar days before the export license is issued if they involve the sale of major defense equipment valued at $14 million or more, or defense articles or services valued at $50 million or more (Section 36(c) AECA). In the case of such sales to NATO member states, NATO, Japan, Australia, South Korea, Israel, or New Zealand, Congress must be formally notified 15 calendar days before the Administration can proceed with such a sale. However, the prior notice threshold values are higher for sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand, specifically: $25 million for the sale, enhancement, or upgrading of major defense equipment; $100 million for the sale, enhancement, or upgrading of defense articles and defense services; and $300 million for the sale, enhancement, or upgrading of design and construction services, so long as such sales to these countries do not include or involve sales to a country outside of this group of states. Furthermore, commercially licensed arms sales of firearms (which are on category I of the United States Munitions List) valued at $1 million or more must also be formally notified to Congress for review 30 days prior to the license for export being approved (15 days prior notice is required for proposed licenses for sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand). Section 36(b)(5)(A) contains a reporting requirement for defense articles or equipment items whose technology or capability has, prior to delivery, been \"enhanced or upgraded from the level of sensitivity or capability described\" in the original congressional notification. For such exports, the President must submit a report to the relevant committees at least 45 days before the exports' delivery that describes the enhancement or upgrade and provides \"a detailed justification for such enhancement or upgrade.\" This requirement applies for 10 years after the Administration has notified Congress of the export. According to Section 36(b)(5)(C), the Administration must, in the case of upgrades or enhancements meeting certain value thresholds, submit a new notification to Congress and the export will be considered \"as if it were a separate letter of offer ... subject to all of the requirements, restrictions, and conditions set forth in this subsection.\" The threshold values are higher for sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand. A congressional recess or adjournment does not stop the 30 calendar-day statutory review period. It should be emphasized that after Congress receives a statutory notification required under Sections 36(b) or 36(c) of the AECA, for example, and 30 calendar days elapse without Congress having blocked the sale, the executive branch is free to proceed with the sales process. This fact does not mean necessarily that the executive branch and the prospective arms purchaser will sign a sales contract and that the items will be transferred on the 31 st day after the statutory notification of the proposal has been made. It would, however, be legal to do so at that time. Although Congress has more than one legislative option it can use to block or modify an arms sale, one option explicitly set out in law for blocking a proposed arms sale is the use of a joint resolution of disapproval as provided for in Section 36(b) of the AECA. Under that law, the formal notification is legally required to be submitted to the chairman of the Senate Foreign Relations Committee and the Speaker of the House. The Speaker has routinely referred these notifications to the House Foreign Affairs Committee as the committee of jurisdiction. As a courtesy, the Defense Department has submitted a copy of the statutory notification to the House Foreign Affairs Committee when that notification is submitted to the Speaker of the House. Under this option, after receiving a statutory Section 36(b) notification from the executive branch, opponents of the arms sale would introduce joint resolutions in the House and Senate drafted so as to forbid by law the sale of the items specified in the formal sale notification(s) submitted to Congress. If no Member introduces such a measure, the AECA's provisions expediting congressional action, discussed below, do not take effect. The next step would be committee hearings in both houses on the arms sale proposal. If a majority of either the House or the Senate committee supported the joint resolution of disapproval, they would report it to their respective chamber in accordance with its rules. Following this, efforts would be made to seek floor consideration of the resolution. At this point, it is important to take note of procedures crafted to expedite the consideration of arms sales resolutions of disapproval. Since 1976, Section 36(b)(2) of the AECA has stipulated that consideration of any resolution of disapproval in the Senate under Section 36(b)(1) of the AECA shall be \"in accordance with the provisions of Section 601(b) of the International Security Assistance and Arms Export Control Act of 1976\" ( P.L. 94-329 , 90 Stat. 729). Since 1980, this stipulation has also applied to resolutions of disapproval in the Senate relating to commercially licensed arms sales under Section 36(c)(1) of the AECA. The purpose of Section 601(b) was to establish rules to facilitate timely consideration of any resolution of disapproval in the Senate. The rules set forth in Section 601(b) supersede the standing rules of the Senate and include the following: Give the committee with jurisdiction [the Senate Foreign Relations Committee] 10 calendar days from the date a resolution of disapproval is referred to it to report back to the Senate its recommendation on any such resolution (certain adjournment periods are excluded from computation of the 10 days); Make it in order for a Senator favoring a disapproval resolution to move to discharge the committee from further consideration of the matter if the committee fails to report back to the Senate by the end of the 10 calendar days it is entitled to review the resolution (the AECA expressly permits a discharge motion after 5 calendar days for sales to NATO, NATO countries, Japan, Australia, South Korea, Israel, and New Zealand); Make the discharge motion privileged, limit floor debate on the motion to one hour, and preclude efforts to amend or to reconsider the vote on such a motion; Make the motion to proceed to consider a resolution of disapproval privileged and preclude efforts to amend or to reconsider the vote on such motion; Limit the overall time for debate on the resolution of disapproval to 10 hours and preclude efforts to amend or recommit the resolution of disapproval; Limit the time (one hour) to be used in connection with any debatable motion or appeal; provide that a motion to further limit debate on a resolution of disapproval, debatable motion, or appeal is not debatable. The Senate is constitutionally empowered to amend its rules or to effect a rule change at any time. The fact that an existing rule is in Section 601 of the International Security Assistance and Arms Export Control Act of 1976 is not an obstacle to changing it by Senate action alone should the Senate seek to do so. The House of Representatives is directed by Sections 36(b)(3) and 36(c)(3)(B) of the AECA to consider a motion to proceed to the consideration of a joint resolution disapproving an arms sale reported to it by the appropriate House committee as \"highly privileged.\" Generally, this means that the resolution will be given precedence over most other legislative business of the House, and may be called up on the floor without a special rule reported by the Rules Committee. Unlike for the Senate, however, the AECA contains no provision for discharge of the House committee if it does not report on the joint resolution. If reported and called up, the measure will be considered in the Committee of the Whole, meaning that amendments can be offered under the \"five-minute rule.\" Nevertheless, amendments to joint resolutions disapproving arms sales have apparently never been offered in the House. The Rules Committee usually sets the framework for floor consideration of major legislation in the House of Representatives, however, and could do so for a joint resolution of disapproval. Upon receiving a request for a rule to govern consideration of such a resolution, the House Rules Committee could set a time limit for debate, exclude any amendments to, and waive any points of order against the resolution. If the House adopted the rule reported by the committee, it would govern the manner in which the legislation would be considered, superseding the statutory provision. After a joint resolution is passed by both the House and the Senate, the measure would next be sent to the President. Once this legislation reaches the President, presumably he would veto it in a timely manner. Congress would then face the task of obtaining a two-thirds majority in both houses to override the veto and impose its position on the President. Congress can also block or modify a proposed sale of major defense equipment, or defense articles and services, if it uses the regular legislative process to pass legislation prohibiting or modifying the sale or prohibiting delivery of the equipment to the recipient country. While it is generally presumed that Congress will await formal notification under Section 36(b) or 36(c) of the AECA before acting in opposition to a prospective arms sale, it is clear that a properly drafted law could block or modify an arms sale transaction at any timeâincluding before a formal AECA notification was submitted or after the 30-day AECA statutory notification period had expiredâso long as the items have not been delivered to the recipient country. Congressional use of its lawmaking power regarding arms sales is not constrained by the AECA reporting requirements. In order to prevail, however, Congress must be capable of overriding a presidential veto of this legislation, for the President would presumably veto a bill that blocked his wish to make the arms sale in question. This means, in practical terms, that to impose its view on the President, Congress must be capable of securing a two-thirds majority of those present and voting in both houses. There are potentially important practical advantages, however, to prohibiting or modifying a sale, if Congress seeks to do so, prior to the date when the formal contract with the foreign government is signedâwhich could occur at any time after the statutory 30-day period. These likely advantages include (1) limiting political damage to bilateral relations that could result from signing a sales contract and later nullifying it with a new law; and (2) avoiding financial liabilities which the U.S. Government might face for breaking a valid sales contract. The legislative vehicle designed to prohibit or modify a specific arms sale can take a variety of forms, ranging from a rider to any appropriation or authorization bill to a freestanding bill or joint resolution. The only essential features that the vehicle must have are (1) that it is legislation passed by both houses of Congress and presented to the President for his signature or veto and, (2) that it contains an express restriction on the sale and/or the delivery of military equipment (whether it applies to specific items or general categories) to a specific country or countries. It is important to note that the President also has the legal authority to waive the AECA statutory review periods. For example, if the President states in the formal notification to Congress under AECA Sections 36(b)(1), 36(c)(2), 36(d)(2) that \"an emergency exists\" which requires the sale (or export license approval) to be made immediately \"in the national security interests of the United States,\" the President is free to proceed with the sale without further delay. The President must provide Congress at the time of this notification a \"detailed justification for his determination, including a description of the emergency circumstances\" which necessitated his action and a \"discussion of the national security interests involved.\" AECA Section 3(d) (2)(A) provides similar emergency authority with respect to retransfers of U.S.-origin major defense equipment, defense articles, or defense services. Section 614(a) of the Foreign Assistance Act of 1961 (FAA), as amended, also allows the President, among other things, to waive provisions of the AECA, the FAA, and any act authorizing or appropriating funds for use under either the AECA or FAA in order to make available, during each fiscal year, up to $750 million in cash arms sales and up to $250 million in funds. Not more than $50 million of the $250 million limitation on funds use may be made available to any single country in any fiscal year through this waiver authority unless the country is a \"victim of active aggression.\" Not more than $500 million of cash sales (or cash sales and funds made available combined) may be provided under this waiver authority to any one country in any fiscal year. To waive the provisions of these acts related to arms sales, the President must determine and notify Congress in writing that it is \"vital\" to the \"national security interests\" of the United States to do so. Before exercising the authority granted in Section 614(a), the President must \"consult with\" and \"provide a written policy justification to\" the House Foreign Affairs and the Senate Foreign Relations Committees and House and Senate Appropriations Committees. In summary, in the absence of a strong majority in both houses of Congress supporting legislation to block or modify a prospective arms sale, the practical and procedural obstacles to passing such a lawâwhether a freestanding measure or one within the AECA frameworkâare great. Even if Congress can pass the requisite legislation to work its will on an arms sale, the President need only veto it and secure the support of one-third plus one of the Members of either the Senate or the House to have the veto sustained and permit the sale. It should be noted that Congress has never successfully blocked a proposed arms sale by use of a joint resolution of disapproval, although it has come close to doing so (see section below for selected examples). Nevertheless, Congress hasâby expressing strong opposition to prospective arms sales, during consultations with the executive branchâaffected the timing and the composition of some arms sales, and may have dissuaded the President from formally proposing certain arms sales. On May 24, 2019, Secretary of State Michael Pompeo stated that he had directed the State Department \"to complete immediately the formal notification of 22 pending arms transfers\" to Jordan, Saudi Arabia, and the United Arab Emirates. In a determination to Congress, Pompeo invoked the AECA Section 36 emergency provisions described above. The transfers included a variety of defense articles and services, as well as an agreement to coproduce and manufacture components of Paveway precision-guided munitions in Saudi Arabia. On June 20, 2019, the Senate passed S.J.Res. 36 , which prohibited both the Paveway coproduction agreement described above and the transfer of additional such munitions, and S.J.Res. 38 , which prohibited transfers of \"defense articles, defense services, and technical data to support the manufacture of the Aurora Fuzing System for the Paveway IV Precision Guided Bomb Program.\" The same day, the Senate passed en bloc another 20 resolutions of disapproval prohibiting the remaining notified transfers. The House passed S.J.Res. 36 and S.J.Res. 38 on July 17, 2019. The same day, the House also passed S.J.Res. 37 , which prohibited the transfer to the UAE of \"defense articles, defense services, and technical data to support the integration, operation, training, testing, repair, and operational level maintenance\" of the Maverick AGM-65 air-to-surface guided missile and several Paveway systems for use on a number of Emirati-operated aircraft. The resolution also prohibited the transfer of a number of Paveway munitions to the UAE. President Donald Trump vetoed the three bills on July 24. A July 29 Senate vote failed to override these vetoes. On October 14, 1981, the House adopted a resolution ( H.Con.Res. 194 ) objecting to President Reagan's proposed sale to Saudi Arabia of E-3A airborne warning and control system (AWACS) aircraft, Sidewinder missiles, Boeing 707 refueling aircraft, and defense articles and services related to F-15 aircraft. An October 28, 1981, Senate vote on identical legislation failed, however, after President Reagan made a series of written commitments to Congress regarding the proposed sale. Congress later enacted legislation requiring the President to certify that the commitments made in 1981 regarding the proposed sale had been met prior to the delivery of the AWACS planes (Section 127 of the International Security and Development Cooperation Act of 1985; P.L. 99-83 ). On April 8, 1986, President Ronald Reagan formally proposed the sale to Saudi Arabia of 1,700 Sidewinder missiles, 100 Harpoon missiles, 200 Stinger missile launchers, and 600 Stinger missile reloads. On May 6, 1986, the Senate passed legislation to block these sales ( S.J.Res. 316 ) by a vote of 73-22. The House concurred with the Senate action on May 7, 1986, by passing H.J.Res. 589 by a vote of 356-62. The House then passed S.J.Res. 316 by a voice vote and (in lieu of H.J.Res. 589 ) sent it to the President. On May 21, 1986, President Reagan vetoed S.J.Res. 316 . But, in a letter that day to then-Senate Majority Leader Robert Dole, President Reagan said he would not include the controversial Stinger missiles and launchers in the sales proposal. On June 5, 1986, the Senate, by a 66-34 vote, sustained the President's veto of S.J.Res. 316 , and the sale of the Sidewinder and Harpoon missiles to Saudi Arabia proceeded. More recently, on March 10, 2016, the Senate Foreign Relations Committee rejected a motion to discharge a joint resolution ( S.J.Res. 31 ) prohibiting the sale of several defense articles, particularly eight F-16 Block 52 aircraft. H.J.Res. 82 was the House companion bill. On May 5, 2016, a State Department spokesperson, noting congressional objections to using Foreign Military Financing funds for the aircraft, told reporters that the United States had \"told the Pakistanis that they should put forward national funds for the purchase.\" In late May, the U.S. offer expired after Islamabad failed to submit a letter of acceptance by the required deadline. On June 13, 2017, the Senate voted to reject a motion to discharge from the Senate Foreign Relations Committee a joint resolution ( S.J.Res. 42 ) prohibiting certain proposed defense exports to Saudi Arabia, such as \"technical data, hardware, and defense services\" to support the Royal Saudi Air Force's deployment of the Joint Direct Attack Munition and integration of the FMU-152A/B JPB Fuze System into several warhead types. The bill also would have prohibited the transfer of \"defense articles, defense services, and technical data to support the assembly, modification, testing, training, operation, maintenance, and integration\" of certain precision guided munitions for the certain Royal Saudi Air Force planes. H.J.Res 102 was the House companion bill.", "summary": "This report reviews the process and procedures that currently apply to congressional consideration of foreign arms sales proposed by the President. This includes consideration of proposals to sell major defense equipment, defense articles and services, or the retransfer to third-party states of such military items. Under Section 36(b) of the Arms Export Control Act (AECA), Congress must be formally notified 30 calendar days before the Administration can take the final steps to conclude a government-to-government foreign military sale of major defense equipment valued at $14 million or more, defense articles or services valued at $50 million or more, or design and construction services valued at $200 million or more. In the case of such sales to NATO member states, NATO, Japan, Australia, South Korea, Israel, or New Zealand, Congress must be formally notified 15 calendar days before the Administration can proceed with the sale. However, the prior notice threshold values are higher for sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand. Commercially licensed arms sales also must be formally notified to Congress 30 calendar days before the export license is issued if they involve the sale of major defense equipment valued at $14 million or more, or defense articles or services valued at $50 million or more (Section 36(c) AECA). In the case of such sales to NATO member states, NATO, Japan, Australia, South Korea, Israel, or New Zealand, Congress must be formally notified 15 calendar days before the Administration is authorized to proceed with a given sale. As with government-to-government sales, the prior notice threshold values are higher for sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand. Furthermore, commercially licensed arms sales cases involving defense articles that are firearms-controlled under category I of the United States Munitions List and valued at $1 million or more must also be formally notified to Congress for review 30 days prior to the license for export being approved. In the case of proposed licenses for such sales to NATO members, Japan, Australia, South Korea, Israel, or New Zealand, 15 days prior notification is required. In general, the executive branch, after complying with the terms of applicable U.S. law, principally contained in the AECA, is free to proceed with an arms sales proposal unless Congress passes legislation prohibiting or modifying the proposed sale. Under current law Congress faces two fundamental obstacles to block or modify a presidential sale of military equipment: it must pass legislation expressing its will on the sale, and it must be capable of overriding a presumptive presidential veto of such legislation. Congress, however, is free to pass legislation to block or modify an arms sale at any time up to the point of delivery of the items involved. This report will be updated, if notable changes in these review procedures or applicable law occur.", "document_type": "crs"}
{"report": "Virtually all societies attempt to remember and memorialize individuals, groups, and events as part of the preservation of shared rhetoric and history. In the United States, there are hundreds, and possibly thousands, of memorials to various individuals, groups, and events. These commemorative works may \"engage the population in maintaining memory on a daily basis\" in a way that \"no documents or records can.\" Decisions about which people, groups, or events to memorialize are made by many different entities, including Congress, federal agencies, state and local governments, and private citizens, among others. For example, for memorials on federal land in the District of Columbia, the Commemorative Works Act (CWA) requires that Congress provide authorization for a new memorial. In other areas, various laws, regulations, and policies may provide for different groups and governments to decide what should be commemorated and how. Once a decision to commemorate is made, decisionmakers face issues related to the location and cost of a memorial. The choice of a memorial's location is significant. Memorials are arguably most meaningful when they are located in a place with a relationship to the individual, group, or event being commemorated. In 2002, for example, a representative from the National Park Service (NPS) testified before Congress about the importance of place: No memorial designed for placement in Washington, D.C. could capture the emotion and awe of visitors to the USS Arizona Memorial, lying where it was sunk in Pearl Harbor. The Oklahoma City National Memorial would not have nearly the power it has if it had been constructed anywhere else but at the site of the Murrah Building. The memorial landscapes of Gettysburg or Antietam National Battlefields still haunt visitors who contemplate what occurred there nearly 150 years ago. Indeed, people from all over the world continue to be drawn to these hallowed grounds to reflect on the historical events that took place at the sites or, perhaps, to pay their respects to those who lost their lives there. This report considers the extent of federal involvement in memorials located outside the District of Columbia (Washington, DC). A distinction is drawn between memorials located within and outside of Washington, DC, because of the exclusive role the CWA gives Congress to authorize new memorials on federal land in the District of Columbia, and the role of federal agencies—primarily NPS and the General Services Administration (GSA)—in maintaining District-based memorials once dedicated. Other CRS reports provide further discussion of memorials within the District of Columbia. No systematic law or set of regulations governs the establishment of memorials outside Washington, DC. While many such works are established without federal involvement, Congress also has established or recognized numerous memorials nationwide, and some have been designated by the executive branch. For purposes of this report, federal involvement in memorials outside the District of Columbia may be classified as \"high,\" \"medium,\" \"low,\" or \"none.\" ( Figure 1 ). 1. Memorials with \"high\" federal involvement typically are located on federal land; receive federal funds for design, construction, and maintenance; and are managed by federal agencies. These include memorials established by Congress as units of the National Park System or under the administration of another agency. 2. Memorials with \"medium\" federal involvement typically either are located on federal land but do not receive federal funding, or are located on nonfederal land but receive assistance from a federal agency. Examples include a number of memorials designated as NPS affiliated areas, which remain under nonfederal management but receive assistance from NPS. 3. Memorials with \"low\" federal involvement are those for which Congress provides statutory recognition, but which are not located on federal land or affiliated with a federal agency, and do not receive federal funds. 4. Memorials with no federal involvement are those that receive no federal recognition, are located on nonfederal land, and for which nonfederal resources were used to design and build the memorial. In some instances, Congress authorizes a memorial to be created on federal land and administered by a federal agency. Such memorials have been established primarily as units of the National Park System, but also may be located within the jurisdiction of other agencies. Some of these memorials include multiple facilities such as a visitor center or kiosk in addition to the primary commemorative work. Congress also regularly enacts legislation to place plaques, markers, and similar works at federal sites, or to name federal sites in memory of individuals, groups, or events. In addition to congressional designations, executive-branch officials also have designated some commemorative works on federal land. Some agencies' regulations and policies allow for agency officials to authorize the placement of plaques, markers, and similar works on agency property, and to name structures or features in memory of a person, group, or event. For example, U.S. Army regulations allow for Army officials to approve memorials to certain distinguished individuals, including deceased Army uniformed and civilian personnel with records of outstanding and honorable service, under specified criteria. To establish a national memorial as a unit of the National Park System, an act of Congress is required. For example, in the 107 th Congress, P.L. 107-226 established the Flight 93 National Memorial in Pennsylvania to \"honor the passengers and crew of United Airlines Flight 93 of September 11, 2001.\" For a discussion of the process for creating a new NPS unit and associated issues, see CRS Report RS20158, National Park System: Establishing New Units . Table 1 lists national memorials outside the District of Columbia that are National Park System units. The table entries are organized alphabetically by state and the descriptions are adapted from the National Parks Index . Although two of the memorials do not include the word \"national\" in their names, NPS categorizes them all as national memorials. Although legislation is required to establish a memorial as an NPS unit, agency management policies allow for the NPS director to approve commemorative names and the placement of commemorative works within park units if specified criteria are met, including that there be a \"compelling justification\" for associating the memorialized person or event with the park in question, and a specified time lapse between the commemoration and the person's death or the event's occurrence. Both Congress and executive-branch officials also have established memorials on property administered by agencies other than NPS, such as the Department of Defense and others. These memorials typically are managed by the administering agency as part of its overall management of a larger site. For example, in 2015, Congress designated the Medicine Creek Treaty National Memorial, which is managed by the U.S. Fish and Wildlife Service (FWS), as part of the Billy Frank Jr. Nisqually National Wildlife Refuge in the state of Washington. In 2000, Congress directed the Secretary of the Interior to designate the Battle of Midway National Memorial in the Midway Atoll National Wildlife Refuge, also administered by FWS. In some instances, Congress has established a memorial on federal land but required it to be financed by a nonfederal entity, or alternatively, has provided federal financial and/or technical assistance to a nonfederal entity for management of a memorial that is not on federal land. NPS has played a large role in supporting these \"medium-involvement\" commemorative works, but other agencies have participated as well, especially branches of the Department of Defense. Congress has designated some sites, including several national memorials, as affiliated areas of the National Park Service. These sites are not units of the National Park System and typically remain in nonfederal ownership and management, but receive technical and/or financial assistance from NPS. For example, P.L. 108-199 , the Consolidated Appropriations Act, 2004, transferred jurisdiction over the Oklahoma City Bombing Memorial from the NPS to the Oklahoma City National Memorial Foundation and provided that the NPS \"is authorized to enter into 1 or more cooperative agreements with the Foundation for the National Park Service to provide interpretive services related to the Memorial.\" The Secretary of the Interior also may designate sites as NPS affiliated areas, but may not provide financial assistance to these sites without an act of Congress. Table 3 lists national memorials that are NPS affiliated areas, including the memorial's name, its location, and a description from the NPS. Outside of the NPS affiliated area designation, Congress has sometimes provided for a federal agency to fund or otherwise assist a nonfederally administered memorial. For example, P.L. 107-117 appropriated $4.2 million to the Department of Defense to be used by the Secretary of the Navy as a grant to the U.S.S. Alabama Battleship Foundation, \"to be available only for the preservation of the former USS Alabama (BB–60) as a museum and memorial.\" The same law also provided $4.3 million to the Intrepid Sea-Air-Space Foundation to preserve the former USS Intrepid as a museum and memorial. Congress has also sometimes provided a \"medium\" level of federal support to a memorial by authorizing its establishment on federal land, but without federal funding. For example, P.L. 115-170 authorized a private organization, Pacific Historic Parks, to establish a commemorative display within a national park unit—the World War II Valor in the Pacific National Monument in Hawaii—to honor soldiers who fought in the Pacific theater. The law specified that federal funds could not be used to design, procure, prepare, install, or maintain the commemorative display, although the NPS director is authorized to accept contributions of nonfederal funds and resources for such purposes. Similarly, P.L. 113-66 (§2842) authorized the Secretary of the Navy to allow a memorial to military divers to be established at a suitable location under the Secretary's jurisdiction; however, the law prohibited the use of federal funds to design, procure, prepare, install, or maintain the memorial. The law required the Secretary to approve the memorial's final design and to ensure that an \"assured\" source of nonfederal funding was established for the memorial's construction and ongoing maintenance. Another example is the National Fallen Firefighters Memorial, which is located on federal land (the National Fire Academy in Emmitsburg, MD) but does not receive federal funds for maintenance. It is maintained by the National Fallen Firefighters Foundation, a nonprofit organization. Other variations of federal-nonfederal partnerships have also been established. For example, P.L. 109-163 (§1017) authorized a nonfederal entity, the USS Oklahoma Memorial Foundation, to construct a memorial to the USS Oklahoma on federal land. Although the foundation was required to fund and execute construction of the memorial, the Secretary of the Interior was given ongoing responsibility for its administration. The Silent Heroes of the Cold War National Memorial was dedicated in 2015 by the U.S. Forest Service (FS) at a site in Nevada's Humboldt-Toiyabe National Forest, administered by FS, but was constructed with private funding. On numerous occasions, Congress has designated an existing nonfederal memorial as a \"national memorial\" without any further federal affiliation. These memorials generally do not receive federal funds or support for maintenance or programming. Legislation designating these national memorials often includes explicit language stating that the memorial is not an NPS unit and that federal funds shall not be provided for the memorial. For example, the statute designating the National Distinguished Flying Cross Memorial in Riverside, CA, stated the following: (c) Effect of Designation.—The national memorial designated by this section is not a unit of the National Park System, and the designation of the national memorial shall not be construed to require or permit Federal funds to be expended for any purpose related to the national memorial. Table 5 lists statutorily designated national memorials outside of Washington, DC, that are not National Park System units, NPS affiliated areas, or associated with other federal agencies. Some of these memorials do not have the word \"national\" in their name, but are listed in the U.S. Code as national memorials. In some cases, memorials located outside of the District of Columbia have been called \"national\" memorials without being so designated by Congress. For example, the George Washington Masonic National Memorial in Alexandria, VA, and the National Memorial for Peace and Justice in Montgomery, AL, are privately established and maintained. In cases where nonfederal sponsoring entities have titled works as national memorials without congressional recognition, these works generally do not receive federal funds or support for maintenance or programming. A comprehensive list of such memorials is not currently available. Federal involvement with memorials outside of Washington, DC, currently takes a wide variety of forms. Congress has established national memorials that are entirely federally funded and managed, often as units of the National Park System. Congress has also provided for more limited types of federal involvement, such as funding assistance to a nonfederally located memorial or hosting of a nonfederally funded memorial on federal land. Also, Congress has provided statutory recognition to numerous nonfederal memorials without any additional federal involvement. Beyond these federally endorsed memorials, a wide variety of other entities have established and maintained memorials throughout the country with no federal connection, including some titled as \"national memorials.\" For certain types of commemorations, Congress has taken a more systematized approach. For example, the CWA governs the establishment of memorials on federal lands in the District of Columbia, with provisions for the creation, design, construction, and maintenance of such works. If Congress wished to consider a more systematized approach to the establishment and/or funding of national memorials outside the District of Columbia, there are a number of potential options. For example, Congress could establish a statutory definition of a \"national memorial\" to guide decisionmaking as new proposals for commemoration arise. Congress might consider applying criteria similar to those of the CWA, or to those used by individual agencies for non-CWA memorials, that relate to the types of people and events that may be commemorated, and the amount of time that must pass between an event or individual's death and the commemoration. Congress could potentially limit the number of memorial designations that would be appropriate in a given time period, similar to current limits on the number of commemorative coins the U.S. Mint can issue in a year. For commemorative coins, committee rules have also required a minimum number of cosponsors before a bill might be considered. Creating systematic limitations of this nature for national memorials outside of Washington, DC, could potentially make these designations more valuable (if fewer opportunities for recognition were available) and might allow time to elapse for informed historical judgment before memorials are designated. However, such requirements might also serve to limit the number of contemporary national memorial opportunities and could be seen as reducing Congress's flexibility to make case-by-case decisions about memorials. Conversely, Congress might wish to increase the number of memorials that are nationally recognized outside of Washington, DC, such as through the establishment of a program to identify nonfederal memorials deserving of a national designation. Such a program could potentially include provisions similar to those for the U.S. Civil Rights Network established by P.L. 115-104 , which require the Secretary of the Interior to review studies and take other steps to identify federal and nonfederal sites related to the African American civil rights movement for potential inclusion in the network. Congress also could potentially consider a program to provide grants to nonfederal entities for constructing and/or maintaining national memorials outside of Washington, DC. Such a program could be seen as beneficial in promoting opportunities for public learning and memory, and encouraging suitable maintenance and upkeep of valued commemorative works. Alternatively, it could be opposed (for example, some might claim it would divert federal funds from more highly prioritized uses). Congress might determine that current practices surrounding the creation of national memorials outside the District of Columbia are effective or that the potential cost of changes outweigh the potential benefits. Congress could thus continue to evaluate requests to designate national memorials outside Washington, DC, on a case-by-case basis.", "summary": "Congress frequently faces questions about whether and how to commemorate people and events that have influenced the nation's history. Congress often has chosen to do so by establishing national memorials or by conferring a national designation on existing state, local, or private memorials. The National Park Service (NPS) defines national memorials within the National Park System as \"primarily commemorative\" works that need not be at sites historically associated with their subjects. The Commemorative Works Act (CWA; 40 U.S.C. §§8901-8910) was enacted to govern the establishment process for memorials located in the District of Columbia (Washington, DC) or its environs that are under the jurisdiction of the NPS or the General Services Administration. The CWA includes provisions related to memorial location, design, construction, and perpetual maintenance. Memorials in Washington, DC, include those with the word national in the name and those that are essentially national memorials but do not bear that title. For memorials outside the District of Columbia, no specific law or set of regulations governs their establishment. Congress has established a number of federally administered national memorials throughout the nation, most often as units of the National Park System but also under management of other federal agencies. Various nonfederal entities undertaking commemorative efforts also have petitioned Congress for assistance or statutory recognition, and some individual memorial organizers have titled their works as national memorials without congressional recognition. To clarify options for Congress when considering commemoration of individuals, groups, and events through memorials, this report discusses several types of congressional involvement in memorials outside the District of Columbia. For purposes of the report, these are characterized as high federal involvement (e.g., congressional establishment of a national memorial under federal agency administration); medium federal involvement (e.g., congressional authorization for a memorial to be located on federal property or to receive federal funds); low federal involvement (e.g., statutory recognition without additional federal support); and no federal involvement (e.g., a self-declared national memorial). The report provides examples of memorials of each type and discusses some options for Congress, with regard to both individual memorial designations and consideration of whether to systematize criteria for memorials outside Washington, DC, similar to the CWA's provisions for District of Columbia memorials. Because this report focuses specifically on memorials outside the District of Columbia, please see CRS Report R41658, Commemorative Works in the District of Columbia: Background and Practice, by Jacob R. Straus, for discussion of memorials governed by the CWA in Washington, DC, and its environs.", "document_type": "crs"}
{"report": "The Teacher Education Assistance for College and Higher Education (TEACH) Grant program provides grants to students who are completing or plan to complete the coursework required to begin a career in teaching. As a condition for receiving a TEACH Grant, a recipient must teach for at least four years in a high-need field at an elementary or secondary school or in an educational service agency that serves students from low-income families within eight years of completing his or her program of study. If a recipient does not fulfill the service obligation, his or her TEACH Grants are converted to Direct Unsubsidized Loans. A recipient must repay these loans in full, including interest charged from the date of each TEACH Grant disbursement. Since the inception of the program in 2008, over 300,000 TEACH Grants have been disbursed, totaling nearly $938 million. In recent years, the TEACH Grant program has received significant attention due to challenges associated with administering it. One of the more prominently cited challenges pertains to loan conversions of TEACH Grants when recipients fail to submit annual certification paperwork on time even though they have been teaching in a qualifying position. The absence of an appeals or reconsideration process may increase the amount of such grant-to-loan conversions. While the Department of Education (ED) is working to address some of these administrative challenges, a broader issue still persists with the program: two-thirds of recipients are expected to see their grants converted to loans. This high expected failure rate raises several questions regarding the efficacy of the program. Several issues related to TEACH Grants may garner congressional attention. The bulk of these issues are related to program design, including the extent to which the program successfully identifies individuals who commit to teaching, the size of the TEACH Grant benefit, challenges associated with finding and sustaining a qualifying teaching placement, teacher preparation program quality at institutions that disburse TEACH Grants, and the continued application of the \"highly qualified teacher\" definition to the TEACH Grant program. Other issues are related to program implementation, such as challenges associated with certification of teaching service and the absence of an appeals process. Lawmakers may also wish to consider other changes that have been proposed since the TEACH Grant program was authorized. This report begins with a brief legislative history of the TEACH Grant program. This is followed by a brief description of how the program is structured and administered, as well as its budgeting approach and participation data. The report concludes with a discussion of issues related to the TEACH Grant program that might garner attention in the 116 th Congress. The TEACH Grant program was first authorized in 2007 under the College Cost Reduction and Access Act of 2007 (CCRAA; P.L. 110-84 ). However, as early as 2005, bills were introduced in both the House and the Senate that included an authorization for TEACH Grants, such as H.R. 2835 and its companion bill, S. 1218 . H.R. 2835 presented findings suggesting that there was a shortage of qualified teachers in public schools, and in light of the significant number of teacher retirements expected over the next few years, the country would need to field 2 million new teachers over the next decade. Congress authorized the TEACH Grant program in response to concerns about growing demand for high-quality teachers in low-income schools. This demand was identified as being driven by several factors, including (1) the expected surge of retirements over the next five years and (2) a newly established set of minimum standards for teacher quality as enacted through the No Child Left Behind Act (NCLB; P.L. 107-110 ). Other concerns the TEACH Grant program aimed to address were related to low-income schools, where students were identified as being disproportionately taught by teachers who were inexperienced, unqualified, and out-of-field; and which were struggling to retain teachers for as long as three to five years. The committee report accompanying H.R. 2669 , the College Cost Reduction Act of 2007, stated that the TEACH Grant program was created to attract high-achieving individuals into the teaching profession to meet the demand in low-income schools. Given that, on average, teacher salaries tended to be lower than other entry-level jobs out of college, providing a financial incentive to help subsidize the cost of college was viewed as an important tool in offsetting the opportunity cost of entering into teaching. There was also a distinction made in providing financial assistance on the front-end in the form of a grant when an individual started undergraduate or graduate studies versus providing assistance once the individual had been teaching for some time, as with already existing teacher loan forgiveness programs. The idea was that earlier intervention might influence a student's career path and, thus, major, which could potentially incentivize many more individuals to pursue teaching as a career who would have not chosen it otherwise. The program was also focused on incentivizing high-quality individuals to teach in both schools and subject areas for which it is typically harder to attract and retain staff. This was intended to help address some of the recurring issues faced by low-income schools, in particular. Opponents of the program believed that this new entitlement was poorly targeted, unproven, and would place a significant financial burden on taxpayers. Further, it was argued that the program was not focused on the goals of increasing access to and persistence in higher education for students with the greatest need. Given that the program was authorized with mandatory funds, it was also contended that there was no mechanism for congressional accountability. Since its enactment, there have been some changes to the statutory provisions of the TEACH Grant program. The most substantive changes were made under the Higher Education Opportunity Act (HEOA; P.L. 110-315 ), which added a provision that required ED to develop a \"plain-language\" disclosure form to accompany each recipient's Agreement to Serve that clearly described the nature of TEACH Grants, the service requirement, and the consequences of not fulfilling this requirement (see \" Service-Related Requirements \" for a description of the Agreement to Serve). The HEOA also included a provision that permitted grant recipients who obtained degrees in fields that were designated as \"high need\" at the time they applied for the grant but were no longer designated as such to still be able to complete their service requirement by teaching in that field. It also required ED to establish regulations describing the extenuating circumstances in which all or part of the service requirement could be waived. Finally, it required ED to prepare and submit to Congress a report every two years on TEACH Grant recipients and the schools and students served by those recipients. At the time of the TEACH Grant program's authorization, the idea of awarding grants or scholarships to subsidize the cost of undergraduate or graduate education in exchange for service (i.e., \"service payback\" programs) was not a new one. Prior to TEACH Grants, the Paul Douglas Teacher Scholarships program was first authorized under the Higher Education Amendments of 1986 ( P.L. 99-498 ) as a discretionary program to provide financial assistance to college students preparing to be elementary and secondary school teachers. Eligible students, who must have graduated in the top 10% of their high school class, could receive a scholarship in the amount of $5,000 per year for a maximum amount of up to $20,000. In exchange, scholarship recipients were required to teach one to two years for every year of scholarship receipt in a preschool or elementary or secondary school, depending on where and what subjects they taught. The program was administered as a formula grant to states, which were responsible for selecting scholarship recipients, verifying that each recipient was meeting service requirements, and submitting performance reports to ED. The program was repealed by the Higher Education Amendments of 1998 ( P.L. 105-244 ), though it was defunded in FY1996 appropriations ( P.L. 104-134 ). In eliminating funding for the program, the committee report that accompanied H.R. 2127 stated that the program was duplicative of other teacher training and student aid programs. It was also characterized as costly to administer and difficult to implement, monitor, and enforce. Another example of a teaching service payback program, authorized prior to the TEACH Grant program's inception, is the National Science Foundation's (NSF's) Robert Noyce Teacher Scholarship program, which was enacted under the National Science Foundation Authorization Act of 2002 ( P.L. 107-368 ). It makes awards to institutions of higher education (IHEs) to provide scholarships of $10,000 per year to undergraduate science, technology, engineering, and math (STEM) majors, starting in their junior year, and graduate STEM students. In exchange for this assistance, recipients are expected to obtain teaching certification in a STEM subject and serve as a teacher in a high-need local educational agency (LEA) for at least two years for each year of scholarship receipt. Similar to TEACH Grants, if recipients do not complete their required service, then they must pay all or a portion of their scholarships back in the form of a loan, including interest accrued since disbursement. Other examples of existing service payback programs include scholarships at each of the U.S. Service Academies and Reserve Officers' Training Corps (ROTC) Scholarships, which provide tuition assistance in exchange for military service. Boren Scholarships and Fellowships provide financial assistance to undergraduate and graduate students to study less commonly taught languages in international regions critical to U.S. interests in exchange for working in the federal government for at least one year upon graduation. The National Institutes of Health Ruth L. Kirschstein National Research Service Awards provide financial support for training to pre- and postdoctoral students in biomedical, behavioral, and clinical research in exchange for engaging in health-related biomedical, behavioral, and/or clinical research, research training, or health-related teaching for one year upon completion of their program. This section describes how the program is structured, including TEACH Grant recipient eligibility, award amounts, service-related requirements, conditions under which TEACH Grants convert to loans, institutional eligibility to disburse TEACH Grants, and program administration. To be eligible to receive a TEACH Grant, a student must meet the basic eligibility criteria for the HEA Title IV federal student aid programs. Among the requirements generally applicable to the HEA Title IV student aid programs for award year (AY) 2018-2019 are the following: A student must be accepted for enrollment or enrolled in an eligible program at an eligible institution for the purpose of earning a certificate or degree. A student must not be enrolled in an elementary or secondary school and must have a high school diploma (or equivalent). A student must meet citizenship requirements. A male student must have registered with the selective service system when 18-25 years of age. A student must maintain satisfactory academic progress while enrolled. Satisfactory academic progress requires a minimum grade point average (GPA) or its equivalent and passing a minimum percentage of attempted credits or hours. A student must not be in default on a Title IV student loan, or have failed to repay or make an arrangement to repay an overpayment on a Title IV grant or loan, or be subject to a judgment lien for a debt owed to the United States. A student must have repaid any Title IV funds obtained fraudulently. A student may be disqualified for an unusual enrollment historyâreceiving HEA Title IV aid at multiple schools in the same semester, or receiving aid and withdrawing before earning any credit. A student may be disqualified for a period of time for a federal or state conviction for possession or sale of drugs while receiving HEA Title IV student aid. Specific eligibility requirements for the TEACH Grant program include the following: A student must also be enrolled as an undergraduate, post-baccalaureate, or graduate student at an IHE that participates in the TEACH Grant program, and in a TEACH Grant-eligible program of study within the IHE. A post-baccalaureate program is a program of instruction for individuals who have completed a bachelor's degree that (1) does not lead to a graduate degree and (2) consists of courses required by a state in order for a student to receive a professional certification or licensing credential that is required for employment as a teacher in an elementary or secondary school in that state. A student must meet certain academic achievement requirements, generally, scoring above the 75 th percentile on one or more portions of an undergraduate, post-baccalaureate, or graduate school admissions test or having a cumulative GPA of at least 3.25 on a 4.0 scale or the numeric equivalent. The TEACH Grant program is currently the only HEA Title IV program with an academic merit requirement. If a student is a current or prospective teacher applying for the TEACH Grant program to obtain a graduate degree, then the student must be a teacher or retiree from another occupation with expertise in a field in which there is a shortage of teachers or a teacher who is using a high-quality alternative certification route. A student enrolled full-time in a qualifying program may receive four annual TEACH Grant awards of up to $4,000 each for his or her first bachelor's degree and first post-baccalaureate program of study combined. The aggregate award amount, or the total cumulative award amount , that a student may receive for a bachelor's degree and a post-baccalaureate program of study combined is $16,000. A graduate student enrolled full-time in a qualifying program may also receive two annual TEACH Grant awards of up to $4,000 each for a Master's degree . The aggregate award amount that a student may receive for a graduate degree is $8,000. Students enrolled in a qualifying program less - than - full - time are eligible to receive a prorated TEACH Grant award based on their attendance intensity (i.e. , half-time, three-quarter-time, or less-than-half-time) . For example, a student enrolled in a Master's degree program on a half -time basis may receive an annual award of up to $2,000. A TEACH Grant in combination with other student financial assistance canno t exceed the cost of attendance; thus, in some instances, an annual TEACH Grant award may be reduced. When receiving a TEACH Grant, recipients must participate in TEACH Grant counseling that explains the terms and conditions of the TEACH Grant service obligation. They must receive entrance counseling with each TEACH Grant disbursement and exit counseling once they cease or complete their program of study. They must also sign a TEACH Grant Agreement to Serve, which specifies the terms and conditions for receiving a TEACH Grant, including the consequences for not fulfilling the service obligation. Upon completion or cessation of their respective program of study, recipients must serve as full-time teachers for at least four academic years within an eight-year period. They must also meet the requirements of a \"highly qualified teacher\" (HQT) as defined in the Elementary and Secondary Education Act (ESEA). Recipients must teach at a public or nonprofit private elementary or secondary school that serves low-income students, which is defined as a school: (1) that is in a school district of an LEA that is eligible for assistance under Title I-A of the ESEA and (2) in which more than 30% of the children enrolled in the school meet a measure of poverty identified in statute. A recipient may also teach in an educational service agency (ESA) in which more than 30% of the children meet a measure of poverty identified in statute. Additionally, ED includes in the definition of a school that serves low-income students, schools operated by the Bureau of Indian Education (BIE) or operated on Indian reservations by Indian tribal groups under contract or grant with BIE. ED identifies all qualifying schools in the annual Teacher Cancellation Low-Income Directory (TCLD). Once a recipient locates a vacancy in a high-need field in a qualifying school, he or she must apply for the job and be offered (and accept) a qualifying position at the school. If the school in which a recipient teaches in a qualifying position is designated as a school serving low-income students in his or her first year, and subsequently is no longer designated as such, a grant recipient may still fulfill his or her service obligation by continuing to teach in that school. As mentioned above, a recipient must also teach in high-need fields, which are defined as bilingual education and English language acquisition, foreign language, mathematics, reading specialist, science, and special education. High-need fields also include any other field that has been identified as high-need by the federal government, a state government, or an LEA, and approved by ED. ED documents fields that are identified as high-need by the federal government, a state government, or an LEA in the annual Teacher Shortage Area Nationwide Listing (\"Nationwide List\"), following ED approval. Qualifying fields on the Nationwide List must be designated as high-need at the time a TEACH Grant was received or when the individual begins teaching. Depending on their program of study, recipients may be required to declare a major and take coursework in a high-need field in order to be eligible for teacher certification in their state. If recipients choose a field that is on the Nationwide List when they first received the grant but is no longer designated as high-need by the time they start teaching, they may still perform qualifying service by teaching in that field. Further, if recipients are teaching in a field on the Nationwide List that in subsequent years is no longer designated as high-need, they may still teach in that field to fulfill their service obligation. Following completion of or ceasing enrollment in their program of study, recipients must provide two types of certification to the ED-contracted TEACH Grant loan servicer. The first is an initial certification within 120 days of completing or ceasing enrollment in their program. The recipient must verify either (1) employment as a full-time teacher in a qualifying position or (2) intention to be employed in a qualifying position. The loan servicer notifies recipients of when this initial certification is due. The second is annual certification to the loan servicer following each year of teaching service completion. The loan servicer notifies recipients of their annual certification requirement, including how to submit documentation of progress towards completing their service obligation and when that documentation is due. Specifically, by the annual certification date, recipients must provide documentation demonstrating that either (1) they have completed a full year of qualifying teaching service, verified by the chief administrative officer of their school or ESA, or (2) they intend to satisfy the terms and conditions of their TEACH Grant service obligation. Previously, the annual certification date was based on the date the recipient had completed or ceased enrollment in the TEACH Grant-eligible program of study; therefore, annual certification dates varied among recipients. However, on November 1, 2018, ED adopted a standardized annual certification date of October 31 for all recipients. In general, TEACH Grants convert to an Unsubsidized Direct Loan, with interest accrued as of the date of disbursement of each grant, under the following conditions: Grant recipients voluntarily request that their TEACH Grants be converted to a loan because they decide not to teach or not to teach in a qualifying school or field. Grant recipients do not submit appropriate documentation by the initial or annual certification date or respond to reminder notices from the ED-contracted loan servicer. Grant recipients fail to complete the required four years of service within the eight-year period. This applies regardless of whether the recipient completed any portion of the service obligation. If grant recipients cease enrollment in their eligible program of study prior to completing it, their grant converts to a loan within one year unless they are eligible for a suspension (see below), they re-enroll in an eligible program, or they have begun qualifying teaching. The eight-year period in which a recipient must complete his or her four-year teaching service obligation begins once the recipient's enrollment in the eligible program of study ends. However, a recipient may be eligible to request a suspension of the eight-year period under various circumstances, including the following: enrollment in another TEACH Grant-eligible program (such as a Master's degree program if the recipient received TEACH Grants for a bachelor's degree program), enrollment in a program of study that is required by a state to receive certification or licensure to teach within the state, a condition qualifying for leave under the Family and Medical Leave Act, or a call or order to active duty status for more than 30 days as a member of the Armed Forces reserves or service as a member of the National Guard. Suspensions are granted in one-year increments, not to exceed a combined total of three years for the first three reasons or a total of three years for the last reason. TEACH Grant service obligations can be canceled if the recipient dies or becomes totally and permanently disabled. Additionally, a recipient may be discharged for all or some of their service obligation if they are called or ordered to active military duty for more than three years. An individual could receive TEACH Grants for more than one program of study. For example, a student could be awarded TEACH Grants for a bachelor's degree and then later awarded TEACH Grants for a Master's degree. In such cases, recipients must complete four years of teaching service for each program of study for which they received TEACH Grants. However, creditable teaching service, approved suspensions, and a service discharge resulting from a call to active military duty may apply to more than one service obligation. To be eligible to disburse TEACH Grants, an IHE must meet general Title IV institutional eligibility requirements specified in statute and regulation. Additionally, IHEs must meet program-specific eligibility requirements. The HEA requires that an IHE (by determination of the Secretary of Education) provide high-quality teacher preparation and professional development services, including extensive clinical experience as a part of pre-service preparation; be financially responsible; provide pedagogical coursework, or assistance in the provision of such coursework, and formal instruction related to the theory and practices of teaching; and provide supervision and support services to teachers, or assistance in the provision of such services. ED further clarifies in regulation that to be a TEACH Grant-eligible institution , an IHE must meet financial responsibility standards or qualify under an alternative standard established in regulation; provide a high-quality teacher preparation program at the bachelor's or Master's degree level that is either accredited by an ED-recognized accrediting agency of teacher education programs; or is approved by a state, includes a minimum of 10 weeks of full-time pre-service clinical experience, or its equivalent, and provides either pedagogical coursework or assistance in the provision of such coursework; and provides supervision and support services to teachers, or assists in the provision of services to teachers, such as identifying and making available information on effective teaching skills or strategies, identifying and making available information on effective practices in the supervision and coaching of novice teachers, and mentoring focused on developing effective teaching skills and strategies; provide a two-year program of study that is acceptable for full credit for either a bachelor's teacher preparation degree or a bachelor's degree program in a high-need field at another TEACH Grant-eligible IHE with which it has an agreement ; offer a bachelor's degree that, in combination with other training or experience, will prepare a student to teach in a high-need field, and have an agreement with another IHE that offers a teacher preparation program or a post-baccalaureate program that prepares students to teach; or offer a post-baccalaureate program of study that is designed to prepare an individual to teach in a high-need field. A post-baccalaureate program is not TEACH Grant-eligible if it is offered by an IHE that also offers a bachelor's degree in education. ED defines a TEACH Grant-eligible program as an eligible program of study, as defined in regulation, that is designed to prepare an individual to teach as a HQT in a high-need field and leads to a bachelor's or Master's degree, or is a post-baccalaureate program of study. A two-year program of study that is acceptable for full credit toward a bachelor's degree is considered to be a program of study that leads to a bachelor's degree. A student who first received a TEACH Grant for enrolling in an eligible program of study is entitled to receive subsequent TEACH Grants to complete that program, even if it is no longer TEACH Grant-eligible. TEACH Grant program administration responsibilities are divided among IHEs, the ED-contracted loan servicer, and ED. IHEs are generally responsible for determining program eligibility and awarding and disbursing grants to recipients. The ED-contracted loan servicer manages the day-to-day program administration tasks such as tracking whether recipients are fulfilling their required service obligation, sending recipients reminders of when annual certification is due, and managing loan repayment if a recipient's grant were to convert to a loan. ED assumes the broader role of setting program policy, providing guidance to the loan servicer and IHEs on how to administer the program, providing oversight of program recipients and the loan servicer, and monitoring for program compliance. The IHE is responsible for determining whether to participate in the TEACH Grant program. It also selects the specific programs of study within the IHE to designate as TEACH Grant-eligible and, thus, decides whether to make TEACH Grants available to students enrolled in those programs. TEACH Grant administration is primarily overseen by the IHE's student financial aid office, sometimes in partnership with teacher preparation program departments. The financial aid office's responsibilities generally consist of evaluating initial and ongoing student eligibility, providing required TEACH Grant counseling to students who elect to participate in the program, disseminating information and materials about TEACH Grants to students and teacher preparation program staff, and packaging and disbursing TEACH Grants to recipients. Teacher preparation program staff's responsibilities could include supporting the financial aid office in evaluating student eligibility, creating awareness about TEACH Grants amongst students, and aiding students in identifying and securing qualifying job placements upon program completion. Additionally, IHEs have some latitude in determining how TEACH Grants are administered. For example, IHEs can choose to make TEACH Grants available only to upperclassmen at the undergraduate level, only to students who have been admitted into a teacher preparation program, or only to students who have declared a major or minor in a high-need field. ED contracts with a private entity to support TEACH Grant administration at the federal level. Unlike other HEA Title IV grant programs, which are primari ly administered by ED following disbursement, many aspects of the TEACH Grant program are administered by the ED-contracted loan servicer post-disbursement. This is due to the program's service payback structure, which is unique among HEA Title IV aid programs. Following disbursement, the ED-contracted loan servicer is tasked with tracking whether recipients are fulfilling their required service obligation, rather than undertaking administrative tasks typically associated with federal student loans such as collecting and applying loan payments to borrower accounts. The loan servicer does this by accepting and processing recipients' annual certification paperwork. Its responsibilities also include reminding grant recipients of when their employment certification paperwork is due and sending quarterly notices informing recipients of the amount they would owe including interest if their grants were to convert to a loan. If a recipient's grants are converted to a loan, the loan servicer also carries out the more traditional loan servicer responsibilities of tracking loan repayment, providing billing and repayment services, and informing borrowers about their repayment options. The loan servicer also initially responds to customer service inquiries. While the ED-contracted loan servicer manages the day-to-day administration of TEACH Grants, ED plays a broader role of setting program policy, providing guidance to the loan servicer and IHEs on how to administer the program, providing oversight of program recipients and the loan servicer, and monitoring for program compliance. This includes monitoring the loan servicer to ensure that it delivers on its responsibilities such as regularly communicating with recipients, adequately tracking recipients' progress toward satisfying grant requirements, and accurately converting TEACH Grants to loans if recipients do not meet grant requirements. It also broadly monitors compliance by participants, including IHEs and students, through monthly reports from the loan servicer and program reviews of IHEs that participate in Title IV programs, among other methods. Additionally, ED seeks to address recipient complaints and settles disputes that include incorrect grant-to-loan conversions. ED is also responsible for broad outreach on how to apply for and receive student aid such as TEACH Grants and developing student borrower guidance, which it maintains centrally on a federal student aid website ( https://studentaid.ed.gov ). Given that a TEACH Grant may be converted to a Direct Loan in certain circumstances, the TEACH Grant program is treated as a federal credit program . Thus, as with all other federal credit programs, the costs to the government, or subsidies , for the TEACH Grant program are estimated in accordance with the requirements of the Federal Credit Reform Act of 1990 (FCRA; Title V of P.L. 101-508 ). These subsidies are reestimated on an annual basis. According to FCRA, the budgetary cost of direct loans and loan guarantees must be measured on the basis of their estimated long-term cost to the government on a present-value basis. For each cohort year of TEACH Grants, the loan subsidy cost is the estimated long-term cost of those TEACH Grants to the government, given underlying assumptions about grant-to-direct loan conversion, loan repayment, and interest rates, and excludes administrative costs. It represents the estimated present value of the cash flows from the government (e.g., grant disbursement), less the estimated present value of the cash flows to the government (e.g., payments made by recipients whose grants convert to loans), discounted to the time when the grants are disbursed. Loan terms and conditions such as interest subsidies, deferments, loan forgiveness, defaults, and discharges are accounted for in these estimates. A positive loan subsidy cost for a cohort of TEACH Grants means that those grants are estimated to result collectively in a cost to the government, whereas a negative loan subsidy cost means that the cohort of grants will collectively achieve budgetary savings for the government (through repayment, with interest, of TEACH Grants that have been converted to loans). Subsidy costs are large and positive for TEACH Grants that have been made since the inception of the program. Subsidy costs are funded through permanent, indefinite budget authority. Administrative costs are funded separately through annual discretionary appropriations. Since FY2013, nonexempt mandatory spending programs have been subject each year to sequestration, a process of automatic \"across-the-board\" reductions in federal spending to reduce the federal budget deficit. This process was triggered by provisions in the Budget Control Act of 2011 (BCA; P.L. 112-25 ). The TEACH Grant program account is not exempt from sequestration. In May 2013, ED implemented the first BCA-required sequester by reducing each recipient's TEACH Grant award by a specified percentage, starting with awards disbursed after March 1, 2013. A sequester has since been applied annually to the TEACH Grant program, resulting in a reduction in the annual award amount in each subsequent fiscal year. Under current law, the annual sequestration of nonexempt mandatory spending programs is scheduled to continue through FY2029. Since the inception of the TEACH Grant program, ED has disbursed over 300,000 grants totaling nearly $938 million. Table 2 presents, by award year since program inception, the number of TEACH Grant awards disbursed, the number of IHEs that disbursed awards, the total amount disbursed, and the average award disbursed. The program saw a significant uptick in awards disbursed in AY2010-2011 and AY2011-2012. In recent years, analyses of the program have shed some light on benefit take-up rates and on the extent to which grants are being converted to loans. The Government Accountability Office (GAO), for instance, estimated that in the 2013-2014 academic year, 19% of individuals potentially eligible for TEACH Grants received grants under the program. With regard to loan conversions, an American Institutes for Research (AIR) study found that among TEACH Grant recipients who began their eight-year service period prior to July 2014, 63% had their grants converted to a Direct Unsubsidized Loan as of July 2016. Separately, in its FY2020 Congressional Budget Justification, ED estimates, based on administrative program data, that 66% of students who receive a TEACH Grant will fail to complete their service obligation and will see their grants converted to loans. Many issues that span aspects of the TEACH Grant program have arisen and garnered congressional interest. In general, these issues fall into two categories: (1) facets of program design and (2) program implementation. In recent years, legislative proposals have been introduced that would address some of the issues. Issues that have arisen related to facets of program design focus on whether the way in which the TEACH Grant program is structured contributes to its intended goal of recruiting and retaining high-quality teachers in low-income classrooms. They include whether the program identifies individuals with a commitment to teaching, the size of the benefit, challenges with finding and sustaining a qualifying teaching position, program quality at institutions that are eligible to disburse TEACH Grants, and the continued application of the \"highly qualified teacher\" definition. One issue of interest pertains to whether the TEACH Grant program is effective at identifying individuals committed to teaching and teaching in high-need classrooms. Some data suggest that this may be a programmatic challenge. GAO reported that from August 2013 through September 2014, 14% of TEACH Grant recipients had voluntarily requested that their grants be converted to loans, and of those, 38% reported that the reason for the voluntary conversion was because they no longer intended to teach. One explanation may be that TEACH Grants can be made available to students as early as freshman year in their undergraduate education. Earlier intervention may have the effect of recruiting more individuals to enter into teaching who might not have considered it otherwise. However, those individuals who may not have chosen teaching otherwise might also lack a strong commitment to the endeavor of teaching or teaching in a high-need school. Further, underclassmen are making the choice to accept a potentially high-stakes grant at a point when they may be less likely to have a full understanding of where their career interests lie. These factors may impact the likelihood of a TEACH Grant recipient's successful completion of his or her required service obligation and whether his or her grant converts to a loan. Evidence of the effects of restricting TEACH Grants to students who might be more committed to teaching is inconclusive. Data from a 2018 AIR study suggest that institutions that restrict TEACH Grant availability to juniors and seniors, points at which a student may be more fully committed to a career in teaching, are more likely to have lower grant-to-loan conversion rates. Anecdotal data from the AIR and GAO studies suggest that some institutions restrict TEACH Grants to upperclassmen and graduate students because underclassmen \"tend to change majors more frequently\" and encounter challenges with maintaining the 3.25 GPA required for TEACH Grant eligibility. At the same time, the AIR study also suggests that there is no difference in grant-to-loan conversion rates by undergraduate class and graduate school year, with the only exceptions occurring for juniors and first-year graduate students (who had lower conversion rates). Further, there is no difference in loan conversion rates between recipients who were accepted into a teacher preparation program prior to receiving their first TEACH Grant versus after receiving their first TEACH Grant. Data from a study of the Robert Noyce Teacher Scholarship (\"Noyce Scholarship\"), which is only available to students during the last two years of their undergraduate program or during their graduate program, suggest that the scholarship self-selects candidates who are already committed to teaching given that it is available later in an individual's education trajectory. However, this same study also suggests that the Noyce Scholarship is less useful as a recruitment tool into teaching because it is less likely to influence a recipient's decision to enter into the profession; rather, studies suggest that the Noyce Scholarship is more likely to influence an individual's decision to teach in a high-need school. Even with TEACH Grants potentially available to individuals at any class level, the AIR study findings seem to corroborate this idea that teaching service payback programs may have a greater influence on a recipient's decision to teach in a high-need school versus his or her decision to enter into the teaching profession more generally. The AIR study findings show that 44% of recipients indicated that the grant was somewhat or very influential in their decision to teach, while 58% of recipients indicated that the grant was somewhat or very influential in their decision to teach in a high-need school. To address some of these concerns, one legislative proposal would amend TEACH Grants to limit eligibility to upperclassmen and graduate students. Limiting eligibility to upperclassmen may help to ensure that grants are not being awarded to individuals who may not demonstrate a strong commitment to teaching and, thus, are more likely to remain in a high-need classroom and complete their service obligation. At the same time, restricting TEACH Grants may limit the program's ability to recruit individuals who may not have otherwise considered teaching as a career. Additionally, there is some evidence from the AIR study that suggest that IHEs market TEACH Grants to students as a means to fund their education, more so than as a means to enter into teaching. Anecdotal evidence from IHEs also suggests that some students accept a TEACH Grant to access additional education funding, with no intention of fulfilling the required teaching service. Additionally, the AIR study found that in academic year 2013-2014, 42% of grant recipients would have been borrowing over their federal annual loan limit if their grants were considered loans from the outset. While these data do not shed light on the share of recipients who took a TEACH Grant only to fund their education and with no intention of teaching, they illustrate the prospect that this source of aid may be playing a role not encompassed in original program aims. Under the TEACH Grant program, a qualifying student is eligible for up to $4,000 per year to cover the cost of attendance at an eligible IHE for an eligible program of study. At the undergraduate and post-baccalaureate levels, the maximum cumulative amount a student could receive is $16,000, and at the graduate level, the maximum cumulative amount a student could receive is $8,000. At the time the program was authorized, it was thought that the award amount would help to offset the opportunity cost of entering into teaching, given the below-average compensation teachers receive. The estimated low take-up rate of TEACH Grants may be an indicator of several things. It may suggest that some students consider the program but cannot meet the academic requirement, or decide not to take the risk of accepting a grant that could convert to a loan if they are unable to meet program requirements. The low take-up rate could also indicate that the financial benefit may not be large enough to incentivize students to accept a TEACH Grant when they would have otherwise not considered teaching. Some research suggests that teacher scholarship programs can be effective at both recruiting and retaining teachers in high-need schools when the financial incentive \"meaningfully offsets the cost of a teacher's professional preparation.\" One such study cited TEACH Grants as an example of a teacher scholarship program that did not provide a large enough financial benefit. In contrast, the Noyce Scholarship provides $10,000 per year to undergraduate students in their junior or senior year or the same amount per year for graduate studies. In 2013, an independent evaluator found that among Noyce Scholarship recipients who had had at least two years to find a teaching position after obtaining certification, 90% were teaching in high-need school districts. One legislative proposal would triple the annual TEACH Grant award, increasing it from $4,000 to $12,000; however, the proposal would also double the length of service requirement from four years to eight years and require it to be completed within 10 years of program completion. Any increase in the TEACH Grant award amount may have the effect of attracting more individuals to participate in the program. However, if a recipient fails to complete his or her service obligation, it could mean that recipients are left with a larger amount to pay back in loans. The impact on the cost to the government is unclear given that the change may increase the number of individuals who participate in the program and, thus, the cost, but if the rate at which grants convert to loans does not change, then it can be expected that a significant number of individuals' grants would continue to convert to loans, and they will be repaying the government in larger amounts. For a TEACH Grant recipient to fulfill his or her service obligation, he or she is required to teach at a school or in an ESA that serves low-income students and in a high-need field. This is intended to focus federal dollars on helping to produce teachers in schools and fields that historically face teacher shortages. Data from the 2017-2018 school year suggest that over 70% of all operational public schools may have met the TEACH Grant definition of a school that serves low-income students. However, despite the seeming prevalence of schools where recipients could fulfill their service obligation, they may still face challenges in locating and maintaining qualifying employment, especially since those schools still may not have vacancies in fields that qualify as high-need. For example, elementary school teachers may not be considered as teaching in a high-need fieldâwhere the majority of their time must be spent teaching math or scienceâbecause many of them may teach all subjects an equal amount of time. The AIR study found that 39% of TEACH Grant recipients whose grants were converted to loans reported that they did not fulfill their service requirement because they were teaching in positions that did not qualify for TEACH Grant service. Of those recipients, 15% reported that they could not find a job in a high-need field and school, 15% decided they did not want to teach in a high-need field and school, 14% applied to one or more qualifying positions but were not offered the job, and 13% found a higher-paying teaching position at a non-qualifying school. Additionally, 43% of those recipients reported other reasons for not teaching in a qualifying position, such as their school losing its Title I designation, a previously qualifying position being eliminated, confusion about whether the position qualified, teaching students from low-income families in a non-qualifying school, or not being certified in a high-need field. Similarly, the GAO study found that finding and keeping an eligible teaching position can be a challenge for recipients in satisfying grant requirements. Some of the reported reasons include limited hiring by school districts and the length of time it can take to find a qualifying position. Another factor is that promotions to non-teaching administrative positions in eligible schools do not qualify as positions fulfilling TEACH Grant service requirements. Some legislative proposals would expand the fields that would qualify as high-need, adding areas such as early childhood education, technology, engineering, career and technical education, and writing specialist. This change could help to attract individuals to teach in fields that may be considered as high-priority and, thus, provide more options for securing a position in a qualifying school. However, some of these additional fields may not face true shortages in low-income schools. Further, while low-income communities may face a shortage of early childhood educators, it could be challenging for states to identify all qualifying early childhood programs. The HEA defines an early childhood education program as a Head Start or Early Head Start program; a state licensed or regulated child care program; or a program that addresses the cognitive, social, emotional, and physical development of children from birth through age six, and is a state prekindergarten program, a preschool or infant/toddler program authorized under the Individuals with Disabilities Education Act (IDEA), or a program operated by an LEA. Not all recipients receive support from their institutions to find and secure qualifying teaching placements. The AIR study found that 70% of IHEs in its sample provided students with some placement service for identifying qualifying TEACH Grant service positions: 58% provided guidance on how to identify TEACH Grant-qualifying positions, 48% provided an updated list of available positions, and 46% established relationships with schools that have eligible positions. However, none of these practices were correlated with lower grant-to-loan conversion rates. In addition, while the TCLI and Nationwide List help recipients identify TEACH Grant-qualifying schools and fields, respectively, there is no central job search tool that identifies existing TEACH Grant-qualifying vacancies or job announcements. It is possible that expanding the types of schools that would qualify as eligible teaching placements could lead to longer retention rates in the classroom, and thus improve grant-to-loan conversion rates. Under the Paul Douglas Teacher Scholarships Program, which preceded TEACH Grants, there was no statutory requirement that the schools in which recipients taught be high-need; although, recipients could reduce the length of their required teaching service if they taught in a geographic area with teacher shortages. The ED Biennial Evaluation Report of the Paul Douglas Teacher Scholarship program from FY1995 and FY1996 showed that through FY1992, 63% of scholarship recipients had completed their teacher certification course of study. Of those, 67% had taught in the past or were teaching as of the 1992-1993 school year. Additionally, 6% of scholarship recipients were repaying or had repaid some part or all of their scholarship as loans. The North Carolina Teaching Fellows Program, which is similar in structure to TEACH Grants, requires that its fellows only teach in North Carolina public schools. One study found that the program is more likely to produce teachers who stay in public classrooms for five years or more. However, that same study also found that fellows tended more than other novice teachers to teach students who are more advantaged. As such, expanding the types of schools in which recipients could complete their service obligation could run counter to the original intent of the program to support low-income schools with recruitment of high-quality teachers. To be eligible to disburse TEACH Grants, an IHE must provide a high-quality teacher preparation program. Such teacher preparation program must be accredited by an ED-recognized accrediting agency of teacher education programs; or is approved by a state, provides a minimum of 10 weeks of full-time pre-service clinical experience, or its equivalent, and provides or assists in the provision of pedagogical coursework. The program must also provide or assist in the provision of supervision and support services to teachers. The HEA and accompanying regulations do not define what it means for a teacher preparation program to be \"high-quality.\" Title II of the HEA requires states and IHEs to publish report cards on the quality of teacher preparation. States must also report to ED on the quality of teacher preparation programs. Title II of the HEA further requires states to develop criteria to assess program quality, identify programs that are low-performing or at risk of being low-performing based on those criteria, and report this information to ED. In 2014, 12 states identified a total of 45 programs as low-performing or at risk of being low-performingânearly evenly split between the two designations. Of those 45 programs, 28 were based in IHEs that disburse TEACH Grants. Twenty-two states have never identified a program as low-performing or at risk of being low-performing. In 2016, ED published regulations that would have linked the definition of \"high-quality teacher preparation program\" in Â§420L(1)(A) of the HEA to teacher preparation program ratings under the HEA Title II state reporting requirements; although, these regulations were subsequently overturned under P.L. 115-14 , pursuant to the Congressional Review Act. Not only did the regulations require that states identify programs that are \"effective,\" but among other things they required states to develop and report on specific indicators for assessing teacher preparation program performance, including the learning outcomes of students taught by program graduates. Further, under these regulations, IHEs operating a program that a state identified as low-performing or at risk of being low-performing for two out of three years would have lost their eligibility to participate in the TEACH Grant program. One argument made for limiting TEACH Grant eligibility to those programs that states identified as \"effective\" was that TEACH Grant recipients might be more likely to fulfill their service obligation if prepared by strong teacher preparation programs. In contrast, some arguments against limiting TEACH Grant eligibility included concerns about the decrease in the number of IHEs that would be eligible to provide TEACH Grants, which may result in fewer students pursuing teaching in high-need fields and low-income schools. It was also stated that such a change could disproportionately impact the entry of low-income students into the teaching profession. To address some of these issues, one legislative proposal would require that a qualifying teacher preparation program be one that is not identified by the state as low-performing or at risk of being low-performing. Given that under current law, states identify few teacher preparation programs as low-performing or at risk of being low-performing, this change could create a minimum standard that is tied to existing statute without implicating a significant number of programs. However, as with ED's 2016 regulations, it may be possible that such a change could limit the number of IHEs that qualify for the TEACH Grant program and, thus, disproportionately impact the entry of low-income students into the profession. To meet program service requirements, among other criteria, a TEACH Grant recipient must comply with the requirements for being a HQT, as defined under the ESEA. Prior to December 2015, the ESEA specified minimum standards for teacher quality by defining a HQT, requiring that all teachers of core subjects within any state receiving funds under Title I-A of ESEA meet these standards. In December 2015, the Every Student Succeeds Act (ESSA; P.L. 114-95 ) reauthorized the ESEA and repealed the HQT definition. Now, the ESEA, as amended by the ESSA, does not contain requirements pertaining to minimum standards for teacher quality like those formerly applicable to states receiving ESEA grant funds under NCLB-enacted HQT provisions. However, the ESSA amendments still made the pre-December 2015 HQT requirements applicable to the TEACH Grant program. Depending on whether states implement new minimum standards that veer from the previous HQT standards, TEACH Grant recipients may be required to meet both sets of requirements: meeting state requirements to teach within the state and federal requirements to fulfill TEACH Grant service requirements. It is unclear how the definition of HQT would apply to recipients who fulfill their service obligation in qualifying private schools. A recently concluded negotiated rulemaking resulted in draft consensus language that included a definition of HQT. While the new definition is nearly identical to the HQT definition in the NCLB, it also contains new requirements for private school teachers such as passing competency tests that are recognized by five or more states. Implementation issues relate to whether the way in which the TEACH Grant program is administered by ED may have impacted the program's success. They include challenges associated with certification of teaching service and the absence of a formal appeals process. Within 120 days of completing or ceasing enrollment in the relevant program of study, TEACH Grant recipients must provide an initial certification of their employment as a teacher in a qualifying teaching position or of their intention to obtain employment in a qualifying teaching position. Thereafter, a recipient must provide an annual certification of having completed or intending to complete (if the time in which it is possible to complete the required teaching service has not lapsed) qualifying teaching service. If certifying completed teaching service, the recipient must provide documentation that demonstrates that he or she (1) is teaching in a low-income school, (2) has taught a majority of classes during the year in a high-need field, and (3) meets HQT requirements. There are a number of issues that have stemmed from the requirement for annual certification, the administrative process by which recipients maintain their grant status. In its review of complaint data from ED's Federal Student Aid Ombudsman, GAO found that 64% of TEACH Grant recipients cited problems with submitting annual certification paperwork. The AIR study also found that 41% of TEACH Grant recipients whose grants have been converted to loans did not fulfill their service requirements due to factors related to annual certification. In particular, 19% did not certify because they did not know about the annual certification process and 13% did not certify because of challenges related to this process. The GAO study documented anecdotal evidence suggesting that students may not fully comprehend the paperwork requirements, despite the requirement that recipients undergo TEACH Grant counseling when each grant is disbursed and once recipients complete their program of study. Further, GAO found evidence suggesting that the ED-contracted loan servicer converted 2,252 grants in good standing to loans in error between August 2013 and September 2014. Of those erroneous conversions, 19% were converted because a recipient did not understand the terms of the grant and certification requirements, including paperwork needed to document teaching service, or the servicer provided \"inaccurate, unclear, confusing, or misleading\" information about program or certification requirements to the recipient. This lack of understanding and information about certification requirements may have significant consequencesâthe AIR study found that recipients whose grants had been converted to loans were half as likely as recipients whose grants were still in good standing to report that they were well-informed about the annual certification requirements. Recent news coverage has given attention to the TEACH Grant recipients whose grants were converted to loans due to a failure to certify on time, despite the fact that they had been performing qualified teaching. The failure to certify may occur for a number of reasons, from submitting the certification late to forgetting to submit the certification altogether. Certification documentation must be mailed or faxed, forms of communication for which it is difficult to verify whether the paperwork was received and on time. Additionally, the annual certification date often occurred over the summer when recipients or certifying school personnel are away on vacation. If recipients fail to certify on time, then all of their grants are converted into an Unsubsidized Direct Loan (which includes interest accrued since disbursement of each grant) regardless of whether they are performing qualified teaching service. However, until recently there had not been a formal process for a recipient to appeal such a decision (see \" Lack of a Formal Appeals Process \" below). To help address issues with certification, ED recently established a standardized annual certification date of October 31 of each year. Additionally, through negotiated rulemaking that concluded earlier this year, draft consensus language would require ED to provide additional notifications to recipients about when required certification documentation is due. Some legislative proposals would simplify the certification process by requiring that recipients only certify that they have completed qualified teaching for (1) at least one year by no later than five years after completion of their program of study; (2) at least two years by no later than six years after completion; (3) at least three years by no later than seven years after completion; and (4) at least four years by no later than eight years after completion. Otherwise, recipients would be considered in compliance with program rules unless they proactively request that their grants be converted to loans. Other bills require that ED work with states to simplify the certification process. One bill would establish the annual certification date as October 31 in law. The consequences of an erroneous or premature grant-to-loan conversion can be disruptive for recipients, including new and unexpected debt and a negative effect on their credit history. Some documentation also suggests that some recipients whose grants were converted into loans were unable to stay in their qualifying teaching positions, and instead had to change to a more lucrative position or other employment in order to make their new loan payments. Erroneous or premature grant-to-loan conversions have largely occurred in two types of circumstances. The first is when grants in good standing are converted to loans due to an administrative error. As mentioned above, GAO reported that from August 2013 through September 2014, ED discovered that 2,252 recipients had their grants converted to loans in error. Fifty-six percent of the errors occurred because the servicer did not give recipients the full 30 days from final notification to submit their certification. Another 15% of the erroneous conversions occurred because recipients were not given the full year from graduation to submit their certification. ED and the ED-contracted loan servicer have implemented changes to combat these erroneous grant-to-loan conversions resulting from administrative error. The loan servicer now conducts system checks and manually reviews all accounts flagged for conversion to determine if the recipient met certification requirements in accordance with regulation. ED also expanded the loan servicer's authority to reconvert loans to grants in certain circumstances without having to elevate disputes to ED. The second circumstance is when grants are converted to loans for recipients who are performing qualified teaching but fail to submit their certification paperwork on time, as discussed above. The extent of this problem is not known. Starting in January 2019, ED established a reconsideration process for anyone whose grant had been converted to a loan and who met or was on track to meet the TEACH Grant service requirements within the eight-year window. In February, ED emailed TEACH Grant recipients who were eligible for a TEACH Grant reconsideration. If a qualifying recipient did not receive an email from ED, he or she could still request a reconsideration by calling or emailing the ED-contracted loan servicer. The loan servicer makes a determination of whether a reconsideration request is accepted and to reconvert loans back to grants; however, it is unclear whether any other actions are taken such as helping to repair any damage to the recipient's credit as a result of the grant-to-loan conversion. As of May 2019, of the nearly 6,000 recipients who applied for reconsideration, about 38% had been approved for a reconversion and less than 0.3% had been denied. Other changes were proposed in negotiated rulemaking that concluded earlier this year. The resulting draft consensus language would not only establish a reconsideration process in regulation but would also require three other actions by ED as a result of an erroneous grant-to-loan conversion: (1) crediting any qualifying teaching service performed while the grant was wrongly in loan status toward the recipient's service requirement; (2) granting a suspension of the eight-year service obligation period equal to the amount of time that the grant was wrongly in loan status; and (3) providing support to help recipients repair any damage to their credit that resulted from the grant-to-loan conversion. Several bills propose to codify a formal appeals process in circumstances in which TEACH Grants were wrongfully converted to loans, and allow grants to be reinstated if an error was made. Additionally, one such bill proposes that, for grants that are found to have been erroneously converted into loans, ED would be required to extend the recipient's eight-year service obligation period by the amount of time his or her grants were wrongly in loan status. Apart from the legislative changes mentioned in the preceding sections, there have been a number of additional proposals concerning the TEACH Grant program. Most bills propose to keep but amend the program, while others would replace or repeal it. Some legislative proposals that would retain but amend the TEACH Grant program seek to allow partial payback of the award on a prorated basis based on the length of service completed for recipients who do not complete their full service requirement. The Noyce Scholarship currently implements this practice, and the Paul Douglas Teacher Scholarship program used it as well. This might lessen the risk to recipients of accepting the grant and, therefore, encourage more students to participate in the program and enter into teaching. It may also reduce the financial burden on those who had fulfilled some part of their service in a high-need classroom and field. However, one concern may be that this concession could detract from the program's overall goal to retain teachers in low-income classrooms and high-need fields, as there may be an incentive not to complete all four years of required service. In the 115 th Congress, one amendment proposed would have allowed teachers whose roles or duties change to continue to fulfill their required teaching service with such new roles or duties. This could include recipients who are promoted to leadership roles in which they might be spending more time supporting other teachers instead of in the classroom instructing. Under current regulations, a teacher must teach a majority of classes in a high-need field ânew roles or duties may not meet service requirements and a recipient may not be able to accept a new position or may have to find another qualifying position that meets service requirements. As research suggests, allowing opportunities for advancement may lead to greater retention rates amongst TEACH Grant recipients, potentially beyond the required four years. However, permitting other positions beyond teaching to qualify could detract from the overarching goal of recruiting and retaining high-quality individuals in the teaching profession. Alternatively, there have also been proposals to replace TEACH Grants and other student financial assistance programs for teachers with a new program altogether. One such proposal would have provided to teachers in qualifying positions a larger maximum loan repayment amount than is available under currently authorized federal teacher loan forgiveness programs, and in graduated amounts beginning with their first year and increasing the longer they stay in a qualifying position. One argument for such a proposal is that the current combination of approaches to student financial assistance programs for teachersâeither fully back-loading benefits (as with current teacher loan forgiveness) or fully front-loading benefits (as with TEACH Grants)âhas not been sufficient in incentivizing high-quality candidates to join and remain in the teaching profession. However, one consideration is that such a new program would likely result in an increased cost to the federal government. Several bills have proposed to eliminate the TEACH Grant program without creating a new program in its place. As justification for elimination, proponents have stated that because ED projects that the majority of TEACH Grant recipients will not be able to fulfill their service requirements, the program ultimately becomes a \"risky gamble\" for students, as they are more likely than not to incur a significant amount of debt as a result. ", "summary": "The Teacher Education Assistance for College and Higher Education (TEACH) Grant program is intended to encourage individuals to enter the teaching profession by providing recipients with grants of up to $4,000 annually to pursue coursework that leads to a certification in teaching. Congress authorized the TEACH Grant program in the College Cost Reduction and Access Act of 2007 ( P.L. 110-84 ) to address concerns about growing demand for high-quality teachers, especially in low-income schools. To be eligible for a TEACH Grant, among other requirements, a postsecondary student has to meet certain academic achievement requirements and be enrolled in a TEACH-Grant eligible program of study. The TEACH Grant program is the only HEA Title IV program with an academic merit requirement. As a condition of receiving a TEACH Grant, a recipient must complete four years of teaching in a high-need field and in a school that serves low-income students, within eight years of completing his or her program of study. If a recipient fails to complete the required teaching service, his or her TEACH Grant is converted into a Federal Unsubsidized Direct Loan, which must be repaid in full including interest that accrued since grant disbursement. To be eligible to disburse TEACH Grants, among other requirements, an institution of higher education (IHE) must provide a high-quality teacher preparation program that is either accredited by a Department of Education (ED)-recognized accrediting agency of teacher education programs; or is approved by a state, includes a minimum of 10 weeks of full-time pre-service clinical experience, and provides or assists in providing pedagogical coursework. Additionally, such teacher preparation programs must provide or assist in providing supervision and support services to program completers when they are working as teachers. Program administration tasks are divided among IHEs, ED, and the loan servicer with which ED contracts. IHEs award and disburse TEACH Grants to recipients, while the loan servicer performs day-to-day administrative tasks after a grant has been disbursed. ED oversees both the IHE's and the loan servicer's functions. Since the inception of the program, over 300,000 TEACH Grants, totaling nearly $938 million, have been disbursed. Based on a Government Accountability Office (GAO) analysis, the estimated take-up rate of TEACH Grants by the potentially eligible population in the 2013-2014 academic year was 19%. According to an American Institutes for Research (AIR) study, among TEACH Grant recipients who began their eight-year service period prior to July 2014, 63% saw their grants converted to loans as of July 2016. Several issues related to TEACH Grants may garner congressional attention. The bulk of these issues pertain to program design, including the extent to which the program successfully identifies individuals who commit to teaching, the size of the TEACH Grant benefit, challenges associated with finding and sustaining a qualifying teaching placement, teacher preparation program quality at IHEs that disburse TEACH Grants, and the continued application of the \"highly qualified teacher\" definition to the TEACH Grant program. Other issues are related to program implementation, such as challenges associated with certification of teaching service and the absence of an appeals process. Lawmakers may also wish to consider other changes that have been proposed since the TEACH Grant program was authorized. Some of these include permitting partial payback of TEACH Grants converted into loans that is prorated based on the length of service fulfilled for recipients who do not complete the service requirement, allowing teachers whose roles or duties change to continue to fulfill their required teaching service with such new roles or duties, or replacing or sunsetting the program altogether.", "document_type": "crs"}
{"report": "Since the novel coronavirusâdesignated Coronavirus Disease 2019, or COVID-19âfirst appeared in the United States in mid-January, it has contributed to substantial economic upheaval across the U.S. economy, including the agricultural sector. In response to the COVID-19 pandemic, Congress has passed and the President has signed four supplemental appropriations acts ( P.L. 116-123 , P.L. 116-127 , P.L. 116-136 , and P.L. 116-139 ) that have included both direct and indirect funding for the U.S. agricultural sector. Using funds from these acts and from other authorities, the U.S. Department of Agriculture (USDA) announced, on April 17, 2020, the Coronavirus Food Assistance Program (CFAP), valued at $19 billion, to provide immediate financial relief to farmers, ranchers, and consumers in response to the COVID-19 national emergency. USDA could provide additional financial assistance for the U.S. agricultural sector beyond CFAP later in the summer when a replenishment payment of $14 billion for the Commodity Credit Corporation becomes available. Congress is also considering providing additional support. This report describes some of the actions that USDA has taken in response to the COVID-19 emergency, including CFAPâin particular, how CFAP is funded and how USDA intends to use the funds. The description of USDA COVID-19 response efforts is preceded by: first, a brief review of food supply chain issues where the U.S. agricultural sector has experienced economic harm or is potentially vulnerable to the effects of the COVID-19 pandemic; and second, a review of current assessments of the economic harm to U.S. farm income, as well as to individual commodity sectors, resulting from COVID-19. The report then describes the emergency funds that have been allocated to address the U.S. agricultural sector, and how USDA plans on using those funds, including a detailed description of CFAP producer payments, and USDA's food purchase and distribution efforts. This is followed by a review of the announced positions for selected U.S. agricultural stakeholders in regard to how the COVID-19 pandemic has affected their industries, what their anticipated losses might be, and what their expectations are vis-Ã -vis congressional funding and USDA's announced program response. Finally, several issues related to CFAP and the U.S. agricultural sector in a post-COVID economy that could be of potential interest to Congress are presented at the end of this report. An appendix at the end of the report includes a table ( Table A-1 ) that summarizes estimatesâfrom selected studiesâof the economic damage to several major agricultural sectors of the United States due to the COVID-19 emergency. As COVID-19 has spread throughout the United States, it has reduced domestic economic activity and disrupted domestic and international supply chains for goods and services, including food and agricultural products. These disruptions have produced an immediate and very strong demand shock on the U.S. food supply chain. In particular, the abrupt shutdown of much food service and institutional buying has affected commodity prices throughout the food supply chain. On the supply side, there is no food shortage in the United States. Supplies for most commodities remain relatively abundant; however, inflexibilities in the food supply chain (from food product specialization targeting food service and institutional markets that have closed, to pandemic outbreaks at processing plants) have resulted in bottlenecks that have left many farmers with unmarketable surpluses, while some retail outlets have experienced temporary shortages of various food and agricultural products. During the early weeks of shutdown in March and April, many grocery stores had empty shelves for basic staples such as pasta, rice, sugar, and flour, as well as frozen ready-to-eat foods, household cleaning products, and toilet paper. This was the result of a temporary surge in consumer food stockpilingâmuch of it in the form of panic buying and potential hoardingâthat occurred in March when consumers worried that they might be locked down in their houses for weeks or months. This type of shortage is temporary. Eventually the existing supplies of foodstuffs and other household products work their way through the food supply chain and restock the grocery store shelves. The temporary shortage occurred due to two primary factors. First, consumers had been getting a significant share (54%) of their food from restaurants and other away-from-home venues. All of this demand was suddenly diverted to grocery stores and retail outlets almost overnight. This switch is not simply a matter of redirecting truckloads of products away from institutional buyers towards retail outlets, but also of transforming many products from bulk or vendor-ready forms to consumer-ready forms in smaller packages with new product labelling. Furthermore, truckers would now be making many stops for smaller deliveries to retail outlets along their routes, rather than a few stops to large buyers. All of this would require re-engineering of the food supply networks that ultimately may be temporary once the pandemic eases. Second, much of the food supply chain operates on a \"just-in-time\" principle to minimize costs associated with storage and waste of products. Under this principle, many processing plants and transportation routes are designed to operate near full capacity on a routine basis in expectation of slow, steady demand and to avoid the cost of idled resourcesâthis is particularly true for food products and other items like toilet paper that normally do not experience large fluctuations in demand over time. Thus, not all production processes can ramp up on short notice to meet unexpected surges in demand for their products, or to suddenly alter the product form, packaging, labeling, and shipping methods. As a result, shortages due to consumer stockpiling create bulges in the supply chain that may take weeks or months to eliminate as the food supply chain re-engineers itself in response. U.S. and global supplies of major agricultural commodities are in a state of relative abundanceâthanks to large harvests over the past several yearsâwhich has kept market prices at relatively low levels for the past five years. The surplus supply situation has been compounded by the ongoing trade dispute between the United States and China, which disrupted traditional trade patterns and contributed to lower trade levels (and greater than expected U.S. stock levels) for several major commodities in the second half of 2018 and 2019. Globally, the Food and Agriculture Organization (FAO) of the United Nations reports that stocks for many major agricultural commoditiesâincluding wheat, rice, corn, barley, coffee, sugar, butter, cheese, palm oil, soybean oil, poultry, and porkâare at or near 20-year highs. A similar situation exists within the United States. On April 9, 2020, USDA reported that the major U.S. grain and oilseed crops, as well as upland cotton, all had relatively large end-of-year stocks levels last fall (2019) to carry into this year. On April 22, 2020, USDA reported abundant supplies of meat, dairy, fruit, vegetable, and tree nut products in cold storage. Similarly, USDA reports that hog and poultry populations in the United States are historically large, while the cattle population has rebounded from its low point in 2014. In addition, USDA reported that for 2020, U.S. farmers intended to increase corn and soybean planted acres by 8% and 10%, respectively, while adjusting wheat (1%) and cotton acres (<1%) down slightly from 2019. If such large planted acres are realized, under normal weather conditions, they could produce bumper crops and further expand domestic supplies. According to news reports, Secretary of Agriculture Sonny Perdue has said that consumers should not worry about a shortage of food, saying the supply chain is just mismatched. Although demand has surged at the retail level in response to the pandemic, demand from restaurants, cafeterias, sports venues, and tourism has plummeted. The food supply chain refers to the path that raw agricultural commodities take from the farm where they are produced, through the food processing and distribution network to the consumer where they are used. The domestic food supply chain has the potential to break down at any of a number of different points: availability of inputs and labor for agriculture production; trucks and truck drivers for transporting raw and finished products; food processing plants, plant workers, and food safety inspectors; packaging, warehousing, and storage capacity; and wholesale and retail outlets and their workers. For exported products, the supply chain includes containers, ships, crew, and port workers. There is a finite supply of trucks, railcars, and shipping containers, and they may not be situated where they are needed when a temporary surge in demand occurs. Labor shortages at any point along the supply chain can lead to bottlenecks, delays, and regional shortages. Similarly, there is a finite supply of warehousing and cold storage (i.e., refrigerated and frozen) space, which may contribute to temporary regional shortages. With respect to COVID-19's impact, supply chain disruptions have been primarily due to two factors: widespread shutdowns of all but essential businesses; and uncertainty about the availability of labor for the food distribution network, from farms to retail outletsâwhether from illness, fear of illness, or immigration status. The first effect of the COVID-19 pandemic on agricultural producers occurred when many states and municipalities closed schools and instituted economy-wide shutdowns of all but essential businesses. The wholesale and retail food distribution network has been deemed essential; however, many institutional purchasers of agricultural products (often referred to as the food services sector, including restaurants, hotels, schools, and entertainment venues) have been closed. According to USDA, U.S. consumers normally spend 54% of their food and drink dollars on away-from-home food purchases. Thus, a large share of U.S. food products traveling through the food supply chain was going to the food services sector, often in bulk or vendor-ready form, for away-from-home consumption. In order to redirect this food product flow towards retail outlets and at-home consumption, much of it would require processing into consumer-usable quantities and forms, requiring repackaging, and relabeling. This requires some level of retooling by food packagers and processors. As a result, the near total stoppage of institutional food purchases contributed to sharp declines in the prices of affected commodities ( Figure 1 ), and led to unanticipated conditions of oversupply from commodities that could no longer move through the food supply chain and were, instead, backing up to the farms that produced them. This left many agricultural producers with excess supplies of perishable productsâincluding fruit, vegetables, milk, and market-ready livestockâthat are not easily diverted to alternate uses or retail outlets. In the interim, the temporary glut of perishable products with nowhere to go has led to news reports of producers dumping fresh milk, burying truckloads of raw onions, plowing fields of ripe vegetables back into the ground, and more disturbingly, depopulating millions of market-ready hogs and poultry. The surplus of perishable, unsold commodities worsened starting in mid-April, when a surge in COVID-19 infections among workers in meat packing plants and other food processing plants led to multiple plant closures, and contributed to both animal surpluses on farms and public concerns about the reliability of the nation's food supply. Agriculture has been classified by the federal government as a critical industry that must remain operating, even as much of the rest of the country shuts down to help contain the virus' spread. However, labor shortages at any stage of the supply chain can create temporary food product shortages in affected markets. If labor shortages become severe, they could lead to wider multi-state, and possibly national, food shortages of affected products. Many fruit and vegetable production activities are labor-intensive and require an adequate work force at key points in the products cycleâparticularly at harvestâto successfully bring the crop to market. In addition, the U.S. agricultural sector relies on a large workforce to operate the production lines in food processing plants, including meat packing plants, as well as fruit and vegetable wholesale and distribution networks. This labor force performs supply chain activities including production, transportation, processing, warehousing, packaging, and retailing. Many of these supply chain activities cannot be automated or done remotely, but rely on workers being on site. For example, USDA reports that more than 1.5 million people worked in food processing in the United States in 2016. Meat processing, which tends to be more labor intensive than other parts of the food sector, accounted for 500,000 of those employees. Workers that are still planting and harvesting crops, or standing on an assembly line in a meat packing plant, during the coronavirus outbreak have a high risk of being infected with the disease given that they live, work, and travel in crowded conditions, and most do not have health care or paid sick leave. Another labor-intensive component of the food supply chain is federal safety inspection, which is undertaken by about 8,000 USDA safety inspectors stationed at every agricultural manufacturing facility throughout the country, as well as about 3,800 safety inspectors from the Food and Drug Administration (FDA). As the food distribution network shifts more food products away from institutional outlets to grocery stores, labor at the retail level has come under greater stress. Many grocery stores have begun implementing preventative measures, like reducing hours to give staff time to rest, clean, and stock shelves, while limiting exposure to customers. All of these COVID-19 related measures tend to slow the food supply chain's throughput rate and thus have prolonged the period of empty or partially filled grocery store shelves. Starting in mid-April, a surge in infections among workers in meat packing plants and other food processing plants led to multiple plant closures and contributed to unexpected surpluses of ready-for-market hogs, cattle, and poultry at the farm level. As of May 1, news sources reported that at least 20 meatpacking and 5 food processing plants had been closed. Due to a high degree of consolidation in the meat processing industry, a shutdown of four or five big plants could impact retail supplies. On May 1, the Centers for Disease Control and Prevention (CDC) reported that 115 meat and poultry processing plants (with over 130,000 workers) had a combined 4,913 workers with confirmed cases of COVID-19, including 20 that had died from COVID-19. Meat processing plant closures have two opposing effects: on the one hand, demand for livestock in the surrounding region is reduced and this tends to depress cash and futures prices, lowering prices that producers receive and that packers pay for market-ready livestock; on the other hand, the supply of consumer-ready product is reduced, which tends to raise wholesale and retail prices for the affected products. As evidence of this, USDA has reported a widening price gap between farm and wholesale prices for beef. On April 22, news sources reported that, with the closure of Tyson's pork processing plant in Waterloo, IA, about 15% of total U.S. pork processing capacity was off line. According to an official with the Commodity Futures Trading Commission's (CFTC's) Livestock Marketing Task Force, most plants that were still open during this same period were operating at only 50% to 75% of normal production due to employee absenteeism. Furthermore, the CFTC official noted that U.S. pork processing plants normally handled about 2.5 million hogs per week, but that slower operating line speeds had reduced that number to 2.1 million hogs, implying that an additional 400,000 market-ready hogs had to stay on the farm each week. By May 1, weekly hog slaughter had fallen to 1.5 million, implying that nearly a million hogs per week were backing up to the farm. On April 28, President Trump signed an executive order using authority under the Defense Production Act (DPA) of 1950, as amended (50 U.S.C. 4501 et seq.), and Section 301 of title 3, United States Code, to order the Secretary of Agriculture to take all appropriate action to ensure that meat and poultry processors continue operations consistent with the guidance for their operations jointly issued by the CDC and Occupational Safety and Health Administration (OSHA). Two issues associated with the reopening of closed plants are the availability of personal protective equipment (PPE) for plant workers, and the liability associated with hospitalization costs and/or deaths of infected plant workers. On April 30, Secretary Perdue stated that USDA will ask meat processors to submit written plans to safely operate packing plants and review them in consultation with local officials. Perdue said that USDA will work collaboratively with companies and state and local officials to set safety standards based on guidelines for workers released by the CDC and OSHA, and that USDA was working to insure the availability of the necessary PPE for plants to operate safely. The Secretary also said that President Donald Trump's executive order to open the plants will not remove legal liability, but that the CDC protection guidelines will give meat plants \"a defensible answer\" should they be sued, as long as they follow the guidance. Since mid-February, prices for many major agricultural commodities have plummeted ( Figure 1 ). Commodity market price declines have been led, in part, by a precipitous fall in the price of crude oil (down 67% between January 2 and April 15), which feeds back into the U.S. market for ethanol and corn, and subsequently through the expanded market for livestock feedstuffs. Prices for the livestock sectorâcattle, hogs, poultry, and dairyâwere hit particularly hard by the sudden economic shutdown and the associated dilemma of what to do with market-ready livestock, and because of the difficulty in diverting product from restaurants to retail outlets. During the January 2 to April 15 period, prices for lean hogs were down by 53.2%, live cattle 25.1%, and milk 20.6%. The cotton and textile industries were negatively impacted by the widespread shutdown of retail businesses. Demand for clothing and apparel dropped precipitously with the economic closure. This fed back into a collapse of demand that affects manufacturers, which affects cotton mills, and finally to contracts for cotton being canceled. U.S. cotton prices dropped by over 25% between January 2 and April 15 ( Figure 1 ). USDA's Foreign Agricultural Service (FAS) reduced its forecast for global cotton consumption for 2020 by 6.4%. According to FAS, spending on clothing is highly correlated to changes in GDP, and most economic forecasters are expecting strong declines in global GDP in the first half of 2020. Reduced travel, slowing economic activity, and petroleum-product demand suppression related to the COVID-19 outbreak, combined with announced plans to increase crude oil supplies by Saudi Arabia and Russia in mid-April, contributed to the severe decline in crude oil prices. Low oil prices contribute to lower agricultural prices via a strong biofuels link between the two sectors. Corn is both the world's foremost livestock feed grain and the principal feedstock in the production of the biofuel ethanol. Ethanol is blended with gasoline in the United States (at about a 10% share) for use in automobiles and light trucks. Thus, declining fuel demand contributes directly to falling prices for gasoline, ethanol, and corn. Ethanol prices fell by nearly 33% from January 2 to April 15 ( Figure 1 ). As of April 21, news sources report that nearly 30% of the nation's 204 biofuel plants have been idled since March 1, while many others have reduced their production volumes. By April 25, the Renewable Fuels Association reported that about 46% of ethanol production capacity was idled. Furthermore, the prices of nearly all feed grains and oilseeds produced in the United States move in tandem with corn prices since they all compete for the same feed markets in consumption and farmland in production. Thus, this combination of the COVID-induced sudden disruption of normal agricultural demand and use, slowing U.S. and global economic activity, and sharply lower oil prices have placed strong downward pressure on commodity prices in international markets since the start of 2020. On top of these domestic disruptive factors, international markets for some major food items, such as rice and wheat, have experienced trade disruptions due to threats or actual imposition of protectionist policies on exports of major food products in certain important producer countriesâincluding Russia (the world's leading wheat exporter), Kazakhstan, and Vietnam. According to the World Trade Organization (WTO), 80 countries and customs territories so far have introduced export prohibitions or restrictions as a result of the COVID-19 pandemic. In response, the United States, China, the European Union, and other members of the WTO representing over 60% of world agricultural exports pledged to refrain from imposing restrictions on the free flow of food out of their countries. By threatening to limit supplies to international markets, these protective policies have actually been supportive of rice and wheat prices in international markets ( Figure 1 ). Since January, the nearby futures contract price for rough rice on the Chicago Board of Trade has actually risen by 7%, while the contract for wheat has fallen by 4%, unlike corn and soybean prices that have fallen 20% and 13%, respectively. U.S. policymakers and business interests are concerned that the COVID-19 pandemic will inflict widespread economic harm on the U.S. and global economies. It is still too early to make any definitive statements about what the eventualÂ economic impacts will be on the U.S. economy or the agricultural sector, since it is unknown how long the disease will persist and what shape the economic recovery might take. For example, will the overall impact be V-shaped with a quick outbreak followed by a quick recovery, or will it be L-shaped with an elongated tail representing a slow recovery and a gradual reopening of businesses and retail outlets? Or be W-shaped if the virus recycles and re-emerges later in the summer or fall in a more virulent formâas did the H1N1 pandemic in 2009, or the 1918 flu pandemicâthus, causing a new round of shutdowns and economic closures? As commerce slows, economic output is expected to follow with projections of a significant contraction in U.S. gross domestic product (GDP). On April 29, the Bureau of Economic Analysis (BEA) reported the U.S. GDP (adjusted for inflation) had decreased by 4.8% during the first quarter of 2020. Many major financial institutions have also issued preliminary assessments of the economic impact of the COVID-19 pandemic with dire predictions. For example, in March, JP Morgan predicted a 25% decline in 2 nd quarter U.S. GDP. The International Monetary Fund (IMF), in early April projected that the U.S. GDP would decline by 5% during 2020 (down 7.9 points from its January 2020 pre-COVID forecast of 2.9% growth). The IMF also forecast that global GDP would decline by 3% (-6.3 points from January), and major economies would also see strong declines in GDP including the Euro-zone (-7.5%, -8.8 point from January), and Japan (-5.2%, -4.8 points from January). On April 24, the Congressional Budget Office (CBO) released an update to its long-run baseline projection for the U.S. economic outlook that included a preliminary assessment of the economic impact of the COVID-19 pandemic. CBO projected that the U.S. economy will experience a sharp contraction in the 2 nd quarter of 2020âinflation-adjusted GDP is expected to decline by about 12% during the 2 nd quarter, equivalent to a decline at an annual rate of -40% for that quarter. CBO also projected a 2.8% increase in real GDP in 2021. In addition, the U.S. unemployment rate is expected to average 11.4% for 2020 and 10.1% for 2021, consistent with CBO's current projection for a slow economic recovery. Between March 14 and May 7, over 33 million American workers have filed first-time claims for unemployment benefits, according to the seasonally adjusted numbers of the U.S. Department of Labor. According to news sources, numbers at that level indicate that over 20% of the U.S. labor force is suffering from layoffs, furloughs, or reduced hours during the coronavirus pandemic. In addition to reflecting the strong likelihood for high unemployment and impactful declines in consumer incomes through 2020, these forecasts also have important implications for the rural, off-farm economy that so many farm households depend on (as described below). Several industry groups from the U.S. agricultural sector have released estimates of the economic damage experienced by producers and ranchers. Most of these early assessments are limited to evaluating the effect of the price decline on any unsold production of crops or livestock remaining under farmers' control, and the unexpected marketing costs of unsold products due to the shutdown of most institutional buying of agricultural products. Several of these damage assessments are summarized in Table A-1 . The livestock sector appears to be the hardest hit, as hog and cattle prices have dropped by 53% and 25% from January into mid-April, thus generating large sectoral losses estimated at $13.6 billion to $14.6 billion for the cattle/beef sector, and $5 billion for the hog sector. Early estimates of dairy sector losses exceed $8 billion, while the fresh produce sector losses are estimated at $5 billion. Other major commodity sector losses include corn ($4.7 billion to $6 billion), soybeans ($2 billion), cotton ($610 million to $3.5 billion), and the sheep and wool sector ($300 million). The ethanol sector has not reported an overall dollar loss estimate, but reports that nearly 46% of its production capacity is offline (the United States produced 15.8 billion gallons of ethanol in 2019) and the price of ethanol has fallen by almost 33% ( Figure 1 ). Prices for several, but not all, of the affected commodities have turned upward slightly since mid-April when USDA's assistance program was announced. Corn prices are the most notable exception as they have continued their decline through the end of April. The corn price decline is partially driven by the catastrophic near collapse of the U.S. ethanol sector. Corn is the primary feedstock for U.S. ethanol productionânearly 38% of annual U.S. corn production is consumed by the ethanol sector. USDA's most recent U.S. farm economic outlook for 2020 (released on February 5, 2020) did not include the market effects of the COVID-19 pandemic. USDA is not expected to release its next U.S. farm income projections until September 2, 2020. However, the Food and Agricultural Policy Research Institute (FAPRI), at the University of Missouri, released a preliminary assessment of the impact of COVID-19 on the U.S. farm income outlook in April. FAPRI's preliminary projections assume a V-shaped recession where the market recovers quickly; market outcomes are driven largely by GDP and commodity price declines, and the supply chain disruptions described earlier in this report are not included in the analysis. Macro factors include an inflation-adjusted 5% decline in consumer expenditures from FAPRI's January pre-COVID baseline projections, and a 10% decline in gasoline use. Under these assumptions, FAPRI projects substantial price declines for all major grain, oilseed, and livestock commodities in 2019/20 and 2020/21, which result in large declines in farm revenueâincluding -$11.9 billion in crop and -$20.2 billion in livestock cash receipts ( Table A-1 ). The revenue declines are partially offset by declines in production expenses (-$11.3 billion) and an increase in farm program payments (+$2.3 billion) under the Agricultural Risk Coverage (ARC) and Price Loss Coverage (PLC) programs. However, the sum of the projected changes is for a large decline in U.S. net farm income of -$20 billion for 2020 (down from FAPRI's January forecast of $99 billion in 2020 net farm income, and compared to $95.3 billion in 2019). FAPRI does not include any payments under USDA's proposed CFAP. Although preliminary, FAPRI's early projections are indicative of the potentially large impact that COVID-19 may have on the U.S. agricultural sector. The COVID-19's economic impact is expected to vary across commodity sectors and regions based on the extent of price declines across commodities, the seasonality of production cycles, and off-farm work opportunities, as well as each household's level of near-term debt, tenure status, asset valuations, and other economic factors. Thus, each farm household's situation may be unique. This section briefly describes where COVID-19's economic impact may be felt most immediately. The potential impact on the farm household credit situation is not discussed here. If the economic impact of COVID-19 persists into 2021, a broader range of economic factors are likely to be impacted, such as asset valuations and bankruptcies. The principal market effects to date of COVID-19 have been the commodity price declines experienced in early 2020 ( Figure 1 ), as well as lost sales and the costs associated with unexpected surplus animals, grains, and oilseeds held by farmers. The price declines, in particular, can have several potential effects on farm household income, including the selling prices for 2019 crops still held in on-farm inventory; farm program payments for the 2019 crops under the marketing assistance loan (MAL), ARC, and PLC programs; prices and crop insurance payments for the 2020 crop; farm program payments for the 2020 crops under MAL, ARC, and PLC; and changes in input prices. The sharp drop in commodity prices is expected to result in reduced farm household revenue. Revenue losses are expected to be partially offset by both increases in government payments under traditional farm revenue support programs (which are available for about two dozen designated program crops) and crop insurance, and by reductions in input expenses. However, the net effect is expected to be an overall decline in farm revenue compared with 2019. For farm operations carrying above average levels of debt, the restricted cash flow can cause severe financial stress. The emergency-response payment and purchase program announced by USDA (described below) is intended to help address, at least partially, the revenue decline and tightening cash flow situation for a wider array of farm households than usually receive government payments. The drop in prices for major farm commodities in early 2020 ( Figure 1 ) suggests that farm revenues are likely to decline. However, of perhaps greater consequence to farm households has been the blow to off-farm income from the widespread economic shutdown and increases in unemployment. On average, 82% of farm household income comes from off-farm revenue sources. As a result, the cash flows of farm households have been diminished from both the on-farm and off-farm effects of the COVID-19 pandemic. Another blow to the rural economy is the strong decline in tax revenues, fees, and other sources of income, which hampers the ability of state and local governments to respond to the developing crisis through local programs and initiatives. This section reviews federal supplementary funding appropriated for assistance to the U.S. agricultural sector in response to the COVID emergency, and the USDA programs that were initiated with that supplementary funding. In addition to the supplementary funding, USDA announced that it was increasing certain flexibilities and extensions in several of USDA's farm programsâmany authorized by the 2018 farm bill ( P.L. 115-334 )âas part of its effort to support the food supply chain. Also, USDA has established a \"Coronavirus Disease (COVID-19)\" web page that assembles information from a broad range of agriculture-related topics and issues, including the expanded program flexibilities. The website includes \"Frequently Asked Questions (FAQs)\" for several prominent issues and agencies, links to additional resources, and a USDA COVID-19 Federal Rural Resource Guide. In March and April 2020, Congress passed and the President signed four supplemental appropriations acts in response to the COVID-19 pandemic: Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ); Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ); Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ); and Paycheck Protection Program and Health Care Enhancement Act ( P.L. 116-139 ). These acts provide over $36 billion of new appropriations and policy changes in the jurisdiction of the Agriculture appropriations subcommittees, including nearly $10 billion for agricultural assistance, about $26 billion for nutrition assistance programs, and $163 million for the Food and Drug Administration. The CARES Act provides $9.5 billion for USDA to \"support agricultural producers impacted by coronavirus, including producers of specialty crops, producers that supply local food systems, including farmers' markets, restaurants, and schools, and livestock producers, including dairy producers.\" This approach provides funding to the Secretary of Agriculture with general authority to respond to a crisis, and therefore is similar to emergency appropriations for wildfires and hurricanes in 2018 and 2019 in which USDA was tasked to develop a payment program from a general appropriation. The CARES Act also replenishes up to $14 billion of funding availability for the Commodity Credit Corporation (CCC). The CCC operates with a $30 billion line of credit with the U.S. Treasury. In April 2020, USDA said that the CCC's borrowing authority was becoming low and that about $6 billion remained after having paid regular farm bill obligations and the final tranche of the 2019 Market Facilitation Program. The $14 billion in the CARES Act is not new spending; rather, it would reimburse the CCC for past spending. After the funds are transferred, which requires waiting for a June 2020 financial statement, the CCC would have renewed access to more funding for future obligations. For flexibility in the regular farm commodity support programs, the CARES Act allows Marketing Assistance Loans in FY2020 to be repaid over 12 months (rather than the usual nine months) to provide producers with flexibility in responding to disruptions. Access to food has been a concern during the pandemic, particularly in light of school closures. Rising unemployment may increase participation in the Supplemental Nutrition Assistance Program (SNAP) and other food assistance programs such as The Emergency Food Assistance Program (TEFAP), which provides aid to food banks and other emergency feeding organizations. Financial assistance through SNAP benefits or in-kind assistance through TEFAP may increase demand for agricultural products. The FFCRA and the CARES Act provide a total of $26 billion for various nutrition assistance programs and give USDA certain temporary flexibilities to increase program access and accommodate social distancing. This includes $850 million for TEFAP, which is to increase USDA commodity purchases for food distribution. The FFCRA has language that, \"During fiscal year 2020, the Secretary of Agriculture may purchase commodities for emergency distribution in any area of the United States during a public health emergency designation\" (Â§1101(g)). CBO did not score this provision. USDA is using this authority for a $3 billion commodity purchase and distribution (\"Farmers to Families Food Box\") program (described later in this report). CBO estimated that SNAP policies in the FFCRA will increase mandatory spending by more than $21 billion over FY2020-FY2021, which is subject to appropriation and for which the CARES Act provides some funding. For rural development, the CARES Act provides $146 million, including $100 million for rural broadband grants, $25 million for rural telemedicine and distance learning, and $20.5 million to support rural business loans. For USDA agency operations, the CARES Act provides $141 million to six USDA agencies or offices. This includes $55 million for the Animal and Plant Health Inspection Service (APHIS), $45 million for the Agricultural Marketing Service (AMS), $33 million Food Safety and Inspection Service (FSIS), $4 million for the Foreign Agricultural Service (FAS), $3 million for the Farm Service Agency (FSA), and $750,000 for the Office of the Inspector General (OIG). The APHIS and AMS amounts are to replace user fee revenues that are expected to decline due to reduced air passenger traffic (APHIS) and because of reduced grading, inspections and audit services (AMS). The amounts for FSIS and FSA are to support temporary employees and adjustments to respond to COVID-19 workload demands. FAS received funding to repatriate staff from foreign postings during the pandemic. Other provisions in the CARES Act outside the jurisdiction of agriculture appropriations may have provided loans and grants to certain agriculture-related businesses, such as through the Small Business Administration (SBA), or to individuals through stimulus checks. Prior to enactment of P.L. 116-139 , the SBA reported that agricultural, forestry, fishing, and hunting businesses received $4.37 billion of Paycheck Protection Loans. On April 17, 2020, Secretary of Agriculture Perdue announced the Coronavirus Food Assistance Program (CFAP), valued at $19 billion, to provide immediate financial relief to farmers, ranchers, and consumers in response to the COVID-19 national emergency. According to Secretary Perdue, CFAP will include $16 billion in direct payments to producers that have been impacted by the decline in commodity prices and the disruption in food supply chains related to COVID-19, and $3 billion in commodity purchases for distribution through food banks, faith-based organizations, and other nonprofit organizations. Direct payments are intended to partially offset the loss of market revenue from the price decline, and the unexpected carry-cost of unsold commodities for producers and ranchers of products that have been negatively affected by COVID-19. Commodity purchase and distribution programs serve the dual roles of supporting commodity market prices by temporarily increasing demand, and of expanding the availability of food to consumers who have lost their jobs or have limited resources. CFAP funding is from three primary sources: the FFCRA, the CARES Act, and existing USDA authorities under the Commodity Credit Corporation (CCC) Charter Act. In particular, Senator Hoeven, Chairman of the Senate Agriculture Appropriations Committee, stated that the $16 billion designated for the direct payments program derives from the $9.5 billion emergency program spending authorized by the CARES Act and an existing $6.5 billion balance in the CCC. The $3 billion for the commodity purchase portion of CFAP derives from the FFCRA (Â§1101(g)) that authorizes USDA to purchase commodities for emergency distribution in the United States. USDA has released limited information to date on the specifics of how CFAP will be implemented; however, information released by Senator Hoeven's office, coupled with news sources that have gleaned pieces of program information from USDA sources, could provide some context for understanding how CFAP's direct payments program may unfold. Senator Hoeven's press release says that the $16 billion is to be allocated across four different commodity groupings as follows: livestock ($9.6 billion or 60%); row crops ($3.9 billion, 24.4%); specialty crops ($2.1 billion, 13.1%); and \"other\" crops ($500 million, 3.1%) ( Figure 2 ). Direct payment spending under the livestock category would be further delineated as $5.1 billion for cattle, $2.9 billion for dairy, and $1.6 billion for hogs. To be eligible for CFAP direct payments, farmers and ranchers must produce commodities that have experienced at least a 5% price decrease between January and April of 2020. The specific prices and dates to be used for this calculation have not yet been announced, but using nearby futures contract prices as a guide would suggest that many commoditiesâincluding hogs, cattle, cotton, milk, corn, and soybeansâwould relatively easily meet the 5%-decline threshold ( Figure 1 ). Also, the \"other\" category was not specifically defined, but is expected to include commodities such as horticulture, hemp, sheep and goats, or any other commodity where a producer can show a revenue loss associated with at least a 5% price drop since January. USDA has said the direct payments to producers will be based on estimated losses as measured by both: (a) market price declines, and (b) additional marketing costs associated with the unexpected oversupply of unsold production in calendar 2020. Under this structure, CFAP direct payments would be directly proportional, or \"coupled,\" to actual production. Determination of the payment amounts and delivery mechanisms may develop similarly to the three tranches associated with payments under the Market Facilitation Programs (MFPs) in 2018 and 2019. The payments are to represent the summation of the two different loss measures described above: First, payments, according to Senator Hoeven's news release, are to cover the market price declines of greater than 5% that occurred between January 1, 2020, and April 15, 2020. The payment is to equal 85% of the lossâsome policy analysts think that the loss could be calculated using some measure of the price decline times the normal volume of the commodity marketed during that period. Second, payments to cover future marketing losses from unsold product. This additional cost is valued as 30% of the expected losses from April 15 through the next two quarters (i.e., six months) or until mid-October. Again, the expected loss would most likely be calculated using some measure of the price decline times the normal volume of the commodity marketed during that period. For its part, USDA has not provided details on: which prices will be used in the formula (such as local elevator prices, regional wholesale prices, or nearby futures contract prices); how the price decline will be measured (that is, will two specific dates be used, or will representative averages of prices in January and April be used); or how the share of production, characterized as \"routine marketing for the relevant period\" and eligibility for payments, will be measured. Many of the program specifics are expected to be delineated in rulemaking. Since enforcement of social distancing remains in effect for the foreseeable future, producers may be asked to self-certify their losses. If so, producers will need to save records and paperwork to demonstrate losses, especially producers that have destroyed their product (e.g., dumping of milk or plowing under specialty crops). It is expected that producers will be compensated for \"dumped\" milk, but whether compensation may be provided for depopulated (i.e., euthanized) livestock and poultry is uncertain. Furthermore, CFAP direct payments are expected to be limited to cover producers who own the commodity or product, thus animals raised under contact are not expected to be covered. USDA is expediting the rulemaking process for the direct payment program and expects to begin sign-up for the new program in early May. CFAP direct payments are expected to be issued to producers by the end of May or early June. According to the Senator Hoeven press release, payment limits are expected at $125,000 per commodity grouping (livestock, row crops, and specialty crops), with an overall limit of $250,000 per individual or entity. Neither the CARES Act nor the underlying CCC authority requires payment limits. Applying payment limits at this point would be at USDA's discretion, as it chose to do when establishing the MFP and Wildfire and Hurricane Indemnity Program (WHIP) programs that were undertaken at the Secretary's discretion. The American Farm Bureau Federation expects that benefits received under traditional farm support programs such as ARC and PLC will not be added to CFAP payments when evaluating payment limits. In other words, payment limits for CFAP are expected to be independent of other farm program benefits received by a farm. In the press release that announced the CFAP, USDA designated $3 billion for a commodity purchase and distribution program. In subsequent announcements, the program has been called the USDA Food Box Distribution Program, and the USDA Farmers to Families Food Box Program. The intention is to capture some of the supply chain and market disruption caused by the closure of restaurants, hotels, and other food service entities. Under the program, agricultural products are to be purchased from farmers and processors to support agricultural markets and reduce food waste. Products are to be distributed to food banks and other nonprofit organizations that serve those in need. This program is operated differently than, and separately from, existing USDA commodity purchase programs such as Section 32, TEFAP, and other Food and Nutrition Service (FNS) food distribution programs. However, food banks, school food authorities, and other nonprofits that participate in other FNS programs are to be eligible to receive food boxes through the USDA Farmers to Families Food Box Program. USDA plans to purchase about $100 million per month of fresh produce, $100 million per month of dairy products, and $100 million per month of meat products (chicken and pork). Because of the potential for food waste (lack of marketing options for ripe produce, dumping expressed milk, and euthanizing market-ready livestock) and high demand for food bank distribution during this pandemic discussed earlier in this report, USDA is expediting this purchase program relative to its usual commodity procurement and distribution timeline. Usually, the procurement-to-distribution timeline is two to five months, starting with product selection and identification and/or thorough analysis of market conditions for individual commodities, a solicitation period, review of applications, and manufacturing and delivery from producers to processors (vendors) and intermediaries that may reassemble or briefly store products for distribution and recipients. The current food box program shortens the procurement-to-delivery to as little as one month, with an expected one week interval for each of the bidding, approval, and delivery stages. Solicitation for bids began on April 24, with bids due to USDA on May 1. Contracts are expected to be awarded on May 8, and initial program delivery may be as early as May 15. The program is expected to operate through the end of 2020. Another significant change is the product format. Under normal circumstances, products are often delivered from vendors (who sell to USDA) to recipient organizations in bulk formats that may require re-packaging before distribution to households. The CFAP purchase program intends for vendors to deliver household-ready boxes of the previously mentioned produce, meat and dairy products, or combinations thereofâready for more convenient and immediate distribution (\"off the truck and into the trunk\") in order to support social distancing. In addition to the $3 billion CFAP purchase and distribution program, USDA announced on May 4, 2020, a plan to purchase $470 million of commodities with Section 32 authority that is at the discretion of the department. USDA's initial press release for the CFAP had mentioned availability of $873 million in the Section 32 account. The plan for this initial tranche is to solicit bids from vendors in June 2020 and begin deliveries as soon as July. In this purchase, USDA intends to buy $170 million of produce, $120 million of dairy products, $80 million of poultry, $70 million of fish, and $30 million of pork. In addition to the $9.5 billion in funding to assist U.S. agricultural producers and ranchers with COVID-related losses, the CARES Act also provided $14 billion to replenish the CCCâthis additional CCC spending authority is expected to be available in July after CCC prepares its June financial statement. The CCC borrows from the U.S. Treasury to finance its programs consistent with its permanent, indefinite authority to borrow up to $30 billion. Congress usually replenishes the CCC borrowing authority by annually appropriating funding to cover the CCC's net realized losses. The supplemental reimbursement in the CARES Act could increase opportunities for USDA to use its executive authority in CCC to provide further direct support payments, as it did with trade aid payments in 2018 and 2019. The CCC's annual borrowing authority has been fixed at $30 billion since 1987. On April 21, 2020, the American Farm Bureau released a report showing that, if adjusted for inflation, the CCC's borrowing authority would be $67.5 billion in 2020. In Congress, Senator John Hoeven has called for increasing the CCC's borrowing authority to $50 billion, while H.R. 6728 would raise CCC's borrowing authority to $68 billion. Increases in CCC's borrowing authority could be permanent or temporary (for certain fiscal years, or the duration of the public health emergency). While farm bills designate CCC to make various types of congressionally directed payments, it is USDA's use of its discretionary authority in recent years that has put pressure on the CCC borrowing limit. At present, USDA appears to have used nearly all of its available borrowing authority in the CCC in composing the CFAP payments. By July, USDA may be expected to use some of the $14 billion in supplemental CCC funding in the CARES Act, and its general CCC authority, to provide additional support to the agriculture sector. However, the nature and timing of any further support has not yet been announced by USDA. After it completes the $470 million Section 32 purchase described above, USDA would be expected to have about $400 million remaining in the Section 32 account for the rest of the fiscal year, based on the $873 million that USDA mentioned in its initial CFAP announcement. USDA may also be directed by Congress to provide certain future support to agriculture. Representative Austin Scott has introduced a bill ( H.R. 6611 ) that would provide an additional $50 billion of funding (separate from the CCC, and similar to the $9.5 billion in the CARES Act) for COVID-related agricultural assistance programs. Many Members of Congress have expressed concerns that rural America is not well prepared to handle the COVID-19 emergency, and that rural problems feed over into agriculture. For example, in April, Senate Democrats released a report warning that more isolated rural areas of the United States \"face disproportional challenges that put them at high risk,\" and that laid out their own rural policy ideas. Several U.S. Representatives and Senators have asked USDA to establish a Rural COVID-19 Task Force to help identify rural needs and tailor the allocation of resources to address them. They suggest that the Task Force could consist of a diverse group of experts and representatives from all sectors of rural areas, including agriculture, health care including mental health, and the private sector. In particular, the Rural COVID-19 Task Force would help to identify rural challenges, develop strategies and policy recommendations, assemble a guide of available federal programs and resources, consult with the USDA and congressional committees, and provide oversight on the distribution of funding. In their letter, the Members noted that people living in rural America are more likely to be uninsured, advanced in age, and have pre-existing medical conditions. Rural hospitals and health systems often have fewer ICU beds and resources available to handle an increased demand on rural health care infrastructure during a pandemic. According to the letter, one in five Americans living in rural areas are people of color, who have been disproportionately affected by the current crisis. Many rural areas are without reliable internet access, which limits their ability to work or attend school remotely. In March and early April, prior to USDA's announcement of CFAP, many industry groups from the U.S. agricultural sector had written public letters to Secretary Perdue and USDA detailing their concerns and the need for federal assistance in response to the economic damage that has hit their different industries as a result of the COVID-19-related emergency. Many of these letters included industry estimates of their sectoral economic losses due to COVID-19 (several of these estimates have been compiled by CRS and are presented in Table A-1 ). Following the announcement of CFAP, most industry groups that are targeted for CFAP assistance have expressed appreciation for the aid that USDA has announced. At the same time, several agriculture-related industries do not appear to be eligible for support under the CFAPâincluding ethanol, poultry, sheep and lamb, specialty livestock such as mink, or horticultural products. Also, agriculture industry groups almost universally note that CFAP can be only the first step in the federal response, as the amounts provided fall well short of industry loss estimates for most sectors. Another industry concern involves the announced payment limits associated with CFAP direct payments. Industry groups have stated that a $125,000 payment limit would severely restrict needed aid to individual producers. Some Senators and Representatives have followed up on industry concerns about payment limits by sending a letter to the Administration asking that the limits be removed for livestock, dairy, and specialty crop producers. The issue of payment limits may be addressed in the next round of USDA COVID-19 assistance or related bills (e.g., H.R. 6611 ). Immediate congressional concerns involve how to channel assistance to those industries affected by COVID-19. This involves identifying affected industries, as well as measuring the extent of their losses, and providing some measure of compensation to help foster survival and recovery. Another immediate concern may be monitoring and oversight of the large sums of taxpayer money that will be flowing out through the CCC. Producer self-certification of losses may create a moral hazard and an incentive to over-report losses. Congress may consider using its investigative authority to better understand the nature and institutional rigidities inherent in the current food supply chain, and to ascertain whether there is a role for the federal government to help facilitate food supply chain management. Such considerations may include an evaluation of whether there is a need to facilitate less reliance by the private sector on low-cost, just-in-time supply chains. This model has proven to be inflexible in responding to the COVID-19 emergency, which requires rapid product transition from bulk institutional buyers to consumer-ready retail outlets, and greater regional storage capacity to hold temporary surges in unsold product. The potential costs to taxpayers of supporting a more flexible supply chain could include expanded regional warehousing, cold storage, food bank storage, etc. Expediting the food assistance supply chain is also being proposed through \"farm-to-food bank\" programs ( S. 3605 ). These actions could be coupled with new federal programs designed to increase demand by temporarily expanding SNAP benefits and/or federal food purchases when certain market or economic conditions are triggered. Congress may also want to consider whether the current farm safety net programs authorized by the farm bill's Title Iâtargeting of program cropsâare sufficiently flexible and responsive when confronted with sudden, widespread price declines and an abrupt cessation of institutional purchases. For example, payments under the current ARC and PLC programs are delayed nearly 13 months after the program crop's harvest and reflect a 12-month average price that may not fully capture the potential short-term price drop related to the COVID outbreak.Â Program modificationsâsuch as the inclusion of an early partial payment for ARC and PLCâcould offer greater flexibility in responding to short-term cash flow problems for farm households. As one alternative, ARC and PLC could be supplemented or replaced by a new payment program that would be: short-term in nature; would better reflect local market conditions to capture disparities in regional economic harm; and would rely on market conditions both to trigger payments and to determine the size of those payments. The payment triggers could be set at catastrophic levels such that they would only be triggered under unique circumstances such as a major price plunge sparked by an event of the magnitude of COVID-19. The payment formula could be designed such that USDA could make payments under such a program before or shortly after harvest. In addition, Congress may also consider the long-term effects that might result from the COVID-19 emergency, particularly if the economic recovery is slow and lengthy. Such long-term effects may include heightened indebtedness and potential bankruptcies by farm households across the agricultural sector, as well as accelerated industry consolidation and altered consumption patterns. Without robust agricultural production to serve as the engine of growth, rural America might experience a slower recovery than the rest of the country. Prolonged depressed market conditions due to widespread layoffs, limited employment opportunities, and sustained reductions to rural wages and incomes would provide a weak background to foster agriculture's eventual recovery. Congress may also consider that rural banks tend to be smaller and less well-capitalized than banks catering to urban and suburban markets. Farm loan debt forgiveness (e.g., S. 3602 ) and loan repayment flexibilities are also in discussion. A slow rural economic recovery might reduce business and consumer confidence, leading to a reduction in spending and investment, and a tightening of financial conditions that could further slow the return to economic normalcy in rural areas. Studies Project Deep Losses Across Major Commodity Sectors Several universities, think tanks, and commodity groups have released early assessments of COVID-19's potential impact on selected commodity sectors ( Table A-1 ). Most of these early assessments are limited to evaluating the effect of the price decline on any unsold production remaining under farmers' control, and the unexpected surplus of unsold products due to the shutdown of most institutional buying of agricultural products. ", "summary": "As COVID-19 has spread throughout the United States, it has reduced domestic economic activity and disrupted domestic and international supply chains for goods and services, including food and agricultural products. These disruptions have produced an immediate and very strong demand shock on the U.S. food supply chain that has sent many commodity prices sharply lower. The food supply chain refers to the path that raw agricultural commodities take from the farm where they are produced, through the food processing and distribution network to the consumer where they are used. Supply chain disruptions have been primarily due to two factors: widespread shutdowns of all but essential businesses; and uncertainty about the availability of labor for the food distribution networkâwhether from illness, fear of illness, or immigration status. The food supply chain has been deemed essential; however, many institutional purchasers (including restaurants, hotels, schools, and entertainment venues) have been closed. According to the U.S. Department of Agriculture (USDA), U.S. consumers normally spend 54% of their food and drink dollars on away-from-home food purchases. Thus, prior to the COVID-19 pandemic a large share of U.S. food products traveling through the food supply chain was going to institutional buyers, often in bulk or vendor-ready form, for away-from-home consumption. In order to redirect this food product flow towards retail outlets and at-home consumption, much of this food would require processing into more consumer-usable forms, repackaging, and relabeling. This requires some level of retooling by food packagers and processors. In addition, several plants in the food processing industry, including meat processing plants, have experienced severe COVID infection outbreaks among workers and been forced to shut (at least temporarily). Several industry groups from the U.S. agricultural sector have released estimates of the economic damage experienced by producers and ranchers. Most of these early assessments are limited to evaluating the effect of the price decline on any unsold production of crops or livestock remaining under farmer's control, and the unexpected marketing costs of unsold products due to the shutdown of most institutional buying of agricultural products. Cumulatively, industry estimates of COVID-related losses approach $40 billion (this would represent over 10% of annual cash receipts). The effect on farm net income is expected to be similarly negative. In response to the COVID-19 pandemic, Congress has passed and the President has signed four supplemental appropriations acts ( P.L. 116-123 , P.L. 116-127 , P.L. 116-136 , and P.L. 116-139 ) that have included both direct and indirect funding for the U.S. agricultural sector. On April 17, 2020, Secretary of Agriculture Sonny Perdue announced the Coronavirus Food Assistance Program (CFAP), valued at $19 billion, to provide immediate financial relief to farmers, ranchers, and consumers in response to the COVID-19 national emergency. According to Secretary Perdue, CFAP will include $16 billion in direct payments to producers that have been impacted by the sudden drop in commodity prices and the disruption in food supply chains that has occurred since the outbreak, and $3 billion in commodity purchases for distribution through food banks, faith-based organizations, and other nonprofit organizations. CFAP direct payments are intended to partially offset the loss of market revenue from the price decline, and the unexpected carry-cost of unsold commodities for producers and ranchers of products that have been negatively affected by COVID-19. USDA has released limited information on the specifics of how CFAP's direct payment program will be implemented. Many of the program specifics are expected to be delineated in an expedited rulemaking process. CFAP direct payments are expected to go out to producers by the end of May or early June. CFAP's commodity purchase and distribution program serves the dual roles of supporting commodity market prices by temporarily increasing demand, and of expanding the availability of food distribution to consumers that have lost their jobs or have limited resources. Expectations are that it will be operated differently than, and separate from, existing USDA commodity purchase programs such as Section 32 or Food and Nutrition Service (FNS) food distribution programs in two major ways. First, USDA plans to purchase about $100 million per month of fresh produce, $100 million per month of dairy products, and $100 million per month of meat products (chicken and pork). Second, the CFAP purchase program intends for vendors to deliver household-ready boxesâpotentially a diversified mix of the previously mentioned produce, meat and dairy productsâwhich are ready for more convenient and immediate distribution (\"off the truck and into the trunk\") that is consistent with social distancing. Initial program delivery may be as early as May 15. The program is expected to operate through the end of 2020. Potential congressional concerns include how to channel assistance to industries affected by COVID-19, long-term effects of the pandemic, and the capacity of rural banks to help with recovery. Several issues related to CFAP and the U.S. agricultural sector in a post-COVID economy that could be of potential interest to Congress are presented at the end of this report.", "document_type": "crs"}
{"report": "The rise in popularity of cryptocurrencies and the underlying blockchain technology presents both challenges and opportunities to the energy sector. Cryptocurrencies, such as Bitcoin, are sometimes referred to as virtual currency , a term that can also refer to a broader class of electronic money. A blockchain is a digital ledger that enables parties to agree on the current ownership and distribution of assets in order to conduct new business. When applied to cryptocurrencies, the blockchain allows the validation of transactions to occur by a decentralized network of computers. As cryptocurrencies (such as Bitcoin, the cryptocurrency with the largest market capitalization) have increased in popularity, the energy demand to support cryptocurrency mining activities has also increased. The state of Washington, by some estimates, hosted 15%-30% of all Bitcoin mining operations globally in 2018. When such increases in energy demand for cryptocurrency mining occur at a local level, the resulting peak loads may increase customers' electricity rates depending on pricing structure. However, not all cryptocurrencies require energy-intensive operations. Outside of cryptocurrencies, opportunities arising from blockchain technologies could include facilitating energy and financial transactions on a smart grid. This report explains how cryptocurrency is \"mined,\" where mining activity is concentrated, how some states and utilities are responding to localized increases in energy demand from Bitcoin mining facilities, and potential considerations for Congress. Considerations for Congress include potential policy options to address energy conservation and energy efficiency standards as well as options for blockchain technology in the energy sector. This report is part of a suite of CRS products on cryptocurrencies and the underlying technology, distributed ledger technology, and blockchain (see textbox below). Blockchain provides a means of transacting among parties who may not otherwise trust one another. Blockchain networks allow for individuals engaging in transactions to also be the ones to validate them. Cryptocurrencies such as Bitcoin, Ether, Alpha Coin, and Papyrus provide a means of validating transactions in a decentralized network that is outside of an intermediary, such as a bank for financial transactions or a title company for a real estate transaction. This validation can be done in bulk and at relatively high speeds, making cryptocurrency an attractive avenue for certain financial transactions. Cryptocurrencies are built to allow the exchange of some digital asset of value (the cryptocurrency) for a good or service. Bitcoin is the most popular cryptocurrency, garnering the largest market share, and Bitcoin arguably initiated the interest in blockchain technology. Blockchain uses a combination of technologies to work. These technologies include encryption and peer-to-peer (P2P) networks. Transactions are added to a blockchain in an addition-only manner. Once added, a transaction cannot be altered, providing a layer of security and transparency. Transactions are grouped together to form a tranche , or \"block.\" Blocks are added to a blockchain in a manner that links it to the previous block, so any change data in a previous block makes that change known to users immediately as they try to add a new block. Encryption is used to ensure that parties trading assets on a blockchain have rights to that asset, and that data held in the blockchain is tamper resistant. P2P networks are used to distribute information across participating users without a central authority acting as an arbiter of that information. There are three primary approaches to gaining ownership of Bitcoin: purchase Bitcoin directly by exchanging conventional money and a paying an exchange fee; earn Bitcoin in return for a product or service; or create Bitcoin through mining . Bitcoin and other cryptocurrencies each implement their own blockchain: mining is the creation and publication of a new block in a blockchain. Early cryptocurrency platforms, like Bitcoin, required the use of mining to validate transactions. In blockchain platforms generally, minersâthose seeking to add a block to a blockchainâare incentivized to improve their value in that blockchain through either a monetary, reputational, or stake award, for example. New blocks may be added to a blockchain through a variety of methods. For Bitcoin, new blocks are added to the blockchain through proof-of-work (PoW). Under PoW, miners are presented a difficult computational problem, or puzzle. PoW identifies a numeric value (called a nonce), which is used to generate an authenticator (hash value). Hash values are used to ensure the integrity of data, in this case, that a block of data in the blockchain has not been modified. Hashes are determined by submitting the data through an algorithm that will output a string of characters. By inserting the nonce into the algorithm, miners seek to change the hash value. The problem Bitcoin miners are trying to solve is the creation of a hash value for a given block which begins with a certain number of zeros. They add data to the block through changing the nonce in order to change the hash value and discover the solution. Identifying these valid nonces and hashes is computationally intensive, and the essence of mining. The security properties of hash algorithms are such that a miner tests nonces until a valid hash is found for a block. Generally, by solving the problem or puzzle, miners win the opportunity to post the next block and possibly gain a reward for doing so. In the case of Bitcoin, miners who create and publish new blocks in the blockchain are rewarded with Bitcoin. Once the problem is solved and a valid hash is identified, the miner announces it to the community using P2P networking. Other users can validate the solution immediatelyâwithout going through the resource-intensive computation process. Once the majority of the community of users validates and confirms the block, it is added to the chain. Miners are held to a strict set of rules that maintain the overall market structure. There are a limited number of Bitcoin to be mined, which creates a value attributed to scarcity. For Bitcoin, new blocks are published every 10 minutes. As the rewards for published blocks halve every 210,000 blocks, the reward of new Bitcoin diminishes roughly every four years (e.g., the reward of 50 Bitcoins per block in 2008 was reduced to 25 in 2012). On October 31, 2018, block 548173 rewarded the miner with 12.5 Bitcoins plus approximately 0.2 Bitcoins in transaction fees. On the date that block was generated, trading for 1 Bitcoin closed at approximately $6,343; as of July 29, 2019, trading for 1 Bitcoin closed at approximately $9,507. Bitcoin is rewarded on a first-come, first-served basis, meaning whoever solves and publishes the solution first is rewarded with Bitcoin. Miners throughout the network compete against each other in a race to be the first to resolve the PoW and earn the reward. The competition often is a criticism of the PoW system, as there are many more miners expending energy for these \"useless\" calculations than the one miner that wins the race and correctly resolves the PoW. The technology used by miners has advanced over time. Early miners were able to earn Bitcoin relatively easily with affordable equipment. Bitcoin could initially be mined on a central processing unit (CPU) such as a personal laptop or desktop computer. As interest in Bitcoin mining increased, miners discovered that graphic cards could more efficiently run hashing algorithms and aid in mining. Field Programmable Gate Arrays (FPGAs) then replaced graphic cards, as the circuits in an FPGA could be configured and programmed by users after manufacturing. Application-specific integrated circuits (ASICs) have replaced these and graphic cards. ASICs are designed for a particular useâsuch as Bitcoin mining. As more sophisticated equipment has been adopted, miners have also moved away from working individually to working in larger groups. Many miners have determined it is more cost efficient to join \"mining pools\" that help disperse the energy and equipment costs (and the profits) and increase the speed or likelihood of a successful transaction. ASICs used for Bitcoin mining are usually housed in thermally-regulated data centers with access to low-cost electricity. While these developments have transformed Bitcoin mining into a more consolidated industry, they have not resolved the energy consumption issue or the computational \"waste,\" as different Bitcoin mining pools still must compete against one another using the PoW method. Cryptocurrency mining requires energy to (1) operate the devices computing the calculations required to maintain the integrity of the blockchain and (2) thermally regulate the devices for optimal operation. A node, or computing system, on the blockchain may be composed of an individual user or a group of users that have pooled resources; as such, the exact number of connected devices on the network is unknown. Devices have different hashratesâthe number of calculations (or hash functions) performed on the network per secondâand have different power requirements. Devices with greater hashrates can perform more calculations in the same amount of time than devices with lesser hashrates. For example, \"a hashrate of 14 terahashes [14 trillion attempted mining solutions] per second can either come from a single Antminer S9 running on just 1,372 W [Watts], or more than half a million Sony Playstation-3 devices running on 40 MW [megawattsâmillion Watts].\" There are four main factors that contribute to energy consumption of cryptocurrency mining: 1. hardware computing power; 2. network hashrate; 3. the difficulty; and 4. the thermal regulation for the hardware. These factors, some of which also interact with the price of Bitcoin, can alter the energy intensity of mining. For instance, in December 2017, the price of Bitcoin rose creating an influx of mining. As the mining network grew, the difficulty and hashrate increased. Miners sought out more powerful equipment as the competition increased, which consumed more energy. Several studies have examined the energy consumption of cryptocurrencies. While technology advancements in devices used for Bitcoin mining have led to increases in the hashrates of mining devices (i.e., improved device efficiency), the network hashrate has also increased as the popularity of Bitcoin increased. According to one recent estimate, as of \"mid-March 2018, about 26 quintillion hashing operations are performed every second and non-stop by the Bitcoin network.\" Estimating the power consumption of the global Bitcoin network depends upon the efficiency of different hardware, the number of machines in use, and the cooling requirements for large-scale mining facilities. Table 1 presents various estimates for the power required by the Bitcoin network. Generally, these estimates use hashrates and miner hashing efficiencies to determine energy consumption. One study relied upon hardware data derived from initial public offering (IPO) filings to estimate power consumption. Fewer studies have examined power requirements for other cryptocurrencies (Bitcoin is the largest cryptocurrency platform in both currency in circulation and transactions processed), although those studies have found comparatively lower power requirements than for Bitcoin. Global power requirement estimates for Bitcoin have increased within the last five years. For comparison, the largest estimate of 7,670 MW in Table 1 is nearly 1% of U.S. electricity generating capacity (or approximately 0.1% of global electricity generating capacity). Opinions differ on whether future growth in Bitcoin will significantly impact energy consumption and subsequent carbon dioxide (CO 2 ) emissions. Some argue that sustainability concerns due to energy consumption are misplaced, and that the competitiveness of Bitcoin mining means that only miners with the most competitive mining hardware and the lowest electricity costs will persist over time. Further, this could lead to fewer miners using energy inefficient hardware, as they may no longer be able to compete effectively. Some anticipate that energy demands will diminish as the reward incentive shifts from discovering new Bitcoin to earning revenue through transaction fees. As a result, some would argue that the energy consumption from mining Bitcoin is a temporary issue. Others recognize the volatility of cryptocurrency markets but observe that network hashrates of several cryptocurrencies have trended upward suggesting that energy consumption (and subsequent CO 2 emissions) will increase. However, these estimates do not include energy required for cooling systems and other operations and maintenance activities associated with cryptocurrency mining. One study on projections of Bitcoin growth considered the potential effects on global CO 2 emissions should Bitcoin eventually replace other cashless transactions. The study found that the associated energy consumption of Bitcoin usage could potentially produce enough CO 2 emissions to lead to a 2 o C increase in global mean average within 30 years. These projections assume that the global portfolio of fuel types (and subsequent CO 2 emissions) used to generate electricity remains fixed according to portfolio profiles from 2014 and does not consider that, in many cases, Bitcoin is often mined in areas with plentiful and affordable renewable energy. Further, the projections do not consider any potential effects of a collapse of Bitcoin prices on hashrates or energy consumption, and whether the capital invested in Bitcoin mining could be used for other cryptocurrencies or for other purposes. Projections of continued growth in energy consumption led some to call for reform in the cryptocurrency industry. Others argue that continued reliance on fossil-fuel-based electricity is the important issue and not the energy intensity of Bitcoin. As the Bitcoin network's energy consumption grows, some have questioned whether the PoW algorithm is sustainable. One option to reduce cryptocurrency energy consumption is to shift to alternative protocols for validating transfers. Currently, PoW is the most widely used. However, other protocols, such as Proof-of-Stake (PoS) and Proof-of-Authority (PoA) could potentially accomplish validations more energy efficiently. Many other alternative algorithms exist. Each algorithm presents trade-offs; for example, some algorithmic attributes facilitate scalability and others facilitate speed of transactions. The potential application of blockchain technology to the energy sector (and other sectors) will depend upon the ability for these technologies to provide transparent, secure, scalable, and timely transaction validation. The technical differences and their applicability are discussed in the Appendix . Several factors contribute to ideal mining locations and include energy costs, regulations, and technology. Often the energy costs are affected by geographical characteristics like proximity to hydroelectric power or lower ambient temperature that reduces the need for cooling. Local and national governments around the world have responded differently to the growth of Bitcoin: some are actively developing cryptocurrency industries, some are restricting cryptocurrencies, and some are regulating cryptocurrencies in an effort to balance financial innovation and risk management. According to a study in 2017, nearly three-quarters of all major mining pools are based in either China (58%) or in the United States (16%). Some countries and regions where significant cryptocurrency mining activities have been identified include Australia, Canada, Georgia, Russia, and Sweden, as shown in Figure 1 . China has taken steps to regulate and tax the trading of Bitcoin, and has even proposed implementing a ban on mining. As of April 2019, it was reported that the National Development and Reform Commission, deemed mining as a \"wasteful and hazardous\" activity. China's share of major mining pools may change substantially in response to regulations and policy actions. In 2013, the Chinese government reportedly restricted Chinese banks from using cryptocurrencies as currency, citing concerns about money laundering and a threat to financial stability. In September 2017, Beijing declared that initial coin offerings (ICO) were illegal and that all mainland cryptocurrency exchanges be shut down. In January 2018, China's Leading Group of Internet Financial Risks Remediation submitted a request to local governments to regulate electricity, taxes, and land use for mining companies, and \"guide the orderly exit of such companies from the Bitcoin mining business.\" Since the implementation of these regulatory measures, Bitcoin trading with the Chinese yuan has reportedly dropped from 90% of global Bitcoin trading to under 1%. However, as illustrated in Figure 1 , China, despite changes in regulation, remained a popular location for mining in 2018, partly due to the comparatively low cost of energy. The generation sources that provide low cost electricity to cryptocurrency miners in China vary regionally. In some regions, the electricity likely is provided from fossil fuel sources; for example, in Inner Mongolia where cryptocurrency miners have been active, thermal power represents 63% of the electric capacity. Cryptocurrency mining includes costs associated with equipment, facilities, labor, and electricity. Mining pool companies around the world therefore seek cheap, reliable electricity. While many mining pools are still in China, some have been able to utilize closed industrial facilities in the United States that can provide abundant electricity at affordable rates. As miners are not typically bound by geographic location, locations with favorable electricity rates and policies may encourage operations. Conversely, locations with restrictive regulations or high electricity prices may discourage mining operations. In the United States, the sale of electricity is governed by a patchwork of federal, state, and local regulations. For the sale of electricity, the states generally have regulatory jurisdiction over retail electricity transactions, though federal and municipal authorities may also play a role. State approaches to regulation vary considerably. States and cities that are dealing with an influx of cryptocurrency mining because of affordable electricity rates are instituting local laws as issues arise. Examples of such approachesâboth domestic and internationalâalong with the more general benefits and challenges associated with developing a cryptocurrency mining industry are delineated through the selected examples below. The state of New York and the city of Plattsburgh (NY) have developed various policies in response to growth in energy demand by cryptocurrency mining activities. In December 2018, New York State approved Assembly Bill A8783B, creating a new digital currency task force. This task force will include a team of technology experts, investors, and academics all appointed by the Governor, the state Senate, and the Assembly. The task force intends to produce a report in 2020 that includes a discussion of \"the energy consumption necessary for cryptocurrency mining operations and other policy considerations related thereto.\" The task force law does not include any specific measures regarding licensing, but New York State already requires a license for cryptocurrency businesses, known as a \"Bitlicense.\" Introduced in 2014, fewer than 20 licenses have been granted as of January 2019. The Bitlicense is intended to subject crypto mining companies to anti-money laundering and counterterrorism standards, as well as require background checks on all employees. Plattsburgh's 20,000 residents reportedly have electricity rates below $0.05 per kilowatt-hour (kWh) year-round (as compared to the U.S. average retail price of about $0.10/kWh). Inexpensive electricity for Plattsburgh is generated from the New York Power Authority's (NYPA's) hydroelectric facility on the St. Lawrence River. Plattsburgh has an agreement with the NYPA to buy 104 MW of power at any time to serve its customers. This has exceeded electricity demand requirements for Plattsburgh, even with several industrial facilities in operation. Plattsburgh has faced a number of challenges balancing the promise and pitfalls of cryptocurrency mining. Bitcoin mining companies were attracted to the abundant and cheap electricity, with two cryptocurrency mining businesses reportedly operating in Plattsburgh in 2017. As Plattsburgh residents primarily rely on electricity for home heating, during a particularly cold winter in early 2018, electricity rates increased as the 104 MW of power from the hydropower facility was reportedly exceeded, and electric power had to be purchased from other sources at higher rates. During January and February of 2018, cryptocurrency mining operations were recorded as responsible for approximately 10% of the local power demand. The cost of purchasing additional power to meet the increased demand were proportionally distributed among all customer classes. The costs of purchasing additional power combined with increased energy use in response to cold weather resulted in residential electricity bills that were reportedly up to $300 higher than usual. According to the New York Public Service Commission, the two cryptocurrency companies operating in Plattsburgh at the time contributed to an increase of nearly $10 to monthly electricity bills in January 2018 for residential customers. In March 2018, the city of Plattsburgh also instituted an 18-month moratorium on any new cryptocurrency mining operationsâa first in the United States. Also in March 2018, the New York Public Service Commission ruled that municipal power authorities could issue a tariff on high-density-load customersâincluding cryptocurrency companiesâ\"that do not qualify for economic development assistance and have a maximum demand exceeding 300 kW and a load density that exceeds 250 kWh per square foot per year.\" Additionally, Plattsburgh began addressing fire safety concerns, heat management, and overall nuisance associated with cryptocurrency mining by passing local laws. None of the new laws specifically address energy consumption, or noise, which is a concern for some local residents. In December 2017, Coinmint, a crypto mining company, looking to expand operations, went to Massena, NY (90 miles west of Plattsburgh) and signed a lease to convert a retired Alcoa aluminum plant into a cryptocurrency mining facility. Coinmint reportedly requested from NYPA 15 MW of subsidized power that would in turn lead to 150 jobs and $700 million in local investment. The proposal required the approval of NYPA's board of trustees and was added to their January 2018 agenda for consideration. However, in March 2018, following consideration of the Coinmint proposal, the NYPA board of trustees approved a moratorium on allocating economic development assistance in the form of subsidized power to high-density-load operations until NYPA could analyze all possible impacts. The New York State Public Service Commission approved, in July 2018, new electricity rates for the Massena Electric Department to allow high-density load customersâsuch as cryptocurrency companiesâto be eligible for service under an individual service agreement. This is the second ruling by the commission on cryptocurrency rates. By some estimates, the state of Washington hosted 15%-30% of all Bitcoin mining operations globally in 2018. Like New York, Washington has affordable, reliable hydropower. Along the Columbia River in a region known as the Mid-Columbia Basin, five hydroelectric dams reportedly generate nearly six times as much power as the residents and local businesses can utilize. These hydroelectric facilities typically export the surplus electricity to larger electricity demand markets, such as Seattle or Los Angeles, which helps to keep the costs of electricity relatively low for local consumers at about $0.025/kWh (as compared to the U.S. average retail price of about $0.10/kWh). Since 2012, the Mid-Columbia Basin has reportedly attracted Bitcoin mining companies because of low-priced electricity, and the resulting growth in energy demand has challenged the cost structure of several of the region's public utility districts (PUDs). Several PUDs imposed a moratorium on new applications for mining operations. The moratorium was issued as public utilities are required to hear and rule on applications for future power contracts. If the applications for mining operations continued to be approved, the contracts could have outpaced the public utilities' original projections and planning for demand increases. For example, in Douglas Countyâwhere the bulk of the new mining projects are occurringâa new 84-MW substation that was previously expected to provide enough capacity to serve the area for the next 30 to 50 years under a normal population growth scenario was fully subscribed in less than a year. In response, the PUDs will have to find alternatives for meeting the growing demand, such as purchasing power on the open market. In addition, there are concerns over the cost of upgrading new infrastructure, including substations and transmission lines, and who would bare those costs. PUDs in the region are also challenged by \"rogue\" miners, those that set up server equipment in homes without any proper licensing, permits, or infrastructure upgrades. These servers have a larger demand for energy than the infrastructure in a residential community is designed to provide. It is relatively easy for the PUDs to locate rogue miners given the abnormal increase in power demand; once identified, the miners are required to obtain the proper equipment and permits but may simply move operations to another unpermitted location. Other PUDs in the region are adapting to increased interest in mining operations. In December 2018, Chelan County PUD approved a new rate for blockchain operations starting April 2019 and lifted a moratorium. While some are concerned that Bitcoin mining operations and related infrastructure could eventually lead to utility stranded assets, others see Bitcoin as a stepping block to a larger possibly more prosperous endeavorâresearching alternative uses for blockchain technology. The Department of Commerce for Douglas County intends to build a \"blockchain innovation campus,\" which the county states could both assuage concerns over the volatility of the Bitcoin market and be an investment in the future diversification of the local economy. This approach, however, is not entirely without risk. For example, Giga Watt, a Bitcoin mining firm, declared bankruptcy in 2018, owing creditors nearly $7 million, $310,000 of which is owed to Douglas County Public Utility District. Due to the decentralized nature of cryptocurrency mining, miners are not typically bound by geographic location. These characteristics typically impact mining profits and contribute to selecting the ideal location for operations. While some countries may have favorable energy costs, they may have restrictive regulations (e.g., China). Below are a few international locations that have garnered the attention of cryptocurrency miners. Canada generates affordable (albeit not the cheapest) hydroelectric power. Further, Canada has the added benefit of being in a cold weather climate, which can reduce overall cooling costs. In 2016, approximately 58% of total electricity generation in Canada was from hydropower resources. Canadian electricity providers generate 13 terawatt hours (TWh) more electricity than their domestic consumers need. Due to this excess in electricity some providers have offered incentives for miners. In January 2018, the public utility Hydro-Quebec offered electricity at a rate of $0.0394/kWh to cryptocurrency miners. Miners responded, and by February 2018, Hydro-Quebec has received around 100 inquiries. Based on these inquiries, 10 TWh of the surplus would have been obligated to mining. Hydro-Quebec did not expect the high degree of new demand (reportedly several thousand megawatts worth of project proposals) for electricity and in March 2018 ceased processing requests until guidelines are developed. In response to concerns with the sharp increase in electricity demand, Hydro-Quebec commissioned a study on the economic benefits of cryptocurrency mining. In May 2018, the study estimated that direct job creation for cryptocurrency mining ranges from 1.2 jobs per MW of a 20 MW operation to 0.4 jobs per MW for a 250 MW operation. Data centers, by comparison, can create between 5 and 25 jobs per MW. By June 2018, Hydro-Quebec announced it would triple the price it originally offered to new applicants for cryptocurrency mining operations (although the utility indicated this is a temporary adjustment until a final determination is made). Meanwhile towns across the Quebec Province have placed moratoriums on new mining operations citing energy demand, size, and noise concerns. Georgia has positioned itself as an attractive location for Bitcoin mining operations. In Georgia, mining company Bitfury's electricity rates reportedly range from around $0.05/kWh to $0.06/kWh. Georgia's low price of electricity can be attributed to large hydropower resources. In 2016, hydropower accounted for 81% of the total electricity generated. The low cost of electricity, plus a favorable regulatory environment, makes Georgia a favorable location for Bitcoin mining operations. In 2015, the government of Georgia offered Bitfury a $10 million dollar loan to mine in Georgia. The government expanded a power plant to provide electricity to Bitfury's cryptocurrency mining facility at no additional cost. Local Bitcoin miners, however, are having a difficult time competing with Bitfury. Smaller local mining pools were not offered similar incentives and have been struggling to mine in a low-price environment. Furthermore, some locals criticize the government for providing Bitfury incentives. The Georgian government has created tax-free zones for mining activities and electricity. Without a tax regime in place for mining, some Georgian lawmakers claim that Georgians are losing possible tax revenue. Iran also has relatively cheap electricity making it attractive to mining operations. Iran's electricity mix is dominated by natural gas. According to the U.S. Energy Information Administration, Iran is the third largest producer of dry natural gas in the world at nearly 9.5 trillion cubic feet (Tcf) in 2017 and most of it (6.9 Tcf) was consumed domestically. In addition, Iran subsidizes electricity produced from fossil fuels. According to International Energy Agency data from July 23, 2019, subsidies for electricity were valued at $16.6 billion in 2018. With energy subsidies, average electricity prices in Iran are reportedly around $0.006/kWh, far cheaper than even in China. Despite the low price of electricity in Iran, miners face other challenges, such as U.S. sanctions. The decentralized and pseudonymous nature of Bitcoin transactions may make financial sanctions imposed on governments and individuals difficult to enforce. However, Bitcoin transactions are publicly recorded on its digital ledger. According to the U.S. Department of the Treasury Under Secretary for Terrorism and Financial Intelligence, We are publishing digital currency addresses to identify illicit actors operating in the digital currency space. Treasury will aggressively pursue Iran and other rogue regimes attempting to exploit digital currencies and weaknesses in cyber and [Anti-Money Laundering and Countering the Financing of Terrorism] AML/CFT safeguards to further their nefarious objectives. Since the reintroduction of U.S. sanctions, the Iranian government has recognized a potential role for cryptocurrencies. In January 2019, the Central Bank of Iran presented a draft of new cryptocurrency regulation. Digital currencies, not backed by the Central Bank, will be restricted as a form of payment inside Iran. The draft framework, however, would authorize rial-backed cryptocurrency use, ICOs, mining, and other crypto-related activities. These draft regulations and the possible negative consequences from the United States may keep some miners from relocating to Iran, despite the low cost of electricity. Iranian state media reported that Tadvin Electricity Company saw an increase in energy demand of 7% due to cryptocurrency mining activities in June 2018. In response, Iran's Power Ministry is reportedly considering enforcing special tariffs on cryptocurrency miners. The Iranian Cabinet reportedly ratified a bill in August 2019 that introduces new rules for the cryptocurrency market in Iran. The regulations reportedly stipulate that mining cryptocurrencies would be allowed in Iran if certain conditions are met. Conditions reportedly include receiving approval from Iran's Ministry of Industry and conducting mining activities outside of provincial centers (with exceptions for Tehran and Esfahan where additional restrictions may apply). Blockchain is a method of quickly validating transactions and of record keeping for large quantities of data. Some blockchains and cryptocurrencies do not operate through a decentralized, permission-less network like Bitcoin. Within the energy sector, a number of opportunities for blockchain technology have been proposed. These opportunities include smart contracts, distributed energy resource record keeping, and ownership records. One of the more easily transferrable options for blockchain is trading Renewable Energy Credits (RECs). Using blockchain to trade RECs could provide customers the ability to purchase RECs without the need for a centralized entity to verify transactions. In October 2018, a subsidiary of the PJM Interconnection LLCâa regional transmission organization that operates an electric transmission system serving part of the Eastern Interconnection electricity grid âannounced plans for testing blockchain technology to trade RECs. Other more advanced utilizations for blockchain in the energy sector could be highly disruptive. For example, there is increasing interest in net metering and a transactional grid (i.e., where producers of distributed energy resources, such as rooftop solar, can sell the electricity to nearby consumers). Prototype projects have relied upon blockchain technology among other peer-to-peer approaches to facilitate renewable energy transactions at the local level. Other peer-to-peer efforts include managing virtual power plant operations and enabling those who do not own renewable energy systems to pay for a portion of the energy generation of a host's system in exchange for a reduction on their utility bills (e.g., renters paying for a portion of an apartment building's rooftop solar system). If such applications are found to be practical and economical, blockchain technology could alter the manner in which electricity customers and producers interact. Traditionally electric utilities are vertically integrated. Blockchain could disrupt this convention by unbundling energy services along a distributed energy system. For instance, a customer could directly purchase excess electricity produced from their neighbor's solar panels instead of purchasing electricity from the utility. On the one hand, this could result in a more transparent and efficient system. Blockchain could encourage more competition among generators and more flexibility and choice for consumers. On the other hand, unbundling energy services could lead to concerns over distribution control to accommodate the decentralization. Furthermore, storing vast quantities of data about critical infrastructure on distributed ledgers may introduce additional cybersecurity concerns. The sale of electricity via blockchains that are independent of a conventional utility framework may be subject to significant legal interpretation, and potentially represents the intersection of various federal and state statutes and regulations. Jurisdiction over the sale of electricity from a distributed energy resource or electric vehicle charging station hinges upon its definition as either a retail transaction or a sale for resale. Retail transactions are generally defined by the Federal Energy Regulatory Commission (FERC) as \"sales made directly to the customer that consumes the energy product,\" whereas sales for resale are defined as \"a type of wholesale sales covering energy supplied to other electric utilities, cooperatives, municipalities, and Federal and state electric agencies for resale to ultimate consumers.\" States typically regulate retail electricity transactions, while FERC has jurisdiction over the transmission and wholesale sales of electricity in interstate commerce. One survey by the Electric Power Research Institute, collected data on the potential barriers and advantages of blockchain in utilities. Of those surveyed, utilities in the United States were in early pilot stages or in the research phase, while some utilities in Europe had been using blockchain for over a year. Respondents identified opportunities and challenges to investment in blockchain technology with 77% of respondents identifying concerns that the energy industry \"lacks appropriate standards.\" In addition to state and local policy efforts that seek to mitigate the regional effects of growth in cryptocurrency mining, there are options that could be adopted by the federal government to improve the energy efficiency of mining operations. Further, as the financial and energy sectors, among others, explore adopting blockchain, Congress may consider options to curb the energy intensity of the technology. An approach to reducing the energy consumption of cryptocurrencies could include the establishment of minimum energy conservation standards for the equipment engaged in mining activities or the cooling equipment that maintains efficient mining operations. The Department of Energy (DOE) administers national energy efficiency standards for appliances and other equipment. DOE maintains federal energy efficiency standards as authorized under the Energy Policy and Conservation Act ( P.L. 94-163 , 42 U.S.C. Â§Â§6201-6422) as amended. DOE's Appliance and Equipment Standards program sets minimum energy efficiency standards for approximately 60 commercial product categories. There are no national standards for computer products. In 2012, DOE issued a request for information regarding miscellaneous residential and commercial electrical equipment, and in 2014 issued a proposed determination of coverage for computers and battery backup systems. Some view voluntary and market-driven approaches as more appropriate for computer technology than minimum energy conservation standards. Others state the importance of public and private sector collaboration in developing energy efficiency standards that are \"ambitious and achievable.\" Congress may consider whether minimum national energy efficiency standards that address cryptocurrency mining should be established. Such standards could focus on the specific technology used by cryptocurrency minersâASICsâor could focus on computer and battery backup systems as defined within DOE's proposed determination. DOE published energy conservation standards and test procedures for computer room air conditioners (CRACs) on May 16, 2012. According to the final rule, a CRAC is defined as: A basic model of commercial package air conditioning and heating equipment (packaged or split) that is: (1) Used in computer rooms, data processing rooms, or other information technology cooling applications; (2) rated for sensible coefficient of performance (SCOP) and tested in accordance with 10 CFR 431.96, and (3) not a covered consumer product under 42 U.S.C. 6291(1)â(2) and 6292. A computer room air conditioner may be provided with, or have as available options, an integrated humidifier, temperature, and/or humidity control of the supplied air, and reheating function. DOE established 30 different equipment classes for CRAC and set minimum requirements for each class. Initial compliance dates of October 29, 2012, or October 29, 2013, were established, depending upon the equipment class. DOE is required to review test procedures for covered products at least once every seven years. The frequency requirement for reviewing energy efficiency standards of covered products is no later than six years after issuance of a final rule. DOE issued a request for information regarding test procedures for CRACs on July 25, 2017. In addition to minimum national energy efficiency standards issued by DOE, the U.S. Environmental Protection Agency (EPA) and DOE jointly administer the voluntary ENERGY STAR labeling program for energy-efficient products, homes, buildings, and manufacturing plants. ENERGY STAR has standards for miscellaneous residential and commercial electrical equipmentâincluding computers and displays. ENERGY STAR also has specifications for enterprise servers, data storage equipment, small network equipment, large network equipment, and uninterruptible power supplies. Congress may consider whether ENERGY STAR specifications for cryptocurrency mining technology are needed, or whether existing specifications for equipment used in data centers are appropriate. Congress may also choose to consider the creation or adoption of energy efficiency standards for data centers used by mining companies. Verifiable information on cryptocurrency mining power usage is limited and based on what is voluntarily reported. Under these circumstances, it is reported that as cryptocurrency mining centralizes and professionalizes, mining facilities are taking on characteristics (e.g., power and cooling needs) that are similar to other large computing facilities, such as data centers. One option for improving the energy efficiency of Bitcoin mining could be to establish energy efficiency standards for data centers or large computing facilities. According to DOE, data centers are energy-intensive compared to other building types. DOE estimates that data centers account for approximately 2% of total U.S. electricity use. In 2014, data centers in the United States consumed an estimated 70 billion kWh, and are projected to consume approximately 73 billion kWh in 2020. The growth in cloud computing services has led to commitments by some data-centric companies to power data centers with renewable energy. Although there are no national efficiency requirements for data centers, the federal government has taken steps to improve the efficiency of its own data centers. In 2010, the Federal Data Center Consolidation Initiative (DCCI) was established. The Federal Information Technology Acquisition Reform Act (FITARA, P.L. 113-291 ) was enacted on December 19, 2014, to establish a long-term framework through which federal IT investments could be tracked, assessed, and managed, to significantly reduce wasteful spending and improve project outcomes. The DCCI was superseded by the Data Center Optimization Initiative (DCOI) in 2016. The DCCI established and the DCOI maintains requirements for agencies to develop and report on strategies \"to consolidate inefficient infrastructure, optimize existing facilities, improve security posture, achieve cost savings, and transition to more efficient infrastructure.\" The DCOI also included energy efficiency goals for data centers: 1. Existing tiered data centers to achieve and maintain a power usage effectiveness (PUE) of less than 1.5 by September 30, 2018, and 2. New data centers must be designed and maintain a PUE no greater than 1.4, and are encouraged to achieve a PUE no greater than 1.2. For the PUE metric, the DCOI references Executive Order (E.O.) 13693 and the implementation instructions. E.O. 13693 was revoked by and replaced with E.O. 13834, which does not discuss data centers. The implementation instructions for E.O. 13834 state that \"data centers are energy intensive operations that contribute to agency energy and water use and costs,\" and encourage agencies \"to implement practices that promote energy efficient management of servers and Federal data centers,\" and \"to install sub-meters, including advanced energy meters, in data centers where cost effective and beneficial for tracking energy performance and improving energy management.\" The authorization of the DCOI was extended until October 1, 2020, by the FITARA Enhancement Act of 2017 ( P.L. 115-88 ). Congress may choose to consider whether federal data center PUE requirements should be extended to certain types of data centers outside the federal government. For Bitcoin mining facilities, reportedly little is known about their operations, including power usage effectiveness. Rules and regulations governing the retail sale of electricity generally originate with a state public utility commission. An electric utility is defined in federal law as any person, state, or federal agency \"which sells electric energy.\" Definitions may be found in Public Utility Regulatory Policies, 16 U.S.C. Section 2602. This definition could potentially be interpreted that generators of electricity that make energy trades using blockchain technology are electric utilities by virtue of the fact that they sell electricity, and are therefore subject to all laws, requirements, and regulations pertaining to electric utilities. Congress may choose to consider extending or clarifying FERC's role regulating blockchain technology use in the energy sector. While blockchain could be implemented as a means to validate peer-to-peer distributed electricity trading, these transactions could potentially still be subject to FERC oversight as engaging in a sale for resale. Applications of blockchain technology in the energy sector have been limited in scope to date; wide-scale adoption of blockchain technologies could pose additional vulnerabilities to grid operations. FERC may also have a role in considering whether the existing grid infrastructure is capable of handling more power movement at high speeds in response to blockchain users' transactions. Other potential issues could include data privacy, interoperability of technology solutions, and market structure. FERC has not issued guidance or announced standards associated with blockchain technologies. Within this context, utilities and industry groups may interpret the lack of guidance as a signal to continue business as usual. As the Bitcoin network's energy consumption grows, some have questioned whether the proof-of-work (PoW) algorithm that is used by Bitcoin is sustainable. Many alternative algorithms exist. PoW and two approaches that are conceptually less energy intensiveâproof-of-stake and proof-of-authorityâare discussed below and illustrated in Figure A-1 . Proof-of-Work Under proof-of-work (PoW), miners are presented a difficult computational problem, or puzzle. PoW identifies a numeric value (called a nonce), which is used to generate an authenticator (hash value). The hash value ensures a user that the block of data sent has not changed. Hashes are determined by submitting the data through an algorithm that will output a string of characters. By inserting the nonce into the algorithm, miners seek to change the hash value. Identifying these valid nonces and hashes is computationally intensive, and the essence of mining. The security properties of hash algorithms are such that a miner tests nonces until a valid hash is found for a block. Generally, by solving the problem or puzzle, miners win the opportunity to post the next block and possibly receive a reward for doing so. In the case of Bitcoin, miners who create and publish new blocks in the blockchain are rewarded with Bitcoin. Once the problem is solved and a valid hash is identified, the miner announces it to the community. Other users can validate the solution immediatelyâwithout going through the resource-intensive computation processâby having transparent access to the entire history of the blockchain's transaction ledger. Once the majority of the community validates and confirms the block, the next block can be added to the chain. Proof-of-Stake Proof-of-stake (PoS) depends on the community's actual stake in the currency instead of consuming energy in a race to be the first to solve computations. The more currency a \"forger\" (i.e., the PoS term in lieu of the PoW term \"miner\") holds, the more transactions can be validated. This method skips the energy-intense hashing race. All of the currency is already created, and the amount is stagnant. Forgers earn currency through transaction fees for building a new block (and thereby validating a transaction). A new block is determined by the level of stake (e.g., wealth) a forger has invested in the cryptocurrency. Thus, forgers put their own cryptocurrency investment at risk and therefore would likely only build a block for valid transactions. If a forger added a block to the blockchain based on an invalid transaction, it would risk losing its stake. Potential energy reductions from use of PoS are leading to changes in some major cryptocurrencies. Ethereumâa platform that uses a cryptocurrency called Etherâplans to move to a PoS system and is currently working on the remaining challenges, such as scaling a PoS system and maintaining a decentralized system. The Ethereum network expects to go through several upgrade phases in order to fully transition to PoS. The timeline for this transition has not yet been revealed, but this new solution upgrade, known as Serenity, was announced at DevCon 4. The Serenity upgrade would utilize a new PoS algorithm called \"Casper\" that is intended to overcome some of the drawbacks (e.g., centralizing a traditionally decentralized currency) of a PoS community. Proof-of-Authority Proof-of-authority (PoA) is another method of validating transactions in a blockchain. Like much of the terminology associated with blockchain, there is not a formal definition of PoA, and the definition may differ from one group to another, depending on the purpose of the blockchain platform. One understanding of PoAâas it relates to cryptocurrencyâhas validators curating their own reputation in order to achieve payout. Validators earn their reputation by running software to put transactions into blocks that require a link to properly identify that validator. This method places every person in the network on equal footingâeveryone only has one identity. An alternative understanding of PoA, among the supply chain industry, uses a blockchain network to track logistics transparently. PoA provides a level of scalability and security within private networks that PoS or PoW cannot. Limitations of PoS, PoA, and PoW PoS, PoA, and PoW algorithms have limitations. While PoS and PoA both reduce energy consumption levels and require far less sophisticated equipment, they both create a more controlling and limited environment. PoW requires community decisionmaking. PoS and PoA are more individualistic. This could undermine the concept of the decentralized nature of the distributed ledger system design, which is one of the fundamental principles in cryptocurrency. Cryptocurrency was developed to move away from the centralized power of the banking system and move toward a decentralized network. The Ethereum upgrade is intended to integrate several new aspects and is expected to achieve a more decentralized system even when compared with PoS. Ethereum's \"Phase Zero\" of the PoS specification was frozen on June 30, 2019, with the formal launch targeted for January 3, 2020. PoW is also vulnerable to attacks. PoW blockchains publish new blocks to the longest available chain. Although difficult to accomplish, a malicious actor could devote overwhelming computational resources to rewriting a blockchainâdeveloping different transactions with different nonce and hash values. This is known as the \"51% attack.\" At a point where their chain is the longest, the malicious actor could publish the blockchain, and the system would accept it as the valid one. By rewriting the chain, the malicious actor would reestablish the distribution of resources (i.e., which accounts have Bitcoin and how much the account holds). This would require substantial energy consumption, space, equipment, and money, and would all have to be done covertly to avoid being caught. While this may appear to be difficult to execute, PoW algorithms are not invulnerable.", "summary": "The popularity of cryptocurrencies such as Bitcoin and the underlying blockchain technology presents both challenges and opportunities to the energy sector. As interest in Bitcoin and other cryptocurrencies has increased, the energy demand to support cryptocurrency \"mining\" activities has also increased. The increased energy demandâwhen localizedâcan exceed the available power capacity and increase customers' electricity rates. On the other hand, not all cryptocurrencies require energy-intensive mining operations. Some cryptocurrencies can operate under algorithms that require less energy. In addition, blockchain technologies could present opportunities for the energy sector by facilitating energy and financial transactions on a smart grid. Bitcoin and other cryptocurrencies can be used to make payments without banks or other third-party intermediaries, and are sometimes considered virtual currency. The technology underlying these cryptocurrencies is blockchain. A blockchain is a digital distributed ledger that enables parties who may not otherwise trust one another to agree on the current ownership and distribution of assets in order to conduct new business. New blocks may be added to a blockchain through a variety of methods. In mining blocks, users seek to add the next block to the chain. For Bitcoin, new blocks are added to the blockchain through a proof-of-work (PoW) algorithm. Under PoW, minersâthose seeking to add a block to a blockchainâare presented a difficult computational problem. Once the problem is solved, other users can validate the solution and confirm the block, adding the next block to the chain. In the case of Bitcoin, miners who create and publish new blocks are rewarded with Bitcoin. Less energy intensive, alternative algorithms exist, such as proof of stake and proof of authority. Cryptocurrency mining through PoW requires substantial energy to (1) operate the devices computing the calculations required to maintain the integrity of the blockchain and (2) thermally regulate the devices for optimal operation. Devices have different performance capabilities and have different power requirements. Generally, the device, or a cluster of devices, that can perform more calculations per second will require more energy for powering and cooling the device or devices. Global power requirement estimates for Bitcoin have increased within the last five years. Network power estimates for 2018 range between 2,500 megawatts (MW) and 7,670 MW, which, for comparison, is nearly 1% of U.S. electricity generating capacity. Opinions differ on whether future growth in Bitcoin will significantly impact energy consumption and subsequent carbon dioxide (CO 2 ) emissions. Cryptocurrency mining includes costs associated with equipment, facilities, labor, and electricity. Some users pool computational resources to solve PoW problems faster, and are on a worldwide hunt for cheap, reliable electricity in abundance. While many mining pools are in China, some have been able to utilize closed industrial facilities in the United States that can provide abundant electricity at affordable rates. According to a study in 2017, nearly three-quarters of all major mining pools are based in either China (58%) or in the United States (16%). By some estimates, the state of Washington hosted 15%-30% of all Bitcoin mining operations globally in 2018. Governments are developing various policies in response to growth in energy demand by cryptocurrency mining activities. In some areas, applications from potential mining companies have exceeded the available capacity. Other areas have offered reduced electricity rates to attract miners. In the United States, in addition to efforts at the state and local level, there are potential options that could be adopted by the federal government to improve the energy efficiency of mining operations. Potential federal policy options include minimum energy conservation standards, voluntary energy efficiency standards, and data center energy efficiency standards. In addition to the challenges that cryptocurrency mining presents to the energy sector, there are also opportunities, particularly for blockchain. These may include electric vehicle charging infrastructure and distributed energy resources, among others. The U.S. electricity grid is critical infrastructure and subject to certain regulations to maintain safe and reliable operations. Opinions differ as to a potential role for blockchain technology in the energy sector. The popularity of cryptocurrencies such as Bitcoin and the underlying blockchain technology presents both challenges and opportunities to the energy sector. As interest in Bitcoin and other cryptocurrencies has increased, the energy demand to support cryptocurrency \"mining\" activities has also increased. The increased energy demandâwhen localizedâcan exceed the available power capacity and increase customers' electricity rates. On the other hand, not all cryptocurrencies require energy-intensive mining operations. Some cryptocurrencies can operate under algorithms that require less energy. In addition, blockchain technologies could present opportunities for the energy sector by facilitating energy and financial transactions on a smart grid. Bitcoin and other cryptocurrencies can be used to make payments without banks or other third-party intermediaries, and are sometimes considered virtual currency. The technology underlying these cryptocurrencies is blockchain. A blockchain is a digital distributed ledger that enables parties who may not otherwise trust one another to agree on the current ownership and distribution of assets in order to conduct new business. New blocks may be added to a blockchain through a variety of methods. In mining blocks, users seek to add the next block to the chain. For Bitcoin, new blocks are added to the blockchain through a proof-of-work (PoW) algorithm. Under PoW, minersâthose seeking to add a block to a blockchainâare presented a difficult computational problem. Once the problem is solved, other users can validate the solution and confirm the block, adding the next block to the chain. In the case of Bitcoin, miners who create and publish new blocks are rewarded with Bitcoin. Less energy intensive, alternative algorithms exist, such as proof of stake and proof of authority. Cryptocurrency mining through PoW requires substantial energy to (1) operate the devices computing the calculations required to maintain the integrity of the blockchain and (2) thermally regulate the devices for optimal operation. Devices have different performance capabilities and have different power requirements. Generally, the device, or a cluster of devices, that can perform more calculations per second will require more energy for powering and cooling the device or devices. Global power requirement estimates for Bitcoin have increased within the last five years. Network power estimates for 2018 range between 2,500 megawatts (MW) and 7,670 MW, which, for comparison, is nearly 1% of U.S. electricity generating capacity. Opinions differ on whether future growth in Bitcoin will significantly impact energy consumption and subsequent carbon dioxide (CO 2 ) emissions. Cryptocurrency mining includes costs associated with equipment, facilities, labor, and electricity. Some users pool computational resources to solve PoW problems faster, and are on a worldwide hunt for cheap, reliable electricity in abundance. While many mining pools are in China, some have been able to utilize closed industrial facilities in the United States that can provide abundant electricity at affordable rates. According to a study in 2017, nearly three-quarters of all major mining pools are based in either China (58%) or in the United States (16%). By some estimates, the state of Washington hosted 15%-30% of all Bitcoin mining operations globally in 2018. Governments are developing various policies in response to growth in energy demand by cryptocurrency mining activities. In some areas, applications from potential mining companies have exceeded the available capacity. Other areas have offered reduced electricity rates to attract miners. In the United States, in addition to efforts at the state and local level, there are potential options that could be adopted by the federal government to improve the energy efficiency of mining operations. Potential federal policy options include minimum energy conservation standards, voluntary energy efficiency standards, and data center energy efficiency standards. In addition to the challenges that cryptocurrency mining presents to the energy sector, there are also opportunities, particularly for blockchain. These may include electric vehicle charging infrastructure and distributed energy resources, among others. The U.S. electricity grid is critical infrastructure and subject to certain regulations to maintain safe and reliable operations. Opinions differ as to a potential role for blockchain technology in the energy sector.", "document_type": "crs"}
{"report": "Congressional oversight of the executive branch is a topic of perennial interest to many Members of Congress, their staff, and the public. Statutory reporting requirements can be useful in facilitating congressional oversight by enhancing congressional access to information about the implementation of public policy. Each year, Congress enacts a variety of requirements for the President, executive departments, agencies, and other federal government entities to provide advance notification of actions and decisions, to create plans and strategies to carry out certain activities, to summarize steps taken toward implementation of particular policies, or to study problems and issue recommendations. Reporting requirements can be used to accomplish a range of different goals. When designing such requirements, policymakers face a number of choices that may affect the content, frequency, and other features of the information that Congress receives as a result. This report provides an overview of statutory reporting requirements used by Congress to obtain information from the executive branch; describes the goals that various types of reporting requirements may help achieve; and analyzes statutory requirements enacted during the 115 th Congress to identify common features of legislative language used to establish such requirements. Congress relies in large part on information provided by the executive branch in order to conduct oversight. To that end, Congress frequently enacts statutory provisions that require executive agencies and other federal entities to provide Congress or its committees with specified information. The type and amount of information required by these provisions can vary substantially. Congress often requires federal entities to provide, among other things, notifications of actions or decisions, data and statistics related to particular topics, reports describing the results of studies or evaluations, detailed plans to implement particular policies, and recommendations for legislative actions. The volume of statutory reporting requirements has varied over time, and policymakers have periodically taken steps to assess and/or reduce the number of reporting requirements. Still, Congress requires various federal entities to submit thousands of reports, notices, studies, and other materials each year, and new requirements for both singular and recurring reports continue to be enacted. Statutory reporting requirements come in several common forms, and can serve a range of potentially overlapping purposes. These include ensuring compliance with legislative intent, gathering vital data and statistics, monitoring the implementation of public policy, evaluating the effectiveness of particular programs, assessing federal capacity to meet particular challenges, studying issues that are not well-understood, and obtaining recommendations for legislative or other action. Each year, Congress typically enacts a range of reporting requirements of varying types. Most requirements can be roughly divided into several categories: notifications of actions or decisions; descriptive reports that summarize actions taken or provide other factual information; plans to accomplish particular goals; and studies or evaluations relating to a specific problem or concern. Each category is discussed in additional detail below. Many statutory provisions require that specified federal officials, typically Cabinet Secretaries or the heads of other federal entities, notify Congress either before or soon after taking some action. For instance, Congress may grant a Secretary the authority to take a particular action or waive a particular restriction, provided that the Secretary notifies Congress when utilizing such authority. In some instances, notification requirements specify additional information that must be submitted, such as justification supporting the relevant action. The National Defense Authorization Act for FY2019 ( P.L. 115-232 ), for example, provided the following notification requirement: (c) WAIVER.âThe Secretary of the Navy may waive the limitation under subsection (a) with respect to a naval vessel if the Secretary submits to the congressional defense committees notice in writing ofâ (1) the waiver of such limitation with respect to the vessel; (2) the date on which the period of overseas forward deployment of the vessel is expected to end; and (3) the factors used by the Secretary to determine that a longer period of deployment would promote the national defense or be in the public interest. This type of reporting requirement can help Congress supervise executive branch activities as they occur. Notification requirements may also help Congress monitor the use of a new grant of authority in order to ensure compliance with legislative intent. Additionally, notification requirements may provide legislators an opportunity to prevent or modify certain executive actions with which they disagree, or to consult with relevant officials before such action is carried out. Further, the requirement to keep Congress notified of ongoing developments may provide a disincentive for the executive branch to take actions that might prompt a legislative response. A broad category of reporting requirements might be labeled descriptive reports on executive branch activities. This category of reports largely consists of descriptions of agency activity and other factual information. Requirements for descriptive reports often direct officials to provide Congress with data and statistics, to summarize actions taken by an agency on a particular policy matter, or to list actions taken during a specified time frame. The scope of content that may be required in this category of reports is wide-ranging. Some common formulations include requirements for agencies to provide data and statistics pertaining to a particular program or policy issue; summaries of major agency activities or accomplishments during a specified time frame; descriptions of the operations or results of a particular program; recurring reports on how certain appropriated funds are used; summaries of steps taken to implement a set of recommendations; or reports describing instances in which a Secretary or other executive branch official utilized a particular grant of authority during a specified time frame. Congress may require agencies to submit plans to achieve particular goals. Requirements in this category often require agencies to describe timelines for achieving goals, and to establish performance indicators that will be used to measure progress. Certain acts, such as the Government Performance and Results Act (GPRA) and the GPRA Modernization Act of 2010, have established requirements for multiple executive branch agencies to create and submit agency-wide strategic and performance plans on a recurring basis. In addition to agency-wide plans, Congress may enact provisions that require a particular agency to specify how it plans to accomplish specific goals, such as the establishment of a new program, or the implementation of new policies and procedures. For example, the Harry W. Colmery Veterans Educational Assistance Act of 2017 ( P.L. 115-48 ) included the following provision, requiring the Secretary of Veterans Affairs to outline plans to make changes and improvements to a particular information technology system: (a) PROCESSING OF CERTAIN EDUCATIONAL ASSISTANCE CLAIMS.âThe Secretary of Veterans Affairs shall, to the maximum extent possible, make such changes and improvements to the information technology system of the Veterans Benefits Administration of the Department of Veterans Affairs to ensure thatâ (1) to the maximum extent possible, all original and supplemental claims for educational assistance under chapter 33 of title 38, United States Code, are adjudicated electronically; and (2) rules-based processing is used to make decisions with respect to such claims with little human intervention. (b) IMPLEMENTATION PLAN.âNot later than 180 days after the date of the enactment of this Act, the Secretary of Veterans Affairs shall submit to Congress a plan to implement the changes and improvements described in subsection (a). Reporting provisions of this sort might also be accompanied by requirements for regular status updates on how such a plan is being carried out. Agencies also may be required to submit plans that describe how funds appropriated for a particular purpose are to be spent, potentially as a precondition for the expenditure of such funds. For instance, a provision of the Consolidated Appropriations Act for FY2017 ( P.L. 115-31 ) required the Secretary of State to report to the House and Senate Committees on Appropriations prior to obligating certain funds: (3) PRE-OBLIGATION REQUIREMENTS.âPrior to the obligation of funds made available pursuant to paragraph (2) and following the submission of the Strategy as required in paragraph (1), the Secretary of State shall submit to the Committees on Appropriations a multi-year spend plan as described under this section in the explanatory statement described in section 4 (in the matter preceding division A of this Consolidated Act), including a description of how such funds shall prioritize addressing the key factors in countries in Central America that contribute to the migration of undocumented Central Americans to the United States. Requiring an agency to submit a plan to achieve a particular goal can force attention to matters of interest to Congress that an agency might otherwise choose to deprioritize. Further, plans that establish timelines and performance metrics can help policymakers more systematically measure and assess agency progress. Congress often asks departments, agencies, and other federal entities to study a problem or emerging issue, evaluate government performance in a particular area, or perform some other analytical task. These provisions often include a requirement that the reporting entity issue recommendations for legislative or other actions to address particular concerns. Unlike descriptive reporting requirements, this category of requirements tends to address forward-looking concerns that may not be well or fully understood. Studies and evaluations required by Congress may serve to highlight issues and call attention to problems; to obtain expertise concerning issues that are technical or complex; to assess government performance and capacity; and to obtain recommendations and inform legislative decisionmaking. The John S. McCain National Defense Authorization Act for Fiscal Year 2019 ( P.L. 115-232 ), for example, established the National Security Commission on Artificial Intelligence, which was directed to \"review advances in artificial intelligence, related machine learning developments, and associated technologies,\" and to submit recurring reports to Congress and the President on the commission's findings and recommendations. Other reporting requirements direct agencies to conduct an evaluation of a program or policy. For example, The Federal Aviation Administration (FAA) Reauthorization Act of 2018 ( P.L. 115-254 ) directed the Secretary of Transportation to establish an advisory panel \"to review and evaluate the effectiveness of the FAA's personnel management system and performance management program\"; to develop a series of recommendations based on the results of the review; and to report its findings to the Secretary, the FAA Administrator, and the appropriate committees of Congress. In addition, Congress also enacts provisions that require the Government Accountability Office (GAO) to conduct studies and evaluations. GAO is a legislative branch agency that performs audits, evaluations, investigations, and other services that support Congress in its oversight role. GAO prepares reports, testimonies, and other products in response to requirements established in statute, contained in committee or conference reports, and in response to requests from committees and individual Members. As discussed above, reporting requirements may be designed to serve several, potentially overlapping, purposes. These purposes include supervising executive activity, ensuring compliance with legislative intent, focusing agency attention on matters of importance to Congress, gathering factual information, assessing the effectiveness of programs and policies, and obtaining better understanding of complex or emerging issues. Reports on studies and evaluations may also help originate new legislative proposals and better inform legislative decisionmaking. Agency reviews of policies and procedures might provide useful information to Congress regarding potentially outdated or otherwise incompatible provisions of law that might need reconsideration. The addition of reporting requirements might serve as a compromise position for legislators in certain circumstances. For example, Members may disagree on whether to provide the Executive with a certain grant of authority. Granting the authority, provided that the Executive reports to Congress on its use, might serve as a middle ground in such a scenario. Some observers have criticized the reporting burden that Congress places on the executive branch as excessive and costly. Although various entities have periodically attempted to estimate the financial cost of certain reporting requirements, efforts to estimate the total cost of reporting requirements are complicated by, among many factors, the lack of a comprehensive inventory of required reports. Nonetheless, preparing and submitting reports to Congress requires expenditure of agency resourcesâincluding time, money, and personnel. Ensuring the ongoing relevance of existing reporting requirements is another concern. Many statutory reporting requirements instruct that a report shall be submitted on a recurring basis, often without any sunset provision. Elimination or consolidation of reports that are considered to be duplicative, outdated, ineffective, or excessively costly has been a long-standing challenge for policymakers, and several attempts have been made to address the issue. Again, because no comprehensive inventory of reporting requirements currently exists, assessing the usefulness of existing requirements and deciding whether a contemplated new requirement is duplicative of existing requirements both pose challenges for Congress. Agency compliance with reporting requirements poses another difficulty. Due to a variety of factors, including vagueness in some statutory deadlines, and the lack of a complete inventory of reporting requirements and actual submissions, assessing whether required reports have been submitted (and whether the submission was timely) can be difficult. Moreover, the content of reports submitted to Congress may sometimes fall short of statutory requirements or congressional expectations. Although statutory reporting requirements vary widely in the scope and nature of the information they are designed to elicit, most requirements carry several common provisions. When designing these requirements, Congress faces a number of choices that may affect the content, frequency, and other features of the information ultimately received. To better understand various options and legislative considerations for creating reporting requirements, this report analyzes requirements enacted during the 115 th Congress that could be identified using a keyword search. CRS is unaware of a search method that can obtain an exact accounting of all reports required to be submitted to Congress. Perhaps the best-known compendium of statutory reporting requirements is Reports to be Made to Congress , a document published annually by the Clerk of the House pursuant to clause 2(b) of House Rule II. This document provides an extensive listing of reporting requirements and is sometimes used by analysts attempting to quantify the reporting burden placed by Congress on the executive branch. Although the information provided in the Clerk's report is valuable and extensive, it may not provide a complete accounting of statutory reporting requirements. Reports to Congress might arise from several sources. These include statutory reporting requirements; House, Senate, and conference committee report language; and interactions between Members of Congress and agency officials. The diversity of sources of reporting requirements means that any accounting of requirements based on a single source (such as public laws) will necessarily be incomplete. Congress utilizes reporting requirements to obtain a wide array of information through a variety of different products. Accordingly, variation in the legislative language used to refer to reports and their contentsâas well as recipients of such reportsâposes additional challenges in comprehensively identifying reporting requirements. For instance, Congress may require agencies to conduct and submit information regarding a review, evaluation, assessment, plan, strategy, analysis, or study; it may ask for a report, list, summary, briefing, notification, certification, or some other product; and agencies might be directed to submit this product to Congress, to committees of Congress, or to specified individuals (such as the Speaker of the House, the President Pro Tempore of the Senate, or the chairperson and ranking member of relevant committees). To identify statutory reporting requirements created during the 115 th Congress, CRS searched the text of public laws enacted in the 115 th Congress for a variety of terms related to reports, and a variety of terms related to Congress. Each search result was examined to determine whether the language required a federal official, agency, or other entity to submit specified information to Congress, congressional committees, or congressional leaders. This search process resulted in the identification and analysis of over 3,000 reporting requirements enacted in statute during the 115 th Congress. Although the described search method identified many reporting requirements, the results identified should not be considered a complete accounting of the reporting requirements placed on agencies during the 115 th Congress, and may not be representative of all reporting requirements. These limitations include the following: The diversity in statutory language used to establish reporting requirements makes it unlikely that any single keyword search will capture all of them. Some legislative provisions require that agencies produce a report, but do not specify a congressional recipientârequiring instead, for instance, that the agency make a copy of such report publicly available on its website. Because this search used the proximity between words related to reports and words related to Congress in order to identify reporting requirements, any requirements that did not specify a congressional recipient are not included. Agency reports to Congress may originate from statutory provisions, committee report language, and other sources. Because this search was conducted exclusively within the text of public laws, any reporting requirements contained in other sources will necessarily be excluded. Reporting requirements identified for this report are only those statutory requirements enacted during the 115 th Congress. Therefore, any patterns gleaned from these data may not be generalizable to requirements enacted in other years. The search process outlined above identified 3,359 reporting requirements enacted during the 115 th Congress. Several laws contained the bulk of the 3,359 identified requirements. In particular, four actsâthe Consolidated Appropriations Acts for FY2017 and FY2018, as well as National Defense Authorization Acts for FY2018 and FY2019 âtogether contain more than half of all identified requirements. Reporting requirements identified in appropriations measures generally differ from those identified in other measures. For instance, identified notification requirements were more common in appropriations acts than in other acts, which generally contained a greater number of provisions requiring agencies to submit other types of reports to Congress (descriptive reports, plans, and studies and evaluations). Appropriations measures enacted in the 115 th Congress contained numerous requirements for agencies and officials to notify Congress before (or soon after) the obligation, transfer, or reprogramming of certain funds. The permanence of reporting provisions constitutes another difference between appropriations and nonappropriations measures. Reporting requirements contained in appropriations acts generally expire at the end of the relevant fiscal year. Still, some requirements contained in appropriations acts reappear in subsequent appropriations bills, effectively making them recurring provisions. Analysis of reporting provisions enacted in the 115 th Congress identified several components common to statutory reporting requirements. Most reporting provisions specify the information that must be contained in the report; the identity of the official or agency responsible for submission; the recipient of the report; the deadline by which the report must be submitted; and whether the requirement is for a one-time or recurring report. Depending on the type of reporting requirement, the reporting provision may also include language detailing whether the information reported to Congress must also be made publicly available, and how any potentially classified material contained in the report ought to be handled. Every identified reporting requirement specifies some information that must be submitted to Congress. Analysis of these reporting provisions uncovered a wide range in the nature, type, and specificity of content required. As already mentioned, reporting provisions require many different products to be submitted to Congress, such as notifications, certifications, plans, summary reports, studies, assessments, and evaluations, among many others. Instructions regarding the information required to be submitted ranged from general to highly specific. For instance, some reporting provisions direct agencies to produce a \"status update,\" or a \"quarterly report\" on a particular topic, without detailing specific matters that must be analyzed or included in such reports. Other reporting provisions detail in length the components and subcomponents that an agency must include in its report to Congress. Greater specificity in the required contents of a report may help ensure agency attention to matters of congressional interest. However, adding additional components to a requirement may place greater burdens on the responsible agency. Although requirements for written reports are most common, Congress also periodically directs agencies to share information in other ways, including through briefings and testimony. For instance, the Save Our Seas Act of 2018 ( P.L. 115-265 ) provided the following: (a) IN GENERAL.âNot later than December 19 of 2018, and of each of the 2 subsequent years thereafter, the Commandant shall provide to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Transportation and Infrastructure of the House of Representatives a briefing on the status of implementation of each action outlined in the Commandant's final action memo dated December 19, 2017, regarding the sinking and loss of the vessel El Faro. Reporting requirements typically specify one or more federal officials responsible for submitting a report to Congress. Among the reporting requirements CRS identified, Cabinet Secretaries were most commonly directed to submit reports, though in many cases, the heads of other federal entities and subentities (officials with the titles Under Secretary, Deputy Secretary, Assistant Secretary, Director, Administrator, and Chief, among others) were also specified. In a smaller number of cases, no specific official was identified, but instead an agency or other entity (such as a federal commission, task force, board, or some other group) was made responsible for submission. Some reporting requirements direct multiple federal agencies to participate in creating and submitting a report. A common formulation is to direct that a report be prepared and submitted by an official, \"jointly,\" \"in consultation,\" or \"in coordination\" with one or more officials from other agencies. For example, the National Defense Authorization Act for FY2018 ( P.L. 1 15-91 ) directed that the Secretary of Defense, in consultation with the Secretary of State, shall submit to the congressional defense committees, the Committee on Foreign Relations of the Senate, and the Committee on Foreign Affairs of the House of Representatives a report that contains a strategy to prioritize United States defense interests in the Indo-Asia-Pacific region. Some requirements may also direct federal officials to work with nonfederal entities in the creation of reports. These provisions might be used in cases where Congress desires agency consultation with outside experts on complex issues, or collaboration with other relevant stakeholders. For example, the Weather Research and Forecasting Innovation Act of 2017 ( P.L. 115-25 ) directs the Under Secretary of Commerce for Oceans and Atmosphere to \"assess the National Oceanic and Atmospheric Administration system for issuing watches and warnings regarding hazardous weather and water events,\" and specifies the following: (4) Consultation.âIn conducting the assessment required by paragraph (1)(A), the Under Secretary shallâ (A) consult with such line offices within the National Oceanic and Atmospheric Administration as the Under Secretary considers relevant, including the National Ocean Service, the National Weather Service, and the Office of Oceanic and Atmospheric Research; (B) consult with individuals in the academic sector, including individuals in the field of social and behavioral sciences, and other weather services; (C) consult with media outlets that will be distributing the watches and warnings; (D) consult with non-Federal forecasters that produce alternate severe weather risk communication products; (E) consult with emergency planners and responders, including State and local emergency management agencies, and other government users of the watches and warnings system, including the Federal Emergency Management Agency, the Office of Personnel Management, the Coast Guard, and such other Federal agencies as the Under Secretary determines rely on watches and warnings for operational decisions; and (F) make use of the services of the National Academy of Sciences, as the Under Secretary considers necessary and practicable, including contracting with the National Research Council to review the scientific and technical soundness of the assessment required by paragraph (1)(A), including the recommendations developed under paragraph (2)(B). Among identified requirements, statutory language identifying the recipients of reports varies substantially. Report recipients specified in statute include Congress as a whole, specific congressional committees, committee chairs and ranking members, congressional leaders, executive branch officials, and a combination of several of the above. Most identified reporting requirements direct that the report or notification in question be submitted to one or more standing committees of Congress, or to the chairs and ranking members thereof. Often, a report is directed to be submitted to a single pair of committees (e.g., both the House and Senate Committees on Appropriations), but some statutes designate multiple committees in each chamber as recipients of the report. The second-most-common category of reporting requirements are those that specify Congress as the recipient, without identifying any particular committee. Reports submitted to Congress as a whole, and received by the Speaker of the House or the presiding officer in the Senate, are generally referred to the committee of jurisdiction in each chamber. The decision to specify Congress, a single pair of House and Senate committees, or several committees in each chamber may have consequences for dissemination of relevant information. Although some reports may contain information of value to multiple committees, reports submitted to Congress as a whole are generally referred to a single relevant committee in each chamber. Accordingly, directing that a report be submitted to Congress may not always guarantee that the report reaches all interested congressional audiences. Some requirements direct that reports be submitted to the President, agency officials, or other recipients, in addition to Congress or its committees. For instance, some statutes establish independent panels that conduct studies and report their recommendations to both Congress and the President, particularly in cases where the panel may produce recommendations for both legislative and administrative action. Several identified requirements direct an agency to submit a report to both Congress and the Comptroller General, and require the Comptroller General to subsequently assess the contents of such report and submit findings and/or recommendations to Congress. Inclusion of such provisions may help Congress obtain an outside perspective on the matter in question, assess the quality of plans or recommendations issued by agencies, and help ensure that the report produced by the agency in question meets the standards laid out in statute. For instance, the FAA Reauthorization Act of 2018 ( P.L. 115-254 ) included the following provision: (a) STRATEGY.âNot later than 180 days after the date of enactment of this Act, the Administrator shall submit to the appropriate congressional committees and the Comptroller General of the United States a strategy to guide operations of surface transportation security inspectors that addresses the following: (1) Any limitations in data systems for such inspectors, as identified by the Comptroller General. (2) Alignment of operations with risk assessment findings, including an approach to identifying and prioritizing entities and locations for inspections. (3) Measurable objectives for the surface transportation security inspectors program. (b) GAO REVIEW.âNot later than 180 days after the date the strategy under subsection (a) is submitted, the Comptroller General of the United States shall review such strategy and, as appropriate, issue recommendations. Nearly all identified reporting requirements contain some deadline by which the specified information must be submitted. In some cases, a calendar date is provided. More oftenâparticularly in the case of notification requirementsâthe deadline is fixed to the occurrence of a specified event. For example, reports may be required to be submitted to Congress within a certain amount of time following enactment of legislation containing the requirement; a specified action taken by an agency or official (such as the waiver of a requirement, the completion of a review, or a determination that certain conditions have been met); submission of the President's budget request to Congress; termination of a program; and the end of a fiscal year or quarter. The decision to require a report by a certain calendar date, or instead by some amount of time following a specified event, can involve trade-offs between a report's timeliness and the quality of the information received. For instance, setting a calendar-date deadline for submission of a report may help ensure that relevant information is submitted to Congress in a timely and predictable manner. However, any delay in the actual enactment of such a requirement would have the practical effect of reducing the amount of time available to the agency to produce the report. Instead, fixing the deadline to an eventâfor instance, by instructing that the report be submitted within 180 days of enactment (or some other time frame)âwould provide the agency with the same amount of time to complete the report, regardless of when the requirement is enacted. This may help ensure that an agency has sufficient time to produce a report that addresses congressional concerns. On the other hand, tying the deadline to an event rather than establishing a calendar-date deadline may delay the actual submission date of the report in question. Additionally, it may be more difficult for legislators and staff to oversee compliance with complex deadlines. Some report deadlines are tied to events that are less easily observed than the enactment of legislation or the submission of the President's budget request. For instance, reports and notifications may be required to be submitted within some period of time following (or in advance of) a specific action taken by an agency official, such as waiving a requirement, awarding a contract, or certifying that certain conditions have been met. In such cases, knowing when to expect a report to be delivered and assessing agency compliance with statutory requirements may be challenging. Occasionally, reporting requirements do not specify a deadline for submission. Instead, these provisions may provide some other incentive for agencies to submit the informationâoften by making funds available for a particular purpose, or permitting some other action only after the report is submitted. For example, the National Defense Authorization Act for FY2018 ( P.L. 115-91 ) limited the availability of funds authorized to be appropriated for the upgrade of certain vehicles, until the Secretary of the Army submitted specified information: (a) LIMITATION.âOf the funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2018 for the upgrade of M113 vehicles of the Army, not more than 50 percent may be obligated or expended until the date on which [the] Secretary of the Army submits to the congressional defense committees the report described in subsection (b). (b) REPORT.âThe report described in this subsection is a report setting forth the strategy of the Army for the upgrade of M113 vehicles that includes the following: (1) A detailed strategy for upgrading and fielding M113 vehicles. (2) An analysis of the manner in which the Army plans to address M113 vehicle survivability and maneuverability concerns. (3) An analysis of the historical costs associated with upgrading M113 vehicles, and a validation of current cost estimates for upgrading such vehicles. (4) A comparison ofâ (A) the total procurement and life cycle costs of adding an echelon above brigade requirement to the Army MultiPurpose Vehicle; and (B) the total procurement and life cycle costs of upgrading legacy M113 vehicles. (5) An analysis of the possibility of further accelerating Army Multi-Purpose Vehicle production or modifying the fielding strategy for the Army Multi-Purpose Vehicle to meet near-term echelon above brigade requirements. Some reports to Congress are designed to be submitted once, whereas others are to be submitted on a periodic basis. Whether a reporting requirement is one-time or reoccurring may depend on the type of requirement and the nature of the information being reported. Many statutes provide for one-time, nonrecurring reports to Congress. Often, these reports are designed to address a particular problem or concern. Studies and evaluations, for instance, are commonly one-time reports. One-time reports constituted the single largest category of identified reporting requirements enacted in the 115 th Congress. Reports are also commonly required to be submitted at regular intervals. Recurring reports to Congress might include, among other things, periodic status updates on the implementation of a particular policy, annual summaries of agency activity and accomplishments, regularly reported data and statistics related to a particular program or policy issue, and quarterly reports on how certain funds are obligated and expended. Among identified regularly recurring reporting requirements, annual and quarterly reporting intervals were the most common, though intervals ranged from as short as every month to as long as every five years. Requiring reports on a frequent basis may help Congress maintain close supervision of executive activity; on the other hand, frequent reports may increase the burden placed on agency resources. A number of identified recurring requirements contain a sunset date for the recurring reporting provision. For example, the SUPPORT for Patients and Communities Act ( P.L. 115-271 ) included the following recurring reporting requirement: (3) ADDITIONAL REPORTS.âNot later than 1 year after the date of enactment of this Act, and annually thereafter until the date that is 5 years after the date of enactment of this Act, the Attorney General shall submit to Congress a report providing, for the previous yearâ (A) the number of reports of suspicious orders; (B) a summary of actions taken in response to reports, in the aggregate, of suspicious orders; and (C) a description of the information shared with States based on reports of suspicious orders. In the long term, automatic expiration of recurring reporting requirements may reduce the reporting burden placed on agencies, and help legislators and staff avoid the task of searching for and identifying outdated or duplicative requirements. In contrast to requirements for one-time reports and reports provided at fixed intervals, some provisions mandate the submission of a report to Congress only under particular circumstances. Many such provisions, for instance, direct an agency official to report to Congress each time a certain action is taken. Depending on how often the circumstances arise, an individual requirement of this type may give rise to the possibility of zero, one, or multiple actual reports to Congress. For instance, the Veterans Appeals Improvement and Modernization Act of 2017 ( P.L. 115-55 ) directs the Secretary of Veterans Affairs to report to Congress \"whenever\" the Secretary makes a certain determination: (a) AUTHORIZATION.â (1) IN GENERAL.âThe Secretary of Veterans Affairs may carry out such programs as the Secretary considers appropriate to test any assumptions relied upon in developing the comprehensive plan required by section 3(a) and to test the feasibility and advisability of any facet of the new appeals system. (2) REPORTING REQUIRED.âWhenever the Secretary determines, based on the conduct of a program under paragraph (1), that legislative changes to the new appeals system are necessary, the Secretary shall submit to the Committee on Veterans' Affairs of the Senate and the Committee on Veterans' Affairs of the House of Representatives notice of such determination. Requirements for agencies to notify Congress of actions or decisions commonly fall into this category. Examples include, among many others, provisions that require congressional notification prior to (or soon after) the obligation, transfer, or reprogramming of funds; awarding a certain type of contract; waiving sanctions; waiving a specified limitation; or utilizing some grant of authority. For example, the Agriculture Improvement Act of 2018 ( P.L. 115-334 ) provided that [t]he Secretary shall not close any field office of the Natural Resources Conservation Service unless, not later than 30 days before the date of the closure, the Secretary submits to the Committee on Agriculture of the House of Representatives and the Committee on Agriculture, Nutrition, and Forestry of the Senate a notification of the closure. As previously discussed, in addition to helping Congress monitor agency activity on a close-to-real-time basis, this type of requirement may provide an opportunity to consult with executive branch officials about a contemplated action, or to take steps to modify, prevent, or reverse the action in cases of disagreement. As noted above, some statutes create requirements for reports and notifications that, upon or after submission, clear the way for some exercise of authority or permit some other action by executive branch officials. For instance, Congress may provide executive branch officials with the discretion to waive certain requirements, provided that the official provides Congress with justification for the decision. The Countering America's Adversaries through Sanctions Act, for example, includes a number of provisions that permit the President to waive or terminate particular sanctions, contingent upon the submission of specified information to Congress. Other statutes place limitations on how certain funds may be obligated, contracts may be awarded, or other authorities may be used, until a particular report is submitted. Requiring that a report be made publicly available may enhance access to and awareness of its contents, among both legislators and the general public. Certain reports to Congress are made public by defaultâfor instance, all unclassified GAO reports are made publicly available on the agency website. However, other agencies submitting reports to Congress or its committees may not be required to be make such reports publicly available, absent some explicit instruction. Some reporting provisions do contain such instructions, often directing that a report be made available on an agency's public website. The Consolidated Appropriations Act for FY2018 included a blanket provision that gave agency officials discretion over whether to make certain reports public: (1) Requirement.âAny agency receiving funds made available by this Act shall, subject to paragraphs (2) and (3), post on the publicly available Web site of such agency any report required by this Act to be submitted to the Committees on Appropriations, upon a determination by the head of such agency that to do so is in the national interest. (2) Exceptions.âParagraph (1) shall not apply to a report ifâ (A) the public posting of such report would compromise national security, including the conduct of diplomacy; or (B) the report contains proprietary, privileged, or sensitive information. (3) Timing and Intention.âThe head of the agency posting such report shall, unless otherwise provided for in this Act, do so only after such report has been made available to the Committees on Appropriations for not less than 45 days: Provided , That any report required by this Act to be submitted to the Committees on Appropriations shall include information from the submitting agency on whether such report will be publicly posted. Some reports required to be submitted to Congress may contain national security classified material, which may restrict who may access the information, how an agency might provide it to Congress, and how it may be accessed. In such cases, reporting provisions may require submission of a nonclassified report, with a classified annex. Separating classified and nonclassified material may increase a given report's usefulness by facilitating policymakers' access to relevant nonclassified materials. Reporting requirements can serve as a critical component of legislative oversight. They may be designed to accomplish a variety of purposes, including monitoring executive activity, obtaining information on complex or emerging issues, and generating ideas and recommendations for legislative action. However, legislators, agencies, and outside observers have periodically voiced concerns regarding the volume and cost of reporting requirements, whether certain requirements are duplicative and ineffective, and the difficulty in monitoring agency compliance with such requirements. Each concern noted above is complicated by the lack of a comprehensive inventory of existing report requirements and report submissions. Legislators have periodically introduced legislation to create a centralized repository of congressionally mandated reports. For example, the Access to Congressionally Mandated Reports Act ( H.R. 736 , 116 th Congress) would, among other things, require the Government Publishing Office (GPO) to create a publicly available online portal of \"all congressionally mandated reports,\" subject to certain exceptions. The bill was passed by the House on July 7, 2019. Establishing a centralized, public repository for congressionally mandated reports may address a number of concerns related to the reporting process. For instance, a comprehensive database of submitted reports may allow Congress to more easily monitor whether an expected report has been submitted, and whether it was submitted in a timely fashion. Additionally, it may facilitate greater accessibility to and awareness of reports submitted to Congress. Greater awareness of reports that have already been submitted may in turn help Congress make better use of information provided by agencies, and also help determine whether contemplated requirements for new reports may be duplicative of existing reports. Lastly, a centralized database of submitted reports may help Congress better assess the reporting burden placed on federal agencies. On the other hand, creating a database of all submitted reports would not necessarily provide Congress with a complete picture of reporting requirements . Reports that are required, but are not submitted, would not appear in a repository of submitted reports, potentially limiting its use as a tool for monitoring agency compliance. For reasons already discussed, obtaining a complete inventory of existing requirements would be a complicated and potentially resource-intensive task. Additionally, the establishment of any centralized repository would require ongoing maintenance and other resources as new requirements are established and new reports are submitted. However, an incomplete understanding of the full range of existing requirements may make it difficult or impossible to determine the total volume of reports required, to attempt to identify and eliminate outdated requirements, to assess agency compliance, or to determine whether a contemplated new reporting requirement is duplicative of existing requirements.", "summary": "Congress frequently requires the President, departments, agencies, and other entities of the federal government to transmit reports, notifications, studies, and other information on a specified timeline. Reporting requirements may direct agency officials to notify Congress or its committees of forthcoming actions or decisions, describe actions taken on a particular matter, establish a plan to accomplish a specified goal, or study a certain problem or concern. Reporting requirements may be designed to serve a range of purposes that facilitate congressional oversight of the executive branch and inform congressional decisionmaking. Required reports may help legislators monitor executive activity, ensure compliance with legislative intent, focus agency attention on matters of importance to Congress, and assess the effectiveness of existing programs and policies. Certain reports on complex or emerging issues may also help originate or inform legislative proposals. This report discusses the potential benefits and challenges of reporting requirements, and analyzes a number of statutory reporting requirements enacted during the 115 th Congress. (Patterns gleaned from these data may not be generalizable to requirements enacted in other years.) This report analyzes features common to legislative language establishing reporting requirements. In general, most identified statutory reporting provisions specify the information that must be contained in the report; the identity of the official or agency responsible for submission; the recipient of the report; the deadline by which the report must be submitted; and whethe r the requirement is for a one-time or recurring report. Depending on the type of reporting requirement, the reporting provision may also include language detailing whether the information reported to Congress must also be made publicly available, and how any potentially classified material contained in the report ought to be handled. Some provisions also permit certain activities only upon the submission of a report or notification to Congress, such as the waiver of sanctions, or the transfer or reprogramming of appropriated funds.", "document_type": "crs"}
{"report": "Some observers argue the COVID-19 pandemic could be a world-changing event with potentially profound and long-lasting implications for the international security environment and the U.S. role in the world. Other observers are more skeptical that the COVID-19 pandemic will have such effects. This report provides a brief overview of some potential implications the COVID-19 pandemic might have for the international security environment and the U.S. role in the world, and a bibliography of CRS reports and other writings for further reading. Issues for Congress may include whether and how the COVID-19 pandemic could change the international security environment, whether the Trump Administration's actions for responding to such change are appropriate and sufficient, and what implications such change could have for the role of Congress in setting and overseeing the execution of U.S. foreign and defense policy. Congress's decisions regarding these issues could have significant and even profound implications for U.S. foreign and defense policy, and for the status of Congress as a co-equal branch relative to the executive branch in setting and overseeing the implementation of U.S. foreign and defense policy. Appendix A presents a list of CRS reports that provide more in-depth discussions of issues presented in this report. Appendix B presents a list of additional writings reflecting various perspectives on these issues. A separate CRS report discusses the question of whether the U.S. role in the world is changing as a result of factors other than the C OVID-19 pandemic. Areas of potential change reflected in writings from observers who view the COVID-19 pandemic as a potentially world-changing event include but are not limited to those discussed below. Although these areas of potential change are presented separately, they overlap in some cases and can interact with one another. Some observers have focused on the possibility that the COVID-19 pandemic could cause or accelerate a decline or erosion in the U.S.-led liberal international order that has operated since World War II, in the international institutions and norms that contribute to it, and consequently in global governance. A decline or erosion in the U.S.-led liberal order or the international institutions form part of it could set the stage for its replacement by a new or modified world order reflecting changed rules, norms, and practices, or by a more disorderly world. Some observers have focused on how, in their view, the COVID-19 pandemic is demonstrating that the United States is maintaining or reasserting its role as global leader, while other observers suggest that, in their view, the COVID-19 pandemic is demonstrating that the United States has chosen to withdraw from or is no longer capable of performing that role. The COVID-19 pandemic could influence discussions over the costs and benefits to the United States of acting as a global leader, not only with respect to global health but across a range of issues. Related to this, some observers have focused on how the COVID-19 pandemic may be illustrating the strengths or weaknesses of the Trump Administration's \"America First\" approach to the U.S. role in the world, or the merits of the U.S. system of government and economic model as potential examples for other countries to emulate. Some observers have focused on how the COVID-19 pandemic may be providing insight into whether China desires and is working to become a global leader on par with (or in the place of) the United States, whether China has a capacity for doing so, and how other countries might view China acting in such a role. China's transparency, particularly regarding its actions in the early days of its COVID-19 outbreak in Wuhan, as well as China's so-called donation diplomacy or mask diplomacyâmeaning China's actions to send medical supplies and personnel to other countries, and the highlighting of these actions in statements from China's government and state-controlled mediaâhave become new elements of an ongoing discussion regarding China's capacity or suitability for acting as a global leader. This ongoing discussion includes consideration of a range of other issues, including China's actions for implementing its Belt and Road Initiative, China's territorial disputes with other countries, its participation in international organizations, and its technology-development and international lending activities. Some observers have focused on how the COVID-19 pandemic has become a significant element in U.S-China relations, and in U.S. great power competition with China and Russia, which the Trump Administration has placed at the center of its national security construct. For some observers, the COVID-19 pandemic presents an opportunity for U.S.-China cooperation on an important international issue of common interest. For other observers, the COVID-19 pandemic is a major new source of dispute and arena of competition between the two countries, and is causing U.S.-China relations to harden more fully into a Cold War-like adversarial situation. Some observers have focused on how the COVID-19 pandemic provides a prominent new factor in the discussion of whether the United States should decouple its economy from China's and reduce its dependence on China for key materials and products, including hospital supplies and pharmaceuticals. Some observers have focused on whether the U.S. and Chinse responses to the COVID-19 pandemic will affect views around the world regarding the relative merits of the U.S. and Chinese forms of government and economic models as potential examples to emulate. Related to the point above about forms of government, some observers have focused on how the COVID-19 pandemic appears to be challenging democratic systems in various countries and providing national leaders with an opportunity or rationale for taking actions to seize greater power and move their countries away from democracy and toward authoritarianism or autocracy, or strengthen or consolidate their already-existing authoritarian or autocratic forms of government. As discussed in another CRS report, a key element of the traditional U.S. role in the world since World War II has been to defend and promote freedom, democracy, and human rights as universal values, while criticizing and resisting authoritarian and illiberal forms of government where and when possible. Beyond the specific point above about potential movement toward greater authoritarianism and autocracy, some observers have focused on the possibility that the COVID-19 pandemic more generally could cause increased social tensions in certain countries, could lead to (or present opportunities for) societal reforms and transformations, and could destabilize and perhaps cause the downfall of governments, akin to the effects of certain past world-changing events, such as World War I. Such changes could alter the political orientations, national strategies, foreign policies, and defense policies of the countries in which they occur, potentially inducing follow-on effects among governments and other global actors that interact with those countries. Some observers have focused on the possibility that the COVID-19 pandemic could lead to significant and potentially long-lasting changes to the world economy that in turn could reshape the international security environment. Among other things, observers have focused on the possibility that the COVID-19 situation could be leading the world economy into a significant recessionâan effect that could contribute to the societal tensions mentioned in the previous point. Noting that the COVID-19 pandemic has reduced world trade volumes and disrupted global supply chains, they have focused on the question of whether economic globalization will as a result be slowed, halted, or reversed. Observers are monitoring how such effects could influence or be influenced by U.S. trade policy. The so-called burden-sharing issueâthat is, the question of whether U.S. allies are shouldering a sufficient share of the collective allied defense burdenâhas long been a point of contention between the United States and its allies around the globe, and it has been a matter of particular emphasis for the Trump Administration. Some observers have focused on the possibility that the costs that U.S. allies are incurring to support their economies during stay-at-home/lockdown periods will lead to offsetting reductions in their defense expenditures. Some observers argue that the NATO allies in Europe in particular may experience contractions in their defense budgets for this reason. More generally, some observers argue that if the COVID-19 pandemic causes a global recession, allied defense budgets could be further reducedâa potential impact that could affect not only NATO allies in Europe, but those in Asia as well. Some observers have additionally focused on the question of whether the COVID-19 pandemic is creating tensions among the European Union member states, particularly in connection with actions they are taking to close their national borders, and what impact the COVID-19 pandemic might ultimately have on the cohesion of the European Union. Some observers have focused on the question of whether the COVID-19 situation will (or should) lead to a revised definition of U.S. national security, particularly one that is less military-centric and more focused on what are sometimes called human-security-oriented challenges or global issues, such as climate change, that are currently more at the periphery of U.S. national security policy and plans. Such a change in definition could lead to a changed allocation of funding between the Department of Defense (DOD) and other government agencies that perform national-security-related tasks, a realignment of resources within DOD between combat-oriented programs and other programs (such as those related to DOD's mission of providing defense support of civil authorities), and perhaps a changed allocation of funding among the agencies other than DOD that perform national-security-related tasks. Some observers have focused on the question of whether the large federal expenditures being made in response to the domestic U.S. economic effects of the COVID-19 pandemic, and the impact these expenditures will have on the federal budget deficit and federal debt, could lead to greater constraints in coming years on U.S. defense spending levels. As a follow-on matter, these observers are additionally focusing on the question of whether responding to such increased constraints will (or should) lead to revisions in U.S. defense strategy, changes in U.S. defense programs, and a reduction or termination of certain overseas U.S. military operations. Some observers have focused on the question of whether the COVID-19 pandemic is providing a new lens through which to measure the value of U.S. foreign assistance and international debt relief in promoting U.S. interests, particularly in connection with the previously mentioned issue of whether to revise the definition of U.S. national security to make it less military-centric. Some observers have focused on how non-state actors such as international terrorist and criminal organizations are reacting to the COVID-19 pandemic, and on how much priority should be given to countering such actors in the future, particularly in a context of a changed definition of U.S. national security. Some observers have focused on whether responding to the COVID-19 pandemic is affecting the time and resources that U.S. leaders and agencies can devote to addressing other international issues of concern to the United States that predate but continue to exist in parallel with the COVID-19 pandemic. Administration officials have warned other countries to not take actions during the COVID-19 pandemic to challenge U.S. interests around the world or otherwise test U.S. resolve or responsiveness on the thinking that the COVID-19 pandemic is distracting U.S. officials from other concerns or reducing U.S. capacity for responding to any such challenges. At least one observer has focused on the issue of how the COVID-19 pandemic has affected the ability of Congress to conduct oversight of the Administration's foreign policy actions. For further reading on the issues outlined above, see the CRS reports presented in Appendix A and the additional writings presented in Appendix B . Potential issues for Congress regarding implications of the COVID-19 pandemic for the international security environment and the U.S. role in the world include but are not limited to the following: Will the COVID-19 pandemic change the international security environment, and if so, in what ways? How clearly can potential changes be anticipated? How should the United States respond to potential changes in the international security environment arising from the COVID-19 pandemic and its effects, particularly in light of uncertainty regarding the precise nature and likelihood of these changes? How might U.S. action or inaction influence or accelerate these changes? What actions is the Administration developing to respond to potential changes in the international security environment arising from the COVID-19 pandemic? Does Congress have sufficient visibility into these actions? Are these actions appropriate and sufficient? What metrics should Congress use to assess them? What implications do potential changes in the international security environment arising from the COVID-19 pandemic have for the role of Congress in setting and overseeing the execution of U.S. foreign and defense policy? Is Congress appropriately organized for maintaining Congress as a co-equal branch of government relative to the executive branch in addressing these potential changes? If the COVID-19 pandemic becomes a world-changing event for the international security environment and the U.S. role in the world, what implications, if any, might that have for congressional organization and operations? Appendix A. Related CRS Reports CRS reports that provide more in-depth discussions of specific issues discussed in this report include the following, which are presented in alphabetical order of their titles: CRS In Focus IF11496, COVID-19 and Foreign Assistance: Issues for Congress , by Nick M. Brown, Marian L. Lawson, and Emily M. Morgenstern. CRS Insight IN11288, COVID-19 and the Defense Industrial Base: DOD Response and Legislative Considerations , by Heidi M. Peters. CRS Insight IN11279, COVID-19 and U.S. Iran Policy , by Kenneth Katzman. CRS Legal Sidebar LSB10424, COVID-19: An Overview of Trade-Related Measures to Address Access to Medical Goods , by Nina M. Hart. CRS Report R46304, COVID-19: China Medical Supply Chains and Broader Trade Issues , coordinated by Karen M. Sutter. CRS Insight IN11305, COVID-19: Defense Support of Civil Authorities , by Lawrence Kapp and Alan Ott. CRS In Focus IF11421, COVID-19: Global Implications and Responses , by Sara M. Tharakan et al. CRS Insight IN11280, COVID-19: Industrial Mobilization and Defense Production Act (DPA) Implementation , by Michael H. Cecire and Heidi M. Peters. CRS Legal Sidebar LSB10436, COVID-19: International Trade and Access to Pharmaceutical Products , by Nina M. Hart. CRS In Focus IF11434, COVID-19: U.S.-China Economic Considerations , by Karen M. Sutter and Michael D. Sutherland. CRS Report R46270, Global Economic Effects of COVID-19 , coordinated by James K. Jackson. CRS In Focus IF11480, Overview: The Department of Defense and COVID-19 , coordinated by Kathleen J. McInnis. CRS Insight IN11231, The Defense Production Act (DPA) and COVID-19: Key Authorities and Policy Considerations , by Michael H. Cecire and Heidi M. Peters. CRS Insight IN11337, The Defense Production Act (DPA) and the COVID-19 Pandemic: Recent Developments and Policy Considerations , by Michael H. Cecire and Heidi M. Peters. CRS Insight IN11325, U.S. Travel and Tourism and COVID-19 , by Michaela D. Platzer. Appendix B. Additional Writings In presenting sources of additional reading, this appendix includes some examples of writings reflecting various perspectives on the potential implications of the COVID-19 pandemic on the international security environment and the U.S. role in the world, organized by specific themes or topics. Within each section, the items are presented in chronological order, with the most recent on top. General/Multitopic Edith M. Lederer, \"UN Chief Says Pandemic Is Unleashing a 'Tsunami of Hate,'\" Associated Press , May 8, 2020. Nikolas K. Gvosdev, \"Why the Coronavirus Won't Transform International Affairs Like 9/11 Did,\" National Interest , May 5, 2020. Deepanshu Mohan, \"The Geopolitical Contours of a Post-COVID-19 World,\" East Asia Forum , May 2, 2020. Andrew Ehrhardt, \"Disease and Diplomacy in the 19th Century,\" War on the Rocks , April 30, 2019. Dmitri K. Simes, \"The Perfect Storm,\" National Interest , April 24, 2020. Fred Kaplan, \"What Happens if Oil Doesn't Recover? If Demand Doesn't Pick Up This Summer, We Could See Major Shifts in Global Power,\" Slate , April 23, 2020. Barry R. Posen, \"Do Pandemics Promote Peace? Why Sickness Slows the March to War,\" Foreign Affairs , April 23, 2020. Joseph Cirincione, \"How to Prevent War During the Coronavirus Pandemic, How Will the Coronavirus Threaten Global Peace?\" National Interest , April 22, 2020. Frank Hoffman, \"An American Perspective on Post-Pandemic Geopolitics,\" RUSI, April 20, 2020. Gordon Bardos, \"Will the Coronavirus Crisis Force America to Look in the Mirror and Reform?\" National Interest , April 18, 2020. Nicholas Eberstadt, \"The \"New Normal\": Thoughts about the Shape of Things to Come in the Post-Pandemic World,\" National Bureau of Asian Research, April 18, 2020. Steve Coll, \"Woodrow Wilson's Case of the Flu, and How Pandemics Change History,\" New Yorker , April 17, 2020. Jackson Diehl, \"The Pandemic Is Killing Truth, Too,\" Washington Post , April 12, 2020. Edith M. Lederer, \"UN Chief Warns COVID-19 Threatens Global Peace and Security,\" Associated Press , April 10, 2020. Stratfor Worldview, \"How the Coronavirus Pandemic Is Changing the Worldâand the Future,\" National Interest , April 4, 2020. Daniel W. Drezner, \"The Most Counterintuitive Prediction about World Politics and the Coronavirus, What If Nothing Changes?\" Washington Post , March 30, 2020. Ali Demirdas, \"Western Values May Not Survive the Coronavirus. European Unity and American Military Power Just Haven't Held Up,\" National Interest , March 28, 2020. John Allen et al., \"How the World Will Look after the Coronavirus Pandemic,\" Foreign Policy , March 20, 2020. (Includes short contributions from 12 authors.) Maxine Whittaker, \"How Infectious Diseases Have Shaped Our Culture, Habits and Language,\" The Conversation , July 12, 2017. World Order, International Institutions, and Global Governance Edward Fishman, \"The World Order Is Dead. Here's How to Build a New One for a Post-Coronavirus Era,\" Politic o, May 3, 2020. Rebecca Wolfe and Hilary Matfess Sunday, \"COVID and Cooperation: The Latest Canary in the Coal Mine,\" Lawfare , May 3, 2020. Joshua Keating, \"The Decline of the Nation-State, Trump's War with the Governors Hints at a New Political Order,\" Foreign Policy , April 29, 2020. Yukon Huang and Jeremy Smith, \"Pandemic Response Reflects Unlearned Lessons of U.S.-China Trade War,\" Carnegie Endowment for International Peace, April 27, 2020. Mihir Sharma, \"Diplomacy Is Another Victim of the Virus,\" Bloomberg , April 26, 2020. Brahma Chellaney, \"The WHO Has Failed the World in its Pandemic Response,\" Strategist (Australian Strategic Policy Institute) , April 23, 2020. William C. Danvers, \"The World Bank steps up its role in fighting for the future,\" The Hill , April 22, 2020. Eric A. Posner, \"The Limits of the World Health Organization,\" Lawfare , April 21, 2020. Amitav Acharya, \"How Coronavirus May Reshape the World Order,\" National Interest , April 18, 2020. Joseph S. Nye Jr., \"No, the Coronavirus Will Not Change the Global Order,\" Foreign Policy , April 16, 2020. Karen DeYoung and Liz Sly, \"Global Institutions Are Flailing in the Face of the Pandemic,\" Washington Post , April 15, 2020. Colin H. Kahl and Ariana Berengaut, \"Aftershocks: The Coronavirus Pandemic and the New World Disorder,\" War on the Rocks , April 10, 2020. Lanhee J. Chen, \"Lost in Beijing: The Story of the WHO, China Broke the World Health Organization. The U.S. Has to Fix It or Leave and Start Its Own Group,\" Wall Street Journal , April 8, 2020. Colum Lynch, \"Can the United Nations Survive the Coronavirus? In the Absence of U.S. Leadership, the U.N. Is Struggling to Carve Out a Role in the Face of What May Be the Greatest Threat Since Its Founding,\" Foreign Policy , April 8, 2020. Timofey V. Bordachev, \"Visions Of The Post-Coronavirus World: Russian Expert On Europe Bordachev: The Liberal World Order Will Not Survive,\" MEMRI, April 6, 2020. Matthew Lee and Edith M. Lederer, \"Global Diplomacy Under the Gun in The Time of Ccoronavirus,\" Associated Press , April 4, 2020. Thomas Wright, \"Stretching the International Order to Its Breaking Point, The Greatest Error That Geopolitical Analysts Can Make May Be Believing That the Crisis Will Be Over in Three to Four Months,\" Atlantic , April 4, 2020. Henry A. Kissinger, \"The Coronavirus Pandemic Will Forever Alter the World Order,\" Wall Street Journal , April 3, 2020. Ryan Broderick, \"After The Coronavirus Passes, Your World Will Not Go Back To Normal, Before the Pandemic Began, the Systems That Govern Our World Were Brittle. Today, They Are Broken. When We Emerge, the World Will Be Different, and So Will We,\" Buzzfeed News , April 2, 2020. Rick Gladstone, \"U.N. Security Council 'Missing In Action' in Coronavirus Fight,\" New York Times , April 2, 2020. Ian Goldin and Robert Muggah, \"End of International Cooperation? How Coronavirus Has Changed the World Permanently,\" National Interest , March 31, 2020. U.S. Global Leadership and Role in World Jose W. Fernandez, \"In the Coronavirus Era, Trump's 'America First' Means 'Latin America Alone,'\" Foreign Policy, May 7, 2020. Drew Hinshaw and Lukas I. Alpert, \"U.S. Makes Diplomatic Push for Taiwan to Attend WHO Summit,\" Wall Street Journal , May 7, 2020. Fred Kaplan, \"Trump's Medical Nationalism Will Make It Harder to Defeat COVID-19,\" Slate , May 7, 2020. William Booth, Carolyn Y. Johnson, and Carol Morello, \"The World Came Together for a Virtual Vaccine Summit. The U.S. Was Conspicuously Absent,\" Washington Post , May 4, 2020. Matthew Petti, \"Trump Administration Defends No-Show At Global Coronavirus Conference,\" National Interest , May 4, 2020. Anne Applebaum, \"The Rest of the World Is Laughing at Trump, The President Created a Leadership Vacuum. China Intends to Fill It,\" Atlantic , May 3, 2020. Charlotte Klein, \"Trump's 'America First' Mentality May Hamper Global Race For Coronavirus Vaccine,\" Vanity Fair , May 3, 2020. Nahal Toosi and Natasha Bertrand, \"Fears Rise that Trump Will Incite a Global Vaccine Brawl, The President's 'America First' Philosophy Courts Disaster for Entire Regions of the World, Diplomats Warn,\" Politico , May 3, 2020. Kori Schake, \"America's Built-in Protection Against Bad Leadership, For All Its Failures, the U.S. Has Structural Advantages Over Rival Powersâand Will Come Out of the Pandemic Even Stronger,\" Atlantic , May 1, 2020. Colum Lynch, \"WHO Becomes Battleground as Trump Chooses Pandemic Confrontation Over Cooperation,\" Foreign Policy , April 29, 2020. J. Stephen Morrison and Anna Carroll, \"WHO and President Trump on the Ledge,\" Center for Strategic and International Studies (CSIS), April 28, 2020. Jeffrey Becker, \"COVID-19 Offers a Golden Opportunity to Reengage with the Indo-Pacific,\" Defense One , April 27, 2020. Joseph S. Nye, \"How COVID-19 Is Testing American Leadership,\" East Asia Forum , April 26, 2020. By John Hudson, Josh Dawsey, and Souad Mekhennet, \"Trump Expands Battle with WHO Far Beyond Aid Suspension,\" Washington Post , April 25, 2020. Katrin Bennhold, \"'Sadness' and Disbelief From a World Missing American Leadership,\" New York Times , April 23, 2020. David Brunnstrom and Humeyra Pamuk, \"Pompeo Says U.S. May Never Restore WHO Funds after Cutoff over Pandemic,\" Reuters , April 23, 2020. Julianne Smith and Garima Mohan, \"In a Crisis, a Fumbling America Confirms Europe's Worst Fears,\" War on the Rocks , April 23, 2020. Luke Allen, \"Why Trump Defunded the WHO,\" National Interest , April 20, 2020. Yu-Jie Chen and Jerome A. Cohen, \"Trump Is Right That the WHO Has a China Problem. Cutting Funding Isn't the Answer,\" Diplomat , April 20, 2020. Jeffrey Cimmino, \"Trump Should Be Tough On the WHO â And Recommit to Strengthening Global Health Security,\" National Interest , April 19, 2020. Brett D. Schaefer, \"The World Health Organization Messed UpâBut Don't Defund Them,\" National Interest , April 16, 2020. Salvatore Babones, \"Donald Trump Is Right To Dump the WHO,\" National Interest , April 15, 2020. Kevin Baron, \"Don't Be Fooled. Trump's Cuts to WHO Aren't About the Coronavirus,\" Defense One , April 15, 2020. Bonnie Kristian, \"The Coronavirus Shows How US 'Diplomacy' Is Anything But, Absolutist, America-First Approaches Isolate Us and Make Us Less Safe,\" Defense One , April 15, 2020. Eli Lake, \"Trump Is Punishing the WHO for China's Deceptions,\" Bloomberg , April 15, 2020. Thomas R. Pickering and Atman Trivedi, \"America First? The Coronavirus Couldn't Care Less,\" Foreign Policy , April 15, 2020. Emily Rauhala, \"Trump's Critique of WHO May Be a Diversion, But It Resonates Beyond the White House,\" Washington Post , April 15, 2020. Steve Holland, \"Trump to Convene G7 Leaders in Video Call to Discuss Pandemic,\" Reuters , April 14, 2020. Fred Kaplan, \"The End of American Leadership, The Coronavirus Pandemic May Mark the Final Shift of Global Power Away from the United States,\" Slate , April 13, 2020. Michael Shoebridge, \"Why America Will Emerge Stronger From the Coronavirus Crisis,\" National Interest , April 12, 2020. Bill Ong Hing, \"Trump Has Achieved His Goal of Abolishing Asylum, The Pandemic Has Added One More Insurmountable Hurdle for Asylum Seekers,\" Slate , April 10, 2020. MichÃ¨le A. Flournoy and Lisa O. Monaco, \"Now's Not the Time for Isolationism, Countries Need to Work Together to Fight Coronavirus, and the U.S. Should Step Up to Lead Those Efforts, Not Back Off From Them,\" Politico , April 8, 2020. Todd Prince, \"Pompeo Touts U.S. Foreign Help Against Pandemic As Trump Threatens WHO Funding,\" Radio Free Europe/Radio Liberty , April 8, 2020. Joe Buccino, \"The US Must Lead the World Out of This, If the Coronavirus Pandemic Only Causes Us to Look Inward, China Wins,\" Defense One , April 7, 2020. Helle C. Dale, \"Even in Pandemic, America Still the Global Leader,\" Heritage Foundation , April 7, 2020. John Pomfret, \"Does the Future Still Belong to the U.S. and China?\" Washington Post , April 7, 2020. Robert B. Zoellick, \"The World Is Watching How America Handles Coronavirus, The Trump Administration Has Failed to Convey An Impression of Strong International Leadership,\" Wall Street Journal, April 7, 2020. Ted Anthony, \"After Virus, How Will Americans' View of the World Change?\" Washington Post , April 6, 2020. William J. Burns, \"A Make-or-Break Test for American Diplomacy, The Post-Pandemic World Will Pose a Massive Test for U.S. Statecraft, the Biggest Since the End of the Cold War,\" Atlantic , April 6, 2020. Victor Davis Hanson, \"Don't Be Fooled: Trump Is Leading the World Against Coronavirus,\" National Interest , April 5, 2020. Lara Jakes, \"When the Face of America Falls Ill: A Virus's Toll on Diplomats,\" New York Times , April 4, 2020. Nahal Toosi, \"'Lord of the Flies: PPE Edition': U.S. Cast As Culprit in Global Scrum Over Coronavirus Supplies,\" Politico , April 3, 2020. Stephen M. Walt, \"The United States Can Still Win the Coronavirus Pandemic,\" Foreign Policy , April 3, 2020. Susan B. Glasser, \"The Coronavirus Is the World's Only Superpower, Trump's America? Not so Much,\" New Yorker , April 2, 2020. Robbie Gramer and Colum Lynch, \"In Global Leadership Void on Pandemic, Critics Ask: Where's Pompeo?\" Foreign Policy , April 2, 2020. Ash Jain, \"Trump Just Missed a Perfect Opportunity to Reassert American Leadership, The G-20 helped beat Ebola. Why can't it do the same for the coronavirus?\" Foreign Policy , April 2, 2020. Adam Tooze, \"America Is Ailingâand Leading the World, The Coronavirus Pandemic Has Been a Humiliation for the United Statesâand Confirmation of Its Unmatched International Power,\" Foreign Policy , April 1, 2020. Robert C. Rubel, \"Canary In The Coal Mine: The US Navy's Dilemmas As An Indication Of A Culminating Point In National Grand Strategy,\" Journal of Political Risk , April 2020. Doug Bandow, \"Donald Trump Needs to Focus on Coronavirus (Not Fighting with China and the EU),\" National Interest , March 30, 2020. Walter Russell Mead, \"U.S. Leadership Will Survive Coronavirus,\" Wall Street Journal , March 30, 2020. Michael Rubin, \" Washington Post's Broadside against Mike Pompeo Is Wildly Unfair,\" Washington Examiner , March 30, 2020. (Responds to the March 29, 2020, writing below by Jackson Diehl.) Jeff M. Smith, \"How America Is Leading the 'Quad Plus' Group of Seven Countries in Fighting the Coronavirus,\" National Interest , March 30, 2020. Jackson Diehl, \"Pompeo's Pandemic Performance Ensures His Place Among the Worst Secretaries of State Ever,\" Washington Post , March 29, 2020. (For a response, see the March 30, 2020, writing above by Michael Rubin.) Brett McGurk, \"America Should Build an International Coalition Now; The United States Has an Urgent Interest in Filling the Global Leadership Void During This Stateless Scourge,\" Atlantic , March 29, 2020. Ted Galen Carpenter, \"Donald Trump Offered to Help North Korea on Coronavirus. Why Not Iran?\" National Interest , March 27, 2020. Paul R. Pillar, \"Donald Trump's Nationalist Response to the Coronavirus,\" National Interest , March 26, 2020. Kevin Baron, \"Trump Could Have Led the World Against the Coronavirus,\" Defense One , March 25, 2020. Editorial Board, \"The Coronavirus Pandemic May Mark a Decline in U.S. Leadership,\" Washington Post , March 23, 2020. Stephen M. Walt, \"The Death of American Competence, Washington's Reputation for Expertise Has Been One of the Greatest Sources of Its Power. The Coronavirus Pandemic May End It for Good,\" Foreign Policy , March 23, 2020. Ronald E. Neumann and Marc Grossman, \"More US Diplomats Need to Be Overseas to Best Serve America,\" The Hill , March 22, 2020. Steven Erlanger, \"Another Virus Victim: The U.S. as a Global Leader in a Time of Crisis,\" New York Times , March 20 (updated March 22), 2020. Kori Schake, \"The Damage That 'America First' Has Done,\" Atlantic , March 20, 2020. Daniel B. Baer, \"The Virus Has Exposed the Recklessness of Trump's 'America First,'\" Foreign Policy , March 18, 2020. China's Potential Role as a Global Leader David M. Weinberg, \"Know Comment: Hold China culpable for COVID-19, Don't Let Beijing Exploit the Coronavirus Chaos to Position Itself at the Center of a New Global Order,\" Jerusalem Post , May 8, 2020. Andreas Kluth, \"How China Is Losing Europe,\" Bloomberg , May 7, 2020. Josh Rogin, \"The Pandemic Shows Why Taiwan Is a Far Better Partner than the People's Republic,\" Washington Post , May 7, 2020. Eva Dou, \"Fearing Political Dangers, China Spent Years Preparing for This Economic Crash,\" Washington Post , May 5, 2020. Diana Fu, \"China Has a Playbook for Managing Coronavirus Chaos,\" Foreign Policy , May 5, 2020. William A. Stanton, \"Wuhan Virus Finally Alters Global Perceptions of the PRC: William Stanton,\" Taiwan News , May 5, 2020. Shashank Bengali and Alice Su, \"'Put On a Mask and Shut Up': China's New 'Wolf Warriors' Spread Hoaxes and Attack a World of Critics,\" Los Angeles Times , May 4, 2020. \"Exclusive: Internal Chinese Report Warns Beijing Faces Tiananmen-like Global Backlash Over Virus,\" Reuters , May 4, 2020. (This article does not list an author.) Steven Erlanger, \"Global Backlash Builds Against China Over Coronavirus,\" New York Times , May 3, 2020. Lara Marlowe, \"Europe's Relationship with China Is Now One of Mistrust and Hostility,\" Irish Times , May 2, 2020. Joel Gehrke, \"US Allies Move Toward Trump, Demanding Coronavirus Investigation Despite Chinese Threats,\" Washington Examiner , May 1, 2020. Stuart Lau, \"Coronavirus: European Union Ratchets Up Pressure on China with Call to Cooperate with inquiry,\" South China Morning Post , May 1 (updated May 2), 2020. Minxin Pei, \"China's Expensive Bet on Africa Has Failed, Coronavirus Crash in Commodity Prices Has Wasted $200 Billion in Investment and Loans,\" Nikkei Asian Review , May 1, 2020. Matt Apuzzo, \"Top E.U. Diplomat Says Disinformation Report Was Not Watered Down for China,\" New York Times , April 30, 2020. Niall Gray, \"COVID-19: A 'Reckoning' for UK-China Relations?\" Diplomat , April 29, 2020 James Griffiths, \"China's Model of Control Has Been Blamed for the Coronavirus Crisis, But for Some It's Looking Increasingly Attractive,\" CNN , April 29, 2020. Tanvi Madan et al., \"China's Neighbors Face a Belligerent Post-Pandemic Beijing, Experts Discuss the Regional Fallout of the Coronavirus Crisis,\" Foreign Policy , April 29, 2020. William Brent, \"Generosity Is an Easy Win for China After the Coronavirus Pandemic,\" Foreign Policy , April 28, 2020. Damien Cave and Amy Qin, \"China Mounts Aggressive Defense to Calls for Coronavirus Compensation,\" New York Times , April 28, 2020. Mark Magnier, \"China Is Overreaching in Bid for Greater Global Influence Amid Coronavirus Pandemic, US Advisers Say,\" South China Morning Post , April 28, 2020. Eleanor Albert, \"African Countries Respond to Guangzhou's 'Anti-Epidemic Measures,' Widespread Reports of Racism Against Africans Put China into Damage Control Mode,\" Diplomat , April 27, 2020 Shi Jiangtao, \"Coronavirus: They're Only Answering Xi Jinping's Call but Are China's 'Wolf Warrior' Diplomats Doing More Harm than Good?\" South China Morning Post , April 27, 2020. Richard Javad Heydarian, \"The Coming China Backlash, There Is a Pent-up Volcano of Rage Against the Chinese Regime for Its Reckless Coverup of a Devouring Pandemic,\" National Interest , April 25, 2020. Keith B. Richburg, \"After Coronavirus, China's Relations With the World Will Never Be the Same,\" National Interest , April 25, 2020. Jerry Dunleavy, \"'Xi Jinping's Chernobyl': Experts Say Chinese Disinformation Aims to Distract World from Coronavirus Failures,\" Washington Examiner , April 23, 2020. David Ignatius, \"The World Will Demand Answers on COVID-19 Until China Explains What Happened,\" Washington Post , April 23, 2020. Veerle Nouwens, \"China and the Coronavirus Pandemic: Internal Doubts, External Mistakes,\" RUSI, April 23, 2020. Austin Bay, \"On Point: The COVID-19 Debacle Previews the Chinese Communist Party's Imperial World Order,\" Strategy Page , April 22, 2020. Frederic Puglie, \"China to the Rescue: 'Mask Diplomacy' Aims to Win Allies in Latin America,\" Washington Times , April 22, 2020. Robert A. Manning, \"Why China Will Be the Biggest COVID-19 Loser,\" The Hill , April 21, 2020. Daniel R. DePetris, \"China's Great Pandemic Gamble,\" National Interest , April 20, 2020. Charles Dunst, \"Beijing's Propaganda Is Finding Few Takers,\" Foreign Policy , April 20, 2020. Jamil Anderlini, \"Why China is Losing the Coronavirus Narrative,\" Financial Times , April 19, 2020. Steven Lee Myers, \"China's Aggressive Diplomacy Weakens Xi Jinping's Global Standing,\" New York Times , April 17 (updated April 20), 2020. Maria Repnikova, \"Does China's Propaganda Work? The Communist Party's Messaging Is Both More Agile and More Fragile Than It Seems,\" New York Times , April 16, 2020. Charles Dunst, \"How China's Mask Diplomacy Backfired,\" American Interest , April 15, 2020. Michael Green and Evan S. Medeiros, \"The Pandemic Won't Make China the World's Leader, Few Countries Are Buying the Model or the Message From Beijing,\" Foreign Affairs , April 15, 2020. Gerry Shih, \"China's Bid to Repair Its Coronavirus-hit Image Is Backfiring in the West,\" Washington Post , April 14, 2020. Dusan Stojanovic, \"China's 'Mask Diplomacy' Wins Support in Eastern Europe,\" Associated Press, April 14, 2020. Mohammed Ayoob, \"How the Coronavirus Could Undercut China's Global Standing,\" National Interest , April 13, 2020. Chi Wang, \"How China Is Losing the World's Trust Following Its Cover-up of the Coronavirus Crisis,\" South China Morning Post , April 13, 2020. Nick Crawford and David Gordon, \"China Confronts Major Risk of Debt Crisis on the Belt and Road Due to Pandemic,\" Diplomat , April 10, 2020. John Pomfret, \"Does the Future Still Belong to the U.S. and China?\" Washington Post , April 7, 2020. Plamen Tonchev, \"The Belt and Road After COVID-19,\" Diplomat , April 7, 2020. Bradley A. Thayer and Lianchao Han, \"The Consequences of the Pandemic for China and the World,\" National Interest , April 4, 2020. Edward Lucas, \"China Was Once the Cradle of the Coronavirus Pandemic But It Has Bounced Back with Astonishing Speed, Writes Edward Lucas As He Reveals the Country May Have Won the War for Global Supremacy As Well,\" Daily Mail (UK) , April 3, 2020. Philip Wen and Drew Hinshaw, \"China Asserts Claim to Global Leadership, Mask by Mask,\" Wall Street Journal , April 1, 2020. Zack Beauchamp, \"The Myth of Authoritarian Coronavirus Supremacy,\" Vox , March 26, 2020. Mark Hannah, \"Will America's Coronavirus Response Inspire Countries to Follow China's Model?\" National Interest , March 24, 2020. Dan Blumenthal, \"Donald Trump's China Problem Has Arrived,\" National Interest , March 23, 2020. Azeem Ibrahim, \"China's Debt Diplomacy Will Get a Coronavirus Boost,\" Foreign Policy , March 23, 2020. Yang Jiang, \"China's Moment of Vindication,\" Danish Institute for International Studies, March 20, 2020. Morten Soendergaard Larsen and Robbie Gramer, \"China Casts Itself as Global Savior While U.S. and EU Focus on Virus at Home,\" Foreign Policy , March 19, 2020. Bradley A. Thayer and Lianchao Han, \"China's Coronavirus Plan: Create a 'Silk Road' of Health Care Leading Towards World Dominance,\" National Interest , March 19, 2020. Alan Crawford and Peter Martin, \"China Showers Europe With Virus Aid While Sparring With Trump,\" Bloomberg , March 19, 2020. U.S. Relations and Great Power Competition with China and Russia Marc Champion, \"Trump's Going All In on a Vaccine. He May Still Get Beaten by China, The Nation That Can Immunize First Stands to Gain Not Just Economic Advantage, But Validation of Its Place in the World,\" Bloomber g, May 8, 2020. Editorial Board, \"Donald Trump's Erratic China Policy Undermines Western Unity,\" Financial Times , May 7, 2020. Patrick Tucker, \"COVID-19 Is Accelerating Trends in the US-China Relationship,\" Defense One , May 7, 2020. Joel Gehrke, \"US and Western Allies Offer Disjointed Response to China Coronavirus Calamity,\" Washington Examiner , May 6, 2020. Frances Martel, \"China: If We Have to Pay for Coronavirus, U.S. Has to Pay for AIDS, 2008 Financial Crisis,\" Breitbart , May 7, 2020. Kate O'Keeffe, Michael C. Bender, and Chun Han Wong, \"Coronavirus Casts Deep Chill Over U.S.-China Relations,\" Wall Street Journal , May 6, 2020. RFE/RL, \"U.S.: Russia, China Spinning Coronavirus Conspiracies To Blame West,\" Radio Free Europe/Radio Liberty , May 6, 2020. \"The U.S. Weaponizes COVID-19 Anger Against China's Tech Sector,\" Stratfor, May 6, 2020. (This article does not list an author.) Doug Bandow, \"Making China Pay Would Cost Americans Dearly,\" Foreign Policy , May 5, 2020. Bloomberg News, \"As Trump Blames China, Beijing Directs Fury at His Top Diplomat,\" Bloomberg , May 5, 2020. James Jay Carafano, \"How to Keep the Free World From Becoming a Suburb of Beijing,\" Heritage Foundation, May 5, 2020. Ali Wyne, \"Can China Use the Pandemic to Displace the US?\" Defense One , May 5, 2020. Stephen Blank, \"The Russo-Chinese Axis Reveals Itself During the Coronavirus Pandemic,\" The Hill , May 4, 2020. Ryan Hass, \"Clouded Thinking in Washington and Beijing on COVID-19 Crisis,\" Brookings Institution, May 4, 2020. Deb Riechmann and Zeke Miller, \"Trump's Anti-China Rhetoric Aimed at Boosting US Leverage,\" Associated Press , May 4, 2020. Denny Roy, \"8 Chinese Arguments Against Western 'Hubris' and Why They Fail,\" Diplomat , May 04, 2020. David Wertime, \"'Not the World's Number One': Chinese Social Media Piles On the U.S.,\" Politico , May 4, 2020. John Lee, \"US-China Economic Distancing in the Era of Great Power Rivalry and COVID-19,\" United States Studies Centre, May 4, 2020. Humeyra Pamuk and Andrea Shalal, \"Trump Administration Pushing to Rip Global Supply Chains from China: Officials,\" Reuters , May 4, 2020. David Wertime, \"'Not the World's Number One': Chinese Social Media Piles On the U.S.,\" Politico , May 4, 2020. Claudia Rosett, \"China Is Exploiting the Coronavirus Chaos to Advance Its Agenda, President Xi Wants China at the Center of a New Global Order,\" Dallas Morning News , May 3, 2020. Walter Lohman James Jay Carafano, \"Here Are Ten Ways To Beat China Over Coronavirus,\" National Interest , May 2, 2020. Eric Chan and Peter Loftus, \"Chinese Communist Party Information Warfare: US-China Competition during the COVID-19 Pandemic,\" Journal of Indo-Pacific Affairs (Air University ), May 1, 2020. Ahmed Charai, \"How COVID-19 Changes Trump's China Card,\" National Interest , May 1, 2020. Bonnie Kristian, \"'Maximum Pressure' on China Is No Solution to a Pandemic,\" Defense News , May 1, 2020. Dalibor Rohac, \"The Kremlin's Tried-and-True Formula for Tough Times: Look for Enemies Abroad,\" Washington Post , May 1, 2020. Alex Ward, \"Pressure Mounts on Trump to 'Drop the Hammer' on China,\" Vox , May 1, 2020. Edward Wong and Ana Swanson, \"Some Trump Officials Take Harder Actions on China During Pandemic,\" New York Times , May 1, 2020. Joseph Bosco, \"The Post-Pandemic New Order in US-China Relations,\" The Hill , April 30, 2020. Chuck DeVore, \"In a Bid to Weaken America, China Extends a Hand to the States | Opinion,\" Newsweek , April 30, 2020. Editorial Board, \"China has turned to bullying to avoid accountability. It may be working on Europe,\" Washington Post , April 30, 2020. Mathew Ha and Alice Cho, \"China's Coronavirus Disinformation Campaigns Are Integral to Its Global Information Warfare Strategy,\" Foundation for Defense of Democracies, April 30, 2020. Jeff Stein, Carol D. Leonnig, Josh Dawsey, and Gerry Shih, \"U.S. Officials Crafting Retaliatory Actions Against China Over Coronavirus as President Trump Fumes,\" Washington Post , April 30, 2020. Peter B. Walker, \"Shift in Mindset Needed So US Can Work with China to Tackle Coronavirus Pandemic and Other Global Issues,\" South China Morning Post , April 30, 2020. Joyu Wang and Rachel Yeo, \"China Takes Harder Line on Hong Kong Amid Coronavirus Protest Lull,\" Wall Street Journal , April 30, 2020. George Barros, Nataliya Bugayova, and Mason Clark, \"Russia in Review: Kremlin Misdirection Continues Amid COVID and Peace Processes,\" Institute for the Study of War, April 29, 2020. Alan Boyd, \"China Drops a Covid-19 Gauntlet on Australia,\" Asia Times , April 29, 2020. Lewis Libbby,, \"To Confront China After Coronavirus, We Must See the Bigger Picture,\" National Review , April 29, 2020. Kinling Lo and Sarah Zheng, \"Who Is Winning the China-US Race to Run the World Amid the Covid-19 pandemic?\" South China Morning Post , April 29, 2020. Clifford D. May, \"How our enemies are handling the pandemic, They're Staying Focused on Their Missions and Doing Just Fine,\" Foundation for Defense of Democracies, April 29, 2020. Fu Ying, \"Fu Ying on Why China and America Must Co-operate to Defeat COVID-19,\" Economist , April 29, 2020. Damien Cave and Amy Qin, \"China Mounts Aggressive Defense to Calls for Coronavirus Compensation,\" New York Times , April 28, 2020. Alex Ward, \"How China Is Ruthlessly Exploiting the Coronavirus Pandemic It Helped Cause,\" Vox , April 28, 2020. Shi Jiangtao, \"Coronavirus infects China-US relations as blame game over pandemic intensifies,\" South China Morning Post , April 27, 2020. Emily Rauhala, \"Trump's WHO Funding Freeze During Coronavirus Pandemic Gives China an Opening to Expand Its Influence,\" Washington Post , April 27, 2020. Patrick Mendis and Dominique Reichenbach, \"Will the Trump White House Make China Great Again in a Post-Pandemic Era?\" National Interest , April 27, 2020. James Traub, \"The Future Is Asianâbut Not Chinese, A Post-pandemic Cold War Is Developing between the United States and Chinaâbut Both Sides Are Losing the Ideological Fight,\" Foreign Poli cy, April 27, 2020. Eric Farnsworth, \"China's Coronavirus Play in the Americas,\" National Interest , April 26, 2020. Yasmeen Serhan and Kathy Gilsinan, \"Can the West Actually Ditch China?\" Atlantic, April 24, 2020. Javed Ali and A'ndre Ggonawela, \"Dueling COVID-19 Blame Narratives Deepen US-China Rift,\" The Hill , April 23, 2020. Alexander Gabuev, \"The Pandemic Could Tighten China's Grip on Eurasia,\" Foreign Policy , April 23, 2020. Ralph Peters, \"China Lies, China Kills, China Wins,\" Hoover Institution, April 23, 2020. Josh Rogin, \"The Coronavirus Crisis Shows the Risks of Scientific Collaboration with China,\" Washington Post , April 23, 2020. Peter Suciu, \"Are America and China Headed Towards a South China Sea Showdown? Is Beijing Trying to Push Forward on Its Maritime Claims While the World is Battling Coronavirus?\" National Interest , April 23, 2020. John Vandiver, \"Coronavirus Pandemic Leads to Spike in Disinformation Directed at US, NATO in Europe,\" Stars and Stripes , April 23, 2020. Hal Brands, \"Modest Multilateralism Is in America's Interestâand China's Too, The Crisis Has Highlighted the Need for More Global Cooperation, but Let's Not Get Carried Away,\" Bloomberg , April 22, 2020. James Green, \"China and the United States Are Both Losing the Blame Game,\" Foreign Policy , April 22, 2020. Laura Rosenberger, \"China's Coronavirus Information Offensive, Beijing Is Using New Methods to Spin the Pandemic to Its Advantage,\" Foreign Affairs , April 22, 2020. Edward Wong, Matthew Rosenberg, and Julian E. Barnes, \"Chinese Agents Helped Spread Messages That Sowed Virus Panic in U.S., Officials Say,\" New York Times , April 22, 2020. Dean Cheng, \"China, COVID-19 and 5G; Golden Opportunity For The West,\" Breaking Defense , April 21, 2020. Gregory R. Copley, \"China Is Waging A New Kind Of War Against The U.S.,\" Oil Price , April 21, 2020. Alan Crawford and Peter Martin, \"China's Coronavirus Diplomacy Has Finally Pushed Europe Too Far,\" Bloomberg , April 21, 2020. Jessica Donati, \"U.S. Adversaries Are Accelerating, Coordinating Coronavirus Disinformation, Report Says,\" Wall Street Journal , April 21, 2020. John Grady, \"COVID-19 Pandemic Giving China a Firmer Foothold in Europe,\" USNI News , April 21, 2020. Hollie McKay, \"China Ups Its Spy Game on US Soil as It Bids to Control Coronavirus Narrative,\" Fox News , April 21, 2020. Hannah Roberts, \"Moscow's Coronavirus Offensive,\" Politico , April 21, 2020. Betsy Woodruff Swan, \"State Report: Russian, Chinese, and Iranian Disinformation Narratives Echoing Each Other,\" Politico Pro , April 21, 2020. Yew Lun Tian, Ben Blanchard, \"China Rattles Sabres as World Battles Coronavirus Pandemic,\" Reuters , April 21, 2020. Riley Walters and Dean Cheng, \"How to Hold China Accountable for COVID-19,\" Heritage Foundation, April 21, 2020. Tim Ahmann, David Brunnstrom, and Julie Steenhuysen, \"Update 1-China May Be Keeping Coronavirus Data for Commercial GainâTrump Adviser,\" Reuter s, April 20, 2020. James Jay Carafano, \"The Great U.S.-China Divorce Has Arrived,\" National Interest , April 20, 2020. Charles Lane, \"This Crisis Has Taught Us the True Cost of Doing Business with China,\" Washington Post , April 20, 2020. Klaus W. Larres, \"China Turns on the Charm and Angers Trump as it Eyes a Global Opportunity in Coronavirus Crisis,\" The Conversation , April 20, 2020. John Lee, \"Beijing Still Has a Way to Go in Battle for Power,\" United States Studies Centre, April 20, 2020. Bradley A. Thayer and Lianchao Han, \"Kissinger's Folly: The Threat to World Order is China,\" The Hill , April 19, 2020. Ashley Townshend and Matilda Steward, \"Coronavirus Crisis Shows Both China and the US Aren't Equipped to Lead the World,\" United States Studies Centre, April 19, 2020. James Holmes, \"How Donald Trump Should Make China Pay for Coronavirus,\" National Interest , April 18, 2020. Cleo Paskal, \"World Tries to Shake Off Its Dangerous China Addiction,\" Sunday Guardian , April 18, 2020. Daniel P. Vajdich, \"The Geopolitical Cost of Battling the Coronavirus Separately (China Will Win),\" National Interest , April 18, 2020. Robbie Gramer, \"NATO Chief Rebukes China Over Coronavirus Disinformation,\" Foreign Policy, April 17, 2020. Jeffery A. Green, \"Stop China's Predatory Investments Before the US Becomes Its Next Victim,\" Defense News , April 17, 2020. Fred Kaplan, \"The China Problem, The Chinese Government Bears Some Responsibility for the Pandemic, But We Still Need Its Help to Fight the Virus,\" Slate , April 17, 2020. Abraham Denmark, Charles Edel, and Siddharth Mohandas, \"Same as It Ever Was: China's Pandemic Opportunism on Its Periphery,\" War on the Rocks , April 16, 2020. \"Is China winning? The geopolitical consequences of covid-19 will be subtle, but unfortunate,\" Economist , April 16, 2020. (This article does not list an author.) Elisabeth Braw, \"China Is Bargain Huntingâand Western Security Is at Risk, Beijing Could Use the Coronavirus-Induced Economic Crisis to Go on a Buying Spree. The U.S. and European Governments Must Restrict the Purchasing of Distressed Companies in Sensitive Sectors,\" Foreign Policy , April 15, 2020. Kristine Lee, \"It's Not Just the WHO: How China Is Moving on the Whole U.N., Despite His Saber-Rattling, Trump's Pullback Actually Helps Beijing in its New, Inside-Baseball Strategy to Build Influence,\" Politico , April 15, 2020. James Palmer, \"Why Chinese Embassies Have Embraced Aggressive Diplomacy, Beijing Is Trying to Maintain Its Narrative as Diplomats Spread Misinformation About the Rest of the World's Coronavirus response,\" Foreign Policy , April 15, 2020. Salvatore Babones, \"In the Post-Coronavirus World, Chinese Power is Overrated, A Global Resurgence in National Self-Reliance Might Actually Be a Good Thing for America's Place in the World,\" Foreign Policy , April 14, 2020. Martijn Rasser, \"Technology Alliances Will Help Shape Our Post-Pandemic future,\" C4ISRnet , April 14, 2020. John Lee Cheong Seong, \"Beijing Tried to Use the Coronavirus Crisis to Enhance Its Global Standing. It's not working; Despite American Errors and Poor Leadership, the Pandemic Only Proves That the Foundations of Underlying Strength Are Still Solid for the United States and Fragile for China,\" South China Morning P ost, April 14, 2020. Brian Whitmore, \"Quarantining Sanctions, A Kremlin Diplomatic Gambit Exploits the Pandemic,\" Center for European Policy Analysis (CEPA), April 14, 2020. Edward Wong and Paul Mozur, \"China's 'Donation Diplomacy' Raises Tensions With U.S.,\" New York Times , April 14, 2020. Jack Detsch, \"U.S. Official: Beware of Chinese Leaders Bearing Coronavirus Gifts,\" Foreign Policy , April 13, 2020. Grant Newsham, \"America Takes On The Coronavirus: Is Chinese Help Needed?\" And Magazine , April 13, 2020. Isabelle Khurshudyan, \"Russia's State-backed Media Uses the Pandemic to Spin Anti-Western Views. They Are Not Alone,\" Washington Post , April 12, 2020. Chen Yun-yu and Emerson Lim, \"U.S., China Stepping Up Military Messaging Amid Pandemic: Analysts,\" Focus Taiwan , April 12, 2020. RenÃ©e DiResta, \"For China, the 'USA Virus' Is a Geopolitical Ploy,\" Atlantic , April 11, 2020. Lee Drake, \"What the Trump Administration Needs to Learn from the Plague that Destroyed Athens,\" National Interest , April 11, 2020. Bradley A. Thayer Lianchao Han, \"China Is Using The Coronavirus Crisis To Gain Political Capital Against America,\" National Interest , April 11, 2020. Bradley A. Thayer Lianchao Han, \"China's Coronavirus Weapon: How Beijing Plans to Leverage the Global Supply Chain,\" National Interest , April 11, 2020. Philip Citowicki, \"COVID-19 Escalates the China-Australia Contest in the Pacific,\" Diplomat , April 10, 2020. Catie Edmondson, \"China Hawks in Congress See an Opportunity in Coronavirus,\" New York Times , April 10 (updated April 14), 2020. Ryan Girdusky, \"Bad Ideology, Not Bad Leadership, Caused Our China Problem,\" Washington Examiner, April 9, 2020. Alireza Ahmadi, \"The Trump Era Has Created a New Challenge for China,\" National Interest , April 8, 2020. Keith B. Alexander and Jamil N. Jaffer, \"While the World Battles the Coronavirus, Our Adversaries Are Planning Their Next Attack,\" The Hill , April 7 2020. James Kraska and Sumantra Maitra, \"The Coronavirus Crisis Has Highlighted America's Failed Foreign Policy Tactics,\" National Interest , April 7, 2020. Plamen Tonchev, \"The Belt and Road After COVID-19, Possible Post-pandemic Scenarios for China's Long-term Foreign Policy Strategy,\" Diplomat, April 7, 2020. Mark Payumo, \"Why China's Coronavirus Lies Don't Matter If It Plays the Long Information Game, Washington Can Still Beat Beijing's Information Warfare Campaign, But It Needs to Stop Thinking Short-Term,\" National Interest , April 6, 2020. Nadia Schadlow, \"Consider the Possibility That Trump Is Right About China, Critics Are Letting Their Disdain for the President Blind Them to Geopolitical Realities,\" Atlantic , April 5, 2020. Anthony Vinci and Nadia Schadlow, \"Time for the US to Declare Independence from China,\" Washington Examiner , April 5, 2020. Madeleine Albright et al., \"Saving Lives in America, China, and Around the World,\" Asia Society, April 3, 2020. Emma Ashford and Matthew Kroenig,\" Will Trump's Pandemic Response Help or Harm U.S. Power? Russia and China Are Stepping in While the United States and Europe Fumble,\" Foreign Policy , April 3, 2020. James Jay Carafano, \"America's Post-Coronavirus China Syndrome,\" National Interest , April 1, 2020. Matthew Kroenig, \"Why the U.S. Will Outcompete China, The Faith in Autocratic Ascendance and Democratic Decline Is Contrary to Historical Fact,\" Atlantic , April 3, 2020. Bruno MaÃ§Ã£es, \"China Wants to Use the Coronavirus to Take Over the World,\" National Review , April 3, 2020. Minxin Pei, \"China's Coming Upheaval, Competition, the Coronavirus, and the Weakness of Xi Jinping,\" Foreign Affairs , April 3, 2020. Riley Walters, \"Decreasing U.S.-China Trade Is Worrisome,\" Heritage Foundation, April 3, 2020. Tom O'Connor and Naveed Jamali, \"As U.S. Struggles to Fight Coronavirus, China, Russia See Opportunity to Gain Global Power,\" Newsweek , April 1, 2020. Matthew Petti, \"Pompeo: China Will Be 'True Strategic Competitor' After Coronavirus,\" National Interest , April 1, 2020. Ali Wyne, \"Why China and the U.S. Can't Cooperate to Fight Coronavirus,\" Washington Post , March 26, 2020. Peter Rough, \"How China is Exploiting the Coronavirus to Weaken Democracies,\" Foreign Policy , March 25, 2020. James Jay Carafano, \"Great Power Competition After the Coronavirus Crisis: What Should America Do?\" National Interest , March 24, 2020. Paul Haenle and Lucas Tcheyan, \"U.S.-China Cooperation on Coronavirus Hampered by Propaganda War,\" Carnegie Endowment for International Peace, March 24, 2020. Jonathan Marcus, \"Coronavirus: US-China Battle Behind the Scenes,\" BBC News , March 24, 2020. Mira Rapp-Hooper, \"China, America, and the International Order After the Pandemic,\" War on the Rocks , March 24, 2020. Doug Bandow, \"A War of Words With China Helps Nobody,\" Foreign Policy , March 23, 2020. Elisabeth Braw, \"As the West Panics, Putin Is Watching,\" Foreign Policy , March 23, 2020. Emily de La Bruyere and Nathan Picarsic, \"Competition Meets Crisis: China's Perverse Opportunity and a Strategic Response,\" National Interest , March 23, 2020. Matthew Kroenig, \"Pandemics Can Fast Forward the Rise and Fall of Great Powers,\" National Interest , March 23, 2020. Stephen S. Roach and Daniel J. Arbess, \"US Lives and Economic Stability Are Threatened by Coronavirus Conflict with China,\" The Hill , March 23, 2020. Gordon G. Chang, \"Donald Trump Can't Cooperate with China on Coronavirus,\" National Interest , March 22, 2020. Michael Crowley, Edward Wong, and Lara Jakes, \"Coronavirus Drives the U.S. and China Deeper Into Global Power Struggle,\" New York Times , March 22, 2020. Richard Fontaine, \"Virus Competition Is Wrecking China-U.S. Cooperation Hopes, Coronavirus Efforts Are A New Battlefrontâand Beijing Is the Only One in the Game,\" Foreign Policy , March 20, 2020. James Holmes, \"Beware of Pandemic America, Note to China and Russia: Despite Appearances, the Time of Coronavirus May Not Be an Opportune Time for You to Chisel Away at America's Global Standing,\" National Interest , March 20, 2020. Suzanne Nossel, \"China Is Fighting the Coronavirus Propaganda War to Win,\" Foreign Polic y, March 20, 2020. Katie Bo Williams, \"US-China Tensions Heat Up As Beijing Seeks Leadership Role,\" Defense One , March 20, 2020. David Ignatius, \"The Coronavirus Is A Test of Our National Character,\" Washington Post , March 19, 2020. David E. Sanger, David D. Kirkpatrick, Sui-Lee Wee, and Katrin Bennhold, \"Search for Coronavirus Vaccine Becomes a Global Competition, The United States, China and Europe are battling to be the first to find a cure, bringing a nationalist element to a worldwide crisis,\" New York Times , March 19, 2020. Dan Blumenthal, \"Coronavirus and the Future of US-China Geopolitical Competition: What We Know So Far,\" Center for Strategic and International Studies, March 18, 2020. Kurt M. Campbell and Rush Doshi, \"The Coronavirus Could Reshape Global Order, China Is Maneuvering for International Leadership as the United States Falters,\" Foreign Affairs , March 18, 2020. Yasmeen Abutaleb and Josh Dawsey, \"Trump's Soft Touch with China's Xi Worries Advisers Who Say More Is Needed to Combat Coronavirus Outbreak,\" Washington Post , February 16, 2020. Democracy, Authoritarianism, and Autocracy Steven Feldstein, \"What Democracy Will Fall Next? Hungary Was the First Democratic Victim of the Coronavirus. It May Not Be the Last,\" Foreign Policy , May 7, 2020. Kemal Kirisci, \"The Coronavirus Has Led to More Authoritarianism for Turkey,\" National Interest , May 6, 2020. Febriana Firdaus. \"Indonesians Fear Democracy Is the Next Pandemic Victim,\" Foreign Policy , May 4, 2020. Margarita R. Seminario and Claudia Fernandez, \"Free Press, Fake News, and Repression during Covid-19: Venezuela, Brazil, and Nicaragua,\" Center for Strategic and International Studies (CSIS), May 4, 2020. Jeffrey Smith and Nic Cheeseman, \"Authoritarians Are Exploiting the Coronavirus. Democracies Must Not Follow Suit,\" Foreign Policy , April 28, 2020. Alexander Cooley and Daniel Nexon, \"Why Populists Want a Multipolar World, Aspiring Authoritarians Are Sick of the Liberal Order and Eager for New Patrons in Russia and China,\" National Inte rest, April 25, 2020. Editorial Board, \"How China's Authoritarian System Made the Pandemic Worse,\" Washington Post , April 17, 2020. Andrea Kendall-Taylor and Carisa Nietsche, \"The Coronavirus Is Exposing Populists' Hollow Politics, As the Crisis Worsens, Even More Extreme Groups May Prosper,\" Foreign Policy , April 16, 2020. Emily Schultheis, \"Coronavirus Has Paralyzed Europe's Far Right,\" Foreign Policy , April 14, 2020. Mason Clark and Aidan Therrien, \"Russia in Review: Kremlin Tests Authoritarian Societal Control Measures During COVID-19 Crisis,\" Institute for the Study of War, April 13, 2020. Suzanne Nossel, \"Don't Let Leaders Use the Coronavirus as an Excuse to Violate Civil Liberties,\" Foreign Policy , April 13, 2020. Stephen M. Walt, \"The United States Is Getting Infected With Dictatorship,\" Foreign Policy , April 13, 2020. Michael Birnbaum and Terrence McCoy, \"As Leaders Seize Powers to Fight Coronavirus, Fear Grows for Democracy,\" Washington Post , April 12, 2020. Steve H. Hanke, \"Crises Enliven 'Totalitarian Temptations,'\" Cato Institute, April 10, 2020. Elisabeth Zerofsky, \"How Viktor OrbÃ¡n Used the Coronavirus to Seize More Power,\" New Yorker , April 9, 2020. Tom G. Palmer and Simon Lee, \"How One Pandemic Leads to Another,\" Cato Institute, April 8, 2020. Frances Z. Brown and Saskia Brechenmacher, and Thomas Carothers, \"How Will the Coronavirus Reshape Democracy and Governance Globally?\" Carnegie Endowment for International Peace, April, 6 2020. James Lamond, \"Authoritarian Regimes Seek To Take Advantage of the Coronavirus Pandemic,\" Center for American Progress, April 6, 2020. Seth J. Frantzman, \"Coronavirus Is Empowering Dictators And Changing The World Order,\" National Interest , April 4, 2020. Joshua Kurlantzick, \"Dictators Are Using the Coronavirus to Strengthen Their Grip on Power,\" Washington Post , April 3, 2020. John Haltiwanger, \"The Coronavirus Just Created a New Dictator in Europe and Has Emboldened the Toxic Behavior of Authoritarians Worldwide,\" Business Insid er, April 1, 2020. Luke McGee, \"Power-Hungry Leaders Are Itching to Exploit the Coronavirus Crisis,\" CNN , April 1, 2020. Jacob Mchangama and Sarah McLaughlin, \"Coronavirus Has Started a Censorship Pandemic,\" Foreign Policy , April 1, 2020. Florian Bieber, \"Authoritarianism in the Time of the Coronavirus, The Pandemic Offers Dictatorsâand Democracies Alikeâan Opportunity for Abuse,\" Foreign Policy , March 30, 2020. Selam Gebrekidan, \"For Autocrats, and Others, Coronavirus Is a Chance to Grab Even More Power,\" New York Times , March 30, 2020. Anne Applebaum, \"The People in Charge See an Opportunity, Around the World, Rulers Are Using the Pandemic As An Excuse to Grab More Power. And the Public Is Going Along with It,\" Atlanti c, March 23, 2020. Melinda Haring and Doug Klain, \"Why Autocrats Love Coronavirus,\" National Interest , March 22, 2020. Societal Tension, Reform, and Transformation, and GovernmentalÂ Stability Robyn Dixon, \"Putin Knows How to Rule Russia as An Autocrat. But He Seems on the Sidelines Amid Coronavirus Crisis,\" Washington Post , May 7, 2020. Ann M. Simmons, \"In Russia, Putin Wrestles With Economic Impact of Coronavirus,\" Wall Street Journal , May 6, 2020. Nathan Hodge, \"As Coronavirus Hits Record Numbers in Russia, This Is a Dangerous Moment for Putin,\" CNN , May 4, 2020. Clara Ferreira Marques, \"Coronavirus Has Exposed Putin's Brittle Regime,\" Bloomberg , May 4, 2020. Henry Foy, \"Russia: Pandemic Tests Putin's Grip on Power,\" Financial Times , May 4, 2020. Cary Huang, \"Coronavirus: China Faces an Economic Reckoning as Covid-19 Turns World Against Globalisation,\" South China Morning Post , May 3, 2020. Andrew Higgins, \"Putin, Russia's Man of Action, Is Passive, Even Bored, in the Coronavirus Era,\" New York Times , April 30, 2020. Nael M. Shama, \"In Egypt, the Coronavirus Poses a Political Threat,\" Foreign Policy , April 30, 2020. Don Weinland, \"China Slowdown Puts Xi in Political Bind, Coronavirus Threatens Communist Party's Aim of Widespread Prosperity by End of 2020,\" Financial Times , April 28, 2020. Editorial Board, \"Russia's Economic Woes Will Clip Vladimir Putin's Wings, Pandemic Combined with Collapsing Oil Prices Spells Real Hardship,\" Financial Times , April 27, 2020. Lance Kokonos, \"Coronavirus Is Making Russia's Demographic Disaster Even Worse,\" National Interest , April 25, 2020. Leon Aron, \"The Coronavirus Could Imperil Putin's Presidency,\" Wall Street Journal , April 23, 2020. Holly Ellyatt, \"Coronavirus Is a 'Challenge' for Putin and 'Huge Danger' for the World, Kremlin Warns,\" CNBC , April 22, 2020. Rick Gladstone, \"Oil Collapse and Covid-19 Create Toxic Geopolitical Stew,\" New York Times , April 22, 2020. Sarah Rainsford, \"Coronavirus Crisis Tests Putin's Grip on Power in Russia,\" BBC , April 22, 2020. Armand Gosu, \"Russia Needs an OPEC+ 2.0 Accord to Avoid a Crisis,\" Middle East Institute, April 21, 2020. Patrick Tucker, \"Putin Is Projecting Strength In the Face of Coronavirus. But the Image is Cracked,\" Defense One , April 21, 2020. Brian Whitmore, \"The Desanctification of Putin, The Political Costs of COVID-19 Are Beginning to Mount,\" Center for European Policy Analysis (CEPA), April 21, 2020. Steven Erlanger, \"Coronavirus Has Lifted Leaders Everywhere. Don't Expect That to Last,\" New York Times , April 15, 2020. James Traub, \"After the Coronavirus, the Era of Small Government Will Be Over,\" Foreign Policy , April 15, 2020. Frances Z. Brown and Jarrett Blanc, \"Coronavirus in Conflict Zones: A Sobering Landscape,\" Carnegie Endowment for International Peace, April 14, 2020. (Includes links to 12 additional writings by various authors focusing on situations in specific countries and regions.) Michael Albertus, \"The Coronavirus Will Cause New Crises in Latin America,\" Foreign Policy , April 16, 2020. Samuel Brannen, \"Will Covid-19 End the Age of Mass Protests?\" Center for Strategic and International Studies (CSIS), April 7, 2020. Kyle Harper, \"The Coronavirus Is Accelerating History Past the Breaking Point, Every Era Gets the Infectious Diseasesâand the Resulting Political UpheavalâIt Has Coming,\" Foreign Policy , April 6, 2020. Anthony Faiola, Lindzi Wessel, and Shibani Mahtani, \"Coronavirus Chills Protests from Chile to Hong Kong to Iraq, Forcing Activists to Innovate,\" Washington Post , April 4, 2020. James Jay Carafano, \"Coronavirus and Regime ChangeâWill This Plague Topple Nations Great and Small?\" Heritage Foundation , April 1, 2020. Nic Cheeseman, \"The Coronavirus Could Topple Governments Around the World,\" Foreign Policy , March 31, 2020. Carolyn Whitzman, \"Could Coronavirus Lead To a Fairer World?\" National Interest , March 31, 2020. Elizabeth Kolbert, \"Pandemics and the Shape of Human History, Outbreaks Have Sparked Riots and Propelled Public-Health Innovations, Prefigured Revolutions and Redrawn Maps,\" New Yorker , March 20, 2020. Simon Mair, \"Why Coronavirus May Change the World (For Better or Worse),\" National Interest , March 30, 2020. Nicholas Mulder, \"The Coronavirus War Economy Will Change the World,\" Foreign Policy , March 26, 2020. World Economy, Globalization, and U.S. Trade Policy Ana Quintana, James Roberts, and Anthony Kim, \"A U.S.âMexico-Canada (USMCA) Economic Partnership Recovery Plan,\" Heritage Foundation, May 7, 2020. Desmond Lachman, \"Could Italy Default on Its Debt Due to the Coronavirus?\" National Interest , May 7, 2020. Ruchir Sharma, \"The Pandemic Isn't Changing Everything, It Is Just Speeding Up Trends That Were Already Underway,\" New York Times , May 3, 2020. James Crabtree, \"The End of Emerging Markets? Economies such as Brazil, Indonesia, India, Russia, and Turkey face a daunting new reality,\" Foreign Policy , May 3, 2020. Kevin Sieff, \"The U.S. Wants Mexico to Keep Its Defense and Health-Care Factories Open. Mexican Workers Are Getting Sick and Dying,\" Washington Post , May 1, 2020. Ariel E. Levite and Lyu Jinghua, \"Travails of an Interconnected World: From Pandemics to the Digital Economy,\" Lawfare , April 30, 2020. Nathaniel Taplin, \"Trump's Trade Deal With China Is Another Coronavirus Victim, The Pandemic Is Exposing the Perils of Agreements Based on Numerical Targets Rather Than Tariff Reductions or Policy Concessions,\" Wall Street Journal , April 30, 2020. Trevor Jackson, \"Terminal Deflation Is Coming, Central Banks' Interventions in the Pandemic Economy Are Unprecedentedly Vastâand Not Nearly Enough,\" Foreign Policy, April 29, 2020. Greg Ip, \"Globalization Is Down but Not Out Yet,\" Wall Street Journal , April 28, 2020. Zhou Xin, \"Coronavirus: How Will China's Role in the Global Economy Change When Faced with Pandemic Backlash?\" South China Morning Post , April 28, 2020. Nicholas Mulder and Adam Tooze, \"The Coronavirus Oil Shock Is Just Getting Started,\" Foreign Policy , April 23, 2020. Jack Detsch and Robbie Gramer, \"The Coronavirus Could Upend Trump's China Trade Deal,\" Foreign Policy , April 21, 2020. Richard Fontaine, \"Globalization Will Look Very Different After the Coronavirus Pandemic,\" Foreign Policy , April 17, 2020. Neil Irwin, \"It's the End of the World Economy as We Know It, Experts Suggest There Will Be 'A Rethink of How Much Any Country Wants to Be Reliant on Any Other Country,'\" New York Times , April 16, 2020. Robert Delaney, \"Economic Havoc Wreaked by Coronavirus Has Likely Throttled US-China Trade Deal, Experts Say,\" South China Morning Post , April 15, 2020. Joseph E. Stiglitz et al., \"How the Economy Will Look After the Coronavirus Pandemic, The Pandemic Will Change the Economic and Financial Order Forever. We Asked Nine Leading Global Thinkers for Their Predictions,\" Foreign Policy , April 15, 2020. Martin Wolf, \"The World Economy Is Now Collapsing, A Microbe Has Overthrown Our Arrogance and Sent Global Output into a Tailspin,\" Financial Times , April 14, 2020. Josh Zumbrun, \"Coronavirus-Afflicted Global Economy Is Almost Certainly in Recession,\" Wall Street Journal , April 14, 2020. By Raphael S. Cohen Sunday, \"The Coronavirus Will Not Stop Globalization,\" Lawfare , April 12, 2020. Dalia Marin, \"How COVID-19 Is Transforming Manufacturing,\" Project Syndicate , April 3, 2020. Daniel J. Ikenson, \"The Coronavirus Crisis Is the Worst Time For Trump To Put Up Trade Barriers,\" National Interest , March 30, 2020. Simon Lester, \"The Coronavirus Crisis Is the Right Time For Free Trade,\" National Interest , March 30, 2020. David Frum, \"The Coronavirus Is Demonstrating the Value of Globalization,\" Atlantic , March 27, 2020. Mie Oba, \"Coronavirus and the Future of Globalization,\" Diplomat , March 18, 2020. Henry Farrell and Abraham Newman, \"Will the Coronavirus End Globalization as We Know It?\" Foreign Affairs , March 16, 2020. Philippe Legrain Marc, \"The Coronavirus Is Killing Globalization as We Know It,\" Foreign Policy , March 12, 2020. Allied Defense Spending and U.S. Alliances Ben Doherty, \"The Indispensable Nation? Covid-19 Tests the US-Australian Alliance,\" Guardian , May 5, 2020. Wallace C. Gregson, \"The Coronavirus Creates New National Security Problems for America,\" National Defense , May 3, 2020. Marcus Weisgerber, \"Global Defense Spending Decline Expected As Nations Deal with Coronavirus,\" Defense One , April 28, 2020. Tom Kington, \"Back Hard-Hit Businesses? Experts Press EU to Instead Boost Defense Spending,\" Defense News , April 27, 2020. Clementine Starling, \"Europe Was Just Getting Better at Moving Militaries,\" Defense One , April 22, 2020. Brooks Tigner, Brussels, \"Covid-19: NATO to Review Military Resilience for Post-pandemic World,\" Jane' s, April 17, 2020. Richard Fontaine, \"We Need an Atlantic Charter for the Post-coronavirus Era,\" Atlantic , April 16, 2020. Deborah Haynes, \"Coronavirus: NATO Chief Denies Alliance Has Responded Too Slowly to Pandemic,\" Sky News , April 15, 2020. StÃ©phanie Fillion, \"In Canada, Patience Wearing Thin Over Trump's Antics, A Threat to Militarize the Border and Attempts to Hold Up Lifesaving Medical Supplies Have Roiled the Calmest of Countries,\" Foreign Policy , April 14, 2020. Sebastian Sprenger, \"NATO Defense Ministers to Weigh Coronavirus Fallout,\" Defense News , April 14, 2020. James Jay Carafano, \"After CoronavirusâWe Still Need Europe and They Need Us. Here's What Has to Happen,\" Heritage Foundation , April 13, 2020. Derek Chollet, MichaÅ Baranowski, and Steven Keil, \"Where is NATO? And Where is Trump? The Virus Is Destroying Economies and Paralyzing Societies in Ways Russian Military Planners Could Only Dream,\" Defense One , April 13, 2020. Philip H. Gordon and Jeremy Shapiro, \"The Atlantic Alliance Had Preexisting Conditions. The Pandemic Will Worsen Them,\" War on the Rocks , April 13, 2020. Quentin Lopinot, \"Europe Is at War with the Coronavirus. Where Does That Leave European Defense?\" Center for Strategic and International Studies (CSIS), April 13, 2020. Janusz Bugajski, \"Mind the Gap, And Don't Succumb to Transatlantic Fever,\" Center for European Policy Analysis (CEPA), April 10, 2020. Sophia Becker, Christian MÃ¶lling, and Torben SchÃ¼tz, \"The Coronavirus Threatens NATO. Let's Move to Protect the Alliance,\" Defense News , April 9, 2020. Matthew Karnitschnig and Judith Mischke, \"Berlin Lets Mask Slip on Feelings for Trump's America, The Crisis Has Convinced Germans That Trump Puts Other Countries at Risk,\" Politico , April 6 (updated April 7), 2020. Andy Blatchford, \"Trump's Moves to Hold Medical Supplies Tip Trudeau to China,\" Politico , April 4 (updated April 5), 2020. Dov S. Zakheim, \"NATO's Budget Virus: How the Pandemic Could Slash Military Spending,\" The Hill , March 16, 2020. European Union Michael Birnbaum, \"E.U. Defends Handling of China Relations After Beijing Censors Op-ed Written by Bloc's Ambassadors,\" Washington Post , May 7, 2020. Heather A. Conley, \"Covid-19 May Encourage a No-Deal Brexit,\" Center for Strategic and International Studies (CSIS), May 7, 2020. Lorne Cook and Llazar Semini, \"EU Aims to Reassure Balkans with Virus Aid, Economic Support,\" Associated Press , May 6, 2020. Christopher Caldwell, \"Can the European Union Survive a Pandemic? The Coronavirus Crisis Has Turned Its Member Nations Against Each Other,\" New Republic , May 5, 2020. Rick Noack, \"The Coronavirus Has Brought Back Border Barriers in Europe, Dividing Couples, Families and Communities,\" Washington Post , May 1, 2020. Sinan Ulgen, \"The Coronavirus Is Creating a Crisis on Europe's Borders,\" Foreign Policy , May 1, 2020. Spencer Wong, \"Is the Coronavirus Ushering in an Era of Eurosceptic Leaders? The Pandemic Could Very Well Be a Watershed Moment in European Politics,\" National Interest , April 29, 2020. Elisabeth Braw, \"Forget Washington and Beijing. These Days Global Leadership Comes From Berlin,\" Foreign Policy , April 28, 2020. Rikard Jozwiak, \"EU Monitors See Coordinated COVID-19 Disinformation Effort By Iran, Russia, China,\" Radio Farda , April 23, 2020. Jennifer Rankin, \"How Covid-19 Poured Cold Water on Netherlands' EU Romance,\" Guardian (UK) , April 23, 2020. Peter Rough, \"The European Union Needs More National Flexibility,\" National Review , April 22, 2020. Donatienne Ruy, \"Fault Lines and Prospects for European Solidarity,\" Center for Strategic and Budgetary Assessments (CSIS), April 22, 2020. Bashkim Smakaj, \"COVID-19 and the Need for Deep EU Reform,\" Euractiv , April 22, 2020. HJ Mai, \"The Coronavirus Could Tear the EU Apart,\" Vox , April 21, 2020. Stephania Taladrid, \"What the Coronavirus Means for Europe's Future,\" New Yorker , April 21, 2020. Sam Fleming, \"EU Coronavirus Recovery Fund Plans Face Political Bear Traps,\" Financial Times, April 20, 2020. Andrea Dudik and Flavia Krause-Jackson, \"Albania's European Dream Is Just Out of Reach, As the Coronavirus Widens Fractures in the EU, Hopes of a Larger Europe Fade,\" Bloomberg Business w eek , April 17, 2020. Dalibor Rohac, \"Europe Needs an Alexander Hamilton, Not More Budget Hawks,\" Foreign Policy , April 16, 2020. Simon Clark and Ben Dummett, \"Coronavirus Accelerates European Efforts to Block Foreign Takeovers,\" Wall Street Journal , April 10, 2020. Luke McGee, \"The EU Has Bungled Its Response to Coronavirus and It Might Never Fully Recover,\" CNN , April 10, 2020. by Tom Rogan, \"Coronavirus Bailout Lays Bare European Union Nationalist Divisions,\" Washington Examiner , April 10, 2020. Samuel Volkin, \"Covid-19 and a Splintered European Union,\" Hub (Johns Hopkins University) , April 10, 2020. Oliver Wiseman, \"Will We Meet Again? The Covid-19 Crisis Is Testing European Unity to the Breaking Point,\" City Journal , April 8, 2020. Heather A. Conley, \"An Eroding European Union,\" Center for Strategic and International Studies (CSIS), April 6, 2020. Katya Adler, \"Coronavirus Outbreak Eats Into EU Unity,\" BBC , April 3, 2020. Katharina Konarek, \"COVID-19âA Make-It or Break-It Moment for the European Union,\" The Hill , April 3, 2020. Kevin Allison, \"A COVID-19 test for the European Union,\" Gzero Media , March 31, 2020. Definition of, and Budgeting for, U.S. National Security Joseph Marks, \"The Cybersecurity 202: Security Pros Form Alliance to Help Hospitals Facing Hacking Threats During Pandemic,\" Washington Post , May 4, 2020. Greg Barbaccia, \"The Coronavirus Pandemic Will Force a Paradigm Shift in the U.S. Intelligence Community,\" National Interest , April 23, 2020. Kori Schake, \"A New Org Chart Won't Stop the Next Pandemic,\" Bloomberg , April 22, 2020. Rachel Olney, \"How Will the Pandemic Affect National Security Innovation?\" War on the Rocks , April 21, 2020. Christopher Woody, \"After Coronavirus, the US Needs to Worry about a '7 th domain' of Warfare, Top Navy Commander in Europe Says,\" Business Insider , April 17, 2020. David E. Sanger, \"Analysis: Will Pandemic Make Trump Rethink National Security?\" New York Times , April 15, 2020. Benjamin Jensen, \"When Systems Fail: What Pandemics and Cyberspace Tell Us About the Future of National Security,\" War on the Rocks , April 9, 2020. Christopher Preble, \"How will COVID-19 Change US National Security Strategy?\" Responsible Statecraft , April 8, 2020. Glenn S. Gerstell and Michael Morell, \"Four Ways U.S. Intelligence Efforts Should Change in the Wake of the Coronavirus Pandemic,\" Washington Post , April 7, 2020. Oona A. Hathaway, \"After COVID-19, We Need to Redefine 'National Security,' The Post-9/11 Era Is Over,\" Slate , April 7, 2020. Zachery Tyson Brown, \"America's National Security Software Needs an Upgrade, The Outdated U.S. Security Apparatus Was Completely Unprepared for the Coronavirus Pandemic,\" Foreign Policy , April 6, 2020. Ben Rhodes, \"The 9/11 Era Is Over, The Coronavirus Pandemic and a Chapter of History That Should Have Expired Long Ago,\" Atlantic , April 6, 2020. Gregory D. Koblentz and Michael Hunzeker, \"National Security in the Age of Pandemics,\" Defense One , April 3, 2020. Nahal Toosi, \"Coronavirus Rattles America's National Security Priesthood,\" Politico Pro , March 29, 2020. Joseph S. Nye, Jr., \"COVID-19's Painful Lesson about Strategy and Power,\" War on the Rocks , March 26, 2020. Gary J. Schmitt, \"National Security and the Pandemic of 2020,\" American Interest , March 20, 2020. U.S. Defense Strategy, Defense Budget, and Military Operations Susan Montoya Bryan (Associated Press), \"US Must Move Ahead with Work on Nukes, Says Nuclear Security Boss,\" Defense New s, May 6, 2020. Leo Shane III, \"No Extra Money for Defense Amid Coronavirus Crisis, Think Tank Argues,\" Military Times , May 6, 2020. Hal Brands, \"Can a Broke America Fight a Cold War With China? The Coronavirus Has United Americans Against Beijing's Aggressions, But It Will Also Devastate the Pentagon Budget,\" Bloomberg , May 5, 2020. Rebeccah L. Heinrichs, \"Expand Missile Defenses During the Pandemic, Don't Cut Them,\" Defense News , May 5, 2020. Fred Kaplan, \"Now Is the Time to Cut the Defense Budget,\" Slate , May 5, 2020. Paul McLeary, \"Old Weapons Under Fire As COVID Debt Rises,\" Breaking Defense , May 5, 2020. Aaron Mehta, \"Esper: Flat Budget Could Speed Cutting of Legacy Programs,\" Defense News , May 5, 2020. John M. Donnelly, \"US military poised for post-pandemic shift,\" CQ (Congressional Quarterly) , May 4, 2020. Ben Werner, \"SECDEF Esper Preparing For Future Defense Spending Cuts,\" USNI News , May 4, 2020. Rebecca Kheel, \"Defense Budget Brawl Looms After Pandemic,\" The Hill , May 3, 2020. Anrea Howard, \"The Pandemic and America's Response to Future Bioweapons,\" War on the Rocks , May 1, 2020. Paul McLeary, \"Pentagon Wary Of Adversaries Buying Defense Firms Amid Economic Crisis,\" Breaking Defense , April 30, 2020. Ben Wolfgang, \"U.S. Military Ramps Up Counterterrorism Operations in Africa Amid Pandemic,\" Washington Times , April 29, 2020. David Barno and Nora Bensahel, \"Five Ways the U.S. Military Will Change After the Pandemic,\" War on the Rocks , April 28, 2020. Theresa Hitchens, \"DoD Budget Cuts Likely As $4 Trillion Deficit Looms,\" Breaking Defense , April 27, 2020. Walter Russell Mead, \"The Century of Bioweapons,\" Wall Street Journal , April 27, 2020. Connor O'Brien, \"Defense Boosters Fire Warning Shots over Budget Cuts Due to Pandemic,\" Politico Pro , April 24, 2020. Natasha Bertrand, Daniel Lippman, and Lara Seligman, \"Officials Probe the Threat of a Coronavirus Bioweapon,\" Politico Pro , April 23, 2020. William D. Hartung, \"Now Isn't the Time to Push for Nuclear Modernization,\" Defense News , April 21, 2020. Loren Thompson, \"How Coronavirus Could Permanently Transform The U.S. Military,\" Forbes , April 20, 2020. Todd Harrison, \"DoD Must Identify Its 'Crown Jewels' in Preparation for Fiscal Uncertainty,\" Defense News , April 15, 2020. Michael J. Mazarr, \"Toward a New Theory of Power Projection,\" War on the Rock s, April 15, 2020. Robert Burns, \"Military Sees No Quick Exit From 'New World' of Coronavirus,\" Associated Press , April 14, 2020. Tony Bertuca, \"Global Pandemic Threatens to Hobble National Defense Strategy,\" Inside Defense , April 13, 2020. David Ignatius, \"The Coronavirus Is Already Reshaping Defense Strategies,\" Washington Post , April 9, 2020. Daniel L. Davis, \"Coronavirus Means No More Money for Forever Wars,\" National Interest , April 7, 2020. Harrison Schramm, Kevin A. Chlan, Peter Kouretsos, COVID-19, Analysis and Policy Implications , Center for Strategic and Budgetary Assessments, 2020 (released April 7, 2020), 31 pp. Jason Sherman, \"Analyst: Pandemic Will Squeeze Defense Spending As Nation's Focus Shifts to Health Care,\" Inside Defense , April 6, 2020. Stratfor Worldview, \"Will the Coronavirus Ruin Countries' Ability to Wage War?\" National Interest , April 5, 2020. James G. Foggo III, \"Germs: The Seventh Domain of Warfare,\" U.S. Naval Institute Proceedings , April 2020. David Barno and Nora Bensahel, \"After the Pandemic: America and National Security in a Changed World,\" War on the Rocks , March 31, 2020. Max Boot, \"Covid-19 is Killing Off Our Traditional Notions of National Defense,\" Washington Post , March 31, 2020. Jim Thomas, \"A Blueprint for Rebuilding America's Military After the Coronavirus,\" National Interest , March 28, 2020. Doug Bandow, \"Now's The Time To Become A Truly 'America First' Military, With Coronavirus Killing the Economy, We Can No Longer Afford to Project Power Everywhere,\" American Conservative , March 26, 2020. Doug Bandow, \"How the Coronavirus Shows North Korea Doesn't Matter That Much to America,\" National Interest , March 25, 2020. Doug Bandow, \"Coronavirus Means America Is Really Broke. Trump Should Get the Hell Out of Syria,\" National Interest , March 22, 2020. U.S. Foreign Assistance and International Debt Relief Michael H. Fuchs, Alexandra Schmitt, and Haneul Lee, \"Foreign Aid is Critical to Stopping the Coronavirus,\" National Interest , May 3, 2020. Daniel F. Runde, Conor M. Savoy, and Shannon McKeown, \"Covid-19 Has Consequences for U.S. Foreign Aid and Global Leadership,\" Center for Strategic and International Studies (CSIS), May 1, 2020. James Kynge and Sun Yu, \"China Faces Wave of Calls for Debt Relief on 'Belt and Road' Projects,\" Financial Times , April 30, 2020. Charles Holmes, Anthony Lake, and Witney Schneidman, \"It's Time to Help Africa Fight the Virus, The Continent Is Ripe for a Public Health Disaster, and Western Powers Must Step in to Prevent Another Global Catastrophe,\" Foreign Policy, April 29, 2020. Matthew Lee, \"Virus Pandemic Collides with Trump's Disdain for Foreign Aid,\" Associated Press , April 17, 2020. Adam Tooze, \"A Global Pandemic Bailout Was ComingâUntil America Stopped It,\" Foreign Policy , April 17, 2020. Editorial Board, \"Even as Rich Countries Reel, It's Imperative to Help Emerging Markets,\" Washington Post , April 16, 2020. Dayo Israel, \"Unless Canceled, Africa's Debt Burden Will Cause COVID-19 to Kill Millions,\" Washington Examiner , April 16, 2020. Cara Anna and Aya Batrawy, \"Richest Countries Agree to Freeze Poorer Nations' Debt,\" Associated Press , April 15, 2020. Nahal Toosi, \"Trump Hobbles Foreign Aid as Coronavirus Rips Around the World, Confusion at the Top Has Crippled USAID at a Critical Time for the Global Battle Against the Pandemic,\" Politico , April 15, 2020. Josh Zumbrun, \"G-7 Countries Support Debt Relief for Poorest Countries If Joined by Full G-20,\" Wall Street Journal , April 14, 2020. Robbie Gramer, \"Outgoing USAID Chief Says Pandemic Underscores Importance of Foreign Aid,\" Foreign Policy , April 13, 2020. Josh Rogin, \"The Pandemic Means the Trump Administration Must Stop Mistreating USAID,\" Washington Post , April 9, 2020. Josh Rogin, \"America's $2 Trillion Coronavirus Stimulus Package Ignores the Rest of the World,\" Washington Post , March 26, 2020. Non-state Actors Ryan Browne, \"ISIS Seeks to Exploit Pandemic to Mount Resurgence in Iraq and Syria,\" CNN , May 8, 2020. Robert Muggah, \"The Pandemic Has Triggered Dramatic Shifts in the Global Criminal Underworld,\" Foreign Policy, May 8, 2020. Ashley Jackson, \"For the Taliban, the Pandemic Is a Ladder,\" Foreign Policy , May 6, 2020. Brandon Prins, \"Why Coronavirus May Lead to More Piracy,\" National Interest , May 6, 2020. Lydia Khalil, \"COVID-19 and America's Counter-Terrorism Response,\" War on the Rocks , May 1, 2020. Luke Baker, \"Militants, Fringe Groups Exploiting COVID-19, Warns EU Anti-Terrorism Chief,\" Reuters , April 30, 2020. Joseph Hincks, \"With the World Busy Fighting COVID-19, Could ISIS Mount a Resurgence?\" Time , April 29, 2020. Luis Fajardo, \"Coronavirus: Latin American Crime Gangs Adapt to Pandemic,\" BBC , April 22, 2020. Raffaello Pantucci, \"After the Coronavirus, Terrorism Won't Be the Same,\" Foreign Policy , April 22, 2020. Valentina Di Donato and Tim Lister, \"The Mafia Is Poised to Exploit Coronavirus, and Not Just in Italy,\" CNN , April 19, 2020. Jim Mustian and Jake Bleiberg, \"'Cartels Are Scrambling': Virus Snarls Global Drug Trade,\" Associated Press , April 19, 2020. Colum Lynch, \"How Trump and Putin Weakened U.N. Bid for a Global Cease-Fire, U.S. Officials Worry That Counterterrorism Operations Will Be Constrained,\" Foreign Policy , April 17, 2020. Seth J. Frantzman, \"Iran Regime, ISIS and Other Extremists Exploit Coronavirus to Wreak Havoc,\" Jerusalem Post , April 16, 2020. Kevin Sieff, Susannah George, and Kareem Fahim, \"Now Joining the Fight Against Coronavirus: The World's Armed Rebels, Drug Cartels and Gangs,\" Washington Post , April 14, 2020. Souad Mekhennet, \"Far-Right and Radical Islamist Groups Are Exploiting Coronavirus Turmoil,\" Washington Post , April 10, 2020. Yonah Jeremy Bob, \"Coronavirus Economic Impact Could Block Iran from Funding TerrorâINSS,\" Jerusalem Post , April 7, 2020. Vanda Felbab-Brown, \"What Coronavirus Means for Online Fraud, Forced Sex, Drug Smuggling and Wildlife Trafficking,\" Lawfare , April 3, 2020. Cara Anna, \"Extremists See Global Chaos from Virus As An Opportunity,\" Associated Press , April 2, 2020. Stratfor Worldview, \"Coronavirus Could Lead To Lots of This in the Near Future,\" National Interest , March 22, 2020. (The article discusses potential actions by non-state actors.) U.S. Attention to International Issues Other than COVID-19 Arjun Kapur, \"Scotland Launched an Invasion During the Black Death. Does History Tell China to Attack Taiwan?\" National Interest , May 2, 2020. Con Coughlin, \"China Exploiting the Coronavirus Pandemic to Expand in Asia,\" Gatestone Institute , April 30, 2020. Corinne Redfern, \"The Pandemic's Hidden Human Trafficking Crisis, The Coronavirus Has Created More People Vulnerable to Exploitation by Traffickersâand Revealed the World's Unpreparedness to Protect Them,\" Foreign Policy , April 30, 2020. Paul Haenle, \"Security Concerns in Asia-Pacific Escalate Amid Coronavirus Scramble, While the Trump Administration Is Consumed with the Coronavirus, China and North Korea Are Seizing the Moment for Strategic Advantage,\" Carnegie Endowment for International Peace, April 29, 2020. Bertil Lintner, \"Time May Be Ripe for China to Invade Taiwan, Pandemic Has Left a US Security Vacuum Around the Self-Governing Island China Has Oft-Vowed to 'Reincorporate' with the Mainland,\" Asia Times , April 28, 2020. Victor Davis Hanson, \"Pandemic Only 1 of America's Security Concerns,\" Daily Signal , April 23, 2020. Gordon Lubold and Dion Nissenbaum, \"With Trump Facing Virus Crisis, U.S. Warns Rivals Not to Seek Advantage,\" Wall Street Journal , April 20, 2020. Ellen Mitchell, \"Foreign Powers Test US Defenses Amid Coronavirus Pandemic,\" The Hill , April 19, 2020. Karen DeYoung, \"Foreign Policy Challenges Persist for a Distracted U.S. in the Midst of Pandemic,\" Washington Post , April 10, 2020. Sylvie Lanteaume (Agence France-Presse), \"Hit by Virus, Pentagon Warns Enemies: Don't Test Us,\" Yahoo News , April 10, 2020. \"With the world distracted, China intimidates Taiwan,\" Economist , April 8, 2020. (This article does not list an author.) Fred Kaplan, \"The Coronavirus Hasn't Stopped Trump From Undermining Our National Security,\" Slat e, March 26, 2020. Role of Congress Robbie Gramer and Jack Detsch, \"Pandemic Stymies Congressional Check on Trump's Foreign Policy,\" Foreign Policy , April 8, 2020.", "summary": "Some observers argue the COVID-19 pandemic could be a world-changing event with potentially profound and long-lasting implications for the international security environment and the U.S. role in the world. Other observers are more skeptical that the COVID-19 pandemic will have such effects. Observers who argue the COVID-19 pandemic could be world-changing for the international security environment and the U.S. role in the world have focused on several areas of potential change, including the following, which are listed here separately but overlap in some cases and can interact with one another: world order, international institutions, and global governance; U.S. global leadership and the U.S. role in the world; China's potential role as a global leader; U.S. relations and great power competition with China and Russia, including the use of the COVID-19 pandemic as a theme or tool for conducting ideological competition; the relative prevalence of democratic and authoritarian or autocratic forms of government; societal tension, reform, transformation, and governmental stability in various countries; the world economy, globalization, and U.S. trade policy; the characteristics and conduct of conflict; allied defense budgets and U.S. alliances; the cohesion of the European Union; the definition of, and budgeting for, U.S. national security; U.S. defense strategy, defense budgets, and military operations; U.S. foreign assistance programs and international debt relief; activities of non-state actors; the amount of U.S. attention devoted to ongoing international issues other than the COVID-19 pandemic; and the role of Congress in setting and overseeing the execution of U.S. foreign and defense policy. Issues for Congress may include whether and how the COVID-19 pandemic could change the international security environment, whether the Trump Administration's actions for responding to such change are appropriate and sufficient, and what implications such change could have for the role of Congress in setting and overseeing the execution of U.S. foreign and defense policy. Congress's decisions regarding these issues could have significant and even profound implications for U.S. foreign and defense policy, and for the status of Congress as a co-equal branch relative to the executive branch in setting and overseeing the implementation of U.S. foreign and defense policy.", "document_type": "crs"}
{"report": "The first section of this report provides an overview of the consideration of FY2020 legislative branch appropriations, with subsections covering each action to date, including the initial submission of the request on March 11, 2019; hearings held by the House Legislative Branch Appropriations Subcommittee in February, March, and April 2019 and hearings held by the Senate Legislative Branch Appropriations Subcommittee in March and April 2019; the House subcommittee markup held on May 1, 2019; the House full committee markup on May 9, 2019, and reporting of H.R. 2779 ; the Office of Management and Budget (OMB) letter from May 8, 2019, with the Administration's position on the legislative branch budget; discussion in June of the potential inclusion of legislative branch funding in H.R. 2740 (Rules Committee Print 116-17); the Senate full committee markup on September 26, 2019, and reporting of S. 2581 ; the enactment on September 27, 2019, of a continuing resolution providing funding through November 21 ( P.L. 116-59 ), and the enactment on November 21, 2019, of a continuing resolution providing funding through December 20 ( P.L. 116-69 ); and the enactment of the Further Consolidated Appropriations Act ( P.L. 116-94 ) on December 20, 2019, which included funding for legislative branch activities for FY2020 in Division E and additional language related to the legislative branch in Division P. It is followed by a section on prior year actions and funding, which contains a historical table and figure. The report then provides an overview of the FY2020 budget requests of individual legislative branch agencies and entities. Table 5 through Table 9 list enacted funding levels for FY2019 and the requested, House-reported, Senate-reported, and enacted levels for FY2020, while the Appendix lists House, Senate, and conference bills and reports; public law numbers; and enactment dates since FY1998. The White House submitted its budget for FY2020, which includes the legislative branch budget request, on March 11, 2019. As explained by OMB, The budget covers the agencies of all three branches of GovernmentâExecutive, Legislative, and Judicialâand provides information on Government-sponsored enterprises. In accordance with law or established practice, OMB includes information on agencies of the Legislative Branch, the Judicial Branch, and certain Executive Branch agencies as submitted by those agencies without change. The independence of the submissions by the legislative branch agencies and entities is codified in Title 31, Section 1105, of the U.S. Code , which states the following: Estimated expenditures and proposed appropriations for the legislative branch and the judicial branch to be included in each budget ... shall be submitted to the President ... and included in the budget by the President without change. Furthermore, Division C of the FY2012 Consolidated Appropriations Act ( P.L. 112-74 ) added language to Title 31, Section 1107, relating to budget amendments, stating the following: The President shall transmit promptly to Congress without change, proposed deficiency and supplemental appropriations submitted to the President by the legislative branch and the judicial branch. The FY2020 budget contained a request for $5.288 billion in new budget authority for legislative branch activities (+9.3%). Table 2 lists the dates of hearings of the legislative branch subcommittees in February, March, and April 2019. Prepared statements of witnesses were posted on the subcommittee websites, and hearing transcripts were published by the Government Publishing Office. On May 1, 2019, the House Appropriations Committee Subcommittee on the Legislative Branch held a markup of the FY2020 bill. The subcommittee recommended $3.943 billion, a $135.2 million increase (+3.6%) from the comparable 2019 enacted level, not including Senate items, which are historically considered by the Senate and not included in the House bill. No amendments were offered, and the bill was ordered reported to the full committee by voice vote. On May 9, 2019, the House Appropriations Committee met to mark up the FY2020 bill reported from its legislative branch subcommittee. The following amendments were considered: A manager's amendment, offered by Subcommittee Chairman Tim Ryan of Ohio, that would increase funding for the Veterans' History Project by $1.0 million, add report language, and include one technical change. The amendment was adopted by voice vote. A manager's amendment, offered by Subcommittee Chairman Tim Ryan of Ohio, that would increase the overall funding for the bill by $29.0 million to reflect revised 302(b) subcommittee allocations adopted by the committee on May 8 ( H.Rept. 116-59 ). The amendment would increase total House funding by $19.0 million and Architect of the Capitol funding by $10.0 million. Subcommittee Ranking Minority Member Jaime Herrera Beutler offered an amendment to the manager's amendment that would have stricken this additional funding and instead placed it in a spending reduction account. The amendment to the amendment failed by recorded vote (23-28), and the amendment was adopted by voice vote. The bill was ordered reported by recorded vote (28-22). As amended, the bill provided $3.972 billion, not including Senate items (+$164.2 million). As it did during consideration of the FY2019 legislative branch appropriations bill, OMB submitted a letter with the Administration's views on the overall size of the legislative branch bill as well as the funding levels for specific accounts. In particular, the Administration letter cited funding levels for the House of Representatives and the Government Accountability Office (GAO). On June 3, the House Committee on Rules announced its intention to consider and report a resolution that would structure consideration in the House of H.R. 2740 , the Labor, Health and Human Services, and Education appropriations bill. The committee indicated that the resolution reported from the Rules Committee would add the text of four additional appropriations bills to the text of H.R. 2740 . This proposal would include the text of H.R. 2779 , the legislative branch appropriations bill as reported by the Committee on Appropriations (to be included as Division B of H.R. 2740 ). The Rules Committee made available the legislative text that included the five appropriations bills and directed Members to draft their amendments to that text (House Rules Committee Print 116-17). Proposed amendments were due to the committee by 10:00 a.m. on Friday, June 7, 2019. A total of 41 draft amendments were submitted related to legislative branch appropriations (Division B). Following reported discussions related to the automatic Member pay adjustment, the resolution reported from the House Rules Committee further altered the version of H.R. 2740 that would be considered by the House, removing the text of the legislative branch appropriations bill. The legislative branch appropriations bill neither funds nor adjusts Member salaries. Provisions prohibiting the automatic Member pay adjustment are sometimes included in the annual appropriations bills. A provision prohibiting the automatic Member pay adjustments could be included in any bill, or be introduced as a separate bill. H.R. 2740 , the Labor, Health and Human Services, Education, Defense, State, Foreign Operations, and Energy and Water Development Appropriations Act, 2020, was ultimately agreed to in the House on June 19, 2019, without the legislative branch appropriations funding. On September 26, the Senate Appropriations Committee met to mark up its version of the FY2020 legislative branch appropriations bill. It reported the bill on the same day (by recorded vote, 31-0; S. 2581 , S.Rept. 116-124 ). S. 2581 would have provided $3.600 billion, not including House items, an increase of $187.6 million (+5.5%) from the comparable FY2019 enacted level. Prior to the start of FY2020 on October 1, 2019, a continuing appropriations resolution (CR) providing funding for legislative branch activities through November 21, 2019, was enacted ( P.L. 116-59 , September 27). Another CR, providing funding through December 20, 2019, was enacted on November 21, 2019 ( P.L. 116-69 ). The Further Consolidated Appropriations Act ( P.L. 116-94 ) was enacted on December 20, 2019. The act provides $5.049 billion for legislative branch activities for FY2020 in Division E (+$202.8 million, or +4.2%, from the FY2019 level). In addition, Division P (Other Matter) contains titles related to the legislative branch, including Title XIVâLibrary of Congress Technical Corrections . This title includes amendments related to the American Folklife Preservation Act; the National Library Service for the Blind and Print Disabled; establishing a uniform pay scale for Library of Congress Career Senior Executive Positions; and removing a cap on personnel for the Copyright Royalty Judges Program. Title XVâSenate Entities . This title includes amendments to 2 U.S.C. Â§6567 (\"Funds for Secretary of Senate to assist in proper discharge within United States of responsibilities to foreign parliamentary groups or other foreign officials\") and 2 U.S.C. Â§6616 (\"Support services for Senate during emergency; memorandum of understanding with an executive agency\"). Title XVIâLegislative Branch Inspectors General Independence . This title focuses on the Inspectors General for the Library of Congress, the Office of the Architect of the Capitol, and the Government Publishing Office. It includes sections on pay, limits on bonuses, counsel, and authorities; law enforcement authority; budgetary independence; and hiring authority. Title XVIIâManaging Political Fund Activity . This title states that the \"Majority Leader and the Minority Leader may each designate up to 2 employees of their respective leadership office staff as designees referred to in the second sentence of paragraph 1 of rule XLI of the Standing Rules of the Senate.\" The percentage of total discretionary budget authority provided to the legislative branch has remained relatively stable at approximately 0.4% since at least FY1976. The maximum level (0.48%) was in FY1995, and the minimum (0.31%) was in FY2009. FY2019 funding was provided in Division B of the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019 ( P.L. 115-244 ), which was enacted on September 21, 2018. The $4.836 billion provided for the legislative branch represents an increase of $136.0 million (+2.9%) from the FY2018 enacted level. An additional $10.0 million in FY2019 supplemental appropriations for GAO \"for audits and investigations related to Hurricanes Florence, Lane, and Michael, Typhoons Yutu and Mangkhut, the calendar year 2018 wildfires, earthquakes, and volcano eruptions, and other disasters declared pursuant to the Robert T. Stafford Disaster Relief and Emergency Assistance Act\" was included in two bills considered in the 116 th Congress: H.R. 268 , which passed the House on January 16, 2019, but cloture was not invoked in the Senate; and H.R. 2157 , which passed the House on May 10 (Roll no. 202) and the Senate (with an amendment) on May 23, 2019 (Record Vote Number: 129). H.R. 2157 was enacted June 6, 2019 ( P.L. 116-20 ). FY2018 funding was provided in Division I of the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), which was enacted on March 23, 2018. The $4.700 billion provided by the act represented an increase of $260.0 million (+5.9%) from the FY2017 enacted level. In addition, P.L. 115-123 , enacted February 9, 2018, provided $14.0 million to GAO \"for audits and investigations relating to Hurricanes Harvey, Irma, and Maria and the 2017 wildfires.\" (Title IX of Division B). FY2017 funding was provided in Division I of the Consolidated Appropriations Act, 2017 ( P.L. 115-31 ), which was enacted on May 5, 2017. The $4.440 billion provided by the act represented a $77.0 million increase (+1.7%) from the FY2016 enacted level. FY2016 funding was provided in Division I of the Consolidated Appropriations Act, 2016 ( P.L. 114-113 ), which was enacted on December 18, 2015. The $4.363 billion provided by the act represented a $63.0 million increase (+1.5%) from the FY2015 enacted level. FY2015 funding was provided in Division H of the Consolidated and Further Continuing Appropriations Act, 2015 ( P.L. 113-235 ), which was enacted on December 16, 2014. The $4.300 billion provided by the act represented an increase of $41.7 million (+1.0%) from FY2014. Neither a legislative branch appropriations bill nor a continuing resolution (CR) containing FY2014 funding was enacted prior to the beginning of the fiscal year on October 1, 2013. A funding gap, which resulted in a partial government shutdown, ensued for 16 days. The funding gap was terminated by the enactment of a CR ( P.L. 113-46 ) on October 17, 2013. The CR provided funding through January 15, 2014. Following enactment of a CR on January 15, 2014 ( P.L. 113-73 ), a consolidated appropriations bill was enacted on January 17 ( P.L. 113-76 ), providing $4.259 billion for the legislative branch for FY2014. FY2013 funding of approximately $4.061 billion was provided by P.L. 113-6 , which was signed into law on March 26, 2013. The act funded legislative branch accounts at the FY2012 enacted level, with some exceptions (also known as \"anomalies\"), not including across-the-board rescissions required by Section 3004 of P.L. 113-6 . Section 3004 was intended to eliminate any amount by which the new budget authority provided in the act exceeded the FY2013 discretionary spending limits in Section 251(c)(2) of the Balanced Budget and Emergency Deficit Control Act, as amended by the Budget Control Act of 2011 ( P.L. 112-25 ) and the American Taxpayer Relief Act of 2012 ( P.L. 112-240 ). Subsequent to the enactment of P.L. 113-6 , OMB calculated that additional rescissions of 0.032% of security budget authority and 0.2% of nonsecurity budget authority would be required. The act did not alter the sequestration reductions implemented on March 1, which reduced most legislative branch accounts by 5.0%. The accompanying OMB report indicated a dollar amount of budget authority to be canceled in each account containing nonexempt funds. Division G of the FY2012 Consolidated Appropriations Act ( P.L. 112-74 ) provided $4.307 billion for the legislative branch. This level was $236.9 million below (-5.2%) the FY2011 enacted level. P.L. 112-10 provided $4.543 billion for legislative branch operations in FY2011. This level represented a $125.1 million decrease (-2.7%) from the $4.668 billion provided in the FY2010 Legislative Branch Appropriations Act ( P.L. 111-68 ) and the FY2010 Supplemental Appropriations Act ( P.L. 111-212 ). The FY2009 Omnibus Appropriations Act provided $4.402 billion. In FY2009, an additional $25.0 million was provided for GAO in the American Recovery and Reinvestment Act of 2009. P.L. 111-32 , the FY2009 Supplemental Appropriations Act, also contained funding for a new Capitol Police radio system ($71.6 million) and additional funding for the Congressional Budget Office (CBO) ($2.0 million). As seen in Table 3 , legislative branch funding decreased each year from FY2010 through FY2013. Funding did not exceed the FY2010 level until FY2018. Figure 1 shows the same information graphically, while also demonstrating the division of budget authority across the legislative branch in FY2019. Figure 2 shows the timing of legislative branch appropriations actions, including the issuance of House and Senate reports, bill passage, and enactment, from FY1996 through FY2020. It shows that fiscal year funding for the legislative branch has been determined on or before October 1 six times during this period (FY1997, FY2000, FY2004, FY2006, FY2010, and FY2019); twice during the first month of the fiscal year (FY1998 and FY1999); twice in November (FY1996 and FY2002); seven times in December (FY2001, FY2005, FY2008, FY2012, FY2015, FY2016, and FY2020); and eight times in the next calendar year (FY2003, FY2007, FY2009, FY2011, FY2013, FY2014, FY2017, and FY2018). FY2017 funding, enacted on May 5, 2017, represented the latest date of enactment during this period. The following sections discuss the various legislative branch accounts. During consideration of the legislative branch bills, the House and Senate conform to a \"longstanding practice under which each body of Congress determines its own housekeeping requirements and the other concurs without intervention.\" The Senate requested $1.046 billion for FY2020, an 11.9% increase over the $934.8 million provided in FY2019. The Senate-reported bill recommended, and the FY2020 act provides, $969.4 million (+$34.6 million, +3.7%). Additional information on the Senate account is presented in Table 6 . Appropriations for Senate committees are contained in two accounts. 1. The inquiries and investigations account contains funds for all Senate committees except Appropriations. The FY2019 level of $133.3 million was continued in the FY2020 request, the Senate-reported bill, and the FY2020 act. 2. The Committee on Appropriations account contains funds for the Senate Appropriations Committee. The FY2020 enacted level of $15.8 million, which is equivalent to the Senate-requested and -reported level, represents an increase of $297,000 (+1.9%) from the $15.5 million provided in FY2019. The Senators' Official Personnel and Office Expense Account provides each Senator with funds to administer an office. It consists of an administrative and clerical assistance allowance, a legislative assistance allowance, and an official office expense allowance. The funds may be used for any category of expenses, subject to limitations on official mail. The Senate requested $531.1 million, $102.1 million above (+23.8%) the $429.0 million provided in FY2019. Of this amount, $5.0 million is provided for compensating Senate interns. The Senate-reported bill recommended, and the FY2020 act provides, $449.0 million, an increase of $20.0 million (+4.7%). S. 2581 included two administrative provisions: 1. One provision, which was first included in FY2016, would require amounts remaining in the Senators' Official Personnel and Expense Account (SOPOEA) to be used for deficit reduction or to reduce the federal debt. This provision was included in P.L. 116-94 . 2. One provision would continue the freeze on Member salaries at the 2009 level. Member salaries are funded in a permanent appropriations account, and the legislative branch bill does not contain language funding or increasing Member pay. A provision prohibiting the automatic Member pay adjustments could be included in any bill, or be introduced as a separate bill. This provision was included in Section 7 of P.L. 116-94 . The House requested $1.356 billion for FY2020, an increase of 10.1% over the $1.232 billion provided for FY2019. The FY2020 act provides $1.366 billion, an increase of 10.8%. Additional information on headings in the House of Representatives account is presented in Table 7 . Funding for House committees is contained in the appropriation heading \"committee employees,\" which typically comprises two subheadings. The first subheading contains funds for personnel and nonpersonnel expenses of House committees, except the Appropriations Committee, as authorized by the House in a committee expense resolution. The House requested $139.1 million, an increase of $11.2 million (+8.8%) from the FY2019 enacted level of $127.9 million. The House-reported bill recommended, and the FY2020 act provides, $135.4 million, an increase of $7.5 million (+5.8%). The second subheading contains funds for the personnel and nonpersonnel expenses of the Committee on Appropriations. The House requested $25.4 million, an increase of $2.3 million (+10.0%) from the FY2019 enacted level of $23.1 million. The House-reported bill recommended, and the FY2020 act provides, $24.3 million, an increase of $1.2 million (+5.0%). The Members' Representational Allowance (MRA) is available to support Members in their official and representational duties. The House-requested level of $613.0 million represents an increase of $39.4 million (+6.9%) from the $573.6 million provided in FY2019. The House-reported bill recommended, and the FY2020 act provides, $615.0 million, an increase of $41.4 million (+7.2%). A separate account, included in the House-reported bill and the FY2020 act, contains $11.0 million for interns in House Member offices, and $365,000 for interns in House leadership offices. The House requested several administrative provisions related to unexpended balances from the MRA; limiting amounts available from the MRA for leased vehicles; providing additional transfer authority; establishing the allowance for compensation of interns in Member offices; providing for cybersecurity assistance from other federal entities; limiting or prohibiting the delivery of the printed B udget of the United States , the Federal Register , and the House telephone directory; allowing the use of expired funds for the payment of death gratuities for House employees; and allowing the use of expired funds for the employee compensation fund and unemployment compensation. The House-reported bill contained the provisions related to the unexpended MRA balances, leased vehicles, cybersecurity assistance, and use of expired funds. In addition, the House-reported bill included provisions relating to the compensation of interns in Member and Leadership offices; rescinding amounts in the Stationery and Page Dorm revolving funds; and providing for reduction in the amount of tuition charged for children of House Child Care Center employees. P.L. 116-94 includes the provisions from the House-reported bill. The USCP is responsible for the security of the Capitol Complex, including, for example, the U.S. Capitol, the House and Senate office buildings, the U.S. Botanic Garden, and the Library of Congress buildings and adjacent grounds. The FY2019 enacted level was $456.3 million. In comparison, levels considered for FY2020 include the following: Requested: $463.3 million (+1.5%) House-reported: $463.3 million (+1.5%) Senate-reported: $464.3 million (+1.8%) Enacted: $464.3 million (+1.8%) Additional information on the USCP is presented in Table 8 . Appropriations for the police are contained in two accountsâa salaries account and a general expenses account. 1. Salariesâthe FY2019 act provided $374.8 million for salaries. The USCP requested, and the House-reported bill would have provided, $378.1 million (+0.9%). The Senate-reported bill recommended, and the FY2020 act provides, $379.1 million (+1.1%). 2. General expensesâthe FY2019 act provided $81.5 million for general expenses. The USCP-requested level of $85.3 million (+4.6%) was contained in the House-reported and Senate-reported bills and the FY2020 act. Another appropriation relating to the USCP appears within the Architect of the Capitol account for Capitol Police buildings and grounds. The FY2019 level was $57.7 million. The USCP requested $54.97 million (-4.8%); the House-reported bill would have provided $52.8 million (-8.4%); the Senate-reported bill would have provided $50.3 million (-12.8%); and the FY2020 act provides $55.2 million (-4.3%). The USCP requested, and the House-reported bill and P.L. 116-94 contain, an administrative provision increasing the total limit on student loan repayments from $40,000 to $60,000. The Senate-reported bill did not include this provision. Formerly known as the Office of Compliance, the Office of Congressional Workplace Rights (OCWR) was renamed by the Congressional Accountability Act of 1995 Reform Act ( P.L. 115-397 ). It is an independent and nonpartisan agency within the legislative branch, and it was originally established to administer and enforce the Congressional Accountability Act of 1995. The act applies various employment and workplace safety laws to Congress and certain legislative branch entities. The FY2019 enacted level was $6.3 million, which was continued in the FY2020 request, the House-reported and Senate-reported versions of the bill, and the FY2020 act. CBO is a nonpartisan congressional agency created to provide objective economic and budgetary analysis to Congress. CBO cost estimates are required for any measure reported by a regular or conference committee that may affect revenues or expenditures. The FY2019 level was $50.7 million. In comparison, levels considered for FY2020 include the following: Requested: $53.6 million (+5.6%) House-reported: $52.7 million (+3.8%) Senate-reported: $54.9 million (+8.3%) Enacted: $54.9 million (+8.3%) Since the closure of OTA, which was a legislative branch agency established in 1972 and last funded in FY1996, Congress has periodically reexamined funding for scientific and technological studies by the legislative branch. Some Members have expressed support for the refunding of OTA through the distribution of \"Dear Colleague\" letters, at committee hearings and in committee prints, and through the introduction of legislation or amendments. Since FY2002, funding for technology assessments has also been provided to GAO, with frequent references in appropriations and conference reports on the legislative branch appropriations bills. More recently, and in response to language in the FY2019 Senate and conference reports, GAO announced the formation of a new Science, Technology Assessment, and Analytics Team on January 29, 2019. Additionally, the conference report to accompany the FY2019 legislative branch appropriations bill ( H.R. 5895 ) required a study on technology assessments available to Congress: Technology Assessment Study: The Committees have heard testimony on, and received dozens of requests advocating for restoring funding to the Office of Technology Assessment, and more generally on how Congress equips itself with the deep technical advice necessary to understand and tackle the growing number of science and technology policy challenges facing our country. The conferees direct the Congressional Research Service (CRS) to engage with the National Academy of Public Administration or a similar external entity to produce a report detailing the current resources available to Members of Congress within the Legislative Branch regarding science and technology policy, including the GAO. This study should also assess the potential need within the Legislative Branch to create a separate entity charged with the mission of providing nonpartisan advice on issues of science and technology. Furthermore, the study should also address if the creation of such entity duplicates services already available to Members of Congress. CRS should work with the Committees in developing the parameters of the study and once complete, the study should be made available to relevant oversight Committees. The FY2020 House-reported bill would have provided $6.0 million for restarting OTA. The funding would remain available through FY2021. H.Rept. 116-64 further stated the following: To do its job in this modern era, Congress needs to understand and address the issues and risks resulting from a wide range of rapid technological developments such as cryptocurrencies, autonomous vehicles, gene editing, artificial intelligence, and the ever-expanding use of social media platforms, to give just a few examples. A re-opened OTA will play an important role in providing accurate, professional, and unbiased information about technological developments and policy options for addressing the issues those developments raise. In that role, OTA will complement the work of the Government Accountability Office in the area of science and technology.... Since the de-funding of OTA in 1995, there have been several unsuccessful attempts to restore the office. During that time, it has become increasingly clear that Congress does not have adequate resources available for the in-depth, high level analysis of fast-breaking technology developments and their public policy implications that was formerly provided by OTA. While the Government Accountability Office (GAO) has increased its technology assessment activities attempting to fill that gap, the structure and culture of GAO somewhat constrain its ability to replicate OTA. The Office's governance by a bipartisan board and its ability to tap outside expert resources and rely on a Technology Assessment Advisory Council provide the capacity to offer policy recommendation options to Congress, which are not available from other Congressional sources. The Senate-reported bill would not restart OTA, but S.Rept. 116-124 states that the Committee looks forward to reviewing the recommendations of the National Academy of Public Administration study currently underway, including the evaluation of options available to Congress in the area of science and technology. The Committee will continue to engage key authorizing committees and interested members as these discussions continue. S.Rept. 116-124 also addresses the role of the new GAO Science, Technology Assessment, and Analytics Team (STAA), stating In consultation with internal and external stakeholders, academic and nonprofit organizations, and Members of Congress, the STAA team submitted its plan for staffing needs, resources, areas of expertise, and the products and services that the team will provide or are currently providing to Congress. The plan demonstrates STAA's value and ability to assess upcoming technological and digital innovations. Presently, the STAA is providing Congress with technology assessments, technical assistance, and reports in the areas of oversight of Federal technology and science programs, as well as best practices in engineering sciences and cybersecurity. The Committee applauds the efforts of GAO's STAA team and encourages STAA to continue providing Congress with unbiased explanatory data while also exploring new areas for independent science and technology guidance, relevant to Congress. The National Academy of Public Administration (NAPA) study was released on November 14, 2019. It examined three options: Option 1âEnhancing Existing Entities Option 2âCreating a New Agency Option 3âEnhance Existing Entities and Create an Advisory Office NAPA recommended enhancing technology assessment capabilities of both CRS and GAO, while also establishing (1) an Office of the Congressional Science and Technology Advisorâled by an appointee of the House and Senate leadership and assisted by a small staffâand (2) a Congressional Science and Technology Coordinating Councilâchaired by the Congressional Science and Technology Advisorâto enhance coordination between GAO and CRS. The FY2020 act did not provide funding for restarting OTA. Rather, the explanatory statement accompanying H.R. 1865 stated the following: Science and Technology Needs in Congress : The report released on November 14, 2019, by the National Academy of Public Administration (NAPA) identified the existing gaps in science and technology expertise and resources available to Congress. The Committees, Members, stakeholders and other committees of jurisdiction working together will continue to evaluate the recommendations in the report to address this gap.... Science and Technology Issues : The funding provided will allow GAO to increase support for Congress' work on evolving science and technology issues. The 2019 report from the National Academy of Public Administration (NAPA) identified the need for GAO to focus its advice to Congress on technical assessments and short-to-medium term studies. The study also highlighted that although GAO's support requests from Congress have increased, GAO should consider expanding its outreach to the science and technology community and coordination with CRS to better fill these gaps. GAO is encouraged to dedicate a specific number of experts to work exclusively on GAO's Science, Technology Assessment, and Analytics (STAA) team that was created in January 2019, a recommendation that was included in the NAPA report. The Architect of the Capitol (AOC) is responsible for the maintenance, operation, development, and preservation of the U.S. Capitol Complex, which includes the Capitol and its grounds, House and Senate office buildings, Library of Congress buildings and grounds, Capitol Power Plant, Botanic Garden, Capitol Visitor Center, and USCP buildings and grounds. The AOC is responsible for the Supreme Court buildings and grounds, but appropriations for their expenses are not contained in the legislative branch appropriations bill. The FY2019 level was $733.7 million. In comparison, levels considered for FY2020 include the following: Requested: $831.7 million (+13.3%) House-reported: $624.7 million (-2.4%, not including Senate-items) Senate-reported: $585.8 million (+9.2%, not including House-items) Enacted: $695.9 million (-5.2%) Operations of the AOC are funded in the following 10 accounts: capital construction and operations, Capitol building, Capitol grounds, Senate office buildings, House office buildings, Capitol Power Plant, Library buildings and grounds, Capitol Police buildings and grounds, Capitol Visitor Center, and Botanic Garden. Additional funding information on the individual AOC accounts is presented in Table 9 . The AOC also requested one administrative provision that prohibits the use of funds for bonuses for contractors behind schedule or over budget. This provision has been included in the annual appropriations acts since FY2015. The House-reported version of the provision would apply to FY2020 and each succeeding fiscal year. The Senate-reported bill included the annual provision, which was included in P.L. 116-94 . The LOC serves simultaneously as Congress's parliamentary library and the de facto national library of the United States. Its broader services to the nation include the acquisition, maintenance, and preservation of a collection of more than 167 million items in various formats; hosting nearly 1.9 million visitors annually; service to the general public and scholarly and library communities; administration of U.S. copyright laws by its Copyright Office; and administration of a national program to provide reading material to the blind and physically handicapped. Its direct services to Congress include the provision of legal research and law-related services by the Law Library of Congress, and a broad range of activities by CRS, including in-depth and nonpartisan public policy research, analysis, and legislative assistance for Members and committees and their staff; congressional staff training; information and statistics retrieval; and continuing legal education for Members of both chambers and congressional staff. The FY2019 level was $696.1 million. In comparison, levels considered for FY2020 include the following: Requested: $747.1 million (+7.3%) House-reported: $720.3 million (+3.5%) Senate-reported: $735.8 million (+5.7%) Enacted: $725.4 million (+4.2%) These figures do not include additional authority to spend receipts. The House Appropriations Committee report ( H.Rept. 116-64 ) explains a change in the technology funding practice that affected the four LOC appropriations headings: Appropriations Shifts to Reflect Centralized Funding for Information Technology : During fiscal year 2018, in an effort to reduce duplication, increase efficiency, and better utilize specialized expertise, the Library of Congress began providing more Information Technology (IT) services centrally though its Office of the Chief Information Officer (OCIO) rather than in the Library's various component organizations. In fiscal years 2018 and 2019, Library components which have separate appropriations accounts reimbursed the main Library of Congress Salaries and Expenses account through intra-agency agreements for the IT services being provided to them centrally by the OCIO under this initiative. For fiscal year 2020, however, the Library has requested that funding for centralized IT services be appropriated directly to the main Salaries and Expenses account for use by the OCIO instead of to the component organizations receiving the services, in order to reflect where services are actually being performed and avoid the need for repeated reimbursement transactions. The Committee has agreed to this request. As a result, the Committee bill reflects a shift in appropriations totaling $13,556,000 to the Library of Congress Salaries and Expenses account, with $2,708,000 of that shift coming from the Copyright Office, $8,767,000 coming from the Congressional Research Service, and $2,081,000 coming from the National Library Service for the Blind and Physically Handicapped. H.Rept. 116-64 further contains a \"note regarding IT centralization\" accompanying each heading, comparing the FY2020 House-reported level to the FY2019 enacted level after accounting for this shift. The Senate Appropriations Committee report ( S.Rept. 116-124 ) similarly addressed the centralization, stating the following: The recommendation for this account also reflects a shift in appropriations associated with the centralization of information technology [IT] funding from across the Library into the Office of Chief Information Officer [OCIO]. A total of $13,556,000 will move to the OCIO in fiscal year 2020, reflecting the cost of IT activities that were funded previously within the Congressional Research Service, Copyright Office, and the National Library Service for the Blind and Physically Handicapped. The realignment of these funds will help facilitate the final phases of IT centralization across the Library. The Committee expects the Library to provide a detailed spend plan, including any increase in FTE levels for the IT modernization intended to be addressed with the funds provided in fiscal year 2020. The LOC headings include the following: 1. Salaries and expenses âThe FY2019 level was $474.1 million. The LOC requested $522.6 million (+10.2%). The House-reported bill would have provided $501.3 million, an increase of $13.7 million when reflecting the centralized IT funding, according to H.Rept. 116-64 . The Senate-reported bill would have provided $514.6 million. The FY2020 act provides $504.2 million. These figures do not include authority to spend receipts ($6.0 million in the FY2019 act, the FY2020 request, the House-reported and Senate-reported bills, and the FY2020 act). 2. Copyright Office âThe FY2019 level was $43.6 million. The LOC requested $43.3 million (-0.7%). The House-reported bill would have provided $42.15 million, an increase of $1.3 million when reflecting the centralized IT funding, according to H.Rept. 116-64 . The Senate-reported bill recommended, and the FY2020 act provides, $42.14 million. These figures do not include authority to spend receipts and prior year unobligated balances ($49.8 million in FY2019; $49.7 million in the FY2020 request, the House-reported and Senate-reported bills, and the FY2020 act). 3. Congressional Research Service âThe FY2019 level was $125.7 million. The FY2020 request contains $121.6 million (-3.3%). The House-reported bill would have provided $119.9 million, an increase of $2.99 million when reflecting the centralized IT funding, according to H.Rept. 116-64 . The Senate-reported bill recommended, and the FY2020 act provides, $120.5 million. 4. Books for the b lind and p hysically h andicapped âThe FY2019 level was $52.8 million. The LOC requested $59.6 million (+13.0%). The House-reported bill would have provided $56.9 million, an increase of $6.2 million when reflecting the centralized IT funding, according to H.Rept. 116-64 . The Senate-reported bill recommended, and the FY2020 act provides, $58.6 million. The AOC's budget also contains funds for LOC buildings and grounds. In FY2019, $68.5 million was provided. The FY2020 request contains $121.3 million (+77.1%), the House-reported bill would have provided $86.8 million (+26.7%), the Senate-reported bill would have provided $63.6 million (-7.1%), and the FY2020 act provides $55.7 million (-18.6%). The LOC received authority to obligate funds for reimbursable and revolving fund activities ($194.6 million in the FY2019 act; $231.98 million in the FY2020 request , the House-reported and Senate-reported versions of the bill, and the FY2020 act). The FY2019 enacted level of $117.0 million was continued in the FY2020 request, the House-reported and Senate-reported versions of the bill, and the FY2020 act. This level is approximately equivalent (-0.1%) to the level provided in FY2018 and FY2017. GPO's budget authority is contained in three accounts, with the allocation in the FY2020 request and bills varying slightly from the FY2019 enacted level: 1. Congressional publishingâThe FY2019 enacted level of $79.0 million is continued in the FY2020 request, the House-reported and Senate-reported versions of the bill, and the FY2020 act. 2. Public information programs of the Superintendent of Documents (salaries and expenses)âThe FY2020 requested, House-reported, Senate-reported, and enacted level of $31.3 million is $704,000 (-2.2%) less than the FY2019 enacted level of $32.0 million. 3. GPO Business Operations Revolving Fund âThe FY2020 requested, House-reported, Senate-reported, and enacted level of $6.7 million is $704,000 above the FY2019 enacted level of $6.0 million. GAO responds to requests for studies of federal government programs and expenditures. GAO may also initiate its own work. The FY2019 enacted level was $589.8 million. In comparison, levels considered for FY2020 include the following: Requested: $647.6 million (+9.8%). House-reported: $615.6 million (+4.4%) Senate-reported: $639.4 million (+8.4%) Enacted: $630.0 million (+6.8%) These levels do not include offsetting collections ($35.9 million in the FY2019 act; $24.8 million in the FY2020 request, the House-reported and Senate-reported versions of the bill, and the FY2020 act). Open World requested, and the House-reported bill would have provided, $5.8 million for FY2020, an increase of $200,000 (+3.6%) from the $5.6 million provided each year since FY2016. The Senate-reported bill recommended, and the FY2020 act provides $5.9 million, an increase of $300,000 (+5.4%). The Open World Leadership Center administers a program that supports democratic changes in other countries by inviting their leaders to observe democracy and free enterprise in the United States. Congress first authorized the program in 1999 to support the relationship between Russia and the United States. The program encouraged young federal and local Russian leaders to visit the United States and observe its government and society. Established at the LOC as the Center for Russian Leadership Development in 2000, the center was renamed the Open World Leadership Center in 2003, when the program was expanded to include specified additional countries. In 2004, Congress further extended the program's eligibility to other countries designated by the center's board of trustees, subject to congressional consideration. The center is housed in the LOC and receives services from the LOC through an interagency agreement. The legislative branch bills have included a provision since FY2016, also contained in the FY2020 act: That funds made available to support Russian participants shall only be used for those engaging in free market development, humanitarian activities, and civic engagement, and shall not be used for officials of the central government of Russia. The location and future of Open World, attempts to assess its effectiveness, and its inclusion in the legislative branch budget have been discussed at appropriations hearings and in report language for more than a decade. The funding level for Open World has also varied greatly during this period. For additional discussion, see the \"Prior Year Discussion of Location and Funding of Open World\" section in CRS Report R44899, Legislative Branch: FY2018 Appropriations , by Ida A. Brudnick. The center was created by Congress in 1988 to encourage public service by congressional staff through training and development programs. The FY2020 request, the House- and Senate- reported versions of the bill, and the FY2020 act contain $430,000, which is approximately the same level provided annually since FY2006. As in past years, Congress considered a number of general provisions related to the legislative branch. These provisions and their status are listed in Table 4 . Table 5 through Table 9 provide information on funding levels for the legislative branch overall, the Senate, the House of Representatives, the USCP, and the AOC. The tables are followed by an Appendix , which lists House, Senate, and conference bills and reports; public law numbers; and enactment dates since FY1998.", "summary": "The legislative branch appropriations bill provides funding for the Senate; House of Representatives; Joint Items; Capitol Police; Office of Congressional Workplace Rights (formerly Office of Compliance); Congressional Budget Office (CBO); Architect of the Capitol (AOC); Library of Congress (LOC), including the Congressional Research Service (CRS); Government Publishing Office (GPO); Government Accountability Office (GAO); Open World Leadership Center; and the John C. Stennis Center. The legislative branch budget request was submitted on March 11, 2019. Following hearings in the House and Senate in February, March, and April, the House Appropriations Committee Subcommittee on the Legislative Branch held a markup on May 1, 2019. No amendments were considered, and the bill was ordered reported to the full committee by voice vote. On May 9, 2019, the House Appropriations Committee held a markup of the bill. Two manager's amendments were considered. The first amendment was adopted by voice vote. The second amendment was adopted by voice vote after an amendment to the amendment was not adopted (23-28). The bill was ordered reported ( H.Rept. 116-64 ; H.R. 2779 ). As amended, the bill would have provided $3.972 billion, not including Senate items (+$164.2 million). On June 3, the House Committee on Rules announced its intention to consider and report a resolution that would structure the consideration in the House of H.R. 2740 , the Labor, Health and Human Services, and Education appropriations bill. The committee indicated that the resolution would add the text of four additional appropriations bills to the text of H.R. 2740 , including the text of H.R. 2779 as Division B. Although draft amendments were submitted related to legislative branch appropriations, that division was stricken prior to consideration of H.R. 2740 on the House floor. On September 26, the Senate Appropriations Committee met to mark up its version of the FY2020 legislative branch appropriations bill. It reported the bill on the same day by recorded vote (31-0). S. 2581 ( S.Rept. 116-124 ) would have provided $3.600 billion, not including House items (+$187.6 million). Continuing appropriations resolutions ( P.L. 116-59 and P.L. 116-69 ) provided funding for legislative branch activities until the enactment of P.L. 116-94 on December 20, 2019. Division E provides $5.049 billion (+$202.8 million, or +4.2%, from the FY2019 level). Additional language related to the legislative branch was included in Division P. During consideration of the FY2020 funding levels, Congress also considered $10.0 million in FY2019 supplemental appropriations for GAO for audits and investigations related to storms and disasters ( P.L. 116-20 , enacted June 6, 2019). Previously, over the last decade The FY2019 level of $4.836 billion represented an increase of $136.0 million (+2.9%) from FY2018, not including the FY2019 supplemental. The FY2018 level of $4.700 billion represented an increase of $260.0 million (+5.9%) from FY2017. The FY2017 level of $4.440 billion represented increase of $77.0 million (+1.7%) from FY2016. The FY2016 level of $4.363 billion represented an increase of $63.0 million (+1.5%) from FY2015. The FY2015 level of $4.300 billion represented an increase of $41.7 million (+1.0%) from FY2014. The FY2014 level of $4.259 billion represented an increase of $198 million (+4.9%) from FY2013. The FY2013 level of $4.061 billion represented a decrease of $246 million (-5.6%), including the sequestration and rescission, from FY2012. The FY2012 level of $4.307 billion represented a decrease of $236.9 million (-5.2%) from FY2011. The FY2011 level of $4.543 billion represented a decrease of $125.1 million (-2.7%) from the $4.669 billion provided for FY2010. The smallest of the appropriations bills, the legislative branch bill comprises approximately 0.4% of total discretionary budget authority.", "document_type": "crs"}
{"report": "The Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ) was passed by Congress and signed into law by President Donald Trump on March 27, 2020. The CARES Act provides over $2 trillion in relief to individuals; businesses; state, local, and federal agencies; and industry sectors impacted by the COVID-19 pandemic and the government-led effort to limit its public health impact. Given the scope of the relief provided, the variety of new and existing programs that are to provide this aid, and the number of individuals and entities receiving aid, the administration of the CARES Act is likely to be a complicated and significant undertaking by executive branch agencies and non-federal partners. These complexities may be made even greater by both pressure to provide relief as swiftly as possible and unique logistical challenges posed by the ongoing public health emergency. All of those factors make Congress's oversight role during the COVID-19 pandemic especially important and may make it more difficult for Congress to conduct timely oversight. Congress included a variety of oversight mechanisms in the CARES Act. In addition to requiring executive branch officers to submit reports on a variety of topics, provide notice before taking specified actions, and testify before certain committees, the CARES Act provides additional resources to the Government Accountability Office (GAO) and to Offices of Inspectors General (OIGs) that may have additional audit and investigative activity due to the CARES Act. In addition, the CARES Act creates three new oversight entities: a Congressional Oversight Commission, a Special Inspector General for Pandemic Recovery (SIGPR), and the Pandemic Recovery Accountability Committee (PRAC, a group of inspectors general). Each of those entities is empowered to provide oversight of significant aspects of the CARES Act. This report is a reference guide for congressional clients interested in understanding the congressional oversight tools built into the CARES Act. Oversight provisions are broadly organized into sections related to the nature of the oversight mechanism. Within each of these sections, agencies and entities are listed in alphabetical order. To the extent practicable, sections include citations to the CARES Act and to any other relevant laws and regulations. This report identifies selected provisions in the CARES Act that may facilitate Congress's ability to provide oversight of its implementation. Congress's authority to oversee the executive branch extends beyond these explicit requirements and includes many additional tools and requirements. The fact that many provisions of the CARES Act do not have explicit reporting requirements or other more formal oversight mechanisms does not prevent Congress from engaging in oversight activities related to those programs by seeking information from the executive branch, engaging with stakeholders, holding hearings, and using legislation to direct activities with specificity. Requirements on agencies and entities are usually described in this report generally, with minimal discussion of detailed content requirements. The same is true for descriptions of new and altered programs. To the extent practicable, the text and footnotes of the report provide citations to the appropriate provisions of both the CARES Act and existing law to facilitate a more detailed review. The report captures those oversight tools that pertain to inspectors general (who already have obligations to report to Congress in the Inspector General Act of 1978 ) and provisions that explicitly provide for congressional involvement. For instance, the CARES Act requires certain agencies to make information publicly available but does not explicitly direct that this information be submitted to Congress or its committees. Such provisions are not identified in this report but may nevertheless be referred to in practice as congressional reporting requirements. Provisions included in the CARES Act may trigger reporting of information under other statutes. Interactions between the CARES Act and current law are not covered in this report. The CARES Act contains a number of oversight provisions. These include: the creation of a congressionally appointed oversight commission established in the legislative branch; provisions related to inspectors general, including the establishment of SIGPR, the PRAC within the Council of the Inspectors General on Integrity and Efficiency (CIGIE), and supplemental appropriations and additional duties provided for inspectors general across multiple agencies; additional funding and responsibilities provided to GAO; and requirements for agencies and entities and their leadership to provide reports to, consult with, provide notice to, and testify before Congress and its committees regarding a range of subjects. Each aforementioned category is discussed in greater detail below. Section 4020 establishes a legislative branch entity called the Congressional Oversight Commission to conduct oversight of the Department of the Treasury and Federal Reserve Board's economic relief activities under Title IV, Subtitle A (Coronavirus Economic Stabilization Act of 2020) of the CARES Act. The commission is similar in structure to the Congressional Oversight Panel created to participate in the oversight of the Troubled Asset Relief Program in 2008. The commission is composed of five members selected by the majority and minority leadership of the House and the Senate. The commission is empowered to request staff to be detailed from agencies and departments, hire experts and consultants, conduct hearings, and obtain information from agencies to support its oversight activities. The commission is required to report to Congress on the relevant activities of Treasury and the Federal Reserve Board, the impact of the programs on the financial well-being of the nation, whether required disclosures in the CARES Act provides market transparency, and the effectiveness of the Coronavirus Economic Stabilization Act of 2020 in minimizing costs and maximizing benefits for taxpayers. The first report of the commission is due within 30 days of Treasury and the Federal Reserve Board's first exercise of authority under the act. Additional reports are then due every 30 days thereafter. The commission terminates on September 30, 2025. Section 4018 establishes a Special Inspector General for Pandemic Recovery within the Treasury. The SIGPR is nominated by the President with the advice and consent of the Senate and may be removed from office according to Section 3(b) of the Inspector General Act of 1978. The SIGPR is tasked with conducting audits and investigations of the activities of the Treasury pursuant to the CARES Act, including the collection of detailed information regarding loans provided by Treasury. The SIGPR is empowered to hire staff and enter into contracts and has broadly the same authority and status as inspectors general under the Inspector General Act of 1978. The SIGPR is required to report to the \"appropriate committees of Congress\" within 60 days of Senate confirmation, and quarterly thereafter, on the activities of the office over the preceding three months, including detailed information on Treasury loan programs. The SIGPR terminates five years after the enactment of the CARES Act (i.e., March 27, 2025). Section 4027 appropriates a total of $500 billion to Treasury. Of that amount, Section 4018 directs that $25 million shall be made available to the SIGPR as no-year funds (i.e., funds that are available until expended). Section 15010 establishes the PRAC within the CIGIE. The PRAC is directed to \"promote transparency and conduct and support oversight\" of the government's coronavirus response in order to \"prevent and detect fraud, waste, abuse, and mismanagement\" and \"mitigate major risks that cut across program and agency boundaries.\" In addition, the PRAC is tasked with conducting oversight and audits of the coronavirus response as well as coordinating and supporting related oversight by inspectors general across the federal government. The PRAC is composed of the inspectors general of identified agencies as well as any other inspectors general for agencies involved at the coronavirus response as designated by the chairperson of the council. The CIGIE chairperson designates the PRAC chairperson. In addition, the PRAC is required to appoint an executive director selected in consultation with the majority and minority leadership of the House and the Senate. The PRAC has the same authority to conduct audits and investigations as inspectors general under the Inspector General Act of 1978. The PRAC is required to provide management alerts to the President and Congress on \"management, risk, and funding\" issues that may require immediate attention. The PRAC is also required to report to the President and Congress biannually with a summary of PRAC activity and, to the extent practicable, a quantification of the impact of tax expenditures in the CARES Act. Finally the PRAC is required to provide other reports and periodic updates to Congress as it considers appropriate. In addition, the PRAC is directed to establish and maintain a \"user-friendly, public-facing website to foster greater accountability and transparency in the use of covered funds.\" The PRAC is required to post specified information, including agencies' use of funds provided in the act. The PRAC terminates on September 30, 2025. Section 15003 appropriates $80 million in no-year funds to support the activities of the PRAC. The PRAC's organization and duties have similarities to those of the Recovery Accountability and Transparency Board that was established as part of the American Recovery and Reinvestment Act to conduct oversight of the use of funds in that act. The CARES Act appropriates $148 million for established inspector general offices in addition to the $25 million for the SIGPR and $80 million for the PRAC discussed above. In total, therefore, the CARES Act provides $253 million to the inspector general community to oversee the federal government's coronavirus response. Title I of Division B, under the heading \"Office of the Inspector General,\" provides $750,000 to the Department of Agriculture OIG. The appropriation expires September 30, 2021, and may be used only to oversee funds appropriated to the department under the CARES Act. Title II of Division B, under the heading \"Department of CommerceâEconomic Development Administration,\" provides that of the $1.5 billion appropriated to the Department of Commerce, $3 million is to be transferred to the department's OIG to oversee the use of funds appropriated to the department under the CARES Act. The appropriation expires September 30, 2022. Title III of Division B, under the heading \"Office of the Inspector General,\" provides $20 million for the Department of Defense OIG. This appropriation may be used only to oversee the use of funds appropriated to the department under the CARES Act. Title VII of Division B, under the heading \"Office of the Inspector General,\" provides $7 million to Department of Education OIG. These funds expire on September 30, 2022. This appropriation may be used only to respond to COVID-19 generally and to oversee the use of funds appropriated to the department under the CARES Act. Title VII of Division B, under the heading \"Office of the Secretary,\" requires the Department of Health and Human Services (HHS) OIG to provide a final audit report to the House and Senate Appropriations Committees on payments from $100 billion appropriated to the Public Health and Social Services Emergency Fund to support eligible health care providers with their expenses related to the COVID-19 pandemic. The audit report is due three years after the final payment is made under the program. Section 18113 provides that, of the $27 billion appropriated to the Public Health and Social Services Emergency Fund, up to $4 million shall be transferred to the HHS OIG. Appropriated funds are available until expended and may be used only to oversee the use of funds appropriated to HHS under the CARES Act. In addition, the HHS inspector general is required to consult with the House and Senate Appropriations Committees prior to obligating these funds. Title VI of Division B, under the heading \"Disaster Relief Fund,\" provides a total of $45 billion in no-year funds for the Disaster Relief Fund with the Federal Emergency Management Agency (FEMA). Of the total appropriation, $3 million is to be transferred to the Department of Homeland Security (DHS) OIG to oversee the funds appropriated for the Disaster Relief Fund in the CARES Act. Title XII of Division B, under the heading \"Office of the Inspector General,\" provides $5 million in no-year funds to the Department of Housing and Urban Development OIG. This appropriation may be used only to oversee the use of funds appropriated to the department under the CARES Act. Title VII of Division B, under the heading \"Departmental Offices,\" provides $158.4 million for the Office of the Secretary, Department of the Interior. This appropriation expires September 30, 2021. Of that appropriation, $1 million is to be transferred to the department's OIG to oversee the use of funds appropriated to the department under the CARES Act. Title II of Division B, under the heading \"Office of the Inspector General,\" provides $2 million in no-year funds for the Department of Justice OIG. The appropriation is to be used to oversee funds provided to the department in the CARES Act and the general impact of COVID-19 on the department's activities. Section 2115 provides $25 million for the Department of Labor (DOL) OIG. The appropriation does not expire and may be used only to conduct oversight activity related to provisions in the CARES Act. Title XIII of Division B, under the heading \"Departmental Management,\" appropriates $15 million to respond to COVID-19 generally and to support enforcement of the Families First Coronavirus Response Act ( P.L. 116-127 ). Of that appropriation, $1 million in no-year funds are to be transferred to the DOL OIG. Title XII of Division B, under the heading \"Office of Inspector General,\" provides $5 million in no-year funds to the Department of Transportation OIG. This appropriation may be used only to oversee the use of funds appropriated to the department under the CARES Act. Section 5001 provides $35 million in no-year funds for the Treasury OIG. The appropriation may be used only to conduct oversight and recoupment activities related to the Coronavirus Relief Fund established by Title V of the CARES Act. Section 5001 also requires the Treasury OIG to oversee the Coronavirus Relief Fund established by the section, which provides funding to state, local, and tribal governments. If the Treasury OIG determines that a state, tribal government, or unit of local government fails to comply with the requirements for the program, the section provides for the recoupment of the funds. Section 4113(d) requires the Treasury OIG to conduct audits of certifications related to employee compensation provided by air carriers in order to receive financial assistance under Section 4113(a). Title X of Division B, under the heading \"Office of Inspector General,\" provides $12.5 million for the Department of Veterans Affairs (VA) OIG. These funds expire on September 30, 2022. This appropriation may be used only to oversee the use of funds appropriated to the VA under the CARES Act. Section 1107(a)(3) provides $25 million for the Small Business Administration (SBA) OIG. These funds expire September 30, 2024. Title IX of Division B of the CARES Act, under the heading \"Government Accountability Office,\" appropriates $20 million to GAO to conduct additional oversight and provide Congress with several reports. GAO is required to report to House and Senate Appropriations Committees within 90 days of enactment of the CARES Act with a spending plan for the funds and a timeline for audits and investigations. Healthy Start Program : Section 3225 reauthorizes the Healthy Start Program. The section includes a requirement that GAO \"review, access, and provide recommendations\" on the program within four years of enactment of the CARES Act (i.e., March 27, 2024) and report its findings to the appropriate committees. Nurse Loan Repayment Programs : Section 3404 requires the comptroller general to study \"nurse loan repayment programs\" administered by the Health Resources and Services Administration and report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions, within 18 months of enactment of the CARES Act (i.e., September 27, 2021). Community and Mental Health Services Demonstration Program : Section 3814 extends the end date for the Community Mental Health Services Demonstration Program P.L. 93-288 and directs GAO to provide a report on the program to the House Committee on Energy and Commerce and Senate Committee on Finance. This report is due 18 months after enactment of the CARES Act (i.e., September 27, 2021). Regulation of Over the Counter Drugs : Section 3851 requires GAO to conduct a study on the effectiveness and impact of exclusivity under Sections 505G and 586C of the Federal Food, Drug, and Cosmetic Act. The study is to be submitted to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions within four years of enactment of the CARES Act (i.e., March 27, 2024). Coronavirus Economic Stabilization Act of 2020 : Section 4026(f) directs the comptroller general to conduct a study on \"loans, loan guarantees, and other investments\" made under Section 4003 of the CARES Act and report to the House Committee on Financial Services; the House Committee on Transportation and Infrastructure; the House Committee on Appropriations; the House Committee on the Budget; the Senate Committee on Banking, Housing, and Urban Affairs; the Senate Committee on Commerce, Science, and Transportation; the Senate Committee on Appropriations; and the Senate Committee on the Budget. The initial report under this provision is due nine months after enactment of the CARES Act (i.e., December 27, 2020), and additional reports are required annually thereafter through the \"year succeeding the last year for which loans, loan guarantees, and other investments made under Section 4003 are outstanding.\" Monitoring and Audits by Comptroller General : Section 19010 requires the comptroller general to conduct monitoring and oversight of federal spending in response to the COVID-19 pandemic. The section empowers the comptroller general to access relevant records, make copies of those records, and conduct pertinent interviews. The comptroller general is to offer briefings at least once per month to the House Committee on Appropriations; the House Committee on Homeland Security; the House Committee on Oversight and Reform; the House Committee on Energy and Commerce; the Senate Committee on Appropriations; the Senate Committee on Homeland Security and Governmental Affairs; and the Senate Committee on Health, Education, Labor, and Pensions. The comptroller general is also required to report on GAO's relevant activities to the same committees within 90 days of enactment of the CARES Act (i.e., June 25, 2020), then monthly until one year after enactment (i.e., March 27, 2021), and periodically thereafter. Title IX of Division B, under the heading \"Architect of the Capitol,\" appropriates $25 million to the Architect of the Capitol for expenses related to the COVID-19 pandemic. The Architect of the Capitol is required to provide an expenditure report within 30 days of enactment of the CARES Act (i.e., April 26, 2020) and every 30 days thereafter to the House and Senate Appropriations Committees, the House Committee on House Administration, and the Senate Committee on Rules and Administration. Title X of Division B, under the heading \"Armed Forces Retirement Home Trust Fund,\" appropriates $2.8 million from the available funds of the trust fund for expenses related to the COVID-19 pandemic. The chief executive officer of the Armed Forces Retirement Home is required to submit monthly spending reports to the House and Senate Appropriations Committees. Section 4026(b)(2)(A) requires the Board of Governors of the Federal Reserve System to report to the House Committee on Financial Services and the Senate Committee on Banking, Housing, and Urban Affairs whenever it exercises its purchase and loan-making authority under Section 4003(b)(4). Reports are to be submitted within seven days and are required to contain the same information as reports required under Title 12, Section 343(3)(C)(i), of the United States Code . In addition, reports are to be submitted every 30 days regarding outstanding loans and financial assistance under Section 4003(b)(4) in accordance with Title 12, Section 343(3)(C)(ii), of the U.S. Code . Title VII of Division B, under the heading \"Centers for Disease Control and Prevention,\" appropriates a total of $4.3 billion to the Centers for Disease Control and Prevention (CDC). Of that total, $500 million is directed to \"public health data surveillance and analytics infrastructure modernization.\" Within 30 days of enactment of the CARES Act (i.e., April 26, 2020), CDC is required to report to the House and Senate Appropriations Committees on the development of a \"public health surveillance and data collection system for coronavirus.\" Section 1108(d) requires the Minority Small Business Development Agency of the Department of Commerce to submit reports to the House Committee on Small Business; the House Committee on Energy and Commerce; the Senate Committee on Commerce, Science, and Technology; and the Senate Committee on Small Business and Entrepreneurship regarding the programs developed pursuant to Section 1108(b). Reports are due six months after enactment of the CARES Act (i.e., September 27, 2020) and annually thereafter. Section 13006(a) authorizes the delegation of select procurement authorities within the Department of Defense for transactions related to the COVID-19 pandemic. In the event that a transaction of this type does occur, either the Under Secretary of Defense for Research and Engineering or the Under Secretary of Defense for Acquisition and Sustainment, as applicable, is required to notify the House and Senate Appropriations and Armed Services Committees \"as soon as is practicable.\" Section 3510(a) allows foreign institutions to use distance education during the declared COVID-19 emergency under certain circumstances. Section 3510(c) requires that the Secretary of Education submit a report to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions identifying foreign institutions that use distance education under Section 3510(a). The report is due not later than 180 days after enactment of the CARES Act (i.e., September 23, 2020). Additional reports are due every 180 days for the duration of the declared emergency. Section 3510(d) allows foreign institutions to enter written agreements with certain institutions of higher education in the United States to allow students to take courses at the American institutions. Section 3510(d)(4) requires that the Secretary of Education submit a report identifying the foreign institutions using such arrangements to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions. The report is due not later than 180 days after enactment of the CARES Act (i.e., September 23, 2020). Additional reports are due every 180 days for the duration of the declared emergency. Section 3511(b) authorizes the Secretary of Education to waive certain statutory requirements identified in the section upon the request of a state or Indian tribe. Section 3511(d)(2) requires the Secretary of Education to notify the House Committee on Education and Labor; the Senate Committee on Health, Education, Labor, and Pensions; and the House and Senate Appropriations Committee within seven days of granting any waiver. In addition, Section 3511(d)(4) requires the Secretary of Education to submit a report to the same committees within 30 days of enactment of the CARES Act (i.e., April 26, 2020) with recommendations for additional necessary waivers of statutory requirements. Section 3512(a) authorizes the Secretary of Education to defer payments on loans made to historically black colleges and universities under Title 20, Section 1066, of the U.S. Code . Section 3512(c) requires the Secretary of Education to report to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions within 180 days of enactment of the CARES Act (i.e., September 23, 2020) and every 180 days thereafter on any institutions receiving this relief. Section 3517(c) requires the Secretary of Education to submit a report to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions identifying all institutions of higher education receiving waivers of statutory requirements identified in Section 3517(a). Reports are due within 180 days of enactment of the CARES Act (i.e., September 23, 2020) and every 180 days thereafter until the end of the fiscal year following the end of the declared emergency. Section 3518(c) requires the Secretary of Education to submit a report to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions identifying all institutions of higher education and other recipients who receive grant modifications as authorized in Section 3518(a). Reports are due within 180 days of enactment of the CARES Act (i.e., September 23, 2020) and every 180 days thereafter until the end of the fiscal year following the end of the declared emergency. Section 3212 amends the Public Health Service Act to require that the Secretary of HHS submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions within four years of enactment of the CARES Act (i.e., March 27, 2024) and every five years thereafter on the \"activities and outcomes\" of the Telehealth Network Grant Program and the Telehealth Resource Centers Grant Program. Section 3213 amends the Public Health Service Act to require the Secretary of HHS to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions within four years of enactment of the CARES Act (i.e., March 27, 2024), and every five years thereafter, on the \"activities and outcomes\" of the Rural Health Care Services Outreach Grant Program, the Rural Health Network Development Grant Program, and the Small Health Care Provider Quality Improvement Grant Program. Section 3226(d) requires the Secretary of HHS to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions within two years of enactment of the CARES Act (i.e., March 27, 2022) on HHS's efforts to support the blood donation system. Section 3301 amends the Public Health Service Act to, during a public health emergency, eliminate a cap on the value of certain transactions related to the Biomedical Advanced Research and Development Authority that may be entered into by the Secretary of HHS. After the termination of the public health emergency, the Secretary of HHS is required to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions that details the use of funds, including a discussion of outcome measures for such transactions. Section 3401 amends the Public Health Service Act and renews a previously enacted requirement that the Secretary of HHS submit reports to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions concerning the need for underrepresented minorities on medical peer review councils. The first report is due September 30, 2025, and subsequent reports are due every five years thereafter. Section 3401 further amends the Public Health Service Act to require the Advisory Council on Graduate Medical Education to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions (as well as the Secretary of HHS) no later than September 30, 2023, and every five years thereafter. In these reports, the Advisory Council is directed to discuss its recommendations on the issues outlined in Title 42, Section 294o(a)(1), of the U.S. Code . Section 3402(a) requires the Secretary of HHS to develop a comprehensive and coordinated plan for the health care workforce development programs within one year of enactment of the CARES Act (i.e., March 27, 2021). Section 3402(c) requires the Secretary of HHS to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions describing the plan and how it is being implemented within two years of passage of the CARES Act (i.e., March 27, 2022). Section 3403(c) amends the Public Health Service Act to require the Secretary of HHS to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions on outcomes associated with the Geriatrics Workforce Enhancement Program. The report is due within four years of the enactment of the Title VII Health Care Workforce Reauthorization Act of 2019 and then every five years thereafter. Section 3404(a)(4)(D) amends the Public Health Service Act to require the Secretary of HHS to submit reports to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions assessing HHS programs to enhance the nursing workforce. Reports are due by September 30, 2020, and biennially thereafter. Further, Section 3404(a)(6)(F) incorporates additional requirements for these reports that are codified in Title 42, Section 296p, of the U.S. Code . Section 3854(c)(2) requires the Secretary of HHS to submit a report to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions when a revised sunscreen order under the Section 3854(c)(1) does not include certain efficacy information. Section 3855(a) requires the Secretary of HHS to submit a letter to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions describing the Food and Drug Administration's (FDA's) evaluations and revisions to the cough and cold monograph for children under the age of six. The letter is due one year after enactment of the CARES Act (i.e., March 27, 2021) and annually thereafter. Section 3862 adds a new part to the Federal Food, Drug, and Cosmetic Act to alter the FDA's management of monographs for over-the-counter drugs. This new part includes two additional reporting requirements on the implementation and impact of the new provisions. The Secretary of HHS is required to report on each of those issues to the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions within 120 calendar days after the end of FY2021 and within 120 days after the end of each fiscal year thereafter. In addition, the Secretary of HHS is required, by January 15, 2025, to transmit to Congress recommendations to revise the goals of the program. While developing those recommendations, the Secretary of HHS is required to consult with the House Committee on Energy and Commerce and the Senate Committee on Health, Education, Labor, and Pensions, among others. Title VIII of Division B, under the heading \"Centers for Disease Control and Prevention,\" requires the Secretary of HHS, in consultation with the director of the CDC, to report to the House and Senate Appropriations Committees every 14 days for one year if the HHS Secretary declares an infectious disease emergency and seeks to use the Infections Diseases Rapid Response Fund (as authorized by the third proviso of Section 231 of Division B of P.L. 115-245 ) \"as long as such report[s] would detail obligations in excess of $5,000,000\" or upon request. Title VIII of Division B, under the heading \"Office of the Secretary,\" appropriates $27 billion to the Public Health and Social Services Emergency Fund. Among other things, the provision allows for funds to be used to reimburse the VA for expenses related to the COVID-19 pandemic and for care for certain patients. To provide this reimbursement, the Secretary of HHS must certify to the House and Senate Appropriations Committees that funds available under the Stafford Act are insufficient to cover expenses incurred by the VA. In addition, the Secretary of HHS must notify the House and Senate Appropriations Committees three days prior to making such a certification. Title VIII of Division B, also under the heading \"Office of the Secretary,\" appropriates $100 billion to the Public Health and Social Services Emergency Fund to support eligible health care providers with their expenses related to the COVID-19 pandemic. The Secretary of HHS is required to submit a report to the House and Senate Appropriations Committees within 60 days of enactment of the CARES Act (i.e., May 26, 2020), and every 60 days thereafter, on the obligation of these funds, including state-level data. Section 18111 provides that funds appropriated under the heading \"Department of Health and Human Services\" in Title VII of Division B may be transferred or merged with appropriations to other specified HHS budget accounts so long as the House and Senate Appropriations Committees are notified 10 days in advance of any transfer. Section 18112 requires the Secretary of HHS to provide a spend plan for funds appropriated to HHS to the House and Senate Appropriations Committees within 60 days of enactment of the CARES Act (i.e., May 26, 2020) and then every 60 days until September 30, 2024. Title VI of Division B, under the heading \"Department of Homeland Security,\" appropriates $178 million for DHS's response to the COVID-19 pandemic. The provision grants additional authority to transfer these funds between DHS accounts for the purchase of personal protective equipment and sanitization materials. Within five days after making such a transfer, DHS is required to notify the House and Senate Appropriations Committees. Title VII of Division B, under the heading \"Departmental Offices,\" provides $158 million to support for the Department of the Interior's COVID-19 pandemic response. Beginning 90 days after enactment of the CARES Act (i.e., June 25, 2020), and monthly thereafter, the Secretary of the Interior is required to provide a report detailing the use of these funds to the House and Senate Appropriations Committees. Title VIII of Division B, under the heading \"Departmental Management,\" appropriates $15 million for DOL's response to the COVID-19 pandemic and provides that the Secretary of Labor may transfer these funds to other specified DOL budget accounts for this purpose. Fifteen days prior to transferring any funds, the Secretary of Labor is required to submit an operating plan to the House and Senate Appropriations Committees describing how funds will be used. Section 21007 authorizes the Secretary of State and the administrator of the U.S. Agency for International Development (USAID) to provide additional paid leave to employees for the period from January 29, 2020, to September 30, 2022, in order to address hardships created by the COVID-19 pandemic. Prior to using this authority, the Secretary of State and the administrator must consult with House and Senate Appropriations Committees, the House Committee on Foreign Affairs, and the Senate Committee on Foreign Relations. Section 21009 authorizes the Secretary of State to use passport and immigrant visa surcharges to pay costs for consular services during FY2020.The Secretary of State is required to report to the House and Senate Appropriations Committees, the House Committee on Foreign Affairs, and the Senate Committee on Foreign Relations within 90 days of the expiration of this authority (i.e., December 29, 2020) on specific expenditures made pursuant to this authority. Section 21010 authorizes the Department of State and USAID to enter into personal services contracts to support their response to the COVID-19 pandemic subject to prior consultation with and notification of the House and Senate Appropriations Committees, the House Committee on Foreign Affairs, and the Senate Committee on Foreign Relations. Within 15 days of using this authority, the Secretary of State is required to report to the same committees on the staffing needs of the Office of Medical Services. Section 21011 authorizes the Secretary of State and the administrator of USAID to administer any legally required oath of office remotely through September 30, 2021. Prior to using this authority, the Secretary of State and the administrator must each submit a report to the House and Senate Appropriations Committees, the House Committee on Foreign Affairs, and the Senate Committee on Foreign Relations describing the process they will use to administer an oath of office in this manner. Section 22002 requires the Secretary of Transportation to notify the House and Senate Appropriations Committees; the House Committee on Transportation and Infrastructure; and the Senate Committee on Commerce, Science, and Transportation within seven days of enactment of the CARES Act (i.e., April 3, 2020), and every seven days thereafter, of the furlough of any National Railroad Passenger Corporation employee due to the COVID-19 pandemic. Section 22005 allows the Secretary of Transportation to waive specified requirements for highway safety grants if the COVID-19 pandemic will substantially impact the ability of the states and the Department of Transportation to meet those grant requirements. The Secretary is required to \"periodically\" report to the relevant committees on any waivers made under this provision. Section 2201(f)(2) establishes reporting requirements associated with the 2020 Recovery Rebates provided in Section 2201. The Secretary of the Treasury is required to submit a report to the House and Senate Appropriations Committees within 15 days of enactment of the CARES Act (i.e., April 11, 2020) providing a spending plan for the funds provided for this program. In addition, 90 days after enactment (i.e., June 25, 2020), and quarterly thereafter, the Secretary is required to provide reports to the House and Senate Appropriations Committees on actual and projected expenditures under this program. Section 4026(b)(1)(A) requires the Secretary of the Treasury, within seven days after making a loan or loan guarantee under Sections 4003(b)(1), 4003(b)(2), or 4003(b)(3), to report to the chairmen and ranking members of the House Committee on Financial Services; the House Committee on Ways and Means; the Senate Committee on Banking, Housing, and Urban Affairs; and the Senate Committee on Finance. These reports are to include an overview of the actions and financial information about those transactions. Section 4118(a) requires the Secretary of the Treasury to submit a report no later than November 1, 2020, to the House Committee on Transportation and Infrastructure; the House Committee on Financial Services; the Senate Committee on Commerce, Science, and Transportation; and the Senate Committee on Banking, Housing, and Urban Affairs on the financial assistance provided to air carriers and contractors under Subtitle B of Title IV of the CARES Act. Section 4118(b) requires that the Secretary of the Treasury provide an updated report to the same committees no later than November 1, 2021. Section 21012 amends the Bretton Woods Agreements Act to authorize additional lending by the Department of the Treasury pursuant to a decision of the executive directors of the International Monetary Fund. Prior to taking such action, the Secretary of the Treasury is required to report to Congress on the need for such loans to support the international monetary system and the availability of alternative actions. Title X of Division B, under the heading \"Information Technology Systems,\" appropriates $2.15 billion for information technology expenses related to the COVID-19 pandemic. The VA Secretary is required to submit a spending plan for these funds to the House and Senate Appropriations Committees and must also notify the same committees before any of these funds are reprogrammed among VA's budget subaccounts for information technology. Section 20001 provides additional transfer authority for the Secretary to transfer funds between identified accounts. For transfers that account for less than 2% of the amount appropriated to a particular account, the Secretary is required to notify the House and Senate Appropriations Committees. For all other transfers, the VA Secretary may transfer funds only after requesting and receiving approval from the House and Senate Appropriations Committees. Section 20002 requires the Secretary to submit monthly expenditure reports to the House and Senate Appropriations Committees for all funds appropriated by Title X of Division B. Section 20008 authorizes the Secretary to waive any limitations on pay for VA employees during the COVID-19 public health emergency for work done in support of the response to the emergency. The Secretary is required to submit a report to the House and Senate Veterans' Affairs Committees in each month that such a waiver is in place. Title V of Division B, under the heading \"Election Assistance Commission,\" provides a total of $400 million for election security grants to be distributed to the states by the Election Assistance Commission. This provision requires states to submit reports on how these funds were used within 20 days of each election in the 2020 federal election cycle. Within three days of receipt, the commission is required to transmit these reports to the House Committee on House Administration, the Senate Committee on Rules and Administration, and the House and Senate Appropriations Committees. Title VI of Division B, under the heading \"Federal Emergency Management Agency,\" appropriates $45 billion to FEMA's Disaster Relief Fund. The FEMA administrator is required to report to the House and Senate Appropriations Committees every 30 days on the actual and projected use of these funds. Title V of Division B, under the heading \"General Services Administration,\" appropriates $275 million to the Federal Buildings Fund of the General Services Administration (GSA) for expenses related to the COVID-19 pandemic. The provision requires the administrator of GSA to notify the House and Senate Appropriations Committees quarterly on obligations and expenditures of these funds. Section 15003 requires the GSA administrator to notify Congress in writing if the administrator determines that it is in the public interest to use non-competitive procurement procedures as authorized by the Federal Procurement Policy during a declared public health emergency. Title IX of Division B, under the heading \"House of Representatives,\" appropriates a total of $25 million for expenses related to the COVID-19 pandemic. The chief administrative officer of the House of Representatives is required to submit a spending plan to the House Committee on Appropriations. Section 15001 appropriates $250 million to the Internal Revenue Service (IRS). The provision requires that the IRS commissioner submit a spending plan to the House and Senate Appropriations Committees no later than 30 days of enactment of the CARES Act (i.e., April 26, 2020). The provision also provides that, with advance notice to the House and Senate Appropriations Committees, these funds may be transferred between IRS budget accounts as necessary to respond to the COVID-19 pandemic. Title VII of Division B, under the heading \"John F. Kennedy Center for the Performing Arts,\" provides $25 million to support the Kennedy Center's response to the COVID-19 pandemic. The provision requires the Board of Trustees of the Kennedy Center to report to the House and Senate Appropriations Committees by October 21, 2020, with a detailed explanation of the use of the funds. Section 19011 amends Chapter 7 of Title 17 of the U.S. Code to provide that, through December 31, 2021, if an emergency declared by the President under the National Emergencies Act disrupts the ordinary functioning of the copyright system, the Register of Copyrights may waive or modify specified timing requirements. If the Register of Copyrights takes such action he or she must notify Congress within 20 days. Section 1103(d) requires SBA to report to the House Committee on Small Business and the Senate Committee on Small Business and Entrepreneurship on its activities related to education, training and advising grants under Section 1103(b) of the CARES Act. The initial report under this section is due six months after enactment of the CARES Act (i.e., September 27, 2020), with additional reports annually thereafter. Section 1107(c) requires SBA to provide a spending plan for funds appropriated in Section 1107(a) to the House and Senate Appropriations Committees within 180 days of enactment of the CARES Act (i.e., September 23, 2020). Section 12004(a) provides the director of the U.S. Patent and Trademark Office with authority to toll, waive, adjust, or modify specified deadlines in Title 35 of the U.S. Code during the COVID-19 emergency if certain conditions are met. To use this authority, the director is required, under Section 12004(c), to submit a statement to Congress within 20 days explaining his or her action and the rationale underlying it. In addition to the requirements listed above for specific federal entities and sub-entities, Section 18109 authorizes that funds provided under Title VII of Division B may be used for personal services contracts with prior notification to the House and Senate Appropriations Committees. Title VII of Division B makes appropriations to the Department of the Interior, the Environmental Protection Agency, the Forest Service (Department of Agriculture), the Indian Health Service (HHS), the Agency for Toxic Substances and Disease Registry (HHS), the Institute of American Indian and Alaska Native Culture and Arts Development, the Smithsonian Institution, the Kennedy Center, and the National Foundation on the Arts and Humanities. Section 4026 requires the chairman of Federal Reserve to testify, on a quarterly basis, before the House Committee on Financial Services and the Senate Committee on Banking, Housing, and Urban Affairs regarding the Federal Reserve's activities under the CARES Act. Section 4003(c)(3)(A)(iii) allows the Secretary of the Treasury to waive compensation limits established by Section 4004 as well as restrictions on \"stock buybacks,\" the payment of dividends, and other capital distributions established by Section 4003(c)(3)(A)(ii) for businesses receiving a loan, loan guarantee, or other investment under the CARES Act. In order to waive those requirements, the Secretary must determine that such action is necessary to \"protect the interests of the Federal Government\" and must also \"make himself available to testify before the Committee on Banking, Housing, and Urban Affairs of the Senate and the Committee on Financial Services of the House of Representatives regarding the reasons for the waiver.\" Section 4026 requires the Secretary of the Treasury to testify, on a quarterly basis, before the House Committee on Financial Services and the Senate Committee on Banking, Housing, and Urban Affairs regarding the Treasury's activities under the CARES Act.", "summary": "The Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ) includes a variety of oversight provisions designed to increase the information available to Congress regarding the federal government's implementation of the CARES Act and response to the COVID-19 pandemic more generally. Specifically, the CARES Act: establishes a Congressional Oversight Commission, establishes a Special Inspector General for Pandemic Recovery, establishes a Pandemic Response Accountability Committee made up of certain agencies' inspectors general, provides additional financial resources for certain Offices of Inspectors General, creates additional reporting and oversight duties for the Government Accountability Office, and institutes new reporting requirements on a variety of agencies based on provisions in the CARES Act. As agencies begin to implement the CARES Act and as the COVID-19 pandemic continues to develop, understanding the federal resources and information available can help Congress support both its own oversight activity and the consideration of potential future legislation to respond to COVID-19. This report is a reference guide to the oversight mechanisms in the CARES Act and a launching pad for deeper consideration of oversight-related issues. This report complements other CRS products, such as a list of CRS experts covering issue areas related to other provisions of the CARES Act: CRS products: Other CRS products on the COVID-19 response efforts can be found on the CRS Coronavirus Disease 2019 resource page at https://www.crs.gov/resources/coronavirus-disease-2019 . CRS subject matter experts: For a list of points of contact for CRS's congressional clients with specific questions regarding the particular authorities and appropriations in the CARES Act, see CRS Report R46299, Coronavirus Aid, Relief, and Economic Security (CARES) Act: CRS Experts , by William L. Painter and Diane P. Horn.", "document_type": "crs"}
{"report": "The Windfall Elimination Provision (WEP) and the Government Pension Offset (GPO) are two separate provisions that reduce regular Social Security benefits for workers and/or their eligible family members if the worker receives (or is entitled to) a pension based on earnings from employment not covered by Social Security. The WEP affects retired or disabled workers and their family members, and the GPO affects spouses and survivors. Some beneficiaries who are entitled to both Social Security retirement benefits and spousal (or survivors') benefits (i.e., dually entitled) may be affected by both the WEP and the GPO. As of December 2018, 263,775 Social Security beneficiaries had their benefits reduced by both provisions, which accounted for 38% of spouses and survivors who were affected by the GPO and 14% of beneficiaries affected by the WEP. The provisions' benefit offsets create complications in calculating and administering Social Security benefits. This report examines the current-law provisions of the WEP and the GPO, who is affected by both provisions, and the size of the affected population. It also focuses on issues related to Social Security overpayments associated with dually entitled beneficiaries affected by both provisions, the two offsets' impact on Social Security benefits and household wealth, and how extending Social Security coverage through Section 218 agreements impacts the population affected by both provisions. For an overview of the WEP and the GPO, see CRS In Focus IF10203, Social Security: The Windfall Elimination Provision (WEP) and the Government Pension Offset (GPO) ; and for an explanation of the dual entitlement rule, see CRS In Focus IF10738, Social Security Dual Entitlement . A worker's employment or self-employment is considered covered by Social Security if the services performed in that job result in earnings that are subject to Social Security payroll taxes. About 7% of all workers are not covered by Social Security, mainly state and local government employees covered by alternative state-retirement systems and most permanent civilian federal employees hired before January 1, 1984, who are covered by the Civil Service Retirement System (CSRS) or other alternative retirement plans. Social Security beneficiaries who receive a pension based on employment not covered by Social Security may be affected by the WEP, the GPO, or both. The WEP was enacted in 1983 as part of major amendments to Social Security. Its purpose was to remove an unintended advantage or windfall that the regular Social Security benefit formula provided to workers who also had pensions from noncovered employment. The regular formula is weighted to replace a greater share of career-average earnings for low-paid workers than for high-paid workers. However, the formula could not differentiate between those who worked in low-paid jobs throughout their careers and other workers who appeared to have been low paid because they worked in jobs not covered by Social Security for many years (these years are shown as zeros for Social Security benefit purposes). The WEP is intended to remove this unintended advantage. Under the WEP, a worker's Social Security benefit is computed using a new formula, rather than the regular benefit formula, which results in a lower initial monthly benefit. The WEP applies to most people who receive both a pension from noncovered work (including certain foreign pensions) and Social Security retired worker benefits based on fewer than 30 years of substantial earnings in covered employment or self-employment. In 2019, the WEP reduces the share of the first $926 of average indexed monthly covered earnings that Social Security benefits replace, from 90% to as low as 40%. That adjustment reduces the associated benefit from $833.40 to as low as $370.40 per month, with a maximum reduction of $463.00. The WEP reduction amount is phased out for workers with between 21 years and 30 years of substantial earnings in employment covered by Social Security. Therefore, the WEP reduction's impact is smaller for workers who have more years of substantial covered employment. In addition, the WEP includes a guarantee that the reduction in the benefit amount caused by the WEP formula is limited to one-half of the noncovered pension. In general, Social Security spousal and survivors benefits are paid to the spouses of retired, disabled, or deceased workers covered by Social Security. The spousal benefit equals 50% of a retired or disabled worker's benefit and the survivors benefit equals 100% of a deceased worker's benefit. Under Social Security's dual entitlement rule , a person's spousal benefit is reduced, dollar-for-dollar, by the amount of his or her own Social Security retired- or disabled-worker benefit but not below zero (i.e., a 100% offset). The difference, if any, is paid as a spousal benefit and is added to the worker's Social Security benefit. In effect, the person receives the higher of the two Social Security benefit amounts, but not both. Enacted in 1977, the GPO is intended to replicate the dual entitlement rule for spouses and widow(er)s who receive pensions based on employment not covered by Social Security. The Social Security spousal or survivors benefit is reduced by an amount equal to two-thirds of the noncovered government pension (i.e., a 67% offset). Social Security beneficiaries will be affected by both the WEP and the GPO if they receive a noncovered government pension; are entitled to a WEP-reduced Social Security retired- or disabled-worker benefit; and are dually entitled to a Social Security spousal or survivors benefit (hereinafter \"spousal benefits\") after the reduction of the retired- or disabled-worker benefit. Table 1 illustrates four examples of how the WEP and the GPO affect Social Security benefits. Retired workers are affected by only the WEP, and not the GPO, if they either are not entitled to Social Security spousal benefits or their spousal benefits are less than the WEP-reduced retirement benefits (i.e., the spousal benefit is reduced to zero after the dual entitlement rule). To illustrate, in example 1, the retired worker receives a pension based on noncovered employment ($900), thus the worker's benefit is computed based on the WEP formula ($700). The retired worker may also be entitled to a $500 spousal benefit before any reduction, but the spousal benefit is reduced dollar-for-dollar by the amount of the retired worker's benefit ($700), according to the dual entitlement rule, but not below zero. Therefore, this worker's spousal benefit is reduced to zero after the dual entitlement reduction. The worker is not subject to the GPO because he or she does not receive a positive spousal benefit. The worker's total retirement benefits equal $1,600, based on the WEP formula and a noncovered pension ($700+$900=$1,600). Spouses and survivors are affected only by the GPO, but not the WEP, if they are not entitled to Social Security benefits based on their own earnings record, if any. To illustrate, in example 2, the beneficiary does not receive a Social Security worker's benefit ($0), but is entitled to a $1,000 spousal benefit. Because the beneficiary receives a noncovered pension benefit of $900, the spousal benefit is reduced by two-thirds of the noncovered pension ($600), resulting in a net spousal benefit of $400. This beneficiary receives total benefits of $1,300 from reduced Social Security spousal benefits and a noncovered pension ($400+$900=$1,300). Social Security beneficiaries are affected by both the WEP and the GPO if they receive both WEP-adjusted retired worker benefits based on their own work record and a reduced spousal benefit after the dual entitlement rule (i.e., dually entitled beneficiaries). The spousal benefit reduced by the dual entitlement rule is then subject to the GPO offset. In certain cases, the Social Security spousal benefit is high enough and remains positive after the GPO reduction (partial offset). To illustrate, in example 3, the worker receives a noncovered pension of $900 and a WEP-reduced retired-worker benefit of $700. If the worker is also eligible for a $1,500 spousal benefit, this is reduced by the worker's benefit based on the dual entitlement rule ($700), and further reduced by two-thirds of the noncovered pension based on the GPO ($600), thus the net spousal benefit equals $200 ($1,500- $700-$600). The beneficiary's total benefits of $1,800 include a WEP-reduced retirement benefit, a net spousal benefit after offsets, and a noncovered pension ($700+$200+$900=$1,800). In other cases, the Social Security spousal benefit is reduced to zero after the GPO reduction (fully offset). Example 4 illustrates a scenario in which a WEP-affected worker receives a $1,000 spousal benefit, which is reduced by the worker's benefit based on the dual entitlement rule ($700), and the resulting $300 is further reduced by the GPO offset ($600). The net benefit for this worker based on the spouse's working record ends with zero, because the spousal benefit cannot be reduced below zero. Therefore, this beneficiary will receive total benefits of $1,600 based on the WEP formula and the noncovered pension ($700+$900=1,600). As of December 2018, about 2.3 million Social Security beneficiaries, or almost 4% of all beneficiaries, had benefits reduced by the WEP, the GPO, or both. More than 11% of those affected were subject to both provisions. Social Security beneficiaries who were affected by both the WEP and the GPO accounted for 38% of spouses and survivors affected by the GPO and 14% of beneficiaries affected by the WEP. Table 2 breaks down the affected beneficiaries by state and type of offset. This section highlights issues related to dually entitled Social Security beneficiaries affected by both the WEP and the GPO: Social Security overpayments to affected beneficiaries, the impact of the WEP and GPO on Social Security benefits and household wealth, and the effect of extending Social Security coverage through Section 218 agreements. Overpayments to dually entitled Social Security beneficiaries affected by both the WEP and the GPO have been an issue for SSA since the provisions were implemented. The improper payments occurred in part because SSA did not properly impose the WEP and the GPO on dually entitled beneficiaries who also receive a pension based on noncovered employment. In a January 2013 report, SSA's Office of the Inspector General (OIG) identified 20,668 dually entitled beneficiaries in current-payment status whose WEP or GPO reductions were not applied properly. Among them, OIG estimated that SSA has overpaid approximately $349.5 million to 10,546 dually entitled beneficiaries whose WEP reduction was not applied properly and $320.6 million to 10,122 dually entitled beneficiaries whose GPO offset was not imposed correctly. OIG also estimated that SSA overpaid those beneficiaries an additional $231.9 million from 2013 to 2017, and that if no corrective action is taken, SSA might continue overpaying them by approximately $46.4 million annually. In 2018, OIG identified about 7,409 dually entitled beneficiaries with a GPO reduction on their spousal benefits but no WEP reduction on their retirement benefits and 8,127 dually entitled beneficiaries with a WEP reduction on their retirement benefits but no GPO offset on their spousal benefits. To prevent further improper payments to dually entitled beneficiaries who are subject to both the WEP and the GPO, in September 2018, SSA planned to generate system alerts for individuals who apply for retirement and spousal benefits when pension information is already available. OIG indicates that the planned alterations to the system, if implemented properly, might effectively prevent additional WEP and GPO overpayments. Improper payments to Social Security beneficiaries affected by the WEP and the GPO also occurred because some beneficiaries fail to report receipt of or changes in their pensions based on employment not covered by Social Security. If a beneficiary is receiving a noncovered pension based on his or her own employment, the beneficiary must provide evidence from the employer or pension-paying agency (e.g., an award letter) that shows the gross periodic pension amount, including the effective date and expected future pension increases. SSA cited GPO errors as one of the most important causes of the increase in the overpayment error rate between FY2016 and FY2017. Several proposals have been made to improve SSA's collection of pension information from states and localities for administering the WEP and the GPO. For example, the President's FY2020 budget includes a proposal for up to $70 million for administrative expenses, $50 million of which would be available to the states, to develop a mechanism to facilitate reporting of information about pensions based on noncovered employment. In addition, a 1998 report from the General Accounting Office (GAO; now called the Government Accountability Office) recommended that SSA obtain public pension data from the Internal Revenue Service (IRS). SSA has indicated that discussions with the IRS to obtain noncovered pension information are ongoing. The WEP and the GPO reduce the Social Security benefit received by either member or both members of a couple within a household, and have the largest impact on households affected by both provisions. One study finds that the WEP and the GPO, on average, reduce the present value of lifetime Social Security benefits by about 20% among households affected by either provision and by another 10% among households affected by both provisions. In this study, the households affected by both the WEP and the GPO include those in which either member is affected by both provisions or one member is affected by the WEP and the other is affected by the GPO. The study found that the present value of lifetime Social Security benefits and total household wealthâincluding the present value of lifetime Social Security benefits, public pension benefits, and other pension benefits, as well as all other assetsâwere lower among households subject to both the WEP and the GPO than among households subject to either provision alone. About one-quarter of state and local government employees, or approximately 6.4 million individuals, are not covered by Social Security. Social Security coverage may be extended to state and local government employees through a voluntary Section 218 Agreement between a state and the Social Security Administration. If a state or local government employee's position is covered under a public retirement system that provides a minimum retirement benefit comparable to Social Security retired-worker benefits, Social Security coverage may be extended to those positions via employee referendums. If a majority of all eligible employees votes in favor of Social Security coverage, all current and future employees in positions under the public retirement system will be covered. The adoption of a Section 218 Agreement during a worker's or a spouse's midcareer may cause some future (dually entitled) Social Security beneficiaries to become subject to the WEP and the GPO. Table 3 illustrates an example of a worker's Social Security benefits with and without an extension of Social Security coverage on the worker's own employment. Without Social Security coverage, the worker in example 1 might have no Social Security retired-worker benefits ($0), and his or her Social Security spousal benefits ($1,000) would be reduced by the GPO (2/3 of noncovered pension = 2/3Ã$900=$600). In this example, the beneficiary would be affected by only the GPO. If the worker's position became covered by Social Security in midcareer, the Social Security retirement benefits based on his or her own earnings record would become positive (assumed to be $450) and the noncovered component of the pension would decrease accordingly ($450) to reflect fewer years of noncovered employment (example 2). This individual would be subject to both the WEP and the GPO. Consequently, the beneficiary would become dually entitled to both Social Security retirement benefits and spousal benefits, and the spousal benefits would be reduced by both the dual entitlement rule ($450) and the GPO (2/3 of noncovered pension=2/3Ã$450=$300). Table 4 illustrates another example of the Social Security and pension benefits of a beneficiary whose spouse becomes covered under Social Security in midcareer. The beneficiary is assumed to receive Social Security retirement benefits based on his or her own covered earnings and a pension benefit based on noncovered employment, which makes the beneficiary subject to the WEP (example 1). Extending the spouse's Social Security coverage would increase the before-offset spousal benefits from zero to positive, which consequently would result in the beneficiary becoming dually entitled (examples 2 and 3). In example 2, the Social Security spousal benefits ($1,000) would be reduced by the worker's own Social Security benefit under the dual entitlement rule ($600). The Social Security spousal benefits would be further reduced by the GPO (2/3 of noncovered pension=2/3Ã$900= $600), and result in a net spousal benefit of zero (because the spousal benefit cannot be reduced below zero). In example 3, the Social Security spousal benefit ($1,300) is higher than the combined benefit reductions from the dual entitlement rule ($600) and the GPO ($600), thus resulting a net spousal benefit of $100. In all three examples, the beneficiary is affected by both the WEP and the GPO. Although a Section 218 Agreement may result in some potential beneficiaries being subject to both the WEP and the GPO, such an extension of Social Security coverage may also have a reverse effectâfuture Social Security beneficiaries who might be affected by both provisions without the Section 218 Agreement might become subject to only one provision with such an agreement. For example, a potential dually entitled beneficiary subject to both the WEP and the GPO might be exempted from the GPO if he or she switched from a noncovered position to a covered position and stayed in that covered position for at least five years. ", "summary": "The Windfall Elimination Provision (WEP) and the Government Pension Offset (GPO) are two separate provisions that reduce Social Security benefits for workers and/or and their eligible family members if the worker receives (or is entitled to) a pension based on employment not covered by Social Security. Certain beneficiaries may be subject to both the WEP and the GPO if they are dually entitled to Social Security retirement and spousal (or survivors') benefits and also receive a noncovered government pension. As of December 2018, 263,775 Social Security beneficiaries were affected by both the WEP and the GPO. They accounted for 38% of spouses and survivors affected by the GPO and 14% of beneficiaries affected by the WEP. The provisions' benefit offsets create complications in calculating and administering Social Security benefits. Overpayments to dually entitled Social Security beneficiaries affected by both the WEP and the GPO have been an issue for the Social Security Administration (SSA) since the WEP was enacted in 1983. In January 2013, SSA's Office of the Inspector General (OIG) estimated that SSA has overpaid approximately $349.5 million to 10,546 dually entitled beneficiaries who were identified among those in current-payment status and whose WEP reduction was not applied properly and $320.6 million to 10,122 dually entitled beneficiaries in current-payment status whose GPO offset was not imposed correctly. OIG's estimates further indicated that SSA overpaid those beneficiaries an additional $231.9 million from 2013 to 2017, and that SSA may continue overpaying them approximately $46.4 million annually if no corrective action is taken. Other studies show that beneficiaries who were subject to both the WEP and the GPO tended to have lower average Social Security benefits and household wealth than those affected by only the WEP or the GPO. In addition, some state and local government employees might become dually entitled and subject to both provisions through an extension of Social Security coverage under a Section 218 Agreement.", "document_type": "crs"}
{"report": "The President is responsible for appointing individuals to certain positions in the federal government. In some instances, the President makes these appointments using authorities granted to the President alone. Other appointments, generally referred to with the abbreviation PAS, are made by the President with the advice and consent of the Senate via the nomination and confirmation process. This report identifies, for the 115 th Congress, all nominations submitted to the Senate for full-time positions on 34 regulatory and other collegial boards and commissions. This report includes profiles on the leadership structures of each of these 34 boards and commissions as well as a pair of tables presenting information on each body's membership and appointment activity as of the end of the 115 th Congress. The profiles discuss the statutory requirements for the appointed positions, including the number of members on each board or commission, their terms of office, whether they may continue in their positions after their terms expire, whether political balance is required, and the method for selecting the chair. The first table in each pair provides information on full-time positions requiring Senate confirmation as of the end of the 115 th Congress. The second table tracks appointment activity for each board or commission within the 115 th Congress by the Senate (confirmations, rejections, returns to the President, and elapsed time between nomination and confirmation), as well as further related presidential activity (including withdrawals and recess appointments). In some instances, no appointment action occurred within a board or commission during the 115 th Congress. Information for this report was compiled using the Senate nominations database at https://www.congress.gov/ (users can click the \"nominations\" tab on the left-hand side of the page to search the database), the Congressional Record (daily edition), the Weekly Compilation of Presidential Documents , telephone discussions with agency officials, agency websites, the United States Code , and the 2016 Plum Book ( United States Government Policy and Supporting Positions ). Congressional Research Service (CRS) reports regarding the presidential appointments process, nomination activity for other executive branch positions, recess appointments, and other related matters are available to congressional clients at http://www.crs.gov . Federal executive branch boards and commissions discussed in this report share, among other characteristics, the following: (1) they are independent executive branch bodies located, with four exceptions, outside executive departments; (2) several board or commission members head each entity, and at least one of these members serves full time; (3) the members are appointed by the President with the advice and consent of the Senate; and (4) the members serve fixed terms of office and, except in a few bodies, the President's power to remove them is restricted. For most of the boards and commissions included in this report, the fixed terms of office for member positions have set beginning and end dates, irrespective of whether the posts are filled or when appointments are made. In contrast, for a few agencies, such as the Chemical Safety and Hazard Investigation Board, the full term begins when an appointee takes office and expires after the incumbent has held the post for the requisite period of time. The end dates of the fixed terms of a board's members are staggered, so that the terms do not expire all at once. The use of terms with fixed beginning and end dates is intended to minimize the occurrence of simultaneous board member departures and thereby increase leadership continuity. Under such an arrangement, an individual is nominated to a particular position and a particular term of office. An individual may be nominated and confirmed for a position for the remainder of an unexpired term to replace an appointee who has resigned (or died). Alternatively, an individual might be nominated for an upcoming term with the expectation that the new term will be under way by the time of confirmation. Occasionally, when the unexpired term has been for a relatively short period, the President has submitted two nominations of the same person simultaneouslyâthe first to complete the unexpired term and the second to complete the entire succeeding term of office. On some commissions, the chair is subject to Senate confirmation and must be appointed from among the incumbent commissioners. If the President wishes to appoint, as chair, someone who is not on the commission, the President simultaneously submits two nominations for the nomineeâone for member and the other for chair. As independent entities with staggered membership, executive branch boards and commissions have more political independence from the President than do executive departments. Nonetheless, the President can sometimes exercise significant influence over the composition of a board or commission's membership when he designates the chair or has the opportunity to fill a number of vacancies at once. For example, President George W. Bush had the chance to shape the Securities and Exchange Commission (SEC) during the first two years of his presidency because of existing vacancies, resignations, and a member's death. Likewise, during the same time period, President Bush was able to submit nominations for all of the positions on the National Labor Relations Board because of existing vacancies, expiring recess appointments, and resignations. Simultaneous turnover of board or commission membership may result from coincidence, but it also may be the result of a buildup of vacancies after extended periods of time in which the President does not nominate, or the Senate does not confirm, members. Two other notable characteristics apply to appointments to some of the boards and commissions. First, for 26 of the 34 bodies discussed in this report, the law limits the number of appointed members who may belong to the same political party, usually to no more than a bare majority of the appointed members (e.g., two of three or three of five). Second, advice and consent requirements also apply to inspector general appointments in four of these organizations and general counsel appointments in three. During the 115 th Congress, President Donald Trump submitted nominations to the Senate for 112 of the 151 full-time positions on 34 regulatory and other boards and commissions. In attempting to fill these 112 positions, he submitted a total of 140 nominations, of which 75 were confirmed, 12 were withdrawn, and 53 were returned to the President. No recess appointments were made. Table 1 summarizes the appointment activity for the 115 th Congress. At the end of the Congress, 22 incumbents were serving past the expiration of their terms. In addition, there were 43 vacancies among the 151 positions. The length of time a given nomination may be pending in the Senate has varied widely. Some nominations have been confirmed within a few days, others have been confirmed within several months, and some have never been confirmed. In the board and commission profiles, this report provides, for each board or commission nomination confirmed in the 115 th Congress, the number of days between nomination and confirmation (\"days to confirm\"). Under Senate rules, nominations not acted on by the Senate at the end of a session of Congress (or before a recess of 30 days) are returned to the President. The Senate, by unanimous consent, often waives this ruleâalthough not always. In cases where the President resubmits a returned nomination, this report measures the days to confirm from the date of receipt of the resubmitted nomination, not the original. For those nominations confirmed in the 115 th Congress, a mean of 121.0 days elapsed between nomination and confirmation. The median number of days elapsed was 91.0. Each of the 34 board or commission profiles in this report is organized into three parts. First, the leadership structure section discusses the statutory requirements for the appointed positions, including the number of members on each board or commission, their terms of office, whether these members may continue in their positions after their terms expire, whether political balance is required, and the method for selecting the chair. The first table lists incumbents to full-time positions as of the end of the 115 th Congress, along with party affiliation (where applicable), date of first confirmation, and term expiration date. Incumbents whose terms have expired are italicized. Most incumbents serve fixed terms of office and are removable only for specified causes. They generally remain in office when a new Administration assumes office following a presidential election. The second table lists appointment action for vacant positions during the 115 th Congress. This table provides the name of the nominee, position title, date of nomination or appointment, date of confirmation, and number of days between receipt of a nomination and confirmation, and notes relevant actions other than confirmation (e.g., nominations returned to or withdrawn by the President). When more than one nominee has had appointment action, the second table also provides statistics on the length of time between nomination and confirmation. The average days to confirm are provided in the form of a mean number. Appendix A provides two tables. Table A-1 includes information on each of the nominations and appointments to regulatory and other collegial boards and commissions during the 115 th Congress. It is alphabetically organized and follows a similar format to that of the \"Appointment Action\" sections discussed above. It identifies the board or commission involved and the dates of nomination and confirmation. It also indicates if a nomination was withdrawn, returned, rejected, or if a recess appointment was made. In addition, it provides the mean and median number of days taken to confirm a nomination. Table A-2 contains summary information on appointments and nominations by organization. For each of the 34 independent boards and commissions discussed in this report, it shows the number of positions, vacancies, incumbents whose term had expired, nominations, individual nominees, positions to which nominations were made, confirmations, nominations returned to the President, nominations withdrawn, and recess appointments. A list of organization abbreviations can be found in Appendix B . The Chemical Safety and Hazard Investigation Board is an independent agency consisting of five members who serve five-year terms (no political balance is required), including a chair. The President appoints the members, including the chair, with the advice and consent of the Senate. When a term expires, the incumbent must leave office. The Commodity Futures Trading Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. At the end of a term, a member may remain in office, unless replaced, until the end of the next session of Congress. The chair is also appointed by the President, with the advice and consent of the Senate. The statute establishing the Consumer Product Safety Commission calls for five members who serve seven-year terms. No more than three members may be from the same political party. A member may remain in office for one year at the end of a term, unless replaced. The chair is also appointed by the President, with the advice and consent of the Senate. The Defense Nuclear Facilities Safety Board consists of five members (no more than three may be from the same political party) who serve five-year terms. After a term expires, a member may continue to serve until a successor takes office. The President designates the chair and vice chair. The Election Assistance Commission consists of four members (no more than two may be from the same political party) who serve four-year terms. After a term expires, a member may continue to serve until a successor takes office. The chair and vice chair, from different political parties and designated by the commission, change each year. The Equal Employment Opportunity Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. An incumbent whose term has expired may continue to serve until a successor is appointed, except that no such member may continue to serve (1) for more than 60 days when Congress is in session, unless a successor has been nominated; or (2) after the adjournment of the session of the Senate in which the successor's nomination was submitted. The President designates the chair and the vice chair. The President also appoints the general counsel, with the advice and consent of the Senate. The Export-Import Bank Board of Directors comprises the bank president, who serves as chair; the bank first vice president, who serves as vice chair; and three other members (no more than three of these five may be from the same political party). All five members are appointed by the President, with the advice and consent of the Senate, and serve for terms of up to four years. An incumbent whose term has expired may continue to serve until a successor is qualified, or until six months after the term expiresâwhichever occurs earlier. The President also appoints an inspector general, with the advice and consent of the Senate. The Farm Credit Administration consists of three members (no more than two may be from the same political party) who serve six-year terms. A member may not succeed himself or herself unless he or she was first appointed to complete an unexpired term of three years or less. A member whose term expires may continue to serve until a successor takes office. One member is designated by the President to serve as chair for the duration of the member's term. The Federal Communications Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, a member may continue to serve until the end of the next session of Congress, unless a successor is appointed before that time. The President designates the chair. The Federal Deposit Insurance Corporation Board of Directors consists of five members, of whom twoâthe comptroller of the currency and the director of the Consumer Financial Protection Bureauâare ex officio. The three appointed members serve six-year terms. An appointed member may continue to serve after the expiration of a term until a successor is appointed. Not more than three members of the board may be from the same political party. The President appoints the chair and the vice chair, with the advice and consent of the Senate, from among the appointed members. The chair is appointed for a term of five years. The President also appoints the inspector general, with the advice and consent of the Senate. The Federal Election Commission consists of six members (no more than three may be from the same political party) who may serve for a single term of six years. When a term expires, a member may continue to serve until a successor takes office. The chair and vice chair, from different political parties and elected by the commission, change each year. Generally, the vice chair succeeds the chair. The Federal Energy Regulatory Commission, an independent agency within the Department of Energy, consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, a member may continue to serve until a successor takes office, except that such commissioner may not serve beyond the end of the session of the Congress in which his or her term expires. The President designates the chair. The Federal Labor Relations Authority consists of three members (no more than two may be from the same political party) who serve five-year terms. After the date on which a five-year term expires, a member may continue to serve until the end of the next Congress, unless a successor is appointed before that time. The President designates the chair. The President also appoints the general counsel, with the advice and consent of the Senate. The Federal Maritime Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, a member may continue to serve until a successor takes office. The President designates the chair. The Federal Mine Safety and Health Review Commission consists of five members (no political balance is required) who serve six-year terms. When a term expires, the member must leave office. The President designates the chair. The Federal Reserve System Board of Governors consists of seven members (no political balance is required) who serve 14-year terms. When a term expires, a member may continue to serve until a successor takes office. The President appoints the chair and vice chair, who are separately appointed as members, for four-year terms, with the advice and consent of the Senate. The Federal Trade Commission consists of five members (no more than three may be from the same political party) who serve seven-year terms. When a term expires, the member may continue to serve until a successor takes office. The President designates the chair. The Financial Stability Oversight Council consists of 10 voting members and 5 nonvoting members, and is chaired by the Secretary of the Treasury. Of the 10 voting members, 9 serve ex officio, by virtue of their positions as leaders of other agencies. The remaining voting member is appointed by the President with the advice and consent of the Senate and serves full time for a term of six years. Of the five nonvoting members, two serve ex officio. The remaining three nonvoting members are designated through a process determined by the constituencies they represent, and they serve for terms of two years. The council is not required to have a balance of political party representation. The Foreign Claims Settlement Commission, located in the Department of Justice, consists of three members (political balance is not required) who serve three-year terms. When a term expires, the member may continue to serve until a successor takes office. Only the chair, who is appointed by the President with the advice and consent of the Senate, serves full time. The Merit Systems Protection Board consists of three members (no more than two may be from the same political party) who serve seven-year terms. A member who has been appointed to a full seven-year term may not be reappointed to any following term. When a term expires, the member may continue to serve for one year, unless a successor is appointed before that time. The President appoints the chair, with the advice and consent of the Senate, and designates the vice chair. The National Credit Union Administration Board of Directors consists of three members (no more than two members may be from the same political party) who serve six-year terms. When a term expires, a member may continue to serve until a successor takes office. The President designates the chair. The National Labor Relations Board consists of five members who serve five-year terms. Political balance is not required, but, by tradition, no more than three members are from the same political party. When a term expires, the member must leave office. The President designates the chair. The President also appoints the general counsel, with the advice and consent of the Senate. The National Mediation Board consists of three members (no more than two may be from the same political party) who serve three-year terms. When a term expires, the member may continue to serve until a successor takes office. The board annually designates a chair. The National Transportation Safety Board consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, a member may continue to serve until a successor takes office. The President appoints the chair from among the members for a two-year term, with the advice and consent of the Senate, and designates the vice chair. The Nuclear Regulatory Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, the member must leave office. The President designates the chair. The President also appoints the inspector general, with the advice and consent of the Senate. The Occupational Safety and Health Review Commission consists of three members (political balance is not required) who serve six-year terms. When a term expires, the member must leave office. The President designates the chair. The Postal Regulatory Commission consists of five members (no more than three may be from the same political party) who serve six-year terms. After a term expires, a member may continue to serve until his or her successor takes office, but the member may not continue to serve for more than one year after the date upon which his or her term otherwise would expire. The President designates the chair, and the members select the vice chair. The Privacy and Civil Liberties Oversight Board consists of five members (no more than three may be from the same political party) who serve six-year terms. When a term expires, the member may continue to serve until a successor takes office. Only the chair, who is appointed by the President with the advice and consent of the Senate, serves full time. The Implementing Recommendations of the 9/11 Commission Act of 2007, P.L. 110-53 , Title VIII, Section 801 (121 Stat. 352), established the Privacy and Civil Liberties Oversight Board. Previously, the Privacy and Civil Liberties Oversight Board functioned as part of the White House Office in the Executive Office of the President. That board ceased functioning on January 30, 2008. The Railroad Retirement Board consists of three members (political balance is not required) who serve five-year terms. When a term expires, the member may continue to serve until a successor takes office. The President appoints the chair and an inspector general with the advice and consent of the Senate. The Securities and Exchange Commission consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, the member may continue to serve until the end of the next session of Congress, unless a successor is appointed before that time. The President designates the chair. The Surface Transportation Board, located within the Department of Transportation, consists of five members (no more than three may be from the same political party) who serve five-year terms. When a term expires, the member may continue to serve until a successor takes office but for not more than one year after expiration. The President designates the chair. The United States International Trade Commission consists of six members (no more than three may be from the same political party) who serve nine-year terms. A member of the commission who has served for more than five years is ineligible for reappointment. When a term expires, a member may continue to serve until a successor takes office. The President designates the chair and vice chair for two-year terms of office, but they may not belong to the same political party. The President may not designate a chair with less than one year of continuous service as a member. This restriction does not apply to the vice chair. The United States Parole Commission is an independent agency in the Department of Justice. The commission consists of five commissioners (political balance is not required) who serve for six-year terms. When a term expires, a member may continue to serve until a successor takes office. In most cases, a commissioner may serve no more than 12 years. The President designates the chair (18 U.S.C. Â§4202). The commission was previously scheduled to be phased out, but Congress has extended its life several times. Under P.L. 113-47 , Section 2 (127 Stat. 572), it was extended until November 1, 2018 (18 U.S.C. Â§3551 note). The United States Sentencing Commission is a judicial branch agency that consists of seven voting members, who are appointed to six-year terms, and one nonvoting member. The seven voting members are appointed by the President, with the advice and consent of the Senate, and only the chair and three vice chairs serve full time. The President appoints the chair, with the advice and consent of the Senate, and designates the vice chairs. At least three members must be federal judges. No more than four members may be of the same political party. No more than two vice chairs may be of the same political party. No voting member may serve more than two full terms. When a term expires, an incumbent may continue to serve until he or she is reappointed, a successor takes office, or Congress adjourns sine die at the end of the session that commences after the expiration of the term, whichever is earliest. The Attorney General (or designee) serves ex officio as a nonvoting member. The chair of the United State Parole Commission also is an ex officio nonvoting member of the commission. Appendix A. Summary of All Nominations and Appointments to Collegial Boards andÂ Commissions Appendix B. Board and Commission Abbreviations", "summary": "The President makes appointments to certain positions within the federal government, either using authorities granted to the President alone or with the advice and consent of the Senate. There are some 151 full-time leadership positions on 34 federal regulatory and other collegial boards and commissions for which the Senate provides advice and consent. This report identifies all nominations submitted to the Senate for full-time positions on these 34 boards and commissions during the 115 th Congress. Information for each board and commission is presented in profiles and tables. The profiles provide information on leadership structures and statutory requirements (such as term limits and party balance requirements). The tables include full-time positions confirmed by the Senate, incumbents as of the end of the 115 th Congress, incumbents' parties (where balance is required), and appointment action within each board or commission. Additional summary information across all 34 boards and commissions appears in Appendix A . During the 115 th Congress, the President submitted 140 nominations to the Senate for full-time positions on these boards and commissions (most of the remaining positions on these boards and commissions were not vacant during that time). Of these 140 nominations, 75 were confirmed, 12 were withdrawn, and 53 were returned to the President. At the end of the 115 th Congress, 22 incumbents were serving past the expiration of their terms. In addition, there were 43 vacancies among the 151 positions. Information for this report was compiled using the Senate nominations database at https://www.congress.gov/ , the Congressional Record (daily edition), the Weekly Compilation of Presidential Documents , telephone discussions with agency officials, agency websites, the United States Code , and the 2016 Plum Book ( United States Government Policy and Supporting Positions ). This report will not be updated.", "document_type": "crs"}
{"report": "Many Members of Congress have demonstrated an interest in the mandates, effectiveness, and funding status of U.N. peacekeeping operations in Africa as an integral component of U.S. policy toward Africa and a key tool for fostering greater stability and security on the continent. As a permanent member of the U.N. Security Council (the Council) with veto power, the United States plays a key role in establishing, renewing, and funding individual operations, including those in Africa. The United States is the largest financial contributor to U.N. peacekeeping. This report provides an overview of active U.N. peacekeeping operations in Africa, including their mandates, budget and funding mechanisms, key challenges, and U.S. policy toward each mission. It does not address broader U.N. peacekeeping issues or missions elsewhere, non-U.N. peacekeeping and stabilization efforts in Africa, or the activities of the U.N. Support Office in Somalia (UNSOS), which is a U.N.-authorized logistics mission that supports the African Union (AU) Mission in Somalia (AMISOM). For related information, see CRS In Focus IF10597, United Nations Issues: U.S. Funding of U.N. Peacekeeping ; CRS In Focus IF11171, Crisis in the Central African Republic ; CRS In Focus IF10116, Conflict in Mali ; CRS In Focus IF10218, South Sudan , and CRS Report R45794, Sudan's Uncertain Transition ; CRS Report R43166, Democratic Republic of Congo: Background and U.S. Relations ; and CRS Report RS20962, Western Sahara . As of August 2019, the United Nations conducts 14 peacekeeping operations worldwide comprising more than 100,000 military, police, and civilian personnel. Of these operations, seven are in Africa ( Figure 1 ): the U.N. Multidimensional Integrated Stabilization Mission in the Central African Republic (MINUSCA), established by the Council in 2014; the U.N. Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), established in 2013; the U.N. Interim Security Force for Abyei (UNISFA), established in 2011; the U.N. Mission in South Sudan (UNMISS), established in 2011; the U.N. Organization Stabilization Mission in the Democratic Republic of the Congo (DRC, MONUSCO), established in 2010 to succeed the U.N. Organization Mission in the DRC (MONUC); the U.N.-African Union Mission in Darfur (UNAMID), established in 2007; and the U.N. Mission for the Organization of a Referendum in the Western Sahara (MINURSO), established in 1991. These include the world's four largest U.N. peacekeeping operations by actively deployed uniformed personnel : MONUSCO, UNMISS, MINUSMA, and MINUSCA. The Africa operations illustrate how U.N. peacekeeping has significantly evolved since the first mission was established in the Middle East in 1948. U.N. peacekeeping once involved implementing cease-fire or peace agreements (as is the case for MINURSO, the oldest of the current Africa operations). Since the 1990s, however, the U.N. Security Council has increasingly authorized operations in complex and insecure environments where there may be no peace to keep and little prospect of a near-term resolution. Peacekeepers, particularly those operating in African missions, are increasingly asked to protect civilians, help extend state authority, disarm rebel groups, work with humanitarian actors, assist in restoring the rule of law, and monitor human rights, often in the absence of a comprehensive or effective cease-fire or peace settlement. Members of the Security Council vote to adopt resolutions establishing and renewing peacekeeping operations. The resolutions specify the mission mandate and timeframe and authorize a troop ceiling and funding level for each mission. The Council generally authorizes the U.N. General Assembly (the Assembly) to create a special account for each operation funded by assessed contributions by U.N. member states. The Assembly adopts the peacekeeping scale of assessments every three years based on modifications of the U.N. regular budget scale, with the five permanent Council members assessed at a higher level for peacekeeping than for the regular budget. The latest U.S. peacekeeping assessment, adopted in December 2018, is 27.89%. Other top contributors include China (15.22%), Japan (8.56%), Germany (6.09%), and France (5.61%). The approved U.N. budget for the 2019/2020 peacekeeping fiscal year is $6.51 billion. Of this amount, $4.82 billion (nearly 75%) is designated for the seven missions in Africa. U.N. members voluntarily provide the military and police personnel for each peacekeeping mission. Peacekeepers are paid by their own governments, which are reimbursed by the United Nations at a standard rate determined by the Assembly (about $1,428 per soldier per month). Some African countriesâincluding Ethiopia, Rwanda, and Ghanaâare among the largest troop contributors. Some experts and observers have expressed concern regarding possible funding shortages for U.N. peacekeeping operations, particularly those in Africa, and the impact it could have on their effectiveness. In a March 2019 report to the General Assembly (A/73/809), U.N. Secretary-General (SG) AntÃ³nio Guterres noted an increase in the number of peacekeeping missions that are frequently cash constrained due to member state payment patterns and arrears, and \"structural weaknesses\" in peacekeeping budget methodologies, including inefficient payment schedules and borrowing and funding restrictions. These issues have led to some cash shortages, delays in reimbursements to some troop contributing countries (TCCs), and increased risks to \"not only the functioning of its [U.N.] peacekeeping operations but also the people who serve in difficult environments.\" Ongoing difficulties in paying for peacekeeping operations could have implications for the internal stability of top African TCCs, which may view U.N.-funded troop salary reimbursements as a tool to reward and/or placate their large and potentially restive militaries. To help address the aforementioned issues, SG Guterres proposed several reforms that have been implemented or are under consideration by U.N. member states. The extent to which these efforts might improve the peacekeeping financial situation remains to be seen. Congress authorizes and appropriates U.S. contributions to U.N. peacekeeping. Some Members have expressed an ongoing interestâvia legislation, oversight, and public statementsâin ensuring that such funding is used as efficiently and effectively as possible.Â U.S. assessed contributions to U.N. peacekeeping operations are provided primarily in annual State, Foreign Operations, and Related Programs (SFOPS) appropriations bills through theÂ Contributions for International Peacekeeping ActivitiesÂ (CIPA) account. Congress has often debated the level and impact of U.S. funding for U.N. peacekeeping. In the early 1990s, the U.S. peacekeeping assessment was over 30%, which many Members of Congress found too high. In 1995, Congress set a 25% cap on funding authorized after 1995. Over the years, the gap between the actual U.S. assessment and the cap has led to shortfalls in peacekeeping funding. The State Department and Congress have often covered these shortfalls by raising the cap for limited periods through SFOPS appropriations measures, and allowing for the application of U.N. peacekeeping credits (excess U.N. funds from previous peacekeeping missions) to fund outstanding U.S. balances. During the Obama Administration, these actions allowed the United States to pay its assessments to U.N. peacekeeping missions in full. Congress has elected not to temporarily raise the cap since FY2016. In addition, since mid-2017, the Trump Administration has allowed for the application of peacekeeping credits up to, but not beyond, the 25% cap. As a result, the State Department estimates that the United States accumulated more than $700 million in cap-related arrears through the CIPA account in FY2017, FY2018, and FY2019 combined (in addition to other peacekeeping arrears). These are distributed across U.N. operations, including those in Africa. The Trump Administration has voted for the renewal and funding of existing U.N. peacekeeping operations. At the same time, it has been critical of overall and Africa-specific U.N. peacekeeping activities and called for a review of operations to ensure that they are \"fit for purpose\" and more efficient and effective. Most recently, the Administration's FY2020 budget proposed $1.13 billion for U.N. peacekeeping operations, a 27% reduction from the enacted FY2019 level of $1.55 billion (see Table 1 for a breakdown by African operations). The proposal states the Administration's \"commitment to seek reduced costs by reevaluating the mandates, design, and implementation\" of missions and to sharing the cost burdens \"more fairly\" among countries. In addition to its assessed contributions, the United States supports African troop and police contributors by providing training and equipment on a voluntary, bilateral basis. The State Department's Global Peace Operations Initiative (GPOI) is one key source of funding for such support, funded through the SFOPS Peacekeeping Operations (PKO) account as well as ad hoc regional funding allocations. The State Department also provides police assistance through its International Narcotics Control and Law Enforcement (INCLE) account. U.S. support for expanding or maintaining individual U.N. peacekeeping operations in Africaâor for approving new operations in response to emerging conflicts on the continentâhas fluctuated over time. During the Obama Administration, the United States backed new operations in the Central African Republic (CAR) and Maliâboth times at the urging of France, an ally and fellow permanent member of the U.N. Security Councilâwhile overseeing the closure of long-standing operations in Liberia and CÃ´te d'Ivoire as those countries stabilized in the aftermath of internal conflicts. U.N. Security Council members have not formally proposed new U.N.-conducted operations in Africa during the Trump Administration to date, although some have voiced support for authorizing U.N. assessed contributions and/or logistical support for an ongoing African-led operation in the Sahel region (see \"African-led operations\" below). Despite shifts in policy and on the ground, several overarching policy issues and debates continue to arise regarding U.N. peacekeeping in Africa. These fall into several categories discussed below. Civilian p rotection m andate fulfillment . Policymakers have debated what changes, if any, can or should be made to enable U.N. peacekeeping operations in Africa to fulfill mandates to protect civilians. This issue has been particularly salient with regard to MONUSCO (in DRC) and MINUSCA (in CAR). Both missions' mandates place a high emphasis on civilian protection amid ongoing conflicts and severe logistics and personnel protection challenges. Armed groups have repeatedly massacred civilians at close proximity to U.N. operating sites. Restrictions (or \"caveats\") imposed by troop-contributing countries on their forces' deployments, often attributable to force protection concerns, may imp ede civilian protection efforts in some cases. Mass atrocities . Some experts and observers have debated whether U.N. peacekeeping operations are an effective tool for preventing or addressing mass atrocities. U.S. support for MINUSCA's creation was nested within a high-level effort to prevent further mass atrocities in CAR; fulfilling this goal has proven challenging. In Mali, militias have engaged in a spate of civilian massacres in the center of the country, a region that was largely outside the purview of MINUSMA until the 2019 mandate renewal (as discussed below). Role of host governments . A key challenge is how and to what extent U.N. peacekeeping operations should pursue positive working relationships with host governments whose interests may not align with international stabilization efforts. In practice, peacekeeping personnel may require approvals from host governments to acquire entry visas or access certain parts of the country, for example. Pursuit of positive relations may, however, undermine perceptions of U.N. neutrality or trustworthiness in the context of an active conflict and/or state abuses. U.N. operations in CAR, DRC, and Mali, among others, are mandated to support the extension of state authority, although state security forces are a party to internal conflicts. These same U.N. missions are also tasked with facilitating peace talks between the government and rebel groups. Operations in Sudan and South Sudan have faced obstructions and threats from government officials and security forces, and the role of state security forces in attacks on civilians complicates the missions' civilian protection and reporting mandates. Counter t errorism . Some policymakers have questioned what role, if any, U.N. peacekeeping operations should play in addressing transnational terrorism in Africa. This debate has repeatedly arisen in the context of Mali, and may become relevant in other places (such as DRC, where the Islamic State has claimed ties to a local militia group). Despite calls from the Malian government and other regional leaders, the Security Council has declined to mandate MINUSMA explicitly to conduct counterterrorism operations, notwithstanding the mission's civilian protection and stabilization mandates. Sexual exploitation and abuse by U.N. peacekeepers . Members of Congress have demonstrated an ongoing interest in how the United Nations might better address sexual abuse and exploitation by U.N. peacekeepersâparticularly in MONUSCO and MINUSCA, which have the highest rates of substantiated allegations of sexual abuse and exploitation. Congress has enacted several provisions to address the issue. For example, SFOPS bills since FY2008 have prohibited the obligation of U.N. peacekeeping funding unless the Secretary of State certifies that the United Nations is implementing effective policies and procedures to prevent U.N. employees and peacekeeping troops from engaging in human trafficking, other acts of exploitation, or other human rights violations. African troop-contributing countries (TCCs) . Experts and policymakers have debated the advantages and drawbacks of relying on African countries to contribute the bulk of military and police personnel to U.N. peacekeeping operations in Africa. African troop contributors may be willing, but they often display capacity shortfalls and/or poor adherence to human rights standards. For example, in CAR, in a single year (2016), peacekeepers from the Republic of Congo and DRCâamong othersâwere implicated in the abuse of minors, while Burundi's police contingent was repatriated due to abuses by its police services at home. In Mali, which has been the deadliest environment for U.N. peacekeepers since MINUSMA's establishment, top troop contributors include Burkina Faso, Chad, Senegal, and Togoâwhich are among the world's poorest countries. Moreover, troop contributors that border the host country may have bilateral political interests that complicate their participation in peacekeeping operations. Some countries may also wield their contributions to such missions to deflect international criticism of their domestic political conditions. African-led operations . How and whether to fund and sustain African-led regional stabilization operations in lieu of, or as a complement to, U.N. peacekeeping operations has been debated in U.N. fora, in Africa, and among U.S. policymakers. Stabilization operations initiated by the African Union (AU) or sub-regional organizations are often superseded by U.N. peacekeeping missions. While African regional organizations can authorize rapid military interventions, they are generally unable to finance or sustain them, and donor governments may be reluctant to fund them over long periods. AMISOMâestablished in 2007 and mandated to take offensive action in support of Somalia's federal government and against Islamist insurgentsâhas remained the sole African-led military intervention to benefit from a U.N. support operation funded through assessed contributions. At times, U.N. and AU officials, France (a permanent Security Council member), and African heads of state have proposed a similar mechanism for other regional missions (notably in the Sahel), but successive U.S. Administrations have declined to support such proposals, preferring to provide funding on a voluntary and bilateral basis. In recent years, the AU has sought the use of U.N. assessed contributions to help fund its operations directly (see text box ). The following sections provide background on each active U.N. peacekeeping operation in Africa, including U.S. policy and key issues. Operations are presented in reverse chronological order of their establishment by the U.N. Security Council (starting with most recently authorized). The Security Council established the U.N. Multidimensional Integrated Stabilization Mission in CAR (MINUSCA) in 2014 in response to a spiraling conflict and humanitarian crisis in the country. The crisis began in 2013 when a largely Muslim-led rebel coalition seized control of the central government; largely Christian- and animist-led militias emerged in response and brutally targeted Muslim civilians, resulting in a pattern of killings and large-scale displacement that U.N. investigators later termed \"ethnic cleansing.\" MINUSCA absorbed a preexisting African intervention force, as well as a U.N. political mission in CAR. Although CAR returned to elected civilian-led government in 2016, rebel groups continue to control most of the countryside. Armed factions have continued to kill and abuse civilians, often along sectarian and ethnic lines. Whether a peace accord signed in early 2019 will bring greater stability remains to be seen. MINUSCA is currently mandated to protect civilians, support the extension of state authority, assist the peace process, and protect humanitarian aid delivery, among other tasks. It also has an unusual mandate to pursue \"urgent temporary measures ... to arrest and detain in order to maintain basic law and order and fight impunity,\" under certain conditions. The mission has employed this authority against several militia leaders, with mixed effects on local security dynamics. Localized dynamics on the ground and a lack of domestic security force capacity also have stymied progress on stabilization. An analysis in late 2018 by nongovernment organizations attributed tenuous security improvements in parts of the country to MINUSCA's \"robust military operations,\" as well as to its civilian-led support to local peacebuilding and disarmament efforts, while noting that \"MINUSCA is neither authorized nor well-placed to use force with the objective of eliminating armed groups.\" In 2018, U.N. sanctions monitors issued a scathing assessment of a joint operation by MINUSCA and local security forces in the majority-Muslim \"PK5\" enclave of Bangui that aimed to dismantle a local militia. The sanctions monitors asserted that the operation had failed while also triggering intercommunal tensions and deadly clashes. Despite nearly reaching its full authorized troop ceiling, MINUSCA continues to exhibit operational capacity shortfalls, which the Security Council has attributed to \"undeclared national caveats, lack of effective command and control, refusal to obey orders, failure to respond to attacks on civilians, and inadequate equipment.\" Force protection is a challenge: 35 MINUSCA personnel have been killed in \"malicious acts\" to date. (CAR is also one of the world's deadliest countries for aid workers.) Continued violence has fueled local frustrations with MINUSCA's perceived ineffectivenessâas has a sweeping sexual abuse scandal implicating multiple MINUSCA contingents, as well as French troops deployed under national command. Hostility has also been driven by government officials who oppose an enduring U.N. arms embargo on the country, as well as \"demagogic\" actors who seek to discredit international forces and destabilize the government. In April 2018, demonstrators placed 17 corpses outside MINUSCA headquarters to protest alleged killings of civilians during the aforementioned troubled joint operation with local security forces in the PK5 enclave. Despite initial skepticism, the Obama Administration ultimately supported MINUSCA's establishment as part of its efforts to prevent mass atrocities in CAR. The Trump Administration has maintained support to date, and in 2017 backed a troop ceiling increase of 900 military personnel. The State Department's FY2020 budget request projects that \"the role and size of MINUSCA will likely remain unchanged until the government gains the capacity to fully assume its responsibilities to protect civilians, ensure the viability of the state, and prevent violence.\" The Security Council established the U.N. Multidimensional Integrated Stabilization Mission in Mali (MINUSMA) in 2013 after state institutions collapsed in the face of an ethnic separatist rebellion in the north, a military coup, and an Islamist insurgent takeover of the north of the country. The mission absorbed a short-lived African intervention force and U.N. political mission. France also had launched a unilateral military intervention in early 2013 to free northern towns from Islamist militant control, and pressed for both the African-led mission and the transition to a U.N.-conducted operation. MINUSMA was initially mandated to support Mali's transitional authorities in stabilizing \"key population centers,\" support the extension of state authority throughout the country, and prepare for elections, in addition to protecting civilians and U.N. personnel, promoting human rights, and protecting humanitarian aid, among other tasks. Civilian protection was elevated within the mandate in 2014, as was support for the launching of \"an inclusive and credible negotiation process\" for northern Mali, following a ceasefire between the government and separatist rebels and elections in late 2013. After the government and two northern armed group coalitions signed a peace accord in 2015, the Security Council deemed support for implementation of the accord to be the mission's top priority. As of mid-2019, the peace agreement remains largely un-implemented, while the Islamist insurgency (excluded from the peace process by design) has expanded into previously government-controlled central Mali, as well as neighboring Burkina Faso and, to a lesser extent, Niger. Since 2017, observers have raised alarm over a spate of civilian massacres in the center, attributed to state security forces and to ethnically based militias (some of which appear to have ties to state elements), which may constitute \"ethnic cleansing.\" Renewing MINUSMA's mandate in June 2019, the Security Council decided that the mission's \"second strategic priority,\" after support for implementation of the 2015 accord, would be to \"facilitate\" a future Malian-led strategy to protect civilians, reduce intercommunal violence, and reestablish state authority in the center of the country, followed by other tasks (Resolution 2480). Unlike most U.N. peacekeeping operations in Africa, MINUSMA includes sizable Western contingents, including from Canada (134), Germany (381), the Netherlands (116), Norway (92), and Sweden (253). The countries contributing the largest uniformed contingents (>1,000 each), however, are nearby (Burkina Faso, Chad, Senegal, Togo) or major global peacekeeping troop contributors (Bangladesh, Egypt). MINUSMA is the world's deadliest current U.N. peacekeeping operation, with 126 personnel cumulatively killed in \"malicious acts\" (roughly 20 per year on average), including at least 20 in the first half of 2019. African contingents have borne the brunt of these fatalities (112 of 126 deaths). In 2013, U.N. policy debates over MINUSMA's establishment centered on the wisdom of authorizing a peacekeeping mission in the context of threats from transnational Islamist terrorist organizations, namely, Al Qaeda in the Islamic Maghreb and its local affiliates and offshoots. Policymakers debated, in particular, whether U.N. personnel would be adequately protected and whether a U.N. operation could or should be given a counterterrorism mandate. Ultimately, MINUSMA was not given an explicit mandate to conduct counterterrorism or counterinsurgency operations. France, meanwhile, has maintained troops in the country as a de facto parallel force to target terrorist cells, a mission for which the U.S. military provides direct logistical support. Malian and other African leaders (backed by France, at times) have repeatedly called for U.N. assessed contributions to provide funding and sustainment for a regional counterterrorism force, most recently the \"G5 Sahel joint force\" initiative launched by Mali and neighboring states in 2017. U.N. Secretary-General Guterres, for his part, has urged the Security Council to establish a U.N. support office, funded through assessed contributions and independent of MINUSMA, to provide logistics and sustainment to a G5 Sahel force. Successive U.S. Administrations have opposed such proposals, citing a preference for voluntary and bilateral support as opposed to assessed contributions. UNISFA was authorized by the U.N. Security Council on the eve of South Sudan's independence in June 2011, in an effort to mitigate direct conflict between Sudan and South Sudan at a prominent disputed area on their border. The mission's mandate originally focused only on Abyei, a contested border territory and historic flashpoint for conflict that was accorded special semi-autonomous status in the 2005 Comprehensive Peace Agreement (CPA) between Sudan's government and southern rebels. The mandate was expanded in late 2011 to support broader border security arrangements between the two countries, including a Joint Border Verification and Monitoring Mechanism (JBVMM), which the CPA signatories agreed to establish to monitor the full Sudan-South Sudan border. UNISFA's deployment to Abyei defused a violent standoff between the two countries' militaries, but tensions among local communities still have the potential to destabilize the border. Under the CPA, the residents of Abyei were to vote in a referendum in 2011 on whether the area should retain its special status in Sudan or join South Sudan, but an officially sanctioned process has yet to occur. The final status of Abyei is likely to remain unresolved until Sudan and South Sudan negotiate a solution. The April 2019 ouster of Sudan's President Omar al Bashir and the unfolding political transition may affect the situation in Abyei and other border areas. UNISFA was most recently reauthorized in May 2019, through November 15, 2019. The Security Council directed the mission to reduce its troop presence to 2,965 by October 2019 (from 4,140 previously authorized), while increasing the number of authorized police from 345 to 640. UNISFA's policing function to date has been hamstrung by Sudan's limited issuance of visas for police personnel. UNISFA is almost entirely composed of personnel from neighboring Ethiopia, based on a 2011 agreement between Sudan and South Sudan to demilitarize the area and allow Ethiopian monitors. There have been 36 UNISFA fatalities since 2011, with eight due to \"malicious acts.\" The most recent peacekeeper fatality occurred in July 2019, when unidentified gunmen attacked a market. The U.N. Security Council has pressed, unsuccessfully, for the establishment of a temporary local administration and police service to maintain order in Abyei until a final political settlement is reached. The absence of a local administration, combined with the presence of armed elements and sporadic intercommunal violence, continues to drive humanitarian needs. UNISFA helps to maintain law and order in the absence of local police, and it engages in efforts to reduce intercommunal conflict. UNISFA's presence and its conflict prevention and mitigation efforts have reportedly helped to defuse tensions during the annual migrations of an estimated 35,000 Misseriya (a nomadic group) and their cattle south through Abyei. The mission also confiscates and destroys weapons and facilitates mine clearance. UNISFA has yet to operationalize its human rights monitoring mandate because of Sudan's nonissuance of visas, and because its facilitation of humanitarian aid has been limited by Sudanese restrictions on aid agencies' operations, aid funding shortfalls, and South Sudan's war. With regard to UNISFA's border security role, Sudan and South Sudan took limited action to stand up the JBVMM in the mission's early years, but there has been recent progress, possibly reflecting warming relations between the two countries. The United States, which served as a facilitator and guarantor of the CPA, has historically placed a high priority on peace between Sudan and what is now South Sudan. In mid-2011, when Sudanese troops and allied militia seized Abyei after its referendum was postponed, the Obama Administration declared the move to be an invasion of area and thus a violation of the CPA. The Security Council similarly condemned Sudan's \"taking of military control\" of Abyei and authorized UNISFA. Sudan's army subsequently withdrew as UNISFA deployed, and the mission's presence has since been seen as a deterrent to conflict between the two countries' forces. While relations between Sudan and South Sudan have improved in recent years, the instability in South Sudan and Sudan's Southern Kordofan state poses risks, and the political transition in Sudan creates further uncertainty regarding stability in the region. U.S. officials have previously expressed concern that the mission has continued longer than intended and that both Sudan and South Sudan have taken advantage of the relative stability its peacekeepers provide. UNMISS was established on July 9, 2011, the date of South Sudan's independence from Sudan. It replaced the U.N. Mission in Sudan (UNMIS), which had supported implementation of the peace deal that ended Sudan's north-south civil war. UNMISS, currently authorized through March 2020, is currently the U.N.'s second largest peacekeeping mission ( Figure 1 ). UNMISS was established with the aim of consolidating peace and security in the world's newest country, and helping to establish conditions for development after decades of war. The outbreak of a new internal conflict in December 2013, however, fundamentally changed the mission and its relationship with the host government. The war, now in its sixth year, has displaced more than 4 million people, and by some estimates over 380,000 people have been killed, including at least 190,000 in violent deaths. Shortly after the fighting began, the U.N. Security Council authorized an expansion of the mission from its prewar level of 7,000 troops and 900 police. Months later, as early mediation efforts failed to stop the conflict, the Security Council modified the UNMISS's mandate in Resolution 2155 (2014). As a result, the mandate changed from one that had supported peace-building, state-building, and the extension of state authority to one that sought strict impartiality in relations with both sides of the conflict, while pursuing four key tasks under a Chapter VII mandate: protecting civilians, monitoring and investigating human rights abuses, facilitating conditions conducive to aid delivery, and supporting a ceasefire monitoring. The Security Council again increased UNMISS's force size after the warring sides signed a peace deal in August 2015, and added to its mandate the task of supporting implementation of the peace agreement. The opposing parties formed a new Transitional Government of National Unity (TGNU) in April 2016, but the arrangement collapsed in July 2016, and the war resumed. The Security Council, in an effort to create conditions under which the opposition could safely return to the capital and revive the peace deal, authorized another increase to UNMISS's troop ceiling, to include a Regional Protection Force (RPF), with up to 4,000 troops to be drawn from East African countries. The tasks of the RPF were to include, among others, providing a secure environment in and around the capital of Juba, with the ability to be deployed \"in extremis\" elsewhere as needed. South Sudan's government objected to the RPF's mandate and resisted its deployment; meanwhile, the war spread and the number of armed groups proliferated. When the conflict began, UNMISS bases became shelters for tens of thousands of civilians fleeing the fighting and ethnically targeted attacks. As of September 2019, more than 180,000 people were still sheltering at five basesâalso known as Protection of Civilian (POC) sitesâincluding roughly 30,000 at the U.N. base in Juba. This is an unprecedented situation for a U.N. peacekeeping mission, and several of the sites, never intended for long-term settlements, feature living conditions that do not meet refugee camp standards. UNMISS has struggled to protect civilians within and around the POC sites, and responsibility for security of those locations limits its ability to protect civilians and humanitarian workers elsewhere. Nevertheless, U.N. officials and others suggest that thousands of civilians would be dead if not for UNMISS. Many of those sheltering at the sites reportedly fear being targeted based on their ethnicity if they leave. Access restrictions and bureaucratic obstruction further stymie the mission's capacity. UNMISS relations with the government have been tense since the war began, and South Sudanese officials have periodically stoked anti-U.N. sentiment based on misperceptions of the mission's role and allegations of partiality. U.N. bases have been attacked on several occasions, and mortar and crossfire have resulted in the deaths of civilians and U.N. staff in the bases. To date, 14 peacekeepers have been killed in \"malicious acts.\" Two U.N. helicopters have been shot down in South Sudan, at least one of them by the army. The role of government forces in violence against civilians severely complicates UNMISS's civilian protection mandate, given the mission's reliance on the consent of the host government to operate. In September 2018, South Sudan's two largest warring factionsâthose of President Salva Kiir and his rival, Riek Macharâsigned a new peace deal. Experts debate whether the deal is a viable framework for sustainable peace. The International Crisis Group (ICG) contends that, at minimum, \"it is not a finished product and requires revision, a reality that mediators are not yet ready to admit.\" Implementation of the agreement is significantly behind schedule: the planned formation of a new unity government, delayed from May to November 2019, is in question as concerns about the accord's security arrangements remain unaddressed. The 2018 ceasefire has reduced the fighting in most parts of the country, but clashes continue in some areas, and U.N. reports document \"the continued use of conflict-related sexual violence by the warring parties and \"targeted\" attacks on civilians, notably those \"perceived to be associated with opposition groups.\" Amid mounting concerns that this latest deal could collapse, ICG (among others) argues that international pressureâincluding from the United States, which played a key role in supporting South Sudan's independence and is the \"penholder\" on the situation in the Security Councilâmay be critical to preventing a return to full-scale war. UNAMID was first authorized in 2007, to succeed the African Union Mission in Sudan (AMIS), which deployed in 2004 in response to the unfolding crisis in Darfur, an area roughly the size of France. When UNAMID was established, it was authorized to have a significantly larger force than AMISâalmost 26,000 personnel initially, including 19,555 troopsâwith a Chapter VII mandate to protect U.N. personnel, aid workers, and civilians, and to support implementation of a 2006 peace deal. The Security Council also tasked UNAMID with monitoring and conflict mitigation responsibilities. UNAMID is the first, and to date only, hybrid peacekeeping operation, with a U.N. chain of command but dual selection and reporting procedures. (Sudan rejected a regular U.N. mission; a U.N.-AU hybrid was the compromise, with most of the troops drawn from African countries.) By 2011, at almost 90% of its authorized strength, it was one of the largest peacekeeping missions in history. UNAMID has faced pressures from multiple fronts, and has been described by some as \"a mission that was set up to fail.\" The government of former President Omar al Bashir (ousted in April 2019) obstructed its operations and long pressed for its exit. Observers have periodically questioned the mission's credibility, amid allegations that it has self-censored reporting on state-backed crimes against civilians and peacekeepers and understated the level of ongoing violence. In 2009, a declaration by the outgoing head of UNAMID that the war in Darfur was overâwhile violence continuedâdrew concern from human rights groups and other observers. In 2013, the mission's spokesperson resigned, accusing UNAMID of a \"conspiracy of silence\"; a subsequent U.N. investigation found the mission had underreported and purposefully withheld information from U.N. headquarters concerning attacks by Sudanese forces on civilians and peacekeepers. The Bashir government periodically denied flight clearances and restricted the movement of UNAMID patrols. Access denials, along with insecurity, have long impeded humanitarian operations, and some parts of Jebel Marra, a rebel stronghold, remain inaccessible. Bureaucratic delays, including in the issuance of visas, have also impeded operations. The mission has faced other challenges, ranging from shortfalls in critical equipment and aviation assets to a hostile environment. There have been over 270 UNAMID fatalities since the mission began, with 73 deaths attributed to \"malicious acts.\" In 2013, the U.N. Panel of Experts suggested that the \"lack of a deterrent\" against attacks on peacekeepers and humanitarian aid workers \"may be a contributing factor to the persistence of this phenomenon.\" Over the years, the panel has recommended, unsuccessfully, that several individuals and groups deemed responsible for attacks be sanctioned. The Security Council has made no sanctions designations since 2006. The United States has not designated individuals under its Darfur sanctions regime (E.O. 13400) since 2007. The Security Council has reconfigured and gradually reduced UNAMID's mandate and mission since 2014, transferring some of its tasks to the U.N. country team. The country team's limited presence, capacity, and resources, however, have limited its ability to take on new responsibilities. Under pressure from Sudan's government for an exit strategy, the Security Council approved a reduction of troops in 2017, despite criticism from groups like Human Rights Watch that the cuts reflected a \"false narrative about Darfur's war ending\" (see below). Some independent experts suggest that the West suffers from \"Darfur fatigue\" and contend that flagging political will and pressure to cut peacekeeping budgets have driven decisions on UNAMID's exit, tentatively set under Resolution 2429 (2018) for June 30, 2020. Meanwhile, the Council has declared the mission's exit to be contingent on the security situation and progress on specified benchmarks. Over a decade after UNAMID's deployment, peace talks have not resolved Darfur's conflicts. The level of fighting subsided after a major government offensive in early 2016 gave the military dominance in the region. The government subsequently declared a ceasefire to which, per U.S. officials, it has largely adhered, contributing to the Administration's decision to lift some sanctions on Sudan in 2017. Recent U.N. reporting gives a mixed picture of the security situation. A joint U.N.-AU strategic review in 2018 concluded that Sudan's military gains since 2016 had led to the \"consolidation of State authority across Darfur,\" with conditions now described as \"lawlessness and criminality, aggravated by a protracted humanitarian crisis, continued human rights violations and the lack of development.\" A U.N. Secretary-General's report in April 2019 described the security situation in the region as \"relatively stable,\" with the exception of Jebel Marra, where clashes continued and where a January 2019 U.N. Panel of Experts report suggested the government had waged large-scale military operations against rebels in 2018. Some rebels reportedly fled to Libya to rebuild their military capacity for possible return to Sudan. The Secretary-General's report also described serious intercommunal violence, attacks on civilians, and ongoing abuses by government forces as \"an obstacle to lasting peace.\" The scale of displacement in Darfur has changed little in recent years: over 1.7 million people remain internally displaced, most of them in camps, and over 340,000 refugees are in Chad. In the wake of President Bashir's overthrow in April 2019, a joint U.N.-AU assessment team noted a spike in violence in several camps for internally displaced persons (IDPs). Their report suggested, though, that Darfur had generally \"evolved into a post-conflict setting.\" The team submitted that the new political dynamics did not warrant a change of the June 2020 exit date and that conditions had been met for the drawdown to proceed, albeit gradually, with the mission transitioning from peacekeeping to peacebuilding. Several incidents suggest security conditions for U.N. and aid operations in Darfur worsened in mid-2019, however. In May, UNAMID's West Darfur headquarters was looted on the eve of its scheduled handover to Sudanese authorities; military and police personnel were implicated in the incident. In June, humanitarian relief facilities in South Darfur were looted and vandalized. The United Nations has reported that most of the facilities that UNAMID has closed as part of its drawdown have been occupied by state security forces. (The sites were supposed to be handed over to the government to be used for civilian purposes.) An internal UNAMID review of 10 closed sites indicated that nine were being used specifically by the paramilitary Rapid Support Forces (RSF), which have been implicated in human rights abuses. In June, the military leaders who seized power from Bashir demanded that remaining UNAMID bases be transferred to the RSF. The AU rejected the order, which was subsequently reversed. It is unclear whether the RSF has vacated the locations. U.N. human rights officials reported in June 2019 that the human rights situation in Darfur had deteriorated, with increased reports of killing, abduction, sexual violence, and other abuses. The AU Peace and Security Council determined at that time that the \"drastic change on security and political developments â¦ has contributed to the deterioration of the security situation in Darfur,\" and called for remaining peacekeepers to be consolidated until the situation stabilized. Amnesty International, which has argued against UNAMID's closure, suggests doing so would \"recklessly and needlessly place tens of thousands of lives at risk by removing their only safeguard against the government's scorched earth campaign.\" On June 27, the U.N. Security Council voted to pause the drawdown until October 31, with roughly 4,200 troops and 2,300 police remaining in Darfur as of July 31. It is difficult to predict how the situation in Darfur may evolve in the next year, as UNAMID's prescribed June 2020 exit date approaches. Arguably the most powerful figure among the security officials who seized power from Bashir is RSF commander Mohamed Hamdan Dagalo, aka \"Hemeti,\" a former Janjaweed militia leader from Darfur. By some accounts, his forces have sought to expand their control in Darfur, and since Bashir's ouster they have been implicated in the killing of dozens of Darfuri civilians. He now holds a senior position in the new transitional government, and how he may influence the prospects for peace is subject to debate. Sudan's new reform-oriented prime minister has identified making peace with the country's insurgent groups as his top priority. As that process begins, in the context of a fragile transition, Sudanese, U.N., and AU officials are set to begin discussions on the future of U.N. peacekeepers in Darfur, and on whether a follow-on mechanism to UNAMID may be appropriate. The currently largest U.N. peacekeeping operation originated as a response to the civil and regional conflict in the Democratic Republic of Congo (DRC) in the late 1990s. In 2010, the Security Council established the U.N. Organization Stabilization Mission in DRC (MONUSCO) to succeed the U.N. Organization Mission in DRC (MONUC, established in 1999), following the conclusion of a formal post-conflict transitional period in DRC. MONUSCO's mandate has generally prioritized the protection of civilians and the extension of state authority in eastern DRC, where multiple armed groups remain active. Other enduring tasks include the protection of U.N. personnel and facilities, support for demobilization of rebel combatants, and support for institutional and security sector reforms. Since 2018, MONUSCO has provided \"life-saving logistics support to the Ebola response\" in the context of the ongoing Ebola outbreak in eastern DRC, according to U.S. officials. In mid-2019, a top MONUSCO official, U.S. citizen David Gressly, became the U.N. Emergency Ebola Response Coordinator, tasked with leading a \"strengthened coordination and support mechanism in the epicenter\" of the outbreak zone. Since 2013, the Security Council has authorized an \"intervention brigade\" within MONUSCOâconsisting of three infantry battalions, one artillery company, and one special force and reconnaissance companyâto disarm rebel groups, including via unilateral and/or offensive operations. The intervention brigade has conducted such operations periodically, but the scope of its activity has been limited by troop contributors' evolving perceptions of their own national security interests in DRC, as well as capacity gaps. Observers have debated whether the concept could be a model for other situations, such as South Sudan and Mali. More broadly, human rights groups allege that MONUSCO forces have repeatedly failed to protect civilians from attacks by armed groups. Such instances may be attributed to multiple factors, including competing tasks, logistical challenges, a lack of capacity and political will among troop contributors, and the role of state actors in violence and their limited commitment to improve stability. MONUSCO personnel also have repeatedly been implicated in sexual abuse and exploitation. Between 2016 and 2018, a surge in political violence in major cities due to election delays placed new strains on the mission, as did the emergence of new conflicts in previously stable regions. Emergent, if nebulous, links between an opaque armed group in eastern DRC and the Islamic State organization may present further challenges. In 2015 and 2016, the Obama Administration successfully sought to preserve MONUSCO's troop ceiling in the lead-up to DRC's turbulent election period, despite pressure from the DRC government, U.N. officials, and some other Security Council members to decrease troop levels. In 2017, with elections pending, the Trump Administration shifted tack and secured a decrease in MONUSCO's troop ceiling, asserting that the mission was propping up a \"corrupt\" government in Kinshasa. The U.N. Secretary-General reported in 2017 that MONUSCO had pursued reforms to \"yield efficiencies,\" but called for governments to \"exercise caution in making further cuts to the Mission's budget that may compromise its ability to deliver on its core priorities.\" U.S. diplomats did not openly pursue, and the Security Council did not adopt, a troop ceiling decrease in the 2018 or 2019 mandate renewals. In March 2019, as DRC underwent a partial political transition following the delayed elections, the Security Council extended MONUSCO's mandate and troop ceiling for nine months and called for an independent strategic review of the mission, including the articulation of an \"exit strategy.\" The State Department's FY2020 budget request asserts that MONUSCO forces \"may begin drawing down in FY2020 as the DRC government assumes greater responsibility for security throughout the country.\" The budget request predated an explosion of Ebola cases in eastern DRC and the U.N.'s stepped-up role in response efforts. U.N. budget negotiations in mid-2019 produced a significant reduction in MONUSCO's civilian personnel and the closure of offices in various areas. Morocco claims sovereignty over the whole of Western Sahara and administers some 85% of it, while the Polisario Front, which is hosted and backed by Algeria, seeks independence for the territory. Security Council Resolution 690 established the U.N. Mission for the Organization of a Referendum in the Western Sahara (MINURSO) in 1991 in the context of a cease-fire and peace settlement roadmap agreed to by Morocco and the Polisario. At the time of MINURSO's establishment, the Security Council called for a referendum to offer Sahrawisâthe indigenous inhabitants of Western Saharaâa path to \"self-determination.\" However, successive U.N. efforts to advance a referendum or other resolution options did not obtain the backing of one or both parties (Morocco and the Polisario), and/or of the Security Council. In the absence of a final settlement, the Security Council has maintained MINURSO to observe the 1991 ceasefire. The Security Council has not explicitly referred to a referendum in over a decade, instead calling for Morocco and the Polisario to engage in talks \"without preconditions\" to achieve a \"mutually acceptable\" resolution to the stand-off. Morocco has offered autonomy under Moroccan sovereignty as the only basis for negotiations, while the Polisario continues to call for a referendum on independence. Neither side has shown an interest in compromise. Military tensions escalated in 2016 and again in 2017 as Moroccan and Polisario forces reportedly entered the demilitarized \"buffer zone.\" MINURSO's uniformed component consists almost entirely of military observers, who are unarmed. It is not a multidimensional mission in the mold of more recently authorized operations. In 2013, U.S. diplomats reportedly expressed support for adding human rights monitoring to the mission's mandateâwhich Morocco ardently opposesâprompting Morocco to expel hundreds of U.S. military personnel who were conducting an annual joint exercise in the country. In 2016, Morocco expelled MINURSO civilian staff in response to remarks by then-U.N. Secretary-General Ban Ki-moon referring to Morocco's \"occupation\" of the territory. Some staff, but not all, later returned to the territory. Successive U.S. Administrations appear to have judged that maintaining MINURSO is a relatively small price to pay for preventing a renewed conflict that could draw in other countries in the region. The Trump Administration has maintained support for U.N.-facilitated talks, while also seeking to increase pressure on the parties by shortening MINURSO's mandate renewals from one year to six months. This policy approach was closely associated with former National Security Advisor John Bolton, who has long expressed skepticism of MINURSO and advocated international pressure on Morocco to make concessions. Bolton's stance appeared to contribute to some momentum toward U.N.-facilitated talks in 2018, albeit without clear progress toward a settlement. The U.N. Secretary-General's then-Personal Envoy on the Western Sahara, Horst KÃ¶hler, convened \"roundtable\" talks among Morocco, the Polisario, Algeria, and Mauritania in December 2018âthe first time official representatives of Morocco and the Polisario had met since 2012âand again in March 2019, but no breakthrough was announced. In May 2019, KÃ¶hler unexpectedly announced his resignation, citing health reasons. This development, combined with ongoing political instability in Algeria, has injected new uncertainty into the political process. Members of Congress have examined U.N. peacekeeping operations as a core element of U.S.-Africa policy, and in the context of overarching appropriations and oversight activities. Congressional deliberations on FY2020 SFOPS appropriationsâin the context of the Administration's proposal to cut U.S. funding for U.N. peacekeeping overall, and for the Africa missions in particularâhave coincided with U.N. Security Council consideration of potentially significant changes to the mandates of several missions, including in Mali, Darfur (Sudan), and DRC, due to evolving conditions on the ground. The Senate Appropriations Committee report on the FY2020 Department of State, Foreign Operations, and Related Programs Appropriations Bill (released on September 18, 2019), leads with the observation that: Weak governance and conflict in Africa, the Middle East, and Central and South America are causing historically unprecedented population movements as refugees and internally displaced persons [IDPs] seek safer lives. [â¦] The humanitarian requirements of the United Nations [UN] and other entities to address this global emergency have consistently exceeded the willingness and generosity of donors to respond. As Congress continues to shape the U.S. approach toward peacekeeping missions' mandates and budgets, it may consider issues such as: how and whether U.N. peacekeeping operations in Africa align with U.S. foreign policy priorities in the region and in individual countries; the impact that decisions on U.S. funding for peacekeeping may have on these countries, and the relative cost of other potential U.S. responses; and the role of other donors and actors in responding to security crises in Africa.", "summary": "Many Members of Congress have demonstrated an interest in the mandates, effectiveness, and funding status of United Nations (U.N.) peacekeeping operations in Africa as an integral component of U.S. policy toward Africa and a key tool for fostering greater stability and security on the continent. As of September 2019, there are seven U.N. peacekeeping operations in Africa: the U.N. Multidimensional Integrated Stabilization Mission in the Central African Republic (MINUSCA); the U.N. Multidimensional Integrated Stabilization Mission in Mali (MINUSMA); the U.N. Interim Security Force for Abyei (UNISFA); the U.N. Mission in South Sudan (UNMISS); the U.N. Organization Stabilization Mission in the Democratic Republic of the Congo (MONUSCO); the African Union-United Nations Mission in Darfur (UNAMID); and the U.N. Mission for the Organization of a Referendum in Western Sahara (MINURSO). The United States, as a permanent member of the U.N. Security Council, plays a key role in establishing, renewing, and funding U.N. peacekeeping operations, including those in Africa. For 2019, the U.N. General Assembly assessed the U.S. share of U.N. peacekeeping operation budgets at 27.89%; since the mid-1990s Congress has capped the U.S. payment at 25% due to concerns that the current assessment is too high. During the Trump Administration, the United States generally has voted in the Security Council for the renewal and funding of existing U.N. peacekeeping operations, including those in Africa. At the same time, the Administration has been critical of U.N. peacekeeping activitiesâboth overall and in Africa specificallyâand called for a review of operations to ensure that they are \"fit for purpose\" and to improve their efficiency and effectiveness. Over the years, Congress has considered a range of overarching policy issues and debates regarding U.N. peacekeeping operations in Africa, including how effectively such operations fulfill their mandates, particularly related to civilian protection and peacekeeping; under what circumstances a U.N. peacekeeping mission might be an effective tool for addressing or preventing mass atrocities in Africa; to what extent and in what ways can U.N. peacekeeping operations effectively work with abusive or neglectful host governments and state security forces in Africa; how to prevent and address sexual exploitation and abuse by U.N. peacekeepers, particularly in operations in Africa; and the role of Africa-led (as opposed to U.N.-conducted) operations as a response to regional crises. This report focuses on U.N. peacekeeping missions in Africa; it does not address broader policy issues related to U.N. peacekeeping, the African Union Mission in Somalia (AMISOM), or the U.N. Support Office in Somalia (UNSOS). For more information on U.N. peacekeeping and U.S. funding, see CRS In Focus IF10597, United Nations Issues: U.S. Funding of U.N. Peacekeeping . For further analysis on the political and security context for the above operations, see CRS In Focus IF11171, Crisis in the Central African Republic ; CRS In Focus IF10116, Conflict in Mali ; CRS In Focus IF10218, South Sudan ; CRS Report R45794, Sudan's Uncertain Transition ; CRS Report R43166, Democratic Republic of Congo: Background and U.S. Relations ; and CRS Report RS20962, Western Sahara .", "document_type": "crs"}
{"report": "A rticle II, Section 2 of the U.S. Constitution authorizes the President \"to grant Reprieves and Pardons for Offences against the United States, except in Cases of Impeachment.\" This executive power of clemency encompasses several distinct forms of relief from criminal punishment, of which a full presidential \"pardon\" is only one. The power has its roots in the king's prerogative to grant mercy under early English law, which later traveled across the Atlantic Ocean to the American colonies. The Supreme Court has recognized that the authority vested by the Constitution in the President is quite broad, extending to \"every offence known to the law\" and available \"at any time after [a crime's] commission, either before legal proceedings are taken or during their pendency, or after conviction and judgment.\" That said, there are some limits to the power conferred by the pardon provision of Article II: for instance, the President may grant pardons only for federal criminal offenses, and impeachment convictions are not pardonable. An administrative process has been established through the Department of Justice's (DOJ's) Office of the Pardon Attorney for submission and evaluation of requests for pardons and other forms of clemency, though this process and the regulations governing are purely advisory in nature and do not affect the President's ultimate authority to grant relief. This report provides an overview of the President's pardon power. After briefly discussing the historical background to the power conferred by Article II, Section 2 of the Constitution, the report explores the different forms of clemency that are available, the relatively few limits on theÂ pardon power, and the process of seeking and receiving clemency. The report concludes by addressing selected legal issues related to the pardon power: (1) the legal effect of pardons andÂ other forms of clemency; (2) whether the President may grant clemency to himself; and (3)Â Congress's role in overseeing the use of the pardon power. The concept of governmental relief from the punishment that would otherwise apply to a criminal act has deep historical roots, with some scholars tracing it as far back as ancient Greece and Rome. An English form of pardon power vested in the king, the \"prerogative of mercy,\" first appeared during the reign of King Ine of Wessex (688-725 A.D.). Over time, perceived abuses \"such as royal sales of pardons or use of pardons as bribery to join the military\" prompted Parliament to impose limitations on the pardon power. The king's power to pardon nevertheless endured through the American colonial period and applied in the colonies themselves through delegation to colonial authorities. Following the American Revolution, the English legal tradition of a pardon power held by the executive directly influenced the pardon provision included in the U.S. Constitution. At the Constitutional Convention, the two major plans offeredâthe Virginia and New Jersey plansâdid not address pardons. However, in a \"sketch\" of suggested amendments to the Virginia plan, Alexander Hamilton included a pardon power vested in an \"Executive authority of the United States\" that extended to \"all offences except Treason,\" with a pardon for treason requiring Senate approval. It appears that the rationale for the treason limitation was, at least in part, that the head of the executive branch should not be able to absolve himself and possible conspirators of a crime threatening \"the immediate being of the society.\" Hamilton's proposal was included in a subsequent draft of the Constitution, though the requirement of Senate approval for a pardon of treason was replaced with an exception for impeachment, apparently with the thought that exempting impeachment was sufficient to protect against abuse. Debate at the Convention over the pardon power was limited, primarily centering on questions of (1) how broad the power should be (i.e., what restrictions or exceptions to the power should exist), and (2) whether the legislature should have a role in the power's exercise. Ultimately, proposals to impose additional limits on pardons beyond an exception for impeachmentâsuch as by calling for Senate approval of pardons or requiring conviction prior to pardon âwere rejected, resulting in the expansive power in Article II, Section 2 of the Constitution. Alexander Hamilton made the case for the breadth of this executive-held power in The Federalist , arguing that it \"should be as little as possible fettered or embarrassed\" to ensure \"easy access to exceptions in favour of unfortunate guilt.\" And on this view, \"a single man of prudence and good sense,\" that is, the President, would be \"better fitted, in delicate conjunctures, to balance the motives which may plead for and against the remission of the punishment, than any numerous body whatever.\" In accordance with these principles, the text of the Constitution, as ratified, places few limits on the President's ability to grant pardons, as discussed in more detail below. In light of references in scholarship and the popular press to the President's \"pardon power,\" a casual observer might think that Article II, Section 2 of the Constitution authorizes only one form of relief from criminal punishment. That is not the case, however: the text of the Constitution speaks of \"Reprieves and Pardons,\" and the Supreme Court has explained that the \"language of the [provision] is general, that is, common to the class of pardons, or extending the power to pardon to all kinds of pardons known in the law as such, whatever may be their denomination.\" As such, the President has \"plenary\" constitutional authority under the pardon provision \"to 'forgive'\" an accused or convicted person \"in part or entirely, to reduce a penalty in terms of a specified number of years, or to alter it with conditions which are in themselves constitutionally unobjectionable.\" At least five forms of clemency fall under this authority: 1. pardon; 2. amnesty; 3. commutation; 4. remission of fines and forfeitures; 5. reprieve. A full pardon is the most expansive form of clemency; it \"releases the wrongdoer from punishment and restores the offender's civil rights without qualification.\" A pardon may be granted at any time prior to charge, prior to conviction, or following conviction, but it appears that it must be accepted to be effective or at least may be refused. For instance, President Woodrow Wilson issued a pardon to George Burdick, an editor at the New York Tribune , for any federal offenses he \"may have committed\" in connection with the publication of an article regarding alleged customs fraud, despite the fact that Burdick had not been charged with any crime at the time of the pardon. The apparent motivation for the pardon was that Burdick had refused to testify before a grand jury investigating the involvement of Treasury Department officials in leaks concerning the wrongdoing, asserting his Fifth Amendment right not to provide testimony that would tend to incriminate him. Despite President Wilson's issuance of the pardon, Burdick \"refused to accept\" it and continued to refuse to answer certain questions put to him before the grand jury. In Burdick v. United States , the Supreme Court assumed that the pardon was within the President's power to issue and concluded that \"it was Burdick's right to refuse it\" and stand on his Fifth Amendment objection. Amnesty is essentially identical to a pardon in practical effect, with the principal distinction between the two being that amnesty typically \"is extended to whole classes or communities, instead of individuals[.]\" As an example, President Jimmy Carter granted amnesty to many who violated the Selective Service Act by evading the draft during the Vietnam War. In contrast to pardons and amnesty, which obviate criminal punishments in their entirety, commutation merely substitutes the punishment imposed by a federal court for a less severe punishment, such as by reducing a sentence of imprisonment. To take a well-known example, President Richard Nixon conditionally commuted to six and a half years the 13-year sentence of famed labor union leader Jimmy Hoffa, who had been convicted of mail fraud, wire fraud, and obstruction of justice. Along the same lines, the President \"may remit [criminal] fines, penalties, and forfeitures of every description arising under the laws of [C]ongress,\" and, apparently in contrast to a pardon, a commutation or remission is valid even in the absence of the consent of the offender whose punishment is reduced. Finally, a reprieve merely \"produces delay in the execution of a sentence\" for a period of time \"when the President shall think the merits of the case, or some cause connected with the offender, may require it,\" such as \"where a female after conviction is found to be [pregnant], or where a convict becomes insane, or is alleged to be so.\" President Bill Clinton, for instance, issued a reprieve delaying by six months the execution date of Juan Raul Garza, who had been convicted of multiple capital homicide offenses, so that DOJ could conduct a study of \"racial and geographic disparities in the federal death penalty system.\" As noted above, forms of clemency such as pardons and commutations may be unconditional or may carry specific conditions that must be met for the relief to be effective. The federal courts have recognized that the power conferred by Article II, Section 2 of the Constitution is quite broad, establishing virtually \"unfettered executive discretion\" to grant clemency. The judiciary accordingly has been reticent to weigh in on clemency matters within the purview of the executive branch, particularly given separation-of-powers constraints inherent in the Constitution's structure. As a result, there is very little judicial guidance regarding the limits of the President's pardon authority. Two limits are nonetheless obvious from the constitutional text: first, pardons may be granted only for \"offences against the United States,\" that is, federal crimes, and second, pardons may not be granted \"in Cases of Impeachment.\" Beyond the limits established in Article II, Section 2 of the Constitution, the power to grant conditional or unconditional clemency, though broad, may also be externally limited by other constitutional provisions and guarantees. The Supreme Court has, at times, alluded to such limits, noting, for example, that the President may attach to a grant of clemency conditions \"which are in themselves constitutionally unobjectionable.\" Notably, in Hoffa v. Saxbe , the federal district court for the District of Columbia was called upon to squarely address the relationship between the President's pardon power and \"the rights and liberties of the individual\" as enshrined in other constitutional provisions. The case involved a commutation that was conditioned on the recipient forgoing participation in labor union management for a period of years. The recipient of the commutation challenged the condition as a violation of his First Amendment rights of free speech and association, among other things. Faced with the issue, the court took the view that \"there are obvious limits beyond which the President may not go in imposing and subsequently enforcing\" clemency conditions and \"arrive[d] at a two-pronged test of reasonableness in determining the lawfulness of a condition: first, that the condition be directly related to the public interest,\" meaning that it \"must relate to the reason for the initial judgment of conviction\" in a way that reflects regard for protection of the public; \"and second, that the condition not unreasonably infringe on the individual commutee's constitutional freedoms.\" Applying this two-pronged test, the district court ultimately concluded that the condition was valid because (1)Â the commutation recipient's crimes related to participation in union activities, which the public had a strong interest in the integrity of; and (2) the condition met applicable First Amendment standards. Because case law regarding the President's authority to grant clemency is limited, the two-pronged analysis laid out in Hoffa has not been endorsed by the Supreme Court, nor has there been extensive judicial development of alternative frameworks. Nevertheless, though the proposition remains largely theoretical given the dearth of case law, legal scholars have maintained that grants of clemency or clemency conditions at odds with certain constitutional guarantees like equal protection of the law, due process, and the prohibition of cruel and unusual punishment are subject to judicial review and potential invalidation. While not necessary, clemency is typically granted through an administrative process established in regulations that provide for consideration of applications by the Office of the Pardon Attorney within the Department of Justice (DOJ). The regulations require any person \"seeking executive clemency by pardon, reprieve, commutation of sentence, or remission of fine\" to execute a \"formal petition\" and submit it to the Pardon Attorney. To be eligible to file a pardon petition, at least five years must have elapsed since one's release from confinement or one's conviction (if no prison sentence was imposed). Petitions for commutation generally may be filed only after all other forms of judicial and administrative relief have been pursued, though allowance may be made \"upon a showing of exceptional circumstances.\" Once a petition for clemency has been submitted, the Pardon Attorney is to investigate its merit by engaging \"appropriate officials and agencies of the Government\" like the Federal Bureau of Investigation. At the conclusion of the investigation, the Pardon Attorney submits a recommendation through the Deputy Attorney General to the Attorney General as to whether the request for clemency should be granted or denied, and the Attorney General is to then review all pertinent information to \"determine whether the request for clemency is of sufficient merit to warrant favorable action by the President.\" The Attorney General's final recommendation is made to the President in writing. The general standard for a pardon request \"of sufficient merit\" is that the petitioner has \"demonstrated good conduct for a substantial period of time after conviction and service of sentence.\" DOJ lists five \"principal factors\" in determining whether a particular application warrants a favorable recommendation: 1. post-conviction conduct, character, and reputation , including, among other things, financial and employment stability, \"responsibility toward family,\" and participation in community service; 2. the seriousness and relative recentness of the offense , with consideration of victim impact and whether sufficient time has passed \"to avoid denigrating the seriousness of the offense or undermining the deterrent effect of the conviction\"; 3. acceptanc e of responsibility, remorse, and atonement , including victim restitution and any attempts \"to minimize or rationalize culpability\"; 4. the need for relief , such as a legal disability like a bar to licensure, though \"the absence of a specific need should not be held against an otherwise deserving applicant\"; and 5. recommendations and reports from officials like the prosecuting attorneys and sentencing judge. Factors considered on a request for commutation include \"disparity or undue severity of sentence, critical illness or old age,\" the \"amount of time already served,\" the \"availability of other remedies,\" \"meritorious service rendered to the government\" (such as cooperation with investigations and prosecutions), and/or \"other equitable factors\" like demonstrated rehabilitation or pressing unforeseen circumstances. Similarly, \"satisfactory post-conviction conduct\" is considered on application for remission of a fine or restitution, as well as \"the ability to pay and any good faith efforts to discharge the obligation.\" During President Obama's second term, DOJ announced a \"clemency initiative\" to \"encourage qualified federal inmates to petition to have their sentences commuted[.]\" Under the initiative, DOJ prioritized applications of inmates who met special factors that included (1) being nonviolent, low-level offenders without significant ties to organized criminal enterprises; (2) lacking a significant criminal history; (3) demonstrating good conduct in prison; (4) lacking a history of violence; (5) having served at least 10 years of their sentence; and (6) serving a sentence for which they \"likely would have received a substantially lower sentence\" by operation of law if convicted at the time of consideration. DOJ made recommendations to President Obama on thousands of petitions received through the initiative, many of which were still pending at the end of his second term. The program ended when President Obama left office on January 20, 2017. More broadly, according to statistics kept by the Office of the Pardon Attorney, recent Presidents have granted a relatively small percentage of clemency petitionsâfor instance, President George W. Bush received over 11,000 petitions for pardon or commutation and granted a total of 200. Though DOJ's regulations and requirements guide its consideration of requests for clemency, they do not \"restrict the authority granted to the President under Article II, section 2 of the Constitution.\" In other words, the President is free to grant clemency as he or she sees fit (subject to the constraints described elsewhere in this report), regardless of whether a prospective recipient meets DOJ standards or even participates in the formal petition process through the Office of the Pardon Attorney. For instance, as noted above, while DOJ regulations impose a five-year waiting period for submission of a pardon application through the Pardon Attorney, the President may issue a pardon at any time after the commission of a federal offense even if no charges have been filed, as was the case with President Gerald Ford's pardon of former President Nixon. When a pardon or commutation is granted, the recipient is notified, and a \"warrant\" is mailed to him or her (or sent to the officer in charge of the place of confinement in the case of a commutation of a sentence still being served). Though the requirements of notice and delivery are set out in DOJ regulations, it appears that they may be necessary for at least a full pardon to have legal effect. As noted above, an ostensible pardon recipient may be able to reject the pardon, at least when \"personal rights\" like assertion of the Fifth Amendment right against self-incrimination are at issue. Moreover, Presidents have, in the past, revoked pardons prior to delivery and acceptance. For instance, in 1869, after outgoing President Andrew Johnson issued but did not deliver a pardon, incoming President Ulysses S. Grant revoked the pardon, and a federal court upheld the revocation. The President's use of the pardon power in particular circumstances can raise a number of legal questions, many of which may be unresolved given the limited authority addressing federal clemency matters. Three unresolved legal issues may be of particular interest to Congress given recent commentary: (1) the legal effect of clemency; (2) whether a President may issue a self-pardon; and (3) Congress's role in overseeing the exercise of the pardon power. The legal effect of limited forms of clemency like commutations is fairly clear: criminal punishment is reduced \"either totally or partially,\" but the relief \"does not change the fact of conviction, imply innocence, or remove civil disabilities that apply to the convicted person as a result of the criminal conviction.\" The legal significance of a full pardon, however, has been a subject of shifting judicial views over time. While early cases suggested that a pardon obviates all legal guilt of the offender, effectively wiping the crime from existence, more recent case law suggests that a pardon removes only the punishment for the offense without addressing the guilt of the recipient or other consequences stemming from the underlying conduct. In an 1866 decision, Ex parte Garland , the Supreme Court took a broad view of the nature and consequence of a pardon: A pardon reaches both the punishment prescribed for the offense and the guilt of the offender; and when the pardon is full, it releases the punishment and blots out of existence the guilt, so that in the eye of the law the offender is as innocent as if he had never committed the offence. If granted before conviction, it prevents any of the penalties and disabilities consequent upon conviction from attaching; if granted after conviction, it removes the penalties and disabilities, and restores him to all civil rights; it makes him, as it were, a new man, and gives him a new credit and capacity. A few years after Garland , the Court appeared to affirm that a pardon \"not merely releases the offender from the punishment prescribed for the offence, but . . . obliterates in legal contemplation the offence itself.\" However, in subsequent decisions, the Court backed away from the broad proposition that a pardon erases both the consequences of a conviction and the underlying guilty conduct. Most notably, in Carlesi v. New York , the Court determined that a pardoned offense could still be considered \"as a circumstance of aggravation\" under a state habitual-offender law, and then in Burdick v. United States , the Court noted that a pardon in fact \"carries an imputation of guilt; acceptance a confession of it.\" Based on this more recent Supreme Court case law, multiple federal Courts of Appeals have concluded that the \"historical language\" from early cases \"was dicta and is inconsistent with current law.\" Modern cases instead recognize a distinction between the punishment for a conviction, which the pardon obviates, and \"the fact of the commission of the crime,\" which may be considered in subsequent proceedings or preclude the pardon recipient from engaging in certain activities. A pardon will accordingly relieve the recipient of legal disabilities that \"would not follow from the commission of the crime without conviction,\" such as possession of a firearm or the right to vote, but the conduct and circumstances of the offense may still be considered for purposes of, among other things, certain benefits or licensing determinations or as a basis for censure under rules of professional conduct. Relatedly, courts have held that a pardon does not automatically expunge the record of the conviction itself or require that the court's orders be vacated. Despite the judicial trend toward a narrower understanding of the legal effect of a pardon, however, the Supreme Court has not directly revisited its broad language from Garland , and thus its precise meaning in relation to later pronouncements from the Court remains somewhat unclear. Whether a President may pardon himself is an unresolved legal question that has been a subject of renewed interest following President Trump's statement in 2018 that he has \"the absolute right\" to do so. No past President has issued a self-pardon, and, as a result, no federal court has directly addressed the matter. That said, legal scholars and commentators have debated the question extensively and reached differing conclusions. Proponents of the view that the President may pardon himself tend to emphasize the lack of limitation in the constitutional language, as well as certain historical views and pronouncements of the Supreme Court as to the breadth of the President's pardoning power in general. By contrast, those asserting that the President lacks the power of self-pardon raise competing textual arguments and suggest that self-pardons would be inconsistent with other constitutional provisions, such as the Article I provision stating that officials convicted in an impeachment trial \"shall . . . be liable and subject to Indictment, Trial, Judgment, and Punishment, according to law.\" An Office of Legal Counsel opinion issued shortly before President Nixon's resignation in 1974 concluded that the President cannot pardon himself \"[u]nder the fundamental rule that no one may be a judge in his own case,\" and some scholars subsequently have supported this opinion. In any event, even were a President to pardon himself, at least one commentator has noted that it is questionable whether a court would issue a definitive ruling as to that pardon's lawfulness given practical considerations and separation-of-powers concerns. The Supreme Court has taken the view that Congress generally cannot circumscribe the President's pardon authority. In Ex parte Garland , the Court remarked that the \"power of the President [to pardon] is not subject to legislative control. Congress can neither limit the effect of his pardon, nor exclude from its exercise any class of offenders. The benign prerogative of mercy reposed in him cannot be fettered by any legislative restrictions.\" Consistent with this broad language, the Court later rejected post-Civil War attempts by Congress to limit the effect of pardons granted to those who aided the Confederate cause on their right to recover for seized property, stating that \"the legislature cannot change the effect of such a pardon any more than the executive can change the law.\" More recently, in rejecting the proposition that a condition attached to clemency must be authorized by statute, the Court indicated that \"the power [of clemency] flows from the Constitution alone, not from any legislative enactments, and . . . it cannot be modified, abridged, or diminished by the Congress.\" It thus appears that Congress lacks the authority to substantively constrain the President's power to grant clemency, though Congress may be able to take some actions that would facilitate exercise of the power, such as through appropriations. There is historical precedent for Congress funding positions in DOJ to assist in considering clemency petitions. That said, attempts to indirectly impair the pardon power through appropriations limitations could potentially be viewed as inappropriate. Given these limitations, Congress's practice for formally conveying its views on clemency matters has typically involved passing nonbinding resolutions expressing the sense of Congress as to whether clemency should or should not be granted. Legislation has also been introduced in the 116th Congress that would impose certain post hoc procedural requirements on the Attorney General in connection with pardonsâspecifically, (1)Â requiring submission of investigative materials to congressional committees upon the grant of a pardon or commutation arising from an investigation in which the President or a relative is a target, subject, or witness; and (2) requiring publication of pardon information within three days of any grant. Although such legislation may not be a direct substantive constraint on the President's authority to grant clemency, given the relative lack of case law interpreting the pardon power and the sometimes sweeping language the Court has used to describe the President's prerogative, it is unclear whether such legislation would be viewed by the courts as an impermissible imposition on an area of executive authority. Beyond legislation, Congress may have a role to play in pardon decisions through other constitutional processes. For instance, Congress has invoked its Article I authority to conduct oversight as a more indirect constraint on the use of the pardon power. And on that front, Congress has, in the past, been relatively successful in obtaining information from the executive branch on particular clemency decisions, up to and including congressional testimony from the President himself. Nevertheless, DOJ has taken the position that past examples of executive branch compliance with congressional requests for information regarding pardon decisions have been purely voluntary, and that in fact \"Congress has no authority whatsoever to review a President's clemency decision.\" Whether a court, faced with an interbranch dispute regarding congressional demands for information on pardon decisions, would order the executive branch to comply with such demands would likely depend on the court's view of two possible constraints on Congress's oversight authority: (1) the existence of a valid legislative purpose, and (2)Â executive privilege. With respect to the first constraint, the Supreme Court has said that Congress's power to conduct oversight is inherent in the legislative process and is broad, encompassing \"inquiries concerning the administration of existing laws[,] . . . proposed or possibly needed statutes,\" and \"probes into departments of the federal government to expose corruption, inefficiency, or waste.\" However, a congressional investigation cannot be used \"to expose for the sake of exposure,\" meaning that a valid inquiry \"must be related to, and in furtherance of, a legitimate task of the Congress.\" The Court has also cautioned that Congress \"cannot inquire into matters which are within the exclusive province of one of the other branches of the Government.\" It is on the basis of this language that DOJ has maintained that Congress's oversight authority does not extend to clemency decisions, averring that \"[t]he granting of clemency pursuant to the pardon power is unquestionably an exclusive province of the Executive Branch.\" That said, the Supreme Court has at other times framed the issue of legislative purpose in the context of executive or judicial prerogatives as being whether it is \"obvious that there was a usurpation of functions exclusively vested in the Judiciary or the Executive,\" and a congressional committee seeking information on a clemency decision might accordingly argue that a subpoena or request for information on the decision is not a \"usurpation\" of the clemency function but is merely levied in aid of a \"probe . . . to expose corruption, inefficiency, or waste.\" Assuming a valid legislative purpose, the question would become whether materials related to a pardon decision are nevertheless protected from disclosure by executive privilege. Executive privilege \"is a term that has been used to describe the President's power to 'resist disclosure of information the confidentiality of which [is] crucial to the fulfillment of the unique role and responsibilities of the executive branch of our government.'\" The term encompasses at least two distinct forms of privilege that have been recognized by the federal courts: (1) a \"presumptive privilege for Presidential communications\" that extends to \"direct communications of the President with his immediate White House advisers\" made \"'in performance of the President's responsibilities'\" and \"'in the process of shaping policies and making decisions,'\" as well as \"communications authored or solicited and received\" by immediate White House advisers; and (2) a \"deliberative process privilege\" that may extend more broadly to \"decisionmaking of executive officials generally,\" shielding \"documents and other materials that would reveal advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policies are formulated.\" Neither form of privilege is absolute, as either \"can be overcome by a sufficient showing of need.\" However, \"the presidential communications privilege is more difficult to surmount\" than the deliberative process privilege; at least in the context of a congressional subpoena, the U.S. Court of Appeals for the D.C. Circuit has indicated that the former can be overcome on a showing that \"the subpoenaed evidence is demonstrably critical to the responsible fulfillment of the Committee's functions,\" while the latter is subject to a flexible, \"ad hoc\" determination of need and may \"disappear[] altogether when there is any reason to believe government misconduct has occurred.\" It does not appear that courts have addressed the application of either form of privilege to information regarding presidential clemency decisions sought by Congress. However, the U.S. Court of Appeals for the D.C. Circuit considered whether the presidential communications privilege would apply to \"internal pardon documents\" of the Offices of the Pardon Attorney and Deputy Attorney General that were not solicited or received by the President or his immediate advisors in Judicial Watch v. Department of Justice , concluding that such documents fell outside the scope of the presidential communications privilege but might still be covered by the deliberative process privilege. Based on Judicial Watch and the limited Supreme Court precedent addressing executive privilege, it seems that whether a court would order disclosure to a congressional committee of information concerning a presidential clemency decision in the face of an assertion of executive privilege could depend on whether the information sought is limited to internal agency documents (in which case the deliberative process privilege could apply) or includes communications among and between the President and/or senior White House officials (in which case the presidential communications privilege would appear to apply). Because the threshold of need is higher in the latter case than in the former, it seems more likely that Congress could obtain documents and information generated by the Pardon Attorney that are not requested by or submitted to the President or his advisors. Even in the case of presidential communications, however, a court could still conclude that a congressional committee is entitled to the information if the committee can demonstrate that it is critically needed. An additional way in which Congress might assert itself with respect to presidential pardon decisions is through impeachment. James Madison alluded to this \"great security\" against abuse of the pardon power when he noted during the Virginia ratification convention that \"if the President be connected, in any suspicious manner, with any person, and there be grounds to believe he will shelter him, the House of Representatives can impeach him[.]\" The Supreme Court also appeared to acknowledge the possibility of impeachment for misuse of clemency in the early 20th century case of Ex parte Grossman . In concluding that the pardon power extended to criminal punishment for contempt of court, the Supreme Court in that case indicated that if the President ever sought to \"deprive a court of power to enforce its orders\" by issuing \"successive pardons of constantly recurring contempts in particular litigation,\" such an \"improbable\" situation \"would suggest a resort to impeachment, rather than a narrow and strained construction of the general powers of the President.\" Consistent with these authorities, several commentators have alluded to the potential availability of impeachment as a check on the President's pardon authority. That said, some have also raised doubts as to the efficacy of impeachment as a constraint on the President, arguing that it is \"useless against a President .Â .Â . who grants controversial pardons in the very last hours of his tenure\" as some Presidents have. Were a President to be impeached in the House of Representatives for abusing the pardon power and subsequently convicted in the Senate, the remedy would be limited by the Constitution to his removal from office and \"disqualification to hold and enjoy any Office of honor, Trust or Profit under the United States[.]\" Finally, Congress can seek to amend the Constitution to clarify or constrain the President's clemency authority. Resolutions have been introduced in the 116th Congress that would amend the Constitution to prohibit the President from granting a pardon to himself or to family members and current or former members of his campaign or administration. However, the requirements for successfully amending the Constitution are, by design, exceptionally stringentâamendments would need to be passed by a two-thirds vote of each House of Congress and ratified by three-fourths of the states. Passing a constitutional amendment as a means of addressing unpopular or controversial pardon decisions accordingly may be difficult.", "summary": "Article II, Section 2 of the U.S. Constitution authorizes the President \"to grant Reprieves and Pardons for Offenses against the United States, except in Cases of Impeachment.\" The power has its roots in the king's prerogative to grant mercy under early English law, which later traveled across the Atlantic Ocean to the American colonies. The Supreme Court has recognized that the authority vested by the Constitution in the President is quite broad, describing it as \"plenary,\" discretionary, and largely not subject to legislative modification. Nonetheless, there are two textual limitations on the pardon power's exercise: first, the President may grant pardons only for federal criminal offenses, and second, impeachment convictions are not pardonable. The Court has also recognized some other narrow restraints, including that a pardon cannot be issued to cover crimes prior to commission. The pardon power authorizes the President to grant several forms of relief from criminal punishment. The most common forms of relief are full pardon s (for individuals) and amnesties (for groups of people), which completely obviate the punishment for a committed or charged federal criminal offense, and commutations , which reduce the penalties associated with convictions. An administrative process has been established through the Department of Justice's Office of the Pardon Attorney for submitting and evaluating requests for these and other forms of clemency, though the process and regulations governing it are merely advisory and do not affect the President's ultimate authority to grant relief. Legal questions concerning the President's pardon power that have arisen have included (1) the legal effect of clemency; (2) whether a President may grant a self-pardon; and (3) what role Congress may play in overseeing the exercise of the pardon power. With respect to the first question, some 19th century Supreme Court cases suggest that a full pardon broadly erases both the punishment for an offense and the guilt of the offender. However, more recent precedent recognizes a distinction between the punishment for a conviction , which the pardon obviates, and the fact of the commission of the crime , which may be considered in later proceedings or preclude the pardon recipient from engaging in certain activities. Thus, although a full pardon restores civil rights such as the right to vote that may have been revoked as part of the original punishment, pardon recipients may, for example, still be subject to censure under professional rules of conduct or precluded from practicing their chosen profession as a result of the pardoned conduct. As for whether a President may grant a self-pardon, no past President has ever issued such a pardon. As a consequence, no federal court has addressed the matter. That said, several Presidents have considered the proposition of a self-pardon, and scholars have reached differing conclusions on whether such an action would be permissible based on the text, structure, and history of the Constitution. Ultimately, given the limited authority available, the constitutionality of a self-pardon is unclear. Finally, regarding Congress's role in overseeing the pardon process, the Supreme Court has indicated that the President's exercise of the pardon power is largely beyond the legislature's control. Nevertheless, Congress does have constitutional tools at its disposal to address the context in which the President's pardon power is exercised, including through oversight, constitutional amendment, or impeachment.", "document_type": "crs"}
{"report": "This report is intended to serve as a primer on U.S. foreign assistance to sub-Saharan Africa (\"Africa\") to help inform Congress' authorization, appropriation, and oversight of U.S. foreign aid for the region. It focuses primarily on assistance administered by the State Department and U.S. Agency for International Development (USAID), which administer the majority of U.S. aid to the region. It covers recent funding trends and major focus areas of such assistance, select programs managed by other U.S. agencies and federal entities, and the Trump Administration's FY2021 aid budget request for Africa. In addition to discussing aid appropriations, this report notes a range of legislative measures that have authorized specific assistance programs or placed conditions or restrictions on certain types of aid, or on aid to certain countries. Select challenges for congressional oversight are discussed throughout this report. For more on U.S. engagement in Africa, see also CRS Report R45428, Sub-Saharan Africa: Key Issues and U.S. Engagement . Definitions. Unless otherwise indicated, this report discusses State Department- and USAID-administered assistance allocated for African countries or for regional programs managed by the State Department's Bureau of African Affairs (AF), USAID's Bureau for Africa (AFR), and USAID regional missions and offices in sub-Saharan Africa. It does not comprehensively discuss funding allocated to African countries via global accounts or programs, which publicly available budget materials do not disaggregate by country or region. Except as noted, figures refer to actual allocations of funding appropriated in the referenced fiscal year (hereafter, \"allocations\"). Africa has received a growing share of annual U.S. foreign assistance funding over the past two decades: the region received 37% of State Department- and USAID-administered aid obligations in FY2018, up from 28% of global obligations in 2008 and 16% in 1998. U.S. aid to Africa grew markedly during the 2000s as Congress appropriated substantial funds to support the President's Emergency Plan for AIDS Relief (PEPFAR), which the George W. Bush Administration launched in 2003. Development and security aid to Africa also increased during that period, albeit to a lesser extent (see Figure 2 ). Assistance for Africa plateaued during the Obama Administration, fluctuating between $7.0 billion and $8.0 billion in annual allocations, excluding emergency humanitarian assistance and other funding allocated from global accounts and programs. Africa received roughly $7.0 billion in annual U.S. aid allocations in the first three years of the Trump Administration, despite the Administration's repeated proposals to curtail aid to the region. Over the past decade, roughly 70% of U.S. assistance to African countries has supported health programs, notably focused on HIV/AIDS, malaria, nutrition, and maternal and child health. U.S. assistance also seeks to encourage economic growth and development, bolster food security, enhance governance, and improve security. As discussed below, African countries also receive assistance administered by other federal agencies. The United States channels additional funding to Africa through multilateral bodies, such as U.N. agencies and international financial institutions like the World Bank. Policymakers, analysts, and advocates continue to debate the value and design of assistance programs in Africa. Proponents of such assistance often contend that foreign aid advances U.S. national interests in the region, or that U.S. assistance (e.g., to respond to humanitarian need) reflects U.S. values of charity and global leadership. Critics often allege that aid has done little to improve socioeconomic outcomes in Africa overall, that aid flows may have negative unintended consequences (such as empowering undemocratic regimes), or that other countries should bear more responsibility for providing aid to the region. Assessing the effectiveness of foreign aid is complexâparticularly in areas afflicted by conflict or humanitarian crisisâfurther complicating such debates. Selected considerations concerning U.S. aid to Africa and issues for Congress are discussed in further detail below (see \" Select Issues for Congress \"). U.S. assistance seeks to address a range of development, governance, and security challenges in Africa, reflecting the continent's size and diversity as well as the broad scope of U.S. policy interests in the region. State Department- and USAID-administered assistance for Africa totaled roughly $7.1 billion in FY2019, not including funding allocated to Africa via global accounts and programs (see \" Select Assistance Provided through Global Accounts and Programs ,\" below). Health. At $5.3 billion, health assistance comprised 75% of U.S. aid to Africa in FY2019. The majority of this funding supported HIV/AIDS programs (see Figure 4 ), with substantial assistance provided through the global President's Emergency Plan for AIDS Relief (PEPFAR)âa State Department-led, interagency effort that Congress first authorized during the George W. Bush Administration and reauthorized through 2023 under P.L. 115-305 . Programs to prevent and treat malaria, a leading cause of death in Africa, constituted the second-largest category of health assistance; such funding is largely provided through the USAID-led President's Malaria Initiative (PMI), which targeted 24 countries in Africa (out of 27 globally) as of 2019. Beyond disease-specific initiatives, U.S. assistance has supported health system strengthening, nutrition, family planning and reproductive health, and maternal and child health programs. The United States also has supported global health security efforts, including pandemic preparedness and response activities, notably through the U.S.-supported Global Health Security Agenda. In recent years, USAID and the U.S. Centers for Disease Control and Prevention (CDC) led robust U.S. responses to two Ebola outbreaks on the continent, in West Africa (2014-2016) and the Democratic Republic of Congo (DRC, 2018-present). Agriculture and E conomic Growth. U.S. support for economic growth in Africa centers on agricultural development assistance. USAID agriculture programs seek to improve productivity by strengthening agricultural value chains, enhancing land tenure systems and market access road infrastructure, promoting climate-resilient farming practices, and funding agricultural research. Nearly 60% of U.S. agricultural assistance to Africa in FY2019 benefitted the eight African focus countries under Feed the Future (FTF)âa USAID-led, interagency initiative launched by the Obama Administration that supports agricultural development to reduce food insecurity and enhance market-based economic growth. (There are 12 FTF focus countries worldwide; the initiative supports additional countries under \"aligned\" and regional programs.) The Global Food Security Act of 2016 ( P.L. 114-195 , reauthorized through 2023 in P.L. 115-266 ) endorsed an approach to U.S. agricultural and food assistance similar to FTF. Other U.S. economic assistance programs support trade capacity-building efforts, economic policy reforms and analysis, microenterprise and other private sector strengthening, and infrastructure development. Since the early 2000s, USAID has maintained three sub-regional trade and investment hubs focused on expanding intra-regional and U.S.-Africa trade, including by supporting African exports to the United States under the African Growth and Opportunity Act (AGOA, Title I, P.L. 106-200 , as amended) trade preference program. USAID also coordinates Prosper Africa, an emerging Trump Administration trade and investment initiative (see Text B ox ). Electrification is another focus of U.S. economic assistance in Africa. Power Africa, a USAID-led initiative that the Obama Administration launched in 2013, seeks to enhance electricity access through technical assistance, grants, financial risk mitigation tools, loans, and other resourcesâaccompanied by trade promotion and diplomatic and advisory efforts. Facilitating private sector contracts is a key focus of the initiative, which aims to build power generation facilities capable of producing 30,000 megawatts of new power and establish 60 million new power connections by 2030. A sub-initiative, Beyond the Grid, supports off-grid electricity access. Power Africa involves a range of U.S. federal entities in addition to USAID, including the Millennium Challenge Corporation (MCC), DFC, Ex-Im Bank, TDA, and Departments of State, Energy, Commerce, and Agriculture. The Electrify Africa Act of 2015 ( P.L. 114-121 ) made it U.S. policy to aid electrification in Africa through an approach similar to that of Power Africa. Peace and Security . The State Department administers a range of programs to build the capacity of African militaries and law enforcement agencies to counter security threats, participate in international peacekeeping and stabilization operations, and combat transnational crime (e.g., human and drug trafficking). State Department security assistance authorities are codified in Title 22 of the U.S. Code . Congress appropriates funds for Title 22 programs in annual Department of State, Foreign Operations, and Related Programs (SFOPS) appropriations, though the Department of Defense (DOD) implements several of these programs. (For information on DOD security cooperation, see \" Assistance Administered by Other U.S. Federal Departments and Agencies .\") The Peacekeeping Operations (PKO) account is the primary vehicle for State Department-administered security assistance to African countries ( Figure 5 ). Despite its name, PKO supports not only peacekeeping capacity-building, but also counterterrorism, maritime security, and security sector reform. (A separate State Department-administered account, Contributions to International Peacekeeping Activities [CIPA], funds U.S. assessed contributions to U.N. peacekeeping budgets.) In recent years, the largest PKO allocation for Africa has been for the U.N. Support Office in Somalia (UNSOS), which supports an African Union stabilization operation in that country. PKO funding also supports two interagency counterterrorism programs in Africa: the Trans-Sahara Counter-Terrorism Partnership (TSCTP, in North-West Africa), and the Partnership for Regional East Africa Counterterrorism (PREACT, in East Africa). The Nonproliferation, Anti-terrorism, Demining, and Related Programs (NADR) account funds counterterrorism training and other capacity-building programs for internal security forces, as well as other activities such as landmine removal. International Narcotics Control and Law Enforcement (INCLE) funds support efforts to combat transnational crime and strengthen the rule of law, including through judicial reform and law enforcement capacity-building. The International Military Education and Training (IMET) program offers training for foreign military personnel at facilities in the United States and abroad, and seeks to build military-to-military relationships, introduce participants to the U.S. judicial system, promote respect for human rights, and strengthen civilian control of the military. The United States provides grants to help countries purchase defense articles and services through the Foreign Military Financing (FMF) account. USAID also implements programs focused on conflict prevention, mitigation, and resolution. Such assistance seeks to prevent mass atrocities, support post-conflict transitions and peace building, and counter violent extremism, among other objectives. Congress appropriates funding for such programs as economic assistance, as opposed to security assistance. Democracy, Human Rights, and Governance (DRG). State Department- and USAID-administered DRG programs seek to enhance democratic institutions, improve government accountability and responsiveness, and strengthen the rule of law. Activities include supporting African electoral institutions and political processes; training political parties, civil society organizations, parliaments, and journalists; promoting effective and accountable governance; bolstering anti-corruption efforts; and strengthening justice sectors. U.S. assistance also provides legal aid to human rights defenders abroad and funds programs to address particular human rights issues and enable human rights monitoring and reporting. Education and Social Services . U.S. basic, secondary, and higher education programs seek to boost access to quality education, improve learning outcomes, and support youth transitions into the workforce. Some programs specifically target marginalized students, such as girls and students in rural areas or communities affected by conflict or displacement. Youth development activities also include the Young African Leaders Initiative (YALI), which supports young African business, science, and civic leaders through training and mentorship, networking, and exchange-based fellowships. USAID supports four YALI Regional Leadership Centers on the continentâin Ghana, Kenya, Senegal, and South Africaâwhich offer training and professional development programs. Additional U.S. assistance programs enhance access to, and delivery of, other social services, such as improved water and sanitation facilities. Environment . Environmental assistance programs in Africa focus on biodiversity conservation, climate change mitigation and adaptation, countering wildlife crime, and natural resource management. In recent years, the largest allocation of regional environmental assistance has been for the Central Africa Regional Program for the Environment (CARPE). Implemented by USAID and the U.S. Fish and Wildlife Service, CAPRE promotes conservation, sustainable resource use, and climate change mitigation in Central Africa's Congo Basin rainforest, with a present focus on landscapes in DRC, the Republic of Congo, and the Central African Republic (CAR). Congress has shown enduring interest in international conservation initiatives and efforts to curb wildlife trafficking and other environmental crime, including in Africa. As noted, the discussion above does not account for U.S. development, security, or health assistance allocated to African countries via global accounts and programsâfunds that are not broken out by region or country in public budget documents. This includes situation-responsive assistance, such as emergency humanitarian aid and certain kinds of governance support, which is appropriated on a global basis and allocated in response to emerging needs or opportunities. Notably, it also includes certain security assistance programs through which some African countries have received considerable funding in recent years. Gaps in region- and country-level aid data may raise challenges for congressional oversight (see \" Select Issues for Congress \"). Emergency Assistance. As of early 2020, there were U.S.- or U.N.-designated humanitarian crises in Burkina Faso, CAR, DRC, Somalia, South Sudan, Sudan, and the Lake Chad Basin (including parts of Cameroon, Chad, Niger, and Nigeria). The United States administers humanitarian aid to Africa under various authorities. Key accounts and programs include: USAID-administered Food for Peace (FFP) assistance authorized under Title II of the Food for Peace Act of 1954 (P.L. 83-480, commonly known as \"P.L. 480\"), which primarily provides for the purchase and distribution of U.S. in-kind food commodities. African countries consistently have received a majority of annual FFP Title II emergency assistance in recent years. USAID-administered International Disaster Assistance (IDA), which funds food and nonfood humanitarian assistanceâincluding the Emergency Food Security Program (EFSP), which funds market-based food assistance, including cash transfers, food vouchers, and food procured locally and regionally. State Department-administered Migration and Refugees Assistance (MRA) assistance for refugees and vulnerable migrants. While the State Department and USAID administer the majority of U.S. foreign assistance to Africa, other federal departments and agencies also manage or support aid programs in the region. For example, the Departments of Agriculture, Energy, Justice, Commerce, Homeland Security, and the Treasury conduct technical assistance programs and other activities in Africa, and may help implement some State Department- and USAID-administered programs on the continent. Other U.S. federal entities involved in administering assistance to Africa notably include: The Department of Defense (DOD). In addition to implementing some State Department-administered security assistance programs, DOD is authorized to engage in security cooperation with foreign partner militaries and internal security entities for a range of purposes. The majority of this assistance has been provided under DOD's \"global train and equip\" authority, first established by Congress in the National Defense Authorization Act (NDAA) of FY2006 ( P.L. 109-163 ). In the FY2017 NDAA ( P.L. 114-328 ), Congress codified and expanded the \"global train and equip\" authority under 10 U.S.C. 333 (\"Section 333\"), consolidating various capacity-building authorities that it had granted DOD on a temporary or otherwise limited basis. Section 333 authorizes DOD to provide training and equipment to foreign military and internal security forces to build their capacity to counter terrorism, weapons of mass destruction, drug trafficking, and transnational crime, and to bolster maritime and border security and military intelligence. Comprehensive regional- or country-level funding data for DOD security cooperation programs are not publicly available, complicating approximations of funding for African countries. A CRS calculation based on available congressional notification data suggests that Kenya, Uganda, Niger, Chad, Somalia, and Cameroon have been the top African recipients of cumulative DOD global train and equip assistance over the past decade. Congress has authorized additional DOD security cooperation programs in Africa under global or Africa-specific authorities (e.g., to help combat the Lord's Resistance Army rebel group in Central Africa between FY2012 and FY2017). Millennium Challenge Corporation (MCC). Authorized by Congress in 2004, the MCC supports five-year development \"compacts\" in developing countries that meet various governance and development benchmarks. MCC recipient governments lead the development and implementation of their programs, which are tailored to address key \"constraints to growth\" identified during the compact design phase. The MCC also funds smaller, shorter-term \"threshold programs\" that assist promising candidate countries to become compact-eligible. As shown in Appendix B , the MCC has supported 32 compacts or threshold programs in 22 African countries since its inception, valued at roughly $8.0 billion in committed funding. There are seven ongoing compacts and threshold programs in the region. The MCC has suspended or terminated compacts with some African governments for failing to maintain performance against selection benchmarks: it terminated engagement in Madagascar and Mali due to military coups, and suspended development of a second compact for Tanzania in 2016 due to a government crackdown on the political opposition. In late 2019, the MCC cancelled a $190 million tranche of funding under Ghana's second compact over concerns with the Ghanaian government's termination of a contract with a private energy utility. The Peace Corps. The Peace Corps supports American volunteers to live in local communities abroad and conduct grassroots-level assistance programs focused on agriculture, economic development, youth engagement, health, and education. As of September 2019, 45% of Peace Corps Volunteers were serving in sub-Saharan Africaâby far the largest share by region. Conflict and other crises in Africa have episodically led the Peace Corps to suspend programming over concern for volunteer safety, with recent conflict-related suspensions in Mali (in 2015) and Burkina Faso (2017) and temporary suspensions in Guinea, Liberia, and Sierra Leone during the 2014-2016 West Africa Ebola outbreak. In 2019, the Peace Corps announced that it would resume operations in Kenya after suspending activities in 2014 due to security concerns. The Peace Corps ceased all activities and recalled all volunteers worldwide in March 2020 due to COVID-19. African Development Foundation (USADF). A federally funded, independent nonprofit corporation created by Congress in the African Development Foundation Act of 1980 (Title V of P.L. 96-533 ), the USADF seeks to reduce poverty by providing targeted grants worth up to $250,000 that typically serve as seed capital for small-scale economic growth projects. The USADF maintains a core focus on agriculture, micro-enterprise development, and community resilience. It prioritizes support for marginalized, poor, and often remote communities as well as selected social groups, such as women and youthâoften in fragile or post-conflict countries. USADF also plays a role in selected multi-agency initiatives, such as Power Africa and YALI. In 2018, the Trump Administration identified three core goals of its policy approach toward Africa: expanding U.S. trade and commercial ties, countering armed Islamist violence and other forms of conflict, and imposing more stringent conditions on U.S. assistance and U.N. peacekeeping missions in the region. The Administration also has emphasized efforts to counter \"great power competitors\" in Africa, namely China and Russia, which it has accused of challenging U.S. influence in the region through \"predatory\" economic practices and other means. Other stated policy objectives include promoting youth development and strengthening investment climates on the continent. Budget requests and other official documents, such as USAID country strategies, have asserted other priorities broadly similar to those pursued by past Administrations, such as boosting economic growth, investment, and trade, enhancing democracy and good governance, promoting socioeconomic development, and improving health outcomes. The Administration has expressed skepticism of U.S. foreign aid globally, and to certain African countries in particular. For instance, then-National Security Advisor John Bolton pledged in 2018 to curtail aid to African countries whose governments are corrupt and to direct assistance toward states that govern democratically, pursue transparent business practices, and \"act as responsible regional stakeholders [...and] where state failure or weakness would pose a direct threat to the United States and our citizens.\" These objectives do not appear to have been revoked since Bolton's departure from the White House in September 2019. Whether the Administration's budget proposals for aid to Africa have reflected such pledges is debatable, however, as discussed below (\"The FY2021 Assistance Request for Africa: Overview and Analysis\"). The Trump Administration has maintained several assistance initiatives focused substantially or exclusively on Africaâincluding PEPFAR, the PMI, Feed the Future, Power Africa, and YALI, among othersâand, as noted above, has launched Prosper Africa, a new Africa-focused trade and investment initiative. At the same time, the Administration has proposed to sharply reduce U.S. assistance to Africa (and globally), even as Congress has provided assistance for Africa at roughly constant levels in recent fiscal years (see Figure 7 ). The Trump Administration also has proposed changes to the manner in which the United States delivers assistance which, if enacted, could have implications for U.S. aid to Africa. These include: C hanges to humanitarian assistance . As part of a consolidation of humanitarian aid accounts, the Administration has repeatedly proposed to eliminate FFP Title II aid, through which African countries received $1.2 billion in emergency food assistance in FY2019. The FY2021 budget request would merge the four humanitarian accountsâFFP Title II, International Disaster Assistance (IDA), Migration and Refugee Assistance (MRA), and Emergency Refugee and Migration Assistance (ERMA)âinto a single International Humanitarian Assistance (IHA) account. Budget documents assert that the consolidation would enhance the flexibility and efficiency of humanitarian assistance. Changes to bilateral economic assistance. The Administration has repeatedly proposed to merge a number of bilateral economic assistance accountsâincluding Development Assistance (DA) and Economic Support Fund (ESF) aid, through which African countries received a cumulative $1.5 billion in FY2019âinto a new Economic Support and Development Fund (ESDF) account. The Administration has consistently requested far less in ESDF than prior-year combined allocations for the subsumed accounts. Budget documents contend the consolidation would improve efficiency. Cutting Foreign Military Financing for Africa . Unlike previous Administrations, the Trump Administration has not requested FMF for African countries, with the exception of Djibouti, which hosts the only enduring U.S. military installation in Africa. Eliminating the USADF. The Administration annually has proposed to eliminate the USADF and create a grants office within USAID that would assume responsibility for the agency's work. In successive budget requests, the Administration has included one-time closeout funding for the agency (e.g., $4.7 million for FY2021). To date, Congress has maintained the existing account structures for the delivery of humanitarian aid and economic assistance and continued to appropriate operating funds to the USADFâmost recently under P.L. 116-94 at a level of $33 million for FY2020. Consideration of the President's FY2021 budget request, released in February 2020, is underway. Overview. The Administration's FY2021 budget request includes $5.2 billion in aid for Africa, an increase from its FY2020 request ($5.0 billion) but 28% below FY2019 allocations ($7.1 billion). These totals do not include emergency humanitarian aid or funding allocated to African countries from global accounts and programs. Funding for Africa would fall sharply from FY2019 levels across most major funding accounts, including Global Health Programs (which would see a 22% drop), PKO (23%), INCLE (46%), and IMET (16%). Non-health development assistance would see the largest decline from FY2019 levels: the request would provide $797 million in ESDF for Africa, down 48% from $1.5 billion in allocated ESF and DA in FY2019. The request includes $75 million in ESDF for Prosper Africa, up from $50 million requested in FY2020. Separate proposed decreases in U.S. funding for U.N. peacekeeping missions, most of which are in Africa, could have implications for stability and humanitarian operations. Analysis. Overwhelmingly weighted toward health assistance, with the balance largely dedicated to traditional development and security activities, the FY2021 request aligns with long-standing U.S. priorities in the regionâwhile at the same time proposing significant cuts to U.S. assistance across all major sectors. Congress has not enacted similar proposed reductions in previous appropriations measures; several Members specifically have raised concerns over the potential ramifications of such cuts for U.S. influence and partnerships abroad. In this regard, it may be debated whether the FY2021 budget, if enacted, would be likely to advance the Administration's stated priority of countering the influence of geostrategic competitors in Africa. For instance, officials have described Prosper Africa as partly intended to counter China's growing influence in the region, yet $75 million in proposed funding for the initiative is arguably incommensurate with the Administration's goal of \"vastly accelerat[ing]\" two way U.S-Africa trade and investment. Despite the Administration's pledge to curtail aid to countries that fail to govern democratically and transparently, top proposed recipients in FY2021 include several countries with poor or deteriorating governance records (e.g., Uganda, Rwanda, Nigeria, and Tanzania). Sharp proposed cuts to bilateral economic assistance, through which the United States funds most DRG activities, could have implications for U.S. democracy and governance programming in the region. Below is a selected list of issues that Congress may consider as it weights budgetary proposals and authorizes, appropriates funding for, and oversees U.S. foreign aid programs in Africa. References to specific countries are provided solely as illustrative examples. Scale and balance . Members may debate whether U.S. assistance to Africa is adequately balanced between sectors given the broad scope of Africa's needs and U.S. priorities on the continent, and whether overall funding levels are commensurate with U.S. interests in the region. Successive Administrations have articulated a diverse range of development, governance, and security objectives in Africaâyet U.S. assistance to the region has remained dominated by funding for health programs since the mid-2000s. Some Members of Congress have expressed concern over the relatively small share of U.S. aid dedicated to other stated U.S. priorities, such as promoting good governance , ex panding U.S.-Africa commercial ties, and mitigating conflict. Meanwhile, the Trump Administration's repeated proposals to sharply reduce U.S. assistance to Africa have spurred pushback from some Members. Congressional objections have centered on the risks that aid cuts could potentially pose for U.S. national security, foreign policy goals, and U.S. influence and partnerships in Africa. Notably, the proposed cuts in U.S. assistance come at a time when China and other countries, including Russia, India, Turkey, and several Arab Gulf states, are seeking to expand their roles in the region. Transparency and oversight. While this report provides approximate funding figures based largely on publicly available allocation data, comprehensive estimates of U.S. aid to Africa and amounts dedicated to specific focus areas are difficult to determine. Executive branch budget documents and congressional appropriations measures do not fully disaggregate aid allocations by country or region; meanwhile, databases such as USAID's Foreign Aid Explorer and the State Department's ForeignAssistance.gov provide data on obligations and disbursements but do not track committed funding against enacted levels, raising challenges for congressional oversight. As noted above, gaps in region- and country-level assistance data may partly reflect efforts to maintain flexibility in U.S. assistance programsâfor instance, by appropriating humanitarian aid to global accounts and allocating it according to need. At the same time, Congress has not imposed rigorous reporting requirements evenly across U.S. foreign aid programs. For instance, while DOD \"global train and equip\" assistance is subject to congressional notification and reporting requirements that require detailed information about country and security force unit recipients and assistance to be provided, there is no analogous reporting requirement governing State Department security assistance. Public budget documents may thus include country- and program-level breakouts of some security assistance, while other fundsâsuch as for the Global Peace Operations Initiative (GPOI), a PKO-funded peacekeeping capacity-building program through which some African militaries have received substantial U.S. training and equipmentâare not reflected in bilateral aid budgets. A lack of data on what U.S. assistance has been provided to African countries may obscure policy dilemmas or inhibit efforts to evaluate impact. Country Ownership. Policymakers may debate the extent to which U.S. assistance supports partner African governments in taking the lead in addressing challenges related to socioeconomic development, security, and governance. The majority of U.S. aid to Africa is provided through nongovernment actorsâsuch as U.N. agencies, humanitarian organizations, development practitioners, and civil society entitiesârather than directly to governments. (Exceptions include U.S. security assistance for African security forces and some healthcare capacity-building programs.) Channeling aid through nongovernment actors may be preferable in countries where the state is unable or unwilling to meet the needs of its population, and may additionally grant the United States greater control and oversight over the use of aid funds. At the same time, experts debate whether this method of assistance adequately equips recipient governments to take primary responsibility for service delivery and other state dutiesâas well as whether this mode of delivery may limit donor influence and leverage with the recipient country government. Conditions on U.S. assistance. Congress has enacted legislation denying or placing conditions on assistance to countries that fail to meet certain standards in, for instance, human rights, counterterrorism, debt repayment, religious freedom, child soldier use, or trafficking in persons. In general, statutes establishing such conditions accord the executive branch the discretion to designate countries for sanction or waive such restrictions. Congress may continue to debate the merits and effectiveness of such restrictions. In FY2020, several African governments are subject to aid restrictions due to failure to meet standards related to: Religious freedom, under the International Religious Freedom Act of 1998 ( P.L. 105-292 ), with Eritrea currently listed as a \"Country of Particular Concern.\" The use of child soldiers, under the Child Soldiers Prevention Act (CSPA, P.L. 110-457 , as amended) and related legislation, with DRC, Mali, Somalia, South Sudan, and Sudan subject to potential security assistance restrictions in FY2020. In October 2019, President Trump exercised his authority under CSPA to waive certain restrictions for DRC, Mali, Somalia, and South Sudan. Trafficking in persons (TIP), under the Trafficking Victims Protection Act of 2000 (TVPA, P.L. 106-386 , as amended) and related legislation, with Burundi, Comoros, DRC, Equatorial Guinea, Eritrea, The Gambia, Mauritania, and South Sudan subject to potential aid restrictions in FY2020. In October 2019, President Trump partially waived such restrictions with regard to DRC and South Sudan, and fully waived them for Comoros. Some African countries periodically have been subject to other restrictions on U.S. foreign aid, such as those imposed on governments that rose to power through a coup d'Ã©tat, support international terrorism, or are in external debt arrears. (In contrast to most legislative aid restrictions, a provision in annual appropriations legislation prohibiting most aid to governments that accede to power through a military coup does not grant the executive branch authority to waive the restrictions. ) Congress has also included provisions in annual aid appropriations measures restricting certain aid to specific African countries, notably Sudan and Zimbabwe. In addition, the so-called \"Leahy Laws\" restrict most kinds of State Department- and DOD-administered security assistance to individual units or members of foreign security forces credibly implicated in a \"gross violation of human rights,\" subject to certain exceptions. The executive branch does not publish information on which units or individual personnel have been prohibited from receiving U.S. assistance pursuant to these laws. Congress also has restricted certain kinds of security assistance deemed likely to be used for unintended purposes; for instance, language in annual foreign aid appropriations measures prohibits the use of funds for providing tear gas and other crowd control items to security forces that curtail freedoms of expression and assembly. Unintended consequences. Some observers have raised concerns that the provision of U.S. foreign assistance may have unintended consequences, including in Africa. For instance, some analysts have questioned whether U.S. food assistance may inadvertently prolong civil conflict by enabling warring parties to sustain operations, though others have challenged that assertion. Whether providing certain forms of U.S. aid, notably security assistance, may at times jeopardize U.S. policy goals in other areas is another potential consideration. For instance, some analysts have questioned whether security assistance to African governments with poor human rights records (e.g., Chad, Cameroon, Nigeria, and Uganda) may strengthen abusive security forces or inhibit U.S. leverage on issues related to democracy and governance. Proponents of U.S. security assistance programs in Africa may contend that aspects of such engagementsâsuch as military professionalization and human rights trainingâenhance security sector governance and civil-military relations, and may thus improve human rights practices by partner militaries. Congress commenced consideration of the President's FY2021 budget request in February 2020. To date, the 116 th Congress has not adopted many of the Administration's proposed changes regarding assistance to Africa, notably its repeated attempts to significantly reduce aid to the region. Allocated funding has instead hovered around $7 billion per year, excluding emergency humanitarian aid. As Congress debates the FY2021 Department of State, Foreign Operations, and Related Programs appropriations measure, Members may consider issues such as: The economic, humanitarian, and health-related shocks of the COVID-19 pandemic, which is expected to have a severe impact on Africa's development trajectory; Unfolding political transitions in Sudan and Ethiopia, which may have significant implications for governance and conflict trends in the region; Conflicts and humanitarian crises in Burkina Faso, Cameroon, the Central African Republic, the Democratic Republic of Congo, Mali, Nigeria, Somalia, and South Sudan; Repressive governance in several countries that rank as top recipients of U.S. assistance in Africa, including Rwanda, Tanzania, Uganda, and Zambia; The effectiveness of existing conditions on U.S. foreign assistance to Africa, whether additional conditions and restrictions may be necessary, and the appropriate balance between ensuring congressional influence and providing executive branch flexibility; U.S.-Africa trade and investment issues, including as they relate to funding and overseeing the Administration's Prosper Africa initiative; and The involvement in Africa of foreign powers such as China and Russia, and the implications of such engagement for U.S. national security and policy interests. Appendix A. U.S. Assistance to Africa, by Country Appendix B. MCC Programs in Africa: A Snapshot", "summary": "Overview. Congress authorizes, appropriates, and oversees U.S. assistance to sub-Saharan Africa (\"Africa\"), which received over a quarter of U.S. aid obligated in FY2018. Annual State Department- and U.S. Agency for International Development (USAID)-administered assistance to Africa increased more than five-fold over the past two decades, primarily due to sizable increases in global health spending and more incremental growth in economic and security assistance. State Department and USAID-administered assistance allocated to African countries from FY2019 appropriations totaled roughly $7.1 billion. This does not include considerable U.S. assistance provided to Africa via global accounts, such as emergency humanitarian aid and certain kinds of development, security, and health aid. The United States channels additional funds to Africa through multilateral bodies, such as the United Nations and World Bank. Objectives and Delivery. Over the past decade, roughly 70-75% of annual U.S. aid to Africa has sought to address health challenges, notably relating to HIV/AIDS, malaria, maternal and child health, and nutrition. Much of this assistance has been delivered via disease-specific initiatives, including the President's Emergency Plan for AIDS Relief (PEPFAR) and the President's Malaria Initiative (PMI). Other U.S. aid programs seek to foster agricultural development and economic growth; strengthen peace and security; improve education access and social service delivery; bolster democracy, human rights, and good governance; support sustainable natural resource management; and address humanitarian needs. What impacts the Coronavirus Disease 2019 (COVID-19) pandemic may have for the scale and orientation of U.S. assistance to Africa remains to be seen. Aid to Africa during the Trump Administration. The Trump Administration has maintained many of its predecessors' aid initiatives that focus wholly or largely on Africa, and has launched its own Africa-focused trade and investment initiative, known as Prosper Africa. At the same time, the Administration has proposed sharp reductions in U.S. assistance to Africa, in line with proposed cuts to foreign aid globally. It also has proposed funding account eliminations and consolidations that, if enacted, could have implications for U.S. aid to Africa. Congressional consideration of the Administration's FY2021 budget request is underway; the Administration has requested $5.1 billion in aid for Africa, a 28% drop from FY2019 allocations. Congress has not enacted similar proposed cuts in past appropriations measures. Selected Considerations for Congress. Policymakers, analysts, and advocates continue to debate the value and effectiveness of U.S. assistance programs in Africa. Some Members of Congress have questioned whether sectoral allocations are adequately balanced given the broad scope of Africa's needs and U.S. priorities in the region. Concern also exists as to whether funding levels are commensurate with U.S. interests. Comprehensive regional- or country-level breakouts of U.S. assistance are not routinely made publicly available in budget documents, complicating estimates of U.S. aid to the region and congressional oversight of assistance programs. In addition to authorizing and appropriating U.S. foreign assistance, Congress has shaped U.S. aid to Africa through legislation denying or placing conditions on certain kinds of assistance to countries whose governments fail to meet standards in, for instance, human rights, debt repayment, or trafficking in persons. Congress also has restricted certain kinds of security assistance to foreign security forces implicated in human rights abuses. Some African countries periodically have been subject to other restrictions on U.S. foreign assistance, including country-specific provisions in annual aid appropriations measures restricting certain kinds of assistance. Congress may continue to debate the merits and effectiveness of such restrictions while overseeing their implementation.", "document_type": "crs"}
{"report": "The William D. Ford Federal Direct Loan (Direct Loan) program makes several types of federal student loans available to individuals to assist them with financing postsecondary education expenses. It represents the single largest source of federal financial assistance to support students' postsecondary educational pursuits. The U.S. Department of Education (ED) estimates that in FY2020, 15.9 million new loans, averaging $6,299 each and totaling $100.2 billion, will be made through the Direct Loan pro gram to undergraduate and graduate students, and to the parents of undergraduate students. In addition, ED estimates that 755,000 Direct Consolidation Loans, averaging $61,433 each and totaling $46.4 billion, will be made to existing borrowers of federal student loans. As of the end of the second quarter of FY2019, $1.2 trillion in principal and interest on Direct Loan program loans, borrowed by or on behalf of 34.5 million individuals, remained outstanding. This report presents a comprehensive overview of the terms and conditions that apply to federal student loans made through the Direct Loan program. It begins by providing background information on the history of the Direct Loan program. This is followed by a brief description of the various types of loans that are offered through the program. The report then presents a thorough description of the terms and conditions for loans made through the Direct Loan program. In identifying and describing loan terms and conditions, it focuses on provisions applicable to loans that are currently being made or that have been made in recent years. Emphasis is placed on discussing Direct Loan program provisions that are related to borrower eligibility, amounts that may be borrowed, interest rates and fees, procedures for loan repayment, repayment relief, the availability of loan discharge and loan forgiveness benefits, and the consequences of defaulting. The final section of the report provides a summary of the methods that are used to ensure that borrowers are informed about the terms and conditions of the loans they obtain and their obligation to repay them. This report has been prepared as a resource for Members of Congress, congressional committees, and congressional staff to support them in their legislative, oversight, and representational roles related to federal student loan policy. It is intended to provide a thorough, but nonexhaustive, description of loan terms and conditions and borrower benefits. It is not intended to be relied upon by borrowers as a resource for validating individual eligibility for specific borrower benefits. Appendix A to this report contains a directory of resources from which additional information may be obtained about loans made available through the Direct Loan program. Appendix B consists of a glossary of terms. Appendix C contains a set of tables that present historical information on borrowing limits, interest rates, and fees that have applied to loans made through the Direct Loan program. The Direct Loan program is authorized under Title IV, Part D of the Higher Education Act of 1965 (HEA; P.L. 89-329, as amended). It was established by the Student Loan Reform Act of 1993 (SLRA), Title IV of the Omnibus Budget Reconciliation Act of 1993 ( P.L. 103-66 ). Federal student loans were first made through the Direct Loan program in 1994. In the Direct Loan program, loans are made by the government using federal capital (i.e., funds from the U.S. Treasury), and once made, outstanding loans constitute an asset of the federal government. Some important characteristics of loans made through the Direct Loan program are that the federal government assumes the risk for losses that may occur as a result of borrower default, and that it pays for the discharge of loans in cases of borrower death, total and permanent disability, and other limited instances. The federal government also assumes the cost of loans that are not required to be paid in full due to borrowers satisfying criteria that make them eligible to have a portion or all of the balance of their loans discharged under any of several loan forgiveness programs. For federal budgeting purposes, the program is classified as a direct loan program, which is a type of federal credit program for which mandatory spending authority is provided. ED's Office of Federal Student Aid (FSA) is the primary entity tasked with administering the Direct Loan program. The institutions of higher education (IHEs) that participate in the Direct Loan program originate loans to borrowers through FSA's Common Origination and Disbursement (COD) system. Contractors hired by ED service and collect on the program's loans. When the Direct Loan program was first established, it was intended gradually to expand and then ultimately fully replace the Federal Family Education Loan (FFEL) program, a guaranteed student loan program authorized under Title IV, Part B of the HEA, and through which most federal student loans were being made. The FFEL program had descended from the Guaranteed Student Loan (GSL) program, which was enacted under Title IV of the HEA in 1965 to enhance access to postsecondary education for students from low- and middle-income families by providing them access to low-interest federal student loans. In the FFEL program, loan capital was provided by private lenders who also originated and serviced loans. The federal government guaranteed lenders against loss due to factors such as borrower default, death, total and permanent disability, and in limited instances, bankruptcy. State and nonprofit guaranty agencies administered the federal guarantee. The federal government was also responsible for making several different types of payments to lenders and guaranty agencies to support the operation of the program. The FFEL program was administratively complex and the Direct Loan program was established with the aims of streamlining the federal student loan delivery system and achieving cost savings. Several years into the implementation of the Direct Loan program, statutory provisions specifying that it ultimately succeed the FFEL program were repealed by the Higher Education Amendments of 1998 ( P.L. 105-244 ). From 1994 to 2010, the Direct Loan program and the FFEL program operated side-by-side. During this period, IHEs could elect to participate in the program of their choice. As this decision was made at the institutional level, the program through which an individual could borrow federal student loans was dependent upon the program participation decisions made by the institution a student attended. During the period while loans were being made through both the FFEL and Direct Loan programs, from the perspective of the borrower the terms and conditions of loans offered through the programs were similar in most respects. However, the degree of similarity varied over time. Notable differences included certain characteristics of the repayment plans offered and, beginning in 2008, the availability of the Public Service Loan Forgiveness (PSLF) program only to borrowers of loans made through the Direct Loan program. The authority to make loans through the FFEL program was terminated, effective July 1, 2010, by the SAFRA Act, Title II of the Health Care and Education Reconciliation Act of 2010 (HCERA; P.L. 111-152 ). While loans are no longer being made through the FFEL program, as of the end of the second quarter of FY2019, $271.6 billion in principal and interest on FFEL program loans, borrowed by or on behalf of 12.8 million students, remained outstanding and due to be repaid over the coming years. Over the history of the Direct Loan program, Congress has periodically made changes to loan terms and conditions. Such changes have often been made as part of comprehensive amendments to the HEA, which authorizes the Direct Loan program; as part of amendments contained in budget reconciliation measures; or as part of amendments included in annual appropriations measures. Congress may well contemplate making future changes to loan terms and conditions. The following types of loans are currently made available to borrowers through the Direct Loan program: Direct Subsidized Loans . These loans are available only to undergraduate students who demonstrate financial need. Direct Subsidized Loans are characterized by having an interest subsidy that applies during an in-school period when a borrower is enrolled in an eligible program on at least a half-time basis, during a six-month grace period, during periods of authorized deferment, and during certain other periods. The Direct Subsidized Loans currently being made have a fixed interest rate that remains constant for the duration of the loan. Direct Unsubsidized Loans . These loans are available to undergraduate students, graduate students, and professional students, without regard to the student's financial need. Direct Unsubsidized Loans generally do not have an interest subsidy. The Direct Unsubsidized Loans currently being made have a fixed interest rate that remains constant for the duration of the loan. The interest rate on loans made to graduate and professional students is higher than the rate on loans made to undergraduate students. Direct PLUS Loans . These loans are available to graduate and professional students, and to the parents of undergraduate students who are dependent upon them for financial support. They are made without regard to financial need and generally do not have an interest subsidy. The Direct PLUS Loans currently being made have a fixed interest rate, which remains constant for the duration of the loan; and the interest rate is higher than the rate on both Direct Subsidized Loans and Direct Unsubsidized Loans. Direct Consolidation Loans . These loans allow individuals who have at least one loan borrowed through either the Direct Loan program or the FFEL program to refinance their eligible federal student loan debt by borrowing a new loan and using the proceeds to pay off their existing federal student loan obligations, including loans that are in default. Direct Consolidation Loans may be obtained without regard to financial need. The Direct Consolidation Loans currently being made have fixed interest rates, which are determined by calculating the weighted average of the interest rates on the loans that are consolidated, rounded up the result to the next higher one-eighth of a percentage point. Upon an individual obtaining a Direct Consolidation Loan, a new repayment period begins, which may be for a longer term than applied to the loans originally borrowed. A Direct Consolidation Loan may have a subsidized component 18 and an unsubsidized component . Eligibility for an individual to borrow a loan through the Direct Loan program and the amount that he or she may borrow are governed by provisions in the HEA and by policies and procedures implemented by ED. All loan types except Direct PLUS Loans are made available without consideration of a borrower's ability to repay the loan. Eligibility to borrow a Direct PLUS Loan depends on an individual's creditworthiness. The section that follows identifies and describes factors that determine an individual's eligibility to borrow one or more types of loans made available through the Direct Loan program. This is followed by a section that describes policies and procedures for determining amounts that may be borrowed. For an individual to be eligible to borrow a loan through the Direct Loan program, the student borrower, or the student on whose behalf a parent borrower would obtain a Direct PLUS Loan, must meet a number of eligibility requirements. A broad set of general eligibility criteria applies to students who may benefit from a Direct Subsidized Loan, a Direct Unsubsidized Loan, or a Direct PLUS Loan. An additional set of requirements applies specifically to applicants seeking to borrow a Direct PLUS Loan. Still other requirements apply to applicants for Direct Consolidation Loans. Eligibility to borrow various types of loans is also affected by a student's dependency status, program level (e.g., undergraduate, graduate, or professional), undergraduate class level, financial need, cost of attendance (COA) of the academic program, estimated financial assistance (EFA) he or she expects to receive from other sources, and certain other factors. Factors that affect eligibility to borrow through the Direct Loan program are discussed below. In general, for a student to be eligible to borrow a Direct Subsidized Loan, a Direct Unsubsidized Loan, or a Direct PLUS Loan, or for a parent to borrow a Direct PLUS Loan on behalf of a student, the student must be enrolled on at least a half-time basis as a regular student in either an eligible program at a participating eligible IHE, a preparatory program necessary for enrollment in an eligible program (for up to one year), or a teacher certification program; not be incarcerated; be a U.S. citizen or national, U.S. permanent resident, or other eligible noncitizen; maintain satisfactory academic progress as defined by the school; not be in default on a federal student loan, nor owing a refund on a grant or loan made under HEA, Title IV without having made satisfactory repayment arrangements; have on file at the IHE attended a statement of educational purpose stating that the loan will be used solely for educational expenses; and meet applicable Selective Service System registration requirements. For purposes of awarding federal student aid, dependency status determines whether a student is deemed to be dependent upon his or her parents' financial support, or is independent of their support. Dependency status is determined by a student's responses to questions on the Free Application for Federal Student Aid (FAFSA), which he or she must complete and submit to ED when applying for federal student aid. A student is deemed to be an independent student if he or she is, or will be, 24 years of age or older before January 1 of the award year; is married at the time of completing the FAFSA; will be a graduate or professional student at the start of the award year; is currently serving on active duty in the Armed Forces for other than training purposes; is a veteran of the Armed Forces; has legal dependents other than a spouse; was an orphan, in foster care, or a ward of the court, at any time since age 13; is an emancipated minor or is in legal guardianship as determined by a court of competent jurisdiction in the individual's state of legal residence, or was when reaching the age of majority; is an unaccompanied youth who is homeless, or self-supporting and at risk of being homeless; or is a student for whom a financial aid administrator makes a documented determination of independence by reason of other unusual circumstances or based upon a documented determination of independence that was previously made by another financial aid administrator in the same award year. A student who does not satisfy any of the criteria to qualify as an independent student is classified as a dependent student . Dependency status determines the types of loans available to be borrowed by students and their families, which in turn affects the amounts that may be borrowed. Of particular importance with regard to undergraduate students is the fact that Direct PLUS Loansâthe loans with the most flexible borrowing limitsâare available to the parents of dependent students but not to the parents of independent students. However, independent undergraduate students are extended higher personal borrowing limits than are dependent students. These differential borrowing limits are predicated on the expectation that the postsecondary education expenses of dependent students will be financed by some combination of students and their parents, whereas the postsecondary education expenses of independent students will typically be financed without parental assistance. Dependency status also determines which individuals in a student's family will have their income and assets considered in need analysis calculations for the student (discussed below). Need analysis calculations for a dependent student are based on the income and assets of both the student and the student's parents, whereas need analysis calculations for an independent student are based on the income and assets of the student (and if applicable, the student's spouse). The academic level of the program in which a student is enrolled impacts both the types of loans that he or she may borrow and certain terms and conditions of such loans. Undergraduate students may borrow Direct Subsidized Loans and Direct Unsubsidized Loans, and the parents of undergraduate students who are dependent upon them for financial support may borrow Direct PLUS Loans on the student's behalf. Direct PLUS Loans may not be borrowed by undergraduate students nor by parents on behalf of undergraduate independent students. Graduate and professional students may borrow Direct Unsubsidized Loans and Direct PLUS Loans. To be eligible to borrow as a graduate or professional student, an individual must be enrolled in a program above the baccalaureate level or in one that leads to a first professional degree, must have completed at least the equivalent of three years of full-time study either prior to entering the program or as part of it, and must not be concurrently receiving Title IV aid as an undergraduate student. Graduate and professional students, all of whom are classified as independent students, are extended higher borrowing limits than undergraduate students. For undergraduates, a student's class level determines the maximum amount the student may borrow on an annual basis. A student's class level is based on his or her progression according to the academic standards of the school the student attends. For undergraduate students, progression to a higher grade level for purposes of awarding a loan through the Direct Loan program does not necessarily correspond to the start of a new academic year (AY). For instance, a student who continues to make satisfactory academic progress but does not progress to the next grade level due to having completed an insufficient number of credits could borrow a loan through the Direct Loan program more than once as a first-year student. Once the student accrues enough credits to progress to the next higher grade level, he or she would become eligible for the higher borrowing limits available to second-year students, and so on. Direct Subsidized Loans are need-based and may only be borrowed by students who demonstrate having financial need according to federal need analysis procedures. Applicants seeking to borrow Direct Subsidized Loans must undergo a need test through which the expected family contribution (EFC) to be made by the student, and, if applicable, the student's family, toward paying the student's postsecondary education expenses is determined on the basis of the financial resources available to the student. According to federal student aid need analysis procedures, the sum of the student's EFC and the amount of estimated financial assistance (EFA) he or she expects to receive from sources other than programs authorized under Title IV of the HEA is subtracted from the estimated cost of attendance (COA) of the institution the student attends to determine the amount of need-based financial aid that he or she is eligible to receive. Additional procedures are followed to determine the composition of the student's federal student aid package. For instance, undergraduate students must receive a determination of their eligibility to receive a Federal Pell Grant (a form of need-based aid available only to undergraduates) prior to being certified by their school as being eligible to borrow a Direct Subsidized Loan. This procedure is designed to first provide maximum grant aid to needy students before they incur student loan debt. The amount a student may borrow with a Direct Subsidized Loan may not exceed the amount of the student's unmet financial need after other forms of need-based federal student aid available under HEA, Title IV have been awarded. (For additional information, see the section on \" Limits on Borrowing Determined by Need Analysis and Packaging \" below.) Since July 1, 2012, only undergraduate students have been eligible to borrow Direct Subsidized Loans. Since July 1, 2013, a student who is a first-time borrower may only borrow Direct Subsidized Loans for a period that may not exceed 150% of the published length of the academic program in which he or she is currently enrolled. This is referred to as the Direct Subsidized Loan maximum eligibility period . For undergraduates subject to this provision, a student enrolled in a two-year associate degree program may receive Direct Subsidized Loans for a maximum eligibility period of no more than three years, while a student enrolled in a four-year bachelor's degree program may receive Direct Subsidized Loans for a maximum eligibility period of no more than six years. Subsidized usage periods are used to measure a borrower's progress toward the maximum eligibility period. They are the quotient of dividing the number of days in the borrower's loan period (e.g., semester, quarter) for a Direct Subsidized Loan by the number of days in the academic year for which the borrower receives the Direct Subsidized Loan, rounded to the nearest tenth of a year. Subsidized usage periods are prorated based on intensity of enrollment (i.e., multiplied by 0.75 or 0.50 for three-quarter or half-time enrollment, respectively). A borrower's remaining eligibility period is determined by subtracting a borrower's cumulative subsidized usage periods from the maximum eligibility period. This provision also limits a borrower's eligibility for the interest subsidy on Direct Subsidized Loans. If a Direct Subsidized Loan borrower subject to this provision remains enrolled in the same program for which the loan was obtained, or another undergraduate academic program of equal or shorter length, beyond the applicable maximum eligibility period, the borrower will lose the interest subsidy and will become responsible for paying the interest that accrues on his or her Direct Subsidized Loans after the date that the maximum eligibility period was exceeded. In addition to satisfying the general student-based eligibility criteria, an individual must meet certain other eligibility criteria specifically applicable to Direct PLUS loans. Direct PLUS Loans may be borrowed by one or both parents of an undergraduate dependent student who meets the general student-based eligibility criteria described above. Eligible parents include biological parents, adoptive parents, and stepparents (if the stepparent's income and assets are taken into account in determining a student's EFC). A legal guardian may not borrow a Direct PLUS Loan on behalf of a student as a parent borrower. Parent borrowers must also meet the same citizenship and residency requirements as student borrowers; may not be in default on a federal student loan, nor owe a refund on a grant or loan made under Title IV without having made satisfactory repayment arrangements; and may not be incarcerated. For a parent to be eligible to borrow a Direct PLUS Loan on behalf of an undergraduate dependent student, the student must have completed a FAFSA. There is no requirement that a parent borrower complete a separate FAFSA. The eligibility of a noncustodial parent to borrow a Direct PLUS Loan on behalf of his or her child is not impacted by that parent's financial information not appearing on the student's FAFSA. Eligibility for an individual to borrow a Direct PLUS Loan also depends on that individual's creditworthiness. Only individuals who do not have an adverse credit history, as determined according to procedures specified in regulations, may borrow Direct PLUS Loans. The creditworthiness criteria apply to both parent borrowers and to graduate and professional student borrowers. Creditworthiness is assessed on the basis of a credit report on the applicant obtained from at least one consumer reporting agency. An applicant is considered to have an adverse credit history if he or she either has one or more debts totaling more than $2,085 that are 90 days or more delinquent as of the date of the credit report, or that have been placed in collection or been charged off by the creditor as a loss within the two years prior to the credit report; or has been the subject of a default determination, bankruptcy discharge, foreclosure, repossession, tax lien, wage garnishment, or write-off of a debt under HEA, Title IV within the five years prior to the credit report. An applicant who is determined to have an adverse credit history may not obtain a Direct PLUS Loan unless he or she either obtains an endorser or demonstrates that extenuating circumstances exist with regard to the applicant's credit history. Extenuating circumstances may include an updated credit report or a letter from a creditor stating that the applicant has made satisfactory repayment arrangements on a derogatory debt. In addition, to obtain a Direct PLUS Loan an applicant who has an adverse credit history must also complete credit counseling. (See the section on \" PLUS Loan Credit Counseling For Borrowers with Adverse Credit .\") An applicant may not, however, be rejected for a Direct PLUS Loan on the basis of having no credit history. A dependent undergraduate student whose parents are unable to obtain a Direct PLUS Loan due to their having an adverse credit history may borrow a larger amount in the form of a Direct Unsubsidized Loan. In such a case, the student may borrow up to the borrowing limit applicable to a similarly situated independent undergraduate student. (These amounts are discussed below in the section on \" Amounts That May Be Borrowed .\") To be eligible to obtain a Direct Consolidation Loan, a borrower must have an outstanding principal balance on at least one loan that was made through either the Direct Loan program or the FFEL program. In addition, with respect to the loans being consolidated, the applicant must be (1) in the grace period prior to entering repayment; (2) in repayment status, but not in default; or (3) in default, but having made satisfactory repayment arrangements. For the purposes of including a defaulted loan in a Direct Consolidation Loan, making \"satisfactory repayment arrangements\" means that the defaulted borrower has made at least three consecutive voluntary full monthly payments within 20 days of the due date, or has agreed to repay according to one of the Income-Driven Repayment (IDR) plans (described below). A borrower of a defaulted loan who is subject to a court judgment or wage garnishment is ineligible to obtain a Direct Consolidation Loan. In general, a set of loans may be consolidated only once. However, in select circumstances a Direct Consolidation Loan may be used to repay a previously obtained Direct Consolidation Loan or a FFEL Consolidation Loan. Loans made to borrowers within 180 days prior to or after the date of obtaining a Direct Consolidation Loan may be added to that Direct Consolidation Loan. A borrower who has an existing Direct Consolidation Loan and also has other eligible loans that have not been consolidated, or who subsequently obtains other eligible loans, may consolidate those loans with his or her existing loans for purposes of obtaining a new Direct Consolidation Loan. A borrower who has an existing FFEL Consolidation Loan and whose loan is in default or has been referred to a guaranty agency for default aversion assistance may consolidate his or her loan into a Direct Consolidation Loan for purposes of repaying according to one of the IDR plans. Finally, a borrower who has an existing FFEL Consolidation Loan may consolidate that loan into a Direct Consolidation Loan for the purposes of applying for loan forgiveness through the Public Service Loan Forgiveness (PSLF) Program or to receive the No Accrual of Interest on Loans of Certain Active Duty Servicemembers benefit that is only available to borrowers of loans made through the Direct Loan program. A Direct Consolidation Loan must consist of at least one eligible loan made through either the Direct Loan or FFEL programs, and may also contain other types of federal student loans. The eligible types of federal student loans made through the Direct Loan and FFEL programs include Direct Subsidized Loans, Direct Unsubsidized Loans, Direct PLUS Loans, Direct Consolidation Loans, FFEL Subsidized Stafford Loans, FFEL Unsubsidized Stafford Loans, FFEL PLUS Loans, and FFEL Consolidation Loans. The eligible types of federal student loans made outside of the Direct Loan and FFEL programs are Federal Perkins Loans, Guaranteed Student Loans, Federal Insured Student Loans, National Direct Student Loans, National Defense Student Loans, Supplemental Loans for Students (SLS), Auxiliary Loans to Assist Students (ALAS), Health Education Assistance Loans (HEAL), Health Professions Student Loans (HPSL), Loans for Disadvantaged Students (LDS), and Nursing Loans. The maximum amounts that a student or a parent may borrow in loans made through the Direct Loan program are determined by the interaction of annual and aggregate borrowing limits and federal need analysis and packaging procedures. Limitations on borrowing vary by loan type, borrower characteristics, program level, and class level. For undergraduate students, annual loan limits cap both the maximum amount that may be borrowed in Direct Subsidized Loans and the total combined amount that may be borrowed through Direct Subsidized Loans and Direct Unsubsidized Stafford Loans during a single academic year. Annual loan limits for Direct Subsidized Loans vary by undergraduate class level; however, at any particular class level these limits are the same for both undergraduate dependent students and undergraduate independent students. Annual loan limits for the total combined amount of Direct Subsidized Loans and Direct Unsubsidized Loans that may be borrowed by undergraduate students vary by both undergraduate class level and by student dependency status. For graduate and professional students, annual loan limits cap the maximum that may be borrowed in Direct Unsubsidized Loans, irrespective of class level. However, higher exceptional annual loan limits are extended to students enrolled in certain health professions programs. There is no specified limit to the amount that may be borrowed in Direct PLUS Loans by either parent borrowers or by graduate and professional students. The annual loan limits apply to the maximum principal amount that may be borrowed in an academic year. Any loan origination fees that the borrower is required to pay (see the \" Loan Origination Fees \" below) are included in the amount to be borrowed that is subject to these limits. Borrowing limits for a student who is enrolled for less than one year are prorated based on the fraction of the academic year for which the student is enrolled. An academic year is defined in statute as a minimum of 30 weeks of instruction for courses of study measured in credit hours, or 26 weeks for courses of study measured in clock hours and during which a full-time student is expected to complete a minimum of 24 semester or trimester hours, 36 quarter hours, or 900 clock hours. Aggregate loan limits cap the total cumulative amount of outstanding loans that a student may borrow through certain loan types. One limit applies to the total amount that may be borrowed in Direct Subsidized Loans and another limit applies to the total combined amount that may be borrowed in Direct Subsidized Loans and Direct Unsubsidized Loans. No aggregate limits are placed on Direct PLUS Loan borrowing. The aggregate loan limits apply only to the aggregate outstanding principal balance (OPB) of the loans a student has borrowed. They do not apply to accrued or capitalized interest. Annual and aggregate limits that have applied to loans made through the Direct Loan program since July 1, 2012, are presented in Table 1 . A listing of the annual and aggregate loan limits that have applied throughout the history of the Direct Loan program is presented in Appendix C in Table C-1 . The process of awarding one or more forms of federal student aid to a student in accordance with federal student aid need analysis procedures and individual program rules is referred to as packaging . Financial aid administrators at IHEs are afforded a degree of discretion in determining how aid is packaged. The packaging of aid may affect the amounts that may be borrowed by a student or by a parent on behalf of a student through the various types of loans offered through the Direct Loan program. The process for packaging aid provided through the Direct Loan program is briefly described below. The following terms are instrumental in describing this process. Cost of A ttendance (COA). This is an institution-determined amount indicative of a student's educational expenses for a period of enrollment (e.g., an academic year) at the IHE. It is determined by the institution a student attends and may include tuition and fees, and allowances for room and board, books, supplies, transportation, loan fees, personal expenses, child or dependent care, etc. For the Direct Loan program, a student's COA represents an absolute limit on the maximum amount of aid he or she may receive during an academic year. Expected F amily C ontribution (EFC). This is the dollar amount a student and the student's family (e.g., parents or spouse) are expected to contribute toward his or her education expenses for a year. A student's EFC is calculated according to procedures specified in law using information supplied by the student on the FAFSA. The formula for calculating a student's EFC takes into account myriad factors including taxed and untaxed income, financial assets, certain benefits (e.g., Social Security, unemployment compensation), family size, and the number of family members to be enrolled in college during an academic year. Estimated F inancial A ssistance (EFA). This is the amount of aid anticipated to be made available to a student from federal, state, institutional, or other sources for a period of enrollment. It includes grant, scholarship, fellowship, loan, and need-based employment assistance. For purposes of need analysis and packaging, two variations of EFA are relevant: (1) EFA not received under HEA, Title IV programs, and (2) EFA from all sources. EFA does not include Iraq and Afghanistan Service Grants; federal veterans' education benefits; or, for purposes of awarding Direct Subsidized Loans, Segal AmeriCorps Education Awards. F inancial N eed. This is the amount determined by subtracting a student's EFC and EFA not received under HEA, Title IV from the student's COA. Unmet F inancial N eed. This is the amount determined by subtracting the sum of a student's EFC and EFA from the student's COA. When packaging Title IV aid, the total amount of need-based aid awarded to a student may not exceed the amount of the student's financial need. A common packaging strategy is to award need-based aid that is not required to be repaid (e.g., Federal Pell Grant, Federal Supplemental Educational Opportunity Grant [FSEOG] and Federal Work-Study [FSW] awards) before awarding loan aid, which must be repaid. With respect to loans made through the Direct Loan program, only Direct Subsidized Loans are need-based; however, Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans may all be awarded to satisfy a student's unmet financial need. Additionally, once a student's unmet financial need has been satisfied, non-need-based aid, such as Direct Unsubsidized Loans and Direct PLUS Loans, may be awarded to replace some or all of a student's EFC. Overall, when packaging Title IV aid the total amount awarded (including both need-based and non-need-based aid) may not exceed the student's COA, less EFA. Processes for determining the amount of aid that may be awarded through the various types of loans offered through the Direct Loan program are described below. Direct Subsidized Loans are need-based. They may be awarded to satisfy a student's unmet financial need. The maximum Direct Subsidized Loan amount a student is eligible to borrow is determined by summing the student's EFC and EFA, and then subtracting that amount from the student's COA for the school attended. As discussed above, Direct Subsidized Loan borrowing is also capped by applicable annual loan limits. The calculation shown in the text box below is used to determine the amount that a student may borrow through a Direct Subsidized Loan. Direct Unsubsidized Loans are non-need-based. Students are eligible to borrow Direct Unsubsidized Loans irrespective of the amount of their EFC, in amounts up to the lesser of (1) the result of subtracting the student's EFA (including, for undergraduate students, any amount borrowed through a Direct Subsidized Loan) from COA, or (2) the result of subtracting the amount borrowed through a Direct Subsidized Loan from the annual Direct Subsidized Loan and Direct Unsubsidized Loan combined borrowing limit applicable to the student's program level and class level. The calculation shown in the text box below is used to determine the amount that a student may borrow through a Direct Unsubsidized Loan. Direct PLUS Loans are non-need-based. Graduate and professional students and the parents of dependent undergraduate students may borrow Direct PLUS Loans irrespective of the student's EFC. The amount that may be borrowed through a Direct PLUS Loan is limited to the result of subtracting the EFA (including any amount borrowed through a Direct Subsidized Loan or a Direct Unsubsidized Loan) of the student on whose behalf the loan will be made from the COA of the institution attended. The calculation shown in the text box below is used to determine the amount that a student or a parent may borrow through a Direct PLUS Loan. With regard to parent borrowing, the total Direct PLUS Loan eligibility amount may be borrowed by one parent, or it may be divided among more than one parent (including noncustodial parents) and borrowed in separate amounts by each. Interest is charged on loans made through the Direct Loan program. It constitutes a charge for the use of borrowed money over a specified period of time. In the Direct Loan program, interest is calculated based on rates that are set according to formulas specified in the HEA. Interest accrual is calculated using a simple daily interest formula. The federal government offers several types of interest subsidies that may limit the amount of interest that accrues on the outstanding principal balance of a loan. In certain circumstances, a borrower may be permitted to defer paying some or all of the interest that has accrued on his or her loan(s) until a later point in time. If a borrower does not pay the interest that has accrued, it may, in certain circumstances, be capitalized (i.e., added to the outstanding principal balance of the borrower's loan). Interest rates on loans made through the Direct Loan program are set according to procedures specified by statute. Since the inception of the Direct Loan program in 1994, a variety of different procedures have been used for setting student loan interest rates. The loans currently being made through the Direct Loan program have fixed interest rates that remain constant from the time a loan is made until it is paid in full. Since July 1, 2013, Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans, have been made with fixed interest rates that are indexed to the interest rates on 10-year U.S. Treasury notes that are auctioned just prior to the start of the academic year during which the loans are made. Since February 1, 1999, Direct Consolidation Loans have been made with fixed interest rates that are based on the weighted average of the interest rates on the loans that are included in the Direct Consolidation Loan. Previously, other procedures had been used for setting student loan interest rates, and a number of loans that had been made according to these prior procedures remain outstanding. The various procedures that have been used for setting interest rates on loans made through the Direct Loan program can be broadly categorized as follows: (1) variable interest rates that are indexed to the interest rates on short-term U.S. Treasury securities that are auctioned just prior to the start of the academic year during which the rate will be in effect, (2) fixed interest rates that are set according to the weighted average of the interest rates of the loans included in a Direct Consolidation Loan, (3) fixed interest rates that are specified in statute, and (4) fixed interest rates that are indexed to the interest rates on long-term U.S. Treasury securities that are auctioned just prior to the start of the academic year during which the loans are made. Because loans with interest rates that have been set according to each of these categories still remain outstanding, each is briefly discussed below. Appendix C presents a detailed history of the various procedures that have been used to set the interest rates that apply to Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans ( Table C-2 ); the procedures that have been used to set the interest rates that apply to Direct Consolidation Loans ( Table C-3 ); and the interest rates that have been in effect on these loans on a year-by-year basis ( Table C-4 ). At the inception of the Direct Loan program in 1994, all loan types were made with variable interest rates that would adjust once per year on July 1. On variable rate loans, the applicable interest rate is determined according to a formula specified in statute. For each 12-month period that extends from July 1 through June 30, the applicable interest rate is indexed to the bond equivalent rate of 91-day U.S. Treasury bills (or other short-term U.S. Treasury securities) auctioned at the final auction held prior to the preceding June 1. An interest rate add-on increases the rate above the rate of the index. Different interest rate add-ons may apply to loans depending on the type of loan (e.g., Direct Subsidized Loan, Direct PLUS Loan), the status of the loan (e.g., in school, grace, repayment), and when the loan was made. An interest rate cap of 8.25% applies to variable rate Direct Subsidized Loans and Direct Unsubsidized Loans and the portion of a variable rate Direct Consolidation Loan attributable to such loans. An interest rate cap of 9.0% applies to variable rate Direct PLUS Loans and the portion of a variable rate Direct Consolidation Loan attributable to a PLUS Loan. Direct Consolidation Loans were made with variable interest rates through January 31, 1999, while all other types of Direct Loan program loans continued to be made with variable interest rates through June 30, 2006. Since February 1, 1999, Direct Consolidation Loans have been made with fixed interest rates that remain in effect for the duration of the loan. The applicable interest rate on a Direct Consolidation Loan is determined by calculating the weighted average of the interest rates in effect on the loans being consolidated, and rounding the result up to the nearest higher one-eighth of 1%. If a borrower obtains a Direct Consolidation Loan to repay one or more loans having a variable interest rate, the weighted average of the interest rates in effect on the loans being consolidated will be used to set the fixed rate that will apply for the duration of the new Direct Consolidation Loan. For Direct Consolidation Loans made during the period from February 1, 1999, through June 30, 2013, the maximum interest rate was capped at 8.25%. There is no maximum interest rate for Direct Consolidation Loans made on or after July 1, 2013. During the period from July 1, 2006, through June 30, 2013, all loans made through the Direct Loan program, with the exception of Direct Consolidation Loans, were made with fixed interest rates that were determined by Congress and specified in statute. Different fixed interest rates applied depending on the type of loan (e.g., Direct Subsidized Loan, Direct PLUS Loan), the program level for which it was borrowed (e.g., undergraduate, graduate), and the academic year for which the first disbursement of the loan was made (e.g., AY2007-2008, AY2008-2009). For these loans, the interest rate that was in effect when the loan was made remains in effect for the duration of the loan. With the exception of Direct Consolidation Loans, all loans made through the Direct Loan program on or after July 1, 2013, have market-indexed fixed interest rates. For these loans, the applicable interest rate is set according to a formula specified in statute and remains in effect for the duration of the loan. For new loans made during each 12-month period that extends from July 1 through June 30, the applicable interest rate is indexed to the bond equivalent rate of 10-year U.S. Treasury notes auctioned at the final auction held prior to the preceding June 1. An interest rate add-on increases the applicable borrower rate above the rate of the index. Different interest rate add-ons apply depending on the type of loan (e.g., Direct Subsidized Loan, Direct PLUS Loan) and the program level for which it was borrowed (e.g., undergraduate, graduate). An interest rate cap of 8.25% applies to Direct Subsidized Loans and to Direct Unsubsidized Loans made to undergraduate students; a cap of 9.5% applies to Direct Unsubsidized Loans made to graduate and professional students; and a cap of 10.5% applies to all Direct PLUS Loans. The interest rates applicable to loans being made through the Direct Loan program in AY2019-2020 are presented below in Table 2 . Interest accrual is the process through which interest accumulates over time. In the Direct Loan program, the accrual of interest is calculated using a simple daily interest formula. With this formula, interest accrues only on the outstanding principal balance (OPB) of the loan. This is in contrast to a compound interest formula, in which interest accrues on both the OPB of the loan and any interest that has accrued during a prior period. In a limited set of circumstances, accrued interest that has not been paid by a borrower may be capitalized, or added to the OPB of the loan. This is discussed below in the \" Interest Capitalization \" section. According to the simple daily interest formula used in the Direct Loan program, the amount of interest that accrues over a certain period of time is the product of (1) the number of days of interest being calculated (e.g., days since the last payment was made), (2) the OPB of the loan, and (3) an interest rate factor. The interest rate factor is the quotient of the applicable interest rate of the loan divided by the number of days in a year (365.25). An example of the calculation of accrued interest over a 30-day period is provided in the text box below. For loans made through the Direct Loan program, interest begins to accrue on the OPB once the first installment of a loan is disbursed. Unless it is subsidized (see \" Subsidized Interest \"), interest accrues during the entirety of the period that a loan is in effect, irrespective of whether the borrower is expected to be making payments on it. In a limited set of circumstances, the federal government subsidizes some or all of the interest that would otherwise accrue on loans made through the Direct Loan program. During periods when an interest subsidy is provided, borrowers are relieved of the requirement to pay the interest that would accrue. The availability of an interest subsidy depends on factors such as the type of loan borrowed, Direct Subsidized Loan Limitations for Post-July 1, 2013, First-Time Borrowers, eligibility for an authorized deferment, the repayment plan selected, and the borrower's status as a servicemember in the Armed Forces. Interest subsidies that may be available on loans made through the Direct Loan program are described below. On Direct Subsidized Loans, and on the subsidized component of Direct Consolidation Loans, interest is subsidized by the government (i.e., interest does not accrue) during in-school periods while a borrower is enrolled in an eligible program on at least a half-time basis, during a six-month grace period, and during periods of authorized deferment. Due to amendments to the HEA made by the Consolidated Appropriations Act, 2012 ( P.L. 112-74 ), interest is not subsidized during the grace period on Direct Subsidized Loans disbursed between July 1, 2012, and June 30, 2014. For a borrower to whom the Direct Subsidized Loan Limitations for Post-July 1, 2013, First-Time Borrowers applies, eligibility both to borrow a Direct Subsidized Loan and to receive the interest subsidy on Direct Subsidized Loans previously obtained is limited to a period that may not exceed 150% of the published length of the academic program in which the student is enrolled. If a Direct Subsidized Loan borrower subject to this provision remains enrolled beyond the applicable maximum eligibility period, the borrower will lose the interest subsidy and will become responsible for paying the interest that accrues on his or her Direct Subsidized Loans after the date that the maximum eligibility period is exceeded. The HEA authorizes the Secretary of Education (the Secretary) to offer borrowers of loans made through the Direct Loan program an interest rate reduction as an incentive for having loan payments automatically debited from a bank account. The Secretary currently offers a 0.25 percentage point interest rate reduction for automatic debit repayment. This option helps ensure that borrowers make their student loan payments on time. The interest rate reduction for automatic debit repayment does not apply during in-school, grace, deferment, or forbearance periods. Interest subsidies are provided on certain types of loans repaid according to the Income-Based Repayment (IBR) plans, the Pay As You Earn (PAYE) repayment plan, and the Revised Pay As You Earn (REPAYE) repayment plan during periods when a borrower's loans are in negative amortization. (Details of these income-driven repayment plans are described below in \" Loan Repayment Plans \" section.) A common characteristic of these IDR plans is that an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans for a maximum of the first three consecutive years that the borrower repays according to the applicable IBR plan. In addition, in the REPAYE plan an extended, partial interest subsidy is provided on all eligible loan types. These IDR plan interest subsidies are described in greater detail below. The structure of the IBR, PAYE, and REPAYE plans provide that in certain instances, a borrower's required monthly payment amount may be insufficient to pay all of the interest that has accrued on the borrower's Direct Subsidized Loans, or on the subsidized component of a Direct Consolidation Loan. In such instances, the Secretary does not charge the borrower for the amount of the accrued interest that is in excess of the applicable monthly payment amount (referred to as the remaining accrued interest ) for a period of up to the first three years from the date the borrower began repaying according to the IDR plan. For borrowers who switch repayment plans and repay their loans sequentially according to more than one of the IDR plans under which a subsidized loan interest subsidy is provided, a cumulative three-year limit on receipt of the interest subsidy applies to periods of repayment made under any of the aforementioned IDR plans. Any periods during which the borrower receives an economic hardship deferment and during which an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans are excluded from the three-year eligibility limit. In addition to the three-year interest subsidy of the remaining accrued interest on Direct Subsidized Loans and the subsidized component of Direct Consolidation Loans described above, the REPAYE plan includes a 50% subsidy of the remaining accrued interest on all loans. Beyond the three-year period for Direct Subsidized Loans and the subsidized component of Direct Consolidation Loans (described above), and during all periods of repayment on other eligible loans, in the instance that a borrower's required monthly payment amount is insufficient to pay all of the interest that has accrued on his or her loans, the Secretary charges the borrower for only 50% of the remaining accrued interest. There is no time limit on receipt of the REPAYE plan 50% interest subsidy. For all types of loans made through the Direct Loan program that were first disbursed on or after October 1, 2008, no interest accrues during a period of up to 60 months while the borrower is serving on active duty in the Armed Forces or is performing qualifying National Guard duty in an area of hostilities during a war or national emergency. For Direct Consolidation Loans, the no accrual of interest subsidy applies only to the portion of the loan that was used to repay other loans that were first disbursed on or after October 1, 2008. The Servicemembers Civil Relief Act (SCRA) provides that for individuals who borrow loans after August 14, 2008, but prior to their entrance into military service, the interest rate on their loans must be capped at a rate of 6% for the duration of their military service. The federal government, as the creditor on loans made through the Direct Loan program, must forgive interest above the 6% rate and may not accelerate repayment of the loans. Loan servicers are required to regularly check with the U.S. Department of Defense Manpower Data Center (DMDC) to determine whether borrowers qualify for the SCRA 6% interest rate cap and to extend the benefit to borrowers. Borrowers also have the option of completing an SCRA Interest Rate Limitation Request and submitting it to their loan servicer to document their eligibility for the 6% interest rate cap. If a borrower repays one or more loans on which the interest rate has been reduced to 6% under the SCRA with a Direct Consolidation Loan, the 6% interest rate is required to be used as the applicable interest rate on those loans for purposes of determining the weighted average interest rate of the new Direct Consolidation Loan. In such an occurrence, because Direct Consolidation Loans are currently being made with fixed interest rates, the 6% rate would essentially be locked in and would remain in effect beyond the end of the borrower's period of military service. A Cancer Treatment Deferment is to be provided during periods while a borrower is receiving treatment for cancer and for the six months thereafter. During periods while a borrower receives this deferment, no interest accrues on his or her qualifying loans. The Cancer Treatment Deferment is available on all types of Direct Loan program loans that are either made on or after September 28, 2018, or that had entered repayment status on or before September 28, 2019. This benefit does not appear to be available for loans that were made prior to September 28, 2019, but had not yet entered repayment prior to that date. In certain instances, the obligation of a borrower to pay the interest that accrues on the outstanding principal balance of loans made through the Direct Loan program may be deferred. For instance, during in-school, grace, deferment, and forbearance periods, borrowers are not required to make payments of either principal o r the interest that accrues on the OPB. Also, for a borrower whose loans are in repayment status and who is repaying according to an IDR plan, if the amount of his or her required monthly payment is less than the amount of interest that has accrued on the loans, the payment of any accrued interest owed that is in excess of the required monthly payment amount may be deferred. Nonetheless, except to the extent that a borrower is receiving an interest subsidy, interest continues to accrue on his or her loans during periods while repayment of accrued interest is deferred. The term negative amortization describes the situation in which the amount of interest that accrues on a loan over a given period of time is greater than the amount of payments that are made on it. In a case of negative amortization, the accumulation of unpaid accrued interest leads to the outstanding balance of principal and interest on the loan increasing over time. The deferred payment of accrued interest during periods of repayment according to the IDR plans (see \" Income-Driven Repayment (IDR) Plans \") may lead to negative amortization. On certain occasions, any interest that has accrued but not been paid by a borrower may be added to the outstanding principal balance of the borrower's loans. This is called interest capitalization. When interest is capitalized, it becomes part of the OPB and interest begins to accrue on that new, larger loan amount. Over time, interest capitalization increases the total amount a borrower is required to repay. Interest is capitalized in the following situations: Entering R epayment Status . Any unpaid interest that has accrued on a borrower's loans during the in-school and grace periods is capitalized at the time a borrower's loan enters repayment status. Loan Consolidation. Any interest that has accrued on a borrower's loan and remains unpaid when the borrower includes the loan in a Direct Consolidation Loan is capitalized upon consolidation. Annually, in ICR and Alternative Repayment Plans. Any unpaid interest that has accrued on a borrower's loan while the borrower is repaying according to the income-contingent repayment (ICR) plan or one of the alternative repayment plans is capitalized annually. End of Partial Financial Hardship . Any unpaid interest that has accrued on a borrower's loans during a period when he or she was repaying according to either of the IBR plans or the PAYE repayment plan and had a partial financial hardship is capitalized when the borrower is determined to no longer have a partial financial hardship. Exit from IBR, PAYE, or REPAYE Repayment Plan. Any unpaid interest that has accrued on a borrower's loan during a period when he or she was repaying according to the IBR, PAYE, or REPAYE repayment plans is capitalized at the time the borrower changes to a different repayment plan. End of Deferment or Forbearance. Any unpaid interest that has accrued on a borrower's loan during a period of deferment or forbearance is capitalized at the expiration of the respective period. However, if during the period of deferment or forbearance a borrower was repaying according to either of the IBR plans or the PAYE repayment plan and was experiencing a partial financial hardship, any interest that accrued during the period of deferment or forbearance will not be capitalized so long as the borrower continues to have a partial financial hardship. Default. Any unpaid interest that has accrued on a borrower's loan prior to the borrower defaulting (e.g., during periods of negative amortization, during delinquency) is capitalized at the time of default. For borrowers who are repaying their loans according to some of the IDR plans or an alternative repayment plan, the amount of interest that may be capitalized is capped. For borrowers repaying their loans according to the ICR plan, the PAYE repayment plan, or the alternative repayment plans, interest may be capitalized until the outstanding principal balance reaches a maximum of 110% of the amount of the OPB owed at the time the borrower entered repayment. Once the limit is reached, interest will continue to accrue and accumulate, but it will no longer be capitalized as long as the borrower remains in the same repayment plan. Loan origination fees are charged to borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans. No fees are charged to borrowers of Direct Consolidation Loans. These fees help offset federal loan subsidy costs by passing along some of the costs to borrowers. Loan origination fees are calculated as a proportion of the loan principal borrowed and are deducted proportionately from the proceeds of each loan disbursement to the borrower. The amount to be charged for loan origination fees is specified in statute. For Direct Subsidized Loans and Direct Unsubsidized Loans made on or after July 1, 2010, the HEA specifies a loan origination fee of 1%. (Higher loan origination fees were charged on loans made prior to July 1, 2010.) Since the inception of the Direct Loan program, the HEA has specified a loan origination fee of 4% for Direct PLUS Loans. During periods when a budget sequestration order that applies to direct (or mandatory) spending programs is in effect, such as for the Direct Loan program, special rules apply to loan origination fees. In instances where the first disbursement of a loan is made during a period that is subject to a sequestration order, the loan origination fee is required to be increased by the uniform percentage sequestration amount that is applicable to nondefense, mandatory spending programs. Loan origination fees that apply to loans made during FY2019 and FY2020 (periods of budget sequestration) are presented below in Table 3 . A history of loan origination fees that previously applied to loans made through the Direct Loan program is presented in Appendix C in Table C-5 . Borrowers are required to make payments on loans made through the Direct Loan program during a repayment period that, depending on the loan type, commences either upon the loan being fully disbursed (Direct PLUS Loans and Direct Consolidation Loans made on or after July 1, 2006) or after a six-month grace period (Direct Subsidized Loans, Direct Unsubsidized Loans, and pre-July 1, 2006, Direct Consolidation Loans). Borrowers are afforded the opportunity to choose from among a selection of numerous loan repayment plan options to repay their loans. The repayment plan selected is a determining factor in the duration of the repayment period. Borrowers may prepay all or any part of a loan made through the Direct Loan program at any time without being subject to a prepayment penalty. A grace period is a six-month period beginning immediately after a borrower of a Direct Subsidized Loan, a Direct Unsubsidized Loan, or a pre-July 1, 2006, Direct Consolidation Loan first ceases to be enrolled in an eligible program on at least a half-time basis. The grace period excludes any period of up to three years during which a borrower who is a member of a reserve component of the Armed Forces is called or ordered to active duty for a period of more than 30 days and thus ceases to be enrolled on at least a half-time basis, as well as any additional period necessary for such a borrower to resume enrollment at the next available regular enrollment period. The grace period is distinct from and not part of the repayment period. A loan on which a grace period is provided does not enter repayment status until the day after the grace period ends. If a borrower desires to enter repayment on loans that have a grace period immediately after completing school or ceasing to be enrolled on at least a half-time basis, he or she may consolidate those loans into a Direct Consolidation Loan during the grace period and enter repayment on the Direct Consolidation Loan upon its disbursement. In the Direct Loan program, the repayment period is the period during which borrowers are obliged to repay their loans. The repayment period for Direct Subsidized Loans, Direct Unsubsidized Loans, and pre-July 1, 2006, Direct Consolidation Loan begins the day after the grace period ends. Thus, for these types of loans the loan repayment period begins six months and one day after the borrower first ceases to be enrolled in an eligible program on at least a half-time basis. The repayment period for Direct PLUS Loans and Direct Consolidation Loans made on or after July 1, 2006, begins the day the loan is fully disbursed. (This would be the day of the last disbursement if the loan has multiple disbursements.) For all loan types, the first payment is due no later than 60 days after the start of the repayment period. In general, the repayment period excludes any periods of authorized deferment and forbearance; however, in certain instances of a borrower repaying a loan according to an IDR plan, periods during which the borrower is receiving an economic hardship deferment may be considered as part of the repayment period. In instances where a borrower has entered a period of deferment or forbearance, the next subsequent payment is due no later than 60 days after the end of the deferment or forbearance period. Borrowers may choose from among numerous loan repayment plan options to repay their loans. The available repayment plans fall into five broad categories: standard repayment plans, extended repayment plans, graduated repayment plans, income-driven repayment (IDR) plans, and alternative repayment plans. The particular repayment plans available to any individual borrower may depend on the type(s) of loans borrowed, the date of becoming a new borrower , or the date of entering repayment status. In general, all of a borrower's loans made through the Direct Loan program must be repaid together according to the same repayment plan. However, if a borrower seeking to repay according to one of the IDR plans has some types of loans that may be repaid according to an IDR plan and some that may not, the borrower may repay the eligible loans according to an IDR plan and the ineligible loans according to a non-IDR plan. If a borrower fails to actively select a repayment plan, he or she is placed into the standard repayment plan that is applicable to the loans. In general, a borrower may change from one plan to another eligible plan at any time and may not change to a repayment plan that has a maximum repayment period of fewer than the number of years that the borrower's loans have already been in repayment status. If a borrower changes plans to any of the standard repayment plans, graduated repayment plans, extended repayment plans, or alternative repayment plans, the beginning of the applicable repayment period will be measured from the date that the borrower's loan initially entered repayment status. If a borrower changes to one of the IDR plans, the beginning of the repayment period will be measured from the date the borrower satisfied certain plan-specific criteria, as described below, for the applicable IDR plans. Under the standard repayment plans, graduated repayment plans, extended repayment plans, and most alternative repayment plans, payment amounts may not be less than the amount of accrued interest that is due. Negative amortization is permitted in the IDR plans and as part of one alternative repayment plan option. Also, for loans with variable interest rates (which had been made prior to July 1, 2006), monthly payment amounts or the length of the repayment period may be adjusted under the standard repayment plans, graduate repayment plans, and extended repayment plans to take into account the effects of annual changes in the variable interest rate. Table 4 provides a summary of selected characteristics of the various loan repayment plans that are made generally available to borrowers. Following the table, the various repayment plans are described in detail. Standard repayment plans allow borrowers to make predictable, level payments on their loans over a defined period of time. Two standard repayment plans are offered. All borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans, and borrowers of Direct Consolidation Loans that entered repayment prior to July 1, 2006, may select a standard repayment plan that has a maximum repayment period of 10 years. According to this plan, borrowers make fixed monthly payments of not less than $50 over a period of 10 years; however, loans with small balances may be repaid in a period that is shorter than 10 years. Borrowers of Direct Consolidation Loans that were made on or after July 1, 2006, may select a standard repayment plan that has a repayment period of between 10 and 30 years. Under this plan, borrowers make fixed monthly payments of not than less than $50. The duration of the repayment period is based on the combined balances of the Direct Consolidation Loan and all other federal and private education loans owed by the borrower. However, for purposes of determining the repayment period, the combined balance of the other education loans may not be greater than the balance of the Direct Consolidation Loan. Repayment periods for the Standard Repayment Plan for Direct Consolidation Loans are shown in Table 5 . (The repayment periods shown also apply to the Graduated Repayment Plan for Direct Consolidation Loans, which is discussed in a later section.) All borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, Direct PLUS Loans, and Direct Consolidation Loans may elect to repay according to an extended repayment plan. The extended repayment plans afford borrowers with large total loan balances the opportunity to make lower monthly payments in return for extending the repayment of their loans for a longer duration. By extending the repayment term, interest accrues over a longer period of time; as a consequence, a larger amount of interest is paid under an extended repayment plan than would be paid according to a standard repayment plan with a 10-year term. There are three extended repayment plans. Eligibility to select an extended repayment plan is limited based on when a borrower's loans entered repayment and the total outstanding principal balance owed on loans made through the Direct Loan program. This repayment plan is available to individuals who are new borrowers on or after October 7, 1998; whose loans enter repayment on or after July 1, 2006; and who have an outstanding balance of more than $30,000 on loans made through the Direct Loan program. The Extended Fixed Repayment Plan allows borrowers to make monthly payments in equal amounts over a period of 25 years from the date their loans entered repayment status. This results in monthly payment amounts being lower than they would be under a standard repayment plan with a 10-year term. Like the above plan, this repayment plan is available to individuals who are new borrowers on or after October 7, 1998; whose loans enter repayment on or after July 1, 2006; and who have an outstanding balance of more than $30,000 on loans made through the Direct Loan program. The Extended Graduated Repayment Plan allows borrowers to make monthly payments that are initially low and increase in amount every two years over a repayment period of 25 years from the date the borrower's loans entered repayment status. Under this plan, monthly payment amounts increase from an initial payment amount that must be at least $50 to an amount that may not be greater than three times the initial monthly payment amount. This extended repayment plan is available to borrowers of loans made through the Direct Loan program who entered repayment prior to July 1, 2006. Under this plan, borrowers make monthly payments in equal amounts over a period that may range from 12 to 30 years from the date their loans entered repayment status. The minimum monthly payment amount is $50, and the duration of the repayment term is dependent upon the outstanding principal balance of the borrower's loans made through the Direct Loan program. The extension of the repayment term results in monthly payment amounts being lower than they would be under a standard repayment plan with a 10-year term. Repayment periods for the extended repayment plan, by loan amount, are shown below in Table 6 . (The repayment periods shown in this table also apply to the graduated repayment plan for borrowers who entered repayment prior to July 1, 2006, which is discussed in the next section.) Loan repayment according to the graduated repayment plans is structured so that a borrower's monthly payment amount will periodically change over the course of the repayment period. In general, borrowers will be required to make smaller payments at first and larger payments later. Monthly payment amounts may be less than $50; however, in no instance may they be less than the amount of interest that accrues. There are three graduated repayment plans. A borrower's eligibility to select one of the graduated repayment plans depends on loan type and when the borrower's loans entered repayment. All borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans that entered repayment after July 1, 2006, may select a graduated repayment plan that has a maximum repayment period of 10 years. Under this plan, monthly payment amounts increase incrementally every two years from an initial amount that may be less than $50 to an amount that may not be greater than three times the initial monthly payment amount. Borrowers of Direct Consolidation Loans that were made on or after July 1, 2006, may select a graduated repayment plan that has a repayment period of between 10 and 30 years. Under this plan, monthly payment amounts increase incrementally every two years from an initial amount that may be less than $50 to an amount that may not be greater than three times the initial monthly payment amount. The duration of the repayment period is based on the combined balances of the Direct Consolidation Loan and all other federal and private education loans owed by the borrower. However, for purposes of determining the repayment period, the combined balance of the other education loans may not be greater than the balance of the Consolidation Loan. Repayment periods for the Graduated Repayment Plan for Direct Consolidation Loans are shown above in Table 5 . Borrowers of loans made through the Direct Loan program who entered repayment prior to July 1, 2006, may repay their loans according to a graduated repayment plan with a term that can range from 12 to 30 years. Under this plan, monthly payment amounts increase incrementally every two years from an initial amount that may not be less than either $25 or 50% of the amount that would be required under the Standard Repayment Plan with a Maximum 10-Year Term to an amount that may be no more than 150% of the amount that would be required under the Standard Repayment Plan with a Maximum 10-Year Term. The duration of the repayment term is determined based on the total outstanding principal balance of the borrower's loans made through the Direct Loan program. Repayment periods for this graduated repayment plan vary by loan balance, and are shown above in Table 6 . Since its establishment, the Direct Loan program has included a requirement that a repayment plan be made available to borrowers (other than to parent borrowers of Direct PLUS Loans) under which monthly payment amounts would vary according to the income of the borrower. For the first 15 years that the Direct Loan program was in operation, an Income-Contingent Repayment (ICR) plan fulfilled this requirement. Over time, additional repayment plans that served this purpose became available. Collectively, these plans have come to be referred to as income-driven repayment (IDR) plans. Several IDR plans are currently available to borrowers: the Income-Contingent Repayment plan, the Income-Based Repayment (IBR) plan (one version of which is available to individuals who qualify as a new borrower on or after July 1, 2014, and another which is available to individuals who do not qualify as a new borrower as of that date), the Pay As You Earn (PAYE) repayment plan, and the Revised Pay As You Earn (REPAYE) repayment plan. The IDR plans afford borrowers the opportunity to make monthly payments in amounts that are capped at a specified share or proportion of their discretionary income over a repayment period that may not exceed a specified duration . Discretionary income is defined as the portion of a borrower's adjusted gross income (AGI) that is in excess of a specified multiple of the federal poverty guidelines applicable to the borrower's family size. In general, a borrower's family size includes the borrower, the borrower's spouse, and the borrower's children, and may include other individuals who both live with the borrower and receive more than half of their support from the borrower. The portion of a borrower's income that is below the federal poverty guideline multiple that is applicable to a particular IDR plan may be considered nondiscretionary income, or income that may be needed for purposes of meeting certain basic needs such as food and shelter. Multiples of the federal poverty guidelines that are applicable to the IDR plans are presented below in Table 7 for family sizes of one through eight persons. The various IDR plans are primarily distinguished by (1) the multiple (e.g., 100%, 150%) of the federal poverty guidelines used to define discretionary income, (2) the percentage of a borrower's discretionary income (e.g., 10%, 15%, 20%) that is assessed as being available for purposes of making student loan payments, and (3) the maximum duration of the repayment term (e.g., 20 years, 25 years). The IDR plans also share other common characteristics that include the following: Required certification of income and family size. The processes for determining IDR plan monthly payment amounts take into account a borrower's income and family size. Consequently, on an annual basis borrowers must provide documentation of their income and must certify their family size to become and remain eligible for IDR plan repayment. In addition, borrowers may update their income and family size at any time if either changes. Potential n egative amortization. IDR plan payment amounts are capped at no more than a certain proportion of a borrower's discretionary income. As a result, in some circumstances required payment amounts may be less than the amount of interest that accrues, which may lead to a borrower's loan(s) becoming negatively amortized. Potential availability of l oan forgiveness. All the IDR plans make available the prospect of eventual loan forgiveness if a borrower, after making payments according to one or more of the IDR plans, has been unable to fully repay his or her student loan debt by the end of the maximum repayment term. Payments made on defaulted loans repaid according to the IDR plans do not count toward a borrower's eligibility for loan forgiveness. Each of the IDR plans are described in detail below. The Income-Contingent Repayment plan permits borrowers to make payments on eligible student loans in amounts that are determined according to procedures that take into account a borrower's adjusted gross income and family size. Any loan balance that remains unpaid after 25 years of repayment according to the ICR plan and other qualified plans will be forgiven. Specifications for the ICR plan are established by the Secretary and are codified in regulations. An income-contingent repayment plan has been available to borrowers since the establishment of the Direct Loan program in 1994. Eligibility. The ICR plan is available to all borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, Direct PLUS Loans made to graduate and professional students, and Direct Consolidation Loans. Direct PLUS Loans made to parent borrowers are not eligible to be repaid according to the ICR plan; however, parent borrowers of Direct PLUS Loans may qualify to repay those loans according to the ICR plan by consolidating them into a Direct Consolidation Loan. There are no specific income restrictions that limit a borrower's eligibility to repay according to the ICR plan. Payment Amounts. Under the ICR plan, monthly payment amounts are calculated according to procedures that take into account factors including the outstanding loan balance at the time the borrower's loans enter repayment status, the interest rates applicable to those loans, the amount of any unpaid accrued interest, the borrower's adjusted gross income (AGI) and family size, and an income percentage factor. For a married borrower who files a joint federal tax return with his or her spouse, the AGI for both spouses is used; for a married borrower who files a separate federal tax return, only the AGI of the borrower is used. Consistent with these criteria, monthly payment amounts are the lesser of a monthly payment amount calculated according to a 12-year amortization schedule, multiplied by an income percentage factor that corresponds to the borrower's AGI and tax filing status; or one-twelfth of 20% of the amount by which the borrower's AGI exceeds 100% of the federal poverty guideline applicable to the borrower's family size (see Table 7 ). Monthly payment amounts may range from $0 for a borrower with an income at or below 100% of the federal poverty guideline to amounts more than sufficient to repay the borrower's loans in 12 years or less. For a borrower whose calculated monthly payment results in an amount that is greater than $0 but less than $5, a minimum monthly payment amount of $5 is required. Monthly payment amounts are recalculated annually to take into account changes (e.g., borrower AGI, the amount of any unpaid accrued interest) that may have occurred over the past year. Joint ICR Plan Repayment for Married Borrowers . Borrowers of loans made through the Direct Loan program who are married to each other may elect to repay their loans jointly. Married borrowers must file a joint federal tax return to qualify for Joint ICR plan repayment. Under this option, the sum of the outstanding loan balances of each borrower, as of the time they elect joint repayment, is used to determine their combined monthly payment amount according to the procedures described above for the ICR plan. Payments made by married borrowers repaying jointly are applied to each borrower's loans in proportion to each borrower's share of the combined outstanding balance. Subsidized Interest . No special interest subsidies are made available to borrowers as part of the ICR plan. Application of Payments. Payments made by borrowers under the ICR plan are first applied to any outstanding charges or collection costs, then to outstanding interest due on the loan, and then to principal. Under the ICR plan formula, it is possible that a borrower's monthly payment amount may be for less than the amount of interest that has accrued since the last payment. Should this occur, interest will continue to accrue on the outstanding principal balance and unpaid interest that has accumulated will be capitalized into the principal balance of the loan once per year. However, unpaid accrued interest may only be capitalized until the outstanding principal balance reaches 110% of the amount of the original principal balance as of when the borrower's loan(s) entered repayment. Once the OPB has reached 110% of the original principal balance, unpaid accrued interest may continue to accumulate but will no longer be capitalized. Failure to Certify Income and Family Size . To qualify and remain eligible to repay according to the ICR plan, borrowers must annually provide certification of their income and family size to ED. Certification of income is normally satisfied by providing the borrower's AGI. However, if the borrower's AGI does not reflect his or her current income, alternative documentation of income may be provided. If the borrower fails to provide certification of income, his or her monthly payment amount will be recalculated to equal the amount the borrower would have paid according to the Standard Repayment Plan with a Maximum 10-Year Term, based on the amount owed at the time he or she first elected to repay according to the ICR plan. The repayment period based on the recalculated payment amount may exceed 10 years. If the borrower fails to certify his or her family size, a family size of one will be assumed and used for the year. Maximum Repayment Period and Loan Forgiveness . The ICR plan has a maximum repayment period of 25 years. If a borrower repays according to the ICR plan and obtains an additional loan that is eligible to be repaid according to the plan, a new, separate repayment period will begin for the new loan when it enters repayment. If after 25 years of having repaid a nondefaulted loan or loans according to the ICR plan or certain other repayment plans, or having qualified for and received an economic hardship deferment, a borrower still has an outstanding loan balance, the remaining unpaid balance will be discharged (i.e., forgiven). The maximum 25-year repayment period for the ICR plan, after which loan forgiveness may be granted, includes periods during which the borrower made monthly payments (including payments of $0) according to the ICR plan, made monthly payments (including payments of $0) according to an IBR plan while experiencing a partial financial hardship; made monthly payments, either as part of an IBR plan after no longer having a partial financial hardship or after leaving an IBR plan, in amounts calculated according to the Standard Repayment Plan with a Maximum 10-Year Term, based on the outstanding balance as of when the borrower first began repaying according to an IBR plan; made monthly payments (including payments of $0) according to the PAYE repayment plan or the REPAYE repayment plan; made monthly payments according to the REPAYE Alternative Repayment plan prior to changing to an IBR plan; made monthly payments on a Direct Subsidized Loan, a Direct Unsubsidized Loan, or a Direct PLUS Loan according to the Standard Repayment Plan with a Maximum 10-Year Term during the portion of the maximum 10-year repayment period that remains after the borrower ceases to repay according to an IBR plan; made payments on a Direct Consolidation Loan according to the Standard Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms or the Graduate Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms during the portion of the maximum 10-year to 30-year repayment period that remains after the borrower ceases to repay according to an IBR plan; made monthly payments according to the Standard Repayment Plan with a Maximum 10-Year Term; made monthly payments during periods after October 1, 2007, according to any repayment plan in amounts not less than the amount required under the Standard Repayment Plan with a Maximum 10-Year Term; only for borrowers who entered repayment prior to October 1, 2007, and only if the applicable repayment term is for not more than 12 years, made payments according to the Standard Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms, the Extended Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms, or the Graduated Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms (see Table 5 ); or received an economic hardship deferment. The Income-Based Repayment plans permit borrowers to repay eligible student loans according to procedures that limit monthly payment amounts based on criteria that take into account a borrower's adjusted gross income, family size, and monthly payment amount as calculated according to a standard 10-year repayment period, based on the greater of the amount owed at the time the borrower initially entered repayment or the amount owed at the time the borrower elects to repay according to the IBR plan. Any loan balance that remains after the maximum repayment period of the plan will be forgiven. There are two IBR plan versions that function similarly. They are differentiated by (1) the date used to delimit borrower eligibility (July 1, 2014), (2) the percentage of discretionary income used to determine borrower eligibility for the plan and monthly payment amounts (15% or 10%), and (3) the maximum repayment period (25 years or 20 years). The description that follows distinguishes between the two IBR plan versions as applicable. The initial version of the IBR plan was established under the College Cost Reduction and Access Act of 2008 (CCRAA; P.L. 110-84 ), and on July 1, 2009, it became available to borrowers of loans made through the Direct Loan program and the FFEL program, irrespective of when an individual had borrowed a loan through either program. (Hereinafter, this version is referred to as the Original IBR p lan .) Amendments to the IBR plan were enacted in 2010 under the SAFRA Act (Title II of the HCERA; P.L. 111-152 ), and a revised version of the IBR plan was made available to individuals who, on or after July 1, 2014, became new borrowers of loans made through the Direct Loan program. (Hereinafter, this version is referred to as the IBR Plan for Post-July 1, 2014, New Borrowers .) Eligibility. With certain exceptions, federal student loans made through both the Direct Loan program and the FFEL program are considered eligible loans for purposes of repayment according to the Original IBR plan, while only loans made through the Direct Loan program are eligible for repayment according to the IBR plan for Post-July 1, 2014, New Borrowers. In both cases, exceptions pertain to loans made to parent borrowers. Direct PLUS Loans and FFEL PLUS Loans that were made to a parent borrower and Direct Consolidation Loans and FFEL Consolidation Loans that that were used to repay either a Direct PLUS Loan or a FFEL PLUS Loan that was made to a parent borrower are ineligible to be repaid according to either of the IBR plans. These loans to parent borrowers are also excluded from being considered when determining a borrower's eligibility for IBR plan repayment. This discussion addresses the IBR plans available through the Direct Loan program. Partial Financial Hardship. To be eligible to begin repaying according to an IBR plan, a borrower must be determined to have a partial financial hardship . The criteria for determining whether a borrower has a partial financial hardship take into account the borrower's federal income tax filing status (e.g., single, married filing jointly), AGI, family size, multiples of the federal poverty guidelines applicable to the borrower's family size, and monthly payment amounts as calculated according to a standard 10-year repayment period based on the greater of the amount owed at the time the borrower initially entered repayment or the amount owed at the time the borrower elects to repay according to the IBR plan. If a borrower is single, or is married and files an individual federal tax return, he or she is determined to have a partial financial hardship if the total annual payments for all of the borrower's eligible loans, as calculated according to a standard 10-year repayment period, are greater than the applicable percentage (15% or 10%) of his or her discretionary income. If a borrower is married and files a joint federal tax return, he or she is determined to have a partial financial hardship if the total annual payments for all of the eligible loans of the borrower and, if applicable, the eligible loans of the borrower's spouse, as calculated according to a standard 10-year repayment period, are greater than the applicable percentage of the combined discretionary income of the borrower and the borrower's spouse. Discretionary income is defined as the portion of a borrower's adjusted gross income that is in excess of 150% of the poverty guideline that is applicable to his or her family size. If the total annual payments for all of the borrower's eligible loans, as calculated according to a standard 10-year repayment period, do not exceed 15% or 10% of his or her discretionary income, as applicable, the borrower is no longer considered as having a partial financial hardship. Payment Amounts. During periods while a borrower has a partial financial hardship and repays according to an IBR plan, monthly amounts due on his or her loans may range from $0, for a borrower with an AGI that is at or below 150% of the poverty guideline, to a maximum of one-twelfth of the specified percentage factor (15% or 10%) of a borrower's discretionary income. For example, based on the 2019 HHS Poverty Guidelines, 150% of the poverty guideline for a family of one in the 48 contiguous states and the District of Columbia is $18,735. (See Table 7 .) In the Original IBR plan, a single borrower with an adjusted gross income of $40,000 would have a partial financial hardship if his or her annual student loan payments were greater than $3,189.75, or $265.81 per month. ($3,189.75 is 15% of the result of subtracting $18,735 from $40,000.) In the IBR plan for post-July 1, 2014, New Borrowers, a single borrower with an adjusted gross income of $40,000 would have a partial financial hardship if his or her annual student loan payments were greater than $2,126.50, or $177.21 per month. ($2,126.50 is 10% of the result of subtracting $18,735 from $40,000.) For a borrower whose calculated monthly payment results in an amount that is greater than or equal to $5 but less than $10, the monthly payment is set at $10. For a borrower whose calculated monthly payment results in an amount that is less than $5, the monthly payment is set at $0. Monthly payment amounts are recalculated annually to take into account changes that may have occurred over the past year. If a borrower who is repaying according to an IBR plan no longer demonstrates having a partial financial hardship or no longer desires to make payments based on income, he or she may remain in the IBR plan; however, the borrower's maximum required monthly payment amount will no longer be calculated according the formula described above. Nonetheless, the required payment amount may not exceed the monthly amount due, as calculated according to a standard 10-year repayment period based on the borrower's loan balance at the time he or she elected to begin repaying according to the IBR plan. However, in such a case the duration of the repayment period may exceed 10 years. Joint IBR Plan Repayment for Married Borrowers. Since July 1, 2010, the IBR plan has provided for the joint repayment of loans by married borrowers who both have eligible loans and who file a joint federal tax return. Individual payment amounts are proportional to each spouse's share of the couple's combined loan balances and combined AGI. Subsidized Interest . As part of the IBR plans, an interest subsidy is available on subsidized loans during periods of negative amortization for a maximum of the first three years from the start of a borrower's repayment according to an IBR plan. If a borrower's required monthly payment is not sufficient to cover all of the interest that accrues on a Direct Subsidized Loan (or the subsidized component of a Direct Consolidation Loan), the portion of the accrued interest not covered by the borrower's monthly payment is subsidized, or paid by the Secretary. Any periods during which the borrower has received an interest subsidy under either the PAYE plan or the REPAYE plan are applied toward this three-year period. However, any periods during which a borrower has received an interest subsidy while qualifying for an economic hardship deferment (during which an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of a Direct Consolidation Loan) are excluded from the three-year period. Application of Payments. Payments made by borrowers repaying under an IBR plan are first applied to interest due on the loan, then to any fees, and then to principal. If a borrower's required monthly payment is for an amount that is less than the amount of interest that accrues on a loan other than a Direct Subsidized Loan or the subsidized component of a Direct Consolidation Loan, or that accrues on a subsidized loan type after the three-year interest subsidy period described above, the unpaid accrued interest will accumulate, but not be capitalized, so long as the borrower remains in the IBR plan and continues to have a partial financial hardship. If a borrower's required monthly payment is sufficient to pay the accrued interest but is insufficient to repay the amount of principal due, then the payment of any principal due in excess of the monthly payment amount owed will be postponed until the borrower no longer has a partial financial hardship or leaves the IBR plan. Upon a borrower either no longer having a partial financial hardship or electing to no longer repay according to an IBR plan, any accumulated accrued interest that has not been paid will be capitalized. If a borrower chooses to leave an IBR plan, he or she must change to the Standard Repayment Plan that is applicable to the loansâeither the Standard Repayment Plan with a Maximum 10-Year Term or the Standard Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms. (The borrower may subsequently change to another repayment plan; however, he or she may not change to a repayment planâother than a different IDR planâthat has maximum term that is less than the number of years the borrower's loans have already been in repayment. ) The monthly payment amount due on the borrower's loans must be calculated according to the applicable standard repayment plan based on the time remaining in the repayment period under such plan and the outstanding balance owed at the time the borrower ceased repaying according to the IBR plan. A borrower who changes from the IBR plan to a standard repayment plan must make at least one monthly payment according to the standard repayment plan before changing to another repayment plan for which the borrower may be eligible. Borrowers may request a forbearance that permits the making of a smaller payment amount than otherwise would be required for purposes of making that one required monthly payment according to the Standard Repayment Plan. Failure to Certify Income and Family Size . To qualify and remain eligible to repay according to the IBR plans, borrowers must annually provide certification of their income and family size to ED. Certification of income is normally satisfied by providing the borrower's AGI. However, if the borrower's AGI does not reflect his or her current income, alternative documentation of income may be provided. If the borrower fails to provide certification of income, any unpaid accrued interest will be capitalized and his or her monthly payment amount will be recalculated to equal the amount the borrower would have paid according to the Standard Repayment Plan with a Maximum 10-Year Term, based on the amount owed at the time he or she first elected to repay according to the IBR plan. The repayment period based on the recalculated payment amount may exceed 10 years. If the borrower fails to certify his or her family size, a family size of one will be assumed and used for the year. Maximum Repayment Period and Loan Forgiveness . The maximum repayment period for the Original IBR plan is 25 years, whereas the maximum repayment period for the IBR plan for post-July 1, 2014, New Borrowers is 20 years. If after having repaid according to an IBR plan a borrower obtains additional loans that are eligible to be repaid according to that IBR plan, a new repayment period will begin for the new loans when they enter repayment. A borrower who has participated in one of the IBR plans and has satisfied any combination of the following conditions for the duration of the applicable repayment period becomes eligible to have any balance that remains at the end of the maximum repayment period forgiven: made reduced monthly payments (including payments of $0) according to an IBR plan while experiencing a partial financial hardship; made monthly payments in amounts calculated according to the Standard Repayment Plan with a Maximum 10-Year Term after no longer having a partial financial hardship; made monthly payments on Direct Subsidized Loans, Direct Unsubsidized Loans, or Direct PLUS Loans according to the Standard Repayment Plan with a Maximum 10-Year Term, or on Direct Consolidation Loans according to the Standard Repayment Plan for Direct Consolidation Loans with 10-Year to 30-Year Terms, as applicable, after choosing to no longer repay according to an IBR plan; made monthly payments according to any repayment plan in amounts not less than the amount required under the Standard Repayment Plan with a Maximum 10-Year Term; made monthly payments according to the Standard Repayment Plan with a Maximum 10-Year Term based on the amount owed at the time the borrower initially selected an IBR plan; made monthly payments (including payments of $0) according to the ICR plan, the PAYE repayment plan, or the REPAYE repayment plan; made monthly payments according to the REPAYE Alternative Repayment Plan prior to changing to an IDR plan; or received an economic hardship deferment. The Pay As You Earn (PAYE) repayment plan is substantially similar to the IBR plan for post-July 1, 2014, New Borrowers (see above). The plan permits borrowers to repay eligible loans according to procedures that limit monthly payment amounts based on criteria that take into account a borrower's AGI, family size, and monthly payment amount as calculated according to a standard 10-year repayment period based on the greater of the amount owed at the time the borrower initially entered repayment or the amount owed at the time he or she elects to repay according to the PAYE plan. For borrowers who repay according to this plan, any loan balance that remains after 20 years of repayment will be forgiven. The plan became available to eligible borrowers on December 21, 2012. The PAYE repayment plan was established by the Obama Administration through the rulemaking process under authority provided in the HEA for the Secretary to establish an income-contingent repayment plan. With the establishment of the PAYE repayment plan, a set of benefits substantially similar to those that had been extended to a specific class of borrowers through the enactment of legislation (the IBR Plan for post-July 1, 2014, New Borrowers) was extended to a broader class of borrowers through the rulemaking process. Eligibility. The PAYE repayment plan is available to individuals who are new borrowers on or after October 1, 2007, and have received a disbursement on a Direct Subsidized Loan, a Direct Unsubsidized Loan, or a Direct PLUS Loan to graduate and professional students on or after October 1, 2011, or a Direct Consolidation Loan based on an application received by ED on or after October 1, 2011, and who are identified as having a partial financial hardship. Eligible borrowers may use the plan to repay loans made through the Direct Loan program, with the exceptions of Direct PLUS Loans made to parent borrowers and Direct Consolidation Loans used to repay either Direct PLUS Loans or FFEL PLUS Loans that had been made to parent borrowers. Partial Financial Hardship. A borrower is considered as having a partial financial hardship if the total of his or her annual payments on all eligible loans, as calculated according to a standard 10-year repayment period based on the greater of the amount owed at the time the borrower initially entered repayment or the amount owed at the time he or she elects to repay according to the PAYE plan, is greater than 10% of the amount by which the borrower's AGI exceeds 150% of the poverty line applicable to his or her family size. If a borrower is single, or is married and files an individual federal tax return, he or she is determined to have a partial financial hardship if the total annual payments for all of the borrower's eligible loans, as calculated according to a standard 10-year repayment period, are greater than 10% of his or her discretionary income. If a borrower is married and files a joint federal tax return, he or she is determined to have a partial financial hardship if the total annual payments for all of the borrower's eligible loans and, if applicable, the borrower's spouse's eligible loans, as calculated according to a standard 10-year repayment period, are greater than 10% of the combined discretionary income of the borrower and his or her spouse. If the total annual payments for all of the borrower's eligible loans, as calculated according to a standard 10-year repayment period, do not exceed 10% of his or her discretionary income, the borrower is no longer considered as having a partial financial hardship. Payment Amounts. While repaying according to the PAYE repayment plan, monthly amounts due on borrowers' loans may range from $0, for those with incomes at or below 150% of the poverty line, to a maximum of one-twelfth of 10% of any amount by which the borrower's AGI exceeds 150% of the poverty line. If a borrower who is repaying according to the plan no longer demonstrates having a partial financial hardship or no longer desires to make payments based on income, the monthly payment amount will be recalculated. In such a case, the maximum monthly payment amount may not exceed the amount due as calculated according to the Standard Repayment Plan with a Maximum 10-Year Term based on the borrower's loan balance at the time he or she elected to begin repaying according to the PAYE repayment plan. However, the duration of the repayment period may exceed 10 years. For a borrower whose calculated monthly payment results in an amount that is greater than or equal to $5 but less than $10, the monthly payment is set at $10. For a borrower whose calculated monthly payment results in an amount that is less than $5, the monthly payment is set at $0. Monthly payment amounts are recalculated annually to take into account changes that may have occurred over the past year. Joint PAYE Repayment for Married Borrowers. The PAYE repayment plan provides for the joint repayment of loans by married borrowers who both have eligible loans and who file a joint federal tax return. For married borrowers repaying jointly according to the plan, individual payment amounts are proportional to each spouse's share of the couple's combined loan balances and combined AGI. Subsidized Interest . An interest subsidy is available on subsidized loans during periods of negative amortization for a maximum of the first three years from the start of repayment according to the PAYE repayment plan. If a borrower's calculated monthly payment is insufficient to pay all of the interest that accrues on a Direct Subsidized Loan (or the subsidized component of a Direct Consolidation Loan), the portion of the accrued interest that is not covered by his or her monthly payment is subsidized for a period not to exceed three years. Periods during which a borrower is receiving an economic hardship deferment are excluded from the three-year eligibility period. In general, the terms of this interest subsidy for subsidized loans are the same as the terms that apply to the IBR plans (see above). Application of Payments. Payments made by borrowers repaying according to the PAYE repayment plan are credited first to interest due on the loan, then to any fees, and then to principal. If a borrower's required monthly payment is for an amount that is less than the amount of interest that accrues, the unpaid accrued interest will accumulate, but not be capitalized, so long as the borrower remains in the plan and continues to have a partial financial hardship. If a borrower's required monthly payment is sufficient to pay the accrued interest but is insufficient to repay the amount of principal due, then the payment of any principal due in excess of the monthly payment amount owed will be postponed until he or she no longer has a partial financial hardship or leaves the plan. If a borrower no longer has a partial financial hardship but remains in the PAYE repayment plan, accumulated accrued interest is capitalized into the principal balance of the loan. In such a case, the amount of accrued interest that may be capitalized is limited to 10% of the outstanding principal balance at the time the borrower began repaying according to the plan. Any accrued interest beyond the 10% limit will remain due but will not be capitalized as long as the borrower remains in the plan. If a borrower chooses to leave the PAYE repayment plan, he or she may change to any other repayment plan for which he or she is eligible, as long as the new repayment plan has a maximum term that is not less than the number of years the borrower's loans have already been in repayment, or is an available IDR plan. Upon a borrower electing to no longer repay according to the PAYE repayment plan, any accumulated accrued interest that has not been paid will be capitalized. Failure to Certify Income and Family Size . To qualify and remain eligible to repay according to the PAYE repayment plan, borrowers must annually provide certification of their income and family size. Certification of income is normally satisfied by providing the borrower's AGI. However, if the borrower's AGI does not reflect his or her current income, alternative documentation of income may be provided. If the borrower fails to provide certification of income, any unpaid accrued interest will be capitalized and his or her monthly payment amount will be recalculated to equal the amount the borrower would have paid according to the Standard Repayment Plan with a Maximum 10-Year Term, based on the amount owed at the time he or she first elected to repay according to the plan. The repayment period based on the recalculated payment amount may exceed 10 years. If the borrower fails to certify his or her family size, a family size of one will be assumed and used for the year. Maximum Repayment Period and Loan Forgiveness . In the PAYE repayment plan, the maximum repayment period is 20 years. A borrower who at any time participates in the plan becomes eligible to have any balance that remains on his or her eligible loans forgiven if during the 20-year repayment period the borrower meets the loan forgiveness eligibility criteria specified in regulations at 34 C.F.R. Section 685.209(a)(6). (These criteria are substantially similar to the provisions that are applicable to the IBR plan for post-July 1, 2014, New Borrowers, as described above.) If after having repaid according to the PAYE repayment plan a borrower obtains additional loans that are eligible to be repaid according to the plan, a new repayment period will begin for the new loans when they enter repayment. The Revised Pay As You Earn (REPAYE) repayment plan permits borrowers to repay eligible loans made through the Direct Loan program according to procedures that limit monthly payment amounts based on criteria that take into account a borrower's AGI and family size. For borrowers whose student loan debt was obtained exclusively for undergraduate education, the maximum repayment period is 20 years; for borrowers whose student loan debt includes any amounts obtained for graduate education, the maximum repayment period is 25 years. Any loan balance that remains after the maximum repayment period will be forgiven. The REPAYE repayment plan became available to eligible borrowers on December 17, 2015. Like the PAYE repayment plan, the REPAYE repayment plan was established by the Obama Administration through the rulemaking process under authority provided in the HEA for the Secretary to establish an income-contingent repayment plan. The REPAY repayment plan has a number of characteristics that are similar to the other IDR plans. It also has an enhanced interest subsidy that is unique to the plan. Eligibility. The REPAYE repayment plan is available to borrowers of loans made through the Direct Loan program except for Direct PLUS Loans made to parent borrowers and Direct Consolidation Loans used to repay either Direct PLUS Loans or FFEL PLUS Loans that had been made to parent borrowers. The plan is available to borrowers irrespective of when an individual became a new borrower. A borrower's eligibility to repay according to the REPAYE repayment plan is not limited based on factors that take into account the relationship between his or her student loan debt and discretionary income (i.e., borrowers need not demonstrate anything akin to having a partial financial hardship to repay according to the REPAYE repayment plan). P ayment Amounts. While repaying according to the REPAYE repayment plan, monthly amounts due on borrowers' loans may range from $0, for those with incomes at or below 150% of the poverty line, to a maximum of one-twelfth of 10% of any amount by which a borrower's AGI exceeds 150% of the poverty line. For a borrower whose calculated monthly payment results in an amount that is greater than or equal to $5 but less than $10, the monthly payment is set at $10. For a borrower whose calculated monthly payment results in an amount that is less than $5, the monthly payment is set at $0. Monthly payment amounts are recalculated annually to take into account changes that may have occurred over the past year. For purposes of calculating monthly payment amounts under the REPAYE repayment plan, if the borrower is unmarried his or her AGI is used. If the borrower is married, and unless certain exceptions apply, the AGI of both the borrower and his or her spouse is used irrespective of whether the borrower files a joint or separate federal tax return with his or her spouse. If a borrower is married and certifies that he or she is separated from his or her spouse, or is unable to access information on the income of his or her spouse, then the AGI of only the borrower is used. Joint REPAYE Repayment for Married Borrowers. The REPAYE repayment plan provides for the joint repayment of loans by married borrowers who both have eligible loans and who file a joint federal tax return. For married borrowers repaying jointly according to an IBR plan, individual payment amounts are proportional to each spouse's share of the couple's combined loan balances and combined AGI. Subsidized Interest . Under the REPAYE repayment plan, an interest subsidy is available on both subsidized loans and unsubsidized loans during periods of negative amortization. During the first three years from the start of repayment under the plan, for Direct Subsidized Loans and the subsidized component of Direct Consolidation Loans, if a borrower's calculated monthly payment is not sufficient to pay all of the interest that accrues, 100% of the portion of the accrued interest that is not covered by his or her monthly payment is subsidized. Periods during which a borrower receives an interest subsidy during an economic hardship deferment are excluded from the consecutive three-year period. After the three-year period for subsidized loans, and during all periods for Direct Unsubsidized Loans, Direct PLUS Loans, and the unsubsidized component of Direct Consolidation Loans, 50% of the portion of the accrued interest that is not covered by the borrower's monthly payment is subsidized. Graduate students who are borrowers of Direct PLUS Loans may be able to qualify for the 50% interest subsidy while they are in school in lieu of receiving an in-school deferment while interest accrues at the otherwise applicable interest rate. For Direct PLUS Loans, the repayment period begins the day the loan is fully disbursed. However, borrowers who are enrolled on at least a half-time basis qualify for and typically receive an in-school deferment during which they are not required to make payments, but during which interest accrues. Student borrowers are placed in an in-school deferment upon requesting such a deferment or the Secretary receiving notification from the borrower's school or the National Student Loan Data System (NSLDS) that the student is enrolled on at least a half-time basis. Nonetheless, borrowers who receive an in-school deferment have the option to cancel it. Borrowers whose AGI while in school is low enough that it would result in the calculation of a monthly payment amount according to the REPAYE repayment plan that would be insufficient to pay all of the interest that accrues on their loan may consider choosing to cancel receipt of an in-school deferment in favor of receiving a 50% interest subsidy on the portion of the interest that would not be covered by his or her monthly payment amount. Application of Payments. Payments made by borrowers repaying according to the REPAYE repayment plan are credited first to interest due on the loan, then to any fees, and then to principal. If a borrower's required monthly payment is for an amount that is less than the amount of interest that accrues on a loan other than a Direct Subsidized Loan or the subsidized component of a Direct Consolidation Loan, or that accrues on a subsidized loan type after the three-year interest subsidy period described above, the unpaid accrued interest will accumulate, but not be capitalized, so long as the borrower remains in the plan. If a borrower's required monthly payment is sufficient to pay the accrued interest but is insufficient to repay the amount of principal due, then the payment of any principal due in excess of the monthly payment amount owed will be postponed. If a borrower chooses to leave the REPAYE repayment plan, he or she may change to any other repayment plan for which he or she is eligible, as long as the new repayment plan has a maximum term that is not less than the number of years the borrower's loans have already been in repayment, or is an available IDR plan. Upon a borrower electing to no longer repay according to the REPAYE repayment plan, any accumulated accrued interest that has not been paid will be capitalized. Failure to Certify Income and Family Size . To qualify and remain eligible to repay according to the REPAYE repayment plan, borrowers must annually provide certification of their income and family size. Certification of income is normally satisfied by providing the borrower's AGI. However, if the borrower's AGI does not reflect his or her current income, alternative documentation of income may be provided. If the borrower fails to provide certification of income, any unpaid accrued interest will be capitalized and he or she will be placed in the REPAYE Alternative Repayment plan. If the borrower fails to certify his or her family size, a family size of one will be assumed and used for the year. REPAYE Alternative Repayment Plan. Borrowers repaying according to the REPAYE repayment plan who fail to provide timely certification of their income are subject to being placed into the REPAYE Alternative Repayment plan. Under the REPAYE Alternative Repayment plan, monthly payment amounts are calculated to equal the amount necessary to repay the borrower's loans in full within the earlier of 10 years from placement into the REPAYE Alternative Repayment plan or the ending of the maximum repayment period of 20 years or 25 years, as applicable. Payments made during periods of repayment according to the REPAYE Alternative Repayment plan count as qualifying payments for loan forgiveness under the various IDR plans; however, they do not count as qualifying payments for the Public Service Loan Forgiveness program. Maximum Repayment Period and Loan Forgiveness . In the REPAYE repayment plan, the maximum repayment period is 20 years for borrowers whose student loan debt was obtained exclusively for undergraduate education; and 25 years for borrowers whose student loan debt includes any amounts obtained for graduate education. A borrower who at any time participates in the REPAYE repayment plan becomes eligible to have any balance that remains on his or her eligible loans forgiven if for 20 years or 25 years, as applicable, the borrower meets the loan forgiveness eligibility criteria specified in regulations at 34 C.F.R. Section 685.209(c)(5). (These criteria are substantially similar to the provisions that are applicable to the IBR plans, as described above.) If after having repaid according to the REPAYE repayment plan a borrower obtains additional loans that are eligible to be repaid according to the plan, a new repayment period will begin for the new loans when they enter repayment. Adjusted Payment Amounts for Borrowers Who Return to the REPAYE Repayment Plan. If a borrower seeks to return to the REPAYE repayment plan after having left and repaid according to any other repayment plan (including the REPAYE Alternative Repayment plan), he or she must provide documentation of income for the entire period that he or she repaid according to another plan. If it is determined that the borrower paid a lesser amount under the other repayment plan (or plans) than he or she would have been required to repay according to the REPAYE repayment plan, upon returning to the REPAYE repayment plan the borrower's monthly payment amounts will be adjusted upward to ensure that the difference between the two amounts will be paid before the end of the maximum repayment period of 20 or 25 years, as applicable. Alternative repayment plans are available in more limited situations, on a case-by-case basis, to borrowers who demonstrate that due to exceptional circumstances they are unable to repay according to other available repayment plans. Loan servicers are provided with discretion in determining what constitutes \"exceptional circumstances\" for purposes of permitting individual borrowers to repay according to any of the alternative repayment plans. If a borrower is permitted to repay according to an alternative repayment plan, he or she is notified in writing of the terms of the plan and may either accept those terms or select one of the other available repayment plans discussed above. Four variations of alternative repayment plans are available: Alternative Fixed Payment Repayment, Alternative Fixed Term Repayment, Alternative Graduated Payment Repayment, and Alternative Negative Amortization Repayment. The alternative repayment plans are established in accordance with general guidelines specified in regulations. Details on specific provisions of these plans are communicated to eligible borrowers by loan servicers. A borrower may be provided up to a maximum of 30 years to repay according to an alternative repayment plan, not including periods of deferment and forbearance. There is a minimum monthly payment amount of $5 and payments cannot vary by more than three times the amount of the smallest payment. Under the Alternative Negative Amortization Repayment plan, a borrower may be permitted for one year to make monthly payments of less than the amount of the interest that accrues on the loan. In such a case, any unpaid interest will be capitalized; however, capitalization of unpaid interest may not result in the loan balance exceeding 110% of the original principal amount. If this occurs, any additional interest that accrues must be paid by the borrower. Payments made according to an alternative repayment plan do not count toward the periods of repayment that may qualify a borrower for loan forgiveness under the IDR plans or the PSLF program. The portion of any payment that is in excess of the amount due is considered a prepayment . Borrowers of loans made through the Direct Loan program may prepay all or any part of their loans at any time without penalty. Borrowers may obtain information from their Direct Loan servicer on how to provide prepayment, with instructions regarding the application of overpayments. The procedures for applying prepayments to borrowers' accounts are specified in regulations issued by ED. The procedures that apply for crediting a prepayment to a borrower's loan balance depend on the size of the prepayment amount relative to the borrower's scheduled monthly payment. A borrower with more than one loan who wants a prepayment to be applied to a certain loan or loans (e.g., the loan with the highest interest rate) must specify such when making the prepayment; otherwise, the prepayment will be applied in accordance with HEA regulations and guidelines, which, among other provisions, generally require all of a borrower's loans to be repaid together and under the same repayment plan. In general, if the amount of a prepayment is less than the next scheduled monthly payment amount according to the borrower's repayment plan, the prepayment is applied in the following order: (1) to charges and collection costs, (2) to accrued interest, and then (3) to outstanding principal. However, if the amount of the prepayment is less than the next scheduled monthly payment amount and the borrower is repaying according to the IBR, PAYE, or REPAYE repayment plans and has a scheduled monthly payment of $0.00, the prepayment is applied in the following order: (1) to accrued interest, (2) to collection costs, (3) to late charges, and then (4) to outstanding principal. For example, consider a borrower whose next scheduled monthly payment was $200 in January and who was current on making payments. If at the time of making the January payment the borrower made a payment of $300, this would result in a prepayment of $100. The $100 prepayment would be applied toward reducing the outstanding principal balance on the borrower's loans, because he or she did not have any outstanding charges or accrued interest. The borrower's next scheduled monthly payment of $200 would remain due in February. If the amount of the prepayment is equal to or greater than the next scheduled monthly payment amount under the borrower's repayment plan, the prepayment is applied in the same order as described above, and, unless the borrower requests otherwise, the due date of the borrower's next payment is advanced and he or she is notified of the due date for the next payment. For example, consider again a borrower whose next monthly payment was $200 in January and who was current on making payments. If at the time of making the January payment the borrower made a payment of $600, this would result in a prepayment of $400. Because this borrower did not have any outstanding charges or accrued interest, the $400 prepayment would be applied toward the next two payments due (i.e., the February and March payments) and the due date of the borrower's next payment would be advanced to April. If the borrower instead wanted the $400 prepayment to be applied toward reducing the outstanding principal balance and the next scheduled payment to remain due in February, he or she would need to request this at the time of making the prepayment. The loans of borrowers who fall behind on making payments are considered to be delinquent. In general, a federal student loan is considered delinquent when the full payment amount is not satisfied by the payment due date. A borrower may restore a delinquent loan to current status by making payments that are applied to past due amounts. When borrowers make payments on delinquent loans, their payments are generally credited first to the oldest past due amounts owed. An example of how a delinquent loan may be restored to current status is provided by ED in its contracts for its loan servicers. The example considers a borrower whose scheduled monthly payment amount of $225 is due on the 14 th of the month. If as of January 14 th , the borrower had paid only $200 for the January payment, the loan would become delinquent, as $25 would remain unpaid. However, if on February 14 th , the borrower paid $250, $25 would be applied to the past due amount for January and $225 would be applied to the amount due for February. This would restore the borrower's loan to current status. Periods of deferment and forbearance provide borrowers with temporary relief from the obligation to make monthly payments that would otherwise be due on their loans. In certain instances, interest subsidies may be provided during periods of deferment; however, interest subsidies are not available during periods of forbearance. In general, periods during which borrowers are in a deferment or forbearance are excluded from the repayment period. However, for borrowers who are repaying according to any of the IDR plans, periods of up to three years while in receipt of an economic hardship deferment are included as part of the repayment period. The various forms of deferment and forbearance that are available to borrowers of loans made through the Direct Loan program are described below. A deferment is a temporary period during which a borrower's obligation to make regular monthly payments of principal and interest is suspended, and during which an interest subsidy may be provided. Deferments are available during periods while a student is pursuing postsecondary education, participating in a graduate fellowship program or a training program, unemployed or experiencing an economic hardship, performing or has recently completed military service, or receiving treatment for cancer. Deferments are not available to borrowers whose loans are in default status. In most instances, a borrower must proactively apply for and request a deferment. To qualify for it, the borrower (or, in certain instances, the individual on whose behalf the loan was made for parent borrowers of Direct PLUS Loans) must satisfy certain eligibility criteria. Several deferment types have no maximum period of eligibility, while other types are initially granted for a limited period of time and may be subsequently renewed up to a maximum period of eligibility for the deferment type. Periods of eligibility for deferments are specific to the borrower, as opposed to the borrower's loans. Thus, for those deferment types that have a maximum period of eligibility, if a borrower exhausts his or her eligibility with one set of loans no eligibility would remain to qualify for the same type of deferment on any other loans for which he or she had not received the deferment. Unless an interest subsidy applies to a borrower's loans, interest will continue to accrue during a period of deferment. While in receipt of a deferment, borrowers have the option either to pay the interest as it accrues or pay it at a later time. In most instances, if the interest that accrues during a period of deferment is not paid as it accrues it will be capitalized at the end of the deferment period. However, if a borrower's deferment coincides with the individual having a partial financial hardship while repaying according to either of the IBR plans or the PAYE repayment plan, any interest that has accrued during the deferment will not be capitalized so long as the borrower continues to have a partial financial hardship. The following types of deferments are available to borrowers of loans made through the Direct Loan program. A borrower is eligible to receive an in-school deferment for any period during which he or she is enrolled at an eligible institution on at least a half-time basis, as determined by the institution attended. Graduate student borrowers of Direct PLUS Loans first disbursed on or after July 1, 2008, (which enter repayment upon being fully dispersed) are also eligible to receive an in-school deferment while they are enrolled in school and during the six-month period after ceasing to be enrolled on at least a half-time basis. During an in-school deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. There is no maximum period of eligibility for an in-school deferment. Eligible borrowers are typically placed in an in-school deferment automatically on the basis of being enrolled in an eligible institution on at least a half-time basis. However, eligible borrowers may also proactively request an in-school deferment. Borrowers who have been automatically placed in an in-school deferment have the option to cancel it. If these borrowers wish to do so, they have the option to pay any principal and interest that had already been deferred or they may let the interest that had accrued on the deferred payments be capitalized upon cancellation of the deferment. Parent borrowers of Direct PLUS Loans for which the first disbursement was made on or after July 1, 2008, are eligible for a deferment for any period during which the student on whose behalf the loan was made would qualify for an in-school deferment. This deferment is also available during the six-month grace period after the student on whose behalf the loan was made first ceases to be enrolled on at least a half-time basis. A borrower may receive a deferment while pursuing a course of study in a graduate fellowship program. Eligibility requirements include that the borrower has earned a bachelor's degree, and that the program operates on a full-time basis, provides financial support for at least six months, and requires the applicant to submit a written statement of objectives and periodic progress reports. There is no maximum period of eligibility for this deferment. It is not available to borrowers who are serving in medical residency or internship programs, except for residency programs in dentistry. During a graduate fellowship deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower may receive a deferment while pursuing a course of study in a rehabilitation training program for individuals with disabilities. For a borrower to be eligible, the rehabilitation training program must be licensed, approved, certified, or recognized by a state agency or the U.S. Department of Veterans Affairs. It also must provide services according to a written, individualized plan that specifies an expected completion date, and must require a substantial commitment by the borrower toward rehabilitation to the extent that it would normally prevent an individual from being employed full-time (i.e., 30 or more hours per week) for at least three months. There is no maximum period of eligibility for this deferment. During a rehabilitation training program deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower who is seeking to obtain full-time employment and is either not employed or is employed less than full-time may be granted an unemployment deferment. To be eligible, a borrower must be either receiving unemployment benefits or must document that he or she has registered with a public or private employment agency (if one is available within 50 miles) and is diligently seeking to obtain full-time employment. A borrower may receive the deferment for a maximum cumulative period of three years, which may include one or more episodes of unemployment. He or she is not required to have been employed previously to qualify for it. A borrower may request that an unemployment deferment begin the date that he or she became unemployed or began working less than full-time, but that date may be no earlier than six months prior to requesting the deferment. The deferment may be granted for an initial period of six months and may be extended in six-month increments. During an unemployment deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower may qualify for a deferment during periods while he or she is experiencing an economic hardship or is serving as a volunteer in the Peace Corps. To qualify for this deferment on a loan made through the Direct Loan program, a borrower must satisfy at least one of the following criteria: the borrower has been granted an economic hardship deferment under the FFEL program or the Perkins Loan program for the same period of time for which the borrower requests an economic hardship deferment; the borrower is receiving payments under a federal or state public assistance program (e.g., Temporary Assistance for Needy Families (TANF), Supplemental Security Income (SSI), Supplemental Nutrition Assistance Program (SNAP), state general public assistance, other means-tested benefits); the borrower is working full-time and has a monthly income that does not exceed an amount equal to 150% of the poverty line applicable to the borrower's family size, (see Table 7 ) as calculated on a monthly basis; or the borrower is serving as a volunteer in the Peace Corps. The deferment may be granted for periods of up to one year at a time, and may be extended up to a cumulative maximum of three years. Periods of up to three years while a borrower qualifies for an economic hardship deferment may be counted as part of the repayment period for each of the IDR plans. During an economic hardship deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower may qualify for a military service deferment on the basis of serving on active duty or performing qualifying National Guard duty during a war or other military operation or national emergency. The deferment is provided for the entire period of qualifying military service, and for an additional 180 days following the completion of military service for borrowers whose period of qualifying service includes or began after October 1, 2007. During a military service deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower may qualify for a post-active duty student deferment if he or she is a member of the National Guard or other reserve component of the Armed Forces (or is a member in retired status) and is called or ordered to active duty while he or she is enrolled on at least a half-time basis at an eligible institution, or within six months of being enrolled. To qualify, the borrower must have been required to perform at least 30 consecutive days of active duty service on or after October 1, 2007. The deferment is available for a period of up to the lesser of 13 months following the completion of active duty service or until the borrower re-enrolls in an eligible institution on at least a half-time basis. If a borrower qualifies for both the military service deferment and the post-active duty student deferment, the 180-day post-demobilization period and the 13-month post-active duty service period apply concurrently. During a post-active duty student deferment, an interest subsidy is provided on Direct Subsidized Loans and on the subsidized component of Direct Consolidation Loans. A borrower may receive a cancer treatment deferment on eligible loans during periods while he or she is receiving treatment for cancer and for the six months thereafter. To qualify for the deferment, the borrower must submit an application on which a physician who is a Doctor of Medicine (M.D.) or a Doctor of Osteopathy (D.O.) certifies that the borrower is receiving treatment for cancer under the physician's care. During periods while a borrower receives a cancer treatment deferment, no interest accrues on the qualifying loans. Qualifying loans include Direct Subsidized Loans, Direct Unsubsidized Loans, Direct PLUS Loans, and Direct Consolidation Loans that were either made on or after September 28, 2018, or had entered repayment status on or before September 28, 2018. Loans made prior to September 28, 2018, but had not yet entered repayment as of that date due to the borrower being enrolled in school on at least a half-time basis or being in the grace period, are not eligible for this deferment. However, as Direct Consolidation Loans made on or after September 28, 2018, are eligible for the deferment, borrowers of ineligible loans may consider including them in a Direct Consolidation Loan for purposes of qualifying for the deferment. Forbearance constitutes permission for a borrower to temporarily cease making monthly student loan payments, to make payments in reduced amounts, or to make payments over an extended period of time. During periods of forbearance, no interest subsidies are provided and borrowers ultimately remain responsible for paying all of the interest that accrues on their loans. Borrowers have the option of either paying the interest as it accrues during forbearance or letting it be capitalized into the principal balance at the end of the forbearance period. In most instances, borrowers must apply for forbearance; and for certain types of it, borrowers must provide supporting documentation to their loan servicer. Forbearance may be granted for an initial period of up to 12 months, and may be renewed upon the borrower's request. Certain types of forbearance are limited to a maximum of 36 months. Forbearance may be granted for a number of reasons. General or discretionary forbearance , may be granted at the discretion of the loan servicer to borrowers who are temporarily unable to make scheduled loan payments. Administrative forbearance is granted by the Secretary to borrowers during periods necessary to determine a borrower's eligibility for a number of borrower benefits and for certain other reasons. Certain types of forbearance, referred to as mandatory forbearance , are required to be granted to borrowers who satisfy applicable eligibility criteria. A borrower may request a general forbearance on the basis of experiencing a temporary hardship due to financial difficulties, a change in employment, medical expenses, or other reasons. A general forbearance may be granted at the discretion of a borrower's loan servicer for an initial period of up to 12 months and may be extended in increments of 12 months. A borrower's loan servicer may limit the maximum duration of forbearance; however, there is no statutory or regulatory limit. Administrative forbearance may be granted during periods necessary to process requests by a borrower for certain benefits or to determine his or her eligibility. It may be granted for up to 60 days for the processing of requests for deferment, forbearance, change of repayment plan, and loan consolidation. (Interest that accrues during administrative forbearance for these purposes is not capitalized.) Administrative forbearance is also granted during periods necessary to determine a borrower's eligibility for a student loan discharge (e.g., death or total and permanent disability, closed school, false certification, unauthorized payment, unpaid refund, bankruptcy, borrower defense to repayment) or for loan forgiveness through the Teacher Loan Forgiveness program. Administrative forbearance is provided to a borrower for up to three years if changes to variable interest rates preclude the borrower's ability to repay his or her loans in 10 years under the standard or graduated repayment plans. It may also be granted for short periods, such as when payments are overdue at the beginning of an authorized period of deferment or forbearance. The Secretary may also authorize administrative forbearance in response to a national military mobilization or a local or national emergency. A borrower who is a medical or dental intern or resident and does not or no longer qualifies for a deferment may receive mandatory forbearance. To qualify, the borrower must have been accepted into a medical or dental internship or residency program that either leads to a degree or certificate that is awarded by an IHE, a hospital, or a health care facility that offers postgraduate training, or that must be completed before the borrower may begin professional practice or service. This type of forbearance may be granted for an initial period of up to 12 months and may be extended in increments of up to 12 months for the duration of the borrower's internship or residency. A borrower who is serving in a national service position for which he or she receives a Segal AmeriCorps Education Award may receive mandatory forbearance. It may be granted for an initial period of up to 12 months and may be extended in increments of up to 12 months for the duration of the borrower's national service. Whereas borrowers are normally responsible for paying the interest that accrues during forbearance, the National Service Trust will pay all or a portion of the interest that accrues during forbearance for a borrower who has earned a Segal AmeriCorps Education Award. A borrower who is serving in a position that would qualify him or her for loan forgiveness under the Teacher Loan Forgiveness Program (described below) may receive mandatory forbearance. To be eligible, the borrower must be serving as a full-time teacher at an elementary school, secondary school, or educational service agency that serves low-income families. The borrower's outstanding loan balance is also considered in determining eligibility. This forbearance may be granted \"only if the Secretary believes, at the time of the borrower's annual request, that the expected forgiveness amount [i.e., up to $5,000 or up to $17,500, as applicable] will satisfy the anticipated remaining outstanding balance on the borrower's loan at the time of the expected forgiveness.\" It may be granted for an initial period of up to 12 months and may be extended in increments of up to 12 months for the duration of the five consecutive years of teaching service required to qualify for loan forgiveness. A borrower may receive mandatory forbearance on the basis of having a federal student loan debt burden that equals or exceeds 20% of his or her monthly total income. To qualify, a borrower must demonstrate that his or her required monthly payments on federal student loans made under Title IV of the HEA (e.g., loans made under the Direct Loan program, the FFEL program, or the Perkins Loan program) equal or exceed 20% of his or her total monthly taxable income. This type of forbearance may be granted for an initial period of 12 months and may be extended in increments of 12 months for a maximum duration of 36 months. Mandatory forbearance is available to a borrower who is a member of the National Guard and qualifies for a Post-Active Duty Student Deferment but does not qualify for a Military Service Deferment or other deferment, and is engaged in active state duty service for 30 or more consecutive days. This type of forbearance may be granted for an initial period of up to 12 months and may be extended in increments of up to 12 months for the duration of the borrower's qualifying National Guard service. Mandatory forbearance is available during periods while a borrower is performing service that qualifies him or her for partial repayment under a U.S. Department of Defense student loan repayment program. Interest that accrues during this forbearance is not capitalized at the end of the forbearance period. It may be granted for an initial period of up to 12 months and may be extended in increments of up to 12 months for the duration of the borrower's qualifying service. An important benefit to borrowers of federal student loans made through the Direct Loan program is that their obligation to repay these loans may be discharged or forgiven in a variety of circumstances. Several types of loan discharge and loan forgiveness benefits are available. These may be grouped into three broad categories: loan discharge for borrower hardship, loan forgiveness following IDR plan repayment, and loan forgiveness for public service. A borrower who experiences certain types of hardship may have his or her loan discharged. Types of hardship discharges available to borrowers of loans made through the Direct Loan program are described below. Administrative forbearance (see above) is granted during the period necessary to determine a borrower's eligibility for these types of discharge. A borrower's obligation to repay a loan is discharged if he or she dies; and in the case of a Direct PLUS Loan made to a parent borrower, the obligation to repay is discharged if the student on whose behalf the loan was made dies. In the case of a Direct Consolidation Loan that repaid either a Direct PLUS Loan or a FFEL PLUS Loan that was borrowed by a parent on behalf of a student, if the student dies a proportionate share of the Direct Consolidation Loan attributable to the applicable Direct PLUS Loan or FFEL PLUS Loan is discharged. In the case of a Joint Direct Consolidation Loan borrowed by two married individuals, upon the death of one spouse a proportionate share of the loan attributable to the individual who died is discharged. A borrower's liability to repay a loan is discharged upon the individual being determined to have a total and permanent disability (TPD). A borrower may be determined to be have a total and permanent disability based on any of the following three criteria: 1. Physician's Certification. Certification by a physician (M.D. or D.O.) licensed to practice in the United States that the borrower is unable to engage in any substantial gainful activity due to a physical or mental impairment that can be expected to result in death, has lasted continuously for at least 60 months, or can be expected to last continuously for at least 60 months. 2. SSA Disability Determination . Documentation from the Social Security Administration (SSA) that the borrower is receiving Social Security Disability Insurance (SSDI) or Supplemental Security Income (SSI) benefits and that his or her next scheduled disability review will be within five to seven years from the date of the individual's most recent SSA disability determination. 3. VA Service Connected Disability or Unemployability . Documentation from the Department of Veterans Affairs (VA) that the borrower has a service connected disability (or disabilities) that is 100% disabling or that he or she is totally disabled based on an individual unemployability rating. On a periodic basis, ED obtains information from SSA and VA on borrowers who might qualify for a TPD discharge on the basis of the second and third criteria, respectively, and contacts them to inform them of their potential eligibility. A borrower, or his or her authorized representative, may apply for a TPD discharge by submitting an application along with any required documentation of the borrower's disability. A borrower who has been identified as a veteran with a VA service-connected disability or unemployability determination will be granted a TPD discharge without needing to submit an application unless he or she decides to opt out of the process within 60 days of being notified by ED. If a borrower's TPD discharge application is approved, he or she will be considered totally and permanently disabled as of the date of the physician's certification, the date that ED received an SSA notice of award for SSDI or SSI benefits or Benefits Planning Query (BPQY), or the effective date of a VA service-connected disability or unemployability determination, as applicable. Upon the determination of a borrower being totally and permanently disabled, his or her obligation to make any further payments on the loans will be discharged and any loan payments that were made after the aforementioned dates will be returned. A TPD discharge approved on the basis of a physician's certification or an SSA disability determination is granted on a conditional basis for a three-year period that begins on the date of discharge. During the three-year period, a borrower who has been granted a TPD discharge according to either of these two criteria is subject to having his or her loans reinstated if the borrower (1) has annual earnings from employment in excess of 100% of the federal poverty guideline for a family of two (see Table 7 ), (2) obtains a new Direct Loan program loan or a TEACH Grant, (3) fails to return any Direct Loan or TEACH Grant disbursements made between the TPD discharge application date and the discharge date, or (4) receives a notice from SSA that he or she is no longer disabled or that his or her next scheduled disability review will be sooner than five to seven years from the date of the borrower's most recent SSA disability determination. After the three-year period, the TPD discharge becomes permanent. A TPD discharge granted on the basis of a VA service connected disability or unemployability is permanent upon being granted and is not subject to a post-discharge monitoring period. A borrower's liability to repay a loan is discharged if the borrower (or the student on whose behalf a Direct PLUS Loan is made to a parent borrower) does not complete the program of study for which the loan was made because the school he or she attended has closed. In the case of a Direct Consolidation Loan, the portion of the loan attributable to loans borrowed to finance the program of study at the closed school is discharged. With regard to loans made before July 1, 2020, to qualify for a closed school discharge, a borrower generally must submit an application and certify that the school attended closed either while the student was enrolled or within 120 days of the student withdrawing, and the student must not have completed the program of study for which the loan was obtained through a teach-out agreement at another school or by transferring credits earned at the closed school to another school. However, if based on information available to the Secretary, a borrower qualifies for a closed school discharge with respect to a school that closed on or after November 1, 2013, and before July 1, 2020, and the borrower did not subsequently re-enroll in any Title IV-eligible IHE within three years of the school having closed, the Secretary is to discharge the borrower's loan without the borrower needing to submit an application for a discharge. For loans made on or after July 1, 2020, to qualify for a closed school discharge, a borrower must submit an application and must certify that the school attended closed either while the student was enrolled or within 180 days of the student withdrawing, that he or she has not completed the program of study for which the loan was obtained through a teach-out agreement at another school or by transferring credits earned at the closed school to another school, and that he or she has not accepted the opportunity to complete the program of study or a comparable program at another school through either a teach-out plan performed by the closing school or a teach-out agreement at another school. Upon being granted a closed school discharge, a borrower is reimbursed for any amounts he or she had already repaid on the loan. If the borrower had previously defaulted on the loan, upon being granted a closed school discharge his or her eligibility to receive additional Title IV federal student aid will be restored and consumer reporting agencies will be instructed to delete any adverse credit history related to the loan. Any discharged loans do not count against the borrower's annual and aggregate loan limits, nor against his or her Subsidized Usage Period applicable under the Direct Subsidized Loan Limitations for Post-July 1, 2013, First-Time Borrowers. A borrower's liability to repay a loan is discharged if the eligibility of the borrower (or of the student in the case of a Direct PLUS Loan made to a parent borrower) to receive the proceeds of the loan was falsely certified by the IHE attended, or if the loan proceeds were disbursed without his or her authorization (e.g., unauthorized signature, identity theft). In the case of a Direct Consolidation Loan, a borrower's liability to repay the portion of the loan that is attributable to loans that were falsely certified by the IHE attended, or that were disbursed without his or her authorization, is discharged. Upon being granted a false certification or unauthorized payment discharge, the borrower is reimbursed for any amounts he or she had already repaid on the loan. If the borrower had previously defaulted on the loan, upon being granted a false certification or unauthorized payment discharge his or her eligibility to receive additional Title IV federal student aid will be restored and consumer reporting agencies will be instructed to delete any adverse credit history related to the loan. If a borrower is owed a refund by an IHE that has not been paid, his or her liability to repay an amount equal to the unpaid refund and any associated accrued interest and other charges is discharged. An unpaid refund discharge is only available in instances where a borrower is owed a refund by a school that has closed, or by an open IHE that the borrower (or the student on whose behalf a Direct PLUS Loan is made to a parent borrower) is no longer attending. A borrower's liability to repay a loan is discharged in whole or in part, and previous loan payments are refunded, if the borrower (or the student on whose behalf a Direct PLUS Loan was made to a parent borrower) successfully asserts a defense to repayment of the loan. A borrower may assert certain acts or omissions by the IHE for which the loan was borrowed that relates to the making of the loan as a defense to repayment. A borrower may assert a defense to repayment according to procedures specified in regulations that are specific to the period during which his or her loans were made. There are three distinct periods applicable to borrower defense claims. In the case of a Direct Consolidation Loan, the procedures to be used for adjudicating a defense to repayment claim depend on the types of loans that were repaid by it (e.g., loans made through the Direct Loan program, other types of eligible loans) and when it was made. For loans disbursed prior to July 1, 2017, a borrower defense to repayment \"refers to any act or omission of the school attended ... that would give rise to a cause of action against the school under applicable state law.\" For loans disbursed on or after July 1, 2017, and before July 1, 2020, a borrower defense to repayment refers to a nondefault, contested judgment against the school; a breach of contract by the school; or a substantial misrepresentation by the school to the borrower that the borrower had relied on to his or her detriment when he or she decided to attend or continue attending the school, or decided to borrow a loan. For loans disbursed on or after July 1, 2020, a borrower defense to repayment refers to a misrepresentation of material fact made by the borrower's school about enrollment or the provision of educational services that the borrower relied upon in deciding to borrow a loan and from which he or she suffered financial harm. For loans disbursed on or after July 1, 2020, a borrower must assert a defense to repayment within three years of ceasing to be enrolled at the IHE. In the instance that a borrower had previously defaulted on a loan, upon being granted a defense to repayment discharge the borrower's eligibility to receive additional Title IV federal student aid will be restored and consumer reporting agencies will be instructed to delete any adverse credit history related to the loan. Section 523(a)(8) of the Bankruptcy Code provides that student loans (e.g., loans made through the Direct Loan program) are presumed to be not dischargeable in bankruptcy proceedings, unless the debtor is able to demonstrate to the court that \"excepting such debt from discharge ... would impose an undue hardship on the debtor and the debtor's dependents.\" In general, to discharge student loan debt in bankruptcy, the debtor must file a separate lawsuit against the holder of the debt and must prove by a preponderance of the evidence that repayment of the debt would impose an undue hardship. If a borrower's liability to repay a loan made through the Direct Loan program is discharged in bankruptcy, the Secretary will cease to require the borrower to make payments on the loan. A borrower who has repaid a loan made through the Direct Loan program according to one or more of the Income-Driven Repayment (IDR) plans for the duration of the applicable maximum repayment period (including periods of repayment according to certain other eligible plans and periods while in receipt of an economic hardship deferment) is relieved of the obligation to repay any balance of principal and interest that remains outstanding. The applicable maximum repayment period varies by IDR repayment plan as follows: Income-Contingent Repayment Plan: 25 years; Original IBR Plan: 25 years; IBR Plan for Post-July 1, 2014, New Borrowers: 20 years; PAYE Repayment Plan: 20 years; REPAYE Repayment Plan for borrowers with debt only for undergraduate education: 20 years; and REPAYE Repayment Plan for borrowers with any debt for graduate education: 25 years. For detailed information on the requirements for a borrower to qualify for loan forgiveness following IDR plan repayment, see the descriptions of the maximum repayment period and loan forgiveness in the prior sections on each of the various IDR plans. The Direct Loan program makes loan forgiveness benefits available to borrowers who have engaged in certain types of public service for a specified period of time and meet program-specific requirements, as described below. A borrower who has completed five consecutive complete academic years of teaching service in a low-income school or educational service agency (ESA) may be relieved of the obligation to repay up to $5,000 for service as a highly qualified teacher, or up to $17,500 for service as a highly qualified special education teacher or secondary school teacher of mathematics or science. Teacher Loan Forgiveness benefits are only available to borrowers who had no outstanding balance on any federal student loan made through the Direct Loan program (or the FFEL program) as of the date the borrower first obtained such a loan after October 1, 1998. Student loan debt attributable to Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct Consolidation Loans (to the extent that the Direct Consolidation Loan repaid a Direct Subsidized Loan, a Direct Unsubsidized Loan, a FFEL Subsidized Stafford Loan, or a FFEL Unsubsidized Stafford Loan) may be forgiven. Loans must have been obtained prior to the end of a borrower's fifth year of qualifying service and may not be in default, unless satisfactory repayment arrangements have been made. A borrower may receive Teacher Loan Forgiveness Program Forbearance during the five years of teaching service required to qualify for benefits. A borrower becomes eligible for loan forgiveness benefits upon completion of the fifth year of qualifying service. If a borrower's student loan debt exceeds the amount to be forgiven, unless otherwise requested by the borrower, loan forgiveness benefits are applied first to Direct Unsubsidized Loans, then to Direct Subsidized Loans, then to the unsubsidized component of Direct Consolidation Loans, and finally to the subsidized component of Direct Consolidation Loans. Loan forgiveness benefits may not be provided for the same service used to qualify for benefits under the Public Service Loan Forgiveness (PSLF) program, the Loan Forgiveness for Service in Areas of National Need Program, or a Segal AmeriCorps Education Award. A borrower may be relieved of the obligation to repay the balance of principal and interest that remains outstanding on eligible loans upon having made 120 qualifying monthly payments on or after October 1, 2007, concurrent with the borrower being employed full-time by one or more public service organizations or serving full-time in an AmeriCorps or Peace Corps position. To qualify, a borrower must make 120 separate, full, on-time scheduled monthly payments on loans that are not in default. In general, qualifying payments are those made within 15 days of the due date according to certain repayment plans; however, borrowers using Segal AmeriCorps Education Award benefits, Peace Corps transition payments, or certain Department of Defense student loan repayment benefits may make lump sum payments. Qualifying payments include those made according to one or more of the following repayment plans: Income-Contingent Repayment (ICR) plan; Income-Based Repayment (IBR) plans; Pay As You Earn (PAYE) repayment plan; Revised Pay As You Earn (REPAYE) repayment plan; Standard Repayment Plan with a Maximum 10-Year Term; and any other of the loan repayment plans (except for the alternative repayment plans [discussed above]) if the monthly payment amount is not less than what would be paid under the Standard Repayment Plan with a Maximum 10-Year Term. A borrower must be employed by or serving full time with a public service organization at the time he or she makes each of the required 120 payments, applies for loan forgiveness benefits, and has forgiveness granted. Public service organizations are federal, state, local, or tribal government agencies, organizations, or entities; tribal colleges and universities; public child or family service agencies; nonprofit entities organized under Section 501(c)(3) of the Internal Revenue Code (IRC) that are tax-exempt under IRS Section 501(a); and certain other private nonprofit entities that are providers of public services. Public service organizations exclude labor unions, political organizations, and religious organizations (except to the extent that activities do not relate to religious instruction, worship services, or proselytizing). Eligible private nonprofit entities include providers of any of the following public services: emergency management, military service, public safety, law enforcement, public interest law services, early childhood education, public service for individuals with disabilities and the elderly, public health, public education, public library services, and school library or other school-based services. Loan forgiveness benefits may not be provided for the same service used to qualify for benefits under the Teacher Loan Forgiveness Program, the Civil Legal Assistance Attorney Loan Repayment Program, or the Loan Forgiveness for Service in Areas of National Need Program. The TEPSLF program was established in response to concerns that some borrowers were experiencing difficulty in deciphering and complying with the requirements for establishing eligibility for loan forgiveness through the PSLF program. A borrower who would qualify for loan forgiveness under the PSLF program except for the fact that, under certain circumstances, some or all of the required 120 monthly payments were nonqualifying may be relieved of the obligation to repay the balance of principal and interest that remains outstanding upon the borrower otherwise satisfying the requirements of the PSLF program as well as the following criteria: All of the borrower's nonqualifying monthly payments must have been made according to any of the Extended Repayment Plans or the Graduated Repayment Plans, but in an amount that was less than what would have been paid under the Standard Repayment Plan with a Maximum 10-Year Term. The amount of both the borrower's most recent monthly payment and the monthly payment made 12 months prior to application for relief through the TEPLSF program must equal or exceed the monthly payment amount that would have been calculated under one of the IDR plans for which the borrower would have otherwise qualified. (An exception to this criterion is provided to a borrower who would otherwise qualify for TEPSLF benefits but over the past five years demonstrates an \"unusual fluctuation of income.\" ) Only a borrower whose applications for PSLF benefits was denied due to some or all of the required payments not being made according to a qualifying repayment plan may apply for TEPSLF benefits. Benefits are available on a first-come, first-served basis and are subject to the availability of funds. The IRC provides that, in general, student loan debt (as well as other types of debt) that is discharged, forgiven, or repaid on a borrower's behalf is included as part of the individual's gross income for the purposes of federal income taxation. In certain instances, however, discharged or forgiven student loan debt may be excluded from an individual's gross income and, therefore, exempted from consideration in determining federal income tax liability. If loan discharge or loan forgiveness benefits are not specifically excluded from an individual's gross income, he or she may be responsible for paying any income tax liability associated with the benefits received. In the circumstances described below, discharged or forgiven student loan debt may be excluded from an individual's gross income: Discharge Due to Death. Student loan debt that is discharged due to the death of the borrower, or due to the death of the student on whose behalf a Direct PLUS Loan was made to a parent borrower, if the discharge occurs after December 31, 2017, and before January 1, 2026. Total and Permanent Disability Discharge . Student loan debt that is discharged due to the total and permanent disability of the borrower, if the discharge occurs after December 31, 2017, and before January 1, 2026. Closed School Discharge . Student loan debt that is discharged on the basis of the school attended having closed while the student was enrolled or within 120 days of the student withdrawing and the student also having not completed the program of study for which the loan was obtained through a teach-out plan at another school or by transferring credits earned at the closed school to another school. False Certification and Unauthorized Payment Discharges . Student loan debt that is discharged on the basis of the proceeds of the loan having been falsely certified by the IHE the borrower attended or having been disbursed without his or her authorization. Unpaid Refund Discharge . Student loan debt that is discharged on the basis of a school that has closed or that a borrower no longer attends having not refunded amounts owed to the borrower. Bankruptcy Discharge . Student loan debt that is discharged in bankruptcy proceedings. Insolvency. Student loan debt that is discharged while an individual is insolvent. Depending on an individual's unique circumstances, it may be possible for a borrower who receives Loan Forgiveness Following IDR Plan Repayment to be considered insolvent at the time of discharge. Loan Forgiveness for Public Service . Discharged or forgiven student loan debt may be excluded if a loan was made by certain types of lenders (e.g., the federal government), was borrowed to assist an individual in attending a qualified educational institution, and contains terms providing that some or all of the balance will be cancelled for work for a specified amount of time in certain professions or occupations and for any of a broad class of employers (e.g., public service organizations). Student loan debt that is discharged through the Teacher Loan Forgiveness program, the PSLF program, and the TEPSLF program may be excluded. A loan made through the Direct Loan program is considered to be in default once the borrower has failed to make payments when due or has otherwise not adhered to the terms of the promissory note for 270 days. Defaulting on a federal student loan can result in a number of adverse consequences for the borrower. Upon default, the borrower's obligation to repay the loan is accelerated (i.e., the entire unpaid balance of principal and accrued interest becomes due in full). In addition, upon defaulting a borrower loses eligibility for certain borrower benefits (e.g., deferment, forbearance, loan forgiveness), as well as eligibility to receive additional Title IV federal student aid. Defaulting may also result in other adverse effects for the borrower and may present a major obstacle to the borrower's future economic well-being. The Secretary will report defaulted loans to consumer reporting agencies and will take action to collect on them through one or more means. The borrower of a defaulted loan may be assessed a variety of charges for the costs of collecting on it. Several options are available to borrowers to bring defaulted loans back into good standing. A borrower may remove a loan from default status by rehabilitating the loan, consolidating the loan into a new Direct Consolidation Loan, or paying off the defaulted loan balance. A borrower who defaults on a loan made through the Direct Loan program becomes subject to many consequences, which are briefly described below: Ineligibility for Federal Student Aid . The borrower becomes ineligible to receive federal student aid made under Title IV of the HEA. A defaulted borrower may regain eligibility by voluntarily making six consecutive, on-time, full monthly payments. A borrower may restore eligibility for Title IV aid though this method only once. Capitalization of Interest. Any unpaid interest that has accrued (e.g., during periods of negative amortization, during delinquency) may be capitalized into the principal balance of the loan. Acceleration. The entire unpaid balance owed on the borrower's loan becomes due in full. Transfer to Private Collection Agencies. Upon default, student loan accounts are initially transferred from the borrower's student loan servicer to the Office of Federal Student Aid's Default Management and Collection System (DMCS), which may then transfer defaulted loans to private collection agencies (PCAs) that are under contract with FSA for collections. A PCA will first contact the borrower before pursuing efforts to collect on the debt. The PCA may offer the borrower the opportunity to rehabilitate the loan or to enter into a voluntary repayment agreement. If the borrower accepts neither offer, or does not honor a voluntary repayment agreement, the PCA may seek to collect on the defaulted loans by means of administrative wage garnishment (AWG). The PCA may also refer defaulted loans to the Treasury Offset Program (TOP) for collection, or may recommend litigation. Assessment of Collection Charges. The borrower may be charged for the costs of collecting on the loan, including loan collection fees, TOP processing fees, court costs, and attorney's fees. Administrative Wage Garnishment . Up to 15% of the borrower's disposable pay may be garnished to repay the defaulted student loan. Disposable pay is defined as that part of a borrower's compensation that remains after deducting amounts required by law to be withheld. Defaulters must be given written notice of the intent to garnish wages; and they have rights to examine the debt record, have a hearing concerning the existence and amount of the debt or repayment terms, and establish a repayment schedule before garnishment begins. Federal Salary Offset. Similar to AWG, up to 15% of the disposable pay (including retirement pay) of a borrower who is a current or former federal employee may be offset to repay a defaulted student loan. Treasury Offset Program. Defaulters become subject to having their federal income tax returns, Social Security benefits, and certain other federal benefits offset through the Treasury Offset Program (TOP) as payment on their student loans. Up to 100% of federal tax refunds may be offset. Social Security benefits may be offset in an amount up to the lesser of 15% of the borrower's monthly benefit amount, or the amount that his or her monthly benefit exceeds $750. Special rules apply with regard to the offset of Social Security Disability Insurance (SSDI) benefits. If a recipient has a disability rating of medical improvement not expected (MINE), the offset of SSDI benefits will be suspended. However, if a recipient's disability benefits are converted to retirement benefits, the offset of Social Security benefits may resume. Civil Lawsuit . Litigation is employed as a last resort to collect on a defaulted loan. If this option is pursued, the U.S. Department of Justice may sue the defaulter, on behalf of the Office of Federal Student Aid, to compel repayment. Reporting to Consumer Reporting Agencies . Information on student loans, including amounts borrowed, amounts owed, and repayment status, is regularly exchanged with consumer reporting agencies. Upon default, information about it will also be shared. Consumer reporting agencies may report information on the status of a borrower's defaulted student loan for seven years from the date of the default. A number of options are available to borrowers to get out of default. As noted above, a borrower may rehabilitate the defaulted loan, obtain a Direct Consolidation Loan and use the proceeds to pay off the defaulted loan, pay the amount owed on the defaulted loan in full, or, in limited circumstances, enter into a compromise agreement. Repaying a defaulted loan in full may be beyond the means of many borrowers. However, options to do so may include obtaining financing from outside the Direct Loan program to pay off the defaulted debt. A compromise agreement or debt settlement may permit a borrower to satisfy the debt by making a lump sum payment in an amount that is less than the full balance due. Compromise agreements and settlements are offered only after other repayment options have been exhausted. Loan rehabilitation and loan consolidation are more widely available to and used by borrowers. Each is described below. Loan rehabilitation offers borrowers who have defaulted on a student loan an opportunity to have their loan(s) reinstated as active and to have their borrower benefits and privileges restored. A defaulter must contact the PCA to whom the debt has been transferred to request loan rehabilitation. If during a period of 10 consecutive months a borrower voluntarily makes nine reasonable and affordable monthly payments on a defaulted loan within 20 days of the due date, the defaulted loan is rehabilitated. One of two methods may be used to determine what constitutes a reasonable and affordable payment amount for purposes of rehabilitating a defaulted loan. It is initially determined as being an amount equal to the greater of either one-twelfth of 15% of any portion of the borrower's AGI that is in excess of 150% of the poverty line applicable to the borrower's family size (see Table 7 ), or $5. However, a borrower is permitted to object to the initial determination and may instead elect to have the amount calculated according to an alternative formula that is based on an itemized accounting of his or her monthly income and expenses. In either case, the borrower is required to provide documentation of income and, as applicable, expenses for purposes of determining a reasonable and affordable payment amount. Only payments that are voluntarily made by a borrower may be counted as among the nine reasonable and affordable payments required for loan rehabilitation. Involuntary payments may continue to be collected (e.g., through administrative wage garnishment or the TOP) while a borrower pursues loan rehabilitation. Upon a loan being rehabilitated, the borrower again becomes eligible for full borrower privileges, such as deferments and loan forgiveness, and other means of collecting on the loan while it was in default will cease. The borrower's loan will then be transferred by DMCS to a nondefault loan servicer and he or she will be placed in one of the alternative repayment plans (discussed above) for a period of 90 days. The borrower may then apply for another repayment plan for which he or she is eligible; if the borrower does not apply for a repayment plan, he or she will be placed in a standard repayment plan. Consumer reporting agencies will also be instructed to remove any record of the default from the borrower's credit history; however, records of late or missed payments that led to the loan defaulting will not be removed. A defaulted loan may be rehabilitated only once. Defaulted loans upon which a court judgement has been obtained through a civil lawsuit are not eligible to be rehabilitated. A borrower may use the proceeds of a new Direct Consolidation Loan to pay off one or more defaulted loans. To become eligible to do so, a borrower must make what are considered satisfactory repayment arrangements. One approach is for the borrower, prior to consolidation, to make three voluntary, consecutive, on-time, full monthly payments that are considered reasonable and affordable, based on the borrower's total financial circumstances. These payments must be made within 20 days of the due date and may not be involuntary payments (e.g., payments collected through administrative wage garnishment or the TOP). A borrower who chooses this approach may repay the new Direct Consolidation Loan according to any available repayment plan. Another approach is for the borrower to agree to repay the new Direct Consolidation Loan according to one of the IDR plans for which the borrower is eligible. If the borrower obtains a Direct Consolidation Loan for purposes of repaying a Direct PLUS Loan or a FFEL PLUS Loan made to a parent borrower, he or she must repay the new loan according to the Income-Contingent Repayment plan, which is the only IDR plan available to borrowers of parent loans. Several restrictions limit the availability of loan consolidation as an option for borrowers to bring defaulted loans into good standing. If the borrower's loan was subject to AWG, this must first be lifted for the loan to be eligible for consolidation. A loan on which a court judgment has been secured through litigation is not eligible for loan consolidation. If the borrower's defaulted loan is a Direct Consolidation Loan, the borrower must include at least one other eligible loan in the new Direct Consolidation Loan. If the borrower's defaulted loan is a FFEL Consolidation Loan, the borrower may include the loan in a new Direct Consolidation Loan without including any other loans; however, the borrower must repay according to one of the IDR plans. If a borrower consolidates a loan out of default, collection fees will be assessed on the outstanding principal and interest of the defaulted loan, and these fees will be included as part of the original principal balance of the new Direct Consolidation Loan. Upon a defaulted loan being repaid by a Direct Consolidation Loan, the borrower regains eligibility for full borrower privileges, such as deferments and loan forgiveness, as well as eligibility for additional federal student aid. However, in contrast to loan rehabilitation, repaying a defaulted loan with a Direct Consolidation Loan will not remove the record of default from the borrower's credit history. This report seeks to provide a comprehensive overview of the terms and conditions of federal student loans made through the Direct Loan program. These loan terms and conditions are voluminous and complex. For many individuals, the process of borrowing a federal student loan may be among their first experiences with making a major financial transaction; thus, it is imperative for borrowers to understand the terms and conditions of the loans they obtain and their associated rights and responsibilities as borrowers. As part of the process of obtaining a federal student loan, borrowers are required to undergo financial counseling that provides them with information about their loans and the obligations they assume as borrowers. First-time borrowers must be provided with entrance counseling, which provides them with comprehensive information on the loans they are about to obtain. Borrowers who have received an adverse credit determination but have been able to establish eligibility to borrow Direct PLUS Loans must receive PLUS Loan credit counseling. At the time of obtaining a loan, borrowers are required to sign a promissory note, which is a contract that establishes the borrower's legal obligation to repay. The promissory note is accompanied by a rights and responsibilities statement that uses plain language to disclose the terms and conditions of the loan. Prior to a borrower ceasing to be enrolled on at least a half-time basis, he or she must be provided with exit counseling. The institution attended by a first-time borrower of a Direct Subsidized Loan or a Direct Unsubsidized Loan, or by a first-time graduate or professional student borrower of a Direct PLUS Loan is required to ensure that he or she receives entrance counseling prior to the first installment of the loan being disbursed. Entrance counseling may be provided through an in-person counseling session, a written document provided to the borrower, or an online interactive medium. Irrespective of the means through which entrance counseling is provided, the institution must ensure that an individual who has expertise in federal student aid is available shortly after the session to respond to any questions a borrower might have. Entrance counseling is designed to provide a borrower with comprehensive information on both the terms and conditions of the loan and the borrower's rights and responsibilities with regard to the loan. Entrance counseling must satisfy the following requirements: explain the master promissory note; emphasize to the borrower the seriousness and importance of the obligation to repay the loan; describe the likely consequences of default, which include adverse credit reports, the collection of delinquent debt, and litigation; emphasize that the borrower is required to repay the loan in full, irrespective of whether he or she completes the program of study on time or at all, is unable to obtain employment, or is dissatisfied with the program; provide the borrower with sample monthly payment amounts based on either a range of amounts that might be borrowed or the average cumulative amount borrowed by other students in the same program; explain potential implications that accepting the loan might have on the borrower's eligibility to receive other forms of student aid; provide information on interest accrual and capitalization; inform the borrower of the option to pay the interest that accrues on Direct Unsubsidized Loans and Direct PLUS Loans while he or she is enrolled in school; explain the meaning of half-time enrollment and the consequences of not maintaining half-time enrollment; explain the importance of informing the school if the borrower chooses to withdraw so that exit counseling can be provided; provide information about, and how the borrower can access, the National Student Loan Data System (NSLDS); provide the name of and contact information for an individual the borrower may ask any questions about the terms and conditions of the loan and the borrower's rights and responsibilities with regard to the loan; explain to post-July 1, 2013, first-time borrowers the Direct Subsidized Loan Limitations for Post-July 1, 2013, First-Time Borrowers provision for Direct Subsidized Loans and its implications; and explain to first-time graduate student borrowers of a Direct PLUS Loan who have previously borrowed a Direct Subsidized Loan or a Direct Unsubsidized Loan the differences between these loan types with regard to interest rates, the accrual of interest, and the start of the repayment period. Any parent borrower or graduate or professional student borrower with an adverse credit determination who becomes eligible to borrow a Direct PLUS Loan, either by obtaining an endorser or by providing documentation of extenuating circumstances, must receive special PLUS Loan credit counseling. The counseling is also available on a voluntary basis to Direct PLUS Loan borrowers who have not received an adverse credit determination. This counseling includes information similar to what is currently provided in PLUS Loan entrance counseling. The terms and conditions of federal student loans made through the Direct Loan program are specified in a promissory note, which is a contract that establishes the borrower's obligation to repay the loan. A master promissory note (MPN) is a type of promissory note under which loans may be made to a borrower for a single academic year or for multiple academic years. One type of MPN is used for making Direct Subsidized Loans and Direct Unsubsidized Loans and another type of MPN is used for making Direct PLUS Loans. A different type of promissory note is used for making Direct Consolidation Loans. The MPN must be read and signed by a student or parent borrower before loan funds may be disbursed. The IHE a student attends may choose to use a MPN with either a single-year or a multiyear feature. IHEs that use a single-year MPN may only make loans under the MPN for one academic year. IHEs that use the multiyear feature may make one or more loans under the same MPN for up to 10 academic years. IHEs that use a multiyear MPN must confirm a borrower's acceptance of a new loan for each subsequent year by either obtaining a borrower's written confirmation of acceptance (affirmative confirmation) or by not receiving a borrower's notification that he or she is specifically declining the loan in whole or in part (passive confirmation). Under current regulations, IHEs are encouraged, but not required, to obtain affirmative confirmation from the student that he or she accepts the loan before disbursing loan funds. Attached to the MPN is a Plain Language Disclosure (PLD) form that explains loan terms and conditions and the borrower's rights and responsibilities in simplified terms. The PLD is provided to borrowers prior to each disbursement of a loan made through the Direct Loan program, regardless of whether an IHE uses a single-year or multiyear MPN. Prior to a student borrower ceasing to be enrolled on at least a half-time basis, the institution a borrower attends must provide him or her with exit counseling. It may be provided through an in-person counseling session, an audiovisual presentation, or an online interactive medium. Irrespective of the means through which exit counseling is provided, the institution must ensure that an individual who has expertise in federal student aid is available shortly after the session to respond to any questions a borrower might have. Exit counseling is designed to provide the borrower with comprehensive information on both the terms and conditions of the loan and the borrower's rights and responsibilities with regard to the obligation to repay the loan. Exit counseling must satisfy the following requirements: inform the borrower of the average anticipated monthly payment amount based on either the individual's actual student loan debt or the average cumulative amount borrowed by other students at the same school; provide a review of the repayment plan options available to the borrower, along with a description of the various features of each plan and sample information showing average anticipated monthly payment amounts and differences in interest and total payments under each plan; explain options to prepay a loan, to repay according to a shorter schedule, and to change repayment plans; provide information on loan consolidation and how it affects the length of repayment and total interest paid; how it affects borrower benefits, such as grace periods, loan forgiveness, loan cancellation, and deferment; and options to prepay a loan or change repayment plans; explain how to contact the borrower's loan servicer; explain the master promissory note; emphasize to the borrower the seriousness and importance of the obligation to repay the loan; emphasize that the borrower is required to repay the loan in full, irrespective of whether he or she completes the program of study on time or at all, is unable to obtain employment, or is dissatisfied with the program; describe the likely consequences of default, which include adverse credit reports, the collection of delinquent debt, and litigation; provide a general description of the terms and conditions under which a borrower may receive full or partial discharge or forgiveness of principal and interest, may defer repayment of principal or interest, or may be granted forbearance; and descriptions of federal student assistance programs and other information and ED publications as required by HEA Section 485(d); review information on the availability of the FSA Ombudsman Group; provide information about, and how the borrower can access, the NSLDS; explain to post-July 1, 2013, first-time borrowers the Direct Subsidized Loan Limitations for Post-July 1, 2013, First-Time Borrowers provision for Direct Subsidized Loans and its implications; provide a general description of tax benefits that may be available to borrowers; and require the borrower to provide current and expected future contact information, next of kin, and (if known) expected employer. The loan counseling and disclosures described above are designed to ensure that borrowers are provided with information about the terms and conditions of their loans, as required by law. Appendix A presents a list of additional resources that may be accessed by policymakers and others who may be interested in obtaining more detailed information about borrowers' rights, responsibilities, and obligations with regard to Direct Loan program loans. Appendix A. Directory of Resources Directory of Resources Appendix B. Glossary of Terms Appendix C. Historical Tables on Selected Loan Terms and Conditions", "summary": "The William D. Ford Federal Direct Loan (Direct Loan) program is the single largest source of federal financial assistance to support students' postsecondary educational pursuits. The U.S. Department of Education estimates that in FY2020, $100.2 billion in new loans will be made through the program. As of the end of the second quarter of FY2019, $1.2 trillion in principal and interest on Direct Loan program loans, borrowed by or on behalf of 34.5 million individuals, remained outstanding. For many individuals, borrowing a federal student loan through the Direct Loan program may be among their first experiences in incurring a major financial obligation. Upon obtaining a loan, a borrower assumes a contractual obligation to repay the debt over a period that may span a decade or more. Loans were first made through the Direct Loan program in 1994. Since then, Congress has periodically made changes to the program and the terms and conditions of loans. Changes have impacted program aspects such as the availability of loan types, interest rates, loan repayment, loan discharge and forgiveness, and the consequences of default. Over time, the accumulation of changesâmany of which are differentially applicable to borrowers or loan typesâhas resulted in a set of loan terms and conditions that are voluminous and complex. Congress may contemplate making future changes to loan terms and conditions. This report has been prepared to provide Congress with a comprehensive description of the terms and conditions and borrower benefits that are applicable to loans made through the Direct Loan program. Emphasis is placed on discussing loan types, provisions related to borrower eligibility, amounts that may be borrowed, interest and fees, loan repayment, repayment relief, loan forgiveness benefits, the consequences of default, and the methods used to ensure borrowers are informed about the terms and conditions of their loans and their obligation to repay them. Direct Loan Types Four types of loans are available through the Direct Loan program. Direct Subsidized Loans are available only to undergraduate students with financial need. Direct Unsubsidized Loans are available both to undergraduate students and graduate students. Direct PLUS Loans may be borrowed by graduate students and by the parents of undergraduate students dependent upon them for financial support. Direct Consolidation Loans allow borrowers to combine debt from multiple existing federal student loans into a single new loan. Eligibility and Amounts That May Be Borrowed Whether an individual may borrow a loan and the amount he or she may borrow are determined by the interaction of many factors. Eligibility to borrow varies by loan type, borrower characteristics, program level, and class level. The amount an individual may borrow is subject to annual and aggregate borrowing limits, and federal need analysis and packaging procedures. Loans are made available in amounts constrained by program rules, butâwith the exception of Direct PLUS Loansâwithout consideration of a borrower's ability to repay. Eligibility to borrow a Direct PLUS Loan depends on an individual's creditworthiness. Interest on Direct Loan Program Loans Procedures for calculating interest vary by loan type, repayment status, and the period during which a loan was made. In limited circumstances, the federal government subsidizes, or does not charge, interest that would otherwise accrue. Interest subsidies are mostly limited to Direct Subsidized Loans; however, certain interest subsidies may be provided on all loan types. Loan Repayment Plans Numerous repayment plans, each with different payment structures and maximum durations, are available. Among the various plans, income-driven repayment (IDR) plans cap monthly payments at a specific percentage of a borrower's discretionary income. For most repayment plans, monthly payments must cover the interest that accrues; however, the IDR plans allow for negative amortization, in which case monthly payments may be for less than the interest that accrues. Deferment and Forbearance Periods of deferment and forbearance offer a borrower temporary relief from the obligation to make monthly payments. In certain instances, interest subsidies may be provided during periods of deferment; however, interest subsidies are not available during periods of forbearance. Loan Discharge and Loan Forgiveness A borrower may be relieved of the obligation to repay his or her loans in certain circumstances. Student loan debt may be discharged on the basis of borrower hardship (e.g., death, total and permanent disability, school closure) or may be forgiven following an extended period of repayment according to an IDR plan or completion of a period of public service. Loan Default, Its Consequences, and Resolution If a borrower defaults, the loan becomes due in full and the borrower loses eligibility for many benefits, as well as access to other forms of federal student aid. The government also uses numerous means to collect on defaulted student loan debt. A limited set of options is available for a borrower to bring a defaulted loan back into good standing. Loan Counseling and Disclosures Student borrowers are required to undergo financial counseling, which is designed to provide them with comprehensive information on the terms and conditions of their loans as well as their rights and the responsibilities they assume as borrowers. Loan terms and conditions are specified in a promissory note, which is a contract that establishes the borrower's obligation to repay the loan, and in a plain language disclosure document that uses simplified terms to explain a loan's terms and conditions and the borrower's rights and responsibilities.", "document_type": "crs"}
{"report": "The Elementary and Secondary Education Act (ESEA), most recently comprehensively amended by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), is the primary source of federal aid to elementary and secondary education. Title I-A is the largest program in the ESEA, funded at $15.9 billion for FY2019. Title I-A is designed to provide supplementary educational and related services to low-achieving and other students attending elementary and secondary schools with relatively high concentrations of students from low-income families. The U.S. Department of Education (ED) determines Title I-A grants to local educational agencies (LEAs) based on four separate funding formulas: Basic Grants, Concentration Grants, Targeted Grants, and Education Finance Incentive Grants (EFIG). This report provides FY2019 state grant amounts under each of the four formulas used to determine Title I-A grants. For a general overview of the Title I-A formulas, see CRS Report R44164, ESEA Title I-A Formulas: In Brief . For a more detailed discussion of the Title I-A formulas, see CRS Report R44461, Allocation of Funds Under Title I-A of the Elementary and Secondary Education Act . Under Title I-A, funds are allocated to LEAs via state educational agencies (SEAs) using the four Title I-A formulas. Annual appropriations acts specify portions of each year's Title I-A appropriation to be allocated to LEAs and states under each of the formulas. In FY2019, about 41% of Title I-A appropriations were allocated through the Basic Grants formula, 9% through the Concentration Grants formula, and 25% each through the Targeted Grants and EFIG formulas. Once funds reach LEAs, the amounts allocated under the four formulas are combined and used jointly. For each formula, a maximum grant is calculated by multiplying a \"formula child count,\" consisting primarily of estimated numbers of school-age children living in families in poverty, by an \"expenditure factor\" based on state average per pupil expenditures for public elementary and secondary education. In some of the Title I-A formulas, additional factors are multiplied by the formula child count and expenditure factor to determine a maximum grant amount. These maximum grants are then reduced to equal the level of available appropriations for each formula, taking into account a variety of state and LEA minimum grant provisions. In general, LEAs must have a minimum number of formula children and/or a minimum formula child rate to be eligible to receive a grant under a specific Title I-A formula. Some LEAs may qualify for a grant under only one formula, while other LEAs may be eligible to receive grants under multiple formulas. Under three of the formulasâBasic, Concentration, and Targeted Grantsâgrants are initially calculated at the LEA level. State grants are the total of allocations for all LEAs in the state, adjusted for state minimum grant provisions. Under EFIG, grants are first calculated for each state overall and then are subsequently suballocated to LEAs within the state using a different formula. FY2019 grants included in this report were calculated by ED. The percentage share of funds allocated under each of the Title I-A formulas was calculated by CRS for each state by dividing the total grant received by the total amount allocated under each respective formula. Table 1 provides each state's grant amount and percentage share of funds allocated under each of the Title I-A formulas for FY2019. Total Title I-A grants, calculated by summing the state level grant for each of the four formulas, are also shown in Table 1 . Overall, California received the largest total Title I-A grant amount ($2.0 billion) and, as a result, the largest percentage share (12.52%) of Title I-A grants. Vermont received the smallest total Title I-A grant amount ($36.9 million) and, as a result, the smallest percentage share (0.24%) of Title I-A grants. In general, grant amounts for states vary among formulas due to the different allocation amounts for the formulas. For example, the Basic Grant formula receives a greater share of overall Title I-A appropriations than the Concentration Grant formula, so states generally receive higher grant amounts under the Basic Grant formula than under the Concentration Grant formula. Among states, Title I-A grant amounts and the percentage shares of funds vary due to the different characteristics of each state. For example, Texas has a larger population of children included in the formula calculations than North Carolina and, therefore, is to receive a higher grant amount and larger share of Title I-A funds. Within a state, the percentage share of funds allocated may vary by formula, as certain formulas are more favorable to certain types of states (e.g., EFIG is generally more favorable to states with comparatively equal levels of spending per pupil among their LEAs). If a state's share of a given Title I-A formula exceeds its share of overall Title I-A funds, this is generally an indication that this particular formula is more favorable to the state than formulas for which the state's share of funds is below its overall share of Title I-A funds. For example, Alaska, Arizona, California, Delaware, the District of Columbia, Florida, Georgia, Hawaii, Illinois, Louisiana, Maine, Maryland, Montana, Nevada, New Hampshire, New Mexico, New York, North Dakota, Rhode Island, South Dakota, Texas, Vermont, and Wyoming each received a higher percentage share of Targeted Grants than of overall Title I-A funds, indicating that the Targeted Grant formula is more favorable to them than other Title I-A formulas may be. In states that received a minimum grant under all four formulas (Montana, North Dakota, New Hampshire, South Dakota, Vermont, and Wyoming), the shares under the Targeted Grant and EFIG formulas are greater than under the Basic Grant or Concentration Grant formulas, due to higher state minimums under these formulas. If a state received the minimum grant under a given Title I-A formula, the grant amount is denoted with an asterisk (*) in Table 1 . ", "summary": "The Elementary and Secondary Education Act (ESEA), most recently comprehensively amended by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), is the primary source of federal aid to K-12 education. The Title I-A program is the largest grant program authorized under the ESEA and was funded at $15.9 billion for FY2019. It is designed to provide supplementary educational and related services to low-achieving and other students attending elementary and secondary schools with relatively high concentrations of students from low-income families. Under current law, the U.S. Department of Education (ED) determines Title I-A grants to local educational agencies (LEAs) based on four separate funding formulas: Basic Grants, Concentration Grants, Targeted Grants, and Education Finance Incentive Grants (EFIG). The four Title I-A formulas have somewhat distinct allocation patterns, providing varying shares of allocated funds to different types of states. Thus, for some states, certain formulas are more favorable than others. This report provides FY2019 state grant amounts under each of the four formulas used to determine Title I-A grants. Overall, California received the largest FY2019 Title I-A grant amount ($2.0 billion, or 12.52% of total Title I-A grants). Vermont received the smallest FY2019 Title I-A grant amount ($36.9 million, or 0.24% of total Title I-A grants).", "document_type": "crs"}
{"report": "Poverty is an ongoing topic of interest for Congress, in various capacities: as a factor to be considered when allocating funding for certain programs, as an eligibility criterion for some low-income assistance programs, and to gauge the well-being of individuals, families, or the economy as a whole. The poverty rate fell to 11.8% in 2018 from 12.3% in 2017. In both years, the poverty rate was lower than the pre-recessionary level of 12.5% in 2007. However, since the end of the Great Recession in 2009, the poverty rate remained elevated for approximately the first four years after the recession's end, and despite reductions in the poverty rate in recent years, it remains higher than its record-low of 11.1% in 1973. Poverty's persistence alongside indicators of economic strength has led policymakers to continually examine the drivers of povertyâboth economic and socialâand the effectiveness of various policy responses. As the conversations about poverty and public policy continue, it may be useful to consider the question: Who are the people who are poor in the United States? This report provides a snapshot of who was poor in 2018 by selected demographic, economic, and social characteristics. The data presented here show that people in poverty are not a monolithic group, but rather a diverse collection of families and individuals at different stages of life, living in different circumstances. Special attention is paid in this report to the role of work in the lives of people who are poor. Income from work, or the lack thereof, is central to the economic fortunes not only of those considered \"working-age,\" but also of children, who are generally dependent on working-age adults, and persons who are aged (age 65 and older), who generally have prior experience in the workforce that shapes their economic well-being after they retire. Attention is also paid to living arrangements. Because poverty is measured at the family level, considerations such as whether someone lives alone, or whom someone lives and potentially shares resources with, influence economic well-being. Other factors that affect family well-being, and that influence individuals' attachment to and success in the labor market, are important for considering individuals' experiences of poverty but are beyond the scope of this report. This snapshot looks at the composition of people in povertyâwhat groups comprise what share of the poverty populationârather than at poverty rates among different groups. This provides a different perspective in viewing poverty. A large population group such as non-Hispanic whites might have relatively low poverty rates, but because of the group's size in the overall population it represents a relatively large share of the poverty population. A small population, such as American Indians and Alaska Natives, might have relatively high poverty rates, but because of the group's size it represents a relatively small share of the poverty population. Both perspectives on poverty are valid and relevant to public policy. Readers interested in an examination of poverty rates for different demographic groupsâand trends in poverty over timeâshould see CRS Report R46000, Poverty in the United States in 2018: In Brief , by Joseph Dalaker. Poverty, in general, is a lack of resources to meet basic needs. This report uses the official measure of poverty used by the U.S. Census Bureau to identify individuals as \"poor.\" However, it is important to note that the Census poverty measure is actually family -based. Whether a person is considered poor depends on his or her money income and the income of any other family membersâthose related to a family head by birth, marriage, or adoptionâwith whom the person lives and presumably shares resources. If an individual is living alone or with people who are not relatives, that individual is considered a family of one and only his or her income is counted in determining his or her poverty status. That money income is then compared with a dollar threshold, which is based on that individual's family composition. For example, the poverty threshold for a working-age single person (who does not live in a family) in 2018 was $13,064. A single person with income below that amount is considered poor. The poverty threshold for a family of two adults and two children was $25,465. If the combined income of all family members was below that amount, all people in that family would be considered poor. The current official poverty measure has existed for about 50 years and is widely used, but it does have limitations. For example, the official measure looks only at pre-tax money income and does not examine the impact of government taxes and non-cash benefits on family well-being. The official measure also generally does not take the value of assets into account, though a recent change in measurement now considers distributions from retirement savings as income. The official measure is also the same across the country, and does not take into consideration differences in living costs in different geographical areas. Additionally, the measure's current definition of family does not take into account modern resource-sharing arrangements, such as those of cohabiting couples. The Census Bureau now publishes a supplemental poverty measure (SPM) for research purposes that does take into account taxes and transfers, make adjustments for housing costs by geographical area, and use an expanded definition of family. In 2018, an estimated 38.1 million people had pre-tax money income below the poverty threshold. As shown in Figure 1 , people who were poor accounted for 11.8% of the total noninstitutionalized population. The number and percentage of people in poverty reflect those whose family income fell short of the poverty threshold by any dollar amount. Of course, some people are poorer than others. One area of policy focus has been on the very poor: those considered to be in \"deep poverty.\" Deep poverty is usually defined as having income below 50% of the poverty threshold. In 2018, an estimated 17.3 million persons, close to half of all people in poverty (45.3%), were counted as living in deep poverty. The population of people living in poverty comprised individuals of all ages and sexes, and across all racial and ethnic groups. Figure 2 shows the composition of the population living in poverty and the overall population (for context) by age group in 2018. Three categories are presented: children (those under age 18), working-age adults (those ages 18 to 64), and the aged (those age 65 and older). As shown in the figure, slightly less than one-third (11.9 million) of all people in poverty were children. Children were over-represented among people in poverty relative to the overall populationâ31.1% compared to 22.6%. People who were working age (18-64) made up the largest share of the population who were poor, but they were under-represented among people in poverty relative to the overall population (55.4% compared to 61.1%). Among persons who were poor, 13.5% were age 65 and older, a smaller representation than their share of the overall population (16.3%). Figure 3 shows the composition of people in the poverty population and the total population (for context) by race and ethnicity for 2018. The racial and ethnic groups presented are ranked by the size of their total population (which is the same in both cases). Non-Hispanic whites were the largest racial/ethnic group overall (60.2% of the total population), and represented the largest racial/ethnic group within the poverty population (41.2%). Hispanics (of any race) were the second largest group (18.5% of the total population) and represented 27.6% of all those who were poor. Non-Hispanic African-Americans were the third largest racial/ethnic group in both the total and poverty populations, representing 12.3% and 21.9%, respectively. Note that most minority groups were over-represented in the poverty population relative to their share of the overall population. The over-represented groups were Hispanics, non-Hispanic African-Americans, and non-Hispanic American Indians and Alaska Natives. Under-represented racial/ethnic groups were non-Hispanic whites and Asians. The racial and ethnic composition of people in poverty by age group is shaped by the overall demographic trends affecting each age group. As illustrated in Figure 4 , children (under age 18), both poor and overall, are more racially and ethnically diverse than adults, especially the aged (age 65+). However, minorities were over-represented in the poverty population for all age groups in 2018. For instance, Hispanic children (of any race) made up the largest share of poor children (37.4%) whereas non-Hispanic white children made up the largest share (50.0%) of children overall. Women slightly outnumber men in the overall population, accounting for 51.0% of the total population in 2018. However, as shown in Figure 5 , women represented an even larger share (56.0%) of the population in poverty. This over-representation may be due, in part, to the fact that women are more likely than men to head single-parent households, a family type that is more likely to be poor. Additionally, men's earnings are higher than women's on average, even accounting for differences in full-time year-round employment status. Poverty raises different public policy considerations for children, working-age adults, and aged adults. Children are not expected to support themselves economicallyâthey are dependents of their parents or other adult caretakers who are assumed to fulfill that responsibility. Policies affecting the family income and poverty status of children generally apply to their parents or other adult caretakers. Working-age adultsâaside from those who are severely disabledâare expected to work and to support themselves and their children, if they have any. Aged adults may retire from work and draw income from public or private benefits, which are based primarily on their past work. The remainder of this report separately explores poverty among children, working-age adults, and aged adults. Though relevant policy considerations may differ among the three groups, the central role played by work as the primary means of economic support for individuals and families is highlighted. That work could be one's own work, the work of the parents or other family members, or past work providing retirement income. Similarly, because poverty is a family-based measure and the ability to share resources is an important consideration in economic well-being, living arrangements are also explored. As noted earlier, children made up slightly less than one-third of all people in poverty in America in 2018, even though they made up less than a quarter of the total population. Thus, children in America are disproportionately poor. Of the three age groups examined in this report, children had the highest poverty rate in 2018, 16.2%. Children rely on their parents or other adult caretakers for their support. That support, even for children who are poor, is likely to come from earnings from the work of their parents or other adult caretakers. Figure 6 shows the composition of children who were poor and children in the total population by number of adult workers in the family for 2018. Note that the number of adult workers can exceed two, as it would include all adults in the family (such as siblings older than 18, grandparents, or other relatives over the age of 18). The figure shows that among children in the total population, 93.0% lived in families with at least one adult worker and roughly half (51.4%) lived in families with two or more adult workers. Among children who were poor, just over two-thirds lived in families with one or more workers. A majority of children in poor families (57.1%) lived in families with one worker, compared with 11.0% who lived in families with two or more workers. The remaining 31.9% lived in families with no workers. The number of potential adult workers in a child's family is affected by the type of family a child lives in. A single parent family might have only one potential adult worker, while a married-couple family has at least two potential adult workers. Figure 7 shows the distribution of children who were poor and children in the total population by family type in 2018. Children living in female-headed families accounted for a majority (57.5%) of all children who were poor, a disproportionate share relative to children in the total population. However, children in married-couple families still accounted for nearly one-third (32.2%) of all children who were poor. Despite a relatively low poverty rate for children in married-couple families in 2018, the large size of this population overall (children in married-couple families accounted for over two-thirds of all children) meant that a substantial number of children who were poor lived in this family type. Married-couple families were the only family type that was significantly under - represented among the population of children in poverty relative to the overall population. Children who are poor are also more likely to live in larger families. Larger families require more income to meet needs, and thus the poverty thresholds for larger families are higher than for small families. However, since most children live in families with earnings, and earnings are not determined by family sizeâthey are determined by what the worker can command in the labor marketâlarger families are more likely to be poor. Figure 8 shows the composition of children who were poor and children in the overall population by number of children in the family in 2018. In that year, 24.7% of all children who were poor were in families with four or more children, which is disproportionately higher than the 14.2% of children in the overall population living in families of that size. In contrast, 46.0% of children who were poor were in families with only one or two children. The majority of people in poverty in America are working-age adults (18-64 years old). This age group represented 55.4% (21.1 million individuals) of all people in poverty in 2018. Overall, this age group had a poverty rate of 10.7%, a lower rate than that of the overall population. Because poverty is a state of low income, and income generally comes from work, it is useful to explore the work status of working-age adults who are poor. In the overall population of working-age adults, the majority (77.3%) worked in 2018. However, among working-age adults who were poor, the majority (63.2%) did not work. As shown in Figure 9 , 36.8% of working-age adults who were poor were working in some capacity, either full- or part-time, full- or part-year. However, a relatively small share (12.0%) of working-age adults who were poor worked full-time all year. When working-age adults, both the poor and those in the overall population, were asked why they were not working, a wide range of reasons were given. Of non-working adults who were poor, one-third reported being ill or disabled, one-fourth reported taking care of family members, 18.8% said they were going to school, 11.4% said they were retired, and 6.0% said they could not find a job. For those not working in the overall population, a greater proportion (16.2%) reported being retired and a smaller proportion (27.1%) reported being ill or disabled. A large body of research has shown that success in the workforce is related to educational attainment. Credentials indicating higher levels of education tend to be reflected in higher earnings and steadier work. Figure 10 shows both working-age adults who were poor and all working-age adults by educational credential. The largest group (54.7%) of poor working-age adults in 2018 were those who obtained a high school diploma but no post-secondary educational credential. (High school graduates without a post-secondary credential were also the largest group (45.8%) within the total population of working-age adults.) Those lacking a high school diploma accounted for another 24.2% of all poor working-age adults, more than twice the share represented in the overall population (10.2%). The remaining 21.1% of 18 to 64 year olds below poverty had some postsecondary credential; the corresponding figure for all 18 to 64 year olds was 44.0%. It should be noted that the working-age adult group includes young adults, whose education might not be finished. Working-age adults represented a diverse group in terms of their family and living arrangements. Figure 11 shows both poor and all working-age adults by their living arrangements. A majority of both groups lived in families, although family living arrangements were more prevalent in the overall population (77.8%) than among the poor (56.4%). (As noted previously, \"family,\" as used by the Census Bureau, includes people related by birth, marriage, or adoption.) Working-age adults who did not live in families were disproportionately poor in 2018; 43.6% of all working-age adults in poverty lived outside of a family. Included in this group were those living alone (19.0%) and those living with cohabiting partners (13.0%) or other unrelated adults/roommates (11.7%). However, determination of the poverty status of people living outside of families but with others is not straightforward. The poverty status of individuals with cohabiting partners or who are living with other adults is based on each individual's income; no \"pooling\" of income is assumed in the official poverty measure, including among cohabiting partners who may be sharing resources. Of the three age groups discussed in this report, aged adults are the least likely to be living below the poverty line. In 2018, they accounted for 16.3% of the total population, compared with 13.5% of the population in poverty. The poverty rate among aged adults was 9.7% in 2018. Aged adults may retire from the workforce with the support of both public and private sector policies, and in 2018, 76.4% of all adults aged 65 and older did not work. However, income derived from workâpast work, the earnings of other family members, and the earnings of the minority of aged adults who continue to workâplays a key role in determining the economic well-being of aged adults. Figure 12 explores various forms of work-related income received directly by aged persons or their families, including the following: Social Security income is earned through past work, with the initial benefit determined based on past earnings, with the benefit replacing a portion of those earnings. In 2018, Social Security was received by the families of 63.8% of all aged persons who are poor, compared to 85.1% of aged persons in the total population. Aged persons also frequently receive income from pensions and other benefits earned from jobs held during their working careers. These include private pensions or government pensions paid to former public sector employees. Far fewer aged adults in poverty receive these benefits compared to the overall aged population. In 2018, retirement, disability, or survivor pensions were received by the families of 51.6% of all aged persons, compared with 10.4% of the families of aged persons who were poor. Earnings from current workâeither by the aged adult member or other family membersâare also often received by families with aged persons. In 2018, earnings were received by the families of 41.4% of aged persons. In comparison, 10.5% of families of aged persons who were poor received earnings from work. When considering all of these various forms of work-derived income, most aged adults (97.1%) in the total population lived in families with income derived from work: either past work where Social Security or pension income was earned, or the current work of the aged adult or a family member. This share was smaller among aged persons who were poor, but still, almost three in four (74.2%) lived in families with income derived from work. Figure 13 shows aged adults living in poverty by living arrangement, which is, as previously mentioned, an important consideration because of the possibility of resource-sharing. In 2018, roughly half (49.9%) of aged adults who were poor lived alone, which is a significantly higher rate than in the overall population of aged adults (28.0%). Aged adults in poverty were much less likely to be living in families than the overall aged population (43.1% compared to 68.4%). This report presents basic information about the 38.1 million people in America who had income below the poverty line in 2018. Although it is presumed that they are all subject to income constraints, these data illustrate that they are not a homogenous group. For example, they are children, working-age adults, and aged adults; full-time full-year workers, caretakers for family members, or outside the workforce for other or unknown reasons; and living alone or in families. As this report shows, certain groups are over-represented among those living in poverty relative to the total population. These include, among others, women, minorities, children, and people living outside of families or alone. The report also shows the central role of income from work in determining whether a group is over-represented among those living in poverty. For children, this income is based on the work of their parents or other family members. For working-age adults, it is their own work that generally determines their poverty status. For aged adults, who are often retired from the workforce, it is primarily their past work or the work of those they live with that determines their status. However, sometimes earnings from work are not enough to prevent poverty. Two-thirds of children living in poverty in 2018 were in families with at least one adult earning income during the year. In 2018, more than 7 out of 10 poor aged persons had some form of work-based income. The complexity of circumstances that result in individuals experiencing povertyâboth individual and systemicâare beyond the scope of this report. However, those circumstances warrant further exploration when considering federal policy interventions designed to reduce the incidence, or ameliorate the effects of, poverty.", "summary": "This report provides a snapshot of the characteristics of the poor in the United States in 2018. It shows that people from families whose income falls below the federal poverty thresholds represent a diverse subset of the overall population. There were 38.1 million people living below the federal poverty level in 2018, representing 11.8% of the total population. Nearly half (45.3%) of all people in poverty lived in deep poverty (with income below 50% of the poverty threshold). The largest share of people in poverty were non-Hispanic white (41.2%) but the majority were not. Almost all other racial and ethnic groups were over-represented among the poor, relative to their prevalence in the overall population. Similar to the overall population, children who were poor were more racially and ethnically diverse than adults who were poor, especially aged adults. A majority (56.0%) of poor people were women. Children (under age 18) were disproportionately represented among people in poverty, constituting slightly less than one-third (31.1%) of this group. Over two-thirds of poor children (68.1%) lived in families where there was at least one worker, compared with 11.0% who lived in families with at least two workers. Conversely, in the overall population, half of all children lived in families with two workers. Most poor children lived in single parent homes, but nearly one-third (32.2%) lived in married-couple families. Over two-thirds (68.2%) of children in the overall population lived in married-couple families. The majority of people in poverty were working-age adults (age 18-64). While most (77.3%) working-age adults in the overall population were working in 2018, most (63.2%) working-age adults in poverty were not working in 2018. The most common reasons reported for non-work among those in poverty were illness or disability, the need to meet caretaking responsibilities, or being enrolled in school. Although most working-aged adults in poverty were not working, 36.8% were working in 2018; 12.0% were working full-time, full-year. Most working-age adults in poverty lacked a post-secondary educational credential; 78.9% had a high school diploma or less, compared to 56.0% in the overall population. Among people in poverty, 13.5% were aged (age 65 and older); because aged adults make up 16.3% of the overall population, this means they are underrepresented among people in poverty. The vast majority of aged adults in poverty either had, or lived in families that had, income from work or from retirement or other social insurance tied to prior work. Aged adults in poverty are far more likely to live alone than aged adults overall (49.9% compared to 28.0%).", "document_type": "crs"}
{"report": "For more than 65 years, the U.S. Congress has funded international food assistance through the Food for Peace program (FFP) to alleviate hunger and improve global food security. U.S. food assistance comes in the form of in-kind food commodities purchased in the United States and shipped overseas, and through market-based approaches. Market-based approaches include purchasing food in foreign local and regional markets and then redistributing it, and providing food vouchers and cash transfers that recipients can use to buy food locally. The U.S. Agency for International Development (USAID), the lead development and humanitarian arm of the U.S. government, administers the majority of U.S. international food assistance. Within the agency, the Office of Food for Peace manages the FFP program, which provides both emergency and nonemergency food aid. Nonemergency programming once represented a significant portion of FFP, but this portion has declined (from 83% in FY1959 to 11% in FY2018) as emergency needs have continued to rise and FFP has received emergency funding from additional accounts (see Figure 3 ). The Bureau for Food Security (BFS), within USAID, manages agricultural development and nutrition programs, which support food security goals but are not considered food aid under the umbrella of the Feed the Future Initiative (FTF). The distinctions between FFP nonemergency programs and BFS development programs are found in authorizing legislation, funding flows, and congressional jurisdiction. This report focuses primarily on FFP's nonemergency activities. It explains current programs, legislative history, and funding trends. The report also discusses how FFP nonemergency programs fit within the broader food aid and food security assistance framework, and the future of FFP nonemergency programs in the context of related Trump Administration proposals. Finally, this report explores the challenges Congress faces in conducting oversight of U.S. international food assistance programs, which fall under two separate congressional committee jurisdictions. In FY2018, Food for Peace (both emergency and nonemergency programs) operated in 59 countries and reached more than 76 million recipients. However, FFP had active nonemergency programs in only 15 countriesâmost of which were in sub-Saharan Africa, with the remaining in Latin America and the Caribbean, and Asia. FFP nonemergency programs seek to aid the poorest of the poor by addressing the root causes of hunger and making vulnerable communities more resilient to shocks, both natural and human-induced. Programs generally last five years and, according to FFP, \"aim to reduce chronic malnutrition among children under five and pregnant or lactating women, increase and diversify household income, provide opportunities for microfinance and savings, and support agricultural programs that build resilience and reduce vulnerability to shocks and stresses.\" Common types of FFP nonemergency activities include in-kind food, cash or voucher distributions, educational programs to encourage dietary diversity and promote consumption of vitamin- and protein-rich foods, farmer training on agricultural value chains and climate-sensitive agriculture, and conflict sensitivity training for local leaders. In building resilience in vulnerable communities, FFP seeks to reduce the need for future emergency assistance and pave the way for communities to pursue longer-term development goals. With few exceptions, nonemergency programs are implemented by nongovernmental organization (NGO) partners. Examples of the range of FFP nonemergency programs include the following: Strengthening Household Ability to Respond to Development Opportunities (SHOUHARDO III ) in Bangladesh began in 2015 to improve \"gender equitable food and nutrition security and resilience of the vulnerable people\" in two of the country's regions. USAID identified four areas of concern on which interventions should focus: gender inequality and women's disempowerment, social accountability, youth, and climate adaptation. CARE, a nonprofit organization that formed in post-World War II to distribute food packages in Europe, implements SHOUARDO III. The program's goal is to reach 384,000 participants through activities that address climate change and disaster resilience training, supplementary food distributions for pregnant and lactating women, youth skills training, the organization of microenterprise groups, and water supply and sanitation activities, among others. SHOUHARDO III is one of the few FFP nonemergency programs that includes a monetization component. In FY2018, SHOUHARDO received more than $18 million in FFP Title II funding. The program is scheduled to run through the end of FY2020. Tuendelee Pamoja II in the Democratic Republic of Congo (DRC) was initiated in 2016 to improve food security and resilience among 214,000 households in selected provinces, with a special focus on women and youth. Food for the Hungry, an international Christian relief, development, and advocacy organization, implements the program. Interventions include the distribution and testing of new varieties of soybeans, beans, and maize; construction of planting terraces to reduce land erosion; training on fishing practices; literacy and numeracy education; and youth training in wood- and metal-working; among others. The program received more than $15 million in FFP Title II funding in FY2018 and is scheduled to run through the end of 2021. Njira Pathways to Sustainable Food Security in Malawi began in 2014 with the aim of improving food security for more than 244,000 vulnerable people in selected districts in Malawi. The programs were designed to address Feed the Future (FTF)-established food security goals for the country and to complement other FTF programs and development goals under USAID/Malawi Mission's Country Development Cooperation Strategy. Project Concern International (PCI), a global development program established in 1961, implements the Njira project; its activities include distributing livestock and offering animal health services to improve livestock production, increasing access to and participation in women's empowerment savings and loan groups, conducting farmer training to combat Fall Armyworm, and distributing food rations to children under five. In FY2018, the Njira project received nearly $2 million in FFP Title II nonemergency funds and nearly $2.5 million in Community Development Funds (CDF). The project is slated to run through late 2019. FFP nonemergency programs are largely used to support the transition in food security assistance between short-term emergency food assistance programs and longer-term agricultural development and nutrition assistance programs. They share a close relationship with FFP emergency programs and the BFS-led Feed the Future development programs, but distinct differences exist among these aid channels, which are designed to be complementary and undertaken sequentially (see Figure 1 ) . While Food for Peace nonemergency programs address the root causes of food insecurity and seek to build resilience among vulnerable populations, FFP Title II emergency programs seek to distribute immediate, life-saving food and nutrition assistance to populations in crisis. Assistanceâprimarily through food procured in the United States but also through market-based approachesâis meant for those suffering from hunger or starvation as a result of crises. Programs are short, many running between 12-18 months, and are primarily implemented by the United Nations' World Food Programme. In FY2018, some of FFP's largest Title II emergency responses were staged in South Sudan ($335 million), Yemen ($273 million), and Ethiopia ($198 million). As noted, Food for Peace works with the poorest of the poor, focusing on building resilience. Feed the Future works with communities ready for longer-term development and focuses more on agricultural systems strengthening and market development. Catholic Relief Services, for example, currently implements both FFP nonemergency and Feed the Future development programs in Ethiopia. The FFP Ethiopia nonemergency program includes rehabilitating small-scale irrigation systems, conducting assessments on conflict management, and developing \"livelihood pathways\" for beneficiaries. The FTF development program includes financial education and services training, the establishment of marketing groups, and training for local leaders on youth participation in economic and social development. In this case, Food for Peace is supporting resilience strategies and baseline asset-building, while Feed the Future is encouraging more diverse market engagement and economic development. The use of Food for Peace nonemergency assistance and Feed the Future development assistance can depend on their different statutory requirements and flexibilities. For example, all FFP nonemergency programs funded with Title II must include in-kind food distributions; FTF programs do not. FFP nonemergency programs have funding flexibility that FTF development programs do not: funding may be reprogrammed from nonemergency to emergency responses if a shock occurs during the course of a nonemergency program. This flexibility exists because Title II funding is authorized for both emergency and nonemergency programing (see the \" Legislation \" section). For example, a five-year FFP nonemergency program in Madagascar shifted some of its funding to emergency programming in 2015, when the southern part of the country was hit with a drought. Once emergency food needs were met in those areas, the program was able to refocus on nonemergency programming. In some instances, Food for Peace nonemergency and Feed the Future development programs pursue similar or overlapping programming. Where such overlap occurs, implementing partners often duplicate programs deliberately to smooth the sustainable sequencing of food security programs, from FFP nonemergency to FTF development programming. As Food for Peace nonemergency programs are meant to bridge the gap between emergency programming and longer-term development programs, FFP seeks to coordinate both within the office and with its BFS counterparts. Within FFP, the office's geographic teams manage nonemergency programs alongside emergency programs, and in many cases the same staff manage both types of programs. For example, an FFP officer managing a nonemergency program in Haiti would also be managing emergency programs in the country. This integration allows the office's geographic staff to leverage resources and approaches between nonemergency and emergency programs. FFP officers also work with their Bureau for Food Security counterparts, both in Washington, DC, and in the field. FFP is a part of the Feed the Future target country selection process, and BFS works closely with FFP on its annual country selection process for new countries for FFP nonemergency resources and the subsequent program design for those countries. FFP also uses FTF indicators to measure progress toward programmatic goals in its program evaluations. In the field, BFS and FFP officers collaborate. The Food for Peace program was established in 1954 with the passage of the Agricultural Trade Development and Assistance Act of 1954 (P.L. 83-480). Title II of the act authorized the use of surplus agricultural commodities to \"[meet] famine or other urgent relief requirements\" around the world and provided the general authority for FFP development programs. Now referred to as the Food for Peace Act, the program has evolved to reflect changes in domestic farm policy and in response to foreign policy developments. Congress authorizes the majority of international food assistance programs, including the FFP program, in two pieces of legislation: The Farm Bill. Typically renewed every five years, legislation commonly referred to as the farm bill is a multiyear authorization that governs a range of agricultural and food programs. The majority of farm bill-authorized programs are domestic, but Title III includes the Food for Peace Act as Subtitle A. In the most recent farm bill, the Agriculture Improvement Act of 2018 ( P.L. 115-334 ), Congress authorized programs through FY2023. The Global Food Security Act of 2016 (GFSA). Congress enacted the Global Food Security Act of 2016 ( P.L. 114-195 ) to direct the President to coordinate the development of a whole-of-government global food security strategy and to provide food assistance pursuant to the Foreign Assistance Act of 1961 (P.L. 87-195; 22 U.S.C. 2151 et seq.). The GFSA also amended Sections 491 and 492 of the 1961 Act (22 U.S.C. 2292 et seq.) to establish the Emergency Food Security Program (EFSP) under International Disaster Assistance authorities, which FFP uses to provide emergency food assistance primarily through market-based approaches such as local and regional procurement (LRP), vouchers, and cash transfers for food. An extension of GFSA ( P.L. 115-266 ) was enacted in 2018 and authorizes programs through FY2023. Food for Peace nonemergency programs, in particular the Title II in-kind commodity purchase and distribution components, have historically received considerable bipartisan support from a broad domestic constituency. This support is a result of the program's link to U.S. farmers and shippers through the farm bill's statutory requirements. While FFP emergency responses make up the majority of the U.S. in-kind programming, the nonemergency food assistance programs share the same domestic connections. In a prepared statement for the House Agriculture Committee in relation to a 2017 hearing on the farm bill, the chairperson of the USA Rice Farmers Board shared the board's support of U.S. international food aid programs, noting that while U.S. Department of Agriculture (USDA) commodity procurement-purchases comprise only between 1% and 2% of total rice exports, \"it is important to the industry that we continue to play a strong role in providing our nation's agricultural bounty to those in need.\" In written testimony for the House Subcommittee on Agriculture Appropriations, the Senior Director of Policy and Advocacy at Mercy Corps stated that \"from our decades of experience working in fragile states, we have found non-emergency FFP programs to be the leading US government tool, for building the resilience of families and communities to food insecurityâ¦. [W]ith these investments, we can prevent and mitigate food security crises.\" Further, FFP has a close relationship with the U.S. maritime industry as a result of longstanding but evolving requirements that a percentage of FFP commodities be shipped on U.S.-flagged vessels. These agricultural cargo preference requirements can sometimes create tension; the U.S. Maritime Administration asserts that agricultural cargo preference is critical to maintaining U.S. sealift capacity while FFP often expresses concern about how the increased cost of adhering to agricultural cargo preference affects its ability to meet the needs of the world's most food insecure populations. Despite this tension, the maritime industry remains engaged and active in FFP programming and has been a vocal advocate for the commodity-based programs. These historic links to the U.S. agriculture and maritime industries have been a significant factor when Congress considers legislation. Consistent with the two authorization vehicles described above, food assistance funds are appropriated through both Agriculture appropriations (for farm bill-authorized programs) and Department of State, Foreign Operations and Related Programs (SFOPS) appropriations (for GFSA-authorized programs). Funds for nonemergency programs come from two accounts: The Food for Peace Title II Grants account within the Foreign Agricultural Service in Agriculture appropriations. FFP has received Food for Peace Title II Grants since its establishment. The Development Assistance (DA) account within SFOPS appropriations. FFP receives DA fundsâdesignated as Community Development Funds (CDF)âfrom BFS to complement its Title II nonemergency resources and improve coordination between FFP and BFS. First legislated in FY2010, Congress intended CDF funds be used to help FFP reduce its reliance on monetizationâthe practice of partners selling U.S. commodities on local markets and using the proceeds to fund nonemergency programs. The level of CDF that FFP receives from BFS is not required by law; however, Congress has designated funds for CDF in the report accompanying annual appropriations (sometimes referred to as a \"soft earmark\") to which USAID has adhered each fiscal year. FFP receives additional funding for emergency food programs through the International Disaster Assistance (IDA) account within SFOPS appropriations. In FY2010, FFP started receiving IDA funds for the Emergency Food Security Program (EFSP) to supplement its Title II emergency funds. In FY2018, Food for Peace received nearly half of its resources through Agriculture appropriations (see Figure 2 ). Of its overall funding, FFP used 11% ($431 million) for nonemergency programsâfunded both through Title II and CDFâand 89% ($3.250 billion) for emergency programs. As previously mentioned, this was a marked change from the early years of the FFP program. When the Title II program was established, nonemergency programs constituted 65% of funding. While their share of overall programming rose in the first few years of the programâin 1959, they made up 83% of Title II programmingâthe share steadily declined in the following decades. By 2007, nonemergency programming accounted for 20% of Title II funds (see Figure 3 ). The following year, Congress established a minimum level (in U.S. dollars) of nonemergency food assistance in the 2008 farm bill ( P.L. 110-246 ). The nonemergency minimum has been maintained in subsequent authorizations but has fallen by $10 million since it was first added to the bill (see Table 1 ). The most recent farm bill ( P.L. 115-334 ), enacted in December 2018, set the minimum level of nonemergency food assistance at $365 million but allowed for Community Development Funds and the Farmer-to-Farmer Program funds to be counted toward the minimum. The 116 th Congress may be interested in a number of issues related to Food for Peace nonemergency programs. Areas of interest may include proposed and ongoing reforms to the FFP program funding and structure that could change both how nonemergency programs fit into the broader landscape of U.S. international food assistance programs, and the means through which the program is funded. Since FY2018, the Trump Administration has proposed eliminating funding for the entire FFP Title II programâboth emergency and nonemergency programsâon the basis that doing so would \"streamline foreign assistance, prioritize funding, and use funding as effectively and efficiently as possible.\" In its FY2020 foreign assistance budget request, the Administration referred to providing Title II food aid as \"inefficient.\" Instead of relying on the FFP Title II program, which is funded through Agriculture appropriations, the Administration suggests providing food assistance solely through accounts funded by SFOPS appropriations. The Administration also proposes reducing SFOPS appropriations, indicating a preference for an overall reduction in funding for U.S. foreign assistance, including international food assistance programs. The Trump Administration is not the first to suggest significant changes to U.S. international food assistance programs. The Obama Administration also pursued a food aid reform agenda, proposing in its FY2014 budget request to shift all FFP Title II funds into three SFOPS assistance accounts. According to the Obama Administration, the proposed changes would have increased the flexibility, timeliness, and efficiency of U.S. international food assistance and allowed the programs to reach an additional \"4 million more people each year with equivalent funding.\" While to date Congress has not accepted any proposals to defund Title II, there have been efforts on Capitol Hill to change parts of the Title II program. For example, in the 115 th Congress, Senate Foreign Relations Committee Chairperson Bob Corker and House Foreign Affairs Committee Chairperson Edward Royce both introduced versions of the Food for Peace Modernization Act, with bipartisan support ( S. 2551 and H.R. 5276 , respectively). The two bills would have made changes to the Title II programâincluding eliminating the requirement to purchase all Title II food aid commodities in the United States and removing the monetization requirementâin an effort to reduce cost and gain efficiency. Neither bill received further consideration, but some elements of the proposals were incorporated into the most recent farm bill ( P.L. 115-334 ). In FY2018 and FY2019, Congress did not accept Administration proposals to eliminate Title II funding, and for FY2020, the House-passed Agriculture appropriations include $1.85 billion for Title II. As Congress considers its annual appropriations and future authorization measures, Members may consider how to balance calls for reform with the priorities and vested interests of domestic constituencies, including agricultural interests and development groups, and how the often conflicting viewpoints may affect the effectiveness and efficiency of the Title II nonemergency programs. As part of USAID's internal reform initiative, referred to as Transformation , the agency is planning to merge the FFP Office with the Office of U.S. Foreign Disaster Assistance (OFDA) into a new Bureau for Humanitarian Assistance (HA). OFDA is currently responsible for leading the U.S. government response to humanitarian crises overseas. In creating a new HA bureau, USAID would be consolidating its food (currently administered by FFP) and nonfood (currently administered by OFDA) humanitarian responses in an effort to remove potential duplication and present a more unified and coherent U.S. policy on humanitarian assistance on the global stage. In the new HA bureau, FFP and OFDA would no longer remain separate from one another with independent functions; instead, they would be consolidated into one bureau comprising eight officesâthree geographically focused (Africa; Asia, Latin America, and Caribbean; and Middle East, North Africa, and Europe) and five technical (covering issues such as award management, program quality, donor coordination, and business operations, among others). (See Appendix B .) The humanitarian community remains engaged with the U.S. government on this proposal and its potential effects on the broader efficiency, effectiveness, and coordination of humanitarian assistance. Some food assistance stakeholders have raised concerns about the dissolution of FFP and its potential impact on Title II programming. According to a USAID congressional notification on the intent to form the HA bureau, Title II nonemergency programming would remain in the new HA bureau, though it is unclear how that arrangement will look in practice. For the moment, USAID is planning to have the new HA geographic offices be responsible for managing both emergency and nonemergency Title II programming; however, a number of details need to be worked out by USAID leadership. These include whether and how nonemergency programs will be incorporated into larger disaster risk reduction efforts, and how the nonemergency programs will fit in with the programs to be managed by the new Bureau for Resilience and Food Security. As part of its Transformation process, USAID has held a number of consultations with Members of Congress. While the structural redesign is underway (HA is currently slated to be operational by the end of 2020, though implementation timelines may change), Congress has opportunities to provide feedback and guidance to the agency as it finalizes office-level details. Some policymakers have questioned why two different offices within USAID are responsible for similar programming, and have suggested either moving FFP's nonemergency portfolio to BFS or vice versa. In either consolidation scenario, the program could potentially benefit from increased coordination. For example, having one office manage all programming and present a unified voice to all stakeholders (including Congress) may reduce communication and coordination challenges. However, USAID could face significant tradeoffs in both consolidation scenarios. If FFP's nonemergency portfolio were to move to USAID's Bureau for Food Security, the programs could lose their focus on serving the most vulnerable populations. Unlike Food for Peace, Feed the Future does not focus its programs on the poorest of the poor, does not include in-kind food distributions in its projects, and cannot shift its funding to meet emergency needs should a shock occur. Were FFP nonemergency programming to move to BFS, these unique FFP qualities may be deprioritized in favor of the more traditional development model BFS has pursued with its Feed the Future programs. Additionally, during a disaster FFP often uses its nonemergency programs as a component in the overall emergency response, by either diverting existing resources or injecting new emergency resources to support an early response. Conversely, if BFS programming were to move to the Office of Food for Peace, the FTF programs could be deprioritized in favor of emergency programming. As discussed earlier, emergency programs have grown to dwarf nonemergency programming in funding terms (see Figure 3 ). If emergency funding needs continue to rise consistent with their previous trajectory, the demands from the emergency portfolio could outpace and overtake the traditional development assistance, jeopardizing the FTF gains already made and risking future programming. Since FY2010, Food for Peace has received Community Development Funds (CDF) from the Development Assistance account in SFOPs appropriations to support its nonemergency programs and reduce reliance on monetization. Over the years, FFP has grown to rely on CDF to pursue the full range of its nonemergency programs. Implementing partners have raised concerns that if the level of CDF funding were to drop, USAID would have to choose between routing CDF funds through BFS to FFP and fully funding BFS-administered programs. If FFP lost its CDF funding, it would likely need to return to using monetization to partially fund its nonemergency programs. To address this potential challenge, Congress could consider changes in legislation, including but not limited to the following: Increasing flexibilities in Title II funding , including the authorized level of Section 202(e). An increase in flexibility through Section 202(e) could mimic the programmatic flexibilities FFP has gained through the use of CDF, including interventions that do not rely on in-kind food distributions. Proposed increases in flexibility have been opposed by some FFP stakeholders, in particular U.S. agricultural commodity groups. Designating in law a specific CDF level for FFP âinstead of using the \"soft earmark\" in the bill reportâthereby guaranteeing a secure line of funding for FFP's nonemergency programs. This approach would likely be supported by the implementing partner community, as it would provide some assurance that the CDF level would remain constant from year to year. However, this approach could negatively affect Feed the Future programming if the overall DA funding were to drop. It also would institutionalize the coordination between FFP and BFS that the sharing of CDF has already propagated. The various U.S. international food assistance programs fall under two separate congressional committee jurisdictions, which some argue can reduce Congress's ability to pursue comprehensive, integrated oversight of these programs. In the nonemergency context, FFP Title II-funded programs fall under the jurisdiction of the Agriculture Committees and Agriculture Appropriations Subcommittees, but the CDF-funded programming falls under the jurisdiction of the Foreign Affairs and Foreign Relations Committees and SFOPS Appropriations Subcommittees (see Appendix A ). FFP reports on both of these in the International Food Assistance Report (IFAR), the farm bill-mandated annual report to Congress, even though it is not required to include Community Development Funds. This report offers a complete perspective on the FFP nonemergency programs, but it does not contextualize the programs with the entire U.S. international food assistance landscape. The IFAR does not include Emergency Food Security Program or Feed the Future reporting, because both are overseen by the Foreign Affairs/Relations Committees and are subject to different reporting requirements. As such, no single report currently mandated by Congress captures the entirety of international food assistance. The two oversight jurisdictions also present unique challenges to USAID. The two committee groupings often have different (and sometimes competing) priorities, the push and pull of which can sometimes lead USAID and its implementing partners to shoulder a higher administrative burden than other programs that reside in only one jurisdiction. For example, FFP was subject to eight Government Accountability Office (GAO) audits from 2014 to July 2019, covering issues from the monitoring and evaluation of cash-based food assistance programs to how U.S. in-kind commodities are shipped and stored. By comparison, BFS was the primary subject for one GAO audit in that same time-frame. With enactment of the 2018 farm bill ( P.L. 115-334 ), Food for Peace Title II nonemergency programs are authorized through FY2023. However, the Administration continues to propose the elimination of the FFP Title II program in its annual budget requests. By moving forward with USAID's Transformation initiative, the Administration is implementing changes to organizational structures through which nonemergency food assistance programs are administered. Congress may consider addressing its priorities for FFP nonemergency programs in annual appropriations legislation, stand-alone bills that address certain components of the program, and Transformation -related consultations. Appendix A. U.S. International Food AssistanceÂ Programs This graphic illustrates the suite of U.S. international food assistance programs, including their administering agency and congressional jurisdiction. The programs highlighted in this graphic are the nonemergency programs discussed in this report. Appendix B. USAID's Proposed Bureau for Humanitarian Assistance ", "summary": "The U.S. government provides international food assistance to promote global food security, alleviate hunger, and address food crises among the world's most vulnerable populations. Congress authorizes this assistance through regular agriculture and international affairs legislation, and provides funding through annual appropriations legislation. The primary channel for this assistance is the Food for Peace program (FFP), administered by the U.S. Agency for International Development (USAID). Established in 1954, FFP has historically focused primarily on meeting the emergency food needs of the world's most vulnerable populations; however, it also manages a number of nonemergency programs. These lesser-known programs employ food to foster development aims, such as addressing the root causes of hunger and making communities more resilient to shocks, both natural and human-induced. Nonemergency activities, which in FY2019 are funded at a minimum annual level of $365 million, may include in-kind food distributions, educational nutrition programs, training on agricultural markets and farming best practices, and broader community development initiatives, among others. In building resilience in vulnerable communities, the United States, through FFP, seeks to reduce the need for future emergency assistance. Similar to emergency food assistance, nonemergency programs use U.S. in-kind food aidâcommodities purchased in the United States and shipped overseas. In recent years, it has also turned to market-based approaches, such as procuring food in the country or region in which it will ultimately be delivered (also referred to as local and regional procurement, or LRP) or distributing vouchers and cash for local food purchase. The 115 th Congress enacted both the 2018 farm bill ( P.L. 115-334 ) and Global Food Security Reauthorization Act of 2017 ( P.L. 115-266 ), which authorized all Food for Peace programs through FY2023. In the 116 th Congress, Members may be interested in several policy and structural issues related to nonemergency food assistance as they consider foreign assistance, agriculture, and foreign affairs policies and programs in the course of finalizing annual appropriations legislation. For example, The Trump Administration has repeatedly proposed eliminating funding for the entire FFP program, including both emergency and nonemergency programs, from Agriculture appropriations and instead fund food assistance entirely through Department of State, Foreign Operations, and Related Programs appropriations. The Administration asserts that the proposal is part of an effort to \"streamline foreign assistance, prioritize funding, and use funding as effectively and efficiently as possible.\" To date, Congress has not accepted the Administration's proposal and continued to fund the FFP program in Agriculture appropriations, which is currently authorized through FY2023. USAID's internal reform initiative, referred to as Transformation , calls for the merger of the Office of FFP with the Office U.S. Foreign Disaster Assistance (OFDA) into a new entity called the Bureau for Humanitarian Assistance (HA) by the end of 2020. While the agency has indicated that the new HA will administer nonemergency programming, there are few details on how it will do so. FFP programs fall into two distinct committee jurisdictionsâAgriculture and Foreign Affairs/Relationsâmaking congressional oversight of programs more challenging. No one committee receives a comprehensive view of all FFP programming, and the committees of jurisdiction sometimes have competing priorities. For additional information, see CRS Report R45422, U.S. International Food Assistance: An Overview .", "document_type": "crs"}
{"report": "In recent years, the Trump Administration and Congress have grappled with how to address the substantial number of migrants from the Northern Triangle countries of El Salvador, Guatemala, and Honduras arriving to the U.S. Southwest border. Many observers have criticized what they label as \"catch and release,\" a colloquial phrase used to describe the process by which apprehended asylum seekers who lack valid documentation are subsequently released into the U.S. interior while they await their immigration hearings. This occurs because of growing backlogs in the immigration court system leading to wait times for immigration hearings now often lasting two years or more, and a lack of appropriate detention space for families due to the limitations imposed by the Flores Settlement Agreement, which restricts the government's ability to detain alien minors. Such observers argue that many apprehended aliens who are released into the United States do not appear for their immigration hearings and become part of the unlawfully present alien population. In light of these circumstances, Department of Homeland Security (DHS) Alternatives to Detention (ATD) programs are generating increased congressional interest as a way to monitor and supervise foreign nationals who are released while awaiting their immigration hearings. Proponents of ATD programs cite their substantially lower daily costs compared with detention, the high compliance rates of ATD participants with immigration court proceedings, and what they characterize as a more humane approach of not detaining low-flight-risk foreign nationals, many of whom are asylum applicants (particularly family units). Critics contend that ATD programs provide opportunities for participants to abscond (e.g., evade removal proceedings and/or orders) and create incentives for migration by allowing people to live in the United States for extended periods while awaiting the resolution of their case. They also question the effectiveness of these types of monitoring programs as a removal tool (i.e., as a means to remove participants ordered removed from the United States). DHS, for its part, states that nothing compares to detention for ensuring compliance. However, existing capacity to hold aliens is limited. Immigration statistics indicate that while the total number of individuals apprehended at the Southwest border has generally declined over the past two decades, the demographic profile of those apprehended has shifted toward a population more likely to be subject to detention. Historically, most unauthorized aliens apprehended at the Southwest border have been adult Mexican males who are considered to be \"economic\" migrants because they are primarily motivated by the opportunity to work in the United States, and who can be more easily repatriated without requiring detention. However, over the past five years, apprehensions of aliens from the Northern Triangle countriesâmany of whom are reportedly fleeing violence and seeking asylum in the United Statesâhave exceeded those from Mexico. Since 2017, U.S. Customs and Border Protection (CBP) has reported a sharp increase in the number of apprehensions at the Southwest border, especially among members of family units and unaccompanied alien children (UAC). Together, persons in family units and UAC currently make up more than two-thirds of apprehensions. In May 2018, the number of apprehensions by the U.S. Border Patrol plus the number of aliens determined inadmissible by CBP's Office of Field Operations (OFO) totaled 22,000; in April 2019, that number was 100,569, a 357% increase. In contrast, the number of single adults who were apprehended or found inadmissible rose from 24,493 to 43,637, a 46% increase, during the same time period. Foreign nationals from the Northern Triangle are requesting asylum at high rates that are DHS officials say are overwhelming the ability of federal agencies to process their detention, adjudication, and removal. The U.S. Border Patrol is responsible for immigration enforcement at U.S. borders between ports of entry (POEs). CBP's Office of Field Operations (OFO) handles the same responsibilities at the POEs. Foreign nationals seeking to enter the United States may request admission legally at a POE. In some cases, aliens attempt to enter the United States illegally, typically between POEs on the southern border. If apprehended, they are processed and detained briefly by Border Patrol; placed into removal proceedings; and, depending on the availability of detention space, either transferred to the custody of Immigration and Customs Enforcement (ICE) or released into the United States. Removal proceedings take one of two forms (streamlined or standard) depending on how the alien attempted to enter the United States, his/her country of origin, whether he/she is an unaccompanied child or part of an arriving family unit, and whether he/she requests asylum. If the alien is determined by an immigration officer to be inadmissible to the United States because he/she lacks proper documentation or has committed fraud or willful misrepresentation in order to gain admission, the alien may be subject to a streamlined process known as expedited removal. Expedited removal allows for the alien to be ordered removed from the United States without any further hearings or review. UAC, however, are not subject to expedited removal. Instead, if they are subject to removal, they are placed in standard removal proceedings and transferred to the Department of Health and Human Services' (HHS') Office of Refugee Resettlement (ORR) pending those proceedings. Although most aliens arriving in the United States without valid documentation are subject to expedited removal, they may request asylum, a form of relief granted to foreign nationals physically present within the United States or arriving at the U.S. border who meet the definition of a refugee. During CBP's initial screening process, if the alien indicates an intention to apply for asylum or a fear of persecution in his/her home country, the alien is interviewed by an asylum officer from DHS's U.S. Citizenship and Immigration Services (USCIS) to determine whether she/he has a \"credible fear of persecution.\" If the alien establishes a credible fear, she/he is placed into standard removal proceedings under Immigration and Nationality Act (INA) Â§240 and may pursue an asylum application at a hearing before an immigration judge. Those who receive a negative credible fear determination may request that an immigration judge review that finding. If the immigration judge overturns the negative credible fear finding, the alien is placed in standard removal proceedings; otherwise, the alien remains subject to expedited removal and is usually deported. Aliens may be detained or granted parole while in standard removal proceedings. During these proceedings, immigration judges within the Department of Justice's (DOJ's) Executive Office for Immigration Review (EOIR) conduct hearings to determine whether a foreign national is subject to removal or eligible for any relief or protection from removal. While immigration judges have the authority to make custody decisions, ICE makes the initial decision whether to detain or release the alien into the United States pending removal proceedings. Most asylum seekers who are members of family units are currently being released into U.S. communities to await their immigration hearings. The INA authorizes DHS to arrest, detain, remove, or release foreign nationals subject to removal. Enforcement and Removal Operations (ERO) is the office within ICE that is charged with detention and removal of aliens from the United States. Generally, aliens may be detained pending removal proceedings, but detention is discretionary if the alien is not subject to mandatory detention. Detention is mandatory for certain classes of aliens (e.g., those convicted of specified crimes) with no possibility of release except in limited circumstances. During the intake process, an ERO officer uses the ICE Risk Classification Assessment (RCA), a software tool that attempts to standardize custody decisions across all ERO offices, to evaluate whether a foreign national should be detained or released on a case-by-case basis. The factors used to make the detention decision include, but are not limited to, criminal history, alleged gang affiliation, previous compliance history, age (must be at least 18), community or family ties, status as a primary caregiver or provider to family members, medical conditions, or other humanitarian conditions. Typically, an alien may be released from ICE custody on an order of recognizance, bond, or parole on humanitarian grounds. For example, aliens initially screened for expedited removal who request asylum are generally subject to mandatory detention pending their credible fear determinations, and, if found to have a credible fear, pending their standard removal proceedings; however, DHS has the discretion to parole the alien into the United States pending those proceedings. Pursuant to a court settlement agreement, alien minors may be detained by ICE for only a limited period, and must be released to an adult sponsor or a non-secure, state licensed child welfare facility pending their removal proceedings. Due to these legal restrictions and a lack of appropriate facilities for family units, DHS typically releases family units with accompanying minors, if they are subject to removal, pending their removal proceedings because there are not enough licensed shelters available to detain the number of family units arriving at the Southwest border. Thus, if family units entering the United States request asylum and receive a positive credible fear determination, they typically will not be detained throughout their removal proceedings. In addition, as noted previously, UAC are generally transferred to the custody of ORR pending the outcome of their removal proceedings. Thus, like family units, UAC typically are released from DHS custody and placed in the non-detained docket during those proceedings. All aliens released from ICE custody into the U.S. interior are assigned to the non-detained docket and must report to ICE at least once a year. ICE's non-detained docket currently has approximately 3 million cases. Some portion of those in the non-detained docket are enrolled in an ATD monitoring program, but all aliens in the non-detained docket are awaiting a decision on whether they should be removed from the United States. The number of initial \"book-ins\" to an ICE detention facility (by ICE and CBP combined) has exceeded 300,000 annually in recent years, peaking in 2014 at 425,728, and reaching nearly 400,000 in FY2018. Even though there were nearly 400,000 admissions to detention in FY2018, the number of book-ins does not describe the population of aliens who are in a detention facility on any given day. Instead, the number of aliens in detention on a given day is determined by the number of book-ins, the length of stay in detention, and the number of beds authorized by Congress. In FY2019, the number of detention beds authorized by Congress was set at 45,274, up nearly 5,000 from the previous year, and more than 10,000 greater than FY2016. ICE reported that 54,082 aliens were currently detained on June 22, 2019. Figure 1 shows the ICE caseload, which consists of all detained and non-detained aliens that ICE must supervise as part of its docket management responsibilities. As mentioned above, non-detained aliens include those released from ICE custody on various types of orders, including orders of recognizance, parole, and bond, and those who were never detained. The ICE non-detained docket also includes aliens in state or federal law enforcement custody and at-large aliens with final orders of removal (e.g., fugitives). Those released from ICE custody are required to report to ERO at least once annually, but the frequency is at the discretion of ERO. The non-detained docket caseload is monitored as aliens move through immigration court proceedings until their cases close. Aliens in ATD have secured a legal means of release (i.e., bond or parole); participating in ATD is a condition of their release. As noted, ICE's full non-detained caseload was approximately 3 million foreign nationals on June 22, 2019. On that same date, ICE reported that there were 54,082 detained aliens, less than 2% of the entire ICE caseload. Included in the ICE non-detained caseload are 101,568 aliens, approximately 3% of all cases (See Figure 1 ), enrolled in ISAPIII. The goal of the ICE ATD program is to monitor and supervise certain aliens in removal proceedings more frequently relative to those released with annual supervision. Those in ATD are required to report to ERO annually as well, but they are also subject to varying degrees of supervision and monitoring at more frequent intervals on a case-by-case basis (see description of \" Alternatives to Detention (ATD) Programs \"). More broadly, DHS maintains that ATD programs should not be considered removal programs or a substitute for detention. Instead, according to DHS, these programs have enhanced ICE's ability to monitor more intensively a subset of foreign nationals released into communities. ICE's Intensive Supervision Appearance Program III (ISAP III) is the third iteration of the ATD program started by the agency in 2004. It is the only ATD program currently operated by ERO. To be eligible for this program, participants must be 18 years of age or older and at some stage of their removal proceedings. The most recent publicly available data show that there were 101,568 active participants enrolled in ISAP III, which is a 283% increase over the 26,625 enrollees in FY2015. Those enrolled in ISAP III are supervised largely by BI, Inc., a private company that provides ICE with case management and technology services in an attempt to ensure non-detained aliens' compliance with release conditions, attendance at court hearings, and removal. ERO ATD officers determine case management and supervision methods on a case-by-case basis. Case management can include a combination of face-to-face and telephonic meetings, unannounced visits to an alien's home, scheduled office visits by the participant with a case manager, and court and meeting alerts. Technology services may include telephonic reporting (TR), GPS monitoring (via ankle bracelets), or a relatively new smartphone application (SmartLINK) that allows enrolled aliens to check in with their case workers using facial recognition software to confirm their identity at the same time that their location is monitored by the GPS capabilities of the smartphone. As of June 22, 2019, approximately 42% of active participants in the ISAP III program used telephonic reporting, 46% used GPS monitoring, and 12% used SmartLINK. According to a 2014 Government Accountability Office (GAO) report, enrollees in ICE ATD programs are closely supervised at the beginning of their participation. If they are compliant with the terms of their plans in the first 30 days, the level of supervision may be lowered. Various compliance benchmarks are tracked in order to make decisions about whether supervision should be reduced or increased. If a final order of removal is issued, supervision usually increases until resolution of the case. ICE typically ends an alien's participation in the program when they are removed, depart voluntarily, or are granted relief from removal through either a temporary or permanent immigration benefit. Statistics obtained from ERO show that of the 87,384 enrollees in ISAP III on August 31, 2018, approximately 61% were female and 56% were members of family units (at least one adult with at least one child). Approximately 61% of participants were between the ages of 18 and 34, another 38% were 35-54, and 2% were 55 and older. Seventy-one percent of ISAP III enrollees were from the Northern Triangle countries of Guatemala, Honduras, and El Salvador ( Figure 2 ). Participants from Mexico made up 17% of the total, and the remaining 12% were from all other countries ( Figure 2 ). Ninety percent had no record of a criminal conviction ( Figure 3 ). Although all foreign nationals in ISAP III are in removal proceedings, most (86%) did not yet have a final order of removal on the date that these data were made available. Fourteen percent had a final order of removal; 19% of these aliens had appealed their removal order. In 2014, GAO evaluated ISAP III's predecessor program, ISAP II, during the FY2011 to FY2013 period. This iteration of the program had two supervision options, \"full service\" and \"technology only,\" thus the results of the GAO evaluation of ISAP II have limited utility for better understanding the effectiveness of ISAP III (which has not been similarly evaluated). The GAO evaluation of ISAP II noted that ICE had established two program performance measures to assess the effectiveness of the program: ensuring compliance with court appearance requirements and securing removals from the United States. However, GAO stated that limitations in data collection interfered with its ability to assess overall program performance. GAO found high rates of compliance with court appearances among full service ISAP II enrollees in the FY2011-FY2013 time period: 99% of participants appeared at their court hearings, dropping to 95% if it was their final removal hearing. Similar data was not collected for participants enrolled in the technology-only component, which amounted to 39% of the total participants in 2013. GAO subsequently reported that ICE, through its contractor, began collecting court compliance data for approximately 88% of the total participants, who were managed by either ICE or the contractor. According to ICE officials, as reported by GAO, ICE added a performance measure based on removals in 2011 because \"the court appearance rate had consistently surpassed 99 percent and the program needed to establish another goal to demonstrate improvement over time.\" GAO found that ICE met its ISAP II program goal for the number of removals for FY2012 and FY2013. For each of these years, the removal goal was a 3% increase in the number of removals from the previous fiscal year. In FY2012, the removal goal was 2,815, and ICE met it by removing 2,841 program participants from the United States. In FY2013, the removal goal was increased to 2,899, and ICE removed 2,901 program participants from the United States. Even though GAO was able to report on ISAP II removal and court compliance performance measures, it determined that data collection limitations hampered its ability to fully evaluate ISAP II's performance. For example, as described above, data collection on court appearance rates was inconsistent and incomplete for over one-third of program participants. ICE's performance measures were based on data collected at the time of an alien's termination from ISAP II, but ICE could not determine whether the alien complied with all of the terms of his/her release while participating in the program or absconded, due to incomplete record keeping and limited resources to maintain contact. GAO concluded that these performance measures and rates provided an incomplete picture of enrollees who were terminated from ISAP II prior to receiving final disposition of immigration proceedings, making it impossible to know how many were removed, departed voluntarily, or absconded. The Family Case Management Program (FCMP), which operated from January 2016 until June 2017, was an ATD pilot program for families with vulnerabilities not compatible with detention. An ICE review of the program published in March 2017 showed that although the rates of compliance for the FCMP were consistent with other ICE monitoring options, FCMP daily costs per family unit were higher than ISAP III. The program was discontinued. The FCMP prioritized families with young children or pregnant or nursing women, individuals with medical or mental health considerations (including trauma), and victims of domestic violence. The program was designed to increase compliance with immigration obligations through a comprehensive case management strategy supported by established community-based organizations (CBOs). A private contractor, GEO Care, Inc., entered into agreements with local CBOs that provided case management and other services. The program operated as follows. Each family was assigned to a case manager and offered three sets of services. First, participants were offered \"initial stabilization\" services, such as referrals for legal assistance, medical and food assistance, and English language training, based on the premise that stable families are more likely to comply with immigration requirements. Second, participants were required to attend legal orientation programs, which included presentations about immigration proceedings, obligations of participants, and legal representation. These programs were also designed to orient enrollees in understanding basic U.S. laws covering issues such as child supervision, domestic violence, and driving while intoxicated. Third, the program was specifically intended to reinforce information pertinent to aliens' cases through frequent reporting requirements, typically monthly office and home visits with case managers and monthly appointments with ERO. Ongoing relationships with case workers were developed to build trust in the immigration system and set clear expectations of the legal process, as well as to provide planning assistance for the eventuality of return, removal, or an immigration benefit that would offer relief from removal. Individualized and interactive oversight of cases and a flexible monitoring plan (similar to ISAP III) were implemented to provide a range of supervision optionsâsupervision was typically high while families stabilized their situations, and lower (conducted by ERO only) once they were considered stabilized. The program enrolled 952 heads of households with 1,211 children, for a total of 2,163 individuals in five metropolitan areas around the country. According to a 2018 ICE internal close-out report, most of the families in the program (92%) were headed by women; and most of the participants (95%) were from the Northern Triangle countriesâEl Salvador (44%), Honduras (32%), and Guatemala (19%) ( Figure 4 ). Overall, 55% of the program participants were children under the age of 18; 21% of children were under age 6. Twenty-one percent of program participants were between the ages of 26 and 35, 13% were 18-25, 9% were 36-45, and 2% were 46 or older ( Figure 5 ). All participants enrolled in the FCMP were individually assessed for vulnerabilities and needs. Seventy-three percent had experienced some kind of trauma, 11% were victims of domestic violence, 6% were pregnant, 6% were nursing, and 4% had mental health concerns ( Figure 6 ). ICE conducted an evaluation of the FCMP that focused on three metrics: attendance at ERO appointments, attendance at appointments with community-based organizations, and attendance at court hearings. Data on compliance of the relatively small number of families that completed the program prior to its termination reported it to be high across all locations, with 99% attendance at immigration court proceedings and 99% compliance with ICE monitoring requirements. About 4% of program participants absconded during the life of the program. In total, 65 families left the program: 7 were removed from the United States by ICE, 8 left the country on their own, 9 were granted some form of immigration relief, and 41 absconded. The rest of the families remained in the program; however, because of its short duration the ICE evaluation of the FCMP is limitedâthe majority of the participants were still in immigration proceedings when it was terminated. It is unknown what the program's success rates would have been if participants were allowed to remain in the program through the final outcome of their cases. When ICE discontinued the program in June 2017, the agency stated that rates of compliance for the FCMP were consistent with its other ATD program (i.e., ISAP III).Â  In addition to compliance rates, another important factor in evaluating the program is its cost. The FCMP cost approximately $38.47 per family per day in FY2016, versus approximately $4.40 per person per day for ISAP III. By comparison, family detention costs an estimated $237.60 per day and adult detention in the same cities that the FCMP operated in cost $79.57 on average per day in FY2016. The FCMP is more expensive than ISAP III due to the comprehensive case management and services available to its participants, the more vulnerable family populations targeted, and the smaller caseload per case manager (which allowed for more time with each participant household). For example, FCMP case managers were expected to have a high level of experience, used outreach (not just referrals) to connect participants with community resources, had Spanish language ability or accessed interpretation services, and developed individualized plans for families, including children. The evaluation indicated that FCMP families made use of the services offered to them: the most common referrals made by case workers were for legal services, medical attention, and food aid. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) includes $30.5 million to resume the FCMP. The conference report states that the FCMP \"can help improve compliance with immigration court obligations by helping families access community-based support of basic housing, healthcare, legal and educational needs.\" The conference report also directs ICE to prioritize the use of ATD programs, including the FCMP, for families. In addition, the report instructs ICE to brief the relevant committees, within 90 days of the date of enactment, on a plan for a program within the FCMP managed by nonprofit organizations that have experience in connecting families with community-based services. The ICE ERO Detention Management website mentions a new program, Extended Case Management Services (ECMS). It states, \"as instructed by Congress, ICE recently incorporated many of the Family Case Management Program (FCMP) principles into its traditional ATD program. These principles were incorporated into the current ATD ISAP III through a contract modification and are known as Extended Case Management Services (ECMS). These same services are available through the ECMS modification as they were available under FCMP with two distinct differences: ECMS is available in a higher number of locations and available at a fraction of the cost. While ECMS is a new program, ICE continues to identify and enroll eligible participants.\" As of June 22, 2019, ICE reported that 57 family units and 59 adults are enrolled in ECMS. Supporters of ATD programs cite several reasons for their use. First, the number of foreign nationals currently being taken into custody far exceeds the capacity of existing detention facilities. As noted above, in FY2018 the number of book-ins to ICE facilities was nearly 400,000. As of July 12, 2018, ICE's detention capacity was approximately 45,700 beds; of these, approximately 2,500 were for family units housed in family residential centers. Second, many foreign nationals who are in removal proceedings are not considered security or public safety threats, nor are they an enforcement priority as outlined in guidance to DHS personnel regarding immigration enforcement. Third, some foreign nationals who are found deportable or inadmissible may not be removed because their countries of citizenship refuse to confirm an individual's identity and nationality, issue travel documents, or otherwise accept their physical return. A U.S. Supreme Court ruling from 2001, Zadvydas v. Davis , limits the federal government's authority to indefinitely detain aliens who have been ordered removed and who have no significant likelihood of removal in the reasonably foreseeable future. Those who promote using ATD programs also cite the relatively low cost compared with detention. ICE spent an average of $137 per adult per day in detention nationwide in FY2018. The cost of enrolling foreign nationals in the ISAP III program depends on the method of management, but the average daily cost per participant in FY2018 (through July 2018) was $4.16. GAO utilized two methods of determining the cost of ATD (ISAP II) relative to detention in FY2013 (at that time, the average daily cost of ISAP II was $10.55, while daily detention was an average of $158). First, given the average daily costs of ATD and detention, and the average length of time an alien spent in detention awaiting an immigration judge's final decision, GAO found that the cost of maintaining an enrollee in ISAP II would surpass the costs of detention only if the enrollee were in the program for 1,229 days, which would be 846 days longer than the average number of days a participant typically spent in it. Second, given the average cost of ATD and detention, and the average length of time an alien spent in detention regardless of whether a final decision on her/his case was rendered, GAO determined an individual would have to spend, on average, 435 days in ISAP II before they exceeded the cost of the average length of detention (29 days in FY2013). There are also arguments against using ATD programs. Of primary concern is that the programs, in comparison to detention, create opportunities for aliens in removal proceedings to abscond and become part of the unauthorized population who are not allowed to lawfully live or work in the United States. Because immigration judges must prioritize detained cases, ATD enrollees must often wait several years before their cases are heard, during which time they may abscond. They may also fall out of contact with ERO for other reasons. For example, an alien may move within the United States and fail to provide updated contact information to ERO. If they do not receive communication from ICE or the immigration court system, they could miss court dates that have changed in the interim. If they fail to show up for a removal hearing, for example, they can be ordered removed in absentia , which would render them inadmissible for a certain period (at least 5 years if they are an arriving alien, and at least 10 years for all other aliens) and ineligible for certain forms of relief from removal for 10 years. Another concern is that asylum-seeking families are often placed into ATD, and this creates incentives for others to travel to the United States with children, request asylum, and receive similar conditions of release into the United States. DHS has expressed concern over adults using children as a \"human shields\" to avoid detention after illegally entering the United States. Those without bona fide family relationships may travel with children and file fraudulent claims or do harm to children. Recent reports of children being \"recycled\"âcrossing into the United States with an adult or a family, only to be returned across the border to travel with another migrantâhas prompted DHS to take biometric data, such as fingerprints, from children. Additional arguments against using ATD programs include that reliable measures of their effectiveness are limited, as discussed above in \" Evaluating ATD \" and \"Evaluating FCMP,\" and for the FCMP pilot, that the feasibility of scaling up a small pilot program to accommodate the large number of families requesting asylum remains an open question. ", "summary": "Since FY2004, Congress has appropriated funding to the Department of Homeland Security's (DHS's) Immigration and Customs Enforcement (ICE) for an Alternatives to Detention (ATD) program to provide supervised release and enhanced monitoring for a subset of foreign nationals subject to removal whom ICE has released into the United States. These aliens are not statutorily mandated to be in DHS custody, are not considered threats to public safety or national security, and have been released either on bond, their own recognizance, or parole pending a decision on whether they should be removed from the United States. Congressional interest in ATD has increased in recent years due to a number of factors. One factor is that ICE does not have the capacity to detain all foreign nationals who are apprehended and subject to removal, a total that reached nearly 400,000 in FY2018. (ICE reported an average daily population of 48,006 aliens in detention for FY2019, through June 22, 2019.) Other factors include recent shifts in the countries of origin of apprehended foreign nationals, increased numbers of migrants who are traveling with family members, the large number of aliens requesting asylum, and the growing backlog of cases in the immigration court system. Currently, ICE's Enforcement and Removal Operations (ERO) runs an ATD program called the Intensive Supervision Appearance Program III (ISAP III). On June 22, 2019, program enrollment included more than 100,000 foreign nationals, who are a subgroup of ICE's broader \"non-detained docket\" of approximately 3 million aliens. Those in the non-detained docket include individuals the government has exercised discretion to releaseâfor example, they are not considered a flight risk or there is a humanitarian reason for their release (as well as other reasons). (Others who are not detained include aliens in state or federal law enforcement custody and absconders with a final order of removal.) Individuals in the non-detained docket, and not enrolled in the ISAP III program, receive less-intensive supervision by ICE. Those in ISAP III are provided varying levels of case management through a combination of face-to-face and telephonic meetings, unannounced home visits, scheduled office visits, and court and meeting alerts. Participants may be enrolled in various technology-based monitoring services including telephonic reporting (TR), GPS monitoring (location tracking via ankle bracelets), or a recently introduced smart phone application (SmartLINK) that uses facial recognition to confirm identity as well as location monitoring via GPS. From January 2016 to June 2017, ICE also ran a community-based supervision pilot program for families with vulnerabilities not compatible with detention. The Family Case Management Program (FCMP) prioritized enrolling families with young children, pregnant or nursing women, individuals with medical or mental health considerations (including trauma), and victims of domestic violence. The program was designed to increase compliance with immigration obligations through a comprehensive case management strategy run by established community-based organizations. FCMP offered case management that included access to stabilization services (food, clothing, and medical services), obligatory legal orientation programing, and interactive and ongoing compliance monitoring. An ICE review of FCMP in March 2017 showed that the rates of compliance for the program were consistent with other ICE monitoring options. The program was discontinued due to its higher costs as compared to ISAP III. Even with the higher costs, there is considerable congressional interest in the effectiveness of FCMP as a way to maintain supervision for families waiting to proceed through the backlogged immigration court system. While DHS upholds that ISAP III is neither a removal program nor an effective substitute for detention, it notes that the program allows ICE to monitor some aliens released into communities more closely while their cases are being resolved. Supporters of ATD programs point to their lower costs compared to detention on a per day rate, and argue that they encourage compliance with court hearings and ICE check-ins. Proponents also mention the impracticalities of detaining the entire non-detained population of roughly 3 million aliens. The primary argument against ATD programs is that they create opportunities for participants to abscond (e.g., evade removal proceedings and/or orders). Other concerns include whether the existence of the programs provides incentives for foreign nationals to migrate to the United States with children to request asylum, in the hope that they will be allowed to reside in the country for several years while their cases proceed through the immigration court system, or that it provides incentivesâsuch as community releaseâfor adults without bona fide family relationships to travel with children and file fraudulent asylum claims or do children harm.", "document_type": "crs"}
{"report": "On March 13, 2020, President Donald J. Trump declared an emergency under Section 501(b) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act; 42 U.S.C. Â§5191(b)) in response to coronavirus disease 2019 (COVID-19). The President's emergency declaration authorized assistance for COVID-19 response efforts for all U.S. states, territories, tribes, and the District of Columbia in accordance with Stafford Act Section 502. The emergency declaration authorized the Federal Emergency Management Agency's (FEMA's) Public Assistance (PA) program, which provides direct and financial assistance for emergency protective measures. The President's March 13, 2020 emergency declaration letter to the Acting Secretary of the Department of Homeland Security, the Secretary of the Department of Treasury, the Secretary of the Department of Health and Human Services, and the Administrator of the Federal Emergency Management Agency, stated that the President \"believe[s] that the disaster is of such severity and magnitude nationwide that requests for a declaration of a major disaster ... may be appropriate.\" As of March 20, 2020, the President began approving major disaster declaration requests under the Stafford Act. As of April 22, 2020, the President had approved major disaster declaration requests for all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands. This report provides answers to frequently asked questions (FAQs) regarding: Stafford Act declarations, including legal authorities, limitations on assistance, and other information related to the declaration request process; types of assistance available to state, territorial, and tribal governments, private nonprofit organizations, private entities, and individuals and households pursuant to the Stafford Act emergency and major disaster declarations for COVID-19; the Disaster Relief Fund (DRF), the source of funding for the Stafford Act emergency and major disaster declarations; and additional references. The scope of this report is limited to assistance authorized under the Stafford Act. There are, however, other types of assistance extrinsic to the Stafford Act that are activated by a Stafford declaration. This report does not address these other forms of assistance. The Stafford Act authorizes the President to issue two types of declarations that could provide federal assistance to states and localities in response to a public health incident, such as an infectious disease outbreak: (1) an \"emergency declaration\" (authorized under Stafford Act Section 501), or (2) a \"major disaster declaration\" (authorized under Stafford Act Section 401). The following questions relate to the Stafford Act declarations for COVID-19. The President's emergency declaration authorized assistance for COVID-19 response efforts for all U.S. states, territories, tribes, and the District of Columbia; specifically, it authorized FEMA Public Assistance (PA) emergency protective measures. Thus, states, territories, and tribes do not need to request separate emergency declarations in addition to the President's emergency declaration. If, however, a state, territory, or tribe needs supplementary federal assistance, the governor or chief executive may request that the declaration be amended to include additional areas or types of assistance. FEMA can approve a request for additional areas or forms of assistance after a presidential emergency declaration. The assistance provided pursuant to an emergency declaration is limited (see Table 1 , which lists the forms of assistance available pursuant to each type of declaration). If a state, territory, or tribe needs assistance that is only available pursuant to a major disaster declaration, they may submit a major disaster declaration request to the President (through FEMA). Although the President can declare an emergency unilaterally in certain circumstances, a major disaster declaration would need to be requested by state, territory, or tribal governments (see \" Why didn't the President declare a national major disaster for COVID-19? \"). Section 501(b) of the Stafford Act allows the President to unilaterally declare an emergency for certain emergencies involving federal primary responsibility. The President's nationwide emergency declaration for COVID-19 was made under Stafford Act Section 501(b) on the grounds that the entire country is now facing a significant public health emergency ... [and] [o]nly the Federal Government can provide the necessary coordination to address a pandemic of this national size and scope.... It is the preeminent responsibility of the Federal Government to take action to stem a nationwide pandemic that has its origins abroad, which implicates its authority to regulate matters related to interstate matters and foreign commerce and to conduct the foreign relations of the United States. This is the first time a President has unilaterally declared a Stafford Act emergency for a public health incidentâspecifically, an infectious disease outbreak. Unilateral presidential declarations, however, have been made for incidents on a limited scale. Although Stafford Act Section 503 sets a statutory \"cap\" of $5 million on spending for a single emergency, there is an exception. The $5 million limit may be exceeded when the President determines that: (A) continued emergency assistance is immediately required; (B) there is a continuing and immediate risk to lives, property, public health or safety; and (C) necessary assistance will not otherwise be provided on a timely basis. If the $5 million \"cap\" is exceeded, the President must report to Congress on the \"nature and extent of emergency assistance requirements and shall propose additional legislation if necessary.\" Although the President's emergency declaration for COVID-19 covers the entire nation, each disaster-affected state and the District of Columbia, as well as some tribal governments, received a distinct emergency declaration (i.e., 57 separate emergency declarations). Therefore, it appears that each distinct emergency declaration may count as a \"single emergency\" for purposes of Stafford Act Section 503 and that the $5 million \"cap\" is not the nationwide limit on the amount of emergency assistance that FEMA can provide (see Appendix B for an example of a time when different states, territories, and tribes received presidential emergency declarations under the Stafford Act for the same incident). Major disaster declarations do not have a statutory or regulatory spending cap. As of April 22, 2020, all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands have received major disaster declarations for COVID-19. For more information on the funding available for the emergencies and major disasters declared for COVID-19, see the \" Funding for Stafford Act Declarations \" section. The federal assistance provided must respond to the effects of the incident warranting an emergency or major disaster declaration \"which took place during the incident period or was in anticipation of that incident.\" The emergency and major disaster declarations for COVID-19 currently list the incident period as \"January 20, 2020 and continuing.\" In previous ongoing disasters, the \"continuing\" incident period has changed to a set date marking the end of the emergency or major disaster. In the case of COVID-19, the incident period may vary for each state, territorial, and tribal government as the threat of COVID-19 abates. According to federal regulations, FEMA determines the incident period in the FEMA-State Agreement. In May 2016, the agency released a fact sheet on responding to an infectious disease event, which states, \"[i]n the event of an emergency declaration, FEMA would determine the incident period in coordination with HHS.\" The governor of each declared state or territory, or the chief executive for each declared Indian tribal government, must execute a FEMA-State Agreement in order to receive assistance pursuant to their COVID-19 emergency declaration. It is also possible to extend the incident period. Extensions of the incident period, and program extensions and end dates may be announced via news releases on FEMA's website. Stafford Act Section 401 states \"[a]ll requests for a declaration by the President that a major disaster exists shall be made by the Governor of the affected State\" or \"[t]he Chief Executive of an affected Indian tribal government may submit a request for a declaration by the President that a major disaster exists.... \" Although the President is not authorized by the Stafford Act to unilaterally declare a major disaster on behalf of a state, territory, or tribe, the President stated in his emergency declaration letter to the Acting Secretary of the Department of Homeland Security, the Secretary of the Department of Treasury, the Secretary of the Department of Health and Human Services, and the Administrator of the Federal Emergency Management Agency that he \"believe[s] that the disaster is of such severity and magnitude nationwide that requests for a declaration of a major disaster ... may be appropriate.\" As of March 20, 2020, the President began approving major disaster declaration requests under the Stafford Act. As of April 22, 2020, all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands have received major disaster declarations for COVID-19. The President started approving major disaster declaration requests for COVID-19 as of March 20, 2020. These declarations are the first major disaster declarations issued under the Stafford Act for an infectious disease outbreak. The State of New York was the first state to receive a major disaster declaration for COVID-19. According to FEMA's \"Daily Operations Briefing for Wednesday, March 18, 2020,\" New York requested a major disaster declaration on March 17, 2020. The President authorized New York's request on March 20, 2020. Other state requests for a major disaster for COVID-19 have also been processed within days of their submission. FEMA lists the approved presidential major disaster declarations for COVID-19 on the agency's \"COVID-19 Disaster Declarations\" and \"Disasters\" webpages. As of April 22, 2020, all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands have received major disaster declarations for COVID-19. Different types of federal assistance are available pursuant to each type of declaration, with emergency declarations providing more limited forms of assistance than major disaster declarations. Federal assistance made available pursuant to Stafford Act declarations is intended to supplement local efforts to respond to and recover from emergencies and major disasters. Federal assistance may support state, territorial, tribal, and local governments, certain nonprofit organizations, and individuals and households. Table 1 lists the forms of assistance available pursuant to each type of declaration. The following questions relate to the federal response efforts for COVID-19, including assistance available to state, territorial, tribal, and local governments, private nonprofit organizations, private entities, and individuals and households. Emergency declarations authorize some forms of Public Assistance (PA) and Individual Assistance (IA) but the assistance is generally more limited than assistance that is made available under a major disaster declaration. Table 1 lists the forms of assistance available pursuant to an emergency declaration. Emergency declarations often authorize certain forms of PA, which supplement the ability of a state, territory, or tribe to respond to an incident. Emergency declarations may authorize PA \"emergency work\" undertaken \"to save lives, protect property and public health and safety, and lessen or avert the threat of a catastrophe, including precautionary evacuations,\" per Section 502 of the Stafford Act. FEMA's two categories of PA \"emergency work\" are debris removal (Category A) and emergency protective measures (Category B). Stafford Act emergency declarations for public health incidents have previously authorized emergency protective measures undertaken to reduce an immediate threat to life, public health, or safety, including emergency shelter and medicine, hazard communication, and provision and distribution of necessities. Individual Assistance, which helps individuals and households respond to post-disaster needs, can also be made available through an emergency declaration. One form of IAâthe Individuals and Households Program (IHP) (authorized under Stafford Act Section 408) may be authorized pursuant to an emergency declaration. The emergency declarations issued for COVID-19 on March 13, 2020 authorized Public Assistance (PA) in accordance with Section 502 of the Stafford Act. Under this declaration, FEMA may reimburse states, tribes, and territories for costs incurred while performing emergency protective measures. Specifically, the COVID-19 emergency declarations authorized PA Category BâEmergency Protective Measures. States, territories, or tribes will be the PA grant Recipients and administer PA awards. State, territorial, and tribal governments that have received emergency or major disaster declarations may apply to FEMA for funds as PA grant Recipients. Local governments and certain nonprofit entities may apply for funds through the PA grant Recipient. Eligible applicants are to be reimbursed for 75% of eligible costs incurred while performing emergency protective measures. FEMA cannot provide financial assistance for activities that are covered by insurance, or any other source, including activities eligible for financial assistance from the Department of Health and Human Services (HHS). For example, PA applicants cannot receive reimbursement for COVID-19 public health surveillance work or other activities already funded by the HHS Public Health Emergency Preparedness Cooperation Agreement Program. Emergency protective measures encompass a wide range of activities. According to a FEMA news release on the COVID-19 emergency declaration , reimbursable activities may include \"activation of State Emergency Operations Centers, National Guard costs, law enforcement and other measures necessary to protect public health and safety.\" On March 19, 2020, FEMA released a non-exclusive list of eligible emergency protective measures that was later supplemented with a non-exclusive list of eligible emergency medical care. Under the Stafford Act, eligible private nonprofit organizations may receive reimbursement for costs incurred while performing eligible emergency protective measures through the PA program. For-profit entities are not eligible applicants for PA. President Trump's emergency declaration for COVID-19 authorized FEMA to reimburse state, territorial, tribal, and local government entities and certain nonprofit organizations (PNPs) for eligible costs incurred while performing emergency protective measures. Under the Stafford Act, certain PNPs may be eligible for PA if they provide \"critical services\" or non-critical, \"essential\" services available to the general public. PNPs providing critical services include educational, utility, irrigation, emergency, medical, rehabilitational, and temporary or permanent custodial care facilities. PNPs providing non-critical but essential services include, but are not limited to, community centers, libraries, homeless shelters, food banks, broadcasting facilities, houses of worship, senior citizen centers, rehabilitation facilities, and shelter workshops. Religiously affiliated PNPs must meet the same eligibility criteria as other PNPs. For-profit entities are not eligible to apply for reimbursement through the PA program. For-profit entities, however, may be eligible for COVID-19 assistance through the Small Business Administration (SBA). Eligible PA applicants and PA grant Recipients may also contract for-profit entities to perform emergency work. For example, FEMA specified that eligible governments \"may contract with medical providers, including private for-profit hospitals, to carry out any eligible activity described in the Eligible Emergency Medical Care Activitiesâ¦.\" FEMA may then reimburse PA grant Recipients for the federal share of eligible costs incurred during the execution of the work. PA grant Recipients may then reimburse PA Applicants for eligible associated costs. Individual Assistance (IA) was not authorized by the President's initial emergency declaration for COVID-19. However, IAâCrisis Counseling has been authorized for 10 states pursuant to their major disaster declarations for COVID-19 (for more information, see \" What assistance is available to individuals under a major disaster declaration? \"). Table A-1 includes a list of the categories of FEMA assistanceâincluding Crisis Counselingâauthorized pursuant to the major disaster declarations for COVID-19, organized by state and territory. As of March 30, 2020, Stafford Act declarations for COVID-19 authorized FEMA to reimburse only state, territorial, tribal, and local governments and eligible nonprofits for the cost of uninsured emergency medical care. No assistance for individuals' medical costs has been authorized. All major disaster and emergency declarations issued under the Stafford Act as of March 30, 2020, authorized PA Category BâEmergency Protective Measures, through which FEMA may reimburse eligible state, territorial, tribal, and local governmental entities and eligible private nonprofit entities for the cost of uninsured emergency medical care directly related to COVID-19. Per Stafford Act Section 312, FEMA may not duplicate assistance provided by other entities, including the Department of Health and Human Services (HHS) or private medical insurers. FEMA may only reimburse medical care that is required as a result of COVID-19, and that eliminates or lessens immediate threats to life, public health, or safety. Typically, emergency medical care costs are eligible for up to 30 days from the date of an emergency or major disaster declaration. In the case of COVID-19, eligible emergency medical care costs are \"eligible for the duration of the Public Health Emergency, as determined by HHS.\" However, the cost of long-term medical treatment is not eligible for reimbursement through PA, including the costs of medical care for COVID-19 patients admitted to a medical facility on an inpatient basis. Also not eligible are the costs of treatment for COVID-19 patients beyond the duration of the Public Health Emergency, and administrative costs associated with the treatment of COVID-19 patients. The HHS Secretary has invoked several public health emergency authorities for the COVID-19 response. Although FEMA's list of authorized medical care does not specify which public health emergency authority is meant in referring to the duration of eligibility, it probably refers to the declaration authority pursuant to Section 319 of the Public Health Service Act. The \"Section 319\" authority allows the HHS Secretary to carry out a specified set of actions to address public health emergencies, such as expediting or waiving certain administrative requirements that would otherwise apply to federal activities or federally administered grants. The declaration of a Public Health Emergency for COVID-19 was made on January 31, 2020. It is in effect for 90 days, and is expected by many to be renewed and remain in effect for the duration of the response. Table 3 includes the types of emergency medical care necessary to saves lives or protect public health and safety that are listed by FEMA as eligible for PA for COVID-19, as of March 31, 2020. FEMA may determine that other activities undertaken to reduce the threats to life, public health, or safety by COVID-19 are eligible emergency protective measures. To determine eligibility, FEMA's Regional Administrators may require that local, state, or federal officials certify that the work performed was necessary to cope with such threats. According to FEMA, all U.S. states, territories, and the District of Columbia, as well as tribes that have received independent emergency declarations for COVID-19, must execute a FEMA-State/Tribal/Territory Agreement (hereinafter FEMA-State Agreement), as appropriate, and execute an applicable emergency plan in order to receive FEMA assistance. FEMA-State Agreements state the understandings, terms, and commitments under which FEMA disaster assistance is to be provided. FEMA-State Agreements describe the emergency or disaster (incident), the incident period, the type and extent of assistance to be made available, the federal and nonfederal cost share, and other terms and conditions of the declaration and provision of assistance. The state, territory, or tribe with an emergency or major disaster declaration becomes the PA grant Recipient and administers PA awards within its jurisdiction. FEMA also requires an Application for Federal Assistance and an update of a Public Assistance Plan before it will provide assistance through the PA program. Recipients may register accounts for all PA Applicants on the PA Grants portal, a FEMA maintained database. Eligible PA Applicants within the jurisdiction may then apply for PA, and awarded projects are tracked in the PA grants database. FEMA has published guidance \"on the types of emergency protective measures that may be eligible under FEMA's Public Assistance Program in accordance with the COVID-19 Emergency Declaration in order to ensure that resource constraints do not inhibit efforts to respond to this unprecedented disaster.\" The list of eligible emergency protective measures is not exhaustive. Moreover, FEMA stated that In accordance with section 502 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 U.S.C. 5121-5207 (the \"Stafford Act\"), eligible emergency protective measures taken to respond to the COVID-19 emergency at the direction or guidance of public health officials may be reimbursed under Category B of FEMA's Public Assistance program. FEMA will not duplicate assistance provided by the U.S. Department of Health and Human Services (HHS), to include the Centers for Disease Control and Prevention (CDC), or other federal agencies. FEMA and PA grant Recipients (i.e., the state, territory, or tribe that administers the PA award) both review applications for Public Assistance to determine whether costs, work, and applicants are eligible to receive PA. FEMA may approve or decline requests for assistance (see Table 2 for a list of eligible emergency protective measures for COVID-19). FEMA regulations provide procedures by which an eligible PA Applicant, Subrecipient, or Recipient \"may appeal any determination previously made related to an application for or the provision of Federal assistance.\" PA for disposal of medical waste and interment of human remains is included in eligible work authorized for all jurisdictions under PA Category BâEmergency Protective Measures. In the case of COVID-19, FEMA introduced streamlined procedures in an effort to expedite the delivery of PA emergency assistance. According to FEMA, \"[f]unding is immediately available should state, tribal, territorial or local officials request expedited assistance.\" On March 21, 2020, FEMA reported that the agency had obligated over $100 million in 24 hours for awards authorized under the March 13, 2020 emergency declarations for COVID-19 authorized under the Stafford Act. Generally, the time elapsed during delivery of PA emergency assistance will vary by state, incident, applicant, and project. A number of different factors involved in the PA application and reimbursement process affect the delivery of PA. Relevant factors include, but are not limited to, the scope of the project and the time required for the performance of eligible work. FEMA may obligate and disburse funds for small projects (those up to $131,100 in FY2020) upon the approval of a project worksheet, the form FEMA uses to document the details of the Applicant's work and costs claimed. For large projects (those equal to or greater than $131,100 in FY2020), FEMA may obligate funds to the PA grant Recipient upon the approval of a project worksheet. Applicants may request reimbursement for work completed from the PA grant Recipient. After the President declares an emergency or major disaster, the governor or chief executive may request that the declaration be amended to include additional types of assistance. FEMA can approve such a request. It is not uncommon to authorize additional types of assistance subsequent to a presidential declaration. If FEMA denies a requested amendment, the governor or chief executive may appeal the decision in writing. The request and its justification must be submitted to the Assistant Administrator for the Disaster Assistance Directorate through the appropriate FEMA Regional Administrator for the FEMA region in which the state, territory, or tribe is located. The appeal is a \"one-time request for reconsideration\"âFEMA's determination on the appeal is final. The President has the authority to adjust the federal share of Public Assistance programs. The federal cost share may be increased at FEMA's recommendation when requested by a state, territory, or tribe. The federal share is set at 75% for eligible emergency protective measures performed by states pursuant to the Stafford Act declarations for COVID-19 (authorized under Stafford Act Section 502 for the emergency declarations, and Section 403 for the major disaster declarations). A state may also receive a loan or advance to cover the nonfederal share (i.e., the portion of the costs not borne by the federal government) in certain extraordinary situations. Specifically, Stafford Act Section 319 authorizes the President to either lend or advance the nonfederal share to an eligible Applicant or a state. This may be done whenâ (1) the State is unable to assume its financial responsibility under such cost-sharing provisionsâ (A) with respect to concurrent, multiple major disasters in a jurisdiction, or (B) after incurring extraordinary costs as a result of a particular disaster; and (2) the damages caused by such disasters or disaster are so overwhelming and severe that it is not possible for the applicant or the State to assume immediately their financial responsibility under this chapter. Any loan or advance must be repaid with interest. FEMA's regulations, as a condition for making such a loan, require that the state or eligible Applicant not be delinquent in payment of any debts to FEMA. If the governor's request for an advance is denied, the governor may appeal the decision in writing. As with other appeals of federal decisions regarding assistance provided pursuant to a disaster declaration, this is a one-time request for reconsideration. Congress has, on occasion, adjusted the federal share through legislation. For example, Section 4501 of the U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007 ( P.L. 110-28 ) authorized 100% federal share for Public Assistance and Individual Assistance for specific states following Hurricanes Katrina, Wilma, Dennis, and Rita. Different types of federal assistance are available pursuant to each type of declaration, with major disaster declarations providing more forms of assistance than emergency declarations. As of April 22, 2020, the President had approved major disaster declaration requests for all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands for COVID-19. The specific types of assistance that may be available under a major disaster declaration are listed in Table 1 . Additionally, Table 4 lists the categories of assistance and the Stafford Act section under which they are authorized. When the President makes a major disaster declaration under the Stafford Act, states, tribes, and local governments, as well as certain private nonprofit organizations, may receive reimbursement through Public Assistance (PA) for \"emergency work\" undertaken to save lives, protect property, public health, and safety, and lessen or avert the threat of a catastrophe, or for \"permanent work\" undertaken to repair, restore, reconstruct, or replace disaster-damaged public and eligible private nonprofit facilities. As noted previously, most assistance under the Stafford Act related to public health incidents has been delivered through PA Category BâEmergency Protective Measures, including emergency shelter and medicine, hazard communication, and provision and distribution of necessities. Individual Assistance (IA) provides aid to affected individuals and households. If a major disaster is declared, the forms of IA that may be authorized include assistance for housing and for other needs assistance through the Individuals and Households Program; crisis counseling; disaster unemployment assistance; disaster legal services; and disaster case management services. Additionally, pursuant to a major disaster declaration the Hazard Mitigation Grant Program (HMGP) may be authorized. The HMGP funds mitigation and resiliency projects, typically across the entire state or territory. State, territorial, tribal, and local governments, as well as certain private nonprofit organizations, may apply for measures that reduce loss of life or property in future disasters or emergencies. As of April 22, 2020, FEMA reported that all requests for Hazard Mitigation Assistance through the Hazard Mitigation Grant Program (HMGP) for COVID-19 are under review. Major disaster declarations issued as of April 22, 2020 for COVID-19 have all authorized Public Assistance (PA) Category BâEmergency Protective Measures. Major disaster declarations issued for some states also authorized Individual Assistance through the Crisis Counseling Program. Table A-1 includes a list of the categories of FEMA assistance authorized pursuant to the major disaster declarations for COVID-19, organized by state and territory. Major disaster declarations may authorize Hazard Mitigation Assistance through the Hazard Mitigation Grant Program (HMGP). As of April 22, 2020, FEMA reported that all requests for Hazard Mitigation Assistance through the Hazard Mitigation Grant Program (HMGP) for COVID-19 are under review. States, tribes, or territories may request that major disaster declarations be amended to include additional forms of assistance or increase the federal cost-share for PA above 75% (see \" Can declarations be amended to provide additional types of assistance? \" and \" Can the federal cost share be adjusted? \"). Certain private nonprofit organizations may be eligible for reimbursement for work performed for eligible emergency protective measures. Eligible PNPs may apply for PA as Applicants or may be contracted by other primary PA grant Recipients or Applicants to perform eligible work. Businesses are not eligible for assistance authorized under the Stafford Act. PNPs may be eligible for PA if they provide \"critical services\" or non-critical, \"essential\" services available to the general public. PNPs providing critical services include educational, utility, irrigation, emergency, medical, rehabilitational, and temporary or permanent custodial care facilities. PNPs providing non-critical but essential services include, but are not limited to, community centers, libraries, homeless shelters, food banks, broadcasting facilities, houses of worship, senior citizen centers, rehabilitation facilities, facilities that provide health and safety services of a governmental nature, and shelter workshops. Religiously affiliated PNPs are eligible but must meet the same eligibility criteria of other PNPs. For-profit entities are not eligible to apply directly for public assistance as authorized under the Stafford Act. However, eligible PA applicants and PA grant Recipients may contract with for-profit entities to perform emergency work. FEMA may then reimburse PA grant Recipients for the federal share of eligible costs incurred during the execution of the work, and PA grant Recipients may then reimburse PA Applicants for eligible associated costs. For-profit entities may also be eligible for SBA COVID-19 assistance. As of April 22, 2020, the FEMA Crisis Counseling Assistance and Training Program (CCP) is the only form of Individual Assistance that has been authorized for some states pursuant to their major disaster declarations for COVID-19. IA-CCP was not authorized for every state that received a major disaster declaration; nor were the territories of the Commonwealth of Puerto Rico, the U.S. Virgin Islands, American Samoa, the Commonwealth of the Northern Mariana Islands, or Guam authorized to receive IA-CCP. Table A-1 includes a list of the categories of FEMA assistance authorized pursuant to the major disaster declarations for COVID-19, organized by state and territory. The CCP provides financial assistance to state, territorial, tribal, and local government agencies through a grant or cooperative agreement, which allows them to either provide or contract for crisis counseling services. The crisis counseling services are intended to assist disaster survivors \"to prevent or mitigate adverse psychological effects caused or aggravated by a major disaster.\" FEMA operates the CCP with the Substance Abuse and Mental Health Services Administration (SAMHSA) within the Department of Health and Human Services (HHS). An emergency declaration or a major disaster declaration may be amended to allow for additional types of IA to be authorized (see Table 1 for a list of IA programs). The governor may request that the declaration be amended to include additional types of assistance. FEMA can approve a request for additional forms of assistance after a presidential declaration. If a governor of an affected state requested types of IA be authorized in their major disaster declaration request, and those forms of IA were not authorized, the governor may appeal the decision in writing (if a request to amend a declaration to add types of IA is denied, that decision may also be appealed). Although the CCP is the only form of IA authorized to date, individual relief has been provided through other sources. For example, the supplemental appropriations acts for COVID-19 address some of the other unmet needs of individuals (e.g., Section 2102 of the CARES Act ( P.L. 116-136 ) provides pandemic unemployment assistance). FEMA introduced procedures the agency says are designed to simplify the PA application process for COVID-19 response work. State, territories, and tribes that have received emergency declarations or major disaster declarations for COVID-19 are PA grant Recipients, which administer PA awards in their jurisdictions. Prior to receiving funding, PA grant Recipients must execute FEMA-State/Tribal/Territorial Agreements, submit federal grant applications, and update Recipient Public Assistance Administrative Plans (see \" What measures must states, tribes, and territories take before FEMA may provide assistance for COVID-19 within their jurisdictions? \"). Eligible applicants may apply for funding through the Recipient's PA award. FEMA generally refers to PA Applicants as any entity that is responsible for PA-eligible work. Applicants may be state, tribal, territorial, and local governments, as well as eligible private nonprofits. For example, the Texas Department of State Health Services applied for PA funds for COVID-19 response as a PA Applicant. Those funds were administered by the state of Texas as the PA grant Recipient. As the PA Recipient, the state of Texas also administered funds through its PA award for state and local PA Applicants including the Texas Division of Emergency Management, Harris County, and the Texas Military Department. To receive PA funds, Applicants may submit a request for grant funds, a project worksheet describing the details of the work and costs claimed, and supporting documentation though the PA Grants Portal. FEMA and the PA grant Recipient evaluate these documents for eligibility and reasonableness. Once a project worksheet is approved, Applicants may receive reimbursement for eligible costs incurred while executing eligible emergency protective measures. FEMA's fact sheet on PA Simplified Application procedures for COVID-19 notes that expedited assistance may be available in certain cases. When expedited assistance is approved for large projects (in FY2020, projects over $131,100), FEMA obligates 50% of the total expected costs as soon as the project worksheet is approved, and the PA Applicant may be reimbursed at that time. The remaining federal share may be reimbursed once the Applicant submits documentation of actual costs incurred while performing eligible work. FEMA has provided expedited PA for multiple COVID-19 response efforts. The FEMA Crisis Counseling Assistance and Training Program (CCP) is the only form of IA that has been authorized for some states, as of April 22, 2020 (see Table A-1 for the list of states that have been authorized for Crisis Counseling). FEMA operates the CCP with the Substance Abuse and Mental Health Services Administration (SAMHSA) within the Department of Health and Human Services (HHS). Local, state, territorial, or tribal governments may apply for a grant to administer the CCP, or may contract with local mental health service providers. The CCP supports crisis counseling services for disaster survivors, and disaster survivors receive the assistance for free. Generally, the CCP is designed to connect individuals with community resources. CCP services may be advertised to disaster survivors through media outlets, websites, community events, etc. If other forms of IA are authorized pursuant to a major disaster declaration for COVID-19, those assistance programs would include different application requirements and processes. For example, if the Individuals and Households Program (IHP) is authorized, applicants in a declared disaster area may register for FEMA IA and Small Business Administration (SBA) disaster loan assistance. Individuals and households can register for assistance online, by telephone, or in-person at a Disaster Recovery Center (DRC). Individuals and households generally have 60 days from the date of a declaration to apply for FEMA IHP assistance. The following questions relate to the funding sources for the federal assistance under the Stafford Act that may supplement state, tribal, and local response efforts for COVID-19. Many forms of assistance made available pursuant to a Stafford Act declaration are funded through the Disaster Relief Fund (DRF), which is the primary source of funding for the federal government's domestic general disaster relief programs. The DRF is managed by FEMA, but as a funding structure, it predates both FEMA and the Stafford Act, having first been funded in 1948. As a result of prior-year appropriations to fund long-term recovery work from previous disasters, the DRF had about $42.6 billion in unobligated balances as of the beginning of March 2020. Division B of the CARES Act ( P.L. 116-136 ), included $45 billion more for the DRF. This put the balance of funding in the DRF at its highest level in history. DRF resources are available for past, current, and future incidents. However, the majority of its funding is specifically set aside for the costs of major disasters. $41.6 billion of what was in the DRF was specifically for the costs of major disasters, and roughly $600 million was potentially available for emergencies. Of the funding provided in the CARES Act for the DRF, $25 billion was for major disasters and $15 billion was for any Stafford Act costs, including both emergency declarations and major disasters. It is not clear what the total draw on the DRF will be, since the pandemic is an evolving situation, there are other federal programs providing resources, and there is no precedent for using the Stafford Act to respond to a public health crisis. DRF appropriations are not provided for specific emergencies or disasters; there is no COVID-19 account within the DRF. The most recent iterations of the appropriations bill text for the DRF indicate the funds are provided for the \"necessary expenses in carrying out the Robert T. Stafford Disaster Relief and Emergency Assistance Act,\" thus covering all past and future disaster and emergency declarations. Previous versions of the appropriations language going back to 1950 also referenced the legislation authorizing general disaster relief rather than targeting specific disasters. On a number of occasions, specific disasters have been mentioned in the appropriation, but funding was not specifically directed to one disaster over others. While many disaster supplemental appropriations bills are associated with a specific incident or incidentsâsuch as P.L. 113-2 , \"the Sandy Supplemental\"âthe language in such acts does not limit the use of the supplemental appropriations to specific incidents. It provides funding \"for major disasters declared pursuant to the Robert T. Stafford Disaster Relief and Emergency Assistance Act.\" This is also the case with the funding provided in Division B of the CARES Act. The DRF supplemental appropriation itself includes no incident-specific direction, or reference to COVID-19. While one of the general provisions of the law states that the funds provided in the act \"may only be used to prevent, prepare for, and respond to coronavirus,\" the last subsection of that general provision indicates that restriction does not apply to the title that included the DRF appropriation. Additional sources of assistance may be available to support the nation's response to and recovery from the COVID-19 pandemic. CRS has developed products on various topics related to the COVID-19 pandemic, including global issues, public health, economic impacts on individuals, impacts on business and the U.S. economy, executive branch response, congressional response and legislation, and legal analysis. The CRS COVID-19 resources are available at https://www.crs.gov/resources/coronavirus-disease-2019 . Some select products CRS has developed related to the COVID-19 pandemic and Stafford Act assistance programs are included below. For more information on the President's declarations under the Stafford Act for COVID-19, see CRS Insight IN11264, Presidential Declarations of Emergency for COVID-19: NEA and Stafford Act , by L. Elaine Halchin and Elizabeth M. Webster; CRS Insight IN11251, The Stafford Act Emergency Declaration for COVID-19 , by Erica A. Lee, Bruce R. Lindsay, and Elizabeth M. Webster; and CRS Insight IN11229, Stafford Act Assistance for Public Health Incidents , by Bruce R. Lindsay and Erica A. Lee. Stafford Act major disaster declarations for COVID-19 will automatically authorize Small Business Administration (SBA) Economic Injury Disaster Loans (EIDL) for businesses in declared counties and contiguous counties. For more information, see CRS Report R46284, COVID-19 Relief Assistance to Small Businesses: Issues and Policy Options , by Robert Jay Dilger, Bruce R. Lindsay, and Sean Lowry For additional information about relief and assistance resources for small businesses, see CRS Insight IN11301, Small Businesses and COVID-19: Relief and Assistance Resources , by Maria Kreiser. For additional information about the actions taken by the U.S. federal government to quell the introduction and spread of COVID-19 in the United States, see CRS Report R46219, Overview of U.S. Domestic Response to Coronavirus Disease 2019 (COVID-19) , coordinated by Sarah A. Lister and Kavya Sekar. Appendix A. COVID-19 Approved Major Disaster Declarations and Authorized Assistance The following information is current as of April 22, 2020. Public Assistance Category BâEmergency Protective Measures has been authorized for all states and territories. Ten states have been authorized to receive Individual AssistanceâCrisis Counseling Assistance and Training Program (CCP) (referred to in Table A-1 as \"Crisis Counseling\"). Appendix B. Example of Emergency Declarations for the Same Incident Stafford Act emergencies have been declared for different states, territories, and tribes for the same incident. For example, the states of Florida, Georgia, South Carolina, and North Carolina, the U.S. Virgin Islands, and the Florida Seminole Tribe of Florida all received emergency declarations for Hurricane Dorian in 2019. The incident period and declaration date for the emergency declarations varied by state, territory, and tribe. This information is captured in Table B-1 .", "summary": "On March 13, 2020, President Donald J. Trump declared an emergency under Section 501(b) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act; 42 U.S.C. Â§Â§5121 et seq.) in response to coronavirus disease 2019 (COVID-19). The declaration authorized assistance to all U.S. states, territories, tribes, and the District of Columbia. Specifically, the Stafford Act emergency declaration authorized one form of Federal Emergency Management Agency (FEMA) assistance: Public Assistance emergency protective measures (as authorized under Stafford Act Section 502). Subsequently, the President approved major disaster declaration requests under the Stafford Act for all 50 states, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands (authorized under Stafford Act Section 401). This report provides answers to frequently asked questions (FAQs) regarding the Stafford Act disaster declarations made for COVID-19, federally available assistance, and sources of funding. The subjects to be covered include: Stafford Act declarations, including legal authorities, limitations on assistance, and other information related to the declaration request process; types of assistance available to state, territorial, and tribal governments, private nonprofit organizations, private entities, and individuals and households pursuant to the Stafford Act emergency and major disaster declarations for COVID-19; the Disaster Relief Fund (DRF), the source used to fund FEMA assistance provided pursuant to Stafford Act emergency and major disaster declarations; and additional references. This report also includes the following appendices: Appendix A includes Table A-1 , which lists the categories of FEMA assistance authorized pursuant to the major disaster declarations for COVID-19, organized by state and territory. Appendix B provides an example of different states, territories, and tribes that have received presidential emergency declarations under the Stafford Act for the same incident. The scope of this report is limited to assistance authorized under the Stafford Act. There are, however, other types of assistance extrinsic to the Stafford Act that are activated by a Stafford declaration. This report does not address these other forms of assistance. The report is not a comprehensive review of all potential forms of federal assistance made available for COVID-19 response and recovery. It does not provide information on the assistance made available pursuant to the President's declaration of emergency under the National Emergencies Act (NEA; 50 U.S.C. Â§Â§1601 et seq.) or the declaration by the Secretary of Health and Human Services (HHS) of a Public Health Emergency under Section 319 of the Public Health Service Act (PHSA; 42 U.S.C. Â§247d). Information included in this report is current as of April 22, 2020.", "document_type": "crs"}
{"report": "The United Kingdom's (UK's) exit from the European Union (EU), commonly termed Brexit , remains the overwhelmingly predominant issue in UK politics. In a national referendum held in June 2016, 52% of UK voters favored leaving the EU. In March 2017, the UK officially notified the EU of its intention to leave the bloc, and the UK and the EU began negotiations on the terms of the UK's withdrawal. Brexit was originally scheduled to occur on March 29, 2019, but the UK Parliament was unable to agree on a way forward due to divisions over what type of Brexit the UK should pursue and challenges related to the future of the border between Northern Ireland (part of the UK) and the Republic of Ireland (an EU member state). In early 2019, Parliament repeatedly rejected the withdrawal agreement negotiated between then-Prime Minister Theresa May's government and the EU, while also indicating opposition to a no-deal scenario, in which the UK would exit the EU without a negotiated withdrawal agreement. Amid this impasse, in April 2019, EU leaders agreed to grant the UK an extension until October 31, 2019. On October 17, 2019, negotiators from the EU and the government of UK Prime Minister Boris Johnson concluded a new withdrawal agreement, but Johnson encountered challenges in securing the UK Parliament's approval of the deal. The EU granted the UK another extension until January 31, 2020, while Parliament set an early general election for December 12, 2019. Johnson's Conservative Party scored a decisive victory in the election, winning 365 out of 650 seats in the UK House of Commons. The result provided Prime Minister Johnson with a mandate to proceed with his preferred plans for Brexit. The UK the EU ratified the withdrawal agreement in January 2020, and the UK withdrew from the EU on January 31, 2020. Brexit remains far from over, however, as the UK and the EU enter a process of determining the character of their future relationship. Many Members of Congress have a broad interest in Brexit. Brexit-related developments are likely to have implications for the global economy, U.S.-UK and U.S.-EU political and economic relations, and transatlantic cooperation on foreign policy and security issues. In 2018, the Administration formally notified Congress under Trade Promotion Authority (TPA) of its intent to launch U.S.-UK free trade agreement (FTA) negotiations after the UK leaves the EU, and Congress may consider how Brexit developments affect the prospects for an agreement. Whether a potential final agreement would meet congressional expectations or TPA requirements or be concluded as an executive agreement is unclear.Â Congress would likely need to pass legislation to implement the potential FTA before it could enter into force, particularly if it were a comprehensive FTA. U.S. Trade Representative Robert Lighthizer has said that trade negotiations with the UK are a \"priority\" and will start as soon as the UK is in a position to negotiate, but he cautioned that the negotiations may take time. Some Members of Congress also have demonstrated an interest in how Brexit might affect Northern Ireland. In April 2019, House Speaker Nancy Pelosi said there would be \"no chance whatsoever\" for a U.S.-UK trade agreement if Brexit were to weaken the Northern Ireland peace process. On October 22, 2019, the House Subcommittee on Europe, Eurasia, Energy, and the Environment held a hearing titled \"Protecting the Good Friday Agreement from Brexit.\" On December 3, 2020, the House passed H.Res. 585 , reaffirming support for the Good Friday Agreement in light of Brexit and asserting that any future U.S.-UK trade agreement and other U.S.-UK bilateral agreements must include conditions to uphold the peace accord. Other Members of Congress, including Senate Finance Committee Chairman Chuck Grassley, have expressed support for the UK and a bilateral trade agreement post-Brexit and have not conditioned such support on protecting Northern Ireland. The December 2019 election resolved a political deadlock that dominated UK politics for three and a half years. Unable to break the stalemate over Brexit in Parliament, Prime Minister Theresa May resigned as leader of the Conservative Party on June 7, 2019. Boris Johnson became prime minister on July 24, 2019, after winning the resulting Conservative Party leadership contest. Seen as a colorful and polarizing figure who was one of the leading voices in the campaign for the UK to leave the EU, Johnson previously served as UK foreign secretary in the May government from 2016 to 2018 and mayor of London from 2008 to 2016. He inherited a government in which, at the time, the Conservative Party held a one-seat parliamentary majority by virtue of support from the Democratic Unionist Party (DUP), the largest unionist party in Northern Ireland, which strongly supports Northern Ireland's continued integration as part of the UK. After taking office, Prime Minister Johnson announced that he intended to negotiate a new deal with the EU that discarded the contentious Northern Ireland backstop provision that would have kept the UK in the EU customs union until the two sides agreed on their future trade relationship. The backstop was intended to prevent a hard border with customs and security checks on the island of Ireland and to ensure that Brexit would not compromise the rules of the EU single market (see Appendix A , which reviews the backstop and the rejected withdrawal deal). Although Prime Minister Johnson asserted that he did not desire a hard land border, he strongly opposed the backstop arrangement. Like many Members of Parliament both within and outside the Conservative Party, Johnson viewed the backstop as potentially curbing the UK's sovereignty and limiting its ability to conclude free trade deals. Given initial skepticism about the chances for renegotiating the withdrawal agreement with the EU, the Johnson government began to ramp up preparations for a possible no-deal Brexit. In September 2019, Parliament passed legislation requiring the government to request a three-month deadline extension (through January 31, 2020) from the EU on October 19, 2019, unless the government had reached an agreement with the EU that Parliament had approved or received Parliament's approval to leave the EU without a withdrawal agreement. The government also lost its parliamentary majority in September 2019, with the defection of one Conservative Member of Parliament (MP) to the Liberal Democrats and the expulsion from the party of 21 Conservative MPs (10 of the 21 were later reinstated) who worked with the opposition parties to limit the government's ability to pursue a no-deal Brexit. Prime Minister Johnson subsequently sought to trigger an early general election, to take place before the October 31 Brexit deadline, but fell short of the needed two-thirds majority in Parliament to support the motion. On October 17, 2019, the European Council (the leaders of the EU27 countries) endorsed a new withdrawal agreement that negotiators from the European Commission and the UK government had reached earlier that day. The new agreement replicates most of the main elements from the original agreement reached in November 2018 between the EU and the government of then-Prime Minister Theresa May, including guarantees pertaining to citizens' rights, UK financial commitments to the EU, and a transition period lasting through 2020 (see Appendix A ). The main difference in the new withdrawal agreement compared to the November 2018 original is in the documents' respective Protocols on Ireland/Northern Ireland (i.e., the backstop). Under the new withdrawal agreement, Northern Ireland would remain legally in the UK customs territory but practically in the EU customs union, which essentially will create a customs border in the Irish Sea. Main elements of the new protocol include the following: Northern Ireland remains aligned with EU regulatory rules, thereby creating an all-island regulatory zone on the island of Ireland and eliminating the need for regulatory checks on trade in goods between Northern Ireland and Ireland; any physical checks necessary to ensure customs compliance are to be conducted at ports or points of entry away from the Northern Ireland-Ireland border, with no checks or infrastructure at this border; four years after the arrangement comes into force, the Northern Ireland Executive and Assembly must consent to renew it (this vote presumably would take place in late 2024 after the arrangement takes effect at the end of the transition period in December 2020); at the end of the transition period (the end of 2020), the entire UK, including Northern Ireland, will leave the EU customs union and conduct its own national trade policy. The changes were largely based on a proposal sent by Prime Minister Johnson to then-European Commission President Jean-Claude Juncker and facilitated by Johnson's subsequent discussions with Irish Prime Minister Leo Varadkar. Some analysts suggest the changes also resemble in part the \"Northern Ireland-only backstop\" initially proposed by the EU in early 2018. In the original agreement, the backstop provision was ultimately extended to the entire UK after Prime Minister May backed the DUP's adamant rejection of a Northern Ireland-only provision, which the DUP contended would create a regulatory barrier in the Irish Sea between Northern Ireland and the rest of the UK and thus would threaten the UK's constitutional integrity. The DUP also opposes the provisions for Northern Ireland in Johnson's renegotiated withdrawal agreement, especially the customs border in the Irish Sea, for similar reasons. Prime Minister Johnson hoped to hold a yes or no vote on the renegotiated withdrawal agreement by the extension deadline of October 19, but Parliament decided to delay the vote until it had passed the legislation necessary for implementing Brexit and giving legal effect to the withdrawal agreement and transition period (the Withdrawal Agreement Bill). Prime Minister Johnson had repeatedly asserted strong opposition to requesting another extension from the EU. As noted above, however, UK law required the government to request another extension from the EU on October 19, 2019, unless the UK and EU had reached a new withdrawal agreement and Parliament had approved that agreement or the UK government received Parliament's approval to leave the EU without a withdrawal agreement. Johnson accordingly sent the EU an unsigned request for an extension through January 2020 with a cover letter from the UK ambassador to the EU stating that the request was made in order to comply with UK law. Johnson also included a personal letter to then-European Council President Donald Tusk reiterating Johnson's view that a further extension would damage UK and EU interests and the UK-EU relationship. The EU granted the request on October 28, 2019 and extended the Brexit deadline until January 31, 2020. On October 29, 2019, Parliament agreed to set an early general election for December 12, 2019. Some commentators argued that since Prime Minister Johnson won the Conservative leadership contest in July 2019, his highest priority had been to spark a general election that returned him as prime minister. Many observers came to view a general election that produced a clear outcome as the best way to break the political deadlock over Brexit and provide a new mandate for the winner to pursue Brexit plans. With Brexit the defining issue of the campaign, the Conservative party won a decisive victory, winning 365 out of 650 seats in the House of Commons, an increase of 47 seats compared to the 2017 election (see Table 1 ). The opposition Labour Party, unable to present a clear alternative vision of Brexit to the electorate, and unable to gain sufficient traction with voters on issues beyond Brexit, suffered a substantial defeat with the loss of 59 seats. The Scottish National Party gained 13 seats to hold 48 of the 59 constituencies in Scotland, likely indicating a resurgence of the pro-independence movement in Scotland, where more than 60% of 2016 referendum voters had supported remaining in the EU. The election outcome put the UK on course to withdraw as a member of the EU by the January 31, 2020, deadline. After the election, the UK government introduced a revised Withdrawal Agreement Bill, which became law on January 23, 2020. The UK government subsequently ratified the withdrawal agreement. The European Parliament voted its consent to the agreement on January 29, 2020, and the Council of the EU completed the EU's ratification the following day. On January 31, 2020, the UK concluded its 47-year membership in the EU. With the UK's formal exit, an 11-month transition period began, during which the UK is expected to continue following all EU rules and remain a member of the EU single market and customs union. The withdrawal agreement allows for a one- or two-year extension of the transition period, but Prime Minister Johnson has strongly opposed the idea of an extension and inserted language in the Withdrawal Agreement Bill that the transition period will conclude at the end of 2020 without an extension. The UK intends to begin negotiations on an FTA with the EU, with the aim of concluding an agreement by the end of the transition period. Should the transition period end without a UK-EU FTA or other agreement on the future economic relationship, UK-EU trade and economic relations would be governed by World Trade Organization (WTO) rules (see \" Scenarios for UK-EU Trade Relationship Post-Brexit \" below). Such an outcome could resemble many aspects of a no-deal Brexit (see \"No-Deal Brexit\" text box below). Beyond trade, negotiations on the future UK-EU relationship are expected to seek a comprehensive partnership covering issues including security, foreign policy, energy, and data sharing. Negotiations are also expected to address the numerous other areas related to the broader economic relationship, such as financial services regulation, environmental and social standards, transportation, and aviation. Officials and analysts have expressed doubts that such comprehensive negotiations can be concluded within 11 months. The two sides could temporarily address some areas, such as road transportation and aviation, through side deals granting interim provisions. The provisions of the revised protocol on Ireland/Northern Ireland are expected to take effect at the end of the transition period. Observers have questioned how exactly the revised protocol will be implemented, including where and how customs checks will take place. Such issues are to be decided by the Joint Committee (of UK and EU officials) during the transition period. Implementation is likely to remain a work in progress. Both parties seek to protect the Good Friday Agreement, while the EU seeks to safeguard its single market and the UK seeks to preserve its constitutional integrity. Brexit casts great uncertainty over the future UK-EU trade relationship. In 2018, the UK was the second largest economy of the EU28, comprising 15.2% of the bloc's gross domestic product (GDP); Germany comprised 21.0% of the EU's GDP. The EU as a bloc is the UK's largest trading partner; by country, the United States is its largest (see Figure 1 ). While UK trade with other countries, such as China, has risen in recent years, the EU remains the UK's most consequential trading partner. UK-EU trade is highly integrated through supply chains and trade in services, as well as through foreign affiliate activity of EU and UK multinational companies. Within the EU, the largest goods and services trading partners for the UK are Germany, the Netherlands, France, Ireland, and Spain. (See \" Implications for U.S.-UK Relations \" section for discussion of U.S.-UK trade.) As a member of the EU, the UK's trade policy was determined by the EU, which has exclusive competence for trade policy for EU member states. UK-EU trading arrangements largely continue to apply during the transition period. Thus, the UK remains in the EU customs union, which makes trade in goods between the UK and other EU members tariff-free and binds the UK to the EU's common external tariff, which the UK and other EU member states apply to goods imported from outside the customs union. During the transition period, the UK also remains a part of the more than 40 preferential trade agreements that the EU has with about 70 countries. In addition, during the transition period, the UK also remains a part of the EU single market, which provides for the free movement of goods, services, capital, and people. The single market is underpinned by common rules, regulations, and standards that aim to reduce and eliminate nontariff barriers. Such barriers may stem, for instance, from diverging or duplicative production standards, labeling rules, and licensing requirements. Goods move freely in the single market, tariff-free, and generally are not subject to customs procedures. A product imported into the single market currently faces the common external tariff; once inside the single market, the product does not face additional tariffs regardless of its origin if exported to another EU member state. The single market provides businesses inside the EU with the ability to sell goods and services across the EU more freely. The single market is more developed for goods than for services, but it still offers some significant market access for services. For instance, under the single market, banks and other financial services firms that are established and authorized in one EU member state can apply for the right to provide certain defined services throughout the EU or to open branches in other countries with relatively few additional requirements (known as passporting rights ). Among other things, professionals in an EU member state also can move freely to another EU member state, benefitting from mutual recognition of professional qualifications across EU member states. Following the December 2019 election and the UK's withdrawal from the EU on J anuary 31, 2020, the UK and EU seek to negotiate an FTA to govern their future trade and economic relationship. Whether or not an FTA is concluded, the UK likely will no longer be part of the EU single market and customs union at the end of the ensuing transition period, currently expected to last to the end of 2020. The political declaration attached to the withdrawal agreement envisions \"an ambitious, broad, deep, and flexible partnership across trade and economic cooperation with a comprehensive and balanced Free Trade Agreement at its core.\" The Johnson government seeks to negotiate a \"best in class\" trade deal with the EU. EU FTAs have varied in their scope of trade liberalization and rules-setting. Draft EU negotiating directives for a trade agreement with the UK include tariff- and quota-free trade on goods and cover a range of sectors, including services trade, digital trade, intellectual property rights (IPR), government procurement, and regulatory cooperation. The EU offer is conditional on commitments to ensure a \"level playing field\" in relation to state aid, labor and environmental protections, and taxation agreements. The UK, however, may seek to diverge from EU rules and regulations, allowing for more flexibility in its trade negotiations with the United States and other countries. The Johnson government aims to conclude that deal by the end of the transition period. European Commission President Ursula von der Leyen has said that the timetable was \"extremely challenging\" and negotiators would do their best in the \"very little time\" available. EU officials have warned that such a timetable will constrain the scope of the talks. Many analysts are skeptical that an ambitious trade agreement can be negotiated and approved by the EU and UK governments by the end of the transition period. Some past EU trade agreement negotiations have been lengthy. For instance, EU negotiations with Canada and Japan took, respectively, seven and four years. Advocates of a soft Brexit argued that the UK should maintain close economic and trade ties with the EU by remaining a member of the EU customs union or developing another customs arrangement with the EU. A customs union would afford the UK closer economic ties with the EU but would limit the UK's control over its trade policy. The UK could negotiate with other countries on issues outside of the customs union (e.g., services, government procurement, or IPR), but it would have limited negotiating scope, since alignment with the EU would be a condition of being in the customs union. A customs union also could limit UK trade policy in terms of applying trade remedies or developing country preference programs. Under the withdrawal agreement, the UK is expected leave the EU customs union at the end of the transition period, and the result of the December 2019 UK general election and recent UK official statements makes a future customs union arrangement between the UK and the EU unlikely. The Johnson government opposes any form of soft Brexit, given that such models would force the UK to abide by EU rules and regulations and limit the UK's ability to conduct an independent trade policy. If the UK is no longer part of the EU customs union, it would regain control over its national trade policy and be free to negotiate its own free trade agreements with other countries, a key rationale for many Brexit supporters. If the post-Brexit transition period ends without the conclusion of a trade deal or customs union arrangement with the EU, the UK would no longer have preferential access to the EU market and WTO terms would govern the UK-EU trade relationship (see \"United Kingdom, European Union, and the World Trade Organization\" text box). Trade between the UK and the EU would no longer be tariff free, and nontariff barriers such as new customs procedures would arise, adding costs to doing business (see below). The precise impact of Brexit on UK trade with the EU and the UK economy depends to a large degree on the shape of the future UK-EU relationship, and the UK's ability to conclude other new trade deals. In most scenarios, Brexit would raise the costs of UK trade with the EU through higher tariffs and nontariff barriers. Costs may be greater in the short term, until commercial disruptions are smoothed out. Costs may be mitigated to some degree if the two sides reach a free trade agreement, although this may take years. New trade deals signed by the UK with countries outside of the EU could boost economic growth, but they may not be by enough to offset the loss of the UK's membership in the EU single market. Some of the higher costs of commerce may be passed to consumers. As noted earlier, WTO terms would govern UK-EU trade if the transition period ends without a trade deal. EU average most-favored-nation (MFN) tariff rates are low (around 5%) but significantly higher for certain products. Because of the tight linkages in UK-EU trade, higher tariffs would raise the costs of trade not only for final goods but also for intermediate goods traded between UK and EU member states as part of production and supply chains. UK sectors that may be particularly affected by increased tariffs include agriculture and manufacturing sectors (processed food products, apparel, leather products, and motor vehicles). UK importers may face higher costs, as the UK may impose its own MFN-level tariffs on imports from the EU. Should the UK and EU negotiate a preferential trading arrangement, it likely would not lead to an elimination of all tariffs. In addition, exporters on both sides would have to certify the origin of their traded goods in order to satisfy \"rules of origin\" to receive the preferential market access. Brexit makes the UK a \"third country\" from the EU's perspective, and the UK's regulatory frameworksâalthough currently aligned with those of the EUâwill no longer be recognized by the EU after the transition period. The EU will have to make determinations on whether measures of the UK comply with the corresponding EU regulatory framework. Some observers question the extent to which the Johnson government is willing to maintain regulatory alignment with the EU, and this issue is expected to pose a key challenge in negotiations with the EU on future trade relations. New administrative and customs procedures could apply to UK-EU trade. UK trade with the EU could face new licensing requirements, testing requirements, customs controls, and marketing authorizations. For instance, by some estimates, delays caused by customs checks of trucks from the EU could cause a 17-mile queue at the Port of Dover. Â Such potential backlogs have raised concerns about spoiling or shortage of foods and medicines and complications for industries that depend on \"just-in-time\" productions such as autos. Many businesses in the UK have been preparing for Brexit through such measures as stockpiling inventories, adjusting contract terms, restructuring operations, and shifting assets abroad. Some companies, particularly smaller companies, may not be as equipped as their larger competitors to deal with the transition. UK businesses also remain concerned about the potential effects of a no-deal scenario should the UK and EU fail to reach agreement on a future trade relationship by the end of 2020 without an extension of the transition period. Certain sectors of the UK economy may be particularly affected by Brexit. Examples include Autos. The EU is the UK's largest trading partner for motor vehicles, accounting for 43% of UK exports and 83% of UK imports in these products in 2018. The EU also comprises the majority of UK trade in auto component parts and accessories. The UK automobile sector thrives on the sort of \"just-in-time production\" that depends on a free flow of trade in component parts. If a no-deal scenario unfolded at the end of the transition period, UK auto exports to the EU would face a 10% tariff. Autos are a highly regulated industry, and UK and EU exporters would face new checks for safety and quality standards to obtain approval in the other's market. Chemicals. About 60% of UK chemicals exports are to the EU, and about 73% of UK chemicals imports are from the EU. Chemicals trade in the single market is governed by a European Economic Area (EEA) regulatory framework known as REACH (Registration, Evaluation, Authorisation and Restriction of Chemicals Regulation). UK chemicals exports to the EU could face tariffs of up to 6.5% in the absence of a preferential trade arrangement with the EU. Without a deal, UK chemicals registrations under REACH would become void with Brexit and UK companies would have to transfer their registrations to an EEA-based subsidiary or representative to maintain market access. The UK also would need to set up its own regulatory regime for chemicals. Financial S ervices. London is the largest financial center in Europe presently. Financial services and insurance make up about one-third of UK services exports to the EU. The EU has made clear that the UK will no longer be able to benefit from financial passporting after the transition period. Absent alternative arrangements, such as an equivalence decision by the EU, continued trade in financial services may require UK and EU businesses to restructure their operations. Even with a positive determination, the EU could revoke equivalence at any time. U.S. and other banks are concerned about losing the ability to use their UK bases to access EU markets without establishing legally separate subsidiaries. Some financial institutions, such as Goldman Sachs, J.P. Morgan, Morgan Stanley, and Citigroup, have shifted (or plan to shift) some jobs and assets from London to other European cities, such as Amsterdam, Dublin, Frankfurt, and Paris. By one estimate, financial companies have already committed to moving over Â£1 trillion in assets from the UK to other parts of the EU as part of Brexit contingency planning. Business S ervices. The EU is the largest export market for a range of UK business services (legal, accounting, advertising, research and development, architectural, engineering, and other professional and technical services)âaccounting for 39% of these exports from the UK. Determinations of professional certification qualifications may need to be made. Data F lows. Cross-border data flows underpin much of UK-EU services trade. Although UK regulatory frameworks are currently aligned with those of the EU on data protection and data flows, after the transition period, the EU will have to make determinations on UK compliance with the EU regulatory frameworks, such regarding whether UK standards for protecting personal data meet EU standards under the EU General Data Protection Regulation. The potential blockage of data transfers could have serious implications for UK companies seeking to transfer personal data out of the EUâincluding not only technology companies but also health care companies and other service providers. Since the referendum, the UK government has championed a notion of \"Global Britain,\" previously under the May government and now under the Johnson government. The idea of Global Britain promotes the UK's renewed engagement in a wide range of foreign policy and international issues, with trade a significant aspect of the broader concept; Global Britain envisages, among other things, an outward looking UK strengthening trade linkages around the world. For Brexit supporters, a major rationale was for the UK to regain a fully independent trade policy, which would allow the UK to tailor agreements to its specific interests. At the same time, the UK will have less leverage in trade negotiations compared to when negotiating as a part of the EU, given the UK's economic size relative to the EU bloc. Seeking continuity in its trade ties after Brexit, the UK is acting on a number of fronts. Among other things, the UK is N egotiating its own WTO schedule of commitments on goods, services, and agriculture. A s chedule of commitments refers to the commitments that WTO members make to all other WTO members on the nondiscriminatory market access (i.e., \"most-favored-nation,\" or MFN, access) they will provide for trade in goods, services, agriculture, and government procurement. Although the UK is a WTO member in its own right, it does not have an independent schedule of commitments, as the EU schedule applies to all EU members, including the UK. Outside of the EU, the UK will need to have its own schedule on the market access commitments to other WTO members. In some cases, the UK may be able to replicate the EU schedule; other cases may be more complex. For example, developing the UK's agricultural schedule involves reallocation of EU and UK tariff-rate quotas such as beef, poultry, dairy, cereals, rice, sugar, fruits, and other vegetables. The EU and UK have engaged in bilateral discussions on apportioning the tariff-rate quotas; some WTO members, including the United States, have raised concerns that the UK-EU approach could reduce the level and quality of their access to UK and EU markets. During the transition period, the UK continues to apply to the EU schedule. In other developments, parties to the WTO Government Procurement Agreement (GPA) have agreed to the UK's continued participation in the GPA in principle; the UK has delayed submitting its instrument of accession for the GPA. Working to replicate existing EU deals with non-EU countries. The UK was a part of over 40 trade agreements with around 70 countries by virtue of its membership in the EU. Unless it makes other arrangements, the UK will lose its preferential access to these markets after the transition period. To avoid this outcome, the UK has been working to replicate the EU's trade agreements with other countries. According to the UK government, UK trade with countries with which the UK seeks to conclude continuity agreements accounted for 11.1% of total UK trade in goods and services in 2018. As of December 4, 2019, the UK has signed 20 \"continuity\" deals, accounting for about 8.3% of total UK trade; these deals cover around 50 countries or territories, including Switzerland, Liechtenstein, Iceland, Norway, and South Korea. Negotiating sector-specific regulatory agreements. The UK is negotiating mutual recognition agreements (MRAs) to assure continued acceptance by UK and partner country regulators of each other's product testing and inspections in certain sectors. The UK government has signed MRAs with Australia, New Zealand, and the United States. Discussions between the UK and Japan on an MRA are ongoing. Taking steps to pursue a range of new trade deals once outside of the EU. In addition to the United States, potential countries that the UK has identified as of interest for negotiating new trade deals include Australia, China, India, and New Zealand. A new priority for the UK is signing an FTA with Japan, with whom the EU already has an FTA. Rather than \"rolling over\" the EU-Japan FTA, Japan seeks to negotiate new terms with the UK. Japan is one of the UK's largest investors, with major carmakers such as Nissan, Toyota, and Honda operating auto-manufacturing factories in the UK. In the 2016 Brexit referendum, Northern Ireland voted 56% to 44% against leaving the EU. Brexit poses considerable challenges for Northern Ireland, with potential implications for its peace process, economy, and, in the longer term, constitutional status in the UK. Following Brexit, Northern Ireland is the only part of the UK to share a land border with an EU member state (see Figure 2 ). Preventing a hard border on the island of Ireland (with customs checks and physical infrastructure) was a key goal, and a major stumbling block, in negotiating and finalizing the UK's withdrawal agreement with the EU. Northern Ireland's history of political violence complicated arrangements for the post-Brexit border between Northern Ireland and the Republic of Ireland. Roughly 3,500 people died during \"the Troubles,\" Northern Ireland's 30-year sectarian conflict (1969 to 1999) between unionists (Protestants who largely define themselves as British and support remaining part of the UK) and nationalists (Catholics who consider themselves Irish and may desire a united Ireland). At the time of the 1998 peace accord in Northern Ireland (known as the Good Friday Agreement or the Belfast Agreement), the EU membership of both the UK and the Republic of Ireland was regarded as essential to underpinning the political settlement by providing a common European identity for both unionists and nationalists in Northern Ireland. EU law also provided a supporting framework for guaranteeing the human rights, equality, and nondiscrimination provisions of the peace accord. Since 1998, as security checkpoints were dismantled in accordance with the peace agreement, and because both the UK and Ireland belonged to the EU's single market and customs union, the circuitous 300-mile land border between Northern Ireland and Ireland effectively disappeared. The border's disappearance served as an important political and psychological symbol on both sides of the sectarian divide and helped produce a dynamic cross-border economy. Many experts deem an open, invisible border as crucial to a still-fragile peace process, in which deep divisions and a lack of trust persist. Some analysts suggest that differences over Brexit also heightened tensions between the unionist and nationalist communities' respective political parties and stymied the reestablishment of the regional (or devolved) government for close to three years following the last legislative assembly elections in March 2017. (For more background, see Appendix B .) Many on both sides of Northern Ireland's sectarian divide expressed deep concern that Brexit could lead to a return of a hard border with the Republic of Ireland and destabilize the peace process. Police officials warned that a hard border post-Brexit could pose considerable security risks. During the Troubles, the border regions were considered \"bandit country,\" with smugglers and gunrunners. Checkpoints were frequently the site of conflict, especially between British soldiers and militant nationalist groups (or republicans ), such as the Irish Republican Army (IRA), that sought to achieve a united Ireland through force. Militant unionist groups (or loyalists ) were also active during the Troubles. Security assessments suggested that if border or customs posts were reinstated, violent dissident groups opposed to the peace process would view such infrastructure as targets, endangering the lives of police and customs officers and threatening the security and stability of the border regions. Some experts feared that any such violence could lead to a remilitarization of the border and that the violence could spread beyond the border regions. Many observers note a slight uptick in dissident republican activity over the last year, especially in border regions, as groups such as the New IRA and the Continuity IRA sought to exploit the stalemates over both Northern Ireland's devolved government and Brexit. Violence has been directed in particular at police officers (long regarded by dissident republicans as legitimate targets), and several failed bombings were attempted in border areas (especially Londonderry/Derry, a key flashpoint during the Troubles). Many in Northern Ireland and Ireland also were eager to maintain an open border to ensure \"frictionless\" trade, safeguard the north-south economy, and protect community relations. Furthering Northern Ireland's economic development and prosperity is regarded as crucial to helping ensure a lasting peace in Northern Ireland. Establishing customs checkpoints would pose logistical difficulties, and many people in the border communities worried that any hardening of the border could affect daily travel across the border to work, shop, or visit family and friends. Estimates suggest there are roughly 208 public road crossings along the border and nearly 300 crossing points when private roads and other unmarked access points are included. Some roads cross the border multiple times, and the border splits other roads down the center. Only a fraction of crossing points were open during the Troubles, and hour-long delays due to security measures and bureaucratic hurdles were common. Since the Brexit referendum in 2016, UK, Irish, and EU leaders asserted repeatedly that they did not want a hard border and worked to prevent such a possibility. In the initial December 2017 UK-EU agreement setting out the main principles for the withdrawal negotiations, the UK pledged to uphold the Good Friday Agreement, avoid a hard border (including customs controls and any physical infrastructure), and protect north-south cooperation on the island of Ireland. Analysts contend, however, that reaching agreement on a mechanism to ensure an open border was complicated by the UK government's pursuit of a largely hard Brexit, which would keep the UK outside of the EU's single market and customs union. As noted previously, the backstop emerged as the primary sticking point in gaining the UK Parliament's approval of former Prime Minister May's draft withdrawal agreement in the first half of 2019. Prime Minister Johnson opposed the backstop but also asserted a desire to avoid a hard border on the island of Ireland. Some advocates of a hard Brexit contended that security concerns about the border were exaggerated and that the border issue was being exploited by the EU and those in the UK who would have preferred a soft Brexit, in which the UK remained inside the EU single market and/or customs union. The Good Friday Agreement commits the UK to normalizing security arrangements, including the removal of security installations \"consistent with the level of threat,\" but does not explicitly require an open border. The Irish government and many in Northern Irelandâas well as most UK government officialsâargued that an open border had become intrinsic to peace and to ensuring the fulfillment of provisions in the Good Friday Agreement that call for north-south cooperation on cross-border issues (including transport, agriculture, and the environment). Some advocates of a hard Brexit, frustrated by the Irish border question, ruminated on whether the Good Friday Agreement had outlived its usefulness, especially in light of the stalemate in reestablishing Northern Ireland's devolved government. Both the May and Johnson governments continued to assert that the UK remains committed to upholding the 1998 accord. In light of Johnson's victory with a decisive Conservative majority in the December 2019 elections and Parliament's subsequent approval of the renegotiated withdrawal agreement, concerns have largely receded about a hard border developing on the island of Ireland. Uncertainty persists about what the overall UK-EU future relationshipâincluding with respect to tradeâwill look like post-Brexit and whether the two sides can reach an agreement by the end of the transition period. However, unlike with the previous backstop arrangement, the provisions related to the Northern Ireland border are not expected to change pending the outcome of the UK-EU negotiations on its future relationship. A former UK official notes that the Johnson government \"claims they have got rid of the backstop but in fact, have transformed it from a fallback into the definitive future arrangement for Northern Ireland\" that would effectively leave Northern Ireland in the EU's single market and customs union. Prolongation of the post-Brexit arrangements for Northern Ireland will be subject to the consent of the Northern Ireland Assembly in 2024 but is not contingent upon the conclusion of a broader UK-EU agreement by the end of the transition period in December 2020. At the same time, many of the details related to how the post-Brexit regulatory and customs arrangements for Northern Ireland will work in practice must still be fleshed out by UK and EU negotiators during the transition period, and Brexit has further exacerbated political and societal divisions in Northern Ireland. As noted previously, the DUP opposed the Northern Ireland provisions in the renegotiated withdrawal agreement because it viewed them as treating Northern Ireland differently from the rest of the UK and undermining the union. In light of the Conservative Party's large majority following the December 2019 elections, however, the DUP lost political influence in the UK Parliament and was unable to block approval of the renegotiated withdrawal agreement. Many in the DUP and other unionists feel abandoned by Prime Minister Johnson's renegotiated withdrawal agreement. Amid ongoing demographic, societal, and economic changes in Northern Ireland that predate Brexit, experts note that some in the unionist community perceive a loss in unionist traditions and dominance in Northern Ireland. Some analysts suggest that the new post-Brexit border and customs arrangements for Northern Ireland could enhance this existing sense of unionist disenfranchisement, especially if Northern Ireland is drawn closer to the Republic of Ireland's economic orbit in practice post-Brexit. Such unionist unease in turn could intensify frictions and political instability in Northern Ireland; observers also worry that heightened unionist frustration could prompt a resurgence in loyalist violence post-Brexit. Some experts have expressed concerns about the potential for a hard border on the island of Ireland in the longer term should Northern Ireland's Assembly fail to renew the post-Brexit arrangements that would keep Northern Ireland aligned with EU regulatory and customs rules. Although many view this scenario as unlikely given that pro-EU parties hold a majority in the Assembly (and this appears unlikely to change in the near future), in such an event, the UK and the EU would need to agree on a new set of provisions to keep the border open. The DUP also argues that by allowing the Assembly to give consent to the border arrangements for an additional four years through a simple majority, the renegotiated withdrawal agreement undermines the Good Friday Agreement, which requires major Assembly decisions to receive cross-community support (i.e., a majority on each side of the unionist-nationalist divide). Some commentators believe the 2019 UK election resultsâin which the DUP lost two seats in the UK Parliament, unionists no longer hold a majority of Northern Ireland's 18 seats in Parliament, and DUP votes were no longer crucial to Prime Minister Johnson's ability to secure approval of the withdrawal agreementâhelped improve the prospects for reestablishing Northern Ireland's devolved government. A functioning devolved government appeared to offer the DUP the best opportunity to ensure it has a voice in implementing the new border and customs arrangements for Northern Ireland and in the upcoming negotiations on the future political and trade relationship between the UK and the EU. On December 16, 2019, the UK and Irish governments launched a new round of talks with the main Northern Ireland political parties aimed at reestablishing the devolved government. On January 10, 2020, the DUP and Sinn Fein agreed to a deal to restore the devolved government put forward by the UK and Irish governments. The new Assembly convened the following day. The power-sharing deal addresses a number of key issues, including use of the Irish language, and promises additional UK financial support for Northern Ireland. The deal also calls for Northern Ireland's Executive, led by DUP First Minister Arlene Foster and Sinn Fein Deputy First Minister Michelle O'Neill, to establish a Brexit subcommittee to assess Brexit's implications for Northern Ireland. In addition, it reaffirms the UK government's commitment to including Northern Ireland Executive representatives in upcoming UK-EU Joint Committee meetings that will seek to implement the agreed arrangements for Northern Ireland post-Brexit. Many experts contend that Brexit could have serious negative economic consequences for Northern Ireland. According to a UK parliamentary report, Northern Ireland depends more on the EU market (and especially that of Ireland) for its exports than does the rest of the UK. In 2017, approximately 57% of Northern Ireland's exports went to the EU, including 38% to Ireland, which was Northern Ireland's top single export and import partner. Trade with Ireland is especially important for small- and medium-sized companies in Northern Ireland. Although sales in 2017 to other parts of the UK (Â£11.3 billion) surpassed the value of all Northern Ireland exports (Â£10.1 billion) and were nearly three times the value of exports to Ireland (Â£3.9 billion), small- and medium-sized companies in Northern Ireland were responsible for the vast majority of Northern Ireland exports to Ireland. Large- and medium-sized Northern Ireland firms dominated in sales to the rest of the UK. UK and DUP leaders maintain that given the value of exports, however, the rest of the UK is overall more important economically to Northern Ireland than the EU. Significant concerns existed in particular that a no-deal Brexit without a UK-EU withdrawal agreement in place would have jeopardized integrated labor markets and industries that operate on an all-island basis. Northern Ireland's agri-food sector, for example, would have faced serious challenges from a no-deal scenario. Food and live animals make up roughly 32% of Northern Ireland's exports to Ireland; a no-deal Brexit could effectively have ended this trade due to the need for EU sanitary and phytosanitary checks at specified border inspection posts in Ireland, which would significantly extend travel times and increase costs. The Ulster Farmers' Unionâan industry association of farmers in Northern Irelandâasserted that a no-deal Brexit would be \"catastrophic\" for Northern Ireland farmers. Many manufacturers in Northern Ireland and Ireland also depend on integrated supply chains north and south of the border; raw materials that go into making products such as milk, cheese, butter, and alcoholic drinks often cross the border between Northern Ireland and Ireland several times for processing and packaging. Although many in Northern Ireland are relieved that a no-deal Brexit was averted, the DUP and others in Northern Ireland contend that the renegotiated withdrawal agreement could be detrimental to Northern Ireland's economy. A UK government risk assessment released in October 2019 acknowledged that the lack of clarity about how the customs arrangements for Northern Ireland will operate in practice and possible regulatory divergence between Northern Ireland and the rest of the UK could lead to reduced business investment, consumer spending, and trade in Northern Ireland. The DUP highlights the potential negative profit implications for Northern Ireland businesses engaged in trade with the rest of the UK. Under the deal, Northern Ireland firms that export goods to elsewhere in the UK would be required under EU customs rules to make exit declarations, which would likely increase costs and administrative burdens. Concerns also exist that should the UK and the EU fail to reach agreement on a future new trade relationship by the end of the transition period, there could be significant customs and regulatory divergence between the UK and the EU, which in turn could mean more checks and controls on goods traded between Northern Ireland and the rest of the UK. Brexit could have other economic ramifications for Northern Ireland, as well. Some experts argue that access to the EU single market was one reason for Northern Ireland's success in attracting foreign direct investment since the end of the Troubles, and they express concern that Brexit could deter future investment. Post-Brexit, Northern Ireland also stands to lose EU regional funding (roughly $1.3 billion between 2014 and 2020) and agricultural aid (direct EU farm subsidies to Northern Ireland are nearly $375 million annually). UK officials maintain that the government is determined to safeguard Northern Ireland's interests and \"make a success of Brexit\" for Northern Ireland. They insist that Brexit offers new economic opportunities for Northern Ireland outside the EU. Supporters of Prime Minister Johnson's renegotiated withdrawal agreement argue that it will help improve Northern Ireland's economic prospects. Northern Ireland will remain part of the UK customs union and thus be able to participate in future UK trade deals but also will retain privileged access to the EU single market, which may make it an even more attractive destination for foreign direct investment. Brexit has revived questions about Northern Ireland's constitutional status. Sinn Feinâthe leading nationalist party in Northern Irelandâargues that \"Brexit changes everything\" and could generate greater support for a united Ireland. Since the 2016 Brexit referendum, Sinn Fein has repeatedly called for a border poll (a referendum on whether Northern Ireland should remain part of the UK or join the Republic of Ireland) in the hopes of realizing its long-term goal of Irish unification. The Good Friday Agreement provides for the possibility of a border poll in Northern Ireland, in line with the consent principle , which stipulates that any change in Northern Ireland's status can come about only with the consent of the majority of its people. The December 2019 election, in which unionist parties lost seats in the UK parliament while nationalist and cross-community parties gained seats, also has prompted increased discussion and scrutiny of Northern Ireland's constitutional status and whether a united Ireland may become a future reality. Any decision to hold a border poll in Northern Ireland on its constitutional status rests with the UK Secretary of State for Northern Ireland, who in accordance with the Good Friday Agreement must call a border poll if it \"appears likely\" that \"a majority of those voting would express a wish that Northern Ireland should cease to be part of the United Kingdom and form part of a united Ireland.\" At present, and despite the 2019 election results in Northern Ireland, experts believe the conditions required to hold a border poll on Northern Ireland's constitutional status do not exist. Most opinion polls indicate that a majority of people in Northern Ireland continue to support the region's position as part of the UK. Some analysts attribute the UK parliamentary election results in Northern Ireland to frustration with the DUP and Sinn Fein (which also saw its share of the vote decline amid gains for a more moderate nationalist party and a cross-community party), rather than as an indication of support for a united Ireland. At the same time, some surveys suggest that views on Northern Ireland's status may be shifting and that a \"damaging Brexit\" in particular could increase support for a united Ireland. A September 2019 poll found that 46% of those polled in Northern Ireland favored unification with Ireland, versus 45% who preferred remaining part of the UK. Analysts note that Northern Ireland's changing demographics (in which the Catholic, largely Irish-identifying population is growing while the Protestant, British-identifying population is declining)âcombined with the post-Brexit arrangements for Northern Ireland that could lead to enhanced economic ties with the Republic of Irelandâcould boost support for a united Ireland in the longer term. Irish unification also would be subject to Ireland's consent and approval. Some question the current extent of public and political support in the Republic of Ireland for unification, given its potential economic costs and concerns that unification could spark renewed loyalist violence in Northern Ireland. According to Irish Prime Minister Varadkar, a border poll in Northern Ireland in the near future would be divisive and disruptive amid an already contentious Brexit process. In Ireland's February 8, 2020, parliamentary election, however, the nationalist Sinn Fein party (which has a political presence in both Northern Ireland and the Republic of Ireland) secured the largest percentage of the vote for the first time in Ireland's history, surpassing both Varadkar's Fine Gael party and the main opposition party, Fianna Fail. Sinn Fein's election platform included a pledge to begin examining and preparing for Irish unification, but housing, health care, and economic policy issues dominated the Irish election. Sinn Fein appeared to benefit mostly from the Irish electorate's desire for domestic political change rather than from the party's stance on a united Ireland. Nevertheless, some commentators suggest that Sinn Fein's electoral success in the Republic of Ireland could add momentum to calls for a united Ireland. Many U.S. officials and Members of Congress view the UK as the United States' closest and most reliable ally. This perception stems from a combination of factors, including a sense of shared history, values, and culture; a large and mutually beneficial economic relationship; and extensive cooperation on foreign policy and security issues. The UK and the United States have a particularly close defense relationship and a unique intelligence-sharing partnership. Since 2016, President Trump has been outspoken in repeatedly expressing his support for Brexit. President Trump counts leading Brexit supporters, including Boris Johnson and Brexit Party leader Nigel Farage, among his personal friends. He publicly criticized Theresa May's handling of Brexit and stated during the most recent Conservative leadership race that Boris Johnson would \"make a great prime minister.\" President Trump repeated his support for Johnson prior to the December 2019 UK election and celebrated Johnson's win, writing on social media that the election outcome would allow the United States and UK to reach a new trade deal. Senior Administration officials have reinforced the President's pro-Brexit messages. During an August 2019 visit to London, then-U.S. National Security Adviser John Bolton stated that the Administration would \"enthusiastically\" support a no-deal Brexit; he asserted that a U.S.-UK trade deal could be negotiated quickly and possibly be concluded sector-by-sector to speed up the process. In a September 2019 visit to Ireland, Vice President Mike Pence reiterated the Administration's support for the UK leaving the EU and urged Ireland and the EU to \"work to reach an agreement that respects the United Kingdom's sovereignty.\" Vice President Pence expressed his hope that an agreement would \"also provide for an orderly Brexit.\" President Trump has expressed a largely positive view of the UK and made his first official state visit there in June 2019 (he also visited in July 2018), but there have been some tensions over substantive policy differences between the UK government and the U.S. Administration and backlash from the UK side over various statements made by the President. Under President Trump and Prime Minister May, the United States and the UK proceeded from relatively compatible starting points and maintained close cooperation on issues such as counterterrorism, combating the Islamic State, and seeking to end the conflict in Syria. In contrast, the UK government has defended both the Joint Comprehensive Plan of Action agreement (known as the Iran nuclear deal) and the Paris Agreement (known as the Paris climate agreement) and disagreed with the Trump Administration's decisions to withdraw the United States from those agreements. Despite the close relationship between President Trump and Prime Minister Johnson, there are no clear indications that a post-Brexit UK might reverse course on contentious areas such as the Iran nuclear deal or climate change to align with the views of the Trump Administration. Additionally, in January 2020, the UK government announced it would allow Chinese telecom equipment company Huawei to build parts of the UK's 5G cellular network, despite U.S. calls to boycott Huawei due to security risks. At the same time, Prime Minister Johnson has expressed support for the Middle East Peace Plan announced by the Trump Administration in January 2020, reversing May's earlier criticism of the Administration's recognition of Jerusalem as Israel's capital. Brexit has forged opposing viewpoints about the potential trajectory of the UK's international influence in the coming years. The Conservative Party-led government has outlined a post-Brexit vision of a Global Britain that benefits from increased economic dynamism; remains heavily engaged internationally in terms of trade, political, and security issues; maintains close foreign and security policy cooperation with both the United States and the EU; and retains \"all the capabilities of a global power.\" Other observers contend that Brexit would reduce the UK's ability to influence world events and that, without the ability to help shape EU foreign policy, the UK will have less influence in the rest of the world. Developments in relation to the UK's global role and influence are likely to have consequences for perceptions of the UK as either an effective or a diminished partner for the United States. Parallel debates apply to a consideration of security and defense matters. Analysts believe that close U.S.-UK cooperation will continue for the foreseeable future in areas such as counterterrorism, intelligence, and the future of the NATO, as well as numerous global and regional security challenges. NATO remains the preeminent transatlantic security institution, and in the context of Brexit, UK leaders have emphasized their continued commitment to be a leading country in NATO. Analysts also expect the UK to remain a key U.S. partner in operations to combat the remaining elements of the Islamic State in Iraq and Syria. In 2018, the UK had the world's sixth-largest military expenditure (behind the United States, China, Saudi Arabia, Russia, and India), spending approximately $56.1 billion. The UK is also one of seven NATO countries to meet the alliance's defense spending benchmark of 2% of GDP (according to NATO, the UK's defense spending was 2.14% of GDP in 2018 and was expected to be 2.13% of GDP in 2019). Nevertheless, Brexit has added to questions about the UK's ability to remain a leading military power and an effective U.S. security partner. U.S. officials and other leading experts have expressed concerns about reductions in the size and capabilities of the British military in recent years. Negative economic effects from Brexit could exacerbate concerns about the UK's ability to maintain defense spending, investment, and capabilities. Brexit also could have a substantial impact on U.S. strategic interests in relation to Europe more broadly and with respect to possible implications for future developments in the EU. For example, Brexit could allow the EU to move ahead more easily with developing shared capabilities and undertaking military integration projects under the EU Common Security and Defense Policy (CSDP), efforts that generate a mixture of praise and criticism from the United States. In the past, the UK has irritated some of its EU partners by essentially vetoing initiatives to develop a stronger CSDP, arguing that such efforts duplicate and compete with NATO. With the UK commonly regarded as the strongest U.S. partner in the EU, a partner that commonly shares U.S. views, and an influential voice in initiatives to develop EU foreign and defense policies, analysts have suggested that the UK's withdrawal could increase divergence between the EU and the United States on certain security and defense issues. More broadly, U.S. officials have long urged the EU to move beyond what is often perceived as a predominantly inward focus on treaties and institutions, in order to concentrate more effort and resources toward addressing a wide range of shared external challenges. Some observers note that Brexit has pushed Europe back toward another prolonged bout of internal preoccupation, consuming a considerable degree of UK and EU time and personnel resources in the process. The UK is a major U.S. trade and economic partner (see Figure 3 ). The UK is also a leading source of and destination for foreign direct investment, and affiliate activity is significant. Presently, WTO terms govern U.S.-UK trade, and these terms continue to apply after Brexit unless the two sides secure more preferential access to each other's markets through the conclusion of a bilateral FTA. The UK can negotiate, but not implement, trade agreements with other countries during the transition period. In July 2017, the United States and the UK established a bilateral working group to lay the groundwork for a potential future bilateral FTA post-Brexit and to ensure commercial continuity in U.S.-UK ties. The bilateral working group has met regularly to discuss a range of issues, including industrial and agricultural goods, services, investment, digital trade, intellectual property rights, regulatory issues, and small- and medium-sized enterprises. On October 16, 2018, the Trump Administration formally notified Congress under Trade Promotion Authority (TPA) of its intent to enter into negotiations with the UK on a bilateral trade agreement. U.S. Trade Representative Robert Lighthizer has said that trade negotiations with the UK are a \"priority\" and will start as soon as the UK is in a position to negotiate, but he cautioned that the negotiations may take time. Whether the Administration ultimately takes a comprehensive approach to the negotiations, as with the U.S.-Mexico-Canada Trade Agreement, or a more limited approach, as with the U.S.-Japan trade deal, remains to be seen. In the meantime, the United States and the UK have signed MRAs covering telecommunications equipment, electromagnetic compatibility for information and communications technology products, pharmaceutical good manufacturing practice inspections, and marine equipment to ensure continuity of trade in these areas. In addition, the two sides have signed agreements on insurance and derivatives trading and clearing, as well, to ensure regulatory certainty. Some analysts question the priority that will be afforded to U.S.-UK trade agreement negotiations, in light of the UK-EU and U.S.-EU trade agreement negotiations. Some analysts also question the sequencing, to the extent that the United States may face difficulty negotiating meaningfully with the UK without knowing what the final UK-EU relationship looks like; others counter that the UK-EU relationship is becoming clearer. Some experts view a U.S.-UK FTA as more feasible than a U.S.-EU FTA, given the U.S.-UK \"special relationship\" and historical similarities in trade approaches. The UK has been a leading voice on trade liberalization in the EU. Others have expressed doubts about the likelihood of a \"quick win\" for either side, particularly as negotiations would need to overcome a number of obstacles and concerns. Many U.S. and UK businesses and other groups see an FTA as an opportunity to enhance market access and align UK regulations more closely with those of the United States than the EU regulatory framework, aspects of which raise concerns for U.S. business interests. Other stakeholder groups oppose what they view as efforts to weaken UK regulations. For instance, some in UK civil society have expressed concerns about the implications of U.S. demands for greater access to the UK market, and potential changes to UK food safety regulations and pharmaceutical drug pricing. Key issues in U.S.-UK FTA negotiations also could include financial services, investment, and e-commerce, which are a prominent part of U.S.-UK trade. To the extent that the UK decides to continue aligning its rules and regulations with the EU, sticking points in past U.S.-EU trade negotiations could resurface in the U.S.-UK context. Other complexities for the U.S.-UK trade talks include frictions over tariffs and other policy issues. For instance, the Trump Administration has threatened the UK with tariffs over its plan to apply a new digital services tax and strongly opposes the UK's decision to open its 5G network development to participation by Huawei, a Chinese telecommunications firm. Other issues, such as the U.S. Section 232 national security-based steel and aluminum tariffs and potential auto tariffs, could see pushback from the UK side. Many Members of Congress support a U.S.-UK FTA. However, some Members of Congress have cautioned that they would oppose a trade agreement if Brexit were detrimental to the Northern Ireland peace process, whereas others support a trade agreement without such conditions. Whether a potential final FTA would meet congressional expectations or TPA requirements or be concluded as an executive agreement remains to be seen. Congress may continue to hold consultations with the Administration over the scope of the negotiations and engage in oversight as the negotiations progress. Three and a half years after the Brexit referendum, a decisive victory in the UK's December 2019 general election allowed UK Prime Minister Johnson to proceed with Brexit. The UK withdrew from the EU at the end of January 2020 and began a transition period, scheduled to last until the end of 2020, during which it is expected to focus on negotiations with the EU on an FTA and other elements of the future UK-EU relationship. A significant number of unknowns remain, including how elements of the withdrawal agreement will be implemented, whether the two sides will be able to conclude an agreement on the future relationship during the 11-month transition period, and the effects of ending the transition period without such an agreement. Regardless of the precise turn of events, the aftermath of Brexit is expected to remain a primary focus of UK politics and a leading concern for the EU for the foreseeable future. During the 116 th Congress, developments with regard to Brexit and their implications for U.S.-UK and U.S.-EU relations, foreign policy and security cooperation, and the global economy and trade issues may remain of interest to Members of Congress. The topic of a prospective U.S.-UK FTA may be a particular area of congressional interest. Congress also may consider how Brexit could affect Northern Ireland and the Northern Ireland peace process. Appendix A. Review of the Backstop and the Rejected Withdrawal Deal Under former United Kingdom (UK) Prime Minister Theresa May, the approach of the UK government to leaving the European Union (EU) was to pursue a relatively hard Brexit , meaning a full departure from the EU single market and customs union, and a full restoration of British sovereignty over lawmaking, including with regard to controlling immigration. The approach called for the UK to subsequently negotiate a free trade agreement with the EU to secure as much access to the EU market as possible. In November 2018, EU and UK negotiators finalized a 585-page draft withdrawal agreement and a 26-page political declaration on the future relationship. The withdrawal agreement contained four main elements to guide the UK's orderly departure from the EU: Guarantees pertaining to the rights of the approximately 3 million EU citizens residing in the UK and the approximately 1 million UK citizens residing in the EU. A commitment by the UK to pay the EU Â£39 billion (approximately $50 billion) to settle outstanding budgetary and financial pledges. A transition period, lasting through 2020, in which the UK would be bound to follow all rules governing the EU single market while the two sides negotiate their future relationship and implement steps needed to effect an orderly separation. A backstop provision, which would keep the UK in the EU customs union until the two sides agreed on their future trade relationship. The backstop was made necessary by the lack of an apparent solution to the Irish border question, with both sides intent on avoiding a hard border with customs checks and physical infrastructure between Northern Ireland and the Republic of Ireland. The provision was intended to protect cross-border trade and preserve the peace process between parties to Northern Ireland's long sectarian conflict. The EU also viewed the backstop as necessary to ensure that Brexit would not violate the rules and structure of the EU single market. The nonbinding political declaration on the future UK-EU relationship called for an economic partnership with the EU that features an ambitious free trade area and deep cooperation, but also \"separate markets and distinct legal orders,\" and the development of an independent UK trade policy. The backstop provision became one of the main obstacles to securing Parliament's approval of the withdrawal agreement. Although the former May government contended that it would never be necessary to implement the backstop, critics noted that the UK would be unable to conduct an independent national trade policy, one of the main selling points for Brexit's supporters, as long as the UK remained a member of the EU customs union. (The backstop would have taken effect at the conclusion of the transition periodâthat is, at the end of 2020âif the two sides had not reached a new trade agreement with more preferable arrangements for resolving the border issue.) Supporters of a hard Brexit, led by a faction of the Conservative Party, objected that the backstop would leave the UK a \"vassal state\" of the EU, bound indefinitely to many EU rules (both sides would have to jointly agree to end the backstop). Many unionists in Northern Ireland strongly opposed the deal because a provision in the backstop would preserve deeper regulatory alignment between Northern Ireland and the EU to avoid a hard border. They argue that it is unacceptable to treat Northern Ireland differently from the rest of the UK and that doing so weakens the UK's constitutional integrity. Advocates of a soft Brexit maintain that permanent membership in the EU single market would be the least damaging outcome in economic terms, and that an assurance of permanent customs union membership would mitigate Brexit-related uncertainties. Many who favor a soft Brexit argued that May's withdrawal agreement prolonged such uncertainties while failing to deliver sufficient benefits. Others in the opposition parties voted against the deal in the hopes that its defeat would lead to an early general election or a second referendum on EU membership. Between January 2019 and March 2019, the House of Commons rejected the withdrawal agreement three times. The House of Commons also held a series of nonbinding \"indicative\" votes to determine where Members stood on options and proposals, including staying in the EU single market and/or customs union, leaving without a deal, cancelling the withdrawal process to avoid \"no deal,\" and holding a public vote to confirm any deal. No proposal received a majority. Appendix B. Northern Ireland: From the Troubles to a Fragile Peace Between 1969 and 1999, roughly 3,500 people died as a result of political violence in Northern Ireland. The conflict, often referred to as \"the Troubles,\" has its origins in the 1921 division of Ireland and reflects a struggle between different national, cultural, and religious identities. Protestants in Northern Ireland (48%) largely define themselves as British and support remaining part of the United Kingdom ( unionists ). Catholics in Northern Ireland (45%) consider themselves Irish, and many Catholics desire a united Ireland ( nationalists ). In the past, more militant unionists ( loyalists ) and more militant nationalists ( republicans ) were willing to use violence to achieve their goals. The 1998 Peace Agreement For years, the British and Irish governments sought to facilitate a negotiated political settlement to the conflict. After many ups and downs, the two governments and the Northern Ireland political parties participating in peace talks announced an agreement on April 10, 1998. The resulting Good Friday Agreementâor Belfast Agreementâis a multi-layered and interlocking document, consisting of a political settlement reached by Northern Ireland's political parties and an international treaty between the UK and Irish governments. At the core of the Good Friday Agreement is the consent principle âthat is, a change in Northern Ireland's status as part of the United Kingdom (UK) can come about only with the consent of the majority of Northern Ireland's people (as well as with the consent of a majority in Ireland). Although the agreement acknowledged that a substantial section of the population in Northern Ireland and a majority on the island desired a united Ireland, it recognized that the majority of people in Northern Ireland wished to remain part of the UK. If the preferences of these majorities were to change, the agreement asserted that both the UK and Irish governments would have a binding obligation to bring about the wish of the people; thus, the agreement included provisions for future polls (a border poll ) to be held in Northern Ireland on its constitutional status should events warrant. The Good Friday Agreement set out a framework for devolved governmentâthe transfer of specified powers over local governance from London to Belfastâwith a Northern Ireland Assembly and Executive Committee in which unionist and nationalist parties would share power. The agreement also contained provisions on the decommissioning (disarmament) of paramilitary weapons, policing, human rights, UK security normalization (demilitarization) in Northern Ireland, and the status of prisoners. Finally, the Good Friday Agreement created several new institutions to promote \"north-south\" cooperation on cross-border issues among leaders on the island of Ireland and \"east-west\" institutions to address regional issues affecting the UK, Ireland, the Channel Islands, and the Isle of Man. Despite a much-improved security situation since 1998, full implementation of the Good Friday Agreement has been challenging. For years, instability in Northern Ireland's devolved government was the rule rather than the exception. Decommissioning and police reforms were key sticking points. In 2007, however, the hard-line Democratic Unionist Party (DUP) and Sinn Fein, the political party associated with the Irish Republican Army (IRA), reached a landmark power-sharing deal. Regularly scheduled Assembly elections since the 2007 deal (in 2011 and 2016) produced successive power-sharing governments led by the DUP and Sinn Fein. In 2010, the DUP and Sinn Fein also reached an agreement to resolve the controversial issue of devolving police and justice affairs from London to Belfast. Recent Crisis in the Devolved Government and Other Challenges Analysts largely view implementation of the most important aspects of the Good Friday Agreement as complete. At the same time, tensions and distrust persist among the unionist and nationalist communities and their respective political parties, and many experts suggest that the peace process remains fragile. The inability of Northern Ireland's political parties to reach an agreement on reestablishing a devolved government for nearly three years following snap 2017 Assembly elections exemplifies the ongoing divisions and frictions in Northern Ireland's politics and society. The previous devolved government led by the DUP and Sinn Fein collapsed in January 2017, after 10 months in office. The immediate impetus for the collapse was a renewable energy scandal involving DUP leader and Northern Ireland First Minister Arlene Foster. However, frictions on several other issuesâincluding giving the Irish language the same official status as English, legalizing same-sex marriage, and Brexitâcontributed to Sinn Fein's decision to force snap Assembly elections. The DUP and Sinn Fein remain at odds over Brexit; Sinn Fein strongly opposes Brexit, whereas the DUP is the only major Northern Ireland political party to support it. The DUP retained the largest number of Assembly seats in the March 2017 elections, but Sinn Fein reduced the gap with the DUP to one seat in the Assembly and was widely regarded as the biggest winner. Negotiations on forming a new devolved government proceeded in fits and starts but repeatedly stalled, primarily over a potential stand-alone Irish Language Act. Some analysts suggest that the DUP's support for the Conservative Party government in the UK Parliament following the June 2017 snap general election further heightened distrust between Sinn Fein and the DUP, hardened the positions of both parties, and made reaching an agreement on a new devolved government more difficult. Others note that Brexit has consumed UK and Northern Ireland politicians' time and attention and largely overshadowed negotiations on a new devolved government. In April 2019, journalist Lyra McKee was shot and killed while covering riots in Londonderry (also known as Derry). The New IRA, a dissident republican group opposed to the peace process, claimed responsibility (but also apologized, asserting that it had been aiming to shoot a police officer but hit McKee by accident). McKee's death sparked a significant public outcry and prompted the UK and Irish governments to launch a more intensive effort to revive talks with Northern Ireland's political parties on forming a new devolved government. Negotiations remained largely deadlocked, however, throughout the summer and fall of 2019 amid ongoing uncertainty over Brexit. On December 16, 2019, the UK and Irish governments launched a new round of talks with the DUP, Sinn Fein, and Northern Ireland's other main political parties aimed at reestablishing the devolved government. These negotiations followed the UK's December 12, 2019, general election in which Prime Minister Johnson's Conservative Party won a convincing parliamentary majority, negating the influence of the DUP in the UK Parliament and clearing the way for approval of the Brexit withdrawal agreement with the EU. Some analysts suggested the UK election results improved the prospects for restoring Northern Ireland's devolved government. Both the DUP and Sinn Fein saw a decrease in their shares of the vote, while more moderate \"middle ground\" parties saw an increase, in part due to voter dissatisfaction with the impasse in reestablishing the devolved government. On January 10, 2020, the DUP and Sinn Fein agreed to a deal to restore devolved government put forward by the UK and Irish governments. The new Assembly convened the following day and elected a new Executive, including the DUP's Arlene Foster as First Minister and Sinn Fein's Michelle O'Neill as Deputy First Minister. The power-sharing deal is wide-ranging and addresses a number of key issues, including use of the Irish language, health and education concerns, increasing the number of police officers, and measures to improve the sustainability and transparency of Northern Ireland's political institutions. Both the UK and Irish governments also promised additional financial support for Northern Ireland as part of the deal. Despite the decrease in the levels of violence since the Good Friday Agreement, Northern Ireland continues to grapple with a number of issues in its search for peace and reconciliation. Northern Ireland remains a largely divided society, with Protestant and Catholic communities existing in parallel. Around 100 peace walls or other physical barriers throughout Northern Ireland separate some Protestant and Catholic neighborhoods, and schools and housing estates remain mostly single-identity communities. Sectarian tensions continue to flare periodically on issues such as parading, protests, and the use of flags and emblems. Other prominent challenges include addressing Northern Ireland's legacy of violence (often termed dealing with the past ), curbing remaining paramilitary and dissident activity, and promoting economic development and equality. Experts also contend that Brexit may continue to pose significant concerns for Northern Ireland's still-tenuous peace process and its future political and economic development. ", "summary": "The United Kingdom (UK) formally withdrew from membership in the European Union (EU) on January 31, 2020. Under the withdrawal agreement negotiated by the two sides, the UK is to continue applying EU rules during a transition period scheduled to run through the end of 2020. During the transition period, the UK and the EU are expected to begin negotiating the terms of their future relationship, including trade and economic relations as well as cooperation on foreign policy, security, and a range of other issues. Overview of Developments After the 2016 referendum in which 52% of voters in the UK favored leaving the EU, Brexit was originally scheduled to occur in March 2019. In early 2019, Parliament repeatedly rejected the withdrawal agreement negotiated between then-Prime Minister Theresa May's government and the EU. Boris Johnson became prime minister in July 2019, following May's resignation. Given continued deadlock over Brexit in the UK, the EU granted the UK a series of extensions. In October 2019, EU and UK negotiators reached a new withdrawal agreement altering the Northern Ireland backstop provision, which was a main sticking point to Parliament passing the original deal. Under the new deal, Northern Ireland (part of the UK) is to maintain regulatory alignment with the EU (essentially creating a customs border in the Irish Sea) to preserve an open border with the Republic of Ireland (an EU member state) while safeguarding the rules of the EU single market. At the end of the transition period, the UK (including Northern Ireland) is expected to leave the EU customs union and pursue an independent national trade policy. Prime Minister Johnson encountered difficulties in securing Parliament's approval of the new deal. Seeking to break the deadlock, the UK Parliament agreed to set an early general election for December 12, 2019. Johnson's Conservative Party won a decisive victory in the election, winning 365 out of 650 seats in the UK House of Commons. The result allowed the UK to ratify the new withdrawal agreement and end its EU membership. Brexit, Trade, and Economic Impact Brexit has considerable implications for the UK's trade arrangements. Outside the EU customs union, the UK would regain an independent national trade policy, a major selling point for many Brexit supporters who advocate negotiating new bilateral trade deals around the world, including with the United States and the EU. The unlikely prospect in which the UK remains a member of the EU single market or customs union would provide more barrier-free access to the EU, but the UK would have to follow most EU rules without having a say in how those rules are made. Analysts predict the disruption resulting from Brexit likely will have at least a short-term negative economic impact on the UK, and many businesses in the UK have been taking steps to mitigate potential economic losses. Northern Ireland Many observers have expressed concerns that Brexit could destabilize the Northern Ireland peace process, especially if it resulted in a hard border with physical infrastructure and customs checks between Northern Ireland and the Republic of Ireland. Conditions have improved considerably since the 1998 peace accord (known as the Good Friday Agreement or the Belfast Agreement), but many analysts assess that peace and security in Northern Ireland remains fragile. Concerns about a hard border developing have receded in light of Johnson's election victory and Parliament's approval of the renegotiated withdrawal agreement. Still, Brexit has added to divisions within Northern Ireland and continues to pose challenges for Northern Ireland's peace process, economy, and, possibly in the longer term, its constitutional status as part of the UK. U.S.-UK Relations and Congressional Interest President Trump and Administration officials have expressed support for Brexit. Members of Congress hold mixed views. The UK likely will remain a leading U.S. partner in addressing many foreign policy and security challenges, but Brexit has fueled a debate about whether the UK's global role and influence are likely to be enhanced or diminished. In 2018, the Administration notified Congress of its intention to negotiate a bilateral free trade agreement (FTA) with the UK after Brexit. Congress likely would need to pass implementing legislation before the potential FTA could enter into force. Many in Congress also are concerned about Brexit's possible implications for Northern Ireland's peace process, stability, and economic development.", "document_type": "crs"}
{"report": "This report provides background information and potential oversight issues for Congress on the Coast Guard's programs for procuring 8 National Security Cutters (NSCs), 25 Offshore Patrol Cutters (OPCs), and 58 Fast Response Cutters (FRCs). The Coast Guard's proposed FY2020 budget requests a total of $657 million in procurement funding for the NSC, OPC, and FRC programs. The issue for Congress is whether to approve, reject, or modify the Coast Guard's funding requests and acquisition strategies for the NSC, OPC, and FRC programs. Congress's decisions on these three programs could substantially affect Coast Guard capabilities and funding requirements, and the U.S. shipbuilding industrial base. The NSC, OPC, and FRC programs have been subjects of congressional oversight for several years, and were previously covered in other CRS reports that are now archived. CRS testified on the Coast Guard's cutter acquisition programs most recently on November 29. The Coast Guard's plans for modernizing its fleet of polar icebreakers are covered in a separate CRS report. The 91 planned NSCs, OPCs, and FRCs are intended to replace 90 older Coast Guard ships—12 high-endurance cutters (WHECs), 29 medium-endurance cutters (WMECs), and 49 110-foot patrol craft (WPBs). The Coast Guard's 12 Hamilton (WHEC-715) class high-endurance cutters entered service between 1967 and 1972. The Coast Guard's 29 medium-endurance cutters include 13 Famous (WMEC-901) class ships that entered service between 1983 and 1991, 14 Reliance (WMEC-615) class ships that entered service between 1964 and 1969, and 2 one-of-a-kind cutters that originally entered service with the Navy in 1944 and 1971 and were later transferred to the Coast Guard. The Coast Guard's 49 110-foot Island (WPB-1301) class patrol boats entered service between 1986 and 1992. Many of these 90 ships are manpower-intensive and increasingly expensive to maintain, and have features that in some cases are not optimal for performing their assigned missions. Some of them have already been removed from Coast Guard service: eight of the Island-class patrol boats were removed from service in 2007 following an unsuccessful effort to modernize and lengthen them to 123 feet; additional Island-class patrol boats are being decommissioned as new FRCs enter service; the one-of-a-kind medium-endurance cutter that originally entered service with the Navy in 1944 was decommissioned in 2011; and Hamilton-class cutters are being decommissioned as new NSCs enter service. A July 2012 Government Accountability Office (GAO) report discusses the generally poor physical condition and declining operational capacity of the Coast Guard's older high-endurance cutters, medium-endurance cutters, and 110-foot patrol craft. NSCs, OPCs, and FRCs, like the ships they are intended to replace, are to be multimission ships for routinely performing 7 of the Coast Guard's 11 statutory missions, including search and rescue (SAR); drug interdiction; migrant interdiction; ports, waterways, and coastal security (PWCS); protection of living marine resources; other/general law enforcement; and defense readiness operations. Smaller Coast Guard patrol craft and boats contribute to the performance of some of these seven missions close to shore. NSCs, OPCs, and FRCs perform them both close to shore and in the deepwater environment, which generally refers to waters more than 50 miles from shore. National Security Cutters ( Figure 1 )—also known as Legend (WMSL-750) class cutters because they are being named for legendary Coast Guard personnel —are the Coast Guard's largest and most capable general-purpose cutters. They are larger and technologically more advanced than Hamilton-class cutters, and are built by Huntington Ingalls Industries' Ingalls Shipbuilding of Pascagoula, MS (HII/Ingalls). The Coast Guard's acquisition program of record (POR)—the service's list, established in 2004, of planned procurement quantities for various new types of ships and aircraft—calls for procuring 8 NSCs as replacements for the service's 12 Hamilton-class high-endurance cutters. The Coast Guard's FY2019 budget submission estimated the total acquisition cost of a nine-ship NSC program at $6.030 billion, or an average of about $670 million per ship. Although the Coast Guard's POR calls for procuring a total of 8 NSCs to replace the 12 Hamilton-class cutters, Congress through FY2018 has funded 11 NSCs, including the 10 th and 11 th in FY2018. The seventh was delivered to the Coast Guard on September 19, 2018, and the eighth was delivered on April 30, 2019. The ninth through 11th are under construction; the ninth is scheduled for delivery in 2021. The Coast Guard's proposed FY2020 budget requests $60 million in procurement funding for the NSC program; this request does not include funding for a 12 th NSC. For additional information on the status and execution of the NSC program from a May 2018 GAO report, see Appendix C . Offshore Patrol Cutters ( Figure 2 , Figure 3 , and Figure 4 )—also known as Heritage (WMSM-915) class cutters because they are being named for past cutters that played a significant role in the history of the Coast Guard and the Coast Guard's predecessor organizations —are to be somewhat smaller and less expensive than NSCs, and in some respects less capable than NSCs. In terms of full load displacement, OPCs are to be about 80% as large as NSCs. Coast Guard officials describe the OPC program as the service's top acquisition priority. OPCs are being built by Eastern Shipbuilding Group of Panama City, FL. The Coast Guard's POR calls for procuring 25 OPCs as replacements for the service's 29 medium-endurance cutters. The Coast Guard's FY2019 budget submission estimated the total acquisition cost of the 25 ships at $10.523 billion, or an average of about $421 million per ship. The first OPC was funded in FY2018 and is to be delivered in 2021. The second OPC and long leadtime materials (LLTM) for the third were funded in FY2019. The Coast Guard's proposed FY2020 budget requests $457 million in procurement funding for the third OPC, LLTM for the fourth and fifth, and other program costs. The Coast Guard's Request for Proposal (RFP) for the OPC program, released on September 25, 2012, established an affordability requirement for the program of an average unit price of $310 million per ship, or less, in then-year dollars (i.e., dollars that are not adjusted for inflation) for ships 4 through 9 in the program. This figure represents the shipbuilder's portion of the total cost of the ship; it does not include the cost of government-furnished equipment (GFE) on the ship, or other program costs—such as those for program management, system integration, and logistics—that contribute to the above-cited figure of $421 million per ship. At least eight shipyards expressed interest in the OPC program. On February 11, 2014, the Coast Guard announced that it had awarded Preliminary and Contract Design (P&CD) contracts to three of those eight firms—Bollinger Shipyards of Lockport, LA; Eastern Shipbuilding Group of Panama City, FL; and General Dynamics' Bath Iron Works (GD/BIW) of Bath, ME. On September 15, 2016, the Coast Guard announced that it had awarded the detail design and construction (DD&C) contract to Eastern Shipbuilding. The contract covers detail design and production of up to 9 OPCs and has a potential value of $2.38 billion if all options are exercised. For additional information on the status and execution of the OPC program from a May 2018 GAO report, see Appendix C . Fast Response Cutters ( Figure 5 )—also called Sentinel (WPC-1101) class patrol boats because they are being named for enlisted leaders, trailblazers, and heroes of the Coast Guard and its predecessor services of the U.S. Revenue Cutter Service, U.S. Lifesaving Service, and U.S. Lighthouse Service —are considerably smaller and less expensive than OPCs, but are larger than the Coast Guard's older patrol boats. FRCs are built by Bollinger Shipyards of Lockport, LA. The Coast Guard's POR calls for procuring 58 FRCs as replacements for the service's 49 Island-class patrol boats. The POR figure of 58 FRCs is for domestic operations. The Coast Guard, however, operates six Island-class patrol boats in the Persian Gulf area as elements of a Bahrain-based Coast Guard unit, called Patrol Forces Southwest Asia (PATFORSWA), which is the Coast Guard's largest unit outside the United States. Providing FRCs as one-for-one replacements for all six of the Island-class patrol boats in PATFORSWA would result in a combined POR+PATFORSWA figure of 64 FRCs. The Coast Guard's FY2019 budget submission estimated the total acquisition cost of the 58 cutters at $3.748.1 billion, or an average of about $65 million per cutter. A total of 56 FRCs have been funded through FY2019, including six in FY2019. Four of the 56 (two of the FRCs funded in FY2018 and two of the FRC funded in FY2019) are to be used for replacing PATFORSWA cutters and consequently are not counted against the Coast Guard's 58-ship POR for the program. Excluding these four OPCs, a total of 52 FRCs for domestic operations have been funded through FY2019. The 32nd FRC was commissioned into service on May 1, 2019. The Coast Guard's proposed FY2020 budget requests $140 million in acquisition funding for the procurement of two more FRCs for domestic operations. For additional information on the status and execution of the FRC program from a May 2018 GAO report, see Appendix C . Table 1 shows annual requested and programmed acquisition funding for the NSC, OPC, and FRC programs in the Coast Guard's FY2013-FY2020 budget submissions. Actual appropriated figures differ from these requested and projected amounts. One issue for Congress is whether to whether to provide funding in FY2020 for the procurement of a 12 th NSC. Funding long leadtime materials (LLTM) for a 12 th NSC in FY2020 could require tens of millions of dollars; fully funding the procurement of a 12 th NSC in FY2020 could require upwards of $700 million. Supporters of providing funding for a 12 th NSC in FY2020 could argue that a total of 12 NSCs would provide one-for-one replacements for the 12 retiring Hamilton-class cutters; that Coast Guard analyses showing a need for no more than 9 NSCs assumed dual crewing of NSCs—something that has not worked as well as expected; and that the Coast Guard's POR record includes only about 61% as many new cutters as the Coast Guard has calculated would be required to fully perform the Coast Guard's anticipated missions in coming years (see \" Planned NSC, OPC, and FRC Procurement Quantities \" below, as well as Appendix A ). Skeptics or opponents of providing funding for a 12 th NSC in FY2019 could argue that the Coast Guard's POR includes only 8 NSCs, that the Coast Guard's fleet mix analyses (see \" Planned NSC, OPC, and FRC Procurement Quantities \" below, as well as Appendix A ) have not shown a potential need for more than 9 NSCs, and that in a situation of finite Coast Guard budgets, providing funding for a 12 th NSC might require reducing funding for other FY2020 Coast Guard programs. Another issue for Congress is whether to fund the procurement in FY2020 of two FRCs, as requested by the Coast Guard, or some higher number, such as four or six. Supporters of funding the procurement of a higher number could argue that FRCs in past years have been procured at annual rates of up to six per year; that procuring them at higher annual rates reduces their unit procurement costs due to improved production economies of scale; and that procuring four or six FRCs in FY2020 would accelerate the replacement of aging and less-capable Island-class patrol boats with new and more capable FRCs. Opponents of procuring more than two FRCs in FY2020, while acknowledging these points, could argue that in a situation of finite Coast Guard funding, procuring more than two could require offsetting reductions in funding for other FY2020 Coast Guard programs, producing an uncertain net result on overall Coast Guard capabilities, and that replacing Island-class patrol boats, while desirable, is not so urgent a requirement that the procurement of FRCs needs to be accelerated beyond what the Coast Guard plans under its FY2020 budget submission. Another issue for Congress is whether to acquire OPCs using annual contracting or multiyear contracting. The Coast Guard currently plans to use a contract with options for procuring the first nine OPCs. Although a contract with options may look like a form of multiyear contracting, it operates more like a series of annual contracts. Contracts with options do not achieve the reductions in acquisition costs that are possible with multiyear contracting. Using multiyear contracting involves accepting certain trade-offs. One form of multiyear contracting, called block buy contracting, can be used at the start of a shipbuilding program, beginning with the first ship. (Indeed, this was a principal reason why block buy contracting was in effect invented in FY1998, as the contracting method for procuring the Navy's first four Virginia-class attack submarines.) Section 311 of the Frank LoBiondo Coast Guard Authorization Act of 2018 ( S. 140 / P.L. 115-282 of December 4, 2018) provides permanent authority for the Coast Guard to use block buy contracting with economic order quantity (EOQ) purchases (i.e., up-front batch purchases) of components in its major acquisition programs. The authority is now codified at 14 U.S.C. 1137. CRS estimates that if the Coast Guard were to use block buy contracting with EOQ purchases of components for acquiring the first several OPCs, and either block buy contracting with EOQ purchases or another form of multiyear contracting known as multiyear procurement (MYP) with EOQ purchases for acquiring the remaining ships in the program, the savings on the total acquisition cost of the 25 OPCs (compared to costs under contracts with options) could amount to roughly $1 billion. CRS also estimates that acquiring the first nine ships in the OPC program under the current contract with options could forego roughly $350 million of the $1 billion in potential savings. One potential option for the subcommittee would be to look into the possibility of having the Coast Guard either convert the current OPC contract at an early juncture into a block buy contract with EOQ authority, or, if conversion is not possible, replace the current contract at an early juncture with a block buy contract with EOQ authority. Replacing the current contract with a block buy contract might require recompeting the program, which would require effort on the Coast Guard's part and could create business risk for Eastern Shipbuilding Group, the shipbuilder that holds the current contract. On the other hand, the cost to the Coast Guard of recompeting the program would arguably be small relative to a potential additional savings of perhaps $300 million, and Eastern arguably would have a learning curve advantage in any new competition by virtue of its experience in building the first OPC. The current procurement profile for the OPC, which reaches a maximum projected annual rate of two ships per year, would deliver OPCs many years after the end of the originally planned service lives of the medium-endurance cutters that they are to replace. Coast Guard officials have testified that the service plans to extend the service lives of the medium-endurance cutters until they are replaced by OPCs. There will be maintenance and repair expenses associated with extending the service lives of medium-endurance cutters, and if the Coast Guard does not also make investments to increase the capabilities of these ships, the ships may have less capability in certain regards than OPCs. One possible option for addressing this situation would be to increase the maximum annual OPC procurement rate from the currently planned two ships per year to three or four ships per year. Doing this could result in the 25 th OPC being delivered about four years or six years sooner, respectively, than under the currently planned maximum rate. Increasing the OPC procurement rate to three or four ships per year would require a substantial increase to the Coast Guard's Procurement, Construction, and Improvements (PC&I) account, an issue discussed in Appendix B . Increasing the maximum procurement rate for the OPC program could, depending on the exact approach taken, reduce OPC unit acquisition costs due to improved production economies of scale. Doubling the rate for producing a given OPC design to four ships per year, for example, could reduce unit procurement costs for that design by as much as 10%, which could result in hundreds of millions of dollars in additional savings in acquisition costs for the program. Increasing the maximum annual procurement rate could also create new opportunities for using competition in the OPC program. Notional alternative approaches for increasing the OPC procurement rate to three or four ships per year include but are not necessarily limited to the following: increasing the production rate to three or four ships per year at Eastern Shipbuilding—an option that would depend on Eastern Shipbuilding's production capacity; introducing a second shipyard to build Eastern's design for the OPC; introducing a second shipyard (such as one of the other two OPC program finalists) to build its own design for the OPC—an option that would result in two OPC classes; or building additional NSCs in the place of some of the OPCs—an option that might include descoping equipment on those NSCs where possible to reduce their acquisition cost and make their capabilities more like that of the OPC. Such an approach would be broadly similar to how the Navy is using a descoped version of the San Antonio (LPD-17) class amphibious ship as the basis for its LPD-17 Flight II (LPD-30) class amphibious ships. Another potential issue for Congress concerns the impact of Hurricane Michael on Eastern Shipbuilding of Panama City, FL, the shipyard that is to build the first nine OPCs. A May 22, 2019, press report states: A Category 5 hurricane that battered Florida's panhandle region last fall, including shipbuilder Eastern Shipbuilding Group, will impact the new medium-endurance cutter ship the company is building for the Coast Guard but at the moment it's unclear what the effects will be on cost and schedule, Coast Guard Commandant Adm. Karl Schultz said on Tuesday [May 21]. Eastern Shipbuilding's analysis of Hurricane Michael's impact on the Offshore Patrol Cutter (OPC) is due to the Coast Guard by May 31, and from there the service expects to have an understanding on the way forward with the program before the end of June, Schultz said in response to questions from Rep. Garret Graves (R-La.), during a hearing hosted by the House Transportation and Infrastructure Coast Guard and Maritime Transportation Subcommittee. He said Eastern Shipbuilding will provide \"perspectives\" on the cost and schedule and any other impacts. \"It's safe to say that we understand the impacts of a Category 5 hurricane on Eastern Shipbuilding Group will have an impact on the OPC program,\" Shultz said. He expects there to be some \"puts and takes\" after Eastern Shipbuilding submits its analysis. Rep. Peter DeFazio (D-Ore.), citing a press report earlier in the hearing, said that Sen. Marco Rubio (R-Fla.) has inserted language in a draft disaster assistance bill allowing the Coast Guard and Eastern Shipbuilding to renegotiate the firm fixed-price contract the shipbuilder is working under for the OPC to account for damage to shore side facilities from Hurricane Michael and increased labor costs. DeFazio said he is skeptical of the company's claim, noting, \"I'm pretty sure they had insurance,\" and adding that \"I question whether or not this has something to do with their original bid, which some thought was low.\" He also said he has concerns that a former Coast Guard Commandant that works for Eastern Shipbuilding has said he'll have authority to negotiate with his former service. Retired Adm. Robert Papp, the 24th commandant of the Coast Guard, runs Eastern Shipbuilding's Washington, D.C., operations. Eastern Shipbuilding did not respond to a query from Defense Daily about impacts to the OPC program from Hurricane Michael and any relief it may need from the current contract. Schultz said that the OPC contract can't be renegotiated without legislative authorities from Congress. He said the Coast Guard, in response to an \"ask\" from Congress, provided language to help with drafting the proposed legislation related to the OPC in the disaster bill. Schultz also said that the Coast Guard is not involved in Eastern Shipbuilding's lobbying efforts with Congress. A May 17, 2019, press report stated: As the Senate continues to negotiate the particulars of the supplemental disaster relief bill that seems poised to go to a vote next week, a new provision to save something many likely didn't know was at risk has been added. A new line in the draft bill will let Eastern Shipbuilding Group renegotiate its contract with the U.S. Coast Guard to build up to 25 new off-shore patrol cutters. \"Under the old contract we were prohibited from negotiating for additional money for increased costs,\" said Admiral Bob Papp, President of Washington Operations for Eastern. That meant that after Hurricane Michael, they would be unable to negotiate with the Coast Guard to help cover a slew of new costs associated with both the project and the hurricane, such as the damage from the Category 5 storm that needed repairs, the prolonged schedule and the \"skyrocketing\" costs of labor, Papp said. The contract—the largest in the Coast Guard's history at more than $10 billion—didn't account for a natural disaster. It was going to be hard, Papp said, for Eastern to complete the project and to \"stay healthy\" without some negotiations. At stake in the community are 900 planned jobs and up to 5,000 indirect jobs officials believe will help jump-start the region's manufacturing economy. But an official in Sen. Marco Rubio's office said the latest version of the supplemental disaster relief bill now includes a provision that will allow negotiations. Rubio, according to the official, spoke with the President Donald Trump on Air Force One following the president's rally in Panama City Beach last week, helping to secure the language that made it into the bill. \"We've waited far too long (for disaster relief), and we're also involved in some Florida-specific issues,\" Rubio said in a recent video. \"For example, the Hurricane had an impact on a very important Coast Guard project that's in Northwest Florida and we want to make sure that project stays on target and continues to feed jobs because Northwest Florida desperately needs those jobs to recover. We're very hopeful. Cautiously optimistic, that next week can be a very good week.\" Papp thanked the area's congressional delegation for stepping up to advocate for this project, saying the company is \"honored and delighted\" to receive help. A January 28, 2019, press release from Eastern Shipbuilding stated: Panama City, FL, Eastern Shipbuilding Group [ESG] reports that steel cutting for the first offshore patrol cutter (OPC), Coast Guard Cutter ARGUS (WMSM-915), commenced on January 7, 2019 at Eastern's facilities. ESG successfully achieved this milestone even with sustaining damage and work interruption due to Hurricane Michael. The cutting of steel will start the fabrication and assembly of the cutter's hull, and ESG is to complete keel laying of ARGUS later this year. Additionally, ESG completed the placement of orders for all long lead time materials for OPC #2, Coast Guard Cutter CHASE (WMSM-916). Eastern's President Mr. Joey D'Isernia noted the following: \"Today represents a monumental day and reflects the dedication of our workforce - the ability to overcome and perform even under the most strenuous circumstances and impacts of Hurricane Michael. ESG families have been dramatically impacted by the storm, and we continue to recover and help rebuild our shipyard and community. I cannot overstate enough how appreciative we are of all of our subcontractors and vendors contributions to our families during the recovery as well as the support we have received from our community partners. Hurricane Michael may have left its marks but it only strengthened our resolve to build the most sophisticated, highly capable national assets for the Coast Guard. Today's success is just the beginning of the construction of the OPCs at ESG by our dedicated team of shipbuilders and subcontractors for our customer and partner, the United States Coast Guard. We are excited for what will be a great 2019 for Eastern Shipbuilding Group and Bay County, Florida.\" A November 1, 2018, statement from Eastern Shipbuilding states that the firm resumed operations at both of its two main shipbuilding facilities just two weeks after Hurricane Michael devastated Panama City Florida and the surrounding communities…. … the majority of ESG's [Eastern Shipbuilding Group's] workforce has returned to work very quickly despite the damage caused by the storm. \"Our employees are a resourceful and resilient group of individuals with the drive to succeed in the face of adversity. This has certainly been proven by their ability to bounce back over the two weeks following the storm. Our employees have returned to work much faster than anticipated and brought with them an unbreakable spirit, that I believe sets this shipyard and our community apart\" said [Eastern Shipbuilding] President Joey D'Isernia. \"Today, our staffing levels exceed 80% of our pre-Hurricane Michael levels and is rising daily.\" Immediately following the storm, ESG set out on an aggressive initiative to locate all of its employees and help get them back on the job as soon as practical after they took necessary time to secure the safety and security of their family and home. Together with its network of friends, partners, and customers in the maritime community, ESG organized daily distribution of meals and goods to employees in need. Additionally, ESG created an interest free deferred payback loan program for those employees in need and has organized Go Fund Me account to help those employees hardest hit by the storm. ESG also knew temporary housing was going to be a necessity in the short term and immediately built a small community located on greenfield space near its facilities for those employees with temporary housing needs. ESG has worked closely with its federal, state and commercial partners over the past two weeks to provide updates on the shipyard as well as on projects currently under construction. Power was restored to ESG's Nelson Facility on 10-21-18 and at ESG's Allanton Facility on 10-24-18 and production of vessels under contract is ramping back up. Additionally, all of the ESG personnel currently working on the US Coast Guard's Offshore Patrol Cutter contract have returned to work…. \"We are grateful to our partners and the maritime business community as a whole for their support and confidence during the aftermath of this historic storm. Seeing our incredible employees get back to building ships last week was an inspiration,\" said D'Isernia. \"While there is no doubt that the effects of Hurricane Michael will linger with our community for years to come, I can say without reservation that we are open for business and excited about delivering quality vessels to our loyal customers.\" An October 22, 2018, press report states the following: U.S. Coast Guard officials and Eastern Shipbuilding Group are still assessing the damage caused by deadly category 4 Hurricane Michael to the Panama City, Fla.-based yard contracted to build the new class of Offshore Patrol Cutters. On September 28, the Coast Guard awarded Eastern Shipbuilding a contract to build the future USCGC Argus (WMSM-915), the first offshore patrol cutter (OPC). The yard was also set to build a second OPC, the future USCGC Chase (WMSM-916). Eastern Shipbuilding's contract is for nine OPCs, with options for two additional cutters. Ultimately, the Coast Guard plans to buy 25 OPCs. However, just as the yard was preparing to build Argus , Hurricane Michael struck the Florida Panhandle near Panama City on October 10. Workers from the shipyard and Coast Guard project managers evacuated and are just now returning to assess damage to the yard facilities, Brian Olexy, communications manager for the Coast Guard's Acquisitions Directorate, told USNI News. \"Right now we haven't made any decisions yet on shifts in schedule,\" Olexy said…. Since the yard was just the beginning stages of building Argus , Olexy said the hull wasn't damaged. \"No steel had been cut,\" he said. Eastern Shipbuilding is still in the process of assessing damage to the yard and trying to reach its workforce. Many employees evacuated the area and have not returned, or are in the area but lost their homes, Eastern Shipbuilding spokesman Justin Smith told USNI News. At first, about 200 workers returned to work, but by week's end about 500 were at the yard, Smith said. The company is providing meals, water, and ice for its workforce. \"Although we were significantly impacted by this catastrophic weather event, we are making great strides each day thanks to the strength and resiliency of our employees,\" Joey D'Isernia, president of Eastern Shipbuilding, said in a statement. Another issue for Congress concerns the Coast Guard's planned NSC, OPC, and FRC procurement quantities. The POR's planned force of 91 NSCs, OPCs, and FRCs is about equal in number to the Coast Guard's legacy force of 90 high-endurance cutters, medium-endurance cutters, and 110-foot patrol craft. NSCs, OPCs, and FRCs, moreover, are to be individually more capable than the older ships they are to replace. Even so, Coast Guard studies have concluded that the planned total of 91 NSCs, OPCs, and FRCs would provide 61% of the cutters that would be needed to fully perform the service's statutory missions in coming years, in part because Coast Guard mission demands are expected to be greater in coming years than they were in the past. For further discussion of this issue, about which CRS has testified and reported on since 2005, see Appendix A . Table 2 summarizes appropriations action on the Coast Guard's request for FY2020 acquisition funding for the NSC, OPC, and FRC programs. Appendix A. Planned NSC, OPC, and FRC Procurement Quantities This appendix provides further discussion on the issue of the Coast Guard's planned NSC, OPC, and FRC procurement quantities. Overview The Coast Guard's program of record for NSCs, OPCs, and FRCs includes only about 61% as many cutters as the Coast Guard calculated in 2011 would be needed to fully perform its projected future missions. The Coast Guard's planned force levels for NSCs, OPCs, and FRCs have remained unchanged since 2004. In contrast, the Navy since 2004 has adjusted its ship force-level goals eight times in response to changing strategic and budgetary circumstances. Although the Coast Guard's strategic situation and resulting mission demands may not have changed as much as the Navy's have since 2004, the Coast Guard's budgetary circumstances may have changed since 2004. The 2004 program of record was heavily conditioned by Coast Guard expectations in 2004 about future funding levels in the PC&I account. Those expectations may now be different, as suggested by the willingness of Coast Guard officials in 2017 to begin regularly mentioning the need for an PC&I funding level of $2 billion per year (see Appendix B ). It can also be noted that continuing to, in effect, use the Coast Guard's 2004 expectations of future funding levels for the PC&I account as an implicit constraint on planned force levels for NSCs, OPCs, and FRCs can encourage an artificially narrow view of Congress's options regarding future Coast Guard force levels and associated funding levels, depriving Congress of agency in the exercise of its constitutional power to provide for the common defense and general welfare of the United States, and to set funding levels and determine the composition of federal spending. 2009 Coast Guard Fleet Mix Analysis The Coast Guard estimated in 2009 that with the POR's planned force of 91 NSCs, OPCs, and FRCs, the service would have capability or capacity gaps in 6 of its 11 statutory missions—search and rescue (SAR); defense readiness; counterdrug operations; ports, waterways, and coastal security (PWCS); protection of living marine resources (LMR); and alien migrant interdiction operations (AMIO). The Coast Guard judges that some of these gaps would be \"high risk\" or \"very high risk.\" Public discussions of the POR frequently mention the substantial improvement that the POR force would represent over the legacy force. Only rarely, however, have these discussions explicitly acknowledged the extent to which the POR force would nevertheless be smaller in number than the force that would be required, by Coast Guard estimate, to fully perform the Coast Guard's statutory missions in coming years. Discussions that focus on the POR's improvement over the legacy force while omitting mention of the considerably larger number of cutters that would be required, by Coast Guard estimate, to fully perform the Coast Guard's statutory missions in coming years could encourage audiences to conclude, contrary to Coast Guard estimates, that the POR's planned force of 91 cutters would be capable of fully performing the Coast Guard's statutory missions in coming years. In a study completed in December 2009 called the Fleet Mix Analysis (FMA) Phase 1, the Coast Guard calculated the size of the force that in its view would be needed to fully perform the service's statutory missions in coming years. The study refers to this larger force as the objective fleet mix. Table A-1 compares planned numbers of NSCs, OPCs, and FRCs in the POR to those in the objective fleet mix. As can be seen in Table A-1 , the objective fleet mix includes 66 additional cutters, or about 73% more cutters than in the POR. Stated the other way around, the POR includes about 58% as many cutters as the 2009 FMA Phase I objective fleet mix. As intermediate steps between the POR force and the objective fleet mix, FMA Phase 1 calculated three additional forces, called FMA-1, FMA-2, and FMA-3. (The objective fleet mix was then relabeled FMA-4.) Table A-2 compares the POR to FMAs 1 through 4. FMA-1 was calculated to address the mission gaps that the Coast Guard judged to be \"very high risk.\" FMA-2 was calculated to address both those gaps and additional gaps that the Coast Guard judged to be \"high risk.\" FMA-3 was calculated to address all those gaps, plus gaps that the Coast Guard judged to be \"medium risk.\" FMA-4—the objective fleet mix—was calculated to address all the foregoing gaps, plus the remaining gaps, which the Coast Guard judge to be \"low risk\" or \"very low risk.\" Table A-3 shows the POR and FMAs 1 through 4 in terms of their mission performance gaps. Figure A-1 , taken from FMA Phase 1, depicts the overall mission capability/performance gap situation in graphic form. It appears to be conceptual rather than drawn to precise scale. The black line descending toward 0 by the year 2027 shows the declining capability and performance of the Coast Guard's legacy assets as they gradually age out of the force. The purple line branching up from the black line shows the added capability from ships and aircraft to be procured under the POR, including the 91 planned NSCs, OPCs, and FRCs. The level of capability to be provided when the POR force is fully in place is the green line, labeled \"2005 Mission Needs Statement.\" As can be seen in the graph, this level of capability is substantially below a projection of Coast Guard mission demands made after the terrorist attacks of September 11, 2001 (the red line, labeled \"Post-9/11 CG Mission Demands\"), and even further below a Coast Guard projection of future mission demands (the top dashed line, labeled \"Future Mission Demands\"). The dashed blue lines show future capability levels that would result from reducing planned procurement quantities in the POR or executing the POR over a longer time period than originally planned. FMA Phase 1 was a fiscally unconstrained study, meaning that the larger force mixes shown in Table A-2 were calculated primarily on the basis of their capability for performing missions, rather than their potential acquisition or life-cycle operation and support (O&S) costs. Although the FMA Phase 1 was completed in December 2009, the figures shown in Table A-2 were generally not included in public discussions of the Coast Guard's future force structure needs until April 2011, when GAO presented them in testimony. GAO again presented them in a July 2011 report. The Coast Guard completed a follow-on study, called Fleet Mix Analysis (FMA) Phase 2, in May 2011. Among other things, FMA Phase 2 includes a revised and updated objective fleet mix called the refined objective mix. Table A-4 compares the POR to the objective fleet mix from FMA Phase 1 and the refined objective mix from FMA Phase 2. As can be seen in Table A-4 , compared to the objective fleet mix from FMA Phase 1, the refined objective mix from FMA Phase 2 includes 49 OPCs rather than 57. The refined objective mix includes 58 additional cutters, or about 64% more cutters than in the POR. Stated the other way around, the POR includes about 61% as many cutters as the refined objective mix. Compared to the POR, the larger force mixes shown in Table A-2 and Table A-4 would be more expensive to procure, operate, and support than the POR force. Using the average NSC, OPC, and FRC procurement cost figures presented earlier (see \" Background \"), procuring the 58 additional cutters in the Refined Objective Mix from FMA Phase 2 might cost an additional $10.7 billion, of which most (about $7.8 billion) would be for the 24 additional FRCs. (The actual cost would depend on numerous factors, such as annual procurement rates.) O&S costs for these 58 additional cutters over their life cycles (including crew costs and periodic ship maintenance costs) would require billions of additional dollars. The larger force mixes in the FMA Phase 1 and 2 studies, moreover, include not only increased numbers of cutters, but also increased numbers of Coast Guard aircraft. In the FMA Phase 1 study, for example, the objective fleet mix included 479 aircraft—93% more than the 248 aircraft in the POR mix. Stated the other way around, the POR includes about 52% as many aircraft as the objective fleet mix. A decision to procure larger numbers of cutters like those shown in Table A-2 and Table A-4 might thus also imply a decision to procure, operate, and support larger numbers of Coast Guard aircraft, which would require billions of additional dollars. The FMA Phase 1 study estimated the procurement cost of the objective fleet mix of 157 cutters and 479 aircraft at $61 billion to $67 billion in constant FY2009 dollars, or about 66% more than the procurement cost of $37 billion to $40 billion in constant FY2009 dollars estimated for the POR mix of 91 cutters and 248 aircraft. The study estimated the total ownership cost (i.e., procurement plus life-cycle O&S cost) of the objective fleet mix of cutters and aircraft at $201 billion to $208 billion in constant FY2009 dollars, or about 53% more than the total ownership cost of $132 billion to $136 billion in constant FY2009 dollars estimated for POR mix of cutters and aircraft. A December 7, 2015, press report states the following: The Coast Guard's No. 2 officer said the small size and advanced age of its fleet is limiting the service's ability to carry out crucial missions in the Arctic and drug transit zones or to meet rising calls for presence in the volatile South China Sea. \"The lack of surface vessels every day just breaks my heart,\" VADM Charles Michel, the Coast Guard's vice commandant, said Dec. 7. Addressing a forum on American Sea Power sponsored by the U.S. Naval Institute at the Newseum, Michel detailed the problems the Coast Guard faces in trying to carry out its missions of national security, law enforcement and maritime safety because of a lack of resources. \"That's why you hear me clamoring for recapitalization,\" he said. Michel noted that China's coast guard has a lot more ships than the U.S. Coast Guard has, including many that are larger than the biggest U.S. cutter, the 1,800-ton [sic:4,800-ton] National Security Cutter. China is using those white-painted vessels rather than \"gray-hull navy\" ships to enforce its claims to vast areas of the South China Sea, including reefs and shoals claimed by other nations, he said. That is a statement that the disputed areas are \"so much our territory, we don't need the navy. That's an absolutely masterful use of the coast guard,\" he said. The superior numbers of Chinese coast guard vessels and its plans to build more is something, \"we have to consider when looking at what we can do in the South China Sea,\" Michel said. Although they have received requests from the U.S. commanders in the region for U.S. Coast Guard cutters in the South China Sea, \"the commandant had to say 'no'. There's not enough to go around,\" he said. Potential oversight questions for Congress include the following: Under the POR force mix, how large a performance gap, precisely, would there be in each of the missions shown in Table A-3 ? What impact would these performance gaps have on public safety, national security, and protection of living marine resources? How sensitive are these performance gaps to the way in which the Coast Guard translates its statutory missions into more precise statements of required mission performance? Given the performance gaps shown in Table A-3 , should planned numbers of Coast Guard cutters and aircraft be increased, or should the Coast Guard's statutory missions be reduced, or both? How much larger would the performance gaps in Table A-3 be if planned numbers of Coast Guard cutters and aircraft are reduced below the POR figures? Has the executive branch made sufficiently clear to Congress the difference between the number of ships and aircraft in the POR force and the number that would be needed to fully perform the Coast Guard's statutory missions in coming years? Why has public discussion of the POR focused mostly on the capability improvement it would produce over the legacy force and rarely on the performance gaps it would have in the missions shown in Table A-3 ? Appendix B. Funding Levels in PC&I Account This appendix provides background information on funding levels in the Coast Guard's Procurement, Construction, and Improvements (PC&I) account. Overview As shown in Table B-1 , the FY2013 budget submission programmed an average of about $1.5 billion per year in the PC&I account. As also shown in the table, the FY2014-FY2016 budget submissions reduced that figure to between $1 billion and $1.2 billion per year. The Coast Guard has testified that funding the PC&I account at a level of about $1 billion to $1.2 billion per year would make it difficult to fund various Coast Guard acquisition projects, including a new polar icebreaker and improvements to Coast Guard shore installations. Coast Guard plans call for procuring OPCs at an eventual rate of two per year. If each OPC costs roughly $400 million, procuring two OPCs per year in an PC&I account of about $1 billion to $1.2 billion per year, as programmed under the FY2014-FY2016 budget submissions, would leave about $200 million to $400 million per year for all other PC&I-funded programs. Since 2017, Coast Guard officials have been stating more regularly what they stated only infrequently in earlier years: that executing the Coast Guard's various acquisition programs fully and on a timely basis would require the PC&I account to be funded in coming years at a level of about $2 billion per year. Statements from Coast Guard officials on this issue in past years have sometimes put this figure as high as about $2.5 billion per year. Using Past PC&I Funding Levels as a Guide for Future PC&I Funding Levels In assessing future funding levels for executive branch agencies, a common practice is to assume or predict that the figure in coming years will likely be close to where it has been in previous years. While this method can be of analytical and planning value, for an agency like the Coast Guard, which goes through periods with less acquisition of major platforms and periods with more acquisition of major platforms, this approach might not always be the best approach, at least for the PC&I account. More important, in relation to maintaining Congress's status as a co-equal branch of government, including the preservation and use of congressional powers and prerogatives, an analysis that assumes or predicts that future funding levels will resemble past funding levels can encourage an artificially narrow view of congressional options regarding future funding levels, depriving Congress of agency in the exercise of its constitutional power to set funding levels and determine the composition of federal spending. Past Coast Guard Statements About Required PC&I Funding Level At an October 4, 2011, hearing on the Coast Guard's major acquisition programs before the Coast Guard and Maritime Transportation subcommittee of the House Transportation and Infrastructure Committee, the following exchange occurred: REPRESENATIVE FRANK LOBIONDO: Can you give us your take on what percentage of value must be invested each year to maintain current levels of effort and to allow the Coast Guard to fully carry out its missions? ADMIRAL ROBERT J. PAPP, COMMANDANT OF THE COAST GUARD: I think I can, Mr. Chairman. Actually, in discussions and looking at our budget—and I'll give you rough numbers here, what we do now is we have to live within the constraints that we've been averaging about $1.4 billion in acquisition money each year. If you look at our complete portfolio, the things that we'd like to do, when you look at the shore infrastructure that needs to be taken care of, when you look at renovating our smaller icebreakers and other ships and aircraft that we have, we've done some rough estimates that it would really take close to about $2.5 billion a year, if we were to do all the things that we would like to do to sustain our capital plant. So I'm just like any other head of any other agency here, as that the end of the day, we're given a top line and we have to make choices and tradeoffs and basically, my tradeoffs boil down to sustaining frontline operations balancing that, we're trying to recapitalize the Coast Guard and there's where the break is and where we have to define our spending. An April 18, 2012, blog entry stated the following: If the Coast Guard capital expenditure budget remains unchanged at less than $1.5 billion annually in the coming years, it will result in a service in possession of only 70 percent of the assets it possesses today, said Coast Guard Rear Adm. Mark Butt. Butt, who spoke April 17 [2012] at [a] panel [discussion] during the Navy League Sea Air Space conference in National Harbor, Md., echoed Coast Guard Commandant Robert Papp in stating that the service really needs around $2.5 billion annually for procurement. At a May 9, 2012, hearing on the Coast Guard's proposed FY2013 budget before the Homeland Security subcommittee of the Senate Appropriations Committee, Admiral Papp testified, \"I've gone on record saying that I think the Coast Guard needs closer to $2 billion dollars a year [in acquisition funding] to recapitalize—[to] do proper recapitalization.\" At a May 14, 2013, hearing on the Coast Guard's proposed FY2014 budget before the Homeland Security Subcommittee of the Senate Appropriations Committee, Admiral Papp stated the following regarding the difference between having about $1.0 billion per year rather than about $1.5 billion per year in the PC&I account: Well, Madam Chairman, $500 million—a half a billion dollars—is real money for the Coast Guard. So, clearly, we had $1.5 billion in the [FY]13 budget. It doesn't get everything I would like, but it—it gave us a good start, and it sustained a number of projects that are very important to us. When we go down to the $1 billion level this year, it gets my highest priorities in there, but we have to either terminate or reduce to minimum order quantities for all the other projects that we have going. If we're going to stay with our program of record, things that have been documented that we need for our service, we're going to have to just stretch everything out to the right. And when we do that, you cannot order in economic order quantities. It defers the purchase. Ship builders, aircraft companies—they have to figure in their costs, and it inevitably raises the cost when you're ordering them in smaller quantities and pushing it off to the right. Plus, it almost creates a death spiral for the Coast Guard because we are forced to sustain older assets—older ships and older aircraft—which ultimately cost us more money, so it eats into our operating funds, as well, as we try to sustain these older things. So, we'll do the best we can within the budget. And the president and the secretary have addressed my highest priorities, and we'll just continue to go on the—on an annual basis seeing what we can wedge into the budget to keep the other projects going. At a March 12, 2014, hearing on the Coast Guard's proposed FY2015 budget before the Homeland Security subcommittee of the House Appropriations Committee, Admiral Papp stated the following: Well, that's what we've been struggling with, as we deal with the five-year plan, the capital investment plan, is showing how we are able to do that. And it will be a challenge, particularly if it sticks at around $1 billion [per year]. As I've said publicly, and actually, I said we could probably—I've stated publicly before that we could probably construct comfortably at about 1.5 billion [dollars] a year. But if we were to take care of all the Coast Guard's projects that are out there, including shore infrastructure that that fleet that takes care of the Yemen [sic: inland] waters is approaching 50 years of age, as well, but I have no replacement plan in sight for them because we simply can't afford it. Plus, we need at some point to build a polar icebreaker. Darn tough to do all that stuff when you're pushing down closer to 1 billion [dollars per year], instead of 2 billion [dollars per year]. As I said, we could fit most of that in at about the 1.5 billion [dollars per year] level, but the projections don't call for that. So we are scrubbing the numbers as best we can. At a March 24, 2015, hearing on the Coast Guard's proposed FY2016 budget before the Homeland Security subcommittee of the House Appropriations Committee, Admiral Paul Zukunft, Admiral Papp's successor as Commandant of the Coast Guard, stated the following: I look back to better years in our acquisition budget when we had a—an acquisition budget of—of $1.5 billion. That allows me to move these programs along at a much more rapid pace and, the quicker I can build these at full-rate production, the less cost it is in the long run as well. But there's an urgent need for me to be able to deliver these platforms in a timely and also in an affordable manner. But to at least have a reliable and a predictable acquisition budget would make our work in the Coast Guard much easier. But when we see variances of—of 30, 40% over a period of three or four years, and not knowing what the Budget Control Act may have in store for us going on, yes, we are treading water now but any further reductions, and now I am—I am beyond asking for help. We are taking on water. An April 13, 2017, press report states the following (emphasis added): Coast Guard Commandant Adm. Paul Zukunft on Wednesday [April 12] said that for the Coast Guard to sustain its recapitalization plans and operations the service needs a $2 billion annual acquisition budget that grows modestly overtime to keep pace with inflation. The Coast Guard needs a \"predictable, reliable\" acquisition budget \"and within that we need 5 percent annual growth to our operations and maintenance (O&M) accounts,\" Zukunft told reporters at a Defense Writers Group breakfast. Inflation will clip 2 to 3 percent from that, but \"at 5 percent or so it puts you on a moderate but positive glide slope so you can execute, so you can build the force,\" he said. In an interview published on June 1, 2017, Zukunft said the following (emphasis added): We cannot be more relevant than we are now. But what we need is predictable funding. We have been in over 16 continuing resolutions since 2010. I need stable and repeatable funding. An acquisition budget with a floor of $2 billion. Our operating expenses as I said, they've been funded below the Budget Control Act floor for the past five years. I need 5 percent annualized growth over the next five years and beyond to start growing some of this capability back. But more importantly, we [need] more predictable, more reliable funding so we can execute what we need to do to carry out the business of the world's best Coast Guard. Appendix C. Additional Information on Status and Execution of NSC, OPC, and FRC Programs from May 2018 GAO Report This appendix presents additional information on the status and execution of the NSC, OPC, and FRC programs from a May 2018 GAO report reviewing DHS acquisition programs. NSC Program Regarding the NSC program, the May 2018 GAO report states the following: DHS's Under Secretary for Management (USM) directed the USCG to complete follow-on operational test and evaluation (OT&E) by March 2019. According to USCG officials, the program's OTA began follow-on OT&E in October 2017, which will test unmet key performance parameters (KPP) and address deficiencies found during prior testing. The NSC completed initial operational testing in 2014, but did not fully demonstrate 7 of its 19 KPPs, including those related to unmanned aircraft and cutter-boat deployment in rough seas. According to USCG officials, operators have since demonstrated these KPPs during USCG operations. For example, USCG officials stated that they successfully demonstrated operations of a prototype unmanned aircraft on an NSC. However, the USCG will not evaluate the NSC's unmanned aircraft KPP until the unmanned aircraft undergoes initial OT&E, currently planned for June 2019. In addition, the NSC will be the first USCG asset to undergo cybersecurity testing. However, this test has been delayed over a year with the final cyber test event scheduled for August 2018 because of a change in NSC operational schedules, among other things. The DHS USM also directed the USCG to complete a study to determine the root cause of the NSC's propulsion system issues by December 2017; however, as of January 2018, the study was not yet complete. GAO previously reported on these issues—including high engine temperatures, cracked cylinder heads, and overheating generator bearings that were impacting missions—in January 2016.... The USCG initially planned to implement a crew rotational concept in which crews would rotate while NSCs were underway to achieve a goal of 230 days away from the cutter's homeport. In February 2018, USCG officials told GAO they abandoned the crew rotational concept because the concept did not provide the USCG with the expected return on investment. Instead, USCG officials said a new plan has been implemented that does not rotate crew and is anticipated to increase the days away from home port from the current capability of 185 days to 200 days. OPC Program Regarding the OPC program, the May 2018 GAO report states the following: DHS approved six key performance parameters (KPP) for the OPC related to the ship's operating range and duration, crew size, interoperability and maneuverability, and ability to support operations in moderate to rough seas. The first OPC has not yet been constructed, so the USCG has not yet demonstrated whether it can meet these KPPs. The USCG plans to use engineering reviews, and developmental and operational tests throughout the acquisition to measure the OPC's performance. USCG officials told GAO that the program completed an early operational assessment on the basic ship design in August 2017, which entailed a review of the current design plans. The program plans to refine the ship's design as needed based on preliminary test results. However, as of December 2017, USCG officials had not received the results of this assessment. The USCG plans to conduct initial operational test and evaluation (OT&E) on the first OPC in fiscal year 2023. However, the test results from initial OT&E will not be available to inform key decisions. For example, the results will not be available to inform the decision to build 2 OPCs per year—which USCG officials said is scheduled to begin in fiscal year 2021. Without test results to inform these key decisions, the USCG must make substantial commitments prior to knowing how well the ship will meet its requirements.... The USCG is in the process of completing the design of the OPC before starting construction, which is in-line with GAO shipbuilding best practices. In addition, USCG officials stated that the program is using state-of-the-market technology that has been proven on other ships as opposed to state-of-the-art technology, which lowers the risk of the program. FRC Program Regarding the FRC program, the May 2018 GAO report states the following: In February 2017, DHS's Director, Office of Test and Evaluation (DOT&E) assessed the results from the program's July 2016 follow-on operational test and evaluation (OT&E) and determined that • the program met its six key performance parameters, and • the FRC was operationally effective and suitable. During follow-on OT&E, the OTA found that several deficiencies from the program's initial OT&E had been corrected. For example, the OTA closed a severe deficiency related to the engines based on modifications to the FRC's main diesel engines. However, five major deficiencies remain. According to USCG officials, the remaining deficiencies are related to ergonomics (e.g., improving the working environment for operators) and issues with stowage space. USCG officials stated that they plan to resolve the remaining deficiencies by fiscal year 2020. DOT&E noted that these deficiencies do not prevent mission completion or present a danger to personnel, but recommended that they be resolved as soon as possible. USCG officials indicated that they plan to resolve the remaining deficiencies through engineering or other changes.... The USCG continues to work with the contractor—Bollinger Shipyards, LLC—to address issues covered by the warranty and acceptance clauses for each ship. For example, 18 engines—9 operational engines and 9 spare engines—have been replaced under the program's warranty. According to USCG documentation, 65 percent of the current issues with the engines have been resolved through retrofits; however, additional problems with the engines have been identified since our April 2017 review. For example, issues with water pump shafts are currently being examined through a root cause analysis and will be redesigned and are scheduled to undergo retrofits starting in December 2018. We previously found that the FRC's warranty resulted in improved cost and quality by requiring the shipbuilder to pay for the repair of defects. As of September 2017, USCG officials said the replacements and retrofits completed under the program's warranty allowed the USCG to avoid an estimated $104 million in potential unplanned costs—of which $63 million is related to the engines. For a discussion of some considerations relating to warranties in shipbuilding and other acquisition programs, see Appendix D . Appendix D. Some Considerations Relating to Warranties in Shipbuilding and Other Acquisition Programs This appendix presents some considerations relating to warranties in shipbuilding and other defense acquisition. In discussions of Navy and Coast Guard shipbuilding, one question that sometimes arises is whether including a warranty in a shipbuilding contract is preferable to not including one. Including a warranty in a shipbuilding contract (or a contract for building some other kind of military end item), while potentially valuable, might not always be preferable to not including one—it depends on the circumstances of the acquisition, and it is not necessarily a valid criticism of an acquisition program to state that it is using a contract that does not include a warranty (or a weaker form of a warranty rather than a stronger one). Including a warranty generally shifts to the contractor the risk of having to pay for fixing problems with earlier work. Although that in itself could be deemed desirable from the government's standpoint, a contractor negotiating a contract that will have a warranty will incorporate that risk into its price, and depending on how much the contractor might charge for doing that, it is possible that the government could wind up paying more in total for acquiring the item (including fixing problems with earlier work on that item) than it would have under a contract without a warranty. When a warranty is not included in the contract and the government pays later on to fix problems with earlier work, those payments can be very visible, which can invite critical comments from observers. But that does not mean that including a warranty in the contract somehow frees the government from paying to fix problems with earlier work. In a contract that includes a warranty, the government will indeed pay something to fix problems with earlier work—but it will make the payment in the less-visible (but still very real) form of the up-front charge for including the warranty, and that charge might be more than what it would have cost the government, under a contract without a warranty, to pay later on for fixing those problems. From a cost standpoint, including a warranty in the contract might or might not be preferable, depending on the risk that there will be problems with earlier work that need fixing, the potential cost of fixing such problems, and the cost of including the warranty in the contract. The point is that the goal of avoiding highly visible payments for fixing problems with earlier work and the goal of minimizing the cost to the government of fixing problems with earlier work are separate and different goals, and that pursuing the first goal can sometimes work against achieving the second goal. The Department of Defense's guide on the use of warranties states the following: Federal Acquisition Regulation (FAR) 46.7 states that \"the use of warranties is not mandatory.\" However, if the benefits to be derived from the warranty are commensurate with the cost of the warranty, the CO [contracting officer] should consider placing it in the contract. In determining whether a warranty is appropriate for a specific acquisition, FAR Subpart 46.703 requires the CO to consider the nature and use of the supplies and services, the cost, the administration and enforcement, trade practices, and reduced requirements. The rationale for using a warranty should be documented in the contract file.... In determining the value of a warranty, a CBA [cost-benefit analysis] is used to measure the life cycle costs of the system with and without the warranty. A CBA is required to determine if the warranty will be cost beneficial. CBA is an economic analysis, which basically compares the Life Cycle Costs (LCC) of the system with and without the warranty to determine if warranty coverage will improve the LCCs. In general, five key factors will drive the results of the CBA: cost of the warranty + cost of warranty administration + compatibility with total program efforts + cost of overlap with Contractor support + intangible savings. Effective warranties integrate reliability, maintainability, supportability, availability, and life-cycle costs. Decision factors that must be evaluated include the state of the weapon system technology, the size of the warranted population, the likelihood that field performance requirements can be achieved, and the warranty period of performance.", "summary": "The Coast Guard's program of record (POR) calls for procuring 8 National Security Cutters (NSCs), 25 Offshore Patrol Cutters (OPCs), and 58 Fast Response Cutters (FRCs) as replacements for 90 aging Coast Guard high-endurance cutters, medium-endurance cutters, and patrol craft. The Coast Guard's proposed FY2020 budget requests a total of $657 million in procurement funding for the NSC, OPC, and FRC programs. NSCs are the Coast Guard's largest and most capable general-purpose cutters; they are intended to replace the Coast Guard's 12 aged Hamilton-class high-endurance cutters. NSCs have an estimated average procurement cost of about $670 million per ship. Although the Coast Guard's POR calls for procuring a total of 8 NSCs to replace the 12 Hamilton-class cutters, Congress through FY2019 has funded 11 NSCs, including the 10th and 11th in FY2018. Six NSCs have been commissioned into service. The seventh was delivered to the Coast Guard on September 19, 2018, and the eighth was delivered on April 30, 2019. The ninth through 11th are under construction; the ninth is scheduled for delivery in 2021. The Coast Guard's proposed FY2020 budget requests $60 million in procurement funding for the NSC program; this request does not include funding for a 12th NSC. OPCs are to be smaller, less expensive, and in some respects less capable than NSCs; they are intended to replace the Coast Guard's 29 aged medium-endurance cutters. Coast Guard officials describe the OPC program as the service's top acquisition priority. OPCs have an estimated average procurement cost of about $421 million per ship. On September 15, 2016, the Coast Guard awarded a contract with options for building up to nine OPCs to Eastern Shipbuilding Group of Panama City, FL. The first OPC was funded in FY2018 and is to be delivered in 2021. The second OPC and long leadtime materials (LLTM) for the third were funded in FY2019. The Coast Guard's proposed FY2020 budget requests $457 million in procurement funding for the third OPC, LLTM for the fourth and fifth, and other program costs. FRCs are considerably smaller and less expensive than OPCs; they are intended to replace the Coast Guard's 49 aging Island-class patrol boats. FRCs have an estimated average procurement cost of about $58 million per boat. A total of 56 have been funded through FY2019, including six in FY2019. Four of the 56 are to be used by the Coast Guard in the Persian Gulf and are not counted against the Coast Guard's 58-ship POR for the program, which relates to domestic operations. Excluding these four OPCs, a total of 52 FRCs for domestic operations have been funded through FY2019. The 32nd FRC was commissioned into service on May 1, 2019. The Coast Guard's proposed FY2020 budget requests $140 million in acquisition funding for the procurement of two more FRCs for domestic operations. The NSC, OPC, and FRC programs pose several issues for Congress, including the following: whether to provide funding in FY2020 for the procurement of a 12th NSC; whether to fund the procurement in FY2020 of two FRCs, as requested by the Coast Guard, or some higher number, such as four or six; whether to use annual or multiyear contracting for procuring OPCs; the annual procurement rate for the OPC program; the impact of Hurricane Michael on Eastern Shipbuilding of Panama City, FL, the shipyard that is to build the first nine OPCs; and the planned procurement quantities for NSCs, OPCs, and FRCs.", "document_type": "crs"}
{"report": "T he United States has experienced a series of high-profile violent crimes where the offenders' actions appeared to be motivated by their bias or animosity towards a particular race, ethnicity, or religion. For example, shootings at synagogues in Pittsburgh, PA, and Poway, CA; a driver speeding his car into protestors at a \"Unite the Right\" rally in Charlottesville, VA; a shooting at a Walmart in El Paso, TX, where the shooter allegedly said he was targeting \"Mexicans\" and espoused concerns about the \"invasion\" of the United States by immigrants; and reports of hate crimes against Asian-Americans during the Coronavirus pandemic contribute to a perception that hate crimes are on the rise in the United States. The salience of these events and how they are covered in the media might also contribute to the perception that there is a growing number of hate crimes (also known as bias crimes or bias-motivated offenses) being perpetrated in communities across the country. Policymakers might turn to hate crime data collected by the Department of Justice (DOJ) to understand if there has actually been an increase in hate crimes in the United States and, if so, the nature of the increase. Policymakers might also utilize these same data to craft a policy response to hate crimes that is grounded in the data and conduct oversight of the federal government's efforts to combat these crimes. This report begins with an overview of federal sources of data on hate crimes. This includes a brief overview of the Hate Crime Statistics Act (HCSA, P.L. 101-275 ), which requires DOJ to collect and report data on hate crimes, and the two systems DOJ employs to collect these data: the Federal Bureau of Investigation's (FBI's) Hate Crime Statistics Program and the Bureau of Justice Statistics' (BJS') National Crime Victimization Survey (NCVS). The report then discusses two salient issues regarding hate crime statistics: the large difference between the number of hate crimes reported by the FBI and the number of hate crime victimizations reported by BJS, and concerns about law enforcement agencies underreporting hate crimes to the FBI. The report concludes with a discussion of whether the wide-scale adoption of the FBI's National Incident Based Reporting System (NIBRS) might serve as a means of improving federal hate crime data. The HCSA requires DOJ to collect and report data on crimes that \"manifest evidence of prejudice based on race, gender and gender identity, religion, disability, sexual orientation, or ethnicity, including where appropriate the crimes of murder, non-negligent manslaughter; forcible rape; aggravated assault, simple assault, intimidation; arson; and destruction, damage or vandalism of property.\" Congress required DOJ to collect these data because, at the time, few states collected data on hate crimes and there were no national data. Policymakers believed that national data would reveal the scope of the problem and provide a basis for more effective law enforcement efforts to address hate crimes. Over the years since the HCSA was enacted, Congress has expanded the definition of what constitutes a hate crime for data collection purposes. The act initially required DOJ to collect data on hate crimes based on race, religion, sexual orientation, or ethnicity. In 2009, Congress amended the act to require DOJ to collect data on hate crimes based on the victims' gender or gender identity ( P.L. 111-84 ) or disability ( P.L. 103-322 ). P.L. 111-84 also required DOJ to collect and report data on hate crimes committed by and against juveniles. The HCSA initially included a sunset provision that would have ended the requirement for DOJ to collect hate crime data after 1994. However, the Church Arson Prevention Act ( P.L. 104-155 ) removed that provision. To meet the requirements of the HCSA and subsequent amendments, DOJ collects and reports data on hate crimes that occur in the United States through two sources: the Hate Crime Statistics program and the NCVS. DOJ fulfills the HCSA's requirement by collecting supplemental data on hate crimes through the FBI's Uniform Crime Reporting (UCR) program. The Hate Crime Statistics Program collects data about hate crime offenders' bias motivations for the set of offenses already reported to the UCR program. Under the Hate Crime Statistics Program, the victim of a hate crime can be an individual, a business, an institution, or society as a whole. Hate Crime Statistics Program data is collected and reported to the FBI by law enforcement agencies across the country. Agency participation in the Hate Crime Statistics Program, like the UCR program, is voluntary but most agencies participate. In 2018, more than 16,100 law enforcement agencies in all 50 states and the District of Columbia participated in the Hate Crime Statistics Program. The agencies that participated represented jurisdictions that include nearly 307 million people. For a point of comparison, in 2008 there were a reported 17,985 state and local law enforcement agencies that employed at least one full-time officer or the equivalent in part-time officers. The FBI requires law enforcement agencies to use a two-step process for investigating hate crimes before reporting them to the Hate Crime Statistics Program. In the first step, the law enforcement officer that initially responds to a potential hate crime incident is responsible for determining whether there is any indication that the offense was motivated by bias against an individual's perceived membership in one of the groups specified in the HCSA. If there is an indication of a bias motivation, the incident is designated as a suspected bias-motivated crime and forwarded to an investigator. In the second step, the investigator is responsible for reviewing the facts of the incident and making the final determination as to whether the crime meets the HCSA definition of a hate crime. According to the FBI, an agency should only report an incident as a hate crime when a law enforcement investigation reveals sufficient evidence to lead a reasonable and prudent person to conclude that the offender's actions were motivated, in whole or in part, by his or her bias. Law enforcement agencies can submit data on single and multiple bias incidents. Single bias incidents are those in which one or more of the offenses committed during an incident are motivated by the same bias. Multiple bias incidents are those in which one or more of the offenses committed during an incident are motivated by two or more biases. Annual hate crime data published by the FBI differs from traditional UCR crime data published by the FBI in an important way. For most crimes, the FBI estimates full-year crime data for law enforcement agencies that submit less than 12 months of data to the UCR. In contrast, hate crime data published by the FBI only includes offenses reported by the police; no estimation for missing data is done by the FBI for the Hate Crime Statistics Program. BJS has collected data on hate crime victimizations through the NCVS since 2003. The NCVS data is collected through annual interviews with residents of a nationally representative sample of households. All people age 12 or older in the sampled households are interviewed. The NCVS collects self-reported data on non-fatal personal crime victimizations (sexual assault, robbery, aggravated and simple assaults, and personal larceny) and property crime victimizations (burglary, motor vehicle theft, and other thefts) regardless of whether the crimes were reported to the police. The NCVS uses the same HCSA definition of a hate crime as the FBI. The NCVS collects data on crimes that victims perceive to be motivated by an offender's bias against them based on their race, gender and gender identity, religion, disability, sexual orientation, or ethnicity. Hate crime victimizations are counts of \"a single victim or household that experienced a criminal incident believed by the victim to be motivated by hate.\" In the NCVS data, hate crime victimizations for personal crimes are counts of individual victims, while hate crime victimizations for property crimes are counts of victimized households. In order for a victimization to be classified as a hate crime in the NCVS, the victim has to report one of three types of evidence of the offender's bias: (1) the offender used hate language, (2) the offender left hate signs or symbols at the scene, or (3) police investigators confirmed that a hate crime occurred. Table 1 compares the methodologies of the UCR Hate Crime Statistics Program and the NCVS. A perennial issue that can cause confusion for those unfamiliar with the FBI's and BJS's data collection goals and methodologies is the difference between the number of hate crime incidents reported by the FBI and the number of hate crime victimizations reported by BJS. For example, for 2018 (the most recent data available) the FBI reported that there were approximately 7,100 hate crime incidents that involved approximately 8,800 victims. In comparison, BJS reported that there were an estimated 198,000 hate crime victimizations in 2017. What might explain the difference in the two national measures of hate crimes? The answer lies partially in the fact that the data reported by the FBI and BJS reflect different goals for collecting data on hate crimes. The FBI data only reflect hate crime incidents that are reported to law enforcement, and where law enforcement concludes that a hate crime has occurred and reports it to the FBI's Hate Crime Statistics Program. In contrast, the goal of the NCVS hate crime data collection effort is to estimate the total number of hate crime victimizations that occur each year, including victimizations that are not reported to law enforcement agencies (i.e., a portion of the dark figure of crime). Because the NCVS collects data on reported and unreported hate crime victimizations, its totals will always be larger than the FBI's hate crime data. Another explanation for the difference between the two measures are the different standards needed to be met to be counted as a hate crime in the FBI's Hate Crime Statistics Program and the NCVS. For a hate crime to be counted by the FBI, law enforcement must have sufficient evidence that would lead a reasonable and prudent person to conclude that the offender's actions were motivated, in whole or in part, by his or her bias. In contrast, under the NCVS, an incident is counted as a hate crime if the victim believes that the offense was based on their race, ethnicity, religion, disability, sexual orientation, gender, or gender identity, and the offender used hate language, hate symbols, or a law enforcement investigation concluded that a hate crime had occurred. An independent investigation of the perceived bias is not necessary in every case for the NCVS interviewers to include the offense as a hate crime. The goals and methodologies described above help explain why the NCVS estimates of hate crime victimizations are higher than the number of hate crime incidents reported by the FBI. At the same time, the FBI's Hate Crime Statistics Program collects data on a larger number of victim types and crimes that may be motivated by the offender's bias than the NCVS. For example, the FBI collects data on bias motivated homicides and vandalisms, which are not be captured by the NCVS. Law enforcement agencies can also report data on hate crimes against individuals, businesses, religious institutions, other institutions, and society as a whole to the FBI, whereas the NCVS only collects data on hate crimes against individuals (i.e., personal crimes) and households (i.e., property crimes). A common criticism of the FBI's hate crime data is that a large proportion of participating law enforcement agencies report zero hate crimes in a given year ( zero-reporting agencies ), leading some advocacy groups to accuse the zero-reporting agencies of underreporting hate crimes. The evidence presented to support these accusations are discrepancies between hate crime figures reported by the FBI and the self-reported hate crime figures tabulated by community organizations serving the communities that are often the targets of hate crime (e.g., organizations serving the LGBTQ, Jewish, Muslim, or Arab communities). Research suggests that some law enforcement agencies have underreported the number of hate crime incidents to the FBI. In one study, researchers reviewed a sample of assault incident reports from seven local law enforcement agencies across the country that were not classified as hate crimes to see if there was any indication that the offenses had a bias motivation. Incidents where there was a clear indication that bias was a predominant motivating factor in the assault were coded as bias- motivated , and other incidents were coded as ambiguous if there was an indication of bias but also evidence of some other identifiable triggering event or alternative motivation. The study found that for some of the incidents, there was evidence that they were motivated by the alleged perpetrator's bias, but that these misclassification errors were relatively infrequent and varied by law enforcement agency. The estimated proportion of misclassified cases for each agency ranged from zero to 8% of all assault incidents when both bias- motivated and ambiguous incidents were considered and from zero to 3% when only bias- motivated cases were considered. While the proportion of misclassified assault cases for any individual agency is relatively low, if the percentage of misclassified cases reported in this study was generalizable to the universe of all assaults, it would account for thousands of hate crimes that were not reported to the Hate Crime Statistics Program. Another study of the accuracy of hate crime reporting utilized incident-based crime data (see discussion of expanding the National Incident Based Reporting System, below) from four local law enforcement agencies to evaluate whether hate crimes were being misclassified. This study looked at all criminal incidents, not just assaults, reported to the four agencies in 2008 and examined not only whether hate crimes were misclassified as non-bias-motivated offenses, but also whether non-bias-motivated offenses were wrongly classified as hate crimes and how these errors compared to misclassification errors for other non-hate crimes. This study found that undercounting of hate crimes was the most common misclassification error in the records they examined. The researchers noted that \"extending error rates to the population suggest that the estimated number of bias crimes that go unaccounted is noticeable.\" Even though the research described above did not focus on local law enforcement agencies who reported zero hate crimes, it is these agencies in particular that critics argue are likely to have underreported hate crimes. As shown in Figure 1 , the vast majority of agencies that participate in the Hate Crime Statistics Program are zero-reporting agencies, leading critics to assume that hate crimes are significantly underreported to the FBI. In order for a law enforcement agency to be considered a \"participant,\" it has to submit data on the number of hate crimes for at least part of the year or a letter signed by the police chief certifying that no hate crimes occurred that year in its jurisdiction. From 1996 to 2017, at least 80% of Hate Crime Statistics Program participating law enforcement agencies in any given year reported zero hate crimes. The proportion of participating law enforcement agencies that were zero-reporting agencies generally increased from 2001 to 2014. There was a slight decrease in this proportion after 2014, but in 2018 nearly 9 out of 10 participating law enforcement agencies reported zero hate crimes. Aside from misclassification errors, there are several reasons that might explain why a law enforcement agency does not report any hate crimes in a given year. The first, and most straightforward, reason is because no hate crimes occurred. Given that law enforcement agency jurisdictions include communities with as little as a few hundred residents, it is not implausible that some residents, especially those that live in very small and homogeneous communities, did not experience any hate crimes. Second, in order for a law enforcement agency to report a hate crime to the FBI, it must be reported to the police. Data from the NCVS indicates that on average, half of hate crime victimizations were not reported to the police from 2013 to 2017. Hate crime victims might choose not to report the incident to the police for a variety of reasons, including fear of retaliation, embarrassment that they were victimized, a belief that the crime was not motivated by the perpetrator's bias, lack of familiarity with a state's hate crime laws, distrust of law enforcement, a belief that law enforcement will not investigate the case, fear of being exposed as a member of the LGBTQ community, or fear of being re-traumatized by the criminal justice system. Even when a hate crime is reported to state and local law enforcement, an investigation must be conducted into the perceived bias to determine if the offense was bias-motivated before reporting it to the FBI as a hate crime. This step can be challenging for law enforcement agencies, especially small agencies with relatively few resources. When there is evidence that a hate crime might have occurred, law enforcement agencies have to complete additional investigative steps to determine whether an offense meets the statutory definition of a hate crime, and in some cases law enforcement officers might not be trained sufficiently on recognizing biases in crimes to conduct such investigations. Few states provide mandatory training for law enforcement officers on investigating, identifying, and reporting hate crimes, and in the states that do, there is little oversight to confirm that law enforcement officers are receiving the training and applying it correctly. Ambiguity in the circumstances surrounding hate crimes can also lead to an undercounting. Under the Hate Crime Statistics Program, law enforcement agencies report the number of hate crimes that were \"motivated in whole or in part by bias.\" Law enforcement officers might have difficulty applying this standard in cases where a bias motivation might not be obvious, especially when considering hate crimes that were motivated \"in part\" by an offender's bias. While a cross burning on the front yard of a black family's home is an unambiguous hate crime, in other cases the motivation of the alleged perpetrators might not be so clear. These ambiguous hate crimes can be classified into two categories: response/retaliation events and target-selection events. Response/retaliation events are those where the offense was first triggered by something other than bias, but at some point bias exacerbates the incident into a hate crime. For example, a white motorist and a black motorist get into a dispute because their cars were involved in an accident. However, after a few minutes, the white motorist assaults the black motorist while yelling racial slurs. In this case, the incident was not initiated because of the white motorist's bias against the black motorist, but the white motorist's bias eventually resulted in him assaulting the black motorist. Target-selection events are those where a target of a crime is selected because of the offender's bias against members of the group, but the offender's bias in not obvious. For example, someone might rob men leaving bars that are known to be frequented by same sex couples because the offender believes they will be less likely to report the offense because they might not want to be identified as being a member of the LGBTQ community. In addition to issues related to law enforcement officer training on identifying hate crimes for submission to the FBI, differences in how a hate crime is defined under state law and under the HCSA can create its own ambiguities. For example, gender identity is a protected class under the HCSA, but it might not be a recognized bias motivation under a state's laws. As such, if a law enforcement officer is more familiar with the state's hate crime definition, he or she might not identify an offense based on gender-bias as a potential hate crime. As one group of researchers noted: Even when potential bias crimes are reported to a participating agency, the agency must then recognize any indications of bias, determine whether the incident is bias motivated, document the motivation, and submit the incident to UCR. Empirical evidence suggests that the processing of bias-crime reporting across participating law enforcement agencies is variable and subject to much error and interpretation by local departments. Congress passed the HCSA with the intent of collecting national data on bias-motivated offenses that could be used to inform federal hate crime policy. While DOJ has taken steps to collect these data, the hate crime data reported by the FBI is incomplete and the NCVS self-reported hate crime victimization data likely includes incidents that would not meet the legal standard needed to be charged as hate crime. Hate crime data \"missing\" from the FBI's Hate Crime Statistics program results from a series of complications associated with collecting these data (e.g., victims might not report the offense to the police, law enforcement agencies might fail to correctly identify potential hate crimes, or law enforcement agencies might not routinely and systematically report hate crime data to the FBI). Policymakers may have an interest in what steps Congress could take to help improve the quality of the FBI's hate crime data. One option on the horizon might be the wide-scale adoption of the National Incident Based Reporting System (NIBRS). The FBI is in the process of phasing out the UCR summary reporting system and having all law enforcement agencies submit data through NIBRS. The FBI reports that it will begin collecting only NIBRS-compliant data from law enforcement agencies starting on January 1, 2021. To support state and local law enforcement agencies' transitions to NIBRS, state and local governments that are not certified as NIBRS compliant have been required since FY2018 to use 3% of their award under the Edward Byrne Memorial Justice Assistance Grant (JAG) program to achieve compliance. Compared to the UCR summary reporting system, NIBRS collects more data on a wider variety of offenses. NIBRS asks participating law enforcement agencies to collect and report incident-level data on offenders, victims, the relationship between victims and offenders, and the circumstances surrounding the incident for 52 different offenses. In comparison, the current summary reporting system is largely a tabulation of the number of eight Part I offenses reported to the police. As a part of NIBRS, reporting agencies can identify whether an offense was motivated by an offender's bias against the victim for each reported offense. Under the Hate Crime Statistics Program, law enforcement agencies that are not currently submitting NIBRS-compliant data submit a supplemental summary report to the FBI when there is evidence that one or more crimes in their jurisdiction involved a bias motivation. It has been argued that hate crime reporting will increase as more agencies adopt NIBRS because reporting the presence or absence of bias motivations is built into NIBRS. In addition to making it easier for law enforcement agencies to report hate crimes to the FBI, NIBRS provides data on a wider variety of offenses, including those that were motivated by offenders' bias against their victims, and data on the context of hate crimes (e.g., locations where hate crimes occur, the relationship between alleged perpetrators and victims of hate crimes, whether alleged offenders are residents of the community where they committed their offenses, the weapons used in the offenses (if any), and the types and seriousness of injuries sustained by hate crime victims). While the FBI might stop accepting crime data from non-NIBRS compliant law enforcement agencies next year, participation in the program is still voluntary. If a law enforcement agency does not believe it is worth the time and effort to adopt NIBRS and the state does not mandate that it participates in the program, there is no federal mandate or incentive for the agency to participate. Therefore, policymakers might have an interest in what steps Congress could take to promote wide-scale adoption of the program. Congress could consider placing a condition on a program such as JAG that would require law enforcement agencies to submit NIBRS data to the FBI or face a penalty under the program. However, the JAG program already provides a financial incentive to participate fully in the FBI's crime reporting program. Half of a state's allocation is based on its proportion of the average number of violent crimes reported in the United States over the past three years, and allocations for local governments are based on their proportion of the average number of violent crimes reported in the state over the past three years. The Bureau of Justice Assistance reports that NIBRS data will be used to calculate JAG awards once NIBRS replaces the summary reporting system. In addition, in order for local governments to be eligible for a direct award under the program, they have to have submitted violent crime data for 3 of the past 10 years. Yet, even with these incentives some law enforcement agencies in the United States do not participate in the UCR because compiling the data can be difficult and time consuming, and many small agencies might not have the resources needed to fully comply with the FBI's data collection and submission requirements. Thus, Congress could also consider authorizing a new grant program that would provide funding to state and local governments to cover expenses related to transitioning to NIBRS, such as purchasing new software and computers, or training officers on how to use NIBRS. While NIBRS might provide some administrative efficiency with regard to reporting hate crimes, it does not address some of the other issues law enforcement agencies currently have with reporting hate crimes through the UCR program. Implementing NIBRS does not address hate crime victims being reluctant to report an offense to the police, the need for training for law enforcement officers on how to identify potential hate crimes, or the need to improve law enforcement agencies processes for investigating potential hate crimes, nor will it resolve differences between the HCSA and state hate crime definitions.", "summary": "A relatively recent series of high-profile crimes where the offenders' actions appeared to be motivated by their bias or animosity towards a particular race, ethnicity, or religion might contribute to a perception that hate crimes are on the rise in the United States. These incidents might also generate interest among policymakers about how the federal government collects data on hate crimes committed in the United States. The Federal Bureau of Investigation (FBI) started its Hate Crime Statistics program pursuant to the requirement in the Hate Crime Statistics Act (HSCA, P.L. 101-275 ) that the Department of Justice (DOJ) collect and report data on crimes that \"manifest evidence of prejudice based on race, gender and gender identity, religion, disability, sexual orientation, or ethnicity, including where appropriate the crimes of murder, non-negligent manslaughter; forcible rape; aggravated assault, simple assault, intimidation; arson; and destruction, damage or vandalism of property.\" In addition to the FBI's Hate Crime Statistics program, DOJ also collects data on hate crime victimizations through the Bureau of Justice Statistics' (BJS') National Crime Victimization Survey (NCVS). The NCVS measures self-reported criminal victimizations including those perceived by victims to be motivated by an offender's bias against them for belonging to or being associated with a group largely identified by the characteristics outlined in the HSCA. Scholars, advocates, and members of the media have pointed out that there is a significant disparity between the number of hate crimes reported by the FBI each year and the number of hate crime victimizations reported by BJS. This has led some to criticize the hate crime data published by the FBI as an undercount of the number of hate crimes committed in the United States each year. However, this statistics gap can be partially explained by the different measures and methodologies utilized by the FBI and BJS to collect these data. For example, the FBI only reports on crimes that have been reported to the police, while BJS collects reports of criminal victimizations that may or may not meet the statutory definition of a hate crime and may or may not have been reported to the police. There are a number of reasons why some victims do not report their victimization to the police, including fear of reprisal, not wanting the offender to get in trouble, believing that police would not or could not do anything to help, and believing the crime to be a personal issue or too trivial to report. There are also several reasons why a hate crime that was reported to the police might not be subsequently reported to the FBI for their Hate Crime Statistics program. Deciding whether a crime meets the statutory definition of a hate crime requires law enforcement agencies to investigate allegations of hate crime motivations before making a final determination. Reporting by law enforcement agencies to the FBI might be hampered by the fact that some law enforcement agencies do not have the training necessary to investigate potential bias-motivated offenses effectively. In addition, differing definitions between the FBI and state statutes as to what constitutes a hate crime generate confusion as to which standard should be used to determine whether a hate crime occurred and should be reported. In 2021, the FBI plans to transition to the National Incident Based Reporting System (NIBRS) and will no longer accept non-NIBRS compliant data from law enforcement agencies. Policymakers might have an interest in how NIBRS differs from the FBI's current hate crime reporting program and whether full participation in NIBRS might improve the quality and completeness of federal hate crime data. However, like the FBI's current crime reporting program, participation in the NIBRS program is voluntary, and policymakers might consider steps Congress could take to promote wide-scale adoption of NIBRS.", "document_type": "crs"}
{"report": "The Coronavirus Disease 2019 (COVID-19) pandemic is affecting communities around the world and throughout the United States, with case counts growing daily. As private health insurance is the predominant source of health coverage in the United States, there is considerable congressional interest in understanding private health insurance coverage of health benefits related to COVID-19 diagnosis, treatment, and prevention. This report addresses frequently asked questions about covered benefits and consumer cost sharing related to COVID-19 testing, treatment, and a potential vaccine. It discusses recent legislation, references relevant existing federal requirements and recent administrative interpretations of them in relation to COVID-19, and notes state and private-sector actions. It begins with background information on types and regulation of private health insurance plans. The Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ) requires specified types of private health insurance plans to cover COVID-19 testing, administration of the test, and related items and services, without consumer cost sharing. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) further addresses private health insurance coverage of COVID-19 testing, and requires coverage of a potential vaccine and other preventive services without cost sharing, if they are recommended by specified federal entities. There are no federal requirements that specifically require coverage of COVID-19 treatment services. However, one or more existing federal requirements are potentially relevant, as discussed in this report. Some states have also announced requirements related to covered benefits and consumer costs, and some insurers have reported that they will voluntarily cover certain relevant benefits. This report discusses most U.S. private health insurance plans' coverage of health care items and services related to COVID-19, but it generally does not discuss the delivery of those services, insurers' payments to health care providers, or private health insurance coverage of other benefits. The Appendix lists Congressional Research Service (CRS) analysts who can discuss with congressional clients other topics of interest related to private health insurance and COVID-19, including types of plans and coverage of benefits not addressed in this report. Also beyond the scope of this report are public health coverage programs (e.g., Medicare); the domestic and international public health responses to COVID-19; and economic, human services, and other nonhealth issues. For further information on these topics, congressional clients can access the CRS Coronavirus Disease 2019 resources page at https://www.crs.gov/resources/coronavirus-disease-2019 . The information in this report is current as of its publication date and may be superseded by subsequent congressional or administrative action. Congressional clients may contact the report author and/or the experts listed in the Appendix for questions about further developments. In addition, Centers for Medicare & Medicaid Services (CMS) guidance related to private health insurance and COVID-19 is compiled on its website. The private health insurance market includes both the group market (largely made up of employer-sponsored insurance) and the individual market (which includes plans directly purchased from an insurer). The group market is divided into small- and large-group market segments; a small group is typically defined as a group of up to 50 individuals (e.g., employees), and a large group is typically defined as one with 51 or more individuals. Employers and other group health plan sponsors may purchase coverage from an insurer in the small- and large-group markets (i.e., they may fully insure ). Sponsors may instead finance coverage themselves (i.e., they may self-insure ). The individual and small-group markets include plans sold on and off the individual and small-group health insurance exchanges, respectively. Covered benefits, consumer costs, and other plan features may vary by plan, subject to applicable federal and state requirements. The federal government may regulate all the coverage types noted above (i.e., individual coverage, fully insured small- and large-group coverage, and self-insured group plans), and states may regulate all but self-insured group plans. Federal and state requirements may vary by coverage type. This report focuses on private-sector plans explained above. There are some variations of these coverage types, and there are other types of private health coverage arrangements, which may or may not be subject to the requirements discussed in this report, or for which there may be other policy questions related to COVID-19. These other coverage types are out of the scope of this report, but a number of them are identified in the Appendix , along with resources for further information. One coverage variation, grandfathered plans , is included in this report because it is explicitly referenced in legislation relevant to COVID-19 and private health insurance coverage. Grandfathered plans are individual or group plans in which at least one individual was enrolled as of enactment of the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 , as amended), and which continue to meet certain criteria. Plans that maintain their grandfathered status are exempt from some, but not all, federal requirements. Another type of coverage, short-term, limited duration insurance (STLDI or STLD plans), is also included in this report, because it is explicitly excluded from a coverage definition cited by relevant legislation. STLDI is coverage, generally sold in the individual market, which meets certain definitional criteria. The statutory definition of \"individual health insurance coverage\" excludes STLDI; thus, STLDI is exempt from complying with all federal health insurance requirements applicable to individual health insurance plans. The remainder of this report addresses private health insurance coverage of COVID-19 testing, treatment, and vaccination, when a vaccine becomes available. Where there are federal requirements related to such coverage, it is useful to understand the following: Is the service or item required to be covered? If so, is cost sharing allowed? In general, private health insurance cost sharing includes deductibles, coinsurance, and copayments. Are plans allowed to impose prior authorization or other medical management requirements? For example, some insurers require that they (the insurer) provide prior authorization for routine hospital inpatient care, and/or require that primary care physicians provide approval or referrals for specialty care, as a condition for covering the care. Does the coverage requirement depend on how or where the service or item is furnished (e.g., by an in-network versus out-of-network provider)? Under private insurance, benefit coverage and consumer cost sharing is often contingent upon whether the service or item is furnished by a provider that the insurer has contracted with (i.e., whether that provider is in network for a given plan). In instances where a contract between an insurer and provider does not exist, the provider is considered out of network . When does the coverage requirement go into effect? What types of plans are subject to the coverage requirement? To the extent that information is available, these issues are addressed with regard to private health insurance coverage of COVID-19 testing, treatment, and vaccination. Table 1 summarizes key information. Prior to the enactment of the FFCRA ( P.L. 116-127 ), there were no federal requirements specifically mandating private health insurance coverage of items or services related to COVID-19 testing. Section 6001 of the FFCRA requires most private health insurance plans to cover COVID-19 testing, administration of the test, and related items and services, as defined in the act. Per FFCRA, the coverage must be provided without consumer cost sharing, including deductibles, copayments, or coinsurance. Prior authorization or other medical management requirements are prohibited. The definition of testing that must be covered was expanded by Section 3201 of the CARES Act ( P.L. 116-136 ). In addition, the Department of Labor (DOL), Department of Health and Human Services (HHS), and the Treasury issued an FAQ document on April 11, 2020 (hereinafter, \"Tri-Agency April 11 FAQ\"), on the private health insurance coverage requirements in FFCRA and the CARES Act. Together, the acts and guidance require coverage of certain tests and services, as summarized below. Specified COVID-19 diagnostic tests, including both molecular (e.g., polymerase chain reaction, or PCR, tests) and serological tests (i.e., antibody tests), and the administration of such tests are covered. \"Items and services furnished to an individual during [visits, as specified below] that result in an order for or administration of [an applicable COVID-19 test], but only to the extent such items and services relate to the furnishing or administration of such product or to the evaluation of such individual for purposes of determining the need of such individual for such product.\" This definition could encompass additional diagnostic testing associated with the visit. However, it would not encompass treatment for COVID-19-associated illnesses. The coverage requirements apply to the specified items and services when furnished at visits including to health care provider offices, urgent care centers, emergency rooms, and \"nontraditional\" settings, including drive-through testing sites. The requirements apply to both in-person and telehealth visits. FFCRA does not specify whether its coverage requirements apply when the test is furnished by an out-of-network provider. However Section 3202 of the CARES Act addresses insurer payments to in-network and out-of-network providers. In addition, the Tri-Agency April 11 FAQ clarifies that the FFCRA coverage requirements apply both in network and out of network. The coverage requirements in FFCRA apply only to the specified items and services that are furnished during the COVID-19 public health emergency period described in that act, as of the date the FFCRA was enacted (March 18, 2020). These requirements apply to individual health insurance coverage and to small- and large-group plans, whether fully insured or self-insured. This includes grandfathered individual or group plans, which are exempt from certain other federal private health insurance requirements. Per the definition of individual health insurance coverage cited in the act, the requirements do not apply to STLDI. In recent weeks, some states have announced coverage requirements, and some insurers have clarified or expanded their policies, regarding coverage of COVID-19 testing, among other services. However, states cannot regulate self-insured plans, and insurer announcements do not necessarily apply to those plans either. FFCRA does apply to self-insured group plans in addition to the other plan types discussed above. To the extent that state requirements about or plans' voluntary coverage of COVID-19 testing did not extend as far as FFCRA and CARES Act requirements, the federal laws supersede them. However, state requirements and plans' voluntary coverage may exceed applicable federal requirements, as long as they do not prevent the implementation of any federal requirements. Even though federal law now requires most plans to cover specified COVID-19 testing services without cost sharing, it may be useful for consumers to contact their insurers or plan sponsors to understand their coverage. Subject to applicable federal and state requirements, coverage of the COVID-19 test and related services and items may vary by plan. Although FFCRA requires certain plans to cover specified COVID-19 testing services without cost sharing, neither FFCRA nor the CARES Act mandates coverage of COVID-19 treatment services. There is no federal requirement specifically mandating private health insurance coverage of items or services related to COVID-19 treatment. However, one or more existing federal requirements are potentially relevant, subject to state implementation and plan variation. There is a federal statutory requirement that certain plans cover a core set of 10 categories of essential health benefits (EHB). However, states, rather than the federal government, generally specify the benefit coverage requirements within those categories. Current regulation allows each state to select an EHB-benchmark plan. The benchmark plan serves as a reference plan on which plans subject to EHB requirements must substantially base their benefits packages. Because states select their own EHB-benchmark plans, there is considerable variation in EHB coverage from state to state. On March 5, 2020, and March 12, 2020, CMS issued guidance addressing the potential relevance of EHB requirements to coverage of COVID-19 treatment, among other benefits, subject to variation in states' EHB-benchmark plan designations. According to the March 12 document, \"all 51 EHB-benchmark plans currently provide coverage for the diagnosis and treatment of COVID-19\" (emphasis added), but coverage of specific benefits within the 10 categories of EHB (e.g., hospitalization, laboratory services) may vary by state and by plan. The March 12 document suggests that coverage of medically necessary hospitalizations would include coverage of medically necessary isolation and quarantine during the hospital admission, subject to state and plan variation. Quarantine in other settings, such as at home, is not a medical benefit. The document notes, \"however, other medical benefits that occur in the home that are required by and under the supervision of a medical provider, such as home health care or telemedicine, may be covered as EHB,\" subject to state and plan variation. The March 12 document confirms that \"exact coverage details and cost-sharing amounts for individual services may vary by plan, and some plans may require prior authorization before these services are covered.\" In other words, even where certain treatment items and services are required to be covered as EHB in a state, cost-sharing and medical management requirements could apply, subject to applicable federal and state requirements. In addition, cost sharing and other coverage details may vary for services furnished by out-of-network providers. Individual and fully insured small-group plans are subject to EHB requirements. Large-group plans, self-insured plans, grandfathered plans, and STLDI are not. Whether or not certain treatment services are defined as EHB in a state, other state benefit coverage requirements may be relevant to COVID-19 treatment. Plans may also voluntarily cover benefits. See \" State and Private-Sector Actions \" below. Other existing federal requirements are also relevant to consumer cost sharing on COVID-19 treatment services, to the extent that such treatments are covered by the consumer's plan, and largely to the extent that they are defined by a state as EHB. For example, plans must comply with annual l imits on consumers' out-of-pocket spending (i.e., cost sharing, including deductibles, coinsurance, and copayments) on in-network coverage of the EHB. If certain treatment services are defined as EHB in a state, and are furnished by an in-network provider, consumers' out-of-pocket costs for the plan year would be limited as discussed below. If certain treatment services are not defined as EHB in a state, and/or are furnished by out-of-network providers, this out-of-pocket maximum would not necessarily apply. In 2020, the out-of-pocket limits cannot exceed $8,150 for self-only coverage and $16,300 for coverage other than self-only. This means that once a consumer has spent up to that amount in cost sharing on applicable in-network benefits, the plan would cover 100% of remaining applicable costs for the plan year. The out-of-pocket maximum applies to individual health insurance coverage and to small- and large-group plans, whether fully insured or self-insured. The requirement does not apply to grandfathered plans or STLDI. As stated above, in recent weeks, some states have announced coverage requirements related to COVID-19 testing services and items, and some insurers have clarified or expanded their policies to include relevant coverage. Some of these state and insurer statements also address coverage of treatment services. However, as discussed above, states cannot regulate self-insured plans, and insurer announcements do not necessarily apply to those plans either. Coverage, cost sharing, and the application of medical management techniques (e.g., prior authorization) can vary by plan, subject to applicable federal and state requirements. It may be useful for consumers to contact their insurers or plan sponsors to understand their coverage of services and items related to COVID-19 treatment. As of the date of this report, there is no vaccine against COVID-19 approved by the Food and Drug Administration (FDA) for use in the United States, although several candidates are in development. Prior to the enactment of the CARES Act, there were no federal requirements specifically mandating private health insurance coverage of items or services related to a COVID-19 vaccine. However, per an existing federal requirement (Â§2713 of the Public Health Service Act [PHSA]) and its accompanying regulations, most plans must cover specified preventive health services without cost sharing. This includes any preventive service recommended with an A or B rating by the United States Preventive Services Task Force (USPSTF); or any immunization with a recommendation by the Advisory Committee on Immunization Practices (ACIP), adopted by the Centers for Disease Control and Prevention (CDC), for routine use for a given individual. These coverage requirements apply no sooner than one year after a new or revised recommendation is published. Requirements of PHSA Section 2713 apply to individual health insurance coverage and to small- and large-group plans, whether fully insured or self-insured. The requirements do not apply to grandfathered plans or to STLDI. By regulation, plans are generally not required to cover preventive services furnished out of network. They are allowed to use \"reasonable medical management\" techniques, within provided guidelines. Cost sharing for office visits associated with a furnished preventive service may or may not be allowed, as specified in regulation. Section 3203 of the CARES Act requires specified plansâthe same types as those subject to PHSA Section 2713âto cover a COVID-19 vaccine, when available, and potentially other COVID-19 preventive services, if they are recommended by ACIP or USPSTF, respectively. This coverage must be provided without cost sharing. Section 3203 also applies an expedited effective date for the required coverage: 15 business days after an applicable ACIP or USPSTF recommendation is published. Otherwise, requirements of Section 3203 mirror the existing requirements under PHSA Section 2713. The requirement to cover COVID-19 vaccination and other preventive services is not time limited, whereas the FFCRA requirement to cover COVID-19 testing is limited to the duration of a declared COVID-19 public health emergency. See \" Are Plans Required to Cover COVID-19 Testing? \" Some of the state and insurer announcements about coverage of COVID-19 benefits, discussed earlier in this report, reference coverage of a potential vaccine. However, pending development and approval of the vaccine, and pending the implementation of the CARES Act requirements related to COVID-19 vaccine coverage, it is premature to discuss potential variations in coverage of the vaccine at the state or plan level. It may still be useful for consumers to contact their insurers or plan sponsors to understand their coverage of services and items related to a potential COVID-19 vaccine. This report has focused on coverage of COVID-19 testing, treatment, and vaccination by most types of private health insurance plans. CRS analysts are also available to congressional clients to discuss other topics of interest related to private health insurance and COVID-19, including coverage of COVID-19 benefits by types of private plans not specifically addressed in this report; other issues related to private coverage of COVID-19 benefits; private coverage of certain other benefits of concern during this pandemic, or of services furnished via telehealth; and issues related to private health insurance enrollment and premium payments. The following table lists examples of such topics of interest, any relevant legislative or administrative resources, any relevant CRS resources, and names of appropriate CRS experts for the benefit of congressional clients. Besides the CRS reports listed below that provide background on relevant topics, also see CRS reports on health provisions in recent COVID-19 legislation: CRS Report R46316, Health Care Provisions in the Families First Coronavirus Response Act, P.L. 116-127 , and CRS Report R46334, Selected Health Provisions in Title III of the CARES Act (P.L. 116-136) . The information in this report is current as of its publication date and may be superseded by subsequent congressional or administrative action. Congressional clients may contact the report author and/or experts listed below for questions about further developments. In addition, CMS guidance related to private health insurance and COVID-19 is compiled on its website. ", "summary": "The Coronavirus Disease 2019 (COVID-19) pandemic is affecting communities around the world and throughout the United States, with case counts growing daily. As private health insurance is the predominant source of health coverage in the United States, there is considerable congressional interest in understanding private health insurance coverage of health benefits related to COVID-19. This report addresses frequently asked questions about private health insurance covered benefits and consumer cost sharing related to COVID-19 testing, treatment, and a potential vaccine. It discusses recent legislation, references existing federal requirements and recent administrative interpretations of them in relation to COVID-19, and notes state and private-sector actions. Federal and state health insurance requirements may relate to covered benefits and consumer cost sharing, among many other topics. These requirements can vary by coverage type (i.e., individual coverage, fully insured small- and large-group coverage, and self-insured plans). Covered benefits, consumer costs, and other plan features may vary by plan within each type of coverage, subject to applicable federal and state requirements. The following bullets summarize federal requirements related to coverage and cost sharing (which includes deductibles, coinsurance, and copayments) of COVID-19 testing, treatment, and vaccination. Additional details are addressed in the report, including the applicability of the requirements to different types of plans; whether the coverage requirements apply even when furnished by out-of-network providers; whether plans are allowed to impose prior authorization or other medical management techniques; and the applicable dates of any coverage requirements. COVID-19 Testing . The Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ), as amended by the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ), requires most private health insurance plans to cover COVID-19 testing, administration of the test, and related items and services, as defined by the acts. This coverage must be provided without consumer cost sharing. COVID-19 Treatment . There are no federal requirements that specifically require coverage of COVID-19 treatment. However, the existing federal requirement that certain plans cover a set of 10 categories of essential health benefits (EHB) is potentially relevant to coverage of COVID-19 treatment items and services, depending on state and plan variation with regard to implementation of this requirement. Even where treatment items and services are required to be covered as EHB, cost sharing could apply. COVID-19 Vaccine . As of the date of this report, there is no vaccine against COVID-19 approved by the Food and Drug Administration (FDA) for use in the United States, although several candidates are in development. The CARES Act requires most plans to cover a COVID-19 vaccine, when available, without cost sharing, if it is recommended by the Advisory Committee on Immunization Practices (ACIP). Similarly, most plans must cover, without cost sharing, any other COVID-19 preventive services that are recommended for use by the United States Preventive Services Task Force (USPSTF). Some states have also announced relevant requirements on the plans they regulate, and some insurers have reported that they will cover certain relevant benefits. Several organizations are tracking these announcements, as noted in this report. Congressional Research Service (CRS) experts on other topics related to private health insurance and COVID-19, including types of plans and coverage of benefits not addressed in this report, are listed in the Appendix for the benefit of congressional clients. For information on other COVID-19 issues, congressional clients can access the CRS Coronavirus Disease resources page at https://www.crs.gov/resources/coronavirus-disease-2019 .", "document_type": "crs"}
{"report": "T he Budget Control Act of 2011 (BCA; P.L. 112-25 ), which was signed into law on August 2, 2011, includes statutory limits on discretionary spending for FY2012-FY2021, often referred to as \"spending caps.\" There are currently separate annual limits for defense discretionary and nondefense discretionary spending. (The defense category consists only of discretionary spending in budget function 050, \"national defense.\" The nondefense category includes discretionary spending in all other budget functions. ) Each discretionary spending limit is enforced separately through sequestration. Discretionary spending that is provided for certain purposes is effectively exempt from the spending limits. This means that when compliance with the discretionary spending limits is evaluated, these special types of spending are treated differently: Adjustments . The law specifies that spending for certain activities, such as responding to a national emergency or fighting terrorism, will receive special budgetary treatment. This spending is most easily thought of as being exempt from, or an exception to, the spending limits. Formally, however, the BCA states that the enactment of such spending allows for a subsequent upward adjustment of the discretionary limits to accommodate the spending. As a result, these types of spending are referred to as \"adjustments.\" (The reference here to \"adjustments to the limits\" should be distinguished from statutory changes that have been enacted since 2011 increasing the spending limits.) These adjustments are not formally made until after the spending legislation has been enacted. Therefore, references to the discretionary spending limits typically refer to the spending limit level before the permitted adjustments have been included. 21 st Century Cures Act spending exempt from the limits . In addition to the adjustments specified in the BCA, the 21 st Century Cures Act (Division A of P.L. 114-255 ), enacted on December 13, 2016, provided that a limited amount of appropriations for specified purposes (at the National Institutes for Health and the Food and Drug Administration and for certain grants to respond to the opioid crisis) are to be subtracted from any cost estimate provided for the purpose of enforcing the discretionary spending limits. As of the date of this report, the Cures Act is unique in providing a statutory exemption of this kind. These adjustments and the Cures Act exemptions complicate conversations and information related to overall discretionary spending amounts. When references are made to total discretionary spending, those figures may include spending that is provided under the adjustments authority as well as the Cures Act exemptions. However, when references are made to the discretionary spending limits, typically they do not include the spending that occurs as part of the adjustments or the Cures Act exemptions. More information is provided below on each adjustment and the Cures Act. While the categories of spending described below are often thought of as being exempt from the spending limits, in fact the enactment of such spending allows for a subsequent upward adjustment of the discretionary limits to accommodate the spending. For this reason, we refer to these categories of spending as \"adjustments.\" Permissible adjustments to the discretionary spending limits are specified in Section 251(b) of the Balanced Budget and Emergency Deficit Control Act of 1985 (Title II of P.L. 99-177 (2)), unless otherwise noted. The Office of Management and Budget (OMB) is responsible for evaluating compliance with the discretionary spending limits. To provide transparency to the process of evaluating such compliance, OMB is required to submit sequestration reports to Congress. In these reports, and in the President's annual budget submission, OMB is required to calculate the permissible adjustments and to specify the discretionary spending limits for the fiscal year and each succeeding year. The sections below provide more detailed information on the adjustments. These adjustments vary greatly. Two adjustmentsâOverseas Contingency Operations (OCO) and emergency spendingâhave made up the vast majority of the spending. These adjustments are uncapped and can be used for broad purposes. Five other adjustments are capped and can be used for specific programs or purposes. Two additional adjustments address potential technical issues that can arise in enforcing the spending limits. The most recent adjustment totals provided by OMB can be seen in Figure 1 and are detailed in Table A-1 . Trends in adjustments amounts can be seen in Figure 2 . According to OMB, in the seven fiscal years since the discretionary spending limits were instituted, approximately $891 billion of spending has been provided under these adjustments. (This does not include levels for FY2019, which has not yet concluded.) Spending for OCO totaled approximately $646 billion during the period, making up 73% of the total spending permitted under the adjustments. Spending for OCO ranged from a low of approximately $74 billion (FY2015 and FY2016) to a high of approximately $104 billion (FY2017). Spending provided under the emergency spending designation totaled approximately $178 billion during the period, making up 20% of total spending provided under the adjustments. Most of this amount was provided for a single fiscal year (approximately $110 billion in FY2018). The other seven adjustments made up about 7% of total spending occurring under the adjustments. Adjustments are made to the spending limits to accommodate enacted spending that has been designated as being for Overseas Contingency Operations/Global War on Terrorism (referred to in this report as OCO). There is no statutory limit on the amount of spending that may be designated for OCO, meaning that Congress and the President can together designate any amount they agree upon. There is no statutory definition of what activities are eligible to be designated for OCO. The only requirements associated with this designation are that (1) the legislation must specify that the spending is for OCO, (2) each account within an appropriations bill that will be for OCO must be designated separatelyâmeaning that an entire bill that includes several separate accounts cannot have a \"blanket\" OCO designationâand (3) the President must also designate the spending as being for an OCO requirement. It is not unusual for Congress to include language stating that spending designated for OCO is available only if the President also designates it as being for OCO. Further, the language typically states that the President designate \"all such amounts\" or none. For example, in March 2018, the Consolidated Appropriations Act (CAA) of 2018 ( P.L. 115-141 ) included OCO designations for many accounts. Two such accounts are included below: Military Personnel , Army For an additional amount for \"Military Personnel, Army\", $2,683,694,000: Provided , That such amount is designated by the Congress for Overseas Contingency Operations/Global War on Terrorism pursuant to section 251(b)(2)(A)(ii) of the Balanced Budget and Emergency Deficit Control Act of 1985. Military Personnel, Navy For an additional amount for \"Military Personnel, Navy\", $377,857,000: Provided , That such amount is designated by the Congress for Overseas Contingency Operations/Global War on Terrorism pursuant to section 251(b)(2)(A)(ii) of the Balanced Budget and Emergency Deficit Control Act of 1985. In addition, Section 6 of the act stated: Each amount designated in this Act by the Congress for Overseas Contingency Operations/Global War on Terrorism pursuant to section 251(b)(2)(A)(ii) of the Balanced Budget and Emergency Deficit Control Act of 1985 shall be available (or rescinded, if applicable) only if the President subsequently so designates all such amounts and transmits such designations to the Congress. The President then formally designated the spending as being for OCO: In accordance with section 6 of the Consolidated Appropriations Act, 2018 (H.R. 1625; the \"Act\"), I hereby designate for Overseas Contingency Operations/Global War on Terrorism all funding (including the rescission of funds) and contributions from foreign governments so designated by the Congress in the Act pursuant to section 251(b)(2)(A) of the Balanced Budget and Emergency Deficit Control Act of 1985, as outlined in the enclosed list of accounts. The details of this action are set forth in the enclosed memorandum from the Director of the Office of Management and Budget. Not all of OCO spending falls within the statutory definition of defense (050). For example, in FY2017, of the approximate $104 billion of discretionary spending designated as OCO, $21 billion was in the nondefense category. Likewise, while a majority of OCO spending appears in the Department of Defense appropriations bill, it also commonly appears in the Department of State, Foreign Operations, and Related Programs appropriations bill as well as the Department of Homeland Security appropriations bill and the Military Construction, Veterans Affairs, and Related Agencies appropriations bill. Adjustments may also be made to the spending limits to accommodate enacted spending that has been designated as being an \"emergency requirement.\" There is no statutory limit on the amount of spending that may be designated for emergencies, meaning that Congress and the President can together designate any amount they agree upon. Likewise, there is no statutory classification of what activities are eligible to be designated as an emergency requirement. The only statutory requirements are that (1) the legislation must specify that the spending is for an emergency requirement, (2) each account within an appropriations bill that will be for \"emergency requirements\" must be designated separatelyâmeaning that an entire bill that includes several separate accounts cannot have a \"blanket\" emergency requirement designationâand (3) the President must also designate the spending as being for an emergency requirement. It is not unusual for Congress to include language stating that the spending designated for emergency is available only if the President also designates it as being for an emergency. Further, the language typically states that the President designate \"all such amounts\" or none. For example, in October 2017, the Additional Supplemental Appropriations for Disaster Relief Requirements Act, 2017 ( P.L. 115-72 ), was enacted, which included emergency requirement designations for several accounts. One such account is included below: For an additional amount for \"Wildland Fire Management\", $184,500,000, to remain available through September 30, 2021, for urgent wildland fire suppression operations: Provided, That such funds shall be solely available to be transferred to and merged with other appropriations accounts from which funds were previously transferred for wildland fire suppression in fiscal year 2017 to fully repay those amounts: Provided further, That such amount is designated by the Congress as being for an emergency requirement pursuant to section 251(b)(2)(A)(i) of the Balanced Budget and Emergency Deficit Control Act of 1985. In addition, Title II of the act states: Sec. 304. Each amount designated in this division by the Congress as being for an emergency requirement pursuant to section 251(b)(2)(A)(i) of the Balanced Budget and Emergency Deficit Control Act of 1985 shall be available only if the President subsequently so designates all such amounts and transmits such designations to the Congress. After this legislation was enacted, the President formally designated the spending as an emergency requirement. In accordance with section 304 of division A of the Additional Supplemental Appropriations for Disaster Relief Requirements Act, 2017 (H.R. 2266; the \"Act\"), I hereby designate as emergency requirements all funding (including the repurposing of funds and cancellation of debt) so designated by the Congress in the Act pursuant to section 251(b)(2)(A) of the Balanced Budget and Emergency Deficit Control Act of 1985, as outlined in the enclosed list of accounts. The details of this action are set forth in the enclosed memorandum from the Director of the Office of Management and Budget. Adjustments may also be made to the spending limits to accommodate certain enacted spending that has been designated as being for disaster relief. The BCA defines disaster relief as activities carried out pursuant to a determination under Section 102(2) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act. Adjustment amounts permitted under the disaster relief designation are limited and are calculated pursuant to a statutory formula. Not all spending that is enacted to provide for disaster relief includes this designation. Congress may provide funds for the purpose of disaster relief but allow the spending to count against the discretionary spending limits, or it may designate the spending as an emergency requirement, particularly when the level of disaster relief being provided would exceed the amount permitted under the disaster relief adjustment. For example, the Bipartisan Budget Act of 2018 included appropriations related to Hurricanes Harvey, Irma, and Maria of $23.5 billion for the Federal Emergency Management Agency's Disaster Relief Fund for major disasters declared pursuant to the Stafford Act. However, that spending was designated as an emergency requirement and therefore employed the emergency adjustment described above, as opposed to the disaster relief adjustment, which is capped. The formula used to determine the maximum amount permitted under the disaster relief adjustment was amended by the CAA of 2018, and, as described below, the new formula is to apply to FY2019 and beyond. OMB is required by law to include in its Sequestration Update Report a preview estimate of the adjustment for disaster relief for the upcoming fiscal year. For example, OMB included a preview estimate of $7.366 billion as the cap for disaster relief adjustment in its Sequestration Update Report for 2018 (released on August 18, 2017). Subsequently, appropriations were enacted in the CAA of 2018 providing $7.366 billion for FY2018 for the Federal Emergency Management Agency's Disaster Relief Fund in the FY2018 Department of Homeland Security Appropriations Act (division F of the CAA of 2018). The formula used to calculate the limit for the disaster relief adjustment for FY2018 and earlier required that the annual adjustment for disaster relief not exceed \"the average funding provided for disaster relief over the previous 10 years, excluding the highest and lowest years,\" plus the amount by which appropriations in the previous fiscal year was less than the average funding level, often referred to as carryover. Under this formula, if the carryover from one year was not used in the subsequent year, it could not carry forward for a subsequent year. According to OMB, this \"led to a precipitous decline in the funding ceiling as higher disaster funding years began to fall out of the 10-year average formula.\" According to OMB, the limit for the adjustment fell from a high of $18.43 billion in 2015 to a low of $7.366 billion in 2018. The CAA of 2018 altered the formula for the disaster relief adjustment in ways \"that will ultimately increase the funding ceiling,\" according to OMB. The formula for FY2019 and beyond comprises the total of the average funding provided for disaster relief over the previous 10 years, excluding the highest and lowest years; 5% of the total appropriations provided either (1) since FY2012 or (2) in the previous 10 yearsâwhichever is lessâsubtracting any amount of budget authority that was rescinded in that period with respect to amounts provided for major disasters declared pursuant to the Stafford Act and designated by the Congress and the President as being for emergency requirements (as described above); and the cumulative net total of the unused carryover for FY2018, as well as unused carryover for any subsequent fiscal years. OMB has stated that under this formula, the potential adjustment limit for disaster relief for FY2019 would be capped at $14.965 billion. The CAA of 2018 included a new adjustment that applies to FY2020-FY2027 for wildfire suppression. Adjustments may be made to the spending limits to accommodate enacted spending that provides an amount for wildfire suppression operations in the Wildland Fire Management accounts at the Departments of Agriculture or Interior. The law states that the adjustments may not exceed the amounts shown below for each of FY2020-FY2027. However, the law allows such an adjustment to accommodate \"additional new budget authority\" for wildfire suppression in excess of the average costs for wildfire suppression operations as reported in the President's budget request for FY2015, which is $1.394 billion. Unlike some of the adjustments described above, this adjustment does not require a separate ad ditional designation from the President. The BCA includes two separate adjustments to accommodate spending related to ensuring that certain program funding is spent appropriately, safeguarding against waste, fraud, and abuse. While these two adjustments are separate under the law, they are often grouped together in budget totals, as in Table A-1 . As originally enacted, the BCA permits adjustments to the spending limits to accommodate enacted spending for two types of program integrity activities conducted by the Social Security Administration: (1) continuing disability reviews, which are periodic medical reviews of Social Security disability beneficiaries and Supplemental Security Income (SSI) recipients under the age of 65; and (2) redeterminations, which are periodic financial reviews of SSI recipients. The Bipartisan Budget Act of 2015 ( P.L. 114-74 ) expanded the types of program integrity activities for which the adjustments are permitted. The expanded definition may also accommodate spending for (3) cooperative disability investigation units, which investigate cases of suspected disability fraud; (4) fraud prosecutions by Special Assistant United States Attorneys; and (5) work-related continuing disability reviews, which are periodic earnings reviews of Social Security disability beneficiaries. The adjustments may not exceed the amounts shown below for each of FY2012-FY2021. However, the law allows such an adjustment to accommodate \"additional new budget authority\" for program integrity activities in excess of $273 million. Unlike some of the adjustments described above, this adjustment does not require a separate additional designation from the President. As an example, in March 2018, the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), included related spending for continuing disability reviews, redeterminations, and other specified activities: Of the total amount made available under this heading, not more than $1,735,000,000, to remain available through March 31, 2019, is for the costs associated with continuing disability reviews under titles II and XVI of the Social Security Act, including work-related continuing disability reviews to determine whether earnings derived from services demonstrate an individual's ability to engage in substantial gainful activity, for the cost associated with conducting redeterminations of eligibility under title XVI of the Social Security Act, for the cost of co-operative disability investigation units, and for the cost associated with the prosecution of fraud in the programs and operations of the Social Security Administration by Special Assistant United States Attorneys: Provided , That, of such amount, $273,000,000 is provided to meet the terms of section 251(b)(2)(B)(ii)(III) of the Balanced Budget and Emergency Deficit Control Act of 1985, as amended, and $1,462,000,000 is additional new budget authority specified for purposes of section 251(b)(2)(B) of such Act. Adjustments are made to the spending limits to accommodate enacted spending that specifies an amount for health care fraud and abuse control, but the adjustment may not exceed an amount specified in statute. The law states that the appropriations act must specify an amount for the health care fraud and abuse control program at the Department of Health and Human Services. The law states further that the adjustments may not exceed the amounts shown below for each of FY2012-FY2021. However, the law allows such an adjustment to accommodate \"additional new budget authority\" for health care fraud and abuse control in excess of $311 million. Unlike some of the adjustments described above, this adjustment does not require a separate additional designation from the President. As an example, in March 2018, the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), included related spending for health care fraud and abuse control: In addition to amounts otherwise available for program integrity and program management, $745,000,000, to remain available through September 30, 2019â¦. Provided further, That of the amount provided under this heading, $311,000,000 is provided to meet the terms of section 251(b)(2)(C)(ii) of the Balanced Budget and Emergency Deficit Control Act of 1985, as amended, and $434,000,000 is additional new budget authority specified for purposes of section 251(b)(2)(C) of such Act. The Bipartisan Budget Act of 2018 ( P.L. 115-123 ), enacted in February 2018, included a new adjustment for FY2019-FY2021. Adjustments may be made to the spending limits to accommodate enacted spending that specifies an amount for grants to states under Section 306 of the Social Security Act (42 U.S.C. Â§506). The law states further that the adjustments may not exceed the amounts shown below for each of FY2019-FY2021. However, the law allows such an adjustment to accommodate \"additional new budget authority\" for reemployment services and eligibility assessments in excess of $117 million. Unlike some of the adjustments described above, this adjustment does not require a separate additional designation from the President. The BCA provided that adjustments may be made to the spending limits to address changes in concepts and definitions. The law requires that OMB calculate such an adjustment when the President submits the budget request and that such changes may be made only after consultation with the House and Senate Appropriations Committees and the House and Senate Budget Committees. Further, the law states that such consultation with the committees shall include written communication that affords the committees an opportunity to comment before official action is taken. The law states that such changes \"shall equal the baseline levels of new budget authority and outlays using up-to-date concepts and definitions, minus those levels using the concepts and definitions in effect before such changes.\" It appears that no adjustments have been made to accommodate changes in concepts and definitions since enactment of the BCA in 2011. However, the discretionary spending limits in effect between 1991 and 2002 similarly permitted adjustments to accommodate changes in concepts and definitions. During that period, such adjustments were made as a result of a reclassification that shifted programs between the mandatory and the discretionary categories. Other adjustments were made for accounting changes made by the Federal Credit Reform Act of 1990 and changes in budgetary treatment and estimating methodologies. It is common for legislation to be enacted each year that permits an adjustment to the discretionary spending limits for that fiscal year in the event that the limits would be breached as a result of estimating differences between the Congressional Budget Office (CBO) and OMB. For example, the Financial Services and General Government appropriations act for FY2018 included this provision: If, for fiscal year 2018, new budget authority provided in appropriations Acts exceeds the discretionary spending limit for any category set forth in section 251(c) of the Balanced Budget and Emergency Deficit Control Act of 1985 due to estimating differences with the Congressional Budget Office, an adjustment to the discretionary spending limit in such category for fiscal year 2018 shall be made by the Director of the Office of Management and Budget in the amount of the excess but the total of all such adjustments shall not exceed 0.2 percent of the sum of the adjusted discretionary spending limits for all categories for that fiscal year. For that particular fiscal year, OMB had estimating differences with CBO, which OMB stated \"would cause OMB estimates to exceed both caps.\" These estimating differences were $4 million for the defense category and $554 million for the nondefense category. OMB stated that the maximum allowable adjustment for estimating differences for FY2018 was $2.81 billion and that the amount of estimating differences ($558 million) was within the allowable adjustment. OMB adjusted the caps upward by the amounts of the estimating differences noted. Title I in Division A of the 21 st Century Cures Act ( P.L. 114-255 ), enacted in December 2016, authorized appropriations for programs and activities related to health care, research, and opioid abuse. The act also established a distinctive budgetary mechanism related to certain authorizations that is different from the adjustments described above but has a similar effect. Specifically, the act established three accounts: the National Institutes of Health (NIH) Innovation Account, the Food and Drug Administration (FDA) Innovation Account, and the Account for the State Response to the Opioid Crisis. The act then transferred funds from the General Fund of the Treasury to these accounts and authorized those funds to be appropriated for specific dollar amounts in specific fiscal years. Those funds were not to be available for obligation until they were appropriated in appropriations acts each fiscal year. The act further stated that when appropriations are enacted for such authorized activitiesâup to the authorized amount each fiscal yearâthose appropriations are to be subtracted from any cost estimate provided for the purpose of enforcing the discretionary spending limits. This effectively exempts any spending provided for these activities between FY2017 and FY2026 from the spending caps. Specifically, the bill provides such exceptions for the accounts and amounts shown in below. In each case, the exemptions apply only to the years included in the respective table. ", "summary": "The Budget Control Act of 2011 (BCA; P.L. 112-25 ) established statutory limits on discretionary spending for FY2012-FY2021. There are currently separate annual limits for defense discretionary and nondefense discretionary spending. The law specifies that spending for certain activities, such as responding to a national emergency or fighting terrorism, will receive special budgetary treatment. This spending is most easily thought of as being exempt from the spending limits. Formally, however, the BCA states that the enactment of such spending allows for a subsequent upward adjustment of the discretionary limits to accommodate the spending. As a result, these types of spending are referred to as \"adjustments.\" Two adjustmentsâfor spending designated as emergency or for Overseas Contingency Operations (OCO)âhave made up the vast majority of the spending. (These adjustments are uncapped and can be used for broad purposes.) Five other adjustments are capped and can be used for more specific programs or purposes, and two additional adjustments address potential technical issues that can arise in enforcing the spending limits. According to information provided by the Office of Management and Budget (the agency responsible for evaluating compliance with the discretionary spending limits), in the seven fiscal years that have concluded since the discretionary spending limits were instituted, approximately $891 billion of spending has occurred under these adjustments. Spending for OCO made up 73% of the total, and spending for emergencies made up 20%. In addition to the adjustments specified in the BCA, the 21 st Century Cures Act (Division A of P.L. 114-255 ) provided that a limited amount of appropriations for specified purposes are to be exempt from the discretionary spending limits. As of the date of this report, the Cures Act is unique in providing an exemption of this kind.", "document_type": "crs"}
{"report": "M edicaid is a means-tested entitlement program that finances the delivery of primary and acute medical services, as well as long-term services and supports. Historically, Medicaid eligibility generally has been limited to low-income children, pregnant women, parents of dependent children, the elderly, and individuals with disabilities. Since 2014, however, states have had the option to cover nonelderly adults with income up to 133% of the federal poverty level (FPL) under the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 , as amended) Medicaid expansion. Medicaid is jointly financed by the federal government and the states. The federal government's share of most Medicaid expenditures is called the federal medical assistance percentage (FMAP). The remainder is referred to as the state share. Medicaid is a countercyclical program, meaning the rate of growth for Medicaid enrollment tends to accelerate when the economy weakens and tends to slow when the economy gains strength. During recessions, the rate of growth for Medicaid enrollment increases, which also increases the rate of growth for Medicaid expenditures at the same time that state revenues are decreasing. The federal government provided states with fiscal relief through temporary FMAP rate increases in response to the 2001 recession (March 2001 through November 2001) and the Great Recession (December 2007 through June 2009). The Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ), enacted on March 18, 2020, recently added a temporary Medicaid FMAP increase, beginning January 1, 2020, and continuing through the Coronavirus Disease 2019 (COVID-19) public health emergency period. This report begins with an overview of the FMAP rate. Then, it discusses the recession-related impact on the Medicaid program based on the experiences of the 2001 recession and the Great Recession. The final section of this report describes the three recession-related FMAP increases and compares them according to their various aspects, such as time periods for the FMAP increases, the amounts of the increases, and the requirements for states to receive the increases. The FMAP rate generally is determined annually and varies by state according to each state's per capita income relative to the U.S. per capita income. The formula provides higher FMAP rates, or federal reimbursement rates, to states with lower per capita incomes, and it provides lower FMAP rates to states with higher per capita incomes. FMAP rates have a statutory minimum of 50% and a statutory maximum of 83%. For a state with an FMAP of 60%, the state gets 60 cents back from the federal government for every dollar the state spends on its Medicaid program. In FY2020, FMAP rates range from 50.00% (13 states) to 76.98% (Mississippi). The FMAP formula relies on each state's per capita personal income in relation to the U.S. average per capita personal income. The national economy is basically the sum of all state economies. As a result, the national response to an economic change is the sum of the state responses to economic change. If more states (or larger states) were to experience an economic decline, the national economy would reflect this decline to some extent. However, the extent of the total decline would be offset by states with small decreases or even increases (i.e., states with growing economies). The U.S. per capita personal income, because of this balancing of positive and negative, usually has only a small percentage change each year. Because the FMAP formula compares state changes in per capita personal income (which can have large changes each year) with changes in the U.S. per capita personal income, states' FMAP rates often change from year to year. For most of the states experiencing annual FMAP rate changes, the change has been be less than one percentage pointâbut that can translate to a significant dollar amount. The FMAP rate is used to reimburse states for the federal share of most Medicaid expenditures, but exceptions to the regular FMAP rate have been made for certain states (e.g., the District of Columbia and the territories), situations (e.g., during economic downturns), populations (e.g., ACA Medicaid expansion population and certain women with breast or cervical cancer), providers (e.g., Indian Health Service facilities), and services (e.g., family planning and home health services). The FMAP is also used to determine the federal share of other federal programs. For instance, it is used to determine the federal share of spending for foster care maintenance, adoption assistance, and guardianship assistance payments authorized by Title IV-E of the Social Security Act. The FMAP rate is also used to determine the relative federal and state shares of the \"mandatory matching funds\" provided by the Child Care Entitlement to States. In addition, it determines the federal share of funding under the Temporary Assistance for Needy Families (TANF) Contingency Funds and the federal share of collections under the Child Support Enforcement program. Separate from the regular FMAP rate, the enhanced FMAP (E-FMAP) rate is provided for services and administration under the State Children's Health Insurance Program (CHIP), subject to the availability of funds from a state's federal allotment for CHIP. The E-FMAP rate is calculated by reducing the state share under the regular FMAP rate by 30%. Medicaid expenditures are influenced by a number of economic, demographic, and programmatic factors. Economic factors include health care prices, unemployment rates, and individuals' wages. Demographic factors include population growth and the age distribution. Programmatic factors include changes to eligibility and benefits or other program changes. Other factors include the number of eligible individuals who enroll and their utilization of covered services. Medicaid is a countercyclical program. During recessions, growth in the unemployment rate results in an increase in the rate of growth for Medicaid enrollment, which increases the rate of growth for Medicaid expenditures at the same time that state revenues decline. Reduced state revenues can make it difficult for states to continue financing their Medicaid programs, especially with the recession-related growth in Medicaid enrollment. The effect of recessions on Medicaid enrollment, Medicaid expenditures, and state tax revenues are generally not isolated to the recession period and can continue after the recession has officially ended. Individuals and their dependents may become eligible for Medicaid because they experience reductions in their incomes due to reduced hours or job loss. During economic downturns, the number of individuals with reduced hours or job losses increases, and the rate of job losses are considerably higher among low-income workers. This increases the number of individuals eligible for Medicaid. Individuals and their dependents also may lose access to employer-sponsored health insurance. When individuals have reduced hours or experience job loss, they may lose the health insurance coverage they had through their employer for themselves and their dependents. These individuals may be eligible for the Consolidated Omnibus Budget Reconciliation Act (COBRA) continuation coverage, which provides temporary access to a former employer's health insurance. However, employers are not required to pay for the cost of COBRA coverage, which may be more expensive than an individual's prior cost of insurance. Some individuals, or their dependents, might already be Medicaid eligible and have employer-sponsored health insurance. During economic downturns, employers may lower the amount they contribute to the cost of health benefits or decide to no longer provide health insurance coverage to these employees. This increase in the cost of or loss of employer-sponsored health insurance may result in these individuals enrolling for Medicaid coverage. As discussed below, there is a relationship between the unemployment rate and Medicaid enrollment. The ACA Medicaid expansion, which was implemented after the last recession, is expected to increase the effects of a recession on Medicaid enrollment. Medicaid enrollment follows economic cycles, with enrollment growth increasing at a faster rate during economic downturns and Medicaid enrollment growth increasing at a slower rate when economic conditions improve. The U.S. Government Accountability Office (GAO) analyzed federal Medicaid enrollment data during the 2001 recession and the Great Recession. GAO found that during the 2001 recession, the national unemployment rate increased from 4.3% to 5.5%, and total Medicaid enrollment increased by approximately 2 million (or 5.6%). GAO also found that during the Great Recession, the national unemployment rate grew from 5.0% to 9.5%, and Medicaid enrollment rose by nearly 4.3 million (or 9.7%). The ACA Medicaid expansion that went into effect in 2014 is expected to increase the effects of a recession on Medicaid enrollment. As there has not been a recession since states have had the option to implement the Medicaid expansion, there is no experience available to quantify the impact. During the Great Recession, Medicaid eligibility in most states was not available to many of the individuals who lost their jobs. This is because nonelderly adults without dependent children were not eligible for Medicaid. Prior to the Medicaid expansion, Medicaid eligibility for nonelderly adults, in most states, was limited to individuals with disabilities, pregnant women, and parents of poor children. Also, states' Medicaid income eligibility thresholds for parents were significantly lower than the income eligibility level for the Medicaid expansion of up to 133% of FPL. As a result of the Medicaid expansion, the percentage of adults eligible for Medicaid during future periods of high unemployment is expected to be larger than in the past. An increase in the rate of enrollment growth for the Medicaid expansion in response to an increase in the unemployment rate would have less of an impact on state budgets than an increase in the rate of enrollment growth for the traditional Medicaid populations because the federal matching rate for the Medicaid expansion is 90%, which is higher than the regular FMAP rate. Although the state share of the Medicaid expansion is 10% of the expenditures, the increase in the enrollment for the Medicaid expansion during economic downturns could contribute to states' budget pressures. Increases in Medicaid enrollment growth during economic downturns generally result in an increased rate of growth for total Medicaid expenditures. As with Medicaid enrollment, when the economic conditions improve, Medicaid expenditure growth tends to slow. At the same time that unemployment rate increases during economic downturns cause Medicaid enrollment and expenditures to increase at a faster rate, states general revenues are negatively affected. During the 2001 recession, states experienced a 4.2% decline in state tax revenue from state FY2001 to state FY2002. In the study described in the \" Medicaid Enrollment Growth During Recent Recessions \" section, GAO also looked at the impact of the Great Recession on total state tax revenues. Nationally, GAO found that the Great Recession led to a 10.2% decline in state tax revenues from the fourth quarter of 2007 to the fourth quarter of 2009. The impact of the Great Recession on state tax revenue varied significantly from state to state. Although state tax revenue for most states (44 states and the District of Columbia) decreased, these revenue decreases ranged from 1% in Iowa to 23% in Arizona. Medicaid accounts for almost 20% of state general fund expenditures, and it is the second largest category of general fund expenditures for states. The reduction in state tax revenue during economic downturns can make it difficult for states to finance the state share of Medicaid, especially while Medicaid enrollment and expenditures are increasing. Since most states are required to balance their budgets, the reduced state tax revenues and increased Medicaid expenditures, among other budget pressures, may lead states to increase taxes, reduce expendituresâincluding for the Medicaid programâor both. In response to the 2001 recession, 34 states reduced Medicaid expenditures by freezing or reducing provider payments, eliminating coverage for optional services, increasing premiums, and increasing copayments for prescription drugs. As a result of the Great Recession, 31 states froze or reduced Medicaid provider rates or increased Medicaid provider taxes, and other states reduced prescription drug costs and limited or eliminated coverage for optional services, such as mental health or dental care. The impacts of recessions on Medicaid enrollment, Medicaid expenditures, and state tax revenues have continued even after the recessions have officially ended. For example, the 2001 recession officially ended in November 2001, but state tax revenue continued to decline through the second quarter of 2002, and the national unemployment rate remained above prerecession levels through June 2003. Medicaid enrollment increased at higher than average rates of growth through 2003. Although the Great Recession officially ended in June 2009, 25 states continued to experience unemployment rates above 9%, until at least December 2010. Some states were still feeling the effects of the recession in 2011 and 2012. The timing and duration of the continued impact of national recessions on states have varied according to the economic conditions and revenue structures of each state, along with the mix of each state's industries and resources. In the past, two laws have provided states with fiscal relief through temporary FMAP rate increases due to recessions: the Jobs and Growth Tax Relief Reconciliation Act of 2003 (JGTRRA; P.L. 108-27 ) and the American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 , as amended by P.L. 111-226 ). In addition, the Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ) recently provided a temporary FMAP increase during the COVID-19 public health emergency period. As noted by GAO, \"the FMAP is a readily available mechanism for providing temporary assistance to states because assistance can be distributed quickly, with states obtaining funds on a quarterly basis through Medicaid's existing payment system.\" The increased FMAP rates help states maintain their Medicaid programs during economic downturns. Also, the increased FMAP rates effectively reduce the state share of Medicaid expenditures for states, allowing states to use the state funding that would have been used for the state share of Medicaidâif there were not a recession-related FMAP rateâfor non-Medicaid state budget needs. As shown in Table 1 , the recession-related FMAP increases have similar components, but there are differences. All three recession-related FMAP increases had across-the-board increases to the regular FMAP rates as their main component. The JGTRRA across-the-board increase of 2.95 percentage points was lower than the 6.2 percentage point across-the-board increases for ARRA and FFCRA. The ARRA across-the-board increase phased out at the end of the time period for the FMAP increase, but the other two increases do not phase down. In addition, the JGTRRA and ARRA FMAP increases included hold-harmless provisions that kept states' regular FMAP rates from declining, and these increases did not apply to certain Medicaid expenditures that use the regular FMAP rate. The FFCRA FMAP increase, however, does not exclude Medicaid expenditures that use the regular FMAP rate. Also, the ARRA FMAP increase included an unemployment-related additional increase to the FMAP, but the JGTRRA and FFCRA FMAP increases do not. JGTRRA and FFCRA applied the FMAP increases to the territories and provided the territories additional federal Medicaid funding, but ARRA gave the territories a choice of the across-the-board FMAP increase, along with increased funding or a larger increase in funding without an FMAP increase. All three of the recession-related FMAP increases have requirements for states in order to qualify for the FMAP increase. For example, all three FMAP increases require states to maintain Medicaid eligibility standards that are no more restrictive than those that were in effect on a certain date. All three also prohibit states from increasing the percentage local governments are required to contribute to the state share of Medicaid. The JGTRRA FMAP increase did not have additional requirements for states, but the ARRA and FFCRA FMAP increases include differing sets of additional requirements for states, which are listed in Table 1 . The following sections provide summaries of the recession-related FMAP rate increases from JGTRRA, ARRA, and FFCRA, as well as the time period for the FMAP increases, the amount of the increases, and the requirements for states to receive them. As part of the state fiscal relief for FY2003 and FY2004 included in JGTRRA, FMAP rates for the 50 states, the District of Columbia, and the territories were held harmless and increased in the last two quarters of FY2003 and the first three quarters of FY2004. This provision was statutorily limited to $10 billion. Table A-1 shows JGTRRA FMAP increases for the 50 states, the District of Columbia, and the territories. The FMAP rates were increased by an across-the-board 2.95 percentage points for each state (i.e., the 50 states, the District of Columbia, and the territories). The FMAP increase did not apply to Medicaid disproportionate share hospital (DSH) payments and Medicaid payments that were matched using the E-FMAP (e.g., breast and cervical cancer treatment). The hold-harmless provision kept the FMAP rates from declining during that period. Specifically, for FY2003, if a state's FY2002 FMAP rate was higher than the FY2003 rate (without the 2.95 percentage point increase), then the FY2002 rate was substituted for the FY2003 rate for the last two quarters of FY2003. Similarly in FY2004, if a state's FY2003 FMAP rate was higher than the FY2004 rate (without the 2.95 percentage point increase), then the FY2003 rate was substituted for the FY2004 rate for the first three quarters of FY2004. To qualify for the JGTRRA FMAP increase, a state could not have had a Medicaid plan with more restrictive eligibility rules than the plan in effect on September 2, 2003. If a state restored program eligibility to the levels in effect on September 2, 2003, then the state would have qualified for the increased FMAP rate for the entire quarter in which eligibility was reinstated. States also needed to ensure that local governments were not required to contribute a larger percentage of the state's nonfederal Medicaid expenditures than otherwise would have been required on April 1, 2003, for the last two quarters of FY2003 and the first three quarters of FY2004. In addition to the JGTRRA FMAP increase, JGTRRA increased the federal Medicaid funding available for each of the territories by 5.9%. The JGTRRA FMAP increase was provided to states in FY2003 and FY2004, well after the recession ended in November 2001. All states received the same FMAP increase, and the increase was not based on need using measures such as unemployment rates or state tax revenues. States indicated that the JGTRRA FMAP increase prevented states from making additional cuts to the Medicaid program and other portions of state budgets. Specifically, 36 states said the JGTRRA FMAP increase helped to fund increased Medicaid expenditures, and 31 states said the increase allowed states to minimize or postpone Medicaid cuts or freezes. ARRA provided an FMAP rate increase to states, which was later extended by P.L. 111-226 . The ARRA FMAP rate increase lasted for nine quarters, starting October 2008 and continuing through December 2010, and totaled an estimated $89 billion. This temporary FMAP rate increase was extended by six months as part of P.L. 111-226 âthe extension totaled an estimated $16.1 billion. With the extension, the ARRA FMAP rate increase ran for a total of 11 quarters, from the first quarter of FY2009 through the third quarter of FY2011 (i.e., October 2008 through June 2011), subject to certain requirements. Table B-1 shows the ARRA FMAP increase for the 50 states and the District of Columbia. For a \"recession adjustment period\" that began with the first quarter of FY2009 and ran through the third quarter of FY2011 (i.e., October 2008 through June 2011), ARRA held all states harmless from any decline in their regular FMAP rates throughout the period. All states (i.e., the 50 states and the District of Columbia) received an across-the-board increase of 6.2 percentage points to their regular FMAP rates until the last two quarters of the period, at which point the across-the-board percentage point increase phased down to 3.2 and then 1.2 percentage points. Throughout the period, states with unemployment rates that had increased by certain amounts in a quarter received an additional unemployment-related increase. There were three tiers of this unemployment-related increase. See \"ARRA Unemployment-Related FMAP Increase\" for details about the unemployment related increase, including how it was calculated. The ARRA FMAP increase was not available to the territories, but each territory was allowed to make a one-time choice between (1) an FMAP rate increase of 6.2 percentage points along with a 15% increase in its annual capped funding or (2) the regular FMAP rate along with a 30% increase in its capped funding. All territories chose the latter. The full amount of the temporary ARRA FMAP rate increase applied to most Medicaid expenditures, but not to the following Medicaid expenditures: (1) DSH payments, (2) Medicaid payments that were matched using the E-FMAP (e.g., breast and cervical cancer treatment), and (3) most expenditures for individuals who were eligible for Medicaid because of a state expansion of eligibility implemented after July 1, 2008. To receive ARRA FMAP rate increases, states were required to do the following: (1) ensure their Medicaid \"eligibility standards, methodologies, and procedures\" were no more restrictive than those that were in effect on July 1, 2008; (2) comply with requirements for prompt payment of health care providers under Medicaid; (3) not deposit or credit the additional federal funds paid as a result of the increase to any reserve or rainy day fund; (4) ensure that local governments did not pay a larger percentage of the state's nonfederal Medicaid expenditures (or a greater percentage of the nonfederal share of Medicaid DSH payments) than otherwise would have been required on September 30, 2008; and (5) submit a report to the Secretary of the Department of Health and Human Services regarding how the additional federal funds paid as a result of the temporary FMAP increase were expended. P.L. 111-226 added a requirement for the last six months (i.e., January 1, 2011, through June 30, 2011) that states certify that they would request and use the funds. FMAP rate increases reduced the amount of state funding required to maintain a given level of Medicaid services. For states that contemplated cuts in order to slow the growth of or reduce Medicaid spending (e.g., by eliminating coverage of certain benefits, freezing or reducing provider reimbursement rates, or increasing cost-sharing or premiums for beneficiaries), increased federal funding enabled them to avoid those cuts. For others, the state savings that resulted from an FMAP rate increase were used for various purposes that were not limited to Medicaid. For example, 36 states reported that they used funds from the ARRA FMAP rate increase to close or reduce their Medicaid budget shortfall, and 44 states used the funds to close or reduce state general fund shortfalls. In addition to avoiding cuts to Medicaid, the Congressional Budget Office (CBO) indicated in 2009 that providing additional federal aid to states that were facing fiscal pressures would probably stimulate the economy. However, CBO noted that the effects would vary. Federal aid to states with relatively healthy budgets would have provided little stimulus if the aid were used to build up rainy day funds (a prohibited use of the ARRA FMAP rate increase), rather than to increase spending or reduce taxes. One study found the ARRA FMAP increase \"had an economically large and statistically robust positive effect on employment.\" GAO determined that the ARRA FMAP increase was better timed than the JGTRRA FMAP increase because the ARRA FMAP increase began during the recession, when all states were experiencing Medicaid enrollment increases and state tax revenue decreases. GAO also found that the ARRA FMAP increase was better targeted than the JGTRRA FMAP increase because the ARRA increase included unemployment-related adjustments for certain states. FFCRA provides an increase to the FMAP rate for all states, the District of Columbia, and the territories of 6.2 percentage points, beginning on the first day of the calendar quarter in which the COVID-19 public health emergency period began (i.e., January 1, 2020) and ending on the last day of the calendar quarter in which the last day of the COVID-19 public health emergency period ends. Table C-1 shows the FY2020 FMAP rates for the states, the District of Columbia, and the territories and those FMAP rates plus 6.2 percentage points. To receive this increased FMAP rate, states, the District of Columbia, and the territories are required to (1) ensure that their Medicaid \"eligibility standards, methodologies, and procedures\" are no more restrictive than those that were in effect on January 1, 2020; (2) not impose premiums exceeding the amounts in place as of January 1, 2020; (3) provide continuous coverage of Medicaid enrollees during the COVID-19 public health emergency period; and (4) provide coverage (without the imposition of cost sharing) for testing services and treatments for COVIDâ19 (including vaccines, specialized equipment, and therapies). Another condition to receive the FFCRA FMAP increase is that states, the District of Columbia, and the territories cannot require local governments to fund a larger percentage of the state's nonfederal Medicaid expenditures for the Medicaid state plan or Medicaid DSH payments than what was required on March 11, 2020. The FFCRA FMAP increase does not apply to most FMAP exceptions, including the FMAP exceptions for the ACA Medicaid expansion, family planning, and home health services. However, the FFCRA FMAP increase does apply to a few FMAP exceptions. For Community First Choice services, the FFCRA FMAP increase is added to the six percentage point FMAP increase under Section 1915(k) of the Social Security Act, if the expenditures otherwise qualify. Also, FMAP exceptions calculated based on the regular FMAP use the regular FMAP plus the FFCRA FMAP increase for the calculation. These FMAP exceptions are for individuals eligible on the basis of breast and cervical cancer, Certified Community Behavioral Health Clinics, and Money Follows the Person. In addition to the territories receiving the FFCRA FMAP increase, FFCRA increases the federal Medicaid funding available for each territory in FY2020 and FY2021. The aggregate additional funding for the territories increases from $3.0 billion to $3.1 billion in FY2020 and from $3.1 billion to $3.2 billion in FY2021. In the past, GAO developed a prototype formula for temporary FMAP increases. One of the key components of the GAO prototype was making the temporary FMAP increase automatic so the FMAP increase could begin closer to the onset of a national recession. Although the FFCRA does not provide an automatic increase, the FFCRA FMAP increase is starting prior to an expected economic downturn. The FMAP rate has been used as a means to provide fiscal relief to states in response to the 2001 recession, the Great Recession, and current economic conditions due to the COVID-19 public health emergency. These recession-related FMAP increases have been provided at times when states have experienced growth in unemployment rates that results in increases in the rate of growth for Medicaid enrollment, which in turn increases the rate of growth for Medicaid expenditures at the same time that state revenues decline. These recession-related FMAP increases are similar but have some significant differences. All three of these recession-related FMAP increases have across-the-board FMAP increases; requirements to maintain Medicaid eligibility standards that are no more restrictive than they were prior to the FMAP increases; and requirements to ensure that states do not increase the percentage that local governments contribute to Medicaid expenditures. However, the JGTRRA and ARRA FMAP increases included hold-harmless provisions that kept the states' regular FMAP rates from declining, and these increases excluded certain Medicaid expenditures from the FMAP increases. The ARRA FMAP increase had an unemployment-related increase that the JGTRRA and FFCRA increases did not have. Also, the JGTRRA FMAP increase did not have additional requirements for states, but ARRA and FFCRA have differing sets of additional requirements for states to adhere to in order to qualify for the FMAP increases. In addition, many states indicated that the JGTRRA and ARRA FMAP increases provided fiscal relief that allowed the states to prevent further reductions to the Medicaid programs and other portions of their state budgets. Appendix A. Jobs and Growth Tax Relief Reconciliation Act of 2003 FMAP Increase The Jobs and Growth Tax Relief Reconciliation Act of 2003 (JGTRRA; P.L. 108-27 ) included a provision that increased federal medical assistance percentage (FMAP) rates for the 50 states, the District of Columbia, and the territories during the last two quarters of FY2003 and the first three quarters of FY2004. The FMAP rates were held harmless and increased by an across-the-board 2.95 percentage points for each state (i.e., the 50 states, the District of Columbia, and the territories). The JGTRRA FMAP increases were subject to certain requirements for states. For more detail about the JGTRRA FMAP increase, see \" JGTRRA FMAP Increase .\" Table A-1 shows states' regular FMAP rates and JGTRRA FMAP rates for FY2003 and FY2004. Appendix B. American Recovery and Reinvestment Act of 2009 FMAP Increase The American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ) provided a temporary FMAP rate increase to the 50 states and the District of Columbia that was later extended by P.L. 111-226 . With the extension, the ARRA FMAP increase lasted from the first quarter of FY2009 through the third quarter of FY2011 (i.e., October 2008 through June 2011). ARRA held all states harmless from any decline in their regular FMAP rates throughout the period. Under the ARRA FMAP increases, all states (i.e., the 50 states and the District of Columbia) received an across-the-board increase of 6.2 percentage points to their regular FMAP through the first quarter of FY2011, at which point the across-the-board percentage point increase phased down to 3.2 and then 1.2 percentage points for the second and third quarters of FY2011, respectively. Throughout the period, states with unemployment rates that had increased by certain amounts for a quarter received an additional unemployment-related increase. There were three tiers of the unemployment-related increase. See \"ARRA Unemployment-Related Increase\" for details about the unemployment-related increase, including how it was calculated. The ARRA FMAP increases were subject to certain requirements for states. For more information about the ARRA FMAP increases and these requirements, see \" ARRA FMAP Increase .\" Table B-1 shows the FMAP rate increases under ARRA and extended by P.L. 111-226 for each quarter, from the first quarter of FY2009 through the third quarter of FY2011. Table B-2 provides an example of how the FMAPs under ARRA with the hold-harmless and the unemployment-related increases were calculated for the second quarter of FY2010. Appendix C. Families First Coronavirus Response Act FMAP Increase The Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ) provides an increase to the FMAP rate for the 50 states, the District of Columbia, and the territories of 6.2 percentage points, beginning on the first day of calendar quarter in which the public health emergency period began (i.e., January 1, 2020) and ending on the last day of the calendar quarter in which the last day of the public health emergency period ends. See the \" FFCRA FMAP Increase \" section for information about the state requirements for receiving the FFCRA FMAP increase. Table C-1 shows states' FY2020 FMAP rates and those FMAP rates plus the 6.2 percentage points added by FFCRA.", "summary": "Medicaid is jointly financed by the federal government and the states. States incur Medicaid costs by making payments to service providers (e.g., for doctor visits) and performing administrative activities (e.g., making eligibility determinations), and the federal government reimburses states for a share of these costs. The federal government's share of a state's expenditures for most Medicaid services is called the federal medical assistance percentage (FMAP). The FMAP varies by state and is inversely related to each state's per capita income. For FY2020, FMAP rates range from 50% (13 states) to 77% (Mississippi). Medicaid is a countercyclical program, which means that the rate of growth for Medicaid enrollment tends to accelerate when the economy weakens and tends to slow when the economy gains strength. During recessions, growth in the unemployment rate results in an increase in the rate of growth for Medicaid enrollment, which increases the rate of growth for Medicaid expenditures at the same time that state revenues decline. Reduced state revenues can make it difficult for states to continue financing their Medicaid program, especially with the recession-related growth in Medicaid enrollment. Federal fiscal relief to states is provided during recessions through adjustments to the FMAP rate because this process for getting federal Medicaid funding to states is already in place. Many states have indicated that past FMAP increases allowed the states to prevent further reductions to their Medicaid programs and other portions of their state budgets. The federal government provided states with temporary FMAP rate increases to provide states with fiscal relief on two past occasions: in response to the 2001 recession through the Jobs and Growth Tax Relief Reconciliation Act of 2003 (JGTRRA; P.L. 108-27 ) and in response to the Great Recession through the American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 , as amended by P.L. 111-226 ). The JGTRRA FMAP increase provided a 2.95 percentage point increase to FMAP rates for the last two quarters of FY2003 and the first three quarters of FY2004. The ARRA FMAP increase provided an across-the-board increase, along with an unemployment-related increase for eligible states. The ARRA across-the-board increase was a 6.2 percentage point FMAP increase, starting in the first quarter of FY2009 and lasting through the first quarter of FY2011; the increase phased down to 3.2 and 1.2 percentage points for the second and third quarters of FY2011, respectively. Most recently, the Families First Coronavirus Response Act (FFCRA; P.L. 116-127 ) added a temporary Medicaid FMAP increase of 6.2 percentage points beginning January 1, 2020, and continuing through the Coronavirus Disease 2019 (COVID-19) public health emergency period. Although the country had not officially entered into a recession at the time FFCRA was enacted, a recession with significant increases in the unemployment rate was expected in the near term. The recession-related FMAP increases have similar components, but there are differences. Similarities of all three of these recession-related FMAP increases include across-the-board FMAP increases; requirements to maintain Medicaid eligibility standards that are no more restrictive than they were prior to the FMAP increases; and requirements to ensure that states do not increase the percentage that local governments contribute to Medicaid expenditures. However, there are differences in how the recession-related FMAP increases were determined. For instance, the JGTRRA and ARRA FMAP increases included hold-harmless provisions that kept the states' regular FMAP rates from declining, and these increases excluded certain Medicaid expenditures from the FMAP increases. The ARRA FMAP increase had an unemployment-related increase that the JGTRRA and FFCRA increases did not have. Also, the JGTRRA FMAP increase did not have additional requirements for states, but ARRA and FFCRA have differing sets of additional requirements for states to adhere to in order to qualify for the FMAP increases.", "document_type": "crs"}
{"report": "The federal government is the largest energy consumer in the United States. Within the federal government, the U.S. Department of Defense (DOD) consumes more energy than any other agency. In FY2017, DOD consumed 707.9 trillion British thermal units (Btu) of energyâroughly 16 times that of the second largest consumer in the federal government, the U.S. Postal Service ( Figure 1 ). In FY2017, DOD spent approximately $11.9 billion on energy, roughly 76% of the entire federal government's energy expenditures, and roughly 2% of DOD's FY2017 budget. Energy efficiencyâproviding the same or an improved level of service with less energyâover time can lead to a reduction in agency expenses. DOD uses energy for a variety of purposes across the various services of the military. For example, DOD's efficient management of energy can also lead to less refueling and fewer fuel convoys. Reducing the frequency and duration of fueling in combat zones could reduce exposure and risk which could save lives. This report provides an introduction to federal energy management rules applicable to DOD. The report includes an overview of federal statutes and executive orders that govern DOD energy management, and presents data on the status and trends for DOD energy use. Further, the scope of this report excludes nuclear energy for the propulsion of aircraft carriers, submarines, and energy used for military space operations. The report also references agency level guiding documents that provide the basis for how DOD implements these policies. Finally, this report identifies selected considerations for Congress. Federal energy management requirements include reductions in fossil fuel consumption, increases in renewable energy use, and energy efficiency targets for government fleets and buildings. In addition to the energy management requirements that apply to federal agencies, DOD's energy policy is designed to ensure the readiness of U.S. armed forces through energy security and resilience. DOD, through statute (e.g., 10 U.S.C. Â§2922e), has authority to suspend certain requirements to meet established operational military demands. In the 1970s, Congress began mandating energy use reductions for federal agencies, directing agencies to improve the efficiency of buildings and facilities and reduce fossil fuel dependence. Legislation aimed at reducing federal agency energy consumption can be traced back to the Energy Policy and Conservation Act (EPCA, P.L. 94-163 ) as shown in Table 1 . Among other provisions, EPCA directed the President to implement a 10-year plan for energy conservation and efficiency standards for government procurement. In 1977, Congress passed into law an act establishing the Department of Energy ( P.L. 95-91 ). The following year, Congress enacted the National Energy Conservation Policy Act (NECPA, P.L. 95-619 ), which, among other actions, established a program to retrofit federal buildings to improve energy efficiency. The Energy Policy Act of 1992 (EPAct92, P.L. 102-486 ) amended NECPA and authorized alternative financing methods for federal energy projects, including energy savings performance contracts (ESPCs) and utility energy service contracts (UESCs), among other provisions. Since NECPA and EPAct92, two laws contain provisions that set energy management requirements for all federal agenciesâthe Energy Policy Act of 2005 (EPAct05, P.L. 109-58 ) and the Energy Independence and Security Act of 2007 (EISA, P.L. 110-140 ). EPAct05 and EISA amended and addressed additional energy management targets for the federal government, among other things. Federal agencies report energy consumption annually to the Department of Energy's (DOE) Federal Energy Management Program (FEMP). EISA Section 527 (42 U.S.C. Â§17143), requires federal agencies to report to the Office of Management and Budget (OMB) on the status and implementation of energy efficiency improvements, energy reduction costs, and greenhouse gas (GHG) emissions. Subsequently, EISA Section 528 (42 U.S.C. Â§17144) directs OMB to provide a summary of this information and an evaluation of progress for the federal government to the Committee on Oversight and Government Reform of the House of Representatives and the Committee on Governmental Affairs of the Senate. The Director of OMB compiles the compliance status of the EISA requirements and description of each into an agency scorecard. Appendix B contains a selected compilation of federal energy management requirements for all agencies. The annual National Defense Authorization Act (NDAA) has included provisions related to DOD energy management and authorities. For example, Congress, by enacting the Department of Defense Authorization Act for FY1985 ( P.L. 98-525 ), granted the Secretary of Defense waiver authority for the acquisition of petroleum. NDAA for FY2000 Section 803 ( P.L. 106-65 ) amended this waiver authority to extend beyond petroleum to \"a defined fuel source.\" This authority permits the Secretary of Defense to waive any provision that would otherwise prescribe terms and conditions of a defined fuel purchase contract if market conditions have affected or will adversely affect the acquisition of the fuel source; and if the waiver will expedite acquisition for government needs (10 U.S.C. Â§2922e). With one exception, the NDAA for FY2018 ( P.L. 115-91 ), every NDAA since 1993 contains a section on \"authorized energy conservation projects.\" For instance, NDAA for FY2007 ( P.L. 109-364 ) added a section regarding renewable energy production or procurement goals to 10 U.S.C. Â§2911. As amended by several NDAAs, this DOD specific goal requires DOD to consume 25% of total facility energy from renewable sources by FY2025 ( Appendix A ). Further, NDAAs have contributed to a number of internal DOD energy management protocols. For instance, the NDAA for FY2011 Section 2832 ( P.L. 111-383 ) directs the Secretary of Defense to develop an Energy Performance Master Plan (including metrics for measurement, use of a baseline standard, separate plans for each branch, etc.) to achieve performance goals set by law, executive orders, and DOD policies. The NDAA for FY2015 requires an annual report that certifies whether or not the President's budget is adequate to meet objectives of the Operational Energy Strategy as outlined in 10 U.S.C. 2926. NDAAs continue to address energy security and resilience for DOD. In 2018, for example, Congress enacted the NDAA for FY2019 ( P.L. 115-232 ), authorizing appropriations of $193 million for energy resilience and conservation investment programs. Multiple statutes, in addition to those above, establish the legislative authority for DOD energy management. Selected sections of the U.S. Code applicable to DOD energy management are delineated in Appendix A . Over several administrations, Presidents have issued executive orders to establish energy management guidelines and targets for the federal government. Executive orders applied specifically to government vehicles, buildings, and computer equipment. Since 1991, 12 executive orders have been issued on federal energy management ( Appendix C ). Only Executive Order 13834, \"Efficient Federal Operations\" (E.O. 13834), is currently in effect. All the others have been revoked by subsequent orders. On May 17, 2018, President Trump issued E.O. 13834, revoking E.O. 13693 and its specific targets for federal agencies. E.O. 13834 directs the heads of agencies to meet \"statutory requirements in a manner that increases efficiency, optimizes performance, eliminates unnecessary use of resources, and protects the environment,\" but contains no specific targets. The White House Council on Environmental Quality Office of Federal Sustainability issued implementing instructions for E.O. 13834 in April 2019. The Office of Federal Sustainability's website provides resources, guidance documents, and reported energy performance data across federal agencies to support implementation of E.O. 13834. The Office of Federal Sustainability also lists other relevant U.S. code provisions, public laws, and other resources that federal agencies are required to follow. DOD issues directives, memorandums, manuals, and guidance instructions to military departments and agencies on complying with statues and executive orders. For instance, DOD Instruction (DODI) 4170.11, Installation Energy Management, and DOD Directive (DODD) 4180.01, DOD Energy Policy , provide guidance for energy planning, use, implementation and management. These and other guidance documents outline best practices to meet federal goals within the context of the agency's mission, while giving flexibility to military departments for achieving goals. Military departments within DOD are tasked with following agency policies and procedures to issue internal energy strategies to meet the specific needs of their mission. The Energy Performance Master Plan tasks each military department and defense agency to develop their own master plans toward meeting federal requirements. Military departments can have their own goals and guiding documents within the parameters of statute and executive order (e.g., the Army's Energy Security and Sustainability Strategy or the Secretary of the Navy's Energy Goals). Further, 10 U.S.C. 2925 mandates DOD to submit to Congress two annual reports on the progress of meeting federal and executive energy targets: the Operational Energy Annual Report and the Annual Energy Management and Resilience Report (AEMRR), which includes the Energy Performance Master Plan. These reports compile energy use information from the various DOD departments on their progress toward meeting federal requirements. For federal-wide requirements, implementing instructions and guidance documents are often issued by DOE. For instance, EPAct05 has a renewable electricity consumption requirement of 7.5% for the federal government by FY2013. The President, acting through the Secretary of DOE, under Section 203 of EPAct05, is to ensure that the federal government meets the requirement. In order to ensure this, DOE issued guidance to federal agencies on how to meet the requirement. DOD categorizes energy as either \"installation\" or \"operational.\" Installation energy refers to \"energy needed to power fixed installations and enduring locations as well as non-tactical vehicles (NTVs).\" Installation energy historically represents roughly 30% of DOD total energy and is subject to federal energy efficiency and conservation requirements, as reported to Congress in the AEMRR. In FY2017, DOD spent $3.48 billion on installation energy and NTV fuels. Operational energy (e.g., jet fuel) is \"the energy required for training, moving, and sustaining military forces and weapons platforms for military operations and trainingâincluding energy used by tactical power systems and generators at non-enduring locations.\" Federal energy management requirements outlined in Appendix A and Appendix B do not apply to operational energy. However, under 10 U.S.C. 2926, DOD does have an operational energy policy to promote readiness of military missions. From FY2003 to FY2017 the federal government reduced total site-delivered energy use by 19.2% compared to the FY2003 baseline in all sectors. During the same time period, DOD reduced site-delivered energy use by 20.9%. While overall, DOD has reduced energy use, its energy use has not necessarily been consistent from one year to the next. For example, during the War in Iraq (FY2003 to FY2004), energy use increased from 895 trillion Btu to 960 trillion Btu, as shown in Figure 2 . Representing roughly 30% of DOD total energy use, installation energy is subject to federal energy management requirements. Federal energy management requirements include energy efficiency targets for government buildings, renewable energy use goals, and fossil fuel reductions for the NTV fleet. According to the AEMRR FY2017, energy and cost savings compared to an FY2005 baseline resulted in $5.67 billion in total savings through FY2017. The AEMRR also notes that the DOD increased installation energy consumption levels by 0.3% from FY2016 to FY2017. 42 U.S.C. Â§8253(a) requires federal agencies to achieve a 30% reduction from FY2003 levels in energy consumption per gross square foot (GSF) for goal federal buildings by FY2015 ( Appendix B ). Goal buildings are federal buildings subject to federal energy performance requirements. DOD examples of goal buildings include the Army's Holston Ammunition Plant in Tennessee and the Navy's Camp Lemonnier in Djibouti. Excluded facilities are federal buildings not required to meet the federal building energy performance requirement for the fiscal year according to the criteria under Section 543(c)(3) of NECPA. Federal agencies may typically exclude buildings that have a dedicated energy process that overwhelms other building consumption, such as one designed for a national security function or for the storage of historical artifacts. DOD manages nearly 300,000 buildings, most of which are subject to federal energy management. In FY2015, DOD did not meet the 30% reduction target, as DOD reduced building energy intensity by 16.5% relative to FY2003 levels. In FY2017, DOD consumed 91,709 Btu/GSF, a 21.8% decrease from baseline FY2003. Increasing building efficiencies and reducing energy intensity can be supported through alternative funding mechanisms (e.g., ESPCs, UESCs, power purchase agreements). In FY2017, the Army, for example, awarded $289.3 million in ESPC and UESC projects estimated to save 1,132 billion Btu annually. According to the AEMRR FY2017, these projects could avoid costs of $17.2 million annually from the project savings. In addition to the energy efficiency requirement, EISA Section 433 requires federal agencies to reduce fossil fuel consumption in new or majorly renovated buildings ( Table B-1 ) by specified amounts. By FY2020, these buildings are supposed to reduce fossil fuel consumption by 80% relative to a similar building's consumption levels in FY2003. DOE proposed a rulemaking for comment on this legislation on October 15, 2010. However, the rulemaking was not finalized, and no further action has been taken since December 2014 when the comment period closed. DOD has not reported on this requirement. EPAct05 requires federal agencies to reach 7.5% total renewable electricity consumption by FY2013. According to implementing instructions to comply with EPAct05, agencies must maintain ownership of renewable energy credits (RECs). If DOD sells a REC to meet state requirements, and it is not replaced with another REC, then the renewable electricity DOD produced does not receive credit toward the EPAct05 goal. Within these reporting requirements, in FY2013, DOD reached 5% renewable electricity consumption, and in FY2017, DOD reached nearly 6% of total electricity consumption from renewables. Solar photovoltaic sources contributed to this increase reaching 627,783 megawatt-hours (MWh) up from 396,268 MWh in FY2016. RECs are created when a renewable source of energy generates a megawatt-hour of electricity. Each REC has a unique identification number and provides data (e.g., the resource type, service date, location, etc.) that is traceable and certifiable. RECs can be traded and have monetary value. They are used by utilities to comply with state renewable electricity standards. Thus, RECs can help improve the return on investment for renewable projects. The ownership of these credits is often a contract stipulation associated with the project for the developer. State and/or local renewable requirements play a role in determining the contract stipulations for the credit ownership. In addition to EPAct05 goal of 7.5% renewable electricity by FY2013, DOD in accordance with 10 U.S.C. Â§2911(g) is required to \"produce or procure\" 25% renewable energy (electrical and non-electrical) by FY2025. The purchasing of RECs is not mandatory for DOD to comply with this goal. DOD's 2011 Energy Performance Master Plan set an interim goal of 15% renewable energy consumption by FY2018. Under Â§2911(g), in FY2017 DOD's renewable energy consumption reached approximately 8.7% of total facility energy use. In FY2017, DOD consumed around 8,764 billion Btu of NTV fuel, roughly 4.3% of DOD installation energy. EISA requires federal vehicle fleets to reduce petroleum consumption from the FY2005 baseline by 20% no later than October 1, 2015 ( Appendix B ). In FY2015, DOD complied with the EISA target with a reduction in NTV fleet petroleum consumption of 27% compared to FY2005 baseline. DOD has continued to reduce installation vehicle fleet petroleum consumption and reached a 34.5% reduction in FY2017. At the branch level, the FY2017 AEMRR states that the Air Force experienced an increase of 9.3% in consumption compared to the FY2005 baseline. Despite this increase, the Air Force, according to the AEMRR, does continue to implement programs to reduce consumption and increase alternative fuel use in research and development. In addition to the petroleum consumption reduction goal, federal agencies under EISA are to increase alternative fuel consumption by 10% compared to a FY2005 baseline no later than October 1, 2015 ( Appendix B ). According to the Office of Federal Sustainability, DOD met the alternative fuel consumption target in FY2015 reaching 10.6% of total fuel consumption. However, in FY2017, DOD's alternative fuel consumption decreased to 9.4% of the total installation fleet fuel consumed. These requirements apply only to installation energy and do not apply to operational energy. Operational energy constitutes roughly 70% of DOD's total energy use. In FY2017, DOD spent $8.2 billion on operational energy expenditures. The largest portion of this came from jet fuel at nearly 394 trillion Btu or roughly 56% of total DOD energy consumption for FY2017. DOD depends on jet fuel and other petroleum products to perform mission operations. According to DOD's FY2017 Operational Energy Annual Report , from FY2013 to FY2017, total operational energy demand remained relatively stable, around 87 million barrels of fuel per year (roughly 500 trillion Btu), while the price of crude oil fluctuated. The price of oil declined by roughly 60% in 2014, which contributed to a decrease in fuel expenditures from $14.8 billion in FY2013 to $8.2 billion in FY2017, around a 45% reduction. DOD's efficient management of fuel can also lead fewer fuel convoys. Reducing the frequency and duration of fueling in combat zones could reduce exposure and risk which could save lives. According to a 2009 report by the Army Environmental Policy Institute, for every 24 fuel-related convoys in Afghanistan there was roughly one casualty. A challenge is balancing mission operations (i.e., increasing weapons systems and combat performance) while also increasing efficiency. Some questions Congress may be interested in considering include: What kind of federal energy efficiency requirements should DOD have for operational energy, if any? To what extent do federal energy management targets need to be updated? What role is there for Congress to clarify or provide oversight on implementing federal energy management goals? How are alternative financing mechanisms supporting DOD's attainment of federal energy management goals? To what extent should Congress support these mechanisms? As noted, existing statutory energy management goals do not apply to operational energy, but DOD's operational energy policy is mandated by 10 U.S.C. 2926. As part of the operational energy policy, DOD establishes a strategy including plans and performance metrics. Further, DOD is mandated to submit to Congress both a report on the strategy (Operational Energy Strategy) and a report certifying that the proposed Presidential budget supports the implementation of the strategy (Operational Energy Budget Certification Report). Operational energy comprises 70% of energy use within DOD, much of which consists of petroleum-based fuels. Federal energy management goals do not apply to most of DOD's energy use. Congress may consider setting mission priorities for DOD. Congress could also consider mandating whether or not DOD should prioritize energy access over energy conservation, or vice versa. While making operational equipment more fuel efficient could increase range and decrease refueling convoys, the challenge is how to prioritize maintaining combat readiness and mission operations. Congress may consider legislation addressing operational energy, such as setting a standard fuel efficiency target or a requirement for alternative fuel use. Congress may also consider continuing to leave operational energy efficiency goals to be determined by DOD or each military branch. While this option could provide more flexibility, it could also lead to some challenges. For instance, in 2009, Navy Secretary Ray Mabus announced plans for the Navy to consume half of all fuel from alternative sources by 2020 (see textbox on Secretary of the Navy Energy Goals). The announcement also included a 2016 goal to deploy a carrier strike group using alternative fuels (e.g., nuclear power, biofuels) and energy conservation measures, an initiative known as the Great Green Fleet. The Great Green Fleet deployed in 2016 and conducted operations using alternative fuels and energy-efficient technologies and operating procedures. Some critics of the Navy energy goals noted that the Navy implemented these energy targets based on limited analysis. For instance, a House Armed Services Committee hearing in March 2012 inquired how the Navy determined the 50% goal for biofuel use, how it was determined that 50% was the amount the Navy should have, whether it could be attained by 2020, and what metrics were used to make this determination. A 2011 study by Logistics Management Institute (LMI) was referenced as a source that outlined the attainability of the goal; however, it had been released two years after the announcement of the energy plan. Supporters of the Navy's energy goals noted the benefits of a more diverse fuel supply and utilizing domestically produced biofuels. DOD is subject to oil price volatility, as such a more diverse fuel supply could potentially reduce dependence on the volatile market (see textbox on Department of Defense Fuel Procurement). According to Assistant Secretary of the Navy, Energy, Installations, and Environment Jackalyne Pfannenstiel's 2012 testimony, \"without more domestically produced fuels, the [Navy] will continue to be subjected to fuel price volatility and be compelled to trade training, facility sustainment, and needed programs to pay for unplanned bills.\" If Congress were to set a target, reporting data and status updates could also be included in legislation to provide increased accountability of these programs. According to a 2016 naval announcement, the alternative fuel used for the Great Green Fleet was cost competitive and was made from 10% beef tallow and 90% marine diesel. In many cases, federal energy management goals in statute or executive order established targets for FY2015 (e.g., EISA petroleum and alternative fuel consumption targets were due no later than October 1, 2015). Several agencies, including DOD, did not reach the targeted goals. Congress may consider establishing new targets. Alternatively, Congress may instead remove statutory targets altogether, instead directing heads of federal agencies to establish protocols that foster efficiency and cost reductions that serve the mission of the agency. If given the flexibility, agencies may opt to set more easily attainable targets based on budget and mission needs, which may not have as much of an impact on total federal energy use. In March 2015, then-Secretary of Energy Ernest Moniz convened a Task Force of members from the private sector, universities, and nonprofit organizations to review various components of E.O. 13693, including target setting. The Task Force argued that setting energy goals across all agencies \"may drive some agencies to over-invest in the targeted area of energy-performance improvement to the detriment of other operational priorities. Conversely, uniform energy goals may understate the potential for cost-effective investments in energy efficiency for other agencies.\" Primary agency concerns may include their potential cost and mission impact. Congress and agencies may have different perspectives regarding these concerns. Successful attainment of established targets have varied from agency to agency. Some agencies may inherently be more energy intensive than others and as such may face challenges financing projects to reach certain targets. Leaving targets to agencies may provide some flexibility, as not all agencies have the same energy needs. Agencies might choose to set ambitious targets that some may consider too costly and may not be based on consistent data. In some cases, meeting targets could come at a high cost, particularly in the early stages of development. Some may argue that the high cost for early research and development (R&D) may be acceptable, especially if in the long term it drives costs down. If Congress were to direct DOD to set a standard, DOD may set a goal that could require additional R&D to develop equipment that meets the standard, but also does not diminish combat readiness. For instance, a test of the Great Green Fleet in the summer of 2012 reportedly cost the Navy nearly $27 a gallon for 450,000 gallons of biofuel. By 2016, the Navy achieved competitive prices with conventional fuels with a 90% diesel blend with 10% biofuel. The Navy reportedly contracted with a California firm to purchase 77 million gallons of biofuel from beef fat at $2.05, including a 15 cent per gallon subsidy. The 2016 DOE Task Force report also noted the historical role of the federal government as an adopter of new technologies, providing a faster pathway toward commercial viability. While this may not always be the most economic approach, it could provide a greater benefit to a technology's deployment into the commercial market. Further, Congress may consider readjusting the baselines, as some argue that the baselines may not have been properly informed using consistent data. For instance, according to a 2014 DOE report, \"goals must be based on well-informed estimates of savings potential.\" The 2014 DOE report recommended that several criteria should be taken into consideration when establishing a baseline, such as weather, data quality and availability, consistency of agency mission operations, and varying degrees of savings. The report also noted that perhaps a three-year average should be taken to set a baseline, as this helps reduce abnormal factors experienced in any particular year. If Congress establishes a new baseline, agency reporting data and perceived progress could be affected. For example, the DOE report explains, \"using a more recent baseline yearâand setting a lower percent reduction goalâmay give the impression that the federal government is not doing enough to reduce energy use, when in fact significant reductions have already been made.\" In regards to EISA Section 433, federal agencies are mandated to reduce fossil fuel consumption by 80% by FY2020, with an ultimate goal of 100% by FY2030. As noted, the rulemaking for this legislation has not been finalized. Without a finalized rule it is difficult to track and evaluate the progress toward this goal. DOD has not included this metric in annual reports. Congress may consider in its oversight role directing DOE to finalize this rule. Alternatively, Congress may consider updating the legislation, perhaps by either adjusting the targets, or removing the requirement entirely. While tracking energy management compliance may come at a cost (e.g., labor, data collecting, etc.), the data can be used to indicate progress toward greater efficiency and could demonstrate whether or not a program has proven effective and provided cost savings. The 2016 DOE Task Force report notes that one of the major challenges in evaluating the energy efficiency of projects in the federal government is the lack of data concerning, \"building profiles, energy usage, and energy spending over time.\" Additionally, Congress may consider clarifying REC ownership in legislation, instead of directing DOE to issue guidance on qualifications to meet federal targets. For instance, DOE's implementation guidance for EPAct05 requires DOD and all federal agencies to retain ownership of RECs to count toward the 7.5% renewable electricity consumption goal. However, 10 U.S.C. Â§2911(g), a 25% renewable energy production goal for DOD, does not make purchasing RECs mandatory. Further, according to a 2016 Government Accountability Office (GAO) report, DOD project documentation of renewable energy goals was not always clear, especially when determining whether or not a project contributed toward a particular goal. If Congress opts to require DOD to maintain ownership of RECs to meet all relevant energy goals, proper data and measurement collection may be a factor to consider. Additionally, if Congress were to require agency ownership of RECs, DOD's progress toward 10 U.S.C. Â§2911(g) may decline. For instance, the 2016 GAO report reviewed documentation of 17 DOD renewable energy projects. All 17 projects contributed to 10 U.S.C. Â§2911(g), but 8 of those projects did not contribute to EPAct05. In practice, military services may not necessarily retain ownership of RECs associated with all projects. Some DOD services may find that relinquishing REC ownership is within the best interest of the service and the particular contract, despite not qualifying for the EPAct05 requirement. The Navy, for instance, has had difficulty meeting renewable energy consumption targets under EPAct05, noting in the FY2017 AEMRR : \"The Navy's performance regarding the renewable electricity goal is a function of the strategic decision to allow other parties to monetize the value of RECs associated with its financed energy projects.\" In certain projects, military services might decide to relinquish REC ownership. In some instances of ESPC/UESC contracts, RECs can be leveraged to finance additional project improvements. DOD has steadily decreased its buildings' energy intensity in response to mandated energy reduction goals through investment in energy conservation projects. One of the challenges DOD faces in meeting these targets is implementing appropriate financing mechanisms. ESPCs have become a preferred means of making energy efficiency improvements because, in part, funds do not have to be directly appropriated (or programmed). However, as Energy Savings Contractors (ESCOs) assume a certain risk in guaranteeing savings through ESPCs, the risk is factored into their cost. DOD has been increasing reliance on UESCs and ESPCs. With $2.9 billion awarded in FY2017, these contracts can assist with increasing efficiency and meeting renewable energy management goals without up-front appropriated funds for the investment. Congress may consider options to increase the effectiveness of these mechanisms in attaining federal energy management goals. One option may be to increase training and awareness of UESCs and ESPCs. A Senate Committee on Armed Services report ( S.Rept. 115-125 ) accompanying NDAA FY2018 ( S. 1519 ) directed the Secretary of Defense to assess ESPCs and the potential savings through increased training. DOD disagreed with the need for more training, noting in the AEMRR FY2017, \"the financial risk is too high to implement these training improvements based on assumptions about future savings and therefore [DOD] will not commit limited resources to an assessment that would draw from efforts focused on energy resilience and mission assurance.\" Further, DOD has stated that training improvements do not necessarily guarantee behavioral changes that would contribute to energy and costs savings. It is difficult to determine project savings if data is not being collected appropriately and consistently. Eight reports since 2013 by GAO, DOD Inspector General (DOD IG), and U.S. Army Audit Agency evaluated challenges with DOD utilizing ESPCs. The recommendations highlighted a lack of developed guidance for ESPC training, data management, and contract administration. According to a summary DOD IG report in February 2019, the Assistant Secretary of Defense for Energy, Installation, and Environment, as well as Navy, Air Force, and DLA ESPC program managers, did not collect ESPC project data due to decentralization and not requesting performance and savings data, despite DOD instruction. Five reports noted that base contracting officials were not complying with the measurement and verification requirements under Section 432 of EISA for a number of reasons, including a lack of awareness of the requirements. Training and guidance for utilizing ESPCs and UESCs is provided to all federal agencies through FEMP. However, challenges remain. During a December 2018 House Committee on Energy and Commerce, Subcommittee on Energy hearing, Leslie Nicholls, Strategic Director for FEMP, noted that measurement and verification is \"not necessarily consistently applied and utilized throughout the federal government.\" She further noted that FEMP would like to continue training both at the technical level and for contracting officers. As noted in the February 2019 DOD IG report, DOD branches were implementing the IG recommendations regarding ESPC guidance. Congress may consider the value of training and guidance for proper measurement and data verification, and whether better data would demonstrate accurate cost savings of ESPCs and USECs relative to the cost of training. Appendix A. Summary of DOD Energy Goals and Contracting Authority in 10 U.S.C. Â§ 2208. Working-capital funds (t) Permits up to $1,000,000,000 in Working Capital Fund, Defense for petroleum market volatility. Â§ 2 410q . Multiyear Contracts: Purchase of Electricity from Renewable Energy Sources (a) Multiyear Contracts Authorized: Authorizes the use of multiyear contracts for the Secretary of Defense for a period of 10 years from a renewable energy source, as defined in 42 U.S.C. 15852(b)(2). (b) Limitations on Contracts for Periods in Excess of Five Years: The Secretary of Defense may enter into a contract over five years on the basis that the contract is cost effective and purchasing electricity from the source would not be economic without a contract for over five years. (c) Relationship to Other Multiyear Contracting Authority: this section does not preclude DOD \"from using other multiyear contracting authority of the Department to purchase renewable energy.\" Â§ 2911. Energy P olicy of the Department of Defense (a) General Energy Policy: directs the Secretary of Defense to \"ensure the readiness of the armed forces for their military missions by pursuing energy security and energy resilience.\" (b) Authorities: permits the Secretary of Defense to establish metrics and standards for measuring energy resilience; authorizes the selection of facility energy projects using renewables, as well as \"giving favorable consideration to projects that provide power directly to a military facility or into the installation electrical distribution network.\" (c) Energy Performance Goals: directs the Secretary of Defense to \"submit to congressional defense committees energy performance goals\" for DOD annually. (d) Energy Performance Master Plan: directs the Secretary of Defense to develop a plan annually (including metrics for measurement, use of a baseline standard, separate plans for each branch, etc.) to achieve the performance goals set by law, executive orders, and DOD policies. (e) Special Considerations: directs the Secretary of Defense to consider a set of specified factors (e.g., energy resilience, economies of scale, conservation measures) when developing the Performance Goals and Master Plan. (f) Selection of Energy Conservation Measures: the energy conservation measures are to be limited to ones that \"are readily available; demonstrate an economic return on the investment; are consistent with the energy performance goals and energy performance master plan for the Department; and are supported by the special considerations specified in subsection (c).\" (g) Goal Reg arding Use of Renewable Energy t o Meet Facility Energy Needs : \"to produce or procure not less than 25 percent of the total quantity of facility energy it consumes within its facilities during fiscal year 2025 and each fiscal year thereafter from renewable energy sources.\" Â§ 2913. Energy Savings Contracts and Activities (a) Shared Energy Savings Contracts: directs the Secretary of Defense to develop a simple method to accelerate contracts for shared energy savings services. Â§Â§2922 -2922h. Energy-Related Procurement : outlines contracting and procurement specifications for various energy types (e.g., natural gas, renewables, fuel derived from coal). Â§ 2922e. Acquisition of C ertain F uel S ources: A uthority to W aive C ontract P rocedures; A cquisition by E xchange; S ales A uthority : permits the Secretary of Defense to waive any provision that would otherwise prescribe terms and conditions of a fuel purchase contract if market conditions have affected or will adversely affect the acquisition of the fuel source; and if the waiver will expedite the acquisition for government needs. Â§ 2 926 Operational Energy Activities: provides DOD with an operational energy policy; delineates authorities for operational energy procurement; establishes the role for the Assistant Secretary of Defense for Energy, Installations, and Environment (ASD EI&E); requires the ASD EI&E to establish an operational energy strategy and to review and make recommendations to the Secretary of Defense on budgetary operational energy matters, as well as grants access to records and studies on military initiatives related to operational energy. Appendix B. Summary of Federal Energy Goals and Contracting Authority in 42 U.S.C. Â§ 6374e. Federal Fleet Conservation R equirements : each federal agency is directed to increase alternative fuel use and decrease petroleum fuel consumption for federal fleets, with the goal of achieving a 10% increase in annual alternative fuels and a 20% reduction in annual petroleum consumption as compared to a FY2005 baseline by October 1, 2015. Â§ 6834 . Federal Building Energy Efficiency Standards : starting August 2006, if cost-effective over the life cycle, new federal buildings must be designed to achieve energy consumption levels at least 30% below ASHRAE Standard 90.1 (for commercial buildings) or the International Energy Conservation Code (for residential buildings). In addition, starting December 2008, new federal buildings and those undergoing major renovations are to be designed so that fossil fuel consumption is reduced by 80% in 2020 compared to a similar building in FY2003, and 100% by 2030, as specified in Table B-1 . Â§ 8253. Energy Management R equirements: directs federal agencies to reduce building energy consumption per square foot by 30% compared to the FY2003 baseline by FY2015. Â§ 8256(c) Utility Incentive Program: authorizes and encourages agency participation in programs (Utility Energy Savings Contracts, or UESCs) to \"increase energy efficiency and for water conservation or the management of electricity demand conducted by gas, water, or electric utilities and generally available to customers of such utilities.\" Â§ 8287. Authority to Enter into Contracts: authorizes the head of a federal agency to enter Energy Savings Performance Contracts (ESPCs). Each contract may be for a period not to exceed 25 years. The contract directs the contractor to incur the costs of energy savings measures, in exchange for a share of the savings resulting from the measures taken. Â§ 13212. Minimum Federal Fleet Requirement : the total percentage of alternative-fueled or \"low greenhouse gas emitting\" light-duty vehicles acquired by a federal fleet annually are 75% in FY1999 and thereafter. Â§ 15852 . Federal Purchase Requirement : the President, acting through the Secretary of Energy, is directed to \"ensure that, to the extent economically feasible and technically practicable, of the total amount of electric energy the Federal Government consumes during any fiscal year\" not less than 7.5% is renewable energy in FY2013 and each fiscal year thereafter. Â§ 16122. Federal and State P rocurement of Fuel Cell V ehicles and Hydrogen E nergy S ystems : requires the federal government to adopt fuel cell vehicles and hydrogen energy systems as soon as practicable. Appendix C. Executive Orders", "summary": "The U.S. Department of Defense (DOD) consumes more energy than any other federal agencyâ77% of the entire federal government's energy consumption. Energy management is integral to DOD operations. From running bases and training facilities to powering jets and ships, DOD relies on energy to maintain readiness and resiliency for mission operations. Energy efficiencyâproviding the same or an improved level of service with less energyâover time can reduce agency expenses, particularly at an agency like DOD, where energy represents roughly 2% of the department's annual budget. Since the 1970s, Congress mandated energy requirements for federal agencies. Legislation required reductions in fossil fuel consumption and increases in renewable energy use and efficiency targets for government fleets and buildings. The National Energy Conservation Policy Act (NECPA, P.L. 95-619 ) requires federal agencies to report annually on energy management activities. The Energy Policy Act of 2005 (EPAct05, P.L. 109-58 ) and the Energy Independence and Security Act of 2007 (EISA, P.L. 110-140 ) amended and addressed additional energy management targets for the federal government. As the largest energy consumer in the federal government, DOD drives total federal energy management goal achievements. The annual National Defense Authorization Act (NDAA) has included provisions related to DOD energy management and authorities. With one exception, the NDAA for FY2018 ( P.L. 115-91 ), each NDAA since 1993 contains a section on \"authorized energy conservation projects.\" Further, NDAAs have contributed to internal DOD energy management protocol. Throughout several administrations, Presidents have issued executive orders to establish energy management guidelines and targets for the federal government. The Trump Administration's Executive Order 13834, \"Efficient Federal Operations\" (E.O. 13834), directs the heads of agencies to maintain annual energy reductions and efficiency measures that reduce costs and meet statutory requirements for renewables, among other things, but does not set specific targets. DOD categorizes energy into two typesâ installation energy and operational energy . DOD's installation energy (i.e., energy for fixed installations and non-tactical vehicles) is subject to federal energy management requirements. Although DOD energy use has trended downward since the 1970s, DOD has not met all federally mandated targets and reporting on progress has been challenging. DOD's operational energy (e.g., energy required for sustaining military forces and weapons platforms for military operations) is not subject to federal energy management requirements. This represents around 70% of total DOD energy use. Operational energy consists largely of petroleum products purchased on the open market by the Defense Logistics Agency. This leaves DOD and its spending susceptible to oil price volatility. Reviewing how these federal energy management goals impact DOD's mission could be an overarching consideration for Congress. Making operational equipment more fuel efficient could increase range and decrease refueling convoys; however, the challenge is maintaining combat readiness and mission operations. Congress may consider legislation addressing operational energy, such as setting a standard fuel efficiency target or a requirement for alternative fuel use. Congress may also consider continuing to leave operational energy efficiency goals to be determined by DOD or each military branch. In many cases, federal energy management goals in statute or executive order established targets for FY2015 (e.g., EISA petroleum and alternative fuel consumption targets were due no later than October 1, 2015). Several agencies, including DOD, did not reach the targeted goals. Congress may assess how and whether setting specific targets enhances the agency's mission and reduces costs for DOD. This approach may include addressing target dates or baselines. Congress may consider removing statutory targets altogether, and direct heads of federal agencies to establish protocols that foster efficiency and cost reductions that serve the mission of the agency. Managing an organization as large and complex as DOD presents certain challenges. One of the challenges DOD faces in meeting these targets is implementing appropriate financing mechanisms. The Energy Policy Act of 1992 (EPAct92, P.L. 102-486 ) amended NECPA and authorized alternative financing methods for federal energy projects, including energy savings performance contracts (ESPCs) and utility energy service contracts (UESCs). ESPCs have become a preferred means of making energy efficiency improvements because, in part, funds do not have to be directly appropriated (or programmed). With $2.9 billion awarded in FY2017, these contracts can assist with increasing efficiency and meeting renewable energy management goals. Training and guidance for utilizing ESPCs and UESCs is provided to all federal agencies through the Federal Energy Management Program (FEMP). However, challenges remain, particularly in data collection and consistent measurements. One option may be to increase training and awareness of UESCs and ESPCs.", "document_type": "crs"}
{"report": "When Congress considers legislation, it takes into account the proposal's potential budgetary effects . This helps Members to weigh the legislation's merits, and to consider whether it complies with the budgetary rules that Congress has created for itself. While information on the potential budgetary effects of legislation may come from numerous sources, the authority to determine whether legislation complies with congressional budgetary rules is given to the House and Senate Budget Committees. In this capacity, the budget committees generally rely on estimates provided by the Congressional Budget Office (CBO) and the Joint Committee on Taxation (JCT). As described in the following section, cost estimates provided by CBO and JCT are guided by certain requirements that Congress has articulated in different forms. These requirements are not completely prescriptive, however, and as a result both CBO and JCT adopt practices and conventions that guide the creation of cost estimates. Generally, CBO and JCT estimates include projections of the budgetary effects that would result from a proposed policy and incorporate anticipated individual behavioral responses to the policy. The estimates, however, do not typically include the macroeconomic effectsâeffects on the overall size of the economyâof those individual behavioral responses. Congress has sometimes required that JCT and CBO provide estimates that incorporate such macroeconomic effects. These estimates are often referred to as dynamic estimates or dynamic scores . This report provides information on the authorities and requirements under which cost estimates are prepared, as well as a summary of the debate surrounding dynamic cost estimates, and previous rules and requirements related to dynamic estimates. Currently, no congressional rules explicitly require dynamic estimates, and Congress may examine what rules changes, if any, are needed in the area of dynamic estimates. This report, therefore, includes information on options for the creation of dynamic scoring rules, and general considerations for Congress related to dynamic estimates. Cost estimates provided by CBO and JCT are guided, in part, by certain requirements that have been articulated by Congress in different forms, as described below. The Congressional Budget Act (CBA) requires that CBO prepare cost estimates for all bills reported from committee, \"to the extent practicable.\" The CBA also requires that (1) CBO rely on estimates provided by JCT for revenue legislation and (2) CBO include in its estimates \"the costs which would be incurred\" in carrying out the legislation in the fiscal year in which the legislation is to become effective, as well as the four following years, together with \"the basis for such estimate.\" When conducting cost estimates, CBO and JCT measure the budgetary effect of a legislative proposal in relation to projections of revenue and spending levels that are assumed to occur under current law, typically referred to as baseline levels. This means that the way a policy is reflected in the baseline will affect how CBO and JCT estimate a related policy. In calculating the baseline, CBO makes its own technical and economic assumptions, but the law generally requires that CBO assume that spending and revenue policies continue or expire based on what is currently slated to occur in statute. For example, CBO's baseline must assume that temporary tax cuts such as those enacted in 2017 actually do expire. The baseline, therefore, shows an increase in the level of revenue expected to be collected after the tax cut provisions expire in law. Therefore, a legislative proposal to continue those tax cut provisions would be scored as increasing the deficit. Although baseline calculations generally require that direct (mandatory) spending program levels reflect what is scheduled to occur in law, important exceptions exist for many direct spending programs. In particular, any program with estimated current year outlays greater than $50 million is assumed to continue to operate under the terms of the law at the time of its expiration. This means that some programs that are slated in law to expire are assumed to continue in the baseline. A legislative proposal that sought to merely continue those expired programs would therefore not be scored as new spending. When creating cost estimates, CBO adheres to scorekeeping guidelines, which are \"specific rules for determining the budgetary effects of legislation.\" These general guidelines are used by the scorekeepersâthe House and Senate Budget Committees, CBO, and the Office of Management and Budget (OMB)âto ensure that each group uses consistent and established practices. The 17 scorekeeping guidelines include general principles, such as a requirement that mandatory spending provisions included in appropriations bills be counted against the Appropriations Committee spending allocation, and direction on how asset sales are to be scored. The guidelines have been revised and expanded over the years, and any changes or additions to the scorekeeping guidelines are first approved by each of the scorekeepers. Congress sometimes directs the creation and content of cost estimates through chamber rules and provisions contained in budget resolutions. As described subsequently, House rules have sometimes explicitly required CBO and JCT to include in cost estimates information on a policy proposal's projected macroeconomic feedback effects. Similarly, Congress has also used the budget resolution to provide direction on how a policy ought to be estimated. For example, budget resolutions have included provisions requiring that transfers from the Treasury's general fund to the Highway Trust Fund be counted as new spending. Similarly, budget resolutions have stated that certain policies cannot be counted as offsets, such as Federal Reserve System surpluses transferred to the Treasury's general fund, as well as increases or extensions of Freddie Mac and Fannie Mae guarantee fees. Congressional committees may also shape the content or creation of cost estimates. The House and Senate Budget Committees have jurisdiction over CBO, and the CBA specifies that CBO's \"primary duty and function\" is to assist the budget committees. Oversight of CBO, as well as the creation and content of cost estimates is, therefore, under the jurisdiction of the House and Senate Budget Committees, and the budget committees provide related guidance to CBO. For the JCT, the creation and content of its estimates may be shaped by the committee itself, or by guidance or assumptions of the tax committeesâthe House Committee on Ways and Means and the Senate Committee on Finance. Generally, CBO and JCT estimates include projections of the budgetary effects that would result from proposed policy changes, and incorporate anticipated individual behavioral responses to the policy. The estimates, however, do not typically include the macroeconomic effects of those individual behavioral responses (such as changes in labor supply and the capital stock) that would alter GDP. For example, if an increase in the corporate tax rate caused corporations to use more debt, conventional estimates would take into account the loss of revenue since the returns from debt are taxed more lightly than the returns from equity, and this loss in revenue would offset the revenue gain calculated by multiplying the change in the tax rate by corporate income. The conventional estimate would not, however, take into account the lost revenue from a reduction in income if the rate increase caused a decline in investment, which affects production. These estimates without macroeconomic effects are sometimes imprecisely referred to as \"static,\" but are referred to in this report as conventional estimates because they take into account many behavioral responses. In contrast, a dynamic score aims to account for legislation's macroeconomic effect, by incorporating changes to (1) aggregate demand for goods and services to increase output in an underemployed economy and/or (2) aggregate supply of goods and services ( supply - side effects ) to increase potential output. For example, dynamic scoring can include fiscal stimulus effects that increase aggregate demand. These effects occur when the economy is underemployed (for example, during and after a recession), and increased spending either by the government or from taxpayers after a tax cut can expand the economy through multiplier effects and cause output to move closer to potential output. These effects are referred to subsequently as demand - side effects . Supply-side effects occur if potential output is altered due to changes in investment or savings that increase the capital stock, labor supply, or productivity. The crowding-out (or -in) effect occurs when an increase (or decrease) in the deficit reduces (or increases) funds available for private investment and hence reduces (or increases) the capital stock. Congressional interest in dynamic estimating has increased in recent decades. This interest may be attributed to the increase in the number of House and Senate rules restricting budgetary legislation. Because bills and resolutions are expected to comply with these congressional rules, estimates of a measure's fiscal impact arguably become more important. Interest in dynamic scoring is also likely related to recent advancements in economic analysis and economic modeling that make estimating macroeconomic feedback effects possible. Both proponents and opponents of dynamic estimating point to accuracy and consistency as their primary objectives. Some have suggested that dynamic scoring is useful, but only under certain circumstances. Arguments in favor of dynamic scoring include the view that dynamic scoring provides a more accurate assessment of budgetary impact than conventional scoring, particularly for some types of legislative proposals, and that conventional estimating methods produce a projection that does not reflect the actual expected impact on revenues. Under this argument, dynamic scoring makes use of all available information, and excluding macroeconomic feedback effects \"amounts to throwing away valuable information.\" It has also been argued that including macroeconomic effects can improve Congress's ability to compare competing policy proposals. Arguments in favor of dynamic scoring state that these estimates are required for the sake of consistency, especially for large legislative packages that would likely affect the economy. As stated above, a legislative proposal's budgetary impact is measured against a baseline, and that baseline takes into account macroeconomic assumptions. It is, therefore, argued that certain legislative proposals should also take into account economic assumptions. If such legislation were to be enacted into law, CBO would then build that policy into its baseline, and would have to make assumptions about the macroeconomic feedback effects that would be expected to occur under those policies. It is only consistent, the argument goes, to use macroeconomic feedback effects in the initial estimate of the legislation as well. Advocates for dynamic scoring also state that not using a dynamic approach to measure the impact of policy changes biases the legislative process against policy proposals that are designed to encourage productive economic activity. Some have argued that under conventional estimating methods, the impact of a cut in the marginal tax rates, for example, is viewed (through the lens of budgetary outcomes) less favorably than it should be. It has also been argued that, methodologically, the production of quality dynamic estimates is now possible due to technical advances in modeling and analysis, and an increase in evidence showing public responses to policy changes. Some have pointed out that both CBO and JCT are capable of producing dynamic estimates, and JCT staff have stated that, with regard to macroeconomic estimates, \"we think we have been producing reasonable results for over a decade (though we welcome comments and discussion).\" Likewise, arguments against dynamic estimates also point to concerns about accuracy and consistency. Those who oppose the use of dynamic scoring argue that projected macroeconomic feedback effects are too uncertain to be relied upon as accurate projections of budgetary outcomes. Projecting macroeconomic feedback effects requires economic modeling, and it has been said that \"because reasonable people can disagree about what model, and what parameters of that model, are best, the results from dynamic scoring will always be controversial.\" Previous macroeconomic analyses by CBO and JCT have yielded a range of estimates depending on what type of model is used and the underlying behavioral assumptions in each model. With assumptions about the behavioral responses that determine macroeconomic feedback being so uncertain, it has been argued that there is consistency in assuming, for all legislative proposals, that GDP remains the same, regardless of changes in tax or spending policy. Arguments against dynamic scoring often point to potential problems with cost estimating in general, but note that under dynamic scoring these vulnerabilities may be exacerbated. For example, as mentioned above, all cost estimates are inherently uncertain. Dynamic estimates are always subject to more uncertainty, even for relatively simple tax changes, because of the uncertainty of taxpayer responses (such as consumer spending and labor supply). In contrast, many conventional estimates (such as the effect of rate changes in the tax code or changes to exemptions and deductions) may be estimated quite precisely because data are readily available on income levels and family characteristics. Similarly, while cost estimates generally might always have the potential to be perceived as subject to manipulation by political forces, it has been argued that this possibility is exacerbated with dynamic scoring, which might damage the budget process's credibility. Some have argued that dynamic estimates would be useful for Congress but only in certain situations. It has been argued that dynamic estimates should be provided by CBO and JCT but only for \"major proposals\" such as those that have a large estimated budgetary impact or those designated as \"major\" by either majority or minority committee and/or chamber leadership. (Recent dynamic scoring rules [discussed below] used a similar threshold.) It has been stated that neither CBO nor JCT have sufficient time or staff to carefully estimate the macroeconomic effects of every proposal for which they must conduct an estimate. (To this end, it has also been argued that dynamic estimates should be conducted only when CBO and JCT have the time and tools necessary to conduct the analysis.) Further, it has been stated that dynamic estimates should be conducted for spending as well as revenue proposals because each have the potential to produce notable macroeconomic effects. (As stated below, in some years dynamic estimates were required only for revenue legislation.) It has also been argued that dynamic estimates should be provided for discretionary spending as well as direct/mandatory spending. As stated below, even when dynamic scoring requirements applied to spending as well as revenue, these rules excluded discretionary spending legislation (i.e., appropriations legislation). While committees and Members continue to have the ability to request that CBO or JCT provide dynamic estimates for certain policies or legislative proposals, for the first time in decades there are no explicit congressional rules or requirements that pertain specifically to the preparation or use of such estimates. As described below, rules related to dynamic estimates have varied over the years. In January 1997, the House first adopted a rule that explicitly mentioned dynamic estimates. It stated that a dynamic estimate provided by JCT could be included in the committee report accompanying \"major tax legislation\" (as designated by the House majority leader), but that the estimate could be used \"for informational purposes only.\" The rule, which was in effect through 2002, defined a dynamic estimate as \"a projection based in any part on assumptions concerning probable effects of macroeconomic feedback\" and required that the estimate include a statement identifying all such assumptions. When the new rule was adopted in January 1997, JCT staff hosted a symposium entitled \"Modeling the Macroeconomic Consequences of Tax Policy.\" According to JCT This symposium presented the results of a year-long modeling experiment by economists noted for their work in developing models of the U.S. economy. The purpose of this experiment was to explore the predictions of a variety of models regarding the macroeconomic feedback effects of major changes in the U.S. tax code with a focus on evaluating the feasibility of using these types of results to enhance the U.S. budgeting process. In January 2003, the House replaced its previous dynamic scoring rule with a more extensive rule, which remained in effect through 2014. Whereas the previous rule had permitted a dynamic estimate to be included in a committee report, the new House rule required it. Further, whereas the previous rule had applied only to bills designated as \"major tax legislation,\" the new rule applied to any bill reported by the House Committee on Ways and Means that proposed to amend the Internal Revenue Code. The new rule also omitted the previous provision that explicitly required the estimate be \"used for informational purposes only.\" The new rule no longer used the term \"dynamic estimate\" but instead used the term \"macroeconomic impact analysis,\" which the rule defined as an estimate provided by JCT \"of the changes in economic output, employment, capital stock, and tax revenues expected to result from enactment of the proposal.\" The estimate was required to identify critical assumptions and the source of data underlying that estimate. Around the time of the rule's adoption in 2003, the JCT released a report providing an overview of the joint committee's efforts to model macroeconomic effects of proposed tax legislation. While varying in length and detail, the macroeconomic analyses provided by JCT during this period (2003-2014) included information on the expected macroeconomic effects (if any) of the proposed legislation, provided general conclusions, and sometimes provided a range of potential budgetary effects using different models and different assumptions within models. The analyses did not include a specific dollar amount or point estimate . These analyses also reported details of the effects on different aspects of the economy (such as labor supply, output, and capital stock). In addition, the estimates often referenced the model(s) used for the analysis. During this time the JCT used four different types of models. Crucially, all of these models incorporated the impact of supply-side effects in their dynamic estimates. Only the MEG and GI model also incorporated demand-side effects (for a brief discussion of these effects, see \" Overview of Dynamic Estimating \"). The models are briefly described below: 1. MEG: a macroeconomic growth (MEG) model that incorporates aggregate demand effects similar to those in most economic forecasting models and includes labor and savings responses. (This model falls into a class of steady state growth models called Solow models, discussed below.) 2. OLG: an overlapping generations (OLG) life-cycle model that assumes that generations of individuals optimize choices of consumption and leisure over a lifetime and cannot include demand-side effects. 3. GI: a Global Insight (GI) private econometric forecasting model that captures demand-side effects. 4. DSGE: a domestic stochastic general equilibrium (DSGE) model that assumes that individuals optimize over infinite lifetimes and often does not, without modification, capture aggregate demand effects to decrease unemployment. In the past the JCT also had different behavioral responses within models (e.g., a high and low labor supply response in MEG). During this period, the JCT prepared five published macroeconomic estimates of legislative proposals: one (in 2003, for the Jobs and Growth Tax Relief Reconciliation Act, P.L. 108-27 ) that used MEG, GI, and OLG; two that used MEG only (the 2009 economic stimulus legislation and the 2009 Affordable Care Act) and two that used MEG and OLG (a bill extending bonus depreciation in 2014 and the Tax Reform Act of 2014). Several bills were examined but were too small for a macroeconomic analysis. The GI model was dropped after 2003, and the DSGE model was introduced in 2006. That model did not allow unemployment. None of the published analyses of legislation used the DSGE model. The JCT also provided illustrative analysis for different types of proposals on two occasions: to compare individual rate cuts, corporate rate cuts, and increases in the personal exemption in 2005 and to examine a revenue-neutral tax cut that broadened the individual income tax base and lowered the rate in 2006. The first analysis used MEG and the second used the MEG, OLG, and DSGE models. During this period, dynamic estimates were required to be conducted for revenue and mandatory spending legislation that met the threshold of \"major legislation\" under both a House rule and budget resolutions. In 2015, the House replaced its former rule with House Rule XIII, clause 8. The new rule, which was in effect through 2018, expanded the type of legislation for which dynamic estimates were to be conducted to include not just revenue proposals, but also mandatory spending proposals. This meant that the rule now required dynamic estimates from CBO as well as JCT, but only for \"major legislation,\" which was defined as (1) legislation that would be projected (in a conventional cost estimate) to cause an annual gross budgetary effect of at least 0.25% of projected U.S. GDP, (2) mandatory spending legislation designated as major legislation by the chair of the House Budget Committee, or (3) revenue legislation designated as major legislation by the chair or vice chair of the JCT. Although not explicitly stated in the new rule, the rules change resulted in dynamic estimates, for the first time, including a point estimate (i.e., a specific dollar amount) as opposed to a range of potential budgetary outcomes. Under this rule, the estimates would incorporate the budgetary effects of changes in economic output, employment, capital stock, and other macroeconomic variables resulting from such legislation. The estimate was, to the extent practicable, to include a qualitative assessment of the long-term budgetary effects and macroeconomic variables of such legislation, and to identify critical assumptions and the source of data underlying the estimate. During this period, Congress also used the budget resolution to direct CBO and JCT to provide dynamic estimates. The budget resolutions agreed to by both the House and Senate for fiscal years 2016 and 2018 included provisions that required dynamic estimates in both houses for the 114 th and 115 th Congresses. The requirements included in these provisions were very similar to the House rule described above. The dynamic estimates were required to be conducted for revenue and mandatory spending legislation that met the threshold of \"major legislation.\" Major legislation was again described as legislation that would be projected (in a conventional cost estimate) to cause an annual gross budgetary effect of at least 0.25% of projected U.S. GDP, but this version of the rule excluded any legislation that met this criterion as a result of a timing shift. To accommodate the Senate's constitutional authority to approve treaties, the rule expanded the definition of major legislation to include any treaty with an impact of at least $15 billion in that fiscal year. And the definition of major legislation also included any mandatory spending legislation designated as major legislation by the chair of the House or Senate Budget Committee, or revenue legislation designated as major legislation by the chair or vice chair of the JCT. As with the House rule, these estimates were required to incorporate the budgetary effects of changes in economic output, employment, capital stock, and other macroeconomic variables resulting from such legislation. The estimate was, to the extent practicable, to include a qualitative assessment of the long-term budgetary effects and macroeconomic variables of such legislation, and to identify critical assumptions and the source of data underlying the estimate. For the Senate provision applying to the 115 th Congress, the estimates were to include the distributional effects across income categories, to the extent practicable. Although not explicitly stated in the provisions, the requirements resulted in dynamic estimates, including a point estimate (i.e., a specific dollar amount) as opposed to a range of potential budgetary outcomes. Although the House and Senate Budget Committees might presumably have used such point estimates as the official estimate for the purposes of budget enforcement (under the authority granted by Section 312 of the CBA), the Senate Budget Committee communicated that the dynamic estimates would be used for informational purposes only. Estimates during the 2015-2018 period included a point estimate that provided a conventional estimate and the macroeconomic effects for a 10-year period. The JCT currently uses the three models previously discussed: MEG, OLG, and DSGE. In the past the JCT also had different behavioral responses within models (e.g., a high and low labor supply response in MEG). In 2014 JCT had only the MEG and OLG models; the first introduction of the DSGE model in a published estimate for legislation was in 2017. Discussions of the DSGE model in 2018 suggested that it now allowed unemployment. CBO has two models that assume full employment. One is a long-term model that CBO refers to as a \"Solow growth model\" and the other is a life cycle model. (The Solow growth model is similar to the long-term growth aspects of MEG and the life cycle model is an OLG model. The similarities reflect the way they incorporate behavioral responses.) The Solow model has stronger and weaker labor supply responses and the OLG model has alternative assumptions about how the model was to be closed and whether local or worldwide interest rates predominated. CBO also has a separate short-term model that can capture fiscal stimulus that reduces unemployment, while JCT combines short-term and long-term effects in its MEG and DSGE models. Beginning in 2003, JCT and CBO presented results from more than one model and with different behavioral assumptions within models. Beginning in 2015, when point estimates were provided, the JCT reported a single estimate that was a weighted average of the various models' point estimates. JCT provided information on the weights used, but did not separately report the different models' point estimates when more than one model was used. Also, in contrast to past informational macroeconomic modeling, there was no reported sensitivity analysis within the models (sensitivity analysis effectively measures how macroeconomic effects may change under different behavioral assumptions, such as how much a change in tax rates affects labor supply). In the four analyses that JCT reported on, in the first two cases (in 2015) only MEG, with the high rather than the low labor response assumption, was used. In the case of the major 2017 tax revision, MEG was weighted at 40%, OLG at 40%, and DSGE at 20%. In the final case, MEG was weighted at 40% and OLG and DSGE were each weighted at 30%. CBO and JCT jointly estimated the effects of some bills associated with repeal of the Affordable Care Act or modification of that act (JCT estimated certain tax provisions and CBO estimated the other provisions). JCT used the MEG model and CBO used its Solow model along with its short-term model, each with a single set of labor supply responses. CBO had been preparing macroeconomic analyses of the President's budget since 2003, reporting the results from multiple models and assumptions. When CBO prepared its standard analysis of the President's budget in 2015 and 2016, the analysis continued to report the results from both models, along with estimates of immigration's effect on productivity, with sensitivity analysis within the models leading to 16 different estimated effects on GDP over 10 years ranging from 0.7% to 2.8%. CBO has not prepared any subsequent macroeconomic analyses of the President's budget. Currently, no House or Senate rules explicitly require the preparation or use of dynamic estimates, and Congress may choose to examine what rules changes, if any, are needed in the area of dynamic estimates. While committees and Members continue to have the ability to request that CBO or JCT provide dynamic estimates for certain policies or legislative proposals, at some point Congress may choose to reinstitute explicit rules related to such dynamic estimates. These requirements could be articulated as formal direction from the committees of jurisdiction or leadership to JCT and CBO. Alternatively, as was done previously, these requirements might be included in chamber rules or in budget resolutions, or might be included in a standing order or in statute. If Congress were to reinstitute explicit rules related to dynamic estimates, it may choose to consider many facets of such potential rules: Will there be a threshold for the creation of such estimates? Should the proposal also allow the legislation to be designated as \"major\" by either majority or minority committee and/or chamber leadership? Should CBO and JCT provide dynamic estimates only for \"major proposals,\" such as those that have a large estimated budgetary impact? If so, what will be the threshold for major? Past rules have used a measure equal to 0.25% of GDP. Would the effect on GDP be measured by the entire legislation, or would it be triggered by an individual provision or group of provisions (such as revenue raisers or revenue losers in a tax bill) that met the threshold? The latter approach would capture revenue-neutral legislation that nevertheless made significant changes that could affect GDP. Should rules for dynamic estimates apply to spending as well as revenue proposals since both have the potential to cause notable macroeconomic effects? And if the rule applies to spending, will it apply to discretionary spending that varies from the baseline as well as direct/mandatory spending? What information should be included in such estimates? Practices prior to 2015 provided insight into how sensitive the results were to choice of model and parameters. The JCT has also continued to present information on the parameters of its models that lead to behavioral responses. The justification for assigning model weights might also be addressed in more detail. Should dynamic estimates be used only for informational purposes, or also for enforcement purposes? Dynamic estimates allow Congress to weigh the merits of the legislationâshould they also be used to determine whether the legislation complies with the budgetary rules that Congress has created for itself? Should additional resources be provided to CBO and JCT so that they might develop greater capacity for providing dynamic estimates?", "summary": "When Congress considers legislation, it takes into account the proposal's potential budgetary effects. Although this information may come from numerous sources, Congress generally relies on estimates provided by the Congressional Budget Office (CBO) and the Joint Committee on Taxation (JCT) when determining whether legislation complies with congressional budgetary rules. Generally, CBO and JCT estimates include projections of the budgetary effects that would result from proposed policy changes, and incorporate anticipated individual behavioral responses to the policy. The estimates, however, do not typically include the macroeconomic effects of those individual behavioral responses that would alter gross domestic product (GDP). In recent decades, however, Congress has sometimes required that JCT and CBO provide estimates that incorporate such macroeconomic effects (effects on overall economic outputâGDP). These estimates are often referred to as dynamic estimates or dynamic scores . Proponents of dynamic estimates have argued that such estimates provide a more accurate assessment of budgetary impact than conventional scoring, and that they can improve Congress's ability to compare competing policy proposals. Proponents argue that dynamic estimates are important for the sake of consistency, and that by not including dynamic effects, the legislative process is biased against policy proposals designed to encourage productive economic activity. Opponents of dynamic estimates argue that estimates of macroeconomic feedback effects are too uncertain to be relied upon as accurate projections of budgetary outcomes. Opponents of dynamic estimates have stated that, with assumptions about the behavioral responses that determine macroeconomic feedback being so uncertain, there is consistency in assuming, for all legislative proposals, that GDP remains the same, regardless of changes in tax or spending policy. Between 1997 and 2018, congressional rules existed that required JCT or CBO to provide dynamic estimates under certain circumstances. These congressional rules and requirements varied, sometimes permitting the creation of dynamic estimates, and sometimes requiring it. During this period, some dynamic estimates provided a range of potential budgetary outcomes, while some included a point estimate . During this period, dynamic estimates were used only for informational purposes, as opposed to being used to determine whether Congress was complying with its budgetary rules. In some cases, published estimates showed wide variation in estimated results depending on the model type and assumptions. While committees and Members continue to have the ability to request that CBO or JCT provide dynamic estimates for certain policies or legislative proposals, for the first time in decades there are no explicit congressional rules or requirements that pertain specifically to the preparation or use of such estimates. If Congress were to reinstitute explicit rules related to dynamic estimates, it may choose to consider many facets of such a potential rule, such as whether a threshold should exist for the creation of such estimates (i.e., should such estimates be provided only for \"major legislation\"); whether dynamic estimates should be provided for spending as well as revenue proposals; what types of information should be included in such estimates; whether dynamic estimates should be used only for informational purposes, or also for enforcement purposes; and whether additional resources ought to be provided to CBO and JCT so that they might develop greater capacity for providing dynamic estimates.", "document_type": "crs"}
{"report": "This report is a brief summary of House and Senate procedures for reaching agreement on legislation. It discusses the provisions of House Rule XXII and Senate Rule XXVIII as well as other applicable rules, precedents, and practices. The report focuses on the most common and customary procedures. There are many exceptions, complications, and possibilities that are not addressed, and the House and Senate may modify or waive their procedures by unanimous consent or by other means. The House and Senate must pass the same bill or joint resolution, and they must reach full and precise agreement on its text before it is submitted to the President for his approval or veto. The same requirements apply to a concurrent resolution and a joint resolution proposing a constitutional amendment, although neither receives presidential action. At some stage of the legislative process, therefore, the House must pass a Senate bill or the Senate must pass a House bill. The simplest way of meeting this requirement is for one house to pass its own bill and send it to the \"other body,\" which then considers and passes it, with or without amendments. Frequently, however, House and Senate committees each develop their own bills on the same subject. In these cases, one house often debates and amends the bill reported by its committee but then amends and passes the corresponding bill that the other chamber has already passed. For example, after the House passes a bill, it frequently takes up a bill on the same subject that it has already received from the Senate. The House then amends the Senate bill by striking out the text passed by the Senate (striking out all after the enacting clause) and replacing it with the text of the House bill it has just passed. The House then passes the amended Senate bill. In this way, the House passes two bills with exactly the same text, but the Senate bill is the one likely to become law because both houses now have passed it, although with different provisions. Much the same thing could happen in the Senate. After considering its own bill, the Senate, by unanimous consent, could take up and pass the House bill after amending it with the text of the Senate-passed bill. Because this action would take unanimous consent in the Senate, however, the Senate might choose instead to begin consideration of the similar House bill. The floor manager could offer as the first amendment to the House bill a full-text substitute consisting of the text of the Senate bill. This process is usually routine, but it can become more complicated. For instance, the Senate may pass one bill on several related matters before the House passes two bills of its own that address the same subjects. After the House passes its two bills, it may take up the one Senate bill and replace the text of that bill with the texts of both of its own bills. In other instances, the House and Senate may confront political and procedural situations that make it convenient for them to include their versions of legislation on one subject as amendments to some third bill on an unrelated subject that serves as a convenient \"vehicle.\" Such arrangements can be necessary because the House and Senate cannot begin the formal process of resolving their policy differences until these differences are embodied as amendments by one house to the version of the same bill as passed by the other. After one house passes a bill and the other then passes it with amendments, the House and Senate may attempt to resolve the differences between their positions. When confronted with a major bill, the two houses have historically created a conference committee for this purpose. However, a conference may not be necessary if they can reach an agreement through informal negotiations and an exchange of amendments between the houses. The amendments of one house to a bill from the other may be amended twice as the bill is sent (\"messaged\") back and forth between the House and Senate. Suppose, for example, that the Senate passes a House bill with amendments. The House can accept (concur in) the Senate amendments, in which case the differences are resolved. Alternatively, the House can amend the Senate amendments (concur in the Senate amendments with amendments). These House amendments are first degree amendments between the houses. The Senate can then accept (concur in) the House amendments to the Senate amendments, which would produce agreement. Or the Senate can concur in the House amendments to the Senate amendments with further Senate amendments, which are amendments in the second degree. At this stage, the House can concur in the most recent Senate amendments, but it cannot propose new House amendments to them because they would be third degree amendments, which are not permitted. (Of course, exactly the same process can occur in reverse if the House passes a Senate bill with amendments.) In both chambers, the prohibition on third degree amendments between the houses can be waived. The House might do this by special rule, suspension of the rules, or unanimous consent. In the Senate, unanimous consent is necessary to agree to an amendment in the third degree, unless the House has already waived the rule, in which case further degrees of amendment are permitted in the Senate. If the House and Senate adamantly defend their last amendments, they can send the bill back and forth several more times. In the unlikely event that neither house retreats from its last position or is willing to discuss a compromise in conference, the bill ultimately dies. It cannot be shuttled back and forth indefinitely. This process rarely results in stalemate, because the two houses either reach agreement or decide to submit their differences to a conference committee. However, an exchange of amendments sometimes takes the place of a conference. Once the two houses pass their versions of the same bill, the members and staff of the House and Senate committees of jurisdiction often meet informally to compare the two versions and discuss a compromise. If they reach an agreement that other concerned Representatives and Senators also accept, the House can, for example, concur in the Senate amendment with a House amendment that embodies the negotiated agreement. If the Senate then accepts (concurs in) this House amendment, the House and Senate have resolved their differences through the informal equivalent of a conference committee. House amendments to a Senate bill (or House amendments to Senate amendments to a House bill) are privileged for floor action by the Senate. This means there is no debate on whether to take up the House amendment. Instead, a Senator, most often the majority leader, typically requests that a House amendment be laid before the Senate. Motions to dispose of the House amendments—such as motions to concur or to concur with amendments—are debatable and, therefore, subject to filibusters. It is possible for the majority leader to move that the Senate concur in the House amendment and then propose motions that preempt all other available motions. This is often referred to as \"filling the tree\" on a motion to concur. If the majority leader can garner the necessary support to end debate on the motion to concur (60 Senators, assuming no vacancies), then both further amendment to the House amendment and extended debate can be avoided. The Senate sometimes arranges to consider a House amendment by unanimous consent. Like the Senate, the House sometimes acts on Senate amendments by unanimous consent. Until the House officially disagrees to Senate amendments to a House bill (or Senate amendments to House amendments to a Senate bill), these amendments are usually not privileged for consideration on the House floor. No motion is in order to concur in the Senate amendments, with or without amendments. When there is little or no controversy, the House often accepts or amends the Senate amendments by unanimous consent. Otherwise, the House can usually do so only through a motion to suspend the rules or under a special rule recommended by the Rules Committee and adopted by the House. A motion that is privileged at this stage is a motion to disagree to the Senate amendments and go to conference, but this motion must be made at the direction of the committee that originally reported the bill to the House. Both houses cannot consider the same bill at the same time, because the House or Senate can act only if it has the \"papers.\" The papers are comprised of the official copy of the bill as passed by the house in which it originated, the official copies of amendments by either house, and the messages by which each house informs the other of the actions it has taken. After one house acts on a bill or amendments from the other, it returns all the papers with an accompanying message describing its action. Thus, the House and Senate always act in sequence as custody of the papers changes hands. Before a conference committee is created to resolve disagreements between the two houses, the House and Senate must each state disagreement over a bill, either by disagreeing to the amendments of the \"other body\" or by insisting on its own amendments. So long as one house concurs in the amendments of the other and proposes its own amendments, there is no formal disagreement. But at any point during an exchange of amendments between the House and Senate, either house can propose that they can go to conference instead. The two houses usually decide in one of two ways to establish a conference committee. When the Senate passes a House bill with amendments, for example, it can immediately insist on its amendments and request a conference with the House. The House almost always agrees to the conference, although it need not do so—for example, it could simply agree to the Senate amendments instead. At other times, however, when the Senate passes a House bill with amendments, it may merely send back the bill and the amendments in the hope that the House will accept the Senate's amendments, making a conference unnecessary. If the House does not accept the amendments, it can disagree to them and request a conference. The Senate normally then insists on its amendments and agrees to the conference, after which it informs the House and returns the papers. Of course, the equivalent of either sequence of events may occur after the House passes a Senate bill with amendments. Both chambers sometimes agree by unanimous consent to the necessary procedural steps to send a measure to conference. In the House, if there is an objection to the unanimous consent request, then a privileged motion can be made, at the direction of the committee(s) of jurisdiction, to disagree to the Senate amendment (or insist on the House amendment) and request (or agree to) a conference with the Senate. If unanimous consent cannot be reached in the Senate, then a motion can be made to authorize a conference committee, which is subject to debate under regular Senate rules. If a cloture motion to end debate is filed on this motion, however, it matures after just two hours of debate. If three-fifths of the Senate agrees to invoke cloture, then the Senate could immediately vote to approve the motion to authorize a conference. No further debate of the motion would be in order. Each house usually appoints its conferees (also known as managers) immediately after deciding to go to conference. The Speaker appoints House conferees. The Senate frequently decides, by unanimous consent, to authorize the presiding officer to appoint \"the managers on the part of the Senate.\" The Senate could also empower the presiding officer to appoint conferees, or appoint conferees directly, through the motion to authorize a conference, discussed above. The chairman and ranking minority member of the committee or subcommittee that reported the bill are almost always conferees. They also play a major part in deciding who else is appointed. The committee or subcommittee leaders usually prepare a list of conferees from their chambers that the Speaker normally accepts and the presiding officer of the Senate always accepts. The party leaders may also become involved in selecting conferees, especially if the bill is particularly important, if it was reported by two or more committees, or if amendments to the bill from the other house touch the jurisdiction of more than one committee. Most conferees are members of the committee that reported the bill. In the case of a bill that involves the jurisdiction of more than one committee, members of each committee are often appointed as conferees with authority only to negotiate an agreement with respect to the subjects or provisions of the bill that fall within the jurisdiction of their committees. Thus, some members may be designated as conferees for purposes of the entire bill while others are appointed only to address a specific section or title. Representatives may also be appointed as conferees for limited purposes when the Senate proposes a nongermane amendment that is within the jurisdiction of another House committee. In addition, the Speaker may appoint other Representatives who, for example, offered important floor amendments. The list of conferees generally reflects the party balance in each house. The House and Senate do not have to appoint the same number of managers, and they frequently do not. House conferees vote as a delegation, as do Senate conferees, and a majority of each delegation must sign the conference report. Thus, three Representatives have the same voting power in conference as 30 Senators. Each house is likely to appoint a larger number of conferees when the bill involves the jurisdiction of more than one of its standing committees. A Representative or Senator may move to instruct the conferees from his or her chamber immediately after that house agrees to go to conference but just before the conferees are appointed. For example, the House can instruct its managers to insist on the House position on a particular amendment, or the Senate can instruct its managers to recede to the House position on another amendment. However, instructions to conferees are never binding; no point of order lies against a conference report that is inconsistent with House or Senate instructions to its conferees. The House can also instruct its conferees if they do not report within 45 calendar days and 25 legislative days after being appointed (or 36 hours after being appointed during the last six days of a session). Conference committee meetings are open to the public unless the conferees vote to close them, and the House must vote to authorize its conferees to do so. Both chambers also have guidelines concerning conference meetings, generally encouraging frequent meetings with open discussions, but these guidelines are often waived or in some cases are not procedurally enforceable. Beyond these guidelines, there are virtually no House or Senate rules governing conference meetings. Conferees select their own chairman and usually work without formal rules on quorums, proxies, debate, amendments, and other procedural matters. Conferences are negotiating forums, and the two chambers allow conferees to decide for themselves how best to conduct their negotiations. It is most common that a conference committee holds a single public meeting, sometimes for members to offer opening statements only. However, the House and Senate have important, and roughly the same, rules governing what decisions conferees can make. Conference committees are established to resolve disagreements between the House and Senate over their versions of the same bill. Therefore, the authority of conferees is limited to matters in disagreement. As a general rule, they may not change a provision on which both houses agree, nor may they add anything that is not in one version or the other. Furthermore, conferees are to reach agreements within the \"scope\" of the differences between the House and Senate positions. For example, if the House appropriates $10 million for some purpose and the Senate amends the bill by increasing the appropriation to $20 million, the conferees exceed their authority if they agree on a number that is less than $10 million or more than $20 million. It is much harder to determine the scope of the differences when they are qualitative, not quantitative. Also, conferees have more latitude under some circumstances than under others. Under a previous practice, when one house would pass a bill and the other would then pass it with a series of separate amendments—each making a change in a different provision of the bill—these amendments were usually numbered, and it was relatively easy for the conferees to determine the scope of the differences over each amendment. This is generally not true, however, under modern practice when the Senate passes a House bill (or the House passes a Senate bill) with an amendment in the nature of a substitute that totally replaces the text of the bill. In this situation, which arises nearly all of the time, there is only one amendment in conference—for example, a Senate substitute for the House version of a bill. The two versions of the bill can take very different approaches to the same subject, making it difficult for the conferees to isolate every point of agreement and disagreement and to identify the scope of each disagreement. Under these circumstances, the conferees may write their own conference substitute, so long as it is a germane modification of the House and Senate versions. If a conference agreement exceeds the scope of the differences or deals with a matter that is not in disagreement, the conference report is subject to a point of order when the House or Senate considers it. The House, however, typically protects a conference report against points of order by adopting a resolution reported by the Rules Committee waiving the applicable rules. The Senate, meanwhile, interprets the authority of its conferees generously, especially when they develop a conference substitute. Furthermore, the Senate can waive its rule with a three-fifths vote of Senators duly chosen and sworn (60 Senators if there are no vacancies). The authority of Senate conferees is further limited by Senate Rule XLIV, paragraph 8. Under this rule, a Senator can raise a point of order against discretionary and mandatory spending provisions of a conference report if they constitute \"new directed spending provisions,\" or what are sometimes called \"air drops.\" Paragraph 8 defines a \"new directed spending provision\" as follows: any item that consists of a specific provision containing a specific level of funding for any specific account, specific program, specific project, or specific activity, when no specific funding was provided for such specific account, specific program, specific project, or specific activity in the measure originally committed to the conferees by either House. The Senate can waive these restrictions on the content of conference reports by a three-fifths vote of Senators duly chosen and sworn (60 Senators assuming no vacancies). When the conferees reach full agreement, their staffs prepare a conference report that states how they propose to resolve each of the disagreements. Accompanying the report itself is a joint explanatory statement (also known as the statement of managers), which describes the various House and Senate positions and the conferees' recommendations in more detail. A majority of the House managers and a majority of the Senate managers must sign both the conference report and the joint explanatory statement. House rules require that House conferees be given an opportunity to sign the conference agreement at a set time and place. At least one copy of the final conference agreement must be made available for review by House managers with the signature sheets. Each chamber then debates and votes on the conference report in turn. At the conclusion of a successful conference, the papers usually change hands. The conferees from the house that requested the conference bring the papers into conference and then turn them over to the conferees from the other house. Thus, the house that agreed to the conference normally acts first on the conference report. However, this is a practice that is not required by House or Senate rules. The Senate usually takes up a conference report by unanimous consent, although a Senator can make a nondebatable motion to consider it. The report may be called up at any time after it is filed, but it is not in order to vote on the adoption of a conference report unless it has been available to Members and the general public for at least 48 hours before the vote. (This requirement can be waived by three-fifths of Senators duly chosen and sworn or by joint agreement of the majority and minority leaders in the case of a significant disruption to Senate facilities or to the availability of the internet.) Under Senate rules, a report is considered to be available to the general public if it is posted on a congressional website or on a website controlled by the Library of Congress or the Government Publishing Office. When considered on the Senate floor, a conference report is debatable under normal Senate procedures; it is subject to extended debate unless the time for debate is limited by unanimous consent or cloture or if the Senate is considering the report under expedited procedures established by law (such as the procedures for considering budget resolutions and budget reconciliation measures under the Budget Act). Paragraph 8 of Senate Rule XXVIII states that, if time for debating a conference report is limited (presumably by unanimous consent), that time shall be equally divided between the majority and minority parties, not necessarily between proponents and opponents of the report. A point of order may be made against a conference report at any time that it is pending on the Senate floor (or after all time for debate has expired or has been yielded back if the report is considered under a time agreement). If a point of order is sustained against a conference report on the grounds that conferees exceeded their authority, either by violating the \"scope\" rule (Rule XXVIII) or the prohibition against \"new directed spending provisions\" (paragraph 8 of Rule XLIV), then there is a special procedure to strike out the offending portion(s) of the conference recommendation and continue consideration of the rest of the proposed compromise. Under the procedure, a Senator can make a point of order against one or more provisions of a conference report. If the point of order is not waived (see below), the presiding officer rules whether or not the provision is in violation of the rule. If a point of order is raised against more than one provision, the presiding officer may make separate decisions regarding each provision. After all points of order raised under this procedure are disposed of, the Senate proceeds to consider a motion to send to the House, in place of the original conference agreement, a proposal consisting of the text of the conference agreement minus the provisions that were ruled out of order and stricken. Amendments to this motion are not in order, and debate is limited only if it had been limited on the conference report. In short, the terms for consideration of the motion to send to the House the proposal without the offending provisions are the same as those that would have applied to the conference report itself. If the Senate agrees to the motion, the altered conference recommendation is returned to the House in the form of an amendment between the houses. The House then has an opportunity to act on the amendment under the regular House procedures for considering Senate amendments discussed in earlier sections of this report. Senate rules also create a mechanism for waiving these restrictions on conference reports. Senators can move to waive points of order against one or several provisions, or they can make one motion to waive all possible points of order under either Rule XXVIII or Rule XLIV, paragraph 8. If the motion to waive garners the necessary support, the Senate is effectively agreeing to keep the matter that is potentially in violation of the rule in the conference report. In the House, the conference report cannot be considered unless it has been available in the Congressional Record or on the House document repository website for 72 hours. Copies of the report and the statement must also be available to Representatives for at least two hours before they consider it. These availability requirements are sometimes waived by a rule reported by the Rules Committee, and they do not apply during the last six days of a session. Typically, the House calls up a conference report under the terms of a special rule that protects the report against one or more points of order if the Rules Committee reports and the House adopts a resolution waiving the applicable rules. The House debates a conference report under the one-hour rule, with control of the hour equally divided between the two parties. However, if both floor managers support the report, a Representative opposed to it may claim one-third of the time for debate. At the end of the first hour, the House normally votes to order the previous question, which precludes additional debate. If Representatives could make points of order against a report, sometimes the House first considers and agrees to a resolution, recommended by its Rules Committee, that protects the report by waiving the points of order. Conference reports are not amendable. Each report is a compromise proposal for resolving a series of disagreements; the House prevails on some questions, the Senate on others. If the House and Senate were free to amend the report, they might never reach agreement. At the end of debate, therefore, each house votes on whether to agree to the report as a whole. However, the house that considers the report first also has the option of recommitting it to conference. But when one chamber acts on the report, it automatically discharges its conferees. As a result, the other house cannot vote to recommit, because the conference committee has been disbanded. If the House and Senate agree to the conference report, the bill is enrolled (printed on parchment in its final form) and presented to the President for his approval or disapproval. The report is based upon the original author's interpretation of the rules and published precedents of the two houses and an analysis of the application of these rules and precedents in recent practice (see \"Acknowledgements\"). Readers may wish to study the provisions of House and Senate rules and examine the applicable precedents—especially in the sections on \"Senate Bills,\" \"Amendments Between the Houses,\" and \"Conferences Between the Houses\"—in House Practice: A Guide to the Rules, Precedents and Procedures of the House and the corresponding sections on \"Amendments Between Houses\" and \"Conferences and Conference Reports\" in Riddick's Senate Procedure (Senate Document No. 101-28). There is also more detailed information on this subject in CRS Report 98-696, Resolving Legislative Differences in Congress: Conference Committees and Amendments Between the Houses , and CRS Report R41003, Amendments Between the Houses: Procedural Options and Effects .", "summary": "The House and Senate must pass the same bill or joint resolution in precisely the same form before it can be presented to the President. Once both houses have passed the same measure, they can resolve their differences over the text of that measure either through an exchange of amendments between the houses or through the creation of a conference committee. The House and Senate each have an opportunity to amend the other chamber's amendments to a bill; thus, there can be House amendments to Senate amendments to House amendments to a Senate bill. If either chamber accepts the other's amendments, the legislative process is complete. Alternatively, each house may reach the stage of disagreement at any time by insisting on its own position or by disagreeing to the position of the other chamber. Having decided to disagree, they then typically agree to create a conference committee to propose a single negotiated settlement of all their differences. Conference committees are generally free to conduct their negotiations as they choose, but under the formal rules they are expected to address only the matters on which the House and Senate have disagreed. Moreover, they are to propose settlements that represent compromises between the positions of the two houses. When they have completed their work, they submit a conference report and joint explanatory statement, and the House and Senate vote on accepting the report without amendments. Only after the two houses have reached complete agreement on all provisions of a bill can it be sent to the President for his approval or veto.", "document_type": "crs"}
{"report": "The Social Security program, or Old-Age, Survivors, and Disability Insurance (OASDI), pays monthly benefits to retired or disabled workers and their families and to the family members of deceased workers. The OASDI program's ability to meet scheduled benefit payments rests upon sufficient revenues from payroll taxes, taxation on Social Security benefits, and interest earned on trust funds assets. The year 2020 marks the first since 1982 in which the OASDI program's total cost is projected to be greater than its total income. Because of annual cash surpluses amassed in the Old-Age and Survivors Insurance Trust Fund and the Disability Insurance Trust Fund in the period spanning 1983 through 2019, the OASDI program is able to meet its benefit obligations by drawing on these assets to supplement annual revenues. The Board of Trustees of the Federal Old-Age and Survivors Insurance and Federal Disability Insurance Trust Funds estimates that drawing down the trust funds can augment OASDI program revenues and allow it to pay full benefits until 2035. Should the trust funds be depleted in 2035, as the trustees project, the OASDI program would have tax revenues sufficient to pay about 80% of scheduled benefits. The OASDI program, and its financing, are affected by economic, program-specific, and demographic factors. Economic factors include issues such as productivity, price inflation, unemployment, and gross domestic product; program-specific factors include issues such as covered and taxable earnings, revenues from taxation of benefits, and average benefits indexed to growth in average national wages. Demographic factors include fertility, mortality, and immigration. This report focuses on two demographic factorsâspecifically fertility and mortalityâand how they interact to affect the program's ability to pay full scheduled benefits. The trustees' 2019 Annual Report states the following: Projected OASDI cost increases more rapidly than projected non-interest income through 2040 primarily because the retirement of the baby-boom generation will increase the number of beneficiaries much faster than the number of covered workers increases, as subsequent lower-birth-rate generations replace the baby-boom generation at working ages. From 2040 to 2051, the cost rate (the ratio of program cost to taxable payroll) generally declines because the aging baby-boom generation is gradually replaced at retirement ages by subsequent lower-birth-rate generations. Thereafter, increases in life expectancy cause OASDI cost to increase generally relative to non-interest income, but more slowly than between 2010 and 2040. A remaining demographic factorâimmigrationâis not examined in this report because the Board of Trustees analysis shows that combined changes in fertility and mortality are the leading causes of financial pressure on the OASDI program. The Social Security population, both covered workers paying into the system and those collecting benefits, is experiencing shifts in age distribution. Decreased fertility rates for generations after the baby boomers (those born between 1946 and 1964) are contributing to an overall older population. In addition, increases in average life expectancy are also contributing to the aging of the U.S. population. The combination of decreasing fertility and longer life expectancies results in higher costs, as presented in Figure 1 , which shows OASDI costs increasing as a percentage of taxable payroll. As costs remain above income, the trust funds' assets are used to fulfill scheduled monthly benefit payments. The Board of Trustees projects this process will continue into 2034, after which the trust funds' assets are exhausted and reserves no longer exist. The OASDI program can pay scheduled benefits while operating with a cash flow deficit (i.e., costs exceed revenues) during periods of positive trust funds balances because assets held in the trust funds can be redeemed to augment continuing income. However, this process cannot last indefinitely. As shown in Figure 1 , a cash flow deficit is projected to persist throughout the 75-year projection period (2019-2093). This report presents data showing that the projected deficits are the result of rising costs associated with demographic changes, outlines how these demographic changes will impact the OASDI program's ability to fulfill benefit payments, and discusses some options policymakers have to address the program's financial shortfall. Driven by reduced fertility rates and increasing longevity, the Social Security population is aging. In other words, the percentage of the Social Security population at the older end of the age distribution is increasing. This point is underscored by considering three broad age subgroups: (1) those aged 65 and older ; (2) those aged 20 through 64 ; and (3) those under age 20 . Analyzing the population using these broad age groups highlights the concentration of those likely to be retired or close to retirement (i.e., aged 65 and older), those in ages commonly seen as prime working years (i.e., aged 20 through 64), and those generally considered not yet in the paid workforce (i.e., under age 20). Table 1 shows population growth rates for the 70-year period from 1945 to 2015, the first and the most recent years, respectively, for which the trustees publish historical data. It also shows the trustees' projections for growth in the population, and its subgroups, for the ensuing 70-year period of 2015 through 2085. From 1945 through 2015, the Social Security population more than doubled. Table 1 shows that, although the population grew by 120% over this period, growth in major age groups varied. On a percentage-change basis, the largest growth was observed in the 65 and over age group. From 1945 through 2015, this age group grew by 338%, indicating that the number of people in the United States aged 65 and older more than tripled. This demographic trend underscores the degree to which the United States is growing older; in 1945, those 65 and older accounted for 7% of the total population, whereas in 2015, those 65 and older accounted for about 15% of the total population. This trend has implications for the Social Security program's ability to meet all of its projected scheduled benefits as the younger and slower-growing age groups of working age (i.e., those aged 20 to 64) are paying into the system while the older and faster-growing age groups (i.e., those aged 65 and older) are likely to be collecting benefits. The right-hand column in Table 1 shows that the trustees projected future years will continue to see growth in the 65 and older age group outpace that of the overall population. By 2085, the 65 and older age group is projected to make up about 22% of the total population. As this trend persists, which it is projected to do under the trustees' intermediate assumptions, it will cause OASDI program costs to rise more rapidly than revenues, thereby degrading the program's ability to pay full scheduled benefits. Table 1 also shows how the working-age population is projected to be a smaller percentage of the overall population. This is an essential consequence of an aging population. That is, as the percentage of those aged 65 and older is increasing, the percentages in the other age group (i.e., working ages between 20 and 64) are decreasing. This point is reinforced by examining dependency ratios. The changes in the Social Security population's composition can also be expressed as dependency ratios. Dependency ratios indicate a dependent population's burden on the working-age population. Table 1 shows that in 1945, about 59% of the total population was working age, between the ages of 20 and 64. The next-largest age group was the under 20 age group, which accounted for about 33% of the population. In 1945, the United States could be described as youth dependent because the working-age population was supporting the next-larger, under 20 population. The same could be said for the United States in 2015, when the 20 to 64 age group was about 59% of the total population and those in the under 20 age group accounted for 26% of the total population ( Table 1 ). That is, from 1945 to 2015, the United States became less youth dependent. Over this time period, the percentage of the total population aged 65 and older increased from 7% to 15%, indicating that the United States was becoming more aged dependent . The United States is projected to age from a youth-dependent population to an aged-dependent population, where the working-age population will be supporting the next-larger, 65 and older population. The transition to a more aged-dependent population is important for Social Security purposes because the program's ability to continue to pay beneficiaries relies on taxes paid by current workers. As discussed, the dependency ratios have changed over time and are projected to continue to change. Figure 2 presents a more detailed look at the dependency ratios and shows how they have changed in a historical context and how they are projected to change throughout the trustees' 75-year projection period. Figure 2 shows the youth dependency ratio, which is the ratio of the population under 20 to the population aged 20-64. It is an approximate measure of how many young persons are supported by those in working ages. For instance, in 1945 the youth dependency ratio was 56%, suggesting that every 100 people in working ages were supporting 56 youths. From 1945 to 1965, the youth population increased relative to the working-age population, resulting in an increasing youth dependency ratio. As the baby boom generation attained working ages (the oldest of the baby boom generation turned 20 in 1966), the working-age population increased relative to the youth population and this ratio began to decrease. By 1985, when all of the baby boom generation had reached working age (the youngest of the baby boom generation turned 20 in 1984), this ratio had decreased to 51%, a level comparable to that observed prior to the baby boomers (i.e., in 1945 the youth dependency ratio was 56%). Figure 2 also shows the aged dependency ratio. The aged dependency ratio is the ratio of the population aged 65 and older to the population aged 20-64. Although the age at which a beneficiary can collect Social Security benefits varies by birth year, this ratio is an approximate indicator of the number of people likely to be collecting benefits relative to those still working. For instance, in 1945 the aged dependency ratio was 12%, suggesting that for every 100 working-age people there were 12 people collecting benefits. The increase in this ratio highlights the aging of the population. As shown, this ratio increased from 12% in 1945 to 25% in 2015. That is, the number of people collecting benefits versus the number of people still working doubled over this period. Throughout the trustees' 75-year projection period, this ratio will continue to increase under the intermediate projections, due in large part to the baby boomers' continued retirement from the work force, relative to the numbers in the working-age population. The trustees project the aged dependency ratio to exceed 35% by 2025 and 40% by 2065. This projected tripling of the aged dependency ratio reflects the aged population's faster growth compared with that of the working-age population. The total dependency ratio is the ratio of those aged 65 and above and those aged under 20 to those aged 20-64. Thus, the ratio is an approximate measure of the number of people not of working age to the number of working-age people. The beginning of the baby boom generation is indicated by the rising total dependency ratio as shown in Figure 2 . The total dependency ratio remained relatively stable from the mid-1980s to the early 2010s as the baby boomers remained in working ages. The oldest baby boomers reached full retirement age in 2012, making it the first year that a baby boomer could retire with full benefits. Thus, as the baby boom generation began to exit the paid labor force in the 2010s, the ratio can be seen to rise slightly. The ratio is projected to increase as more of that generation enters retirement age. Owing to the sustained decrease in total fertility rates since the 1970s, the aged dependency and total dependency ratios are projected to increase even after the last baby boomers have reached full retirement age in 2031. The demographic trends that created the baby boomers led to an imbalance between the number of people who have or will retire (i.e., present and potential beneficiaries) and the number of people in working ages (i.e., present and potential covered workers). Specifically, as the baby boom generation ages, those aged 65 and older will make up a larger portion of the total population. The transition from a youth-dependent population to an aged-dependent population means the number of beneficiaries will increase faster than the number of covered workers. As a result, the trustees project that OASDI costs will rise relative to revenues. The aging of the Social Security population is partially driven by a decline in the total fertility rate after 1965. The total fertility rate (TFR) is the average number of children that would be born to a woman throughout her lifetime if she were to experience, at each age of her life, the birth rate observed in that year. In 1920, the TFR was 3.26 children per woman. By 1940, the TFR was comparatively lower, at a rate of 2.23 children per woman; this was the lowest TFR that had been observed to date. This decrease was reversed within the decade when a period of high fertility created the baby boom generation, those born between 1946 and 1964 ( Appendix A ). This period of high fertility is shown in Figure 3 and is marked on either side by periods of low fertility. In fact, fertility rates after 1964 (i.e., immediately following the baby boomers) decreased to the lowest levels recorded in the United States. Much of what makes the baby boom generation so impactful is that the cohort was both preceded and followed by low fertility rates. Figure 3 shows the historical fertility rates as measured by the National Center for Health Statistics (Centers for Disease Control and Prevention) and the trustees, as well as the trustees' projected fertility rates under their intermediate assumptions. The U.S. TFR reached a minimum of 1.77 children per woman in 1975. The TFR has remained at relatively low levels in the years that followed, a trend that is projected to continue. The Board of Trustees projects that the TFR will remain close to 2.0 children per woman throughout the 75-year projection period. Research suggests that there are many contributing factors for the decline in fertility rates. For instance, changes in fertility rates have been closely linked to changes in personal income and changes in the employment rate. This perhaps explains why a decrease in fertility coincided with the 2008-2009 financial crisis, before which the fertility rate was increasing. Additional research reinforces economic and financial uncertainty's effect on fertility and birth rates. Studies have shown that those who worried more frequently about future job prospects were more likely to have doubts about having children and expected to have them later in life. Research has also suggested that a mother's postponement of childbearing increases her children's socioeconomic opportunities. Costs associated with raising children may have effects as well. From 1960 to 2015, the average cost of raising a single child from birth to age 17 for a middle-income, married couple increased 16% in real terms. Over this period, the portions of costs attributable to housing, food, transportation, and clothing have decreased. However, costs associated with healthcare doubled as a percentage of total cost and costs associated with child care and education increased from 2% of total costs to 16%. To the degree parents contribute to the costs of higher education, the increasing trend in child care costs may be understated. The decision to have children later in life is reflected in historical data. Specifically, the decline in fertility among women has not been shared uniformly across age groups. In fact, since the mid-1970s fertility among women aged 30-34 and 34-39 has been increasing ( Figure B-1 ). These data suggest that although the desire to have children remains, the age at which it is done has increased. This postponement of childbearing results in a lower overall fertility rate. On average, the Social Security population is living longer. This demographic trend is observed in two complementary measures: a decreasing mortality rate and increasing life expectancy. More individuals within the Social Security population are surviving to retirement age, and once in retirement they are collecting benefits for a greater number of years than previous generations of beneficiaries. For instance, in 1945, one year before the baby boom began, a male at birth could expect to live on average for 62.9 years. In 1965, one year after the baby boom ended, a male at birth could expect to live 66.8 years on average, an increase of almost 4 years. During that same period, the average life expectancy for a female at birth increased by 5.4 years. The trustees cite several developments over the past century that contributed to the lower mortality rates, including access to primary medical care for the general population, discovery and general availability of antibiotics and immunizations, clean water supply and waste removal, and the rapid rate of growth in the general standard of living. Changes in the leading causes of death support the effectiveness of the developments cited by the trustees. In 1900, the leading cause of death in the United States was infectious diseases, such as influenza or tuberculosis (see Appendix C ). From 1900 to 1940, the decline in infectious disease as a major cause of death was largely attributed to nutritional improvements and public health measures; the subsequent development of medical treatments further reduced infectious disease as a leading cause of death. As deaths due to infectious diseases declined, deaths due to diseases of old age increased. From 1900 to 1940, diseases associated with old ageâcardiovascular disease and cancerâbecame the two leading causes of death. By 1950, cardiovascular disease alone led to more deaths than the next four leading causes. However, owing to improvements in medical treatments and access to those treatments, the age-adjusted death rate for cardiovascular disease decreased by more than 70% by 2015. In addition, this time period overlaps with the 1965 creation of Medicare, which has provided older Americans with better access to health care. Figure 4 shows how the developments cited by the trustees combined to decrease mortality rates in the Social Security population. From 1945 to 2015, the death rate declined from 1,716.6 persons per 100,000 to 815.8 persons per 100,000, an approximate decline of 52%. This trend underscores the aging of the Social Security population, that is, more and more people covered by Social Security are surviving to retirement age. The trustees project this trend of decreasing mortality rates will continue throughout the projection period. Figure 4 shows historical death rates as measured by the National Center for Health Statistics (Centers for Disease Control and Prevention) and the trustees, and the trustees' projected death rates under their intermediate assumptions. The decrease in mortality rates from 1945 to 2015 translated into higher average life expectancies for Social Security-covered individuals, both those currently working and those collecting benefits. A main measure of life expectancy is period life expectancy: an individual's expected average remaining life at a selected age, assuming no future changes in death rates. In 1945, the period life expectancy at birth was 62.9 years for a male and 68.4 years for a female. This indicates that in 1945, shortly after Social Security began regular monthly payments, the average newborn male was not expected to reach full retirement age and the average female was not expected to live more than a few years beyond full retirement age (in 1945 the full retirement age was 65, see Table 2 ). In 2015, the period life expectancy at birth was 76.2 years for a male and 81.0 years for a female. Thus, males and females born in 2015 can expect at birth to live approximately 13 years longer than those born in 1945. Decreasing age-specific mortality rates at the older ages also translate into longer period life expectancy at age 65, an age commonly associated with retirement. In 1945, shortly after Social Security began regular monthly payments, a 65-year-old female could expect to live another 14.4 years on average and a 65-year-old male could expect to live another 12.6 years. In 2015, those life expectancies were 20.4 years and 17.8 years, respectively. In 2015, more of the population survived to the age at which they were eligible for Social Security benefits than in 1945. In addition, individuals reaching eligibility age in 2015 exhibited longer period life expectancies than in 1945. As shown in Figure 5 , the trustees project this trend to continue throughout the projection period, thereby contributing to the OASDI program's rising costs. Population aging has consequences for the Social Security system's financial sustainability. As a result of lower fertility rates and increased life expectancy, in 2035 the Social Security system is projected to experience aged dependency ratios ( Figure 2 ) not observed during the program's history. The aged dependency ratios are projected to trend higher as the baby boom generation retires. In 2018, approximately 10,200 baby boomers per day attained age 65; this figure is expected to reach 11,000 per day by 2029. This demographic trend suggests that the ratio of persons collecting benefitsâor soon to beâto those paying into Social Security will increase. The more this ratio increases, the more strain is placed on the OASDI program's financial position. An alternative measure of OASDI program sustainability is the ratio of beneficiaries per 100 covered workers. For example, a ratio of 30 indicates that for every 30 beneficiaries (i.e., individuals collecting benefits) there are 100 workers in covered employment (i.e., individuals subject to the payroll tax). Increases in this ratio suggest that those in covered employment are supporting an increasing number of people collecting benefits. Figure 6 displays ratios of historical and projected beneficiaries per 100 covered workers. The ratio of beneficiaries per 100 covered workers through year 2031 will be largely influenced by the baby boom generation. The oldest of the baby boomers turned 20 in 1966 and started to enter the paid labor force, becoming covered employees. From 1970 to 2008, a period in which most baby boomers were working age, the ratio of beneficiaries per 100 covered workers remained around 30. In this period, the ratio never fell below 27 or rose above 31. From 2009 to 2017, the period in which the oldest of the baby boomers reached full retirement age, the number of beneficiaries per 100 covered workers increased from 31 to 35. The trustees project this ratio to rise steadily, reaching 44 in 2031, the year in which the youngest baby boomers will reach full retirement age. When the youngest baby boomers, those born in 1964, reach 70 years of age in 2035, the ratio of beneficiaries per 100 covered workers is projected to be 46. Previous research suggested that under the current tax rates and benefit schedule, the OASDI program requires a ratio of 35 beneficiaries to 100 covered workers to maintain itself as a pay-as-you-go program. The line representing the ratio of beneficiaries per 100 covered workers in Figure 6 corresponds to the OASDI cost as a percentage of taxable payroll line shown in Figure 1 . The trustees state the following: This similarity emphasizes the extent to which the cost rate [annual cost as a percentage of taxable payroll] is determined by the age distribution of the population. The cost rate is essentially the product of the number of beneficiaries and their average benefit, divided by the product of the number of covered workers and their average taxable earnings. When these lines are graphed together, this relationship becomes more evident. Figure 7 highlights how the rise in the number of beneficiaries per 100 covered workers closely mirrors that of OASDI annual costs. Both measures remained relatively stable from the 1970s through the 2000s, a period in which a majority of the baby boomers were considered to be of prime working ages. Both measures have increased in the 2010s, and they are projected to continue to do so as the baby boomers transition from prime working ages into retirement. The effects of aging on the Social Security program are already evident when considering only the Disability Insurance (DI) program. In a 2014 testimony before Congress, the Chief Actuary stated that the effects of aging had already contributed to rising costs in the DI program. As they entered young adulthood, more baby boomers entered the workforce than received disability benefits. This trend reversed as the baby boomers entered the disability-prone ages of 45 to 64. The trend is projected to continue as baby boomers approach retirement. As explained by the Board of Trustees, From 2019 to 2038, the OASI cost rate [annual cost as a percentage of taxable payroll] rises rapidly because the retirement of the baby-boom generation will continue to increase the number of beneficiaries much faster than the number of workers increases, as subsequent lower-birth-rate generations replace the baby-boom generation at working ages. Figure 1 graphs OASDI annual costs along with annual income, expressed as a percentage of taxable payroll. Figure 1 shows that costs are rising while incomes are relatively stable and that costs are projected to exceed income for the duration of the projection period. The persistence of this imbalance will strain the OASDI program's long-range financial position. As a primarily pay-as-you-go program, the OASDI is self-financing. It is funded primarily through a payroll tax on covered earnings up to an annual limit and by federal income taxes paid by some beneficiaries on a portion of their OASDI benefits. In addition, from 1984 through 2009, annual income from tax revenues exceeded annual costs. This resulted in annual cash surpluses that were invested in federal government securities held in the OASDI Trust Funds, where they earned interest, thus providing the system a third income source. A program with contingency reserves may experience periods of cash deficits, in which annual costs are greater than annual income. With sufficient reserves, such a program need not operate as a strict pay-as-you-go program. However, a pay-as-you-go program cannot operate with indefinite annual cash deficits. As shown in Figure 1 , annual costs are projected to exceed annual income throughout the 75-year projection period. Although the OASDI program can draw upon assets in the trust funds to fulfill scheduled payments temporarily, the program cannot do so indefinitely. The trustees project there to be sufficient trust funds reserves to augment tax revenues and pay all scheduled benefits through 2034. The trustees estimate that trust funds reserves will be exhausted sometime in 2035. Once the trust funds are exhausted, the program must operate as a strict pay-as-you-go system, meaning it will only be able to pay out in benefits what it receives in revenues. At the point of OASDI Trust Funds depletion, program revenues will provide the OASDI program funding to pay only 80% of scheduled benefits. Policy measures seeking to improve trust funds solvency can generally be categorized as reducing benefits or increasing revenues. For illustrative purposes, the trustees estimate changes to the current payroll tax rates and benefit schedule that would maintain trust funds solvency throughout the 75-year projection period. To give a sense of the funding shortfall's magnitude, if measures to maintain trust funds solvency were enacted in 2019, they would require a permanent increase in the payroll tax from its current rate of 12.40% to 15.10%, or a reduction in scheduled benefits of 17% for all current and future beneficiaries, or a combination of both. The increasing costs associated with the OASDI program indicate that more substantial measures are necessary as time elapses. If similar policies were enacted in 2035, the projected year of trust funds depletion, the permanent payroll tax rate needed to restore solvency would increase to 16.05%. Similarly, the necessary permanent reduction of scheduled benefits would increase to 23%. Lawmakers have a wide range of policy options at their disposal to address the projected funding shortfall. This section highlights several policy options that address the funding shortfall's demographic drivers. As discussed, research suggests that economic and financial uncertainty may be a large driver behind many people's decision to postpone childbearing, thus reducing fertility. Social Security is designed as a social insurance program that protects workers and their families against a loss in earnings due to old age, disability, and death. Understanding the large financial burden that childbearing requires, some proposals argue for Social Security benefits to be extended to cover childcare in times of birth or adoption. While not specifically intended to increase fertility, these proposals recognize the hardships that accompany childbearing and aim to reduce financial pressures around that decision. By seeking to reduce one of the larger impediments to fertilityâfinancial stressâsuch proposals could result in increased fertility. The Social Security benefit formula is used to compute a worker's Primary Insurance Amount (PIA), which is the worker's basic monthly benefit amount payable at the full retirement age. To compute the PIA, the formula first indexes a worker's lifetime covered earnings to reflect changes in national wage levels, as measured by the Social Security Administration's average wage index (AWI). The indexing process ensures a worker's or family member's benefit will reflect increases in average wage growth observed over the worker's earning history. After indexing, the highest 35 years of earnings are summed, and the total is divided by 420 (the number of months in 35 years) to determine a worker's average indexed monthly earnings (AIME). Brackets of a worker's AIME are replaced at different rates, the sum of which is the PIA. Exiting the paid workforce to have children can impact a worker's future Social Security benefit. For instance, if a worker has fewer than 35 years of covered earnings, years of zero earnings are entered in the calculation. That is, if a worker forgoes covered earnings to have children, the worker's earnings record will reflect no income for that time. Recognizing the benefit formula's adverse effect for years of no earnings due to childcare, some proposals would reduce the number of computation years used in the benefit formula. Such a proposal would allow one parent per household to claim dropout years for years in which that parent had no earnings and provided care for a child under 6 years of age. For example, the benefit formula for a parent with no earnings for two years due to childcare would use the highest 33 years of earnings in the calculation. Childcare credits are another option that would incorporate childcare into the Social Security benefit formula. Proponents of this method argue that childcare is essentially unpaid work and seek to ensure parents with young children are credited for their caregiving. Under such a proposal, wage credits would be set at one-half the average wage index for that year (e.g., one-half of the AWI for 2018 is $25,947). Parents earning less than the childcare credit level would have their earnings records increased to that level. Parents earning more than the childcare credit level would not receive any credit. The effects of policy changes that may result in increased fertility are uncertain. As shown in Figure 3 , the projected fertility rate is expected to be stable around 2 children per woman. Under current law and the trustees' intermediate assumptions, each increase of 0.1 in the fertility rate decreases the projected funding shortfall by about 7.6%. This suggests a 65% increase in childbearing (i.e., to approximately 3.3 children per woman) would be needed, absent other changes, to avoid trust fund depletion. Some policymakers have proposed increasing the eligibility ages to address changing demographics and their effects on the OASDI program's solvency. For instance, a policy measure that increases the full retirement age (FRA) would be categorized as a provision that reduces benefits, as beneficiaries would then collect benefits for a shorter duration of time or accept a higher actuarial reduction in their monthly benefits by claiming at the age they originally intended. Previous Congresses have addressed increasing the FRA. Facing a funding shortfall, Congress gradually raised the FRA, from age 65 to age 67, as part of the Social Security Amendments of 1983 ( P.L. 98-21 ). Increasing the earliest eligibility age (EEA), a benefit-reducing mechanism, was one of many measures included in this legislation that sought to address previous solvency issues. The Social Security Amendments of 1983 also enacted measures that increased revenues, including provisions that increased the payroll tax and made a portion of Social Security benefits themselves subject to taxation. Table 2 shows the gradual increase in the FRA depending on year of birth. The Social Security program is once again facing projected long-range funding shortfalls. Similar to 1983, a common proposal is to increase the EEA or to further increase the FRA. On one hand, some argue that the average increases in life expectancies indicate that people work until older ages, and thus collect benefits at an older age. On the other hand, those opposed to raising the FRA argue that increases in average life expectancies are not shared equally among covered workers. The SSA's Office of the Chief Actuary (OCACT) publishes estimates for policy provisions that affect claiming ages and are routinely included in legislative proposals. These policy options include provisions that would affect the FRA and provisions that would affect both the FRA and the EEA. Each provision's efficacy can be assessed by its effect on the projected solvency date and its reduction in the long-range actuarial balance , shown for each option in its respective table. For illustrative purposes, a provision that would gradually increase the full retirement age to 68 is estimated to improve the long-range actuarial balance by 16% (compared to current law) and extend solvency to 2035, one year later than under current law. OCACT projects none of the numerous policy provisions raising eligibility ages to result in trust funds solvency throughout the projection period or to completely eliminate the long-range funding shortfall. A 2015 CBO report found similar results in its analysis of four policy measures: (1) an increase in the FRA of one year; (2) an increase in the FRA of three years; (3) an increase in the FRA by one month per birth year; and (4) an increase in the FRA and EEA by one month per birth year. CBO's findings largely mirror OCACT's in showing that an increase in either one or both of the FRA and EEA reduces Social Security program costs. However, a policy measure adjusting only the age at which benefits could be claimed would not be sufficient to offset the funding shortfall. This outcome suggests that policy measures only addressing demographic changes via eligibility ages are limited in their ability to resolve the effects of rising OASDI program costs. Research suggests that raising the FRA or EEA would negatively affect certain segments of the population. Although average life expectancy in the United States is increasing, the increases are not equally shared among the population. For instance, women have a longer life expectancy than men and whites have a longer life expectancy than blacks. Life expectancy is also stratified by income level. Numerous studies show that life expectancy is positively related to income and that the gap itselfâthe difference in life expectancies between high earners and low earnersâis also increasing. Social Security benefits are based on the overall population's average life expectancies, suggesting that groups with longer average life expectancies (e.g., higher-income individuals) will collect more lifetime benefits than groups with shorter average life expectancies (e.g., lower-income individuals). Any provision to increase claiming ages may very well exacerbate this difference in lifetime benefits. A method of increasing the FRA could be to index the FRA for changes in life expectancies. One possible approach would be to index the FRA to maintain a constant ratio of expected retirement years (i.e., life expectancy at FRA) to potential work years (i.e., FRA less 20 years). Another policy option would be to simply adjust the FRA so as to hold the number of expected retirement years constant based on projected life expectancies. As discussed above, life expectancies across different segments of the population can differ by factors such as gender, race, and income. In pursuing options involving indexing the FRA, policymakers would need to address differences in projected life expectancies. Policy options that would index the FRA can be categorized as cost-reduction measures, because they would decrease total benefits as a means to account for longer life expectancies. Although both options discussed above would reduce the projected funding shortfall, neither would eliminate it completely. Similar to options that may address fertility or a straightforward increase in the FRA, the projected effects of indexing the FRA for changes in life expectancies alone would not eliminate the projected funding shortfall. A range of policy options exists that would address the increases in longevity by encouraging delayed claiming. One such option would be to increase the number of years used in the benefit formula. For instance, under current law, the benefit formula uses a worker's highest 35 years of earnings to compute the primary insurance amount (PIA). Including more years of earnings in the benefit formula (e.g., 40 years) would likely include years of low earnings from the start of a worker's earning history or years of no earnings. Under such a policy, a worker could choose to work for more years (i.e., to replace years of low earnings with years of high earnings) or take advantage of delayed retirement credits to attain a PIA that would have been earned had the benefit formula not changed. That is, to maintain the benefit scheduled under current law a person would need to work longer, delay claiming, or a combination of both. Under current law, workers can receive their full PIA once they reach FRA. However, a worker can elect to delay payment of benefits and, in doing so, collect delayed retirement credits. For those born in 1960 and later, a credit is worth 8% of a worker's PIA for each year of delayed claiming. For instance, a worker born in 1960 who reaches FRA at 67 is entitled to 100% of his or her PIA. That same worker could collect 124% of his or her PIA if claiming is delayed three years (at age 70). Any reduction in the benefit formula that would result in a decrease of benefits would then require some use of delayed claiming so as to collect the same PIA as under current law. A provision that would incentivize workers to delay claiming, perhaps through an increase in the number of computation years, could have a negative earnings impact on some workers. For instance, such a provision would favor those earning at high levels later in their careers (so as to replace years of low earnings with years of higher earnings). In addition to possibly favoring higher earners, such a provision could adversely affect certain types of labor. That is, such a policy proposal would essentially favor those who could still work. Workers with careers in more arduous work who were unable to continue working beyond the current FRA would receive a lower PIA under such a proposal. On average, increases in life expectancy have allowed current Social Security beneficiaries to collect benefits for a longer period of time. However, the increase in life expectancies, when paired with low fertility rates, will negatively impact the program's long-range financial position and weaken its ability to pay all scheduled benefits as projected under current law. These demographic trendsâincreasing life expectancy and decreasing fertilityâhave resulted in an aging Social Security population. As the baby boom generation retires, the ratio of beneficiaries relative to people in covered employment will grow. As this ratio rises, Social Security costs rise as well. The rising ratio of beneficiaries to covered workers can exist so long as trust funds assets remain to supplement the program's annual tax revenues. Rising costs are projected to deplete trust funds reserves in 2035. After such time, Social Security program revenues will no longer be sufficient to pay full benefits. Under current law, the Social Security program's sustainability, and its ability to pay full benefits, is largely a demographic issue. Policy measures aimed at addressing the changing demographics, specifically those increasing retirement ages to reflect increasing life expectancy, improve the program's solvency and long-range financial status. Such policy measures are estimated to reduce program costs. However, the reduction in benefits implied by such measures would not be evenly distributed across all segments of the population. In addition, increasing eligibility ages (i.e., reducing costs) alone is not projected to restore solvency throughout the projection period. Given the magnitude of the OASDI program's projected long-range funding shortfall, policy measures that include both a revenue-increasing and a benefit-reducing mechanism to restore solvency increase the likelihood that full benefits will be maintained. Appendix A. The Baby Boomers in the United States The first baby boomers were born in 1946; the last baby boomers were born in 1964. The period of 1946-1964 is marked on either side by low birth rates. As a result of the low fertility rates that followed the baby boomers, they are being replaced in the workforce by cohorts resulting from lower fertility rates. The baby boom's births spanned nearly two decades, denoted with I in Figure A-1 . The older baby boomers started to enter the workforce as the youngest were just being born (II in the figure below). Time period III denotes the stage at which all baby boomers are at least 20 years of age, an age commonly associated with working age. In period IV, baby boomers are attaining full retirement age and beginning to exit the workforce. In period V, all baby boomers are eligible for retirement with full benefits. In 1945, a year before the first baby boomer was born, 7.3% of the Social Security population was aged 65 or older. In 2035, after all baby boomers are eligible for Social Security, 20.5% of the population will be aged 65 or older. The demographic forces that created an aging population evolved over decades. This is important to policymakers because demographic trends in the Social Security population are contributing to rising costs. These demographic trends result in an imbalance between costs and revenues and are projected to continue beyond the baby-boom generation. This imbalance can also be thought of as a persistent imbalance between those in covered employment and those collecting benefits. Appendix B. Birth Rates, by Age Group Appendix C. Causes of Death", "summary": "The Social Security program pays monthly benefits to retired or disabled workers and their families and to the family members of deceased workers. Social Security, or Old-Age, Survivors, and Disability Insurance (OAS DI), is intended to operate primarily as a pay-as-you-go system, where program revenues cover program costs. The OASDI program's revenues and costs are largely determined by economic and demographic factors. The Social Security program is experiencing rising costs and relatively stable income, a trend that is projected to continue for several decades. Although economic and program-specific factors affect the balance between program revenues and costs, research has shown demographic factors to be one of the leading contributors to the increasing imbalance between costs and revenues. The U.S. population has been experiencing a shift in age structure toward older ages and an increase in the median age, termed demographic aging . Two demographic effects have contributed to this aging over time: decreasing fertility and increasing longevity. While aging reflects a society's shared advances in medical, social, and economic matters, it strains the very social insurance systems that provide social support to the aging population. The post-World War II baby boom generation's effect on OASDI highlights this point. Baby boomers, the relatively large cohort resulting from higher fertility rates from 1946 through 1964, have started to exit the paid labor force and collect Social Security benefits. They are being replaced in the workforce by relatively smaller cohorts resulting from lower fertility rates in subsequent generations. Program costs are also rising as an increasing number of retirees collects benefits for longer time periods. According to the Board of Trustees of the OASDI Trust Funds, costs are expected to rise throughout the 75-year projection period, 2019-2093. The Social Security population's changing age distribution is creating a situation in which fewer workers in covered employment are supporting a growing number of people collecting benefits. This relationship is temporarily sustainable, as the OASDI program can draw upon the $2.89 trillion in asset reserves held in the trust funds to augment annual program revenues and fulfill all scheduled benefit payments. However, the OASDI program's ability to pay 100% of scheduled benefits becomes unsustainable when these asset reserves are depleted. The Board of Trustees, which oversees the OASDI Trust Funds, projects the funds' assets to be depleted in 2035 due in part to the cumulative strain placed upon the system by an older age distribution. After this, the OASDI program would operate as a strict pay-as-you-go system that can only pay out in benefits what it receives in revenue. Under current laws and projections, the trustees estimate sufficient revenues to be able to pay about 80% of scheduled benefits after asset reserves are depleted. The Social Security program's ability to cover 100% of scheduled benefits depends upon a combination of increased revenues and decreased benefits. One set of policy options to address the funding shortfall includes increasing the full retirement age (the age at which a beneficiary is entitled to full benefits) or the earliest eligibility age (the age at which a beneficiary is first entitled to benefits). This set of policy options uses a demographic solution for a largely demographic issue: the projected imbalance between program costs and income. Measures that include increasing the retirement ages are estimated to improve the program's long-range financial status but not to prevent trust funds depletion by themselves. Although these adjustments help to reduce rising costs, those costs would still be projected to exceed revenues. This suggests that efforts to avoid depleting the OASDI Trust Funds throughout the trustees' projection period would also be improved by including a revenue-increasing mechanism. In addition, increases in life expectancy are not shared equally within the population; disparities exist when life expectancies are analyzed by sex, race, and income levels. A policy measure that increases Social Security eligibility ages may disproportionally help some beneficiaries and disadvantage others.", "document_type": "crs"}
{"report": "The final status of the former princedom of Kashmir has remained unsettled since 1947. On August 5, 2019, the Indian government announced that it was formally ending the \"special status\" of its Muslim-majority Jammu and Kashmir (J&K) state, the two-thirds of Kashmir under New Delhi's control, specifically by abrogating certain provisions of the Indian Constitution that granted the state autonomy with regard to most internal administrative issues. The legal changes went into effect on November 1, 2019, when New Delhi also bifurcated the state into two \"union territories,\" each with lesser indigenous administrative powers than Indian states. Indian officials explain the moves as matters of internal domestic politics, taken for the purpose of properly integrating J&K and facilitating its economic development. The process by which India's government has undertaken the effort has come under strident criticism for its alleged reliance on repressive force in J&K and for questionable legal and constitutional arguments that are likely to come before India's Supreme Court. Internationally, the move sparked controversy as a \"unilateral\" Indian effort to alter the status of a territory that is considered disputed by neighboring Pakistan and China, as well as by the United Nations. New Delhi's heavy-handed security crackdown in the remote state also raised ongoing human rights concerns. To date, but for a brief January visit by the U.S. Ambassador to India, U.S. government officials and foreign journalists have not been permitted to visit the Kashmir Valley. The long-standing U.S. position on Kashmir is that the territory's status should be settled through negotiations between India and Pakistan while taking into consideration the wishes of the Kashmiri people. Since 1972, India's government has generally shunned third-party involvement on Kashmir, while Pakistan's government has continued efforts to internationalize it, especially through U.N. Security Council (UNSC) actions. China, a close ally of Pakistan, is also a minor party to the dispute. There are international concerns about potential for increased civil unrest and violence in the Kashmir Valley, and the cascade effect this could have on regional stability.Â To date, the Trump Administration has limited its public statements to calls for maintaining peace and stability, and respecting human rights. The UNSC likewise calls for restraint by all parties; an \"informal\" August 16 UNSC meeting resulted in no ensuing official U.N. statement. Numerous Members of the U.S. Congress have expressed concern about reported human rights abuses in Kashmir and about the potential for further international conflict between India and Pakistan. New Delhi's August moves enraged Pakistan's leaders, who openly warned of further escalation between South Asia's two nuclear-armed powers, which nearly came to war after a February 2019 suicide bombing in the Kashmir Valley and retaliatory Indian airstrikes. The actions may also have implications for democracy and human rights in India; many analysts argue these have been undermined both in recent years and through Article 370's repeal. Moreover, Indian Prime Minister Narendra Modi and his Hindu nationalist Bharatiya Janata Party (BJP)âempowered by a strong electoral mandate in May and increasingly pursuing Hindu majoritarian policiesâmay be undermining the country's secular, pluralist traditions. The United States seeks to balance pursuit of broader U.S.-India partnership while upholding human rights protections and maintaining cooperative relations with Pakistan. As of early January 2020, five months after the crackdown in J&K began, most internet service and roughly half of mobile phone users in the densely-populated Kashmir Valley remain blocked; and hundreds of Kashmiris remain in detention, including key political figures. According to India's Home Ministry, as of December 3, more than 5,100 people had been taken into \"preventive custody\" in J&K after August 4, of whom 609 remained in \"preventive detention,\" including 218 alleged \"stone-pelters\" who assaulted police in street protests. New Delhi justifies ongoing restrictions as necessary in a fraught security environment. The U.S. government has long acknowledged a general threat; as stated by the lead U.S. diplomat for the region, Principal Deputy Assistant Secretary of State for South and Central Asia Alice Wells, in October, \"There are terrorist groups who operate in Kashmir and who try to take advantage of political and social disaffection.\" In early December, the Indian Home Ministry informed Parliament that incidents of \"terrorist violence\" in J&K during the 115 days following August 5 were down 17% from the 115 days preceding that date, from 106 to 88. However, the Ministry stated that attempts by militants to infiltrate into the Valley across the Line of Control from Pakistan have increased, from 53 attempts in the 88 days preceding August 5 to 84 in the 88 days following (in contrast, in October 2019, Wells stated before a House panel that, \"I think we've observed a decline in infiltrations across the Line of Control\"). Senior Indian officials say their key goal is to avoid violence and bloodshed, arguing that \"lots of the reports about shortages are fictitious\" and that, \"Some of our detractors are spreading false rumors, including through the U.S. media and it is malicious in nature.\" Indian authorities continue to insist that, with regard to street protests, \"There has been no incident of major violence. Not even a single live bullet has been fired. There has been no loss of life in police action\" (however, at least one teenaged protester's death reportedly was caused by shotgun pellets and a tear gas canister ). They add, however, that \"terrorists and their proxies are trying to create an atmosphere of fear and intimidation in Kashmir.\" Because of this, \"Some remaining restrictions on the communications and preventive detentions remain with a view to maintain public law and order.\" A September New York Times report described a \"punishing blockade\" ongoing in the Kashmir Valley, with sporadic protests breaking out, and dozens of demonstrators suffering serious injuries from shotgun pellets and tear gas canisters, leaving Kashmiris \"feeling unsettled, demoralized, and furious.\" An October Press Trust of India report found some signs of normalcy returning, but said government efforts to reopen schools had failed, with parents and students choosing to stay away, main markets remaining shuttered, and mobile phone service remaining suspended in most of the Valley, where there continued to be extremely limited internet service. Since mid-October, the New Delhi and J&K governments have claimed that availability of \"essential supplies,\" including medicines and cooking gas, is being ensured; that all hospitals, medical facilities, schools, banks, and ATMs are functioning normally; that there are no restrictions on movement by auto, rail, or air; and that there are no restrictions on the Indian media or journalists (foreign officials and foreign journalists continue to be denied access). On October 9, curtailment of tourism in the region was withdrawn. On October 14, the government lifted restrictions on post-paid mobile telephone service, while pre-paid service, aka via \"burner phones,\" along with internet and messaging services, remains widely blocked. Public schools have reopened, but parents generally have not wanted their children out in a still-unstable setting. According to Indian authorities, \"terrorists are also preventing the normal functioning of schools.\" On November 1, citizens of the former J&K state awoke to a new status as residents of either the Jammu and Kashmir Union Territory (UT) or the Union Territory of Ladakh (the latter populated by less than 300,000 residents; see Figure 1 ). While the J&K UT will be able to elect its own legislature, all administrative districts are now controlled by India's federal government, and J&K no longer has its own constitution or flag. The chief executives of each new UT are lieutenant governors who report directly to India's Home Ministry. More than 100 federal laws are now applicable to J&K, including the Indian Penal Code, and more than 150 laws made by the former state legislature are being repealed, including long-standing prohibitions on leasing land to non-residents. The new J&K assembly will be unable to make any laws on policing or public order, thus ceding all security issues to New Delhi's purview. On December 18, India's external affairs and defense ministers were in Washington, DC, for the second \"2+2\" summit meeting with their American counterparts, where \"The two sides reaffirmed the growing strategic partnership between the United States and India, which is grounded in democratic values, shared strategic objectives, strong people-to-people ties, and a common commitment to the prosperity of their citizens.\" In the midst of the session, an unnamed senior State Department official met the press and was asked about the situation in J&K. She responded that the key U.S. government concern is \"a return to economic and political normalcy there,\" saying, \"[W]hat has concerned us about the actions in Kashmir are the prolonged detentions of political leaders as well as other residents of the valley, in addition to the restrictions that continue to exist on cell phone coverage and internet.\" While visiting Capitol Hill at the time of the summit, Indian External Affairs Minister Subrahmanyam Jaishankar \"abruptly\" withdrew from a scheduled meeting with senior House Members, reportedly because the House delegation was to include Representative Pramila Jayapal, the original sponsor of H.Res. 745 , which urges the Indian government to \"end the restrictions on communications and mass detentions in Jammu and Kashmir as swiftly as possible and preserve religious freedom for all residents\" (see \"The U.S. Congress, Hearings, and Relevant Legislation\" section below). Some observers saw in Jaishankar's action a shortsighted expression of India's considerable sensitivity about the Kashmir issue and a missed opportunity to engage concerned U.S. officials. Two months earlier, in October, two notable developments took place in India. Local Block Development Council elections were held in J&K that month. With all major regional parties and the national opposition Congress Party boycotting the polls, Independents overwhelmed the BJP, winning 71% of the total 317 blocks to the BJP's 26%, including 85% in the Kashmir division. The results suggested widespread disenchantment with New Delhi's ruling party in J&K. Also in October, India allowed a delegation of European parliamentarians to visit the Kashmir Valley, the first such travel by foreign officials since July. The composition of the delegation and questions surrounding its funding and official or private status added to international critiques of India's recent Kashmir policies. On January 9, New Delhi allowed a U.S. official to visit J&K for the first time since August, when 15 ambassadors, including U.S. Ambassador Ken Juster, were given a two-day \"guided tour\" of the Srinagar area. EU envoys declined to participate, apparently because the visit did not include meetings with detained Kashmiri political leaders. An External Affairs Ministry spokesman said the objective of the visit was for the envoys to view government efforts to \"normalize the situation\" firsthand, but the orchestrated visit attracted criticism from opposition parties and it is unclear if international opprobrium will be reduced as a result. On January 10, India's Supreme Court issued a ruling that an open-ended internet shutdown (as exists in parts of J&K) was a violation of free speech and expression granted by the country's constitution, calling indefinite restrictions \"impermissible.\" The court gave J&K authorities a one-week deadline to provide a detailed review all orders related to internet restrictions. India's former J&K state was about the size of Utah and encompassed three culturally distinct regions: Kashmir, Jammu, and Ladakh (see Figure 1 ). More than half of the mostly mountainous area's nearly 13 million residents live in the fertile Kashmir Valley, a region slightly larger than Connecticut (7% of the former state's land area was home to 55% of its population). Srinagar, in the Valley, was the state's (and current UT's) summer capital and by far its largest city with some 1.3 million residents. Jammu city, the winter capital, has roughly half that population, and the Jammu district is home to more than 40% of the former state's residents. About a quarter-million people live in remote Ladakh, abutting China. Just under 1% of India's total population lives in the former state of J&K. Roughly 80% of Indians are Hindu and about 14% are Muslim. At the time of India's 2011 national census, J&K's population was about 68% Muslim, 28% Hindu, 2% Sikh, and 1% Buddhist. At least 97% of the Kashmir Valley's residents are Muslim; the vast majority of the district's Hindus fled the region after 1989 (see \" Human Rights and India's International Reputation \" below). The Jammu district is about two-thirds Hindu, with the remainder mostly Muslim. Ladakh's population is about evenly split between Buddhists and Muslims. Upon the 1947 partition of British India based on religion, the princely state of J&K's population had unique status: a Muslim majority ruled by a Hindu king. Many historians find pluralist values in pre-1947 Kashmir, with a general tolerance of multiple religions. The state's economy had been agriculture-based; horticulture and floriculture account for the bulk of income. Historically, the region's natural beauty made tourism a major aspect of commerceâthis sector was devastated by decades of conflict, but had seemed to be making a comeback in recent years. Kashmir's remoteness has been a major impediment to transportation and communication networks, and thus to overall development. In mid-2019, India's Ambassador to the United States claimed that India's central government has provided about $40 billion to the former J&K state since 2004. Since Britain's 1947 withdrawal and the partition and independence of India and Pakistan, the final status of the princely state of J&K has remained unsettled, especially because Pakistan rejected the process through which J&K's then-ruler had acceded to India. A dyadic war over Kashmiri sovereignty ended in 1949 with a U.N.-brokered cease-fire that left the two countries separated by a 460-mile-long military \"Line of Control\" (LOC). The Indian-administered side became the state of Jammu and Kashmir. The Pakistani-administered side became Azad [\"Free\"] Jammu and Kashmir (AJK) and the \"Northern Areas,\" later called Gilgit-Baltistan. In 1949, J&K's interim government and India's Constituent Assembly negotiated \"special status\" for the new state, leading to Article 370 of the Indian Constitution in 1950, the same year the document went into effect. The Article formalized the terms of Jammu and Kashmir's accession to the Indian Union, generally requiring the concurrence of the state government before the central government could make administrative changes beyond the areas of defense, foreign affairs, and communications. A 1954 Presidential Order empowered the state government to regulate the rights of permanent residents, and these became defined in Article 35A of the Constitution's Appendix, which prohibited nonresidents from working, attending college, or owning property in the state, among other provisions. Within a decade of India's independence, however, most national constitutional provisions were extended to the J&K state via Presidential Order with the concurrence of the J&K assembly (and with the Indian Supreme Court's assent). The state assembly arguably had over decades become pliant to New Delhi's influence, and critical observers contend that J&K's special status has long been hollowed out: while Article 370 provided special status constitutionally , the state suffered from inferior status politically through what amounted to \"constitutional abuse.\" Repeal of Article 370 became among the leading policy goals of the BJP and its Hindu nationalist antecedents on the principle of national unity. The J&K state's legal integration into India progressed and prospects for a U.N.-recommended plebiscite on its final status correspondingly faded in the 1950s and 1960s. Three more India-Pakistan warsâin 1965, 1971, and 1999; two of which were fought over Kashmir itselfâleft territorial control largely unchanged, although a brief 1962 India-China war ended with the high-altitude and sparsely populated desert region of Ladakh's Aksai Chin under Chinese control, making China a third, if lesser, party to the Kashmir dispute. In 1965, Pakistan infiltrated troops into Indian-held Kashmir in an apparent effort to incite a local separatist uprising; India responded with a full-scale military operation against Pakistan. A furious, 17-day war caused more than 6,000 battle deaths and ended with Pakistan failing to alter the regional status quo. The 1971 war saw Pakistan lose more than half of its population and much territory when East Pakistan became independent Bangladesh, the mere existence of which undermined Pakistan's professed status as a homeland for the Muslims of Asia's Subcontinent. In summer 1999, one year after India and Pakistan tested nuclear weapons, Pakistani troops again infiltrated J&K state, this time to seize strategic high ground near Kargil. Indian ground and air forces ejected the Pakistanis after three months of combat and 1,000 or more battle deaths. In 1947, Pakistan had immediately and formally disputed the accession process by which J&K had joined India at the United Nations. New Delhi also initially welcomed U.N. mediation. Over ensuing decades, the U.N. Security Council issued a total of 18 Resolutions (UNSCRs) relevant to the Kashmir dispute. The third and central one, UNSCR 47 of April 1948, recommended a three-step process for restoring peace and order, and \"to create proper conditions for a free and impartial plebiscite\" in the state, but the conditions were never met and no referendum was held. Sporadic attempts by the United States to intercede in Kashmir have been unsuccessful. A short-lived mediation effort by the United States and Britain included six rounds of talks in 1961 and 1962, but ended when India indicated that it would not relinquish control of the Kashmir Valley. Although President Bill Clinton's personal diplomatic engagement was credited with averting a wider war and potential nuclear exchange in 1999, Kashmir's disputed status went unchanged. After 2001, some analysts argued that resolution of the Kashmir issue would improve the prospects for U.S. success in Afghanistanâa perspective championed by the Pakistani governmentâyet U.S. Presidents ultimately were dissuaded from making this argument an overt aspect of U.S. policy. In more recent decades, India generally has demurred from mediation in Kashmir out of (1) a combination of suspicion about the motives of foreign powers and the international organizations they influence; (2) India's self-image as a regional leader in no need of assistance; and (3) an underlying assumption that mediation tends to empower the weaker and revisionist party (in this case, Pakistan). According to New Delhi, prospects for third-party mediation were fully precluded by the 1972 Shimla Agreement, in which India and Pakistan \"resolved to settle their differences by peaceful means through bilateral negotiations or by any other peaceful means mutually agreed upon between them.\" The 1999 Lahore Declaration reaffirmed the bilateral nature of the issue. A widespread perception that J&K's 1987 state elections were illicitly manipulated to favor the central government led to pervasive disaffection among residents of the Kashmir Valley and the outbreak of an Islamist-based separatist insurgency in 1989. The decades-long conflict has pitted the Indian government against Kashmiri militants who seek independence or Kashmir's merger with neighboring Pakistan, a country widely believed to have provided arms, training, and safe haven to militants over the decades. Violence peaked in the 1990s and early 2000s, mainly affecting the Valley and the LOC (see Figure 2 ). Lethal exchanges of small arms and mortar fire at the LOC remain common, killing soldiers and civilians alike, despite a formal cease-fire agreement in place since 2003. The Indian government says the conflict has killed at least 42,000 civilians, militants, and security personnel since 1989; independent analyses count 70,000 or more related deaths. India maintains a security presence of at least 500,000 army and paramilitary soldiers in the former J&K state. A bilateral India-Pakistan peace plan for Kashmir was nearly finalized in 2007, when Indian and Pakistani negotiators had agreed to make the LOC a \"soft border\" with free movement and trade across it; prospects faded due largely to unrelated Pakistani domestic issues. India has blamed conventionally weaker Pakistan for perpetuating the conflict as part of an effort to \"bleed India with a thousand cuts.\" Pakistan denies materially supporting Kashmiri militants and has sought to highlight Indian human rights abuses in the Kashmir Valley. Separatist militants have commonly targeted civilians, leading India and most Indians (as well as independent analysts) to label them as terrorists and thus decry Pakistan as a \"terrorist-supporting state.\" The U.S. government issues ongoing criticisms of Islamabad for taking insufficient action to neutralize anti-India terrorists groups operating on and from Pakistani soil. Still, many analysts argue that blanket characterizations of the Kashmir conflict as an externally-fomented terrorist effort obscure the legitimate grievances of the indigenous Muslim-majority populace, while (often implicitly) endorsing a \"harsh counterinsurgency strategy\" that, they contend, has only further alienated successive generations in the Valley. For these observers, Kashmir's turmoil is, at its roots, a clash between the Indian government and the Kashmiri people, leading some to decry New Delhi's claims that Pakistan perpetuates the conflict. Today, pro-independence political parties on both sides of the LOC are given little room to operate, and many Kashmiris have become deeply alienated. Critics of the Modi government's Hindu nationalist agenda argue that its policies entail bringing the patriotism of Indian Muslims into question and portraying Pakistan as a relentless threat that manipulates willing Kashmiri separatists, and so is responsible for violence in Kashmir. Arguments locating the conflict's cause in the interplay between Kashmir and New Delhi are firmly rejected by Indian officials and many Indian analysts who contend that there is no \"freedom struggle\" in Kashmir, rather a war \"foisted\" on India by a neighbor (Pakistan) that will maintain perpetual animosity toward India. In this view, talking to Pakistan cannot resolve the situation, nor can negotiations with Kashmiri separatist groups and parties, which are seen to represent Pakistan's interests rather than those of the Kashmiri people. Even before 2019 indications were mounting that Kashmiri militancy was on the rise for the first time in nearly two decades. Figure 3 shows that, in the first five years after Modi took office, the number of \"terrorist incidents\" and conflict-related deaths was on the rise. Mass street protests in the valley were sparked by the 2016 killing of a young militant commander in a shootout with security forces. Existing data on rates of separatist violence indicate that levels in 2019 decreased over the previous year, perhaps in large part due to the post-July security crackdown. J&K's lack of a state assembly in early 2019 appears to have facilitated New Delhi's constitutional changes. In June 2018, the J&K state government formed in 2015âa coalition of the BJP and the Kashmir-based Peoples Democratic Partyâcollapsed after the BJP withdrew its support, triggering direct federal control through the center-appointed governor. BJP officials called the coalition untenable due to differences over the use of force to address a deteriorating security situation (the BJP sought greater use of force). In December 2018, J&K came under \"President's Rule\" for the first time since 1996, with the state legislature's power under Parliament's authority. On February 14, 2019, an explosives-laden SUV rammed into a convoy carrying paramilitary police in the Kashmir Valley city of Pulwama. At least 40 personnel were killed in the explosion. The suicide attacker was said to be a member of Jaish-e-Mohammad (JeM), a Pakistan-based, U.S.-designated terrorist group that claimed responsibility for the bombing. On February 26, Indian jets reportedly bombed a JeM facility in Balakot, Pakistan, the first such Indian attack on Pakistan proper since 1971 (see Figure 4 ). Pakistan launched its own air strike in response, and aerial combat led to the downing of an Indian jet. When Pakistan repatriated the captured Indian pilot on March 1, 2019, the crisis subsided, but tensions have remained high. The episode fueled new fears of war between South Asia's two nuclear-armed powers and put a damper on prospects for renewed dialogue between New Delhi and Islamabad, or between New Delhi and J&K. A White House statement on the day of the Pulwama bombing called on Pakistan to \"end immediately the support and safe haven provided to all terrorist groups operating on its soil\" and indicated that the incident \"only strengthens our resolve\" to bolster U.S.-India counterterrorism cooperation. Numerous Members of Congress expressed condemnation and condolences on social media. However, during the crisis, the Trump Administration was seen by some as unhelpfully absent diplomatically, described by one former senior U.S. official as \"mostly a bystander\" to the most serious South Asia crisis in decades, demonstrating \"a lack of focus\" and diminished capacity due to vacancies in key State Department positions. In July 2019, while taking questions from the press alongside visiting Pakistani Prime Minister Imran Khan, President Trump claimed that Indian Prime Minister Modi had earlier in the month asked the United States to play a mediator role in the Kashmir dispute. As noted above, such a request would represent a dramatic policy reversal for India. The U.S. President's statement provoked an uproar in India's Parliament, with opposition members staging a walkout and demanding explanation. Quickly following Trump's claim, Indian External Affairs Minister Jaishankar assured parliamentarians that no such request had been made, and he reiterated India's position that \"all outstanding issues with Pakistan are discussed only bilaterally\" and that future engagement with Islamabad \"would require an end to cross border terrorism.\" In an apparent effort to reduce confusion, a same-day social media post from the State Department clarified the U.S. position that \"Kashmir is a bilateral issue for both parties to discuss\" and the Trump Administration \"stands ready to assist.\" A release from the Chairman of the House Foreign Affairs Committee, Representative Engel, reiterated support for \"the long-standing U.S. position\" on Kashmir, affirmed that the pace and scope of India-Pakistan dialogue is a bilateral determination, and called on Pakistan to facilitate such dialogue by taking \"concrete and irreversible steps to dismantle the terrorist infrastructure on Pakistan's soil.\" An August 2 meeting of Secretary of State Mike Pompeo and Jaishankar in Thailand saw the Indian official directly convey to his American counterpart that any discussion on Kashmir, \"if at all warranted,\" would be strictly between India and Pakistan. President Trump's seemingly warm reception of Pakistan's leader, his desire that Pakistan help the United States \"extricate itself\" from Afghanistan, and recent U.S. support for an International Monetary Fund bailout of Pakistan elicited disquiet among many Indian analysts. They said Washington was again conceptually linking India and Pakistan, \"wooing\" the latter in ways that harm the former's interests. Trump's Kashmir mediation claims were especially jarring for many Indian observers, some of whom began questioning the wisdom of Modi's confidence in the United States as a partner. The episode may have contributed to India's August moves. In late July and during the first days of August, India moved an additional 45,000 troops into the Kashmir region in apparent preparation for announcing Article 370's repeal. On August 2, the J&K government of New Delhi-appointed governor Satya Pal Malik issued an unprecedented order cancelling a major annual religious pilgrimage in the state and requiring tourists to leave the region, purportedly due to intelligence inputs of terror threats. The developments reportedly elicited panic among those Kashmiris fearful that their state's constitutional protections would be removed. Two days later, the state's senior political leadersâincluding former chief ministers Omar Abdullah (2009-2015) and Mehbooba Mufti (2016-2018)âwere placed under house arrest, schools were closed, and all telecommunications, including internet and landline telephone service, were curtailed. Internet shutdowns are common in Kashmirâone press report said there had been 52 earlier in 2019 aloneâbut this appears to have been the first-ever shutdown of landline phones there. Pakistan's government denounced these actions as \"destabilizing.\" On August 5, with J&K state in \"lockdown,\" Indian Home Minister Amit Shah introduced in Parliament legislation to abrogate Article 370 and reorganize the J&K state by bifurcating it into two Union Territories, Jammu & Kashmir and Ladakh, with only the former having a legislative assembly. In a floor speech, Shah called Article 370 \"discriminatory on the basis of gender, class, caste, and place or origin,\" and contended that its repeal would spark investment and job creation in J&K. On August 6, after the key legislation had passed both of Parliament's chambers by large majorities and with limited debate, Prime Minister Modi lauded the legislation, declaring, \"J&K is now free from their shackles,\" and predicting that the changes \"will ensure integration and empowerment.\" All of his party's National Democratic Alliance coalition partners supported the legislation, as did many opposition parties (the main opposition Congress Party was opposed). The move also appears to have been popular among the Indian public, possibly in part due to a post-Pulwama, post-election wave of nationalism that has been amplified by the country's mainstream media. Proponents view the move as a long-overdue, \"master stroke\" righting of a historic wrong that left J&K underdeveloped and contributed to conflict there. Notwithstanding Indian authorities' claims that J&K's special status hobbled its economic and social development, numerous indicators show that the former state was far from the poorest rankings in this regard. For example, in FY2014-FY2015, J&K's per capita income was about Rs63,000 (roughly $882 in current U.S. dollars), higher than seven other states, and more than double that of Bihar and 50% above Uttar Pradesh. While the state's economy typically grew at the slowest annual rates among all Indian states in the current decade, its FY2017-FY2018 expansion of 6.8% was greater than that of eight states and only moderately lagged the national expansion of 7.2% that year. According to 2011 census data, J&K's literacy rate of nearly 69% ranked it higher than five Indian states, including Andhra Pradesh and Rajasthan. At 73.5 years, J&K ranked 3 rd of 22 states in life expectancy, nearly five years longer than the national average of 68.7. The state also ranked 8 th in poverty rate and 10 th in infant mortality. The year 2019 saw negative economic news for India and increasing criticism of the government on these grounds, leading some analysts to suspect that Modi and his lieutenants were eager to play to the BJP's Hindu nationalist base and shift the national conversation. In addition, some analysts allege that President Trump's relevant July comments may have convinced Indian officials that a window of opportunity in Kashmir might soon close, and that they could deprive Pakistan of the \"negotiating ploy\" of seeking U.S. pressure on India as a price for Pakistan's cooperation with Afghanistan. Indian press reports claimed that External Affairs Minister Jaishankar had \"sensitized\" Secretary of State Pompeo to the coming Kashmir moves at an in-person meeting on August 2 so that Washington would not be taken by surprise. However, a social media post from the State Department's relevant bureau asserted that New Delhi \"did not consult or inform the U.S. government\" before moving to revoke J&K's special status. On August 5, a State Department spokeswoman said about developments in Kashmir, \"We are concerned about reports of detentions and urge respect for individual rights and discussion with those in affected communities. We call on all parties to maintain peace and stability along the Line of Control.\" Three days later, she addressed the issue more substantively, saying, We want to maintain peace and stability, and we, of course, support direct dialogue between India and Pakistan on Kashmir and other issues of concern.... [W]henever it comes to any region in the world where there are tensions, we ask for people to observe the rule of law, respect for human rights, respect for international norms. We ask people to maintain peace and security and direct dialogue. The spokeswoman also flatly denied any change in U.S. policy. The Chairman of the House Foreign Affairs Committee and Ranking Member of the Senate Foreign Relations Committee also responded in a joint August 7 statement expressing hope that New Delhi would abide by democratic and human rights principles and calling on Islamabad to refrain from retaliating while taking action against terrorism. The government's heavy-handed security measures in J&K elicited newly intense criticisms of India on human rights grounds. In late September, Ambassador Wells said, The United States is concerned by widespread detentions, including those of politicians and business leaders, and the restrictions on the residents of Jammu and Kashmir.Â We look forward to the Indian Government's resumption of political engagement with local leaders and the scheduling of the promised elections at the earliest opportunity. During an October 22 House Foreign Affairs subcommittee hearing on human rights in South Asia, Ambassador Wells testified that, \"the Department [of State] has closely monitored the situation\" in Kashmir and, \"We deeply appreciate the concerns expressed by many Members about the situation\" there. She reviewed ongoing concerns about a lack of normalcy in the Valley, especially, citing continued detentions and \"security restrictions,\" including those on communication, and calling on Indian authorities to restore everyday services \"as swiftly as possible.\" Wells also welcomed Pakistani Prime Minister Imran Khan's recent statements abjuring external support for Kashmiri militancy: We believe the foundation for any successful dialogue between India and Pakistan is based on Pakistan taking sustained and irreversible steps against militants and terrorists on its territory.â¦ We believe that direct dialogue between India and Pakistan, as outlined in the 1972 Shimla Agreement, holds the most potential for reducing tensions. Some Indian observers saw the hearing as a public relations loss for India, with one opining that \"India got a drubbing and Pakistan got away scot-free.\" However, for some analysts, the Trump Administration's broad embrace of Modi and its relatively mild criticisms on Kashmir embolden illiberal forces in India. In August and September, numerous of Members of Congress went on record in support of Kashmiri human rights. During October travel to India, Senator Chris Van Hollen was denied permission to visit J&K. Days later, Senator Mark Warner, a cochair of the Senate India Caucus, tweeted, \"While I understand India has legitimate security concerns, I am disturbed by its restrictions on communications and movement in Jammu and Kashmir.\" In October, the House Foreign Affairs Subcommittee on Asia, the Pacific, and Nonproliferation held a hearing on human rights in South Asia, where discussion was dominated by the Kashmir issue. In attendance was full committee Chairman Representative Engel, who opined that, \"The Trump administration is giving a free pass when countries violate human rights or democratic norms. We saw this sentiment reflected in the State Department's public statements in response to India's revocation of Article 370 of its constitution.\" Then-Subcommittee Chairman Representative Brad Sherman said, \"I regard [Kashmir] as the most dangerous geopolitical flash-point in the world. It is, after all, the only geopolitical flash-point that has involved wars between two nuclear powers.\" Also during the hearing, one Administration witness, Assistant Secretary of State for Democracy, Human Rights, and Labor Robert Destro, affirmed that the situation in Kashmir was \"a humanitarian crisis.\" Congress's Tom Lantos Human Rights Commission held a mid-November hearing entitled \"Jammu and Kashmir in Context,\" during which numerous House Members reiterated concerns about reports of ongoing human rights violations in the Kashmir Valley. Among the seven witnesses was U.S. Commission on International Religious Freedom (USCIRF) Commissioner Anurima Bhargava, who discussed restrictions of religious freedom in India, and noted that USCIRF researchers have been barred from visiting India since 2004. In S.Rept. 116-126 of September 26, 2019, accompanying the then-pending State and Foreign Operations Appropriations bill for FY2020 ( S. 2583 ), the Senate Appropriations Committee noted with concern the current humanitarian crisis in Kashmir and called on the government of India to (1) fully restore telecommunications and Internet services; (2) lift its lockdown and curfew; and (3) release individuals detained pursuant to the Indian government's revocation of Article 370 of the Indian constitution. H.Res. 724 , introduced on November 21, 2019, would condemn \"the human rights violations taking place in Jammu and Kashmir\" and support \"Kashmiri self-determination.\" H.Res. 745 , introduced on December 6, 2019, and currently with 40 cosponsors, would recognize the security challenges faced by Indian authorities in Jammu and Kashmir, including from cross-border terrorism; reject arbitrary detention, use of excessive force against civilians, and suppression of peaceful expression of dissent as proportional responses to security challenges; urge the Indian government to ensure that any actions taken in pursuit of legitimate security priorities respect the human rights of all people and adhere to international human rights law; and urge that government to lift remaining restrictions on telecommunications and internet, release all persons \"arbitrarily detained,\" and allow international human rights observers and journalists to access Jammu and Kashmir, among other provisions. Islamabad issued a \"strong demarche\" in response to New Delhi's moves, deeming them \"illegal actions ... in breach of international law and several UN Security Council resolutions.\" Pakistan downgraded diplomatic ties, halted trade with India, and suspended cross-border transport services. Pakistan's prime minister warned that, \"With an approach of this nature, incidents like Pulwama are bound to happen again\" and he later penned an op-ed in which he warned, \"If the world does nothing to stop the Indian assault on Kashmir and its people, there will be consequences for the whole world as two nuclear-armed states get ever closer to a direct military confrontation.\" Pakistan appeared diplomatically isolated in August, with Turkey being the only country to offer solid and explicit support for Islamabad's position. Pakistan called for a UNSC session and, with China's support, the Council met on August 16 to discuss Kashmir for the first time in more than five decades, albeit in a closed-door session that produced no formal statement. Pakistani officials also suggested that Afghanistan's peace process could be negatively affected. Many analysts view Islamabad as having little credibility on Kashmir, given its long history of covertly supporting militant groups there. Pakistan's leadership has limited options to respond to India's actions, and renewed Pakistani support for Kashmiri militancy likely would be costly internationally. Pakistan's ability to alter the status quo through military action has been reduced in recent years, meaning that Islamabad likely must rely primarily on diplomacy. Given also that Pakistan and its primary ally, China, enjoy limited international credibility on human rights issues, Islamabad may stand by and hope that self-inflicted damage caused by New Delhi's own policies in Kashmir and, more recently, on citizenship laws, will harm India's reputation and perhaps undercut its recent diplomatic gains with Arab states such as Saudi Arabia and the UAE. In late 2019, Pakistan accused India of taking escalatory steps in the LOC region, including by deploying medium-range Brahmos cruise missiles there. Pakistan and China have enjoyed an \"all-weather\" friendship for decades. On August 6, China's foreign ministry expressed \"serious concern\" about India's actions in Kashmir, focusing especially on the \"unacceptable\" changed status for Ladakh, parts of which Beijing claims as Chinese territory (Aksai Chin). A Foreign Ministry spokesman called on India to \"stop unilaterally changing the status quo\" and urged India and Pakistan to exercise restraint. China's foreign minister reportedly vowed to \"uphold justice for Pakistan on the international arena,\" and Beijing has supported Pakistan's efforts to bring the Kashmir issue before the U.N. Security Council. One editorial published in China's state-run media warned that India \"will incur risks\" for its \"reckless and arrogant\" actions. On August 8, the U.N. Secretary-General called for \"maximum restraint\" and expressed concern that restrictions in place on the Indian side of Kashmir \"could exacerbate the human rights situation in the region.\" He reaffirmed that, \"The position of the United Nations on this region is governed by the Charter ... and applicable Security Council resolutions.\" Beijing's support of Pakistan's request for U.N. involvement led to \"informal and closed-door consultations\" among UNSC members on August 16, a session that included the Russian government. No ensuing statement was issued, but Pakistan's U.N. Ambassador declared that the fact of the meeting itself demonstrated Kashmir's disputed status, while India's Ambassador held to New Delhi's view that Article 370's abrogation was a strictly internal matter. No UNSC member other than China spoke publicly about the August meeting, leading some to conclude the issue was not gaining traction. In mid-December, Beijing reportedly echoed Islamabad's request that the U.N. Security Council hold another closed-door meeting on Kashmir, but no such meeting has taken place. In a September speech to the U.N. Human Rights Council, High Commissioner for Human Rights Michelle Bachelet expressed being \"deeply concerned\" about the human rights situation in Kashmir. In October, a spokesman for the Council said, \"We are extremely concerned that the population of Indian-administered Kashmir continues to be deprived of a wide range of human rights and we urge the Indian authorities to unlock the situation and fully restore the rights that are currently being denied.\" Numerous Members of the European Parliament have expressed human rights concerns and called on New Delhi to \"restore the basic freedoms\" of Kashmiris. During her early November visit to New Delhi, German Chancellor Angela Merkel opined, \"The situation for the people there is currently not sustainable and must improve.\" Later that month, Sweden's foreign minister said, \"We emphasize the importance of human rights\" in Kashmir. The Saudi government agreed in late December to host an Organization of Islamic Cooperation \"special foreign ministers meeting\" on Kashmir sometime in early 2020. New Delhi's August 5 actions appear to have been broadly popular with the Indian public and, as noted above, were supported by most major Indian political parties. Yet the government's process came under criticism from many quarters for a lack of prior consultation and/or debate, and many legal scholars opined that the government had overstepped its constitutional authority, predicting that the Indian Supreme Court would become involved. New Delhi's perceived circumvention of the J&K state administration (by taking action with only the assent of the centrally appointed governor) is at the heart of questions about the constitutionality of the government's moves, which, in the words of one former government interlocutor to the state, represent \"the total undermining of our democracy\" that was \"done by stealth.\" The Modi government's argument appears to be that, since the J&K assembly was dissolved and the state had been under central rule since 2018, the national parliament could exercise the prerogative of the assembly, a position rejected as specious by observers who see the government's actions as a \"constitutional coup.\" Many Indian (and international) critics of the government's moves see them not only as undemocratic in process, but also as direct attacks on India's secular identity. From this perspective, the BJP's motive is about advancing the party's \"deeply rooted ideals of Hindu majoritarianism\" and Modi's assumed project \"to reinvent India as an India that is Hindu.\" One month before the government's August 5 bill submission, a senior BJP official said his party is committed to bringing back the estimated 200,000-300,000 Hindus who fled the Kashmir Valley after 1989 (known as Pandits ). This reportedly could include reviving a plan for construction of \"segregated enclaves\" with their own schools, shopping malls, and hospitals, an approach with little or no support from local figures or groups representing the Pandits. Beyond the Pandit-return issue, New Delhi's revocation of the state's restrictions on residency and rhetorical emphasis on bringing investment and economic development to the Kashmir Valley lead some analysts to see \"colonialist\" parallels with Israel's activities in the West Bank. Perceived human rights abuses on both sides of the Kashmir LOC, some of them serious, have long been of concern to international governments and organizations. A major and unprecedented 2018 R eport on the Situation on Human Rights in Kashmir from the U.N. Human Rights Commission harshly criticized the New Delhi government for alleged excessive use of force and other human rights abuses in the J&K state. With New Delhi's sweeping security crackdown in Kashmir continuing to date, the Modi government faces renewed criticisms for widely alleged abuses. Indian officials have also come under fire for the use of torture in Kashmir and for acting under broad and vaguely worded laws that facilitate abuses. The Indian government reportedly is in contravention of several of its U.N. commitments, including a 2011 agreement to allow all special rapporteurs to visit India. In spring 2019, after a U.N. Human Right Council's letter to New Delhi asking about steps taken to address abuses alleged in the 2018 report, Indian officials announced they would no longer engage U.N. \"mandate holders.\" India appears to be the world leader in internet shutdowns by far, having blocked the network 134 times in 2018, compared to 12 shutdowns by Pakistan, the number two country in this category. Internet blockages are common in Kashmir, but rarely last more than a few days; at more than five months to date, the outage in the Valley is the longest ever. A group of U.N. Special Rapporteurs called the blackout \"a form of collective punishment\" that is \"inconsistent with the fundamental norms of necessity and proportionality.\" Human Rights Watch and Amnesty International both contend that the communications blackout violates international law. As noted above, in early January 2020, India's Supreme Court seemed to agree, ruling that an indefinite suspension is \"impermissible.\" Kashmiris have begun automatically losing their accounts on the popular WhatsApp platform due to 120 days of inactivity and, by mid-December, the internet shutdown had become the longest ever imposed in a democracy, according to Access Now, an advocacy group. Businesses have been especially hard hit: the Kashmir Chamber of Commerce estimated more than Rs178 billion (about $2.5 billion) in losses over four months. Late 2019 saw a spate of commentary in both the Indian and American press about the likelihood that New Delhi's moves on Kashmir, when combined with the national government's broader pursuit of sometimes controversial Hindu nationalist policies, would contribute to a tarnishing of India's reputation as a secular, pluralist democratic society. In December, Parliament passed a Citizenship Amendment Act (CAA) that adds a religious criterion to the country's naturalization process and triggered widespread and sometimes violent public protests. The Modi/BJP expenditure of political capital on social issues is seen by many analysts as likely to both intensify domestic instability and decrease the space in which to reform the economy, a combination that could be harmful to India's international reputation. Former Indian National Security Adviser and Foreign Secretary Shivshankar Menon told a public forum in New Delhi that the BJP's 2019 actions in Kashmir and changes to citizenship laws have caused self-inflicted damage to the country's international image. In the words of one scholar who agrees, \"India's moral standing has taken a hit,\" and, \"Even India's partners are questioning its credentials as a multicultural, pluralist society.\" One op-ed published in a major Indian daily warned that \"the sense of creeping Hindu majoritarianism has begun to generate concern among a range of groups from the liberal international media, the U.S. Congress, to the Islamic world.\" The article contended that \"India will need some course-correction in the new year to prevent the crystallization of serious external challenges.\" Another long-time observer argued that New Delhi's claims that \"domestic\" issues should be of no concern to an external audience are not credible: \"It's hard to deny that 2019 was the year when Modi's domestic adventures robbed the bank of goodwill accumulated over time.â¦ India's image took a beating this year.\" Support for India's rise as a major regional player and U.S. partner has been among the few subjects of bipartisan consensus in Washington, DC, in the 21 st century, and some analysts contend that the New Delhi government may be putting that consensus to the test by \"sliding into majoritarianism and repression.\" These analysts express concern that an existing consensus in favor of robust and largely uncritical support for India may be eroding, with signs that some Democratic lawmakers, in particular, have been angered by India's domestic policies. According to one Indian pundit, \"[E]ven the mere introduction by House Democrats of two House resolutions on Kashmir bears the ominous signs of India increasingly becoming a partisan issue in the American foreign policy consensus.\" A key goal of U.S. policy in South Asia has been to prevent India-Pakistan conflict from escalating to interstate war. This means the United States has sought to avoid actions that overtly favored either party. Over the past decade, however, Washington appears to have grown closer to India while relations with Pakistan appear to continue to be viewed as clouded by mistrust. The Trump Administration \"suspended\" security assistance to Pakistan in 2018 and has significantly reduced nonmilitary aid while simultaneously deepening ties with New Delhi. The Administration views India as a key \"anchor\" of its \"free and open Indo-Pacific\" strategy, which some argue is aimed at China. Yet any U.S. impulse to \"tilt\" toward India is to some extent offset by Islamabad's current, and by most accounts vital, role in facilitating Afghan reconciliation negotiations. President Trump's apparent bonhomie with Pakistan's prime minister and offer to mediate on Kashmir in July was taken by some as a new and potentially unwise strategic shift. The U.S. government has maintained a focus on the potential for conflict over Kashmir to destabilize South Asia. At present, the United States has no congressionally-confirmed Assistant Secretary of State leading the Bureau of South and Central Asia and no Ambassador in Pakistan, leading some experts to worry that the Trump Administration's preparedness for India-Pakistan crises remains thin. Developments in August 2019 and after also renewed concerns among some analysts that the Trump Administration's \"hands-off\" posture toward this and other international crises erodes American power and increases the risk of regional turbulence. Some commentary, however, was more approving of U.S. posturing. Developments in Kashmir in 2019 raise possible questions for Congress: Have India's actions changing the status of its J&K state negatively affect regional stability? If so, what leverage does the United States have and what U.S. policies might best address potential instability? Is there any diplomatic or other role for the U.S. government to play in managing India-Pakistan conflict or facilitating a renewal of their bilateral dialogue? To what extent does increased instability in Kashmir influence dynamics in Afghanistan? Will Islamabad's cooperation with Washington on Afghan reconciliation be reduced? To what extent, if any, are India's democratic/constitutional norms and pluralist traditions at risk in the country's current political climate? Are human rights abuses and threats to religious freedom increasing there? If so, should the U.S. government take any further actions to address such concerns?", "summary": "In early August 2019, the Indian government announced that it would make major changes to the legal status of its Muslim-majority Jammu and Kashmir (J&K) state, specifically by repealing Article 370 of the Indian Constitution and Section 35A of its Annex, which provided the state \"special\" autonomous status, and by bifurcating the state into two successor \"Union Territories\" with more limited indigenous administrative powers. The changes were implemented on November 1, 2019. The former princely region's sovereignty has been unsettled since 1947 and its territory is divided by a military \"Line of Control,\" with Pakistan controlling about one-third and disputing India's claim over most of the remainder as J&K (China also claims some of the region's land). The United Nations considers J&K to be disputed territory, but New Delhi, the status quo party, calls the recent legal changes an internal matter, and it generally opposes third-party involvement in the Kashmir issue. U.S. policy seeks to prevent conflict between India and Pakistan from escalating, and the U.S. Congress supports a U.S.-India strategic partnership that has been underway since 2005, while also maintaining attention on issues of human rights and religious freedom. India's August actions sparked international controversy as \"unilateral\" changes of J&K's status that could harm regional stability, eliciting U.S. and international concerns about further escalation between South Asia's two nuclear-armed powers, which nearly came to war after a February 2019 Kashmir crisis. Increased separatist militancy in Kashmir may also undermine ongoing Afghan peace negotiations, which the Pakistani government facilitates. New Delhi's process also raised serious constitutional questions andâgiven heavy-handed security measures in J&Kâelicited more intense criticisms of India on human rights grounds. The United Nations and independent watchdog groups fault New Delhi for excessive use of force and other abuses in J&K (Islamabad also comes under criticism for alleged human rights abuses in Pakistan-held Kashmir). India's secular traditions may suffer as India's Hindu nationalist governmentâwhich returned to power in May with a strong mandateâappears to pursue Hindu majoritarian policies at some cost to the country's religious minorities. The long-standing U.S. position on Kashmir is that the territory's status should be settled through negotiations between India and Pakistan while taking into consideration the wishes of the Kashmiri people. The Trump Administration has called for peace and respect for human rights in the region, but its criticisms have been relatively muted. With key U.S. diplomatic posts vacant, some observers worry that U.S. government capacity to address South Asian instability is thin, and the U.S. President's July offer to \"mediate\" on Kashmir may have contributed to the timing of New Delhi's moves. The United States seeks to balance pursuit of a broad U.S.-India partnership while upholding human rights protections, as well as maintaining cooperative relations with Pakistan. Following India's August 2019 actions, numerous Members of the U.S. Congress went on record in support of Kashmiri human rights. H.Res. 745 , introduced in December and currently with 40 cosponsors, urges the Indian government to end the restrictions on communications and mass detentions in J&K that continue to date. An October hearing on human rights in South Asia held by the House Subcommittee on Asia, the Pacific, and Nonproliferation included extensive discussion of developments in J&K. In November, the Tom Lantos Human Rights Commission held an event entitled \"Jammu and Kashmir in Context.\" This report provides background on the Kashmir issue, reviews several key developments in 2019, and closes with a summary of U.S. policy and possible questions for Congress.", "document_type": "crs"}
{"report": "The Defense Nuclear Nonproliferation (DNN) programs were reorganized starting with the FY2016 request. There are two main mission areas under the DNN appropriation: the Defense Nuclear Nonproliferation Program and the Nuclear Counterterrorism and Incident Response Program (NCTIR). NCTIR was previously funded under Weapons Activities. According to the FY2016 budget justification, \"These transfers align all NNSA funding to prevent, counter, and respond to nuclear proliferation and terrorism in one appropriation.\" The DNN Program is now divided into six functional areas: Materials Management and Minimization (M3) conducts activities to reduce and, where possible, eliminate stockpiles of weapons-useable material around the world. Major activities include conversion of reactors that use highly enriched uranium (useable for weapons) to low enriched uranium, removal and consolidation of nuclear material stockpiles, and disposition of excess nuclear materials. Global Material Security has three major program elements: international nuclear security, radiological security, and nuclear smuggling detection and deterrence. Activities toward achieving those goals include the provision of equipment and training, workshops and exercises, and collaboration with international organizations. Nonproliferation and Arms Control implements programs that aim to strengthen international nuclear safeguards, control the spread of dual-use technologies and expertise, and verify nuclear reductions and compliance with treaties and agreements. This program conducts reviews of nuclear export applications and technology transfer authorizations. National Technical Nuclear Forensics Research and Development (NTNF R&D ) examines and evaluates nuclear materials and devices, nuclear test explosions or radiological dispersals, and post-detonation debris through nuclear forensics development at the national laboratories. The program includes a field response capability to assist the interagency in the event of a nuclear or radiological incident. Defense Nuclear Nonproliferation Research and Development ( DNN R&D ) advances U.S. capabilities to detect and characterize global nuclear security threats such as foreign nuclear material and weapons production, diversion of special nuclear material, and nuclear detonations. The Nonproliferation Construction program consists of the Surplus Plutonium Disposition Project (SPD) and the Mixed-Oxide (MOX) Fuel Fabrication Facility (MFFF), which was to be built in South Carolina to convert surplus weapons plutonium into nuclear reactor fuel. This project was terminated and replaced with a different disposal method (see below). The Nuclear Counterterrorism and Incident Response Program (NCTIR) evaluates nuclear and radiological threats and develops emergency preparedness plans, including organizing scientific teams to provide rapid response to nuclear or radiological incidents or accidents worldwide. The FY2021 request for DNN appropriations totaled $2.031 billion, reflecting a 6.2% decrease from FY2020-enacted levels. The budget justification says that this decrease is mainly due to the \"completion of funding for contractual termination\" of the Mixed Oxide Fuel Fabrication Facility (MOX) project at the Savannah River Site. Funding for that program was decreased by 50% (-$150 million). A $42 million, or 9.65%, decrease to the Global Material Security program was due to an increase in FY2020 funds for the Cesium Irradiator Replace Program. The budget proposal requests a $37.2 million, or 10%, increase in funding for the Material Management Minimization program. The increase is mainly in the conversion subprogram, which is working to establish non-HEU based molybdenum-99 production technologies in the United States. The National Technical Nuclear Forensics Research and Development (NTNF R&D) is a new program in FY2021. The budget request says that the program will allow NNSA to \"take on a more active leadership role\" in nuclear forensics. The $40 million in funding for NTNF was moved from the DNN R&D Nuclear Detonation Detection subprogram. As in past years, the FY2020 appropriations included a provision prohibiting funds in the Defense Nuclear Nonproliferation account for certain activities and assistance in the Russian Federation. Appropriations bills have prohibited this since FY2015. The FY2021 budget justification requests funds related to the U.S. plutonium disposition program in the M3 Material Disposition subprogram and Nonproliferation Construction Surplus Plutonium Disposition subprogram. The United States pledged to dispose of 34 metric tons of U.S. surplus weapons plutonium, which was originally to be converted into fuel for commercial power reactors. The U.S. facility for this purpose was to be the Mixed Oxide Fuel Fabrication Facility (MFFF), which had been under construction at the DOE Savannah River site in South Carolina. The MFFF faced sharply escalating construction and operation cost estimates, and the Obama Administration proposed to terminate it in FY2017. After congressional approval, in 2018 DOE ended MFFF construction and began pursuing a replacement disposal method, Dilute and Dispose (D&D), for this material . The D&D method consists of \"blending plutonium with an inert mixture, packaging it for safe storage and transport, and disposing of it in a geologic repository,\" according to the FY2021 request. The Nonproliferation Construction account's proposed decrease of $150 million in FY2021 is due to the final steps in ending construction of the MFFF. In her testimony before the House Appropriations Committee, NNSA Administrator Lisa Gordon-Hagerty said that decrease reflects the completion of the MOX contractual termination settlement. She said that the requested $148.6 million would be used for the Surplus Plutonium Disposition (SPD) project, in support of the D&D method. FY2021 activities would include \"execution of early site preparation and long lead procurements activities, as well as continuing the maturation of the design for all major systems supporting the plutonium processing gloveboxes.\"", "summary": "The Department of Energy's (DOE's) nonproliferation and national security programs provide technical capabilities to support U.S. efforts to \"prevent, counter, respond\" to the proliferation of nuclear weapons worldwide, including by both states and non-state actors. These programs are administered by the National Nuclear Security Administration (NNSA), a semi-autonomous agency established within DOE in 2000. NNSA is responsible for maintaining the U.S. nuclear weapons stockpile, providing nuclear fuel to the Navy, nuclear and radiological emergency response, and nonproliferation. NNSA recently reorganized the Office of Defense Nuclear Nonproliferation, which is funded under the Defense Nuclear Nonproliferation (DNN) account. This report addresses the programs in the NNSA's DNN account, appropriated by the Energy and Water appropriations bill. The FY2020 Consolidated Appropriations bill ( P.L. 116-94) funded the NNSA DNN accounts at $2.164 billion. The FY2021 request for DNN appropriations was $2.031 billion. The proposal would include unobligated prior year balances. The reduction continues an earlier trend to reduce prior-year carryover balances. According to the budget justi fication, the decrease of 6.2% from the FY2020-enacted level is due to \"completion of funding for contractual termination\" of the mixed-oxide fuel (MOX) project at the Savannah River Site.", "document_type": "crs"}
{"report": "In the past, Congress has regularly acted to extend expired or expiring temporary tax provisions. Collectively, these temporary tax provisions are often referred to as \"tax extenders.\" This report briefly summarizes and discusses the economic impact of the 17 business-related tax provisions that are scheduled to expire before 2025. There are 13 business-related temporary tax provisions scheduled to expire at the end of 2020. Most of these business-related provisions were included in past extenders legislation. The business tax extenders are diverse in purpose, providing various types of tax relief to businesses in different industries. Most recently, Congress extended expiring provisions in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). This law retroactively extended, through 2020, eight temporary tax provisions that had expired at the end of 2017; it also extended five provisions scheduled to expire in 2019. The estimated cost of the 13 temporary business tax provision extensions enacted in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) is provided in Table 1 . The most costly of these provisions are the employer credit for paid family and medical leave ($2.2 billion), the work opportunity tax credit ($2.0 billion), and the New Markets Tax Credit ($1.5 billion). Note that all three of these provisions were scheduled to expire at the end of 2019, and thus were extended for one year. In contrast, the eight other provisions that had expired at the end of 2017 and were extended through 2020 were effectively extended for three years. Four other business-related provisions are scheduled to expire in 2021 or 2022: (1) the 12.5% increase in the annual low-income housing tax credit (LIHTC) authority for four years (2018-2021), enacted as part of the 2018 Consolidated Appropriations Act, with a cost of $2.7 billion; (2) the computation of adjusted taxable income without regard to any deduction allowable for depreciation, amortization, or depletion for purposes of the interest deduction limit, set to expire by the 2017 tax revision (the Tax Cuts and Jobs Act, P.L. 115-97 ), with no separate cost estimate for this feature; (3) the five-year extension of the rum cover over, last extended retroactively for 2017 and forward through 2021 as part of the Bipartisan Budget Act of 2018 ( P.L. 115-123 ), with a cost of $0.6 billion; and (4) the credit for certain expenditures for maintaining railroad tracks, extended through 2022 in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, with a cost of $1.1 billion. There are several options for Congress to consider regarding temporary provisions. Provisions that are scheduled to expire or have expired could be extended, and the extension could be short term, long term, or permanent. Alternatively, Congress could allow the provisions to expire and remain expired. There are 13 business-related provisions scheduled to expire in 2020. All 13 of these provisions were extended in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The cost of assets that provide services over a period of time, such as machines or buildings, is deducted over a period of years as depreciation. The schedule of depreciation deductions depends on the asset's life and the distribution of deductions over that life. Straight-line depreciation is used for structures, where equal amounts are deducted in each year. For equipment, deductions are accelerated, with larger amounts deducted in earlier years. Equipment is most commonly depreciated over 5 years or 7 years, but some short-lived assets are depreciated over 3 years and some longer-lived assets are depreciated over 10, 15, or 20 years. Nonresidential structures are depreciated over 39 years. Aside from the desire for economic stimulus, traditional economic theories suggest that tax depreciation should match economic (physical) depreciation of assets as closely as possible. The depreciation provisions discussed below all allow earlier deductions for depreciation, which are valuable because of the time value of money. A fixed reduction in tax liability today is worth more than that same fixed reduction in tax liability in the future. Expensing provisions allow a firm to deduct the cost of an asset the year it is placed in service. Through 2022, bonus depreciation of 100% allows for full expensing of investments in qualifying equipment and property. It is scheduled to decrease to 80% in 2023, 60% in 2024, 40% in 2025, 20% in 2026, and 0% for property acquired and placed in service in 2027 and thereafter. The presence of bonus depreciation or expensing would make some temporary provisions more important (such as the benefits for motorsports complexes, which would otherwise become ineligible) and some less important (such as shortening lives for racehorses or Indian reservation property, or expensing for films and television, which would have received the benefit regardless). Investments in film and television productions are generally recovered using the income forecast method. Under this method, depreciation deductions are based on the pattern of expected earnings. The American Jobs Creation Act of 2004 ( P.L. 108-357 ) included special rules to allow expensing for certain film and television production costs. The provision's main purpose was to discourage \"runaway\" productions, or the production of films and television shows in other countries, where tax and other incentives are often offered. Initially, the provision was set to expire at the end of 2008. However, since 2008, the provision has regularly been extended as part of tax extender legislationâmost recently in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). Under the special expensing rules for film, television, and live theatrical productions, taxpayers may elect to deduct immediately up to $15 million of production costs ($20 million for productions produced in certain low-income and distressed communities) in the tax year incurred. Eligible productions are limited to those in which at least 75% of the compensation paid is for services performed in the United States. For productions that started before 2008, the expensing deduction is not allowed if the aggregate production cost exceeds $15 million ($20 million for productions in designated low-income and distressed communities). Qualifying live theatrical productions are those generally performed in venues with an audience capacity of not more than 3,000 (or 6,500 for seasonal productions performed no more than 10 weeks annually). The provisions would cover most theatrical productions (the largest of the Broadway theatres, for example, has a seating capacity of less than 2,000). The ability to expense (deduct immediately) certain film, television, and live theatrical production costs provides a benefit by allowing deductions to be taken earlier, thus deferring tax liability. The magnitude of the benefit depends on the average lag time from production to earning income. For many films, production costs would be deductible in the year the film is released. If the film is released one year after the production costs are incurred, which may be the case for independent and smaller productions, the provision accelerates cost recovery by one year. The benefit conferred by accelerating cost recovery deductions by one year is limited. Taxpayers with limited or no tax liability may derive little or no benefit from the expensing allowance. The primary policy objective of providing special tax incentives for film and television producers is to deter productions from moving overseas, lured by lower production costs as well as tax and other subsidies offered by foreign governments. Because live theatre is tied to audience location, runaway productions are not a concern. However, providing expensing for live theatrical production costs could encourage investment in such productions and provide parity with film and television. In evaluating this incentive, one consideration is the economic value of domestic film, television, and theatre production relative to the cost of the targeted tax benefits. An exception from the 39-year depreciation life for nonresidential structures exists for the theme and amusement park industry. Assets in this industry are assigned a recovery period of seven years. Historically, motorsports racing facilities have been included in this industry and also allowed a seven-year recovery period. However, ambiguities in the law led to questions about whether motorsports racing facilities were correctly categorized. When the Treasury reconsidered the appropriateness of this classification in 2004, Congress made the seven-year treatment mandatory through 2007 with the American Jobs Creation Act ( P.L. 108-357 ). Since 2004, the provision has been extended as part of tax extenders legislationâmost recently in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ), which extended the provision through December 31, 2020. Without this provision, motorsports racing facilities would be depreciated over the standard 39-year life. The tax authorities presumably estimated motorsports racing facilities to have slower depreciation rates than the seven-year life that applies to amusement park facilities. If so, the seven-year-life provision for motorsports racing facilities constitutes a subsidy to the auto racing industry that does not appear to have an obvious justification. Supporters argued that the provision preserves historical treatment and provides a stimulus to business. They also argued that the benefit helps make motorsports facilities more competitive with sports facilities that are often subsidized by state and local governments. Racehorses are tangible property, and taxpayers using racehorses in a trade or business must capitalize the cost of purchasing racehorses. The cost can then be recovered through annual depreciation deductions over time. The cost recovery period for racehorses is seven years, although racehorses that begin training after age two have a three-year recovery period. Under the temporary provision, this three-year recovery period is extended to all racehorses. In particular, all racehorses placed in service after December 31, 2008, have a three-year recovery period as a result of the Food, Conservation, and Energy Act of 2008 ( P.L. 110-246 ), with provisions subsequently extended. This provision was extended through December 31, 2020, by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). The industry claims that reducing the recovery period to three years more closely aligns the recovery period with the racing life of a horse. The IRS cost recovery period suggests a longer view. Some racehorses continue in productive activity after their racing career through breeding, as well as having a residual value for resale. Taking those uses into account, a Treasury study estimated an overall economic life of nine years. This provision does not affect breeders who race their own horses, because they deduct the cost of breeding and thus have no basis (capital investment) in the horses. The provision generally benefits investors who purchase horses. The Omnibus Budget Reconciliation Act of 1993 ( P.L. 103-66 ) contained a provision allowing businesses on Indian reservations to be eligible for accelerated depreciation (through a reduction in the applicable recovery periods) as part of an effort to increase investment in Indian reservations. Since its initial temporary enactment, this provision has regularly been extended as part of tax extenders legislationâmost recently in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ), which extended the provision through December 31, 2020. Extending the provision might encourage additional investment on Indian reservations. However, if these provisions' main objective is to improve the economic status of individuals currently living on Indian reservations, it is not clear to what extent this tax subsidy will succeed, because it is not given directly to workers but instead is received by businesses. Capital subsidies may not ultimately benefit workers. It is possible that capital equipment subsidies may encourage more capital-intensive businesses and make workers relatively worse off. In addition, workers would not benefit from higher wages resulting from an employer subsidy if the wage is determined by regulation (the minimum wage) that is set higher than the prevailing market wage. Empowerment Zones (EZs) are federally designated geographic areas characterized by high levels of poverty and economic distress, where businesses and local governments may be eligible to receive federal grants and tax incentives. Since 1993, Congress has authorized three rounds of EZs (1993, 1997, and 1999) with the objective of revitalizing selected economically distressed communities. EZs are similar to Enterprise Communities (ECs) and Renewal Communities (RCs), which are also federally designated areas for the purposes of tax benefits and grants. A number of studies have evaluated the effectiveness of the EZ, EC, and RC programs. Government Accountability Office and Department of Housing and Urban Development studies have not found links between EZ and EC designation and improvement in community outcomes. Other research has found modest, if any, effects and called into question these programs' cost-effectiveness. This inability to link these programs to improvements in community-level outcomes should not be interpreted as meaning that the EZ, EC, and RC programs did not aid economic development. The main conclusion from these studies is that the EZ, EC, and RC programs have not been shown to have caused a general improvement in the examined localities' economic conditions. One possible cause for this inability to empirically show the program effects on a large geographic area is that the EZ tax incentives are relatively small. Another possibility is that the EZ tax incentives are targeted at business owners and do not provide direct benefits to workers in EZs. Six tax incentives are typically related to EZs: (1) local designation of an EZ; (2)Â increased exclusion of gain; (3) issuance of qualified, tax-exempt zone academy bonds (QZABs) in EZs; (4) EZ employment credits under the Work Opportunity Tax Credit (WOTC); (5) increased expensing under Internal Revenue Code (IRC) Section 179 for businesses located in EZs; and (6) nonrecognition of gain on rollover of EZ investments. EZs were created by legislation enacted in 1993, and most zones expired at the end of 2009. The provisions were extended in the Protecting Americans from Tax Hikes (PATH) Act of 2015 ( P.L. 114-113 ), which also amended the requirements for tax-exempt enterprise zone facility bonds to treat an employee as a resident of a particular EZ if the employee is a resident of a different EZ, EC, or qualified low-income community. Provisions were extended after 2015, and were last extended through 2020 by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). For more analysis of EZs, see CRS Report R41639, Empowerment Zones, Enterprise Communities, and Renewal Communities: Comparative Overview and Analysis , by Donald J. Marples. The American Samoa economy is largely dependent on three sectors: public works and government, tuna canning, and the residual private sector (e.g., tourism and other services). The American Samoa economic development credit (EDC) is a credit against U.S. corporate income tax in an amount equal to the sum of certain percentages of a domestic corporation's employee wages, employee fringe benefit expenses, and tangible property depreciation allowances for the taxable year with respect to the active conduct of a trade or business within American Samoa. The credit is available to U.S. corporations that, among other requirements, (1) claimed the now-expired possession tax credit (predecessor to the EDC) with respect to American Samoa for their last taxable year beginning before January 1, 2006; or (2) have qualified production activities income after December 31, 2011, in American Samoa (akin to production activities income eligible for Section 199 tax treatment in the United States). The credit's proponents claim it encourages eligible companies to locate, retain, or expand manufacturing operations in the territory. Media reports suggest the EDC's main beneficiary, thus far, has been StarKist, which has retained its cannery operations in American Samoa. The EDC was first enacted in the Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ). This version of the EDC was only available to corporations that had previously claimed the possession tax credit, and it originally expired at the end of 2007. It has been extended numerous times. The American Tax Relief Act of 2012 ( P.L. 112-240 ) also expanded the EDC's criteria to include corporations that had not previously claimed the possession tax credit. The provision was most recently extended through 2020 by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). The New Markets Tax Credit (NMTC) was enacted by the Community Renewal Tax Relief Act of 2000 ( P.L. 106-554 ) to encourage investors to invest in low-income communities (LICs) that traditionally lack access to capital. The NMTC is a competitively awarded tax credit overseen by the Community Development Financial Institutions (CDFI) Fund, organized within the Department of the Treasury. For each NMTC round authorized by Congress, the CDFI Fund ranks all requests for NMTC allocation authority and grants awards to those CDEs that score highest. A CDE is a domestic corporation or partnership that is an intermediary vehicle for the provision of loans, investments, or financial counseling in LICs. All taxable investors, such as banks, venture capital firms, and other private investors, are eligible to receive the NMTC. The NMTC's structure creates incentives for CDEs and private investors to participate in the program. CDEs benefit from the NMTC because they charge fees to their investors for organizing the NMTC application and for structuring the financing for a portfolio of community development projects. The private investors benefit because they receive, each year over seven years, an annual tax credit equal to 5% to 6% of the total amount paid for the stock or capital interest in the CDE that they purchase. Overall, the tax credit amounts to 39% of the cost of the qualified equity investment (less the CDE's fees) as long as the interest in the investment is retained for the entire seven-year period. Thus, even if the community development project funded by the CDE incurs some losses, the value of the tax credit could generate a positive return for the private financers. Opposition to the NMTC is partly based on the belief that corporations and higher-income investors primarily benefit from the provision or that the NMTC leads to an economically inefficient allocation of resources. For instance, while banks and other investors might benefit directly from the credit, a 2009 study found that the NMTC's benefits to selected low-income communities were modest. The study concluded that poverty and unemployment rates fall by statistically significant amounts in tracts that receive NMTC-subsidized investment relative to similar tracts that do not. From a national economic perspective, the NMTC's impact would be greatest in the case where the investment represents net investment in the U.S. economy rather than a shift in investment from one location to another. Another 2009 study found that corporate NMTC investment represented a shift in investment location, but a portion of individual NMTC investment (roughly $641 million in the first four years of the program from 2001 to 2004) represented new investment. The NMTC has been extended as a temporary tax provision since 2008, after its initial authorization expired at the end of 2007. In more recent years, the Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010 ( P.L. 111-312 ) extended NMTC authorization through 2011 and permitted a maximum annual amount of qualified equity investments of $3.5 billion. Following several other extensions, the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ) extended the provision through 2020 with a maximum allocation authority of $5 billion. For more information on the NMTC, see CRS Report RL34402, New Markets Tax Credit: An Introduction , by Donald J. Marples and Sean Lowry; and CRS Report R42770, Community Development Financial Institutions (CDFI) Fund: Programs and Policy Issues , by Sean Lowry. The Indian employment tax credit is an incremental credit claimed by employers for qualified wages and health insurance costs. The credit is designed to encourage hiring of certain individualsâenrolled members of an Indian tribe and their spouses. There are restrictions limiting the benefit to services performed within an Indian reservation for individuals living on or near the reservation. The Indian employment credit is 20% of the excess of qualified wages and health insurance costs paid by an employer over base-year expenses. The credit is allowed for the first $20,000 in qualified wages and health insurance costs. The base year is 1993, such that the incentive is incremental to 1993 wages and health insurance costs (the base year has not been changed since the credit was enacted). The credit is not available for wages paid to an employee whose total wages exceed $30,000, as adjusted for inflation ($50,000 in 2019). The employer must reduce the deduction for wages by the amount of the credit. The Indian employment credit was first enacted in 1993, as part of the Omnibus Reconciliation Act of 1993 ( P.L. 103-66 ). It was initially scheduled to expire at the end of 2003, but has been regularly extended, often retroactively. Past extensions of the Indian employment credit have extended the termination date without updating the base year. Some have proposed updating the base year, in an effort to (1) eliminate the need for taxpayers to maintain tax records dating back to 1993 and (2) restore the credit's incremental design. The most recent extension was through 2020 in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). Extending the Indian employment credit might encourage additional hiring of Indian tribe members and their spouses. Although the Indian employment credit may not increase overall employment on or near Indian reservations, it might increase employment among tribe members. Taxpayers that employ miners in underground mines located in the United States may be able to claim a tax credit for mine rescue team training expenses. The credit amount is limited to the lesser of (1) 20% of training program costs per employee (including wages paid to the employee while in training) or (2) $10,000. For a taxpayer to claim the credit for training provided to an employee, the employee must be a full-time miner who is eligible to serve as a mine rescue team member. The mine rescue team training credit was enacted in the Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ). It was initially scheduled to be effective for 2006, 2007, and 2008. It has subsequently been extended as part of tax extenders legislation, most recently through 2020 in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). The mine rescue team training credit was enacted at the end of 2006, following the high-profile mining accident at Sago Mine. There was an uptick in coal mining fatalities in 2006â47 fatalities were reported (12 were a result of the Sago Mine disaster). From 2007 through 2019, coal mining fatalities averaged 20 per year. During this period, fatalities were highest in 2010, reflecting the Upper Big Branch Mine disaster, where there were 29 fatalities. In the year with the lowest number of fatalities, 2016, there were 8. In 2019, there were 11 coal mining fatalities. Coal mining fatalities have generally been trending downward over time. In recent years, some of this might be explained by a decline in coal production and the decline in the number of coal miners. The fatality rate, however, has also tended to decline over time. A credit for mine rescue team training can encourage mine operators and employers to invest in additional training. The credit can also reduce the cost of complying with federal regulations regarding mine rescue team training. Federal regulations are the government's primary policy instrument governing coal mine safety, with tax incentives playing a small role. The employer credit for paid family and medical leave (PFML) can be claimed by employers providing paid leave (wages) to employees under the Family and Medical Leave Act of 1993 (FMLA; P.L. 103-3 ). The credit can be claimed for wages paid during tax years that begin in 2018, 2019, and 2020. The credit amount is equal to up to 25% of PFML wages paid to qualifying employees. The credit can only be claimed for PFML provided to certain employees with incomes below a fixed threshold. For credits claimed in 2019, employee compensation in 2018 cannot have exceeded $72,000. The amount of PFML wages for which the credit is claimed cannot exceed 12 weeks per employee per year. Further, all qualifying employees must be provided at least two weeks of PFML for an employer to be able to claim the credit. Tax credits cannot be claimed for leave paid by state or local governments, or for leave that is required by state or local law. To claim the credit, an employer must have a written family and medical leave policy in effect. The policy cannot exclude certain classifications of employees, such as unionized employees. The employer credit for paid family and medical leave was added to the IRC in the 2017 tax revision ( P.L. 115-97 ; commonly referred to as the Tax Cuts and Jobs Act). Initially, the credit was effective for wages paid in 2018 and 2019. The credit was extended for one year, through 2020, by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). Providing a tax credit for employers that provide PFML should, on the face of it, tend to increase access to this benefit. How effective the credit will be at achieving this goal remains an open question. Employers may provide PFML to qualified employees for a number of reasons; attracting high-quality talent might be one. If most of the credit's beneficiaries are employers that would have provided PFML without the credit, then the credit is not a particularly efficient mechanism for increasing PFML. There is also the possibility that employers choose to substitute credit-eligible PFML for other forms of leave. An employer could reduce the amount of paid sick, personal, or vacation time off, knowing that employees use this time for paid family and medical leave purposes. If other benefits are scaled back in favor of tax-preferred FMLA leave, employees may not be better off. For more information, see CRS In Focus IF11141, Employer Tax Credit for Paid Family and Medical Leave , by Molly F. Sherlock. The work opportunity tax credit (WOTC) is a nonrefundable wage credit intended to increase job opportunities for certain categories of disadvantaged individuals. The WOTC reduces the cost of hiring specified groups of disadvantaged individuals. WOTC-eligible hires include members of families receiving Temporary Assistance to Needy Families (TANF) benefits, certain members of families receiving food stamp benefits, ex-felons, and certain veterans. For most eligible hires that remain on a firm's payroll at least 400 hours, an employer can claim an income tax credit equal to 40% of wages paid during the worker's first year of employment, up to a statutory maximum. For most WOTC-eligible hires, the wage maximum is $6,000, for a maximum credit of $2,400. For eligible veterans, the maximum eligible wage varies between $6,000 and $24,000, depending on the veteran's characteristics and work history. Eligible summer youth hires' maximum wage to which the credit can be applied is $3,000. A credit equal to 25% of a qualified worker's wages is available for eligible hires that remain employed for at least 120 hours, but fewer than 400 hours. The WOTC was created as part of the Small Business Job Protection Act of 1996 ( P.L. 104-188 ). The WOTC evolved from an earlier tax credit designed to increase employment among targeted groups, the Targeted Jobs Tax Credit (TJTC), which was available from 1978 through 1994. When first enacted, the WOTC was scheduled to expire on October 1, 1997. Since 1997, the WOTC has been expanded, modified, and regularly extended. In several instances, the WOTC was allowed to lapse before being retroactively reinstated. It was most recently extended through 2020 in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). The WOTC is designed to encourage employers to hire more disadvantaged individuals by compensating for potential higher training costs and possible lower productivity. Because the credit is focused on hiring from targeted groups, and not net job creation, it is not necessarily intended to create new jobs or promote recovery in labor markets. Studies evaluating the credit have examined whether it increases job opportunities for targeted disadvantaged individuals, and whether the WOTC is a cost-effective policy measure for achieving this objective. Early evidence on the WOTC suggested that although the credit did offset part of the cost of recruiting, hiring, and training WOTC-eligible employees, it had a limited effect on companies' hiring decisions. More recent studies have found that the WOTC provided benefits to certain groups: increasing the wage income of disabled veterans and increasing employment among long-term welfare recipients, for example. Researchers have also explored whether the credit causes employers to \"churn\" their workforce to take advantage of the credit, replacing currently credit-ineligible workers with credit-certified workers. Evidence of this behavior has not been found. For more information on the WOTC, see CRS Report R43729, The Work Opportunity Tax Credit , by Benjamin Collins and Sarah A. Donovan. The temporary look-through rules were originally enacted in the Tax Increase Prevention and Reconciliation Act of 2005 ( P.L. 109-222 ), for 2006 through 2008, and subsequently extended. These rules effectively allow U.S. corporations to reduce tax paid by allowing them to shift the income of certain foreign subsidiaries in high-tax countries into a lower-taxed foreign subsidiary. Depending on its source, income earned abroad by foreign-incorporated subsidiaries of U.S. parents is taxed at full rates, not taxed at full rates, or not taxed at all. Tax rules require passive income (such as interest income) and certain types of payments that can be easily manipulated to reduce foreign taxes to be taxed at the full rate (21% for a corporate shareholder) if earned by controlled foreign corporations (CFCs). This income is referred to as Subpart F income, reflecting the part of the tax code where treatment is specified. Credits against the U.S. tax imposed are allowed for any foreign taxes paid on this income, and are applied on an overall basis (so that unused foreign taxes in one country can offset taxes paid on income in another country). Other income earned abroad by CFCs is subject to the global intangible low-taxed income (GILTI) provision, which taxes this foreign-source income at half the corporate tax rate (10.5%), after allowing a deduction for a deemed return of 10% on tangible assets. Credits are allowed for 80% of foreign taxes paid. This GILTI rate is scheduled to rise to 13.125% after 2025. Thus, some income (Subpart F) is taxed at the full rate, some income (GILTI) is taxed at partial rates, and some income (the deemed return from tangible assets) is not taxed. (For a more extensive discussion of international tax rules, see CRS Report R45186, Issues in International Corporate Taxation: The 2017 Revision (P.L. 115-97) , by Jane G. Gravelle and Donald J. Marples.) Unless an exception applies, Subpart F income includes dividends, interest, rent, and royalty payments between related firms. These items of income are subject to Subpart F because affiliated firms can use them to shift income and avoid taxation. For example, without Subpart F a U.S. parent's subsidiary (first-tier subsidiary) in a country without taxes (e.g., the Cayman Islands) could lend money to its own subsidiary (second-tier subsidiary) in a high-tax country. The interest payments would be deductible in the high-tax country, but no tax would be due in the no-tax country. Thus, an essentially paper transaction would shift income out of the high-tax country. A similar effect might occur if an intangible asset were transferred to the no-tax subsidiary, and then licensed in exchange for a royalty payment by the high-tax subsidiary. Subpart F taxes this income at full rates. Methods of avoiding Subpart F taxation were made easier in 1997, when U.S. entity classification rules (to be a corporate or noncorporate entity) were simplified to allow checking a box on a form. These \"check-the-box\" regulations provided a way to avoid treatment of payments as Subpart F income under certain circumstances by allowing firms to elect treatment as an unincorporated entity. They were originally intended to simplify classification issues for domestic firms and the IRS, but their usefulness in international tax planning quickly became evident. The Treasury issued regulations in 1998 to disallow their use to avoid Subpart F, but withdrew them after protests from firms and some Members of Congress. In the example above, if the high-tax subsidiary is not a direct subsidiary of the U.S. parent but is a subsidiary of the Cayman Islands subsidiary (i.e., a second-tier subsidiary), the Cayman Islands (first-tier) subsidiary can elect to treat the high-tax subsidiary as if it were a pass-through entity. This treatment would effectively combine the two subsidiaries into a single firm. This outcome can be achieved simply by checking a box, making the high-tax subsidiary a disregarded entity under U.S. law. Because there are no separate firms, no income is recognized by the Cayman Islands firm, although the high-tax subsidiary (second tier) is still a corporation from the point of view of the foreign jurisdiction in which it operates and can deduct interest in the high-tax jurisdiction. The look-through rules expand the scope of check-the-box. The rules were originally enacted in the Tax Increase Prevention and Reconciliation Act of 2005 ( P.L. 109-222 ), for 2006 through 2008, and subsequently extended, most recently through 2020 in the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). The check-the-box rules do not work in every circumstance. For example, if the related firms do not have the same first-tier parent, check-the-box does not apply. In some cases, because of foreign countries' rules about corporate and noncorporate forms, the check-the-box regulations' classification of some entities as per se corporations make this planning unavailable. In addition, other undesirable tax consequences (from the firm's point of view) could occur as a side effect of check-the-box. The look-through rule effectively puts this check-the-box type of planning into the tax code, rather than implementing it as a regulation (which could be altered without legislation), but disconnects it from the check-the-box regulations' creation of a disregarded entity. Related firms do not have to have the parent-child relationship; they can be otherwise related as long as they are under common control. The main argument against the look-through rules (and check-the-box as well) is that they undermine Subpart F's purpose, which is to prevent firms from using passive and easily shifted income to avoid taxation. The main argument for the provision is to allow firms the flexibility to redeploy earnings from one location to another without having U.S. tax consequences (foreign tax rules are unchanged). Firms could, for example, accomplish much of the treatment of look-through rules (even in the absence of check-the-box), but that may involve complex planning and inconvenience. An argument can also be made that in some cases (for example, with the payment of interest), the profit shifting is not harming the U.S. Treasury, but rather reducing taxes collected by foreign governments, as income is shifted out of high-tax countries into low-tax ones. Some might view this last argument as a \"beggar-thy-neighbor\" argument because it facilitates U.S. firms in using tax planning to reduce taxes paid to other countries. The temporary provisions modifying excise taxes on alcoholic beverages were originally enacted through 2019 in the 2017 tax revision (the Tax Cuts and Jobs Act, P.L. 115-97 ). The first provision applies to beer, wine, and distilled spirits broadly. The provisions that apply only to beer, wine, or distilled spirits are discussed separately below. In general, the uniform capitalization (UNICAP) rules require some costs that would otherwise be immediately deductible (such as interest and overhead) to be added to inventory or to the cost of property and deducted in the future when goods are sold or assets depreciated. In the case of interest costs, the rules apply only if the asset is long-lived or has a production period over two years or a production period over one year and a cost of more than $1 million. The production period includes any customary aging period. A temporary modification to the UNICAP rules exempts the aging periods for beer, wine, and distilled spirits from the production period for the UNICAP interest capitalization rules, thus leading to shorter production periods. Absent the temporary excise tax modification provisions, the excise tax rate on beer producers is $18 per barrel (31 gallons), and small brewers that domestically produce no more than 2 million barrels annually are subject to a rate of $7 per barrel on the first 60,000 barrels. The temporary provision reduces the rate for small brewers (producing no more than 2 million barrels) to $3.50 per barrel on the first 60,000 barrels and $16 per barrel on the remaining production. Beer importers and large producers meeting certain requirements may also be eligible for the reduced rate of taxation. For all other producers or importers, the excise tax rates are $16 per barrel on the first 6 million barrels. The tax on beer is due when the beer is removed from the brewery for sale. Beer can be transferred between breweries that are commonly owned (and released from customs) without paying the tax (although tax would be paid on the eventual sale). The temporary provision also allows transfer without payment of tax to an unrelated brewer if the transferee accepts responsibility for paying the tax. Excise taxes are imposed at different rates on wine, depending on the wine's alcohol content and carbonation levels. Still wines are taxed at $1.07 per wine gallon (w.g.) if they are 14% alcohol or less, $1.57/w.g. if they are 14% to 21% alcohol, and $3.15 per w.g. if they are 21% to 24% alcohol. Naturally sparkling wines are taxed at $3.40 per w.g. and artificially carbonated wines are taxed at $3.30 per w.g. Absent the temporary provisions, up to a $0.90 credit against excise tax liability ($0.056 per w.g. for hard cider) may be available for the first 100,000 w.g. removed by a small domestic winery producing not more than 150,000 w.g. per year. The per wine gallon tax credit rate is phased out on production in excess of 150,000 w.g. for wineries producing not more than 250,000 w.g. per year. This small winery credit does not apply to sparkling wine. The temporary provisions modify the credit for small domestic wineries to allow it to be claimed by domestic and foreign producers, regardless of the gallons of wine produced. The credit is also made available to sparkling wine producers. Also, a $1.00 credit against excise tax liability may be available for the first 30,000 w.g. removed annually by any eligible wine producer or importer. The credit is reduced to $0.90 on the next 100,000 w.g., and $0.535 on the next 620,000 w.g. In contrast to permanent law, this credit is not phased out based on production. For hard cider, the credit rates, above, are adjusted to $0.062 per gallon, $0.056 per gallon, and $0.033 per gallon, respectively. Mead is taxed according to wine excise tax rates depending on its alcohol and carbonation content. Naturally sparkling wines are taxed at $3.40 per w.g. and artificially carbonated wines taxed at $3.30 per w.g. Under the temporary provision, mead and certain sparkling wines are to be taxed at the lowest rate applicable to still wine of $1.07 per wine gallon. Mead contains not more than 0.64 grams of carbon dioxide per hundred milliliters of wine, which is derived solely from honey and water, contains no fruit product or fruit flavoring, and contains less than 8.5% alcohol. The sparkling wines eligible to be taxed at the lowest rate contain no more than 0.64 grams of carbon dioxide per hundred milliliters of wine, which are derived primarily from grapes or grape juice concentrate and water, which contain no fruit flavoring other than grape, and which contain less than 8.5% alcohol. Producers and importers of distilled spirits are taxed at a rate of $13.50 per proof gallon (ppg) of production. Under the temporary provision, the tax rate is lowered to $2.70 ppg on the first 100,000 proof gallons, $13.34 ppg for proof gallons in excess of that amount but below 22,130,000 proof gallons, and $13.50 ppg for amounts thereafter. The provision contains rules to prevent members of the same controlled group from receiving the lower rate on more than 100,000 proof gallons of distilled spirits. Distilled spirits are taxed when removed from the distillery, or, in the case of an imported product, from customs custody or bonded premises. Bulk distilled spirits may be transferred in bond between bonded premises without being taxed, but may not be transferred in containers smaller than one gallon. The temporary provision allows transfer of spirits in approved containers other than bulk containers without payment of tax. The low-income housing tax credit (LIHTC) program, which was created by the Tax Reform Act of 1986 ( P.L. 99-514 ), is the federal government's primary policy tool for the development of affordable rental housing. LIHTCs are awarded to developers to offset the cost of constructing rental housing in exchange for agreeing to reserve a fraction of rent-restricted units for lower-income households. Although it is a federal tax incentive, the program is primarily administered by state housing finance agencies (HFAs) that award tax credits to developers. Authority for states to award tax credit is determined according to each state's population. In 2020, the amount of tax credits a state can award is equal to $2.8125 per person, with a minimum small population state authority of $3,217,500. These figures reflect a temporary increase in the amount of credits each state received for 2018-2021 as a result of the 2018 Consolidated Appropriations Act ( P.L. 115-141 ). The increase is equal to 12.5% above what states would have received absent P.L. 115-141 , and is in effect through 2021. For more information on the LIHTC, see CRS Report RS22389, An Introduction to the Low-Income Housing Tax Credit , by Mark P. Keightley. Prior to the 2017 tax revision (the Tax Cuts and Jobs Act, P.L. 115-97 ), the deduction for net interest was limited to 50% of adjusted taxable income (income before taxes; interest deductions; and depreciation, amortization, or depletion deductions) for firms with a debt-equity ratio above 1.5. Interest above the limitation could be carried forward indefinitely. The revision limited deductible interest to 30% of adjusted taxable income for businesses with gross receipts greater than $25 million. The provision also has an exception for floor plan financing for motor vehicles. Businesses providing services as an employee and certain regulated utilities are excepted from this new limit. Also, certain real property and farming businesses can elect out of this limit but must adopt a slower depreciation method for real property or farming assets. The restrictions on interest, called thin capitalization rules , were partially enacted to address concerns about large multinational businesses locating borrowing in the United States to shift profits out of the United States and to foreign, lower-tax, jurisdictions. Under prior law and the temporary provisions of the 2017 tax revision, this interest limit applies to earnings (income) before interest, taxes, depreciation, amortization, or depletion (referred to as EBITDA). After 2021, the 2017 tax revision changes the measure of income to earnings (income) before interest and taxes (referred to as EBIT). Because EBIT is after the deduction of depreciation, amortization, and depletion, it results in a smaller base and thus a smaller amount of eligible interest deductions. The temporary broader base (EBITDA), which expires in 2021, allows more interest deductions. The current, more generous rules for measuring the adjusted taxable income base are more beneficial to businesses with depreciable assets, although affected businesses might be able to avoid some of the change in the deduction rules by leasing assets from financial institutions, such as banks, that generally have interest income. This change in base is projected to have a significant revenue consequence: the Joint Committee on Taxation estimated the revenue gain from the provision to increase from $19.2 billion in FY2021 to $30.2 billion in FY2023, when the change is fully in effect, an increase of more than $10 billion. This revenue change suggests the cost of allowing the broader measure of income (EBITDA) through 2021 is around $10 billion annually. For additional discussion of the interest limitation, see CRS Report R45186, Issues in International Corporate Taxation: The 2017 Revision (P.L. 115-97) , by Jane G. Gravelle and Donald J. Marples. Under permanent law, the excise tax on rum is $13.50 per proof gallon and is collected on rum produced in or imported into the United States. Under permanent law, $10.50 per proof gallon of imported rum is transferred or \"covered over\" to the Treasuries of Puerto Rico (PR) and the United States Virgin Islands (USVI). Temporary provisions have increased the transfer amount to $13.25. The law does not impose any restrictions on how PR and USVI can use the transferred revenues. Both territories use some portion of the revenue to promote and assist the rum industry. The cover-over provisions for rum extend as far back as 1917 for PR and 1954 for USVI. Originally, the full amount of the tax was covered over; however, the Deficit Reduction Act of 1984 ( P.L. 98-369 ) limited the cover over to $10.50 when the federal tax rates were increased to $12.50. The cap was intended to address the question of whether the rebates were proper given the lack of rebates to the states. The Omnibus Budget Reconciliation Act of 1993 (OBRA93; P.L. 103-66 ) temporarily increased the cap to $11.30 for five years, in a law that also reduced another benefit to the possessions (the possessions tax credit). When this increase expired, the cap was increased to $13.25, and it has subsequently been extended, most recently through 2021 by the Bipartisan Budget Act of 2018 ( P.L. 115-123 ). For additional information on the rum cover over see CRS Report R41028, The Rum Excise Tax Cover-Over: Legislative History and Current Issues , by Steven Maguire. Qualified railroad track maintenance expenditures paid or incurred in a taxable year by eligible taxpayers qualify for a 50% business tax credit. The credit is limited to $3,500 multiplied by the number of miles of railroad track owned or leased by an eligible taxpayer. Qualified railroad track maintenance expenditures are amounts, which may be either repairs or capitalized costs, spent to maintain railroad track (including roadbed, bridges, and related track structures) owned or leased as of January 1, 2005, by a Class II or Class III (regional or local) railroad. Eligible taxpayers are smaller (Class II or Class III) railroads and any person who transports property using these rail facilities or furnishes property or services to such a person. The taxpayer's basis in railroad track is reduced by the amount of the credit allowed (so that any deduction of cost or depreciation is only on the cost net of the credit). The credit cannot be carried back to years before 2005. The credit is allowed against the alternative minimum tax. The amount eligible is the gross expenditures, not accounting for reductions such as discounts or loan forgiveness. The provision was enacted in the American Jobs Creation Act of 2004 ( P.L. 108-357 ) and extended numerous times. The provision relating to discounts was added by the Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ). The credit was allowed against the alternative minimum tax by the Emergency Economic Stabilization Act of 2008 ( P.L. 110-343 ). It was most recently extended through 2022 by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). This provision substantially lowers the cost of track maintenance for the qualifying short-line (regional and local) railroads, with tax credits covering half the costs for those firms and individuals with sufficient tax liability. Class II and III railroads account for 32% of the nation's freight rail miles. These regional railroads are particularly important in providing transportation of agricultural products. Although no rationale was provided when the credit was introduced, sponsors of earlier freestanding legislation and industry advocates indicated that the purpose was to encourage the rehabilitation, rather than the abandonment, of short-line railroads. These railroads were spun off in the deregulation of railroads in the early 1980s. Advocates also indicated that this service is threatened by heavier 286,000-pound cars that must be used to connect with longer rail lines. They also suggested that preserving these local lines would reduce local truck traffic. There was also some indication that a tax credit was thought to be more likely to be achieved than grants. The arguments stated by industry advocates and sponsors of the legislation are also echoed in assessments by the Federal Railroad Administration (FRA), which indicated the need for rehabilitation and improvement, especially to deal with heavier cars. The FRA also suggested that these firms have limited access to bank loans.", "summary": "Thirteen temporary business tax provisions are scheduled to expire at the end of 2020. Four other temporary business tax provisions are scheduled to expire in 2021 or 2022. In the past, Congress has regularly acted to extend expired or expiring temporary tax provisions. Collectively, these temporary tax provisions are often referred to as \"tax extenders.\" This report briefly summarizes and discusses the economic impact of the 17 business-related tax provisions that are scheduled to expire in 2020, 2021, or 2022. The provisions discussed in this report are listed below, grouped by type and scheduled year of expiration. The following special business investment (cost recovery) provisions are scheduled to expire in 2020: special expensing rules for certain film, television, and live theatrical productions; seven-year recovery period for motorsports entertainment complexes; three-year depreciation for race horses two years or younger; and accelerated depreciation for business property on an Indian reservation. The following economic development provisions are scheduled to expire in 2020: e mpowerment zone tax incentives; American Samoa economic development credit; and new markets tax credit. The following other business-related provisions are scheduled to expire in 2020: Indian employment tax credit; mine rescue team training credit; employer tax credit for paid family and medical leave; work opportunity tax credit; look-through treatment of payments between related controlled foreign corporations; and p rovisions modifying excise taxes on wine, beer, and distilled spirits. The following provisions are scheduled to expire in 2021 or 2022: 12.5% increase in low-income housing tax credit (LIHTC) authority; computation of adjusted taxable income without regard to any deduction allowable for depreciation, amortization, or depletion; the rum cover over; and c redit for certain expenditures for maintaining railroad tracks. The 13 temporary business-related tax provisions scheduled to expire at the end of 2020 were most recently extended by the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ). Of these 13 provisions, 8 had expired in 2017 and were extended retroactively and 5 were scheduled to expire in 2019. Past tax extenders legislation had extended 11 of these 13 provisions. The other two provisions, both of which were scheduled to expire in 2019, were added to the tax code as part of the 2017 tax revision ( P.L. 115-97 ). Four other business-related provisions will expire in 2021 or 2022. This report does not include provisions that in the past have been classified as individual or energy-related. See CRS Report R46243, Individual Tax Provisions (\"Tax Extenders\") Expiring in 2020: In Brief , coordinated by Molly F. Sherlock; and CRS Report R44990, Energy Tax Provisions That Expired in 2017 (\"Tax Extenders\") , by Molly F. Sherlock, Donald J. Marples, and Margot L. Crandall-Hollick. For a general overview of tax extenders, see CRS Report R45347, Tax Provisions That Expired in 2017 (\"Tax Extenders\") , by Molly F. Sherlock.", "document_type": "crs"}
{"report": "Electric vehicle (EV) technology has emerged as a potential alternative to the internal combustion engine with an increasing variety and volume of electric vehicles sold since the 1990s. Numerous policies and incentives are in place or have been proposed to encourage the production, purchase, and use of alternative fuel vehicles (including EVs). These proposals have been at times alongside efforts to reduce fuel consumption and subsequent emissions, support U.S. vehicle manufacturing, and address the growing shortfall in the Highway Trust Fund. Since 2010, some incentives and grant programs have expired, and other legislative options have been proposed. Underlying these policies are congressional interests such as reducing reliance on foreign sources of petroleum, encouraging rural development, promoting domestic manufacturing, and addressing environmental concerns. The electric car was first created in the early 1800s as a simple electrified buggy. It was considered to be quiet, easy to drive, and did not emit exhaust like its gasoline- and steam-powered counterparts. According to the U.S. Department of Energy (DOE), by the early 1900s, electric cars had enjoyed a brief popularity, accounting for one-third of cars on the road. Within a few decades, however, electric cars were practically obsolete. Electric starters and increasing availability of gasoline fueling stations made gasoline-powered cars as easy to start and drive as electric cars. Neither type of car required the use of a cumbersome hand-crank system, but gasoline-powered cars gained the edge since electricity availability was slow to expand relative to gasoline fueling stations. The Model T, first produced in 1908, came to dominate the market due to its affordability and driving range. Growing concerns in the late 20 th century over the environmental impact of fossil fuels and greenhouse gas and other emissions sparked renewed interest in electric vehicles. EVs may support ongoing efforts to address environmental concerns through reducing petroleum consumption in transportation. Support for EV deployment stems from, among other things, federal and state policies establishing manufacturing rebates, tax credits for purchase, funding for research and development, and standards for fuel economy and emissions standards. National standards include Corporate Average Fuel Economy (CAFE) standards promulgated by the U.S. Department of Transportation (DOT) National Highway Traffic Safety Administration (NHTSA) under the authority of the Energy Policy and Conservation Act (EPCA; P.L. 94-163 ; as amended by the Energy Independence and Security Act of 2007 (EISA; P.L. 110-140 )), and the Environmental Protection Agency (EPA) standards for greenhouse gas emissions from motor vehicles as air pollutants under authority of the Clean Air Act (CAA; P.L. 88-206). In 2012, NHTSA and EPA coordinated these standards under a joint rule establishing the National Program; standards applicable to model years 2021-2026 are currently under reconsideration under the proposed Safer Affordable Fuel-Efficient (SAFE) Vehicles Rule. In the 1990s, the first contemporary hybrid-electric vehicle (HEV) debuted on the global market, the Toyota Prius, while General Motors released (and terminated) the first contemporary all-electric vehicle (AEV), the EV-1. From 2000 to 2010, a few more electric vehicles emerged, including the first commercially available plug-in hybrid-electric (PHEV), the Chevrolet Volt, the all-electric Nissan Leaf, and Tesla's line of dedicated all-electric vehicles. Many of these EVs were made possible by DOE support for research and development of EV technology, in particular battery technology, as well as DOE-sponsored loans made available to EV automakers and investments in nationwide charging infrastructure. More manufacturers followed, contributing models to a growing electric vehicle market. From 2010 to 2018, EV sales increased from 275,000 to 705,000, making up 4.2% of all new light-duty vehicles sales in 2018 in the United States ( Figure 1 ). Charging infrastructure has also grown in response to rising electric vehicle ownership, increasing from 3,394 non-residential chargers in 2011 to 78,301 in 2019. However, many locations have sparse or no public charging infrastructure. This report provides a primer on the expansion of the market for electric passenger, or light-duty, vehicles. This discussion will address some of the factors influencing EV adoption, the broad categories of EVs and related technology, and the current federal policy landscape. Most of the more than 92 million new light-duty vehicles sold worldwide in 2018 are conventional vehicles , or those powered by internal combustion engines. Worldwide sales of new plug-in electric vehicles totaled 2.0 million in 2018. In the same year, 16.9 million new light-duty vehicles were sold in the United States, with sales of new plug-in electric vehicles totaling 362,000â2.1% of all new vehicle sales. When sales of new hybrid-electric vehicles are included, EV sales totaled 705,000, making up 4.2% of all new light-duty vehicle sales in 2018. One factor shaping interest in vehicle electrification is its potential to reduce the transportation sector's overall emissions from greenhouse gases, particulate matter, and other air pollutants by reducing the use of petroleum products; the extent of any such reduction would depend on a number of factors, including the mix of regional electricity generation sources. At 1,866 million metric tons of carbon dioxide equivalent in 2017, transportation sector emissions have increased more than any other sector since 1990 ( Figure 2 ), along with increasing demand for travel. Light-duty vehicles contributed 59% of total transportation emissions, with the remainder coming from trucks and other highway vehicles, aircraft, trains, and ships and boats. Light-duty vehicles also consumed 53% of petroleum-based fuels in the transportation sector in 2017. Other sectors exhibited reductions in carbon dioxide emissions while making improvements in energy efficiency and reducing consumption of coal and petroleum products. In the electricity generation sector, electric power generated is observed to be relatively flat from 2013 to 2017, while emissions decreased and natural gas and renewable energy consumption replaced coal consumption. An electric vehicle (EV) is characterized by its electric motor and traction battery pack, comprising numerous battery cells, most commonly lithium-ion. EV batteries provide power that drives the vehicle and are distinct from the lead-acid batteries that are used in the ignition process of most internal combustion engine vehicles (ICEVs). At times, the motor acts as a generator, sending electricity to the battery, which is later used to power the motor. The broad categories of EVs can be identified by whether they have an internal combustion engine (i.e., hybrids) and whether the battery can be charged by external electricity (i.e., plug-ins). Figure 3 demonstrates the differentiations between the three broad categories of EVs: hybrid-electric vehicles (HEVs), plug-in hybrid-electric vehicles (PHEVs), and all-electric vehicles (AEVs). Internal combustion engine vehicles are the most common passenger vehicles on the road. They rely primarily on petroleum-based fuel (typically gasoline), which is injected into a small chamber in the internal combustion engine where a spark ignites the fuel to produce the power that propels the vehicle ( Figure 4 ). The ICEV powertrain can have more than 100 moving parts between the engine, the transmission, and other components. Fuel efficiency in new ICEVs has increased, with some vehicle models achieving a rating of up to 39 miles per gallon (mpg) for model year 2019. Table 1 summarizes various aspects of ICEVs and the different electric vehicle types. Of the electric vehicle alternatives, HEVs are most similar to ICEVs, but with higher fuel economy due to a traction battery pack, electric motor, and regenerative braking system. Like ICEVs, HEVs require gasoline to initiate the engine that powers the car, but once running, HEVs supplement that initial power through the electric motor using electricity stored in the battery ( Figure 5 ). The battery is continuously recharged while the car is in use, either by the internal combustion engine or regenerative braking (see shaded box on Features of Electric Vehicles). HEVs cannot run without a petroleum product, but they are generally more fuel efficient than ICEVs, achieving up to a 58 mpg rating. PHEVs combine the technology of HEVs with the ability to charge the traction battery pack via an external source of electricity ( Figure 6 ). As a result, PHEVs can be operated without external charging over a driving range similar to HEVs or in electric-only operation over a certain driving range, especially with regular access to charging facilities. To accommodate this electric driving range, PHEVs require more electricity and batteries with greater electricity storage capacity than HEVsâup to 42 kilowatt hours (kWh) for PHEVs versus up to 1.6 kWh for HEVs. In a PHEV, the internal combustion engine and the electric motor may both be enabled to power the wheels directly in a parallel configuration. The internal combustion engine may also be used in a series configuration only to generate electricity to store in the battery, which is then used by the motor to power the wheels (other configurations are also possible). PHEVs offer higher fuel economy than both HEVs and ICEVs, up to 133 miles per gallon of gasoline equivalent (mpge). AEVs (also called battery-electric vehicles or BEVs), run entirely on electricity stored in a large traction battery pack ( Figure 7 )âthe largest among EVs with a capacity of up to 100 kWh. The battery must be charged via an external source of electricity. Regenerative braking alone is insufficient to generate the quantity of electricity needed to power the motor and all other functionality of a car. AEVs offer the highest fuel economy ratings, up to 136 mpge. AEVs do not use gasoline and have no internal combustion engine. The result is fewer moving and wearing parts in the powertrain and more electronic components. Consequently, a manufacturing shift toward AEVs may disrupt parts manufacturing and maintenance in the automotive industry due to changing demands for parts and differing required skillsets for laborers in the production and maintenance of AEV parts. Batteries in plug-in electric vehiclesâPHEVs and AEVsâcan be charged using a standard residential outlet. Providing a full charge in this manner takes hours due to the low voltage available from a home electrical service. The slow pace of charging is one factor currently affecting consumer acceptance of EVs; most motorists are used to filling up a tank with gas in a matter of minutes. Current technology ( Table 2 ) offers three rates of charging, differentiated by the voltage of the electrical current: Level 1 at 120 volts alternating current (AC; see shaded box on Alternating Current Versus Direct Current); Level 2 at 240 volts AC; and Level 3 (also called DC fast charging) at 500 volts direct current (DC). Level 1 and Level 2 are the most widely accessible, with both voltages often available in a standard home. Connectors and charge ports for AC charging use the SAE J1772 standard, a result of the SAE International standards process documenting common engineering practices. Most plug-in electric vehicles come with a Level 1 cordset with a standard three-prong plug on one end and a J1772 connector on the other that plugs into a vehicle's corresponding charge port. Some vehicles come with a Level 2 cordset, which has a plug for a 240-volt outlet, such as that used for a clothes dryer. For drivers charging at home, no additional cost is required if the selected outlet is served by a dedicated circuit. Lower voltages mean longer charging times. Level 3 offers the highest voltages and faster charging rates than Level 1 and Level 2. The Level 3 charging unit has a charger that converts AC from the electric grid to DC, enabling direct charging of the battery pack. Ordinarily, EVs use an on-board charger to perform this conversion. As an emergent technology, Level 3 connectors and charge ports are not currently standardized and include CHAdeMO (used by Kia, Mitsubishi, and Nissan); SAE combined charging system (CCS; used by BMW and Chevrolet); and Tesla Supercharger (proprietary to Tesla vehicles). Due to the high voltage, Level 3 is not available for residential installation and is only accessible at charging stations. Level 3 charging introduces potential challenges to the longevity of batteries in plug-in electric vehiclesâPHEVs and AEVs. While the lithium-ion batteries used in PHEVs and AEVs are known to lose charging capacity over time, some studies suggest that fast charging contributes to elevated rates of capacity loss and decreased charging cycles. In 2019, many EVs with fast-charging capabilities are equipped with a variety of systems to address capacity loss, including cooling systems, as well as battery management systems that monitor battery health, track frequency of fast charging, and adjust the charge rate to prevent damage to the battery, potentially addressing some of these concerns. Meanwhile, researchers have continued to probe ways to improve fast charging while mitigating its potential impacts. Since the first modern EVs were introduced in the 1990s, use of EV technology and supporting infrastructure has grown. As an emergent technology area, a number of factors remain under consideration. On average, a fleet of EVs could reduce air emissions compared to a fleet of ICEVs, but the extent of the reduction and any associated benefits depend on a variety of factors, in particular when, where, and how plug-in EVs are driven and charged. These emissions include greenhouse gases and other pollutants that contribute to smog and other air quality problems. Transportation emissions can be divided into upstream emissions and downstream emissions. Upstream emissions are associated with the processes of fuel extraction and production, including the production of gasoline and diesel for combustion in ICEVs, and the generation of electricity for charging plug-in EVs. Downstream emissions are emitted while the car is in use, including those emitted from the tailpipe or from evaporation during fueling. PHEVs operating on electricity and AEVs produce few downstream emissions, but they are not emissions free. Determining the emissions from charging a plug-in EV relative to an ICEV depends largely on the sources of the electricity used to charge the vehicle. Research has also shown that emissions are further impacted by charging and usage patterns as well as the efficiency of an individual vehicle. Electricity generation in the United States produced more greenhouse gases and other pollutants than any other sector between 1990 and 2017. Nationally, as fuel sources have changedâdecreased use of coal and increased use of natural gas and other lower-emission or renewable sourcesâand energy efficiency has increased, greenhouse gas emissions from electricity generation have declined by 4.8% since 1990, even as demand for electricity has increased over the same period. However, national averages obscure regional variation in potential emissions from the mix of fuel sources used for electricity generation ( Figure 8 ). For plug-in EVs, per-mile emissions attributed to upstream sources vary geographically. An AEV would be expected to produce fewer emissions on average if charged in the state of Washington where 70% of electricity is produced with hydropower than if charged in Hawaii where 69% of electricity is produced with oil. Additionally, sources for electricity may change over time, resulting in changing emissions for PHEVs and AEVsânew and otherwise. Emissions attributed to upstream sources also depend on the time of day and year when charging takes place. Typically, electrical power systems leverage different electricity generation units to meet electricity demand, shifting electricity generation sources throughout the day or year as demand changes. An increase in electricity demand from charging EVs may require additional generation which may use sources with greater or fewer emissions. Batteries are a crucial component of EVs and introduce novel supply chain considerations to the overall vehicle market. As electric vehicles increase in market share, the overall material requirements of the vehicle market shift from fuels for combustion to minerals and other materials for battery production. Using a comparison of the material compositions of an AEV (Chevrolet Bolt) and an ICEV (Volkswagen Golf), UBS estimated increases in global demand for battery materials such as lithium, cobalt, and graphite, for a fleet entirely made up of AEVs with existing battery technology. On the other hand, the lightweight body typically preferred by EV manufacturers is estimated to result in decreased global demand for materials such as iron and steel in favor of aluminum. Potential considerations for electric vehicle batteries include supply of minerals and other raw materials and subsequent refining capabilities; ability to manufacture battery cells and assemble into battery packs; and end-of-life management by recycling and disposal of batteries composed of chemicals that may be hazardous to humans and the environment. Like any other type of battery, EV batteries' performance will decline through repeated use, but such batteries may be eligible for second and third uses. EV batteries are expected to last at least eight years in a motor vehicle, with most manufacturers offering eight-year or 100,000-mile warranties. When batteries are no longer suitable for use in EVs, they are expected to have approximately 70% capacity. Strategies to extend the useable life of EV batteries include reconditioning for continued use in EVs by replacing specific modules experiencing uneven decline in performance; and repurposing for use in stationary energy storage systems. Lastly, materials within batteries may be recycled for other uses (including making new batteries). Less than 5% of lithium-ion batteriesâthe most common type of EV batteryâare currently being recycled, due in part to the complex technology of the batteries and cost of such recycling. Growing interest in improving lithium-ion battery recycling, such as DOE's 2019 announcement of the Battery Recycling Prize and investment in the Lithium Battery R&D Recycling Center, may elevate recycling rates. A range of federal policies affect the purchase and use of EVs. Vehicle manufacturers have used EV sales to help meet the coordinated standards for Corporate Average Fuel Economy (CAFE) set by the National Highway Traffic Safety Administration (NHTSA) and greenhouse gas emissions under the Clean Air Act (CAA) set by the EPA. Future regulatory action under the Safe Affordable Fuel-Efficient (SAFE) Vehicles Rule may result in changes to these standards for automakers to take into account. A number of other programs, such as the Clean Cities Program, have promoted research and development of batteries and energy storage, charging infrastructure, and other vehicle technologies, exemptions, and deployment. For a fuller list of these programs see CRS Report R42566, Alternative Fuel and Advanced Vehicle Technology Incentives: A Summary of Federal Programs , by Lynn J. Cunningham et al. Certain federal programs active during the 116 th Congress aim to promote the production and purchase of EVs through service and tax credit incentives. Corporate Average Fuel Economy (CAFE) Program Alternative Fuel Vehicle Credits. Establishes a credit system for automakers for selling alternative fuel vehicles. The program promotes the production and sale of alternative fuel vehicles and provides flexibility for automakers to comply with fuel economy standards. Credits are unlimited for dedicated vehicles (e.g., AEVs) and were phased out after model year 2019 for dual-fueled vehicles (e.g., PHEVs). Proposed regulatory action in 2018 may result in changes to this program for model years 2021 and beyond. High Occupancy Vehicle (HOV) Lane Exemption. The statute governing HOV lanes allows states to establish programs to exempt certain alternative fuel vehicles (including PHEVs and AEVs) from HOV lane requirements. The exemption expires September 30, 2025. States were also able establish programs to allow other low-emissions and energy-efficient vehicles to pay a toll to access HOV lanes, but this authority expired September 30, 2019. National Alternative Fuels Corridor. Directs the Department of Transportation to designate strategic locations along major highways for developing plug-in electric vehicle charging and hydrogen, propane, and natural gas fueling. Infrastructure is to be deployed by the end of 2020. Plug-In Electric Vehicle Tax Credit. Provides a federal income tax credit of up to $7,500 per vehicle for buyers of qualifying plug-in electric vehiclesâincluding PHEVs and AEVs. The credit begins to phase out after an automaker has sold 200,000 qualifying vehicles; currently, Tesla and General Motors have reached this threshold. The tax credit helps offset the cost of electric vehicles, which are on average more expensive than ICEVs. Several bills pending in the 116 th Congress would affect existing policy and incentives, and some bills would establish new programs or policies. The following bills were selected to demonstrate a few facets of the current discussion over the future of federal policy on the deployment of vehicle electrification. Other bills have been introduced in the 116 th Congress that would establish rebate programs for electric charging infrastructure, expand the Plug-In Electric Vehicle Tax Credit to include previously-owned vehicles, and reinstate the tax credit for the cost of alternative fuel refueling property. Driving America Forward Act ( H.R. 2256 / S. 1094 ) . Would expand the tax credit for plug-in electric vehicles, which would allow the buyers of 600,000 total vehicles per automaker (currently capped at 200,000) to be eligible for a credit of up to $7,000 (currently $7,500) before the credit is phased out. This bill was referred to committee in both chambers. Electric Credit Access Ready at Sale (Electric CARS) Act of 2019 ( H.R. 2042 / S. 993 ) . Would extend the tax credit for plug-in electric vehicles through December 31, 2029, and repeal the cap for automakers (currently set at 200,000). This bill was referred to committee in both chambers. Fairness for Every Driver Act ( H.R. 1027 / S. 343 ). Would repeal the tax credit for plug-in electric vehicles (currently capped at 200,000 per automaker for up to $7,500 per vehicle) and impose an annual fee on alternative fuel vehicles (i.e., vehicles with electric motors that draw significant power from a source not subject to certain fuel taxes) to be transferred to the Highway Trust Fund. This bill was referred to committee in both chambers. American Cars, American Jobs Act of 2019 ( H.R. 2510 / S. 683 ). Would establish a voluntary program at NHTSA to encourage the purchase or lease of new automobiles made in the United States. The program would provide $3,500 vouchers to purchasers of new passenger vehicles (of any type) produced domestically and $4,500 vouchers to purchasers or lessees of new qualified plug-in electric drive vehicles. The vehicles must be assembled in the United States and contain at least 45% U.S. or Canadian parts. This bill was referred to committee in both chambers. Clean Corridors Act of 2019 ( H.R. 2616 / S. 674 ). Would establish a grant program for state, tribal, or local government authorities to install electric vehicle charging and hydrogen fueling infrastructure along the National Highway System. This bill was referred to committee in both chambers. Leading Infrastructure for Tomorrow's America Act ( H.R. 2741 ). Would direct the Department of Energy to develop model building codes for integrating electric vehicle charging infrastructure and direct states to authorize utilities to recover from ratepayers expenditures from the deployment of electric vehicle charging equipment, in addition to other policies promoting the deployment of electric vehicle charging infrastructure. This bill was referred to committee in the House. Vehicle Innovation Act of 2019 ( H.R. 2170 / S. 1085 ). Would authorize appropriations through FY2024 to the Department of Energy for research, development, engineering, demonstration, and commercial application of vehicles and related technologies, including vehicle electrification. This bill was referred to committee in the House, and placed on the Senate Legislative Calendar under General Orders (Calendar No. 186). Zero-Emissions Vehicles Act of 2019 ( H.R. 2764 / S. 1487 ). Would amend CAA to create a national zero-emissions vehicle standard for automakers whereby zero-emissions vehicles (e.g., all-electric vehicles, hydrogen fuel cell vehicles) are required to comprise 50% of new car sales by 2030 and 100% by 2040. Referred to committee in both chambers.", "summary": "The market for electrified light-duty vehicles (also called passenger vehicles; including passenger cars, pickup trucks, SUVs, and minivans) has grown since the 1990s. During this decade, the first contemporary hybrid-electric vehicle debuted on the global market, followed by the introduction of other types of electric vehicles (EVs). By 2018, electric vehicles made up 4.2% of the 16.9 million new light-duty vehicles sold in the United States that year. Meanwhile, charging infrastructure grew in response to rising electric vehicle ownership, increasing from 3,394 charging stations in 2011 to 78,301 in 2019. However, many locations have sparse or no public charging infrastructure. Electric motors and traction battery packsâmost commonly made up of lithium-ion battery cellsâset EVs apart from internal combustion engine vehicles (ICEVs). The battery pack provides power to the motor that drives the vehicle. At times, the motor acts as a generator, sending electricity back to the battery. The broad categories of EVs can be identified by whether they have an internal combustion engine (i.e., hybrid vehicles) and whether the battery pack can be charged by external electricity (i.e., plug-in electric vehicles). The numerous vehicle technologies further determine characteristics such as fuel economy rating, driving range, and greenhouse gas emissions. EVs can be separated into three broad categories: Hybrid-electric vehicles (HEVs): The internal combustion engine primarily powers the wheels. The battery pack and electric motor provide supplemental power. Plug-in hybrid-electric vehicles (PHEVs): The battery pack can be charged by an external source of electricity. Depending on the model, primary power to the wheels may be supplied by the battery pack and electric motor, the internal combustion engine, or a combination. All-electric vehicles (AEVs; also called battery-electric vehicles or BEVs): The battery pack must be charged via an external source of electricity. The battery pack and electric motor power the wheels. Current technology offers three levels of charging for plug-in EVs. Level 1 and Level 2 are currently the most widely accessible with standardized vehicle connectors and charge ports that can be set up for at-home charging. Level 3 (also called DC fast charging) offers the fastest charging rates on the market but is not available for at-home installation due to high voltage. Vehicle connectors and corresponding charge ports for Level 3 are also not standardized, with three different systems currently in use by different vehicle manufacturers. Some research has raised concerns regarding the potential impact of fast charging on battery performance, resulting in technology development aimed at addressing potential capacity loss and decreased charging cycles. As an emergent technology area, EVs present a number of issues for consideration. The fuel sources used to generate the electricity to charge PHEVs and AEVs are a major factor in determining EV greenhouse gas emissions relative to ICEVs. Per-mile EV emissions vary geographically and with the time of day and year that charging takes place. Growing demand for lithium-ion batteries also shifts the material requirements of the vehicle market from fuels for combustion to minerals and other materials for battery production. A growing EV market may encourage new strategies around the supply and refining of raw materials, ability to manufacture batteries, and end-of-life management for batteries that are no longer suitable for use in vehicles. Support for EV deployment stems from, among other things, federal and state policies establishing manufacturing rebates, tax credits for purchases, funding for research and development, and standards for fuel economy and emissions. These policies include the Plug-In Electric Vehicle Tax Credit, and the coordinated Corporate Average Fuel Economy (CAFE) standards and emissions standards for vehicles. Over time, some federal incentives and grant programs have expired. Several bills pending in the 116 th Congress would extend or repeal tax credits for EVs, establish highway usage fees on alternative fuel vehicles, fund grants for charging infrastructure, or establish a national zero-emissions vehicle standard.", "document_type": "crs"}
{"report": "Senate Rule XXIII lists, by position category, individuals who, other than Senators, shall be permitted floor privileges in the Senate chamber when the Senate is in session. As President of the Senate, the Vice President is afforded floor privileges, even when not expected to perform formal or ceremonial duties. Additional categories include former Senators and other high-level officials and certain staff members conducting Senate business in the chamber. However, as amended in 2007, the rule excludes individuals who would otherwise be allowed if they are registered lobbyists or acting as an agent of a foreign principal. Over its history, the Senate has amended its floor privileges rule to add or modify the list of those granted access. The Senate has also agreed to resolutions and unanimous consent (UC) agreements that have further clarified the rule, established procedures regarding staff access, or allowed individuals not designated in the rule onto the floor. This report discusses the current positional categories listed in Rule XXIII, as well as the history of Senate floor privileges, beginning with the first identified Senate resolution regulating non-Senator access to the chamber in 1798. Additionally, relevant standing orders and biennial UC agreements are discussed in the report's \"evolution of the rule\" section. The final section of the report offers guidance in obtaining temporary staff access under the Sergeant at Arms's floor pass system or by unanimous consent. This report will be updated as necessary. Rule XXIII designates the individuals who are granted floor privileges in the Senate chamber. This list contains many of the same categories that were in place during the late 19 th century, as well as official positions that were established at a later time: the mayor of Washington, DC; the Joint Chiefs of Staff, and members of the European Parliament. Rule XXIII, Privilege of the Floor, clauses 1 and 2, states: 1. Other than the Vice President and Senators, no person shall be admitted to the floor of the Senate while in session, except as follows: The President of the United States and his private secretary. The President elect and Vice President elect of the United States. Ex-Presidents and ex-Vice Presidents of the United States. Judges of the Supreme Court. Ex-Senators and Senators elect, except as provided in paragraph 2. The officers and employees of the Senate in the discharge of their official duties. Ex-Secretaries and ex-Sergeants at Arms of the Senate, except as provided in paragraph 2. Members of the House of Representatives and Members elect. Ex-Speakers of the House of Representatives, except as provided in paragraph 2. The Sergeant at Arms of the House and his chief deputy and the Clerk of the House and his deputy. Heads of the Executive Departments. Ambassadors and Ministers of the United States. Governors of States and Territories. Members of the Joint Chiefs of Staff. The General Commanding the Army. The Senior Admiral of the Navy on the active list. Members of National Legislatures of foreign countries and Members of the European Parliament. Judges of the Court of Claims. The Mayor of the District of Columbia. The Librarian of Congress and the Assistant Librarian in charge of the Law Library. The Architect of the Capitol. The Chaplain of the House of Representatives. The Secretary of the Smithsonian Institution. The Parliamentarian Emeritus of the Senate. Members of the staffs of committees of the Senate and joint committees of the Congress when in the discharge of their official duties and employees in the office of a Senator when in the discharge of their official duties (but in each case subject to such rules or regulations as may be prescribed by the Committee on Rules and Administration). Senate committee staff members and employees in the office of a Senator must be on the payroll of the Senate and members of joint committee staffs must be on the payroll of the Senate or the House of Representatives. 2. (a) The floor privilege provided in paragraph 1 shall not apply, when the Senate is in session, to an individual covered by this paragraph who isâ (1) a registered lobbyist or agent of a foreign principal; or (2) in the employ of or represents any party or organization for the purpose of influencing, directly or indirectly, the passage, defeat, or amendment of any Federal legislative proposal. (b) The Committee on Rules and Administration may promulgate regulations to allow individuals covered by this paragraph floor privileges for ceremonial functions and events designated by the Majority Leader and the Minority Leader. In 2007, the Senate amended Rule XXIII to exclude from the chamber persons who are otherwise allowed entrance if they are registered as lobbyists, acting as foreign agents, or representing an entity for the \"purpose of influencing, directly or indirectly, the passage, defeat, or amendment of any Federal legislative proposal.\" This exclusion, adding a new subparagraph 2(a), applies when the Senate is in session. More information on the lobbyist exclusion is presented in the evolution of the rule section of this report. Senate Rule XXIII, clause 2(b), states that \"it shall be the duty of the Committee on Rules and Administration to make all rules and regulations respecting such parts of the Capitol â¦ as are or may be set apart for the use of the Senate and its officers.\" Accordingly, the committee issues a \"Rules for Regulation of the Senate Wing,\" which is printed in the Senate Manual . Rule I of the document specifies that the Senate Sergeant at Arms, under the direction of the presiding officer, enforces the rules associated with the Senate chamber. This officer supervises the Senate floor at all times and ensures that designated subordinates are in performance of their chamber-related duties. In addition, the Sergeant at Arms \"shall see that the messengers assigned to the doors upon the Senate floor are at their posts and that the floor, cloakrooms, and lobby are cleared at least five minutes before the opening of daily sessions of all persons not entitled to remain there.\" Pursuant to clause 2(b) of Rule XXIII, the Committee on Rules and Administration may promulgate regulations to allow individuals covered under clause 2(a) floor access \"for ceremonial functions and events designated by the Majority Leader and the Minority Leader.\" Thus, on certain occasions, such as opening day of a Congress, former Senators and other individuals may be invited into the chamber, even if they would otherwise be prevented by the ban on registered lobbyists. Temporary floor access may also be granted by unanimous consent. For instance, in 1929, unanimous consent enabled a Senator-elect to have his physician accompany him into the Senate chamber. Unanimous consent is often used to grant temporary access to House officials, such as the House Parliamentarian, or Senate interns or fellows who are not on the Senate payroll. In the earliest years of Congress, 1789-1795, the Senate closed its chamber to the public and the press. In 1795, the Senate, then meeting in the temporary capitol in Philadelphia, installed a public gallery but apparently had no official rules regarding floor access for non-Senators. The first identified policy concerning floor access was established in 1798. The Senate resolved, \"That no motion shall be deemed in order to admit any person, or persons, whatever, within the doors of the Senate chamber, to present any petition, memorial, or address, or to hear any such read.\" The Senate continued to follow this policy after it moved to the north wing of the Capitol Building in 1800. In 1806, the policy was codified in the first major revision of the standing rules, and it remained in the rules until the general revision of 1877. In the 1820 revision of the rules, the Senate established an additional rule regarding floor access. Standing Rule 38 then stated, \"When acting on confidential or executive business, the Senate shall be cleared of all persons, except the Secretary, the Sergeant-at-Arms, and Door-Keeper, or, in his absence, the assistant door-keeper.\" On the opening day of the 24 th Congress (1835-1837), the Senate agreed to a resolution, dated December 7, 1835, that set aside the circular gallery for the \"accommodation of ladies and the gentlemen accompanying them\" and provided, \"The reporters shall be removed from the east gallery, and placed on the floor of the Senate, under the direction of the Secretary.\" Furthermore, the resolution listed positional categories, in addition to reporters, that were allowed access to the floor. It stated, \"No person, except members of the House of Representatives, their Clerk, Heads of Departments, Treasurer, Comptrollers, Register, Auditors, Postmaster General, President's Secretary, Chaplains to Congress, Judges of the United States, foreign Ministers and their Secretaries, officers who by name have received or shall hereafter receive the thanks of Congress for their gallantry and good conduct displayed in the service of their country, the Commissioners of the Navy Board, Governor for the time being of any State or Territory of the Union, such gentlemen as have been heads of Departments, or members of either branch of the Legislature, and, at the discretion of the President of the Senate, persons who belong to such Legislatures of foreign Governments as are in amity with the United States, shall be admitted on the floor of the Senate.\" By resolution, in 1854, the Senate amended its floor privilege rule (then Senate Rule 48). While the updated rule did not grant floor access to reporters, who at the time observed the chamber's proceedings from a reporters' gallery, it did expand the list of other categories admitted. The new list formed the basis for the current Rule XXIII. It included government officials serving in the District of Columbia, state judges and legislators, and individuals who had previously served in positions with floor privileges. The resolution also provided regulations relating to chamber access. No personâexcepting Senators, Senate officers, and House Membersâwould be allowed entrance to the chamber via its side doors, and \"no person except members of the Senate\" would be \"allowed within the bar of the Senate, or to occupy the seat of any senator.\" Prior to entry, all persons \"claiming admission on the floor of the Senate\" were to \"enter their names, together with the official position in right of which they claim admission, in a book to be provided and kept at the main entrance to the Senate chamber.\" This policy, requiring a record of individuals accessing the floor while the Senate is in session, remains in effect today. Notwithstanding the policy established in 1854, Senators could, by resolution, obtain temporary floor access for individuals not otherwise permitted. For instance, in 1855, the Senate considered by unanimous consent and agreed to the following resolution: \" Resolved , That the officers and soldiers of the war of eighteen hundred and twelve, now holding a convention in this city, be invited to occupy seats upon the floor of the Senate, without the bar, during the sitting of such convention.\" As the Senate prepared to move into its new (and current) chamber in the Capitol's north extension, it agreed to a resolution that temporarily restricted access to the Senate floor. The resolution of December 23, 1858, stated that \"until the Senate otherwise order [ sic ], no person except senators, the officers of the Senate, and members of the House of Representatives, be admitted to the floor of the Senate while in session.\" Following the Senate's transition to the new chamber in January 1859, the Senate amended Rule 48 to state, \"No person shall be admitted to the floor of the Senate, while in session, except as follows, viz: The officers of the Senate, members of the House of Representatives and their Clerk, the President of the United States and his private secretary, the heads of departments, foreign ministers, ex-Presidents and ex-Vice-Presidents of the United States, ex-senators, senators elect, and judges of the Supreme Court.\" However, the Senate could, by motions and resolutions, grant temporary access to individuals for particular reasons. For instance, to address structural problems associated with the new chamber, the Senate agreed to a motion submitted on December 14, 1859: \" Ordered , That the assistant engineer in charge of heating and ventilating have the privilege of the floor of the Senate, so far as in the opinion of the presiding officer his duties make it necessary.\" In 1862, the Senate amended Rule 48 to add \"governors of States and Territories.\" In the next general revision of the Senate rules, agreed to on March 25, 1868, the Senate re-numbered the floor privilege rule as Rule 47 and approved a minor amendment: The phrase foreign ministers became \"ministers of the United States and foreign ministers.\" The Senate adopted its 1868 rules shortly after the House approved articles of impeachment against President Andrew Johnson on March 2 and 3. Following the commencement of the Senate trial on March 5, the Senate voted to restrict, during the impeachment proceedings, \"that portion of the Capitol set apart for the use of the Senate and its officers\" to those \"who now have the privilege of the floor, and clerks of the standing committees of the Senate\" and gallery spectators in possession of tickets issued by the Sergeant at Arms. Three weeks into the impeachment trial, the Senate rejected a resolution providing an exception to the floor privilege rule. By a vote of 19 yeas to 20 nays, the Senate refused \"to admit the agent of the Associated Press on the floor of the Senate during the trial of the impeachment.\" In 1872, the Senate included regular Senate employees, in addition to Senate officers, to the list of positional categories afforded floor privileges under a standing rule. On motion, the Senate amended Rule 47 to add the following: \"General of the Army, Admiral of the Navy, members of the national legislatures of foreign countries, private secretaries of Senators duly appointed in writing, and the Librarian of Congress.\" By including the phrase duly appointed in writing , the Senate ensured that employee admission would be limited to officially recognized staff members. The Senate codified the \"private secretaries\" position in the next general revision of Senate rules in 1877. Re-numbered Rule 60, the floor privileges rule stated : No person shall be admitted to the floor of the Senate while in session, except as follows: The officers of the Senate. Members of the House of Representatives and their Clerk. The President of the United States and his Private Secretary. The heads of Departments. Ministers of the United States. Foreign ministers. Ex-Presidents and Ex-Vice Presidents of the United States. Ex-Senators and Senators-elect. Judges of the Supreme Court. Governors of States and Territories. General of the Army. Admiral of the Navy. Members of national legislatures of foreign countries. Private secretaries of Senators, duly appointed in writing, and the Librarian of Congress. In 1879, for the first (and only) identified time, the Senate amended its standing rules to grant permanent floor privileges to a named individual: George Bancroft, the former Secretary of the Navy, renowned historian, and author of the acclaimed multi-volume History of the United States . The Senate resolved \"that the Hon. George Bancroft be admitted to the privileges of the floor of the Senate.\" (Following Bancroft's death in 1891, newspapers reported that this privilege had been extended as a means to honor this \"most illustrious man of letters.\" ) In 1884, the next general revision of Senate rules re-codified the rules using Roman numerals and titles to distinguish each rule. The re-numbered Rule XXXIII, Privilege of the Floor, specified the Honorable George Bancroft as an individual allowed admittance; retained the positional categories listed in the 1877 rule; and added the House Sergeant at Arms, the Assistant Librarian in charge of the Law Library, judges of the Court of Claims, and the Architect of the Capitol extension. It also contained a second clause that further regulated the admittance of non-officer Senate employees: No person shall be admitted to the floor as private secretary of a Senator until the Senator appointing him shall certify in writing to the Sergeant-at-Arms that he is actually employed for the performance of the duties of such secretary and is engaged in the performance of the same. Shortly after the 1884 revision, the Senate agreed to resolutions adding the Secretary of the Smithsonian, the commissioner of Agriculture, and the commissioners of the District of Columbia and changing the Architect of the Capitol extensions to the Architect of the Capitol. In 1888, the Senate added ex-Speakers of the House, and in 1889, it added the President-elect and Vice President-elect. The floor privilege rule was further amended in 1891 following the death of Bancroft, as well as the deaths of the general of the Army and the admiral of the Navy. The amendment struck the Bancroft reference and broadened the Army and Navy categories to the \"General Commanding the Army\" and the \"senior admiral of the Navy on the active list.\" It also incorporated the former clause 2, regulating the admission of Senate employees, into clause 1. The revised Senate-employee provision stated, \"Clerks to Senate committees and clerks to Senators when in the actual discharge of their official duties. Clerks to Senators to be admitted to the floor must be regularly appointed and borne upon the rolls of the Secretary of the Senate as such.\" According to the Senator offering the amendment, the change regarding Senate clerks defined \"a little more clearly who shall be entitled to admission as such.\" After 1891, there were a few additions to the positions given floor privileges: ex-Secretaries of the Senate (1895), House Members-elect (1895), ex-Sergeants at Arms of the Senate (1896), Chaplain of the House (1971), and Parliamentarian Emeritus of the Senate (1975). The rules recodification of 1979 provided floor privileges to offices created in 1947 (the Joint Chiefs of Staff), 1975 (mayor of the District of Columbia), and 1979 (members of the European Parliament). The 1891 amendment to Senate rules replaced the term secretary with clerk in reference to Senate staff working for individual Senators or Senate committees. It also removed the gendered pronoun him from the provision regulating who may obtain floor access. Thus, there were no restrictions under Senate rules that prevented female staff members from entering the Senate chamber while the Senate was in session. However, as noted by the author Lewis Gould, until 1946, \"informal tradition dictated that only male secretaries could come to the Senate floor to consult with their bosses,\" even though the Senate employed about two dozen women clerks at the end of World War II, and five women had previously served as Senators. The first female staff member reportedly granted floor privileges, Frances Dustin, had served as a secretary to Senator Ralph Owen Brewster for 20 years prior to her admission to the floor, which, not coincidently, occurred three days after the Senate failed to achieve the two-thirds vote necessary to approve an Equal Rights Amendment (S.J.Res. 61, 79 th Congress). Initially, Senator Brewster considered submitting a resolution providing women staffers with floor access. Once he learned that the rules did not prevent female clerks on the Senate floor, however, he instead sought a clarification from the presiding officer. Addressing the chair, he said, \"Apropos of our extended discussion last week regarding equal rights â¦ I should like to have a ruling â¦ as to whether, under the rules, female clerks may be allowed the privileges of the floor.\" The Senator serving as President pro tempore read the floor privilege rule out loud, then stated, \"The Chair believes, and the Parliamentarian concurs in the opinion, that a woman clerk to any Senator or to any committee has the same rights as a man clerk, as if she were a man clerk. Therefore, under that ruling, the Chair holds that they are entitled to the floor.\" According to Newsweek , the ruling provided the \"cue\" for Dustin's \"historic entrance\" into the chamber. Dustin, \"very gratified,\" conferred with Senator Brewster for about 10 minutes, then exited the floor, vowing that women would not \"abuse the privilege.\" The President pro tempore later confirmed that this was \"the first time in 160 years that a woman has had the privilege of the floor of the Senate as clerk to a Senator.\" Until 1978, Senators generally enabled eligible staff members to access the floor via unanimous consent (UC) requests. According to then Majority Leader Robert C. Byrd, under this practice, Senators would \"have to stand up on the floor, get the attention of the Chair, and obtain unanimous consent all the time.\" In order to \"do away with all the jumping up and down\" of Senators seeking recognition, the majority leader supported a procedure, proposed by Senator Warren Magnuson, that would allow Senators to pre-notify the Journal clerk regarding staff admissions. On September 30, Majority Leader Byrd requested \"unanimous consent that for the remainder of this session, Senators may enter at the desk with the Journal clerk, the names of whatever people they wish to have on the floor, indicating the legislative subject matter which they want to have attended on the floor by their people, and the date and time; and that, subject to conditions in the rear of the chamber, those staff members be allowed on the floor for the specified dates and times and purposes, with the understanding that the Sergeant at Arms be required to implement this order in a reasonable way that will not allow overcrowding in the rear of the chamber. This would mean that the Sergeant at Arms might have to ask some of the staff people to rotate, so that we would not have too many in here.\" Senator Ted Stevens indicated his support for the UC agreement provided that Senators \"must specify the bill and the date on which the staff member would be admitted in this fashion\" and that no Senator \"would be permitted to have more than two staff members on the floor at any one time.\" Majority Leader Byrd accepted the modification and received unanimous consent to put the procedure into practice. The following January, the majority leader established, by unanimous consent, a Senate policy providing \"for the duration of the 96 th Congress, Senators be allowed to leave at the desk with the Journal clerk a list of no more than two staff members who will be granted the privilege of the floor during the consideration of specific matter noted on the list, and that the Sergeant at Arms be instructed to rotate such staff members as space allows.\" At the start of subsequent Congresses, the majority leader has made nearly identical UC requests, re-establishing the pre-notification procedure while not codifying it in the Senate's standing rules. The former Senate Parliamentarian, Floyd Riddick, however, noted in Riddick's Senate Procedure: Precedents and Practices that Senators continue to use UC requests to obtain floor privileges for individuals otherwise not eligible or to enable more than two staff members to access the floor at one time. In 1979, the Senate agreed to S.Res. 274 (96 th Congress) \"to revise and modernize the Standing Rules of the Senate.\" The Privilege of the Floor rule, then still Rule XXXIII, remained the same with the exception of two additional position categories: the Joint Chiefs of Staff and the mayor of the District of Columbia (replacing the D.C. commissioner category, established in 1884). The following year, S.Res. 389 recodified and consolidated Senate rules, leading to a general renumbering, as well as minor revisions. The Privilege of the Floor rule became Rule XXIII and now included the position members of the European Parliament in the \"Members of National Legislatures of foreign countries\" provision. Thus, 1980 marked the last year a new position category was added to the Privilege of the Floor rule. In 1997, the Senate agreed to a standing order that allows individuals with disabilities using guide dogs, wheelchairs, or other accommodations to access the Senate floor. Earlier that year, Senator Ron Wyden had requested unanimous consent to enable a legislative fellow, accompanied by a service dog, onto the floor. The UC request was objected to on the Senate floor. The following day, Majority Leader Trent Lott proposed a policy, by UC, that did receive Senate approval: \" Ordered , That an individual with a disability who has, or is granted, the privilege of the Senate floor may bring those supporting services (including service dogs, wheelchairs, and interpreters) on the Senate floor which the Sergeant at Arms determines are necessary and appropriate to assist the disabled individual in discharging the official duties of his or her position until the Rules and Administration Committee has the opportunity to consider properly the matter.\" The Senate then agreed to Senator Wyden's second UC request to allow his energy-policy fellow and her guide dog into the chamber. Senator Wyden subsequently sponsored S.Res. 110 (105 th Congress) \"to permit an individual with a disability with access to the Senate floor to bring necessary supporting aids and services.\" The resolution, based on the majority leader's UC agreement, resolved: That an individual with a disability who has or is granted the privilege of the Senate floor under rule XXIII of the Standing Rules of the Senate may bring necessary supporting aids and services (including service dogs, wheelchairs, and interpreters) on the Senate floor, unless the Senate Sergeant at Arms determines that the use of such supporting aids and services would place a significant difficulty or expense on the operations of the Senate in accordance with paragraph 2 of rule 4 of the Rules for Regulation of the Senate Wing of the United States Capitol. In debate, Senator Wyden clarified that the resolution's \"undue burden language is intended to apply only in very unusual circumstances, such as where significant architectural modifications might be necessary.\" The resolution had several additional proponents, including the chair of the Senate Committee on Rules and Administration, John Warner, who stated, \"By adopting this resolution, the Senate hopes to be a model for the country in its treatment of individuals with disabilities.\" The staff disability accommodation policy continues to apply as one of the Senate's non-statutory standing orders, which operate as standing rules of the Senate. Also in 1997, the Senate agreed to another resolution relating to disability that applied only in that Congress. This resolution concerned a Senator, a wounded veteran, who needed assistance traveling to and from his seat in the Senate chamber. S.Res. 8 resolved: That an employee in the office of Senator Max Cleland, to be designated from time to time by Senator Cleland, shall have the privilege of the Senate floor during any period when Senator Cleland is in the Senate chamber during the 105 th Congress. On January 6, 1999, the day before the Senate commenced the impeachment trial of President Clinton, Majority Leader Lott requested unanimous consent to implement policies regarding \"Senate access during impeachment proceedings.\" The UC agreement required that individuals eligible for floor access under Rule XXIII enter the chamber through the Republican and Democratic cloakrooms only and that \"such access will be limited to the number of vacant seats available on the Senate floor based on protocol considerations enforced by the Secretaries for the Majority and Minority and the Sergeant at Arms.\" Access to the floor would be limited \"to those having official impeachment proceedings duties\" using the following \"guidelines\": (not more than) three assistants to the majority leader; (not more than) three assistants to the minority leader; (not more than) two assistants to the majority whip; (not more than) two assistants to the minority whip; Secretary of the Senate (or designee); Sergeant at Arms (or designee); Secretary for the Majority (or designee); Secretary for the Minority (or designee); the Senate Legal Counsel, Deputy Legal Counsel, and Counsel for the Secretary and Sergeant at Arms (as needed); Cloakroom staff (as needed), \"under supervision of secretaries for the majority or minority, as appropriate\"; the Secretary of the Senate's legislative staff (as needed), \"under supervision of the Secretary\"; and Doorkeepers (as needed), \"under the supervision of the Sergeant at Arms.\" The UC agreement stipulated that \"committee and Member staff will not be permitted on the Senate floor other than as noted above; and that, accordingly, all messages to Members will be processed in the regular manner through the party cloakrooms or the reception room message desk.\" Further, \"the Sergeant at Arms shall enforce the above provisions and take such other actions as necessary to fulfill his responsibilities.\" In addition to the Rule XXIII position categories, the UC agreement also ordered that \"the following shall be admitted to the floor of the Senate while the Senate is sitting for impeachment proceedings\": (not more than) two assistants to the Chief Justice; assistants to the House managers; and, counsel and assistants to counsel for the President of the United States. In 2007, Congress enacted the Honest Leadership and Open Government Act ( P.L. 110-81 ). Among its provisions, the act eliminated Senate \"floor privileges for former Members, Senate officers, and Speakers of the House who are registered lobbyists or seek financial gain.\" As amended by P.L. 110-81 , Rule XXIII now contains two clauses following the list of positional categories. Clause 2(a) excludes lobbyists from the chamber with exceptions allowed, during certain events, as outlined by clause 2(b). (Clause 3 concerns access to other Senate privileges, including athletic and parking facilities.) Clause 2 states: (a) The floor privilege provided in paragraph 1 shall not apply, when the Senate is in session, to an individual covered by this paragraph who isâ (1) a registered lobbyist or agent of a foreign principal; or (2) in the employ of or represents any party or organization for the purpose of influencing, directly or indirectly, the passage, defeat, or amendment of any Federal legislative proposal. (b) The Committee on Rules and Administration may promulgate regulations to allow individuals covered by this paragraph floor privileges for ceremonial functions and events designated by the Majority Leader and the Minority Leader. In 2018, the Senate agreed to S.Res. 463 (115 th Congress), \"authorizing a Senator to bring a young son or daughter of the Senator onto the floor of the Senate during votes.\" The resolution created a new Senate standing order: Notwithstanding rule XXIII of the Standing Rules of the Senate, a Senator who has a son or daughter (as defined in section 101 of the Family and Medical Leave Act of 1993 ( 29 U.S.C. 2611 )) under 1 year of age may bring the son or daughter onto the floor of the Senate during votes. The resolution addressed a concern conveyed by a Senator anticipating the birth of her baby daughter. Senate Rule XXIII does not grant children access to the floor while the Senate is in session, and it is not in order, as noted in Senate precedents, for the Senate to record the votes of Members who are not present. Thus, Senators might be prevented from voting if they also need to care for their infant children. Under the new policy, on April 19, 2018, the day after the Senate agreed to S.Res. 463 , Senator Tammy Duckworth voted in the chamber while accompanied by her newborn daughter. On January 15, 2020, one day prior to the commencement of the President Trump impeachment trial, the Senate agreed to a unanimous consent request by Majority Leader Mitch McConnell that included \"allocations and provisions\" regarding \"access to the Senate wing, the Senate floor, and the Senate Chamber Galleries during all of the proceedings involving the exhibition of consideration of the Articles of Impeachment\" against the President. The UC agreement's section on Senate floor access contained three paragraphs. Paragraph (1) provided general policies related to entrance to the chamber and floor seating, and paragraphs (2) and (3) regulated floor access for specified trial assistants. Paragraph (2) stated: Limited staff access.âOfficers and employees of the Senate, including members of the staffs of committees of the Senate or joint committees of the Congress and employees in the office of a Senator, shall not have privileges under rule XXIII of the Standing Rules of the Senate to access the floor of the Senate, except as needed for official impeachment proceeding duties in accordance with the following: (A) The Majority Leader and the Minority Leader shall each be limited to not more than 4 assistants. (B) The Secretary of the Senate and the Assistant Secretary of the Senate shall each have access, and the legislative staff of the Secretary of the Senate shall be permitted as needed under the supervision of the Secretary of the Senate. (C) The Sergeant at Arms and Doorkeeper of the Senate and the Deputy Sergeant at Arms and Doorkeeper shall each have access, and doorkeepers shall be permitted as needed under the supervision of the Sergeant at Arms and Doorkeeper of the Senate. (D) The Secretary for the Majority, the Secretary for the Minority, the Assistant Secretary for the Majority, and the Assistant Secretary for the Minority shall each have access, and cloakroom employees shall be permitted as needed under the supervision of the Secretary for the Majority or the Secretary for the Minority, as appropriate. (E) The Senate Legal Counsel and the Deputy Senate Legal Counsel shall have access on an as-needed basis. (F) The Parliamentarian of the Senate and assistants to the Parliamentarian of the Senate shall have access on an as-needed basis. (G) Counsel for the Secretary of the Senate and the Sergeant at Arms and Doorkeeper of the Senate shall have access on an as-needed basis. (H) The minimum number of Senate pages necessary to carry out their duties, as determined by the Secretary for the Majority and the Secretary for the Minority, shall have access. Paragraph (3) stated: Other individuals with Senate floor access.âThe following individuals shall have privileges of access to the floor of the Senate: (A) Not more than 3 assistants to the Chief Justice of the United States. (B) Assistants to the managers of the impeachment of the House of Representatives. (C) Counsel and assistants to counsel for the President of the United States. The Sergeant at Arms enforces the rules and regulations governing the Senate chamber. Accordingly, the Office of the Sergeant at Arms (SAA), including its Doorkeepers, supervises and restricts staff access to the floor. The SAA ensures that non-chamber staff members will not access the floor during a Senate session unless they are on the Journal clerk's pre-notification list or are allowed under the terms of a unanimous consent request. The SAA also ensures that, barring a UC request, no more than two staff members from the same Senator's office will be on the floor at the same time, as mandated in the recurring UC agreements agreed to at the start of each Congress. As approved by the Committee on Rules and Administration, the \"Regulations Controlling the Admission of Employees and Senate Committees to the Senate Floor\" are meant to \"permit closer supervision over employees admitted to the Senate Floor\" without depriving any employees the privilege of the floor if they are \"entitled thereto under Rule XXIII.\" In view of these regulations, the Senate Doorkeepers provide Senate staff members with the following instructions regarding floor access. Senate office managers and other staff are issued credentials that allow them to submit, using the SAA TranSAAct web portal, a list of staff members to be granted Senate floor privileges. The submitted staff members should be eligible for floor access pursuant to clause 1 of Rule XXIII. That is, they must be Senate committee staff members or working in the office of a Senator and on the payroll of the Senate or joint committee staff members and on the payroll of the Senate or the House of Representatives. Should the Senate or joint committee office experience any personnel changes affecting its list of eligible individuals, the credentialed staff member should submit those changes to the SAA via TranSAAct. While Senate offices may pre-submit the names of multiple staff members, the number of staff members from the same office allowed on the floor at one time is limited. The SAA restricts access to those individuals who are in temporary possession of floor passes provided by the Credentials Desk. Every committee of the Senate, as well as joint committees, are allotted six cards (floor passes) to be used when the committee has jurisdiction over pending legislation. Four cards may be used as needed without a time limit. Two cards are given with a 15-minute time limit, allowing staff members to perform brief official duties, such as assisting with poster boards and other visual displays. Each Senator and the Vice President is allotted two cards. The Senate cards are issued to regular full-time Senate staff members working in a Senator's office. They are to be used while the staff member is performing official duties relating to a particular bill or matter under consideration. One card is not time limited, while the other card has a 15-minute limit. The time-limited cards allow staff members to speak briefly to a Senator or transport materials to the floor. During a Senate session and 30 minutes prior, an eligible staff member may sign in and obtain a pass at the Credentials Desk, located between the Senate Reception Room and the Senate chamber. The desk attendant checks the staff member's official Senate ID badge and verifies that the staff member's name has been pre-submitted via the TranSAAct system. (Unlisted staff members are advised to contact their offices and request to be added to the database.) The desk attendant also notes in the daily rosterânow an electronic databaseâthe staff member's name, office, and official business to be performed and the card number issued to the employee. Following the sign-in procedures, staff members granted floor access are to display both their Senate ID badges and the floor passes to the Doorkeeper at the entrance of the chamber. When their duties are completed, they are to exit the chamber and return the floor passes to the attendant at the Credentials Desk. If a Senator's office allotment has been met, any additional employees seeking floor access are to wait in the Senate lobby until one of the office employees returns from the floor. According to the Senate Doorkeepers' \"Guidelines Regarding Floor Privileges,\" the Sergeant at Arms may also \"rotate staff on and off the floor to eliminate congestion.\" Additionally, the SAA may restrict access due to restrictions imposed under the terms of a UC agreement or a Senate resolution. (See, for example, the Clinton impeachment UC agreement.) Staff members who wish to observe, but not assist in, Senate proceedings are advised to do so from the Senate galleries. Staff members are to remain on the floor \"only as long as necessary for the transaction\" of the staff members' official business. During the time spent on the floor, they \"shall in no way encroach upon the areas and privileges reserved for Senators only.\" Most floor passes permit staff members to use one designated door to access the chamber. However, each committee is given two full-floor passes, one for a majority staff member and one for a minority staff member, allowing those in possession to enter and exit the chamber throughout the day and through any door. At the start of roll-call votes, the Sergeant at Arms closes the floor for entry, except for those staff members granted access via unanimous consent or committee staff members \"associated with the issue involved.\" In addition to the pre-notification procedures outlined above, Senators may use UC requests to provide access to staff members. UC requests may be used when an eligible staff member is needed on the floor but is not currently in the TranSAAct database. Additionally, Senators may seek UC approval to enable floor access for more than two staff members at one time or to provide access to an assistant who is not on the Senate payroll, such as a legislative fellow or intern. Senators may also obtain UC agreements to provide temporary floor privileges to other individuals. Floor-privilege UC agreements usually include a time limitation, such as for the duration of the day, session, or Congress. If the Senator is requesting the assistance of more than two staff members, the UC request will likely include the reason why the maximum number should be temporarily increased. The following are examples of UC request language that might be used to enable individuals to access the floor aside from the pre-notification floor pass procedure. Senator: Mr. [or Madam] President, I ask unanimous consent that my defense fellow, [named individual], be given floor privileges for the remainder of the first session of the 116 th Congress. Senator: Mr. [or Madam] President, as manager of the pending bill, I require the assistance of more than two staff members on the floor today. I ask unanimous consent that the following staff members, [named individuals], be afforded the privilege of the floor during debate and all votes on the [named bill].", "summary": "Senate Standing Rule XXIII, Privilege of the Floor, designates those afforded access to the Senate floor while the Senate is in session. In addition to sitting Senators, the rule lists several eligible positions, including certain current and former congressional, executive, and judicial officials; state and territorial governors; the mayor of the District of Columbia; members of foreign national legislatures; the nation's highest ranking military leaders; and, under specified circumstances, congressional staff members assisting Senators on the floor. Over its history, the Senate has amended the floor privilege rule to add or clarify positional categories. The Senate has also agreed to a number of resolutions and unanimous consent (UC) agreements that affect the interpretation of the rule. The Senate, by resolution or UC, frequently provides temporary floor access to non-designated individuals. Less commonly, it has agreed to temporarily restrict access to the Senate floor. Such restrictions have occurred in advance of the Senate's move to its current chamber in 1859 and during the impeachment trials of Presidents Andrew Johnson (1868), Bill Clinton (1999), and Donald Trump (2020). In 2007, the Senate amended Rule XXIII to exclude lobbyists from the floor, even if these individuals would otherwise be granted floor privileges under the rule. Rule XXIII permits certain staff members of individual Senators and Senate committees and joint committees to have access to the floor \"when in the discharge of their official duties.\" Staff access is further regulated by policies outlined in a recurring UC agreement approved at the start of each Congress, as well as those policies established by the Senate Rules and Administration Committee. For instance, each Senator is limited to two staff members on the floor at the same time. The Office of the Sergeant at Arms (SAA) enforces Senate Rule XXIII, as well as any associated resolutions or UC agreements, regarding floor access. This report analyzes the evolution of the floor privileges rule over time. Notable changes to the rule or its interpretation are provided, such as the first time a female staff member accessed the Senate floor (1946); when the Senate agreed to resolutions to accommodate staff with disabilities (e.g., allow the use of a service dog in the chamber, 1997); and when it permitted Senators, accompanied by their infant children, to vote on the Senate floor (2018). The report also addresses how staff members are granted floor privileges and how that access is limited by Rule XXIII and its associated regulations. Access via the SAA's web portal, TranSAAct, is discussed, as well as the use of unanimous consent requests to afford access to individuals not listed in TranSAAct or to enable more than two staff members from the same Senate office on the floor at one time.", "document_type": "crs"}
{"report": "When legislation is introduced in the House or received from the Senate, it is referred to one or more committees primarily on the basis of the jurisdictional statements contained in clause 1 of House Rule X. These statements define the policy subjects on which each standing committee may exercise jurisdiction on behalf of the chamber. The statements themselves tend to address broad policy areas and not specific departments, agencies, or programs of the federal government. Many federal departments and agencies handle a wide variety of policy areas that do not fit neatly within the subject matter jurisdiction of one or another standing committee. Because committee jurisdiction often is expressed in general policy terms, it is possible for more than one committee to claim jurisdiction over different aspects of a broad subject that may encompass a myriad of specific programs and activities. Additional guidance and context to the referral of measures addressing particular policy areas can be found in notes and annotations written by the House Parliamentarian located below the jurisdictional statements of each standing committee in the House Manual . Take the subject of roads for example. When it comes to the design and planning of road construction or maintenance, the House Transportation and Infrastructure Committee exercises jurisdiction on the basis of its responsibility defined in clause 1(r)(11) of Rule X for the \"Construction or maintenance of roads or post roads (other than appropriations therefor).\" However, as suggested by the parenthetical in this jurisdictional statement, the amount of money made available for road construction or maintenance through the annual appropriations process is a matter within the domain of the House Committee on Appropriations, which has jurisdiction over the \"Appropriation of the revenue for the support of the Government.\" Furthermore, in addition to federal spending that occurs through the annual appropriations process, funding for the construction and maintenance of the nation's roadways may also be drawn from the Highway Trust Fund, which accrues revenue mainly from the collection of federal gasoline taxes. The use of general revenues to fund a particular federal activityâin this case, highwaysâis by precedent considered a matter of revenue collection and within the purview of the House Committee on Ways and Means, which has jurisdiction over \"Revenue measures generally.\" Additional committees as well may exercise jurisdiction over aspects of the nation's roadways, depending on how subjects within their jurisdictions are connected to issues involving roads. When a Member introduces a bill or resolution, or when legislation from the Senate is received in the House, clause 2 of House Rule XII directs the Speaker to refer the measure to committee in such manner as to ensure to the maximum extent feasible that each committee that has jurisdiction under clause 1 of Rule X over the subject matter of a provision thereof may consider such provision and report to the House thereon. Multiple referralâreferring a measure to more than one committeeâis common in the House as a result of the standing rules governing jurisdiction (Rule X) and the referral of legislation to committee (Rule XII). When language in a measure is within a committee's jurisdiction, it will trigger (\"to the maximum extent feasible\") a referral of the measure to that committee. In practice, the entire bill is sent to each committee of referral with the expectation that each committee will act only on matters that fall within its jurisdiction. Committees often monitor their own legislative actions and those of their counterparts for any jurisdictional issues that may arise when a committee reports its recommended changes to the House. When legislation is multiply referred, the Speaker identifies a \"primary\" committee of referral, which is the panel understood to exercise jurisdiction over the main subject of the measure. House Rule XII further provides the Speaker with the authority to refer legislation to more than one committee either at the point of introduction (an \"initial additional referral\"), or after another committee has filed its report (a \"sequential referral\"). The Speaker may also divide a measure into its component parts and refer individual pieces to different House panels (a \"split referral\"), but split referrals are rare in current practice. The Speaker is empowered to place time limits on any referral and always does so in the case of a sequential referral. In most cases, once the primary committee has reported to the House, the Speaker will set a deadline for additional committees of referral to report or be automatically discharged from further consideration. Although the Speaker has the authority to do so, rarely are time limits established on deliberations of a primary committee, or extended beyond the deadline imposed by a sequential referral. Due to their presumed expertise on matters within their jurisdiction, committees of primary or sole referral generally enjoy deference from the House on whether or not to report legislation to the full chamber. With House approval, the Speaker may appoint Members from relevant committees of jurisdiction to a special, select, or ad hoc committee in order to receive and review specific matters and report to the House its findings or recommendations. Rule XII further indicates that the Speaker \"may make such other [referral] provision as may be considered appropriate.\" House rules vest these powers of referral in the Speaker; in practice, the House Parliamentarian makes day-to-day referral decisions acting as the Speaker's nonpartisan and disinterested agent. Worth noting is that House rules and procedures for referring legislation have changed in recent decades. For instance, prior to January 3, 1975, House rules provided no formal mechanism for a measure to be referred to two or more committees with a jurisdictional claim to the measure's subject matter. The ability of the Speaker to refer legislation to more than one committee was first established in House rules through the adoption of H.Res. 988 (93 th Congress), the Committee Reform Amendments of 1974, which became effective at the start of the 94 th Congress (1975-1976). Furthermore, at the outset of the 98 th Congress (1983-1984), Speaker O'Neill announced a policy of identifying a \"primary\" committee of jurisdiction when legislation was multiply referred, and beginning in the 104 th Congress (1995-1996) the designation of a primary committee of referral by the Speaker has been a requirement of House rules. Clause 1 of House Rule X is the main determinant of House committee jurisdiction, but other factors may also influence how legislation is referred. For instance, some committees have crafted written memoranda between them memorializing their common understanding of the jurisdictional boundaries guiding the referral of measures on topics that are jurisdictionally ambiguous, or over which multiple committees make a claim. Such memoranda cannot override the explicit jurisdictional statements of Rule X, but they can be viewed as explanations of the committees' common understanding of these statements. In some cases, committees have published these memoranda in the Congressional Record . The act of referring measures to committees also can serve as a determinant of House committee jurisdiction. According to Hinds' Precedents of the U.S. House of Representatives , when the House refers \"a bill or resolution to any committee ... jurisdiction is thereby conferred.\" Consequently, once a measure has been referred to a committee, precedent is established for future referrals to that committee of measures of the same type. This is true even in the case of an erroneous reference to committee. If the error is not corrected, jurisdiction is conferred on the committee by the referral. If a measure is enacted into law, amendments to the law are presumed to be within the originating committee's jurisdiction. The referral of certain kinds of measures may also be defined in statute. The House rulebook contains 35 different sets of statutory legislative procedures (also called \"expedited\" or \"fast-track\" procedures) that apply only to a narrow class of items described in the statute itself. Some statutory procedures contain \"automatic referral\" provisions specifying the committee(s) to which a particular item would be referred if one were introduced or received by the House. For instance, if the Defense Base Closure Commission reports to Congress a recommendation to relocate or close U.S. military bases, the Defense Base Closure and Realignment Act of 1990 ( P.L. 101-510 ) allows for expedited consideration of a House or Senate joint resolution disapproving the commission's recommendation. If such a joint resolution were introduced in the House, Section 2908(b) of that act indicates that it \"shall be referred to the Committee on Armed Services.\" The jurisdictions of subcommittees are not explicitly stated in House rules. The jurisdiction of a subcommittee is generally determined by the full committee that created it. In many cases, the full committee will establish the jurisdictions of its subcommittees in the rules that committees are required to adopt during the first few months of a new Congress. If a subcommittee's jurisdiction is not defined by its parent committee, measures are generally referred to subcommittee or retained by the full committee at the discretion of its chair. Some committees rely more heavily on their subcommittees to process legislation and make recommendations than do other committees. An important distinction can be drawn between legislative and oversight jurisdiction. Legislative jurisdiction describes the authority of a committee to receive and report measures to the House. Oversight jurisdiction refers to a committee's ability to review matters within its purview, for instance by conducting hearings and investigations. Legislative jurisdiction is defined in clause 1 of Rule X, while clause 2 of the same rule directs all standing committees to \"review and study on a continuing basis the application, administration, execution, and effectiveness of laws and programs addressing subjects within its [legislative] jurisdiction.\" Several committees are given additional oversight duties in clause 3 of Rule X, and the fourth clause of that rule specifies additional functions committees are expected to fulfill. Clause 4(f) of Rule X, for instance, instructs each standing committee to submit to the Budget Committee its \"views and estimates\" on policy proposals contained in the President's budget submission to Congress that fall within its jurisdiction. Some committees interpret their oversight responsibilities more broadly than others do, which can lead to jurisdictional disputes over which committee is best equipped to conduct hearings, investigations, or other oversight activities. Many policy areas are complex and multidimensional, and considering how subject matter responsibilities are allocated broadly across committees, more than one committee may be involved in overseeing specific aspects of a general subject. Similar to the example of roads explained above in which a number of committees can play a role based on their subject matter (legislative) jurisdictions, oversight of a given area might also be shared by committees exercising different Rule X responsibilities.", "summary": "When legislation is introduced in the House or received from the Senate, it is referred to one or more committees primarily on the basis of the jurisdictional statements contained in clause 1 of House Rule X. These statements define the policy subjects on which each standing committee may exercise jurisdiction on behalf of the chamber. The statements themselves tend to address broad policy areas rather than specific departments, agencies, or programs of the federal government. Because comm ittee jurisdiction often is expressed in general policy terms, it is possible for more than one committee to claim jurisdiction over different aspects of a broad subject that may encompass a myriad of specific programs and activities. When referring a measure to more than one committee (a \"multiple referral\"), the Speaker is directed by clause 2 of House Rule XII to identify a \"primary\" committee of referral, which is the panel understood to exercise jurisdiction over the main subject of the measure. Rule XII further provides the Speaker with the authority to refer legislation to more than one committee either at the point of introduction (an \"initial additional referral\"), or after another committee has reported (a \"sequential referral\"). The Speaker may also divide a measure into its component parts and refer individual pieces to different House panels (a \"split referral\"), but split referrals are rare in current practice. The Speaker is empowered to place time limits on any referral and always does so in the case of a sequential referral. The Speaker also \"may make such other [referral] provision as may be considered appropriate.\" House rules vest these powers of referral in the Speaker; in practice, the House Parliamentarian makes day-to-day referral decisions acting as the Speaker's nonpartisan and disinterested agent. Although clause 1 of Rule X is the main determinant of House committee jurisdiction, other factors may also influence how legislation is referred, including precedents established by past referrals; agreements between committees outlining their jurisdictional boundaries on new, evolving, or contested policy subjects; and statutes that identify how particular kinds of matters will be referred. The jurisdictions of subcommittees are not explicitly stated in House rules. The jurisdiction of a subcommittee is generally determined by the full committee that created it. If a subcommittee's jurisdiction is not explicitly defined by its parent committee, measures are generally referred to subcommittee or retained by the full committee at the discretion of its chair. A distinction can be made between legislative and oversight jurisdiction. Legislative jurisdiction describes the authority of a committee to receive and report measures to the House. Oversight jurisdiction refers to a committee's ability to review matters within its purview, for instance by conducting hearings and investigations. Legislative jurisdiction is defined in clause 1 of Rule X, while clause 2 of the same rule directs all standing committees to \"review and study on a continuing basis the application, administration, execution, and effectiveness of laws and programs addressing subjects within its [legislative] jurisdiction.\"", "document_type": "crs"}
{"report": "The substantial burden of opioid abuse related to the current opioid epidemic in the United States has resulted in a disparity between the need for substance abuse treatment and the current capacity of the health care delivery system to meet that need. In 2017, over 47,600 people died of opioid-related drug overdoses in the United States. In that same year, an estimated 11.4 million people aged 12 and older misused opioids, including 11.1 million misusers of prescription pain relievers and 886,000 heroin users. The majority of individuals in need of treatment do not receive it. In 2016, one-fifth (21.1%) of those with any opioid use disorder (OUD) received specialty substance abuse treatment, including 37.5% of those with heroin use disorder and 17.5% of those with prescription pain reliever use disorders. Medication-assisted treatment (MAT) is the combined use of medication and other services to treat addiction. MAT is widely accepted as the most effective treatment for opioid use disorder. Three medications are currently used in MAT for opioid addiction: methadone, buprenorphine, and naltrexone (naloxone, a medication used to reverse opioid overdose, is not used to treat opioid use disorders). Methadone and buprenorphine are both opioids; their use to treat opioid use disorders is often called opioid agonist treatment (OAT), opioid agonist MAT , opioid substitution therapy , or opioid replacement therapy . Methadone or buprenorphine may be used both in the short term to mitigate the immediate withdrawal symptoms associated with discontinuing use of the opioid of abuse and over extended periods to maintain abstinence and prevent relapse. Descriptions of medication-assisted treatments for opioid use disorder and commonly used acronyms are included in the textbox below. As controlled substances, methadone and buprenorphine are regulated under the Controlled Substances Act (CSA; 21 U.S.C. Â§Â§801 et seq.). Under the CSA, methadone may be used to treat opioid addiction within an inpatient setting, such as a hospital, or in a federally certified opioid treatment program (OTP). Federally certified OTPsâoften referred to as methadone clinicsâoffer opioid medications, counseling, and other services for individuals addicted to heroin or other opioids. With few exceptions, the use of methadone to treat opioid addiction is limited to OTPs. Treatment within an OTP may be in an inpatient or outpatient capacity, though typically it occurs on an outpatient basis. There are no federal limits on the number of patients that can be treated at an OTP. However, in 2016 HHS determinedâthrough SAMHSA survey dataâthat an OTP could manage, on average, 262 to 334 patients at any given time. For more information on federal regulations regarding opioid treatments, see CRS In Focus IF10219, Opioid Treatment Programs and Related Federal Regulations , by Johnathan H. Duff. Buprenorphine may be used to treat opioid use disorder in two settings: (1) within an OTP and (2) outside an OTP pursuant to a waiver. A physician or other practitioner (e.g., physician assistant or nurse practitioner) may obtain a waiver to administer, dispense, or prescribe buprenorphine outside an OTP. This is commonly known as a DATA waiver, drawing its name from the law that established the waiver authority: the Drug Addiction Treatment Act of 2000 (DATA 2000). To qualify for a waiver, a practitioner must notify the Health and Human Services (HHS) Secretary of the intent to use buprenorphine to treat opioid use disorders and must certify that he or she is a qualifying practitioner; can refer patients for appropriate counseling and other services; and will comply with statutory limits on the number of patients that may be treated at one time. The patient limit is 30 individuals during the first year and may increase to 100 after one year or immediately if the practitioner holds additional credentialing or operates in a qualified practice setting. The patient limit may increase to 275 after one year under certain conditions specified in regulation. Practitioners are subject to state laws and regulations regarding prescribing privileges and therefore may not be eligible in all states. Similar to methadone treatment, MAT with buprenorphine typically takes place in an outpatient setting. For a more detailed account of the federal regulations related to buprenorphine, see CRS Report R45279, Buprenorphine and the Opioid Crisis: A Primer for Congress , by Johnathan H. Duff. The federal government has taken steps to increase the availability of opioid agonist MAT in response to the escalation of opioid overdoses and deaths in recent years. Both Congress and the Administration have implemented policies intended to increase access to methadone and buprenorphine, such as changes to the DATA waivers. The Comprehensive Addiction and Recovery Act of 2016 (CARA; P.L. 114-198 ), for instance, provided qualifying nurse practitioners and physician assistants temporary eligibility to obtain DATA waivers. The SUPPORT for Patients and Communities Act ( P.L. 115-271 ), enacted in 2018, made the authority for qualifying nurse practitioners and physician assistants to obtain DATA waivers permanent and expanded the definition of \"qualifying other practitioners\" to include other midlevel providers such as clinical nurse specialists, certified registered nurse anesthetists, and certified nurse midwives. The law also authorized programs to establish additional comprehensive opioid recovery centers that offer a \"full continuum of treatment services\" including all FDA-approved medications used in MAT as well as \"regional centers of excellence in substance use disorder education\" that would aim to improve health professional training in substance abuse treatment. Policy efforts to address the opioid epidemic have corresponded with increased MAT availability. The percentage of substance abuse treatment facilities providing buprenorphine treatment increased from 14% in 2007 to 29% of all facilities in 2017. Additionally, the number of DATA-waived physicians with a 30-patient limit increased nine-fold from 2003 to 2012âfrom 1,800 physicians to 16,095. Physicians with a 100-patient limit tripled in the latter half of that spanâfrom 1,937 in 2007 to 6,103 in 2012. Despite this increase, access to substance abuse treatment has not kept pace with the mounting rates of opioid addiction in the United States. Additionally, while the capability to treat patients with buprenorphine has expanded through an increase in DATA waivers, practitioners with these waivers are not treating to capacity. A 2018 study by SAMHSA leadership found that the number of patients being treated by DATA-waived providers included in their study was substantially lower than the authorized waiver patient limit. The percentage of clinicians prescribing buprenorphine at or near the patient limit in the month prior to the study was 13.1%. Geography is essential to accurately evaluating opioid agonist MAT capacity. Treatment location may be especially relevant to understanding any discrepancy between need and capacity: where services are located may be more important than how many patients a practitioner is allowed to treat. According to the 2018 study on DATA-waived clinicians, the top reason practitioners cited for not prescribing buprenorphine was lack of patient demand. This suggests a discrepancy between OAT practitioners and patients in need. DATA-waived practitioners may not be in the areas with the most need for treatment, for instance. Other barriers may also exist that prevent patients from accessing services. Factors affecting the treatment gap may include health insurance coverage, reimbursement for treatment services, transportation, stigma, awareness of treatment options and availability, and motivation for recovery, among others. The current report identifies the geographic location of opioid agonist treatment providers in the United States. The analysis uses SAMHSA data to identify the number and location of (1) federally certified opioid treatment programs and (2) practitioners with DATA waivers. Data are displayed nationally as well as by county. The location of opioid agonist MAT providers does not necessarily equate to availability of treatment. Other aforementioned factors, such as treatment costs, demand for services, wait times, and awareness of options also affect treatment availability. The current report does not attempt to evaluate the availability, accessibility, or total capacity for treatment of any area. It also does not assess need for treatment servicesâan essential factor in classifying discrepancies between demand for treatment and capacity of services. The Substance Abuse and Mental Health Services Administration, a branch of HHS which oversees the certification of opioid treatment programs and the buprenorphine waiver program, provides the number and location of OTPs and daily updates on the number and location of DATA-waived practitioners. Using these data, CRS plotted 99% of OTP locations (1,652 OTPs) and 99% of publicly-available DATA-waived practitioner locations (40,016 practitioners) using the geospatial software ArcGIS. As of June 1, 2019, the number of federally certified OTPs in the United States was 1,674. The total number of DATA-waived providers with a 30-patient limit exceeded 50,000 and those with a 100-patient limit exceeded 12,000. The number of practitioners with a 275-patient limit totaled over 4,800. This provides the capacity for at least 4 million patients to be treated with buprenorphine through DATA-waived providers. CRS generated a series of maps to depict the distribution of DATA-waived providers and neighboring OTPs in 2018. There are two maps at the national level in Figure 1 and Figure 2 , and two for the Northeast and parts of the Midwest in Figure 3 . The latter maps shade in each county based on the number of DATA-waived providers in that county and demarcate each OTP with a purple dot. The shading of each county was determined using Jenks natural breaks optimization, a statistical method used to create \"fair\" categories. As a result, each level of shading does not follow a consistent range. The smallest shading category (1-32 DATA-waived practitioners in a county) is much smaller in range than the largest (446-871 DATA-waived practitioners in a county) on account of this method. The Northeast region of the United States is displayed in a separate map for greater visibility of the high number of OTPs within a relatively small geographic area. (Other areas experiencing highly clustered OTPs, such as California and Florida, are more easily discerned on the national map and are therefore not displayed in additional maps.) Parts of the Midwest are displayed in a regional map for greater visibility of areas disproportionately affected by the opioid crisis. These maps present location of OAT providers only. Geography is one indication of adequacy of treatment capacity but other factorsâsuch as population density and the size of the affected populations in the areaâare also relevant. This analysis only examines the geographic location of OAT providers. Results depicted in Figure 1 , Figure 2 , and Figure 3 show that opioid agonist medication-assisted treatment services are not evenly distributed across the country. The maps in Figure 2 and Figure 3 depict the location of federally certified OTPs and the number of DATA-waived practitioners in each county. Results from this analysis indicated that: 1,217 counties (39% of counties nationally)âpopulated by an estimated 17.5 million people (of 321 million nationally, or 5.5% of the population)âhad no DATA-waived practitioners. Nearly 2,500 counties (80% nationally), populated by an estimated 77.5 million people (24% of the population), had no OTPs and 1,202 counties (38%), populated by 16.8 million people (5.2%), had neither an OTP nor a DATA-waived practitioner. Of the over 1,200 counties with no OAT providers, nearly half (45%) are classified as rural according to the U.S. Census. These counties are primarily located in the Midwest and South; Texas (13% of counties with no OTPs or DATA-waived practitioners), Georgia (6%), Kansas (6%), Nebraska (5%), Iowa (5%), and Missouri (5%) have the highest percentages of counties with no OTPs or DATA-waived providers. Twenty-five counties with no OTPs or DATA-waived practitioners had more than 50,000 residents. It is important to consider that county size and population are not necessarily indicators of substance abuse treatment need. Counties are also not equivalent in geographic area, shape, and popula tion size and therefore comparisons on treatment availability strictly across the county level may not be appropriate. Additionally, the absence of OAT providers does not necessarily equate to lack of access (adjacent counties may offer treatment for instance and patients may travel for inpatient treatment). Similarly, the presence of providers does not necessarily equate to treatment availability, particularly within counties that encompass large geographic areas. Federal lawmakers have sought to increase the capacity for opioid use disorder treatment with MAT to address the ongoing opioid epidemic. Thus far in the 116 th Congress, policymakers have introduced nearly a dozen bills explicitly pertaining to opioid use disorder treatment expansion. For example, one bill would remove some requirements for health providers to receive DATA waivers to administer buprenorphine, with the intention that more practitioners would then pursue these waivers. Identifying the location of OAT providers may be essential to increasing accessibility to treatment. Simply increasing capacity for treatment may not effectively increase availability (or decrease opioid-related overdoses) if treatment providers are not located in areas of need. While the current analysis does not evaluate needâby locating opioid-related overdose hospital admissions and deaths for instanceâit does provide an initial step in assessing how treatment providers are dispersed geographically. Other factors, such as substance use treatment financing, may also affect OAT availability. Practitioners are also subject to state laws and regulations regarding prescribing privileges which affect the eligibility of providers for DATA waivers and, in turn, the availability of treatment. Congress may consider incorporating geographic factors in strategies designed to increase capacity and availability of treatment. For instance, policymakers may acknowledge the dispersion of treatment providers within small geographic units and the proximity of OTPs to DATA-waived practitioners when drafting legislation. Rural areas may not have the same volume of need for substance use disorder treatment as urban areas, yet they may possess additional barriers to care that make accessibility to treatment challenging. For example, patients traveling long distances to receive daily methadone at an OTP may face obstacles related to transportation or infrastructure that make continuity of treatment difficult. Additionally, DATA-waived providers alone may not have the resources to provide complementary services such as counseling and behavioral therapies, or housing and vocational services. Some individual states have sought to address geographical obstacles to care through treatment and policy strategies. Vermont, for example, operates a \"hub-and-spoke\" system, in which patients seeking treatment for OUD establish care at an OTP (the \"hub\") where they receive more intensive services, often during their initial entry to treatment when such concentration of services is more necessary. Once patients are stabilized, they transition to a DATA-waived provider in their community for maintenance treatment with buprenorphine (the \"spoke\"), and other services. If patients relapse, they may return to the OTP until they are ready to transition back to outpatient buprenorphine, and the cycle continues. Throughout their treatment, patients are followed by the same care management team who assist them in finding and accessing appropriate services. Vermont officials sought to ensure OTPs were distributed throughout the state (see Figure 3 ). A part of Vermont's hub and spoke strategy has been to divide resources geographically throughout the state to reduce the number of areas without treatment. Other states, such as New Jersey and Washington, addressed geographic barriers by operating mobile methadone units, known as \"methadone vans,\" which travelled from OTPs to provide daily methadone medication to rural and other hard-to-reach patients. Other states have offered similar mobile services with buprenorphine. Increasing the quantity of treatment providers may only be effective in addressing the opioid epidemic if access to treatment is also addressed. Both examples provided above, for instance, seek to not only expand treatment capacity, but also enhance accessibility by attending to location of services in relation to the patient population. Geography alone is not the only barrier; stigma, financing, and patient willingness may also influence the amount and utilization of services. Congress may explore additional solutions, such as the use of telemedicine services where possible. Nevertheless, identifying the location of providers may be an important step for policymakers seeking to increase availability of treatment for opioid use disorder.", "summary": "The substantial burden of opioid abuse related to the current opioid epidemic in the United States has resulted in a disparity between the need for substance abuse treatment and the current capacity. Methadone and buprenorphine are two medications used in medication-assisted treatment (MAT) for opioid use disorder (OUD). Methadone and buprenorphine are both opioids; their use to treat opioid use disorders is often called opioid agonist treatment or therapy (OAT) or opioid agonist MAT . As controlled substances, methadone and buprenorphine are subject to additional regulations. Methadone may be used to treat opioid addiction within federally certified opioid treatment programs (OTP)âoften referred to as methadone clinics. Buprenorphine may be used to treat opioid use disorder in two settings: (1) within an OTP and (2) outside an OTP pursuant to a Drug Addiction Treatment Act (DATA) waiver. The federal government has taken steps to increase the availability of MAT in response to the escalation of opioid overdoses and deaths in recent years. Policy efforts to address the opioid epidemic have corresponded with increased treatment availability, yet access to substance abuse treatment has not kept pace with the increasing rates of opioid addiction in the United States. Geographic information is important in accurately evaluating treatment capacity. Treatment location may be especially relevant to understanding the discrepancy between need and capacity. The current report identifies the geographic location of MAT providers using methadone and buprenorphine (opioid agonist treatment) in the United States. The analysis uses Substance Abuse and Mental Health Services Administration (SAMHSA) data to identify the number and location of (1) federally certified opioid treatment programs and (2) practitioners with DATA waivers. The geographic location of OTPs and DATA-waived practitioners are displayed in several national and regional maps. Identifying the location of OAT providers may have utility in increasing accessibility to treatment. However, simply increasing capacity for treatment may not effectively increase availability (or decrease opioid-related overdoses) if treatment providers are not located in areas of need. The current analysis does not evaluate needâby locating opioid-related overdose hospital admissions and deaths for instance. It does, however, provide an initial step in assessing how treatment providers are dispersed geographically. Other factors, such as substance use treatment financing, stigma, and waiting periods for services may also affect OAT availability. Practitioners are subject to state laws and regulations regarding prescribing privileges which affect their eligibility for DATA waivers and, in turn, the availability of treatment. Congress may incorporate geographic factors in strategies designed to increase capacity and availability of treatment.", "document_type": "crs"}
{"report": "The Congressional Research Service (CRS) regularly receives requests about spending on programs and activities that target low-income individuals and families for benefits and services. CRS has produced a series of reports that identify these programs and provides their spending amounts and recent spending trends. This current report provides an interim update of the federal spending for programs and activities identified in CRS Report R44574, Federal Benefits and Services for People with Low Income: Overview of Spending Trends, FY2008-FY2015 , extending the spending analysis through FY2018, the most recent year for which federal spending data were available as of January 2020. In FY2018, the federal government spent $917.8 billion on benefits and services for people with low income. This was an increase of 2.2% compared to FY2017, which was less than the rate of economic growth (5.4%) and nearly equal to the rate of inflation (2.3%) during FY2018. While the programs in this report share the common feature of an explicit low-income focus, the individual programs are highly diverse in their purpose, design, and target population. They were established at different times, in response to different policy challenges. In terms of target population, the largest portion of low-income assistance goes to families with children with working parents and the disabled (see CRS In Focus IF10355, Need-Tested Benefit Receipt by Families and Individuals ). Figure 1 shows the trend in federal spending in nominal terms on benefits and services for people with low income for FY2008 through FY2018. The early portion, FY2008 through FY2011, represents a period of time where spending increased because of automatic or legislated responses to the recession of 2007 through 2009. The largest low-income assistance programs are entitlements, and their spending increased automatically as more people became eligible for their benefits as incomes fell due to the recession. Additionally, Congress and the President responded to the recession with time-limited expansions or funding increases in some of these programs in the American Recovery and Reinvestment Act of 2009 (ARRA, P.L. 111-5 ). Total spending on these programs increased by 36% over this period. Federal spending on benefits and services for low-income people stabilized in FY2011 and FY2012 as ARRA expired and other spending increases associated with the recession abated. However, from FY2012 through FY2018, spending for these programs increased at a steady pace, stemming from increases in spending on health care for low-income people. CRS's series of reports on benefits and services for low-income people divides spending for the programs into eight categories: health care, cash aid, food aid, education, housing and development, social services, employment and training, and energy assistance. Table 1 shows federal spending for the programs by category for FY2008 through FY2018. The categories are sorted by the amount of their spending in FY2018, with the largest (health care) first and the smallest (energy aid) last. Health care represents more than half of total spending for the programs in FY2018 and more than three times the amount of the next largest category, cash aid. The two smallest categories are employment and training programs (exclusive of education spending) and energy assistance. Figure 2 breaks out total federal spending on benefits and services for people with low income into two groups: health programs and all other programs. As shown in the figure, the increase in nominal spending in the earlier portion of the period (affected by recession-related spending) stemmed from increases in both health and other program spending. However, since FY2012 the increase is attributable to higher spending on health care. Spending on all other programs (collectively) has decreased each year since FY2016. Much of the increase in health spending is from the Medicaid program, and since FY2014 reflects increases in spending due to the Patient Protection and Affordable Care Act's (ACA, P.L. 111-148 as amended) Medicaid expansion. The largest programs providing benefits and services to low-income people are mandatory spending programs. These are programs where spending is controlled by the terms of their authorizing lawsâsuch as entitlements either to individuals or statesârather than the annual appropriation process. Discretionary spending is generally determined through annual appropriations. Figure 3 shows federal spending in FY2018 on benefits and services for people with low income by category and budget classification (mandatory, discretionary, or some programs have spending classified as both). The largest categories (health, cash aid, and food aid) are dominated by mandatory spending. Housing is almost entirely discretionary spending, determined through annual appropriations. Education is split between discretionary spending and the Pell Grant program, which has both mandatory and discretionary components. Social services and employment and training have a mix of mandatory spending (much of it coming from the broad-based Temporary Assistance for Needy Families (TANF) block grant) and discretionary funding. Energy assistance is entirely discretionary. Of the $917.8 billion spent by the federal government on benefits and services for people with low income in FY2018, $741.2 billion (81%) was spent on programs or activities receiving only mandatory funding and $139.7 billion (15%) was spent on programs or activities receiving only discretionary funding. The remaining $37.0 billion of spending occurred in programs receiving both mandatory and discretionary funding. Health care is a major source of mandatory spending: 94% of all health care spending discussed in this report was mandatory spending in FY2018. Table 2 shows spending for federal benefits and services to low-income persons by program for FY2008 to FY2018. The programs were classified into the eight categories of spending noted above, and are ranked within each category by FY2018 spending. Note that in many categories, spending is dominated by a few large programs. For example, in FY2018, Medicaid accounted for 85% of health care spending, Supplemental Security Income and two refundable tax credits for low-income workers (the Earned Income Tax Credit and the refundable portion of the Child Tax Credit) accounted for 93% of all cash aid, Supplemental Nutrition Assistance Program (SNAP) accounted for 67% of all food aid, and Pell Grants plus aid to school districts with large shares of disadvantaged children accounted for 81% of all education aid. Most programs had spending that was classified in a single category. The exceptions are the broad-purpose TANF block grant and SNAP. TANF is best known as a program that provides cash assistance to needy families with children. TANF accounted for $5.2 billion in federal spending on cash aid in FY2018, making it the fourth-largest cash program and representative of 4% of cash spending. In contrast, TANF spending on social services made it the second-largest social services program (behind only Head Start), and its employment and training expenditures made it the largest employment and training program. SNAP spending was divided into its food assistance and its employment and training components. SNAP was the largest food assistance program ($63 billion in food assistance in FY2018), but it also contributed $441 million in employment and training expenditures in FY2018.", "summary": "The Congressional Research Service (CRS) regularly receives requests about federal benefits and services targeted to low-income populations. This report is the latest update in a series of CRS reports that attempt to identify and provide information about federal spending targeted to this population. The report series does not discuss social insurance programs such as Social Security, Medicare, or Unemployment Insurance, but includes only programs with an explicit focus on low-income people or communities. Tax provisions, other than the refundable portion of two tax credits, are excluded. Past reports in this series include the following: CRS Report R44574, Federal Benefits and Services for People with Low Income: Overview of Spending Trends, FY2008-FY2015 , and CRS Report R43863, Federal Benefits and Services for People with Low Income: Programs and Spending, FY2008-FY2013 . This current report is intended to provide a brief update of federal spending during FY2008-FY2018 for programs or activities identified in past reports. This report has not been updated to include information on new programs or activities; it simply provides information on the programs or activities that had previously been identified. Over the course of the 11-year period examined, federal spending on people with low income increased by 64% in nominal terms, peaking at nearly $918 billion in FY2018. Increases in recent years were largely driven by spending on health care. Key findings include the following: No single label best describes all programs with a low-income focus, and no single trait characterizes those who benefit. Programs are highly diverse in their purpose, design, and target population. Readers should use caution in making generalizations about the programs described in this report. Total federal spending on low-income programs in nominal terms rose sharply between FY2008 and FY2009 as the Great Recession took hold. Spending stabilized in FY2011, but it has increased at a fairly steady pace since FY2012 largely due to increases in health care spending. The peak spending year in this window was FY2018, when federal spending on low-income populations totaled $918 billion. This represents a nominal increase of 64% from FY2008. Health care is the single largest category of low-income spending and tends to drive overall trends. In each year, spending on health care has accounted for roughly half of all spending; since FY2015, it has accounted for just over half of all spending. The single largest program within the health category is Medicaid. After health care, cash aid and food assistance are the next largest categories, with food assistance seeing a 59% nominal increase over the 11-year period. Other categories (in descending size based on FY2018 spending) are housing and development, education, social services, employment and training, and energy assistance. Most low-income spending is classified in budgetary terms as mandatory (or direct ), which means the amount spent is a function of eligibility and payment rules established in authorizing laws. The amount spent for the remaining discretionary programs is controlled through the annual appropriations process. In some cases, programs receive both mandatory and discretionary funding. In FY2018, 81% of low-income spending was mandatory-only, 15% was discretionary-only, and 4% was spent on programs receiving both mandatory and discretionary funding. Four programs accounted for 68% of low-income spending in FY2018 and ten programs made up 82%. Medicaid alone represented 48% of the total. In addition to Medicaid, the top four include the Supplemental Nutrition Assistance Program (SNAP), the refundable portion of the Earned Income Tax Credit (EITC), and Supplemental Security Income (SSI).", "document_type": "crs"}
{"report": "C ompanies that provide cable television service (cable operators) are subject to regulation at the federal, state, and local levels. Under the Communications Act of 1934 (Communications Act), as amended, the Federal Communications Commission (FCC or Commission) exercises regulatory authority over various operational aspects of cable serviceâsuch as technical standards governing signal quality, ownership restrictions, and requirements for carrying local broadcast stations. At the same time, a cable operator must obtain a \"franchise\" from the relevant state or local franchising authorities for the region in which it seeks to provide cable services. Franchising authorities often require cable operators to meet certain requirements, provide certain services, and pay fees as a condition of their franchise. As a result, the franchising process is an important component of cable regulation. In the early history of cable regulation, the FCC did not interfere with franchising authority operations, opting instead for a system of \"deliberately structured dualism.\" The Cable Communications Policy Act of 1984 (Cable Act) codified this dualist structure by adding Title VI to the Communications Act. Title VI requires cable operators to obtain franchises from state or local franchising authorities and permits these authorities to continue to condition the award of franchises on an operator's agreement to satisfy various requirements. However, Title VI also subjects franchising authorities to a number of important statutory limitations. For instance, franchising authorities may not charge franchise fees greater than 5% of a cable operator's gross annual revenue and may not \"unreasonably refuse\" to award a franchise. As explained below, the FCC issued a series of orders restricting the requirements and costs that franchising authorities may impose on cable operators. The FCC issued its first such order in 2007 (First Order) after gathering evidence suggesting that some franchising authorities were imposing burdensome requirements on new entrants to the cable market. The First Order clarified when practices by franchising authorities, such as failing to make a final decision on franchise applications within time frames specified in the order, amount to an \"unreasonabl[e] refus[al]\" to award a franchise in violation of the Cable Act. The First Order also provided guidance on which costs count toward the 5% franchise fee cap, and it maintained that franchising authorities could not refuse to grant a franchise based on issues related to non-cable services or facilities. The U.S. Court of Appeals for the Sixth Circuit (Sixth Circuit) upheld the First Order in its 2008 decision in Alliance for Community Media v. FCC . Shortly after issuing the First Order, the FCC adopted another order (Second Order), extending the First Order's rulings to incumbent cable operators as well as new entrants. In a later order responding to petitions for reconsideration (Reconsideration Order), the FCC affirmed the Second Order's findings and further clarified that \"in-kind\" (i.e., noncash) payments exacted by franchising authorities, even if related to the provision of cable service, generally count toward the maximum 5% franchise fee. In 2017, the Sixth Circuit reviewed aspects of the Second Order and Reconsideration Order in its decision in Montgomery County v. FCC , upholding some rules and vacating others. In response, the FCC adopted a new order on August 1, 2019 (Third Order). The Third Order seeks to address the defects identified by the Sixth Circuit by clarifying the Commission's reasoning for counting cable-related, in-kind payments toward the 5% franchise fee cap and for applying the First Order's rulings to incumbent cable operators. The Third Order also explicitly asserts the Cable Act's preemption of state and local laws to the extent they impose fees or other requirements on cable operators who provide non-cable service, such as broadband internet, over public rights-of-way. Some municipalities have criticized this order for, among other things, hampering their ability to control public rights-of-way and reducing their ability to ensure the availability of public, educational, and government (PEG) programming in their communities. Several cities have filed legal challenges to the order that are currently before the Sixth Circuit. As an aid to understanding the complex and evolving nature of the law in this area, this report provides a basic overview of the federal legal framework governing the cable franchising process. The report begins with a historical overview of the law's evolution, from the Communications Act through the Cable Act and its later amendments, to the FCC's various orders interpreting the act. Next, the report details several key issues that have arisen from the FCC's orders, specifically (1) the circumstances under which a franchising authority might be found to have unreasonably refused to award a franchise; (2) the types of expenditures that count toward the 5% cap on franchise fees; and (3) the extent to which Title VI allows franchising authorities to regulate \"mixed-use\" networks, that is, networks through which a cable operator provides cable service and another service such as telephone or broadband internet. The report concludes with a discussion of other legal issues that may arise from pending challenges to the FCC's Third Order and offers some considerations for Congress. A summary of federal restrictions on local authority to regulate cable operators and a glossary of some terms used frequently in this report are found in the Appendix . The FCC's earliest attempts to regulate cable television relied on authority granted by the Communications Act, a legal framework that predated cable television's existence. The Communications Act brought all wire and radio communications under a unified federal regulatory scheme. The act also created the FCC to oversee the regulatory programs prescribed by the Communications Act. Title II of the act gave the FCC authority over \"common carriers,\" which principally were telephone service providers. Title III governed the activities of radio transmission providers. The FCC's Title III jurisdiction encompasses broadcast television transmitted via radio signals. For the first half of the 20 th Century, when virtually all commercial television broadcast in this manner, Title III thus gave the FCC regulatory authority over this industry. In the late 1940s and early 1950s, however, municipalities with poor broadcast reception began experimenting with precursors to modern cable systems. These areas erected large \"community antennas\" to pick up broadcast television signals, and the antenna operators routed the signals to residential customers by wire, or \"cable.\" Through the 1950s, the FCC declined to regulate these systems, initially known as \"Community Antenna Television\" systems and later simply as \"cable television.\" The FCC reasoned that cable television was neither a common carrier service subject to Title II regulation nor a broadcasting service subject to Title III regulation. The FCC changed course in a 1966 order in which it first asserted jurisdiction over cable television. The Commission acknowledged that it lacked express statutory authority to regulate cable systems. Even so, the agency concluded that it had jurisdiction because of cable television's \"uniquely close relationship\" to the FCC's then-existing regulatory scheme. The Supreme Court affirmed the FCC's authority to regulate cable television in a 1968 decision, relying on the FCC's argument that regulatory authority over cable television was necessary for the FCC's performance of its statutory responsibility to \"provid[e] a widely dispersed radio and television service, with a fair, efficient and equitable distribution of service among the several States and communities.\" Following this reasoning, the Court construed the Communications Act as enabling the FCC to regulate what was \"reasonably ancillary\" to its responsibilities for regulating broadcast television under Title III. The FCC thereafter maintained regulatory authority over operational aspects of cable television, such as technical standards and signal carriage requirements. However, state and local \"franchising authorities\" continued to regulate cable operators through the negotiation and grant of franchises. The Commission recognized that cable television regulation ha d an inherent ly local character, insofar as local regulators were better situated to manage rights-of- way and to determine how to divide large urban areas into smaller service areas . As part of the ir franchising process, f ranchising authorities often imposed fees and other conditions on cable operators in exchange for allowing them to use public rights-of- way to construct their cable systems. Federal courts at the time tolerated this local regulation, noting that because cable systems significantly affect public rights-of-way, \"government must have some authority . . . to see to it that optimum use is made of the cable medium in the public interest.\" The Cable Communications Policy Act of 1984 (Cable Act) was the first federal statutory scheme to regulate expressly cable television. The act's purposes, as defined by Congress, included \"assur[ing] that cable systems are responsive to the needs and interests of the local community,\" providing the \"widest possible diversity of information sources,\" promoting competition, and minimizing unnecessary regulation in the cable industry. The House Energy and Commerce Committee report accompanying the legislation explained that the act was intended to preserve the \"critical role\" of municipal governments in the franchising process, while still making that power subject to some \"uniform federal standards.\" To these ends, the Cable Act added Title VI to the Communications Act to govern cable systems. Specifically, Section 621of Title VI preserved the franchising authorities' power to award franchises and required cable operators to secure franchises as a precondition to providing services. Title VI also permits franchising authorities to require that cable operators designate \"channel capacity\" for PEG use or provide \"institutional networks\" (\"I-Nets\"). But the power of franchising authorities is limited to regulating \"the services, facilities, and equipment provided by a cable operator,\" such as by prohibiting franchising authorities from regulating \"video programming or other information services.\" Section 622 of Title VI allows franchising authorities to charge fees to cable operators as a condition of granting the franchise, but it caps those fees at 5% of the operator's gross annual revenue from providing cable services. Section 622 defines \"franchise fee\" to include \"any tax, fee, or assessment of any kind imposed by a franchising authority . . . on a cable operator or a cable subscriber, or both, solely because of their status as such[.]\" Franchise fees do not include taxes or fees of \"general applicability,\" capital costs incurred by the cable operator for PEG access facilities (PEG capital costs exemption), and any \"requirements or charges incidental to the awarding or enforcing of the franchise\" (incidental costs exemption). Congress amended Title VI in the Cable Television Consumer Protection and Competition Act of 1992, with a stated goal of increasing competition in the cable market. Specifically, Congress amended Section 621 to prohibit the grant of exclusive franchises and to prevent franchising authorities from \"unreasonably refus[ing] to award an additional competitive franchise.\" Congress also granted potential cable operators the right to sue a franchising authority for refusing to award a franchise. Congress amended the Cable Act again in 1996 to further promote competition in the cable television marketplace by enabling telecommunications providers regulated under Title II of the Communications Act (i.e., telephone companies) to offer video programming services. Congress repealed a provision banning telecommunications providers from offering video programming to customers in their service area and added a provision governing the operation of \"open video systems,\" a proposed competitor to cable systems. These amendments also added provisions barring franchising authorities from conditioning the grant of a franchise on a cable operator's provision of telecommunications services or otherwise requiring cable operators to obtain a franchise to operate a telecommunications service. In the decades following the passage of the Cable Act and its amendments, many phone companies upgraded their networks to enter the cable market. To streamline the process for these new entrants, the FCC issued orders interpreting the franchising provisions of Title VI. The four orders discussed in this sectionâthe First, Second, Reconsideration, and Third Ordersâeach address a range of topics and in some cases retread topics covered by an earlier order. Table 1 summarizes the orders. In 2007, after gathering evidence suggesting that some local and municipal governments were imposing burdensome demands on new entrants, the FCC adopted the First Order. The Commission observed that the franchising process had prevented or delayed the entry of telephone companies into the cable market. The First Order thus sought to reduce entry barriers by clarifying when Title VI prohibits franchising authorities from imposing certain franchise conditions on new entrants. The FCC gave examples of practices by franchising authorities that constitute an \"unreasonable refusal\" to award a franchise, such as 1. a delay in making a final decision on franchise applications beyond the time frames set forth in the order; 2. requiring cable operators to \"build out\" their cable systems to provide service to certain areas or customers as a condition of granting the franchise; 3. imposing PEG and I-Net Requirements beyond those imposed on incumbents; and 4. requiring that new cable operators agree to franchise terms that are substantially similar to those agreed to by incumbent cable operators (called \"level-playing-field requirements\"). The First Order further clarified when certain costs counted toward the 5% franchise fee cap and maintained that franchising authorities could not refuse to grant a franchise based on issues related to non-cable services or facilities. Several franchising authorities and their representative organizations challenged the legality of the Order in the Sixth Circuit. But the Sixth Circuit denied those challenges in Alliance for Community Media v. FCC , upholding both the FCC's authority to issue rules construing Title VI and the specific rules in the First Order itself. Although the First Order applied only to new entrants to the cable market, the FCC shortly thereafter adopted the Second Order, extending many of the First Order's rulings to incumbent cable television service providers. Following the release of the Second Order, the Commission received three petitions for reconsideration, to which it responded in the Reconsideration Order in 2015. In the Reconsideration Order, the FCC affirmed its conclusions from the Second Order applying its earlier rulings to incumbent cable operators. The Reconsideration Order also clarified that \"in-kind\" (i.e., noncash) payments exacted by franchising authorities, even if unrelated to the provision of cable service, may count toward the maximum 5% franchise fee allowable under Section 622. In 2017, in Montgomery County v. FCC , the Sixth Circuit vacated the FCC's determinations in the Second Order and Reconsideration Order on both issues. Following the ruling in Montgomery County, the Commission started a new round of rulemaking and, on August 1, 2019, adopted another order, the Third Order, addressing the issues raised by the Sixth Circuit. In the Third Order, the FCC clarified its basis for counting in-kind payments toward the 5% franchise fee cap, provided additional reasoning for applying the First Order's rulings to incumbent cable operators, and preempted state and local regulation inconsistent with Title VI. While prior orders applied only to local franchising authorities, the Third Order extended the Commission's rules in all three orders to state-level franchising authorities, concluding that there was \"no statutory basis for distinguishing between state- and local-level franchising actions.\" This report addresses issues raised in these various orders in greater detail below. As the foregoing discussion reflects, the FCC's post-2007 orders have focused on several key issues within Title VI's framework. Most notably, the Commission has addressed (1) when certain franchise requirements amount to an \"unreasonable refusal\" to award the franchise under Section 621; (2) the types of costs that are subject to the 5% franchise fee cap under Section 622; and (3) the extent to which franchising authorities may regulate \"mixed-use\" networks operated by cable operators. This section first reviews the relevant statutory provisions from which each of these three issues arise and then discusses the FCC's interpretations of those provisions. Title VI prohibits franchising authorities from \"unreasonably refus[ing]\" to grant a franchise to a cable operator. In the First Order, the FCC identified specific types of franchising conditions or practices that violate the unreasonable refusal standard, such as failing to process an application within certain time periods. The Sixth Circuit reviewed and upheld the First Order's interpretation of this standard, which remains in effect. Title VI allows franchising authorities to condition a franchise on the cable operator performing or meeting certain requirements. Sections 621(a)(4)(B) and 621(b)(3)(D) explicitly allow franchising authorities to require cable operators to provide PEG channel \"capacity, facilities, or financial support\" and to provide I-Net \"services or facilities.\" Section 621(a)(1), however, imposes a significant limitation on franchising authorities' ability to impose such conditions. Under that provision, franchising authorities may not \"grant an exclusive franchise\" or \"unreasonably refuse to award an additional competitive franchise.\" In the First Order, the FCC clarified when certain practices or requirements amount to an unreasonable refusal of a new franchise under Section 621(a)(1) of Title VI. The FCC gave four specific examples of unreasonable refusals: (1) delaying a final decision on franchise applications; (2) requiring cable operators to \"build out\" their cable systems to provide service to certain areas or customers as a condition of granting the franchise; (3) imposing PEG and I-Net requirements that are duplicative of, or are more burdensome than, those imposed on incumbents; and (4) requiring that new cable operators agree to franchise terms that are substantially similar to those agreed to by incumbent cable operators (the \"level-playing-field requirements\"). As for delays in acting on a franchise application, the FCC stated that a franchising authority unreasonably refuses a franchise when it subjects applicants to protracted negotiations, mandatory waiting periods, or simply a slow-moving franchising process. To prevent such delays, the FCC set decision deadlines of 90 days for applications by entities with existing access to rights-of-way and six months for applications by entities without such access. Once these time periods expire, franchise applications are deemed granted until the franchising authority takes final action on the application. As for build-out requirements, the FCC stated that requiring new franchise applicants to build out their cable systems to cover certain areas may constitute an unreasonable refusal of a franchise. The Commission explained that what constitutes an \"unreasonable\" build-out requirement may vary depending on the applicant's existing facilities or market penetration, but it clarified that certain build-out requirements are per se unreasonable refusals under Section 621. The FCC also determined that certain PEG and I-Net terms and conditions constitute an unreasonable refusal. Specifically, the Commission determined that PEG and I-Net requirements that are \"completely duplicative\" (i.e., a requirement for capacity or facilities that would not provide \"additional capability or functionality, beyond that provided by existing I-Net facilities\") are unreasonable unless redundancy serves a public safety purpose. The FCC also viewed PEG requirements as unreasonable when such requirements exceeded those placed on incumbent cable operators. Lastly, the FCC determined that level-playing-field requirements in local laws or franchise agreements amount to an unreasonable refusal of a franchise. The Commission explained that such requirements are unreasonable because new cable entrants are in a \"fundamentally different situation\" from incumbent operators. The FCC therefore concluded that these mandates \"unreasonably impede competitive entry\" into the cable market and are unreasonable refusals. As discussed above, several franchising authorities and their representative organizations unsuccessfully challenged the FCC's interpretation of the unreasonable refusal standard in Alliance for Community Media v. FCC , in which the Sixth Circuit upheld the First Order in its entirety. Applying the framework set forth in Chevron USA , Inc. v. Natural Resources Defense Council, Inc. âwhich guides courts when reviewing agency regulations that interpret the agency's governing statuteâthe court reasoned that the phrase \"unreasonably refuse\" is inherently ambiguous because the word \"unreasonably\" is subject to multiple interpretations. The court then held that the First Order's interpretation of this phrase was entitled to deference because it was reasonable and not unambiguously foreclosed by Title VI. As a result, the First Order's rules on what constitutes an unreasonable refusal remain binding on franchising authorities. Accordingly, if a franchising authority denies a cable operator's franchise request for a reason the FCC's has deemed unreasonableâsuch as the cable operator's refusal to accept build-out or level-playing-field requirementsâthe cable operator may sue the franchising authority for \"appropriate relief\" as determined by the court. Alternatively, if the franchising authority fails to make a final decision within the allotted time, the franchise will be deemed granted until the franchising authority makes a final decision. Title VI limits franchising authorities to charging cable operators \"franchise fees\" of up to 5% of the cable operator's revenue, subject to specific exceptions. However, the types of obligations limited by the 5% cap have been a point of contention. The FCC, in its various orders, has clarified the scope of the exceptions to the 5% cap (in particular, the PEG capital costs and incidental costs exemptions); it has further explained that, unless they fall under one of the express exceptions, non-monetary (or \"in-kind\") contributions are subject to the 5% cap even if they are related to the provision of cable service. Litigation over the Commission's current interpretations of what constitutes a \"franchise fee\" is ongoing. Section 622 allows franchising authorities to charge franchise fees to cable providers, but it subjects such fees to a cap. For any \"twelve-month period,\" franchise fees may not exceed 5% of the cable operator's gross annual revenues derived \"from the operation of the cable system to provide cable service.\" Section 622 broadly defines \"franchise fees\" to include \"any tax, fee, or assessment of any kind imposed by a franchising authority or other governmental entity on a cable operator or cable subscriber, or both, solely because of their status as such.\" However, Section 622 exempts certain costs from this definition, including 1. \"any tax, fee, or assessment of general applicability\"; 2. \"capital costs which are required by the franchise to be incurred by the cable operator for public, educational, or governmental access facilities\" (PEG capital costs exemption) ; and 3. \"requirements or charges incidental to the awarding or enforcing of the franchise, including payments for bonds, security funds, letters of credit, insurance, indemnification, penalties, or liquidated damages\" (incidental costs exemption). The FCC has provided guidance on the types of expenses subject to the 5% cap. In particular, it has clarified (1) when non-monetary (or \"in-kind\") contributions must be included in the calculation of franchise fees subject to the 5% cap; (2) the scope of the PEG capital costs exemption; and (3) the scope of the incidental costs exemption. The FCC has elaborated on the types of in-kind contributions that are subject to the 5% cap. In the First Order, the Commission maintained that in-kind fees unrelated to provision of cable serviceâsuch as requests that the cable operator provide traffic light control systemsâare subject to the 5% cap because they are not specifically exempt from the \"franchise fee\" definition. In the Reconsideration Order, the agency further clarified that the First Order's conclusions were not limited to in-kind exactions unrelated to cable service and that cable-related in-kind contributions (such as providing free or discounted cable services to the franchising authority) could also count toward the 5% cap. The Sixth Circuit vacated this conclusion, however, in Montgomery County v. FCC . The Sixth Circuit recognized that Section 622's definition of \"franchise fee\" is broad enough to encompass \"noncash exactions.\" But the court explained that just because the term \"can include noncash exactions, of course, does not mean that it necessarily does include every one of them.\" The court faulted the FCC for giving \"scarcely any explanation at all\" for its decision to expand its interpretation of \"franchise fee\" to include cable-related exactions, and held that this defect rendered the Commission's interpretation \"arbitrary and capricious\" in violation of the Administrative Procedure Act (APA). Following the Sixth Circuit's decision in Montgomery County , the Commission issued the Third Order, in which it detailed its reasons for including cable-related in-kind contributions in the 5% cap. The FCC first explained that, as recognized by the court in Montgomery County , the definition of \"franchise fee\" is broad enough to encompass in-kind contributions as well as monetary fees. The Commission also acknowledged the Sixth Circuit's observation that just because the definition is broad enough to include in-kind fees \"does not mean that it necessarily does include everyone one of them.\" Nevertheless, the FCC maintained that cable-related in-kind contributions should be included in the fee calculation because there is nothing in the definition that \"limits in-kind contributions included in the franchise fee.\" The Commission further reasoned that Section 622's specific exceptions do not categorically exclude such expenses, as there is no \"general exemption for cable-related, in-kind contributions.\" Along with its construction of Section 622, the FCC rejected arguments that \"other Title VI provisions should be read to exclude costs that are clearly included by the franchise fee definition,\" such as the provision that allows franchising authorities to require that cable operators designate channel capacity for PEG use. According to the Commission, \"the fact that the Act authorizes [franchising authorities] to impose such obligations does not mean that the value of these obligations should be excluded from the five percent cap on franchise fees.\" While the Third Order concluded that cable-related, in-kind contributions are not categorically exempt from the 5% cap, it recognized that certain types of cable-related in-kind contributions might be excluded. For instance, the FCC concluded that franchise terms requiring a cable operator to build out its system to cover certain localities or to meet certain customer service obligations are not franchise fees. The Commission reasoned that these requirements are \"simply part of the provision of cable service\" and are not, consequently, a \"tax, fee, or assessment.\" Furthermore, the FCC noted that the PEG capital costs exemption, which exempts costs associated with the construction of public, educational, or governmental access facilities, covers certain cable-related, in-kind expenses, and, as discussed below, the PEG capital costs exemption provides guidance on the types of costs to which it applies. On the other hand, the agency also identified specific cable-related, in-kind expenses that are subject to the 5% cap, such as franchise terms requiring cable operators to provide free or discounted cable service to public buildings or requiring operators to construct or maintain I-Nets. Lastly, the Third Order concluded that, for purposes of the 5% cap, cable-related in-kind services should be measured by their \"fair market value\" rather than the cost of providing the services. The FCC reasoned that fair market value is \"easy to ascertain\" and \"reflects the fact that, if a franchising authority did not require an in-kind assessment as part of its franchise, it would have no choice but to pay the market rate for services it needs from the cable operator or another provider.\" In sum, despite the setback for the Commission in Montgomery County , the FCC has maintained its position that in-kind contributionsâeven if related to cable serviceâare not categorically exempt from the 5% cap. The issue is not settled, however. As discussed later, the Third Order is being challenged in court, and it remains to be seen whether the FCC's position will ultimately be upheld. The FCC's interpretation of the PEG capital costs exemption has evolved. In the First Order, the Commission interpreted this exemption as applying to the costs \"incurred in or associated with\" constructing the facilities used to provide PEG access. However, the FCC broadened its interpretation in the Third Order. In the Third Order, the Commission conceded that its earlier statements were \"overly narrow\" because the plain meaning of the term \"capital costs\" can include equipment costs as well as construction costs. Consistent with this analysis, the FCC concluded that the term \"capital costs\" is not limited to construction-related costs, but can also include equipment purchased for the use of PEG access facilities, \"such as a van or a camera.\" The Third Order noted that capital costs \"are distinct from operating costs\"âthat is, the \"costs incurred in using\" PEG access facilitiesâand that operating costs are not exempt from inclusion in the franchise fee calculation. While the Third Order provided additional clarification on the PEG capital costs exemption, it left at least one issue unresolved. Specifically, the FCC determined there was an insufficient record before it to conclude whether \"the costs associated with the provision of PEG channel capacity\" fall within the exclusion. Consequently, it deferred consideration of this issue and stated that, in the meantime, channel capacity cost \"should not be offset against the franchise fee cap.\" Ultimately, the scope of the PEG capital costs exemption remains in flux. The FCC's Third Order is being challenged in court, and it is possible the agency's interpretation of the PEG capital costs exemption could be vacated. Even if the Third Order is upheld, it left unresolved whether the costs of providing PEG channel capacity fall under the capital costs exclusion; thus, while franchise authorities are not required to offset such costs against the 5% cap in the interim, it is unclear whether these costs will count toward the franchise fee cap in the long run. While the FCC has articulated its position on in-kind contributions and the PEG capital costs exemption over the course of several orders, the Commission largely addressed its interpretation of the \"incidental costs\" exemption in the First Order. There, the FCC read the exemption narrowly to include only those expenses specifically listed in Section 622(g)(2)(D)ânamely, \"bonds, security funds, letters of credit, insurance, indemnification, penalties, or liquidated damages.\" The Commission explained that it did not interpret unlisted costsâincluding, among other things, attorney fees, consultant fees, and in-kind paymentsâto be \"incidental\" costs, based on the text of the exemption and the legislative history of Section 622. The FCC noted, however, that certain \"minor expenses\" beyond those listed in the statute may be included as \"incidental costs,\" such as application or processing fees that are not unreasonably high relative to the cost of processing the application. In Alliance for Community Media v. FCC , the Sixth Circuit denied petitions challenging the First Order's interpretation of the \"incidental costs\" exemption. Petitioners argued that the plain meaning of the phrase \"incidental to\" meant that the fee had to be \"related to the awarding or enforcing of the franchise.\" According to petitioners, the FCC's per se listing of non-incidental feesâsuch as attorney and consultants' feesâcontradicted this plain meaning. The court, however, upheld the FCC's interpretation. The court reasoned that the phrase \"incidental to\" lent itself to multiple interpretations, including both the FCC's and the petitioners' readings. Consequently, it concluded under Chevron that the \"FCC's rules regarding fees\" qualified as \"reasonable constructions\" of Sections 622(b) and 622(g)(2)(D) that are entitled to deference. In sum, unlike in-kind contributions and the PEG capital costs exemption, the FCC's interpretation of the incidental costs exemption is not subject to any ongoing legal challenge. Consequently, with the exception of the \"minor expenses\" mentioned in the First Order, only those expenses listed in Section 622(g)(2)(D) (bonds, security funds, etc.) are exempt from the 5% cap under the incidental costs exemption. A continuing area of disagreement between the FCC and franchising authorities has been the extent to which franchising authorities can regulate non- cable services that a cable operator provides over the same network used for its cable service (e.g., a \"mixed-use network\"). From the First Order onward, the Commission has maintained that, based on its interpretation of various Title VI provisions, franchising authorities may not regulate the non-cable services aspects of mixed-use networks. While the First Order applied this rule only to new entrants to the cable market, the Second Order extended it to incumbent cable operators. The Sixth Circuit upheld this rule as applied to new entrants into the cable market, but vacated the FCC's application of it to incumbent cable operators. The Commission sought to cure this defect in the Third Order, and it further clarified that any efforts by state and local governments to regulate non-cable services provided by cable operators, even if done outside the cable franchising process and relying on the state's inherent police powers, are preempted by Title VI. However, given the ongoing legal challenge to the Third Order, this issue, too, remains unsettled. Several Title VI provisions arguably prohibit franchising authorities from regulating non-cable services (such as telephone or broadband internet access service) provided over mixed-use networks, or networks over which an operator provides both cable and non-cable services. Section 602's definition of \"cable system\" explicitly excludes the \"facility of a common carrier\" except \"to the extent such facility is used in the transmission of video programming directly to subscribers.\" Further, with respect to broadband internet access service, Section 624(b)(1) states that franchising authorities \"may not . . . establish requirements for video programming or other information services.\" Lastly, Section 624(a) states that \"[a] franchising authority may not regulate the services, facilities, and equipment provided by a cable operator except to the extent consistent with [Title VI].\" Beginning with the First Order, the FCC has relied on these statutory provisions to clarify the bounds of franchising authority jurisdiction over mixed-use networks. The Commission asserted that a franchising authority's \"jurisdiction applies only to the provision of cable services over cable systems.\" To support its view, the FCC cited Section 602's definition of \"cable system,\" which explicitly excludes common carrier facilities except to the extent they are \"used in the transmission of video programming directly to subscribers.\" The Commission did not address whether video services provided over the internet might are \"cable services.\" The First Order applied only to new entrants to the cable market. However, in the Second Order, the FCC determined that the First Order's conclusions regarding mixed-use networks should apply to incumbent providers because those conclusions \"depended upon [the Commission's] statutory interpretation of Section 602, which does not distinguish between incumbent providers and new entrants.\" The FCC reaffirmed this position in the Reconsideration Order, stating that franchising authorities \"cannot . . . regulate non-cable services provided by an incumbent.\" In Montgomery County v. FCC , however, the Sixth Circuit vacated the FCC's extension of its mixed-use network rule to incumbent cable providers on the ground that this interpretation was arbitrary and capricious. The court explained that the Commission could not simply rely on the reasoning in its First Order because Section 602 did not support an extension of the mixed-use rule to incumbent cable providers. The court observed that the FCC correctly applied its mixed-use rule to new entrantsâwho were generally common carriersâbecause Section 602's definition of \"cable system\" expressly excludes common carrier facilities. But most incumbents, by contrast, are not common carriers. Consequently, because the Commission did not identify any other \"valid basisâstatutory or otherwiseâ\" for its extension of its mixed-use rule to non-common carrier cable providers, the court vacated that decision as arbitrary and capricious. Responding to Montgomery County , the FCC's Third Order provides additional support for extending the mixed-use rule to incumbent cable operators. The Order first reiterates that Section 602's definition of \"cable system\" provides the basis for barring franchising authorities from regulating incumbent cable operators when acting as common carriers, because the definition explicitly excludes common carrier facilities except to the extent they are \"used in the transmission of video programming directly to subscribers.\" Similarly, the Commission concluded that franchising authorities cannot regulate non -common carriers to the extent they provide other services along with cable, in particular, broadband internet access. The Third Order supports that conclusion by reference to Section 624(b)(1)'s command that franchising authorities may not \"establish requirements for video programming or other information services .\" While \"information services\" is not defined in Title VI, the FCC concluded that, based on Title VI's legislative history, the term should have the same meaning it has in Title I of the Communications Act. The Commission has interpreted \"information service\" under Title I of the Communications Act to include broadband internet access service, and the D.C. Circuit has upheld that interpretation. The Third Order also notes that \"it would conflict with Congress's goals in the Act\" to treat cable operators that are not common carriers differently from those that are common carriers, as allowing franchising authorities to regulate non-common carrier operators more strictly \"could place them at a competitive disadvantage.\" Beyond clarifying that franchising authorities cannot use their Title VI authority to regulate the non-cable aspects of a mixed-use cable system, the Third Order also explicitly preempts state and local laws that \"impose[] fees or restrictions\" on cable operators for the \"provision of non-cable services in connection with access to [public] rights-of-way, except as expressly authorized in [Title VI].\" Prior to the Third Order's issuance, for example, the Oregon Supreme Court in City of Eugene v. Comcast upheld the City of Eugene's imposition of a 7% fee on the revenue a cable operator generated from its provision of broadband internet services. Rather than impose the fee as part of the cable franchising process, the city cited as its authority an ordinance imposing a \"license-fee\" requirement on the delivery of \"telecommunications services\" over the city's public rights-of-way. The court held that Title VI did not prohibit the city from imposing the fee, as it was not a \"franchise fee\" subject to the 5% cap because the ordinance applied to both cable operators and non-cable operators. Thus, the court reasoned, the city did not require Comcast to pay the fee \"solely because of\" its status as a cable operator and the franchise fee definition was not met. In the aftermath of the Oregon Supreme Court's decision, other state and local governments relied on sources of authority outside of Title VI, such as their police power under state law, to regulate the non-cable aspects of mixed-use networks. The Third Order rejects City of Eugene 's reading of Title VI. The FCC reasoned that Title VI establishes the \"basic terms of a bargain\" by which a cable operator may \"access and operate facilities in the local rights-of-way, and in exchange, a franchising authority may impose fees and other requirements as set forth and circumscribed in the Act.\" Although Congress was \"well aware\" that cable systems would carry non-cable services as well as cable, it nevertheless \"sharply circumscribed\" the authority of state and local governments to \"regulate the terms of this exchange.\" Consequently, the Commission concluded, the Third Order \"expressly preempt[s] any state or local requirement, whether or not imposed by a franchising authority, that would impose obligations on franchised cable operators beyond what Title VI allows.\" The Third Order also concluded that the FCC has authority to preempt such laws because, among other things, Section 636(c) of Title VI expressly preempts any state or local law\" that is \"inconsistent with this chapter.\" Thus, in the FCC's view, wherever such express preemption provisions are present, the \"Commission has [been] delegated authority to identify the scope of the subject matter expressly preempted.\" In sum, while franchising authorities may not use the cable franchising process to regulate non-cable services provided over mixed-use networks by new entrants to the cable market, the FCC's extension of this rule to incumbents has not yet been upheld in court. Furthermore, the Third Order's broad preemption of any state and local law regulating cable operators' use of public rights-of-way beyond what Title VI allows raises even more uncertainty. As discussed further below, the Third Order's preemption raises difficult questions about the extent to which the Commission may rely on Title VI to preempt not only state and local cable franchising requirements but also generally applicable state regulations and ordinances that regulate non-cable services provided by cable operators. Several cities, franchising authorities, and advocacy organizations have filed petitions for review of the Third Order in various courts of appeals, and these petitions have been consolidated and transferred to the Sixth Circuit. In their petitions, the petitioners generally allege that the Third Order violates the Communications Act and the U.S. Constitution and is arbitrary and capricious under the APA. The same parties filed a motion with the FCC to stay the Third Order, which the Commission recently denied. While the petitions challenging the order state their legal theories in general terms, this case will likely raise complex issues of statutory interpretation, as well as administrative and constitutional law. For instance, petitioners could argue, as commenters did during the rulemaking process for the Third Order, that the text and structure of Title VI contradicts the FCC's broad interpretation that a franchise fee should include most cable-related, in-kind expenses. Pointing to provisions such as Section 611(b), which authorizes franchising authorities to impose PEG and I-Net requirements without any reference to the franchise fee provision, some commenters argued that Title VI treats the cost of complying with franchise requirements as distinct from the franchise fee. A reviewing court would likely apply the Chevron framework to resolve such statutory arguments. While it is difficult to predict how a reviewing court would decide any given issue, the Sixth Circuit's decision in Montgomery County indicates that the court might uphold the Third Order's legal interpretation of the franchise fee provision under the Chevron doctrine. Specifically, as discussed above, the Sixth Circuit held that Section 622's definition of franchise fee is broad enough to include \"noncash exactions.\" Given this decision, the Sixth Circuit could potentially hold that the franchise fee definition is broad enough to accommodate the FCC's interpretation and that the FCC's interpretation is reasonable and entitled to deference. Even were the Sixth Circuit to reach that conclusion, however, that is not the end of the analysis. As the Sixth Circuit's decision in Montgomery County also demonstrates, the FCC's rulings may be vacated regardless of whether the Commission's statutory interpretation enjoys Chevron deference if the court concludes that the FCC's interpretation is arbitrary and capricious under the APA. A federal agency's determination is arbitrary and capricious if the agency \"has relied on factors which Congress has not intended it to consider, entirely failed to consider an important aspect of the problem, offered an explanation for its decision that runs counter to the evidence before the agency, or is so implausible that it could not be ascribed to a difference in view or the product of agency expertise.\" In Montgomery County , the Sixth Circuit held that the FCC had acted arbitrarily and capriciously by failing to give \"scarcely any explanation at all\" for expanding its franchise fee interpretation to cable-related in-kind expenses and for failing to identify a statutory basis for extending its mixed-use rule to incumbents. While the Commission took pains to address these concerns in the Third Order, it remains to be seen whether a court would find those efforts sufficient or accept other arguments as to why the FCCs interpretations should be held arbitrary and capricious. For instance, those challenging the Third Order might argue that the Commission failed to address evidence that \"runs counter\" to its rules or failed to consider important counterarguments. One such area of focus for petitioners in their motion to stay the Third Order was the FCC's alleged failure to address potential public safety effects of the Third Order's treatment of cable-related in-kind contributions. In addition, the Third Order's assertion of preemption may come under scrutiny from state or local challengers who seek to regulate mixed-use networks. A recent D.C. Circuit decision struck down the FCC's attempt to preempt \"any state or local requirements that are inconsistent with [the FCC's] deregulatory approach\" to broadband internet regulation. Additionally, in a recent opinion concurring in the U.S. Supreme Court's denial of a petition for certiorari in a case involving a state's effort to regulate Voice over Internet Protocol service, Justice Thomas, joined by Justice Gorsuch, voiced concerns about allowing the FCC's deregulatory policy to preempt state regulatory efforts. Both the D.C. Circuit and Justices Thomas and Gorsuch expressed skepticism that the FCC has statutory authority to preempt state and local regulation in areas where the FCC itself has no statutory authority to regulate. Cities and local franchising authorities may seize on the reasoning in these opinions to argue that Title VI's preemption provision cannot extend to non-cable services that fall outside Title VI's purview. Lastly, along with statutory interpretation and administrative law issues, challengers to the Third Order may assert constitutional arguments. As mentioned, the Third Order prevents state and local governments from relying on state law to regulate non-cable services provided by cable operators. However, some commenters have argued that the Third Order violates the anti-commandeering doctrine, a constitutional rule that prohibits the federal government from compelling states to administer federal regulations. The Supreme Court recently clarified the anti-commandeering doctrine in Murphy v. NCAA . In Murphy , the Court struck down the Professional and Amateur Sports Protection Act of 1992, which prohibited states from legalizing sports gambling. Justice Alito, writing for the Court, reasoned that the anti-commandeering doctrine prohibits Congress from \"issu[ing] direct orders to state legislatures,\" compelling them to either enact certain legislation or to restrict them from enacting certain legislation. The Court explained that the anti-commandeering doctrine promotes accountability, because, when states regulate at Congress's command, \"responsibility is blurred.\" Justice Alito further explained that the doctrine \"prevents Congress from shifting the costs of regulation to the States.\" The Court contrasted unlawful commandeering with permissible \"cooperative federalism\" regimes. Under such regimes, Congress allows, but does not require, states to implement a regulatory program according to federal standards, and a federal body implements the program when a state refrains from doing so. According to some commenters, the FCC's Third Order violates the anti-commandeering doctrine because it \"effectively command[s] local government[s] to grant right-of-way access on the terms the Commission, not local government or the states set.\" Further, some commenters, including the National Association of Telecommunications Officers and Advisors and National League of Cities, argue that the Third Order would violate the accountability and cost-shifting principles animating the anti-commandeering doctrine, as explained in Murphy . According to these commenters, the FCC's \"mixed-use rule unquestionably blurs responsibility\" because residents unhappy with cable operators' use of the right-of-way for non-cable purposes would \"blame their local elected officials,\" and the mixed-use rule would shift cost to local governments by \"usurp[ing]\" the \"compensation local governments may be entitled to for use of the [rights-of-way] for non-cable services.\" Ultimately, this issue may turn on whether Title VI, as interpreted by the FCC's rules, is a permissible \"cooperative federalism\" program under Murphy . In its Third Order, the Commission argued Title VI was such a program because it \"simply establishes limitations on the scope of [states' authorities to \"award franchises\" to cable operators] when and if exercised.\" The FCC further maintained that, rather than \"requir[ing] that state or local governments take or decline any particular action,\" its rules were \"simply requiring that, should state and local governments decide to open their rights-of-way to providers of interstate communication services within the Commission's jurisdiction, they do so in accordance with federal standards.\" It remains to be seen, however, how broadly lower courts will apply Murphy 's cooperative federalism distinction. Beyond the various legal arguments discussed above, there are notable disagreements over the practical impact of the FCC's rules. On the one hand, localities and their representative organizations have claimed that the Commission's Third Order will \"gut[] local budgets\" and that, by subjecting in-kind franchise requirements such as PEG and I-Net requirements to the 5% cap, it will force franchising authorities to \"choose between local PEG access and I-Nets, and the important other public services supported by franchise fees.\" Similarly, the two FCC commissioners who dissented from the Third OrderâJessica Rosenworcel and Geoffrey Starksâmaintained in their dissents that the Third Order was part of a broader trend at the Commission of \"cutting local authorities out of the picture\" and that it would, among other things, diminish the \"value of local public rights-of-way.\" In response, the FCC's chairman, Ajit Pai, and other Commissioners in the majority contended that the rule would benefit consumers because the costs imposed by franchising authorities through in-kind contributions and fees get \"passed on to consumers\" and discourage the deployment of new services like \"faster home broadband or better Wi-Fi or Internet of Things networks.\" Given the competing arguments relating to the FCC's interpretation of Title VI's scope, Congress may be interested in addressing the issues raised by the Third Order. For instance, Congress might address the extent to which Section 622's definition of \"franchise fee\" includes cable-related, in-kind expenses such as PEG and I-Net services. It might also address whether Title VI preempts state and local governments from relying on their police powers or other authorities under state law to regulate non-cable services provided by cable operators. However, Congress also might consider federalism issues implicated by any attempt to prohibit state and local authorities from regulating such services. As discussed in the previous section, the anti-commandeering principle prohibits direct orders to states that command or prohibit them from enacting certain laws, but permits lawful \"cooperative federalism\" regimes where Congress gives states a choice of either refraining from regulating a particular area or regulating according to federal standards. Thus, Congress may avoid anti-commandeering issues by setting federal standards for regulation of ancillary non-cable services rather than prohibiting states from regulating these services. Federal Standards and Restrictions on Franchising Authority Power The following table summarizes functions and areas traditionally regulated by franchising authorities that are subject to federal standards or federal restrictions. This table is not a summary of all federal requirements and regulations cable operators face under the act, only those that implicate the powers of franchising authorities. Glossary Build-Out Requirement: A requirement placed on a cable operator to provide cable service to particular areas or residential customers. Cable Operator: From the Cable Act, 47 U.S.C. Â§ 522, \"[a]ny person or group of persons (A) who provides cable service over a cable system and directly or through one or more affiliates owns a significant interest in such cable system, or (B) who otherwise controls or is responsible for, through any arrangement, the management and operation of such a cable system.\" Cable Service: One-way transmission of video programming to customers, and any customer interaction required for the selection or use of such video programming. Cable System: A facility designed to provide video programming to multiple subscribers within a community, with limited exceptions. See note 39 , supra , for the precise exceptions. Common Carrier: A person or entity who provides interstate telecommunications service. Franchise: A right to operate a cable system in a given area. Franchise Fee: From the Cable Act, 47 U.S.C. Â§ 542, \"any tax, fee, or assessment of any kind imposed by a franchising authority or other governmental entity on a cable operator or cable subscriber, or both, solely because of their status as such,\" with several exceptions. See the \" Franchise Fees \" section, supra , for a discussion of some of these exceptions. Franchising Authority: A state or local governmental body responsible for awarding franchises. I-Net: Abbreviation for \"institutional network\"; a communication network constructed or operated by a cable operator for use exclusively by institutional (non-residential) customers. In-Kind : Non-monetary. Mixed-Use Network: A communication network over which a person or entity provides both cable service and other service(s), such as telecommunications service. PEG: Abbreviation for \"Public, Educational, or Governmental.\" See note 41 , supra , for more discussion of this term. Telecommunications : From the Communications Act, 47 U.S.C. Â§ 153, \"the transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.\" Telecommunications Service: The offering of telecommunications directly to the public for a fee. Title VI: The collected provisions of the Cable Act, as amended.", "summary": "Companies that provide cable television service (cable operators) are subject to regulation at the federal, state, and local levels. Under the Communications Act of 1934, the Federal Communications Commission (FCC or Commission) exercises regulatory authority over various operational aspects of cable service. At the same time, a cable operator must obtain a franchise from the state or local franchising authority for the area in which it wishes to provide cable service. The franchising authority often negotiates various obligations as a condition of granting the franchise. Under the Cable Communications Policy Act of 1984 (Cable Act), cable operators must obtain franchises from state or local franchising authorities, and these authorities may continue to condition franchises on various requirements. Nevertheless, the Cable Act subjects franchising authorities to important limitations. For instance, the Cable Act prohibits franchising authorities from charging franchise fees greater than 5% of a cable operator's gross annual revenue and from \"unreasonably\" refusing to award a franchise. In a series of orders since 2007, the FCC has interpreted the Cable Act to authorize an expanding series of restrictions on the powers of state and local franchising authorities to regulate cable operators. In particular, these orders clarify (1) when practices or policies by a franchising authority amount to an unreasonable refusal to award a franchise; (2) the types of expenditures that count toward the 5% franchise fee cap; and (3) the extent to which franchising authorities may regulate non-cable services provided by cable operators. Franchising authorities, in turn, have successfully challenged some of the FCC's administrative actions in federal court. The U.S. Court of Appeals for the Sixth Circuit upheld many rules in the FCC's orders, but it also vacated some of the FCC's rules in the 2017 decision in Montgomery County v. FCC . In response to the Montgomery County decision, the FCC adopted a new order on August 1, 2019, which clarifies its interpretations of the Cable Act. Among other things, the order reiterates the FCC's position that in-kind (i.e., non-monetary) expenses, even if related to cable service, may count toward the 5% franchise fee cap and preempts any attempt by state and local governments to regulate non-cable services provided by cable operators. Some localities have criticized the order for hampering their ability to control public rights-of-way and for reducing their ability to ensure availability of public, educational, and government (PEG) programming in their communities. Several cities have filed legal challenges to the order, which will likely involve many complex issues of statutory interpretation and administrative law, along with constitutional questions regarding the FCC's ability to impose its deregulatory policy on states. This report first outlines the FCC's role in regulating cable operators and franchising authorities, beginning with the Commission's approach under the Communications Act through the passage of the Cable Act and its amendments. The report then turns to a discussion of recurring legal issues over the FCC's power over franchising authorities. The report concludes with a discussion of possible legal issues that may arise in current legal challenges to FCC regulations and offers considerations for Congress.", "document_type": "crs"}
{"report": "Over the past two years, increasing migration across the Southwest border of the United States has posed considerable challenges to U.S. federal agencies charged with apprehending and processing unauthorized migrants. From FY2000 to FY2017, unauthorized migration flowsâmeasured in this report by the number of migrants apprehended by the Department of Homeland Security's (DHS's) Customs and Border Protection (CBP)âhad been generally declining. Apprehensions statistics historically have been used as a rough measure of trends in unauthorized migration flows, as well as a rough indicator of border enforcement (see \" Interpreting Apprehensions Data \" below). After reaching an all-time peak of 1,643,679 in FY2000, apprehensions fell to a 45-year low of 303,916 in FY2017. In FY2018 apprehensions increased to 396,579, and in FY2019 they more than doubled to 851,508. The Administration and some Members of Congress have characterized the recent increases as a border security and humanitarian crisis. For example, then-CBP Commissioner Kevin McAleenan, in testimony to the Senate Judiciary Committee on March 6, 2019, stated I have heard a number of commentators observe that even with these alarming levels of migration, the numbers are lower than the historical peaks, and as a result, they suggest what we are seeing at the border today is not a crisis. I fundamentally disagree. From the experience of our agents and officers on the ground, it is indeed both a border securityâand a humanitarianâcrisis. What many looking at total numbers fail to understand is the difference in what is happening now in terms of who is crossing, the risks that they are facing, and the consequences for our system. The difference McAleenan cited refers to the characteristics of apprehended migrants at the Southwest borderâtheir origin countries, demographic characteristics, and migratory motivationsâall of which have changed considerably during the past decade. In prior decades, unauthorized migrant flows involved predominantly adult male Mexicans, whose primary motivation was U.S. employment. If apprehended, they were typically processed through expedited removal and quickly repatriated. Relatively few migrants applied for humanitarian immigration relief such as asylum. Mexican migrants now make up a minority of total apprehensions. Sizable numbers of migrants from the \"Northern Triangle\"âthe Central American countries of El Salvador, Guatemala, and Hondurasânow make up the largest group. Smaller numbers of migrants are also arriving at the Southwest border from South America (e.g., Venezuela, Peru), the Caribbean (e.g., Cuba), Africa (e.g., Cameroon, Uganda), Central Asia (e.g., Uzbekistan), and South Asia (e.g., India, Bangladesh), among other regions. Instead of being dominated by adult males, migrant flows over the course of this decade have been increasingly characterized by migrants traveling as families (family units) and unaccompanied alien children (UAC). While a sizeable proportion of unauthorized migrants seek U.S. employment, a growing proportion of arriving migrants are seeking asylum and protection from violence. Studies of recent migration trends cite persistent poverty, inequality, demographic pressure related to high population growth, vulnerability to natural disasters, high crime rates, poor security conditions, and the lack of a strong state presence as factors that \"push\" migrants to make the risky and often dangerous journey from the Northern Triangle. \"Pull\" factors include the increasing use of U.S. asylum policy that, until recently, allowed most asylum seekers to remain in the United States while they awaited a decision on their cases. Lengthy court backlogs allow migrants admitted to the United States the opportunity to reunite with family members and acquire work authorization, typically six months after U.S. admission. Motivations for leaving Northern Triangle countries and choosing the United States are often a mixture of these push and pull factors, which can be interconnected, especially for families and unaccompanied children. Some observers argue that the recent migrant flows represent a failure of the rule of law. They question the legitimacy of asylum claims being made by recent unauthorized migrants and contend that many are abusing U.S. immigration laws bestowing humanitarian relief in order to gain entry into, or permission to remain in, the United States. Other observers characterize the recent migrant flows as a legitimate international humanitarian crisis resulting from violent and lawless circumstances in migrants' countries of origin. These observers contend that the \"crisis\" at the border reflects the inability of U.S. federal agencies to adequately process arriving migrants and adjudicate their claims for immigration relief. The changing character of the migrant flow has reportedly produced a number of logistical and resource challenges for federal agencies. These include a general capacity shortfall in CBP holding facilities, lack of appropriate facilities to detain families in ICE detention centers, reassignment of CBP personnel from port of entry duty to responding to migrants in processing facilities, and lengthy immigration court backlogs that delay expeditious proceedings. During migration peaks, these resource constraintsâcoupled with legal restrictions on the length of time that some migrants may be held âhave forced DHS to release migrants who have entered the United States unlawfully, particularly those in family units, rather than detaining or removing them. In response to the large increase in arrivals of migrants without proper entry documents, the Trump Administration has initiated changes to existing policy for apprehended migrants, largely designed to discourage these unauthorized migration flows. In January 2019, the Administration implemented the Migrant Protection Protocols (MPP), also known as the \"remain in Mexico\" immigration policy, which allow DHS to return applicants for admission to the United States to the contiguous country from which they arrived (on land) pending removal proceedings. The MPP sends migrants back to Mexico to await their court proceedings for the duration of their case. This program requires the coordination and assistance of the government of Mexico, a country facing its own high levels of unauthorized migration on its southern border. The program is currently operating in six border locations. Understanding changing migration patterns over the past decade may help inform Congress as it considers immigration-related legislation. This report discusses recent migrant apprehension trends at the Southwest border. It describes how unauthorized migration to the United States has changed in terms of the absolute numbers of migrants as well as their origin countries, demographic composition, and primary migratory motivations. The report concludes with a brief discussion of related policy implications. The Trump Administration's and Congress's responses to the changing characteristics of unauthorized migrants at the Southwest border occur within the context of border security debates. Border security has been an ongoing subject of congressional interest since the 1970s, when unauthorized immigration to the United States first registered as a serious national challenge, and it has received increased attention since the terrorist attacks of 2001. Current debates center on how best to secure the Southwest border, including how and where to place barriers and other tactical infrastructure to impede unauthorized migration as well as the deployment of U.S. Border Patrol agents to prevent unlawful entries of migrants and contraband. Securing the border while facilitating legitimate trade and travel to and from the United States is CBP's primary mission; major shifts in CBP activities can strain resources and disrupt operations. According to U.S. immigration law, foreign nationals who arrive in the United States without valid entry documentation may pursue asylum and related protections if they demonstrate a credible fear of persecution or torture in their country of origin. These migrants, along with others either apprehended or refused admission at a port of entry, appear in the statistics kept by CBP (see \"Interpreting Apprehensions Data\" below). While CBP's responsibilities include monitoring the Southwest and Northern land borders, as well as the Atlantic and Pacific coasts, the Southwest border with Mexico commands most of the agency's resources because of its attendant risks. The Southwest border runs for nearly 2,000 miles along the four Southwestern states of California, Arizona, New Mexico, and Texas. It is not only the locus of most unauthorized migration to the United States but also that of illicit drugs, counterfeit products, dangerous agricultural products, and trafficked children. Much of this activity occurs at U.S. ports of entry at the Southwest border, where CBP officers inspect all individuals and vehicles that seek to enter the United States. CBP's two components that monitor the Southwest border at and between ports of entryâthe U.S. Border Patrol (USBP) and the Office of Field Operations (OFO)âcollect statistics on individuals who have crossed the border illegally and those who are denied entry. Between ports of entry, USBP agents are responsible for apprehending individuals not lawfully present in the United States. OFO officers are responsible for inspections at U.S. ports of entry and collect data on noncitizens who are denied entry to the United States at ports of entry. Migrants typically are denied entry because they are not in possession of a valid entry document or are determined \"inadmissible\" on one of several grounds, such as having a criminal record, being a potential public safety threat, or being a public health threat. Inadmissible migrants made up 27%, 24%, and 13% of all migrants arriving at ports of entries along the Southwest border in FY2017, FY2018, and FY2019, respectively. While the number of inadmissible migrants grew slightly from FY2018 to FY2019, their percentage share of all CBP encounters diminished compared to apprehensions, as absolute numbers of apprehensions more than doubled during that period. ( Table 1 ). Both inadmissible and apprehended migrants can be placed in the MPP program. Apprehensions statistics historically have been used as a rough measure of trends in unauthorized migration flows. The utility of these statistics for measuring border enforcement effectiveness, on the other hand, has long been considered of limited usefulness because of the unknown relationship between apprehensions and successful unlawful entries, among other reasons. Apprehensions data, by definition, do not include illegal border crossers who evade USBP agents. They also do not account for the number of potential migrants who are discouraged from attempting U.S. entry because of enforcement measures. Consequently, it is generally unclear if an increase in apprehensions results from more attempts by migrants to enter the country illegally or from a higher apprehension rate of those attempting to enter the United States illegallyâor both. However, these statistics are arguably now less relevant than in previous years as a metric of border security efforts. In the past several years, an indeterminate but sizable share of migrants who cross between U.S. ports of entry have actively sought out U.S. Border Patrol agents in order to \"turn themselves in\" to request asylum. In prior years, such migrants typically would have attempted to evade USBP agents. As such, CBP's classification of these migrants as apprehensions may overstate the degree to which the agency's resources, personnel, and strategies prevent migrants from crossing the border illegally and entering the United States. The number of total apprehensions has long been used as a basic measure of migration pressure and border enforcement. Total annual apprehensions at the Southwest border averaged 687,639 during the 1970s; 999,476 during the 1980s; 1,266,556 during the 1990s; and 1,020,143 during the 2000s; but then declined to 427,766 during the 2010s. Annual apprehensions reached a 45-year low in FY2017 (303,916). In FY2018, total apprehensions increased to 396,579; and in FY2019, they more than doubled to 851,508, the highest level since FY2007 (see Figure 1 ). While high relative to annual apprehensions during the past decade, the FY2019 level is lower than annual apprehension levels for 25 of the past 45 years. Thus, recent changes in the character of the migrant flows during the past decade occurred within the context of historically low numbers of apprehensions since FY2000. Apprehensions at the Southwest border initially peaked at 1.62 million in 1986, the same year that Congress enacted the Immigration Reform and Control Act (IRCA), which gave lawful permanent resident status to roughly 2.7 million unauthorized aliens residing in the United States. After declining substantially for a few years, apprehensions rose again, climbing from 0.85 million in FY1989 to an all-time high of 1.64 million in FY2000. Apprehensions generally fell after that (with the exception of FY2004-FY2006), reaching a then-low point of 327,577 in FY2011. Since that year, apprehensions have fluctuated, as noted above. The national origins of apprehended migrants have shifted considerably during the past two decades (see Figure 2 ). In FY2000, for example, almost all of the 1.6 million aliens apprehended at the Southwest border (98%) were Mexican nationals, and relatively few requested asylum. As recently as FY2011, Mexican nationals made up 86% of all 327,577 Southwest border apprehensions in that year. That share has declined, however, and for most years after FY2013, Mexicans accounted for less than half of total apprehensions on the Southwest border. In FY2019, \"other-than-Mexicans\" comprised 81% of all 851,508 apprehensions. From FY2012 to FY2019, the number of Mexican nationals apprehended dropped by 37%, from 262,341 to 166,458, while the number of migrants apprehended from all other countries increased six-fold, from 94,532 to 685,050. CBP classifies apprehended unauthorized migrants into three demographic categories: single adults, family units (at least one parent/guardian and at least one child), and unaccompanied alien children (UAC). Of the three categories, apprehensions of persons in family units have increased the most in absolute terms since FY2012, the first year for which publicly available CBP data differentiated among the three demographic categories (see Figure 3 ). In FY2012, 321,276 single adults made up 90% of the 356,873 arriving migrants apprehended at the Southwest border, while members of family units numbered 11,116, and UAC accounted for 24,481. By FY2019, however, apprehensions of persons in family units numbered 473,682, more than all family unit apprehensions from FY2012 to FY2018 combined. Together in FY2019, those persons in family units as well as UAC (76,020 apprehensions) accounted for 65% of all apprehensions while the remaining 35% (301,806) were single adults, of whom 84% were men. Approximately 48% of family units apprehended in FY2019 were headed by mothers, 44% were headed by fathers, and about 8% were headed by two parents. As the number of apprehensions of individuals in family units has increased in recent years, their national origins have shifted from mostly Mexican, (comprising 80% of all 11,116 family unit apprehensions in FY2012), to mostly Salvadoran, Guatemalan, and Honduran, who together made up 91% of all 457,871 such apprehensions in FY2019 (see Figure 4 ). Apprehensions of individuals in family units from El Salvador increased from 636 (6%) of all such apprehensions in FY2012 to 27,114 (35%) of all 77,674 of such apprehensions in FY2016 before declining to 54,915 (12%) in FY2019. Over the same period, the share of family unit apprehensions from Honduras (513) and Guatemala (340) each grew from less than 5% of the total in FY2012 to 188,416 and 185,233, respectively, about 39% each of the total in FY2019. By comparison, the 6,004 apprehensions of Mexicans in family units made up 1% of the total in FY2019. Notably, the percentage of persons in family units from \"all other countries,\" has been relatively low over the same period. In absolute numbers, this category registered less than 4,000 apprehensions in all years prior to FY2019, but rose to 37,132 family unit apprehensions in FY2019 (7% of the total, the same share as in FY2012). Over the past decade, the number of unaccompanied alien children apprehended at the Southwest border has increased considerably (see Figure 5 ). From FY2011 to FY2014, UAC apprehensions increased each year, and more than quadrupled from 16,067 in FY2011 to 68,541 in FY2014. From FY2014 to FY2018, UAC apprehensions fluctuated, declining to 39,970 in FY2015; increasing to 59,692 in FY2016; declining again to 41,435 in FY2017; and increasing again to 50,036 in FY2018. In FY2019, UAC apprehensions reached 76,020, a level that exceeds the previous peak in FY2014. In FY2019, approximately 30% of apprehended UAC were girls. In the past decade, the country-of-origin composition of apprehended UAC, like that of family units, has shifted from mostly Mexican to mostly Salvadoran, Guatemalan, and Honduran. For example, in FY2009 Mexican UAC (16,114) made up 82% of all 19,668 UAC apprehensions in that year, while Salvadoran (1,221), Guatemalan (1,115), and Honduran (968) UAC made up 6%, 6%, and 5%, respectively, of the total. In contrast, by FY2019 Mexican UAC (10,487) made up 14% of all 76,020 UAC apprehensions in that year, while Salvadoran (12,021), Guatemalan (30,329), and Honduran (20,398) UAC made up 16%, 40%, and 27%, respectively, of the total. Current statute treats children from contiguous countries (Mexico and Canada) differently than children from non-contiguous countries. While UAC from Mexico can be repatriated promptly through a process known as voluntary departure , UAC from all other countries are placed in formal removal proceedings. The latter are then referred to the Department of Health and Human Services' (HHS') Office of Refugee Resettlement (ORR), where they are initially sheltered and subsequently placed with family members or sponsors while they await their immigration hearing. Hence, the shift in the country-of-origin composition of the apprehended UAC population has had considerable impact on agencies charged with the processing and care of these children. Over the past two decades, apprehensions have followed a pattern consistent with a seasonal migration cycle. In this cycle, peak numbers of apprehensions occur in the spring months (MarchâJune), followed by progressively lower numbers in the hotter summer months (JulyâSeptember), lower-than-average numbers through the fall months (OctoberâDecember), and even lower numbers in January, before rising again through the spring months when the pattern begins to repeat. During FY2019, the monthly pattern in total apprehensions at the Southwestern border was similar to the trends during the past two decades (see Figure 6 ). From the peak in May through September of FY2019, apprehensions declined nearly 70%, from approximately 133,000 to just over 40,000. These data suggest that the declines in monthly apprehensions from May to September of FY2019 stemmed primarily from declining numbers of family unit apprehensions. The number of persons in family units apprehended on a monthly basis dropped from 84,490 in May to 15,824 in September (an 81% decrease). For UAC, apprehensions declined by 72%, from 11,475 in May to 3,165 in September. Apprehensions of single adults saw a smaller decline (42%) over this period, from 36,894 in May to 21,518 in September. These patterns suggest that declining apprehensions in recent months may have resulted not only from the immigration enforcement policies of the Trump Administration but also from decades-long seasonal migration patterns, among other factors. This report has described the following major shifts in the composition and character of migrant flows to the Southwest border that have unfolded in less than a decade: In the past two years, the number of total apprehensions has increased substantially, a reverse of the general trend of declining and relatively low apprehension levels seen since FY2001. The unauthorized migrant flow apprehended at the Southwest border no longer consists primarily of individuals from Mexico, a country with whom the United States shares a border and close economic and historical ties. It now originates largely from El Salvador, Guatemala, and Honduras. Also, growing numbers of unauthorized migrants are originating from Africa, Asia, and the Caribbean. The unauthorized migrant flow is no longer dominated by economic migrants exclusively seeking employment. It is now driven to a larger extent than in past years by asylum seekers and others with similar motivations, such as escaping violence and domestic insecurity, who may also be interested in working in the United States. Such migrants often seek out U.S. Border Patrol agents at the border when crossing illegally between U.S. ports of entry rather than attempting to elude them. The unauthorized migrant flow no longer consists primarily of single adult migrants but rather of families and children traveling without their parents. Although not previously discussed, changing migration strategies are also altering how federal agencies respond to migrant flows. For example, migrants have been increasingly traveling in large groups, reportedly to protect themselves from harm. In addition, more migrants are arriving at remote CBP outposts along the Southwest border, sometimes overwhelming the relatively few CBP personnel who staff them. These changing patterns at the Southwest border have considerable policy implications. In comparison with apprehended single adult economic migrants from Mexico, more-recently apprehended migrants require lengthier processing and create a call for greater resources and personnel of more federal agencies. When migrants originate from countries other than the contiguous countries of Mexico and Canada, their removals involve longer processing time, higher transportation costs, and more involved inter-agency coordination. If arriving migrants are unaccompanied alien children from noncontiguous countries, they are protected from immediate removal by statutes that require them to be put into formal immigration removal proceedings and they are referred to the care and custody of ORR. If migrants seek asylum, they generally require a credible fear hearing. They may be detained in DHS facilities for varying periods and must be processed by DOJ's Executive Office for Immigration Review (EOIR). CBP, among all federal agencies, is arguably the most affected by the break with historical migration patterns. The pressures of large groups of migrants arriving together and the greater vulnerabilities of new arrivals are reportedly testing CBP's border infrastructure, agency personnel, and long-standing policies. When unauthorized migrant flows consist largely of families and children, who often arrive in large groups or at remote U.S. border locations, CBP has adjusted its operations and allocated resources and personnel to accommodate more vulnerable migrants. Some studies also suggest that smuggling guides sometimes direct migrants to cross in specific locations to outmaneuver USBP agents and infrastructure and avoid detection. Moreover, anecdotal evidence suggests migrant arrival strategies can be based upon perceptions of differences in border enforcement policies and practices among and within the nine CBP Southwest border sectors. If enforcement policies vary by sector, CBP can expect migration patterns to shift to sectors that migrants perceive as offering them the greatest chance of acquiring the immigration relief they seek. The Trump Administration has changed immigration enforcement policies and practices at the border in an attempt to reduce unauthorized migration and discourage fraudulent or frivolous claims for humanitarian immigration relief. President Trump, DHS, DOD, and DOJ have acted together with a series of policy changes that make it more difficult for migrants to be awarded asylum. For example, see the following: In November 2018, the President issued a proclamation to suspend immediately the entry into the United States of aliens who cross the Southwest border between ports of entry. This proclamation has been challenged in court and a preliminary injunction was issued by a federal district court. As noted above, DHS implemented the Migrant Protection Protocols (MPP) in January 2019, and for the past several years CBP has also used the practice of \"metering\" migrants. Both of these policies require migrants to wait on the Mexican side of the border. Since April 2018, National Guard personnel have supported DHS at the border, while active duty personnel began providing support in October 2018. In February 2019, President Trump proclaimed a national emergency pursuant to the National Emergencies Act in order to fund a physical barrier at the Southwest border with Mexico using $6.1 billion in funds from the Department of Defense (DOD). In September 2019, the Secretary of Defense deferred funding for military construction projects in order to redirect funds to border barrier projects using his authority under the emergency statute 10 U.S.C., Section 2808. In July 2019, DHS and DOJ jointly issued an interim final rule (IFR) that makes aliens ineligible for asylum in the United States if they arrive at the Southwest border without first seeking protection from persecution in other countries through which they transit. In addition, the United States is working with Mexico to decrease Central American migrant flows and with Central American governments to promote economic prosperity, improve security, and strengthen regional governance. The changing character of recent migrant flows at the Southwest border also may suggest that apprehensions may be less useful than in the past for measuring border enforcement. Because many apprehended migrants now actively seek out U.S. Border Patrol agents in order to request asylum, increases or decreases in apprehension numbers may not reflect the effectiveness of border enforcement strategies. Rather, an increase in apprehensions combined with the changing characteristics of recently apprehended migrants may increasingly portend greater resource needs for federal agencies because the administrative requirements for asylum claims are more resource-intensive than those for unauthorized migrants who do not request asylum and are quickly repatriated through expedited removal. The challenge of deterring unauthorized migrants from entering the United States has been complicated and overshadowed by the challenge of processing, in a fair and timely manner, relatively greater numbers of migrants seeking asylum. Recent migration research suggests that forced migration from civil conflict, violence, weather events, and climate change is playing a more prominent role in worldwide migratory patterns. To some extent, patterns described in this report are consistent with that trend. Declining birth rates in parts of Latin America and improving employment prospects in Mexico over the past decade have reduced the relative proportion of single adult migrants whose primary motivation is U.S. employment. In contrast, relatively high levels of violence and lack of public security, among other factors, have increased the relative proportion of Central American and Mexican families and children whose primary migratory motivation is humanitarian relief. Options for Congress could include legislative responses to the series of policies that the Administration has developed to address the changing flow of migrants at the Southwest border. Some proposals may consider changes to the appropriations of agencies charged with processing unauthorized migrants to reshape the system from one that was designed to apprehend and return single unauthorized adults from Mexico with no claims for protection, to one that can more quickly adjudicate those seeking humanitarian protection. Other options may include greater supervision of unauthorized migrants who are released into the United States, and mandating the collection and publication of more-detailed and timely data from DHS to more completely assess the flow of unauthorized migrants, including those in the MPP program, and their impact on border enforcement and the immigration court system.", "summary": "Unauthorized migration across the U.S. Southwest border poses considerable challenges to federal agencies that apprehend and process unauthorized migrants (aliens) due to changing characteristics and motivations of migrants in the past few years. Unauthorized migration flows are reflected by the number of migrants apprehended by the Department of Homeland Security's (DHS's) Customs and Border Protection (CBP). In FY2000, total annual apprehensions at the border were at an all-time high of 1.64 million, before gradually declining to 303,916 in FY2017, a 45-year low. Apprehensions then increased to 396,579 in FY2018 and 851,508 in FY2019, the highest level since FY2007. More notably, the character of unauthorized migrants has changed during the past decade. Historically, unauthorized migrant flows involved predominantly single adult Mexicans, traveling without families, whose primary motivation was U.S. employment. As recently as FY2011, Mexican nationals made up 86% of all apprehensions, and relatively few requested asylum. In FY2019, however, \"Northern Triangle\" migrants from El Salvador, Guatemala, and Honduras comprised 81% of all apprehensions that year. Economic migrants exclusively seeking employment no longer dominate the unauthorized migrant flow, which is now driven to a greater extent by asylum seekers and those escaping violence and domestic insecurity, or those with motivations involving a mixture of protection and economic opportunity. CBP classifies apprehended unauthorized migrants into single adults, family units (at least one parent/guardian and at least one child), and unaccompanied alien children (UAC). In 2012, single adults made up 90% of apprehended migrants at the Southwest border. In FY2019, however, persons in family units and UAC together accounted for 65% of all apprehended migrants that year. In FY2019, CBP apprehended a record 473,682 persons in family units, exceeding all apprehensions of family unit members from FY2012-FY2018 combined. Mothers headed almost half of all family units apprehended in FY2019. In addition, apprehended persons in family units shifted from mostly Mexican nationals (80%) in FY2012 to mostly Salvadoran, Guatemalan, and Honduran nationals (91%) in FY2019. Similar changes occurred in the origin countries of unaccompanied alien children, whose total apprehensions also reached a record (76,020) in FY2019. The changing character of the migrant flow has led to logistical and resource challenges for federal agencies, particularly CBP. These include a general capacity shortfall in CBP holding facilities, the lack of appropriate facilities to detain families in Immigration Customs and Enforcement (ICE) detention centers, the reassignment of some CBP personnel who monitor the border to process and respond to migrants in holding facilities, and rapidly expanding immigration court backlogs that delay expeditious proceedings. The changing underlying motivations and border migration strategies of recent migrants also makes apprehension data less useful than in the past for measuring border enforcement. Because many unauthorized migrants now actively seek out U.S. Border Patrol agents in order to request asylum, increases or decreases in apprehension numbers may not reflect the effectiveness of border enforcement strategies. In response, the Trump Administration has changed existing policies for apprehended migrants, including implementing the Migrant Protection Protocols (MPP), also known as the \"remain in Mexico\" immigration policy, which allow DHS to return migrants seeking U.S. admission to the contiguous country from which they arrived on land, pending removal proceedings. Options for Congress could include legislative responses to the series of policies that the Administration has developed to address the changing flow of migrants at the Southwest border. Some proposals may consider changes to the appropriations of agencies charged with processing unauthorized migrants to reshape the system from one that was designed to apprehend and return single unauthorized adults from Mexico with no claims for protection, to one that can more quickly adjudicate those seeking humanitarian protection. Other options may include greater supervision of unauthorized migrants who are released into the United States, and mandating the collection and publication of more-detailed and timely data from CBP to more completely assess the flow of unauthorized migrants, including those in the MPP program, and their impact on border enforcement and the immigration court system.", "document_type": "crs"}
{"report": "With 33 countriesâranging from the Caribbean nation of St. Kitts and Nevis, one of the world's smallest states, to the South American giant of Brazil, the world's fifth-largest countryâthe Latin American and Caribbean region has made significant advances over the past four decades in terms of both political and economic development. (See Figure 1 and Table 2 for a map and basic facts on the region's countries.) Significant challenges remain, however, and some countries have experienced setbacks, most prominently Venezuela (which has descended into dictatorship). In the early 1980s, authoritarian regimes governed 16 Latin American and Caribbean countries, both on the left and the right. Today, three countries in the regionâCuba, Nicaragua, and Venezuelaâare ruled by authoritarian governments. Most governments in the region today are elected democracies. Although free and fair elections have become the norm, recent elections in several countries have been controversial and contested. In 2019, Argentina, Dominica, El Salvador, Panama, and Uruguay held successful free and fair elections. Guatemala held two presidential election rounds in June and August 2019 that international observers judged to be successful, but the elections suffered because several popular candidates were disqualified from the race on dubious grounds. In Bolivia, severe irregularities in the conduct of the country's October 2019 presidential elections ignited protests and violence that led to the resignation of incumbent President Evo Morales, who was seeking a fourth term; new elections under an interim president are now scheduled for May 2020. Most recently, Guyana held elections on March 2, 2020, which were marred by allegations of fraud; final results are on hold pending court action regarding the final verification of some votes. Six other Caribbean countries are scheduled to hold elections in 2020 (see text box \" 2020 Elections \"). Despite significant improvements in political rights and civil liberties since the 1980s, many countries in the region still face considerable challenges. In a number of countries, weaknesses remain in the state's ability to deliver public services, ensure accountability and transparency, advance the rule of law, and ensure citizen safety and security. There are numerous examples of elected presidents who have left office early amid severe social turmoil and economic crises, the presidents' own autocratic actions contributing to their ouster, or high-profile corruption. In addition to Morales's resignation in 2019, corruption scandals either caused or contributed to several presidents' resignations or removals of several presidentâGuatemala in 2015, Brazil in 2016, and Peru in 2018. Although the threat of direct military rule has dissipated, civilian governments in several countries have turned to their militaries or retired officers for support or during crises, raising concerns among some observers. Most recently, in El Salvador on February 9, 2020, President Nayib Bukele used the military in an effort to intimidate the country's legislature into approving an anti-crime bill; the action elicited strong criticism in El Salvador and abroad, with concerns centered on the politicization of the military and the separation of powers. The quality of democracy has eroded in several countries over the past several years. The Economist Intelligence Unit's (EIU's) 2019 democracy index shows a steady regional decline in democratic practices in Latin America since 2017. Several years ago only Cuba was viewed as an authoritarian regime, but Venezuela joined its ranks in 2017 as President NicolÃ¡s Maduro's government violently repressed the political opposition. Nicaragua turned to authoritarian practices in 2018 under long-time President Daniel Ortega, as the government violently repressed protests. The continued regional downward trend in 2019 stemmed from Bolivia's post-election crisis and to a lesser extent by setbacks in the following other countries: Guatemala, where the government ousted the anti-corruption body known as the International Commission against Impunity in Guatemala; Haiti, which experienced widespread anti-government protests against corruption and deteriorating economic conditions; and Guyana, with the delay of elections following a no-confidence vote by the legislature. Public satisfaction with how democracy is operating has declined along with the quality of democracy in the region. According to the 2018/2019 AmericasBarometer public opinion survey, the percentage of individuals satisfied with how democracy was working in their countries averaged 39.6% among 18 countries in the region, the lowest level of satisfaction since the poll began in 2004. Given these trends, the eruption of social protests in many countries around the region in 2019 is unsurprising, but in each country a unique set of circumstances has sparked the protests. In addition to the protests in Bolivia and Haiti cited above, protests broke out in Ecuador over fuel price increases, in Chile over pent-up frustration over social inequities, and in Colombia over opposition to a range of government policies and proposals, from tax reform to education to peace accord implementation. Although each country is unique, several broad political and economic factors appear to be driving the decline in satisfaction with democracy in the region. Political factors include an increase in authoritarian practices, weak democratic institutions and politicized judicial systems, corruption, high levels of crime and violence, and organized crime that can infiltrate or influence state institutions. Economic factors include declining or stagnant regional economic growth rates over the past several years, high levels of income inequality in many Latin American countries, increased poverty, and the inadequacy of social safety net programs or advancement opportunities, along with increased pressure on the region's previously expanding middle class. Beginning around 2015, the global decline in commodity prices significantly affected the region, as did China's economic slowdown and its reduced appetite for imports from the region in 2015 and 2016 (see Table 1 ). According to the International Monetary Fund (IMF), the region experienced an economic contraction of 0.6% in 2016, dragged down by recessions in Argentina and Brazil, as well as by Venezuela's severe economic deterioration as oil prices fell. Since then, the region has registered only marginal growth rates, including an estimated growth rate of 0.2% in 2019. Regional growth in 2019 was suppressed by the collapse of much of the Venezuelan economy, which contracted 35%, and by continued recession in Argentina, which suffered an economic contraction of 3.1%. The current IMF 2020 outlook is for regional growth to reach 1.6%, led by recovery in Brazil and spurred by growth forecasts of 3% or higher for Chile, Colombia, and Peru. The economic fallout from the current coronavirus disease (COVID-19) outbreak, which already is having repercussions around the world, could jeopardize this forecast. Even before the onset of the coronavirus, recession was forecasted to continue in several countries, including Argentina and Venezuela, with contractions of 1.3% and 10% respectively. The risk of social unrest similar to that experienced in 2019 could also constrain growth in some countries. Despite some easing of income inequality in the region from 2002 to 2014, reductions in income inequality have slowed since 2015; Latin America remains the most unequal region in the world in terms of income inequality, according to the United Nations (U.N.) Economic Commission for Latin America and the Caribbean. The level of poverty in the region also has increased over the past five years. In 2014, 27.8% of the region's population lived in poverty; that figure increased to 30.8% by 2019. U.S. interests in Latin America and the Caribbean are diverse and include economic, political, security, and humanitarian concerns. Geographic proximity has ensured strong economic linkages between the United States and the region, with the United States being a major trading partner and source of foreign investment for many Latin American and Caribbean countries. Free-trade agreements (FTAs) have augmented U.S. economic relations with 11 countries in the region. The Western Hemisphere is a large source of U.S. immigration, both legal and illegal; geographic proximity and economic and security conditions are major factors driving migration trends. Curbing the flow of illicit drugs from Latin America and the Caribbean has been a key component of U.S. relations with the region and a major interest of Congress for more than four decades. The flow of illicit drugs, including heroin, methamphetamine, and fentanyl from Mexico and cocaine from Colombia, poses risks to U.S. public health and safety; and the trafficking of such drugs has contributed to violent crime and gang activities in the United States. Since 2000, Colombia has received U.S. counternarcotics support through Plan Colombia and its successor programs. In addition, for over a decade, the United States sought to forge close partnerships with other countries to combat drug trafficking and related violence and advance citizen security. These efforts include the MÃ©rida Initiative begun in 2007 to support Mexico, the Central America Regional Security Initiative (CARSI) begun in 2008, and the Caribbean Basin Security Initiative (CBSI) begun in 2009. Another long-standing component of U.S. policy has been support for strengthened democratic governance and the rule of law. As described in the previous section, although many countries in the region have made enormous strides in terms of democratic political development, several face considerable challenges. U.S. policy efforts have long supported democracy promotion efforts, including support for strengthening civil society and promoting the rule of law and human rights. In its policy toward Latin America and the Caribbean, the Trump Administration has retained many of the same priorities and programs of past Administrations, but it has also diverged considerably. The Administration has generally adopted a more confrontational approach, especially regarding efforts to curb irregular immigration from the region. In 2018, the State Department set forth a framework for U.S. policy toward the region focused on three pillars for engagement: (1) economic growth and prosperity, (2) security, and (3) democratic governance. The framework reflects continuity with long-standing U.S. policy priorities for the region but at times appears to be at odds with the Administration's actions, which sometimes have been accompanied by antagonistic statements on immigration, trade, and foreign aid. Meanwhile, according to Gallup and Pew Research Center polls, negative views of U.S. leadership in the region have increased markedly during the Trump Administration (see text box \" Latin America and the Caribbean: Views of U.S. Leadership \"). Foreign Aid. The Administration's proposed foreign aid budgets for FY2018 and FY2019 would have cut assistance to the region by more than a third, and the FY2020 budget request would have cut funding to the region by about 30% compared to that appropriated in FY2019. Congress did not implement those budget requests and instead provided significantly more for assistance to the region in appropriations measures. In 2019, however, the Trump Administration withheld some assistance to Central America to compel its governments to curb the flow of migrants to the United States. (See \" U.S. Foreign Aid \" section.) Trade. In 2017, President Trump ordered U.S. withdrawal from the proposed Trans-Pacific Partnership (TPP) FTA that had been negotiated by 12 Asia-Pacific countries in 2015. The TPP would have increased U.S. economic linkages with Latin American countries that were parties to the agreementâChile, Mexico, and Peru. President Trump strongly criticized the North American Free Trade Agreement (NAFTA) with Mexico and Canada, repeatedly warned that the United States might withdraw from the agreement, and initiated renegotiations in 2017. The three countries agreed in September 2018 to a new United States-Mexico-Canada Agreement (USMCA), which retained many NAFTA provisions but also included some modernizing updates and changes, such as provisions on digital trade and the dairy and auto industries. (See \" Trade Policy \" section.) Mexico , Central America, and Migration Issues . Relations with Mexico have been tested by inflammatory anti-immigrant rhetoric, immigration actions, and changes in U.S. border and asylum polices that have shifted the burden of interdicting migrants and offering asylum to Mexico. In September 2017, the Administration announced that it would end the Deferred Action for Childhood Arrivals (DACA) program; begun in 2012 by the Obama Administration, the program provides relief from deportation for several hundred thousand immigrants who arrived in the United States as children. The future of the initiative remains uncertain given challenges in federal court. In December 2018, Mexico's president agreed to allow the United States to return certain non-Mexican migrants to Mexico (pursuant to Migrant Protection Protocols or MPP) while awaiting U.S. immigration court decisions. In May 2019, President Trump threatened to impose new tariffs on motor vehicles from Mexico if the government did not increase actions to deter U.S.-bound migrants from Central America; Mexico ultimately agreed in June 2019 to increase its enforcement actions and to allow more U.S.-bound asylum seekers to await their U.S. immigration proceedings in Mexico. Despite tensions, U.S.-Mexico bilateral relations remain friendly, with continued strong energy and economic ties, including the USMCA, and close security cooperation related to drug interdiction. (See \" Mexico \" section.) Other Administration actions on immigration have caused concern in the region. In 2017 and 2018, the Administration announced plans to terminate Temporary Protected Status (TPS) designations for Nicaragua, Haiti, El Salvador, and Honduras, but federal court challenges have put the terminations on hold. (See \" Migration Issues \" section.) Unauthorized migration from Central America's Northern Triangle countriesâEl Salvador, Guatemala, and Hondurasâhas increased in recent years, fueled by difficult socioeconomic and security conditions and poor governance. To deter such migration, the Trump Administration implemented a \"zero tolerance\" policy toward illegal border crossings in 2018 and applied restrictions on access to asylum at the U.S. border. The Administration also has used aid cuts of previously appropriated assistance for FY2017 and FY2018 and threats of increased U.S. tariffs and taxes on remittances to compel Central American countries and Mexico to curb unauthorized migration to the United States. In 2019, the Administration negotiated \"safe third country\" agreements with each of the Northern Triangle countries to permit the United States to transfer asylum applicants from third countries to the Northern Triangle countries. (See \" Central America's Northern Triangle \" section.) Venezuela , Cuba , and Nicaragua . In November 2018, then-National Security Adviser John Bolton made a speech in Miami, FL, on the Administration's policies in Latin America that warned about \"the destructive forces of oppression, socialism, and totalitarianism\" in the region. Reminiscent of Cold War political rhetoric, Bolton referred to Cuba, Nicaragua, and Venezuela as the \"troika of tyranny\" in the hemisphere that has \"finally met its match.\" He referred to the three countries as \"the cause of immense human suffering, the impetus of enormous regional instability, and the genesis of a sordid cradle of communism in the Western Hemisphere.\" As the situation in Venezuela has deteriorated under the Maduro government, the Trump Administration has imposed targeted and broader financial sanctions, including sanctions against the state oil company, the country's main source of income. In January 2019, the Administration recognized the head of Venezuela's National Assembly, Juan GuaidÃ³, as interim president. In September 2019, the United States joined 11 other Western Hemisphere countries to invoke the Rio Treaty to facilitate a regional response to the Venezuelan crisis. The Administration also is providing humanitarian and development assistance for Venezuelans who have fled to other countries, especially Colombia, as well as for Venezuelans inside Venezuela. (See \" Venezuela \" section.) With regard to Cuba, the Trump Administration has not continued the policy of engagement advanced during the Obama Administration and has imposed a series of economic sanctions on Cuba for its poor human rights record and support for the Maduro government. Economic sanctions have included restrictions on travel and remittances, efforts to disrupt oil flows from Venezuela, and authorization (pursuant to Title III of the LIBERTAD Act, P.L. 104-114 ) of the right to file lawsuits against those trafficking in confiscated property in Cuba. In 2017, the State Department cut the staff of the U.S. Embassy in Havana by about two-thirds in response to unexplained injuries of U.S. diplomatic staff. (See \" Cuba \" section.) Since political unrest began to grow in Nicaragua in 2018, the Trump Administration has employed targeted sanctions against several individuals close to President Ortega due to their alleged ties to human rights abuses or significant corruption. (See \" Nicaragua \" section.) Congress traditionally has played an active role in policy toward Latin America and the Caribbean in terms of both legislation and oversight. Given the region's geographic proximity to the United States, U.S. foreign policy toward the region and domestic policy often overlap, particularly in areas of immigration and trade. The 116 th Congress completed action on FY2019 foreign aid appropriations in February 2019 when it enacted the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ). Amounts appropriated for key U.S. initiatives and countries in Latin America and the Caribbean exceeded the Administration's request by almost $600 million. Congress completed action on FY2020 foreign aid appropriations in December 2019 when it enacted the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), with amounts for key countries and regional programs once again significantly exceeding the Administration's request. Congress recently has begun consideration of the Administration's FY2021 foreign aid request. In January 2020, Congress completed action on implementing legislation for the USMCA ( P.L. 116-113 ). The agreement retains many of NAFTA's provisions and includes new provisions on the auto and dairy industries and some modernizing features. Before U.S. implementing legislation received final congressional approval in January 2020, the trade agreement was amended to address concerns of Congress regarding provisions related to labor (including enforcement), the environment, dispute settlement procedures, and intellectual property rights (IPR). On Venezuela, Congress has supported the Administration's efforts to sanction the Maduro government for its antidemocratic actions and to provide humanitarian assistance to Venezuelan migrants throughout the region. In December 2019, Congress enacted the Venezuela Emergency Relief, Democracy Assistance, and Development Act of 2019, or the VERDAD Act of 2019, in Division J of P.L. 116-94 . The measure incorporates provisions from S. 1025 , as reported by the Senate Foreign Relations Committee in June 2019, and some language or provisions from three bills on Venezuela passed by the House in March 2019: H.R. 854 , to authorize humanitarian assistance to the Venezuelan people; H.R. 920 , to restrict the export of defense articles and crime control materials; and H.R. 1477 , to require a threat assessment and strategy to counter Russian influence in Venezuela. In other legislative action, the House approved H.R. 549 in July 2019, which would provide TPS to Venezuelans in the United States. Congress included several provisions related to Latin America in the National Defense Authorization Act for Fiscal Year 2020 (FY2020 NDAA; P.L. 116-92 ), signed into law in December 2019. Among the provisions are the following: Venezuela. Section 890 prohibits the Department of Defense (DOD) from entering into a contract for the procurement of goods or services with any person that has business operations with the Maduro regime in Venezuela. Western Hemisphere Resources. Section 1265 provides that the Secretary of Defense shall seek to enter into a contract with an independent nongovernmental institute that has recognized credentials and expertise in national security and military affairs to conduct an accounting and an assessment of the sufficiency of resources available to the U.S. Southern Command, the U.S. Northern Command, the Department of State, and the U.S. Agency for International Development (USAID) to carry out their respective missions in the Western Hemisphere. Among other matters, the assessment is required to include \"a list of investments, programs, or partnerships in the Western Hemisphere by China, Iran, Russia, or other adversarial groups or countries that threaten the national security of the United States.\" A report on the assessment is due to Congress within one year, in unclassified form, but may include a classified annex. Brazil. Section 1266 requires the Secretary of Defense, in coordination with the Secretary of State, to submit a report to Congress regarding the human rights climate in Brazil and U.S.-Brazilian security cooperation. Guatemala. Section 1267 requires the Secretary of Defense to certify, prior to the transfer of any vehicles to the Guatemalan government, that the government has made a credible commitment to use such equipment only as intended. Honduras. Section 1268 requires the Secretary of Defense to enter into an agreement with an independent institution to conduct an analysis of the human rights situation in Honduras. Central America and Mexico. Section 5522 requires the Director of National Intelligence, in collaboration with other agencies, to submit within 90 days a comprehensive assessment of drug trafficking, human trafficking, and human smuggling activities in Central America and Mexico; the report may be in classified form, but if so, it shall contain an unclassified summary. Other bills and resolutions have passed either or both houses: Mexico. In January 2019, the House approved H.R. 133 , which would promote U.S.-Mexican economic partnership and cooperation, including a strategy to prioritize and expand educational and professional exchange programs with Mexico. The Senate approved the bill, amended, in January 2020, which included a new provision that would promote positive cross-border relations as a priority for advancing U.S. foreign policy and programs. Central America. The House approved H.R. 2615 , the United States-Northern Triangle Engagement Act, in July 2019, which would authorize foreign assistance to El Salvador, Guatemala, and Honduras to address the root causes of migration. The bill would also require the State Department to devise strategies to foster economic development, combat corruption, strengthen democracy and the rule of law, and improve security conditions in the region. Bolivia. The Senate approved S.Res. 35 in April 2019, expressing support for democratic principles in Bolivia and throughout Latin America. In January 2020, the Senate approved S.Res. 447 , expressing concerns about election irregularities and violence in Bolivia and supporting the convening of new elections. Argentina. Both houses approved resolutions, H.Res. 441 in July 2019 and S.Res. 277 in October 2019, commemorating the 25 th anniversary of the 1994 bombing of the Argentine-Israeli Mutual Association in Buenos Aires. Congressional committees have held almost 20 oversight hearings on the region, including on Venezuela, Central America (including the impact of U.S. aid cuts), relations with Colombia, human rights in Cuba, China's engagement in Latin America, environmental concerns in the Brazilian Amazon, repression in Nicaragua, and security cooperation with Mexico (see Appendix ). The United States provides foreign assistance to Latin American and Caribbean nations to support development and other U.S. objectives. U.S. policymakers have emphasized different strategic interests in the region at different times, from combating Soviet influence during the Cold War to promoting democracy and open markets, as well as countering illicit narcotics, since the 1990s. Over the past three years, the Trump Administration has sought to refocus U.S. assistance efforts in the region to address U.S. domestic concerns, such as irregular migration and transnational crime. The Trump Administration has also sought to cut U.S. assistance to Latin America and the Caribbean. In 2019, for example, the Administration withheld an estimated $405 million that Congress had appropriated for Central America in FY2018 and reprogrammed the funds to address other foreign policy priorities inside and outside the Western Hemisphere. (See \" Central America's Northern Triangle ,\" below.) The Administration has proposed additional foreign assistance cuts in each of its annual budget proposals. For FY2020, the Administration requested approximately $1.2 billion to be provided to the region through foreign assistance accounts managed by the State Department and USAID, which is about $503 million (30%) less than the region received in FY2019 (see Table 3 ). The request would have cut funding for nearly every type of assistance provided to the region and would have reduced aid for most Latin American and Caribbean countries. The Administration's FY2020 budget proposal also would have eliminated the Inter-American Foundation, an independent U.S. foreign assistance agency that promotes grassroots development in the region. For FY2021, the Administration requested $1.4 billion for the region, which is about 18% less than Congress appropriated for FY2019, and again proposed eliminating the Inter-American Foundation. Congressional Action: After a partial government shutdown and a short-term continuing resolution ( P.L. 116-5 ), the 116 th Congress completed action on FY2019 foreign aid appropriations in February 2019. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) included an estimated $1.69 billion of foreign assistance for Latin America and the Caribbean. That amount was slightly more than the $1.67 billion appropriated for the region in FY2018 and nearly $600 million more than the Trump Administration requested for the region. Although the House passed an FY2020 foreign aid appropriations bill in June 2019 ( H.R. 2740 , H.Rept. 116-78 ), and the Senate Appropriations Committee reported its bill in September 2019 ( S. 2583 , S.Rept. 116-126 ), neither measure was enacted before the start of FY2020. Instead, Congress passed two continuing resolutions ( P.L. 116-59 and P.L. 116-69 ), which funded foreign aid programs in Latin America and the Caribbean at the FY2019 level between October 1, 2019, and December 20, 2019, when President Trump signed into law the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The act and the accompanying explanatory statement do not specify appropriations levels for every Latin American and Caribbean nation. Nevertheless, the amounts designated for key U.S. initiatives in Central America, Colombia, and Mexico significantly exceed the Administration's request. The act provides \"not less than\" $519.9 million to continue implementation of the U.S. Strategy for Engagement in Central America, which is about $75 million more than the Administration requested but $8 million less than Congress appropriated for the initiative in FY2019. \"not less than\" $448.3 million to support the peace process and security and development efforts in Colombia, which is about $104 million more than the Administration requested and $27 million more than Congress appropriated for Colombia in FY2019. $157.9 million to support security and rule-of-law efforts in Mexico, which is $79 million more than the Administration requested but about $5 million less than Congress appropriated for Mexico in FY2019. The act also provides $37.5 million for the Inter-American Foundation to continue its grassroots development programs throughout the region. Resolutions have been introduced in both houses (H.Res. 649 and S.Res. 297 ) to commend the Inter-American Foundation on its 50 th anniversary, recognize its contributions to development and to advancing U.S. national interests, and pledge continued support for the agency's work. For additional information, see CRS Report R45547, U.S. Foreign Assistance to Latin America and the Caribbean: FY2019 Appropriations , by Peter J. Meyer and Edward Y. Gracia. Latin America and the Caribbean feature prominently in U.S. counternarcotics policy due to the region's role as a source and transit zone for several illicit drugs destined for U.S. marketsâcocaine, marijuana, methamphetamine, and opiates (plant-based and synthetic). Heroin abuse and synthetic opioid-related deaths in the United States have reached epidemic levels, raising questions about how to address foreign sources of opioidsâparticularly Mexico, which has experienced an uptick in opium poppy cultivation and the production of heroin and fentanyl (a synthetic opioid). According to the State Department, over 90% of heroin seized and sampled in the United States comes from Mexico and increasingly has included fentanyl. Policymakers also are concerned that methamphetamine and cocaine overdoses in the United States are on an upward trajectory. Rising cocaine usage occurred as coca cultivation and cocaine production in Colombia, which supplies roughly 89% of cocaine in the United States, reached record levels in 2017 before leveling off in 2018. Whereas Mexico, Colombia, Peru, and most other source and transit countries in the region work closely with the United States to combat drug production and interdict illicit flows, the Venezuelan government does not. Public corruption in Venezuela also has made it easier for drug trafficking organizations to smuggle illicit drugs. Contemporary drug trafficking and transnational crime syndicates have contributed to degradations in citizen security and economic development in some countries, often resulting in high levels of violence and homicide. Despite efforts to combat the drug trade, many Latin American governments, particularly in Mexico and Central Americaâa region through which roughly 93% of cocaine from South America transited in 2018âcontinue to suffer from weak criminal justice systems and overwhelmed law enforcement agencies. Government corruption, including high-level cooperation with criminal organizations, further frustrates efforts to interdict drugs, investigate and prosecute traffickers, and recover illicit proceeds. At the same time, a widespread perceptionâparticularly among Latin American observersâis that U.S. demand for illicit drugs is largely to blame for the region's ongoing crime and violence problems. Criminal gangs with origins in southern California, principally the Mara Salvatrucha (MS-13) and the \"18 th Street\" gang, continue to undermine citizen security and subvert government authority in Central America. Gang-related violence has been particularly acute in El Salvador, Honduras, and urban areas in Guatemala, contributing to some of the highest homicide rates in the world. Although some gangs engage in local drug distribution, gangs generally do not have a role in transnational drug trafficking. Gangs have been involved in a range of other criminal activities, including extortion, money laundering, and weapons smuggling, and gang-related violence has fueled unauthorized migration to the United States. U.S. Policy. For more than 40 years, U.S. policy toward the region has focused on countering drug trafficking and reducing drug production in Latin America and the Caribbean. The largest support program, Plan Colombia, provided more than $10 billion to help Colombia combat both drug trafficking and rebel groups financed by the drug trade from FY2000 to FY2016. After Colombia signed a historic peace accord with the country's largest leftist guerrilla group, the Revolutionary Armed Forces of Colombia (FARC), the United States provided assistance to help implement the agreement. U.S. officials concerned about rising cocaine production have praised Colombian President Ivan Duque's willingness to restart aerial fumigation of coca crops and significantly scale up manual eradication. U.S. support to combat drug trafficking and reduce crime also has included a series of partnerships with other countries in the region: the MÃ©rida Initiative, which has led to improved bilateral security cooperation with Mexico; the Central America Regional Security Initiative (CARSI); and the Caribbean Basin Security Initiative (CBSI). During the Obama Administration, those initiatives combined U.S. antidrug and rule-of-law assistance with economic development and violence prevention programs intended to improve citizen security in the region. The Trump Administration's approach to Latin America and the Caribbean has focused heavily on U.S. security objectives. All of the aforementioned assistance programs have continued, but they place greater emphasis on combating drug trafficking, gangs, and other criminal groups than during the Obama Administration. The Trump Administration also has sought to reduce funding for each of the U.S. security assistance programs and has reprogrammed, withheld, or not yet obligated significant portions of assistance to Central America due to concerns that those governments have not adequately curbed unauthorized migration. President Trump has welcomed Mexico's assistance on migration enforcement, but the Administration noted in an FY2020 presidential determination issued in August 2019 that \"without further progress over [this year], he could determine that Mexico has 'failed demonstrably' to meet its international drug control commitments.\" Such a determination could trigger U.S. foreign assistance cuts to Mexico. President Trump also has prioritized combating gangs, namely the MS-13, which the Department of Justice (DOJ) has named a top priority for U.S. law enforcement agencies. U.S. agencies, in cooperation with vetted units in Central America funded through CARSI, have brought criminal charges against thousands of MS-13 members in the United States. U.S. assistance that supports vetted units working with the U.S. Department of Homeland Security (DHS) and DOJ have been exempt from recent aid reductions for Central America. Congressional Action: The 116 th Congress has held hearings on opioids, which included consideration of heroin and fentanyl production in Mexico; corruption in the Americas; the importance of U.S. assistance to Central America (including CARSI); and relations with Colombia, Mexico, and Central America, including antidrug cooperation. Compared to FY2018, the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) provided increased FY2019 resources for Colombia and Mexico, slightly less funding for CARSI, and stable funding for the CBSI. P.L. 116-6 provided $1.5 million to support the creation of a Western Hemisphere Drug Policy Commission to assess U.S. policy and make recommendations on how it might be improved. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) provides more security and rule of law funding for Colombia and Mexico than the estimated FY2019 appropriations level, less funding for CARSI, and slightly more funding for the CBSI. The FY2020 NDAA ( P.L. 116-92 ) requires the Director of National Intelligence, in collaboration with other agencies, to submit within 90 days of enactment an assessment of drug trafficking, human trafficking, and human smuggling activities and how those activities influence migration in Mexico and the Northern Triangle. The FY2020 NDAA also establishes a Commission on Combating Synthetic Opioid Trafficking to report on, among other things, the scale of opioids coming from Mexico. For additional information, see CRS In Focus IF10578, Mexico: Evolution of the MÃ©rida Initiative, 2007-2020 , by Clare Ribando Seelke; CRS In Focus IF10578, Mexico: Evolution of the MÃ©rida Initiative, 2007-2020 , by Clare Ribando Seelke; CRS In Focus IF10400, Transnational Crime Issues: Heroin Production, Fentanyl Trafficking, and U.S.-Mexico Security Cooperation , by Clare Ribando Seelke and Liana W. Rosen; CRS Report R44812, U.S. Strategy for Engagement in Central America: Policy Issues for Congress , by Peter J. Meyer; CRS Report R43813, Colombia: Background and U.S. Relations , by June S. Beittel; and CRS In Focus IF10789, Caribbean Basin Security Initiative , by Mark P. Sullivan. The Latin American and Caribbean region is one of the fastest-growing regional trading partners for the United States. Economic relations between the United States and most of its trading partners in the region remain strong, despite challenges, such as President Trump's past threats to withdraw from NAFTA, tariff policy, diplomatic tensions, and high levels of violence in some countries in the region. The United States accounts for roughly 33% of the Latin American and Caribbean region's merchandise imports and 44% of its merchandise exports. Most of this trade is with Mexico, which accounted for 77% of U.S. imports from the region and 61% of U.S. exports to the region in 2019. In 2019, total U.S. merchandise exports to Latin America and the Caribbean were valued at $418.9 billion, down from $429.7 billion in 2018. U.S. merchandise imports were valued at $467.0 billion in 2019 (see Table 4 ). The United States strengthened economic ties with Latin America and the Caribbean over the past 24 years through the negotiation and implementation of FTAs. Starting with NAFTA in 1994, which will be replaced by the USMCA when it enters into force, the United States currently has six FTAs in force involving 11 Latin American countries: Mexico, Chile, Colombia, Costa Rica, the Dominican Republic, El Salvador, Guatemala, Honduras, Nicaragua, Panama, and Peru. NAFTA was significant because it was the first U.S. FTA with a country in the Latin American and Caribbean region, and it established new rules and disciplines that influenced future trade agreements on issues important to the United States, such as IPR protection, services trade, agriculture, dispute settlement, investment, labor, and the environment. In addition to FTAs, the United States has extended unilateral trade preferences to some countries in the region through several trade preference programs. The Caribbean Basin Economic Recovery Act (no expiration), for example, provides limited duty-free entry of select Caribbean products as a core element of the U.S. foreign economic policy response to uncertain economic and political conditions in the region. Several preference programs for Haiti, which expire in 2025, provide generous and flexible unilateral preferences to the country's apparel sector. Two other preference programs include the Caribbean Basin Trade Partnership Act (CBTPA), which expires in September 2020, and the Generalized System of Preferences (GSP), which expires in December 2020. The CBTPA extends preferences on apparel products to eligible Caribbean countries similar to those given to Mexico under NAFTA. The GSP provides duty-free tariff treatment to certain products imported from 120 designated developing countries throughout the world, including Argentina, Brazil, Ecuador, and other Latin American and Caribbean countries. In the 15 to 20 years after NAFTA, some of the largest economies in South America, such as Argentina, Brazil, and Venezuela, resisted the idea of forming comprehensive FTAs with the United States. That opposition may be changing. In September 2019, President Trump noted preliminary talks with Brazil for a trade agreement, and Brazilian officials recently stated that the country was ready for a trade deal similar to USMCA. Numerous other bilateral and plurilateral trade agreements throughout the Western Hemisphere do not include the United States. For example, the Pacific Alliance, a trade arrangement composed of Mexico, Peru, Colombia, and Chile, is reportedly moving forward on a possible trade arrangement with Mercosur, composed of Brazil, Argentina, Uruguay, and Paraguay. On June 28, 2019, the European Union (EU) and Mercosur reached a political agreement to negotiate an ambitious and comprehensive trade agreement. President Trump has made NAFTA renegotiation and modernization a priority of his Administration's trade policy. Early in his Administration, he viewed FTAs as detrimental to U.S. workers and industries, stating that NAFTA was \"the worst trade deal\" and repeatedly warning that the United States may withdraw from the agreement. The United States, Canada, and Mexico subsequently renegotiated NAFTA and concluded negotiations for USMCA on September 30, 2018. Mexico was the first country to ratify the agreement in June 2019 and the first country to approve the amended USMCA on December 12, 2019. The original text of USMCA was amended to address congressional concerns on labor, environment, IPR, and dispute settlement provisions. On January 16, 2020, Congress approved the agreement, and many expect Canada's parliament to ratify it in early 2020. The USMCA retains NAFTA's market opening provisions and most other provisions. The agreement makes notable changes to labor and environment provisions, market access provisions for autos and agriculture products, and rules, such as investment, government procurement, IPR, and dispute settlement; it adds new provisions on digital trade, state-owned enterprises, and currency misalignment. All parties must ratify the agreement and have laws and regulations in place to meet their USMCA commitments before the agreement can enter into force. In 2018, President Trump issued two proclamations imposing tariffs on U.S. imports of certain steel and aluminum products using presidential powers granted under Section 232 of the Trade Expansion Act of 1962. In doing so, the Administration added new challenges to U.S. trade relations with the region. The proclamations outlined the President's decisions to impose tariffs of 25% on steel and 10% on aluminum imports, with some flexibility on the application of tariffs by country. In May 2018, President Trump proclaimed Argentina and Brazil permanently exempt from the steel tariffs in exchange for quota agreements, but he threatened to impose tariffs again in December 2019. The United States imposed tariffs on steel and aluminum imports from Mexico on May 31, 2018, and Mexico subsequently imposed retaliatory tariffs on 71 U.S. products, covering an estimated $3.7 billion worth of trade. By May 2019, President Trump had exempted Mexico from steel and aluminum tariffs, and Mexico agreed to terminate its retaliatory tariffs. President Trump's January 2017 withdrawal from the proposed TPP, an FTA that included Mexico, Peru, and Chile as signatories, signified another change to U.S. trade policy. In March 2018, all TPP parties signed the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP or TPP-11), which essentially brought a modified TPP into effect. The TPP-11 has entered into force among seven countriesâCanada, Australia, Japan, Mexico, New Zealand, Singapore, and Vietnam. Chile and Peru expect to ratify the agreement eventually. Colombia has expressed plans to request entry into the agreement after it enters into force among all partners. Some observers contend that U.S. withdrawal from the proposed TPP could damage U.S. competitiveness and economic leadership in the region, whereas others see the withdrawal as a way to prevent lower-cost imports and potential job losses. Congressional Action: The 116 th Congress, in both its legislative and oversight capacities, has faced numerous trade policy issues related to NAFTA's renegotiation and the USMCA. The U.S. House of Representatives approved USMCA implementing legislation, H.R. 5430 , on December 19, 2019, by a vote of 385-41, and the Senate approved it on January 16, 2020, by a vote of 89-10; it was signed into law ( P.L. 116-113 ) on January 29, 2020. Lawmakers took an interest as to whether the Administration followed U.S. trade negotiating objectives and procedures as required by Trade Promotion Authority (Bipartisan Congressional Trade Priorities and Accountability Act of 2015, or TPA; P.L. 114-26 ). Some Members also considered issues surrounding the labor and environment provisions' enforceability, access to medicine, and economic effects. Other Members showed interest in how the USMCA may affect U.S. industries, especially the auto industry, as well as the overall effects on the U.S. and Mexican economies, North American supply chains, and trade relations with the Latin American and Caribbean region. Among other trade issues, legislation was introduced ( H.R. 991 and S. 2473 ) that would extend CBTPA benefits through September 2030. Regarding the Section 232 investigations on aluminum and steel imports, the impact of tariffs and retaliatory tariffs from Mexico on U.S. producers, domestic U.S. industries, and consumers raised numerous issues for Congress. Energy reform in Mexico, and the implications for U.S. trade and investment in energy, may continue to be of interest to Congress. Policymakers also may consider how U.S. trade policy is perceived by the region and whether it may affect multilateral trade issues and cooperation on matters regarding security and migration. Another issue relates to U.S. market share. If Mexico, Chile, Colombia, Peru, and Mercosur countries continue trade and investment liberalization efforts with other countries without the United States, doing so may open the door to more intra-trade and investment among certain Latin American and Caribbean countries, or possibly China and other Asian countries, which may affect U.S. exports. For additional information, see CRS In Focus IF10997, U.S.-Mexico-Canada (USMCA) Trade Agreement , by M. Angeles Villarreal and Ian F. Fergusson; CRS Report R44981, NAFTA and the United States-Mexico-Canada Agreement (USMCA) , by M. Angeles Villarreal and Ian F. Fergusson; CRS In Focus IF10038, Trade Promotion Authority (TPA) , by Ian F. Fergusson; CRS Report RL32934, U.S.-Mexico Economic Relations: Trends, Issues, and Implications , by M. Angeles Villarreal; and CRS Report R45249, Section 232 Investigations: Overview and Issues for Congress , coordinated by Rachel F. Fefer and Vivian C. Jones. Latin America's status as a leading source of both legal and unauthorized migration to the United States means that U.S. immigration policies significantly affect countries in the region and U.S. relations with their governments. Latin Americans comprise the vast majority of unauthorized migrants who have received relief from removal (deportation) through the TPS program and the DACA initiative; they also comprise a large percentage of recent asylum seekers. As a result, several U.S. immigration policy changes have concerned countries in the region. These include the following Trump Administration actions: ending TPS designations for Haiti, El Salvador, Nicaragua, and Honduras; rescinding DACA; and restricting access to asylum in the United States. In January 2019, the Administration launched the Migrant Protection Protocols (MPP), a program to require many migrants and asylum seekers processed at the Mexico-U.S. border to be returned to Mexico to await their immigration proceedings; the program is currently facing legal challenges but remains in place. Under a practice known as \"metering,\" migrants may now be required to wait in Mexico until there is capacity to process them at a port of entry. The Administration also signed what it termed \"asylum cooperative agreements\"âalso referred to as \"safe third country\" agreementsâwith Guatemala, El Salvador, and Honduras to allow the United States to transfer certain migrants who arrive to a U.S. border seeking asylum protection to apply for asylum in one of those countries. The factors that have driven legal and unauthorized U.S.-bound migration from Latin America are multifaceted, and some have changed over time. They include poverty and unemployment, political and economic instability, crime and violence, natural disasters, as well as relatively close proximity to the United States, familial ties in the United States, and relatively attractive U.S. economic conditions. As an example, Venezuela, a historically stable country with limited emigration to the United States, recently has become the top country of origin among those who seek U.S. asylum due to Venezuela's ongoing crisis. Migrant apprehensions at the southwest border had been steadily declining, reaching a 50-year low in 2017, but they began to rise in mid-2017. By FY2019, DHS apprehended 977,509 migrants, roughly 456,400 more than in FY2018. Unaccompanied children and families from the Northern Triangle, many of whom were seeking asylum, made up a majority of those apprehensions. (See \" Central America's Northern Triangle \" below.) During the first three months of FY2020, total apprehensions declined compared to FY2019, but apprehensions of Mexican adults surged. The Trump Administration's rhetoric and policies have tested U.S. relations with Mexico and the Northern Triangle countries. Mexico's President AndrÃ©s Manuel LÃ³pez Obrador agreed to shelter migrants affected by the MPP program and then, to avoid U.S. tariffs, allow the MPP to be expanded in Mexico and increase Mexico's immigration enforcement efforts, particularly on its southern border with Guatemala. DHS is now reportedly considering sending Mexican asylum seekers to Guatemala, despite Mexico's opposition to the policy. Amidst U.S. foreign aid cuts and tariff threats (in the case of Guatemala), the Northern Triangle countries signed \"safe third country\" agreements despite serious concerns about conditions in the three countries; DHS began implementing the agreement with Guatemala in November 2019, but the agreements with Honduras and El Salvador have not yet been implemented. Mexico and the Northern Triangle countries, which received some 91% of the 267,258 individuals removed from the United States in FY2019, have expressed concerns that removals could overwhelm their capacity to receive and reintegrate migrants. Central American countries also are concerned about the potential for increased removals of those with criminal records to exacerbate their security problems. Congressional Action: The 116 th Congress has provided foreign assistance to help address some of the factors fueling migration from Central America and support Mexico's migration management efforts in FY2019 ( P.L. 116-6 ) and FY2020 ( P.L. 116-94 ). In July 2019, the House passed H.R. 2615 , the United States-Northern Triangle Enhanced Engagement Act, which would require a report on the main drivers of migration from Central America. The 116 th Congress has also acted on bills that could affect significant numbers of individuals from Latin America and the Caribbean living in the United States. For example in June 2019, the House passed H.R. 6 , the American Dream and Promise Act of 2019, which would establish a process for certain unauthorized immigrants who entered the United States as children, such as DACA recipients, and for certain TPS recipients to obtain lawful permanent resident (LPR) status. In July 2019, the House passed H.R. 549 , the Venezuela TPS Act of 2019, which would provide TPS designation for Venezuela. In December 2019, the House passed H.R. 5038 , the Farm Workforce Modernization Act of 2019, which would create a new temporary immigration status (certified agricultural worker (CAW) status) for certain unauthorized and other agricultural workers and would establish a process for CAWs to become LPRs. For more information, see CRS Legal Sidebar LSB10402, Safe Third Country Agreements with Northern Triangle Countries: Background and Legal Issues , by Ben Harrington; CRS In Focus IF11151, Central American Migration: Root Causes and U.S. Policy , by Peter J. Meyer and Maureen Taft-Morales; CRS In Focus IF10215, Mexico's Immigration Control Efforts , by Clare Ribando Seelke; CRS Report R45266, The Trump Administration's \"Zero Tolerance\" Immigration Enforcement Policy , by William A. Kandel; CRS Report R45995, Unauthorized Childhood Arrivals, DACA, and Related Legislation , by Andorra Bruno; CRS Report RS20844, Temporary Protected Status: Overview and Current Issues , by Jill H. Wilson; CRS In Focus IF11363, Processing Aliens at the U.S.-Mexico Border: Recent Policy Changes , by Hillel R. Smith, Ben Harrington, and Audrey Singer; and CRS Report R46012, Immigration: Recent Apprehension Trends at the U.S. Southwest Border , by Audrey Singer and William A. Kandel. The Caribbean is a diverse region of 16 independent countries and 18 overseas territories, including some of the hemisphere's richest and poorest nations. Among the region's independent countries are 13 island nations stretching from the Bahamas in the north to Trinidad and Tobago in the south; Belize, which is geographically located in Central America; and Guyana and Suriname, located on the north-central coast of South America (see Figure 2 ). Pursuant to the United States-Caribbean Strategic Enhancement Act of 2016 ( P.L. 114-291 ), the State Department submitted a multiyear strategy for the Caribbean in 2017. The strategy established a framework to strengthen U.S.-Caribbean relations in six priority areas or pillars: (1) security, with the objectives of countering transnational crime and terrorist organizations and advancing citizen security; (2) diplomacy, with the goal of increasing institutionalized engagement to forge greater cooperation at the Organization of American States (OAS) and the U.N.; (3) prosperity, including the promotion of sustainable economic growth and private sector-led investment and development; (4) energy, with the goals of increasing U.S. exports of natural gas and the use of U.S. renewable energy technologies; (5) education, focusing on increased exchanges for students, teachers, and other professionals; and (6) health, including a focus on long-standing efforts to fight infectious diseases such as HIV/AIDS. In July 2019, the State Department issued a report to Congress on the implementation of its multiyear strategy. The report maintained that limited budgets and human resources have constrained opportunities for deepening relations, but funding for the strategy's security pillar has supported meaningful engagement and produced tangible results for regional and U.S. security interests. Because of their geographic location, many Caribbean nations are vulnerable to use as transit countries for illicit drugs from South America destined for the U.S. and European markets. Many Caribbean countries also have suffered high rates of violent crime, including murder, often associated with drug trafficking activities. In response, the United States launched the Caribbean Basin Security Initiative (CBSI) in 2009, a regional U.S. foreign assistance program seeking to reduce drug trafficking in the region and advance public safety and security. The program dovetails with the first pillar of the State Department's Caribbean multiyear strategy for U.S. engagement. From FY2010 through FY2020, Congress appropriated almost $677 million for the CBSI. These funds benefitted 13 Caribbean countries. The program has targeted assistance in five areas: (1) maritime and aerial security cooperation, (2) law enforcement capacity building, (3) border/port security and firearms interdiction, (4) justice sector reform, and (5) crime prevention and at-risk youth. Many Caribbean nations depend on energy imports and, over the past decade, have participated in Venezuela's PetroCaribe program, which supplies Venezuelan oil under preferential financing terms. The United States launched the Caribbean Energy Security Initiative (CESI) in 2014, with the goals of promoting a cleaner and more sustainable energy future in the Caribbean. The CESI includes a variety of initiatives to boost energy security and sustainable economic growth by attracting investment in a range of energy technologies through a focus on improved governance, increased access to finance, and enhanced coordination among energy donors, governments, and stakeholders. Many Caribbean countries are susceptible to extreme weather events such as tropical storms and hurricanes, which can significantly affect their economies and infrastructure. Recent scientific studies suggest that climate change may be increasing the intensity of such events. In September 2019, Hurricane Dorian caused widespread damage to the northwestern Bahamian islands of Grand Bahama and Abaco, with 70 confirmed deaths and many missing. The United States responded with nearly $34 million in humanitarian assistance, including almost $25 million provided through USAID. Prior to the hurricane, the State Department had launched a U.S.-Caribbean Resilience Partnership in April 2019, with the goal of increasing regional disaster response capacity and promoting resilience to natural disasters. In December 2019, USAID announced it was providing $10 million to improve local resilience to disasters in the Caribbean. Congressional Action: The 116 th Congress has continued to appropriate funds for Caribbean regional programs. Over the past two fiscal years, Congress has funded the CBSI at levels significantly higher than requested by the Trump Administration. For FY2019, Congress appropriated $58 million for the CBSI ($36.2 million was requested), in the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ). For FY2020, the Trump Administration requested $40.2 million for the CBSI, about a 30% drop from FY2019 appropriations. Ultimately, Congress appropriated not less than $60 million for the CBSI for FY2020 in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). For FY2021, the Administration is requesting $32 million for the CBSI, a cut of almost 47% from that appropriated for FY2020. Congress has also continued to provide funding for the CESI, appropriating $2 million in FY2019 ( P.L. 116-6 ) and $3 million in FY2020 ( P.L. 116-94 ). Regarding U.S. support for natural disasters, the report to the Department of State, Foreign Operations, and Related Programs appropriations bill, 2020â H.Rept. 116-78 to H.R. 2839 âdirected that bilateral economic assistance be made available to strengthen resilience to emergencies and disasters in the Caribbean. For additional information, see CRS In Focus IF10789, Caribbean Basin Security Initiative , by Mark P. Sullivan; CRS In Focus IF10666, The Bahamas: An Overview , by Mark P. Sullivan; CRS Insight IN11171, Bahamas: Response to Hurricane Dorian , by Rhoda Margesson and Mark P. Sullivan; CRS In Focus IF10407, Dominican Republic , by Clare Ribando Seelke; CRS In Focus IF11381, Guyana: An Overview , by Mark P. Sullivan; CRS In Focus IF10912, Jamaica , by Mark P. Sullivan; and CRS In Focus IF10914, Trinidad and Tobago , by Mark P. Sullivan. Political and economic developments in Cuba, a one-party authoritarian state with a poor human rights record, have been the subject of intense congressional concern since the Cuban revolution in 1959. Current Cuban President Miguel DÃ­az-Canel succeeded RaÃºl Castro in April 2018, but Castro is expected to head Cuba's Communist Party until 2021. In February 2019, almost 87% of Cubans approved a new constitution in a national referendum. The changes include the addition of an appointed prime minister to oversee government operations, limits on the president's tenure (two five-year terms) and age (60, beginning first term), and market-oriented economic reforms, including the right to private property and the promotion of foreign investment. The new constitution, however, ensures the state sector's dominance over the economy and the Communist Party's predominant role. The Cuban economy has registered minimal growth in recent years; the EIU estimates that the economy grew 0.5% in 2019 but will contract 0.7% in 2020. For more than a decade, Cuba has implemented gradual market-oriented economic policy changes but has not taken enough action to foster sustainable economic growth. The economy also has been hard-hit by the reimposition of, and increase in, U.S. economic sanctions in 2019 that impede international financial transactions with Cuba, as well as by Venezuela's economic crisis that has limited Venezuela's support to Cuba. Cuban officials reported that 4.3 million tourists visited Cuba in 2019, down from 4.7 million in 2018; the decline in tourism has hurt Cuba's nascent private sector. Since the early 1960s, the centerpiece of U.S. policy toward Cuba has consisted of economic sanctions aimed at isolating the Cuban government. Congress has played an active role in shaping policy toward Cuba, including the enactment of legislation strengthening, and at times easing, U.S. sanctions. In 2014, the Obama Administration initiated a policy shift moving away from sanctions toward a policy of engagement. This shift included restoring diplomatic relations (July 2015), rescinding Cuba's designation as a state sponsor of international terrorism (May 2015), and increasing travel, commerce, and the flow of information to Cuba implemented through regulatory changes (2015-2016). President Trump unveiled a new policy toward Cuba in 2017, introducing new sanctions and rolling back some of the Obama Administration's efforts to normalize relations. By 2019, the Trump Administration had largely abandoned the previous Administration's policy of engagement by significantly increasing economic sanctions to pressure the Cuban government on its human rights record and its military and intelligence support of the NicolÃ¡s Maduro regime in Venezuela. The Administration has taken actions to allow lawsuits against those trafficking in property confiscated by the Cuban government, provided for in the 1996 LIBERTAD Act ( P.L. 104-114 ), and tighten restrictions on travel to Cuba, including terminating cruise ship travel from the United States and U.S. flights to and from Cuban cities other than Havana. Congressional Action: The 116 th Congress has continued to fund democracy assistance for Cuban human rights and democracy activists and U.S.-government sponsored broadcasting to Cuba. For FY2019, Congress appropriated $20 million for democracy programs and $29.1 million for Cuba broadcasting ( P.L. 116-6 , H.Rept. 116-9 ). For FY2020, Congress appropriated $20 million for democracy programs and $20.973 million for Cuba broadcasting ( P.L. 116-94 , H.R. 1865 , Division G). The measure also includes several reporting requirements on Cuba set forth in H.Rept. 116-78 and S.Rept. 116-126 . Congress is now considering the Administration's FY2021 request of $10 million for Cuba democracy programs (a 50% decline from that appropriated in FY2020) and $12.973 for Cuba broadcasting (a 38% decline from that appropriated in FY2020). Much of the debate over Cuba in Congress throughout the past 20 years has focused on U.S. sanctions. Several bills introduced in the 116 th Congress would ease or lift U.S. sanctions: H.R. 213 (baseball); S. 428 (trade); H.R. 1898 / S. 1447 (financing for U.S. agricultural exports); H.R. 2404 (overall embargo); and H.R. 3960 / S. 2303 (travel). H.R. 4884 would direct the Administration to reinstate the Cuban Family Reunification Parole Program, which has been in limbo since 2017. Several resolutions would express concerns regarding Cuba's foreign medical missions ( S.Res. 14 / H.Res. 136 ); U.S. fugitives from justice in Cuba (H.Res. 92/ S.Res. 232 ); religious and political freedom in Cuba ( S.Res. 215 ); and the release of human rights activist JosÃ© Daniel Ferrer and other members of the pro-democracy Patriotic Union of Cuba ( S.Res. 454 and H.Res. 774 ). In September 2019, the House Subcommittee on the Western Hemisphere, Civilian Security, and Trade (House Western Hemisphere Subcommittee) held a hearing on the human rights situation in Cuba (see Appendix ). For additional information, see CRS In Focus IF10045, Cuba: U.S. Policy Overview , by Mark P. Sullivan; and CRS Report R45657, Cuba: U.S. Policy in the 116th Congress , by Mark P. Sullivan. During the administration of President Jovenel MoÃ¯se, who began a five-year term in February 2017, Haiti has been experiencing growing political and social unrest, high inflation, and resurgent gang violence. The Haitian judiciary is conducting investigations into MoÃ¯se's possible involvement in money laundering, irregular loan arrangements, and embezzlement; the president denies these allegations. In mid-2018, MoÃ¯se decided to end oil subsidies, which, coupled with deteriorating economic conditions, sparked massive protests. Government instability has heightened since May 2019, when the Superior Court of Auditors delivered a report to the Haitian Senate alleging MoÃ¯se had embezzled millions of dollars. Mass demonstrations have continued, calling for an end to corruption, the provision of government services, and MoÃ¯se's resignation. MoÃ¯se has said it would be irresponsible of him to resign, and that he will not do so. He has called repeatedly for dialogue with the opposition. Haiti's elected officials have exacerbated the ongoing instability by not forming a government. The president, who is elected directly by popular elections, is head of state and appoints the prime minister, chosen from the majority party in the National Assembly. The prime minister serves as head of government. The first two prime ministers under MoÃ¯se resigned. The Haitian legislature did not confirm the president's subsequent two nominees for prime minister. Some legislators actively prevented a vote by absenting themselves to prevent a quorum being met or by other, sometimes violent, tactics. Nevertheless, a legislative motion to impeach the president did not pass. Because the legislature also did not pass an elections law, parliamentary elections scheduled for October 2019 have been postponed indefinitely. MoÃ¯se is now ruling by decree. As of January 13, 2020, the terms of the entire lower Chamber of Deputies and two-thirds of the Senate expired, as did the terms of all local government posts, without newly elected officials to take their place. Currently, there is no functioning legislature. When the legislature's terms expired in January 2015 because the government had not held elections, then-President Michel Martelly ruled by decree for over a year, outside of constitutional norms. On March 2, 2020, President MoÃ¯se appointed a new prime minister, Joseph Jouthe, by decree. Since January 2020, the U.N., the OAS, and the Vatican have been facilitating a dialogue among the government, opposition, civil society, and private sector to establish a functioning government, develop a plan for reform, create a constitutional revision process, and set an electoral calendar. The Trump Administration supports the efforts to break the political impasse, but states that \"while constitutional reforms are necessary and welcome, they must not become a pretext to delay elections.\" Haiti has received high levels of U.S. assistance for many years given its proximity to the United States and its status as the poorest country in the hemisphere. In recent years, it was the second-largest recipient of U.S. aid in the region, after Colombia. Since a peak in 2010, the year a massive earthquake hit the country, aid to Haiti has been declining steadily. Since 2014, a prolonged drought and a hurricane have severely affected Haiti's food supply. Haiti continues to struggle against a cholera epidemic inadvertently introduced by U.N. peacekeepers in 2010. The U.N. has had a continuous presence in Haiti since 2004, recently shifting from peacekeeping missions to a political office, and authorized its Integrated Office in Haiti for an initial one-year period beginning in October 2019. The office's mandate is to protect and promote human rights and to advise the government of Haiti on strengthening political stability and good governance through support for an inclusive inter-Haitian national dialogue. With the support of U.N. forces and U.S. and other international assistance, the Haitian National Police (HNP) force has become increasingly professional and has taken on responsibility for domestic security. New police commissariats have given more Haitians access to security services, but with 14,000-15,000 officers, the HNP remains below international standards for the size of the country's population. It is also underfunded. According to the U.N., the HNP has committed human rights abuses, including extrajudicial killings. Congressional Action : The Trump Administration's FY2020 request for aid for Haiti totaled $145.5 million, a 25% reduction from the estimated $193.8 million provided to Haiti in FY2019. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) contains several provisions related to Haiti, including that aid may be provided to Haiti only through the regular notification procedures. Under the act, Economic Support Fund assistance for Haiti may not be made available for assistance to the Haitian central government unless the Secretary of State certifies and reports to the Committees on Appropriations that the government is taking effective steps to strengthen the rule of law, combat corruption, increase government revenues, and resolve commercial disputes. The act provides budget authority for $51 million in Development Assistance, including $8.5 million for reforestation; it also provides $10 million in International Narcotics Control and Law Enforcement funds for prison assistance, prioritizing improvements to meet basic sanitation, medical, nutritional, and safety needs at Haiti's National Penitentiary. The measure also prohibits the provision of appropriated funds for assistance to Haiti's armed forces. The House Western Hemisphere Subcommittee held a hearing on U.S. policy toward Haiti in December 2019 (see Appendix ). Congress has begun consideration of the Administration's FY2021 foreign aid request for Haiti. The Administration requested $128.2 million, almost a 34% cut from the amount appropriated by Congress in FY2019. For background, see CRS Report R45034, Haiti's Political and Economic Conditions , by Maureen Taft-Morales. Mexico and the United States share a nearly 2,000-mile border and strong cultural, familial, and historical ties. Economically, the United States and Mexico have grown interdependent since NAFTA entered into force in 1994. The countries have also forged close security ties, as security conditions in Mexico affect U.S. national security and U.S. citizens living in or traveling to Mexico, particularly along the U.S.-Mexican border. On December 1, 2018, AndrÃ©s Manuel LÃ³pez Obrador, the populist leader of the National Regeneration Movement (MORENA) party, which he created in 2014, took office for a six-year term. LÃ³pez Obrador won 53% of the July 2018 vote, marking a shift away from Mexico's traditional parties, the Institutional Revolutionary Party (PRI) and the National Action Party (PAN). Elected on an anti-corruption platform, LÃ³pez Obrador is the first Mexican president in over two decades to enjoy majorities in both chambers of Congress. In addition to combating corruption, he pledged to build infrastructure in southern Mexico, revive the poor-performing state oil company, address citizen security through social programs, and adopt a foreign policy based on the principle of nonintervention. Given fiscal constraints, observers question whether his goals are attainable. Thirteen months into his term, President LÃ³pez Obrador enjoys high approval ratings (60% in January 2020), even though Mexico experienced record homicides and 0% economic growth in 2019. Mexicans have praised LÃ³pez Obrador's backing of new social programs, minimum wage increases, and willingness to tackle problems, such as oil theft by criminal groups. His decision to cut his own salary and public sector salaries generally has prompted resignations among experienced bureaucrats but has been popular with his constituency. Critics also have expressed concerns that LÃ³pez Obrador has centralized power and weakened institutions, relied too much on his own counsel, and dismissed journalists, regulatory agencies, and others critical of his policies. Despite some predictions to the contrary, U.S.-Mexico relations under the LÃ³pez Obrador government have thus far remained friendly. Tensions have emerged over several key issues, including trade disputes and tariffs, immigration and border security issues, U.S. citizens killed in Mexico (including the November 2019 massacre of an extended family of U.S.-Mexican citizens), and Mexico's decision to remain neutral regarding the crisis in Venezuela. The Mexican government has condemned anti-immigrant rhetoric and actions in the United States, including the August 2019 mass shooting in El Paso, TX, that resulted in the deaths of at least seven Mexican citizens. Security cooperation under the MÃ©rida Initiative has continued, including efforts to address the production and trafficking of opioids and methamphetamine, but the Trump Administration has pushed Mexico to improve its antidrug efforts and security policies. During LÃ³pez Obrador's administration, the Mexican government has accommodated most of the Trump Administration's border and asylum policy changes that have shifted the burden of interdicting migrants and offering asylum to Mexico. After enacting labor reforms and raising wages, the LÃ³pez Obrador administration achieved a significant foreign policy goal: U.S. congressional approval of implementing legislation for the proposed USMCA to replace NAFTA. (See \" Trade Policy ,\" above.) Congressional Action: The 116 th Congress closely followed the Trump Administration's efforts to renegotiate NAFTA and recommended modifications to the proposed USMCA (on labor, the environment, and dispute settlement, among other topics) that led to the three countries signing an amendment to the agreement on December 10, 2019. The House approved the implementing legislation for the proposed USMCA in December 2019, and the Senate followed suit in January 16, 2020 ( P.L. 116-113 ). Both houses have taken action on H.R. 133 , the United States-Mexico Economic Partnership Act ( H.R. 133 ), which directs the Secretary of State to enhance economic cooperation and educational and professional exchanges with Mexico; the House approved the measure in January 2019, and the Senate approved an amended version in January 2020. The FY2020 NDAA ( P.L. 116-92 ) requires a classified assessment of drug trafficking, human trafficking, and alien smuggling in Mexico. Regarding foreign aid, in FY2019, Congress provided some $162 million for Mexico in P.L. 116-6 , with much of that designated for the MÃ©rida Initiative. Those increased resources aimed to help address the flow of U.S.-bound opioids. For FY2020âtotal aid amounts are not yet availableâCongress provided $150 million for accounts that fund the MÃ©rida Initiative in P.L. 116-94 (roughly $73 million above the Administration's budget request). For FY2021, the Administration has requested $63.8 million for Mexico, a decline of almost 61% compared to that provided in FY2019. In the wake of recent high profile massacres in Mexico, congressional concerns about the efficacy of U.S.-Mexican security cooperation and calls for oversight have increased as Congress begins consideration of the FY2021 foreign aid request. For additional information, see CRS Report R42917, Mexico: Background and U.S. Relations , by Clare Ribando Seelke; CRS Report RL32934, U.S.-Mexico Economic Relations: Trends, Issues, and Implications , by M. Angeles Villarreal; CRS In Focus IF10997, U.S.-Mexico-Canada (USMCA) Trade Agreement , by M. Angeles Villarreal and Ian F. Fergusson; CRS In Focus IF10578, Mexico: Evolution of the MÃ©rida Initiative, 2007-2020 , by Clare Ribando Seelke; CRS Report R41576, Mexico: Organized Crime and Drug Trafficking Organizations , by June S. Beittel; CRS In Focus IF10215, Mexico's Immigration Control Efforts , by Clare Ribando Seelke; and CRS In Focus IF10400, Transnational Crime Issues: Heroin Production, Fentanyl Trafficking, and U.S.-Mexico Security Cooperation , by Clare Ribando Seelke and Liana W. Rosen. The Northern Triangle region of Central America (see Figure 3 ) has received renewed attention from U.S. policymakers in recent years, as it has become a major transit corridor for illicit drugs and has surpassed Mexico as the largest source of irregular migration to the United States. In FY2019, U.S. authorities apprehended nearly 608,000 unauthorized migrants from El Salvador, Guatemala, and Honduras at the southwest border; 81% of those apprehended were families or unaccompanied minors, many of whom were seeking asylum. These narcotics and migrant flows are the latest symptoms of deep-rooted challenges in the region, including widespread insecurity, fragile political and judicial systems, and high levels of poverty and unemployment. The Obama Administration determined it was in the national security interests of the United States to work with Central American nations to improve security, strengthen governance, and promote prosperity in the region. Accordingly, the Obama Administration launched a new, whole-of-government U.S. Strategy for Engagement in Central America and requested a significant increase in foreign assistance for the region to support the strategy's implementation. Congress appropriated more than $2 billion of aid for Central America between FY2016 and FY2018, allocating most of the funds to El Salvador, Guatemala, and Honduras. Congress required a portion of the aid to be withheld, however, until the Northern Triangle governments took steps to improve border security, combat corruption, protect human rights, and address other congressional concerns. The Trump Administration initially maintained the U.S. Strategy for Engagement in Central America, but suspended most aid for the Northern Triangle in March 2019 due to the continued northward flow of migrants and asylum seekers from the region. The aid suspension forced U.S. agencies to begin closing down projects and canceling planned activities. Although Administration officials acknowledged that U.S. foreign aid programs had been \"producing the results [they] were intended to produce\" with regard to security, governance, and economic development, they argued that, \"the only metric that matters is the question of what the migration situation looks like on the southern border.\" Over the course of 2019, the Trump Administration reprogrammed approximately $405 million of aid appropriated for the Northern Triangle to other foreign policy priorities while negotiating a series of \"safe third country\" agreements (also known as asylum cooperative agreements) with El Salvador, Guatemala, and Honduras. Under the agreement with Guatemala, the United States has begun sending some individuals to Guatemala to apply for protection there rather than in the United States; similar agreements with El Salvador and Honduras are awaiting implementation. The Trump Administration has released some previously suspended assistance, primarily for programs to counter transnational crime and improve border security, as the new agreements have gone into effect. For FY2021, the Administration maintains that it is requesting almost $377 million for Central America if countries in the region continue to take action to stem unauthorized migration. The Administration's Congressional Budget Justification, however, does not specify request amounts for the three Northern Triangle countries or the foreign affairs accounts from which the assistance would come. Congressional Action: The 116 th Congress has demonstrated continued support for the U.S. Strategy for Engagement in Central America but has reduced annual funding for the initiative. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) provided an estimated $527.6 million for the Central America strategy, which is about $92 million more than the Trump Administration requested. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) provides $519.9 million for the initiative, which is about $75 million more than the Trump Administration requested. Both appropriations measures maintained conditions on U.S. assistance to the central governments of the Northern Triangle. Congress has also sought to improve the effectiveness of the Central America strategy. The Senate Foreign Relations Committee, House Foreign Affairs Committee, and House Western Hemisphere Subcommittee each held oversight hearings to assess U.S. policy and foreign assistance in Central America (see Appendix ). The United States-Northern Triangle Enhanced Engagement Act ( H.R. 2615 ), passed by the House in July 2019, would require the State Department, in coordination with other agencies, to develop five-year strategies to support inclusive economic growth, combat corruption, strengthen democratic institutions, and improve security conditions in the Northern Triangle. The measure would also authorize $577 million for the Central America strategy in FY2020, including \"not less than\" $490 million for the Northern Triangle. Other measures introduced in the 116 th Congress that would authorize certain types of assistance and guide U.S. policy in the region include the Central America Reform and Enforcement Act ( S. 1445 ), the Northern Triangle and Border Stabilization Act ( H.R. 3524 ), and the Central American Women and Children Protection Act of 2019 ( H.R. 2836 / S. 1781 ). Congress has continued to express concerns about corruption and human rights abuses in the region. P.L. 116-94 provides $45 million for offices of attorneys general and other entities and activities to combat corruption and impunity in Central America. Congress allocated $3.5 million of those funds to the OAS-backed Mission to Support the Fight against Corruption and Impunity in Honduras (MACCIH); Honduran President Juan Orlando HernÃ¡ndez allowed the MACCIH's mandate to expire in January 2020, ignoring repeated calls for the mission's renewal from Members of Congress and the Trump Administration. P.L. 116-94 also includes $20 million for combating sexual and gender-based violence in the region, as well as a total of $3 million for the offices of the U.N. High Commissioner for Human Rights in Guatemala and Honduras and El Salvador's National Commission for the Search of Persons Disappeared in the Context of the Armed Conflict. Several other legislative measures also include provisions intended to address corruption and human rights abuses in the Northern Triangle. The FY2020 NDAA ( P.L. 116-92 ) requires DOD to certify, prior to the transfer of any vehicles to the Guatemalan government, that the government has made a credible commitment to use such equipment only as intended. The act also requires DOD to enter into an agreement with an independent institution to conduct an analysis of the human rights situation in Honduras. Other measures introduced in the 116 th Congress addressing corruption and human rights include the Guatemala Rule of Law Accountability Act ( H.R. 1630 / S. 716 ) and the Berta Caceres Human Rights in Honduras Act ( H.R. 1945 ). For additional information, see CRS Report R44812, U.S. Strategy for Engagement in Central America: Policy Issues for Congress , by Peter J. Meyer; CRS In Focus IF10371, U.S. Strategy for Engagement in Central America: An Overview , by Peter J. Meyer; CRS In Focus IF11151, Central American Migration: Root Causes and U.S. Policy , by Peter J. Meyer and Maureen Taft-Morales; CRS Report R43616, El Salvador: Background and U.S. Relations , by Clare Ribando Seelke; CRS Report R42580, Guatemala: Political and Socioeconomic Conditions and U.S. Relations , by Maureen Taft-Morales; CRS Report RL34027, Honduras: Background and U.S. Relations , by Peter J. Meyer; and CRS Insight IN11211, Corruption in Honduras: End of the Mission to Support the Fight Against Corruption and Impunity in Honduras (MACCIH) , by Peter J. Meyer. President Daniel Ortega, aged 74 in early 2020, has been suppressing popular unrest in Nicaragua in a manner reminiscent of Anastasio Somoza, the dictator he helped overthrow in 1979 as a leader of the leftist Sandinista National Liberation Front (FSLN). Ortega served as president from 1985 to 1990, during which time the United States backed right-wing insurgents known as contras in an attempt to overthrow the Sandinista government. In the early 1990s, Nicaragua began to establish democratic governance. Democratic space has narrowed as the FSLN and Ortega have consolidated control over the country's institutions, including while Ortega served as an opposition leader in the legislature from 1990 until 2006. Ortega reclaimed the presidency in 2007 and has served as president for the past 13 years. Until recently, for many Nicaraguans, Ortega's populist social welfare programs that improved their standard of living outweighed his authoritarian tendencies and self-enrichment. Similarly, for many in the international community, the relative stability in Nicaragua outweighed Ortega's antidemocratic actions. Ortega's long-term strategy to retain control of the government began to unravel in 2018 when his proposal to reduce social security benefits triggered protests led by a wide range of Nicaraguans. The government's repressive response led to an estimated 325-600 extrajudicial killings, torture, political imprisonment, suppression of the press, and thousands of citizens going into exile. The government says it was defending itself from coup attempts. The crisis also undermined economic growth in the hemisphere's second poorest country. The Nicaraguan economy contracted by 5.1% in 2019, and some economists estimate the economy will contract a further 1.5% in 2020. The international community has sought to hold the Ortega government accountable for human rights abuses and facilitate the reestablishment of democracy in Nicaragua. In July 2018, an Inter-American Commission on Human Rights team concluded that the Nicaraguan security forces' actions could be considered crimes against humanity. The OAS High Level Commission on Nicaragua concluded in November 2019 that the government's actions \"make the democratic functioning of the country impossible,\" in violation of Nicaragua's obligations under Article 1 of the Inter-American Democratic Charter. The Nicaragua Human Rights and Anticorruption Act of 2018 ( P.L. 115-335 ), effectively blocks access to new multilateral lending to Nicaragua. The Trump Administration has imposed sanctions against 16 high-level officials, including Vice President Rosario Murillo. On March 5, 2020, the Trump Administration imposed sanctions against the Nicaraguan National Police for its role in serious human rights abuses. Dialogue between the government and the opposition collapsed in 2019 and has not resumed. Congressional Action: The 116 th Congress remains concerned about the erosion of democracy and human rights abuses in Nicaragua. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) appropriates $10 million for foreign assistance programs to promote democracy and the rule of law in Nicaragua. For FY2021, the Administration has requested $10 million for democracy and civil society programs in Nicaragua. In December 2019, the House Foreign Affairs Committee ordered H.Res. 754 to be reported favorably by unanimous consent to the full House, and the full House approved the measure on March 9, 2020. The resolution expresses the sense of the House of Representatives that the United States should continue to support the people of Nicaragua in their peaceful efforts to promote democracy and human rights and to use the tools under U.S. law to increase political and financial pressure on the Ortega government. In June 2019, the House Western Hemisphere Subcommittee held a hearing on the Nicaraguan government's repression of dissent (see Appendix ). Current President Alberto FernÃ¡ndez of the center-left Peronist Frente de Todos (FdT, Front for All) ticket won the October 2019 presidential election and was inaugurated to a four-year term in December 2019. He defeated incumbent President Mauricio Macri of the center-right Juntos por el Cambio (JC, Together for Change) coalition by a solid margin of 48.1% to 40.4% but by significantly less than the 15 to 20 percentage points predicted by polls. The election also returned to government former leftist Peronist President Cristina FernÃ¡ndez de Kirchner (2007-2015), who ran on the FdT ticket as vice president. Argentina's economic decline in 2018 and 2019, with high inflation and increasing poverty, was the major factor in Macri's electoral defeat. Macri had ushered in economic policy changes in 2016-2017 that lifted currency controls, reduced or eliminated agricultural export taxes, and reduced electricity, water, and heating subsidies. In 2018, as the economy faced pressure from a severe drought and large budget deficits, the IMF supported the government with a $57 billion program. Macri's economic reforms and IMF support were not enough to stem Argentina's economic decline, and the government reimposed currency controls and took other measures to stabilize the economy. President FernÃ¡ndez faces an economy in crisis, with a recession that is expected to extend into 2020, high poverty, and a high level of unsustainable public debt requiring restructuring. He has pledged to restructure Argentina's debt by the end of March 2020, and he has opened talks with bondholders and other creditors, including the IMF. FernÃ¡ndez also has rolled out several measures, including a food program and price controls on basic goods, aimed at helping low-income Argentines cope with inflation and increased poverty. U.S. relations with Argentina were strong under the Macri government, marked by increasing engagement on a range of bilateral, regional, and global issues. After Argentina's 2019 presidential race, Secretary of State Mike Pompeo said that the United States looked forward to working with the FernÃ¡ndez administration to promote regional security, prosperity, and the rule of law. One point of contention in relations could be Argentina's stance on Venezuela. Under Macri, Argentina was strongly critical of the antidemocratic actions of the Maduro regime. The country joined with other regional countries in 2017 to form the Lima Group seeking a democratic resolution, and in 2019, recognized the head of Venezuela's National Assembly, Juan GuaidÃ³, as the country's interim president. In contrast, the FernÃ¡ndez government does not recognize GuaidÃ³ as Venezuela's interim president, although it criticized Maduro's January 2020 actions preventing GuaidÃ³ from being elected to a second term as head of the legislature. Congressional Action: Argentina has not traditionally received much U.S. foreign aid because of its relatively high per capita income level, but for each of FY2018-FY2020, Congress has appropriated $2.5 million in International Narcotics Control and Law Enforcement assistance to support Argentina's counterterrorism, counternarcotics, and law enforcement capabilities. Congress has expressed concern over the years about progress in bringing to justice those responsible for the July 1994 bombing of the Argentine-Israeli Mutual Association (AMIA) in Buenos Aires that killed 85 people. Both Iran and Hezbollah (the radical Lebanon-based Islamic group) allegedly are linked to the attack, as well as to the 1992 bombing of the Israeli Embassy in Buenos Aires that killed 29 people. As the 25 th anniversary of the AMIA bombing approached in July 2019, the House approved H.Res. 441, reiterating condemnation of the attack and expressing strong support for accountability; the Senate followed suit in October 2019 when it approved S.Res. 277 . For additional information, see CRS In Focus IF10932, Argentina: An Overview , by Mark P. Sullivan; CRS In Focus IF10991, Argentina's Economic Crisis , by Rebecca M. Nelson; and CRS Insight IN11184, Argentina's 2019 Elections , by Mark P. Sullivan and Angel Carrasquillo Benoit. Bolivia experienced relative stability and prosperity from 2006 to 2019, but as governance standards weakened, relations with the United States deteriorated under populist President Evo Morales. Morales was the country's first indigenous president and leader of the Movement Toward Socialism (MAS) party. On November 10, 2019, President Morales resigned and sought protection abroad (first in Mexico and then in Argentina) after weeks of protests alleging fraud in the October 20, 2019, election in which he had sought a fourth term. After three individuals in line to succeed Morales also resigned, opposition Senator Jeanine AÃ±ez, formerly second vice president of the senate, declared herself senate president and then interim president on November 12. Bolivia's constitutional court recognized her succession. In late November, the MAS-led Congress unanimously approved an electoral law to annul the October elections and select a new electoral tribunal. On January 3, 2020, the reconstituted tribunal scheduled new presidential and legislative elections for May 3, 2020. A second-round presidential contest would likely occur, if needed, on June 14. The situation in Bolivia remains volatile. On January 24, 2020, Interim President AÃ±ez announced her intention to run in the May presidential election, abandoning her earlier pledge to preside over a caretaker government focused on convening credible elections. Even before she announced her candidacy, observers had criticized AÃ±ez for exceeding her mandate by reversing several MAS foreign policy positions and bringing charges of sedition against Morales and other former MAS officials. The Trump Administration has sought to bolster ties with the AÃ±ez government while expressing support for \"free, fair, transparent, and inclusive elections.\" U.S. officials have praised the AÃ±ez government for expelling Cuban officials and recognizing Venezuela's GuaidÃ³ government. In January 2020, President Trump waived restrictions on U.S. assistance to Bolivia, and a multiagency team traveled to the country to assess what type of election support U.S. agencies might offer the interim government. Congressional Action: Members of the 116 th Congress have expressed concerns about the situation in Bolivia. S.Res. 35 , approved in April 2019, expressed concern over Morales's efforts to circumvent term limits in Bolivia and called on his government to allow electoral bodies to administer the October 2019 elections in accordance with international norms. Although some Members condemned the ouster of Morales as a \"coup,\" most have focused on ensuring a democratic transition. In January 2020, the Senate agreed by unanimous consent to S.Res. 447 , expressing concerns about election irregularities and violence in Bolivia, urging the Bolivian government to protect human rights and promptly convene new elections, and encouraging the U.S. State Department and the OAS to help ensure the integrity of the electoral process. For more information, see CRS Insight IN11198, Bolivia Postpones May Elections Amidst COVID-19 Outbreak , by Clare Ribando Seelke; and CRS In Focus IF11325, Bolivia: An Overview , by Clare Ribando Seelke. Occupying almost half of South America, Brazil is the fifth-largest and the fifth-most populous country in the world. Given its size and tremendous natural resources, Brazil has long had the potential to become a world power. Its rise to prominence has been hindered, however, by uneven economic performance and political instability. After experiencing a period of strong economic growth and increased international influence during the first decade of the 21 st century, Brazil has struggled with a series of domestic crises in recent years. The economy fell into its worst recession on record in 2014; the recovery since 2017 has been slow, with annual economic growth averaging 1% and the unemployment rate stuck above 11%. The political environment has also deteriorated as a sprawling corruption investigation underway since 2014 has implicated politicians from across the political spectrum. Those combined crises contributed to the controversial impeachment and removal from office of President Dilma Rousseff (2011-2016) and discredited much of the country's political class, paving the way for right-wing populist Jair Bolsonaro to win the presidency in October 2018. Since taking office in January 2019, President Bolsonaro has maintained his political base's support by taking socially conservative stands on cultural issues and proposing hardline security policies to reduce crime and violence. He has also begun enacting economic and regulatory reforms favored by international investors and Brazilian businesses. His confrontational approach to governance has alienated many potential allies, however, hindering the enactment of his policy agenda. Many Brazilians and international observers are concerned that Bolsonaro's environmental policies are contributing to increased deforestation in the Brazilian Amazon, and that his frequent verbal attacks against the press, nongovernmental organizations (NGOs), and other government branches are weakening democracy. The Bolsonaro administration's foreign policy has focused on forging closer ties to the United States. Brazil has partially abandoned its traditional commitment to autonomy in foreign affairs as Bolsonaro has supported the Trump Administration on a variety of issues, including the crisis in Venezuela, the U.S. trade embargo against Cuba, and the U.S. killing of Iranian military commander Qasem Soleimani. On other issues, such as commercial ties with China, Bolsonaro has adopted a more pragmatic approach intended to ensure continued access to major export markets. In 2019, President Trump designated Brazil as a major non-NATO ally for the purposes of the Arms Export Control Act (22 U.S.C. 2751 et seq.), offering Brazil privileged access to the U.S. defense industry and increased joint military exchanges, exercises, and training. President Trump also signed several agreements with President Bolsonaro intended to strengthen bilateral commercial ties. Some Brazilian analysts have questioned the benefits of partnership with the United States due to the Trump Administration's decision to maintain import restrictions on Brazilian beef until February 2020, and the Administration's threats to impose tariffs on other key Brazilian products, such as steel. Congressional Action: The 116 th Congress has continued long-standing U.S. support for environmental conservation efforts in Brazil. In September 2019, the House Western Hemisphere Subcommittee held an oversight hearing on preserving the Amazon rainforest that focused on the surge of fires and deforestation in the region (see Appendix ). Some Members of Congress also have introduced legislative proposals to address the situation. A Senate resolution ( S.Res. 337 ) would express concern about fires and illegal deforestation in the Amazon, call on the Brazilian government to strengthen environmental enforcement, and support continued U.S. assistance to the Brazilian government and NGOs. The Act for the Amazon Act ( H.R. 4263 ) would take a more punitive approach. The act would ban the importation of certain fossil fuels and agricultural products from Brazil, prohibit certain types of military-to-military engagement and security assistance to Brazil, and forbid U.S. agencies from entering into free trade negotiations with Brazil. Congress ultimately appropriated $15 million for foreign assistance programs in the Brazilian Amazon, including $5 million to address fires in the region, in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). That amount is $4 million more than Congress appropriated for environmental programs in the Brazilian Amazon in the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ). Congress has also expressed concerns about the state of democracy and human rights in Brazil. A provision of the FY2020 NDAA ( P.L. 116-92 ) directs the Secretary of Defense, in coordination with the Secretary of State, to submit a report to Congress regarding the human rights climate in Brazil and U.S.-Brazilian security cooperation. Some Members have also called for changes to U.S. policy. A resolution introduced in September 2019 expressing profound concerns about threats to human rights, the rule of law, democracy, and the environment in Brazil (H.Res. 594) would call for the United States to rescind Brazil's designation as a major non-NATO ally and suspend assistance to Brazilian security forces, among other actions. For additional information, see CRS Report R46236, Brazil: Background and U.S. Relations , by Peter J. Meyer; and CRS In Focus IF11306, Fire and Deforestation in the Brazilian Amazon , by Pervaze A. Sheikh et al. Colombia is a key U.S. ally in Latin America. Because of the country's prominence in illegal drug production, the United States and Colombia have forged a close relationship over the past two decades to respond to mutual challenges. Focused initially on counternarcotics, and later on counterterrorism, a program called Plan Colombia laid the foundation for a security partnership between the two countries. Plan Colombia and its successor strategies ultimately became the basis for a 17-year U.S.-Colombian bilateral effort. President Juan Manuel Santos (2010-2018) made concluding a peace accord with the FARCâthe country's largest leftist guerrilla organizationâhis government's primary focus. Following four years of formal peace negotiations, Colombia's Congress ratified the FARC-government peace accord in November 2016. During a U.N.-monitored demobilization effort in 2017, approximately 13,200 FARC (armed combatants and militia members) disarmed, demobilized, and began the process of reintegration. IvÃ¡n Duque, a former senator from the conservative Democratic Center party, who won the 2018 presidential election, was inaugurated to a four-year presidential term in August 2018. Duque campaigned as a critic of the peace accord. His approval ratings slipped early in his presidency, and his government faced weeks of protests and strikes in late 2019 focused on several administration policies, including what many Colombians view as a halting approach to peace accord implementation. Colombia continues to face major challenges, including a sharp increase of coca cultivation and cocaine production, vulnerability to a mass migration of Venezuelans fleeing the authoritarian government of Maduro, a spike in attacks on human rights defenders and social activists, and financial and other challenges enacting the ambitious peace accord commitments while controlling crime and violence by armed groups seeking to replace the FARC. President Duque has not succeeded in building a legislative coalition with other parties to implement major legislative reforms. In August 2019, a FARC splinter faction, which included the former lead FARC negotiator of the peace accord, announced its return to arms. In response, neighboring Venezuela appears to be sheltering and perhaps collaborating with FARC dissidents and guerrilla fighters of the National Liberation Army (ELN)âformerly Colombia's second largest insurgency, now its largest. The ELN is also a U.S.-designated foreign terrorist organization. Some 3,000 former FARC fighters are estimated to have returned to armed struggle, and some have indicated they will cooperate with the ELN. The majority of demobilized FARC members remain committed to the peace process, despite numerous risks; the U.N. Verification Mission in Colombia reported in December 2019 that 77 demobilized FARC members were killed in 2019, with 173 in total killed since 2016. In 2017, Colombia cultivated a record 209,000 hectares of coca, amounting to a potential 921 metric tons of pure cocaine. In 2018, drug yields declined marginally, according to U.S. estimates, although the U.N. estimates for cocaine production were considerably higher. In meetings between President Duque and Secretary of State Pompeo in 2019, the governments reaffirmed a March 2018 commitment to work together to lower coca crop expansion and cocaine production by 50% by 2023. The U.S. government depends on the Colombian government to interdict much of the cocaine leaving the country, as it is mainly destined for the United States. President Duque campaigned on returning to forced aerial eradication (or spraying of coca crops) with the herbicide glyphosate. This strategy has been a centralâalbeit controversialâfeature of U.S.-Colombian counterdrug cooperation for more than two decades. In late December 2019, President Duque announced that spraying was likely to restart in early 2020. Several analysts maintain that forced manual and aerial eradication of coca have not been successful strategies in Colombia, and they consider voluntary eradication and alternative development programs made viable by a gradually more present central government in rural communities as critical to consolidating peace. The United States remains Colombia's top trading partner. Colombia's economy, which grew 2.6% in 2018, is estimated to have grown by 3.1% in 2019, with foreign direct investment on the rise. Projections are that Colombia's growth rate will remain at 3% and above over the next few years, which makes it one of the strongest major economies in the region. Congressional Action: At the close of 2019, 1.6 million Venezuelans were residing in Colombia. This number could grow in 2020 to more than 3 million migrants depending how the political crisis in neighboring Venezuela unfolds. Since FY2017, the State Department has allocated more than $400 million to support countries receiving Venezuelan migrants, with over halfâalmost $215 million in U.S. humanitarian and development assistanceâfor Colombia, as the most severely affected country. (See \" Venezuela ,\" below.) Congress appropriated more than $10 billion for Plan Colombia and its follow-on programs between FY2000 and FY2016, about 20% of which was funded through DOD. Subsequently, Congress provided $1.2 billion annually in additional assistance for Colombia from FY2017 through FY2019, including assistance funded through DOD. For FY2020, Congress provided $448 million in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) for State Department and USAID-funded programs in Colombia. For FY2021, the Administration has requested $412.9 million for Colombia, about a 2% decline from that appropriated in FY2019. For additional information, see CRS Report R43813, Colombia: Background and U.S. Relations , by June S. Beittel; CRS Report R44779, Colombia's Changing Approach to Drug Policy , by June S. Beittel and Liana W. Rosen; CRS Report RL34470, The U.S.-Colombia Free Trade Agreement: Background and Issues , by M. Angeles Villarreal and Edward Y. Gracia; and CRS Report R42982, Colombia's Peace Process Through 2016 , by June S. Beittel. Venezuela remains in a deep crisis under the authoritarian rule of NicolÃ¡s Maduro of the United Socialist Party of Venezuela. Maduro, narrowly elected in 2013 after the death of Hugo ChÃ¡vez (president, 1999-2013), began a second term on January 10, 2019, that most Venezuelans and much of the international community consider illegitimate. Since January 2019, Juan GuaidÃ³, president of Venezuela's democratically elected, opposition-controlled National Assembly, has sought to form a transition government to serve until internationally observed elections can be held. The United States and 57 other countries recognize GuaidÃ³ as interim president, but he has been unable to wrest Maduro from power, and he has faced increased danger since returning home from a January-February 2020 international tour, which included a meeting with President Trump. Some observers believe that National Assembly elections due this year might start an electoral path out of the current stalemate. Maduro has used repression to quash dissent; rewarded allies with income earned from illegal gold mining, drug trafficking, and other illicit activities; relied on support from Russia to avoid U.S. sanctions; and had his supporters use violence to prevent the National Assembly from convening. Venezuela's economy has collapsed. The country is plagued by hyperinflation, severe shortages of food and medicine, and electricity blackouts that have worsened an already dire humanitarian crisis. In April 2019, U.N. officials estimated that some 90% of Venezuelans are living in poverty. Many observers cite economic mismanagement and corruption as the key factors responsible for the economic crisis, but also acknowledge that economic sanctions have contributed to Venezuela's economic decline. U.N. agencies estimate that 4.8 million Venezuelans had fled the country as of December 2019, primarily to Latin American and Caribbean countries. U.S. Policy. As the situation in Venezuela has deteriorated under Maduro, the Trump Administration has imposed targeted sanctions on Venezuelan officials responsible for antidemocratic actions, human rights violations, and corruption, as well as increasingly strong financial sanctions against the Maduro government and the state oil company, its main source of income. Since recognizing GuaidÃ³ as interim president in January 2019, the Administration has increased sanctions on the Maduro government and encouraged other countries to do so. The EU, Canada, and 11 Western Hemisphere countries who are states parties to the Inter-American Treaty of Reciprocal Assistance (Rio Treaty) have imposed targeted sanctions and travel bans on Maduro officials, but not broad economic sanctions as the United States has done. Those countries similarly oppose military intervention in Venezuela, a policy option that the Trump Administration reportedly considered early in 2019 but has not raised since. In January 2020, the Administration issued a statement backing a political solution that leads to the convening of free and fair presidential and parliamentary elections this year. International efforts to broker a political solution have not produced results. Although the U.S. statement encourages a focus on convening elections (as did the 2019 Norway-led talks between the GuaidÃ³ and Maduro teams), it also says that those elections should be overseen by a \"negotiated transitional government,\" a requirement that Maduro may not accept. Some observers maintain that any negotiations between Maduro and GuaidÃ³ would need the backing of the United States and Russia in order to succeed. Since FY2017, the Administration has provided $472 million in humanitarian and development assistance, including $56 million for humanitarian relief activities in Venezuela, and the remainder to support regional countries sheltering most of the 4.8 million Venezuelans who have fled the crisis. The U.S. military has twice deployed a naval ship hospital to the region. In October 2019, the Administration signed an agreement with the GuaidÃ³ government to provide $100 million in development assistance, including direct support for the interim government. Congressional Action: Congress has supported the Administration's efforts to restore democracy in Venezuela and provide humanitarian assistance to Venezuelans, although some Members have expressed concerns about the humanitarian effects of sanctions and about potential unauthorized use of the U.S. military in Venezuela. In February 2019, Congress enacted the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), which provided $17.5 million for democracy programs in Venezuela. In December 2019, Congress enacted the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), which provided $30 million for democracy and human rights programs in Venezuela. The measure also incorporates provisions from S. 1025 , the VERDAD Act, authorizing $400 million in FY2020 humanitarian aid to Venezuela, codifying several types of sanctions on the Maduro government, and authorizing $17.5 million to support elections and a democratic transition in Venezuela. P.L. 116-94 also incorporates languages from several House-approved bills including H.R. 920 , restricting the export of defense articles to Venezuela; and H.R. 1477 , requiring a strategy to counter Russian influence in Venezuela. Congress has begun consideration of the Administration's $205 million FY2021 foreign aid request for Venezuela, an 811% increase over that appropriated in FY2019. According to the Administration, the assistance would provide support to democratic institutions following a potential political transition and would address the urgent health needs of the Venezuelan people. In July 2019, the House passed H.R. 549 , which would designate Venezuela for TPS. In December 2019, Congress enacted the FY2020 NDAA ( P.L. 116-92 ), which prohibits federal contracting with persons who do business with the Maduro government. House and Senate committees have held hearings on the situation in Venezuela and U.S. policy (see Appendix ). For additional information, see CRS In Focus IF10230, Venezuela: Political Crisis and U.S. Policy , by Clare Ribando Seelke; CRS In Focus IF10715, Venezuela: Overview of U.S. Sanctions , by Mark P. Sullivan; CRS Report R44841, Venezuela: Background and U.S. Relations , coordinated by Clare Ribando Seelke; CRS In Focus IF11216, Venezuela: International Efforts to Resolve the Political Crisis , by Clare Ribando Seelke; and CRS In Focus IF11029, The Venezuela Regional Migration Crisis , by Rhoda Margesson and Clare Ribando Seelke. Congress has begun to consider the Trump Administration's FY2021 $1.4 billion foreign aid budget request for the region. The 18% cut in overall funding compared to FY2019 foreign aid levels masks large cuts, ranging from 30-60%, for some countries and programs. In particular, the Trump Administration's linkage of aid to Central America to reductions in unauthorized migration from the region could be an area of contention with Congress as could the Administration's large increase in assistance to support a democratic transition in Venezuela that has yet to happen. On trade issues, the 116 th Congress may consider whether to extend a tariff preference program for certain Caribbean countries, the CBTPAâwhich expires in September 2020âand the broader GSP for developing countries worldwide, which expires in December 2020. Looking ahead through 2020, the Latin America and Caribbean region faces significant challengesâmost prominently, Venezuela's ongoing political impasse and economic and humanitarian crisis, which has resulted in some 4 million Venezuelan refugees and migrants in the region. Upcoming elections in Bolivia in May 2020 are expected to be an important test of the country's political system in the aftermath of President Morales's resignation following protests ignited by widespread electoral fraud in October 2019. Social protests racked many Latin American countries in late 2019, and such unrest could continue in 2020 given that many of the underlying conditions still exist. These challenges and the appropriate U.S. policy responses may remain oversight issues for Congress. Other areas of congressional oversight and interest may include the ongoing difficult political situations in Haiti and Nicaragua, efforts to stem drug trafficking from South America, appropriate strategies to curb the flow of migrants from Central America, and U.S. policy toward Cuba. ", "summary": "The United States maintains strong linkages with neighboring Latin America and the Caribbean based on geographic proximity and diverse U.S. interests, including economic, political, and security concerns. The United States is a major trading partner and source of foreign investment for many countries in the region, with free-trade agreements enhancing economic linkages with 11 countries. The region is a large source of U.S. immigration, both legal and illegal; proximity and economic and security conditions are major factors driving migration. Curbing the flow of illicit drugs has been a key component of U.S. relations with the region for more than four decades and currently involves close security cooperation with Mexico, Central America, and the Caribbean. U.S. support for democracy and human rights in the region has been long-standing, with particular current focus on Cuba, Nicaragua, and Venezuela. Under the Trump Administration, U.S. relations with Latin America and the Caribbean have moved toward a more confrontational approach from one of engagement and partnership during past Administrations. Since FY2018, the Administration's proposed foreign aid budgets for the region would have cut assistance levels significantlyâthe FY2021 request would cut aid to the region by 18%. (A large increase for Venezuela masks significantly larger cuts for many countries and programs.) To deter increased unauthorized migration from Central America, the Administration has used a variety of immigration policy tools (including Migrant Protection Protocols and \"safe third country\" agreements), as well as aid cuts and threats of increased U.S. tariffs and taxes on remittances. Other Administration actions on immigration include efforts to end the deportation relief program known as Deferred Action for Childhood Arrivals (DACA) and Temporary Protected Status (TPS) designations for Nicaragua, Haiti, El Salvador, and Honduras. Among trade issues, President Trump strongly criticized and repeatedly threatened to withdraw from the North American Free Trade Agreement (NAFTA), which led to the new United States-Mexico-Canada Agreement (USMCA) negotiated in 2018. The Trump Administration also did not follow the policy of engagement with Cuba advanced by the Obama Administration and imposed new sanctions. Congressional Action in the 116 th Congress . Congress traditionally has played an active role in policy toward Latin America and the Caribbean in terms of both legislation and oversight. The 116 th Congress did not implement the Trump Administration's downsized foreign aid budget requests for the region for FY2019 ( P.L. 116-6 ) and FY2020 ( P.L. 116-94 ), instead providing aid amounts roughly similar to those provided in recent years. Congress approved the Venezuela Emergency Relief, Democracy Assistance, and Development Act of 2019 in December 2019 (included in Division J of P.L. 116-94 ), which, among its provisions, codifies several types of sanctions imposed on Venezuela and authorizes humanitarian assistance to Venezuelans and support for international election observation and democratic civil society. In January 2020, Congress completed action on implementing legislation ( P.L. 116-113 ) for the USMCA, but before final agreement, the trade agreement was amended to address congressional concerns regarding provisions on labor, the environment, dispute settlement procedures, and intellectual property rights. The FY2020 National Defense Authorization Act ( P.L. 116-92 ), approved in December 2019, includes provisions on Venezuela and Guatemala and reporting requirements on Brazil, Honduras, Central America, and Mexico. Either or both houses approved several bills and resolutions on a range of issues and countries: H.R. 133 , which would promote economic cooperation and exchanges with Mexico; H.R. 2615 , which would authorize assistance to Central America's Northern Triangle countries to address the root causes of migration; S.Res. 35 and S.Res. 447 on the political situation in Bolivia; H.Res. 441 and S.Res. 277 , commemorating the 25 th anniversary of the 1994 bombing of the Argentine-Israeli Mutual Association in Buenos Aires; and H.Res. 754 , expressing continued U.S. support for the people of Nicaragua and pressure on the government of Daniel Ortega. To date, congressional committees have held 20 oversight hearings on the region in the 116 th Congress (see Appendix ).", "document_type": "crs"}
{"report": "The digital divide âa gap between those who use or have access to telecommunications and information technologies and those who do notâaffects every region of the United States. Since the internet became publicly available in the 1990s, an increasing amount of information that individuals access for work, school, and entertainment is digital and hosted online. Members of Congress have expressed continuing interest in ensuring that their constituents have access to broadband internet, and in the 116 th Congress, they have introduced legislation (see the Appendix to this report) and held hearings on opportunities to expand broadband deployment and close the digital divide. Although Congress has provided federal funding for multiple broadband infrastructure initiatives, the gap between those who can access broadband and those who do not still persists. Ensuring access to broadband is not the only barrier to closing the digital divide. Other challenges include increasing the adoption of broadband (where it is available) and training for digital literacy. According to the National Digital Inclusion Alliance: We do need to address the lack of broadband infrastructure in rural areas. It is a serious problem. But, it is just one barrier to individuals and communities being able to fully participate in society today. The other common barriers, no matter where one lives, are the costs of internet service and devices, plus digital literacy skills. Simplistically equating \"the digital divide\" with just one of these barriers increases the division in our country. Broadband infrastructure initiatives funded under the American Recovery and Reinvestment Act of 2009 (ARRA, P.L. 111-5 ) have concluded, but the Federal Communications Commission (FCC) and Rural Utilities Service (RUS, within the U.S. Department of Agriculture) continue to have active programs that provide federal funding for broadband. There are few current federal funding initiatives to address other aspects of the digital divide, however, such as digital literacy and digital inclusion and the homework gap. States are playing a crucial role in efforts to expand broadband access, encouraging broadband investment, and helping to bring more of their residents online. Each state approaches broadband access and deployment differently, and state efforts may provide models for any future federal initiatives. This report analyzes selected state-level and local initiatives that have used different approaches. It does not attempt to include broadband initiatives from all 50 states. Rather, it highlights selected examples to illustrate programs that could serve as templates for potential federal initiatives. The term broadband commonly refers to high-speed internet access that is faster than dial-up access and is immediately accessible. In 2015, the FCC defined broadband as 25/3 megabits per second (Mbps), i.e., 25 Mbps (download rate) and 3 Mbps (upload rate). About 21.3 million Americans currently lack access to broadband at those speeds. Broadband includes several high-speed transmission technologies, such as: digital subscriber line (DSL); cable modem; fiber; wireless; satellite; and broadband over powerlines (BPL). The term digital divide refers to a gap between those who use or have access to telecommunications and information technologies and those who do not. Many areas of the United Statesâparticularly rural areasâhave either limited or no access to broadband infrastructure. Several factors contribute to the digital divide, including terrain, population density, demography, and market factors. Additionally, there are citizens in areas with high broadband penetration who are unable to access it due to socioeconomic factors. Ensuring access to broadband is not the only barrier to closing the digital divide. Other challenges include increasing the adoption of broadband (where it is available) and training for digital literacy. Although strides have been made in the deployment of broadband, the digital divide persistsâprompting a variety of federal broadband initiatives to address barriers and push communities across the digital divide. The FCC has several broadband programs aimed at bridging the digital divide and expanding universal service principles. The concept of universal serviceâthe principle that all Americans should have access to communications services at reasonable ratesâunderpins a category of FCC programs that aim to bring broadband and voice services to parts of the country that may otherwise have difficulty getting connected. The universal service concept was conceived in the Communications Act of 1934 to apply to voice telephone service, but in more recent years it has expanded to include high-speed internet. The Universal Service Fund encompasses four programs: The High Cost/Connect America Fund provides support for high-cost (typically rural) areas. The Low Income (Lifeline) program provides support to help eligible low-income consumers gain access to and remain on a broadband network. The Schools and Libraries (E-rate) program provides support for eligible elementary and secondary schools and classrooms, as well as libraries, for internet access, internal connections, and telecommunications services. The Rural Health Care program provides support to eligible rural health care providers for telecommunications and broadband services . Although the Universal Service Fund programs are federal programs, their funding is not appropriated by Congress. Rather, it comes from mandatory contributions by interstate telecommunications providers, in amounts based on their end-user interstate and international revenues. The telecommunications providers may, but are not required to, pass these charges directly to their subscribers, typically in the form of a feeâfor example, on a wireless phone bill. On January 30, 2020, the FCC adopted the Rural Digital Opportunity Fund, which directs $20.4 billion over 10 years to fund the deployment of high-speed broadband networks in rural America through a two-phase reverse auction (i.e., the lowest bidder wins). Phase I of the Rural Digital Opportunity Fund is scheduled to begin in October 2020 and is to target census blocks that are wholly unserved with fixed broadband at speeds of at least 25/3 Mbps. This phase is to provide up to $16 billion in overall funding to census blocks to solicit bids for fixed broadband buildout where existing data shows there is no such service available. Phase II of the program is to make at least $4.4 billion available to target partially served areas, i.e., census blocks where only some locations lack access to 25/3 Mbps broadband, as well as census blocks that do not receive bids in the first phase. In December 2019, the FCC announced the proposed 5G Fund for Rural America. The proposed fund would make up to $9 billion available to carriers to deploy advanced 5G (fifth generation) mobile wireless services in rural America. Similar to the Rural Digital Opportunity Fund, monies from the 5G Fund would be allocated through a reverse auction and would target areas that are remote or challenging to reach. The 5G Fund would replace the planned Mobility Fund Phase II, which has come under some scrutiny. In August 2018, the FCC published initial eligibility maps for Mobility Fund Phase II, which were to be used in allocating up to $4.53 billion for rural wireless broadband expansion in areas lacking 4G service. In December 2018, the FCC announced it would launch an investigation into whether one or more major carriers violated the Mobility Fund reverse auction's mapping rules and submitted incorrect coverage maps. In a report released on December 4, 2019, the FCC found that the 4G Long Term Evolution (LTE) coverage data submitted by providers is not sufficiently reliable for the purpose of moving forward with Mobility Fund Phase II; it terminated that fund and replaced it with the 5G Fund. Proposed details of the 5G Fund are still forthcoming from the FCC. The Rural Utilities Service (RUS), in the U.S. Department of Agriculture (USDA), has multiple broadband connectivity programs: The Rural Broadband Access Loan and Loan Guarantee program funds the costs of construction, improvement, or acquisition of facilities and equipment needed to provide service in eligible rural areas. The Community Connect Grants program funds broadband deployment to rural communities where it is not yet economically viable for private sector providers to deliver service. The Telecommunications Infrastructure Loans and Loan Guarantees program funds the construction, maintenance, improvement, and expansion of telephone service and broadband in extremely rural areas with a population of 5,000 or less. The Distance Learning and Telemedicine program principally funds end-user equipment to help rural communities use telecommunications to link teachers and medical service providers in one area to students and patients in another. The ReConnect program furnishes loans and grants to provide funds for the costs of construction, improvement, or acquisition of facilities and equipment needed to provide broadband service in eligible rural areas. Congress authorizes RUS programs and provides funding for them in annual appropriations bills. Eligibility requirements vary by program. For example, the Community Connect program defines an eligible area as a rural area that lacks any existing broadband speed of at least 10 Mbps download and 1 Mbps upload, which was the FCC's broadband speed benchmark previous to 25/3 Mbps. Community Connect grant funds may be used to build, acquire, or lease facilities, spectrum, land, or buildings used to deploy broadband for residential and business customers, as well as critical community facilities (e.g., public schools, fire stations, or public libraries). The Telecommunications Infrastructure Loans and Loan Guarantees program defines an eligible area as a rural area or town with a population of 5,000 or fewer without telecommunications facilities. Funds from this program can be used to finance broadband-capable telecommunications services. The RUS also managed the Broadband Initiatives Program (BIP) under the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ). Approximately $2.5 billion was allocated as loan, grant, and loan/grant combinations to deploy infrastructure in rural areas, with an emphasis on infrastructure projects to provide service directly to end users. The RUS required all BIP projects to be completed by June 2015. Funded by the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ), the Broadband Technology Opportunities Program (BTOP) was an approximately $4 billion grant program administered by NTIA to help bridge the digital divide. Projects funded by BTOP deployed broadband infrastructure, enhanced and expanded computer centers, and encouraged the sustainable adoption of broadband. The BTOP program no longer has funding available; out of 233 funded projects, two remain active. As the BTOP program came to a close in 2015, NTIA launched BroadbandUSA to respond to demand from communities seeking to ensure that their citizens have the broadband capacity they need to attract employers, create jobs, improve healthcare, advance development, and increase public safety. Although BroadbandUSA does not provide funding, it provides broadband technical assistance to communities, as well as a funding program guide, broadband resourcesâsuch as information on permitting and monthly Practical Broadband Conversations webinarsâand a National Broadband Availability Map. Funding for BroadbandUSA is appropriated annually. Increasingly, state governments have taken action to ensure that all residents, regardless of where they live or socioeconomic factors that may inhibit adoption, have access to broadband. While many state broadband initiatives focus on broadband infrastructure deployment, some address other aspects, such as adoption, mapping, feasibility, digital equity and digital inclusion, gigabit broadband initiatives, and the homework gap. This section describes selected state and local broadband initiatives, using the selected programs as examples to illustrate common approaches. The states and programs described are not intended to be a comprehensive list. Broadband infrastructure deployment programs, targeting areas that do not currently have broadband service, are the most common type of state broadband initiative. State broadband infrastructure projects typically allow applicants to apply grant funds toward building infrastructure assets, such as conduits, fiber-optic cable, and wireless towers. State programs also typically require that applicants provide last-mile broadband access to households that are unserved. Some state programs stipulate speed requirementsâusually, but not always, 25/3 Mbps in alignment with the FCC definition of broadband. In 2015, New York Governor Andrew M. Cuomo established the $500 million New York Broadband Program. The program provides state grant funding through a reverse auctionâsimilar to the method the FCC plans to use for the Rural Digital Opportunity Fund. The program's intent is to support projects that deliver high-speed internet access to unserved and underserved areas of New York State at speeds of 100 Mbps in most areas and 25 Mbps in the most remote areas. Nearly 90% of this program's funding has been awarded to projects that will address unserved areas of the state, connecting these locations for the first time. Â  Building out broadband infrastructure in some areas of the United States may prove challenging for broadband providers, due to aspects such as terrain, cost, or lack of density, which have a negative impact on return on investment. This may leave some communities with limited or, in some cases, no options to subscribe to broadband. In such areas, some states have sought out alternatives, such as entering into public-private partnerships, to help expand broadband to their communities. According to the North Carolina Broadband Infrastructure Office, \"a partnership means that the county or municipality builds community support, identifies its needs, and offers its resources to the broadband provider to make broadband deployment more financially attractive to the provider. In return, the broadband provider brings its technical expertise, innovation, equipment, and capital investment into under- or unserved areas in the community. In the end, both partners share the risks and costs of broadband deployment.\" The North Carolina Broadband Infrastructure Office offers several examples of potential public-private partnerships: For example, a city or county may offer a cost-sharing opportunity to broadband providers, in which the municipality contributes an agreed upon portion of the costs of broadband expansion to an under- or unserved region. A community anchor tenant, such as a school system, community college, hospital or a public safety system, might offer a stable starting point for the network and a gathering place for residents seeking wireless broadband access before the network is built or expanded.... [T]he town, city or county can choose to lease rights of way at no or reduced cost for the installation of broadband infrastructure. Further, the municipality can make its vertical assetsâtall buildings, water towers, etc.âavailable to broadband providers at no or reduced charges, for the installation of fixed wireless internet equipment. The municipality has several policies available that can encourage forming public-private partnerships, and expand broadband access. In February 2020, the New Mexico Department of Information Technology announced a new public-private partnership aimed at building out broadband in the southeastern portion of the state. The partnership, between ExxonMobil, the state of New Mexico, and Plateau Communications, is to develop a $5 million fiber network offering advanced broadband to businesses along a 107-mile route, with completion scheduled for August 2020. It can be difficult to build out new broadband infrastructure in certain areasâespecially in suburban or rural areasâdue to terrain or other hindrances, such as limited or prohibited access to land that is publicly or privately owned. One option to address this challenge could be to leverage existing infrastructure via a rights-of-way or permitting process. A rights-of-way grant is an authorization to use a specific piece of public land for a specific project, such as electric transmission lines, communication sites, roads, trails, fiber optic lines, canals, flumes, pipelines, or reservoirs. Federal assets such as tower facilities, buildings, and land can also be made available via permits that allow their use in deploying broadband infrastructure to lower the cost of broadband buildouts and encourage private-sector companies to expand broadband infrastructure. Through the American Broadband Initiativeâa comprehensive effort to stimulate increased private sector investment in broadband âthe NTIA has been working with other federal agencies, such as the Department of the Interior and the Department of Homeland Security, to streamline the federal permitting process and make it easier for network builders to access federal assets and rights-of-way. Arizona's Smart Highway Corridor Program intends to leverage the highway system as a route for broadband infrastructure. On January 13, 2020, Arizona Governor Doug Ducey announced nearly $50 million in funding to enable the Arizona Department of Transportation to install more than 500 miles of broadband conduit and fiber optic cable along designated highway segments in rural areas of the state. The new corridors will enable future broadband capacity in Arizona's rural and tribal areas. While broadband accessibility across the United Statesâespecially in rural areasâhas been a continuing challenge, another challenge facing communities is that of barriers to broadband adoption, even where service is available. Broadband adoption can be defined as residential subscribership to high-speed internet access. Barriers that may prevent consumers and businesses from adopting broadband include the affordability of broadband subscriptions, a lack of awareness of the benefits broadband can bring, age, unfamiliarity with digital devices and digital skills, and a lack of training in how to use such devices and the services they enable. California's Broadband Adoption Fund is a $20 million program created in 2017 through Assembly Bill 1665. The Fund's purpose is to assist communities with limited broadband adoption by providing grants to increase publicly available or after-school broadband access and digital inclusion, such as grants for digital literacy training programs and public education. The California Public Utilities Commission gives preference to programs and projects in communities with demonstrated low broadband access, including low-income communities, senior citizen communities, and communities facing socioeconomic barriers to broadband adoption. Pinpointing where broadband is and is not available in the United States has been an ongoing challenge. Current data on national broadband availability is provided by private telecommunications providers, collected by the FCC, and displayed on the FCC's Fixed Broadband Deployment Map. Difficulty in accurately mapping broadband availability has been attributed to a number of factors, including the adequacy of census block data, the lack of independent data validation outside the FCC, and the absence of a challenge process for consumers and others who believe that the Fixed Broadband Deployment Map may overstate availability in their area. In early 2019, it came to the FCC's attention that inaccuracies in the Fixed Broadband Deployment Map's data may cause broadband deployment to be overstated. The Fixed Broadband Deployment Map may indicate that areas have access to broadband when in reality, they do not. Inaccurate data on broadband deployment could lead to overbuilding in areas that currently have broadband, while leaving other areas underserved or unserved. The FCC has taken steps to address broadband mapping issues in the forthcoming Digital Opportunity Data Collection, but it may be several years before a more accurate and granular national broadband map is realized. In the interim, states have been developing their own broadband maps to determine the actuality of broadband availability in their communities. In 2018, the Georgia legislature passed the Achieving Connectivity Everywhere (ACE) Act, which seeks to obtain an accurate representation of where broadband connectivity is lacking within the state. To achieve this, the Georgia Broadband Deployment Initiative developed a database of all premises located within three targeted pilot counties: Elbert, Lumpkin, and Tift. Information was obtained from county and municipal officials to identify which premises were commercial, single-family, or multi-dwelling units. Next, the State of Georgia developed specific agreements to obtain data on locations that receiveÂ service from the seven companies providing broadbandÂ in the pilot counties. Georgia's pilot program differs from the FCC's approach because it surveys whether individual locations have access to broadband rather than collecting data only by census block. The three-county pilot showed that the FCC maps misidentified about half of the locations without broadband. A statewide map for Georgia is expected to be completed in June 2020. One of the first steps in laying the foundation for broadband access may be to determine broadband needs that are unique to a state or community. This analysis can lead to a long-term vision and goals, help with the maximization of resources, and lay a framework for a state or community feasibility study. A feasibility study can aid the state or community in determining how best to invest in broadband, evaluating ways to deploy new broadband networks, and defining the pros and cons of a proposed approach. Questions that may be considered include What problem or problems are you are trying to solve? Are you trying to bring broadband to parts of your community that are unserved, underserved, or both? Do you have a digital equity and utilization problem? Are consumers in your community dissatisfied with their current internet provider? Â  In Vermont, the Department of Public Service's Broadband Innovation Grant program is designed to help communities conduct feasibility studies and create business plans related to the deployment of broadband in rural, unserved, and underserved areas within the state. The Vermont state legislature approved $700,000 in grant funding to the Department in Act 79 ( H.R. 513 ) of 2019. The program awards up to $60,000 per grant to eligible grantees, which include -profit organizations, for-profit businesses, cooperatives, distribution utilities,Â communications union districts, and other government entities. Grantees are to deliver a feasibility study that proposes new broadband systems with minimum speeds of 25/3 Mbps in unserved or underserved areas. If a study indicates that a project could become cash-flow positive within three years, the Department is to request an actionable business plan from the grantee. Studies are to conclude within six months of receipt of the award and findings are to be reported to the Commissioner of Public Service. According to the National Digital Inclusion Alliance (NDIA), a nonprofit community engagement organization, digital equity is a condition in which all individuals and communities have the information technology capacity needed for full participation in society, democracy, and the economy. Steps taken to achieve this are known as digital inclusion, which NDIA defines as including access to affordable, robust broadband internet service; internet-enabled devices that meet the needs of the user; digital literacy training; quality technical support; and applications and online content designed to enable and encourage self-sufficiency, participation, and collaboration. Digital equity issues vary by region, and, as a result, so too does the work that state and local governments are doing to address them. The Detroit Department of Innovation and Technology, a department within the City of Detroit government, envisions making its efforts a national model for digital inclusion. According to Joshua Edmonds, Detroit Director of Digital Inclusion The recipe for successful digital inclusion in every city boils down to four things: partnerships, funding, engaged residents, and political will. I believe Detroit has every one of those points in excess. I'm excited to build relationships and do something bold. The Director of Digital Inclusion is to work with the Detroit Department of Innovation and Technology to develop a citywide strategy to expand computer and internet access to Detroiters who lack it, as well as develop methods to track and evaluate progress. The Director is to also work with the city's Office of Development and Grants to identify possible funding. According to the City of Detroit, action items include a three-pronged approach to bring change to the city by providing internet access, devices, and digital skills to residents (see Table 1 ). The FCC's definition of broadband is 25/3 Mbps, which is sufficient for activities such as telecommuting and streaming high definition video. However, higher speedsâsuch as gigabit speedsâmay allow for multiple devices to simultaneously access data-intensive online content through a single network access point. A gigabit connection transmits data at one billion bits per second, which translates to lower latency (i.e., less lag time) when streaming video, video gaming, or using immersive media such as virtual reality. The state of North Dakota is using a state-run network to provide gigabit access. According to North Dakota Governor Doug Burgum's office, in July 2019, North Dakota became the first state in the nation to deliver one-gigabit service to all K-12 schools within the state. This was the result of an effort announced in March 2018 by the governor for a 100-gigabit upgrade to STAGEnet, which is the state government's closed broadband network. This upgrade allowed for one-gigabit connectivity to all K-12 schools, higher education institutions, and government agencies state-wide. The upgrade was completed in collaboration with the North Dakota Information Technology Department (ITD) and Dakota Carrier Network's 14 owner companies. Many schools assign students homework online; however, some students have a difficult time completing these assignments because of lack of access to broadband at home. The cost of broadband service and gaps in its availability create obstacles in urban areas and rural communities alike. As K-12 officials in many state close schools and shift classes and assignments online due to the spread of the new coronavirus (COVID-19) , they confront the reality that some students do not have reliable access to the internet at homeâparticularly those who are from lower-income households. FCC Commissioner Jessica Rosenworcel stated I have heard from students in Texas who do homework at fast food restaurants with friesâjust to get a free Wi-Fi signal. I have heard from students in Pennsylvania who make elaborate plans every day to head to the homes of friends and relatives just to be able to get online. I have heard from high school football players in rural New Mexico who linger in the school parking lot after games with devices in the pitch-black dark because it is the only place they can get a reliable connection. These kids have grit. But it shouldn't be this hard. Because today no child can be left offlineâdeveloping digital skills is flat-out essential for education and participation in the modern economy. To help address the homework gap, Caldwell County, NC, has piloted the first program in Western North Carolina to place Wi-Fi access on school buses. The Caldwell Education Foundation, along with Google, spearheaded and funded the program. In addition to Wi-Fi on buses, Chromebooks are available free of charge for any students to use while riding. The school bus initiative allows students in rural areas with long travel times to and from school to do online homework and computer exercises while commuting. Additionally, there are plans to park the Wi-Fi-equipped school buses in key areas, when they are not transporting students, to create Wi-Fi hot spots to enable local resident access to the internet. Should Congress choose to consider state broadband initiatives, a variety of potential options would be available. Congress has implemented multiple broadband programs at the federal level to help expand broadband access, but state broadband initiatives could provide templates for any future federal broadband programs. Congress may choose to expand aspects of current federal broadband initiatives to incorporate themes states have addressed, or Congress may choose to develop new broadband initiatives. As there is no single broadband initiative that solves the digital divide issue, Congress may hold hearings on state initiativesâto examine their successes and challenges and to consider possible approaches to adopt at the federal level. Additionally, Congress may consider enabling a universal method for states and localities to share ideas with Congress or federal agencies. As state experiences demonstrate, broadband needs can vary, and so can initiatives to address them. Congress may seek to develop one or more pilot broadband initiatives to test the feasibility of different approaches before developing and funding a nationwide program. These pilot initiatives might tie funding to specific goalsâsuch as adoption or digital inclusionâin contrast to federal programs that currently mostly fund broadband deployment. Congress may consider providing federal funding and resources for broadband initiatives directly to the states. An infusion of federal funding and resources directed toward state initiatives could result in the expansion and sustainability of state efforts. Attaching federal funding to state broadband initiatives, as well as conducting federal oversight, could aid states in maximizing their potential. As expressed by the Director of Digital Inclusion for the City of Detroit: These are examples of how local leadership has called on industry to fill in where the federal government is silent. In Detroit, we have developed public-private partnerships without any government funding, but it's an unsustainable model. We need federal resources to continue our work. If we were to receive additional funding, we could do more robust outreach, and incentivize more localized funding from philanthropic organizations. Although continuing funding from some source would be necessary to build out broadband infrastructure and implement broadband initiatives, concerns have been expressed that some areas may receive duplicative funding from multiple broadband programsâpotentially resulting in overbuild in some areas while other areas remain unserved. This challenge is highlighted by the implementation of the FCC's Rural Digital Opportunity Fund (RDOF), when the Commission sought to exclude from RDOF any area that the Commission \"know[s] to be awarded funding through the U.S. Department of Agriculture's ReConnect Program or other similar federal orÂ state broadband subsidy programs, or those subject to enforceable broadband deployment obligations.\" As stated by Harold Feld, Senior Vice President at Public Knowledge Read broadly, this surprise last-minute change impacts almost every state in the Union. Nearly every state either has its own broadband subsidy program, receives funds under the Department of Agriculture ReConnect program, or receives other federal funding for broadband. Even read narrowly, this would appear to cut off millions of unconnected rural Americans from a program designed explicitly to help them. According to a Pew Report published in December 2019, 35 states have funds that directly subsidize broadband. Numerous other states have funds that might qualify as a 'subsidy' or 'enforceable broadband deployment obligations,' depending on how the FCC Order defines these terms. Another aspect of the debate regarding duplication of funds and potential overbuild is targeting funding to areas that are truly unserved by broadband, versus directing funds to areas already served by an existing provider. FCC Commissioner Michael O'Rielly stated I have been closely following all federal broadband funding programs, including the ReConnect's grant and loan disbursements, to ensure that funds are distributed as efficiently as possible and directed foremost to those communities lacking any broadband service, rather than those areas already served by an existing provider. To that end, I have voiced concerns to the Rural Utilities Service (RUS) over the use of scarce ReConnect Program funding to overbuild existing networks, whether built through private investment or via government subsidies. Rather than targeting scarce federal dollars to the truly unserved, the new 90 percent [unserved] threshold will likely lead to subsidized overbuilding and leave the most remote areas without service. There is a risk that provisions in federal broadband programs that seek to address duplication may unintentionally exclude unserved or underserved communities. In considering policies for future broadband programs, Congress may consider possible conflicts between ensuring that funding is not duplicated and avoiding the exclusion of areas that remain unserved. States have been attempting to bridge the digital divide through their own broadband initiatives. While the majority of federal funding addresses network deployment, state broadband initiatives may demonstrate that other approaches can be complementary. Whether Congress decides to enact new broadband funding or initiatives remains to be seen; however, there appears to be an opportunity for states to share lessons learned from their approaches with Congress and/or federal agencies. Leveraging the wide variety of state policies and initiatives as potential models for federal broadband initiatives could have the potential to help close the digital divide. Aside from annual appropriations legislation, the following are selected bills introduced in the 116 th Congress relating to the state broadband issues discussed in this report. H.R. 1328 (Tonko), introduced on February 25, 2019, as the Advancing Critical Connectivity Expands Service, Small Business Resources, Opportunities, Access, and Data Based on Assessed Need and Demand Act (ACCESS BROADBAND Act), would establish the Office of Internet Connectivity and Growth within NTIA at the Department of Commerce. The Office would provide outreach to communities seeking improved broadband connectivity and digital inclusion; track federal broadband dollars; and facilitate streamlined and standardized applications for federal broadband programs. Referred to the Committee on Energy and Commerce. Passed by the House on May 8, 2019. H.R. 1508 (Blumenauer), introduced on March 5, 2019, as the Move America Act of 2019, would amend the Internal Revenue Code of 1986 to provide for bonds and credits to finance infrastructure, including rural broadband service infrastructure. Referred to the Committee on Ways and Means. H.R. 1586 (Butterfield), introduced on March 7, 2019, as the Building Resources Into Digital Growth and Education Act of 2019 (BRIDGE Act of 2019), would establish a digital network technology program within NTIA which would award grants, cooperative agreements, and contracts to eligible institutions to assist such institutions in acquiring, and augmenting use by such institutions of, broadband internet access service to improve the quality and delivery of educational services provided by such institutions. Referred to the Referred to the Subcommittee on Communications and Technology. H.R. 1693 (LujÃ¡n), introduced on March 12, 2019, would require the FCC to make the provision of Wi-Fi access on school buses eligible for E-rate support. Referred to the Subcommittee on Communications and Technology. H.R. 2601 (Peterson), introduced on May 8, 2019, as the Office of Rural Telecommunications Act, would direct the FCC to establish the Office of Rural Telecommunications, which would coordinate with RUS, NTIA, and other federal broadband programs. Referred to the Subcommittee on Communications and Technology. H.R. 2661 (Tipton), introduced on May 10, 2019, as the Reprioritizing Unserved Rural Areas and Locations for Broadband Act of 2019 (RURAL Broadband Act of 2019), would amend the Rural Electrification Act of 1936 to restrict the use of RUS grants or loans to deploy broadband infrastructure that would overbuild or otherwise duplicate existing broadband networks. Referred to the Subcommittee on Commodity Exchanges, Energy, and Credit. H.R. 2921 (Kilmer), introduced on May 22, 2019, as the Broadband for All Act, would amend the Internal Revenue Code of 1986 to provide a tax credit to consumers to reimburse a portion of the cost of broadband infrastructure serving limited-broadband districts. Referred to the Committee on Ways and Means. H.R. 4127 (LujÃ¡n), introduced on July 30, 2019, as the Broadband Infrastructure Finance and Innovation Act of 2019, would establish a broadband infrastructure finance and innovation program to make available loans, loan guarantees, and lines of credit for the construction and deployment of broadband infrastructure. Referred to the Subcommittee on Communications and Technology. H.R. 4283 (Pence), introduced on September 11, 2019, as the Broadband Interagency Coordination Act of 2019, would require federal agencies with jurisdiction over broadband deployment to enter into an interagency agreement related to certain types of funding for broadband deployment. Referred to the Subcommittee on Commodity Exchanges, Energy, and Credit. H.R. 5243 (Meng), introduced on November 21, 2019, as the Closing the Homework Gap Through Mobile Hotspots Act, would establish a mobile hotspot grant program to provide grants to eligible institutions. A grant provided to an eligible institution would be used to provide a hotspot device to an enrolled student, or the family or guardian of an enrolled student, which would be portable and not contain a data limitation. Referred to the Subcommittee on Communications and Technology.Â  S. 146 (Hoeven), introduced on January 16, 2019, as the Move America Act of 2019, would amend the Internal Revenue Code of 1986 to provide for bonds and credits to finance infrastructure, including rural broadband service infrastructure. Referred to the Committee on Finance. S. 454 (Cramer), introduced on February 12, 2019, as the Office of Rural Broadband Act, would establish an Office of Rural Broadband within the FCC that would coordinate with RUS, NTIA, and other FCC broadband-related activities. Referred to the Committee on Commerce, Science, and Transportation. S. 738 (Udall), introduced on March 12, 2019, would require the FCC to make the provision of Wi-Fi access on school buses eligible for E-rate support. Referred to the Committee on Commerce, Science, and Transportation. S. 1046 (Cortez Masto), introduced on April 4, 2019, as the Advancing Critical Connectivity Expands Service, Small Business Resources, Opportunities, Access, and Data Based on Assessed Need and Demand (ACCESS BROADBAND Act), would establish the Office of Internet Connectivity and Growth within NTIA at the Department of Commerce. The Office would provide outreach to communities seeking improved broadband connectivity and digital inclusion, track federal broadband dollars, and facilitate streamlined and standardized applications for federal broadband programs. Referred to the Committee on Commerce, Science, and Transportation. S. 1167 (Murray), introduced April 11, 2019, as the Digital Equity Act of 2019, would establish an NTIA state-based and competitive grant programs to support national digital inclusion, digital equity, and broadband adoption programs. Referred to the Committee on Commerce, Science, and Transportation. S. 1294 (Wicker), introduced on May 2, 2019, as the Broadband Interagency Coordination Act of 2019, would require federal agencies with jurisdiction over broadband deployment to enter into an interagency agreement related to certain types of funding for broadband deployment. Placed on Senate Legislative Calendar under General Orders. S. 2018 (Collins), introduced on June 27, 2019, as the American Broadband Buildout Act of 2019, would provide federal matching funding for state-level broadband programs. Referred to the Committee on Commerce, Science, and Transportation. S. 2344 (Peters), introduced on July 30, 2019, as the Broadband Infrastructure Finance and Innovation Act of 2019, would establish a broadband infrastructure finance and innovation program to make available loans, loan guarantees, and lines of credit for the construction and deployment of broadband infrastructure. Referred to the Committee on Commerce, Science, and Transportation. S. 2385 (Wyden), introduced on July 31, 2019, as the Broadband Internet for Small Ports Act, would amend the Rural Electrification Act of 1936 to improve access to broadband telecommunications services in rural areas, including by encouraging the provision of broadband loans and grants. Referred to the Committee on Agriculture, Nutrition, and Forestry. S. 3094 (Merkley), introduced on December 18, 2019, as the Community Broadband Mapping Act, would authorize the Rural Utilities Service to make grants to government or telecommunications entities that serve a rural area (with less than 25,000 population) to foster data collection about where broadband infrastructure is located and which homes have non-satellite broadband service. Referred to the Committee on Agriculture, Nutrition, and Forestry. S. 3362 (Van Hollen), introduced on February 27, 2020, as the Homework Gap Trust Fund Act, would establish the Homework Gap Trust Fund, administered by the Federal Communications Commission (FCC), to provide funding for measures to close the digital divide and promote digital equality with respect to school-aged children. Referred to the Committee on Commerce, Science, and Transportation.", "summary": "Access to high-speed internet, known as broadband, is becoming increasingly essential to daily life as more applications and activities move online. This has become particularly apparent during the coronavirus (COVID-19) pandemic, as employers in some sectors transitioned their workers from on-site work to telework and schools migrated their students from classrooms to distance learning. These shifts may seem clear-cut, but many areas of the United Statesâparticularly rural areasâhave either limited or no access to broadband infrastructure. Additionally there are citizens in areas with high broadband penetration who are unable to access it due to socioeconomic factors. The gap between those who have access to broadband and those who do not is referred to as the digital divide. While there is broadband penetration in many areas of the United States, 21.3 million Americans lack access to a connection that enables a download rate of at least 25 megabits per second (Mbps) and an upload rate of 3 Mbps, according to the Federal Communications Commission's (FCC's) 2019 Broadband Deployment Report . Federal agencies such as the FCC, the National Telecommunications and Information Administration (NTIA, in the Department of Commerce), and the Rural Utilities Service (RUS, in the U.S. Department of Agriculture) have directed resources to help bridge the digital divideâchiefly for broadband infrastructure buildout. While broadband infrastructure addresses a large component of the digital divide by increasing availability, there are additional geographic, social, and economic factors that affect broadband adoption, even where it is available. Major examples of such factors include the cost of internet service and devices and digital literacy skills. To further assist in closing the digital divide, states have been developing their own broadband programs and initiatives. Although many state broadband initiatives focus on building out broadband infrastructure, states have also been considering other factors. As each state approaches broadband access and deployment differently, this report analyzes selected state-level and local initiatives that have tried different approachesâapproaches that may serve as models for future federal broadband initiatives. These include initiatives that address broadband mapping, broadband feasibility, digital equity and digital inclusion, gigabit broadband initiatives, and the homework gap. Among the options Congress may consider are holding hearings with state officials involved in state broadband initiatives to hear their stories, successes, and lessons learned; developing pilot broadband initiatives to evaluate the feasibility of different approaches; providing additional funding and oversight for state initiatives to help improve their sustainability; and finding ways to address duplicative funding while not unintentionally exacerbating the exclusion of unserved and underserved communities. Whether Congress decides to enact new broadband funding or initiatives remains to be seen; however, there appears to be an opportunity for states to share lessons learned from their approaches to closing the digital divide. Numerous bills addressing aspects of the digital divide other than broadband infrastructure have been introduced in the 116 th Congress, including the Homework Gap Trust Fund Act ( S. 3362 ) introduced on February 27, 2020, and the Closing the Homework Gap Through Mobile Hotspots Act ( H.R. 5243 ), introduced on November 21, 2019. Bills addressing the coordination of federal agencies and tracking of federal funding for broadband include Broadband Interagency Coordination Act of 2019 ( H.R. 4283 ) introduced on September 11, 2019, and the Advancing Critical Connectivity Expands Service, Small Business Resources, Opportunities, Access, and Data Based on Assessed Need and Demand Act ( H.R. 1328 ), passed by the House on May 8, 2019.", "document_type": "crs"}
{"report": "T he Supreme Court term that began on October 1, 2018, was a term of transition, with the Court issuing a number of rulings that, at times, signaled but did not fully adopt broader transformations in its jurisprudence. The term followed the retirement of Justice Kennedy, who was a critical vote on the Court for much of his 30-year tenure and who had been widely viewed as the Court's median or \"swing\" Justice. In nine out of the last 12 terms of the Roberts Court, he voted for the winning side in a case more often than any of his colleagues. Justice Brett Kavanaugh replaced Justice Kennedy one week into the October 2018 Term. The Court's newest member had served on the U.S. Court of Appeals for the District of Columbia (D.C. Circuit) for over a decade before his elevation to the Supreme Court. Empirical evidence suggests the Court can change with the retirement and replacement of one its members. As a result, the question looming over the October 2018 Term was how Justice Kennedy's departure and Justice Kavanaugh's arrival would alter the Court's jurisprudence going forward. Indeed, one member of the Court, Justice Ruth Bader Ginsburg, predicted Justice Kennedy's retirement to be \"the event of greatest consequence for the current Term, and perhaps for many Terms ahead.\" Notwithstanding the alteration in the Court's makeup, observers have generally agreed that the October 2018 Term largely did not produce broad changes to the Court's jurisprudence. Although a number of cases presented the Court with the opportunity to rethink various areas of law, the Court largely declined those invitations. For instance, the Court in Gamble v. United States opted not to overrule a 170-year old doctrine concerning the reach of the Double Jeopardy Clause of the Fifth Amendment. In other cases, a majority of the Justices did not resolve potentially far-reaching questions, resulting in the Court either issuing more narrow rulings or simply not issuing an opinion in a given case. Nonetheless, much of the low-key nature of the October 2018 Term was a product of the Court's decisions to not hear certain matters. For instance, save for a three-page, per curiam opinion upholding an Indiana law regulating the disposal of fetal remains, the Court refrained from hearing cases touching on the subject of abortion during the October 2018 Term. The Court also declined to review cases addressing a number of other high-profile matters, including a challenge to the federal ban on bumpstocks, a dispute over whether business owners can decline on religious grounds to provide services for same-sex weddings, a case concerning President Trump's authority to impose tariffs on imported steel, and a challenge to the continued detainment of enemy combatants at Guantanamo Bay. And for a number of closely watched cases it did agree to hear, the Court opted to schedule arguments for the October 2019 Term, including several cases concerning whether federal law prohibits employers from discriminating on the basis of sexual orientation or gender identity and the lawfulness of the Department of Homeland Security's decision to wind down the Deferred Action for Childhood Arrivals (DACA) policy. While the Supreme Court's latest term generally did not result in wholesale changes to the law, its rulings were nonetheless important, in large part, because they may provide insight into how the Court will function following Justice Kennedy's retirement. For the fourth straight year at the Court, the number of opinions decided by a bare majority increased, with 29% of the Court's decisions being issued by a five-Justice majority. Some of these decisions saw the Court divided along what are perceived to be the typical ideological lines, with Justices appointed by Republican presidents on one side and those appointed by Democrats on the other. These 5-4 splits occurred in several appeals concerning the death penalty and in three cases where the Court expressly or implicitly overturned several of the Court's previous precedents regarding sovereign immunity, property rights, and redistricting. Nonetheless, such divisions proved to be the exception rather than the rule in closely divided cases during the last term. Of the 21 cases decided by a single vote, seven cases saw 5-4 splits between what have been viewed to be the conservative and liberal voting blocs on the Court. Instead, the October 2018 Term witnessed a number of heterodox lineups at the Court. For instance, Justice Kavanaugh joined the perceived liberal wing of the Court in a major antitrust dispute, and Justice Gorsuch voted with that same voting bloc in several cases involving Indian and criminal law. Justice Breyer joined the more conservative wing of the Court in the term's biggest Fourth Amendment case. And, as discussed in more detail below, in cases concerning the inclusion of a citizenship question on the 2020 Census questionnaire and judicial deference afforded to interpretations of agency regulations, the Chief Justice voted with the perceived liberal voting bloc. Underscoring the new dynamics of the Roberts Court, three Justices with fairly distinct judicial approaches voted most frequently with the majority of the Court last term: Justice Kavanaugh (voting with the majority 88% of the time), Chief Justice Roberts (85%), and Justice Kagan (83%). Collectively, the voting patterns of the October 2018 Term have led some legal commentators to suggest that the Court has transformed from an institution that was largely defined by the vote of Justice Kennedy to one in which multiple Justices are now the Court's swing votes. Beyond the general dynamics of October 2018 Term, the Court issued a number of opinions of particular importance for Congress. While a full discussion of every ruling from the last Supreme Court term is beyond the scope of this report, Table 1 and Table 2 provide brief summaries of the Court's written opinions issued during the October 2018 Term. The bulk of this report highlights five notable opinions from the October Term 2018 that could affect the work of Congress: (1) Kisor v. Wilkie , which considered the continued viability of the Auer-Seminole Rock doctrine governing judicial deference to an agency's interpretation of its own ambiguous regulation; (2) Department of Commerce v. New York , a challenge to the addition of a citizenship question to the 2020 census questionnaire; (3) Rucho v. Common Cause , which considered whether federal courts have jurisdiction to adjudicate claims of excessive partisanship in drawing electoral districts; (4) American Legion v. American Humanist Association , a challenge to the constitutionality of a state's display of a Latin cross as a World War I memorial; and (5) Gundy v. United States , which considered the scope of the long-dormant nondelegation doctrine. In Kisor v. Wilkie , the Supreme Court considered whether to overrule the Auer doctrine (also known as the Seminole Rock doctrine), which generally instructs courts to defer to agencies' reasonable constructions of ambiguous regulatory language. In a 5-4 decision, the Supreme Court upheld the deference doctrine on stare decisis grounds. However, while the Court in Kisor declined to overrule Auer , it emphasized that the doctrine applies only in limited circumstances. These limitations on the doctrine's scope could bear consequences for future courts' review of agency action and affect the manner in which agencies approach their decisionmaking. Background: The Supreme Court has established several doctrines that guide judicial review of agency action. Perhaps the most well known is the Chevron doctrine, which generally instructs courts to defer to an agency's reasonable interpretation of an ambiguous statute that it administers. Auer deference, which takes its name from the Supreme Court's 1997 decision in Auer v. Robbins , has roots in the Court's 1945 decision in Bowles v. Seminole Rock & Sand Co. Auer generally instructs courts to defer to an agency's interpretation of ambiguous regulatory language \" unless ,\" as the Court framed the test in Seminole Rock , that interpretation \"is plainly erroneous or inconsistent with the regulation.\" While Chevron deference applies to agency interpretations of statutes that are contained in agency statements that have the force of law (e.g., regulations promulgated following notice-and-comment rulemaking procedures), Auer deference has been applied to a range of nonbinding agency memoranda and other materials that construe ambiguous regulatory language. While the doctrine has long-standing roots, in the wake of Auer , several Members of the Court began to criticize the doctrine on policy, statutory, and constitutional grounds. The Kisor case arose after the Department of Veterans Affairs (VA) denied James L. Kisor's request for retroactive disability compensation benefits. The agency determined that records he supplied were not \" relevant \" within the meaning of the governing regulation . On appeal, the Federal Circuit held that the term \"relevant\" as used in that regulation was ambiguous and, applying Auer deference to the VA's interpretation, affirmed the agency's decision. The Supreme Court granted the petitioner's request for review to consider whether to overturn Auer . Supreme Court's Decision: While the Supreme Court unanimously agreed to vacate the Federal Circuit's decision, the Justices fractured on whether to overrule Auer , with a bare majority voting to uphold it. Writing on behalf of five Members of the Court, Justice Kaganâjoined by Chief Justice Roberts and Justices Breyer, Ginsburg, and Sotomayorâgrounded the decision to uphold Auer on stare decisis principles. The doctrine of stare decisis typically leads the Court to follow rules set forth in prior decisions unless there is a \" special justification \" or \" strong grounds \" for overruling that precedent. Justice Kagan concluded that the petitioner's arguments did not justify abandoning Auer deference in light of the extensive body of precedent, going back at least to Seminole Rock , which supported the continued use of a doctrine that \"pervades the whole corpus of administrative law.\" The Kisor majority also expressed concern that abandonment of Auer deference could result in litigants revisiting any of the myriad cases that applied the doctrine. And, the Court continued, \" particularly ' special justification [ s], ' \" which had not been offered by the petitioner, were necessary to overturn Auer , given that Congress has left the doctrine undisturbed for so long, despite the Court's repeated assertions that the doctrine rests on a presumption \"that Congress intended for courts to defer to agencies when they interpret their own ambiguous rules.\" Although the Court did not overrule Auer , it took \"the opportunity to restate, and somewhat expand on , \" the doctrine's limitations. In so doing, the Court formulated a multistep process for determining whether Auer deference should be afforded to an agency's interpretation of a regulation. First, a reviewing court may defer under Auer only after determining that the regulation is \"genuinely ambiguous,\" a conclusion the court may reach only after \" exhaust [ing] all the ' traditional tools ' of construction .\" Second, even if ambiguity exists, Auer will not apply unless the court determines that the agency's interpretation is \" reasonable \"âthat is, the interpretation \"must come within the zone of ambiguity\" that the court uncovered in its interpretation of the regulation. And third, even if a court determines that the agency has reasonably interpreted a genuinely ambiguous regulation, it must still independently assess \" whether the character and context of the agency interpretation entitles it to controlling weight .\" Though the Court cautioned that this examination is unable to be reduced \"to any exhaustive test,\" the Court indicated that Auer deference shall not extend to interpretations that (1) are not the official or authoritative position of the agency; (2) do not somehow \"implicate [ the agency ' s ] substantive expertise \"; or (3) do not represent the agency ' s \" fair and considered judgment .\" The Court remanded the case to the Federal Circuit after concluding that the court of appeals did not adequately assess whether the regulation at issue was ambiguous, nor \"whether the [VA's] interpretation is of the sort that Congress would want to receive deference.\" Two portions of Justice Kagan's opinion defended Auer on grounds other than stare decisis principles but did not gain the support of a majority of the Court. Joined by Justices Breyer, Ginsburg, and Sotomayor, Justice Kagan argued that Auer deference follows from \"a presumption that Congress would generally want [agencies] to play the primary role in resolving regulatory ambiguities.\" Justice Kagan wrote that this presumption was justified on several grounds, including agencies' significant substantive expertise, the relative political accountability of agencies subordinate to the President, and the view that the agency responsible for issuing a regulation is often best situated to determine the meaning of that regulation. The four Justices also disagreed with the petitioner's s tatutory, policy, and constitutional arguments for overrulin g Auer . Concurring Opinions: Justice Gorsuch authored an opinion in which he disagreed with the majority's refusal to overrule Auer . Justice Gorsuch agreed with the petitioner that Auer violates the Constitution, arguing that the doctrine runs afoul of the separation of powers by demanding that courts accede to the legal judgments of the executive branch and placing \"the powers of making, enforcing, and interpreting laws . . . in the same hands.\" He also agreed with the petitioner that Auer violates the judicial review and rulemaking provisions of the Administrative Procedure Act (APA). Instead of affording deference under Auer , Justice Gorsuch argued that judges should employ the so-called \" Skidmore doctrine \" when attempting to discern the meaning of an agency regulation. Under that doctrineânamed after the Court's 1944 decision in Skidmore v. Swift & Co. âcourts independently interpret the text of a regulation, but may accord nonbinding weight to an administrative interpretation, consistent with \"the thoroughness evident in its consideration, the validity of its reasoning, its consistency with earlier and later pronouncements, and all those factors which give it power to persuade.\" The Chief Justice, who provided the crucial fifth vote to uphold Auer , authored a partial concurrence contending that the \"distance\" between the controlling portion of Justice Kagan's opinion and the position put forth by Justice Gorsuch \"is not as great as it may initially appear.\" He noted that the limitations on Auer deference announced by the Kisor majorityâthat an interpretation must, among other things, be based on the agency's \"authoritative, expertise-based, and fair and considered judgment\"âwere not so different from those factors that Justice Gorsuch believed may persuade a court to follow an interpretation under Skidmore . And, perhaps anticipating a future legal challenge to the continuing viability of the Chevron doctrine, the Chief Justice also wrote that the Auer and Chevron doctrines are analytically distinct, maintaining that the Court's refusal to overrule Auer had no bearing on the distinct issues associated with Chevron . Implications for Congress: While the Court did not overrule the Auer doctrine in Kisor , the framework it elucidated for assessing whether deference is appropriate may provide further guidance and, perhaps, constrain lower courts deciding whether to defer to an agency's regulatory interpretation. Legal commentators have drawn various conclusions about Kisor 's potential impact, but it ultimately remains to be seen whether courts will be more hesitant to conclude that deference is warranted after Kisor , and whether the Kisor Court's elaborations on the limits on Auer deference will inform agency decisionmaking. In any event, the Court in Kisor made clear that Auer deference is not constitutionally required , and Congress may opt to memorialize, abrogate, or modify application of the doctrine by statute. For example, Congress could amend the judicial review provision of the APA to explicitly provide that judicial review of agency interpretations of regulations shall be accorded no deference (i.e., shall be reviewed \"de novo\") or instead be subject to some other standard . More narrowly, Congress could also provide in particular statutes governing specific agency actions whether Auer deference or some other standard of judicial review should be applied to regulatory interpretations. On the last day that the Supreme Court sat for the October 2018 Term, the Court issued its decision in Department of Commerce v. New York âa case involving the legal challenges to the decision by the Secretary of the Department of Commerce, Wilbur Ross, to add a citizenship question to the 2020 census questionnaire. The Court's opinion resolved important questions of constitutional, statutory, and administrative law. The Court concluded that adding a citizenship question to the 2020 census questionnaire did not violate the Enumeration Clause of the U.S. Constitution or the Census Act. But the Court alsoâat least temporarilyâprohibited the Department of Commerce from adding the citizenship question to the 2020 census questionnaire because it determined that Secretary Ross had violated the APA by failing to disclose his actual reason for doing so. Background : Article I, Â§Â 2 of the U.S. Constitution, as amended by the Fourteenth Amendment, requires Congress to take an \"actual Enumeration\" of \"the whole Number ofÂ . . . persons\" in each State \"everyÂ . . . Term of ten Years, in such Manner as [Congress] shall by Law direct.\" Through the Census Act, Congress delegated this responsibility to the Secretary of Commerce. That law requires the Secretary of Commerce to \"take a decennial census of population\" and grants the Secretary discretion to do so \"in such form and content as he may determine\" and to \"obtain such other census information as necessary.\" The Census Act places limits on how the Secretary of Commerce may conduct the census. Though the Secretary is authorized to \"determine the inquires\" and to \"prepare questionnaires\" for obtaining demographic or other information, Section 6(c) of the Census Act instructs the Secretary to first attempt to obtain such information from federal, state, or local government administrative sources \"[t]o the maximum extent possible\" and \"consistent with the kind, timeliness, quality and scope\" of the information needed. Moreover, to facilitate congressional oversight, Section 141(f) of the act directs the Secretary to \"submit [reports] to the [appropriate] committees of Congress\" (1) identifying the \"subjects proposed to be included\" and \"types of information to be compiled\"; (2) describing \"the questions proposed to be included in [the] census\"; and (3) if \"new circumstances exist,\" modifying the prior two reports. On March 26, 2018, Secretary Ross issued a memorandum stating that the Census Bureau would add a citizenship question to the 2020 decennial census questionnaire. Secretary Ross stated that he made this decision because the Department of Justice (DOJ) had asked that the citizenship question be added to the 2020 census to obtain citizenship data that would be used for enforcement of Section 2 of the Voting Rights Act (VRA). In the memorandum, Secretary Ross explained that he had considered four options in deciding how to respond to DOJ's request: (A) not adding the citizenship question; (B) adding the citizenship question; (C) relying solely on administrative records to obtain citizenship data; and (D) relying on both administrative records and a citizenship question to obtain citizenship data. While the Census Bureau concluded that Option C would produce the most accurate citizenship information because noncitizens and Hispanics would be less likely to respond to a census questionnaire including a citizenship question, Secretary Ross chose option D. He stated that reliance on administrative records alone was \"a potentially appealing solution,\" but noted that it would provide \"an incomplete picture\" because the Census Bureau did not have a complete set of administrative records for the entire population. In response to concerns that \"reinstatement of the citizenship question . . . would depress response rate[s]\" among Hispanics and noncitizens, Secretary Ross stated the Department of Commerce had \"not [been] able to determine definitively how inclusion of a citizenship questionÂ . . . will impact responsiveness\" and determined that, in any event, \"the value of more complete and accurate dataÂ derived from surveying the entire population outweighs such concerns.\" Secretary Ross's decision was challenged in federal district courts in California, Maryland, and New York. Two of these courts concluded that the addition of a citizenship question violated the Enumeration Clause of the U.S. Constitution because \"its inclusion would materially harm the accuracy of the census without advancing any legitimate governmental interest.\" Two courts also determined that Secretary Ross violated Sections 6(c) and 141(f) of the Census Act. As to Section 6, those courts found that administrative records alone would produce more accurate citizenship data than when used in combination with a citizenship question, and therefore the addition of a citizenship question would violate Section 6(c)'s directive to rely on administrative records \"[t]o the maximum extent possible.\" The same two courts also determined that Secretary Ross violated Section 141(f) because he had not included citizenship as a \"subject\" in the first report that he submitted to Congress. Finally, all three district courts held that Secretary Ross had violated the APAâthe law requiring that agency action be based on \"'reasoned decisionmaking.'\" In particular, these courts concluded that Secretary Ross's decision wasâamong other thingsâcontrary to the evidence before him. They also determined that the Secretary's decision was unlawful because his sole stated reason for adding the citizenship questionâproviding DOJ with citizenship data for VRA enforcementâwas pretextual. Supreme Court ' s Decision : Chief Justice Roberts wrote the opinion for the Court in Department of Commerce v. New York . Though this opinion garnered a majority for each issue addressed, the Justices comprising the majority for each issue varied. On the merits, Chief Justice Robertsâjoined by Justices Thomas, Alito, Gorsuch, and Kavanaughâconcluded that adding a citizenship question to the census did not violate the Enumeration Clause. Noting that the Court's \"interpretation of the Constitution is guided by Government practice that 'has been open, widespread, and unchallenged since the early days of the Republic,'\" the Court observed that \"demographic questions have been asked in every census since 1790\" and that \"questions about citizenship in particular have been asked for nearly as long.\" Relying on this \"early understanding\" and \"long practice,\" the Court determined that the Enumeration Clause does not prohibit inquiring about citizenship on the census questionnaire. These same Justices also determined that Secretary Ross's decision was supported by the evidence before him and therefore did not violate the APA on that ground. The Court ruled that the Secretary's decision to rely on both administrative records and a citizenship question to obtain citizenship data for DOJ was a reasonable exercise of his discretion in light of the available evidence. While the Census Bureau had found that administrative records alone would produce the most accurate citizenship data, it acknowledged that each option \"entailed tradeoffs between accuracy and completeness,\" and that it \"was not able to 'quantify the relative magnitude of the errors\" in each of Options C and D. The Court concluded that where the \"choice [is] between reasonable policy alternatives in the face of uncertainty,\" the Secretary has discretion to choose. The Court also determined that the Secretary reasonably weighed the costs and benefits of reinstating the citizenship question, particularly \"the risk that inquiring about citizenship would depress census response ratesÂ . . . among noncitizen households.\" The Court observed that the Secretary had explained why the \"risk[s] w[ere] difficult to assess,\" concluding that he had reasonably \"[w]eigh[ed] that uncertainty against the value of obtaining more complete and accurate citizenship data\" through a citizenship question. In the end, and \"in light of the long history of the citizenship question on the census,\" the Court was unwilling to second-guess the Secretary's conclusion as \"the evidence before [him] hardly led ineluctably to just one reasonable course of action.\" The same Justices also ruled that the Secretary's decision did not violate the Census Act. The Court first determined, \"for essentially the same reasons\" underlying its ruling that Secretary Ross's decision was supported by the evidence, that Secretary Ross reasonably concluded that relying solely on administrative records to obtain citizenship data \"would not . . . provide the more complete and accurate data that DOJ sought.\" Thus, because administrative records alone would not supply the \"kind,\" \"quality,\" and \"scope\" of \"'statistics required,'\" the Court held that Secretary Ross had complied with Section 6(c)'s requirement to rely \"[t]o the maximum extent possible\" on administrative records. The Court also determined that the Secretary complied with Section 141(f) of the Census Act. Though Secretary Ross had not included \"citizenship\" as a \"subject\" in his initial report to Congress, the Court determined that by listing \"citizenship\" as a \"question\" in the second report, the Secretary had adequately \"informed Congress that he proposed to modify the original list of subjects\" from his initial report. Finally, the Chief Justiceâjoined by Justices Ginsburg, Breyer, Sotomayor, and Kaganâheld that the Secretary's decision violated the APA because his sole stated reason for adding the citizenship question to the census questionnaire was not the real reason for his decision. The Court began by reaffirming the \"settled proposition[]\" that \"in order to permit meaningful judicial review, an agency must 'disclose the basis' of its action.\" Moreover, while acknowledging that courts normally accept an agency's stated reason for its action, the Court recognized that courts may review evidence outside the agency record to probe the justifications of an agency's decision when there is a strong showing of bad faith or improper behavior. After concluding that it could review the extra-record evidence on which the district court had relied, the Court conducted its own review of the evidence regarding Secretary Ross's reason for adding the citizenship question to the census. It began by noting that while the Secretary had \"tak[en] steps to reinstate a citizenship question about a week into his tenure,\" there was \"no hint that he was considering VRA enforcement\" at that time. In addition, the Court observed that the Department of Commerce had itself gone \"to great lengths to elicit the request from DOJ (or any other willing agency)\" to add the citizenship question. In the end, \"viewing the evidence as a whole,\" the Court concluded that \"the decision to reinstate a citizenship question [could not] be adequately explained in terms of DOJ's request for improved citizenship data to better enforce the VRA.\" Given this \"disconnect between the decision made and the explanation given,\" the Court held that the Secretary's decision violated the APA. However, the Court was clear that it was \"not hold[ing] that the [Secretary's] decision . . . was substantively invalid,\" but was only requiring the Secretary to disclose the reason for that decision. And to give Secretary Ross that opportunity, the Court directed the district court to remand the case back to the Department of Commerce. Concurring and Dissenting Opinions : Every Justice (other than Chief Justice Roberts) dissented from some portion of the Court's opinion. Among the most notable dissents were those of Justice Thomas and Justice Breyer. Justice Thomasâjoined by Justices Gorsuch and Kavanaughâdissented from the Court's holding that Secretary Ross's decision was based on a pretextual rationale. Justice Thomas began by criticizing the majority for relying on evidence outside the administrative record. Under the APA, Justice Thomas explained, judicial review of an agency decision is generally based on \"'the agency's contemporaneous explanation'\" for its decision, and courts normally may not invalidate the agency's action even if it \"ha[d] other, unstated reasons for the decision.\" Justice Thomas acknowledged that review of extra-record materials may be permissible upon a showing of bad faith, but he disagreed with the Court's assessment that this case met that standard. Even if review of extra-record materials were appropriate, Justice Thomas concluded that none of the evidence established that Secretary Ross's stated basis for his decision \"did not factor at all into [his] decision.\" In his view, the evidence showed \"at most, that leadership at both the Department of Commerce and DOJ believed it importantâfor a variety of reasonsâto include a citizenship question on the census.\" Finally, Justice Thomas criticized the Court's decision as being the \"the first time the Court has ever invalidated an agency action as 'pretextual,'\" contending that the Court had \"depart[ed] from traditional principles of administrative law.\" Justice Breyerâjoined by Justices Ginsburg, Sotomayor, and Kaganâdissented from the Court's conclusion that Secretary Ross's decision was supported by the evidence before the agency. Justice Breyer contended that Secretary Ross inaccurately stated that he was \"'not able to determine definitively how inclusion of a citizenship question on the decennial census will impact responsiveness.'\" Specifically, the dissent observed that the experts within the Census Bureau itself had found that \"adding the question would produce a less accurate count because noncitizens and Hispanics would be less likely to respond to the questionnaire,\" finding there was \"nothing significant\" in the record \"to the contrary.\" Moreover, Justice Breyer criticized Secretary Ross's conclusion that the addition of the citizenship question would produce more complete and accurate data. According to Justice Breyer, the administrative record showed that inclusion of the citizenship question would, for a large segment of the population, \"be no improvement over using administrative records alone,\" and for 35 million people, it \"would be no better, and in some respects would be worse, than using [only] statistical modeling.\" On these grounds, four Justices concluded that Secretary Ross's decision was arbitrary and capricious. Implications for Congress : The Supreme Court's decision in Department of Commerce is significant, both for its immediate impact on the 2020 census and for how it may affect administrative law more broadly. The Court's decision barred the Trump Administration from adding the citizenship question to the 2020 census without disclosing the Secretary's actual reason for doing so. Though the Trump Administration initially sought to cure the legal error identified by Court's opinion, it ultimately abandoned these efforts and confirmed that a citizenship question will not be on the 2020 census questionnaire. Nonetheless, because the Court did not deem the addition of a citizenship question \"substantively\" unlawful, it is possible that the Department of Commerce could add a citizenship question to a future census questionnaire, as long as the Secretary of Commerce discloses the actual reasons for doing so. Notably, the Trump Administration recently issued an executive order related to the collection of citizenship data, which, among other things, instructs the Secretary of Commerce to \"consider initiating any administrative process necessary to include a citizenship question on the 2030 decennial census.\" Separately, the Supreme Court's decision could lay the groundwork for pretext-based challenges to agency decisions. The Court's opinion recognized that while \"a court is ordinarily limited to evaluating the agency's contemporaneous explanation in light of the existing administrative record,\" it may inquire further into the motive underlying an agency's action where there is \"a 'strong showing of bad faith or improper behavior.'\" Though this rule preexisted the Court's decision in Department of Commerce , some plaintiffs could view that decision as signaling a greater receptiveness by the Court to such challenges. This was the view taken by Justice Thomas, who asserted in his dissenting opinion that the Court's decision \"opened a Pandora's box of pretext-based challenges\" to agency action because \"[v]irtually every significant agency action is vulnerable to the kinds of allegations the Court credit[ed]\" in its opinion. Some commentators have echoed Justice Thomas's prediction. Perhaps responding to Justice Thomas's concerns, the Court's opinion emphasized that judicial inquiry into an agency's stated reason for its decision should be \"rare,\" explaining that this case involved \"unusual circumstances\" and was not \"a typical case.\" This limiting language could discourage potential litigants from raising pretext-based challenges to agency action. Partisan gerrymandering, \"the drawing of legislative district lines to subordinate adherents of one political party and entrench a rival party in power,\" is an issue that has vexed the federal courts for more than three decades. On June 27, 2019, by a 5-to-4 vote, the Supreme Court ruled that claims of unconstitutional partisan gerrymandering are not subject to federal court review because they present nonjusticiable political questions, thereby removing the issue from federal courts' purview. In Rucho v. Common Cause and Lamone v. Benisek (hereinafter Rucho ), the Court viewed the Elections Clause of the Constitution as solely assigning disputes about partisan gerrymandering to the state legislatures, subject to a check by the U.S. Congress. Moreover, in contrast to one-person, one-vote and racial gerrymandering claims, the Court determined that no test exists for adjudicating partisan gerrymandering claims that is both judicially discernible and manageable. However, the Court suggested that Congress, as well as state legislatures, could play a role in regulating partisan gerrymandering going forward. Background: Prior to the 1960s, the Supreme Court had determined that challenges to redistricting plans presented nonjusticiable political questions that were most appropriately addressed by the political branches of government, not the judiciary. In 1962, however, in the landmark ruling of Baker v. Carr , the Court held that a constitutional challenge to a redistricting plan is justiciable, identifying factors for determining when a case presents a nonjusticiable political question, including \"a lack of [a] judicially discoverable and manageable standard[] for resolving it.\" Since then, while invalidating redistricting maps on equal protection grounds for other reasonsâbased on inequality of population among districts or one-person, one-vote and as racial gerrymandersâthe Court has not nullified a map because of partisan gerrymandering. In part, the Court has been reluctant to invalidate redistricting maps as impermissibly partisan because redistricting has traditionally been viewed as an inherently political process. Moreover, critics of federal court adjudication of partisan gerrymandering claims have argued that such lawsuits would open the floodgates of litigation and that it would be judicially difficult to police because it is unclear how much partisanship in redistricting is too much. On the other hand, critics of this view have argued that extreme partisan gerrymandering is \"incompatible with democratic principles\" by entrenching an unaccountable political class in power with the aid of modern redistricting softwareâusing \"pinpoint precision\" to maximize partisanshipâthereby necessitating some role by the unelected judiciary. In earlier cases presenting a claim of unconstitutional partisan gerrymandering, the Court left open the possibility that such claims could be judicially reviewable, but did not ascertain a discernible and manageable standard for adjudicating such claims. In those rulings, Justice Kennedy cast the deciding vote, leaving open the possibility that claims could be held justiciable in some future case, under a yet-to-be-determined standard. Last year, the Supreme Court considered claims of partisan gerrymandering raising nearly identical questions to those in Rucho , but ultimately issued narrow rulings on procedural grounds specific to those cases. Rucho marked the first opinion on partisan gerrymandering since Justice Kennedy left the Court. Prior to the Supreme Court's consideration, three-judge federal district courts in North Carolina and Maryland invalidated congressional districts as unconstitutional partisan gerrymanders under standards they viewed to be judicially discernible and manageable. In the North Carolina case, the court determined that a redistricting map violates the Equal Protection Clause as an unconstitutional partisan gerrymander when (1) the map drawer's predominant intent was to entrench a specific political party's power; (2) the resulting dilution of voting power by the disfavored party was likely to persist in later elections; and (3) the discriminatory effects were not attributable to other legitimate interests. Further, the court determined that a partisan gerrymandered map may violate provisions in Article I requiring \"the People\" to select their representatives and limiting the states to determining only \"neutral provisions\" regarding the \"Times, Places, and Manner of holding Elections.\" Both courts concluded that a redistricting map violates the First Amendment if the challengers demonstrate that (1) the map drawers specifically intended to disadvantage voters based on their party affiliation and voting history; (2)Â the map burdened voters' representational and associational rights; and (3) the map drawers' intent to burden certain voters caused the \"adverse impact.\" Under a provision of federal law providing for direct appeals to the Supreme Court in cases challenging the constitutionality of redistricting maps, North Carolina legislators and Maryland officials appealed to the Supreme Court. Supreme Court's Decision: In Rucho , the Supreme Court held that, based on the political question doctrine, federal courts lack jurisdiction to resolve claims of unconstitutional partisan gerrymandering, vacating and remanding the North Carolina and Maryland lower court rulings with instructions to dismiss for lack of jurisdiction. In an opinion written by Chief Justice Roberts, the Court began by addressing the Framers' views on gerrymandering. According to the majority opinion, at the time of the Constitution's drafting and ratification, the Framers were well familiar with the controversies surrounding the practice of partisan gerrymandering. \"At no point\" during the Framers' debates, the Court observed, \"was there a suggestion that the federal courts had a role to play.\" Instead, the Chief Justice viewed the Elections Clause as a purposeful assignment of disputes over partisan gerrymandering to the state legislatures, subject to a check by the U.S. Congress. In this vein, the Court noted that Congress has in fact exercised its power under the Elections Clause to address partisan gerrymandering on several occasions, such as by enacting laws to require single-member and compact districts. Nonetheless, the Court acknowledged that there are two areas relating to redistricting where the Court has a unique role in policing the statesâclaims relating to (1) inequality of population among districts or \"one-person, one-vote\" and (2) racial gerrymandering. However, the Court distinguished those claims from claims of unconstitutional partisan gerrymandering, reasoning that while judicially discernible and manageable standards exist for adjudicating claims relating to one-person, one-vote and racial gerrymandering, partisan gerrymandering cases \"have proved far more difficult to adjudicate.\" This difficulty stems from the fact, the Court explained, that while it is illegal for a redistricting map to violate the one-person, one-vote principle or to engage in racial discrimination, at least some degree of partisan influence in the redistricting process is inevitable and, as the Court has recognized, permissible. Hence, according to the Court, the challenge has been to identify a standard for determining how much partisan gerrymandering is \"too much.\" The Chief Justice's opinion focused on three concerns regarding what he viewed as the central argument for federal adjudication of partisan gerrymandering claims: \"an instinct\" that if a political party garners a certain share of a statewide vote, as a matter of fairness, courts need to ensure that the party also holds a proportional number of seats in the legislature. First, the Court stated that this expectation \"is based on a norm that does not exist in our electoral system.\" For example, noting her extensive experience in state and local politics, the Court quoted Justice O'Connor's 1986 concurrence that maintained that \"[t]he opportunity to control the drawing of electoral boundaries through the legislative process of apportionment is a critical and traditional part of politics in the United States.\" Furthermore, the Rucho Court observed that the nation's long history of states electing their congressional representatives through \"general ticket\" or at-large elections typically resulted in single-party congressional delegations. As a result, the Chief Justice explained, for an extended period of American history, a party could achieve nearly half of the statewide vote, but not hold a single seat in the House of Representatives, suggesting that proportional representation was not a value protected by the Constitution. Second, even if proportional representation were a constitutional right, determining how much representation political parties \"deserve,\" based on each party's share of the vote, would require courts to allocate political power, a power to which courts are, in the view of the majority, not \"equipped\" to exercise. For the Court, resolving questions of fairness presents \"basic questions that are political, not legal.\" Third, even if a court could establish a standard of fairness, the Court determined that there is no discernible and manageable standard for identifying when the amount of political gerrymandering in a redistricting map meets the threshold of unconstitutionality. In so concluding, the Supreme Court rejected the tests that the district courts adopted in ascertaining unconstitutional partisan gerrymandering in North Carolina and Maryland. As to the North Carolina case, the Court criticized the \"predominant intent\" prong of the test adopted by the district court in holding the map in violation of the Equal Protection Clause. As the Chief Justice explained, although this inquiry is proper in the context of racial gerrymandering claims because drawing district lines based predominantly on race is inherently suspect, it does not apply in the context of partisan gerrymandering where some degree of political influence is permissible. Moreover, responding to the aspect of the test requiring challengers to demonstrate that partisan vote dilution \"is likely to persist,\" the Court concluded that it would require courts to \"forecast with unspecified certainty whether a prospective winner will have a margin of victory sufficient to permit him to ignore the supporters of his defeated opponent.\" That is, according to the Court, judges under this test would \"not only have to pick the winnerâthey have to beat the point spread.\" The Court also disapproved of the test the district courts adopted in both the North Carolina and Maryland cases in holding that the maps violated the First Amendment's guarantee of freedom to associate. As a threshold matter, the Court determined that the subject redistricting plans do not facially restrict speech, association, or any other First Amendment guarantees, as voters in diluted districts remain free to associate and speak on political matters. More directly, the Court concluded that under the premise that partisan gerrymandering constitutes retaliation because of an individual's political views, \"any level of partisanship in districting would constitute an infringement of their First Amendment rights.\" As a consequence, the Court viewed the First Amendment standard as failing to provide a manageable approach for determining when partisan activity has gone too far. In addition, the Court rejected North Carolina's reliance on Article I of the Constitution as the basis to invalidate a redistricting map, concluding that the text of the Constitution provided no enforceable limit for considering partisan gerrymandering claims. Nonetheless, Chief Justice Roberts acknowledged that excessive partisan gerrymandering \"reasonably seem[s] unjust,\" stressing that the ruling \"does not condone\" the practice. However, he maintained that the Court cannot address the problem simply \"because it must,\" viewing any solutions to extreme partisan gerrymandering to lie with Congress and the states, not the courts. Characterizing the dissent and the challengers' request that the Court ascertain a standard for adjudication as seeking \"an unprecedented expansion of judicial power,\" the Chief Justice cautioned that such an \"intervention would be unlimited in scope and duration .Â .Â . recur[ring] over and over again around the country with each new round of redistricting.\" Instead, he observed that many states have constitutional provisions and laws providing standards for state courts to address excessive partisan gerrymandering, which have been invoked with successful results. Furthermore, citing examples of past and pending federal legislation, the Court reiterated that \"the Framers gave Congress the power to do something about partisan gerrymandering in the Elections Clause.\" Dissenting Opinion: Justice Kagan wrote a dissent on behalf of four Justices arguing that the Court has the power to establish a standard for adjudicating unconstitutionally excessive partisan gerrymandering and that its \"abdication\" in Rucho \"may irreparably damage our system of government.\" According to the dissent, the standards proposed by the challengers and the lower courts are not \"unsupported and out-of-date musings about the unpredictability of the American voter,\" but instead are \"evidence-based, data-based, statistics-based.\" Moreover, responding to the Court's suggestion that Congress and the states have the power to ameliorate excessive partisan gerrymandering, the dissent maintained that the prospects for legislative reform are poor because the legislators who currently hold power as a result of partisan gerrymandering are unlikely to promote change. Instead, for the dissent, the solution to what they viewed as a crisis of the political process is a means to challenge extreme partisan gerrymandering outside of that process, through the unelected federal judiciary. Implications for Congress: As a result of Rucho , federal courts lack subject-matter jurisdiction to resolve claims of unconstitutional partisan gerrymandering. However, Rucho suggests that Congress and the states may have the power to address extreme partisan gerrymandering should they so choose. For example, as observed by the Court, several bills that take various approaches to address partisan gerrymandering have been introduced in the 116th Congress. For example, H.R. 1 , the For the People Act of 2019, which passed the House of Representatives on March 8, 2019, would eliminate legislatures from the redistricting process and require each state to establish a nonpartisan, independent congressional redistricting commission, in accordance with certain criteria. H.R. 44 , the Coretta Scott King Mid-Decade Redistricting Prohibition Act of 2019, would prohibit states from carrying out more than one congressional redistricting following a decennial census and apportionment, unless a state is ordered by a court to do so in order to comply with the Constitution or to enforce the Voting Rights Act of 1965. (At least one scholar has argued that limiting redistricting to once per decade renders it \"less likely that redistricting will occur under conditions favoring partisan gerrymandering.\") H.R. 131 , the Redistricting Transparency Act of 2019, would, based on the view that public oversight of redistricting may lessen partisan influence in the process, require state congressional redistricting entities to establish and maintain a public internet site and conduct redistricting under procedures that provide opportunities for public participation. Notably, the Court in Rucho specifically stated that it expressed \"no view\" on any pending proposals, but observed \"that the avenue for reform established by the Framers, and used by Congress in the past, remains open.\" With regard to the states, Rucho does not preclude state courts from considering such claims under applicable state constitutional provisions. For example, in 2015, the Florida Supreme Court invalidated a Florida congressional redistricting map as violating a state constitutional provision addressing partisan gerrymandering. Similarly, in 2018, the Pennsylvania Supreme Court struck down the state's congressional redistricting map under a Pennsylvania constitutional provision. Looking ahead, as a result of Rucho , such state remedies, coupled with any congressional action, will likely be the primary means for regulating excessive partisan influence in the redistricting process. In American Legion v. American Humanist Association , the Supreme Court held that the Bladensburg Peace Cross, a public World War I memorial in the form of a Latin cross, did not violate the First Amendment's Establishment Clause. A divided Court also limited the applicability of Lemon v. Kurtzman , a long-standingâbut often-questioned âprecedent that had previously supplied the primary standard for evaluating Establishment Clause claims. However, the separate opinions from the Court gave rise to a number of significant questions. In particular, there was no single majority opinion agreeing on what test should apply in future Establishment Clause claims. Further, the Court left open the possibility that the Lemon test, and the specific considerations it suggests courts should take into account, may continue to govern certain types of Establishment Clause challenges. Background: The First Amendment's Establishment Clause provides that the government \"shall make no law respecting an establishment of religion.\" The Court has long interpreted this requirement to require the government to be \"neutral\" toward religionâbut over the years, the Supreme Court has employed a variety of different inquiries to determine whether challenged government practices are sufficiently neutral. In Lemon , decided in 1971, the Court synthesized its prior Establishment Clause decisions into a three-part test, saying that to be considered constitutional, government action (1) \"must have a secular legislative purpose\"; (2) must have a \"principal or primary effect . . . that neither advances nor inhibits religion\"; and (3) \"must not foster an excessive government entanglement with religion.\" However, the Court has not always applied the Lemon test to analyze Establishment Clause challenges. For instance, in cases evaluating the constitutionality of government-sponsored prayer before legislative sessions, the Court has asked whether the disputed prayer practice \"is supported by this country's history and tradition.\" The Court has also adopted variations on Lemon , most notably using an \"endorsement\" test that asks \"whether the challenged governmental practice either has the purpose or effect of 'endorsing' religion.\" Thus, in 2018, Justice Thomas said that the Court's \"Establishment Clause jurisprudence is in disarray.\" Justice Thomas and other Justices have argued that the Court should abandon Lemon and instead adopt a single approach to interpreting the Clauseâone that can be applied consistently. The Court's divergent approaches to evaluating Establishment Clause claims were apparent in two cases, issued on the same day in 2005, that involved government-sponsored displays containing religious symbols. In the first case, McCreary County v. ACLU , the Court applied the Lemon test and held that Ten Commandments displays in two Kentucky courthouses likely violated the Establishment Clause. In the second, Van Orden v. Perry , a plurality of the Court argued that like legislative prayers, religious displays should be evaluated primarily by reference to \"our Nation's history.\" Justice Breyer concurred in the Court's judgment in Van Orden , providing the fifth vote to uphold a Ten Commandments display on the grounds of the Texas State Capitol. Justice Breyer stated that that while he believed the particular monument did \" satisfy [the] Court ' s more formal Establishment Clause tests, \" including Lemon , his view of the case was also driven by a number of other factors, including the monument ' s history and physical setting. In particular, he emphasized that the monument had gone legally unchallenged for 40 years . Under the circumstances, Justice Breyer argued that removing or altering the monument would likely be \"divisive\" in a way that the monument itself was not, exhibiting \"a hostility toward religion that has no place in our Establishment Clause traditions.\" The plaintiffs in American Legion argued that Maryland violated the Establishment Clause by maintaining a war memorial known as the Bladensburg Peace Cross. The monument is a 32-foot Latin cross that sits on a large base containing a plaque with the names of 49 Prince George's County soldiers who died in World War I. The Fourth Circuit had agreed with the challengers and held that after looking to the Lemon test and giving \"due consideration\" to the \"factors\" set forth in Justice Breyer's Van Orden concurrence, the memorial violated the First Amendment. Supreme Court's Decision: The Supreme Court reversed the Fourth Circuit's decision. But while seven Justices ultimately approved of the Peace Cross, they did so in six different opinions, reflecting disagreement about how, exactly, to resolve the case. Justice Alito wrote the opinion for the American Legion Court, although certain portions of that opinion represented only a plurality. Writing for five members of the Court, Justice Alito's majority opinion relied on some of the factors highlighted by Justice Breyer's concurring opinion in Van Orden ânamely, the fact that this particular monument had \"stood undisturbed for nearly a century\" and had \"acquired historical importance\" to the community. The Court acknowledged that the cross is a Christian symbol, but viewed the symbol as taking on \"an added secular meaning when used in World War I memorials.\" Under these circumstances, the Court concluded that requiring the state to \"destroy[] or defac[e]\" the Peace Cross \"would not be neutral\" with respect to religion \"and would not further the ideals of respect and tolerance embodied in the First Amendment.\" Concurring and Dissenting Opinions: A different majority of Justices voted to limit the applicability of the Lemon testâalthough no five Justices agreed just how far to limit Lemon . Justice Alito, writing for a four-Justice plurality, suggested that \"longstanding monuments, symbols, and practices\" should not be evaluated under Lemon , but should instead be considered constitutional so long as they \"follow in\" a historical \"tradition\" of religious accommodation. Justices Thomas and Gorsuch wrote separate concurrences disapproving of Lemon more generally. Justice Thomas argued that the Court should \"overrule the Lemon test in all contexts\" and instead analyze Establishment Clause claims by reference to historical forms of \"coercion.\" Justice Gorsuch viewed Lemon as a \"misadventure,\" expressing concerns about that test and suggesting instead that the Court should look to historical practice and traditions in Establishment Clause challenges. Therefore, it appears that Lemon will no longer be used to assess the constitutionality of \"longstanding monuments, symbols, and practices.\" Justice Ginsburg dissented, joined by Justice Sotomayor. She stressed the cross's religious nature, observing that it has become a marker for Christian soldiers' graves \"precisely because\" the cross symbolizes \"sectarian beliefs.\" Her analysis did not expressly invoke the three-part Lemon test, but applied the \"endorsement\" test developed from Lemon , asking whether the display conveyed \"a message that religion or a particular religious belief is favored or preferred.\" Looking to the memorial's nature and history, Justice Ginsburg believed that the Peace Cross did convey a message of endorsement. Ultimately, she concluded that by maintaining the monument, the state impermissibly \"elevate[d] Christianity over other faiths, and religion over nonreligion.\" Implications for Congress: While American Legion was ostensibly concerned with the constitutionality of a single monument, the Court's decision raises a number of questions regarding future interpretations of the Establishment Clause. First, while the plurality opinion said that \"monuments, symbols, and practices with a longstanding history\" should now be evaluated by reference to historical practices rather than the Lemon test, it is not clear what qualifies as a long-standing symbol or practice. Further, it is unclear whether the historical practice test will apply outside of the context of challenges to monuments or legislative prayer . Indeed, two of the Justices who joined the plurality opinionâJustices Breyer and Kavanaughâwrote separate opinions suggesting that other factors in addition to historical practice may be relevant to evaluating Establishment Clause challenges. More broadly, however, regardless of the particular test employed, the opinions in American Legion suggest that the Roberts Court may be adopting a view of the Establishment Clause that is more accommodating of government sponsorship of religious displays and practicesâeven where those practices are aligned with a particular religion. Given that a majority of Justices agreed in American Legion that at least with respect to government use of religious symbols, \"[t]he passage of time gives rise to a strong presumption of constitutionality,\" it seems likely that courts will view Establishment Clause challenges to long-standing monuments with significant skepticism moving forward. In affirming the petitioner's conviction for violating the Sex Offender Registration and Notification Act (SORNA), a divided Supreme Court in Gundy v. United States upheld the constitutionality of Congress's delegated authority to the U.S. Attorney General to apply registration requirements to offenders convicted prior to SORNA's enactment. In a plurality opinion written on behalf of four Justices, Justice Kagan concluded that SORNA's delegation \"easily passes constitutional muster\" and was \"distinctively small-bore\" when compared to the other broad delegations the Court has upheld since 1935. Justice Gorsuch's dissent, joined by Chief Justice Roberts and Justice Thomas, highlighted an emerging split on the Court's approach in reviewing authority Congress delegates to another branch of government. Providing the fifth vote to affirm Gundy's conviction, Justice Alito concurred in the judgment only, declining to join Justice Kagan's opinion and indicating his willingness to rethink the Court's approach to the nondelegation doctrine, which seeks to bar Congress from delegating its legislative powers to other branches of government. After Gundy , whether the Court revives the long-dormant nondelegation doctrine likely depends on Justice Kavanaugh's views on the doctrine. (Justice Kavanaugh, who was not confirmed to the Court at the time of oral arguments, took no part in the Gundy decision. ) Background: Article I, Section 1 of the Constitution provides that \"[a]ll legislative Powers herein granted\" will be vested in the United States Congress. The Supreme Court has held that the \"text in [Article I's Vesting Clause] permits no delegation of those powers.\" The nondelegation doctrine, as crafted by the courts, exists mainly to prevent Congress from ceding its legislative power to other entities and, in so doing, maintain the separation of powers among the three branches of government. At the same time, the Court has recognized that the nondelegation doctrine does not require complete separation of the three branches of government, permitting Congress to delegate certain powers to implement and enforce the law. To determine whether a delegation of authority is constitutional, the Court has required that Congress lay out an \"intelligible principle\" to guide the delegee's discretion and constrain its authority. Under the lenient \"intelligible principle\" standard that has its origins in the 1928 decision J.W. Hampton, Jr., & Co. v. United States , the Court has relied on the nondelegation doctrine twice, in 1935, to invalidate two provisions in the National Industrial Recovery Act delegating authority to the President, rejecting every nondelegation challenge thereafter. Gundy , the latest nondelegation challenge at the Supreme Court, centered on the application of registration requirements under SORNA to pre-act offenders. Enacted as Title I of the Adam Walsh Child Protection and Safety Act of 2006, SORNA's stated purpose is \"to protect the public from sex offenders and offenders against children\" by establishing a comprehensive national registration system of offenders. To this end, SORNA requires convicted sex offenders to register in each state where the offender resides, is employed, or is a student. Section 20913(d) of SORNA authorizes the Attorney General to \"specify the applicability\" of the registration requirements \"to sex offenders convicted before the enactment\" of the act and to \"prescribe rules for the registration of any such sex offenders\" and for other offenders unable to comply with the initial registration requirements. As decided by the Court in Reynolds v. United States , the law's registration requirements did not apply to pre-SORNA offenders until the Attorney General so specified. Accordingly, in a series of interim and final rules and guidance documents issued between 2007 and 2011, the Attorney General specified that SORNA's requirements apply to all sex offenders, including sex offenders convicted before the statute's enactment. Before the enactment of SORNA, petitioner Herman Gundy was convicted of a sex offense in Maryland. After serving his sentence, Gundy traveled from Maryland to New York. Subsequently, he was arrested and convicted for failing to register as a sex offender in New York under SORNA. In his petition to the Supreme Court, Gundy argued, among other things, that SORNA's grant of \"undirected discretion\" to the Attorney General to decide whether to apply the statute to pre-SORNA offenders is an unconstitutional delegation of legislative power to the executive branch. Supreme Court's Decision: In Gundy, Justice Kagan announced the judgment of the Court, affirming the lower court, and authored a plurality opinion joined by Justices Ginsburg, Breyer, and Sotomayor that followed the modern approach toward the nondelegation doctrine, rejecting Gundy's argument that Congress unconstitutionally delegated \"quintessentially legislative powers\" to the Attorney General to decide whether to apply the statute to pre-SORNA offenders. Relying on Reynolds , Justice Kagan read SORNA as requiring the Attorney General to \"apply SORNA's registration requirements as soon as feasible to offenders convicted before the statute's enactment.\" Based on this interpretation, the plurality decided that Congress did not violate the nondelegation doctrine based on the Court's \"long established law\" in upholding broad delegations. The plurality explained that under the intelligible principle standard, so long as Congress has made clear the \"general policy\" and boundaries of the delegation, such broad delegations are permissible. Compared to very broad delegations upheld in the past (e.g., delegations to agencies to regulate in the \"public's interest\"), the plurality concluded that the Attorney General's \"temporary authority\" to delay the application of SORNA's registration requirements to pre-act offenders due to feasibility concerns \"falls well within constitutional bounds.\" Dissenting and Concurring Opinions: In contrast, in his dissent, Justice Gorsuch, joined by Chief Justice Roberts and Justice Thomas, viewed the plain text of the delegation as providing the Attorney General limitless and \"vast\" discretion and \"free rein\" to impose (or not) selected registration requirements on pre-act offenders. In concluding the delegation to be unconstitutional, Justice Gorsuch distinguished his analysis from the plurality and the Court's precedents by focusing on the separation-of-powers principles that underpin the nondelegation doctrine. In the dissent's view, the nondelegation doctrine used to serve a vital role in maintaining the separation of powers among the branches of government by assuring that elected Members of Congress fulfill their constitutional lawmaking duties. Justice Gorsuch warned that delegating Congress's constitutional legislative duties to the executive branch bypasses the bicameral legislative process, resulting in laws that fail to protect minority interests or provide political accountability or fair notice. Consequently, the dissent faulted the \"evolving intelligible principle\" standard and increasingly broad delegations as pushing the nondelegation doctrine further from its separation-of-powers roots. Arguing for a more robust review of congressional delegations, Justice Gorsuch outlined several \"guiding principles.\" According to the dissent, Congress could permissibly delegate (1) authority to another branch of government to \"fill up the details\" of Congress's policies regulating private conduct; (2)Â fact-finding to the executive branch as a condition to applying legislative policy; or (3) nonlegislative responsibilities that are within the scope of another branch of government's vested powers (e.g., assign foreign affairs powers that are constitutionally vested in the President). Applying these \"traditional\" separation-of-powers tests in lieu of the plurality's \"intelligible principle\" approach, Justice Gorsuch concluded that SORNA's delegation was an unconstitutional breach of the separation between the legislative and executive branches. He argued that SORNA lacked a \"single policy decision concerning pre-Act offenders\" and delegated more than the power to fill the details to the Attorney General. The dissent disputed the plurality's comparison of SORNA's delegation to other broad delegations that the Court has upheld, reasoning that \"there isn't . . . a single other case where we have upheld executive authority over matters like these on the ground they constitute mere 'details.'\" Further, he asserted that the delegation is neither conditional legislation subject to executive fact-finding nor a delegation of powers vested in the executive branch because determining the rights and duties of citizens is \"quintessentially legislative power.\" In \"a future case with a full panel,\" Justice Gorsuch hoped that the Court would recognize that \"while Congress can enlist considerable assistance from the executive branch in filling up details and finding facts, it may never hand off to the nation's chief prosecutor the power to write his own criminal code. That 'is delegation running riot.'\" Although Justice Alito voiced \"support [for the] effort\" of the dissent in rethinking the Court's approach to the nondelegation doctrine, he opted to not join that effort without the support of the majority of the Court. As a result, Justice Alito concurred in the judgment of the Court in affirming the petitioner's conviction. In his brief, five-sentence concurring opinion, Justice Alito viewed a \"discernable standard [in SORNA's delegation] that is adequate under the approach this Court has taken for many years.\" Implications for Congress: The divided opinions in Gundy signal a potential shift in the Court's approach in nondelegation challenges and potential resurrection of the nondelegation doctrine. With three Justices and the Chief Justice in Gundy willing to reconsider or redefine the Court's \"intelligible principle\" standard, Justice Kavanaugh, who did not participate in Gundy , appears likely to be the critical vote to break the tie in a future case considering a revitalization of the nondelegation principle. If the Court were to replace the modern intelligible principle approach, new challenges may arise in determining when Congress crosses the nondelegation line. A more restrictive nondelegation standard could invite constitutional challenges to many other statutory provisions that delegate broad authority and discretion to the executive branch to issue and enforce regulations. The significance of these challenges was the subject of a debate between the Gundy plurality and dissent. Justice Kagan cautioned that striking down SORNA's delegation as unconstitutional would make most of Congress's delegations to the executive branch unconstitutional because Congress relies on broad delegations to executive agencies to implement its policies. However, Justice Gorsuch countered that \"respecting the separation of powers\" does not prohibit Congress from authorizing the executive branch to fill in details, find facts that trigger applicable statutory requirements, or exercise nonlegislative powers. A future case may provide the Court with the opportunity to provide guidance to the courts and Congress on how precise Congress must be in its delegation and how best to draw the line between permissible and impermissible delegations. For now, however, the current intelligible principle standard in use since 1935 survives while the nondelegation doctrine continues to remain \"moribund.\"", "summary": "The Supreme Court term that began on October 1, 2018, was a term of transition, with the Court issuing a number of rulings that, at times, suggested but did not fully adopt broader transformations in its jurisprudence. The term followed the retirement of Justice Kennedy, who was a critical vote on the Court for much of his 30-year tenure and who had been widely viewed as the Court's median or \"swing\" Justice. As a result, the question looming over the October 2018 Term was how the replacement of Justice Kennedy with Justice Kavanaugh would alter the Court's jurisprudence going forward. Notwithstanding the alteration in the Court's makeup, observers have generally agreed that the October 2018 Term largely did not produce broad changes to the Court's jurisprudence. Although a number of cases presented the Court with the opportunity to rethink various areas of law, the Court largely declined those invitations. In other cases, a majority of the Justices did not resolve potentially far-reaching questions, resulting in the Court either issuing more narrow rulings or simply not issuing an opinion in a given case. Nonetheless, much of the low-key nature of the October 2018 Term was a product of the Court's decisions to not hear certain matters. And for a number of closely watched cases that it did agree to hear, the Court opted to schedule arguments for the next term. While the Supreme Court's latest term generally did not result in wholesale changes to the law, its rulings were nonetheless important, in large part, because they provide insight into how the Court may function following Justice Kennedy's retirement. For the fourth straight year at the Court, the number of opinions decided by a bare majority increased, with 29% of the Court's decisions being issued by a five-Justice majority. While a number of decisions saw the Court divided along what are perceived to be the typical ideological lines, the bulk of the Court's closely divided cases involved heterodox lineups in which Justices with divergent judicial philosophies joined to form a majority in a given case. Collectively, the voting patterns of the October 2018 Term have led some commentators to suggest that the Court has transformed from an institution that was largely defined by the vote of Justice Kennedy to one in which multiple Justices are now perceived to be the Court's swing votes. Beyond the general dynamics of the October 2018 Term, the Court issued a number of opinions of importance for Congress. Of particular note are five opinions from the October Term 2018: (1)Â Kisor v. Wilkie , which considered the continued viability of the Auer-Seminole Rock doctrine governing judicial deference to an agency's interpretation of its own ambiguous regulation; (2) Department of Commerce v. New York , a challenge to the addition of a citizenship question to the 2020 census questionnaire; (3) Rucho v. Common Cause , which considered whether federal courts have jurisdiction to adjudicate claims of excessive partisanship in drawing electoral districts;Â (4)Â American Legion v. American Humanist Association , a challenge to the constitutionality of a state's display of a Latin cross as a World War I memorial; and (5) Gundy v. United States , which considered the scope of the long-dormant nondelegation doctrine.", "document_type": "crs"}
{"report": "The People's Republic of China (PRC or China) has significantly increased its overseas investments since launching its \"Go Global Strategy\" in 1999 in an effort to make Chinese firms more globally competitive and advance domestic economic development ( Figure 1 ). Since then, Chinese firms have acquired foreign assets and pledged billions of dollars to develop infrastructure abroad. China's push overseas has been particularly visible in the Indo-Pacific region, a major focus of China's effort to increase global trade connectivity through the \"Belt and Road Initiative\" (BRI, initially known as \"One Belt, One Road\"), which launched in 2013. However, China's overseas, global economic activities include the purchase, financing, development, and operation of assets and infrastructure across Africa, Asia, Europe, Latin America and the Caribbean, North America, and Oceania. Links to Select Databases on China's Foreign Direct Investment (FDI) Many in Congress and the Trump Administration are focusing attention on possible critical implications of China's growing global economic reach for U.S. economic and geopolitical strategic interests. Some analysts view China's activities as largely commercial in nature, following the path that some Western multinational firms forged in the 1980s and 1990s in expanding and integrating into global markets. Others contend that China's activities are ultimately in support of alleged efforts by Beijing to challenge and undermine U.S. global influence. This report does not provide figures or estimates of China's global economic activities. Nor is it an in-depth analysis of recent trends and developments. Rather, it provides an overview of select issues and challenges encountered when compiling, interpreting, and analyzing statistics on Chinese investment, construction, financing, and development assistance around the world. Economic- and resource-related imperatives play an important role in China's expanding global economic footprint. Analysts see strong domestic economic development as a primary objective for China's leaders for a number of reasons, including those leaders' desire to raise the living standards of the population, dampen social disaffection about economic and other inequities, and sustain regime legitimacy. In addition, China's rapid economic growth has created a domestic appetite for greater resources and technology, as well as for creating markets for Chinese goodsâall of which have served as powerful drivers of China's integration into the global economy and enthusiasm for international trade and investment agreements. For example, as China's energy demands have continued to rise, the Chinese government has sought bilateral agreements, oil and gas contracts, scientific and technological cooperation, and de-facto multilateral security arrangements with energy-rich countries, both in its periphery and around the world. Moreover, China's recent relative economic slowdown (in the aftermath of the government-financed boom of the post-global recession years) has created excess capacity and the need to find overseas markets and employment opportunities for its infrastructure and construction sectors. In pursuing commercial opportunities abroad, Chinese firmsâmany of them state ownedâhave become global leaders in these sectors (e.g., transport infrastructure, such as ports and high-speed rail). Some observers contend that these investment and construction trends may reflect an attempt by China to bolster its position as a global power, gain control of vital sea-lanes and energy-supply routes, secure key supply chains, aggregate control over communications infrastructure and standards, and build up geo-economic leverage to ensure support for its foreign policy objectives. In particular, some U.S. officials have expressed concerns that China's growing international economic engagement goes hand-in-hand with expanding political influence. The seeminglyâthough debatableâ\"no strings attached\" nature and looser terms of Beijing's overseas loans and investments may be attractive to foreign governments wanting swifter, more \"efficient,\" and relatively less intrusive solutions to their development problems than those offered by bilateral and international financial institutions, such as the International Monetary Fund (IMF), World Bank, and Asian Development Bank (ADB). Unlike these institutions, many of the Chinese financial institutions and enterprises involved in China's overseas investment, lending and construction are owned or subsidized by the government. As such, they are not accountable to shareholders, do not generally impose safeguards or international standards related to transparency, human rights, and environmental protection, and can afford short-term losses in pursuit of longer-term, strategic goals. Although some analysts and policymakers suggest that Chinese officials and state-owned enterprises (SOEs) appear more comfortable working with undemocratic or authoritarian governments, China's outreach also has extended to the United States, key U.S. allies and partners, and regions where U.S. economic linkages and diplomatic sway have been, until recently, predominant. These developments have led some observers to conclude that Beijing intends to challengeâor is already challengingâU.S. global leadership directly. As a result, some Members of Congress and Administration officials are focusing attention on the critical implications that China's increasing international economic engagements could have for U.S. economic and strategic interests. Some observers have sought to compare China's activities to those of the United States. In contrast to China's, however, U.S. global economic engagements have tended to be more diverse and not government-directed or -funded. They have been driven primarily by the U.S. private sector, whose global presence is long-standing and comprehensive. A major challenge when researching global investment and construction projects and related loans is the accuracy of the data. While this challenge is not unique to projects involving Chinese players, it is exacerbated by the nature of many Chinese projects and loans, whose terms are not always publicly available or transparent. No comprehensive, standardized, or authoritative data are available on all Chinese overseas economic activitiesâfrom either the Chinese government or international organizations. A number of think tanks and private research firms have developed datasets to track investment, loans, and grants by Chinese-owned firms and institutions using commercial databases, news reports, and official government sources, when available ( Appendix A ). These datasets often record the value of projects, loans, and grants when they are publicly announced (e.g., at press conferences). However, many publicly announced projects are never formalized, and if they are, project and loan details may change, and projects may not always come to fruition for various reasons (e.g., changing economic and political conditions, or concerns about sovereignty, debt structure, or environmental impact). Despite these limitations, figures derived from such \"data trackers\" often drive the policy debate. Because U.S. policymakers may rely on them to assess the overall scope and magnitude of Chinese activities, it is important to recognize the problems with the data and the limitations of existing databases. While they might be valuable and informative, they may also provide vastly different figures that are not necessarily comparable. For example, for 2015âthe most recent year for which complete annual data are available from all major sourcesâfigures on China's investment flows into the United States vary from $2.6 billion (which only includes nonfinancial gross foreign direct investment (FDI) flows and is reported by MOFCOM ) to $16.4 billion (which includes gross announced transaction flows of $100 million or more and is tracked by AEI/Heritage ) ( Figure 2 ). Similarly, China's total outward investment flows for the same year range from $117.9 billion (AEI/Heritage) to $174.4 billion (OECD ) ( Figure 3 and Table 1 ). Comparability issues also arise when trying to differentiate loan, investment, and construction projects that overlap, since datasets only capture a certain type of activity. Various datasets' categorizations may not cover the full range of activity that is taking place. China's official foreign direct investment (FDI) statistics are compiled by two government agencies according to different criteria. The Ministry of Commerce of the People's Republic of China (MOFCOM)'s data are based on officially approved investments by nonfinancial institutionsâthat is, information recorded during the approval process rather than through surveys or questionnaires as in the United States (see textbox below). They are generally separated out by country and industry. The State Administration of Foreign Exchange of the People's Republic of China (SAFE), on the other hand, reports Balance of Payments (BoP) data at the aggregate level. SAFE, in theory, follows IMF guidelines. While both agencies are supposed to reconcile their figures in their annual revisions, discrepancies in the total amounts reported are common and significant. Much of China's official outbound FDI also has traditionally been registered in Hong Kong, the former British colony that has been a Special Administrative Region of the PRC since 1997, or in tax havens such as the Cayman Islands or British Virgin Islands. Chinese firms, in particular, are known to use holding companies and offshore vehicles to structure their investments. \"Round-tripping\" (the practice of firms routing themselves funds through localities that offer beneficial tax policies or special incentives), \"trans-shipping\" (the practice of firms routing funds through countries that offer favorable tax policies to later reinvest these funds in third countries), and indirect holdings all make it difficult to track and disaggregate investments accurately. Chinese domestic investors have also been known to rely on these schemes to take advantage of favorable conditions granted only to foreign investors. As the Economist Intelligence Unit notes, \"Chinese statistics record approved projects rather than actual money transfers,\" and \"[c]ompanies often list the initial port of call of their capital, rather than its final destination, thus falsely inflating the importance of stop-over locations.\" In addition to data reliability and comparability issues, it is not always possible to determine if an asset or project is wholly or partially owned, financed, built, or operated by a Chinese entity. Thus, the lack of consistent, disaggregated, and detailed information limits the proper assessment of the size, scope, and implications of these activities. Moreover, because major projects generally involve several phases and a sometimes-evolving cast of stakeholders, it is not always possible to distinguish between the phases of acquisition or construction and those of operationsâas they are often blended in terms of time and firms involved. Many of the overseas infrastructure projects in which Chinese entities are involvedâparticularly portsâalso present distinct challenges not always encountered in the analysis of traditional foreign direct investments (e.g., multinational corporations building a new factory or acquiring an existing domestic firm). In the case of infrastructure, to attract foreign investment and transfer risks to the private sector, it is common for host countries to offer long-term concessions or leasesâfor both construction and operation. These typically allow the grantee firm the right to use land and facilities (e.g., ports and highways) for a defined period in exchange for providing services. Because these lands and facilities tend to be owned by the host government, the investments can come in the form of use-rights through leases or joint ventures. These challenges, together with the opacity of China's terms and conditions, can limit the ability to assess accurately the extent of Chinese involvement. Data availability limitations also may arise since China often finances infrastructure development through its export credit agencies and development banks. China is not a member of the Organization for Economic Cooperation and Development (OECD) or part of its Arrangement on Officially Supported Export Credits, which includes rules on transparency procedures for government-backed export credit financing. The United States, China, and other countries have been working to develop a new set of international rules, but progress reportedly has been limited. Finally, some of China's global economic activities are portrayed inaccurately as \"foreign aid\" or \"development assistance.\" While certain aspects may resemble assistance in the conventional sense, they generally do not meet the OECD standards of \"official development assistance\" (ODA). The terms of China's \"ODA-like\" loans are less concessional than those of other major actors such as the United States and Japan, have large commercial elements with economic benefits accruing to Chinese actors, and are rarely government-to-government. Details on specific Chinese deals and overall flows are opaque because the PRC government rarely releases data on any of its lending activities abroad or those of its state firms and entities. China also is not part of the OECD's Development Assistance Committee, which \"monitors development finance flows, reviews and provides guidance on development co-operation policies, promotes sharing of good practices,\" and helps set ODA standards. Data limitations and lack of transparency, combined with the number of unknown variables that drive China's foreign economic policy decision-making processes, can affect how Members of Congress perceive and address the challenges that China's overseas economic activities pose to U.S. and global interests. These limitations also complicate efforts to compare accurately the extent to which China's global economic reach differs from that of the United States. Little consensus exists within the United States and the international community on China's ultimate foreign economic policy goals or what motivates and informs its economic activities abroadâeither in general or with regard to specific regions or countries. Debate is ongoing over whether China's global economic engagements have a pragmatic, overarching strategy, or are a series of marginally-related tactical moves to achieve specific economic and political goals. Similarly, some analysts argue that Beijing, through its global economic activities, is trying to supplant the United States as a global power, while others maintain that it is focused mainly on fostering its own national economic development. In the absence of sufficient transparency in China's international economic activities, Members of Congress may seek to support current and new U.S. efforts to better track, analyze, and publicize actual Chinese investment, construction, assistance, and lending activities. Better data and information on China's activities may help U.S. policymakers assess the scope and address key questions over China's international engagements and growing economic role, including: How could the United States more accurately assess and respond to increasing competition by China for leverage and influence, both in countries where the United States is seeking to expand its economic and political ties, as well as in those with strong existing U.S. relationships? To what extent are the terms of China's global investments and economic assistance less restrictive than U.S. activities and how does this affect U.S. efforts to promote good governance around the world? What commercial advantages does China's arguably unique approach to global economic engagement provide its companies, how does this affect the ability of U.S. companies to compete for international business, and what policies and agreements should the United States put in place to mitigate these effects? How can the United States expose where China is in violation of the rules and norms of global institutionsâparticularly where it has or is seeking leadership positionsâand use this knowledge to require China to adhere to international norms and condition its investments and assistance on widely accepted best practices? What are the implications for the United States and international financial institutions (IFIs) that often promote good governance when China competes directly as an international lender and may offer less encumbered \"assistance\" in ways that directly undermine U.S. and IFI values and principles? How should the IFIs and the United States respond to this challenge, particularly when China is seeking influence and leadership in both current IFIs and these alternative paths? Should China's leadership role be challenged if it is found to be undermining the goals and principles of the organizations it leads or seeks to lead, including with respect to transparency commitments? How do differences in approach and scale of U.S. and Chinese global economic activities affect global perceptions of U.S. engagement around the world? U.S. policymakers could seek to improve their own knowledge base in ways that may enable them to advance U.S. foreign economic interests more effectively, while at the same time encouraging more transparency by China. This could include: Collecting, maintaining, and publicizingâto the extent that is possibleâa more accurate calculus of actual Chinese economic activities, particularly by tracking investment and assistance that is delivered, as opposed to that which is merely announced (e.g., either unilaterally or by encouraging or requiring greater disclosure through the international financial institutions and WTO). Directing agencies within the executive branch to develop a whole-of-government approach and guidance to better assess the global investment, construction, and lending activities of U.S., Chinese, and other major actors. As part of this effort, the U.S. government could harmonize U.S. programs for gathering information and streamline data centralization. In addition, it could study the adequacy of data and information recording, collection, disclosure, reporting, and analysis at the U.S. and international levels and recommend necessary improvements. Establishing a U.S. statistical office or program tasked with collecting current information on international capital flows and other information related to international investment, public procurement, and export and investment promotion, financing, and insurance by U.S., Chinese, and other major economic actors. Conducting oversight and examining more closely data collection and transparency commitments in various institutions, including the Organization for Economic Co-operation and Development (OECD), International Monetary Fund (IMF), the World Bank, and United Nations Conference on Trade and Development (UNCTAD) on investment, loans, and government procurement to determine if these mechanisms are sufficient and/or are being adhered to. Determining whether the World Trade Organization (WTO) should play a greater role to enhance transparency and set standards for dissemination of investment data through future reforms to key agreements or new agreements on investment. Examining the activities of international and regional organizations to determine if they are sufficient to address emerging data requirements or whether a major U.S. and/or internationally-coordinated effort is required. Supporting U.S. and international efforts to provide training courses, workshops, and technical assistance programs for countries to implement international statistical guidelines and improve comparable data compilation and dissemination practices. Holding hearings on Chinese overseas lending and investment practices. The United States could consider a combination of pressure and collaboration to strengthen its economic engagement efforts and encourage China to adopt international best practices. While the success of past efforts has arguably been limited, the United States could continue to: Work with other countries and international economic institutions to improve the collection and accuracy of data, address data deficiencies, and harmonize data reporting requirements by China and other major economies. Encourage China to participate more vigorously in adopting or developing rules on export credit financing and related areas, while urging China to sign on to public-private sector good governance initiatives and agreements. Coordinate efforts with other countries to set terms for data transparency and best practices for China to participate in multilateral and country-level donor foreign assistance dialogues and related efforts to prioritize key development goals and coordinate aid efforts in order to create synergies, avoid duplication and tied aid, and maximize each donor's strengths. Offer to work collaboratively with Chinaâeither bilaterally or through multilateral foraâto more clearly differentiate its official grant-based aid from its subsidization of trade and commerce credit; monitor the effectiveness of its aid strategies; harmonize aid reporting with other donor governments; and develop best practices in support of transparency and accountability. Appendix A. Databases and Resources Appendix B. China's FDI in the United States", "summary": "The People's Republic of China (PRC or China) has significantly increased its overseas investments since launching its \"Go Global Strategy\" in 1999 in an effort to support the overseas expansion of Chinese firms and make them more globally competitive. Since then, these firmsâmany of which are closely tied to the Chinese governmentâhave acquired foreign assets and capabilities and pledged billions of dollars to develop infrastructure abroad. As a result, many in Congress and the Trump Administration are focusing on the critical implications of China's growing global economic reach for U.S. economic and geopolitical strategic interests. Some analysts see these Chinese activities as primarily commercial in nature. Others contend that the surge in global economic activity is also part of a concerted effort by China's leaders to bolster China's position as a global power and ensure support for their foreign policy objectives. There is also growing concern about the terms of China's economic engagement, particularly over the ways that Chinese lending may be creating unsustainable debt burdens for some countries and over how much of China's lending is tied to commercial projects and Chinese state firms that benefit from the investment. A major challenge to understanding the implications of China's growing global economic reach is the critical gap in the availability and accuracy of data and information. Most notable is the fact that no comprehensive, standardized, or authoritative dataâfrom either the Chinese government or international organizationsâare available on Chinese overseas economic activities. Given the complexity and multifaceted nature of the projects in which Chinese entities are involved, attempts to assess the size and scope of these projects are rough estimates, at best, and should be regarded as such. Figures cited in news articles, think-tank reports, and academic studies may not be entirely accurate and should be interpreted with caution. For instance, many publicly and privately available unofficial \"trackers\"âfrom which these data are often sourcedâare based on initial public announcements of Chinese overseas projects, which may differ significantly from actual capital flows because such projects may evolve or may never come to fruition. In the absence of accurate and sufficient data, Members of Congress may seek ways to improve their own understanding by supporting U.S. and international efforts to better track, analyze, and publicize actual Chinese investment, construction, assistance, and lending activities. Congress, for example, may direct agencies within the executive branch to develop a whole-of-government approach to better assess the global economic activities of U.S., Chinese, and other major actors. Additionally, Congress could require these agencies to study the adequacy of data and information recording, collection, disclosure, reporting, and analysis at the U.S. and international levels. Better information could facilitate clearer, deeper, and better informed assessment of such activities and their (1) impact on U.S. interests and (2) ramifications for the norms and rules of the global economic systemâa system whose chief architect and dominant player to date largely has been the United States.", "document_type": "crs"}
{"report": "A census, as distinguished from a survey, is intended to be a complete count of the population. A scientifically designed and conducted survey covers a sample of the population, and the results are generalizable to the whole population. The U.S. decennial census is, foremost, a constitutional requirement. The Enumeration Clause of the Constitution (Article I, Section 2, clause 3, as modified by Section 2 of the Fourteenth Amendment) mandates \"counting the whole number of persons in each State\" every 10 years in order to apportion seats in the House of Representatives. The first census occurred in 1790; 2020 marks the 24 th time the national count has taken place. The modern census is important for more than House apportionment. Decennial census data are used for within-state redistrictingâthe redrawing of legislative districts. Decennial census and related data are used in certain formulas that determine states' and localities' annual allocations of federal funds, estimated by the Census Bureau as of FY2015 at $689.3 billion and by an academic researcher as of FY2017 at $1.5 trillion. The decennial counts also are the foundation for estimates of current population size between censuses and projections of future size. Businesses, nonprofit organizations, researchers, and all levels of government are steady consumers of decennial and related data collected by the Census Bureau. April 1, 2020, is the official Census Day. The count starts before, and census activities continue beyond, April 1, however. On January 21, 2020, the Census Bureau began the enumeration by counting the population in remote Toksook Bay, Alaska. The bureau is to start making in-person visits to nonrespondents in May 2020. By law, the bureau must provide the official numbers for House apportionment to the President no later than December 31, 2020. Also by law, states that requested 2020 population counts for, as examples, American Indian areas, counties, cities, towns, census tracts, census block groups, census blocks, and \"state-specified congressional, legislative, and voting districts,\" must receive the data no later than March 31, 2021. The final design of the file containing these data remains to be specified, but the file will include data on \"voting age, race, ethnicity, occupancy status, and (new for the 2020 Census) group quarters.\" The rollout of other census products is scheduled to continue until 2023. The Census Bureau has researched ways to engage the people who likely will be hardest to count in 2020. For example, the Census Barriers, Attitudes, and Motivators Study (CBAMS), also called the \"2020 Census Planning Survey,\" was conducted from February 20 through April 17, 2018, with a nationwide sample of 50,000 households. It covered, according to the bureau, \"a range of topics related to census participation and completion.\" Respondents could complete the survey in English or Spanish, online or by mail. \"Approximately 17,500 people responded to the survey, which was then weighted to be representative of all householders in the United States ages 18 and older.\" The bureau focused on differences in responses \"across race, age, gender, education, and country of birth.\" Qualitative information gathered from 42 focus groups in 14 locations nationwide from March 14, 2018, through April 19, 2018, supplemented the survey results. The bureau reported that the use of focus groups was \"designed to help the research team understand the attitudes of small demographic groups or groups that were otherwise difficult to reach with the survey.\" The \"chief barrier\" to 2020 census participation identified in the survey and the focus groups was \"a lack of understanding of the purpose and process of the census.\" The focus groups showed this lack to be \"associated with several negative attitudes toward the census, including apathy, privacy concerns, fear of repercussions, and general distrust of government.\" The survey results indicated that \"certain demographic characteristics, including low levels of education, being young, and being of racial or ethnic minority groups,\" were related to \"low levels of intent\" to respond to the 2020 census. The survey and the qualitative findings, however, \"revealed common motivators\" for answering the census. Despite \"important differences\" among demographic groups, \"funding for public servicesâsuch as hospitals, schools, and roadsâis a key motivator across groups.\" The bureau observed that respondents resembling the people in the focus groups, especially, might understand \"the importance and purpose of the census if they make the connection between completing a census form and the possibility of an increase in funding or support\" for their communities. The bureau used information such as gained from CBAMS to inform its $500 million communications strategy, developed by the bureau and its communications contractor, VMLY&R. As the bureau has explained, VMLY&R includes \"multicultural advertising agencies, seasoned in reaching diverse audiences.\" An advertising campaign \"in English and 12 other languages\" will be part of the communications strategy. The languages are Arabic, Chinese (Mandarin and Cantonese), French, Haitian Creole, Japanese, Korean, Polish, Portuguese, Russian, Spanish, Tagalog, and Vietnamese. As discussed under question 11, below, online questionnaires are to be available in the same languages. The bureau's schedule calls for paid advertising to begin running in January 2020, \"across multiple platforms, including print and digital outlets, television and radio, billboards,\" and ads \"at transit stations, grocery stores, and movie theaters.\" The two largest shares of the total paid media campaign budget are 39.0% for television and 29.1% for digital media. The campaign is expected to reach \"99% of all households\" nationwide, \"particularly in multicultural and hard-to-count populations.\" Another part of the communications strategy is the partnership program, which, in the bureau's explanation, \"integrates two essential programs.\" The Community Partnership Engagement Program \"employs the strengths of tribal, state, and local governments, as well as community-based organizations, faith-based organizations, schools, media, businesses, social services, ethnic organizations, and others.\" Much of the community partnership work is being \"conducted by partnership specialists who are employed in the field leading up to and during\" the census. The National Partnership Program \"builds and strengthens relationships with businesses, industries and organizations with national reach.\" The two programs \"are intended to be complementary\" and draw on \"the expertise of various Census Bureau employees to help maximize\" census participation. The community partnership effort has, among other goals, the formation of Complete Count Committees (CCCs) in all 50 states, tribal areas, the District of Columbia, Puerto Rico, and cities with at least 200,000 residents. A CCC, according to the Census Bureau, comprises \"a broad spectrum of government and community leaders from education, business, healthcare,\" and other organizations. CCC members are to develop census awareness and encourage cooperation with the census \"based upon their knowledge of the local community.\" Still being formed, CCCs are \"identifying budget resources and establishing local work plans\" for implementation in 2020. The bureau has compiled and posted on its website a guide for those interested in forming CCCs and an alphabetized list of existing committees, with any available contact information. An additional component of the partnership program is Statistics in Schools, which, in general, promotes statistical literacy for students from kindergarten through high school and, specifically, explains to students why the census is important. One goal is for students to bring this message home. A related goal is to make school-age children and the adults in their households aware of the need to count all children in a household, being sure not to miss any babies or other children under age five. They sometimes can be erroneously omitted from the list of household residents, as has happened in past censuses. The Census Bureau has developed an application, the Response Outreach Area Mapper (ROAM), to facilitate identifying hard-to-count areas and provide socioeconomic and demographic profiles of these areas using American Community Survey (ACS) estimates. ROAM has helped the bureau, in its words, \"create a tailored communications and partnership campaign\" and inform \"outreach activities and hiring practices across the country,\" in order to hire \"an adequate number of staff and staff with the necessary language skills for a given area.\" One advantage of ROAM for census partners is that they can use it to identify specific areas most needing their attention. As the Census Bureau has explained, it will let most people know by mail. In March 2020, about 95% of U.S. households are to receive mailed \"invitations\" from the bureau to answer the census online. A household that does not respond is to receive reminders in the mail, then, in April, a paper questionnaire to complete. Almost 5% of householdsâincluding those who receive their mail at post office boxes and those recently displaced by natural disastersâare to have an invitation delivered by census workers. Not quite 1% of households are to be enumerated in person during the initial phase of the census. These households are in remote areas, like parts of Alaska and northern Maine and certain American Indian areas that have asked to be counted in person. The census form asks for the following basic information: the number of people living or staying in the respondent's home as of April 1, 2020; whether any additional people living or staying in the home were not counted; whether anyone in the home usually lives or stays somewhere else; whether the home is owned, with or without a mortgage, or rented; the respondent's telephone number (in case the Census Bureau needs to contact the person to clarify any responses); the name of each person in the household and the person's relationship to the respondent; each person's sex; the person's age and birthdate; whether the person is \"of Hispanic, Latino, or Spanish origin\"; and the person's race. The bureau has emphasized that the census never asks a person for his or her Social Security number or bank or credit card account information, for any \"money or donations,\" or for \"anything on behalf of a political party.\" A form purporting to be a census form that requests such information is not from the Census Bureau and is not legitimate. The Census Bureau announced on January 26, 2018, that the form would not have a separate MENA category. A study the bureau released in 2017 noted that the \"inclusion of a MENA category\" in the 2015 National Content Test helped MENA respondents \"more accurately report their MENA identities\" and characterized the use of this category as \"optimal.\" Later feedback, however, reportedly indicated the opinion of \"a large segment\" of the MENA population \"that MENA should be treated as a category not for race but ethnicity,\" which \"the bureau so far has not specifically tested.\" People of MENA background may continue to report themselves as \"White.\" Two examples of \"White\" shown on the census form are Lebanese and Egyptian, both in the MENA category. The current Office of Management and Budget standards for federal reporting of race and ethnicity, which apply to the Census Bureau, designate \"White\" as \"A person having origins in any of the original peoples of Europe, the Middle East, or North Africa.\" The 2020 census will collect only the basic data described under question 6, above. It will not ask people for detailed social, demographic, economic, or housing information, including about their legal, immigration, or citizenship status. A citizenship question was proposed, challenged, and ultimately not retained on the census form. Secretary of Commerce Wilbur Ross announced on March 26, 2018, that the 2020 census form would include the current American Community Survey question on citizenship. The question is, as it has been in the ACS since before 2010, \"Is this person a citizen of the United States?\" A checkbox appears beside each of the following possible answers: \"Yes, born in the United States\"; \"Yes, born in Puerto Rico, Guam, the U.S. Virgin Islands, or Northern Marianas\"; \"Yes, born abroad of U.S. citizen parent or parents\"; \"Yes, U.S. citizen by naturalizationâPrint year of naturalization\"; and \"No, not a U.S. citizen.\" The Department of Justice maintained that the census, not a survey like the ACS, was \"the most appropriate vehicle for collecting\" citizenship data \"critical to the Department's enforcement of Section 2 of the Voting Rights Act\" and its \"protections against racial discrimination in voting.\" Opponents of the citizenship question expressed concern that it might depress immigrants' census response rates or cause them to falsify data, especially if their status in the United States, or that of their friends or families, was illegal. Census Bureau fieldworkers in 2017 noted heightened anxiety about data confidentiality among certain foreign-born respondents and reluctance to answer questions, particularly about citizenship status. Six former bureau directors signed a January 26, 2018, letter to Secretary Ross, opposing the late-date introduction of a citizenship question that, at the time, had not been tested for the 2020 census. Multiple lawsuits were filed to block the question. Judge Jesse Furman, U.S. District Court for the Southern District of New York, ruled on July 26, 2018, that a consolidated suit by the State of New York and others could proceed. The U.S. Supreme Court heard the case as Department of Commerce et al. v. New York et al. on April 23, 2019. The Court's decision, written by Chief Justice John Roberts and issued on June 27, 2019, found that the addition of a citizenship question did not violate the Enumeration Clause of the Constitution or the Census Act (Title 13, U.S. Code , Census ), but the Court held that Secretary Ross's decision violated the Administrative Procedure Act because his sole stated reason for adding the citizenship question was not the real reason for his decision. On July 11, 2019, the President issued an executive order stating that the ruling had \"made it impossible, as a practical matter, to include a citizenship question on the 2020 decennial census questionnaire.\" The order, instead, directed \"all executive departments and agencies\" to give the department \"the maximum assistance permissible, consistent with law, in determining the number of citizens and non-citizens in the country, including by providing any access\" requested by the department to relevant administrative records. This action, the order continued, \"will ensure that the Department will have access to all available records in time for use in conjunction with the census.\" On September 13, 2019, the organization LUPE and others filed a suit in the U.S. District Court for the District of Maryland against the Commerce Secretary, the Director of the Census Bureau, the Commerce Department, and the Census Bureau, seeking to block implementation of the executive order. The outcome of the suit remains to be determined. The American Community Survey is occasionally confused with the decennial census. In past decades, through the 2000 census, the census consisted of a short form, with questions that applied to all U.S. residents, and a long form, which included the short form questions plus many more questions covering social, demographic, economic, and housing topics. The long form went to a representative sample of all U.S. residents, a 17% sample in 2000, and the results could be generalized to the whole resident population. The bureau discontinued the long form after 2000 and launched its replacement, the ACS, in 2005 and 2006. The bureau considers the ACS a part of the decennial census program but conducts it separately from the census. Although the census is administered once a decade, the ACS goes to a small sample of the population every month and, as did the long form, collects myriad data. ACS results are aggregated over time to produce one-year and five-year estimates. For the most populous areas, those with at least 65,000 people, sample data collected over just 12 months can be generalized to an area's whole population. For less populous areas, down to below 20,000 people, data have to be collected over five years to generate representative samples. All areas, however, receive new sets of estimates (either one-year or five-year estimates) every year. In 2020, for the first time, people will be able to answer the census online. Some people have heard or assumed that because they can answer online, they must answer online or the census will miss them. This concern is based on inaccurate perceptions. The bureau is emphasizing online responses because they can be quick and easy and because they can help control the cost of the census. Anyone who lacks internet access or simply prefers not to respond online, however, can fill out a paper questionnaire. People also will be able to submit their census answers by telephone, by calling Census Questionnaire Assistance centers. The Census Bureau will make the 2020 census questionnaire available online in 12 non-English languages: Arabic, Chinese (Mandarin and Cantonese), French, Haitian Creole, Japanese, Korean, Polish, Portuguese, Russian, Spanish, Tagalog, and Vietnamese. The bureau will provide Census Questionnaire Assistance in the same languages and through a telecommunications device for the deaf. In addition, the bureau will make field enumeration materials available in Spanish and will provide bilingual (English and Spanish) paper questionnaires and related mailings. It also will provide language guides, language glossaries, and language identification cards in 59 non-English languages. The language guides will be available in video and print, including large print, and braille, as well as American Sign Language. Refusing or willfully neglecting to answer the census is illegal. Title 13, U.S. Code , Section 141, \"Population and other census information,\" specifies that a decennial census is to be conducted. Section 221, \"Refusal or neglect to answer questions; false answers,\" states, in full (a) Whoever, being over eighteen years of age, refuses or willfully neglects, when requested by the Secretary, or by any other authorized officer or employee of the Department of Commerce or bureau or agency thereof acting under the instructions of the Secretary or authorized officer, to answer, to the best of his knowledge, any of the questions on any schedule submitted to him in connection with any census or survey provided for by subchapters I, II, IV, and V of chapter 5 of this title, applying to himself or to the family to which he belongs or is related, or to the farm or farms of which he or his family is the occupant, shall be fined not more than $100. (b) Whoever, when answering questions described in subsection (a) of this section, and under the conditions or circumstances described in such subsection, willfully gives any answer that is false, shall be fined not more than $500. (c) Not withstanding any other provision of this title, no person shall be compelled to disclose information relative to his religious beliefs or to membership in a religious body. Title 18, U.S. Code , Crimes and Criminal Procedure , Sections 3559 \"Sentencing Classification of Offenses,\" and 3571, \"Sentence of Fine,\" effectively update the penalties for certain broad classes of offenses, without any specific mention of the census. Under this title and these sections, the possible penalty for the type of offense constituted by refusing or willfully neglecting to answer the census (13 U.S.C. 221(a)) is a fine of not more than $5,000. The possible penalty for providing any false census answer (13 U.S.C. 221(b)) is also $5,000. Yes. The Census Bureau did conduct limited 2020 census tests in 2018 and 2019. The 2018 test was the so-called dress rehearsal for the 2020 census, which the bureau described as \"the last operational field test\" before the actual census. The test was designed to \"assess the readiness and integration of planned\" 2020 \"operations, procedures, systems and field infrastructure.\" It began in 2017 with address canvassing (explained under question 14. How will the Census Bureau know where people live so that it can contact them in 2020? , below) in Bluefield-Beckley-Oak Hill, West Virginia; Pierce County, Washington; and Providence County, Rhode Island. The enumeration phase of the test occurred in 2018 in Providence County only. As the bureau marked the \"successful completion\" of the test, a bureau official noted that work would continue through 2019 \"to refine and scale\" census systems \"to ensure the best possible performance\" in 2020. In 2019, the bureau selected a nationally representative sample of about 480,000 housing unit addresses to test how a proposed citizenship question might affect census response rates. The test did not involve nonresponse follow-up in the field. Although respondents' cooperation with these tests was helpful to the Census Bureau, the tests were not the actual decennial census. The 2020 census, the complete count of the U.S. resident population, is to occur only in 2020. Even if a person participated in a census test, the person still is obligated to answer the 2020 census questions and can be part of the census count only by doing so. Even though people will be able to answer the census online, an accurate Master Address File, with the addresses, geocodes, and other attributes of living quarters, will be, as in past decades, the foundation for contacting the public and conducting a good census. It will enable the bureau to notify the public about the census and, as necessary, send census forms and enumerators to nonresponding households. For the 2010 census, the bureau hired about 150,000 \"address canvassers\" to walk 11 million census blocks, updating addresses and maps as they went. In preparation for 2020, the bureau created Block Assessment, Research, and Classification Application software to compare satellite images of the United States at successive times. Using this software, the bureau could identify new housing developments, changes in existing houses, and other houses that were built after 2010. The bureau could compare, too, \"the number of housing units in current imagery with the number of addresses on file for each block.\" Satellite imagery enabled the bureau to verify 65% of addresses without going into the field, leaving 35% for field verification. The bureau recruited and trained about 32,000 temporary workers to verify more than 50,000 addresses nationwide, covering about 1.1 million census blocks. On August 12, 2019, the bureau announced the start of this work, the first major field operation of the 2020 census. The operation ended on October 11, 2019. The bureau expects to hire up to 500,000 temporary census field workers. Enumerators for the nonresponse follow-up operation, beginning in May 2020 and continuing through early July, are the main example. They will go door-to-door, collecting data from households that have not yet answered the census online, by mail, or by phone. Additionally, in certain remote areas, such as northern Maine and Alaska, visits from census-takers may be the only way for residents to report their census data. According to a bureau official, \"Recent high school graduates, veterans, retirees, military spouses, seasonal workers,\" and people who are bilingual are \"highly encouraged to apply.\" Others are welcome, too. \"It's important we hire people in every community in order to have a complete and accurate census,\" the official said. People are encouraged to apply now to be considered for positions in the spring of 2020. Recruitment has begun; paid training is to occur in March and April. To qualify for temporary census employment, a person must be at least age 18, generally must be a U.S. citizen, must be proficient in English, must have a valid email address, and must complete an application that includes the applicant's Social Security number and answers to a set of assessment questions. For some positions, the applicant has to fill out a background questionnaire. Applicants must be fingerprinted, and their fingerprint images will go to the FBI to be processed and checked for criminal records, although a criminal record will not invariably disqualify an applicant. Pay rates, which will vary according to where census jobs are located, will range from $13.50 to $30.00 an hour. Workers will receive paid training. They will be paid weekly, and their hours of work will be flexible. Veterans may be eligible for veterans' preference in hiring, and census employment has no upper age limit. Every census field worker should have an identification badge (ID) that shows the worker's photograph, an expiration date for the ID, and a U.S. Department of Commerce watermark. Every respondent can check this identification and, if unsure about its authenticity, contact a regional census center to talk to a bureau representative. Legal protections for census data exist, and the Census Bureau also continues working to address cybersecurity vulnerabilities that have been, or are being, identified. Title 13, U.S. Code , both requires respondents to provide their data and provides for maintaining the confidentiality of data on individuals. Title 13, Section 9, \"Information as confidential; exception,\" states, in part (a) Neither the Secretary, nor any other officer of employee of the Department of Commerce or bureau or agency thereof, or local government census liaison, may, except as provided in section 8 or 16 or chapter 10 of this title or section 210 of the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act, 1998 or section 2(f) of the Census of Agriculture Act of 1997â (1) use the information furnished under the provisions of this title for any purpose other than the statistical purposes for which it is supplied; or (2) make any publication whereby the data furnished by any particular establishment or individual under this title can be identified; or (3) permit anyone other than the sworn officers and employees of the Department or bureau or agency thereof to examine the individual reports. No department, bureau, agency, officer, or employee of the Government, except the Secretary in carrying out the purposes of this title, shall require, for any reason, copies of census reports which have been retained by any such establishment or individual. Copies of census reports which have been so retained shall be immune from legal process, and shall not, without the consent of the individual or establishment concerned, be admitted as evidence or used for any purpose in any action, suit, or other judicial or administrative proceeding. Title 13, Section 214, \"Wrongful Disclosure of Information,\" states, in full Whoever, being or having been an employee or staff member referred to in subchapter II of chapter 1 of this title, having taken and subscribed to the oath of office, or having sworn to observe the limitations imposed by section 9 of this title, or whoever, being or having been a census liaison within the meaning of section 16 of this title, publishes or communicates any information, the disclosure of which is prohibited under the provisions of section 9 of this title, and which comes into his possession by reason of his being employed (or otherwise providing services) under the provisions of this title, shall be fined not more than $5,000 or imprisoned not more than 5 years, or both. Under Title 18, Sections 3559 and 3571, the possible penalty for disclosing \"any information, the disclosure of which is prohibited\" (13 U.S.C. 214) is a substantially increased fine of not more than $250,000 or imprisonment of less than five years, or both. The Census Bureau's operational plan has acknowledged the risk that \"cybersecurity incidents,\" including data breaches and denial-of-service attacks, could affect its information technology (IT) systems, such as the online census questionnaires, \"mobile devices used for fieldwork, and data processing and storage systems.\" Under the plan, \"IT security controls will be put in place to protect the confidentiality, integrity, and availability of the IT systems and data,\" with the goal of preventing any such incidents from negatively affecting census operations. At a July 24, 2019, congressional hearing, Census Bureau Director Steven Dillingham summarized the bureau's cybersecurity efforts for the 2020 census. He stated, in part A key feature of the security is encryption of data at every stageâin transit over the internet, at rest within our systems, and on the enumeration devices. Also, enumeration devices are secured with multiple credentials, and if a device is lost, it will be remotely disabled and have all its contents wiped. Our cybersecurity program is designed to adapt and respond to a changing threat landscape. We incorporate protections in our technology, have processes to continuously monitor systems, and have a team ready to respond immediately to any potential threat. The Census Bureau works with the Department of Homeland Security, the federal intelligence community, and industry experts to share threat intelligence, giving us the most visibility possible to enable immediate action to protect data. With this cooperation, we identify threats early so that we may proactively respond and improve security. Our developers and security engineers work together to integrate security into systems design and development. Our systems are independently assessed for cybersecurity before deployment, and ongoing testing of cybersecurity capabilities is conducted throughout the time systems are operational. Security staff monitor our systems for cybersecurity vulnerabilities with industry-leading tools. We continuously test for more than 100,000 known vulnerabilities, with thousands of new potential vulnerabilities added to the list on a regular basis. If a vulnerability is identified, or security enhancement required, the security team will act quickly to ensure the most effective security posture. At the same hearing, the Government Accountability Office (GAO) noted delays or gaps in the bureau's progress toward cybersecurity for 2020: The Bureau has established a risk management framework that requires it to conduct a full security assessment for nearly all the systems expected to be used for the 2020 Census and, if deficiencies are identified, to determine the corrective actions needed to remediate those deficiencies. As of the end of May 2019, the Bureau had over 330 corrective actions from its security assessments that needed to be addressed, including 217 that were considered \"high-risk\" or \"very high-risk.\" However, of these 217 corrective actions, the Bureau identified 104 as being delayed. Further, 74 of the 104 were delayed by 60 or more days. According to the Bureau, these corrective actions were delayed due to technical challenges or resource constraints. GAO recently recommended that the Bureau take steps to ensure that identified corrective actions for cybersecurity weaknesses are implemented within prescribed time frames. GAO commended the bureau for working with the Department of Homeland Security (DHS) \"to support\" its \"cybersecurity efforts.\" During the past two years, as a result of these activities, the Bureau has received 42 recommendations from DHS to improve its cybersecurity posture. GAO recently recommended that the Bureau implement a formal process for tracking and executing appropriate corrective actions to remediate cybersecurity findings identified by DHS. Implementing the recommendation would help better ensure that DHS's efforts result in improvements to the Bureau's cybersecurity posture. The GAO testimony also called attention to a Commerce Department Office of Inspector General (IG) report identifying challenges in the bureau's \"cloud based systems\" supporting the census. The bureau \"agreed with all eight\" of the IG's recommendations concerning these systems and \"identified actions taken to address them.\" In addition, recognizing that \"many of the same digital and social channels\" being used to promote the census can work against it as well, the bureau established a \"trust and safety team\" to combat \"the spread of misinformation (incorrect information spread unintentionally) and disinformation (incorrect information spread intentionally).\" According to the bureau, the team comprises \"more than a dozen communications and social media experts under the executive leadership of career senior officials.\" It is coordinating the bureau's \"efforts with external technology and social media platforms, partner and stakeholder organizations, and cybersecurity officials.\" Drawing on \"best practices from the public and private sectors,\" the team is monitoring \"all available channels and open platforms for misinformation and disinformation about the census.\" The bureau also has launched a \"Fighting 2020 Census Rumors\" page on its website and has asked members of the public to email [email address scrubbed] if they see any \"resources,\" social media postings, or websites that they think contain incorrect information about the census. Noteworthy in this context is a December 19, 2019, press report of an announcement by the social media company Facebook that, starting in 2020, it \"will remove posts, photos,\" and other contents \"that mislead people\" about the census, \"aiming to prevent malicious actors from interfering\" with the process. \"Under the new rules, Facebook will ban posts from misrepresenting when and how the census occurs, who can participate and what happens to the personal information people submit to the government, company executives said.\" According to the article, \"Facebook and other tech giants, including Google and Twitter, have huddled with government officials in recent months to prevent census disinformation.\" Other companies \"have unveiled their own defensive measures: Google in December said it prohibited ads and YouTube videos that aim to misinform about the 2020 count. Twitter's rules, meanwhile, prohibit 'misleading information about how to participate in an election or other civic event',\" which presumably could include the census.", "summary": "April 1, 2020, will mark the official date of the 24 th U.S. decennial census. Mandated by the Constitution and federal law, the census is considered a cornerstone of the nation's representative democracy. Nevertheless, an enumeration that is complete and accurate is difficult to achieve. Among other challenges, the census is often misunderstood, mischaracterized, feared, or avoided. This report addresses common questions concerning the 2020 census. The report is intended to provide information about the census, including clarifying various aspects of the census process. Among the topics covered are the origin and purpose of the census; the dates of key census activities; what the Census Bureau has done to promote the enumeration and gain cooperation with it, such as background research on hard-to-count groups and areas, and outreach to them and the broader public through a $500 million communications strategy that includes paid advertising; what basic data the census will collect, largely about how many people live in each household; each person's sex, age, birthdate, race, Hispanic or non-Hispanic ethnicity, and relationship to the person filling out the census form; and whether the housing unit is owned or rented; what information, the Census Bureau has explained, the census never collects, including Social Security numbers, bank or credit card account information, money, or anything on behalf of a political party; why people who consider themselves to be of Middle Eastern or North African race or ethnicity will not be able to report themselves as such on the census questionnaire; clarification that the census will not include a citizenship, nationality, immigration, or other related question; how the Census Bureau will collect detailed socioeconomic and housing data separately from the census; clarification that people have several different options for answering the censusâonline, on paper, or by telephoneâeven though online responses are officially most encouraged; language support for the census, including online questionnaires in English and 12 non-English languages, Census Questionnaire Assistance by telephone in the same languages and through a telecommunications device for the deaf, and language guides in 59 non-English languages that will be available in video, standard and large print, braille, and American Sign Language; legal requirement to answer the census and possible $5,000 penalty for nonresponse or false answers; clarification that people must respond to the 2020 census even if they participated in the 2018 or 2019 census tests; the process for updating the Master Address File, the basis for contacting the population about the start of the census and following up with nonrespondents; how and when people can become employed as temporary 2020 census workers, what the requirements are for being hired, and what this work can offer to employees; how the public can identify census workers to be sure that they are legitimate; and legal and cybersecurity protections for confidential census information.", "document_type": "crs"}
{"report": "Federal aid to highways is provided through highway programs administered by the Federal Highway Administration (FHWA). These programs and activities are authorized as part of multiyear surface transportation reauthorization acts. The Fixing America's Surface Transportation Act (FAST Act; P.L. 114-94 ) authorized federal highway spending from FY2016 through September 30, 2020. This report examines the major highway issues Congress will likely consider during reauthorization. There are over 4 million miles of public roads in the United States, of which roughly 25% are eligible for federal aid. These eligible roads, designated federal-aid highways, include all of the nation's major roads. Federal highway funds generally cannot be spent on local roads, neighborhood streets, or minor rural collectors. The federal government provides funds to the states and territories for the building and improvement of eligible roads under the Federal-Aid Highway Program. The major characteristics of this program have been constant since the early 1920s. Most funds are apportioned to the states by formulas established in law. State departments of transportation largely determine which projects are funded, award the contracts, and oversee project development and construction. The states are required to pay 20% of the cost of non-Interstate System road projects and 10% for Interstate System projects. Federal assistance is focused on construction, and may not be used to fund operating costs or routine maintenance activities. The five-year FAST Act authorized a total of $225 billion for highways from FY2016 to FY2020. It provided for modest annual increases in federal highway spending over that period ( Figure 1 ). Apportionment is the distribution of funds among the states by statutory formula. Under the FAST Act, roughly 93% of federal highway funds were apportioned to the states ( Figure 2 ). The remaining sums were allocated for roads on federally owned lands or Indian reservations, for discretionary highway grants awarded by the U.S. Department of Transportation (DOT), and for FHWA administrative expenses. Historically, many discretionary programs were established by Congress to target specific policy objectives, such as promoting bridge construction. However, from the late 1990s until 2011, nearly all competitive grant program funds were earmarked, that is, directed to projects specified by Congress in authorization or appropriations acts. Earmarks have not been permitted since 2011. The apportioned programs within the Federal-Aid Highway Program include five \"core\" programs plus the Metropolitan Planning Program. The core programs are the National Highway Performance Program (NHPP), the Surface Transportation Block Grant Program (STBG), the Highway Safety Improvement Program (HSIP), the Congestion Mitigation and Air Quality Improvement Program (CMAQ), and the National Highway Freight Program (NHFP). The FAST Act does not use separate formulas to determine each state's apportionments under each core program. Instead, all the formula programs under the FAST Act are funded from a single annual authorization. From this amount, every state receives a single gross apportionment that is calculated based on the state's share of the FY2015 apportionments. Each state is then guaranteed that its apportionment represents at least a return of 95 cents for every dollar the state contributed to the highway account of the Highway Trust Fund (HTF), the mechanism through which formula funding is distributed to the states. Each state's total apportionment is then divided among the five formula programs and the Metropolitan Planning Program according to statute. Figure 3 charts the nationwide outcome of the distribution among the programs. The FAST Act provided an annual average of $45 billion for highways, about 10% more (unadjusted for inflation) than the annual average under the previous authorization bill, the two-year Moving Ahead for Progress in the 21 st Century Act (MAP-21; P.L. 112-141 ).The America's Transportation Infrastructure Act of 2019 ( S. 2302 ), reported by the Senate Environment and Public Works Committee on August 1, 2019, would provide a roughly 27% increase above the FAST Act authorizations. With the United States building few entirely new highways, the condition of existing highway infrastructure is a key issue in determining funding needs. FHWA's most recent biennial Conditions and Performance (C&P) report, drawing on FY2014 data, showed a mixed picture of the federal-aid system: the share of vehicle miles traveled (VMT) on pavements with good ride quality rose from 44.2% in 2004 to 47.0% in 2014, but the share of VMT on pavements with poor ride quality also increased, from 15.1% to 17.3%, over that period. The Interstate Highways were the road category in the best condition. Based on FY2014 data, the C&P report found that annual spending, $105.4 billion on all public roads from all sources of government, was more than sufficient to sustain the system condition and performance at the current level through 2034. Given the subsequent spending increases under the FAST Act, highway and bridge conditions may be better today than reflected in the FY2014 data. The C&P report also estimated the cost of completing all proposed work on federal-aid highways for which the benefits are expected to exceed the costs. The report found that annual spending by all levels of government would need to be roughly 30% higher than the 2014 level through 2034 if all such improvements were to be funded. Rather than appropriating funds annually, Congress has funded federal-aid highway programs through the HTF. The HTF is able to receive revenue from dedicated taxes and spend it on highways and public transportation prior to an appropriation; a mechanism called the obligation limit, included in the authorization act and appropriations acts, caps the amount of highway funding FHWA can promise the states in any year. About 85%-90% of the tax revenues that flow into the HTF are from an 18.3 cents-per-gallon tax on gasoline and a 24.3 cents-per-gallon tax on diesel fuel, with the remainder coming mainly from taxes on sales of trucks and truck tires as well as a heavy vehicle use tax. The HTF has two separate accounts, one for highway programs and the other for public transportation. The highway account, which funds the Federal-Aid Highway Program, much of the budget of the National Highway Traffic Safety Administration, and the entire budget of the Federal Motor Carrier Safety Administration, receives 15.4 cents per gallon from the gasoline tax and 21.4 cents per gallon from the diesel fuel tax, as well as all of the revenue from the taxes imposed on trucks and truck use. The reliance of the HTF on the gasoline and diesel taxes has become problematic because tax receipts do not increase with inflation in highway construction costs or with the price of fuel. The rates have not been increased since 1993. In 2018 a gasoline tax of approximately 45 cents per gallon would have been needed to equal the purchasing power of the 18.3-cents-per-gallon gasoline tax in 1998. In addition, sluggish growth in vehicle travel and improved vehicle efficiency have depressed the growth of gallons consumed, further constraining revenues. Since 2008, Congress has transferred nearly $144 billion to the HTF ($114.7 billion to the highway account alone) from the Treasury general fund and other sources in order to fill the gap between the tax revenue flowing into the fund and the outlays Congress has authorized. Despite these transfers, without a reduction in the size of the surface transportation programs, an increase in revenues, or further general fund transfers, the highway account balance in the HTF is projected to be close to zero in the first month of FY2022. At that point, FHWA would likely have to delay payments to state departments of transportation for completed work. The closures and stay-at-home orders implemented in response to the COVID-19 pandemic may make the HTF's funding shortfall more severe. As many employers closed or shifted to telework and fewer Americans drove to work, gasoline tax revenues will likely fall below projections. If states continue road projects as planned, the highway account balance could approach zero sooner than previously expected unless Congress provides additional funds. The Congressional Budget Office (CBO) projects that HTF highway account outlays (spending) will continue to outpace revenues through F2026 ( Figure 4 ) under current law. This projection, made prior to the COVID-19-related shutdowns, estimates that in funding a five five-year reauthorization beginning in FY2021 Congress faces a projected highway account shortfall of $46.5 billion. This is the amount of additional revenue Congress would need to provide to the HTF, whether from increased taxes, transfers from the general fund, or other sources, in order to avoid reducing the scope of the highway program. These are the amounts that the Senate Finance Committee and the House Ways and Means Committee would have to deal with if Congress decides to fund reauthorization at current levels plus expected inflation. CBO's March 2020 projection did not consider the impact of COVID-19 on HTF revenues and spending. Consequently, a major reauthorization issue is assuring that the HTF has sufficient resources over the life of the act to pay for the authorizations Congress provides. The options include the following: Since 2008 Congress has had a de facto policy of dealing with the HTF shortfall via transfers, mostly from the Treasury general fund, weakening the long-standing link between highway user revenues and the construction and maintenance of highways. Congress could continue this policy in a reauthorization act or make the policy permanent. In the recent past, a rule of the House of Representatives has required Congress to identify \"offsets\" in the form of other revenues or spending reductions equal to the amounts transferred from the general fund to the HTF. This requirement has not been a House rule since January 2019. Congress could reduce spending on the Federal-Aid Highway Program. To bring outlays into line with anticipated revenues, the needed reduction would be roughly 25%. Rather than reducing highway outlays, Congress could eliminate the HTF's mass transit account and use all HTF revenues for highway purposes only, leaving public transportation to be funded entirely from the general fund. However, even if all HTF revenues were dedicated to highways, the HTF is projected to face annual shortfalls beginning in FY2024. According to CBO, annual HTF revenue is projected to be almost $20 billion less than the cost of maintaining the present level of highway spending, adjusted for inflation, in FY2026, even if no HTF money goes to public transportation. Congress could make a major reduction in federal funding by devolving responsibility for highways to the states and reducing federal motor fuel and truck taxes accordingly. States could then raise their own highway revenues or reduce spending as they see fit. The challenge of making these adjustments would vary greatly from state to state. Devolution would have significant federal front-end costs, as the federal government would remain obligated to reimburse the states for highway projects committed to in previous years. Although there is a wide variety of revenue sources that could be used to provide revenues to the HTF, the four that have received significant interest in Congress in recent years are: raising the gasoline and diesel tax rates; imposing a vehicle miles traveled (VMT) charge; imposing a carbon tax; and taxing electric vehicles. The gasoline and diesel taxes could be raised enough to make up for loss of purchasing power and then be adjusted annually for inflation and fuel efficiency. Based upon the current level of fuel consumption, an initial increase of fuel taxes in the range of 10 cents to 15 cents per gallon would be required to fund highway and public transportation programs at their current levels, adjusted for anticipated inflation. Electric vehicles (EVs), which currently do not contribute to the HTF, could be charged for road use. Finding an efficient way for the federal government to tax EVs presents a challenge, as it does not collect information about their ownership or use. Some recent proposals would use the personal income tax to reach EV owners, rather than taxing the vehicles based on use. Approximately 1.5 million EVs are currently in use, according to the Edison Electric Institute, so an annual fee approximating the roughly $80 in federal fuel taxes paid for the average passenger vehicle each year would raise comparatively little revenue over the life of a five-year reauthorization act. Charging vehicle owners for each mile of travel has been discussed for many years as an alternative to the motor fuel taxes. However, a VMT charge would have relatively high collection and enforcement costs (estimates range from 5% to 13% of collections) and the administrative challenge of collecting the charge from roughly 268 million vehicles. Setting and adjusting VMT rates would likely be as controversial as increasing motor fuel taxes. Imposing a VMT on heavy trucks only, as has been done in Germany, might be less onerous to implement because it would involve a much smaller number of collection points. A truck-only VMT concept has already run into stiff opposition from trucking interests. A national VMT on heavy trucks could also face tax administrative issues. The payments to Toll Collect, the contractor that collects Germany's truck VMT charge, are estimated to be as high as 13% of annual revenues. A carbon tax could be assessed on emissions of carbon dioxide and other greenhouse gases, with a share of the revenue dedicated to federal transportation programs. In December 2019, CBO estimated that a carbon tax of $25 per metric ton would increase federal revenues by $1.1 trillion between 2019 and 2028.The effect on the HTF would depend on the design of the tax and how much of the revenue would be reserved for the HTF. Federal law permits the vast majority of roads in the United States to be converted to toll roads. However, the law bans the tolling of existing Interstate System highway lane capacity. For an existing road or bridge to be converted to a toll facility, it must be reconstructed or replaced. FHWA does not regulate toll rates, but it does enforce statutory limitations on the use of toll revenues. In general, these limitations require that a toll facility's revenues be spent on the toll facility. All revenue from tolls flows to the state or local agencies or private entities that operate tolled facilities; the federal government does not collect any revenue from tolls. While tolls may be an effective way of financing specific facilitiesâespecially major roads, bridges, or tunnels that are located such that the tolls are difficult to evadeâthey may not be cost-effective in areas with low population densities. However, a major expansion of tolling might reduce the need for federal expenditures on roads. Within the context of surface transportation reauthorization, there are several approaches to tolling that Congress could consider: allowing states to toll existing Interstate Highway lane capacity under certain circumstances, such as following major capacity expansion; permitting or prohibiting toll schedules that favor in-state vehicles or that toll only trucks; regulating rate setting under certain or all conditions; and expanding or restricting states' ability to use toll revenue to substitute for the non-federal share of federal-aid highway projects. A perennial question in highway reauthorization is how much of the funding should be distributed by formula to the states and how much should be distributed at the discretion of DOT. Prior to the ban on congressional earmarking in FY2011 virtually all of the discretionary program funding was earmarked by Congress. This, in effect, meant that the project spending decisions for the discretionary funds were under the direct control of Members of Congress. Under the earmarking ban, discretionary program project awards are selected by DOT under criteria set in the legislative language establishing the program. Although this congressional influence over project selection is not as direct as earmarking, Congress exercises more control over the use of discretionary funds than over the core program formula funds, which are under the control of the states. In reauthorization, Congress could increase the share of highway funding that is distributed by formula, diminishing the role of discretionary programs, or expand discretionary programs rather than formula funding. Recent surface transportation bills have reduced the number of discretionary programs, but Congress could choose to create new ones to address specific issues, for example, bridge conditions. Studies have indicated that large increases in federal highway spending can lead to a substitution of federal funds for state spending on highways. The American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ), the stimulus bill enacted in the midst of the 2007-2009 financial crisis, contained a \"maintenance of effort\" provision requiring the governor of a state receiving stimulus funds to certify that the state would maintain its spending for specific purposes, including transportation infrastructure, in return for greater federal funding. A maintenance of effort requirement could be included in FAST Act reauthorization, especially if the bill provides a large increase in highway funding. However, declines in states' revenue resulting from employer closures due to the COVID-19 pandemic could make it more challenging for states to maintain spending levels. Because the formula distributions in both the FAST Act and MAP-21 were based on the apportionment of the federal-aid highway formula programs to the states in the last year of the previous authorization bill, the relative distribution of funds among the states is basically the same as it was in 2009. It has not been adjusted for population growth, internal migration, highway and bridge infrastructure growth, or traffic growth. Defining the formula in this way carries over the \"equity\" adjustments made in the Safe, Accountable, Flexible, Efficient Transportation Equity ActâA Legacy for Users (SAFETEA; P.L. 109-59 ), enacted in 2005. These adjustments ensured that each state received formula funds equal to at least a specified percentage of the amount of motor fuel taxes its drivers paid into the highway account of the HTF. By effectively carrying over the equity redistribution, the current funding formula minimizes debates over the fairness of the distribution to individual states. In reauthorization, Congress could continue to retain a formula based on the previous distribution, or could replace it with a new formula paradigm that might incorporate factors intended to achieve specific policy goals. In the past, funding for individual highway programs was apportioned to the states using such formula factors as the ratio of federal-aid highway lane miles or vehicle miles traveled to the national total. The FAST Act did not authorize a stand-alone highway bridge program. Instead, bridge improvements under the Fast Act are funded primarily via the NHPP and STBG based on states' priorities. As of December 31, 2018, of the 616,096 bridges in the U.S. National Bridge Inventory, 47,045 (7.6%) were in poor condition. This number has been declining for many years, but there is still a significant backlog of bridges awaiting major repairs or replacement. Should Congress wish to accelerate the reduction in the number of bridges in poor condition through the reauthorization process it could create a stand-alone bridge program. If this were a formula program, the states would select the projects; if it were a discretionary program, project choices would likely be made by DOT. Another highway bridge issue is how much federal bridge spending should be dedicated to bridges off the federal-aid highway network. Many of these are rural county-owned bridges. Under the FAST Act, each state must devote at least 15% of the amounts it received under the Highway Bridge Program in FY2009 to bridges. This amount is taken from the state's STBG funds. If it wishes to give priority to repairing rural bridges, Congress could raise the states' minimum spending level or could dedicate a specific amount to rural bridge projects. Current law penalizes states whose structurally deficient bridge deck area on the National Highway System, a network of 220,169 road-miles, exceeds 10% of its total National Highway System bridge deck area for three years in a row. In such a case, the state must devote NHPP funds equal to 50% of the state's FY2009 Highway Bridge Program apportionment to improve bridge conditions until the deck area of structurally deficient bridges falls to 10% or below. Congress could increase the penalty to encourage more spending of NHPP funds on bridges or eliminate the penalty and leave the bridge spending of NHPP funds entirely up to the states. When state officials determine that a bridge is unsafe, they are to close it to traffic immediately. The actual closing of a bridge is usually done by the state, but in some states closures are under the authority of county commissioners. The recent failure of local officials in Mississippi to close unsafe bridges until the state was threatened with the withholding of federal funds suggests that unsafe bridge closures do not always happen immediately. Congress may wish to consider the safety of bridges not directly under the control of the states in reauthorization. The FAST Act created two new programs to facilitate highway freight movement. The National Highway Freight Program (NHFP) is a formula program that provided up to $1.5 billion annually to the states for highway components designated as being especially important to freight movement. Having a separate freight formula program helps states concentrate funding for projects on freight routes. The FAST Act also created a discretionary grant program, the Nationally Significant Freight and Highway Projects Program, now called Infrastructure for Rebuilding America (INFRA), with funding of $1 billion in FY2020. INFRA discretionary grants are mostly for relatively large projects to enhance freight movement. They may be applied for by virtually any government entity. The program has received applications for far more funding than has been authorized. Despite the program's popularity, DOT has been criticized for a lack of transparency in the selection process and for selecting projects that do not have the highest cost/benefit ratios. Given the popularity of these programs, the likely reauthorization issues are the funding levels, eligibility changes, and, in the case of INFRA, oversight of the project selection process. If Congress wishes to allocate additional funding to improve freight movement, it would need to determine the share that would be distributed under the NHFP formula for spending at the discretion of the states versus the funding dedicated to INFRA and administered by DOT. Although the National Freight Network is vast, the worst congestion on freight routes occurs in a limited number of locations, mostly around Interstate Highway junctions in major urban areas. Highway transportation is a major source of atmospheric carbon dioxide (CO 2 ), the main human-related greenhouse gas (GHG) contributing to climate change. Highway infrastructure will also bear the effects of climate change, such as extreme heat, sea level rise, and stronger storms. Highway policy responses to climate change can involve mitigation provisions that aim to reduce GHG emissions or adaptation provisions that aim to make the highway infrastructure more resilient to a changing climate. The federal-aid highway program already includes some programs that can be seen as being mitigation programs. The Congestion Mitigation and Air Quality Improvement program (CMAQ), for example, although not designed to address climate change, typically funds projects that reduce pollutant emissions from cars and trucks that also co-emit CO 2 . Other surface transportation programs that may contribute indirectly to the reduction of GHG emissions include the Transportation Alternatives program, which funds bicycle and pedestrian infrastructure, as well as core formula program eligibility and funding transfer provisions that allow highway funds to support mass transit. Congress may wish to consider mitigation options that encourage or support activities such as ride sharing, truck stop electrification, alternative fuel fueling stations, the use of hybrid electric and electric vehicles, and congestion relief policies. Adaptation is action to reduce the vulnerabilities and increase the resilience of the transportation system to the effects of climate change. Adaptation options for highways and bridges include structural and nature-based engineering and policy-based activities. For example, highway bridges can be engineered structurally to withstand the threats of stronger winds, higher storm surges, and increased flooding. Although currently there is no dedicated highway funding for adaptation projects, federal-aid highway funds can be used to assess the potential impacts of climate change and to apply adaptation strategies. Congress could add programs or program provisions to encourage or pay for adaptation and resiliency measures. The federal matching share could be increased for protective features and disaster relief definitions could be expanded to include resiliency measures. The Emergency Relief program provides federal assistance to state departments of transportation for emergency repairs and restoration of federal-aid highway facilities following a natural disaster or catastrophic failure. Congress has long authorized $100 million per year to be spent from the HTF for Emergency Relief, but spending exceeds this amount virtually every year. Additional funding is provided via appropriations on a \"such sums as needed\" basis, usually following major disasters. These additional funds both pay for both quick release funds dispersed immediately following a disaster that are in excess of the annual $100 million authorization and pay for permanent repairs for damage from both recent disasters and the repair backlog from previous disasters. This situation raises two policy questions: whether to raise the annual authorization to reduce the reliance on supplemental disaster appropriations and how to resolve the repair backlog. States seeking Emergency Relief funds now must consider resilience to climate change in designing and constructing highway and bridge repairs. Resilience is broadly defined as \"the capability to anticipate, prepare for, respond to and recover from significant multi-hazard threats with minimum damage to social well-being, the economy and the environment.\" Using risk-based analyses, this approach is designed to reduce the potential for future losses. However, states may be tempted to use Emergency Relief funding, which requires no state match, to make improvements that might otherwise have been made with federal formula funds or state funds. Emergency Relief is a basically a reactive program, and is not designed to fund resilience measures in advance of disasters. Congress could consider expanding the scope of the program to allow for the funding of resilience measures to some undamaged facilities that are at high risk, or could establish a separate resilience program while leaving Emergency Relief to retain its focus on disaster response and repair. Congress has established three separate programs to fund highways on federal and tribal lands. Their total funding under the FAST Act has averaged about $1.1 billion per year. The Federal Lands Transportation Program's average annual authorization is $355 million under the FAST Act. Most of this amount is for the National Park Service, the Fish and Wildlife Service, and the Forest Service. The Federal Lands Access Program supports projects that are on, adjacent to, or provide access to federal lands. Funding is allocated among the states by a formula. The Tribal Transportation Program distributes funds among tribes, mainly under a statutory formula based on road mileage, tribal population, and relative need. In addition, the FAST Act established the Nationally Significant Federal Lands and Tribal Projects Program to support large projects on federal and tribal lands. Projects must have an estimated cost of at least $25 million, with priority given to projects costing over $50 million. The program is authorized at $100 million annually, but requires an appropriation to make funds available. It has received appropriations of $300 million for FY2018, $25 million for FY2019, and $70 million for FY2020. Funding for all of these programs is likely to be an issue in reauthorization. The National Park Service, for example, has a considerable backlog of road repairs, but repairs to the agency-owned Memorial Bridge in Washington, DC, which cost 80% of the Park Service's average annual allocation under the FAST Act, made it difficult for the Park Service to address other repair needs. In addition, some states and Indian tribes have called for revising the formulas used to allocate Federal Lands Access Program and Tribal Transportation Program funds. Although the majority of highway funds are awarded as grants, the federal government also supports highway infrastructure financing under the Transportation Infrastructure Finance and Innovation Act (TIFIA). The TIFIA program provides secured loans, loan guarantees, and lines of credit for major surface transportation projects. Loans must be repaid with a dedicated revenue stream; for highway projects this is typically a toll. TIFIA is funded at $300 million for FY2020. Assuming an average subsidy cost of 7%, this funding may allow lending of roughly $4.3 billion in the year. States may use their funds from two formula programs, NHPP and STBG, to pay the administrative and subsidy costs of the program. Additionally, the FAST Act allows project sponsors to use discretionary INFRA grants to pay these costs, although this has not occurred. The main issue in reauthorization is the funding level. Despite the program's popularity, DOT calculated that it had $1.65 billion unobligated budget authority at September 30, 2018. Congress could encourage greater use of TIFIA funds by increasing the federal project share allowable, broadening eligibility, and accelerating the processing of applications. Should Congress wish to increase the availability of TIFIA financing without increasing the program authorization, it could also change the subsidy calculation. A less conservative calculation by DOT and the Office of Management and Budget (OMB) could allow DOT to lend a greater amount with the same amount of budget authority, although this would increase the level of risk to the federal government. Congress could also lower TIFIA funding to eliminate the unobligated balances. TIFIA is one means of financing projects without relying on pay-as-you-go funding, thereby accelerating construction. Other financing proposals, such as creation of a National Infrastructure Bank and expanded funding of state infrastructure banks, might also be considered in reauthorization. In the past, such proposals have faltered, in part due to their apparent duplication of intent with the TIFIA program. The length of time between project inception and completion has long been a concern of Congress. The many reasons for delays include difficulty in achieving agreement on the commitment of funds, public opposition, litigation, public comment requirements, contractor and materials delays, and the environmental review process. The FAST Act included 18 provisions intended to accelerate project delivery, mainly directing changes in how the environmental review process is implemented. In highway reauthorization, Congress may want to require studies evaluating the impacts of the FAST Act changes and FHWA's implementation actions. A number of highway data and study issues have emerged recently that could be considered in reauthorization. FHWA's Highway Statistics series is designed to provide a broad range of annual statistical tables and charts on the extent, condition, funding, and other attributes of U.S. highways. However, in recent years some of the tables have not been produced, while others are produced years after the fiscal year they describe, lessening their value to policymakers. Congress could request an explanation from FHWA or request the Government Accountability Office to review the FHWA's data collection and publication procedures. FHWA is dependent on the states for much of the underlying data. The recently released 23 rd edition of the biennial Status of the Nation's Highways, Bridges, and Transit: Conditions and Performance; Report to Congress was released two years late and based on FY2014 data. The report contains the most comprehensive information about the condition of U.S. highway and mass transit infrastructure conditions, along with estimates of the future funding needed to maintain or improve the conditions and transportation system performance. The most recent report does not reflect the increased funding authorized in the FAST Act or recent transportation appropriations bills, so it is difficult to judge the impact of these spending increases. Congress could consider requiring a study of why DOT relies on five-year-old data to prepare the report. FHWA formerly produced Highway Cost Allocation Studies (HCASs) to estimate the cost, in terms of wear and tear, imposed by different types of vehicles (including trucks categorized by weight) using U.S. highways. In these studies, highway taxes per mile paid into the HTF by different types of vehicles were compared to the cost per mile of pavement, bridge, and other highway-related damage caused by each vehicle type. The last FHWA Highway Cost Allocation Study was the 2000 supplement to the 1997 study. Without a congressional directive and funding to complete a new study, the FHWA has chosen not to conduct one. Congress could consider funding and requesting a new study, which might be helpful in judging whether the current rates of highway-related taxes paid by various users adequately reflect the damage their vehicles cause to highway infrastructure. Because freight infrastructure decisions are often made at the state or local level, it would be helpful for transportation planners to know the characteristics of the trucks traveling particular highway segments. DOT's Bureau of Transportation Statistics and the Census Bureau conduct a survey of shippers every five years that provides information on shipments leaving factories, warehouses, and ports. However, the sample size is not sufficient to provide reliable data for any specific urban area, and the survey is too infrequent to identify recent trends. The survey was designed more to provide a national picture of freight transport than to meet local or regional needs. A policy question for Congress is whether the federal government should be responsible for providing more robust and tim ely freight data for state and local transportation planners. Measures to improve the safety of roadway infrastructure are funded primarily through the FHWA Highway Safety Improvement Program (HSIP). Measures related to vehicles and to driver behavior are handled by the National Highway Traffic Safety Administration (NHTSA) and, in the case of commercial vehicles and drivers, the Federal Motor Carrier Safety Administration (FMCSA). HSIP is the largest safety program up for reauthorization. HSIP primarily funds infrastructure improvements, such as rumble strips, roadway striping, intersection redesign, and safety-related technologies. HSIP is one of the few highway programs that allows for spending on any public road, not just federal-aid highways. Reauthorization issues include funding amounts and eligibility changes. Driver behavior is the primary factor in the vast majority of fatal crashes. However, driver behavior is generally a state matter and not under federal control. When Congress wishes to change driver behavior, it typically does so by providing grants to states or by withholding grants if states fail to implement federal policies. For example, states that fail to establish 21 as the minimum age to purchase alcoholic beverages can be subject to funding reductions. A review of the effectiveness of such penalties could be part of the reauthorization process. Past issues in driver behavior that could emerge in reauthorization include restrictions on federal funding of automated devices to enforce speed limits, motorcycle helmet laws, and state measures concerning impaired driving. NHTSA also establishes minimum standards for passenger vehicles. The time it takes NHTSA to update these standards has been an issue. NHTSA also tests vehicles for compliance with safety standards, rates the crashworthiness of vehicles, and monitors consumer complaints about vehicles for evidence of safety defects that may necessitate a vehicle recall. A study of the effectiveness of NHTSA's early warning reporting (EWR) system could be of interest to Congress. Unlike the behavior of ordinary drivers whose behavior is regulated by the state and local governments, the behavior of commercial drivers who engage in interstate commerce is a federal matter under the auspices of FMCSA. Issues that could be considered in reauthorization include the regulation of hours of service for commercial drivers and the related mandate for use of electronic logging devices, the roadside safety examination of intercity buses, specific driver health requirements, and possible modification of age restrictions on commercial drivers.", "summary": "Federal highway construction and safety programs are currently authorized through September 30, 2020, under the five-year Fixing America's Surface Transportation Act (FAST Act; P.L. 114-94 ). For the 1,027,849-mile system of federal-aid highways, the FAST Act provided an average of $45 billion annually. Although there are exceptions, federally funded projects are generally limited to this system that includes roughly 25% of all U.S. public road mileage. Of these funds, nearly 93% are distributed to the states via formula. The states have nearly complete control over the use of these funds, within the limits of federal planning, eligibility, and oversight rules. Money is not provided up front. A state is reimbursed after work is started, costs are incurred, and the state submits a voucher to the Federal Highway Administration (FHWA). The highway program focuses on highway construction and planning, and does not support operations or routine maintenance. The federal share of project costs is generally 80%, but 90% for Interstate System projects. Nearly all highway funding comes from the Highway Trust Fund (HTF). The excise taxes on gasoline and diesel, which are the main support of the HTF, are fixed in terms of cents per gallon (18.3 cents for gasoline and 24.3 cents for diesel), and do not adjust for inflation or change with fuel prices. The rates were last raised in 1993. These taxes no longer raise enough money to support the programs Congress has authorized. Congressional Budget Office (CBO) projections estimate that the HTF shortfall for a five-year reauthorization bill, FY2021-FY2025, will be $68.8 billion, of which the highway portion will be $46.5 billion. The funding shortfall is a major issue framing the reauthorization debate. The FAST Act transferred $70 billion in general Treasury funds to the HTF, $51.9 billion of which were for highways. Congress could deal with the shortfall that is projected to persist over the coming years in three ways: again transfer money from the Treasury general fund; cut spending by roughly 25%; and raise revenue dedicated to the HTF. Widely discussed revenue options include increasing the rates of existing gasoline, diesel, and truck taxes or imposing new charges such as a vehicle miles traveled (VMT) charge. Other issues likely to be considered by Congress include the following: Whether any additional federal spending for highways should be distributed by formula, giving the states greater control, or through discretionary programs that distribute funds based on Administration or congressional priorities. Whether to retain the current highway funding formula, which links states' annual apportionments to their funding shares in past years, or to introduce such formula factors as each state's lane miles, population growth, or VMT. Whether to create stand-alone programs to address issues such as bridge conditions or climate change mitigation and adaptation. Whether the stand-alone National Highway Freight Program, a formula program that has been highly popular with the states, should be funded at a higher level relative to the other formula programs. Whether the Emergency Relief program should be expanded to cover a wider range of resilience needs. Whether states should be permitted to place tolls on free Interstate Highway lanes, and whether to regulate the use of tolls. The Senate Environment and Public Works Committee (EPW) reported the America ' s Transportation Infrastructure Act of 2019 (ATIA; S. 2302 ) on August 1, 2019 . The bill includes the highway elements of surface transport ation reauthorization under EPW' s jurisdiction. It is the only active FAST Act reauthorization bill to date.", "document_type": "crs"}
{"report": "The International Trade Administration (ITA), the U.S. International Trade Commission (USITC), and the Office of the United States Trade Representative (USTR) are funded through the annual Commerce, Justice, Science, and Related Agencies (CJS) appropriations. This report provides an overview of these agencies' programs and a comparison of the FY2020 CJS proposals with the previous year's enacted legislation. For FY2019, the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), provided a total of $647.0 million in funding for the three CJS trade-related agencies. The FY2019 act provided $484.0 million in direct appropriations for ITA, $95.0 million for USITC, and a total of $68.0 million for USTR. The FY2019 appropriations for the three CJS trade-related agencies was a 0.2% decrease (-$1.3 million) from FY2018 appropriations ($648.3 million). For FY2020, the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ), provided $678.7 million for the three trade-related agencies, which was $31.7 million (4.9%) more than the FY2019 amount, and $58.5 million (9.4%) more than the Administration's request. See the Appendix for enacted budget authority for the trade-related agencies for FY2009-FY2020. In the FY2020 budget cycle, the House and Senate each passed different versions of their CJS proposals under the same bill number, H.R. 3055 . In this report, the House and Senate versions of H.R. 3055 refer to the CJS provisions passed on June 25, 2019 (House) and October 31, 2019 (Senate). The CJS provisions were later struck from H.R. 3055 , and a continuing resolution was inserted in their place. The CJS provisions were then inserted into a new measure, H.R. 1158 , which passed both chambers and was signed into law as the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ). The President submitted his FY2020 budget request to Congress on March 11, 2019. The agencies released their congressional budget justification documents in the weeks afterward. In the President's FY2020 budget, the Administration requested a total of $620.2 million for the three CJS trade-related agencies. This request was $26.8 million less (-4.1%) than the FY2019 enacted level. The House Committee on Appropriations reported its FY2020 CJS appropriations proposal, H.R. 3055 , in early June 2019 and passed the measure on June 25, 2019 by a 227-194 vote. The House-passed bill included a total of $694.0 million for the three CJS trade-related agencies. This proposal was $47.0 million more (7.3%) than the FY2019 enacted funding, and $73.8 million more (11.9%) than the Administration's request. The House-passed bill included $521.0 million for ITA, $101.0 million for USITC, and a total of $72.0 million for USTR. The Senate Committee on Appropriations reported its CJS bill, S. 2584 , on September 26, 2019. In late October, the Senate took up the House-adopted proposal, H.R. 3055 , and passed it with amendments by a vote of 84-9. The Senate-passed version of H.R. 3055 included a total ofÂ $678.7 million for the three CJS trade-related agencies, which was $31.7 million more (4.9%) than the FY2019-enacted amount and $58.5 million more (9.4%) than the Administration's request. The Senate-passed version included $510.3 million for ITA, $99.4 million for USITC, and a total of $69.0 million for USTR. The Senate's proposed funding levels were enacted in the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ). The President signed the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ), on December 20, 2019, approving FY2020 annual appropriations for the three CJS trade agencies. The act provided $678.7 million for these agencies, which was $31.7 million more (4.9%) than the FY2019 amount, and $58.5 million more (9.4%) than the Administration's request. (For a full summary, see Table 1 ) The International Trade Administration is a bureau within the Department of Commerce. ITA's mission is to improve U.S. prosperity by strengthening the competitiveness of U.S. industry, promoting trade and investment, and ensuring compliance with trade laws and agreements. ITA provides export promotion services; works to enforce and ensure compliance with trade laws and agreements; administers trade remedies such as antidumping and countervailing duties; and provides analytical support for ongoing trade negotiations. ITA went through a major organizational change in October 2013 in which it consolidated four organizational units into three more functionally aligned units: (1) Global Markets, (2) Enforcement and Compliance, and (3) Industry and Analysis. ITA also has a fourth organizational unit, the Executive and Administrative Directorate, which is responsible for providing policy leadership, information technology support, and administration services for all of ITA. ( Table 2 outlines ITA FY2020 budget proposals by unit, and Table A-1 shows budget amounts for ITA by unit between FY2009 and FY2019.) For FY2020, the Administration requested $460.1 million for ITA in direct appropriations, with an additional $11.0 million to be collected in user fees, for a total of $471.1 million in authorized spending. With respect to direct appropriations, this request was $23.9 million less (-4.9%) than the FY2019 enacted funding level. The House-passed H.R. 3055 included $521.0 million in direct appropriations for ITA, with an additional $11.0 million to be collected from user fees, for a total of $532.0 million in authorized spending. With respect to direct appropriations, this proposal was $37.0 million more (7.6%) than the FY2019 enacted funding level and $60.9 million more (13.2%) than the Administration's request. The Senate-passed version proposed $510.3 million in direct appropriations for ITA with an additional $11.0 million to be collected from user fees, for a total of $521.3 in authorized spending. With respect to direct appropriations, this proposal was $26.3 million more (5.4%) than the FY2019 funding, and $50.2 million more (10.9%) than the Administration's request. The Consolidated Appropriations Act, 2020 ( P.L. 116-93 ), adopted the Senate-proposed funding level of $510.3 for ITA's top-level funding ( Table 1 ). ITA's Global Markets (GM) unit is a combination of the United States and Foreign Commercial Service (US&FCS) program that provides export promotion services to U.S. businesses and the SelectUSA program that works to attract foreign investment into the United States. Through US&FCS, GM aims to promote U.S. exports by helping U.S. exporters research foreign markets and identify opportunities abroad. GM's country and regional expertsâin domestic and overseas officesâadvise U.S. companies on market access, local standards, and regulations. The unit also helps to make connections through business-to-business trade shows, fairs, and missions. GM is designed to advance U.S. commercial interests by engaging with foreign governments and U.S. businesses, identifying and resolving market barriers, and leading efforts that advocate for U.S. firms with foreign governments. Through its SelectUSA program, the GM unit promotes the United States as a destination for foreign investment. (For more on SelectUSA, see section \" SelectUSA Program \" below.) For FY2020, the Administration proposed reducing funding for the Global Markets unit. The Administration requested $278.0 million for Global Markets, an amount $42.0 million less (-13.1%) than the FY2019-enacted amount ( Table 2 ). The Administration proposed rescaling the Global Markets unit by \"reducing personnel worldwide and closing overseas and domestic officesâ¦ ITA estimated the need to close 32 offices overseas, 18 offices domestically, and reduce personnel [by 114 positions]\" in an effort \"to reduce fixed operational expenses. \" In the reports accompanying the committee-reported bills, the House and Senate Committees did not adopt the Administration's proposed cuts to Global Markets, and instead recommended boosting funding for the Global Markets unit. For FY2020, the House Appropriations Committee recommended $338.6 million for Global Markets, an amount $18.6 million more (5.8%) than the FY2019 enacted funding level and $60.7 million more (21.8%) than the Administration's request. The Senate Committee on Appropriations recommended $335.3 for Global Markets, which was $15.3 million more (4.8%) than the FY2019 enacted amount, and $57.3 million more (20.6%) than the Administration's request. The report to accompany the Senate committee-reported CJS appropriations bill included language directing ITA to spend \"no less than $130 million on employee compensation [for Global Markets];\" and noted that, \"at this funding level, the Committee will not approve any request to close foreign or domestic offices.\" As outlined in the explanatory statement accompanying the act, the Consolidated Appropriations Act, 2020, provided \"no less than $333,000,000 for Global Markets.\" The mission of ITA's Enforcement and Compliance unit is to enforce U.S. trade laws and ensure compliance with negotiated international trade agreements. The Enforcement and Compliance unit is responsible for enforcing U.S. antidumping and countervailing duty (AD/CVD) laws; overseeing a variety of programs and policies regarding the enforcement and administration of U.S. trade remedy laws; assisting U.S. industry and businesses with unfair trade matters; and administering the Foreign Trade Zone program and other U.S. import programs. For FY2020, the Administration proposed $93.8 million for Enforcement and Compliance. This request was $5.3 million more (6.0%) than the FY2019 budget authority ( Table 2 ). According to ITA's congressional budget submission, some of the Administration's objectives for the proposed increase for Enforcement and Compliance were: to address increasing caseloads of AD/CVD investigations; to provide technical assistance on Section 232 exclusion requests; and to establish a dedicated team to investigate allegations of circumvention and duty evasion by foreign exporters and their U.S. importers. For FY2020, the House-passed version of H.R. 3055 included $94.8 million for Enforcement and Compliance, which was $6.3 million more (7.2%) than the FY2019 budget authority, and $1.0 million more (1.1%) than the Administration's request ( Table 2 ). In the Senate, language in the report accompanying the Senate committee-reported bill recommended \"$1,000,000 above the fiscal year 2019 enacted level [$88.5 million] for the Office of Enforcement and Compliance to establish a dedicated anti-circumvention and duty evasion enforcement unit.\" The explanatory statement accompanying the Consolidated Appropriations Act, 2020, did not provide specific funding levels. The statement outlined that: The agreement does not assume House levels for Industry and Analysis, Enforcement and Compliance, and Executive Direction and Administration. However, ITA is directed to take steps to fill important vacancies across the agency in support of trade promotion, facilitation, and enforcement, as well as additional staff to support the Committee on Foreign Investment in the United States and the new Anti-Circumvention and Evasion Unit. ITA's Industry and Analysis unit brings together ITA's industry, trade, and economic experts to advance the competitiveness of U.S. industries through the development and execution of international trade and investment policies, export promotion strategies, and investment promotion. It develops economic and international policy analysis to improve market access for U.S. businesses, and designs and implements trade and investment promotion programs. The unit serves as the primary liaison between U.S. industries and the federal government on trade and investment promotion. It administers programs that support small and medium-sized enterprises, such as the Market Development Cooperator Program. For FY2020, the Administration proposed increasing funding for the Industry and Analysis unit. The Administration requested $62.6 million for Industry and Analysis. This request was $10.0 million more (19.1%) than the FY2019 budget authority ( Table 2 ). According to ITA's budget justification, some of the Administration's objectives for the proposed increase were: to meet the expected increase in cases related to foreign investment in the United States and to implement the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA); to develop staff with economic modeling skills and sectoral expertise; to manage the trade processes related to the tariffs imposed under certain U.S. trade law (Sections 301, 201, 232 ); and to provide analysis relevant to ongoing and future trade negotiations and the resolutions of trade barriers. For FY2020, the House-passed bill included $62.6 million for Industry and Analysis, which was $10.0 million (19.1%) more than the FY2019 budget authority and equal to the Administration's request ( Table 2 ). In the Senate, a specific funding level was not provided for Industry and Analysis. Language in the report accompanying the Senate committee-reported CJS bill did recommend \"provid[ing] the requested program changes for Industry and Analysis to implement â¦ [FIRRMA] ( P.L. 116-115 â232) and for increased analytical capabilities.\" The explanatory statement accompanying the Consolidated Appropriations Act, 2020, did not provide specific funding levels. The statement outlined that: The agreement does not assume House levels for Industry and Analysis, Enforcement and Compliance, and Executive Direction and Administration. However, ITA is directed to take steps to fill important vacancies across the agency in support of trade promotion, facilitation, and enforcement, as well as additional staff to support the Committee on Foreign Investment in the United States and the new Anti-Circumvention and Evasion Unit. USITC is an independent, quasi-judicial agency responsible for conducting trade-related investigations and providing independent technical advice on U.S. international trade policy to Congress, the President, and USTR. The Commission (1) investigates and determines whether imports injure a domestic industry or violate U.S. intellectual property rights; (2) provides independent tariff, trade, and competitiveness-related analysis to the President, Congress, and USTR; and (3) maintains the U.S. tariff schedule. USITC also serves as a federal resource for trade data and other trade policy information. It makes most of its information and analyses available to the public to promote understanding of competitiveness, international trade issues, and the role that international trade plays in the U.S. economy. USITC's annual budget request to Congress is subject to two types of submission: (1) the President's budget request for the Commission, included in the President's annual budget; and (2) the Commission's independent budget request. USITC has the authority to submit its budget directly to Congress without revision by the President, pursuant to Section 175 of the Trade Act of 1974. The President's FY2020 budget requested $91.1 million in funding for USITC. This request was $3.9 million less (-4.1%) than FY2019-enacted appropriation ( Table 1 ). While the President requested a decrease in funding for USITC, the Commission's independent budget submission requested $101.0 million, which was $6.0 million more (6.3%) than FY2019 funding and $9.9 million more (10.9%) than the President's budget request. The House-passed H.R. 3055 included $101.0 million for USITC. This represented $6.0 million more (6.3%) than FY2019 funding and $9.9 million more (10.9%) than the President's budget request. The Senate-passed version of H.R. 3055 included $99.4 million for USITC. This proposal was $4.4 million more (4.6%) than the FY2019 funding, and $8.3 million more (9.1%) than the President's budget request. The Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) enacted the Senate's funding level of $99.4 million for USITC ( Table 1 ). USTR has primary responsibility for developing and coordinating U.S. international trade and direct investment policies, as the head of the interagency trade policy coordinating process. Located in the Executive Office of the President, USTR is the President's principal advisor on trade policy and the President's chief negotiator for international trade agreements, including commodity and direct investment negotiations. USTR negotiates directly with foreign governments to create trade agreements and resolve disputes, and participates in global trade policy organizations such as the World Trade Organization. It also meets with business groups, policymakers, and public interest groups on trade policy issues. In addition to direct appropriations for USTR, supplementary funding for the agency is available through the congressionally established Trade Enforcement Trust Fund. For more detail on the trust fund, see section \" Trade Enforcement Trust Fund (TETF) \" below. For FY2020, the Administration requested a total of $69.0 million for USTR, including $59.0 million for salaries and expenses and $10.0 million to be derived from the TETF for certain trade enforcement activities ( Table 3 ). This request was $1.0 million more (1.5%) than the FY2019 enacted funding level. The House-passed version of H.R. 3055 recommended a total of $72.0 total for USTR, including $57.0 million for salaries and $15.0 million to be derived from the TETF for certain trade enforcement activities ( Table 3 ). The House proposal for USTR was $4.0 million more (5.9%) than the FY2019 enacted funding and $3.0 million more (4.3%) than the request. The Senate-passed version recommended a total of $69.0 million for USTR, including $54.0 million for salaries and expenses and $15.0 million to be derived from the TETF. The proposed amount was $1.0 million more (1.5%) than the FY2019 funding amount. While the Senate-passed total funding amount for USTR was equal to the Administration's request, it included a different distribution of funds between USTR's salaries and expenses account and funds to be derived from the TETF (see Table 3 ). The Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) enacted the Senate's funding levels of $69.0 million for USTR, including $54.0 million for salaries and expenses and $15.0 million to be derived from the TETF ( Table 3 ). Over the past decade, Congress has provided funding for specific trade-related programs or activities within broader agency budgets. The following programs are highlighted in this report, due to ongoing congressional interest: (1) ITA's China trade enforcement and compliance activities; (2) ITA's investment promotion activities in its SelectUSA Program; (3) the Survey of International Air Travelers (SIAT) within ITA; and (4) the Trade Enforcement Trust Fund, which funds certain activities of USTR. Since 2004, Congress has dedicated some of ITA's funding to AD/CVD enforcement and compliance activities with respect to China and other nonmarket economies. ITA's Office of China Compliance was established by the Consolidated Appropriations Act of 2004 ( P.L. 108-199 ). Its primary role has been to enforce U.S. AD/CVD laws and to develop and implement other policies and programs aimed at countering unfair foreign trade practices in China. ITA's China Countervailing Duty Group was established by the Consolidated Appropriations Act, 2010 ( P.L. 111-117 ) to accommodate the workload that resulted from the application of countervailing duty law to imports from nonmarket economy countries. The Office of China Compliance is within the Enforcement and Compliance unit at ITA. ITA's FY2020 budget justification did not provide a breakdown of funding for its China AD/CVD activities. In agreement with both the House and Senate-passed proposals, the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) provided $16.4 million for China antidumping and countervailing duty enforcement and compliance activities in FY2020, an amount equal to the FY2019-enacted funding. SelectUSA was established by executive order in 2011 as a Commerce Department program to (1) promote the United States as an investment market and (2) address investor climate concerns that could impede investment in the United States. SelectUSA coordinates investment-related resources across more than 20 federal agencies; serves as an information resource for international investors; and advocates for U.S. cities, states, and regions as investment destinations. SelectUSA currently is part of ITA's Global Markets unit. ITA's FY2020 budget justification did not provide a breakdown for requested funding for SelectUSA. The House-passed H.R. 3055 also did not include a breakdown for specific funding for SelectUSA, within ITA's Global Markets unit. The Senate-passed H.R. 3055 included up to $10.0 million for SelectUSA for FY2020. The Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) adopted the Senate funding level. ITA's Survey of International Air Travelers (SIAT) gathers statistics about air passenger travelers in the United States. Federal agencies use these statistics for a variety of purposes, such as to estimate the contribution of international travel to the economy, develop public policy on the travel industry, and forecast staffing needs at consulates and ports of entry. SIAT is within the Industry and Analysis unit at ITA. The Administration proposed an increase of $3.0 million to support SIAT in FY2020, within the Industry and Analysis' funding. The House and Senate both recommended $3.0 million to support SIAT in FY2020, within the ITA budget. The Consolidated Appropriations Act, 2020, did not provide a specific funding amount for SIAT. In order to provide additional funding for USTR's trade enforcement activities, Congress established the Trade Enforcement Trust Fund (TETF) in 2016. In Section 611 of the Trade Facilitation and Trade Enforcement Act of 2015 ( P.L. 114-125 ), Congress set up the trust fund and outlined authorized uses of the funds. According to Section 611(d), USTR can use funds from the TETF to (1) monitor and enforce trade agreements and World Trade Organization (WTO) commitments; (2) support trade capacity-building assistance to help partner countries meet their free-trade agreement obligations and commitments; and (3) investigate petitions concerning unfair trade practices under Section 301 of the Trade Act of 1974. USTR can also transfer funds to select federal agencies for trade enforcement activities authorized in Section 611(d) of the Trade Facilitation and Trade Enforcement Act of 2015. For FY2020, the Administration requested $10.0 million to be derived from the TETF. This request was $5.0 million less than the FY2019-enacted amount. (See Table 3 ). Both the House- and Senate-passed versions of H.R. 3055 included $15.0 million to be derived from the TETF, for trade enforcement activities authorized by the Trade Facilitation and Trade Enforcement Act of 2015. The recommendations were equal to the FY2019 enacted funding level, and were $5.0 million more than the Administration's request. (See Table 3 .) The House and Senate Appropriation committees also directed USTR to provide more detailed reporting on how funds from the Trust Fund are used. The Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) provided $15.0 million to be derived from the TETF, for trade enforcement activities authorized by the Trade Facilitation and Trade Enforcement Act of 2015. The funding level was equal to the FY2019 enacted funding level, and was $5.0 million more than the Administration's request.", "summary": "This report provides an overview of the Fiscal Year (FY) 2020 budget request and appropriations for the International Trade Administration (ITA), the U.S. International Trade Commission (USITC), and the Office of the United States Trade Representative (USTR). These three trade-related agencies are funded through the annual Commerce, Justice, Science, and Related Agencies (CJS) appropriations. This report also provides a review of these trade agencies' programs. The Administration's FY2020 Budget Request The President submitted his budget request to Congress on March 11, 2019. For FY2020, the Administration requested a total of $620.2 million for the three CJS trade-related agencies. The request was $26.8 million less (a 4.1% decrease) than the FY2019 appropriated amount. The request included the following for the three agencies. ITA : $460.1 million, 4.9% less than the FY2019 amount. USITC : $91.1 million, 4.1% less than the FY2019 amount. USTR : $69.0 million, 1.5% more than the FY2019 amount. Congressional Actions The House Committee on Appropriations reported its FY2020 CJS appropriations proposal, H.R. 3055 , in early June 2019 and passed the measure on June 25, 2019 by a 227-194 vote. The House-passed bill included a total of $694.0 million for the three CJS trade agencies, which was $47.0 million (or 7.3%) more than the FY2019-enacted amount, and $73.8 million (11.9%) more than the Administration's request. The House proposal included the following for the three agencies. ITA : $521.0 million, 7.6% more than the FY2019 amount, and 13.2% more than the Administration's request. USITC : $101.0 million, 6.3% more than the FY2019 amount, and 10.9% more than the Administration's request. USTR : $72.0 million, 5.9% more than the FY2019 amount, and 4.3% more than the Administration's request. The Senate Committee on Appropriations reported a CJS bill, S. 2584 , on September 26, 2019. In late October, the Senate took up the House-adopted CJS proposal, H.R. 3055 , and passed it with amendments, by a vote of 84-9 on October 31, 2019. The Senate-passed version included a total ofÂ $678.7 million for the three CJS trade agencies, which was $31.7 million (4.9%) more than the FY2019-enacted amount, $58.5 million (9.4%) more than the Administration's request, and overall $15.3 million less than the House-adopted bill. The Senate-passed version included the following for the three trade agencies. ITA : $510.3 million, 5.4% more than the FY2019 amount, and 10.9% more than the Administration's request. USITC : $99.4 million, 4.6% more than the FY2019 amount, and 9.1% more than the President's budget request. USTR : $69.0 million, 1.5% more than more than the FY2019 amount, and equal to the Administration's request. On December 20, 2019, the President signed the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ), approving FY2020 annual appropriations for the three CJS trade agencies. The act included the Senate's proposed funding levels for these agencies. The act provided $678.7 million for the three trade-related agencies, which was $31.7 million (4.9%) more than FY2019, and $58.5 million (9.4%) more than the Administration's request. The act provided the following for the three trade-related agencies. ITA : $510.3 million, 5.4% more than the FY2019 amount, and 10.9% more than the Administration's request. USITC : $99.4 million, 4.6% more than the FY2019 amount, and 9.1% more than the Administration's request. USTR : $69.0 million, 1.5% more than more than the FY2019 amount, and equal in total to the Administration's request.", "document_type": "crs"}
{"report": "This report analyzes the effects of historic wet conditions during the 2019 growing season on major U.S. field crops, primarily corn and soybeans. These effects include record acres prevented from being planted, widespread delays in planting and harvesting of the corn and soybean crops, large crop insurance indemnity payments due to prevented plantings and weather-related yield losses, and additional ad hoc payments announced for producers experiencing both trade damage and losses from prevented planting. This report focuses on corn and soybeansâthe two largest commercial crops grown in the United States in terms of number of producers, cultivated area, volume produced, and value of production. Together, they account for 54% of land planted to major field crops since 2010. They are critical inputs for several sectors, including the livestock, biofuels, food processing, and export sectors. As a result, any delay or reduction from expected output for either of these crops can have important implications for market prices and the broader U.S. farm economy. The U.S. Department of Agriculture (USDA) forecasted an increased role of federal support for farm incomes in 2019âincluding $22.4 billion in direct support payments and $10.3 billion in federal crop insurance indemnity payments. Together, the forecast of USDA farm support plus crop insurance indemnities of $32.7 billion represents a 35.3% share of U.S. net farm income $92.5 billion. Since 2010, the federal crop insurance program has emerged as the largest component of the farm safety net in terms of taxpayer outlays, averaging $7.8 billion annually in premium subsidies. While USDA implements the federal crop insurance program, Congress is responsible for authorizing and funding it. The federal crop insurance program is permanently authorized by the Federal Crop Insurance Act of 1980 ( P.L. 96-365 ), as amended (7 U.S.C. Â§1501 et seq. ) and receives mandatory funding. Each of the past three farm billsâP.L. 10-246 (2008), P.L. 113-79 (2014), and P.L. 115-334 (2018)âhas included a separate title to modify crop insurance program provisions. U.S. agricultural production got off to a late start in 2019 due to prolonged cool, wet springtime conditions throughout the major growing regions, particularly in states across the northern plains and eastern Corn Belt. Saturated soils prevented many farmers from planting their intended crops (see text box below). Such acres are referred to as \"prevent plant\" (PPL) acres. In addition to the unplanted acres, sizeable portions of the U.S. corn and soybean crops were planted later than usual, especially in Illinois, Michigan, Missouri, Ohio, Wisconsin, and North and South Dakota. Traditionally, 96% of the U.S. corn crop is planted by June 2, but in 2019 by that date 67% of the crop had been planted ( Figure 1 ). Similarly, the U.S. soybean crop was planted with substantial delays. By June 16, 77% of the U.S. soybean crop was planted, whereas an average of 93% of the crop has been planted by that date during the previous five years ( Figure 2 ). Widespread planting delays for corn and soybeans pushed both crops' growing cycle into hotter, drier periods of the summer than usual. In addition, maximizing yield potential will likely depend on beneficial weather extending into the fall to achieve full crop maturity. This would potentially make crop growth vulnerable to an early freeze in the fall that would terminate further yield growth. Also, planting delays increase the complexity of producer decisionmaking. When the planting occurs after a crop insurance policy's \"final planting date\" (FPD), the \"late planting period\" clause in the policy comes into play, and insurance coverage starts to decline with each successive day of delay ( Figure 3 ). Insured acres planted on or before the FPD receive the full yield or revenue coverage that was purchased. However, if the crop is planted after the FPD, insurance coverage is reduced by 1% per day throughout the late-planting period (which begins the day after the FPD and extends for 25 days for both corn and soybeans). During the late-planting period, producers must decide whether to opt for a PPL indemnity payment or try to plant the crop under reduced insurance coverage with a heightened risk of reduced yields. Despite the risks associated with this choice, large portions of both the corn and soybean crops were planted after the FPD ( Figure 1 and Figure 2 ). The choice of planting versus not planting was complicated in 2019 by Secretary of Agriculture Perdue's announcement on May 23 that only producers with planted acres would be eligible for \"trade damage\" assistance payments in 2019 under the Market Facilitation Program (MFP). The Secretary's announcement, which came in the middle of the planting period, could have encouraged greater planting than would have otherwise occurred as farmers sought to ensure eligibility for the 2019 MFP payment. During 2018, U.S. soybean and corn producers had received MFP payments based on their farms' harvested output, including $1.65 per bushel for soybean and $0.01 per bushel for corn. For 2019, the Secretary of Agriculture was offering higher payment rates of $2.05 per bushel for soybeans and $0.14 for corn. However, the MFP payment formula would use planted acresânot harvested productionâand combine the commodity-specific payment rates of major program crops (referred to as \"non-specialty crops\") at the county level (weighted by historical county planted acres and yields) to derive a single county-level MFP payment rate. The potential for 2019 MFP payments could have provided sufficient incentive for some producers to plant their corn and soybean crops under conditions they would not have otherwise (e.g., to plant their crops in wet fields where potential yield-reducing problems associated with seed germination and soil compaction are increased). If such planting did occur, it likely prevented even larger PPL acres from being reported. Additionally, overarching uncertainty remained in 2019 associated with the then-ongoing trade dispute between the United States and China. The dispute had reduced U.S. agricultural exports in 2018 and dampened prospects for both commodity prices and export volumes in 2019. These factors further complicated producers' evaluations of market payoffs under different planting and crop insurance choices. The two principal sources for data on PPL acres within USDAâthe Farm Service Agency (FSA) and the Risk Management Agency (RMA)âprovide similar but not identical estimates of PPL ( Figure 4 ). FSA oversees the implementation of USDA's farm revenue-support and disaster assistance programs. All producers that participate in these farm programs are required to report their acreage and yields to FSA in an annual acreage report that details crop production activity by specific field. RMA oversees the implementation of USDA's crop insurance programs. All participating producers provide detailed information on insured crops and land to RMA. Farmers report the same number of acres to RMA and FSA. However, not all farms participate in USDA farm programs or buy federal crop insurance. As a result, differences in reported acres planted, harvested, and prevented from being planted occur between the two sources. As of November 1, 2019, U.S. farmers reported to FSA that, of the cropland that they intended to plant this past spring, they were unable to plant 19.6 million acres due primarily to prolonged wet conditions that prevented field work. In contrast, RMA reported a record 18.8 million of PPL acres. The previous record for total PPL acres was set in 2011, when RMA reported 10.2 million acres and FSA reported 9.6 million of PPL. In 2019, FSA reported 19.6 million PPL acres, including 11.4 million acres of corn and 4.5 million acres of soybeansâboth crops established new records for PPL acres by substantial margins. The previous record PPL for corn was 2.8 million acres in 2013, and for soybeans it was 2.1 million acres in 2015. By way of comparison, in 2019 RMA's PPL acres included slightly more soybean (5.3 versus 4.5 million) and wheat (2.4 versus 2.2 million) acres and less corn (9.5 versus 11.4 million) acres. For both datasets (FSA and RMA), corn, soybeans, and wheat accounted for over 90% of PPL acres (92.3% for FSA, 91.5% for RMA). RMA reported 2019 PPL indemnity payments of over $4.2 billion, with $2.6 billion (60.6%) for corn PPL acres and $1.1 billion (25%) for soybean PPL acres ( Table 1 ). The 2019 average national PPL payment rate for all crops was $224.04 per acre. Payment rates vary by crop and ranged from a low of $50 per acre for millet to a high of $1,432 per acre for dark air cured tobacco. Some economists have suggested that the large discrepancy in corn PPL acres between the two data sources (1.9 million acres) could be the result of acres originally intended to be planted to soybeans being claimed as corn PPL acres to obtain the higher PPL indemnity for corn available under federal crop insurance. In their analysis of historical PPL indemnity rates, the PPL payment rate was almost always higher for corn than soybeans. In 2019, corn's average PPL payment rate of $270.13 per acre was about $70 per acre (34.7%) higher than soybean's average PPL payment rate ( Table 1 ). Thus, producers had an incentive to claim PPL for corn to the maximum extent possible, whether corn or soybeans was the intended crop. A breakout of PPL acres by state and by major commodity is available in the Appendix to this report ( Table A-1 ). The unusually wet spring conditions that produced the record PPL acres in 2019 were heavily concentrated in Corn Belt states but were also reported in significant amounts in Arkansas, Texas, Mississippi, Louisiana, North Carolina, Tennessee, New York, and Oklahoma ( Table 2 ). However, the 3.9 million acres of PPL reported in South Dakota (primarily the eastern portion of the state) were more than double second-place Ohio, where 1.4 million PPL acres were reported. South Dakota's PPL acres accounted for over 20% of the national total in 2019, while its PPL indemnity payments of over $925 million accounted for 21.9% of national PPL indemnity payments. Farmers who were unable to plant a crop during the spring of 2019 due to natural causes were eventually eligible for multiple payments under federal farm programs. First, federal crop insurance provides PPL coverage under a standard policy that covers pre-planting cost and potential revenue loss. Second, the FY2019 supplemental authorized disaster assistance payments for PPL (referred to as \"top up\") in addition to crop insurance indemnities. Third, the Administration's 2019 MFP payments were based on planted acres. However, payments were also included for eligible cover crops planted on PPL acres. If producers are prevented from planting an insured crop because of an insured peril (described below), then the PPL provisions of a standard crop insurance policy compensate the affected producers for pre-planting costs incurred in preparation for planting their insured crops. Crop insurance PPL coverage is available for any farm-based COMBO policy. COMBO policies include individual yield or revenue insurance policies: Revenue protection (RP) insures a producer-selected coverage level of the farm's historical yield times the higher of the projected price or the harvest price. RP with the harvest price exclusion insures a producer-selected coverage level of the farm's historical yield times the projected price. Yield protection insures for a producer-selected coverage level of the farm's historical yield. Area-based revenue and yield policiesâsuch as Area Risk Protection and Area Yield Protectionâthat rely on county yields and revenues to trigger indemnity payments are not eligible for PPL indemnities. As described in the section \" Planting Delays Complicate Producer Choices ,\" policyholders who are prevented from planting acres until after the FPD may choose not to plant the crop and instead receive a PPL indemnity, calculated as a percentage of the original insurance guarantee (e.g., 55% for corn and 60% for soybean). For example, suppose that a corn producer with an insurable yield of 200 bushels per acre has purchased RP at an 80% coverage level with an RMA projected price of $4.00 per bushel. For this policy: The RP coverage guarantee is 200 x $4.00 x 80% = $640 per acre; The PPL indemnity is 55% x $640 = $352 per acre. Alternately, consider a hypothetical soybean producer with an average production history yield of 50 bushels per acre, an RMA projected price of $9.54 per bushel, and an RP policy with an 80% coverage level. For this policy: The RP coverage guarantee is 50 x $9.54 x 80% = $381.60 per acre; The PPL indemnity is 60% x $381.60 = $228.96 per acre. On June 3, 2019, Congress passed a FY2019 supplemental appropriations bill ( P.L. 116-20 ) that, among other assistance, authorized $3 billion in additional funds for disasters that impacted farmers and ranchers. The disaster funding is administered through multiple USDA programs and provides financial assistance to producers with production losses on both insured and non-insured crops. All of the agriculture funds are designated as emergency spending. The supplemental funding covers several types of agricultural losses from 2018 and 2019, including losses for crops prevented from being planted in 2019. In particular, producers who claimed PPL losses in 2019 are eligible for a top up of 10%-15% of their PPL indemnity. The PPL top up is 15% for producers with standard RP policies that include the harvest price option as a default and 10% for producers who opted out of the harvest price option and selected the RP with harvest price exclusion policy. For 2019, 91% of corn and soybean insured acres were covered by RP with harvest price option. Under the corn and soybean examples introduced earlier, the supplemental top up would be calculated as: For a corn RP policy: 15% x $352 = $52.80 per acre; For a soybean RP policy: 15% x $$228.96 = $34.34 per acre. The FY2019 supplemental program limits payments to up to 90% of losses, including payments from crop insurance and the non-insured disaster assistance program (NAP) but excluding MFP payments. For producers who did not purchase crop insurance or NAP in advance of the natural disasters, payments are limited to 70% of losses. In addition, all recipients of any FY2019 supplemental disaster payments (including the PPL top up) are required to purchase crop insurance or NAP for the next two crop years. Under USDA's 2019 MFP program, eligibility for paymentsâwhich range from $15 to $150 per acreâis restricted to planted acres, thus excluding any PPL acres. However, on June 10, 2019, Secretary Perdue announced that USDA was exploring \"legal flexibilities\" to provide a minimal per acre MFP payment to farmers who opted for a PPL indemnity but also planted an MFP-eligible cover crop (such as barley, oats, or rye) with the potential to be harvested and for subsequent use of those cover crops for forage. On July 29, 2019, USDA announced a 2019 MFP payment rate of $15 per acre for PPL losses claimed on non-specialty crop acres followed by a USDA-approved cover crop. In summary, a producer can combine payments from multiple programs without having planted the intended cash crop. While it is not likely to cover all losses incurred, the combination can result in a higher payment in 2019 than was possible in previous years. Based on the above example, a corn farmer with a standard RP policy and an 80% coverage level could receive combined PPL payments of $419.80 per acre, including the PPL indemnity ($352), the supplemental top up payment ($52.80), and the MFP payment for an eligible cover crop planted on PPL acres ($15). By comparison, the original RP policy with 80% coverage would have guaranteed a maximum revenue of $640 per acre had the insured crop been planted. On such an RP policy, a yield loss of nearly 66% would be necessary to generate an indemnity payment that would match the federal payout under the suite of multiple programs available to PPL acres in 2019. Similarly, the hypothetical soybean producer with a standard RP policy and an 80% coverage level could receive combined PPL payments of $278.30 per acre, including the PPL indemnity ($228.96), the supplemental top up payment ($34.34), and the MFP payment for an eligible cover crop planted on PPL acres ($15). However, the second and third payment programsâthe top up and the extended MFP payment on eligible cover cropsâwere not known until later in the growing season (June 3 for the top up and July 29 for the extended MFP payment) after most late planting versus PPL decisions had been made. Some preliminary research suggests that some farmers that might have been better off choosing PPL with top up and extended MFP on cover crops but instead elected to plant corn or soybeans. This choice may have been driven in part by then-relatively high futures market prices and the prospect of qualifying for the 2019 MFP payment, which required planting an eligible crop as announced by Secretary Perdue on May 23. In addition to the PPL acres, large portions of the corn and soybean crops were planted two to four weeks later than usual ( Figure 1 and Figure 2 ). Such late planting meant that initial crop development would be behind normal across much of the major growing regions and that eventual yields would depend on beneficial weather extending late into the fall to achieve full crop maturity. The late planting also rendered crop growth vulnerable to an early freeze in the fall. Widespread wet conditions continued into the fall, especially in the northern plains and western Corn Belt. North Dakota recorded the wettest September on record in 2019, while Iowa recorded the wettest October. Ultimately, much of the corn crop was harvested under wet conditions with high moisture content that required drying. An early cold spell in the Upper Midwest had already heightened the demand for propane that, in addition to serving as the primary energy source for drying corn, is used to heat hog barns and for other farm operations. This resulted in limited supplies and higher prices for propane. Many farmers chose to leave their corn in the field until more beneficial market conditions emerged. As of December 16, 2019âthe date of USDA's final weekly Crop Progress report for 2019âan estimated 8% (or 7.2 million acres) of the U.S. corn crop had yet to be harvested, adding further to the uncertainty of yields and harvested acreage for the 2019 corn crop ( Table 3 ). Saturated soil conditions heading into the winter months suggest a continuation of wet conditions into the 2020 planting season and the potential for a repeat of planting difficulties in the months ahead. These unusual conditions have come in the midst of a continued trade dispute between the United States and China that has dampened demand for U.S. agricultural products from one of the United States' principal foreign markets and has compelled the Administration to undertake large ad hoc \"trade aid\" payments to producers of selected commodities. The record PPL acreage has resulted in record crop insurance PPL indemnity payments under the PPL provisions of standard federal crop insurance policies in 2019. Should wet conditions persist into 2020 and create a situation where farmers are again confronted with delayed or prevented planting, some producers may also bump up against a limit on the continued use of PPL. Under RMA rules, PPL can be taken only for crops planted on an insured unit in one of the four preceding crop years. Thus, four consecutive years of PPL would result in ineligibility for the affected cropland. Furthermore, while crop insurance indemnities can help to offset some of the financial loss associated with prevented planting or poor harvests, they are not designed to cover all of the associated losses. Another concern for producers is the timing and clarity (or lack thereof) with respect to USDA announcements about new payment programs that are linked to producer production choices. In general, to avoid adversely influencing producer behaviorâa precept of most farm policiesâsuch announcements should be made either well in advance of the spring planting period or well after production decisions have been made. A final looming concern for market watchers and policymakers is the increased role of USDA payments to support farm incomes in 2019. USDA forecasts $22.4 billion in direct support payments to the U.S. agricultural sector in 2019, including $14.3 billion in direct payments made under trade aid programs as well as over $8 billion in payments from other farm programs. In addition, USDA forecasts $10.3 billion in federal crop insurance indemnity payments. Together, forecasts of USDA farm support plus crop insurance indemnities combine for $32.7 billion in payments that represent a 35.3% share of USDA's November forecast of 2019 net farm income of $92.5 billion. Without this federal support, net farm income would be lower, primarily due to continued weak prices for most major crops. Should these conditions persist into 2020, they would signal the potential for continued dependence on federal programs to sustain farm incomes in 2020.", "summary": "U.S. agricultural production got off to a late start in 2019 due to prolonged cool, wet springtime conditions throughout the major growing regions, particularly in states across the northern plains and eastern Corn Belt. Saturated soils prevented many farmers from planting their intended cropsâsuch acres are referred to as \"prevent plant (PPL)\" acres. As of November 1, 2019, the U.S. Department of Agriculture (USDA) reported that farmers were unable to plant a record 19.6 million acres in 2019âincluding 11.4 million acres of corn and 4.5 million acres of soybeans. The previous record for total PPL acres was set in 2011, when USDA reported 10.2 million acres of PPL. USDA's Risk Management Agency (RMA) reported on November 15, 2019, that 2019 PPL indemnity payments were over $4.2 billion, with $2.6 billion (60.6%) for corn PPL acres and $1.1 billion (25%) for soybean PPL acres. The 2019 average national PPL payment rate for all crops was $224.04 per acre. Payment rates varied by crop and ranged from a low of $50 per acre for millet to a high of $1,432 per acre for dark air cured tobacco. The unusually wet spring conditions that produced the record PPL acres in 2019 were heavily concentrated in Corn Belt states but were also reported in significant numbers in Arkansas, Texas, Mississippi, Louisiana, North Carolina, Tennessee, New York, and Oklahoma. However, South Dakota's 3.9 million acres of PPL were more than double second-place Ohio's 1.4 million of PPL acres. South Dakota's PPL acres accounted for over 20% of the national total in 2019, while its PPL indemnity payments of over $925 million accounted for 21.9% of national PPL indemnity payments. During the previous 19-year period from 2000 to 2018, national PPL averaged 4.1 million acres annually with average indemnities of $680 million per year. Of these national totals, South Dakota accounted for an average of 10% of PPL acres (406 million acres) and 11.2% of PPL indemnities ($76.4 million). Farmers that were unable to plant a crop during the spring of 2019 due to natural causes were potentially eligible for multiple payments under federal farm programs. First, federal crop insurance provides PPL coverage under a standard policy that covers pre-planting cost and potential revenue loss. Second, the FY2019 supplemental authorized disaster assistance payments for PPL (referred to as \"top up\") in addition to crop insurance indemnities. Third, the Administration's 2019 MFP payments, although based on planted acres, also included payments for eligible cover crops planted on PPL acres. In addition to the unplanted acres, a sizeable portion of the U.S. corn and soybean crops was planted later than usual. Such late planting meant that initial crop development would be behind normal across much of the major growing regions and that eventual yields would depend on beneficial weather extending late into the fall to achieve full crop maturity. Widespread wet conditions continued into the fall, especially in the northern plains and western Corn Belt. Ultimately, much of the corn crop was harvested under wet conditions with high moisture content that required drying. Due to the high costs of propane for drying, many farmers chose to leave their corn in the field until more beneficial market conditions emerged. As of December 16, 2019, USDA estimated that 8% (or 7.2 million acres) of the U.S. corn crop had yet to be harvested, adding further to the uncertainty of yields and harvested acreage for the 2019 corn crop. Saturated soil conditions heading into the winter months suggests a continuation of wet conditions into the 2020 planting season and the potential for a repeat of planting difficulties in the year ahead. Should wet conditions persist in 2020 and create a situation where farmers are again confronted with delayed or prevented planting, many producers may also bump up against a limit on the continued use of crop insurance PPL. Another looming concern for market watchers and policymakers is that, should wet conditions persist in 2020, they could signal the potential for continued dependence on federal programs to sustain farm incomes in 2020.", "document_type": "crs"}
{"report": "The 116 th Congress began with 57 African American Members, the highest number ever at the beginning of a Congress. After the death of an African American House Member in October 2019, the current 56 African American Members represent the following proportions of the entire Congress, and of the House and Senate separately: 10.1% of voting Members in the Congress (54 of 535, does not include the Delegates and Resident Commissioner); 10.4% of total Members in the Congress (56 of 541, includes the Delegates and Resident Commissioner); 11.7% of voting Members in the House (51 of 435, does not include the Delegates and Resident Commissioner); 12.0% of total Members in the House (53 of 441, includes the Delegates and Resident Commissioner); and 3.0% of total Members in the Senate (3 of 100). Table 1 provides more detail on these African American Members across the 116 th Congress. In addition to data for the 116 th Congress, this report provides historical information. The report also includes an appendix with an alphabetical listing of African American Members, selected biographical information, and committee assignments during their tenure in Congress. Inclusion in this report, and related data, is based on entry in Black Americans in Congress, 1870-2007 , the Black Americans in Congress, 1870-2019 e-book, and the accompanying website maintained by the House Office of the Historian and Office of Art and Archives ( http://history.house.gov/Exhibitions-and-Publications/BAIC/Black-Americans-in-Congress/ ) . According to that office, the website is based on the 2008 print edition but updated to reflect the entry of new African Americans into Congress. In 2018, at the direction of the Committee on House Administration, the Historian's Office revised and updated the contextual essays of the 2008 print edition in order to prepare the 2019 e-book edition of Black Americans in Congress. This report does not include additional Members who might identify as African American, or as having African ancestry, but are not included in these sources. Additional historical information, including committee assignments, leadership positions, and dates of service, is based on Biographical Directory of the American Congress ( http://bioguide.congress.gov ), various editions of the Congressional Directory , and a broad range of Congressional Quarterly Inc. and Leadership Directories Inc. publications. Numerous studies of Congress have examined the role and impact of African Americans in Congress. Many of these studies relate to larger questions about the nature of representation or about Congress as an institution. Central to these studies have been questions about the following: Descriptive representation (i.e., representation by those who share demographic characteristics with their constituents) and substantive representation (i.e., representation of policy preferences and a linkage to policy outcomes) in the representation of minority electoral and policy interests, as well as any linkage or trade-offs between the two. While the former concentrates on election outcomes (e.g., percentages of congressional seats), the latter focuses on behaviors and actions once an elected official is in office. The Voting Rights Act of 1965, impact of majority-minority districts in representing minority interests in a district, and influence of majority-minority districts on electoral and policy preferences in surrounding districts. These studies have also examined recent court rulings. The relationship of minority Members of Congress with their constituents, including any impact on turnout, electoral competitiveness or strategies, hiring of minority staff, communication styles, constituency services, and voter satisfaction and engagement. Legislative activities and influence, including work in committees, floor speeches, bill introduction and passage, cosponsorship, coalition formation, career progression and seniority, and relations with congressional leadership. Roll-call voting behavior, including voting cohesion compared to party or state delegations. Positions on various domestic or international issues. The first African American to serve in the Senate, Hiram Revels of Mississippi, was sworn in on February 23, 1870. The first African American to serve in the House, Joseph Rainey of South Carolina, was sworn in on December 12, 1870. Both chambers subsequently had periods without any African American Members. The longest period for the House stretched from the 57 th Congress (1901-1903) until the beginning of the 71 st Congress (1929-1931), or 28 years. The longest period for the Senate stretched from the beginning of the 47 th Congress (1881-1883) until the beginning of the 90 th Congress (1967-1968), or 86 years. African American membership in the House first reached 10 Members during the 91 st Congress (1969-1970), and voting membership first exceeded 5% during the 100 th Congress (1987-1988). Another large increase occurred during the 103 rd Congress (1993-1994), which was the first Congress after the redistricting that followed the 1990 U.S. Census. The 116 th Congress began with the highest number of African American Members ever for the start of a Congress: 57 (52 Representatives, 2 Delegates, and 3 Senators). Table 2 provides a summary of the 162 African Americans who have served in the House, Senate, and both chambers. Of these 162 Members, 22 began their service after the Civil War but prior to the start of the 20 th century (2 in the Senate, 20 in the House). Article I, Section 2 of the U.S. Constitution requires that all Members of the House of Representatives must be \"chosen every second Year by the People of the several States.\" Therefore, all 153 of the African Americans who have served in the House entered office through election, even those who entered after a seat became open during a Congress. By contrast, the Seventeenth Amendment to the Constitution, which was ratified in 1913, gives state legislatures the option to empower governors to fill congressional Senate vacancies by temporary appointment. The Seventeenth Amendment also provides for direct elections of Senators by the \"people\" of a state. Previously, Senators were elected by legislative selection rather than through the direct elections by which Representatives to Congress were elected. Of the 10 African Americans who have served in the Senate, two were elected prior to the ratification of the Seventeenth Amendment to the Constitution; four initially entered Senate service by winning a regular election; one initially entered Senate service by winning a special election and was subsequently reelected; and three were appointed. Of these three, one was a candidate for reelection and served in more than one Congress. In 1971, the 13 African Americans then serving in the House established the Congressional Black Caucus. In the 116 th Congress, the CBC is one of more than 270 registered congressional member organizations (CMOs) in the House. House CMOs are required to register with the Committee on House Administration. CMOs do not receive separate funding, and they have not since a change in the Rules of the House adopted for the 104 th Congress. Members may use their Members' Representational Allowance (MRA) to support staff, including shared staff, assigned to CMO duties. Members, rather than the CMO, remain the employing authority, and the CMO is not an independent entity. The committee's Members' Congressional Handbook lists a number of additional regulations related to the staffing and funding of CMOs. CMOs are not required to register in the Senate. As in the House, informal congressional groups or organizations do not receive separate funding. The CBC CMO is distinct from the Congressional Black Caucus Foundation, which was established in 1976 and is a Â§501(c)(3) nonprofit organization. A number of African Americans in Congress, listed in Table 5 , have held positions in their party's leadership. All of these party leadership positions have been in the House. The first African American Member to be elected to any party leadership position was Shirley Chisholm (D-NY), who served as House Democratic Caucus Secretary in the 95 th and 96 th Congresses (1977-1980). As chair of the Senate Select Committee on the Levees of the Mississippi River (45 th Congress), Blanche K. Bruce was the first African American to chair any congressional committee. As chair of the House Committee on Expenditures in the Executive Departments (81 st Congress), William L. Dawson was the first African American to chair a House committee. In total, 23 African Americans have chaired a House committee; 1 African American has chaired a Senate committee; and 2 African American Representatives have chaired a joint committee. These chairmanships include standing, special, and select committees. Some African Americans have chaired multiple committees in the House. In the 116 th Congress, four African American Representatives currently chair four different House standing committees. A total of 47 African American women have served in Congress. Of these, 25 serve in the 116 th Congress (including 2 Delegates), a record number. The previous record was 22 (including 2 Delegates), which was reached at the end of the 115 th Congress. The African American women Members of the 116 th Congress are listed in Table 7 . African American women comprise 25 of the 131 women currently serving in the 116 th Congress (19.1%) and 25 of the 57 African Americans currently serving in the 116 th Congress (43.9%). ADAMS, ALMA S. Democrat; North Carolina, 12 th District. Elected to the 113 th Congress to fill the vacancy caused by the resignation of Melvin L. Watt, and also elected to the 114 th -116 th Congresses (served Nov. 4, 2014-present). Committee assignments: H. Agriculture (114 th -116 th Congresses) H. Education and the Workforce/Education and Labor (114 th -116 th Congresses) H. Small Business (114 th -115 th Congresses) H. Financial Services (116 th Congress) ALLRED, COLIN . Democrat; Texas, 32 nd District. Elected to the 116 th Congress (served Jan. 3, 2019-present). Committee assignments: H. Foreign Affairs (116 th Congress) H. Transportation and Infrastructure (116 th Congress) H. Veterans' Affairs (116 th Congress) BALLANCE, FRANK W., Jr. Democrat; North Carolina, 1 st District. Elected to the 108 th Congress (served Jan. 7, 2003, until his resignation June 11, 2004). Committee assignments: H. Agriculture (108 th Congress) H. Small Business (108 th Congress) BASS, KAREN. Democrat; California, 33 rd (112 th Congress) and 37 th District (113 th Congress- present). Elected to the 112 th -116 th Congresses (served Jan. 3, 2011-present). Chair of the Congressional Black Caucus, 116 th Congress. Committee assignments: H. Budget (112 th Congress) H. Foreign Affairs (112 th -116 th Congresses) H. Judiciary (113 th -116 th Congresses) BEATTY, JOYCE. Democrat; Ohio, 3 rd District. Elected to the 113 th -116 th Congresses (served Jan. 3, 2013-present). Committee assignments: H. Financial Services (113 th -116 th Congresses) BISHOP, SANFORD DIXON, Jr. Democrat; Georgia, 2 nd District. Elected to the 103 rd -116 th Congresses (served Jan. 5, 1993-present). Committee assignments: H. Agriculture (103 rd -107 th Congresses) H. Post Office and Civil Service (103 rd Congress) H. Veterans' Affairs (103 rd -104 th Congresses) H. Select Intelligence (105 th -107 th Congresses) H. Appropriations (108 th -116 th Congresses) BLACKWELL, LUCIEN EDWARD. Democrat; Pennsylvania, 2 nd District. Elected to the 102 nd Congress to fill the vacancy caused by the resignation of William Gray, and also elected to the 103 rd Congress (served Nov. 11, 1991-Jan. 3, 1995). Committee assignments: H. Merchant Marine and Fisheries (102 nd Congress) H. Public Works and Transportation (102 nd -103 rd Congresses) H. Budget (103 rd Congress) BLUNT ROCHESTER, LISA. Democrat; Delaware, At-Large. Elected to the 115 th -116 th Congresses (served Jan. 3, 2017-present). Committee assignments: H. Agriculture (115 th Congress) H. Education and the Workforce (115 th Congress) H. Energy and Commerce (116 th Congress) BOOKER, CORY ANTHONY. Democrat; New Jersey. Senator. Elected to the Senate in 2013 to fill the vacancy caused by the death of Frank Lautenberg and subsequently elected to a full term in 2014 (served October 31, 2013-present). Committee assignments: S. Commerce, Science and Transportation (113 th -114 th Congress) S. Environment and Public Works (113 th -116 th Congresses) S. Homeland Security and Government Affairs (114 th Congress) S. Foreign Relations (115 th -116 th Congresses) S. Small Business and Entrepreneurship (113 th -116 th Congresses) S. Judiciary (115 th -116 th Congresses) BROOKE, EDWARD WILLIAM, III. Republican; Massachusetts. Senator. Elected in 1966 (served Jan. 3, 1967-Jan. 3, 1979). Committee assignments: S. Aeronautical and Space Sciences (90 th Congress) S. Banking and Currency (90 th -95 th Congresses; ranking member, 95 th Congress) S. Government Operations (90 th Congress) S. Armed Services (91 st Congress) S. Select Education Opportunity (91 st -92 nd Congresses) S. Appropriations (92 nd -95 th Congresses) S. Banking, Housing and Urban Affairs (92 nd -95 th Congresses) S. Special Aging (92 nd -95 th Congresses) S. Select Standards and Conduct (93 rd -94 th Congresses) Jt. Bicentennial Arrangements (94 th Congress; vice-chair) Jt. Defense Production (94 th -95 th Congresses) BROWN, ANTHONY GREGORY. Democrat; Maryland, 4 th District. Elected to the 115 th -116 th Congresses (served Jan. 3, 2017-present). Committee assignments: H. Armed Services (115 th -116 th Congresses) H. Ethics (115 th -116 th Congresses) H. Natural Resources (115 th -116 th Congresses) H. Transportation and Infrastructure (116 th Congress) BROWN, CORRINE. Democrat; Florida, 3 rd District (103 rd -112 th Congresses), 5 th District (113 th -114 th Congress). Elected to the 103 rd -114 th Congresses (served Jan. 3, 1993-Jan. 3, 2017). Committee assignments: H. Government Operations (103 rd Congress) H. Public Works and Transportation (103 rd Congress) H. Transportation and Infrastructure (104 th -114 th Congresses) H. Veterans' Affairs (103 rd -114 th Congresses; ranking member, 114 th Congress) BRUCE, BLANCHE KELSO. Republican; Mississippi, Senator. Elected in 1874 (served March 4, 1875-March 3, 1881). Committee assignments: S. Manufactures (44 th Congress) S. Pensions (44 th -45 th Congresses) S. Education and Labor (44 th -46 th Congresses) S. Select Levees of the Mississippi River (chair, 45 th -46 th Congresses) S. Select To Investigate the Freedman's Savings and Trust Company (chair, 46 th Congress) BURKE, YVONNE BRATHWAITE. Democrat; California, 28 th (94 th -95 th Congresses) and 37 th (93 rd Congress) Districts. Elected to the 93 rd -95 th Congresses (served Jan. 3, 1973-Jan. 3, 1979). First female chair of the Congressional Black Caucus, 94 th -95 th Congresses. Committee assignments: H. Public Works (93 rd Congress) H. Interior and Insular Affairs (93 rd Congress) H. Appropriations (94 th -95 th Congresses) H. Select Committee on the House Beauty Shop (chair, 94 th -95 th Congresses) BURRIS, ROLAND. Democrat; Illinois. Senator. Appointed to the Senate in December 2008 to fill vacancy caused by the resignation of Barack Obama, but was not seated until Jan. 12, 2009 (served Jan. 12, 2009-Nov. 29, 2010). Committee assignments: S. Armed Services (111 th Congress) S. Homeland Security and Governmental Affairs (111 th Congress) S. Veteran's Affairs (111 th Congress) BUTTERFIELD, GEORGE KENNETH, Jr. (G.K.). Democrat; North Carolina, 1 st District. Elected to the 108 th Congress to fill the vacancy caused by the resignation of Frank Ballance, and also elected to the 109 th -116 th Congresses (served July 20, 2004-present). Chair of the Congressional Black Caucus, 114 th Congress. Committee assignments: H. Small Business (108 th Congress) H. Agriculture (108 th -109 th Congresses) H. Armed Services (109 th Congress) H. Energy and Commerce (110 th -116 th Congresses) H. Standards of Official Conduct (111 th Congress) H. House Administration (116 th Congress) CAIN, RICHARD HARVEY. Republican; South Carolina, At-Large. Elected to the 43 rd and 45 th Congresses (served March 4, 1873-March 3, 1875; March 4, 1877-March 3, 1879). Committee assignments: H. Agriculture (43 rd Congress) H. Private Land Claims (45 th Congress) CARSON, ANDRÃ. Democrat; Indiana, 7 th District. Elected to the 110 th Congress to fill the vacancy caused by the death of his grandmother Julia Carson, and also elected to the 111 th -116 th Congresses (served March 11, 2008-present). Committee assignments: H. Financial Services (110 th -112 th Congresses) H. Armed Services (113 th Congress) H. Transportation and Infrastructure (113 th -116 th Congresses) H. Permanent Select Intelligence (114 th -116 th Congresses) CARSON, JULIA. Democrat; Indiana, 10 th District (105 th -107 th Congresses) and 7 th District (108 th -110 th Congresses). Elected to the 105 th -110 th Congresses (served Jan. 3, 1997, until her death Dec. 15, 2007). Committee assignments: H. Banking and Financial Services/Financial Services (105 th -110 th Congresses) H. Veterans' Affairs (105 th -107 th Congresses) H. Transportation and Infrastructure (108 th -110 th Congresses) CHEATHAM, HENRY PLUMMER. Republican; North Carolina, 2 nd District. Elected to the 51 st and 52 nd Congresses (served March 4, 1889-March 3, 1893). Committee assignments: H. Expenditures on Public Buildings (51 st -52 nd Congresses) H. Education (51 st -52 nd Congresses) H. Agriculture (52 nd Congresses) CHISHOLM, SHIRLEY ANITA. Democrat; New York, 12 th District. Elected to the 91 st -97 th Congresses (served Jan. 3, 1969-Jan. 3, 1983). Committee assignments: H. Veterans' Affairs (91 st -92 nd Congresses) H. Education and Labor (92 nd -94 th Congresses) H. Rules (95 th -97 th Congresses) CHRISTENSEN, DONNA. Democrat; Delegate from the Virgin Islands. Elected to the 105 th -113 th Congresses (served Jan. 3, 1997-Jan. 3, 2015). Committee assignments: H. Resources/Natural Resources (105 th -112 th Congresses) H. Small Business (105 th -109 th Congresses) H. Homeland Security (108 th -110 th Congresses; 112 th Congress) H. Energy and Commerce (111 th -113 th Congresses) CHRISTIAN-CHRISTENSEN, DONNA and CHRISTIAN-GREEN, DONNA . See CHRISTENSEN, DONNA . CLARKE, HANSEN. Democrat; Michigan, 13 th District. Elected to the 112 th Congress (served Jan. 3, 2011-Jan. 3, 2013). Committee assignments: H. Homeland Security (112 th Congress) H. Science, Space and Technology (112 th Congress) CLARKE, YVETTE. Democrat; New York, 11 th District (110 th -112 th Congresses) and 9 th District (113 th Congress-present). Elected to the 110 th -116 th Congresses (served Jan. 3, 2007-present). Committee assignments: H. Education and Labor (110 th -111 th Congresses) H. Homeland Security (110 th -113 th , 116 th Congresses) H. Small Business (110 th -114 th Congresses) H. Ethics (113 th -115 th Congresses) H. Energy and Commerce (114 th -116 th Congresses) CLAY, WILLIAM LACY, Jr. Democrat; Missouri, 1 st District. Elected to the 107 th -116 th Congresses (served Jan. 3, 2001-present). Committee assignments: H. Financial Services (107 th -116 th Congresses) H. Government Reform/H. Oversight and Government Reform (107 th -116 th Congresses) H. Natural Resources (115 th -116 th Congresses) CLAY, WILLIAM LACY, Sr. Democrat; Missouri, 1 st District. Elected to the 91 st -106 th Congresses (served Jan. 3, 1969-Jan. 3, 2001). Committee assignments: H. Education and Labor (91 st -106 th Congresses) H. Post Office and Civil Service (93 rd -103 rd Congresses; chair 102 nd -103 rd Congresses) H. Select to Study the Committee System (96 th Congress) H. House Administration (99 th -103 rd Congresses) Jt. Library (101 st Congress) CLAYTON, EVA. Democrat; North Carolina, 1 st District. Elected to the 102 nd Congress Nov. 3, 1992, to fill vacancy caused by death of Walter Jones; simultaneously elected to the 103 rd Congress; reelected to the 104 th -107 th Congresses (served Nov. 5, 1992-Jan. 3, 2003). Committee assignments: H. Agriculture (103 rd -107 th Congresses) H. Small Business (103 rd -104 th Congresses) H. Budget (105 th -107 th Congresses) CLEAVER, EMANUEL, II. Democrat; Missouri, 5 th District. Elected to the 109 th -116 th Congresses (served Jan. 4, 2005-present). Chair of the Congressional Black Caucus, 112 th Congress. Committee assignments: H. Financial Services (109 th -116 th Congresses) H. Select Energy Independence and Global Warming (110 th -111 th Congresses) H. Homeland Security (111 th and 116 th Congresses) H. Select Committee on the Modernization of Congress (116 th Congress) CLYBURN, JAMES ENOS. Democrat; South Carolina, 6 th District. Elected to the 103 rd -116 th Congresses (served Jan. 5, 1993-present). Chair of the Congressional Black Caucus, 106 th Congress. Committee assignments: H. Public Works and Transportation/Transportation and Infrastructure (103 rd -105 th Congresses) H. Veterans' Affairs (103 rd -105 th Congresses) H. Small Business (104 th Congress) H. Appropriations (106 th -109 th Congresses) COLLINS, BARBARA-ROSE. Democrat; Michigan, 13 th District (102 nd Congress) and 15 th District (103 rd -104 th Congresses). Elected to the 102 nd -104 th Congresses (served Jan. 3, 1991-Jan. 3, 1997). Committee assignments: H. Public Works and Transportation (102 nd -103 rd Congresses) H. Science, Space and Technology (102 nd Congress) H. Government Operations (103 rd Congress) H. Post Office and Civil Service (103 rd Congress) H. Government Reform and Oversight (104 th Congress) H. Transportation and Infrastructure (104 th Congress) H. Select Children, Youth, and Families (102 nd Congress) COLLINS, CARDISS. Democrat; Illinois, 7 th District. Elected to the 93 rd Congress in a June 5, 1973, special election to fill vacancy caused by death of husband George W. Collins; reelected to the 94 th -104 th Congresses (served June 7, 1973-Jan. 3, 1997). Chair of the Congressional Black Caucus, 96 th Congress. Committee assignments: H. Government Operations/Government Reform and Oversight (93 rd -104 th Congresses) H. International Relations/Foreign Affairs (94 th -96 th Congresses) H. District of Columbia (95 th Congress) H. Select Committee on Narcotics Abuse and Control (96 th -102 nd Congresses) H. Energy and Commerce/Commerce (97 th -104 th Congresses) COLLINS, GEORGE WASHINGTON. Democrat; Illinois, 6 th District. Elected to the 91 st Congress to fill vacancy caused by death of Daniel J. Ronan; simultaneously elected to the 92 nd Congress; reelected to the 93 rd Congress (served Nov. 3, 1970, until his death Dec. 18, 1972, before the seating of the 93 rd Congress). Committee assignments: H. Government Operations (91 st -92 nd Congresses) H. Public Works (92 nd Congress) CONYERS, JOHN, Jr. Democrat; Michigan, 1 st District (89 th -102 nd Congresses); 14 th District (103 rd -112 th Congresses); 13 th District (113 th -115 th Congresses). Elected to the 89 th -115 th Congresses (served Jan. 3, 1965, until his resignation Dec. 5, 2017). Committee assignments: H. Judiciary (89 th -115 th Congresses; chair, 110 th -111 th Congresses; ranking member, 104 th -109 th , 112 th -115 th Congresses) H. Government Operations (92 nd -103 rd Congresses; chair, 101 st -103 rd Congresses) H. Small Business (100 th -103 rd Congresses) COWAN, WILLIAM (MO). Democrat; Massachusetts. Senator. Appointed to the Senate in 2013 to fill the vacancy caused by the resignation of John F. Kerry (served Feb. 1, 2013- July 15, 2013). Committee assignments: S. Agriculture, Nutrition and Forestry (113 th Congress) S. Commerce, Science and Transportation (113 th Congress) S. Small Business and Entrepreneurship (113 th Congress) CROCKETT, GEORGE WILLIAM, Jr. Democrat; Michigan, 13 th District. Elected to the 96 th Congress to fill vacancy caused by the resignation of Charles C. Diggs Jr.; simultaneously elected to the 97 th Congress; reelected to the 98 th -101 st Congresses (served Nov. 4, 1980-Jan. 3, 1991). Committee assignments: H. Foreign Affairs (96 th -101 st Congresses) H. Judiciary (97 th -101 st Congresses) H. Small Business (97 th Congress) H. Select Aging (97 th -101 st Congresses) CUMMINGS, ELIJAH EUGENE. Democrat; Maryland, 7 th District. Elected to the 104 th Congress to fill vacancy caused by the resignation of Kweisi Mfume; reelected to the 105 th -116 th Congresses (served April 16, 1996, until his death, October 17, 2019). Chair of the Congressional Black Caucus, 108 th Congress. Committee assignments: H. Government Oversight and Government Reform/Government Reform/Oversight and Reform (104 th -115 th Congresses; ranking member, 112 th -115 th Congresses; chair, 116 th Congress) H. Transportation and Infrastructure (110 th -116 th Congresses) H. Armed Services (110 th Congress) Jt. Economic Committee (109 th -114 th Congresses) Select Terrorist Attack in Benghazi (114 th Congress; ranking member) DAVIS, ARTUR. Democrat; Alabama, 7 th District. Elected to the 108 th -111 th Congresses (served Jan. 7, 2003-Jan. 2, 2011). Committee assignments: H. Budget (108 th -109 th Congresses) H. Financial Services (108 th -109 th Congresses) H. Judiciary (110 th Congress) H. Ways and Means (110 th -111 th Congresses) DAVIS, DANNY K. Democrat; Illinois, 7 th District. Elected to the 105 th -116 th Congresses (served Jan. 7, 1997-present). Committee assignments: H. Small Business (105 th -109 th Congresses) H. Government Oversight and Government Reform/Government Reform (105 th -113 th Congresses) H. Education and the Workforce/Education and Labor (108 th -110 th Congresses) H. Ways and Means (111 th , 113 th -116 th Congresses) H. Homeland Security (112 th Congress) DAWSON, WILLIAM LEVI. Democrat; Illinois, 1 st District. Elected to the 78 th -91 st Congresses (served Jan. 3, 1943, until his death Nov. 9, 1970). Committee assignments: H. Expenditures in the Executive Departments (78 th -82 nd Congresses; chair, 81 st -82 nd Congresses) H. Government Operations (83 rd -91 st Congresses; ranking member, 83 rd Congress; chair, 84 th -91 st Congresses) H. Coinage, Weights, and Measures (78 th -79 th Congresses) H. Invalid Pensions (78 th -79 th Congresses) H. Insular Affairs (78 th -79 th Congresses) H. Irrigation and Reclamation (78 th -79 th Congresses) H. Interior and Insular Affairs (82 nd Congress) H. District of Columbia (84 th -91 st Congresses) DE LARGE, ROBERT CARLOS. Republican; South Carolina, 2 nd District. Elected to the 42 nd Congress (served March 4, 1871, until Jan. 24, 1873, when his seat was declared vacant after his election was successfully contested by former Rep. Christopher Bowen). Committee assignments: H. Manufactures (42 nd Congress) DELGADO, ANTONIO . Democrat; New York, 19 th District. Elected to the 116 th Congress (served Jan. 3, 2019-present). Committee assignments: H. Agriculture (116 th Congress) H. Small Business (116 th Congress) H. Transportation and Infrastructure (116 th Congress) DELLUMS, RONALD V. Democrat; California, 7 th District (92 nd -93 rd Congresses); 8 th District (94 th -102 nd Congresses); 9 th District (103 rd -105 th Congresses). Elected to the 92 nd -105 th Congresses (served Jan. 3, 1971, until his resignation Feb. 6, 1998). Chair of the Congressional Black Caucus, 101 st Congress. Committee assignments: H. District of Columbia (96 th -103 rd Congresses; chair, 96 th -102 nd Congresses) H. Foreign Affairs (92 nd Congress) H. Armed Services (93 rd -103 rd Congresses; chair, 103 rd Congress) H. National Security (104 th -105 th Congresses; ranking member, 104 th -105 th Congresses) H. Post Office and Civil Service (97 th -98 th Congresses) H. Select Intelligence (94 th -102 nd Congresses) DEMINGS, VAL BUTLER . Democrat; Florida, 10 th District. Elected to the 115 th -116 th Congresses (served Jan. 3, 2017-present). Committee assignments: H. Homeland Security (115 th Congress) H. Government Reform (115 th Congress) H. Judiciary (115 th -116 th Congresses) H. Permanent Select Intelligence (116 th Congress) DE PRIEST, OSCAR STANTON. Republican; Illinois, 1 st District. Elected to the 71 st -73 rd Congresses (served March 4, 1929-March 3, 1935). Committee assignments: H. Enrolled Bills (71 st -73 rd Congresses) H. Invalid Pensions (71 st -73 rd Congresses) H. Indian Affairs (71 st -73 rd Congresses) H. Post Office and Post Roads (73 rd Congress) DIGGS, CHARLES COLES, Jr. Democrat; Michigan, 13 th District. Elected to the 84 th -96 th Congresses (served Jan. 3, 1955, until his resignation on June 3, 1980). First Chair of the Congressional Black Caucus, 92 nd Congress. Committee assignments: H. Interior and Insular Affairs (84 th -85 th Congresses) H. Veterans' Affairs (84 th -85 th Congresses) H. Foreign Affairs (86 th -93 rd Congresses) H. District of Columbia (88 th -96 th Congresses; chair, 93 rd -95 th Congresses) DIXON, JULIAN CAREY. Democrat; California, 28 th District (96 th -102 nd Congresses); 32 nd District (103 rd -106 th Congresses). Elected to 96 th -107 th Congresses, but died before the commencement of the 107 th Congress (served Jan. 3, 1979, until his death on Dec. 8, 2000). Chair of the Congressional Black Caucus, 98 th Congress. Committee assignments: H. Appropriations (96 th -106 th Congresses) H. Standards of Official Conduct (98 th -101 st Congresses; chair, 99 th -101 st Congresses) H. Select Intelligence (103 rd -106 th Congresses; ranking member, 106 th Congress) DYMALLY, MERVYN MALCOLM. Democrat; California, 31 st District. Elected to the 97 th -102 nd Congresses (served Jan. 3, 1981-Jan. 3, 1993). Chair of the Congressional Black Caucus, 100 th Congress. Committee assignments: H. District of Columbia (97 th -102 nd Congresses) H. Foreign Affairs (97 th -102 nd Congresses) H. Science and Technology (97 th -98 th Congresses) H. Post Office and Civil Service (98 th -102 nd Congresses) H. Education and Labor (99 th Congress) EDWARDS, DONNA. Democrat; Maryland, 4 th District. Elected to the 110 th Congress in a June 17, 2008, special election to fill vacancy caused by the resignation of Albert Wynn; reelected to the 111 th -114 th Congresses (served June 19, 2008-Jan. 3, 2017). Committee assignments: H. Science and Technology/Science, Space and Technology (110 th -114 th Congresses) H. Transportation and Infrastructure (110 th -114 th Congresses) H. Ethics (112 th Congress) ELLIOTT, ROBERT BROWN. Republican; South Carolina, 3 rd District. Elected to the 42 nd -43 rd Congresses (served March 4, 1871, until his resignation on Nov. 1, 1874). Committee assignments: H. Education and Labor (42 nd -43 rd Congresses) H. Militia (43 rd Congress) ELLISON, KEITH. Democrat; Minnesota, 5 th District. Elected to the 110 th -115 th Congresses (served Jan. 4, 2007-Jan. 3, 2019). Committee assignments: H. Financial Services (110 th -115 th Congresses) H. Judiciary (110 th Congress) H. Foreign Affairs (111 th Congress) ESPY, ALPHONSO MICHAEL (MIKE). Democrat; Mississippi, 2 nd District. Elected to the 100 th -103 rd Congresses (served Jan. 6, 1987, until his resignation on Jan. 25, 1993). Committee assignments: H. Agriculture (100 th -102 nd Congresses) H. Budget (101 st -102 nd Congresses) H. Select Hunger (101 st -102 nd Congresses) Jt. Deficit Reduction (100 th Congress) EVANS, DWIGHT. Democrat; Pennsylvania, 2 nd District. Elected to the 114 th Congress to fill vacancy caused by the resignation of Chaka Fattah; also elected to the 115 th -116 th Congresses (served Nov. 8, 2016-present). Committee assignments: H. Agriculture (115 th Congress) H. Small Business (115 th -116 th Congresses) H. Ways and Means (116 th Congress) EVANS, MELVIN HERBERT. Republican; Delegate from the U.S. Virgin Islands. Elected to the 96 th Congress (served Jan. 3, 1979-Jan. 3, 1981). Committee assignments: H. Armed Services (96 th Congress) H. Interior and Insular Affairs (96 th Congress) H. Merchant Marine and Fisheries (96 th Congress) FATTAH, CHAKA. Democrat. Pennsylvania, 2 nd District. Elected to the 104 th -114 th Congresses (served Jan. 3, 1995, until his resignation June 23, 2016). Committee assignments: H. Government Reform and Oversight/Government Reform (104 th -106 th Congresses) H. Education and the Workforce/Economic and Education (104 th -106 th Congresses) H. Small Business (104 th Congress) H. Standards of Official Conduct (105 th -106 th Congresses) H. Administration (106 th -107 th Congresses) Jt. Printing (106 th -107 th Congresses) Appropriations (107 th -114 th Congresses) FAUNTROY, WALTER EDWARD. Democrat; Delegate from the District of Columbia. Elected to the 92 nd Congress in a special election after the District of Columbia was authorized to elect a delegate; reelected to the 93 rd -101 st Congresses (served April 19, 1971-Jan. 3, 1991). Chair of the Congressional Black Caucus, 97 th Congress. Committee assignments: H. District of Columbia (92 nd -101 st Congresses) H. Banking and Currency/Banking, Finance, and Urban Affairs (93 rd -101 st Congresses) H. Select Assassinations (94 th -95 th Congresses) H. Select Narcotics Abuse and Control (98 th -101 st Congresses) FIELDS, CLEO. Democrat; Louisiana, 4 th District. Elected to the 103 rd -104 th Congresses (served Jan. 5, 1993-Jan. 3, 1997). Committee assignments: H. Banking, Finance and Urban Affairs/Banking and Financial Services (103 rd -104 th Congresses) H. Small Business (103 rd -104 th Congresses) FLAKE, FLOYD HAROLD. Democrat; New York, 6 th District. Elected to the 100 th -105 th Congresses (served Jan. 6, 1987, until his resignation on Nov. 15, 1997). Committee assignments: H. Banking, Finance and Urban Affairs/Banking and Financial Services (100 th -105 th Congresses) H. Small Business (100 th -105 th Congresses) H. Government Operations (103 rd Congress) H. Select Children, Youth and Families (100 th Congress) H. Select Hunger (100 th -102 nd Congresses) FORD, HAROLD EUGENE, S r . Democrat; Tennessee, 8 th District (94 th -97 th Congresses); 9 th District (98 th -104 th Congresses). Elected to the 94 th -104 th Congresses (served Jan. 3, 1975-Jan. 3, 1997). Committee assignments: H. Veterans' Affairs (94 th Congress) H. Banking, Currency, and Housing (94 th Congress) H. Ways and Means (94 th -104 th Congresses) H. Select Aging (94 th -102 nd Congresses) H. Select Assassinations (94 th -95 th Congresses) FORD, HAROLD EUGENE, Jr. Democrat; Tennessee, 9 th District. Elected to the 105 th -109 th Congresses (served Jan. 7, 1997-Jan. 3, 2007). Committee assignments: H. Education and the Workforce (105 th -107 th Congresses) H. Government Reform and Oversight/Government Reform (105 th -106 th Congresses) H. Financial Services (107 th -109 th Congresses) H. Budget (108 th -109 th Congresses) FRANKS, GARY. Republican; Connecticut, 5 th District. Elected to the 102 nd -104 th Congresses (served Jan. 3, 1991-Jan. 3, 1997). Committee assignments: H. Armed Services (102 nd Congress) H. Small Business (102 nd Congress) H. Select Aging (102 nd Congress) H. Energy and Commerce (103 rd Congress) H. Commerce (104 th Congress) FRAZER, VICTOR O. Independent; Delegate from the U.S. Virgin Islands. Elected to the 104 th Congress (served Jan. 3, 1995-Jan. 3, 1997). Committee assignments: H. International Relations (104 th Congress) FUDGE, MARCIA F. Democrat; Ohio, 11 th District. Elected to the 110 th Congress in a Nov. 4, 2008, special election to fill vacancy caused by death of Stephanie Tubbs Jones; reelected to the 111 th -116 th Congresses (served Nov. 19, 2008-present). Chair of the Congressional Black Caucus, 113 th Congress. Committee assignments: H. Education and Labor/Education and the Workforce (111 th Congress; 113 th -116 th Congresses) H. Science and Technology/Science, Space and Technology (111 th -112 th Congresses) H. Agriculture (112 th -116 th Congresses) H. House Administration (116 th Congress) GRAY, WILLIAM HERBERT III. Democrat; Pennsylvania, 2 nd District. Elected to the 96 th -102 nd Congresses (served Jan. 3, 1979, until his resignation on Sept. 11, 1991). Committee assignments: H. Budget (96 th , 98 th -100 th Congresses; chair, 99 th -100 th Congresses) H. District of Columbia (96 th -102 nd Congresses) H. Foreign Affairs (96 th Congress) H. Appropriations (97 th -102 nd Congresses) H. House Administration (102 nd Congress) Jt. Deficit Reduction (100 th Congress) GREEN, AL. Democrat; Texas, 9 th District. Elected to the 109 th -116 th Congresses (served Jan. 4, 2005-present). Committee assignments: H. Financial Services (109 th -116 th Congresses) H. Science (109 th Congress) H. Homeland Security (110 th -111 th , 116 th Congresses) H. Foreign Affairs (111 th Congress) HALL, KATIE BEATRICE. Democrat; Indiana, 1 st District. Elected to the 97 th Congress in a Nov. 2, 1982, special election to fill vacancy caused by death of Adam Benjamin Jr.; reelected to the 98 th Congress (served Nov. 29, 1982-Jan. 3, 1985). Committee assignments: H. Post Office and Civil Service (98 th Congress) H. Public Works and Transportation (98 th Congress) HARALSON, JEREMIAH. Republican; Alabama, 1 st District. Elected to the 44 th Congress. (served March 4, 1875-March 3, 1877) Committee assignments: H. Public Expenditures (44 th Congress) HARRIS, KAMALA DEVI. Democrat; California, Senator. Elected in 2016 (served Jan. 3, 2017-present). Committee assignments: S. Budget (115 th -116 th Congresses) S. Environment and Public Works (115 th Congress) S. Homeland Security (115 th -116 th Congresses) S. Judiciary (115 th -116 th Congresses) S. Select Intelligence (115 th -116 th Congresses) HASTINGS, ALCEE LAMAR. Democrat; Florida, 20 th District. Elected to the 103 rd -116 th Congresses (served Jan. 5, 1993-present). Committee assignments: H. Foreign Affairs/International Relations (103 rd -107 th Congresses) H. Merchant Marine and Fisheries (103 rd Congress) H. Post Office and Civil Service (103 rd Congress) H. Science (104 th -105 th Congresses) H. Select Intelligence (106 th -111 th Congresses) H. Rules (107 th -116 th Congresses) H. Standards of Official Conduct (110 th Congress) HAWKINS, AUGUSTUS FREEMAN (GUS). Democrat; California, 21 st District (88 th -93 rd Congresses); 29 th (94 th -101 st Congresses). Elected to the 88 th -101 st Congresses (served from Jan. 3, 1963-Jan. 3, 1991). Committee assignments: H. Education and Labor (88 th -101 st Congresses; chair, 98 th -101 st Congresses) H. House Administration (91 st -98 th Congresses; chair, 97 th -98 th Congresses) Jt. Printing (95 th -98 th Congresses; chair, 96 th and 98 th Congresses) Jt. Library (97 th -98 th Congresses; chair, 97 th Congress) Jt. Economic (97 th -101 st Congresses) HAYES, CHARLES ARTHUR. Democrat; Illinois, 1 st District. Elected to the 98 th Congress in a Aug. 23, 1983, special election to fill vacancy caused by the resignation of Harold Washington; reelected to the 99 th -102 nd Congresses (served Aug. 23, 1983-Jan. 3, 1993). Committee assignments: H. Education and Labor (98 th -102 nd Congresses) H. Small Business (98 th -101 st Congresses) H. Post Office and Civil Service (101 st -102 nd Congresses) HAYES, JAHANA. Â  Democrat; Connecticut, 5 th Â District. Elected to the 116 th Â Congress (served Jan. 3, 2019-present). Committee assignments: H. Agriculture (116 th Â Congress) H. Education and Labor (116 th Â  Congress) HILLIARD, EARL FREDERICK. Democrat; Alabama, 7 th District. Elected to the 103 rd -107 th Congresses (served Jan. 5, 1993-Jan. 3, 2003). Committee assignments: H. Agriculture (103 rd -107 th Congresses) H. Small Business (103 rd -104 th Congresses) H. International Relations (105 th -107 th Congresses) HORSFORD, STEVEN. Democrat; Nevada, 4 th District. Elected to the 113 th and 116 th Congresses (served Jan. 3, 2013-Jan. 3, 2015; Jan. 3, 2019-present). Committee assignments: H. Homeland Security (113 th Congress) H. Natural Resources (113 th , 116 th Congresses) H. Oversight and Government Reform (113 th Congress) H. Budget (116 th Congress) H. Ways and Means (116 th Congress) HURD, WILLIAM BALLARD. Republican; Texas, 23 rd District. Elected to the 114 th -116 th Congresses (served Jan. 3, 2015-present). Committee assignments: H. Homeland Security (114 th -115 th Congresses) H. Oversight and Government Reform (114 th -115 th Congresses) H. Small Business (114 th Congress) H. Permanent Select Intelligence (115 th -116 th Congresses) H. Appropriations (116 th Congress) HYMAN, JOHN ADAMS. Republican; North Carolina, 2 nd District. Elected to the 44 th Congress (served March 4, 1875-March 3, 1977). Committee assignments: H. Manufactures (44 th Congress) JACKSON, JESSE L., Jr. Democrat; Illinois, 2 nd District. Elected to the 104 th Congress in a special election to fill the vacancy caused by the resignation of Mel Reynolds; reelected to the 105 th -113 th Congress, but declined to serve in the 113 th Congress (served Dec. 14, 1995, until his resignation Nov. 21, 2012). Committee assignments: H. Banking and Financial Services (104 th -105 th Congresses) H. Small Business (104 th -105 th Congresses) H. Appropriations (106 th -112 th Congresses) JACKSON LEE, SHEILA. Democrat; Texas, 18 th District. Elected to the 104 th -116 th Congresses (served Jan. 3, 1995-present). Committee assignments: H. Judiciary (104 th -116 th Congresses) H. Science (104 th -109 th Congresses) H. Homeland Security (108 th -116 th Congresses) H. Foreign Affairs (110 th -111 th Congresses) H. Budget (116 th Congress) JEFFERSON, WILLIAM JENNINGS. Democrat; Louisiana, 2 nd District. Elected to the 102 nd -110 th Congresses (served Jan. 3, 1991-Jan. 3, 2009). Committee assignments: H. Education and Labor (102 nd Congress) H. Merchant Marine and Fisheries (102 nd Congress) H. District of Columbia (103 rd Congress) H. Ways and Means (103 rd , 105 th -109 th Congresses) H. National Security (104 th Congress) H. House Oversight (104 th Congress) H. Budget (109 th Congress) H. Small Business (110 th Congress) Jt. Printing (104 th Congress) JEFFRIES, HAKEEM. Democrat; New York, 8 th District. Elected to the 113 th -116 th Congresses (served Jan. 3, 2013-present). Committee assignments: H. Budget (113 th -116 th Congresses) H. Education and the Workforce (114 th Congress) H. Judiciary (113 th -116 th Congresses) JOHNSON, EDDIE BERNICE. Democrat; Texas, 30 th District. Elected to the 103 rd -116 th Congresses (served Jan. 3, 1993-present). Chair of the Congressional Black Caucus, 107 th Congress. Committee assignments: H. Public Works and Transportation (103 rd Congress) H. Science, Space, and Technology/Science and Technology (103 rd -116 th Congresses; ranking member, 112 th -115 th Congresses; chair, 116 th Congress) H. Transportation and Infrastructure (104 th -116 th Congresses) JOHNSON, HENRY C. (HANK), Jr. Democrat; Georgia, 4 th District. Elected to the 110 th -116 th Congresses (served Jan. 4, 2007-present). Committee assignments: H. Armed Services (110 th -114 th Congresses) H. Judiciary (110 th -116 th Congresses) H. Small Business (110 th Congress) H. Transportation and Infrastructure (115 th -116 th Congresses) JONES, BRENDA. Democrat; Michigan, 13 th District. Elected to the 115 th Congress in a Nov. 6, 2018 special election to fill vacancy caused by resignation of John Conyers (served Nov. 29, 2018-Jan. 3, 2019). No committee assignments listed. JONES, STEPHANIE TUBBS. Democrat; Ohio, 11 th District. Elected to the 106 th -110 th Congresses (served Jan. 3, 1999, until her death on August 20, 2008). Committee assignments: H. Banking and Financial Services (106 th Congress) H. Financial Services (107 th Congress) H. Small Business (106 th -107 th Congresses) H. Standards of Official Conduct (107 th -110 th Congresses; chair, 110 th Congress) H. Ways and Means (108 th -110 th Congresses) JORDAN, BARBARA C. Democrat; Texas, 18 th District. Elected to the 93 rd -95 th Congresses (served Jan. 3, 1973-Jan. 3, 1979). Committee assignments: H. Judiciary (93 rd -95 th Congresses) H. Government Operations (94 th -95 th Congresses) KELLY, ROBIN. Democrat; Illinois, 2 nd District. Elected to the 113 th Congress in an April 9, 2013, special election to vacancy caused by resignation of Jesse Jackson Jr.; reelected to the 114 th -116 th Congresses (served April 11, 2013-present). Committee assignments: H. Oversight and Government Reform/Oversight and Reform (113 th -116 th Congresses) H. Science, Space, and Technology (113 th Congress) H. Foreign Affairs (114 th -115 th Congresses) H. Energy and Commerce (116 th Congress) KILPATRICK, CAROLYN CHEEKS. Democrat; Michigan, 15 th District (105 th -107 th Congresses) and 13 th District (108 th -111 th Congresses). Elected to the 105 th -111 th Congresses (served Jan. 3, 1997-Jan. 3, 2011). Chair of the Congressional Black Caucus, 110 th Congress. Committee assignments: H. Banking and Financial Services (105 th Congress) H. House Oversight (105 th Congress) Jt. Library (105 th Congress) H. Appropriations (106 th -111 th Congresses) LANGSTON, JOHN MERCER. Republican; Virginia, 4 th District. Elected to the 51 st Congress (served from September 23, 1890-March 3, 1891, after he successfully contested the election of Edward Venable). Committee assignments: H. Education (51 st Congress) LAWRENCE, BRENDA L. Democrat; Michigan, 14 th District. Elected to the 114 th -116 th Congress (served Jan. 3, 2015-present). Committee assignments: H. Oversight and Government Reform/Oversight and Reform (114 th -116 th Congresses) H. Small Business (114 th Congress) H. Transportation and Infrastructure (115 th Congress) H. Appropriations (116 th Congress) LAWSON, ALFRED, Jr. Democrat; Florida, 3 rd District. Elected to the 115 th -116 th Congresses (served Jan. 3, 2017-present). Committee assignments: H. Agriculture (115 th -116 th Congresses) H. Small Business (115 th Congress) H. Financial Services (116 th Congress) LEE, BARBARA. Democrat; California, 9 th District (105 th -112 th Congresses); 13 th District (113 th -116 th Congresses). Elected to the 105 th Congress in an April 7, 1998, special election to fill vacancy caused by resignation of Ronald Dellums; reelected to the 106 th -116 th Congresses (served April 20, 1998-present). Chair of the Congressional Black Caucus, 111 th Congress. Committee assignments: H. Banking and Financial Services (105 th -106 th Congresses) H. Financial Services (107 th -109 th Congresses) H. Science (105 th Congress) H. International Relations/Foreign Affairs (107 th -111 th Congresses) H. Appropriations (110 th -116 th Congresses) H. Budget (113 th -116 th Congresses) LELAND, GEORGE THOMAS (Mickey). Democrat; Texas, 18 th District. Elected to the 96 th -101 st Congresses (served Jan. 3, 1979, until his death Aug. 7, 1989). Chair of the Congressional Black Caucus, 99 th Congress. Committee assignments: H. District of Columbia (96 th -99 th Congresses) H. Interstate and Foreign Commerce (96 th -101 st Congresses) H. Post Office and Civil Service (96 th -101 st Congresses) H. Select Hunger (98 th -101 st Congress; chair, 98 th -101 st Congresses) H. Select Children, Youth, and Families (98 th Congress) LEWIS, JOHN R. Democrat; Georgia, 5 th District. Elected to the 100 th -116 th Congresses (served Jan. 6, 1987-present). Committee assignments: H. Public Works and Transportation (100 th -102 nd Congresses) H. Interior and Insular Affairs (100 th -102 nd Congresses) H. Select Aging (101 st -102 nd Congresses) H. District of Columbia (103 rd Congress) H. Ways and Means (103 rd -116 th Congresses) H. Budget (108 th Congress) Jt. Taxation (115 th Congress) LONG, JEFFERSON FRANKLIN. Republican; Georgia, 4 th District. Elected to the 41 st Congress after the House declared that Rep. Samuel Gove was not entitled to the seat (served Jan. 16, 1871-March 3, 1871). No committee assignments listed. LOVE, MIA B. Republican; Utah, 4 th District. Elected to the 114 th -115 th Congresses (served Jan. 3, 2015-Jan. 3, 2019). Committee assignment: H. Financial Services (114 th -115 th Congresses) LYNCH, JOHN ROY. Republican; Mississippi, 6 th District. Elected to the 43 rd , 44 th , and 47 th Congresses (served March 4, 1873-March 3, 1877 and April 29, 1882-March 3, 1883 after he successfully contested the election of James Chalmers). Committee assignments: H. Mines and Mining (43 rd -44 th Congresses) H. Militia (47 th Congress) H. Education and Labor (47 th Congress) MAJETTE, DENISE L. Democrat; Georgia, 4 th District. Elected to the 108 th Congress (served Jan. 3, 2003-Jan. 3, 2005). Committee assignments: H. Budget (108 th Congress) H. Education and the Workforce (108 th Congress) H. Small Business (108 th Congress) MCBATH, LUCY. Â  Democrat; Georgia, 6 th Â  District. Elected to the 116 th Â Congress (served Jan. 3, 2019-present). Committee assignments: H. Judiciary (116 th Â  Congress) H. Education and Labor (116 th Â Congress) MCEACHIN, ASTON DONALD. Democrat; Virginia, 4 th District. Elected to the 115 th -116 th Congresses (served Jan. 3, 2017-present). Committee assignments: H. Armed Services (115 th Congress) H. Natural Resources (115 th -116 th Congresses) H. Energy and Commerce (116 th Congress) H. Select Committee on the Climate Crisis (116 th Congress) MCKINNEY, CYNTHIA. Democrat; Georgia, 11 th District (103 rd -104 th Congresses) and 4 th District (105 th -107 th Congress and 109 th Congress). Elected to the 103 rd -107 th Congresses and to the 109 th Congress (served Jan. 3, 1993-Jan. 3, 2003; Jan. 3, 2005-Jan. 3, 2007). Committee assignments: H. Agriculture (103 rd -104 th Congresses) H. Banking and Finance (104 th -105 th Congresses) H. Foreign Affairs/International Relations (103 rd -107 th Congresses) H. Armed Services/National Security (105 th -107 th Congresses; 109 th Congress) H. Budget (109 th Congress) MEEK, CARRIE. Democrat; Florida, 17 th District. Elected to the 103 rd -107 th Congresses (served Jan. 3, 1993-Jan. 3, 2003). Committee assignments: H. Appropriations (103 rd Congress; 105 th -107 th Congresses) H. Budget (104 th Congress) H. Government Reform and Oversight (104 th Congress) MEEK, KENDRICK B. Democrat; Florida, 17 th District. Elected to the 108 th -111 th Congresses (served from Jan. 7, 2003-Jan. 3, 2011). Committee assignments: H. Armed Services (108 th -111 th Congresses) H. Homeland Security (108 th -109 th Congresses) H. Ways and Means (110 th -111 th Congresses) MEEKS, GREGORY W. Democrat; New York, 5 th District. Elected to the 105 th Congress in a Feb. 3, 1998, special election to fill vacancy caused by the resignation of Floyd Flake; reelected to 106 th -116 th Congresses (served Feb. 3, 1998-present). Committee assignments: H. Banking and Financial Services/Financial Services (105 th -116 th Congresses) H. International Relations/Foreign Affairs (106 th -116 th Congresses) METCALFE, RALPH HAROLD. Democrat; Illinois, 1 st District. Elected to the 92 nd -95 th Congresses (served Jan. 3, 1971, until his death October 10, 1978). Committee assignments: H. Interstate and Foreign Commerce (92 nd -95 th Congresses) H. Merchant Marine and Fisheries (92 nd -95 th Congresses) H. Post Office and Civil Service (95 th Congress) MFUME, KWEISI. Democrat; Maryland, 7 th District. Elected to the 100 th -104 th Congresses (served Jan. 6, 1987, until his resignation on Feb. 16, 1996). Chair of the Congressional Black Caucus, 103 rd Congress. Committee assignments: H. Banking, Finance, and Urban Affairs/Banking and Financial Services (100 th -104 th Congresses) H. Small Business (100 th -104 th Congresses) H. Education and Labor (101 st Congress) H. Select Narcotics Abuse and Control (101 st -102 nd Congresses) Jt. Economic (102 nd -104 th Congresses) H. Standards of Official Conduct (103 rd Congress) H. Select Hunger (100 th Congress) MILLENDER-McDONALD, JUANITA. Democrat; California, 37 th District. Elected to the 104 th Congress in a March 26, 1996, special election to fill vacancy caused by resignation of Walter Tucker; reelected to the 105 th -110 th Congresses (served April 16, 1996, until her death April 22, 2007). Committee assignments: H. Small Business (104 th -110 th Congresses) H. Transportation and Infrastructure (104 th -110 th Congresses) H. Administration (108 th -110 th Congresses; ranking member, 109 th Congress; chair, 110 th Congress) Jt. Library (108 th -110 th Congresses) Jt. Printing (109 th -110 th Congresses) MILLER, THOMAS EZEKIEL. Republican; South Carolina, 7 th District. Elected to the 51 st Congress (served Sept. 24, 1890-March 3, 1891, after successfully contesting the election of William Elliott). Committee assignments: H. Library of Congress (51 st Congress) MITCHELL, ARTHUR WERGS. Democrat; Illinois, 1 st District. Elected to the 74 th -77 th Congresses (served Jan. 3, 1935-Jan. 3, 1943). Committee assignments: H. Post Office and Post Roads (74 th -77 th Congresses) MITCHELL, PARREN JAMES. Democrat; Maryland, 7 th District. Elected to the 92 nd -99 th Congresses (served Jan. 3, 1971-Jan. 3, 1987). Chair of the Congressional Black Caucus, 95 th Congress. Committee assignments: H. Banking and Currency/Banking, Finance and Urban Affairs (92 nd -99 th Congresses) H. Select Small Business (92 nd -93 rd Congresses) H. Small Business (94 th , 96 th -99 th Congresses; chair, 97 th -99 th Congresses) H. Budget (93 rd -95 th Congresses) Jt. Defense Production (94 th -95 th Congresses) Jt. Economic (95 th -99 th Congresses; vice chair, 95 th Congress) MOORE, GWENDOLYNNE (GWEN). Democrat; Wisconsin, 4 th District. Elected to the 109 th - 116 th Congresses (served Jan. 3, 2005-present). Committee assignments: H. Financial Services (109 th -115 th Congresses) H. Small Business (109 th -111 th Congresses) H. Budget (110 th -114 th Congresses) H. Ways and Means (116 th Congress) MOSELEY-BRAUN, CAROL. Democrat; Illinois, Senator. Elected in 1992 (served Jan. 3, 1993-Jan. 3, 1999). Committee assignments: S. Banking, Housing, and Urban Affairs (103 rd -105 th Congresses) S. Judiciary (103 rd Congress) S. Small Business (103 rd Congress) S. Finance (104 th -105 th Congresses) S. Special Aging (104 th -105 th Congresses) MURRAY, GEORGE WASHINGTON. Republican; South Carolina, 1 st District. Elected to the 53 rd -54 th Congresses (served March 4, 1893-March 3, 1895, and June 4, 1896-March 3, 1897, after successfully contesting the election). Committee assignments: H. Education (53 rd -54 th Congresses) H. Expenditures in the Department of the Treasury (54 th Congress) NASH, CHARLES EDMUND. Republican; Louisiana, 6 th District. Elected to the 44 th Congress (served March 4, 1875-March 3, 1877). Committee assignments: H. Education and Labor (44 th Congress) NEGUSE, JOE. Democrat; Colorado, 2 nd District. Elected to the 116 th Congress (served Jan. 3, 2019-present). Committee assignments: H. Judiciary (116 th Congress) H. Natural Resources (116 th Congress) H. Select Committee on the Climate Crisis (116 th Congress) NIX, ROBERT NELSON CORNELIUS, Sr. Democrat; Pennsylvania, 4 th District (85 th -87 th Congresses); 2 nd District (88 th -95 th Congresses). Elected to the 85 th -95 th Congresses (served June 4, 1958-Jan. 3, 1979). Committee assignments: H. Merchant Marine and Fisheries (85 th -86 th Congresses) H. Foreign Affairs (87 th -93 rd Congresses) H. International Relations (94 th -95 th Congresses) H. Veterans' Affairs (85 th -86 th Congresses) H. Post Office and Civil Service (88 th -95 th Congresses; chair, 95 th Congress) H. Select Standards and Conduct (89 th Congress) H. Crime (91 st Congress) NORTON, ELEANOR HOLMES. Democrat; Delegate from the District of Columbia. Elected to the 102 nd -116 th Congresses (served Jan. 3, 1991-present). Committee assignments: H. District of Columbia (102 nd -103 rd Congresses) H. Post Office and Civil Service (102 nd -103 rd Congresses) H. Public Works and Transportation/Transportation and Infrastructure (102 nd -116 th Congresses) Jt. Committee on the Organization of Congress (103 rd Congress) H. Small Business (104 th Congress) H. Oversight and Government Reform/Government Reform/Oversight and Reform (104 th -116 th Congresses) H. Homeland Security (108 th -111 th Congresses) OBAMA, BARACK. Democrat; Illinois. Senator. Elected in 2004 (served Jan. 4, 2005, until his resignation Nov. 16, 2008, after being elected President of the United States). Committee assignments: S. Environment and Public Works (109 th -110 th Congresses) S. Foreign Relations (109 th -110 th Congresses) S. Veterans' Affairs (109 th -110 th Congresses) S. Health, Education, Labor and Pensions (110 th Congress) S. Homeland Security and Governmental Affairs (110 th Congress) O'HARA, JAMES EDWARD. Republican; North Carolina, 2 nd District. Elected to the 48 th -49 th Congresses (served March 4, 1883-March 3, 1887). Committee assignments: H. Mines and Mining (48 th Congress) H. Expenditures on Public Buildings (49 th Congress) H. Invalid Pensions (49 th Congress) OMAR, ILHAN. Â  Democrat; Minnesota, 5 th Â District. Elected to the 116 th Â  Congress (served Jan. 3, 2019-present). Committee assignments: H. Budget (116 th Â Congress) H. Foreign Affairs (116 th Â Congress) H. Education and Labor (116 th Â Congress) OWENS, MAJOR ROBERT ODELL. Democrat; New York, 11 th District. Elected to the 98 th -110 th Congresses (served Jan. 3, 1983-Jan. 3, 2007). Committee assignments: H. Education and Labor/Economic and Educational Opportunities/Education and the Workforce (98 th -109 th Congresses) H. Government Operations/Reform and Oversight (98 th -109 th Congresses) PAYNE, DONALD MILFORD, Sr. Democrat; New Jersey, 10 th District. Elected to the 101 st -112 th Congresses (served Jan. 3, 1989, until his death March 6, 2012). Chair of the Congressional Black Caucus, 104 th Congress. Committee assignments: H. Education and Labor/Economic and Educational Opportunities/Education and the Workforce (101 st -112 th Congresses) H. Foreign Affairs/International Relations (101 st -112 th Congress) H. Government Operations (101 st -103 rd Congresses) PAYNE, DONALD MILFORD, Jr. Democrat; New Jersey, 10 th District. Elected to the 112 th Congress Nov. 6, 2012, to fill vacancy caused by death of his father Donald Payne Sr.; simultaneously elected to the 113 th Congress; reelected to the 114 th -116 th Congresses (served Nov. 6, 2012-present). Committee assignments: H. Homeland Security (113 th -116 th Congresses) H. Small Business (113 th -114 th Congresses) H. Transportation and Infrastructure (115 th -116 th Congresses) PLASKETT, STACEY E. Democrat; Delegate from the U.S. Virgin Islands. Elected to the 114 th - 116 th Congresses (served Jan. 3, 2015-present). Committee assignments: H. Agriculture (114 th -116 th Congresses) H. Oversight and Government Reform/Oversight and Reform (114 th -116 th Congresses) H. Transportation and Infrastructure (116 th Congress) POWELL, ADAM CLAYTON, Jr. Democrat; New York, 22 nd District (79 th -82 nd Congresses); 16 th District (83 rd -87 th Congresses); 18 th District (88 th -89 th and 91 st Congresses). Elected to the 79 th -90 th Congress, but was not seated in the 90 th Congress; and to the 91 st Congress (served Jan. 3, 1945-Jan. 3, 1967, and Jan. 3, 1969-Jan. 3, 1971). Committee assignments: H. Indian Affairs (79 th Congress) H. Invalid Pensions (79 th Congress) H. Labor/Education and Labor (79 th -89 th and 91 st Congresses; chair, 87 th -89 th Congresses) H. Interior and Insular Affairs (84 th -86 th Congresses) PRESSLEY, AYANNA. Â  Democrat; Massachusetts, 7 th Â  District. Elected to the 116 th Â Congress (served Jan. 3, 2019-present). Committee assignments: H. Oversight and Reform (116 th Â Congress) H. Financial Services (116 th Â  Congress) RAINEY, JOSEPH HAYNE. Republican; South Carolina, 1 st District. Elected to the 41 st Congress after the seat declared vacant, and to the 42 nd -45 th Congresses (served Dec. 12, 1870- March 3, 1879). Committee assignments: H. Freedmen's Affairs (41 st -42 nd Congresses) H. Indian Affairs (43 rd Congress) H. Invalid Pensions (44 th -45 th Congresses) H. Select Celebration of Proposed National Census of 1875 (43 rd Congress) RANGEL, CHARLES B. Democrat; New York, 18 th District (92 nd Congress); 19 th District (93 rd -97 th Congresses); 16 th District (98 th -102 nd Congresses); 15 th District (103 rd -112 th Congresses); 13 th District (113 th -114 th Congresses). Elected to the 92 nd -114 th Congresses (served Jan. 3, 1971-Jan. 3, 2017). Chair of the Congressional Black Caucus, 94 th Congress. Committee assignments: H. Public Works (92 nd Congress) H. Science and Astronautics (92 nd Congress) H. Judiciary (92 nd -93 rd Congresses) H. District of Columbia (93 rd Congress) H. Ways and Means (94 th -114 th Congresses; committee chair, 110 th -111 th Congresses; ranking Member, 105 th -109 th Congresses) H. Select Crime (92 nd -93 rd Congresses) H. Select Narcotics Abuse and Control (94 th -102 nd Congresses; chair, 98 th -102 nd Congresses) Jt. Taxation (104 th -105 th , 108 th , 111 th , and 114 th Congresses; chair, 111 th Congress) RANSIER, ALONZO JACOB. Republican; South Carolina, 2 nd District. Elected to the 43 rd Congress (served March 3, 1873-March 3, 1875). Committee assignments: H. Manufactures (43 rd Congress) RAPIER, JAMES THOMAS. Republican; Alabama, 2 nd District. Elected to the 43 rd Congress (served March 4, 1873-March 3, 1875). Committee assignments: H. Education and Labor (43 rd Congress) REVELS, HIRAM RHODES. Republican; Mississippi, Senator. Elected in 1870 (served Feb. 23, 1870-March 3, 1871). Committee assignments: S. Education and Labor (41 st Congress) S. District of Columbia (41 st Congress) REYNOLDS, MEL . Democrat; Illinois, 2 nd District. Elected to the 103 rd -104 th Congresses (served Jan. 5, 1993, until his resignation October 1, 1995). Committee assignments: H. Ways and Means (103 rd Congress) H. Economic and Education Opportunities (104 th Congress) RICHARDSON, LAURA. Democrat, California, 37 th District. Elected to the 110 th Congress in an August 21, 2007, special election to fill vacancy caused by death of Juanita Millender-McDonald; reelected to the 111 th -112 th Congresses (served Sept. 4, 2007, to Jan. 3, 2013). Committee assignments: H. Science and Technology (110 th Congress) H. Transportation and Infrastructure (110 th -112 th Congresses) H. Homeland Security (111 th -112 th Congresses) RICHMOND, CEDRIC. Democrat; Louisiana, 2 nd District. Elected to the 112 th -116 th Congresses (served Jan. 3, 2011-present). Chair of the Congressional Black Caucus, 115 th Congress. Committee assignments: H. Judiciary (113 th -116 th Congresses) H. Homeland Security (112 th -116 th Congresses) H. Small Business (112 th Congress) RUSH, BOBBY L. Democrat; Illinois, 1 st District. Elected to the 103 rd -116 th Congresses (served Jan. 4, 1993-present). Committee assignments: H. Banking, Finance and Urban Affairs (103 rd Congress) H. Government Operations (103 rd Congress) H. Science, Space and Technology (103 rd Congress) H. Commerce/Energy and Commerce (104 th -116 th Congresses) SAVAGE, GUS. Democrat; Illinois. 2 nd District. Elected to the 97 th -102 nd Congresses (served Jan. 3, 1981-Jan. 3, 1993). Committee assignments: H. Post Office and Civil Service (97 th Congress) H. Public Works and Transportation (97 th -102 nd Congresses) H. Small Business (97 th -102 nd Congresses) SCOTT, DAVID. Democrat; Georgia, 13 th District. Elected to the 108 th -116 th Congresses (served Jan. 7, 2003-present). Committee assignments: H. Agriculture (108 th -116 th Congresses) H. Financial Services (108 th -116 th Congresses) H. Foreign Affairs (111 th Congress) SCOTT, ROBERT C . \"Bobby\" . Democrat; Virginia, 3 rd District. Elected to the 103 rd -116 th Congresses (served Jan. 4, 1993-present). Committee assignments: H. Education and Labor/Economic and Educational Opportunities/Education and the Workforce (103 rd -107 th , 109 th -116 th Congresses; chair, 116 th Congress) H. Judiciary (103 rd -113 th Congresses) H. Science, Space, and Technology (103 rd Congress) H. Select U.S. National Security and Military/Commercial Concerns with the People's Republic of China (106 th Congress) H. Budget (108 th , 110 th , 116 th Congresses) H. Standards of Official Conduct (110 th Congress) Jt. Select Solvency of Multiemployer Pension Plans (115 th Congress) SCOTT, TIM. Republican; South Carolina, 1 st District, Senator. Elected to the 112 th Congress (served in House Jan. 3, 2011, until his resignation Jan. 2, 2013). Appointed to the Senate in January 2013 to fill the vacancy caused by the resignation of Jim DeMint; reelected to the remainder of the term in 2014 and to a full term in 2016 (served in Senate Jan. 3, 2013-present). Committee assignments: H. Rules (112 th Congress) S. Armed Services (115 th Congress) S. Banking, Housing and Urban Affairs (114 th -116 th Congresses) S. Commerce, Science and Transportation (113 th Congress) S. Energy and Natural Resources (113 th Congress) S. Finance (114 th -116 th Congresses) S. Health, Education, Labor and Pensions (113 th -116 th Congresses) S. Small Business and Entrepreneurship (113 th -116 th Congresses) S. Special Aging (113 th -116 th Congresses) SEWELL, TERRYCINA (\"TERRI\"). Democrat; Alabama, 7 th District. Elected to the 112 th - 116 th Congresses (served Jan. 3, 2011-present). Committee assignments: H. Agriculture (112 th Congress) H. Science, Space and Technology (112 th Congress) H. Financial Services (113 th -114 th Congresses) H. Intelligence (113 th -116 th Congresses) H. Ways and Means (115 th -116 th Congresses) SMALLS, ROBERT. Republican; South Carolina, 7 th District. Elected to the 44 th -45 th and 47 th -49 th Congresses (served March 4, 1875-March 3, 1879; July 19, 1992-March 3, 1883, after he successfully contested the reelection of George Tillman, and March 18, 1884-March 3, 1887, after he was elected to fill the vacancy caused by the death of Edmund Mackey). Committee assignments: H. Agriculture (44 th , 47 th Congresses) H. Militia (45 th Congress) H. Manufactures (48 th Congress) H. War Claims (49 th Congress) STEWART, BENNETT MCVEY. Democrat; Illinois, 1 st District. Elected to the 96 th Congress. (served Jan. 3, 1979-Jan. 3, 1981) Committee assignments: H. Appropriations (96 th Congress) STOKES, LOUIS. Democrat; Ohio, 21 st District (91 st -102 nd Congresses); 11 th District (103 rd -105 th Congresses). Elected to the 91 st -105 th Congresses (served Jan. 3, 1969 to Jan. 3, 1999). Chair of the Congressional Black Caucus, 93 rd Congress. Committee assignments: H. Education and Labor (91 st Congress) H. Internal Security (91 st Congress) H. Appropriations (92 nd -105 th Congress) H. Budget (95 th -96 th Congresses) H. Standards of Official Conduct (96 th -98 th and 102 nd Congresses; chair, 97 th -98 th and 102 nd Congresses) H. Select Assassinations (94 th -95 th Congresses; chair, 95 th Congress) H. Select Intelligence (98 th -100 th Congresses) H. Select to Investigate Arms Transactions to Iran (100 th Congress) THOMPSON, BENNIE. Democrat; Mississippi, 2 nd District. Elected to the 103 rd Congress in an April 13, 1993, special election to fill the vacancy caused by the resignation of Mike Espy; reelected to the 104 th -116 th Congresses (served April 13, 1993-present). Committee assignments: H. Agriculture (103 rd -108 th Congresses) H. Merchant Marine and Fisheries (103 rd Congress) H. Small Business (103 rd -104 th Congresses) H. Budget (105 th -107 th Congresses) H. Homeland Security (108 th -116 th Congresses; chair 110 th -111 th Congresses; ranking Member, 112 th -115 th Congresses; chair, 116 th Congress) TOWNS, EDOLPHUS. Democrat; New York, 11 th District (98 th -102 nd Congresses); 10 th District (103 rd -112 th Congresses). Elected to the 98 th -112 th Congresses (served Jan. 3, 1983-Jan. 23, 2013). Chair of the Congressional Black Caucus, 102 nd Congress. Committee assignments: H. Government Operations/Government Reform and Oversight/Oversight and Government Reform (98 th -112 th Congresses; chair, 111 th Congress) H. Public Works and Transportation (98 th -104 th Congresses) H. Energy and Commerce/Commerce (101 st -110 th and 112 th Congresses) H. Select Narcotics Abuse and Control (98 th -102 nd Congresses) TUCKER, WALTER R., III. Democrat; California, 37 th District. Elected to the 103 rd -104 th Congresses (served Jan. 5, 1993, until his resignation on December 15, 1995). Committee assignments: H. Public Works and Transportation/Transportation and Infrastructure (103 rd - 104 th Congresses) H. Small Business (103 rd -104 th Congresses) TURNER, BENJAMIN STERLING. Republican; Alabama, 1 st District. Elected to the 42 nd Congress (served March 4, 1871-March 3, 1873). Committee assignments: H. Invalid Pensions (42 nd Congress) UNDERWOOD, LAUREN. Â  Democrat; Illinois, 14 th Â District. Elected to the 116 th Â  Congress (served Jan. 3, 2019-present). Committee assignments: H. Homeland Security (116 th Â Congress) H. Veterans' Affairs (116 th Â Congress) H. Education and Labor (116 th Â  Congress) VEASEY, MARC. Democrat; Texas, 33 rd District. Elected to 113 th -116 th Congresses (served Jan. 3, 2015-present). Committee assignments: H. Armed Services (113 th -115 th Congresses) H. Science, Space and Technology (113 th -115 th Congresses) H. Energy and Commerce (116 th Congress) H. Small Business (116 th Congress) WALDON, ALTON R., Jr. Democrat; New York, 6 th District. Elected to the 99 th Congress in a June 10, 1986, special election to fill the vacancy caused by the death of Joseph P. Addabbo (served July 29, 1986-Jan. 3, 1987). Committee assignments: H. Education and Labor (99 th Congress) WALLS, JOSIAH THOMAS. Republican; Florida, At-Large (42 nd and 43 rd Congresses); 2 nd District (44 th Congress). Elected to the 42 nd -44 th Congresses (served March 4, 1871-Jan. 29, 1873, when his election was successfully contested; March 4, 1873-March 3, 1875; and March 4, 1875-April 19, 1876, when his election was successfully contested). Committee assignments: H. Militia (42 nd -43 rd Congresses) H. Mileage (44 th Congress) WASHINGTON, CRAIG ANTHONY. Democrat; Texas, 18 th District. Elected to the 101 st Congress in a Dec. 9, 1989, special election to fill the vacancy caused by the death of Mickey Leland; reelected to the 102 nd -103 rd Congresses (served Dec. 9, 1989-Jan. 3, 1995). Committee assignments: H. Education and Labor (101 st -102 nd Congresses) H. Judiciary (101 st -103 rd Congresses) H. Energy and Commerce (103 rd Congress) H. Government Operations (103 rd Congress) H. Select Committee on Narcotics Abuse and Control (102 nd Congress) WASHINGTON, HAROLD. Democrat; Illinois, 1 st District. Elected to the 97 th -98 th Congresses (served Jan. 3, 1981, until his resignation April 29, 1983). Committee assignments: H. Government Operations (97 th Congress) H. Education and Labor (97 th -98 th Congresses) H. Judiciary (97 th -98 th Congresses) WATERS, MAXINE. Democrat; California, 29 th District (102 nd Congress), 35 th District (103 rd - 112 th Congresses), and 43 rd District (113 th Congress-present). Elected to the 102 nd -116 th Congresses (served Jan. 3, 1991-present). Chair, Congressional Black Caucus, 105 th Congress. Committee assignments: H. Banking, Finance, and Urban Affairs/Banking and Financial Services/Financial Services (102 nd -116 th Congresses; ranking member, 113 th -115 th Congresses; chair, 116 th Congress) H. Veterans' Affairs (102 nd -104 th Congresses) H. Small Business (103 rd -104 th Congresses) H. Judiciary (105 th -112 th Congresses) WATSON, DIANE. Democrat; California, 32 nd District (107 th Congress) and 33 rd District (108 th - 111 th Congresses). Elected to the 107 th Congress in a June 5, 2001, special election to fill vacancy caused by death of Julian Dixon; reelected to the 108 th -111 th Congresses (served June 7, 2001-Jan. 3, 2011). Committee assignments: H. Government Reform/Oversight and Government Reform (107 th -111 th Congresses) H. International Relations/Foreign Affairs (107 th -111 th Congresses) WATSON COLEMAN, BONNIE. Democrat; New Jersey, 12 th District. Elected to the 114 th -116 th Congresses (served Jan. 3, 2015-present). Committee assignments: H. Homeland Security (114 th -116 th Congresses) H. Oversight and Government Reform (114 th -115 th Congresses) H. Appropriations (116 th Congress) WATT, MELVIN L. Democrat; North Carolina, 12 th District. Elected to the 103 rd -113 th Congresses (served Jan. 5, 1993, until his resignation Jan. 6, 2014). Chair of the Congressional Black Caucus, 109 th Congress. Committee assignments: H. Banking, Finance, and Urban Affairs/Banking and Financial Services/ Financial Services (103 rd -113 th Congresses) H. Post Office and Civil Service (103 rd Congress) H. Judiciary (103 rd -113 th Congresses) Jt. Economic (107 th -108 th Congresses) WATTS, JULIUS CAESAR, Jr . (J.C.) Republican; Oklahoma, 4 th District. Elected to the 104 th -107 th Congresses (served Jan. 3, 1995-Jan. 3, 2003). Committee assignments: H. Banking and Financial Services (104 th Congress) H. National Security (104 th -105 th Congress) H. Transportation and Infrastructure (105 th -106 th Congresses) H. Armed Services (106 th -107 th Congresses) WEST, ALLEN Republican; Florida, 22 nd District. Elected to the 112 th Congress (served Jan, 3, 2011-Jan. 3, 2013). Committee assignments: H. Armed Services (112 th Congress) H. Small Business (112 th Congress) WHEAT, ALAN DUPREE. Democrat; Missouri, 5 th District. Elected to the 98 th -103 rd Congresses (served Jan. 3, 1983-Jan. 3, 1995). Committee assignments: H. District of Columbia (98 th -103 rd Congresses) H. Rules (98 th -103 rd Congresses) H. Select Children, Youth, and Families (98 th -102 nd Congresses) H. Select Hunger (101 st -102 nd Congresses) WHITE, GEORGE HENRY. Republican; North Carolina, 2 nd District. Elected to the 55 th -56 th Congresses (served March 4, 1897-March 3, 1901). Committee assignments: H. Agriculture (55 th Congress) H. District of Columbia (55 th -56 th Congresses) WILSON, FREDERICA. Democrat; Florida, 17 th District (112 th Congress), 24 th District (113 th Congress-present). Elected to the 112 th -116 th Congresses (served Jan. 3, 2011-present). Committee assignments: H. Foreign Affairs (112 th Congress) H. Science, Space and Technology (112 th -113 th Congresses) H. Education and the Workforce (114 th -116 th Congresses) H. Transportation and Infrastructure (115 th -116 th Congresses) WYNN, ALBERT RUSSELL. Democrat; Maryland, 4 th District. Elected to the 103 rd -110 th Congresses (served Jan. 5, 1993-May 31, 2008). Committee assignments: H. Banking, Finance, and Urban Affairs/Banking and Financial Services (103 rd -104 th Congresses) H. Foreign Affairs/International Relations (103 rd -104 th Congresses) H. Post Office and Civil Service (103 rd Congress) H. Commerce/Energy and Commerce (105 th -110 th Congresses) YOUNG, ANDREW JACKSON, Jr. Democrat; Georgia, 5 th District. Elected to the 93 rd -95 th Congresses (served Jan. 3, 1973, until his resignation on Jan. 29, 1977). Committee assignments: H. Banking, Currency and Housing (93 rd Congress) H. Rules (94 th Congress)", "summary": "In total, 162 African Americans have served in Congress. This total includes 152 African Americans (146 Representatives and 6 Delegates) elected only to the House of Representatives; 9 African Americans elected or appointed only to the Senate; and 1 African American who has served in both chambers. The first African American Members, Senator Hiram Revels of Mississippi and Representative Joseph Rainey of South Carolina, both took the oath of office in 1870. These first two Members were among the 22 African American Members (2 in the Senate, 20 in the House) who began their service in the period of time after the Civil War but prior to the start of the 20 th century. After these first 22, the presence of African Americans in the membership of Congress was not continuous, and there were subsequent periods in both chambers with no African American Members. Most recently, the 116 th Congress began with the highest number of African American Members ever at the start of a Congress: 57 (52 Representatives, 2 Delegates, and 3 Senators). Other information in this report includes the following: Numbers of African Americans who have served in Congress by party and type of service; Numbers of African Americans who have served in each Congress since 1870; Numbers of African Americans who have served in the House and Senate by state, district, or territory; Means of entry to Congress, including regular elections, special elections, and appointments; Brief background and selected data on the Congressional Black Caucus (CBC); Lists of selected \"firsts\" for African Americans in Congress; Lists of the African Americans who have served in leadership; Records for length of service in the House and Senate; and Lists of the African American women in the 116 th Congress.", "document_type": "crs"}
{"report": "Digital assets are assets issued and transferred using distributed ledger or blockchain technology. They are often referred to as crypto-asset , digital token , or cryptocurrenc y , among other terminology. Digital assets can be securities, currencies, or commodities. Although market participants use different terms to describe them, financial regulators have stated thatâregardless of what they are calledâfinancial activities, services, and market participants must adhere to applicable laws and regulations. In the case of digital assets, depending on their characteristics, this can include securities laws and regulations. One key difference between digital and traditional assets is an asset's ownership and exchanges of ownership. Whereas traditional assets are generally recorded in private ledgers maintained by central intermediaries, digital assets' ownership and exchange are generally recorded on a decentralized digital ledger. The Securities and Exchange Commission (SEC) is the primary regulator overseeing securities offers, sales, and investment activities, including those involving digital assets. However, not all digital assets are securities. In general, a security is \"the investment of money in a common enterprise with a reasonable expectation of profits to be derived from the efforts of others.\" When a digital asset meets the criteria defining a security, it would be subject to securities regulation. For example, most of the initial coin offerings (ICOs) are securities, but Bitcoin is not a security, mainly because it does not have a central third-party common enterprise. Market intermediaries (e.g., investment advisers, trading platforms, and custodians) involved with digital asset investment, trading, and safekeeping could also be subject to relevant securities regulation. Securities regulations could apply if the intermediaries are directly engaged in the security-based digital asset transactions or if they use digital assets (including non-security-based digital assets) to facilitate securities transactions. This report focuses on digital assets and activities that are subject to securities regulation. It discusses the objectives and policy rationale of securities laws and regulations; SEC initiatives to address specific regulatory challenges arising from certain unique digital asset features that raise questions concerning the adequacy of the existing regulatory framework; and policy issues for congressional and industry consideration in five selected areas: initial coin offerings, stablecoins, digital asset exchange-traded funds, digital asset custody, and digital asset trading. Securities regulation generally applies to all securities and related intermediaries, whether they are digital or traditional. This section broadly discusses the objectives and policy rationale behind securities laws and regulations. Congress established the SEC and the main framework for capital markets and securities regulation to restore market confidence after the stock market crash of 1929. The regulatory framework's key objectives are to promote disclosure of important market-related information, maintain fair dealing, and protect against fraud. As a result, the existing securities regulatory regime focuses on disclosure-based rules, an antifraud regime, and rules governing securities market participants (e.g., exchanges, broker-dealers, and investment advisors). The SEC's mission is to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation. For example, one of the cornerstones of securities regulationâthe Securities Act of 1933âis often referred to as the \"truth in securities\" law. As the phrase suggests, disclosures allow investors to make informed judgments about whether to purchase specific securities by ensuring they receive financial and other significant information on securities offered for sale. The SEC does not make investment recommendations. The disclosure-based regulatory philosophy is consistent with Supreme Court Justice Louis Brandeis's famous dictum that \"sunlight is said to be the best of disinfectants; electric light the most efficient policeman.\" The current developments in digital asset trading and fundraising are not the first time securities regulators have had to accommodate new technology. Capital markets infrastructure has experienced continuous innovation since the securities regulatory framework was first formed in the 1930s. For example, securities trading platforms experienced a major revolution in the late 1960s and early 1970s, when trading processes shifted from paper and pen-based manual settlements in isolated markets to electronic platforms, which incorporate new data-processing and communications technologies that link all markets together. Congress responded to these advancements by amending Section 11A of the Securities Exchange Act to establish a national market system. The congressional objectives were to encourage efficient, competitive, fair, and orderly markets that are in the public interest and protect investors. Although digital assets as a capital market innovation evolved quickly, the SEC to date has not been active in promulgating new digital-asset-specific rules. One rationale for this approach is that, because it is uncertain how the characteristics and use of digital assets will evolve, highly prescriptive regulations could become obsolete, and potentially inefficient. The SEC's current regulatory framework that governs traditional and digital securities include the Securities Act of 1933, the Securities Exchange Act of 1934, the Investment Company Act of 1940, and the Investment Advisers Act of 1940. It has also used existing tools and a number of initiatives besides rulemaking to address specific regulatory issues arising from certain unique digital asset features. The SEC's approaches include the following: Innovation office . The SEC created the Strategic Hub for Innovation and Financial Technology (FinHub) in 2018 to engage in financial technology ( fintech ), consolidate and clarify communications, and inform policy research. In 2019, FinHub conducted outreach meetings in multiple cities and published a framework for analyzing whether a digital asset is a security. Enforcement . The SEC has brought enforcement actions against securities token issuers and digital asset traders and asset managers, among others. The SEC established a new Cyber Unit and increased its monitoring of and enforcement actions against illicit cyber-based transactions. No-action letter s . The SEC uses no-action letters to provide relief for digital-asset-related businesses and to signal its regulatory intentions to capital markets. For example, the SEC issued a no-action letter to TurnKey Jet, a business-travel startup, stating that its issued tokens are not securities. This was the SEC's first no-action letter for an ICO. The letter triggered a wave of industry discussions and could set a precedent for future digital asset activities. Solicitation for public input . The SEC released a letter to the industry in March 2019 to solicit public input regarding digital asset custody. The comments may help the SEC understand the challenges the industry faces and assess investor-protection risks. New product approval . The SEC could approve or reject new digital asset products. For example, the SEC has reviewed Bitcoin ETF proposals in recent years and has consistently rejected such proposals as of 2019. Digital assets and their use in capital markets are a growing presence in the financial services industry's development. They raise policy questions, including whether new digital-asset-related practices have outgrown or are sufficiently overseen by the existing regulatory system; how the regulatory frameworks can achieve a level playing field where the same businesses and risks could be subject to the same regulation; and how to protect investors without hindering innovation. A fundamental understanding of innovative trends and the appropriate timing of the related policy actions are also important for digital asset regulation. In analyzing technological changes, some commentators suggest that society tends to overestimate a technology's effects in the short run and underestimate its effects in the long run. This illustrates the delicate balance between social pressure for change and the appropriate timing for policy responses in the face of innovation. This section explains key examples of digital asset developments and use cases, focusing on policy issues and legislative proposals in the securities regulation context. The most salient digital asset-related policy issues include regulatory oversight and investor protection. Regulatory O versight . Digital asset issuers and investors face a steep learning curve in comprehending the regulatory landscape and determining how or if securities laws apply to them. It may not always be clear whether a digital asset is a security subject to SEC regulation. Multiple agencies apply different regulatory approaches to digital assets at the federal and state levels. For example, for certain digital assets, the SEC treats them as \"securities,\" the Commodity Futures Trading Commission treats them as \"commodities,\" and the Internal Revenue Service treats them as \"property.\" State regulators oversee digital assets through state money transfer laws, and the Treasury Department's Financial Crimes Enforcement Network monitors digital assets for anti-money laundering purposes. Investor Protection. Digital asset investorsâwhich may include less-sophisticated retail investors, who may not be positioned to comprehend or tolerate high risksâmay be especially vulnerable to new types of fraud and manipulation, leading to questions about investor protection. First, there appears to be high levels of scams and business failures. A 2018 study from Satis Group, a digital asset advisory firm, found that 81% of ICOs were scams and another 11% failed for operational reasons. Second, many digital asset companies offering securities do not comply with SEC registration and disclosure obligations, potentially affecting investors' ability to understand their risk exposures. Third, the high volatility of digital assets' valuations can potentially result in large gains and losses, the risk of which may not be well understood by less-sophisticated investors. Lastly, digital assets operate outside the traditional financial system and thus may not offer common types of transaction protectio ns. For example, banks may have the option to halt or reverse suspicious transactions and associate transactions with the users' identities, but a digital asset transaction is generally irreversible through such intermediaries. Businesses raise funding from capital markets through securities offerings, such as stocks, bonds, and digital assets. ICOs are a new fundraising mechanism in which projects sell their digital tokens in exchange for fiat currency (e.g., dollars) or cryptocurrency (e.g., Bitcoin). A typical ICO transaction involves the issuer selling new digital \"coins\" or \"crypto tokens\" to individual or institutional investors. Investors pay for these tokens with either cryptocurrencies or traditional currencies. ICOs are often compared with initial public offerings (IPOs) of the traditional financial world because both are methods by which companies acquire funding. The main difference is that ICO investors receive digital assets in the form of virtual tokens or the promise of future tokens, unlike IPO investors who receive an equity stake representing company ownership. These coins or tokens are new digital currencies each company creates and sells to the public. Coin purchasers could redeem the coins for goods or services from crypto enterprises or hold them as investments hoping the coins would increase in value. Although every crypto enterprise is different, they generally make transfers without an intermediary or any geographic limitation. Industry practitioners are increasingly using the term security token offering s (STOs) to describe ICOs. This change of terminology reflects the industry's acceptance that many ICOs are securities offerings and thus subject to securities laws and regulations. Securities laws require all securities offers and sales to either be registered under their provisions (as a public offering) or qualify for an exemption from registration (as a private offering). ICOs can take many forms. They can be listed on national exchanges as public offerings or be issued pursuant to the private securities offering exemptions. Operational and regulatory conditionsâincluding investor access, maximum offering amounts, and filing requirementsâdiffer depending on the type of offering an ICO selects. Table 1 illustrates examples of ICO fundraising options. ICOs could potentially use all the existing securities offering venues. They have already reportedly been issued under several of the private exemptions (e.g., Regulation D, Regulation Crowdfunding, and Regulation A). Although public offering ICOs are possible, as of year-end 2019, no ICOs have yet issued under this method. The previously discussed policy issues relating to regulatory oversight and investor protection also apply to ICOs. About 300 platforms are offering digital asset trading and referring to themselves as \"exchanges,\" as of December 2019. A platform that offers trading in digital asset securities and operates as an \"exchange\" (as defined in the federal securities laws) must register with the SEC as a national securities exchange or obtain exemption. However, many such platforms are registered as money-transmission services (MTSs) instead of SEC-regulated national securities exchanges. MTSs are money transfer or payment operations that are mainly subject to state, rather than federal, regulations. Because MTS regulations were not designed with digital asset trading activities in mind, some argue that they are insufficient in regulating the transfer of digital assets. In addition, these services raise investor-protection concerns because they are not subject to the more rigorous oversight as national securities exchanges. The SEC issued a statement in 2018 clarifying that the online platforms for buying and selling digital assets that qualify as securities could be unlawful. These digital asset trading platforms face problems with fraud and manipulation. Some think applying SEC regulation would help, but others are concerned that regulation could stifle financial innovation. Although current technological advancements may seem to have blurred the terminology used, certain platforms trading digital assets that are securities appear to behave as functional equivalents to national securities exchanges. For example, these platforms bring together buyers and sellers, execute trades, and display prices. However, there are differences, such as the blockchain-enabled trading platforms operating without a central database and the fact that not all digital assets trading on platforms are securities. The general consensus among domestic and international securities regulators regarding digital assets is that regulatory oversight should be balanced with the need to foster financial innovation. However, if digital asset trading platforms are buying and selling securities and fall within the SEC's regulatory regime, then securities regulation's basic objectives should arguably continue to apply. In addition, some international authorities believe that, although digital asset trading platforms may face issues similar to traditional exchanges, regulatory approaches may still need to be adjusted to account for particular operating models that may amplify risks differently. In general, policymakers contending with major financial innovations have historically focused on addressing risk concerns while tailoring their regulatory framework flexibly to accommodate evolving technology. The differences between digital asset \"exchanges\" and the SEC regulated national securities exchanges could include transparency, fairness, and efficiency. These are principles guiding the national securities exchange regulation, yet they are perceived as lacking for digital asset \"exchanges.\" Many digital asset \"exchanges\" are reportedly exaggerating their volumes on a routine basis to attract more participation. Investors are perceived to have no idea whether the trading volume and prices reflect real activities or market manipulation. To take the more frequently studied digital asset Bitcoin for example, one study shows that 95% of Bitcoin's trading volume displayed on digital asset price and volume aggregator CoinMarketCap.com is either fake or non-economic in nature. Another widely cited academic study illustrates the scale of potential damage that digital asset market manipulations could create, underlining the investor-protection concerns in the digital asset space. The study argues that a single market manipulator likely fueled half of Bitcoin's 2017 price surge that pushed its price close to $20,000. The activities were reportedly carried out through the largest digital asset \"exchange\" at that time, Bitfinex, and used a stablecoin called Tether to boost the demand for Bitcoin. For this alleged manipulation, Bitfinex and Tether faced a class complaint seeking a total of $1.4 trillion in damages. Although Bitfinex and Tether rebutted the study, calling it \"bogus,\" they are currently under investigation by federal and state regulators. Given the scale of such issues, some have questioned whether digital asset trading warrants more regulatory safeguards that protect investors and promote more efficient market operations. It is difficult to predict the extent to which an SEC-regulated digital asset national exchange would have mitigated the market manipulations, or if the SEC's regulatory framework is the best fit for addressing all the digital-asset-trading-related policy concerns. Still, digital asset \"exchanges\" under the current operating environment appear vulnerable to misconduct. The Bitcoin price manipulation study's author, a finance professor with a background in forensics, said that \"years from now, people will be surprised to learn investors handed over billions to people they didn't know and who faced little oversight.\" The SEC took its first enforcement action against an unregistered digital asset \"exchange\" in 2018. The SEC stated that the platform \"had both the user interface and underlying functionality ofÂ an online national securities exchange and was required to register with the SEC or qualify for an exemption,\"Â but was perceived to have failed to do so. Some of the largest digital asset \"exchanges\" have developed a system to rate digital assets based on the probability that they could be defined as securities. These \"exchanges\" reportedly hope that by so doing they could exclude securities-based digital assets from their unregistered trading platforms, thus circumventing SEC securities regulation. This action is part of the digital asset industry's self-regulation discussion that is gaining momentum. For example, an international law firm's 2018 survey showed that the vast majority of the respondents thought the industry should formalize self-regulation and subject that self-regulation to regulatory oversight. Many digital asset trading platforms also reportedly sought to obtain exemptions from the SEC to operate as alternative trading systems (ATS). ATSs are \"dark pools\" that do not publicly display the size and price of their orders. ATSs face fewer regulatory requirements than national exchanges, but they must register as broker-dealers and meet certain SEC and Financial Industry Regulatory Authority (FINRA) compliance and filing requirements, such as custody, books and records, and regulatory examinations. However, any ATS that transacts more than 5% of the trading volume of any security, which also trade on the national securities exchange system, could face stricter \"order display\" and \"first access\" rules that effectively integrate that ATS in part into the national market system. A number of the largest digital asset \"exchanges\" (e.g., Coinbase, Gemini, Bitstamp, and ItBit) have obtained state-level regulatory licenses (BitLicense) from New York State's Department of Financial Services. The license requirements include certain investor protection, market fraud and manipulation prevention, and illicit activity prevention measures. Custodians provide safekeeping of financial assets. They are financial institutions that do not have legal ownership of assets but are tasked with holding and securing assets, among other administrative functions. The SEC's custody rules impose requirements designed to protect client assets from the possibility of being lost or misappropriated. Custodians are important building blocks for the financial services industry. The custody industry for traditional assets is large and concentrated. In the past 90 years, financial custody has evolved from a system of self-custody to one in which major custodians provide asset custody for client accounts. Today, four banks (BNY Mellon, J.P. Morgan, State Street, and Citigroup) service around $114 trillion of global assets under custody. Digital-asset custody has recently attracted regulatory attention because the SEC custody rules could pose unique challenges for custodians of digital assets. The custody rules were developed for traditional assets, which are easier than digital assets to secure and produce tangible tracks of physical existence or records. Digital assets generally lack physical existence or records produced by intermediaries, as seen in traditional assets such as gold or bank accounts. Common practice in the digital asset industry so far focuses on safeguarding private keys, unique numbers assigned mathematically to digital asset transactions to confirm asset ownership. This practice raises the question of how possession or control of a digital asset should be defined for regulatory purposes. The challenges include but are not limited to, for example, that a digital asset could have multiple private keys or that a single private key does not exist. As such, some believe the digital asset custody definition should go beyond the verification of the keys to incorporate holistic custody views. Regulators are currently evaluating whether custody requirements should be adjusted to account for digital assets' unique operational characteristics. The SEC released a letter to the industry in March 2019 to solicit public input regarding digital asset custody. The SEC summarized a number of policy issues, including the use of distributed ledger technology (DLT) to record ownership, the use of public and private cryptographic key pairings to transfer digital assets, the ability to restore or recover digital assets once lost, the generally anonymous nature of DLT transactions, and the challenges posed to auditors in examining DLT and digital assets. On July 8, 2019, the SEC and FINRA, a self-regulatory organization, issued aÂ joint statement to outline considerations for digital asset securities custody. They acknowledged the challenges of applying custody requirements to digital assets and stated that there are initiatives underway to solicit input from market participants that could help develop new ways to establish \"possession or control\" for digital asset securities. ETFs are pooled investment vehicles that gather and invest money from a variety of investors. ETFs combine features of both mutual funds and stocks and can trade on national exchanges. Some industry practitioners hope that the ETF structure could incorporate digital assets. Individual investors typically buy digital assets, for example, Bitcoins, from other owners or through digital asset trading platforms and other intermediaries. Individual investors currently cannot directly purchase digital assets (e.g., Bitcoins) from the SEC-regulated national securities exchanges. Some have proposed allowing retail investors to buy or sell digital assets on regulated exchanges through the exchange-traded fund (ETF) structureâwhere, instead of directly trading digital assets, the investors would buy or sell publicly traded ETF shares with values linked to underlying digital assets. This section discusses potential Bitcoin ETFs' policy implications for the digital asset industry. As mentioned previously, some digital assets are securities subject to securities laws and regulations. But digital assets could also be structured as securities products, even if the underlying assets are not securities. The proposed Bitcoin ETFs are the most prominent example. Although Bitcoin is not a security, Bitcoin ETFs would be securities products with value linked to the underlying Bitcoins and are subject to securities regulation, including the Investment Company Act of 1940 and Investment Advisers Act of 1940. The digital asset industry has submitted many Bitcoin ETF proposals with the hope of gaining access to more retail investors, but, as of the end of 2019, the SEC has not approved a Bitcoin ETF. The SEC repeatedly stated in its rejections that Bitcoin ETF proposals did not meet standards governing national securities exchanges. Specifically, the SEC stated that the proposals have not met the requirements in Section 6(b)(5) of the Exchange Act that order national exchanges to be \"designed to prevent fraudulent and manipulative acts and practices.\" The agency articulated its rationale in a 2018 staff letter that listed challenges related to a Bitcoin ETF. In addition to market manipulation concerns, major Bitcoin ETF challenges included valuation and pricing, custody, and liquidity. For example, all ETFs must frequently value their portfolio assets. The valuation process determines what investors should pay for the ETF shares and how the ETFs perform. Some worry that the Bitcoin ETFs would not be able to obtain the information necessary to adequately value the digital assets given the high volatility and fragmentation of the markets. Bitcoin ETFs also have supporters. One institutional investor argues that ETFs provide a familiar and convenient way for investors to invest in digital assets, enabling them to participate in digital asset trading and partake in the potential financial gains brought by technological advancements, despite the potential trade-offs with respect to investor protection. In a public statement about a dissenting vote on a disapproved Bitcoin ETF proposal, SEC Commissioner Hester Peirce stated that certain Bitcoin ETF proposals do satisfy the Section 6(b)(5) statutory requirements and that the disapproval may dampen innovation and inhibit institutionalization. Stablecoins are a type of digital asset designed to maintain a stable value by linking its value to another asset or a basket of assets, typically collateralized by fiat currencies or facilitated by algorithms. The best-known example of a proposed stablecoin is Facebook's Libra proposal (see discussion below). Since it was first announced in mid-2019, Libra has generated many policy concerns, inspired new considerations for comparable use cases from the private and public sectors, and fueled discussions of other global stablecoins. A stablecoin arrangement's individual components are complex, leading to many crosscutting policy discussions. The Financial Stability Board, an international financial authority, characterizes a stablecoin's components as the following: Entities/structures involved in issuing stablecoins; entities/structures that manage assets linked to the coins; infrastructure for transferring coins; market participants/structures facing users (e.g., platforms/exchanges, wallet providers) and the governance structure for the arrangement, including the role and responsibilities of a possible governance body and the underlying stabilisation mechanism used for the stablecoin. Stablecoin-related policy concerns vary; they include, market integrity, investor protection, financial stability, monetary policy, payments, and illicit activity prevention. Some of these concerns are outside of the scope of this report, which focuses on securities regulation. In addition to securities regulators, other regulatory authoritiesâcentral banks, payment system regulators, and financial crime enforcement entitiesâhave been involved in stablecoin monitoring and oversight. Facebook's planned stablecoin Libra attracted congressional attention after it was announced on June 18, 2019. At related congressional hearings, Facebook received multiple questions regarding whether Libra is an ETF and how it should be regulated. These questions arose because to create the stablecoin, Libra would be backed by reserve assets, including bank deposits and short-term government securities. New Libra tokens could only be created or destroyed by authorized sellers. Some industry practitioners argue that Libra's proposed operational structure is similar to the creation and redemption process used by ETFs. Facebook acknowledged at the House hearing that Libra uses operational mechanisms that are similar to ETFs, but stated its view that it is still a payment tool and not an investment vehicle. If deemed an ETF, Libra must comply with the SEC's regulatory regime governing securities, investment advisors, and investment companies. SEC approval would be required to launch the project. The SEC is reportedly evaluating whether Libra's structure makes it an ETF. The House Financial Services committee discussed three stablecoin-related securities proposals at an October 2019 House Committee on Financial Services hearing. The Managed Stablecoins are Securities Act of 2019 ( H.R. 5197 ) proposes to subject stablecoins to securities regulation by amending the statutory definition of the term security to include a new category of securities called \"managed stablecoins.\" The bill would define a managed stablecoin as a digital asset that has either (1) a market value that is determined, in whole or significant part, by reference to the value of a pool or basket of assets that are held, designated, or managed by one or more persons; or (2) holders that are entitled to obtain payment which is determined, in whole or in significant part, on the basis of the value of a pool or basket of assets held, designated, or managed by one or more persons. Because managed stablecoin issuers are generally perceived as not acknowledging their stablecoins as securities, this bill would remove regulatory uncertainty by stating that a managed stablecoin is a security and therefore subject to securities regulation. The second legislative proposal would limit public company executives' ability to own managed stablecoins. This draft proposal incorporates the same \"managed stablecoins\" definition, but would take a slightly different approach by delisting a public company if its directors and executives either (1) received compensation in managed stablecoin; (2) bought or sold a managed stablecoin; or (3) were affiliated with a person who bought or sold a managed stablecoin after the date of the security's registration. Lastly, the Keep Big Tech Out of Finance Act ( H.R. 4813 ) would prevent large technology firms like Facebook from offering certain financial services or issuing digital assets. ", "summary": "In recent years, financial innovation in capital markets has fostered a new asset classâdigital assetsâand introduced new forms of fundraising and trading. Digital assets , which include crypto - assets , cryptocurrencies , or digital tokens , among others, are digital representations of value made possible by cryptography and distributed ledger technology. Regardless of the terms used to describe these assets, depending on their characteristics, some digital assets are subject to securities laws and regulations. Securities regulation generally applies to all securities, whether they are digital or traditional. The Securities and Exchange Commission (SEC) is the primary regulator overseeing securities offerings, sales, and investment activities. The SEC's mission is to protect investors; maintain fair, orderly, and efficient markets; and facilitate capital formation. The existing securities regulatory regime generally aligns with this mission, and the SEC's digital asset regulation generally follows the same regime. The SEC has used existing authorities to evaluate new product approval, provide individual regulatory relief, and solicit public input for policy solutions more tailored to digital assets. Digital assets have a growing presence in the financial services industry. Their increasing use in capital markets raises policy questions regarding whether changes to existing laws and regulations are warranted and, if so, when such changes should happen, what form they should take, and which agencies should take the lead. The current innovative environment is not the regulatory regime's first encounter with changing technology since its inception in the 1930s. Some technological advancements led to regulatory changes, whereas others were dealt with through the existing regime. The general consensus is that regulatory oversight should be balanced with the need to foster financial innovation, but securities regulation's basic objectives should apply. In addition, some believe that certain digital asset activities that may appear similar to traditional activities nonetheless require adjusted regulatory approaches to account for particular operating models that may amplify risks differently. In general, policymakers contending with major financial innovations have historically focused on addressing risk concerns while tailoring a regulatory framework that was flexible enough to accommodate evolving technology. Current developments that raise policy issues include the following: Initial coin offerings (ICOs) . ICOs as a digital asset fundraising method can be offered in many forms using existing public and private securities offerings channels. Although ICOs may be useful fundraising tools, they raise regulatory oversight and investor protection concerns. Digital asset \"exchanges . \" Some industry observers perceive digital asset trading platforms as functional equivalents to the SEC-regulated securities exchanges in buying and selling digital assets. But these platforms are not subject to the same level of regulation, suggesting that they may be less transparent and more susceptible to manipulation and fraud. Digital asset custody . Custodians provide safekeeping of financial assets and are important building blocks for the financial services industry. Digital assets present custody-related compliance challenges because custodians face difficulties in recording ownership, recovering lost assets, and providing audits, among other considerations. The SEC is aware of the challenges and is engaging stakeholders to discuss potential issues and solutions. Digital asset exchange-traded funds (ETFs) . ETFs are pooled investment vehicles that gather and invest money from a variety of investors. ETF shares can trade on securities exchanges like a stock. Currently, digital assets themselves are generally not sold on SEC-regulated national exchanges. However, if portfolios of digital assets were made available as ETFs, they may be sold on national exchanges. The SEC has not yet approved any digital asset ETFs because of market manipulation and fraud concerns. Stablecoins in securities markets . Stablecoins are a type of digital asset designed to maintain a stable value by linking its value to another asset or a basket of assets. Issues concerning stablecoins include market integrity, investor protection, payments, financial stability, and illicit activity prevention. Three legislative proposals relating to securities regulation were discussed at a House Committee on Financial Services hearing: the first proposal ( H.R. 5197 ) would subject stablecoins to securities regulation; the second draft proposal would limit public company executives' access to stablecoins; and the third proposal ( H.R. 4813 ) would prevent \"Big Tech\" firms from offering financial services or issuing digital assets.", "document_type": "crs"}
{"report": "A growing number of reported Coronavirus Disease 2019 (COVID-19) cases have been identified in the United States, significantly impacting many communities. As this situation rapidly evolves, the economic impact due to illnesses, quarantines, social distancing, local stay-at-home orders, and other business disruptions will be large. Consequently, many Americans will lose income and face financial hardship due to the impact of the COVID-19 pandemic. In response, four pieces of COVID-19-related legislation have been enactedâmost relevant for this report is the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) enacted on March 27, 2020. The act establishes consumer rights to be granted forbearance for many types of mortgages (Section 4022) and for most federal student loans (Section 3513). The law also protects the credit histories of consumers with forbearance agreements (Section 4021). In addition, financial regulatory agencies have updated their guidance to provide clarity to financial institutions responding to these events. For loan obligations where the CARES Act does not guarantee a right to loan forbearance, such as auto loans, credit cards, private student loans, and bank-owned mortgages, a consumer's ability to access this option may vary. Reports suggest that many consumers have requested payment relief for these types of loans not covered by the CARES Act. Different financial institutions may be subject to different laws and incentives to handle consumer relief requests. For this reason, an individual consumer may find a range of responses from different financial institutions when requesting relief options. This report focuses on policy responses relating to the financial services industry for consumers who may have trouble paying their loan obligations, such as mortgages, student loans, auto loans, and credit cards. First, it provides an overview of loan forbearance and other possible relief options for consumers. Then, the report discusses relevant CARES Act provisions and federal financial regulatory responses. Lastly, the report describes the impact this pandemic and the proceeding policy responses have had on financial institutions and consumers. Ov erview of Loan Forbearance and O ther Relief Options for Consumers During previous natural disasters, government shutdowns, or other similarly destabilizing events, the financial industry has provided financial assistance to some affected consumers, particularly those having temporary difficulties repaying their mortgages, credit cards, or other loans. For example, financial institutions have agreed to defer payments, limit late or other fees, and extend credit to ease consumer financial struggles. In response to the coronavirus pandemic, many banks have recently announced measures to offer various forms of assistance to affected consumers. However, the COVID-19 pandemic is more widespread than previous events, affecting consumers across the country; therefore, financial industry responses may differ from the past. This section begins with a discussion of loan forbearance, a common form of consumer relief. It then describes other types of assistance that financial institutions could provide to impacted consumers. Loan Forbearance Loan forbearance plans are agreements allowing borrowers to reduce or suspend payments for a short period of time, providing extended time for consumers to become current on their payments and repay the amounts owed. These plans do not forgive unpaid loan payments. Loan forbearance plans between consumers and financial institutions usually include a repayment plan, which is an agreement allowing a defaulted borrower to repay the amount in arrears and become current on the loan according to an agreed upon schedule. Repayment plans take many shapes. For example, these plans may include a requirement that all suspended payments are to be due at the end of the loan forbearance period; the past due amount is to be added to the regular payment amount over the year after loan forbearance ends; or payments are to be added to the end of the loan's term. Interest or fees may or may not accrue during the loan forbearance period. As loan forbearance and repayment plans are generally offered to consumers experiencing a temporary hardship, they have become a common form of consumer relief during the COVID-19 pandemic. During this pandemic, many businesses might be closed either by mandate (e.g., restaurants, concerts, or sporting event venues) or facing significant revenue declines due to social distancing efforts (e.g., more space between people at open stores or restaurants) or changes in consumer behavior (e.g., airlines, hotels, and the travel industry). Many of these disruptions may be temporary, lasting only for the duration of the pandemic. Many financial institutions offer loan forbearance plans as an option for consumers who have experienced job loss or temporary income loss but may be able to continue to repay their credit obligations after the disruption ends. In addition, financial institutions may see loan forbearance plans as a good option for consumers at this time because these plans often do not involve renegotiating contracts. Loan forbearance may be a less viable option to deal with the financial ramifications of the pandemic if it causes prolonged disruptions, such as persistent elevated levels of unemployment or permanent business closures. Other Relief Options Available to Consumers Loss mitigation (or workout options) refers to a menu of possible options financial institutions may offer to help a distressed borrower become and stay current with loan payments and avoid default. Loan forbearance is one type of loss mitigation. Loan modifications are another type of loss mitigation that renegotiates the contract with concessions to the borrower. These concessions can take the form of principal balance reductions, interest rate reductions, term to maturity extensions, or some combination of such options. Financial institutions or loan servicers generally weigh the costs and benefits of the various loss mitigation options and offer borrowers the least costly option from a business perspective. Loan forbearance can be the least costly option when the duration of consumer hardship is temporary and short, and the lender can be paid back quickly. Loan modifications may also be beneficial to the lender under circumstances when the costs to modify and retain the loan are lower than the costs of default. If a borrower's circumstances, such as becoming disabled or long-term unemployed, make it difficult for servicers to offer a workout option, the lender may find options such as debt collection, auto repossession, foreclosure, or wage garnishment a less costly way to resolve the default. Finally, various contractual arrangements that loan servicers are obligated to follow may dictate servicer actions from the time the loan became distressed until resolution. These arrangements may limit servicers' authorities and options. Financial institutions can provide other types of relief to consumers, such as agreeing to limit late or other fees and offering new credit or loan products. For example, a consumer can refinance out of a distressed mortgage into a new mortgage contract, potentially pulling equity out of their home to repay arrears and accumulated penalties. Generally financial institutions would choose to extend new credit only if they determine that the borrower is in a good position to pay the loan back in the future. During the COVID-19 pandemic, some banks have decided to limit new credit to consumers due to increased economic risk. Loss mitigation procedures provided by financial institutions or loan servicers are regulated in order to help protect consumers. For example, during the 2008 financial crisis, many consumers had trouble paying their mortgages due to unemployment and decreasing house prices. When mortgage delinquency and foreclosure rates rose, federal regulators identified pervasive documentation issues at many mortgage servicers, which became an issue when a large number of consumers defaulted. In response, the Consumer Financial Protection Bureau (CFPB), using its authority under the Real Estate Settlement Procedures Act (RESPA; P.L. 93-533 , implemented by Regulation X), issued the RESPA Mortgage Servicing Rule in January 2013. Among other things, the rule created an obligation for mortgage servicers to establish consistent policies and procedures to contact delinquent borrowers, provide information about mortgage loss mitigation options, and evaluate borrower applications for loss mitigation in a timely manner. This section of the report discusses various relief provisions of the CARES Act for borrowers and consumer lenders. Table 1 presents a summary of CARES Act provisions that pertain to loan forbearance by consumer credit type. In addition, other provisions of the CARES Act, which help financial institutions cope financially when experiencing increased loan losses, will be discussed. Lastly, this section discusses legislative policy issues relating to consumers missing loan payments. The CARES Act includes some measures to provide temporary forbearance relief for certain affected mortgage borrowersâthose with \"federally backed\" mortgages. Section 4022 allows borrowers with federally backed mortgages to request forbearance from their mortgage servicers (the entities that collect payments and manage the mortgage on behalf of the lender/investor) due to a financial hardship caused directly or indirectly by COVID-19. The borrower must attest to such hardship, but no additional documentation is required. Servicers must grant forbearance for up to 180 days and must extend the forbearance up to an additional 180 days at the borrower's request. Either period can be shortened at the borrower's request. The servicer may not charge fees, penalties, or interest beyond what would have accrued if the borrower had made payments as scheduled. The CARES Act mortgage provisions potentially raise the question of what happens after the forbearance period. The act does not address how repayment should occur. Servicers are to negotiate repayment terms with borrowers, subject to existing requirements or any additional guidance provided by the entity backing the mortgage. Federal loans to support students' postsecondary educational pursuits are currently available under the William D. Ford Federal Direct Loan (Direct Loan) program and the Federal Perkins Loan program. Loans were previously available through the Federal Family Education Loan (FFEL) program, and some of those loans remain outstanding. Due to the current economic situation, many consumers may have trouble repaying their federal student loans. In response, Section 3513 of the CARES Act suspends all payments due and interest accrual for all loans made under the Direct Loan program and for FFEL program loans held by the Department of Education through September 30, 2020. A suspended payment is to be treated as if it were a regularly scheduled payment made by a borrower for the purpose of reporting information about the loan to a consumer reporting agency and toward specified loan forgiveness (e.g., public service loan forgiveness) or loan rehabilitation programs. In addition, involuntary collections on defaulted loans are suspended through September 30, 2020. Consumers can harm their credit scores when they miss consumer loan payments, and lower credit scores can impact their access to credit in the future. Section 4021 of the CARES Act requires financial institutions to report to the credit bureaus that consumers are current on their credit obligations if they enter into an agreement to defer, forbear, modify, make partial payments, or get any other assistance on their loan payments from a financial institution and fulfil those requirements. The covered period for this section starts on January 31, 2020, and extends to the later of 120 days after enactment or 120 days after the national emergency declared by the President on March 13, 2020, terminates. Before this law was enacted, lenders could choose whether to report loans in forbearance as paid on time; with this law, these options are no longer voluntary for the lender. Some affected consumers may still experience harm to their credit record because the CARES Act does not give consumers a right to be granted forbearance for many types of consumer loans (such as auto loans, credit cards, and mortgages and student loans not covered by the CARES Act; see Table 1 ). Although many financial institutions have announced efforts to provide assistance to affected consumers, lenders have discretion whether to enter into an assistance agreement with an individual consumer. Therefore, the ability of consumers to protect their credit scores could vary. Other provisions in the CARES Act are intended to reduce or remove potential disincentives related to accounting and capital requirements that banks may face when deciding whether to grant a forbearance for non-federally backed loans. When the inflow of payments on loans unexpectedly decreases, as happens when unanticipated forbearances are granted, banks must account for this by writing down the value of the loans. The lost value must be reflected with a reduction in income or value of the bank's capital, which can be thought of as the bank's net worth. Banks face a number of requirements to hold minimum levels of capital; if the value were reduced, the bank eventually would fail to comply with those requirements. Thus, these accounting and capital requirements may make a bank hesitant to grant a forbearance (if it judges that the borrower will ultimately be able to make payment) or cause a bank to put off accounting for realized losses at a later date. Sections 4012, 4013, and 4014 of the CARES Act may mitigate these concerns. Certain small banks can elect to be subject to a single, relatively simpleâbut relatively highâcapital rule called the Community Bank Leverage Ratio (CBLR). Bank regulators are authorized to set the CBLR between 8% and 10%. Prior to the enactment of the CARES Act, it was set at 9%. Section 4012 directs regulators to lower it to 8% and give banks that fall below that level a reasonable grace period to come back into compliance with the CBLR. As a result, qualifying banks are to be able to write down the value of more loans before they reach the minimum CBLR level. This relief expires the earlier of (1) the date the public health emergency ends or (2) the end of 2020. When a lender grants a loan forbearance, it may be required to record it as troubled debt restructuring (TDR) in its accounting. Generally Accepted Accounting Principles (GAAP) require the lender to reflect in its financial records any potential loss as a result of a TDR. Section 4013 requires federal bank and credit union regulators to allow lenders to determine if they should suspend the GAAP requirements for recognizing any potential COVID-19-related losses from a TDR related to a loan modification. This relief expires the earlier of (1) 60 days after the public health emergency declaration is lifted or (2) the end of 2020. Another feature of bank and credit union accounting is determining the amount of credit loss reserves , which help mitigate the income overstatement on loans and other assets by adjusting for expected future losses on related loans and other assets. In response to banks' financial challenges during and after the 2007-2009 financial crisis, the Financial Accounting Standards Board promulgated a new credit loss standardâCurrent Expected Credit Loss (CECL)âin June 2016. CECL requires earlier recognition of losses than the current methodology. All public companies were required to issue financial statements that incorporated CECLs for reporting periods, beginning on December 15, 2019. Section 4014 gives banks and credit unions the option to temporarily delay CECL implementation until the earlier of (1) the date the public health emergency ends or (2) the end of 2020. Some consumer advocates argue that during the COVID-19 pandemic, Congress could do more to help consumers experiencing financial hardship. Some consumers may not receive loan forbearance for credit obligations outside of those with rights under the CARES Act. In addition, consumers may continue to incur bank fees and face issues relating to debt collection and negative credit reporting. For this reason, other legislative proposals would prevent creditors and debt collectors from collecting on delinquent loans, charging fees and interest, or reporting negative information to the credit bureaus during the coronavirus pandemic period. Some financial institutions would likely incur significant costs under these proposals. Some proponents of these proposals argue that the federal government may consider compensating financial institutions for these losses in order to implement these policies. On the other hand, other types of government policies outside of the financial industry, such as unemployment insurance or small business aid to keep people employed, can also target impacted Americans. In addition to legislative responses, financial regulatory agencies have taken other steps to respond to the COVID-19 pandemic by encouraging loan forbearance and other financial relief options for impacted consumers. On March 9, 2020, federal and state financial regulators coordinated a guidance statement to the financial industry, encouraging it to help meet the needs of consumers affected by the virus outbreak. The regulators stated that \"financial institutions should work constructively with borrowers and other consumers in affected communities,\" as long as they employ \"prudent efforts that are consistent with safe and sound lending practices.\" This statement was similar to financial regulators' past statements during disruptive events, such as natural disasters and government shutdowns. Beyond this statement, financial regulatory agencies have used existing authorities to issue new COVID-19 guidance to help financial firms support consumer needs during this time. Regulatory guidance does not force a financial institution to take any particular action for consumers (such as offering loan forbearance), but it can increase the incentives or reduce the disincentives of taking such actions. When processing these loan forbearance or other consumer relief requests, financial institutions must ensure that they are acting fairly and complying with the law. For mortgage loan forbearance requests, financial institutions must comply with RESPA mortgage servicing standards. In addition, for all consumer loan forbearance or relief requests, financial institutions must also ensure that they are complying with fair lending laws. The main federal consumer financial regulator in the United States is the CFPB, which implements and enforces federal consumer financial law while ensuring that consumers can access financial products and services. In response to the COVID-19 pandemic, the CFPB issued new guidance about complying with legal requirements during this period of increased loan forbearance requests. The CFPB released additional guidance on regulatory compliance with Regulation X during the mortgage loan transfer process. In addition, the CFPB announced a new joint initiative with the Federal Housing Finance Agency (FHFA) to share mortgage servicing information to protect borrowers. The FHFA is to share information with the CFPB about forbearances, modifications, and other loss mitigation initiatives undertaken by Fannie Mae and Freddie Mac. In combination with CFPB consumer complaints, these data would help the CFPB monitor whether mortgage servicers are complying with the law when they offer these relief options to impacted customers. In addition to mortgage servicing guidance, federal and state financial regulatory agencies also instructed financial institutions that for all consumer credit products, \"when working with borrowers, lenders and servicers should adhere to consumer protection requirements, including fair lending laws, to provide the opportunity for all borrowers to benefit from these arrangements.\" The CFPB has also issued guidance to temporarily reduce regulatory burden by delaying industry reporting requirements for mandatory data collections and providing flexibility on timing requirements. The agency also stated that while continuing to do its supervisory work, it would work with affected financial institutions in scheduling examinations and other supervisory activities to minimize disruption and burden as a result of operational challenges due to the pandemic. These efforts to reduce regulatory burden aim to allow financial institutions more bandwidth to work with impacted consumers and provide them with financial relief during the pandemic. Financial institutions can also provide other types of relief to consumers, such as offering new credit or loan products, so a consumer can pay their loan payments, medical bills, or other expenses to maintain their standard of living during the pandemic period. For this reason, financial regulators have encouraged financial institutions to provide small-dollar loans to affected consumers. However, financial institutions generally would choose to extend new credit only if they were to determine that the borrower is in a good position to pay the loan back in the future, and there may be a significant amount of uncertainty in making such a determination during this pandemic. Therefore, it is unclear whether this guidance will encourage financial institutions to provide small-dollar loans to many consumers. A variety of financial institutions make different types of credit available to consumers. In particular, bank and mortgage institutions are subject to various regulatory controls to ensure they are operating in a safe and sound manner while complying with relevant laws. In response to COVID-19, regulators have issued guidance to signal to financial institutions that it is acceptable to take certain actions that may temporarily weaken their financial positions without facing regulatory actions. The banking regulatorsâthe Federal Reserve, Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of the Currency (OCC), and the National Credit Union Administration (NCUA)âhave worked together to issue guidance and updates to the financial institutions they regulate about how those institutions should work with customers who are negatively impacted by COVID-19. Regulators' efforts to deal with the potential effects of COVID-19 began in early March with attempts to ensure that depository institutions were adequately planning for potential risks. On March 6, 2020, the Federal Financial Institutions Examination Council (FFIEC) updated its influenza pandemic guidance to minimize the potentially adverse effects of COVID-19. The guidance identifies business continuity plans as key tools to address pandemics and provides a comprehensive framework to ensure the continuation of critical operations. Since then, regulators have built on this guidance to encourage financial institutions to take actions to continue to serve customers financially affected by the virus. On March 13, 2020, the Federal Reserve, the OCC, and the FDIC issued guidance identifying ways to assist customers, including waiving fees, offering repayment accommodations, extending payment due dates, increasing credit card limits, and increasing ATM withdrawal limits. Repayment accommodations include allowing borrowers to defer or skip payments or extending payment due dates to help consumers avoid delinquencies, which is a form of forbearance. Regulators can also use incentives to encourage financial institutions to work with consumers and offer repayment accommodations. Recent regulatory guidance signaled to financial institutions that certain activities with consumers would be eligible to earn credit toward their performance assessments under the Community Reinvestment Act (CRA; 12 U.S.C. Â§2901), which encourages banks to extend credit to the communities from which they accept deposits by considering this factor in applications to bank regulators to expand operations, such as through mergers and acquisitions. On March 19, 2020, banking regulators issued a new statement encouraging depository institutions to continue working with affected customers and communitiesâparticularly those that are low- and moderate-incomeâby providing favorable CRA consideration for activities including \"offering payment accommodations, such as allowing borrowers to defer or skip payments or extending the payment due date, which would avoid delinquencies and negative credit bureau reporting, caused by COVID-19-related issues.\" The many federal agencies involved in housing finance have taken actions to encourage or authorize financial institutions to offer forbearance to mortgage borrowers affected by COVID-19. Fannie Mae and Freddie Mac, commonly referred to as government-sponsored enterprises (GSEs), provide liquidity to the housing finance market by purchasing mortgages from lenders and subsequently guaranteeing the default risk linked to their issuances of mortgage-backed securities (MBS, a process known as securitization). In 2008, Fannie Mae and Freddie Mac were placed under conservatorship by their primary regulator, FHFA. The FHFA also regulates the Federal Home Loan Bank (FHLB) system, which is also a GSE, and comprises 11 regional banks that provide wholesale funding to its membersâmortgage lenders, such as banks, credit unions, and insurance companies. On March 18, 2020, Fannie Mae issued guidance signaling to Fannie Mae single-family mortgages borrowers affected by COVID-19 that they could request mortgage assistance by contacting their mortgage servicerâthis guidance was updated with the enactment of the CARES Act and includes forbearance for up to 12 months with no late fees. Similarly, Freddie Mac issued guidance to provide mortgage relief options in line with the CARES Act that include loan modifications and mortgage forbearance for up to 12 months. The Federal Housing Administration (FHA) âan agency within the Department of Housing and Urban Development (HUD)âas well as the Department of Veterans Affairs (VA) and the Department of Agriculture (USDA), each have loan programs that insure or guarantee loans for certain mortgages. Ginnie Mae is a federal government agency that issues MBS linked to mortgages whose default risks are guaranteed by the FHA, VA, and USDA. Ginnie Mae guarantees its MBS investors timely principal and interest payments. On April 1, 2020, HUD instructed mortgage servicers for mortgages with FHA insurance to extend deferred or reduced mortgage payment options (forbearance) for up to six months. In addition, they must provide an additional six months of forbearance if requested by the borrower. This mandate implements provisions contained in the CARES Act. On April 8, 2020, the VA issued a circular that similarly aligns with CARES Act provisions. Through its home loan program, the VA stated that borrowers may request forbearance from their servicer on VA-guaranteed loans or VA-held loans, including Native American Direct Loans or Vendee loans, if they are facing financial hardship from COVID-19. After the passage of the CARES Act, the federal banking agencies and state bank regulators issued a joint statement encouraging mortgage servicers to continue to work with homeowners affected by COVID-19. Much of this guidance aligns with the CARES Act provisions for federally backed mortgages, but many banks issue mortgages that are not federally backed; therefore, they are not required to offer mortgage forbearance. This guidance, while not binding, encourages financial institutions to consider ways to work with consumers through short-term forbearance programs similar to the ones established in the CARES Act. Some observers argue that the federal financial regulators could do more to promote fair access to consumer relief options during the COVID-19 pandemic. Although recent guidance from financial regulators mentioned fair lending concerns, some commentators argue that to ensure fair treatment when consumers apply for loan relief options or become delinquent, additional more detailed guidance to financial institutions about how to comply with consumer protection and fair lending laws during the COVID-19 pandemic would be helpful. In addition, with its data partnership with FHFA, some argue that the CFPB could compile and make public information on how many consumers are accessing relief options and how the frequency of use varies based on type of financial institution. These types of data could help policymakers determine whether relief requests are allocated appropriately or whether additional measures should be considered to help those in need. The large economic impact of the COVID-19 pandemic affects the financial system in many important ways. For example, if many consumers were to miss loan payments, this would have negative consequences on banks and other financial institutions. These institutions have worked to comply with the CARES Act and relevant regulatory guidance during the COVID-19 pandemic period to provide loan forbearance and other flexibilities to distressed consumers. However, the potential strain on the financial system might make it challenging for institutions to provide this support, and these efforts may be insufficient to provide widespread assistance without direct government intervention. This section of the report describes which types of financial institutions hold different types of consumer loans and how the CARES Act or different financial regulatory regimes may impact consumer's access to loan forbearance. It also discusses how private sector institutions may be significantly impacted by missed consumer loan payments and the economic impact of the COVID-19 pandemic. A consumer's ability to get a forbearance and under what terms may be significantly influenced by what type of institution owns the loan. These various institutionsâincluding banks and credit unions, private nonbank financial institutions, GSEs, and the federal governmentâare subject to different laws, regulations, and business considerations. In addition, different types of loansâsuch as mortgages, student loans, and other consumer debtâare subject to different regulations and legal mandates related to forbearance. Of the $11.2 trillion dollars of mortgages outstanding on one-to-four-family homes at the end of 2019, 63% of mortgage loans in the United States were held or insured by the federal government and therefore covered by the CARES Act's consumer right to be granted loan forbearance, as shown in Figure 1 . Most of these \"federally backed\" mortgages were held by GSEs or in mortgage pools backed by GSEs or other agencies (such as Fannie Mae, Freddie Mac, and Ginnie Mae). Banks held almost $2.7 trillion in mortgage loans, nearly 24% of the total, and credit unions held over $572 billion, making up 5%. The remaining 8% are mostly held by a variety of nonbank financial institutions, such private issuers of MBS, real estate investment trusts, nonbank lenders, and insurance companies. Mortgage servicers can be banks and nonbanks. In contrast, most nonmortgage consumer loans are not covered by the CARES Act. At the end of 2019, the amount of consumer loans outstanding was nearly $4.2 trillion dollars. Over $1.6 trillion (39% of the total) were student loans; about $1.2 trillion (29%) were auto loans; nearly $1.1 trillion (26%) were credit card debt; and $258 billion (6%) were other consumer installment loans. As shown in Figure 2 , four types of institutions hold the vast majority of this debt: (1) banksâabout $1.8 trillion, or 42% of the total; (2) the federal governmentâmore than $1.3 trillion, or 31%; (3) finance companiesâ$537 billion, or 13%; and (4) credit unionsâ$482 billion, or 12%. Analysis of other data sources indicate all, or nearly all, of the $1.3 trillion of consumer debt held by the federal government is student loan debt. Federal student loans are generally eligible for CARES Act loan forbearance relief. For other types of nonmortgage creditâsuch as auto loans, credit cards, and private student loanâbanks, credit unions, and finance companies are large players. In these markets, the CARES Act does not guarantee a right to loan forbearance; therefore, financial institutions are to have discretion about whether to offer consumers various loss mitigation options based on what is most profitable for the institution. Although banks and credit unions are regulated to ensure they are operating in a safe and sound manner, nonbank finance companies generally are not subject to this type of regulation. In addition, all institutions must comply with fair lending and other consumer laws when offering loss mitigation options, but supervision and enforcement of these laws may vary based on the institutions' regulatory regime. For these reasons, different financial institutions may respond to consumers' requests for relief options in varying ways. In addition, the financial impact of missed consumer loan payments may vary by institution. Many financial institutions may be impacted by missed consumer loan payments due to the COVID-19 pandemic. Two industries that will be significantly impacted are banks and mortgage servicers. A bank's main business is to make loans and buy securities using funding it raises by taking deposits. A bank earns money largely through borrowers making payments on their loans and securities issuers making payments on securities, along with charging fees for certain services. In addition to accepting deposits, a bank also raises funds by issuing debt (such as bonds) and capital (such as stock). Unlike deposits and debt that place specific payment obligations on a bank, payments on capital can generally be reduced, delayed, or cancelled, and the value of capital can be written down. Thus, if incoming payments unexpectedly stop, capital allows a bank to withstand losses to a point. However, if a bank exhausts its capital reserves, it could face financial distress and potentially fail. A significant portion of a typical bank's assets consists of loans to households, which consumers use to purchase houses, cars, and other consumer goods. Thus, when consumers unexpectedly stop making payments on their loans, such as during a loan forbearance, this can cause banks to incur losses. Current data on U.S. bank balance sheets suggest that as a whole, the banking industry is comparatively well positioned to withstand losses on household debt due to low exposure to mortgage loans and high capital buffers relative to historic norms. Yet, individual banks differ across the business models they choose to deploy, and some banks specialize in a particular loan type, such as mortgage or consumer loans. CRS analysis suggests that some banks have a high exposure to consumer loans; therefore, if consumers miss loan payments, these banks could be especially vulnerable. These high-exposure banks tend to be smaller than an average bank. These financial considerations could also limit banks' abilities to provide relief options to consumers during the COVID-19 pandemic. After a mortgage has been originated, a mortgage servicer carries out various administrative tasks, including collecting payments from borrowers and remitting the principal and interest to the owner (e.g., lender, investor); processing the loan title once paid in full; and administering loss mitigation (e.g., forbearance plans or foreclosure resolution on behalf of the lender) when payments are not made. Mortgage servicers are often required to advance payments to securities holders, even if borrowers do not make payments on time. Because of this obligation, there are rising concerns about the impact of a large volume of forbearances on mortgage servicer liquidity. Some of the federal housing agencies have taken steps to address potential liquidity issues. The FHFA and Ginnie Mae have recently announced a number of measures to facilitate liquidity by making it easier for mortgage lenders and servicers to receive various forms of short-term cash advances. GSE Servicers : On March 23, 2020, the FHFA announced that it would allow flexibility in some of the appraisal and employment verification requirements for new mortgages purchased by Fannie Mae and Freddie Mac until May 17, 2020. The FHFA announced on April 21, 2020, that Freddie Mac and Fannie Mae would limit the obligation of mortgage servicers to advance payments to the GSEs for loans that are in forbearance to four months of payments, allowing servicers to forgo remitting payments after that time frame. Similarly, the FHFA announced on April 22 that the GSEs would be allowed to purchase qualified loans in forbearance to facilitate market lending. Ginnie Mae Servicers : Approved financial institutions that service mortgages underlying Ginnie Mae MBS are among the servicers that are required to remit timely payments to investors, even when monthly payments are not received from borrowers. As consumers are allowed to defer payments and others involuntarily miss payments due to financial hardship, Ginnie Mae servicersâparticularly nondepository servicersâcould face significant liquidity shortages. On March 27, 2020, Ginnie Mae announced a last resort financing option, the Pass-Through Assistance Program, to allow servicers facing shortfalls to request a cash advance to meet the scheduled payments to investors. These measures apply to single-family mortgages. Ginnie Mae also announced that similar programs are expected for reverse mortgages and multifamily mortgages in the near term. Most households rely on credit to finance some expenses because they do not have enough assets saved to pay for them . Some consumers may not be aware of their right to loan forbearance for certain loan obligations or other relief options their financial institution is offering, so these efforts might not reach the most in need. In addition, an increase in COVID-19 pandemic-related scams might further confuse or harm consumers. Communication and financial education may play an important role in consumers receiving forbearances or other assistance. Many consumers may not realize that the CARES Act gives consumers a right to loan forbearance in certain circumstances, and that their financial institutions can provide loan forbearance, access to credit, or other assistance. Both government agencies and financial institutions can play an important role communicating with impacted consumers. The CFPB has published resources for consumers financially affected by the COVID-19 pandemic, including those having trouble paying their bills or experiencing loss of income. Fannie Mae and Freddie Mac have created a new portal for consumers to find out whether these GSEs own the consumer's mortgage loan and whether consumers are thus eligible for loan forbearance and other relief options. Many financial institutions also have conducted outreach to consumers to let them know about their possible options. Some observers argue that the federal government agencies could do more to ensure appropriate communication with consumers during the COVID-19 pandemic. For example, a recent HUD study from their Office of Inspector General (OIG) found that CARES Act loan forbearance information to consumers from FHA mortgage servicers was often incomplete, inconsistent, outdated, and unclear. Some argue that more guidance to financial institutions about how to comply with relevant consumer protection laws and to share best practices during the coronavirus pandemic may be helpful. In addition, the federal regulatory agencies could also prioritize supervisory exams around COVID-19 pandemic communication efforts to better ensure appropriate conduct. Since February 2020, concerns about financial fraud scams related to the COVID-19 pandemic have increased. Driven by fear and confusion about the COVID-19 pandemic, as well as an increased dependence on internet and phone-based communication while \"social distancing,\" more fraud schemes seem to be appearing. On February 10, 2020, the Federal Trade Commission (FTC) published a warning about rising COVID-19 pandemic scams, and it has since then published additional consumer resources. In addition, on March 26, 2020, a bipartisan group of 34 Senators sent a letter to the FTC urging it to inform and assist senior citizens affected by COVID-19-related fraud. Some of these consumer scams focus on consumer financial products or services. On March 16, 2020, Ranking Member Patrick McHenry and other members of the House Financial Services Committee sent a letter to CFPB Director Kathleen Kraninger expressing their concerns about the increasing number of elder financial fraud cases due to misinformation related to the COVID-19 pandemic, and they requested an update to applicable guidance for financial institutions. Since this letter, the CFPB has published COVID-19 pandemic scam resources for consumers on its website. During the COVID-19 pandemic, Congress and various financial regulators have taken significant actions to require, incentivize, and encourage lenders to grant loan forbearances and other types of relief to financially impacted consumers. However, despite these major actions, the impact of these efforts on consumers and financial firms is still unclear due to uncertainty about the pandemic's persistence. If the economic ramifications of the COVID-19 pandemic causes prolonged disruptions, such as persistent elevated levels of unemployment or permanent business closures, loan forbearance may become a less viable option. In this scenario, Congress may choose to consider additional types of assistance to consumers and financial institutions. ", "summary": "A growing number of reported Coronavirus Disease 2019 (COVID-19) cases have been identified in the United States, significantly impacting many communities. This situation is evolving rapidly, and the economic impact has been large due to illnesses, quarantines, social distancing, local stay-at-home orders, and other business disruptions. Consequently, many Americans will lose income and face financial hardship due to the COVID-19 pandemic. Many consumers may have trouble paying their loan obligations, such as mortgages, student loans, auto loans, and credit cards. Due to increasing hardship, l oan forbearance has become a common form of consumer relief during the COVID-19 pandemic. Loan forbearance plans are agreements that allow borrowers to reduce or suspend payments for a short period of time, providing extended time for consumers to become current on their payments and repay the amounts owed. These plans do not forgive unpaid loan payments and tend to be appropriate for borrowers experiencing temporary hardship. Loan forbearance may become a less viable option to deal with the financial ramifications of COVID-19 if the pandemic causes prolonged disruptions, such as persistent elevated levels of unemployment or permanent business closures. A consumer's ability to get a forbearance and under what terms may be significantly influenced by what type of institution owns the loan. These various institutionsâincluding banks and credit unions, private nonbank financial institutions, government-sponsored enterprises (GSEs), and the federal governmentâare subject to different laws, regulations, and business considerations. In response to the COVID-19 pandemic, the President signed the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) on March 27, 2020. The act establishes consumer rights to be granted forbearance for federally insured mortgages (Section 4022) and federal student loans (Section 3513). The law also protects the credit histories of consumers with forbearance agreements (Section 4021). The CARES Act establishes consumer rights to be granted forbearance for many types of mortgages and federal student loans, but the act does not grant consumers these rights for other types of consumer loan obligations, such as auto loans, credit cards, private student loans, and bank-owned mortgages. In these cases, financial institutions have discretion about when and how to offer loan forbearance or other relief options to consumers. Therefore, a consumer's ability to access these options may vary. In addition to legislative responses, financial regulatory agencies have responded to the COVID-19 pandemic using existing authorities to encourage loan forbearance and other financial relief options for impacted consumers. Many financial regulatory agencies have updated their guidance to help financial firms support consumer needs during this time. Regulatory guidance does not force financial institutions to take any particular action for consumers (such as offering loan forbearance), but it can encourage them to offer various forms of support. In recent weeks, many banks and credit unions have announced measures to offer various forms of assistance to affected consumers . The economic effects of the COVID-19 pandemic impact the financial system in important ways. Large numbers of missed consumer loan payments can have significant negative consequences for financial institutions. Because of the potential strain on the financial system, it might be challenging for institutions to provide consumer relief, and financial relief efforts may be insufficient to provide widespread assistance to impacted consumers without direct government intervention. Many consumers having trouble paying their loans may not realize that the CARES Act gives consumers a right to be granted loan forbearance in certain circumstances, and that their financial institutions can provide loan forbearance, access to credit, or other assistance. If consumers are not aware of these existing relief options, it is possible that relief might not reach the most in need. In addition, increasing fraud schemes relating to COVID-19 seem to be occurring, which can drive consumer confusion. Both government agencies and financial institutions can play an important role in communicating with financially impacted consumers.", "document_type": "crs"}
{"report": "In 2019, the United States stands atop the international natural gas world. The United States is the largest producer of natural gas (NG) ( Figure 11 ), is the largest consumer of natural gas, has the most natural gas storage capacity, and has the biggest and most expansive pipeline network. Production from shale formations ( Figure 7 ) has transformed the United States from a growing importer of natural gas to an increasing exporter ( Figure 12 ), with some of the lowest prices in the world ( Figure 10 ). The United States is the 4 th largest exporter of natural gas ( Figure 17 ), but its capacity by pipeline and by ship is growing. How the United States transformed its natural gas sector is a story of market competition, technological innovation, and other factors. As natural gas has played a bigger role in the U.S. economy, congressional interest in it has grown, as measured by the number of bills introduced ( Figure 19 ). In 1998, the United States was the 2 nd largest national producer of natural gas behind Russia ( Figure 11 ), and the largest consumer. U.S. consumption outpaced production that year by more than 1,400 billion cubic feet (BCF) or 7% of consumption, and the United States was viewed as a growing importer of natural gas. Natural gas comprised 24% of the U.S. energy mix in 1998, and that figure remained unchanged in 2008. Canada supplied about 97% of U.S. imports in 1998. Between 1998 and 2008, the difference between U.S. production and consumption averaged 1,764 BCF annually. In 1998, U.S. natural gas consumption was mainly in the industrial sector, but by 2008 natural gas used to generate electricity equaled its use in the industrial sector. During this same time period, average annual U.S. natural gas prices quadrupled, reaching a peak in June, 2008. From 1998 to 2008, the United States added to its LNG import capacity by expanding existing facilities and constructing new import terminals. Import capacity in 2008 was almost 4,800 BCF, with an additional 2,000 BCF added later. There were also more than 20 additional import projects at various stages of development, most of which were never built because the market did not need additional import capacity as the United States moved toward being an exporter. In the mid-2000s, as LNG import terminals were capturing headlines in the U.S. effort to meet growing demand, some small and mid-size production companies were trying to figure out how to produce the massive resources of natural gas that were trapped in shale formations. Multi-stage hydraulic fracturing and improved directional drilling capability were the keys to unlocking these resources. During this time, there were wide swings in U.S. daily natural gas prices as market conditions changed, sometimes quickly. Nevertheless, prices trended upward until the loss of economic activity from the Great Recession decreased demand. As prices rose, interest in developing shale gas grew. Shale gas started to come to market near the end of 2008 concurrent with the start of the Great Recession. The increased supply of natural gas, together with reduced demand, caused prices globally to plummet ( Figure 10 ). New production in the northeast, especially in Pennsylvania, began to grow rapidly. The percentage of U.S. natural gas production from shale also started to rise. Between 2008 and 2018, U.S. production and consumption of natural gas rose, 51% and 28%, respectively, while domestic prices fell about 65%. Despite the fall in prices, U.S. production continued to increase almost every year between 2008 and 2018. The cost of producing shale gas fell as the industry innovated to remain competitive. In 2011, U.S. production started to outpace consumption and the interest in exporting U.S. natural gas took hold. During this period, natural gas became more incorporated in the nation's energy mix, especially in the electrical sector. As U.S. prices fell, the world took note. In 2010, Cheniere Energy became the first U.S. company to apply for a permit to export U.S. natural gas from the lower-48 states from its Sabine Pass facility (which was originally an import terminal), transporting it as LNG. Liquefaction facilities like Sabine Pass liquefy natural gasâconvert it to LNGâand store it in liquid state so that it can be shipped globally in specialized tankers. Liquefaction of natural gas is achieved by cooling the gas to -260\" F. At this temperature, the natural gas becomes a liquid and occupies only 1/600 th of its gaseous volume making it economical to send by ship. U.S. companies were looking to exports of natural gas for additional demand and a way to access higher world prices. As the global economy improved, natural gas prices outside the United States began to climb, which increased the number of companies looking to export U.S. natural gas. By the end of 2009, the United States surpassed Russia as the world's largest producer of natural gas. Global production of natural gas rose 28% between 2008 and 2018. U.S. production outpaced other producers and its share of the global natural gas market rose from 18% to 22%, while Russia's fell from 20% to 17%. The United States did not begin exporting LNG from the lower-48 states until February 2016. However, export of natural gas by pipeline, mainly to Mexico, more than doubled during the 2008 and 2018 timeframe. Mexico imported two-thirds of U.S. pipeline exports and about half of all U.S. gas exports in 2018. U.S. LNG export capacity is on the rise, with six different facilities in operation in 2019 with a capacity of approximately 2,700 billion cubic feet per year or 7.32 BCF per day. The United States is the world's 4 th largest exporter of natural gas overall, and the 6 th largest LNG exporter ( Figure 17 ). With another 3,000 BCF per year under construction, the United States is poised to rise in the export rankings and may have the most capacity, worldwide, within the next five years. Regionally, Asian countries have imported the most LNG from the United States (44%). Within Asia, the nations of South Korea, Japan, China, and India are the biggest consumers. However, in the first half of 2019, China's imports of U.S. LNG declined by 83% over the same time period in 2018, in part because of the trade dispute between the countries. Thirty-six countries have imported U.S. LNG since 2016. Almost half the gas has gone to countries with which the United States has a free trade agreement, a stipulation for an expedited Department of Energy permit. Both South Korea and Mexico, the two largest overall importers of U.S. LNG exports, have free trade agreements with the United States. Between 2016 and the first half of 2019, U.S. LNG exports have grown by 489%. On a monthly basis, LNG exports were largest in May 2019 and are expected to continue to grow as additional port facilities become operational. Meanwhile, there has been no corresponding rise in U.S. natural gas prices due to increased exports. Since February 2016, there has been about, on average, a $1.74 price differential between U.S. spot prices and U.S. LNG export prices. In addition to the price of U.S. spot natural gas, the current price at which natural gas can be bought or sold, importers take into account the cost of liquefying the natural gas, transporting it, regasifying it, and moving it to consumers. Natural gas is expensive to liquefy and transport and requires sophisticated technology. Even though the United States is the largest producer of natural gas in the world, it is not the largest exporter. Russia, mainly through its pipeline exports to Europe, remains the largest overall exporter of natural gas. Qatar was the largest exporter of LNG in 2018, but Australia is projected to surpass it in 2019. Whereas the United States was the target market for LNG exporters in 2008, it is now a net exporter of natural gas and has seen its imports diminish by 27% since 2008. Industry analysts expect U.S. exports to rise significantly over the next few years. LNG now accounts for 35% of global natural gas trade. Energy issues have been a perennial topic of interest to Congress. Natural gas, especially since the advent of shale gas, has grown in importance and congressional interest. Exports of natural gas by pipeline and particularly LNG by ship have added to the significance of natural gas' interest to Congress. In the 116 th Congress, 100 bills have been introduced covering a wide variety natural gas related topics, from production, exports, infrastructure, the environment, and employment, among other things.", "summary": "In the beginning of the 21 st century, natural gas prices were increasing and the United States was viewed as a growing natural gas importer. Multiple liquefied natural gas (LNG) import terminals were built while existing ones were recommissioned and expanded. However, the market conditions also drove domestic producers to innovate. As average U.S. prices peaked in 2008, domestic shale gas production was brought to market. Improvements in technologies such as hydraulic fracturing and horizontal drilling made the development of unconventional natural gas resources such as shale and other lower-permeability rock formations economically possible. Improved efficiency has lowered production costs, making shale gas production competitive at almost any price. The large amount of natural gas brought to market enabled large-scale exports from the United States. Of today's total global trade in natural gas, some 35% takes the form of LNG. As U.S. natural gas production increased and prices fell, U.S. consumption of natural gas grew. The rise in consumption did not keep pace with production, so companies turned to greater exports of natural gas, first by pipeline to Mexico and then as LNG to other parts of the world. The United States started exporting LNG from the lower-48 states in February 2016. The entrance of the United States as an exporter of LNG has caused significant changes to LNG markets. The U.S. natural gas market is one of the few that does not link the price of natural gas to oil, and this has carried in to LNG contracts. Some buyers view U.S. LNG exports as a hedge against oil prices. U.S. exporters do not require destination clauses, although where U.S. LNG exports end up must be reported to the U.S. Department of Energy. The relatively low price of U.S. natural gas has also helped consumers in other regions negotiate better prices for imports from non-U.S. sources. The United States is poised to rise in the export rankings and may have the most LNG export capacity, worldwide, within the next five years. According to projections by the U.S. Energy Information Administration (EIA), U.S. natural gas production, consumption, and exports will continue to grow for decades to come, while U.S. prices are projected to stay relatively low. One aspect of EIA projections is a status quo assumption when it comes to technology, laws and regulations, and markets among other things. As the advent of shale gas has shown, changes to the industry happen and may happen in significant ways and quickly. Natural gas has been and continues to be a topic of interest for Congress. One hundred bills have been introduced in the 116 th Congress related to different aspects of natural gas. Natural gas may play a bigger or smaller role in the U.S. economy depending, in part, upon congressional actions. Nevertheless, natural gas is an integral part of the U.S. and global energy mix. Knowing the major natural gas producing and exporting nations and how natural gas is transported for export are essential to understanding the sector and how U.S. natural gas fits into the global market.", "document_type": "crs"}
{"report": "The COVID-19 pandemic is a complex and devastating shock to the global economy. The virus has spread to around the world and combatting the pandemic has shut down large portions of the economy. The pandemic has roiled stock markets, upended oil and other commodity markets, created mass unemployment, disrupted trade, resulted in shortages of food and medical supplies, and threatened the solvency of businesses and governments around the world. The World Food Program warns that the number of people suffering acute hunger could almost double by the end of the year without swift international action. In April 2020, the International Monetary Fund (IMF) cautioned that COVID-19 will likely be the worst recession since the Great Depression, far worse than the recession following the global financial crisis of 2008-2009. Governments have undertaken extraordinary fiscal and monetary measures to combat the crisis. However, low- and middle-income countries that are constrained by limited financial resources and weak health systems are particularly vulnerable. In April 2020, the IMF forecast that developing and emerging-market countries could contract by at least 1% in 2020; six months earlier the projection was 4.5% growth ( Figure 1 ). Additionally, the COVID-19 pandemic has triggered capital flight from emerging markets on an unprecedented scale, exacerbating the fiscal challenges facing these governments ( Figure 1 ). Many developing countries are turning to the international financial institutions (IFIs), including the IMF, the World Bank, and the regional multilateral development banks (MDBs), for financial support, and the IFIs are working quickly to mobilize their existing financial resources. The IMF has pledged to use its current $1 trillion lending capacity if necessary, and the MDBs have pledged to mobilize $240 billion over the next 15 months. In March 2020, Congress accelerated authorizations under consideration in the FY2021 budget request to increase funding to the IMF, two World Bank lending facilities, and two African Development Bank lending facilities ( P.L. 116-136 ). Multilateral discussions are underway to increase further the IFI's ability to support countries responding to the pandemic. Further congressional action would be required to implement some of the proposals under consideration. The IMF and the World Bank have called for a debt standstill for low-income countries, during which those countries could suspend debt service payments and instead devote their funds to the exigencies of the pandemic. On April 15, 2020, the G-20 donor countries in conjunction with the private sector agreed to a debt standstill through the end of 2020. Some policy experts and policymakers in developing countries are calling for additional debt relief given the severity of the crisis for low-income countries. No legislation is required to implement the April 15 agreement, but congressional action would be required for any permanent U.S. debt relief or contributions to finance debt relief provided by the World Bank or other MDBs. Created in the aftermath of World War II, the IMF's fundamental mission is to promote international monetary stability. To advance this goal, one of the key functions of the IMF is providing emergency loans to countries facing economic crises. The COVID-19 pandemic has resulted in an unprecedented demand for IMF financial assistance. Previously, the highest number of IMF programs approved in a single year was 34 (in 1994), and on average the IMF has approved 18 programs a year ( Figure 2 ). Today, more than 100 of the IMF's 189 member countries have requested IMF programs. IMF Managing Director Kristalina Georgieva has stated that the IMF stands ready to deploy the entirety of its current lending capacityâapproximately $1 trillionâin response to the pandemic and resulting economic crises. Edwin Truman at the Peterson Institute for International Economics estimates the IMF's maximum lending capacity is currently around $787 billion, and that more IMF resources will be needed. The levels of IMF financial assistance under discussion would be unprecedented; previously, the highest cumulative IMF program funding approved in a single year was about $165 billion (in nominal terms), extended in 2010 during the height of the Eurozone crisis ( Figure 2 ). The IMF has several financing options for deploying resources in response to the COVID-19 pandemic. The IMF can provide rapid one-off assistance to countries responding to a health disaster, grant debt relief for the poorest and most vulnerable countries to help address public health disasters, increase the size of current IMF loans, and approve new IMF loans. The IMF has also been working to increase its flexibility in responding to the crisis. For example, the IMF Executive Board has adopted proposals to accelerate Board consideration of member financing requests for emergency financing and doubled (to about $100 billion) access to IMF emergency assistance. Most IMF loans are generally conditioned on economic reforms, including austerity measures (government spending cuts and tax increases) and structural reforms (measures that increase the competitiveness of the economy). Some policy experts have raised questions about whether conditionality should be applied to governments seeking assistance for addressing economic crises caused not by irresponsible economic policies but from exogenous shocks prompted by the pandemic. Further, some argue that structural reforms may provide benefits in the longer-term, and austerity measures may exacerbate economic crises in the short-term. Additionally, negotiations over conditionality and good governance safeguards take time, raising questions about how quickly IMF funds can and should be disbursed to affected countries. The IMF has already approved several COVID-related programs, including for Bolivia, Chad, the Democratic Republic of Congo, Kyrgyz Republic, Nigeria, Niger, Rwanda, Madagascar, Mozambique, Pakistan, and Togo, among others. Usually, governments do not disclose their requests for an IMF program until the deal is finalized, due to concerns about further undermining investor confidence. Iran and Venezuela, whose access to capital markets is already restricted by U.S. sanctions, have publicized their requests, which are controversial for U.S. policymakers (see text box ). Sudan, whose transitional government is seeking improved relations with the international community, is also seeking emergency support from the IFIs, as the pandemic threatens to exacerbate a pre-existing economic and humanitarian crisis. The country is not able to access most IFI financing mechanisms because of large arrears to the institutions, however. While many in Congress and the Administration have expressed support for Sudan's new government, U.S. Executive Directors at the IFIs would be required to vote against new financing as a result of Sudan's designation under the former regime as a State Sponsor of Terrorism (SST). Additionally, in April 2020, the IMF Executive Board approved debt service relief to 25 of the IMF's low-income member countries, and later expanded this debt service relief to reach 29 countries. The IMF was able to tap its Catastrophe Containment and Relief Trust (CCRT), revamped to address the COVID-19 pandemic, to provide these countries with grants to cover their debt payments to the IMF for six months. The CCRT can currently provide $500 million in grants to low-income countries and is funded by donor countries, including the UK, Japan, Germany, the Netherlands, Singapore, and China. The IMF is seeking to increase this fund by $1.4 billion to provide additional debt service relief. The IMF is also looking to triple the size of its Poverty Reduction and Growth Trust Fund (PRGT) to $17 billion. It has $11.7 billion in commitments from Japan, France, the United Kingdom, Canada, and Australia. Also in April 2020, the IMF Executive Board approved the creation of a new Short-term Liquidity Line. It is a revolving and renewable backstop for member countries with very strong economic policies in need of short-term and moderate financial support, and intends to support a country's liquidity buffers. Some policy experts have questioned its utility, arguing its scope may be too small, it continues to carry the stigma of borrowing from the IMF, and it is unlikely to be processed fast enough be effective. The World Bank, which finances economic development projects in middle- and low-income countries, among other activities, is mobilizing its resources to support developing countries during the COVID-19 pandemic. At the end of April 2020, the World Bank had approved, or was in the process of approving, 94 COVID-19 projects, totaling $9 billion, in 78 countries. Examples of approved projects include $47 million for the Democratic Republic of Congo to support containment strategies, train medical staff, and provide equipment for diagnostic testing to ensure rapid case detection; $11.3 million for Tajikistan to expand intensive care capacity; $20 million for Haiti to support diagnostic testing, rapid response teams, and outbreak containment; and $1 billion for India to support screening, contract tracing, and laboratory diagnostics, procure personal protective equipment, and set up new isolation wards, among other projects. Over the next 15 months, the World Bank Group estimates it could deploy as much as $160 billion to respond to the COVID-19 pandemic, more than double the amount it committed in FY2019 ( Figure 3 ). From official World Bank statements, it is unclear whether the $160 billion commitment is additional financing, an acceleration of its normal lending, or a combination. It is also unclear to what extent the funds will be concessional financing (grants and low-cost loans) for the world's poorest countries or nonconcessional financing (market-rate loans) for middle income countries. According to the World Bank, the $160 billion commitment is to include: $50 billion in net transfers to low-income countriesâthose that are eligible for the World Bank's International Development Association (IDA) concessional lending and grant facility; $8 billion in financial support provided through the World Bank's private-sector lending facility, the International Finance Corporation (IFC), for private companies and their employees hurt by the economic downturn caused by the spread of COVID-19; and a new $6.5 billion facility to support private sector investors and lenders in tackling the COVID-19 pandemic, administered by the World Bank's Multilateral Investment Guarantee AgencyÂ (MIGA). On April 17, 2020, the World Bank announced its plans to establish a new multi-donor trust fund to help countries prepare for disease outbreaks, the Health Emergency Preparedness and Response Multi-Donor Fund (HEPRF). The new fund is to complement, and augment, the $160 billion of financing provided by the World Bank. Japan was the first country to pledge to be a founding donor to the new trust fund, which will aim to spur critical health security investments in the context of the current pandemic as well as in the future. For example, the fund is to provide incentives to IDA-eligible countries to increase investments in health emergency preparedness and enable low-income countries to quickly and effectively respond to major disease outbreaks at an early stage. In addition to the World Bank, which has a near-global membership and operates in many sectors in developing countries worldwide, a number of smaller and more specialized MDBs are also mobilizing resources in response to the COVID-19 pandemic. The United States helped create and belongs to four MDBs focused on promoting economic development in specific regions: the Asian Development Bank, the African Development Bank, the Inter-American Development Bank, and the European Bank for Reconstruction and Development. Together with the World Bank, these organizations are the five major MDBs. There are also smaller MDBs, however. The United States also belongs to the International Fund for Agricultural Development, which works to address poverty and hunger in rural areas of developing countries, but it does not belong to two MDBs recently created and led by emerging markets. These include the Asian Infrastructure Investment Bank, spearheaded by China, and the New Development Bank created by the BRICS countries (Brazil, Russia, India, China, and South Africa). Nor does the United States belong to the European Investment Bank, the lending arm of the European Union, or the Islamic Development Bank, led by Saudi Arabia and created in the 1970s. Specialized MDBs are launching a robust response to the crisis, including reprogramming existing projects, establishing and funding with existing resources lending facilities dedicated to the COVID-19 response, and streamlining approval procedures. According to the President of the World Bank, other multilateral development banks have committed roughly $80 billion over the next 15 months to respond to COVID-19. It is not entirely clear which other MDBs are included in this total, or the amounts committed by each MDB. Estimates based on MDB press releases are provided in Figure 4 . Together with the World Bank's commitment of $160 billion, $240 billion in financing is to be made available to developing countries from the MDBs during this time period. Details of on specific MDB responses measures are provided in the Appendix ( Table A-1 ). The path to the suspension of debt payments for IDA countries took some time to gain momentum. Most donors prefer to coordinate debt relief efforts so the resources made available from debt relief can be used to benefit the developing country rather than be used to repay other creditors. Debt relief by donor governments has traditionally been organized by the Paris Club, an informal group of creditor countries, including the United States, whose origins can be traced back to the 1950s. The Paris Club does not include China, which has in recent years emerged as a major creditor to developing countries and whose lending terms are opaque. China has resisted international efforts to increase debt transparency through the IMF and the World Bank, and has been reluctant to set a precedent for widespread debt forgiveness. At their first emergency teleconference summit on March 26, the G-20 leaders stopped short of providing the requested debt relief, but pledged to \"continue to address risks of debt vulnerabilities in low-income countries due to the pandemic.\" Negotiations continued and on April 15, 2020, the G-20 finance ministers announced the Debt Service Suspension Initiative (DSSI), a temporary suspension of debt payments until the end of the year for the world's poorest countries (those eligible for IDA assistance). The Institute of International Finance (IIF), a group that represents about 450 banks, hedge funds, and other global financial funds, concurrently announced that private creditors will join the debt relief effort on a voluntary basis. This debt standstill potentially frees up more than $20 billion for these countries to spend on improving their health systems and fighting the pandemic, including $12 billion in payments to official creditors (governments) and $8 billion in payments to private creditors. The standstill is to run from May 1, 2020 through December 31, 2020. Repayment schedules are to be net present value neutral, meaning that no debt is actually written off, but rather rescheduled to be paid later. The G-20 decided that the DSSI would apply to the 76 countries designated by the World Bank as eligible for IDA assistance, as well as Angola, which is not eligible for IDA assistance but is designated by the United Nations as one of the world's least developed countries (LDC). According to estimates by IIF, total external debt in DSSI countries exceeds $750 billion. This number may actually be much higher, however, since China and many other creditors do not publicly disclose the scale and scope of their external lending. Debt owed to the United States by DSSI countries is approximately $7.7 billion ( Figure 5 ). Since the current proposal only provides debt rescheduling and not debt cancellation, it does not require U.S. legislation. Some advocates, however, are calling for debt forgiveness, which has been provided in the past. In this case, authorizations and appropriations would be necessary. The procedure for budgeting and accounting for any U.S. debt relief is based on the method used to value U.S. loans and guarantees provided in the Federal Credit Reform Act of 1990. Since passage of the act, U.S. government agencies are required to value U.S. loans, such as bilateral debt owed to the United States, on a net present value basis rather than at their face value, and an appropriation by Congress of the estimated amount of debt relief is required in advance of any debt relief taking place. Prior to the passage of the act, neither budget authority nor appropriations were required for official debt relief. Bilateral debt (and other federal commitments) were accounted for on a cash-flow basis, which credits income as it is received and expenses as they are paid. For FY2021, the Administration had requested authorizations to increase funding for several IFIs. In March 2020, Congress enacted these authorizations in the Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ). The authorizations include: $38 billion for a supplemental fund at the IMF (the New Arrangements to Borrow, or NAB); $3 billion for the nineteenth replenishment of World Bank's IDA resources; $7.3 billion for the seventh capital increase at the African Development Bank; and $513.9 million for the fifteenth replenishment of resources at the African Development Bank's concessional lending facility, the African Development Fund. Given the size and scope of the financing needs faced by developing and emerging economies, policy experts and policymakers considering several unusual policy options to further bolster the IFI response. These options, including stretching MDB lending using current resources, IMF gold sales, IMF policies to bolster global liquidity, and further multilateral debt relief, are discussed in greater detail below, as well as any legislation that would be required for U.S. participation in such efforts. Some analysts argue that the MDBs have the financial capacity to lend substantially larger amounts than they have already committed. Traditionally, the MDBs have been exceedingly conservative in their approach to capital adequacy. Christopher Humphrey of the London-based Overseas Development Institute (ODI) points out that the five main MDBs (AfDB, ADB, IDB, EBRD, and IBRD [World Bank]) carry an equity-to-loan ratio of between 20% and 60%, compared to 10 to 15% for commercial banks. According to these calculations, the major MDBs can expand lending by at least $750 billion (160% above current levels), while maintaining an AAA rating, or as much as $1.3 trillion (nearly triple current levels) if they are willing to risk a rating downgrade to AA+. A key reason for these potentially higher lending levels, is that when MDBs calculate their capital adequacy, they do not include \"callable capital\" that member countries have committed to the institutions. The capital that the United States and other shareholders contribute to the MDBs usually comes in two forms: (1) \"paid-in capital,\" which requires the transfer of funds to the MDBs; and (2) \"callable capital,\" which are funds that shareholders agree to provide, but only when necessary to avoid a default on a borrowing by the MDB itself. (A member country defaulting on a World Bank loan would not cause the Bank to draw on its callable capital.) No MDB has ever had to draw on its callable capital. When MDBs calculate their capital adequacy, they include only paid-in capital and accumulated reserves. By contrast, the major rating agencies include callable capital when calculating potential MDB lending headroom and have noted that the MDBs could lend higher amounts without threatening their rating. According to Humphrey, \"[callable] capital is considered financially sound by the ratings agencies, but is effectively ignored by the MDBs.\" While the U.S. government provides oversight of MDB operational decisions, no congressional legislation would be needed for the MDBs to change their capital adequacy rules. Advocates have also proposed that the IMF sell a portion of its gold reserves to finance debt relief for the poorest countries. According to Oxfam's Nadia Daar, \"With gold prices hitting a seven-year high, the IMF should use the windfall profits from gold sales for debt cancellation to avert catastrophic loss of life in developing countries.\" The IMF holds 90.5 million ounces of gold in reserves, valued at around $153 billion at current market prices. The IMF's total gold holdings are valued on its balance sheet at about $4.9 billion (SDR 3.2 billion) on the basis of historical cost. The IMF acquired virtually all of this gold through four types of transactions. In 1978, IMF members adopted an amendment to the Articles of Agreement allowing each country to determine its own exchange rate system. The amendment officially severed the link between currency and gold. IMF member countries were prohibited from defining the value of their currency in terms of gold and the IMF was prohibited from lending gold or defining its assets in terms of gold. Countries could use any exchange rate system (other than using gold as a base) for defining the value of their currencies. Since the 1978 amendment, the use of gold in the IMF's operations has been severely limited. In recent decades, IMF members have supported the limited sale of IMF gold holdings. As with other major IMF policy decisions, gold sales require an 85% majority vote of the total voting power. U.S. voting power at the IMF is 16.51% and thus U.S. support is required for IMF gold sales. In 2000, IMF gold sales were used to fund debt relief for several of the poorest developing countries. In September 2009, the IMF's Executive Board approved the total sale of 403.3 metric tons of gold as a key step in strengthening the IMF's finances. A portion of the profits from gold sales in 2009 and 2010 were used to support concessional lending to low-income countries. Under U.S. law, congressional authorization is required for the United States to support IMF gold sales. In 1999, Congress enacted legislation in the FY2000 Consolidated Appropriations Act ( P.L. 106-113 ) that authorized the United States to vote at the IMF in favor of a limited sale of IMF gold to fund the IMF's participation in poor country debt cancellation. The legislation required the explicit consent of Congress before the executive branch could support any future gold sales. All subsequent gold sales have been explicitly authorized by Congress. As part of the U.S. response to COVID-19, the U.S. Federal Reserve (Fed) has taken steps to ensure that major central banks have uninterrupted access to U.S. dollars. First, the Fed established emergency swap lines, or temporary reciprocal currency arrangements, with major central banks and lowered the interest rate it charges on the swap lines. Swap lines allow foreign central banks to temporarily exchange their currency for dollars with the Fed. Second, the Fed created a foreign central bank (FIMA) repurchase (repo) facility. The facility, which also charges interest, allows a broader range of emerging market central banks to temporarily exchange their U.S. Treasury securities for U.S. dollars. While these Fed efforts have been critical, access to their facilities has been relatively limited to advanced economies and some emerging market countries. Less-developed economies and most low-income countries are unable to access Fed facilities, and their limited foreign exchange reserves are rapidly depleting. One option widely discussed is providing a global allocation of IMF special drawing rights (SDRs). The First Amendment to the IMF Articles of Agreement, which went into effect in 1969, authorized the IMF to create a new international reserve asset that could be used to supplement its member country's foreign exchange reserves. This asset, known as SDRs, is neither a currency nor a claim on the IMF. Rather, it is a potential claim on the freely usable currencies of IMF members. SDRs may be exchanged for hard convertible currency among IMF member nations. IMF rules govern how a country may exercise its claim and convert its share of SDRs into another country's hard currency. SDRs are created by fiat, and are not \"paid for\" by any foreign contributions or backed by any national currency. IMF member countries are allocated a number of SDRs based on their IMF quota. In light of the COVID-19 pandemic, some policy advocates have proposed an SDR increase of at least $500 billion to provide additional resources to the least developed countries to help them cope with sharp capital outflows and current low commodity prices. For example, on April 21, 2020, Representative Jesus Garcia along with several colleagues introduced the Robust International Response to Pandemic Act ( H.R. 6581 ) that would, among other things, instruct the U.S. Treasury to support an allocation of $3 trillion SDRs. Support for a new SDR creation is not universal. The foremost policy concern with a new SDR increase is their relative inefficiency. Since SDRs are allocated based on IMF quota holdings, the majority of them would be allocated to advanced economies, which are unlikely to ever use their SDRs. These countries could buy and sell SDRs among themselves in order to get useable foreign exchange, but they can do this alreadyâand much more easilyâthrough central bank swaps and other such mechanisms. An additional concern for many U.S. policymakers is that all IMF members, including countries under U.S. sanctions such as Iran and Venezuela, would be included in a general SDR allocation. Reportedly, opposition to providing SDRs to certain countries was a key factor in the U.S. Treasury opposing a broad SDR allocation when it was discussed during the spring 2020 IMF-World Bank annual meetings, even as the it supported a number of other IMF policy responses. U.S. support would be required for an SDR allocation of any size. Article XXVIII of the Fund's Articles of Agreement indicates that the creation and allocation of SDRs requires support from at least 85% of the total voting power of the IMF's membership. Due to the size of U.S. voting power at the IMF (16.41%), the United States has veto power over SDR allocations. Additionally, if the size of the SDR increase is equal to or larger than the U.S. share of total IMF quota, congressional support is also required. The Special Drawing Rights Act of 1968 ( P.L. 90-349 ) gave the Executive Branch authority to vote for the First Amendment to the IMF's Articles of Agreement creating the SDR, and set forth the guidelines for U.S. participation in the SDR Department. However, the Act also says that if the U.S. share of a new allocation of SDRs is less than the size of the U.S. quota, the United States can support an SDR allocation as long as the Department of the Treasury consults with leaders of the House and Senate authorizing committees at least 90 days in prior to the vote. U.S. quota is currently about $113.3 billion. Since the U.S. share of IMF quota is currently 17.45%, the Administration could support a SDR allocation of less than about $649 billion without legislation as long as the consultation requirements are met. As noted above, calls are mounting for the G-20 DSSI to go further. Former Nigerian finance minister Ngozi Okonjo-Iweala, one of the four special envoys of the African Union soliciting G-20 support for Africa in dealing with COVID-19, is calling for the debt service relief period to be extended to two years. The DSSI does not lower the debt for many low-income countries, and many analysts suggest that, during the debt service payment freeze, official and private sector creditors should work with low-income countries to restructure debts. The United Nations Conference on Trade and Development (UNCTAD) is calling for around $1 trillion in debts owed by developing countries to be canceled. Debt restructuring, which could entail some combination of lengthening maturities, lowering interest rates, and writing-off principle, would lower the debt burden facing developing countries. However, debt restructurings are complex and can take years to negotiate. Divisions between western creditor governments and China over debt relief further complicate negotiations. Many developing countries, including low-income and middle-income countries, faced with a severe economic contraction and pressing health needs, may be forced into default before restructurings can be completed. Low-income and middle-income countries, faced with a severe economic contraction and pressing health needs, may be forced into default before restructurings could be completed. Many African countries reportedly are already requesting debt relief from China in exchange for collateral, including in some cases strategic state assets. Additionally, the DSSI does not address the $12 billion in payments due by low-income countries to multilateral lenders, including the IMF and the World Bank, through the end of the year. The handling of these debts is reportedly still under discussion. For much of their history, the IFIs have served as lenders of last resort to countries suffering from financial crisis. Thus, the IFIs argued that since they provided assistance to countries unable to borrow from anyone else, they should receive preferred creditor status. This means that the World Bank and the IMF would be paid first in the event that borrowers ran into financial difficulties, and that debts owed to them would not be reduced under any circumstances. However, there have been some occasions in the recent past when IMF and MDB debts were reduced. In 2005 for the Multilateral Debt Relief Initiative (MDRI) led by the G-8, the MDBs received new money from creditor nations to offset their debt reductions while the IMF absorbed the cost of debt relief using internal resources and the proceeds of gold sales. As discussed earlier in this report, if the international community agrees to seek a new multilateral debt relief agreement, congressional action would likely be required. The IFIs are mobilizing resources on an unprecedented scale to respond to the COVID-19 pandemic and ensuing economic crisis. To respond to what the IMF is projecting as the largest economic downturn since the Great Depression, multilateral efforts for debt relief are also underway. Some policy experts and policymakers are calling for additional policies to bolster the IFI response, as well as for further multilateral coordination on debt relief for low-income countries. The role of the IFIs in responding to the COVID-19 pandemic raises a number of potential policy questions for Congress. These include the following. Do the IFIs have sufficient resources to respond to the COVID-19 pandemic? Does the United States support mobilization of additional resources, and if so, through what mechanisms? Developing countries face a variety of financing needs, including funding the immediate public health response, broad budgetary support, and liquidity support. How should the IFIs prioritize their financial assistance? How should IFI assistance be allocated across countries? How might coordination and coherence of COVID-19 responses among IFIs and donor governments be handled? Many IFIs are focused on the rapid disbursement of financial assistance. What is the trade-off between streamlining approval processes and maintaining due diligence to protect IFI resources? Is there oversight of how the resources from debt relief are used? Do the IFIs have sufficient staffing to process high volumes of financial assistance? China has emerged as a major creditor in recent years, but the terms of its lending are opaque. Do the IFIs have sufficient access to the information needed to assess the financing needs of developing countries and emerging markets? Would any IFI assistance be used to pay off China debt in certain countries? While the current focus is on getting resources quickly to the poor and least developed countries, the IMF is drawing attention to large project increases in debt/GDP ratios for many countries. What is the Administration's position on a new round of multilateral debt forgiveness? How is the Administration engaging on developing-country debt with official institutions and the private sector? What is the Administration's plan for debt relief negotiations with creditor governments outside of the Paris Club group of creditors? What is the appropriate balance between IFI financing and debt relief in the COVID-19 response? In what context is one policy more useful? How might the disbursement of IFI financial assistance be impacted by an inability to reach multilateral agreement on debt relief? Developing and emerging economies are facing immediate financing needs to grapple with the spread of COVID-19, and economic recovery from the pandemic may take years. How should the IFIs assess the capacity of countries to repay IFI loans given the short-, medium-, and long-term impacts of the COVID-19 pandemic?", "summary": "The international financial institutions (IFIs), including the International Monetary Fund (IMF), the World Bank, and regional and specialized multilateral development banks, are mobilizing unprecedented levels of financial resources to support countries responding to the health and economic consequences of the COVID-19 pandemic. More than half of the IMF's membership has requested IMF support, and the IMF has announced it is ready to tap its total lending capacity, about $1 trillion, to support governments responding to COVID-19. The World Bank has committed to mobilizing $160 billion over the next 15 months, and other multilateral development banks have committed to providing $80 billion during that time period. At the urging of the IMF and the World Bank, the G-20 countries in coordination with private creditors have agreed to suspend debt payments for low-income countries through the end of 2020. Policymakers are discussing a number of policy actions to further bolster the IFI response to the COVID-19 pandemic. Examples include changing IFI policies to allow more flexibility in providing financial assistance, pursuing policies at the IMF to increase member states' foreign reserves, and providing debt relief to low-income countries. Congressional Role Congress exercises oversight of U.S. participation of the IFIs and authorizes and appropriates U.S. financial contributions to the IFIs. In response to the overwhelming demand for IFI resources, in March 2020 Congress accelerated authorizations that were under consideration in the FY2021 budget request to increase funding for the IMF, two World Bank lending facilities, and two African Development Bank lending facilities ( P.L. 116-136 ). Some of the policy actions under discussion to bolster the IFI response to the COVID-19 pandemic, such as IMF gold sales, IMF policies to bolster foreign reserves, and additional debt relief for low-income countries, would require congressional legislation. Some Members of Congress may seek to shape or exercise broader oversight of U.S. policy towards IFI policy changes as well as new IFI programs that could exceed $1 trillion.", "document_type": "crs"}
{"report": "Many Indo-Pacific nations have responded to China's growing willingness to exert its influence in the region and globally âas well as to the perception that the United States' commitment to the region may be weakening. In part those actions have fostered developing new strategies to strengthen their geopolitical position independent of the United States. Regional states have been concerned about numerous Chinese actions, including its extensive military modernization, its more assertive pursuit of maritime territorial claims and efforts to control international or disputed waters, placement of military assets on artificial islands it has created in the South China Sea, efforts to suppress international criticism or pushback through coercive diplomatic or economic measures, and its expanding global presence, including its military base at Djibouti. Economic dynamics may also be playing a role in governments' policymaking, as economic interdependence between China and virtually all its neighbors remains very strong, and the Belt and Road Initiative (BRI) may further deepen trade and investment links between China and regional states. That increased economic interdependence, coupled with China's increasing assertiveness and willingness to use economic levers for political reasons, may be heightening Indo-Pacific nations' strategic mistrust of Beijing. Other shifts affecting the geostrategic balance in the region include the rise of North Korea as a nuclear power, Japan's nascent reacquisition of power projection capabilities, and the introduction of new military technologies (e.g., drones, anti-ship missiles) that appear to challenge traditional elements of military power, which could potentially erode U.S. (and other large military powers') traditional military advantages. Indo-Pacific nations recently appear to be accelerating the adoption of hedging strategies, at least in part because of the Trump Administration's perceived retreat from the United States' traditional role as guarantor of the liberal international order. Understanding these strategies may be important for Congress as it addresses U.S. diplomatic, security, and economic interests in the region and exerts oversight over the Trump Administration's policies towards U.S. allies and partners. The Trump Administration has sent conflicting signals about its posture in Asia. The Administration's 2018 National Defense Strategy emphasizes the need to \"Strengthen Alliances and Attract New Partners.\" In addressing the need to \"expand Indo-Pacific alliances and partnerships\" the document states, \"We will strengthen our alliances and partnerships in the Indo-Pacific to a networked security architecture capable of deterring aggression, maintaining stability, and ensuring free access to common domains â¦ to preserve the free and open international system.\" Similarly, the Department of Defense Indo-Pacific Strategy Report: Preparedness, Partnerships, and Promoting a Networked Region of June 2019 calls for a \"more robust constellation of allies and partners.\" In an address to the U.S. Naval Academy in August 2019, Secretary of Defense Mark Esper described the Indo-Pacific as \"our priority theater\" and stated â¦ allies and partners want us to lead â¦ but to do that we must also be present in the region.â¦ Not everywhere, but we have to be in the key locations. This means looking at how we expand our basing locations, investing more time and resources into certain regions we haven't been to in the past. Counter to these statements' emphasis on allies and partners, however, the Trump Administration has appeared to some less-engaged on regional issues, sending lower-level officials to key regional summits, withdrawing from the proposed Trans-Pacific Partnership (TPP) trade agreement, and canceling joint exercises with South Korea. In addition, President Trump has openly questioned the value many of the United States' alliance relationships, particularly with Japan and South Korea. As a result, some observers note that U.S. allies and partners also may be increasingly concerned over aligning too closely with the United States at a time when the United States' commitment to the region is questioned, even as many in the region hope that the United States continues to play a dominant or balancing role in Asia. For many in Asia, the strategic picture has been complicated further by the Trump Administration's trade policies, which are sometimes perceived as asking partners to choose between the United States and Chinaâboth critical trade and investment relationships that have been crucial to their economic successes over the past few decades. In response to these developments, some allies and partners are expanding their defense budgets, embarking on major arms purchases, and looking to create new defense and security networks to strengthen their collective ability to maintain their independence from Chinese influence. Within this evolving context, regional states are adjusting their strategic calculations. A number of trends appear to be emerging across the Indo-Pacific: Several regional states have sought to develop new intra-Asian security partnerships to augment and broaden existing relationships. Japan, Australia, and India are among the most active in this regard; Numerous Asian states have adopted an \"Indo-Pacific\" conception of the region, strategically linking the Indian and Pacific Ocean regions. However, the concept remains vague and not all states agree on what it means; Many regional states have increased defense spending, although spending as a percentage of GDP has been relatively steady, and some have adopted more outward-looking defense strategies. Congress has sought to address questions about whether these developments present the United States with challenges and/or opportunities to promote U.S. interests in the Indo-Pacific, and to assess the efficacy of the Trump Administration's strategy towards the region. Some Members of Congress have also sought to demonstrate Congress's commitment to maintaining and expanding both alliance and other relationships in the Indo-Pacific. In December 2018, for instance, the 115 th Congress passed, and President Trump signed into law, the Asia Reassurance Initiative Act of 2018 (ARIA; P.L. 115-409 ), which provides a broad statement of U.S. policy for the Indo-Pacific region and establishes a set of reporting requirements for the executive branch regarding U.S. policy in the region. ARIA emphasizes the need to \"expand security and defense cooperation with allies and partners\" and to \"sustain a strong military presence in the Indo-Pacific region.\" It states that \"Without strong leadership from the United States, the international system, fundamentally rooted in the rule of law, may wither.... It is imperative that the United States continue to play a leading role in the Indo-Pacific.\" In addition to numerous pieces of legislation aimed at addressing challenges associated with China, the 116 th Congress has also introduced numerous pieces of legislation that seek to emphasize U.S. commitment to the region, including to U.S alliances and partnerships, and to guide U.S. policy. Relevant legislation includes: S. 2547 âIndo-Pacific Cooperation Act of 2019; S.Res. 183 âReaffirming the vital role of the United States-Japan alliance in promoting peace, stability, and prosperity in the Indo-Pacific region and beyond, and for other purposes; H.Res. 349âReaffirming the vital role of the United States-Japan alliance in promoting peace, stability, and prosperity in the Indo-Pacific region and beyond; S.Res. 67 âExpressing the sense of the Senate on the importance and vitality of the United States alliances with Japan and the Republic of Korea, and our trilateral cooperation in the pursuit of shared interests; H.Res. 127âExpressing the sense of the House of Representatives on the importance and vitality of the United States alliances with Japan and the Republic of Korea, and our trilateral cooperation in the pursuit of shared interests; S. 985 âAllied Burden Sharing Report Act of 2019; H.R. 2047 âAllied Burden Sharing Report Act of 2019; and H.R. 2123 âUnited States-India Enhanced Cooperation Act of 2019. Since Prime Minister Shinzo Abe delivered a speech before the Indian Parliament in 2007 during his first term, Japan has been at the forefront of promoting the concept of the Indian Ocean and Pacific Ocean regions as a single strategic space. Japan is driven, among other things, by its fear of China's increasing power and influence in the region. Although Sino-Japanese relations have stabilized in 2018 and 2019 following several years of heightened tensions, Tokyo's security concerns about China's intentions have been exacerbated by a territorial dispute over a set of islands in the East China Sea (known as the Senkakus in Japan and the Diaoyutai in China), where China has sought over the past decade to press its claims through a growing civilian and maritime law enforcement presence. Abe is reportedly anxious to establish a regional order that is not defined by China's economic, geographic, and strategic dominance, and has sought new partners who can offer a counterweight to China's clout. Expanding the region to include the South Asian subcontinentâsome claim that Abe himself coined the concept of the \"Indo-Pacific\"âbroadens the strategic landscape. Japan's insecurity is heightened by perceptions that the United States may be a waning power in the region. Japan wants the United States to remain a dominant presence, and the Trump Administration's Free and Open Indo-Pacific formulation asserts that the United States must demonstrate leadership and stay engaged. Japan's Free and Open Indo-Pacific strategy differs from the U.S. formulation in some ways, particularly in how the region is defined geographically. Tokyo has a broader view of the Indo-Pacific, encompassing not just the Indian Ocean but extending to the east coast of Africa while the U.S. concept does not. Japan and India are working together to develop an Asia Africa Growth Corridor (AAGC), which seeks to coordinate their efforts with other countries to develop regional economic linkages, connectivity, and networks between Asia and Africa. (The AAGC is also a component of the India Japan Joint Vision 2025 for the Indo-Pacific Region, a joint statement signed by the leaders of Japan and India in 2018 to deepen defense cooperation and to facilitate the sale of defense equipment from Japan to India. ) Because of constitutional limitations on Japan's military, Tokyo's Indo-Pacific focus is on infrastructure improvement, trade and investment, and governance programs, another key difference from the Trump Administration's Indo-Pacific strategy, which includes significant military and security elements. Despite legal limitations, the Abe government is seeking to increase its security cooperation as part of its Indo-Pacific strategy. In December 2018, Japan released a pair of documents that are intended to guide its national defense efforts, including the defense budget, over the next decadeâthe National Defense Pro gram Guidelines for FY2019 and B eyond and the Medium Term Defense Program ( FY2019 - FY2023 ) . With concerns over China and North Korea at their heart, the guidelines layout a continued dual strategy of strengthening Japan's own defense program while also strengthening security cooperation with the United States and other countries. The 2019 National Defense Program Guidelines show stark shifts in content from previous iterations. Importantly, the document emphasizes Japan's own defense efforts independent of the security cooperation with the United States, stating upfront that as a matter of national sovereignty \"Japan's defense capability is the ultimate guarantor of its security and the clear representation of the unwavering will and ability of Japan as a peace-loving nation.\" The document calls for enhancing Japan's capabilities in traditional security domains (land, air, and sea), such as with increasing the use of unmanned vehicles and operationally flexible Short Take-Off and Vertical Landing (STOVL) fighter aircraft. It also highlights the importance of \"new domains\" such as cyber, space, and the electromagnetic spectrum. Overall, Japan aims for efforts with the United States to remain on a similar trajectory as the past, but it places more emphasis on cooperation with Australia and India, and less with South Korea. Japanese leadersâparticularly Prime Minister Shinzo Abeâhave deepened defense cooperation with the United States for the past two decades as part of their efforts to ensure China does not become a regional hegemon. Among Abe's efforts to strengthen the alliance are updating the bilateral defense guidelines, re-interpreting a constitutional clause to allow for collective self-defense activities, pushing legislation through the Japanese parliament to allow for broader engagement with the United States, and pressing for the construction of a controversial U.S. Marine air base in Okinawa. Japan continues to put its alliance with the United States at the center of its security strategy, despite some significant differences with U.S. foreign policy under the Trump Administration that could threaten Tokyo's desire to keep the United States engaged in the region. Many in Japan are anxious that President Trump's approach to dealing with North Korea may marginalize Tokyo's primary concerns with North Korea's short and medium-range missile capabilities and the fate of several Japanese nationals abducted by North Korean agents in the 1970s and 1980s. Japan has also expressed disappointment with the U.S. decision to withdraw from the Paris Climate Accord. Japan was also dismayed at the U.S. decision to withdraw from the TPP in 2017. Japan views the multilateral trade agreement as a fundamental element of its Indo-Pacific strategy, and led the effort to salvage the agreement, now known as the TPP-11 (or as the Comprehensive and Progressive Agreement for the Trans-Pacific Partnership, or CPTPP). The pact entered into force at the end of 2018. Although Japan reached a limited trade agreement with the United States in 2019, it received no assurance that the Trump Administration will not impose tariffs on its auto industry. In 2020 Japan is due to re-negotiate its burden sharing arrangement that offsets the cost of stationing U.S. military forces on its territory and anticipates that the Trump Administration will demand a significant increase in Japan's contribution. Japan's supplementary 2019 Medium Term Defense Program lays out a detailed picture of intended activities. The Program projects a five-year expenditure plan that would cost Â¥27,470 billion (about US$250 billion ), although it also suggests the annual defense budget target would be Â¥25,500 billion, or US$232 billion. The 2019 Medium Term Defense Program indicates that the majority of the increased budget will be spent on more up-to-date weapons technology, such as the continued replacement of old F-15 jets with F-35As and the introduction of STOVL F-35s. Another major expense is plans to procure a new type of destroyer and to retrofit one of their current destroyer-class vessels (Izumo-class helicopter carrier) with capabilities to accommodate the STOVL aircraft. Further, the program calls for the procurement of a variety of missiles and missile-defense systems. In this area Japan has already agreed to expand its Aegis ballistic missile defense systems at a reported cost of $2.15 billion , announced plans to build new medium- and long-range cruise missiles , and agreed to a much smaller purchase joint strike missiles that will give it land-attack capabilities from the air for the first time. These advanced systems enhance Self Defense Forces (SDF, Japan's name for its military) capabilities and underscore Japan's commitment to shoulder more of its security needs instead of relying on U.S. protection. The Program calls for \"reorganization of the major SDF units,\" and personnel levels are expected to increase by about three percent since the 2000s. Japan's defense relationships with countries other than the United States are less developed but Japan is actively working to expand its security partnerships beyond the United States. Some analysts suggest these efforts reflect concern about the durability of the U.S. alliance and a general need to diversify security partners. Ties with Australia have become increasingly institutionalized and regular. Australia is Japan's top energy supplier, and a series of economic and security pacts have been signed under Abe, including a $40 billion gas project, Japan's biggest ever foreign investment. In 2007, the two nations reached agreement on a Joint Declaration on Security Cooperation , and in 2017, Tokyo and Canberra signed an updated acquisition and cross-servicing agreement (ACSA). As another U.S. treaty ally, Australia uses similar practices and equipment, which may make cooperation with Japan more accessible. Although Japan had some difficult World War II history with Australia , Abe himself has made efforts to overcome this potential obstacle to closer defense ties. In 2014, during the first address to the Australian parliament by a Japanese Prime Minister, Abe explicitly referenced \"the evils and horrors of history\" and expressed his \"most sincere condolences towards the many souls who lost their lives. \" In 2018, Abe visited Darwin, the first time a Japanese leader visited the city since Imperial Japanese forces bombed it during World War II. In 2018, Japan and Australia \"reiterated their determination to work proactively together and with the United States and other partners to maintain and promote a free, open, stable and prosperous Indo-Pacific founded on the rules-based international order. \" Despite advancements, Canberra and Tokyo do have some differences; for example they have struggled to conclude a visiting forces agreement over a variety of concerns, including Japan's adherence to the death penalty, which could mean that an Australian soldier convicted of a heinous crime could face a death sentence, which contravenes Australia's legal system. The concept of the Free and Open Indo-Pacific is particularly appealing to Japan because of its strong relationships with India and Australia, and Abe has pursued cooperation with these maritime democracies and the United States as part of the \"quad\" grouping. During Abe's first stint as Prime Minister in 2006-2007, he pursued tighter relations with India, both bilaterally and as part of his \"security diamond\" concept. Under Abe and Prime Minister Narendra Modi, interest in developing stronger ties intensified, and the two countries have developed more bilateral dialogues at all levels of government, supported each other on areas of mutual concern, and bolstered educational and cultural exchanges. Analysts point to mutual respect for democratic institutions, as well as shared strategic and economic interests, that have allowed the relationship to flourish. Japan and Indiaâboth of which have long-standing territorial disputes with Chinaâhave sought to increase their bilateral cooperation in apparent response to alarms raised by China's actions over the past decade perceived as too assertive or even aggressive. Japanese companies have made major investments in India in recent years, most notably with the $100 billion Delhi-Mumbai Industrial Corridor project, and Japanese investment already plays a central role in providing regional alternatives to China's BRI. In October 2018 Prime Ministers Abe and Modi reaffirmed their commitment to bilateral economic and defense cooperation at the 13 th annual India Japan Summit. Japan and India have expanded joint military exercises to include army and air force units in addition to the annual Malabar naval exercise. Many analysts see engaging India in a broader security framework as the primary challenge to establishing a quadrilateral arrangement. The United States has treaty alliances with both Japan and Australia, and Japan and Australia have also developed a sophisticated security partnership in the past decade. India, however, appears to have been more reluctant to sign on to international commitments from its legacy as a \"non-aligned movement\" state and is more reluctant to antagonize Beijing. Japan has maintained a consistent level of economic and diplomatic engagement with ASEAN countries for several decades. Although more limited, Japan also has expanded the security dimension of its relationships with several Southeast Asian countries under Abe's stewardship. Maritime security has been a particular focus with Vietnam, the Philippines, and Malaysia. Japan has participated in a multitude of regional fora that address maritime issues and has deployed its Coast Guard to work with ASEAN countries. Japan promotes cooperation and provides resources to address anti-piracy, counter-terrorism, cyber security, and humanitarian assistance and disaster response in Southeast Asia. Japan also has sought to deepen ties with the North Atlantic Treaty Organization (NATO). Japan is considered NATO's longest standing partner outside of Europe, and recently has participated in exercises in the Baltic Sea with the Standing NATO Maritime Group One . With an emphasis on maritime security, Japan participates in the Partnership Interoperability Platform (which seeks to develop better connectivity b etween NATO and partner forces) , provides financial support for efforts to stabilize Afghanistan, and takes part in assorted other NATO capacity building programs . New Delhi broadly endorses the Free and Open Indo-Pacific strategy pursued by Washington, and India benefits from the higher visibility this strategy provides for India's global role and for its immediate region. Despite its interest in working more closely with the United States, India has not fully relinquished the \"nonalignment\" posture it maintained for most of the Cold War (more recently pursuing \"strategic autonomy\" or a \"pragmatic and outcome-oriented foreign policy\" ). It continues to favor multilateralism and to seek a measure of balance in its relations with the United States and neighboring China. New Delhi sees China as a more economically and militarily powerful rival, and is concerned about China's growing presence and influence in South Asia and the Indian Ocean region. Thus, Prime Minister Modi has articulated a vision of a free, open, and inclusive Indo-Pacific, and India has engaged Russia, Japan, Australia, and other Indo-Pacific countries as potential balancers of China's influence while remaining wary of joining any nascent security architectures that could antagonize Beijing. While India endorses the United States' Free and Open Indo-Pacific strategy, its own approach differs in significant ways. [I]t gives equal emphasis to the termÂ 'inclusive' in the pursuit of progress and prosperity, including all nations in this geography andÂ \"others beyond who have a stake in it\"; it does not see the region as a strategy or as a club of limited members; it does not consider such a geographical definition as directed against any country; nor as a grouping that seeks to dominate. Some observers have described India's foreign policy under Modi as having new dynamism as India seeks to transform its Look East policy into an Act East policy. The inaugural Singapore-India-Thailand Maritime Exercise (SITMEX) was held in the Andaman Sea in September 2019 and has been viewed by observers as \"a tangible demonstration of intra-Asian security networking.\" By some accounts, India is poorly suited to serve as the western anchor of the Free and Open Indo-Pacific, given its apparent intention to maintain strategic autonomy, and its alleged lack of will and/or capacity to effectively counterbalance China. Moreover, many in India consider a Free and Open Indo-Pacific conception that terminates at India's western coast (as the Trump Administration's conception appears to do) to be \"a decidedly U.S.-centric, non-Indian perspective\" that omits a huge swath of India's strategic vista to the west. Most analysts consider that the Modi/BJP victory in spring 2019 parliamentary elections has empowered the Indian leader domestically and on the global stage. Given Modi's reputation for a \"muscular\" foreign policy, this could lead to a greater willingness to resist Chinese assertiveness and move closer to the United States while not abandoning multilateral approaches. Yet challenges with the United States loom: many Indian strategic thinkers say their country's national interests are served by continued engagement with Russia and Iran, and thus contend there will be limits to New Delhi's willingness to abide \"America's short-term impulses.\" While New Delhi generally welcomes the U.S. Free and Open Indo-Pacific strategy, Indian leaders continue to demur from confronting China in most instances. Since 2009, India's budget has grown at an average annual rate of 9%. However, as a percentage of the country's GDP, defense expenditures have decreased. More than half (51%) of India's 2019-2020 defense budget is allocated for salaries and pensions, including 70% for the Indian Army. While military modernization efforts continue, they are not taking place at the rate called for by many Indian defense analysts. Much of the country's defense equipment falls into the \"vintage\" category, including more than two-thirds of the Army's wares. Over the past decade capital outlays (which include procurement funds) have declined as a proportion of the total defense budget. This decline has contributed to a slowing of naval and air force acquisitions, in particular, and a continued heavy reliance on defense imports (about 60% of India's total defense equipment is imported, the bulk from Russia). Stalled reforms in the defense sector have delayed modernization efforts, which some analysts say are already hampered by ad hoc decision making and a lack of strategic direction. In the words of one senior observer, \"In fact, it is India's dependence on arms importsâand their corrupting roleâthat are at the root of the Indian armed forces' equipment shortages and the erosion in the combat capabilities.\" New Delhi seeks to diversify its defense suppliers, recently making more purchases from Israel and the United States, among others. India is pursuing bilateral relations with Japan and Australia in a manner largely consistent with the strategic objectives of the Trump Administration's Free and Open Indo-Pacific strategy, while India's bilateral relations with China, Russia and Iran could present challenges for that strategy. Despite India's interest in engaging with other regional powers in the Indo-Pacific, the 2019 Modi/BJP election win is expected to see a continuation of New Delhi's multilateralist approach to international politics in Asia, continuing to pursue stable relations with all powers, including China and Russia. India is a full member of the Shanghai Cooperation Organization (SCO), a regional grouping that also includes China, Russia, Pakistan and several Central Asian nations, and conducts regular trilateral summits with China and Russia. It has been resistant to outright confrontation with Beijing, even as it resists Chinese \"assertiveness\" in South Asia. India's deepening \"strategic partnership\" with Japan is a major aspect of New Delhi's broader \"Act East\" policy and is a key axis in the greater Indo-Pacific strategies broadly pursued by all three governments now participating in a newly established U.S.-Japan-India Trilateral Dialogue. U.S., Indian, and Japanese naval vessels held unprecedented combined naval exercises in the Bay of Bengal in 2007, and trilateral exercises focused on maritime security continue. India-Australia defense engagement is underpinned by the 2006 Memorandum on Defence Cooperation and the 2009 Joint Declaration on Security Cooperation. India and Australia also develop their maritime cooperation through the AUSINDEX biennial naval exercise. India's relations with China have been fraught for decades, with signs of increasing enmity in recent years. Areas of contention include major border and territorial disputes, China's role as Pakistan's primary international benefactor, the presence in India of the Dalai Lama and a self-described Tibetan \"government,\" and China's growing influence in the Indian Ocean region, which Indians can view as an encroachment in their neighborhood. New Delhi is ever watchful for signs that Beijing seeks to \"contain\" Indian influence both regionally and globally. China's BRIâwith \"flagship\" projects in Pakistanâis taken by many in India as an expression of Beijing's hegemonic intentions. Despite these multiple areas of friction in the relationship, China is India's largest trade partner, and New Delhi's leaders are wary of antagonizing their more powerful neighbor and emphasize an \"inclusive\" vision for the Indo-Pacific region. There is cooperation on some issues, including on global trade and climate change. A mid-2018 summit meeting in Wuhan, China, was seen as a mutual effort to reset ties and \"manage differences through dialogue;\" this \"Wuhan spirit\" was carried into a subsequent informal summits, the most recent held in Chennai, India, in October 2019. India maintained close ties with Russia throughout much of the Cold War, and it continues to rely on Russia for the bulk of its defense imports, as well as significant amounts of oil and natural gas. With the 2017 enactment of the Countering America's Adversaries Through Sanctions Act (CAATSA, P.L. 115-44 ), India's continued major arms purchases from Russiaâmost prominently a multi-billion-dollar deal to purchase the Russian-made S-400 air defense systemâcould trigger U.S. sanctions. India has also had historically friendly relations with Iran, a country that lately has supplied about 10-12% of India's energy imports. It also opposes Tehran's acquisition of nuclear weapons and supports the Joint Comprehensive Plan of Action. Historically averse to unilateral (non-UN) sanctions, New Delhi until recently enjoyed an exemption from U.S. efforts targeting Iran's energy sector. In April 2019, the Trump Administration announced an end to such exemptions, and India is reported to have fully ceased importation of Iranian oil in early May, while informing Washington that the move \"comes at a cost.\" New Delhi considers its $500 million investment in Iran's Chabahar port crucial to India's future trade and transit with Central Asia (the project is exempt from U.S. sanctions ). Australia is responding to increasing geopolitical uncertainty and the rise of China in the Indo-Pacific region by maintaining a strong alliance relationship with the United States, increasing defense spending, purchasing key combat systems from a variety of suppliers, and seeking to develop strategic partnerships with Japan, India and others. Australia, situated between the Indian and Pacific Oceans, increasingly thinks of itself as deeply embedded in the Indo-Pacific region. This is evident in the emphasis on the Indo-Pacific concept in the Australian Government's 2017 Foreign Policy White Paper. While Australia's focus early in its history was on its place within the British Empire and the \"tyranny of distance\" that placed it on the periphery of the world for much of its history, it now finds itself situated in a region that has accounted for the majority of global economic growth over the past two decades. Leading Australian strategic thinkers view the Indo-Pacific as a largely maritime, strategic, and geo-economic system \"defined by multi-polarity and connectivity â¦ in a globalized world.\" While Australia shares the values of the Free and Open Indo-Pacific concept, and many in Australia are concerned with China's growing influence in Australia, the South Pacific and the Indian Ocean, it is Australia's geography, as well as its broader interests, that are at the core of its Indo-Pacific strategy. Australian Minister for Defence Linda Reynolds stated: Australia's IndoâPacific vision reflects our national character and also our very unique sensibilities.Â We want a region that is open and inclusive; respectful of sovereignty; where disputes are resolved peacefully; and without force or coercion. We want a region where open markets facilitate the free flow of trade, of capital and of ideas and on where economic and security ties are being continually strengthened. We want an Indo-Pacific that has ASEAN at its heart and is underpinned by the rule of law with the rights of all states being protected. Australia's vision is also one that includes a fully-engaged United States. Popular Australian attitudes towards China have changed in recent years. Australian perceptions of China have been shaped, to a large extent, by the economic opportunity that China represents. Revelations regarding China's attempts to influence Australia's domestic politics, universities, and media, have negatively influenced Australians' perceptions of China and the Australian government is undertaking a number of measures to counter China's growing influence in the country. On June 28, 2018, the Australian parliament passed new espionage, foreign interference and foreign influence laws \"creating new espionage offences, introducing tougher penalties on spies and establishing a register of foreign political agents.\" In August 2018, Australia blocked Chinese telecommunications firm Huawei from involvement in Australia's 5-G mobile network. Canberra also has been focused on Chinese political engagement, investment, and influence operations globally, particularly in the Pacific Islands, a region Australia considers strategically important to its own national interest. In responding to reports of China's reported efforts to establish a military presence in Vanuatu, former Australian Prime Minister Malcolm Turnbull stated, \"We would view with great concern the establishment of any foreign military bases in those Pacific island countries.\" Australia has also been concerned about the impact of Chinese development aid to Pacific island states, which, as tracked by the Australian Lowy Institute Mapping Foreign Assistance in the Pacific project, increased significantly from 2006 to 2016, with cumulative aid commitments totaling $1.78 billion over that period. It has responded with a significant policy pivot to step up its own focus on the South Pacific. This is demonstrated by a number of recent actions, including Prime Minister Morrison's visit to Vanuatu and Fiji, increased aid from Australia to Pacific island states, and Australia, Papua New Guinea and the United States' joint development of the Lombrum naval facility on Manus Island in Papua New Guinea. The Pacific Islands receive 31% of Australia's foreign assistance budget of $3.1 billion. Australia, New Zealand, and the United States held an inaugural Pacific Security Cooperation Dialogue in June 2018 \"to discuss a wide range of security issues and identify areas to strengthen cooperation with Pacific Island countries on common regional challenges.\" Responding to China's growing influence is a key driver of Canberra's Indo-Pacific strategy, and Australia has taken a number of steps to develop its economic engagement in the Pacific both independently and in coordination with the U.S. and Japan. Australia, Japan and the United States have shared understandings of the need for developing sustainable and economical alternatives to China's Belt and Road geo-economic strategy even as the three nations have somewhat different perspectives on the Free and Open Indo-Pacific concept. By some estimates, there is a need for $26 trillion in infrastructure development in Asia through 2030. Australia's 2017 Department of Foreign Affairs and Trade (DFAT) white paper pointed out that: Even as growth binds the economies of the Indo-Pacific, trade and investment and infrastructure development are being used as instruments to build strategic influence, as well as to bring commercial advantage. In the past, the pursuit of closer economic relations between countries often diluted strategic rivalries. This geo-economic competition could instead accentuate tension. Export Finance Australia provides loans, guarantees, bonds, and insurance options to \"enable SMEs, corporates and governments to take on export-related opportunities, and support infrastructure development in the Pacific region and beyond.\" In February 2018, the Overseas Private Investment Corporation and Australia's Department of Foreign Affairs and Trade signed a bilateral Memorandum of Understanding on joint infrastructure investment in the Pacific. In November 2018, the United States, Australia and Japan moved forward with their coordinated effort to address regional infrastructure needs. Australia's Department of Foreign Affairs and Trade (DFAT) and Export Finance and Insurance Corporation (Efic), the Japan Bank for International Cooperation (JBIC), and the U.S. Overseas Private Investment Corporation (OPIC) signed a Trilateral Memorandum of Understanding (MOU) to operationalize the Trilateral Partnership for Infrastructure Investment in the Indo-Pacific.â¦ Through the MOU, we intend to work together to mobilize and support the deployment of private sector investment capital to deliver major new infrastructure projects, enhance digital connectivity and energy infrastructure, and achieve mutual development goals in the Indo-Pacific. This effort has been described as \"an obvious reaction to China's regional ambitions.\" Australia also supports the Pacific Islands Forum, a multilateral organization aimed at enhancing cooperation among Pacific governments. A traditional cornerstone of Australia's strategic outlook is the view that the United States is Australia's most im portant strategic partner and a key source of stability in the Asia-Pacific region. The ongoing strength of the bilateral defense relationship with the U.S., as well as growing multilateral connections, was demonstrated through the July 2019 Talisman Sabre military exercise that included 34,000 personnel from the U.S. and Australia as well as embedded troops from Canada, Japan, New Zealand and the United Kingdom and observers from India and South Korea. In 2018, however, heightened concern emerged in Australia about its relationship with the United States under President Trump's leadership. At the same time, Australians' support for the Australia-New Zealand United States (ANZUS) Alliance remains high. A 2019 Lowy Institute poll found that 73% of Australians feel that the alliance with the U.S. \"is a natural extension of our shared values and ideals.\" One recent study conducted at the United States Studies Centre at the University of Sydney is concerned that the United States \"no longer enjoys military primacy in the Indo-Pacific and its capacity to uphold a favourable balance of power is increasingly uncertain.\" It recommends that, \"A strategy of collective defence is fast becoming necessary as a way of offsetting shortfalls in America's regional military power and holding the line against rising Chinese strength.\" The 2019 Australia-U.S. Ministerial (AUSMIN) consultations \"emphasized the need for an increasingly networked structure of alliances and partnerships to maintain an Indo-Pacific that is secure, open, inclusive and rules-based.\" It also \"welcomed a major milestone in the Force Posture Initiatives, as the rotational deployment of U.S. Marines in Darwin has reached 2,500 personnel in 2019. The principals emphasized the value of Marine Rotational Force â Darwin (MRF-D) in strengthening the alliance, and in deepening engagement with regional partners.\" MRF-D was a key project of the Obama Administration's \"rebalance to Asia\" strategy. Following the 2019 AUSMIN meeting, Australian Prime Minister Scott Morrison announced on August 21 that Australia would join the U.S.-led effort to protect shipping in the Strait of Hormuz. Australia's budget for 2019-20 focused on building defense by â¦ enhancing our regional security, building defence capability and supporting Australia's sovereign defence industry.â¦ The Budget maintains the Government's commitment to grow the Defence budget to two per cent of GDP by 2020â21. The Government will allocate Defence [A]$38.7 billion in 2019-20. Over the decade to 2028 the Australian government is investing more than A$200 billion in defense capabilities . (1A $ =0.69US $ ) This investment includes a number of key weapons systems including the F-35 Joint Strike Fighter, P-8A Poseidon maritime surveillance aircraft, and upgrades to the EA-18G Growler electronic attack aircraft and E-7A Wedgetail battle space management aircraft. The Royal Australian Air Force took delivery of 2 F-35A Joint Strike fighters in December 2018. These are the first of a total of 72 F-35A aircraft ordered by Australia. Australia has also moved to acquire nine British BAE Systems designed Hunter class frigates valued at A$35 billion. The purchase of the Hunter class frigates is expected to improve interoperability between the Australian and British navies while enhancing British ties to a Five Power Defence Arrangement (FPDA) partner. Australia will also purchase 12 Shortfin Barracuda submarines designed by DCNS of France for A$50 billion. Australi a is also acquiring 211 Combat R econnaissance Vehicles and unmanned maritime patrol aircraft including the Triton. Shifts in the geostrategic dynamics of Asia are leading Australia to hedge, increasingly by partnering with other Asian states, against the relative decline of U.S. engagement in the region. Australian efforts to develop broader security cooperation relationships can be seen in the AUSINDEX exercise between Australia and India, through the Pacific Endeavor naval deployment, which visited India, Indonesia, Malaysia, Singapore, Sri Lanka, Thailand and Vietnam, and through the inclusion of Japan in the U.S.-Australia Talisman Sabre exercise for the first time in 2019. Increasing numbers of high level visits and joint military exercises between Australia and India point to common concerns \"about a rising China and its strategic consequences on the Indo-Pacific strategic order.\" Such developments also mark change in the regional security architecture which has been grounded in the post-war San Francisco \"hub-and-spoke\" system of U.S. alliances. This shift towards security networks in which middle powers in Asia increasingly rely on each other could build on and complement these states' ties with the United States. In its white paper outlining its strategy for pursuing deeper partnerships in the Indo-Pacific, the government noted, The IndoâPacific democracies of Japan, Indonesia, India and the Republic of Korea are of first order importance to Australia, both as major bilateral partners in their own right and as countries that will influence the shape of the regional order. We are pursuing new economic and security cooperation and people-to-people links to strengthen these relationships. Australia will also work within smaller groupings of these countries, reflecting our shared interests in a region based on the principles ... Australia remains strongly committed to our trilateral dialogues with the United States and Japan and, separately, with India and Japan. Australia is open to working with our IndoâPacific partners in other plurilateral arrangements. Another recent example of Australia's efforts to develop new economic and security cooperation with regional states includes Australia's developing relationship with Vietnam. Bilateral trade between Australia and Vietnam grew by 19.4% in 2018 to $7.72 billion. Australia and Vietnam officially upgraded their relationship to a \"Strategic Partnership\" during a visit to Australia by Vietnamese Prime Minister Nguyen Xuan Phuc in March 2018 and Australian naval ships visited Cam Ranh Bay in May 2019 as part of increasing naval cooperation between the two nations. This was followed by a visit by Australian Prime Minister Scott Morrison to Vietnam in August 2019. During the official visit, Morrison and Prime Minister Nguyen Xuan Phuc reportedly discussed rising tensions in the South China Sea. At their joint news conference, Phuc stated, \"We are deeply concerned about the recent complicated developments in the East Sea (South China Sea) and agree to cooperate in maintaining peace, stability, security, safety and freedom of navigation and overflight.\" In recent years, some European countries, particularly France and the United Kingdom (UK), have deepened their strategic posture in the Indo-Pacific. Although both countries remain relatively modest powers in the region, a growing French and British presence can support U.S. interests. Through their strategic relations, arms sales, and military-to-military relationships, France and the UK have the ability to strengthen the defense capabilities of regional states and help shape the regional balance of power. In recent years, France and the UK are networking with like-minded Indo-Pacific nations to bolster regional stability and help preserve the norms of the international system. These efforts reinforce the United States' goal of maintaining regional stability by strengthening a collective deterrent to challenges to international security norms. Such challenges include China's construction and militarization of several artificial islands in the South China Sea, its increasingly aggressive behavior in asserting its maritime claims, and the extension of PLA Navy patrols into the Indian Ocean. Additionally, some European countries have dispatched naval vessels to the East China Sea to help enforce United Nations Security Council resolutions against North Korea, providing opportunities for cooperation with the United States and other U.S. partners on other issues, such as the South China Sea. France has extensive interests in the Indo-Pacific region. These include 1.6 million French citizens living in French Indo-Pacific territories and an extensive exclusive economic zone (EEZ) of 9 million square kilometers derived from those territories. France has regional military installations in its territories as well as in Djibouti and the UAE and reportedly sends its warships into the South China Sea. In total, about 7,000 French military personnel are deployed to five military commands in the region. France is part of the FRANZ Arrangement with Australia and New Zealand and is a member of the Quadrilateral Defense Coordination Group with Australia, New Zealand, and the United States. The French Territory of New Caledonia, which voted to remain part of France in a November 4, 2018, referendum, has a population of approximately 270,000 and 25% of the world's nickel reserves. In the lead-up to the referendum, French President Emmanuel Macron stated \"in this part of the globe China is building its hegemony â¦ we have to work with China â¦ but if don't organize ourselves, it will soon be a hegemony which will reduce our liberties, our opportunities which we will suffer.\" Macron reportedly is planning to organize a meeting of Pacific island nations in 2020. Although France and the United Kingdom continue to be the European countries with the most far-reaching presence in the Indo-Pacific, some analysts point to several factors that might limit the French government's ability to realize its growing ambitions in the region. These include a crowded strategic environment in which other countries are increasingly vying for regional influence; a domestic climate of weak economic growth and budgetary pressures on defense forces that are carrying out prolonged military operations in Africa and the Middle East, as well as counter-terrorism operations in mainland France; and a continued desire to maintain sound economic and diplomatic relations with China. France has long been engaged in the Indo-Pacific region, but its defense activities have deepened in recent years. It is maintaining existing ties with its territories in the South Pacific and the Indian Ocean while developing strategic relations with key regional states including India, Australia, Japan, and Vietnam. A number of factors are contributing to France's growing ambitions in the region, including concerns about China's growing influence. The French government's July 2019 defense strategy for the Indo-Pacific identifies the following strategic dynamics characterizing the current geopolitical landscape in the region: The Structuring effect of the China-U.S. competition, which causes new alignments and indirect consequences;The decline of multilateralism, which results from diverging interests, challenge to its principles and promotion of alternative frameworks;The shrinking of the geostrategic space and the spillover effects of local crises to the whole region. In response to these dynamics, the French government aims to reaffirm its strategic autonomy, the importance of its alliances, and its commitment to multilateralism. The government's stated strategic priorities in the region are: Defend and ensure the integrity of [France's] sovereignty, the protection of [French] nationals, territories and EEZ;Contribute to the security of regional environments through military and security cooperation;Maintain free and open access to the commons, in cooperation with partners, in a context of global strategic competition and challenging military environments;Assist in maintaining strategic stability and balances through a comprehensive and multilateral action. France and India expanded their strategic partnership during Macron's March 2018 visit to India. India and France have agreed to hold biannual summits, signed an Agreement Regarding the Provision of Reciprocal Logistics Support, and \"agreed to deepen and strengthen the bilateral ties based on shared principles and values of democracy, freedom, rule of law and respect for human rights.\" Among other agreements, the two governments issued a Joint Strategic Vision of India-France Cooperation in the Indian Ocean Region which states, \"France and India have shared concerns with regard to the emerging challenges in the Indian Ocean Region.\" India signed a deal with France to purchase 36 Dassault Rafale multi-role fighter aircraft in 2016 for an estimated $8.7 billion. France and India also hold the annual Varuna naval exercise. France is also developing its bilateral strategic and defense relationships with Australia, Japan, and Vietnam. While visiting Australia in May 2018, Macron stated that he wanted to create a \"strong Indo-Pacific axis to build on our economic interests as well as our security interests.\" Several agreements were signed during Macron's visit to Australia, and Australia and France agreed to work together on cyberterrorism and defense. French company DCNS was previously awarded an estimated $36.3 billion contract to build 12 submarines for Australia. Australia and France held their inaugural Defense Ministers meeting in September 2018. French President Macron and Japanese Prime Minister Abe agreed to increase their cooperation to promote stability in the Indo-Pacific during Abe's visit to France in October 2018. France and its former colony Vietnam signed a Defense Cooperation Pact in 2009, and upgraded relations to a Strategic Partnership in 2013. A detachment of French aircraft visited Vietnam in August 2018 after taking part in exercise Pitch Black in Australia. The UK also appears to be shifting its external focus to place relatively more emphasis on the Indo-Pacific. The UK's pending withdrawal from the European Union (\"Brexit\") may drive it to seek expanded trade relations in the Indo-Pacific region. Speaking to the Shangri La Dialogue in Singapore in 2018, then-UK Secretary of State for Defence Gavin Williamson stated: Standing united with allies is the most effective way to counter the intensifying threats we face from countries that don't respect international rules. Together with our friends and partners we will work on a more strategic and multinational approach to the Indian Ocean regionâfocusing on security, stability and environmental sustainability to protect our shared prosperity. In 2018, three Royal Navy ships were deployed to the Indo-Pacific region and in April 2018, the UK opened a new naval support facility in Bahrain that will likely be capable of supporting the new aircraft carriers HMS Queen Elizabeth and HMS Prince of Wales . It is reported that HMS Queen Elizabeth could be deployed to the Pacific soon after entering active service in 2020. In August 2018, the HMS Albion sailed near the disputed Paracel Islandsâwaters that China considers its territorial seas but which are also claimed by others in a sovereignty dispute. A Royal Navy spokesman stated that \"HMS Albion exercised her rights for freedom of navigation in full compliance with international law and norms.\" China strongly protested the operation, describing it as a provocation. The UK has Commonwealth ties to numerous states across the Indo-Pacific littoral. UK forces participate in annual exercises of the Five Power Defence Arrangement (FPDA), a regional security group of Australia, Malaysia, New Zealand, Singapore, and the UK that was established in 1971. The UK also has a battalion of Gurkha infantry based in Brunei. The UK opened new High Commissions in Vanuatu, Tonga, and Samoa in 2019, and signed a new Defence Cooperation Memorandum of Understanding with Singapore on the sideline of the 2018 Shangri-La Dialogue. In December 2018, then-Defence Secretary Gavin Williamson generated headlines with an interview in which he stated the UK would seek new military bases in Southeast Asia; observers speculated that Brunei and Singapore would be the most likely locations. In 2013, Australia and the UK signed a new Defence and Security Cooperation Treaty that provides an enhanced framework for bilateral defense cooperation. The treaty builds on longstanding defense cooperation through the FPDA and intelligence cooperation through the Five Eyes group that also includes Canada, New Zealand, and the United States. Australia has also signed an agreement with UK defense contractor BAE Systems to purchase nine new Type 26 frigates in a deal worth an estimated $25 billion. In August 2017, the UK and Japan agreed on a Joint Declaration on Security Cooperation pledging to enhance the two countries' global security partnership. The two nations also hold regular Foreign and Defense Ministerial Meetings. Then-British Foreign Secretary Jeremy Hunt met with Japanese Foreign Minister Taro Kono in Tokyo in September 2018 and Kono welcomed the further presence of the UK in the Indo-Pacific region. In September 2018, the HMS Argyll and Japan's largest warship, the Kaga helicopter carrier, held exercises in the Indian Ocean and in October 2018, the UK and Japan held a joint army exercise in central Japan. Alongside indications of the UK's increasing focus on the region, observers also note that resource constraints and competing priorities could limit the degree to which the UK reengages with the Indo-Pacific. Bilateral cooperation, such as the participation of UK forces in France's 2018 Jeanne d'Arc naval operation in the Asia-Pacific, could potentially develop into a platform whereby other European countries might become more engaged. At the same time, regional states may view a more engaged Europe as a potential alternative to the U.S. as they hedge against a rising China and feel uncertainty U.S. leadership in the region. The 10 members of the Association of Southeast Asian Nations (ASEAN), Southeast Asia's primary multilateral grouping, see a range of challenges resulting from the region's evolving strategic dynamics. Many Southeast Asian observers are unsettled by the prospect of extended strategic and economic rivalry between the United States in China, and the effect it would have on stability and economic growth in the region. New formulations of an Indo-Pacific region have raised concern for some in ASEAN, as they could lead to new diplomatic and security architectures that may weaken ASEAN's role in regional discussions or may not include all ASEAN's members. ASEAN as a grouping is constrained by its members' widely diverging views of their strategic and economic interests, and by the group's commitment to decision-making via consensus. However, ASEAN's individual members have responded to new regional dynamics in various ways. Many have expanded defense spending to deepen their own capabilities and hedge against uncertainties including those caused by China's rise. Some, particularly Indonesia, have rhetorically adopted Indo-Pacific visions of the region, but these have not markedly changed substantive strategic postures. In July 2019, ASEAN's leaders agreed to a five-page statement called the ASEAN Outlook on the Indo-Pacific. Some observers noted that ASEAN's statement was likely driven by other \"Indo-Pacific\" plans from the United States, Japan, and India, and by the group's desire not to be sidelined in the development of new ideas of Asian regionalism. ASEAN has long seen itself at the center of Asia's multilateral diplomacyâa concept the group's members refer to as \"ASEAN centrality.\" Founded in part as a forum for dialogue that would prevent intra-regional conflict and help protect member states from great power influence, it has not traditionally taken a major security role, but rather has seen itself as a diplomatic hub that convenes other powers to discuss security and economic issues. Over the past few decades, East Asia's regional institutions have almost all centered around ASEAN as a \"neutral\" convening power. U.S. Administration officials have sought to reassure ASEAN of its continued importance in the Indo-Pacific formulation. \"ASEAN is literally at the center of the Indo-Pacific,\" Secretary of State Mike Pompeo said in July 2018, \"and it plays a central role in the Indo-Pacific vision that America is presenting.\" The Indo-Pacific Outlook statement sought to define a role for ASEAN in shaping Indo-Pacific diplomatic, security, and economic arrangements. It welcomed the linkage of the Asia-Pacific and Indian Ocean regions, and stated that \"it is in the interest of ASEAN to lead the shaping of their economic and security architectureâ¦. This outlook is not aimed at creating new mechanisms or replacing existing ones; rather it is an outlook intended to enhance ASEAN's community building process and to strengthen and give new momentum for existing ASEAN-led mechanisms.\" The statement did envision a role for ASEAN to \"develop, where appropriate, cooperation with other regional and sub-regional mechanisms in the Asia-Pacific and Indian Ocean regions on specific areas of common interests.\" The statement listed four areas of cooperation for the nations of the Indo-Pacific: maritime cooperation; efforts to improve connectivity; efforts to meet the 2030 U.N. Agenda for Sustainable Development; and economic cooperation in areas such as trade facilitation, the digital economy, small and medium sized enterprises, and addressing climate change and disaster risk reduction and management. ASEAN convenes and administratively supports a number of regional forums that include other governments, including the United States, such as the 27-member ASEAN Regional Forum (ARF), the 16 member East Asia Summit (EAS), numerous \"ASEAN+1\" dialogues between the group and its partners, as well as several other multilateral groupings. While many of the region's pressing security challenges, such as North Korea's nuclear proliferation, China-Taiwan tensions, or India-Pakistan rivalries, do not directly involve ASEAN's members, they argue that their ability to convene other powers in diplomacy is a core ASEAN role. That said, ASEAN has moved into a more active security role in recent years. The ASEAN Defense Ministers Meeting-Plus (ADMM+) is a regional security forum that includes ASEAN's 10 members and the eight ASEAN partnersâthe United States, China, Japan, South Korea, Australia, New Zealand, India, and Russia. With U.S. backing, it has become more active in recent years, hosting multilateral dialogues and exercises in areas such as humanitarian assistance/disaster relief and maritime rescue. In 2018, ASEAN conducted a multilateral naval exercise with China, and in September 2019, it did so with the United Statesâmoves that analysts called a strong signal of the group's desire to avoid working too closely to one military or the other. ASEAN's members have long sought to navigate changes in the regional security environment in ways that protect their own individual and collective interests, while avoiding being either dominated by external powers or drawn into external conflicts. In recent years, many observers believe China has sought to drive wedges between ASEAN's members based on their diverse interestsâparticularly the extensive investment by Chinese firms in smaller countries such as Cambodia and Laosâand has had some success due to the group's insistence in governing by consensus. Since 2013, ASEAN has been engaged in negotiations with China to develop a Code of Conduct for parties in the South China Sea, but it has generally rejected suggestions such as Beijing's proposal that parties pledge not to conduct military exercises with \"outside\" countries. Indonesia is a strong proponent of Indo-Pacific conceptions of the region, considering itself to be at the geographic midpoint linking the Pacific and Indian Ocean regions. Most observers saw the ASEAN Outlook on the Indo-Pacific statement as an initiative driven most strongly by Indonesia. However, Indonesia's role as a founder and leader of the Non-Aligned Movement continues to shape its foreign policy, and Jakarta has been hestitant to deepen security partnerships too far with either the United States or China. That reluctance makes Indonesia a relatively passive actor in the broad Indo-Pacific security architecture. U.S.-Indonesia security cooperation has deepened over the past decade as the Indonesian government sought to expand the country's external defense capabilities, with the two militaries conducting more than 240 military engagements annually, including efforts to intensify maritime security cooperation and combat terrorism. In 2015, President Joko Widodo's government announced plans to increase military spending to 1.5% of GDP from recent levels below 1%, focusing particularly on maritime capabilities, although spending has not increased at such a pace. Indonesia, however, is increasingly involved in rising South China Sea tensions. Indonesia has long had a delicate relationship with China, marked by deep economic interdependence (China is a major consumer of Indonesian natural resources) but considerable strategic mistrust. Periodic violence directed at the Indonesian-Chinese community throughout Indonesian history casts further complications on Jakarta-Beijing relations. A 2018 Pew survey found that 53% of Indonesians had a positive view of China, down from 66% in 2014 and 73% in 2005. (The same poll, conducted in spring 2018, found that 42% of respondents had a positive view of the United States, a number that has dropped from 63% in 2009, and also that 22% of Indonesians believe it would be better for the world if China was the world's leading power, while 43% said it would be better if the United States occupied that role.) Singapore is one of the United States' closest security partners in Southeast Asia. Its security posture is guided by its desire to serve as a useful balancer and intermediary between major powers in the region, and its efforts to avoid and hedge against anything that would force it to \"choose\" between the United States and China. In recent years Singapore has been an enthusiastic participant in new defense partnerships, but it has also been relatively skeptical, at least rhetorically, of the Trump Administration's Free and Open Indo-Pacific concept. While it has urged continued U.S. engagement in Asia, it has also been careful to warn that anti-China rhetoric or efforts to \"contain\" China's rise would be counterproductive. In a May 2019 speech in Washington DC, Singapore Foreign Minister Vivian Balakrishnan said \"viewing China purely as an adversary to be contained will not work in the long term, given the entire spectrum of issues that will require cooperation between the U.S. and China.\" In 2019, Singapore was reportedly the last nation to agree to ASEAN's Indo-Pacific Outlook statement, viewing it as an unproductive move that did not address broader security issues but which would inevitably raise tensions with China, and prospectively the United States. In questions about Singapore's view of the Trump Administration's FOIP concept, Singapore Foreign Minister Vivian Balakrishnan said in May 2018: \"Frankly right now, the so-called free and open Indo-Pacific has not yet fleshed out sufficient level of resolution to answer these questions that I've posed.... We never sign on to anything unless we know exactly what it means.\" That said, Singapore has worked to develop new security arrangements. Singapore maintains a close security partnership with Australia: The two nations signed an agreement in 2016 under which Singapore would fund an expansion of military training facilities in Australia and would gain expanded training access in Australia, as well as enhanced intelligence sharing in areas such as counter-terrorism. In September 2019, Singapore held the first trilateral naval exercise with India and Thailand in the Andaman Sea, and agreed in November 2019 to make this an annual exercise. Singapore is also negotiating with India on an agreement that could allow the Singapore armed forces to use Indian facilities for live-fire drillsâan important consideration for Singapore, given its small size. Singapore retains strong security ties with the United States, formalized in the 2005 \"Strategic Framework Agreement.\" The agreement builds on the U.S. strategy of \"places-not-bases\"âa concept that aims to provide the U.S. military with access to foreign facilities on a largely rotational basis, thereby avoiding sensitive sovereignty issues. The agreement allows the United States to operate resupply vessels from Singapore and to use a naval base, a ship repair facility, and an airfield on the island-state. The U.S. Navy also maintains a logistical command unitâCommander, Logistics Group Western Pacificâin Singapore that serves to coordinate warship deployment and logistics in the region. Singapore is a substantial market for U.S. military goods, and the United States has authorized the export of over $37.6 billion in defense articles to Singapore since 2014. In particular Singapore has purchased aircraft, parts and components, and military electronics, and has indicated interest in procuring four F-35 jets. Over 1,000 Singapore military personnel are assigned to U.S. military bases, where they participate in training, exercises, and professional military education. Singapore has operated advanced fighter jet detachments for training in the continental United States for the past 26 years. Singapore adheres to a one-China policy, but has an extensive relationship with Taiwan, including a security agreement under which Singapore troops train in Taiwanâan agreement that Beijing has occasionally asked it to terminate. Generally, Singapore has managed to avoid damaging its strong relations with Beijing. Of late, Singapore has worked to smooth its ties with Chinaâperhaps at least partly as a hedge against possible U.S. disengagement from the region. That being said, Singapore has judiciously pushed back against Chinese behavior it sees as problematic; in 2016, Singapore supported an international tribunal's ruling against China's assertions of sovereignty over extensive waters in the South China Sea. Since the establishment of diplomatic relations between the United States and the Socialist Republic of Vietnam in 1995, the two countries' often overlapping strategic and economic interests have led them to incrementally expand relations across a wide spectrum of issues. For the first decade and a half of this period, cooperation between the two countries' militaries was embryonic, largely due to Vietnam's reluctance to advance relations more rapidly. By the late 2000s, however, China's actions in the South China Sea appear to have caused the Vietnamese government to take a number of steps to increase their freedom of action. First, Vietnam began trying to increase its defense capabilities, particularly in the maritime sphere. In the words of two analysts, these efforts \"for the first time\" have given Vietnam \"the ability to project power and defend maritime interests.\" From 2009 to 2019, Vietnam increased its military budget by over 80% in dollar terms, to around $5.3 billion. In 2009, Vietnam signed contracts to purchase billions of dollars of new military equipment from Russia, its main weapons supplier, including six Kilo-class submarines. It has also begun engaging in more maritime military diplomacy with its neighbors, and for the first time has begun dispatching peacekeepers to United Nations missions. Second, as Vietnamese leaders perceived the strategic environment as continuing to deteriorate against them during the current decade, they deepened their cooperation with potential balancers such as the United States, Japan, and India. With the United States, Vietnam is one of the recipient countries in the Defense Department's $425 million, five-year Southeast Asia Maritime Security Initiative, first authorized in the FY2016 National Defense Authorization Act ( P.L. 114-92 ). In December 2013, the United States announced it would provide Vietnam with $18 million in military assistance, including new coast guard patrol boats, to enhance Vietnam's maritime security capacity, assistance that the Trump Administration has expanded. The United States also has transferred to Vietnam a decommissioned U.S. Coast Guard Hamilton-class cutter, under the Excess Defense Articles program. The cutter is Vietnam's largest coast guard ship. The United States in recent years also has provided Vietnam with Scan Eagle Unmanned Aerial Vehicles (UAVs) and T-6 trainer aircraft. In a largely symbolic move, in March 2018, the USS Carl Vinson conducted a four-day visit to Da Nang, the first U.S. aircraft carrier to visit Vietnam since the Vietnam War. Vietnam's willingness to openly cooperate with the United States' Indo-Pacific strategy is limited by a number of factors, however. Since the late 1980s, Vietnam's leaders explicitly have pursued what they describe as an \"omnidirectional\" foreign policy by cultivating as many ties with other countries as possible, without becoming overly dependent on any one country or group of countries. Some have referred to this approach as a \"clumping bamboo\" strategy, behaving like bamboo that will easily fall when standing alone but will remain standing strong when growing in clumps. In practice, this has meant Vietnam often pairs its outreach to the United States and other powers like Japan and India with similar initiatives with China. Despite increased rivalry with Beijing, Vietnam regards its relationship with China as its most important bilateral relationship, and Hanoi usually does not undertake large-scale diplomatic or military moves without first calculating Beijing's likely reaction. The two countries have Communist Party-led political systems, providing a party-to-party channel for conducting relations, and contributing to often similar official world-views. China also is Vietnam's largest bilateral trading partner. One corollary to Vietnam's omnidirectional approach is its official \"Three Nos\" defense policy: no military alliances, no aligning with one country against another, and no foreign military bases on Vietnamese soil to carry out activities against other countries. This approach, which barring a major shock likely will continue into the medium term, is likely to limit Vietnam's willingness to explicitly become a full partner in many of the elements of the Trump Administration's Indo-Pacific strategy, particularly if they are presented as explicitly aimed against China. That said, Vietnam has demonstrated in the past that it is willing to stretch the limits of its \"Three Nos\" policy. This has been particularly true in areas of defense cooperation such as military training and arms sales that can be undertaken quietly and/or portrayed as not aimed at one specific country. Many Vietnam watchers therefore expect that in the absence of a major shockâsuch as a U.S.-Vietnam trade war or open Sino-Vietnam military conflictâVietnam will continue its approach of quietly and incrementally expanding its cooperation with the United States and its partners. Based on the above, it appears that a key development in the strategic landscape of the Indo-Pacific is that U.S. allies and partners are developing closer strategic relations across the region as a way of hedging against the rise of China and the potential that the United States will either be less willing or less able to be strategically engaged. Given this, a key question for Congress is how the United States should respond to this emerging dynamic. Do these emerging intra-Asian strategic relationships support U.S. strategic objectives across the Indo-Pacific and if so, to what extent, and in what ways, should to the United States support them? Some analysts question whether the Trump Administration's skepticism of allies is affecting, or may affect, U.S. ability to work with Japan, South Korea, and Australia in developing new security arrangements. In particular, Trump Administration requests for large increases in allies' monetary contributions to basing cost has raised significant concerns about what future alliance arrangements may look like. Similarly, some question whether the Administration's lack of interest in multilateral trade agreements such as the TPP may affect perceptions of regional allies and partners about broader U.S. commitment to the region. These raise questions Congress may consider, including: What are the United States' key interests in the region and have they changed over time? What role does cooperation with U.S. allies play in ensuring U.S. interests are promoted as the region's new security architecture develops? What is the proper mix of diplomatic, economic, defense, foreign assistance, and soft power that should be used in such an effort? Some political developments in the region may also play a role in how Congress addresses these questions. In the Philippines and Thailand, both U.S. treaty allies, political developments have led to what many observers describe as a decline in democratic institutions. In India, a partner and important participant in Indo-Pacific arrangements, many are concerned about increasing intolerance and human rights abused against religious minorities. These developments raise questions such as: What role should Congress play in helping the Trump Administration, and future administrations, articulate U.S. strategy to the region and to what extent should American values, as well as U.S. interests, inform such an approach? Congress has consistently played an important role in guiding and helping set U.S. policy in Asia. As noted above, the Asia Reassurance Initiative Act of 2018 (ARIA; P.L. 115-409 ), states: \"Without strong leadership from the United States, the international system, fundamentally rooted in the rule of law, may wither.... It is imperative that the United States continue to play a leading role in the Indo-Pacific.\" Congress may assess how growing military spending and new security arrangements affect that goal.", "summary": "China's growing confidence in asserting itself regionally and internationally, combined with longstanding concerns about whether the United States has the capacity or commitment to remain the region's dominant actor, is leading U.S. allies and partners to adjust their strategic posture. This report seeks to outline some of these changes and to outline the perspectives of Indo-Pacific nations seeking to navigate a changing geopolitical environment, including by recasting their conception of the region to draw in new potential counterweights to China such as India, prioritizing new defense acquisitions to bolster indigenous security capacities, and seeking out new, networked security partnerships. Several Indo-Pacific nations over the past decade have substantially increased defense spending to prepare for new challenges; in some cases they have also sought more extensive roles in shaping the regional security architecture. Some are seeking to develop new intra-Asian security partnerships and strengthen existing strategic relationships. Japan, Australia, and India are among the most active in these regards. The Trump Administration similarly has articulated strategic objectives in an expansive region from East Asia to South Asia and the Indian Ocean, and has increased defense spending. Some actions taken by President Trump, howeverâincluding his questioning of alliance relationships, his opposition to multilateral trade agreements, and possibly his moves to retreat from U.S. security commitments elsewhere in the worldâhave, in the view of many, sent conflicting signals to and undermined confidence in U.S. alliances and partnerships in the Indo-Pacific region. Many observers have pointed to the value of U.S. allies and partners in protecting U.S. security and values and questioned the economic elements of the Administration's Indo-Pacific strategy, arguing that the Administration has not come forward with an adequate replacement to fill the gap in U.S. engagement that was opened when President Trump withdrew from the proposed Trans-Pacific Partnership (TPP) trade agreement. Developing a better understanding of how the United States' Indo-Pacific allies and partners are positioning themselves to adapt to this evolving strategic landscape can inform Congress's oversight of U.S. policies and approaches to the region. It can also aid Congress as it makes funding decisions for U.S. armed forces and foreign assistance or considers strategic aspects of potential trade agreements or other economic initiatives in the region. Within this context Congress may consider a number of questions. What are U.S. allies and partners' perceptions of U.S. power and commitment to the Indo-Pacific? How are these perceptions changing? If these perceptions are negative, how are they affecting U.S. interests and what should be done to change them? How are Indo-Pacific countries responding to China's growing economic influence and military power? What impact has President Trump had on the United States' relationship with key allies and partners in the Indo-Pacific and what effect, if any, has this had on U.S. interests? How have regional states responded to the Trump Administration's Free and Open Indo-Pacific strategy? Is the strategy calibrated to gain regional support to achieve U.S. interests? Is it well understood in the region, and is its implementation sufficient to convince the region of U.S. commitment? If not, what should change, and in what ways? Do new security partnerships in Asia raise policy questions or opportunities in areas such as new arms sales, training, or exercises? This report will compare various nations' approaches to bolstering their collective security through increased defense spending and evolving security networks and strategic linkages, and identify options for the United States, and for Congress specifically in light of answers to the above questions.", "document_type": "crs"}
{"report": "Economic factors, new technologies, environmental concerns and associated regulatory policies, and other developments are changing the energy sources used to generate electricity in the United States. One notable change is increased generation from variable renewable energy (VRE) sources such as wind and solar. According to the U.S. Energy Information Administration (EIA), combined generation from wind and solar sources increased from 1% of total electricity generation in 2008 to 9% of total electricity generation in 2018. These sources have weather-dependent availability, meaning that changing weather patterns can change available electricity supply from those sources. In contrast, conventional sources for electricity generation, such as coal, natural gas, or nuclear energy, are usually available under normal weather conditions. Power system operators have adjusted existing reliability standards and planning practices to accommodate weather-dependent wind and solar sources. Further adjustments are being discussed as generation from wind and solar sources continue to grow. Congress required the setting and enforcement of electric reliability standards in the Energy Policy Act of 2005 (EPACT05; P.L. 109-58 ). These standards are developed by the North American Electric Reliability Corporation (NERC) and approved by the Federal Energy Regulatory Commission (FERC) in the United States. These mandatory standards apply to the bulk power system, which is comprised mostly of large-scale generators and electricity transmission systems. Small-scale generators (e.g., rooftop solar electricity generation), publicly owned utilities, and local electricity distribution systems are generally under the jurisdiction of state public utility regulatory commissions (PUCs). To date, generation from wind and solar sources does not appear to be causing electric reliability issues at the national level. NERC's 2018 annual report on reliability showed that, of the 13 metrics it uses to assess reliability, 9 were stable or improving over the 2013-2017 period and 4 showed trends that were, at least partly, inconclusive. Of the four metrics with inconclusive trends, three improved over this period for a subset of bulk power system components. Data from NERC also indicate that reliability performance is currently stable in regions such as the Midwest and California where the shares of generation from wind and solar sources are above the national average. Questions remain about how higher levels of generation from wind and solar sources might impact electric reliability moving forward. This report provides background on reliability planning in the United States with an emphasis on the effects of daily and seasonal variability in wind and solar sources on the bulk power system. Members of Congress might consider how reliability could be impacted if generation from wind and solar sources increases, as many analysts expect. Other reliability concerns, such as cyber and physical security, small-scale generators, and local distribution networks, may be of interest to Congress but are not discussed at length in this report. As shown in Figure 1 the electric power sector consists primarily of three systems. The generation system consists of power plants that generate electricity. The transmission system consists of high voltage transmission lines that move power across long distances. The distribution systems make final delivery of electricity to homes and businesses. This report will refer to the combined generation and transmission systems as the bulk power system, following the definition Congress established in EPACT05: The term \"bulk-power system\" meansâ(a) facilities and control systems necessary for operating an interconnected electric energy transmission network (or any portion thereof); and (b) electric energy from generation facilities needed to maintain transmission system reliability. The term does not include facilities used in the local distribution of electric energy. Notably, the discussion in this report generally excludes distributed energy resources such as rooftop solar electricity generation. These resources might pose separate reliability challenges that Congress might choose to consider. Ownership structures for bulk power system components vary across the country. In some regions, shown in Figure 2 , competitive markets exist for wholesale electric power, and regional transmission organizations (RTOs) and independent system operators (ISOs) manage the generation and transmission components of the power system. In RTO regions, electricity generators compete to sell power to distribution utilities. The RTO manages an auction process to select the sources for generation that distribution utilities resell to end-use customers. The RTO is also responsible for managing the transmission system and overseeing reliability within its boundaries. In RTO regions, market signals primarily determine investment decisions. Some RTOs operate separate auction processes specifically for essential reliability services. According to FERC, two-thirds of U.S. electricity demand comes from RTO regions. In non-RTO regions, vertically integrated electric utilities are largely responsible for power generation, transmission, and distribution of electricity to end-use customers. These utilities are regulated as natural monopolies and, unlike utilities in RTO regions, do not face competition for generation and transmission services. These utilities may also take responsibility for some aspects of reliability as discussed in the Appendix . State regulators generally oversee these utility operations and are responsible for authorizing new investments, including those related to reliability. Even in RTO regions, municipal utilities and rural electric cooperatives may own generation and transmission system components and oversee their operation. These systems and operation are generally outside of federal and state regulatory jurisdiction. A colloquial definition of electric reliability is \"having power when it is needed.\" Operators of bulk power system components, though, require specific and highly technical definitions for reliability. For purposes of regulation, these definitions are provided in the form of NERC reliability standards. NERC develops individual standards for each set of power system components, which may include separate standards covering different reliability timescales for each set of components. As NERC defines \"reliability standard,\" it includes requirements for the operation of existing Bulk-Power System facilities, including cybersecurity protection, and the design of planned additions or modifications to such facilities to the extent necessary to provide for Reliable Operation of the Bulk-Power System, but the term does not include any requirement to enlarge such facilities or to construct new transmission capacity or generation capacity. When all bulk power system components meet reliability standards, NERC expects the vast majority of individuals to have the full amount of electricity they desire. NERC reliability standards do not apply to local electricity distribution system components and operations (see discussion in text box, \"Distribution System Reliability\"), so localized outages could still occur when reliability standards are met. An analysis found that from 2008 to 2014, upwards of 90% of power outages originated in local distribution systems. This measure includes major events (e.g., hurricanes), but may not capture the full scope or severity of large-scale outages. NERC's reliability standards are meant to ensure an Adequate Level of Reliability (ALR) for the bulk power system during normal operating conditions and following localized disturbances such as lightning strikes. For economic reasons, some risk of occasional power loss is accepted in reliability planning. A common goal is to limit outages to no more than 1 day every 10 years under normal operating conditions. Achieving ALR is not the same goal as preventing all brownouts and blackouts. Bulk power system outages could still occur when reliability standards are fully met. These outages might follow a major event such as a hurricane affecting large areas of the bulk power system. Generally, factors that increase uncertainty reduce reliability, and factors that reduce uncertainty increase reliability. Wind and solar are types of variable renewable energy sources of electricity, and weather is a key source of uncertainty for forecasts of generation from these sources. In contrast, conventional sources such as coal and nuclear have long-lasting, on-site fuel supplies that reduce the uncertainty about their availability. This difference has raised questions about how to integrate large amounts of VRE sources into the existing bulk power system, since it was not originally designed to accommodate large amounts of weather-dependent sources of electricity. Figure 3 shows typical patterns for electricity generation for wind and solar sources in the United States. Wind generation tends to peak overnight and during winter months. Solar generation, on the other hand, tends to be highest during the middle of the day and during the summer. Though these typical patterns are well established for most of the United States, actual generation from wind and solar sources at any particular moment will depend upon specific weather conditions. The electric power sector is increasing its use of sources associated with more uncertainty in availability. According to the U.S. Energy Information Administration, combined generation from wind and utility-scale solar sources increased from 1% of total electricity generation in 2008 to 8% of total electricity generation in 2018. Of the generation in 2018 from wind and utility-scale solar sources, 80% came from wind. Conventional sources such as coal, natural gas, and nuclear comprised a large majority of generation over this time period. The annual share of generation from different sources from 2008 to 2018 in shown in Figure 4 . National-level data are not indicative of how generation from wind and solar sources varies across the country. Similarly, annual data do not show how electricity generation varies throughout the day or during different seasons. For example, during brief periods in some regions, wind and solar sources have provided a majority of the energy for electricity generation. Some examples are Generation from wind sources supplied 56% of electricity demand in ERCOT, the RTO covering most of Texas, at 3:10 am on January 19, 2019. Generation from solar sources supplied 59% of electricity demand in CAISO, the RTO covering most of California, at 2:45 pm on March 16, 2019. Generation from wind supplied 67.3% of electricity demand in SPP, the RTO covering many central states, at 1:25 am on April 27, 2019. These events all set records for maximum share of generation from renewable sources, and the bulk power system maintained reliability during them. Some advocates for increased use of wind and solar sources have pointed to events like these as evidence that VRE sources can be used to an even greater degree without impacting reliability. Extrapolating these events to scenarios of correspondingly high national levels of generation from wind and solar sources, however, is complicated by several factors. First, these events were all short lived, typically five minutes or less. Further, these events all occurred when electricity demand was relatively low, namely weekend days during cool months. During times of the year when electricity demand is high, such as the summer cooling season, the share of electricity generation from renewable sources is lower. For example, SPP has reported that during its peak demand hours in 2016, wind supplied 11% of generation while conventional sources such as coal (47%) and natural gas (33%) supplied the majority of electricity. The seasonality of VRE availability also likely contributed to these record-setting events, especially for wind, which tends to have maximum generation during winter and spring months. Electricity is essentially generated as a just-in-time commodity, due to limited energy storage capacities. If electricity supply and demand differ by too much, system components could be damaged, leading to system instability or potential failure. The operations that keep electricity supply and demand within acceptable levels are known as balancing. Balancing involves increasing or decreasing output from generators according to system conditions over timescales of minutes to hours, and it is a critical aspect of maintaining reliability. Balancing authorities, discussed in the Appendix , issue orders to generators to change their output as needed to maintain reliability. Balancing authorities can be utilities, or RTOs can act as balancing authorities in the regions where they exist. The rules for selecting which generators must increase or decrease output typically reflect an approach known as security-constrained economic dispatch (SCED). Under SCED, system operators ensure that electricity is produced at the lowest overall cost while respecting any transmission or operational constraints. When generation from a low-cost source would jeopardize reliability, a higher-cost source is used. In other words, SCED has two goals: affordability and reliability. SCED favors sources with low operating costs, and wind and solar sources do not have to pay for fuel. As a result, wind and solar sources typically generate the maximum amount of electricity they can at any moment. Balancing typically involves quickly increasing or decreasing output from other sources in response to variable output from wind and solar sources. The capability to quickly change output is known as ramping, and electricity sources differ in their ramping capability. System operators use a variety of electricity sources to balance generation from wind and solar sources. Some may be more commonly used in certain regions of the country, depending on local factors. Each has different benefits and limitations, some of which are summarized below. Reciprocating internal combustion engines (RICE) have seen an increase in installed capacity since 2000, partly in response to higher levels of generation from wind and solar sources. These sources have high ramping capabilities and use mature technologies. They usually use natural gas or fuel oil as fuel, so they have associated fuel costs and environmental impacts. Steam turbines, usually fueled by coal or nuclear energy , have historically been operated at steady, high output levels, barring maintenance needs, because that is the most efficient and lowest cost operational mode for them. These sources are capable of ramping to some extent. This operational mode may provide revenue for certain sources located in regions of the country with low wholesale electricity prices. It might also result in higher costs for electricity from these sources, compared to when they are not ramped. Wind and solar sources located in one area can balance wind and solar sources in other areas, since it is rare to have cloudy skies or calm winds over broad regions of the country simultaneously. This could have the benefit of using sources with zero fuel costs and zero emissions for balancing; however, existing electricity transmission system constraints limit the extent to which this is possible. Energy storage can be used for balancing because it stores electricity during periods of high supply and then provides electricity when supply is low. Many experts also see storage as a way to address the daily variability shown in Figure 3 and thereby expand the utilization of installed wind and solar sources. Many energy storage types are expensive and not currently deployed in large amounts. Energy storage can be co-located with wind or solar generators, or it can be located at other sites in the power system or the distribution system. Demand response, sometimes called demand-side management, involves adjusting electricity demand in response to available supply. This is counter to how the power system has historically been operated, but has become more commonly used. Demand response includes programs in which electricity consumers voluntarily reduce their usage in exchange for financial compensation. Demand response can be a low-cost balancing option because it does not require electricity generation; however, it comes at a social cost because consumers do not use electricity at their preferred time.The electric power sector is working to improve the use of weather and power forecasting in system balancing. For example, MISO changed its wholesale electricity market rules in 2011 to create a Dispatchable Intermittent Resources program. This program allows wind sources to make use of their own generation forecasts and offer generation at five-minute intervals. Previously, offers had to be made on an hourly basis. This was creating inefficiencies in using wind sources since their output can vary over the course of an hour. Improved forecasting could result in increased use of low-cost wind and solar sources, but forecasting methodologies are still being optimized for this purpose. The above considerations apply to bulk power system balancing today. Technological or policy developments could alter how system balancing is conducted in the future. Additionally, if wind and solar sources provided even larger shares of overall generation, new benefits or limitations for each balancing source type could emerge. Work at the federal level to address reliability needs associated with increased use of wind and solar sources has been underway for some time. For example, NERC created a task force in December 2007 to study the integration of VRE and identify gaps in reliability standards. The federal government undertakes actions in addition to the development and enforcement of reliability standards that affect electric reliability. FERC regulates interstate electricity transmission, which can be a key determinant of what sources are available to balance wind and solar. FERC also regulates wholesale electricity markets in most regions of the country. Market rules, including how SCED is implemented, can influence which individual generators are used for system balancing. Market prices can directly affect project revenues and influence investment decisions. Additionally, Congress funds projects and programs that support technology development and deployment, including for sources and operations that improve reliability. Some examples demonstrate the breadth of federal activities related to reliability. In EPACT05, Congress created Section 219 of the Federal Power Act that directs FERC to establish financial incentives for certain electricity transmission investments. FERC's resulting rule became effective in 2006 and includes provisions allowing higher rates of return, accelerated depreciation, and full cost recovery, all for investments and activities that FERC approves on a case-by-case basis. Transmission investment has increased since the passage of EPACT05, although there may be many factors driving this investment. On March 21, 2019, FERC opened an inquiry on potential changes to its transmission incentive policy. In 2011, FERC issued a rule, Order No. 1000, revising requirements related to new transmission projects. Among other revisions, Order No. 1000 increased the weight given to achieving public policy requirements when FERC considers approval of transmission projects. An example of a public policy requirement might be a state requirement that a specified share of electricity sales come from renewable sources, a policy commonly known as a renewable portfolio standard. New transmission capacity is often needed to access and balance wind and solar sources. Several FERC orders demonstrate how market rules are changing in response to increased need for balancing and ramping. Order No. 745 allows demand response to earn compensation from wholesale electricity markets for providing energy services to balance the power system in day-ahead and real-time markets. Order No. 841 allows energy storage systems to earn compensation from wholesale electricity markets for providing any energy, capacity, and essential reliability services they are capable of providing. Implementation of Order No. 841 might lead to greater deployment of energy storage which could improve balancing. Various grant programs administered by the Department of Energy (DOE) have supported the development of new technologies that can balance wind and solar sources or support reliability in other ways. These include research and development into electricity generators; wind forecast models and methodology; power electronics for solar sources; and standards for interconnection into the bulk power system. DOE's Office of Energy Efficiency and Renewable Energy (EERE) has funded research meant to improve short-term weather forecasting specifically related to wind power forecasts in two Wind Forecast Improvement Projects. DOE reports that advances made during this research include improved observations of meteorological data and improved methodologies for using those data in wind forecasts. Congress has held hearings related to the changes in the electricity generation profile of the country, and some Members raised concerns about reliability during these hearings. Members may continue to examine reliability issues moving forward, in light of projections that wind and solar will become an increasingly larger share of electricity generation. For example, EIA's projection of existing law and regulations shows wind and solar sources contributing 23% of electricity generation in 2050. Members may also choose to include reliability as part of any debate about policies to increase the generation from wind and solar sources. Preparing for higher levels of generation from wind and solar might require new approaches to maintaining electric reliability. The existing regulatory framework can accommodate some changes since FERC and NERC have authority to initiate development of new reliability standards. For example, NERC has raised the issue of whether it should develop new reliability metrics in light of the increasing use of VRE for electricity generation. In addition to its capacity supply assessment, NERC's Reliability Assessment Subcommittee should lead the electric industry in developing a common approach and identify metrics to assess energy adequacy. As identified in this assessment, the changing resource mix can alter the energy and availability characteristics of the generation fleet. Additional analysis is needed to determine energy sufficiency, particularly during off-peak periods and where energy-limited resources are most prominent. Congress could choose to provide guidance for FERC and NERC activities in this area. Congress could also assess whether the existing regulatory framework is sufficient to maintain reliability if generation from wind and solar sources increase above current projections. One area of discussion is the siting and approval of transmission projects, particularly those that might result in enhanced availability of wind and solar sources for system balancing. Currently, the siting of electricity transmission facilities is largely left to the states. Section 1221 of EPACT05 directs FERC to issue permits for the construction or modification of transmission facilities in certain circumstances in areas designated by the Secretary of Energy as \"National Interest Electric Transmission Corridors.\" This authority was to be exercised only if the relevant state agency lacks the authority to permit the transmission facilities or has \"withheld approval for more than one year.\" Shortly after passage of EPACT05, DOE set out to designate the National Interest Electric Transmission Corridors and FERC set up a framework for permitting transmission facilities on those corridors. However, federal courts vacated both agencies' actions, and neither agency has taken any significant action pursuant to their Section 1221 authority since that time. As noted above, most power outages occur on local electricity distribution systems, and these are regulated by state or local governments. Congress could consider expanding federal activities affecting distribution system reliability. This might involve studies of the factors (e.g., weather, aging infrastructure, VRE) that result in power outages. Such activities might also include federal financial support for projects or practices that improve reliability of distribution systems or encouraging new operational regimes such as independent distribution system operators (see earlier discussion of this issue in text box, \"Distribution System Reliability\"). Congress might also consider acting on the emerging and related issue of electric resilience. Some support for an enhanced federal role in electricity system resilience exists. For example, the National Academy recommends Congress and the Department of Energy leadership should sustain and expand the substantive areas of research, development, and demonstration that are now being undertaken by the Department of Energy's Office of Electricity Delivery and Energy Reliability and Office of Energy Efficiency and Renewable Energy, with respect to grid modernization and systems integration, with the explicit intention of improving the resilience of the U.S. power grid. Many sources currently used to balance wind and solar have received federal financial support in the past, such as tax credits, grants to states or other entities, and DOE research programs. Congress might consider continuing or expanding this type of support if current activities affecting reliability were deemed insufficient. Electric reliability encompasses short-term and long-term aspects as shown in Figure A-1 . System operators and reliability planners, governed by reliability standards from the North American Electric Reliability Corporation (NERC), have different practices in place to address reliability over these various timescales. Reliability over Different Timescales At the smallest timescales, typically seconds or less, are factors such as frequency control, voltage support, and ramping capability. These are often automatic responses of power system components. NERC refers to these factors as Essential Reliability Services (ERS), and they are sometimes called ancillary services. Historically, many ERS were provided as a natural consequence of the physical operational characteristics of steam turbines. Wind and solar generators do not inherently provide ERS in the same way. They require additional electrical components to do so, and these are being more commonly deployed. In some cases, FERC has mandated the use of technologies that allow wind and solar to provide ERS. Balancing, described in the main body of this report, typically occurs over minutes to hours. Unlike ERS, balancing typically requires action by a system operator. Long-term aspects of reliability relate to planning for energy and transmission needs over months to years. This is sometimes referred to as resource adequacy. Policy goals, such as preferences for certain electricity sources over others, tend to influence long-term reliability planning more than shorter-term reliability aspects. Planning for resource adequacy involves forecasts of electricity supply and demand. For variable renewable energy (VRE) like wind and solar sources, these forecasts require assumptions about wind and solar availability. Reliability planners commonly use planning reserve margins to assess whether planned generation and transmission capacity will be sufficient to supply electricity demand. A planning reserve margin is the difference between expected peak demand and available generating capacity at the peak period in each forecast year. It is often expressed as a percentage where the difference is normalized by the peak demand value. According to NERC, reserve margins \"in the range of 10-18 percent\" are typically sufficient for ensuring reliability, although \"by itself the expected Planning Reserve Margin cannot communicate how reliable a system is.\" Reserve margins are calculated months or years ahead as part of assessments of whether and where reliability concerns might exist. High planning reserve margins may indicate a likelihood that reliability will be maintained, but, especially when variable sources are present, they might not be predictive. That is, a high planning reserve margin does not guarantee reliability and a low planning reserve margin does not guarantee power disruptions. At the national level, NERC annually assesses resource adequacy over a 10-year forecasting window. NERC uses historic VRE generation data in its assessment and has noted \"methods for determining the on-peak availability of wind and solar are improving with growing performance data.\" In its 2018 Long-Term Reliability Assessment, NERC recommended enhancing its reliability assessment process to account for events, like those noted in the \" Changing Electricity Generation Profile \" section above, during which VRE sources provided large shares of generation during off-peak periods. Solar eclipses, though rare events, provide opportunities to test the ability of grid operators to reliably operate the grid when solar sources are unavailable. The August 21, 2017, solar eclipse that affected many parts of the United States was one such opportunity. According to NERC, no reliability issues developed during the event, in part because of the measures implemented in advance by the electric industry. Electric Reliability Regulatory Framework Current electric reliability planning is a coordinated process involving multiple entities and spanning multiple jurisdictions. These reliability planning organizations share responsibility for, among other responsibilities, ensuring electricity from wind and solar sources are reliably integrated into the power system. Table A-1 summarizes these entities and their responsibilities. In the Energy Policy Act of 2005 (EPACT05; P.L. 109-58 ), Congress gave FERC responsibility for reliability of the grid through the setting and enforcement of electric reliability standards. These standards are developed by NERC and approved by FERC in the United States. NERC has set over 100 reliability standards that cover all timescales of reliability planning. Congress gave NERC authority to enforce reliability standards in EPACT05. Per statute, NERC has delegated this authority to the Regional Entities shown in Figure A-2 . The jurisdiction for enforcing compliance with reliability standards includes \"all users, owners and operators of the bulk-power system\" within the contiguous United States. Separate from the tasks of setting and enforcing reliability standards is the task of reliably operating the power system in real time. Per NERC's reliability standards, balancing authorities carry most of the responsibility for matching generation levels with electricity demand. Balancing authorities can have different geographic footprints. RTOs act as balancing authorities and they may have a footprint spanning multiple states. Other balancing authorities might have a footprint spanning an area within a single state. Another class of entities with operational responsibilities are reliability coordinators. A reliability coordinator may operate over larger geographic areas than balancing authorities and can overrule real-time decisions by balancing authorities to preserve the larger scale power system reliability. RTOs typically also act as reliability coordinators. NERC has certified 66 balancing authorities and 11 reliability coordinators in the United States.", "summary": "The share of wind and solar power in the U.S. electricity mix grew from 1% in 2008 to 8% in 2018. Wind and solar are variable renewable energy (VRE) sources. Unlike conventional sources, weather variability creates uncertainty about the availability of VRE sources. This uncertainty could potentially result in a lack of reliability. Some Members of Congress have expressed concerns about the reliability of the electric power system given recent growth in generation from wind and solar sources and projections that growth will continue. According to official metrics, electric reliability was generally stable or improving over the 2013-2017 period. In other words, generation from wind and solar sources does not appear to be causing electric reliability issues at the national level over this period. Questions remain, however, about maintaining reliability if generation from wind and solar should increase above current projections, as some Members of Congress have supported. Entities in the electric power sector and their regulators are evaluating changes to their approaches to reliability to prepare for this possibility. Congress might seek clarification on whether new or modified approaches are required. Under the current regulatory framework, the federal government oversees reliability for the generation and transmission systems of the electric power sector. These components comprise the bulk power system and include large-scale wind and solar sources. The Energy Policy Act of 2005 (EPACT05; P.L. 109-58 ) authorized the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Corporation (NERC) to develop and enforce mandatory reliability standards for the bulk power system. Small-scale wind and solar sources, such as rooftop solar photovoltaic (PV) panels, are connected to the distribution system which is localized and under state jurisdiction. Federal mandatory reliability standards do not apply to the distribution system. The colloquial definition of reliability is \"having power when it is needed,\" but regulators and operators of power system components require a more precise statement of objectives and metrics. FERC and NERC have developed numerous technical standards to address reliability. These standards apply over the range of timescales over which reliability is measured, from milliseconds to years. FERC has approved approximately 100 reliability standards to date, and new standards are developed as needed to respond to changing conditions, including increasing generation from wind and solar sources. Multiple entities spanning multiple jurisdictions work together to maintain electric reliability. For economic reasons, wind and solar sources tend to be utilized to the maximum extent possible. When their availability changes, which can happen quickly, other sources must quickly respond to maintain reliability. Typically, other sources respond by increasing or decreasing their output, an operation known as balancing. Multiple types of electricity sources are used to balance wind and solar, including some fossil fuel-fired generators, some nuclear generators, other wind and solar sources (provided sufficient transmission availability), energy storage, and demand response. Each of these has benefits and limitations. Some sources and system operations that currently support balancing have received federal financial support in the past, such as tax credits, grants to states or other entities, and Department of Energy research programs. Congress might consider continuing or expanding such support, if lawmakers believed current activities affecting reliability were insufficient. Beyond developing and enforcing reliability standards, other federal government activities affect electric reliability. For example, FERC's regulation of interstate electricity transmission can be a key determinant of how effectively different electricity sources can meet demand. FERC's regulation of the wholesale electricity markets that operate in some regions of the country may also affect reliability, because market rules can influence which individual generators are used for system balancing. Market prices directly affect project revenues, influencing the kinds of sources that are developed. Additionally, some projects and programs Congress funds support reliability by enabling technology development and providing financial support for projects that support reliability.", "document_type": "crs"}
{"report": "In recent presidential Administrations, there have been several high-profile disputes between Congress and the White House regarding access to executive branch officials. This has included attempts by Congress to enforce subpoenas issued to Harriet Miers, White House Counsel to President George W. Bush; Eric Holder, Attorney General to President Barack Obama; and Wilbur Ross and William Barr, Secretary of Commerce and Attorney General to President Donald Trump, respectively. Such disagreements can draw significant attention, but they are relatively uncommon. Most interactions between Congress and the executive branch are voluntary. There is a regular flow of communication between the branches. Principals and staff frequently interact with their counterparts. They share data; discuss operations, policy, and projects; and share subject matter expertise. Understanding why voluntary cooperation is a common practice is crucial to understanding Congress's relationship with the executive branch and may help clarify the cases in which the executive branch chooses not to cooperate with Congress. This report focuses on one facet of inter-branch interaction: testimony before congressional committees. The report outlines the origins of voluntary testimony by the executive branch, identifies some notable incentives for voluntary participation, and covers some key dimensions of the practice of voluntary participation. Two important caveats limit the scope of this report. First, by design, this report does not engage directly with those occasions when the executive branch refuses to comply with congressional requests and subpoenas. Second, it should also be noted that all responses are not created equal. The mere fact of voluntary compliance does not ensure that the testimony offered will be candid, complete, or correct. This report does not speak to that potential issue. Agency leaders, program managers, and subject matter experts routinely testify before congressional committees and subcommittees. In addition to participating in oversight and budget hearings by providing testimony and responding to questions on agency operations, agency officials frequently appear at informational hearings and when committees are considering possible legislative actions. The practice of voluntary compliance with congressional requests was established from the first investigation of the executive branch by Congress. That investigation focused on a failed 1791 military campaign against Native American tribes in the Northwest Territory by General Arthur St. Clair. President George Washington and his cabinet faced the novel question of how to respond to a request for information from Congress. Aware that their decision was likely to establish precedent, they decided, in the words of Secretary of State Thomas Jefferson, that the executive branch should \"communicate such papers as the public good would permit & ought to refuse those the disclosure of which would injure the public.\" Washington's cabinet reviewed the matter and decided that the executive branch should comply fully with Congress's request. The Administration then provided Congress with documents and officials offered testimony for the investigation. While President Washington determined that it was appropriate for executive branch activities to remain secret when disclosure would \"injure the public\" (thus providing the earliest articulation of the concept of executive privilege in American government), he also concluded that compliance with congressional requests should be the default. Despite changes in the operations of the presidency and Congress, and broader public access to the hearings themselves over television and the internet, this default compliance rule of thumb has generally held over time and across subsequent Administrations. There are a number of reasons that Administrations acquiesce to requests from Congress. Some of the most broadly applicable incentives are outlined below. Control over the appropriations of departments and agencies is arguably one of Congress's most effective tools to ensure that those departments and agencies are responsive to requests for testimony. Because the budget process occurs annually, agency leaders are continually dependent upon Congress for funding and understand that a poor working relationship with Congress may adversely affect their appropriation. Adverse budget actions for uncooperative agencies have occurred in the past. One of the best examples of such an action occurred during the 97 th Congress. As part of the deliberations over the FY1982 budget, the director of the Office of Policy Development in the Executive Office of the President, Martin Anderson, refused to appear before the House Appropriations Subcommittee on Treasury, Postal Service and General Government. Anderson argued that he could not appear because he was a senior adviser to the President and it would undermine his ability to provide candid advice to the President. The subcommittee disagreed and noted that prior directors of the same office had appeared without incident. The House Appropriations Committee then zeroed out the budget for the office and stated that \"until the legal basis for refusing to appear is presented, [the subcommittee] has no choice but to deny the budget request for this Office.\" While further discussion and negotiations with Senate appropriators led to a partial restoration, the appropriation was still reduced from the requested $2.9 million to $2.5 million. In a more recent example, as part of the FY2005 appropriations process, the House Committee on Appropriations directed the U.S. Coast Guard to submit quarterly reports to the committee on the maintenance of its legacy vessels and aircraft. By the next year, the committee was dissatisfied with the agency's responses and said the following in its report on the agency's FY2006 appropriation: The Committee is extremely frustrated in the Coast Guard's apparent disregard for Congressional direction and has reduced funding for headquarters directorates by $5,000,000 accordinglyâ¦. The Committee cannot adequately oversee Coast Guard programs when the agency fails to answer basic questions or fails to provide timely and complete information. In this case, the concerns raised by Congress extended to all of the agency's reporting to Congress, both oral and written, but illustrates the potential budget ramifications for agencies that fail to meet Congress's reporting expectations. Congress's legislative power extends beyond appropriations into the organization, operations, and jurisdiction of executive branch agencies. Congress may specify in statute the duties, reporting requirements, and independence of executive branch agencies, among other powers. Furthermore, some researchers have observed that Congress often closely monitors how agencies execute the laws it passes. Congress has developed a variety of tools to control how agencies operate, such as the Administrative Procedure Act. In addition, the regular engagement of Congress in how agencies conduct business may encourage those agencies to work with committees or risk statutory changes that impact their jurisdiction and the rules under which they operate. The organization of the executive branch and the network of statutes, guidelines, and practices that govern agency operations is complex and evolving. In this context, voluntary cooperation with congressional stakeholders can affect congressional decisions on organization and operations. For instance, one reason for Congress's decision to pass the Homeland Security Act of 2002 and create the Department of Homeland Security was to address a concern about access to officials. After the September 11 attacks, President George W. Bush created the Office of Homeland Security within the Executive Office of the President and appointed Tom Ridge to lead it. In March 2002, the Senate Committee on Appropriations invited Ridge to testify about the office's activities, but Ridge declined to appear on the grounds that he was a close adviser to the President. Given the control Ridge exercised over a large portion of the national security bureaucracy, the committee disagreed with Ridge's position, and the two sides eventually agreed that Ridge would provide an \"informal briefing\" to the Committee. Through the ensuing establishment of the Department of Homeland Security, Congress asserted its authority to oversee executive branch activity and limited the possibility that Ridge and his successors could attempt to assert privilege as presidential advisers in order to resist congressional requests. In addition to the legislative power, the courts have established that Congress has broad authority to investigate the activities of the executive branch. While Administrations have sometimes resisted cooperation with specific investigations, they have generally accepted this oversight role of Congress, and a large body of practices and expectations have developed. The acceptance of Congress's authority is such that Presidents have repeatedly allowed personal advisers to testify when credible allegations of malfeasance arise in the Executive Office of the President, despite claiming broad immunity for those advisers in other circumstances. Presidents have often followed this practice, even on matters of great political controversy, in order to better manage the visibility and impact when Congress conducts investigations. One of the better studied examples of this strategy is the Reagan Administration's management of the Iran-Contra affair. This incident arose following a decision by Congress to legally bar the government from providing support to the Contras, an insurgent group acting against the government of Nicaragua. Previously, the Central Intelligence Agency (CIA) had, with congressional approval, provided support to the Contras. Despite the congressional ban, the Reagan Administration and the CIA continued to provide support to the Contras and funded that aid with the proceeds of undisclosed CIA arms sales to the government of Iran. Early in the congressional investigation into these activities, a number of Reagan Administration officials were later shown to have lied to or misled congressional investigators. Ultimately, however, with the political fallout from the investigation growing, President Reagan directed the executive branch to cooperate fully with Congress, including an explicit decision not to attempt to assert executive privilege, even regarding direct communications between Reagan and his senior advisors. An Administration might also determine that it will benefit politically from building a constructive relationship with Congress. Given the broad control Congress exercises over lawmaking and the government, a good working relationship may better position an Administration to implement its agenda, while a poor relationship may make Congress more likely to oppose its policies and restrict its operations. For President Jimmy Carter, a constructive working relationship with Congress was an explicit campaign promise. In his memoirs, the former President discussed this strategy and why he believed it facilitated his agenda. As President-elect, Carter began lobbying for the authority to reorganize the executive branchâanother campaign commitment. While Congress ultimately passed the Reorganization Act of 1977, Carter initially faced resistance from the House Committee on Government Operations Chairman Jack Brooks. He summarized the experience as follows: I learned one lasting lesson from this hair-raising experience: it was better to have Jack Brooks on my side than against me. I found him to be an excellent legislator, and went out of my way to work closely with him in the future. We soon became good friends and allies. I consulted with him on all my subsequent reorganization bills; largely because of his support, ten of eleven bills submitted passed Congress. Committees can request that executive branch officials appear before them to discuss any matter within the jurisdiction of the committee. Any executive branch official, including the President, may testify before Congress under most circumstances. In practice, invitations are usually formal and may lead to negotiations on the logistics, format, and scope of the testimony. Committees have some discretion to define how they will receive testimony and accept or reject accommodations sought by the executive branch. The remainder of this report highlights a few important facets of current practice for each branch. As part of the annual appropriations process, agency leaders are expected to appear before appropriations subcommittees to justify their agencies' budget requests. This means that the heads of Cabinet departments and other agencies are likely to testify before Congress at least once per year. The statutory process for submission of the executive branch's budget request, as established by Congress, makes the President the primary actor in the executive branch budget process and gives the President significant control over the final executive branch budget request submitted to Congress each year. Using this statutory authority, the Office of Management and Budget (OMB) has established procedures for agency communications with Congress on the budget that are included in OMB Circular A-11 . These guidelines provide for the confidentiality of budget deliberations within the executive branch and require that agencies submit testimony to OMB for review in advance of budget hearings. Outside those limitations, when communicating with Congress, the guidance states that agencies are to \"give frank and complete answers to all questions.\" As discussed earlier, agencies may face repercussions if a committee decides they have not been sufficiently forthright. OMB also has a formal procedure for monitoring and clearing other communications to Congress from executive branch agencies. This guidance is outlined in OMB Circular A-19 . All legislative proposals originating within agencies subject to Circular A-19 , as well as other communications to Congress on pending legislation and formal Statements of Administration Policy, are first submitted to OMB for clearance. In a February 2017 memorandum, OMB Director Mick Mulvaney described the goals for the clearance process as follows: \"agencies' legislative communications with Congress are consistent with the President's policies and objectives;\" and \"the Administration 'speaks with one voice' regarding legislation.\" The Senate may also use the confirmation process to attempt to ensure future access to agency leaders. As a general matter, the Senate may choose to reject a nominee if the body believes that he or she would not cooperate with Congress after being confirmed. It has become common practice to address this issue directly during confirmation hearings. Frequently, a Senator has asked the nominee appearing before the committee to agree to respond to future congressional requests if they are confirmed. While these commitments may not be binding on these officials, this process allows the Senate to explicitly establish expectations and put the nominee on the record consenting to this condition. This January 2017 confirmation hearing exchange between Department of Energy Secretary-designee Rick Perry and Senate Committee on Energy and National Resources Chairman Lisa Murkowski is an example of this practice: The CHAIRMAN. You may go ahead and be seated. Before you begin your statement, I am going to ask you three questions addressed to each nominee before this committee. The first is will you be available to appear before this committee and other congressional committees to represent departmental positions and respond to issues of concern to the Congress? Mr. PERRY. I will, Senator. While this report is focused on the avenues of formal communication between the branches in hearings, there are circumstances in which the executive branch is less likely to provide public testimony to Congress. While each situation is unique, there are at least three types of information that are more likely to cause such tension: national security and intelligence matters, law enforcement investigations, and executive branch deliberations. In all of these areas, Administrations have sometimes refused to appear before committees or sought to limit public testimony. The legal and prudential reasons for limiting disclosure of information in each of these areas may, depending on the circumstances, have particular merit. From the perspective of an executive branch official, the costs of voluntary compliance may outweigh the benefits in some cases, and they may decline to testify. Congress is under no obligation to accept such conclusions and may seek to compel those officials to testify. However, committees may choose to take these concerns into account. For instance, a committee may agree to limit the scope of a request, allow a witness to decline to testify on specific matters, or conduct a closed door session. This occurred, for example, during former special counsel Robert Mueller's testimony before the House Committee on the Judiciary and the House Permanent Select Committee on Intelligence. Over the course of his testimony on July 24, 2019, both committees allowed Mueller to decline to answer specific questions for all three of the above reasons. In this case, the committees accepted the limits put forward by Mueller, and they were able to hold the hearings.", "summary": "Executive branch officials testify regularly before congressional committees on both legislative and oversight matters. Most committee requests for testimony are accepted, and the officials appear voluntarily without the need to issue subpoenas or use the other tools available to Congress to compel appearance. Congress's authority under the Constitution to legislate and investigate, along with its practices in exercising these powers, provide strong incentives for the executive branch to work voluntarily with Congress. Congress's control over appropriations and the organization and operations of the executive branch may encourage agency leaders to accommodate its requests rather than risk adverse actions toward their agencies. In addition, there are incentives for the executive branch to work with Congress in order to increase the likelihood of success for the Administration's policy agenda and to manage investigations with the potential to damage the Administration's public standing. These incentives are often sufficient to ensure that the executive branch is responsive to requests from the legislative branch. Many of these interactions are routine, and both Congress and the executive branch have developed formal procedures to promote appropriate engagement. This is particularly apparent in the procedures developed by the Office of Management and Budget in Circular A-11 and Circular A-19 to coordinate and control agency statements to Congress on the budget and pending legislation. There are situations, however, in which the incentives for compliance have been less effective in securing voluntary testimony. While each circumstance is unique, there are three identifiable areas in which executive branch officials may be more likely to conclude that the drawbacks of disclosure to Congress outweigh the incentives discussed in this report: national security and intelligence matters, ongoing law enforcement actions, and executive branch deliberations. Understanding the general incentives that support voluntary testimony, the practices that have developed around its delivery, and when executive branch officials are more likely to object to appearing before Congress may potentially help Congress navigate difficult cases.", "document_type": "crs"}
{"report": "Mapping broadband availability, which means graphically displaying where broadband is and is not available on a map, is complex and depends on dataâwith the accuracy of the map depending on the accuracy of the data used to compose the map. Congress has an interest in accurate broadband mapping data, because accurate data can help ensure that federal broadband programs target areas of the country that are most in need of assistance. The Telecommunications Act of 1996 ( P.L. 104-104 ) requires the Federal Communications Commission (FCC) to determine annually whether broadband is being deployed to all Americans on a timely basis, and the FCC relies on broadband mapping data to make this determination. Additionally, the FCC uses broadband mapping data to direct billions of dollars per year to deploy broadband in unserved or underserved areas. Congress has also taken an interest in broadband mapping due to concerns from constituents that certain areas, especially rural areas, remain underserved or unserved. Pinpointing where broadband is and is not available in the United States has been an ongoing challenge. Current data on broadband availability is provided by private telecommunications providers, collected by the FCC, and displayed on the FCC's Fixed Broadband Deployment Map. Difficulty in accurately mapping broadband availability has been attributed to a number of factors, including the adequacy of census block data, the lack of independent data validation outside the FCC, and the absence of a challenge process for consumers and other entities that believe the Fixed Broadband Deployment Map may overstate availability in their area. In early 2019, it came to the FCC's attention that inaccuracies in the Fixed Broadband Deployment Map's broadband data may cause broadband deployment to be overstated. The Fixed Broadband Deployment Map may indicate that areas have access to broadband when in reality, they do not. Inaccurate data on broadband deployment could lead to overbuilding in areas that currently have broadband while leaving other areas underserved or unserved. In the 116 th Congress, numerous pieces of legislation on improving broadband mapping efforts have been introduced, and multiple hearings have been held on the issue. In August 2019, the FCC adopted a Report and Order to establish a new Digital Opportunity Data Collection (DODC). The goal of this effort is to make the Fixed Broadband Deployment Map more accurate and reliable byâamong other thingsâincorporating public feedback and obtaining additional granularity of data. Options for Congress in this area could include oversight of the FCC effort and additional legislative action to improve the accuracy of broadband mapping. The term broadband commonly refers to high-speed internet access that is faster than dial-up access and is immediately accessible. Broadband includes several high-speed transmission technologies, such as: digital subscriber line (DSL), cable modem, fiber, wireless, satellite, and broadband over power lines (BPL). The internet became publicly available in the 1990s and has evolved since that time as information has continually become digital (e.g., job applications and government forms have moved online). However, not all Americans currently have equal access to broadband. As methods to reach the internet have evolved, so have speeds, with the FCC's current broadband benchmark speed set at 25 megabits per second (Mbps) download and 3 Mbps upload (25/3). Table 1 shows how the FCC's broadband definition has changed from 1996 to its current definition, which was adopted in 2015. The term digital divide refers to a gap between those Americans who use or have access to telecommunications and information technologies and those who do not. While urban areas likely see speeds close to 25/3, broadband speeds in rural areas often do not approach that speedâwith some areas having no access to broadband. Several factors contribute to geographic disparity, including terrain, population density, demography, and other market factors. These factors discourage build-out to areas that are not as densely populated, because they typically result in a lower return on investment for broadband providers. Although strides have been made in the deployment of broadband to rural areas, the urban/rural digital divide persists. In a survey conducted by the Pew Research Center in 2018, adults who live in rural areas were more likely to say that getting access to high-speed internet is a major problem in their local communities. The primary goal of broadband mapping is to identify areas without access to broadband so that policymakers can make informed decisions on policies to address the urban/rural digital divide. The major federal agencies involved in broadband mapping are the National Telecommunications and Information Administration (NTIA) in the Department of Commerce, the FCC, and the Department of Agriculture (USDA). The Broadband Data Improvement Act ( P.L. 110-385 ), enacted on October 10, 2008, directed the Department of Commerce to establish a state broadband data and development grant program. One of the purposes of the program was to assist states in gathering data twice a year on the availability, speed, and location of broadband service as well as on the broadband services used by community institutions, such as schools, libraries, and hospitals. This data was used to establish the National Broadband Map, the first public, searchable, nationwide map of broadband availability, which was launched in 2011. This program, known as the State Broadband Initiative (SBI), was administered by NTIA, an agency in the Department of Commerce, and funded under the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ). Through the SBI program, NTIA awarded a total of $293 million to 56 granteesâone from each of the 50 states, five territories, and the District of Columbia. The grantees were required to use the funds to promote broadband adoption and access tailored to their local needs and collect broadband-related data and provide it to NTIA. In 2015, the SBI program ended, collecting its last data as of June 30, 2014. The National Broadband Map was decommissioned on December 21, 2018, due to the age of the data. Mapping responsibility shifted to the FCC. In the Consolidated Appropriations Act of 2018 ( P.L. 115-141 ), Congress provided $7.5 million to NTIA to develop a National Broadband Availability Map. Specifically, Congress directed NTIA to acquire and display available third-party data sets to augment data from the FCC, other federal government agencies, state governments, and the private sector. The stated objective of this funding was \"to help identify regions with insufficient service, especially in rural areas.\" In response, NTIA announced in February 2019 it had partnered with eight statesâCalifornia, Maine, Massachusetts, Minnesota, North Carolina, Tennessee, Utah, and West Virginiaâfor a pilot to improve the FCC's Fixed Broadband Deployment Map. The first phase of NTIA's new National Broadband Availability Map was published in October 2019. It is available only to state and federal partners due to the inclusion of nonpublic data, which may be business sensitive or have other restrictions that prevent public disclosure. The conference report on the Consolidated Appropriations Act of 2019 ( P.L. 116-6 ) directed an additional $7.5 million to NTIA to continue this mapping effort. In 2000, the FCC established the Form 477 Data Program to collect from providers \"data regarding broadband services, local telephone service competition, and mobile telephony services on a single form and in a standardized manner.\" In 2013, an FCC Report and Order on Form 477 expanded the scope of the data collection program just as NTIA's National Broadband Map was nearing its end. Among the notable changes to the FCC program were: the collection of fixed broadband data by census block and of mobile broadband and mobile voice data by network coverage area; a requirement for providers of broadband services to provide maximum advertised speeds in each census block for fixed broadband and the minimum advertised speed in each coverage area for mobile broadband; provisions for providers to file all data in a single, uniform format instead of different formats across states; and the elimination of the use of speed tiers for broadband subscription data. The FCC collects data on both fixed and mobile broadband availability through Form 477. It does not combine the two sets of data into a single map; rather, it uses the fixed data to create the Fixed Deployment Broadband Map, and it uses the mobile broadband data to determine which areas are eligible for the Mobility Fund Phase II program (see \" Eligibility for Federal Assistance \" below). Every six months, all facilities-based providers of fixed broadband are required to submit a list of all census blocks where they provide, or could provide, fixed broadband service to at least one location. For each census block, the provider is required to submit data specifying the last-mile technology used; whether the provider can or does offer consumer, mass market, or residential service; the maximum advertised download and upload speeds for consumer service; and whether the service is also available for business, enterprise, or government customers. In 2017, the FCC acknowledged some shortcomings of this methodology: Facilities-based providers of fixed broadband must provide in their Form 477 submissions a list of all census blocks where they make broadband connections available to end-user premises, along with the last-mile technology or technologies used. These deployment data represent the areas where a provider does, or could, without an extraordinary commitment of resources, provide service. Thus, the meaning of \"availability\" in each listed census block can be multifaceted, even within the data of a single filer. In a particular listed block, the provider may have subscribers or it may not. At the same time, the provider may be able to take on additional subscribers or it may not. The various combinations have varying implications that make it difficult to understand availability. Specifically, if a block was listed by a provider, it is impossible to tell whether residents of that block seeking service could turn to that provider for service or whether the provider would be unable or unwilling to take on additional subscribers. This may limit the value of these data to inform our policymaking and as a tool for consumers and businesses to determine the universe of potential broadband service providers at their location. The collection of accurate and reliable mobile broadband data is particularly challenging, because a user's mobile wireless experience varies and is affected by factors such as terrain, user location, weather, network congestion, and the type of connected service. Under Form 477 filing rules, facilities-based providers of mobile broadband service are required to submit and certify, for each technology and frequency band employed, polygons in shapefiles that digitally represent the geographic areas in which a customer could expect to receive at least the minimum speed the provider advertises for that area. Additionally, mobile broadband providers must report the census tracts in which their service is advertised and available to potential customers. In August 2019, the FCC adopted a Report and Order introducing the DODC. The DODC is intended to address some of the issues that currently lead to inaccurate broadband mapping data by collecting coverage polygons from broadband service providers, incorporating public input, and revising Form 477. Specifically, the DODC would: require all fixed providers to submit broadband coverage polygons depicting areas where they actually have broadband-capable networks and make fixed broadband service available to end-user locations; reflect the maximum download and upload speeds actually made available in each area, technology used, and differentiation between types of customer (e.g., residential, business, or a combination); incorporate public feedback on fixed broadband coverage; and require Universal Service Administrative Company (USAC) verification of broadband data. In conjunction, the FCC is seeking stakeholder comment on using the DODC exclusively for its broadband mapping and discontinuing use of Form 477. The new data collection obligations will initially be limited to fixed broadband providers. For purposes of the DODC, service is considered to be available in an area if the broadband service provider has an active broadband connection or if it could provide such a connection within 10 business days of a customer request, without an extraordinary commitment of resources, and without construction charges or fees exceeding an ordinary service activation fee. The FCC is currently seeking comment on how best to incorporate mobile broadband data into the DODC. The August 2019 Report and Order proposes revising the existing Form 477 data process for mobile providers by: transitioning the collection of mobile broadband-capable network deployment data to a USAC-administered portal created for fixed data; maintaining the commission's current Form 477 data collection for mobile broadband and voice data in the interim; and reducing the burden on service providers required to submit the form. These changes suggest that the FCC may be planning to add mobile broadband data to the Fixed Broadband Deployment Map. USDA's Rural Utilities Service (RUS) oversees federal programs that fund the deployment of broadband infrastructure. To help determine where to direct federal resources, USDA also maps broadband availability. However, USDA maps are used differently than the FCC's Fixed Broadband Deployment Map. While the FCC's map is used to determine where broadband is and is not, USDA uses its maps to provide a resource for visualizing existing or proposed broadband service areas. For example, the USDA's Broadband Program Mapping Tool is used by: existing borrowers or those interested in applying for funding under the Infrastructure Loan Program, Broadband Loan and Loan Guarantee Program, or Community Connect Grant Program, enabling them to draw existing or proposed service area maps; RUS to post Public Notices of proposed funded service areas for received loan applications, as well as by existing service providers to submit information on their service offerings; other entities that wish to upload an authenticated map of existing broadband services. USDA's other mapping tool is part of the ReConnect Program, which was established under the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), and is administered by RUS. For ReConnect, RUS established an eligibility area map and application mapping tool designed to assist in the determination of service area eligibility across the United States by displaying four categories of data: the FCC's Connect America Fund winners, nonrural areas, pending applications, and protected broadband borrower service areas. Accurate broadband data and mapping helps policymakers to make informed decisions about where federal funding should be directed, such as with the FCC's upcoming Rural Digital Opportunity Fund, and enables federal agencies to fulfill certain statutory requirements, such as the FCC's annual \"reasonable and timely deployment\" determination. Accurate maps are important in federal funding decisions designed to target areas where broadband is needed the most. Without accurate data, maps may not be reliable indicators of need, and federal assistance may be provided to areas that already have adequate broadband services. This may result in overbuild in some areas and neglect of other areas, further widening the disparities between areas that are served and those that are not. In December 2018, FCC Commissioner Jessica Rosenworcel stated: Getting [the broadband map] right matters because we cannot manage what we do not measure. If we don't have proper maps, we will not be able to target policy solutions effectively. The FCC distributes billions of dollars each year to help accelerate the build-out of broadband so we can connect all our communities. It's irresponsible for the agency to do so without having a truly accurate picture of where those resources should go. A recent example of how inaccurate data has affected eligibility for federal assistance occurred in the FCC's Mobility Fund II program. In August 2018, the FCC published initial eligibility maps for Mobility Fund II, which were to be used in allocating up to $4.53 billion in support for rural wireless broadband expansion. In December 2018, the FCC announced it would launch an investigation into whether one or more major carriers violated the Mobility Fund reverse auction's mapping rules and submitted incorrect coverage maps. Until this investigation concludes, the FCC will not distribute the $4.53 billion. This incident drew congressional attention, including a letter to the FCC from a bipartisan group of 30 Senators, who wrote: As you know, many of us have expressed concern about the accuracy of the Federal Communications Commission's map of eligible areas for Mobility Fund Phase II Support (MFII). This map is intended to reflect areas that lack unsubsidized mobile 4G LTE service, but it unfortunately falls short of an accurate depiction of areas in need of universal service support. Another example is the FCC's recent announcement of the Rural Digital Opportunity Fund, which would distribute $20.4 billion over 10 years to expand broadband in rural areas. Though this initiative aims to help close the urban/rural digital divide, without accurate broadband mapping, it will be difficult to determine which areas are in most need of funds. FCC Chairman Ajit Pai stated: One important reason I'm so pleased that we are moving forward with this item is that we'll be putting the new maps to work right away. The Rural Digital Opportunity Fund Notice of Proposed Rulemaking that we adopted earlier today specifically proposes to use the new map to direct more than $4 billion in Phase II funding to deploy high-speed broadband networks to serve Americans living in areas of the country that Form 477's census-block level reporting deems served, but where some residents are actually not served. The Telecommunications Act of 1996 ( P.L. 104-104 ) requires the FCC to \"initiate a notice of inquiry concerning the availability of advanced telecommunications capability to all Americans.\" In conducting this inquiry, the FCC must \"determine whether advanced telecommunications capability is being deployed to all Americans in a reasonable and timely fashion.\" If that determination is negative, the commission \"shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market.\" Using data from Form 477, the FCC develops an annual Broadband Deployment Report, also referred to as the Section 706 Report, in which the FCC evaluates the availability of fixed and mobile broadband services. In its 2019 analysis, the FCC made a Section 706 finding that advanced telecommunications capability is being deployed to all Americans in a reasonable and timely fashion. This finding was supported by Chairman Pai, Commissioner Michael O'Reilly, and Commissioner Brendan Carr, with Commissioners Jessica Rosenworcel and Geoffrey Starks dissenting. The 2019 report makes frequent references to broadband mapping and concerns about data quality. Difficulty in mapping broadband availability has been attributed to a number of factors, including lack of data granularity, overstated availability, lack of independent data validation, and the difficulty in keeping up with real-time deployments. The FCC requires each broadband service provider to submit information on the services it offers at the census block level. Census blocks are the smallest unit of geography defined by the Census Bureau and are \"statistical areas bounded by visible features, such as streets, roads, streams, and railroad tracks, and by nonvisible boundaries, such as selected property lines and city, township, school district, and county limits and short line-of-sight extensions and roads.\" Census blocks vary in size and population, and their geographical area can be especially large in rural areas. For the purposes of Form 477, the FCC considers a census block served if even one house or business in the block is served. Since census blocks in rural areas can be large, this may provide a misleading impression. For example, if fiber is connected to a home in one part of a census block, it may not be connected to another home in the same census block that is a mile down the road. With the use of census blocks, areas within a large block that might otherwise be eligible for federal assistance may not be considered eligible. The Utah Governor's Office of Economic Development told the NTIA: Basing data collection, planning efforts, and funding decisions on census blocks is problematic, particularly in blocks which are large, remote, and include terrain that makes it difficult to install infrastructure. For example, in Utah, the largest populated census block is 947 square miles. Under the current Form 477 submission process, any census block that is partially covered would be ineligible for all federal broadband programs, even if only a small percentage of households or census block area is covered. Although staff examine FCC Form 477 data for quality and consistency, the FCC acknowledges that the data may understate or overstate deployment of services to the extent that broadband providers misreport or fail to report. For example, after the FCC released a draft annual Broadband Deployment Report in February 2019, it was discovered that a relatively new company, Barrier Communications Corporation, had apparently submitted data claiming presence in every single census block in Connecticut, the District of Columbia, Maryland, New Jersey, New York, Pennsylvania, Rhode Island, and Virginiaâwhich collectively contain nearly 62 million people. A subsequent correction of this data resulted in the FCC issuing a revised Broadband Deployment Report. In April 2019, Microsoft asserted that the percentage of Americans without broadband access is much higher than the figures reported by the FCC. Microsoft claimed that although the FCC indicates that 24.7 million people do not have broadband available, Microsoft's own data indicates that 162.8 million people do not use the internet at broadband speeds of 25 Mbps or more. Microsoft released a map showing differences between the FCC's claimed broadband access and actual usage of broadband. NCTAâThe Internet and Television Association criticized this analysis, however, saying that it \"conflates availability and usage\" and, as a result, draws \"a number of unsupportable conclusions.\" Broadband service providers self-report information on Form 477. Although the FCC reviews the data, it is not verified independently outside of the agency. There is also no challenge process in place if a consumer, provider, or other entity identifies any of the data as potentially inaccurate. Stakeholders who testified at an April 2019 hearing before the Senate Committee on Commerce, Science, and Transportation asserted that a challenge process is needed, citing the problems with the FCC's mobility fund auction and how it was difficult for wireless carriers to challenge mobile broadband availability data that the FCC had intended to use as a basis for awarding funding. The FCC currently updates the Fixed Broadband Deployment Map every six months, but the map reflects data that is a year or more behind the current date. For example, as of October 2019, the Map reflects June 2018 data. The telecommunications industry is fluid. Broadband service providers are constantly changing, building new networks, or revising older networks. Once implemented, the FCC's new DODC will require broadband service providers to submit updates within six months of completing new broadband deployments, making changes to (including upgrading or discontinuing) existing offerings, or acquiring new or selling existing broadband-capable network facilities that affect the data submitted on their DODC filings. This may help produce maps that are more up to date. As Congress considers broadband mapping, it may consider ways to address the challenges of data granularity and lack of validation, the frequent differences between advertised and actual broadband speeds, the balance between short-term and long-term solutions, ways to improve interagency coordination, and state efforts that might be models for future federal action. Some of these issues are address by legislation already introduced in the 116 th Congress (see Appendix A ). How much more granular maps need to be to serve policymakers remains an open question. Increasing the granularity of data costs money, and costs may not be shared equally among stakeholders. Some stakeholders have expressed concern that requiring additional granularity might place a larger burden on smaller broadband service providers. As stated by WTAâAdvocates for Rural Broadband: The Commission's decision to use polygon shapefile reporting, and potentially create a location fabric, is a vast improvement over the current Form 477 regime that has overstated the amount of locations served. However, as the Commission is well aware, small providers have limited staff and resources such that new reporting requirements should be carefully balanced so as to provide necessary information without becoming overly burdensome. USTelecom has proposed a methodology to the FCC to provide additional granularity called the Broadband Serviceable Location Fabric (BSLF). The methodology contains: multiple sources of address, building, and parcel data to develop and validate a comprehensive database of all broadband serviceable locations in the two pilot states; a vendor to conform address formats, remove duplicates, and assign a unique latitude and longitude to the actual building where broadband service is most likely to be installed using a georeferencing tool; a mediated crowdsourcing platform that will enable consumers to submit information to improve the accuracy of the database; and customer address lists provided by participating companies to augment the validation process that will be automatically indexed to the final database to facilitate accurate broadband availability reporting. Different methods for reporting service availability will be tested. To test this methodology, USTelecom launched a Broadband Mapping Initiative Pilot in Virginia and Missouri. The results were released to the public in August 2019 and revealed that in Virginia and Missouri combined, over 450,000 homes and business are counted as served under the FCC's Form 477 process but are not receiving service from participating providers. Further, USTelecom stated that the pilot demonstrates it is now possible to identify and precisely locate virtually every structure in a geographic area that is capable of receiving broadband service. On one hand, USTelecom's initiative might yield better data; on the other hand, the cost of collecting that data would be higher than current methods. USTelecom's proposal estimates that the cost to implement the initial nationwide BSLF would be between $8.5 million and $11 million and, because the BSLF would be a living database, keeping it updated would cost approximately $3 million to $4 million per year. If Congress were to contemplate an initiative of this type, it might wish to consider whether funding at such levels for ongoing broadband map maintenance is sustainable and where the necessary funding would come from. When broadband service providers submit Form 477, the FCC reviews the data, but there is no validation process outside of the agency to verify that the data is accurate. Having no validation process can be problematic, as there may be instances in which submitted data may be erroneous. In conjunction, there is also no present process in place for the public, providers, or other entities to challenge the data if they believe it to be incorrect. To improve accuracy, the FCC and other stakeholders have cited crowdsourcing as one method to get \"boots-on-the-ground\" information into the Fixed Broadband Deployment Map. For example, NCTA has proposed that after the FCC publishes maps based on the new FCC reporting regime, consumers and other stakeholders could submit evidence demonstrating potential inaccuracies. In its August 2019 Report and Order , the FCC directed USAC, under the oversight of the Commission's Office of Economics and Analytics, to create an online portal for local, state, and tribal governmental entitiesâas well as members of the publicâto review and dispute coverage under the new DODC. However, NCTA raised a concern with delegating the responsibility to USAC: The delegation of such broad authority to USAC is unusual and raises many questions. NCTA suggests that a more traditional approach, i.e., delegating authority to the relevant Commission bureaus and offices, which would then direct USAC to take action where needed, is the better approach in this case. One option for Congress might be to enact legislation either confirming the delegation to the USAC or directing the FCC to conduct this activity in-house. Alternatively, Congress might choose to leave that decision to the FCC while focusing congressional oversight on how the USAC handles the DODC to determine whether the effort is being handled judiciously. The FCC currently requires broadband service providers to submit maximum advertised upload and download speeds. However, in some cases these speeds can vary greatly from speeds the customer is actually receiving. For example, the FCC has identified Iowa as the only Midwestern state with virtually complete access to high-speed internet, with every county covered by download speeds of 25 Mbps. Speed tests conducted by the Open Technology Instituteâa technology program of the New America Foundation that formulates policy and regulatory reformsâclaims that internet users in Iowa actually experience download speeds of 25 Mbps only 22% of the time. Rather than the previous requirement of maximum advertised speeds, the FCC's August 2019 adopted Report and Order now requires broadband service providers to provide the maximum upload and download speeds actually made available in each area. This will provide greater insight into what speeds consumers are actually receiving, but relying on available maximum upload and download speeds may still not reflect the actual user experience due to network congestion or weather. Collecting information on actual speeds would provide additional insight into the broadband experience of actual consumers, but this might impose a burden on broadband service providers. One option for Congress might be to mandate a pilot project to assess the feasibility of download and upload speed collection that accurately reflects the consumer experience as well as the burden on providers. Alternatively, Congress might choose to leave this issue to the FCC's discretion. Should the FCC should adopt a short-term solution to fix mapping issues quickly, but perhaps not thoroughly? Or should it adopt a longer-term solution that might delay the distribution of funds of other initiatives but might ultimately achieve a more accurate result? NCTA's proposed solution of using shapefilesâinstead of census blocks and similar to what is currently used for mobile broadband reporting through Form 477âfor fixed broadband data collection has been criticized as being overly vague, but NCTA believes its proposal offers the fastest solution: [For this reason], we agree with the FCC and members of Congress that the current broadband map must be meaningfully improved. We also believe that a pragmatic approach can yield significant improvements in the shortest timeframe. That is why NCTA has proposed a solution that can be implemented nationwide very quickly, without any need for a pilot, and would result in the granular data needed to more accurately identify areas that currently are not served by a fixed broadband provider. USTelecom disputes NCTA's approach, stating: We agree with NCTA that shapefiles are one of several reasonable methods for broadband providers to report their service data. The difference is that NCTA wants the FCC to stop at shapefiles and not create the BSLF, but shapefiles alone do not produce the detailed data the Commission needs to responsibly close the digital divide. The DODC will include the collection of polygons, but the FCC's Second Notice of Proposed Rulemaking seeks comment on ways that location-specific data could be overlaid onto the polygon-based data to precisely identify the homes and small businesses that have and do not have broadband access. A consideration for Congress is whether the need for more granular and accurate data justifies withholding federal broadband funding until better data are available or whether the goal of closing the urban/rural digital divide is so pressing that funding should proceed based on the data currently available. The FCC collects data from broadband service providers every six months through Form 477 and updates the Fixed Broadband Deployment Map twice a year. However, the Fixed Broadband Deployment Map's data lags approximately a year and a half behind. For example, as of October 2019, the Fixed Broadband Deployment Map contains data with the latest public release as of June 2018. A consideration for Congress may be whether the Fixed Broadband Deployment Map could be updated more frequently (e.g., data could be collected every month) to reflect continuing network changes and, if so, whether that would impose a significant burden on broadband service providers. The involvement of multiple agenciesâNTIA, FCC, and USDAâin broadband mapping and the provision of broadband subsidies and technical assistance may present challenges for interagency coordination and communication. For example, without interagency coordination, there is a potential for federal broadband funding efforts to be duplicative. The 116 th Congress is considering additional legislation regarding interagency coordination (see Appendix B ). Interagency coordination was also a major focus of the February 2019 USDA American Broadband Milestones Initiatives Report . As an example, the report discusses how NTIA is working on creating a \"one-stop shop\" for broadband permitting and deployment. Finally, the conference agreement for the 2019 Consolidated Appropriation ( P.L. 116-6 ) has language regarding interagency coordination: To ensure these investments are maximized, the conference agreement reminds the Department to avoid efforts that could duplicate existing networks built by private investment or those built leveraging and utilizing other federal programs and directs the Secretary of Agriculture to coordinate with the Federal Communications Commission (FCC) and the National Telecommunications Information Administration (NTIA) to ensure wherever possible that broadband loans and grants issued under the broadband programs are targeted to areas that are currently unserved. Some state broadband offices have undertaken broadband mapping efforts, which could serve as models for federal efforts. For example: Kansas' new map published in July 2019 shows service availability at the street level for broadband across the state; North Carolina's broadband map has a new user-reporting tool that allows residents to provide feedback and identify pockets of unserved and underserved areas; and Wyoming's interactive map shows the results of internet-speed tests and broadband availability across the state. The map displays a color-coded dot for every speed test that has been completed in the state, creating a visual demonstration of served and unserved areas, along with quality of service at those locations. Broadband mapping has garnered congressional interest since the creation of the SBI under the Broadband Data Improvement Act ( P.L. 110-385 ) and introduction of the NTIA's National Broadband Map. Mapping efforts have continually improved since that time, but congressional interest in mapping accuracy has been heightened due to recent challenges that have resulted in potential overstatement of broadband availability. The FCC's DODC, which will take effect once specifications for the coverage polygons are defined through the FCC's comment-and-reply process, is a first step in obtaining more granular and accurate broadband mapping data. As the new collection effort unfolds, Congress may take an interest in monitoring whether the effort seems sufficient to alleviate the current broadband mapping issues, whether to wait on distribution of federal funding until the map is determined accurate, or whether additional legislative action should be taken. Appendix A. Broadband Mapping Legislation in the 116 th Congress H.R. 1644 (Doyle), introduced on March 8, 2019, as the Save the Internet Act of 2019, includes provisions that would require the Government Accountability Office to prepare reports on broadband internet access service competition, ways to improve broadband infrastructure in rural areas, challenges to accurate broadband mapping, and the benefits of standalone broadband. It would require the FCC to engage with tribal communities to address broadband needs, delay release of its 706 Report until broadband data inaccuracies are corrected, and submit to Congress a report containing a plan for how the FCC will evaluate and address problems with Form 477 broadband data. Passed by the House on April 10, 2019. Placed on the Senate Legislative Calendar under General Orders on April 29, 2019. H.R. 2643 (Latta), introduced on May 9, 2019, as the Broadband MAPS Act of 2019, would direct the FCC to establish a challenge process to verify fixed and mobile broadband service coverage data. Referred to the Committee on Energy and Commerce. H.R. 2741 (Pallone), introduced on May 15, 2019, as the LIFT America Act, would provide $40 billion to the FCC to establish a reverse auction (nationally and by states) that would fund broadband infrastructure deployment in unserved and underserved areas (Title I, Subtitle A). Section 11001 of the bill would direct how existing broadband data/mapping should be used and challenged. Referred to the Committee on Natural Resources, Subcommittee for Indigenous Peoples of the United States. H.R. 3055 (Serrano), introduced June 3, 2019, as the Commerce, Justice, Science, Agriculture, Rural Development, Food and Drug Administration, Interior, Environment, Military Construction, Veterans Affairs, Transportation, and Housing and Urban Development Appropriations Act, 2020. As passed by the House, includes broadband mapping-related provisions. One provision would prevent NTIA from using funding to update broadband maps using only Form 477 data, and the other would provide $1 million in broadband mapping funding to NTIA. Placed on Senate Legislative Calendar under General Orders. Calendar No. 141. H.R. 3162 (McMorris Rodgers), introduced June 6, 2019, as the Broadband Data Improvement Act of 2019, would require the FCC to establish a reporting requirement under which each provider submits accurate and granular information regarding the geographic availability of broadband internet access and to establish a framework for an ongoing challenge process through which a provider or a member of the public may submit information challenging the accuracy of the information reflected on the National Broadband Map. Referred to the Committee on Energy and Commerce. H.R. 4024 (Finkenauer), introduced on July 25, 2019, as the Broadband Transparency and Accountability Act of 2019, would direct the FCC to require an entity to report data that reflects the average speed and characteristics of broadband service. It would also require the FCC to establish a process to use data that is reported by consumers, businesses, and state and local governments to verify the data used in the Broadband Map. Referred to the Committee on Energy and Commerce. H.R. 4128 (LujÃ¡n), introduced on July 30, 2019, as the Map Improvement Act of 2019, would direct the FCC to establish a standardized methodology for collecting and mapping accurate fixed broadband internet service and mobile broadband internet service coverage data. It would also establish an Office of Broadband Data Collection and Mapping within the FCC. Referred to the Committee on Energy and Commerce. H.R. 4227 (McEachin), introduced on September 6, 2019, as the Mapping Accuracy Promotes Services Act, would prohibit the submission to the Federal Communications Commission of broadband internet access service coverage information or data for the purposes of compiling an inaccurate broadband coverage map. Referred to the House Committee on Energy and Commerce. H.R. 4229 (Loebsack), introduced on September 6, 2019, as the Broadband Deployment Accuracy and Technological Availability Act, would require the FCC to issue rules relating to the collection of data with respect to the availability of broadband services. Referred to the House Committee on Energy and Commerce. S. 842 (Klobuchar), introduced on March 14, 2019, as the Improving Broadband Mapping Act of 2019, would require the FCC to establish a process to use coverage data reported by consumers and state, local, and tribal government entities to verify coverage data reported by wireless carriers. Additionally, it would direct the FCC to consider other measures, including, but not limited to, an evidence-based challenge process, to help in verifying coverage data reported by providers of both fixed and mobile broadband services. Referred to the Committee on Commerce, Science, and Transportation. S. 1485 (Manchin), introduced on May 15, 2019, as the Map Improvement Act of 2019, would require the FCC, in coordination with NTIA, to establish a standardized methodology for collecting and mapping accurate fixed and mobile broadband coverage data. It would establish an Office of Broadband Data Collection and Mapping at the FCC to serve as the central point of collection, aggregation, and validation of data. It would establish a technical assistance grant program at NTIA to support state and local entities in broadband mapping and assessing broadband adoption and pricing within their communities. Referred to the Committee on Commerce, Science, and Transportation. S. 1522 (Capito), introduced on May 16, 2019, as the Broadband Data Improvement Act of 2019, would direct the FCC to establish rules that require providers to submit more accurate and granular broadband data; a three-pronged data validation process involving public feedback, third-party commercial datasets, and an on-the-ground field validation process; and a periodic challenge process. It would require the National Broadband Map to be used by federal agencies to identify areas that remain unserved and track where awarded funds have actually resulted in broadband buildout. Referred to the Committee on Commerce, Science, and Transportation. S. 1822 (Wicker), introduced on June 12, 2019, as the Broadband Deployment Accuracy and Technological Availability Act, would require the FCC to issue rules to collect more granular broadband coverage data, including a decision on whether to collect verified information from others, such as state, local, and t ribal governmental entities that are primarily responsible for mapping or tracking broadband internet access service coverage for their respective jurisdictions. Referred to the Committee on Commerce, Science, and Transportation. S. 2275 (Bennet), introduced on July 25, 2019, as the Broadband Transparency and Accountability Act of 2019, would direct the FCC to require an entity to report data that reflects the average speed and characteristics of broadband service. It would also require the FCC to establish a process to use data that is reported by consumers, businesses, and state and local governments to verify the data used in the Broadband Map. Referred to the Committee on Commerce, Science, and Transportation. Appendix B. Broadband Interagency Coordination Legislation in the 116 th Congress H.R. 292 (Curtis), introduced on January 8, 2019, as the Rural Broadband Permitting Efficiency Act of 2019, would coordinate federal broadband permitting to encourage expansion of broadband service to rural and tribal communities. Referred to the Subcommittee on Conservation and Forestry. H.R. 1328 (Tonko), introduced on February 25, 2019, as the ACCESS Broadband Act, would establish the Office of Internet Connectivity and Growth within NTIA. The office would provide outreach to communities seeking improved broadband connectivity and digital inclusion, track federal broadband dollars, and facilitate streamlined and standardized applications for federal broadband programs. Passed by the House on May 8, 2019. H.R. 2601 (Peterson), introduced on May 8, 2019, as the Office of Rural Telecommunications Act, would direct the FCC to establish the Office of Rural Telecommunications, which would coordinate with RUS within the USDA, NTIA, and other federal broadband programs. Referred to the House Committee on Energy and Commerce. H.R. 3278 (Loebsack), introduced on June 13, 2019, as the Connect America Act of 2019, would provide for the establishment of a program to expand access to broadband and coordinate with other federal programs that expand access to broadband, such as the Connect America Fund or the Broadband e-Connectivity Pilot Program, to ensure the efficient use of program funds. Referred to the House Committee on Energy and Commerce. H.R. 3676 (Khanna), introduced on July 10, 2019, as the Measuring Economic Impact of Broadband Act of 2019, would direct the Secretary of Commerce to conduct an assessment and analysis of the effects of broadband deployment and adoption on the economy, including consultation with the heads of agencies and offices of the federal government as the Secretary considers appropriate. Referred to the House Committee on Energy and Commerce. H.R. 4283 (Pence), introduced on September 11, 2019, as the Broadband Interagency Coordination Act of 2019, would require federal agencies with jurisdiction over broadband deployment to enter into an interagency agreement related to certain types of funding for broadband deployment. Referred to the Committee on Energy and Commerce and the Committee on Agriculture. S. 454 (Cramer), introduced on February 12, 2019, as the Office of Rural Broadband Act, would establish an Office of Rural Broadband within the FCC that would coordinate with RUS/USDA, NTIA, and other FCC broadband-related activities. Referred to the Committee on Commerce, Science, and Transportation. S. 1046 (Cortez Masto), introduced on April 4, 2019, as the ACCESS Broadband Act, would establish the Office of Internet Connectivity and Growth within NTIA. The office would provide outreach to communities seeking improved broadband connectivity and digital inclusion, track federal broadband dollars, and facilitate streamlined and standardized applications for federal broadband programs. Referred to the Committee on Commerce, Science, and Transportation. S. 1289 (Klobuchar), introduced on May 2, 2019, as the Measuring Economic Impact of Broadband Act of 2019, would direct the Secretary of Commerce to conduct an assessment and analysis of the effects of broadband deployment and adoption on the economy, including consultation with the heads of agencies and offices of the federal government as the Secretary considers appropriate. Referred to the House Committee on Energy and Commerce. S. 1294 (Wicker), introduced on May 2, 2019, as the Broadband Interagency Coordination Act of 2019, would require federal agencies with jurisdiction over broadband deployment (FCC, USDA, NTIA) to enter into an interagency agreement related to certain types of funding for broadband deployment. Referred to the Committee on Commerce, Science, and Transportation.", "summary": "Access to high-speed internet, also known as broadband, is increasingly important in the 21 st century, as more and more aspects of everyday life, such as job applications and homework assignments, become digital. Some areas of the United Statesâparticularly rural areasâhave limited or no access to broadband due to market, geographic, or demographic factors. The gap between those who have access to broadband and those who do not is referred to as the digital divide. The Federal Communications Commission (FCC), National Telecommunications and Information Administration (NTIA), and Rural Utilities Service (RUS) have developed maps to help guide resources toward closing the digital divide. Since 2018, the FCC has had the responsibility for developing a comprehensive map of broadband access in the United States. However, the data available to determine where to invest resources may be incomplete or inaccurate. For example, the FCC's current methodology considers a census block served if at least one home or business in that census block has broadband access. In addition, the data is self-reported by broadband service providers and not independently verified outside the FCC. On August 1, 2019, the FCC adopted a Report and Order introducing a new process, called the Digital Opportunity Data Collection (DODC), for collecting fixed broadband data. The new process would require broadband service providers to provide geospatial broadband coverage mapsâwhich provide greater granularity than census blocksâindicating where fixed broadband service is actually made available. The new process would also implement a crowdsourcing mechanism for public feedback, as individual consumers will likely know whether they have access to broadband. The FCC also adopted a Second Further Notice of Proposed Rulemaking (FNPRM) , seeking comment on issues including the need for additional granularity and the potential sunset of the current data collection process upon complete implementation of the DODC. As the FCC implements the DODC process, Congress has a wide variety of options for oversight and legislation. For example, Congress may continue to consider issues such as the optimal level of data granularity, the process for independent validation, and costs and burdens of broadband data collection on both consumers and broadband service providers. Congress could consider providing federal funding for a broadband mapping pilot to thoroughly assess these factors and assist in determining how to strike the desired balance, as well as exploring what funding levels for ongoing broadband map maintenance would be sustainable and where the necessary funding would come from. Congress may debate whether to leave factors within the proposed DODC, such as the current delegation of broadband data collection authority to the Universal Service Administrative Company, to the discretion of the FCC, or Congress may wish to enact legislation to keep broadband data collection efforts under the purview of the FCC. To assist with future federal action, Congress may take into consideration successful state broadband mapping efforts, which could provide additional insight into models that could be replicated on a national scale. Congress may continue to debate potential short-term and long-term broadband mapping solutions, including whether federal funding for rural broadband expansion should be withheld until mapping issues are resolved. In conjunction, Congress may also contemplate whether to provide oversight over federal agency broadband activities or enact legislation regarding interagency coordination efforts on broadband deployment to reduce the potential for duplicative funding. Another consideration for Congress may be whether the FCC's Fixed Broadband Deployment Map could be updated more frequently so that data reflects continuing network changes and, if so, whether that would impose a significant burden on broadband service providers. Bills addressing many of these broadband mapping issues have been introduced in the 116 th Congress, including the Save the Internet Act of 2019 ( H.R. 1644 ), passed by the House on April 10, 2019, and the ACCESS Broadband Act ( H.R. 1328 ), passed by the House on May 8, 2019.", "document_type": "crs"}
{"report": "P resident Trump has long advocated for the construction of additional fencing, walls, and other barriers along the U.S.-Mexico border to deter unlawful border crossings. Less than a week after taking office, the President issued an executive order directing the Secretary of Homeland Security to \"take all appropriate steps to immediately plan, design, and construct a physical wall along the southern border.\" This policy has engendered a robust debate in the public sphere, and a conflict has also made its way to federal court, with various plaintiffs challenging the lawfulness of the Trump Administration's initiatives to pay for the construction of border barriers by reprogramming funds from existing appropriations. At their core, these lawsuits concern whether the Administration's funding initiatives exceed existing statutory authorization and conflict with Congress's constitutionally conferred power over federal funds. Article I of the Constitution provides that \"[n]o money shall be drawn from the Treasury but in Consequence of Appropriations made by Law.\" As Justice Joseph Story noted in his Commentaries on the Constitution , the appropriations power was given to Congress to guard against arbitrary and unchecked expenditures by the executive branch and to \"secure regularity, punctuality, and fidelity, in the disbursement of the public money.\" \"In arbitrary governments,\" he expounded, \"the prince levies what money he pleases from his subjects, disposes of it, as he thinks proper, and is beyond responsibility or reproof.\" To avoid giving the President such \"unbounded power over the public purse of the nation,\" the Framers designated Congress \"the guardian of [the national] treasure\"âgiving to it \"the power to decide, how and when any money should be applied[.]\" This \"power to control, and direct the appropriations,\" Justice Story explained, serves as \"a most useful and salutary check upon profusion and extravagance, as well as upon corrupt influence and public speculation.\" Justice Story's sentiments echoed those of James Madison, who in The Federalist No. 58 described the legislature's \"power over the purse\" as \"the most complete and effectual weapon with which any constitution can arm the immediate representatives of the people, for obtaining a redress of every grievance, and for carrying into effect every just and salutary measure.\" The Trump Administration's early efforts to secure funding for border barriers focused on negotiating with Congress to secure appropriations specifically designated for that task. In his FY2018 budget proposal, President Trump requested that Congress appropriate $1.57 billion for border barrier construction. Similarly, President Trump's FY2019 budget request sought $1.6 billion \"to construct approximately 65 miles of border wall in south Texas.\" Congress did not appropriate the amounts requested for either fiscal year. For FY2018, Congress appropriated $1.375 billion for new or repaired fencing and other forms of barriers along the U.S.-Mexico border, as well as $196 million for border monitoring technology. As FY2019 began, Congress and the President negotiated, inter alia , the amount of funding to provide the Department of Homeland Security (DHS) for border barrier construction for FY2019. Ultimately, Congress and the President did not agree on funding levels, leading to a 35-day lapse of appropriations for DHS and other portions of the federal government. During the partial government shutdown, President Trump increased his request for border barrier funding from $1.6 billion to $5.7 billion. Congress did not grant this request. Instead, in the Consolidated Appropriations Act, 2019 (CAA 2019), Congress appropriated $1.375 billionâ$4.325 billion less than was ultimately requestedâfor \"the construction of primary pedestrian fencingÂ . . . in the Rio Grande Valley Sector.\" President Trump signed the CAA 2019 on February 15, 2019, that same day announcing that his Administration would \"take Executive action\" to \"secure additional resources\" to construct barriers along the southern border. In particular, President Trump announced that his Administration had identified \"up to $8.1 billion\" from three additional funding sources \"to build the border wall.\" It remains to be seen whether the Administration will identify further funding sources from the FY2020 budget cycle. Several plaintiffs filed lawsuits in federal courts in California, the District of Columbia, and Texas to prevent the Trump Administration from taking this action. These plaintiffs assert that the Administration's funding initiatives are not authorized under existing law and thus violate the constitutional and statutory provisions requiring that federal money be spent only for the purposes, and in the amounts, specified by Congress. In May 2019, a federal district court in California concluded that one of the Administration's funding initiatives was unlawful and prohibited the Administration from using that authority to repurpose funds for border barrier construction. Though the U.S. Court of Appeals for the Ninth Circuit denied the Administration's request to stay the injunction, the Supreme Court granted that request, thus allowing the Administration to begin contracting for construction of border barriers while litigation in the case continues. A second federal district court in Texas has separately enjoined the use of military construction funds for border barrier construction. Meanwhile, the federal district court in the District of Columbia ruled that the plaintiff in that caseâthe U.S. House of Representativesâdid not have standing to sue and dismissed the suit. The U.S. House of Representatives has appealed the decision. According to DHS's U.S. Customs and Border Protection (CBP), there had been roughly 654 miles of primary barriers deployed along the U.S.-Mexico border as of January 2017. In May 2019, CBP declared that \"approximately 205 miles of new and updated border barriers\" had been funded (though not necessarily constructed) \"through the traditional appropriations process and via Treasury Forfeiture Funding\" since January 2017. In addition to this mileage, CBP described DOD as funding in FY2019 \"up to approximately 131 miles of new border barriers in place of dilapidated or outdated designs, in addition to road construction and lighting installation.\" In total, CBP stated that some 336 total miles of barriers (including both replacement barriers and barriers deployed in new locations) would be deployed using funds from FY2017 through FY2019. This report addresses the litigation surrounding the Trump Administration's initiatives to repurpose existing appropriations for the construction of border barriers along the U.S.-Mexico border. It begins by providing an overview of the authorities cited by the Trump Administration to obtain border barrier funding and the steps the Administration has taken to utilize those authorities. It then discusses DHS's existing authority to construct border barriers and the various authorities on which the Trump Administration has relied to secure additional border barrier funding. Finally, this report discusses the ongoing litigation regarding the Administration's funding initiatives, with a focus on the parties' arguments and judicial decisions. The Trump Administration has cited several statutory authorities as giving it both the power and the necessary funds to construct additional border barriers. Some of these authorities belong to DHS, the agency with primary responsibility for securing the U.S. borders. Other authorities permit the Department of Defense (DOD) or the Department of the Treasury to transfer funds for specified military, law enforcement, or other emergency purposes. These authorities are described in more detail below. First , Section 102 of the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) as amended generally authorizes DHS to construct barriers and roads along the international borders in order to deter illegal crossings at locations of high illegal entry, and further directs the agency to construct fencing along no less than 700 miles of the U.S.-Mexico border. This law also authorizes the Secretary of Homeland Security to waive \"all legal requirementsÂ . . . necessary to ensure expeditious construction of . . . [the] barriers.\" Second , the Secretary of Defense is authorized by 10 U.S.C. Â§Â 2808 to \"undertake military construction projects . . . not otherwise authorized by law that are necessary to support such use of the armed forces.\" President Trump stated that he would invoke his authority under this provision to repurpose $3.6 billion allocated to \"military construction projects\" for border barrier construction. This authority becomes available upon a \"declaration by the President of a national emergency\" as authorized by the National Emergencies Act (NEA). Third , DOD has authority under 10 U.S.C. Â§Â 284 (\"Section 284\") to support other departments' or agencies' counterdrug activities, including through the construction of fencing to block drug smuggling corridors. President Trump proposed to direct the DOD to use its authority under Section 284 to support DHS's \"counterdrug activities\" through the construction of fencing across drug trafficking corridors at the southern border. These support activities would be funded by $2.5 billion in DOD's Drug Interdiction and Counter-Drug Activities Account (Drug Interdiction Account), which would be transferred to that account using the transfer authority in Sections 8005 and 9002 of the 2019 DOD Appropriations Act. These authorities authorize the transfer of up to $6 billion of DOD funds for \"unforeseen military requirements\" but only \"where the item for which funds are requested has been denied by Congress.\" Fourth , the Treasury Forfeiture Fund contains funds that are confiscated by, or forfeited to, the federal government pursuant to laws enforced or administered by certain law enforcement agencies, and unobligated money in this fund may be used for obligation or expenditure in connection with \"law enforcement activities of any Federal agency.\" The President proposed to withdraw $601 million in unobligated funds from the Treasury Forfeiture Fund ( TFF) to pay for border barrier construction. The Trump Administration has taken steps to make these funds available to construct border barriers along the U.S.-Mexico border. On February 15, the President declared a national emergency under the NEA, and has subsequently vetoed two congressional resolutions disapproving that declaration (which Congress did not override). On September 3, 2019, the Secretary of Defense directed the Acting Secretary of the Army to \"expeditiously undertake\" 11 border barrier military construction projects pursuant to Section 2808. In addition, on February 25, DHS requested that DOD use its authority under 10 U.S.C. Â§Â 284 to assist in constructing border barriers. DOD granted this request on March 25 and invoked the transfer authority in Section 8005 of the FY2019 DOD Appropriations Act to move $1 billion of Army personnel funds into DOD's Drug Interdiction Account for DOD to help DHS construct border barriers. A few months later, DOD again invoked Section 8005 (along with the related transfer authority in Section 9002 of the FY2019 DOD Appropriations Act) to transfer another $1.5 billion of personnel, procurement, and overseas contingency operation funds into the Drug Interdiction Account for use in constructing border barriers. The Trump Administration proposed to construct \"approximately 131 miles of new border barriers . . . in addition to road construction and lighting installation\" with these funds. For each of the proposed projects, the Acting Secretary of Homeland Security utilized IIRIRA Â§Â 102's waiver authority to waive the application of several federal environmental, conservation, and historic preservation statutes, including the National Environmental Policy Act (NEPA), the Endangered Species Act, the Safe Drinking Water Act, and the Antiquities Act, to the \"fence[s], roads, and lighting\" that DOD will be \"assist[ing]\" in \"constructing\" under Section 284. DHS's authority to construct barriers along the southern border derives from IIRIRA Â§Â 102, as amended. This law provides that \"[t]he Secretary of Homeland Security shall take such actions as may be necessary to install additional physical barriers and roads . . . in the vicinity of the United States border to deter illegal crossings in areas of high illegal entry into the United States.\" IIRIRA Â§Â 102 directs that \"the Secretary of Homeland Security shall construct reinforced fencing along not less than 700 miles of the southwest border,\" while also \"identify[ing] the 370 milesÂ . . . along the southwest border where fencing would be most practical and effective in deterring smugglers and aliens attempting to gain illegal entry into the United States.\" Finally, IIRIRA Â§Â 102 gives the Secretary of Homeland Security flexibility on where to construct barriers, allowing the Secretary to decline to build a border barrier in a particular location if \"[the Secretary] determines that the use or placement of such resources is not the most appropriate means to achieve and maintain operational control over the international border.Â .Â .Â .\" To expedite the construction of border barriers, IIRIRA Â§Â 102 authorizes the Secretary of Homeland Security to, \"in [the] Secretary's sole discretion,\" \"waive all legal requirements\" that the Secretary \"determines necessary to ensure expeditious construction of the barriers and roads under this section.\" And to limit potential legal challenges to this waiver authority, IIRIRA Â§Â 102 cabins the jurisdiction of federal district courts to claims \"alleging a violation of the Constitution\" and forecloses appellate review of district court decisions, except by seeking discretionary review in the U.S. Supreme Court. IIRIRA Â§Â 102's waiver authority has been challenged on constitutional grounds in cases involving waivers of NEPA and other federal environmental statutes. Those challenging the waiver authority have contended that it violates the nondelegation doctrine, the Presentment Clause, and the Take Care Clause. Courts, however, have uniformly rejected these challenges and concluded that \"a valid waiver of theÂ . . . laws under [IIRIRA Â§Â 102] is an affirmative defense\" to all claims arising from the waived laws. The President invoked 10 U.S.C. Â§Â 2808 and announced that his Administration would seek to reallocate $3.6 billion from DOD's military construction budget for border barrier construction. The authority to take this action hinges on the President declaring a national emergency under the NEA, which President Trump did on February 15. On September 3, 2019, DOD identified 127 military construction projects that it would delay or suspend in order to reallocate $3.6 billion toward 11 barrier construction projects using this authority. The NEA provides general requirements governing the declaration of a national emergency, while Section 2808 contains additional requirements for its exercise. The Supreme Court has explained that the President's authority \"must stem either from an act of Congress or from the Constitution itself.\" Because Article II of the Constitution does not grant the Executive general emergency powers, the President generally must rely on Congress for such authority. Congress has historically given the President robust powers to act in times of crisis. By 1973, Congress had enacted more than 470 statutes granting the President special authorities upon the declaration of a \"national emergency,\" but these statutes imposed no limitations on either the President's discretion to declare an emergency or the duration of such an emergency. The Senate Special Committee on National Emergencies and Delegated Emergency Powers (previously named the Senate Special Committee on the Termination of the National Emergency) (\"Special Committee\") was apparently concerned that four presidentially declared national emergencies remained extant in the mid-1970s, the earliest dating to 1933. In 1973, the Special Committee concluded that the President's crisis powers \"confer[red] enough authority to rule the country without reference to normal constitutional process,\" and so Congress enacted the NEA in 1976 to pare back the President's emergency authorities. The NEA does not define \"national emergency.\" Rather, the NEA established a framework to provide enhanced congressional oversight and prevent emergency declarations from continuing in perpetuity. To accomplish these goals, the NEA terminated all then-existing presidentially declared emergencies. The NEA also established procedures for future declarations of national emergencies, requiring the President to specify which statutory emergency authorities he intends to invoke upon a declaration of a national emergency (unlike the pre-NEA regime, under which the declaration of an emergency operated as an invocation of all of the President's emergency authorities); publish the proclamation of a national emergency in the Federal Register and transmit it to Congress; maintain records and transmit to Congress all rules and regulations promulgated to carry out such authorities; and provide an accounting of expenditures directly attributable to the exercise of such authorities for every six-month period following the declaration. The NEA further provides that a national emergency will end (1) automatically after one year unless the President publishes a notice of renewal in the Federal Register , (2) upon a presidential declaration ending the national emergency, or (3) if Congress enacts a joint resolution terminating the emergency (which would likely require the votes of two-thirds majorities in each house of Congress to override a presidential veto). While the NEA directs each house of Congress to meet every six months to consider whether to end a national emergency by joint resolution, Congress has never met to consider such a vote under that deadline prior to this year. The statute does not appear to prevent Congress from considering a resolution to terminate a national emergency at any time before or after a six-month interval. Although a purpose of the NEA was to end perpetual states of emergency, the law does grant the President authority to renew an emergency declaration. As a result, there are currently 34 national emergency declarations in effect, some of which have been renewed for decades. The declaration of a national emergency under the NEA enables the President to invoke a wide array of emergency authorities conferred by statute. The most often invoked is the International Emergency Economic Powers Act (IEEPA), which gives the President broad authority to impose sanctions on foreign countries and entities. Besides Section 2808, another authority that could provide for the reprogramming of funds for construction purposes is 33 U.S.C. Â§ 2293, which, in the event of a national emergency or declaration of war, authorizes the Secretary of the Army to end or defer Army Corps of Engineers civil works projects that are \"not essential to the national defense.\" The Secretary of the Army can then use the funds otherwise allocated to those projects for \"authorized civil works, military construction, and civil defense projects that are essential to the national defense.\" No President has ever invoked this authority, but it could potentially be used in connection with President Trump's declaration of a national emergency at the southern border. A declaration of a national emergency triggers Section 2808, which provides emergency authority for unauthorized military construction in the event of a declaration of war or national emergency. President Trump invoked this statutory authority to reallocate $3.6 billion from DOD military construction funds to border barrier construction, stating in his emergency declaration that \"this emergency requires use of the Armed Forces and . . . that the construction authority provided in section 2808 of title 10, United States Code, is invoked and made available, according to its terms, to the Secretary of Defense and, at the discretion of the Secretary of Defense, to the Secretaries of the military departments.\" The President did not describe in his proclamation the tasks the Armed Forces would undertake with respect to the emergency at the southern border. Originally enacted in 1982, Section 2808 provides that upon the President's declaration of a national emergency \"that requires use of the armed forces,\" the Secretary of Defense may \"without regard to any other provision of law . . . undertake military construction projects . . . not otherwise authorized by law that are necessary to support such use of the armed forces.\" The term \"military construction project\" is defined to include \"military construction work,\" and \"military construction\" is, in turn, defined to \"include any construction, development, conversion, or extension of any kind carried out with respect to a military installation . . . or any acquisition of land or construction of a defense access road.\" The term \"military installation\" means a \"base, camp, post, station, yard, center, or other activity under the jurisdiction of the Secretary of a military department.\" Finally, Section 2808 limits the funds available for emergency military construction to \"the total amount of funds that have been appropriated for military construction\" but which have not been obligated. Section 2808's legislative history provides limited guidance on the types of emergencies and military construction projects envisioned. A House Armed Services Committee report accompanying the original 1982 legislation indicated that while \"[i]t is impossible to provide in advance for all conceivable emergency situations,\" Section 2808 was intended to address contingencies \"ranging from relocation of forces to meet geographical threats to continuity of efforts after a direct attack on the United States during which the Congress may be unable to convene.\" With certain limited exceptions, prior Presidents have generally invoked this authority for construction at military bases in foreign countries. To obtain additional funds to construct border barriers, the Trump Administration has invoked DOD's authority under 10 U.S.C. Â§Â 284 to support DHS in constructing border fencing. This support would be funded by money transferred to DOD's Drug Interdiction Account pursuant to Sections 8005 and 9002 of the 2019 DOD Appropriations Act. These authorities are not contingent on the declaration of a national emergency. In general, U.S. military involvement in civilian law enforcement is permitted only when specifically authorized by Congress. For example, the Secretary of Defense can \"make available any equipmentÂ . . . base facility, or research facility\" to any \"civilian law enforcement officialÂ . . . for law enforcement purposes.\" Section 284 is another of these authorities. It authorizes the Secretary of Defense to \"provide support for the counterdrug activities or activities to counter transnational organized crime of any other department or agency of the Federal Government or of any State, local, tribal, or foreign law enforcement agency.\" DOD may provide support under Section 284 only after it has been \"requested\" by the appropriate official from the governmental agency or department, and then only for \"the purposes set forth\" in Section 284. Those purposes include \"the maintenance and repair\" of certain equipment, the \"training of law enforcement personnel\" related to \"[c]ounterdrug or counter-transnational organized crime,\" and \"[a]erial and ground reconnaissance.\" Section 284 also authorizes DOD to provide support for the \"[c]onstruction of roads and fences and installation of lighting to block drug smuggling corridors across international boundaries of the United States.\" And to ensure that DOD can provide this support expeditiously, support under Section 284 is generally not subject to the requirements that govern DOD's other authority to support civil law enforcement agencies. Section 284 also provides for congressional oversight of DOD's support activities. At least 15 days prior to providing support to another agency under Section 284, the Secretary of Defense must submit \"a description of any small scale construction project for which support is provided\" to the appropriate congressional committees. \"Small scale construction project\" is, in turn, defined to encompass projects that cost no more than $750,000. Section 284 does not include a reporting requirement for any projects exceeding $750,000. Historically, DOD's activities under Section 284 have been funded by the \"Drug Interdiction and Counter-Drug Activities\" line item in its annual appropriations bill. For FY2019 Congress appropriated $1,034,625,000 to this line item, with $517,171,000 of that amount being allocated for \"counter-narcotics support.\" On February 25, 2019, DHS submitted a request to DOD to provide assistance pursuant to Section 284 in constructing border barriers in three locations along the U.S.-Mexico border, and DOD then approved the use of funds from the Drug Interdiction Account for these projects. However, much of the FY2019 funds appropriated for \"counter-narcotics support\" had been obligated by the time DOD made its request. As a result, DOD sought to use its authority under Section 8005 of the 2019 DOD Appropriations Act to transfer other funds into the Drug Interdiction Account. Section 8005 authorizes the Secretary of Defenseâ\"[u]pon a determination by the Secretary of Defense that such action is necessary in the national interest\" and with \"approval of the Office of Management and Budget\"âto \"transfer not to exceed [$4 billion] of working capital funds of the [DOD] or funds made available in [the 2019 DOD Appropriations Act] for military functions (except military construction).\" Section 8005 further provides that funds may be transferred only \"for higher priority items, based on unforeseen military requirements, than those for which originally appropriated,\" and may not be transferred \"where the item for which funds are requested has been denied by Congress.\" Finally, Section 8005 requires the Secretary of Defense to \"notify the Congress promptly of all transfers made pursuant to this authority.\" This transfer authority, in its current form, originated with the FY1974 DOD Appropriations Act. The 1974 act appears to be the first instance when Congress expressly prohibited the transfer of DOD funds for purposes for which Congress had denied funding. The House committee report for this legislation explained that this language was added \"to tighten congressional control of the reprogramming process.\" Before that time, DOD had \"onÂ .Â .Â . occasion[]\" reprogrammed funds \"which ha[d] been specifically deleted in the legislative process\" after obtaining the consent of the authorizing and appropriations committees in the House and Senate. The House committee report explained that this practice \"place[d] committees in the position of undoing the work of the Congress.\" Characterizing this practice as \"untenable,\" the House report declared that \"henceforth no such requests will be entertained.\" Invoking Section 8005's transfer authority, DOD in February 2019 authorized the transfer of an initial $1 billion of Army personnel funds to the Drug Interdiction Account. And on May 9, DOD authorized the transfer of an additional $1.5 billion to that fund using Sections 8005 and 9002 of the 2019 DOD Appropriations Act. Section 9002 authorizes the Secretary of Defense to \"transfer up to [$2 billion] between the appropriations or funds made available to [DOD] in this title.\" This authority is \"in addition to any other transfer authority available to [DOD]\"âincluding Section 8005âand is also \"subject to the same terms and conditions as the authority provided in section 8005.\" The Acting Secretary of Defense informed Congress of these transfers. In various federal statutes, Congress has authorized the confiscation, or forfeiture to the federal government, of any property used to facilitate a crime as well as the profits and proceeds of such crimes. None of these statutes is contingent on the declaration of a national emergency. Congress established the TFF to hold proceeds of property forfeited under most laws enforced or administered by a law enforcement organization within the Department of the Treasury or by the Coast Guard. Funds in the TFF may be used by the Secretary of the Treasury for a variety of law enforcement purposes. Some of these purposes are mandatory, such as making \"equitable sharing payments\" to other federal, state, and local law enforcement agencies that participate in the seizure or forfeiture of property. Others, such as awards for information leading to forfeited property covered by the TFF, are subject to the discretion of the Secretary of the Treasury. At the end of each fiscal year, the Secretary of the Treasury must reserve a sufficient amount in the TFF to cover mandatory and discretionary expenditures. Unobligated balances in the fund over the reserved amount may be used \"for obligation or expenditure in connection with the law enforcement activities of any Federal agency or of a Department of the Treasury law enforcement organization.\" This unobligated amount is known as \"Strategic Support.\" At the end of 2018, DHS requested $681 million of Strategic Support from the TFF for \"border security.\" In response to that request, the Secretary of the Treasury transferred roughly $601 million to CBP for \"border barrier construction.\" Following the Trump Administration's announcement of its initiatives to fund border barrier construction, citizens groups, states, and the U.S. House of Representatives filed lawsuits in federal district courts in California, the District of Columbia, and Texas. The plaintiffs in these lawsuits have argued that the Trump Administration's funding initiatives are not authorized by (or are inconsistent with) the relevant statutory authorities. As a result, they have also contended that the Administration's funding initiatives violate constitutional separation of powers principles and the Appropriations Clause's directive that money may be withdrawn from the Treasury only \"in Consequence of Appropriations made by Law.\" Finally, some plaintiffs have asserted that IIRIRA Â§Â 102 does not empower DHS to waive the requirements of NEPA for the border barrier projects being constructed with DOD's assistance because IIRIRA Â§Â 102's waiver authority extends only to projects undertaken by DHS. After bringing suit, certain plaintiffs filed motions for a preliminary injunction, asking the courts to prohibit DOD from implementing its funding initiatives while the litigation was ongoing. On May 24, 2019, a judge on the U.S. District Court for the Northern District of California issued decisions in the two cases pending in that courtâ Sierra Club v. Trump and California v. Trump âresolving one of the issues presented by the plaintiffs' motion: whether Sections 8005 and 9002 of the 2019 DOD Appropriations Act authorized the transfer of funds for border barrier construction. The district court determined that it did not for two reasons. It first concluded that this would violate Section 8005's prohibition on transferring funds where \"the item for which funds [were] requested ha[d] been denied by Congress.\" The court also ruled that the Administration's proposed use of Section 8005 was unlawful because DOD's purported need for additional border barrier funding was not an \"unforeseen military requirement,\" as required by Section 8005. Based on this ruling, the court in Sierra Club issued a preliminary injunction barring the Administration from using Section 8005 to transfer funds for border barrier construction while litigation proceeded. The court declined to also issue a preliminary injunction in the California case because (with the Sierra Club injunction in place) the plaintiffs in California could not establish that they would be irreparably harmed by the denial of an injunction. Because the plaintiffs' lawsuit preceded DOD's May 9 decision to transfer $1.5 billion to the Drug Interdiction Account, the preliminary injunction applied only to the initial, February 25 transfer of $1 billion to fund projects in New Mexico and Arizona. But in a later decision, the district court applied the reasoning from its initial ruling to conclude that the $1.5 billion transfer, like the first, was not authorized by Section 8005 or Section 9002. The court then issued an order permanently prohibiting the Administration from using either of these provisions to transfer any of the $2.5 billion for border barrier construction. The Trump Administration appealed the district court's permanent injunction to the U.S. Court of Appeals for the Ninth Circuit and asked that court to stay the injunction pending appeal. The Ninth Circuit denied that request, agreeing with the district court that Section 8005 does not authorize the transfer of funds for border barrier construction. However, the Supreme Court subsequently issued an order staying the injunction during the pendency of the litigation. As a result of the Supreme Court's order, the Trump Administration may use Section 8005 to transfer funds for border barrier construction. The district court subsequently issued a permanent injunction against the use of military construction funds as well, but stayed the injunction pending appeal. The Texas lawsuit, El Paso County v. Trump , also resulted in a permanent injunction against the Trump Administration's funding scheme for border barrier construction using Section 2808. The district court determined that the use of those provisions to fund border barriers clashed with the Consolidated Appropriations Act, 2019 (CAA 2019), provision that prohibits the use of appropriated funds \"to increase . . . funding for a program, project, or activity as proposed in the President's budget request for a fiscal year\" unless it is made pursuant to the reprogramming or transfer provisions of an appropriations Act. This section discusses the various arguments raised in these lawsuits regarding the lawfulness of the Trump Administration's initiatives for funding border barrier construction. It also discusses the judicial decisions that have resolved, or otherwise opined on, the lawfulness of the Administration's funding initiatives. The federal court in the District of Columbia presiding over the U.S. House of Representatives' case dismissed that suit for lack of standing, and that decision is currently being appealed. As discussed earlier, Section 8005 authorizes the transfer of funds for \"military functions,\" but provides that funds may be transferred only \"for higher priority items, based on unforeseen military requirements, than those for which originally appropriated.\" Further, funds may not be transferred \"where the item for which funds are requested has been denied by Congress.\" The district court in Sierra Club v. Trump concluded that Section 8005 does not authorize the transfer of funds for the construction of border barriers because the transfer was for an \"item\" for which funds had been denied by Congress and, in any event, because the asserted need for the construction of border barriers was not \"unforeseen.\" The district court first addressed whether the proposed transfer was for an \"item\" for which Congress had denied funds. In its briefs, the Trump Administration had argued that the relevant \"item for which funds [were] requested\" was DOD's assistance to DHS under 10Â U.S.C. Â§Â 284 for \"counterdrug activities,\" not (as the plaintiffs urged) the construction of border barriers generally. Thus, the Administration urged, because Congress had not \"denied\" a request for appropriations for DOD \"counterdrug\" assistance under Section 284, transferring funds for that purpose was not prohibited by Section 8005. The district court rejected that argument, concluding instead that the historical context leading up to the transferâincluding the previous disagreement between the Administration and Congress on the appropriate funding for border barriers that led to an extended lapse in appropriationsâshowed that the \"item for which funds [were] requested\" was the construction of border barriers generally, regardless of which agency would undertake construction or the statutory authority on which it might rely. \"[T]he reality is that Congress was presented withâand declined to grantâa $5.7 billion request for border barrier construction,\" the court explained. Thus, \"[b]order barrier construction, expressly, is the item [the Administration] now seek[s] to fund via the Section 8005 transfer, and Congress denied the requested funds for that item.\" The court also relied on portions of Section 8005's legislative history to support this conclusion. In particular, the court cited portions of a House report from 1973, which explained that Congress originally adopted the \"denied by Congress\" language to \"'tighten congressional control of the reprogramming process''' and to \"'prevent the funding for programs which have been considered by Congress and for which funding has been denied.'\" In the court's view, an interpretation of Section 8005 that would allow the Administration to transfer money for border barrier construction, despite Congress's refusal to appropriate the amount of money requested for that purpose, would undermine Section 8005's objective. The court also determined that Section 8005's transfer authority was unavailable because the Administration's proposed border barrier construction was not an \" unforeseen military requirement[].\" The Administration had argued that the proposed border barrier construction (i.e., the \"military requirement\") was \"unforeseen\" because the need for DOD to provide support to DHS through Section 284 was not known until DHS had requested that assistanceâwhich occurred after the President's budget request and after Congress had passed the DOD appropriations bill with less funding for barrier construction than the Administration had requested. The district court rejected this interpretation of Section 8005. On this theory, the court explained, \" every request for Section 284 support\" would be unforeseen because the need to rely on that particular statutory authority would only ever arise when another agency requests DOD's assistance under that provision. The district court also asserted that \"[the Administration's] argument that the need for the requested border barrier construction funding was 'unforeseen' cannot logically be squared with the Administration's multiple requests for funding\" for a border wall. Finally, the court invoked the canon of constitutional avoidance to support its reading of Section 8005. Under this rule of statutory interpretation, when there are two possible interpretations of a statute, one of which would raise serious constitutional concerns, courts should adopt the interpretation that avoids the constitutional difficulties. According to the district court, the Administration's interpretation of Section 8005 would \"pose serious problems under the Constitution's separation of powers principles\" because it would allow the executive branch to \"render meaningless Congress's constitutionally-mandated power\" to control federal expenditures by \"ceding essentially boundless appropriations judgment\" to the executive branch. Avoiding these potential pitfalls was, in the court's view, another reason to reject the Administration's broader interpretation of Section 8005. On these grounds, the court decided that the plaintiffs would likely succeed on their claim that the Administration could not lawfully use Section 8005 to transfer funds for border barrier construction. Thus, after finding the remaining preliminary injunction requirements satisfied, the court entered an order temporarily prohibiting the Administration from using the $1 billion of funds transferred under Section 8005 to construct the specified border barriers in New Mexico and Arizona. After issuing this decision, the parties submitted additional briefing on the lawfulness of the Administration's May 9 decision to use Sections 8005 and 9002 to transfer another $1.5 billion to the Drug Interdiction Account for the construction of border barriers in four additional locations in California and Arizona. On June 28, the district court issued a decision adopting the same reasoning as its earlier opinion. And having found both of the Administration's proposed uses of Section 8005's transfer authority unlawful, the court entered an injunction permanently prohibiting the Administration \"from taking any action to construct a border barrier\" using Section 8005. The Trump Administration appealed the district court's permanent injunction to the U.S. Court of Appeals for the Ninth Circuit and asked that court to stay the injunction pending appeal. On July 3, a divided panel of the Ninth Circuit denied the Administration's request for a stay, concluding that the Administration had not shown a likelihood of success on the merits. In reaching that conclusion, the Ninth Circuit first agreed with the district court that the construction of a border barrier was not an \" unforeseen military requirement,\" as required by Section 8005. Like the district court, the Ninth Circuit declared that the relevant \"requirement\" was the construction of border barriersânot, as the Administration contended, the need for DHS to request support from DOD under Section 284. The Ninth Circuit also concluded that Congress had \"denied\" funds for construction of the border barrier. The Administration had argued to that court that the \"item for which funds [were] requested\" referred to \"'a particular budget item' for section 8005 purposes\"âwhich Congress had not deniedâand did not encompass other requests for DHS funding for border barriers. The court of appeals rejected this reading, concluding that the \"item for which funds [were] requested\" was \"a wall along the southern border,\" and that Congress had denied the Administration's request to fund that \"item.\" \"In sum,\" the court reasoned, \"Congress considered the 'item' at issue hereâa physical barrier along the entire southern border\"âand it \"decided in a transparent process subject to great public scrutiny to appropriate less than the total amount the President had sought for that item. To call that anything but a 'denial' is not credible.\" However, as discussed in more detail below, the Supreme Court ultimately stayed the district court's injunction. The Court's stay order did not rule on the merits of Section 8005 or any of the other statutory authorities on which the Administration has relied to secure additional border barrier funding. Instead, the Court stayed the injunction because it concluded that \"the Government had made a sufficient showing at this stage that the plaintiffs have no cause of action to obtain review of the Acting [Secretary of Defense's] compliance with Section 8005.\" The plaintiffs in Sierra Club and California also argued that even if Section 8005 authorized the transfer of funds to the Drug Interdiction Account, Section 284 does not empower DOD to assist another agency in constructing border barriers. The plaintiffs in these cases raised several points to support this conclusion. First , they observed that Section 284 requires DOD to provide to Congress \"a description of the small scale construction project for which support is provided,\" and defines \"small scale construction\" to mean \"construction at a cost not to exceed $75,000 for any project.\" That Section 284 requires DOD to report to Congress on \"small scale construction projects\" and not larger projects, the plaintiffs argued, suggests that Section 284 should not be read to authorize assistance with larger-scale projects. \"Congress would not have required a description of 'any small scale construction' projects if it was, at the same time, authorizing massive, multibillion-dollar expenditures under this provision,\" the plaintiffs argued. But even if Section 284 could be read otherwise, the plaintiffs contended that it should not be read broadly here given \"the more specific and recent judgment by Congress\" to appropriate only $1.375 billion for DHS border barrier construction. If there is a \"specific policy embodied in a later statute,\" they argued, that later statute \"should control judicial construction of the earlier broad statute, even though [the latter statute] has not been expressly amended.\" Second , the plaintiffs argued that Section 284 does not authorize DOD's proposed border barrier projects because the portion of Section 284 relied on by DOD applies solely to \"block[ing] drug smuggling corridors.\" By contrast, the plaintiffs argued that DOD intended to use \"Section 284Â .Â .Â . as a tool to create a contiguous border wall, not to address specific corridors.\" Third , the plaintiffs pointed to a neighboring statutory provision requiring an agency receiving DOD support \"to reimburse [DOD] for that support,\" though DOD may waive this requirement if its support (1) \"is provided in the normal course of military training or operation,\" or (2) \"results in a benefitÂ .Â .Â . that is substantially equivalent to that which would otherwise obtain from military operations or training.\" The plaintiffs argued that DOD has breached this requirementâthus rendering Section 284 unavailableâbecause DHS had \"requested support on a 'non-reimbursable basis,'\" but neither of the two exceptions to the reimbursement requirement was met. Finally , the plaintiffs argued that DOD's reliance on Section 284 \"violates the core principle that executive branch agencies may not mix and match funds from different accounts to exceed the funding limits Congress imposed.\" In particular, the plaintiffs noted the general rule of appropriations law that \"specific appropriations preclude the use of general ones even when the two appropriations come from different accounts.\" Here, the plaintiffs contended, \"Congress ha[d] allocated a specific amount of funding\" for border barrier construction, precluding \"the government [from] cobbl[ing] together other, more general sources of money to increase funding levels for that same goal.\" The Administration responded that the plaintiffs in Sierra Club and California had misconstrued Section 284. The Administration first argued that Section 284 contemplates that DOD may assist with projects other than \"small scale construction,\" as certain provisions in Section 284 \"refer toâbut are not limited toâ'small scale' or 'minor' construction.\" As to the reimbursement requirement, the Administration asserted that Section 284 itself makes the reimbursement requirement inapplicable to DOD's counterdrug activities, providing that \"[t]he authority provided in this [S]ection [284] for the support of counterdrug activitiesÂ .Â .Â . by [DOD] isÂ .Â .Â . not subject to the other requirements of this chapter.\" Next, the Administration contended that its proposed border barrier projects satisfied Section 284's \"drug smuggling corridor\" requirement, as the proposed project areas were \"known to have high rates of drug smuggling between the ports of entry.\" Finally, the Administration rejected as \"without merit\" the plaintiffs' argument that its use of Section 284 violated the principle that agencies \"must use the [most] specific appropriation to the exclusion of [a] general appropriation.\" This principle, the Administration contended, applies only when both sources of funding belong to a single agency, not where the appropriations at issue are to different agenciesâthat is, Section 8005 and Section 284 to DOD and $1.375 billion to DHS in its appropriations bill. However, the district court in Sierra Club and California ultimately did not resolve this issue because it concluded that Section 8005 does not authorize the transfer of funds to be used by DOD under its Section 284 authority. And, with no district court ruling to review, the Ninth Circuit in Sierra Club also did not address this authority. The district court in El Paso County agreed with the plaintiffs on the basis that Congress's appropriation of funds for border barrier construction is a specific statute that should be given precedence over more general statutes. The court stated that \"[a]n appropriation for a specific purpose is exclusive of other appropriations in general terms which might be applicable in the absence of the specific appropriation.\" Moreover, the court held the use of Section 284 funds for border barrier construction was precluded by Section 739 of the CAA 2019, which prohibits the use of appropriated funds to increase funding for a program, project, or activity proposed in the President's budget request beyond what Congress had provided except through reprogramming or transfer actions pursuant to an appropriations act. Because the President had requested $5.7 billion for FY2019 \"for construction of a steel barrier for the Southwest border\" but Congress had appropriated $1.375 billion to be made on \"construction . . . in the Rio Grande Valley Sector\" alone, the court found that the use of Section 284 funds for the border project amounted to an unlawful increase in funding for that activity using appropriated funds. The court noted that Section 284 is not an appropriations statute and its use was thus not eligible for the exception in Section 739 of the CAA 2019 for reprogramming provisions. Nevertheless, because of the Supreme Court's stay of the injunction issued in the Sierra Club case, the court in El Paso declined to enjoin the use of Section 284. The plaintiffs in Sierra Club and California also argued that the Administration's proposed construction of a border barrier was subject to the environmental assessment requirements of NEPA, and that DHS's waiver authority under IIRIRA Â§Â 102 is ineffective to waive NEPA's application for projects funded and undertaken by any other department or agency. The plaintiffs noted that IIRIRA Â§Â 102's waiver authority may be used only for the \"construction of the barriers and roads under this section .\" Because the Administration was relying on DOD authority and appropriations (i.e., Section 284 and the Drug Interdiction Account) to construct the border barriers, the plaintiffs contended that those projects did not meet the statutory requirement and thus were not covered by an IIRIRA Â§Â 102 waiver. By contrast, the Administration argued that by requiring DHS to take \"such actions as may be necessary\" to construct additional border barriers, IIRIRA Â§Â 102 authorized DHS to request DOD's assistance, and thus the waiver authority applied. Ruling for the Administration, the district court in Sierra Club and California held that IIRIRA Â§Â 102's waiver authority extends to border projects undertaken by another agency on behalf of DHS, and thus DHS's waivers rendered NEPA inapplicable to the challenged border barrier projects. \"DOD's authority under Section 284 is derivative,\" the court explained, as it may invoke \"its authority [under Section 284] only in response to a request from [another] agency.\" \"Plaintiffs' argument would require the court to conclude that even though it is undisputed that DHS could waive NEPA's requirements if it were paying for the projects out of its own budget, that waiver is inoperative when DOD provides support in response to a request from DHS.\" The court rejected this approach because it found it \"unlikely that Congress intended to impose different NEPA requirements on DOD when it acts in support of DHS's IIRIRA Â§Â 102 authority in response to a direct request under Section 284 than would apply to DHS itself.\" The court thus ruled that DHS's waivers applied to the challenged border projectsâand all parties agreed that \"the waivers, if applicable, would be dispositive of the NEPA claims.\" The state plaintiffs in California v. Trump also argued that the Administration's allocation of $601 million from the TFF was not authorized by 31 U.S.C. Â§Â 9705, specifically because the construction of border barriers is not an expenditure for \"law enforcement activities.\" In response, the Administration argued that the allocation of payments from the TFF is not reviewable, citing Supreme Court and Ninth Circuit decisions establishing that an agency's determination of how to allocate funds from a lump-sum appropriation is committed to the agency's discretion. The district court determined that, while the statute provided some discretion for the Secretary of the Treasury to decide what payments should be made from the TFF, the statute provided a \"comprehensive list of payments for which TFF\" payments must be made. There were therefore sufficient standards for determining whether the Administration had transferred funds in a \"statutorily impermissible manner.\" Despite finding that the use of the TFF was reviewable, the district court declined to address the merits of the state plaintiffs' arguments because the plaintiffs did not meet the other requirements for a preliminary injunction. Specifically, a preliminary injunction requires the court to find that the moving party will suffer irreparable injury if the injunction is not issued. But the TFF statute requires equitable sharing payments for the current and next fiscal years to be reserved before any unobligated balances were available for Strategic Support expenditures. Because the Secretary of the Treasury had reserved such amounts before the requested transfer to DHS, there was no justification for the \"extraordinary\" remedy of a preliminary injunction against the TFF transfer. Subsequently, on August 2, the parties in California stipulated to the voluntary dismissal of the plaintiffs' TFF claim. According to the parties, this dismissal was based on representations by the Administration that (1) its proposed use of $601 million from the TFF would not cause state and local law enforcement agencies to lose any funds they would otherwise receive from the TFF, and (2) \"funds from the TFF will not be used to fund or support the construction of border barriers in any areas other than within the Rio Grande Valley and/or Laredo Sectors\"âthat is, areas within Texas. The plaintiffs in Sierra Club have not dismissed their TFF claim. Two types of challenges have arisen to the reprogramming of military construction funds for use in border barrier construction. The first challenges the declaration of the national emergency itself, while the second challenges the invocation of authority pursuant to Section 2808. Though the plaintiffs in Sierra Club and California did not challenge the lawfulness of President Trump's declaration of a national emergency under the NEA, the plaintiffs in El Paso County v. Trump did. They have charged that the President's declaration of a national emergency to make use of military construction funds for border barrier construction is unlawful because the situation at the border does not constitute an emergency within the meaning of the NEA. They argue that \"emergency\" in the NEA must be construed in accordance with its ordinary meaningâ\"an unforeseen combination of circumstances requiring immediate action\"âor the NEA is an unconstitutional violation of the nondelegation doctrine. Under the nondelegation doctrine, they argue, Congress cannot delegate legislative authority to the executive branch without providing an intelligible principle to guide implementation of a law. Plaintiffs assert that an interpretation of the NEA that leaves unfettered discretion to the President to decide what constitutes a national emergency would be an unconstitutional delegation of congressional authority. The government responded with its own interpretation of the NEA, one that views Congress's failure to provide a definition for \"national emergency\" as an indication that Congress intended to avoid constricting presidential power. The government also cites historical examples to demonstrate that national emergency declarations need not address circumstances that are unforeseen. Moreover, it argues that courts have uniformly concluded that presidential declarations of national emergencies present a nonjusticiable political question. The Supreme Court set forth the factors courts must consider in determining whether a matter raises nonjusticiable political questions in Baker v. Carr . These factors are a textually demonstrable constitutional commitment of the issue to a coordinate political department; a lack of judicially discoverable and manageable standards for resolving it; the impossibility of deciding without an initial policy determination of a kind clearly for nonjudicial discretion; the impossibility of a court's undertaking independent resolution without expressing lack of the respect due coordinate branches of government; an unusual need for unquestioning adherence to a political decision already made; or the potentiality of embarrassment from multifarious pronouncements by various departments on one question. The Administration argues that the President's national emergency declaration fulfills \"most, if not all of these factors.\" First, the executive branch claims that Congress intentionally chose to leave the determination of a national emergency to the President with oversight by Congress, without setting forth criteria from which a court could judge the President's action. Second, the Administration contends that how to combat illegal immigration is quintessentially \"the sort of policy determination of a kind clearly for nonjudicial discretion.\" Third, it argues that the policy questions regarding the exclusion of aliens are entrusted to the political branches. The district court did not address the constitutionality of the NEA or the proclamation, but entered summary judgment in favor of the plaintiffs on the basis that the Administration's funding plan for the border, in the court's view, violates the CAA 2019, in particular Section 739. The Sierra Club plaintiffs did not challenge the lawfulness of President Trump's declaration of a national emergency under the NEA, but they did argue that the Administration's plan to reallocate $3.6 billion in military construction funds was unlawful because 10 U.S.C. Â§Â 2808 does not authorize the construction of border barriers. Though the district court declined to grant a preliminary injunction because the plaintiffs had not demonstrated irreparable harm from the Administration's as-yet undetermined plans to divert the funds, the court did express doubt that the definition of \"military construction\" in Section 2808 encompassed border barriers. As noted previously, Section 2808 permits reprogramming of funds for \"military construction\" necessary to support the use of the Armed Forces in a national emergency. Military construction is defined to \"include any construction, development, conversion, or extension of any kind carried out with respect to a military installation,\" which means a \"base, camp, post, station, yard, center, or other activity \" under the jurisdiction of the Secretary of a military department. The Administration relied on the term \"other activity\" and the nonexhaustive word \"includes\" in the definitions related to \"military construction\" to argue that Congress had meant the term \"military construction\" in Section 2808 to be construed broadly. In other words, the government interpreted the definition of military construction to include any sort of construction related to a military installation. This would include any \"other activity under the jurisdiction of the Secretary of a military department,\" which could conceivably include border barriers constructed by DOD. The court in Sierra Club rejected that view, explaining that \"the critical language of Section 2801(a) is not the word 'includes,' it is the condition 'with respect to a military installation.'\" Further, the court rebuffed the Administration's reliance on the term \"other activity.\" That language, the court explained, is not unbounded but should be interpreted in context of the words that immediately precede itâ\"a base, camp, post, station, yard, [and] center.\" Applying the rule of statutory interpretation that \"a word is known by the company it keeps,\" the court concluded that \"other activity\" refers to similar discrete and traditional military locations. The court did \"not readily see how the U.S.-Mexico border could fit this bill.\" The court likewise employed the rule of interpretation that \"[w]here general words follow specific words in a statutory enumeration, the general words are construed to embrace only objects similar in nature to those objects enumerated by the preceding specific words.\" The court explained that if Congress \"hadÂ . . . intended for 'other activity' .Â .Â . to be so broad as to transform literally any activity conducted by a Secretary of a military department into a 'military installation,' there would have been no reason to include a list of specific, discrete military locations.\" Thus, viewing the term \"in context and with an eye toward the overall statutory scheme,\" the court could not conclude that \"Congress ever contemplated that 'other activity' has such an unbounded reading that it would authorize Defendants to invoke Section 2808 to build a barrier on the southern border.\" However, because the issue was not yet ripe for decision, the district court did not enjoin the use of military construction funds for border barrier construction. And because the district court did not rule on this issue the Ninth Circuit did not address it either. On December 11, 2019, however, the district court determined that the government's formulation of plans to allocate the military construction funds for 11 border barrier projects made the issue ripe for decision in both the California and Sierra Club cases. Although the court declined to take on the question of whether an emergency requiring the use of troops in fact exists, it found the question of whether the specific projects are \"military construction projects\" that are \"necessary to support such use of the armed forces\" to be suitable for adjudication. With respect to the first issue, the court reaffirmed its earlier assessment based on the statutory definitions that such projects have insufficient connection with any military installation to be permissible military construction projects, notwithstanding the government's argument that its taking of administrative jurisdiction over the land for them and assigning it to Fort Bliss in Texas created such a connection. The court was not persuaded that Congress intended \"military construction\" to have no stronger connection to a military installation than Defendants' own administrative convenience. If this were true, Defendants could redirect billions of dollars from projects to which Congress appropriated funds to projects of Defendants' own choosing, all without congressional approval (and in fact directly contrary to Congress' decision not to fund these projects). Elevating form over substance in this way risks \"the Executive [] aggrandizing its power at the expense of [Congress].\" Addressing the government's contention that \"installation\" was meant to be read broadly in the emergency context, the court pointed out that the aim of the NEA was to narrow executive emergency power, and that \"Section 2808 has rarely been used, and never to fund projects for which Congress withheld appropriations.\" The court therefore found that the border barrier construction projects, with the exception of two projects on the Barry M. Goldwater range, are not \"'carried out with respect to a military installation' within the meaning of Section 2808.\" The court next addressed whether the 11 barrier projects are \"necessary to support the use of the armed forces,\" and found the government's arguments unconvincing. In the government's view, these projects will support the armed forces because they \"allow DoD to provide support to DHS more efficiently and effectively,\" and could \"ultimately reduce the demand for DoD support at the southern border over time.\" The court rejoined: Defendants do not explain how the projects are necessary to support the use of the armed forces while simultaneously obviating the need for those forces. This appears to defy the purpose of Section 2808, which specifically refers to construction that is necessary to support the use of the armed forces, not to construction that the armed forces will not use once constructed. Again, Defendants' argument proves too much. Under their theory, any construction could be converted into military constructionâand funded through Section 2808âsimply by sending armed forces temporarily to provide logistical support to a civilian agency during construction. The court concluded that there was \"simply nothing in the record . . . indicating that the eleven border barrier projectsâhowever helpfulâare necessary to support the use of the armed forces.\" The court entered a permanent injunction against the 11 proposed border construction projects, but stayed the injunction pending appeal. The government has appealed. The district court in El Paso County rejected the use of Section 2808 for border barrier construction not because of the definitions at issue, but because the court concluded the provision is not an appropriations measure and therefore cannot be used to circumvent Section 739 of the CAA 2019, for the same reasons that the judge rejected the use of Section 284. Aside from the merits of the Trump Administration's funding initiatives, the various legal challenges brought by states, private individuals, and the House of Representatives also involve two threshold requirements that must be satisfied by any party seeking to maintain a lawsuit in federal court. A plaintiff must first show that he has suffered a \"concrete\" and \"particularized\" injury that was caused by the challenged government actionâthe so-called \"standing\" requirement. A plaintiff must also have a legal right (i.e., a \"cause of action\") to enforce whatever provision of federal law is at issue, and he must also fall within the \"zone of interests\" meant to be protected by that law. These procedural requirements have presented obstacles to those opposing the Trump Administration's funding initiatives. In U.S. House of Representatives v. Mnuchin , the U.S. District Court for the District of Columbia held that the House of Representatives lacked standing to challenge the Trump Administration's actions. And though the district court in Sierra Club and California (and the Ninth Circuit in Sierra Club ) concluded that the plaintiffs in those casesânonprofit organizations and state plaintiffsâsatisfied these procedural requirements, the Supreme Court ultimately stayed the district court's injunction because \"the Government ha[d] made a sufficient showing at this stage that the plaintiffs have no cause of action to obtain review of the Acting [Secretary of Defense's] compliance with Section 8005.\" In staying the permanent injunction in the Sierra Club litigation, the Supreme Court cleared the way for the Trump Administration to use funds transferred under Section 8005 to construct border barriers while the Ninth Circuit considers the Administration's appeal of the permanent injunction. However, the Court's order did not address the merits of Section 8005 or any of the other statutory authorities at issue in that litigation. Article III of the U.S. Constitution \"limits federal courts' jurisdiction to certain 'Cases' and 'Controversies.'\" This limitation has been interpreted to require that every person or entity bringing a claim in federal court must establish \"standing\" to sueâthat is, establish that he has suffered an injury that (1) is \"concrete, particularized, and actual or imminent\"; (2) \"fairly traceable to the challenged action\"; and (3) would be \"redressable by a favorable ruling.\" The Supreme Court has explained that this standing requirement \"is built on separation-of-powers principles\" and \"serves to prevent the judicial process from being used to usurp the powers of the political branches.\" Separation-of-powers concerns are heightened where a court is being asked to deem the actions of one of the other two branches of government unconstitutional, and especially so when a suit involves a dispute between the other two branches of the federal government. The plaintiffs challenging the Trump Administration's funding initiatives argued that they satisfied Article III's standing requirement. In Sierra Club and California , the Trump Administration conceded that constructing border barriers would cause a sufficient injury for Article III purposes, but it argued that this injury did not confer standing to challenge the Administration's use of Section 8005 to transfer funds. Rejecting that argument, the district court in Sierra Club and California held that the plaintiffs had established an \"actual or imminent\" injury that was \"fairly traceable\" to the Trump Administration's proposed transfer of money. The court explained that the supposedly distinct actions of (1) transferring funds and (2) using those transferred funds to construct border barriers were both part of a single objectiveâthe construction of border barriers. And because a sufficiently concrete injury followed from the attainment of that objective, the plaintiffs had standing to challenge government action that was part of the chain of events leading to the injury. Similarly, in El Paso County , the court held that the plaintiffs' reputational and economic injuries resulting directly from the border barrier construction were sufficient for Article III purposes. By contrast, the federal district court presiding over the U.S. House of Representatives' lawsuit held that the House of Representatives lacks standing because the House's asserted injuryâ\"an institutional injury to [Congress's] Appropriations power\" âwas not the kind of injury that supports Article III standing. The district court relied on the Supreme Court's decision in Raines v. Byrd , which held that Members of Congress lacked standing to challenge the constitutionality of the Line Item Veto Act. While Article III requires a \"particularized\" injuryâthat is, an injury that \"affect[s] the plaintiff in a personal .Â .Â . way\" âthe Court in Raines determined that the Members of Congress had asserted \"a type of institutional injury (the diminution of legislative power)\" that did not belong to the Members individually. As a result, those Members were unable to show \"a sufficient[ly] 'personal stake' in th[e] dispute.\" Similarly, the district court in Mnuchin noted that the appropriations power is held by Congress as a whole , not by each chamber of Congress separately. Moreover, as had the Court in Raines , the Mnuchin court supported its conclusion by noting the absence of historical examples of federal courts being asked to adjudicate lawsuits \"brought on the basis of claimed injury of official authority or power.\" The U.S. House of Representatives appealed the district court's decision to the D.C. Circuit, but the court of appeals has not yet issued a decision. Even if a plaintiff establishes standing, the party must also be able to identify a source of law that authorizes the party to sueâalso known as a \"cause of action.\" In some instances, Congress has included a cause of action within a federal law to enable those injured by a violation of that law to obtain judicial relief. Separately, the Administrative Procedure Act contains a more general cause of action, authorizing \"person[s] suffering legal wrong because of agency action\" to challenge that action in federal court. Finally, even absent a statutory cause of action, a plaintiff may still be authorized to sue based on \"[t]he power of federal courts of equity to enjoin unlawful executive action.\" Moreover, in order to show that a particular cause of action applies to him, a plaintiff must (generally) show that \"[t]he interest he asserts [is] 'arguably within the zone of interests to be protected or regulated by the statute' that he says was violated.\" This \"zone of interests\" requirement \"applies to all statutorily created causes of action,\" and its purpose is to \"foreclose[] suit .Â .Â . when a plaintiff's 'interests are so marginally related to or inconsistent with the purposes implicit within the statute that it cannot reasonably be assumed that Congress intended to permit the suit.'\" Before concluding that the Trump Administration cannot use Section 8005 to transfer funds for border barrier construction, the district court in Sierra Club and California (and the Ninth Circuit on appeal in Sierra Club ) concluded that the plaintiffs in these cases had satisfied these threshold procedural requirements. The court ruled that the plaintiffs' ability to bring their suits was based on the federal courts' equitable power to enjoin unlawful executive action. In so doing, the district court also determined that the \"zone of interests\" requirement does not apply to claims resting on an equitable (as opposed to a statutory) cause of action. Reviewing the district court's ruling in Sierra Club , the Ninth Circuit agreed that the plaintiffs had an equitable cause of action to challenge the lawfulness of executive action, and determined that they also had a cause of action under the Administrative Procedure Act. The Ninth Circuit expressed \"doubt[s]\" that the zone-of-interests test applied to equity-based claims, but determined that the plaintiffs satisfied any zone-of-interest requirement that might apply to either of these causes of action. Though the district court and the Ninth Circuit concluded that the plaintiffs in Sierra Club and California were proper parties to challenge the Trump Administration's intended use of Section 8005, the Supreme Court issued an order staying the district court's injunction. After the Ninth Circuit declined to stay the district court's permanent injunction, the Trump Administration asked the Supreme Court to do so, and on July 26, 2019, the Supreme Court issued an order staying the permanent injunction. Chief Justice Roberts and Justices Thomas, Alito, Gorsuch, and Kavanaugh voted to grant the stay in full, while Justice Breyer indicated that he would have granted the stay in part. The Court's order stated that \"[a]mong the reasons\" for staying the injunction, \"the Government ha[d] made a sufficient showing at this stage that the plaintiffs have no cause of action to obtain review of the Acting [Secretary of Defense's] compliance with Section 8005.\" The Court's order further stated that the stay would continue \"pending disposition of the [Administration's] appeal in the [Ninth Circuit] and disposition of the Government's petition for a writ of certiorari,\" and will \"terminate automatically\" upon the Court's denial of a petition for certiorari submitted by the Administration. Justices Ginsburg, Sotomayor, and Kagan voted to deny the request for a stay. Justice Breyer explained that he would have \"grant[ed] the Government's application to stay the injunction only to the extent that the injunction prevents the Government from finalizing the contracts [for border barrier construction] or taking other preparatory administrative action,\" but would have left the injunction \"in place insofar as it precludes the Government from disbursing funds or beginning construction.\" Justice Breyer explained that granting a stay of the injunction in full would irreparably harm the plaintiffs, while denying a stay of the injunction would irreparably harm the government because all funds not obligated by the end of the fiscal year would become unavailable. According to Justice Breyer, staying the injunction to allow the Trump Administration to \"finaliz[e] contracts or tak[e] other preparatory administration action\" for constructing border barriers would \"avoid harm to both the Government and [the plaintiffs] while allowing the litigation to proceed.\" By staying the district court's permanent injunction, the Supreme Court enabled the Trump Administration to use funds transferred under Section 8005 to construct border barriers, at least during the pendency of the litigation in the Sierra Club and California cases. However, the Court's order did not address the merits of Section 8005 or any of the other statutory authorities at issue in that litigation. Moreover, the Court's order makes clear that it applies only at \"this stage\" of the litigation and therefore is not binding on the Ninth Circuit as it considers the Administration's appeal of the permanent injunction. As a result, the Court's order does not prevent the Ninth Circuit in Sierra Club âwhich is currently considering the Trump Administration's appeal from the permanent injunctionâfrom concluding that the Sierra Club plaintiffs have a cause of action to enforce Section 8005. Nor does it prevent the district court in Sierra Club and California from ruling on the other funding authorities (including Section 284) and, perhaps, enjoining the Trump Administration from using those authorities to construct border barriers. The Supreme Court has said that the Appropriation Clause's \"fundamental and comprehensive purpose .Â .Â . is to assure that public funds will be spent according to the letter of the difficult judgments reached by Congress as to the common good and not according to the individual favor of Government agents or the individual pleas of litigants.\" Consequently, Congress has the power, subject to presidential veto, to enact legislation either appropriating more funds for border barrier construction, to limit the extent that the Administration's proposed funding sources may be used for border barrier construction, or to prohibit the Administration from obtaining additional funding through existing mechanisms. As part of the FY2020 appropriations process, the 116th Congress had considered provisions limiting the expenditure of annually appropriated funds for border barrier construction, though none have yet been enacted. For example, Section 8127 of Division C of H.R. 2740 , the DOD Appropriations Act for FY2020, as passed by the House on June 19, 2019, would generally have provided that \"None of the funds appropriated or otherwise made available by this Act or any prior Department of Defense appropriations Acts may be used to construct a wall, fence, border barriers, or border security infrastructure along the southern land border of the United States.\" If this provision had been enacted it would likely have rendered the litigation over the Northern District of California's injunction moot, as the use of FY2019 funds for the purposes sought by the Administration would be expressly prohibited. Separately, the House-passed H.R. 2740 would also have limited the general transfer authority under either Sections 8005 or 9002 from being used to transfer funds into or out of the DOD Drug Interdiction Account, and the bill would reduce the overall amount of general transfer authority available under Section 8005 from $4 billion to $1 billion. The initial House-passed National Defense Authorization Act for FY2020 included similar limitations. None of these limitations were included as part of the enacted Consolidated Appropriations Act, 2020, or the enacted FY2020 National Defense Authorization Act. In February 2019, the Administration requested $5 billion in border barrier funding for FY2020 to support the construction of approximately 206 miles of border barrier system. The House Appropriations Committee responded to this by recommending no funding for border barriers in H.R. 3931 âits FY2020 DHS Appropriations bill. In addition, the House Appropriations Committee-reported bill would have restricted the ability to transfer or reprogram funds for border barrier construction. That bill stated in Section 227 that, aside from appropriations provided for such purpose in the last three fiscal years, \"no Federal funds may be used for the construction of physical barriers along the southern land border of the United States during fiscal year 2020.\" Furthermore, Section 536 of that bill proposed to rescind $601 million from funding appropriated for border barriers in FY2019 âthus reducing the FY2019 funding available by the amount pledged from the Treasury Forfeiture Fund. On September 26, 2019, the Senate Appropriations Committee reported its annual appropriations act for DHS for FY2020, which would have provided $5 billion for additional new miles of pedestrian fencing. As part of the Consolidated Appropriations Act, 2020, Congress provided $1.375 billion for \"construction of barrier system along the southwest border.\" Committees and Members of Congress have also requested legal opinions from the Comptroller General of the United States, head of the Government Accountability Office (GAO), regarding questions of appropriations law and executive agencies' compliance with such laws. Though GAO's decisions are not binding on federal courts, those decisions are sometimes given consideration by reviewing courts because of GAO's expertise in appropriations law and its role as the \"auditing agent of Congress.\" On September 5, 2019, in response to such a request from Senate Appropriations Committee Vice Chairman Leahy, Subcommittee on Defense Vice Chairman Durbin, and Subcommittee on Military Construction, Veterans Affairs, and Related Agencies Ranking Member Schatz, the Comptroller General issued a legal opinion concluding that the Administration's use of Section 8005 of the 2019 DOD Appropriations Act and 10 U.S.C. Â§Â 284 to fund border barrier construction is lawful. Like the Northern District of California and the Ninth Circuit decisions, GAO's analysis of the transfer authority focused primarily on (1) whether the use of the funds for border barrier construction was an unforeseen military requirement, and (2) whether Congress had denied funds for the item to which funds were being transferred. GAO agreed with the Administration's argument that the relevant \"military requirement\" for purposes of Section 8005 was the construction of border barriers by DOD pursuant to its Section 284 authority, not the construction of border barriers generally. According to GAO, this military requirement was \"unforeseen\" because it was not until DHS requested assistance from DOD to construct border barriersâwell after the President's budget requestsâthat the need for DOD assistance became known. Consequently, GAO concluded that DHS's request for assistance constituted an unforeseen military requirement that made available the transfer authority under Section 8005. GAO next addressed whether the construction of border fencing had been \"denied by the Congress.\" GAO began by noting that this language was not defined by Section 8005 or elsewhere in the FY2019 DOD Appropriations Act. Relying on the \"ordinary meaning\" of the term \"deny\" as well as previous decisions by the Comptroller General, GAO concluded that a denial of funds for purposes of Section 8005 required that Congress \"actively refuse\" funds for an item, rather than merely fail to appropriate the full amount requested for that item. Applying this standard, GAO asserted that it could not identify any statutory provision that prohibited DOD from using funds to build border barriers pursuant to its Section 284 authority. Accordingly, GAO agreed with the Administration that Congress had not denied funds for that purpose, within the meaning of Section 8005.", "summary": "President Trump has prioritized the construction of border barriers along the U.S.-Mexico border. Over the course of negotiations for FY2019 appropriations, the Administration asked Congress to appropriate $5.7 billion to the Department of Homeland Security (DHS) for that purpose. When Congress appropriated $1.375 billion to DHS for border fencing, the President announced that his Administration would fund the construction of border barriers by repurposing funds appropriated to the Department of Defense (DOD) and transferring funds from the Department of the Treasury. The Administration asserted that these funding transfers were authorized by a combination of the following federal laws: National Emergenc ies Act (NEA) . The NEA establishes a framework for the President to declare national emergencies. The NEA does not itself appropriate or authorize the transfer of funds, but the declaration of a national emergency triggers other statutory provisions that allow certain executive departments to repurpose existing appropriations. 10 U.S.C. Â§ 2808 . Section 2808 becomes available upon the President's declaration of a national emergency under the NEA. This provision authorizes the Secretary of Defense to use unobligated military construction funds for the construction of otherwise unauthorized military construction projects. Section s 8005 and 9002 of the 2019 D OD Appropriations Act . Sections 8005 and 9002 of the 2019 DOD Appropriations Act authorize the transfer of up to $6 billion appropriated in that act for \"military functions\" arising from \"unforeseen military requirements.\" Funds may be transferred under these authorities only for \"unforeseen military requirements\" where the item for which funds will be transferred \"has [not] been denied by the Congress.\" 10 U.S.C. Â§Â 284 . The 2019 DOD Appropriations Act also appropriated funds to a Drug Interdiction Account. Pursuant to 10 U.S.C. Â§Â 284, money in this fund may be spent by DOD in support of other agencies' counterdrug activities, including by constructing \"roads and fencing . . . to block drug smuggling corridors across international borders of the United States.\" The Trump Administration proposed to use Sections 8005 and 9002 of the 2019 DOD Appropriations Act to transfer additional funds into the Drug Interdiction Account, which would then be used to construct border barriers. 31 U.S.C. Â§ 9705 . This provision establishes a Treasury Forfeiture Fund (TFF) in the Department of the Treasury and authorizes the Secretary of the Treasury to make payments from unobligated sums in the TFF to federal, state, and local law enforcement agencies for various law enforcement purposes. Several plaintiffs filed lawsuits in federal courts in California, the District of Columbia, and Texas to prevent the Administration from using these authorities to repurpose appropriations for border barrier construction, arguing that none of the Administration's funding initiatives were authorized by Congress. Some plaintiffs also argued that the construction of border barriers was subject to the environmental assessment requirements of the National Environmental Policy Act (NEPA). Though a federal court in California initially entered an injunction prohibiting the Trump Administration from using the funds to initiate construction of border fencing, the U.S. Supreme Court ultimately stayed that injunction. The California federal district court's injunction would have prohibited the Administration from using Sections 8005 and 9002 to transfer funds for border barrier construction. The court did not rule on the lawfulness of the Administration's other proposed funding sources, though it did determine that waivers issued by DHS under Section 102 of the Illegal Immigration Reform and Immigrant Responsibility Act rendered NEPA inapplicable to the proposed border projects. But following the Supreme Court's stay of the district court's injunction, DOD was able to use funds transferred under Sections 8005 and 9002 for barrier construction purposes while litigation in the case continues. A second federal district court in Texas has enjoined the use of Section 2808 for border barrier construction purposes. A third lawsuit challenging the Trump Administration's funding initiatives is ongoing in the District of Columbia, though that court has not ruled on the merits. Meanwhile, both houses of Congress have continued to move through the annual appropriations process. Although the House of Representatives initially passed a version of the DOD Appropriations Act for FY2020 that would have expressly prohibited the use of funds for the construction of border barriers, these limitations were not included as part of the Consolidated Appropriations Act, 2020 (which included DOD appropriations and $1.375 billion for construction of a barrier system along the southwest border), or the FY2020 National Defense Authorization Act as they were passed by both chambers of Congress and signed into law.", "document_type": "crs"}
{"report": "This report focuses on selected precision-guided munitions (PGMs) fielded by the Air Force, Army, Navy, and Marine Corps. Over the years, the U.S. military has relied on PGMs to execute ground, air, and naval military operations. PGMs have become ubiquitous in U.S. military operations; funding for these weapons has increased dramatically from FY1998 to the present as depicted in. In FY2021, the Department of Defense (DOD) requested approximately $4.1 billion for more than 41,337 weapons in 15 munitions programs. DOD projects requesting approximately $3.3 billion for 20,456 weapons in FY2022, $3.9 billion for 23,306 weapons in FY2023, $3.9 billion for 18,376 weapons in FY2024, and $3.6 billion for 16,325 weapons in FY2025. Congress, through the defense authorization and appropriations bills, has historically exercised its role in the decision to approve, reject, or modify DOD's proposals for PGMs. In addition, these programs pose a number of potential oversight issues for Congress. Congress's decisions on these issues could affect future U.S. military capabilities and funding requirements. Potential issues for Congress include planned procurement quantities and stockpile assessments, defense industrial base production capacity, development timelines, supply chain security, affordability and cost-effectiveness, and emerging factors that may affect PGM programs. DOD defines a PGM as \"[a] guided weapon intended to destroy a point target and minimize collateral damage.\" In addition to these virtues, PGMs also offer other advantages over unguided weapons, namely range and the reduction in numbers of combat sorties required to deliver the desired effects on the battle field. The main disadvantage of these weapons is cost; particularly long range missiles. PGMs include air- and ship-launched missiles, multiple launched rockets, and guided bombs. Current munitions typically use a combination of radio signals from the global positioning system (GPS), laser guidance, and inertial navigation systems (INS)âusing gyroscopesâto improve a weapon's accuracy to reportedly less than 3 meters (approximately 10 feet). PGMs have transformed attack operations from the air; instead of using hundreds of bomber sorties to attack a single target, a single sortie from a PGM-carrying platform can attack multiple targets while minimizing collateral damage. Guided munitions were first developed in the 1940s, when the U.S. Army Air Corps tested radio guidance to glide bombs onto a target. Prior to precision guidance, bomber missions reported an accuracy of 1,200 feet; 16% of munitions dropped by crews landed within 1,000 feet of their intended target. According to defense analyst Barry Watts, guidance systems showed promise in improving weapon accuracy; however, these systems were not fully fielded during the Second World War. This can partly be attributed to technological challenges in developing guidance systems, as well as relatively large unit costs per munition used. Guidance systems during this era used television signals, and required a chase aircraft to provide command and control for the weapon to strike its target. DOD continued to develop PGMs through the 1950s and 1960s, where they gained prominence during the Vietnam War with the introduction of the laser-guided bomb. Laser-guided bombs became a preferred munition for bombing operations; an Air Force study in 1973 found that the U.S. military used more than 10,500 laser-guided bombs the previous year, with 5,107 weapons achieving a direct hit and another 4,000 achieving a circular error probable of 25 feet. During the 1970s and 1980s, all of the military services developed guided missiles capable of attacking fixed and moving targets. Laser-guided bombs gained prominence during Operation Desert Storm in 1991. Although PGMs represented only 6% of the total munitions used during the campaign, they struck a number of critical targets, reduced the number of combat sorties required, and limited collateral damage to civilian structures. Operations over the past decade in Afghanistan, Iraq, and Syria have demonstrated DOD's increasing reliance on PGMs and how important they have become for modern military operations. The Air Force reports that nearly 139,000 weapons have been used in combat operations in the Middle East since 2014. Counter-Islamic State (IS) operations in Iraq and Syria have used numerous weapons: in 2015, coalition air forces used more than 28,000 weapons; in 2016, the campaign used an additional 30,700 weapons; and in 2017 (the height of operations), the campaign used 39,500 weapons (see Figure 2 for a graphical representation of operational usage compared to DOD procurement). Nearly all of the weapons employed were PGMs, particularly Joint Direct Attack Munitions (JDAMs) and Hellfire Missiles. In addition to PGM use in current operations, the proliferation of anti-access/area denial (A2/AD) systems is likely to increase the operational utility of PGMs. Anti-access systems can be defined as capabilities \"associated with denying access to major fixed-point targets, especially large forward bases.\" Area denial systems can be defined as capabilities \"that threaten mobile targets over an area of operations, principally maritime forces, to include those beyond the littorals.\" Peer competitors like China and Russia have developed sophisticated air defenses, such as the S-300PMU (SA-20) and S-400 (SA-21), the HQ-9 surface-to-air missile (China), the DF-21D and DF-26 anti-ship ballistic missiles (China), and the 3M-54 Kaliber anti-ship cruise missile (Russia). Figure 3 illustrates ranges of potential A2/AD systems. These systems outrange U.S. weapons systems at what experts assess as unacceptable riskâsome of these weapons have reported ranges in excess of 1,000 nautical miles. As a result, U.S. ships and aircraft would need to engage targets at long ranges in order to not put themselves in danger. For instance, naval ships could be threatened at ranges of 809 nautical miles from bases that field DF-21D anti-ship ballistic missiles. The effectiveness of these missiles is often debated, as is the amount of risk an anti-ship ballistic missile presents to naval forces. Some analysts argue that in a combat situation, aircraft carriers would not enter these weapons' engagement zones because of the threat. Others argue that while there is some risk posed to naval forces, aircraft carriers and major surface combatants would nonetheless be able to operate effectively. Similarly, an S-400 (SA-21) presents risks to aircraft at ranges of up to 215 nautical miles. Many weapons in the U.S. inventory have relatively short ranges. Figure 4 illustrates the impact that A2/AD systems have on potential military operations. Some analysts argue that U.S. forces would substantially increase their operational risk at ranges in excess of 500 nautical miles (NM). The Paveway is a family of guidance kits that attach to unguided bombs. The assembly includes a guidance seeker on the nose of the bomb, which looks for a laser to mark a target, and a tail kit to guide the bomb onto the target. The Paveway series was originally developed during the Vietnam War to enable tactical aircraftâlike the F-4 Phantom and the A-6 Intruderâto deliver precise munitions onto a target. Paveway has received several upgrades, with the development of Paveway III (in the 1990s), which improves low-altitude guidance, and Paveway IV (in the late 1990s), which adds satellite guidance to improve accuracy. The U.S. military predominately uses Paveway II (see Figure 5 and Figure 6 ) and Paveway III kits; Paveway IV is used exclusively by foreign militaries. According to IHS Janes, Raytheon has produced more than 350,000 Paveway kits, with Lockheed Martin producing an additional 200,000 kits. Funding for Paveway procurement appears in the Air Force's General Purpose Bomb line item; however, the Air Force does not report procurement quantities in its budget justification documentation. DOD has exported Paveway II kits to more than 30 countries, and exported Paveway III kits to at least 9 countries. Paveway IV is used by the United Kingdom, the Philippines, Saudi Arabia, and Qatar. JDAM modifies unguided bombsâsuch as the 500-pound Mk-82, the 1,000-pound Mk-83, and the 2,000-pound Mk-84âwith GPS guidance. (For a fully assembled JDAM, see Figure 7 ; for a JDAM tail kit, see Figure 8 .) When a JDAM kit is attached, the weapon is designated as GBU-31/32/38 depending on the weight of the bomb. These weapons have a reported range of 13 nautical miles. The Air Force and Navy began studying how to deliver such weapons in a program known as the Advanced Bomb Family during the 1980s. The first JDAMs were delivered in 1997, and underwent operational testing between 1998 and 1999. JDAM kits are reported to have an accuracy to within 3 meters (approximately 10 feet). The first operational use of a JDAM was during Operation Allied Freedom in Kosovo by a B-2 Spirit bomber. Since their development, JDAMs have been integrated with all U.S. fixed-wing strike platforms. JDAMs have received several upgrades since their introduction into service. One of the major developments has been developing a laser guidance system in addition to receiving GPS guidance. Adding laser guidance enables JDAMs to strike both moving and fixed targets. In February 2020, Boeing announced its intention to develop a \"powered\" JDAM to provide a low-cost alternative to cruise missiles. According to Air Force Magazine, this new JDAM would use a 500-pound bomb, and would be the size of a 2,000-pound bomb. Boeing has not stated a unit cost for this new development. DOD has procured more than 371,000 JDAM kits since 1998, and it plans to procure an additional 75,000 between FY2020 and FY2024. According to IHS Janes, the Air Force originally projected procuring 270,000 JDAM kits. Production peaked at 30,000 kits prior to 2007 before declining until 2015. Increased operational use in Iraq and Syria, in particular, resulted in a reduction in JDAM stockpiles, leading to increased procurement from FY2016 through FY2020. Table 1 outlines the FY2020 request, along with the programmed force between FY2021 through FY2024. The DOD projects to reduce JDAM procurement in the future years defense program (FYDP); the current programmed force for FY2021 reduces procurement from more than 40,000 tailkits in FY2020 to approximately 10,000 tailkits in FY2021 and ends the FYDP with approxmately 3,700 tailkits in FY2024. In addition to U.S. military use, JDAMs have been exported to 26 countries, including Australia, Bahrain, Denmark, Finland, Israel, Italy, Japan, Kuwait, Pakistan, Saudi Arabia, Singapore, South Korea, Taiwan, Turkey, and the United Arab Emirates. The Small Diameter Bomb, designated as GBU-39 ( Figure 9 ), is a 250-pound guided bomb. The SDB can use both GPS and laser guidance, enabling it to strike both fixed and moving targets. In 1997, responding to improvements in accuracy due to GPS, the Air Force stated a need to develop a smaller bomb to reduce collateral damage. The SDB reached initial operating capability in 2006. According to the Air Force, the SDB has a range of approximately 40 nautical miles. The SDB was specifically designed around space constraints in both the F-22 Raptor and F-35 Lightning II aircraft to enable these fighter aircraft to carry SDBs internally, while protecting their low observable signature. The Air Force developed a second small diameter bomb, the GBU-53 laser-guided smaller diameter bomb, or SDB II (see Figure 10 ). The added laser guidance enables the SDB II to strike both fixed and moving targets. SDB II uses Link 16 and ultra-high frequency datalinks, along with infrared guidance, to provide course corrections. Development for the SDB II began in 2005, and the Air Force declared initial operating capability in 2019. The U.S. exports SDB II to Australia and South Korea as of 2019. The Air Force procures SDBs as of 2019. From FY2005 through FY2019, the Air Force purchased more than 28,000 SDBs for more than $1.7 billion. Both the Air Force and the Navy requested more than 7,000 SDBs in FY2020 (the second-largest procurement on the line) for $275 million, and plan to procure an additional 8,400 SDBs from FY2021 through FY2024. In addition both services are procuring SDB IIs. Procurement of the SDB II began in FY2018 with 80 bombs, increasing to 1,200 bombs in FY2019. DOD requested 1,900 bombs in FY2020 for approximately $331 million, and it plans to purchase more than 10,500 SDB IIs from FY2021 through FY2024 for $1.6 billion (see Table 2 ). In the early 1970s, the Army developed a requirement for an anti-tank missile, which resulted in the AGM-114 Hellfire (see Figure 11 ). The first Hellfire was introduced into service in 1982 on the Army's AH-64 Apache, using laser guidance to target tanks, bunkers, and structures. Hellfire missiles have a maximum effective range of 4.3 nautical miles. By the mid-1980s, the Marine Corps had introduced Hellfire missiles to its attack helicopter fleet. Hellfire missiles have received continual upgrades over the past decades, including integrating infrared sensors, warheads to target small boats, and integration with the Apache's Longbow radar. During the late 1990s and early 2000s, Hellfire missiles were introduced to the MQ-1 Predator, and later to the MQ-9 Reaper, enabling unmanned aerial vehicles to provide a strike capability. Hellfire missiles have become a preferred munition for operations in the Middle East, particularly with increased utilization of unmanned aircraft like MQ-1s and MQ-9s. Hellfire missiles have been exported to a number of countries, including Australia, Bahrain, Egypt, India, Iraq, South Korea, Kuwait, Qatar, Saudi Arabia, Taiwan, Turkey, United Arab Emirates, and the United Kingdom. The Army and the Marine Corps identified the need to replace the Hellfire missile. During the mid-2000s, the two services started a new development project called the Joint Air-to-Ground Missile (JAGM), which entered testing in 2012. Both services plan to replace the Hellfire with the JAGM; however, it is unclear when they plan to make the transition. All three military departments procure Hellfire missiles. From 1998 through 2018, DOD procured more than 71,500 missiles at a cost of $7.2 billion. Congress appropriated nearly $484 million for approximately 6,000 missiles in FY2019. For FY2020, DOD requested approximately $730 million for 9,000 Hellfire missiles, and it plans to purchase 13,100 missiles at a cost of $1.2 billion between FY2021 and FY2024 ( Table 3 ). In its FY2020 recent budget request, DOD states that it is requesting to procure the maximum production of Hellfire missiles. The Joint Air-to-Ground Missile is designed to replace the Hellfire, TOW, and Maverick missiles. JAGM uses a new warhead/seeker paired with an existing AGM-114R rocket motorâwhich is the latest modelâto provide improved target acquisition and discrimination (see Figure 12 ). The JAGM has a maximum effective range of 8.6 nautical miles when launched from a helicopter and 15.1 nautical miles when launched from fixed-wing aircraft. JAGM underwent testing starting in 2010, and the missile entered initial operating capability in 2019, having been successfully integrated on the AH-64E Apache and AH-1Z Super Cobra attack helicopters. JAGM is expected to be integrated on other platforms as well, including the FA-18E/F Super Hornet, MQ-1C Grey Eagle, MH-60M Defensive Air Penetrator, MH-60S Seahawk, F-35 Lightning II, and P-8 Poseidon. In addition, the Air Force has begun procuring JAGMs but has not announced publicly what platforms will employ the missile. JAGM entered low-rate initial production in FY2017. All three services are procuring JAGM, though the Air Force is requesting only 60 missiles in FY2020, with no projections of additional procurement. DOD requested more than $339 million and 1,000 missiles for FY2020, and it projects procuring approximately 4,600 additional missiles through FY2024 for about $1.5 billion (see Table 4 ). The Joint Air-to-Surface Strike Missile was conceived in the mid-1990s as a stealthy cruise missile designed to strike targets in heavily defended airspace. The JASSM is a 14-foot-long, 2,250-pound missile that can be carried internally on B-1B Lancer and B-52 Stratofortress aircraft and carried externally on a number of tactical fighters, including the F-16 Falcon, F-15E Strike Eagle, F/A-18 Hornet, F/A-18E/F Super Hornet, and F-35 Lightning II (see Figure 13 ). The AGM-158A JASSM has a stated range of more than 200 nautical miles. Initial operating capability was declared in 2005 (see Figure 14 ). AGM-158As have been exported to Australia, Finland, and Poland. In 2004, the Air Force decided that it required additional range on the JASSM and developed an extended range version, the AGM-158B JASSM-ER. The JASSM-ER uses the same body as the previous version with an improved infrared seeker, a two-way datalink, and enhanced anti-jam GPS receiver. The range of the JASSM-ER increased from more than 200 nautical miles to 500 nautical miles. This munition reached initial operating capability in 2014 on the B-1B Lancer. It reached full operating capability in 2018 with integration onto the F-15E Strike Eagle, and it is in full-rate production. The Air Force originally planned to procure 2,866 JASSMs and JASSM-ERs, but it has since changed the requirement to 7,200 missiles; as of 2019 the Air Force has procured more than 4,000 JASSMs. Japan has expressed interest in procuring JASSM-ERs, and Poland was approved to receive 70 missiles in 2016. The Air Force announced plans in September 2019 to increase JASSM production to a maximum rate of 550 missiles per year. The Service intends to grow the total JASSM inventory to approximately 10,000 missiles. In February 2020, the Air Force announced an $818 million contract to produce the latest version of the JASSM-Extreme Range Missile. According to Inside Defense, this new contract will produce 790 JASSM-ER missiles over two production lots. The new production contract includes 40 JASSM missiles to support foreign military sales; however, it is unclear which country will receive these missiles. The Long Range Anti-Ship Missile (LRASM) was conceived by the Defense Advanced Research Projects Agency (DARPA) as a concept to use a JASSM body to replace the AGM-88 Harpoon. Flight testing for LRASM began in 2012 on board a B-1B, and the missile was tested on an F/A-18E/F Super Hornet. LRASM uses a combination of passive radio-frequency sensors, and electro-optical/infrared seekers for terminal guidance. Japan has expressed interest in procuring the LRASM. In September 2019, the Air Force announced its intent to procure up to 410 LRASM missiles, changing its plan from an original estimate of 110 missiles. The JASSM-ER and the LRASM are produced in the same facility. According to budget documents, DOD states that JASSM and LRASM procurement in FY2020 is at maximum production rate. The Air Force and Navy are procuring JASSM-ER and LRASM as of 2019. In FY2020, DOD requested to procure 430 JASSM-ER missiles and an additional 48 LRASMs (see Table 5 ). In September 2019, the Air Force announced plans to increased JASSM production to 500 missiles per year, with additional capacity to up produce 96 LRASMs. DOD projects reduced procurement quantities of JASSM-ER, while maintaining procurement quantities of LRASM through FY2024. The Advanced Anti-Radiation Guided Missile is designed to target enemy integrated air defenses, specifically guidance radars (see Figure 15 ). AARGM was conceived in 2001 to replace the High-Speed Anti-Radiation Missile (HARM). DOD identified several deficiencies in the HARM that limited its operational effectiveness during Operation Iraqi Freedom. Thus, AARGM incorporated a new solid-propellant rocket motor that improved its range over the HARM, along with new guidance and seeker systemsâusing GPS inertial navigation for guidance and millimeter wave and W-band (higher than 40 GHz) sensors. AARGM entered operational testing in 2010 and initial operational capability in 2012. AARGM has been integrated on the F/A-18C/D Hornet, F/A-18E/F Super Hornet, E/A-18G Growler, F-16C/D Falcon, and the F-35 Lightning II. Both the Navy and the Air Force have procured the AARGM or its predecessor the HARM; however, neither service is procuring additional missiles as of FY2020. The Navy, however, has requested $183 million of procurement appropriations to modify its current stockpile of AARGMs. The Air Force has not requested appropriations to modify its stockpile of HARMs since FY2016. Table 6 describes the total DOD request for AARGM. AARGM has been exported to a number of countries, including Australia, Italy, Finland, Germany, and Poland. GMLRS (see Figure 16 ) is a GPS-guided 227-millimeter rocket that was jointly developed by the United States, France, Germany, Italy, and the United Kingdom. Development began in 1999, and the U.S. military began procuring GMLRS in FY2003. GMLRS is capable of being launched from the M270 multiple launch rocket system (MLRS) and the M142 High Mobility Artillery Rocket System (HIMARS). GMLRS has a 200-pound unitary warhead and a maximum range of 70 kilometers. Both the Army and the Marine Corps have procured GMLRS. Since 1998, DOD has spent nearly $5.4 billion to procure more than 42,000 rockets. DOD has requested more than $1.2 billion for approximately 9,900 rockets in FY2020, and it plans to spend an additional $4.3 billion for nearly 29,000 GMLRS between FY2021 and FY2024. In addition, GMLRS is being exported: Bahrain, United Arab Emirates, Poland, and Romania are procuring GMLRS, as are the development partners (France, Germany, Italy, and the United Kingdom). See Table 7 for an overview of the current DOD request for GMLRS. ATACMS (see Figure 17 ) is a 610-millimeter rocket that can be launched from either the M270 MLRS (two rockets) or the M142 HIMARS (a single rocket). This rocket was originally developed in the 1980s and was later updated to provide GPS guidance. ATAMCS underwent a second upgrade in 1991, which allowed ATACMS warheads to seek and attack armored targets. Other upgrades have improved target discrimination and new penetrating warheads for hardened targets. In 2016, then-Secretary of Defense Ash Carter announced that the Strategic Capabilities Office had developed a new seeker that allowed the ATACMS rocket to target ships. The Army has stated that it intends to retire the ATACMS and replace it with the new Precision Strike Missile. The Army is procuring ATACMS in FY2020, though this procurement will curtail as the Precision Strike Missile enters service. DOD requested to procure 240 missiles for $340 million in FY2020; it plans to procure 492 missiles for $611 million between FY2021 and FY2024. Table 8 provides an overview of the most recent request for ATACMS. Five hundred and six ATACMS have been exported to a number of countries, including the United Arab Emirates and Romania. The PrSM is a new development program intended to replace ATACMS. PrSM is designed to be launched from the M270 and the M142 HIMARS multiple rocket launcher system. The Army states that PrSM is designed to launch two missiles in a launcher pod compared to ATACMS single missile, has a range in excess of 400 kilometers, and has an anti-jam GPS antenna. PrSM is in development and is planned to enter early operational service in FY2023. The Army has not stated when it intends to begin testing the PrSM. The Army states that although this missile might be sold to foreign militaries in the future, there are no purchase commitments from foreign governments as of 2019. The Army tested the PrSM at White Sands, NM, in its first flight test in December 2019. In its second test in March 2019, the Army successfully tested the PrSMs short-range capabilities. The Tomahawk cruise missile was originally developed during the early- to mid-1970s. It was designed to be launched by submarines and from surface combatants. Designed to fly at 570 miles per hour (Mach 0.74, or 74% of the speed of sound) for up to 870 nautical miles, the Tomahawk has received a number of upgrades since it entered service. The Tomahawk Block IV is the current cruise missile in production and comes in two versionsâone for surface ships and another for submarines (see Figure 19 ). Upgrades have included improvements to GPS guidance, satellite datalink communications, and propulsion. The first operational use of the Tomahawk was during Operation Desert Storm, where the Navy launched 290 missiles from 12 submarines. Since then, IHS Janes reports that the Navy has used more than 1,600 missiles in Iraq, Bosnia, Serbia, Afghanistan, and Syria. The United Kingdom is the only export customer of the Tomahawk Block IV. From FY1998 through FY2018, the Navy spent $5.87 billion on 4,984 Tomahawk cruise missiles. The Navy has requested nearly $387 million for 90 missiles in FY2020, and it projects to procure an additional 90 missiles for nearly $374 million in FY2021, with no plans to procure additional missiles in FY2022-FY2024. The Navy projects requesting $819 million for additional procurement appropriations. (See Table 10 for the most recent Tomahawk request.) The Standard Missile-6 was originally designed in 2004 as an anti-aircraft missile, derived from the Navy's SM-2 Block IV (see Figure 20 ). Since its development, the SM-6 has been integrated into the Navy's Naval Integrated Fires-Counter Air (NIF-CA) program to strike enemy surface ships. The missile was designed to receive targeting information from AEGIS radars and has been upgraded to receive target information from the E-2D Advanced Hawkeye. In addition to anti-air and anti-surface missions, the SM-6 is also capable of performing anti-ballistic missile missions. SM-6 entered low-rate initial production in FY2009 and full rate production in FY2013. The SM-6 is funded under the Navy's procurement line item 2234 Standard Missile. According to the latest Selected Acquisition Reports, DOD increased the requirement for SM-6 missiles from 1,800 to 2,331. DOD requested $488 million for 125 missiles in FY2020; it is projected that DOD will procure an additional 615 missiles between FY2021 and FY2024 at a cost of nearly $2.9 billion. Table 11 provides an overview of the current DOD request for SM-6 missiles. The Naval Strike Missile was originally developed by the Norwegian company Kongsberg as a replacement for the Penguin anti-ship missile (see Figure 21 and Figure 22 ). This missile is an anti-ship, low-observable cruise missile capable of flying close the surface of the ocean to avoid radar detection. IHS Janes states that \"[t]heÂ  NSM Â airframe materials andÂ missileÂ shape are intended to minimise its infrared (IR) and radar signatures and radar cross section.\" The NSM is designed to fly multiple flight profilesâdifferent altitudes and speedsâwith effective ranges of between 100 and 300 nautical miles at a cruise speed of up to 0.9 Mach. The Navy has integrated the NSM on its Littoral Combat Ship, which deployed into the Pacific region in September 2019. The Navy began procuring the NSM in FY2019 under the Littoral Combat Ship Over-the-Horizon Missile procurement line (see Table 12 ). The Navy has requested $38 million for 18 missiles, and it plans to spend approximately $166 million for an additional 83 missile through FY2024. According to its budget justification, the Navy does not have a specific requirement for the number of missiles it plans to procure. Planned procurement quantities and stockpile assessment. One potential issue for Congress is whether DOD's desired quantities of standoff munitions are appropriate. Current operations have demonstrated a large demand for all types of PGMs. A potential high-intensity conflict would potentially require large stockpiles of all types of weapons. Several of these types of munitionsâparticularly JASSM, LRASM, and AARGMâare being procured in relatively small quantities, given their potential use rates in a high-intensity conflict scenario, along with the time it would take for replacement spent munitions once initial inventories are exhausted. A related issue is whether DOD has adequately assessed the sufficiency of existing and planned PGM stockpiles, particularly in light of recent use rates for such weapons. Congress has from time to time required DOD to assess munitions requirements, as well as to report on combatant command munitions requirements. More recently, Congress required DOD to provide an annual report on the munitions inventory, along with an unconstrained assessment of munitions requirements. Defense industrial base production capacity. Another potential issue for Congress concerns the defense industrial base's capacity for building PGMs, particularly for meeting increased demands for such weapons during an extended-duration, high-intensity conflict. The question is part of a larger issue of whether various parts of the U.S. defense industrial base are adequate, in an era of renewed great power competition, to meet potential wartime mobilization demands. Supply chain security. Another potential issue for Congress concerns supply chain security, meaning whether U.S. PGMs incorporate components, materials, or software of foreign origin. Supply chain security could affect wartime reliability of these weapons as well as the ability of the U.S. industrial base to build replacement PGMs in a timely manner during an extended-duration, high-intensity conflict. Development timelines. Congress may be concerned about the development timeline of PGMs compared with development timelines of adversary A2/AD capabilities. China and Russia have developed sophisticated systems over the past 10 years, while DOD has developed relatively few systems. Some analysts argue that these systems can exceed DOD munitions capabilities (such as range and speed). Can and, if so, should DOD develop new systems and at a pace that can match or exceed that of Chinese or Russian weapons systems? Affordability and cost-effectiveness. Congress may also be concerned about the affordability of DOD's plans for procuring various PGMs in large numbers, and the cost-effectiveness of PGMs relative to other potential means of accomplishing certain DOD missions, particularly in a context of finite DOD resources and competing DOD program priorities. Another aspect of cost-effectiveness concerns the cost of the weapon compared to the cost of a target. For instance, in 2017 a U.S. ally used a $3 million Patriot missile to engage a $300 quadcopter drone. Emerging factors that may affect PGM programs. Another potential issue for Congress is how DOD's programs for developing and procuring PGMs might be affected by emerging factors such as the U.S. withdrawal from the Intermediate Nuclear Force (INF) treaty; new U.S. military operational concepts for countering Chinese A2/AD forces in the Indo-Pacific region, such as the Army's new Multi-Domain Operations (MDO) operational concept and the Marine Corps' new Expeditionary Advanced Base Operations (EABO) concept, both of which possibly feature the potential use of such weapons from island locations in the Pacific as a way of countering China's A2/AD forces; and emerging technologies such as hypersonics and artificial intelligence (AI). Appendix A. Prior Year Procurement by Service Appendix B. Prior Year Procurement by Program", "summary": "Over the years, the U.S. military has become reliant on precision-guided munitions (PGMs) to execute military operations. PGMs are used in ground, air, and naval operations. Defined by the Department of Defense (DOD) as \"[a] guided weapon intended to destroy a point target and minimize collateral damage,\" PGMs can include air- and ship-launched missiles, multiple launched rockets, and guided bombs. These munitions typically use radio signals from the global positioning system (GPS), laser guidance, and inertial navigation systems (INS)âusing gyroscopesâto improve a weapon's accuracy to reportedly less than 3 meters (approximately 10 feet). Precision munitions were introduced to military operations during World War II; however, they first demonstrated their utility operationally during the Vietnam War and gained prominence in Operation Desert Storm in 1991. Since the 1990s, due in part to their ability to minimize collateral damage, PGMs have become critical components in U.S. operations, particularly in Afghanistan, Iraq, and Syria. The proliferation of anti-access/area denial (A2/AD) systems is likely to increase the operational utility of PGMs. In particular, peer competitors like China and Russia have developed sophisticated air defenses and anti-ship missiles that increase the risk to U.S. forces entering and operating in these regions. Using advanced guidance systems, PGMs can be launched at long ranges to attack an enemy without risking U.S. forces. As a result, DOD has argued it requires longer range munitions to meet these new threats. The Air Force, Army, Navy, and Marine Corps all use PGMs. In FY2021, the Department of Defense (DOD) requested approximately $4.1 billion for more than 41,337 weapons in 15 munitions programs. DOD projects requesting approximately $3.3 billion for 20,456 weapons in FY2022, $3.9 billion for 23,306 weapons in FY2023, $3.9 billion for 18,376 weapons in FY2024, and $3.6 billion for 16,325 weapons in FY2025. Previously DOD obligated $1.96 billion for 13,985 weapons in FY2015, $2.98 billion for 35,067 weapons in FY2016, $3.63 billion for 44,446 weapons in FY2017, $5.05 billion for 68,988 weapons in FY2018, and $4.3 billion in FY2019 for 60,62 munitions. In FY2020, Congress authorized $5.30 billion for 56,067 weapons. Current PGM programs can be categorized as air-launched, ground-launched, or naval-launched. Air-Launched: Paveway Laser Guided Bomb, Joint Direct Attack Munition (JDAM), Small Diameter Bomb, Small Diameter Bomb II, Hellfire Missile, Joint Air-to-Ground Missile, Joint Air-to-Surface Strike Missile (JASSM), Long Range Anti-Ship Missile (LRASM), and Advanced Anti-Radiation Guided Missile. Ground - Launched: Guided Multiple Launch Rocket System (GMLRS), Army Tactical Missile System (ATACMS), and Precision Strike Missile (PrSM); Naval PGMs: Tomahawk Cruise Missile, Standard Missile-6 (SM-6), and Naval Strike Missile. Congress may consider several issues regarding PGMs, including planned procurement quantities and stockpile assessments, defense industrial base production capacity, development timelines, supply chain security, affordability and cost-effectiveness, and emerging factors that may affect PGM programs.", "document_type": "crs"}
{"report": "Local governments have traditionally played an important role in regulating cable television systems. Operators required municipal permission to place their cables above or beneath streets and other publicly owned land and to mount the cables on telephone/and or utility poles. Cities negotiated with cable operators over the services their systems would provide, including channels dedicated to public, educational, or government programming (PEG), and the payment of franchise fees. In exchange, the cable operators often received de facto exclusive local franchises to offer video distribution services. That changed in 1984, when Congress required local governments to allow competition. In the mid-2000s, as telephone companies (known as \" telcos \") sought to obtain their own video services franchises, state governments got involved to streamline the franchising process, in several instances preempting municipalities' authority. The states applied these laws to incumbent cable operators as well as to new entrants, to ensure legal parity. As technological developments and changes in business strategies and consumer behavior have reshaped the telecommunications industry, the Federal Communications Commission (FCC) has taken several steps to limit local regulatory authority over cable and telco video service providers. Many of these regulatory changes have caused controversy. Some local governments assert that, among other things, the FCC's actions will limit their ability to protect the public interest and deprive them of revenue. This report examines the evolving relationship between federal, state, and local regulators and identifies related policy issues that may be of interest to Congress. Cable television began operating in the 1940s as a means to receive broadcast signals in areas with trees or mountains that interfered with over-the-air signal transmission. Initially, municipalities, rather than states, made most decisions related to awarding cable franchises. As cable television developed, some states began to regulate the terms included in a cable franchise, or required state review or approval of a franchise agreement. The term local franchising authorities (LFAs) refers to municipal and/or state government entities that offer and negotiate video franchises. Today, agreements between LFAs and video service providers typically include provisions concerning the availability of channels for PEG programming; the amount of money due to the LFA in franchise fees, including in-kind contributions; and the rates charged to subscribers. The Communications Act of 1934 (referred to in this report as the Communications Act) created the FCC, but did not specifically set forth the FCC's authority to regulate cable. However, the U.S. Supreme Court found in 1968 that the agency's authority was sufficiently broad to do so. The FCC issued comprehensive regulations governing cable systems and cable franchising authorities in 1972. The FCC's rules directed cable operators to offer PEG services and LFAs to cap franchise fees. In the early days of cable television, a municipal government seeking to bring cable to its residents would, through a request for proposals, spell out the requirements that a cable operator would have to meet to win the franchise. Cable companies would bid against one another for the chance to wire the municipality. Renewal of an existing franchise might entail additional requirements. In 1972, the FCC directed cable operators to dedicate one channel for public access, one channel for educational use, and one channel for local government use by a certain date, and to add channel capacity if necessary to meet the requirement. Two years later, however, the commission reconsidered its stance, stating, Demands are being made not only for excessive amounts of free equipment but also free programming and engineering personnel to man the equipment. Cable subscribers are being asked to subsidize the local school system, government, and access groups. This was not our intent and may, in fact, hamper our efforts at fostering cable technology on a nationwide scale. Too often these extra equipment and personnel demands become franchise bargaining chips rather than serious community access efforts. We are very hopeful that our access experiment will work.... We do not think, however, that simply putting more demands on the cable operator will make public access a success. Access will only work, we suspect, when the rest of the community assumes its responsibility to use the opportunity it has been provided. Although the U.S. Supreme Court later struck down the FCC's rules requiring cable operators to set aside channels for PEGs, PEG access requirements became commonplace in local franchise agreements by the early 1980s. Congress encouraged this development. According to a 1984 report from the House Committee on Energy and Commerce Public access channels are often the video equivalent of the speaker's soapbox or the electronic parallel to the printed leaflet. They provide groups and individuals who generally have not had access to the electronic media with the opportunity to become sources of information in the electronic marketplace of ideas. PEG channels also contribute to an informed citizenry by bringing local schools into the home, and by showing the public local government at work. In addition to requiring cable system owners to obtain a franchise before operating, municipalities also required cable system owners to pay a franchise fee . In its 1972 Cable Order, the FCC stated, [M]any local authorities appear to have extracted high franchise fees more for revenue-raising than for regulatory purposes. Most fees are about five or six percent, but some have been known to run as high as 36 percent. The ultimate effect of any revenue-raising fee is to levy an indirect and regressive tax on cable subscribers. Second, and of great importance to the Commission, high local franchise fees may burden cable television to the extent that it will be unable to carry out its part in our national communications policy.... We are seeking to strike a balance that permits the achievement of federal goals and at the same time allows adequate revenues to defray the costs of local regulation. To accomplish this balance, the FCC capped the franchise fees at 3%-5% of a cable operator's revenues from subscribers. For fees greater than 3% of an operator's subscriber revenues, the FCC required a franchising authority to submit a showing that the specified fee was \"appropriate in light of the planned local regulatory program.\" When cable television first developed as essentially an antenna service to improve over-the-air broadcast television signal reception in rural and suburban areas, many municipalities regulated the rates charged to subscribers. The municipalities viewed rate regulation, tied to the systems' use of public streets, as a means of preventing cable operators from charging unreasonably high rates for what they viewed as an essential service. In the 1972 Cable Order, the FCC required franchising authorities to specify or approve initial rates for cable television services regularly furnished to all subscribers and to institute a program for the review and, as necessary, adjustment of rates. In 1976, the FCC repealed those rules and instead made LFA regulation of rates for cable television services optional. In 1974, the FCC preempted LFAs from regulating rates for other so-called \"specialized services,\" including \"advertising, pay services, digital services, [and] alarm systems.\" In the Cable Communications Policy Act of 1984 ( P.L. 98-549 , referred to in this report as the 1984 Cable Act), Congress added Title VI to the Communications Act to give the FCC explicit authority to regulate cable television. The 1984 Cable Act established the local franchising process as the primary means of cable television regulation. The act did not diminish state and local authority to regulate matters of public health, safety, and welfare; system construction; and consumer protection for cable subscribers. Congress enacted the 1984 Cable Act the same year that American Telephone and Telegraph Company (AT&T), which had an effective monopoly over most telecommunications services, spun off its regional operating companies as part of the settlement of a federal antitrust suit. The 1984 Cable Act generally prohibited telcos from providing video services in the same regions where they provided voice services. This prohibition prevented the former AT&T companies from competing with cable operators in communities where they controlled the local telephone system. The 1984 Cable Act confirmed the power of state and municipal governments to include requirements for PEGs, facilities and equipment, and certain aspects of program content within franchise agreements. It delineated federal limits on franchise fees, and restricted the FCC's power to regulate the amount of franchise fees or the use of funds derived from those fees. The law permits franchising authorities to charge franchise fees, but limits such fees to no more than 5% of the cable operators' gross revenues from \"cable services.\" For the purposes of calculating gross revenues, the FCC included revenues from advertising and home shopping commissions, in addition to revenues from video service subscriptions. Subsequently, as described in \" FCC Actions Affecting State and Local Video Service Franchising Terms and Conditions ,\" defining the costs that are subject to the 5% statutory limit on franchise fees became a point of repeated controversy. The 1984 Cable Act allows local franchising authorities to enforce any PEG access requirements in a franchise agreement. Such terms and conditions can include providing video production facilities and equipment, paying capital costs related to PEG facilities beyond the 5% franchise fee cap, and paying costs associated with support of PEG channel use. In addition, the 1984 Cable Act permitted LFAs to require cable operators to designate channels for PEGs on institutional networks (I-Nets) provided for public buildings and other nonresidential subscribers. Section 623 of the 1984 Cable Act (47 U.S.C. Â§543) prohibits federal, state, or local franchising authorities from regulating the rates of cable operators that are \"subject to effective competition,\" as defined by the FCC. The 1984 Cable Act directs the FCC to review its standards for determining effective competition periodically, taking into account developments in technology. In 1985, the FCC determined that cable systems generally were subject to \"effective competition\" if they operated in an areas where three or more broadcast television signals were either \"significantly viewed\" by residents or transmitted with acceptable signal quality (as defined by the FCC) to the cable systems' franchise areas. In accordance with the timetable set by the 1984 Cable Act, the \"effective competition\" rule became effective on December 29, 1986. This rule effectively deregulated cable prices in most communities. In 1991, the FCC adopted a new definition of \"effective competition.\" The FCC deemed effective competition to exist if either: 1. six unduplicated broadcast signals were available to the cable operator's franchise area via over-the-air reception, or 2. another multichannel video service, such as a satellite service, was available to at least 50% of homes to which cable services were available (homes passed), and was subscribed to by 10% of the cable operator's homes passed. Under this more restrictive definition, most systems were still subject to effective competition and therefore not subject to rate regulation. In the Cable Television Consumer Protection and Competition Act of 1992 ( P.L. 102-385 , referred to here as the 1992 Cable Act), Congress stated the policy goal of relying on market forces, to the maximum extent feasible, to promote the availability of a diversity of views and information through cable television and other video distribution media. Congress emphasized the importance of protecting consumer interests where cable systems are not subject to effective competition, and of ensuring that cable operators do not have undue market power vis-Ã -vis video programmers and consumers. The 1992 Cable Act revised Section 621(a)(1) of the Communications Act to codify restraints on local franchise authorities' licensing activities. While local authorities retained the power to grant cable franchises, the law provided that \"a franchising authority may not grant an exclusive franchise and may not unreasonably refuse to award an additional competitive franchise.\" Congress gave potential entrants a judicial remedy by enabling them to commence an action in a federal or state court within 120 days after a local authority refused to grant them a franchise. In addition, Congress made it easier for local authorities to regulate cable rates by adopting a more restrictive definition of \"effective competition\" than the FCC's. Pursuant to these changes, local authorities may not regulate cable rates if at least one of the following four conditions is met: 1. fewer than 30% of the households in the franchise area subscribe to a particular cable service; 2. within the franchise area, a. at least two unaffiliated multichannel video programming distributors (MVPDs) each offer comparable video programming to at least 50% of the households in the franchise area, and b. at least 15% of households subscribe to an MVPD other than the largest one; 3. an MVPD owned by the franchising authority offers video programming to at least 50% of the households in the franchise area; or 4. a telephone company offering local voice services (known as a \"local exchange carrier\" [LEC]) or its affiliate, \"(or any multichannel video programming distributor using the facility of such carrier or its affiliate)\" carries comparable video programming services directly to subscribers by any means (other than direct-to-home satellite services) in the franchise area of an unaffiliated cable operator that is providing video service in that franchise area. Congress directed the FCC to publish a survey of cable rates annually. Even as the 1992 Cable Act took effect, a combination of technological, economic, and legal factors was enabling the convergence of the previously separate telephone, cable, and satellite broadcasting industries. Digital technology, particularly the ability to compress digital signals, enabled both direct broadcast satellite (DBS) services and cable operators to offer dozens of channels. In 1993, the telephone company Bell Atlantic successfully challenged, on First Amendment grounds, the 1984 ban on cross-ownership of telephone and cable companies in the same local market. In the meantime, several cable operators sought to gain economies of scale by consolidating local systems into regional systems. In the Telecommunications Act of 1996 ( P.L. 104-104 ), Congress permitted LECs to offer video services and cable operators to offer voice services. Because laws and regulations pertaining to cable systems were quite different from those pertaining to LECs, the prospect of greater competition between those two types of providers led Congress to revisit video market regulation. Moreover, Section 601 rescinded the 1982 consent decree that required the breakup of AT&T, thereby allowing LECs to consolidate further by subsequently merging with long-distance service providers and each other. The act stipulated that cable operators do not need to obtain approval of local authorities that regulate their video services in order to offer \"telecommunications services,\" such as voice services. The Senate Commerce Committee noted that these changes did not affect existing federal or state authority with respect to telecommunications services. It stated that the committee intended that local governments, when exercising their authority to manage their public rights of way, regulate telecommunications services provided by cable companies in a nondiscriminatory and competitively neutral manner. Congress used the term \"open video systems\" (OVS) in the 1996 Telecommunications Act (Â§653) to describe LECs that soughtto compete with cable operators. The act explicitly exempted OVS service from franchise fees and other 1992 Cable Act requirements, including the requirement to obtain a local franchise. In 1999, the U.S. Court of Appeals for the Fifth Circuit interpreted the provision to mean that, while the federal government could no longer require OVS operators to obtain a local franchise, state and local authorities could nevertheless do so. In 2003, several telephone companies, most notably Southwestern Bell Company (now AT&T) and Verizon, began constructing fiber networks designed to bring consumers advanced digital services, including video. AT&T and Verizon branded these services as \"U-Verse\" and \"FiOS,\" respectively. Neither company launched video services under the OVS rules, claiming that federal requirements and potential local franchise requirements were too costly. In 2006, a federal district court in California dismissed AT&T's claims that municipalities were violating federal law by attempting to exercise franchise authority over the company's video services. The court declined, however, to rule on whether video delivered over internet protocol, the technology used by LECs, met the federal definition of a cable service. Two bills introduced that year in the 109 th Congress, H.R. 5252 and S. 2686 , would have declared that video service enabled via internet protocol is subject only to federal regulation. Congress did not vote on either bill. As the LECs sought to enter the video distribution market, they pursued statewide reforms to speed their entry, rather than seeking franchises in individual municipalities. The LECs' competitors, the incumbent cable operators, contended that state-level franchising would present new entrants with fewer obligations than cable companies had faced when they entered the market, specifically the obligation to build networks serving all parts of a community. In 2005, Texas became the first of several states to replace local franchising with a state-level regime for video service providers, with the express purpose of facilitating entry by new competitors. As Table 1 illustrates, many other states have since either replaced municipal franchising with state-level franchising or offered providers a choice. Since 2007, the FCC has repeatedly revisited the authority of states and LFAs to franchise and regulate video service providers. This process culminated in two orders issued in 2019. One (the \"2019 LFA 3 rd R&O\") sharply limits state and local authority over products offered by video service providers other than video programming. The other order (the \"2019 Effective Competition Order\") determined that AT&T's streaming service, AT&T TV NOW, meets the LEC test component of Congress's effective local competition definition and therefore provides effective competition to a local cable operator. In 2007, the FCC found that the local franchising process constituted an unreasonable barrier to new entrants in the marketplace for video services and to their deployment of high-speed internet service. The FCC adopted rules and guidance covering cities and counties that grant cable franchises. However, the agency stated that it lacked sufficient information regarding whether to apply the rules and guidance to state governments that either issued franchises at the statewide level or had enacted laws governing specific aspects of the franchising process. Consequently, the FCC stated that while it would preempt local laws, it would not preempt state laws covering video franchises. The FCC determined that unless certain specified costs, fees, and other compensation required by LFAs are counted toward the statutory 5% cap on franchise fees, an LFA's demand for such fees represents an unreasonable refusal to award a competitive franchise to a new entrant. In addition, the FCC found that some LFAs had required new entrants to make \"in-kind\" payments or contributions that are unrelated to the provision of cable services. The FCC stated that any requests by LFAs for in-kind contributions that are unrelated to the provision of cable services by a new competitive entrant are subject to the statutory 5% franchise fee cap. The FCC contended that disputes between LFAs and new entrants over LFA-mandated contributions in support of PEG services and equipment could lead to unreasonable refusals by LFAs to award competitive franchises. It determined that costs related to supporting the use of PEG access facilities, including but not limited to salaries and training, are subject to the 5% cap, but that capital costs \"incurred in or associated with the construction of PEG access facilities\" are excluded from the cap. The FCC stated that the LFAs' jurisdiction over LECs and other new entrants applies only to the provision of video services. Specifically, it stated that an LFA cannot use its video franchising authority to attempt to regulate a LEC's entire network beyond the provision of video services. In addition, the FCC found that the following LFA actions constitute an unreasonable refusal to award video franchises to new entrants: 1. failure to issue a decision on a competitive application within the time frames specified in the FCC's order; 2. refusal to grant a competitive franchise because of an applicant's unwillingness to agree to \"unreasonable\" build-out requirements; and 3. denying an application based upon a new entrant's refusal to undertake certain obligations relating to PEGs and I-Nets. In 2008, the U.S. Court of Appeals for the Sixth Circuit upheld the FCC's rules. In November 2007, the FCC issued a Second Report and Order that extended the application of several of these rules to local procedures to renew incumbent cable operators' franchises. Specifically, the FCC determined that the rules addressing LFAs' franchise fees, PEG and institutional network obligations, and non-cable-related services and facilities should apply to incumbent operators. It concluded, however, that FCC rules setting time limits on LFAs' franchising decisions and limiting LFA build-out requirements should not apply to incumbent cable operators. Several LFAs petitioned the FCC to reconsider and clarify its Second Report and Order. In 2015, the FCC issued an Order on Reconsideration in which it set forth additional details about its rules with the stated purposes of promoting competition in video services and accelerating broadband deployment. Following the 2015 Order on Reconsideration, the following policies were in place. The FCC clarified that its rules and regulations on franchising applied to city and county LFAs only, not to state-level laws or decisions. The FCC stated that it lacked sufficient information about the state-level franchising process, and suggested that if parties wished the agency to revisit this issue in the future, they should provide evidence that doing so would achieve Congress's policy goals. The FCC included in-kind contributions from incumbent cable operators that were unrelated to the provision of video services within the statutory 5% franchise fee cap. Likewise, the FCC found that payments made by cable operators to support PEG access facilities are subject to the 5% cap, unless they fall under the FCC's definition of \"capital costs\" associated with the construction of PEG facilities. The FCC made in-kind contributions related to cable services subject to the cap on franchise fees for new entrants as well as for cable incumbents. The FCC determined that LFAs' jurisdiction to regulate incumbent cable operators' services is limited to video services, and does not include voice or data services. In addition, the FCC found the following LFA actions do not per se constitute an unreasonable refusal to award video franchises to cable incumbents, although they did for new entrants: 1. denying an application based upon an incumbent's refusal to undertake certain obligations relating to PEGs and institutional networks; 2. failure to issue a decision on a competitive application within the time frames specified in the FCC's order; and 3. refusal to grant a competitive franchise because of an applicant's unwillingness to agree to unreasonable build-out requirements. In 2017, the U.S. Court of Appeals for the Sixth Circuit addressed challenges by LFAs to the 2007 Second Report and Order and the 2015 Order on Reconsideration. The court found that the FCC had made sufficiently clear that its rules only apply to city and county LFAs and did not bind state franchising authorities. It determined that the FCC had correctly concluded that noncash contributions could be included in its interpretation of \"franchise fee\" subject to the 5% limit. However, the court held that the FCC had neither explained why the statutory text allowed inclusion of in-kind cable-related contributions within the 5% cap nor defined what \"in-kind\" meant. It found that the FCC offered no basis for barring local franchising authorities from regulating the provision of \"non-telecommunications\" services by incumbent cable providers. It directed the FCC to set forth a valid statutory basis, \"if there is one,\" for applying its rule to the franchising of cable incumbents. The court used the term \"non-telecommunications\" service rather than \"non-video\" or \"non-cable\" service, differing from the distinctions the FCC made with respect to LFAs' authority. The FCC responded to the court's directives in 2018, and once again proposed rules governing the franchising of cable incumbents. On August 1, 2019, the FCC adopted its Third Report and Order (R&O). The FCC stated that its rules would ensure a more level playing field between new entrants and incumbent cable operators and accelerate deployment of \"advanced telecommunications capability\" by preempting local regulations that \"impose an undue economic burden\" on video service providers. The FCC stated that the franchise fees rulings are prospective. That is, video operators may count only ongoing and future in-kind contributions toward the 5% franchise fee cap after September 26, 2019, the effective date of its rules. To the extent franchise agreements conflict with the FCC's rules, the agency encourages the parties to negotiate franchise modifications within a \"reasonable timeframe,\" which it states should be120 days in most cases. Under the new regulations: The FCC oversees state franchising authorities for the first time. Cable-related in-kind contributions from both new entrants and incumbent cable operators are \"franchise fees\" subject to the 5% cap, with limited exceptions. Such contributions include any nonmonetary contributions related to the provision of video services by incumbent cable operators and LECs as a condition or requirement of a local franchise agreement. Examples include free and discounted cable video service to public buildings; costs in support of PEG access facilities other than capital costs; and costs associated with the construction, maintenance, and service of an I-Net. For purposes of calculating contributions toward the 5% franchise fee cap, video providers and LFAs must attach a fair market value to cable-related in-kind contributions, but the FCC declined to provide guidance on how to calculate fair market value. The definition of PEG \"capital costs\" subject to the 5% cap includes equipment purchases and construction costs, but does not include the cost of installing the facilities that LFAs use to deliver PEG services from locations where the programming is produced to the cable headend. Requirements that cable operators build out their systems within the franchise area and the cost of providing channel capacity for PEG channels may not be included under the 5% cap. Franchise authorities may not regulate nonvideo services offered over cable systems by incumbent cable operators. The services covered by this prohibition include broadband internet service, business data services, and Voice over Internet Protocol (VoIP) services. \"[S]tates, localities, and cable franchising authorities are preempted from charging franchised cable operators more than five percent of their gross revenue from cable [video] services.\" Thus, LFAs may not include nonvideo service revenues when calculating the 5% cap. The communities of Los Angeles, CA, Portland, OR, and Eugene, OR, have filed a petition with the U.S. Court of Appeals for the Ninth Circuit challenging the FCC's rules. The Ninth Circuit has consolidated the various appellate court challenges, and in November 2019, granted an FCC motion to transfer the now-consolidated petition to the U.S. Court of Appeals, Sixth Circuit. Table 1 , as well as the following two tables, illustrate how the FCC's rules could potentially affect the franchising process in several states. The FCC's decision to extend its franchising rule to state governments for the first time will subject each of the states listed in the first three columns of Table 1 (i.e., those that issue franchises at the state-level in all or some circumstances) to the FCC's rules. Moreover, the FCC's rules will cover states that oversee municipal franchises via either statute or state-level agencies. Thus, the FCC's franchising rules will affect more video service providers, viewers, and municipal governments than ever before. Because the FCC is including cable-related in-kind contributions in its definition of franchise fees subject to the 5% cap, some states and municipalities may need to make a trade-off. Specifically, as Table 2 illustrates, several states require or allow LFAs to require video service providers to offer free and/or discounted video service to public buildings, support of PEG services (other than capital costs), and support of I-Nets. Affected states and municipalities may need to reevaluate the trade-off between in-kind cable-related contributions and general fund revenues. Note that Ohio and Wisconsin prohibit both PEG and I-Net contribution requirements, while Idaho prohibits I-Net contribution requirements. As Table 3 illustrates, some states define \"gross revenues\" more narrowly than the FCC, excluding, for example , revenues from advertising and home shopping commissions. In those states, as well as others in which municipal LFAs define gross revenues more narrowly than the FCC, PEGs may be able to continue to receive cable-related, in-kind contributions without reducing the monetary contributions they receive, while remaining within the 5% cap. As described in \" Franchise Fees and PEGs ,\" the FCC has included revenues from advertising and home shopping commissions, in addition to revenues from video service subscriptions, in its definition of \"gross revenues.\" LFAs that use similar definitions of \"gross revenues,\" including those subject to state regulation, may already charge the maximum amount of franchise fees permitted by the FCC. Others, however, exclude these sources, and may therefore have more flexibility when evaluating whether or not to continue their cable-related in-kind contributions. Moreover, some states specifically exclude other items when calculating providers' revenue bases that are subject to the franchise fees. Several exclude government fees and/or taxes passed on to subscribers, while Missouri excludes fees and contributions for I-Nets and PEG support from its calculation. The FCC has not specifically addressed whether franchise authorities may include these items in their revenue base calculation. Thus, these states may also have more flexibility when evaluating whether to change video franchises' terms and conditions. Many states already exclude nonvideo revenues from the calculation of provider revenues subject to the franchise fee cap. New York, however, describes the gross revenues of a video provider subject to the franchising fees as including, among other things, \"carrier service revenue.\" This section of the New York statute does not define \"carrier service revenue.\" A current dispute between New York City and Charter Communications (d/b/a Spectrum) for service within Brooklyn concerns whether \"carrier service revenue\" received from \"additional provided services\" may be subject to franchise fees. The FCC's new rules may affect the outcome of this dispute. Moreover, in July 2019, the New York State Public Service Commission approved a settlement of a complaint that Charter has failed to comply with a requirement in its franchise agreement to expand high-speed service. Under the settlement, Charter may continue operating within the state, if it expands its high-speed internet service infrastructure to 145,000 residents in Upstate New York and invests $12 million in providing high-speed internet services to other areas of the state. If Charter contends that the FCC's rules preempt these provisions, it could seek to renegotiate the settlement. The FCC cited a decision by the Supreme Court of Oregon in City of Eugene v. Comcast as an example of states and localities asserting authority to impose fees and requirements beyond their authority. In the decision, the court upheld a local government's 7% license fee on revenue from broadband services provided over a franchised cable system. Thus, while states and municipalities may regulate both video and voice services of telcos, they may only regulate video services of cable operators. If a state or municipality may charge franchise fees to cable operators and telcos only with respect to video services, the total amount of fees received is likely to decrease over time. As Figure 1 indicates, the total number of U.S. households subscribing to cable and telco video services has declined over the past 10 years. In 2010, about 70.8 million households subscribed to either a cable operator or a telco, compared with about 60.1 million households in 2019. In place of cable, more households have elected to rely on video provided over broadband connections or broadcast transmission. For cable operators in particular, this substitution of alternative sources of programming has led to the pursuit of revenue from nonvideo services, such as voice and high-speed data. In 2010, video services represented about 63% of total cable industry revenue, whereas in 2019 video represented 46% of total industry revenue ( Figure 2 ). Pursuant to the FCC's proposed rules, these other sources of revenue are not subject to LFAs' jurisdiction. In addition, the U.S. Court of Appeals for the Eighth Circuit held that a cable operator's voice services are not a telecommunications service, and therefore not subject to state regulation. In October 2019, the U.S. Supreme Court denied the Minnesota Public Utility Commission's petition hear the case. In Missouri, the City of Creve Coeur and other municipalities filed a class action lawsuit against satellite operators DIRECTV, DISH Network, as well as online streaming services Netflix Inc., and Hulu LLC, claiming that the companies must pay a percentage of gross receipts from video services to the municipalities where they do business, pursuant to Missouri's Video Services Providers Act. The state law allows Missouri's political subdivisions to collect up to 5% of gross receipts from providers of video programming and requires providers to register before providing service in the state, according to court documents. The municipalities claim the defendants have not paid the required amounts. Other localities may follow suit. A bill before the Illinois General Assembly would impose a 5% tax (rather than a \"franchise fee\") on the video service revenues of direct broadcast satellite operators and online video services for the right to provide services to Illinois residents. Similarly, a bill before the Massachusetts House of Representatives would impose a 5% fee on revenues earned by streaming video services. Massachusetts would split the money collected from the fees between the state's general fund (20%), municipalities (40%), and PEG programmers (40%). If receipts from cable franchise fees continue to erode, more states and municipalities may respond by seeking alternative revenue sources. In 2014, Congress enacted the Satellite Television Extension and Localism Act Reauthorization Act (STELA Reauthorization Act; P.L. 113-200 ). Section 111 of the act directed the FCC to develop a streamlined process for the filing of \"effective competition\" petitions by small cable operators within 180 days of the law's enactment. A cable company filing such a petition bears the burden of proof to demonstrate that it faces effective competition for its video services. The FCC responded in 2015 by adopting a rebuttable presumption that cable operators are subject to effective competition. As a result, the FCC prohibited franchising authorities from regulating basic cable rates unless they can demonstrate that the cable system is not subject to effective competition. The FCC stated that the change in its effective competition definition was justified by the fact that direct broadcast satellite service was available as an alternative video services provider throughout the United States. Later in 2015, the FCC found that LFAs in two states, Massachusetts and Hawaii, demonstrated that cable systems in their geographic areas were not subject to effective competition, and permitted them to continue to regulate the rates of the basic tiers of cable services. However, in September 2018, Charter Communications (Charter), a cable provider, asked the FCC to find that AT&T's DIRECTV NOW, a streaming service that AT&T has since rebranded as AT&T TV NOW, provides effective competition to cable systems in Kauai, HI, and 32 Massachusetts communities. In October 2019, the FCC agreed and issued an order granting Charter's petition, finding for the first time that an online streaming service affiliated with a LEC meets the LEC test in Congress's definition of effective competition. The FCC found that [AT&T TV NOW] need not itself be a LEC and AT&T need not offer telephone exchange service in the franchise areas.... There is no requirement ... that a LEC provide telephone exchange service in the same communities as the competing video programming service. Thus, if even AT&T TV NOW's subscribers rely on internet service from Charter to receive AT&T TV NOW's programming, the FCC considers AT&T TV NOW to be a competitor to Charter with respect to the distribution of video programming. According to the FCC, Congress adopted the LEC test because LECs and their affiliates \"are uniquely well-funded and well-established entities that would provide durable competition to cable,\" and not because [Congress was] focused on facilities-based competition. Meanwhile, some localities have enacted legislation with the goal of reducing prices consumers pay for video services. A 2019 Maine law would require video service providers to offer networks and programs on an a la carte basis instead of offering subscribers only bundles of channels. Several cable operators, broadcasters, and content providers have sued to overturn the law. In January 2020, a federal judge blocked the implementation of the law as the parties prepare for trial. These regulatory developments and industry trends raise several potential issues for Congress to consider. First, Congress could consider whether the FCC's interpretation of the Communications Act is consistent with the policy goals set forth in Section 601 of the Communications Act (47 U.S.C. Â§521) and Section 706 of the Telecommunications Act. Specifically, Congress could explore the extent, if any, to which state and local regulations designed to promote the availability of PEG programming and I-Nets. Second, Congress could evaluate whether to create regulatory parity with respect to local regulation of nonvideo services of cable and telcos. While states and municipalities may regulate both video and voice services of telcos, they may only regulate video services of cable operators. Congress could address regulatory parity by either deregulating traditional telcos' nonvideo services or regulating cable operators' nonvideo services. Third, as the FCC and local governments include online video providers in their definitions of video providers for the purposes of evaluating competition and/or imposing franchise fees, Congress could clarify whether these actions achieve its stated policy goals. For example, if, in contrast to the FCC's interpretation of the LEC test for effective competition, Congress intends to include only facilities-based video services in its definition of video service competition, it could delineate the definition in communications laws. Likewise, as online video services become more prevalent and states and municipalities target them for franchise fees, Congress could specify the authority, if any, to regulate them. Finally, while the FCC has determined that competition among video programming distribution services has eliminated the need for rate regulation of the basic tier of cable services, Maine enacted a law to enable consumers to pay only for video programming they choose, in lieu of bundles of channels. In the past, some Members of Congress have proposed statutory changes to require video programming distributors to offer individual channels to consumers in addition to bundles of channels, and Congress could consider revisiting this issue, or alternatively clarifying that states and local governments lack authority to enact such laws.", "summary": "Local and state governments have traditionally played an important role in regulating cable television operators, within limits established by federal law. In a series of rulings since 2007, the Federal Communications Commission (FCC) has further limited the ability of local governments (known as local franchise authorities ) to regulate and collect fees from cable television companies and traditional telephone companies (known as telcos ) offering video services. In August 2019, in response to a ruling by a federal court of appeals, the FCC tightened restrictions on municipalities' andâfor the first timeâon states' ability to regulate video service providers. The Communications Act of 1934, as amended, still allows local governments to require video service operators to provide public, educational, and government (PEG) channels to their subscribers. The FCC's August 2019 order, however, sets new limits on local governments' ability to collect fees from operators to support the channels. In addition, the FCC ruled that local franchise authorities could not regulate nonvideo services offered by incumbent cable operators, such as broadband internet service, business data services, and Voice over Internet Protocol (VoIP) services. In October 2019, also for the first time, the FCC concluded that a video streaming service was providing \"effective competition\" to certain local cable systems, thereby preempting the affected municipalities' ability to regulate local rates for basic cable service. These rulings have caused controversy. The FCC has asserted that they fulfill a statutory mandate to promote private-sector investment in advanced telecommunications and information services and to limit government regulation when competition exists. State and local governments, however, have objected that the regulatory changes deprive them of revenue and make it harder for them to ensure that video providers meet local needs. Against this backdrop of federal government actions limiting cable service regulation at the local level, consumer behavior continues to change. Specifically, an increasing number of consumers are substituting streaming services for video services provided by cable companies and telcos. As a result, the amount of revenue state and local governments receive from cable and telco providers subject to franchise fees is declining, which also reduces the amount cable providers can be required to spend to support PEG channels. In response, some municipalities and states have attempted to impose fees on online video services, such as Netflix and Hulu. Courts have not yet ruled on the legality of such fees. These regulatory developments and industry trends raise several potential issues for Congress. First, Congress could consider whether the FCC's interpretation of the Communications Act with respect to local regulation of video service providers is consistent with Congress's policy goals. Specifically, Congress could explore the extent, if any, to which, if any, it encourages or permits state and local regulations designed to promote the availability of PEG programming as well as subsidized voice, data, and video services for municipal institutions. Second, Congress could evaluate whether to create regulatory parity with respect to local regulation of cable and telcos' nonvideo services. While states and municipalities may regulate both video and voice services of telcos, they may only regulate video services of cable operators. Congress could address regulatory parity by either deregulating traditional telcos' nonvideo services or regulating cable operators' nonvideo services. Third, as the FCC and local governments include online video streaming services in their definitions of video providers for the purposes of evaluating competition and/or imposing franchise fees, Congress could clarify whether these actions achieve its stated policy goals. Finally, given the FCC's actions to reduce local government rate regulation of cable services and the State of Maine's legislation to enable video subscribers to seek alternatives to bundled programming, Members of Congress could reconsider past proposed statutory changes to require video programming distributors to offer individual channels to consumers. Alternatively, Congress could clarify that states and local governments lack authority to enact such laws.", "document_type": "crs"}
{"report": "Finance and technological development have been inextricably linked throughout history. (Possibly, quite literally. The technology of writing in early civilization may have developed to record payments and debts. ) As a result, the term fintech is used to refer to a broad set of technologies being deployed across a variety of financial industries and activities. Although there is no consensus on which technologies qualify as new or innovative enough to be fintech, it is generally understood to mean recent innovations to the way a financial activity is performed that are made possible by rapid advances in digital information technology. Underlying, cross-cutting technological advancements that enable fintech include increasingly widespread, easy access to the internet and mobile technology; increased data generation and availability and use of Big Data and alternative data; increased use of cloud computing services; the development of algorithmic decisionmaking (and the related technological evolutions toward machine learning and artificial intelligence); and the coevolution of cyber threats and cybersecurity. The complementary use of these technologies to deliver financial services could potentially create benefits. Many technologies aim to create efficiencies in financing, which reduce costs for financial service providers. Certain cost savings may be passed along to consumers through reduced prices. With lower prices, some customers that previously found services too expensive could enter the market. In addition, some individuals and businesses that previously could not access financial services because of price or lack of available financial information could gain access at lower prices or through increased data availability and improved data analysis. Fintech also may allow businesses to reach new customers that were previously restricted by geographic remoteness or unfamiliarity with products and services. Increased accessibility may be especially beneficial to traditionally underserved groups, such as low-income, minority, and rural populations. However, fintech may also generate risks and result in undesirable outcomes. Predicting how an innovation with only a brief history of use will perform involves uncertainty, particularly without the experience of having gone through a recession. Thus, technologies may not ultimately allocate funds, assess risks, or otherwise function as efficiently and accurately as intended; they may instead generate unexpected losses. Some technologies aim to eliminate or replace a middle man, but in certain cases the middle man may in fact be useful or even necessary. For example, an experienced financial institution or professional may be able to explain and advise consumers on financial products and their risks. In addition, new fintech startups may be inexperienced in complying with consumer-protection laws. These characteristics may increase the likelihood that consumers using financial technology engage in a financial activity and take on risks that they do not fully understand and which unduly expose them to losses. Furthermore, some studies suggest that fintech's use can result in disparate impact on protected groups, and that the increasing use of high-speed internet and mobile devices in finance may be leaving behind groups that cannot afford those services and devices. As financial activity increasingly uses digital technology, sensitive data are generated. On the one hand, data can be used to assess risks and ensure customers receive the best products and services. On the other hand, data can be stolen and used inappropriately, and there are concerns over privacy. This raises questions over data ownership and controlâincluding consumers' rights and companies' responsibilities in accessing and using dataâand whether companies that use and collect data face appropriate cybersecurity requirements. Given that fintech may produce both positive and negative outcomes, Congress and other policymakers may consider whether existing laws and regulations appropriately foster the development and implementation of potentially beneficial technologies while adequately mitigating the risks those technologies may present. This report examines (1) underlying technological developments that are being used in financial services, (2) selected examples of financial activities affected by innovative technology, and (3) some approaches regulators have used to integrate new technologies or technology companies into the existing regulatory framework. Policy issues that may be of interest to Congress are examined throughout the report. Additional CRS products and resources also are identified throughout the report and in the Appendix . For a detailed examination of how fintech is regulated, see CRS Report R46333, Fintech: Overview of Financial Regulators and Recent Policy Approaches , by Andrew P. Scott. Fintech is generally enabled by advances in general-use technologies that are used to perform financial activities. This section examines certain of these underlying technologies, including their potential benefits and risks, and identifies policy issues related to their use in finance that Congress is considering or may choose to consider. The proliferation of online financial services has a number of broad implications. One consideration is that online companies can often quickly grow to significant size shortly after entering a financial market. This could enable the rapid growth of small fintech startups, possibly through capturing market share from incumbent financial firms. Adopting information technology, however, may require significant investment, which could advantage existing firms if they have increased access to capital. Larger technology firmsâincluding Amazon, Apple, Facebook, and Googleâhave started financial services operations, and thus may become competitors to or partners with traditional financial institutions. Some industry experts predict that platforms offering the ability to engage with different financial institutions from a single channel will likely become the dominant model for delivering financial services. These developments may raise concerns that offering finance through digital channels could drive industry concentration. Another consideration in this area involves consumer disclosures for financial products. In the past, voluntary or mandatory disclosures were designed to be delivered through paper. As firms move more of their processes online, they have begun to update these disclosures with electronic formats in mind. Consumers may interact differently with mobile or online disclosures than paper disclosures. Accordingly, firms may need to design online disclosures differently than paper disclosures to communicate the same level of information to consumers. The internet raises questions over what role geography-based financial regulations should play in the future. Many financial regulations are applied to companies and activities based on geographic considerations, as most areas of finance are subject to a dual federal-state regulatory system. For example, nonbank lenders and money transmitters are primarily regulated at the state level in each state in which they operate and are subject to those states' consumer-protection laws. Fintech proponents argue the internet facilitates the provision of products and services on a national scale, and 50 separate state regulatory regimes are inefficient when applied to internet-based businesses that are not constrained by geography. However, state regulators and consumer advocates assert state regulators' experience and local connection are best situated to regulate nonbank fintech companies. An Office of the Comptroller of the Currency (OCC) initiative to accept applications for special-purpose bank charters that would allow certain fintechs to enter the national bank regulator regime, and subsequent lawsuits filed by state regulators to block such charters, exemplify this policy debate. Another example is the debate over how a bank's geographic assessment area should be defined for the purposes of the Community Reinvestment Act ( P.L. 95-128 )âa law designed to encourage banks to meet the credit needs of the communities in which they operateâwhen so many services are delivered over the internet instead of at a physical branch location. Another area in which the internet raises concerns is how effective disclosure requirements are if they are sent electronically and read on a screen, when many disclosure forms may have been designed to be delivered and read on paper. Thus, although electronic disclosures can eliminate costs of printing and physically delivering disclosures, they may hinder customers' ability to read and understand them. Currently, financial regulatory agencies are responsible for implementing consumer-disclosure laws. Often, these agencies create either mandatory or safe harbor form designs that firms use to comply with these laws. Some financial regulatory agencies are either required or choose to test new consumer disclosures themselves before implementing a new disclosure requirement on the entities they regulate. In the past, when most consumer credit origination occurred in person, this testing generally focused on paper delivery. As firms move more of their origination processes online, financial regulatory agencies might consider updating their consumer testing research with this format in mind. Today, companies can easily collect, cheaply store, and quickly process data, regardless of its size, frequency, type, or location. Big Data commonly refers to the vast amounts and types of data an information technology (IT) system may handle. Big Data data sets share characteristics that require different hardware and software in IT systems to store, manage, and analyze those data. The four characteristics of Big Data are volume, velocity, variety, and variability. Volume refers to a data set's extensive size. Velocity refers to the rate of flow for the data coming into, being processed by, and exiting the IT system. Variety refers to the differing types of data in a data set, such as information entered by a company analyst, images, data from a partner database, and data scraped from a website. Variety can also refer to different types of devices and subsystems in an IT system handling the data. Variability refers to the recognition that Big Data data sets can change with regard to the first three attributes. A data set may grow or shrink in volume, data may flow at different velocities, and a data set may include a different variety of data from one point in time to another. Changes in data variability drive IT systems to have a scalable architecture in order to manage the data sets. Big Data is used to generate insights, support decisionmaking, and enable automation. Big Data allows extensive and complex information to be analyzed with new methods (e.g., cloud computing resources, which are discussed in more detail below), leading users to understand and use the data in novel ways. Loan underwriting (evaluating the likelihood that a loan applicant will make timely repayment) is an example from the financial services industry. Loan underwriting has relied on an in-person process, using only a few data sources that might have been months or years old. Big Data enables underwriting to be performed online using a greater variety of more current data sources, potentially allowing for greater speed, accuracy, and confidence in loan decisions, but raises concerns over privacy and questions over what information is appropriate to collect and use. In recent years, new technologies have led to the development of new products in the financial services sector. For example, as account information has become electronic, some products allow consumers to combine accounts with several financial services providers on a single software platform, sometimes in combination with financial advisory services. The underlying technology providers for these platforms are sometimes known as data aggregators, which refers to companies that compile information from multiple sources into a standardized, summarized form. One technology commonly used to collect account data is web scraping , a technique that scans websites and extracts data from them, and in general can be performed without a direct relationship with the website or financial firm maintaining the data. As an alternative to web scraping, the financial institution managing the account may provide customer account information through a structured data feed or application program interface (API). Advantages and disadvantages exist when accessing alternative data by API rather than web scraping. For example, in certain circumstances web scraping may be an easier way for companies to gather data because it does not rely on bilateral company agreements, but some industry observers assert that APIs are more secure in terms of cybersecurity and fraud risks. Using API banking standards to facilitate data sharing between financial firms is sometimes called open banking . New financial products that take advantage of data aggregation and open banking could provide benefits to consumers by enabling them to manage personal finances, automate or set goals for saving, receive personalized product recommendations, apply for loans, and perform other tasks. However, increasing access to these data may pose data security and privacy risks to consumers. Questions exist about how current laws and regulations should apply to Big Data. Typically, these questions relate to concerns about privacy and cybersecurity. One area of debate is whether data security standards should be prescriptive and government defined or flexible and outcome based. Some argue that a prescriptive approach can be inflexible and harm innovation, but others argue that an outcome-based approach might lead to institutions having to comply with a wide range of data standards. In addition, questions exist about whether relevant data security laws continue to cover all sensitive individual financial information, or whether the scope of these laws should be expanded. Alternative data generally refers to types of data that are not traditionally used by the national consumer reporting agencies to calculate a credit score. It can include both financial and nonfinancial data. New technology makes it more feasible for financial institutions to gather alternative data from a variety of sources. For example, the Consumer Financial Protection Bureau (CFPB) included the following list of alternative data in a 2017 Request for Information: Data showing trends or patterns in traditional loan repayment data. Payment data relating to non-loan products requiring regular (typically monthly) payments, such as telecommunications, rent, insurance, or utilities. Checking account transaction and cashflow data and information about a consumer's assets, which could include the regularity of a consumer's cash inflows and outflows, or information about prior income or expense shocks. Data that some consider to be related to a consumer's stability, which might include information about the frequency of changes in residences, employment, phone numbers or email addresses. Data about a consumer's educational or occupational attainment, including information about schools attended, degrees obtained, and job positions held. Behavioral data about consumers, such as how consumers interact with a web interface or answer specific questions, or data about how they shop, browse, use devices, or move about their daily lives. Data about consumers' friends and associates, including data about connections on social media. Alternative data could potentially be used to expand access to credit for consumers, such as currently credit invisible or unscorable consumers, but also could create risks related to data security or consumer-protection violations. Financial institutions can mitigate some of these risks through data encryption and other robust data governance practices. Moreover, some prospective borrowers may be unaware that alternative data has been used in credit decisions, raising privacy and consumer-protection concerns. Additionally, alternative data may pose fair lending risks if alternative data elements are correlated with prohibited classes, such as race or ethnicity. Alternative data could potentially increase accuracy, visibility, and scorability in credit reporting by including additional information beyond that which is traditionally used. The ability to calculate scores for previously credit invisible or nonscoreable consumers could allow lenders to better determine their creditworthiness. Arguably, using alternative data would potentially increase access toâand lower the cost ofâcredit for some credit invisible or unscorable individuals by enabling lenders to find new creditworthy consumers. However, alternative data could potentially harm some consumers' existing credit scores if it includes negative or derogatory information. The main statute regulating the credit reporting industry is the Fair Credit Reporting Act (FCRA; P.L. 91-508), enacted in 1970. The FCRA requires \"that consumer reporting agencies adopt reasonable procedures for meeting the needs of commerce for consumer credit ... in a manner which is fair and equitable to the consumer, with regard to the confidentiality, accuracy, relevancy, and proper utilization of such information.\" Using alternative data for credit reporting raises FCRA compliance questions. For example, alternative data providers outside of the traditional consumer credit industry may find FCRA data-furnishing requirements burdensome. Some alternative data may have accuracy issues, and managing consumer disputes requires time and resources. These regulations may discourage some organizations from furnishing alternative data, even if the data could potentially help some consumers become scorable or increase their credit scores. In addition, consumers may not know what specific information alternative credit scoring systems use and how to improve the credit scores produced by these models. The CFPB and federal banking regulators have been monitoring alternative data developments in recent years, and in December 2019 they released a policy statement on the appropriate use of alternative data in the underwriting process. The release followed a February 2017 CFPB request for information from the public about the use of alternative data and modeling techniques in the credit process. Information from this request led the CFPB to outline principles for consumer-authorized financial data sharing and aggregation in October 2017. These nine principles include, among other things, consumer access and usability, consumer control and informed consent, and data security and accuracy. In addition, the CFPB issued its first (and, to date, only) no-a ction letter in 2017 to the Upstart Network, a company that uses alternative data, such as education and employment history, to make credit and pricing decisions. In 2018, the Treasury Department released a report about regulatory recommendations, with a chapter on consumer financial data, including data sharing, aggregation, and other technology issues. Performing financial activities often involves making decisions about how to allocate resources (e.g., whether a particular borrower should be given a loan or whether shares of a particular stock should be purchased at the current price) based upon analysis of information (e.g., whether the borrower has successfully paid back loans in the past or how much profit the stock-issuing company made last year). Historically, these complex tasks could only be performed by a human. More recently, technological advances have enabled computers to perform these tasks. This development creates potential benefits and risks, and has a number of financial regulatory implications. Financial firms have used algorithmsâprecoded sets of instructions and calculations executed automaticallyâto enable computers to make decisions for a number of years, notably in the lending and investment management industries. Such automation may produce benefits if algorithmic analysisâperhaps using Big Data and alternative data, discussed previouslyâis better able to assess risks, predict outcomes, and allocate capital across the financial system than traditional human assessments. Eliminating inefficiencies through such automation could reduce the prices and increase the availability of and access to financial services, including for consumers, small businesses, and the underserved. Automation can also create certain concerns, particularly if automated programs may not perform as intended, possibly resulting in market instability or discrimination against protected groups. Algorithms can fail to perform as expected for reasons such as programmer error or unforeseen conditions, potentially producing unexpected losses. Because algorithms can execute actions so quickly and at large scale, those losses can be quite large. An illustrative event is the Flash Crash of May 6, 2010, in which the Dow Jones Industrial Average fell by roughly 1,000 points (and then rebounded) in intraday trading. The event was caused in part by an automated futures selling program that made sales more quickly than anticipated, resulting in tremendous market volatility. In addition, automated decisions may result in adverse impacts on certain protected groups in a discriminatory way. In lending, for example, these discriminatory outcomes may include higher rates of denial for minority loan applicants than for white applicants with similar incomes and financial histories. Such discrimination can occur for a number of reasons, even if algorithm developers did not intend to discriminate. For example, the data set used to train the lending program is likely historical data of past loan recipients, and minorities may be underrepresented in that sample. By using these data to learn, the algorithm may similarly make fewer loans to underrepresented groups. Programs enabled with artificial intelligence or machine-learning capabilities (i.e., automated programs that are able to change themselves with little or no human input) raise a number of policy concerns. The programs' complexity and the lack of human input needed to change their decisionmaking processes can make it exceedingly difficult for human programmers to predict what these programs will do and explain why they did it. Under these circumstances, the ability of regulators or other outside parties to understand what a program did, and why, may be limited or nonexistent. This poses a significant challenge for companies using AI programs to ensure they will produce outcomes that comply with applicable laws and regulations, and for regulators to effectively carry out their oversight duties. In order to address this black box problem, some observers assert that regulators should set standards for how AI programs are developed, tested, and monitored. If Congress decided such standards were necessary, it could encourage or direct financial regulatory agencies to develop them. In addition, it could direct the agencies to implement rules regarding the development and use of AI programs. Some have jokingly referred to cloud computing as \"someone else's computer.\" Although this is a facetious characterization, it succinctly describes the technology's core tenet. Cloud computing users transfer their information from a resource (e.g., hard drives, servers, and networks) that they own to one that they lease. Cloud computing alleviates users from having to buy, develop, and maintain technical resources and recruit and retain the staff to manage those resources. Instead, cloud computing users pay providers who specialize in building and managing such resource infrastructures. Cloud and high-performance computing architectures are better suited to processing Big Data than desktop computing. For many, this makes Big Data and cloud computing inextricably linked, and many commenters may refer to them interchangeably. Although this may be common practice, it is not technically accurate. Cloud computing refers to the computing resource (e.g., servers, applications, and service), whereas Big Data refers to the data a computing resource may use. Cloud computing is used extensively by financial institutions, including banks, insurers, and securities firms. Most financial firms store and process large amounts of data related to customer accounts and transactions. Typically, they also provide internet-based access to accounts and services through websites and mobile device apps and attract customers with these services. Meeting these business needs requires significant IT infrastructures and capabilities. For some financial companies, it may be less costly to pay a cloud service provider than to do everything in-house. Cloud computing introduces certain information security considerations and risks. Because data are not physically under the user's direct control (i.e., the data are no longer on a local, owned or controlled data server), the risk that access to those data may spread beyond intended users may be higher. Cloud providers counter that although they have physical access to the data, they do not necessarily have logical access to the data, nor do they own the data. In other words, they argue that although the data are hosted on their servers, they are encrypted or otherwise segmented from the provider's ability to access them. Another related potential risk is commonly referred to as the insider threat âthe risk that a trusted insider may purposely harm an employer or clients. Although users may limit unauthorized access to their data through encryption, an insider may be able to manipulate the encrypted files in such a manner that the information is kept confidential, but is no longer available. Users would then depend on the provider to restore a functioning backup of the data to resume data access. Or, the provider may offer encryption and key-management services to the user. In doing so, providers keep the data in their servers confidential between clients, but in a way that continues to afford that provider access to the user's data through encryption and decryption protocol maintenance. It should be noted that financial institutions that keep IT operations in-house also face the insider threat. However, migrating to cloud computing adds the cloud service provider's employees to the set of people that could pose an insider threat. In addition, a portion of the risk shifts from being internally managed by the financial institution to being externally managed by the cloud service provider. How well a financial institution manages these changing risk exposures depends on the quality of its policies, programs, and relationship with its cloud provider. Policymakers may examine whether the existing regulatory framework and rules appropriately balance the goals of guarding against the risks cloud computing presents to individual financial institutions and systemic stability, while not hindering beneficial innovations. Firms face operational risk (including legal and compliance risks) whether they operate and maintain IT in-house or outsource to a cloud provider. Arguably, the risk of system disruptions and failures can be reduced by using a cloud provider with technical specialization in operating, maintaining, and protecting IT systems. Nevertheless, the nature of operational risk exposure changes when an institution adopts cloud computing. This dynamic potentially raises friction between banks, cloud providers, and regulators regarding how banks' relationships with cloud providers should be regulated. The Bank Services Company Act (BSCA; P.L. 87-856) requires regulators to subject activities performed by bank service providers to the same regulatory requirements as if they were performed by the bank itself. This could place substantial regulatory burden on banks and cloud services providers that see potential benefit to working together. The BSCA gives bank regulators supervisory authority over service providers. Exercising this authority over cloud service providers, however, may raise challenges. At least initially, bank regulators may be unfamiliar with the cloud service industry, and cloud service providers may not be familiar with what is expected during bank-like examinations. The Federal Reserve's April 2019 examination of Amazon Websites Services (AWS; a cloud provider with bank clients) anecdotally illustrates the frictions in this area. Reportedly, AWS was wary of the process, and when examiners asked for additional documents and information, \"the company balked, demanding to first see details about how its [AWS's] data would be stored and used, and who would have access and for how long.\" The cloud computing industry could pose risk to broader financial system stability in addition to risk at individual financial firms. Cloud computing resources are pooled, meaning cloud service providers build their resources to service many users simultaneously. This means many financial institutions could be using the same cloud provider, and are likely doing so because the cloud computing industry is highly concentrated at a small number of large providers (as discussed in more detail in the next section). Before cloud computing was available, successful cyberattacks or other technological disruptions would occur in individual institutions' systems. With cloud computing, an incident at one of the main cloud service providers could affect several firms simultaneously, thus affecting large portions of the entire financial system. Large, systemically important banks are reportedly moving significant portions of their operations onto cloud services, which could exacerbate the effects of a disruption at a cloud service provider. Certain financial regulators have mandates to ensure financial stability, so policymakers may choose to consider whether their authorities to regulate cloud service providers are appropriately calibrated. Cybersecurity is a major concern of financial institutions and federal regulators. In many ways, it is an important extension of physical security. For example, banks are concerned about both physical and electronic theft of money and other assets, and they do not want their businesses shut down by weather events or denial-of-service attacks. Maintaining the confidentiality, security, and integrity of physical records and electronic data held by banks is critical to sustaining the level of trust that allows businesses and consumers to rely on the banking industry to supply services on which they depend. Enormous amounts of data about individuals' personal and financial information are now generated and stored across numerous financial institutions. This could create additional opportunities for criminals to commit fraud and theft at a scale not previously possible. Instead of stealing credit cards one wallet at a time, someone hacking into a payment system can steal thousands of credit cards at once, and the internet allows stolen credit cards to be sold and used many times. For example, the 2013 Target data breach compromised approximately 70 million credit cards. Whereas a traditional criminal method might involve stealing tax refund checks from individual mail boxes, the IRS announced in May 2015 that its computer system was hacked, allowing unknown persons to file up to 15,000 fraudulent tax returns worth up to $50 million total. The Equifax breach that occurred between May and July 2017 potentially jeopardized almost 148 million U.S. consumers' identifying information. To mitigate cybersecurity risks, financial institutions are subject to an array of laws and regulations. The basic authority that federal regulators use to establish cybersecurity standards emanates from the organic legislation that established the agencies and delineated the scope of their authority and functions. In addition, certain state and federal lawsâincluding the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank; P.L. 111-203 ), the Gramm-Leach-Bliley Act of 1999 (GLBA; P.L. 106-102 ), and the Sarbanes-Oxley Act of 2002 ( P.L. 107-204 )âhave provisions related to the cybersecurity of financial services that are often performed by banks. In addition, regulators issue guidance in a variety of forms designed to help banks evaluate their risks and comply with cybersecurity regulations. The existing framework was implemented before certain developments in financial technology, and risks related to cybersecurity arguably have increased with digitization's proliferation in finance. Successful hacks of financial institutions, such as those mentioned above, highlight the importance of financial services cybersecurity oversight. The framework governing financial services cybersecurity reflects a complex and sometimes overlapping array of state and federal laws, regulators, regulations, and guidance. However, whether this framework is effective and efficient, resulting in adequate protection against cyberattacks without imposing undue cost burdens on banks, is an open question. Concerns about data security aside, generating and analyzing data also raises privacy concerns. Individuals' transactions are increasingly recorded and analyzed by financial institutions. Debates over how financial institutions should be allowed to use or share consumer data between institutions remain unresolved. For more information on these issues, see CRS Report R44429, Financial Services and Cybersecurity: The Federal Role , by N. Eric Weiss and M. Maureen Murphy; CRS In Focus IF10559, Cybersecurity: An Introduction , by Chris Jaikaran; and CRS Report R45631, Data Protection Law: An Overview , by Stephen P. Mulligan, Wilson C. Freeman, and Chris D. Linebaugh. When innovative financial technology is developed for a specific financial market, activity, or product, it might raise questions over the degree to which existing applicable laws and regulations foster the potential benefits and protects against potential risks. This section examines certain fintech innovations, including their potential benefits and risks, and identifies related policy issues that Congress is considering or may choose to consider. Traditionally, consumer and small business lenders worked in person with prospective borrowers applying for a new loan. These lenders employed human underwriters to assess prospective borrowers' creditworthiness, determining whether the lender would extend credit to an applicant and under what terms. The underwriting process can be relatively laborious, time consuming, and costly. Dating back to at least 1989, with the debut of a general-purpose credit score called FICO, automation has increasingly become a part of the underwriting process. In general, automation in underwriting relies on algorithmsâprecoded sets of instructions and calculations executed by a computerâto determine whether to extend credit to an applicant and under what terms. In contrast, human underwriting relies on a person to use knowledge, experience, and judgement (perhaps informed by a numerical credit score) to make assessments. More recently, with the proliferation of internet access and data availability, some new lendersâoften referred to as marketplace lenders or fintech lenders ârely entirely or almost entirely on online platforms and algorithmic underwriting. In addition, the abundance of alternative data about prospective borrowers now available to lendersâeither publicly accessible or accessed with the borrower's permissionâmeans lenders can incorporate additional information beyond traditional data provided in credit reports and credit scores into assessments of whether a particular borrower is a credit risk. Potentially, more data about a borrower could allow a lender to accurately assessâand thus extend credit toâprospective borrowers for whom traditional information is lacking (e.g., people with thin credit histories) or insufficient to make a determination about creditworthiness (e.g., small businesses). However, such practices raise questions about what kind of data should be accessible and used in credit decisions and whether its use could result in disparate impacts or other consumer-protection violations. Although fintech lending remains a small part of the consumer lending market, it has been growing quickly in recent years. According to the GAO, \"in 2017, personal loans provided by these lenders totaled about $17.7 billion, up from about $2.5 billion in 2013.\" A general issue underlying many of the policy questions involving fintech in lending is whether the current regulatory framework appropriately fosters these technologies' potential benefits while mitigating the risks they may present. Some commentators argue that current regulation is unnecessarily burdensome or inefficient. Often these criticisms are based largely or in part on the argument that the state-by-state regulatory framework facing nonbank lenders is ill-suited to an internet-based (and hence borderless) industry. Opponents of this view assert that state-level licensing and consumer-protection laws, including usury laws (laws that target lending at unreasonably high interest rates), are important safeguards that should not be circumvented. Additional policy questions arise in cases where banks and nonbanks have partnered with each other to issue loans, such as in an arrangement depicted in Figure 1 . Fintech companies and banks enter into a variety of such arrangements in which one or the other may build the online, algorithmic platform; do the underwriting on the loan; secure the funding to make the loan; originate it; and hold it on its own balance sheet or sell it to investors. These arrangements generally require a bank to closely examine its compliance obligations related to vendor relationship requirements, discussed in more detail in this report's \" Banks and Third-Party Vendor Relationships \" section. In addition, certain arrangements have raised legal questions concerning federal preemption of state usury lawsâspecifically, whether federal laws that allow banks to export their home states' maximum interest rates apply to loans that are originated by banks but later purchased by nonbank entities. Whether applicable laws and regulations governing these arrangements are appropriately calibrated to ensure availability of needed and beneficial credit or expose consumers to potential harm through the preemption of important consumer protections is a matter of debate. Another area of debate is how consumers will be affected by fintech in lending. Fintech lending proponents argue that, because financial technologies increasingly use quantitative analysis of new data sources, the technologies may expand credit availability to individuals and small businesses in a fair, safe, and less costly way. Thus, these proponents argue that overly burdensome regulation of these technologies could cut off a beneficial credit source to individuals who may have previously lacked sufficient credit access. However, some consumer advocates argue that inexperienced fintech lenders with a relative lack of federal regulatory supervision could inadvertently violate consumer-protection regulations. For example, these lenders may make loan decisions that unintentionally have a disparate impact on protected groups, violating fair lending laws. Also, when lenders deny a loan application they generally must send a notice to the applicant explaining the reason for the denial, called an adverse action notice . Some commentators question how well lenders will understand and thus be able to explain the reasons for an adverse action resulting from a decision made by algorithm. For more detailed examination of these topics, see CRS Report R44614, Marketplace Lending: Fintech in Consumer and Small-Business Lending , by David W. Perkins; and CRS Report R45726, Federal Preemption in the Dual Banking System: An Overview and Issues for the 116th Congress , by Jay B. Sykes. As more banking transactions are delivered through digital channels, insured depository institutions (i.e., banks and credit unions) that lack the in-house expertise to set up and maintain these technologies are increasingly relying on third-party vendors, specifically technology service providers (TSPs), to provide software and technical support. In light of banks' growing reliance on TSPs, regulators are scrutinizing how banks manage their operational risks , the risks of loss related to failed internal controls, people, and systems, or from external events. Rising operational risksâspecifically cyber risks (e.g., data breaches, insufficient customer data backups, and operating system hijackings)âhave compelled regulators to scrutinize banks' security programs aimed at mitigating operational risk. Regulators require an institution that chooses to use a TSP to ensure that the TSP performs in a safe and sound manner, and activities performed by a TSP for a bank must meet the same regulatory requirements as if they were performed by the bank itself. The Bank Service Company Act (BSCA; P.L. 87-856) and the Gramm-Leach-Bliley Act (GLBA; P.L. 106-102 ) give insured depository institution regulators a broad set of authorities to supervise TSPs that have contractual relationships with banks. The BSCA directs the federal depository institution regulators to treat all activities performed by contract as if they were performed by the bank and grants them the authority to examine and regulate third-party vendors that provide services to banks, including check and deposit sorting and posting, statement preparation, notices, bookkeeping, and accounting. Section 501 of GLBA requires federal agencies to establish appropriate standards for financial institutions to ensure the security and confidentiality of customer information. Hence, the prudential depository regulators issued interagency guidelines in 2001 that require banks to establish information security programs. Among other things, banks must regularly assess the risks to consumer information (in paper, electronic, or other form) and implement appropriate policies, procedures, testing, and training to mitigate risks that could cause substantial harm and inconvenience to customers. The guidance requires banks to provide continuous oversight of third-party vendors such as TSPs to ensure that they maintain appropriate security measures. The regulators periodically update and have since released additional guidance pertaining to third-party vendors. Regulation aimed at banks' relationships with third-party vendors such as TSPs has benefits in mitigating operational risks but imposes costs on banks that want to utilize available technologies. Banks, particularly community banks and small credit unions, may find it difficult to comply with regulator standards applicable to third-party vendors. For example, certain institutions may lack sufficient expertise to conduct appropriate diligence when selecting TSPs or to structure contracts that adequately protect against the risks TSPs may present. Some banks may also lack the resources to monitor whether the TSPs are adhering to GLBA and other regulatory or contract requirements. In addition, regulatory compliance costs are sometimes cited as a factor in banking industry consolidation, because compliance costs may be subject to economies of scale that incentivize small banks to merge with larger banks or other small banks to combine their resources to meet their compliance obligations. For more detailed examination of this issue, see CRS In Focus IF10935, Technology Service Providers for Banks , by Darryl E. Getter. Consumers have several options to make electronic, noncash transactions, as shown in Figure 2 . For instance, consumers can make purchases by swiping, inserting, or tapping a card to a payment terminal; they can store their preferred payment information in a digital wallet; or they can use an app to scan a barcode on a mobile phone that links to a payment of their choice. Merchants also enjoy electronic payments innovations that allow them to accept a range of payment types while limiting the need to manage cash. Despite the technology surrounding noncash payments, electronic payment networks eventually run through the banking system. Accessing these systems typically involves paying fees, which may be burdensome on certain groups. For instance, while most Americans have a bank account, a 2017 survey found that almost a third of those who left the banking system did so because of fees associated with their account. While some services, such as prepaid cards, allow individuals to make electronic payments without bank accounts, these options also often involve fees. As a result, cash payments may be the most affordable payment option for certain groups. If electronic payment methods significantly displace cash as a commonly accepted form of payment, that evolution could have both positive and negative outcomes. Proponents of reducing cash use argue that doing so will generate important benefits, such as reducing the costs associated with producing, transporting, and protecting cash. Conversely, opponents of reducing cash usage and acceptance argue that doing so would further marginalize people with limited access to the financial system. Although consumers tend to prefer using debit cards and credit cards, cash maintains an important role in retail payments and person-to-person (P2P) transfers, especially for smaller transactions and lower-income households. Electronic payments and cash displacement have various implications for the security and privacy of consumers and merchants. For example, not having cash on store premises can reduce the risk of theft while increasing fees paid to payment card processors. Similarly, consumers may be denied services if they only use cash, but if they transition to electronic payments, the privacy offered by cash transactions' anonymous nature is eroded. Further, as more transactions occur over electronic payment systems, the data processed in these transactions are exposed to cybersecurity attacks. Policymakers may examine whether they should encourage or discourage an evolution away from cash based on their assessments of such a change's benefits and costs. For more information on this topic, see CRS Report R45716, The Potential Decline of Cash Usage and Related Implications , by David W. Perkins. There are several steps in the process of completing a payment, involving multiple systems run by various actors. End user payment services accessed by consumers and retailers are only run by the private sector. On the other hand, bank-to-bank payment messaging, clearing, and settlement can currently be executed through systems run privately or by the Federal Reserve. The processing of these bank-to-bank electronic payments currently results in payment settlement occurring hours later or on the next business day after a payment is initiated. However, advances in technology have made systems featuring real-time payments (RTP)âpayments that settle almost instantaneouslyâpossible. The Federal Reserve plans to introduce an RTP system called FedNow in 2023 or 2024. FedNow would be \"a new interbank 24x7x365 real-time gross settlement service with integrated clearing functionality to support faster payments in the United States\" that \"would process individual payments within seconds ... (and) would incorporate clearing functionality with messages containing information required to complete end-to-end payments, such as account information for the sender and receiver, in addition to interbank settlement information.\" FedNow is to be available to all financial institutions with a reserve account at the Federal Reserve. It will require banks using FedNow to make funds transferred over it available to their customers immediately after being notified of settlement. Several private-sector initiatives are also underway to implement faster payments, some of which would make funds available to the recipient in real time (with deferred settlement) and some of which would provide real-time settlement. Notably, the Clearing House introduced its RTP network (with real-time settlement), which is jointly owned by its members (a consortium of large banks), in November 2017; according to the Clearing House, it currently \"reaches 50% of U.S. transaction accounts, and is on track to reach nearly all U.S. accounts in the next several years.\" According to Federal Reserve Chair Jerome Powell, \"the United States is far behind other countries in terms of having real-time payments available to the general public.\" Businesses and consumers would benefit from the ability to receive funds more quickly, particularly as a greater share of payments are made online or using mobile technology. A faster payment system may provide certain other benefits for low-income or liquidity-constrained consumers (colloquially, those living \"paycheck to paycheck\") who may more often need access to their funds quickly. In particular, many lower-income consumers say that they use alternative financial services, such as check cashing services and payday loans, because they need immediate access to funds. Faster payments may also help some consumers avoid checking account overdraft fees. Note, however, that some payments that households make would also be cleared fasterâdebiting their accounts more quicklyâthan they are in the current system, which could be harmful to some households. The main policy issue regarding the Federal Reserve and RTP is whether Federal Reserve entry in this market is desirable. Some stakeholders question whether the Federal Reserve can justify creating a RTP system in the presence of competing private systems. They fear that FedNow will hold back or crowd out private-sector initiatives already underway and could be a duplicative use of resources. The Treasury Department supports Federal Reserve involvement on the grounds that it will help private-sector initiatives at the retail level. Others, including many small banks , fear that aspects of payment and settlement systems exhibit some features of a natural monopoly (because of network effects), and, in the absence of FedNow, private-sector solutions could result in monopoly profits or anticompetitive behavior, to the detriment of financial institutions accessing RTPs and their customers (merchants and consumers). From a societal perspective, it is unclear whether it is optimal to have a single provider or multiple providers in the case of a natural monopoly, particularly when one of those competitors is governmental. Multiple providers could spur competition that might drive down user costs, but more resources are likely to be spent on duplicative infrastructure. RTP competition between the Federal Reserve and the private sector also has mixed implications for other policy goals, including innovation, ubiquity, interoperability, equity, and security. For more information on this topic, see CRS Report R45927, U.S. Payment System Policy Issues: Faster Payments and Innovation , by Cheryl R. Cooper, Marc Labonte, and David W. Perkins. Cryptocurrencies are digital money in electronic payment systems that generally do not require government backing or the involvement of an intermediary, such as a bank. Instead, system users validate payments using public ledgers that are protected from invalid changes by certain cryptographic protocols. In these systems, individuals establish an account identified by a string of numbers and characters (often called an address or public key ) that is paired with a password or private key known only to the account holder. A transaction occurs when two parties agree to transfer digital currency (perhaps in payment for a good or service) from one account to another. The buying party will unlock the currency used as payment with her private key, allowing some amount to be transferred from her account to the seller's. The seller then locks the currency in her account using her own private key. From the perspective of the individuals using the system, the mechanics are similar to authorizing payment on any website that requires an individual to enter a username and password. In addition, companies offer applications or interfaces that users can download onto a device to make transacting in cryptocurrencies more user-friendly. Individuals can purchase cryptocurrencies on exchanges for traditional government-issued money like the U.S. dollar (see Figure 3 ) or other cryptocurrencies, or they can earn them by doing work for the cryptocurrency platform. Many digital currency platforms use blockchain technology to validate changes to the ledgers. In a blockchain-enabled system, payments are validated on a public or distributed ledger by a decentralized network of system users and cryptographic protocols. In these systems, parties that otherwise do not know each other can exchange something of value (i.e., a digital currency) because they trust the platform and its protocols to prevent invalid changes to the ledger. Cryptocurrency advocates assert that a decentralized payment system operated through the internet could be faster and less costly than traditional payment systems and existing infrastructures. Whether such efficiencies can or will be achieved remains an open question. However, the potential for increased payment efficiency from these systems is promising enough that certain central banks have investigated the possibility of issuing government-backed, electronic-only currenciesâcalled central bank digital currencies (CBDCs)âin such a way that the benefits of certain alternative payment systems could be realized with appropriately mitigated risk. How CBDCs would be created and function are still matters of speculation at this time, and the possibility of their introduction raises questions about central banks' appropriate role in the financial system and the economy. Whether cryptocurrencies are appropriately regulated is an open question. Cryptocurrency proponents argue that regulation should not stifle the development of a potentially beneficial payment system, while opponents argue that regulation should protect against criminals using cryptocurrency to evade or hide their activities from authorities, or consumers potentially suffering losses from an untested technology. For anti-money laundering purposes, cryptocurrency regulation occurs at the exchanges that allow people to buy and sell cryptocurrencies either for government-backed fiat currencies or other cryptocurrencies. Generally, these exchanges must register as money transmitters at the state level and must report to the U.S. Treasury's Financial Crimes Enforcement Network as money services businesses at the federal level, and are subject to the applicable anti-money laundering requirements those types of companies face. However, cryptocurrency critics warn that their pseudonymous, decentralized nature nevertheless provides a new avenue for criminals to launder money, evade taxes, or sidestep financial sanctions. Consumer groups and other commentators are also concerned that digital currency users are inadequately protected against unfair, deceptive, and abusive acts and practices. The way cryptocurrencies are sold, exchanged, or marketed can subject cryptocurrency exchanges or other cryptocurrency-related businesses to generally applicable consumer-protection laws, and certain state laws and regulations are being applied to cryptocurrency-related businesses. However, other laws and regulations aimed at protecting consumers engaged in electronic financial transactions may not apply. For example, the Electronic Fund Transfer Act of 1978 (EFTA; P.L. 95-630 ) requires traditional financial institutions engaging in electronic fund transfers to make certain disclosures about fees, correct errors when identified by the consumer, and limit consumer liability in the event of unauthorized transfers. Because no bank or other centralized financial institution is involved in digital currency transactions, EFTA generally has not been applied to these transactions. Finally, some central bankers and other experts and observers have speculated that widespread cryptocurrency adoption could affect the ability of the Federal Reserve and other central banks to implement and transmit monetary policy, if one or more additional currencies that were not subject to government supply controls were also prevalent and viable payment options. For more information on these issues, see CRS Report R45427, Cryptocurrency: The Economics of Money and Selected Policy Issues , by David W. Perkins; CRS Report R45116, Blockchain: Background and Policy Issues , by Chris Jaikaran; and CRS Report R45664, Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals , by Jay B. Sykes and Nicole Vanatko. Financial innovation in capital markets has generated new forms of fundraising for firms, including crowdfunding and initial coin offerings . Crowdfunding involves raising funds by soliciting investment or contributions from a large number of individuals, generally through the internet. Initial coin offerings (ICO) raise funds by selling digital coins or tokensâgenerally created and transferred using blockchain technologyâto investors; the coins or tokens allow investors to access, make purchases from, or otherwise participate in the issuing company's platform, software, or other project. In cases where crowdfunding and ICOs meet the legal definition of a securities offering, they are subject to securities law and regulation by the Securities and Exchange Commission (SEC). Four kinds of crowdfunding exist: (1) donation crowdfunding, where contributors give money to a fundraising campaign and receive in return, at most, an acknowledgment; (2) reward crowdfunding, where contributors give to a campaign and receive in return a product or a service; (3) peer-to-peer lending crowdfunding, where investors offer a loan to a campaign and receive in return their capital plus interest; and (4) equity crowdfunding, where investors buy stakes in a company and receive in return company stocks. Donation and reward crowdfunding are relatively lightly regulated because contributors are in effect giving without expectation of gaining anything of monetary value in return or preordering a product, respectively. Equity crowdfunding may meet the criteria of a securities offering, and in such cases it is subject to SEC regulation, as are certain peer-to-peer lending arrangements in which a security is issued. ICOs are a relatively new approach to raising capital. A typical ICO transaction involves the issuer selling new digital coins or tokensâalso referred to as digital assets or, in cases in which they qualify as securities, digital asset securities âto individual or institutional investors. Investors can often pay in traditional fiat currencies (e.g., U.S. dollars) or cryptocurrencies (e.g., Bitcoin, Ethereum) pursuant to the terms of each individual ICO. ICOs are often compared with the traditional financial world's initial public offerings (IPOs) because both are methods companies use to acquire funding. The main difference is that IPO investors receive an equity stake representing company ownership, rather than a digital asset. Coin or token purchasers can generally redeem the coins for goods or services from the issuing enterprise, or hold them as investments in the hope that their value will increase if the company is successful. Although every ICO is different, issuers are generally able to make transfers without an intermediary or any geographic limitation. Policymakers are now considering whether these new innovations fit well within the existing regulatory framework, or whether the framework should be adapted to address the risks and benefits that they pose. In general, policymakers and regulators have attempted to provide regulatory clarity and investor protection without hindering financial innovation and technological advancements. Currently, equity crowdfunding debates typically involve questions over how broadly crowdfunding exemptions from certain SEC registration requirements should be applied. Generally, public equity offerings, such as stock issuances, involve a number of costs, including paying an investment bank to price the stock and find investors. In addition, the offering must be registered with the SEC and the company must disclose certain information to investors. Crowdfunding may be less costly than traditional public offerings in certain respects and thus might present a new avenue for small businesses without the resources or expertise to complete a traditional IPO to raise funds. In 2012, Title III of the Jumpstart Our Business Startups Act (JOBS Act; P.L. 112-106 ) created an exemption from registration for internet-based securities that made offerings of up to $1 million (inflation-adjusted) over a 12-month period. Certain companies that are still relatively small by some measures may nevertheless not qualify for the exemption, and certain of those companies may find the costs of raising funds through an equity issuance prohibitively high. Title III includes certain investor protection provisions, including limitations on investors' investment amounts and issuer disclosure requirements. However, exempting an issuer from registration may weaken investor protections. Thus, what the appropriate criteria should be to allow an equity crowdfunding issuer to forego registration requirements is a matter of debate. Regarding ICOs, issuers and investors face varying degrees of uncertainty when determining how or if securities laws and regulations apply to them. It may not always be clear whether a digital asset is a security subject to SEC regulation. Meanwhile, ICO and digital asset investorsâwhich may include less-sophisticated retail investors, who may not be positioned to comprehend or tolerate high risksâmay be especially vulnerable to new types of fraud and manipulation, leading to questions about whether investor protections in this area are adequate. There appear to be high levels of ICO scams and business failures. For example, one 2018 study from the ICO advisory firm Satis Group found that 81% of ICOs are scams and another 11% fail for operational reasons. Digital assets may be an attractive method for scammers since transactions in digital assets do not have the same protections as traditional transactions. For example, banks can delay, halt, or reverse suspicious transactions and link transactions with user identity, while many digital asset transactions are generally irreversible. The SEC has taken initiatives to address some of these issues. In September 2017, the SEC established a new Cyber Unit and increased its monitoring of and enforcement actions against entities engaged in digital asset transactions. Since that time, the SEC has increased the frequency of enforcement actions against issuersâthe end recipients of ICO fundingâas well as market intermediaries (i.e., broker-dealers and investment managers). In addition to the enforcement activities against entities for noncompliance with securities regulations, the SEC has obtained court orders to halt allegedly fraudulent ICOs. For more information on these issues, see CRS Report R46208, Digital Assets and SEC Regulation , by Eva Su; CRS Report R45221, Capital Markets, Securities Offerings, and Related Policy Issues , by Eva Su; and CRS Report R45301, Securities Regulation and Initial Coin Offerings: A Legal Primer , by Jay B. Sykes. Although, there is no universal legal or regulatory definition of high-frequency trading (HFT), the term generally refers to a subset of algorithmic trading in financial instruments, such as equity securities, derivatives, and cryptocurrencies, that is conducted by supercomputers executing trades within microseconds or milliseconds. It has grown substantially over the past 15 years and currently accounts for roughly 50% to 60% of the trading volume in domestic equity markets. Depending on trading strategy and market conditions, evidence suggests that HFT in some cases can have either certain positive effects on market quality (e.g., increased liquidity, smaller spreads, decreased short-term volatility, and improved price discovery) or certain negative effects (e.g., decreased liquidity, higher volatility, and higher transaction costs for certain investors). Generally, traders who employ HFT strategies are attempting to earn a small profit per trade on a huge number of trades. This is achieved through automated trading by computers programmed to execute certain kind of trades in response to specific market data and involves rapid order placement. Broadly speaking, these strategies can be categorized as passive or aggressive strategies. Passive strategies include arbitrage trading âattempts to profit from price differentials for the same stocks or their derivatives traded on different trading venues; and passive market making , in which profits are generated by spreads between the difference or the spread between the prices at which securities are bought and sold. Aggressive strategies include those known as order anticipation or momentum ignition strategies. Regulators have been scrutinizing HFT practices for years. The SEC oversees HFT and other trading in the securities markets and the more limited securities-related derivatives markets that it regulates. The CFTC oversees any HFT, along with other types of trading, in the derivatives markets it regulates. These markets include futures, swaps, and options on commodities and most financial instruments or indices, such as interest rates. HFT's supporters argue that by quickly executing many trades, often in response to a perceived price inefficiency, HFT improves market quality in a number of ways. Surveys of empirical research suggest that in both equity and foreign exchange markets, HFT appears to have narrowed bid-ask spreads, bolstered market liquidity, reduced some measures of price volatility, and improved the price discovery process. Some commentators argue that HFT is just the latest technological innovation in a financial activity that has a long history of coevolution with technology, and that market participants and regulators are well practiced at incorporating such innovations. Some studies suggest, however, that aggressive HFT strategies should be a matter of public policy concern. Such strategies arguably share similarities to practices such as front-running (when an entity conducts a securities trade while knowing of a future transaction that will have an effect on the price of the securities being traded) and spoofing (offering to buy or sell securities with an intent to cancel the bid or offer before execution), both of which can be illegal. In addition, regulators have expressed concerns over whether certain aggressive HFT strategies may be associated with increased market fragility and volatility, such as that demonstrated in the Flash Crash of May 6, 2010, in which the Dow Jones Industrial Average (DJIA) fell by roughly 1,000 points (and then rebounded) in intraday trading. Arguably the most ambitious market surveillance project in SEC history, the ongoing implementation of Consolidated Audit Trail (CAT) is a direct response to the perceived dearth of market data available during the regulatory analysis of the Flash Crash's causes and the role HFT traders played during that event. First approved by the SEC in 2012, CAT is planned as a single data repository that will consolidate trade orders, trade quotes (the most recent prices at which a trade on a particular stock was executed), and general trade data across domestic equities and options markets. According to then-SEC Chair Mary Jo White, by virtue of CAT \"[R]egulators will have more timely access to a comprehensive set of trading data, enabling us to more efficiently and effectively conduct research, reconstruct market events, monitor market behavior, and identify and investigate misconduct.\" The system, which has raised some cybersecurity concerns, has also earned prospective praise as a tool that will make HFT more transparent, broadening what the SEC will be able to see as it surveils such trades. CAT phase-in began in late 2019, and it is projected to be fully operational in 2022. Policymakers have taken a number of other actions in recent years to address concerns related to HFT. Whether these strike the appropriate balance between fostering HFT's potential benefits while appropriately mitigating risks associated with it is an open question. For example, the SEC and CFTC have either approved or not opposed requests by several securities exchanges (including the NYSE American, the IEX, and the gold and silver futures markets at ICE Futures U.S.) to adopt trading delay mechanisms aimed at removing HFT traders' speed advantages. For more information on these issues, see CRS Report R44443, High Frequency Trading: Overview of Recent Developments , by Rena S. Miller and Gary Shorter; and CRS Report R43608, High-Frequency Trading: Background, Concerns, and Regulatory Developments , by Gary Shorter and Rena S. Miller. Asset management companies pool money from various individual or institutional investor clients and invest the funds on their behalf for financial returns. The SEC is the asset management industry's primary regulator. The asset management industry is increasingly using fintech to conduct investment research, perform trading, and enhance its client services. A prominent example is the proliferation of robo - advisor services, in which automated programs give investment advice to clients. There is also potential to apply artificial intelligence and machine learning within asset management, both in robo-advisory services and other functions such as risk management, regulatory compliance, and trading and portfolio management. Another notable development in the industry is that some large, prominent technology companies have begun to offer asset management services and partner with incumbent asset managers. The term robo adviser generally refers to an automated digital investment advisory program offering asset management services to clients through online algorithmic-based platforms, such as websites or mobile applications. The main differences between human and robo advisers are the amount of human interaction available to investors and the reliance on algorithmic-based platforms for providing financial advice. The potential benefit of this technology is that robo advisers may be able to serve more customers at lower costs than human advisors, thus potentially enabling more affordable consumer access to investment advisory services. Robo advising is a fast-growing segment of the investment management industry. According to one report, direct-to-consumer robo-advisory platforms reached $257 billion in size at the end of 2018 and are projected to have $1.26 trillion in assets under management by 2023. As mentioned above, big tech firms like Amazon, Facebook, Google, and Apple have started financial services operations as potential competitors and partners to the asset management industry. These types of companies could provide investment management through their widely used platforms, potentially disrupting the asset management industry. The potential of big tech asset management platforms has already been realized in certain overseas markets. For example, Ant Financial, an affiliate of Alibaba Group, now manages the world's largest money market mutual fund of $168 billion as of year-end 2018, with a third of the Chinese population, or 588 million Alipay users, already invested in the fund. In general, robo advisers present similar policy issues as all asset managers do related to striking the right balance between protecting investors and mitigating risks while allowing for innovation, appropriately informed risk taking, and financial returns. However, robo advising could also present additional policy considerations. Some observers have expressed concerns that robo advisers may cause risks and excess volatility if they result in herding , in which very large numbers of investors are all directed to the same investments at the same time. AI- or machine learning-enabled robo advising could also be subject to policy concerns related to black box algorithm-based decisionmaking, wherein it is not entirely clear how computer programs have assessed risks or arrived at decisions, and so are effectively unexplainable and unauditable. Some observers are also concerned about the assignment of responsibilities when large losses in an AI-recommended investment occur. For example, questions surround how to assign blame if an investment loss occurred through an AI-based systemâshould the designer of the AI system or the investment manager incorporating its use bare the blame and penalty? If asset management continues to become increasingly automated, policymakers may weigh these risks and concerns against possible benefits, such as reduced cost and increased access. Fintech's application to insurance offers a similar potential transformation in the insurance industry as in other aspects of financial services. Fintech could affect insurance throughout the business, including insurance products, underwriting, claims, and marketing, and across all lines of insurance (life, health, and property and casualty [P&C]). Potential aspects of insurtech include peer-to-peer insurance, Big Data, artificial intelligence, blockchain, mobile technology, and insurance on demand. Specific examples could include life or health insurers offering discounts for people wearing devices that track activity and fitness; auto insurers offering discounts for cars that include telematics devices tracking drivers' behavior; and insurers scanning social media as an underwriting tool or to detect fraud. In 2017, the fastest-growing P&C insurer by direct premiums written was an auto insurer, Metromile Insurance, offering per-mile insurance with a telematics tracker. In 2018, the fastest-growing P&C insurer was Root Insurance, also a telematics-based auto insurer, and the second-fastest growing was Lemonade Insurance, a homeowners and renters insurer using technology like chatbots and AI to sell and service policies. Unlike banks or securities firms, the primary regulators for insurers are the individual states. An insurer is required to obtain a charter or license in every state in which it operates. The states coordinate insurance regulatory policies through the National Association of Insurance Commissioners (NAIC) and have been active in addressing issues raised by technology. In 2017, NAIC created an NAIC Insurance and Technology task force and adopted a model law relating to insurer data security. A U.S. Department of the Treasury report specifically encouraged states to adopt the model law and, as of August 4, 2019, seven states had adopted the model with another state considering adoption. All 50 state insurance regulators have identified a specific point of contact for \"InsurTech, Innovation & Technology\" in order to introduce the regulatory process for new entrants. The state regulatory system for insurance originated following a Supreme Court decision in 1868, but since a further decision in 1944, its foundation has been statutory, not constitutional. The 1945 McCarran-Ferguson Act generally provides for a state-based system, but Congress can enact laws overriding the states and has done so on a number of occasions. Congress has also conducted oversight on specific aspects of the insurance regulatory system and encouraged the states to act on issues without enacting specific statutes at the federal level. Given the breadth of technology's potential impact on insurance, Congress might question numerous aspects of the states' approach to the new technology, including the impact on consumers and the potential for regulatory arbitrage between the federal regulatory approach for banks and securities firms and the state regulatory approach for insurers. Risk-management and compliance functions in financial firms frequently rely on data analysis to assess the risk of bad outcomes, such as wrongdoing or financial losses. For example, in anti-money laundering compliance, financial firms are required to file suspicious activity reports (SARs) when transactions by a customer appear potentially to be tied to illicit crime, fraud, money laundering, terrorist financing, or other transgressions. In addition, banks may also be subject to requirements involving stress testing, modeling risks, forecasting, and monitoring employees and internal risk (e.g., the probability that a risky trade under consideration could imperil a bank's capital or liquidity positions). Regulators also must monitor for certain risks or unfolding events (e.g., securities markets regulators trying to detect illegal trading practices). Companies are increasingly using innovative technology in these risk management and regulatory compliance activities. Sometimes in the latter case, the technology is referred to as regtech . Algorithms are especially well suited to sifting through, analyzing, and identifying patterns in large data sets, and so potentially could be used in these risk assessment and compliance functions. Algorithms' increased sophistication and the development of machine learning and artificial intelligence have fueled strong interest in the financial industry in further using these technologies to automate risk-management and compliance functions. For example, FINRA predicts that such tools will help with anti-money laundering processes; surveilling internal firm employees involved in placing trades on a firm's behalf; broker-dealer trade execution for customers; ensuring customer data privacy and preventing security risks; and centralizing supervisory control systems for additional risk management. In large part, the goal of cost savings is driving the development and adoption of automation in compliance. Some financial firms argue that because they are relatively more regulated than firms in other industries, they must deploy automation wherever possible to reduce compliance costs and remain profitable and competitive. Certain industry observers predict that the cost of processes that involve prediction will drop in coming years and the accuracy of automated prediction processes will continue to increase. However, exactly how these technologies will develop and be deployed in regulatory compliance, and what outcomes they will produce if deployed, remains to be seen. The possibility that automation's ability to identify risks and suspect behaviors may surpass that of humans in certain cases raises questions over the role and power existing human compliance officials should have in deciding whether to take actions against individuals or institutions. While automation could more efficiently collect and act on information, individuals may be uncomfortable that their transactions and private information could be instantly reported to the government or their financial situation affected through a process that involved no human judgement or oversight. For example, should a human have to file a SAR about a customer to the Treasury Department, or should the filing of such reports be completely automated? To take this example a step further, should the decision to close a customer's account be fully automated as well? Regtech tools also raise similar privacy and cybersecurity risks as the other technologies discussed in this report. After all, certain regtech programs involve the automated monitoring of individuals' and private companies' financial transactions, flagging some of those transactions as suspicious, and reporting those transactions to government agencies. Policymakers may consider under what circumstances certain regtech processes inappropriately impinge on people's privacy. To the extent that certain processes or functions can be automated to achieve greater regulatory efficiency or effectiveness, questions exist concerning whether regulators need to be more active in deploying compliance technologies themselves and allowing the institutions they regulate to do so. For example, the American Bankers Association lists \"regulator buy-in\" as one of the challenges to such adoption. Given that most of the federal financial regulatory framework was created prior to the development and deployment of many recent technologies, fintech companies often face uncertainty over howâor whetherâexisting federal laws and regulations may apply to them or their products. Thus, policymakers may consider ways to reduce regulatory uncertainty and integrate fintech into the regulatory framework. This often involves balancing efforts to encourage innovation while protecting consumers and the financial system from excessive risk. Many still-evolving terms are used to describe different programs regulators have implemented or proposed to address fintech uncertainty. Such programs are often informally called sandboxes or greenhouses . Generally, such programs use at least one of a variety of approaches. One such approach involves fostering communication between fintech firms and regulators. Communication can help these firms better understand how regulators view a developing technology and potential regulatory concerns. Communication also helps make regulators aware of new fintech innovations when developing new or interpreting existing regulations. As discussed below, certain regulators have established offices within their organizations to conduct outreach to fintechsâincluding maintaining outreach websites, participating in fintech conferences, and organizing office hours with fintech firms. In another approach, some regulators have announced research collaborations with fintech firms to improve their understanding of new products and technologies. Such initiatives could include jointly designing a research trial or fintech firms sharing data about their product performance with regulators. Another potential approach policymakers may use if they determine that particular regulations are unnecessarily burdensome or otherwise ill-suited to a particular technology is to exempt companies or products that meet certain criteria from such regulations. Similarly, a regulator could issue a no-a ction letter âan official communication stating a regulator does not expect to take enforcement actions in certain situations. Regulators will often only provide such special regulatory treatment to companies that first demonstrate that consumers will not be exposed to undue harm or meet other conditions, like agreeing to share data with regulators for research purposes. Regulatory uncertainty can be resolved if regulators offer or require certain fintech firms to enter a regulatory regime with well-defined permissions, restrictions, and responsibilities. For example, a regulator could offer or require a specific charter or license for certain firms. Financial regulators have begun to implement some of these approaches through a number of rulemakings and by establishing programs and offices and taskforces within agencies. For a detailed examination of these initiatives, see CRS Report R46333, Fintech: Overview of Financial Regulators and Recent Policy Approaches , by Andrew P. Scott. The regulatory approaches described above could be supported or opposed by various stakeholders depending on how they are designed and implemented and which firms or products are affected. For example, while fintech firms may want to reduce regulatory uncertainty and operate under one set of rules nationally (rather than different rules in each state), they may also oppose new or additional data-reporting requirements. Incumbent financial institutions may argue that regulatory tailoring and exemptions for fintech firms would put incumbents at a competitive disadvantage. State regulators and consumer advocates may oppose any federal charter that would preempt state consumer-protection laws. Congress or financial regulators may consider various regulatory approaches. Policymakers choosing to tailor regulation for fintechs could apply a different regulatory treatment either to companies or to products. If the goal is to provide new, inexperienced firms an opportunity to learn how they and their products would be regulated, institution-based regulation for firms meeting criteria associated with start-up companies may be the better option. But if the goal is to integrate a new technology regardless of the size or sophistication of the firm offering it, the differentiated regulatory treatment could apply to the product rather than the firm. Policymakers could also choose to tailor regulation for fintechs meeting certain objective criteria. Alternatively, regulators could use discretion in determining which fintech companies or products would qualify for such tailoring, potentially based on authorities or directions enacted in legislation. Policymakers may also consider how long to apply a particular regulatory treatment to a fintech company or product. For example, a specific charter could last indefinitely, while an exemption or no-action letter might last for only a finite period. For more information on these issues, see CRS Report R46333, Fintech: Overview of Financial Regulators and Recent Policy Approaches , by Andrew P. Scott; and CRS In Focus IF11195, Financial Innovation: Reducing Fintech Regulatory Uncertainty , by David W. Perkins, Cheryl R. Cooper, and Eva Su. Cybersecurity CRS Report R44429, Financial Services and Cybersecurity: The Federal Role , by N. Eric Weiss and M. Maureen Murphy. CRS Report R45631, Data Protection Law: An Overview , by Stephen P. Mulligan, Wilson C. Freeman, and Chris D. Linebaugh. CRS In Focus IF10559, Cybersecurity: An Introduction , by Chris Jaikaran. Lending CRS Report R44614, Marketplace Lending: Fintech in Consumer and Small-Business Lending , by David W. Perkins. CRS Report R45726, Federal Preemption in the Dual Banking System: An Overview and Issues for the 116th Congress , by Jay B. Sykes. Payments CRS Report R45927, U.S. Payment System Policy Issues: Faster Payments and Innovation , by Cheryl R. Cooper, Marc Labonte, and David W. Perkins. CRS Report R45716, The Potential Decline of Cash Usage and Related Implications , by David W. Perkins. Banks and Third-Party Vendor Relationships CRS In Focus IF10935, Technology Service Providers for Banks , by Darryl E. Getter. Cryptocurrency and Blockchain-Based Payment Systems CRS Report R45427, Cryptocurrency: The Economics of Money and Selected Policy Issues , by David W. Perkins. CRS Report R45116, Blockchain: Background and Policy Issues , by Chris Jaikaran. CRS Report R45664, Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals , by Jay B. Sykes and Nicole Vanatko. CRS In Focus IF10824, Financial Innovation: \"Cryptocurrencies\" , by David W. Perkins, Financial Innovation: \"Cryptocurrencies\", by David W. Perkins. Digital Assets and Capital Formation CRS Report R46208, Digital Assets and SEC Regulation , by Eva Su. CRS Report R45221, Capital Markets, Securities Offerings, and Related Policy Issues , by Eva Su. CRS Report R45301, Securities Regulation and Initial Coin Offerings: A Legal Primer , by Jay B. Sykes. CRS In Focus IF11004, Financial Innovation: Digital Assets and Initial Coin Offerings , by Eva Su. High-Frequency Securities and Derivatives Trading CRS Report R44443, High Frequency Trading: Overview of Recent Developments , by Rena S. Miller and Gary Shorter. CRS Report R43608, High-Frequency Trading: Background, Concerns, and Regulatory Developments , by Gary Shorter and Rena S. Miller. Regulatory Approaches and Issues for Congress CRS Report R46333, Fintech: Overview of Financial Regulators and Recent Policy Approaches , by Andrew P. Scott. CRS In Focus IF11195, Financial Innovation: Reducing Fintech Regulatory Uncertainty , by David W. Perkins, Cheryl R. Cooper, and Eva Su.", "summary": "Advances in technology allow for innovation in the ways businesses and individuals perform financial activities. The development of financial technologyâcommonly referred to as finte c h âis the subject of great interest for the public and policymakers. Fintech innovations could potentially improve the efficiency of the financial system and financial outcomes for businesses and consumers. However, the new technology could pose certain risks, potentially leading to unanticipated financial losses or other harmful outcomes. Policymakers designed many of the financial laws and regulations intended to foster innovation and mitigate risks before the most recent technological changes. This raises questions concerning whether the existing legal and regulatory frameworks, when applied to fintech, effectively protect against harm without unduly hindering beneficial technologies' development. The underlying, cross-cutting technologies that enable much of fintech are subject to such policy trade-offs. The increased availability and use of the internet and mobile devices could offer greater convenience and access to financial services, but raises questions over how geography-based regulations and disclosure requirements can and should be applied. Rapid growth in the generation, storage, and analysis of dataâand the subsequent use of Big Data and alternative dataâcould allow for more accurate risk assessment, but raises concerns over privacy and whether individuals' data will be used fairly. Automated decisionmaking (and the related technologies of machine learning and artificial intelligence) could result in faster and more accurate assessments, but could behave in unintended or unanticipated ways that cause market instability or discriminatory outcomes. Increased adoption of cloud computing allows specialized companies to handle technology-related functions for financial institutions, including providing cybersecurity measures, but this may concentrate financial cyber risks at a relatively small number of nonfinancial companies who may not be entirely comfortable with their regulatory obligations as financial institution service providers. Concerns over cyber risks and whether adherence to cybersecurity regulations ensure appropriate safeguards against those risks permeate all fintech developments. Fintech deployment in specific financial industries also raises policy questions. The growth of nonbank, internet lenders could expand access to credit, but industry observers debate the degree to which the existing state-by-state regulatory regime is overly burdensome or provides important consumer protections. As banks have increasingly come to rely on third-party service providers to meet their technological needs, observers have debated the degree to which the regulations applicable to those relationships are unnecessarily onerous or ensure important safeguards and cybersecurity. New consumer point-of-sale systems and real-time-payments systems are being developed and increasingly used, and while these systems are potentially more convenient and efficient, there are concerns about the market power of the companies providing the services and the effects on people with limited access to these systems. Meanwhile, cryptocurrencies allow individuals to make payments entirely outside traditional financial systems, which may increase privacy and efficiency but creates concerns over money laundering and consumer protection. Fintech is providing new avenues to raise capitalâincluding through crowdfunding and initial coin offeringsâand changing the way companies trade securities and manage investments and may increase the ability to raise funds but present investor protection challenges. Under statute passed by Congress, insurance is primarily regulated at the state level where agencies are considering the implications to efficiency and risk that fintech poses in that industry, including peer-to-peer insurance and insurance on demand. Finally, firms across industries are using fintech to help them comply with regulations and manage risk, which raises questions about what role finetch should play in these systems. Regulators and policymakers have undertaken a number of initiatives to integrate fintech in existing frameworks more smoothly. They have made efforts to increase communication between fintech firms and regulators to help firms better understand how regulators view a developing technology, and certain regulators have established offices within their organizations to conduct outreach. In another approach, some regulators have announced research collaborations with fintech firms to improve their understanding of new products and technologies. If policymakers determine that particular regulations are unnecessarily burdensome or otherwise ill-suited to a particular technology, they might tailor the regulations, or exempt companies or products that meet certain criteria from such regulations. In some cases, regulators can do so under existing authority, but others might require congressional action.", "document_type": "crs"}
{"report": "In total, 59 major disasters were declared in calendar year 2018 under the authority of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5121 et seq., henceforth the Stafford Act). As of May 23, 27 major disasters have been declared in calendar year 2019. In addition to these specifically declared disasters, other situations arose that caused disruption to lives, economic resources, and infrastructure. In some of these cases, a Stafford Act declaration may not have been provided or even sought. Together, these incidents, and ongoing recovery efforts from previous disasters, drove a demand for additional federal budgetary resources beyond those provided in regular annual appropriations. This demand is usually reflected in one or more requests by the Administration for supplemental appropriations after the incident (or incidents) have occurred and the need for funding is apparent. The Trump Administration did not make a formal request for supplemental appropriations for disaster assistance for FY2019. However, congressional leadership in both the House and Senate chose to initiate consideration of disaster-related supplemental appropriations at the end of the 115 th Congress. Consideration continued into the 116 th Congress, until a $19.19 billion supplemental appropriations measure was enacted in June 2019. This report provides a legislative history of the Additional Supplemental Appropriations for Disaster Relief Act, 2019 ( P.L. 116-20 ), and provides an overview of some of the issues that often arise with consideration of supplemental disaster assistance appropriations. At the beginning of FY2019, several annual appropriations bills remained unresolved. By December 2018, five regular appropriations measures had become law; the activities funded under the remaining seven regular appropriations bills were instead funded under two continuing resolutions (CRs) lasting through December 7, 2018, and December 21, 2018, respectively. Although there had been discussions in some quarters about the need for supplemental appropriations for disaster assistance, no request for such appropriations had been forthcoming from the Administration. The debate on continuing appropriations would provide the first attempted floor vehicle for FY2019 disaster supplemental appropriations. In the Senate, a third CR for FY2019, lasting until February 8, 2019 ( H.R. 695 ) was passed by voice vote on December 19, 2018. The House subsequently considered and amended the bill the following day, adding additional funding, including $7.8 billion for disaster assistance. The amended measure passed the House by a vote of 217-185, and was sent back to the Senate for further consideration. On December 21, the Senate agreed to a motion to proceed to the consideration of the House-passed bill by a vote of 48-47, with Vice President Pence casting the tie-breaking vote. In the absence of a 60-vote majority to invoke cloture, H.R. 695 was not considered further, and the House and Senate adjourned later that day. When the second CR, providing funding for the agencies, programs, and activities covered by the remaining seven appropriations bills, expired at midnight on December 21, funding lapsed and a partial government shutdown ensued. The 115 th Congress subsequently adjourned sine die on January 3, 2019, and the 116 th Congress took office the same day. On January 8, 2019, House Appropriations Committee Chairwoman Nita Lowey introduced H.R. 268 , a measure that would have provided disaster relief supplemental funding and would have temporarily resolved the partial government shutdown by providing for a continuing resolution through February 8. The House took up the bill on January 16, 2019, and after adopting several amendments, passed the bill by a vote of 237-187 that same day. CBO estimated the discretionary spending in the supplemental appropriations proposal for FY2019 as $14.19 billion. The Senate proceeded to consideration of the bill on January 22, 2019, by unanimous consent. Amendments were offered by Majority Leader McConnell for Senate Appropriations Committee Chairman Richard Shelby ( S.Amdt. 5 ) and Senate Minority Leader Chuck Schumer ( S.Amdt. 6 ) that same day. On January 24, 2019, separate attempts to invoke cloture on both of these alternatives were unsuccessful. The partial government shutdown was subsequently ended through the enactment of a separate measure ( H.J.Res. 28 , providing for continuing appropriations through February 15). On March 14, the Senate returned to consideration of H.R. 268 . Cloture on the motion to proceed to consideration of the measure was invoked in the Senate, 90-10, on March 26, and the measure was laid before the Senate on March 28. On the same day, Chairman Shelby offered a substitute amendment ( S.Amdt. 201 ), providing $13.45 billion for disaster relief. Attempts to invoke cloture on both S.Amdt. 201 and H.R. 268 on April 1, 2019, were unsuccessful. On April 9, 2019, Chairwoman Lowey introduced H.R. 2157 , a supplemental appropriations bill, to provide funding for previous disasters as well as additional disasters that had occurred since the earlier House passage of H.R. 268 . CBO estimated the bill as introduced included $17.31 billion in discretionary spending, a figure which grew to $19.26 billion through floor action. The bill passed the House on May 10, 2019, by a vote of 257-150. A bipartisan, bicameral agreement on FY2019 disaster funding was negotiated prior to Senate consideration. After the Senate agreed to proceed to the consideration of H.R. 268 on May 23, Senator McConnell offered S.Amdt. 250 to H.R. 2157 as a substitute on behalf of Senator Shelby. The amendment was agreed to by unanimous consent, and the amended bill was passed, 85-8. Three attempts to approve the amended bill by unanimous consent were blocked in the House of Representatives while the body was in pro forma session during the Memorial Day recess. The House subsequently considered the bill under suspension of the rules on June 3, and voted 354-58 to approve the measure. The bill was signed into law as P.L. 116-20 on June 6, 2019. Congressional clients seeking further insight into specific programs and provisions in P.L. 116-20 may consult the analysts and background reports listed in CRS Report R45714, FY2019 Disaster Supplemental Appropriations: CRS Experts . Table 1 details the disaster supplemental appropriations proposed by senior party leadership or enacted for FY2019, organized by appropriations subcommittee of jurisdiction. The table only displays amounts for which an appropriations level was specified in bill text. It does not display amounts for which an indefinite or unspecified amount was appropriated. In addition, the table does not display the amount appropriated to Medicaid in P.L. 116-20 , because a portion of that appropriation was unspecified. Many appropriations provided in P.L. 116-20 are available until expended, which is not uncommon for disaster assistance. However, a number of supplemental appropriations in the measure have a limited term of availability, including Grant funding through the Department of Agriculture in general provisions for several purposes (available through FY2020); National Oceanic and Atmospheric Administration appropriations for \"Operations, Research, and Facilities\" (through FY2020) and \"Procurement, Acquisition and Construction\" (through FY2021); U.S. Coast Guard appropriations for \"Operations and Support\" (through FY2020) and \"Procurement, Construction and Improvements\" (through FY2023); National Park Service \"Historic Preservation Fund\" appropriations (through FY2022); Forest Service \"Wildland Fire Management\" appropriations (through FY2022); Department of Labor Employment and Training Administration \"Training and Employment Services\" appropriations (through FY2020); Department of Health and Human Services appropriations (through FY2021, except for the \"Public Health and Social Services Emergency Fund\" which is available through FY2020); Department of Education \"Hurricane Education Recovery\" appropriations (through FY2020); Military Construction appropriations (through FY2023); and Department of Veterans Affairs \"Medical Facilities\" appropriations (through FY2023). The last line of Table 1 references CBO's total discretionary score of the bill for FY2019, rather than a total of the elements in the table. Since the mid-20 th century, federal law has established a role for the federal government in supporting state and local governments in disaster response and recovery. Congress has the constitutional responsibility to exercise the \"power of the purse\" in making decisions on funding this role in regular annual appropriations, and through supplemental appropriations when necessary. Traditionally, such funding is requested by the Administration. The development of P.L. 116-20 was uncommon, in that the House and Senate developed this measure in the absence of a formal supplemental appropriations request from the Administration for disaster funding. In the process of exercising this constitutional authority, a number of issues frequently reemerge in congressional debate: The relative timeliness of supplemental appropriations; The proper scope of a supplemental appropriations measure; How exemptions from discretionary budget limits enable investments in disaster relief, and whether such exemptions are properly structured; Proposals to offset some or all of the proposed disaster relief spending; How quickly relief and recovery funding will be made available; How Congress can ensure that the funding provided is not spent on wasteful or fraudulent endeavors. Congressional offices often express an interest in the average time it has taken for past supplemental disaster assistance appropriations to be enacted after a significant disaster. This seemingly simple question lacks a meaningful answer for a variety of reasons. There are significantly fewer supplemental appropriations measures than declared disastersâdisaster response and recovery efforts do not always require federal funding beyond regular annual appropriations. Appropriations for recovery from a disaster may come in multiple appropriations measures over the course of several years. Furthermore, a single supplemental appropriations act may meet response or recovery needs generated by multiple disasters. Table 2 illustrates this situation, showing information on Stafford Act major disaster declarations and public laws with supplemental disaster assistance appropriations, by calendar year. From the beginning of 2011 through 2018, there were 977 declarations under the Stafford Act, including 461 major disasters. Of those major disaster declarations, 76 were associated with 17 catastrophic events. In that same time period, there have been 12 public laws enacted with supplemental appropriations expressly for disaster assistanceâfour of which were enacted in calendar years 2017 and 2018. As Table 2 shows, there are many more disaster declarations than supplemental measures. Given the lack of one-to-one alignment, the time from a single incident to a single supplemental appropriations measure does not provide meaningful data for calculating an average of how long it takes after a specific disaster to get a supplemental appropriations measure enacted. The 2017 hurricane season provides an example of how the comparative rarity of supplemental measures as opposed to disasters complicates calculating the time from a disaster to supplemental appropriations, and can generate meaningless results for developing an average: The first of the three supplemental appropriations measures that directly supported response and recovery for Hurricanes Harvey, Irma, and Maria, P.L. 115-56 , included funding for the Disaster Relief Fund (DRF), Small Business Administration disaster loans, and the Department of Housing and Urban Development's (HUD's) Community Development Block Grant Disaster Recovery program (CDBG-DR). This initial measure was enacted on September 8, 2017, 14 days after Harvey made landfall, 2 days after Irma affected Puerto Rico and the U.S. Virgin Islands, and 12 days before Maria struck Puerto Rico. The second, P.L. 115-72 , was enacted on October 26, 2017, seven weeks after the first. The third, P.L. 115-123 , was enacted on February 9, 2018, five months after the initial measure. Each of these acts included a different range of programs, with the third addressing the largest range of programs. This scenario leaves some questions without definitive answersâsuch as, which supplemental appropriations bills should be associated with which disasters for calculating the speed of congressional response? It also demonstrates that comparison of these lengths of time has limited meaning in some cases. For example, the shorter time between Hurricane Irma and the supplemental appropriations as opposed to Hurricane Harvey and the supplemental appropriations is happenstance, rather than a meaningful difference in how Congress and the Administration approached the relief process. The development and enactment of supplemental appropriations legislation is also affected by the same legislative rhythms that affect the timing of other legislation. Disaster assistance supplemental appropriations may move more quickly at some times than others, given the legislative environment. They may move on their own or they may be included in a variety of legislative vehicles. Continuing appropriations measures and consolidated appropriations measures (which include multiple appropriations bills) frequently serve as vehicles for supplemental appropriations toward the end of the fiscal year or soon after. For example, P.L. 114-223 , a continuing resolution for FY2017 in a consolidated appropriations act, included a $500 million supplemental appropriation for HUD's Community Development Block Grant-Disaster Recovery (CDBG-DR) program targeting major disasters declared prior to the enactment of the measure in calendar 2016. High-priority authorizing legislation may also prove to be a convenient vehicle. For example, Division I of the FAA Reauthorization Act ( P.L. 115-254 ) included a $1.68 billion supplemental appropriation for CDBG-DR, targeting areas impacted by major disasters declared in calendar 2018. An Administration request for supplemental disaster assistance can be an additional factor in the timing of the congressional consideration of supplemental appropriations. In the wake of a significant disaster, individual Members of Congress or state or regional delegations with affected constituencies may put forward supplemental appropriations legislation independent of a request from the Administration. However, unless they are crafted in consultation with majority party leadership, these measures are rarely taken up. The development of a supplemental appropriations measure destined for enactment usually begins with a supplemental appropriations request from the Administration, and a response from the Appropriations Committee or leadership. The request provides a starting point for congressional deliberations, framing the stated needs of the federal government at large for Congress to consider. For disasters that occurred in 2017, a series of three requests came from the Administration, and in each case, a supplemental appropriations measure was initiated and subsequently enacted. In contrast, as was noted above, P.L. 116-20 was enacted without a formal request by the Administration for supplemental disaster assistance appropriations for FY2019. The Budget Control Act of 2011 (BCA; P.L. 112-25 ), passed in the first session of the 112 th Congress as part of a deal to raise the debt limit, placed statutory limits on discretionary spending. The BCA also provided exceptions to those limits for a number of purposes. One such exception was a reiteration of a long-standing exception for funding designated as an emergency requirement. The Budget Enforcement Act of 1990 (BEA; Title XIII of P.L. 101-508 ), and its extensions, established statutory limits on discretionary spending between FY1991 and FY2002. The BEA also provided for an adjustment to these discretionary spending limits to accommodate spending that both the President and Congress designated as an emergency requirement. During this period, this adjustment was frequently used to provide funding for disaster response and recovery. However, it was also used for a broad variety of other purposes, some instances of which sparked debate over whether the designated funding was truly for unanticipated \"emergency\" needs, stoking controversy in some quarters over the potential for abuse. While the BCA included a similar mechanism, it also included a more limited, but specifically defined, adjustment for disaster relief, distinct from emergency funding. The BCA defined \"disaster relief\" as federal government assistance provided pursuant to a major disaster declared under the Stafford Act. Spending limits could be adjusted upward to accommodate funding provided in future spending bills. The allowable adjustment for disaster relief, however, is limited to an amount based on a modified 10-year rolling average of designated major disaster costs. Division O of the Bipartisan Budget Act of 2018 ( P.L. 115-123 ) modified the calculation to incorporate disaster relief appropriations designated as an emergency requirement, which had previously been excluded from the calculation. The allowable adjustment for disaster relief does not act as a limit on federal appropriations for disaster assistanceâonly on the amount of additional budget authority that can be provided pursuant to that provision. When Congress provides more funding for disaster relief than can be covered by the disaster relief adjustment in a given fiscal year, such as was the case for Hurricane Sandy and the 2017 disasters, the emergency designation may be used for such funding. Congress is not unanimous in its support of the disaster relief designation. On March 28, 2019, Senator Mitt Romney introduced an amendment to the Senate majority leadership's substitute for H.R. 268 . The Romney amendment would have eliminated the adjustment for disaster relief in FY2021. In a press statement from his office, Senator Romney said \"It's time for Congress to start planning ahead for natural disasters by including funding for them in the annual budget process, instead of busting our spending limits and adding to our skyrocketing national debt.\" Congress may also choose to provide disaster recovery and relief funding with an emergency designation regardless of the amount of funding provided with a disaster relief designation. For example, all of the funding provided in P.L. 116-20 carried an emergency designation rather than being designated as disaster relief pursuant to the BCA, even though, according to OMB, almost $3 billion of the disaster relief allowable adjustment remained available for use in FY2019 when the bill was enacted. Periodically, Congress has weighed whether some or all of the costs associated with disaster relief and recovery should be offset by cuts to other spending. Historically, this debate has focused on whether disaster relief and recovery funding should be accounted for in the same fashion as other \"on-budget\" discretionary budget authority in general discussions of the budget. Since the passage of the BCA in 2011, the debate has a new aspect, as discretionary spending is constrained by statutory limits. If disaster relief and recovery spending is treated like regular appropriations with respect to the BCA spending capsânot designated as either an emergency or disaster relief, and thus not triggering an upward adjustment of the capsâsuch spending would potentially require an offset to prevent the cap from being breached and triggering sequestration. In most cases between 1990 and 2017, FEMA's DRF generally has been given a priority status for prompt funding in times of need, without offsetting spending reductions. Disaster assistance from other agencies has at times been funded through shifting resources from one program to another through appropriations language, but such activity is relatively rare. The largest single occurrence of this was in the wake of Hurricane Katrina. Nearly four months after $60 billion had been provided to the DRF in the ten days after the storm, P.L. 104-148 rescinded $23.4 billion from the account while simultaneously appropriating a similar amount to other agencies to meet disaster response and recovery needs. On April 4, 2019, during morning business, Senate Budget Committee Chairman Michael Enzi raised the issue of disaster offsets in comments on the Senate floor concerning Senator Romney's amendment to eliminate the disaster relief adjustment: I want to applaud my friend from Utah, Senator Romney, for offering an amendment that recognizes the challenge of budgeting for disasters and emergencies. Disaster relief funding must be built into our base budgets, which is why I have incorporated these costs in recent budget resolutions, including the one that passed through our Budget Committee last week. While there is no silver bullet to this problem, I am willing and eager to work with any of my colleagues who believe there is a better way to anticipate these costs. The Senate Budget Committee recently held a hearing that partially touched on ideas to better budget for disaster funding. One option is to offset emergency spending increases with spending reductions in other areas. Another option could require a dedicated fund for emergencies, similar to how some States budget for these events. I have also considered whether a new actuarially sound insurance program could appropriately assess the risk for such disasters while maintaining affordable premiums. Budgeting for emergencies and disasters is not a precise science, but I believe Congress can do a lot better than just calling an emergency and adding to the debt. Beginning in November 2012 there were calls for supplemental appropriations for Hurricane Sandy relief efforts, as well as calls for offsets. On December 7, 2012, the Obama Administration requested $60.4 billion in supplemental appropriations in connection with Hurricane Sandy, including $11.5 billion for the DRF. The preamble to the request specifically opposed offsetting the cost of the legislation, and although amendments to offset the cost of the legislation were considered in the House and Senate, they were not agreed to. During Senate debate on a supplemental appropriations bill after Hurricane Sandy, a point of order was raised against the emergency designation for $3.4 billion in Army Corps of Engineers Construction appropriation for disaster mitigation projects. A motion to waive the point of order failed to achieve the necessary majority of three-fifths of all Senators, 57-34, so the point of order was sustained, eliminating the emergency designation for that particular appropriation. This meant that the $3.4 billion for the mitigation projects would count against the discretionary spending limits imposed by the BCA, limiting the amount available for other discretionary appropriations. At the time, some observers critical of the move considered this as setting a precedent by effectively requiring an offset for disaster assistance. Others considered this as including part of the cost of disaster preparedness (as opposed to disaster relief) within the regular discretionary budget. All three of the Trump Administration's disaster supplemental appropriations requests have sought an emergency designation for the funding that would be provided in the legislation. However, unlike the Trump Administration's first two requests for supplemental disaster relief funding, the November 2017 request sought to offset some of the additional spending as well, suggesting $14.8 billion in rescissions and spending cuts and $44.4 billion in potential future savings by extending the nondefense discretionary spending limits for two additional years. Many of the rescissions and spending cuts had previously been proposed in the Administration's FY2018 budget request. No offsets were included in any of the three supplemental appropriations measures enacted after the 2017 disasters. One of the most frequent criticisms of supplemental appropriations measures, especially those containing disaster assistance, is that the measures include \"unrelated\" spending. Any attempt to make a nonpartisan determination regarding what appropriations may be considered \"unrelated\" in a measure that is typically responsive to a range of unmet needs presents significant methodological challenges. Long-standing colloquial naming practices have associated supplemental appropriations legislation with a particular event or problem that has drawn congressional and public attention, but the content of these measures typically goes beyond the message-friendly colloquial name. The scope, purpose, and size of a supplemental appropriations measure can be driven by one or more events, the unfunded needs such events generate, and the associated political support for considering and enacting the legislation. In the case of supplemental appropriations measures for disaster relief and recovery, these drivers often include a series of events over time. For example, in the case of P.L. 116-20 , it also incorporated responses to events occurring as the legislation was being developed and considered. At times, \"controlling language\" has been included in supplemental appropriations measures to clarify the intent of specific appropriations, and counter the unrelated spending charge. This language is often included with appropriations for accounts that also have nondisaster-related purposes, in order to link the provided resources to specific activities. P.L. 115-123 , the largest and broadest of the three supplemental appropriations acts signed into law after the 2017 disasters, included a range of forms of controlling language, the most common limiting the availability of funds to \"necessary expenses related to the consequences of Hurricanes Harvey, Irma, and Maria.\" Other controlling language of varying specificity targeted subsets of the disaster-related needs across the United States, including the following: Natural disasters Natural disasters occurring in 2017 Damage reduction in flood and storm damage in states with more than one flood-related major disaster in calendar years 2014-2017 Hurricanes Harvey, Irma, Maria, and 2017 wildfires Hurricanes occurring in 2017 Hurricane Harvey Hurricanes Irma and Maria Major disasters Oversight of funds provided in the measure Such language generally has not been applied to accounts that have a primary mission of providing disaster assistance, such as the SBA Disaster Loan Program Account and FEMA's Disaster Relief Fund. For example, in P.L. 116-20 , the $1.65 billion supplemental appropriation for the Department of Transportation's Emergency Relief Program under the Federal Highway Administration has no specific controlling language. The absence of such specific controlling language allows agencies greater flexibility to ensure that resources are directed to meet evolving needs on short notice. Appropriations for FEMA's DRF are regularly obligated to relief and recovery efforts from multiple disasters across many fiscal years, regardless of the legislative vehicle that provided them. For example, before passage of P.L. 113-2 âthe \"Sandy Supplemental\"âFEMA had already obligated almost $3.4 billion from the DRF for declarations linked to Hurricane Sandy from prior appropriations. Had language been included in those prior appropriations limiting the use of the budget authority provided following past disasters, FEMA's ability to respond would have been more limited. By the end of 2017, almost twice the amount provided for the DRF in P.L. 113-2 had been obligated pursuant to disaster declarations from the stormâaid that might not have been available, had appropriations for the DRF been statutorily limited in their application. Almost all of the appropriations provided in P.L. 116-20 include controlling language. The most common references are to Hurricanes Michael and Florence, although many other incident types are cited as well. The controlling language for some of the appropriations in this measure evolved significantly over time since consideration of supplemental appropriations for disaster relief and recovery were first initiated late in the 115 th Congress. For example, as additional disaster needs arose, the appropriation provided for the Office of the Secretary for the U.S. Department of Agriculture that was proposed in Division C of H.R. 695 grew from $1.1 billion to more than $3 billion in P.L. 116-20 . The controlling language changed to broaden the potential application of the assistance as well (additions are shown in bold ): \"for necessary expenses related to losses of crops (including milk, on-farm stored commodities, crops prevented from planting in 2019, and harvested adulterated wine grapes ), trees, bushes, and vines, as a consequence of Hurricanes Michael and Florence, other hurricanes, floods, tornadoes, typhoons, volcanic activity, snowstorms, and wildfires occurring in calendar years 2018 and 2019 under such terms and conditions as determined by the Secretary.\" Once Congress appropriates funding for disaster relief and recovery costs, the timeline for when that funding is used varies significantly from program to program. Comparison of these timelines in an effort to assess program efficiency requires an understanding of differences in mission and program structure to ensure assessments are made in context. For example, within relief provided through the DRF, some costs are borne up front, such as emergency protective measures and much of the individual assistance program, and funding is obligated and expended relatively quickly. Other costs incurred by state and local governments are reimbursed by the federal government after the work is completeâprojects to restore major infrastructure often follow this model and can take longer to obligate and expend the appropriated funding (e.g., FEMA's Public Assistance Grant Program). Other redevelopment funds may take time to be obligated as eligible state and local governments must develop a plan and have it approvedâthis process cannot begin until the funds are provided to the program and official announcements of the grant competition process are made (e.g., HUD's Community Development Block Grant Program). Because of these varying and extended timelines, disaster recovery funding is often provided without an expiration date. However, appropriations provided for operational costs, damage to facilities, and specifically targeted grant programs with a limited purpose may be provided with a limited term of availability. Concerns about waste, fraud, and abuse exist for a variety of federal programs, but supplemental disaster relief often receives special attention due to the fact that it is unusual, highly visible, provided in chaotic situations, and meant to address pressing needs. The 2019 disaster supplemental appropriations include more than $27 million in appropriations specifically for audits and oversight efforts, including $10 million for the Government Accountability Office (GAO), as well as transfers and set-asides of more than $21 million. The federal government has encountered challenges in effectively tracking some federal disaster relief spending. In September 2016, GAO released a report on disaster assistance provided by the federal government over the 10-year period from FY2005 through FY2014. GAO analysts attempted to survey disaster relief provided by 17 federal departments and agencies, and although they were able to identify over $277 billion in obligations for disaster relief provided over that period, obligations were not separately tracked for all disaster-applicable programs and activities. GAO noted in the report that At least 5 federal departments and agencies reported that some disaster assistance programs or activities are not separately tracked because spending related to these activities is generally subsumed by a department's general operating budget or mission-related costs. For example, U.S. Coast Guard officials stated that most of the agency's disaster-related costs are associated with maintaining a constant state of readiness to immediately respond to disaster and emergency incidents, which is funded from the U.S. Coast Guard search and rescue appropriation and is not separately tracked. Similarly, the Army has deployed personnel in anticipation of a possible disaster event, even when FEMA has not requested the support. If a disaster does not occur or the activity does not result in a FEMA mission assignment, the Army will not be reimbursed for prepositioning personnel or assets in anticipation of an event and therefore may categorize the expenditure as training in the event of a disaster. Another 4 federal departments and agencies reported that obligations and expenditures specific to disaster assistance activities are not tracked or cannot be reliably estimated because there is no requirement for state or other recipients of the financial support to indicate whether or how much of the funding or assistance is used for disasters. Placing consistent reporting requirements on agencies providing assistance through disaster-applicable programs would be one way to obtain a clearer picture of precisely how much the federal government is spending on disaster relief and recovery. Such reporting requirements could include pass-through requirements to state and local governments that receive the funds to provide contract and subcontract data to the providing federal agency. This could help inform budgeting decisions, and determine if a particular program is providing fewer resources than anticipated to its nondisaster missions. On its own, however, such information cannot provide an answer to questions of whether such funds are subject to waste, fraud, or abuse. Answering such questions requires detailed analysis of the individual programs and activities funded, how they complement or duplicate other assistance programs, and whether they are providing the assistance Congress intended. On February 2, 2018, OMB issued a memorandum to all federal chief financial officers and budget officers about new Administration guidelines for tracking emergency funding and disaster relief funding. Under these guidelines, agencies will be required to track these resources, starting with the first of the three 2017 disaster supplemental appropriations, by applying a special accounting code to those resources. It remains to be seen if the FY2019 supplemental appropriations will be monitored in a similar fashion. Prior to 2017, the last time Congress attempted to track the use of a large amount of supplemental appropriations was in the wake of Hurricane Sandy. At that time, a provision of P.L. 113-2 specifically authorized the Recovery and Transparency Board (RATB) to \"develop and use information technology resources and oversight mechanisms to detect and remediate waste, fraud, and abuse in the obligation and expenditure of funds\" provided in the act. Pursuant to this authority, the RATB developed a website containing quarterly financial reports, a map of where contracts had been awarded, and other spending summaries under the Disaster Relief Appropriations Act, 2013. The RATB had its mission extended and funded by Congress for FY2015, but its authority lapsed at the end of that year and it shut down. The Department of Housing and Urban Development (HUD) established a Program Management Office (PMO) in February 2013 to monitor funding flows for Hurricane Sandy Recovery. The office coordinated its efforts with the RATB and provided public information on the status of funding as reported by the agencies. As of November 2014, the responsibilities of the HUD Sandy PMO were transferred to FEMA's Office of Federal Disaster Coordination (OFDC). One potential issue is that it is not always straightforward to compare the information provided by different agencies. The conclusions that might be drawn from data gathered by the RATB and the PMO were potentially limited by the fact that the agencies reporting their data did not use a consistent methodology. For example, while some agencies reported specifically on the resources provided by P.L. 113-2 , FEMA provided information on all obligations for Hurricane Sandy response and recoveryâthose funded by previous appropriations as well as those funded by P.L. 113-2 . This difference meant the FEMA-reported data were not comparable with those of other agencies or departments.", "summary": "This report provides a legislative history of the Additional Supplemental Appropriations for Disaster Relief Act, 2019 ( P.L. 116-20 ), and provides an overview of some of the issues that often arise with consideration of supplemental disaster assistance appropriations. In total, 59 major disasters were declared in calendar year 2018, and 27 major disasters were declared in 2019 up to the date the compromise on the disaster supplemental was announced. In addition to these specifically declared incidents, other situations arose that caused disruption to lives, economic resources, and infrastructure. Together, these incidents and ongoing recovery efforts from previous disasters drove a demand for additional federal budgetary resources beyond those provided through regular annual appropriations. This kind of demand is usually reflected in a request by the Administration for supplemental appropriations after the need for funding is recognized. Despite the absence of such a request by the Trump Administration, congressional leadership in both the House and the Senate chose to consider disaster-related supplemental appropriations at the end of the 115 th Congress. An initial $7.8 billion proposal that passed the House in the 115 th Congress as part of a consolidated appropriations bill did not advance in the Senate. In the 116 th Congress, H.R. 268 passed the House. This measure included $14.19 billion in disaster relief appropriations, as well as continuing appropriations intended to resolve an ongoing lapse in annual appropriations that had caused a partial government shutdown. The Senate was unable to get cloture on proposed amendments to the measure, and consideration of the bill stalled. After the lapse in appropriations was resolved, Senate Appropriations Chairman Richard Shelby introduced a $13.45 billion supplemental appropriations measure structured as a substitute to H.R. 268 . Again, the Senate could not achieve cloture on the proposal. On April 9, House Appropriations Chairwoman Nita Lowey introduced H.R. 2157 , a supplemental appropriations bill, which covered the same disasters addressed in H.R. 268 , as well as additional disasters that had occurred since the earlier measure had been passed by the House. CBO estimated the new bill, as introduced, would provide $17.31 billion in discretionary spending, which grew to $19.26 billion through floor action. The bill passed the House May 10, 2019, by a vote of 257-150. A $19.19 billion bipartisan, bicameral agreement on FY2019 disaster funding was negotiated, and offered in the Senate as S.Amdt. 250 to H.R. 2157 on May 23, 2019. The bill, as amended, was passed by the Senate, 85-8. Three attempts to approve the amended bill by unanimous consent were blocked in the House of Representatives while the body was in pro forma session during the Memorial Day recess. The House subsequently considered the amended bill under suspension of the rules on June 3, 2019, and voted 354-58 to approve the measure. The bill was signed into law as P.L. 116-20 on June 6, 2019. This report includes a more detailed legislative history and a tabular comparison that shows how the funding in these different approaches evolved. Congressional clients seeking further insight into specific programs and provisions in P.L. 116-20 may consult the analysts and background reports listed in CRS Report R45714, FY2019 Disaster Supplemental Appropriations: CRS Experts . The report also includes a discussion of issues that commonly arise during debate on supplemental appropriations, including the relative timeliness of supplemental appropriations; adjustments to spending limits that are often applied to them; offsets for disaster relief and recovery appropriations; the appropriate scope of supplemental appropriations; timelines for obligation of funding; and oversight of supplemental spending. This report will not be updated.", "document_type": "crs"}
{"report": "T he global carbon cycle is the biogeochemical process by which the element carbon (C) moves in a balanced exchange between the atmosphere (i.e., air), terrestrial biosphere (i.e., land), ocean, and Earth's crust (i.e., rocks, fossil fuel deposits). Within those pools , carbon exists in different inorganic (i.e., nonliving, such as carbon dioxide) and organic (i.e., living, such as plant tissue) forms. When carbon moves out of one pool, it is recycled into one or more of the other pools; this movement is known as a flux . The flux of carbon into the atmosphere, particularly as the greenhouse gas (GHG) carbon dioxide (CO 2 ), is the dominant contributor to the observed warming trend in global temperatures. Consequently, climate mitigation strategies have generally focused on both reducing emissions of GHGs into the atmosphere and removing more carbon out of the atmosphere. Forests are a significant part of the global carbon cycle. The forest carbon cycle consists primarily of the movement of carbon between the atmosphere and the terrestrial biosphere. Trees and other plants convert atmospheric carbon (in the form of CO 2 ) into terrestrial organic carbon, which is stored as biomass (e.g., vegetation). This process of carbon uptake and storage is referred to as sequestration . Trees also release (or emit) carbon back into the atmosphere. Over time, however, forests accumulate significant stores of carbon, both above and below ground. Thus, forest ecosystems uptake, store, cycle, and release carbon. Congressional debates over climate policy have often included ideas for optimizing carbon sequestration in forests as a potential mitigation strategy for global warming. To facilitate those debates, this report addresses basic questions concerning carbon sequestration in forests. The first section describes the carbon cycle in forests, with an overview of where carbon is stored and how carbon moves through the forest ecosystem. The second section provides a snapshot of data on carbon in U.S. forests and an overview of the methodologies used for estimating and reporting those measurements. The third section discusses some of the broad issues and challenges associated with managing forests for carbon optimization. Figure 1 introduces some of the terms and units used for measuring and reporting carbon. In addition, the Appendix contains a more comprehensive glossary of relevant terms used throughout the report. An accompanying report, CRS Report R46313, U.S. Forest Carbon Data: In Brief , provides data on carbon in U.S. forests and will be maintained with annual updates. Figure 1. Carbon Terms and UnitsSource: CRS, adapted from Maria Janowiak et al., Considering Forest and Grassland Carbon in Land Management, U.S. Department of Agriculture (USDA) Forest Service, GTR-WO-95, June 2017, p. 4.Notes: Because much of the data for this report are based on international standards, this report uses the metric system for consistency purposes. Forest carbon stocks are reported as measures of carbon, whereas greenhouse gas emissions and removals (e.g., sequestration) are reported as measures of carbon dioxide or carbon dioxide equivalents (to facilitate comparisons with other greenhouse gases). As a chemical element, the mass of carbon is based on its molecular weight. Carbon dioxide (CO2) is a compound consisting of one part carbon and two parts of the element oxygen (O). The conversion factor between C and CO2 is the ratio of their molecular weights. The molecular weight of carbon is 12 atomic mass units (amu), and the molecular weight of CO2 is 44 amu, which equals a ratio of 3.67. The same method is used to convert measurements of other greenhouse gases to carbon dioxide equivalents (CO2 eq.). Forests are a significant part of the global carbon cycle, in that they contain the largest store of terrestrial carbon and are continuously cycling carbon between the terrestrial biosphere and the atmosphere. Through photosynthesis, trees use sunlight to sequester carbon from the atmosphere and accumulate organic carbon-based molecules in their plant tissue (i.e., leaves, flowers, stems, and roots) above and below ground. Trees also respire: they use oxygen to break down the molecules they created through photosynthesis, and in the process they emit CO 2 to the atmosphere. The balance between photosynthesis and respiration varies daily and seasonally. Over time, individual trees and forests accrue significant stores of carbon. When trees die, the accumulated carbon is released, some into the soil (where it may be stored for millennia) and the rest into the atmosphere. This release can occur quickly, through combustion in a fire, or slowly, as fallen trees, leaves, and other detritus decompose. Some of the woody biomass from a tree may continue to store carbon for extended periods of time after death, due to long decomposition times or because it was removed (e.g., harvested) from the forest ecosystem and used, for example, in construction or in manufactured products. The carbon in harvested wood products eventually will be released, but the time scale varies considerably. The amount of carbon sequestered in a forest is constantly changing with growth, death, and decomposition of vegetation. If the total amount of carbon released into the atmosphere is greater than the amount of carbon being sequestered in the forest, the forest is a net source of CO 2 emissions. If the forest sequesters more carbon than it releases into the atmosphere, the forest is a net sink of CO 2 . Whether a given forest is a net source or sink, however, depends on the time and spatial scale (e.g., geographic boundaries) considered. Globally, forests are estimated to be a net carbon sink, with regional variations. The following sections describe in more detail where carbon is stored and how it moves in a forest ecosystem, as well as how ecological events and anthropogenic (i.e., human-caused) activities and changing land uses can influence the balance and cycle of carbon (e.g., the forest carbon budget). In a forest ecosystem, carbon is stored both above and below ground and exists in living and nonliving forms. All parts of a treeâthe leaves, limbs, stems, and rootsâcontain carbon. The proportion of carbon in each part varies, depending on the species and the individual specimen's age and growth pattern. The U.S. Environmental Protection Agency (EPA)âconsistent with international guidelines for measuring and accounting for carbonâreports forest carbon in seven different pools (see Figure 2 ). Five of these pools are part of the ecosystem pool : Aboveground biomass includes all living biomass above the soil, including stems, stumps, branches, bark, seeds, and foliage. Aboveground biomass also includes living understory plants. Belowground biomass includes all living root biomass of trees or understory plants, for roots thicker than two millimeters in diameter. Deadwood includes all dead woody biomass either standing, down (i.e., lying on the ground), or in the soil. Forest floor litter includes leaves, needles, twigs, and all other dead biomass with a diameter less than 7.5 centimeters, lying on the ground. This includes small-sized dead biomass that is decomposed but has not yet become part of the soil. Soil carbon includes all carbon-based material in soil to a depth of one meter, including small roots. EPA divides this category further into mineral (based on rocks) and organic (based on decomposed organic matter) soils. In addition to the ecosystem carbon pools, EPA includes two additional pools in measuring forest carbon, consisting of products made of harvested wood at different stages of use. The carbon in these pools was once forest ecosystem carbon, which was then transported out of the forest ecosystem. These pools are sometimes called the product pool or referred to as harvested wood products (HWP s ) : Harvested wood products in use, or products made from harvested wood (e.g., paper, beams, boards, poles, furniture, etc.) that are currently being used. Wood also may be harvested for energy purposes (e.g., wood chips, wood pellets, firewood, etc.). Harvested wood products in solid waste disposal sites, or harvested wood products that are in a landfill or other waste disposal site, where they may eventually break down and release their stored carbon or remain intact for significant periods of time. Carbon is stored within the different forest ecosystem and product pools at different time scales. A tree's life span tree can range from decades to thousands of years. Carbon in leaf litter may be released into the atmosphere or decay into soil within months or years, whereas carbon in bark or wood may remain for decades to centuries after the tree dies. Soil carbon may persist in the pool for years to millennia. Thus, the carbon turnover , or length of time carbon stays in each pool or the forest ecosystem broadly, varies for several reasons, such as the climate, hydrology, nutrient availability, and forest age and type, among others. The amount of carbon stored (e.g., carbon stock ) in the different pools also varies. For various research or reporting purposes, the forest carbon pools are sometimes combined in different ways. In particular, the forest ecosystem pools are combined into categories such as aboveground versus belowground, or living and nonliving, or dead pools. This is especially useful when examining how various activities influence the flow of carbon between the ecosystem pools. In addition, some of the pools may be further categorized into smaller pools. For example, the aboveground biomass pool may be further classified into the amount of carbon stored in trees versus understory plants, or the amount of carbon stored in tree components (e.g., leaves, branches, and trunks). As another example, the deadwood pool may be further classified into standing dead and downed dead, in part to reflect the variation and relative importance of each in different forest types. See Table 1 for a crosswalk of terminology and classifications used in this report. However, these categories are not always comprehensive or mutually exclusive. Because of variations in carbon turnover, climate, hydrology, and nutrient availability (among other factors), carbon sequestration and release vary substantially by forest. The proportion of carbon stored in the various pools varies by forest type (e.g., tree species) and age class. Nonetheless, some broad generalizations are possible because of the relative similarity of forests in specific biomes âtropical, temperate, and boreal forests (see Figure 3 ). Tropical forests represent around half the global forest area and store more than half the global forest carbon. The carbon in tropical forests is relatively evenly distributed between living and dead biomass, though more is contained in living biomass. Boreal forests represent around 29% of global forest area and store about one-third of the global forest carbon. Most of the carbon in boreal forests is in the belowground dead pools, particularly soil. Globally, temperate forests store the least amount of forest carbon and represent the smallest area, although most forests in the United States fall within the temperate zone. (Some of the forests in Alaska are in the boreal zone.) Carbon in temperate forests is also relatively evenly stored between the living and dead pools, but more is contained in the dead pools, also mostly in the soil. Because of where the carbon is stored in the different types of forest biomes, the drivers affecting the carbon balance in tropical, temperate, and boreal forests vary considerably. The essence of the forest carbon cycle is the sequestration and accumulation of atmospheric carbon with vegetative growth and the release of carbon back into the atmosphere when the vegetation dies and decomposes or during a wildfire. This section discusses how carbon flows between the atmosphere and the different forest carbon pools (see Figure 4 ) and some of the factors that affect the cycle. Carbon enters the forest ecosystem through photosynthesis and accumulates in living biomass both above and below ground. Carbon leaves the forest ecosystem and returns to the atmosphere through several processes: respiration, combustion, and decomposition. Respiration occurs from living biomass both above and below ground (where it is known as soil respiration ). Combustion (e.g., fire) immediately releases carbon from living and dead pools. Decomposition occurs after the tree dies and slowly releases carbon to both the atmosphere and the soil. Decomposition rates are influenced by several factors (e.g., precipitation, temperature), and trees may remain standing for several years after death before falling to the ground and continuing to decay. In addition, human activities facilitate the flux of carbon out of the forest ecosystem. For example, timber harvests remove carbon from the forest ecosystem (and move it into the product pool). This carbon remains stored in the harvested product while the product is in use, but it will eventually return to the atmosphere in most cases. The delay between harvest and release could be relatively instantaneous if the wood is used for energy, for example, or the delay could be more than a century if the wood is used for construction and then disposed in a landfill, where it could take several decades to even partially decompose. The difference between carbon sequestration and release (e.g., emissions) determines if a forest is a net source of carbon into the atmosphere or a net sink absorbing carbon out of the atmosphere. Forest ecosystems are dynamic, however, and the balance of carbon pools and carbon flow varies over different time and spatial scales. These forest carbon dynamics are driven in large part by disturbances to the forest ecosystem. Anthropogenic disturbances are planned activities, such as timber harvests, prescribed wildland fires, or planned land-use conversion. E cological disturbances are unplanned and include weather events (e.g., hurricanes, ice storms, droughts), insect and disease infestations, and naturally occurring wildfires. Ecological disturbances are a natural part of forest ecosystems, though anthropogenic factors may influence their severity and duration. The type, duration, and severity of the disturbance contribute to the extent of its impact on carbon cycling. Most disturbances result in some levels of tree mortality and associated carbon fluxes. Disturbances may have additional impacts if the land cover changes. Post-disturbance, forests will often regenerate with trees (e.g., reforestation ) or other vegetation. In this case, the disturbance influences carbon fluxes and stocks in the short to medium term. If the land changes from forest to grassland, or if the area is intentionally developed for agricultural production or human use (e.g., houses), then the effects on the forest carbon cycle are more permanent (e.g., deforestation ). The following sections explore the forest carbon dynamics related to both anthropogenic and ecological disturbances and land-use changes in more detail. Generally, disturbances result in tree mortality and thus transfer carbon from the living pools to the dead pools and eventually to the atmosphere. The impacts to the forest carbon budget, however, occur over different temporal and spatial scales. For example, the onset of a disturbance's effects may be immediate (e.g., through combustion) or delayed (e.g., through decomposition). Regardless, since there is less living vegetation, the rate of photosynthesis decreases and reduces the amount of carbon sequestered on-site. At the same time, more carbon is released into the atmosphere as the dead vegetation decays. Because of this, many forests may be net sources of carbon emissions in the initial period after a disturbance. Over time, however, the carbon impacts from most disturbances will begin to reverse as the forest regenerates and gradually replaces the carbon stocks (e.g., the amount of carbon in a pool). The lagging recovery and associated increase in carbon uptake and storage are sometimes referred to as legacy effects. Forest carbon stocks in the United States, for example, have been increasing related in part to legacy effects from past disturbances (e.g., harvests). In other words, \"a sizeable portion of today's sequestration is compensating for losses from yesterday's disturbances.\" Forest carbon dynamics are also influenced by disturbances over different spatial scales. Disturbances generally occur at the stand level (i.e., a group of trees) within a forest, but they rarely occur across an entire forest at the same time. For example, a wildfire may result in significant mortality in one stand, moderate mortality in another stand, and no mortality in a third stand, all within the same forest. That same wildfire may not burn across other areas within the same forest at all. This means that at any given time, different stands within a forest may be in various stages of post-disturbance recovery. Because disturbance effects vary both temporally and spatially, they can be in relative balance. This means that forest carbon stocks are generally stable over large areas and over long time scales, assuming the sites are reforested (see Figure 5 ). A shift in the overall pattern of disturbance events, however, could have long-term impacts to forest carbon dynamics. Disturbances are generally increasing in frequency and severity throughout the United States. (with regional variations). For example, a pattern of increasing frequency and severity of disturbances could result in lower sequestration rates and less forest carbon stocks over time. This is in part because disturbance events can interact and compound with each other. For example, drought can make trees more susceptible to insect or disease infestations or to sustaining greater damage during a wildfire. After a wildfire, drought may prevent or delay regeneration. These interactions would then have associated impacts to the forest carbon cycle. In the United States, disturbances account for the loss of about 1% of the carbon stock from the aboveground biomass pool annually. However, timber harvests account for the majority of that change, meaning that some of this \"loss\" enters the product pool. Wildfire, wind or ice storms, bark beetles, drought, and other disturbances account for the remainder of the loss. However, little research exists on the carbon-related impacts of insect and disease infestations generally or on the impacts of specific insects other than bark beetles. In addition, the effects of disturbances on other carbon poolsâsoil carbon in particularâare not well understood. Thus, the current understanding may not accurately estimate the degree of these impacts. The following sections discuss the specific carbon-related effects and issues associated with several types of disturbances, listed in order of decreasing impacts to the forest carbon budget. Timber harvests are a planned management activity, and as such they represent an anthropogenic disturbance. Timber harvests result in the direct transfer of carbon from the aboveground, living biomass pool to other pools. Although some carbon remains on-site as deadwood or litter, a portion of the carbon is removed from the forest ecosystem entirely and becomes part of the product pool. Carbon in the product pool eventually will be released, but the lifecycle varies considerably based on end-use and disposal methods. The carbon that remains on-site as deadwood or litter will decompose and eventually be released into the atmosphere (and some may be absorbed into the soil). In addition, timber harvests have the potential to degrade or damage soils, which also could release carbon into the atmosphere. End-uses of harvested wood products include lumber, paper, panels, and wood used for energy purposes. Energy is derived from wood through combustion, so the carbon in that product pool is released almost immediately. In contrast, lumber used for housing construction may remain in use for nearly a century before being discarded. In some areas, wood products are incinerated upon disposal, releasing the stored carbon into the atmosphere. In the United States, however, most wood products are discarded in solid waste disposal sites (e.g., landfills). In those environments, paper products may take several years and wood products may take several decades to decompose and release the stored carbon into the atmosphere. In some cases, products may decompose only partially, so some carbon may persist in discarded wood products indefinitely. The flux of carbon into the product pool does not consider any emissions related to the harvesting process or the transporting of the wood product. Although most wildfires are unplanned ecological disturbances, some may occur as a planned forest management activity (e.g., prescribed fire ). Wildfires result in the immediate release of some carbon dioxideâand other GHGsâthrough combustion. There is also a transfer of carbon from living to dead pools, where carbon continues to be released over time (or some may be absorbed into the soil). The severity of the fire influences the extent of tree mortality and has implications for the timing and type of post-fire recovery. For example, forest regeneration may take longer if the soil damage is severe. More wildfires occur in the eastern United States (including the central states), but the wildfires in the West are larger and burn more acreage. Â Although wildfire activity varies widely in scale and severity, wildfires have been increasing in frequency and size, particularly in the western United States. Other ecological disturbances, such as insect and disease infestations, wind events, and droughts, have similar effects on forest carbon dynamics: transferring carbon from the live pools to the dead pools and releasing the carbon into the atmosphere over time. The carbon effects from insect and diseases vary considerably, depending on the type of infestation. Some infestations result in widespread tree mortality, similar to other disturbance events. In cases when the infestation is species- or site-specific, the forest may regenerate with a different species mix, altering the forest composition and carbon storage potential. Other infestations, however, may primarily result in defoliation (e.g., loss of leaves). Defoliation increases the amount of forest litter and reduces the rate of carbon uptake but does not necessarily result in a large loss of forest carbon stocks. Indirectly, defoliation may weaken trees and make them more susceptible to impacts from other disturbances. Little research is available on the carbon-related effects of insect and disease infestations generally or on the impacts of specific insects other than bark beetles, so the current understanding may not accurately estimate the degree of this impact. A hurricane or other wind event may uproot, knock over, or break trees (e.g., windthrow or blowdown) increasing the amount of deadwood and forest litter, which could then hasten the spread of a wildfire. These impacts may occur across individual trees or across significantly larger areas. Ice storms have similar effects. Although the carbon cycling effects of a single event may be significant, there is considerable annual variability and the net effect usually is mitigated over time as the site regenerates. Droughts are prolonged events with direct and indirect effects on forest carbon. Droughts can weaken individual trees, reducing carbon uptake, and can lead to tree mortality. Droughts also can prolong regeneration and/or facilitate the shift to a different species mix. Indirectly, weakened trees may be more susceptible to damage or death from other disturbance events. In this way, droughts can enhance or exacerbate other disturbance events. What happens to a site after a disturbance influences the longer-term effect of that disturbance on the global carbon cycle. Reforestation occurs if the site regenerates with trees (naturally or through manual seeding or planting). In this case, the effects on the carbon cycle would be generally mitigated over time. If the site converts to a different land cover or land use, however, more significant and longer-term impacts to the carbon cycle may occur. Land-use changes may occur with or without a separate precipitating disturbance event or, in the case of planned land-use changes, may be the disturbance event. Deforestation occurs when the site converts to a non-forest use; it generally results in the loss of significant amounts of carbon at one time. In most cases, deforestation means the sudden removal of all aboveground carbon, followed by a more gradual loss of belowground carbon. Deforestation also results in the loss of carbon sequestration potential. Deforestation frequently occurs through deliberate human intervention (e.g., to clear the land for development or agricultural purposes). However, deforestation also may occur without human intervention, most commonly when grasses or shrubs populate a post-fire site and prohibit the succession of tree species. Afforestation is the conversion of non-forestland to forestland. It results in the potential for new or increased ecosystem carbon storage and sequestration. Afforestation may occur through deliberate human intervention (e.g., planting, irrigation, fertilization) or through natural ecological succession, as trees begin to grow or encroach into grasslands and rangelands. Afforestation is most successful on sites that were previously forested. In the United States, for example, afforestation frequently occurs on abandoned cropland that had been forested prior to clearing. Globally, forest area generally has been declining since the 1990s. The rate of decline, however, has slowed in recent years, and there is considerable regional variation. Most of the net loss is occurring in tropical forests, whereas most of the net gains have been in temperate forests. In the United States, for example, forest area had been expanding for several decades and now is remaining steady, with variation at the region and state levels. This trend is generally a result of net afforestation, after accounting for some deforestation (~0.12% per year) and reforestation. In 2018, however, slightly more land converted out of forest use (1.29 million hectares) than converted to forest use (1.27 million hectares) in the United States. In general, most deforestation in the United States is the result of development or conversion to grassland. Conversely, however, more grassland converts to forestland annually and is the largest contributor to afforestation in the United States. The following sections provide data on the annual amount of carbon stored in U.S. forest pools (e.g., carbon stocks ) and the net amount of carbon that flows in or out of U.S. forests annually (e.g., carbon flux ). First, however, is a brief discussion of the methodology used to estimate and measure forest carbon. The data are primarily derived from EPA's annual Inventory of U.S. Greenhouse Gas Emissions and Sinks ( Inventory ) for 2020. For purposes of this report, the data are intended only to provide context and complement the understanding of carbon dynamics in U.S. forests generally. As such, the data in this report will not be updated in accordance with the publication of the annual Inventory . Rather, an accompanying report, CRS Report R46313, U.S. Forest Carbon Data: In Brief , will be updated to reflect the annual data published in the Inventory and other sources. Because the methodologies used to estimate carbon measurements are constantly being refined, future iterations of the Inventory may result in different stock and flux estimates for the years discussed in this report. This section describes the forest carbon accounting methodology specific to EPA's annual Inventory . EPA has been publishing the annual Inventory since the early 1990s. Among other purposes, the Inventory fulfills the reporting commitments required of the United States as a signatory to the United Nations Framework Convention on Climate Change. As such, these methods are in accordance with the standards established by the International Panel on Climate Change (IPCC), which is the United Nations body responsible for assessing the science related to climate change. Federal agencies, including those within the U.S. Department of Agriculture (USDA), contribute data and analysis to the Inventory . Specifically, much of the data on forests and forest carbon is based on methodologies developed and data collected by the Forest Inventory and Analysis (FIA) Program administered by the USDA Forest Service (FS). As the following sections describe, the forest carbon figures reported in the Inventory are derived from estimates of forestland area and carbon stocks. Carbon flux is then measured by comparing changes in forest carbon stocks over time. The Inventory measures the net greenhouse gas flux associated with all land uses and types in the United States, in the Land Use, Land-Use Change, and Forestry (LULUCF) sector (see Figure 6 ). In addition to forestland, LULUCF includes the carbon flux associated with existing agricultural lands, grasslands, wetlands, and developed areas (referred to as settlements ). The Inventory also captures the carbon flux associated with changes in land uses, such as grasslands converting to forestland (e.g., afforestation ). These converted lands are reflected in the \"converted\" LULUCF category for 20 years, after which they are counted with the existing LULUCF land-use categories. Forests represent about one-third of the area included in the sector (see Figure 6 ), but they generally contain the most carbon stocks and are responsible for most of the carbon sink associated with the sector. This report focuses only on carbon stocks and fluxes associated with forestland. For the Inventory, forestland includes \"land at least 120 feet wide and at least 1 acre (0.4 hectares) in size with at least 10 percent cover (or equivalent stocking) by live trees including land that formerly had such tree cover and that will be naturally or artificially regenerated.\" This definition does not include forested areas completely surrounded by urban or developed lands, which are classified as settlements . This definition also does not include woodlands, which are included in the grassland category. The Inventory reflects lands that are considered managed, (i.e., direct human intervention has influenced their condition). In contrast, unmanaged land is composed largely of areas inaccessible to society; the carbon associated with those lands is not reflected in the Inventory . For the United States, managed forests are those that are designated for timber harvests and/or with active fire protection, which includes all forestland within the conterminous U.S. and significant portions of forestland in Alaska. As of 2020, the Inventory did not include forestland in Hawaii and the U.S. territories as part of the carbon stock and flux estimates, although Hawaii forestland was included in some estimates of forestland use. Land area estimates are derived from a combination of FIA data and other sources. See Figure 6 and Table 3 . The Inventory reports carbon stocks for total managed forest area, but it accounts for carbon flux across two different categories: F orest l and R emaining F orest l and (FRF) and L and C onverted to F orest l and (LCF). FRF captures the carbon flux associated with existing forestland or forests that have been forestland for at least 20 years. LCF captures the carbon flux associated with land that has been converted to forestland within the past 20 years. In other words, this category captures the carbon flows associated with afforestation . Land area data on forestland converted to other uses (e.g., deforestation ), such as grassland, settlements (e.g., development), and agriculture uses, are captured in the respective new land-use category as reported in the LULUCF sector. To generate estimates of the carbon stocks in the Inventory, estimates of forestland area are combined with site-specific estimates of forest carbon. These estimates are based primarily on the data collected through the FS's FIA Program, its continuous census of the U.S. forests. The FIA uses remote sensing data and field data collected from a series of permanently established research sites (called plots), which cover most forested lands of the United States. Field data include a variety of tree measurements, such as height and species. Additional measurements of downed deadwood, litter, and soil variables are taken on a subset of plots. The data are collected through a three-stage, systematic sample, as follows: 1. FS uses remotely sensed data to classify land cover as forest or non-forest and chooses a systematic sample of forested plots for field data collection. 2. FS collects field data at one forest plot for every 6,000 acres. The data include forest type, tree species, size, and condition. It also collects site attributes, such as slope and elevation. 3. FS collects a broad suite of forest health data from a subset of Phase 2 plots, such as understory vegetation, deadwood, woody debris, soil attributes, and others. The data are collected through an annualized sampling process in which a representative sample of plots in each state is surveyed at regular intervals, with the goal of each plot being sampled every 5 to 10 years. After field collection, FS applies mathematical conversion factors or models to calculate carbon content for each ecosystem pool. The conversion factors and models generally are species-specific and based on other research or internationally accepted methodologies based on peer-reviewed research. They relate data that are easily collected to data that are difficult (or impossible) to collect in the field. For example, FS calculates aboveground carbon by using species-specific equations that give aboveground carbon estimates from simple field data, such as tree height and diameter. It uses similar principles to derive estimates of carbon in belowground biomass, soils, litter, and deadwood. For the Inventory, the site-specific FIA data are scaled up to derive state and national forest carbon estimates using measures of forestland area. Carbon in the product pool, or in harvested wood products (HWPs), is calculated according to a mathematical model with conversion factors for several variables. These variables include the amount of carbon in various HWPs, the length of time HWPs remain in active use, and how long it takes for HWPs to decompose and release carbon based on the method of disposal. Other variables account for how many HWPs are imported and exported out of the United States annually, with adjustments for the associated carbon estimates. TheÂ  Inventory Â reports annual GHG emissions (i.e., sources) and removals (i.e., sinks), expressed in terms of CO 2 equivalents, aggregated to millions of metric tons (MMT CO 2 eq.). CO 2 equivalents convert an amount of another GHG to the amount of CO 2 Â that could have a similar impact on global temperature over a specific duration (100 years in the Â Inventory ). This common measurement can help to compare the magnitudes of various GHG sources and sinks. See Figure 1 for information on calculating CO 2 equivalents. The Inventory measures net flux by comparing the annual difference in forest carbon stocks for existing forestlands as well as carbon sequestered as land converts to forestland. Specifically, net carbon flux is estimated by subtracting carbon stock estimates in consecutive years. Comparing the annual difference in carbon stocks reflects any carbon stock changes associated with disturbances, although it does not attribute any changes to specific disturbance events. The net effect of disturbances are reflected in the different total carbon stocks measures and in how the distribution of carbon between the stocks changes annually. For example, a timber harvest removes carbon from the forest ecosystem and transfers some carbon from the living pools to the dead and product pools. Annual estimates of carbon stock changes would reflect the loss of carbon from the aboveground biomass pool and transfer to the deadwood, litter, and product pools. The Inventory also reports emissions of other GHGs, particularly those associated with wildfires, fertilizer application, and other soil emissions (all accounted for in CO 2 equivalents). According to the Inventory , U.S. forests stored 58.7 billion metric tons (BMT) of carbon in 2019 (see Table 3 and Figure 7 for data from 1990, 2000, 2010, and 2019). The majority of forest carbon was stored in the forest ecosystem pools (95%); the remainder was stored in the product pool (e.g., HWP). The largest pool of carbon was forest soils, which contained approximately 54% of total forest carbon in 2019. The next-largest pool was aboveground biomass, which contained approximately 26% of total. Each of the other pools stored less than 6% of the total carbon. Since 1990, U.S. forest carbon stocks have increased 10%. Nearly all forest pools have gained more carbon as of 2019. The exceptions are the litter and soil pools, which each continue to store around the same amount of carbon as they did in previous years. Forest carbon stocks have increased annually, meaning U.S. forests have been a net carbon sink, absorbing more carbon out of the atmosphere than they release (carbon flux data are discussed in the \" Carbon Emissions and Sinks from U.S. Forests \" section below). About one-third of the United States is forested. These forested areas vary considerably by location, climate, vegetation type, and disturbance histories, among other factors. Because of this variation, U.S. forests contain varying amounts of carbon, stored in varying proportions across the different forest pools. See Figure 8 for an example of how c arbon density , or the amount of carbon within a certain area, varies across the 48 conterminous states. Excluding Alaska, the forests in the Pacific Northwest and Great Lakes regions contain the highest carbon density. The distribution of the carbon across different pools differs between those two regions, however. In the Pacific Northwest and along the West Coast generally, most of the carbon is stored in the living biomass pools; in the Great Lakes region, most of the carbon is stored in the soil. Forests in New England, the Great Plains, and along the Southeastern Coast also store most of their carbon in soil, whereas the forests along the Appalachian Mountains store most of their carbon in live biomass. In some areas of the Rocky Mountains, most of the carbon is stored in live biomass; in other areas of the Rocky Mountains, most of the carbon is stored in the deadwood and litter pools. The carbon balance and dynamics in Alaska are not as comprehensively inventoried as those in other states in the conterminous United States. However, Alaska is estimated to contain significant carbon stocks, with the vast majority in the soil. Alaska includes multiple biomes: temperate forests along the southeast coast, boreal forests in the state's interior, and areas of tundra in the north. Carbon flux is the annual change in carbon stocks. The flux estimate for any given year (e.g., 2018) is the change between stock estimates for that year (2018) and the following year (2019). Negative values indicate more carbon was sequestered than was released in that year (e.g., net carbon sink); positive values indicate more carbon was released than was sequestered in that year (e.g., net carbon source). According to the Inventory , U.S. forests were a net carbon sink in 2018, having sequestered 774 MMT CO 2 equivalents (or 211 MMT of C) that year (see Table 4 and Figure 9 for flux data from 1990, 2000, 2010, and 2018). This represents an offset of approximately 12% of the gross GHG emissions from the United States in 2018. The net sink reflects carbon accumulation on existing forestland and carbon accumulation associated with land converted to forestland within the past 20 years, though most of the sink is associated with existing forests (86%). Within the carbon pools, most of the flux is associated with aboveground biomass (58%). The carbon flux into the living biomass pools (above and below ground) reflects net carbon accumulation from the atmosphere; the carbon flux into the other pools represents the net of the flux of carbon from the living biomass pools into the dead pools relative to the flux of carbon out of those pools. Although soils store significant amounts of carbon, the carbon accumulates slowly over long periods, so the annual flux is minimal. In some years, soils are a net source of carbon to the atmosphere. Overall, the annual net flux of carbon into U.S. forests is small relative to the amount of carbon they store. For example, U.S. forests gained an additional 211 MMT of carbon between 2018 and 2019, but that represents only a 0.3% increase to the total forest carbon stock (58.7 BMT of carbon). In addition, the total stock of carbon stored in forests is equivalent to the sum of several decades of U.S. GHG emissions. Over the time series (1990 to 2018), U.S. forests have been a net carbon sink. However, the net amount of carbon sequestered by U.S. forests varies annually, depending in large part on disturbance activity and location in any given year. For example, wildfire activity in Alaska drives a significant portion of the interannual variability. This is due in part to fluctuations in the size of the area affected by wildfire each year and because more of the carbon in Alaska is stored in pools that are likely to be combusted in a fire (e.g., litter) as compared to other states. Although the Inventory reflects the net carbon flux associated with forest disturbances through annual changes in the carbon stock, recent iterations of the Inventory also have included the estimated emissions specifically associated with wildfires. The Inventory reports that wildfires, including prescribed fires, resulted in emissions of 170 MMT CO 2 equivalents in 2017, the most recent year available. Annual forest carbon emissions vary significantly, because wildfire activity varies annually. For example, the Inventory reports that wildfire-related emissions in the previous year (2016) were significantly lower: 51 MMT CO 2 equivalents. This section discusses policy issues related to managing forest carbon. Forests are generally managed for multiple reasons, often simultaneously. For example, the Forest Service manages the National Forest System under a congressional mandate to provide sustained yields of multiple uses, some of which may compete and require tradeoffs. In many cases, optimizing carbon sequestration and storage could be one of many forest management objectives. There are three primary strategic approaches for optimizing forest carbon sequestration and storage: (1) maintain or increase the area of forestland, (2) maintain or increase forest carbon stocks, and (3) increase the use of wood products. The applicability of each approach will vary depending on existing site characteristics and land management objectives. In addition, each of these approaches comes with varying levels of uncertainty related to effectiveness, potential for co-benefits, and tradeoffs. Maintai n or increase forest land area . This approach involves avoiding and reducing deforestation and maintaining or increasing afforestation. (This approach also could include increasing tree cover in urban areas, although the overall carbon benefits would be uncertain and likely highly variable based on site-specific characteristics.) Increasing forest area could provide a range of co-benefits (e.g., watershed protection, wildlife habitat), but in some cases it also could require substantial resources (e.g., fertilization, irrigation). In addition, increasing forest area could require economic tradeoffs, such as income loss from reduced agricultural production in areas of increased afforestation, for example. Maintain or increase forest carbon stocks . This approach involves managing forests to maximize tree growth potential, rehabilitating degraded forests, or otherwise mitigating potential carbon losses. This could involve activities such as extending the time between timber harvests and/or implementing harvesting methods to increase the protection of remaining trees and soils. This also could include restoring degraded forests whose biomass and soil carbon densities are less than their maximum potential value. Forest restoration could have additional benefits in terms of improving forest resilience to and recovery from ecological disturbances (e.g., mitigating the risk of catastrophic wildfires). These activities all could require substantial resources (e.g., forest thinning, fertilization, irrigation) and economic tradeoffs (e.g., loss of timber-related income). Increase use of wood products . To have net impacts on the carbon balance, this approach requires substituting wood products as an alternative to materials that are more carbon intensive to produce (e.g., steel) or using wood as a substitute for fossil fuel. In some cases, these measures could require significant technological advances. Generally, a full lifecycle accounting of both products likely would be necessary to determine whether the use of wood generates net carbon benefits. Increasing the use of wood products could result in increased economic activity that incentivizes wood product innovation. It also could result in forest management activities that reduce overall carbon storage potential (e.g., increasing, rather than decreasing, harvest cycles). The above strategies share certain implementation issues and challenges. One of the most fundamental challenges is determining whether an activity actually results in a net carbon benefit, which depends largely on the time and spatial scale of analysis. Any approach will encounter issues related to: P ermanence . In this context, permanence means the extent the activities are reversible. For example, is there potential for a new landowner to reverse previous management decisions and to nullify or reverse the carbon benefits of these practices? This is especially an issue for private lands, which may change ownership status more frequently than public lands and forests. Ecological factors, such as a site's ability to recover post-disturbance, also may influence permanence. L eakage . The potential for changes in land management in one area to result in offsetting changes in another area is referred to as leakage. For example, the afforestation of cropland in one area may result in the conversion of forestland to cropland in another to make up for the loss of agricultural production. A dditional it y . Additionality is the extent the activity and associated carbon benefit would not have happened anyway. For example, preserving an area to avoid deforestation is not additional if the forestland was not under threat of deforestation. Finally, all of these considerations are in the context of the uncertainty related to the future effects of changing climatic conditions on forests broadly. The general scientific consensus is that, under most climate change scenarios, U.S. forests overall would likely continue to serve as a net carbon sink. However, the strength of that sink would diminish over time and, under some scenarios, could reverse. Regionally, some forests could be net sources of carbon at various times. Part of the uncertainty related to how forests may adapt to climate change is because many of the potential effects are interrelated (particularly in terms of ecological disturbances) and because, in some scenarios, the various effects could amplify or counteract each other. For example, more CO 2 in the atmosphere could increase forest growth but also could result in drought conditions, which would inhibit forest growth. Another source of uncertainty is the maximum extent of U.S. forests. After expanding steadily for several decades, the extent of U.S. forest area may have begun to plateau. If forest area begins to decrease, then a net amount of carbon could be lost and U.S. forests would be expected to sequester less carbon annually. If forest area expands further, however, then U.S. forests might be able to sequester more carbon moving forward. Finally, the carbon flux associated with U.S. forests is small relative to the amount of carbon stored in those forests, though U.S. forests offset 12% of GHG emissions in 2018. If U.S. forests sequester less carbon annually in the future, as predicted by some models, then U.S. forests would offset less GHG emissions and could potentially become a source of GHG emissions. Under such a scenario, even if GHG emissions were to remain constant at today's levels, the amount of atmospheric carbon would still increase. Thus, even minor shifts in carbon flux have the potential to significantly affect the nation's carbon balance and the overall global carbon cycle. Below is a glossary of selected terms used throughout this report. Most of the definitions are derived from several, interrelated sources, as listed below. Some terms may have a broad definition established through various international standards, which allow for the definition to be narrowed to fit national specifications. In some cases, the definition has been edited for clarity. Food and Agriculture Organization of the United Nations, Global Forest Resources Assessment 2020: Terms and Definitions , Working Paper 188, 2018. International Panel on Climate Change (IPCC, which is the United Nations body for assessing the science related to climate change), IPCC Guidelines for National Greenhouse Gas Inventories , 2006. U.S. Environmental Protection Agency (EPA), EPA Inventory, 2020 , Chapter 6, \"Land Use, Land-Use Change, and Forestry (LULUCF),\" April 13, 2020. Forest Service, The U.S. Forest Carbon Accounting Framework: Stocks and Stock Change, 19902016 , GTR-NRS-154, November 2015.", "summary": "The global carbon cycle is the process by which the element carbon moves between the air, land, ocean, and Earth's crust. The movement of increasing amounts of carbon into the atmosphere, particularly as greenhouse gases, is the dominant contributor to the observed warming trend in global temperatures. Forests are a significant part of the global carbon cycle, because they contain the largest store of terrestrial (land-based) carbon and continuously transfer carbon between the terrestrial biosphere and the atmosphere. Consequently, forest carbon optimization and management strategies are often included in climate mitigation policy proposals. The forest carbon cycle starts with the sequestration and accumulation of atmospheric carbon due to tree growth. The accumulated carbon is stored in five different pools in the forest ecosystem: aboveground biomass (e.g., leaves, trunks, limbs), belowground biomass (e.g., roots), deadwood, litter (e.g., fallen leaves, stems), and soils. As trees or parts of trees die, the carbon cycles through those different pools, from the living biomass pools to the deadwood, litter, and soil pools. The length of time carbon stays in each pool varies considerably, ranging from months (litter) to millennia (soil). The cycle continues as carbon flows out of the forest ecosystem and returns to the atmosphere through several processes, including respiration, combustion, and decomposition. Carbon also leaves the forest ecosystem through timber harvests, by which it enters the product pool . This carbon is stored in harvested wood products (HWPs) while the products are in use but eventually will return to the atmosphere upon the wood products' disposal and eventual decomposition, which could take several decades or more. In total, there are seven pools of forest carbon: five in the forest ecosystem and two in the product pool (HWPs in use and HWPs in disposal sites). Carbon is always moving through the pools of forested ecosystems (known as carbon flux ). The size of the various pools and the rate at which carbon moves through them vary considerably over time. The amount of carbon sequestered in a forest relative to the amount of carbon that forest releases into the atmosphere is constantly changing with tree growth, death, and decomposition. If the total amount of carbon released into the atmosphere by a given forest over a given period is greater than the amount of carbon sequestered in that forest, the forest is a net source of carbon emissions. If the forest sequesters more carbon than it releases into the atmosphere, the forest is a net sink of carbon. These forest carbon dynamics are driven in large part by different anthropogenic and ecological disturbances . Anthropogenic disturbances are planned activities, such as timber harvests, whereas ecological disturbances are unplanned, such as weather events (e.g., hurricanes, droughts), insect and disease infestations, and wildfires. Generally, disturbances result in tree mortality, causing the transfer of carbon from the living pools to the deadwood, litter, soil, and product pools, and/or eventually to the atmosphere. If a disturbed site regenerates as forest, the carbon releases caused by the disturbance generally are offset over time. If, however, the site changes to a different land use (e.g., agriculture), the carbon releases may not be offset. The U.S. Environmental Protection Agency (EPA) measures forest carbon annually using data collected by the Forest Inventory and Analysis Program in the U.S. Forest Service. According to EPA, U.S. forest carbon stocks contained 58.7 billion metric tons (BMT) of carbon in 2019 across the seven pools, the majority of which was stored in soil (54%). The aboveground biomass pool stored the next-largest portion of forest carbon stocks (26%). The pools' relative size varies considerably across U.S. forests, however. EPA estimates that, for the forest carbon flux, U.S. forests were a net sink of carbon, having sequestered 221 million metric tons (MMT) of carbon in 2018âan offset of approximately 12% of the gross annual greenhouse gas emissions from the United States for the year. The net sink reflects carbon accumulation on existing forestland and carbon accumulation associated with land converted to forestland within the past 20 years. Within the carbon pools, most of the annual flux is associated with aboveground biomass (58%). In general, the annual net flux of carbon into U.S. forests is small relative to the amount of carbon they store (e.g., 221 MMT of carbon is 0.3% of the 58.7 BMT of total carbon stored in U.S. forests in 2019). There are three primary strategic approaches for optimizing forest carbon sequestration and storage: (1) maintain and increase the area of forestland, (2) maintain and increase forest carbon stocks, and (3) increase the use of wood products as an alternative to more carbon-intensive materials or as a fuel. In many cases, optimizing carbon sequestration and storage may compete with other forest management objectives and require tradeoffs. As such, the applicability of each approach will vary, depending on existing site characteristics and other objectives. In addition, each of these approaches comes with varying levels of uncertainty related to effectiveness and potential for co-benefits. All of these considerations are in the context of the uncertainty related to the future effects of changing climatic conditions on forests broadly.", "document_type": "crs"}
{"report": "T he stagnation of real hourly wages at the lower end of the income distribution, where workers tend to be less educated, has entered into the policy debate over many issues, including trade, immigration, and institutional factors such as the minimum wage. This lack of wage growth has also contributed to an increase in overall income inequality. The first section reviews changes in the distribution of hourly wages (as well as considering the effects of fringe benefits) and overall income. Following that review, the report reviews the evidence on the main factors that might have contributed to this lack of wage growth, including technological advancement, trade, the minimum wage, unions, the large firm wage premium, immigration, and reduced labor mobility. The final section of the report explores policy options that might be considered by Congress. Over the 1979-2018 period, real wages at the 10 th percentile of the wage distribution grew by only 1.6%, whereas wages at the 50 th percentile grew by 6.1% and wages at the 90 th percentile grew by 37.6%. As shown in Table 1 , these patterns varied by sex, race, and ethnicity. From 1979 to 2016, examined by quintiles of wage earners, wages fell by 1.0% for the bottom 20% but rose by 27.4% for the top quintile. Wages rose for the lower-middle quintile by 0.8%, but rose by 3.4% in the middle quintile and by 11.5% in the upper-middle quintile. The wage differentials between the 10 th and the 50 th percentile remained relatively constant after 1990 until the recession in 2009, indicating a stabilization of inequality in the bottom half of the wage distribution; this change was primarily for male workers. For female workers, a more modest growth in the differential in the bottom half occurred, largely in the early 1980s, with little change thereafter. The differential in the upper half (between the 90 th and the 50 th percentile) increased at a more modest pace during the entire period. Wages are associated with educational achievement. College graduates are 15% of the bottom quintile and almost 80% of the top quintile. The highest wages on average are earned by those with advanced degrees, and the lowest by those with less than a high school diploma. In 2016, for workers over 25, those with less than a high school diploma had median weekly earnings of $504. Median weekly earnings were $1,156 for those with a bachelor's degree, $1,380 for a master's degree, $1,745 for a professional degree, and $1,664 for a doctoral degree. The wage premium for a college degree (the ratio of average wages for those with a college degree compared to those with a high school diploma) rose from 134% in 1979 to 168% in 2016; the premium for an advanced degree rose from 154% to 213% over that same period. The wage premium for a college degree rose steeply until about 2000 then continued to rise slightly after 2000. Over the 1979-2016 period, the share of workers with a college degree also increased (from 23% to 40%). This increase in the skill premium suggests that the demand for skilled workers rose relative to the supply over this time frame. Using the CPI, real wages of men with a high school diploma or less declined significantly between 1979 and 1999, while women with a high school diploma experienced small, but generally positive, growth during that period. In addition to the wage differential growth, labor compensation as a share of income has been falling since 2001, from 64.3% in the first quarter of 2001 to 58% in the fourth quarter of 2015. Labor compensation includes fringe benefits and proprietor's labor income as well as wages. During that same period, employee wages fell from 46.8% to 42.8% of gross domestic income (GDI). While the fringe benefits (supplements) share remained constant as a share of GDI, these benefits rose as a share of employee compensation. In contrast with the increased wage inequality and the increased college wage premium, where effects largely occurred by 2000, the fall in the labor share of income occurred primarily after 2000. Because wages account for a smaller share of the income of higher-income individuals, both the increased wage inequality and the decreased labor income share have led to increased income inequality. From 1979 to 2017, the income share of the bottom quintile fell from 5.3% to 3.5%, whereas the share of the top quintile rose from 41.9% to 50.1%. Income shares also fell for the lower-middle quintile (from 11.7% to 9.0%) and the middle quintile (from 17.2% to 14.7%), and (slightly) for the upper-middle quintile (from 23.8% to 22.7%). Note that labor compensation differs from wages, as it also includes benefits that typically account for about 30% of compensation. This difference also raises the question of whether the wage differentials documented for the period from the end of the 1970s to the mid-1990s were offset or accentuated by changes in nonwage compensation. Available evidence, however, indicates that labor compensation differentials increased more than wage differentials. Some of the decline in the labor compensation share may be due to the growth of entrepreneurial income at the top of the income distribution, which in turn may partly reflect shifting to pass-through business (where wages are not paid to entrepreneurs) from the standard corporate form, due to tax incentives. Thus, this shift may be, in part, a change in the characterization of income rather than a real shift. One study has estimated a national distribution of income and how it has changed over time accounting for all national income, including the fringe benefits of workers and those not in the labor force. This study compares the growth in income over two 34-year periods: from 1946 to 1980 and from 1980 to 2014. For the postwar period through 1980, the overall income growth rate and the overall pretax income annual growth rate were 2%, with pretax income of the bottom 50% of adults growing at approximately the 2% growth rate, whereas the top 10% grew at 1.7%. For the period from 1980 through 2014, the overall annual growth rate was lower, at 1.4%, but the annual growth rate of the bottom 50% rounded to zero, whereas the top 10% grew at 2.4%. The study's statistics show that the share of income of the bottom 50% declined from about 20% in 1979 to about 12% today. This study differs from other studies of income distribution that focus on family units; rather, it looks at incomes for all adults separately to focus on individuals. Although this study uses a different approach, it shows a similar pattern to other measures. To sum up these trends, lower-income workers experienced a decline in wages relative to the median that mostly occurred in the 1980s, the median wage earners experienced a decline with respect to the top wage earners throughout the period (with both effects causing a rise in the college wage premium from the 1980s to about 2000), and since 2000, the labor share of income has declined. All of these trends resulted in a stagnation of income among less-skilled workers relative to the overall population. This section discusses the factors potentially contributing to the lack of wage growth at the bottom of the wage distribution: technology, globalization, wage-setting institutions (the minimum wage, the decline in unions, and the decline in the large firm wage premium), immigration, and reduced labor mobility. It also considers the decline in the labor income share that contributed to inequality. Many economists see technology and international trade as the major forces affecting labor markets, and a broad conclusion of the evidence on earnings inequality is that the largest immediate contributors included a rising demand for skills along with a slowdown in the growth of the supply of new college graduates. Historically, technological advancement has led to a massive increase in the standard of living but has also caused temporary disruptions, although the groups that are adversely affected have varied. With recent technological advances, those who fail to reap the benefits appeared to be less-skilled workers, based on a number of relationships observed in the economy. First, some effects arose from the displacement of workers in well-paid factory jobs with machinery using advanced technology. One illustration of the potential impact of technology in reducing the demand for manufacturing workers is the development of the mini-mill in steel production. Although the real value of shipments was relatively constant from 1980 through 2002, steel industry employment fell from 400,000 workers to 100,000 workers. Second, numerous studies found that the surge in wage inequality that appeared in the 1980s (and had its primary effects on inequality in the lower half of the wage distribution) reflected a rise in the demand for skilled workers that had been ongoing for some time and was perhaps accelerated by the computer revolution. There also appeared to be a relationship between positive wage changes and computer use by workers that suggested a technological cause to the changes in wage patterns. A number of studies showed that the utilization of more-skilled workers was correlated with capital intensity and the implementation of new technology based on both statistical and case studies. Studies showed a diffusion of computer-based processes during this period, which could substitute for routine jobs and is likely more important in clerical and production jobs than in managerial and professional jobs. Third, a finding that points to technology rather than trade as the more important source of increased demand for skilled workers was that wage dispersion occurred within industries rather than between industries. Growing wage differentials within a particular industry suggest a largely technology-driven reason, whereas a differential that arises across workers producing different products may point to a trade-driven effect (e.g., imports being produced with less skilled labor and exports with more). That is, if increased trade led to imported goods with lower prices, wages would decline in that industry relative to other industries, whereas if technology favored more-skilled workers, differentials in wages would occur within all industries. This outstripping of demand for skilled workers (primarily via technological change) relative to supply also reflected a slowdown in the growth of the share of workers with college degrees, because the increase in the college wage premium was largely attributable to younger men. The slowdown could be in part attributed to the end of the growth in college attendance induced by the Vietnam War and in part to the decline in the college wage premium prior to the 1980s. For example, as the war in Vietnam ended in the mid-1970s, the decline in college attendance prior to that period produced ripple effects in the form of a less-educated workforce into the 1980s. The pattern of wage changes differed from 1979 to today. In the 1980s, technology and automation changes led to a decline in employment and earnings at the bottom of the skill distribution relative to the top, whereas in the 1990s and later, information technology change did not affect the very lowest-skilled workers performing manual labor but did adversely affect moderately educated workers performing clerical tasks, and benefitted highly educated workers performing abstract tasks. Employment in both the least-skilled and most-skilled occupations grew relative to that in the middle-skilled occupations. Some studies linked this effect to technological advancement in information and communication, which allowed the substitution of machines for many routine tasks carried out by middle-skilled jobs. Technological change shifted from automation affecting manufacturing to the computerization of information affecting nonmanufacturing. Despite some evidence of a transitory effect from trade due to China's rapid emergence, the evidence presented in this and the following section suggests that technology is the more important driver of changes in wage differences. Some prominent labor economists appear to hold that view. When queried about the importance of automation versus trade, as reported in the New York Times , Lawrence Katz said, \"Over the long haul, clearly automation's been much more importantâit's not even close.\" David Autor, interviewed in the same article, said automation has had a far bigger effect than globalization and stated \"some of it is globalization, but a lot of it is we require many fewer workers to do the same amount or work. Workers are basically supervisors of machines.\" This technological advancement in favor of more-skilled workers is projected to continue in the future with increased use of industrial robots and susceptibility of jobs to computerization. Studies suggest that new technology and algorithms for big data will make computers substitutes for nonroutine cognitive tasks and an expanded range of manual tasks, while having less effect on jobs that require creative or social intelligence. A technological explanation for the decline in the labor share of income seems less likely. Even if technology led to more capital investment, such increases would not necessarily lead to a declining share of labor income. The reasons for the decline in the labor share of income are unsettled, although, as noted earlier, a recent study found that most top income is nonwage income, a primary source of which is private business profit, largely due to labor input by entrepreneurs, which could be considered labor income. Economists generally agree that the overall economy gains from international trade, even though (as is the case with technological progress) some groups may be harmed. (Trade in this section refers to international trade, consisting of imports from abroad and exports to other countries; the growth in this trade and other transactions with other countries is often referred to as globalization .) One study put the estimated increase in output from trade at 2% to 8% of gross domestic product (GDP). (Trade includes trade in final goods and services and trade in intermediate goods and services, sometimes referred to as offshoring .) Because trade largely involves a substitution of one type of production for another, there is no a priori expectation of an effect on income distribution. Although some studies have found a role for trade, most have found it a modest force compared to technology. As discussed in the previous section, one characteristic that points to a technology-based rather than a trade-based cause as the more important force is that increased wage differentials appeared within sectors rather than across sectors. If the cause were trade, such differentials would be expected to have appeared between import and export sectors. A second characteristic pointing against a trade-based cause as more important than technology is that inequality has increased in both advanced and developing countries. If the cause were trade (receiving imports from countries using low-skilled labor in exchange for exports using high-skilled labor), developing countries would likely be more, not less, equal. That both types of economies are becoming more unequal points to a technology-based explanation. Some studies also tried to directly estimate the effect of trade on the economy by examining how the lack of trade would affect prices and wages. These studies generally found a small effect on prices and income distribution, especially compared with technological change. Instances in which certain workers in local markets are adversely affected by imports may have led to the perception of an important role for trade. Studies have found an effect from China's rapid emergence in the world market, especially after 2000, when China entered the World Trade Organization (WTO); these studies found a decline in manufacturing jobs in areas producing products most competitive with imports, as well as persistent increased unemployment and a small decline in wages. These studies illustrate the adjustment costs of a large trade change on trade-impacted sectors, and especially on lower-wage workers who may find adaptation and mobility more difficult. They characterized the growth in China's imports as a shock and noted that this growth may soon be over, if it is not already, as wages in China have increased substantially. One study cited a loss of 2 million jobs in the United States over the period 1999 to 2011, which indicates an average of 166,000 jobs a year. To put the China effect in perspective, this amount is one-tenth of 1% of the U.S. workforce, and its cumulative effect over a dozen years was 1.4%. Thus, while the China shock as measured by displaced jobs may have been significant relative to other trade shocks, it did not likely have a major effect on the stagnation of wages at the lower end of the wage distribution, which has occurred over the past 40 years and was most pronounced before the increase in China trade began. The China study analysis focused only on effects in areas of high import penetration, but it did not consider overall effects in the economy. It is well known that bilateral trade balances or their effects in local markets cannot be used to infer results about the economy as a whole. An increase in imports leads to increases in output in other sectors of the economy that should be considered. A subsequent study that did so found these local effects were offset by growth in other areas and exports. Thus, trade can alter the compositional mix and location of jobs without necessarily having an effect on long-term inequality. Some research has indicated that globalization might have contributed to the increase in incomes of high-income individuals and their firms, such as high-tech multinational firms (\"superstars\" in their terminology), in part by expanding markets. This phenomenon could contribute to income inequality, but it did not do so by harming the wages of unskilled workers, but rather by increasing wages and profits (income) at the top of the income distribution. As for the decline in the labor share of income, that decline is unlikely to be linked to a traditional argument that the country has moved toward labor-intensive imports because the labor share has also fallen in the nontradeable sector (such as construction, sectors that involve the distribution of goods, and some services). However, the growth of highly successful multinational \"superstar\" firms may have made a contribution because the increased income would be capital income rather than labor income. In general, although estimating the effects of trade is complex, the current empirical evidence does not appear to support trade rather than technology as the more important cause of relative wage stagnation at the lower end of the wage distribution. Technology, education, and trade explanations of the change in income and wage inequality are based on normal forces of supply and demand. However, economists studying the rise in inequality have also considered the decline of labor institutions that may have protected higher wages at the lower end of the wage distribution. This section considers three aspects of these wage-setting institutions: the minimum wage, union membership (and right-to-work laws), and the change in wage-setting norms (such as the large firm wage premium). The federal minimum wage, currently $7.25 per hour, is not indexed to inflation, and thus the real value has risen and fallen in an irregular pattern over time. For example, the minimum wage in 2015 dollars fell from $9.44 in 1979 to $6.34 in 1989. It has fluctuated since then, and declined from 1997 to 2006 to a lesser degree (from $7.58 to $6.23), and then increased. Some early studies found that the decline in the value of the minimum wage in the 1980s was responsible for the steep decline in relative wages at the bottom of the wage distribution during that time period. Some economists argued that the increase in inequality was an episodic event due to the minimum wage and was not traceable to skill-based technological change. A number of years have passed since these early studies and, while inequality at the bottom has stabilized (although with little real wage growth), the inequality increases have continued. This growth in inequality was primarily in the upper half of the wage distribution at levels where it could not have been due to the minimum wage; the study noting that point found a skill-based rather than minimum wage cause for changes through 2005. A study that extended data through 2012 and accounted for state minimum wages found negligible effects for male inequality between the 10 th and 50 th percentiles, finding a meaningful effect only for women. These findings suggest that the minimum wage may have played a relatively small role in increased inequality. Union membership in the private sector, which has been historically associated with a positive union wage premium (higher wage for union members) for blue-collar workers, declined significantly during the period of rising wage inequality. From 1973 to 1993, union membership in the private sector declined from 31% to 13%, and by 2018, it had declined to 6.4%. (Union membership in the public sector has increased slightly over that period, from 28.9% in 1973 to 33.9% in 2018.) There are two major reservations about assigning an important role to union membership in explaining increasing inequality in wages. The first is that during the period of the greatest decline in relative wages in the lower half of the distribution, the effect of unions, as determined by multiplying the differentials in the union wage premiums (increased wages due to union membership) across incomes by the change in union membership, accounted for only a small share of the difference (about 8%); the study reporting this effect also found that most of the change was due to technological change. Other studies indicate that the effect would be largely for men, perhaps up to 20% in that early period (the 1980s); over a longer time period, effects were confined to men and associated with increased inequality in the upper half of the wage distribution but reduced inequality in the bottom half. Another study, however, suggested that the union wage premium might understate the effect of unions to the extent that it establishes norms for nonunion jobs in the area or provides a threat to employers who could potentially lose workers to union jobs, finding that the decline in unions was responsible for one-third to one-fifth of the decline in wage inequality for men from 1979 to 2007, and up to one-fifth for women. This study suggests union effects could be larger than otherwise projected. Although some studies find significant effects from union membership in reducing wage differences, as acknowledged by the authors of studies finding a larger union effect, it is difficult to disentangle these effects from the effects of other factorsâparticularly technological changeâthat might have independently contributed to both wage inequality and the decline in union coverage. If technological change caused a decline in employment in industries that were typically heavily unionized, then the cause is primarily technological change, not deunionization. In addition, there is some evidence that the union wage premium (i.e., the excess of earnings of unionized versus nonunionized workers) has fallen in the private sector, which could have arisen from reduced firm profits (shared with workers) due to foreign competition or from technological advances. One policy tool that potentially affects union density as well the bargaining strength of unions is right-to-work (RTW) laws, which have been adopted in 27 states, predominantly in the southern, western, and midwestern states. Under RTW laws, workers receive the benefits of the union contract, but are not required to pay union dues. Many RTW laws have been in place for a long time, although recently, between 2012 and 2017, five statesâIndiana, Michigan, Wisconsin, West Virginia, and Kentuckyâadopted these laws. There is an extensive economics literature on RTW laws, although these studies are limited by an inability to control for preexisting antiunion sentiment or other unobserved variables (for example, southern states have historically had lower wages for other reasons and are more likely to have adopted RTW laws). Even so, most studies find relatively small effects on wages. A study that controlled for these potentially unrelated differences across states by examining the change in wages in states that recently adopted RTW laws found results suggesting a negligible effect. Overall, these studies suggest that RTW laws may reduce union membership and bargaining strength, with little effect on wages, particularly nationally. This reduction in wages was presumably spread over the income spectrum so that the effect on rising inequality is limited. Because most RTW laws (20 out of 27) were adopted prior to the increase in wage inequality, these laws would likely have played only a small role, if any, in the increase in inequality that began in the 1980s. Another wage-setting feature that appears to be fading is the large firm wage premium. Large firms tend to pay a premium, particularly to their lower-paid workers, compared with smaller firms. Wages paid by a firm with 10,000 employees were estimated to be 47% higher than those of smaller firms in 1980-1984 and 20% higher in 2010-2013, although researchers estimated that about a fourth of the decline was offset by increased fringe benefits. One estimate indicates that the decline in this premium accounted for 20% of the wage inequality from 1989 to 2014 (note, however, that this period postdated the major increase in inequality in the 1980s). One cause for the decreased premium is the decline of internal labor markets (ILMs) in large firms, in which wages are assigned to jobs rather than workers (that is, pay is set for doing a particular job and not for how well that job is done). ILMs were developed to curtail managerial discretion in order to reduce discrimination, favoritism, and nepotism, and were aimed at creating a sense of internal pay equity. ILMs compressed wages horizontally (across workers at similar levels) and vertically between more- and less-skilled workers, largely through raising the wage floor. The objective of ILMs was to ensure worker loyalty, reduce shirking, and discourage unionization. The decline in ILMs responded to a less certain environment where technological advancement, globalization, and deregulation increased competition. Signs of the decline in ILMs include reducing returns to tenure, more external hiring, lower tenure rates, a reduction in firm-sponsored training, and more pay-for-performance. Pay-for-performance has tended to reduce wages at the lower end and increase them at the higher end. Large firms also increased contracting with other firms and individuals to perform tasks (outsourcing), where wages can be dispersed without triggering a perception of wage inequity (this phenomenon is also referred to as the fissured workplace ). Some evidence indicates that outsourced janitors and security guards earn less than internal employees. Highly skilled employees may gain, however, from outsourcing. Other factors include the decline in unionization and a change in the view of the firm as a social institution that has occurred with global competition, technological advancement, and pressures from shareholders. Ultimately, the large firm wage premium, as with the decline in union wage effects, appears to be traced back, in part, to fundamental economic changes, which increased competition through technology and globalization. Another factor sometimes suggested as contributing to slow growth in the wages of less-skilled individuals is immigration. As with trade, the effect of immigration on wages and their dispersion cannot be determined a priori. Although immigrants increase the labor supply, they also increase the demand for goods and services. Immigrants in many cases are not close substitutes for native workers (for example, for jobs that require English language skills). Also, they may provide cost savings to firms that are passed along to consumers in the form of lower prices. There is an extensive literature estimating the effect of immigration on the wage structure by comparing wage changes in geographical locations with more immigrants to those with less or comparing occupations with more entry by immigrants to those with less. After a review of the evidence derived from two dozen studies, the National Academy of Sciences concluded in 2017 that the impact of immigration on the wages of native-born workers is small, and the effects are most likely on those who have not completed high school, for whom immigrants with low skills are the closest substitutes. Even in those cases, studies typically found effects on wages of less than 1% due to immigration. That study also indicates that there is little evidence of an effect on employment levels for the native born, although there might be effects for prior immigrants. Some evidence suggests that skilled immigrants have a positive wage effect on some groups of native-born workers, and immigration overall has a positive effect on long-term economic growth. One challenge with studies of immigration is controlling for the immigrants' choice of location or occupation (although a variety of methods have been used to do so). The findings cited above are bolstered by the results of the study of a rare natural experiment, the Mariel boatlift in 1980, where immigration occurred due to an external event when Cuban leader Fidel Castro allowed Cubans a temporary freedom to emigrate. A large share of the Cubans came to Miami, increasing the labor force there by about 7%. These immigrants were largely unskilled, with a high school or less education. No statistically significant effect was found on wages and employment of non-Hispanic workers with a high school or less education. The Mariel boatlift, although occurring many years ago, remains relevant because of the large surge of immigrants relative to the size of the labor force and the rare opportunity to examine a natural experiment that automatically controls for immigrants' choices. For income distributions, the foreign born would be included in the overall statistics and could increase inequality if they tended to have lower wages. The share of the workforce that is foreign born has been increasing, from 6.7% in 1980 to 9.2% in 1990, 12.4% in 2000, 16.5% in 2010, and 17.0% in 2016. However, little of the growth appeared in the 10 years between 1980 and 1990, when the increase in the college skill premium occurred. The foreign-born share, after a decline that began around 1910, began to increase about 10 years earlier than the increase in inequality observed from 1980 to the present. However, because immigrants are concentrated in both the upper and lower ends of the skill distribution, including them results in a small contribution to inequality. Another factor that may contribute to lower wages is the recently observed decrease in labor force mobility, in which data have shown declining interstate mobility and declining worker job changes. Although there have always been barriers to labor mobility (both social and economic), some decline might be due to an aging workforce or industry diversification (that is, more options for employment with a number of firms as compared to those with a dominant large employer) within a locality, although evidence indicates reduced mobility has also occurred among young workers and across educational types. Some effects of reduced mobility on wages may be associated with increasing employer concentration, which increases the ability of employers to set wages if there are few competing employers, such as in a one-factory town. There is some evidence of increasing employer concentration reducing the share of wages in manufacturing, but the estimated effect appears to be small. Labor mobility is an important guard against the power of employers, and some recent attention has focused on certain practices of firms and governments that limit changing jobs. Effects can arise from noncompete covenants (where employees agree not to join or start a competing firm). Employers justify noncompete contracts to recover the cost of training or protect trade secrets. Noncompete contracts are more likely to be found in high-paying jobs, but some evidence suggests they are also common in low-paying jobs. A related phenomenon is no-poaching contracts that ban other firms from hiring each other's employees; recent publicity and actions of state attorneys general about such practices in a number of large fast-food chain franchises has led to an agreement to end these practices. Other factors that might have contributed to reduced labor mobility are an increase in occupational licensing (although it is more likely to apply to more-educated workers) that increased barriers to entry and increased constraints imposed over time by high housing prices arising from land-use regulation, especially among lower-income workers. Geographic mobility may also be limited by the lack of portability of public benefits across state lines. The growth of health insurance tied to the employer may have also reduced job mobility, although this effect may be reduced due to the availability of subsidized insurance under the Affordable Care Act. Barriers to moving in the state and local public sector may occur due to defined benefit pensions. Subsidies to homeowners (such as itemized tax deductions for mortgage interest and property taxes) may benefit higher and middle incomes, but homeowners are the driving force behind zoning restrictions that make housing more expensive for relocating workers. The 2017 tax revision ( P.L. 115-97 ) has, however, significantly reduced the scope of these tax subsidies by limiting itemized deductions and increasing the standard deduction. These changes are scheduled to expire after 2025. While some specific changes in policy may be suggested by the review of the causes of wage stagnation, it is not clear that simply reversing the causes would outweigh the benefits society accrues more broadly through technological advance and trade. This section discusses some policy options for those left behind by economic growth that might be considered if there is a desire to increase lower- and middle-income individuals' incomes or reduce inequality. Numerous targeted tools exist that the federal government could use to intervene to affect the income distribution. These policies include direct taxes and transfers that increase after-tax earnings; other policies that might increase pretax wages, such as wage subsidies and the minimum wage; and a variety of policies that might potentially provide more equality, such as education and training programs and relocation assistance. This discussion is intended to provide a review of a broad sweep of proposals. An in-depth analysis of each proposal is beyond the scope of this report. Many of these proposals would involve a cost in lost revenues from transfers, tax subsidies, and incentives, or from additional spending, which should be weighed against alternative uses of resources. Many of the regulatory changes discussedârelating, for example, to unions or to practices affecting labor mobilityâare controversial and involve a trade-off between benefits to labor income and efficiency costs of intervening in a market economy. The discussion in this report is based on pretax income, but government tax and transfer programs have affected the shape of posttax and post-transfer income. Table 2 reports estimates that show that the after-tax distribution is more equal than the pretax distribution and that tax and means-tested transfers played a bigger role in 2016 than in 1979. In 2016, taxes and transfers increased the income of the bottom quintile by 70% and increased the income of the second quintile by 6%. The third, fourth, and fifth quintiles had their income decreased via net tax payments by 9%, 16%, and 27%, respectively. These transfers provided the bottom 20% with a larger share of the income total, although some of those benefits were to those on public assistance. An increase in the income share of low-wage workers could be accomplished by a combination of reducing the taxation of lower-income workers, increasing direct transfers, and expanding refundable tax credits (which differ from ordinary transfers by being delivered through the tax system). Lower-income workers may benefit from programs providing general transfers or specific benefits, such as subsidies for food, housing, health insurance, and health care. If using transfers to address increased inequality, one consideration is whether to tie a transfer to wages or to make it a general transfer. For example, proposals for some forms of a universal basic income would provide a grant to everyone to provide a minimum income floor that could support individuals in all circumstances. Unless the plan is phased out with income, it could become quite costly, although it could substitute for targeted transfer programs. It could also be a work disincentive, particularly if phased out. Such a concern was raised in the past about a form of phased-out grant called a negative income tax where experimental studies showed work disincentives. An alternative approach is to expand the current earned income tax credit (EITC), a refundable credit based on wages that empirical studies have indicated encourages work. The EITC provides a credit for a percentage of wages up to a maximum where the credit is fixed over an income rate and then phased out. There has been particular interest in the tax treatment of childless workers who are eligible for a very small EITC. For 2018, families without children received an earned income credit of 7.65%, for a maximum credit of $519, which began phasing out below the poverty level. Families with one, two, or three or more children received credits of 34%, 40%, and 45%, respectively, and maximum credits of $3,461, $5,716, and $6,431, respectively. Childless workers can receive the credit only between the ages of 25 and 64, although some of these workers without children are noncustodial parents. Proposals have been made in the past to increase the credit and phaseout for childless workers, along with a variety of proposals to lower the minimum age to 21 or to increase credits in general, including for workers with children. The Economic Mobility Act of 2019 (Representative Richard Neal, H.R. 3300 ), ordered to be reported by the House Ways and Means Committee, would expand the EITC for childless workers for two years. It would double the credit rate to 15.3%, increase the maximum credit to $1,464, and increase the income level at which the credit phases out. It also would reduce the eligible age to 19 for those other than full-time students. Several other proposals have been advanced in the 116 th Congress to expand the earned income credit, including the LIFT the Middle Class Act (Senator Kamala Harris, S. 4 ); the Rise Credit unveiled by Senator Cory Booker; the Cost-of-Living Refund Act of 2019 (Senator Sherrod Brown and Representative Ro Khanna, S. 527 and H.R. 1431 ); and bills to expand the earned income credit and the child credit (Senator Sherrod Brown, with numerous cosponsors, S. 1138 , and Representative Daniel T. Kildee, H.R. 3157 , the latter titled the Working Families Tax Relief Act). Expanding the earned income credit would cost varying amounts depending on the proposal. The current EITC costs about $70 billion a year. The expanded EITC in H.R. 3300 for childless workers (proposed for 2019 and 2020) would cost an average of $9.7 billion a year. (This bill proposes some other minor changes in the EITC that are not included in this estimate.) In 2017, the Tax Policy Center estimated the cost of a variety of EITC proposals, with costs ranging from $0.5 billion per year (to double the credit for childless workers and reduce the age of eligibility to 21) to $21.6 billion for a general increase in credit rates. These changes would involve a modest increase in the credit. Larger increases or expanding overall benefits could cost considerably more. The LIFT the Middle Class Act, which has been proposed previously, has been estimated to cost close to $300 billion a year. The act would allow cash transfers of up to $6,000 for married couples (phased out at $100,000) and half that amount for singles. Earned income credits have the advantage of increasing income while encouraging work, but they reduce revenue and must be paid for by additional taxes or spending cuts, either now or in the future. If the object is to help low-income workers, these other changes should generally fall on higher-income individuals. One proposal that also contains a way to pay for the revision would replace the current EITC with a credit for 100% of the first $10,000 of earnings, paid for with an 11% value-added tax (VAT). An alternative to credits to workers is providing employer wage credits. As with the EITC, the credit would be phased out to be targeted to lower-wage workers. Employer wage subsidies as a broad alternative to the EITC have not been adopted in the past and are not among active proposals except for narrowly targeted subsidies. The current general subsidy in place is the work opportunity tax credit (WOTC) for hiring individuals from certain targeted groups who have consistently faced significant employment barriers; it is a small program costing about $1 billion a year. Studies of this program have found a relatively low participation rate, although there is evidence that the credit results in higher wages for eligible employees and has expanded employment opportunities for long-term welfare recipients and disabled veterans. Some reasons for the low participation rate (firms may lack information or interest in a government program, or encounter high transaction costs or difficulties in identifying qualified workers) might not apply to a general wage subsidy, which could be more effective. Also, geographically targeted credits (discussed subsequently) and incremental tax credits (for increased hiring) have been used as a stimulus in past recessions, with mixed evidence on their effectiveness. An employer credit differs from an employee credit because the former cannot be based on family characteristics (including total family income). Also, in cases where the employer is paying the minimum wage and would continue to do so with the employer credit, there is no effect on wages, although the employer may be willing to hire employees who would not be hired without the subsidy. Employer subsidies have been confined to narrowly focused programs that are unlikely to have much effect on the broad issue of wage inequality. There do not appear to be any proposals for a general employer wage credit that would phase out with income. Both existing policies and proposed ones have indicated a preference for the employee-side credit (i.e., the EITC) rather than the employer credit as a generally available benefit for low-income workers, perhaps due to the desire to means test based on family income. An increase in the minimum wage would increase after-tax earnings, as a tax credit for working like the EITC does, but with some important differences. There is no explicit cost to the government (other than slightly higher wages for a small number of government employees); rather, the higher minimum wage benefits lower-wage workers and the cost is spread to other consumers through higher prices and reduced business income. Using a higher minimum wage to provide income to less-skilled workers can also cause unemployment. The trade-off depends on how responsive employer hiring is to increases in the required wage. Unlike the minimum wage, the EITC can also be based on family income and need (although this flexibility in the EITC has resulted in minimal benefits for childless workers). A generally higher minimum wage would provide benefits to teenagers and other younger individuals (such as college students) who may still be receiving support from parents or other family members and may come from higher-income families. A 2019 CBO study estimated the effects of raising the minimum wage to $15, $12, and $10. For the $15 option, the minimum wage would be indexed and exemptions for tipped, teenage, and disabled employees eliminated. While indicating that effects on employment are highly uncertain, CBO's median estimates for 2025 are reduced employment of 1.3 million for the $15 level, 0.3 million for the $12 level, and a negligible effect for the $10 level. Families below the poverty level would have incomes increased (in 2018 dollars) by $7.7 billion (a 5.3% increase in income), $2.3 billion (a 1.6% increase in income), and $0.4 billion (a 0.3% increase in income) respectively. Families with incomes between one and three times the poverty level would have incomes increased by $14.2 billion (a 3.5% increase in income), $2.3 billion (a 0.6% increase in income, and $0.3 billion (a negligible percentage increase in income), respectively. Higher-income families would have income reduced because of increased price levels. CBO's findings that a relatively small number of workers would be unemployed, especially for the smaller increases in the minimum wage, are based on its reading of the literature, although arguments have been made that the employment effects should be lower. Conflicting evidence exists on the minimum wage's effect on employment, with some studies finding no effect and others finding reductions in jobs or hours. If the minimum wage causes enough unemployment or lower hours, raising it has the potential to reduce earnings at the bottom of the income distribution, even though it increases earnings at the bottom of the wage distribution for those who remain employed. Effects found in prior research may be smaller than they were in the past. A number of states and localities have minimum wages higher than the federal minimum wage, and some have been raising them recently. In 2019, 13 states and the District of Columbia raised their minimum wages, with some of these increases stemming from ballot initiatives rather than state legislative actions. In addition, 18 states increased their minimum wages based on the cost of living. In 2020, 14 states increased their minimum wages due to previously approved legislative actions or ballot initiatives and 7 states increased levels based on the cost of living. Another proposal, which has its roots further back in history, is a guaranteed job at a specified wage. Senator Kirsten Gillibrand has expressed some interest in such a plan. Senator Cory Booker has proposed a pilot program in high-need communities ( S. 2457 ). Senator Bernie Sanders has also proposed a federal job guarantee. A plan called the National Investment Employment Corps, administered by state and local governments with federal grants, would provide universal job coverage for all adult Americans with a minimum annual wage of $24,600 for full-time work and a minimum hourly wage of $11.83, indexed for inflation. The jobs would also include fringe benefits. The proponents contend that this program would set a floor in the labor market similar to a minimum wage and would provide jobs that address community needs, such as infrastructure, education, child and elder care, and other needs. They argue that the proposal would both end involuntary unemployment and eliminate working poverty. Another plan, the Marshall Plan for America, would target those without college degrees and pay $15 an hour, possibly including attendance at training programs. These types of plans are estimated to be costly, with two estimates of the more general plan at $450 billion to $670 billion per year, although some behavioral responses and declines in other transfers might reduce the cost. Aside from how to pay for a potentially large-scale program, many challenges may arise. Because there is cyclical fluctuation in unemployment, the size of the guaranteed job workforce would fluctuate, making a match between workers and needed tasks difficult. Unlike the market economy that determines jobs and products based on consumer demand, the assignment of work and output would have to be determined by fiat. When goods provided by the government are not based on the needs for collective goods or goods with public spillovers (such as a military force or highways), misallocation of resources may be more likely to occur. Some resources would be diverted from the private sector with a higher effective minimum wage through the government job alternative. There are also issues as to whether jobs would be established to match needs in local communities, and there could be considerable challenges with programs in sparsely populated rural areas. There might be a need for background checks and proper job placement because some applicants may not be suitable for certain jobs (such as home health care or child care). There are issues about how to treat workers who violate the terms of employment (such as persistent tardiness). Finally, jobs may need capital inputs (e.g., construction equipment) and supplies, and workers in rural areas may have problems finding transportation. Wage insurance policies were proposed during the slowing of the economy in 2001 to relieve worker anxiety, counter the drop in earnings (estimated at an average of 16% for manufacturing workers), and encourage rapid reemployment. Wage insurance provides a payment for a period of time for part of lost wages when workers become involuntarily unemployed. Wage insurance was subsequently added to the Trade Adjustment Assistance program that currently applies to workers who are certified as having lost their jobs because of trade. This policy idea was mostly dormant until President Obama proposed wage insurance in his final State of the Union message in 2016. The proposal would apply to those making less than $50,000 and employed for three years: it would replace half of lost wages up to $10,000 for up to two years. CBO estimated a $3 billion annual cost. Canada had a temporary wage insurance pilot program, which was more generous than the Obama proposal, and some states have had wage bonuses for becoming reemployed. Some evidence suggested that subsidized workers reentered the workforce about 4% faster than those not subsidized. Concerns have been raised about eligibility and targeting in order to avoid providing incentives for workers to conduct poorer job searches and attracting workers with less stable work histories and employers that provide less stable unemployment. There is a potential benefit of the employer not being aware of the supplement (which is also the case for the EITC), thus reducing the potential stigma that some evidence suggests makes employers less likely to hire those with hiring vouchers. This lack of knowledge would also make it more difficult for the employer to offer reduced wages to those eligible for the supplement. Wage insurance would not help those permanently at the bottom of the income distribution but would help workers who lost their jobs to technological change or other factors adjust to new employment. The government (at all levels) has a major role in providing for formal education through public schooling and subsidized state colleges and universities. The federal government provides grants (including means-tested Pell grants for students), student loans, and tax credits (which are of limited benefit to lower-income individuals because they are not fully refundable). Pell grants are available for certificates and occupational degrees, although they may not be available for short-term training because they are prorated for full versus part time and duration. Pell Grants are authorized at $22.5 billion, and tax credits cost $19.1 billion. Career technical and education services at the secondary and postsecondary levels are supported by the Carl D. Perkins Career and Technical Education Act of 2006 ( P.L. 109-270 ), which is funded at slightly over $1 billion. The Workforce Innovation and Opportunity Act (WIOA) provides employment and training for low-income and skills-deficient job seekers and workers laid off from their jobs. The workforce development programs include state formula grant programs of $3.3 billion, the Jobs Corps at $2.0 billion, and some national programs at $0.3 billion. For adult education and literacy, the amount is $0.7 billion. For rehabilitation for individuals with disabilities, $3.7 billion is available, primarily through $3.3 billion in rehabilitation grants to the states. Proposals to increase skill acquisition when young and support lifetime training to respond to changes in labor demands include expanding current higher education grant programs and making the tax credits refundable, or providing free education at community colleges or public universities. Some plans are aimed at improving the effectiveness of community colleges, where too little guidance may cause students to waste time and money, increasing the dropout rate and making the transfer of credits to four-year colleges more difficult. Another option is to expand WIOA programs. The evidence on the predecessor of WIOA, the Workforce Investment Act, indicated that the adult programs (whether they included training or not) were relatively successful in improving labor outcomes (higher wages and jobs), but not for dislocated workers. The Jobs Corp (a residential program for youths) also appeared to be relatively successful, although the Trade Adjustment Assistance program was relatively ineffective. Note that the size of spending in the United States on these programs is small (0.04% of GDP) compared to many other countries, and evidence is limited both due to data challenges and lack of interest by researchers given the program's small size. WIOA spending might be more effective if training were based on sectors and aimed at acquiring skills that could be used by multiple local employers rather than one company ; if it were planned with both labor and management input ; and if funding for labor management workforce intermediaries were provided. Apprenticeships are a proposal for those who do not wish to go to college or do not think they would succeed, largely for young entrants to the labor force. Employers may be reluctant to provide these programs because, once trained, apprentices may leave for other jobs. Apprenticeships could be funded through grants or tax credits for employers, or through funding training institutions, such as community colleges. S. 393 (Senator Tim Scott and Senator Cory Booker), introduced in the 115 th Congress and known as the LEAP Act, would have provided a credit for employers participating in qualified apprenticeship programs. The LEAP Act was introduced in the 116 th Congress by Representative Frederica Wilson ( H.R. 1660 ), Representative Rodney Davis ( H.R. 1774 ), and Representative Tom Reed ( H.R. 4238 ). Although grants are more cumbersome to administer, tax credits provide an incentive to classify all new hires as apprenticeships. Grants could be used to target apprenticeships to high-growth industries. Proposals have also been made for a general worker training tax credit for employers that would be allowed for training that led to an industry-recognized certification or training programs authorized under WIOA. President Trump has also proposed an expanded apprenticeship program that would include more industry involvement, although some have argued this proposal would weaken apprenticeships. Other options include tax subsidies and matching funds for lifetime training accounts or penalty-free withdrawals from retirement accounts, although most lower- and middle-income individuals usually do not have much in savings, retirement accounts, or, in many cases, pensions. S. 379 and S. 275 (Senator Amy Klobuchar, 116 th Congress) would allow tax-free distributions from tax-advantaged education savings plans to be used for expenses for various training and technical education. Uncertainty about work schedules is a barrier to training, especially for workers in lower-paying service-sector jobs. Senator Warren previously sponsored legislation that, among other things, would have required employers to give two weeks' notice of work schedules. It is not clear whether the decline in union membership was a reason for growing income inequality or whether the decline was itself the consequence of other factors, such as technological advancement and greater international competition. In addition, while unions act as a counterweight to the market power of employers and aid in workers sharing firms' extra profits, they can also create economic distortions by setting wages in a way that differs from how they are normally set in markets. There is, however, some evidence that unions increase blue-collar workers' wages, and increasing the size and effectiveness of unions is among proposals that could be considered. A package of these proposals has been advanced, including increasing penalties for employers who violate labor laws, prohibiting the hiring of replacement workers in a strike, establishing a mandatory arbitration process, eliminating right-to-work laws, and giving all public-sector employees the rights to organize and belong to unions. There is not much evidence about how successful these changes would be in increasing union membership. As noted in the discussion of right-to-work laws, there is some evidence that such laws reduce the bargaining strength of unions and lead to reduced wages. Another proposal does not involve government policy but would need to be undertaken by unions and union organizers: to organize multiemployer regional or local unions rather than company-wide unions. Company-wide unions face greater difficulties, as large employers are increasingly dispersed over a broad geographic area. Proposals to address the decline in labor mobility include increasing scrutiny of mergers for harmful labor market effects, banning noncompete agreements for low-wage workers, and banning no-poaching agreements. Some actions have already been taken on no-poaching by the Federal Trade Commission and the Department of Justice, in issuing regulations and pursuing cases under antitrust laws. Senators Cory Booker and Elizabeth Warren have proposed to outlaw no-poaching clauses in franchise agreements ( S. 2215 ). Other actions to encourage mobility include reducing tax subsidies for home ownership, as homeownership is a barrier to mobility itself as well as a driver of zoning restrictions (note that reductions were enacted on a temporary basis in the 2017 tax revision); providing greater enforcement against restrictive zoning that harms minorities; revising antitrust law to address state-sanctioned occupational licensing organizations; harmonizing eligibility rules for federal transfers; providing a tax subsidy for moving (a deduction for moving expenses was temporarily eliminated by the 2017 tax revision); providing cash subsidies to cities or states that relax zoning or make occupational licenses transferable across state lines; and providing penalties (e.g., disallowing the mortgage-interest deduction) in localities that do not permit enough housing construction. There are arguments for policies that discourage labor mobility, and land-use restrictions may benefit local residents even if they ultimately harm overall growth. Homeownership has benefits that may offset its negative impact on mobility. Employers also would argue that noncompete and no-poaching clauses are needed to allow a return on the cost of training and to protect trade secrets (although some question how important these concerns are for low-wage employees). An alternative to encouraging geographic labor mobility would be policies to increase economic activities in areas (often smaller cities and rural areas, but also larger cities) that face chronic unemployment. Geographically targeted subsidies have existed for many years in the income tax code, beginning with enterprise zones and currently including empowerment zones, the new markets tax credit, and the recently enacted opportunity zones. These programs are aimed at helping workers in distressed areas. These geographically targeted subsidies have generally not been found to be effective in encouraging jobs because they are of small size, they are sometimes limited to local employers, and most have encouraged investment rather than employment (investment in physical capital can take place with little additional employment or even displace labor). Three types of policies directed to high-unemployment areas might be considered: wage subsidies, training funds, and government infrastructure or facilities investment. Of these, location of public activity (e.g., military bases and veteran's facilities) and infrastructure facilities are perhaps most problematic. Infrastructure needs are determined by the population, and federal workers are a small part of the labor force. Imposing geographical restrictions could undermine other objectives as well. Another option is to adopt a guaranteed jobs programs in high-unemployment areas, such as in the pilot proposal advanced by Senator Cory Booker ( S. 2457 ). Some propose to benefit low-income individuals by taking actions to generate overall economic growth, which often involves tax subsidies to investment. There are issues with this approach that suggest a consideration of the more targeted proposals. The first is that the past 40 years have shown that some groups can be left behind with economic growth that arises from technological advancement. The second is that it is difficult to formulate policies to stimulate economic growth using common approaches such as lowering marginal tax rates. Evidence suggests that tax cuts may not be particularly successful because supply responses are relatively inelastic. Additionally, a tax cut that is not financed by spending cuts adds to the deficit, which eventually crowds out private investment. Wages at the bottom and, to a lesser extent, the middle of the wage distribution have grown slowly relative to those at the high end over the past 40 years, and this slow wage growth, along with a decline in the labor share of income, has contributed to a growing inequality of income. The evidence on the causes of wage stagnation for lower-wage workers points to technological advancement as the most direct primary cause. Globalization appeared to have smaller effects than technological advancement, although it increased overall income inequality by increasing incomes at the top. The decline in wage-setting institutions had relatively small effects and some of these effects can be traced to an indirect effect of technological change that affected unions and the large firm wage premium. Immigration changes appeared to have little or no effect. A decline in labor mobility appeared to make a small contribution. A variety of policy options have different promises and drawbacks. Perhaps the most successful policies, at least based on experience, are transfer programs, including the earned income credit, which is targeted to low-income wage earners. These programs involve potentially large costs and may require raising taxes on higher-income individuals. There is only limited evidence of the effects of a universal basic income and it would be costly if not phased out. Past evidence on a phased-out program found some negative effects on work effort. Experience with the minimum wage, at least at prior levels, has indicated an ability to transfer income with relatively small effects on unemployment, although the effectiveness of increases in the federal minimum wage is limited by widespread state adoption of higher minimum wage rates. Some policies, such as employer wage subsidies, worker training and employment programs, and geographic incentives, have had a mixed or relatively poor track record. Other proposals have been largely untried (such as a federal job guarantee and wage insurance); a job guarantee could cost several hundred billion dollars a year, according to estimates, and present some potentially problematic effects on the private economy, as well as difficulties in administering the program. Some of the more limited proposals may be successful but have small effects. Policies to benefit lower-income individuals through tax cuts to stimulate economic growth have not appeared to be particularly successful at addressing slow wage growth for low-wage workers. ", "summary": "Over the 1979-2018 period, real wages at the 10 th percentile of the hourly wage distribution grew by 1.6%, whereas wages at the 50 th percentile grew by 6.1% and wages at the 90 th percentile grew by 37.6%. These patterns varied by sex, race, and ethnicity. Most of the increase in wage inequality at the bottom of the distribution occurred by 1990 and leveled off by 2000, whereas inequality continued to grow at the top of the distribution after 2000. Lower wages are associated with less education, and the college wage premium (the ratio of earnings of those with a college degree over those with a high school degree) grew steeply until 2000. The labor income share of compensation has declined beginning around 2000. Both the growth in hourly wage inequality and the decline in the labor share of compensation contributed to greater inequality of before-tax income. From 1979 to 2017, the income share of the bottom quintile fell from 5.3% to 3.5%, whereas the share of the top quintile rose from 41.9% to 50.1%. Several factors potentially contributed to this change in wage inequality: technological advancement, globalization, wage-setting institutional changes (i.e., the minimum wage, presence of labor unions, and decline in the large firm wage premium), immigration, and declines in job mobility, across jobs in general and geographically. A review of the economic research suggests that a major force in causing this growing wage inequality and lower wage growth was skill-based technological change (change increasing the demand for skilled over unskilled workers). Although there is mixed evidence, most studies find a smaller, modest effect of globalization (although trade affects locations and sectors differently). The minimum wage appeared to play a relatively small role. The decline in wages has coincided with the decline in unions, but to some extent, the decline in unions was a consequence of the decline in jobs in heavily unionized sectors due to technological advancement. Given the size of the decline and the union wage premium, as well as tracing some of the decline to technology, unionization appears to be of limited importance. The decline in the wage premium for large firms may also be traced to increased competition from technological advancement and globalization. Evidence also indicates that immigration had little effect on the distribution of wages, but resulted in a slight increase in inequality because immigrants are concentrated at the upper and lower ends of the income distribution. A decline in labor force mobility has occurred in recent years and could have contributed in some way to inequality. Because the causes of the wage stagnation and growth inequality appear to be traceable largely to technological change, which is otherwise valued, other policies might be considered to increase the well-being of workers whose wages have stagnated. One policy option is to either increase transfers, including those provided through the tax structure, such as the earned income tax credit. Childless workers, in particular, have small earned income credits. Another option is to increase the federal minimum wage, although states are gradually undertaking these increases. A more far-reaching policy option is a federally guaranteed job. Proposals have also been made to expand wage insurance, which currently is available to only a narrow group of trade-affected workers. Policies to increase skill acquisition, including a greatly expanded apprenticeship program, could be considered, although they would have delayed effects on inequality. A variety of policies have been advanced to strengthen unions. In addition, a number of policies might be considered to increase labor mobility. Finally, a variety of geographically targeted provisions aimed particularly at increasing employment in chronically high unemployment areas could be considered. Transfers, including the earned income credit, have improved the distribution of after-tax income, but some other policies have a less successful track record, and some (such as a guaranteed job) are untried.", "document_type": "crs"}
{"report": "Traditional macroeconomic theory addresses two main questions. First, macroeconomic theory and policy seek to mitigate short-term economic fluctuations (or stabilize the economy) that leave productive resources idle for a time. Second, macroeconomists seek to recommend public policies that maximize living standards (economic growth) over the long term, while keeping debt at sustainable levels. The role of monetary policy and the maintenance of a stable price level are embedded in both issues. In the past few years, the U.S. economy has experienced persistently low interest rates despite near-full employment and federal deficits and debt significantly above their historical averages. These characteristics have led to debate over the optimal trajectory of long-term federal debt in an economic environment with relatively low borrowing costs. Recently, an economic theory outside of mainstream economic views, called Modern Monetary Theory (MMT) by its proponents, has been receiving attention in the public debate. Interest in this theory may in part reflect concerns about the deficit financing needed for new spending programs in health, education, infrastructure, and other areas. MMT suggests that deficit financing can be used without harmful economic effects in circumstances of low inflation rates and low interest rates, conditions that currently exist despite indications that the country is at full employment. This report first explains mainstream macroeconomic theory. It then surveys the available MMT literature to provide a basic understanding of the differences (or lack thereof) between the defining relationships established in MMT and mainstream economics. It next discusses whether MMT can be used to justify deficit financing. Finally, it discusses how existing government institutions may present barriers in adopting the prescriptions of MMT for managing the economy. Unlike mainstream macroeconomic theory, where consensus has been reached on how core relationships translate into mathematical equations, there is no comparative mathematical statement of MMT. Some academic economists have translated MMT into a mathematical framework, and the explanation of the differences between mainstream and MMT theory are based on those discussions. Proponents of MMT do not necessarily accept that framework, however. Although basic macroeconomic models vary in many ways, any macroeconomic model that allows for fiscal and monetary policy to influence the economy has three relationships in the economy that must be in balance: (1) the asset market where investment equals saving (called the IS curve ), (2) the money relationship where the supply and demand for money must equate (commonly called the LM curve ), and (3) the economy-wide relationship where aggregate demand equals aggregate supply. The first two of these equations compose what is referred to as the IS-LM model . These three relationships, in turn, determine output, prices, and the interest rate in the economy. Macroeconomic models formalize the relationship between economic variables, allowing researchers to quantify the effect of a change in one variable on the rest of the system (also called comparative statics ) and to observe how economic patterns align with model predictions. The IS-LM model is characterized by a limited role of expectations of future economic conditions and sticky prices . While there are a number of different macroeconomic models, especially those that add expectations, this section uses the simplified model, which forms the core of forecasting models as well as models used by government agencies in projecting the economy. More sophisticated forecasting models of the economy have many equations that capture variation in types of goods, investments, and assets, but this simplified model can be used to explain the standard model and provide a foundation for interpreting MMT. Most academic research is directed toward more complex models (sometimes referred to as modern macroeconomic s ), which are discussed briefly below. The basic IS-LM model is useful for illustrating the differences in MMT and mainstream models. In mainstream macroeconomic models, the short run is characterized by fixed capital investment, or that the equipment and nonlabor resources available to firms are fixed. Output decisions are therefore a function of productivity, employment, and IS-LM outcomes. The IS curve begins with the recognition that output (or income) is the sum of its components: private consumption, investment, and government spending. For simplicity, this models a closed economy; in an open economy there would be a fourth component, net exports. If consumption and government spending are subtracted from output, the result is saving; thus, this relationship could be restated as savings equals investment. Consumption is a fraction of disposable income, which is income minus taxes. Therefore, consumption rises when disposable income rises (which occurs when income rises and/or taxes fall). While consumption depends on income and taxes, investment depends on the interest rate, rising when interest rates fall and declining when they rise. As a result, there are a series of pairs of income levels and interest rates where this relationship is in balance, and income is higher when interest rates are lower. It is through this relationship that fiscal policy can be used to expand or contract the economy. If government spending is increased, or if taxes are decreased (which increases disposable income and therefore increases consumption), demand increases. The recipients of these increased amounts of income then spend a portion of that income, which leads to successive rounds of spending that are called multipliers . Another critical relationship is that between money supply and money demand, which must be equal for markets to clear. Money is composed of cash, including checking accounts, and its close substitutes. Holding prices constant for the moment, and with a fixed money supply, there are two uses of money. First, some money is needed to carry out transactions in the economy, and thus more money is demanded as income (output) increases. Second, money is needed as a liquid form of asset holdings, and the higher the interest rate, the less money is held because it earns no interest and is exchanged for other forms of assets that earn interest. Similar to the IS curve, this relationship also creates pairs of interest rates and output levels where money supply and demand balance traces out a curve (the LM curve), this time with income higher as interest rates increase. In this case, however, a fixed amount of money demand occurs when both output and interest rates are high or when both are low. When interest rates are high, less money is desired as an asset and more is freed up to support a higher level of transactions (and therefore income). Where the IS and LM relationships intersect is where income and interest rates will be determined in the economy, holding prices constant. With significant unemployment, any fiscal or monetary stimulus would be transmitted into output effects, moving the economy closer to the output achieved under full employment. The effects of expansionary fiscal policy in the IS-LM model are shown in Figure 1 . When expansionary fiscal policyâthrough increased spending, decreased taxes, or some combination of the twoâoccurs (IS 1 to IS 2 ) and the money supply remains fixed (LM), interest rates (r) will rise (point A to point B). This rise occurs because when more money is needed for transactions, money held as an asset must be reduced and interest rates must be higher. This rise in interest rates offsets some of the effects of increased income by reducing investment. Thus, holding money supply fixed, increases in income (Y) that would have occurred if interest rates were fixed is now reduced as investment decreases. The monetary policy implications in an IS-LM model are illustrated in Figure 2 . With expansionary monetary policy (LM 1 to LM 2 ), more money is available to support income and transactions at every interest rate (point A to point B). However, that level of income is inconsistent with the level of income that balances the investmentâsavings (IS) relationship, and interest rates fall, leading to more investment, with some of the increased money supply used to hold more money as a liquid asset. That is, by interacting with the investmentâsavings (IS) relationship, output and interest rates fall below the amount implied by the money expansion alone. Output (Y) is higher than it was previously, and interest rates are lower. Thus, a monetary expansion increases output and lowers interest rates. Note that while the basic model uses monetary supply as the primary monetary policy tool, due to difficulties in measuring the money supply, monetary authorities generally target interest rates when making policy choices. Figure 3 , Figure 4 , and Figure 5 show the basic ways monetary policy can respond to a fiscal policy shift (in these examples through a contractionary fiscal policy shift) in an IS-LM model. Monetary policy may be neutral ( Figure 3 ) with respect to a fiscal contraction (IS 1 to IS 2 ) if there is no change in the money supply, so that some of the output effect is mitigated (point A to point B) relative to an accommodating policy. Monetary policy may be accommodating ( Figure 4 ) if the money supply also contracts (LM 1 to LM 2 ) to keep the interest rate constant, allowing maximum output effects (in this case, reducing output) to occur (point A to point B). Monetary policy may be offsetting ( Figure 5 ) if the money supply expands (LM 1 to LM 2 ) to return output to its original level (point A to point B). The LM curve actually has a third variable, the price level. The real money supply depends on the price level; if prices rise and nominal money supply is fixed, the real money supply falls. Thus, there is a third relationship in the system. This relationship requires an equilibrium between aggregate demand and aggregate supply (AD-AS). In the short run, the capital stock is fixed, and the output in the economy depends on hiring unemployed labor. (There is also an underlying labor supply and labor demand relationship.) The effects are captured in the aggregate supply equation. As prices rise, the supply of output increases and the demand decreases. Thus, this relationship shows an equilibrium aggregate price level and output in the economy. As shown in Figure 6 and Figure 7 , the effect of fiscal and monetary policies on output (Y) and the price level (P) is a function of aggregate supply and demand. Either a fiscal or monetary expansion will shift the aggregate demand curve toward more output at every price level. The supply curve is relatively flat when there is significant underemployment in the economy, meaning that output can increase without affecting prices. When the economy is at full employment the supply curve is almost vertical, and a shift in the demand curve will increase prices and not output. An increase in the price level will decrease the real money supply. If the initial stimulus were a fiscal stimulus, the real money supply would contract, at full employment, to restore the old output level, but with higher interest rates. In effect, the fiscal stimulus would have substituted consumption or government spending for investment (referred to as crowding out ). If the stimulus were originally a monetary stimulus, the real money supply would shift back to its old position and neither the output nor its composition would change. Continual attempts to provide stimulus at full employment would result in a continually increasing price level and, in the case of a fiscal stimulus, continued crowding out of investment. This basic model can be expanded in many ways with increased complication and detail. As suggested above, multiple sectors, multiple types of investments, and other details can be introduced. One important element is to allow for an open economy, with exports and imports, foreign investment in the United States, and U.S. investment in foreign countries. Expanding the model in this way, in its simplest form, requires a new relationship, the balance of payments, which requires equal supply and demand for U.S. dollars. This additional relationship requires a new variable, the exchange rate. It also requires net exports in addition to consumption, investment, and government spending, to be added to the IS equation. An open economy tends to diminish the effect of fiscal stimulus. As interest rates rise in the United States, foreign capital is attracted into the United States. To make those investments, foreigners demand dollars and supply foreign currency. The increased dollar demand increases the price of the dollar in foreign currency, and this higher price makes exports more costly and imports less costly. This results in a decrease in net exports, reducing the increase in output. In the extreme, if international capital were perfectly mobile and the United States were a small country, any effect of a fiscal stimulus would theoretically be completely offset, leading to a substitution of consumption and government spending for net exports. Because capital is not perfectly mobile and the United States is a large country, fiscal policy should still be effective in stimulating or restraining the economy. Monetary policy theoretically becomes more powerful in an open economy: as an increase in the money supply causes the interest rate to fall, capital flows out of the country, causing net exports to rise. Another modification to the model is to recognize that investment can respond to expected demand. With this extension, as the economy expands and that expansion is expected to be sustained, firms will increase investment in capital goods (known as the accelerator effect ), thereby increasing their capacity. The rate at which capital accumulates in an expanding economy will therefore reflect the rate at which capital investment increases in response to output and the rate of capital depreciation (or how much capital value is lost in any one period) over time. Economists had long been concerned that the IS-LM model does not fully account for expectations of future behavior, and lacked the microeconomic foundations where individuals allocate consumption and leisure over time. One way to incorporate such an idea is to make consumption determined by the interest rate as well as disposable income, reflecting the idea that as the interest rate rises individuals want to save more (and consume less). This effect has also been extended to the allocation of leisure and labor, and is most formally contained in dynamic stochastic general equilibrium (DSGE) models. DSGE models include a demand block, a supply block, and a monetary policy relationship. In general, while modifications could easily allow consumption to depend on interest rates, use of a full-blown DSGE model is more common among academics than among private forecasters or government forecasters. The model has been criticized by a number of mainstream academics. Over the long run, economic business cycle models converge into economic growth models. Economic growth in the longer term is assumed to be at full employment, and the economy grows with the labor force, capital accumulation, and technological advances. The long run, unlike the short run (where the economy can gain from reducing unemployment), is characterized by fixed resources and tradeoffs. What is most relevant to fiscal and monetary stimulus is that mainstream economic theory suggests that using fiscal stimulus may be good for growth in the short run, but can be harmful in the long run. If fiscal deficits allow consumption to increase at the expense of investment, as would be the case with running the deficit that causes the debt to grow faster than GDP, the economy will continually experience slower growth as the capital stock fails to grow at a quick enough pace. Excessive monetary stimulus, meanwhile, would lead to price level increases that, if followed persistently would lead to an inflationary spiral. The most common growth model is one that reflects a more or less steady-state growth (although that growth pattern may reflect growth in the labor supply). This section explores MMT's basic macroeconomic principles and distinctive characteristics and discusses how to interpret the model into the more conventional IS-LM framework. Because MMT is an emerging ideology, definitively identifying the research that encapsulates it can be difficult. Publications and other works from both proponents of MMT and mainstream economists used in this report are listed in the references section. Though some MMT proponents have expressed caution in viewing MMT through a traditional macroeconomic framework, this approach is consistent with work found both elsewhere in the MMT literature and in mainstream economic analysis, including research with theoretical elements aligning with some of MMT's central assertions. MMT's theory does not take into account self-imposed constraints (i.e., those other than resource constraints), such as lack of a sovereign currency, or of other institutions, such as independence of the monetary authority (the Federal Reserve in the United States) and the Treasury that allows the creation of money to finance government spending. As will be discussed subsequently, U.S. institutions may limit the application of MMT to the management of the economy. As with all macroeconomics, some of the theory is about description and some about prescription, but MMT varies by including prescriptive points that restrain monetary policy to keep a fixed interest rate (this policy will leave fiscal policy as the only tool to address the business cycle). According to the model, when fiscal stimulus produces no inflation, there are still unused resources in the economy, and when fiscal stimulus leads to inflation, the stimulus will be reduced or reversed, thereby reducing the deficit or converting it to a surplus. Just as with the basic macroeconomic model, analysis of MMT's macroeconomic principles may begin by accounting for all the choices available with output in a closed economy, which are private consumption, investment, and government spending. In equilibrium (when aggregate expenditures are equal to output), this accounting identity can be reframed to show that the difference between national saving and investment is equal to the difference between government spending and government taxes (or the federal budget deficit), which can also be found in the basic approach. One notable distinction between MMT and the basic macroeconomic structure is that MMT assumes private investment levels are insensitive to changes in the interest rate (or the rate of return that investment would offer), at least when the economy is below capacity. The insensitivity of investment to interest rates means that unlike the basic model, where there are a series of output and interest rate combinations where the investment and savings levels are in balance, with MMT desired investment and savings are equivalent at a single level of output, regardless of the interest rate. This relationship alone (which may be described as having a vertical IS curve) is possible in certain permutations of the basic macroeconomic model. As with the basic approach, consumption may be a positive function of income with the MMT investment and interest rate assumption. Fiscal policy may still be used to influence economic outcomes in the short run with an investmentâsavings relationship consistent with MMT. In the basic model, the effect of expansionary fiscal policy (or an increase in the deficit, or spending more than received in taxes) would, all else equal, increase interest rates, which would thereby reduce private investment and influence present and future saving and consumption patterns. Under the MMT condition, investment levels would be unaffected by the change in interest rates caused by the shift in government activity. Expansionary fiscal policy (as seen in Figure 1 ) would therefore still increase income and output in a given period, with a decrease in government deficits having the opposite effect. Even if the IS curve is sensitive to interest rates, the same outcome could be achieved by an accommodating money supply response that keeps the interest rate fixed (which is also a part of the MMT approach, as discussed below), although this outcome would be the result of a policy choice rather than of fundamental economic factors. As with mainstream macroeconomic theory, equilibrium in MMT requires equivalence between money supplied and money demanded. The concept of money, however, is applied differently in MMT than in mainstream macroeconomics, which has ramifications for money's relationship with other economic variables and how it may be managed by monetary and fiscal policy. Rather than taking money as the cash and close substitutes created by a central bank, MMT proponents believe that money in a financial system is legitimized as the government accepts it as payment for taxes. In this view, government spending may be thought of as \"creating\" the money that circulates in an economy. At the simplest level, assuming the Federal Reserve and the Treasury are the same entity (ignoring self-imposed constraints), the monetary authority provides the money to finance government spending (i.e., by depositing money in the Treasury checking account) which injects money into the economy which is, in turn, used to pay taxes. In a more complex model where the Federal Reserve supports the aims of the Treasury, the money would be lent to the Treasury, directly or indirectly, and thus some discussions also speak of the government lending money into existence. This distinction in the concept of money alone does not generate differences in the beliefs about the viability of long-term deficit financing (which is discussed further below). MMT proponents assert that the interaction of market operations undertaken by banking institutions and Federal Reserve actions that are designed to meet interest rate targets effectively allow banking institutions to make their own lending choices independent of reserve requirements and other restrictions. In their view, this greatly restricts the ability of the Federal Reserve (or any central bank) to control the supply of money, even if they can influence market interest rates. Assuming the central bank affects interest rates without direct control over the money supply is not necessarily inconsistent with the mainstream macroeconomic approach. The LM curve is horizontal because the target is the interest rate, although even if the interest rate changed, it would not affect output ( Figure 8 may be used as a reference). The central bank can set any rate, but could set a low rate, perhaps near or at zero, which would lower the cost of government borrowing (in situations where the central bank cannot directly add funds to the government's checking account). Again, the LM curve is not necessarily horizontal because it is naturally that way (MMT discussions do not present a formalized LM curve), but it is horizontal if a fixed interest rate is targeted. The level of that fixed interest could be chosen at any rate, although many adherents support a zero nominal interest rate. Such an interest rate could be made consistent with a low and stable rate of inflation by changing fiscal policy (e.g., if inflation is increasing, taxes should be increased and spending cut). Setting a determinable price level requires a contractionary fiscal policy when demand exceeds potential output to prevent continuing inflation. MMT's notion that monetary policy can maintain any chosen interest rate over an extended time period is a significant deviation from mainstream monetary theory. That assertion requires the absence of any other significant economic force influencing interest rates, including the effects of expected inflation. The existence and impact of inflation expectations is well documented and supported in the economic literature. If there are such nonmoney influences, the adoption of a chosen interest rate may only be maintained with constant injections of money that cause consequent inflationary pressures. Contractionary fiscal policy may not by itself be able to constrain these pressures. The notion that a sovereign government can generate as much money as it chooses without inducing inflation is another notable deviation of MMT from conventional economic analysis. In examining writings by MMT proponents, it is not always clear whether the reliance on fiscal policy (rather than monetary policy) to address an underemployed economy is descriptive (only fiscal policy works) or prescriptive (only fiscal policy should be used because it is too difficult to undertake monetary policy). Proponents appear to believe that the monetary authorities can influence interest rates, including through the buying and selling of bonds as well as directly setting certain interest rates. It is also not clear whether the vertical IS curve is relevant only in an underemployed economy. If the rule for monetary policy is not prescriptive and investment is always insensitive to interest rates, it is difficult to square the theory with the use of monetary policy in the early 1980s to contract the economy and squeeze out inflation, an event widely accepted by economists and consistent with mainstream theory. The MMT assumption of investment being insensitive to interest rates means that only fiscal policy can be used to shift an underperforming economy to full output in the short run. Under those assumptions, deficit financing in a recession would be an effective way of closing the corresponding gap in output and income, and the Federal Reserve would be tasked with restraining any subsequent increase in interest rates. This combination has been described as an \"extreme Keynesian\" approach in the mainstream literature. The IS-LM curves generated by MMT assumptions are shown in Figure 8 . Because under the MMT model the selection of an interest rate plays no role in investment or consumption decisions, proponents call for an interest rate that is more or less fixed at a lower level than current targets. Providing for a low level of interest would reduce federal borrowing costs, although fixing rates too close to zero raises questions about how the government and other borrowers would convince creditors to lend money when the relative costs of holding more liquid assets are lowered. With interest rates assumed to be fixed and monetary policy largely taken out of business cycle management, the MMT equilibrium output where aggregate demand meets aggregate supply is a function of total factor productivity (as before, the capital stock is assumed to be fixed), fiscal policy choices, and employment. If fiscal stimulus occurs in an underemployed economy, output will increase. If the economy is at full employment, fiscal stimulus will not increase real output, but rather induce inflation, which is a signal to undertake contractionary fiscal policy. With no investment sensitivity to interest rates, or if the interest rate is fixed by the monetary authorities, a fiscal stimulus at full employment will under the MMT model theoretically lead to an inflationary spiral. This effect means that it would be crucial to be able to exert fiscal discipline if inflation appears. Again, these effects are a function of MMT's IS and LM assumptions and mirror the fiscal policy findings in the \"extreme Keynesian\" mainstream view. Unlike the mainstream model, where an increase in demand at full employment leads to a contraction of the real money supply which chokes off demand (leaving the level of demand fixed but its mix changed), there is no link between the IS-LM curve and AD-AS curve that produces an equilibrium in prices and output. Instead, excess demand produces an increase in the price level that must be met with a contractionary fiscal policy in MMT. (In effect, explicit action must also be taken in the mainstream model where the Federal Reserve is managing business cycles, but the Federal Reserve targets interest rates rather than money aggregates. The Fed must recognize the inflationary pressure and take explicit action to offset it with higher interest rates.) Proponents of MMT also advance a federal job guarantee. A job guarantee is not integral to the MMT theory described above, because such a theory would presumably hold, according to MMT advocates, regardless of the presence of the job guarantee. Nevertheless, it is widely advocated by MMT proponents. Although how the jobs guarantee is structured is largely undefined, such a policy would likely reduce the fluctuation in employment levels across business cycles and increase government deficit financing. It would presumably be designed to largely eliminate certain types of unemployment (circumstances where individuals willing to work cannot find a job at a reasonable wage either because of the business cycle or a mismatch of skills and labor demand), although frictional unemployment (where individuals are engaged in job searches) would remain. The specific characteristics and implementation process of any job guarantee would likely play a significant role in determining its ultimate effect on output, employment, and price levels. Because there is cyclical fluctuation in unemployment, the size of the guaranteed job workforce would fluctuate, making a match between workers and needed tasks difficult. Unlike the market economy that determines jobs and products based on consumer demand, the assignment of work and output would have to be determined largely by fiat. When goods provided by the government are not explicitly based on the needs for collective goods or goods with public spillovers (such as a military force or highways), misallocation of resources may be more likely to occur. Some resources would, theoretically, be diverted from the private sector with a higher effective minimum wage through the government job alternative. The job market in the United States is not uniform, presenting additional challenges for a proposed job guarantee. For example, there could be considerable difficulties satisfying the guarantee in sparsely populated rural areas, filling jobs requiring background checks, or because some applicants may not be suitable for certain jobs (such as home health care or child care). There are also issues about how to treat workers who violated the terms of employment (such as persistent tardiness). Finally, jobs may need capital inputs (e.g., construction equipment) and supplies, and workers in rural areas may have problems finding transportation. With an open economy the IS curve contains an additional element, net exports, which is sensitive to interest rates. Mainstream economic theory postulates that if interest rates rise, capital investment in the United States rises, increasing the demand for dollars, raising the price of the dollar, and decreasing net exports (by both a decrease in exports, which are more costly to foreigners, and an increase in imports). Applied to the MMT model, this would mean that the IS curve would no longer be vertical because investment activity would respond to interest changes. In that case, monetary policy that allowed the interest rate to rise would offset a fiscal stimulus. However, the same output effects of fiscal policy as in the closed economy would occur if the monetary authorities kept the interest rate fixed. An open economy means that some U.S. debt is held by foreigners and adds to concerns that the relatively low interest rates may make the financing of the debt more difficult, since the central bank and the Treasury are independent. The low interest rates would make Treasury debt less attractive to investors. This is important because Treasury must raise funds by selling bonds if tax revenues are insufficient for expenditures, and the Federal Reserve cannot lend directly to the Treasury under current law . Much of the analysis in MMT literature and related research focuses on its application in the short-term, or in managing business cycles. Less discussed is how the MMT model applies to long run economic variables, including growth and debt sustainability. This section discusses MMT's generally short-term view of deficit financing and contrasts it with mainstream economics, which is usually focused on the longer term. Mainstream economics does not call for balanced federal budgets, and is broadly supportive of deficit financing in managing sufficiently large economic shocks. It does, however, recognize limits on the amounts that the federal government (or any economic actor) may borrow: constraints determined by the availability and willingness of investors to finance its borrowing needs at normal interest rates. In the mainstream view, this borrowing is constrained by the total amounts available for investment (savings in dollars) at a given point in time and the attractiveness of other borrowing options available on the market. In the long term, this constraint means that the amount of federal debt relative to output cannot rise indefinitely. In a basic macroeconomic model this constraint is violated when the long-term interest rate exceeds the long-term economic growth rate, as the general return on investments generated from expansionary policy will be smaller than the interest payments required to finance that activity. MMT proponents have generally called for a more active fiscal policy role in managing negative economic shocks. Moreover, the MMT claim that sovereign governments that issue debt in their own currency (like the United States) cannot be forced to default leads to the general perception that an MMT-driven economic structure would involve larger deficits and higher debt levels than those experienced in an economic structure shaped by mainstream economic thinking. This belief is supported by the call for a central bank that consistently sets interest rates near or at zero, which, all else equal, would support deficit financing at lower economic growth rates rather than with higher interest rates if mainstream economic thinking was applied. The notion that a sovereign government cannot be forced to default appears to be a central tenet of MMT because of the view that money creation can substitute for taxes or borrowing to finance government. There have been, however, many instances of sovereign governments defaulting explicitly, or implicitly either by inflating the currency, renegotiating terms, or using other measures to address a difficulty in financing debt. These other options might be considered default by another name. While the United States does not appear to face any current concerns about the ability to sell its debt, were a collapse in the market to occur, it might be impossible or at least extremely costly to undertake the needed measures (higher taxes to stem the inflation appearing with money creation). In meeting its statutory mandate of minimizing long-run federal borrowing costs, Treasury may redeem and reissue debt at levels that far exceed the amounts required strictly from new deficit-financing activity. For example, Treasury issued $11.7 trillion in marketable debt in FY2019, which represented more than 70% of the federal marketable debt portfolio. Any dramatic increase in interest rates accompanying a debt crisis would thus likely generate higher interest rates not only for debt generated by new federal deficits, but also for a significant portion of the existing debt stock that is redeemed and reissued. For example, net interest payments during the Greek debt crisis (described below) increased by amounts equivalent to roughly $200 billion in FY2019 dollars, which would require significant tax rate increases, base broadening, or both if needed to meet a sudden change in interest obligations. If the federal debt position were viewed by the market to be unsustainable, it could lead to a collapse in the demand for Treasury securities that would cause a \"debt cycle.\" In this case, an observation by some investors to sell or avoid federal debt issuances before they defaulted would raise federal interest rates, which would require more federal borrowing and could lead to further investor avoidance and interest increases. Beyond the significant effects on the federal borrowing position, such a process could also have ramifications elsewhere in the financial markets, as federal securities are often used as a currency substitute for overnight interbank lending and other activities central to general financial operations. MMT proponents also claim that government deficits must be small enough to limit inflation. It is unclear how this claim distinguishes MMT in a practical sense from the mainstream view, as mainstream macroeconomics would also support fiscal or monetary intervention to avoid significant increases in interest rates in response to rising debt. In the mainstream and MMT case, there is concern that by the time actors identify an urgent debt sustainability problem, it may be difficult to address. Such a situation would likely be accompanied by a negative economic shock that would make immediately raising taxes (net of spending) difficult, while increasing the money supply risks entering a debt spiral. In the MMT case, such a concern does not arise because of the assumption that the Federal Reserve could finance spending (an assumption at odds with institutional constraints discussed in the next section). Further questions arise when examining the applicability of MMT policies to the United States and other nations that already have relatively high real debt levels. In its most recent long-term budget outlook, the Congressional Budget Office (CBO) estimated that federal debt held by the public would rise from 78% of GDP in FY2019 to 92% of GDP in FY2029 and 144% of GDP in FY2049, well beyond the historical peak. It is possible that a high existing debt stock could practically restrict the availability or effectiveness of MMT-supported fiscal policies in managing business cycles, given the institutional constraints discussed in the next section. However, currently there are no signs that the federal borrowing capacity is near exhaustion in the short term or medium term, as interest rates remain below Fed-targeted levels. Recent international experiences speak to the complexity of borrowing capacity. Both Greece and Japan experienced rapid growth in government debt in the past decade. Organisation for Economic Co-operation and Development (OECD) data on general government debt (including municipal government debt) indicate that Greek debt rose from 115% of GDP in 2006 to 189% of GDP in 2017, while Japanese debt rose from 180% of GDP to 234% of GDP over the same time period. A loss in market confidence in Greek debt led to a severe recession there, with GDP contracting by 9 percentage points in 2011, and long-term interest rates reaching 22% in 2012. Japanese borrowing was viewed to be more sustainable despite being higher, with relatively flat GDP levels and long-term interest rates close to zero in recent years. When weighing the merits of structural changes, it may be useful to consider the characteristics of the institutions with power to address business cycles in the current system. Members of the Federal Reserve Board of Governors have typically been chosen without regard to political affiliation. The Federal Reserve's Federal Open Market Committee meets at least every six weeks to adjust open market operations as needed, allowing for a relatively quick and efficient way of implementing monetary policy modifications. Fiscal policy decisions managing business cycles are largely made through enactment of new legislation, and thus may be affected by the legislative calendar and other political considerations. In practice, these factors may make the evidential threshold for a fiscal policy response higher than that for action by the Federal Reserve. The Emergency Economic Stabilization Act of 2008 ( P.L. 110-343 ), for instance, was enacted in part to alleviate effects of the Great Recession in October 2008, 10 months after the start of the recession as identified by the National Bureau of Economic Research. In contrast, the Federal Reserve also undertook significant action in fall 2008, but was also able to begin taking countercyclical actions as early as September 2007. One may also wish to be mindful of the current independence of the Treasury and the Federal Reserve. In MMT, these groups are treated as a single entity, which is equivalent to assuming that the Federal Reserve can make funds available to the Treasury to spend as it needs. Present laws prohibit the Federal Reserve from lending or allowing overdrafts to the Treasury, so the Treasury must sell bonds at whatever interest rate prevails when revenues are inadequate to finance spending. The Federal Reserve faces no statutory limits on how much federal debt it may purchase in the secondary market, however, so that it can lend indirectly. The degree of independence between the Federal Reserve and the Treasury has varied over time, however, with periods of relatively high cooperation. Even if the Federal Reserve can lend indirectly to the Treasury, it has different objectives than cheap financing of the debt. The Federal Reserve acts under a statutory mandate of \"maximum employment, stable prices, and moderate long-term interest rates.\" If the Federal Reserve determines, for instance, that such a mandate warrants contractionary policy, it has the authority to enact contractionary policy, even if such actions would negate expansionary fiscal policy efforts. It is possible, therefore, that MMT-supported policies may need the support of both federal policymakers and Federal Reserve actors to take full effect. Economists have justified delegating this authority to the Federal Reserve on the ground that an insulated institution is more likely to choose policies consistent with low inflation. If correct, subordinating the Federal Reserve could result in a choice of policies under the MMT framework that removes this check against high inflation. Barro, Robert J. \"On the Determination of the Public Debt.\" Journal of Political Economy 87, no. 5 (October 1979): 940. Bell, Stephanie. The Hierarchy of Money. The Jerome Levy Economics Institute, Working Paper Series 231, April 1998. ââ. \"Do Taxes and Bonds Finance Government Spending?,\" Journal of Economic Issues 34, no. 3 (September 2000): 603. Blanchard, Oliver J. Public Debt and Low Interest Rates . National Bureau of Economic Research, NBER Working Paper No. 25621, February 2019. Chick, Victoria. The Theory of Monetary Policy , vol. 5 . London: Gray-Mills Publishing Limited, 1973. Chinn, Menzie D. Notes on Modern Monetary Theory for Paleo-Keynesians , Spring 2019, at https://www.ssc.wisc.edu/~mchinn/mmt_add2.pdf . Fullwiler, Scott. \"Functional Finance and the Debt Ratio-Part I.\" New Economic Perspectives (blog), December 2012, at http://neweconomicperspectives.org/2012/12/functional-finance-and-the-debt-ratio-part-i.html . Lerner, Abba P. \"Functional Finance and the Federal Debt.\" Social Research , no. 1 (February 1943): 38. Palley, Thomas K. Money, F iscal P olicy and I nterest R ates: A C ritique of Modern Monetary Theory . The Hans Boeckler Foundation, IMK Working Paper No. 109, January 2013. Rachel, Lukasz, and Lawrence H. Summers. On Falling Neutral Real Rates, Fiscal Policy, and Secular Stagnation . Brookings Papers on Economic Activity, March 2019, at https://www.brookings.edu/bpea-articles/on-falling-neutral-real-rates-fiscal-policy-and-the-risk-of-secular-stagnation/ . Rogoff, Kenneth. \"Modern Monetary Nonsense.\" Project Syndicate, March 2019, at https://www.project-syndicate.org/commentary/federal-reserve-modern-monetary-theory-dangers-by-kenneth-rogoff-2019-03?barrier=accesspaylog . Rowe, Nick. \"Reverse-Engineering the MMT Model.\" A Worthwhile Canadian Initiative (blog), 2011, at https://worthwhile.typepad.com/worthwhile_canadian_initi/2011/04/reverse-engineering-the-mmt-model.html . Sharpe, Timothy P. \"A Modern Money Perspective on Financial Crowding-Out.\" Review of Political Economy 25 (November 2013): 586. Shiller, Robert. \"Modern Monetary Theory Makes Sense, Up to a Point.\" The New York Times , March 29, 2019, at https://www.nytimes.com/2019/03/29/business/modern-monetary-theory-shiller.html . Tcherneva, Pavlina R. \"The Role of Fiscal Policy.\" International Journal of Political Economy 41, no. 2 (Summer 2012): 5. Wray, L. Randall. Modern Monetary Theory: A Primer on Macroeconomics for Sovereign Monetary Systems. 2 nd ed. New York: Palgrave Macmillan, 2015.", "summary": "Explaining persistently low interest rates despite large deficits and rising debt has been one of the central challenges of macroeconomists since the end of the Great Recession. This dynamic has led to increasing attention to Modern Monetary Theory (MMT), presented as an alternative to the mainstream macroeconomic way of thinking, in some fiscal policy discussions. Such discussions are at times restricted by a difficulty, expressed by policymakers and economists alike, in understanding MMT's core principles and how they inform MMT's views on fiscal policy. MMT suggests that deficit financing can be used without harmful economic effects in circumstances of low inflation rates and low interest rates, conditions that currently exist despite indications that the country is at full employment. This report surveys the available MMT literature in order to provide a basic understanding of the differences (or lack thereof) between the defining relationships established in MMT and mainstream economics. It then explores how such distinctions may inform policy prescriptions for addressing short- and long-run economic issues, including approaches to federal deficit outcomes and debt management. Included in this analysis are observations of how policy recommendations from MMT and mainstream economics align with current U.S. economic and governance systems. In mainstream macroeconomic models, the asset market is characterized by the sensitivity of investment to interest rates, a determinant of investment returns. Money is typically defined as cash and close substitutes, and used for transactions and held as an asset. In the short run, the capital stock (equipment and other factors of production outside of labor) is assumed to be fixed, and output is dictated by the employment level. Fiscal and monetary policy decisions can be used to expand or contract the short-run economy (with distinct effects for each), and those decisions help to inform growth, the stock of capital and labor, and other decisions in the long run. In general, expansionary fiscal policies, including stimulus policies and other programs that increase net deficits and debt, are thought to be helpful when addressing negative shocks in demand, but they may crowd out private investment and reduce long-term growth if used when the economy is otherwise in balance. Persistent increases in real debt (which occurs when the stock of debt grows more quickly than the economy) are viewed as unsustainable, as they would eventually lead to a lack of real resources to borrow against. Though some MMT adherents have disputed the notion that the model can be viewed through the basic macroeconomic framework, efforts to do so reveal a few key distinctions. In the MMT model of short-run behavior, investment decisions are insensitive to interest rates, and are instead a function of current consumption levels. MMT holds a much broader view of money, asserting that monetary value can be created by financial institutions in a way that renders monetary policy ineffective in dealing with short-run economic fluctuations. MMT supporters therefore prefer a larger fiscal policy role in managing business cycles than mainstream economists, generally claiming that fiscal borrowing constraints are less imposing than mainstream economists believe in countries with a sovereign currency, and call for direct money financing of fiscal policy actions by the central bank. The translation of the MMT approach to long-run output is unclear, though a jobs guarantee supported by MMT adherents would likely change the nature of the relationship between employment and output levels. Full alignment with the economic and political system supported by MMT would likely involve a dramatic shift in the roles and powers of U.S. fiscal institutions. Adopting an MMT framework would involve much more fiscal policy to account for a reduced monetary policy role. Policymakers would also likely need to execute fiscal policy decisions more quickly than has been done in the past in assuming an increased role in economic management. Projections of future debt growth due to spending pressures from social programs have led to a current concern about deficit financing, recognizing the institutional challenges in conducting tax and spending fiscal policy. MMT is largely focused on short-run management of the economy, with tax and spending policies aimed at maintaining a fully employed economy without inflation. The MMT approach appears to implicitly assume that a high level of debt will not be problematic because it can be financed cheaply by maintaining low interest rates. Underlying this policy is the assumption that Congress can act quickly to counteract deficit-driven inflation with tax increases or spending cuts that would allow the economy to maintain low interest rates on public debt.", "document_type": "crs"}
{"report": "Committee investigations in the House of Representatives can serve several objectives. Most often, an investigation seeks to gather information either to review past legislation or develop future legislation, or to enable a committee to conduct oversight of another branch of government. These inquiries may be called legislative investigations because their legal authority derives implicitly from the House's general legislative power. Much more rarely, House committee investigations have been carried out to determine whether there are grounds to impeach a federal officialâa form of inquiry known as an impeachment investigation. An impeachment investigation has typically been one of the House's first steps in the exercise of its constitutional impeachment power, and may conclude with the investigating committee recommending articles of impeachment to the full House. While the labels \"legislative investigation\" and \"impeachment investigation\" provide some context to the objective or purpose of a House inquiry, investigations may not always fall neatly into one of these categories. To the contrary, distinguishing between legislative and impeachment investigations might sometimes be difficult, especially when an investigation focuses on alleged misconduct by an official subject to impeachment by the House. This ambiguity is reflected in the various ongoing House committee investigations concerning President Trump. On September 24, 2019, Speaker Pelosi announced that these investigations constitute an \"official impeachment inquiry.\" While these committee investigations into allegations of presidential misconduct are proceeding, in the words of the Speaker, under the \"umbrella of [an] impeachment inquiry,\" most appear to blend legislation, oversight, and impeachment purposes. However labeled, many of the House investigations have been hindered by refusals to comply with committee subpoenas for documents or testimony. Various legal explanations have been provided for these refusals, including that federal law prohibits the disclosure of grand jury materials to Congress, that the relevant committee subpoenas lack a required legislative purpose, and that the information sought is protected by executive privilege. These interbranch disputes over information access have raised interest in whether invocation of the impeachment power will improve the House's ability to acquire withheld information. This report addresses that question, with a focus on presidential impeachment investigations. Specifically, the report considers whether the impeachment power may strengthen the House's investigative authorities in a manner that would improve the chamber's ability to obtain information, especially through the courts. Compared to a typical legislative investigation, an impeachment investigation may be more likely to acquire certain categories of information, including grand jury materials, documents and testimony related to either the President's exercise of his exclusive constitutional powers or his conduct occurring prior to taking office, and communications covered by executive privilege. But Congress's right of access to relevant information in a more typical legislative investigation is also substantial. Thus, partly because the line between legislative and impeachment investigations is sometimes blurred, but primarily because both impeachment and legislative investigations constitute an exercise of significant constitutional power, House committees may have adequate authority and tools to obtain much of the information they seek regardless of whether they are engaged in a legislative investigation or one relying on the impeachment power. The Constitution provides the House with the \"sole Power of Impeachment,\" but neither that document, federal statutes, nor House Rules define impeachment investigations. Nor have the courts asserted \"any role\" in addressing the impeachment power generally or impeachment investigations specifically. In fact, the Rules of Proceeding and Speech or Debate Clauses of the Constitution, along with political question doctrine, all generally prevent the courts from \"questioning Congress about actions taken in the impeachment process.\" The manner by which the House chooses to implement its impeachment powers appears therefore to be textually and historically committed to the discretion of the House. The House, however, has adopted no explicit definition of what constitutes an impeachment investigation. Left with gleaning a definition from the various constitutional provisions governing impeachment and the House's historical practiceâwhich includes 19 impeachments (15 of which were federal judges) arising from over 90 past impeachment investigations âan impeachment investigation may be defined as an investigation carried out to aid the House in its \"constitutional responsibility\" of determining whether \"sufficient grounds\" exist to charge an impeachable official (\"[t]he President, Vice President and all civil Officers of the United States\" ) with an impeachable offense (\"[t]reason, Bribery, or other high Crimes and Misdemeanors\" ). Nor has the House established a single, uniform approach to starting impeachment investigations. Instead, the process has evolved, generally along with changes to the House's committee structure and the investigative authorities with which those committees have been vested. Although impeachment investigations have often been authorized by a resolution of the House, there have also been impeachment investigations conducted (and articles of impeachment recommended by the Judiciary Committee and approved by the House) without an explicit authorization. For example, the House explicitly directed the Judiciary Committee to \"investigate fully and completely whether sufficient grounds exist for the House\" to impeach President Clinton, but in the1980s provided no authorization for investigations into allegations of impeachable conduct against Judges Walter Nixon, Alcee Hastings, and Harry E. Claiborne, who were ultimately impeached by the House. There are still other examples in which a resolution of authorization was provided only after a committee had engaged in a \"preliminary\" impeachment investigation. For example, although the House eventually authorized the impeachment investigation of President Nixon, the Judiciary Committee began the \"preliminary phases of an inquiry into possible impeachment\" months earlier. The somewhat inconsistent House practice on the use of authorizing resolutions may be due to any number of practical, procedural, or political factors. For example, at least until the second half of the 20th century, an authorizing resolution from the House was often a practical necessity for an effective impeachment investigation. This is because in the period before standing committees existed an investigating committee needed to be created and authorized. Even after standing committees were established, the House typically still needed to provide the committee with both investigative jurisdiction and compulsory investigative tools such as the power to issue a subpoena to force the disclosure of information. Indeed, although the House often adopted resolutions providing individual committees with limited subpoena powers following the Legislative Reorganization Act of 1946, it was not until 1975 that the House granted its committees standing investigative and subpoena powers under House Rules. Even after 1975, there was still practical value in authorizing resolutions, which typically provided the investigating committee with additional investigative tools beyond what the committee may have otherwise possessed, such as the ability to conduct staff depositions or issue written interrogatories. Thus, for a good portion of the House's history, authorizing resolutions were generally needed to give a committee the tools necessary to carry out an effective and expeditious investigation. Use of an authorizing resolution has also provided the House with the opportunity to assert control over the scope, direction, and conduct of a committee's impeachment investigation. Along with the practical explanations discussed above, it is also possible that the different approaches to initiating impeachment investigations reflect different conceptions of the House's impeachment power and the derivative authority that may be conferred to its committees to carry out investigations ancillary to that power. The nature of this power is perhaps best explored in relation to the House's well-established authority to conduct legislative investigations. These investigations are carried out under the House's implied constitutional authority to investigate in \"aid of the legislative function.\" While there are various \"legislative functions\" that an investigation may fulfill, the prototypical legislative investigation of the executive branch is carried out so that Congress can either inform itself for purposes of lawmaking or conduct oversight of those charged with the \"faithful\" execution of the law. This familiar exercise of investigative power, though not explicitly enumerated in the Constitution, is so essential to the functioning of a legislature as to be implicit in the \"legislative powers\" vested in Congress by Article I, Â§1 of the Constitution. These investigations play a vital role in the constitutional system, as they are intimately and directly tied to Congress's power to legislate. Because \"a legislative body cannot legislate wisely or effectively in the absence of information respecting the conditions which the legislation is intended to affect or change,\" impairment of Congress's authority to gather information leads to the impairment of Congress's core function of legislating. The necessity and importance of legislative investigations are also reflected in the statutory requirement that all committees \"exercise continuous watchfulness\" over the executive branch's implementation of law and the directive under House Rule X that standing committees \"review and study on a continuing basis\" the administration of law, the operation of agencies, and \"any conditions or circumstances that may indicate the necessity or desirability of\" new legislation. House Rules further provide that committees have \"general oversight responsibilities\" that are generally to be used \"to assist the House in its\" legislative tasks. To carry out these requirements, the House has extensively delegated investigative powers and tools to its committees to aid the chamber in its traditional legislative functions. Under House Rules, a standing House committee may conduct \"such investigations and studies as it considers necessary or appropriate in the exercise of its responsibilities\"; hold hearings; take staff depositions; and \"require, by subpoena â¦ the attendance and testimony of such witnesses and the production of such â¦ records â¦ as it considers necessary.\" But by the terms of the delegation, and because committees are creatures of their parent chamber, use of the provided compulsory investigative tools extends only to \"subjects within the jurisdiction of a committee\" and \"for the purposes of carrying\" out any of its enumerated \"functions and duties.\" The precise constitutional source (or sources) for impeachment investigations, and the subsequent delegation of investigatory impeachment authority to House committees, is less clear. It would appear that the legal basis for these investigations could be viewed in various waysâwith each interpretation leading to slightly different roles for both the House and any investigating committee. First, impeachment investigations could be seen as another form of the traditional legislative investigation. Rather than assisting the House for the purpose of lawmaking or oversight, the investigation is made to \"aid\" the House in a different \"legislative function\" âimpeachment. Under this conception, the House holds one broad-based power of inquiry, and if any distinction between legislative and impeachment investigations exists, it is not one of constitutional source of authority, but one based on purpose. If impeachment investigations are an extension of the House's traditional power of inquiry, and therefore derive from the same source as legislative investigations, it would appear that a committee would be free to use its existing investigative authorities, within the jurisdiction delegated to the committee, to assist the House in carrying out the function of impeachment. Under this view, no additional authorization or delegation from the House would be necessary to conduct an impeachment investigation (though it may be desirable if the House wished to either guide the investigation in a specific direction or provide a committee with additional authorities). But it could also be argued that impeachment investigations derive their authority not from the general legislative power, but directly and independently from the House's \"sole Power of Impeachment\" in Article I, Â§ 2 of the Constitution. The U.S. Court of Appeals for the District of Columbia Circuit (D.C. Circuit), for example, has suggested in dicta that the Impeachment Clause is the \"express constitutional source\" for the \"investigative authority\" of an \"inquiry into presidential impeachment.\" Although investigations are not explicitly mentioned in Article I, Â§ 2, or any of the other impeachment-related clauses, the power to impeach must by necessity include the power to investigate allegations of impeachable conduct. Under this conception, the authority to investigate for impeachment is either implicit in the impeachment power itself, or \"necessary and proper to carrying into execution\" that power, but in either case is a power that is constitutionally independent of Congress's general power to conduct legislative investigations. If impeachment investigations derive their authority not from the general legislative power, but independently from the House's exclusive impeachment power, it has been argued that some form of additional authorization or delegation may then generally be necessary to transfer that power from the House to its committees since current House Rules are \"silent on the issue of impeachment.\" Committees are \"representatives of the parent assembly\" and have only the power to inquire into matters that are within the scope of the authority delegated to them by the House. It is that delegation, whether in the form of a free-standing resolution or under House Rules, that is \"the controlling charter of the committee's powers.\" Thus, under the independent power conception, it could be argued that if a committee is going to exercise impeachment powers provided \"sole[ly]\" to the House, including the \"investigative powers that are ancillary\" to impeachment, it needs to do so with some adequate authorization or delegation from the Houseâa delegation that the current House Rules have not explicitly made. The argument does not appear to be that the Constitution's impeachment provisions directly require authorization of an impeachment investigation, but rather that as a matter of House Rules and the established relationship between the House and its committees, a House committee can exercise the investigative powers of impeachment only if that authority has been delegated to it by the parent body. Whatever the merits of this interpretation, it would appear to be in tension with those House precedents in which impeachment investigations were undertaken without House authorization, and in conflict with the House General Counsel's current litigating position in multiple cases. In sum, there is neither a clear definition in law or House Rules of what constitutes an impeachment investigation, nor a clearly established House process for how such an investigation is to be initiated. As a result, it would appear that the House has many choices in how it executes an impeachment investigation. House leadership appears to take the view that a specific authorization of an impeachment inquiry is not constitutionally necessary for committees to engage in an impeachment investigation of the President. On the other hand, some might argue that adopting an authorizing resolution is required orâeven if not legally necessaryâuseful because it provides the House with the opportunity to empower and direct a committee's impeachment investigation, while also providing a clear and forceful imprimatur of the House's support for that inquiry. In the House's ongoing investigations of President Trump, no committee has received the type of explicit and direct authorization ultimately provided in the Clinton and Nixon investigations. Nevertheless, even if one were to accept for purposes of argument that authorization is a prerequisite to a committee engaging in an impeachment investigation, it could be argued that the House recently provided this authorization, at least for wielding the powers of impeachment in court. In June, the House adopted H.Res. 430 , which provides that \"in connection with any judicial proceeding â¦ the chair of any standing or permanent select committee exercising authority thereunder has any and all necessary authority under Article I of the Constitution.\" The accompanying Rules Committee report cites the Judiciary Committee's investigation into whether to recommend articles of impeachment to the House as an \"example of a Committee being able to use 'all necessary authority under Article I of the Constitution.'\" The White House, however, asserts that House committees are not currently engaged in an impeachment investigation absent a formal authorizing resolution from the House. But there would likely be significant challenges to pursuing this argument in litigation, particularly given the courts' historical reluctance to scrutinize the House's implementation of its own internal powers. Indeed, whether a committee is engaged in an impeachment investigation represents the unique convergence of various areas in which courts are generally reluctant to second-guess the position of the House and its committees, including the House's implementation of its \"sole Power of impeachment\"; the House's exclusive authority to set and interpret its own rules; and a committee's role in articulating the purpose of an investigation. According to at least one commentator, it seems likely that to obtain judicial recognition of an impeachment investigation the House need only present enough evidence to \"persuade the court that its current investigation is sufficiently tied to the impeachment process.\" While this deferential approach to actions of the House and its committees is not absoluteâfor example, courts sometimes have exercised their judicial powers to ensure that the committee is acting within the scope of the authority delegated to it by the parent chamber âit may be reinforced in the current situation because the House General Counsel (HGC) has asserted that there is \"no authority for the proposition that the House must vote to authorize the Committee to investigate impeachment.\" The HGC's position is important because it is overseen by the Bipartisan Legal Advocacy Group, which \"articulates the institutional position of the House in all litigation matters.\" The D.C. Circuit has suggested that when the HGC voices an interpretation of internal House matters it must be \"given great weight.\" That said, an explicit authorization from the House could remove any ambiguity as to the appropriate characterization of the committee investigations. But in many ways, the current focus on whether the House must authorize an impeachment investigation may lead to the misimpression that an impeachment inquiry is the only means by which Congress may investigate and acquire information concerning allegations of executive branch wrongdoing. A committee can investigate executive branch misconduct in an impeachment investigation, a legislative investigation, or some combination of both. Investigations conducted pursuant to the impeachment power may, as discussed below, provide the House with some access advantages, perhaps most significantly if executive privilege is invoked as a justification to deny congressional access to information. But an executive official, including the President, may also be the subject of a legislative investigation, and Congress's ability to access information from the executive branch in these investigations is oftentimes substantial. Accordingly, the degree to which Congress may obtain information through an impeachment inquiry that it cannot acquire in a traditional legislative investigation may not always be as significant as might first appear. Even without invocation of the impeachment power, House committees retain existing authority to investigate allegations of executive branch misconduct, including criminal activity as part of a legislative investigation. Courts have generally recognized that the power to conduct legislative investigations includes the authority to inquire into and investigate the conduct of government officials, especially when a committee is considering possible remedial legislation. As one district court recently stated, even absent any claim that an investigation is being undertaken for purposes of impeachment, committee investigations into misconduct by executive branch officials generally fit \"comfortably within the broad scope of Congress's investigative powers\" so long as the investigation is within the committee's jurisdiction and is carried out for a legislative purpose. Opinions of the Supreme Court reinforce this notion by holding that Congress's implied investigative power, wholly apart from impeachment, \"comprehends probes into departments of the Federal Government to expose corruption, inefficiency or waste,\" and includes the authority to \"inquire into and publicize corruption, maladministration or inefficiency in agencies of the Government.\" Thus, the line between an impeachment investigation and a legislative investigation into official misconduct may not only be significantly blurred, but in some instances, may also be unnecessary to draw given the tools and authority available to committees to conduct legislative investigations into executive branch misconduct. This authority includes not only the use of compulsory investigative tools like the subpoena, but also other forms of legislative leverage generally available to the House, its committees, and even individual Members. Addressing the scope of the House's access to information during an impeachment inquiry requires some brief comparison of impeachment and legislative investigations. To begin, the two types of investigations have much in common: both represent exercises of the House's constitutional power; both act as essential checks on executive overreach and help ensure preservation of the separation of powers; and both are unique and consequential powers characterized by their mix of judicial, legislative, and political features. In addition, whether engaged in an impeachment or legislative investigation, the tools used to gather information are now mostly the same, especially given recent changes to the House Rules that provide committees with authority to carry out investigations in an increasingly prompt manner and without the full participation of the committee. In any investigation, a committee would likely obtain most information through requests for information, voluntary interviews, hearings, subpoenas for documents or testimony, and depositions. But the two investigations arguably contrast in a few notable ways. For example, the frequency with which each is exercised differs greatly. While the House has conducted myriad legislative investigations of the executive branch, there have been comparatively few impeachment investigations of executive branch officials. In addition, the House has previously granted the subject of an impeachment investigation certain procedural rights that are not seen in legislative investigations. For example, during both the Nixon and Clinton impeachment investigations, the House Judiciary Committee adopted resolutions affording the President and his counsel the right to respond to evidence gathered by the committee, raise objections to testimony, and cross-examine witnesses, among others. In another distinguishing feature, the Judiciary Committee's power to issue subpoenas in impeachment investigations has previously been altered in an effort to encourage \"a fair, impartial and bipartisan\" investigation. In both the Nixon and Clinton investigations, the power to subpoena was provided to \"the chairman and the ranking minority member acting jointly, or, if either declines to act, by the other acting alone....\" Even so, \"[i]n the event either [the Chair or the Ranking Member] so declines,\" the provisions continued, \"either shall have the right to refer to the committee for decision the question whether such authority shall be so exercised â¦\" Thus, in the case that the Chairman and the Ranking Member disagreed on issuing a subpoena, the question would be settled by vote of the Judiciary Committee. The functioning of the provision was described by some Members of the Judiciary Committee as \"practically nullif[ying] any truly independent subpoena power for the ranking minority member â¦,\" as the Chairman's position would likely be upheld by the committee. Significantly, there may be some ways in which the House's investigative authority is either amplified or broadened during an impeachment investigation. The precise extent of any legal advantage, however, is not entirely clear. While there is a reservoir of historicalâand to a much more limited extent judicialâprecedents that can be used to analyze the House's authority to obtain information from the executive branch in traditional legislative investigations, the same cannot be said for impeachment investigations. There have been relatively few impeachment investigations of executive branch officials, and none that have been presented to the courts for resolution of constitutional questions of information access. Despite the limited historical precedent, early statements from all three branches support the House's robust and expansive right of access to information pertinent to an impeachment investigation. Since nearly its inception, the House has viewed its impeachment power as including \"the right of inquiry â¦ to the fullest and most unlimited extent,\" and \"certainly impl[ying] a right to inspect every paper and transaction in any department.\" Neither the executive nor judicial branches, the House has asserted, can \"seek to impede the House in the exercise of its sole power to impeach.\" And while the Supreme Court has little to no role in reviewing the impeachment power generally, it has compared the House's right to information in an impeachment investigation to that of a court of law, stating that the House may obtain information \"in the same manner and by the use of the same means, that courts of justice can in like cases.\" As one district court has stated about presidential impeachment investigations, [I]t should not be forgotten that we deal in a matter of the most critical moment to the Nation, an impeachment investigation involving the President of the United States. It would be difficult to conceive of a more compelling need than that of this country for an unswervingly fair inquiry based on all the pertinent information. The executive branch appears to have similarly acknowledged the breadth of impeachment investigations, although usually in the context of denying Congress's right of access in a legislative investigation. In an oft-quoted example, President James K. Polk stated that the authority of the House in an impeachment investigation \"would penetrate into the most secret recesses of the Executive Department\" and would include the authority to \"command the attendance of any and every agent of the Government, and compel them to produce all papers, public or private, official or unofficial, and to testify on oath to all facts within their knowledge.\" \"If the House of Representatives, as the grand inquest of the nation â¦ should think proper to institute an inquiry,\" Polk continued, \"every facility in the power of the Executive [would] be afforded to enable them to prosecute the investigation.\" The need for the House to obtain access to relevant information in an impeachment investigation may also be underscored by the essential role impeachment plays in ensuring presidential accountability. For instance, given the Department of Justice's (DOJ's) position that a sitting President is not subject to indictment or criminal prosecution while in office, impeachment and removal may be one of the few available mechanisms to hold a President immediately accountable for criminal conduct. Broad access to evidence either supporting or refuting allegations of presidential misconduct could be seen as essential if the House is to exercise its \"right of accusing\" and if the impeachment power is to maintain its envisioned role as an \"essential check\" on the executive branch generally and the President specifically. While these statements and principles establish a general proposition that the House enjoys broad access to information in an impeachment investigation, this access may be subject to certain constitutional limitations that generally attach to congressional investigative activity. For example, provisions of the Bill of Rights that have been found to apply in legislative investigations, including the First Amendment, Fourth Amendment, and the Fifth Amendment's privilege against self-incrimination, may also apply in impeachment investigations. Other constitutional principles that may limit committee access to information in legislative investigations, for example considerations arising from the separation of powers such as executive privilege, may prove less of an obstacle and apply with less strength in an impeachment investigation. When examining the legal implications of impeachment investigations, and especially whether an investigation may strengthen the House's hand in any information access dispute with the executive branch, it may help to think of interbranch investigative conflicts as proceeding in two, sometimes overlapping, phases: a political phase and (in limited situations) a judicial phase. This staged approach offers a useful analytical framework for assessing the impact an impeachment investigation may have on decision making in all three branches of government. The first phase of an investigative dispute between Congress and the executive branch is typically political in nature, in that conflicts that may arise are generally steered by political forces, with outcomes dependent upon not only each branch's evaluation of the costs and benefits of a given position, but also each branch's willingness and ability to exert either direct or indirect pressure on the other. This phase is typically characterized by a process of negotiation and accommodation, whichâthough often guided by legal considerations âis also influenced by the use of various levers of political or institutional influence. For Congress, these levers are manifold, and include, among other tools, threatened and actual restrictions on appropriations, changes to delegated executive branch authority, delay of nominations, and attempted enforcement of subpoenas through mechanisms such as criminal contempt of Congress. For the executive branch, leverage lies mainly in the fact that it possesses the information Congress seeks, and therefore delays or a continuation of the status quo may work in its favor. The vast majority of information access disputes are resolved at this political stage, typically either by the executive branch agreeing to comply with congressional demands, Congress relinquishing its request, Congress agreeing to narrow its inquiry, or through a settlement or information access agreement in which Congress is provided access under certain restrictions. Because of the nature of interbranch negotiations, and the paucity of impeachments of executive branch officials, it is difficult to assess the impact an impeachment investigation would have on the political phase of an interbranch dispute. Even so, the significance of a possible exercise of the impeachment power, along with a possible resulting increase in political and public pressure, may itself affect the executive's compliance decisions. During the Nixon impeachment investigation, the House Judiciary Committee noted that \"not one\" subject of the nearly 70 prior impeachment investigations \"challenged the power of the committee conducting the impeachment investigation to compel the production of evidence it deemed necessary.\" President Andrew Johnson, for example, voluntarily provided the Judiciary Committee with sensitive information during that committee's impeachment investigationâincluding confidential communications with advisers and information related to the use of his pardon and veto power. Presidents Nixon and Clinton also pledged cooperation with House impeachment investigations. But an impeachment investigation is not a panacea for access. Both Nixon and Clinton were later viewed by the Judiciary Committee as withholding relevant evidence. President Nixon ultimately refused to comply with numerous committee subpoenas, and President Clinton was accused of either refusing to comply with requests for written admissions or providing the Committee with false or misleading responses. The Judiciary Committee's response to the actions of President Nixon and President Clinton displays another tool of leverage that uniquely attaches to an impeachment investigation: the threat that noncompliance with committee demands for information could rapidly lead to the adoption of an article of impeachment for contempt of Congress. In a legislative investigation, the tools available to a committee to seek enforcement of a demand made to the executive branch are limited. The primary current avenue for forcing compliance with a subpoena appears to be through the judiciary in a civil enforcement action. The Senate Watergate Committee, which was engaged in a legislative investigation, pursued this avenue of enforcement when President Nixon refused to comply with that committee's subpoenas for White House tapes. The House Judiciary Committee, on the other hand, chose not to litigate enforcement of its subpoenas during its impeachment investigation of President Nixon, concluding that it would be \"inappropriate to seek the aid of the courts\" because the Framers had made clearâby vesting the impeachment power \"solely\" in the Houseâthat there was not \"any role for the courts in the impeachment process.\" Instead, the Committee obtained portions of the information it needed from other sources (including the Watergate special prosecutor and grand jury) and recommended to the House an article of impeachment based on President Nixon's failure to comply with the Committee's subpoenas. The Judiciary Committee took the same approach during the Clinton impeachment, approving and recommending to the House an article of impeachment based on the President's \"refusing and failing to respond to certain written requests for admission\" and for providing incomplete or \"false and misleading\" information to the Committee. Knowledge that a committee engaged in an impeachment investigation is poised to recommend an independent article of impeachment for failure to comply with a committee subpoena might serve as a tool of leverage during negotiations in the political phase. If there is an impasse at the political phase, either the House, or in very limited circumstances the executive branch, may transition the investigation into the judicial stage by asking the federal judiciary to decide the ongoing disagreement. Because political negotiations tend to continue, resolution of the dispute at this stage may occur either as a result of political accommodations undertaken by political actors, or as a result of the application of legal principles by federal judges. Such cases usually require the courts to consider both the scope of Congress's investigatory power and any legal restrictions or privileges invoked by the executive branch. The involvement of the courts in information access disputes between the legislative and executive branches has been historically rare, but appears to have become more common in recent years, at least with respect to disagreements over House subpoenas. The traditional preference for political rather than judicial solutions seems supported by the fact that neither Congress nor the President appears to have turned to the courts to resolve an investigative dispute until the 1970s. But it is not only the political branches that have been wary of judicially declared outcomes. The courts themselves have also generally sought to avoid adjudicating investigative disputes between the executive and legislative branches, instead encouraging settlement of their differences through a political resolution.0F Consistent with that approach, lower federal courts have suggested that judicial intervention in investigative disputes \"should be delayed until all possibilities for settlement have been exhausted.\" The courts have never resolved an interbranch subpoena dispute in an impeachment investigation. As noted, there are many reasons for this, including the infrequent occasions in which such disputes arise, the fact that the Speech or Debate clause and the political question doctrine appear constitutionally to prevent judicial review of most aspects of the impeachment power, and because the House itself has suggested that seeking judicial involvement in an impeachment investigation is inappropriate. Moreover, because impeachment is an internal House process, any exercise of the power is typically intertwined with the House's authority to set its own rules, an authority courts are reluctant to disrupt or second-guess. Thus, some evidence suggests that both the House and the courts have viewed judicial involvement in an impeachment inquiry as inappropriate or in excess of the judiciary's power. As such, any discussion of the legal impact an impeachment investigation may have on the judicial stage of an investigation is necessarily speculative. If the House were to seek judicial enforcement of a subpoena issued as part of an impeachment investigation, questions surrounding the courts' role may increase the complexity of the case. To be sure, the courts have made clear that, when necessary, they have the authority to adjudicate subpoena enforcement cases. But to the extent a court views an investigative conflict that arises during an impeachment investigation as constituting \"judicial review\" of the impeachment power, it could feel obligated to leave resolution of the dispute to the political branches. During the Nixon impeachment investigation, the House Judiciary Committee noted that its \"determination not to seek to involve the judiciary reflected not only an intent to preserve the constitutional structure, but also the high probability that the courts would decline to rule on the merits of the case because it is nonjusticiable\" under the political question doctrine. Were the court to reach this conclusion it would cut off, at least in an impeachment investigation, one of the House's principal legal mechanisms of enforcing subpoenas issued to the executive branch. In such a scenario, the House might need to find other methods of compelling compliance with its investigative demands, including perhaps through the impeachment power itself. Nevertheless, if the House took a dispute to court, and the court was willing to hear it, there appear to be at least three potential ways in which an impeachment investigation could, relative to a legislative investigation, provide the House with a stronger legal position in any attempt to use the judiciary to obtain information. All three are applicable to the current House investigations into the conduct of President Trump. An impeachment investigation may (1) improve the likelihood of a court authorizing committee access to grand jury materials; (2) relieve any possible limitations imposed by the requirement that a committee act with a \"legislative purpose\"; and (3) improve the likelihood that a committee will be able to overcome claims of executive privilege made in response to congressional demands. However, it is important to note that even in these areas, it is arguable that a congressional committee engaged in a legislative investigation could also obtain much of the same information, as both legislative and impeachment investigations constitute an exercise of significant constitutional authority. As a result, while an impeachment investigation may very well increase the House's access to information, House committees may have substantial authority to obtain a significant amount of information without reliance on the impeachment power. One area of ongoing dispute between the House and the Trump Administration is congressional access to grand jury materials. House investigations have thus far been unsuccessful in obtaining evidence and materials gathered by the grand jury empaneled for use in Special Counsel Robert Mueller's investigation of Russian interference in the 2016 election and possible obstruction of justice by President Trump. DOJ has asserted that the secrecy requirements of Rule 6(e) of the Federal Rules of Criminal Procedure prevent such a disclosure. Past precedents, however, suggest that a court would likely accord a committee engaged in an impeachment investigation access to grand jury materials. Rule 6(e) establishes a general requirement of grand jury secrecy. Under the Rule, identified persons (including attorneys for the government and grand jurors) may not disclose \"a matter occurring before the grand jury\" unless the disclosure fits within certain enumerated exceptions, many of which require court approval. Although there is no clear definition of what constitutes a \"matter occurring before the grand jury,\" the rule has generally been interpreted as broadly encompassing anything that might reveal what took place in the grand jury room. None of the exceptions in Rule 6(e) explicitly permit disclosure of grand jury material to Congress in the course of an investigation. But courts have previously provided Congress with access to these materials on various grounds. Disclosure has primarily been approved to a committee engaged in an impeachment investigation through the Rule's exception permitting release of protected materials \"preliminary to or in connection with a judicial proceeding.\" In these cases, courts appear to have viewed an impeachment trial in the Senate as a \"judicial proceeding\" and the impeachment investigation in the House as \"preliminary\" to that \"judicial\" trial. As summarized by a federal district court, \"There can be little doubt that an impeachment trial by the Senate is a 'judicial proceeding' in every significant sense and that a House investigation preliminary to impeachment is within the scope of the Rule.\" These conclusions are further informed by two court opinions determining that committee legislative investigations do not meet the requirements of the judicial proceeding exception, including one in which a committee requested grand jury materials to \"fulfill its oversight responsibilities.\" Notably however, the legislative investigations did not involve an individual official's misconduct or raise impeachment issues. Grand jury materials were disclosed to Congress during both the Nixon and Clinton impeachment inquiries, though there is ambiguity as to the legal reasoning applied by the courts in authorizing those disclosures. During the Nixon impeachment investigation, the House Judiciary Committee requested access to evidence and materials that had been presented to the court by the grand jury. Judge John Sirica of the U.S. District Court for the District of Columbia concluded that disclosure to the Committee was \"eminently proper, and indeed obligatory,\" but his opinion did not include a detailed discussion of Rule 6(e). Judge Sirica appears to have relied on various factors in reaching his decision, including a belief that courts should \"presumptively favor disclosure to those for whom the matter is a proper concern and whose need is not disputed\"; the fact that the President did not object to the release; and the desire to avoid the \"incredible\" conclusion that \"grand jury matters should lawfully be available to disbarment committees and police disciplinary investigations and yet be unavailable to the House of Representatives in a proceeding of so great import as an impeachment investigation.\" The D.C. Circuit affirmed in Haldeman v. Sirica by expressing \"general agreement\" with Judge Sirica's opinion. But it too identified no single or clear reason for permitting disclosure. Despite neither Judge Sirica's district court opinion nor the D.C. Circuit's opinion in Haldeman making any explicit holding as to impeachment and Rule 6(e)'s judicial proceeding clause, a recent D.C. Circuit decision stated that \"we read Haldeman ... as fitting within the Rule 6 exception for 'judicial proceedings.' Doing so reads the case to cohere, rather than conflict, with the Supreme Court and D.C. Circuit precedents....\" The D.C. Circuit also authorized Independent Counsel Ken Starr to provide the Judiciary Committee with grand jury material in connection to the Clinton impeachment. The reasoning of the judicial order, which occurred before the House had formally authorized the impeachment investigation, was perhaps even more opaque than in the earlier cases interpreting Rule 6(e)'s application to the Nixon impeachment investigation. However, the judicial order in the Clinton case appears to have been influenced by now-expired statutory requirements included in the Independent Counsel Statute (Act). Upon a motion from Starr, the Special Division of the D.C. Circuit (responsible for overseeing the jurisdiction of Independent Counsels) authorized Starr to \"deliver to the House of Representatives\" material he found necessary to comply with the Act's explicit requirement that he advise the House of \"any substantial and credible information which such independent counsel receives â¦ that may constitute grounds for an impeachment.\" Although not providing any analysis, the D.C. Circuit stated that \"[t]his authorization constitutes an order for purposes of\" the judicial proceeding provision of Rule 6(e). While there is precedent supporting the conclusion that a committee engaged in an impeachment investigation can obtain grand jury materials, there are also ways in which a committee engaged in a legislative investigation may be able to obtain that same information. For example, two courts have authorized disclosure of grand jury materials during a legislative investigation based on a determination that Congress has a \"constitutionally independent legal right\" to obtain information in furtherance of \"legitimate legislative activity\" that either overrides Rule 6(e) or requires that the rule be interpreted in a way that does not apply its nondisclosure requirements to legitimate investigative requests of Congress. For example, in In re Grand Jury Investigation of Ven-Fuel , a Florida federal district court held that a congressional subcommittee engaged in \"legitimate legislative activity\" was entitled to grand jury information because it had \"demonstrated [a] constitutionally independent legal right to the documents\" sought. The decision was based on the court's reading of the Speech or Debate Clause, which the court interpreted as providing \"the inherent, implied power to conduct legislative activity\" including investigations, and upon a desire to \"avert and minimize\" constitutional conflict between the branches. While V en - Fuel has been subject to some judicial criticism for its interpretation of the Speech or Debate Clause, the opinion nevertheless supports the proposition that a committee engaged in legitimate legislative investigative activity has a right of access to grand jury material despite Rule 6(e). As such, while Congress is most likely to obtain access to grand jury materials as part of an impeachment investigation, there are arguments that a committee can potentially gain access to such material as part of a traditional legislative investigation. The Trump Administration has argued that some of the ongoing House investigations, especially those focusing on the President's conduct before taking office, lack a \"legislative purpose\" and therefore exceed the committees' investigative authority. Those arguments have thus far been rejected by the three courts that have reached the merits of the question (two district courts and the D.C. Circuit). Nevertheless, the legislative purpose requirement appears to be substantially limited as a defense to a subpoena in an impeachment investigation. As noted, Congress enjoys broad constitutional authority to obtain information relevant to its legislative investigations. But because that authority is derived from the Constitution's delegation of legislative power to Congress, it extends only to those inquiries that can be said to \"aid the legislative function.\" The Supreme Court has generally implemented this constitutional limit on the scope of the investigative power by requiring that committee investigations serve a valid \"legislative purpose.\" The legislative purpose requirement is quite generous, permitting investigations into any topic upon which legislation could be had or over which Congress may properly exercise authority, including investigations undertaken by Congress to inform itself for purposes of lawmaking or possibly to ensure that the executive branch is complying with its obligation to faithfully execute laws passed by Congress. In practice, the legislative purpose requirement rarely acts as a significant restriction on legislative investigations, especially those relating to government officials. This is principally because the scope of what constitutes a permissible legislative purpose is broad and because courts have effectively adopted a presumption that committees act with a valid purpose. But the courts have acknowledged at least two general types of investigations in which Congress likely exceeds its authority. First, Congress does not act with a legislative purpose when investigating private conduct that has no nexus to the legislative function. As summarized by the Supreme Court, a committee \"cannot constitutionally inquire 'into the private affairs of individuals who hold no office under the government' when the investigation 'could result in no valid legislation on the subject to which the inquiry referred.'\" Second, the Supreme Court has stated that Congress does not act with a legislative purpose when the subject of an investigation is a function \"exclusively\" committed to another branch of government. As stated in Barenblatt v. United States : \"[l]acking the judicial power given to the Judiciary, [Congress] cannot inquire into matters that are exclusively the concern of the Judiciary. Neither can it supplant the Executive in what exclusively belongs to the Executive.\" The D.C. Circuit recently reaffirmed this restriction, holding that when \"no constitutional statute may be enacted on a subject matter, then that subject is off-limits to congressional investigators.\" The legislative purpose requirement would appear to impose few, if any, consequential restrictions on a committee impeachment investigation. But the manner in which the requirement applies to an impeachment inquiry may depend upon whether the source of authority for such an inquiry is thought to derive from the House's general legislative power or from the Constitution's specific provisions concerning impeachment. If an impeachment investigation derives from Article I's vesting of legislative power in the House and Senate, then the legislative purpose requirement would likely apply as it does to other investigations conducted pursuant to that power. The requirement, however, would appear to be easily satisfied in an impeachment investigation because the legislative function and purpose that is being served is clear: the committee is assisting the House in carrying out its impeachment power. If, on the other hand, the authority for an impeachment investigation does not arise from Article I's vesting of \"legislative powers\" in a Congress, but instead derives directly and independently from the House's impeachment power, it need not be exercised in \"aid of the legislative function,\" and, as a result, the legislative purpose restriction would not apply. Regardless of how the requirement relates to impeachment, it would appear that the scope of an impeachment investigation is principally governed not by the need for a \"legislative purpose,\" but instead by its relationship to the House's impeachment role. As such, the permissible scope of an impeachment investigation is initially narrow, in that the investigation would presumably need to relate to the House's role in determining whether an impeachable official has committed an impeachable offense. But once an investigation meets that threshold requirement, the scope of the investigation is broad, to potentially include any matter \"reasonably relevant\" to the possible impeachment. While the legislative purpose requirement is unlikely to impose any substantial restriction on the scope of an impeachment investigation, both the previously discussed Supreme Court case law and more recent decisions from two federal district courts and the D.C. Circuit suggest that the requirement plays a similarly narrow role in legislative investigations focusing on presidential misconduct. For example, both the D.C. federal district court and the D.C. Circuit recently rejected an attempt by President Trump to block his accounting firm from complying with a House Oversight and Reform Committee subpoena for the President's financial records on the ground that the Committee lacked a legislative purpose. In holding that the Committee had authority to seek the financial documents as part of its ongoing legislative investigation, the district court explicitly noted that \"Congress plainly views itself as having sweeping authority to investigate illegal conduct of a President,\" even \"before initiating impeachment proceedings.\" The court was not willing to adopt an interpretation of legislative purpose in legislative investigations that would \"roll back the tide of history\" regarding congressional investigations of the President. The D.C. Circuit affirmed in Trump v. Mazars USA, LLP , holding in a 2-1 decision that the Committee's subpoena was a valid exercise of the Committee's authority to conduct legislative investigations. In doing so, the court made two key holdings as to the proper application of the legislative purpose requirement, both of which support committee authority to investigate presidential misconduct as part of a legislative investigation. First, the court held that the Committee had articulated \"strong evidence\" of its legitimate legislative purpose by asserting that the subpoenaed information was needed to \"review multiple laws and legislative proposals,\" including legislation pending before the House. The fact that one of the Committee's purposes was to investigate potential criminal wrongdoing or misconduct by the President did not undermine the committee's legitimate purposes as \"an interest in past illegality can be wholly consistent with an intent to enact remedial legislation.\" Indeed, a committee's \"interest in alleged misconduct\" can be \"in direct furtherance of its legislative purpose.\" Second, the court held that the subject of the Committee investigation was one \"on which legislation may be had.\" The court evaluated legislation that would require the presidential disclosure of financial information as the appropriate \"category of statutes\" that could result from the committee investigation. Applying separation-of-powers principles to that general class of statute, the court could \"detect no inherent constitutional flaw in laws requiring Presidents to publicly disclose certain financial information.\" The dissenting judge in Mazars would have concluded that \"[i]investigations of impeachable offenses simply are not, and never have been, within Congress's legislative power\" because \"impeachment provides the exclusive mechanism for Congress to investigate such conduct.\" In response to this \"novel\" position, the majority opinion engaged in some limited discussion of the relationship between legislative and impeachment investigations. That discussion was characterized by deference to Congress. As the court noted, the Constitution leaves questions of \"whether to commence the impeachment process\" and when to \"move from legislative investigation to impeachment\" to Congress's \"judgment.\" Moreover, Congress, and not the courts, must make the \"quintessentially legislative\" determination of whether misconduct is \"better addressed\" through \"oversight and legislation\" or through the \"grave and weighty process of impeachment.\" In sum, the legislative purpose requirement is unlikely to be construed as posing an obstacle to information access in an impeachment investigation. Nor does the requirement appear to serve as a consequential legal limitation on legislative investigations, including those focusing on executive branch misconduct, so long as a committee can articulate a connection to a \"subject on which legislation may be had.\" Executive privilege has been formally asserted as a justification for noncompliance with committee subpoenas in the ongoing House investigations. As discussed, a court may be hesitant to resolve a conflict between a congressional committee and the President over executive privilegeâinstead preferring that the political branches negotiate a resolution or that Congress enforce its demands by use of its own legislative and impeachment powers. However, if a court were to address a privilege dispute, including one over subpoenaed documents or testimony by executive officials, there are reasons to believe that a committee engaged in an impeachment investigation may be more likely to overcome a presidential assertion of the privilege than a committee engaged in a traditional legislative investigation. Even still, a committee engaged in a legislative investigation, depending on the \"nature and appropriateness\" of the committee's function and its need for the information, may also be able to access certain material covered by the privilege. Executive privilege is a term that has been used to describe the President's power to \"resist disclosure of information the confidentiality of which [is] crucial to fulfillment of the unique role and responsibilities of the executive branch of our government.\" However, there is not one, single \"executive privilege.\" Instead, there is a suite of distinct privileges, each of differentâthough sometimes overlappingâscope. These privileges primarily include the presidential communications privilege, which generally protects communications involving the President or his close advisers that relate to presidential decisions; the deliberative process privilege, which generally protects predecisional and deliberative communications made within the executive branch; and, at least under the executive branch's view, the law enforcement privilege, which arguably protects the contents of open (and sometimes closed) law enforcement files, including evidence gathered in an investigation and communications related to investigative and prosecutorial decisionmaking. In a congressional investigation, the precise privilege asserted in response to a subpoena is an important determination because each component privilege arises from a different source of law, with some components more firmly established in judicial precedent than others. For example, while the Supreme Court has recognized that the presidential communications privilege derives from the Constitution, the deliberative process privilege appears to arise principally from the common law, but, at least in the view of one district court, may have a \"constitutional dimension.\" On the other hand, although the executive branch asserts that the law enforcement privilege derives from both the President's powers under Article II and constitutionally based individual trial and privacy rights, those arguments have not been directly tested in courtâat least not in the context of a congressional subpoena where committees have previously objected to that privilege's use. What is apparent is that none of the executive privileges, even if found to cover subpoenaed information, necessarily presents an absolute bar to congressional access. As announced by the Supreme Court in United States v. Nixon , when faced with an executive privilege dispute courts must \"resolve [the] competing interests in a manner that preserves the essential functions of each branch.\" When the showing of need is adequate, the privilege is overcome. For example, in Nixon , the Court held that the President's \"generalized interest in confidentiality â¦ must yield to the demonstrated, specific need for evidence in a pending criminal trial....\" As such, it would appear that the type of privilege at play, the corresponding executive need for confidentiality, and Congress's interest in obtaining the information all may impact potential judicial outcomes in an executive privilege dispute. The Supreme Court has never addressed executive privilege's application in either a legislative or impeachment investigation. In fact, the leading (and arguably only substantive appellate) case addressing any component of executive privilege in the congressional context is the D.C. Circuit's decision in Senate Select Committee v. Nixon . That case involved an effort by the Senate Watergate Committee to enforce a subpoena issued to President Nixon for recordings of specific conversations he had with presidential advisers in the Oval Office, thus squarely implicating the presidential communications privilege. Notably, the subpoena was issued as part of a legislative, rather than impeachment, investigation. Although ultimately siding with the President, the D.C. Circuit made clear that a President's assertion of executive privilege could be overcome by a \"strong showing of need by another institution of government â¦\" As applied to Congress in the exercise of its investigative powers, this meant that a committee may overcome the President's privilege when it has shown that \"the subpoenaed evidence is demonstrably critical to the responsible fulfillment of the Committee's function.\" The Senate Watergate Committee sought to make the required showing by asserting it had a \"critical\" need for the tapes to carry out the two functions that most frequently form the basis of a legislative investigation: oversight and lawmaking. First, pursuant to its oversight function, the Committee argued that access to the tapes was necessary to \"oversee the operations of the executive branch, to investigate instances of possible corruption and malfeasance in office, and to expose the results of its investigations to public view.\" Second, pursuant to its lawmaking function, the Committee argued that \"resolution, on the basis of the subpoenaed tapes, of the conflicts in the testimony before it 'would aid in a determination whether legislative involvement in political campaigns is necessary.'\" The circuit court rejected both arguments, holding that the Senate Watergate Committee's need was \"too attenuated and too tangential to its functions to permit a judicial judgment that the President is required to comply with the Committee's subpoenas.\" That holding, however, appears to have been based on a pair of unique facts: copies of the tapes had been provided to the House Judiciary Committee under that Committee's impeachment investigation and the President had publicly released partial transcripts of the subpoenaed conversations. Both of these disclosures significantly impacted the appellate court's assessment of the Senate Watergate Committee's need for the tapes. For example, because the House Judiciary Committee had already obtained the tapes, any further oversight need by the Watergate Committee was \"merely cumulative.\" With regard to the Watergate Committee's lawmaking functions, the D.C. Circuit held that the particular content of the conversations was not essential to future legislation, as \"legislative judgments normally depend more on the predicted consequences of proposed legislative actions ... than on precise reconstruction of past events.\" Any \"specific legislative decisions\" faced by the Committee, the court concluded, could \"responsibly be made\" based on the released transcripts. There was some suggestion in Senate Select that the case may have been resolved differently if the committee seeking the tapes had been engaged in an impeachment investigation. This line of reasoning was developed in the decision below, where the district court, after holding that the President was not obligated to comply with the Watergate Committee's subpoena, noted that \"Congressional demands, if they be forthcoming, for tapes in furtherance of the more juridical constitutional process of impeachment would present wholly different considerations.\" On appeal in Senate Select , the D.C. Circuit also drew a somewhat similar comparison between the Senate Watergate Committee's oversight function and the House Judiciary Committee's impeachment function. The court did not, however, make any clear statement as to how it would weigh one relative to the other. Instead it stated that we need neither deny that the Congress may have, quite apart from its legislative responsibilities, a general oversight power, nor explore what the lawful reach of that power might be under the Committee's constituent resolution. Since passage of that resolution, the House Committee on the Judiciary has begun an inquiry into presidential impeachment. The investigative authority of the Judiciary Committee with respect to presidential conduct has an express constitutional source. The Supreme Court made a similar suggestion nearly a century earlier in Kilbourn v. Thompson , reasoning in dicta that while the House in that case lacked a valid legislative purpose to compel testimony, if an investigatory purpose \"had been avowed to impeach ..., the whole aspect of the case would have been changed.\" These general statements suggest that courts may treat impeachment investigations differently from legislative investigations, but they do not elaborate on how or why. Although not directly articulated by the courts, there appears to be a variety of reasons an impeachment investigation might be balanced against an invocation of executive privilege in a manner that is more favorable to congressional access. First, it is arguable that the importance of the impeachment function's constitutional role in addressing misconduct by federal officials and preserving the separation of powers requires that impeachment investigations be afforded the utmost deference when weighed against executive branch confidentiality interests. Indeed, there is substantial support for the proposition that executive privilege simply cannot be used to refuse Congress access to relevant information in an impeachment investigation. As previously discussed, Congress has long viewed its power to obtain information in furtherance of its impeachment power to reach \"the fullest and most unlimited extent.\" In its report on the Nixon impeachment investigation, the House Judiciary Committee adopted this argument, concluding that [w]hatever the limits of legislative power in other contextsâand whatever need may otherwise exist for preserving the confidentiality of Presidential conversationsâin the context of an impeachment proceeding the balance was struck in favor of the power of inquiry when the impeachment provision was written into the Constitution. Because the House's need for information in an impeachment investigation has been equated to that of a court in a judicial proceeding, it is possible to analogize the situation to that considered by the Supreme Court in United States v. Nixon , where the Court weighed the privilege in the context of a criminal trial subpoena. It could be argued that as in response to a subpoena in a pending criminal proceeding, a court could similarly view the privilege as insufficient to withstand a subpoena in an impeachment investigation. As articulated by the Judiciary Committee, \"[i]f a generalized Presidential interest in confidentiality cannot prevail over 'the fundamental demand of due process of law in the fair administration of justice,' neither can it be permitted to prevail over the fundamental need to obtain all the relevant facts in the impeachment process.\" This position is buttressed by concerns expressed by all three branches that executive privilege should not be used to hide wrongdoing, which would form the core of any impeachment investigation. Second, courts have suggested that the frequency with which disclosure may occur in a particular context is an important factor in any executive privilege balancing. For example in Nixon , the Supreme Court reasoned that \"we cannot conclude that advisers will be moved to temper the candor of their remarks by the infrequent occasions of disclosure because of the possibility that such conversations will be called for in the context of a criminal prosecution.\" Similar reasoning was applied in Dellums v Powell , in which the D.C. Circuit held that an executive privilege claim by former President Nixon was overcome in a civil suit alleging a civil conspiracy among high-level federal officials to deny a group of citizens their constitutional rights. There, the circuit court held that \"the possibility of disclosure\" in such a limited class of cases \"is not unlike the possibility of disclosure in criminal casesâthe infrequent occasions of such disclosure militate against any substantial fear that the candor of Presidential advisers will be imperiled.\" This line of reasoning suggests that a court may be more willing to order disclosure to a committee engaged in a historically rare impeachment investigation than it would to a committee in a much more common legislative investigation. Finally, the need for specific factual evidence in an impeachment investigation may be greater than in a legislative investigation. In Senate Select , the court suggested that specific information was not always necessary for Congress to carry out its lawmaking tasks. In doing so, the court distinguished the role of a legislative investigation from that of a grand jury investigation: There is a clear difference between Congress's legislative tasks and the responsibility of a grand jury, or any institution engaged in like functions. While fact-finding by a legislative committee is undeniably a part of its task, legislative judgments normally depend more on the predicted consequences of proposed legislative actions and their political acceptability, than on precise reconstruction of past events; Congress frequently legislates on the basis of conflicting information provided in its hearings. In contrast, the responsibility of the grand jury turns entirely on its ability to determine whether there is probable cause to believe that certain named individuals did or did not commit specific crimes â¦ We see no comparable need in the legislative process, at least not in the circumstances of this case. Impeachment investigations (and impeachment decisions), on the other hand, might require a more exacting factual record. A decision to impeach is not a typical generalized legislative determination, but is perhaps more aptly characterized as a specific finding that the evidence suggests wrongdoing adequate to support the impeachment of a federal official. Impeachment is assuredly a weighty legislative interest, and long-standing visions of the power suggest that a committee engaged in an impeachment investigation may be more likely to overcome the President's privilege than a committee engaged in a legislative investigation. Nevertheless, it remains the case that in certain circumstances, a committee engaged in a legislative investigation may also obtain information protected by executive privilege. History provides numerous examples of the executive branch voluntarily disclosing information to Congress that it initially identified as protected. Moreover, Senate Select cannot be read as establishing that legislative investigations can never overcome claims of executive privilege. As was stated by the Watergate Committee, \"the court's decision rested, as the court observed, on 'the peculiar circumstances of this case,' and should not necessarily prevent legislative committees in the future from obtaining materials relating to presidential communications.\" Instead, it would appear that a committee engaged in a legislative investigation can itself overcome a claim of executive privilege so long as it can show that \"the subpoenaed evidence is demonstrably critical to the responsible fulfillment of the Committee's function.\" An impeachment investigation is a substantial exercise of constitutional power vested exclusively in the House of Representatives. Invocation of the power likely strengthens the House's existing investigative authorities in ways that may allow the House (through its committees) to obtain more information from the executive branch than might otherwise be received through more traditional legislative investigations. Even so, reliance on the impeachment power may not always be necessary for Congress to obtain sensitive categories of information, including grand jury materials, evidence of private misconduct, or information protected by executive privilege. Whether investigating to inform itself for purposes of legislating, to conduct oversight of the executive branch, or to determine whether there is adequate reason to impeach a federal official, the House has broad authority to access relevant and needed information.", "summary": "Committee investigations in the House of Representatives can serve several objectives. Most often, an investigation seeks to gather information either to review past legislation or develop future legislation, or to enable a committee to conduct oversight of another branch of government. These inquiries may be called legislative investigations because their legal authority derives implicitly from the House's general legislative power. Much more rarely, a House committee may carry out an investigation to determine whether there are grounds to impeach a federal officialâa form of inquiry known as an impeachment investigation. While the labels \"legislative investigation\" and \"impeachment investigation\" provide some context to the objective or purpose of a House inquiry, an investigation may not always fall neatly into one of these categories. This ambiguity has been a topic of interest to many during the various ongoing House committee investigations concerning President Trump. On September 24, 2019, Speaker Pelosi announced that these investigations constitute an \"official impeachment inquiry.\" Although these committee investigations into allegations of presidential misconduct are proceeding, in the Speaker's words, under the \"umbrella of [an] impeachment inquiry,\" most appear to blend lawmaking, oversight, and impeachment purposes. However an investigation is labeled, because the Constitution provides the House with the \"sole Power of Impeachment,\" implementation of the impeachment power, including any ancillary investigative powers, would appear textually committed to the discretion of the House. Yet the House has not established a single, uniform approach to starting impeachment investigations. The process has instead evolved, generally tracking changes the House has made to its committee structure and the investigative authorities conferred to its committees. Although impeachment investigations have often been authorized by a House resolution, they have also been conducted without an explicit authorization. There are still other examples where the House provided express authorization only after a committee had engaged in a \"preliminary\" impeachment investigation. An impeachment investigation may be more likelyârelative to a traditional legislative investigationâto obtain certain categories of information, especially from the executive branch. For example, it is possible that the significance of an exercise of the impeachment power, in conjunction with a resulting increase in political and public pressure, may itself affect the Executive's compliance decisions. But an impeachment investigation may also have legal impacts. If, in the face of a dispute with the executive branch over access to information, the House chose to seek judicial enforcement of an investigative demand, there appear to be at least three potential ways in which the impeachment power could, relative to a legislative investigation, provide the House with a stronger legal position. An impeachment investigation may (1) improve the likelihood of a court authorizing committee access to grand jury materials; (2) relieve any possible limitations imposed by the requirement that a committee act with a \"legislative purpose\"; and (3) improve the likelihood that a committee will be able to overcome privilege assertions such as executive privilege. In the past, executive noncompliance with an impeachment investigation has also prompted the investigating committee to recommend to the House an article of impeachment for contempt of Congress. That said, a congressional committee engaged in a legislative investigation could arguably obtain much of the same information as it would during an impeachment inquiry, as both legislative and impeachment investigations constitute an exercise of significant constitutional authority. As a result, while an impeachment investigation may very well increase the House's access to information, House committees may have substantial authority to obtain the information they seek even without reliance on the impeachment power.", "document_type": "crs"}
{"report": "Under the U.S. Constitution, Congress exercises the \"power of the purse.\" This power is expressed through the application of several provisions. The power to lay and collect taxes and the power to borrow are among the enumerated powers of Congress under Article I, Section 8. Furthermore, Section 9 of Article I states that funds may be drawn from the Treasury only pursuant to appropriations made by law. By requiring the power of the purse to be exercised through the lawmaking process, the Constitution allows Congress to direct any budgetary actions that may be taken by the President and executive departments. The Constitution, however, does not prescribe how these legislative powers are to be exercised, nor does it expressly provide a specific role for the President with regard to budgetary matters. Instead, various statutes, congressional rules, practices, and precedents have been established over time to create a complex system in which multiple decisions and actions occur with varying degrees of coordination. As a consequence, there is no single \"budget process\" through which all budgetary decisions are made, and in any year there may be many budgetary measures necessary to establish or implement different aspects of federal fiscal policy. Under Article I, Section 5, \"Each House may determine the Rules of its Proceedings,\" so it is left to the House and Senate to adapt and develop procedures and practices as needed to facilitate the consideration and enactment of legislation. Congress, however, is a dynamic institution that can, and does, change its rules, practices, and organization in order to achieve changing goals or overcome new obstacles. Since the early years of the Republic, there have been a number of notable milestones in the evolution of procedures and practices concerning the consideration, enactment, and execution of budgetary legislation. These milestones were often the result of congressional efforts to solve problems or promote outcomes and thus help to provide insight into when, how, or why current practices developed. Although early Congresses referred legislation to ad hoc committees, within a few years the House began to organize a system of standing committees with fixed jurisdictions and responsibility for different legislative issues. In the House, responsibility for revenue, spending, and debt were assigned to a standing Committee of Ways and Means beginning in the Fourth Congress (1795-1797). In the Senate, a Committee on Finance with jurisdiction over these matters was established as part of a standing committee system during the second session of the 14 th Congress (1815-1817). By creating a system in which legislation was categorized by its content, Congress laid the groundwork for establishing rules and practices to provide for the separate consideration of various budgetary measures. The House later created a separate standing Committee on Appropriations in 1865, and the Senate took similar action in 1867. The distinction between appropriations and general policy legislation appears to have been understood and practiced long before it was formally recognized in House or Senate rules, probably derived from earlier British and colonial practices. As congressional practices developed in the early 19 th century, this distinction was reflected in the designation of general appropriations measures as \"supply bills,\" whose purpose was simply to supply funds to carry out government operations already defined in law. This distinction was also reinforced by the way in which they were considered by the House. Supply bills would be initially taken up as a list of objects of expenditure, with blanks rather than dollar amounts for associated expenditures, and the amounts filled in by action on the floor. Such bills were generally considered as little more than a matter of form, without extensive debate except for the purpose of filling in the blanks. The inclusion of substantial new legislative language in supply bills was generally believed to be inappropriate, as it might delay the provision of necessary funds or lead to the enactment of matters that might not otherwise become law. According to Hinds' Precedents , the origin of a formal rule mandating the separate consideration of policy legislation and appropriations can be traced to 1835, when the House discussed the increasing problem of delays in enacting appropriations. A significant part of this delay was attributed to the inclusion in such bills of \"debatable matters of another character, new laws which created long debates,\" and a proposal was made to strip appropriation bills of \"everything but were legitimate matters of appropriation, and such as were not â¦ made the subject of a separate bill.\" Although the proposal was not adopted at the time, at the beginning of the following Congress (25 th Congress, 1837-1839), language was added to the standing rules of the House that stated: No appropriation shall be reported in such general appropriation bill, or be in order as an amendment thereto, for any expenditure not previously authorized by law. By formulating the rule as a requirement that appropriations only be to provide funding to carry out activities for which previously enacted legislation had provided the statutory authority for an agency to act, the rule formally limited the scope of purposes for which appropriations could be provided. The House soon after developed a practice of striking provisions containing general legislation from appropriations bills. It was not until 1876, however, that the House adopted language in its rules formally restricting the inclusion of legislative language in appropriations bills. As adopted in 1876, the rule stated: No appropriation shall be reported in such general appropriation bills, or be in order as an amendment thereto, for any expenditure not previously authorized by law unless in continuation of appropriations for such public works and objects as are already in progress; nor shall any provision in any such bill or amendment thereto, changing existing law, be in order except such as, being germane to the subject matter of the bill, shall retrench expenditures. There were also important principles established in the 19 th century concerning the extent to which the actions of agencies to execute the budget could be directed or limited by Congress. Although the First Congress enacted all appropriations in 1789 in a single act divided into lump sums for broad categories of expenditure, within a few years, Congress began to exercise control over how federal agencies spent money by enacting increasingly more specific appropriations. An additional general statutory restriction on agency actions to allocate how funds were spent was imposed in 1809 by the enactment of the \"purpose statute\" which required that sums appropriated by law for each branch of expenditure in the several departments shall be solely applied to the objects for which they are respectively appropriated, and to no other. Agencies sometimes took actions that undermined congressional fiscal controls, however. In some instances, they obligated funds in anticipation of appropriations, thereby creating liabilities that Congress would feel compelled to ratify. In others, they would obligate appropriated funds at a rate that was likely to produce a need for additional funds before the end of the fiscal year, giving rise to what were termed \"coercive deficiencies.\" As a result, Congress enacted the first \"antideficiency\" provision in 1870 stating that it shall not be lawful for any department of the government to expend in any one fiscal year any sum in excess of appropriations made by Congress for that fiscal year, or to involve the government in any contract for the future payment of money in excess of such appropriations. In addition to prohibiting agencies from obligating payments in the absence of appropriations, antideficiency laws also established the requirement that agencies establish plans to apportion available funds over the course of the fiscal year in order to avoid deficiencies. Although some Presidents made attempts to coordinate or limit agency budget estimates before they were communicated to Congress, such attempts were intermittent and uneven. This changed with the enactment of the Budget and Accounting Act of 1921. It created a statutory role for the President by requiring agencies to submit their budget requests to him and, in turn, for him to submit a consolidated request to Congress. The President's budget request became the center of a new relationship between the President and federal agencies and, consequently, of the agencies and Congress. The act also established the Bureau of the Budget (now the Office of Management and Budget [OMB]) to assist the President and the General Accounting Office (now the Government Accountability Office [GAO]) to serve as an independent auditor of government budgetary activities. Another significant change in federal budgeting in the 20 th century was the advent of direct (or mandatory) spending laws. Although there were 19 th century antecedents in which legislation was enacted to entitle an eligible class of recipients (such as veterans) to certain payments, such spending was not common. Beginning with Social Security in the 1930s, Congress began to enact broad-based spending legislation for which the level of spending was not controlled through the appropriations process. Instead, payments were required to be made to all eligible persons as prescribed in the law. In effect, such programs were designed to establish an expectation of stable payments for a class of individual recipients (even when the class or payments might change over time), rather than have the aggregate level of spending for the program subject to control through annual appropriations decisions. Such programs have grown to comprise the majority of all federal outlays. Until the 1970s, congressional consideration of the multiple budgetary measures considered in a given year as a whole lacked any formal coordination. Instead, Congress considered these various budgetary measures separately, sometimes informally comparing them to proposals in the President's budget. That was changed by the Congressional Budget Act of 1974 (CBA). The CBA provides for the adoption of a concurrent resolution on the budget that allows Congress to make decisions about overall fiscal policy and priorities and coordinate and establish guidelines for the consideration of various budget-related measures. Because a concurrent resolution is not a lawâthe President cannot sign or veto itâthe budget resolution does not have statutory effect, so no money is raised or spent pursuant to it. Revenue and spending levels set in the budget resolution, however, do establish the basis for enforcement of congressional budget policies through points of order. The CBA also established the House and Senate Budget Committees as well as CBO to provide Congress with an independent source for budgetary information, particularly estimates concerning the cost of proposed legislation. Since 1985, budgetary decisionmaking has also been subject to various budget control statutes designed to restrict congressional budgetary actions or implement particular budgetary outcomes in order to reduce the budget deficit, limit spending, or prevent deficit increases. The mechanisms included in these acts sought to supplement and modify the existing budget process and also added statutory budget controls, in some cases seeking to require future deficit reduction legislation or limit future congressional budgetary actions and in some cases seeking to preserve deficit reduction achieved in accompanying legislation. Chief among the laws enacted were the Balanced Budget and Emergency Deficit Control Act of 1985 and the Budget Enforcement Act of 1990. The Balanced Budget and Emergency Deficit Control Act of 1985 did not include legislation that reduced the deficit but instead established a statutory requirement for the gradual reduction and elimination of budget deficits over a six-year period. The act specified annual deficit limits and set forth a specific process for the cancellation of spending by requiring the President to issue an order (termed a sequester order) to enforce the annual deficit limit in the event that compliance was not achieved through legislation. The deficit targets and timetable were modified and extended in the Balanced Budget and Emergency Deficit Control Reaffirmation Act of 1987. With the Budget Enforcement Act of 1990, Congress changed the focus of budgetary control. While the 1985 Balanced Budget and Emergency Deficit Control Act had focused on enforcing deficit targets through unspecified future legislation, the Budget Enforcement Act was enacted as part of deficit reduction legislation and focused instead on inhibiting future legislation that would undo the savings. Budgetary enforcement under the Budget Enforcement Act was based on the implementation of pay-as-you-go (PAYGO) procedures to limit any increase in the deficit due to new direct spending or revenue legislation and limit discretionary spending through statutory spending caps. These budget control mechanisms sought to preserve the deficit reduction achieved in the accompanying legislation rather than force subsequent legislation. As originally enacted, these mechanisms were to be in force for a period of five years, but they were modified and extended twice. In 1993, they were extended through 1998 in the Omnibus Budget Reconciliation Act of 1993, and in 1997, they were extended through 2002 in the Budget Enforcement Act of 1997. In 2010, Congress reinstated PAYGO in the Statutory Pay-As-You-Go Act of 2010. In 2011, the Budget Control Act (BCA) reestablished statutory limits on discretionary spending, divided into separately enforceable defense and nondefense limits, for FY2012-FY2021. Several measures have subsequently been enacted that changed the spending limits or enforcement procedures included in the BCA. The federal budget is a compilation of numbers reflecting the receipts, spending, borrowing, and debt of the government. Receipts come largely from various taxes but are also derived from other sources as well (such as leases, licenses, and other fees). Spending involves such concepts as budget authority, obligations, outlays, and offsetting collections. Although the amounts are computed according to previously established rules and conventions, they do not always conform to the way receipts and spending might be accounted for in a different context. When Congress appropriates money, it provides budget authority , that is, statutory authority to enter into obligations for which payments will be made by the Treasury. Budget authority may also be provided in legislation that does not go through the annual appropriations process (such as direct spending legislation). The key congressional spending decisions relate to the obligations that agencies are authorized to incur during a fiscal year (amount, purpose, and timing), not to the outlays that result. Obligations occur when agencies enter into contracts, submit purchase orders, employ personnel, and so forth. Outlays occur when obligations are liquidated, primarily through the issuance of checks, electronic fund transfers, or the disbursement of cash. The provision of budget authority is the key point at which Congress exercises control over federal spending. Congress generally does not exercise direct control over outlays related to executive or judicial branch spending. The amount of outlays in a given year derive in part from new budget authority enacted in that year but also from \"carryover\" budget authority provided in prior years. The relation of budget authority to outlays varies from program to program and depends on the outlay or \"spendout\" rate, that is, the rate at which budget authority provided by Congress is obligated and payments are disbursed. Various factors can have an impact on the spendout rate for a particular program or activity. In a program with a high spendout rate, most new budget authority is expended during the fiscal year. If the spendout rate is low, however, most of the outlays occur in later years. Spendout rates are generally sensitive to program characteristics and vary over time for certain projects. The outlay levels associated with budget enforcement during the consideration of legislation reflect the projected amount that will be outlayed during the first year that budget authority is available. If actual payments turn out to be higher than the budget estimate, outlays can be above the projected level. The President and Congress can control outlays indirectly by deciding on the amount of budget authority provided by limiting the amount that can actually be obligated (termed an \"obligation limit\") or by limiting the period during which the funds may be obligated. The receipts of the federal government may be accounted for in the budget as revenues or as \"offsets\" against outlays. Revenues result from the exercise of the government's sovereign power to tax. In contrast, receipts from businesslike or market transactions, such as Medicare premiums or various fees collected by government agencies, are deducted from outlays. Similarly, income from the sale of certain assets is also treated as an offset to spending. These offsets may be classified as offsetting collections or offsetting receipts. In most cases, offsetting collections may be obligated without further legislative action, while offsetting receipts require an explicit appropriation to be available for obligation. Most such receipts are offsets against the outlays of the appropriation account for the agency that collects the money, but in the case of some activities (such as offshore oil leases), the receipts are offset against the total outlays of the government. The budget consists of two main groups of funds: federal funds and trust funds . Federal fundsâwhich comprise mainly the general fundâlargely derive from the general exercise of the taxing power and general borrowing. For the most part, these funds are not designated in law for any specific program or agency, although there are also special funds that are designated with respect to their source or purpose. Trust funds are established under the terms of statutes that specifically designate them as such and are available to fund only specific purposes. For example, the Social Security trust funds (the Old-Age and Survivors Insurance Fund and the Disability Insurance Fund), which are the largest of the trust funds, comprise revenues collected under a Social Security payroll tax and are used to pay for Social Security benefits and related purposes. The unified budget includes both the federal funds and the trust funds. In some circumstances, a trust fund may accumulate more funds in a given time period than are necessary to meet current obligations. Such balances are held in the form of federal debt, so that while a trust fund may be said to have a surplus, by holding it for future use in the form of federal debt, it is effectively borrowed by federal funds and counted as part of federal debt. Thus, a trust fund surplus can offset the overall budget deficit, but because it is included in the federal debt, the annual increase in the debt invariably exceeds the amount of the budget deficit. For the same reason, it is possible for the federal debt to rise even when the federal government has a budget surplus. Federal budgeting is mostly calculated based on cash flow so that capital and operating expenses are not segregated in the budget. Hence, expenditures for the operations of government agencies and expenditures for the acquisition of long-life assets (such as buildings, roads, and weapons systems) both appear in the budget in terms of their outlays. Proposals have been made from time to time to divide the budget into separate capital and operating accounts. While these proposals have not been adopted, the budget does provide information showing the investment and operating outlays of the government. One portion of the federal budget that is not based on cash flow is the budgeted levels for direct and guaranteed loans by the federal government. The Federal Credit Reform Act of 1990 made fundamental changes in the budgetary treatment of direct loans and guaranteed loans. The reform, which first became effective for FY1992, shifted the accounting basis for federally provided or guaranteed credit from the amount of cash flowing into or out of the Treasury to the estimated subsidy cost of the loans. Credit reform entails complex procedures for estimating these subsidy costs and new accounting mechanisms for recording various loan transactions. The changes have had only a modest impact on budget totals but a substantial impact on budgeting for particular loan programs. The budget totals do not include all the financial transactions of the federal government, however. The main exclusions fall into two categoriesâoff-budget entities and government-sponsored enterprises (GSEs). Off-budget entities are excluded by law from the budget totals. The receipts and disbursements of the Social Security trust funds, as well as spending for the Postal Service Fund, are presented separate from the budget totals. Thus, the budget reports two deficit (or surplus) amountsâone excluding the Social Security trust funds and the Postal Service Fund and the other (the unified budget) including these entities. In most cases, the latter is the main focus of discussion in both the President's budget and the congressional budget process. The transactions of government-owned corporations (excluding the Postal Service), as well as revolving funds, are included in the budget on a net basis. That is, the amount shown in the budget is the difference between their receipts and outlays, not the total activity of the enterprise or revolving fund. If, for example, a revolving fund has annual income of $150 million and disbursements of $200 million, the budget would report $50 million as net outlays. The Federal Reserve System has never been subjected to the appropriations process, and aside from the recording of transfers of Federal Reserve earnings as budget receipts, its financial operations have always been excluded from the federal budget. It is funded by fees and the income generated by securities it owns. Annual appropriations approval of Federal Reserve spending plans is not required, a result of a provision of the Federal Reserve Act, which stipulates that the Federal Reserve Board's assessment \"shall not be construed to be Government funds or appropriated moneys.\" If the Federal Reserve's income exceeds its expenses, its net earnings are transferred to the Treasury and recorded as \"miscellaneous receipts.\" GSEs have historically been excluded from the budget because they were deemed to be non-governmental entities. Although they were established by the federal law, the federal government did not own any equity in these enterprises, most of which received their financing from private sources, and their budgets were not reviewed by the President or Congress in the same manner as other programs. Most of these enterprises engaged in credit activities. They borrowed funds in capital markets and lent money to homeowners, farmers, and others. Financial statements of the GSEs were published in the President's budget. Although some GSEs continue to operate on this basis, the economic downturn and credit instability that occurred in 2008 fundamentally changed the status of two GSEs that play a significant role in the home mortgage market: Fannie Mae and Freddie Mac. In September 2008, the Federal Housing Finance Agency placed the two entities in conservatorship, thereby subjecting them to control by the federal government until the conservatorship is brought to an end. When the receipts collected by the federal government are not sufficient to cover outlays, it is necessary for the Treasury to finance the shortfall through the sale of various types of debt instruments to the public and federal agencies. Federal borrowing is subject to a statutory limit on public debt (referred to as the debt limit or debt ceiling). When the federal government operates with a budget deficit, or otherwise increases the level of debt necessary (such as to allow federal trust funds to hold surpluses), the response has been for the public debt limit to be increased to meet that need. The frequency of congressional action to raise the debt limit has ranged in the past from several times in one year to once in several years. In recent years, Congress has chosen to suspend the debt limit for a set amount of time instead of raising the debt limit by a fixed dollar amount. When a suspension period ends, the debt limit is reestablished at a dollar level that accommodates the level of federal debt issued during the suspension period. Legislation to raise the public debt limit falls under the jurisdiction of the House Ways and Means Committee and the Senate Finance Committee. In some cases, Congress has combined other legislative provisions with changes in the debt limit. For example, the Senate amended a House-passed bill raising the debt limit to add the Balanced Budget and Emergency Deficit Control Act of 1985. The House added debt limit provisions (as well as other matters) to an unrelated Senate-passed measure to create the Budget Control Act of 2011. In addition, debt limit provisions may be included in reconciliation legislation (described in a separate section of this report). In the 96 th Congress (1979-1980), the House amended its rules to provide for the automatic engrossment of a measure increasing the debt limit upon final adoption of a budget resolution. The rule (commonly referred to as the Gephardt Rule after Representative Richard Gephardt of Missouri) was intended to facilitate quick action on debt limit increases by deeming such a measure as passed by the House by the same vote as the final adoption of the budget resolution, thereby avoiding the need for a separate vote on the debt limit. The engrossed measure would then be transmitted to the Senate for further action. The rule was repealed in the 107 th Congress, reinstated in the 108 th Congress, repealed again in the 112 th Congress, and reinstated in modified form in the 116 th Congress. As currently provided in House Rule XXVIII, the rule provides for a measure to automatically be engrossed and deemed to have been passed by the House by the same vote as the adoption by the House of the concurrent resolution on the budget if the resolution sets forth a level of the public debt that is different from the existing statutory limit. Rather than a specific level of debt, however, this measure would suspend the debt limit through the end of the budget year for the concurrent resolution on the budget (but not through the period covered by any outyears beyond the budget year). As with the earlier version of the rule, the engrossed measure would then be transmitted to the Senate for further action. The Senate has no special procedures concerning consideration of debt limit legislation. Article I, Section 8, of the Constitution gives Congress the power to levy \"taxes, duties, imposts, and excises.\" Section 7 of this article, known as the Origination Clause, requires that all revenue measures originate in the House of Representatives. Legislation concerning taxes and tariffs falls under the jurisdiction of the House Ways and Means Committee and the Senate Finance Committee. Furthermore, House Rule XXI, clause 5, specifically bars the consideration of a tax or tariff measure reported from another committee (or an amendment containing a tax or tariff provision, including a Senate amendment, from being offered to a House measure reported by another committee). Neither the Origination Clause nor House Rule XXI, clause 5, applies to the consideration of legislation concerning receipts or collections, such as user fees, that are levied on a class that benefits from a particular service, program, or activity. Most revenues derive from existing provisions of the tax code or Social Security law, which continue in effect from year to year unless changed by Congress and are generally expected to produce increasing amounts of revenue in future years if the economy expands and incomes rise or the workforce grows. Nevertheless, Congress typically makes some changes in the tax laws each year, either to raise or lower revenues or to redistribute the tax burden. In enacting revenue legislation, Congress often includes provisions that establish or alter tax expenditures. The term tax expenditures is defined in the 1974 CBA to include revenue forgone due to deductions, exemptions, credits, and other exceptions to the basic tax structure. Tax expenditures are a means by which the federal government uses the tax code to pursue public policy objectives and can be regarded as alternatives to spending policy actions such as grants or loans. The Joint Committee on Taxation estimates the revenue effects of legislation changing tax expenditures, and it also publishes five-year projections of these provisions as an annual committee print. Congress may choose to act on revenue legislation pursuant to proposals in the President's budget. An early step in congressional work on revenue legislation is publication by CBO of its own estimates (developed in consultation with the Joint Committee on Taxation) of the revenue impact of the President's budget proposals. Revenue totals agreed to in a budget resolution can be used to establish the framework for subsequent action on revenue measures. A budget resolution, however, contains only revenue totals and total recommended changes; it does not allocate these totals among revenue sources, nor does it specify which provisions of the tax code are to be changed. The House and Senate may consider revenue measures under their regular legislative procedures, such as the chambers did for the Tax Reform Act of 1986. However, changes in revenue policy may also be made in the context of the reconciliation process (described in a separate section of this report), such as the Economic Growth and Tax Relief Reconciliation Act of 2001, the Jobs and Growth Tax Relief Reconciliation Act of 2003, and the Tax Cuts and Jobs Act of 2015. Congressional budgetary procedures distinguish between two types of spending: discretionary spending (which is controlled through the annual appropriations process) and direct spending (also referred to as mandatory spending, for which the level of funding is controlled outside of the annual appropriations process). Discretionary and direct spending are both included in the President's budget and the congressional budget resolution, and they both provide statutory authority for agencies to enter into obligations for payments from the Treasury. The two forms of spending, however, are distinct in most other respects in terms of both their formulation and consideration. There are some notable exceptions to these distinctions, however, so that some procedures associated with direct spending are applied to particular discretionary spending programs and vice versa. Formulation. The basic unit for appropriations legislation is the spending account. In modern practice, regular appropriations legislation is drafted as unnumbered paragraphs that provide a lump-sum amount for each appropriations account. This lump sum provides a definite amount of budget authority that is available to finance activities or programs covered by that account for a certain period of availability for certain purposes consistent with statutory requirements or limitations. In many cases, appropriations for an agency may be provided in relatively few broad accounts, such as for \"salaries and expenses,\" \"operations,\" or \"research.\" Direct spending, on the other hand, characteristically provides budget authority in the form of a requirement to make payments to eligible individual recipients according to a formula that establishes eligibility criteria and a program of benefits. The resulting overall level of outlays would be an aggregation of obligations for these individual benefits. In some cases (termed \"appropriated entitlements\"), appropriations legislation may be used to provide the means of financing, but, in practice, the requirements for funding such programs are determined through their authorizing legislation so that the Appropriations Committees have little or no discretion as to the amounts they provide. Committee j urisdiction. The Appropriations Committees have jurisdiction over discretionary spending for federal agencies and programs. In contrast, legislative committees (such as the Senate Committee on Health, Education, Labor and Pensions or the House Agriculture Committee), have jurisdiction over direct spending programs (including those funded in annual appropriations acts) through their jurisdiction over legislation concerning the structure of direct spending programs and their formulas regarding eligibility criteria and program of benefit payments. Frequency of d ecision m aking. Discretionary spending is provided in regular appropriations bills that are characteristically considered on an annual schedule. With some exceptions, budget authority provided in these measures is available for obligation only during a single fiscal year. Direct spending programs are typically established in permanent law that continues in effect until such time as it is revised or terminated, although in some cases (such as the Child Health Insurance Program and Temporary Assistance for Needy Families) the program may need periodic reauthorization. The scheduling for consideration of legislation making such changes is determined by congressional leadership through their agenda-setting authority rather than keyed to the beginning of the fiscal year. Enforcing s pending l evels in the b udget r esolution. The procedures Congress uses to enforce the policies set forth in the annual budget resolution differ somewhat for discretionary and direct spending programs. For both types of spending, Congress relies on allocations made under Section 302 of the 1974 CBA to ensure that new spending legislation reported by House and Senate committees conforms to parameters established in the budget resolution. Although this procedure is effective in limiting consideration of new legislationâboth annual appropriations measures and new entitlement legislationâit is not an effective means for controlling direct spending that results from existing laws. Changes to the level of direct spending requires the enactment of new legislation that would change formulas regarding eligibility criteria and program of benefit payments, either through the regular legislative process or some expedited procedure such as reconciliation (described in a later section of this report). Statutory c ontrols. Discretionary spending for FY2012-FY2021 is subject to spending limits set in the Budget Control Act, as revised. These spending limits are divided into separately enforced amounts for defense and nondefense. Direct spending is not capped, but new direct spending (or revenue) legislation is subject to the Statutory Pay-as-You-Go Act of 2010. This act requires that the net effect of direct spending and revenue legislation enacted for a fiscal year not cause the deficit to rise or the surplus to decrease over specified periods of time. For any given fiscal year, federal budgeting is often viewed as a cyclical activity that begins with the formulation of the President's annual budget request and concludes with the audit and review of expenditures spreading over a multiyear period. The main stages are formulation and submission to Congress of the President's budget; congressional consideration of budgetary measures, including the budget resolution, appropriations legislation, and other measures as necessary to establish statutory spending and revenue requirements; budget execution; and finally audit and review. While the basic steps continue from year to year, particular procedures and timing can vary in accordance with the President or Congress, as well as various other economic and political considerations. The budget cycle can be discussed within the context of the calendar year, the congressional session, and the fiscal year. The calendar year and congressional sessions exist largely side by side. Since the Budget and Accounting Act of 1921, the President has been required to submit his budget request for the next fiscal year at the beginning of the calendar year. Furthermore, since the ratification of the Twentieth Amendment to the U.S. Constitution in 1933, congressional sessions have begun on January 3 (unless a law is enacted setting a different day). Together, these two factors mean that the consideration of budgetary matters by Congress for the upcoming fiscal year is generally expected to start near the beginning of the calendar year. Since FY1977, the federal fiscal year has been October 1 through September 30, as set by the CBA. Because appropriations legislation typically provides budget authority to be obligated over the course of a single fiscal year, the focus of congressional action in the budget cycle is the consideration and enactment of new annual appropriations legislation before the expiration of prior enacted appropriations (although this process often stretches beyond the beginning of the fiscal year). This focus on the upcoming fiscal year (referred to as the budget year) is reflected in the President's budget proposal and budget resolution as well. Direct spending or revenue legislation, however, may have effective dates that are different from the beginning of the fiscal year. In addition, Section 300 of the CBA establishes a timetable with respect to target dates for certain actions in the congressional budget process. The budget process, however, is not just about a single fiscal year. While the focus for Congress is legislation pertaining to the upcoming fiscal year, it may also need to address legislation, such as supplemental appropriations for disaster relief, affecting the fiscal year in progress or long-term budget planning. Federal agencies also typically deal with multiple fiscal years at the same time: auditing of completed fiscal years, implementing the budget for the current fiscal year, seeking funds from Congress for the upcoming fiscal year, and planning for fiscal years after that. Taken as a whole then, budgetary activities from planning to execution related to the funding for a fiscal year can actually stretch over an extended period of two-and-a-half calendar years (or longer). The Constitution does not assign a formal role to the President in the federal budget process. It was largely left for agencies to develop and submit their own budget estimates to Congress individually. Although some Presidents made attempts to coordinate or limit agency budget estimates before they were communicated to Congress, such attempts were intermittent and uneven. This was changed by the Budget and Accounting Act of 1921, which created a statutory role for the President in federal budgeting by establishing a framework for a consolidated federal budget proposal to be developed by the President and submitted to Congress prior to the start of each fiscal year. By barring agencies from submitting their budget requests directly to Congress, and making the President responsible for a consolidated budget request, the act altered the institutional responsibilities of the office. The President's budget submission reflects the President's policy priorities and offers a set of recommendations regarding federal programs, projects, and activities funded through appropriations acts as well as any proposed changes to revenue and mandatory spending laws. Under current law, the President is required to submit a budget to Congress no later than the first Monday in February prior to the start of the fiscal year, but preparation typically begins at least nine or 10 months prior to that, approximately 18 months before the start of the fiscal year. OMB coordinates the development of the President's budget by issuing various circulars, memoranda, and other guidance documents to the heads of executive agencies. In particular, OMB Circular No. A-11 is issued annually. It is an extensive document that provides agencies with an overview of applicable budgetary laws, policies for the preparation and submission of budgetary estimates, and information on financial management and budget data systems. Circular A-11 also provides agencies with directions for budget execution and guidance regarding agency interaction with Congress and the public. When agencies begin work on the budget for a forthcoming fiscal year, Congress has not yet made final determinations for the next year. Consequently, agencies must begin the process of developing their budget estimates with a great deal of uncertainty about future economic conditions, presidential policies, and congressional actions. Agency requests are typically submitted to OMB in late summer or early fall and are reviewed by OMB on behalf of the President. Under the Government Performance and Results Act, agencies are required to link the formulation of their budgets with government performance through strategic plans, annual performance plans, and annual performance reports. OMB notifies agencies of decisions regarding their budget and performance plans through what is known as the \"passback\" and are given an opportunity to make appeals to the OMB director and, in some cases, to the President. Once OMB and the President make final decisions, federal agencies and departments must revise their budget requests and performance plans to conform with these decisions. The content of the budget submission is partly determined by law, but Title 31 authorizes the President to set forth the budget \"in such form and detail\" as he may determine. Over the years, there has been an increase in the types of information and explanatory material presented in the budget documents. In most years, the budget is submitted as a multi-volume set consisting of a main document setting forth the President's message to Congress and an analysis and justification of his major proposals. Additional supplementary documents typically provide account and program level details (the \"Budget Appendix\"), historical information (\"Historical Tables\"), and special budgetary analyses (\"Analytical Perspectives\"). The latter volume includes multiyear budget estimates that project spending and revenues where current policies are continued (called the \"current services baseline\") as well as spending and revenues under the President's proposed policy changes, among other things. In support of the President's appropriations requests, agencies prepare additional materials, frequently referred to as congressional budget justifications. These materials provide more detail than is contained in the President's budget documents and are used in support of agency testimony during Appropriations subcommittee hearings on the President's budget. The President is also required to submit a supplemental summary of the budget, referred to as the Mid-Session Review, before July 16 of each year. The Mid-Session Review is required to include any substantial changes in estimates of expenditures or receipts, as well as any changes or additions to proposals made in the earlier budget submission. The President may also submit other supplemental requests or revisions to Congress at other times during the year. Until the 1970s, congressional consideration of the multiple budgetary measures considered every year lacked any formal coordination. Instead, Congress considered these various spending and revenue measures separately, sometimes informally comparing them to proposals in the President's budget. That was changed by the CBA of 1974. The CBA provides for the adoption of a concurrent resolution on the budget, allowing Congress to make decisions about overall fiscal policy and priorities as well as to coordinate and establish guidelines for the consideration of various budget-related measures. This budget resolution sets aggregate budget policies and functional priorities for the upcoming budget year and for at least four additional fiscal years. In recent practice, budget resolutions have often covered a 10-year period. Because a concurrent resolution is not a law, the President cannot sign or veto it, and it does not have statutory effect, so no money can be raised or spent pursuant to it. The main purpose of the budget resolution is to establish the framework within which Congress considers separate revenue, spending, and other budget-related legislation. Revenue and spending amounts set in the budget resolution establish the basis for the enforcement of congressional budget policies through points of order . The budget resolution may also be used to initiate the reconciliation process for conforming existing revenue and direct spending laws to congressional budget policies (described below). For each fiscal year covered in a budget resolution, Section 301(a) of the CBA requires that it include budget aggregates and spending levels for each functional category of the budget. The aggregates in the budget resolution include: total revenues (and the amount by which the total is to be changed by legislative action); total new budget authority and outlays; the surplus or deficit; and public debt. With regard to each of the functional categories, the budget resolution must indicate for each fiscal year the amounts of new budget authority and outlays, and they must add up to the corresponding spending aggregates. Because they are considered off-budget, the aggregate amounts in the budget resolution do not reflect the revenues or spending of the Social Security trust funds, although these amounts are set forth separately in the budget resolution for purposes of Senate enforcement procedures. Similarly, the off-budget status of the Postal Service means that only an appropriation to subsidize certain mail costs is included in the budget resolution. In addition, the CBA requires that the report accompanying the budget resolution in each chamber include the following information: a comparison of total new budget authority, total outlays, total revenues, and the surplus or deficit for each fiscal year set forth in the budget resolution with the amounts requested in the budget submitted by the President; the estimated levels of total new budget authority and total outlays, divided between discretionary and mandatory amounts, for each major functional category; the economic assumptions that underlie the matters set forth in the budget resolution and any alternative assumptions and objectives the Budget Committee considered; information, data, and comparisons indicating the manner in which, and the basis on which, the Budget Committee determined each of the matters set forth in the resolution; the estimated levels of tax expenditures by major items and functional categories for the President's budget and in the budget resolution; and the committee spending allocations (commonly referred to as Section 302(a) allocations after the applicable section of the CBA). The budget resolution does not allocate funds among specific programs or accounts, but allocations of total spending in the budget resolution are made to committees with spending jurisdiction under Section 302(a). Major program assumptions underlying the functional amounts are often discussed in the reports accompanying the resolution. While the allocation to a committee is enforceable, these assumptions are not binding. Finally, Section 301(b) identifies certain additional matters that may be included in the budget resolution. Perhaps the most significant optional feature of a budget resolution is reconciliation directives (discussed below). The House and Senate Budget Committees are responsible for marking up and reporting the budget resolution. In the course of developing the budget resolution, the Budget Committees hold hearings, receive \"views and estimates\" reports from other committees, and obtain information from CBO. These \"views and estimates\" reports of House and Senate committees provide the Budget Committees with information on the preferences and legislative plans of congressional committees regarding budgetary matters within their jurisdiction. The extent to which the Budget Committees (and the House and Senate) consider particular programs when they act on the budget resolution varies from year to year. Specific programmatic funding decisions remain the responsibility of the Appropriations Committees and the committees with direct spending jurisdiction, but there is a strong likelihood that major issues will be discussed in markup, in the Budget Committees' reports, and during floor consideration of the budget resolution. Although any programmatic assumptions generated in this process are not binding on the committees of jurisdiction, they often influence the final outcome. Floor consideration of the budget resolution is guided by the statutory provisions in the CBA and by House and Senate rules and practices. In the House, the Rules Committee usually reports a special rule, which, once approved, establishes the terms and conditions under which the budget resolution is considered. This special rule typically specifies which amendments may be considered and the sequence in which they are to be offered and voted on. It has been the practice of the House to allow consideration of a few amendments (as substitutes for the entire resolution) that present broad policy choices. In the Senate, the consideration is less structured, but there are some notable constraints that apply to consideration of budget resolutions that do not apply to the consideration of legislation generally. In particular, Section 305 of the CBA limits debate on the initial consideration of a budget resolution and all amendments, debatable motions, and appeals to not more than 50 hours with the time equally divided between, and controlled by, the majority and the minority. The effect of the limit on debate time is that a cloture process requiring three-fifths support is not necessary to reach a final vote on a budget resolution, so the question can be decided by a simple majority. In addition, all amendments offered must be germane. Although there is a limit on debate time, there is no limit on the number of amendments so that consideration of amendments (as well as other motions and appeals) may continue but without debate (sometimes referred to as a \"vote-a-rama\"). Although no further debate time is available, the Senate has sometimes agreed by unanimous consent to accelerated voting procedures, allowing a nominal amount of time to identify and explain an amendment before voting. The CBA imposes no procedural limit on the duration of a vote-a-rama. The CBA provides that a motion to proceed to consideration of a conference report on a budget resolution in the Senate may be made at any time and that all debate on the conference report (and any amendments, debatable motions, or appeals) is limited to 10 hours. As with the limit on debate time for initial consideration, this limit means that in the Senate a cloture process requiring three-fifths support is not necessary to reach a final vote, so the question can be decided by a simple majority. Although the CBA also provides for House consideration of a conference report on a budget resolution, the House routinely considers a conference report under a special rule, usually limiting debate to one hour. Achievement of the policies set forth in the annual budget resolution depends on the subsequent legislative actions taken by Congress (and their approval or disapproval by the President), the performance of the economy, and technical considerations. Many of the factors that determine whether budgetary goals will be met are beyond the direct control of Congress. If economic conditionsâgrowth, employment levels, inflation, and so forthâvary significantly from projected levels, so too will actual levels of revenue and spending. Similarly, actual levels of spending or receipts may also differ substantially if the technical factors upon which estimates were based prove faulty, such as the number of participants who become eligible or apply for benefits under a direct spending program. If the House and Senate do not reach final agreement on a budget resolution it can complicate the budget process. In the absence of a budget resolution, the House and Senate often lack the basis for using points of order to limit the budgetary impact of legislation, and it may also be more difficult to coordinate consideration of the various measures with budgetary impact, both within each chamber and between the chambers, or to assess a measure's relationship to overall budgetary policies and goals. For example, Section 303 of the CBA prohibits consideration of budgetary legislation prior to adoption of the budget resolution. The House is permitted to consider regular appropriations bills after May 15 even if a budget resolution has not been adopted, but without a budget resolution there would be no enforceable upper limit on the overall level of appropriations. In the absence of a budget resolution, however, Congress may use alternative means to establish enforceable budget levels. When Congress has been late in reaching final agreement on a budget resolution or has not reached agreement at all, the House and Senate, often acting separately, have used legislative procedures to deal with enforcement issues on an ad hoc basis. These alternatives are typically referred to as \"deeming resolutions,\" because they are deemed to serve in place of an agreement between the two chambers on an annual budget resolution for the purposes of establishing enforceable budget levels for the upcoming fiscal year (or multiple fiscal years). Often, a chamber initiates action on a deeming resolution so that it can subsequently begin consideration of appropriations measures with enforceable limits. Deeming resolutions have varied in terms of the legislative vehicle used to establish them, the timing and duration of their effect, and their content. Congress initially used simple resolutions in each chamber as the legislative vehicle for deeming resolutions (which is why they are referred to as resolutions). In the House, deeming resolutions have often been included in the same resolution providing for consideration of the first appropriations measure for the upcoming fiscal year. Deeming resolutions have also been included as provisions in lawmaking vehicles, such as appropriations bills or statutory budget enforcement legislation. For example, the Budget Control Act of 2011 included provisions for the purpose of budget enforcement for FY2012 and FY2013 to apply in the Senate only if Congress did not agree on a budget resolution for either of those years. These provisions allowed the Senate Budget Committee chair to file in the Congressional Record enforceable levels consistent with the statutory spending caps (for discretionary spending) and with baseline projections made by the CBO (for direct spending and revenues). Subsequent measures enacted to modify the spending limits included similar provisions for the House or Senate or both. Adopting a deeming resolution does not preclude later action to approve a budget resolution. In some cases when Congress has been late in reaching final agreement on a budget resolution, either or both chambers have chosen to use a deeming resolution in order to allow the appropriations process to move forward in a more timely and coordinated fashion and later superseded it through final adoption of a budget resolution. Deeming resolutions have typically included at least two things: (1) language setting forth or referencing specific enforceable budgetary levels (such as an aggregate spending limit or committee spending allocations) and (2) language stipulating that such levels are to be enforceable as if they had been included in a budget resolution. Even so, significant variations exist in their content, with some incorporating (either in their text or by reference) language mirroring everything in a budget resolution adopted in that chamber but not adopted in final form by both. Regardless of whether Congress establishes budgetary parameters in a budget resolution or some other legislative vehicle, in order for enforcement procedures to work, Congress must be able to relate the budgetary effect of an individual measure to these overall budget parameters to determine whether it would be consistent with those parameters. In order to do so, Congress has sought access to complete and up-to-date budgetary information. A baseline is a projection of federal spending and receipts during the current or future fiscal year under existing law. It provides a benchmark for measuring the impact of proposed changes to existing policies. Projections of the impact of proposed or pending legislation, referred to as scoring or scorekeeping , allow Congress to be informed about the budgetary consequences of its actions. When a measure with spending or revenue impact is under consideration, scoring information helps Members determine whether a bill or amendment would violate budgetary rules. Scoring also allows Congress to determine how best to achieve the budgetary goals. Section 312(a) of the CBA designates the House and Senate Budget Committees as the principal scorekeepers for Congress. They provide each chamber's presiding officer with the estimates needed to make decisions about points of order enforcing budgetary parameters. The Budget Committees also make periodic summary scorekeeping reports that are placed in the Congressional Record . CBO assists Congress in these activities by preparing cost estimates of legislation, which are included in committee reports, and scoring reports for the Budget Committees. The Joint Committee on Taxation also supports Congress by preparing estimates of the budgetary impact of revenue legislation. Although a budget resolution does not become law, Congress has a variety of tools that it may use for enforcing the decisions made in it. The CBA includes several provisions designed to encourage congressional compliance with the budget resolution. The House and Senate have also adopted other limits, as part of their standing rules, as procedural provisions in budget resolutions, or as a part of some other measure to establish other budgetary rules, limits, and requirements. In particular, the overall spending ceiling, revenue floor, and committee allocations of spending determined in a budget resolution are all enforceable by points of order in both the House and the Senate. In addition, Appropriations Committees are required to make subdivisions of their committee allocation, and these too are enforceable by points of order. Legislation breaching other budgetary limits or causing increases in the deficit would also generally be subject to points of order. Points of order are effectively prohibitions against certain types of legislation or other congressional actions being taken in the legislative process. Points of order are not self-enforcing, however. A point of order must be raised by a Member on the floor of the chamber before the presiding officer can rule on its application and thus for its enforcement. In the Senate, most points of order related to budget enforcement may be waived by a vote of three-fifths of all Senators duly chosen and sworn (60 votes if there are no vacancies). Although the presiding officer may rule on whether the point of order is well taken, in practice Senators will typically make a motion to waive the application of the rule. If the waiver motion fails, the presiding officer will then rule the provision or amendment out of order. As with other provisions of Senate rules, budget enforcement points of order may also be waived by unanimous consent. In the House, points of order, including those for budget enforcement, may be waived by the adoption of special rules, although other means (such as unanimous consent or suspension of the rules) may also be used. A waiver may be used to protect a bill, specified provision(s) in a bill, or an amendment from a point of order that could be raised against it. Waivers may be granted for one or more amendments even if they are not granted for the underlying bill. The House may waive the application of one or more specific points of order, or it may include a \"blanket waiver,\" that is, a waiver that would protect a bill, provision, or amendment from any point of order. Because a budget resolution is in the form of a concurrent resolution and is not enacted into law, any statutory changes concerning spending or revenues that are necessary to implement changes in budget policies must be enacted in separate legislation. Reconciliation is an optional legislative process that affords Congress an opportunity to use an expedited procedure to accomplish this. As provided in Section 310 of the CBA, reconciliation consists of several stages, beginning with congressional adoption of the budget resolution, that allow Congress to make policy changes within the jurisdiction of specified committees. The reconciliation process allows a certain measure (or measures) to be privileged for consideration and then allows Congress to use an expedited procedure when considering it. These procedures include directing committees to draft legislative language to fit specific desired budgetary outcomes, packaging language from multiple committees into omnibus legislation, limiting amending opportunities, and limiting the duration of debate on the Senate floor. If Congress intends to use the reconciliation process, reconciliation instructions to committees must first be included in the budget resolution. This feature alone places perhaps the most significant limitation on the use of reconciliation. A budget resolution can be adopted with a simple majority, but because bicameral agreement on the budget resolution is a necessary first step, the House and Senate must collectively agree on the need for reconciliation. If such an agreement can be achieved, reconciliation instructions can then trigger the second stage of the process by directing specific committees to develop and report legislation that would change laws within their respective jurisdictions related to spending, revenues, or the debt limit. If a committee is instructed to submit legislation reducing spending (or the deficit) by a specific amount, that amount is considered a minimum, meaning that a committee may report greater net savings. If a committee is instructed to submit legislation increasing revenues by a specific amount, that amount would also be considered a minimum. If a committee is instructed to decrease revenue, however, that amount would be considered a maximum. Although there is no procedural mechanism to ensure that legislation developed by a committee in response to reconciliation instructions will be in compliance with the instructed levels, if a committee does not report legislation or such legislation is not fully in compliance with the instructions, procedures are available that would allow either chamber to move forward with reconciliation nevertheless. For example, legislative language that falls within the jurisdiction of the noncompliant committee can be added to a reconciliation bill during floor consideration that will bring the bill into compliance. These methods vary by chamber. In the development of legislation in response to reconciliation instructions, the policy choices remain the prerogative of the committee. In some instances, reconciliation instructions have included particular policy options or assumptions regarding how an instructed committee might be expected to achieve its reconciliation target, but such language has not been considered binding or enforceable. Reconciliation instructions may further direct the committee to report the legislation for consideration in its respective chamber or to submit the legislation to the Budget Committee to be included in an omnibus reconciliation measure. If it will be included in an omnibus measure, the CBA requires that the Budget Committee report such a measure \"without any substantive revision.\" Although reconciliation instructions may include target dates for committees to submit their legislative language, there is no requirement that the Budget Committee, in either chamber, report a reconciliation bill by that date. As a consequence, the target date included in reconciliation instructions is not necessarily indicative of a timetable for consideration of reconciliation legislation. In the House, floor consideration of reconciliation legislation has historically been governed by special rules reported from the House Rules Committee. These special rules have established the duration of a period of general debate as well as provided for a limited number of amendments (if any) that may be considered before the House votes on final passage. In the Senate, reconciliation legislation is eligible to be considered under expedited procedures. The Senate has interpreted the CBA to allow it to take up a reconciliation bill by agreeing to a nondebatable motion to proceed to its consideration. Because it is nondebatable, a majority can vote immediately to take it up so that a cloture process requiring three-fifth support is not necessary to reach a vote on the question of whether to take up a reconciliation bill. For a reconciliation bill, as with a budget resolution, a distinguishing feature is that there are limits on the consideration of the bill as well as any amendments. Section 310 of the CBA limits total debate time on a reconciliation measure including all amendments, motions, or appeals to 20 hours, equally divided and controlled by the majority and minority. As with a budget resolution, because the limit is on debate time (rather than all consideration), after the debate time has expired, Senators may continue to offer amendments (and make other motions or appeals) in a vote-a-rama although no further debate is allowed. Despite this, the limit on debate time has meant that, in practice, it has been unnecessary for a supermajority of the Senate to invoke cloture in order to reach a final vote on a reconciliation bill so that it can be passed by a simple majority. Perhaps the best-known limit on the content of reconciliation bills or amendments is the so-called Byrd Rule (Section 313 of the CBA). This rule prohibits including extraneous provisions in the measure or offering them as amendments. In general, this means that it prohibits the inclusion of nonbudgetary provisions in reconciliation legislation or provisions that are otherwise contrary to achieving the purposes established in reconciliation instructions. If a Byrd Rule point of order is sustained on the floor against a provision in the bill as reported by committee, the provision is stricken, but further consideration of the bill may continue. If the point of order is sustained against an amendment, the amendment's further consideration would not be in order. The CBA also places other limits on the content of reconciliation bill amendments. For example, all amendments must be germane to the bill, meaning that amendments generally cannot be used to expand the scope of a reconciliation bill beyond that of the provisions reported from an instructed committee (although a motion to commit or recommit that would bring a committee into compliance with its instructions would not be limited by this rule). Limits on amendments' budgetary impact also exist. Amendments, for example, may not increase the level of spending (or reduce the level of revenues) provided in the bill unless such effects are offset. Together, these rules have the effect of protecting the policy changes proposed by an instructed committee in ways that are not generally available under the Senate's regular procedures. In most cases, points of order related to limiting the content of reconciliation bills may be waived by a vote of three-fifths of all Senators. As with all legislation, any differences in the reconciliation legislation passed by the two chambers must be resolved before the bill can be sent to the President for approval or veto. Conference reports on a reconciliation bill, as for other legislation, are privileged for consideration by the Senate so that a majority can quickly vote to take up a conference report without first invoking cloture. The CBA, however, does provide that all debate on the conference report for a reconciliation bill (and any amendments, debatable motions, or appeals) is limited to 10 hours. In the House, the routine practice has been to consider a conference report under a special rule, usually limiting debate to one hour. Reconciliation first became a powerful legislative tool because reconciliation directives in a budget resolution could be used as a means to require specific legislative committees to make policy choices that would implement overall budgetary goals. Although there are constraints on the use of reconciliation, especially the need for bicameral agreement to initiate the procedure and points of order that limit the content of reconciliation bills, it has continued to be important because it has evolved to provide Congress with a procedure that has been employed to achieve a variety of budgetary and policy purposes. In particular, the limit on time for floor debate in the Senate has meant that major legislation can be enacted by majority vote without the need for a supermajority to first invoke cloture. Discretionary spending is provided through a characteristically annual process in which Congress enacts regular appropriations measures. As an exercise of their constitutional authority to determine their rules of proceeding, both chambers have adopted rules that facilitate their ability to define and provide for consideration of these measures. One fundamental aspect of this has been to limit appropriations to purposes authorized by law. This requirement allows Congress to distinguish between legislation that addresses only questions of policy and that which addresses questions of funding and to provide for their separate consideration. In common usage, the terms used to describe these types of measures are authorizations and appropriations , respectively. An authorization may generally be described as a statutory provision that defines the authority of the government to act. It can establish or continue a federal agency, program, policy, project, or activity. Further, it may establish policies and restrictions and deal with organizational and administrative matters. It may also, explicitly or implicitly, authorize subsequent congressional action to provide appropriations. By itself, however, an authorization of discretionary spending does not provide funding for government activities. An appropriation may generally be described as a statutory provision that provides budget authority, thus permitting a federal agency to incur obligations and make payments from the Treasury for specified purposes, usually during a specified period of time. The authorizing and appropriating tasks are largely carried out by a division of labor within the committee system and preserved under House and Senate rules. Legislative committeesâsuch as the House Committee on Armed Services and the Senate Committee on Commerce, Science, and Transportationâare responsible for authorizing legislation related to the agencies and programs under their jurisdiction. Most standing committees have authorizing responsibilities. The Appropriations Committees of the House and Senate have jurisdiction over appropriations measures, including annual appropriations bills, supplemental appropriations bills, and continuing resolutions. The primary purpose of authorization statutes or provisions is to provide authority for an agency to administer a program or engage in an activity. These are sometimes referred to as \"organic\" or \"enabling\" authorizations. It is generally understood that such statutory authority to administer a program or engage in an activity also provides an implicit authorization for Congress to appropriate for such program or activity. Appropriations may also be authorized explicitly for definite or indefinite amounts (i.e., \"such sums as may be necessary\"), either through separate legislation or as part of an organic statute (that is, the legislation that establishes the agency mission or programmatic parameters). These are sometimes referred to as \"authorizations of appropriations.\" If such an authorization of appropriations is present, it may have to be renewed annually or periodically, and it may expire even though the underlying authority in an organic statute to administer such a program or engage in such an activity does not. Most federal agencies operate under a patchwork of authorizing statutes that govern various requirements and duties. Furthermore, there is no requirement in either chamber that the structure of authorizations mirror the account structure in appropriations bills. As a consequence, the burden of proving the authorization for funding carried in an appropriations bill falls on the proponents and managers of the bill. The rules of the House and Senate establish a general expectation that agencies and programs be authorized in law before an appropriation is made to fund them. An appropriation in the absence of a current authorization, in excess of an authorization ceiling, or for purposes not previously authorized by law is commonly called an \"unauthorized appropriation.\" Conversely, while authorizations can impose a procedural limit on appropriations, Congress is not required to provide appropriations for an authorized discretionary spending program. House and Senate rules also preserve the distinction between authorizations and appropriations by prohibiting the inclusion of general legislative language in appropriations measures. The division between an authorization and an appropriation, however, is a procedural construct of House and Senate rules created to apply to congressional consideration. Consequently, the term unauthorized appropriations does not convey a legal meaning with regard to subsequent funding. If unauthorized appropriations or legislation remain in an appropriations measure as enacted, either because no one raised a point of order or the House or Senate waived the rules, the provision will still have the force of law. Unauthorized appropriations, if enacted, are therefore generally available for obligation or expenditure. Similarly, any legislative provisions enacted in an annual appropriations act also generally have the force of law for the duration of that act unless otherwise specified. An appropriation is a law passed by Congress that provides federal agencies legal authority to incur obligations and the Treasury Department authority to make payments for designated purposes. The power of appropriation derives from the Constitution, which in Article I, Section 9, provides that \"[n]o money shall be drawn from the Treasury but in consequence of appropriations made by law.\" The power to appropriate is exclusively a legislative power; it functions as a limitation on the executive branch. An agency may not spend more than the amount appropriated to it, and it may use available funds only for the purposes and according to the conditions provided by Congress. The Constitution does not require annual appropriations, but since the First Congress the practice has been to make appropriations for a single fiscal year. Appropriations must be used (obligated) in the fiscal year for which they are provided unless the law provides that they shall be available for a longer period of time. All provisions in an appropriations act, such as limitations on the use of funds, expire at the end of the fiscal year unless the language of the act extends their period of effectiveness. Congress passes three main types of appropriations measures. Regular appropriations acts provide budget authority to agencies for the next fiscal year. Supplemental appropriations acts provide additional budget authority during the current fiscal year when the regular appropriation is insufficient or to finance activities not provided for in the regular appropriation. Continuing appropriations acts provide interim (or full-year) funding for agencies that have not received a regular appropriation. In a typical session, Congress acts on 12 regular appropriations bills. In recent years, Congress has merged two or more of the regular appropriations acts (sometimes termed \"minibus\" or \"omnibus\" appropriations legislation) for a fiscal year at some point during their consideration. In current practice, there are both statutory and procedural limits on the level of discretionary spending. A statutory limit on discretionary spending was established under the BCA for each fiscal year from FY2012 through FY2021, divided into separate defense and nondefense categories. A procedural limit on total appropriations can be established under a budget resolution or some alternate measure (see sections on the budget resolution and deeming resolutions in this report). Once the amount is established, it is allocated to the Appropriations Committee in each chamber pursuant to Section 302(a) of the CBA. Section 302(b) further requires the Appropriations Committee in each chamber to subdivide the total allocation among its subcommittees. By long-standing custom, appropriations measures originate in the House of Representatives. In the House, appropriations measures are originated by the Appropriations Committee (when it marks up or reports the measure) rather than being introduced by a Member beforehand and referred to the committee. Before the full committee acts on the bill, it is drafted and considered in the relevant Appropriations subcommittee. The House and Senate Appropriations Committees currently have 12 parallel subcommittees. The House subcommittees typically hold extensive hearings on appropriations requests shortly after the President's budget is submitted. In marking up their appropriations bills, the various subcommittees are then guided by the discretionary spending limits and the subdivisions made to them by the full committee under Section 302(b) of the CBA. The Senate usually considers appropriations measures after they have been passed by the House. When House action on appropriations bills is delayed, however, the Senate may expedite its actions by considering a Senate-numbered bill up to the stage of final passage. In this scenario, upon receipt of the House-passed bill in the Senate, it is amended with the text that the Senate has already agreed to (as a single amendment) and then passed by the Senate. The basic unit of an appropriation bill is an account. A single unnumbered paragraph in an appropriations act comprises one account, and all provisions of that paragraph pertain to that account and to no other unless the text expressly gives them broader scope. Any provision limiting the use of funds enacted in that paragraph is a restriction on that account alone. Over the years, appropriations have been consolidated into a relatively small number of accounts. It is not uncommon for a federal agency to have a single account for all its expenses of operation and additional accounts for other purposes such as construction. Accordingly, most appropriation accounts encompass a number of activities or projects. The appropriation sometimes includes directives or provisos that allot specific amounts to particular activities within the account, but the more common practice is to provide detailed information on the amounts intended for each activity in other sources, principally the committee reports accompanying the measures. In addition to the substantive limitations (and other provisions) associated with each account, each appropriations act has \"general provisions\" that apply to all of the accounts in a title or in the whole act. These general provisions appear as numbered sections, usually at the end of the title or the act. If not otherwise specified, an appropriation is for a single fiscal year so that the funds have to be obligated during the fiscal year for which they are provided and that they lapse if not obligated by the end of that year. Congress can also specify that an appropriation remains available for obligation for another period or even that it remain available until expended (termed \"no-year\" funds). The routine activities of most federal agencies are funded annually by one or more of the regular appropriations acts. When action on the regular appropriations acts is delayed, however, one or more continuing appropriations acts (also referred to as a continuing resolution, or CR) may be used to provide interim budget authority in order to prevent a funding gap or the need for a shutdown of government activities. This may occur if regular annual appropriations acts are not enacted by the beginning of the fiscal year (October 1), or upon the expiration of a prior CR, until action on the regular appropriations acts is completed. In providing temporary funding, CRs have typically addressed several issues: Coverage. CRs have provided funding for certain activities. In current practice, this is typically specified with reference to the prior fiscal year's appropriations acts. Duration. CRs have provided budget authority for a specified duration of time. In some cases this may be as short as a single day, although a CR can provide funding for the remainder of the fiscal year. CRs include language that provides that the CR may be superseded by a regular appropriations act if it is enacted prior to the expiration of the CR. Rate. Since CRs typically provide funds for a limited period, they generally provide those funds based on a rate rather than a set amount. This rate can be set at the rate of operations funded in the previous year, it can be the previous rate of operations adjusted by some percentage, or it can be based on some other amount. This is in contrast to regular and supplemental appropriations acts, which generally provide specific amounts for each account. Other factors may also have an impact on interpreting the rate of operations, such as historical spending patterns or provisions commonly included in CRs that would require funds be apportioned at the rate necessary to avoid furloughs or limit funds for programs with high initial rates of operation or complete distribution of appropriations at a set time during a fiscal year (that is, all or most of the funds would be used at a single set time during the fiscal year). For mandatory spending that is funded through appropriations acts, CRs normally provide for a rate of funding sufficient to maintain program levels under current law since the levels necessary to meet obligations are independent of prior year actions. Funds expended under a CR are considered a portion of the total amount subsequently provided for the entire fiscal year when a regular appropriation bill is later enacted into law. Limits on u sage. CRs typically include language carrying forward any terms and conditions on the obligation of such budget authority in the prior fiscal year. CRs have also included language specifying that funding provided in the CR should be implemented so that only the most limited action allowed by law be taken with respect to providing for continuation of projects and activities in order to preserve congressional prerogative to later determine the amount available. Another typical feature of CRs is language to prohibit \"new starts\" in order to limit agencies, particularly the Department of Defense, the authority to make long-term commitments while operating under temporary funding or to prevent agencies from initiating or resuming any project or activity for which appropriations were not available during the prior fiscal year. Specific a djustments. The duration and amount of funds in the CR and purposes for which they may be used may be adjusted for specified activities or programsâfor example, to provide that funds for a certain program be based on an amount different from the rate for the previous year. These adjustments are commonly termed \"anomalies.\" After enactment of a particular appropriation into law, federal agencies must attempt to interpret and apply its terms in order to execute their budgetary responsibilities. Agencies may generally obligate and expend funds subject to any conditions addressed by appropriations statutes guided by three general principles: the purpose(s) for which particular funds are appropriated, which may be expressed in statute in more or less detail and, in some cases, with certain restrictions; the time period during which funds are available for obligation and expenditureâsometimes referred to as the period of availability or duration of appropriations; and the amount of appropriated funds that may be obligated and expended. Within the contours of these statutory conditions on the availability of funds, agencies may nevertheless exercise some discretion regarding how funds are allocated and the pace at which funds are obligated and spent. The so-called Antideficiency Act consists of a series of provisions and revisions incorporated into appropriations laws over the years relating to matters such as prohibited activities, the apportionment system, and budgetary reserves. These provisions, now codified in two locations in Title 31 of the United States Code , continue to play a pivotal role in the execution phase of the federal budget process, when the agencies actually spend the funds provided in appropriations laws. The origins of the Antideficiency Act date back to 1870, which provided: that it shall not be lawful for any department of the government to expend in any one fiscal year any sum in excess of appropriations made by Congress for that fiscal year, or to involve the government in any contract for the future payment of money in excess of such appropriations. Later modifications, particularly the Antideficiency Acts of 1905 and 1906, sought to strengthen the prohibitions of the 1870 law by expanding its provisions, adding restrictions on voluntary services for the government, and imposing criminal penalties for violations. These laws also established a new administrative process for budget execution, termed \"apportionment,\" which requires that budget authority provided to federal agencies in appropriations acts be allocated in installments, rather than all at once. By apportioning funds, agencies can prevent operating at a rate that would expend all budget authority before the end of the fiscal year or end the year with substantial amounts unobligated. Four main types of prohibitions are contained in the Antideficiency Act, as amended: (1) making expenditures in excess of the appropriation; (2) making expenditures in advance of the appropriation; (3) accepting voluntary service for the United States, except in cases of emergency; and (4) making obligations or expenditures in excess of an apportionment or reapportionment or in excess of the amount permitted by agency regulation. One significant impact of the Antideficiency Act has been concern with the potential for a government shutdown as a response to a funding gap. In 1980 and early 1981, then-Attorney General Benjamin Civiletti issued opinions in two letters to the President. The \"Civiletti Letters\" have continued to have effect through guidance provided to federal agencies under various OMB circulars clarifying the limits of federal government activities upon the occurrence of a funding gap. The Civiletti Letters state that, in general, the Antideficiency Act requires that if Congress has enacted no appropriation beyond a specified period, the agency may make no contracts and obligate no further funds for activities associated with the lapsed appropriation except as \"authorized by law.\" In addition, because no statute generally permits federal agencies to incur obligations without appropriations for the pay of employees, the Antideficiency Act does not, in general, authorize agencies to employ the services of their employees upon a lapse in appropriations, though it does permit agencies to fulfill certain legal obligations connected with the orderly termination of agency operations. The second letter, from January 1981, discusses the more complex issue of interpretation presented with respect to obligational authorities that are \"authorized by law\" but not manifested in appropriations acts. In a few cases, Congress has expressly authorized agencies to incur obligations without regard to available appropriations. More often, it is necessary to inquire under what circumstances statutes that vest particular functions in government agencies imply authority to create obligations for the execution of those functions despite a lack of current appropriations. It is under this guidance that exceptions may be made for activities involving \"the safety of human life or the protection of property.\" As a consequence of these guidelines, when a funding gap occurs, executive agencies begin a shutdown of the affected projects and activities, including the furlough of non-excepted personnel. The language by which funds are provided to federal agencies may vary in the level of discretion agencies have to determine how to spend the funds that have been provided. One type of discretion that commonly occurs is with respect to the purposes for which funds are available when appropriations are provided as a lump sum with little or no specificity in the appropriations statute. Even when the purpose of appropriations has been specified in detail, agencies have some flexibility to determine how they will use their available budgetary resources during the fiscal year. For example, agencies may shift funds from one purpose or object to another through reprogramming and transfers. Reprogramming is the shifting of funds within an appropriation account from one object class to another or from one program activity to another. Generally, agencies may make such shifts without additional statutory authority, but often they must provide some form of notification to the appropriations committees, authorizing committees, or both. A transfer is the shifting of budget authority from one appropriation account to another. Agencies may transfer budget authority only as specifically authorized by law. In most cases, transfers involve movement of funds within an agency or department, but they may also involve movement of funds between two or more agencies or departments. Transfer authority may be provided either in authorizing statutes or in appropriations acts. In addition, statutory provisions that provide transfer authority will require the agency to notify Congress. In general, both transferred and reprogrammed funds are subject to any limitations or conditions that were imposed by the appropriations act that originally made it available. All original restrictions remain in effect on transferred funds regardless of whether the funds in the receiving appropriations account have different restrictions or characteristics than the funds being transferred. In other words, limitations and restrictions follow the funds. Additional restrictions may be imposed by statutes to limit transfer or reprogramming authority in certain circumstances or with respect to certain agencies. Such restrictions may be specified in terms of an amount or a percentage. One example of a statutory restriction would be language that places a cap on the amounts that may be transferred. Such caps may be imposed on either the account from which funds are being transferred or the account receiving the transferred funds. These restrictions are commonly referred to as \"not-to-exceed\" limits. Although an appropriation limits the amounts that can be spent, it also establishes the expectation that the available funds will be used to carry out authorized activities. Therefore, when an agency declines to use all or part of an appropriation, it deviates from the intentions of Congress. Although Presidents have sometimes asserted that they are not obligated to spend appropriated funds, Supreme Court decisionsâespecially Train v. City of New York (420 U.S. 35 [1975]) and the Impoundment Control Act of 1974 (ICA) âlimit their authority to reduce or withhold agency funding, by action or inaction, that prevents the obligation and expenditure of budget authority. An impoundment is an action or inaction by the President or a federal agency that delays or withholds the obligation or expenditure of budget authority provided in law. The ICA divides impoundments into two categories and establishes distinct procedures for each: A deferral delays the use of funds; a rescission is a presidential request that Congress rescind (cancel) an appropriation or other form of budget authority. Deferral and rescission are exclusive and comprehensive categories. That is, an impoundment is either a rescission or a deferralâit cannot be both or something else. As originally enacted, the ICA also created a process through which the President could propose a deferral of budget authority (meaning to delay its availability), and either the House or Senate could prevent the deferral by adopting a resolution disapproving it. The process by which a single chamber could prevent the exercise of authority delegated to the executive branch (known as a \"legislative veto\") was later found unconstitutional, however. Specifically, after the Supreme Court invalidated an unrelated one-house legislative veto in INS v. Chadha , 462 U.S. 919 (1983), the Court of Appeals for the D.C. Circuit applied the reasoning of Chadha to invalidate the deferral provisions in the ICA. This decision in City of New Haven v. United States (809 F.2d 900 [D.C. Cir. 1987]), also struck down the statutory authority of the President to make deferrals for policy reasons as inseverable from the unconstitutional legislative veto. After the court decisions, as well as GAO administrative interpretations of the issue, Congress amended the ICA in 1987 to eliminate the one-house disapproval and specify that deferrals be \"permissible only: (1) to provide for contingencies; (2) to achieve savings made possible by or through changes in requirements for greater efficiency of operations; or (3) as specifically provided by law.\" In addition, deferrals could not be proposed for any period extending beyond the end of the fiscal year for which the proposal was reported. Prior to the enactment of the ICA, when the President withheld appropriated funds from obligation, there was no explicit statutory limit on the length of time that funds could be withheld. Under the ICA, however, whenever the President seeks to withhold funds from obligation, he must submit a special rescission message to Congress. The funds can be withheld only for the 45-day period specified in the act after the receipt of the special presidential message. The special presidential message to Congress must specify the amount to be rescinded, the accounts and programs involved, the estimated fiscal and program effects, and the reasons for the rescission. Multiple rescissions can be grouped in a single message. After the message has been received, Congress can choose to consider and pass a rescission bill that includes all, part, or none of the amount proposed by the President. The funds reserved pursuant to a rescission request must be released after the 45-day period unless Congress has completed action on a bill to rescind the budget authority. GAO is granted responsibilities to oversee and enforce executive branch compliance with the act. The ICA also created legislative procedures for the House and Senate to facilitate congressional review of presidential rescission requests. These procedures can effectively place a time limit on committee consideration and restrict floor debate in both chambers. The procedures discourage a filibuster in the Senate and eliminate the need for three-fifths support in the Senate to reach a final vote on the bill. These expedited procedures are available only during the 45-day period during which funds are withheld. The President can also propose cancellations of budget authority in ways other than the method described in the ICA for requesting rescissions. Funds requested for cancellation, however, may not be withheld from obligation pending congressional action. Although the Trump Administration has submitted rescission requests to Congress, during the two prior presidential Administrations, the President chose not to send rescission proposals pursuant to the ICA. Both President Barack Obama and President George W. Bush proposed cancellations of budget authority, but they chose not to do so by submitting a special message under the terms prescribed by the ICA. Conversely, Congress can, and often does, initiate the rescission of funds on its own and may choose to consider legislation rescinding funds using the regular legislative process. Rescissions are regularly included in appropriations bills, for example. Sequestration was the principal means used to enforce statutory budget enforcement policies in place from 1985 through 2002, and it is the principal means used to enforce the requirements of the Statutory PAYGO Act and the statutory limits on discretionary spending under the BCA. In addition, sequestration is used to achieve a portion of the spending reductions required when deficit reduction legislation tied to the Joint Committee on Deficit Reduction was not enacted as provided by the BCA. Sequestration involves the issuance of a presidential order that permanently cancels non-exempt budgetary resources (except for revolving funds, special funds, trust funds, and certain offsetting collections) for the purpose of achieving a required amount of outlay savings to reduce the deficit. Once sequestration is triggered, spending reductions are made automatically. A sequestration order by the President is triggered by a report from the OMB director determining that a breach has occurred. To enforce the statutory discretionary spending caps, OMB first provides a preview report at the beginning of the calendar year, including calculations of any necessary adjustments to the existing limits for the upcoming fiscal year. Once discretionary spending is enacted, OMB evaluates that spending relative to the spending limits and determines whether sequestration is required. OMB is required to issue the final report within 15 calendar days after the congressional session adjourns sine die. For discretionary spending that becomes law after the session ends (e.g., the enactment of a supplemental appropriations measure), the OMB evaluation and any sequester order to enforce the limits would occur 15 days after enactment. For enforcement of the Statutory PAYGO Act, OMB records the budgetary effects of revenue and direct spending provisions enacted into law, including both costs and savings, on two PAYGO scorecards covering rolling five-year and 10-year periods (i.e., in each new session, the periods covered by the scorecards roll forward one fiscal year). OMB must issue an annual PAYGO report not later than 14 days (excluding weekends and holidays) after Congress adjourns to end a session. Once OMB finalizes the two PAYGO scorecards, it determines whether a violation of the PAYGO requirement has occurred (i.e., if a debit has been recorded for the budget year on either scorecard). If a breach occurs, the President issues a sequestration order that implements largely across-the-board cuts in nonexempt direct spending programs sufficient to remedy the violation. Spending for many programs is exempt from sequestration, and reductions in certain programs are limited by statutory provisions. Appendix A. Glossary of Budget Process Terms 302. The section of the Congressional Budget Act of 1974 that pertains to the distribution to House and Senate committees of new budget authority, entitlement authority, and outlays agreed to in a budget resolution. The allocation is usually included in the joint explanatory statement that accompanies the conference report on a budget resolution. Section 302(a) requires the allocation of the total spending in the budget resolution among the committees having jurisdiction over either direct or discretionary spending. When a budget resolution has not been adopted, the House and Senate (separately or jointly) may use some other means to establish committee allocations. Section 302(b) further requires the Appropriations Committee in each chamber to subdivide this total allocation among their subcommittees. Section 302(f) establishes a point of order against the consideration of a bill, amendment thereto, or conference thereon that would breach the appropriate 302(a) (or 302(b)) amount for the committee (or subcommittee). Apportionment . The action by which federal agencies, working with the Office of Management and Budget, establish a plan for budget authority made available by spending laws to be obligated over the course of a fiscal year consistent with all legal requirements. Apportionment is required under the Antideficiency Act in order to prevent the premature exhaustion of funds, and for certain kinds of budget authority, to achieve the most effective and economical use of those funds. Appropriation. Legislation that provides budget authority to allow federal agencies to incur obligations and to make payments out of the Treasury for specified purposes, usually during a specified period of time. Discretionary appropriations measures are under the jurisdiction of the House and Senate Committees on Appropriations. Authorization . A statutory provision that establishes or continues a federal agency, activity, or program. It may also establish policies and restrictions and deal with organizational and administrative matters. Authorizations may implicitly or explicitly authorize congressional action to provide appropriations for an agency, activity, or program. An explicit authorization of appropriations may apply to a single fiscal year, several fiscal years, or an indefinite period of time, and it may be for a specific level of funding or an indefinite amount. An authorization of appropriations does not provide budget authority, however, which must be provided in subsequent appropriations legislation. Furthermore, under House and Senate rules, an authorization is construed as a ceiling on the amounts that may be appropriated but not a minimum. Baseline . A projection of the levels of federal spending, revenues, and the resulting budgetary surpluses or deficits for the upcoming and subsequent fiscal years, taking into account laws enacted to date but not assuming any new policies. It provides a benchmark for measuring the budgetary effects of proposed changes in federal revenues or spending, assuming certain economic conditions. Baseline projections are prepared by the Congressional Budget Office. Budget a uthority . Authority provided by federal law to enter into financial obligations that will result in immediate or future outlays involving federal government funds. The main forms of budget authority are appropriations, entitlement authority, borrowing authority, and contract authority. It also includes authority to obligate and expend the proceeds of offsetting receipts and collections. Congress may make budget authority available for one year, several years, or an indefinite period, and it may specify definite or indefinite amounts. Budget r esolution . A concurrent resolution, provided under the Congressional Budget Act, that allows Congress to make decisions about overall fiscal policy and priorities, as well as coordinate and establish guidelines for the consideration of various budget related measures. Because a concurrent resolution is not a law, it cannot be signed or vetoed by the President. It therefore does not have statutory effect, so no money can be raised or spent pursuant to it. Revenue and spending amounts set in the budget resolution, however, establish the basis for the enforcement of congressional budget policies through points of order. Continuing r esolution (CR) . When annual appropriations acts are not enacted by the beginning of the fiscal year (October 1), one or more continuing appropriations acts may be enacted to provide temporary continued funding for covered programs and activities until action on regular appropriations acts is completed. Such funding is provided for a specified period of time, which may be extended through the enactment of subsequent CRs. Rather than providing a specific amount of funding, CRs typically allow agencies to operate at a specified rate. A continuing appropriations act is commonly referred to as a continuing resolution or CR because historically it has been in the form of a joint resolution rather than a bill, but there is no procedural requirement as to its form. In some cases, CRs have provided appropriations for an entire fiscal year. Deeming r esolution . An informal term that refers to a resolution or bill passed by one or both houses of Congress that provides an alternate means to establish the basis for budgetary enforcement actions in the absence of a budget resolution. Direct s pending . Direct spending is defined in the Balanced Budget and Emergency Deficit Control Act of 1985, as amended, as consisting of entitlement authority (including appropriated entitlements), the Supplemental Nutrition Assistance Program, and any other budget authority (and resulting outlays) provided in laws other than appropriations acts. The term direct spending is often used interchangeably with the terms mandatory or entitlement spending . Examples include Social Security, Medicare, Medicaid, unemployment insurance, and military and federal civilian pensions. Discretionary s pending . The Balanced Budget and Emergency Deficit Control Act of 1985, as amended, defines discretionary spending as budget authority provided in annual appropriation acts and the outlays derived from that authority. Discretionary spending encompasses appropriations not mandated by existing law and therefore made available in appropriation acts in such amounts as Congress chooses. Discretionary spending for FY2012-FY2021 is limited by statutory spending limits enacted in the Budget Control Act of 2011, as revised. Fiscal y ear . The fiscal year for the federal government begins on October 1 and ends on September 30. The fiscal year is designated by the calendar year in which it ends: For example, FY2020 began on October 1, 2019, and ends on September 30, 2020. Functional c ategory. The President's budget and the congressional budget resolution classify federal budgetary activities (including budget authority, outlays, tax expenditures, and credit authority) into functional categories that represent major purposes or national needs being addressed (such as national defense, health, or general science, space, and technology). A functional category may be divided into two or more subfunctions, depending upon its scope or complexity. As a whole, functional categories provide a broad statement of budget priorities and facilitate an understanding of trends in related programs regardless of the agency administering them or type of financial transaction involved. The amounts in particular functional categories in the budget resolution are used as informational guidelines and are not enforced by points of order in the congressional budget process. Obligation . A commitment that creates a legal liability of the government to pay for goods and services and results in outlays either immediately or in the future. An agency incurs an obligation, for example, when it places an order, signs a contract, or awards a grant. When a payment is made, it liquidates the obligation. Appropriation laws usually make funds available for obligation for one or more fiscal years, but outlays may actually occur at some later time so that an agency's outlays in a particular year can come from obligations entered into in previous years as well as from its current appropriation. Offsetting r eceipts/ c ollections . Funds collected from the public primarily as a result of business-like activities (such as user fees or royalties paid to the government) that are levied on a class directly availing itself of, or directly subject to, a governmental service, program, or activity rather than on the general public. Such receipts and collections are recorded as negative amounts of spending rather than as revenues. In most cases, offsetting receipts require an explicit appropriation, while offsetting collections may be obligated without further legislative action. Outlays . The actual amount of payments from the Treasury that result from obligations entered into by executing provisions in appropriations and direct spending legislation that provides budget authority. Outlays consist of payments, usually by check, by electronic fund transfer or cash to liquidate obligations incurred in prior fiscal years as well as in the current fiscal year. Pay-as-you-go ( PAYGO ) . A budgetary enforcement mechanism originally set forth in the Budget Enforcement Act of 1990. It generally requires that any projected increase in the deficit due to changes in direct spending or revenues resulting from legislation must be offset by an equivalent amount of direct spending cuts or revenue increases to eliminate the net increase over either a six-year period covering the current fiscal year plus the ensuing five fiscal years or over an 11-year period covering the current fiscal year plus the ensuing 10 fiscal years. The statutory PAYGO mechanism currently in place was established under the Statutory Pay-As-You-Go Act of 2010. In the event that the net impact of changes to direct spending and revenue laws over the course of a session of Congress is projected to increase the deficit in either of these time periods, the President is required to issue a sequester order to eliminate it. In addition, there are currently PAYGO procedures in the House and Senate enforced by points of order on the floor to prevent the consideration of legislation that does not meet the requirement. Reconciliation. An expedited procedure, provided under Section 310 of the Congressional Budget Act, for changing existing revenue or direct spending laws to implement budgetary policies established in a budget resolution. Reconciliation must begin with language in a budget resolution instructing specific committees to report legislation adjusting revenues or spending within their respective jurisdictions by specified amounts, usually by a specified deadline. The Budget Act provides for expedited consideration of reconciliation bills in the Senate by limiting debate to 20 hours and limiting the content of amendments. Reprogramming. Shifting funds within an appropriation account from one object class to another or from one program activity to another. Generally, agencies may make such shifts without additional statutory authority, but often they must provide some form of notification to the appropriations committees, authorizing committees, or both. Rescission. A provision of law that repeals previously enacted budget authority. Under the Impoundment Control Act of 1974, the President may send a message to Congress requesting one or more rescissions and the reasons for doing so. If the President makes such a request, he may withhold the funds from obligation, but if Congress does not pass legislation approving the rescission within 45 days of continuous session after receiving the message, the funds must be made available for obligation. Congress may rescind all, part, or none of an amount proposed by the President and may also initiate rescission of funds not requested in a presidential message. Revenues. Funds collected from the public primarily as a result of the federal government's exercise of its sovereign powers. They include individual and corporate income taxes, excise taxes, customs duties, estate and gift taxes, fees and fines, payroll taxes for social insurance programs, and miscellaneous receipts. Scorekeeping. The process of both estimating the budgetary effects of pending legislation and comparing those effects to a baseline. The Congressional Budget Office prepares estimates of the budgetary effects of legislation, including both spending and revenue effects. The Budget Committees in the House and Senate act as official scorekeepers by providing the presiding officers in their respective chambers with the estimates needed to make decisions about points of order enforcing budgetary parameters. The Budget Committees also make periodic summary scorekeeping reports that are placed in the Congressional Record . Sequestration . A procedure in which the President is required to issue an order canceling budgetary resourcesâthat is, money available for obligation or spendingâto enforce a statutory budget requirement. Sequestered funds are no longer available for obligation or expenditure. The statutory PAYGO requirement and the statutory limits on discretionary spending are enforced by sequestration. In addition, the automatic spending reductions required by the Budget Control Act of 2011 are partially achieved through sequestration. Transfer. Shifting budget authority between two appropriation accounts. Agencies may transfer budget authority only as specifically authorized by law. Appendix B. Congressional Budget Process Actions", "summary": "Under the U.S. Constitution, Congress exercises the \"power of the purse.\" This power is expressed through the application of several provisions. The power to lay and collect taxes and the power to borrow are among the enumerated powers of Congress under Article I, Section 8. Furthermore, Section 9 of Article I states that funds may be drawn from the Treasury only pursuant to appropriations made by law. The Constitution, however, does not prescribe how these legislative powers are to be exercised, nor does it expressly provide a specific role for the President with regard to budgetary matters. Instead, various statutes, congressional rules, practices, and precedents have been established over time to create a complex system in which multiple decisions and actions occur with varying degrees of coordination. As a consequence, there is no single \"budget process\" through which all budgetary decisions are made, and in any year there may be many budgetary measures necessary to establish or implement different aspects of federal fiscal policy. This report describes the development and operation of the framework for budgetary decisionmaking that occurs today and also includes appendices that provide a glossary of budget-process-related terms and a flowchart of congressional budget process actions. Since the early years of the Republic, procedures and practices concerning the consideration, enactment, and execution of budgetary legislation have evolved to meet changing needs and circumstances. Many aspects of the framework for budgetary decisionmaking were established in the early years, including the idea that appropriations be considered separate from general policy legislation. The 19 th century also saw Congress take action in several ways to exercise control over how federal agencies spent money. One approach involved enacting increasingly specific appropriations legislation to direct the use of funds. General restrictions on agency discretion were also imposed by statute. For example, beginning in 1870, antideficiency acts were enacted to prevent agencies from exceeding appropriations made by Congress for any fiscal year or obligating payments in anticipation of future appropriations. In the 20 th century, the Budget and Accounting Act of 1921 created a statutory role for the President by requiring agencies to submit their budget requests to him and, in turn, for him to submit a consolidated request to Congress. Other important changes included the advent of direct (mandatory) spending and the enactment of the Congressional Budget and Impoundment Control Act of 1974, which provided Congress with a vehicle for making decisions about overall fiscal policy and priorities and also established the House and Senate Budget Committees and the Congressional Budget Office. Since 1985, budgetary decisionmaking has also been subject to various budget control statutes designed to restrict congressional budgetary actions or implement particular budgetary outcomes. Altogether, this evolution has resulted in the framework in which budgetary decisionmaking occurs today. Many budgetary actions result from permanent or long-term statutes, but the cycle for decisionmaking remains based on a characteristically annual timetable. The President is required to submit a budget request to Congress early in the legislative session. The President's budget is only a request to Congress, but it establishes the President's wishes regarding the direction of national policies and priorities and often influences the direction of congressional revenue and spending decisions. Congress can coordinate various budget-related actions (such as consideration of revenue and spending measures) through the adoption of a concurrent resolution on the budget to set aggregate budget policies and functional spending priorities for at least the next five fiscal years. Because a concurrent resolution is not a lawâthe President cannot sign or veto itâthe budget resolution does not have statutory effect, so no money is raised or spent pursuant to it. Revenue and spending levels set in the budget resolution, however, do establish the basis for enforcement of congressional budget policies through points of order. In recent years, the use of a budget resolution has often been supplanted by the use of various deeming provisions that use alternate means to establish the basis for budgetary enforcement actions. Budget policies are subsequently implemented through action on individual revenue and debt limit measures, annual appropriations acts, and direct spending legislation. If Congress agrees to a budget resolution, it may later consider reconciliation legislation pursuant to reconciliation instructions included in the budget resolution. Reconciliation legislation is subject to expedited procedures that can be used to bring existing revenue and direct spending laws into conformity with policies established in the budget resolution. Action on annual appropriations measures allows Congress to set the level of discretionary spending annually. Congress passes three main types of appropriations measures: regular appropriations to provide budget authority to fund programs and agency activities for the next fiscal year, s upplemental appropriations to provide additional budget authority during the current fiscal year if the regular appropriation is insufficient or to finance activities not provided for in the regular appropriation, and c ontinuing appropriations (often referred to as continuing resolutions or CRs) to provide interim (or sometimes full-year) funding to agencies for activities or programs not yet covered by a regular appropriation.", "document_type": "crs"}
{"report": "Beneficial ownership refers to the natural person or persons who invest in, control, or otherwise reap gains from an asset, such as a bank account, real estate property, company, or trust. In some cases, an asset's beneficial owner may not be listed in public records or disclosed to federal authorities as the legal owner. For some years, the United States has been criticized by international bodies for gaps in the U.S. anti-money laundering (AML) system related to a lack of systematic beneficial ownership disclosure. While beneficial ownership information is relevant to several types of assets, attention has focused on the beneficial ownership of companies, and in particular, the use of so-called \"shell companies\" to anonymously purchase assets, such as real property, and to store and move money, including through bank accounts and wire transfers. While such companies may be created for a legitimate purpose, there are also concerns that the use of some of these companies can facilitate crimes, such as money laundering. Recent U.S. regulatory steps and legislation have particularly focused on beneficial ownership disclosure related to the use of shell companies with hidden owners that conduct financial transactions or purchase assets. In the context of AML regimes, law enforcement authorities as well as financial institutions and their regulators may seek beneficial ownership information to identify or verify the natural persons who benefit from or control financial assets held in the name of legal entities, such as corporations and limited liability companies. Drug traffickers, terrorist financiers, tax and sanctions evaders, corrupt government officials, and other criminals have been known to obscure their beneficial ownership of legal entities for money laundering purposes. To do so, they may form nominal legal entities, or \"shell companies,\" which have no physical presence and generate little to no economic activity, but are used to anonymously store and transfer illicit proceeds. By relying on third-party nominees to serve as the legal owners of record for such shell companies, criminals can control and enjoy the benefits of the assets held by such companies while shielding their identities from investigators. Although concealing beneficial ownership has long been a central element of many money laundering schemes, many jurisdictions around the world have not established or implemented policy measures that address beneficial ownership disclosure and transparency. According to the Financial Action Task Force (FATF)âan intergovernmental standards-setting body for AML and countering the financing of terrorism (CFT)âfinancial crime investigations are frequently hampered by the absence of adequate, accurate, and timely information on beneficial ownership. FATF has accordingly identified beneficial ownership transparency as an enduring AML/CFT policy challenge. Some U.S. government agencies have also long recognized that the ability to create legal entities without accurate beneficial ownership information is a key vulnerability in the U.S. financial system. Such ongoing vulnerabilities have placed the United States under domestic and international pressure, including from the FATF, to tighten its AML/CFT regime with respect to beneficial ownership disclosure requirements. In recent years, various U.S. regulators have taken actions to address this issue, and congressional interest in this topic has increased. This report first provides selected case studies of high-profile situations where beneficial ownership has been obscured. It then provides an overview of beneficial ownership issues relating to corporate formation and in real estate transactions. Next, it describes the recent history of beneficial ownership policy and legislation. The report then discusses recent U.S. regulatory changes to address aspects of beneficial ownership transparency. Thereafter, the report analyzes selected current policy issues, including sectors not covered by existing Treasury regulations, the status of international efforts to address beneficial ownership, and the evolution of the Global Legal Entity Identifier (LEI) program. Finally, the report analyzes selected legislative proposals in the 116 th Congress. While beneficial ownership information is relevant to a variety of assets, recent policy attention has focused on the beneficial ownership of companies, and in particular, the use of shell companies to anonymously purchase assets, such as real property, and to store and move money, including through bank accounts and wire transfers. FATF has estimated that over 30 million \"legal persons\" exist in the United States, and about 2 million new such legal persons are created each year in the states and territories owned by the United States. FATF defines legal persons to include entities such as corporations, limited liability companies (LLCs), various forms of partnerships, foundations, and other entities that can own property and are treated as legal persons. FATF considers trusts, which share some of the same characteristics, to be \"legal arrangements.\" FATF recommends that countries mandate some degree of transparency in identifying beneficial owners, at least for law enforcement and regulatory purposes, for legal persons and legal arrangements. There are a range of legitimate reasons for wanting to create such entities, including diversification of risk with joint owners, tax purposes, limiting liability, and other reasons. However, such legal persons and arrangements can also be used to hide the identities of owners of assets, thereby facilitating money laundering, corruption, and financial crime. For this reason, FATF recommends countries take steps to ensure that accurate and updated information on the identities of beneficial owners be maintained and accessible to authorities. In the United States, corporations, LLCs, and partnerships are formed at the state level, not the federal level. Corporation laws vary from state to state, and the \"promoter\" of the corporation can choose in which state to incorporate or in which to form another legal entity, often paying a \"corporate formation agent\" within the state to file the required state-level paperwork. Such corporate formation agents may be attorneys, but are not always required to be attorneys. While state laws vary, most states share some basic requirements for forming a corporation or other entity, including the filing of the entity's articles of incorporation with the secretary of state. These articles often include the corporation's name, the business purpose of the corporation, and the corporation's registered agent and address for the purpose of accepting legal service of process if it is sued. While state requirements vary, most states do not collect, verify, or update identifying information on beneficial owners. Because no federal standards currently exist, a promoter of a corporation can choose to incorporate in a state with fewer disclosure requirements if they wish. The FATF evaluation of the United States' AML system found that \"measures to prevent or deter the misuse of legal persons and legal arrangements are generally inadequate\" in the United States. FATF reported there were no mechanisms in place to record or verify beneficial ownership information in the states during corporate formation. They also warned that \"the relative ease with which U.S. corporations can be established, their opaqueness and their perceived global credibility makes them attractive to abuse for money laundering and terrorism financing, domestically as well as internationally.\" In a Senate Judiciary Committee hearing on June 19, 2019, witness Adam Szubin, former Under Secretary for the Treasury's Office of Terrorism and Financial Intelligence, noted in the question-and-answer portion that the position of the United States as a leader in the financial system at times gave additional credibility to shell companies that had been formed in the United States anonymously by international criminals, enabling them to transact business or open bank accounts outside the United States through these companies with less scrutiny than they might otherwise have received. Some argue that land ownership, even more than ownership of other resources, involves both public and private aspectsâsuch as urban planning, resources and environmental planning, and tax consequences. In the United States, however, unlike in many European countries, the federal government has almost no role in the purchase and sale of real estate. Real estate transactions in the United States are largely private contracts, and transfers may or may not be recorded publicly, although many buyers find it advantageous to do so. Most buyers of property finance their purchases with mortgages from banks. Investors or those who do not require such loans may engage in \"all-cash\" purchases, which simply means that no loans are involved and that the purchasers must come up with the necessary funds on their own. According to the National Association of REALTORSÂ®, approximately 23% of residential real estate sales transactions were all-cash in 2017. Data from real estate data firm CoreLogic for 2016, however, put the figure at 46% for New York state, and similarly higher for some additional states. In addition to realtors, who may represent buyers or sellers (but are not required to be involved in transactions), escrow agents and title company agents also play a role in real estate transactions in the United States. Escrow agents essentially act as neutral middlemen in real estate sales, temporarily holding funds for either side. In cases where purchases are made in the name of an LLC, for instance, an escrow agent will look at operating agreements of the LLC to identify the person legally authorized to sign documents, but they generally have no specific duties to locate or identify beneficial owners. Usually, escrow agents are not part of title insurance companies or independent title agencies. After a buyer and seller agree on a sales price and sign a purchase and sales contract, real estate transactions are transferred to a land title company, most likely the American Land Title Association (ALTA). ALTA represents 6,300 title insurance agents and companies, from small, single-county operators to large national title insurers. Title insurance is a form of insurance that protects the holder from financial loss if there are previously undiscovered defects in a title to a property (such as previously undiscovered fraud or forgery, or various other situations). A typical title insurance company, before providing coverage to the buyer of a property, usually investigates prior sales of the property. This process often starts with examining public records tracing the property's history, its owners, sales, and any partial property rights that may have been given away. This title search investigation also normally includes tax and court records to give title companies an understanding of what they might be able to insure in their policies issued to buyers. Title insurers are the only professionals in the real estate community who currently have money laundering requirements, which were imposed through FinCEN's Geographic Targeting Orders (GTOs), as detailed below. As part of this process, when real estate transactions fit the thresholds set in GTOs for certain covered metropolitan areas, title insurance companies work with real estate professionals representing buyers to collect the required beneficial ownership information. The FATF 2016 evaluation warned that the lack of AML requirements on real estate professionals constituted a significant vulnerability for the United States' AML system. As detailed below, FinCEN exempted the real estate sector from AML requirements pursuant to the USA PATRIOT Act of 2001 ( P.L. 107-56 ). In a 2015 study of the New York luxury property market, the New York Times found that LLCs with anonymous owners were being increasingly utilized in the New York luxury property market. The Times reported that in 2003, for example, one-third of the units sold in one high-end Manhattan buildingâthe Time Warner buildingâwere purchased by shell companies. By 2014, however, that figure had risen to over 80%, according to the article. And nationwide, the Times reported, nearly half of residential purchases of over $5 million were made by shell companies rather than named people, according to data from property data provider First American Data Tree studied by the Times . According to FinCEN, in 2017, 30% of all high-end purchases in six geographic areas involved a beneficial owner or purchaser representative who was also the subject of a previous suspicious activity report (SAR). A 2017 study by the U.S. Government Accountability Office (GAO) reviewed available information on the ownership of General Services Administration (GSA) leased space that required higher levels of security as of March 2016, and found that GSA was leasing high-security space from foreign owners in 20 buildings. GAO could not obtain the beneficial owners of 36% of those buildings for high-security facilities leased by the federal government, including by the Federal Bureau of Investigation. The Appendix provides an example of how an LLC with hidden owners might be used to purchase real estate in the United States with minimal information as to the natural persons behind the purchase or sale of the property. As previously noted, the U.S. government has long recognized the ability to create legal entities without accurate beneficial ownership information as a key vulnerability of the U.S. financial system. In 2006, GAO published a report entitled Company Formations: Minimal Ownership Information Is Collected and Available , which described the challenges of collecting beneficial owner data at the state level. The U.S. Department of the Treasury's 2015 National Money Laundering Risk Assessment and its 2018 update identify the misuse of legal entities as a key vulnerability in the banking and securities sectors. The 2018 risk assessment additionally clarified that such vulnerability is further compounded by shell companies' ability to transfer funds to other overseas entities. Such ongoing vulnerabilities have placed the United States under domestic and international pressure, including from FATF, to tighten its AML/CFT regime with respect to beneficial ownership disclosure requirements. In its 2016 review of the U.S. government's AML/CFT regime, FATF noted that the \"lack of timely access to â¦ beneficial ownership information remains one of the most fundamental gaps in the U.S. context.\" According to FATF, this gap exacerbates U.S. vulnerability to money laundering by preventing law enforcement from efficiently obtaining such information during the course of investigations. FATF further noted that this gap in the U.S. AML/CFT regime limits U.S. law enforcement's ability to respond to foreign mutual legal assistance requests for beneficial ownership information. By contrast, for instance, the European Union (E.U.), in 2015, enacted the E.U. Fourth Anti-Money Laundering Directive, which required member states to collect and share beneficial ownership information. Since at least the 110 th Congress, legislation has been introduced to address long-standing concerns raised by law enforcement, FATF, and other observers over the lack of beneficial ownership disclosure requirements. For example, in the 110 th Congress, Senator Carl Levin introduced S. 2956 , the Incorporation Transparency and Law Enforcement Assistance Act, on May 1, 2008. In his floor statement introducing the bill, Senator Levin noted that the National Association of Secretaries of State (NASS) had requested that he delay introduction of a bill in order for the NASS to first convene a task force in 2007 to examine state company formation practices. In July 2007, the NASS task force issued a proposal. Rather than cure the problem, however, the proposal was full of deficiencies, leading the Treasury Department to state in a letter that the NASS proposal \"falls short\" and \"does not fully address the problem of legal entities masking the identity of criminals.\" â¦. That is why we are introducing Federal legislation today. Federal legislation is needed to level the playing field among the States, set minimum standards for obtaining beneficial ownership information, put an end to the practice of States forming millions of legal entities each year without knowing who is behind them, and bring the U.S. into compliance with its international commitments. The 115 th Congress considered a number of bills concerning beneficial ownership reporting, including S. 1454 , the True Incorporation Transparency for Law Enforcement (TITLE) Act and the Corporate Transparency Act of 2017 ( H.R. 3089 and S. 1717 ). In the 116 th Congress, the House Committee on Financial Services on June 11, 2019, passed and ordered to be reported to the House an amendment in the nature of a substitute to H.R. 2513 , the \"Corporate Transparency Act of 2019,\" introduced by Representative Maloney. Also, in the Senate, S. 1889 was introduced on June 19, 2019, by Senator Whitehouse with cosponsors, and a discussion draft bill was circulated June 10, 2019, by Senators Warner and Cotton. This report concludes with an analysis of selected introduced legislative proposals in the 116 th Congress. Several federal tools are available to address money laundering risks posed by entities that obscure beneficial ownership information, including Treasury's Customer Due Diligence (CDD) rule, use of Geographic Targeting Orders (GTOs), and a provision in Section 311 of the USA PATRIOT Act. Treasury also uses various elements of its economic sanctions programs to address such risks. Finally, with regard to international cooperation, the U.S. government may obtain and share beneficial ownership information with foreign governments in the course of law enforcement investigations (see text box below). In other policy contexts that reach beyond money laundering issues, beneficial ownership has emerged as a concern related to entities' disclosure of U.S. ownership for tax purposes and entities that lease high-security government office spaces. Beneficial ownership issues are also relevant in other areas, such as securities, which are beyond the scope of this report. Pursuant to its regulatory authority under the Bank Secrecy Act (BSA) âthe principal federal AML statuteâFinCEN has long administered regulations requiring various types of financial institutions to establish AML programs. The centerpiece of FinCEN's response to concerns about beneficial ownership transparency is its Customer Due Diligence Rule (CDD Rule), which went into effect in May 2018. Under the CDD Rule, certain U.S. financial institutions must establish and maintain procedures to identify and verify the beneficial owners of legal entities that open new accounts. The regulation covers financial institutions that are required to develop AML programs, including banks, securities brokers and dealers, mutual funds, futures commission merchants, and commodities brokers. Under the rule, covered financial institutions must now collect certain identifying information on individuals who own 25% or more of legal entities that open new accounts. The CDD Rule also requires covered financial institutions to develop customer risk profiles and to update customer information on a risk basis for the purposes of ongoing monitoring and suspicious transaction reporting. These requirements make explicit what has been an implicit component of BSA and AML compliance programs. FinCEN has the authority to impose additional recordkeeping and reporting requirements on domestic financial institutions and nonfinancial businesses in a particular geographic area in order to assist regulators and law enforcement agencies in identifying criminal activity. This authority to impose so-called \"Geographic Targeting Orders\" (GTOs) dates back to 1988. GTOs may remain in effect for a maximum of 180 days unless extended by FinCEN. Section 274 of the Countering America's Adversaries Through Sanctions Act ( P.L. 115-44 ) replaced statutory language referring to coins and currency with \"funds,\" thereby including a broader range of financial services, such as wire transfers. Several bills in the 116 th Congress seek to address the use of GTOs to disclose the beneficial owners of entities involved in the purchase of all-cash real estate transactions (see text box below). Section 311 of the USA PATRIOT Act ( P.L. 107-56 ) added a new provision to the Bank Secrecy Act at 31 U.S.C. Â§5318A. This provision, popularly referred to as \"Section 311,\" authorizes the Secretary of the Treasury to impose regulatory restrictions, known as \"special measures,\" upon finding that a foreign jurisdiction, a financial institution outside the United States, a class of transactions involving a foreign jurisdiction, or a type of account, is \"of primary money laundering concern.\" The statute outlines five special measures that Treasury may impose to address money laundering concerns. The second special measure authorizes the Secretary to require domestic financial institutions and agencies to take reasonable and practicable steps to collect beneficial ownership information associated with accounts opened or maintained in the United States by a foreign person (other than a foreign entity whose shares are subject to public reporting requirements or are listed and traded on a regulated exchange or trading market), or a representative of such a foreign person, involving a foreign jurisdiction, a financial institution outside the United States, a class of transactions involving a jurisdiction outside the United States, or a type of account \"of primary money laundering concern.\" Based on a review of Federal Register notices, FinCEN has neither proposed nor imposed the special measure involving the collection of beneficial ownership information. Beneficial ownership information is valuable in the context of economic sanctions administered by the Treasury Department's Office of Foreign Assets Control (OFAC). Under economic sanctions programs, assets of designated persons (i.e., individuals or entities) may be blocked (i.e., frozen), thereby prohibiting transfers, transactions, or dealings of any kind, extending to property and interests in property subject to the jurisdiction of the United States as specified in OFAC's specific regulations. As additional persons, including shell and front companies, are discovered to be associated (i.e., owned or controlled by, or acting or purporting to act for or on behalf of, directly or indirectly) with someone already subject to sanctions, OFAC may choose to designate those additional persons to be subject to sanctions. In addition to persons explicitly identified on OFAC's Specially Designated Nationals (SDN) or Sectoral Sanctions Identification (SSI) lists, sanctions also apply to nonlisted entities that are owned, in part, by blocked persons. Current guidance states that sanctions also extend to entities that are at least 50% owned by sanctioned persons. Compliance with this so-called \"50% Rule\" requires financial institutions and others potentially doing business with designated persons or identified sectoral entities to understand an entity's ownership structure, including its beneficial owners. The Foreign Account Tax Compliance Act (FATCA; Subtitle A of Title V of the Hiring Incentives to Restore Employment Act; P.L. 111-147 , as amended) is a key U.S. policy tool to combat tax evasion. Pursuant to FATCA, U.S. taxpayers are required to disclose to the Internal Revenue Service (IRS) financial assets held overseas. In addition, FATCA requires certain foreign financial institutions to disclose information directly to the IRS when its customers are U.S. persons or when U.S. persons hold a \"substantial\" ownership interestâdefined to mean ownership, directly or indirectly, of more than 10% of the stock (by vote or value) of a foreign corporation or of the interests (in terms of profits or capital) of a foreign partnership; or, in the case of a trust, the owner of any portion of it or the holder, directly or indirectly, of more than 10% of its beneficial interest. Foreign financial institutions that do not comply with reporting requirements are subject to a 30% withholding tax rate on U.S.-sourced payments. According to FinCEN, some intergovernmental agreements that the United States negotiated with other governments to facilitate the implementation of FATCA \"allow foreign financial institutions to rely on existing AML practices â¦ for the purposes of determining whether certain legal entity customers are controlled by U.S. persons.\" The U.S. government committed in many of these agreements to pursue \"equivalent levels of reciprocal automatic information exchange\" on the U.S. financial accounts held by taxpayers of that foreign jurisdiction; there is, however, no reciprocity in FATCA. Various observers have debated whether legal entity ownership disclosure information provided to the IRS could be used by other federal entities for AML purposes. Section 2876 of the National Defense Authorization Act for Fiscal Year 2018 (NDAA; 10 U.S.C. 2661 note) requires the Defense Department to identify each beneficial owner of a covered entity proposing to lease accommodation in a building or other improvement that is intended to be used for high-security office space for a military department or defense agency. Prior to the enactment of Section 2876, in January 2017, the GAO reported that the General Services Administration (GSA) did not keep track of beneficial owners, including foreign owners, of high-security office space it leased for tenants that included the Federal Bureau of Investigation (FBI) and the Drug Enforcement Administration (DEA). According to GAO, GSA began in April 2018 to implement a new lease requirement for prospective lease projects that requires offerors to identify and disclose whether the owner of the leased space, including an entity involved in the financing of the property, is a foreign person or a foreign-owned entity. In the 116 th Congress, H.R. 392 , the Secure Government Buildings from Espionage Act of 2019, seeks to expand the scope of the FY2018 NDAA's provisions. The current policy debate surrounding beneficial ownership disclosure is focused on addressing gaps in the U.S. AML regime and tracking changes made by the international community in its approach to addressing the problem. A key area of congressional activity involves evaluating the risks associated with lack of beneficial ownership information in the corporate formation and real estate sectors. The Treasury's current CDD rule mandates that financial institutions must collect informationâfor beneficial owners who hold more than 25% of an entityâupon opening an account for the entity. Some legislative proposals would mandate that this type of information be collected when such legal entities are formed, and that the information be reported to FinCEN or another central repository that authorities can access. International developments in beneficial ownership disclosure practices, including trends in the adoption of a program known as the Global Legal Entity Identifier System (LEI), also raise issues for U.S. policy consideration. Even following the CDD rule's implementation, some critics argue that gaps remain in U.S. financial transparency requirements The CDD rule, for example, applies only to individuals who own 25% or more of a legal entity. Critics note that the 25% ownership threshold means that if five or more people share ownership, a legal entity may not name or identify any of them (only one management official). Also, the rule applies to new, but not existing, accounts. FATF, for example, has criticized the United States for lacking beneficial ownership requirements for corporate formation agents and real estate transactions. Neither sector is directly affected by the FinCEN rule, but recent legislation has been introduced to address both areas (see section below titled \" Selected Legislative Proposals in the 116th Congress \"). The following sections discuss potential gaps remaining in U.S. financial transparency requirements after implementation of the CDD rule. Third-party service providers known as \"company formation agents\" often \"play a central role in the creation and ongoing maintenance and support of â¦ shell companies.\" While these services are not inherently illegitimate, they can help shield the identities of a company's beneficial owners from law enforcement. According to a 2016 FATF report, formation agents handle approximately half of the roughly 2 million new company formations undertaken annually in the United States. As discussed, the regulation of company formation agents is primarily a matter of state law. Formation agents are not subject to the BSA or federal AML regulations. However, observers have argued that states have not served as effective regulators of the company formation industry. These perceived inadequacies with current oversight of the company formation industry have prompted a number of legislative proposals discussed below. A number of policymakers have expressed interest in making FinCEN's GTOs targeting money laundering in high-end real estate permanent or otherwise expanding the scope of the current real estate GTO program. Section 702 of the Defending American Security from Kremlin Aggression Act of 2019 ( S. 482 ) would require the Secretary of the Treasury to prescribe regulations mandating that title insurance companies report on the beneficial owners of entities that engage in certain transactions involving residential real estate. Section 214 of the COUNTER Act of 2019 ( H.R. 2514 ), as amended in a mark-up session of the House Financial Services Committee on May 8, 2019, would require the Secretary of the Treasury to apply the real estate GTOs, which currently cover only residential real estate, to commercial real estate transactions. Section 129 of the Department of the Treasury Appropriations Act, 2019 (Title I of H.R. 264 ) would have required FinCEN to submit a report to Congress on GTOs issued since 2016, but it was not enacted. Section 352 of the USA PATRIOT Act ( P.L. 107-56 ) requires all financial institutions to establish AML programs. In 2002, however, FinCEN exempted from Section 352 certain financial institutions, including persons involved in real estate closings and settlements, in order to study the impact of AML requirements on the industry. In 2003, FinCEN published an advanced notice of proposed rulemaking (ANPRM) to solicit public comments on how to incorporate persons involved in real estate closings and settlements into the U.S. AML regulatory regime. Although no final rule has been issued, other developments have occurred. In 2017, FinCEN released a public advisory on the money laundering risks in the real estate sector. And in November 2018 a notice in the Federal Register on anticipated regulatory actions contained reference to renewed FinCEN plans to issue an ANPRM to initiate rulemaking that would establish BSA requirements for persons involved in real estate closings and settlements. To register an aircraft in the United States with the Federal Aviation Administration (FAA), applicants must certify their U.S. citizenship. Non-U.S. citizens may register aircraft under a trust agreement in which the aircraft's title is transferred to an American trustee (e.g., a U.S. bank). Investigations into the FAA's Civil Aviation Registry have revealed a lack of beneficial ownership transparency among aircraft registered through noncitizen trusts. Reports further indicate that drug traffickers, kleptocrats, and sanctions evaders have been among the operators of aircraft registered with the FAA through noncitizen trusts. Some Members of Congress have sought to address beneficial ownership transparency in the FAA's Civil Aviation Registry through legislation. If enacted, H.R. 393 , the Aircraft Ownership Transparency Act of 2019, would require the FAA to collect identifying information, including nationality, of the beneficial owners of certain entities, including trusts, applying to register aircraft in the United States. U.S. policymakers' interest in addressing beneficial ownership transparency has been elevated by a series of leaks to the media regarding the abuse of shell companies by money launderers, corrupt politicians, and other criminals, as well as sustained multilateral attention to the issue. In late 2018, information from such leaks reportedly contributed to a raid by German authorities on Deutsche Bank, one of the world's largest banks. Other major banks have become enmeshed in money laundering scandals involving the abuse of accounts associated with shell companies, including Danske Bank, Denmark's largest bank. The international community has taken steps to acknowledge and address the issue of a lack of beneficial ownership transparency in the context of anti-money laundering efforts. Some countries, including the United Kingdom, have created a public register that provides the beneficial owners of companiesâand more countries have committed or are planning to do so. In April 2018, the European Parliament voted to adopt the European Commission's proposed Fifth Anti-Money Laundering (AML) Directive, which among other measures would require European Union member states to maintain public national-level registers of beneficial ownership information for certain types of legal entities. The European Commission has also sought to identify third-country jurisdictions with \"strategic deficiencies\" in their national AML/CFT regimes, which pose \"significant threats\" to the EU's financial system. To this end, the Commission has identified eight criteria or \"building blocks\" for assessing third countriesâone of which is the \"availability of accurate and timely information of the beneficial ownership of legal persons and arrangements to competent authorities.\" In February 2019, the Commission released a proposed list of third countries with strategic AML/CFT deficiencies that included four U.S. territories: American Samoa, Guam, Puerto Rico, and the U.S. Virgin Islands. A key criticism of the U.S. territories' AML/CFT regime was the lack of beneficial ownership disclosure requirements. The origins of the LEI system lay in some of the problems highlighted in the 2008 financial crisis. These included excessive opacity as to credit risks, and to potential losses accrued across various affiliates of large financial conglomerates. For example, when Lehman Brothers failed in 2008, financial regulators and market participants found it difficult to gauge their financial trading counterparties' exposure to Lehman's large number of subsidiaries and legal entities, domestically and overseas. Partly to better track such exposures, the Financial Stability Board (FSB) and G-20 helped to design and create the concept of the LEI system, starting in 2009. LEI is a voluntary international program that assigns each separate \"legal entity\" participating in the program a unique 20-digit identifying number. This number can be used across jurisdictions to identify a legally distinct entity engaged in a financial transaction, including a cross-border financial transaction, making it especially useful in today's globally interconnected financial system. The unique identifying number acts as a reference codeâmuch like a bar code, which can be used globally, across different types of markets and for a wide range of financial purposes. These would include, for example, capital markets and derivatives transactions, commercial lending, and customer ownership, due diligence, and financial transparency purposes; as well as risk management purposes for large conglomerates that may have hundreds or thousands of subsidiaries and affiliates to track. A large international bank, for example, may have an LEI identifying the parent entity plus an LEI for each of its legal entities that buy or sell stocks, bonds, swaps, or engage in other financial market transactions. The LEI was designed to enable risk managers and regulators to identify parties to financial transactions instantly and precisely. Although the origins of the LEI stemmed from concerns over credit risk and safety and soundness that surfaced during the 2008 financial crisis, the LEI may also have benefits for financial transparency. A May 2018 study from the Global Legal Entity Foundation found, based on multiple interviews with financial market companies, that the lack of consistent, reliable automated identifiers was creating a great burden on the financial industry; that most in the industry believed the \"Know Your Customer\" process of onboarding new clients would likely become more automated; and that \"there is clearly an opportunity to align on one identifier to generate efficiencies.\" Similar conclusions were reached in a 2017 study by McKinsey & Co. The current LEI system is aimed more at tracking financial transactions of various affiliates, but creating a unified global identifier could be considered a natural first step toward more easily tracking ownership of affiliates as well. Worldwide, more than 700,000 LEIs have been issued to entities in over 180 countries as of November 2017; however, use of the LEI remains largely voluntary as opposed to legally mandatory. In the United States and abroad, some aspects of financial reporting require use of the LEI and these, in substantial part, rely on voluntary implementation. Some have called the lack of broader adoption of a common legal identifier a collective action problem. In a collective action problem, all participants in a system benefit if everyone participates; if only a few participate, those few bear high costs, as early adopters, with little benefit. Collective action problems are classic examples of situations where a government-organized solution may improve outcomes. Similarly, some argue that all parties would benefit if such LEIs were uniformly assigned, but there is no incentive to be a sole or early adopter. Academics have urged regulators to mandate the use of the LEI in regulatory reporting as a means of solving this collective action problem. Treasury's Office of Financial Research noted, \"Universal adoption is necessary to bring efficiencies to reporting entities and useful information to the Financial Stability Oversight Council, its member agencies, and other policymakers.\" In response to some of the issues discussed above, a number of lawmakers have introduced legislation that would require the collection of beneficial ownership information for both newly formed and existing legal entities. The subsections below discuss two of these proposals in the 116 th Congress. In June 2019, the House Committee on Financial Services approved legislation that would require many small corporations and LLCs to report their beneficial owners to the federal government. Under H.R. 2513 , the Corporate Transparency Act of 2019, newly formed corporations and LLCs would be required to report certain identifying information concerning their beneficial owners to FinCEN and annually update that information. The bill would also impose these reporting requirements on existing corporations and LLCs two years after FinCEN adopts final regulations to implement the legislation. Subject to certain exceptions, the bill defines the term beneficial owner to mean natural persons who \"directly or indirectly\" exercise \"substantial control\" over a corporation or LLC; own 25% or more of the equity of a corporation or LLC; or receive \"substantial economic benefits\" from a corporation or LLC. H.R. 2513 's reporting requirements are limited to small corporations and LLCs. Specifically, the bill exempts a variety of regulated entities from its reporting requirements, in addition to any company that (1) employs more than 20 full-time employees, (2) files income tax returns reflecting more than $5 million in gross receipts, and (3) has an operating presence at a physical office within the United States. The bill would also authorize FinCEN to promulgate a number of rules. First, H.R. 2513 would allow FinCEN to adopt a rule requiring covered corporations and LLCs to report changes in their beneficial ownership sooner than the annual update required by the legislation itself. Second, the bill would direct the Treasury Secretary to promulgate a rule clarifying the circumstances in which an individual receives \"substantial economic benefits\" from a corporation or LLC for purposes of its definition of beneficial owner . Third, the legislation would require FinCEN to revise the CDD Rule within one year of the bill's enactment in order to bring the rule \"into conformance\" with the bill's requirements and reduce any \"unnecessary\" burdens on financial institutions. Finally, H.R. 2513 would impose civil and criminal penalties on persons who knowingly provide FinCEN with false beneficial ownership information or willfully fail to provide complete or updated information. In June 2019, Senator Sheldon Whitehouse introduced legislation that would require states receiving funds under the Omnibus Crime Control and Safe Streets Act of 1968 to adopt transparent incorporation systems within three years of the bill's enactment. Specifically, S. 1889 , the True Incorporation Transparency for Law Enforcement (TITLE) Act, would mandate that transparent incorporation systems require newly formed corporations and LLCs to report certain identifying information concerning their beneficial owners to their states of incorporation. Under the bill, a compliant formation system would also require corporations and LLCs to report changes in their beneficial ownership within 60 days. These requirements would apply to existing corporations and LLCs two years after a state's adoption of a compliant formation system. Subject to certain exceptions, S. 1889 defines the term beneficial owner to mean natural persons who \"directly or indirectly\" (1) exercise \"substantial control\" over a corporation or LLC, or (2) have a \"substantial interest\" in or receive \"substantial economic benefits\" from a corporation or LLC. Like H.R. 2513 , S. 1889 's requirements would be limited to small corporations and LLCs. Specifically, S. 1889 would allow states to exempt various regulated entities, in addition to any company that (1) employs more than 20 full-time employees, (2) files income tax returns reflecting more than $5 million in gross receipts, (3) has an operating presence at a physical office within the United States, and (4) has more than 100 shareholders. The bill would also impose civil and criminal penalties on persons who knowingly provide states with false beneficial ownership information or willfully fail to provide complete or updated information. Finally, S. 1889 would amend the BSA to include \"any person engaged in the business of forming corporations or [LLCs]\" in its definition of a regulated \"financial institution,\" and would direct FinCEN to issue a proposed rule requiring such persons to establish AML programs. Figure A-1 demonstrates hypothetically how hidden foreign or U.S. buyers might purchase real estate in the United States with minimal disclosure of their identities as hidden beneficial owners. First, foreign or U.S. individuals might establish a foreign-incorporated LLC, subject to that foreign jurisdiction's laws, which could present particular challenges to a U.S. law enforcement agency seeking to investigate the purchase. Alternately, foreign or U.S. individuals could create a U.S. LLC incorporated in a U.S. state with only a \"registered agent\" required to be disclosed under various states' laws. A foreign LLC might pay for the property through a wire transfer from a foreign bank account. If the foreign LLC or the U.S. LLC were to open a U.S. bank account to pay for the purchase, then, if this were a new account opened since May 2018, the U.S.-regulated bank would look for beneficial owners owning more than 25% of the LLC, and keep records of that information. Currently, however, that information would not be reported to FinCEN automatically, and law enforcement would most likely require a subpoena to procure that information from the bank's records. To create additional layers that could obscure the actual buyers of the property, the LLC, whether U.S. or foreign, could route the payment to the title company, which handles the real estate closing, through a law firm. Payments and wire transfers routed through law firms present an extra layer of information a prosecutor or law enforcement agent must go through to try to obtain details of individuals who own the LLC and are purchasing a property. Often the U.S. attorney-client privilege can make it more difficult to exercise this subpoena authority, without at least the possibility that a legal challenge may arise. Finally, the payment is routed to the title company, which processes the property sale and distributes payment, normally to the seller's account. If the seller obscures his or her identity through an LLC as well, natural persons involved on both sides of the transfer may be hidden.", "summary": "Beneficial ownership refers to the natural person or persons who invest in, control, or otherwise reap gains from an asset, such as a bank account, real estate property, company, or trust. In some cases, an asset's beneficial owner may not be listed in public records or disclosed to federal authorities as the legal owner. For some years, the United States has been criticized by international bodies for gaps in the U.S. anti-money laundering system related to a lack of systematic beneficial ownership disclosure. While beneficial ownership information is relevant to several types of assets, attention has focused on the beneficial ownership of companies, and in particular, the use of so-called \"shell companies\" to purchase assets, such as real property, and to store and move money, including through bank accounts and wire transfers. While such companies may be created for a legitimate purpose, there are also concerns that the use of some of these companies can facilitate crimes, such as money laundering. In the United States, corporations and other legal entities such as limited liability companies (LLCs) and partnerships are formed at the state level, not the federal level. Corporation laws vary from state to state, and most or all states do not collect, verify, and update identifying information on beneficial owners. The U.S. government has long recognized the ability to create legal entities without accurate beneficial ownership information as a key vulnerability of the U.S. financial system. In 2006, the U.S. Government Accountability Office (GAO) published a report entitled Company Formations: Minimal Ownership Information I s Collected and Available , which described the challenges of collecting beneficial owner data at the state level. The U.S. Department of the Treasury's 2015 National Money Laundering Risk Assessment and its 2018 update identify the misuse of legal entities as a key vulnerability in the banking and securities sectors. The 2018 risk assessment additionally clarified that such vulnerability is further compounded by shell companies' ability to transfer funds to other overseas entities. Such ongoing vulnerabilities have placed the United States under domestic and international pressure, including from the international Financial Action Task Force (FATF), to tighten its anti-money laundering and countering the financing of terrorism (AML/CFT) regime with respect to beneficial ownership disclosure requirements. In its 2016 review of the U.S. government's AML/CFT regime, FATF noted that the \"lack of timely access to â¦ beneficial ownership information remains one of the most fundamental gaps in the U.S. context.\" According to FATF, this gap exacerbates U.S. vulnerability to money laundering by preventing law enforcement from efficiently obtaining such information during the course of investigations. Recent U.S. regulatory efforts and legislation have focused in particular on beneficial ownership disclosure related to the use of shell companies with hidden owners in the banking and real estate sectors. Recent federal regulatory tools include Treasury's Customer Due Diligence (CDD) rule and use of Geographic Targeting Orders (GTOs). Under the CDD Rule, effective since May 2018, certain U.S. financial institutions must establish and maintain procedures to identify and verify the beneficial owners of legal entities that open new accounts. The regulation covers financial institutions that are required to develop AML programs, including, banks, securities brokers and dealers, mutual funds, futures commission merchants, and commodities brokers. Covered financial institutions must collect identifying information on individuals who own 25% or more of legal entities. Since January 2016, Treasury's Financial Crimes Enforcement Network (FinCEN) has issued GTOs to require certain title insurance companies to collect and report identifying information about the beneficial owners of legal entities that conduct certain types of high-end residential real estate purchases. A number of legislative proposals have been introduced related to beneficial ownership disclosure in the 116 th Congress. Some of these legislative proposals, such as H.R. 2513 and S. 1889 , seek in various ways to impose certain duties on those who form corporations, LLCs, partnerships, or other legal entities to disclose their beneficial owners. These proposals would also mandate that such information be more readily available to authorities (such as federal and state law enforcement and regulatory agencies).", "document_type": "crs"}
{"report": "F or more than a decade, federal agencies have grappled with how to address climate change effects when implementing the Endangered Species Act of 1973 (ESA, or the Act). The ESA aims to protect threatened and endangered fish, wildlife, and plants from extinction. As set forth by Congress, one of the main purposes of the ESA is to \"provide a means whereby the ecosystems upon which endangered species and threatened species depend may be conserved.\" To conserve threatened and endangered species, the Act seeks to identify threatened or endangered species, facilitate recovery and conservation of these species, and minimize the effect of federal and private actions on these species and their habitats. The Supreme Court has stated that \"[t]he plain intent of Congress in enacting this statute was to reverse the trend toward species extinction, whatever the cost.\" To achieve that purpose, Congress declared that \"all Federal departments and agencies shall seek to conserve endangered species and threatened species and shall utilize their authorities\" to further the ESA purposes. Under the ESA, two federal agenciesâthe U.S. Fish and Wildlife Service (FWS) within the Department of the Interior and the National Marine Fisheries Service (NMFS) within the Department of Commerce (collectively, the Services)âare primarily responsible for implementing the ESA. According to the Services, over 1,500 species of plants and animals receive some type of protection under the ESA. Since the early 21st century, some Members of Congress have urged the Services to factor in climate change effects when implementing the ESA. The Services, along with scholars and scientists, have acknowledged that the changing climate may threaten the survival of and habitat for some species. As noted by courts and legal scholars, the ESA does not expressly require the Services to consider the effect of climate change in their ESA decisions. However, the ESA and its implementing regulations (1) direct the Services to consider \"natural or manmade factors affecting [a species'] continued existence\" when determining whether a species should be protected under the ESA; and (2) require the Services to analyze cumulative effects on a species' survival when analyzing whether federal actions jeopardize a species protected under the Act. The courts and the Services have interpreted these provisions as requiring the Services to consider climate change effects into the ESA decisionmaking process. Various lawsuits have challenged the Services' interpretation of complex scientific data or models that predict short- and long-term effects from a changing global climate on specific species and their habitats. These lawsuits typically focus on two main issues: (1) when the Services should list, delist, or reclassify a species as threatened or endangered because of climate change effects; and (2) whether the Services can or should regulate activities that affect the climate to protect the species. Judicial review has helped to ensure that the Services consider projected climate change effects on species in their ESA decisions, but the courts have not required the Services to curb activities that may contribute to climate change to protect threatened or endangered species. This report analyzes the courts' role in shaping how the Services have factored climate change effects into ESA decisions and recent regulatory developments that seek to clarify how the Services consider and address climate change in their ESA decisions. In general, stakeholders challenge the Services' ESA actions or inactions under the Administrative Procedure Act (APA). The APA authorizes reviewing courts to \"hold unlawful and set aside agency actions, findings, and conclusions found to be arbitrary, capricious, [or] an abuse of discretion.\" Under the arbitrary and capricious standard, courts must determine whether the agency \"examine[d] the relevant data and articulate[d] a satisfactory explanation for its action, including a 'rational connection between the facts found and the choice made,'\" but the standard prohibits courts from \"substitut[ing] its judgment for that of the agency.\" Under this deferential standard, courts have generally deferred to the Services' decisions related to climate change. However, courts have not deferred to the Services when the court concludes that the record does not support the Services' decision or the Services failed to consider climate change adequately. The sections below offer selected examples, drawn from various court decisions, legal documents, and regulatory developments, to illustrate the range of issues that the Services and the courts have addressed related to the ESA and climate change. Each section of the report reviews the applicable legal framework and discusses the relevant regulatory revisions finalized by the Trump Administration in August 2019. This report does not aim to provide a comprehensive or representative preview of all the judicial decisions that have addressed this area. Many legal challenges involving the ESA and climate change have centered on whether to list a species as endangered or threatened under the ESA. To trigger protections and prohibitions under the ESA, the Services must first list a species as threatened or endangered. Under ESA Section 4, the Services list a species as endangered or threatened based on assessments of the risk of their extinction. The Act defines an \"endangered species\" as a species \"in danger of extinction throughout all or a significant portion of its range.\" A \"threatened species\" is a species \"likely to become endangered within the foreseeable future in all or a significant portion of its range.\" For listing decisions, the ESA requires the Services to determine whether the species \"is a threatened or endangered species because of any of the following factors: (A) the present or threatened destruction, modification, or curtailment of its habitat or range; (B) overutilization for commercial, recreational, scientific, or educational purposes; (C) disease or predation; (D) the inadequacy of existing regulatory mechanisms; or (E) other natural or manmade factors affecting its continued existence.\" When listing a species, the Services must make their decision \"solely on the basis of the best scientific and commercial data available . . . after conducting a review of the status of the species,\" taking into account any state's or foreign nation's actions to protect such species. Courts have consistently held that the Services must consider climate change as a factor in their listing decisions if it may affect the survival of the species. However, stakeholders have disputed the extent to which climate change affects species and the science underpinning listing decisions. Some stakeholders have sought through petitions and legal challenges to compel the Services to list species whose survival has been or may be threatened by climate change effects. Other stakeholders have challenged the listing of species or petitioned the Service to delist a species, questioning whether model-based climate predictions constitute the \"best scientific and commercial data available\" on which to base ESA listing decisions. Scientific uncertainty and undefined terms in the ESA have opened the door to litigation challenging the Services' interpretation of ambiguous terms and their assessment of the climate science that supports their listing decisions. Courts often uphold the Services' interpretation of ambiguous terms because judicial review of agency decisions is narrow and highly deferential; the court will not set aside an ESA listing decision so long as it is rational and reasonably based on supporting evidence. However, courts have faulted the Services for inadequately considering climate change effects or relying on the scientific uncertainty of climate modeling to deny a petition to list a species. The two sections below discuss various court decisions that have reviewed how the Services (1) interpret the undefined \"foreseeable future\" in their listing decisions, and (2) address the scientific uncertainty of climate change effects. Legal challenges to Services' decisions to list or not to list a species as threatened highlight the difficulty in predicting whether a species is likely to be endangered \"within the foreseeable future\" because of climate change effects. Neither the ESA nor the implementing regulations define the term foreseeable future . Under their interpretation of the term, the Services determine foreseeability on a case-by-case basis for listing decisions, and the foreseeable future time frame can vary considerably based on the species and its habitat. For species affected by climate change, the Services' decisions on foreseeability of a species' survival often depend on their assessment of predictive modeling of climate threats to a species and its habitat. How a Service defines a species' foreseeable future could affect its ESA listing decision. For example, a species is less likely to be listed for protection under the ESA if the Services adopt a shorter time frame for the foreseeable future, thereby limiting their consideration of longer-term projections of climate change effects on a species and its habitat. The legal challenges to FWS's listing of the polar bear ( Ursus maritimus ) illustrate how courts have applied this narrow and deferential standard of review and interpreted the ESA standards for the best available data in the climate change context. In 2013, in Safari Club International v. Salazar (In re Polar Bear Endangered Species Act Listing and Section 4(d) Rule Litigation) (hereinafter In re Polar Bear ), the U.S. Court of Appeals for the District of Columbia Circuit (D.C. Circuit) upheld FWS's listing of polar bears as a threatened species under the ESA based in part on projected climate change effects to the species and its habitat. FWS based its decision on three main conclusions: (1) that the polar bear is dependent on sea ice for its survival; (2) that sea ice is declining; and (3) that climate change will likely continue to reduce the extent and quality of arctic sea ice gravely enough to endanger the polar bear population. The D.C. Circuit held that the challenges to FWS's scientific assessment and conclusions \"'amount to nothing more than competing views about policy and science,' on which we defer to the agency.\" The court also rejected arguments that climate science was too uncertain to support listing the polar bear as a species that is likely to become endangered in the \"foreseeable future,\" defined by FWS in this case as 45 years in the future. The court concluded that FWS's reliance on climate projections was \"justifiable[,] clearly articulated[,] . . . sufficient to support their definition of foreseeability.\" The Supreme Court declined to review the case. In 2016, the U.S. Court of Appeals for the Ninth Circuit (Ninth Circuit) similarly deferred to the NMFS's foreseeable future analysis in upholding the listing of two populations of Arctic bearded sealsÂ ( Erignathus barbatus nauticus ) in Alaska Oil & Gas Association v. Pritzker . NMFS listed the seals as threatened in 2012 based on climate change models that predicted that sea ice the seals depend on for birthing and mating would mostly disappear by 2095. In rejecting the plaintiffs' claim that the models used in the listing decision could not reliably predict climate change effects on the seals beyond 2050, the Ninth Circuit concluded that NMFS may base its listing decision on such models and long-term projections because the record included a reasonable explanation for its decision. The court explained that the ESA does not require NMFS to base its decision on ironclad evidence when it determines that a species is likely to become endangered in the foreseeable future; it simply requires the agency to consider the best and most reliable scientific and commercial data and to identify the limits of that data when making a listing determination. Soon after the bearded seal decision, the Ninth Circuit reversed an Alaska federal district court's decision to vacate NMFS's decision to list the Arctic subspecies of the ringed seal ( Phoca hispida hispida ) as threatened under the ESA. Bound by the precedent set in Pritzker , the Ninth Circuit concluded that the district court erred when it required more \"definitive quantitative data about the Arctic ringed seal population and an extinction threshold\" to list the species as threatened under the ESA. The court determined that NMFS's reliance on climate change models that project until 2100 was not arbitrary or capricious because NMFS \"provided a reasonable and scientifically supported methodology for addressing volatility in its long-term climate projections, and it represented fairly the shortcomings of those projectionsâthat is all the ESA requires.\" Courts have also deferred to NMFS's decisions not to list species when it reasonably demonstrated that long-term predictive climate models were unreliable to support a listing decision. For example, a federal district court in California upheld NMFS's decision not to list the ribbon seal ( Histriophoca fasciata ) as threatened or endangered despite a \"likely\" population decline related to sea ice loss and ocean acidification. The court held that NMFS reasonably relied on a 40-year time horizon, from 2010 to 2050, to project negative effects from climate change on the sea ice habitat because it determined the models beyond 2050 were unreliable. The court deferred to NMFS's expertise in upholding NMFS's determination that, based on this time frame, the ribbon seal was not likely to become endangered or in danger of extinction in the foreseeable future because the seal is resilient and adaptable to climate change effects on its habitat. The court concluded that NMFS did not err when it determined that climate models after 2050 were \"unreliable\" and \"too divergent\" to use in assessing future threats to the ribbon seal. NMFS determined that the climate models were \"too heavily dependent\" on estimated greenhouse gas (GHG) emissions from different types of future regulatory controls. These foreseeability cases highlight the courts' willingness to defer to the Services' interpretation of climate modeling data and the foreseeability of climate change effects if the record for the listing decision includes a reasonable explanation for their decision that acknowledges limits or uncertainty in the data. As such, the Services continue to evaluate the foreseeability on a case-by-case basis. In August 2019, the Services finalized revisions to the ESA regulations to define the \"foreseeable future\" as extending \"only so far into the future as the Services can reasonably determine that both the future threats and the species' responses to those threats are likely.\" Prior to this final rule, neither the ESA nor the implementing regulations defined the term foreseeable future . In the final rule, the Services emphasized that it would continue to evaluate the range of uncertainty and probabilities associated with the best available science and projected data on climate change effects to individual species and their habitat. It is unclear whether these changes will (1) affect how the Services evaluate long-term projections of climate change effects on species, or (2) promote greater uniformity and consistency within and between FWS and NMFS in their listing evaluations. Some stakeholders noted that the final rule merely codified the Services' existing practice in determining the foreseeable future for species. Other stakeholders expressed concerns that this definition of foreseeable future would limit consideration of long-term projected threats from climate change. In their lawsuit challenging the final rule, plaintiffs claim that demanding that both threats and responses to threats be \"likely\" in the foreseeable future imposes an \"increased certainty requirement\" that will deny protection under the ESA for species from the future effects of climate change. The legal challenges to the Services' foreseeable future determinations highlight how scientific uncertainty plays a large role in evaluating climate change effects. Similar to the foreseeability cases, courts have faulted the Services for claiming scientific uncertainty without adequate explanation when declining to list a species. This section discusses some examples where stakeholders have challenged FWS's approach to scientific uncertainty in its decisions to not list a species or delist a species under the ESA. To delist a species under the ESA, the Services must determine that none of the five factors considered in listing the species (i.e., destruction or modification of its habitat or range; overutilization for commercial, recreational, scientific, or educational purposes; disease or predation; inadequate existing regulatory protections; and other factors affecting its continued existence) threatens or endangers the species. Delisting determinations must be made \"solely on the basis of the best available scientific and commercial information regarding a species' status, without reference to possible economic or other impacts of such determination.\" Similar to judicial review of listing decisions discussed above, courts have generally deferred to FWS's decisions regarding scientific uncertainty of climate data unless FWS fails to justify why such uncertainty supports its listing decision. For example, in 2011, the Ninth Circuit in Greater Yellowstone Coalition Inc. v. Servheen vacated and remanded FWS's delisting of the Yellowstone grizzly bearÂ ( Ursus arctos horribilis ) as a threatened species, partly because FWS failed to justify why declines in whitebark pineâa primary source of food for grizzliesâdue to climate change were not likely to threaten the Yellowstone grizzly bear population. While acknowledging that courts generally defer to the Services' expertise, the Ninth Circuit refused to defer to FWS's \"arbitrary\" and unsupported claims of scientific uncertainty regarding the effect that declining food supplies resulting from climate change may have on grizzly bears. Relying on evidence that climate change reduced available whitebark pine seeds, increased grizzly bear mortality, and decreased grizzly bear reproduction, the court concluded that overall declines in the grizzly bear's food source from climate change effects in the Yellowstone region would logically have a \"negative effect on its grizzly bear population.\" In 2018, the Ninth Circuit similarly rejected FWS's decision not to list the Upper Missouri River Valley distinct population segment of Arctic grayling ( Thymallus arcticus ) as endangered or threatened. In Center for Biological Diversity v. Zinke , the court held that FWS acted arbitrarily and capriciously when it failed to explain why the uncertainty of climate change effects on the Arctic grayling supported not listing it. The court faulted FWS for (1) refusing to make any projections with respect to the synergistic effects of climate change \"simply because of uncertainty,\" and (2) disregarding the additive effects of climate change in considering the effects of low stream flows and high water temperatures on the species. Other courts have similarly faulted FWS for requiring a greater level of scientific certainty or evidence than the ESA requires with respect to climate change effects on a species in its listing determination. In Defenders of Wildlife v. Jewell , a federal district court in Montana held that FWS's 2014 decision to withdraw the proposed listing of the North American wolverine ( Gulo gulo luscus ) as threatened was arbitrary and capricious. In reversing its position on the proposed listing, FWS attempted to discredit certain scientific studies on climate change effects that it had relied on previously to propose listing the wolverine as a threatened species. FWS claimed that FWS needed greater certainty and refinement in the climate change data before listing the wolverine. The court concluded that FWS \"cannot demand a greater level of scientific certainty than has been achieved in the field to dateâthe 'best scientific data available' . . . standard does not require that the [FWS] act only when it can justify its decision with absolute confidence, and 'the ESA accepts agency decisions in the face of uncertainty.'\" After the court decision, in 2016, FWS reopened the public comment period on its previous proposal to list the wolverine as threatened under the ESA. FWS has not made a final listing determination after closing the comment period. Relatedly, courts have faulted FWS for requiring more evidence of climate change effects to delist a species than what is required under the ESA. In 2019, a federal district court in Texas held that FWS had acted arbitrarily and capriciously when it denied a petition to delist the Bone Cave harvestman spider ( Texella reyesi ) as an endangered species. In American Stewards of Liberty v. Department of the Interior , the court concluded that FWS did not deny the petition based on the best available data but instead based its denial on the absence of \"admittedly unavailable\" evidence of climate change effects on the species and its habitat. The court did not defer to FWS's conclusion that delisting of the spider was not warranted because the petition failed, in part, to include a \"trend analysis to indicate that this species can withstand the threats associated with development or climate change over the long term.\" In its decision denying the petition to delist, FWS claimed that the petitioners did not present enough data to determine if the spider's population will continue to decline from such threats. The court held that FWS \"committed clear error\" by requiring the petition to present \"conclusive evidence about the harvestman's population trendsâmore evidence than the Service admits is available or attainable.\" The court concluded that the petition met the threshold for a finding that delisting may be warranted and remanded to FWS for further consideration. To date, FWS has not issued a new finding regarding the delisting petition. Although it is not possible to have complete certainty of future climate change effects, these court decisions illustrate that the Services cannot rely solely on scientific uncertainty to make listing or delisting decisions without adequate justification. In the 2019 revised ESA regulations, the Services noted that \"the requirement to use the 'best available' data means that we cannot insist that information must be free from all uncertainty, and further agree that the Act's protections should not be withheld until a species' status has declined to the point that the future risk of extinction is certain.\" The Services have also considered climate change effects in designating critical habitat. When listing a species as threatened or endangered, the ESA requires the Services to \"designate any habitat of such species which is then considered to be critical habitat.\" As a threshold matter, as made clear by the Supreme Court's 2018 decision in Weyerhauser Co. v. FWS , an area must be \"habitat\" for a species for the Services to consider whether it is \"critical habitat.\" Under the ESA, the Services may designate two types of habitat as critical habitat: (1) specific areas within the geographical area occupied by the species, which contain the \"physical or biological features essential to the conservation of the species\" and may require special management protections (occupied habitat); and (2) areas outside the geographical areas occupied by the species if the Secretary determines that such unoccupied areas are \"essential for the conservation of the species\" (unoccupied habitat). Once an area is designated as critical habitat, federal agencies may not (unless exempted) authorize, fund, or carry out actions that are likely to \"result in the destruction or adverse modification\" of critical habitat. The Services face unique challenges when designating critical habitat based on modeled habitat shifts for species affected by climate change. The legal challenges to FWS's designation of the polar bear's critical habitat show how a court deferred to the FWS's interpretation of climate change data and models to determine whether unoccupied areas are \"essential for the conservation of the species.\" In a 2016 decision, Alaska Oil & Gas Association v. Jewell , the Ninth Circuit upheld FWS's designation of 187,000 square miles as critical habitat for the polar bear. FWS based its critical habitat designation in part on long-term projections of habitat destruction from climate change. FWS designated three areas on Alaska's coast and in its waters that contain elements essential to the polar bear: a sea ice habitat, a terrestrial denning habitat, and a barrier island habitat. For two of the designated areas, the district court concluded that FWS failed to provide evidence that the two areas included all of the elements required for the survival of the polar bear. The district court asked FWS to establish that polar bears currently use those two areas as habitat. The Ninth Circuit disagreed with the lower court's narrow interpretation of the ESA critical habitat requirements. The court rejected the lower court's finding that the ESA required FWS to limit the critical habitat designation to specific areas that are currently used by polar bears, explaining that \"[n]o such limitation to existing use appears in the ESA, and such a narrow construction of critical habitat runs directly counter to the Act's conservation purposes. The Act is concerned with protecting the future of the species, not merely the preservation of existing bears. And it requires use of the best available technology, not perfection.\" The court concluded that FWS properly relied on climate science and sea ice data in designating habitat that has the elements required to sustain and preserve the polar bear population. Similar to cases regarding foreseeability and scientific uncertainty, the court appeared to defer to FWS's reasoned consideration of climate change effects based on evidence in the record. The 2019 final rule clarified when the Secretary may designate unoccupied areas as critical habitat. Under the ESA, unoccupied areas must be essential to the conservation of the species to be critical habitat. Under the revised regulations, to determine if an unoccupied area is essential, the Services must find that the occupied habitat of the species at the time of listing is inadequate to ensure the conservation of the species. The Services must also determine that there is a \"reasonable certainty\" that the area will (1) contribute to the conservation of the species, and (2) contains one or more of those physical or biological features essential to the conservation of the species. The final rule explains that this revision \"better reflects the need for high confidence that an area designated as unoccupied critical habitat will actually contribute to the conservation of the species.\" How the revised regulations will affect the designation of unoccupied critical habitat will likely depend on the threshold the Services set for \"reasonable certainty\" that the unoccupied habitat will contribute to the conservation of the species. Some stakeholders are concerned that these changes to the critical habitat regulations may limit the Services' ability to protect species that move because of climate-change-related habitat loss. In the litigation challenging the 2019 final rules, the plaintiffs argue that, by imposing an \"elevated certainty requirement\" on the Services' determination of what areas are \"essential,\" the new rules would preclude the Services from designating currently unoccupied areas to which species may need to move because of climate change as critical habitat. In contrast, other stakeholders see the regulatory changes as complying with the Supreme Court's decision in Weyerhauser Co. v. FWS that an area must be \"habitat\" before the Services may consider whether it is \"critical habitat.\" These stakeholders assert that reasonable certainty that an area has at least one of the essential features necessary to conserve the species ensures that the area is habitat for the species. In addition, landowners claim that these changes remove potential regulatory burdens that critical habitat designations cause, such as requirements that, when issuing permits that may adversely affect critical habitat, federal agencies consult with stakeholders. If FWS or NMFS bases its listing decision on climate change effects, FWS or NMFS must also determine whether federal actions that contribute to climate change jeopardize the species under ESA Section 7 or whether an entity that may contribute to climate change is \"taking\" the species in violation of ESA Section 9. The Services may tailor the Section 9 \"take\" prohibitions for species listed as threatened under the ESA by using Section 4(d) rules. This section reviews how the Services address climate change effects when protecting listed species under ESA Sections 4(d), 7, and 9. ESA Section 9 prohibitions on \"taking\" a listed species differ for threatened and endangered species. ESA Section 9(a)(1) prohibits the unauthorized \"take\" of an endangered species. Take is defined as an act \"to harass, harm, pursue, hunt, shoot, wound, kill, trap, capture, or collect or to attempt to engage in any such conduct.\" In contrast, the ESA does not prohibit the taking of a threatened species unless FWS or NMFS decides to extend the Section 9 take prohibitions to the threatened species through a Section 4(d) rule. For threatened species, ESA Section 4(d) requires FWS or NMFS to issue regulations it \"deems necessary and advisable to provide for the conservation of such species.\" In 1978, FWS issued a \"blanket 4(d) rule\" that extends most of the Section 9 take prohibitions to all threatened species listed by FWS, unless it adopts a specific rule for a particular species. As discussed below, the 2019 revisions to the ESA regulations rescinded FWS's blanket 4(d) rule for newly listed or reclassified species, aligning it with NMFS's practice of issuing species-specific 4(d) rules for threatened species. A frequent debate among legal scholars and stakeholders is whether the take prohibitions should extend to GHG-emitting activities that contribute to climate change. Stakeholders seeking greater protection for species argue that sources of GHG emissions cause an unlawful \"take\" under ESA Section 9 because GHG emissions contribute to climate change, which harms the species. However, the Services and critics of this approach assert that the Section 9 take prohibitions can apply only if GHG-emitting activity directly and intentionally takes the species or negatively affects its habitat. In the litigation challenging the polar bear's 4(d) rule, the federal court's decision highlighted the challenges in applying the take prohibitions to GHG-emitting activities. Plaintiffs challenged FWS's 4(d) rule that specified prohibitions necessary to conserve the threatened polar bear species. The rule, among other things, did not prohibit activities outside the species' current range that may incidentally affect polar bears, such as GHG-emitting activities that may contribute to the loss of sea ice habitat. Plaintiffs claimed that the rule was arbitrary and capricious and violated the ESA by failing to address threats to the polar bear from GHG emissions and the loss of potential sea ice habitat outside the polar bears' range. In rejecting this argument, the court concluded FWS had a rational basis not to extend the ESA's take prohibitions because there was insufficient evidence to suggest that regulating offsite GHG-producing activities would produce direct conservation benefits to the polar bear. FWS explained that the best available science and climate modeling could not identify an individual GHG emission source as the cause of a specific adverse effect on the polar bear or its habitat. The court acknowledged that it cannot \"decide based upon its own independent assessment\" \"whether the ESA is an effective or appropriate tool to address the threat of climate change . . . . The answer to that question will ultimately be grounded in science and policy determinations that are beyond the purview of this Court.\" Based on this judicial opinion, it seems unlikely that the Services will use Section 4(d) rules to prohibit GHG-emitting activities without further advances in science that can establish a causal connection between the individual GHG emission source and the specific adverse effect on the species or its habitat. In 2019, FWS rescinded the \"blanket 4(d) rule\" for newly listed or reclassified threatened species, and will now adopt species-specific 4(d) rules. Because the rescission applies prospectively, the blanket 4(d) rule continues to prohibit the take of threatened species covered by the blanket 4(d) rule that FWS listed prior to the effective date of the rescission. This species-specific approach aligns with NMFS's practice of establishing specific 4(d) rules for each threatened species. How the rescission of FWS's blanket 4(d) rule may affect the protection of species threatened by climate change effects depends on its implementation. While some stakeholders are concerned that the rescission will \"weaken\" protections for threatened species because of delays in issuing species-specific 4(d) rules, it may have little effect on whether GHG-emitting activities are prohibited. FWS has not adopted a 4(d) rule that prohibited GHG-emitting activities that could affect threatened species and their habitats, prohibiting only actions that directly and intentionally take threatened species. For threatened species affected by climate change, legal scholars argue that such \"limited\" 4(d) rules have \"no real effect on the activities that are causing climate change, the acknowledged primary factor contributing to [the] species' decline.\" Some stakeholders and legal scholars view the ESA Section 7 consultation requirement as a potentially powerful tool to limit GHG-emitting activities that may further jeopardize threatened or endangered species that were listed, at least in part, because of climate change effects. In practice, the Services and the courts have acknowledged that climate change should be considered during the consultation process. However, the courts have not required the Services to curb activities that may contribute to climate change to protect threatened or endangered species. In general, ESA Section 7 requires federal agencies to \"insure that any action authorized, funded, or carried out by such agency . . . is not likely to jeopardize the continued existence of any endangered species or threatened species or result in the destruction or adverse modification of [the critical] habitat of such species.\" A federal agency planning any action must consult with NMFS or FWS if the federal agency determines that its action \"may\" jeopardize a listed species or adversely affect its habitat. The ESA and its implementing regulations specify the types of consultation (e.g., informal versus formal consultation), when each type of consultation is required, and the procedures the agency proposing the action and the Services must follow. After the consultation with an agency, the Services must issue a biological opinion (BiOp) based on \"the best scientific and commercial data available\" that determines whether the proposed action is likely to jeopardize the ESA-listed species or adversely modify critical habitat. If the Services determine that an agency action would likely jeopardize the listed species or its critical habitat, the agency must terminate the action, implement a Service-proposed alternative action, or seek an exemption. If the agency action is not likely to jeopardize the continued existence of the species but is nonetheless likely to result in some \"incidental take\" of the species, the BiOp must set forth an incidental take statement, which specifies the permissible \"amount or extent\" of this effect on the species. Various court decisions have faulted the Services for failing to discuss climate change effects when assessing whether federal action will jeopardize a listed species or adversely modify its habitat. In the 2007 decision, Natural Resources Defense Council v. Kempthorne , a federal district court in California held that FWS acted arbitrarily and capriciously when analyzing potential effects on the threatened delta smelt (Hypomesus transpacificus) from a large water diversion project. The court determined that the \"absence of any discussion in the BiOp of how to deal with any climate change is a failure to analyze a potentially 'important aspect of the problem.'\" In rejecting FWS's claim that the climate change studies did not merit analysis because they were inconclusive, the court concluded that without any meaningful discussion in the BiOp, it was \"impossible\" for the court to determine whether the climate studies were \"rationally discounted because of [their] inconclusive nature, or arbitrarily ignored.\" Similarly, plaintiffs successfully challenged NMFS's BiOp that concluded that changes to a fish hatchery operation were not likely to jeopardize the species or adversely affect critical habitat for the Upper Columbia River spring Chinook salmon ( Oncorynchus tshawytscha ) or steelhead ( Oncorhynchus mykiss ). A federal district court in Washington ruled that NMFS's BiOp was arbitrary and capricious because it failed to analyze adequately climate change effects from the hatchery's modified operations and water use. The court explained that \"[t]he best available science indicates that climate change will affect stream flow and water conditions throughout the Northwest\" and that the lack of a model or study specifically addressing local climate change effects did not permit NMFS to ignore this factor. The court found that NMFS had included \"no discussion whatsoever\" of the potential effects of climate change on the hatchery's future operations and water use, and that it was not sufficient for NMFS to say that the local area at issue was less prone to climate change effects than other areas in the region. When the Services have discussed climate change effects from federal actions, some courts have scrutinized the Services' rationale in dismissing such effects when issuing a \"no jeopardy\" BiOp. For example, the Ninth Circuit 2017 majority opinion in Turtle Island Restoration Network v. Department of Commerce examined NMFS's BiOp that concluded that a fishery expansion would neither jeopardize the continued existence of the endangered loggerhead sea turtle ( Caretta caretta ) nor the endangered leatherback sea turtle ( Dermochelys coriacea ). For the loggerhead sea turtles, the court ruled that NMFS had acted arbitrarily and capriciously by failing to incorporate into its jeopardy analysis climate-model data that predicted that the fishery expansion would \"exacerbate\" loggerhead population decline due to climate change. In contrast, for the leatherback sea turtles, the majority upheld NMFS's no-jeopardy conclusion, rejecting the plaintiffs' argument that NMFS erred by limiting the \"temporal scale\" of its analysis to 25 years despite NMFS's determination that rising temperatures from climate change would have effects on leatherback sea turtles over the next century. Because NMFS's BiOp considered and concluded that it could not credibly predict climate change effects on the leatherback turtles, the majority held that NMFS adequately considered the climate change effects in its no-jeopardy conclusion. Despite some success challenging BiOps, neither the courts nor the Services have found that climate change effects from a proposed federal action jeopardize the species or adversely modify its habitat. Some stakeholders and legal scholars argue that when a proposed federal action contributes to climate change that may jeopardize the species or adversely modify its habitat, the agency is required to consult with the Services. If the Services determine that such actions jeopardize the species or its habitat, these stakeholders assert that the Services should use Section 7 consultation authority to limit or modify the GHG emissions from the proposed federal action. However, the Department of the Interior issued a Solicitor's Opinion explaining that Section 7 consultation is not required if no causal connection exists among the proposed federal action, a reasonably certain climate change effect, and the listed species. Therefore, without evidence of a causal connection between the proposed action and climate change effects, Section 7 consultation will not be triggered, foreclosing any opportunity for the Services to consider mitigating the climate change effects from such actions. Federal agencies and the Services have continued to use this policy to comply with their Section 7 consultation obligations. The 2019 ESA regulation revisions codified the Services' existing Section 7 climate change policy. Existing ESA Section 7 regulations require the federal agency proposing the action and the Services to evaluate the status of the listed species or critical habitat, the \"effects of the action,\" and cumulative effects. Prior to the 2019 revisions, ESA regulations defined \"effects of the action\" to include both direct and indirect effects of a proposed federal action on the species or critical habitat. The 2019 ESA rule revised the definition of \"effects of the action\" to include all consequences to listed species or critical habitat that are caused by the proposed action. The definition specified that a consequence is \"caused by the proposed action if it would not occur but for the proposed action and it is reasonably certain to occur.\" The Services provided a two-part test to identify a consequence: (1) whether the effect or activity would not occur but for the action and (2) whether the effect or activity is reasonably certain to result from the action. The preamble explains that \"if the agency fails to take the proposed action, and the activity would still occur, there is not 'but for' causation.\" Some stakeholders support the revisions to the Section 7 consultation requirements, asserting that the changes will \"help decrease the resources needed for federal agencies and applicants to describe the effects of their actions to listed species or critical habitat when engaged in section 7 consultation.\" Other stakeholders contend that the proposed changes will \"unreasonably narrow\" and \"bar\" Section 7 consultation when climate change effects do not affect immediately the geographic area of the project. When the ESA was enacted in 1973, Congress did not consider climate change as a significant factor in conserving endangered species. Although the Services and the courts have acknowledged that actions taken under the ESA must consider climate change effects on species and their habitats, the debate continues on whether the ESA can adequately protect and conserve species threatened by climate change effects. Stakeholders disagree on what role the ESA should play in addressing climate change, with some arguing that the ESA is not equipped to mitigate climate change effects. Other stakeholders believe that the Services can and should wield the ESA to protect species threatened by climate change and to curb activities contributing to climate change. Generally, legal scholars agree that litigation has influenced how the Services factor climate change effects into ESA decisions. Legal challenges have helped to ensure that the Services consider projected climate change effects on species in their ESA decisions. In light of the judicial deference afforded to the Services, the courts have not expanded the ESA as a tool to protect listed species by regulating activities that contribute to climate change. From the Services' viewpoint, the best available scientific and commercial data have been insufficient to determine that GHG emissions from a proposed activity cause detrimental effects on the species or its habitat. However, as climate modeling and technology advance, the Services may be able to predict the causes and effects from climate change on species with greater scientific certainty and data. Members of Congress may be interested in the implications of revising the ESA to clarify its treatment of climate change effects. Legislation could clarify whether ESA Section 9 prohibitions or Section 7 consultation requirements apply to indirect harms that contribute to climate changes that may affect a species' survival, or how the Services should address scientific uncertainty associated with projected climate change effects when making listing determinations. As legislative proposals continue to develop, legal battles over the how the Services interpret climate change effects in their ESA decisions will likely continue.", "summary": "For more than a decade, federal agencies have grappled with how to address climate change effects when implementing the Endangered Species Act of 1973 (ESA). The ESA aims to protect threatened and endangered fish, wildlife, and plants from extinction. As set forth by Congress, one of the main purposes of the ESA is to \"provide a means whereby the ecosystems upon which endangered species and threatened species depend may be conserved.\" The U.S. Fish and Wildlife Service (FWS) and the National Marine Fisheries Service (NMFS) (collectively, the Services) have acknowledged that the changing climate may threaten the survival of and habitat for some species. As noted by courts and legal scholars, the ESA does not expressly require the Services to consider the effect of climate change in their ESA decisions. However, the ESA and its implementing regulations (1) direct the Services to consider \"natural or manmade factors affecting [a species'] continued existence\" when determining whether a species should be protected under the ESA; and (2) require the Services to analyze cumulative effects on a species' survival when analyzing whether federal actions jeopardize a species protected under the Act. The courts and the Services have interpreted these provisions as requiring the Services to consider climate change effects in the ESA decisionmaking process. Various lawsuits have challenged the Services' interpretation of complex scientific data or models that predict short- and long-term effects from a changing global climate on specific species and their habitats. Legal challenges have influenced how the Services implement the ESA when climate change affects species and their habitats. Lawsuits typically focus on two main issues: (1) when the Services should list, delist, or reclassify a species as threatened or endangered because of climate change effects; and (2) whether the Services can or should regulate activities that affect the climate to protect species and their habitat. Judicial review has helped to ensure that the Services consider projected climate change effects on species in their ESA decisions. However, the courts have not required the Services to curb activities that may contribute to climate change to protect threatened or endangered species. Stakeholders disagree on whether the ESA should play a role in addressing climate change, with some arguing that the ESA is not equipped to mitigate climate change effects. Other stakeholders believe that the Services can and should wield the ESA to protect further species threatened by climate change by curbing activities contributing to climate change. From the Services' viewpoint, the best available scientific and commercial data have been insufficient to determine whether greenhouse gas emissions from a proposed activity cause detrimental effects on a species or its habitat. In light of the judicial deference afforded to the Services, the courts have not expanded the ESA as a tool to protect listed species by regulating activities that contribute to climate change. This report analyzes the courts' role in shaping how the Services have factored climate change effects into ESA decisions and recent 2019 regulatory developments that aim to clarify how the Services consider and address climate change in their ESA decisions. In August 2019, the Services finalized revisions to the ESA implementing regulations, aiming to increase transparency and effectiveness of the ESA while easing regulatory burdens. Among those changes, the Services clarified their existing policies and practices for factoring climate change effects into their ESA decisions. As legislative proposals to revise the ESA continue to develop, legal battles over the how the Services interpret climate change effects in their ESA decisions will likely continue.", "document_type": "crs"}
{"report": "T he Gulf of Mexico Energy Security Act of 2006 (GOMESA) altered federal offshore oil and gas leasing policy in the U.S. Gulf of Mexico. The law imposed an oil and gas leasing moratorium through June 30, 2022, throughout most of the Eastern Gulf of Mexico (off the Florida coast) and a small part of the Central Gulf. In other parts of the Gulf of Mexico, the law established a framework for sharing revenues from certain qualified oil and gas leases with the \"Gulf producing states\" of Alabama, Louisiana, Mississippi, and Texas, as well as with a nationwide outdoor recreation programâthe Land and Water Conservation Fund's (LWCF's) state assistance program. Several aspects of GOMESA have generated interest in the 116 th Congress. As the 2022 expiration date for the leasing moratorium in the Eastern Gulf approaches, the Department of the Interior's (DOI's) Bureau of Ocean Energy Management (BOEM) has begun to plan for offshore leasing in this area following the moratorium's expiration. BOEM's draft proposed five-year oil and gas leasing program for 2019-2024 would schedule new lease sales in the expired moratorium area starting in 2023. Some Members of Congress seek to forestall new lease sales by extending the moratorium beyond 2022; others support allowing it to expire on the currently scheduled date. On September 11, 2019, the House passed H.R. 205 , which would make the GOMESA moratorium permanent. Congress is weighing the potential for development of hydrocarbon resources in the Eastern Gulf against competing uses of the area for military testing and training, commercial fishing, and recreation. The debate encompasses questions of regional economic livelihoods and national energy and military security, as well as environmental concerns centered on the threat of oil spills and the potential contributions to climate change of oil and gas development. GOMESA's revenue-sharing provisions also have generated debate and interest in the 116 th Congress. The law entered a second revenue-sharing phase in FY2017âoften referred to as GOMESA's \"Phase II\"âin which qualified leasing revenues from an expanded geographic area are shared with the states and with the LWCF. Phase II has resulted in higher revenue shares than in the law's first decade (FY2007-FY2016). Revenue sharing from the added Phase II areas is capped for most years at $500 million annually for the Gulf producing states and the LWCF combined, and some Members of Congress seek to raise or eliminate this cap. In the 115 th Congress, P.L. 115-97 increased the cap to $650 million for FY2020 and FY2021. In addition to changing the cap, some Members have advocated to increase the percentage of revenues shared with the Gulf Coast states and to increase the set of qualified leases from which revenues can be shared, as well as to add an additional state (Florida) to the revenue-sharing arrangement. Other bills have proposed new uses of Gulf oil and gas revenues for various federal programs and purposes outside of revenue sharing, and some stakeholders have proposed to end GOMESA state revenue sharing altogether. Debate has centered on the extent to which these revenues should be shared with coastal states versus used for broader federal purposes, such as deficit reduction or nationwide federal conservation programs. Some Members of Congress and other stakeholders have made the case that the coastal states should receive a higher revenue share, given costs incurred by these states and localities to support extraction activities. These stakeholders have compared GOMESA revenue sharing with the onshore federal revenue-sharing program, where states receive a higher share of the federal leasing revenues than is provided under the GOMESA framework. Other Members of Congress, as well as the Obama and Trump Administrations at times, have contended that revenues generated in federal waters belong to all Americans, and revenue distribution should reflect broader national needs. This report provides brief background on Gulf of Mexico oil and gas development, discusses key provisions of GOMESA, and explores issues related to the Eastern Gulf moratorium and Gulf state revenue sharing. The report discusses various legislative options and proposals for amending GOMESA, as well as scenarios for future leasing if the law continues unchanged. The Gulf of Mexico has the most mature oil and gas development infrastructure on the U.S. outer continental shelf (OCS), and almost all U.S. offshore oil and gas production (approximately 98%) takes place in this region. Additionally, the Gulf contains the highest levels of undiscovered, technically recoverable oil and gas resources of any U.S. OCS region, according to BOEM. The Office of Natural Resources Revenue (ONRR) estimated federal revenues from offshore oil and gas leases in the Gulf at $5.51 billion for FY2019, out of a total of $5.57 billion for all OCS areas ( Table 1 ). From FY2009 to FY2018, annual revenues from federal leases in the Gulf ranged from a high of $8.74 billion in FY2013 (out of $9.07 billion total OCS oil and gas revenues for that year) to a low of $2.76 billion in FY2016 (out of $2.79 billion total OCS oil and gas revenues for that year). Changing prices for oil and gas are the most significant factors in these revenue swings. BOEM divides the Gulf into three planning areas: Eastern, Central, and Western. Most of the oil and gas development has taken place in the Central and Western Gulf planning areas. This is due to stronger oil and gas resources in those areas (as compared with the Eastern Gulf) and to leasing restrictions in the Eastern Gulf imposed by statutes and executive orders before GOMESA's enactment. Congressional leasing restrictions in some parts of the Eastern Gulf date from the 1980s. Prompted by concerns of some coastal states, fishing groups, and environmentalists, Congress mandated a series of leasing moratoria in certain parts of the OCS, which grew to include the Eastern Gulf of Mexico. The FY1984 Interior Appropriations Act prohibited leasing in any Eastern Gulf areas within 30 nautical miles of the baseline of the territorial sea and in other specified Eastern Gulf blocks. From FY1989 through FY2008, the annual Interior appropriations laws consistently included moratoria in the portion of the Eastern Gulf south of 26Â° N latitude and east of 86Â° W longitude. Separately, President George H. W. Bush issued a presidential directive in 1990 ordering DOI not to conduct offshore leasing or preleasing activity in multiple parts of the OCSâincluding portions of the Eastern Gulfâuntil after 2000. In 1998, President Bill Clinton used his authority under Section 12(a) of the Outer Continental Shelf Lands Act (OCSLA) to extend the presidential offshore leasing prohibitions until 2012. President Clinton's order expanded the portion of the Eastern Gulf withdrawn from leasing consideration. The withdrawals designated during the Clinton Administration lasted until President George W. Bush modified them in 2008 to open multiple withdrawn areas to leasing. By that time, GOMESA had been enacted, so President Bush's action did not open the Eastern Gulf moratorium area to leasing. Before GOMESA's enactment, federal revenues from oil and gas leasing in most parts of the Gulf were not shared with coastal states. The exception was revenue from leases in certain nearshore federal waters: under Section 8(g) of the OCSLA (as amended), states receive 27% of all OCS receipts from leases lying wholly or partly within three nautical miles of state waters. Gulf Coast states argued for a greater share of the OCS revenues based on the significant effects of oil and gas development on their coastal infrastructures and environments. The states compared the offshore revenue framework to that for onshore public domain leases. Under the Mineral Leasing Act of 1920, which governs onshore oil and gas development, states generally receive 50% of all rents, bonuses, and royalties collected throughout the state, less administrative costs. GOMESA was signed into law on December 20, 2006. Sections 101 and 102 of the law contain a short title and definitions. Section 103 directs that two areas in the Central and Eastern Gulf be offered for oil and gas leasing shortly after enactment. These mandated lease sales took place in 2007-2009, and this provision of GOMESA has not been a focus of current congressional interest. Current interest has focused on Section 104 of the law, which imposes a moratorium on oil and gas leasing in certain parts of the Gulf, and Section 105, which contains provisions for revenue sharing from qualified leases with four states and their coastal political subdivisions, as well as with the LWCF's state assistance program. Section 104 of GOMESA states that, from the date of the law's enactment through June 30, 2022, the Secretary of the Interior is prohibited from offering certain areas, primarily in the Eastern Gulf, for \"leasing, preleasing, or any related activity.\" The moratorium encompasses (1)Â areas east of a designated Milit ary Mission Line , defined in the law as the north-south line at 86Â°41Ê¹Â W longitude; (2) all parts of the Eastern Gulf planning area that lie within 125 miles of the Florida coast; and (3) certain portions of the Central Gulf planning area, including any parts within 100 miles of the Florida coast, as well as other specified areas. The resulting total moratorium formed by these overlapping areas is shown in gray in Figure 1 . Section 104 also allows for holders of existing oil and gas leases in some parts of the moratorium area to exchange the leases for a bonus or royalty credit to be used in the Gulf of Mexico. Section 104 prohibits not only lease sales in the moratorium area but also \"preleasing\" and other related activities. BOEM has clarified that such preleasing and related activities are not interpreted to include geological and geophysical (G&G) activitiesâsuch as seismic surveysâundertaken to locate resources with the potential to produce commercial quantities of oil and gas. BOEM interprets GOMESA to allow these G&G surveys in the moratorium area. The moratorium imposed by Section 104 expires on June 30, 2022. The 116 th Congress is debating whether to allow the moratorium to expire as scheduled or to amend GOMESA (or enact other legislation) to potentially further restrict federal oil and gas activity in this area. The following sections discuss scenarios for future leasing in the area under current provisions, legislative proposals to provide for other outcomes, and selected issues for Congress related to the moratorium provisions. Absent further action by Congress, after June 30, 2022, the executive branch could potentially offer new oil and gas leases in the expired moratorium area. Under the OCSLA, the Secretary of the Interior could decide to include or exclude the area in future five-year offshore oil and gas leasing programs, based on specified criteria. The OCSLA also gives the President discretion to withdraw the area, temporarily or indefinitely, from leasing consideration, which would render it unavailable for inclusion in a DOI leasing program. The Trump Administration has indicated interest in pursuing oil and gas leasing in the GOMESA moratorium area after the moratorium's expiration. BOEM's initial draft of a five-year oil and gas leasing program for 2019-2024 (referred to as the \"draft proposed program\" or DPP) includes two lease sales in the moratorium area, one in 2023 and one in 2024. The DPP proposes to offer all available tracts in the former moratorium area after the expiration. BOEM also indicated that it would analyze two secondary options that would exclude some portions of the moratorium area from the lease sales ( Figure 2 ). First, BOEM is analyzing a potential \"coastal buffer\" off Floridaâat distances of 50, 75, 100, or 125 milesâto accommodate military activities and nearshore use. Second, BOEM is separately analyzing a potential 15-mile leasing buffer offshore of Baldwin County, AL, to minimize visual and other impacts to onshore coastal areas. The next draft of the 2019-2024 program is expected to reflect the results of BOEM's analysis. Under the planning process for the program, which is governed by requirements of both the OCSLA and the National Environmental Policy Act, sales listed in the DPP could be retained, modified, or removed in subsequent drafts of the program. In deciding whether to include the sales (either in their current form or with modifications) in the final leasing program, the Secretary of the Interior must weigh economic, social, and environmental criteria. Among the factors the Secretary must consider under the OCSLA are coastal state governors' views on leasing off their coasts. Recent governors of Florida, the state most closely adjacent to the moratorium area, generally have expressed opposition to leasing in this area. Governors of other Gulf Coast statesâAlabama, Louisiana, Mississippi, and Texasâgenerally have expressed support for oil and gas leasing in the Eastern Gulf. The Secretary also must consider the views of other affected federal agencies. One key agencyâDODâhistorically has opposed new leasing in the area, due to DOD's use of this part of the Gulf as a military testing and training ground (see \" Military Readiness \"). Both DOD and the Gulf producing states, along with some Members of Congress and many other stakeholders, submitted public comments on the 2019-2024 DPP. These comments are to be taken into account in the second draft of the program. Another round of public comment is expected to be solicited before the program could be finalized. The oil and gas industry has indicated interest in leasing in the moratorium area. Some industry representatives have stated that the Eastern Gulf represents a more attractive leasing prospect than other OCS areas currently unavailable for leasing (e.g., the Pacific and Atlantic regions) because data on the Eastern Gulf are better developed than for these other areas, and nearby infrastructure is already in place to facilitate exploration and development. Industry representatives have expressed particular interest in the deepwater Norphlet play, which spans parts of the Eastern and Central Gulf. A number of legislative proposals in the 116 th Congress have sought to extend GOMESA's moratorium or permanently prohibit leasing in the moratorium area. By contrast, other legislation would mandate lease sales in the area directly following the moratorium's current expiration date. Table 2 summarizes provisions of relevant 116 th Congress bills. Two of these bills, H.R. 4294 and S. 13 , include provisions affecting GOMESA revenue sharing, discussed further in Table 5 . One proposal related to the moratorium has passed the House of Representatives in the 116 th Congress: H.R. 205 , the Protecting and Securing Florida's Coastline Act of 2019. The bill would amend GOMESAâto extend the Eastern Gulf moratorium indefinitely, thus precluding future oil and gas leasing in the area. In its report on the bill, the House Natural Resources Committee stated that a continued moratorium is necessary because leasing in the Eastern Gulf would compromise military readiness and \"pose existential threats to Florida's tourism, fishing, and recreation economy, which rely on clean water and healthy beaches.\" In dissenting views, some committee members contended that oil and gas leasing in the area could successfully coexist with fishing, tourism, and military operations, and pointed to the role of Gulf oil and gas revenues in funding environmental restoration activities and land protection. Bills in earlier Congresses sought other types of outcomes related to the GOMESA moratorium. For example, some legislation would have enabled leasing in portions of the moratorium area before the 2022 expiration date, effectively shrinking the moratorium area. Other legislation would have prohibited some activities in the moratorium area that are not currently restricted by GOMESA, such as seismic surveys or research on potential areas for offshore drilling. These proposals have not been included to date in 116 th Congress legislation. An extension of GOMESA's leasing prohibitions could result in a loss to the government of future federal revenues (to the extent that leasing and commercial production would otherwise take place when the moratorium expires). Also, some oil and gas industry advocates have contended that future development in the Eastern Gulf could contribute billions of dollars annually to the nation's gross domestic product, mainly through contributions to Gulf state economies, which they contend would be lost were the moratorium to continue. By contrast, some in the commercial fishing, tourism, and recreation sectors have focused on potential economic costs to these sectors if oil and gas development takes place off the coast of Florida, with particular emphasis on potential financial losses if a major oil spill were to occur. They point to estimates showing significant costs to these industries from the 2010 Deepwater Horizon oil spill. Other stakeholders express concern that any oil and gas activities in these areas would contribute to greenhouse gas emissions and human-induced climate change, with accompanying direct and indirect costs. The Congressional Budget Office (CBO) has estimated certain budgetary effects of a moratorium extension in relation to budget projections under existing law. CBO has estimated that bills to extend the moratorium would reduce offsetting receipts and thus increase direct federal spending. As a result, such bills may be subject to certain budget points of order unless offset or waived. For example, for the version of H.R. 205 reported by the House Committee on Natural Resources, CBO estimated that the bill's extension of GOMESA's moratorium would increase direct spending by $400 million over 10 years. The extent to which the GOMESA moratorium is needed for U.S. military readiness also has been at issue. The area east of the Military Mission Line in the Eastern Gulf provides about 101,000 square miles of surface area and overlying air space, which is the largest overwater DOD test and training area in the continental United States. DOD historically has expressed a need for an oil and gas leasing moratorium in this area. For instance, in 2006, DOD stated that its testing and training activities in the Eastern Gulf were \"intensifying\" and requiredâ\"large, cleared safety footprints free of any structures on or near the water surface.\" In 2017, DOD wrote that the agency \"cannot overstate the vital importance of maintaining this moratorium.... Emerging technologies such as hypersonics, autonomous systems, and advanced sub-surface systems will require enlarged testing and training footprints, and increased DoD reliance on the Gulf of Mexico Energy Security Act's moratorium beyond 2022.\" More recently, in a 2018 report to Congress on preserving military readiness in the Eastern Gulf, DOD wrote: No other area in the world provides the U.S. military with ready access to a highly instrumented, network-connected, surrogate environment for military operations in the Northern Arabian Gulf and Indo-Pacific Theater. If oil and gas development were to extend east over the [Military Mission Line], without sufficient surface limiting stipulations and/or oil and gas activity restrictions mutually agreed by the DoD and Department of Interior (DoI), military flexibility in the region would be lost and test activities severely affected. Some Members of Congress and other stakeholders have interpreted the wording of the 2018 reportâparticularly its phrase \"without sufficient surface limiting stipulations and/or oil and gas activity restrictions\"âas signaling a greater DOD openness to oil and gas activities in the moratorium area than had been expressed in some earlier DOD communications. The phrasing might be read to suggest that military readiness and oil and gas development could be mutually accommodated, given appropriate stipulations and restrictions. Oil and gas leases awarded in the Central and Western Gulf often contain stipulations related to military activities, such as those requiring the lessee to assume risks of damage from military activities, to control electromagnetic emissions in defense warning areas, to consult with military commanders before entering some areas, and/or to evacuate areas as needed for military purposes. BOEM also typically reserves the right to temporarily suspend a lease in the interest of national security. The 2018 report does not clarify what types of lease stipulations and restrictions might be necessary to accommodate the more intensive testing and training activities in the Eastern Gulf. The report states that some military activities in this area may be incompatible with the presence of fixed or mobile oil platforms. The report expresses concerns that increased vessel traffic and underwater noise could jeopardize some military activities. It also discusses concerns about potential foreign observation of DOD activities, if foreign entities are allowed to control offshore assets or otherwise conduct business near military ranges in the Eastern Gulf. If these military concerns were to lead to more stringent restrictions on oil and gas operations than are mandated in other parts of the Gulf, a question would be how such restrictions might affect industry interest in bidding on leases in the Eastern Gulf. In its cost estimate for H.R. 205 , CBO identified defense-related constraints (and the potential incompatibility of some development with Florida's Coastal Management Program) as factors that could reduce the value of Eastern Gulf leases to industry bidders. However, some industry representatives have expressed consistent interest in leasing in the area and have contended that economic returns on leases in this area would be substantial, despite potential restrictions related to military activities. Section 105 of GOMESA provides for federal revenues from certain qualified leases in the Gulf of Mexico to be shared under specified terms with four Gulf producing statesâAlabama, Louisiana, Mississippi, and Texasâand their \"coastal political subdivisions\" or CPSs (e.g., coastal counties or parishes), as well as with the LWCF state assistance program. Specifically, each year the Secretary of the Treasury is to deposit 50% of qualified revenues in a special account (the remaining 50% are deposited in the General Fund of the U.S. Treasury as miscellaneous receipts). From this special account, the Secretary disburses 75% of funds to the Gulf producing states and their CPSs, and 25% to the LWCF state assistance program. Accordingly, of the total qualified revenues in a given year, the states and CPSs receive 37.5% (i.e., 75% of the 50% in the special account), and the LWCF receives 12.5% (25% of the 50%). The law's definition of \"qualified\" OCS revenues differs for the first decade after GOMESA's enactment (FY2007-FY2016) versus for subsequent years. For FY2007-FY2016 (often referred to as GOMESA's Phase I), the law defines qualified OCS revenues to include all bonus bids, rents, royalties, and other sums due and payable to the United States from leases in the Eastern Gulf and the Central Gulf's 181 South Area entered into on or after the date of GOMESA's 2006 enactment. These are the relatively small areas shown as areas A and B in Figure 1 . For FY2017 and beyond (Phase II), the geographic area of qualified revenues expands. In addition to revenues from post-2006 leases in the Phase I areas, the qualified revenues in Phase II include those from post-2006 leases in the Central Gulf's portion of the 181 Area, shown as areaÂ C in Figure 1 . The Phase II qualified revenues also include the \"2002-2007 planning area\"âthe large area shown in yellow in Figure 1 , encompassing most of the Western and Central Gulf, where the bulk of production takes place. Accordingly, revenues qualified for sharing in Phase II are likely to be notably higher than in Phase I ( Table 3 ). For the added Phase II areas, Section 105 stipulates that the total amount of qualified revenues made available each year to the states and their CPSs and the LWCF (collectively) shall not exceed $500 million for each of FY2016-FY2055. A later law, P.L. 115-97 , raised the cap to $650 million for two of these years, FY2020 and FY2021. Given the percentage distributions specified in the law for each recipient, the amounts that can be shared with states and their CPSs from the added Phase II areas are capped at $375.0 million in most years (and $487.5 million in FY2020 and FY2021). The amounts that can be shared with the LWCF are capped at $125.0 million in most years (and $162.5 million in FY2020 and FY2021). Phase II began with FY2017 revenues, but GOMESA specifies that revenues shall be shared with recipients in the fiscal year immediately following the fiscal year in which they are received. Thus, in terms of payments, the first fiscal year reflecting Phase II revenue sharing was FY2018. The shared revenues rose notably in that year compared with previous years. Table 3 shows GOMESA revenue distributions since the law's enactment, with the transition from Phase I distributions to Phase II distributions occurring between FY2017 and FY2018. GOMESA directs the Secretary of the Interior to establish a formula to allocate each year's qualified state revenues among the four Gulf producing states and their CPSs. The allocations to each state primarily depend on its distance from leased tracts, with states closer to the leased tracts receiving a higher share. The law additionally provides that each state must receive an annual minimum of at least 10% of the total amount available to all the Gulf producing states for that year. Further, GOMESA directs that the Secretary shall pay 20% of the allocable share of each Gulf producing state to the state's CPSs. See the box below for additional details on the state allocations. GOMESA authorizes the states and CPSs to use revenues for the following purposes: Projects and activities for the purposes of coastal protection, including conservation, coastal restoration, hurricane protection, and infrastructure directly affected by coastal wetland losses. Mitigation of damage to fish, wildlife, or natural resources. Implementation of a federally approved marine, coastal, or comprehensive conservation management plan. Mitigation of the impact of OCS activities through the funding of onshore infrastructure projects. Planning assistance and the administrative costs of complying with GOMESA. (No more than 3% of a state or CPS's revenues may be used for this purpose.) The following sections discuss the scenario for GOMESA revenue sharing under the law's current provisions, summarize legislative proposals for changes, and explore selected issues. Under GOMESA, revenue sharing with the states and LWCF continues indefinitely, and the annual cap on shared revenues from the Phase II areas continues through FY2055. After that year, all qualified Gulf revenues would be shared under the current formulaâ37.5% to states and their CPSs and 12.5% to the LWCFâregardless of whether the shared amount from the Phase II areas exceeds $500 million. DOI, in its annual budget justifications, develops five-year projections of qualified GOMESA revenues. Table 4 shows DOI projections for FY2020-FY2024 shared revenues (which are half of all qualified revenues), by revenue collection year. The revenues collected in a given year would be shared with the states and LWCF in the following fiscal year. In general, the DOI projections for a given year have not always been consistent over time. Changing oil prices have been a major factor in revised projections. Under the current scenario, the majority of the moratorium areaâthe portion shown in gray in Figure 1 âdoes not qualify for revenue sharing, even after the moratorium ends in June 2022. Instead, any revenues from oil and gas leasing and development in this area after the moratorium expires would go entirely to the Treasury. Also, GOMESA does not provide for revenue sharing with Florida, although some of the qualified revenue-sharing areasâsuch as portions of the 181 Areaâare closer to Florida than to the other Gulf producing states. In the 116 th Congress, several bills would amend GOMESA to increase the portion of qualified revenues shared with the Gulf producing states by raising the states' percentage share, eliminating the revenue-sharing cap, or both. Some legislation also would expand the purposes for which states may use the GOMESA revenues, modify the uses of the LWCF share, or add Florida to the revenue-sharing arrangement. Table 5 describes selected relevant bills and their provisions. None of the bills has been reported from committee in the 116 th Congress. In contrast with bills that would increase the state revenue share, some legislative proposals in earlier Congresses would have ended state revenue sharing under GOMESA. For example, in the 114 th Congress, would have amended GOMESA to provide that 87.5% of qualified revenues under the law would be deposited in the Treasury's General Fund, while 12.5% would continue to be provided for LWCF financial assistance to states. This proposal is similar to some legislative proposals in DOI budget requests under the Obama and Trump Administrations (see \" Determining the Appropriate State Share \"). Members of Congress differ in their views on the extent to which Gulf Coast states should share in revenues derived from oil and gas leasing in federal areas of the Gulf. State officials from the Gulf producing states and some Members of Congress have expressed that the Gulf producing states should receive a higher share than is currently provided under GOMESA, given the costs they incur to support offshore extraction activities. These stakeholders have argued that the revenues are needed to mitigate environmental impacts and to maintain the necessary support structure for the offshore oil and gas industry. For example, at a 2018 hearing of the House Committee on Natural Resources, former Senator Mary Landrieu stated: \"It is important to note that revenue sharing was established â¦ to recognize the contributions that states and localities make to facilitate the extraction and production of these resources, including the provision of infrastructure to enable the federal activity: transportation, hospitals, schools and other necessary governmental services.\" Advocates have emphasized that Gulf Coast areas, especially coastal wetlands, face significant environmental challenges, owing in part to hydrocarbon development (among other activities). These advocates have contended that additional federal revenues are critical to address environmental challenges and economic impacts of wetland loss. Advocates point to a disparity between the 37.5% state share provided under GOMESA and the 50% share of revenues that most states receive from onshore public domain leases under the Mineral Leasing Act. They contend that a comparable state revenue share under GOMESA would significantly contribute to coastal wetland restoration, given GOMESA's requirement that the Gulf producing states use the funding to address coastal protection, damage mitigation, and restoration (and given comparable requirements under some state laws). By contrast, some other Members of Congress, as well as the Obama and Trump Administrations at times, have contended that GOMESA revenue sharing with the states should be reduced or eliminated to facilitate use of these revenues for broader national purposes. They have argued that, since the OCS is a federal resource, the benefits from offshore revenues should accrue to the nation as a whole, rather than to specific coastal states. Under the Obama Administration, DOI budget requests for FY2016 and FY2017 recommended that Congress repeal GOMESA state revenue-sharing payments and direct a portion of the savings to programs that provide \"broad â¦ benefits to the Nation,\" such as a proposed new Coastal Climate Resilience Program \"to provide resources for at-risk coastal States, local governments, and their communities to prepare for and adapt to climate change.\" Legislation in the 114 th Congress ( S. 2089 ; see \" Legislative Proposals \") would have amended GOMESA to eliminate the state revenue sharing and provide for the state share to go to the Treasury's General Fund. For FY2018, the Trump Administration proposed that Congress repeal GOMESA's state revenue-sharing provisions, in order to \"ensure [that] the sale of public resources from Federal waters owned by all Americans, benefit all Americans.\" The Trump Administration has not included similar proposals in subsequent budget requests, and no legislation to reduce or eliminate GOMESA state revenue sharing has been introduced to date in the 116 th Congress. Although Phase II of GOMESA considerably expanded the set of leases contributing to revenue sharing, some Gulf leases still do not qualify, because the law applies only to leases that were entered into on or after the date of GOMESA's enactment (December 20, 2006). It appears from 2019 leasing data maintained by BOEM that approximately 61% of the more than 2,500 active leases in the Gulf of Mexico were entered into on or after the enactment date, and thus would qualify for revenue sharing under GOMESA's current terms. However, the majority of these newer leases are not producing oil and gas; and leases awarded before GOMESA's enactmentâwhich do not qualifyâcontinue to contribute a substantial portion of production royalties. For this reason, the percentage of Gulf revenues subject to GOMESA sharing is much smaller than the percentage of Gulf leases subject to GOMESA sharing. For example, of federal offshore revenues disbursed in FY2019 (the high majority of which come from the Gulf), GOMESA-qualified revenuesâincluding those distributed to states and their CPSs, the LWCF state grant program, and the Treasury combinedâconstituted 18% of the total. The percentage of total revenues that qualify for sharing under GOMESA might be expected to increase over time, to the extent that older leases gradually terminate and current and future leases begin producing. Some Members of Congress have proposed that GOMESA's terms be altered to include an expanded set of leases in the qualified sharing group. For instance, in the 116 th Congress, S. 2418 would amend GOMESA to define the qualified leases as those entered into on or after October 1, 2000, rather than after GOMESA's 2006 enactment. According to BOEM data as of November 2019, this would more than double the number of producing leases eligible for GOMESA revenue sharing (although the addition in total leases would be relatively small). The result could be a higher revenue share with the states and their CPSs and the LWCF state grant program. Some other Members do not favor this type of change because it could reduce the portion of offshore revenues going to the Treasury for other federal purposes. Offshore oil and gas revenues support a variety of federal and state activities, through amounts deposited annually in the LWCF and the Historic Preservation Fund (HPF) and through revenues shared with states under revenue-sharing laws. Revenue totals have fluctuated from year to year ( Table 1 ), raising questions about whether future revenues will be adequate to support these various activities and whether new legislation for offshore revenue distribution would strain available amounts. For example, some Members of Congress have considered whether raising GOMESA's state revenue share would result in insufficient funds to meet statutory requirements for deposits to the LWCF and HPF. Alternatively, some Members have questioned whether proposals to use offshore revenues for new conservation programs would reduce state sharing under GOMESA and jeopardize programs supported by the state-shared funds. Thus far, in each year since GOMESA's enactment, OCS revenues have been sufficient to provide for all distributions under current law. If bills in Table 5 were enacted to raise the GOMESA state revenue share to 50% and eliminate the revenue-sharing cap for states, it appears that, based on DOI projections for FY2020-FY2024, OCS revenues remaining after state sharing would still be more than sufficient to meet statutory requirements for deposits to the LWCF and HPF in these years. Various economic factors or policy decisions could affect these DOI projections, and under some theoretical scenarios, enactment of bills to increase the state share could affect the sufficiency of revenues to cover other legislative requirements. Similarly, under some scenarios, legislative proposals to fund new conservation programs with offshore revenues could affect amounts shared with the states under GOMESA. Whether this would occur would depend partly on the terms of the legislative proposals. For example, S. 500 and H.R. 1225 in the 116 th Congress would establish a new deferred maintenance fund for specified federal lands supported partly by offshore energy revenues. These proposals address the issue of revenue availability by specifying that the new deferred maintenance fund would draw only from miscellaneous receipts deposited to the Treasury after other dispositions are made under federal law. That is, if revenues were insufficient to provide for the funding amounts specified under these bills along with the other distributions required in law, it appears that the requirements of current laws (including GOMESA) would be prioritized. Also relevant are proposals by some Members of Congress and other stakeholders to significantly curtail or end OCS oil and gas leasing, in response to climate change concerns. Depending on the extent to which offshore production decreased, such policy changes could result in an insufficiency of revenues to meet all statutory requirements, especially over the long term as production from existing leases diminished. Some supporters of reducing or eliminating federal offshore oil and gas leasing have suggested that other revenue sources, such as from an expansion of renewable energy leasing on federal lands, should be found for desired federal programs. Some opponents of curtailing offshore oil and gas leasing have pointed to the revenue implications as an argument against such actions. Bills that would increase the state share of GOMESA revenuesâby giving the states a higher revenue percentage, eliminating revenue-sharing caps, or bothâhave been identified by CBO as increasing direct spending. For example, in cost estimates for 115 th Congress legislationâwhich would have made similar state-sharing changes to those proposed in H.R. 3814 , H.R. 4294 , and S. 2418 ( Table 5 )âCBO estimated that these changes would increase direct spending of OCS receipts by $2.1 billion over a 10-year period. As a result, such legislation may be subject to certain budget points of order unless offset or waived. As of January 2020, CBO has not released cost estimates for the 116 th Congress bills discussed in Table 5 (none of which has been reported from committee), and it is unclear how CBO would estimate costs associated with those bills or whether some provisions in those bills might be estimated to offset costs of other provisions. For example, H.R. 4294 contains provisions to repeal presidential withdrawals of offshore areas from leasing consideration and to facilitate offshore wind leasing in U.S. territories, among others. CBO scored similar provisions in 115 th Congress bills as increasing offsetting receipts (and thus partly offsetting bill costs). Under GOMESA's current provisions, Florida is not among the Gulf producing states eligible for revenue sharing. Some proposals, including S. 13 in the 116 th Congress, would add Florida to the group of states receiving a revenue share. Because the high majority of Gulf leasing takes place in the Western and Central Gulf planning areas, which do not abut Florida, Florida's share of GOMESA revenues if S. 13 were enacted would likely be lower than those of the other Gulf Coast states, especially Louisiana and Texas. Nonetheless, since GOMESA provides that every Gulf producing state must receive at least 10% of the annual state revenue share, adding Florida to the Gulf producing states would provide at least that portion of GOMESA revenues for Florida and would correspondingly reduce the total available to the other Gulf producing states. Some Florida stakeholders have opposed legislation to add Florida to GOMESA revenue sharing on the basis that doing so could incentivize eventual oil and gas development off Florida. Others support a continued moratorium off Florida and support giving Florida a revenue share from leasing elsewhere in the Gulf. These stakeholders contend that Florida bears risks from oil and gas leasing elsewhere in the Gulf (particularly related to potential oil spills) and so should also see benefits. This position is captured in S. 13 , which would extend the GOMESA moratorium through 2027 and add Florida as a revenue-sharing state. Still others support adding Florida as a revenue-sharing state as part of a broader change to allow leasing and revenue sharing in areas offshore of Florida. Supporters of this approach, including some from the current Gulf producing states, may contend that an increase in the number of states that share GOMESA revenues should be accompanied by a growth in the area qualified for revenue sharing to reduce the likelihood of a smaller share for the original four states. The current period is one of transition for the oil and gas leasing framework established by GOMESA for the Gulf of Mexico. First, the Eastern Gulf leasing moratorium is set to expire in 2022, and BOEM is proposing offshore lease sales for the moratorium area starting in 2023. Second, the Gulf leases subject to revenue sharing expanded substantially starting in FY2017, and DOI projects revenues from these areas will approach or reach GOMESA's revenue-sharing cap in FY2024. Congress is considering whether GOMESA's current provisions will best meet federal priorities going forward, or whether changes are needed to achieve various (and sometimes conflicting) national goals. Regarding the moratorium provisions, a key question is whether decisions about leasing in the Eastern Gulf should be legislatively mandated or left to the executive branch to control. Absent any legislative intervention, after June 2022, the President and the Secretary of the Interior are to decide whether, where, and under what terms to lease tracts in the former moratorium area, following the statutory provisions of the OCSLA. Some Members of Congress seek to amend GOMESAâeither to extend the moratorium or to mandate lease sales in the areaârather than deferring to the OCSLA's authorities for executive branch decisionmaking. At stake are questions of regional and national economic priorities, environmental priorities, energy security, and military security. With respect to Gulf oil and gas revenues, GOMESA's current revenue-sharing provisions take into account multiple priorities: mitigating the impacts of human activities and natural processes on the Gulf Coast (through state revenue shares directed to this purpose); supporting conservation and outdoor recreation nationwide (through the LWCF state assistance program); and contributing to the Treasury. For the most part, legislative proposals to change the terms of GOMESA revenue distribution have supported some or all of these priorities but have sought to change the balance of revenues devoted to each purpose. Also at issue are proposals to use the revenues for new (typically conservation-related) purposes outside the GOMESA framework, as well as proposals to substantially reduce or eliminate Gulf oil and gas productionâwith corresponding revenue implicationsâin the context of addressing climate change. The 116 th Congress is debating such questions as it considers multiple measures to amend GOMESA. ", "summary": "Almost all U.S. offshore oil and gas production occurs in the Gulf of Mexico. Federal oil and gas leasing in the Gulf is governed primarily by two lawsâthe Outer Continental Shelf Lands Act (OCSLA; 43 U.S.C. Â§Â§1331-1356b), which broadly controls oil and gas leasing throughout the U.S. outer continental shelf (OCS); and the Gulf of Mexico Energy Security Act of 2006 (GOMESA; 43 U.S.C. Â§1331 note), whose provisions relate specifically to leasing in the Gulf region. GOMESA imposes an oil and gas leasing moratorium through June 30, 2022, in most of the Eastern Gulf (off the Florida coast) and a small part of the Central Gulf. The law also establishes a framework for sharing revenues from certain qualified oil and gas leases in other parts of the Gulf with the \"Gulf producing states\" of Alabama, Louisiana, Mississippi, and Texas, as well as with a nationwide outdoor recreation programâthe state assistance program establis hed by the Land and Water Conservation Fund Act (LWCF; 54 U.S.C. Â§Â§200301 et seq.). The 116 th Congress is considering changes to GOMESA, as statutory provisions related to both the moratorium and revenue sharing enter a period of transition. GOMESA Moratorium GOMESA's leasing moratorium is scheduled to expire in June 2022, and the Department of the Interior's (DOI's) Bureau of Ocean Energy Management (BOEM) has begun to plan for offshore leasing in the moratorium area after the expiration. Some Members of Congress seek to forestall new lease sales in the area by extending the moratorium; others support allowing it to expire on the scheduled date. On September 11, 2019, the House passed H.R. 205 , which would make the GOMESA moratorium permanent. Some other 116 th Congress bills (e.g., H.R. 286 , H.R. 291 , H.R. 341 , H.R. 2352 , H.R. 3585 , and S. 13 ) also would extend the moratorium or make it permanent. By contrast, H.R. 4294 would mandate lease sales in the area directly following the expiration. Absent congressional action, the executive branch is to decide whether to offer new oil and gas leases in the GOMESA moratorium area after June 2022. The Trump Administration has indicated interest in pursuing oil and gas leasing in that area after the expiration and has included two lease sales in a preliminary draft of its offshore leasing program for 2019-2024. In addition to economic, budgetary, and environmental considerations in extending or ending the moratorium, a particular issue is potential conflict related to the Department of Defense's (DOD's) intensive use of the area for military testing and training. DOD generally has supported the moratorium and has indicated that, from a defense standpoint, stipulations and restrictions on oil and gas activities would be necessary if the area were to be opened to leasing in 2022. GOMESA Revenue Sharing A second revenue-sharing phase (referred to as \"Phase II\") has begun under GOMESA. Compared with GOMESA's first decade (FY2007-FY2016), Phase II requires revenues to be shared from an expanded set of leases. Revenues continue to be shared at a rate of 37.5% with the Gulf producing states and their coastal political subdivisions, and at a rate of 12.5% with the LWCF state assistance program. The remaining 50% of qualified revenues are deposited in the General Fund of the U.S. Treasury as miscellaneous receipts. Revenue sharing from the added Phase II areas is capped annually at $500 million for most years through FY2055 for the four states and LWCF combined. Stakeholders have debated whether the Phase II revenue-sharing provisions should remain in place or whether different proportions should be shared with coastal states, used for broader federal programs, or deposited as miscellaneous receipts to the U.S. Treasury. Some Members of Congress seek to increase revenues shared with the Gulf Coast states, for example, by raising or eliminating GOMESA's revenue-sharing cap, increasing the state-shared percentage, or both. In the 115 th Congress, P.L. 115-97 increased the revenue-sharing cap to $650 million for FY2020 and FY2021. Several bills in the 116 th Congress (e.g., H.R. 3814 , H.R. 4294 , and S. 2418 ) would eliminate the cap and raise the state share of qualified revenues to 50%. S. 13 would add Florida as a revenue-sharing state. Other bills have proposed new uses of Gulf oil and gas revenues for other federal programs and purposes outside of revenue sharing; and some stakeholders have proposed to end GOMESA state revenue sharing altogether. Also at issue are questions about the overall adequacy of revenue amounts to fulfill existing and proposed purposes, including considerations about the optimal extent of federal offshore oil and gas leasing in the Gulf and how various policy choices would affect revenue amounts.", "document_type": "crs"}
{"report": "Economic conditions have deteriorated rapidly as the spread of Coronavirus Disease 2019 (COVID-19) has led policymakers to limit or close public institutions and business operations, increasing financial hardship for many Americans due to layoffs or time off work. Financial institutions, their regulators, and other government agencies have responded by working with consumers to allow those affected by COVID-19 to temporarily alleviate their financial obligations. As losses continue to mount on businesses from lower consumer demand and rising unemployment, Congress has stepped in with legislation aimed at mitigating the economic impact of COVID-19. On March 27, 2020, the President signed the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; H.R. 748 ) into law as P.L. 116-136 . The CARES Act is a wide-ranging act to provide relief to consumers, small businesses, and certain industries amid the economic fallout of COVID-19. The law contains two divisions. Division A contains six titles aimed at making funds available to different entities through various programs, including rebate checks to taxpayers; loans to small businesses for payroll; protections for consumers with outstanding payments (e.g., mortgages, student loans, and rental and healthcare payments); loans and loan guarantees and other investments to help the financial industry and other selected industries; and other public funds for federal, state, local, and tribal government programs aimed at managing the disaster recovery from the national health crisis. Division B provides FY2020 supplemental appropriations for federal agencies to respond to COVID-19. (Hereinafter, title and section references in this report refer to Division A, unless otherwise specified.) Title IV of the CARES Act contains numerous provisions aimed broadly at stabilizing the economy and helping affected households and businesses. It has received considerable attention for containing funding for industry and financial services. Specifically, Section 4003 directs the Department of the Treasury (Treasury) and the Federal Reserve (Fed) to make up to $500 billion available to support various businesses in the aviation sector, as well as the financial system. Some have characterized this as a \"bailout\" of private industry; others assert it is necessary to avoid employment losses and maintain economic stabilityâthe two views are not necessarily mutually exclusive. Title IV also permits federal guarantees for uninsured bank deposits and money market funds, which are beyond the scope of this report. In addition to the financial assistance provided in Title IV, the CARES Act provides financial assistance to small businesses in Title I (including the Payroll Protection Program) and assistance to states and municipalities in Title V. See CRS Report R46284, COVID-19 Relief Assistance to Small Businesses: Issues and Policy Options , by Robert Jay Dilger, Bruce R. Lindsay, and Sean Lowry for information specifically about assistance targeting small businesses found in Title I of the CARES Act. This report provides an overview of Section 4003 and related provisions and explains the terms and conditions associated with the assistance. The report's Appendix compares these provisions to the 2008 Troubled Asset Relief Program (TARP). This report is about the Title IV provisions specifically designed to provide funding for eligible businesses, states, and municipalities, as defined by the act. In particular, Section 4027 appropriates $500 billion to the Exchange Stabilization Fund (ESF) for use by the Treasury Secretary, and Section 4003 allows Treasury to use the $500 billion to support eligible businesses, states, and municipalities that have suffered losses due to COVID-19. As discussed in the next section, Section 4003 allocates up to $46 billion for Treasury to directly provide loans and loan guarantees as follows: (1) not more than $25 billion for passenger air carriers (and certain related businesses), (2) not more than $4 billion for cargo air carriers, and (3) not more than $17 billion for businesses critical to maintaining national security. Treasury may make funds from the remaining $454 billion, plus any unpledged funding from the $46 billion, available to support Fed facilities to provide liquidity to the financial system through lending to eligible businesses, states, and municipalities (described in the \" Federal Reserve Emergency Facilities Backed by the CARES Act \" section, below). Section 4029 terminates this authority on December 31, 2020, and allows outstanding loans and guarantees to be modified, restructured, or otherwise amended, subject to a restriction: the duration of assistance to the passenger air industry cannot be extended beyond five years from the initial origination date. Section 4003 requires recipients to repay this assistance with interest, fees, and in some cases, compensation in the form of warrants, equity, or senior debt. Under the Federal Credit Reform Act (FCRA; P.L. 101-508 ), the Office of Management and Budget and the Congressional Budget Office are to estimate the subsidy associated with this assistance based on the difference between the present discounted value of both the assistance and income received by Treasury from principal and interest payments (along with other forms of compensation). The ultimate size of this subsidy will not be known until terms, such as interest rates and fees, have been decided and it becomes clear to what extent firms are able to repay. By contrast, Sections 4112, 4113, and 4120 provide up to $32 billion in grants to continue payment of employee wages, salaries, and benefits at airline-related industries. The Treasury Secretary has discretion whether to seek compensation for these grants. Treasury has broad discretion to decide how much of each part of the funding to make available to the specified industries or the Fed, in what form, and for what purpose. These funds are made available with certain terms and conditions, however (as discussed in the \" Terms and Conditions \" section, below). For example, Section 4004 sets executive compensation limits on certain companies receiving assistance; Section 4019 restricts eligible recipients of assistance to avoid conflicts of interest; Sections 4114 and 4116 limit recipient firms from taking certain actions; and Sections 4025 and 4115 prohibit conditioning assistance on entering into collective bargaining negotiations. Additionally, several provisions provide enhanced oversight for the Title IV funding programs. Sections 4018 and 4020 establish a Special Inspector General and a Congressional Oversight Commission to monitor activities made pursuant to provisions in Title IV, and Section 4026 requires reports from the key agenciesânamely Treasury and the Fedâon their Title IV activities. The next two sections will focus on the financial assistance provisions granted to specified industries and for Fed programs. Congress chose to make direct Treasury support available to three specific industries (passenger and cargo airline industries, as well as certain national security businesses) that it deemed particularly in need of support. This assistance was unlikely to meet certain statutory requirements for a Fed program (i.e., that Fed assistance be broadly based and not for the purpose of avoiding bankruptcy), and it comes with more terms and conditions than assistance for recipients of Fed programs supported by the CARES Act. The Title IV support for these industries comes in three main forms: loans and loan guarantees, tax holidays for certain excise taxes, and payroll grants for air carrier workers. Section 4003 makes up to $46 billion available for federal loans and loan guarantees directly from Treasury to the aviation sector and to businesses critical to maintaining national security: not more than $25 billion for passenger air carriers, eligible businesses certified to perform inspection, repair, replace, or overhaul services, and ticket agents; not more than $4 billion for cargo air carriers; and not more than $17 billion for \"businesses critical to maintaining national security\"âa term that the act does not further define. On April 10, 2020, the Treasury Secretary released information on which types of firms would be eligible under this definition. The Treasury Secretary is required under Section 4006 to coordinate with the Transportation Secretary to make these loans. Other terms and conditions applying to this assistance are discussed in \" Terms and Conditions ,\" below. Section 4007 institutes a tax holiday under which no excise taxes will be imposed for the transportation of persons, the transportation of property (cargo), and aviation fuel after the date of enactment through calendar year 2020. These include a variety of taxes on airline passenger ticket sales, segment fees, air cargo fees, and aviation fuel taxes paid by both commercial and general aviation aircraft. They have been the primary revenue sources for the federal Airport and Airways Trust Fund. Section 4120 appropriates $32 billion to assist aviation workers. From this amount, Section 4112 allows the Treasury Secretary to provide up to $25 billion for passenger air carriers, up to $4 billion for cargo air carriers, and up to $3 billion for contractors who provide ground servicesâsuch as catering services or on-airport functionsâdirectly to air carriers. All such assistance must be used exclusively for continuing the payment of employee wages, salaries, and benefits. Section 4117 gives the Treasury Secretary discretion to determine what compensation to seek for this assistance. Treasury announced it would not seek compensation from recipients receiving less than a minimum amount under the program. The Treasury Secretary is required to coordinate with the Transportation Secretary in implementing the relief for aviation workers. Section 4113 indicates that eligible airlines or contractors would receive an amount equal to their 2019 second- and third-quarter (from April 1, 2019, through September 30, 2019) salaries and benefits. The law required the Treasury Secretary to publish streamlined and expedited procedures no later than 5 days from the enactment date and to make initial payments within 10 days from enactment to air carriers and contractors whose requests for such assistance are approved. If it were determined that the aggregate amount of eligible financial assistance exceeds the amount available, the Treasury Secretary would provide the available aid on a pro rata basis. On April 20, 2020, Treasury announced that airlines representing 95% of U.S. capacity were participating in the Payroll Support Program. On April 25, 2020, Treasury announced that 93 air carriers had received $12.4 billion to date. The Federal Reserve, as the nation's central bank, was created as a \"lender of last resort\" to the banking system when private sources of liquidity become unavailable. This role is minimal in normal conditions but has been important in periods of financial instability, such as the 2007-2009 financial crisis. Less frequently throughout its history, the Fed has also provided liquidity to firms that were not banks. In the financial crisis, the Fed created a series of temporary facilities to lend to or purchase securities of nonbank financial firms and markets under emergency authority found in Section 13(3) of the Federal Reserve Act (12 U.S.C. Â§343). It has begun to do so again in response to COVID-19, even before enactment of the CARES Act. Although the CARES Act does not preclude the Fed from independently responding to COVID-19 using its own funds, it is left to the Treasury Secretary to decide whether and how much of the CARES Act funds to provide to the Fed and on what general terms. After deducting assistance provided to the three specified industries, the remainder of the $500 billionâat least $454 billionâis available for Treasury to make loans, loan guarantees, or investments in programs or facilities established by the Fed to \"provid(e) liquidity to the financial system that supports lending to eligible businesses, states, or municipalities.\" As noted in the \" Financial Assistance in Division A, Title IV \" section, eligible businesses and states are defined by the act. The Fed's facilities may make loans, purchase newly issued obligations (e.g., debt securities) directly from issuers in primary markets, or purchase seasoned obligations from investors in secondary markets. The act provides Treasury and the Fed broad discretion on how to structure these programs or facilities. (Terms and conditions applying to this assistance are discussed in the section titled \" Terms and Conditions .\") Theoretically, the transactions could be structured in many different ways. In practice, Treasury has used CARES Act funding to make equity investments in Fed facilities, presumably as a backstop to cover any future losses, as described below. Before enactment of P.L. 116-136 , Treasury had already made equity investments through the ESF in Fed emergency programs created in response to COVID-19. Because the CARES Act appropriated $500 billion to the ESF, these Fed programs are now, in effect, backed by CARES Act funding. The programs are the following: Commercial Paper Funding Facility (CPFF). The CPFF purchases newly-issued commercial paper from all types of U.S. issuers who cannot find private sector buyers. Commercial paper is short-term debt issued by financial firms (including banks), nonfinancial firms, and \"asset backed\" pass-through entities that purchase loans. Money Market Fund Liquidity Facility (MMLF ). The MMLF makes nonrecourse loans to financial institutions to purchase assets that money market funds are selling to meet redemptions. This reduces the probability of runs on money market funds caused by a fund's inability to liquidate assets. Primary Market Corporate Credit Facility (PMCCF ) and Secondary Market Corporate Credit Facility (SMCCF) . The Fed created two new facilities to support corporate bond marketsâthe PMCCF to purchase newly-issued corporate debt from issuers and the SMCCF to purchase existing corporate debt or corporate debt exchange-traded funds on secondary markets. The issuer must have material operations in the United States and cannot receive direct federal financial assistance related to COVID-19. Term Asset-Backed Securities Loan Facility (TALF). The TALF makes nonrecourse, three-year loans to private investors to purchase newly-issued, highly-rated asset-backed securities (ABS) backed by various nonmortgage loans. Eligible ABS include those backed by certain auto loans, student loans, credit card receivables, equipment loans, floorplan loans, insurance premium finance loans, small business loans guaranteed by the Small Business Administration (SBA), or servicing advance receivables. Main Street Lending Program (MSLP). The MSLP buys loans from depository institutions that are four-year loans to businesses with up to 10,000 employees or up to $2.5 billion in revenues. The loans to businesses would defer principal and interest repayment for one year, and the businesses would have to make a \"reasonable effort\" to retain employees. This program may be particularly attractive to businesses too large to qualify for SBA assistance. Municipal Liquidity Facility (MLF). The MLF purchases shorter-term state and municipal debt in response to higher yields and reduced liquidity in that market. The facility purchases only debt of states, larger counties (with at least 500,000 residents), and larger cities (with at least 250,000 residents). Some programs were announced with an overall size limit (see Table 1 ). During the 2008 financial crisis, however, actual activity typically did not match the announced size. These facilities extend the Fed's traditional \"lender of last resort\" role for banks to be the \"buyer of last resort\" for broad segments of financial markets that have become illiquid due to COVID-19 and \"lender of last resort\" for nonfinancial firms. To extend its traditional role, the Fed has used its Section 13(3) emergency lending authority. The Fed also used this authority to assist nonbank financial firms and markets in the 2008 financial crisis. The 2020 facilities go beyond the scope of the 2008 facilities by purchasing loans of nonfinancial businesses and debt of states and municipalities. In some programs, the Fed purchases securities in affected markets directly. In other programs, the Fed makes loans to financial institutions or investors to intervene in affected markets; these loans are typically made on attractive terms to incentivize activity, including by shifting the credit risk to the Fed. By law, the Fed must structure these facilities to avoid expected losses, and the facilities charge users interest and/or fees as compensation. To that end, Treasury has pledged ESF funds for each of these facilities to protect the Fed from future lossesâalthough these losses would still be borne by the federal government. The Treasury Secretary approved each facility. The loans and asset purchases of the facilities are funded by the Fed using its resources but are backed by the ESF in the event of losses. The MSLP and the MLF were created after the CARES Act's enactment; the other facilities predate the CARES Act. When the CARES Act directed $500 billion to the ESF, all of these programs, in effect, became backed by the CARES Act. Table 1 summarizes how much CARES Act funding has been pledged to each facility. In total, $215 billion has been pledged to date. There has been talk of how the Fed can \"leverage\" the CARES Act funding of $454 billion (or more) into greater amounts of assistance by combining it with the Fed's funds. Although the use of this term is more colloquial than technical from a financial perspective, Table 1 illustrates how this is accomplished. For example, the MLF is planned to purchase up to $500 billion of assets using $35 billion of CARES Act funding. As required by law, the Fed has issued reports to Congress describing the purpose and details of each facility. Total loans or asset purchases through the facilities are published weekly as part of the Fed's balance sheet. The Fed also announced that it would publicly report on transactions under CARES Act 13(3) facilities at least every 30 days. Details of the report are to include, \"names and details of participants in each facility; amounts borrowed and interest rate charged; and overall costs, revenues, and fees for each facility.\" In the past, the Fed has provided details on emergency facilities' activities in quarterly reports. The act envisions the Fed using CARES Act funding to help two broad groups that had not been the targets of Fed emergency lending programs up to that point: (1) states (as defined by the act) and municipalities; and (2) medium-sized businesses , defined as those with between 500-10,000 employees, including nonfinancial businesses. The Fed has not lent to or purchased the securities of nonfinancial businesses and states and municipalities since the 1930s. \"Medium-sized\" businesses may be too small to issue publicly-traded debt securities that the Fed is purchasing through the PMCCF and SMCCF and too large to qualify for SBA assistance provided by the CARES Act. The act encourages, but does not require, the Fed to work with the Treasury Secretary to create programs assisting these two groups and does not limit Fed assistance to these two groups only. In particular, Section 4003 presents a detailed proposal for assisting businesses with 500-10,000 employees. This proposal is not required by the act, but the Treasury Secretary \"shall endeavor to seek the implementation of\" a Fed facility that provides financing to banks and other lenders to make direct loans to U.S. \"eligible businesses\" (as defined) and nonprofits at an interest rate not higher than 2% and with no principal or interest due for six months to retain their workforces. There are a series of restrictions on the borrower. The intended recipient (businesses with up to 10,000 employees) and purpose (to maintain employment) of the proposed facility are similar to the Fed's MSLP (described above), which was formally announced on April 9, 2020, but was publicly discussed before enactment of the CARES Act. However, the terms differ. Section 4003 states that the medium-sized business proposal outlined does not preclude the Fed establishing the MSLP. Section 4003 sets forth a number of terms and conditions for the assistance provided. Some of these provisions apply broadly to both assistance extended to the Fed and the specified industries, and others apply only to specified industries. Table 2 compares and contrasts the various terms and conditions for each of these programs. In addition, there are oversight and reporting requirements associated with the assistance, which are detailed in the section titled \" Oversight Provisions .\" In an effort to ensure assistance is used to maintain employment levels and the ongoing viability of the recipient, Section 4003 loans and loan guarantees must satisfy several terms and conditions. To approve the loans, the Treasury Secretary must determine that other credit is not reasonably available to the applicant at the time of the transaction. The intended obligation must be prudently incurred by the borrower, and the loan must be sufficiently secured or made at a rate that reflects the risk of the loan or loan guaranteeâto the extent practicableâand not less than an interest rate based on market conditions for comparable obligations prevalent prior to the outbreak of COVID-19. The duration of the loan must be as short as practicableânot to exceed five years. Further, Treasury may not issue a loan or loan guarantee unless it receives warrants, senior debt, or equity in the borrower. Additional terms and conditions apply to the loan or loan guarantee recipient. The agreement must provide that neither the borrower nor any affiliate may engage in stock buybacks, unless contractually obligated to do so, or pay dividends until 12 months after the date the loan is no longer outstanding. Until September 30, 2020, the borrower must maintain its employment levels as of March 24, 2020, to the extent practicable, and may not reduce its employment levels by more than 10% from the levels on that date. The borrower must certify that it is a U.S.-domiciled business with significant operations in and a majority of its employees based in the United States. The borrower must have incurred or must expect to incur covered losses such that the continued operations of the business are or would be jeopardized, as determined by the Treasury Secretary. Section 4004 states that Treasury may enter into an agreement to make a loan only if the borrower agrees to specified limitations on the compensation and severance pay of executives and employees whose total compensation exceeded $425,000 in calendar year 2019. Total compensation, as defined in the act, is capped at the individual's 2019 compensation level, or if compensation exceeds $3 million, it is also capped at $3 million plus 50% of the 2019 compensation level above $3 million. Further, severance pay for those individuals is capped at twice the individual's 2019 compensation level. Section 4005 establishes an air carrier's service obligation. It requires an air carrier receiving financial assistance under the act to maintain scheduled air transportation service, as the Transportation Secretary deems necessary, to ensure services to any point served by that air carrier before March 1, 2020, taking into consideration the air transportation needs of small and remote communities and the needs of healthcare and pharmaceutical supply chains. Such authority and any requirements issued shall terminate on March 1, 2022. Section 4019 establishes that certain entities are ineligible to participate in Section 4003 transactions. An ineligible entity is a covered individual who owns a controlling interest in that entity (defined as \"not less than 20 percent, by vote or value, of the outstanding amount of any class of equity interest in an entity\"). Covered individuals are the President, the Vice President, an executive department head, a Member of Congress, or the spouse, child, or spouse of a child of any of those individuals. Section 4115 protects collective bargaining agreements for a period lasting from the time financial assistance is issued and ending on September 30, 2020. Terms and Conditions for Air Carrier Worker Support To be eligible for grants to cover employee salaries under Section 4113, an air carrier or contractor must agree to refrain from conducting involuntary furloughs or reducing pay rates and benefits until September 30, 2020; refrain from stock buybacks and dividends through September 30, 2021; comply with CARES Act provisions to protect collective bargaining agreements regarding pay or other terms of employment for a period lasting from the time financial assistance is issued and ending on September 30, 2020; and comply with limits on compensation of highly-paid employees, similar to those described above for airline loans, for a two-year period from March 24, 2020, to March 24, 2022. Additionally, the Transportation Secretary is authorized to require, to the extent practicable, that an air carrier receiving this support continue services to any point served by that carrier before March 1, 2020, considering factors similar to those described above for airline loans under Section 4005. To compensate the government for this assistance, Section 4117 provides that the Treasury Secretary may receive warrants, options, stock, and other financial instruments from recipients, as determined appropriate by the Secretary. (See the \" Air Carrier Worker Support \" section for more on Treasury's determination for receiving compensation.) Some, but fewer, of the terms and conditions and restrictions placed on the industry assistance also apply to the Fed. Fed assistance may go only to U.S. businesses (as defined), and the conflict of interest and reporting requirements also apply to the Fed. Restrictions on executive compensation and capital distributions (stock buybacks and dividends) do not apply to Fed programs unless the Fed is providing direct loans to recipients; in the case of the Fed programs, the Treasury Secretary may waive these requirements \"to protect the interests of the Federal Government.\" Likewise, requirements to provide the government with warrants or other forms of compensation do not apply to the Fed programs. As shown in Table 2 , fewer restrictions may have been placed on Fed programs than on the assistance to the three specified industries. Fewer restrictions may have been placed on Fed programs because of the Fed's independence from Congress and the Administration, and because most of the Fed programs are not intended to prevent recipients' imminent failure. In addition to the conditions and restrictions in the CARES Act, the Fed typically has extended assistance to nonbank entities under its emergency authority found in Section 13(3) of the Federal Reserve Act. This authority places a number of restrictions on the Fed's activities, many of which were added or augmented by the Dodd-Frank Act ( P.L. 111-203 ). For example, actions taken under Section 13(3) must be broadly based and \"for the purpose of providing liquidity to the financial system, and not to aid a failing financial company.\" Actions must also provide security (e.g., collateral) that is sufficient to protect the taxpayer and is based on sound risk management practices. Unlike financial firms, some entities impacted by COVID-19 may not have securities that can be posted as collateral. The CARES Act only states that \"any applicable requirements under section 13(3) ... shall apply\" to Fed programs created under the act. Nevertheless, after the enactment of the CARES Act, the Fed created the MSLP and MLF under Section 13(3). To provide oversight of Title IV, the CARES Act created a special inspector general, Congressional Oversight Commission, and various reporting requirements. Section 4018 establishes a Special Inspector General for Pandemic Recovery (SIGPR) within Treasury. The SIGPR is nominated by the President with the advice and consent of the Senate and may be removed from office in the manner prescribed in Section 3(b) of the Inspector General Act of 1978. The SIGPR is tasked with conducting audits and investigations of Treasury's activities pursuant to the CARES Act, including collecting and summarizing the following information regarding loans provided by Treasury: \"A description of the categories of the loans guarantees, and other investments made by the Secretary\"; \"A listing of eligible businesses receiving loan, loan guarantees, and other investments\" by category; An explanation and justification for each loan or loan guarantee; Biographical information about each person hired to manage or service the loans, loan guarantees, and other investments; and Financial information, including the total amount of each loan, loan guarantee, and other investment and the repayment status and any gains or losses. The SIGPR is empowered to hire staff, enter into contracts, and broadly exercise the same authority and status as inspectors general under the Inspector General Act of 1978. The SIGPR is required to report to the appropriate committees of Congress within 60 days of Senate confirmation, and quarterly thereafter, on the activities of the office over the preceding three months, including detailed information on Treasury loan programs. The SIGPR position terminates five years after the enactment of the CARES Act (i.e., March 27, 2025). From the $500 billion appropriated in Title IV, Section 4018 directs that $25 million shall be made available to the SIGPR as a nonexpiring appropriation. Section 4020 establishes a five-member Congressional Oversight Commission in the legislative branch. The commission is directed to oversee implementation of Subtitle A of Title IV by the federal government and to issue regular reports to Congress. The commission is directed to report to Congress \"not later than 30 days after the first exercise by the Secretary and the Board of Governors of the Federal Reserve System of the authority under this subtitle and every 30 days thereafter.\" Such reports must include (i) The use by the Secretary and the Board of Governors of the Federal Reserve System of authority under this subtitle, including with respect to the use of contracting authority and administration of the provisions of this subtitle. (ii) The impact of loans, loan guarantees, and investments made under this subtitle on the financial well-being of the people of the United States and the United States economy, financial markets, and financial institutions. (iii) The extent to which the information made available on transactions under this subtitle has contributed to market transparency. (iv) The effectiveness of loans, loan guarantees, and investments made under this subtitle of minimizing long-term costs to the taxpayers and maximizing the benefits for taxpayers. The commission is authorized to hold hearings and gather evidence, obtain data and other information from federal agencies upon request, hire staff, obtain the services of outside experts and consultants, request the detail of federal employees, and enter into contracts to discharge its duties. Members of the commission are to be appointed by the Speaker of the House, the Senate majority leader, the House minority leader, and the Senate minority leader. Appointed commissioners who are not federal employees are to be paid \"at a rate equal to the daily equivalent of the annual rate of basic pay for level I of the Executive Schedule for each day (including travel time) during which such member is engaged in the actual performance of duties vested in the Oversight Commission\" and reimbursed for travel expenses. For FY2020, Level I of the Executive Schedule is $219,200 annually. Funding for the commission's expenses is to be derived in equal amounts from the contingency fund of the Senate and an \"applicable\" account of the House. The Treasury Secretary and the Federal Reserve Board of Governors are instructed to \"promptly\" transfer funds to such accounts for the reimbursement of commission expenses. In addition to the establishment of the SIGPR and the Congressional Oversight Commission, Title IV requires the Treasury Secretary and the Fed Chair to issue reports, make disclosures, and provide testimony before congressional committees for a number of specified purposes. Collectively, these provisions require disclosure to Congress and the public of financial and other details on each transaction under Section 4003(b). These requirements are detailed in Table 3 . Over a decade ago, in the financial crisis and recession of 2007-2009, businesses and individuals in the United States and across the globe faced financial uncertainty unparalleled for a generation. Although the cause of the financial uncertainty differed greatly between the current circumstances as a consequence of Coronavirus Disease 2019 (COVID-19) and the financial crisis of 2007-2009, in each instance Congress has chosen to proactively assist in economic recovery. As the financial crisis reached near panic proportions in fall 2008, Congress created the $700 billion Troubled Asset Relief Program (TARP) through the enactment in October 2008 of the Emergency Economic Stabilization Act (EESA; P.L. 110-343 ). Subsequently, Congress passed the $787 billion American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ), which provided relief to certain parts of the economy. The CARES Act combines elements of both aforementioned acts. Title IV of the CARES Act, with its assistance for firms and support of Federal Reserve financial sector facilities, more closely resembles TARP; a summary of aspects of TARP that parallel Title IV will be the focus of this appendix. For a broader overview of the financial sector and industry assistance during the 2007-2009 financial crisis, please see CRS Report R43413, Costs of Government Interventions in Response to the Financial Crisis: A Retrospective , by Baird Webel and Marc Labonte. For a comparison of TARP and Title IV of the CARES Act, see Table A-1 . Implementation The EESA authorized the Treasury Secretary to either purchase or insure up to $700 billion in troubled assets owned by financial firms. The general concept was that by removing such assets from the financial system, confidence in counterparties would be restored, and the system could resume functioning. This authority granted in the EESA was broad. In particular, the definitions of both troubled assets and financial institutions allowed the Secretary wide latitude in deciding what assets might be purchased or guaranteed and what might qualify as a financial institution. In practice, most TARP funding was not used to purchase troubled assets, instead being dedicated to capital injections for financial institutions, loans to the auto industry, and assistance for homeowners at risk of foreclosure. In a limited number of cases, TARP and Federal Reserve funds were used together. The EESA was later amended to reduce the authorized amount to $475 billion, when it became clear that the amount used would not exceed this amount. Equity Compensation for Treasury Equity warrants in return for government assistance were specifically provided for in the TARP statute. The warrants were expected to provide a positive financial upside to the taxpayer if the private companies' fortunes improved as a result of the government assistance. Although resulting in positive returns for the government, the amount recouped through warrants ($9.58 billion) was less than through interest and dividends ($24.38 billion). The act did not specifically call for the government to receive large holdings of common stock. In several cases, however, the government ended up with large, sometimes controlling, equity positions in private companies. The government generally exercised little of the ownership control inherent in these large stakes. Common equity in companies was typically accepted in return for TARP assistance in order to strengthen the companies' capital positions. Such equity also provided a financial upside to the taxpayers when firms recovered, but it also had a potential downside when firms did not recover strongly. Termination Date The EESA granted the purchase authority for a maximum of two years from the date of enactment, meaning it expired on October 3, 2010. Commitments made under this authorization, however, could continue after this date, with no limit on how long assets purchased under TARP could be held by the government. At present, there continues to be funding disbursed under the housing assistance program and a small amount ($0.04 billion) of bank capital assistance outstanding. Limits on Compensation and Labor Reduction The EESA included limits on executive bonuses and golden parachutes and provided for possible compensation clawbacks. The EESA was later amended by ARRA to expand these limits and add additional corporate governance reforms, thus placing additional restrictions on participating banks in existing Capital Purchase Program contracts. The act amending the EESA also allowed for early repayment and withdrawal from the program without financial penalty. With the advent of more stringent requirements for TARP recipients, many banks began to repay, or attempt to repay, TARP funds. There was no employee retention requirement with TARP. Congressional Oversight The EESA included a number of oversight mechanisms and reporting requirements. Similar to the CARES Act, it created a TARP Congressional Oversight Panel. The TARP Oversight Panel was a five-member, independent entity established in the legislative branch, appointed by congressional leadership, and directed to submit regular reports to Congress. In exercising its duties, the TARP Congressional Oversight Panel issued 30 reports and held 26 hearings between December 2008 and March 2011, according to its final report. The panel employed a total of 46 staff, utilized 3 detailees, and expended approximately $10.7 million through April 3, 2011. The five-member panel was appointed by the House and Senate leadership. The EESA also required the Treasury Secretary to provide periodic updates to Congress, with both monthly overall reports and individual reports detailing \"all transactions\" made under TARP. The Comptroller General was specifically tasked with oversight responsibilities and regular audits, with the Secretary directed to provide appropriate facilities, funding, and access to records to facilitate this oversight. Special Inspector General The EESA created the Special Inspector General for TARP (SIGTARP) position with an initial $50 million in funding, which has been continued in annual appropriations since. The SIGTARP was provided similar powers and authorities as other inspectors general to conduct audits and investigations of TARP and issue quarterly reports until all assets held or insured by Treasury under TARP were disposed of. The SIGTARP issued its first report in 2010, with its latest report covering the last quarter of 2019. Congress appropriated $22 million in the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ) for the SIGTARP position in FY2020. Conflicts of Interest The EESA required the Secretary to issue regulations or guidelines to \"address, manage or prohibit\" conflicts of interest arising in TARP, including the purchase and management of assets and the selection of asset managers and post-employment restrictions. Minimizing Costs to Taxpayers The EESA directed the Secretary to minimize the negative impact on taxpayers, including both direct and long-term costs and benefits. Market mechanism and private sector participation in operating the program were encouraged. The terms and conditions of Treasury asset purchases were to be designed to provide recompense to the taxpayer, including participation in the equity appreciation of a firm following Treasury asset purchases.", "summary": "The Coronavirus Aid, Relief, and Economic Security Act (CARES Act; H.R. 748 ) was signed into law as P.L. 116-136 on March 27, 2020, to assist those affected by the economic impact of Coronavirus Disease 2019 (COVID-19). This assistance is targeted to consumers, businesses, and the financial services sector. A key part of this assistance is provided to eligible businesses, states, and municipalities in Division A, Title IV of the CARES Act. Title IV allocates $500 billion to the Treasury Department (through the Exchange Stabilization Fund) to make loans and guarantees for three specified industriesâpassenger airlines, cargo airlines, and businesses critical to national securityâand to support Federal Reserve lending facilities. Some have characterized this as a \"bailout\" of private industry; others assert it is necessary to avoid employment losses and maintain economic stability. Of the $500 billion, Treasury can make up to $25 billion available to passenger airlines, up to $4 billion to cargo airlines, and up to $17 billion to businesses critical to maintaining national security. Treasury can make the remainderâup to $454 billion, plus whatever is not used to assist the specified industriesâavailable to the Federal Reserve. The authority to enter into new transactions terminates on December 31, 2020. Recipients are legally required to repay assistance with interest, although the ultimate subsidy involved will not be known until terms, such as interest rates and fees, have been decided and it becomes clear to what extent firms are able to repay. Title IV also provides up to $32 billion to continue payment of employee wages, salaries, and benefits at airline-related industries. The Treasury Secretary has discretion to determine what compensation to seek for this assistance and has reportedly chosen not to seek compensation from smaller recipients. According to Treasury, 93 air carriers had received $12.4 billion under the Payroll Support Program as of April 25, 2020. Most funding under Title IV has been used to backstop a series of Federal Reserve emergency programs created in response to COVID-19. These programs assist affected businesses or markets by making loans or purchasing assets. To date, the Fed has created programs to support markets for commercial paper, corporate bonds, municipal bonds, and asset-backed securities, as well as a loan program to help businesses with under 10,000 employees or under $2.5 billion in revenues maintain employment. To date, $215 billion of CARES Act funding has been made available by the Treasury to reimburse the Federal Reserve for potential losses on any transactions in these programs. This assistance carries a number of terms and conditions. All funding faces certain conditions, such as limiting eligibility to U.S. businesses, as defined by the act, and following rules to avoid conflicts of interest. Firms receiving loans, loan guarantees, or grants directly from Treasury must maintain at least 90% of March 24, 2020, employment levels; face controls placed on share buybacks, dividends, and executive salaries; and must provide Treasury specific compensation (e.g., warrants or equity). In addition, Title IV establishes a special inspector general and a Congressional Oversight Commission to oversee the operations carried out under the title. Finally, the key agencies involved in providing this assistance (i.e., the Federal Reserve and Treasury) and the Government Accountability Office must make available to the public and Congress a series of reports on operations under Title IV of the act.", "document_type": "crs"}
{"report": "F ollowing his resignation as President, Richard Nixon wanted to destroy recordings created in the White House that, among other things, documented actions he and others took in response to investigations connected to a burglary in the Watergate building and his reelection campaign. Under policy at the time, presidential materials were considered the President's private property. In response, Congress passed a number of laws to preserve the integrity of documents and other information related to Nixon's presidency and made those laws applicable to all future presidencies. Enacted in 1978, the Presidential Records Act (PRA; 44 U.S.C. Â§Â§2201-2207) established public ownership of records created by Presidents and their staff in the course of discharging their official duties. The PRA additionally established procedures for congressional and public access to presidential and vice presidential information and the preservation and public availability of such records at the conclusion of a presidency. This report provides context on the institutions involved in presidential recordkeeping, explains what is and is not considered to be a presidential record, and identifies recordkeeping responsibilities and access policies during and after a presidency. The report concludes with information and policy options for congressional oversight and enforcement of the PRA with respect to electronic records provisions under the Presidential and Federal Records Act Amendments of 2014. While the PRA provides similar provisions for records created by the Vice President, this report focuses on presidential records. Also, information on the Federal Records Act (FRA), more broadly, is available in CRS Reports CRS Report R43072, Common Questions About Federal Records and Related Agency Requirements , by Meghan M. Stuessy and CRS In Focus IF11119, Federal Records: Types and Treatments , by Meghan M. Stuessy. The PRA governs the records of the President, Vice President, and certain components of the Executive Office of the President (EOP). The PRA specifies roles and responsibilities for the management and enforcement of presidential records policy to the President, the National Archives and Records Administration (NARA), and the Department of Justice (DOJ). The PRA requires the President to take \"all such steps as may be necessary to assure that the activities, deliberations, decisions, and policies that reflect the performance of the President's constitutional, statutory, or other official or ceremonial duties are adequately documented.\" The President is further directed to implement records management controls to accomplish these ends and may consult NARA and DOJ on how to best comply with the statute. NARA preserves selected government records, oversees recordkeeping throughout the government, and makes government records publicly available pursuant to the PRA and other authorities. NARA provides advice and assistance to the White House on records management practices upon request, throughout a presidential transition and a presidency, and to former Presidents. The PRA details which presidential records and materials NARA is to assume responsibility for at the conclusion of a President's Administration. The PRA requires the head of NARA, the Archivist of the United States, to consult with Congress and particular congressional committees on requests for the disposal of such records deemed to be of special congressional interest. DOJ provides guidance to the executive branch on how to comply with the legal requirements of government information policy, of which records maintenance policy, including presidential records, is a part. Additionally, the Archivist and the Attorney General jointly investigate the unlawful removal or destruction of government and presidential records. The PRA defines presidential records as documentary materials, or any reasonably segregable portion thereof, created or received by the President, the President's immediate staff, or a unit or individual of the Executive Office of the President whose function is to advise or assist the President, in the course of conducting activities which relate to or have an effect upon the carrying out of the constitutional, statutory, or other official or ceremonial duties of the President. Such termâ (A) includes any documentary materials relating to the political activities of the President or members of the President's staff, but only if such activities relate to or have a direct effect upon the carrying out of constitutional, statutory, or other official or ceremonial duties of the President. This definition of presidential records is distinct from federal records and excludes a President's personal records. Unlike federal records, which may be considered temporary or permanent records depending on their content, all presidential records are considered permanent records due to their permanent value and, as a result, should be maintained in perpetuity by the federal government, subject to some limitations described below. A President's personal recordsâidentified in the PRA as documents \"of a purely private or nonpublic character\"âare excluded from preservation requirements. As a result of the Presidential and Federal Records Act Amendments of 2014, all government records (both presidential and federal) are assessed for preservation not by the media used to store the information but rather by the content of the information itself. In the PRA's case, documentary materials , of which presidential records are a part, includes \"all books, correspondence, memoranda, documents, papers, pamphlets, works of art, models, pictures, photographs, plats, maps, films, and motion pictures, including, but not limited to, audio and visual records, or other electronic or mechanical recordations, whether in analog, digital, or any other form.\" If the content of any documentary material meets the criteria of a presidential record, the information must be preserved according to the PRA regardless of the information's format. Presidential records are additionally protected and restricted from public consumption for a set period of time. Because of these additional restrictions on presidential records versus federal records, it is important to identify which organizations within the EOP create presidential records instead of federal records. Additionally, the time during a President's life in which the documents are created may help differentiate between personal, private records and presidential records. As defined in statute, the President and the President's immediate staff create presidential records. However, certain EOP components create presidential records, while others create federal records. The difference in statutory application between these components may have implications for access to their records. According to NARA, EOP components considered to \"solely advise and assist the President\" and therefore create presidential records include: The White House Office, The Office of the Vice President, The Office of Policy Development, The Council of Economic Advisors, The National Security Council, The President's Foreign Intelligence Advisory Board, The President's Intelligence Oversight Board, The National Economic Council, and The Office of Administration. Conversely, NARA has identified EOP components that create federal records and not presidential records as follows: The Office of Management and Budget, The Office of the United States Trade Representative, The Council on Environmental Quality, The Office of Science and Technology Policy, and The Office of National Drug Control Policy. The PRA distinguishes between a President's personal records and presidential records. Personal records of a purely private or nonpublic character include such things as diaries or journals but also include (1) materials relating exclusively to the President's own election and to the election of a particular individual or individuals to federal, state, or local office that \"have no relation to or direct effect upon the carrying out of constitutional, statutory, or other official or ceremonial duties of the President;\" and (2) materials relating to private political associations. Because personal records are not presidential records, they are not subject to the same materials retention or access requirements. Records created by the President-elect and his transition team prior to inauguration are considered personal records. However, NARA notes, \"To the extent that these records are received and used after the inauguration by the incoming Presidential Administration, they may become Presidential or Federal records. Former Presidents have traditionally donated these personal transition records to [NARA] for deposit in their Presidential Library.\" During the 2016 election cycle, NARA issued additional guidance relating to President-elect transition team materials where it specified how the PRA would govern such materials. As the statute makes clear, materials relating to the President's own election (e.g., campaign materials) are not considered presidential records. Similarly, transition team materials are considered personal and private, not presidential records. In instances where the transition team receives briefing materials from a federal agency, however, the briefing materials are considered federal records of the briefing agency and maintained accordingly. While statute allows for materials relating to campaign events and private political associations to be considered personal records so long as the materials have no relation to or direct effect upon the carrying out of the President's various duties, critically, the President has a high degree of discretion over what materials are to be preserved under the PRA. NARA does not have direct oversight authority over the White House records program as it does over federal agencies' records programs. Instead, NARA \"provides advice and assistance to the White House on records management practices upon request,\" which would appear to give the President discretion over which materials might be included under the PRA. As noted previously, whether these records are classified as presidential or personal records affects public and congressional access to such materials. For example, the PRA does not provide an access mechanism for personal records. In the event of potentially unlawful removal or destruction of government records, Title 44, Section 3106, of the U.S. Code requires the head of a federal agency to notify the Archivist, who initiates action with the Attorney General for the possible recovery of such records. The Archivist is not authorized to independently investigate removal or recover records. Policies concerning the custody of presidential materials informs the way such information is controlled, accessed, and released during and after a President's time in office. Prior to the PRA's enactment, presidential papers were traditionally the private property of the President, who would then donate the materials to institutions for public consumption. The PRA fundamentally changed the status of presidential records as publicly owned materials. The PRA is explicit: \"The United States shall reserve and retain complete ownership, possession, and control of Presidential records; and such records shall be administered in accordance with the provisions of this chapter.\" In passing the PRA, Congress required that \"public access to the materials would be consistent under standards fixed in law.\" The PRA provides records maintenance requirements and permissions depending on whether a presidency is in progress or has concluded. During a presidency, the incumbent President is exclusively responsible for custody, control, and access to presidential records, and the Archivist may maintain and preserve the records on behalf of the President. While the PRA establishes the President's responsibility, NARA notes that the agency is available for the President to consult with regarding records management practices upon request, although the PRA does not require such a consultation. An incumbent President also has authority under the PRA to seek the disposal of records, which routinely occurs with temporary records under the Federal Records Act. All presidential records are initially considered permanent records, but the PRA provides a process for the incumbent President to seek a change in the disposal schedule of the President's own records by obtaining the Archivist's written approval. Additionally, such presidential records may be disposed of if the President submits copies of the intended disposal schedule to (a) the Senate Committee on Rules and Administration and the Senate Committee on Homeland Security and Governmental Affairs, and (b) the House Committee on Oversight and Government Reform (now the House Committee on Oversight and Reform) and the House Committee on Government Operations (now the House Subcommittee on Government Operations) at least 60 calendar days before the proposed disposal date. If the Archivist considers the identified records in the President's proposed disposal schedule to be of special interest to Congress or that consultation with Congress is necessary to assess the disposal request, the Archivist shall request the advice of the listed committees. After a presidency, the responsibility for the custody, control, preservation of, and access to presidential records shifts to the Archivist. Additionally, statute requires the Archivist to make the former President's records publicly available as rapidly and as completely as possible. The PRA does not provide the former President with a process for disposing of presidential records after leaving office. In contrast to the disposal request process for incumbent Presidents, the Archivist may dispose of a former President's presidential records if they are deemed by the Archivist to have insufficient value to warrant their continued preservation. The Archivist must publish a notice in the Federal Register at least 60 days in advance of the proposed disposal date. Because the United States owns all presidential records, a former President must seek the Archivist's permission to display presidential records in a different facility, such as a presidential library. The Archivist is directed to deposit all of the former President's records in a presidential archival depository or another federal archival facility and is authorized to designate, after consultation with the former President, a director of the chosen facility who is responsible for the care and preservation of the records. Presidential libraries are not constructed using federal funds but are operated and maintained by NARA through its budget. The PRA does not establish automatic access for an incumbent President's records, which may be protected by executive privilege on a case-by-case basis. However, the PRA does statutorily narrow an outgoing President's ability to restrict records access. As the length of time between the conclusion of a presidency and the present day increases, presidential records become more accessible. Access to a former President's records is governed in terms of time passed since the conclusion of the presidency: Less than five years out, no public access is granted due to the Archivist's processing of the records. Between five and 12 years out, the Archivist determines PRA restrictions in accordance with Title 44, Section 2204, of the U.S. Code with the former President. After 12 years, these PRA restrictions no longer apply. The Freedom of Information Act (FOIA; 5 U.S.C. Â§552) governs the public release of government information, including presidential records. Throughout these time periods, FOIA exemptions (for example, information that is prohibited from disclosure by another federal law) may additionally restrict records access. However, records created by a former President are not subject to FOIA's (b)(5) deliberative process exemption (which incorporates the deliberative process, executive, and attorney-client privileges, among others). The PRA (44 U.S.C. Â§2204) permits the outgoing President to restrict access to six categories of presidential records for specified durations of time, not to exceed 12 years. The records categories for which a former President can restrict access include: 1. Records described in an executive order as in the interest of national defense or foreign policy or are otherwise classified documents, 2. Records relating to appointments to federal office, 3. Records specifically exempted from disclosure by statute, 4. Records that contain trade secrets and commercial or financial information, 5. Records of confidential communications requesting or submitting advice between the President and the President's advisers or between such advisers, and 6. Records of personnel and medical files whose disclosure would constitute an invasion of personal privacy. After the expiration of the 12-year period, under Executive Order 13489, incumbent and former Presidents must be notified of the Archivist's intent to disclose materials at least 30 days in advance of the release of the records. Prior to this release, incumbent and former Presidents may assert a claim of executive privilege over certain presidential records, thereby limiting public access. If an incumbent President invokes a claim of executive privilege over the release of a former President's records, the Attorney General and the Counsel to the President shall review and decide whether the invocation of executive privilege is justified. Similarly, if a former President invokes a claim of executive privilege, the current Archivist, Attorney General, and Counsel to the President are to confer and determine whether to honor the former President's claim of executive privilege. The incumbent President may extend the time period to withhold the records and is to provide a reason for the extension. Certain federal officials may access a former President's records within the 12-year time frame by gaining \"special access\" to presidential records. Per the PRA: [S]ubject to any rights, defenses, or privileges which the United States or any agency or person may invoke, Presidential records shall be made availableâ (A) pursuant to subpoena or other judicial process issued by a court of competent jurisdiction for the purposes of any civil or criminal investigation or proceeding; (B) to an incumbent President if such records contain information that is needed for the conduct of current business of the incumbent President's office and that is not otherwise available; and (C) to either House of Congress, or, to the extent of matter within its jurisdiction, to any committee or subcommittee thereof if such records contain information that is needed for the conduct of its business and that is not otherwise available. Observers have questioned what constitutes a House or Senate request for presidential records and who needs to make the request for the records for it to qualify under Section 2205(C). However, NARA explains that its \"longstanding and consistent practice has been to respond only to requests from the Chair of Congressional Committees, regardless of which political party is in power.\" This practice as a result of statutory ambiguity may impact the ability of minority party members or general committee members to gain access to presidential records. The PRA's effectiveness relies on its ability to be enforced, both in terms of accessing presidential records for oversight purposes through the mechanisms described in statute and in terms of maintaining the records themselves so that they may be accessed. In light of the Presidential and Federal Records Act Amendments of 2014 requirement to collect presidential records regardless of their media but based on their content, questions regarding the volume and the meaning of an electronic record's completeness are creating policy implications that may be suitable for congressional consideration. These matters may be of particular interest to Congress as it carries out its oversight activities and ensures that emerging formats of presidential records are effectively collected and controlled. The volume of presidential records has increased exponentially in the digital age, as indicated by reporting on the amount of such records at the conclusion of a presidency. According to NARA's 2009 Report on Alternative Models for Presidential Libraries , the Clinton Administration provided NARA 20 million presidential record emails at the conclusion of the President's eight-year tenure. The George W. Bush Administration provided 150 million email records after its eight-year tenureâmore than seven times the number of emails provided by the previous Administration. To date, the Barack Obama Presidential Library estimates that NARA has received 300 million emails, doubling the amount from the previous Administration. \"Huge volumes of electronic information\" are a \"major challenge\" in record management, according to the Government Accountability Office (GAO), and \"electronic information is increasingly being created in volumes that pose a significant technical challenge to our ability to organize it and make it accessible.\" NARA's ability to process the volume of presidential records is closely linked to information access issues. In its FY2020 congressional budget justification, NARA noted it has \"a significant backlog of unanswered [FOIA] requests at Presidential Libraries covered\" by the PRA in part because of the volume of records and the information restriction process: NARA must review all Presidential papers page-by-page, to identify and redact national security and other restricted information, which means it will take decades to make all of the records available to the public. Processing records in response to FOIA requests is even more time-consuming than processing the same number of pages in a systematic, archival fashion and does not produce discrete records collections that would be meaningful to the general public. Because of this increased volume, NARA's ability to keep pace with the explosion of records will be dependent on NARA's staffing, funding, and training levels. Any delay in NARA's processing of records may impact the ability of interested parties to access materials in a timely fashion, and NARA's ability to comply with the PRA's statutory directive to make records available as rapidly and completely as possible. The increasing use of electronic records also requires the institutions involved in presidential records oversight to ensure the record information's authenticity and completeness. The EOP and NARA need to ensure that record materials are appropriately protected from corruption or destruction, but these protections take on a different meaning in a digital, instead of analog, environment. Given the increase in presidential records, Congress may consider whether or not the presidential records institutions are able to consistently meet NARA directives, bearing in mind that while NARA supervises agency implementation of the FRA, NARA provides advice and assistance to the White House on records management practices upon request . NARA has provided guidance on including metadata elements in the collection of federal records under the FRA that the EOP may adopt as well. However, data on implementation is self-reported by agencies, and similar information is not required to be provided for presidential records on a routine basis. Last updated in 2005, NARA's guidance on identifying and maintaining trustworthy websites says that such records have the following characteristics: reliability: content is trusted as a full and accurate representation of transactions, activities, or facts; authenticity: proven to be what it purports to be; integrity: complete and unaltered; and usability: can be located, retrieved, presented, and interpreted. NARA's guidance suggests that agencies \"maintain the content, context, and sometimes the structure of\" their websites to ensure that their records are trustworthy. One instructive example is NARA's attempts to archive underlying documents and web materials on whitehouse.gov. While collecting records material appears to be a straightforward task, policy decisions such as when and what to collect impact the material's context (i.e., the circumstances that situate the material and give it meaning), usability, and completeness. Some accompanying digital information, such as who accessed the information or reviewed the document, may not be available without holistic preservation. For example, NARA acknowledges that it does not archive the user interface of the White House website, but it has attempted to \"freeze\" an approximation of the website as it appeared at the conclusion of a presidency and not at various points during an Administration. Further, NARA notes, \"These 'frozen in time' sites are representations of the original websites and approximate the interface and functionality for easy access by the public. These websites are no longer updated so links to external websites and some internal pages will not work.\" Such decisions may have implications on the type of information available to future researchers, federal agencies, and Congress.", "summary": "Presidential records provide Congress, members of the public, and researchers with documentation, context, and explanations for presidential actions. The Presidential Records Act (PRA; 44 U.S.C. Â§Â§2201-2207) set forth requirements regarding the maintenance, access, and preservation of presidential and vice presidential information during and after a presidency. This report describes the institutions involved in presidential recordkeeping, explains what is and is not considered a presidential record, and identifies recordkeeping responsibilities and access policies during and after a presidency. The report concludes with information and policy options for congressional oversight and enforcement of the PRA with respect to electronic records provisions under the Presidential and Federal Records Act Amendments of 2014. Prior to the PRA, records were considered the President's private property. Now, the PRA states that presidential records are the property of the United States. Under the PRA, the President may request advice and assistance from the National Archives and Records Administration (NARA) regarding records management practices, and the Archivist of the United States (the head of NARA) plays an important role in the maintenance and access of a former President's records. The PRA does not establish automatic access to an incumbent President's records, which may be protected by executive privilege on a case-by-case basis. However, the PRA does statutorily narrow an incumbent President's ability to restrict records access as the Administration draws to a close. As the length of time between the conclusion of a presidency and the present day increases, presidential records become more accessible. Access to a former President's records is governed in terms of time passed since the conclusion of the presidency: Less than five years out, no public access is granted due to the Archivist's processing of the records. Between five and 12 years out, the Archivist determines PRA restrictions with the former President in accordance with Title 44, Section 2204, of the U.S. Code . After 12 years, these PRA restrictions no longer apply. Certain federal officials may access a former President's records within the 12-year time frame by gaining \"special access\" to presidential records. The PRA permits either house of Congress, committees, or subcommittees requesting information for chamber or committee business to be granted special access to the former President's records. In practice, observers have questioned what constitutes a House or Senate request for presidential records and who needs to make the request to qualify under the PRA. This statutory ambiguity may impact the ability of minority party members and general committee members to gain access to presidential records. As a result of the Presidential and Federal Records Act Amendments of 2014, presidential records are assessed for preservation not by the media used to store the information but rather by the content of the information itself. Questions regarding the volume and completeness of records may be suitable for congressional consideration. Any delay in NARA's processing of records will directly impact timely access to those records and the ability of NARA to comply with the PRA's statutory directive to make records available as rapidly and completely as possible.", "document_type": "crs"}
{"report": "The child nutrition programs (listed in Table 1 ) support meals and snacks served to children in schools, child care, summer programs, and other institutional settings in all 50 states, the District of Columbia, and the U.S. territories. The programs are administered by the U.S. Department of Agriculture's (USDA's) Food and Nutrition Service (FNS), which provides federal aid to state agencies (often state departments of education) for distribution to school districts and other participating institutions. In general, the largest subsidies are provided for free and reduced-price meals served to eligible children. The institutional nature of child nutrition programs distinguishes them from other federal nutrition assistance programs, such as the Supplemental Nutrition Assistance Program (SNAP) and the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC), which provide benefits directly to households. WIC is typically reauthorized with the child nutrition programs but is not considered a child nutrition program and is not discussed in this report. The federal child nutrition programs date back to the National School Lunch Act of 1946, which created NSLP. The act formalized federal support for school lunches following early federal aid beginning in the 1930s. Other child nutrition programs were added in the decades to follow as policymakers expanded feeding programs beyond the school setting. The Child Nutrition Act of 1966 formalized SMP and created SBP as a pilot program. Soon after, a program for child care and summer meals was piloted in 1968 and separated into the Child Care Food Program (now CACFP) and SFSP in 1975. More recently, FFVP was piloted in 2002 and expanded to all states in 2008. (See the Appendix for a brief legislative history of child nutrition programs.) Historically, the child nutrition programs have been aimed at both improving children's nutrition and supporting U.S. agriculture, with the dual missions \"to safeguard the health and well-being of the Nation's children and to encourage the domestic consumption of nutritious agricultural commodities and other food.\" The child nutrition programs are currently authorized under the Richard B. Russell National School Lunch Act (NSLA) and the Child Nutrition Act of 1966. Section 32 of the Act of August 24, 1935, also provides a portion of child nutrition funding. Congressional jurisdiction over the underlying three laws has typically been exercised by the Senate Agriculture, Nutrition, and Forestry Committee, the House Education and Labor Committee, and, to a limited extent (relating to Section 32), the House Agriculture Committee. Congress periodically amends the child nutrition programs' authorizing laws and reauthorizes expiring authorities. The child nutrition programs were most recently reauthorized by the Healthy, Hunger-Free Kids Act of 2010 (HHFKA, P.L. 111-296 ). Some of the authorities created or extended in the HHFKA expired on September 30, 2015; however, these expirations have had a minimal impact on program operations. The 114 th Congress began but did not complete a 2016 child nutrition reauthorization, and there was no significant reauthorization activity in the 115 th Congress. In the 116 th Congress, leadership on the committees of jurisdiction have announced plans to work on child nutrition reauthorization. This report starts with an overview of child nutrition programs' funding and then provides detail on each program, including a discussion of how the programs are administered at the federal, state, and local levels; eligibility rules for institutions and participants; nutritional and other program requirements; and recent policy changes. Most funding for child nutrition programs is considered mandatory spending. However, unlike some mandatory programs, child nutrition programs require an appropriation of funding. This is because the programs' authorizing laws include benefit and eligibility criteria that create the requirement for a certain level of spending, but the statute does not provide the funding directly. Such programs are sometimes referred to as \"appropriated entitlements\" or \"appropriated mandatories.\" If the necessary funds are not appropriated, entitled recipients (e.g., states, institutions, and participants) may have legal recourse. The benefit and eligibility criteria that governs much of the appropriated mandatory spending for child nutrition programs is open-ended. Because there is no specified limit on the number of beneficiaries or the total amount of benefits that will be paid, spending will fluctuate based on the number of meals and snacks served in the programs, as well as statutorily set, annually adjusted per-meal reimbursement rates. Congress typically considers USDA's forecast for program needs in its appropriations decisions. Appropriated mandatory funding in child nutrition programs is generally for per-meal cash reimbursements, commodity assistance, and administrative funds. The programs also have a smaller amount of discretionary funding (provided in annual appropriations acts) and mandatory funding directly provided in the authorizing law (not provided in annual appropriations acts). These funding streams are discussed in further detail below. Child nutrition appropriations totaled $23.6 billion in FY2020 ( P.L. 116-94 ). Close to $13.5 billion of these funds were transferred to the child nutrition programs from Section 32 of the Act of August 24, 1935. Table 2 lists FY2020 child nutrition funding by program and activity. Child nutrition appropriations may not match expenditures because most child nutrition funds carry over (they are available for two fiscal years) and because spending fluctuates with the number of meals served. The majority of federal funding in child nutrition programs (including in NSLP, SBP, CACFP, SFSP, and SMP) takes the form of per-meal cash reimbursements. These rates are specified in the programs' authorizing laws with an annual inflation adjustment. Although all (including full-price) meals/snacks served by participating providers are subsidized, those served for free or at a reduced price to lower-income children earn higher rates. Meals must meet federal nutritional requirements in order for the school or institution to receive reimbursement. Reimbursement rates differ by program based on different criteria. For example, in SBP, schools in high-poverty areas receive an extra 36 cents per meal. Differences in reimbursement rates are highlighted within the subsequent discussions of each program. In general, FNS distributes per-meal reimbursements to state agencies, which distribute them to participating schools and institutions. Schools and institutions must record daily counts of meals in each category and report monthly counts to the state agency in order to receive reimbursement. Once they receive federal funds, participating institutions are allowed to spend these funds on most aspects of their food service operations. Table 3 provides an example of the per-lunch reimbursement rate for schools and the per-child benefit in NSLP. Reimbursement rates for each child nutrition program are listed in the sections to follow. Federal support for child nutrition programs is also provided in the form of USDA-purchased commodity foods (\"USDA Foods\") and some cash in lieu of commodities. USDA Foods are foods purchased by USDA for distribution to federal nutrition assistance programs, including child nutrition programs. States, schools, and other institutions are entitled to a certain amount of commodity assistance under the law, referred to as \"entitlement commodity\" assistance. In NSLP and CACFP, statute provides a per-meal commodity reimbursement (an inflation-adjusted rate of 23.75 cents per meal in school year 2019-2020). (Note: Commodity assistance is not a formal part of SBP funding; however, commodities distributed through NSLP may be used for school breakfasts.) A smaller amount of commodity assistance is also provided to certain types of institutions participating in SFSP. Schools and institutions use entitlement commodity funds to select commodities from a USDA Foods catalog. USDA then purchases the commodities and works with a state distribution agency to distribute the foods to schools. Schools/institutions and state agencies can elect to receive a certain amount of commodity assistance in the form of cash, as the majority of CACFP centers do. According to statute, entitlement commodity assistance must equal at least 12% of the total funding provided for lunch reimbursements and child nutrition commodities. Child nutrition entitlement commodity expenditures totaled nearly $1.5 billion in FY2019. Most of this assistance was for NSLP. The child nutrition programs can also receive \"bonus commodities,\" which are commodities that are purchased at USDA's discretion throughout the year to support the agricultural economy using separate budget authority. In recent years, there have been few bonus commodities distributed to the child nutrition programs; however, there was an uptick in FY2019. State agencies receive federal funds for expenses related to the administration of child nutrition programs. According to statute, federal funding for states' administrative expenses must equal at least 1.5% of federal expenditures on NSLP, SBP, CACFP, and SMP in the second preceding fiscal year. The majority of these funds are allocated to states based on their share of spending on the four programs. Any remaining funds are allocated by the Secretary of Agriculture on a discretionary basis; per program regulations, states receive additional amounts for CACFP, commodity distribution, and administrative reviews of schools/institutions. Once states receive administrative funds, they can apportion them among child nutrition programs and activities as they see fit. In addition, states receive separate administrative payments through SFSP that equal at least 2.5% of their summer meal aid. States may also retain a portion of FFVP aid for their administrative expenses. At the local level, schools and institutions may use per-meal reimbursements to cover their administrative costs. In CACFP, institutions that oversee day care homes receive separate monthly payments for administrative expenses based on the number of day care homes under their jurisdiction. A few child nutrition programs and activities have mandatory funding provided directly in the authorizing law. For example, FFVP receives mandatory funding from Section 32 and the Farm to School Grant Program receives mandatory funding under the NSLA. There are also a few child nutrition activities that are funded on a discretionary basis, including the Summer EBT demonstration, the Team Nutrition initiative, and school meals equipment grants. Federal subsidies do not necessarily cover the full cost of meals and snacks prepared by schools and institutions. Child nutrition programs may also receive funds from participants, states, school districts, local governments, and other entities. NSLP is the only child nutrition program with a cost sharing requirement for states, which amounts to a contribution of roughly $200 million from all states combined annually. Some states provide additional funding for NSLP and other child nutrition programs beyond the required amount, including some states that provide their own per-meal reimbursements. An FNS study of the school meals programs in school year 2014-2015 found that 63% of school food service revenues came from federal funds, 30% came from student payments for paid and reduced-price meals and other school foods, and 6% came from state and local funds. The National School Lunch Program (NSLP) and School Breakfast Program (SBP) (the \"school meals programs\") provide federal support for meals served in approximately 94,300 public and private elementary and secondary schools nationwide in FY2019. They also support meals in a smaller number of residential child care institutions. Schools receive federal aid in the form of cash reimbursements for every meal they serve that meets federal nutritional requirements (limited to one breakfast and lunch per child daily). The largest subsidies are provided for free and reduced-price meals served to eligible students based on income eligibility and categorical eligibility rules. Schools also receive a certain amount of commodity assistance per lunch served (discussed previously). Schools participating in NSLP have the option of providing afterschool snacks through the program, and schools participating in NSLP or SBP have the option of providing summer meals and snacks through the Seamless Summer Option (discussed in the \" After-School Meals and Snacks \" and \" Seamless Summer Option \" sections). Schools are not required by federal law to participate in NSLP or SBP; however, some states require schools to have a school lunch and/or breakfast program, and some states require schools to do so through NSLP and/or SBP. Some states also provide state funding for the school meals programs. Approximately 91% of public schools participate in NSLP. Schools that do not participate in the federal school meals programs may still operate locally funded meal programs. The Healthy, Hunger-Free Kids Act of 2010 (HHFKA; P.L. 111-296 ) made several changes to the school meals programs. Among those changes was a requirement that USDA update the nutrition standards for school meals and create new nutritional requirements for foods sold in NSLP and SBP schools within a certain timeframe. The law also created the Community Eligibility Provision, through which eligible schools can provide free meals to all students. These changes are discussed further within this section. NSLP and SBP are two separate programs, and schools can choose to operate one and not the other. The programs are discussed together in this report because they share many of the same requirements. Differences between the programs are noted where applicable. Figure 1 displays average daily participation in NSLP and SBP in participating schools. Participation in SBP tends to be lower for several reasons, including the traditionally required early arrival by students in order to receive a meal before school starts. Locally, the school meals programs are usually administered by school districts. Statute and regulations designate \"school food authorities\" as the local authorities in charge of operating the school meal programs; typically, these are food service departments within school districts. Local educational agenciesâthe broader school district or school boardâalso play a role in administering the school meal programs. This report sometimes uses the term \"school district\" to refer to the local administrative body of the school meals programs. In general, school food authorities handle food service and accounting responsibilities, such as food preparation and tracking meals for reimbursement, while local educational agencies handle administrative duties, such as processing applications and certifying children for free and reduced-price school meals. At the state level, the school meals programs are most often administered by state departments of education. State administrative agencies are responsible for distributing federal reimbursements to school food authorities and overseeing school districts' administration of the school meal programs, including by conducting administrative reviews of school districts. At the federal level, FNS provides ongoing guidance and technical assistance to state agencies and school food authorities through seven regional offices. FNS also provides oversight of state agencies, including by conducting management evaluations. Figure 2 depicts the federal, state, and local roles in administering the school meals programs. The school meals programs do not exclusively serve low-income children. Any student in an NSLP or SBP participating school may purchase a school meal; however, children must meet program eligibility rules in order to receive a free or reduced-price meal. In most schools (excluding schools that participate in the Community Eligibility Provision or other special options), children are certified for free or reduced-price school meals through one of two pathways: (1) income eligibility for free and reduced-price meals (information typically collected via household application) and (2) categorical eligibility for free meals (information collected via household application or direct certification). Each year, schools must verify a sample of household applications for accuracy. The pathways through which children are certified for free or reduced-price school meals are shown in Figure 3 . If children are certified for free meals, the school food authority (through the state agency) receives the free meal reimbursement for those meals. If children are certified for reduced-price meals, the school food authority receives a slightly lower reimbursement. School food authorities also receive a much smaller paid-rate reimbursement for meals served to children who pay for \"full price\" meals. School food authorities must follow federal guidelines in setting the price of paid meals. Certain schools follow different eligibility and reimbursement procedures because they participate in the Community Eligibility Provision (CEP) or other special options (discussed below in the \" Special Options \" section). Children are eligible for free or reduced-price meals if their household's income falls within the following ranges: Free meals: household income at or below 130% of the federal poverty guidelines. Reduced-price meals (charges of no more than 40 cents per lunch and 30 cents per breakfast): household income above 130% and less than or equal to 185% of the federal poverty guidelines. These thresholds are based on the annual federal poverty guidelines established by the U.S. Department of Health and Human Services, and are updated annually for inflation. FNS publishes the corresponding income limits by household size for free and reduced-price meals in the Federal Register on an annual basis. Table 4 provides an example of the income limits for free and reduced-price meals in school year 2019-2020 for a household of four. To become income eligible for school meals, a parent or guardian must complete a paper or online application that includes the income of each household member, the household size, and other information. Households only need to fill out one application if they have multiple children in the same school district. School district officials then determine if children in the household are eligible for free meals, reduced-price meals, or neither. As an alternative to income eligibility, children can become eligible for free school meals if they fall into a certain category (\"categorical eligibility\"). Per statute, children are automatically eligible for free lunches and breakfasts (without consideration of household income) if they are in a household receiving benefits through the following programs: SNAP (Supplemental Nutrition Assistance Program); FDPIR (Food Distribution Program on Indian Reservations, a program that operates in lieu of SNAP on some Indian reservations); or TANF (Temporary Assistance for Needy Families); enrolled in Head Start; in foster care; a migrant; a runaway; or homeless. Categorical eligibility for free meals may be determined via a household application (households provide a case number on the application) or through direct certification (discussed in the next section). As of school year 2014-2015, the vast majority of categorically eligible children were certified for free meals through direct certification. Categorical eligibility for free school meals with SNAP and TANF began in the 1980s (then, the Food Stamp and Aid to Families with Dependent Children programs, respectively). Categorical eligibility enabled schools to make use of other programs' more in-depth certification processes and reduced the number of applications that families had to fill out. Other programs and categories were added over time. Direct certification is a process through which state agencies and school districts automatically certify children for free meals based on documentation of the child's status in a program or category without the need for a household application. States are required to conduct direct certification for SNAP and have the option of conducting direct certification for the other programs and categories that convey categorical eligibility. For SNAP and other federal programs, the direct certification process typically involves state agencies (e.g., state SNAP and state educational agencies) cross-checking program rolls. A list of matched children is sent to the school district, which certifies children for free meals without the need for a household application. For foster, homeless, migrant, and runaway children, direct certification typically involves school district communication with a local or state official who can provide documentation of the child's status in one of these categories. The 2004 child nutrition reauthorization act ( P.L. 108-265 ) required states to conduct direct certification with SNAP, with nationwide implementation taking effect in school year 2008-2009. As of school year 2016-2017, USDA reported that 92% of children in SNAP households were directly certified for free school meals. The HHFKA made further policy changes to expand direct certification. One of those changes was the initiation of a demonstration project to test direct certification with Medicaid (see text box). The law also funded performance incentive grants for high-performing states and authorized corrective action plans for low-performing states in direct certification activities. Each fall, districts are required to verify a sample of approved household applications on file, with a focus on applications close to the eligibility threshold (\"error-prone\" applications). School districts may also conduct verification of questionable applications. Verification is not required for children who are directly certified for free or reduced-price meals. (Note that districts participating in \" Provisions 1, 2, and 3 \" must meet verification requirements for the years in which they administer household applications.) Many districts employ \"direct verification\" (matching data from other low-income programs) to conduct their verification activities, but if data cannot be verified in this way, schools must contact households to verify the information provided on the application. A child's eligibility status may stay the same or change (e.g., from free meals to reduced-price meals or loss of eligibility) as a result of verification of household income, or if the household does not respond to verification outreach (in which case eligibility would be lost, though that decision can be appealed). School food authorities must keep track of the daily number of meals they serve in each category (free, reduced-price, and paid) that meet federal nutrition requirements. School food authorities then submit claims for reimbursement to the state agency, which submits the claims to FNS. Approved reimbursements are distributed to school food authorities by the state agency, usually on a monthly basis. Per statute, reimbursement rates are adjusted for inflation annually. Table 5 shows NSLP and SBP reimbursement rates in school year 2019-2020. (Note that school food authorities also receive a per-lunch commodity reimbursement, discussed previously.) The law provides a higher reimbursement for meals meeting certain criteria. For example, school food authorities that are compliant with the updated federal nutrition standards for school meals receive an additional 7 cents per lunch. School food authorities also receive an additional 2 cents per lunch if they serve 60% or more of their lunches at a free or reduced price. For breakfasts, school food authorities receive higher reimbursements if they serve 40% or more lunches at a free or reduced price (referred to as \"severe need\" schools). Once school food authorities receive the cash reimbursements, they can be used to support almost any aspect of the school food service operation. However, federal cash reimbursements must go into a nonprofit school food service account that is subject to federal regulations. Payments for non-program foods (e.g., vending machine sales) must also accrue to the nonprofit school food service account. FNS periodically studies the costs of producing a reimbursable meal. In April 2019, FNS released a School Nutrition and Meal Cost Study , which found that the average reported cost of producing a reimbursable lunch was $3.81 in school year 2014-2015 (reported costs were defined as those charged to the school food service account). This exceeded the average federal cash reimbursement ($3.32) for lunches in school year 2014-2015. When unreported costs were included (costs outside of the food service account; for example, labor costs associated with processing applications), the cost of producing the average reimbursable lunch was $6.02. As noted previously, children's payments and state and local funds may also cover meal costs. The HHFKA authorized the Community Eligibility Provision (CEP), an option that allows eligible schools, groups of schools, and school districts to offer free meals to all enrolled students. To participate in CEP, the school(s) must have an identified student percentage (ISP) of at least 40%. The ISP is the percentage of students in the school(s) who are certified for free meals without a household application (i.e., who are directly certified for free meals through SNAP or another program/category). In addition, the school(s) must operate both NSLP and SBP in order to participate in CEP, and they must opt-in to CEP. Based on the statutory parameters, FNS piloted CEP in various states over three school years, and expanded the option nationwide in school year 2014-2015. Eligible schools, groups of schools, and entire school districts may participate; if participation is as a group, the ISP is calculated on a group basis. Local educational agencies have until June 30 of each year to notify USDA of the schools in their jurisdiction that will participate in CEP. According to a database maintained by the Food Research and Action Center, nearly 28,500 schools participated in CEP in school year 2018-2019, up from 18,220 schools in school year 2015-2016. Though CEP schools serve free meals to all students, they are not reimbursed at the free rate for every meal served. Instead, the law provides a funding formula: the ISP is multiplied by a factor of 1.6 to estimate the proportion of students who would be eligible for free or reduced-price meals had they been certified via application. The result is the percentage of meals served that will be reimbursed at the free-meal rate, with the remainder reimbursed at the much lower paid-meal rate. For example, if a CEP school has an ISP of 40%, then 64% of its meals served would be reimbursed at the free-meal rate and 36% would be reimbursed at the paid-meal rate. Schools that identify 62.5% or more students as eligible for free meals receive the free-meal reimbursement for all meals served (62.5% multiplied by 1.6 equals 100%). Figure 4 provides a visual representation of the CEP eligibility criteria and reimbursement formula. CEP participating schools must recalculate their ISP at least once every four years, but they can choose to do so more frequently if desired. While eligibility determinations occur every four years, schools can drop out of CEP at any time. CEP is intended to reduce paperwork for families and schools and enable schools to provide more free meals. However, the option may or may not be financially beneficial for schools depending on their proportion of identified students. Schools, groups of schools, and school districts can also use Provisions 1, 2, and 3 to establish alternative certification and reimbursement procedures. These options are intended to reduce paperwork for school administrators and families. The options predate CEP, and unlike CEP, they still require some household applications. A school's decision to participate in a special option may depend on financial considerations. Provision 1 allows schools with high proportions (80% or more) of students eligible for free and reduced-price meals to make free meal eligibility determinations that remain in effect for two school years. This reduces the number of applications they have to process (though they still have to process reduced-price meal applications annually). Provision 2 and Provision 3 are open to all schools. Similar to CEP, schools, groups of schools, or school districts must agree to provide free meals (lunches or lunches/breakfasts) to all students in order to participate in Provision 2 or Provision 3. Under Provision 2, schools are reimbursed over a four-year period using the proportion of meals served at a free/reduced-price/paid rate during the first year. Eligibility determinations in the first year are based on direct certification and household applications (a difference from CEP). Under Provision 3, schools are similarly required to make eligibility determinations in the first year of a four-year period. However, in this case, schools receive the same level of federal assistance over the next three years, which is adjusted for enrollment and inflation (there are no separate payments for free/reduced-price/paid meals). Nutritional requirements for school meals have changed throughout the history of the school meal programs. The most recent child nutrition reauthorization, the HHFKA in 2010, required USDA to update the nutrition standards for school meals within 18 months of the law's enactment based on recommendations from the Food and Nutrition Board at the National Academies of Sciences, Engineering, and Medicine. The law also provided a \"performance-based\" bonus reimbursement of 6 cents per lunch (adjusted annually for inflation) for schools certified as compliant with the updated standards (the rate was 7 cents in school year 2019-2020). USDA published the updated nutrition standards for school meals in 2012. They were based on the 2010 Dietary Guidelines for Americans (per an existing statutory requirement) as well as the recommendations from the National Academies of Sciences, Engineering, and Medicine. The standards required increased servings of fruits, vegetables, whole grains, and meats/meat alternates in lunches and breakfasts. They also restricted milk to unflavored low-fat (1%) and flavored and unflavored fat-free varieties, set limits on calories and sodium in school meals, and prohibited trans fats in school meals, among other changes. Separate from the final rule, USDA also implemented a requirement in the HHFKA that schools make water available to children during meal service in the cafeteria. The revised nutrition standards largely took effect in school year 2012-2013 for lunches and in school year 2013-2014 for breakfasts. A few requirements phased in over multiple school years. Some schools experienced difficulty implementing the new standards, and subsequent changes to the whole grain, sodium, and milk requirements were made through appropriations acts and USDA rulemaking. For school year 2019-2020 and onwards, schools are operating under the regulations as amended by a final rule published by FNS on December 12, 2018, which allows flavored 1% milk, requires at least 50% of grains offered weekly in school meals to be whole grain-rich, and delays the implementation of stricter sodium limits for school meals. Table 6 provides an overview of the nutrition standards for school lunches as of September 2019. States and school districts are allowed to implement additional nutritional requirements for school meals, as long as they meet the federal standards. The HHFKA also required USDA to develop nutrition standards for other foods sold in NSLP- and SBP-participating schools on campus during the school day. These foods are known as \"competitive foods\" (i.e., foods sold in competition with school meals). Competitive foods include foods and drinks sold in vending machines, a la carte lines, snack bars and concession stands, and school fundraisers. These foods do not receive a federal reimbursement. The HHFKA required USDA to publish proposed nutrition standards for competitive foods within one year of the law's enactment and align the standards with the most recent Dietary Guidelines for Americans. Relying on recommendations made by the National Academies of Sciences, Engineering, and Medicine, FNS promulgated a proposed rule in April 2013 and then an interim final rule in June 2013, which went into effect in school year 2014-2015. The interim final rule created nutrition standards for all non-meal foods and beverages that are sold during the school day (defined as midnight until 30 minutes after dismissal). The final rule, published in July 2016, maintained the interim final rules with minor changes. Under the final standards, competitive foods must have certain primary ingredients, meet whole-grain requirements, and comply with calorie, sugar, sodium, and fat limits, among other criteria. Schools are also limited to a list of zero- and low-calorie beverages they may sell (with larger portion sizes and caffeine allowed in high schools). Fundraisers held outside of the school day and fundraisers in which the food sold is clearly not intended for consumption on campus during the school day are not subject to the competitive food nutrition standards. In addition, the law and the final rule provided states with discretion to exempt infrequent fundraisers selling foods or beverages that do not meet the nutrition standards. The rule did not limit foods brought from homeâonly foods sold at school during the school day. The federal standards are minimum standards, and states and school districts are permitted to issue more stringent policies. Many districts already had local competitive food standards in place prior to the HHFKA because of the 2004 child nutrition reauthorization law ( P.L. 108-265 ), which required local educational agencies to implement local school wellness policies that included nutritional guidelines for foods sold in schools (local school wellness policies are discussed in the \" Other Child Nutrition Activities \" section). Local educational agencies participating in the school meals programs are required to have a local school wellness policy, which sets nutrition and health-related goals and guidelines for schools within the jurisdiction. Local school wellness policies must include goals related to nutrition and physical activity, nutrition standards for school foods that meet or exceed federal nutrition standards (discussed previously), and an implementation plan, among other content. Local educational agencies must provide opportunities for input from parents, students, school nutrition professionals, physical education teachers, school health professionals, school administrators, and the general public in developing and updating local school wellness policies. This section discusses food procurement and service topics specific to the school meals programs. Other food service topics relevant to child nutrition programs more broadly, including NSLP and SBP (e.g., the farm to school initiative), are discussed in the \" Other Child Nutrition Activities \" section. The majority of foods used in the school meal programs are purchased by school food authorities using federal cash reimbursements or other school district funds. School food authorities also receive USDA Foods (as discussed previously). School food authorities must comply with federal procurement rules when purchasing foods for the school meals programs. In addition, there is a \"Buy American\" requirement in statute that requires schools participating in the school meal programs to purchase domestic commodities and products \"to the maximum extent practicable.\" Purchases may include local foods, as long as they comply with federal, state, and local procurement regulations. Many school food authorities purchase and prepare their own meals, either at a centralized district kitchen or onsite at individual schools. Alternatively, school food authorities may contract with a private food service management company to contract out procurement and/or meal preparation. The contracted company must comply with all school meal regulations and the school food authority must retain general control over the operation of the school meals programs, including financial oversight and compliance with nutrition standards. Foods served in any child nutrition program must comply with state or local health, safety, and sanitation standards for food storage, preparation, and service. Schools participating in the school meals programs must obtain food safety inspections by a state or local government agency at least twice a year. There are also food safety inspections for USDA Foods. School food authorities may allow children to place leftover whole food or beverage items on a \"share table\" in schools operating NSLP and other child nutrition programs, as long as such sharing complies with food safety standards. In general, lunches and breakfasts are intended to be consumed onsite during the school day. Surveys have found that schools typically provide roughly 20 minutes for breakfast and 25-30 minutes for lunch. Under SBP, students were traditionally required to arrive early for breakfast and eat it in the cafeteria. However, in recent years, schools and states have increasingly adopted alternative models of breakfast service such as breakfast in the classroom, grab-and-go carts, and breakfast during morning breaks. Anti-hunger advocacy groups have encouraged the adoption of new models of breakfast service as a way to increase SBP participation. According to a 2018 survey by the School Nutrition Association (SNA), a member and advocacy organization, more than half of surveyed school districts offered both a traditional cafeteria line and alternative modes of breakfast service, while 43% of schools offered a cafeteria line only. Common alternatives were grab-and-go stations (particularly in middle and high schools) and breakfast in the classroom (particularly in elementary schools). CACFP provides federal reimbursements for meals and snacks served in nearly 156,500 child care centers, day care homes, and adult day care centers nationwide in FY2019 (see Table 7 for participation by type of institution). In these settings, reimbursements are limited to meals and snacks served to children ages 12 and under, children of any age with disabilities, and chronically disabled and elderly adults. CACFP also supports free meals and snacks for children ages 18 and under in emergency shelters and afterschool programs in low-income areas (discussed in the \" After-School Meals and Snacks \" section). In general, CACFP provides cash reimbursements for up to two meals and one snack or one meal and two snacks per participant daily (a meal may be a breakfast, lunch, or supper). A smaller share of federal aid takes the form of commodity assistance or cash in lieu of commodities and funds for administrative costs (discussed previously). The eligibility and funding rules of CACFP differ for centers (facilities or institutions) and day care homes (private homes). Day care homes must be overseen by sponsoring organizations, which handle the financial and administrative functions of the program for a number of local providers. Centers have the option of operating independently or under a sponsor. Both centers and day care homes must comply with government-established standards for other child care programs and meet federal CACFP nutrition standards. At the local level, sponsor organizations administer CACFP for all participating day care homes and centers that elect to have a sponsor. Sponsors are responsible for conducting audits of providers, distributing federal reimbursements, and in some instances, preparing and distributing meals. They can be public or nonprofit institutions or, in some cases, for-profit institutions. Centers that choose to handle their own administrative responsibilities are referred to as independent centers. Unlike centers, day care homes are required to have a sponsor organization. Sponsors receive monthly federal administrative payments based on the number of homes for which they are responsible (sponsors, on average, have more than 100 day care homes under their supervision). They may also receive a portion of the per-meal reimbursement if they have an agreement with the day care home to prepare meals. If a center opts to have a sponsor, the sponsor may retain a portion of the per-meal reimbursements for its administrative expenses. In CACFP, the state administering agency is typically the state department of education or department of health and/or human services. The state agency distributes federal funds and conducts reviews of CACFP sponsor organizations and independent centers. Similar to the school meals programs, FNS provides oversight of state agencies and issues guidance and regulations to states and providers. The following institutions are eligible to participate as centers in CACFP: public or private nonprofit (tax exempt) organizations providing nonresidential child care or adult day care (including school food authorities and Head Start centers), private for-profit organizations providing nonresidential child care or adult day care that enroll a certain proportion of low-income participants, and emergency shelters for homeless families. Adult day care centers and outside school hour centers fall under the first two categories, but they are subject to specific federal regulations. Income eligibility rules for CACFP centers are the same as the school meals programs: participants in households at or below 130% of the poverty line qualify for free meals and snacks and those between 130% and 185% of the poverty line qualify for reduced-price meals and snacks (a charge of no more than 40 cents for a lunch or supper, 30 cents for a breakfast, and 15 cents for a snack). CACFP centers also use similar categorical eligibility criteria, including participation in Head Start, foster child status, and household participation in SNAP, FDPIR, or TANF assistance. Adults are categorically eligible if they participate in SNAP, FDPIR, Supplemental Security Income (SSI), or Medicaid. Eligibility is determined through paper applications or, in some states, direct certification-like processes. For CACFP centers, the reimbursement rates for breakfasts and lunches/suppers are the same as the SBP breakfast reimbursement rate and NSLP lunch reimbursement rate, respectively. The largest subsidies are provided for free and reduced-price meals and snacks, while paid meals receive a lower reimbursement. Unlike the school meals programs, CACFP allows centers certain flexibilities for tracking meal counts and submitting claims for reimbursement. Compared to school meals, CACFP centers are also less likely to collect meal payments from participants and more likely to incorporate meal costs into tuition. Centers are not required to adjust tuition and fees to account for CACFP funding. Centers are also allowed to charge families separately for meals and snacks, as long as there are no charges for children who qualify for free meals and limited charges for those who qualify for reduced-price meals. Day care homes are private homes that provide nonresidential child care services. In general, any day care home that meets local, state, or federal child care standards may participate in CACFP. Unlike centers, day care homes generally do not make eligibility determinations and receive the same reimbursement rate for every meal served. Day care homes located in a low-income area or with a low-income provider receive a higher, Tier I reimbursement rate (shown in Table 8 ). To receive the Tier I rate, the home must be located in an area in which at least 50% of children are eligible for free or reduced-price meals or be operated by a provider whose household income level meets the free or reduced-price income standards. Day care homes that do not qualify for Tier I rates receive Tier II (lower) rates. However, Tier II providers may seek the higher Tier I subsidies for individual low-income children for whom household income information is collected and verified. Like centers, day care homes may incorporate meal costs into tuition. Unlike centers, federal rules prohibit any separate meal charges. In addition to nutrition standards for school foods, the HHFKA required the Secretary of Agriculture to update CACFP's meal patterns. USDA's final rule, effective October 1, 2017, revised the meal patterns for meals and snacks served in centers and day care homes. It also aligned nutrition standards for meals served to preschool-aged children through NSLP and SBP. For infants (under 12 months of age), the new meal patterns eliminated juice, encouraged breastfeeding, and set guidelines for the introduction of solid foods, among other changes. For children ages one and older and adult participants, the new meal patterns increased whole grains, fruits, and vegetables, limited milk to unflavored 1% and unflavored or flavored fat-free varieties, limited sugar in cereals and yogurts, and prohibited deep-fried foods. They also required that potable water be available to children throughout the day. Subsequent rulemaking by USDA allowed flavored 1% milk to be served to children ages six and older in CACFP in school year 2018-2019 and forward. CACFP institutions may purchase their own foods and prepare their own meals, or they may contract with a school or a food service management company that prepares meals for them. In either case, institutions must comply with federal, state, and local procurement regulations. As noted previously, CACFP institutions also receive a certain amount of USDA Foods. Meals must comply with state or local health, safety, and sanitation requirements for storing, preparing, and serving food, and institutions must acquire annual food safety inspections. Family-style meal service is encouraged in CACFP. The Summer Food Service Program (SFSP) and the Seamless Summer Option provide federal reimbursements for summer meals. SFSP is open to school food authorities, local public agencies, and private nonprofit organizations, while the Seamless Summer Option is specifically for school food authorities, allowing them to continue operating under certain NSLP/SBP requirements into the summer. Both programs require children to consume meals onsite (known as the \"congregate feeding\" requirement). In recent years, the federal government has tested alternatives to congregate feeding through the Summer Electronic Benefits Transfer for Children (Summer EBT) demonstration in select states. The Summer Food Service Program (SFSP) provides federal aid to school food authorities and other local public and nonprofit organizations that serve meals and snacks to children during the summer months. Federal aid is provided in the form of per-meal cash reimbursements and a smaller amount of commodity foods and administrative funds (discussed previously). The program serves roughly 2.7 million children annually at nearly 46,600 meal sites. Similar to CACFP, SFSP is administered at the local level by sponsor organizations that operate the program at one or more meal sites (the physical location where food is served and eaten). All SFSP meal sites are required to have a sponsor. Sponsors may operate meal sites at a variety of locations, including schools, recreation centers, parks, churches, and public libraries. Unlike the other child nutrition programs, SFSP participation is generally limited (with the exception of camps) to meal sites that serve children from \"areas in which poor economic conditions exist\"âdefined as areas or sites in which at least 50% of children are eligible for free and reduced-price school meals (discussed further below). The following public and private nonprofit institutions are eligible to participate in SFSP as sponsors: nonprofit organizations, school food authorities, state and local governments (including tribal governments), public or nonprofit summer camps (overnight and day camps), and public or nonprofit colleges and universities participating in the National Youth Sports Program. Eligible sponsors must also provide year-round services to the community, with limited exceptions. According to statute, when selecting sponsors, states must give priority to school food authorities, public and nonprofit organizations that have demonstrated successful program performance in a prior year, new public sponsors, and new nonprofit sponsors (in that order). States must also prioritize sponsors located in rural areas. Sponsors are responsible for selecting meal sites, distributing meals to sites, and monitoring sites. Officials at meal sites are responsible for distributing meals to children, monitoring the food service, and keeping track of meals served for reimbursement. At times, a sponsor may also be a site (for example, camps are both sponsors and meal sites). An FNS analysis of a nationally representative sample of SFSP sponsors and meal sites in summer 2015 found that the majority of sponsors were school food authorities and nonprofit organizations, and common meal sites included schools, recreation centers, and parks/playgrounds. State administering agencies (often state departments of education) approve sponsors, distribute federal funds, and conduct reviews of sponsors and sites. State agencies receive SFSP funds for administrative costs in addition to general child nutrition program administrative funds (discussed previously in the \" Administrative Funds \" section). FNS distributes funds and commodities to state agencies, oversees states' implementation of SFSP, and provides guidance and technical assistance to states and participating institutions. According to statute, all sponsors except camps must \"conduct a regularly scheduled food service for children from areas in which poor economic conditions exist.\" SFSP regulations establish different eligibility rules for different types of meal sites. Open sites are meal sites that are open to all children in the community. In order to participate in SFSP, open sites must be located in an area in which at least 50% of the children would be eligible for free or reduced-price school meals as demonstrated through school data, Census data, or other approved data sources. Meals must be served free to all children at these sites, and the sponsor of the site receives reimbursement for every meal served (up to two meals or one meal and one snack per child daily). Closed enrolled sites are meal sites (other than camps) that only serve enrolled children. In order for the site to participate in SFSP, at least 50% of the enrolled children must qualify for free or reduced-price school meals based on the submission of a household application or other documentation. Like open sites, meals are served free to all children and the sponsor receives reimbursement for every meal served (up to two meals or one meal and one snack per child daily). Camps include residential and day camps that provide organized programs for enrolled children. Unlike open and closed enrolled sites, camps do not have to demonstrate that a certain percentage of children meet the free and reduced-price eligibility standards in order to participate in SFSP. Instead, eligibility works like NSLP and SBP: camps make eligibility determinations using similar income and categorical eligibility criteria for free and reduced-price meals. However, unlike the school meals programs, camps receive the same reimbursement rate for free and reduced-price meals. Camps may receive reimbursement for up to three meals or two meals and one snack per eligible child daily. Camps are not required to serve meals for free to all children, and there is no paid reimbursement provided for full-price meals. National Youth Sports Program (NYSP) sites , run by the National Collegiate Athletic Association, are enrolled sites; however, like open sites, they qualify for SFSP based on area eligibility data showing that at least half of the children in the area would qualify for free or reduced-price school meals. Sponsors of NYSP sites serve meals free to all enrolled children and receive reimbursement for all meals served (up to two meals or one meal and one snack per child daily). Migrant sites must demonstrate that they predominantly serve migrant children as certified by a migrant organization or a sponsor. They follow the same eligibility and reimbursement rules as open sites, except that they may receive reimbursement for up to three meals or two meals and one snack per child daily. According to the FNS study of SFSP sites, in summer 2015 the majority (59%) of sites were open sites, 29% were closed enrolled sites, 9% were camps, and 4% were another type of site. The SFSP reimbursement rate (the total rate displayed in Table 9 ) is composed of two parts: an operating cost (food, storage, labor) reimbursement and an administrative cost (planning, organizing, and managing) reimbursement. While operating and administrative rates are calculated separately, once sponsors receive the funds they can use them for any allowable program cost. Higher administrative reimbursements are provided for sponsors of rural meal sites and \"self-preparation\" sites (meal sites in which a sponsor rather than vendor prepares food). Meals and snacks served through SFSP must meet federal nutrition standards. In contrast to the child nutrition programs discussed thus far, SFSP's nutrition standards are not required to align with the Dietary Guidelines for Americans, but are \"prescribed by the Secretary on the basis of tested nutritional research.\" Program regulations outline the nutrition standards for breakfasts, lunches/suppers, and snacks. The standards prescribe minimum servings of fruits and vegetables, meats/meat alternatives, breads/bread alternatives, and milk. Unlike school meals and CACFP, there are no limits on calories, saturated and trans fats, and milk varieties in SFSP. Participating school food authorities may choose instead to use the NSLP and/or SBP nutrition standards for SFSP. As noted, children are required to consume meals onsite in SFSP. There are also requirements around the timing of meals in SFSP: there must be at least three hours between meal or snack services and four hours between lunch and dinner if there is no snack served. Like the other child nutrition programs, SFSP sponsors must comply with local or state health and sanitation requirements. School food authorities may participate in SFSP, or they can choose to offer summer meals through the Seamless Summer Option. The Seamless Summer Option allows school food authorities to continue operating under certain NSLP/SBP requirements into the summer. For example, it allows them to use the school meals programs' nutrition standards, administrative review process, and reimbursement rates (see Table 5 for NSLP/SBP reimbursement rates). Other requirements are the same as SFSP, including site eligibility rules. School food authorities are the only eligible sponsor in the Seamless Summer Option, but they can operate the program at a variety of meal sites (e.g., parks, recreation centers, libraries). The school lunch and breakfast reimbursement rates used in the Seamless Summer Option are slightly lower than SFSP's reimbursement rates. However, school food authorities participating in the Seamless Summer Option also receive the NSLP commodity reimbursement (discussed in the \" Commodity Assistance \" section). School food authorities may also have a reduced administrative burden under the Seamless Summer Option. Beginning in summer 2011 and each summer since (as of the date of this report), USDA has operated Summer Electronic Benefit Transfer for Children (Summer EBT) demonstration projects in a limited number of states and Indian Tribal Organizations. The project provides electronic food benefits to households with children eligible for free or reduced-price school meals. Depending on the site and year, either $30 or $60 per month is provided on an EBT card. States and jurisdictions may apply to administer the project through SNAP or WIC. Participants in jurisdictions providing benefits through SNAP can redeem benefits for SNAP-eligible foods at any SNAP-authorized retailer, while participants in the WIC EBT jurisdictions are limited to a smaller set of eligible foods at WIC-authorized retailers. Summer meal demonstration projects were first authorized and funded by the FY2010 appropriations law ( P.L. 111-80 ). Although a number of approaches were tested, findings from Summer EBT were among the most promising, showing significant impacts on reducing food insecurity and improving nutrient intake. Summer EBT grantees in prior years include Connecticut, the Cherokee and Chickasaw nations, Delaware, Michigan, Missouri, Nevada, Oregon, Tennessee, Texas, Virginia, and Washington. In October 2018, FNS announced a new strategy for determining grant recipients in FY2019 that prioritized states that had not participated before, statewide projects, and projects that could operate in the summers of 2019 through 2021. Other summer demonstrations projects have included food backpacks, food boxes, and meal delivery for children in rural areas. In addition, since summer 2015 there has been a demonstration project to provide exemptions from the congregate feeding requirement to SFSP and Seamless Summer Option outdoor meal sites experiencing excessive heat. The Special Milk Program (SMP) subsidized milk in approximately 3,000 schools, child care institutions, summer camps, and other institutions in FY2019. Generally, schools and other participating institutions may not participate in another child nutrition meal service program along with SMP. However, schools may administer SMP for pre-kindergartners and kindergartners who are in part-day sessions and do not have access to the school meals programs. In SMP, participating institutions provide milk to children for free and/or at a subsidized paid price. Institutions are reimbursed differently based on whether they decide to provide milk for free to all children, sell milk to all children, or combine these options (providing free milk to eligible children and selling milk to other children) (see Table 10 ). If institutions choose the combined option, they must establish eligibility rules for free milk. USDA updated the nutritional requirements for milk served in SMP alongside changes to the CACFP nutrition standards. The final rule, which took effect on October 1, 2017, required unflavored whole milk for one-year-olds, unflavored low-fat (1%) or unflavored fat-free milk for children ages 2-5, and unflavored low-fat (1%) or flavored/unflavored fat-free milk for children ages six and older. The regulations also allowed for reimbursement of non-dairy milk substitutes in cases of medical or special dietary needs. In 2017, USDA changed the milk requirements for six-year-olds in SMP alongside corresponding changes to milk in school meals programs and CACFP. The change allowed the option of flavored low fat (1%) milk for children ages six and older in SMP for school year 2018-2019 forward. CACFP and NSLP both provide federal support for snacks and meals served during after-school programs. The CACFP At-Risk Afterschool component provides reimbursement for up to one snack and one meal (usually supper) per child daily, whereas the NSLP Afterschool Snack option provides reimbursement for snacks only. Reimbursement rates for CACFP At-Risk Afterschool meals/snacks and NSLP afterschool snacks are the same as CACFP reimbursement rates (listed in Table 8 ). The CACFP At-Risk Afterschool component was authorized as a demonstration project in 1994 ( P.L. 103-448 ), expanded over time, and made available to all states by the HHFKA. The institutional eligibility rules are the same for At-Risk Afterschool providers as CACFP centers (see the \" CACFP Centers \" section); additionally, CACFP At-Risk Afterschool providers must be located in areas where at least 50% of children in the community are eligible for free or reduced-price school meals. The afterschool program must have \"an educational or enrichment purpose.\" Participating institutions receive reimbursement for up to one snack and one meal (e.g., supper) per child daily, and meals and snacks are provided for free to all children. Meals and snacks must meet federal nutrition standards. Institutions may operate the At-Risk Afterschool program in the after-school hours and on weekends, holidays, and breaks during the school year. Unlike the traditional CACFP, which is only available to children ages 12 and under, the At-Risk Afterschool component allows participation through age 18. In FY2019, the CACFP At-Risk Afterschool component served a daily average of 2.2 million children. The NSLP Afterschool Snack option was authorized in the 1998 child nutrition reauthorization act ( P.L. 105-336 ). It allows NSLP-participating schools to receive federal reimbursement for one snack per child daily in eligible afterschool programs during the school year. According to USDA guidance, eligible afterschool programs must provide \"organized, regularly scheduled activities in a structured and supervised environment,\" including an educational or enrichment activity. Schools that choose to operate the NSLP Afterschool Snack component may do so in one of two ways: (1) like the CACFP At-Risk Afterschool component, if at least 50% of children are eligible for free and reduced-price meals, the schools may provide free snacks to all children, or (2) if this criterion is not met, the schools may offer free, reduced-price, or full price snacks, based on household income eligibility (like the school meals programs). The vast majority of snacks provided through this program represent the first option. Snacks served through the NSLP Afterschool Snack component must comply with federal nutrition standards. In FY2019, the NSLP Afterschool Snack component served a daily average of 1.2 million children. The Fresh Fruit and Vegetable Program (FFVP) provides formula grants to states to fund fresh fruit and vegetable snacks in selected elementary schools. Under a statutory formula, about half the funding is distributed equally to each state and the remainder is allocated by state population. States must prioritize funding for schools with high proportions of students who are eligible for free or reduced-price meals. Schools must participate in NSLP in order to receive a FFVP grant. States set annual per-student grant amounts (between $50 and $75). Schools may provide fresh fruit and vegetable snacks to students at any time of day outside of the breakfast or lunch service. Schools offer snacks to all children in attendance (regardless of family income). As noted previously, FFVP's funding structure differs from the other child nutrition programs. FFVP is funded by a mandatory transfer of funds from Section 32. The authorizing law provided $150 million for school year 2011-2012, which is adjusted annually for inflation. In FY2019, FNS allocated approximately $171.5 million in FFVP funds to states. FFVP has been amended over time by both farm bills and child nutrition reauthorization bills. FFVP was created by the 2002 farm bill ( P.L. 107-171 ) as a pilot project. The 2004 child nutrition reauthorization act ( P.L. 108-265 ) made the program permanent and provided funding for a limited number of states and Indian reservations. The 2008 farm bill ( P.L. 110-246 ) expanded FFVP's mandatory funding through Section 32 and enabled all states to participate in the program. The 2014 farm bill ( P.L. 113-79 ) essentially made no changes to FFVP but provided $5 million for a demonstration project to test offering frozen, canned, and dried fruits and vegetables in the program. Four states (Alaska, Delaware, Kansas, and Maine) participated in the pilot in school year 2014-2015 and an evaluation was published in 2017. Federal child nutrition laws authorize and child nutrition funding supports several additional initiatives and activities, such as studies and evaluations, training and technical assistance, technology improvements, and food safety initiatives. Selected initiatives and activities are discussed below. The farm to school program, which includes the Farm to School Grant Program, was authorized by the HHFKA. It expanded upon FNS's existing farm to school efforts, defined broadly as \"efforts that bring regionally and locally produced foods into school cafeterias,\" with a focus on enhancing child nutrition. The goals of these efforts include increasing fruit and vegetable consumption among students, supporting local farmers and rural communities, and providing nutrition and agriculture education. One component of the farm to school program is farm to school grants, which have annual mandatory funding of $5 million. The grants are awarded by FNS on a competitive basis to schools, nonprofit entities, and agricultural producers/processors for the purpose of establishing programs that improve schools' access to locally produced foods. They may be used for training, supporting operations, planning, purchasing equipment, developing school gardens, nutrition education, developing partnerships, and other activities. The Institute of Child Nutrition provides technical assistance, instruction, and materials for nutrition and food service professionals and other local administrators of child nutrition programs on a variety of topics. The institute receives $5 million a year in mandatory funding appropriated in statute. The institute is currently located at the University of Mississippi. The Team Nutrition initiative supports federally and state-developed nutrition education and promotion initiatives. This includes grants for state agencies to develop programs to improve school meal quality, such as by training school nutrition professionals. From 2004 to 2018, Team Nutrition also included the HealthierUS Schools Challenge, which was a voluntary certification initiative designed to recognize schools that create a healthy school environment through the promotion of nutrition and physical activity. CRS reports: CRS In Focus IF10266, An Introduction to Child Nutrition Reauthorization CRS Report R45486, Child Nutrition Programs: Current Issues CRS Report R42353, Domestic Food Assistance: Summary of Programs CRS Report R41354, Child Nutrition and WIC Reauthorization: P.L. 111-296 (summarizes the Healthy, Hunger-Free Kids Act of 2010) CRS Report R44373, Tracking Child Nutrition Reauthorization in the 114th Congress: An Overview CRS Report R45743, USDA Domestic Food Assistance Programs: FY2019 Appropriations CRS Report RL34081, Farm and Food Support Under USDA's Section 32 Program CRS Report RL33299, Child Nutrition and WIC Legislation in the 108th and 109th Congresses (summarizes the Child Nutrition and WIC Reauthorization Act of 2004) Other resources: USDA FNS website, https://www.fns.usda.gov/ USDA FNS Healthy, Hunger-Free Kids Act page, http://www.fns.usda.gov/school-meals/healthy-hunger-free-kids-act The FNS page of the Federal Register , https://www.federalregister.gov/agencies/food-and-nutrition-service USDA FNS Congressional Budget Justifications, https://www.obpa.usda.gov/explan_notes.html The Emergence of School Lunches and the National School Lunch Program When the first federal aid for school lunches was provided in the 1930s, local school lunch programs were already operational in many cities and localities across the U.S. Many of these early lunch programs were started by charitable women's organizations at the turn of the century in an effort to feed hungry children. Over time, they transitioned to school boards and school districts. These programs received a combination of private, local, and state funding. The federal government became involved in school lunch programs during the Great Depression both as a way to feed hungry children and support the farm economy. Initially, federal aid was provided in the form of cafeteria equipment and labor. In 1932, the Reconstruction Finance Corporation began providing loans to states and school districts to cover the cost of cafeteria space and equipment for school lunch programs. In 1935, the Works Progress Administration, a New Deal agency, began sponsoring women's employment in school lunchrooms. Federal food support for school lunches began that same year, when Section 32 of the Act of August 24, 1935 (P.L. 74-320) was enacted. The act provided 30% of customs receipts to USDA to purchase surplus commodities from farmers impacted by the depression. These commodities were donated through various outlets for domestic consumption, including school lunch programs. With commodity aid came the first federal regulations for school lunch programs. USDA required recipient organizations, through their agreements with state agencies, to operate school lunch programs on a nonprofit basis, maintain any existing local funding for school lunches, keep records of foods received, serve meals free to poor children, and ensure that such children would not be identified to their peers, among other requirements. The availability of federal aid contributed to a rapid increase in the number of school lunch programs. However, in 1943, federal commodity aid declined as Section 32 surplus commodities were diverted to feed U.S. armed forces in World War II. In addition, federal support for lunchroom labor disappeared with the elimination of the Works Progress Administration. In the midst of declining aid, Congress provided the first cash assistanceâ$50 million in Section 32 fundsâfor \"a school milk and lunch program\" in the 1944 Department of Agriculture Appropriation Act (P.L. 78-129). The introduction of cash assistance marked a shift in the lunch program. For the first time, schools could purchase their own foods in addition to receiving federally purchased commodities. Annual appropriations acts continued cash support for school lunches until 1946, when the National School Lunch Act (P.L. 79-396) was enacted. Signed into law on June 4, 1946, by President Truman, the National School Lunch Act permanently authorized appropriations of \"such sums as may be necessary\" for the National School Lunch Program. (The act would later be renamed the \"Richard B. Russell National School Lunch Act,\" recognizing Senator Russell's role in the passage of the legislation and his earlier support for the school lunch program within New Deal programs and during his tenure as the Chairman of the Agriculture Appropriations subcommittee. ) The law required participating schools to serve lunches for free or at a reduced price to students who were deemed by local school authorities as unable to pay the full cost of a lunch. Funds were to be distributed to states based on the number of school-aged children in the state and the state's need, as measured by per-capita income, and states were to match federal funds dollar-for-dollar. States were to distribute funding on a monthly basis to schools based on the number of meals served that met \"minimum nutritional requirements prescribed by the Secretary on the basis of tested, nutritional research\" (P.L. 79-396). Cash assistance could not be used for cafeteria equipment, and separate funds were authorized for this purpose ($10 million annually); however, Congress subsequently prohibited appropriations for equipment assistance from FY1948 to FY1967. NSLP remained relatively unchanged from 1946 to 1960. However, during this timeframe, concerns emerged over the funding formula. One concern was that the formula prioritized funding for schools with large numbers of school-aged children rather than actual participants in the program. There was also concern that schools with high proportions of needy children received the same amount of aid as those with wealthier families, even though they had to serve a larger number of meals for free or at a reduced-price. In 1962, P.L. 87-823 changed the funding formula to be based on the number of school lunches served in the state in the preceding school year instead of the number of school-aged children. The law also authorized additional \"special assistance\" for state-selected schools in poor economic areas (however, special assistance was not funded until 1966). Other notable changes to NSLP occurred in the 1970s. In 1970, P.L. 91-248 extended special assistance to all schools participating in NSLP. The law also reduced the state matching requirement and established the first national eligibility guidelines for free and reduced-price meals at 100% of the federal poverty level (later in the decade increased to 125% for free lunches and 195% for reduced-price lunches). In 1971, another significant change occurred with the enactment of P.L. 92-153, which guaranteed states a certain level of federal cash assistance by specifying average per-meal reimbursement rates for free, reduced-price, and paid lunches. The Addition of Other Child Nutrition Programs In the 1960s, federal child nutrition efforts expanded beyond school lunches. On October 11, 1966, the Child Nutrition Act of 1966 (P.L. 89-642) was enacted. It formally authorized the Special Milk Program (SMP) and authorized the School Breakfast Program (SBP) as a pilot program. The SMP was based on predecessor USDA school milk programs that had operated since the 1940s. SBP was a newer concept that USDA had piloted in the 1965-1966 school year. In a House Agriculture Committee hearing on the Child Nutrition Act, then-Secretary of Agriculture Orville L. Freeman testified that These proposals will permit us to begin a comprehensive effort to broaden child nutrition programs in this country. They are based on what we have learned in 20 years of administration of the National School Lunch Act, and they reflect a careful assessment of gaps which now exist in the nutritional needs of children in this country. The SMP provided reimbursements for milk in schools, nonprofit child care centers, summer camps, and other nonprofit institutions. At the time, schools and institutions could participate in both SMP and NSLP. Meanwhile, SBP was authorized for two fiscal years and required states to prioritize funds for \"schools drawing attendance from areas in which poor economic conditions exist and to those schools to which a substantial proportion of the children enrolled must travel long distances daily\" (P.L. 89-642). (Congress later expanded priority to include \"schools in which there is a special need for improving the nutrition and dietary practices of children of working mothers and children from low-income families\" (P.L. 92-32).) The Child Nutrition Act of 1966 also gave the Secretary the authority to provide higher reimbursements to schools with \"severe need.\" Like NSLP, the law specified that breakfasts \"meet minimum nutritional requirements prescribed by the Secretary on the basis of tested nutritional research,\" and be served for free or at a reduced price to children unable to pay the full price of a meal, as determined by local school authorities (P.L. 89-642). In 1968, child nutrition efforts were further expanded with the authorization of the Special Food Service Program for Children (SFSPC), a pilot program to fund meals in summer and child care settings (P.L. 90-302). SFSPC provided the first federal assistance for summer meals for children and the first dedicated assistance for meals served in child care settings. Similar to SBP, SFSPC was targeted to areas with poor economic conditions and a high number of working mothers. In 1975, the program was split into the separate Child Care Food Program (CCFP) and the Summer Food Service Program (SFSP) ( P.L. 94-105 ). CCFP was open to public and nonprofit institutions that met child care licensing or other official child care standards, while SFSP retained a focus on institutions in low-income areas. Meals were provided for free to all children at SFSP sites, whereas CCFP conducted free and reduced-price eligibility determinations like NSLP. Recent History (1980 to 2010) The longstanding growth of child nutrition programs was contrasted with budget cuts in the early 1980s, which were part of larger efforts to reduce federal domestic spending. The Omnibus Reconciliation Act of 1980 ( P.L. 96-499 ) reduced FY1981 funding for child nutrition programs by approximately $400 million (9%) of the child nutrition budget. The law achieved savings by lowering reimbursement rates in the programs and eliminating commodity assistance for breakfast, among other changes. Larger spending cuts followed with the Omnibus Reconciliation Act of 1981, which made changes that collectively cut $1.4 billion (25%) of the child nutrition budget (Title VIII of P.L. 97-35 ). Many of the policy changes made by the law remain in place today. For example, the law restricted eligibility from 195% of poverty to 185% of poverty for reduced-price meals and set eligibility at 130% for free meals in the NSLP, SBP, and CCFP. It also raised allowable charges for reduced-price lunches from 20 cents to 40 cents and for reduced-price breakfasts from 10 cents to 30 cents. In a major change to SMP, the law excluded schools/institutions that participated in another child nutrition meals program from participating in SMPâcutting SMP's budget by 77 percent. In CCFP, the law restricted participation from children ages 18 and under to children ages 12 and under, and reduced the maximum number of reimbursable meals from three meals and two snacks per child daily to two meals and one snack per child daily. The law also eliminated equipment assistance for school meals. Child nutrition programs were subsequently excluded from budget deficit reduction measures in the late 1980s and 1990s, and new policies led to the expansion of the programs during this timeframe. For example, amendments to the programs in these years authorized start-up grants for school breakfast programs, expanded CCFP to adult day care centers (and renamed the Child and Adult Care Food Program, or CACFP), and provided new funding for afterschool snacks through NSLP and CACFP. But what had potentially the longest-term impact on expansion was a policy change intended to reduce paperwork in the school meals programs: automatic (categorical) eligibility for free meals for children in food stamp (now SNAP) and Aid to Families with Dependent Children (now TANF) households, which was enacted in 1986âand direct certification of such children for free meals without household applications, which was enacted in 1989. Other policies in the late 1980s and 1990s focused on improving program integrity. The 1989 child nutrition reauthorization ( P.L. 101-147 ) required USDA to create a standardized process through which states would review school food authorities' administration of NSLP and SBP (known as administrative reviews). In CACFP, following USDA Office of the Inspector General (OIG) audits in the 1990s that found instances of abuse and mismanagement, the Agricultural Risk Protection Act of 2000 ( P.L. 106-224 ) made a number of changes aimed at improving program integrity in CACFP. The act required CACFP sponsors to conduct more frequent and unannounced site visits of sponsored centers and homes, restricted nonprofit institutions' eligibility to those with tax-exempt status, and excluded institutions deemed ineligible to participate in any other public program based on violations of program requirements. Other legislation was aimed at improving program integrity in the school meals programs. Program integrity continued to be a focus in the 2004 child nutrition reauthorization ( P.L. 108-265 ), which made changes to school food authorities' verification of household applications for free and reduced-price meals. Specifically, the law set a sample size of applications that schools must review, established a focus on \"error-prone\" applications (applications near the income eligibility thresholds), and authorized direct (automatic) household application verification processes. In addition, the law required states to conduct additional administrative reviews of school food authorities with a high level of administrative error or risk of error. The 2004 child nutrition reauthorization also continued the expansion of free school meals to new categories of children. Specifically, the law extended categorical eligibility and direct certification for free school meals to homeless children, migrant children, and children served under the Runaway and Homeless Youth Act. The most recent child nutrition reauthorization as of the date of this report was the Healthy, Hunger-Free Kids Act of 2010 (HHFKA; P.L. 111-296 ). The HHFKA continued the expansion of school meals in a few ways. It made foster children categorically eligible for free school meals, and allowed direct certification of such children. It also included a pilot project for direct certification (but not categorical eligibility) of children in Medicaid households for free and reduced-price meals based on an income test. In addition, the HHFKA created the Community Eligibility Provision (CEP), through which eligible schools can provide free meals to all students. As discussed in this report, the HHFKA also made changes to nutritional requirements in the school meals programs and CACFP. Specifically, the law required USDA to update the nutrition standards for school meals within a certain timeframe and align the standards with the Dietary Guidelines for Americans (per an existing statutory requirement). The law also required USDA to issue new nutrition standards regulating all foods sold on school campuses during the school day (\"competitive foods\"). (Previous standards applied only to competitive foods sold during meal service.) In addition, the HHFKA required USDA to update the nutrition standards for CACFP meals and snacks within a certain timeframe and align them with the Dietary Guidelines for Americans. USDA and Congress have made subsequent changes to the nutrition standards for school meals and CACFP meals and snacks, and the standards remain a source of debate in the programs.", "summary": "The federal government has a long history of investing in programs for feeding children, starting with federal aid for school lunch programs in the 1930s. Today, federal child nutrition programs support food served to children in schools and a variety of other institutional settings. Administered by the U.S. Department of Agriculture's (USDA's) Food and Nutrition Service (FNS), child nutrition programs include the National School Lunch Program (NSLP), School Breakfast Program (SBP), Child and Adult Care Food Program (CACFP), Summer Food Service Program (SFSP), Fresh Fruit and Vegetable Program (FFVP), and Special Milk Program (SMP). The child nutrition programs vary in terms of size and target populations. The largest programs are NSLP and SBP (the \"school meals programs\"), which subsidize meals for nearly 30 million children in approximately 94,300 elementary and secondary schools nationwide. The other child nutrition programs serve fewer children. CACFP supports meals served to children in child care, day care, and afterschool settings; SFSP provides funding for summer meals; FFVP sponsors fruit and vegetable snacks in elementary schools; and SMP subsidizes milk in schools and institutions that do not participate in other child nutrition programs. In general, the largest subsidies are provided for free or reduced-price meals and snacks served to children in low-income households. Federal spending on child nutrition programs and activities totaled approximately $23 billion in FY2019, the majority of which was mandatory spending. Most child nutrition programs are considered \"appropriated entitlements,\" meaning that their authorizing statutes establish a legal obligation to make payments, but that obligation is fulfilled through funding that is provided in annual appropriations acts. Most of the funding is provided in the form of per-meal cash reimbursements that states distribute to schools and institutions. A smaller amount of federal funding is provided in the form of federally purchased commodity foods and cash for states' administrative expenses. The child nutrition programs are primarily governed by two statutes: the Richard B. Russell National School Lunch Act and the Child Nutrition Act of 1966 as amended. These laws were most recently reauthorized by the Healthy, Hunger-Free Kids Act of 2010 (HHFKA, P.L. 111-296 ), which made several changes to the child nutrition programs. For example, the act created the Community Eligibility Provision, an option for eligible schools to provide free meals to all students. It also required USDA to update nutrition standards in the school meals programs and CACFP within a certain timeframe. Certain provisions of the HHFKA expired at the end of FY2015. However, these expirations have had a minimal impact on program operations, which continue with annual appropriations. The 114 th Congress began but did not complete a reauthorization of child nutrition programs. In the 115 th Congress, there was no significant reauthorization activity. As of the date of this report, leadership on both committees of jurisdiction (the Senate Agriculture, Nutrition, and Forestry Committee and the House Committee on Education and Labor) have announced plans to work on reauthorization in the 116 th Congress. Selected legislative issues are discussed in CRS Report R45486, Child Nutrition Programs: Current Issues .", "document_type": "crs"}
{"report": "The Higher Education Act of 1965 (HEA; P.L. 89-329, as amended) authorizes programs and activities to provide support to individuals who are pursuing postsecondary education and to institutions of higher education (IHEs). The HEA was last comprehensively reauthorized by the Higher Education Opportunity Act of 2008 (HEOA; P.L. 110-315 ). The HEOA extended the authorization of appropriation of funds for most HEA programs through FY2014, while the General Education Provisions Act (GEPA) provided an extension of that authority for an additional year (through FY2015). Many HEA programs have continued beyond FY2015 with funding provided under a variety of appropriations measures and continuing resolutions. During the 116 th Congress, the House Committee on Education and Labor marked up and ordered to be reported the College Affordability Act (CAA; H.R. 4674 ). The bill would provide for the comprehensive reauthorization of most HEA programs, create a number of new postsecondary education programs, and address certain issues related to higher education but separate from the HEA. In general, for programs with discretionary funding H.R. 4674 would authorize the appropriation of funds in specific, as opposed to indefinite, amounts for each year in which funding would be authorized to be provided. The Congressional Budget Office (CBO) estimates that the enactment of H.R. 4674 would increase mandatory spending outlays by approximately $161 billion in the 5-year period from FY2020 to FY2024 and by about $332 billion in the 10-year period from FY2020 to FY2029 period. In the 10-year estimate, about half the mandatory spending increase would result from changes to the federal student loans programs and about a quarter of the increase would result from changes to the Pell Grant program. CBO further estimates that the enactment of H.R. 4674 would increase discretionary spending outlays by about $149 billion in the 5-year period from FY2020 to FY2024. This largely reflects the extension of periods of authorized appropriations for existing programs. CBO did not make a 10-year estimate for discretionary spending. This report focuses on the key themes in H.R. 4674 and describes major changes proposed in the bill that are representative of those themes. It aims to provide a general understanding of the primary proposals of H.R. 4674 . The report does not aim to provide a comprehensive analysis of the bill nor of technical changes that would be made by it. H.R. 4674 , as ordered to be reported on October 31, 2019, would provide for the comprehensive reauthorization of the HEA, amending numerous programs and activities that make up a large portion of the federal effort to support postsecondary education. Taken collectively, the changes that would be made by H.R. 4674 reflect several key themes: (1) expanding the availability of financial aid to postsecondary students; (2) implementing borrower-focused student loan reforms; (3) modifying institutional accountability requirements for receipt of federal funds; (4) revising public accountability, transparency, and consumer information requirements; (5) expanding student services for specific populations; (6) expanding federal assistance to provide support to IHEs; and (7) creating new grant programs for states and institutions to reduce students' postsecondary costs. Each of these themes is discussed in the text that follows. Title IV of the HEA authorizes a group of federal student aid programs that provide aid to eligible individual students through grant and loan programs and work-study assistance. H.R. 4674 would expand aid availability in a number of ways, with considerable emphasis placed on increasing funding made available through grant programs. Some provisions in H.R. 4674 would increase aid availability by expanding eligibility. HEA Title IV, Part A authorizes Pell Grantsâfinancial need-based grants that are available to eligible undergraduate students. Student Pell Grant eligibility is determined on a sliding scale, based on a student's expected family contribution (EFC). The Pell Grant program is the largest grant program authorized in Title IV in terms of both the number of grants (about 7.1 million in award year [AY] 2017-2018) and the total awards (about $28.7 billion in AY2017-2018). The Pell Grant program is often referred to as aÂ quasi-entitlementÂ program, through which all eligible applicants receive grants. Generally, the maximum Pell Grant a full-time, full-academic-year student can receive is the difference between the total maximum Pell Grant ($6,345 in AY2020-2021) and the student's EFC. A full-time, full-academic-year student who has an EFC of zero would be eligible for the total maximum grant. For a student who enrolls on a less-than-full-time basis, his or her maximum scheduled award is ratably reduced. To receive a Pell Grant, a student must be enrolled in an eligible program at an eligible IHE. H.R. 4674 would increase the total maximum Pell Grant and would expand the population of eligible students and the types of eligible educational programs. The bill would also permanently authorize discretionary appropriations for the Pell Grant program. The total maximum Pell Grant is the sum of a mandatory add-on award amount and a discretionary award amount. The mandatory add-on award is an amount established by the HEA and funded by a permanent, indefinite mandatory appropriation. The discretionary award amount is specified in annual appropriations laws. Under current law, in the upcoming award year (AY2020-2021) the total maximum Pell Grant will be $6,345. H.R. 4674 would, on the whole, increase the mandatory add-on award levels in AY2021-2022 and in each award year thereafter. For AY2021-2022, the mandatory add-on award would be $1,685, an increase of $625 from $1,060 in AY2020-2021; thus, the total maximum grant amount would be $6,970 assuming the discretionary award level were the same as provided under current law in AY2020-2021. H.R. 4674 would further increase the total maximum grant by the rate of inflation in each year following AY2021-2022, assuming the discretionary award levels were not lower than the preceeding year. The increased award amounts would be funded by corresponding increases in mandatory appropriations. There are two primary effects of an increase to the total maximum Pell Grant: 1. Currently eligible students would be eligible for a larger Pell Grant. Most full-time, full-year recipients would be eligible for a Pell Grant that is up to $625 higher in AY2021-2022 compared to AY2020-2021. Students who are not full-time, full-year would qualify for smaller increases. 2. A portion of students whose EFCs would have been too high to qualify for a Pell Grant may become newly Pell-eligible. H.R. 4674 would expand the availability of Pell Grants in several other ways, including the following: Increase of period of eligibility (lifetime eligibility limit). Under current law, eligible students may receive Pell Grants for up to 12 full-time semesters (or the equivalent). H.R. 4674 would increase this limit to 14 full-time semesters (or the equivalent). Pell Grants to incarcerated students. H.R. 4674 would eliminate the provision in current law that prohibits persons incarcerated in federal and state facilities from receiving a Pell Grant, creating Pell eligibility for incarcerated and civilly committed persons. H.R. 4674 would restrict such persons from receiving Pell Grants while attending proprietary IHEs. Pell Grants to graduate students. Under current law, Pell Grants are limited to undergraduate students and students in some postbaccalaureate teacher education programs. H.R. 4674 would, in some cases, permit graduate students who received Pell Grants as undergraduates and have not exhausted their lifetime Pell Grant eligibility to receive Pell Grants at public and nonprofit IHEs. Under current law, Pell Grants are typically limited to programs of at least 600 clock hours, 16 semester or trimester hours, or 24 quarter hours offered over a minimum of at least 15 weeks. H.R. 4674 would create a new category of \"Job Training Federal Pell Grants\" that could be applied to shorter programs of between 150 and 600 hours and between 8 and 15 weeks. To qualify for the new grants, a training program would need to meet the following criteria: Demonstrate alignment with \"high-skill, high-wage, or in-demand\" sectors or occupations, and meet the hiring requirements of employers in those sectors or occupations. Prepare students to pursue related certificate or degree programs at an IHE by providing academic credit toward a certificate or degree program. Be provided by a public or private nonprofit IHE that is an eligible provider under the Workforce Innovation and Opportunity Act (WIOA) and that fulfills additional institutional eligibility requirements related to Secretarial approval, gainful employment, accreditation, and reporting. In many cases, the shorter term nature of the job training programs may result in a Pell Grant that is for a lesser amount than the total maximum award for a full-year, full-time student. For example, assuming a total maximum Pell Grant of $6,195 (maximum award for the current 2019-2020 award year), a student with a zero EFC pursuing a 150 clock hour program over 8 weeks would qualify for a Pell Grant of no more than $1,035, or approximately 17% of the total maximum Pell Grant award, depending on the cost of the program. HEA, Title IV, Part E establishes the operation of the Federal Perkins Loan program. Authorization to make new Perkins Loans to students expired on September 30, 2017. Borrowers of loans previously made through the Perkins Loan program remain responsible for making payments on those loans. H.R. 4674 would authorize a new Direct Perkins Loan program, which, although it would share a name and have some similarities with the curtailed Perkins Loan program (which was administered by IHEs as a campus-based program), would be significantly different. The newly created program would be a direct loan program , under which the federal government lends directly to students using federal capital and is responsible for loan servicing and collections work (which is performed primarily by contractors). Under the Direct Perkins Loan program, loans with many of the same terms and conditions as Direct Unsubsidized Loans would be made available to students, with award priority given to students demonstrating exceptional financial need. Undergraduate students would be eligible to borrow up to $5,500 annually and $27,500 in the aggregate; graduate and professional students would be eligible to borrow up to $8,000 annually and $60,000 in the aggregate through the Direct Perkins Loan Program. Annual and aggregate Direct Perkins Loan limits would be independent of annual and aggregate limits under the Direct Loan program, but aggregate limits would include loans previously made to students under the curtailed Perkins Loan program. Interest rates on Direct Perkins Loans would be fixed at 5% per year. In general, annual authority to make Direct Perkins Loans to students would be allocated to IHEs via a formula that would consider unmet student need and Pell Grant funds awarded at the IHE. However, H.R. 4674 would authorize a base guarantee for loan authority, equal to the average of an IHE's total principal amount of loans made in academic years 2012-2013 through 2016-2017 under the previously authorized Perkins Loan program. H.R. 4674 would provide mandatory appropriations for the program, not to exceed $2.4 billion in \"annual loan authority\" for AY2021-2022 and for each succeeding fiscal year. The HEA authorizes two campus-based grant programs that provide federal funds to IHEs that administer the programs and provide institutional funds to match a portion of the federal funds they receive. The institutions then distribute these funds to students using some discretion but operating within statutorily specified parameters. H.R. 4674 would make substantial but similar changes to the formulas that are used to distribute federal funds under each of the two campus-based grant programs and would increase the authorized appropriations level for each program. HEA, Title IV, Part A authorizes the FSEOG program, which provides funds to IHEs for grants to undergraduate students who demonstrate exceptional financial need. Most IHEs are required to provide matching funds so that the federal share of FSEOG is no more than 75%. In FY2019, FSEOG appropriations totaled $840 million. Under current law, FSEOG funds are distributed to IHEs using a formula that first distributes funds on the basis of what the IHEs received in past years (their base guarantee ), with the strongest base protection provided for schools that have participated in the program since at least FY1999. The remaining funds are distributed on the basis of the IHEs' proportional shares of eligible undergraduate student need (their fair share ). Beginning in FY2021, H.R. 4674 would replace the existing formula with a modified version of the fair share formula that considers unmet student need and Pell Grant funds awarded at the IHE. In FY2021, IHEs would receive the higher of their grant under the new formula or 90% of their FY2020 grant. The percentage would decline in subsequent years, and in FY2026 FSEOG allotments for all IHEs would be based entirely on the new formula. H.R. 4674 would also establish new institutional eligibility criteria that would take into account the proportion of Pell Grant recipients enrolled at an IHE. H.R. 4674 would increase the authorization of discretionary appropriations to $1.15 billion in FY2021. The authorization level would then increase by $150 million per year until reaching $1.75 billion in FY2025. The authorization level would remain at the FY2025 level for each succeeding fiscal year. H.R. 4674 would create an emergency grant program for FSEOG-participating IHEs. The program would be funded through a $12.5 million set-aside from the FSEOG appropriation for FY2021 through FY2026. Most participating IHEs would be required to provide a 50% match to participate in the program. Priority would be given to IHEs at which at least 30% of enrolled students are Pell Grant-eligible. To participate in the program, each IHE would be required, among other things, to provide assurance that emergency grant funds would be used to address \"financial challenges that would directly impact the ability of an eligible student to continue and complete [his or her] course of study.\" HEA, Title IV, Part C of the HEA authorizes the FWS programs, which provide grants to IHEs to support part-time employment for qualified undergraduate, graduate, and professional students. FWS employment may consist of work at the IHE a student attends; a private nonprofit organization; a federal, state, or local public agency; or a private for-profit organization. In FY2019, FWS appropriations were $1.13 billion. Under current law, FWS funds are distributed to IHEs using a formula similar to the current-law FSEOG formula, allocating funds on the basis of the base guarantee and fair share factors. Under H.R. 4674 , the FWS formula would be the same as the FSEOG formula. Funds would be distributed based on a modified version of the fair share formula that considers unmet student need and Pell Grant funds awarded at the IHE. In FY2021, IHEs would receive the higher of their grant under the new formula or 90% of their FY2020 grant. The percentage would decline in subsequent years, and in FY2026 FWS allotments for all IHEs would be based entirely on the new formula. H.R. 4674 would also establish new institutional eligibility criteria that would take into account the proportion of an IHE's undergraduate student population that are Pell Grant recipients and the proportion of an IHE's graduate population who have a zero EFC. H.R. 4674 would increase the authorization of discretionary appropriations to $1.5 billion in FY2021. The authorization level would increase by $250 million per year until reaching $2.5 billion in FY2025. The appropriation level would remain at the FY2025 level for each succeeding fiscal year. H.R. 4674 would reserve a portion of the FWS appropriation for a new grant program for \"improved institutions\" on the basis of the share and performance of Pell Grant recipients at the institutions. The amount reserved for this program would be the lesser of (1) 20% of the FWS appropriation in excess of $700 million or (2) $150 million. These provisions would take effect two years after enactment of H.R. 4674 . Individual eligibility for many student aid programs is contingent on student need. A key factor in determining need is assessing and establishing the ability of a student's family to pay postsecondary education costs. HEA, Title IV, Part F establishes a series of formulas that calculate a student's expected family contribution (EFC). The EFC formulas consider financial and personal characteristics of a student's family that are reported on the FAFSA. Students with lower EFCs typically qualify for more need-based aid, and students with a zero EFC qualify for the maximum amount of need-based aid. H.R. 4674 would make changes to the HEA that could reduce EFC levels and correspondingly increase aid eligibility, particularly for lower-income students. Some provisions in the bill would reduce the amount of information that some students would have to provide when completing the FAFSA. Specific changes include the following: Expansion of automatic zero EFC. Under current law, some FAFSA applicants may qualify for an automatic zero EFC if they report an adjusted gross income (AGI) level below $26,000 and meet other criteria. H.R. 4674 would increase the AGI threshold to $37,000, newly extend automatic zero eligibility to independent students without dependents, and expand the automatic zero EFC to any applicant who received a qualified means-tested benefit in the 24 months prior to application. Creation of FAFSA pathways. H.R. 4674 would create a system of three pathways in which the amount of financial information a FAFSA filer would be required to provide would be based on the filer's income and the complexity of his or her tax return. Applicants who received a means-tested benefit in the previous 24 months would not be required to provide any additional financial information beyond benefit receipt. One-time FAFSA option. Under current law, students must file a FAFSA each year that they seek aid. H.R. 4674 would create an option for students who are Pell-eligible in their first year of postsecondary education to decline to file the FAFSA in succeeding years and have their first year's EFC apply. The one-time FAFSA option would apply to the period required for the completion of a student's first undergraduate baccalaureate course of study. Streamline d procedures for foster care and homeless youth. Under current law, foster care youth and homeless youth qualify as independent students and do not have to report parental income on the FAFSA. H.R. 4674 would expand and streamline the procedures by which qualified youth can establish and verify their status. Under current law, federal student aid is limited to U.S. citizens, lawful permanent residents, and certain eligible noncitizens. Unauthorized immigrants are not eligible for federal student aid. H.R. 4674 would extend eligibility for HEA Title IV student aid to unauthorized individuals who entered the United States when they were younger than age 16 and either earned a high school diploma (or equivalent) or served in the uniformed services for at least four years. The bill would also extend eligibility to individuals who have temporary protected status and to certain unauthorized individuals who have a son or daughter who is a United States citizen or lawful permanent resident. Title IV of the HEA specifies provisions for the operation of three federal student loan programs: the William D. Ford Federal Direct Loan (Direct Loan) program, the Federal Family Education Loan (FFEL) program, and the Federal Perkins Loan program. Currently, however, new loans are authorized to be made only through the Direct Loan program. The authority to make new loans through the FFEL program expired June 30, 2010, and the authority to make new loans through the Federal Perkins Loan program expired September 30, 2017. While H.R. 4674 would make a variety of student loan reforms that apply to both the FFEL and Direct Loan programs, the discussion herein will focus on the Direct Loan program, as it is the primary federal student loan program currently in operation, is the only program currently making new loans to students and their families, and would be the primary student loan program in operation under the HEA as amended by the CAA. The Direct Loan program is authorized under HEA, Title IV, Part D, and is the largest federal program that makes available financial assistance to support students' postsecondary educational pursuits. The Direct Loan program is a federal credit program for which permanent indefinite mandatory appropriations are provided for loan subsidy costs, and annual discretionary appropriations are provided for administrative costs. Direct Loans are made to students and their families using funds borrowed by the Department of Education (ED) from the U.S. Treasury. The IHE a student attends originates and disburses Direct Loans, while federal contractors hired by ED perform loan servicing and collection functions. Several types of loans are made available through the program: Direct Subsidized Loans to undergraduate students, Direct Unsubsidized Loans to undergraduate students and graduate students, Direct PLUS Loans to graduate and professional students and the parents of undergraduate dependent students, and Direct Consolidation Loans, which enable individuals who have previously borrowed federal student loans to combine them into a single new loan. Loan terms and conditions (e.g., interest rates, borrowing limits) are specified in statute and may vary depending on the type of loan borrowed. ED estimates that in FY2020, 15.9 million new loans totaling $100.2 billion will be made through the Direct Loan program. In addition, ED estimates that 755,000 Direct Consolidation Loans totaling $46.4 billion will be made to existing borrowers of federal student loans. As of the end of the third quarter of FY2019, $1.2 trillion in principal and interest on Direct Loan program loans, borrowed by or on behalf of 34.3 million individuals, remained outstanding. H.R. 4674 would make a variety of borrower-focused reforms to the Direct Loan program. In general, many of these reforms are aimed at easing a borrower's student loan burden by amending loan terms and conditions (including loan repayment and forgiveness options) to be more generous once an individual has entered repayment on his or her loan, modifying and streamlining student loan administrative procedures, and expanding the availability of student loan refinancing options. Currently, upon entering repayment on a Direct Loan a number of terms and conditions are available to borrowers. Many of these are intended to help borrowers manage their student loan debt, but some could be detrimental in some circumstances. H.R. 4674 would make a variety of changes aimed at making student loan repayment easier and more affordable for borrowers. Currently, loan origination fees are charged to borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, and Direct PLUS Loans. These fees help offset federal loan subsidy costs by passing along some of the costs to borrowers. Loan origination fees are calculated as a proportion of the loan principal borrowed and are deducted proportionately from the proceeds of each loan disbursement to the borrower. Loan origination fees for Direct Subsidized Loans and Direct Unsubsidized Loans made on or after July 1, 2010, equal 1%. Loan origination fees for Direct PLUS Loans equal 4%. H.R. 4674 would eliminate loan origination fees. Borrowers may currently choose from among numerous loan repayment plan options, which include five broad categories: standard repayment plans, extended repayment plans, graduated repayment plans, income-driven repayment (IDR) plans, and alternative repayment plans. Several repayment plan variations exist within each of these broad categories. Under the IDR plans, in general, borrowers make monthly payments equal to one-twelfth of 10% or 15% (depending on the specific plan) of their adjusted gross income (AGI) that exceeds 150% of the federal poverty guideline applicable to their family size. Basing monthly payments on only the portion of a borrower's AGI that is above 150% of the federal poverty guidelines essentially serves as an income protection for borrowers. Under some of the IDR plans, borrowers' monthly payments are capped at the monthly amount they would have paid according to a standard 10-year repayment period, regardless of whether the calculated monthly payment based on their income would have been greater. Borrowers who make payments according to these plans may have any remaining loan balance forgiven after 20 or 25 years (depending on the specific plan) of repayment. The particular repayment plans available to an individual borrower may depend on the type of loan borrowed, the date of becoming a new borrower, or the date of entering repayment status. In general, negative amortization is permitted in the IDR plans but not other plans. H.R. 4674 would establish two new loan repayment plansâa fixed repayment plan and an income-based repayment (IBR) plan. Borrowers of Direct Loans made on or after July 1, 2021, would be required to repay their loans according to only these plans, and certain borrowers of Direct Loans made on or before June 30, 2021, would be permitted to repay according to these plans. The fixed repayment plan proposed under H.R. 4674 would be similar to some of the standard plans currently offered in the Direct Loan program (e.g., providing for fixed monthly payments with loan repayment periods equaling 10 to 25 years, depending on the loan balance). Compared to existing IDR plans, the proposed IBR plan would take a more generous approach toward protecting income from consideration when establishing monthly loan payments for many, but not all, borrowers. Under the proposed IBR plan, a borrower's monthly payments would equal one-twelfth of 10% of the amount (if any) of their adjusted gross (AGI) that exceeds a statutorily specified income protection that is indexed to the federal poverty guidelines. For borrowers with AGIs of $80,000 or less (or $160,000 or less for married borrowers), the income protection would equal 250% of the federal poverty guidelines applicable to the borrower's family size. For borrowers with AGIs that exceed $80,000 (or $160,000 for married borrowers), the income protection would decrease as his or her AGI increases and would be phased out entirely when the borrower's AGI equals or exceeds $105,000 (or $210,000 for married borrowers). For example, a single borrower with an AGI of $79,000 would pay 10% of his or her AGI that exceeds 250% of the federal poverty guidelines, whereas a single borrower with an AGI of $81,000 would pay 10% of his or her AGI that exceeds 240% of the federal poverty guidelines. No monthly payment cap would be available under the proposed IBR plan. Under this IBR plan, negative amortization would be permitted and borrowers who make payments for 20 years would be eligible to have any balance that remains forgiven. Under a limited set of circumstances, the federal government subsidizes (i.e., a borrower is relieved from paying) some or all of the interest that would otherwise accrue on loans made through the Direct Loan program. In general, interest subsidies are largely available for need-based Direct Subsidized Loans (and for the subsidized component of Direct Consolidation Loans), which are currently only being made to undergraduate students. Periods in which interest is subsidized on these loans include in-school periods while a borrower is enrolled in an eligible program on at least a half-time basis, during a six-month grace period following enrollment on at least a half-time basis, and during periods of authorized deferment. For borrowers who may be having trouble making monthly loan payments, periods of deferment and forbearance offer temporary relief from the obligation to make such payments. In general, any interest that accrues during a period of deferment or forbearance is later capitalized (i.e., becomes part of the outstanding principal balance of the loan), which increases the total amount a borrower is required to repay on his or her loan. H.R. 4674 would make Direct Subsidized Loans available to graduate and professional students enrolled at public and private, nonprofit IHEs for any period of instruction beginning on or after July 1, 2021. The interest rate on Direct Subsidized Loans to graduate students would be the same as the interest rate on Direct Unsubsidized Loans for graduate and professional students. The bill would also amend the HEA to provide that interest that accrues on any type of Direct Loan during most periods of deferment or forbearance shall not be capitalized. That is, the interest would accrue and borrowers would be required pay it, but the accrued unpaid interest would not be added to the principal balance of a loan. The HEA currently makes various loan discharge or forgiveness options available to borrowers under a variety of circumstances. In general, loan discharge is provided in cases of borrower hardship, while loan forgiveness is provided for public service or following IDR plan repayment for an extended time period. H.R. 4674 would expand borrower eligibility for various loan discharge and loan forgiveness options, two of which are described below. Among other discharge provisions, the HEA provides that ED shall specify in regulations the \"acts or omissions\" of an IHE a borrower may assert as a borrower defense to repayment (BDR). Regulations that are currently in effect specify the standards and procedures for determining whether a borrower is eligible for a BDR discharge, and newly promulgated regulations scheduled to become effective July 1, 2020, amend those standards and procedures for loans disbursed on or after July 1, 2020. Both those regulations currently in effect and those effective July 1, 2020, provide that a borrower may have his or her loan discharged in whole or in part, depending on the circumstances. The regulations that are effective July 1, 2020, are viewed by some as being less beneficial to borrowers than current regulations. H.R. 4674 would amend the HEA to more explicitly define the standards under which a borrower would be determined eligible for a BDR discharge; some, but not all, of the BDR standards applicable to loans made prior to July 1, 2020, would be applicable to Direct Loans. It would also specify that in general, BDR discharge-eligible borrowers would be entitled to have the full balance of their loan discharged, but that ED may provide partial discharge in certain circumstances. Finally, H.R. 4674 would require ED to establish procedures for the fair and timely resolution of BDR claims and would specify elements to be included in such processes, some of which are currently available to pre-July 1, 2020, borrowers, but not to post-July 1, 2020, borrowers. Among other loan forgiveness provisions, the Public Service Loan Forgiveness (PSLF) program provides Direct Loan borrowers who, on or after October 1, 2007, are employed full-time in certain public service jobs for 10 years while making 120 qualifying monthly payments on their Direct Loans with the opportunity to have any remaining balance of the principal and interest on their loans forgiven. H.R. 4674 would expand PSLF eligibility to new types of employees; specify that otherwise qualifying payments made on loans prior to consolidation into a Direct Consolidation Loan and payments made on federal loans refinanced under a newly created Refinanced Direct Loan program (discussed later in this report) would count towards the required 120 qualifying payments; and require ED to develop tools aimed at enabling borrowers to more easily determine whether they qualify for PSLF. To administer the Direct Loan program, ED has developed a variety of processes and procedures that in many instances are carried out by ED-contracted loan servicers and collection agencies. These administrative functions often focus on ensuring that borrowers qualify for and receive Direct Loan terms, conditions, and benefits (e.g., repayment under an IDR plan, loan discharge following total and permanent disability). H.R. 4674 would make a variety of changes aimed at streamlining or enhancing administrative processes for borrowers. Currently, borrowers must actively enroll in or apply for certain loan benefits, such as an IDR plan, or must apply for and provide income documentation to qualify for total and permanent disability discharge. H.R. 4674 would authorize ED to automatically take steps to make such loan benefits available to borrowers, without action from the borrower. For example, the bill would authorize ED to place certain borrowers who are at least 120 days delinquent on their loans, or who are rehabilitating their loan out of default, into the newly created IBR plan and to obtain such income and family size information as is reasonably necessary to calculate such borrowers' monthly payments under the plan. H.R. 4674 would also require ED to establish procedures to automatically recertify and recalculate a borrower's monthly repayments under the IDR plan in which he or she is enrolled, and procedures to automatically monitor a borrower's income for purposes of qualifying for a permanent and total disability loan discharge. Finally, H.R. 4674 would require ED to develop a manual of standardized administrative procedures and policies to be used by ED-contracted loan servicers and collection agencies. Currently, Direct Consolidation Loans allow individuals who have borrowed at least one loan through either the Direct Loan or FFEL program to refinance their eligible federal student loan debt by borrowing a new loan and using the proceeds to pay off their existing federal student loan obligations. Direct Consolidation Loans have fixed interest rates that are determined by calculating the weighted average of the interest rates on the loans that are consolidated, rounded up to the next higher one-eighth of a percentage point. Upon an individual obtaining a Direct Consolidation Loan, a new repayment period begins, which may be for a longer term than applied to the loans originally borrowed. Private education loans are not eligible to be refinanced into a Direct Consolidation Loan. H.R. 4674 would require ED to establish two new loan refinancing options. One option would permit qualified borrowers to refinance Direct Loan and FFEL program loans into a refinanced Direct Loan. In general, refinanced Direct Loans would have the same terms and conditions as the original loans that were refinanced; however, the refinanced Direct Loans would have a fixed interest rate pegged to specified Direct Loan program interest rates that are in effect for new loans made during the period from July 1, 2019, through June 30, 2020. Such an option could be viewed as more favorable for borrowers who have existing loans with higher interest rates. The interest rates that would be applicable to refinanced Direct Loans are as follows: where the loan being refinanced is a FFEL or Direct Loan program Subsidized Loan or Unsubsidized Loan issued to an undergraduate student, 4.53%; where the loan being refinanced is a FFEL or Direct Loan program Subsidized Loan or Unsubsidized Loan issued to a graduate or professional student, 6.08%; where the loan being refinanced is a FFEL or Direct Loan program PLUS Loan issued to a graduate/professional student or a parent of a dependent undergraduate student, 7.08%; and where the loan being refinanced is a FFEL or Direct Loan program Consolidation Loan, the weighted average of the lesser of (1) the interest rates described above, as would be applicable to the original loans ( component loans ) discharged due to consolidation or (2) the original interest rate of the component loan. Obtaining a refinanced Direct Loan would not result in the start of a new repayment period. The second option would permit qualified borrowers to refinance private education loans into a Federal Direct Refinanced Private Loan. In general, a Federal Direct Refinanced Private Loan would have the same terms and conditions as a Federal Direct Unsubsidized Loan; however, certain student loan forgiveness benefits available for Direct Loan borrowers (e.g., PSLF) would not be included. Federal Direct Refinanced Private Loans would have a fixed interest rate pegged to specified Direct Loan program interest rates that are in effect for new loans made during the period from July 1, 2019, through June 30, 2020. The interest rates that would be applicable to Federal Direct Refinanced Private Loans are as follows: where the loan being refinanced was borrowed for undergraduate study, 4.53%; where the loan being refinanced was borrowed for graduate or professional study, 6.08%; and where the loan being refinanced was for both undergraduate study and graduate or professional study, 7.08%. A Federal Direct Refinanced Private Loan would not count against a borrower's annual or aggregate Direct Loan limits. Currently, the HEA provides for institutional accountability measures through many of its provisions. Some measures address educational accountability, which relates to institutions providing a quality education (e.g., accreditation requirements). Other measures address fiscal accountability, which relates to institutional financial health and whether institutions are good stewards of federal student aid funds. In addition, some laws outside of the HEA seek to hold institutions accountable in other areas. These include, but are not limited to, Title IX of the Education Amendments of 1972 (Title IX), which conditions receipt of federal funds on an institution (or other entity) ensuring it does not discriminate on the basis of sex in educational programs or activities. H.R. 4674 would address educational and fiscal accountability requirements, as well as Title IX requirements. The changes discussed below, along with other provisions of H.R. 4674 , signal a congressional interest in strengthening accountability requirements across all types of IHEs and their educational programs, in general, while focusing on greater accountability in the Title IV programs, and for proprietary IHEs in particular. Educational accountability relates to attempts to ensure IHEs are providing a quality educational program, and it may be assessed in a variety of ways. H.R. 4674 would address educational accountability in several ways, which largely relate to the Title IV student aid programs. To participate in the Title IV student aid programs, IHEs must be accredited by an agency that is recognized by ED as a reliable authority regarding the quality of education offered at the IHE. The HEA currently specifies the recognition criteria to be used by ED. In accordance with statute, an accreditation agency's institutional quality evaluation standards must assess, among other items, \"student achievement in relation to [an] institution's mission.\" Such evaluation standards mayâbut are not required toâinclude, as applicable, course completion, passage of state licensing exams, and job placement rates. While accrediting agencies' evaluation standards are guided, in part, by such federal requirements, specific standards are adopted by individual agencies and vary among them. Accreditation agencies may also have varying procedures as well. For instance, agencies may have varying definitions for actions taken against IHEs (e.g., warning, probation) and differing policies regarding the information they publicly disclose about the IHEs they accredit. H.R. 4674 would partially standardize practices among agencies and bring additional transparency to accrediting agency and ED practices in this realm. The bill would newly require accrediting agencies to evaluate specified student educational outcomes (i.e., completion, progress toward completion, and workforce participation), but would permit agencies to establish different measures of such outcomes for different institutions. For example, an agency would be required to evaluate an IHE's \"workforce participation\" outcomes, but could measure an IHE's performance under that outcome by measuring rates of licensure or job placement. H.R. 4674 would also require ED to establish standardized definitions for the various actions accrediting agencies may take and for public notice and disclosure requirements with respect to the actions taken. Finally, the bill would make some changes to the processes ED uses to recognize accrediting agencies, including adding a requirement to make accrediting agencies' applications for recognition publicly available, and requirements to submit to Congress information relating to ED's accrediting agency recognition decisions. H.R. 4674 would establish new Title IV institutional participation accountability metrics. One would measure on-time repayment ratesâ the extent to which students who borrowed Title IV loans to attend an IHE are able to make payments on their loans in a timely manner (i.e., the percentage of borrowers who have paid at least 90% of their monthly payments during a three-year period). Another would measure instructional spendingâ an IHE's instructional expenditures relative to revenues derived from tuition and fees (i.e., determining if instructional expenditures equal at least one-third of the amount of revenue derived from tuition and fees for each of the three most recent institutional fiscal years). It appears that a presumption behind these measures would be that if an IHE is of sufficient quality, then individuals who borrow to attend it should be able to earn adequate wages to make timely payments on their loans and that the IHE would be spending a reasonable amount of tuition and fees revenues on instruction rather than other items, such as marketing. Under the bill, the current institutional cohort default rate (CDR) metric, which is applicable to IHEs participating in federal student loan programs and measures the number of an IHE's federal student loan recipients who enter repayment and subsequently default within a certain period of time, would be phased out. Under current law, an IHE is subject to loss of Direct Loan program eligibility if its CDR is 40% or greater for one year, and is subject to loss of Direct Loan program and Pell Grant program eligibility if its CDR is 30% or greater for three consecutive years. The CDR metric would be replaced with a new adjusted cohort default rate , which would be similar to the current CDR metric, but would also take into account the relative risk an IHE may pose to students and taxpayers by multiplying the CDR by the percentage of students enrolled at the IHE who borrowed Title IV loans. IHEs would be subject to loss of Title IV eligibility if they met one of three separate thresholds: (1) an adjusted CDR that is greater than 20% for each of the three most recent years, (2) an adjusted CDR that is greater than 15% for each of the six most recent fiscal years, or (3) an adjusted CDR that is greater than 10% for each of the eight most recent fiscal years. This structure would penalize IHEs with adjusted CDRs that remain consistently too high over long periods. Finally, H.R. 4674 would specify that borrowers in forbearance for three or more years would be considered in default for purposes of calculating the adjusted CDR. The bill would additionally require ED to establish metrics that would assess the extent to which certain types of sub-baccalaureate educational programs at public and nonprofit IHEs and most educational programs (including degree programs) at proprietary IHEs prepare students for gainful employment in a recognized occupation. In creating the metrics, ED would be required to establish a debt-to-earnings rate meeting specified general criteria to measure gainful employment program enrollees' educational debt relative to their earnings. Fiscal accountability requirements relate to institutional financial health and whether IHEs are good stewards of federal student aid funds. H.R. 4674 would make several changes to current fiscal accountability requirements. IHEs are required to be financially responsible to participate in the Title IV programs. IHEs that fail to meet certain financial responsibility standards may continue to participate in the Title IV programs only if they meet additional requirements, including posting a letter of credit (a financial guarantee) to ED. H.R. 4674 would revise the conditions under which IHEs are considered financially responsible. It would expand on the instances in which an IHE may be required to post a letter of credit to ED for continued participation in the Title IV programs. The bill would specify that ED may not consider a private nonprofit or proprietary IHE financially responsible if it is required to submit a teach-out plan to its accreditor or is subject to a specified amount of pending or approved borrower defense to repayment claims. Additional circumstances under which ED would be prohibited from considering a proprietary IHE financially responsible would also be stipulated. H.R. 4674 would additionally specify the circumstances under which ED would be required to redetermine whether an IHE is financially responsible. Such circumstances would apply to both private nonprofit and proprietary IHEs. They would include instances in which an IHE is required to pay a material debt or liability arising from a judicial, administrative, or judicial proceeding and in which an IHE is involved in a lawsuit for financial relief related to the making of Direct Loans. H.R. 4674 would also specify circumstances under which ED would be permitted to redetermine whether an IHE is financially responsible, which would be applicable to all types of institutions, including public IHEs. Such circumstances would include a determination that ED will be likely to receive a significant number of borrower defense to repayment claims, a citation by a state authorizing agency for failure to meet state requirements, and high annual dropout rates. H.R. 4674 would amend the 90/10 Rule, under which proprietary IHEs currently must derive at least 10% of their revenues from non-Title IV sources or lose Title IV eligibility after failure to do so for two consecutive years. The bill would specify that proprietary IHEs must derive at least 15% of their revenues from sources other than federal education assistance funds, which would include, but not be limited to, Title IV funds and Post-9/11 GI Bill funds. It would further establish that failure to meet the requirement in a single year would result in an automatic loss of Title IV eligibility. In addition, the bill would limit marketing, recruitment, advertising, and lobbying expenditures for IHEs that are determined to have spent less than an amount equal to one-third of their tuition and fees revenues on instruction. IHEs that do not limit such spending for two consecutive fiscal years would lose Title IV eligibility. Title IX prohibits discrimination on the basis of sex in education programs and activities receiving federal financial assistance. On November 29, 2018, ED proposed to amend the regulations that implement Title IX to clarify and modify requirements of elementary, secondary, and postsecondary schools regarding incident response, remedies, and other issues. H.R. 4674 would prohibit ED from implementing or enforcing the proposed Title IX regulations, or proposing or issuing regulations that are substantially similar to the November 2018 proposed regulations. The HEA establishes a set of measures related to public accountability, transparency, and consumer information. In general, these provisions are intended to provide information to consumers to enable them to make informed college-going and financial decisions. Currently, the HEA addresses issues related to college affordability and the collection and dissemination of consumer information to students and the public by requiring ED, among other things, to administer the College Navigator website, through which certain consumer information about IHEs is made publicly available, and by requiring IHEs to make Net Price Calculators, a primary consumer information tool authorized under the HEA, available on their websites. Net Price Calculators allow prospective students to obtain individual estimates of the net price of an IHE, taking into account the financial aid they might be likely to receive. The HEA currently prohibits the creation of a new postsecondary student unit record system (SURS), which could be used to track individual students' financing of their schooling, participation in and completion of academic programs, and post-program outcomes over time. The SURS ban was established in the interest of protecting student privacy and limits the granularity and quality of data available on the outcomes of IHEs' students. In addition, the HEA currently requires that certain Direct Loan borrowers undergo loan entrance counseling prior to loan disbursement, and that certain borrowers undergo exit counseling after dropping below half-time enrollment. Both of these requirements are intended to help ensure that borrowers are aware of their loan terms and conditions and of the potential consequences of borrowing a student loan. H.R. 4674 would amend the HEA to take a more expansive approach to public accountability, transparency, and consumer information requirements. Many of these changes represent congressional interest in providing consumers with additional and more-nuanced information, potentially helping them make more-informed college-going and student loan borrowing decisions. Perhaps most notably, H.R. 4674 would repeal the current prohibition on the creation of a new SURS and require ED to develop a postsecondary student-level data system to use in evaluating a variety of metrics such as student enrollment, progression, completion, and post-collegiate outcomes (e.g., earnings, employment rates, and loan repayment rates). Summary aggregate information from this system would be made publicly available. H.R. 4674 would also amend provisions relating to Net Price Calculators by requiring IHEs to provide more-detailed information regarding their costs of attendance and estimated aid that may be available to individual students. The bill would make changes to the information IHEs are required to provide to individuals before and after receipt of federal student aid. For instance, H.R. 4674 would require ED to develop a standardized financial aid offer letter to be used by IHEs, which would enable students to compare financial aid offers from multiple IHEs. It would also require all borrowers to receive counseling in each year that they receive a Title IV student loan to assist them in understanding the terms and conditions of the loan and the potential consequences of accepting such aid. In addition to federal student aid, which provides direct financial assistance to individual students that can be applied toward their cost of attendance, the HEA provides additional academic and personal supports to certain student populations. These supports are typically administered through grants to IHEs or other qualified entities. H.R. 4674 would create a number of new programs to support students, and would extend a number of existing programs. H.R. 4674 would create the following programs: Student Success Fund . This would be a new program of grants to states or Indian tribes to carry out plans \"to implement promising and evidence-based institutional reforms and innovative practices to improve student outcomes\" including transfer and completion. States and some tribes would be required to match a portion of the federal grant, with the nonfederal amount increasing to 100% of the federal amount by the ninth year. H.R. 4674 would authorize $500 million in mandatory appropriations per year for FY2021 and each succeeding fiscal year. Pell Bonus Program . This would be a new grant program providing support to qualified public and nonprofit IHEs with qualified shares of Pell Grant recipients. IHEs could use the funds for \"financial aid and student support services.\" Funds would be allotted to institutions based on their relative share of bachelor's degrees awarded to all Pell Grant recipients. H.R. 4674 would authorize mandatory appropriations of $500 million per year for FY2021 and each succeeding fiscal year. Remedial Education Grants . This would make funds available to IHEs or applicable partnerships to \"improve remedial education in higher education.\" Grantees would employ models specified in the legislation and be evaluated on the basis of their programs' effectiveness in increasing course and degree completion. H.R. 4674 would authorize $162.5 million in discretionary appropriations per year for FY2021 through FY2026. Grants for Improving Access to and Success in Higher Education for Foster Youth and Homeless Youth . This would be a new formula grant program to states to (1) develop a statewide initiative to support foster and homeless youth transitioning into postsecondary education and (2) offer subgrants to public and private nonprofit IHEs to improve postsecondary persistence and completion by such students. H.R. 4674 would authorize discretionary appropriations of $150 million for FY2021 and authorize an inflation-adjusted amount for each year through FY2026. Jumpstart to College . This would be a new grant program providing funds to states and public and private nonprofit IHEs to establish and support early college or dual and concurrent enrollment programs. H.R. 4674 would authorize $250 million in discretionary appropriations per year for FY2021 through FY2026. H.R. 4674 would extend the authorization of a number of existing student support programs. In most, but not all, cases the authorization of appropriations in H.R. 4674 would be above the current law levels. In terms of the authorized funding level, one of the most substantial extensions is to the TRIO programs, a group of programs that provide grants to IHEs and other organizations to furnish academic support services to disadvantaged students. H.R. 4674 would authorize discretionary appropriations of $1.12 billion for FY2021 and the authorization level would be adjusted for inflation in each of the five succeeding fiscal years. In FY2019, TRIO appropriations were $1.06 billion. In terms of increases to authorization levels relative to the most recent funding level, one of the largest increases would be to the Child Care Access Means Parents in School (CCAMPIS) program, which provides grants to IHEs to promote the participation of low-income parents in postsecondary education through the availability of child care services. H.R. 4674 would authorize $200 million per year for FY2021 and each of the five succeeding fiscal years. In FY2019, appropriations for this program were $50 million. The HEA authorizes programs intended to provide grants and other financial support to IHEs that serve high concentrations of minority and/or needy students to help strengthen the IHEs' academic, administrative, and financial capabilities. Typically, these institutions are called minority serving institutions (MSIs). Among the MSI programs, the HEA authorizes separate grant programs for distinct types of MSIs, including the following: American Indian Tribally Controlled Colleges and Universities, Alaska Native and Native-Hawaiian-serving Institutions, Predominantly Black Institutions, Native American-serving, Nontribal Institutions, Predominantly Black Institutions, Asian American and Native American Pacific Islander-serving Institutions, Historically Black Colleges and Universities, and Hispanic Serving Institutions. Many of these MSI programs have been funded through annual discretionary and mandatory appropriations. As of when H.R. 4674 was ordered to be reported, mandatory appropriations, authorized under HEA Section 371, for several of these programs had expired at the end of FY2019. In FY2019, these mandatory appropriations totaled $239 million. H.R. 4674 would permanently authorize mandatory appropriations under HEA Section 371 at a total of $300 million annually. It would also extend and increase the authorization of discretionary appropriations for each of the MSI programs through FY2026. In addition, H.R. 4674 would reauthorize discretionary and mandatory appropriations for several MSI programs that have not received appropriations in several years, such as the Endowment Challenge Grant program, and would create several new grant programs to support MSIs, each supported with discretionary appropriations. H.R. 4674 would also amend and reauthorize through FY2026 a statute outside of the HEAâthe Tribally Controlled Colleges and Universities Assistance Act of 1978âwhich authorizes discretionary appropriations for grants to Tribally Controlled Colleges and Universities. H.R. 4674 would create a new HEA, Title IV, Part J. The programs authorized in this part would provide grants to states, Indian tribes, and IHEs, with the primary focus of eliminating or reducing tuition and fees at community colleges and other postsecondary institutions. H.R. 4674 would authorize new grants to states to support community colleges in waiving tuition and fees for eligible students. Qualified Indian tribes would also be eligible. The program would define an eligible student as a student who attends a community college on a not less than half-time basis, either qualifies for in-state resident community college tuition or would qualify for in-state community college tuition but for his or her immigration status, and meets certain other criteria. A student would not need to meet financial criteria to qualify as an eligible student. H.R. 4674 would provide permanent mandatory appropriations beginning in FY2021. The funding level would incrementally increase from $1,569,700,000 in FY2021 to $16,296,080,000 in FY2030. Mandatory appropriations would be provided at the FY2030 level in succeeding years. Funds would be allocated to states via a formula. The bill would direct ED to develop a formula based on each participating state's share of eligible students and other factors. Each participating state would be eligible to receive, on a per eligible student basis, an amount equal to at least 75% of the national average resident community college tuition and fees. States would be required to provide, on a per eligible student basis, a nonfederal share equal to 25% of the national average resident community college tuition and fees. As a condition of receiving a grant under this program, a state would be required to waive tuition and fees for eligible students attending community colleges within the state. An eligible student would be allowed to use other financial aid for which he or she qualifies, such as Pell Grants, for other components of the cost of attendance, such as housing and transportation. To prevent state and local disinvestment in community colleges, H.R. 4674 would require that funds under this grant supplement and not supplant other federal, state, and local funds. The program would include maintenance of effort requirements that would require participating states to provide financial support equal to or greater than the average amount provided in the three preceding years for public higher education; operational expenses for public, four-year colleges; and need-based financial aid. H.R. 4674 would create three new programs that would provide grants to each of (1) Historically Black Colleges and Universities (HBCUs), (2) Tribally Controlled Colleges and Universities (TCCUs), and (3) Minority-Serving Institutions (MSIs) to \"waive or significantly reduce tuition and fees for eligible students â¦ for not more than the first 60 credits an eligible student enrolls at the participating institution.\" Grants would be available to four-year institutions of each type and would not require a nonfederal match. An institution's grant would equal the actual cost of tuition and fees at the institution (not to exceed the national average tuition and fees at a public four-year IHE), multiplied by the number of eligible students enrolled at the institution. Eligible institutions would be HBCUs, TCCUs, and MSIs that have a student body of at least 35% low-income students and meet other criteria related to student services and supports. Eligible students would include new enrollees or transfers from a community college. H.R. 4674 would provide permanent mandatory funding beginning in FY2021. The funding level would incrementally increase from $63,250,000 in FY2021 to $1,626,040,000 in FY2030. Mandatory appropriations would be provided at the FY2030 level in succeeding years. H.R. 4674 would authorize discretionary appropriations for such sums as necessary in FY2021 and each succeeding fiscal year to support additional new grant programs. First, the bill would create a new series of formula grants to states to provide grants to individual students with unmet financial need. These grants would initially be available to Pell Grant recipients at public IHEs. Once all eligible Pell Grant recipients received grants, the aid would be extended to other students at public IHEs. ED would also be authorized, under certain circumstances, to carry out a similar grant program for students at private nonprofit IHEs. The bill would authorize another grant program for states to award grants to participating four-year IHEs to waive resident tuition and fees in cases where all eligible students have received the above grants for unmet need. Both sets of programs would generally have a federal share of 75% and a nonfederal share of 25%.", "summary": "The Higher Education Act of 1965 (HEA; P.L. 89-329, as amended) authorizes programs and activities to provide support to individuals who are pursuing a postsecondary education and to institutions of higher education (IHEs). During the 116 th Congress, the House Committee on Education and Labor marked up and ordered to be reported the College Affordability Act ( H.R. 4674 ), which would provide for the comprehensive reauthorization of most HEA programs. This report organizes the changes proposed by H.R. 4674 into seven themes: Expanding the availability of financial aid to postsecondary students . This would primarily be accomplished by increasing funding available through grant programs and by expanding student aid eligibility criteria. This includes increasing the total maximum Pell Grant award and expanding Pell Grant eligibility to new subsets of students, increasing funding for existing student aid programs, creating a new Direct Perkins Loans program, and modifying the need assessment and Free Application for Federal Student Aid filing process. I nstitutin g borrower-focused student loan reforms . This set of proposed changes aims to ease a borrower's student loan burden. It includes amending loan terms and conditions to be more generous once an individual has entered repayment on his or her loan, modifying and making efforts to streamline student loan administrative procedures, and expanding the availability of student loan refinancing options. Modifying educational, financial, and other institutional accountability requirements for receipt of federal funds. With respect to requirements IHEs must meet to participate in the Title IV federal student aid programs, these proposed changes include revising accreditation requirements, adjusting current participation metrics, and creating new participation metrics. They also include addressing regulatory requirements of Title IX of the Education Amendments of 1972, which prohibits discrimination on the basis of sex in educational programs or activities receiving federal funds. Revising public accountability, transparency, and consumer information requirements . This would primarily be accomplished by providing consumers with additional and more nuanced information to make more informed college-going and student loan borrowing decisions. Proposed changes include repealing the student unit record system ban and requiring annual student loan counseling. Expanding academic and personal supports to specific student populations. Proposed changes include creating several new programs and reauthorizing and increasing the authorization of appropriations for several existing programs, such as TRIO and Child Care Access Means Parents in School. Increasing financial support to IHEs , focusing on minority-serving institutions. These proposals involve reauthorizing and increasing the authorization of appropriations for numerous institutional support programs. Creating new grant programs for states and IHEs to reduce students' postsecondary costs . This would be accomplished by authorizing grants to support a federal-state partnership to provide tuition-free community college.", "document_type": "crs"}
{"report": "The U.S. farm sector is vast and varied. It encompasses production activities related to traditional field crops (such as corn, soybeans, wheat, and cotton) and livestock and poultry products (including meat, dairy, and eggs), as well as fruits, tree nuts, and vegetables. In addition, U.S. agricultural output includes greenhouse and nursery products, forest products, custom work, machine hire, and other farm-related activities. The intensity and economic importance of each of these activities, as well as their underlying market structure and production processes, vary regionally based on the agro-climatic setting, market conditions, and other factors. As a result, farm income and rural economic conditions may vary substantially across the United States. Annual U.S. net farm income is the single most watched indicator of farm sector well-being, as it captures and reflects the entirety of economic activity across the range of production processes, input expenses, and marketing conditions that have prevailed during a specific time period. When national net farm income is reported together with a measure of the national farm debt-to-asset ratio, the two summary statistics provide a quick and widely referenced indicator of the economic well-being of the national farm economy. In the third of three official U.S. farm income outlook releases scheduled for 2019 (see shaded box below), ERS projects that U.S. net farm income will rise 10.2% in 2019 to $92.5 billion, up $8.5 billion from last year. Net cash income (calculated on a cash-flow basis) is also projected higher in 2019 (+15.0%) at $119.0 billion. The November forecast of $92.5 billion is 6.3% above the 10-year average of $87.0 billion but is well below 2013's record high of $123.7 billion. The November 2019 net farm income forecast represents an increase from both USDA's preliminary March 2019 forecast of $69.4 billion, and the August 2019 forecast of $88.0 billion ( Table A-1 ). The initial March forecast did not anticipate the second round of MFP payments (valued at up to $14.5 billion). The increase in government support in 2019, projected at $22.4 billion and up 64.0% from 2018, is the principal driver behind the rise in net farm incomeâboth year-to-year and from the previous two forecasts. Support from traditional farm programs is expected to be bolstered by large direct government payments in response to trade retaliation under the trade war with China. Direct government payments of $22.4 billion in 2019, if realized, would represent 24.2% of net farm incomeâthe largest share since a 27.6% share in 2006. For historical perspective, both net cash income and net farm income achieved record highs in 2013 but fell to recent lows in 2016 ( Figure 1 ) before trending higher in each of the past three years (2017, 2018, and 2019). When adjusted for inflation and represented in 2019 dollars ( Figure 2 ), the net farm income for 2019 is projected to be on par with the average of $86.8 billion for net farm income since 1940. Global demand for U.S. agricultural exports ( Figure 18 ) is projected at $134.5 billion in 2019, down from 2018 (-6.2%), due largely to a decline in sales to China. Farm asset values and debt levels are projected to reach record levels in 2019âasset values at $3.1 trillion (+2.1%) and farm debt at $415.5 billion (+3.4%)âpushing the projected debt-to-asset ratio up to 13.5%, the highest level since 2003 ( Figure 23 ). For 2019, USDA forecasts that prices for most major commoditiesâbarley, soybeans, sorghum, oats, rice, hogs, and milkâwill be up slightly from 2018, while cotton, wheat, choice steers, broilers, and eggs are expected to be lower ( Table A-4 ). However, these projections are subject to substantial uncertainty associated with international commodity markets. Abundant domestic and international supplies of grains and oilseeds contributed to a fifth straight year of relatively weak commodity prices in 2019 ( Figure A-1 through Figure A-4 , and Table A-4 ). Furthermore, prospects for market conditions heading into 2020 remain uncertain. Three major factors have dominated U.S. agricultural markets during 2019, and have contributed to uncertainty over both supply and demand prospects, as well as market prices, heading into 2020. First, large domestic supplies of corn, soybeans, wheat, and cotton were carried over into 2019 ( Figure 3 ). Large corn and soybean stocks have kept pressure on commodity prices throughout the grain and feed complex in 2019. Second, adverse weather conditions during the spring planting and fall harvesting periods have contributed to market uncertainty regarding the size of the 2019 corn and soybean crops. Third, the U.S.-China trade dispute has led to declines in U.S. exports to Chinaâa major market for U.S. agricultural productsâand added to market uncertainty. In particular, the United States lost its dominant role in the world's preeminent market for soybeansâChina. It is unclear how soon, if at all, the United States may resolve its trade dispute with China or how international demand may evolve heading into 2020. Corn and soybeans are the two largest U.S. commercial crops in terms of both value and acreage. For the past several years, U.S. corn and soybean crops have experienced strong growth in both productivity and output, thus helping to build stockpiles at the end of the marketing year. In 2018, U.S. farmers produced a record U.S. soybean harvest of 4.5 billion bushels and record ending stocks (913 million bushels or a 23.0% stocks-to-use ratio) that year ( Figure 3 ). The record soybean harvest in 2018, combined with the sudden loss of the Chinese soybean market (as discussed in the \" Agricultural Trade Outlook \" section of this report), kept downward pressure on U.S. soybean prices. A smaller crop and lower stocks are projected for 2019; however, the reduction in volume of U.S. soybean exports to China has prevented a major price recovery. Similarly, several consecutive years of bumper U.S. corn crops have built domestic corn supplies. U.S. corn ending stocks in 2019 are projected to approach or surpass 2 billion bushels for the fourth consecutive year. U.S. wheat and cotton supplies are also projected to remain high relative to use, thus keeping downward pressure on farm prices. U.S. agricultural production activity got off to a late start in 2019 due to prolonged cool, wet conditions throughout the major growing regions, particularly in states across the eastern Corn Belt and the Dakotas. This resulted in record large \"prevented plant\" acres (reported at 19.6 million acres by the Farm Service Agency) and delays in the planting of the corn and soybean crops, especially in Illinois, Michigan, Ohio, Wisconsin, and North and South Dakota. Traditionally, 96% of the U.S. corn crop is planted by June 2, but in 2019 67% of the crop had been planted by that date. Similarly, the U.S. soybean crop was planted with substantial delays. By June 16, 77% of the U.S. soybean crop was planted, whereas an average of 93% of the crop has been planted by that date during the past five years. These planting delays have significant implications for crop development because they push both crops' growing cycle into hotter, drier periods of the summer than usual and increase the risk of plant growth being shut off by an early freeze, thus preventing the plants from achieving their maximum yield potential. Then, in the fall, early bouts of cold, wet conditions delayed corn and soybean harvests in the Western Corn Belt and produced high-moisture crops, requiring costly drying prior to storage. Many farmers left crops in the field unharvested due to wet fields or the lack of access to sufficient propane to dry wet crops. As of December 2, 2019, nearly 11% of the corn crop remained unharvested. The United States is traditionally one of the world's leading exporters of corn, soybeans, and soybean productsâvegetable oil and meal. During the recent five-year period from marketing year 2013/2014 to 2017/2018, the United States exported 49% of its soybean production and 15% of its corn crop. Thus, the export outlook for both of these crops is critical to farm sector profitability and regional economic activity across large swaths of the United States as well as in international markets. However, the tariff-related trade dispute between the United States and China (as well as several other major trading partners) has resulted in lower purchases of U.S. agricultural products by China in calendar years 2018 and 2019, and has cast uncertainty over the outlook for the U.S. agricultural sector, including the corn and soybean markets. Because the livestock sectors (particularly dairy and cattle, but hogs and poultry to a lesser degree) have longer biological lags and often require large capital investments up front, they are slower to adjust to changing market conditions than is the crop sector. As a result, USDA projects livestock and dairy production and prices an extra year into the future (compared with the crop sector) through 2020, and market participants consider this expanded outlook when deciding their market interactionsâbuy, sell, invest, etc. During the 2007-2014 period, high feed and forage prices plus widespread drought in the Southern Plainsâthe largest U.S. cattle production regionâresulted in an 8% contraction of the U.S. cattle inventory. Reduced beef supplies led to higher producer and consumer prices and record profitability among cow-calf producers in 2014. This was coupled with then-improved forage conditions, all of which helped to trigger the slow rebuilding phase in the cattle cycle that started in 2014 ( Figure 4 ). The expansion continued through 2018, despite weakening profitability, primarily due to the lag in the biological response to the strong market price signals of late 2014. The cattle expansion appears to have levelled off in 2019, with the estimated cattle and calf population unchanged from a year earlier at 103 million. Another factor working against continued expansion in cattle numbers is that producers are now producing more beef with fewer cattle as a result of heavier weights for marketed cattle. Similar to the cattle sector, U.S. hog and poultry flocks have been growing in recent years and are expected to continue to expand in 2019. For 2019, USDA projects production of beef (+0.6%), pork (+5.0%), broilers (+2.7%), and eggs (+2.5%) to expand robustly heading into 2020. This growth in protein production is expected to be followed by continued positive growth rates in 2020: beef (+1.9%), pork (+3.8%), broilers (+1.8%), and eggs (+0.8%). A key uncertainty for the meat-producing sector is whether demand will expand rapidly enough to absorb the continued growth in output or whether surplus production will begin to pressure prices lower. USDA projects that combined domestic and export demand for 2019 will continue to grow for red meat (+6.2%)âdriven primarily by demand for pork productsâbut flatten for poultry (+0.0%). The changing conditions for the U.S. livestock sector may be tracked by the evolution of the ratios of livestock output prices to feed costs ( Figure 5 ). A higher ratio suggests greater profitability for producers. The cattle-, hog-, and broiler-to-feed margins have all exhibited significant volatility during the 2017-2019 period. The hog, broiler, and cattle feed ratios have trended downward during 2018 and 2019, suggesting eroding profitability. The milk-to-feed price ratio has trended upward from mid-2018 into 2019. While this result varies widely across the United States, many small or marginally profitable cattle, hog, broiler, and milk producers face continued financial difficulties. Continued production growth of between 1% and 4% for red meat and poultry suggests that prices are vulnerable to weakness in demand. However, USDA projects that the price outlook for cattle, hogs, and poultry is expected to turn upward in 2020 ( Table A-4 ). Similarly, U.S. milk production is projected to continue growing in 2019 (+0.5%) and 2020 (+1.7%). Despite this growth, USDA projects U.S. milk prices up in both 2019 (+14.4%) and 2020 (1.3%). Projected farm-sector revenue sources in 2019 include crop revenues (46% of sector revenues), livestock receipts (41%), government payments (5%), and other farm-related income (8%), including crop insurance indemnities, machine hire, and custom work. Total farm sector gross cash income for 2019 is projected to be up (+3.9%) to $431.0 billion, driven by increases in both direct government payments (+64.0%) and other farm-related income (+18.1%). Cash receipts from crop receipts (+1.0%) and livestock product (+0.1%) are up (+0.6%) in the aggregate ( Figure 6 ). Total crop sales peaked in 2012 at $231.6 billion when a nationwide drought pushed commodity prices to record or near-record levels. In 2019, crop sales are projected at $197.4 billion, up 1.0% from 2018 ( Figure 7 ). Projections for 2019 and percentage changes from 2018 include Feed cropsâcorn, barley, oats, sorghum, and hay: $59.6 billion (+4.5%); Oil cropsâsoybeans, peanuts, and other oilseeds: $37.6 billion (-5.2%); Fruits and nuts: $29.4 billion (+1.3%); Vegetables and melons: $20.4 billion (+10.0%); Food grainsâwheat and rice: $11.3 billion (-7.2%); Cotton: $7.4 billion (-8.5%); and Other crops including tobacco, sugar, greenhouse, and nursery: $31.3 billion (+3.4%). The livestock sector includes cattle, hogs, sheep, poultry and eggs, dairy, and other minor activities. Cash receipts for the livestock sector grew steadily from 2009 to 2014, when it peaked at a record $212.3 billion. However, the sector turned downward in 2015 (-10.7%) and again in 2016 (-14.1%), driven largely by projected year-over-year price declines across major livestock categories ( Table A-4 and Figure 9 ). In 2017, livestock sector cash receipts recovered with year-to-year growth of 8.1% to $175.6 billion. In 2018, cash receipts increased slightly (+0.6%). In 2019, cash receipts are projected up slightly (+0.1%) for the sector at $176.8 billion as increased hog and dairy sales offset declines in poultry and cattle. Projections for 2019 (and percentage changes from 2018) include Cattle and calf sales: $66.5 billion (-0.9%); Poultry and egg sales: $40.0 billion (-13.6%); Dairy sales: valued at $39.9 billion (+13.2%); Hog sales: $23.5 billion (+11.2%); and Miscellaneous livestock: valued at $7.0 billion (+2.1%). Historically, government payments have included Direct payments (decoupled payments based on historical planted acres), Price-contingent payments (program outlays linked to market conditions), Conservation payments (including the Conservation Reserve Program and other environmental-based outlays), Ad hoc and emergency disaster assistance payments (including emergency supplemental crop and livestock disaster payments and market loss assistance payments for relief of low commodity prices), and Other miscellaneous outlays (including market facilitation payments, cotton ginning cost-share, biomass crop assistance program, peanut quota buyout, milk income loss, tobacco transition, and other miscellaneous payments). Projected government payments of $22.4 billion in 2019 would be up 64.0% from 2018 and would be the largest taxpayer transfer to the agriculture sector (in absolute dollars) since 2005 ( Figure 11 and Table A-1 ). The projected surge in federal subsidies is driven by large \"trade-damage\" payments made under the MFP initiated by USDA in response to the U.S.-China trade dispute. MFP payments (reported to be $14.3 billion) in 2019 include outlays from the 2018 MFP program that were not received by producers until 2019, as well as expected payments under the first and second tranches of the 2019 MFP program. USDA ad hoc disaster assistance is projected higher year-over-year at $1.7 billion (+90.7%). Most of the $1.7 billion comes from a new, temporary program, the Wildfire and Hurricane Indemnity Program Plus (WHIP+) enacted through the Disaster Relief Act of 2019 ( P.L. 116-20 ). Payments under the Agricultural Risk Coverage and Price Loss Coverage programs are projected lower (-19.0%) in 2019 at a combined $2.6 billion compared with an estimated $3.2 billion in 2018 (see \"Price Contingent\" in Figure 11 ). Conservation programs include all conservation programs operated by USDA's Farm Service Agency and the Natural Resources Conservation Service that provide direct payments to producers. Estimated conservation payments of $3.5 billion are forecast for 2019, down (-11.3%) from $4.0 billion in 2018. Total government payments of $22.4 billion represents a 5% share of projected gross cash income of $425.3 billion in 2019 ( Figure 6 ). In contrast, government payments are expected to represent 24% of the projected net farm income of $92.5 billion. If realized, this would be the largest share since 2006 ( Figure 12 ). The government share of net farm income reached a peak of 65.2% in 1984 during the height of the farm crisis of the 1980s. The importance of government payments as a percentage of net farm income varies nationally by crop and livestock sector and by region. The 2018 farm bill ( P.L. 115-334 ) made several changes to the previous Margin Protection Program (MPP), including a new nameâthe Dairy Margin Coverage (DMC) programâand expanded margin coverage choices from the original range of $4.00-$8.00 per hundredweight (cwt.). Under the 2018 farm bill, milk producers have the option of covering the milk-to-feed margin up to a threshold of $9.50/cwt. on the first 5 million pounds of milk coverage. The DMC margin differs from the USDA-reported milk-to-feed ratio (shown in Figure 5 ), but reflects the same market forces. As of October 2019, the formula-based milk-to-feed margin used to determine government payments had risen to $10.88/cwt., above the newly instituted $9.50/cwt. payment threshold ( Figure 13 ), thus decreasing the likelihood that DMC payments might be available in the second half of 2019. In total, the DMC program is expected to make $214 million in payments in 2019, down from $250 million under the previous MPP in 2018. Total production expenses for 2019 for the U.S. agricultural sector are projected to be up slightly (+0.2%) from 2018 in nominal dollars at $344.6 billion ( Figure 14 ). Production expenses peaked in both nominal and inflation-adjusted dollars in 2014, then declined for five consecutive years in inflation-adjusted dollars. However, in nominal dollars production expenses are projected to turn upward in 2019. Production expenses affect crop and livestock farms differently. The principal expenses for livestock farms are feed costs, purchases of feeder animals and poultry, and hired labor. Feed costs, labor expenses, and property taxes are all projected up in 2019 ( Figure 15 ). In contrast, fuel, seed, pesticides, interest, and fertilizer costsâall major crop production expensesâare projected lower. But how have production expenses moved relative to revenues? A comparison of the indexes of prices paid (an indicator of expenses) versus prices received (an indicator of revenues) reveals that the prices received index generally declined from 2014 through 2016, rebounded in 2017, then declined again in 2019 ( Figure 16 ). Farm input prices (as reflected by the prices paid index) showed a similar pattern but with a smaller decline from their 2014 peak and have climbed steadily since mid-2016, suggesting that farm sector profit margins have been squeezed since 2016. Renting or leasing land is a way for young or beginning farmers to enter agriculture without incurring debt associated with land purchases. It is also a means for existing farm operations to adjust production more quickly in response to changing market and production conditions while avoiding risks associated with land ownership. The share of rented farmland varies widely by region and production activity. However, for some farms it constitutes an important component of farm operating expenses. Since 2002, about 39% of agricultural land used in U.S. farming operations has been rented. The majority of rented land in farms is rented from nonoperating landlords. Nationally in 2017, 29% of all land in farms was rented from someone other than a farm operator. Some farmland is rented from other farm operationsânationally about 8% of all land in farms in 2017 (the most recent year for which data are available)âand thus constitutes a source of income for some operator landlords. Total net rent to nonoperator landlords is projected to be down (-1.2%) to $12.7 billion in 2019. Average cash rental rates for 2019 were up (+1.4%) year-over-year ($140 per acre versus $138 in 2018). Farm rental rates are generally set during the preceding fall or in early spring prior to field work. National average rental rates dipped in 2016, but continue to reflect the high crop prices and large net returns of the preceding several years, especially the 2011-2014 period ( Figure 17 ). The national rental rate for cropland peaked at $144 per acre in 2015. U.S. agricultural exports have been a major contributor to farm income, especially since 2005. As a result, the financial success of the U.S. agricultural sector is strongly linked to international demand for U.S. products. Because of this strong linkage, the downturn in U.S. agricultural exports that started in 2015 ( Figure 18 ) deepened the downturn in farm income that ran from 2013 through 2016 ( Figure 1 ). Since 2018, the U.S. agricultural sector's trade outlook has been vulnerable to several international trade disputes, particularly the ongoing dispute between the United States and China. A return to market-based farm income growth for the U.S. agricultural sector would likely need improved international trade prospects. USDA projects U.S. agricultural exports at $135.5 billion in FY2019, down (-5.5%) from $143.4 billion in FY2018. Export data include processed and unprocessed agricultural products. This aggregate downturn masks larger country-level changes that have occurred as a result of ongoing trade disputes (discussed below). In FY2019, U.S. agricultural imports are projected up at $113.0 billion (+2.7%), and the resultant agricultural trade surplus of $7.0 billion would be the lowest since 2006. A substantial portion of the surge in U.S. agricultural exports that occurred between 2010 and 2014 was due to higher-priced grain and feed shipments, including record oilseed exports to China and growing animal product exports to East Asia. As commodity prices have leveled off, so too have export values (see the commodity price indexes in Figure A-1 and Figure A-2 ). In FY2017, the top three markets for U.S. agricultural exports were China, Canada, and Mexico, in that order. Together, these three countries accounted for 47% of total U.S. agricultural exports during the five-year period FY2013-FY2017 ( Figure 19 ). However, in FY2019 the combined share of U.S. exports taken by China, Canada, and Mexico is projected down to 40% largely due to lower exports to China. The ordering of the top markets in 2019 is projected to be Canada, Mexico, the European Union (EU), Japan, and China, as China is projected to decline as a destination for U.S. agricultural exports. From FY2013 through FY2017, China imported an average of $26.4 billion of U.S. agricultural products. However, USDA reported that China's imports of U.S. agricultural products declined to $20.5 billion in FY2018, and are projected to decline further to $13.6 billion in FY2019 as a result of the U.S.-China trade dispute. The fourth- and fifth-largest U.S. export markets have traditionally been the EU and Japan, which accounted for a combined 17% of U.S. agricultural exports during the FY2014 to FY2018 period. These two markets have shown limited growth in recent years when compared with the rest of the world. However, their combined share is projected to grow slightly to 18% in FY2019 ( Figure 19 ). The \"Rest of World\" (ROW) component of U.S. agricultural tradeâSouth and Central America, the Middle East, Africa, and Southeast Asiaâhas shown strong import growth in recent years. ROW is expected to account for 42% of U.S. agricultural exports in FY2019. ROW import growth is being driven in part by both population and GDP growth but also from shifting trade patterns as some U.S. products previously targeting China have been diverted to new ROW markets. Over the past four decades, U.S. agricultural exports have experienced fairly steady growth in shipments of high-value productsâincluding horticultural products, livestock, poultry, and dairy. High-valued exports are forecast at $100.1 billion for a 73.8% share of U.S. agricultural exports in FY2019 ( Figure 20 ). In contrast, bulk commodity shipments (primarily wheat, rice, feed grains, soybeans, cotton, and unmanufactured tobacco) are forecast at a record low 26.2% share of total U.S. agricultural exports in FY2019 at $35.5 billion. This compares with an average share of over 60% during the 1970s and into the 1980s. As grain and oilseed prices decline, so will the bulk value share of U.S. exports. The U.S. farm income and asset-value situation and outlook suggest a slowly eroding financial situation heading into 2019 for the agriculture sector as a whole. Considerable uncertainty clouds the economic outlook for the sector, reflecting the downward outlook for prices and market conditions, an increasing dependency on international markets to absorb domestic surpluses, and an increasing dependency on federal support to offset lost trade opportunities due to ongoing trade disputes. Farm asset valuesâwhich reflect farm investors' and lenders' expectations about long-term profitability of farm sector investmentsâare projected to be up 2.3% in 2019 to a nominal $3.1 trillion ( Table A-3 ). In inflation-adjusted terms (using 2018 dollars), farm asset values peaked in 2014 ( Figure 21 ). Nominally higher farm asset values are expected in 2019 due to increases in both real estate values (+2.1%) and nonreal-estate values (+3.4%). Real estate is projected to account for 83% of total farm sector asset value. Crop land values are closely linked to commodity prices. The leveling off of crop land values since 2015 reflects stagnant commodity prices ( Figure 22 ). Total farm debt is forecast to rise to a record $415.5 billion in 2019 (+3.4%) ( Table A-3 ). Farm equityâor net worth, defined as asset value minus debtâis projected to be up slightly (+2.2%) at $2.7 trillion in 2019 ( Table A-3 ). The farm debt-to-asset ratio is forecast up in 2019 at 13.4%, the highest level since 2003 but still relatively low by historical standards ( Figure 23 ). If realized, this would be the seventh consecutive year of increase in the debt-to-asset ratio. A farm can have both an on-farm and an off-farm component to its income statement and balance sheet of assets and debt. Thus, the well-being of farm operator households is not equivalent to the financial performance of the farm sector or of farm businesses because of the inclusion of nonfarm investments, jobs, and other links to the nonfarm economy. Average farm household income (sum of on- and off-farm income) is projected at $120,082 in 2019 ( Table A-2 ), up 7.0% from 2018 but 10.5% below the record of $134,165 in 2014. About 20% ($24,106) of total farm household income in 2019 is projected to be from farm production activities, and the remaining 80% ($95,976) is earned off the farm (including financial investments). The share of farm income derived from off-farm sources had increased steadily for decades but peaked at about 95% in 2000 ( Figure 24 ). Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. Since the late 1990s, farm household incomes have surged ahead of average U.S. household incomes ( Figure 25 ). In 2018 (the last year for which comparable data were available), the average farm household income of $112,211 was about 25% higher than the average U.S. household income of $90,021 ( Table A-2 ). Figure A-1 to Figure A-4 present USDA data on monthly farm prices received for several major farm commoditiesâcorn, soybeans, wheat, upland cotton, rice, milk, cattle, hogs, and chickens. The data are presented in an indexed format where monthly price data for year 2010 = 100 to facilitate comparisons. USDA Farm Income Data Tables Table A-1 to Table A-3 present aggregate farm income variables that summarize the financial situation of U.S. agriculture. In addition, Table A-4 presents the annual average farm price received for several major commodities, including the USDA forecast for the 2019-2020 marketing year.", "summary": "This report uses the U.S. Department of Agriculture's (USDA's) farm income projections (as of November 27, 2019) and agricultural trade outlook update (as of November 25, 2019) to describe the U.S. farm economic outlook for 2019. According to USDA's Economic Research Service (ERS), national net farm incomeâa key indicator of U.S. farm well-beingâis forecast at $92.5 billion in 2019, up $8.5 billion (+10.2%) from last year. The forecast rise in 2019 net farm income is largely the result of a 64.0% increase in government payments to the agricultural sector, with a projected total value of $22.4Â billion (highest since 2005). USDA's forecast of outlays for farm support for 2019 includes $14.3 billion in direct payments made under trade assistance programs intended to help offset foreign trade retaliation against U.S. agricultural products, as well as over $8 billion in payments from other farm programs, including the Wildfire and Hurricane Indemnity Program (WHIP). Without this federal support, net farm income would be lower, primarily due to continued weak prices for most major crops. Commodity prices are under pressure from large carry-in stocks from a record soybean and near-record corn harvest in 2018, and diminished export prospects due to the ongoing trade dispute with China. Should these conditions persist into 2020, they would signal the potential for continued dependence on federal programs to sustain farm incomes in 2020. Since 2008, U.S. agricultural exports have accounted for a 20% share of U.S. farm and manufactured or processed agricultural sales. In 2018, total agricultural exports were estimated at $143.4 billion (the second-highest export value on record). However, strong competition from major foreign competitors and the ongoing U.S.-China trade dispute are expected to shift trade patterns and lower U.S. agricultural export prospects significantly (-5.5%) to a projected $135.5 billion in 2019. Farm asset value in 2019 is projected up from 2018 at $3.1 trillion (+2.3%). Farm asset values reflect farm investors' and lenders' expectations about long-term profitability of farm sector investments. U.S. farmland values are projected to rise 2.1% in 2019, slightly higher than the 1.6% in 2018 but below the 3.0% of 2017. Because they comprise 83% of the U.S. farm sector's asset base, change in farmland values is a critical barometer of the farm sector's financial performance. However, another critical measure of the farm sector's well-being is aggregate farm debt, which is projected to be at a record $415.5 billion in 2019âup 3.5% from 2018. Both the debt-to-asset and the debt-to-equity ratios have risen for seven consecutive years, suggesting a weakening of the U.S. farm sector's financial situation. At the farm household level, average farm household incomes have been well above average U.S. household incomes since the late 1990s. However, this advantage derives primarily from off-farm income as a share of farm household total income. Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. Furthermore, the farm household income advantage over the average U.S. household has narrowed in recent years. In 2014, the average farm household income (including off-farm income sources) was about 77% higher than the average U.S. household income. In 2018 (the last year with comparable data), that advantage was expected to decline to 25%.", "document_type": "crs"}
{"report": "On June 4, 2019, the House passed the American Dream and Promise Act of 2019 ( H.R. 6 ) on a vote of 237 to 187. Title I of the bill, the Dream Act of 2019, would establish a process for certain unauthorized immigrants who entered the United States as children (known as unauthorized childhood arrivals) to obtain lawful permanent immigration status. This vote on H.R. 6 was one of several House and Senate floor votes since 2018âand the only successful oneâon legislation to grant some type of immigration relief to unauthorized childhood arrivals. As commonly used, the term \"unauthorized childhood arrivals\" encompasses both individuals who entered the United States unlawfully and individuals who entered legally but then lost legal status, by, for example, overstaying an authorized temporary period of stay. There is no single set of requirements that defines an unauthorized childhood arrival. Individual bills include their own criteria. This report considers House and Senate measures on unauthorized childhood arrivals that have seen legislative action since 2001, focusing in particular on legislation considered in the 115 th and 116 th Congresses. It also discusses the related Deferred Action for Childhood Arrivals (DACA) initiative and DACA-related data. The material is presented chronologically to trace the development of legislative proposals on unauthorized childhood arrivals and highlight the interplay between legislative action on these measures and developments related to the DACA initiative. Legislation on unauthorized childhood arrivals dates to 2001. That year, the Development, Relief, and Education for Alien Minors (DREAM) Act ( S. 1291 ) was introduced in the 107 th Congress to provide a pathway to lawful permanent resident (LPR) status for eligible individuals. LPRs can live and work in the United States permanently and can become U.S. citizens through the naturalization provisions in the Immigration and Nationality Act (INA). In most cases, LPRs must reside in the United States for five years before they can naturalize. S. 1291 sought to provide immigration relief to unauthorized childhood arrivals who, like the larger unauthorized population, were typically unable to work legally and were subject to removal from the United States. Many policymakers viewed this subset of the unauthorized population more sympathetically than unauthorized immigrants on the whole because unauthorized childhood arrivals had arrived in the United States as children and were thus not generally seen as being responsible for their unlawful status. Although not all subsequent bills to grant LPR status to unauthorized childhood arrivals were entitled the \"DREAM Act\" and no subsequent bill included exactly the same provisions as S. 1291 , such legislation came to be known generally as the \"Dream Act\" and its intended beneficiaries as \"Dreamers.\" In general, the potential beneficiaries of such bills did not have an avenue under the INA to become LPRs. The most common way for a foreign national to adjust status (become an LPR while in the United States) is through INA provisions that require the individual to be eligible for an immigrant visa and to have such a visa immediately available to him or her through the permanent immigration system. Individuals are most often eligible for immigrant visas based on a qualifying family relationship (to a U.S. citizen or LPR) or an employment tie. Among the other criteria to adjust status under these provisions, the individual must have been \"inspected and admitted or paroled into the United States\"; thus, individuals who entered the United States unlawfully are not eligible. In addition, with limited exceptions, an individual is not eligible for adjustment of status if he or she falls in a disqualified category, such as someone who engaged in unauthorized employment or \"who has failed (other than through no fault of his own or for technical reasons) to maintain continuously a lawful status since entry into the United States.\" S. 1291 in the 107 th Congress and a subsequent DREAM Act bill ( S. 1545 ) introduced in the 108 th Congress were reported by the Senate Judiciary Committee. Neither bill saw further action. S. 1545 , as reported in the 108 th Congress, contained the basic features of many later proposals to provide LPR status to unauthorized childhood arrivals. It applied to foreign nationals who were \"inadmissible or deportable from the United States\"âthis is how the bill described its target unauthorized population. The grounds of inadmissibility in the INA are the grounds on which a foreign national can be denied admission to the United States. The grounds of deportability are the grounds on which a foreign national can be removed from the United States. S. 1545 , as reported, proposed a two-stage process for eligible individuals to become LPRs. Criteria to obtain conditional status (stage 1) included continuous presence in the United States for five years prior to the date of the bill's enactment, initial entry into the United States before age 16, and satisfaction of specified educational requirements. Criteria to become a full-fledged LPR (stage 2) included completion of at least two years in a bachelor's or higher degree program or in the Armed Forces, subject to a hardship exception. At either stage, an applicant could have been disqualified if he or she was inadmissible to or deportable from the United States under specified grounds in the INA. S. 1545 would have granted qualifying childhood arrivals conditional LPR status. Describing that status, Department of Homeland Security (DHS) regulations state, \"Unless otherwise specified, the rights, privileges, responsibilities and duties which apply to all other lawful permanent residents apply equally to conditional permanent residents, including but not limited to the right to apply for naturalization (if otherwise eligible).\" Regarding naturalization, S. 1545 provided that the time spent in conditional LPR status would have counted toward the LPR residence requirement for naturalization. At the same time, it stated that an individual could only apply to naturalize once the conditional basis of his or her status were removed (and he or she was a full-fledged LPR). Other provisions in S. 1545 addressed eligibility for higher education benefits. The bill provided that individuals obtaining LPR status under its terms would only be eligible for certain forms of federal student aid under Title IV of the Higher Education Act of 1965, namely federal student loans, federal Work-Study programs, and services. Unlike LPRs generally, they would seemingly not have been eligible for grant aid (e.g., federal Pell Grants). At the same time, S. 1545 proposed to eliminate a provision enacted in 1996 as part of the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) that restricts the ability of states to provide higher education benefits to certain unauthorized immigrants. Section 505 of IIRIRA reads: an alien who is not lawfully present in the United States shall not be eligible on the basis of residence within a State (or a political subdivision) for any postsecondary education benefit unless a citizen or national of the United States is eligible for such a benefit (in no less an amount, duration, and scope) without regard to whether the citizen or national is such a resident. Beginning in the 109 th Congress, proposals on unauthorized childhood arrivalsâwhich had received action in earlier Congresses as stand-alone billsâwere incorporated into larger measures. In the 109 th through the 111 th Congresses, several measures to grant LPR status to unauthorized childhood arrivals were considered on the Senate and the House floors. In the 109 th Congress, the Senate passed a major immigration reform bill, the Comprehensive Immigration Reform Act of 2006 ( S. 2611 ), with a DREAM Act subtitle. The Senate vote was 62 to 36. The House did not consider the bill. The DREAM Act provisions in Senate-passed S. 2611 were similar to those in stand-alone S. 1545 , as reported in the 108 th Congress. Like the earlier bill, S. 2611 would have established a mechanism for an eligible unauthorized childhood arrival to become a conditional LPR and then, after meeting additional requirements, have the conditional basis of his or her status removed and become a full-fledged LPR. Applicants also would have had to clear inadmissibility and deportability criteria similar to those under S. 1545 . These DREAM Act provisions were separate from other legalization provisions in S. 2611 , and applicants under the DREAM Act provisions would not have been subject to the same requirements as applicants under the general legalization provisions. This more generous treatment of unauthorized childhood arrivals reflected a widely held belief that they were different and less responsible for their unlawful status than other unauthorized immigrants. Although the DREAM Act provisions in Senate-passed S. 2611 and S. 1545 , as reported, were similar, there were some differences. For example, under S. 1545 , as noted, the noneducational route through which a conditional LPR could become a full-fledged LPR required service in the Armed Forces. The comparable route under Senate-passed S. 2611 encompassed service in the broader uniformed services. In the 110 th Congress, there was an unsuccessful vote in the Senate to invoke cloture on a bill to provide for comprehensive immigration reform ( S. 1639 ) that included a DREAM Act subtitle among other legalization provisions. The vote was 46 to 53. S. 1639 differed from earlier bills on unauthorized childhood arrivals in notable ways. For example, unlike S. 2611 , the immigration reform bill passed by the Senate in the 109 th Congress, S. 1639 's DREAM Act provisions were tied to other legalization provisions in the bill. Under S. 1639 , the first step to LPR status for an unauthorized childhood arrival was the same as for any unauthorized immigrant: to obtain temporary legal status under a new \"Z\" nonimmigrant category. Among the eligibility requirements for Z status were continuous presence in the United States since a specified date and clearance of inadmissibility and ineligibility criteria that were stricter than under S. 2611 . Other requirements for obtaining Z status under S. 1639 included submission of biometric data for security and law enforcement background checks and satisfaction of any applicable federal tax liabilities. Z nonimmigrant status would have been granted for an initial period of four years and could have been extended in four-year increments. Applicants for extensions would have had to satisfy, among other criteria, escalating requirements concerning knowledge of the English language and U.S. civics, unless they qualified for an exception. These requirements were based on the English and civics requirements for naturalization. S. 1639 would have established different pathways to LPR status for Z nonimmigrants. A DREAM Act pathway to LPR status, which would have been quicker than the standard pathway provided in the bill, would have been available to Z nonimmigrants who met an additional set of requirements. These included being under age 30 on the date of enactment, being under age 16 at the time of initial U.S. entry, and having completed at least two years in either a bachelor's or higher degree program or the uniformed services. The \"under age 30\" requirement was new; earlier bills receiving action did not include maximum age provisions. S. 1639 would have deemed individuals obtaining LPR status under its DREAM Act pathway to meet the LPR residence requirement for naturalization eight years after the date of enactment. S. 1639 also addressed eligibility for higher education benefits. As under the earlier bills discussed above, individuals obtaining LPR status under S. 1639 's DREAM Act pathway would have been eligible for federal student loans, federal Work-Study programs, and services, but seemingly not grant aid. Unlike these other bills, S. 1639 would not have fully repealed the IIRIRA Section 505 restriction on state provision of post-secondary educational benefits, but would have rendered it ineffective for Z nonimmigrants. Other legislation on unauthorized childhood arrivals considered in the 110 th Congress included another major immigration reform bill ( S. 1348 ). The Senate voted against invoking cloture on both S. 1348 and a substitute amendment to the bill. These votes occurred prior to the introduction of S. 1639 . After the unsuccessful cloture vote on S. 1639 , the Senate considered a stand-alone DREAM Act bill ( S. 2205 ). It did not invoke cloture on the motion to proceed to the bill, by a vote of 52 to 44. This vote on S. 2205 brought to the fore competing views among supporters of providing LPR status to unauthorized childhood arrivals about the relationship between that issue and other components of immigration reform. Some supporters pressed for passage of the stand-alone bill arguing that the situation of unauthorized childhood arrivals was urgent. Another view held, however, that enacting a pathway to LPR status for unauthorized childhood arrivals in a narrow bill would hurt the prospects of achieving broader reform (including more controversial proposals for the legalization of other unauthorized immigrants). In the 111 th Congress, the House approved a DREAM Act amendment to an unrelated bill, the Removal Clarification Act of 2010 ( H.R. 5281 ) on a vote of 216 to 198. The Senate rejected a motion to invoke cloture on a motion to agree to the House-passed DREAM Act amendment to H.R. 5281 , by a vote of 55 to 41. This House-passed version of the DREAM Act would have established a three-stage process for individuals who were inadmissible or deportable from the United States to obtain LPR status. In stage 1, as in many previous bills, a successful applicant would have been granted conditional status. This proposal, however, would have granted conditional status in the form of conditional nonimmigrant status, which is not an existing status under immigration law. An individual would have applied in stage 2 to have his or her conditional nonimmigrant status extended, and in stage 3 to be granted LPR status. Under this DREAM Act amendment, an individual who became an LPR could naturalize after three years in LPR status. The DREAM Act amendment to H.R. 5281 included eligibility requirements concerning continuous presence, age at entry, and educational attainment, as well as inadmissibility and ineligibility criteria. It also included some of the same types of requirements as S. 1639 in the 110 th Congressâpertaining to maximum age, submission of biometric data, satisfaction of any applicable federal tax liability, and knowledge of English and U.S. civicsâalthough the specific requirements were not necessarily the same, and did not necessarily apply at the same stage of the legalization process, in the two measures. Unlike earlier bills receiving action, the House-passed amendment would have established \"surcharges\" on applications for conditional status. While S. 1639 would have imposed penalty fees on applications for Z status, that bill would have made these fees inapplicable or refundable in the case of applicants who met its DREAM Act criteria. Like the DREAM Act provisions in S. 1639 and earlier bills receiving action, the House-passed DREAM Act amendment would have made individuals who obtained conditional nonimmigrant or LPR status under its terms eligible for federal student aid in the form of federal student loans, federal Work-Study programs, and services, but seemingly not grant aid. Unlike earlier bills receiving action, the House-passed measure contained no IIRIRA Section 505 repeal language. On June 15, 2012, DHS issued a memorandum announcing the DACA initiative. The memorandum stated that certain individuals who were brought to the United States as children and met other criteria would be considered for deferred action for two years, subject to renewal. DHS has described deferred action as \"a use of prosecutorial discretion to defer removal action against an individual for a certain period of time.\" In remarks delivered that same day, President Barack Obama called on Congress to pass DREAM Act legislation, citing in particular the House-passed bill in the 111 th Congress. He indicated that \"in the absence of any immigration action from Congress to fix our broken immigration system,\" his Administration had tried \"to focus our immigration enforcement resources in the right places.\" He portrayed the DACA initiative as an extension of those efforts, stating that \"[e]ffective immediately, the Department of Homeland Security is taking steps to lift the shadow of deportation from these young people.\" President Obama made clear that DACA relief was not a permanent solution. Instead, he characterized it as \"a temporary stopgap measure.\" The eligibility criteria for an initial two-year grant of DACA were broadly similar to those in earlie r DREAM Act bills. DHS's U.S. Citizenship a nd Immigration Services (USCIS), which administers DACA, published the eligibility criteria for an i ni tial DACA grant and a renewal on its website . The criteria for an initial DACA grant were (1) under age 31 on June 15, 2012; (2) under age 16 at time of entry into the United States; (3 ) continuous ly resident in the Unite d States since June 15, 20 07 ; (4 ) physically present in United S tates on June 15, 2012, and at the time of requesting DACA ; (5) no t in lawful status on June 15, 2012; (6) in school, graduated from high school or obtained general education development certificate, or honorably d ischarged from the Armed Forces; and (7 ) not convicted of a felony, a significant misdemeanor, or three or more misdemeanors, and not otherwise a threat to national se curity or public safety . In addition, with specified exceptions, an individual had to be a t least age 15 to request DACA. Individuals granted deferred action could receive employment authorization. According to USCIS, \" Under existing regulations, an individual whose case has been deferred is eligible to receive employment authorization for the period of deferred action, prov ided he or she can demonstrate ' an ec onomic necessity for employment ' . \" To request DACA from USCIS, an applicant had to submit Form I-821D, \" Consideration of Deferre d Action for Childhood Arrivals \" ; an application for employment authorization (Form I-765) and a related worksheet (Form I-765WS) ; and required fees. Currently, as discussed later in this report, individuals who have never been granted DACA cannot submit initial requests. Individuals who have been granted DACA in the past, however, continue to be able to submit requests. To be considered for a two-year renewal, a DACA recipient must satisfy the following criteria: (1) did not depart from the United States on or after August 15, 2012, without first obtaining permission to travel, (2) has continuously resided in the United States since submitting his or her latest approved DACA request, and (3) has not been convicted of a felony, a significant misdemeanor, or three or more misdemeanors, and is not a threat to national security or public safety. To request a renewal of DACA, an individual must submit the same forms and fees as for an initial request. As of the date of this report, these fees total $495. The next significant legislative developments related to unauthorized childhood arrivals occurred in the 113 th Congress when the Senate approved a major immigration reform bill with DREAM Act provisions. The bill, the Border Security, Economic Opportunity, and Immigration Modernization Act ( S. 744 ), was passed on a 68-32 vote. The House did not consider S. 744 . S. 744 proposed to establish a general legalization program for individuals in the United States who were not in nonimmigrant status or other specified lawful status and a special DREAM Act pathway to LPR status for certain aliens who had entered the country as children. Under S. 744 , unauthorized childhood arrivals, like other unauthorized immigrants, would first have applied for a newly created statusâregistered provisional immigrant (RPI) status. The requirements for RPI status included continuous presence in the United States since a specified date, satisfaction of any applicable federal tax liability, and submission of biometric and biographic data for national security and law enforcement clearances. RPI status would have been granted for an initial period of six years and could have been extended in six-year increments. Applicants for RPI status would have been subject to specified inadmissibility and ineligibility criteria. Under S. 744 , DHS could have adopted streamlined RPI procedures for DACA recipients. It could have granted RPI status to a DACA recipient upon completion of renewed national security and law enforcement clearances unless the agency determined that the individual had engaged in conduct making him or her ineligible for RPI status. S. 744 would have established a special DREAM Act pathway to LPR status for RPIs who had been in RPI status for at least five years, had initially entered the United States when they were under age 16, and, subject to a hardship exception, had completed either two years of higher education or four years of service in the uniformed services. Such individuals also would have had to submit biometric and biographic data for national security and law enforcement background checks and would have had to meet the English language and civics requirements for naturalization, unless exempted. S. 744 would have authorized DHS to adopt streamlined procedures for DACA recipients to obtain LPR status. With respect to naturalization, an alien granted LPR status under the DREAM Act provisions in S. 744 would have been considered to be an LPR (and therefore accumulating time toward the residency requirement for naturalization) during the period in RPI status. In most cases, however, an alien could not have applied for naturalization while in RPI status. S. 744 would have placed restrictions on federal student aid under Title IV of the Higher Education Act for RPIs who had entered the United States before age 16. This group would only have been eligible for federal student loans, federal Work-Study programs, and services. In addition, the bill would have repealed Section 505 of IIRIRA, which, as discussed, restricts the provision of postsecondary educational benefits for aliens who are not lawfully present. On September 5, 2017, Attorney General Jeff Sessions announced that DACA was being terminated. A related memorandum released by DHS the same day rescinded the 2012 memorandum that established the initiative. As part of the rescission, DHS had planned to \"execute a wind-down\" of DACA, under which no new initial DACA requests would have been accepted after September 5, 2017, and no new renewal requests would have been accepted after October 5, 2017. This wind-down did not proceed as planned, however, because DACA recipients and others filed federal lawsuits challenging the legality of the rescission. Under rulings in these cases, to date, individuals who have been granted DACA in the past continue to be able to submit DACA requests. Individuals who have never been granted DACA cannot submit new initial requests. The U.S. Supreme Court is scheduled to hear arguments on the DACA rescission on November 12, 2019. Individuals who have been granted DACA in the past and whose DACA grants have expired or been terminated are still able to apply for a renewal. As of August 1, 2019, USCIS has reinstated its past DACA \"late renewal policy,\" under which an individual whose previous DACA grant expired more than one year ago or whose previous DACA grant was terminated must submit an initial DACA request rather than a renewal request. According to USCIS data on the DACA population, there were approximately 689,000 active DACA recipients as of September 4, 2017, and approximately 669,080 active DACA recipients as of April 30, 2019. Regarding the latter group, about 80% were born in Mexico, 53% were female, and the median age was 25. In notes accompanying the September 4, 2017, data tables, USCIS indicated that the total number of individuals who had ever been granted DACA as of that date was approximately 800,000. This number excluded individuals whose initial grants of DACA were later terminated. Of those 800,000 individuals, USCIS reported that about 40,000 had become LPRs and about 70,000 had either failed to apply to renew their DACA grants or had their renewal applications denied. As of July 31, 2019, according to USCIS data, the total number of individuals who had ever been granted DACA was 822,063. This number excluded individuals whose initial grants of DACA were later terminated. Of those 822,063 individuals, 73,043 had become LPRs and 4,448 had become citizens. These data on DACA recipients can be compared with estimates of the DACA-eligible population. According to an analysis by the Migration Policy Institute (MPI), an estimated 1,307,000 unauthorized individuals were immediately eligible for DACA in 2016 based on the eligibility requirements for an initial DACA grant that MPI was able to model. In addition, an estimated 398,000 met the age, residence, and immigration status criteria but not the educational requirements. MPI updated its estimates of the DACA-eligible population as of 2018 based on the original DACA eligibility requirements and subject to the same model limitations as the 2016 estimates. It estimated that, as of 2018, 1,302,000 individuals met the DACA eligibility requirements and an additional 356,000 met the age, residence, and immigration status criteria but not the educational requirements. In the fall of 2017, following the DACA rescission announcement, President Donald Trump and several Members of Congress discussed a possible deal on unauthorized childhood arrivals. Initially, these talks focused on a package combining provisions to \"enshrine the protections of DACA into law\" with border security provisions. Other immigration issues were subsequently introduced into the discussion, and in January 2018 the White House released its \"Framework on Immigration Reform & Border Security.\" This proposal called for legal status for DACA-eligible individuals as well as enhancements to border security and interior immigration enforcement and changes to the permanent immigration system. In the 115 th and 116 th Congresses, the Senate and the House have considered measures containing provisions to grant legal status to DACA recipients and unauthorized childhood arrivals along with other immigration provisions. In 2018, both the Senate and the House considered immigration legislation that contained language on unauthorized childhood arrivals. A greater number of proposals to provide immigration relief to this population received floor consideration in the 115 th Congress than in any prior Congress. Neither chamber passed any of these measures. In February 2018, the Senate considered three immigration proposals with language on unauthorized childhood arrivals as floor amendments to an unrelated bill, the Broader Options for Americans Act ( H.R. 2579 ). The Senate rejected motions to invoke cloture on all three amendments. The Senate considered provisions on unauthorized childhood arrivals as Subtitle A of S.Amdt. 1955 , the Uniting and Securing America (USA) Act of 2018. Subtitle A was substantively identical to Title I of two bills with the same USA Act name, as introduced in the 115 th Congressâ S. 2367 and H.R. 4796 . S.Amdt. 1955 would have established a mechanism for certain childhood arrivals who were inadmissible to or deportable from the United States or were in temporary protected status (TPS) to become LPRsâin most cases through a two-stage process. Applicants would have been considered for conditional LPR status in stage 1. To receive such status, an applicant would have had to meet requirements including continuous presence in the United States since December 31, 2013; initial U.S. entry before age 18; no inadmissibility under specified grounds in the INA and no other specified ineligibilities; and either college admission, acquisition of a high school diploma or comparable credential, or enrollment in secondary school or a comparable educational program. S.Amdt. 1955 would have directed DHS to grant conditional LPR status to a DACA recipient unless the individual had subsequently engaged in conduct that would make him or her ineligible for DACA. Applicants also would have had to submit biometric and biographic data for security and law enforcement background checks. Conditional LPR status would have been valid for eight years. In stage 2, a conditional LPR would have had to meet a second set of requirements to have the conditional basis of his or her status removed and become a full-fledged LPR. Among these requirements were achievement of one of the following, subject to a hardship exception: (1) attainment of a college degree, completion of at least two years in a bachelor's or higher degree program, or completion of at least two years in a postsecondary vocational program, (2) service in the uniformed services for the obligatory period, or (3) employment for at least three years and at least 80% of the time the alien had valid employment authorization. The other stage 2 requirements included submission of biometric and biographic data for security and law enforcement background checks, continued clearance of the inadmissibility and ineligibility criteria for conditional LPR status, and, unless subject to an exception due to a disability, satisfaction of the English language and U.S. civics requirements for naturalization. Under S.Amdt. 1955 , a conditional LPR could have applied to have the condition on his or her status removed at any time after meeting the stage 2 requirements. The time spent in conditional status would have counted as time in LPR status for purposes of naturalization, but the individual could not have applied for naturalization while in conditional status. In addition, the bill would have provided that an applicant meeting all the stage 1 and stage 2 requirements at the time of submitting his or her initial application would have been granted full-fledged LPR status directly (without first being granted conditional status). Earlier bills receiving floor action did not include such a provision. Regarding postsecondary education, S.Amdt. 1955 would have repealed Section 505 of IIRIRA. The measure did not include any language concerning federal student aid. On February 15, 2018, the Senate voted (52 to 47) not to invoke cloture on S.Amdt. 1955 . S.Amdt. 1958 , the Immigration Security and Opportunity Act, would have established a two-stage pathway to LPR status for certain childhood arrivals who were inadmissible to or deportable from the United States. It incorporated some eligibility requirements for applicants at both stages that were not included in S.Amdt. 1955 . Under S.Amdt. 1958 , to obtain conditional LPR status in stage 1 an individual would have had to either be a DACA recipient or meet a set of requirements. For a DACA recipient to qualify, he or she could not have engaged in any conduct since being granted DACA that would have made the individual ineligible for DACA protection. Requirements applicable to a non-DACA recipient included continuous presence in the United States since June 15, 2012; initial U.S. entry before age 18; no inadmissibility under specified grounds in the INA and no other specified ineligibilities; and either satisfaction of educational requirements like those under S.Amdt. 1955 , or enlistment or service in the Armed Forces. In addition, a non-DACA recipient would have had to meet a maximum age requirementâhaving a birthdate after June 15, 1974âand to have satisfied any applicable federal tax liability. All stage 1 applicants also would have had to submit biometric and biographic data for security and law enforcement background checks. Conditional LPR status under S.Amdt. 1958 would have been valid for seven years. To have the conditional basis of his or her status removed and become a full-fledged LPR, a conditional LPR would have had to meet a second set of requirements. These stage 2 requirements included satisfaction of one of the following: (1) acquisition of a college degree or completion of at least two years in a program for a bachelor's or higher degree, (2) service in the uniformed services for at least two years, or (3) employment for at least three years and at least 75% of the time the alien had valid employment authorization. Other requirements included submission of biometric and biographic data for security and law enforcement background checks, continued clearance of the inadmissibility and ineligibility criteria for conditional LPR status, satisfaction of the English language and civics requirements for naturalization, and satisfaction of any applicable federal tax liability. Under S.Amdt. 1958 , the time spent in conditional status would have counted as time in LPR status for purposes of naturalization. In general, however, beneficiaries could not have been naturalized until 12 years after they had received conditional status. This period could have been reduced by up to two years for DACA recipients. S.Amdt. 1958 also would have limited the ability of the parents of its beneficiaries to obtain LPR status in the United States. Earlier measures receiving legislative action did not include such restrictions. S.Amdt. 1958 would have prevented a parent from obtaining LPR status based on an immigrant petition filed by a child who had received conditional permanent resident status under the bill if the parent had assisted in the child's unlawful entry into the United States. The amendment did not include any language on federal student aid or Section 505 of IIRIRA. On February 15, 2018, the Senate voted (54 to 45) not to invoke cloture on S.Amdt. 1958 . Provisions on unauthorized childhood arrivals comprised Title III of S.Amdt. 1959 , the SECURE and SUCCEED Act. Title III, named the SUCCEED Act, was broadly similar to a Senate bill of the same name ( S. 1852 ), as introduced in the 115 th Congress, despite differences between the two measures. S.Amdt. 1959 would have established a three-stage process for unauthorized childhood arrivals to obtain LPR status. Applicants who met an initial set of requirements would have been granted conditional temporary resident status (rather than conditional LPR status, as under the other two Senate amendments). These requirements, which incorporated some of the initial criteria for DACA, included continuous presence in the United States since June 15, 2012; initial U.S. entry before age 16; a birthdate after June 15, 1981; not being in lawful status on June 15, 2012; no inadmissibility or deportability under specified grounds in the INA and no other specified ineligibilities; and educational or military requirements based on the applicant's age on the date of enactment. Those under age 18 would have had to be in school. Those age 18 and older would have had to have earned a high school diploma or comparable credential, been admitted to college, or served or enlisted in the Armed Forces. As under one or both of the other amendments discussed, all stage 1 applicants would also have needed to submit biometric and biographic data for security and law enforcement background checks and to satisfy any applicable federal tax liability. In addition, S.Amdt. 1959 included some requirements to obtain conditional status that were not found in the other amendments. Among them, an applicant age 18 or older would have had to acknowledge being notified that if he or she violated a term of conditional temporary resident status, he or she would be ineligible for any immigration relief or benefits, with limited exceptions. Conditional temporary resident status would have been valid for an initial period of seven years or until the alien turned age 18, if longer. Under S.Amdt. 1959 , an alien's initial period of conditional temporary residence would have been extended for five years if the alien met additional requirements. These included satisfying one of the following: (1) college graduation or college attendance for at least eight semesters, (2) service in the Armed Forces for at least three years, or (3) a combination of college attendance, military service, and/or employment, as specified, for at least four years. After seven years in conditional temporary resident status, an alien could have applied for LPR status subject to another set of requirements. These requirements included continued compliance with the requirements for conditional temporary resident status, submission of biometric and biographic data for security and law enforcement background checks, satisfaction of the English language and civics requirements for naturalization (unless exempt due to a disability), and payment of any applicable federal tax liability. Like S.Amdt. 1958 , S.Amdt. 1959 would have placed limitations on the ability of its beneficiaries to naturalize and the ability of the family members of its beneficiaries to obtain lawful immigration status under existing law. The provisions in S.Amdt. 1959 , however, were more restrictive than those in S.Amdt. 1958 . An individual would have had to wait at least seven years after being granted LPR status to apply for naturalization. S.Amdt. 1959 would also have provided that a parent or other family member of an alien granted conditional temporary resident status or LPR status could not have gained any status under the immigration laws based on a parental or other family relationship. The amendment did not include any language on federal student aid or Section 505 of IIRIRA. On February 15, 2018, the Senate voted (39 to 60) not to invoke cloture on S.Amdt. 1959 . In June 2018, the House considered two major immigration reform bills with provisions on unauthorized childhood arrivals. Notably, unlike the Senate amendments discussed above and the bills considered in prior Congresses, these bills would not have established new mechanisms for unauthorized childhood arrivals to apply for LPR status on their own behalf. One bill ( H.R. 4760 ), which would have applied only to DACA recipients, would have provided eligible individuals with a renewable temporary status. The other ( H.R. 6136 ) would have enabled eligible individuals to adjust to LPR status in the United States if they were otherwise eligible for immigrant visas. Neither bill passed. The Securing America's Future Act of 2018 ( H.R. 4760 ) would have established a process for certain unauthorized childhood arrivals to obtain a new temporary immigration statusâcontingent nonimmigrant (CNI) status. To be eligible for CNI status, individuals would have had to have on the bill's date of enactment valid work authorization that was issued pursuant to the DACA initiative (thus, they would have needed to be current DACA recipients). Among the other eligibility criteria for CNI status, individuals would have had to be enrolled in and attending an educational institution full-time, or to have earned a high school diploma, General Educational Development certificate, or high school equivalency certificate. Applicants for CNI status also would have had to submit biometric and biographic data for security and law enforcement checks and clear specified INA inadmissibility and deportability criteria and other specified ineligibilities. The latter ineligibilities were stricter than those under the Senate amendments considered in the 115 th Congress and earlier bills on unauthorized childhood arrivals. Applicants also would have had to pay a border security fee. CNI status would have been granted for a period of three years and could have been extended in three-year increments. Contingent nonimmigrants would have been eligible for employment authorization and could have traveled outside the United States and been permitted to return. H.R. 4760 would not have provided a pathway to LPR status. On June 21, 2018, the House voted (193 to 231) not to pass H.R. 4760 . Like H.R. 4760 , the related Border Security and Immigration Reform Act of 2018 ( H.R. 6136 ) would have established a process for certain unauthorized childhood arrivals to obtain CNI status. This bill included many of the same eligibility and ineligibility criteria for CNI status as H.R. 4760 , but it would not have been as restrictive. For example, it would not have been limited to individuals who had DACA. Among other, specific differences between the criteria in the two bills, H.R. 4760 would have required applicants for CNI status to be under age 31 on June 15, 2012, which is a requirement for DACA, and also to be under age 31 at the time of filing the CNI application. H.R. 6136 would have required applicants to meet the former age requirement but not the latter. Under H.R. 6136 , CNI status would have been granted for a period of six years and could have been extended in six-year increments. Contingent nonimmigrants would have been eligible for employment authorization and could have traveled outside the United States and been permitted to return. In a key difference from H.R. 4760 , H.R. 6136 would have created a means for CNIs who met certain criteria to become LPRs through the INA adjustment of status provisions. As mentioned in the earlier discussion of the original Dream Act proposals, foreign nationals in the United States who have immigrant visas immediately available to them (based, for example, on an immigrant visa petition filed by a qualified family member) and meet other criteria can become LPRs without having to leave the country. However, in order to adjust to LPR status through these provisions, individuals (except for certain battered immigrants) must have been \"inspected and admitted or paroled into the United States.\" They also must be admissible to the United States for permanent residence under the grounds enumerated in the INA. In addition, with limited exceptions, these adjustment of status provisions are inapplicable to an individual who has engaged in unauthorized employment or \"who has failed (other than through no fault of his own or for technical reasons) to maintain continuously a lawful status since entry into the United States.\" H.R. 6136 would have provided that in applying the INA adjustment provisions to a CNI who has been in that status for five years, the CNI would have been considered to be inspected and admitted into the United States. It also would have provided that in making determinations about the CNI's admissibility to the United States, specified grounds of inadmissibility, including grounds related to unlawful presence and lack of proper documentation, would not have applied. The bill, however, did not explicitly address other disqualifications under the adjustment of status provisions, such as for unauthorized employment. The limited permanent immigration relief offered by H.R. 6136 can be seen as occupying a middle ground between H.R. 4760 's renewable temporary status and the special pathways to permanent resident status proposed under the Senate amendments. On June 27, 2018, the House voted (121 to 301) not to pass H.R. 6136 . As of the date of this report, legislative activity in the 116 th Congress on unauthorized childhood arrivals has occurred in the House in connection with the American Dream and Promise Act of 2019 ( H.R. 6 ). This bill contains a Title I (Dream Act) on unauthorized childhood arrivals and a Title II (American Promise Act) on nationals of certain countries designated for TPS or deferred enforced departure (DED). Unlike other bills on unauthorized childhood arrivals that have seen floor action in recent Congresses H.R. 6 does not address an array of immigration issues. The House passed H.R. 6 on June 4, 2019, by a vote of 237 to 187. The Dream Act title of H.R. 6 would establish a mechanism for certain childhood arrivals who are inadmissible or deportable from the United States or who have TPS or are covered by a grant of DED to become LPRsâin most cases through a two-stage process. To obtain conditional LPR status in stage 1, an individual would need to meet a set of requirements, including continuous presence in the United States for at least four years since the date of enactment, initial U.S. entry before age 18, no inadmissibility under specified grounds in the INA and no other specified ineligibilities, and satisfaction of educational requirements. These educational requirements could be satisfied in various ways, including, as in some earlier bills, by attainment of a high school diploma or comparable credential or by enrollment in secondary school or a program to obtain a high school diploma or comparable credential. They also could be satisfied by obtaining a credential from a career and technical education school that provides education at the secondary level. DACA recipients who meet the requirements for a DACA renewal, as in effect in January 2017, would be subject to streamlined application procedures to be established by DHS. All applicants would need to submit biometric and biographic data for security and law enforcement background checks. Conditional LPR status would be valid for 10 years. In stage 2, a conditional LPR would have to meet a second set of requirements to have the conditional basis of his or her status removed and become a full-fledged LPR. Among these requirements are achievement of one of the following, subject to a hardship exception: (1) attainment of a college degree, completion of at least two years in a program for a bachelor's or higher degree, or acquisition of a recognized postsecondary credential from an area career and technical education school; (2) service in the uniformed services for at least two years; or (3) earned income for at least three years and at least 75% of the time the alien had valid employment authorization. The other stage 2 requirements include submission of biometric and biographic data for security and law enforcement background checks, continued clearance of the inadmissibility and ineligibility criteria for conditional LPR status, and satisfaction of the English language and U.S. civics requirements for naturalization, subject to an exception due to disability. Under H.R. 6 , a conditional LPR could apply to have the condition on his or her status removed at any time after meeting the stage 2 requirements. The time spent in conditional status would count as time in LPR status for purposes of naturalization, but the individual could not apply for naturalization while in conditional status. In addition, like S.Amdt. 1955 in the 115 th Congress, the bill would provide that an applicant meeting all the stage 1 and stage 2 requirements at the time of submitting his or her initial application would be granted full-fledged LPR status directly (without first being granted conditional status). Regarding postsecondary education, H.R. 6 would not place any restrictions on its beneficiaries' eligibility for federal student aid and would not repeal Section 505 of IIRIRA. The Trump Administration's efforts to end the DACA program have focused renewed attention on the issue of unauthorized childhood arrivals. Passage of H.R. 6 in the House in the 116 th Congress can be seen as a result of this renewed attention. This bill is the latest of several measures to grant LPR status to unauthorized childhood arrivals, and the first in more than five years, to have passed one chamber. The question remains, however, if this bill or another measure to grant legal status to DACA recipients or unauthorized childhood arrivals will be enacted into law.", "summary": "On June 4, 2019, the House passed the American Dream and Promise Act of 2019 ( H.R. 6 ) on a vote of 237 to 187. Title I of the bill, the Dream Act of 2019, would establish a process for certain unauthorized immigrants who entered the United States as children (known as unauthorized childhood arrivals) to obtain lawful permanent immigration status. This vote on H.R. 6 was the latest in a line of House and Senate floor votes on legislation to grant some type of immigration relief to unauthorized childhood arrivals. As commonly used, the term \"unauthorized childhood arrivals\" encompasses both individuals who entered the United States unlawfully, and individuals who entered legally but then lost legal status by violating the terms of a temporary visa. There is no single set of requirements that defines an unauthorized childhood arrival. Individual bills include their own criteria. Legislation on unauthorized childhood arrivals dates to 2001. The earliest bills, which received Senate committee action in the 107 th and 108 th Congresses, only addressed unauthorized childhood arrivals. More recent proposals receiving legislative action have combined provisions on unauthorized childhood arrivals with other immigration provisionsâin some cases, these have been major bills to reform the immigration system, such as Senate-passed S. 744 in the 113 th Congress. None of these bills have been enacted into law. Most measures on unauthorized childhood arrivals that have seen legislative action have proposed mechanisms for eligible individuals to become lawful permanent residents (LPRs), typically through a two-stage process. Criteria to obtain a conditional or temporary status (stage 1) commonly include continuous presence in the United States for a minimum number of years prior to the date of the bill's enactment, initial entry into the United States as a minor, and satisfaction of specified educational requirements. Criteria to become a full-fledged LPR (stage 2) typically include satisfaction of additional educational requirements or service in the Armed Forces, or, in some cases, employment. Proposals to grant legal immigration status to unauthorized childhood arrivals also require applicants to clear criminal and security-related ineligibility criteria. In June 2012, following unsuccessful efforts in the 111 th Congress to enact legislation to grant LPR status to unauthorized childhood arrivals, the Department of Homeland Security (DHS) announced the Deferred Action for Childhood Arrivals (DACA) initiative. Under this initiative, eligible unauthorized childhood arrivals could receive renewable two-year protection from removal and work authorization. The eligibility criteria for an initial grant of DACA were broadly similar to those in earlier bills on unauthorized childhood arrivals and included continuous residence in the Unite d States since June 2007 , initial U.S. entry before age 16 , and satisfaction of educational requirements or service in the Armed Forces. In September 2017, Attorney General Jeff Sessions announced that DACA was being terminated. Due to court rulings to date, however, past recipients continue to be able to request DACA. The U.S. Supreme Court is scheduled to hear arguments on the DACA rescission on November 12, 2019. According to USCIS data, there were approximately 669,080 active DACA recipients as of April 30, 2019, and the total number of individuals who had ever been granted DACA was 822,063 as of July 31, 2019. These DACA recipient numbers can be compared to estimates of the DACA-eligible population. The Migration Policy Institute has estimated that as of 2018, 1,302,000 individuals met the original DACA eligibility requirements and an additional 356,000 met the age, residence, and immigration status criteria but not the educational requirements. It remains to be seen whether H.R. 6 , as passed by the House, or another measure to grant legal status to unauthorized childhood arrivals will be enacted into law.", "document_type": "crs"}
{"report": "Swiping a card to pay for something seems routine today; however, at one point in recent history, a piece of plastic with a magnetic strip capable of electronically communicating payment information between the banks of a consumer and a merchant was completely unprecedented. Financial technology, or fintech , refers to the broad subset of financial innovations that apply new technologies to a financial service or product. Although the term was coined only recently, it likely would have been applied to a broad set of innovations, such as the advent of automated teller machines, or ATMs, in the 1960s and mobile payments in the 2000s. There is no singular definition of fintech, often making policy discussions around this topic complicated. Further, U.S. financial system regulation is fragmented across many regulators by industry, business practice, and geographical jurisdiction, so regulating fintech is multifaceted. Each financial regulator has a different mandate, creating gaps and overlaps among their jurisdictions. Regulators have used various policy tools to approach the new technologies in a manner consistent with their mandate, which impacts both institutions under their direct jurisdiction and new firms that do not cleanly fit under one regulator's jurisdiction. Recent congressional interest in fintech has led to several hearings, the creation of fintech task forces, and legislation pertaining to one or multiple financial system regulators. This report examines activities and proposals initiated after the enactment of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank; P.L. 111-203 ) that are relevant to fintech. These can include fintech actions as defined by a regulator or actions pertaining to areas of financial services that intersect with technology but may not be explicitly considered fintech. Financial regulators generally fall into three groups, which are responsible for (1) depository institutions, (2) consumer protection, and (3) securities. Their approaches may include the following: writing new rules or amending existing ones; issuing guidance to clarify the applications of the rules to new types of business lines; creating new types of charters for institutions; using supervisory authorities to examine partnerships between regulated and unregulated entities; issuing enforcement actions to companies that violate regulations or laws; or establishing new offices and staffing experts to serve as outreach points-of-contact for relevant industry concerns. Table 1 summarizes the federal regulators discussed in this report, including their scope, and relevant authorities. The depository institution regulators discussed in this report include the Federal Reserve, the Office of the Comptroller of the Currency (OCC), the Federal Deposit Insurance Corporation (FDIC), and the National Credit Union Administration (NCUA)âthese are referred to as banking regulators. The consumer protection agencies include the Consumer Financial Protection Bureau (CFPB) and the Federal Trade Commission (FTC). The securities regulators include the Securities and Exchange Commission (SEC) and the Commodity Futures Trade Commission (CFTC). More information on the mandates and relevant authorities of these regulators can be found in Appendix A . The banking regulatorsâthe Federal Reserve, FDIC, OCC, and NCUAâface particular fintech-related challenges regarding how to ensure banks and credit unions can efficiently and safely interact with nonbank fintech companies. Sometimes fintech companies partner with and offer services to banks or credit unions. Other times, they seek to compete with banks by offering bank or bank-like services directly to customers. In some circumstances, banks themselves can develop their own fintech. Given their broad responsibilities, banking regulators can engage with and respond to fintech in numerous ways, including by amending rules and issuing guidance to clarify how rules apply to new products; supervising the relationship banks form with fintech companies; granting banking licenses to fintech companies; and conducting outreach with new types of firms to facilitate communication between industry and regulators. Examples of these regulatory actions are discussed in more detail below. Each of the agencies has slightly different regulatory scope, so the efforts described in the sections below reflect each regulator's interest in balancing the risks and benefits of financial technologies. In general, banking regulators have not been active in issuing fintech-specific rules in the last 10 years. Instead, regulators have focused more heavily on issuing guidance on how new products and new relationships fit into the current regulatory framework. Relationships between banks and technology service providers (TSPs)âthird-party partnershipsâare particularly relevant because many TSPs are fintech companies. Banking regulators use their authority to examine the operations of these third-party partnerships as a critical tool to supervise the interactions between banks and nonbank technology firms. Further, third-party supervision demonstrates how regulators have used and applied the existing framework to fintech activities. From a banking regulator's standpoint, an institution can be a bank, a nonbank, or a nonbank that partners with a bank. Bank regulators have jurisdiction over banks and their partnerships with nonbanks. Some insured depository institutions opt to partner with TSPs to receive software and technical support. Often, banks will use TSPs to support critical business needs, such as core processing, loan servicing, accounting, or data managementâareas where fintech companies have become active market participants. As banks increasingly rely on TSP partnerships, regulators are becoming increasingly interested in how banks manage the risks associated with these partnerships. Banking regulators require a financial institution that chooses to partner with a TSP to ensure that the activities performed by the TSP for the institution meet the same regulatory requirements as if they were performed by the bank itself. Banking regulators' broad set of authorities to supervise TSPs are provided by the Bank Service Company Act (BSCA; P.L.87-856). Specifically, the BSCA provides banking regulators with authority to examine and regulate third-party vendors that provide services to banks. The banking regulators periodically issue and update guidance pertaining to third-party vendors. They issued interagency guidelines in 2001 that, among other things, require banks to provide continuous oversight of third-party vendors such as TSPs to ensure they maintain appropriate security measures. In 2017, the FDIC's Office of Inspector General issued an evaluation of TSP contracts, noting that many of the sampled institutional relationships did not adequately address the risks associated with TSP partnerships. In 2019, the FDIC issued a financial institution letter on TSP contracts, outlining the statutory obligations of firms pursuant to the BSCA and the Gramm-Leach-Bliley Act ( P.L. 106-102 ) and encouraging financial institutions to ensure service provider contracts adequately address business continuity and incident response risks. Rulemaking with a specific focus on fintech companies is relatively infrequent, but banking regulators occasionally issue rules or proposed rules that have some tangential impact on fintech companies, such as a recently proposed FDIC rule on brokered deposits. This proposed rule is another example of how regulators have used an existing regulatory framework to potentially accommodate fintech developments. Generally, banks hold two types of deposits: core deposits and brokered deposits. Core deposits are funds individuals or companies directly place in checking and savings accounts, whereas brokered deposits are funds that a third-party broker places in a bank on behalf of a client, typically to maximize interest earned and possibly to ensure that the accounts are covered by the FDIC's $250,000 insurance limit. Brokered deposits are considered less stable than core deposits, as the former is typically moved around frequently depending on market conditions. If a bank is not considered well-capitalized by its regulator, the regulator can prohibit the bank from accepting brokered deposits. Consumers increasingly use nonbank technology-based tools, such as mobile phones and fintech apps, to move money between accounts. Under certain circumstances, rules against accepting brokered deposits could apply to money transfers using nonbank technologies. The FDIC, responding to concerns that regulators have applied the rules too broadly, published a notice of proposed rulemaking in December 2019 that would allow deposits to enter the banking system through new technological channels without being subject to brokered deposit rules. Regulators occasionally create programs through which firms can experiment with new products in a way that allows industry and regulators to better understand how new technologies can impact consumers and the market. These programs are sometimes referred to as sandboxes or greenhouses . As a state-level example, Arizona created such a program in March 2018. At the federal level, these programs are being discussed but have not fully taken shape. Among the banking regulators, the OCC has proposed a regulatory sandbox program, discussed below. In April 2019, the OCC proposed a voluntary Innovation Pilot Program to support the testing of innovative products, services, and processes that could significantly benefit consumers, businesses, and communities, including those that could promote financial inclusionâthe OCC is considering public comments on the program as of the date of this report. This proposed program is similar to the concept of a regulatory sandbox or greenhouse, which is discussed in the \" Sandboxes and No-Action Letters to Promote Innovation \" section, below. Some key characteristics and considerations of the proposed program include the following: The pilot would be open to banks, their subsidiaries, and federal branches and agencies, including those partnering with third parties to offer innovative products, services, or processes. It would also be open to banks working together, such as in a consortium or utility. The OCC is considering a suite of regulatory tools during the pilot to communicate with banks, including interpretive letters, supervisory feedback, and technical assistance from OCC subject-matter expertsâthe tools would not include statutory or regulatory waivers. The OCC may address the legal permissibility of a product or service that a bank proposes to test as part of the program. The OCC would expect banks to address risks to consumers and would not permit into the program proposals that have potentially predatory, unfair, or deceptive features. One foundational way banking regulators can regulate institutions not traditionally covered by banking regulations, such as fintech companies, is to grant a banking license to a new type of firm. By doing this, the institution becomes covered by the regulatory framework that applies to other depository institutions, and the regulator can apply a similar supervisory framework to the new institution's operations. The OCC and FDIC recently have taken measures to consider charters for nonbank companies. The OCC's efforts are specifically targeted to fintech companies, and the FDIC's efforts could affect a fintech company's opportunity to become a chartered bank. Many nonbank financial companies are licensed at the state level. Thus, a fintech company wanting to do business across the United States would need to obtain 50 different state licenses and meet a complex set of 50 state regulations and standards in order to do so. In response to concerns about this complexity, the OCC requested comments in 2016 on a proposal to offer national bank charters to fintech companies. In 2018, it announced that it would begin offering charters to fintech companies. The OCC's charter initiative has been controversial. State regulators and consumer advocates have argued that granting such charters would inappropriately allow federal preemption of important state-level consumer protections, and that the OCC does not have the authority to grant bank charters to these types of companies. State regulators have filed lawsuits, and the matter is the subject of ongoing legal proceedings. In addition to traditional bank charters, several states offer a type of bank charter for industrial loan companies (ILCs). Recently, fintech firms have begun to explore these types of charters. ILCs chartered in some states are allowed to accept certain types of deposits if the FDIC has approved the ILC for deposit insurance. Given this condition, the FDIC is considering whether or not to grant deposit insurance to fintech firms; doing so would allow ILCs to operate, under certain state charters, what would be in effect full-service, FDIC-insured banks. Several technology-focused companies have applied to establish new ILCs. ILCs are regulated in two unique ways, which make them both attractive and controversial to certain fintech companies seeking to have deposit-taking bank operations: ILCs can be owned by a nonfinancial parent company, creating an avenue for commercial firms, such as fintech companies, to own a bank. Critics of ILCs argue this runs counter to the long-standing U.S. policy of separating banking and commerce. In some circumstances, these parent companies are not considered a bank-holding company; therefore a fintech company owning a bank as a nonfinancial parent company might not be subject to supervision by the Federal Reserve, pursuant to the Bank Holding Company Act of 1956 (BHCA; P.L. 84-511). Critics argue this would result in under regulation of an ILC parent company. In response to concerns over ILCs, the FDIC and Congress have in the past implemented moratoriums on approving FDIC-insurance for new ILCs. No new ILC charters have been granted since the end of the most recent moratorium in 2013, prompting ILC proponents to argue an unofficial moratorium is in effect without regulatory or statutory basis. By applying to establish new ILCs, technology companies have renewed public interest in ILCs in general. If the FDIC generally begins granting deposit insurance to ILCs, this could create a path for nontraditional banking companies beyond fintechs to offer bank services. The BHCA establishes the terms and conditions under which a company can own a bank in the United States and grants the Federal Reserve the authority to regulate these holding companies. In 1987, Congress enacted the Competitive Equality Banking Act of 1987 (CEBA; P.L. 100-86 ) to provide exemptions to permit certain financial and commercial companies to own and control industrial banks without becoming a bank-holding company under the BHCA. In granting deposit insurance for any insured depository institution, including industrial banks, the FDIC must assess the safety and soundness of the proposed institution and the risk posed to the Deposit Insurance Fund. Recent deposit insurance filings involving industrial banks have proposed ownership and control structures that would not be subject to federal consolidated supervision. To codify and enhance the FDIC's supervisory process with respect to these institutions, the FDIC issued a notice of proposed rulemaking on March 31, 2020, which would require certain conditions and commitments for agency approval of applications that would result in an insured industrial bank or ILC becoming a subsidiary of a company that is not subject to supervision by the Federal Reserve. The proposed rule would also require that the parent company and industrial bank or ILC enter into one or more agreements with the FDIC. Many regulators have expressed interest in developing programs that facilitate innovation. Innovation can lead to new types of products for consumers, such as mobile payments, but it can also create obstacles for consumers to manage. Banking regulators and other financial system regulators, such as the Consumer Financial Protection Bureau (CFPB) (see \" Consumer Protection Agencies: Approach to Fintech \"), implement and promulgate rules pertaining to the payments system. (See Appendix B for these rules and other regulatory interests in payments innovation.) The payments system provides a few examples where new technologies create the potential for both benefits and risks to consumers. The Federal Reserve's proposed FedNow Service payments initiative is one example of a regulator facilitating a new product for consumers. The Federal Reserve operates or regulates important elements of the payments and settlement system, including retail payment networks such as the FedACH network, multilateral settlement services such as the National Settlement Service, and real-time gross settlement systems such as Fedwire Funds Service. Recently, the Federal Reserve announced plans to develop the FedNow Service: a real-time payments and settlement system for peer-to-peer and business-to-consumer payments. The FedNow Service is expected to impact consumers as they continue to conduct commerce using electronic payments, mobile phones, and apps. Transacting in this way can lead to better outcomes for consumer budgeting, as transactions are settled in real time, but it also may impact a consumer's ability to resolve errors, as instantaneous payments are harder to stop or return. Given the importance of safety in the payments system, the Federal Reserve and a private organization called the Clearing House have both established real-time payments to create competition in the market for payments and settlement services, with the idea that competition will increase market discipline and enhance resiliency in the system. The Federal Reserve anticipates the FedNow Service will be available in 2023 or 2024. Each depository regulator has put together a working group or formal office to understand how new technologies may affect institutions under their jurisdictions and to establish a point of contact for industry. A summary of these efforts is presented below. Table B-1 in Appendix B provides a synopsis of the offices established by each financial regulator discussed in this report, and Appendix C summarizes other efforts, such as research programs, notable fintech conferences, and working groups. In December 2019, the Federal Reserve established a series of programs to support financial innovation in the financial services marketplace. Part of this effort includes offering \"office hours\" to supervised financial institutions and nonbank fintech firms looking for information about financial innovation. These office hours are held at the various Federal Reserve Banks. The Federal Reserve also established a new website, which contains information about related supervisory information, regulatory guidance, staff speeches, publications, research, and events. The Reserve Banks have created working groups to address fintech issues, which are summarized in Appendix C . In 2015, the OCC began developing a \"Responsible Innovation\" framework to address issues of financial services innovations. This framework is summarized in Table C-1 of Appendix C . As part of the framework, the OCC created a group to meet with banks, fintech companies, consumer groups, regulators, and other stakeholders to discuss various issues, concerns, and areas of interest relevant to fintech. In 2017, the OCC formally established the Office of Innovation to implement its Responsible Innovation framework and provide a central point of contact for requests and information related to innovation. The FDIC recently has taken steps to establish fintech-specific programs. It created its own version of an office of innovation, the FDIC Tech Lab, or \"FDiTech,\" in October 2018. The FDIC Tech Lab is intended to promote, coordinate, and understand the role of new innovations among technology firms, financial institutions, and other regulators. The Tech Lab's stated goals are to engage with financial and technology companies to identify opportunities to improve the safety and soundness of insured depository institutions, promote competition, increase economic inclusion, support risk management, and facilitate efficient resolution of failed institutions. The mandate for the consumer protection agenciesâCFPB and FTCâis largely to ensure that consumers are unharmed by the practices of businesses under their jurisdiction while maintaining a competitive marketplace. Within the context of fintech, there are tradeoffs between these objectives. For instance, encouraging firms to offer new kinds of consumer-friendly financial services can help create a competitive market, but the new products also can create the potential for unforeseen risks to consumers. Similar to the banking regulators, the CFPB and FTC issue and promulgate regulations on issues pertinent to fintech, such as payments and data security, and both agencies have created outreach offices. The consumer protection agencies, however, tend to use enforcement actions as tools to manage the effects of fintech on the financial system to a greater extent than banking regulators. This partly is because the consumer protection agencies are responsible for implementing and enforcing consumer protection laws for many nonbank financial companiesâunlike the banking regulators, which generally do not have enforcement authorities for nonbank financial companies. The consumer protection agencies use enforcement actions to balance their mandates with respect to fintechs in two additional ways: protect consumers by levying enforcement actions against firms that violate consumer protection laws, and promote market competition and facilitate innovations that benefit consumers by creating safe harbors for firms from enforcement actions in order to encourage firms to develop new technologies and solve challenges facing consumers. Whereas the CFPB has a broad range of regulatory authorities relevant to fintech, the FTC is somewhat limited to enforcement actions for many fintech activities, as it has some investigative authority but no supervisory authorities. Examples of these approaches are explored in more detail below. One way consumer protection agencies implement their legal authorities is through enforcement actions: agencies can take a number of actions to levy penalties against or stop firms that violate law or regulation. The FTC's enforcement actions include a number of orders that pertain to fintech firms. The FTC enforces federal consumer protection laws that prevent fraud, deception, and unfair business practices, as well as federal antitrust laws that prohibit anticompetitive mergers and other business practices that could lead to higher prices, fewer choices, or less innovation. Companies that violate laws under FTC jurisdiction are liable for civil penalties for each violation. Over the past decade, the FTC has brought over 20 cases against telecommunications firms, money service businesses, prepaid card companies, and technology firms, among others, with operations relevant to fintech and in violation of FTC competition and fairness rules. Table 2 describes the outcomes of selected recent FTC fintech-related enforcement actions. Consumer protection agencies occasionally create policies or programs that temporarily shield firms from enforcement actions if they meet certain conditions. In the past few years, the CFPB has built upon its No-Action Letter (NAL) policy, which provides some assurances that if a company offers a product or service in a specific way, the agency will withhold enforcement actions for that particular activity. With respect to fintech, the CFPB has identified the NAL policy as a way to encourage firms to produce products and disclosures that may benefit consumers. Consumer protection agencies also promote innovation through programs such as sandboxes or greenhouses, which can allow firms to trial new ideas and products while being subject to a subset of the existing regulatory framework or while being granted safe harbor from certain enforcement actions (see \" Regulatory Sandboxes \"). In 2016, the CFPB introduced its NAL policy to withhold enforcement actions against qualifying consumer-friendly innovations and to help inform the CFPB on new products and services being offered. Although the CFPB anticipated limited participation in this original NAL policy, it announced its first NAL in 2017 to a company that used alternative data and machine learning in making credit underwriting and pricing decisions. To encourage more robust participation, the CFPB revised its NAL policy in 2019, amending the application and review process and reportedly strengthening its commitment to provide safe harbor to qualifying firms. The CFPB created sandbox programs to encourage certain firms to test consumer financial services by granting the firms temporary safeguards from liability and enforcement actions. In addition to creating the NAL policy, the CFPB created the Compliance Assistance Sandbox (CAS) policy to enable some firms to test certain innovative products by providing the firms with temporary safe harbor from liability under certain statutes. The CFPB expects participation in the CAS policy to be time-limited, typically two years, with extensions available in specific circumstances. In addition, Dodd-Frank allows the CFPB to provide trials for companies to test new types of disclosuresâwith safeguards from certain liabilities and on a basis that is limited in time and scopeâto make them more effective for consumers. The CFPB first released a Trial Disclosure Policy (TDP) in 2013 and updated it in 2019 to encourage more robust participation. Similar to the banking regulators, the CFPB has an office that serves as a point of contact for industry and other stakeholders. The CFPB also created a network to facilitate policy coordination pertaining to fintech among the federal and state financial regulators. The FTC, to support its investigation authorities, has done research and outreach to try to better understand the ways fintech may impact consumer protection and market competition. These programs are briefly explained below, and additional information regarding these programs can be found in Appendix C . In 2012, the CFPB created Project Catalyst to encourage \"consumer-friendly innovation and entrepreneurship in markets for consumer financial products and services\" by communicating and engaging with industry innovators. Through Project Catalyst, the CFPB studied issues surrounding access to credit, safeguarding financial records, cash flow management, student loan refinancing, mortgage servicing platforms, credit reporting, and peer-to-peer money transfers. The CFPB also held office hours, provided technical assistance, and offered an earlier version of the above-mentioned TDP and NAL policy programsâbefore the new Office of Innovation was createdâdesigned to encourage firms to produce consumer-friendly innovations by safeguarding those products from CFPB enforcement actions. In 2018, the CFPB rebranded Project Catalyst, introducing a suite of policies and programs to centralize policies pertaining to consumer-focused innovation through a newly established Office of Innovation. The office provides a single point of contact for firms looking to participate in the revised NAL policy and sandbox policy programs, explained above. In September 2019, the CFPB launched the American Consumer Financial Innovation Network (ACFIN) of state regulators. The CFPB created ACFIN to enhance coordination among federal and state regulators and to facilitate financial innovation as regulators develop new regulations and apply existing ones. The network is open to all state and federal financial regulators, as well as state attorneys general. The FTC develops policy and research tools through hearings, reports, workshops, and conferences to support its investigation authorities. Since 2012, the FTC has hosted numerous events and developed several reports on mobile payments, big data, marketplace lending, cryptocurrency scams, and small business financing. For example, the FTC has hosted several forums on fintech issues, including one on marketplace lending in June 2016, crowdfunding and peer-to-peer payments in October 2016, and artificial intelligence and blockchain technology in March 2017. In 2018, the FTC hosted an event on cryptocurrency scams for consumer groups, law enforcement, researchers, and the private sector as part of its consumer protection work. The securities regulatorsâthe SEC and the CFTCâare focused on any securities-related activities, including those of fintech companies. Examples would include a fintech company raising capital by issuing equity through an initial coin offering or a firm creating a new technology for derivatives contracts. Given their mandate, the securities regulators have used a range of regulatory tools, largely focused on clarifying whether and how the existing regulatory framework applies to new types of technologies, including the following: writing rules and guidance to clarify how existing rules apply to new types of approaches to securities; issuing enforcement actions against any fintech firms that may violate the securities laws under their jurisdiction; and setting up fintech outreach offices to serve as points of contact for stakeholders. Examples of these regulatory approaches are provided below. The SEC recently published guidance and rules on new capital-raising measures known as Initial Coin Offerings (ICOs) and crowdfunding, as well as on issues regarding automated investment advice (\"robo advisors\"). Both the SEC and CFTC have used their broad enforcement authorities to issue enforcement actions against digital asset practices that violated rules under their respective jurisdictions. Further, the SEC used its NAL policy (similar to that used by the CFPB, discussed above) to provide safe harbor to digital asset related companies. These initiatives are summarized below. Firms that issue cryptocurrencies may consider an ICO to raise capital by issuing digital assets to investors. In 2019, the SEC published a framework to build on 2018 guidance for companies to understand whether their ICOs qualify as securities and are subject to SEC regulation. The process of issuing an ICO is similar to a public companies' Initial Public Offeringâa well- regulated and commonplace way to raise capital in equity markets for newly public companiesâin that both aim to raise funding, but confusion may exist among investors and industry over whether digital assets are treated the same way under SEC regulation. The Jumpstart Our Business Startups Act (JOBS Act; P.L. 112-106 ) contains provisions that establish a regulatory structure for startups and small businesses to raise capital through issuing securities using internet-based crowdfunding. Effective May 2016, the SEC adopted a rule to implement these provisions, thereby governing the offer and sale of such securities and providing a framework for regulating certain registered funding portals and other intermediaries. The SEC has issued guidance for robo advisors, which provide automated investment advice. The staff guidance serves to inform registered and other investment advisers on how to comply with the relevant securities statutes. Compliance requires firms or sole practitioners compensated for advising others about securities investments to register with the SEC and conform to regulations designed to protect investors. The SEC has broad enforcement authorities, granting it the ability to suspend business practices through injunctions and to bring administrative proceedings, such as cease and desist orders. The SEC manages a robust enforcement action program across several industries and has issued 48 such actions against digital asset-related companies since 2013. Similarly, the CFTC issues enforcement actions to enforce derivatives laws; since 2018, it has issued more than 20 enforcement actions against firms related to Bitcoin and other cryptocurrency fraud schemes. In addition to its enforcement authority, the SEC grants NALs in some instances to provide relief from the SEC taking an enforcement action against a company. The SEC provided three such letters to digital asset companies in 2019. In 2018, the SEC created the Strategic Hub for Innovation and Financial Technology (FinHub) to serve as a resource for public engagement on fintech issues, such as distributed ledger technology, digital assets, automated investment advice, digital marketplace financing, and artificial intelligence/machine learning. FinHub, developed from numerous SEC internal working groups, also is designed to make the SEC's fintech work more accessible to industry and serve as a platform to inform the SEC's understanding of new financial technologies. LabCFTC is the focal point of the CFTC's efforts around financial innovation and is designed to make the CFTC more accessible to innovators. LabCFTC also serves as a platform to inform the CFTC's understanding of new technologies, providing information for CFTC staff that may influence policy development. LabCFTC seeks to promote responsible innovation to improve the quality, resiliency, and competitiveness of markets. It also aims to accelerate CFTC engagement with new technologies that may enable the CFTC to carry out its mission responsibilities more effectively and efficiently. There are two main components to LabCFTC: (1) GuidePoint, which creates a dedicated point of contact for stakeholders, and (2) CFTC 2.0, which serves as a beta testing environment for new technologies. Appendix A. Summary of Financial Regulator Mandates Banking Regulators Banks and credit unions serve a vital role in the economy. Thus, they are subject to a strong regulatory framework that requires institutions operate in a safe and sound manner. Depository institutions are routinely examined to ensure their business lines are healthy and to make sure they comply with various laws. These regulators also write and provide guidance on rules for depository institutions to implement their legal authorities over certain business practices. Although the mandates and authorities for each agency are a bit different, the agencies all serve as primary federal regulators for some kind of depository institution. The type of depository institution depends on whether a bank is chartered at the federal or state level and whether it is a member of the Federal Reserve System. (See Table A-1 .) Federal Reserve System The Federal Reserve Act of 1913 (P.L. 63-43) established the Federal Reserve as the central bank of the United States, comprising the Board of Governors and 12 Federal Reserve Banks. The Board generally sets policy, which is carried out by the Reserve Banks. In addition to its responsibility as the central bank to set monetary policy, the Federal Reserve is also responsible for supervising and regulating state banks that are members of the system and all bank-holding companies. The Federal Reserve also has an important role in operating the payments and settlement system. Table B-2 summarizes the Federal Reserve's notable recent activities in the payments system. Office of the Comptroller of the Currency The Office of the Comptroller of the Currency (OCC) was established in 1863 as a bureau of the U.S. Department of the Treasury. The OCC is the primary federal regulator for nearly 1,200 national banks, federal savings associations, and federal branches and agencies of foreign banks operating in the United States. The OCC grants national bank charters, which allow the charter holder to legally operate as a bank. Federal Deposit Insurance Corporation The Federal Deposit Insurance Corporation (FDIC), established by the Banking Act of 1933 (P.L. 73-66) and largely shaped into its modern form by the Federal Deposit Insurance Act of 1950 (P.L. 81-797), insures the deposits of banks and serves as the primary federal regulator for state-chartered banks and thrifts that are not members of the Federal Reserve. The FDIC manages the Deposit Insurance Fund, which provides the funds necessary to insure deposits and to resolve failed banks. The FDIC provides deposit insurance for deposits at all U.S. banks, both national and state, but most of the banks the FDIC supervises are smaller institutions, known as community banks. National Credit Union Administration In 1970, Congress amended the Federal Credit Union Act to establish the National Credit Union Administration (NCUA) as the regulator for the federal credit union system (P.L. 91-206). The NCUA supervises and insures deposit shares at federal credit unions and is responsible for resolving failing institutions. Consumer Protection Agencies Consumer protection laws and regulations are mainly within the jurisdiction of two agencies. The Consumer Financial Protection Bureau (CFPB) regulates certain financial firms for unfair, deceptive, and abusive acts and practices, as well as for compliance with several consumer protection laws. In addition, many firmsâboth financial and nonfinancialâare subject to oversight by the Federal Trade Commission (FTC), which regulates firms for competition and fairness. Consumer Financial Protection Bureau The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank; P.L. 111-203 ) established the CFPB to implement and enforce federal consumer financial law while ensuring that markets for consumer financial services and products are fair, transparent, and competitive. Dodd-Frank consolidated the consumer protection authorities promulgated by other agencies and provided CFPB new powers to issue rules declaring certain acts or practices associated with consumer financial products and services to be unlawful because they are unfair, deceptive, or abusive. The CFPB generally has regulatory authority over providers of an array of consumer financial products and services, including deposit taking, mortgages, credit cards and other extensions of credit, loan servicing, collection of consumer reporting data, and debt collection associated with consumer financial products. The scope of its supervisory and enforcement authority varies depending on an institution's size and whether it holds a bank charter. Federal Trade Commission Congress passed the Federal Trade Commission Act in 1914 to create the FTC and give it legal authority to protect consumers and promote competition. Specifically, the FTC looks to prevent unfair or deceptive acts or practices and to seek monetary redress or other relief for conduct deemed injurious to consumers. Generally, the FTC has broad investigation, rulemaking, and enforcement authorities that enable it to accomplish its mission. Securities Regulators Many companies issue stocks and bonds, trade derivatives, and offer other products collectively called securities. Securities are generally regulated by the Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC). (The CFTC has specific responsibility for derivatives markets.) The securities regulators promulgate rules and provide oversight over the institutions in their jurisdiction. They also conduct enforcement actions to investigate and prosecute violations of relevant regulations. Securities and Exchange Commission Congress passed the Securities Exchange Act of 1934 (P.L. 73-291) to establish the SEC and restore confidence in the securities markets after the stock market crash of 1929. The SEC is an independent agency that has broad authority over much of the securities industry in order to protect investors, promote fair and efficient markets, and facilitate capital formation. Commodity Futures Trading Commission The CFTC was created in 1974 by the Commodity Futures Trading Commission Act ( P.L. 93-463 ) to address the expansion of commodities beyond agriculture. Prior to this law, commodities generally were regulated at the Commodity Exchange Authority, a former agency within the U.S. Department of Agriculture. The CFTC regulates the U.S. derivatives markets, including futures, options, and swaps, and implements the Commodity Exchange Act (CEA; P.L. 74-675). Similar to the SEC, the CFTC has rulemaking and enforcement authorities for a range of issues, but the CFTC's authorities focus on derivatives markets derived from the CEA. Appendix B. Financial Innovation Offices Appendix C. Select Regulatory Fintech Initiatives Federal Reserve System Innovation Programs The OCC's Office of Innovation implements its Responsible Innovation framework in a number of ways that are described and summarized in Table C-1 . For instance, the agency established an outreach and technical assistance program to establish a dialogue with banks, fintech companies, consumer groups, trade associations, and regulators. It engages in outreach through a variety of channels. Over the past two years, for example, the Office of Innovation hosted office hours in five different cities for over 125 stakeholders, approximately 250 additional meetings and calls with stakeholders, and over 100 conferences and other events. The office provides technical assistance to help banks and fintech companies understand OCC expectations, relevant laws, regulations, and guidance, such as the agency's third-party risk management guidance. The Office of Innovation also conducts research and develops content, including white papers, webinars, and collaborations with other OCC business units to deliver in-house training, including on payment technologies. The Office of Innovation convenes representatives from various OCC business units to develop a coordinated strategy on particular topics, and it forms working groups to consider particular issues to coordinate and facilitate discussion between stakeholders and the OCC. It also endeavors to reduce regulatory uncertainty and inconsistency, provides assistance to agencies interested in establishing innovation offices, and helps the OCC share information and communicate with other U.S. agencies on emerging trends and ways to improve its innovation initiatives. The OCC participates in various regulatory forums, such as the Financial Stability Board's Financial Innovation Network, and it serves as co-chair of the Task Force on Financial Technology, established by the Basel Committee on Banking Supervision (BCBS). Furthermore, the OCC collaborates on cybersecurity issues domestically and internationally through the Federal Financial Institutions Examination Council, the Financial and Banking Information Infrastructure Committee, and the BCBS. Consumer Financial Protection Bureau Financial Innovation Programs The CFPB's recent efforts pertaining directly to fintech are summarized in Table C-2 below. Financial Crimes Enforcement Network The Financial Crimes Enforcement Network (FinCEN) is a bureau of the U.S. Department of the Treasury charged with administering U.S. anti-money laundering (AML) and combating the financing of terrorism (CFT) laws, most notably the Bank Secrecy Act (BSA; P.L. 91-508). In 2018, FinCEN, along with the Federal Reserve, the FDIC, the NCUA, and the OCC, announced an effort to encourage banks and credit unions to take innovative approaches to combating money laundering, terrorist financing, and other illicit financial threats by enhancing the effectiveness and efficiency of BSA/AML compliance programs. FinCEN Innovation Initiative. FinCEN launched an Innovation Initiative to address the challenges and opportunities of BSA and AML-related innovation in the financial services sector. FinCEN's Innovation Initiative includes the FinCEN Innovation Hours Program and regulatory relief programs to facilitate innovation around AML/CFT compliance. Additionally, FinCEN suggested that it will consider incorporating testing programs, similar to sandboxes, and \"Tech Sprints\" to facilitate the development of innovative solutions to AML/CFT challenges. Innovation Hours Program. The Innovation Hours Program is the most recent addition to the FinCEN Innovation Initiative. FinCEN intends to host financial institutions, technology providers, and other firms involved in financial services to discuss their interests in innovation around AML/CFT compliance. Appendix D. Payments Regulation and Programs Consumers generally have shifted toward electronic payments such as debit and credit cards. Since 2001, the Federal Reserve has been studying consumer trends in payment activities on a triennial basis. In 2019, the CFPB issued a rule to grant protections to prepaid cards in a similar fashion to debit and credit cardsâthis reflects the shift in consumer preference toward electronic payments. However, regulatory actions around electronic payments may create adverse conditions for some consumers who rely on cash. Balancing the interests of a faster, efficient payment system with one that works for different types of consumers is a challenge currently facing the Federal Reserve and CFPB. Table B-1 shows a number of these rules, which can impact fintech companies that offer services or support payments operations through partnerships at banks. As the Federal Reserve contemplates the design of its proposed faster payments system, it has numerous long-standing payments groups working on fintech and related issues. Many of these groups focus on the payments market. An overview of the Federal Reserve's payments groups is provided in Table B-2 to show the scope of work of the agency and its Reserve Banks. Appendix E. CRS Fintech Products Cybersecurity CRS Report R44429, Financial Services and Cybersecurity: The Federal Role , by M. Maureen Murphy and Andrew P. Scott CRS Report R45631, Data Protection Law: An Overview , by Stephen P. Mulligan, Wilson C. Freeman, and Chris D. Linebaugh. CRS In Focus IF10559, Cybersecurity: An Introduction , by Chris Jaikaran. Lending CRS Report R44614, Marketplace Lending: Fintech in Consumer and Small-Business Lending , by David W. Perkins. CRS Report R45726, Federal Preemption in the Dual Banking System: An Overview and Issues for the 116th Congress , by Jay B. Sykes. Payments CRS Report R45927, U.S. Payment System Policy Issues: Faster Payments and Innovation , by Cheryl R. Cooper, Marc Labonte, and David W. Perkins. CRS Report R45716, The Potential Decline of Cash Usage and Related Implications , by David W. Perkins. Banks and Third-Party Vendor Relationships CRS In Focus IF10935, Technology Service Providers for Banks , by Darryl E. Getter. Cryptocurrency and Blockchain-Based Payment Systems CRS Report R45427, Cryptocurrency: The Economics of Money and Selected Policy Issues , by David W. Perkins. CRS Report R45116, Blockchain: Background and Policy Issues , by Chris Jaikaran. CRS Report R45664, Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals , by Jay B. Sykes and Nicole Vanatko. CRS In Focus IF10824, Financial Innovation: \"Cryptocurrencies\" , by David W. Perkins. Digital Assets and Capital Formation CRS Report R46208, Digital Assets and SEC Regulation , by Eva Su. CRS Report R45221, Capital Markets, Securities Offerings, and Related Policy Issues , by Eva Su. CRS Report R45301, Securities Regulation and Initial Coin Offerings: A Legal Primer , by Jay B. Sykes. CRS In Focus IF11004, Financial Innovation: Digital Assets and Initial Coin Offerings , by Eva Su. High-Frequency Securities and Derivatives Trading CRS Report R44443, High Frequency Trading: Overview of Recent Developments , by Rena S. Miller and Gary Shorter. CRS Report R43608, High-Frequency Trading: Background, Concerns, and Regulatory Developments , by Gary Shorter and Rena S. Miller. Regulatory Approaches and Issues for Congress CRS In Focus IF11195, Financial Innovation: Reducing Fintech Regulatory Uncertainty , by David W. Perkins, Cheryl R. Cooper, and Eva Su. CRS Report R46332, Fintech: Overview of Innovative Financial Technology and Selected Policy Issues , coordinated by David W. Perkins. ", "summary": "New technologies in the financial services sector can create challenges for the various federal agencies responsible for financial regulation in the United States. As these regulators address the potential benefits and risks of innovation, policymakers have demonstrated significant interest in understanding the types of technologies that may benefit consumers and financial markets while identifying the risks that new financial services may present. As Congress considers the potential tradeoffs of financial technology or fintech , it can be useful to understand how the financial system regulators are approaching these issues. The financial system regulators can be grouped into three general categories: (1) depository institution regulators, (2) consumer protection agencies, and (3) securities regulators. Each type of regulator has the authority to write rules, publish guidance, supervise institutions, and enforce compliance with the laws they implement. Further, there are similarities and differences among each regulator's mandate, which shed light on the approaches the regulators tend to take when considering new fintech. The banking regulators generally are responsible for banks and credit unions, particularly focusing on the safety and soundness of these institutions. They have limited authority to write rules for, supervise the operations of, or enforce actions against firms outside their jurisdiction. Some banking regulators are responsible for granting licenses, or charters, to financial institutions so they can operate as banks and credit unions. Fintech firms typically are not licensed banks or credit unions; however, banks and credit unions often form partnerships with fintech firms, and banking regulators have legal authority to examine these types of relationships. This third-party partnership supervision allows the regulators to supervise depository institutions' interactions with new fintech firms. Banks and credit unions also have an important role in the payments system. Banking regulators have used some of their rulemaking authorities to influence technological advances in the payments system as consumers continue to shift toward electronic payment tools, such as debit and credit cards. The consumer protection agencies generally are responsible for protecting consumers from unfair and deceptive business activities while maintaining a fair, competitive marketplace. Similar to banking regulators, consumer protection agencies have rulemaking, supervision, and enforcement authorities to implement and ensure industry compliance with consumer protection and competition laws, but consumer protection agencies have broader jurisdiction than banking regulators. For example, often they can directly regulate fintech companies and use their enforcement authorities to interact with fintech. In addition, they have promulgated rules pertaining to aspects of fintech. Consumer protection agencies generally balance the potential benefits of new technologies that could improve consumer outcomes with the potential risks to consumers posed by new, untested products entering the marketplace. This mandate allows consumer protection agencies to take enforcement actions to protect consumers and create safeguards from enforcement actions to protect companies offering financial services that benefit consumers or the market. Securities regulators generally are concerned with protecting investors, maintaining fair and efficient markets, and facilitating capital formation. These regulators generally have limited concern for safety and soundness of the firms in their jurisdiction, focusing on disclosure requirements and contracts to promote investor protection and efficiency in the marketplace. Similar to the other regulators, they promulgate and enforce rules, but their mandate positions them somewhat differently than banking regulators and consumer protection agencies with respect to fintech. Securities regulators may endeavor to determine whether a new type of fintech product from a company counts as a security and how fintech is changing the way securities are offered. To this end, securities regulators tend to rely on their enforcement authority to ensure that new technologies do not violate securities laws.", "document_type": "crs"}
{"report": "The United States and Russia signed a new strategic arms reduction treaty—known as New START—on April 8, 2010. This treaty replaced the 1991 Strategic Arms Reductions Treaty (START), which expired, after 15 years of implementation, on December 5, 2009. The U.S. Senate provided its advice and consent to ratification of New START on December 22, 2010, by a vote of 71-26. The Russian parliament, with both the Duma and Federation Council voting, did so on January 25 and January 26, 2011. The treaty entered into force on February 5, 2011, after Secretary of State Clinton and Foreign Minister Lavrov exchanged the instruments of ratification. New START superseded the 2002 Strategic Offensive Reductions Treaty (known as the Moscow Treaty), which then lapsed in 2012. New START provided the parties with 7 years to reduce their forces, and it will remain in force for a total of 10 years, unless the parties agree to extend it for no more than five additional years. Both parties completed their required reductions by February 5, 2018. With the reductions now complete, questions about whether the two nations will extend the treaty have begun to dominate public discussions. The Obama Administration briefly considered pursuing an extension of New START before it left office in 2016, but did not raise the issue with Russia. Press reports indicate that the President Trump rejected a proposal from Russian President Putin to extend the treaty during their first phone call in February 2017. The Presidents reportedly discussed the treaty during their summit in Helsinki in July 2018, with President Putin presenting President Trump with a document suggesting that they extend the treaty after resolving \"existing problems related to the Treaty implementation,\" but the two reportedly did not reach an agreement on the issue. The Administration's Nuclear Posture Review (NPR), completed in February 2018, confirmed that the United States would continue to implement the treaty, at least through 2021, but was silent on the prospects for extension through 2026. Trump Administration officials have indicated that they are reviewing the treaty and assessing whether it continues to serve U.S. national security interests before deciding whether the United States would propose or accept a five-year extension. They noted, in testimony before the Senate Foreign Relations Committee in May 2019, that an interagency review was continuing, but they refused to elaborate on the substance of that review or speculate on the implications of a decision to allow New START to lapse in 2021. During this hearing, Under Secretary of State Andrea Thompson and Deputy Under Secretary of Defense David Trachtenberg emphasized that the New START Treaty might not be sufficient to address emerging threats to U.S. national security. They noted that Russia was developing new kinds of strategic offensive arms that would not count under the treaty, that Russia was expanding its stockpile of shorter-range nonstrategic nuclear weapons that were outside the scope of the treaty, and that China was modernizing and expanding its nuclear arsenal but was not a part of the treaty at all. These comments were consistent with press reports indicating that President Trump would like to pursue a new arms control agreement that captured all types of nuclear weapons and included China's forces under the limits. The witnesses were unable, however, to articulate a reason for why China would be willing to participate in such negotiations when its nuclear arsenal of around 300 warheads was far smaller than the arsenals of several thousand warheads held by the United States and Russia. Instead, when asked, Under Secretary Thompson provided a rationale for why the United States would want China to participate in the talks, noting that China wants \"to be a responsible player on the world stage. They want to be part of this great power competition. And with that comes responsibilities.\" Some U.S. officials, including General John Hyten, the commander of U.S. Strategic Command (STRATCOM), have noted that New START serves U.S. national security interests because its monitoring regime provides transparency and visibility existing into Russian nuclear forces and because its limits provide predictability about the future size and structure of those forces. However, in testimony before the Senate Armed Services Committee in February 2019, General Hyten also expressed concern about new kinds of nuclear forces that Russia may develop in the coming years. He noted that these weapons could eventually pose a threat to the United States and said he thought the United States and Russia should expand New START so they would count them under the treaty limits. As is noted below, Article V, paragraph 2 of the treaty provides a mechanism for the parties to address concerns about the emergence of new kinds of strategic offensive arms. It states that the parties should raise their concerns about such weapons in the Bilateral Consultative Commission (BCC) established by the treaty, and seek to reach a resolution there. In May 2019, Undersecretary of State Andrea Thompson stated that the United States had begun to have discussions with Russia about these systems at the technical expert level, but she did not specify whether these discussions were occurring in the BCC. Russian officials have stated that some of its new systems should not count under New START because they do not meet the treaty's definition of deployed missile launchers or heavy bombers. Nevertheless, the public debate about the possible extension of New START has begun to incorporate views about how to address these weapons. For example, some experts believe the United States and Russia should extend the treaty before 2021, then use the time during the extension to discuss how to include these new systems under the treaty limits. Some, however, have suggested the opposite, arguing that the United States should not agree to extend New START unless Russia agrees, before the extension takes effect, to count its new systems under the treaty limits. Others believe that the United States should agree to extend New START only if Russia agrees, before the extension takes effect, to use the time during the extension to negotiate a new treaty that not only captures the new kinds of weapons, but also imposes limits on Russia's nonstrategic nuclear forces. Russian officials have also questioned whether the United States and Russia are in a position to extend New START before it expires in 2021. At a conference in Washington in March 2019, Anatoly Antonov, Russia's ambassador to the United States, noted that Russia is not interested in expanding New START so that it would count new kinds of strategic systems and that Russia would be unwilling to discuss an extension of New START until the United States addresses Russia's concerns with U.S. implementation of the treaty's conversion and elimination procedures. Moreover, he noted that, if the two sides negotiated a new treaty to capture the systems of concern to the United States, Russia would insist on addressing U.S. systems—like ballistic missile defenses and strategic conventional weapons—that are of concern to Russia. President Obama and and Russia's President Medvedev outlined their goals for the negotiations on a new START Treaty in early April 2009. In a joint statement issued after they met in London, they indicated that the subject of the new agreement \"will be the reduction and limitation of strategic offensive arms.\" This statement indicated that the new treaty would not address missile defenses, nonstrategic nuclear weapons, or nondeployed stockpiles of nuclear weapons. The Presidents also agreed that they would seek to reduce their forces to levels below those in the 2002 Moscow Treaty, and that the new agreement would \"mutually enhance the security of the Parties and predictability and stability in strategic offensive forces, and will include effective verification measures drawn from the experience of the Parties in implementing the START Treaty.\" The Presidents further refined their goals for New START, and gave the first indications of the range they were considering for the limits in the treaty, in a Joint Understanding signed at their summit meeting in Moscow in July 2009. They agreed that the new treaty would restrict each party to between 500 and 1,100 strategic delivery vehicles and between 1,500 and 1,675 associated warheads. They also agreed that the new treaty would contain \"provisions on definitions, data exchanges, notifications, eliminations, inspections and verification procedures, as well as confidence building and transparency measures, as adapted, simplified, and made less costly, as appropriate, in comparison to the START Treaty.\" The New START Treaty follows many of the same conventions as the 1991 START Treaty. It contains detailed definitions and counting rules that the parties use to identify the forces limited by the treaty. It also mandates that the parties maintain an extensive database that describes the locations, numbers, and technical characteristics of weapons limited by the treaty. It allows the parties to use several types of exhibitions and on-site inspections to confirm information in the database and to monitor forces and activities limited by the treaty. But the new treaty is not simply an extension of START. The United States and Soviet Union negotiated the original START Treaty during the 1980s, during the latter years of the Cold War, when the two nations were still adversaries and each was still wary of the capabilities and intentions of the other. Many of the provisions in the original treaty reflect the uncertainty and suspicion that were evident at that time. The New START Treaty is a product of a different era and a different relationship between the United States and Russia. In some ways, its goals remain the same—the parties still sought provisions that would allow for predictability and transparency in their current forces and future intentions. But, the United States and Russia have streamlined and simplified the central limits and the monitoring and verification provisions. The new treaty does not contain layers of limits and sublimits; each side can determine its own mix of land-based intercontinental ballistic missiles (ICBMs), submarine-launched ballistic missiles (SLBMs), and heavy bombers. Moreover, in the current environment, the parties were far less concerned with choking off avenues for potential evasion schemes than they were with fostering continued cooperation and openness between the two sides. The New START Treaty contains three central limits on U.S. and Russian strategic offensive nuclear forces; these are displayed in Table 1 , below. First, it limits each side to no more than 800 deployed and nondeployed ICBM and SLBM launchers and deployed and nondeployed heavy bombers equipped to carry nuclear armaments. Second, within that total, it limits each side to no more than 700 deployed ICBMs, deployed SLBMs, and deployed heavy bombers equipped to carry nuclear armaments. Third, the treaty limits each side to no more than 1,550 deployed warheads. Deployed warheads include the actual number of warheads carried by deployed ICBMs and SLBMs, and one warhead for each deployed heavy bomber equipped for nuclear armaments. Table 1 compares these limits to those in the 1991 START Treaty and the 2002 Moscow Treaty. According to New START's Protocol a deployed ICBM launcher is \"an ICBM launcher that contains an ICBM and is not an ICBM test launcher, an ICBM training launcher, or an ICBM launcher located at a space launch facility.\" A deployed SLBM launcher is a launcher installed on an operational submarine that contains an SLBM and is not intended for testing or training. A deployed mobile launcher of ICBMs is one that contains an ICBM and is not a mobile test launcher or a mobile launcher of ICBMs located at a space launch facility. These deployed launchers can be based only at ICBM bases. A deployed ICBM or SLBM is one that is contained in a deployed launcher. Nondeployed launchers are, therefore, those that are used for testing or training, those that are located at space launch facilities, or those that are located at deployment areas or on submarines but do not contain a deployed ICBM or SLBM. The New START Treaty does not limit the number of nondeployed ICBMs or nondeployed SLBMs. It does, however, state that these missiles must be located at facilities that are known to be within the infrastructure that supports and maintains ICBMs and SLBMs. These include \"submarine bases, ICBM or SLBM loading facilities, maintenance facilities, repair facilities for ICBMs or SLBMs, storage facilities for ICBMs or SLBMs, conversion or elimination facilities for ICBMs or SLBMs, test ranges, space launch facilities, and production facilities.\" Nondeployed ICBMs and SLBMs may also be in transit between these facilities, although Article IV of the treaty indicates that this time in transit should be \"no more than 30 days.\" The parties share information on the locations of these missiles in the database they maintain under the treaty and notify each other when they move these systems. These provisions are designed to allow each side to keep track of the numbers and locations of nondeployed missiles and to deter efforts to stockpile hidden, uncounted missiles. A party would be in violation of the treaty if one of its nondeployed missiles were spotted at a facility not included on the list, or if one were found at a location different from the one listed for that missile in the database. According to the Protocol to New START, a deployed heavy bomber is one that is equipped for nuclear armaments but is not a \"test heavy bomber or a heavy bomber located at a repair facility or at a production facility.\" Moreover, a heavy bomber is equipped for nuclear armaments if it is \"equipped for long-range nuclear ALCMs, nuclear air-to-surface missiles, or nuclear bombs.\" All deployed heavy bombers must be located at air bases, which are defined as facilities \"at which deployed heavy bombers are based and their operation is supported.\" If an air base cannot support the operations of heavy bombers, then the treaty does not consider it to be available for the basing of heavy bombers, even though they may land at such bases under some circumstances. Test heavy bombers can be based only at heavy bomber flight test centers and nondeployed heavy bombers other than test heavy bombers can be located only at repair facilities or production facilities for heavy bombers. Each party may have no more than 10 test heavy bombers. Heavy bombers that are not equipped for long range nuclear ALCMs, nuclear air-to-surface missiles, or nuclear bombs will not count under the treaty limits. However, the treaty does specify that, \"within the same type, a heavy bomber equipped for nuclear armaments shall be distinguishable from a heavy bomber equipped for non-nuclear armaments.\" Moreover, if a party does convert some bombers within a given type so that they are no longer equipped to carry nuclear weapons, it cannot base the nuclear and nonnuclear bombers at the same air base, unless otherwise agreed by the parties. Hence, the United States could reduce the number of bombers that count under the treaty limits by altering some of its B-52 bombers so that they no longer carry nuclear weapons and by basing them at a separate base from those that still carry nuclear weapons. In addition, if the United States converted all of the bombers of a given type, so that none of them could carry nuclear armaments, then none of the bombers of that type would count under the New START treaty. This provision allows the United States to remove its B-1 bombers from treaty accountability. They no longer carry nuclear weapons, but they still counted under the old START Treaty and were never altered so that they could not carry nuclear weapons. The conversion rules that would affect the B-1 bombers are described below. Table 1 summarizes the warheads limits in START, the Moscow Treaty, and the New START Treaty. Two factors stand out in this comparison. First, the original START Treaty contained several sublimits on warheads attributed to different types of strategic weapons, in part because the United States wanted the treaty to impose specific limits on elements of the Soviet force that were deemed to be \"destabilizing.\" Therefore, START sought to limit the Soviet force of heavy ICBMs by cutting in half the number of warheads deployed on these missiles, and to limit future Soviet deployments of mobile ICBMs. The Moscow Treaty and New START, in contrast, contain only a single limit on the aggregate number of deployed warheads. They provide each nation with the freedom to mix their forces as they see fit. This change reflects, in part, a lesser concern with Cold War models of strategic and crisis stability. It also derives from the U.S. desire to maintain flexibility in determining the structure of its own nuclear forces. Table 1 also highlights how the planned numbers of warheads in the U.S. and Russian strategic forces have declined in the years since the end of the Cold War. Before START entered into force in 1991, each side had more than 10,000 warheads on its strategic offensive delivery vehicles. If the parties implement the New START Treaty, that number will have declined by more than 80%. However, although all three treaties limit warheads, each uses different definitions and counting rules to determine how many warheads each side has deployed on its strategic forces. Under START, the United States and Russia did not actually count deployed warheads. Instead, each party counted the launchers—ICBM silos, SLBM launch tubes, and heavy bombers—deployed by the other side. Under the terms of the treaty, they then assumed that each operational launcher contained an operational missile, and each operational missile carried an \"attributed\" number of warheads. The number of warheads attributed to each missile or bomber was the same for all missiles and bombers of that type. It did not recognize different loadings on individual delivery vehicles. This number was listed in an agreed database that the parties maintained during the life of the treaty. The parties then multiplied these warhead numbers by the number of deployed ballistic missiles and heavy bombers to determine the number of warheads that counted under the treaty's limits. In most cases, the number of warheads attributed to each type of ICBM and SLBM was equal to the maximum number that missile had been tested with. START did, however, permit the parties to reduce the number of warheads attributed to some of their ballistic missiles through a process known as \"downloading.\" When downloading missiles, a nation could remove a specified number of reentry vehicles from all the ICBMs at an ICBM base or from all the SLBMs in submarines at bases adjacent to a specified ocean. They could then reduce the number of warheads attributed to those missiles in the database, and therefore, the number that counted under the treaty limits. Unlike ballistic missiles, bombers counted as far fewer than the number of warheads they could carry. Bombers that were not equipped to carry long-range nuclear-armed cruise missiles counted as one warhead, even though they could carry 16 or more bombs and short-range missiles. U.S. bombers that were equipped to carry long-range nuclear-armed cruise missiles counted as 10 warheads, even though they could carry up to 20 cruise missiles. Soviet bombers that were equipped to carry long-range nuclear-armed cruise missiles counted as 8 warheads, even though they could carry up to 16 cruise missiles. These numbers were then multiplied by the numbers of deployed heavy bombers in each category to determine the number of warheads that would count under the treaty limits. In contrast with START, the Moscow Treaty did not contain any definitions or counting rules to calculate the number of warheads that counted under the treaty limit. Its text indicated that it limited deployed strategic warheads, but the United States and Russia could each determine its own definition of this term. The United States counted \"operationally deployed\" strategic nuclear warheads and included both warheads on deployed ballistic missiles and bomber weapons stored near deployed bombers at their bases. Russia, in contrast, did not count any bomber weapons under its total, as these weapons were not actually deployed on any bombers. Moreover, because the Moscow Treaty did not contain any sublimits on warheads deployed on different categories of delivery vehicles, the two parties only had to calculate an aggregate total for their deployed warheads. In addition, while they exchanged data under START on the numbers of accountable launchers and warheads every six months, they only had to report the number of warheads they counted under the Moscow Treaty once, on December 31, 2012, at the end of the treaty's implementation period. Like START, the New START Treaty contains definitions and counting rules that will help the parties calculate the number of warheads that count under the treaty limits. For ballistic missiles, these rules follow the precedent set in the Moscow Treaty and count only the actual number of warheads on deployed delivery vehicles. For bombers, however, these rules follow the precedent set in START and attribute a fixed number of warheads to each heavy bomber. Article III of the New START Treaty states that \"for ICBMs and SLBMs, the number of warheads shall be the number of reentry vehicles emplaced on deployed ICBMs and on deployed SLBMs.\" Missiles will not count as if they carried the maximum number of warheads tested on that type of missile. Each missile will have its own warhead number and that number can change during the life of the treaty. The parties will not, however, visit each missile to count and calculate the total number of warheads in the force. The New START database will list total number of warheads deployed on all deployed launchers. The parties will then have the opportunity, 10 times each year, to inspect one missile or three bombers selected at random. At the start of these inspections, before the inspecting party chooses a missile or bomber to view, the inspected party will provide a list of the number of warheads on each missile or bomber at the inspected base. The inspecting party will then choose a missile at random, and confirm that the number listed in the database is accurate. This is designed to deter the deployment of extra warheads by creating the possibility that a missile with extra warheads might be chosen for an inspection. As was the case under START, this inspection process does not provide the parties with the means to visually inspect and count all the deployed warheads carried on deployed missiles. Under START, this number was calculated by counting launchers and multiplying by an attributed number of warheads. Under New START, as was the case in the Moscow Treaty, each side simply declares its number of total deployed warheads and includes that number in the treaty database. Unlike the Moscow Treaty, however, the parties will provide and update these numbers every six months during the life of the treaty, rather than just once at the end of the treaty. Under the New START Treaty, each deployed heavy bomber equipped with nuclear armaments counts as one nuclear warhead. This is true whether the bomber is equipped to carry cruise missiles or gravity bombs. Neither the United States nor Russia deploys nuclear weapons on their bombers on a day-to-day basis. Because the treaty is supposed to count, and reduce, actual warheads carried by deployed delivery vehicles, the bomber weapons that are not deployed on a day-to-day basis are excluded. In addition, because the parties will use on-site inspections to confirm the actual number of deployed warheads on deployed delivery vehicles, and the bombers will have no warheads on them during inspections, the parties needed to come up with an arbitrary number to assign to the bombers. That number is one. According to New START, ICBM launchers, SLBM launchers, and heavy bombers equipped to carry nuclear armaments shall continue to count under the treaty limits until they are converted or eliminated according to the provisions described in the treaty's Protocol. These provisions are far less demanding than those in the original START Treaty and will provide the United States and Russia with far more flexibility in determining how to reduce their forces to meet the treaty limits. Under START, ICBM launchers were \"destroyed by excavation to a depth of no less than eight meters, or by explosion to a depth of no less than six meters.\" If missiles were removed from silos, and the silos were not eliminated in this fashion, then the silos still counted as if they held a deployed missile and as if the deployed missile carried the attributed number of warheads. New START lists three ways in which the parties may eliminate ICBM silo launchers. It states that silo launchers \"shall be destroyed by excavating them to a depth of no less than eight meters or by explosion to a depth of no less than six meters.\" It also indicates that the silos can be \"completely filled with debris resulting from demolition of infrastructure, and with earth or gravel.\" Finally, it indicates the party carrying out the elimination can develop other procedures to eliminate its silos. It may have to demonstrate this elimination alternative to the other party, but that party cannot dispute or deny the use of that method. Hence, instead of blowing up the silos or digging them out of the ground, the parties to the treaty might choose to disable the silo using measures it identifies itself, so that it can no longer launch a missile. This could be far less costly and destructive than the procedures mandated under START, and would help both nations eliminate some silos that have stood empty for years while continuing to count under the old START Treaty. For the United States, this would include the 50 silos that held Peacekeeper missiles until 2005 and the 50 silos that held Minuteman III missiles until 2008. The United States has never destroyed these silos, so they continued to count under START. It can now disable theses silos and remove them from its tally of launchers under the New START Treaty. According to the recent reports, the Air Force Global Strike Command began preparations to eliminate these silos in March 2011, and plans to fill them with gravel. It expects to complete this process by 2017. Under START, the elimination process for launchers for road-mobile ICBMs required that \"the erector-launcher mechanism and leveling supports shall be removed from the launcher chassis\" and that \"the framework of the erector-launcher mechanism on which the ICBM is mounted and erected shall be cut at locations that are not assembly joints into two pieces of approximately equal size.\" It also required that the missile launch support equipment be removed from the launcher chassis, and that the \"mountings of the erector-launcher mechanism and of the launcher leveling supports shall be cut off the launcher chassis\" and cut into two pieces of approximately equal size. START also required that 0.78 meters of the launcher chassis be cut off and cut into two parts, so that the chassis would be too short to support mobile ICBMs. Under New START, the elimination process for launchers for road mobile ICBMs is far more simple and far less destructive. As was the case under START, the elimination \"shall be carried out by cutting the erector-launcher mechanism, leveling supports, and mountings of the erector-launcher mechanism from the launcher chassis and by removing the missile launch support equipment ... from the launcher chassis.\" But neither the framework nor the chassis itself have to be cut into pieces. If the chassis is going to be used \"at a declared facility for purposes not inconsistent with the Treaty\" the surfaces of the vehicle that will be visible to national technical means of verification must be painted a different color or pattern than those surfaces on a deployed mobile ICBM launcher. Under START, the SLBM launch tubes were considered to be eliminated when the entire missile section was removed from the submarine; or when \"the missile launch tubes, and all elements of their reinforcement, including hull liners and segments of circular structural members between the missile launch tubes, as well as the entire portion of the pressure hull, the entire portion of the outer hull, and the entire portion of the superstructure through which all the missile launch tubes pass and that contain all the missile launch-tube penetrations\" were removed from the submarine. The missile launch tubes then had to \"be cut into two pieces of approximately equal size.\" Under New START, SLBM launch tubes can be eliminated \"by removing all missile launch tube hatches, their associated superstructure fairings, and, if applicable, gas generators.\" In other words, the missile section of the submarine and the individual launch tubes can remain in place in the submarine, and cease to count under the treaty limits, if they are altered so that they can no longer launch ballistic missiles. Moreover, according to the Ninth Agreed Statement in the New START Protocol, SLBM launch tubes that have been converted in accordance with this procedure and are \"incapable of launching SLBMs may simultaneously be located on a ballistic missile submarine\" with launch tubes that are still capable of launching SLBMs. After a party completes this type of conversion, it \"shall conduct a one-time exhibition of a converted launcher and an SLBM launcher that has not been converted\" to demonstrate, to the other party, \"the distinguishing features of a converted launcher and an SLBM launcher that has not been converted.\" The United States plans to use this procedure to reduce the number of launch tubes on each SSBN from 24 to 20. According to recent reports, it will begin this process in 2015, so that it will have no more than 240 operational launchers for SLBMs by the treaty deadline of February 2018. Under START, the United States had to essentially destroy an entire submarine to remove its launch tubes from accountability under the treaty limits. With these provisions in New START, the United States cannot only convert ballistic missile submarines to other uses without destroying their missile tubes and missile compartments; it can also reduce the number of accountable deployed SLBM launchers on ballistic missile submarines that continue to carry nuclear-armed SLBMs. These provisions will provide the United States a great deal of flexibility when it determines the structure of its nuclear forces under New START. During the past decade, the United States converted four of its Trident ballistic missile submarines so that they no longer carry ballistic missiles but now carry conventional cruise missiles and other types of weapons. These are now known as SSGNs. Because the United States did not remove the missile compartment from these submarines, they continued to count as if they carried 24 Trident missiles, with 8 warheads per missile, under the old START Treaty. These submarines will not count under the New START Treaty. In the Second Agreed Statement in the New START Protocol, the United States has agreed that, \"no later than three years after entry into force of the Treaty, the United States of America shall conduct an initial one-time exhibition of each of these four SSGNs. The purpose of such exhibitions shall be to confirm that the launchers on such submarines are incapable of launching SLBMs.\" Moreover, if an SSGN is located at an SSBN base when a Russian inspection team visits that base, the inspection team will have the right to inspect the SSGN again to confirm that the launchers have not been converted back to carry SLBMs. Russia can conduct six of these re-inspections during the life of the treaty, but no more than two inspections of any one of the SSGNs. Under START, heavy bombers were eliminated by having the tail section cut off of the fuselage at a location that obviously was not an assembly joint; having the wings separated from the fuselage at any location by any method; and having the remainder of the fuselage cut into two pieces, with the cut occurring in the area where the wings were attached to the fuselage, but at a location obviously not an assembly joint. START also allowed the parties to remove heavy bombers from treaty accountability by converting them to heavy bombers that were not equipped to carry nuclear armaments. According to the elimination and conversion Protocol in START, this could be done by modifying all weapons bays and by removing or modifying the external attachment joints for either long-range nuclear ALCMs or other nuclear armaments that the bombers were equipped to carry. The elimination procedure for heavy bombers has also been simplified under New START. To eliminate bombers, the parties must cut \"a wing or tail section from the fuselage at locations obviously not assembly joints,\" or cut \"the fuselage into two parts at a location obviously not an assembly joint.\" It no longer has to remove the wings from the fuselage. In addition, to convert a bomber counted under the treaty to a heavy bomber no longer equipped to carry nuclear armaments, the parties can either modify the weapons bays and external attachments for pylons so that they cannot carry nuclear armaments, or modify all internal and external launcher assemblies so that they cannot carry nuclear armaments, or develop any other procedure to carry out the conversion. As was the case with the conversion and elimination of missile launchers, the party may have to demonstrate its conversion procedure, but the other party does not have the right to object or reject the procedure. The United States no longer equips its B-1 bombers with nuclear weapons, and has no plans to do so in the future. It has not, however, converted these bombers to nonnuclear heavy bombers using the procedures outlined in START. As a result, they continued to count as one delivery vehicle and one warhead under the counting rules in START. The United States does not, however, want to count these bombers under the New START Treaty. As a result, in the First Agreed Statement, the United States and Russia agreed, during the first year that the treaty is in force, the United States will conduct a \"one-time exhibition\" to demonstrate to Russia that these bombers are no longer equipped to carry nuclear weapons. The bombers that no longer carry nuclear weapons will have a \"distinguishing feature\" that will be recorded in the treaty database and will be evident on all B-1 bombers that are no longer equipped to carry nuclear weapons. After all the B-1 bombers have been converted in this manner, they will no longer count against the limits in the New START Treaty. Mobile ICBMs became an issue in the original START negotiations in the mid-1980s, as the Soviet Union began to deploy a single-warhead road-mobile ICBM, the SS-25, and a 10-warhead rail-mobile ICBM, the SS-24. The United States initially proposed that START ban mobile ICBMs because the United States would not be able to locate or target these systems during a conflict. Some also questioned whether the United States would be able to monitor Soviet mobile ICBM deployments well enough to count the missiles and verify Soviet compliance with the limits in START. Some also argued that the Soviet Union might be able to stockpile hidden missiles and launchers, and to reload mobile ICBM launchers during a conflict because the United States could not target and destroy them. The Soviet Union refused to ban mobile ICBMs. As a result, START limited the United States and Soviet Union to 1,100 warheads on mobile ICBMs. The treaty also limited the numbers of nondeployed missiles and nondeployed launchers for mobile ICBMs. Each side could retain 250 missiles and 110 launchers for mobile ICBMs, with no more than 125 missiles and 18 launchers for rail mobile ICBMs. This did not eliminate the risk of \"breakout,\" which refers to the rapid addition of stored missiles to the deployed force, but it did limit the magnitude of the breakout potential and the number of missiles that the Soviet Union could \"reload\" on deployed launchers during a conflict. START also contained a number of complementary, and sometimes overlapping, monitoring mechanisms that were designed to help the parties keep track of the numbers and locations of permitted missiles. Each side could monitor the final assembly facility for the missiles to count them as they entered the force. The parties also agreed to record the serial numbers, referred to in the treaty as \"unique identifiers,\" for the mobile ICBMs, and to list these numbers in the treaty's database. These numbers were used to help track and identify permitted missiles because the parties could check the serial numbers during on-site inspections to confirm that the missiles they encountered were those that they expected to see at the facility during the inspection. The parties also had to provide notifications when mobile ICBMs moved between permitted facilities and when mobile ICBMs moved out of their main operating bases for an exercise. These notifications were designed to complicate efforts to move extra, hidden missiles into the deployed force. Finally, missiles and launchers removed from the force had to be eliminated according to specific procedures outlined in the treaty. This not only helped the parties keep an accurate count of the deployed missiles, but served as a further deterrent to efforts to hide extra missiles outside the treaty regime. The New START Treaty contains many limits and restrictions that will affect Russia's force of mobile ICBMs, but it does not single them out with many of the additional constraints that were contained in START. Russia pressed for an easing of the restrictions on mobile ICBMs in New START, in part because these restrictions were one sided and only affected Russian forces. But Russian officials also noted, and the United States agreed, that mobile ICBMs could enhance the survivability of Russia's nuclear forces, and therefore strengthen strategic stability under the new treaty. The United States was also willing to relax the restrictions on mobile ICBMs because it is far less concerned about Russia's ability to break out of the treaty limits than it was in the 1980s. After 15 years of START implementation, the United States has far more confidence in its knowledge of the number of deployed and nondeployed Russian mobile ICBMs, as it kept count of these missiles as they entered and left the Russian force during START. There is also far less concern about Russia stockpiling extra missiles while New START is in force. During the 1980s, the Soviet Union produced dozens of new missiles each year; Russia now adds fewer than 10 missiles to its force each year. Some estimates indicate that, with this level of production, Russia will find it difficult to retain the 700 deployed missiles permitted by the treaty. In such a circumstance, it would have neither the need nor the ability to stockpile and hide extra missiles. Moreover, where the United States was once concerned about Russia's ability to reload its mobile launchers with spare missiles, after launching the first missiles during a conflict, this scenario no longer seems credible. It would mean that Russia maintained the ability to send extra missiles and the equipment needed to load them on launchers out on patrol with its deployed systems and that it could load these missiles quickly, in the field, in the midst of a nuclear war, with U.S. weapons falling all around. Yet, Russia has not practiced or exercised this capability and it is hard to imagine that it would try it, for the first time, in the midst of a nuclear war. The New START Treaty does not contain a sublimit on mobile ICBMs or their warheads. It also does not contain any limits on the number of nondeployed mobile ICBMs or the number of nondeployed mobile ICBM launchers. These launchers and warheads will, however, count under the aggregate limits set by the treaty, including the limit of 800 deployed and nondeployed launchers. As a result, the United States will still need to count the number of mobile ICBMs in Russia's force. New START will not permit perimeter and portal monitoring at missile assembly facilities. The parties must, however, provide notification at least 48 hours before the time when solid-fuel ICBMs and solid-fuel SLBMs leave the production facilities. Moreover, the parties will continue to list the serial numbers, or unique identifiers, for mobile ICBMs in the shared database. New START limits the locations of mobile ICBMs and their launchers, both to help the United States keep track of the missiles covered by the treaty and to deter Russian efforts to hide extra missiles away from the deployed force. Deployed mobile ICBMs and their launchers must be located only at ICBM bases. All nondeployed launchers for mobile ICBMs must be located at \"production facilities, ICBM loading facilities, repair facilities, storage facilities, conversion or elimination facilities, training facilities, test ranges, and space launch facilities.\" The locations of nondeployed mobile ICBMs are also limited to loading facilities, maintenance facilities, repair facilities, storage facilities, conversion or elimination facilities test ranges, space launch facilities, and production facilities. Some of these facilities may be at bases for operational mobile ICBMs, but, in that case, the nondeployed missiles must remain in the designated facility and cannot be located in deployment areas. Moreover, when deployed or nondeployed missiles or launchers move from one facility to another, the parties will have to update the database so each facility contains a complete list of each item located at that facility, and of the unique identifier associated with each item. Then, according to the Protocol to the Treaty, \"inspectors shall have the right to read the unique identifiers on all designated deployed ICBMs or designated deployed SLBMs, non-deployed ICBMs, non-deployed SLBMs, and designated heavy bombers that are located at the inspection site.\" Hence, the parties will have the opportunity to confirm that items located at the facilities are supposed to be there. This is designed not only to increase transparency and understanding while the treaty is in force, but also to discourage efforts to hide extra missiles and break out of the treaty limits. The treaty does not limit the number of nondeployed missiles, but it does provide the United States with continuous information about their locations and the opportunity, during on-site inspections, to confirm that these missiles are not mixed into the deployed force. Moreover, the number of nondeployed launchers for these missiles is limited, under the 800 limit on deployed and nondeployed launchers. So, even if Russia did accumulate a stock of nondeployed missiles, the number that it could add to its force in a relatively short amount of time would be limited. Some have questioned whether Russia might use these stored mobile ICBMs to break out of the treaty by deploying them on mobile launchers that are not limited by the treaty. Specifically, they have questioned whether the New START Treaty would count rail-mobile ICBMs, and, if not, whether Russia could develop and deploy enough of these launchers to gain a military advantage over the United States. This concern derives from the definition of mobile launcher in the paragraph 45 of the Protocol to the Treaty, which indicates that a mobile launcher is \"an erector-launcher mechanism for launching ICBMs and the self-propelled device on which it is mounted [emphasis added].\" This definition clearly captures road-mobile launchers, such as those that Russia uses for its SS-25 and SS-27 missiles, because the transporters for these missiles are self-propelled. But a rail car that carried an erector-launcher for an ICBM would not be self-propelled; it would be propelled by the train's locomotive. Others, however, point to several provisions in the treaty that indicate that rail-mobile launchers of ICBMs would count under the treaty limits. First, they note that the treaty limits all deployed and nondeployed ICBM launchers. It defines ICBM launcher, in paragraph 28 of the Protocol to the Treaty, as \"a device intended or used to contain, prepare for launch, and launch an ICBM.\" Any erector-launcher for ICBMs would be covered by this definition, regardless of whether it was deployed on a fixed site, on a road-mobile transporter, or on a railcar. Moreover, the article-by-article analysis of the treaty specifically states that \"all of the defined terms are used in at least one place elsewhere in the Treaty documents.\" Article III, paragraph 8 of the treaty lists the current types of weapons deployed by each side and notes that these all count against the limits. It does not list any missiles deployed on rail-mobile launchers, and, therefore, the Protocol does not define rail-mobile launchers, because Russia no longer deploys any missiles on rail-mobile launchers. It had deployed SS-24 missiles on such launchers during the 1980s and 1990s, but these were all retired in the past decade, and the last operating base for these missiles and railcars was closed in 2007. The treaty would not prohibit Russia from deploying these types of systems again in the future. Article V specifically states that \"modernization and replacement of strategic offensive arms may be carried out.\" However, the second paragraph of this article indicates that, \"when a party believes a new kind of strategic offensive arms is emerging, that party shall have the right to raise the question of such a strategic offensive arm for consideration in the Bilateral Consultative Commission.\" Section 6 of the Protocol to the Treaty, which describes the Bilateral Consultative Commission, states that this body should \"resolve questions related to the applicability of provisions of the treaty to a new kind of strategic offensive arm.\" In addition, Article XV of the treaty states that \"if it becomes necessary to make changes in the Protocol ... that do not affect the substantive rights or obligations under this Treaty,\" the parties can use the BCC to reach agreement on these changes without amending the treaty. Hence, if Russia were to deploy ICBMs on rail-mobile launchers, the parties could modify the definition to \"mobile launcher\" to confirm that these weapons count under the treaty limits. New START does not define rail-mobile launchers for ICBMs because neither the United States nor Russia currently deploys these systems and the treaty does not specifically prohibit their deployment in the future. If, however, either party installs an erector-launcher for an ICBM on a rail car, that launcher would count under the treaty limits, and the new type of strategic arm, represented by the launcher on a railcar, would be covered by the limits in the treaty. The parties would then use the BCC to determine which of the monitoring provisions and elimination and conversion rules applied to that type of weapons system. The original START Treaty included a comprehensive and overlapping set of provisions that was designed to allow the United States and Soviet Union to collect a wide range of data on their forces and activities and to determine whether the forces and activities were consistent with the limits in the treaty. While each party would collect most of this information with its own satellites and remote sensing equipment—known as national technical means of verification (NTM)—the treaty also called for the extensive exchange of data detailing the numbers and locations of affected weapons, numerous types of on-site inspections, notifications, exhibitions, and continuous monitoring at assembly facilities for mobile ICBMs. Further, in START, the parties agreed that they would not encrypt or otherwise deny access to the telemetry generated during missile flight tests, so that the other side could record these data and use them in evaluating the capabilities of missile systems. The New START Treaty contains a monitoring and verification regime that resembles the regime in START, in that its text contains detailed definitions of items limited by the treaty, provisions governing the use of NTM to gather data on each side's forces and activities, an extensive database that identifies the numbers, types, and locations of items limited by the treaty, provisions requiring notifications about items limited by the treaty, and inspections allowing the parties to confirm information shared during data exchanges. At the same time, the verification regime has been streamlined to make it less costly and complex than the regime in START. It also has been adjusted to reflect the limits in New START and the current circumstances in the relationship between the United States and Russia. In particular, it focuses on maintaining transparency, cooperation, and openness, as well as on deterring and detecting potential violations. Under New START, the United States and Russia continue to rely on their NTM to collect information about the numbers and locations of their strategic forces. They may also broadcast and exchange telemetry—the data generated during missile flight tests—up to five times each year. They do not need these data to monitor compliance with any particular limits in New START, but the telemetry exchange will provide some transparency into the capabilities of their systems. The parties also exchange a vast amount of data about their forces, specifying not only their distinguishing characteristics, but also their precise locations. They will notify each other, and update the database, whenever they move forces between declared facilities. The treaty also requires the parties to display their forces, and allows each side to participate in exhibitions, to confirm information listed in the database. New START permits the parties to conduct up to 18 short-notice on-site inspections each year. These inspections began in early April 2011, 60 days after the treaty entered into force. These inspections can occur at facilities that house both deployed and nondeployed launchers and missiles. The treaty divides these into Type One inspections and Type Two inspections. Each side can conduct up to 10 Type One inspections and up to 8 Type Two inspections. Moreover, during each Type One inspection, the parties will be able to perform two different types of inspection activities—these are essentially equivalent to the data update inspections and reentry vehicle inspections in the original START Treaty. As a result, the 18 short-notice inspections permitted under New START are essentially equivalent to the 28 short-notice inspections permitted under START. Type One inspections are those that occur at ICBM bases, submarine bases, and air bases that house deployed or nondeployed launchers, missiles, and bombers. The parties use these inspections \"to confirm the accuracy of declared data on the numbers and types of deployed and non-deployed strategic offensive arms subject to this treaty. During Type One inspections, the parties may also confirm that the number of warheads located on deployed ICBMs and deployed SLBMs and the number of nuclear armaments located on deployed heavy bombers\" are consistent with the numbers declared deployed on those specific launchers. The inspections used to confirm the number of deployed warheads in New START will be distinctly different from the inspections in START because the counting rules for ballistic missiles have changed. Under START, the treaty database listed the number of warheads attributed to a type of missile, and each missile of that type counted as the same number of warheads. The parties then inspected the missiles to confirm that the number of warheads on a particular missile did not exceed the number attributed to that type of missile. The database in New START will list the aggregate number of warheads deployed on all the missiles at a given base, but before beginning a Type One inspection, the team will receive a briefing on the actual number of warheads deployed on each missile at the base. During the inspections, the parties will have the right to designate one ICBM or one SLBM for inspection, and, when inspecting that missile, the parties will be able to count the actual number of reentry vehicles deployed on the missile to confirm that it equals the number provided for that particular missile prior to the inspection. The inspected party can cover the reentry vehicles to protect information not related to the number of warheads, but the party must use covers that allow the inspectors to identify the actual number of warheads on the missile. Because these inspections are random, and occur on short notice, they provide the parties with a chance to detect an effort by the other party to deploy a missile with more than its listed number of warheads. As a result, the inspections may deter efforts to conceal extra warheads on the deployed force. These inspections, by allowing the parties to count the actual number of deployed warheads, provide added transparency. Type Two inspections occur at facilities that house nondeployed or converted launchers and missiles. These include \"ICBM loading facilities; SLBM loading facilities; storage facilities for ICBMs, SLBMs, and mobile launchers of ICBMs; repair facilities for ICBMs, SLBMs, and mobile launchers of ICBMs; test ranges; and training facilities.\" The parties will perform these inspections \"to confirm the accuracy of declared technical characteristics and declared data, specified for such facilities, on the number and types of non-deployed ICBMs and non-deployed SLBMs, first stages of ICBMs and SLBMs, and nondeployed launchers of ICBMs.\" In addition, they can conduct these inspections at formerly declared facilities, \"to confirm that such facilities are not being used for purposes inconsistent with this Treaty.\" They can also use Type II inspections to confirm that solid-fueled ICBMs, solid-fueled SLBMs, or mobile launchers of ICBMs have been eliminated according to treaty procedures. Presidents Obama and Medvedev had agreed, when they met in April 2009, that the two nations would address Russia's concerns with U.S. missile defense programs in a separate forum from the negotiations on a New START Treaty. However, during their meeting in Moscow in July 2010, Presidents Obama and Medvedev agreed that the treaty would contain a \"provision on the interrelationship of strategic offensive arms and strategic defensive arms.\" This statement, which appears in the preamble to New START, states that the parties recognize \"the existence of the interrelationship between strategic offensive arms and strategic defensive arms, that this interrelationship will become more important as strategic nuclear arms are reduced, and that current strategic defensive arms do not undermine the viability and effectiveness of the strategic offensive arms of the parties.\" Russia and the United States each issued unilateral statements when they signed New START that clarified their positions on the relationship between New START and missile defenses. Russia stated that the Treaty can operate and be viable only if the United States of America refrains from developing its missile defense capabilities quantitatively or qualitatively. Consequently, the exceptional circumstances referred to in Article 14 of the Treaty include increasing the capabilities of the United States of America's missile defense system in such a way that threatens the potential of the strategic nuclear forces of the Russian Federation. In its statement, the United States stated that its missile defense systems are not intended to affect the strategic balance with Russia. The United States missile defense systems would be employed to defend the United States against limited missile launches, and to defend its deployed forces, allies and partners against regional threats. The United States intends to continue improving and deploying its missile defense systems in order to defend itself against limited attack and as part of our collaborative approach to strengthening stability in key regions. These statements do not impose any obligations on either the United States or Russia. As Senator Lugar indicated before New START was signed, these statements are, \"in essence editorial opinions.\" Under Secretary of State Ellen Tauscher also stated that \"Russia's unilateral statement on missile defenses is not an integral part of the New START Treaty. It's not legally-binding. It won't constrain U.S. missile defense programs.\" These statements also do not provide Russia with \"veto power\" over U.S. missile defense systems. Although Russia has said it may withdraw from the treaty if the U.S. missile defenses threaten \"the potential of the strategic nuclear forces of the Russian Federation,\" the United States has no obligation to consult with Russia to confirm that its planned defenses do not cross this threshold. It may develop and deploy whatever defenses it chooses; Russia can then determine, for itself, whether those defenses affect its strategic nuclear forces and whether it thinks the threat to those forces justifies withdrawal from the treaty. Article V, paragraph 3 of New START also mentions ballistic missile defense interceptors. It states that the parties cannot convert ICBM launchers and SLBM launchers to launchers for missile defense interceptors and that they cannot convert launchers of missile defense interceptors to launchers for ICBMs and SLBMs. At the same time, the treaty makes it clear that the five ICBM silos at Vandenberg Air Force Base that have already been converted to carry missile defense interceptors are not affected by this prohibition. It states that \"this provision shall not apply to ICBM launchers that were converted prior to signature of this Treaty for placement of missile defense interceptors therein.\" This provision is designed to address Russian concerns about the U.S. ability to \"break out\" of the treaty by placing ICBMs in silos that had held missile defense interceptors or by converting ICBM silos to missile interceptor silos then quickly reversing that conversion to add offensive missiles to its forces with little warning. Russia began to express this concern after the United States converted the five ICBM silos at Vandenberg for missile defense interceptors. It initially sought to reverse this conversion, or at least to count the silos under the New START limits. The United States refused, but, in exchange for Russia accepting that the five converted silos would not count under New START, the United States agreed that it would not convert additional silos. The provision will also protect U.S. missile defense interceptors from the START inspection regime. If the parties were permitted to convert missile defense silos to ICBM silos, they would also have been able to visit and inspect those silos to confirm that they did not hold missiles limited by the treaty. The ban on such conversions means that this type of inspection is not only unnecessary, but also not permitted. The Obama Administration has stated on many occasions that the New START Treaty does not contain any provisions that limit the numbers or capabilities of current or planned U.S. ballistic missile defense systems. The ban on launcher conversion does not alter this conclusion because the United States has no plans to use any additional ICBM launchers or any SLBM launchers to hold missile defense interceptors. It is constructing new launchers for its missile defense systems. Some have questioned, however, whether the ban on silo conversion may limit missile defenses in the future, particularly if the United States wanted to respond to an emerging missile threat by quickly expanding its numbers of missile defense interceptors. General Jim Jones, President Obama's National Security Adviser during the negotiations, stated that this provision is a \"limit in theory, but not in reality.\" It is not just that the United States has no plans to convert ICBM silos to missile defense interceptor silos, it is that it would be quicker and less expensive for the United States to build new silos for missile defense interceptors than to remove the ICBMs and all their equipment, reconfigure the silo, and install all the equipment for the missile defense interceptors. Moreover, given that the missile defense interceptor launched from the central United States, where U.S. ICBM silos are located, would drop debris on U.S. territory, the United States might prefer to locate its missile defense interceptors in new launchers near the U.S. coast. General Patrick O'Reilly, then the Director of the Missile Defense Agency, also stated that his agency \"never had a plan to convert additional ICBM silos at Vandenberg and intends to hedge against increased BMDS [ballistic missile defense system] requirements by completing construction of Missile Field 2 at Fort Greely. Moreover, we determined that if more interceptors were to be added at Vandenberg AFB, it would be less expensive to build a new GBI [ground-based interceptor] missile field (which is not prohibited by the treaty).\" He went on to note that \"some time ago we examined the concept of launching missile defense interceptors from submarines and found it an unattractive and extremely expensive option.\" Putting missile defense interceptors in SLBM launchers would undermine the primary mission of the submarine, which is designed to patrol deeply and quietly to remain invulnerable to attack, by requiring it to remain in one place near the surface while it sought to track and engage attacking missiles. During their summit meeting in July 2009, Presidents Obama and Medvedev agreed that the New START Treaty would contain \"a provision on the impact of intercontinental ballistic missiles and submarine-launched ballistic missiles in a non-nuclear configuration on strategic stability.\" This statement, which is in the preamble to the treaty, simply states that the parties are \"mindful of the impact of conventionally armed ICBMs and SLBMs on strategic stability.\" During the negotiations on New START, Russia voiced concerns about U.S. plans to deploy conventional warheads on ballistic missiles that now carry nuclear warheads. Russian officials have argued that these weapons could upset stability for several reasons. First, even if Russia were not the target of an attack with these missiles, it might not know whether the missile carried a nuclear warhead or a conventional warhead, or whether it was headed toward a target in Russia. Moreover, ballistic missiles armed with conventional warheads could destroy significant targets in Russia and, therefore, they might provide the United States with the ability to attack such targets, with little warning, without resorting to nuclear weapons. Finally, some argued that the United States might replace the conventional warheads with nuclear warheads to exceed the limits in a treaty. Russia initially sought to include a provision in New START that would ban the deployment of conventional warheads on strategic ballistic missiles. The United States rejected this proposal. It was considering this capability as a way to attack targets around the world promptly, and did not envision using these weapons against Russia. As a result, as the White House noted in its Fact Sheet on New START, \"the Treaty does not contain any constraints on ... current or planned United States long-range conventional strike capabilities.\" However, if the United States deployed conventional warheads on missiles that are covered by the limits in START, the warheads on these missiles would count under the treaty limit on deployed warheads. Because the United States expected to deploy very small numbers of these systems, this trade-off would not have a significant effect on U.S. nuclear capabilities. Moreover, if the United States deployed conventional warheads on new types of long-range strike systems, these systems would not necessarily count under or be affected by the limits in New START. The United States would likely consider these to be a \"new type of strategic offensive arms.\" Under Article V, paragraph 2, Russia would have the right to raise its concerns about these weapons within the Bilateral Consultative Commission (BCC), but the United States would not have to accept Russia's interpretation or accede to any requests to count the systems under the treaty. The same procedures would apply if Russia were to develop new types of strategic offensive arms—with either nuclear or conventional warheads. The United States could raise its concerns with these weapons in the BCC, but Russia would not have to accept a U.S. request to count these weapons under the treaty. According to the 2010 Nuclear Posture Review (NPR), which was released by DOD on April 6, 2010, the United States planned to maintain a triad of ICBMs, SLBMs, and heavy bombers under New START. The 2010 NPR did not specify how many ICBMs would remain in the force, but indicated that each would be deployed with only one warhead. It also indicated that the United States would, initially at least, retain 14 Trident submarines. It might, however, reduce its fleet to 12 submarines after 2015. The NPR did not indicate whether the Trident submarines would continue to be deployed with 24 missiles on each submarine, or if the Navy would eliminate some of the launchers on operational submarines in accordance with the treaty's Ninth Agreed Statement. Finally, the NPR indicated that the United States would convert some of its 76 dual-capable B-52 bombers to a conventional-only role. The Obama Administration clarified its plans for U.S. forces under New START in the 1251 plan that it submitted to the Senate with the treaty documents on May 13, 2010. This plan indicated that the United States would eliminate at least 30 deployed ICBMs, retaining a force of up to 420 deployed launchers under the treaty limits. It would also retain 14 Trident submarines, but each submarine would contain only 20 launchers, and two of the submarines would be in overhaul at any time, so only 240 launchers would count under the limit on deployed launchers. In addition, the report indicated that the United States would retain up to 60 deployed bombers equipped for nuclear weapons, including all 18 B-2 bombers in the current force. This force would have included up to 720 deployed ICBMs, SLBMs, and heavy bombers, a number that exceeds the 700 deployed missiles and bombers permitted by the treaty. In a hearing before the Senate Armed Services Committee on June 17, 2010, Secretary of Defense Gates and Admiral Mullen, then Chairman of the Joint Chiefs of Staff, acknowledged that the United States would have to make a small number of further reductions, or convert a small number of additional systems to nondeployed status, to meet the treaty limits. However, they noted that because the United States would have seven years to reduce its forces to these limits, they saw no reason to identify a final force structure at that point. Secretary Gates noted that DOD was considering a number of options for the final force structure, and would make a decision on this force structure after considering the international security environment and Russia's force structure in the treaty's later years. The Obama Pentagon released its plans for the New START force structure in April 8, 2014. As was indicated in May 2010, this force will include 14 submarines with 20 launchers on each submarine. Because two submarines will be in overhaul at any time, these submarines will count as carrying 240 deployed launchers within a total of 280 deployed and nondeployed launchers. The force also calls for a reduction in the number of deployed ICBMs from 450 to 400, with the retention of all 50 empty launchers, for a total force of 450 deployed and nondeployed ICBM launchers. The Air Force will also count 4 ICBM test launchers as nondeployed launchers within the total. Finally, New START force will include 60 deployed bombers and 6 nondeployed bombers. Even before it determined the final force structure, the Pentagon had requested funding to pursue activities that would enable these reductions, regardless of the specific force structure decisions. For example, in the FY2014 budget, the Pentagon requested funding for an environmental assessment (EA) that would be needed before it could eliminate ICBM silos. Several Members of Congress objected to this study, arguing that it would allow the Administration to eliminate an ICBM squadron regardless of whether this turned out to be the preferred option for force reductions. Several Members strongly supported the retention of all 450 ICBM silos, even if a portion of them were nondeployed, with the missiles removed to meet the New START limit of 700 deployed launchers. The Pentagon responded to this criticism by noting that the EA would not predetermine the outcome of the force structure decision. However, if it were not initiated by the end of 2013, it would not be completed in time to support reductions by 2018, if the Pentagon chose to pursue those reductions. In other words, even if the study were completed, the ICBM silos could remain in the force, but if the study was not begun in time, the ICBM silos could not be eliminated, even if that proved to be the preferred force structure option. In response to these concerns, Congress included a provision in the National Defense Authorization Act for 2014 ( H.R. 3304 , §1056) that limited the Pentagon's ability to reduce U.S. forces under New START. Specifically, the legislation states that \"the Secretary of Defense may only use funds authorized to be appropriated by this Act or otherwise made available for fiscal year 2014 to carry out activities to prepare for such reductions.\" Further, the legislation states that only 50% of the funds authorized for the EA can be obligated or expended until the Secretary of Defense submits the required plan that describes preferred force structure option under New START. The Pentagon has now submitted the plan, but it is unclear whether the EA will proceed. Table 2 , below, contains an estimated force structure of the United States prior to New START's entry into force; the force structure as of February 5, 2018 (when the reductions were required to meet the treaty limits); and the New START force outlined by the Administration in April 2014. As these data demonstrate, the United States reached the reduced force level required by the treaty. Within these limits, the United States retains a triad of ICBMs, SLBMs, and heavy bombers. It has reduced the number of deployed nuclear-armed B-52 bombers by converting many to conventional missions. It has reduced the number of launchers on its Trident submarines and retains 400 Minuteman III missiles. An additional 54 Minuteman III launchers do not hold ICBMs and therefore do not count under the 700 limit for deployed launchers. As noted below, when two additional Trident submarines return to the fleet, the United States will have the treaty-permitted 700 deployed launchers and it will adjust the number of warheads on deployed SLBMs to meet the treaty limit of 1,550 warheads. The United States did not have to destroy many ICBM or SLBM launchers to reach the limits in New START. The treaty includes provisions that allowed the United States to exempt many of its existing nondeployed launchers, including 94 B-1 bombers, and 4 ballistic missile submarines that have been converted to carry cruise missiles, from treaty limits. Moreover, as it reduced its deployed forces, the United States did not have to destroy either ICBM or SLBM launchers; it could deactivate them so that they could no longer launch ballistic missiles. Instead of eliminating missiles and launchers, the United States reached the limits in New START by deploying its missiles with far fewer than the maximum number of warheads that each could be equipped to carry. The Air Force has completed the deactivation of 50 Minuteman III missiles that will be removed from the force under New START, and the Navy has completed the elimination of four launch tubes on all 14 of its Trident submarines. On February 5, 2018, when the treaty reductions were complete, Russia announced that it had reduced its forces to 1,444 warheads on 527 deployed ICBMs, SLBMs, and heavy bombers, within a total of 779 deployed and nondeployed launchers. During the implementation of New START, the number of warheads deployed on Russian missiles and bombers climbed above the New START limits, leading some to express concerns about Russia's intention to comply with the treaty. Others noted that this was a reflection of Russia's modernization program, as it deployed new multiple-warhead ballistic missiles in place of older single-warhead missiles, and waited until late in the implementation process to eliminate older multiple-warhead land-based missile. Russia also retired many of its older ballistic missile submarines, replacing them with several new Borey-class submarines; three of these have entered the force, and three more are under construction. This submarine is deployed with the new Bulava missile. The missile failed many of its early flight tests, and continues to experience some failed tests, although it has had more several successful tests since late 2010. Table 3 , below, presents estimates of Russia's force structure in 2010, before New START entered into force, and potential forces that it might deploy under the New START Treaty. It does not contain an estimate of the current force structure, as the New START data only include aggregate totals across the force and provides no information about the current structure of this force. This table assumes that, under New START, Russia's new RS-24 missile would carry four warheads. However, according to accounts in the Russian press this missile will carry \"no fewer than 4\" warheads. If each of these missiles were to carry 6-7 warheads, Russia could retain the 1,550 warheads permitted by the treaty. Russia has announced plans to deploy a new heavy, liquid-fueled multiple-warhead missile to replace the SS-18, although this missile is not likely to enter the force until at least 2020. Table 3 indicates that Russia may deploy fewer than the permitted number of deployed and nondeployed launchers under New START. This is evident in the data provided by the Russian Ministry of Foreign Affairs on February 5, 2018. Because it still had significant numbers of warheads on older missiles that it eliminated late in the implementation process, it was able to reach the New START limits. But, as is discussed below, observers disagree about whether Russia can remain at the New START limits through 2021. The Obama Administration submitted the New START Treaty to the Senate on May 13, 2010. The treaty package included the treaty text, the Protocol, the Annexes, the Article-by-Article analysis prepared by the Administration, and the 1251 report on future plans and budgets for U.S. nuclear weapons required by Congress. It also included the text of the unilateral statements made by the United States and Russia when they signed the treaty. The Senate offered its advice and consent to the ratification of the treaty by voting on a Resolution of Ratification. The treaty's approval requires a vote of two-thirds of the Senate, or 67 Senators. The Senate Foreign Relations Committee held 12 hearings on the treaty. These began in April 2009, with testimony from former Secretaries of Defense William Perry and James Schlesinger. In total, the committee received testimony from more than 20 witnesses from both inside and outside the Obama Administration. It received testimony from current senior officials from the State Department, the Defense Department, and the Department of Energy, and from several former officials from past Administrations. The committee completed its hearing process in mid-July, after receiving a National Intelligence Estimate on the future of Russian forces and a report on the verifiability of the treaty. The Senate Armed Services Committee held a total of eight hearings and briefings on the treaty. The Armed Services Committee heard testimony from Secretary of State Clinton, Secretary of Defense Gates, Secretary of Energy Chu, and Admiral Mullen on June 17, 2010. It also received testimony and briefings from other Administration officials and from experts from outside the government. The Intelligence Committee also held a closed hearing to discuss U.S. monitoring capabilities and the verifiability of the treaty. The Senate Foreign Relations Committee held a business meeting to mark up the Resolution of Ratification for New START on September 16, 2010. The committee began its consideration with a draft proposed by Senator Lugar, then addressed a number of amendments proposed by members of the committee. Both the Lugar draft and many of the proposed amendments addressed the members' concerns with U.S. missile defense programs, U.S. conventional prompt global strike capabilities, monitoring and verification, and Russian nonstrategic nuclear weapons. Most of these amendments were defeated, although the committee did modify and incorporate some into the resolution. The Senate Foreign Relations Committee approved the Resolution of Ratification by a vote of 14-4, and sent the resolution to the full Senate. The Senate did not address the treaty before the November elections. The Administration pressed the Senate to debate the treaty during the lame-duck session of Congress in December 2010. Many Senators supported this goal. Some, however, suggested that the Senate would not have time to debate the treaty during the lame-duck session, and indicated that they preferred the Senate wait until 2011 to debate the treaty. The Senate began the debate on New START on December 16, 2010. During the debate, some Senators proposed amendments to the treaty, both to strike language related to ballistic missile defenses and to add language related to nonstrategic nuclear weapons. The treaty's supporters argued that these amendments would \"kill\" the treaty because they would require Russian approval and could lead to the reopening of negotiations on a wide range of issues addressed in the treaty. The Senate rejected these amendments, but it did accept amendments to the Resolution of Ratification that underlined the U.S. commitment to modernizing its nuclear weapons infrastructure and its commitment to deploying ballistic missile defenses. In addition, President Obama sent a letter to the Senators confirming his view that the New START Treaty places \"no limitations on the development or deployment of our missile defense programs,\" highlighting his commitment to proceed with the deployment of all four phases of the missile defense system planned for Europe, and noting that the continued development and deployment of U.S. missile defenses would not threaten the strategic balance with Russia and would not \"constitute the basis for questioning the effectiveness and viability of the New START Treaty.\" The Senate gave its advice and consent to ratification of New START on December 22, 2010, approving the Resolution of Ratification by a vote of 71-26. President Obama signed the instruments of ratification in early February 2011. Russia's President Medvedev submitted the New START Treaty to the Russian Parliament on May 28, 2010. Both houses of the Russian Parliament, the Duma and the Federation Council, will vote on the treaty, with a majority vote required to approve the law on ratification. Russia's president said he hoped that the two sides could \"synchronize\" their ratification, voting on the treaty at about the same time. This would avoid the circumstances that existed on the second START Treaty in the late 1990s, when the U.S. Senate gave its consent to ratification of START II in January 1996, but by the time the Russian Parliament voted in 2000, the parties had negotiated a Protocol to the Treaty that also required ratification. The Senate never voted on the new version of the treaty, and START II never entered into force. Most experts agreed that President Medvedev should be able to win approval for the treaty in the Russian Parliament with little difficulty. The Foreign Affairs Committee of the Russian Duma had initially supported the treaty. However, in early November 2010, Konstantin Kosachev, the head of the committee, indicated that the committee would reconsider the treaty. He indicated that this was in response to both the delay in the U.S. Senate's consideration of the treaty and the conditions and understandings that the Senate Foreign Relations Committee included in the U.S. Resolution of Ratification. Nevertheless, after the Senate voted on the treaty on December 22, members of the Duma called for the prompt ratification of New START. Reports indicated they received the documents from the Senate on December 23, and they held their first vote on the Draft Law on Ratification by Friday, December 24. The Duma then crafted amendments and declarations to the Federal Law on Ratification, and, after two more votes, approved the treaty by a vote of 350-96 (with one abstention) on January 25, 2011. The upper chamber of Russia's parliament, the Federation Council, also voted on the ratification of the treaty. Sergei Mironov, the Speaker of the Federation Council, indicated that the vote would take place after the vote in the Duma. This occurred on January 26, 2011, when the Federation Council unanimously approved the ratification of the treaty. President Medvedev signed the instruments of ratification on January 28, 2011. Russia's Federal Law on Ratification contains a number of declarations and understandings that highlight the Duma and Federation Council's concerns with the New START Treaty. These do not alter the text of the treaty and, therefore, did not require U.S. consent or agreement. Many of the provisions in the law call on Russia's leadership to pursue funding for the modernization and sustainment of Russia's strategic nuclear forces. They also reiterate Russia's view that the preamble to the treaty, and its reference to the relationship between offensive and defense forces, is an integral part of the treaty. The law does not indicate that this language imposes any restrictions on the United States. It does, however, reiterate that Russia has a right to withdraw from the treaty, and could do so if the United States deploys defenses that undermine Russia's strategic deterrent. In addition, the law indicates that new kinds of strategic offensive weapons, such as the potential U.S. conventional prompt global strike weapons, should count under the treaty limits. The law indicates that the parties should meet in the BCC and agree on how to count these systems before either party deploys the system. This differs from the U.S. interpretation because the United States has indicated that it could deploy such systems before completing the discussions in the BCC. These differing interpretations did not delay the entry into force of the treaty, but could raise questions in the future, if the United States deploys a PGS system that it does not consider to count under the treaty limits. Secretary Clinton and Foreign Minister Lavrov exchanged the instruments of ratification for the New START Treaty on February 5, 2011. This act brought the treaty into force and started the clock on early activities outlined in the treaty. For example, the United States and Russia conducted their initial data exchange, 45 days after the treaty entered into force, on March 22, 2011, within 45 days of entry into force. They also had the right to begin on-site inspection activities in early April, 60 days after the treaty entered into force. Reports indicate that this process began in the United States with the display of a B-1 bomber and in Russia with the display of Russia's new RS-24 missile. The United States and Russia also met in Geneva, from March 28 through April 8, 2011, in the first meeting of the treaty's Bilateral Consultative Commission. The representatives issued two joint statements at the conclusion of the meeting that addressed procedures that would be used during the on-site inspection process. The parties met for the second session of the BCC from October 19 to November 2, 2011. The third meeting of the BCC occurred in late January 2012. During that meeting, the parties signed several statements on the sharing telemetry on missile test launches. They agreed that they would exchange telemetric data on one ICBM or SLBM launch that had occurred between February 5, 2011, when the treaty entered into force, and the end of 2011. They also agreed on when they would begin and end the sharing of telemetric data during the flight test of an ICBM or SLBM. They also agreed on the procedures they would use when demonstrating the recording media and playback equipment used when providing telemetric information. The BCC met for a fourth time in September 2012. During this meeting, the two sides agreed on the use of tamper detection equipment during on-site inspections. The BCC met again in February 2013. At this meeting, the two sides signed an agreement indicating that they would exchange telemetry on the launch of ICBM or one SLBM during the time between January 1 and December 31, 2012. The BCC met again in January 2014, with the two sides, again, agreeing that they would exchange telemetric information on the launch of one ICBM or SLBM from 2013. They also agreed to use an additional measuring device during reentry vehicle inspections at SSBN bases. In October 2016, the parties met in the 12 th session of the BCC; the State Department did not provide any public details about the substance of the meeting. The 13 th session of the BCC met from late March to mid-April 2017; the State Department, again, did not offer any details about the substance of the meeting. According to a State Department Fact Sheet released at the conclusion of the reduction period, on February 5, 2018, the two sides conducted a total of \"14 meetings of the Treaty's Bilateral Consultative Commission (twice each Treaty year) to discuss issues related to implementation, with no interruption to the Parties' work during global crises causing friction elsewhere in the bilateral relationship.\" Two sessions also occurred in 2018. In a data exchange released in February 2011, with numbers drawn from the treaty's initial data exchange, the U.S. State Department noted that the United States had 1,800 warheads on 882 deployed ICBMs, deployed SLBMs, and deployed heavy bombers. These deployed forces were within a total of 1,124 deployed and nondeployed launchers of ICBMs and SLBMs, and deployed in nondeployed heavy bombers. By September 2011, the United States had reduced these numbers to 1,790 warheads on 882 deployed ICBMs, deployed SLBMs, and deployed heavy bombers. The total number of deployed and nondeployed launchers had declined to 1,043. The reduction in 81 nondeployed launchers likely reflects the conversion or elimination of some of the \"phantom\" launchers that remained in the U.S. force but no longer carried nuclear warheads. In the most recent exchange, with data current as of April 1, 2014, the United States indicated that it had 778 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 952 deployed and nondeployed launchers. It also indicated that these deployed forces carry a total of 1,585 warheads. In data released on January 1, 2015, from the exchange that occurred on September 1, 2014, the United States had 794 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 912 deployed and nondeployed launchers. It also indicated that these deployed forces carry a total of 1,642 warheads. The increase in deployed forces reported in this exchange likely reflected the return to service of one SSBN, after it completed its overhaul process. The numbers declined again, by the time of the October 2015 exchange, both because another SSBN has begun its overhaul and because the U.S. Air Force has completed the \"de-MIRVing\" of the ICBM force. Each Minuteman III missile now carries a single warhead. In addition, in September 2015, the Air Force announced that it had begun to convert a portion of the B-52H bomber force from nuclear to conventional-only capability, thus removing 30 operational bombers from accountability under New START. While the Air Force has not provided any public statements about the changes made to the B-52 bombers, these changes are likely consistent with the objective of rendering the bombers unable to carry or launch nuclear-armed cruise missiles. According to the State Department, as of September 1, 2016, the United States had a force of 1,367 warheads on 681 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 848 deployed and nondeployed launchers. This included 416 deployed ICBM launchers, with a total of 454 deployed and nondeployed ICBM launchers; 209 deployed SLBM launchers within a total of 320 deployed and nondeployed launchers; 10 deployed B-2 bombers, within a total of 20 deployed and nondeployed B-2 bombers; and 46 deployed B-52 bombers, within a total of 54 deployed and nondeployed B-52 bombers. These data show that the United States has continued to convert B-52 bombers from nuclear to conventional-only capability; to remove ICBMs from operational launchers, on the path to 400 deployed ICBM launchers; and to reduce the number of launchers from 24 to 20 on each ballistic missile submarine. The data released in April 2017, from the March 1, 2017, data exchange, show that the United States counted 1,411 warheads on 673 deployed launchers, within a total of 820 deployed and nondeployed launchers. The increase in warheads possibly reflects the return to service of ballistic missile submarines, following the elimination of the four excess launchers. The data exchange from September 2017, which shows the U.S. aggregate numbers of warheads and launchers, indicates that United States has met the New START limits. It now has 1,393 warheads on 660 deployed launchers, within a total of 800 deployed and nondeployed launchers. Some analysts questioned whether the U.S. reductions through September 2016, which placed the United States below the New START limits of 1,550 warheads on 700 deployed launchers, indicated that the Obama Administration had decided to reduce U.S. nuclear forces, unilaterally, to levels below the New START limits. However, these reductions were temporary, and the number of deployed launchers and warheads has now risen and should reach the levels permitted by the treaty when implementation is complete in 2018. For example, while the United States was reducing the number of launch tubes on deployed submarines, it removed them from deployment and removed the missiles from the launchers. These launchers and warheads did not count in the deployed force. Because each submarine now counts as 20 launchers, the September 2017 total of 660 deployed launchers can be read to indicate that two submarines, with 40 launchers, were still in nondeployed status at the time. The data exchanges from 2018 and 2019 show that the United States continues to have fewer than the permitted number of deployed missiles and warheads, as it continues to remove systems from deployment for short periods of time. In September 2018, it reported that it had 1,398 warheads deployed on 659 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 800 deployed and nondeployed launchers for missiles and bombers. On March 1, 2019, it reported that it had 1,365 warheads deployed on 656 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 800 deployed and nondeployed launchers for missiles and bombers. The State Department fact sheets also include the summary of Russia's force data. In February 2011, Russia reported that it had 1,537 warheads on 521 deployed ICBMs, deployed SLBMs, and deployed heavy bombers. Russia also reported a total of 865 deployed and nondeployed delivery vehicles. At the time of this report, analysts expressed surprise that Russian forces were already below the treaty limits in New START when the treaty entered into force. Some argued that this indicated the United States did not have to sign the treaty to bring about reductions in Russian forces, and that the treaty represented unilateral concessions by the United States. Others noted that the number of deployed warheads possibly reflected the ongoing retirement of older Russian missiles and could change in the future as Russia deployed new, multiple-warhead land-based missiles. In September 2011, in the second treaty data exchange, Russia reported that it had 1,566 deployed warheads on 516 deployed ICBMs, deployed SLBMs, and deployed heavy bombers. Hence, although the number of deployed delivery vehicles declined, the number of warheads increased by a small amount, and then exceeded the treaty limit of 1,550 warheads. Because the data provide no details of the force composition, this increase could have either been due to the deployment of the new MIRVed RS-24 missiles, which carry more warheads than the single-warhead SS-25 missile they replace, or due to variations in the numbers of warheads carried on deployed SLBMs. The number of deployed and nondeployed delivery vehicles had increased slightly, to 871. This could reflect the retirement of some of Russia's older missiles, which would move their delivery vehicles from the deployed to nondeployed column in the data. In the data exchange from April 1, 2014, Russia reported that it had 498 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 906 deployed and nondeployed launchers. It also indicated that these deployed forces carry a total of 1,512 warheads. In the data exchanged in September 2014, and released in January 2015, Russia reported a force of 528 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 911 deployed and nondeployed launchers. It also indicated that these deployed forces carried a total of 1,643 warheads. Within these totals, Russia continued to deploy some new ICBMs and SLBMs while retiring older systems. However, as all categories had increased since the last data exchange, new deployments seemed to be outpacing retirements. This continued over the past year, as, in March 2016—when Russia reported that it had 1,735 warheads on 521 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 856 deployed and nondeployed launchers. The pattern shifted a little in September 2016—when Russia reported that it had 1,796 warheads on 508 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 847 deployed and nondeployed launchers—as the number of warheads continues to rise while the number of deployed and nondeployed launchers has declined. The data exchanged in March 2017 show that Russia had begun to reduce the number of deployed warheads while increasing the number of deployed launchers—at that point it counted 1,765 warheads on 523 deployed launchers, within a total of 816 deployed and nondeployed launchers. The September 2017 data reinforce this trend. Russia reported a force 1,561 warheads, only 11 over the limit of 1,550 deployed warheads, on 503 deployed launchers. Hence, Russia appeared to be reducing older systems with larger numbers of warheads, while still deploying new missiles with fewer warheads, as it headed toward the New START limits by February 2018. On February 5, 2018, Russia reported that it had met the New START limits, with 1,444 warheads on 527 deployed ICBMs, SLBMs, and heavy bombers, within a total of 779 deployed and nondeployed launchers. The data exchanges from 2018 and 2019 show that the Russia continues to comply with the New START limits. In September 2018, it reported that it had 1,420 warheads deployed on 517 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 775 deployed and nondeployed launchers for missiles and bombers. On March 1, 2019, it reported that it had 1,461 warheads deployed on 524 deployed ICBMs, deployed SLBMs, and deployed heavy bombers, within a total of 760 deployed and nondeployed launchers for missiles and bombers. Some analysts questioned whether the increase in Russian warheads reported in March 2016 and September 2016 indicated that Russia would eventually withdraw from New START without reducing to its limit of 1,550 deployed warheads. Others, however, noted that Russia did not need to meet the limits until February 2018, so the warhead levels in 2016 should not be of concern. They also noted that Russia continues to deploy new systems, like a third new submarine and new multiple-warhead land-based missiles, at a faster pace than it has retired older systems. Hence, as Russia retired older multiple-warhead missiles before the deadline, it succeeded in reducing its forces below the limit of 1,550 warheads. Some have also suggested that Russia's continuing deployment of new missiles systems, and its plans for modernization through the next 5-10 years, indicate that Russia may be prepared to exceed the limits under New START, either before or shortly after the treaty's 2021 expiration. They have suggested that the United States respond to Russia's plans with its own plans to modernize and expand its nuclear forces. Others, however, while agreeing with assessments of Russia's ability to expand its nuclear forces, argue that the United States should respond by pressing Russia to extend New START through 2026 so that limits on Russian forces remain in place. The United States has not raised any questions, in public, about Russia's compliance with the New START Treaty. In the January 2016 version of the Annual Report on Implementation of the New START Treaty, the State Department reported that \"the United States certifies the Russian Federation to be in compliance with the terms of the New START Treaty.\" The report indicated that the United States \"has raised implementation-related questions with the Russian Federation through diplomatic channels and in the context of the Bilateral Consultative Commission (BCC).\" Russia has also raised questions about U.S. implementation during BCC sessions. In its statement released on February 5, 2018, the Russian Ministry of Foreign Affairs indicated that it had concerns with the conversion procedures the United States had used to eliminate some missile launchers and B-52 bombers from its force structure. It noted that Russia could not verify that the conversions had been done in a way that permanently \"rules out the use of Trident II submarine-launched ballistic submarines and nuclear weapons of heavy bombers.\" The Protocol to New START states the parties must demonstrate their elimination procedures if there is a question about whether the method meets the treaty terms, but it does not allow for the other party to object and require changes in the procedures. As a result, although the United States has insisted that its procedures are sufficient, Russia continues to question this conclusion. Russian officials have indicated that the United States should address Russia's concerns with these procedures before the two parties agree to extend New START before it expires in 2021. In a joint briefing provided by the United States and Russia in October 2011, the parties that, in the first six months of treaty implementation, they had exchanged almost 1,500 notifications and had conducted demonstrations of telemetric information playback equipment. By the end of the first year of implementation, on February 5, 2012, the parties had exchanged over 1,800 notifications. They had also conducted three required exhibitions, with Russia exhibiting the RS-24 missile and its launcher, and the United States exhibiting the B-1 and B-2 bombers. During the year, both parties had also conducted all 18 of the permitted inspections at facilities in the other nation. These inspections occurred at ICBM, SLBM, and heavy bomber bases; storage facilities; conversion and elimination facilities; and test ranges. In late November 2012, the State Department reported that the United States and Russia had each, as of November 26, conducted 15 of the 18 permitted inspections under the treaty. Both nations also completed their full complement of 18 inspections before the end of the second year of implementation, in February 2013. According to the State Department, the United States and Russia have both completed all 18 of their permitted Type 1 and Type 2 inspections during each of the eight full years of treaty implementation. They continued to conduct these inspections in spite of growing tensions after Russia's annexation of Crimea and aggression against Ukraine in early 2014. According to the State Department, the two sides also exchanged 17,516 notifications by early April 2019. These notifications report on the location, movement, and disposition of strategic offensive arms. They have also \"completed 14 exhibitions to demonstrate distinguishing features and technical characteristics of new types of strategic offensive arms or demonstrate the results of a conversion of a strategic offensive arm subject to New START.\" These monitoring activities will continue through 2021, or 2026 if New START is extended. When the Obama Administration released the 2010 Nuclear Posture Review, it indicated that the United States would retain a triad of ICBMs, SLBMs, and heavy bombers under the New START Treaty. The NPR indicates that this force structure supports strategic stability because it allows the United States to maintain an \"assured second-strike capability\" with warheads on survivable ballistic missile submarines and allows the United States to retain \"sufficient force structure in each leg to ... hedge effectively ... if necessary due to unexpected technological problems or operational vulnerabilities.\" The Trump Administration, in the 2018 NPR, also reaffirmed the support for the nuclear triad. Although it offered a more detailed rationale for the maintenance of a triad, the underlying themes of strengthening deterrence and supporting stability were part of the discussion. Obama Administration officials also indicated that New START promoted strategic stability by \"discounting\" the weapons on heavy bombers. As President Reagan argued during his commencement address at Eureka College in 1982, ballistic missiles are the \"most destabilizing nuclear systems.\" As a result, in his START proposals, President Reagan sought deep reductions in ballistic missile warheads, but lesser reductions in the weapons on heavy bombers. The counting rules in New START reflect this logic. Because bomber weapons would take hours or days to reach their targets, and because they could be recalled after they were launched, they pose less of a threat to strategic stability than do ballistic missiles. As a result, some argue that, even if the United States and Russia retain hundreds of bomber weapons that do not count against the treaty limits, the reductions required in ballistic missile warheads will enhance strategic stability. Some have also noted that New START may strengthen strategic stability from the Russian perspective by removing the specific limits and restrictions on mobile ICBMs. Russia does not deploy many submarines at sea, and, therefore, lacks an assured second-strike capability on that leg of its triad. Instead, it has sought to improve the survivability of its forces by deploying ICBMs on mobile launchers. Under START, the United States sought to restrict these systems because it feared it would not be able to count them in peacetime and target them in wartime. In the current environment, concerns about wartime targeting played less of a role in the negotiations. Consequently, instead of limiting their numbers and restricting their operations, New START seeks to provide transparency and openness, so the United States can be confident in its ability to count these weapons in peacetime even though it might not be able to attack them during a conflict. Critics of the New START Treaty have questioned whether it serves U.S. security interests even if it did promote strategic stability. Some argued, during the negotiations, that the United States did not need to negotiate a new treaty to maintain its own triad, as this was possible with or without arms control. They also argued that the United States did not need to reduce its forces to bring about reductions in Russia's forces, as Russia would reduce its forces over the next decade as it retired aging systems, even in the absence of a new arms control agreement. Moreover, they questioned whether arms control should even be a part of the U.S.-Russian relationship, as arms control is a symbol of a Cold War, antagonistic relationship between the two nations. They believe that the United States and Russia should not measure their relationship with each other using Cold War-era measures like strategic stability and survivable warheads. This last argument has faded as the U.S.-Russian relationship has changed over the past decade. Few now argue that arms control is irrelevant in the absence of an antagonistic relationship. Instead, they dispute the value of arms control precisely because the major-power rivalry has returned and the United States and Russia now have a more antagonistic relationship. They note that this change has occurred in spite of the presence of New START, and, therefore, is evidence of the failure of arms control to either support or strengthen strategic stability. Moreover, they note that New START did not include any limits on Russian shorter-range nonstrategic nuclear weapons, and, therefore, failed to capture the full scope of threats that Russia presents to the United States and its allies. Monitoring and verification were among the central concerns addressed in the Senate committees during their review of the New START Treaty. The cooperative monitoring measures in the treaty received special scrutiny, as many observers of the arms control process specifically measured the value of the monitoring and verification regime in the original START Treaty by its widespread use of notifications, on-site inspections, and other cooperative measures. Some critics of New START questioned whether the monitoring provisions in the new treaty were sufficient to provide the United States with enough information to either confirm Russian compliance with the treaty or to detect efforts to violate its terms. They pointed to differences between the verification regime in the original START Treaty and those in New START to argue that the new verification regime is less robust than the old regime. They noted that the United States would no longer maintain a monitoring presence outside the Votkinsk facility where Russia assembles its mobile ICBMs, which, they argued, could weaken the U.S. ability to count these missiles as they entered Russia's forces. They also noted that the United States and Russia would no longer exchange telemetry data on all their ballistic missile flight tests, which, over time, could lessen the U.S. ability to understand and evaluate the capabilities of Russian ballistic missiles. The Obama Administration and others who supported the new treaty argued that the verification regime in New START would be more than sufficient to provide the United States with confidence in Russia's compliance with the treaty. They acknowledged that the regime is different from the regime in the original START Treaty, but noted that this was, in part, due to improvements in the relationship between Russia and the United States and differences between the limits and restrictions in the two treaties. They argued that the monitoring regime in New START was streamlined, both to reduce its costs and to ease the disruptions caused by monitoring for U.S. and Russian military forces. They also noted that it relied on as much or more cooperation between the two parties, which would continue to build confidence and reduce suspicions. Moreover, many in the Obama Administration noted that the United States had not had any opportunity to monitor Russian forces on Russian territory since the original treaty expired in December 2009. They argued that continuing delays in Senate consideration of New START could further reduce U.S. and Russian confidence in their knowledge of each other's forces, leading to worst-case assessments and possible instabilities. They further reminded those who contend that the verification regime in New START is less robust than the regime in old START that the absence of a treaty would have meant the absence of any monitoring and verification regime. The United States did not have the option of returning the regime of the original START Treaty; nor should it have wanted to do so since the new treaty has different limits and restrictions than the old treaty. Many U.S. officials, including Admiral Mullen and General Chilton, included their concerns about the absence of monitoring in their appeals for the prompt ratification of the New START Treaty. Questions about the monitoring and verification regime in New START go beyond concerns about the specific monitoring mechanisms and the U.S. ability to confirm Russian compliance with individual limits in the treaty. Most experts agree that neither party can be absolutely certain that the other is in perfect compliance with all the limits and restrictions in the treaty. This is due, in some cases, to ambiguities in the treaty language and varying interpretations of the treaty requirements. It is also due to the fact that both sides may have gaps in their knowledge about the details of the other side's forces and activities. These uncertainties do not, by themselves, indicate that the parties should not ratify and implement the treaty. The broader question often asked by experts on treaty monitoring and verification is whether the parties, in general, and the United States, in particular, will have high confidence in Russia's compliance with the treaty, and, in those cases when compliance concerns may come up, whether the United States will be able to detect evidence of potential violations that might undermine U.S. security with enough warning to respond and adjust U.S. forces to offset those security concerns. The Obama Administration indicated, in documents submitted to the Senate in July 2010, that the New START Treaty met this standard. The Administration concluded that the benefits to Russia of cheating would be minimal, as the United States, by maintaining a triad of ICBMs, SLBMs, and bombers, would be able to respond to any attempt to shift the strategic balance by adding significant numbers of warheads to its own forces. Moreover, if Russia were to cheat to any significant degree, it would undermine its relationship with the United States and interfere with any possible future arms control agreements. Therefore, in a letter sent to the Senate Foreign Relations Committee in September 2010, Secretary of Defense Gates concluded that Russia would not be able to achieve \"militarily significant cheating\" under the New START Treaty. A review of the verification regime in New START, and summary of some of the differences between the verification regime in the original START Treaty and the regime in New START can be found in CRS Report R41201, Monitoring and Verification in Arms Control . As was noted above, during the debate over New START the Obama Administration testified repeatedly that the New START Treaty imposes no limits on current or planned ballistic missile defense programs in the United States. Some critics have claimed, however, that the United States might impose those limits itself, to ensure that Russia does not withdraw from New START, as it said it might do in the unilateral statement it released when it signed the treaty. Officials from the Obama Administration argued that this concern was unfounded. They noted that the Soviet Union issued a similar statement when it signed the original START Treaty, threatening to withdraw if the United States withdrew from the 1972 Anti-ballistic Missile (ABM Treaty). Yet, when the United States withdrew from the ABM Treaty in 2002, Russia not only did not withdraw from START, it continued to participate in negotiations on the 2002 Strategic Offensive Reductions Treaty. Moreover, in the 1990s, when the United States might have altered its missile defense plans in response to the Soviet letter, the United States actually expanded its missile defense activities and increased spending on missile defense programs. As a result, there is little reason, based on historical data, to expect the United States to restrain its missile defense programs. Moreover, officials from the Obama Administration have highlighted that the Ballistic Missile Defense Review, the Nuclear Posture Review, and the 2011 budget all offer strong support for continuing U.S. missile defense programs. Some critics have also claimed that Russia might seek, and the United States might agree to, new limits on U.S. missile defense capabilities in the Bilateral Consultative Commission established by the treaty. According to the Protocol to New START, this commission is designed \"to promote the implementation of the provisions of the Treaty.\" The Protocol indicates that the United States and Russia will meet in the commission to \"resolve questions relating to compliance with the obligations assumed by the Parties,\" agree on \"additional measures as may be necessary to improve the viability and effectiveness of the Treaty,\" and \"discuss other issues raised by either Party.\" Some have claimed that because this agenda is somewhat open-ended, Russia may raise its concerns about U.S. missile defenses in the commission and propose limits on those systems. The Obama Administration insisted that the parties could not, and would not use the BCC to negotiate new limits on ballistic missile defenses or any other elements of the U.S. strategic arsenal. In a fact sheet that accompanies the treaty, the State Department has indicated that the parties would use the BCC \"to reach agreement on changes in the Protocol to the Treaty, including its Annexes, that do not affect substantive rights or obligations. The BCC may in no way make changes that would affect the substantive rights and obligations contained in the New START Treaty.\" The parties may use the BCC to \"agree upon such additional measures as may be necessary to improve the viability and effectiveness of the Treaty\" but these measures would address concerns that came up while implementing the existing limits and restrictions in the treaty. They would not be able to impose new limits or restrictions without amending the treaty, and any amendment to the treaty would be subject to the same ratification process as the treaty itself. The Senate would have to offer its advice and consent. Although the Obama Administration pursued discussions with Russia on missile defense issues for several years, it never accepted any limitations on U.S. missile defense programs and insisted, repeatedly, that U.S. missile defense programs were not designed or capable of undermining Russia's ballistic missile defenses. Russia, however, continued to question U.S. intentions and press for limits on ballistic missile defenses. It has insisted that any negotiations on further reductions in nuclear weapons include discussions about limits on ballistic missile defenses. Congress remains concerned about the possibility that the United States might accept limits on missile defenses in exchange for limits on offensive nuclear forces. Senator Barrasso raised this issue in a hearing before the Senate Foreign Relations Committee on September 18, 2018. He asked officials from the State Department and Defense Department to assure him that \"in any arms control discussions with Russia for which you're responsible that the United States will not agree to limiting our own missile defense programs.\" Both Under Secretary of State Andrea Thompson and Under Secretary of Defense David Trachtenberg provided those assurances. The New START Treaty does not limit or restrict the ability of the United States or Russia to modernize strategic offensive nuclear forces. It specifically states, in Article V, paragraph 1, that, \"Subject to the provisions of this Treaty, modernization and replacement of strategic offensive arms may be carried out.\" Both nations are currently modernizing their forces and replacing aging missiles, submarines, and bombers. Moreover, while some Members of the Senate insisted that the Obama Administration commit to modernizing the U.S. nuclear arsenal before voting in support of the treaty, many have also indicated that their continuing support for the modernization programs is linked to ongoing implementation of New START. Several Senators emphasized this linkage during a hearing in the Senate Foreign Relations Committee in September 2018. Senator Menendez noted that \"bipartisan support for nuclear modernization is tied to maintaining an arms-control process that controls and seeks to reduce Russian nuclear forces.\" Senator Corker pointed out that, when the Senate gave its consent to the ratification of New START, \"there was no doubt\" about the \"tie between the two.\" He stated that \"the essence of this is that the modernization piece, and the reduction in warheads piece go hand in hand.\" The United States is currently recapitalizing all three legs of its nuclear triad, with replacements planned for its bombers, air-delivered cruise missiles, land-based ballistic missiles, and ballistic missile submarines over the next 20 years. It is also pursuing life extension programs for many of the warheads in the U.S. stockpile, to ensure that the weapons remain safe, secure, and effective. The Obama Administration outlined much of this modernization program in a report, known as the 1251 Report, mandated by Congress in the FY2010 Defense Authorization Act ( P.L. 111-84 , §1251). This provision required the Administration to submit a report to Congress when it submitted the New START Treaty to the Senate that described how it planned to \"enhance the safety, security, and reliability of the nuclear weapons stockpile of the United States; modernize the nuclear weapons complex; and maintain the delivery platforms for nuclear weapons.\" In this 1251 report, the Administration stated that the United States planned to spend $180 billion over the next 10 years to meet these objectives, with $80 billion allocated to the U.S. nuclear weapons complex and nuclear warheads and $100 billion allocated to the Navy and Air Force for the maintenance and modernization of their delivery systems. The program has expanded over the years, and, although cost estimates vary, the Congressional Budget Office has estimated that the United States is likely to spend around $350 billion over 10 years and $1.2 trillion over 30 years to modernize its nuclear arsenal. In the 2018 Nuclear Posture Review, the Trump Administration reaffirmed its support for the continuing modernization of the U.S. nuclear triad, advocating for the completion of all the programs initiated under the Obama Administration, while adding two new systems to the plan. During the debate over New START's ratification, some Members of Congress and analysts outside government questioned whether the Obama Administration was sufficiently committed to modernizing and maintaining its strategic nuclear forces, nuclear weapons complex, and nuclear warheads. Some also questioned whether the funding in the program would be sufficient to maintain and sustain the U.S. nuclear arsenal. Some argued that the totals did not add enough above the previously planned program to go far in expanding the U.S. capability to maintain and modernize its forces. Others questioned whether the Administration would sustain its commitment for more than a year or two, particularly in an era of tight defense budgets. These concerns grew as the fiscal constraints imposed through the Budget Control Act in 2011 reduced the resources available for modernization in the nuclear enterprise and have led to delays in some programs. Others, however, argued that the Administration's budget for the nuclear weapons complex in FY2011 and the added funding outlined in the 1251 report demonstrated a strong commitment to recapitalizing the U.S. nuclear weapons complex, maintaining nuclear warheads, and maintaining and modernizing the delivery vehicles. The Administration added nearly 10%, or over $700 million, to the DOE budget for nuclear weapons in FY2011. Ambassador Linton Brooks, who had served as the Director of the National Nuclear Security Administration during the Bush Administration, indicated that he would have \"killed\" for a budget of that magnitude when he was managing the nuclear weapons complex for DOE. While the 2011 Budget Control Act required some delays in planned spending on nuclear weapons modernization, the Obama and Trump Administrations' budget proposals have continued to show increases above the levels expected before the ratification of New START. Russia is also deploying new missiles, submarines, and bombers to replace aging systems within the limits of New START. At the same time, it may be developing new types of strategic offensive arms that might not be captured by the limits in the treaty. In his annual address on March 1, 2018, Russian President Putin announced that Russia was developing several new nuclear delivery vehicles that could evade or penetrate U.S. ballistic missile defenses. One of the new weapons mentioned in the speech, the large, multiple-warhead ICBM known as the Sarmat, would by most estimates clearly count under the New START Treaty. However, other systems—including a long-range nuclear-powered cruise missile, a long-range nuclear-armed underwater drone, and an air-delivered hypersonic cruise missile—may not be covered by the treaty's definitions of existing types of strategic offensive systems. As was noted above, the treaty addresses the possible emergence of new types of strategic offensive arms in paragraph 2 of Article V, where it states that the parties should raise their concerns about such weapons in the BCC. It does not, however, indicate how the parties will resolve such questions or whether they must agree before a weapon is included or excluded from the treaty limits. According to Under Secretary of State Thompson, in September 2018, the United States had not yet questioned Russia about these systems. However, these weapons would only raise concerns under New START if they were deployed before the treaty expired. Many analysts doubt that this will happen since most of the weapons mentioned in the speech seem to be in the early stages of development. Presidents Obama and Medvedev agreed, in April 2009, when they initiated the negotiations on the New START Treaty, that this agreement would address only strategic nuclear forces, the long-range weapons that each side could use to reach the territory of the other side. It would not seek to limit or restrict the shorter-range nonstrategic nuclear weapons in either side's arsenal. This agreement derived not only from the fact that the existing START Treaty, and nearly all past bilateral arms control treaties, had addressed only strategic nuclear weapons, but also from the fact that many of the issues that would need to be addressed in a treaty that limited nonstrategic nuclear weapons would likely prove too complex to resolve in the near term, when both sides sought to replace the existing START Treaty. There was widespread agreement in Congress, in the Obama Administration, and within the arms control community, that the United States and Russia should seek to negotiate a treaty that increases transparency and possibly imposes limits on nonstrategic strategic nuclear weapons. However, there is also widespread agreement that negotiating such a treaty would prove extremely difficult, as Russia maintains a far larger stock of these weapons than the United States, in part to compensate for perceived weaknesses in its conventional forces, and because U.S. nonstrategic nuclear weapons are a part of the U.S. commitment to NATO, and the United States believes that any changes in their deployment should be addressed by the alliance before they are addressed in an arms control negotiation. Some analysts and Senators questioned whether the United States should agree to further reductions in its strategic nuclear weapons in the absence of any limits on Russian nonstrategic nuclear weapons. They noted that Russia retains more than 2,000 operational nonstrategic nuclear weapons while the United States has around 200 in Europe, and that the value of these weapons could grow as the numbers of U.S. and Russian strategic nuclear weapons decline. They also noted that these weapons could seem particularly threatening to some of the new NATO states that are located near the periphery of Russia. Others however, argued that Russian nonstrategic nuclear weapons do not pose a threat to the United States or NATO, as Russia has indicated that these weapons would only be used in response to an attack on Russian territory. So, these analysts noted, as long as NATO does not initiate such an attack, NATO members would not be threatened by these weapons. Moreover, as Senator Lugar noted in his response to former Massachusetts Governor Mitt Romney's critique of New START, most of Russia's nonstrategic nuclear weapons do not pose a missile threat to Europe. Senator Lugar stated that \"most of Russia's tactical nuclear weapons either have very short ranges, are used for homeland air defense, are devoted to the Chinese border, or are in storage.\" Many of the experts who testified in support of the New START Treaty agreed that the United States and Russia should pursue negotiations on a treaty on nonstrategic nuclear weapons. However, most agreed that Russia would be unwilling to participate in such discussions, and the United States and Russia would be unlikely to find common ground on such an agreement, unless both sides ratified and implemented the New START Treaty first. For example, in testimony before the Senate Foreign Relations Committee on April 29, 2010, former Secretaries of Defense James Schlesinger and William Perry both indicated that nonstrategic nuclear weapons should be an issue for the next treaty, and that the United States should ratify New START as a step on the path to get to reduction in nonstrategic nuclear weapons. The Trump Administration, in the Nuclear Posture Review released on February 2, 2018, also expressed concerns about Russia's stockpile of nonstrategic nuclear weapons. While it did not advocate for the negotiation of a treaty specifically limiting these weapons, it did indicate that Russia would have to address these concerns before the United States would be willing to negotiate further reductions in strategic nuclear weapons. The Obama Administration argued that U.S.-Russian cooperation on arms control, in general, and the New START Treaty, specifically, could help move forward the U.S. and international nuclear nonproliferation agenda. No one has argued that the treaty will convince nations who are seeking their own nuclear weapon that they should follow the U.S. and Russian lead and reduce those weapons or roll back those programs. However, some have argued that U.S.-Russian cooperation on arms control could strengthen the U.S.-Russian cooperation on a broader array of issues and that, \"cooperation is a prerequisite for moving forward with tough, internationally binding sanctions on Iran.\" Moreover, some have noted that U.S.-Russian cooperation on arms control would also demonstrate that these nations are living up to their obligations under the Nuclear Nonproliferation Treaty (NPT). Most nations that are parties to the NPT believe that reductions in the number of deployed nuclear weapons are a clear indicator of U.S. and Russian compliance with their obligations under Article VI of the NPT. During the preparatory committee meetings (PrepComs) leading up to the 2010 Review Conference of the NPT, many of the participants called on the United States and Russia to complete negotiations on a New START Treaty. While the completion of this treaty may not assure the United States of widespread agreement on U.S. goals and priorities at the NPT review conference, many argue that the absence of an agreement would have certainly complicated U.S. efforts and reduced the chances for a successful conference. In contrast, some have argued that the New START Treaty will do little to advance U.S. nonproliferation goals. They noted that the parties at the NPT review conference may express their approval of the New START, but their positions on substantive issues would reflect their own national security interests and goals. Moreover, some critics argue that New START might undermine U.S. nonproliferation goals by calling into question U.S. security commitments and the continuing salience of U.S. nuclear weapons. The State Department, in its press releasing announcing that the United States had met its obligation to reduce to the New START limits, noted that \"the United States continues to demonstrate its commitment to fulfilling its arms control obligations, including under the Treaty on the Non-Proliferation of Nuclear Weapons\" through its adherence to the New START limits. In 2010, when it signed the New START Treaty, the Obama Administration indicated that it hoped this would be the first step in a renewed arms control process with Russia. In his statement on April 8, 2010, President Obama indicated that \"this treaty will set the stage for further cuts. And going forward, we hope to pursue discussions with Russia on reducing both our strategic and tactical weapons, including nondeployed weapons.\" In his State of the Union Address on February 12, 2013, the President stated that, as a part of the \"effort to prevent the spread of the world's most dangerous weapons,\" the United States would \"engage Russia to seek further reductions in our nuclear arsenals.\" Then, on June 19, 2013, in a speech in Berlin, President Obama stated that, after a comprehensive review, he had \"determined that we can ensure the security of America and our allies, and maintain a strong and credible strategic deterrent, while reducing our deployed strategic nuclear weapons by up to one-third.\" He stated that he intended \"to seek negotiated cuts with Russia to move beyond Cold War nuclear postures.\" Many analysts outside government supported the idea of further reductions beyond New START. They had hoped New START would cut more deeply into U.S. and Russian forces, reducing them to perhaps 1,000 warheads on each side. Others focused their concern on the absence of limits on nonstrategic nuclear weapons and nondeployed nuclear warheads. They expected a second treaty to address some of these concerns. Some have suggested that the two sides pursue a single, comprehensive treaty that would limit strategic, nonstrategic, and nondeployed warheads. This is similar to the approach that the Obama Administration appeared willing to pursue in 2013. Others suggested that the United States and Russia accelerate their reductions under New START, amend the treaty to reduce the numbers of permitted weapons, or agree informally to reduce their forces below New START levels. They argued that these steps, if the nations took them together, could enhance stability and reduce nuclear dangers, without waiting for the completion a new, lengthy treaty negotiation process. Some have also suggested that the United States and Russia work to increase transparency on their nonstrategic nuclear weapons, even if they are not yet ready to agree to limits or reductions in these systems. Others, however, disputed the notion that New START should be the first step in an ongoing process of further reductions in nuclear weapons. While some were willing to support the modest reductions of New START, they would not have supported a treaty that imposed deeper reductions on deployed nuclear weapons or limits on nondeployed nuclear weapons. They also objected to the broader arms control agenda that President Obama had outlined in his speech in Prague on April 5, 2009, including his call for the ratification of the Comprehensive Test Ban Treaty and his vision of a world free of nuclear weapons. Hence, some who concluded that the New START Treaty would not harm U.S. security by itself objected to its ratification because they believed its defeat would close the door on the rest of the President's arms control agenda. The prospects of additional reductions below the New START levels were further dimmed by the fact that Russia has been uninterested in negotiating another treaty. Shortly after New START entered into force, Russian Foreign Minister Sergei Lavrov stated that Russia would not want to pursue further negotiations until New START had been implemented. Russian officials have stated, repeatedly, that a treaty mandating further reductions would not only have to include limits on U.S. ballistic missile defenses and nonnuclear strategic strike systems, but would also have to limit the forces of the other major nuclear powers. Most experts agree that a new treaty that addressed each of these issues raised by both parties would likely be extremely difficult to complete. Russia has been unwilling to negotiate reductions in its nonstrategic nuclear weapons, and neither side may be willing to adopt the amount of transparency necessary to negotiate verifiable limits on nondeployed warheads in storage. The United States has firmly rejected Russia's proposals for limits on ballistic missile defense and is unwilling to include conventional-armed cruise missiles or other long-range missiles in nuclear arms control negotiations. Moreover, Britain, France, and China—the other declared nuclear weapons states under the NPT—have not shown any willingness to participate in the U.S.-Russian arms control process. Prospects for the negotiation of a follow-on treaty dimmed further in 2014, following Russia's annexation of Crimea and incursion into Ukraine. In addition, in July 2014, the Obama Administration—in its Annual Report on Adherence to and Compliance with Arms Control, Nonproliferation, and Disarmament Agreements and Commitments—stated that the United States \"has determined that the Russian Federation is in violation of its obligations under the [1987] Intermediate Range Nuclear Forces (INF) Treaty not to possess, produce, or flight-test a ground-launched cruise missile (GLCM) with a range capability of 500 km to 5,500 km, or to possess or produce launchers of such missiles.\" While Russia appeared to be complying with New START, most agreed that further negotiations would be unwise; some also suggested that the United States suspend its implementation of New START until Russia returned to compliance with the INF Treaty. Others, however, have argued that the United States should continue to implement New START, as the limits on the size of Russia's strategic forces and the transparency provided by its verification regime continue to serve U.S. national security interests. Absent an agreement between the United States and Russia to extend New START for a period of no more than five years, the treaty will lapse in 2021. As was noted above, President Trump and President Putin reportedly discussed the treaty during their summit in Helsinki in July 2018, with President Putin presenting President Trump with a document suggesting that they extend the treaty after resolving \"existing problems related to the Treaty implementation,\" but the two did not reach an agreement on the issue. In the 2018 Nuclear Posture Review, the Trump Administration noted that the United States had met the treaty's central limits, and that it would \"continue to implement the New START Treaty and verify Russian compliance.\" It did not, however, indicate whether it might seek an extension of the treaty and made it clear that it was unlikely to negotiate a new treaty before New START's expiration in 2021. It noted that the United States is committed to \"arms control efforts that advance U.S., allied, and partner security; are verifiable and enforceable; and include partners that comply responsibly with their obligations.\" But it also noted that Russian actions, including its noncompliance with the INF Treaty and other arms control agreements, and its actions in Crimea and Ukraine made further progress difficult. The Trump Administration is reportedly conducting an interagency review of New START to determine whether it continues to serve U.S. national security interests, and that this review will inform the U.S. approach to the treaty's extension. Among the issues that might be under consideration are whether the United States should be willing to extend New START following Russia's violation of the INF Treaty, whether the limits in the treaty continue to serve U.S. national security interests, whether the insights and data that the monitoring regime provides about Russian nuclear forces remain of value for U.S. national security, and whether an extension of the treaty should be linked to Russia's development of new kinds of strategic offensive arms. Administration officials addressed this review during testimony before the Senate Foreign Relations Committee on September 18, 2018. Both Under Secretary of State Andrea Thompson and Deputy Under Secretary of Defense David Trachtenberg emphasized how Russia's violation of the INF Treaty and its more general approach to arms control undermined U.S. confidence in the arms control process. Under Secretary Thomson noted that \"the value of any arms control agreement is derived from our treaty partners maintaining compliance with their obligations and avoiding actions that result in mistrust and the potential for miscalculation.\" She also said that Russia's noncompliance \"has created a trust deficit that leads the United States to question Russia's commitment to arms control as a way to manage and stabilize our strategic relationship and promote greater transparency and predictability.\" Deputy Under Secretary Trachtenberg also emphasized that \"arms control with Russia is troubled because the Russian Federation apparently believes it need only abide by the agreements that suit it. As a result, the credibility of all international agreements with Russia is at risk.\" He went on to state that \"It is that overall kind of behavior that I think from a national security perspective we at least need to consider.\" Several Senators questioned whether the Administration's review would include a broader assessment of whether the provisions in New START contributed to U.S. national security. They focused on both the benefits of the limits on U.S. and Russian nuclear forces and the value of the transparency provided by the monitoring and verification regime. Deputy Under Secretary Trachtenberg acknowledged that \"the verification and monitoring and on-site inspection provisions provide a level of openness and transparency that is useful and beneficial not just to the United States but to our allies as well.\" But he reiterated that \"any decision on extending the treaty will, and should be, based on a realistic assessment of whether the New START treaty remains in our national security interests in light of overall Russian arms control behavior.\" Senators held a similar conversation with Under Secretary Thompson and Deputy Under Secretary Trachtenberg during a hearing before the Senate Foreign Relations Committee on May 15, 2019. While the two witnesses repeated many of the same concerns about Russian compliance with its arms control obligations and the need for an atmosphere of trust between the treaty parties, they also addressed concerns about Russia's development of new kinds of strategic offensive arms that would fall outside the New START limits, Russia's nonstrategic nuclear weapons that are not covered by the Treaty, and China's nuclear modernization programs. They were unwilling to offer insights into the progress of the review—Under Secretary Thompson refused to speculate about possible changes in Russian forces if the treaty were to expire, and Deputy Under Secretary Trachtenberg declined to offer insights into how the United States might alter its nuclear forces or how it might recover the data and information provided by New START's verification regime if the treaty were to expire. Analysts outside government have offered several reasons why the United States should support the extension of New START. They note that extension would not only maintain limits on the number of deployed strategic nuclear weapons in Russia, but would also retain the predictability offered by the treaty's limits, maintain the monitoring and verification regime that provides the United States with insights into Russian nuclear forces and nuclear modernization programs, and avoid misperceptions that could upset strategic stability, exacerbate a crisis, or lead to a costly arms race. They also note that such an extension would provide the United States and Russia with an additional five years to resume negotiations and possibly reach new agreements on further reductions or transparency measures. Others, however, believe the United States and Russia should allow the New START Treaty to lapse, both to relieve the United States of its obligations and because they believe that Russia's interest in retaining limits on U.S. forces would provide the United States with leverage when negotiating a treaty to replace New START. Some also argue that the treaty better serves Russian than U.S. interests because, as was noted above, Russia is pursuing the development of weapons that may not be captured by the treaty limits. Some have questioned whether the treaty's extension will eventually constrain the ongoing U.S. nuclear modernization program. While the United States plans to recapitalize all three legs of its nuclear triad, each program is sized to fit within the limits of New START. But, with growing concerns about the challenges the United States might face from Russia and China, along with growing concerns about the scope of their nuclear modernization programs, the United States might eventually seek to expand its forces beyond the limits in New START. The 2018 Nuclear Posture Review hints at this possibility by noting that the plan for rebuilding the sea-based leg of the nuclear triad will include at least 12 Columbia-class submarines, thus leaving open the possibility of a larger program. Nevertheless, based on the pace of modernization, New START may not interfere with the U.S. modernization program, even if the treaty were extended for five years. Most of the new U.S. systems are not scheduled to enter the force until the late 2020s, after New START's 2026 expiration. Moreover, the new systems are to replace existing, older systems, which would keep the U.S. force within the New START limits for many years. Any expansion beyond those limits would not occur until later in the 2030s. On the other hand, if New START were to expire in 2021, the United States might feel compelled to both accelerate and expand its modernization programs if Russia were to expand its nuclear programs when released from the constraints of the treaty. President Trump's National Security Advisor, Ambassador John Bolton, addressed the question of New START extension in a press conference following his meeting with President Putin's National Security Advisor, Nikolai Patrushev, in August 2018. He noted that, instead of simply extending New START, the United States and Russia could either renegotiate the treaty or replace it with something more like the 2002 Moscow Treaty signed during the George W. Bush Administration. President Trump has also proposed that the United States and Russia replace New START with a new, broader treaty that would capture all types of nuclear weapons and include China's forces under the limits. Those who favor renegotiating New START believe it would provide the United States with the opportunity to press Russia to include limits on its new types of long-range nuclear delivery systems and to accept limits on shorter-range, nonstrategic delivery vehicles. But this approach envisions a more complicated treaty and could take years to complete the negotiations. A return to the Moscow Treaty envisions a more simple approach. The Moscow Treaty did not contain any detailed definitions or restrictions on deployed forces, and, instead, included a simple pledge by each side to reduce the number of deployed warheads within a 10-year period. Bolton both supported this approach and participated in the negotiations when he served as an Under Secretary of State in the Bush Administration. These options, however, may not provide a capable or timely response to the impending expiration of New START. As noted above, Russia has been unwilling to accept limits on its nonstrategic nuclear delivery vehicles in the past, and any attempt to convince them to do so in the future may require the United States to agree to the elimination of its nuclear weapons deployed in Europe. Moreover, while limits on nonstrategic nuclear weapons have long been a U.S. priority for the next arms control agreement, Russia has stated that the next agreement should include limits on U.S. ballistic missile defense programs, limits on nonnuclear strategic-range delivery systems (specifically, U.S. sea-launched cruise missiles), and limits on other nations' (specifically British and French) nuclear forces. Because neither side is likely to accept the demands of the other, an effort to renegotiate or replace New START would almost certainly fail to produce a new treaty before its 2021 expiration or a replacement treaty after its expiration. Russia has not rejected U.S. proposals to address its new kinds of long-range delivery systems, but it has refused to count them under New START. Instead, it has suggested that the two sides discuss these weapons in a separate forum that addresses concerns about strategic stability. It has indicated that this forum could meet in the years after the parties extend New START. Russia has not yet produced any of these weapons, and may produce only a small number between 2021 and 2026. So, even if these weapons were not captured by New START, such discussions could occur before the weapons posed a significant threat to the United States or its allies. The Trump Administration has not offered any details about how China could participate in the arms control process. Specifically, it has not indicated whether it would seek limits in a new treaty closer to the size of the Chinese arsenal, or whether it would invite China to expand its forces to levels closer to the New START limits of 1,550 warheads on 700 deployed missiles and bombers. While China has not offered any details about the size of is nuclear force, the 2019 version of the Pentagon's Annual Report to Congress on Military and Security Developments Involving the People's Republic of China notes that China's force missiles with a range greater than 5,500 kilometers (the range of missiles that count under New START) \"currently consists of approximately 90 ICBMs\" deployed on land and 48 missiles deployed four ballistic missile submarines. The Pentagon report does not include an estimate of the number of warheads carried by these missiles. Unclassified estimates, however, indicate that the submarine-launched ballistic missiles and most of the land-based missiles carry a single warhead, while some of the land-band based missiles may carry three warheads per missile. As a result, the Chinese missiles that would count under New START likely carry around 130 warheads. This is within a total estimated arsenal of around 280 nuclear warheads. China, in the past, has firmly rejected suggestions that it join in the nuclear arms control process. Chinese officials have noted that they deploy far fewer nuclear forces than the United States and Russia, that they do not engage in arms races with other nations, and that they support eventual nuclear disarmament. A spokesman for the Chinese Foreign Ministry reiterated its objections in May 2019, after the Trump Administration suggested that China join the arms control process. According to press reports, Geng Shuang said that the country's nuclear forces were at the \"lowest level\" of its national security needs, and that they could not be compared to the United States and Russia. He noted that \"China believes that countries with the largest nuclear arsenals have a special responsibility when it comes to nuclear disarmament and should continue to further reduce nuclear weapons in a verifiable and irreversible manner, creating conditions for other countries to participate.\" A return to the 2002 Moscow Treaty raises different issues. Ambassador Bolton and others who support this approach to arms control note that this treaty provided the United States with the maximum amount of flexibility in sizing and structuring its nuclear forces. The limits in the treaty were consistent with the force levels the United States had already decided to pursue, and did not require that the United States match its force levels to those acceptable to Russia. It also was set to expire, on December 31, 2012, at the same time as both sides were required to reach the limits in the treaty, thereby imposing no real restrictions on U.S. force levels over the course of its implementation. Moreover, the treaty contained no specific definitions of forces covered by the limits, so each side could count and declare its force levels according to its own interpretation of the limits. But the absence of agreed definitions and counting rules, along with the absence of any specific provisions that would allow each side to monitor the other's forces, meant that neither side could verify that the other was complying with the limits in the treaty. While this issue was mitigated because the 1994 START Treaty, with its complex verification regime, remained in force through December 2009 and was soon after replaced by New START, such a solution would not be possible if a treaty of this type were to replace New START after its expiration. The monitoring regime under New START would also expire, leaving the United States and Russia with no data exchanges, declarations, or inspections that provide transparency into each other's forces and operations.", "summary": "The United States and Russia signed the New START Treaty on April 8, 2010. After more than 20 hearings, the U.S. Senate gave its advice and consent to ratification on December 22, 2010, by a vote of 71-26. Both houses of the Russian parliament—the Duma and Federation Council—approved the treaty in late January 2011 and it entered into force on February 5, 2011. Both parties met the treaty's requirement to complete the reductions by February 5, 2018. The treaty is due to expire in February 2021, unless both parties agree to extend it for no more than five years. New START provides the parties with 7 years to reduce their forces, and will remain in force for a total of 10 years. It limits each side to no more than 800 deployed and nondeployed land-based intercontinental ballistic missile (ICBM) and submarine-launched ballistic missile (SLBM) launchers and deployed and nondeployed heavy bombers equipped to carry nuclear armaments. Within that total, each side can retain no more than 700 deployed ICBMs, deployed SLBMs, and deployed heavy bombers equipped to carry nuclear armaments. The treaty also limits each side to no more than 1,550 deployed warheads; those are the actual number of warheads on deployed ICBMs and SLBMs, and one warhead for each deployed heavy bomber. New START contains detailed definitions and counting rules that will help the parties calculate the number of warheads that count under the treaty limits. Moreover, the delivery vehicles and their warheads will count under the treaty limits until they are converted or eliminated according to the provisions described in the treaty's Protocol. These provisions are far less demanding than those in the original START Treaty and will provide the United States and Russia with far more flexibility in determining how to reduce their forces to meet the treaty limits. The monitoring and verification regime in the New START Treaty is less costly and complex than the regime in START. Like START, though, it contains detailed definitions of items limited by the treaty; provisions governing the use of national technical means (NTM) to gather data on each side's forces and activities; an extensive database that identifies the numbers, types, and locations of items limited by the treaty; provisions requiring notifications about items limited by the treaty; and inspections allowing the parties to confirm information shared during data exchanges. New START does not limit current or planned U.S. missile defense programs. It does ban the conversion of ICBM and SLBM launchers to launchers for missile defense interceptors, but the United States never intended to pursue such conversions when deploying missile defense interceptors. Under New START, the United States can deploy conventional warheads on its ballistic missiles, but these will count under the treaty limit on nuclear warheads. The United States may deploy a small number of these systems during the time that New START is in force. The Obama Administration and outside analysts argued that New START strengthens strategic stability and enhances U.S. national security. Critics, however, questioned whether the treaty serves U.S. national security interests, as Russia was likely to reduce its forces with or without an arms control agreement and because the United States and Russia no longer need arms control treaties to manage their relationship. Secretary of State-designate Tillerson offered support for the treaty during his confirmation hearings, noting that he supports \"the long-standing bipartisan policy of engaging with Russia and other nuclear arms states to verifiably reduce nuclear stockpiles\" and that it is important for the United States \"to stay engaged with Russia [and] hold them accountable to commitments made under the New START.\" The 2018 Nuclear Posture Review confirmed that the United States would continue to implement the treaty, at least through 2021. The Administration has not yet determined whether it will request or support an extension of the treaty through 2026.", "document_type": "crs"}
{"report": "T he Freedom of Information Act (FOIA) confers on the public a right to access federal agency information. Before FOIA's enactment, the Administrative Procedure Act (APA) had required agencies to make certain government information available to the public. But the exceptions to disclosure in the APA's public information section had, in the estimation of FOIA's drafters, \"become the major statutory excuse for withholding Government records from public view.\" The exceptions were broad, authorizing agencies, for example, to withhold information if doing so was \"in the public interest\" orâfor \"matters of official record\"âwhen information was \"held co nfidential for good cause found.\" In addition, the APA's public information section lacked a provision authorizing a person to seek judicial review of an agency's decision to withhold information. To rectify the APA's perceived failure to provide the public with adequate access to government information, Congress enacted FOIA in 1966 as an amendment to the APA. In FOIA, Congress sought to establish a statutory scheme that embodied \"a broad philosophy of 'freedom of information'\" and ensured \"the availability of Government information necessary to an informed electorate.\" To effectuate Congress's desire for robust public access to agency information, FOIA establishes a three-part system of disclosure by which agencies must disclose a large swath of records and information. First, FOIA directs agencies to publish \"substantive rules of general applicability,\" procedural rules, and specified other important government materials in the Federal Register. Second, on a proactive basis, agencies must electronically disclose a separate set of agency information including, among other things, final adjudicative opinions and certain \"frequently requested\" records. And third, FOIA's request-driven system of disclosure requires that, \"[e]xcept with respect to the records made available under\" the statute's proactive disclosure provisions, agencies disclose covered records to individuals, corporations, and others upon request. FOIA's tripartite system of disclosure aims to open up a vast array of federal agency information and records to private individuals, researchers, journalists, corporations, and other parties. In addition, disclosure under FOIA may bring information to Congress's attention that may inform its oversight of FOIA-covered agencies. As one court has remarked, \"FOIA is the legislative embodiment of Justice Brandeis's famous adage\" that \"[s]unlight is . . . the best of disinfectants.\" While FOIA's main purpose is to inform the public of the operations of the federal government, the act's drafters sought to protect certain private and governmental interests from the new law's disclosure obligations. FOIA thus contains nine exemptions from disclosure that authorize, but do not require, agencies to withhold information or records that are otherwise subject to release or availability under the statute. Most of FOIA's nine enumerated exemptions are designed to protect against fairly general harms that may arise from disclosure, while others concern very specific types of information, and one incorporates numerous exemptions contained in other federal statutes. And along with its nine exemptions, FOIA contains three records \"exclusions\" that cover certain \"especially sensitive law enforcement records.\" If records protected by an exclusion are subject to a FOIA request, an agency may \"treat the records as not subject to the requirements of\" FOIA. Lastly, the statute authorizes requesters to challenge in federal court an agency's decision to withhold requested records. Federal district courts may \"enjoin [an] agency from withholdingÂ agencyÂ records\"Â and \"orderÂ the production of anyÂ agencyÂ recordsÂ improperly withheld.\" This report provides an overview of FOIA. First, the report examines key terms that dictate the scope of agencies' disclosure obligations under FOIA. The report then provides an overview of FOIA's three disclosure requirements. Following that discussion, the report reviews each of FOIA's nine exemptions and, in a later section, its three records exclusions. After an overview of selected issues concerning judicial review of agency decisions to withhold information under FOIA, this report discusses two topics of potential interest to Congress: FOIA's \"special access\" provisionâwhich provides that FOIA does not authorize agencies \"to withhold information from Congress\" âand the status of congressional records under FOIA. Lastly, this report discusses three other laws that, like FOIA, govern the availability of specific types of government information and constitute significant elements of the federal government's open government and information legal regimes: the Federal Advisory Committee Act (FACA); Government in the Sunshine Act (Sunshine Act); and Privacy Act. FOIA generally requires each federal \"agency\" to make \"agency records\" available to the public and specifically to \"any person\" who requests them. FOIA does not, however, require every federal entity to disclose government information to the public, nor must an agency disclose every piece of information that may be located within a covered entity. And not all persons have a right to receive records under the act. Three key statutory terms inform FOIA's general scope: (1)Â \"agency\"; (2) \"agency records\"; and (3) \"any person.\" The meaning of each of these terms determines which entities must comply with FOIA, what materials must be disclosed under the act, and to whom FOIA grants the right to request and receive records. FOIA requires \"agencies\" to disclose a broad array of information to the public. The APA's general definition section in 5 U.S.C. Â§ 551 defines \"agency\" as \"each authority of the Government of the United States, whether or not it is within or subject to review by another agency.\" FOIA embraces this general definition and provides that, for the act's purposes, the term \"includes any executive department, military department, Government corporation, Government controlled corporation, or other establishment in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency.\" While this definition includes a large swath of the federal government, it does not encompass the entire federal establishment. For example, FOIA does not apply to Congress, the federal courts, or territorial governments. Although FOIA's definition of \"agency\" includes the Executive Office of the President (EOP), courts have determined that several entities within the EOP are nevertheless not subject to the act. In Kissinger v. Reporters Committee for Freedom of the Press , the Supreme Court held that transcripts of Henry Kissinger's telephone conversations from his time as Assistant to the President for National Security Affairs were not subject to disclosure under FOIA. The Court explained that the term \"agency\" as used in FOIA does not apply to \"the President's immediate personal staff or units in the Executive Office whose sole function is to advise and assist the President .\" Courts have determined that several EOP entities are not FOIA \"agencies\" by virtue of their solely advisory or operational functions, including the Council of Economic Advisers, Office of Administration, and National Security Council. On the other hand, courts have held that entities within the EOP that \"wield[] substantial authority independently of the President,\" such as the Office of Management and Budget, are agencies under FOIA. Just as only \"agencies\" are subject to FOIA's disclosure requirements, only \"agency records\" need be disclosed under the act. FOIA, however, does not define \"agency records.\" Without a statutory definition, the Supreme Court, in Department of Justice (DOJ) v. Tax Analysts , held that materials qualify as agency records if an agency (1) created or obtained the materials and (2) was \"in control of the requested materials at the time the FOIA request [was] made.\" An agency comes in control of materials if, per Tax Analysts , \"the materials have come into the agency's possession in the legitimate conduct of its official duties.\" As the two-part test makes clear, a record may be subject to disclosure even when an agency did not create the record, as long as the agency obtained and controlled the record when it was requested. To determine whether an agency exercises \"control\" of a record, the D.C. Circuit developed the \" Burka test,\" which considers 1. the intent of the document's creator to retain or relinquish control over the records; 2. the ability of the agency to use and dispose of the record as it sees fit; 3. the extent to which agency personnel have read or relied upon the document; and 4. the degree to which the document was integrated into the agency's record system or files. That said, an agency's mere ability to obtain materials, if not exercised, does not establish that such materials are agency records. And FOIA does not require an agency to create agency records in response to a FOIA request, only to disclose records it has already received or created and that are already under its control. Because FOIA only applies to \"agency records,\" it does not obligate agencies to disclose publicly the \"personal records\" of agency employees. As the Supreme Court in Tax Analysts explained, \"the term 'agency records' is not so broad as to include personal materials in an employee's possession, even though the materials may be physically located at the agency.\" The U.S. Court of Appeals for the District of Columbia Circuit (D.C. Circuit) has employed \"a totality of the circumstances test\" to assess whether material constitutes an \"agency record\" subject to FOIA or a \"personal record\" excluded from the statute's coverage. This \"test focuses on a variety of factors surrounding the creation, possession, control, and use of the document by an agency.\" In applying the totality of the circumstances test in Consumer Federation of America v. Department of Agriculture (USDA) , the D.C. Circuit held that electronic calendars of several USDA officials qualified as \"agency records\" under FOIA. The calendars \"were created by agency employees and were located within the [officials'] agency,\" updated and accessed daily, and maintained on the agency's computer system. The court determined, however, that the \"creation, possession, and control\" factors were \"not dispositive in determining whether the calendars [were] 'agency records'\" in the case. Instead, the court held that the officials' use of the calendars was the \"decisive factor.\" Specifically, the court found it significant that the calendars were used to schedule agency operations and were distributed to other agency staff and top officials. But the court determined that the electronic calendar of a separate USDA official was not an agency record subject to disclosure under FOIA because the official only shared the calendar with his secretaries and, therefore, no one else within the agency depended on his calendar to conduct agency business. Although FOIA does not require the disclosure of personal materials, issues may arise when agency personnel use nonofficial electronic accounts to communicate. In Competitive Enterprise Institute v. Office of Science & Technology Policy (OSTP) , the requester sought \"all policy/OSTP-related email[s]\" contained within the private email account of the director of OSTP. A private entity maintained an account that the director used for work-related purposes. OSTP denied the request, asserting that the private entity (the director's former employer) controlled the account and that the agency, therefore, could not search it. The district court dismissed the suit in favor of the agency. However, the D.C. Circuit reversed, explaining that \"records do not lose their agency character just because the official who possesses them takes them out the door or because he is the head of the agency.\" Instead, the court wrote, \"[i]f the agency head controls what would otherwise be an agency record, then it is still an agency record and still must be searched or produced.\" The D.C. Circuit's decision in Competitive Enterprise Institute , therefore, stands for the proposition that agency records are subject to FOIA even if contained in nongovernmental electronic accounts. Lastly, FOIA directs agencies to disclose nonexempt agency records to \"any person\" upon request. A \"person\" is defined as \"an individual, partnership, corporation, association, or public or private organization other than an agency.\" Courts have therefore held that, along with individuals, organizational entities such as corporations, as well as state and foreign governments, have access rights under FOIA. That said, federal agencies have no right to records under FOIA. Access to records under FOIA does not hinge on whether an individual is an American citizen; noncitizens are also entitled to records under the act. Further, the Supreme Court has explained that the requester's identity generally does not factor into whether records are subject to disclosure, nor is a requester generally required to supply a reason to an agency for his or her request. FOIA sets forth a three-part system for disclosing government information. The first two disclosure schemes require agencies to affirmatively disclose specific categories of information to the public, either through publication in the Federal Register or electronic disclosure. The third disclosure provision requires that, \"[e]xcept with respect to the records made available\" pursuant to FOIA's affirmative disclosure requirements, agencies disclose covered records after receiving a request from \"any person.\" While FOIA may be known predominately for its request-driven system of disclosure, the statute also contains affirmative disclosure provisions that require federal agencies to proactively disseminate to the public certain agency records. FOIA imposes two affirmative (also known as mandatory or proactive ) disclosure obligations. Under the first requirementâcodified in subsection (a)(1) of Â§Â 552âagencies must publish certain important government materialsâincluding \"substantive rules of general applicability\" and \"rules of procedure\"âin the Federal Register. The second affirmative disclosure requirementâcodified in subsection (a)(2) of Â§ 552ârequires agencies to provide electronic access to a separate set of agency materials that consists of, among other things, final agency adjudicative opinions and certain \"frequently requested\" records. Under Â§ 552(a)(1), agencies must publish certain information \"in the Federal Register for the guidance of the public.\" The provision seeks \"to enable the public 'readily to gain access to the information necessary to deal effectively and upon equal footing with the Federal agencies.'\" It instructs agencies to publish the following: 1. descriptions of agency organization and information regarding how, where, and from whom \"the public may obtain information, make submittals or requests, or obtain decisions\"; 2. information on how agency \"functions are channeled and determined, including the nature and requirements of all formal and informal procedures available\"; 3. (3) procedural rules, descriptions of available agency forms \"or the places at which forms may be obtained, and instructions as to the scope and contents of all papers, reports, or examinations\"; 4. (4) \"substantive rules of general applicability adopted as authorized by law,\" as well as agency \"statements of general policy or interpretations of general applicability\"; and 5. (5) every \"amendment, revision, or repeal of the foregoing.\" FOIA imposes a penalty for an agency's failure to publish the above information, providing that no person shall \"in any manner be required to resort to, or be adversely affected by, a matter required to be published in the Federal Register and not so published.\" In other words, an agency may not enforce any material against an affected party that the agency did not publish in the Federal Register as required under subsection (a)(1), unless the affected party received \"actual and timely notice of the terms thereof.\" Courts have held that FOIA authorizes judicial review of an agency's withholding of (a)(1) materials. However, available remedies in such cases may be limited. In Kennecott Utah Copper Corporation v. Department of the Interior (DOI) , the D.C. Circuit held that FOIA does not authorize reviewing courts, as a remedy, to order an agency to publish materials in the Federal Register. The court explained that FOIA's judicial review provision \"allows district courts to order 'the production of any agency records improperly withheld from the complainant ,' not agency records withheld from the public .\" Whereas, as explained by the court, \"[p]roviding documents to the individual fully relieves whatever informational injury may have been suffered by that particular complainant,\" requiring \"publication goes well beyond that need.\" The court explained that the penalty in subsection (a)(1), which provides that materials required to be published in the Federal Register that an agency has not so published generally are unenforceable, is \"an alternative means for encouraging agencies to fulfill their obligation to publish materials in the Federal Register\" and \"gives agencies a powerful incentive to publish any [(a)(1) materials] they expect to enforce.\" FOIA's second affirmative disclosure provision does not require disclosure in a particular publication, as does subsection (a)(1). Instead, subsection (a)(2) of Â§ 552 (often referred to as the \"reading-room provision\") directs agencies to \"make available for public inspection in an electronic format\" certain information, unless the information is \"promptly published and copies [are] offered for sale.\" The following information must be electronically disclosed under FOIA's second affirmative disclosure provision: 1. (1) \"final opinions . . ., as well as orders, made in the adjudication of cases\"; 2. (2) policy statements and interpretations not appearing in the Federal Register; 3. (3) \"administrative staff manuals and instructions to staff that affect a member of the public\"; 4. (4) copies of records that had been released in response to a FOIA request and that (a) \"the agency determines have become or are likely to become the subject of subsequent requests for substantially the same records\" due to the nature of the records' subject or (b) \"have been requested 3 or more times\"; and 5. (5) indexes of such previously released records. The 1966 House report underlying FOIA explained that this provision was intended to open up to the public the \"thousands of orders, opinions, statements, and instructions issued by hundreds of agencies,\" information that the report described as constituting \"the bureaucracy['s] . . . own form of case law.\" In that vein, the Supreme Court has explained that FOIA's second affirmative disclosure provision \"represents a strong congressional aversion to 'secret [agency] law.'\" Materials subject to subsection (a)(2) are now generally made accessible on agency websites. In addition to public dissemination of the above materials, subsection (a)(2) requires that agencies \"maintain and make available for public inspection in an electronic format\" indexes of (a)(2) material. And an agency may not rely on, use, or cite as precedent a \"final order, opinion, statement of policy, interpretation, or staff manual or instruction that affects a member of the public\" unless the agency has (1) indexed the material and published or made it available, or (2) given the affected party \"actual and timely notice of the terms\" of such material. As with (a)(1) materials, FOIA authorizes judicial review of challenges to the availability of materials subject to disclosure under subsection (a)(2). Courts do not appear to agree, however, whether they have authority under FOIA to order agencies to make (a)(2) records available in agency reading rooms, or whether their authority under the statute is limited to ordering the production of records to individual complainants. Under the two affirmative disclosure provisions discussed above, agencies must proactively disclose specific types of information. By contrast, under FOIA's third system of disclosure, agencies disclose covered records not \"made available under\" the affirmative disclosure provisions on a case-by-case basis after receiving a request. As discussed below, FOIA imposes certain procedural requirements on requesters and agencies in making and responding to requests for records. And, also as discussed below, the act allows requesters to internally appeal agency decisions to withhold records, a process requesters generally must take advantage of prior to seeking review in federal court. Section 552(a)(3)(A) of title 5 of the U.S. Code governs the production of records requested under FOIA. Under that section, \"each agency . . . shall make . . . records promptly available to any person\" after receiving a FOIA request. An agency must respond to a request that satisfies two requirements. First, a request must \"reasonably describe[]\" the records sought. The House committee report underlying the 1974 amendments to FOIA states that a \"'description' of a requested document would be sufficient if it enabled a professional employee of the agency who was familiar with the subject area of the request to locate the record with a reasonable amount of effort.\" Second, a FOIA request must comply with the agency's \"published rules stating the time, place, fees (if any), and procedures to be followed.\" If a requester submits a valid request, an agency must execute an \"adequate\" or \"reasonable\" search. This standard requires that an agency conduct a search that is \"reasonably calculated to uncover all relevant documents.\" The D.C. Circuit has explained that \"[t]he issue is not whether any further documents might conceivably exist but rather whether the government's search for responsive documents was adequate.\" FOIA also states that agencies must \"make reasonable efforts to search for . . . records in electronic form or format,\" unless doing so \"would significantly interfere with the operation of the agency's automated information system.\" DOJ guidance provides that this latter requirement \"promotes electronic database searches and encourages agencies to expend new efforts in order to comply with the electronic search requirements of particular FOIA requests.\" To facilitate its disclosure mandate, FOIA requires agencies to respond within certain timeframes and authorizes administrative review of unfavorable agency decisions. Once it receives a valid FOIA request, an agency has twenty business days to \"determine . . . whether to comply with [the] request\" and \"shall immediately notify the\" requester of its \"determination and the reasons therefor,\" as well as of the requester's right to appeal an \"adverse determination\" within the agency. In \"unusual circumstances\"âas defined by the statuteâan agency may extend the twenty-day period by ten additional days. In Citizens for Responsibility & Ethics in Washington v. Federal Election Commission , the D.C. Circuit, in an opinion authored by then-Judge Brett Kavanaugh, held that to make a proper \"determination,\" an \"agency must at least indicate within the relevant time period the scope of the documents it will produce and the exemptions it will claim with respect to any withheld documents.\" The court explained that an agency need not produce requested records when it makes its initial determination, determining that it may fulfill its responsibility under Â§ 552(a)(3)(A) to \"make . . . records promptly available\" after it indicates the scope of the records it will disclose and the exemptions it will invoke. A requester who receives an adverse determination may appeal the determination within the agency. Upon receiving an administrative appeal, an agency has twenty business days to make a determination, although, as in the context of initial determinations, it may extend this timeline by ten days for unusual circumstances. If the agencyâin whole or in partâupholds its adverse determination, it must inform the requester of FOIA's provisions governing judicial review of agency withholding decisions. Judicial review can proceed if the requester remains dissatisfied. Before challenging an agency's nondisclosure decision in federal court, a requester typically must exhaust any remedies that an agency affords the requester. Plaintiffs will fail to exhaust administrative remedies if they did not submit a valid FOIA request to the agency or did not internally appeal the agency's adverse decision. However, if the agency does not adhere to the response timeframes FOIA imposes on agencies, a requester \"shall be deemed to have exhausted his administrative remedies.\" If this occurs, the requester is viewed as having constructively exhausted administrative remedies and may seek review in federal court. However, if an agency belatedly responds to a request before the requester files suit, the requester must still internally appeal the agency's adverse determination before seeking recourse in the federal courts. As explained above, FOIA establishes a statutory right of public access to a wide array of government information. However, FOIA's drafters also desired to protect certain private and governmental interests from the law's broad disclosure mandate. FOIA reflects this desire by exempting a variety of records and information from mandatory disclosure pursuant to nine enumerated exemptions. Information protected by FOIA's exemptions ranges from certain classified national security information to geological information pertaining to wells. Together, the statute's policy of otherwise maximum disclosure and its exemptions seek to strike a \"balance between the right of the public to know and the need of the Government to keep information in confidence to the extent necessary without permitting indiscriminate secrecy.\" FOIA's exemptions are codified at 5 U.S.C. Â§ 552(b). Table 1 lists each exemption. All nine exemptions are explained more fully below. Despite the scope afforded to agencies to withhold certain records by FOIA's exemptions, the statute is fundamentally a disclosure statute. In that vein, the Supreme Court has directed that FOIA's exemptions should \"be narrowly construed.\" The statute reflects FOIA's presumption in favor of disclosure by explicitly requiring that agencies \"take reasonable steps necessary to segregate and release nonexempt information\" and disclose \"[a]ny reasonably segregable portion of a record\" that has been requested \"after deletion of the portions which are exempt.\" More fundamentally, FOIA's exemptions do not impose mandatory withholding obligations on agencies, and pursuant to the 2016 amendments to FOIA, an agency may not withhold government information protected by an exemption unless it \"reasonably foresees that disclosure would harm an interest protected by an exemption,\" or if disclosing the information is legally prohibited. Such limitations on the potential breadth of FOIA's exemptions may aid in the implementation of the statute's prodisclosure mandate. The Supreme Court has instructed that, due to the \"exclusivity\" of FOIA's exemptions, the act does not authorize an agency to withhold a covered record or information that is not protected by an applicable exemption. And in American Immigration Lawyers Association v. Executive Office for Immigration Review , the D.C. Circuit held that, when disclosing a record under FOIA, an agency may not redact information from that record on the basis that the information is \"non-responsive,\" but instead is limited by FOIA's nine exemptions in the types of information it may redact. The court explained that, although an agency may apply a FOIA exemption to withhold matter from a record, \"once an agency identifies a record it deems responsive to a FOIA request, the statute compels disclosure of the responsive record . . . as a unit.\" Thus, per the court, although \"the focus of the FOIA is information, not documents\" when the agency is deciding whether to exempt matter from a record, \"outside of that context, FOIA calls for disclosure of a responsive record, not disclosure of responsive information within a record.\" An agency may be prohibited by another source of law from disclosing material that is exempt under FOIA. For example, under FOIA's Exemption 3, certain statutes that prohibit or place limits on agencies' disclosure of information may serve as bases under FOIA for withholding covered information. An agency's disclosure of information protected by an Exemption 3 withholding statute, therefore, could, depending on the statute's terms, violate that particular statute. As another example, although FOIA's Exemption 4 authorizes an agency to withhold certain confidential \"commercial or financial information\" and trade secrets, the Trade Secrets Act (TSA) imposes criminal penalties for disclosing certain confidential materials if disclosure is not \"authorized by law.\" Thus, while Exemption 4 grants agencies discretion to withhold information covered by both the exemption and the TSA, the TSA would prohibit the unauthorized disclosure of the information. Ultimately, however, if records within FOIA's coverage are not exempt under FOIA or prohibited from being disclosed by another law, an agency must disclose such records upon request. Under certain circumstances, an agency may be held to have waived its ability to apply an exemption to a requested record due to its prior disclosure of information. For example, the D.C. Circuit has \"held . . . that the government cannot rely on an otherwise valid exemption claim to justify withholding information that has been 'officially acknowledged' or is in the 'public domain.'\" Courts often have held that an agency's prior disclosure of information to Congress has not foreclosed application of an exemption in response to a subsequent FOIA request. However, whether an agency has waived an exemption is necessarily dependent on \"the specific nature and circumstances of the prior disclosure.\" The first FOIA exemption authorizes agencies to withhold certain matters that pertain to \"national defense or foreign policy.\" Specifically, Exemption 1 allows an agency to withhold information that is \"(A) specifically authorized under criteria established by an ExecutiveÂ orderÂ to be kept secret in the interest of national defense or foreign policy and (B) [which is] in fact properly classified pursuant to such ExecutiveÂ order.\" This exemption reflects Congress's interest in maintaining the confidentiality of information implicating national defense and security. However, as the text makes clear, not all national-security-related information may be withheld under Exemption 1. Instead, only those national defense or foreign policy matters that have been properly classified through an applicable executive order are covered. At present, Executive Order 13526 primarily governs the classification of national security information by the executive branch. The executive order prescribes the procedures for classifying national security information and lists the categories of information to which the order applies, which include \"military plans, weapons systems, or operations\"; \"scientific, technological, or economic matters relating to the national security\"; and \"United States Government programs for safeguarding nuclear materials or facilities.\" Information that an agency seeks to withhold from disclosure under Exemption 1 must satisfy the substantive and procedural requirements contained in Executive Order 13526. FOIA's second exemption applies to records that are comparatively more \"routine\" and generally prone to less public interest than the national-security-related matters agencies may withhold under Exemption 1. Exemption 2 authorizes agencies to exempt from disclosure information that is \"related solely to the internal personnel rules and practices of an agency.\" The Supreme Court has held that \"personnel rules and practices\" under Exemption 2 are those that address \"employee relations or human resources.\" This exemption covers rules and practices pertaining to \"hiring and firing, work rules and discipline, [and] compensation and benefits.\" To fall under Exemption 2, information must pertain \"exclusively or only\" to personnel rules and practices, and, as the Supreme Court has explained, an \"agency must typically keep [such] records to itself for its own use.\" For years, many courts interpreted this provision to cover not only the employee relations and humans resources information described above, but also records that were predominantly internal and whose release would \"significantly risk[] circumvention of agency regulations or statutes.\" But in Milner v. Department of the Navy , the Supreme Court held that this broad view of Exemption 2 contravened the ordinary meaning of \"personnel rules and practices\"âwhich the Court read as applying only to employee relations and human resources records âand impermissibly incorporated an extrastatutory \"circumvention requirement\" into the exemption. After Milner , agencies wishing to withhold information that would have previously qualified as High 2 information must locate possible alternatives to Exemption 2 in other FOIA exemptions. With the exceptions of Exemptions 8 and 9, exemptions for information on a particularly specific subject or issue tend to be governed by FOIA's third exemption. Exemption 3 generally allows agencies to withhold information if it is \"specifically exempted from disclosure by\" a non-FOIA statute. In other words, disclosure under Exemption 3 is determined not by the category of information at issue, but rather by the information's protection by another statute. Congress has enacted a variety of statutes that prohibit or place limitations on the disclosure of information by the government. These statutory confidentiality requirements cover a wide range of information, including such diverse categories as information pertaining to visa determinations, drug pricing data, patent applications, and tax returns, to name but a few. Congress, however, did not intend for Exemption 3 to apply to every statute that authorizes or requires the withholding of information. Congress limited the exemption's coverage to two particular categories of statutes \"to assure,\" as the D.C. Circuit has written, \"that basic policy decisions on governmental secrecy be made by the Legislative rather than the Executive branch.\" The first category of laws that Exemption 3 covers are statutes that direct agencies to withhold information \"from the public in such a manner as to leave no discretion on the issue.\" The second embraces statutes that \"establish[] particular criteria for withholding or refer[] to particular types of matters to be withheld.\" In American Jewish Congress v. Kreps , the D.C. Circuit explained that the first category \"embraces only those statutes incorporating a congressional mandate of confidentiality that, however general, is absolute and without exception.\" The second category, however, \"does leave room for administrative discretion\"; statutes embraced by that category cabin or direct an agency's discretion by specific standards or criteria. A record must fall within the terms of a statute embraced by either category to fall under Exemption 3. Exemption 3 limits the universe of statutes subject to its coverage in one additional way. Any statute enacted after the date of the OPEN FOIA Act of 2009 must \"specifically cite[] to\" the exemption to qualify as an Exemption 3 withholding statute. Courts, accordingly, have held that statutes enacted after October 28, 2009, that fail to cite to Exemption 3 do not qualify as an exemption statute under FOIA, even if they would otherwise fall within the first two categories described above. Third parties regularly submit an enormous amount of sensitive proprietary information to the federal government, including in such varied situations as military and other government contracts; settlement negotiations with agencies; and applications for drug approvals by the Food and Drug Administration. FOIA's Exemption 4 authorizes agencies to exempt from disclosure many types of sensitive information that individuals and entities from outside the federal government transmit to the government. Specifically, the exemption protects (1) \"trade secrets\" and (2) \"commercial or financial information obtained from aÂ personÂ . . . [that is] privileged or confidential.\" The D.C. Circuit defines a \"trade secret\" for purposes of Exemption 4 as any secret, commercially valuable plan, formula, process, or device that is used for the making, preparing, compounding, or processing of trade commodities and that can be said to be the end product of either innovation or substantial effort. Courts have interpreted the exemption to embrace a broad range of information, allowing, for example, agencies to exempt as trade secrets \"documents contain[ing] information consisting of drug product manufacturing information, including manufacturing processes or drug chemical composition and specifications,\" as well as \"information regarding the quantities of menthol contained in cigarettes by brand and by quantity in each brand and subbrand.\" Most Exemption 4 litigation, however, does not concern trade secrets, but rather information potentially exempt under the \"commercial or financial information\" prong of Exemption 4. Under that prong, materials may be withheld under FOIA if they (1) constitute \"commercial or financial information,\" (2) have been supplied to an agency by a \"person,\" and (3) are \"privileged or confidential.\" While each element of the prong must be satisfied for information other than a trade secret to qualify as exempt, a particularly significant question courts face in Exemption 4 litigation is whether commercial or financial information is \"confidential\" within the meaning of Exemption 4. Prior to 2019, the leading test for determining the meaning of \"confidential\" under the exemption was developed by the D.C. Circuit in National Parks & Conservation Association v. Morton . Under the National Parks test, commercial or financial information was deemed confidential \"if disclosure of the information [was] likely . . . (1) to impair the Government's ability to obtain necessary information in the future; or (2) to cause substantial harm to the competitive position of the person from whom the information was obtained.\" Under National Parks , therefore, the courts looked to the effect of disclosing commercial or financial information on the federal government or submitter of information. But in Food Marketing Institute (FMI) v. Argus Leader Media , the Supreme Court rejected the D.C. Circuit's test and instead held that \"[a]t least where commercial or financial information is both [1] customarily and actually treated as private by its owner and [2] provided to the government under an assurance of privacy, the information is 'confidential' within the meaning of Exemption 4.\" This definition is broader than the National Parks test and permits agencies to withhold a larger category of information from FOIA's disclosure mandate. But the Supreme Court did not define the precise boundaries of its new test in FMI ; although the Court determined that \"[a]t least the first condition\" must be present for information to qualify as confidential, it did not decide whether the government must always provide assurances that information will be kept private in order for information to fall within Exemption 4's coverage. Exemption 5 applies to \"inter-agency or intra-agency memorandums or letters that would not be available by law to a party other than an agency in litigation with the agency.\" The 1966 House report accompanying the FOIA legislation indicates that the exemption was drafted with the intention of ensuring the \"full and frank exchange of opinions\" within the executive branch and based on the proposition that requiring an agency to release information prior to finalizing an action or decision will hinder its ability to effectively function. To fall within Exemption 5's coverage, a document must both (1) qualify as an \"inter-agency or intra-agency\" document and (2) \"fall within the ambit of a privilege against discovery under judicial standards that would govern litigation against the agency that holds it.\" Material is \"inter-agency or intra agency\" if it originates from an \"agency,\" as that term is defined by FOIA. Some courts have also recognized what is known as the \"consultant corollary,\" under which Exemption 5 protects certain materials that have been supplied to an agency by external consultants. Nonetheless, Exemption 5 does not protect all such communications. In DOI v. Klamath Water Users Protective Association , for example, the Supreme Court held that information submitted to DOI by certain American Indian tribes concerning the allocation of water rights did not constitute \"intra-agency\" records because the tribes had \"communicate[d] with the [agency] with their own, albeit entirely legitimate, interests in mind\" and sought \"a Government benefit at the expense of other applicants.\" An inter- or -intra-agency document will only qualify as exempt if, in the context of pretrial discovery, it would not \"be routinely or normally disclosed upon a showing of relevance\" in litigation against the agency. Accordingly, agency materials that would be routinely or normally disclosed in such contexts are not covered by the exemption. That a record must be disclosed in discovery upon a sufficient showing of need does not remove the record from Exemption 5's protection, as records subject to disclosure in such circumstances \"are . . . not 'routinely' or 'normally' available to parties in litigation.\" The Court has explained that Exemption 5 \"incorporates the privileges which the Government enjoys under the relevant statutory and case law in the pretrial discovery context.\" The exemption has been construed to embrace privileges mentioned in FOIA's legislative history, but privileges not mentioned may also be incorporated. However, a privilege not expressly listed in the legislative history and considered \"novel\" or having \"less than universal acceptance\" would be less likely to fall within Exemption 5's scope. Both the Supreme Court and lower federal courts have identified several privileges that Exemption 5 embraces and that may, therefore, serve as bases for withholding agency documents, including the privileges discussed below. D eliberative P rocess P rivilege . The deliberative process privilege is recognized as a component of the more general \"executive privilege.\" The Supreme Court has explained that the deliberative process privilege applies to agency \"advisory opinions, recommendations and deliberations comprising part of a process by which governmental decisions and policiesÂ are formulated.\" The privilege protects agency records that are \"predecisional\" (i.e., they predate an agency decision) and \"deliberative\" (i.e., they reflect \"the give-and-take of the consultative process\"). Factual material is generally not protected by the exemption. Notably, the FOIA Improvement Act of 2016 amended Exemption 5 to exclude application of the privilege to documents that were \"created 25 years or more before the date on which [they] were requested.\" P residential C ommunications P rivilege . The presidential communications privilege is also a component of executive privilege and has been recognized as applicable in the Exemption 5 context. The Supreme Court has held that the privilege protects from mandatory disclosure \"communications in performance of [a President's] responsibilities, of his office, and made in the process of shaping policies and making decisions.\" The D.C. Circuit has held that the privilege also protects \"communications authored or received in response to . . . solicitation[s] by\" senior White House advisers \"in the course of gathering information and preparing recommendations on official matters for presentation to the President,\" as well as records \"authored or solicited and receivedÂ by . . . members of an immediate White House adviser's staff who have broad and significant responsibility for investigating and formulating the advice to be given to the President on a particular matter.\" Unlike the deliberative process privilege, the presidential communications privilege \"applies to documents in their entirety, and covers final and post-decisional materials as well as pre-deliberative ones.\" A ttorney- C lient P rivilege . Exemption 5 also incorporates the attorney-client privilege. The attorney-client privilege generally protects \"communication[s] made between privileged persons in confidence for the purpose of obtaining or providing legal assistance for the client.\" Exemption 5 incorporates the privilege as it exists for government attorneys, where, as explained by the D.C. Circuit, \"the 'client' may be the agency and the attorney may be an agency lawyer.\" The privilege does not cover information \"adopted as, or incorporated by reference into, an agency's policy.\" A ttorney W ork - P roduct P rivilege . In the context of Exemption 5, the attorney work-product privilege embraces \"materials prepared in anticipation of litigation\" by an agency. The privilege serves to protect and maintain an effective adversarial litigation system. While records must have been prepared in anticipation of litigation to be protected by the exemption, in Federal Trade Commission v. Grolier , the Supreme Court held that materials may be withheld under Exemption 5 even if the litigation for which the materials were prepared has since ended. The Court's decision was based on its interpretation of Rule 26 of the Federal Rules of Civil Procedure, which is the source of the work-product doctrine for pretrial discovery in federal civil litigation. It was also based on the fact that, generally, federal judicial decisions regarding \"Rule 26[] had determined that work-product materials retained their immunity from discovery after termination of the litigation for which the documents were prepared, without regard to whether other related litigation is pending or is contemplated.\" The court explained that, because \"Exemption 5 incorporates the privileges which the Government enjoys under the relevant statutory and case law in the pretrial discovery context,\" materials protected by the work-product privilege were not \"'routinely' available in subsequent litigation.\" Other Privilege s . The Supreme Court and lower courts have determined that other privileges are embraced by Exemption 5. For example, in United States v. Weber Aircraft Corp. , the Supreme Court held that the privilege protecting \"[c]onfidential statements made to air crash safety inspectors,\" known as the Machin privilege, was incorporated by the exemption. The Court has also held that Exemption 5 applies to \"confidential commercial information, at least to the extent that this information is generated by the Government itself in the process leading up to awarding a contract.\" Exemption 6 exempts from disclosure \"personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy.\" Federal agencies maintain a large amount of information about individuals, such as health and medical records, criminal records, home addresses, social security numbers, and a variety of other types of personal information. Exemption 6 helps shield \"individuals from the injury and embarrassment\" that may stem from the disclosure of personal information maintained by the government. The exemption applies to citizens and noncitizens alike, but courts have not extended its protections to corporations. As an initial manner, an agency may only withhold information for impermissibly invading an individual's privacy if it is a personnel, medical, or \"similar\" file. FOIA does not contain a definition of these terms, but, as some courts have explained, personnel and medical files \"generally contain a variety of information about a person, such as place of birth, date of birth, date of marriage, employment history, and comparable data.\" And the Supreme Court has held that the term \"similar files\" broadly embraces any \"information which applies to a particular individual.\" Courts have identified a variety of information types that qualify as \"files\" under Exemption 6, including, for example, the names and addresses of federal annuitants; individuals' citizenship information; information associated with asylum requests; and \"information regarding marital status, legitimacy of children, identity of fathers of children, medical condition, welfare payments, alcoholic consumption, family fights, [and] reputation.\" Information is not exempt from disclosure under FOIA, however, merely because it qualifies as a personnel, medical, or similar file. Such files must still be disclosed upon request unless release \"would constitute a clearly unwarranted invasion of personal privacy.\" To determine whether disclosure would rise to such a level, agencies and courts balance the privacy interest associated with the requested information against \"the public interest in disclosure.\" Courts typically require that an agency assert a privacy interest that is \"substantial\" (or more than \" de minimis \") to justify withholding the information. And the Supreme Court has held that \"the only relevant public interest in disclosure . . . is the extent to which disclosure would serve the core purpose of FOIA, which is contributing significantly to public understanding of the operations or activities of the government.\" If the asserted privacy interest outweighs the public interest in disclosure, the information is exempt. FOIA's seventh exemption applies to \"records or information compiled for law enforcement purposes,\" but only where disclosure of such agency records \"would\" or \"could reasonably be expected to\" result in certain harms specified by the exemption (and discussed below). As the Supreme Court has explained, Exemption 7 stemmed from Congress's belief \"that law enforcement agencies had legitimate needs to keep certain records confidential, lest the agencies be hindered in their investigations or placed at a disadvantage when it came time to present their cases.\" To qualify as exempt under Exemption 7, a record must have been \"compiled\" for law enforcement purposes. This criterion may be satisfied even if the record was not originally compiled for law enforcement purposes, as the Supreme Court has held that this exemption also applies if material was subsequently gathered for law enforcement purposes, prior to the agency's response to the FOIA request. Further, the Court has held that material that was originally compiled \"for law enforcement purposes continues to meet the threshold requirements of Exemption 7 where [it] is reproduced or summarized in a new document prepared for a non-law-enforcement purpose.\" As explained by the D.C. Circuit, \"the term 'compiled' in Exemption 7 requires that a document be created, gathered, or used by an agency for law enforcement purposes at some time before the agency invokes the exemption.\" Courts have applied Exemption 7 to records compiled for criminal, civil, and administrative enforcement, as well as to materials associated with agencies' national and homeland security functions. Further, the exemption not only applies to agencies that primarily engage in law enforcement, but also to agencies that possess both administrative and law enforcement responsibilities (\"mixed-function agencies\"). Although, on judicial review, an agency must establish that materials withheld under Exemption 7 are compiled for purposes of law enforcement to properly invoke the exemption, agencies whose primary function is criminal law enforcement are often subject to comparatively relaxed standards of proof on this question than are mixed-function agencies. Exemption 7 only applies to certain statutorily specified types of law enforcement records. Therefore, establishing that material has been compiled for law enforcement purposes is insufficient to exempt it from disclosure under FOIA; even if a withheld record was compiled for such purposes, it may only be exempted from disclosure if disclosure may or will lead to one of the harms identified in subexemptions (A) through (F). Exemption 7(A) authorizes the withholding of law enforcement records where disclosure \"could reasonably be expected to interfere with enforcement proceedings.\" Courts have held that Exemption 7(A) applies in the context of a \"pending or prospective\" enforcement proceeding and where disclosure \"could reasonably be expected to cause some articulable harm\" to those proceedings, such as by obstructing an agency's investigation or placing an agency \"at a disadvantage when it came time to present [its] case[].\" However, courts have established limits to Exemption 7(A)'s application. For example, many courts have held that agencies must satisfy a high burden in proving that harm will occur from \"the release of information that the targets of the investigation already possess . \" Exemption 7(B) applies where disclosure \"would deprive a person of a right to a fair trial or an impartial adjudication.\" The D.C. Circuit has explained \"that a trial or adjudication [must be] pending or truly imminent\" in order to trigger Exemption 7(B), and \"that it [must be] more probable than not that disclosure . . . would seriously interfere with the fairness of those proceedings.\" And the D.C. Circuit has held that, as to disclosure's effect on the fairness of proceedings, courts must examine \"the significance of any alleged unfairness in light of its effect . . . on the proceedings as a whole,\" and not simply whether disclosure would bestow \"a slight advantage . . . on a party in a single phase of a case.\" Exemption 7(C) authorizes the withholding of records where disclosure \"could reasonably be expected to constitute an unwarranted invasion of personal privacy.\" Like Exemption 6, Exemption 7(C) was designed to protect personal privacy interests. However, as the Supreme Court has explained, the latter exemption provides more protection for materials under its coverage than does the former. Exemption 6 only applies to disclosures that \" would constitute a clearly unwarranted invasion of personal privacy.\" Exemption 7(C), however, is more encompassing: it does not include the word \"clearly,\" and it protects against disclosures that merely \"could reasonably be expected to\" effect an unwarranted intrusion into personal privacy. Despite these differences, however, both exemptions are guided by many of the same privacy principles discussed above in relation to Exemption 6. For example, courts determining the availability of Exemption 7(C) often engage in the same type of case-by-case balancing of the private interests at stake and the public interest in disclosure as they do in the Exemption 6 context. Exemption 7(D) applies to disclosures which \"could reasonably be expected to disclose the identity of a confidential source,\" as well as to \"information furnished by a confidential source\" where \"records or information [were] compiled by criminal law enforcement authority in the course of a criminal investigation or by an agency conducting a lawful national security intelligence investigation.\" A source is \"confidential\" if the government expressly pledges to keep information supplied by the source in confidence or if \"such an assurance could be reasonably inferred\" from the circumstances. According to the Supreme Court's decision in DOJ v. Landano , \"[a] source should be deemed confidential if the source furnished information with the understanding that the [agency] would not divulge the communication except to the extent [it] thought necessary for law enforcement purposes.\" While the Court in Landano rejected the government's argument that confidentiality is generally presumed simply because a source has worked with the FBI during a criminal investigation, it did hold that such a presumption may exist where \"circumstances such as the nature of the crime investigated and the witness' relation to it support an inference of confidentiality.\" Exemption 7(E) provides that records may be withheld where disclosure \"would disclose techniques and procedures for law enforcement investigations or prosecutions, or would disclose guidelines for law enforcement investigations or prosecutions if such disclosure could reasonably be expected to risk circumvention of the law.\" As can be seen from the text, this subexemption applies to two different types of investigation and prosecution materials: \"techniques and procedures\" and \"guidelines.\" Courts are split as to whether the exemption applies to the disclosure of both types of materials or only to the \"guidelines\" described in the subexemption's second clause. Exemption 7(F) authorizes withholding where disclosure \"could reasonably be expected to endanger the life or physical safety of any individual.\" Prior to 1986, this subexemption only protected against disclosures that could endanger law enforcement personnel. However, the 1986 amendments to FOIA expanded Exemption 7(F)'s coverage by substituting \"any individual\" for \"law enforcement personnel.\" Exemption 8 protects matters \"contained in or related to examination, operating, or condition reports prepared by, on behalf of, or for the use of an agency responsible for the regulation or supervision of financial institutions.\" The Senate report underlying the original law explains that, by limiting the availability of the covered financial reports to the agencies tasked with overseeing financial institutions, the exemption was intended to protect such institutions' security. Courts have also opined that Exemption 8 was intended \"to safeguard the relationship between the banks and their supervising agencies.\" Exemption 9 exempts from disclosure \"geological and geophysical information and data, including maps, concerning wells.\" Courts have not had many opportunities to interpret this exemption, as agencies do not often invoke it. In addition to its nine exemptions, FOIA also contains three records exclusions. FOIA's exclusions allow an agency, in response to a request for certain law enforcement records, to \"treat the records as not subject to the requirements of\" FOIA. As the Attorney General ' s Memorandum on the 1 9 86 Amendments to the Freedom of Information Act explains, when an agency receives a request for records that fall within the coverage of an exclusion, the agency is authorized to withhold the records and \"respond to the request as if the excluded records d[o] not exist.\" FOIA's exclusions, in other words, allow agencies to \"withhold documents without comment.\" Conversely, when an agency invokes a FOIA exemption in response to a request for records, it is required to \"reveal the fact of and grounds for any withholdings\" to the requester. FOIA's exclusions, therefore, are designed to allow agencies to better avoid disclosure of the narrow categories of records to which they apply. Each of FOIA's three exclusions is codified at 5 U.S.C. Â§ 552(c). Exclusion (c)(1). The first exclusion covers records protected by Exemption 7(A) (i.e., records whose disclosure \"could reasonably be expected to interfere with enforcement proceedings\"), but only if the relevant law enforcement proceeding or investigation concerns a \"possible\" criminal violation; and the agency has \"reason to believe\" both that the pendency of the proceeding or investigation is unknown to the subject of the proceeding or investigation, and revealing the records' existence \"could reasonably be expected to interfere with enforcement proceedings.\" The exclusion was intended to prevent an agency from \"tipping off\" an individual about the existence of an investigation of which he or she is a subject by stating, in response to a FOIA request, that requested records are exempt from disclosure under Exemption 7(A). While agencies can rely on this exclusion to prevent such an outcome, by its terms, Exclusion (c)(1) is only available to an agency while the conditions described in its text continue. Accordingly, once the investigation becomes public, this exclusion no longer applies. Exclusion (c)(2). The second exclusion applies to records that are \"maintained by a criminal law enforcement agency under an informant's name or personal identifier.\" When a third party requests such records \"according to the informant's name or personal identifier,\" Exclusion (c)(2)Â authorizes the agency to \"treat the records as not subject to the requirements of\" FOIA. The Attorney General's memorandum on the 1986 amendments to FOIA describes FOIA's second exclusion as contemplating \"the situation in which a sophisticated requester could try to ferret out an informant in his organization by forcing a law enforcement agency\" to invoke FOIA's exemption for records relating to a confidential source (Exemption 7(D)), an action that would likely corroborate the requester's suspicion that the individual subject to the request is a confidential informant. The memorandum cites as an example the situation in which a criminal organization that suspects one of its members is a criminal informant either requires that the suspected informant request law enforcement records about himself or herself, or else compels the individual to submit a privacy waiver to allow a member of the organization to make such a request. Exclusion (c)(2) authorizes law enforcement agencies to protect against the disclosure of the identities of their confidential informants in such situations. However, like Exclusion (c)(1), an agency's ability to use the second exclusion is subject to an important limitation: an agency may not use the second exclusion if \"the informant's status as an informant has been officially confirmed.\" Exclusion (c)(3). FOIA's third exclusion protects a subset of FBI records concerning \"foreign intelligence,\" \"counterintelligence,\" or \"international terrorism.\" The FBI may treat such records as excluded from FOIA if \"the existence of the records is classified information as provided in\" Exemption 1. Exclusion (c)(3) seeks to prevent the harm that may occur from an agency's publicly claiming the protection of Exemption 1 in response to a request and, therefore, admitting that such sensitive records do indeed exist. Like the other exclusions, however, the third exclusion's protective ambit is limitedâan agency may only use Exclusion (c)(3) for such time \"as the existence of [such] records remains classified information.\" FOIA not only established a statutory right of access to agency records, but also provided a means for requesters to enforce that right through judicial review of agency decisions to withhold records. Conversely, parties may initiate legal actions to prevent agencies from disclosing information requested under FOIA in certain situations. These aspects of FOIA and FOIA-related litigationâjudicial review of agencies' withholding decisions and so-called reverse-FOIA litigationâare discussed below. Under 5 U.S.C. Â§ 552(a)(4)(B), federal district courts have \"jurisdiction to enjoin [an] agency from withholding agency records and to order the production of any agency records improperly withheld from the complainant.\" The Supreme Court, accordingly, has explained that a court has jurisdiction under Â§ 552(a)(4)(B) if it can be shown \"that an agency has (1) improperly; (2)Â withheld; (3) agency records.\" In DOJ v. Tax Analysts , the Court held that, because FOIA's exemptions are \"exclusive,\" agency records are \"improperly\" withheld when an agency refuses to disclose requested records that are not protected by an applicable exemption. Yet the Court has also held that an agency's decision to withhold a record is not \"improper\" if a court order prohibits the agency from disclosing the record. Further, in Kissinger v. Reporters Committee for Freedom of the Press , the Court held that records are not \"withheld\" under Â§Â 552(a)(4)(B) if, before a request was filed, the records were \"removedÂ from the possession of the agency.\" The Court did not answer whether an agency \"withholds\" a record when it \"purposefully route[s] a document out of agency possession in order to circumvent a FOIA request.\" However, as one court has explained, \"an agency's FOIA obligations might extend to documents that are not in the agency's immediate custody or control . . . when there is evidence to suggest that the requested records are outside of the agency's control precisely because the agency has attempted to shield its records from search or disclosure under the FOIA.\" An improper withholding is not limited to those situations in which an agency explicitly rejects a FOIA request or fails to respond to a request. For example, an inadequate search for responsive records is also an improper withholding. (The requirement that an agency conduct an adequate search is discussed above. ) FOIA instructs courts to review appeals from agency withholding decisions \"de novo.\" Under this standard of review, a court accords no deference to the agency's decision below. That said, courts will sometimes defer to an agency's judgment in some aspects of FOIA litigation. For example, courts in FOIA disputes generally accord \"some measure of deference to the executive in cases implicating national security.\" The scope and standard of review in FOIA cases may differ in other instances, as well. For instance, while judicial review of an agency's decision regarding fee waivers is de novo, FOIA states that review \"shall be limited to the record before the agency.\" The agency has the burden of proving that it properly withheld information under a FOIA exemption. Agencies defending withholding decisions in federal court often supply what is known as a \" Vaughn Index\" to aid in justifying their decisions. In FOIA lawsuits, the plaintiff generally does not know with any specificity the contents of the requested records, which the D.C. Circuit has declared can \"seriously distort[] the traditional adversary nature of our legal system's form of dispute resolution.\" A Vaughn Index, which is akin to a privilege log, is a response to this informational asymmetry. The D.C. Circuit has held that a proper Vaughn Index \"provide[s] a relatively detailed justification [for withholdings], specifically identifying the reasons why a particular exemption is relevant and correlating those claims with the particular part of a withheld document to which they apply.\" Agencies can also justify nondisclosure decisions through the submission of affidavits of agency officials that, per the D.C. Circuit, \"describe the justifications for nondisclosure with reasonably specific detail, demonstrate that the information withheld logically falls within the claimed exemption, and are not controverted by either contrary evidence in the record nor by evidence of agency bad faith.\" FOIA also authorizes courts to review records in camera (i.e., privately and outside of the plaintiffs' view) to determine whether the records have been appropriately withheld. Courts often conduct in camera inspection of withheld information when an agency has not \"provide[d] a sufficiently detailed explanation to enable the . . . court to make a de novo determination of the agency's claims of exemption.\" Courts retain discretion whether to conduct in camera review, but generally only do so in \"exceptional\" cases. In certain situations, courts may authorize agencies to submit in camera agency affidavits; however, as opposed to in camera inspection of withheld records, \"use of in camera affidavits has generally been disfavored.\" While requesters may seek judicial review of an agency's decision to withhold information under FOIA, in some circumstances parties may pursue judicial action to prevent an agency's disclosure of information in response to a FOIA request. These actions are often called reverse-FOIA lawsuits. An entity ordinarily institutes a reverse-FOIA action to prevent an agency from disclosing sensitive information, often concerning commercial or financial matters, that the entity had previously submitted to the agency. In Chrysler Corporation v. Brown , the Supreme Court held that neither the FOIA statute nor the TSA authorizes a private right of action to enjoin an agency from disclosing information in violation of the TSA. However, the Court held that judicial review of such actions is available under the APA. In reverse-FOIA suits, courts generally review an agency's decision to disclose information under Â§ 706(2)(A) of the APA, which provides that courts are to \"hold unlawful and set aside agency action, findings, and conclusions\" that are \"arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.\" The burden of proof in a reverse-FOIA action is on the plaintiff. Under Executive Order 12600, an agency is required, in certain circumstances, to provide notice to those who submitted \"records containing confidential commercial information\" if the agency has concluded that the records may need to be disclosed in response to a FOIA request. Agency procedures generally must allow applicable submitters to object to disclosure and provide that the agency, in the event it disagrees with the submitter's objection, supply the submitter with the reasons for its disagreement. The executive order defines \"confidential commercial information\" as information submitted to an agency \"that arguably contain[s] material exempt from release under Exemption 4 . . . because disclosure could reasonably be expected to cause substantial competitive harm.\" Notably, the Supreme Court abrogated the \"substantial competitive harm\" test for Exemption 4 in FMI v. Argus Leader Media . In response, DOJ has advised agencies to use the broader definition of \"confidential\" declared in FMI in their predisclosure notification procedures. While Congress is not subject to FOIA, the act raises questions of particular relevance to the legislative branch. For example, per the act, an agency may not \"withhold information from Congress\" on the basis that such information is exempt under FOIA. There are different views, however, about what \"Congress\" means in this instanceâin particular, whether this withholding prohibition applies to requests from individual Members of Congress, or whether the provision is limited to access requests from each house of Congress or congressional committees. In addition, although Congress is under no obligation to disclose its own materials under FOIA, whether a congressional document possessed by an agency is subject to FOIA depends on whether or not Congress clearly expressed its determination to retain control over the document. Although this section only discusses the two topics just mentioned, FOIA implicates congressional interests in many other ways. For example, Congress has often expressed its interest in the frequency with which agencies use exemptions to withhold information from requesters, as well as the general backlog of FOIA requests. Further, FOIA evidences Congress's general interest in executive branch transparency, and Congress has amended FOIA several times since its 1965 enactment, often due or in response to judicial interpretations of the act or agencies' administration thereof. FOIA's \"special access\" provisionâcodified at 5 U.S.C. Â§ 552(d)âstates that FOIA \"is not authority to withhold information from Congress.\" The Senate report underlying the original act explained that this provision is intended to clarify \"that, because [FOIA] only refers to the public's right to know, it cannot . . . be backhandedly construed as authorizing the withholding of information from the Congress, the collective representative of the public.\" While this provision undoubtedly prohibits agencies from withholding information from Congress based on a FOIA exemption, there is some dispute over whether subsection (d) affords individual Members of Congress access to otherwise exempt records under FOIA, or, on the other hand, whether the provision is limited to access requests from the broader arms of Congress (i.e., either house of Congress and congressional committees). The Department of Justice has long maintained that the special access provision does not generally apply to records requests from individual Members of Congress, meaning that agencies generally can invoke relevant exemptions to withhold materials in response to individual Member requests. DOJ distinguishes between requests for information from (1) \"a House of Congress as a whole (including through its committee structure)\" and (2) individual Members. In DOJ's view, requests from the former benefit from subsection (d)'s withholding prohibition; however, requests from the latter generally do not, no matterâas DOJ has explainedâif the individual Member is \"clearly acting in a completely official capacity\" in making the request. Under DOJ's interpretation, a request by an individual Member in his or her official capacity is only covered by the special access provision if the request is from the chair of a committee or subcommittee or authorized by a committee or subcommittee. That said, individual Members of Congress can submit FOIA requests to the same extent as other persons. But DOJ's interpretation of the special access provision has been criticized by some as too narrow. This criticism finds support in language from the D.C. Circuit's decision in Murphy v. Department of the Army , which interpreted the special access provision as applying to individual Members acting in their official capacities . The court held that the Army had not waived Exemption 5 protection for an internal agency memorandum by sharing it with an individual Member of Congress. The court based its holding on an interpretation of the special access provision, concluding that agencies will not waive the exemption in such circumstances \"to the extent that Congress has reserved to itself in section 552([d]) the right to receive information not available to the general public.\" In responding to the requester's argument that the special access provision was limited to Congress as a whole (and not its component partsâincluding individual Members), the court wrote All Members have a constitutionally recognized status entitling them to share in general congressional powers and responsibilities, many of them requiring access to executive information. It would be an inappropriate intrusion into the legislative sphere for the courts to decide without congressional direction that, for example, only the chairman of a committee shall be regarded as the official voice of the Congress for purposes of receiving such information, as distinguished from its ranking minority member, other committee members, or other members of the Congress. Each of them participates in the law-making process; each has a voice and a vote in that process; and each is entitled to request such information from the executive agencies as will enable him to carry out the responsibilities of a legislator. Instead, the court opined that the special access rule applies when a Member's request is made in his or her officialâas opposed to \"purely private or personal\"âcapacity. Members of Congress from both major political parties have cited Murphy in support of individual Members' right to access information from the executive branch. DOJ's more narrow interpretation, discussed above, was a reaction to Murphy 's reading of FOIA's application to Members, which it views as being inconsistent with the act's text and legislative history. DOJ has argued, for example, that interpreting \"Congress\" to include individual Members conflicts with Article I, Â§ 1 of the Constitution, which provides that Congress \"consist[s] of a Senate and a House of Representatives,\" but does not mention the individuals who serve in those chambers. DOJ also asserts its position finds support in the 1966 House report for FOIA. In discussing the special access provision, the report states that \"Members of Congress have all of the rights of access guaranteed to ' any person ' by [FOIA], and the Congress has additional rights of access to all Government information which it deems necessary to carry out its functions.\" DOJ has also maintained that the D.C. Circuit's discussion of FOIA's application to individual Members \"was not indispensable to the [ Murphy ] decision\" and therefore does not constitute a binding rule. But while the D.C. Circuit has not had opportunity to revisit Murphy on the question of FOIA's application to agency communications with individual Members, later appellate panel and lower court decisions within the circuit have appeared to treat Murphy 's interpretation as controlling. As discussed above, FOIA requires federal agencies to disclose \"agency records\" after receiving a valid request. But Congress is not an \"agency\" under FOIA. Congress, accordingly, is not obligated to respond to FOIA requests for documents in its possession. But Congress's exemption from FOIA extends beyond requests directed specifically at it. Crucially, the D.C. Circuit has held that a document that an agency obtains from Congress or creates in response to a congressional request qualifies as a congressional record exempt from FOIA if \"Congress manifested a clear intent to control the document.\" Congress is not required to provide \"contemporaneous instructions when forwarding\" documents to agencies to manifest its intent to control a document. In American Civil Liberties Union v. Central Intelligence Agency (CIA) , the D.C. Circuit determined that a confidential report authored by the Senate Select Committee on Intelligence was a congressional record and, therefore, not subject to FOIA. The case concerned the committee's evaluation of a CIA program on detention and interrogation. In 2014, the committee completed a final report based on its review. Although the committee did not publicly release the final report, it distributed copies to the President and other executive branch officials. In 2009, before beginning its review, the committee's chair and vice chair sent a letter to the CIA memorializing an agreement concerning the committee's examination of CIA documents at a secure electronic CIA reading room. The letter provided the following conditions: Any documents generated on the network drive referenced in paragraph 5, as well as any other notes, documents, draft and final recommendations, reports or other materials generated by Committee staff or Members, are the property of the Committee and will be kept at the Reading Room solely for secure safekeeping and ease of reference. These documents remain congressional records in their entirety and disposition and control over these records, even after the completion of the Committee's review, lies exclusively with the Committee. As such, these records are not CIA records under [FOIA] or any other law . . . . If the CIA receives any request or demand for access to these records from outside the CIA under [FOIA] or any other authority, the CIA will immediately notify the Committee and will respond to the request or demand based upon the understanding that these are congressional, not CIA, records. The D.C. Circuit reasoned that these conditions made \"it plain that the Senate Committee intended to control any and all of its work product, including the [resulting 2014 final report], emanating from its oversight investigation of the CIA.\" The committee's subsequent transmission of the report to executive branch officials, with the instruction to the CIA and other agencies to use the report \"as broadly as appropriate\" both to ensure that the practices the report criticized were never repeated and to help in the development of CIA programs and executive branch guidelines, did not erase \"the Senate Committee's clear intent to maintain control of the\" final report. Whether Congress's manifestation of intent to control extends to a particular record depends on the language used in Congress's directive to the agency. In United We Stand America v. Internal Revenue Service (IRS) , the D.C. Circuit held that a letter sent from the chief of staff of the Joint Committee on Taxation to the IRS requesting information in connection with a committee investigation did not fully protect the IRS's response. The request stated This document is a Congressional record and is entrusted to the [IRS] for your use only. This document may not be disclosed without the prior approval of the Joint Committee. The IRS transmitted documents in response to the committee's request (of which the agency retained a copy). In litigation arising from a FOIA request for the committee's request and the agency's response thereto, the court held that, although the language from the committee's request quoted aboveâwhich referred to \"[t]his document\"âconveyed a sufficient manifestation of intent to control the committee's request, that manifestation of intent did not extend to the IRS's response, save for \"those portions of the IRS response that would effectively disclose th[e] [committee's] request.\" As the court explained, \"[if] the Joint Committee intended to keep confidential not just 'this document' but also the IRS response, it could have done so by referring to 'this document and all IRS documents created in response to it.'\" Accordingly, the court of appeals remanded the case to the district court to conclude whether information in the response that would reveal the committee's request could be redacted and to direct the agency to \"release any segregable portions that are not otherwise protected by one of FOIA's nine exemptions.\" The D.C. Circuit has articulated other principles helpful for determining whether Congress has manifested sufficient intent to control a particular record. For example, courts have found that \"post-hoc objections\" to disclosure raised by Congress \"long after the . . . record[s'] creation\" and \"in response to the FOIA litigation\" do not convey sufficient manifestations of intent to control. Nor are proper manifestations of intent contained in expressions that are \"too general and sweeping.\" In Paisley v. CIA , for example, the court acknowledged that letters sent by the Senate Select Committee on Intelligence to the CIA \"indicate[d] the Committee's desire to prevent release without its approval of any documents generated by the Committee or by an intelligence agency in response to a Committee inquiry.\" However, the court held that the letters did not alone manifest sufficient congressional intent to control the documents at issue because \"there [was] no discussion of any particular documents or of any particular criteria by which to evaluate and limit the breadth of [the Committee's] interdiction.\" Whether Congress has sufficiently manifested intent to control a document ultimately depends on the circumstances underlying each case. For example, in United We Stand (discussed above), the D.C. Circuit specifically underscored that the manifestation of intent to control at issue in that case was contained \"in a letter written by the Joint Committee's chief of staff as part of an investigation authorized by the chairman, vice-chairman, and ranking members of the Joint Committee,\" as well as that an IRS document that the committee relied on \"expressly recognize[d] the confidentiality of Joint Committee requests.\" On the other hand, in American Oversight, Inc. v. Department of Health & Human Services , the U.S. District Court for the District of Columbia did not explicitly emphasize the level of formality of the congressional manifestation of assent in reaching its decision that the materials at issue were not agency records subject to disclosure under FOIA. Instead, the court relied on its reading of language contained in email messages between staff of the House Committee on Ways and Means and executive branch personnel addressing \"health care reform\" to find that Congress had manifested its intent to retain control over the messages. FOIA is the primary statutory mechanism by which the public may gain access to federal government records and information. But other lawsâspecifically FACA, the Sunshine Act, and the Privacy Actâalso set forth rights and limitations on the public's access to government information or activities. FACA governs the establishment and operation of certain advisory committees created to supply advice and recommendations to federal agencies or the President. Among other things, the statute generally mandates the public availability of an advisory committee's \"records, reports, transcripts, minutes, appendixes, working papers, drafts, studies, agenda, or other documents,\" and members of the public are authorized under FACA to attend and participate in advisory committee meetings. The availability of an advisory committee's papers is subject to FOIA's exemptions. Another general open government statute, the Sunshine Act, imposes transparency obligations on the meetings of certain multimember boards and commissions. The statute requires that covered agencies allow the public to attend their meetings and have access to relevant information. Meetings and information required to be disclosed under the act are subject to ten exemptions that resemble FOIA's. Lastly, the Privacy Act governs the \"collection, maintenance, use and dissemination\" of agency records that contain individually identifiable information about U.S. citizens and lawful permanent residents. The act forbids the disclosure of covered records without the written consent or request of the individual identified by the record, subject to twelve exceptions. One Privacy Act exception covers records for which disclosure is \"required\" by FOIA. Under this exception, an agency record subject to the Privacy Act that is not protected by any of FOIA's exemptionsâand which therefore must be disclosed under FOIA upon requestâis not prohibited from being disclosed by the Privacy Act. The Privacy Act also permits individuals to request access to records that pertain to them and to seek the amendment of such records, subject to exemptions. ", "summary": "Originally enacted in 1966, the Freedom of Information Act (FOIA) establishes a three-part system that requires federal agencies to disclose a large swath of government information to the public. First, FOIA directs agencies to publish substantive and procedural rules, along with certain other important government materials, in the Federal Register. Second, on a proactive basis, agencies must electronically disclose a separate set of information that consists of, among other things, final adjudicative opinions and certain \"frequently requested\" records. And lastly, FOIA requires agencies to disclose all covered records not made available pursuant to the aforementioned affirmative disclosure provisions to individuals, corporations, and others upon request. While FOIA's main purpose is to inform the public of the operations of the federal government, the act's drafters also sought to protect certain private and governmental interests from the law's disclosure obligations. FOIA, therefore, contains nine enumerated exemptions from disclosure that permitâbut they do not requireâagencies to withhold a range of information, including certain classified national security matters, confidential financial information, law enforcement records, and a variety of materials and types of information exempted by other statutes. And FOIA contains three \"exclusions\" that authorize agencies to treat certain law enforcement records as if they do not fall within FOIA's coverage. FOIA also authorizes requesters to seek judicial review of an agency's decision to withhold records. Federal district courts may \"enjoin [an] agency from withholding agency records\" and \"order the production of any agency records improperly withheld.\" Judicial decisionsâincluding Supreme Court decisionsâhave often informed or provided the impetus for congressional amendments to FOIA. Although Congress is not subject to FOIA, the act may inform communications between the legislative branch and FOIA-covered entities. Under 5 U.S.C. Â§ 552(d), an agency may not \"withhold information from Congress\" on the basis that such information is covered by a FOIA exemption (although the provision does not dictate whether another source of law, such as executive privilege, may shield information from disclosure). The executive branch has interpreted this provision to apply to each house of Congress and congressional committees, but generally not to individual Members, whose requests for information are generally treated as subject to the same FOIA rules as requests from the public. This interpretation is not uniformly shared, with at least one federal appellate court interpreting Â§ 552(d) as applying to individual Members acting in their official capacities. In addition, although Congress is under no obligation to disclose its materials pursuant to FOIA, whether a congressional document possessed by an agency is subject to FOIA depends on whether Congress clearly expressed its intention to retain control over the specific document. Lastly, although FOIA is the primary statutory mechanism by which the public may gain access to federal government records and information, other lawsâspecifically the Federal Advisory Committee Act, Government in the Sunshine Act, and Privacy Actâalso set forth rights and limitations on the public's access to government information or activities.", "document_type": "crs"}
{"report": "I n October 2018, the Office of the U.S. Trade Representative (USTR) officially notified the Congress, under Trade Promotion Authority (TPA), of the Trump Administration's plans to enter into formal trade negotiations with the European Union (EU). This action followed a July 2018 U.S.-EU Joint Statement by President Trump and then-European Commission (EC) President Juncker announcing that they would work toward a trade agreement to reduce tariffs and other trade barriers, address unfair trading practices, and increase U.S. exports of soybeans and certain other products. Previously, in 2016, U.S.-EU negotiations as part of the Transatlantic Trade and Investment Partnership (T-TIP) stalled after 15 rounds under the Obama Administration. The outlook for new U.S.-EU talks remains uncertain. There continues to be disagreement about the scope of the negotiations, particularly the EU's intent to exclude agriculture from the talks on the basis that it \"is a sensitivity for the EU side.\" EU sensitivities stem in part from commercial and cultural practices that are often embodied in EU laws and regulations and vary from those of the United States. For food and agricultural products, such differences include regulatory and administrative differences between the United States and the EU on issues related to food safety and public healthâor Sanitary and Phytosanitary (SPS) measures, and Technical Barriers to Trade (TBTs). Other differences include product naming schemes for some types of food and agricultural products subject to protections involving Geographical Indications (GIs). Addressing food and agricultural issues in the negotiations remains important to U.S. exporters given the sizable and growing U.S. trade deficit with the EU in agricultural products. Renewed trade talks also come amid heightened U.S.-EU trade frictions. In March 2018, President Trump announced 25% steel and 10% aluminum tariffs on most U.S. trading partners, including the EU, after a Section 232 investigation determined that these imports threaten U.S. national security. In response, the EU began applying retaliatory tariffs of 25% on certain U.S. exports to the EU. Additionally, as part of the Boeing-Airbus subsidy dispute, in October 2019 the United States began imposing additional, World Trade Organization (WTO)-sanctioned tariffs on $7.5 billion worth of certain U.S. imports from the EU. This report provides an overview of U.S.-EU trade in agriculture and background information on selected U.S.-EU agricultural trade issues concerning a potential trade liberalization agreement between the United States and the EU. Following a review of U.S.-EU agricultural trade trends, this report describes recent agricultural trade trends and tariff actions affecting certain U.S.-EU traded food and agricultural goods. It then describes potential issues in U.S.-EU trade agreement negotiations involving food and agricultural trade. Figure 1 shows a timeline of selected events. Figure 1. Selected Timeline of Events Related to U.S.-EU Agricultural TradeSource: CRS. Actions related to the U.S.-EU Trade Agreement negotiations are shown in red.Note: USTR = U.S. Trade Representative (USTR). WTO = World Trade Organization. EU27 includes the current 27 EU member states, excluding the United Kingdom (UK). EU28 includes the UK. Following are trade data and statistics for the current 27 EU member states (EU27). Unless otherwise noted, these figures exclude the United Kingdom (UK), which formally exited the EU in January 2020. Moving forward, U.S. trade negotiations with the EU are expected to exclude the UK, which may enter into trade discussions with the United States separately. Trade data presented here are compiled from U.S. Department of Agriculture (USDA) trade statistics for \"Agricultural and Related Products.\" As defined by USDA, this product grouping includes agricultural products (including bulk and intermediate products and also consumer-oriented products) and agricultural-related products (including fish and shellfish products, distilled spirits, forest products, and ethanol and biodiesel blends). Additional information on the various data sources is discussed in the t ext box . The United States and the EU are the world's largest trade and investment partners. While food and agricultural trade between the United States and the EU27 accounts for less than 1% of the value of overall trade in total goods and services ( Figure 2 ), the EU27 remains a leading market for U.S. agricultural exports. It accounted for about 8% of the value of all U.S. exports and ranked as the fifth-largest market for U.S. food and farm exports in 2019âafter Canada, Mexico, China, and Japan. Data depicted in Figure 2 do not reflect trade in fish and seafood, distilled spirits, and bioenergy products. During the past two decades, growth in U.S. agricultural exports to the EU has not kept pace with growth in trade to other U.S. markets. U.S. agricultural imports from the EU27 currently exceed U.S. exports to the EU27. In 2019, U.S. exports of agricultural and related products to the EU27 totaled $12.4 billion, while U.S. imports of agricultural and related products from the EU27 totaled $29.7 billion, resulting in a U.S. trade deficit of approximately $17.3 billion. This reverses the U.S. agricultural trade surpluses with the EU27 during the early 1990s ( Figure 3 ). Leading U.S. agricultural exports to the EU27 were corn and soybeans, tree nuts, distilled spirits, fish products, wine and beer, planting seeds, and processed foods. Leading U.S. imports from the EU27 were wine and spirits, beer, drinking waters, olive oil, cheese, and processed foods. While data shown in the graphic reflect total trade in \"Agricultural and Related Products,\" including agricultural products, fish and shellfish products, distilled spirits, and other agricultural related products, the trade picture may vary by product category (as shown in Table 1 ). Trade data presented here do not include the UK, which is a major importer of U.S. agricultural products. In 2019, U.S. agricultural and related product exports to the UK totaled $2.8 billion, which roughly equaled the value of imports from the UK ( Figure 4 ). The U.S.-EU trade negotiations come amid heightened U.S.-EU trade frictions. In March 2018, President Trump announced 25% steel and 10% aluminum tariffs on most U.S. trading partners after a Section 232 investigation determined that these imports threaten to impair U.S. national security. The EU was not among the trading partners with whom the Trump Administration negotiated permanent exemptions from tariffs or alternative quota arrangements, and U.S. tariffs on U.S. imports from the EU went into effect in June 2018. The EU views the U.S. national security justification as groundless and the U.S. tariffs to be inconsistent with WTO rules. The EU has challenged the U.S. actions at the WTO. Effective June 2018, the EU began applying retaliatory tariffs of 25% on imports of U.S. whiskies, corn, rice, kidney beans, preserved and mixed vegetables, orange juice, cranberry juice, peanut butter, and tobacco products, along with selected non-agricultural products ( Figure 5 ). This action includes the EU27 countries and the UK (EU28), as U.S. exports to the UK remain subject to the additional tariffs. The value of U.S. agricultural exports to the EU28 targeted by these additional tariffs is estimated to have been approximately $1.2 billion in 2018, or nearly 9% of total U.S. agricultural exports to the EU28 (excluding nonagricultural products) ( Table 2 ). Some analysts estimate that U.S. agricultural exports subject to tariff retaliation in 2018-2019 experienced a 33% decline in the EU28 market. In October 2019, U.S.-EU trade tensions escalated further when the United States imposed additional tariffs on $7.5 billion worth of certain U.S. imports from the EU, or about 1.5% of all U.S. imports from the EU28 in 2018 (including the UK and nonagricultural products). This action, authorized by WTO dispute settlement procedures, followed a USTR investigation initiated in April 2019 under Section 301 of the Trade Act of 1974. The USTR determined that the EU had denied U.S. rights under WTO agreements. Specifically, USTR concluded that the EU and certain member states (including the UK) had not complied with a WTO Dispute Settlement Body ruling recommending the withdrawal of WTO-inconsistent EU subsidies to Airbus for the manufacture of large civil aircraft. The list of products subject to additional tariffs stemming from the Airbus subsidy dispute targets mainly the EU member states responsible for the illegal subsidies. It includes agricultural products such as spirits and wine, cheese and dairy products, meat products, fish and seafood, fresh and prepared fruit products, coffee, and bakery goods. Agricultural imports account for about 56% of the total value of EU28 products subject to these additional tariffs. As of February 2020, tariff increases are limited to 25% on agricultural products, and they target primarily France, Germany, UK, and Spain ( Figure 6 ). By agricultural product category, whiskies, liqueurs, and wine (mainly from UK and France) account for approximately 38%, and other food and agricultural products (mainly from Spain and France) account for 19% ( Table 3 ). In December 2019, USTR began a review to determine if the list of imports subject to additional tariffs should be revised or tariff rates increased. In February 2020, USTR made some changes to the list of products affected by Section 301 tariffs. In terms of U.S. agricultural imports from the EU, the only change will be the removal of prune juice from the list, which will not be subject to additional 25% tariffs effective March 5, 2020. U.S.-EU trade negotiations could be affected further if the EU retaliates and imposes tariffs on U.S. exports, in response to either these U.S. actions or an upcoming WTO decision in the parallel EU dispute case against the United States. Later this year a WTO arbitrator is expected to authorize the EU to seek remedies in the form of tariffs on U.S. exports to the EU, after the WTO determined in early 2019 that the United States had also failed to abide by WTO subsidies rules in supporting Boeing. In January 2019, USTR announced its negotiating objectives for a U.S.-EU trade agreement, following a public comment period and a hearing involving several leading U.S. agricultural trade associations. These objectives include agricultural policiesâboth market access and non-tariff measures such as tariff rate quotas (TRQ) administration and other regulatory issues. Among regulatory issues, key U.S. objectives include harmonizing regulatory processes and standards to facilitate trade, including SPS standards, and establishing specific commitments for trade in products developed through agricultural biotechnologies. The U.S. objectives also include addressing GIs by protecting generic terms for common use. U.S. agricultural interests generally support including agriculture in a U.S.-EU trade agreement. The stated overarching goal for the U.S. side is addressing the U.S. trade deficit in agricultural products with the European Union. Early on, the EU indicated that it was planning for a more limited negotiation that does not include agricultural products and policies. The EU negotiating mandate, dated April 2019, states that a key EU goal is \"a trade agreement limited to the elimination of tariffs for industrial goods only, excluding agricultural products.\" Several Members of Congress opposed the EU's decision to exclude agricultural policies in its negotiating mandate. A letter to USTR from a bipartisan group of 114 House members states that \"an agreement with the EU that does not address trade in agriculture would be, in our eyes, unacceptable.\" Senate Finance Committee Chairman Chuck Grassley reiterated, \"Bipartisan members of the Senate and House â¦ have voiced their objections to a deal without agriculture, making it unlikely that such a deal would pass Congress.\" Then, in January 2020, public statements by U.S. and EU officials signaled the possibility that the U.S.-EU trade talks might include negotiation on SPS and regulatory barriers to agricultural trade. It is not clear, however, that both sides agree on which specific types of non-tariff trade barriers might actually be part of the U.S.-EU trade talks. As reported in the press, statements by some USDA officials have suggested that selected SPS barriers as well as GIs would need to be addressed by the trade talks. Meanwhile, other press reports indicate that some EU officials have downplayed the extent that certain non-tariff barriersâsuch as biotechnology product permits, approval of certain pathogen rinses for poultry, regulations on pesticides, or food standardsâwould be part of the talks; instead, regulatory barriers might be lowered for certain \"non-controversial\" foods. The United States continues to push for additional concessions from the EU. More formal discussions are expected in the spring of 2020âin an effort to ease trade tensions regarding the imposition of retaliatory tariffs. The EU has taken certain measures to avoid escalating agricultural trade tensions with the United States. For example, it has expanded the U.S.-specific quota for EU imports of hormone-free beef, increased imports of U.S. soybeans as a source of biofuels, approved a number of long-pending genetically engineered products for food and feed uses, and proposed to lift a ban on certain pest-resistant American grapes in EU wine production, and other trade-related measures. In a separate but indirectly related action, in August 2019, USTR asked the U.S. International Trade Commission (USITC) to conduct an investigation examining SPS barriers related to pesticide maximum residue levels (MRLs) across all U.S. markets, including Europe. Previously, during T-TIP negotiations, both market access and non-tariff barriers were part of the U.S. negotiating objectives. At that time, non-tariff barriers to agricultural tradeâincluding SPS and TBT measures, and GIsâwere among the agricultural issues actively debated. In addition, regulatory coherence and cooperation was part of USTR's stated objectives. Some of the same issues that proved to be challenging during the T-TIP talks may continue to challenge negotiators. Various studies at the time reported that removing tariff and non-tariff barriers in U.S.-EU trade would result in economic benefits to the U.S. and EU agricultural sectors. Another study by the European Parliament acknowledged that gains from tariff cuts would be limited unless regulatory and administrative barriers were also addressed. Market access issues are not slated to be discussed in the U.S.-EU trade talks. However, these issues remain important for U.S. agricultural exporters. This is especially true regarding the EU's use of restrictive tariff rate quotas (TRQs) on certain agricultural products. TRQs allow imports of fixed quantities of a product at a lower tariff. Once the quota is filled, a higher tariff is applied on additional imports. The EU allocates TRQs to importers using licenses issued by the member states' national authorities. Only companies established in the EU may apply for import licenses. For exports under a U.S.-specific TRQ, a certificate of origin must be supplied. The EU applies TRQs on many types of beef and poultry products, sheep and goat meat, dairy products, cereals, rice, sugar, and fruit and vegetables. Some products are heavily protected by both TRQs and non-tariff SPS measures. Import tariffs for agricultural products into Europe tends to be relatively high compared to tariffs for similar products into the United Sates. The WTO reports that the simple average most-favored-nation (MFN) tariff applied to agricultural products entering the United States is about 5%, compared to an average tariff of about 13% for products entering the EU. Including all products imported under an applied tariff or a TRQ, USDA reports that the calculated average rate across all U.S. agricultural imports is roughly 12%, well below the EU's average of 30%. By commodity group, EU tariffs average more than 40% for imported meat products, grains, and grain products and average at or above 20% for most fruit and vegetable products. For some products, EU tariffs are even greater, averaging more than 80% for imported dairy products, more that 50% for sugar cane and sweeteners, and nearly 350% for sugar beets. The EU has concluded preferential trade agreements with more than 35 non-EU countries and continues to negotiate agreements with several others. This preferential access provides U.S. export competitors an advantage over U.S. agricultural exporters, particularly in countries where the United States does not have a preferential agreement in place. Previously, during the T-TIP negotiations, Senate leadership sent a letter to USTR reiterating that a final agreement would need to include \"a strong framework for agriculture,\" including \"tariff elimination on all productsâincluding beef, pork, poultry, rice, and fruits and vegetables\" and that \"liberalization in all sectors of agriculture\" was a priority, if the agreement were to obtain the support of Congress. The letter also addressed the importance of \"longstanding regulatory barriers,\" including the EU's import approval process of U.S. biotechnology products and GI protections promoted by the EU. High tariff barriers are further exacerbated by additional non-tariff barriers that may limit U.S. agricultural exports, including SPS measures, and other types of non-tariff barriers. Non -t ariff m easures (NTMs) generally refer to policy measures other than tariffs that may have a negative economic effect on international trade. NTMs include both technical and nontechnical measures. Technical measures include both SPS and TBTs and pre-shipment formalities and related requirements that are intended to govern public health and food safety. Nontechnical measures include quotas, price control measures, rules of origin requirements, and government procurement restrictions. Non-tariff barriers affect agricultural trade in various ways, including delays in reviews of biotech products (creating barriers to U.S. exports of grain and oilseed products), prohibitions on growth hormones in beef production and certain antimicrobial and pathogen reduction treatments (creating barriers to U.S. meat and poultry exports), and burdensome and complex certification requirements (creating barriers to U.S. processed foods, animal products, and dairy products). Extensive EU regulations and difficulty finding up-to-date information are among the primary concerns of U.S. businesses, particularly for makers of processed foods. U.S. businesses report a lack of a science-based focus in establishing SPS measures, difficulty meeting food safety standards and obtaining product certification, differences across countries in food labeling requirements, and stringent testing requirements that are often applied inconsistently across EU member nations. Non-tariff barriers to agricultural tradeâincluding SPS and TBT measures, and GIsâwere among the agricultural issues actively debated in the T-TIP negotiation. Previous negotiations were complicated by longstanding trade disputes between the United States and EU involving food safety and product standards that are often embodied in laws and regulations in the United States and EU, as well as separate requirements that may be in force within individual EU member states. For example, the EU restricts some types of genetically engineered (GE) seed varieties and also prohibits the use of hormones in meat production and certain pathogen reduction treatments in poultry production. As these types of practices are commonplace in the United States, this tends to restrict U.S. agricultural exports to the EU. Other EU regulations and standards involve pesticide residues on foods, drug residues in animal production, and certain animal welfare requirements that may vary from those in the United States. The United States has also opposed the EU's GI protections that govern product labeling on products within the EU and within some countries that have a formal trade agreement with the EU. Such GI protections also tend to restrict U.S. agricultural exports to the EU and to some other countries where such protections have been put in place. As part of a trade negotiation, non-tariff barriers tend to be broadly grouped along with other issues related to regulatory coherence. The U.S. Chamber of Commerce defines regulatory coherence as \"good regulatory practices, transparency, and stakeholder engagement in a domestic regulatory process\" and regulatory cooperation as \"the process of interaction between U.S. and EU regulators, founded on the benefits regulators can achieve through closer partnership and greater regulatory interoperability.\" Related terminology may refer interchangeably to regulatory convergence, cooperation, and/or harmonization. Trade negotiations involving regulatory and intellectual property rights issues have focused, in part, on the goals of ensuring greater transparency, harmonization, and coherence to improve cooperation and streamline the regulatory approval process among the trading partners. Previous USDA estimates calculated the ad valorem equivalent effects of EU non-tariff barriers to U.S. agricultural exports, which were estimated to range from 23% to 102% for some more heavily protected products, including meat products, fruits and vegetables, and some crops. In general, SPS and related regulatory issues tend to be addressed in free trade agreements (FTAs) within an agreement's agriculture chapter or chapter on regulatory coherence, while GIs tend to be addressed along with other types of intellectual property rights (IPR) issues, in an FTA's IPR chapter. The following section provides additional background on SPS and TBT measures, as well as GI protections. SPS measures are laws, regulations, standards, and procedures that governments employ as \"necessary to protect human, animal or plant life or health\" from the risks associated with the spread of pests, diseases, or disease-carrying and causing organisms, or from additives, toxins, or contaminants in food, beverages, or feedstuffs. Examples include product standards, requirements for products to be produced in disease-free areas, quarantine and inspection procedures, sampling and testing requirements, residue limits for pesticides and drugs in foods, and limits on food additives. TBT measures cover both food and non-food traded products. TBTs in agriculture include SPS measures, but also include other types of measures related to health and quality standards, testing, registration, and certification requirements, as well as packaging and labeling regulations. Both SPS and TBT measures regarding food safety and related public health protection are addressed in various multilateral trade agreements and are regularly notified to and debated within both the SPS Agreement and TBT Agreement within the WTO. In general, under the SPS and TBT agreements, WTO members agree to apply such measures, based on scientific evidence and information, only to the extent necessary to protect human, animal, or plant life and health and to not arbitrarily or unjustifiably discriminate between WTO members where identical standards prevail. Member countries are also encouraged to observe established and recognized international standards. Improper use of SPS and TBT measures can create substantial barriers to trade when they are disguised protectionist barriers, are not supported by scientific evidence, or are otherwise unwarranted. Bilateral and regional FTAs between the United States and other countries regularly address SPS and TBT matters. Provisions in most U.S. FTAs have generally reaffirmed rights and obligations of both parties under the WTO SPS and TBT agreements. Some FTAs have established standing bilateral committees to enhance understanding of each other's measures and to consult regularly on related matters. Other FTAs have included side letters or agreements for the parties to continue to cooperate on scientific and technical issues, which in some cases may be related to certain specific market access concerns. Most FTAs have not addressed specific non-tariff trade concerns directly. Regulatory differences between the United States and EU have contributed to trade disputes regarding SPS and TBT rules between the two trading blocs. The United States has several formal WTO trade disputes regarding SPS and TBT measures with the EU. These include concerns regarding the EU's prohibitions on the use of growth-promoting hormones (and ractopamine ) in meat production, the EU's restrictions on chemical treatments (\"pathogen reduction treatments\" or \"PRTs\") on U.S. poultry, and the EU's approval process of biotechnology products. Other SPS concerns have involved regulations related to bovine spongiform encephalopathy (BSE, commonly known as mad cow disease) and regulations involving plant processing, chemical residues, endocrine-disrupting chemicals, antibiotics, and animal welfare. There are major differences in how the United States and the EU regulate food safety and related public health protection, including various administrative and technical review differences, which in turn influences how each applies various SPS and TBT measures. Such differences have often been central to SPS and TBT disputes, including those involving the use of hormones in meat production and pathogen reduction treatments in poultry processing. Other disputes invoking the SPS and TBT agreements between the U.S. and EU have included beef and poultry products, eggs, frozen bovine semen, milk products, animal byproducts, seafood, pesticide and animal drug residues, seeds, wheat, wine and spirits, and food packaging requirements. Differences are also evident in how the United States and EU regard biotechnology in agricultural production. In general, EU officials have been cautious in allowing genetically engineered cropsâcommonly referred to in Europe as genetically modified organisms (or GMOs)âto enter the EU market. As such, any GE-derived food and feed must be labeled accordingly. The EU's regulatory framework regarding biotechnology is generally regarded as one of the most stringent systems worldwide. During the T-TIP negotiations, U.S. agricultural and food groups actively called for changes to the EU's approach for approving and labeling biotechnology products. The EU has reported concerns about perceived U.S. SPS barriers to EU exports of sheep and goat meat, egg products, beef, certain dairy products, live bivalve mollusks, apples, and pears, along with difficulties protecting its own GIs on certain food and drinks. Other EU concerns have involved the use of \"Buy American\" restrictions in the United States governing public procurement. During the T-TIP negotiations, some expressed concern that including \"Buy American\" provisions could affect local food procurement, including restricting bidding contract preferences contained in U.S. and EU farm-to-school programs. The EU's application of the so-called precautionary principle remains central to the EU's risk management policy regarding food safety and animal and plant health and is often cited as the rationale behind the EU's more risk-averse approach. The precautionary principle was reportedly referenced as part of the 1992 Treaty on European Union that further integrated the EU, and its use was further outlined in a 2000 communication and then formally established in EU food legislation in 2002 (Regulation EC No 178/2002). The EU's 2000 communication further outlines guidelines for implementation, the basis for invoking the principle, and the general standards of application. Regarding international trade, under EU law, the precautionary principle provides for \"rapid response\" to address \"possible danger to human, animal, or plant health, or to protect the environment\" and can be used to \"stop distribution or order withdrawal from the market of products likely to be hazardous.\" Although the principle may not be used as a pretext for protectionist measures, many countries have challenged some EU actions that invoke the precautionary principle as \"protectionist.\" The EU, however, continues to invoke the precautionary principle to justify its policies regarding various regulatory issues and generally rejects arguments, on the grounds of risk management, that the lack of clear evidence of harm is not evidence of the absence of harm. No universally agreed-upon definition of the precautionary principle exists, and many differently worded or conflicting definitions can be found in international law. However, within the context of the WTO and the SPS agreement, the precautionary principle (or precautionary approach) allows a country to set higher standards and methods of inspecting products. It also allows countries to take \"protective action\"âincluding restricting trade of products or processesâif they believe that scientific evidence is inconclusive regarding their potential impacts on human health and the environment (provided the action is consistent and not arbitrary). The WTO has generally acknowledged that the need to take precautionary actions in the face of scientific uncertainty has long been widely accepted, particularly in the fields of food safety and plant and animal health protection. Examples might include a sudden outbreak of an animal disease that is suspected of being linked to imports, which may require a country to impose certain trade restrictions while the outbreak is assessed. Application of the precautionary principle by some countries remains an ongoing source of contention in international trade, particularly for the United States, and is often cited as a reason why some countries may restrict imports of some food products and processes. In the lead up to the previous T-TIP and Trans-Pacific Partnership (TPP) negotiations, there were active efforts to \"go beyond\" the rules, rights, and obligations in the WTO SPS Agreement and TBT Agreement, as well as commitments in existing U.S. FTAs. These efforts were referred to as \"WTO-Plus\" rules or, alternatively, as \"SPS-Plus\" and \"TBT-Plus\" rules. Related efforts called for improvements in regulatory cooperation and coherence, along with enhanced partnerships and interactions among regulators in each country. Modernizing the rules governing the application of SPS and TBT measures in U.S.-EU trade by incorporating \"SPS-Plus\" and \"TBT-Plus\" rules as part of a trade agreement could represent a positive step for U.S. food and agricultural exporters. Changes regarding SPS and TBT measures agreed to in the U.S.-Mexico-Canada Agreement (USMCA) and the U.S.-China Phase One Trade Agreement incorporated policy changes regarding SPS and TBT measures consistent with previous \"SPS-Plus\" and \"TBT-Plus\" efforts. According to USITC, USMCA \"goes further in requiring transparency and encouraging harmonization or equivalence of SPS measures\" and incorporates all of the proposed enhanced TPP disciplines \"in the areas of equivalence, science and risk analysis, transparency, and cooperative technical consultations.\" Some industry representatives claim that USMCA \"goes beyond TPP in establishing deadlines for 'import checks,' by requiring importing parties to inform exporters or importers within five days of shipments being denied entry.\" Both agreements contain language that directly relates to the use of biotechnology. Alternative efforts to modify the EU's application of the precautionary principle could present more of a challenge for U.S. agricultural producers and exporters. Previously, during the T-TIP negotiations, some in the U.S. agriculture and food industry urged U.S. negotiators to address the EU's use and application of the precautionary principle. Many U.S. agricultural and food organizations contended that the EU's application of the precautionary principle undermines sound science and innovation and results in \"unjustifiable restrictions\" on U.S. exports, allowing the EU \"to put in place restrictions on products or processes when they believe that scientific evidence on their potential impact on human health or the environment is inconclusive.\" Some asserted that application of the principle results in a bias against new technologies, such as biotechnology and nanotechnology. As a result, these groups said that \"science-based decision making and not the precautionary principle must be the defining principle in setting up mechanisms and systems\" to address SPS concerns. The U.S. Chamber of Commerce supported a \"science-based approach to risk management, where risk is assessed based on scientifically sound and technically rigorous standards\" and opposed \"the domestic and international adoption of the precautionary principle as a basis for regulatory decision making.\" Many in Congress also called for \"effective rules and enforceable rules to strengthen the role of science\" to resolve international trade differences. More recently, the EU's SPS were among the issues that raised the most concerns during a WTO review of the EU's trade policies. Among the cited concerns were certain SPS measures that were viewed to be not based on science or on international standards, and that were also deemed to not allow for adequate opportunity to take into account for the views of third countries. Outside of the FTA negotiation process, various U.S. federal agencies regularly address trade concerns involving SPS and TBT measures as part of their day-to-day oversight and regulatory responsibilities. For example, USDA's Animal and Plant Health Inspection Service (APHIS) administers various regulatory and control programs pertaining to animal and plant health and quarantine, humane treatment of animals, and the control and eradication of pests and diseases. APHIS also oversees SPS certification requirements for imported and exported agricultural goods. This work is ongoing. The United States also maintains ongoing interagency processes and mechanisms to identify, review, analyze, and address foreign government standards-related measures that may be barriers to trade. These activities are coordinated through the USTR-led Trade Policy Staff Committee, which is composed of representatives from several federal agencies, including USDA, the Department of Commerce, and the State Department. USTR also chairs an interagency group (i.e., both USDA and non-USDA agencies with SPS and TBT responsibilities) that reviews SPS and TBT measures that are notified to the WTO, as required under the SPS and TBT agreements. These agency officials also work with their international counterparts on concerns involving SPS and TBT measures. USTR tracks issues related to such measures as part of its annual reports. GIs are geographical names that act to protect the quality and reputation of a distinctive product originating in a certain region. The term GI is most often applied to wines, spirits, and agricultural products. GIs allow some food producers to differentiate their products in the marketplace. GIs may also be eligible for relief from acts of infringement or unfair competition. While GIs may protect consumers from deceptive or misleading labels, they can also impair trade when names that are considered common or generic in one market are protected in another. Examples of registered or established GIs include Parmigiano Reggiano cheese and Prosciutto di Parma ham from the Parma region of Italy, Toscano olive oil from the Tuscany region of Italy, Roquefort cheese from France, Champagne from the region of the same name in France, Irish whiskey, Darjeeling tea, Florida oranges, Idaho potatoes, Vidalia onions, Washington State apples, and Napa Valley wines. GIs are an example of IPR, along with patents, copyrights, trademarks, and trade secrets. The use of GIs has become a contentious international trade issue, particularly for U.S. wine, cheese, and sausage makers. In general, some consider GIs to be protected intellectual property, while others consider them to be generic or semi-generic terms. GIs are included among other IPR issues in the current U.S. trade agenda. GIs were an active area of debate during the T-TIP negotiations. Laws and regulations governing GIs differ markedly between the United States and EU, which further complicates this issue. GIs are protected by the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), which sets binding minimum standards for intellectual property protection that are enforceable by the WTO's dispute settlement procedure. Under TRIPS, WTO members must recognize and protect GIs as intellectual property. Both the United States and the EU are signatories of TRIPS and therefore subject to its rights and obligations. Accordingly, under TRIPS, the United States and EU have committed to providing a minimum standard of protection for GIs (i.e., protecting GI products to avoid misleading the public and prevent unfair competition) and an \"enhanced level of protection\" to wines and spirits that carry a GI, subject to certain exceptions. TRIPS builds on treaties administered by the World Intellectual Property Organization, a specialized agency in the United Nations with the mission to \"lead the development of a balanced and effective international intellectual property (IP) system.\" It also oversees the \"International Register of Appellations of Origin\" established in the Lisbon Agreement for the Protection of Appellations of Origin and their International Registration. The agreement's multilateral register covers food products and beverages and related products, as well as non-food products. The EU's GI program remains a contentious issue for some U.S. producer groups, particularly among wine, cheese, and sausage makers. Some have long expressed their concerns about EU protections for GIs, which they claim are being misused to create market and trade barriers. Much of this debate involves certain terms used by cheesemakers, such as parmesan, asiago, and feta cheese, which the U.S. cheese sectors consider to be generic terms. For example, feta cheese produced in the United States may not be exported for sale in the EU, since only feta produced in countries or regions currently holding GI registrations may be sold commercially. A 2019 study commissioned by the U.S. dairy industry forecasts declining U.S. cheese exports due to expanding restrictions on parmesan, asiago, and feta cheese. Another study concluded that up to $15 million in cheese trade might need to be relabeled due to the restriction on certain GI terms, while other traded foods, such as oilseeds and vinegars, would experience little impact. Some U.S. industry groups, however, are trying to institute protections for U.S. productsâsimilar to those in the EU GI systemâto promote certain distinctive American agricultural products. The American Origin Products Association represents certain U.S. potato, maple syrup, ginseng, coffee, and chile pepper producers and certain U.S. winemakers, among other regional producer groups. It seeks to work with federal authorities to create \"a list of qualified U.S. distinctive product names, which correspond to the GI definition.\" Laws and regulations governing GIs differ markedly between the United States and EU. In the United States, GIs generally fall under the common law right of possession or \"first in time, first in right\" as trademarks or collective or certification marks under the purview of the existing trademark regime, administered by the U.S. Patent and Trademark Office (PTO) and protected under the U.S. Trademark Act. Trademarks are distinctive signs that companies use to identify themselves and their products or services to consumers and can take the form of a name, word, phrase, logo, symbol, design, image, or a combination of these elements. Trademarks do not refer to generic terms, nor do they refer exclusively to geographical terms. Trademarks may refer to geographical names to indicate the specific qualities of goods either as certification marks or as collective marks. PTO does not have a special database register for GIs in the United States. PTO's trademark register, the U.S. Trademark Electronic Search System, contains GIs registered as trademarks, certification marks, and collective marks. USTR says that EU farm products hold nearly 12,000 trademarks. These register entries are not designated with any special field (such as \"geographical indications\") and cannot be readily compiled into a complete list of registered GIs. In the United States, the Alcohol and Tobacco Tax and Trade Bureau (TTB) also plays a role overseeing the labeling of wine, malt beverages, beer, and distilled spirits. In the EU, a series of regulations governing GIs was initiated in the early 1990s covering agricultural and food products, wine, and spirits. Legislation adopted in 1992 covering agricultural products (not including wines and spirits) was replaced by changes enacted in 2006 following a WTO panel ruling that found some aspects of the EU's scheme inconsistent with WTO rules. The new rules came into force in January 2013. The EU laws and regulations provide product registration markers for the different quality schemes. The EU regulations establish provisions regarding products from a defined geographical area given linkages between the characteristics of products and their geographical origin. The EU defines a GI as \"a distinctive sign used to identify a product as originating in the territory of a particular country, region or locality where its quality, reputation or other characteristic is linked to its geographical origin.\" EU registered products often fall under GI protections in certain third-country markets, and some EU GIs have been trademarked in some non-EU countries. This has become a concern for U.S. agricultural exporters following a series of trade agreements the EU has concluded with Canada, Japan, South Korea, South Africa, and other countries that in many cases are also trading partners of the United States. For example, Canada has agreed to recognize a list of 143 EU GIs in Canada, and Japan has agreed to recognize more than 200 EU GIs in Japan. These GI protections could limit U.S. sales of certain products to these countries. The EU is in the process of negotiating FTAs with several other U.S. trading partners, including Mexico, Australia, New Zealand, and the Mercosur states (Argentina, Brazil, Paraguay, and Uruguay). Each of these efforts includes a selected list of GIs that would become protected under an FTA between these countries and the European Union. In December 2019, the EU also entered into an agreement with China regarding GIs that would protect a reported 100 EU GIs in China. As of January 2020, 3,316 product names are registered and protected in the EU for foods, wine, and spirits originating in both EU member states and other countries. GIs continue to be actively debated as part of the official U.S. trade agenda, involving concerns about their possible improper use as well as the lack of transparency and due process under some country GI systems. USTR is working \"to advance U.S. market access interests in foreign markets and to ensure that GI-related trade initiatives of the EU, its Member States, like-minded countries, and international organizations, do not undercut such market access,\" and states that the EU's GI agenda \"significantly undermines the scope of trademarks and other [IPR] held by U.S. producers and imposes barriers on market access for American-made goods that rely on the use of common names.\" Statements by USDA officials in early 2020 have signaled that this issue could resurface as part of the U.S.-EU trade talks. Previously, during T-TIP negotiations, U.S. officials indicated that the United States would likely not agree to EU demands to reserve certain food names for EU producers and have expressed concerns about the EU's system of protections for GIs. At the time, U.S. trade policy objectives regarding the EU's GI protections was to ensure that they \"do not undercut U.S. industries' market access\" and to defend the use of certain \"common food names.\" In general, the United States is seeking protection for current U.S. owners of trademarks that overlap with EU-protected GIs, the ability to use U.S. trademarked names in third countries, and the ability to use U.S. trademarked names in the EU. In recent developments, according to USITC, USMCA \"increases the transparency of applications, approvals, and cancellations\" regarding GIs and \"provides guidelines for determining whether a term is customary in common use.\" In addition, a side letter between the United States and Mexico commits Mexico to not restrict market access for a list of more than 30 cheeses. USITC says this could \"help prevent future losses of U.S. market access for cheeses with common names\" such as \"blue\" or \"Swiss\" cheese. The final U.S.-China Phase One Trade Agreement also addresses longstanding concerns regarding IPR, including GIs, building on previous commitments regarding IPR and GIs. The agreement is expected to require that China ensure that it will \"not undermine market access for U.S. exports to China of goods\" and will apply relevant factors when providing certain GI protections, as well as provide the United States with \"necessary opportunities to raise disagreement\" regarding GIs. GI provisions in these two recent U.S. FTAs, however, could prove to be incompatible with other EU agreements regarding GIs with these countries. For Mexico and Canada, these include GI protections that are likely to be part of the EU-Mexico Global Agreement, as well as existing GI protections in the EU-Canada Comprehensive Economic and Trade Agreement. For China, these include GI protections agreed to in the 2019 EU-China agreement protecting certain EU GIs in China. The U.S.-EU Trade Agreement negotiations present Congress with the challenge of determining to what extent food and agriculture issues will be addressed in the trade talks, if at all. Although market access and tariff reductions may be off the table, addressing regulatory restrictions and other non-tariff barriers to U.S. agricultural trade are considered important for many U.S. producers. Some press reports indicate that certain non-tariff barriers and regulatory cooperation could become part of the new trade talks, while other press reports raise questions about the EU's willingness to address specific types of non-tariff barriers as part of the negotiation. Even if regulatory coherence and cooperation become part of the U.S.-EU trade talks, their resolution in a manner that benefits U.S. agricultural exporters is far from assured. Instead, some of the same non-tariff and regulatory barriers to U.S. trade that proved to be challenging during the T-TIP negotiation could prove to be equally intractable today. The UK's exit from the EU could also complicate future trade negotiations. The UK is a close ally of the United States and has been one of its strongest advocates among the EU bloc. In general, the regulatory framework and actions taken by the UK's Food Standards Agency are more aligned with those in the United States. Now that the UK is no longer part of the EU, the EU trade gains for U.S. agriculture could be reduced while its agricultural trade deficit may become more pronounced, given a more favorable trade situation with the UK.", "summary": "The Office of the U.S. Trade Representative (USTR) officially notified the Congress of the Trump Administration's plans to enter into formal trade negotiations with the European Union (EU) in October 2018. In January 2019, USTR announced its negotiating objectives for a U.S.-EU trade agreement, which included agricultural policiesâboth market access and non-tariff measures. However, the EU's negotiating mandate, released in April 2019, stated that the trade talks would exclude agricultural products. U.S.-EU27 Agricultural Trade, 1990-201 9 Improving market access remains important to U.S. agricultural exporters, especially given the sizable and growing U.S. trade deficit with the EU in agricultural products (see figure). Some market access challenges stem in part from commercial and cultural practices that are often enshrined in EU laws and regulations and vary from those of the United States. For food and agricultural products, such differences are focused within certain non-tariff barriers to agricultural trade involving Sanitary and Phytosanitary (SPS) measures and Technical Barriers to Trade (TBTs), as well as Geographical Indications (GIs). SPS and TBT measures refer broadly to laws, regulations, standards, and procedures that governments employ as \"necessary to protect human, animal or plant life or health\" from the risks associated with the spread of pests and diseases, or from additives, toxins, or contaminants in food, beverages, or feedstuffs. SPS and TBT barriers have been central to some longstanding U.S.-EU trade disputes, including those involving EU prohibitions on hormones in meat production and pathogen reduction treatments in poultry processing, and EU restrictions on the use of biotechnology in agricultural production. As these types of practices are commonplace in the United States, this tends to restrict U.S. agricultural exports to the EU. GI protections refer to naming schemes that govern product labeling within the EU and within some countries that have a formal trade agreement with the EU. These protections tend to restrict U.S. exports to the EU and to other countries where such protections have been put in place. Plans for U.S.-EU trade negotiations come amid heightened U.S.-EU trade frictions. In March 2018, President Trump announced tariffs on steel and aluminum imports on most U.S. trading partners after a Section 232 investigation determined that these imports threaten U.S. national security. Effective June 2018, the EU began applying retaliatory tariffs of 25% on imports of selected U.S. agricultural and non-agricultural products. In October 2019, the United States imposed additional tariffs on imports of selected EU agricultural and non-agricultural products, as authorized by World Trade Organization (WTO) dispute settlement procedures in response to the longstanding Boeing-Airbus subsidy dispute. Public statements by U.S. and EU officials in January 2020, however, signaled that the U.S.-EU trade talks might include SPS and regulatory barriers to agricultural trade. Statements by U.S. Department of Agriculture (USDA) officials cited in the press call for certain SPS issues as well as GIs to be addressed in the trade talks. However, other press reports of statements by EU officials have downplayed the extent that specific non-tariff barriers would be part of the talks. More formal discussions are expected in the spring of 2020. Previous trade talks with the EU, as part of the Transatlantic Trade and Investment Partnership (T-TIP) negotiations during the Obama Administration, stalled in 2016 after 15 rounds. During those negotiations, certain regulatory and administrative differences between the United States and the EU on issues of food safety, public health, and product naming schemes for some types of food and agricultural products were areas of contention.", "document_type": "crs"}
{"report": "This report provides a historical overview of federal funding provided to the National Institutes of Health (NIH) between FY1995 and FY2021. It also provides a brief explanation of the discretionary spending funding sources for NIH associated with the annual appropriations process (via the Labor, HHS, and Education and Interior/Environment Appropriations Acts) and the mandatory funding for special program on type 1 diabetes research. NIH is the primary federal agency for medical, health, and behavioral research. It is the largest of the eight health-related agencies that make up the Public Health Service (PHS) within the Department of Health and Human Services (HHS). NIH consists of the Office of the Director (OD) and 27 Institutes and Centers (ICs) that focus on aspects of health, human development, and biomedical science. The OD sets overall policy for NIH and coordinates the programs and activities of all NIH components, particularly in areas of research that involve multiple institutes. NIH activities cover a wide range of basic, clinical, and translational research, focused on particular diseases, areas of human health and development, or more fundamental aspects of biology and behavior. Its mission also includes research training and health information collection and dissemination. More than 80% of the NIH budget funds extramural research (i.e., external) through grants, contracts, and other awards. This funding supports research performed by more than 300,000 individuals who work at over 2,500 hospitals, medical schools, universities, and other research institutions around the country. About 10% of the agency's budget supports intramural research (i.e., internal) conducted by nearly 6,000 NIH physicians and scientists, most of whom are located on the NIH campus in Bethesda, Maryland. Funding for NIH comes primarily from annual Labor, HHS, and Education (LHHS) Appropriations Acts, with an additional smaller amount for the Superfund Research Program from the Interior/Environment Appropriations Act. Those two bills provide NIH discretionary budget authority. Through LHHS appropriations, some funding is also transferred to NIH pursuant to the PHS Evaluation Set-Aside or the \"PHS Evaluation Tap\" transfer authority. Authorized by Section 241 of the Public Health Service Act, the evaluation tap allows the Secretary of HHS, with the approval of appropriators, to redistribute a portion of eligible PHS agency appropriations across HHS for program evaluation and implementation purposes. The PHSA section limits the set-aside to not less than 0.2% and not more than 1% of eligible program appropriations. However, LHHS Appropriations Acts have commonly established a higher maximum percentage for the set-aside and have distributed specific amounts of \"tap\" funding to selected HHS programs. Since FY2010, and including in FY2020, this higher maximum set-aside level has been 2.5% of eligible appropriations. Readers should note that totals in this report and NIH source documents include amounts \"transferred in\" pursuant to PHS tap but do not include any amounts \"transferred out\" under this same authority. NIH also receives funding through LHHS appropriations, subject to different budget enforcement rules than the rest of the NIH funding in the actâappropriations to the NIH Innovation Account created by The 21 st Century Cures Act (\"the Cures Act,\" P.L. 114-255 ) to fund programs authorized by the act. For appropriated amounts to the accountâup the limit authorized for each fiscal yearâthe amounts are subtracted from any cost estimate for enforcing discretionary spending limits (i.e., the budget caps). In effect, appropriations to the NIH Innovation Account as authorized by the Cures Act are not subject to discretionary spending limits. The NIH Director may transfer these amounts from the NIH Innovation Account to other NIH accounts, but only for the purposes specified in the Cures Act. If the NIH Director determines that the funds for any of the four Innovation Projects are not necessary, the amounts may be transferred back to the NIH Innovation Account. All amounts authorized by the Cures Act have been fully appropriated to the Innovation Account from FY2017 to FY2020, including $492 million for FY2020. For FY2021, $404 million is authorized to be appropriated. In addition, NIH has received mandatory funding of $150 million annually that is provided in Public Health Service Act (PHSA) Section 330B, for a special program on type 1 diabetes research, most recently extended through FY2020 by the CARES Act ( P.L. 116-136 ), with additional partial-year FY2021 funding of $25,068,493 for October 1, 2020, through November 30, 2020. The total funding available for NIH activities, taking account of add-ons and PHS tap transfers, is referred to as the NIH \"program level.\" The enacted FY2020 NIH program level is made up of the following: $40.228 billion in discretionary LHHS appropriations, including the $492 million authorized for the Cures Act Innovation Account; $1.231 billion pursuant to the PHS program evaluation transfer and a $225 million transfer from the HHS non-recurring expenses fund (NEF); $81 million for the Superfund research program in Interior/Environment appropriations; and $150 million in annual funding for the mandatory type 1 diabetes research program. Accounting for transfers and other adjustments, cited FY2021 budget documents from the Administration show the NIH FY2020 program level as $41.685 billion. NIH has also received emergency supplemental appropriations to several IC accounts as provided by the first and third, coronavirus supplemental appropriations acts, shown in Table 1 , totaling $1.8 billion. In addition to these appropriations, the fourth coronavirus supplemental required that a total of not less than $1.8 billion of $25 billion appropriated to the Public Health and Social Services Emergency Fund be transferred to two NIH institutes and the Office of the Director. When accounting for these transfers, total funding directed to the NIH would come to not less than $3.6 billion across the three actsâan 8.6% funding increase over regular enacted FY2020 appropriations. These acts also include various other transfer authorities that would allow for additional transfers to and from NIH accounts (explained in the table notes). By convention, CRS does not add amounts provided as an emergency requirement to the NIH program levels in the remainder of this report. The FY2020 regular and emergency appropriations amounts are presented separately. President Trump's FY2021 initial budget request (February 10, 2020) proposed that NIH be provided with a total program level of $38.694 billion, a decrease of $2.99 billion (-7.2%) from FY2020-enacted levels. The proposed FY2020 program level would have been made up of $37.630 billion in LHHS appropriations, including the $404 million for the Cures Act Innovation Account (the full amount authorized for FY2021); $741 million in transfers to NIH pursuant to the PHS Evaluation Tap authority; $74 million for the Superfund Research Program in Interior/Environment appropriations; and $150 million in proposed annual funding for the mandatory type 1 diabetes program. Under the request, all existing IC accounts would receive a decrease compared to FY2020-enacted levels (see Appendix A ). The Building and Facilities account would receive an increase in LHHS budget authority, from $200 million in FY2020 to $300 million in FY2021. Subsequently, on March 17, 2020, the Office of Management and Budget submitted an amendment to President Trump's original request that would increase funding for the National Institute of Allergy and Infectious Disease (NIAID) by $440 million relative to the original request. The purpose of this additional requested funding was \"to ensure [NIAID] has the resources beginning October 1, 2020, to continue critical basic and applied research on coronaviruses and other infectious diseases.\" This amendment to the original proposal, if enacted, would result in NIAID receiving an increase of $9.3 million above the FY2020 level. Taking into account this amendment, as of the date of this report, the FY2021 budget request would provide NIH with a total program level of $39.133 billion, a decrease of $2.55 billion (-6.1%) from FY2020-enacted levels, with a total of $38.811 billion by provided by LHHS appropriations. In addition, the FY2021 budget request proposes consolidating the Agency for Healthcare Research and Quality (AHRQ) into NIH, forming a 28 th ICâthe National Institute for Research on Safety and Quality (NIRSQ). The creation of a new NIH institute would require amendments to the PHSA, especially Section 401(d), which specifies that \"[i]n the National Institutes of Health, the number of national research institutes and national centers may not exceed a total of 27.\" Under the FY2021 request, NISRQ would receive a total appropriation of $355.112 million, including $256.66 million in discretionary LHHS budget authority and $98.452 million in mandatory appropriations from the Patient-Centered Outcomes Research Trust Fund (PCORTF) in Social Security Act Section 1181. Congress did not adopt the Administration's similar proposals to consolidate AHRQ into NIH as NIRSQ in FY2018 through FY2020. The budget request proposes select specified FY2021 funding levels for programs and activities within and across the NIH accounts based on the Administration's research priorities, as summarized in Table A-3 . If adopted, these funding levels would likely be specified in report and/or explanatory statement language accompanying LHHS appropriations bills. For the most part, Congress does not specify NIH funding for particular diseases or areas of research, instead allowing the ICs to award funding within their mission areas. Funding awards are generally made on a competitive basis through various funding mechanisms intended to balance scientific opportunity with health priorities. Table 2 outlines NIH program level funding over the previous 25 years; Figure 1 illustrates funding trends in both current (also called nominal dollars) and projected constant (i.e., inflation-adjusted) FY2021 dollars (funding shown is total budget authority). NIH has seen periods of high and low funding growth. Between FY1994 and FY1998, funding for NIH grew from $11.0 billion to $13.7 billion (nominal dollars). Over the next five years, Congress and the President doubled the NIH budget to $27.2 billion in FY2003. In each of FY1999 through FY2003, NIH received annual funding increases of 14% to 16%. From FY2003 to FY2015, NIH funding increased more gradually in nominal dollars. In some years, (FY2006, FY2011, and FY2013) funding for the agency decreased in nominal dollars. From FY2016 through FY2020, NIH has seen funding increases of over 5% each year. The largest increase was from FY2017 to FY2018, where the program level increased by $3.0 billion (+8.7%), making this the largest single-year nominal dollar increase since FY2003. The lower half of Figure 1 shows NIH funding adjusted for inflation (in projected constant FY2021 dollars) using the Biomedical Research and Development Price Index (BRDPI). It shows that the purchasing power of NIH funding peaked in FY2003 (the last year of the five-year doubling period) and then declined fairly steadily for more than a decade until back-to-back funding increases were provided in each of FY2016 through FY2020. The FY2021 budget request would provide a program level that is 13.0% below the peak FY2003 program level. Appendix A. NIH Funding Details Program-Specific Funding In recent years, Congress and the President have increasingly specified funding levels for programs or research areas within NIH accounts throughout the budget and appropriations process. Congress uses language in reports and explanatory statements accompanying appropriations bills to designate funding for specified purposes. The Administration requests NIH program-specific funding, as outlined in the HHS and NIH budget request documents. For the most part, Congress does not specify NIH funding for particular diseases or areas of research, instead allowing the ICs to award funding within their mission areas. Funding is generally awarded on a competitive basis through various funding mechanisms intended to balance scientific opportunity with health priorities. In FY2020, Congress used explanatory statement language to specify a certain amount of IC funding for designated purposes, as summarized in Table A-2 . Sometimes the language specifies that \"no less than\" a certain amount can be designated for a certain purpose; in other cases, language \"provides\" or \"recommends\" that an amount be spent on a certain purpose. For FY2020, while the House report ( H.Rept. 116-62 ) also included funding levels for some of the below programs, the amounts in the explanatory statement supersede those. Both the explanatory statement and the House report include many additional statements directing the agency to prioritize certain programs or areas of research, as well as expressing the opinion or concerns of Congress regarding NIH; these broad statements are not summarized here. Appendix B. Acronyms and Abbreviations", "summary": "This report details the National Institutes of Health (NIH) budget and appropriations process with a focus on FY2020 and FY2021, and on coronavirus supplemental funding for NIH. The report also provides an overview of funding trends in regular appropriations to the agency from FY1995 to FY2021. Appendix A includes funding tables by account and program-specific funding levels for FY2020 and FY2021. The NIH is the primary federal agency charged with conducting and supporting medical, health, and behavioral research, and it is made up of 27 Institutes and Centers and the Office of the Director (OD). About 80% of the NIH budget funds extramural research through grants, contracts, and other awards. About 10% of NIH funding goes to intramural researchers at NIH-operated facilities. Almost all of NIH's funding is provided in the annual Departments of Labor, Health and Human Services, and Education, and Related Agencies Appropriations Act. NIH also receives smaller amounts of funding from Interior/Environmental appropriations and a mandatory budget authority for type 1 diabetes research. NIH has an FY2020 program level of $41.685 billion and has received emergency supplemental appropriations in three coronavirus supplemental appropriations acts, totaling over $3.59 billionâan 8.6% funding increase over regular enacted FY2020 appropriations. The administration's FY2021 budget request, as amended by a March 2020 letter, proposes an FY2021 program level of $39.133 billionâa 6.1% decrease from the FY2020 program level (regular appropriations). NIH has seen periods of high and low funding growth during the period covered by this report, as illustrated in Figure 1 . Between FY1994 and FY1998, funding for NIH grew from $11.0 billion to $13.7 billion (nominal dollars). Over the next five years, Congress and the President doubled the NIH budget to $27.2 billion in FY2003. In each of FY1999 through FY2003, NIH received annual funding increases of 14% to 16%. From FY2003 to FY2015, NIH funding increased more gradually in nominal dollars. In some years (FY2006, FY2011, and FY2013), funding for the agency decreased in nominal dollars. From FY2016 through FY2020, NIH has seen funding increases of over 5% each year. The largest increase was from FY2017 to FY2018, where the program level increased by $3.0 billion (+8.7%), making this the largest single-year nominal dollar increase since FY2003. When looking at NIH funding adjusted for inflation (in projected constant FY2021 dollars using the Biomedical Research and Development Price Index; BRDPI), the purchasing power of NIH funding peaked in FY2003âthe last year of the five-year doubling periodâand then declined fairly steadily for more than a decade until back-to-back funding increases were provided in each of FY2016 through FY2020. The FY2021 budget request would provide a program level that is 13.0% below the peak FY2003 program level.", "document_type": "crs"}
{"report": "The global pandemic of Coronavirus Disease 2019 (COVID-19) is affecting communities around the world and throughout the United States, with case counts growing daily. Containment and mitigation efforts by federal, state, and local governments have been undertaken to flatten the curve âthat is, to curb widespread transmission that could overwhelm the nation's health care system. Federal response efforts have included the enactment of laws to provide authorities and supplemental funding to prevent, prepare for, and respond to the pandemic. This report focuses on supplemental FY2020 discretionary appropriations provided to programs and activities traditionally funded by the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS) appropriations bill. As of the date of this report, LHHS supplemental appropriations for COVID-19 response have been provided in four separate supplemental appropriations measures: Title III, Division A, of the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), enacted on March 6, 2020. Title V, Division A, of the Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ), enacted on March 18, 2020. Title VIII, Division B, of the Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ), enacted on March 27, 2020. Title I, Division B, of the Paycheck Protection Program and Health Care Enhancement Act (PPPHCEA, P.L. 116-139 ), enacted on April 24, 2020. In total, LHHS has received roughly $280 billion in supplemental discretionary appropriations from these COVID-19 response measures. These funds are in addition to roughly $195 billion in regular FY2020 LHHS discretionary appropriations provided in Division A of P.L. 116-94 , the FY2020 LHHS omnibus appropriations act that was enacted on December 20, 2019. Unlike the annual discretionary appropriations, however, these additional funds were designated as an \"emergency requirement\" and thus were effectively exempted from otherwise applicable budget enforcement requirements (such as the statutory discretionary spending limits). Overall, the COVID-19 supplemental funds have increased FY2020 LHHS discretionary appropriations by approximately 143%. The relevant legislative history of each of the four enacted laws containing LHHS supplemental appropriations is detailed below. In the weeks leading up to the supplemental appropriations action in Congress, Alex Azar, the Secretary of the U.S. Department of Health and Human Services (HHS), took administrative steps to allocate existing funding to COVID-19 response efforts. These included issuing a determination on January 25, 2020, allowing the allotment of $105 million from the Infectious Diseases Rapid Response Reserve Fund (IDRRRF). He also reportedly informed Congress on February 2 that he would potentially exercise his authority to transfer $136 million in existing funds within HHS to increase the budgetary resources of several operating divisions and offices that were tasked with COVID-19 response. In response, the Chair of the House Appropriations Committee, Representative Nita Lowey, and the Chair of the LHHS Subcommittee, Representative Rosa DeLauro, sent the Secretary a letter expressing concern that budgetary resources available to HHS at that time would not be sufficient. On February 24, 2020, the Trump Administration sent Congress a request for supplemental appropriations of $1.25 billion for the Public Health and Social Services Emergency Fund (PHSSEF) at HHS. The request letter included a number of other proposals, largely but not exclusively related to re-purposing existing funds toward response efforts. All told, the Administration estimated needing to allocate approximately $2.5 billion toward COVID-19 response efforts. (For the most part, amounts for other LHHS aspects of the request generally were unspecified in the publicly released request letter.) Several days after the Administration's request, the Chair of the House Appropriations Committee introduced H.R. 6074 on March 4, 2020. The measure passed the House that same day by a vote of 415-2, passed the Senate on March 5 by a vote of 96-1, and was signed into law ( P.L. 116-123 ) on March 6. According to the Congressional Budget Office (CBO), P.L. 116-123 provided a total of $7.8 billion in supplemental appropriations in Division A, of which roughly $6.4 billion (about 83%) was for LHHS accounts and activities. (Division B contained authorization provisions related to certain LHHS programs and activitiesâproviding the HHS Secretary authority to temporarily waive or modify the application of certain Medicare requirements with respect to telehealth services. The mandatory spending budgetary effects of these provisions are outside the scope of this report.) A second COVID-19 response measure was developed by Congress and the Administration soon after the first was enacted. Initially, H.R. 6201 was introduced by the Chair of the House Appropriations Committee on March 11, 2020. The House amended and passed the measure by a vote of 363-40 on March 14, but further alterations to the final legislative package were negotiated over the next two days. On March 16, the House (by unanimous consent) considered and agreed to a resolution ( H.Res. 904 ) that directed the Clerk to make changes to the legislation when preparing the final, official version of the House-passed bill ( engrossment ). The engrossed version was sent to the Senate and ultimately passed without amendment by a vote of 90-8 on March 18. The President signed the bill into law ( P.L. 116-127 ) the same day. Division A of P.L. 116-127 was estimated by CBO to provide a total of $2.5 billion in supplemental appropriations, of which $1.25 billion (approximately 51%) was for LHHS accounts and activities. (Other divisions of the act contained authorization provisions that in some cases relate to LHHS programs and activitiesâfor instance, provisions providing a 6.2% increase to the federal matching assistance percentage for Medicaid and certain other programs. The mandatory spending budgetary effects of such provisions are outside scope of this report.) On March 17, 2020, the Administration released a second request for FY2020 supplemental appropriations of $45.8 billion for COVID-19 response, of which $11.1 billion was for LHHS accounts and activities. Over the next several days, Congress and the Administration negotiated the scope and scale of this legislative response, which was expected to involve authorities and additional funding for numerous programs across the federal government. The legislative vehicle that was ultimately chosen for this package was H.R. 748 , an unrelated measure that had been passed previously by the House. Prior to when a deal was reached between Congress and the Administration, the Senate voted on March 22 (47-47) and March 23 (49-46) not to invoke cloture on the motion to proceed to H.R. 748 . The measure was ultimately laid before the Senate by unanimous consent and passed with a substitute amendment by a vote of 96-0 on March 25. The House subsequently took up the Senate amendment on March 27, and agreed to it by a voice vote. The bill was signed into law ( P.L. 116-136 ) by the President that same day. According to CBO, P.L. 116-136 provided about $330 billion in supplemental appropriations in Division B, of which $172.1 billion (approximately 57%) was for LHHS accounts and activities. (Division A contained authorization provisions that in some cases relate to LHHS programs and activitiesâfor instance, $1.320 billion in mandatory funds for the HRSA health centers program. The mandatory spending budgetary effects of such provisions are outside the scope of this report.) About three weeks after the enactment of the CARES Act, Congress and the President came to an agreement that, among other provisions, provided additional supplemental appropriations to HHS for the Provider Relief Fund and to support COVID-19 testing. The legislative vehicle that was used for the agreement was H.R. 266 , an unrelated appropriations bill that had been passed previously by the House. On April 21, 2020, the measure was laid before the Senate by unanimous consent and passed with a substitute amendment by voice vote. The House adopted the Senate version of the proposal on April 23 by a vote of 388-5. The President signed the bill into law ( P.L. 116-139 ) the following day. According to CBO, P.L. 116-139 provided $162.1 billion in supplemental appropriations in Division B, of which $100 billion (approximately 62%) was for LHHS. (Division A contained no provisions related to LHHS programs and activities. The mandatory spending budgetary effects of the authorization provisions in Division A are outside the scope of this report.) As previously mentioned, LHHS has received in total roughly $280 billion in supplemental discretionary appropriations from the COVID-19 response measures ( Table 1 ). HHS received funding in all four supplemental appropriations acts, whereas the Department of Labor (DOL), the Department of Education (ED), and entities funded under the Related Agencies (RA) heading received funding in the third supplemental only. HHS received the vast majority of all LHHS COVID-19 supplemental fundsâ$248 billion, or 89%. ED received the second-largest shareâ$31 billion, or 11%. DOL and RA received approximately 0.1% and 0.2%, respectively. The remainder of this report provides highlights for HHS, DOL, ED, and RA, and includes a detailed table ( Table 2 ) organized by department or agency and by account, program, or activity. The majority of DOL funds ($345 million) in the third measure are for dislocated worker assistance through activities authorized by the Workforce Innovation and Opportunity Act (WIOA). Specifically, the DOL funds are for the WIOA National Reserve, which provides National Dislocated Worker Grants (NDWGs) to states and localities to assist with worker dislocation resulting from natural disasters and mass layoffs. These funds are generally expected to address workforce-related effects of the COVID-19 pandemic. The majority of HHS funds (93%) in the supplemental appropriations measures have been appropriated to the Public Health and Social Services Emergency Fund (PHSSEF). The PHSSEF account is used by the HHS Secretary for one-time or short-term funding, such as emergency supplemental appropriations, and for some ongoing public health preparedness activities in the Office of the HHS Assistant Secretary for Preparedness and Response (ASPR). Accounts at the Centers for Disease Control and Prevention (CDC) received approximately 3% of the supplemental HHS appropriations provided in the COVID-19 response measures. Accounts at the Administration for Children and Families (ACF) received a similar amount. Remaining funds were provided in smaller amounts to the National Institutes of Health (NIH), the Administration for Community Living (ACL), the Substance Abuse and Mental Health Services Administration (SAMHSA), and the Centers for Medicare and Medicaid Services (CMS). While amounts shown in Table 2 are displayed as appropriated, readers should note that the first, third, and fourth COVID-19 supplemental appropriations acts authorized HHS to transfer funds made available in these acts, provided the transfers are made to prevent, prepare for, and respond to the pandemic. (This broad authority giving HHS discretion over certain transfers is in addition to provisions in these three measures that direct HHS to make specific transfers.) The first measure broadly allowed for HHS to transfer funds among accounts at CDC, NIH, and PHSSEF. The third measure allowed for transfers among amounts at CDC, PHSSEF, ACF, ACL, and NIH. The fourth measure allowed for transfers among accounts at CDC, NIH, PHSSEF, and the Food and Drug Administration, but limited the amounts available for such transfers (e.g., it excluded from this authority $75 billion provided to the PHSSEF for the \"Provider Relief Fund\"). The acts require HHS to notify the House and the Senate appropriations committees 10 days in advance of such transfers. The PHSSEF received about $232 billion in funding across the four measures. This accounts for 83% of all LHHS funds provided in the acts (and 93% of the HHS funds in the LHHS titles of the bills). These PHSSEF funds may support various activities, including health care surge capacity and the development and purchase of medical countermeasures, including vaccines. In general, PHSSEF supplemental funding has been provided for four main sets of activities. Medical Countermeasures and Surge Capacity: The first and third measures each provided funding to support the development, and in some cases federal purchase, of COVID-19 medical countermeasures, such as diagnostic tests, treatments, vaccines, and medical supplies, as well as for healthcare workforce and other surge capacity activities. In total, approximately $30.4 billion has been provided for these activities. Note that the bills also specify that some of these funds are to be transferred elsewhere (e.g., to other federal agencies for the care of persons under federal quarantine) or reserved for specific purposes or activities (e.g., deposits to the Strategic National Stockpile). These activities may be carried out by various ASPR components, especially the Biomedical Advanced Research and Development Authority (BARDA) for countermeasure development and procurement. COVID-19 Testing for the Uninsured : The second supplemental measure included $1 billion to provide reimbursements for COVID-19 testing and related services for persons who are uninsured. In addition, the fourth measure specified that up to $1 billion out of the amounts appropriated for broader COVID-19 testing purposes (discussed below) may be used to cover the costs of testing for the uninsured. Both measures provide for these payments to be made according to the National Disaster Medical System (NDMS) definitive care reimbursement mechanism. However, the program is administered by HRSA. Provider Relief Fund: The third and fourth supplemental measures each provided funding for a \"Provider Relief Fund\" to assist health care providers and facilities affected by the COVID-19 pandemic. These funds are intended to reimburse eligible health care providers for health care-related expenses or lost revenues that are attributable to COVID-19. The measures define eligible providers broadly as any that provide \"diagnoses, testing, or care for individuals with possible or actual cases of COVID-19.\" In total, $175 billion has been appropriated for the Provider Relief Fund. COVID-19 Testing , Surveillance, and Contact Tracing : The fourth supplemental measure provided $25 billion to augment national capacity for COVID-19 containment, including expanded testing capacity, and workforce and technical capacity for disease surveillance and contact tracing. The bill directed HHS to reserve some of these funds for specific purposes (e.g., not less than $11 billion is for states, localities, territories, tribes, tribal organizations, urban Indian health organizations, or health service providers to tribes). In addition, the bill specified that certain funds are to be transferred to other agencies and accounts (e.g., $600 million is to be transferred to the FDA for diagnostic, serological, antigen, and other tests). In addition to the activities specified above, PHSSEF appropriations in the first, third, and fourth supplemental measures called for some portion of the funds to be transferred to other agencies or accounts for particular activities. For instance, some PHSSEF funds are required to be transferred to the HRSA for health centers, rural health, the Ryan White HIV/AIDS program, and health care systems. Further public health-related funding for preparedness and response was appropriated to the CDC ($6.5 billion) and NIH ($1.8 billion) in the first and third supplemental measures. In addition, the fourth supplemental explicitly directed certain PHSSEF appropriations to be transferred to CDC and NIH for COVID-19 response activities. When accounting for these transfers, total funding directed to the CDC would come to not less than $7.5 billion and total funding directed to NIH would come to not less than $3.6 billion. The CDC funding was intended, among other things, to support grants, or cooperative agreements with grants to states, localities, tribes and other entities, for public health activities (e.g., surveillance, infection control, diagnostics, laboratory support, and epidemiology), as well as for global disease detection and modernization of public health data collection. The funds may also be used to support public outreach campaigns, and provide guidance to physicians, health care workers, and others. Most of the NIH funding was provided to several institutes to support basic scientific research as well as research on potential vaccines, therapeutics, and diagnostics related to COVID-19. ACL received a total of $1.2 billion in the second and third response measures. The majority of this funding ($750 million) was spread across a variety of activities that the agency undertakes to help provide meals to low-income seniors. SAMHSA received $425 million in the third measure, with $250 million for Certified Community Behavioral Health Clinics, $50 million for suicide prevention programs, and not less than $15 million for Indian Tribes. The measure specified that not less than $100 million be made available as emergency response grants for state governments for crisis intervention services, mental health and substance use disorder treatment, and recovery supports for individuals affected by the pandemic. CMS received $200 million in the third measure. At least half of this appropriation was to be spent on additional infection control surveys for federally certified facilities with populations vulnerable to severe illness from COVID-19. ACF received $6.3 billion in the third measure. These funds were directed to a number of human services programs. For instance, the Child Care and Development Block Grant received $3.5 billion to provide continued assistance to child care providers in the event of decreased enrollment or program closures. These funds may also be used to support child care facilities that are open and operating, including those providing care for the children of essential workers. Several other ACF programs received funding, including the Community Services Block Grant ($1 billion), Head Start ($750 million), and the Low Income Home Energy Assistance Program ($225 million). Almost all of the $30.925 billion in supplemental ED appropriations provided in the third measure are for the Education Stabilization Fund (ESF). The ESF is composed of three emergency relief funds: (1) a Governor's Emergency Education Relief (GEER) Fund (Â§18002), (2) an Elementary and Secondary School Emergency Relief Fund (ESSERF; Â§18003), and (3) a Higher Education Emergency Relief (HEER) Fund (Â§18004). The third measure provided a total of $30.750 billion for the ESF and specified that these funds are to remain available through September 30, 2021. The GEER Fund may be used to provide emergency support through grants to local educational agencies (LEAs) that the state educational agency (SEA) or governor determines to have been the most significantly impacted by COVID-19. Emergency support may also be provided through grants to institutions of higher education (IHEs) serving students within the state that the governor determines to have been the most significantly impacted by COVID-19. A governor may also choose to provide emergency support to any other IHE, LEA, or education-related entity within the state that he or she deems \"essential for carrying out emergency educational services\" to students for a broad array of purposes ranging from any activity authorized under various federal education laws to the provision of child care and early childhood education, social and emotional support, and the protection of education-related jobs. Funds from the ESSERF are to be awarded to states based on their relative shares of grants awarded under Title I-A of the Elementary and Secondary Education Act (ESEA), as amended. SEAs are required to provide at least 90% of the funds to LEAs to be used for myriad purposes such as any activity authorized under various federal education laws (e.g., ESEA), coordination of preparedness and response to the COVID-19 pandemic, technology acquisition, mental health, and activities related to summer learning. Funds retained by the SEA must be used for emergency needs, as determined by the SEA, to address issues in response to the COVID-19 pandemic and for administration. The HEER Fund is to distribute funds to IHEs to address needs directly related to the COVID-19 pandemic, including, but not limited to, transitioning courses to distance education and grant aid to students for their educational costs such as food, housing, course materials, health care, and child care. The Social Security Administration (SSA) received the largest amount ($300 million) among the related agencies. These funds were provided to the SSA Limitation on Administrative Expenses account to support the salaries and benefits of all SSA employees affected as a result of office closures. The funds are also to be used for costs associated with telework, phone, and communication services for employees; for overtime costs and supplies; and for processing disability and retirement benefit workloads and backlogs. Table 2 displays funding directed to LHHS programs and activities, as enacted, across the four COVID-19 supplemental appropriations acts. It is organized by department or agency and by account, program, or activity. The table also indicates a number of cases in which appropriations language reserved funds within a particular account for specific programs or activities, or directed that funds be transferred to other accounts. It makes note of instances in which these reservations are for not less than (NLT) or not more than (NMT) a certain dollar amount. In cases where the bill text calls for transfers, funds are shown in the account to which they were appropriated, not in the account to which they are to be transferred.", "summary": "The legislative response to the global pandemic of Coronavirus Disease 2019 (COVID-19) has included the enactment of laws to provide authorities and supplemental funding to prevent, prepare for, and respond to the pandemic. This report focuses on supplemental FY2020 discretionary appropriations provided to programs and activities traditionally funded by the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS) appropriations bill. As of the date of this report, LHHS supplemental appropriations for COVID-19 response have been provided in four separate supplemental appropriations measures: Title III, Division A, of the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), enacted on March 6, 2020, provided approximately $6.4 billion in supplemental LHHS funds. Title V, Division A, of the Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ), enacted on March 18, 2020, provided $1.25 billion in supplemental LHHS funds. Title VIII, Division B, of the Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ), enacted on March 27, 2020, provided $172.1 billion in supplemental LHHS funds. Title I, Division B, of the Paycheck Protection Program and Health Care Enhancement Act (PPPHCEA, P.L. 116-139 ), enacted on April 24, 2020, provided $100 billion in supplemental LHHS funds. In total, LHHS has received roughly $280 billion in supplemental discretionary appropriations from these COVID-19 response measures. These supplemental funds are in addition to roughly $195 billion in regular FY2020 LHHS discretionary appropriations provided in Division A of P.L. 116-94 , the FY2020 omnibus appropriations act containing full-year LHHS appropriations that was enacted on December 20, 2019. Unlike the annual discretionary appropriations, however, these additional funds were designated as an \"emergency requirement\" and thus were effectively exempted from otherwise applicable budget enforcement requirements (such as the statutory discretionary spending limits). Overall, the COVID-19 supplemental funds have increased FY2020 LHHS discretionary appropriations by approximately 143%. The Department of Health and Human Services (HHS) received funding in all four COVID-19 supplemental appropriations acts, whereas the Department of Labor (DOL), Department of Education (ED), and entities funded under the \"Related Agencies\" heading received funding in the third supplemental only. In total, HHS received $248 billion, or 89% of all COVID-19 LHHS supplemental appropriations. ED received the second-largest share at $31 billion, or 11%. DOL and the Related Agencies received approximately 0.1% and 0.2% of the LHHS COVID-19 supplemental funds, respectively.", "document_type": "crs"}
{"report": "The United States currently has a population of almost 1 million lawfully present foreign workers and accompanying family members who have been approved for, but have not yet received, a green card or lawful permanent resident (LPR) status. This queue of prospective immigrantsâthe employment-based backlog âis dominated by Indian nationals. It has been growing for decades and is projected to double in less than 10 years. The employment-based immigrant backlog exists because the annual number of foreign workers whom U.S. employers hire and then sponsor to enter the employment-based immigration pipeline has regularly exceeded the annual statutory allocation of green cards. The Immigration and Nationality Act (INA) that governs U.S. immigration policy limits the total annual number of employment-based green cards to 140,000 individuals. This worldwide limit is split among five employment-based categoriesâthe first three of which each receive 40,040 green cards, and the other two receive 9,940 each. (See Appendix A for more detailed category information.) Apart from these numerical limits, the INA also imposes a 7% per-country cap or ceiling that applies to each of the five categories. The 7% ceiling is not an allocation to individual countries but an upper limit established to prevent the monopolization of employment-based green cards by a small number of countries. This percentage limit is breached frequently for the countries that send the largest number of prospective employment-based immigrants, due to reallocations from other categories and countries. For nationals from most immigrant-sending countries, the employment-based backlog does not pose a major obstacle to obtaining a green card. Current wait times to receive a green card for those individuals are relatively short, often under a year. This is particularly the case for nationals from countries that send relatively few employment-based immigrants to the United States. However, for nationals from India, and to a lesser extent China and the Philippinesâthree countries that send large numbers of foreign workers to the United Statesâthe combination of the numerical limits and the 7% per-country ceiling has created inordinately long waits to receive employment-based green cards and exacerbated the backlog. New prospective immigrants currently entering the backlog (beneficiaries) are double the available number of green cards. Many Indian nationals can expect to wait decades to receive a green card. For some, the waits will exceed their lifetimes. For these prospective immigrants, many of whom already reside in the United States, the backlog can impose significant hardships. Prospective employment-based immigrants who lack LPR status cannot switch jobs, potentially subjecting them to exploitative work conditions. While waiting in the United States, backlogged workers often develop community ties, purchase homes and have children. Yet with a petition pending approval and no green card, they cannot easily travel overseas to see their families, and their spouses may have difficulty obtaining legal permission to work. Any noncitizen children who reach age 21 before their parents acquire a green card risk aging out of legal status. In effect, a large part of these prospective immigrants' lives and those of their family members are on hold. If a prospective immigrant in the backlog dies while waiting for a green card, the individual's spouse and family lose their place in the queue, and in some cases their legal status to reside in the United States. For some U.S. employers, the backlog can act as a competitive disadvantage for attracting highly trained workers relative to other countries with more accessible systems for acquiring permanent residence. U.S. universities educate a sizable number of foreign-born graduates in science, technology, engineering, and mathematics, among other fields, many of whom may be desirable candidates to U.S. employers. In the face of the substantial wait times for LPR status, however, growing numbers of such workers are reportedly migrating to countries other than the United States for education, employment, or both. In recent years, some Members of Congress have proposed solutions for addressing the employment-based backlog, ranging from changing the existing system's numerical limits to restructuring the entire employment-based immigration system. The latter approach is widely viewed as legislatively and politically formidable. On the other hand, legislative proposals to alter the numerical limitsâand to remove the per-country ceiling in particularâfor employment-based immigrants have been introduced more regularly. One proposal currently under consideration in the Senate following its passage in the House is the Fairness for High-Skilled Immigrants Act ( H.R. 1044 ; S. 386 , as amended), which would eliminate the 7% per-country ceiling for employment-based immigration, among other provisions. Supporters of the bill assert that it would improve the current employment-based immigration system, initially by granting more green cards to Indian nationals who generally have longer wait times under the current system compared with nationals from other countries. Ultimately, the bill would convert the per-country system into what some consider a more equitable first- come, first served system. Supporters of this approach argue that the existing 7% per-country ceiling unfairly discriminates against foreign workers on the basis of their country of origin. They contend that the current backlog incentivizes some employers to hire and exploit Indian foreign workers, knowing that these workers will be unable to leave their jobs for many years without losing their place in the queue. Those opposed to removing the per-country ceiling maintain that it fulfills its original purpose of preventing a few countries from dominating employment-based immigration. They contend that removing the ceiling merely shuffles the deck by changing who receives employment-based green cards, benefiting Indian and Chinese nationals at the expense of immigrants from all other countries. Because Indian employment-based immigrants are employed largely in the information technology sector, such a change may benefit that sector at the expense of other industrial sectors that are also critical to the United States. Opponents argue that legislative proposals such as S. 386 do not address the more fundamental issue of too few employment-based green cards for an economy that has doubled in size since the law establishing their current statutory limits was passed in 1990. If the 7% per-country ceiling were eliminated, some observers expect that Indian and Chinese nationals would initially receive most or all employment-based green cards for some years at the expense of nationals from all other countries. Once current backlogs were eliminated, however, country of origin would no longer directly affect the allocation of employment-based green cards, an outcome that some consider more equitable to Indian and Chinese prospective immigrants, and that others consider disadvantageous to prospective immigrants from all other countries. This report analyzes how removing the per-country ceiling would impact the employment-based immigrant backlog over the next decade, using the provisions of S. 386 , as amended, as a case study. While certain provisions analyzed are specific to only this bill, the broader objective of eliminating the per-country ceiling has appeared in numerous legislative proposals in past Congresses. The report reviews the employment-based immigration system, discusses the key provisions of S. 386 affecting the backlog, and presents results from a Congressional Research Service (CRS) analysis that projects, under current conditions, how the backlog would change over the decade following enactment. The report ends with concluding observations and some potential legislative options. Each year, the United States grants LPR status to roughly 1 million foreign nationals, which allows them to live and work permanently in this country. The provisions that mandate LPR eligibility criteriaâthe pathways by which foreign nationals may acquire LPR statusâand their annual numerical limits are established in the INA, found in Title 8 of the U.S. Code. Among those granted LPR status are employment-based immigrants who serve the national interest by providing needed skills to the U.S. labor force. The INA specifies five preference categories of employment-based immigrants: 1. persons of extraordinary ability; 2. professionals with advanced degrees; 3. skilled and unskilled \"shortage\" workers for in-demand occupations (e.g., nursing); 4. assorted categories of \"special immigrants\"; and 5. immigrant investors (see Appendix A for more detail). Each category has specific eligibility criteria, numerical limits, and, in some cases, application processes. The INA allocates 140,000 green cards annually for employment-based LPRs. In FY2018, employment-based LPRs accounted for about 13% of the almost 1.1 million LPRs admitted. The INA further limits each immigrant-sending country to an annual maximum of 7% of all employment-based LPR admissions, known as the 7% per-country ceiling. The ceiling serves as an upper limit for all countries, not a quota set aside for individual countries. As noted earlier, this percentage limit is breached frequently for the highest immigrant-sending countries, due to reallocations from other categories and countries. The INA also contains provisions that allow countries to exceed the numerical limits set for each preference category and the per-country ceiling. First, unused green cards for each of the preference categories can roll down to be utilized in the next preference category. Second, in any given quarter, if the number of available green cards exceeds the number of applicants, the per-country ceiling does not apply for the remainder of green cards for that quarter. Third, any unused family-based preference immigrant green cards can be used for employment-based green cards in the next fiscal year. Such provisions regularly permit individuals from certain countries to receive far more employment-based green cards than the limits would imply. For example, the numerical limit for each of the first three employment-based categories is 40,040, which combined with the 7% per-country ceiling, would limit the annual number of green cards issued to Indian nationals to 2,803 per category. However, in FY2019, Indian nationals received 9,008 category 1 (EB1), 2,908 category 2 (EB2), and 5,083 category 3 (EB3) green cards. Among prospective immigrants, the INA distinguishes between principal prospective immigrants (principal beneficiaries), who meet the qualifications of the employment-based preference category, and derivative prospective immigrants (derivative beneficiaries), who include the principals' spouses and minor children. Derivatives appear on the same petition as principals and are entitled to the same status and order of consideration as long as they are accompanying or following to join principal immigrants. Both principals and derivatives count against the annual numerical limits, and currently less than half of employment-based green cards issued in any given year go to the principals. While some prospective employment-based immigrants can self-petition, most require U.S. employers to petition on their behalf. How prospective immigrants apply for employment-based LPR status depends on where they reside. If they live abroad, they may apply as new immigrant arrivals. If they reside in the United States, they may apply to adjust st atus from a temporary (nonimmigrant) status (e.g., H-1B skilled temporary worker, F-1 student) to LPR status. Employment-based immigration involves multiple steps and federal agencies. The Department of Labor (DOL) must initially provide labor certification for most preference category 2 and 3 immigrants. U.S. Citizenship and Immigration Services (USCIS) within the Department of Homeland Security (DHS) processes and adjudicates petitions for employment-based immigrants. USCIS assigns to each principal beneficiary and any derivative beneficiaries a priority date (the earlier of the labor certification or immigrant petition filing date), representing the prospective immigrant's place in the backlog. USCIS sends processed and approved immigrant petitions to the Department of State's (DOS's) National Visa Center , which allocates visa numbers or immigrant slots according to the INA's numerical limits and per-country ceilings. Individuals must wait for their priority date to become current before they can continue the process to receive a green card. The discussion below of S. 386 , as amended, and the subsequent analysis are focused solely on the first three employment-based immigrant preference categories. These categories account for 120,120 or 86% of the 140,000 total employment-based green cards available annually. The EB4 category, which comprises special immigrants, and the EB5 category, which comprises immigrant investors, are statutorily included within the employment-based immigration system. Those categories, however, represent distinct types of immigrants that fall outside of S. 386 's provisions, as well as much of the debate over the per-country ceiling. The Fairness for High-Skilled Immigrants Act (currently S. 386 , as amended) has been introduced in Congress in different versions since 2011. In the 116 th Congress, the bill was introduced in the House as H.R. 1044 by Representative Zoe Lofgren in February 2019 and was passed by the House on July 10, 2019, by a vote of 365 to 65. The bill was introduced in the Senate as S. 386 by Senator Mike Lee in February 2019. There have been negotiated proposed amendments since then, and the bill's provisions may change further. In its current proposed form, S. 386 contains the following provisions found in prior versions of the Fairness for High-Skilled Immigrants Act: 1. Eliminating the per-country ceiling for employment-based immigrants; 2. Raising the per-country ceiling for family-based preference category immigrants from 7% to 15%; and 3. Allowing a three-year transition period for phasing out the employment-based per-country ceiling. Eliminating the per-country ceiling for employment-based immigrants would convert the current system into a first-come, first-served system, with the earliest approved petitions receiving green cards before those filed subsequently, regardless of country of origin. S. 386 , as amended, also contains the following additional provisions intended to address issues and concerns raised by stakeholders: 1. A Hold Harmless provision that would ensure no person with a petition approved before enactment would have to wait longer for their visa as the result of the bill's passage; 2. Allocating up to 5.75% of the 40,040 EB2 and EB3 categories (2,302 per category) for derivative and principal immigrants applying from overseas, who otherwise would wait in the backlog much longer once the per-country ceiling was removed, either to reunite with their principal immigrant parents/spouses or to be employed in the United States; and 3. Within the EB3 category, allocating up to 4,400 of the 40,040 slots for Schedule A occupations (professional nurses and physical therapists). It would also allocate slots for these immigrants' accompanying family members. The following analysis projects what the employment-based backlog would look like in 10 years under current law and compares that outcome with the projected outcome if S. 386 were passed. As noted above, the analysis is limited to the EB1, EB2, and EB3 categories, which together account for 120,120 (86%) of the 140,000 employment-based green cards permitted annually under the INA. The projection of the impact of S. 386 assumes the bill is passed in FY2020, and its provisions take effect in FY2021. As such, the analysis begins with the FY2020 employment-based backlog for the EB1, EB2, and EB3 categories and projects how the bill's provisions alter these backlogs over the 10 years from FY2021 through FY2030. For each category, the analysis estimates the number of new prospective immigrants whose petitions would be approved each year (thereby added to the backlog), as well as the number of backlogged approved petition holders who would receive a green card each year (thereby removed from the backlog). Within each category, the analysis projects the resulting backlog for India, China, the Philippines (for EB3 only), and all other countries or the \"rest of the world\" (RoW). Projected annual additions to the employment-based backlog in the analysis are based on FY2018 USCIS data on approved employment-based immigrant petitions. The analysis holds that number constant through the 10-year period examined. Projected annual reductions to the employment-based backlog are based on green card issuances to approved petitioners and their derivatives. Because S. 386 does not increase the INA's annual worldwide limit of 140,000 green cards issued each year, annual green card issuances in the EB1, EB2, and EB3 categories sum to 40,040 under both scenarios. Projected issuances are based on current DOS data on the number of individuals, by country, who receive EB1, EB2, and EB3 green cards. Under S. 386 , issuances occur from overseas petitioners (the 5.75% set-aside), Schedule A petitioners (nursing and physical therapy occupations), and the remaining individuals with approved petitions according to their priority date or place in the queue. In the analysis, the Hold Harmless provisions alter issuances for FY2021 only, and the three-year Transition Year provisions impact issuances for FY2022 and FY2023. The 5.75% set-aside expires in nine years (FY2029), and the Schedule A set-aside expires in six years (FY2026). (For more detailed methodology information, see Appendix B .) As such, the analysis that follows is an arithmetic exercise beginning with the current EB1, EB2, and EB3 approved petition backlogs, each broken out for India, China, the Philippines (only for EB3), and RoW. For each subsequent year, new petition approvals for prospective employment-based immigrants increase the backlog, and green card issuances to those individuals and their family members reduce the backlog. Because the INA treats derivative immigrants and principal immigrants equally for reaching the annual worldwide limit and maintaining the per-country ceiling, the analysis necessarily includes dependent family members of principal immigrants. Each year's ending backlog balance equals the following year's starting balance. The following sections describe the results of the analysis. Table 1 presents the projected change in the current EB1 backlog after 10 years, as well as current and projected green card wait times. All figures are estimates. Status quo projections are compared to those that model the impact of S. 386 . All figures are estimates. In both scenarios, total annual EB1 green cards issued and total new beneficiaries entering the EB1 queue are assumed to remain the sameâa conservative assumption (see Figure 1 , below). Since the number of new beneficiaries exceeds the number of green cards issued each year, the total backlog under both scenarios is projected to more than double from 119,732 in FY2020 to 268,246 in FY2030. S. 386 would alter how the backlog grows by country of origin over this period. For Indian nationals, the backlog would increase by only 21% under the bill's provisions, instead of 118% under current law. Chinese nationals would experience a 115% backlog increase, instead of a 215% increase. Nationals from all other countries would bear the impact of these reductions. Their backlog would increase by more than five times over this period, from 21,425 to 125,852. Projected years to receive a green card for those waiting in the EB1 backlog reflect these shifts. Currently, backlogged EB1 Indian nationals can expect to wait up to eight years before receiving a green card. This also means that the current queue of 73,482 Indian nationals would require eight years to disappear. Under S. 386 , this time would decrease to three years, and the number of years required to eliminate the backlog for Chinese nationals would decrease from five to three years. The backlog for RoW nationals would benefit from the Hold Harmless provisions in S. 386 and thus would disappear after one year under both scenarios. In FY2030, however, RoW nationals would experience projected wait times of seven years for a green card under S. 386 , instead of one year under current law. In contrast, by FY2030, projected wait times for Indian and Chinese nationals would decline from 18 and 15 years, respectively, under current law, to seven years for each group. Although rates of backlog increase and wait times diverge among country-of-origin groups, the common theme illustrated in Table 1 is the sizeable increase in the number of foreign workers and their dependents, largely residing in the United States, who would wait extended periods to obtain LPR status. Under this projection, the annual number of foreign workers sponsored for EB1 petitions continues to exceed (by an amount fixed at the FY2018 level) the number of statutorily mandated EB1 green cards. Table 1 shows all EB1 foreign nationals in FY2030 facing the same seven-year wait to receive a green card. This demonstrates how eliminating the per-country ceiling under the provisions of S. 386 would convert the current employment-based system from one constrained by country-of-origin limits into one that functions on a first-come, first-served basis. Table 2 presents projected changes to the current EB2 backlog after 10 years, as well as current and projected wait times for a green card. All figures are estimates. Projections are conducted for the status quo under current law and for if the current version of S. 386 were enacted. All figures are estimates. Outcomes for the EB2 petition backlog would diverge considerably from those of the projected EB1 backlog because of the sizable difference between the current EB1 and EB2 backlogs. At 627,448 petitions, the current EB2 backlog is more than five times the size of the EB1 backlog (119,732 petitions) and is dominated overwhelmingly (91%) by Indian nationals. Chinese nationals make up the remaining 9% of the EB2 backlog. No EB2 backlog currently exists for nationals from any other country. Total annual new beneficiaries entering the EB2 backlog and total EB2 green cards issued each year are the same under both scenarios. Since new entering beneficiaries always exceed green cards issued, the total backlog under either scenario is projected to more than double from 627,448 in FY2020 to 1,471,360 in FY2030. As with EB1 petitions, S. 386 would alter how the backlog grows by country of origin over this period. For Indian nationals, the backlog would increase by a smaller percentageâ77% under the bill's provisions compared with 123% under current law. Chinese nationals, in contrast, would see their backlog increase by a greater percentage under the bill's provisionsâ217% versus 194% under current law. Nationals from all other countries, however, would experience the most notable difference in FY2030. Instead of a relatively small backlog of 30,051 that would disappear after a year under current law, RoW nationals would face a backlog nine times its current size (278,333). The differential outcomes that S. 386 provides to Indian and Chinese nationals is also seen in the number of years they would have to wait for a green card by FY2030. Table 2 shows that under either scenario, green card wait times would increase for all groups in FY2030 compared to FY2020. Under current law, and owing to a limited number of green card issuances, the current backlog of 568,414 Indian nationals would require an estimated 195 years to disappear. By FY2030, this estimated wait time would more than double. Under S. 386 , the estimated wait time for newly approved EB2 petition holders would shrink to 17 years, and in FY2030, the wait time would be 37 years, the same as for all other foreign nationals. The significant drop in FY2030 green card wait times for Indian and Chinese nationals under S. 386 would come at the expense of nationals from all other countries. RoW nationals would see their EB2 backlog and wait times increase substantially. Currently, no backlog exists for persons with approved EB2 petitions from RoW countries. Under the current system, EB2 petition approval for anyone from other than India or China generally leads to a green card with no wait time. By removing the per-country ceiling, however, S. 386 would create a new RoW backlog by FY2030 that would be nine times its projected size under current conditions Table 3 presents projected changes to the current EB3 backlog and green card wait times for both current law and following the potential enactment of S. 386 . All figures are estimates. The EB3 analysis also includes projections for Filipino nationals, who represent relatively large numbers of foreign-trained nurses. As with the EB1 and EB2 categories, Indian nationals dominate the backlog, with 81% (137,161) of the total queue of 168,317 approved petitions. Chinese nationals represent 12% and Filipino nationals the remaining 7%. No backlog currently exists for nationals from all other countries. The annual number of new beneficiaries entering the EB3 backlog and total EB3 green cards issued are the same each year under both scenarios, increasing almost all backlogs between FY2020 and FY2030. As with EB1 and EB2 petitions, S. 386 would alter how the backlog grows by country of origin over this period. For Indian nationals, the backlog is projected to decline by 8% under the bill's provisions compared with a 79% increase under current law. Chinese nationals, in contrast, would see almost no change in their backlog under the bill's provisions compared to current law. Filipino nationals would see a 25% increase in their relatively small backlog. RoW nationals would experience the most notable difference in FY2030, with the backlog increasing to roughly double the size under S. 386 (251,171) compared to the projected backlog under current law (136,783). Projected years to receive a green card for those waiting in the EB3 queue reflect these changes in backlog size. Currently, new Indian beneficiaries entering the EB3 backlog can expect to wait 27 years before receiving a green card. Under S. 386 , this wait time would shorten to seven years, and the wait time for Chinese nationals would increase from five to seven years. For Filipino and RoW nationals, FY2020 wait times would not change. By FY2030, however, wait times under S. 386 would equalize the substantial differences in green card wait times under current law, with RoW nationals waiting an estimated 11 years to receive a green card. This analysis projects the impact of eliminating the 7% per-country ceiling on the first three employment-based immigration categories over a 10-year period. It models outcomes under current law, as well as under the provisions of S. 386 , as amended. The bill would phase out the per-country ceiling over three years and reserve green cards for certain foreign workers, among other provisions. S. 386 would not increase the total number of employment-based green cards, which equals 120,120 for the first three employment-based categories under current law. The analyses of the EB1, EB2, and EB3 categories all project similar outcomes: Indian nationals, and to a lesser extent Chinese nationals, who are currently in the employment-based backlog would benefit from shorter waiting times under S. 386 compared with current law. The bill would eliminate all current EB1, EB2, and EB3 backlogs in 3, 17, and 7 years, respectively, with some modest differences by country of origin. Once current backlogs are eliminated under the Hold Harmless provision of S. 386 , persons with approved employment-based petitions would receive green cards on a first-come, first-served basis, with equal wait times within each category, regardless of country of origin. In FY2030, foreign nationals with approved EB1, EB2, and EB3 petitions could expect to wait 7, 37, and 11 years, respectively, regardless of country of origin. By contrast, maintaining the 7% per-country ceiling would, over 10 years, substantially increase the long wait times to receive a green card for Indian and Chinese nationals, but it would also continue to allow nationals from all other countries to receive their green cards relatively quickly. S. 386 would not alter the growth of future backlogs compared to current law. This analysis projects that, by FY2030, the EB1 backlog would grow from an estimated 119,732 individuals to an estimated 268,246 individuals; the EB2 backlog, from 627,448 individuals to 1,471,360 individuals; and the EB3 backlog, from 168,317 individuals to 456,190 individuals. In sum, the total backlog for all three employment-based categories would increase from an estimated 915,497 individuals currently to an estimated 2,195,795 by FY2030. If the current number of new beneficiaries each year continues, these outcomes would occur whether or not S. 386 is enacted, as the bill contains no provisions to change the number of green cards issued. As noted throughout this report, all figures from this analysis are estimates. They are based largely on the assumption that current immigration flowsâof newly approved employment-based immigrant petitions added to the backlog and of employment-based green card issuances by country of origin re moved from the backlogâremain constant over 10 years. As such, results from the analysis are subject to change, depending on how numbers of future petition approvals and green card issuances deviate from current levels. In one respect, the analysis yields conservative estimatesâit assumes that the number of new beneficiaries entering the employment-based immigration system will remain at their FY2018 levels. USCIS data for the past decade, however, show a consistent upward trend in the number of approved I-140 employment-based immigrant petitions ( Figure 1 ). Regarding green card issuances, the analysis is not subject to future variation because under current law or the provisions of S. 386 , the number of employment-based green cards issued each year remains fixed by statute. In FY2018, the former exceeded 262,000, while the latter remained at 120,120. The number of employment-based immigrants who are sponsored by U.S. employers and who enter the immigration pipeline with the aspiration of acquiring U.S. lawful permanent residence far exceeds the number of LPR slots available to them. Removing the 7% per-country ceiling would initially reduce wait times considerably for Indian and Chinese nationals in the years following enactment of S. 386 , but it would do so at the expense of nationals from all other countries, as well as of the enterprises in which the latter are employed. In a decade, wait times would equalize among all nationals within each category, regardless of country of origin. This outcome may appear more equitable to some because prospective immigrants from all countries would have to wait the same period to receive a green card. However, it may appear less equitable to others because it would make backlog-related waiting times apply to nationals from all countries rather than just nationals from a few prominent immigrant-sending countries. S. 386 would not address the imbalance between the number of foreign nationals who enter the employment-based pipeline and the number who emerge with LPR status. Four options Congress could consider related to the current employment-based immigration backlog include maintaining current law by leaving the 7% per-country cap as is; removing the 7% per-country cap for employment-based immigrants as is proposed under S. 386 ; increasing the number of employment-based LPRs permitted under the current system; or reducing the number of prospective immigrants entering the employment-based pipeline. These options are not necessarily mutually exclusive and could be considered in combination with others. Some Members of Congress have also introduced legislation that would offer more substantial structural changes to the employment-based system. Maintain C urrent L aw . Supporters of the per-country ceiling cite the current law's original purpose of this provision: to prevent nationals from a few countries from monopolizing the limited number of employment-based green cards. This 7% threshold allows prospective immigrants from other countries to acquire LPR status in a relatively short time, diversifying the skilled pool of workers from which U.S. employers may draw. To the extent that prospective immigrants from high immigrant-sending countries such as India and China concentrate in particular industrial sectors, the per-country ceiling imposes constraints on some industries and allows others to access that worker pool. Because Indian nationals, in particular, have entered the employment-based backlog in relatively large numbers over the past two decades, they experience the most pronounced impact of the per-country ceiling. Some Indian nationals currently wait for decades to receive green cardsâand in the case of new EB2 petition holders, centuries. Some Indian nationals consider this provision of the law discriminatory and unfair. Remove A nnual P er- C ountry C eiling for E mployment- B ased I mmigrants . Supporters of removing the per-country ceiling emphasize the inordinately long wait times which, as shown above, require Indian nationals who enter the employment-based backlog to wait an estimated 8, 195, and 27 years, respectively, for green cards in the EB1, EB2, and EB3 categories. This analysis estimates that, holding current conditions constant, these wait times could increase to 18, 436, and 48 years, respectively, by FY2030. Long wait times call into question the legitimate functioning of the employment-based pathway to lawful permanent residence when large numbers of current and prospective backlogged workers remain in temporary status most, if not all, of their working lives. Opponents of removing the per-country ceiling maintain that it currently functions as intended. They point to the concentration of Indian and Chinese nationals in the U.S. information technology sector and argue that prospective employment-based immigrants from other countries benefit far more segments of the U.S. economy. Increase N umber of E mployment- B ased LPR s under C urrent S ystem. The number of green cards for employment-based immigrants could be increased by altering current numerical limits for specific categories or the total worldwide limit. Some have proposed exempting accompanying family members to achieve this goal. Other proposals would increase employment-based immigrants in exchange for reducing the number of other immigrant types, such as family-based preference or diversity immigrants. Such legislation would alleviate current and future employment-based backlogs more expediently than under the current system. Supporters of expanding the number of green cards point out that the current limit of 140,000 for all five employment-based preference categories (120,120 for the first three) was established 30 years ago when the U.S. economy was half its current size. They contend that the larger U.S. economy and the shifting economic importance of technological innovation reinforces the need to find the \"best and brightest\" workers, including from overseas, who can contribute to U.S. economic growth. Opponents of increasing the number of employment-based green cards point to the lack of evidence indicating labor shortages in technology sectors. They contend that the green card backlog harms U.S. workers by forcing them to compete in some industries with foreign workers who may accept more onerous working conditions and lower wages in exchange for LPR status. Some also argue that current immigration levels are too high. Legislation increasing the number of green cards may face resistance from the Trump Administration and some Members of Congress who oppose increasing immigration levels. Reduce N umber of P rospective I mmigrants E ntering E mployment- B ased P ipeline . A primary pathway to acquire an employment-based green card is by working in the United States on an H-1B visa for specialty occupation workers, getting sponsored for a green card by a U.S. employer, and then adjusting status when a green card becomes available. When first established in 1990, the H-1B program was limited to 65,000 visas per year. Current limits have since been expanded by excluding H-1B visa renewals and H-1B visa holders employed by nonprofit organizations and institutions of higher education, as well as 20,000 aliens holding a master's or higher degree (from a U.S. institution of higher education). In FY2019, for example, 188,123 individuals received or renewed an H-1B visa, far more than the original 65,000 annual limit. Although some other nonimmigrant visas allow foreign nationals to work in the United States, the INA permits only H-1B and L visa holders to be \"intending immigrants\" who can then renew their status indefinitely while waiting to adjust to LPR status. Eliminating this \"dual intent\" classification or otherwise reducing the number of prospective immigrants entering the employment-based backlog would reduce the growth of the backlog and shorten wait times. Arguments against reducing skilled migration emphasize the impacts on economic growth in certain industrial sectors. Reform S tructure of E mployment- B ased I mmigration S ystem. Some recent legislative proposals have taken broader approaches toward restructuring the employment-based immigration system. The Trump Administration and some Members of Congress have proposed changing the current system from one that relies on employer sponsorship to a merit-based system that would rank and admit potential immigrants based on labor market attributes and expected contributions to the U.S. economy. Other Members of Congress have introduced proposals establishing place-based immigration systems that would let each state determine the number and type of temporary workers it needs. All of these approaches exceed the scope of the more narrow discussion of the numerical and per-country limits addressed in this analysis. Appendix A. Employment-Based Preference Categories Within permanent employment-based immigration, the Immigration and Nationality Act (INA) outlines five distinct employment-based preference categories. Each of the five categories is constrained by its own eligibility requirements and numerical limit ( Table A-1 ). Appendix B. Methodological Notes The results presented in this report are based on an arithmetic projection of the employment-based backlog under current law and under the provisions of S. 386 , as amended. Each element of the projection is described below. Current Backlog Balance . The current backlog balance consists of individuals who possess approved employment-based petitions and who are waiting for a statutorily limited green card. For this analysis, CRS obtained unpublished data from U.S. Citizenship and Immigration Services (USCIS) indicating, for each of the countries within the three employment-based categories analyzed herein, the number of people with approved I-140 petitions. The USCIS data are further broken down by year of priority date, indicating the numerical order in which approved petitions in the backlog are to receive green cards. New Petition Approvals . To estimate newly approved petitions of prospective employment-based immigrants, the analysis relies on unpublished USCIS figures of EB1, EB2, and EB3 petitions approved in FY2018. The figures are further divided by country, for India and China only. These figures include only principal immigrants and do not account for derivative immigrant family members who accompany or follow to join the principal immigrants and who are included within the same statutory numerical limits. Derivative immigrants are estimated by multiplying the number of principal immigrants by the average derivative-to-principal immigrant ratios ( derivative multipliers ). Hold Harmless Issuances . As noted above, S. 386 contains a provision ensuring that no one holding an approved petition waits additional time in the backlog as the result of the bill's passage. This provision applies to EB1, EB2, and EB3 categories. To approximate the Hold Harmless provision's impact, this analysis assumes that requirements for this provision would be met with one year's worth of issuances under current law, or current issuances, as recorded by the most recent FY2019 U.S. Department of State (DOS) annual visa report. Overseas Petitioner Issuances . As noted above, S. 386 contains a provision that would reserve up to 5.75% (2,302) of the 40,040 EB2 and EB3 green cards for foreign nationals petitioning from overseas. Most prospective employment-based immigrants in the backlog already reside in the United States. When notified by DOS that a visa number is available for them, they can apply with USCIS to adjust status from a nonimmigrant status (e.g., possessing an H-1B visa) to LPR status. However, some backlogged prospective immigrants reside abroad in their home countries. Employers seeking to hire these individuals face a competitive disadvantage because they are not already employing them. Individuals based overseas who face long wait times are likely to advance their careers elsewhere rather than wait abroad for years to receive an employment-based green card in the United States. This analysis assumes that green cards reserved under this provision would be used mostly by RoW country nationals who currently face no wait times. Schedule A Issuances . S. 386 contains a provision that would reserve up to 4,400 green cards for Schedule A occupations (professional nurses and physical therapists). Under the most recent version of the bill, this set-aside would last for six years following enactment. The set-aside includes 4,400 principal immigrants, as well as their family members, effectively doubling the provision's impact. To estimate the number of family members, the analysis assumes that Schedule A principal immigrants brought with them an average of 1.06 derivative immigrants. As such, the total set-aside under this provision is 4,400 principal immigrants plus 4,664 derivative immigrants, for a total set-aside of 9,064 immigrants. Because of the Hold Harmless provisions, Schedule A issuances are projected to start in Year 2 of the analysis (FY2022). Issuances are distributed between nationals from the Philippines, which send the majority of foreign-trained immigrant nurses to the United States, and nationals from all other countries. Transition Year Issuance s. S. 386 contains provisions that would allow a transition from the current 7% per-country ceiling to its elimination in the first three years following enactment. The transition would affect issuances in the first three years following enactment. Because all of the issuance provisions described above overlap during the first few years, this analysis gives precedence to the Hold Harmless, Overseas Petition, and Schedule A issuances over the Transition Year issuances. Consequently the 40,040 green cards allocated by S. 386 to the EB1, EB2, and EB3 categories according to Table B-1 are first reduced by the Overseas Petition and Schedule A issuances before being allocated according to the Transition Year provisions. In addition, Year 1 (FY2021) Transition Year issuance limits are preempted by the higher priority Hold Harmless issuances for that year . Backlog Reduction Methodology . Backlogged employment-based petition holders are issued green cards in the analysis according to the year in which they entered the backlog. Although the issuance limits described above quantify the number of issuances for each country in each of the three employment-based preference categories, the elimination of the current existing backlog is based on how many backlogged petitions can be processed within annual green card limits and on which country's nationals have the oldest petitions. In FY2018, USCIS approved 22,799 EB1, 66,904 EB2, and 34,964 EB3 petitions, per the November 2019 report cited above. Factoring in family members using the derivative multipliers for each EB category described aboveâ1.48 for EB1, 1.00 for EB2, and 1.06 for EB3âyields an estimated 56,542 new additions to the EB1 backlog, 133,808 new additions to the EB2 backlog, and 72,026 new additions to the EB3 backlog. Given that 40,040 statutorily mandated green cards can reduce these backlogs each year, the net result is an estimated increase in the EB1, EB2, and EB3 backlogs each year by 16,502, 93,768, and 31,986 petitions, respectively (i.e., approved principal immigrant green card petitions, increased by their dependents and reduced by green card issuances). As a result, the estimated total EB1 backlog at the start of FY2020 of 119,732 ( Table 1 ) increases by a projected 148,518 individuals over nine years (16,502 x 9), resulting in an estimated EB1 backlog at the start of FY2030 of 268,260. The estimated total EB2 backlog at the start of FY2020 of 627,448 ( Table 2 ) increases by a projected 843,912 individuals over nine years (93,768 x 9), resulting in an estimated EB2 backlog at the start of FY2030 of 1,471,360. The estimated total EB3 backlog at the start of FY2020 of 168,317 ( Table 3 ) increases by a projected 287,874 individuals over nine years (31,986 x 9), resulting in an estimated EB3 backlog at the start of FY2030 of 456,191. These totals are further broken down in the analysis by the provisions of S. 386 that allocate the 40,040 annual green card issuances according to the provisions described above. Those provisions alter the number of green cards that nationals from individual countries would otherwise receive under current law. The overall projected impact on the total backlog remains the same whether or not S. 386 is enacted.", "summary": "Currently in the United States, almost 1 million lawfully present foreign workers and their family members have been approved for, and are waiting to receive, lawful permanent resident (LPR) status (a green card ). This employment-based backlog is projected to double by FY2030. It exists because the number of foreign workers whom U.S. employers sponsor for green cards each year exceeds the annual statutory green card allocation. In addition to this numerical limit, a statutory 7% per-country ceiling prevents the monopolization of employment-based green cards by a few countries. For nationals from large migrant-sending countriesâIndia and Chinaâthe numerical limit and per-country ceiling have created inordinately long waits for employment-based green cards. New prospective immigrants entering the backlog (beneficiaries) outnumber available green cards by more than two to one. Many Indian nationals will have to wait decades to receive a green card. The backlog can impose significant hardship on these prospective immigrants, many of whom already reside in the United States. It can also disadvantage U.S. employers, relative to other countries' employers, for attracting highly trained workers. Solutions for addressing the employment-based backlog have been introduced in Congress. In July 2019, the House passed H.R. 1044 , the Fairness for High-Skilled Immigrants Act. Currently under consideration by the Senate ( S. 386 , as amended), the bill would eliminate the 7% per-country ceiling. Supporters of the bill argue it would ultimately treat all prospective immigrants more equitably regardless of origin country. Opponents contend it would allow nationals from a few countries, and their U.S. employers, to dominate most employment-based immigration. They argue that S. 386 ignores the fundamental issue of too few employment-based green cards for an economy that has doubled in size since Congress established the current limits in 1990. This report describes the results of a CRS analysis that projects the 10-year impact of eliminating the 7% per-country ceiling on the first three employment-based immigration categories: EB1, EB2, and EB3. It models outcomes under current law and under the provisions of S. 386 , as amended. The bill would phase out the per-country ceiling over three years and reserve green cards for certain foreign workers, but it would not increase the current limit of 120,120 green cards for the three employment-based immigration categories. The analysis projects similar outcomes for all three employment-based categories: Indian, and to a lesser extent Chinese, nationals in the backlog would experience shorter wait times under S. 386 compared with current law. The bill would eliminate current EB1, EB2, and EB3 backlogs in 3, 17, and 7 years, respectively, with modest differences by country of origin. Subsequently, new prospective immigrants would receive green cards on a first-come, first-served basis with equal wait times within each category, regardless of origin country. By FY2030, EB1, EB2, and EB3 petition holders could expect to wait 7, 37, and 11 years, respectively. Maintaining the 7% per-country ceiling, by contrast would substantially increase the already long wait times for Indian and Chinese nationals, but it would continue to allow those from elsewhere to receive green cards relatively quickly. S. 386 would not reduce future backlogs compared to current law. Given current trends, the analysis projects that by FY2030, the EB1 backlog would grow from an estimated 119,732 individuals to an estimated 268,246 individuals; the EB2 backlog would grow from 627,448 to 1,471,360 individuals; and the EB3 backlog, from 168,317 to 456,190 individuals. The total backlog for all three categories would increase from an estimated 915,497 individuals currently to an estimated 2,195,795 individuals by FY2030. These outcomes would occur whether or not S. 386 is enacted, because the bill maintains the current limit on number of green cards issued. Some legislative options include one or more of the following: maintaining current law, removing the per-country ceiling, increasing the number of employment-based green cards, and reducing the number of workers entering the employment-based immigration pipeline. Broadly restructuring the entire employment-based immigration system could involve merit-based or place-based approaches.", "document_type": "crs"}
{"report": "In general, the rules of the World Trade Organization (WTO), of which the United States is a member, require each member to apply tariffs and duties equally to all other members. This principle, known as unconditional most-favored-nation (MFN) treatment, has been central to the rules-based global trading system since 1947 and part of U.S. law and foreign policy since 1922. The WTO agreements allow exceptions to this treatment in certain circumstances, including to remedy unfair trade practices and to help domestic industries adjust to sudden surges of fairly traded goods. The three most frequently applied U.S. trade remedy laws permit the imposition of antidumping duties, countervailing duties, and safeguards. These laws are enforced through administrative investigations and actions of two U.S. government agencies: the International Trade Administration of the Department of Commerce (ITA) and the U.S. International Trade Commission (USITC). The most commonly used of these remedies are antidumping (AD) laws. AD laws provide relief to domestic industries that have been, or are threatened with, material injury caused by imports sold in the U.S. market at prices that are shown to be less than fair value. The relief provided is an additional import duty, calculated by the ITA and placed on the dumped imports. Antidumping orders are the most frequently used and the most controversial trade remedy. In general, dumping occurs when manufacturers export goods for less than they sell similar goods in their domestic market. The controlling international agreement in the World Trade Organization (WTO) â the Antidumping Agreement (ADA) â defines dumping as the introduction of a product \"into the commerce of another country at less than its normal value, if the export price of the product exported from one country to another is less than the comparable price, in the ordinary course of trade, for the like product when destined for consumption in the exporting country.\" U.S. law similarly defines dumping as the \"sale or likely sale of goods [in the United States] at less than fair value,\" with the fair value defined as \"the price at which the foreign like product is first sold â¦ for consumption in the exporting country.\" Simply put, dumping is the sale of goods abroad for less than the price the goods would have commanded in the home market. Economists have long written about the practice of selling exports for a lower price than in the home market. In 1776, Adam Smith noted the practice by manufacturers to export some of their surplus goods for sale at a loss for the purpose of \"[doubling] the price of their goods in the home market.\" Several years later, Alexander Hamilton expressed concern with the practice and its potential to stymie the development of domestic industry. However, such mentions were sporadic and generally isolated to economic treatises. As more countries industrialized in the late-nineteenth century, exporting goods for a price below the price that could be commanded in the domestic market (whether at a loss or not) became an economic strategy used to maintain domestic prices while establishing footholds in foreign markets. The expansion of these practices resulted in more sustained scholarly and political attentionânot all negative. In 1880, for example, the U.S. Secretary of State encouraged cotton manufacturers to \"sacrifice profits for a time, if necessary, to secure trade-standing in â¦ several markets.\" Twenty-five years later, the U.S. Department of Commerce and Labor was still dispensing similar advice to manufacturers. Because of this strategic deployment of dumping, and the reemergence of state-directed trade policies at the turn of the twentieth century, politicians and the public (if not always the economists) began to argue that the practice was unfair. Accusations of using foreign markets as \"dumping-grounds\" became frequent and the term \"dumping\" to describe the practice of selling surplus goods abroad at a lower price began to be used more frequently. British industrialists protested dumping from German and French manufacturers, while Canadian millers grumbled about the dumping of American steel. While accusations of dumping were common, the actual prevalence of the practice is hard to calculate, in part because there was no administrative apparatus to investigate such complaints. Nevertheless, experts generally agree that there was, in fact, at least a modest increase in the practice. There were several possible causes for whatever dumping existed at the time. First, higher tariffs in general encouraged the practice. As a leading scholar of antidumping has argued, \"These tariffs provided national firms the opportunity to price monopolistically at home and at the same time protected them from reimports of goods they sold competitively abroad.\" Other observers have noted that dumping was, in some respects, a natural development of trade in industrially advanced countries as large manufacturers attempted to offset changes in domestic demand by selling large surpluses abroad. During the first decades of the twentieth century, countries began to take action to prevent dumping or, at least, protect their domestic industries from dumping. In 1904, Canada enacted the world's first modern antidumping (AD) law. By 1921, Australia, New Zealand, South Africa, France, Japan, the United States, and Britain had proposed or enacted AD statutes or other legislation giving administrative officials discretion to alter tariffs in response to influxes of goods at abnormally low prices. Many of the statutes, including the American, were modeled on the Canadian law. The Economic and Financial Section of the League of Nations Secretariat (the precursor to the United Nations) also commissioned studies on the issue to survey AD legislation and see if there was a need for international regulation. U.S. AD law had precursors in late-nineteenth-century antitrust legislation. Some early observers argued that dumping was a strategy used to injure or hinder development and maintain monopolistic dominance over foreign countries. In 1916, Congress passed the Antidumping Act, which imposed criminal and civil penalties on any person importing and selling articles in the United States \"at a price substantially less than the actual market value or wholesale price of such articles\" so long as they had the intent of injuring or preventing the establishment of an industry in the United States. The law was rarely applied, in part because it was difficult to prove such an intent. U.S. antidumping law took its modern form with the passage of the Antidumping Act of 1921, which adopted a more globally common administrative (rather than judicial) procedure that enabled the imposition of additional duties on imports rather than civil or criminal penalties (as the antitrust branch of legislation had). The Antidumping Act of 1921 became the textual basis for Article VI of the General Agreement on Tariffs and Trade (GATT) in 1947, the multilateral trade agreement that established the post-World War II rules-based trading system and which was later incorporated into the World Trade Organization (WTO) agreements. As such, the U.S. model of antidumping has become the global standard. Since 1921, Congress has amended and adjusted U.S. antidumping law many times, but has maintained the basic administrative framework and Article VI was clarified and amended by the ADA as part of the establishment of the WTO in 1995. Statutory authority for AD investigations and remedial actions is found in Subtitle B of Title VII of the Tariff Act of 1930, as amended (codified, as amended, at 19 U.S.C. Â§Â§1673 et seq .). The law requires the imposition of an antidumping duty if (1) the International Trade Administration of the Department of Commerce (ITA) determines that imported merchandise is being, or likely to be, sold in the United States at less than fair value; and (2) the U.S. International Trade Commission (USITC) determines that an industry in the United States is materially injured or is threatened with material injury, or that the establishment of an industry is materially retarded, by reason of imports of that merchandise. The statute requires that the AD duty equal the amount by which the normal value (a calculation of the fair value) of the merchandise exceeds the export price of the merchandise. The United States is a party to several international agreements that govern the use of AD laws, including Article VI of the General Agreement on Tariffs and Trade (GATT), which was incorporated into the agreements establishing the WTO, and the WTO's Antidumping Agreement (ADA). Both of these agreements were based upon U.S. AD law and practice and the United States was a proponent of both agreements. All WTO members are subject to the terms of Article VI of the GATT and the Antidumping Agreement. Article VI of GATT allows the imposition of antidumping duties in cases where dumping \"causes or threatens material injury to an established industry in the territory of a contracting party or materially retards the establishment of a domestic industry.\" The ADA elaborates on the basic principles established in Article VI of the GATT by providing more detail on several issues, including how WTO members may determine whether dumping is occurring, how they determine whether there has been an injury to a domestic industry, what kinds of evidence can be used, and other issues. WTO members whose antidumping laws or practices violate the terms of the ADA may be subject to WTO dispute settlement proceedings. The ITA initiates antidumping investigations either on its own initiative or in response to a petition filed by a representative of a domestic industry with the USITC and the ITA. If the ITA receives a petition, it must normally initiate an investigation within 20 days after it receives a petition and determines that the petition contains the necessary elements for imposing a duty. The USITC begins the investigation. The central question of its investigation is whether there is a reasonable indication of an injury or likely injury to a domestic industry. If the USITC's preliminary determination is negative or the USITC determines that imports of the subject merchandise are negligible, then proceedings end. In most circumstances, the USITC must make a preliminary determination no later than 45 days after the start of the investigation. If the USITC's preliminary determination is affirmative, then the ITA begins its preliminary investigation to determine whether dumping exists. The ITA must make its determination within 140 days, or within 190 days at the petitioner's request or if the case is extraordinarily complicated. If the ITA's preliminary determination is affirmative, then ITA also estimates a weighted-average dumping margin for each exporter or producer individually investigated and an \"all-others rate\" for all other exporters. The ITA publishes its preliminary results in the Federal Register and orders U.S. Customs and Border Protection (CBP) to delay the final computation of all duties on imports of the targeted merchandise (\"suspend liquidation\") until the case is resolved and to require the posting of cash deposits, bonds, or other appropriate securities to cover the duties (plus the estimated dumping margin) for each subsequent entry into the U.S. market. If the ITA's determination is negative, the ITA continues the investigation to the final stage (without ordering a suspension of liquidation) and the USITC continues its investigation as well. Because this is a preliminary determination, agencies may not have obtained all possible evidence, and this allows interested parties a final opportunity to put information and evidence before the two bodies. Generally, the ITA must make its final determination within 75 days of the preliminary determination. Before issuing a final determination, the ITA must hold a hearing upon request of any party to the proceeding. If the ITA's final determination is negative, the proceedings end, and any suspension of liquidation is terminated, bonds and other securities are released, and deposits are refunded. If the ITA's final determination is affirmative, it orders the suspension of liquidation if it has not already done so. The ITA will publish the order in the Federal Register and direct CBP to continue or resume (if provisional measures expired) suspension of liquidation and collection of cash deposits at the rate determined in the ITA's final determination. Congress enacted the critical circumstances provision in order \"to provide prompt relief to domestic industries suffering from large volumes, or a surge over a short period, of imports and to deter exporters whose merchandise is subject to an investigation from circumventing the intent of the law by increasing their exports to the United States during the period between initiation of an investigation and a preliminary determination by the [ITA].\" If a petitioner alleges that critical circumstances exist in an antidumping case (which would impose additional retroactive AD duties that one would not normally obtain), then the ITA determines whether: (1)(a) there is a reasonable basis to suspect that there is a history of dumping (combined with material injury due to the imports), or (b) that the importer knew or should have known that the exporter was selling the merchandise at less than fair value, and also knew that there was likely to be material injury due to the sales; and (2) whether massive imports of the merchandise have occurred over a relatively short period. If the ITA makes an affirmative critical circumstances finding, it extends the suspension of liquidation of any unliquidated entries of merchandise (entries for which estimated AD duties have not been paid) into the United States retroactively to 90 days before the suspension of liquidation was first ordered or the date on which notice of the determination to initiate the investigation is published in the Federal Register, whichever is later. Whether or not the ITA's initial critical circumstances determination is affirmative, if its final determination on subsidies or dumping is affirmative, the ITA must also include a final determination on critical circumstances. If the final determination on critical circumstances is affirmative, retroactive duties, if not yet ordered, are ordered on unliquidated entries at this time. If the critical circumstances determination is negative, all retroactive suspension of liquidation is terminated, and bonds, securities, or cash deposits related to the retroactive action are released. If the ITA makes an affirmative determination of critical circumstances, the USITC's final determination must include a finding as to whether the subject imports are likely to undermine seriously the remedial effect of the AD order. If both the USITC and the ITA make affirmative critical circumstances determinations, any AD duty order applies to the goods for which the retroactive suspension of liquidation was ordered. If the final critical circumstances determination of either agency is negative, any retroactive suspension of liquidation is terminated, bonds and securities are released, and any cash deposits are refunded. The ITA or the USITC may terminate an investigation if the petitioner withdraws the petition or of its own accord if the ITA self-initiated the investigation. Additionally, the ITA may, in certain circumstances, suspend an antidumping investigation in favor of an agreement with foreign exporters (known as \"suspension agreements\") that either eliminates the sales of less than fair value or the injurious effect. One example of such an agreement is the recent suspension agreement between the various Mexican growers associations and the United States with respect to fresh tomatoes. The United States agreed to suspend its antidumping investigation in exchange for a promise by various Mexican growers associations accounting for substantially all imports of fresh tomatoes from Mexico not to sell fresh tomatoes in the United States at a price less than an established reference price. Each year, during the anniversary month of the publication of a final AD order, any interested party may request an administrative review of the order. The ITA may also self-initiate a review. During the review process, the ITA recalculates the dumping margin and may adjust the amount of AD duties on the subject merchandise. Suspension agreements are also monitored for compliance and reviewed in a similar fashion. The ITA must make a preliminary determination within 245 days after the last day of the anniversary month of the order or suspension agreement under review, and must make a final determination within 120 days after the publication date of a preliminary determination. New exporters, who were not part of the original review, may also request an expedited review. An interested party may also request a \"changed circumstances\" review from the ITA or the USITC at any time. Under current regulations, upon receipt of such a request, the ITA must determine within 45 days whether to conduct the review. If the ITA decides that there is good cause to conduct the review, the results must be issued within 270 days of initiation, or within 45 days of initiation if all interested parties agree to the outcome of the review. Sunset reviews must be conducted on each AD order no later than once every five years after its publication. In such a review, the ITA determines whether dumping would likely continue or resume if an order were to be revoked or a suspension agreement terminated, and the USITC conducts a similar review to determine whether injury to the domestic industry would be likely to continue or resume. If both determinations are affirmative, the duty or suspension agreement remains in place. If either determination is negative, the order is revoked, or the suspension agreement is terminated. During the first two decades of the GATT, countries infrequently imposed antidumping measures. Only four partiesâthe United States, the European Union (EU), Canada, and Australiaâmade use of the practice, and even that was infrequent. Scholars have given several non-exclusive explanations for the relative dearth of antidumping measures in this period in both the international and U.S. contexts. In the international context, ambiguity within Article VI of the GATT may have discouraged GATT members from making use of the antidumping provisions. Specifically, Article VI does not specify a methodology for deciding whether a product is dumped nor does it set out procedures for AD investigations. Additionally, tariff rates among GATT members were still relatively high, which may have dampened the need for industries to petition for protection through antidumping measures. Likewise, in the United States, the Antidumping Act of 1921 was enacted during a period when tariff rates were relatively high, which may have limited the usefulness of AD duties as a form of protection. Administrative exigencies may have also been a factor. For example, one historian has noted that the Carter Administration shifted responsibility for making the less than fair value determination from the Treasury Department to the Department of Commerce because the \"perceived indifference of Treasury to the plight of petitioning firms\" may have led to fewer findings of dumping and thus fewer measures. Finally, countries, particularly those who were not GATT signatories, had higher average tariff rates and were able to impose other non-tariff barriers to trade to reduce importation of allegedly dumped products, which made resorting to AD measures unnecessary. Over the subsequent decades, dozens of developing countries entered the rules-based trading order, which restricted the use of many non-tariff barriers to trade and encouraged the reduction of tariffs. The reduction of tariffs may have led to an increase in the use of AD measures as an alternative form of protection. AD investigations and actions were uncommon in the decades following the establishment of the GATT. Before the 1990s, the United States, the European Union, Canada, and Australia were responsible for more than 95% of AD actions. Many developing countries did not even have AD laws and procedures. Beginning in the 1990s, however, the number of countries with AD laws multiplied; approximately half of all AD laws in effect today were implemented after 1990. With the increase in the number of countries with AD laws, the major users of AD measures have changed dramatically. In 1994, for instance, India had zero AD measures in force. Twenty-five years later, in 2019, India had 275 AD measures in force, ranking second behind the United States. Between 2008 and 2018, India ranked first in terms of the number of AD measures imposed per year, followed by the United States, Brazil, China, and Argentina. Of the top five users of AD measures prior to 1995, only the United States remains in that top five (see Table 2 ). However, if adjusted for per-dollar imports, both the United States and the EU are relatively light users of AD measures. As more countries have begun to use AD measures, the total number of AD measures in force has increased by more than 600%, jumping from 264 measures in force in 1994 to 1,860 in 2018. Many of the largest users of AD investigations and measures are also among the top targets of AD investigations and measures. China, the United States, and India, are among the top users of AD investigations and measures and are, likewise, the top targets of AD investigations and measures. AD measures are imposed primarily on heavy industrial products from the base-metal and chemical industries. Figure 4 . The adoption of AD laws and the imposition of measures generally occur following moments of increased market integration and trade liberalization, which may explain their expanded use. In effect, AD measures blunt the impact of new imports. For example, many developing countries reduced their tariffs significantly following the Uruguay Round of trade negotiations, which created the WTO. With significantly lower tariffs and fewer other means available to restrict trade, developing countries (like their developed counterparts before them) may have turned to AD laws and AD measures as a preferred means of protecting select domestic industries during their adjustment to the lower average tariff rate. For example, since their entry into the WTO, India, Brazil, China, and Argentina have collectively reduced their tariffs by an average of 63% from a 17.6% applied weighted mean for all products to 6.5%. In that same time, those four countries increased their use of AD measures dramatically. In 1995, those countries had 13 measures in force. By 2018, they had a total of 646 measures in force, an increase of more than 4,800%. Figure 5 . As for AD measures being used rather than some other trade remedy, at least one scholar has argued that AD measures are the most attractive alternative legal form of contingent protection. In general, AD measures are easier to impose. As of February 2020, the United States has 384 AD orders in place affecting imports from 53 countries. The oldest order, which places AD duties on pressure sensitive tape from Italy, has been in place continually since 1977. Seventy-five of the orders have been in place since before the turn of the millennium. The United States is alone among the original four users of AD measures (U.S., EU, Canada, and Australia) in significantly increasing its use of AD measures over the past two decades. The U.S. currently has the highest number of AD measures in force in its history. In comparison, the other three original users have kept the number of measures in force at or below levels reached around the millennium. The United States has been a frequent target of AD investigations initiated by other countries. Between 1995 and 2017, the United States was the target of 296 investigations, 181 (61%) of which led to the imposition of AD measures. The largest user of AD measures against the United States is China (37), with India (30), Brazil (24), Mexico (23), and Canada (12) rounding out the rest of the top five. The reasons for the targeting of the United States are uncertain. They may, however, relate to the use of AD measures as a form of protection during a period of trade liberalization or be viewed as retaliation for the United States' heavy use of AD measures against these countries. Some argue that antidumping measures constitute \"the first and best line of defense for the U.S. economy against companies and countries that resort to predatory and mercantilist tactics to make trade gains.\" Most empirical research, however, has found such predatory pricing is rare. Furthermore, most academic analysts are highly critical of U.S. AD law and practice. Economic analysts in particular note that AD policy is trade distorting. For example, AD duties deflect trade, by causing exporters to seek out markets where their goods are not subject to AD duties. As one pair of economists noted, the suspension agreement on fresh tomatoes from Mexico caused Mexico to make more tomato paste to ship to the United States and to ship more fresh tomatoes to Canada, which in turn shipped more fresh tomatoes to the United States. Many scholars also conclude that AD duties depress consumer activity by raising costs for consumers and propping up unproductive businesses. According to one survey, AD policies globally affect somewhere between 3% and 8% of a country's total imports, making them one of the most costly commercial policies. There is also a general consensus that AD duties, when analyzed economically without consideration of their political benefits for encouraging trade liberalization, depress overall trade. Congress has generally been supportive of AD duties, and reform efforts have been limited despite the generally negative view of the practice held by many economists. Phillip Swagel, the now-director of the Congressional Budget Office and former Assistant Secretary of the Treasury for Economic Policy, recently referred to antidumping as the \"third rail of trade policy,\" arguing that \"few politicians of either party [are] willing to point out its broadly negative impact.\" While many argue that AD laws are economically inefficient if evaluated on their face, some of those critics have conceded \"that even if AD is the largest and most frequently used contingent trade remedy (and the most costly single commercial policy), AD may nevertheless be a desirable policy as it serves an important role in promoting overall trade liberalization by acting as a pressure release valve.\" As Congress considers its overall goals with respect to trade policy, it might weigh dumping's economic costs against its potential role in supporting trade liberalization. Congress could, for example, encourage (in committee hearings) or direct (through legislation) Commerce to change the de minimis thresholds for finding that dumping has taken place or that the dumped goods have caused an injury. Such changes could reduce or encourage the use of the policy. During the negotiations over the establishment of the WTO, the United States persistently advocated for the establishment of robust dispute settlement provisions and Congress required the President to ensure that dispute resolution provisions were included in the final agreement. As a result, the agreements establishing the WTO included the Dispute Settlement Understanding (DSU), which provides for an enforceable means by which members can resolve disputes over WTO commitments and obligations. In recent years, however, several administrations have been critical of the WTO's dispute settlement system in general and with the role of the Appellate Body (AB) in particular. In December, the AB ceased to function as the United States continued to block the appointment of new AB members to replace those whose terms had expired. U.S. AD policies have been at the center of that dispute and Congress might consider reevaluating those policies or renegotiating the agreement underlying the WTO DSU and ADA if it wishes to maintain a functional dispute settlement system at the WTO. The United States has generally been successful in DSU proceedings with the exception of one areaâtrade remedies. Indeed, trade remedy cases in general make up the largest portion of the WTO's dispute settlement docket, with AD being the most frequently disputed policy. Time and time again dispute settlement (DS) Panels and the AB have found U.S. AD policy to conflict with its international commitments. The United States is not alone. Other WTO members have also been unsuccessful in defending challenges to their implementation of the ADA. The AD policy that has been at the center of many (although not all) of these disputes is a calculation method referred to as \"zeroing.\" In general, when calculating the dumping margin to determine whether the imposition of antidumping measures on exporters of a product is justified, the ITA will usually average together numerous comparisons between sales in the United States (the export prices) and sales in the home market (the normal value). The ITA will aggregate hundreds or even thousands of individual transactions together in this process. The amount by which the normal value exceeds the export price of a given product is the dumping margin. However, if the export price exceeds the normal value (that is, if the price in the United States is greater than the domestic price) and thus produces a negative result, the United States, in certain circumstances, will adjust the negative values to zero. As an economist at the Department of Justice put it, \"The use of 'zeroing' will almost always increase the level of any antidumping duty, and will sometimes create a duty where none would have been imposed, had the methodology not been used.\" Consider the following simplified example: the average home market price and export price for a product for the entire month were both $100. As such, the dumping margin and weighted average dumping margin when averaged without zeroing were both zero because the transaction on September 7, for example, was offset by the transaction on September 25. However, when zeroing is applied, the September 25 transaction is set to zero. When this is applied across all values, the aggregate dumping margin is $55 leading to a weighted average dumping margin of 7.85%. One pair of economists determined in 2010 that if the United States were to stop zeroing, \"then perhaps as much as half of all U.S. AD measures would be removed and the duties in the other cases would fall significantly.\" The U.S. Trade Representative (USTR) asserts that this method allows the United States to \"focus on those transactions in which dumping occurs.\" Under the relevant WTO agreements, the USTR argues, \"Members may calculate a margin of dumping on a transaction-by-transaction basis, and, thus, collect duties only on dumped imports, while collecting no duties on non-dumped imports. There is no requirement to offset dumped transactions with transactions in which dumping did not occur.\" The U.S. Trade Representative has asserted that this is a common-sense method of calculating the extent of dumping that is injuring a domestic industry\" and that the elimination of zeroing \"artificially reduces the margin of dumping,\" Opponents of zeroing argue that its effect is to artificially increase dumping margins and increase the likelihood that AD measures will be imposed. Specific concerns include that \"zeroing makes it extremely difficult for a firm to avoid dumping\" because the reasons for price variation, such as seasonality, exchange rates, and variations in shipping costs, are not taken into account. As a result, products subject to greater price variation will be more frequently subject to AD duties. As the United States is the only country to actively zero, it seems unlikely that zeroing is strictly necessary to ensure that AD policy is effective at preventing dumping. One economist estimated in 2008 that \"zeroing could add perhaps 3-4 % to the typical U.S. antidumping duty with a cost to the U.S. of around $150 million per year when all existing U.S. antidumping orders were determined by zeroing.\" Since 1995, more than 30 Panel and Appellate Body (AB) decisions have found the use of zeroing in specific AD investigations to be inconsistent with the ADA; the AB has held more than a dozen times that zeroing in one form or another cannot be used. In all but two cases involving zeroing, the United States has been the respondent. In two early cases, the EU was the respondent, but it changed its practices after the AB found its implementation of the practice to be inconsistent with the terms of the ADA. The United States has been a respondent in more than 150 disputes before the WTO. Fifty-six of those involved the ADA and many of those cases involved zeroing. In all the finalized cases, the United States lost or settled. Indeed, CRS analysis has found that nearly half of all cases where the WTO found a U.S. practice to not be in compliance with WTO obligations involved dumping. Much of the U.S. criticism levied at the WTO's AB over the past decade, some have argued, has been primarily the result of cases involving U.S. implementation of the ADA. In a recent report listing U.S. concerns about the AB, the USTR identified six areas of \"Appellate Body errors in interpreting WTO agreements\" that it argues have \"raised substantive concerns and undermine the WTO.\" Five of the six concerned trade remedies, including dumping. Indeed, \"dump\" was the most common trade-related verb in the report. With respect to zeroing, the USTR argues, \"The Appellate Body's invention of a prohibition on the use of \"zeroing\" to determine dumping margins has diminished the ability of WTO members to address dumped imports that cause or threaten injury to a domestic industry.\" The WTO AB's approach to trade remedies in general, and antidumping in particular, have been central in USTR's critique of the AB and thus has likely played a significant role in its decision to block appointments to the AB. However, WTO DSB debates are not over. The USTR has approvingly cited a recent DSB decision that upheld the use of zeroing in certain limited circumstances. As Congress considers the future U.S. relationship with the WTO and the multilateral rules-based trading order, it might address the role that antidumping has played in straining that relationship. For example, Trade Promotion Authority (TPA) expires in 2021. Should Congress decide to reauthorize TPA, it may choose to direct the President to seek revisions to the WTO's DSU of the ADA to address some of these issues. Alternatively, Congress could encourage or direct Commerce to address some of the WTO members' and Appellate Body's concerns. For example, the EU and Canada once employed zeroing in antidumping investigations, but no longer do so.", "summary": "The U.S. Constitution grants to Congress the power to regulate trade with foreign nations and levy tariffs. Since 1922, U.S. law and foreign policy have favored applying tariffs and duties equally to all trading partners. This principle, known as most-favored-nation (MFN) treatment, has been central to the rules-based global trading system since 1947. One of the most frequently invoked exceptions to MFN treatment are three \"trade remedy\" laws. These laws are enforced primarily through administrative investigations of two U.S. government agencies: the International Trade Administration of the Department of Commerce (ITA) and the U.S. International Trade Commission (USITC). Trade remedy laws enable the United States to impose additional duties aimed at specific producers or countries to remedy unfair trade practices and to help domestic industries adjust to sudden surges of fairly traded goods. The three types of laws traditionally classified as \"trade remedies\" are: Antidumping (AD) laws provide relief to domestic industries that have been, or are threatened with, material injury caused by imported goods sold in the U.S. market at prices that are shown to be less than fair market value. The relief provided is an additional import duty placed on the dumped imports based upon calculations made by the ITA. Antidumping orders are the most frequently used and the most controversial trade remedy. Countervailing duty (CVD) laws give a similar kind of relief to domestic industries that have been, or are threatened with, material injury caused by imported goods that have been found to have received WTO-inconsistent government subsidies, and can therefore be sold at lower prices than similar goods produced in the United States. The relief provided is an additional import duty placed on the subsidized imports. Safeguard (also referred to as escape clause) laws give domestic industries relief from surges of imported goods that are fairly traded if serious injury is found or is threatened to the domestic industry. The most frequently applied safeguard law, Section 201 of the Trade Act of 1974, is designed to give domestic industry the opportunity to adjust to the new competition and remain competitive. The relief provided is generally an additional temporary import duty, a temporary import quota, or a combination of both. Safeguard laws also require presidential action in order for relief to be put into effect. Economists have generally seen antidumping laws and policies as economically inefficient. Some, however, have acknowledged the role that these economically inefficient policies have played in making trade liberalization more politically feasible by providing protection for industries that might otherwise oppose such measures. In recent years, U.S. exports have increasingly become a target of AD measures by several major emerging economies, including India and China. Antidumping laws and policies have also been at the center of dozens of trade disputes between the United States and its trading partners in the WTO. Reports issued by the WTO's Appellate Body (AB) on the subject have been one of the primary targets of the U.S. Trade Representative's criticisms of the AB mechanism in the broader WTO dispute settlement system. If Congress wishes to maintain a functional dispute settlement system at the WTO it may consider either directing the President to seek amendments to underlying WTO agreements such that U.S. practices are internationally compliant or direct the ITA to bring its AD policies into conformity with the AB's interpretation of the WTO's Antidumping Agreement.", "document_type": "crs"}
{"report": "On July 2, 1862, with the passage of the first Morrill Act (12 Stat. 503; 7 U.S.C. 301 et seq.), the United States began a then novel policy of providing federal support for post-secondary education, specifically for agriculture and the mechanical arts. The national system of land-grant colleges and universities that has developed since then is recognized for its breadth, reach, and excellence in teaching, research, and extension. Located in every state, Washington, D.C., and many insular areas , these institutions educate the next generation of farmers, ranchers, and citizens, and form the backbone of a national network of agricultural extension and experiment stations. Later federal legislation expanded the scope and reach of the 1862 Morrill Act. Beyond providing initial resources for establishment of the land-grant institutions, the federal government contributes funds annually through a variety of capacity and competitive grants administered by the U.S. Department of Agriculture's (USDA) National Institute of Food and Agriculture (NIFA). Capacity grants, also known as formula funds, are allocated to states based on statutory formulas. Competitive grants are awarded to specific projects selected through peer-review processes. In many cases, the states and territorial governments complement federal appropriations through matching funds. Legislation has also expanded the land-grant system to include historically black colleges and universities (HBCUs) and tribal colleges and universities (TCUs). Additional institutional categories are recognized for specific programs. These categories include non-land-grant colleges of agriculture (NLGCAs), Hispanic-serving agricultural colleges and universities (HSACUs), and cooperating forestry schools. Looking forward, the scheduled fall 2019 relocation of NIFA from its current location in Washington, D.C.; the shifting balance of public and private investment in agricultural research; disparities in state matching funds among the different classes of land-grant institutions; and the funding of TCU land-grant institutions may invite congressional engagement. While state and local governments have roles in the U.S. land-grant university system, this report focuses on federal laws, appropriations, and other matters. Post-secondary education in the American colonies was available to a limited segment of society and focused on a few subject areas. Colonial colleges established in association with Christian denominations enrolled predominantly white men in classical and professional disciplines. New colleges created following independence of the United States from Great Britain broadened enrollment and fields of study. However, lack of reliable funding meant that many closed. In the early- to mid-19 th century, demand grew for post-secondary education in agricultural and technical disciplines, as did interest in educating the populace more broadly. Johnathan Baldwin Turner, a professor at Illinois College, championed a more accessible \"industrial education.\" His \"Plan for a State University for the Industrial Classes,\" presented at an academic conferenceÂ in 1850, contained many elements of the yet-to-be established land-grant university system. In 1857, Representative Justin Smith Morrill of Vermont introduced a bill to establish colleges of agriculture through grants of land to the states. The bill proposed giving federal land, or rights to such land, to the states for the purpose of establishing these colleges. The federal government was already giving land to states to encourage the development of railroads, for example through the Land Grant Act of 1850 (9 Stat. 466). However, granting land to states to establish institutions of higher education was a novel prospect. Congress passed Morrill's bill in 1859 by a slim margin, largely along a North-South divide, and it could not overcome a Presidential veto by James Buchanan. Morrill, who had never attended college himself, presented the bill once again in 1862. The political landscape had changed by then, with onset of the Civil War and accompanying absence of Members of Congress from the southern states. Further, the second introduction of the bill expanded proposed areas of study at the colleges to include military strategy in addition to agricultural and mechanical arts. This bill passed overwhelmingly, and President Abraham Lincoln signed it on July 2, 1862. This first Morrill Act, described in greater detail below, marked the beginning of the U.S. land-grant university system. Notably, Lincoln signed the Morrill Act just seven weeks after signing legislation to establish USDA (12 Stat. 387, enacted May 15, 1862). Between 1872 and 1890, then Senator Morrill introduced twelve bills focused on strengthening the early land-grant university system. Congress passed the last of those bills, and President Benjamin Harrison signed into law the Morrill Act of 1890 (26 Stat. 417). This second Morrill Act provided funding for the land-grant university system and prohibited racial discrimination in admissions policies. It led to the establishment of a group of historically black colleges and universities (HBCUs) known as the 1890 Institutions. The land-grant university system further expanded in 1994 with the addition of a group of tribal colleges and universities (TCUs) now identified as the 1994 Institutions. Senator Jeff Bingaman of New Mexico introduced the Equity in Educational Land-Grant Status Act in 1993. This act became Sections 531-335 of the Elementary and Secondary Education Act reauthorization ( P.L. 103-382 ), and President William J. Clinton signed it into law on October 20, 1994. Land-grant institutions are colleges and universities designated to receive benefits of the Morrill Acts of 1862 and 1890. These acts promoted establishment of institutions of higher learning focused on the agricultural and mechanical arts, without excluding other scientific and classical studies. Land-grant institutions now address many academic fields in addition to those of their foundational colleges of agriculture. There is at least one land-grant institution in each U.S. state, the District of Columbia, the Federated States of Micronesia, and many U.S. territories (see Figure 1 for a map). In 2017, 1.7 million students were enrolled across 109 land-grant colleges and universities, with a portion of those enrolled in those institutions' colleges of agriculture. The federal government provides annual appropriations to U.S. states and territories, often with matching requirements, for use in the land-grant university system. There are three categories of land-grant institution, named for the year in which legislation established them: 1862, 1890, and 1994. The \" Foundational Legislation \" section of this report discusses relevant establishment legislation for these institutions in detail. Most generally, 1862 Institutions are the original land-grant colleges and universities established through the Morrill Act of 1862, as amended. There are fifty-seven 1862 Institutions, located in each state, U.S. territory, and in the District of Columbia. The 1890 Institutions are HBCUs established as land-grant institutions as a result of the Morrill Act of 1890, as amended. There are nineteen 1890 Institutions, primarily in the southeastern states. The 1994 Institutions are TCUs recognized through the Equity in Educational Land-Grant Status Act of 1994, as amended. Congress has defined thirty-six 1994 Institutions through statute. The federal government recognizes additional categories of institutions that are not land-grant institutions, and yet support the mission of the land-grant university system (as discussed below). Cooperating forestry schools, HSACUs, and NLGCAs are eligible for federal funding through specific programs. Federal legislation has given rise to the three functional pillars of land-grant institutions. First among them is the teaching function established through the Morrill Acts of 1862 and 1890. Later legislation added research and extension, establishing the roles of land-grant institutions in producing original agricultural research and in bringing that research to the non-university public through agricultural extension. The U.S. land-grant university system has evolved over the past 150 years. Multiple pieces of legislation have added to its original mission, expanded its reach, and adjusted its funding structure. This section identifies enacted legislation that is among the most significant for land-grant universities (see Table 1 for a summary of select statutes). Details regarding federal funding and state matching requirements are discussed in the section following this legislative overview (\" Funding \"). Funding discussed in this report is discretionary unless otherwise stated. The Morrill Act of 1862 (12 Stat. 503; 7 U.S.C. 301 et seq.) was officially titled, \"An Act Donating Public Lands to the Several States and Territories which may provide Colleges for the Benefit of Agriculture and the Mechanic Arts\" (see legislative excerpt in the text box below). It designated that each state would receive 30,000 acres of federal land for each member of the Senate and House of Representatives it had in Congress at the time. In cases in which insufficient public land was available, states would instead receive land scrip , or certificates of entitlement to such public lands. Money from the sale of this land or land scrip was to be used to support at least one college with the primary purpose of teaching agriculture and the mechanical arts, to \"promote the liberal and practical education of the industrial classes in the several pursuits and professions in life.\" The act prohibited states from using the funds for constructing or maintaining buildings. The Morrill Act of 1890 (26 Stat. 417; 7 U.S.C. 321 et seq.) responded to the need to finance the institutions established through the first Morrill Act. Today, the second Morrill Act is most recognized for its role in the establishment of HBCU land-grant institutions. It provided each state and territory with annual appropriations for the endowment and maintenance of the land-grant colleges. This money was to be used for instruction in specific academic disciplines, and for facilities for such instruction. The second Morrill Act prohibited racial discrimination in admission policies of institutions receiving these funds ( 7 U.S.C. 323 ) . However, it permitted states and territories to meet this requirement by establishing separate institutions \"of like character\" for white and non-white students. In such cases, annual appropriations would be divided \"equitably\" between the two institutions in a manner proposed by the state or territory and reported to the Secretary of the Interior. This condition ultimately resulted in the establishment of 19 federally recognized 1890 Institutions, primarily in the southeastern states. Just over 100 years after the Morrill Act of 1890 facilitated the addition of HBCUs, the Equity in Educational Land-Grant Status Act of 1994 ( P.L. 103-382 Â§531-535; 7 U.S.C. 301 note) added TCUs to the land-grant university system. This act originally designated twenty-nine 1994 Institutions, considered to be land-grant institutions established in accordance with the Morrill Act of 1862 except for the manner in which they would be funded. In lieu of land or land scrip, annual appropriations would endow and maintain them. The Native American Institutions Endowment Fund was created in the U.S. Treasury, and interest payments are distributed annually on a formula basis. Institutions may use these endowment payments at their discretion. The 1994 Institutions are eligible for some, but not all, research and extension funds that are available to 1862 Institutions established through the first Morrill Act. There are currently 36 TCUs designated as 1994 Institutions. Agricultural research in the land-grant university system impacts daily life. Among diverse areas of investigation, researchers at land-grant institutions explore best practices for livestock, fish, and plant breeding; analyze agricultural value chains; examine interactions among soil health, agricultural productivity, and water quality; and look for new and safer pesticides to protect crop production, human health, and the environment. Discoveries achieved through this research at land-grant institutions have improved the lives of producers and consumers in diverse ways. The Hatch Act of 1887 (24 Stat. 440; 7 U.S.C. 361a et seq.) instituted the research function of land-grant universities. It provided for establishment of \"a department to be known and designated as an 'agricultural experiment station ... '\" under the direction of each land-grant institution established under the first Morrill Act. They would aid \" ... in acquiring and diffusing among the people of the United States useful and practical information on subjects connected with agriculture and to promote scientific investigation and experiment respecting the principles and applications of agricultural science ... \" The Hatch Act provided for appropriations to support original agricultural research at these stations, distributed to the states based on a formula in the law. Federal funds distributed in this manner are referred to as capacity grants or formula funds. The Hatch Act ultimately led to development of State Agricultural Experiment Stations (SAES) in each U.S. state, insular area, and the District of Columbia. In the modern day, not all of these stations are physical places, and may be represented instead through individual or groups of researchers at 1862 Institutions, or at associated agricultural or research sites within the state. The 1890 Institutions are not eligible for Hatch Act appropriations. In 1977, the Evans-Allen Act ( P.L. 95-113 Â§1445; 7 U.S.C. 3222 ) gave 1890 Institutions access to agricultural research capacity grants. The Evans-Allen Act is Section 1445 in the National Agricultural Research, Extension, and Teaching Policy Act of 1977 (NARETPA) ( P.L. 95-113 Â§1440-1445; 7 U.S.C. 3222). Evans-Allen funds are appropriated and then distributed according to a statutory formula, in a manner similar to Hatch Act appropriations. The 1994 Institutions are not eligible for research capacity grants under the Hatch or Evans-Allen Acts. However, Section 251 of the Agricultural Research, Extension, and Education Reform Act (AREERA) of 1998 ( P.L. 105-185 ) gave these institutions access to separate competitive agricultural research funding. AREERA amended the Equity in Educational Land-Grant Status Act of 1994 to authorize USDA to award research grants to 1994 Institutions on a competitive basis. This provision requires that the 1994 Institution applying for these funds certify that the proposed research will be conducted in partnership with the USDA Agricultural Research Service (ARS), an 1862 or 1890 Institution, or a cooperating forestry school. Congress has provided appropriations for this competitive grants program. However, lack of predictable annual research funding on a formula basis has raised concerns that 1994 Institutions cannot build their institutional agricultural research capabilities, as 1862 and 1890 Institutions have done. For more, see \" Funding of 1994 Institutions .\" By the mid-20 th century, forestry science capacity was increasingly seen as falling behind national needs. The McIntire-Stennis Cooperative Forestry Act of 1962 (P.L. 87-788; 16 U.S.C. 582a-1 et seq.) authorized forestry research funds. This act encourages coordination of forestry research efforts among state colleges and universities and the federal government. These funds are apportioned to the states in amounts determined by the Secretary of Agriculture in consultation with an advisory council. These apportionments were originally available only to 1862 Institutions, their affiliated SAESs, or public colleges or universities offering graduate training in forestry. The 1890 Institutions were made eligible in Section 7412 of the Food, Conservation, and Energy Act of 2008, also known as the 2008 farm bill ( P.L. 110-246 ). The 1994 Institutions were made eligible in Section 7604 of the 2018 farm bill (Agriculture Improvement Act of 2018, P.L. 115-334 ). Additional federal legislation has authorized a variety of competitive research grants, and is addressed in \" Funding .\" Agricultural extension brings agricultural research findings to the people who can put them into practice. Since passage of the Smith-Lever Act in 1914, the United States has developed an expansive Cooperative Extension System operated through the land-grant university system in partnership with federal, state, and local governments. Partners include NIFA, cooperative extension services at land-grant colleges and universities, and cooperative extension service offices in nearly each of the country's approximately 3,000 counties and its territories. Extension agents based at field offices and land-grant institutions work with local agricultural producers and community members to demonstrate or put into practice knowledge gained through agricultural research. Agriculture faculty at land-grant institutions may have appointments that are fully teaching, research, or extension, or some combination of the three. The extension function adds non-formal education to the land-grant mission. The Smith-Lever Act of 1914 (38 Stat. 372; 7 U.S.C. 341 et seq.) responded to interest in ensuring that agricultural research findings would make their way to producers and improve agricultural practices. This act provided for capacity funds â annual appropriations, distributed to the states on a formula basis â for cooperative extension. It led to establishment of the cooperative extension service associated with 1862 Institutions. The Smith-Lever Act, as amended, also contains competitive funding provisions. Smith-Lever capacity funds are not available to 1890 Institutions. The 1890 Institutions gained access to extension appropriations, distributed on a formula basis, in 1977 through the Section 1444 of NARETPA ( P.L. 95-113 Â§1444; 7 U.S.C. 3221 ). Thus NARETPA provided 1890 Institutions access to appropriations for both agricultural research (via Section 1445, or the Evans-Allen Act) and extension (via Section 1444). The 1994 Institutions gained access to federal extension funding in 1998. Section 201 of AREERA ( 7 U.S.C. 343 (b)(3)) amended the Smith-Lever Act to authorize appropriations for USDA to distribute to 1994 Institutions on a competitive basis, with such funds to be administered in cooperation with an 1862 or 1890 Institution. Thus AREERA provided 1994 Institutions access to both competitive research (Section 251) and extension (Section 201) appropriations. In addition to expanding the mission of the land-grant system, legislation also increased its geographical expanse. Beginning in 1908, modern U.S. territories began to participate in the land-grant system. Today, land-grant institutions are located in the District of Columbia and the insular areas of American Samoa, Guam, the Federated States of Micronesia, the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands. Whereas at the time of the Morrill Act in 1862, the United States had vast tracts of federal lands available for sale to endow new colleges and universities, this was not the case in the 20 th century. Land-grant institutions newly recognized in this time period were appropriated funds for their endowment and maintenance, in lieu of land or land scrip. Although classified as 1862 Institutions, their funding details vary according to specific legislation. The University of Puerto Rico, Mayaguez was established as a land-grant institution in 1908 after the benefits of the first and second Morrill Acts were extended to Puerto Rico. The University of the District of Columbia, at the time known as Federal City College, received land-grant status in 1968 through amendment (P.L. 90-354) of Title I of the District of Columbia Public Education Act of 1966 (P.L. 89-791). Colleges in the U.S. Virgin Islands and Guam became land-grant institutions through Section 506 of the Educational Amendments of 1972 (P.L. 92-318). Institutions in American Samoa and what is now the Federated States of Micronesia received similar recognition through the Educational Amendments of 1980 ( P.L. 96-374 Â§1361). A college in the Northern Mariana Islands was added in 1986 ( P.L. 99-396 Â§9). Section 7111 of the 2018 farm bill prohibits designation of any new land-grant institution that would be eligible to receive capacity grants for agricultural research, extension, and related programs (e.g., Hatch Act, Smith-Lever Act, and McIntire-Stennis Act). This change does not affect the eligibility of 1994 Institutions certified in the future to receive McIntire-Stennis funds. Congress made this change with the primary intention of avoiding the duplication of administrative costs that would accompany any division of an existing land-grant institution into more than one entity. Certain public colleges and universities that are not 1862, 1890, or 1994 Institutions can participate in elements of the land-grant university system through specific grants programs administered by USDA. The classification of non-land-grant college of agriculture (NLGCA) was defined in the 2008 farm bill ( P.L. 110-246 , Â§7101; 7 U.S.C. 3103(14) ), and this definition was revised in Section 7102 of the 2018 farm bill. Public colleges and universities are eligible to apply to USDA for NLGCA certification if they are not 1862, 1890, or 1994 Institutions and they offer bachelors, masters or doctoral degrees in food, agriculture, or natural resources in specified agriculturally relevant areas. As of July 2019, more than 40 certified NLGCAs are located in 23 states. The NLGCAs meet eligibility requirements for the Capacity Building Grants for Non-Land-Grant Colleges of Agriculture program administered by NIFA. This competitively funded program for NLGCAs was first authorized by the Agricultural Act of 2014 ( P.L. 113-79 ), also known as the 2014 farm bill, and was reauthorized in the 2018 farm bill. Private colleges and universities remain ineligible. Section 7101 of the 2008 farm bill (7 U.S.C. 3103(10)) defined a group of Hispanic-serving agricultural colleges and universities (HSACUs) which could benefit from integrated research, education, and extension competitive grants offered through USDA. Certified HSACU institutions must demonstrate that 25% of full-time enrollment is Hispanic, that the institution offers accredited agriculture-related degree programs, and that Hispanic students received at least 15% of degrees awarded in agricultural programs over the most recent two-year period. The definition further clarifies that an HSACU cannot also be an 1862 Institution. As of 2019, USDA has certified more than 150 HSACUs. Section 7129 of the 2008 farm bill called for establishment of a Hispanic-Serving Agricultural Colleges and Universities Fund in the U.S. Treasury (7 U.S.C. 3243). It authorized annual appropriations for FY2008 and each fiscal year thereafter, and distribution of appropriations and income from the fund to HSACUs on a formula basis. Congress has not appropriated funds for the HSACU Fund since its establishment in 2008, and thus distributions have not been made. Section 7129 of the 2008 farm bill also authorized appropriations for annual payments to HSACU institutions; competitively distributed institutional capacity-building grants; and competitive research and extension grants programs specific to HSACU. These programs have not received appropriations. Cooperating forestry schools (defined at 7 U.S.C. 3103(5)) are those institutions that are eligible to receive funds under the McIntire-Stennis Act. These include 1862, 1890 and 1994 Institutions in addition to non-land-grant \"State-supported colleges and universities offering graduate training in the sciences basic to forestry and having a forestry school.\" States must certify the institutions that are eligible for assistance, and determine the proportionate amounts of assistance to be extended to them if there is more than one cooperating forestry school within a state. Originally, an institution could not be certified as both a cooperating forestry school and an NLGCA. Section 7102 of the 2018 farm bill removed this restriction. The USDA National Institute of Food and Agriculture (NIFA) administers federal capacity and competitive grants to partner institutions for research, education, and extension activities (see Table 2 for NIFA discretionary appropriation details). C a pacity grants are recurring federal appropriations allocated to states based on legislative formulas. States are generally required to contribute matching funds, and specific project decisions are made locally. Competitive grants are awarded to specific projects selected through peer-review processes, without consideration of the state of the sponsoring institution. Researchers and institutions must apply for these funds. Federal legislation, as discussed earlier, provides capacity grants to land-grant institutions for research, education, and extension (see Table 1 ). NIFA administers these grants in collaboration with states, colleges, and universities. Land-grant colleges, universities, and associated state institutions use these funds to conduct research and extension in support of state agriculture, food, and forestry systems, as well as issues of socioeconomic welfare in communities and families in rural and urban areas. The Hatch Act, Smith-Lever Act, Evans-Allen Act, and McIntire-Stennis Act are the largest sources of capacity funds. Funding for agricultural research under the Hatch Act of 1887 as amended is allocated to the SAES and associated agriculture colleges of the 50 states, the District of Columbia, and the insular areas. Eligible state institutions must submit a Plan of Work to NIFA for approval before these funds are distributed. The Hatch Act identifies the distribution of federal payments to states for FY1955 as a fixed base, and any sums appropriated in excess of the 1955 level are to be distributed in the following manner: 3% to the USDA for administration of the Hatch Act; 20% equally to each state; 26% to each state in amounts proportionate to the relative rural population of each state to the total rural population of all states; 26% to each state in amounts proportionate to the relative farm population of each state to the total farm population of all states; and 25% to the Hatch Multistate Research Fund for multi-disciplinary, multi-institutional research activities to solve problems concerning more than one state. Federal funds provided under the Hatch Act to state institutions must be matched with non-federal funding on a dollar-for-dollar basis. Section 7213 of the 2002 farm bill (Farm Security and Rural Investment Act, P.L. 107-171 ) and Section 7404 of the 2008 farm bill amended the Hatch Act such that the insular areas and the District of Columbia, respectively, are required to provide matching funds of an amount equal to not less than 50% of the Hatch Act funds they receive. These amendments also provided that the Secretary of Agriculture may waive the matching requirement of an insular area or the District of Columbia for any fiscal year if the Secretary determines that its government is unlikely to meet the matching requirement for that fiscal year. Other provisions of interest within the Hatch Act include: Multistate research. In accordance with provisions of AREERA, at least 25% of available Hatch Act funds must be used to support multi-state research. Integrated activities. States must also expend 25% or twice the level spent in FY1997 (whichever is less) on activities that integrate cooperative research and extension. Carryover. Section 7(c) permits SAES to carry over unexpended funds for use during the following fiscal year. If those funds that have been carried over are not spent by the end of the second year, they are deducted from the following year's allotment. The Evans-Allen Act provides capacity funding for food and agricultural research at 1890 Institutions in a manner similar to the distribution of Hatch Act funds to 1862 Institutions. As with Hatch Act fund recipients, Evans-Allen recipients are required to submit a Plan of Work to NIFA for approval before the funds are distributed. Section 1445(a)(2) of NARETPA (7 U.S.C. 3222(a)(2)), as amended by Section 7122 of the 2008 farm bill, requires that Evans-Allen appropriations shall not be less than 30% of the annual Hatch Act appropriations. However, Evans-Allen appropriations have not met this threshold. They equaled approximately 22% of Hatch Act appropriations in FY2019 (see Table 2 ). Three percent of Evans-Allen funds are reserved for NIFA administrative, technical, and other services. The balance of the funds is distributed as follows: 20% equally to each state; 40% in an amount proportionate to the rural population of the state in which the eligible institution is located to the total rural population of all states in which eligible institutions are located; and 40% in an amount proportionate to the farm population of the state in which the eligible institution is located to the total farm population of all the states in which eligible institutions are located. Section 1449(c) of NARETPA as amended (7 U.S.C. 3222d) requires that federal funds for research and for extension at 1890 Institutions be matched by the state from non-federal sources on a dollar-for-dollar basis. The Secretary may waive the matching funds requirement above the 50% level for an eligible institution if the Secretary determines that the state will be unlikely to satisfy the matching requirement for a given fiscal year. This waiver, while allowing institutions to receive federal funding, has raised questions about overall funding equities. For additional details see \" Disparity in State Matching Funds .\" The McIntire-Stennis Cooperative Forestry Act of 1962 as amended authorizes research appropriations for certified cooperating forestry schools, including 1862 Institutions. The 1890 Institutions were made eligible for McIntire-Stennis funding through Section 7412 of the 2008 farm bill. The 1994 Institutions that offer associate or baccalaureate degrees in forestry were made eligible in Section 7604 of the 2018 farm bill. Unlike the statutorily designated formulas under the Hatch and Smith-Lever Acts, funding apportionments under the McIntire-Stennis Act are made by the Secretary of Agriculture in consultation with a 16-member council (fulfilled through the Forestry Research Advisory Council of the USDA Forest Service), which includes representatives of relevant forestry research institutions. Three statutorily defined factors are considered in making apportionments (16 U.S.C. 582a-4): 1. total non-federal expenditures for forestry research by state-certified institutions; 2. total state acreage in non-federal commercial forest land; and 3. volume of timber from growing stock cut annually in the state. The federal apportionment also requires a dollar-for-dollar match of non-federal funds that, unlike Hatch and Evans-Allen, cannot be waived. The Smith-Lever Act of 1914 (38 Stat. 372) as amended authorizes the Cooperative Extension System and provides capacity grants to 1862 Institutions for their cooperative extension education activities. Capacity grants are distributed according to Smith-Lever sections 3(b) and 3(c) (7 U.S.C. 343(b) and 7 U.S.C. 343(c)). Smith-Lever capacity grants provide about 65% of total federal funding for extension activities. Competitive funding provisions within the Smith-Lever Act, including section 3(d) (7 U.S.C. 343(d)) and specific provisions within section 3(b), are addressed in the \" Competitive Smith-Lever Provisions for Extension at 1862, 1890, and 1994 Institutions \" section of this report. States can use Smith-Lever 3(b) and 3(c) capacity grants for locally determined projects as well as for high priority regional and national concerns. Eligible state institutions must submit a Plan of Work to NIFA for approval before these funds are distributed. Smith-Lever 3(b) capacity funds are distributed based on the FY1962 distribution of cooperative extension funds. For Smith-Lever 3(c) funds, 4% are reserved for NIFA administrative, technical, and other services, and the balance is distributed to the states in the following proportions: 20% equally to each state; 40% in amounts proportionate to the relative rural population of each state to the total rural population of all states; and 40% in amounts proportionate to the relative farm population of each state to the total farm population of all states. Federal funds provided under the Smith-Lever Act to state institutions must be matched with non-federal funds on a dollar-for-dollar basis. Matching requirements for the District of Columbia and the insular areas are subject to matching requirements of at least 50% of the Smith-Lever funds they receive. Further, the Secretary of Agriculture may waive the matching requirement for the District of Columbia or an insular area for any fiscal year if the Secretary determines that it is unlikely to meet the matching requirement for that fiscal year. Smith-Lever requires states to expend 25% of federal Smith-Lever 3(b) and 3(c) capacity grants, or twice the level spent in FY1997 (whichever is less), on cooperative extension activities in which two or more states cooperate to address issues facing more than one state. They must expend the same percentage or amount on activities that integrate cooperative research and extension. Institutions receiving Smith-Lever capacity grants can carry over unexpended funds from one fiscal year to the next. Section 1444 of NARETPA (7 U.S.C. 321-329) provides capacity grants for extension education programs at 1890 Institutions in a manner similar to Smith-Lever Act funding for 1862 Institutions. Section 7121 of the 2008 farm bill amended Section 1444(a)(2) of NARETPA so that an amount equal to at least 20% of the total annual appropriation under the Smith-Lever Act sections 3(b) and 3(c) shall be allocated to 1890 Institutions for their extension activities. However, 1890 Institution extension appropriations have not met this threshold. They equaled approximately 15% of Smith-Lever appropriations in FY2019 (see Table 2 ). Funds are distributed according to the same formula used for Evans-Allen 1890 Institution research funds, except that 4%, rather than 3%, of total funds are reserved to NIFA for administrative, technical, and other services. State matching requirements for 1890 Institution extension funds are the same as described for 1890 Institution research funds (see \" Evans-Allen Act: Research Funding for 1890 Institutions \" and \" Disparity in State Matching Funds \" for additional details). Before the 2018 farm bill, 1890 Institutions could carry over no more than 20% of their extension appropriations from one fiscal year into the next. The 1862 Institutions have no such limitation. Section 7114 of the 2018 farm bill (7 U.S.C. 3221(a)) allows 1890 Institutions to carry over up to 100% of their extension appropriations. This change may allow 1890 Institutions greater flexibility to plan long-term projects. Section 533(c) of the Equity in Educational Land-Grant Status Act of 1994 (7 U.S.C. 301 note) requires annual distributions of interest on the Native American Institutions Endowment Fund. The 1994 Institutions receive payments, based on a statutorily established formula, from the interest earned on the endowment corpus. No withdrawals are made from the corpus of the endowment. There is no matching requirement, and endowment funds do not expire. The institutional recipients may use funds at their discretion, for the support and maintenance of the colleges for the benefit of the agricultural and mechanical arts. In FY2019, the endowment fund produced about $4.6 million in interest. Four percent of the available funds are reserved to NIFA for administrative services. The balance of the interest income is distributed to the 1994 Institutions according to the following formula: 40% in equal shares to the 1994 Institutions and 60% to be distributed among the 1994 institutions based on the \"Indian student count\" for each institution for the fiscal year. Section 1455 of NARETPA as amended requires annual distributions of interest on the HSACU Fund. No interest has accrued to date, as Congress has not provided appropriations for the HSACU Fund. Four percent of available funds are to be reserved to NIFA for administrative services. The balance of the interest income is to be distributed to the HSACUs according to the following formula (7 U.S.C. 3243): 40% in equal shares to the HSACUs and 60% to be distributed among the HSACUs on a pro rata basis based on the Hispanic enrollment count of each institution. Many provisions in various laws authorize competitive grants for agriculture and forestry research, education, and extension. The following highlights some major provisions relevant to the land-grant university system, as well as two new programs authorized in the 2018 farm bill. The Agriculture and Food Research Initiative (AFRI) (7 U.S.C. 3157) is USDA's largest competitive grants program for agricultural science research. The 2008 farm bill established AFRI, and subsequent farm bills reauthorized it. AFRI is authorized to be appropriated $700 million annually, from FY2008 to FY2023. Its appropriation has grown from $202 million in FY2009 ( P.L. 111-8 ) to $415 million for FY2019 ( P.L. 116-6 ). See Table 2 for appropriation levels in recent years. AFRI funds are not reserved specifically for land-grant institutions. Eligible recipients of AFRI awards include State Agricultural Experiment Stations (SAES); colleges and universities; university research foundations; other research institutions and organizations; federal agencies; national laboratories; private organizations or corporations; individuals; or any combination of the aforementioned entities. AFRI grants support research, education, and extension activities in six priority areas identified in the farm bill: plant health and production and plant products (27% of estimated AFRI funds); animal health and production and animal products (22%); food safety, nutrition, and health (15%); bioenergy, natural resources, and environment (12%); agriculture systems and technology (13%); and agriculture economics and rural communities (12%). Section 201 of AREERA amended the Smith-Lever Act to authorize agricultural extension appropriations for 1994 Institutions, awarded on a competitive basis. This is included as a separate competitive funding provision within Smith-Lever section 3(b) (7 U.S.C. 343(c)). A 1994 Institution may administer such funds in cooperation with an 1862 or 1890 Institution. NIFA awards these funds through the Tribal Colleges Extension Program (TCEP). In addition, Smith-Lever 3(d) funds, originally distributed via formula and reserved for 1862 Institutions, address special programs or concerns of regional or national importance. Smith-Lever 3(d) funds support the (1) Farm Safety and Youth Safety Education Program, (2) Children, Youth, and Families at Risk, (3) Federally-Recognized Tribes Extension Program, and (4) New Technology for Agricultural Extension Program. Section 7403 of the 2008 farm bill extended eligibility for Smith-Lever 3(d) funds to 1890 Institutions and required that all 3(d) funding be awarded on a competitive basis. Section 7609 of the 2018 farm bill authorized 1994 Institutions to compete for and receive funds for two of the four 3(d) programs: Children, Youth, and Families at Risk funding, and the Federally-Recognized Tribes Extension Program. In 1998 Congress, through passage of AREERA, amended the Equity in Educational Land-Grant Status Act of 1994 to authorize a competitive research grants program for 1994 Institutions, and to authorize appropriations for the program. Later farm bills amended some of the original provisions. As amended, the program allows scientists at 1994 Institutions to participate in agricultural research activities that address tribal, national, and multi-state priorities. The 1994 Institutions may conduct this work in cooperation with the Agricultural Research Service, an 1862 or 1890 Institution, an NLGCA, or a cooperating forestry school. NIFA administers the Tribal Colleges Research Grants Program (TCRGP). Section 7117 of the 2018 farm bill authorizes grants for students enrolled in 1890 Institutions who intend to pursue careers in the food and agricultural sciences. It makes $40 million of mandatory funding from the Commodity Credit Corporation available until expended. In addition, it authorizes $10 million in annual discretionary funding. Section 7213 calls for USDA to recognize at least three centers of excellence at 1890 Institutions. Each center of excellence should focus on research and extension activities in at least one of six specified areas: student success and workforce development; nutrition, health, wellness, and quality of life; farming systems, rural prosperity, and economic sustainability; global food security and defense; natural resources, energy and the environment; and emerging technologies. It authorizes annual appropriations of $10 million. NIFA is USDA's extramural research agency, meaning that it funds research conducted at other institutions. It provides scientific leadership and administers federal grant programs for the land-grant university system. Since its creation in 2008, staff entirely based in Washington, D.C. have carried out NIFA program coordination and planning. Its predecessor agency, the Cooperative State Research, Education, and Extension Service (CSREES), was also located entirely in Washington, D.C. In August, 2018, the Secretary of Agriculture announced the intention to relocate the majority of NIFA and employees out of the National Capital Region. A cost-benefit analysis released on June 13, 2019, indicated that 294 of 315 NIFA positions would be required to relocate. While the cost-benefit analysis references 315 NIFA positions, NIFA has 412 permanent full-time positions. Staffing of 315 at the time of the cost-benefit analysis indicates an initial vacancy rate of 24.6%, before relocation plans were developed. Concurrent with the release of the cost-benefit analysis, the Secretary announced that NIFA would be moved to the Kansas City Region. USDA has reported that 73 NIFA employees accepted relocation by the July 15 decision deadline. These data suggest that NIFA may start its work in Kansas City with 75% or more of positions located there empty or filled by recent hires. Reduced staffing levels have the potential to affect NIFA's ability to manage the congressionally mandated programs that fund the land-grant university system. For more information, see CRS In Focus IF11166, Proposed Relocation/Realignment of USDA's ERS and NIFA , by Tadlock Cowan. Public investment in agricultural research in the United States has declined in inflation-adjusted dollars since 2008, while private funding has steadily increased. The share of food and agriculture research funded by the public sector decreased from around 50% between 1970 and 2008 to less than 25% in 2013. Figure 2 provides an overview, prepared by the USDA Economic Research Service, of agricultural research funding in 2013 from federal, state, and non-governmental sources. Many factors have influenced this shift in funding sources. These include expansion of markets and increasing globalization of trade; laws and legal decisions since the 1970s that paved the way for intellectual property rights for biological innovations and commercial products derived from federally sponsored research; technical advances in biotechnology innovation that have increased potential profitability of agricultural research; and declining state investment in agricultural research since the 1990s. A 2012 report by President's Council of Advisors on Science and Technology (PCAST) states that private industry has an important role in agricultural research, and that public funding is essential to meeting agricultural research challenges. In May, 2019, the Association of Public and Land-Grant Universities and the Charles Valentine Riley Memorial Foundation called for increased public funding of agricultural research, in part to ensure that the United States remains globally competitive in agricultural technology and productivity. Whereas public funding pursues public goods, with the exception of some private foundations, private funding is typically oriented to generating profit. Thus the shift from predominantly public funding of agricultural research to more private funding has the potential to shape agricultural research towards crops, livestock, and technologies with the greatest profit potential and away from smaller crops or technologies that may not prove to be as profitable. Increasing federal appropriations for agricultural research or requiring increases in state matching funds may bolster basic research and research on agricultural products and activities that are important to some agricultural constituencies, yet currently have limited economic incentives. Federal research and extension capacity grants to the land-grant system generally require one-to-one non-federal matching funds. All states meet the matching requirements for their 1862 Institutions, which are predominantly white. In contrast, ten of the nineteen 1890 Institutions, which are predominantly black, received a full match from their states in FY2016. Those 1890 Institutions that do not meet the 100% matching funds requirement must apply to USDA for a waiver or forfeit their federal capacity funding. While receiving a waiver allows an 1890 Institution to receive its allocation of federal funding, such a waiver reduces the total public support for the institution, from the combination of federal and state funding, compared with what it would receive if a complete match was provided. This opens a disparity between 1890 and 1862 Institutions. If states had contributed 100% matching funds, overall state contributions for research and extension at 1890 Institutions would have been $17.8 million higher in FY2015, and in $18.5 million higher in FY2016 than actual matching contributions.. In 1977 when Congress, through NARETPA, originally created the Evans-Allen research and NARETPA Section 1445 extension capacity funding for 1890 Institutions, it did not require state matching funds. Through AREERA in 1998, Congress instituted an initial 30% state matching requirement for FY2000 that increased to 50% by FY2002. At that time, Congress gave USDA the ability to waive the state matching requirement for FY2000, but not thereafter. The 2002 farm bill ( P.L. 107-171 ) increased the matching requirement over time until it reached 100% in FY2007. The 2002 farm bill reintroduced the ability for USDA to issue waivers, above the 50% level, if a state was unlikely meet the matching requirement. Eliminating the opportunity to apply for a waiver may result in some states increasing their matching funds to ensure that their 1890 Institutions qualify for federal funding. However, this change may result in other institutions becoming ineligible to receive any federal funds if their states do not increase their matching contributions. Another option that may incentivize increased non-federal matching is to increase the waiver threshold above 50%. Section 7116 of the 2018 farm bill (7 U.S.C. 3221(a)) addresses concerns about disparities in state matching funds through a transparency requirement. It requires that USDA report annually \"the allocations made to, and matching funds received by, 1890 Institutions and 1862 Institutions ... for each of the agricultural research, extension, education, and related programs ... \" under the relevant statutes (Smith-Lever 3(b) and 3(c), Hatch, and Sections 1444 and 1445 of NARETPA). Supporters of the 1890 Institutions voice hope that the new transparency requirement will encourage states to provide 100% matching funding for those institutions. The 1994 Institutions, which are all tribal colleges and universities, make up the newest class of land-grant institution. Significant institutional differences among the 1862, 1890, and 1994 Institutions, in terms of numbers of students served, types of degrees awarded, and focal missions, factor into federal funding allocations. While land-grant designation gave 1994 Institutions new access to federal funding, this access is more limited than that of 1862 and 1890 Institutions. Table 3 illustrates differences in federal research funding among land-grant institution types. In FY2018, 1994 Institutions as a group received appropriations equal to about 1.2% of the research funds, through the Tribal College Research Grants Program, as 1862 Institutions received through Hatch Act appropriations. They received about 2% of the extension funds, through the Tribal Colleges Extension Program, as 1862 Institutions received through Smith-Lever capacity grant programs. In comparison, there were 61.5% as many 1994 Institutions as 1862 Institutions in FY2018. The American Indian Higher Education Consortium (AIHEC), a non-profit group representing TCUs, has consistently requested increased appropriations for 1994 Institutions, characterizing the difference in funding between 1994 and 1862 Institutions as an inequity. Others might argue that funding differences are appropriate to the different academic structures and institutional missions of 1994 and 1862 Institutions. Section 7120 of the 2018 farm bill included 1994 Institutions in one new avenue for competitive funding. This section, titled \"New Beginning for Tribal Students,\" authorizes USDA to make competitive grants, with a one-to-one matching funds requirement, to land-grant institutions targeting support for tribal students. Institutions may use such funds to support tribal students through recruiting, tuition and related fees, experiential learning, and student services. No state may receive more than $500,000 per year through this program.", "summary": "With the passage of the first Morrill Act in 1862, the United States began a then-novel policy of providing federal support for post-secondary education, focused on agriculture and the mechanical arts. The national system of land-grant colleges and universities that has developed since then is recognized for its breadth, reach, and excellence in teaching, research, and extension. Land-grant institutions are located in every U.S. state and many territories. These institutions educate the next generation of farmers, ranchers, and citizens, and form the backbone of a national network of agricultural extension and experiment stations. The land-grant university system has continued to evolve through federal legislation. The federal government provides funds, often with state matching requirements, to execute the system's three-fold mission of agricultural teaching, research, and extension. The U.S. Department of Agriculture's (USDA) National Institute of Food and Agriculture (NIFA) distributes these funds to the states as capacity grants, on a formula basis as determined by statute, or to participating institutions on a competitive basis. The Morrill Acts of 1862 (12 Stat. 503) and 1890 (26 Stat. 417), and the Equity in Educational Land-Grant Status Act of 1994 ( P.L. 103-382 Â§531-535), established the three institutional categories of the land-grant system, now known as the 1862, 1890, and 1994 Institutions. The 1862 Institutions are the first land-grant institutions; 1890 Institutions are historically black colleges and universities (HBCUs); and 1994 Institutions are tribal colleges and universities (TCUs). Later legislation also recognized additional institutional categories, including non-land-grant colleges of agriculture (NLGCAs) and Hispanic-serving agricultural colleges and universities (HSACUs), for specific programs. The Hatch Act of 1887 (24 Stat. 440), Evans-Allen Act of 1977 ( P.L. 95-113 Â§1445), and provisions of the Agricultural Research, Extension, and Education Reform Act of 1998 (AREERA, P.L. 105-185 ) provide the framework for funding research at land-grant institutions. State Agricultural Experiment Stations (SAES) associated with 1862 Institutions receive federal research capacity funds with a one-to-one non-federal matching requirement. The 1890 Institutions also receive federal research capacity funds with this matching requirement, yet USDA can waive up to 50% of their matching requirement. The 1994 Institutions can receive federal research funds through competitive grants programs. They may also use interest distributions from the Native American Institutions Endowment Fund, allocated on a formula basis, at their discretion. The land-grant university system operates the U.S. Cooperative Extension Service (CES) in partnership with federal, state, and local governments. The CES provides non-formal education to agricultural producers and communities through its network of offices located in most of the more than 3,000 U.S. counties and territories. The Smith-Lever Act of 1914 (38 Stat. 372), National Agricultural Research, Education, and Teaching Policy Act of 1977 (NARETPA, P.L. 95-113 Â§1444-1445), and AREERA extension provisions guide agricultural extension funding in the land-grant university system. The 1862 and 1890 Institutions receive federal capacity funds, according to separate formulas with non-federal matching requirements. USDA may waive up to 50% of the matching requirement for 1890 Institutions. The 1994 Institutions may receive federal extension funding through competitive grants. Looking forward, the scheduled fall 2019 relocation of NIFA from its current location in Washington, D.C.; the decades-long shifting balance of public and private investment in agricultural research; disparities in state matching funds among the different classes of land-grant institutions; and the funding of TCU land-grant institutions may invite congressional engagement.", "document_type": "crs"}
{"report": "U nder the Endangered Species Act of 1973 (ESA or the Act), the U.S. Fish and Wildlife Service (FWS ) and the National Marine Fisheries Service (together, the Services) determine which species to \"list\" as \"endangered species \" or \"threatened species ,\" terms defined in the Act . Species, subspecies, and distinct population segments (DPSs) may all be listed as \"species\" under the Act. Listing a species invokes certain protections under the Act and a requirement that the Services develop a recovery plan to conserve the species. Listed species may be reclassifie d by the Services from threatened to endangered or vice versa. The Services may also remove a species from the list, often called delisting, if it no longer meets the definition of an endangered or threatened species. The Services list, reclassify, and delist species pursuant t o statutory criteria and definitions through the agency rulemaking process. Persons mayâand often doâchallenge the legality of those final rules through litigation. When such challenges succeed, the court remands the rule to the applicable Service for further proceedings and may vacate the challenged rule. The gray wolf ( Canis lupus ) presents a useful example of the legal issues that arise with listing and delisting species as threatened and endangered under the ESA and how FWS has addressed those issues. T he gray wolf was among the first species identified by federal law as endangered after being nearly hunted to extinction in the lower 48 states . FWS has issued numerous rules in connection with its efforts to recover the gray wolf under the ESA . Many of those rules have been challenged in court, and a number of them have been vacated and remanded to FWS. FWS has addressed issues such as uncertainties in gray wolf taxonomy, ambiguous statutory terms (e.g., \" foreseeable future \" and \"significant portion of its range \" ), and the adequacy of state management plans. This r eport uses FWS's regulation of the gray wolf under the ESA and related litigation as a case study in how legal challenges have shaped FWS's interpretation of ESA provisions when listing and delisting species under the Act. The report begins by laying out general legal principles governing agency rulemaking under the ESA before reviewing the history of FWS's actions to list, recover, and delist the gray wolf and subsequent litigation . The report then uses this regulatory and litigation history to analyze specific issues that arise when listing and delisting species under the Act . The ESA aims to accomplish its goal of conserving fish, wildlife, and plants species threatened with extinction by \"listing\" species the Services determine to be endangered or threatened. The ESA's provisions and protections generally apply only to these listed species. The Act's legal framework determines when and how species are listed, reclassified, and delisted. The Secretary of the Interior and the Secretary of Commerce (this report refers to \"the Secretary\" to mean either the Secretary of the Interior or the Secretary of Commerce, as applicable) review species' statuses under the Act on their own initiative or in response to petitions. Any person may petition the Secretary to list, reclassify, or delist a species. The ESA prescribes when and how the Secretary is required to respond to such petitions, as shown in Figure 1 . A status review, conducted pursuant to a petition that may be warranted or at the Secretary's initiative, determines whether a species should be or remain listed. Figure 2 depicts the general pathway for a species from status review and listing through post-delisting monitoring and management under the ESA framework. A brief explanation of each stage is provided below Figure 2 . Listing . As a threshold matter, the Secretary may list only groups of organisms that qualify as a \"species\" under the ESA, defined to include subspecies and DPSs. Because the term \"species\" under the Act has a distinct legal meaning that may differ from its conventional or taxonomic meaning, this report uses the term \"species\" to refer to species as defined by the Act (i.e., including subspecies and DPSs) and the term \"full species\" when referring to a taxonomic species. For species eligible for listing, the Secretary examines whether the species qualifies as an endangered species or threatened species, as defined by the Act, because of any of the five factors listed in Figure 2 . The ESA requires the Secretary to make this determination \"solely\" based on the \"best scientific and commercial data available.\" Based on this evaluation, the Secretary either lists the species as endangered or threatened, as appropriate, or determines the species is ineligible for listing and, if the Secretary conducted the status review pursuant to a petition to list, denies the petition. The Secretary may also determine that a species qualifies as an endangered or threatened species but that the species cannot be listed at the time due to the Services' priorities and limited resources. In that case, the Secretary may deny a petition as warranted but precluded. The Secretary publishes listing determinations in the Federal Register and the Code of Federal Regulations. Listed. Once endangered and threatened species are listed, the ESA directs federal agencies to \"conserve\" them and their ecosystems. As shown in Figure 2 , the Act provides two types of mechanisms to conserve listed species and facilitate their recovery. First, as shown in the Protections box of Figure 2 , it protects the species by prohibiting certain acts with respect to endangered species; similar prohibitions may also be extended to threatened species. The Act further protects listed species by requiring federal agencies to consult with the Services when their actions, or actions they approve or fund, could affect listed speciesâoften called Section 7 consultations. Through this process, federal agencies assess the potential effects of their actions on any endangered or threatened species and evaluate, as necessary, alternatives that would mitigate the impact. Second, as shown in the Recovery Tools box in Figure 2 , the ESA provides tools to facilitate the recovery of the species. The Act generally requires the Secretary to develop and implement a recovery plan for each listed species unless such a plan would \"not promote the conservation of the species.\" The recovery plan includes any site-specific management actions needed to conserve the species, objective and measureable criteria that would merit delisting the species if met, and estimates of timelines and costs. In addition to recovery plans, Congress amended the ESA in 1982 to allow the Services to reintroduce experimental populations of listed species, which are regulated as threatened species regardless of the listed species' status. Experimental populations must be \"wholly separate geographically\" from existing natural populations of the species. As shown in the Review Status box in Figure 2 , the Secretary must review the status of a listed species every five years âor pursuant to a petition to reclassify or delist the species that may be warranted âto determine whether it still qualifies as an endangered or threatened species. Species are reclassified or delisted based on the same criteria used to list species, as shown in the Status box in Figure 2 . Post- d elisting. Once a species is delisted, the states in which the species resides resume control over management of the recovered species. The Secretary and the states monitor the status of a recovered species for at least five years after delisting. In this period, if the Secretary determines that there is a significant risk to the well-being of the species, the Secretary must exercise emergency powers to restore the Act's protections to the species for 240 days, during which time the Secretary may begin rulemaking proceedings to relist the species. The Services list, reclassify, and delist species through the rulemaking process. The principles of administrative law and statutory interpretation that generally govern the agency rulemaking process and judicial review underpin the Services' actions under the ESA. Agencies use rules, among other tools, to implement and interpret statutes and promulgate regulations. The Administrative Procedure Act (APA) generally governs agency rulemaking by prescribing procedural requirements for agencies to follow and providing an opportunity for judicial review of final agency actions. The APA requires agencies to publish a proposed rule to provide notice of the agency's proposed action and provide an opportunity for public comment, then to publish a final rule that concisely states the agency's basis and purpose for the rule. The agency's statement must generally address significant comments and explain the agency's rationale for those comments not incorporated into the final rule. Any changes in the final rule must be a \"logical outgrowth\" of the proposed rule to comport with due process. Parties affected by an agency rule can generally seek judicial review of the agency's action. To the extent the rule relies on an agency's interpretation of a provision in a statute it administers, the court generally evaluates the agency's interpretation under the Chevron doctrine. Under the Chevron doctrine, the court first determines whether the statutory provision is ambiguous (i.e., if there are multiple permissible meanings) by relying on principles of statutory interpretation. The court may look to the plain meaning of the term in common parlance, the provision's statutory context, how the term is used elsewhere in the statute or other statutes, the statute's purpose and legislative history, and whether a particular interpretation would render a term superfluous, lead to absurd results, or raise constitutional questions. If the court determines that a statutory provision is ambiguous, then it defers to the administering agency's interpretation so long as it is a permissible (i.e., reasonable) interpretation. Under the APA, a court must set aside agency rules if it finds the rule is \"arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.\" For example, a court may determine that a rule is arbitrary and capricious because the agency's interpretation of an ambiguous term is not a permissible one. A court may also hold that an agency rule is arbitrary and capricious if it is illogically reasoned, fails to consider an important aspect of the problem, or is unsupported by the administrative record. When a court overturns an agency rule, it generally vacates the rule and remands it to the agency. The gray wolf has a long history as a listed species under the ESA and its predecessors. As discussed in this section, from the initial listing to the present, nearly every element of the listing and delisting legal framework has been implicated in regulating the gray wolf under the Act. (See \" Listing and Delisting Species Under the Endangered Species Act \" section.) Table 1 includes a timeline of legislative, regulatory, and litigation actions by population, and Table A-1 in the Appendix provides a more detailed version. The substantive issues that have been raised in the various rulemakings and court opinions described in this section are discussed by topic in the \" Challenges When Listing and Delisting Species \" section. The gray wolf's traits and history inform much of FWS's analysis of threats to the species and pathways to recovery. Gray wolves are the largest member of the Canidae (i.e., dog) family. They are frequently found in packs and occupy defined territory, but lone gray wolves may leave their packs to join another pack or wander alone. Gray wolves are effective and adaptive predators who generally hunt large prey, such as moose, elk, caribou, bison, and deer; they also have been known to eat smaller prey. Historically, gray wolves ranged throughout most of North America, Europe, and Asia. On the North American continent, gray wolves were once found from Canada and Alaska to northern Mexico except for much of the southeastern United States (where the related but distinct red wolf lived) and parts of southern California. The arrival of European settlers and their expansion into the western frontier led to widespread persecution of wolves as a result of fear, superstition, and perceived and real conflicts between wolves and humans, such as attacks on humans, domestic animals, or livestock. Encouraged by federal, state, and local bounties, settlers poisoned, trapped, and shot wolves until they were eliminated from more than 95% of their historical range. FWS listed the first gray wolf subspecies, the eastern timber wolf ( C. lupus lycaon ), as endangered in 1967 under the Endangered Species Preservation Act of 1966 (ESPA). After the Endangered Species Conservation Act of 1969 (ESCA) amended the ESPA, FWS listed the northern Rocky Mountain wolf ( C. lupus irremotus ) as endangered in 1973. Under the ESPA and the ESCA, the Services could list only species or subspecies that were endangered worldwide. Enacted in 1973, the ESA allowed the Services to identify a species as endangered or threatened in all or a significant part of its range. After the ESA was enacted, FWS listed two more gray wolf subspeciesâthe Mexican wolf ( C. lupus baileyi ) and the Texas wolf ( C. lupus monstrabilis )âas endangered in 1976. In 1978, FWS combined these listings into one listing for the gray wolf species as endangered throughout the lower 48 states except Minnesota and a separate listing the gray wolf in Minnesota as threatened. Between 1978 and 1982, FWS created recovery plans for the eastern timber wolf, the northern Rocky Mountain wolf, and the Mexican wolf that outlined management strategies and recovery criteria. It later updated each of those plans. In the 1990s, FWS reintroduced gray wolves into central Idaho and the greater Yellowstone area in the northern Rocky Mountains and the Southwest. FWS designated each population as a nonessential experimental population, meaning FWS determined the population is not essential to the conservation of the species. Protected from human-caused mortality, which FWS identified as the greatest threat to the species, gray wolf populations in the western Great Lakes region, the northern Rocky Mountains, and the Southwest increased and expanded their ranges. The term DPS is distinct to the ESA, unlike species and subspecies, which are commonly used taxonomic terms with scientific meanings. Including DPSs in the Act's definition of species has been particularly relevant to gray wolf listing and delisting rules. Because the term DPS is not defined in the ESA, the Services issued a DPS policy (DPS Policy) in 1996 explaining how they would interpret and apply the term. Under the DPS Policy, the Services evaluate the population's discreteness and significance to determine if it qualifies as a DPS and, therefore, a listable species under the Act. In 2000, FWS proposed to designate four DPSs of gray wolvesâthe Western Great Lakes DPS, Western DPS, Southwestern DPS, and Northeastern DPS, as shown in Map 2 of Figure 3 âand to delist the gray wolf in any state outside the range of those DPSs. FWS determined that non-DPS states were outside the gray wolf's current range and unlikely to be repopulated by gray wolves, and that wolf restoration to those areas was neither potentially feasible nor necessary for recovery. FWS also proposed to reclassify the gray wolves of the Western Great Lakes DPS, Western DPS, and Northeastern DPS from endangered to threatened. For the Western Great Lakes and Western DPSs, FWS determined that they were not in danger of extinction based on the recovery progress of the western Great Lakes and northern Rocky Mountain gray wolf populations, respectively. FWS determined that these populations were sufficient to ensure the continuing viability of the DPSs as a whole. For the Northeastern DPS, FWS proposed to reclassify it as threatened due to the regulatory flexibility afforded by a threatened status, rather than based on determining that the DPS met the definition of \"threatened species.\" In the 2003 final rule, FWS combined and expanded the Western Great Lakes and Northeastern DPSs to create the Eastern DPS, as shown in Map 3 of Figure 3 , after not finding justification for a separate Northeastern DPS. FWS reclassified the gray wolves of the Eastern DPS and the Western DPS from endangered to threatened. The agency also determined that it could delist only based on a finding of recovery, extinction, or original listing in error. Accordingly, FWS extended the three DPSs to include 12 of the states it had proposed to delist. The agency delisted the gray wolf only in 14 states in the southeastern United States and in portions of Oklahoma and Texas that FWS determined were outside the gray wolf's historical range. District courts in Oregon and Vermont ultimately vacated the 2003 final rule. Those courts held that FWS conflated the statutory terms \"all\" and \"a significant portion\" when analyzing whether the DPSs were endangered or threatened in \"all or a significant portion of [their] range.\" By assessing what constituted \"a significant portion\" of the range based on which areas ensured the continuing viability of the DPS as a whole , FWS rendered the phrase \"a significant portion\" superfluous by ensuring that any DPS endangered or threatened in \"a significant portion\" of its range would also be endangered or threatened in \"all\" of its range. Those courts also concluded that FWS violated the ESA and the DPS Policy by designating DPSs based on geographical rather than biological criteria and by failing to conduct the five-factor analysis for wolves outside the core recovery populations, thus reclassifying species without applying the statutory criteria. The Oregon district court further held that FWS combining the two DPSs and including states in the DPSs beyond the recovered populations' ranges was arbitrary and capricious because the gray wolf's conservation status varied across each DPS. By extending the DPSs to the gray wolf's historical range rather than \"draw[ing] a line around a population whose conservation status differs from other populations within that species,\" the court held that FWS \"invert[ed]\" the DPS's purpose. Finally, the Vermont district court held that FWS violated the APA by combining the Western Great Lakes and Northeastern DPSs into a new Eastern DPS in the 2003 final rule, which did not appear in the proposed rule. The Vermont district court determined that establishing the Eastern DPS was not a \"logical outgrowth\" of the proposed rule and accordingly did not provide the public with adequate notice and opportunity for comment. After the district courts vacated the 2003 final rule, FWS adjusted its approach by individually designating and delisting the Western Great Lakes DPS (as shown in Figure 4 ) in 2007 and the Northern Rocky Mountain DPS (as shown in Figure 5 ) in 2008. For these and later DPS rules, FWS assessed whether each DPS met the DPS Policy's discreteness and significance criteria. FWS determined that gray wolf populations were discrete under the DPS Policy by comparing the distance between areas occupied by gray wolf populations to gray wolf dispersal data, finding that the populations were separated by more than three times the average dispersal distance and that the area in between generally was not suitable habitat for gray wolves. In the new final rules, FWS determined the populations to be significant under the DPS Policy by finding that (1)Â the populations occupied an unusual or unique ecological setting for the gray wolf, and (2)Â losing these populations would create a significant gap in the gray wolf's range. In subsequent DPS rules, FWS would rely solely on the latter finding. In its 2007 and 2008 rulemakings, FWS also assessed whether each population had met the recovery criteria in its recovery plan and was no longer in danger of extinction at the time or in the foreseeable future. FWS found that both the Western Great Lakes and Northern Rocky Mountain populations had met the objective criteria laid out in the recovery plans. It also determined that the States of Minnesota, Michigan, and Wisconsin in the Western Great Lakes DPS and the States of Montana and Idaho in the Northern Rocky Mountain DPS had adequate wolf management plans in place. However, in the proposed rule for the Northern Rocky Mountain DPS, FWS determined that Wyoming's wolf management plan was inadequate to ensure the continued recovery of the species. Among other concerns, FWS pointed to Wyoming committing to manage only seven breeding packs outside the national parks and to Wyoming designating the gray wolf as a predatory animal in most of the state. FWS stated that delisting was contingent on Wyoming implementing an adequate wolf management plan. Wyoming enacted legislation in February 2007 removing statutory obstacles to the revisions FWS required, and the Wyoming Fish and Game Commission approved the revised plan in November 2007. In the 2008 final rule, FWS determined that Wyoming's plan would adequately ensure the continued recovery of the gray wolf population there. Much like the 2003 rule, courts also vacated these final rules. For the 2007 Western Great Lakes DPS final rule, a federal district court in the District of Columbia held that the ESA was ambiguous about whether FWS could designate for delisting purposes a DPS from a listed full species if FWS had never listed the DPS specifically. However, FWS had argued that the ESA was unambiguous and the plain meaning of the text supported its authority to designate and delist a DPS from a listed full species. Because FWS had relied on the ESA's plain language rather than interpreting the text, the court determined there was no FWS interpretation to defer to under the Chevron doctrine. The court vacated the rule and remanded it to FWS to interpret the ambiguous statutory language. For the 2008 Northern Rocky Mountain DPS final rule, a federal court in Montana reviewed FWS's rule when it granted a motion to enjoin the rule while litigation proceeded. To issue a preliminary injunction, a court must find, among other things, that the plaintiffs have a likelihood of success on the merits of the case. The court determined the plaintiffs were likely to prevail based on two arguments. First, the court determined that FWS likely had been arbitrary and capricious by inadequately explaining why its final rule ignored the recovery plan criterion of genetic exchange between gray wolves from different recovery areas (i.e., central Idaho, northwestern Montana, and the greater Yellowstone area). Genetic exchange had been included as a recovery criterion in a 1994 environmental impact statement prepared to evaluate the environmental impacts of introducing the experimental gray wolf populations into central Idaho and the greater Yellowstone area. The court held that although FWS did not have to rely on recovery criteria to find that a species had recovered, the agency needed to explain its decision to ignore such criteria adequately. Second, the court determined that FWS was arbitrary and capricious in approving Wyoming's wolf management planâpart of the recovery criteriaâbecause, in the court's view, FWS's reasons for rejecting previous Wyoming plans applied equally to the 2007 one. After issuing the preliminary injunction, the court granted FWS's request to vacate the rule and remand it. In 2009, FWS again published final rules designating and delisting the Western Great Lakes DPS and the Northern Rocky Mountain DPS, except it did not delist the gray wolf in Wyoming after finding the state's management plan inadequate. FWS issued the final Western Great Lakes DPS rule, which interpreted FWS's authority to designate and delist DPSs from listed species to address the concerns raised by the D.C. district court's 2008 ruling, without issuing a new proposed rule. Parties challenged the latest Western Great Lakes DPS rule for, among other things, violating the APA's notice and comment requirements. Pursuant to a settlement agreement, FWS ultimately withdrew the rule. The Montana district court vacated the 2009 Northern Rocky Mountain DPS rule after concluding that the ESA did not allow FWS to list a partial DPS (i.e., listing the gray wolf only in the Wyoming segment of the DPS). FWS had interpreted the statutory phrase \"significant portion of its range\" in the endangered species and threatened species definitions to allow a species to be listed for only that portion of its range where the Services determine the species is endangered or threatened. The court rejected this interpretation as impermissible under the Act and vacated the rule. It held that the plain language of the ESA precluded listing a smaller classification than a DPS. The court also held that FWS's interpretation rendered superfluous Congress's addition of DPS to the definition of \"species\" and Congress's restriction of DPSs to vertebrate species because under FWS's interpretation, the agency could simply list the full species or subspecies for only the range occupied by the DPS and achieve the same result without the DPS designation and for any speciesâvertebrate or not. However, an act of Congress in 2011 directed FWS to reinstate the 2009 rule designating and delisting the Northern Rocky Mountain DPS without Wyoming. FWS published another final rule designating and delisting the Western Great Lakes DPS in 2011. In the proposed rule, FWS also proposed to recognize the eastern timber wolf as a full species ( C. lycaon ) rather than a subspecies of gray wolf ( C. lupus lycaon ) based on developments in taxonomic research. In recognizing the eastern timber wolf as a full species, FWS proposed to delist the gray wolf in all or part of 29 states (outside the Western Great Lakes DPS) where FWS determined that the areas were part of the historical range of the eastern timber wolf or red wolf ( C. rufus ) rather than the gray wolf ( C. lupus ). In the 2011 Western Great Lakes DPS final rule, however, FWS determined that the scientific community had not reached a consensus on whether the eastern timber wolf was a full species. FWS accordingly continued to recognize the eastern timber wolf as a subspecies of gray wolf until the scientific debate was resolved and postponed delisting in the 29 states and partial states. FWS otherwise finalized the rule as proposed, relying on data and analysis similar to what it had used in prior rules designating and delisting the Western Great Lakes DPS. A district court in the District of Columbia vacated the 2011 Western Great Lakes DPS rule in 2014. The court reviewed FWS's interpretation of its statutory authority under the ESA to designate and delist a DPS from a listed full species, which the agency adopted after the 2008 opinion vacating FWS's 2007 Western Great Lakes DPS rule that relied on the plain meaning of the ESA. On appeal, the U.S. Court of Appeals for the District of Columbia Circuit (D.C. Circuit) held in 2017 that FWS could designate and delist DPSs from listed full species but that FWS had failed to do so properly in the 2011 rule. The court concluded that the 2011 Western Great Lakes DPS rule was arbitrary and capricious because FWS had improperly conducted its analysis by failing to consider two factors: (1) the effect of delisting the DPS on the remainder of the species and (2) the loss of the gray wolf's historical range when analyzing threats to the species. After approving its revised state laws and wolf management plan, FWS delisted the gray wolf in Wyoming in 2012. The federal district court in the District of Columbia vacated the rule after finding it was arbitrary and capricious for FWS to rely on nonbinding promises in Wyoming's management plan to determine the state's regulatory mechanisms were adequate. The D.C. Circuit reversed the federal district court, holding that the ESA did not limit FWS to considering only legally binding regulatory mechanisms to determine whether the regulatory mechanisms were adequate to protect the species. The rule delisting the gray wolf in Wyoming was accordingly reinstated. In 2013 and 2019, FWS proposed to delist the gray wolf except for the Mexican wolf subspecies, which FWS listed as endangered in 2015. FWS published the 2013 proposed rule when gray wolves in the Northern Rocky Mountain and Western Great Lakes DPSs were delisted. FWS considered whether the remaining listed entities qualified as \"species\" under the ESAâthus listable under the Act. Finding they did not qualify, FWS evaluated whether the gray wolf or any subspecies or population of gray wolf merited listing as an endangered or threatened species. In its analysis, FWS revisited the gray wolf's taxonomy, determining again that scientific evidence supported recognizing the eastern wolf as a full species ( C. lycaon ) and recognizing the following three gray wolf subspecies: C. lupus nubilus (found in the coastal areas of Alaska and Canada and the Pacific Northwest to the Great Lakes region), C. lupus occidentalis (found in the interior of Canada and the northern Rocky Mountains), and C. lupus baileyi (historically found in the American Southwest and Mexico). Within these species and subspecies, FWS did not identify any listable DPSs, finding that gray wolves sighted in the Pacific Northwest did not qualify as a population and, in any event, were not discrete from the Northern Rocky Mountain DPS population. FWS proposed to list the Mexican wolf as an endangered subspecies and delist the remaining listed gray wolf entities. In 2015, FWS finalized its 2013 proposal to list the Mexican wolf separately but did not finalize the rest of the proposed rule. Before FWS finalized its proposed delisting of the gray wolf entities, as discussed above, the federal courts in the District of Columbia vacated the rule delisting the Western Great Lakes DPS and the gray wolf in Wyomingâthe latter was later reinstated through legislation. In 2019, FWS proposed to delist the gray wolf (aside from the Mexican wolf, listed separately) after finding that the Western Great Lakes population had met its recovery criteria and that neither the gray wolf as a species nor any subspecies or any population of gray wolf was endangered or threatened in all or a significant portion of its range in North America. FWS also returned to its position that the scientific community was not yet settled on recognizing the eastern wolf as a full species. FWS had not finalized the 2019 proposal as of this report's publication. The gray wolf is accordingly listed as endangered in the lower 48 states, except for the Northern Rocky Mountain DPS, which is delisted; the population in Minnesota, which is listed as threatened; and the Mexican wolf subspecies in New Mexico and Arizona, which is listed separately as endangered. Table 1 summarizes the history of listing, recovery, and delisting by DPS or region (described further in the \" History of Listing and Delisting the Gray Wolf \" section), and Table A-1 in this report's Appendix provides a more detailed timeline. FWS has encountered a host of legal challenges when listing or delisting the gray wolf. This section reviews by topic the substantive challenges FWS has encountered in rulemaking and litigation. Though specific to the gray wolf, the challenges FWS has faced provide insight into the issues the Services generally encounter with listing and delisting species and how courts may react to the Services' approaches. To identify a species as endangered or threatened, the Services must first identify what qualifies as a \"species\" under the Act. When the ESA was enacted in 1973, it defined a species to include \"any subspecies of fish or wildlife or plants and any other group of fish or wildlife of the same species or smaller taxa in common spatial arrangement that interbreed when mature.\" In 1978, Congress amended the ESA to define species to include \"any subspecies of fish or wildlife or plants, and any distinct population segment of any species of vertebrate fish or wildlife which interbreeds when mature.\" Species and subspecies are biological concepts used in taxonomic classification. As such, the Services consult experts in those fields to identify listable species and subspecies based on the best available scientific data. A DPS, however, is a statutory creation, not a biological concept. In 1996, the Services implemented the DPS Policy to outline how they would evaluate DPSs. Under the policy, a population must be discrete from other populations, significant in accordance with principles of conservation biology, and endangered or threatened to be listed as a DPS. Applying these criteria in practice has proven difficult. For the gray wolf in particular, FWS has encountered challenges with the wolf's taxonomy and with regulating segments of the wolf population. Many of FWS's rulemaking preambles detail the difficulties involved in identifying listable entities and analyzing them in light of disagreements over the taxonomic classification of wolf species and subspecies. Under the ESA, FWS must be able to identify a listable entityâa full species, a subspecies, or a DPSâto analyze its status for listing. The entity identified for analysis determines the population(s), historical and current range, and threats that the Services consider. Though FWS's determinations about gray wolf taxonomy generally have not been subject to direct legal challenges, they underpin how FWS conducts the remainder of its analyses to assess the species' status. Changing views and a lack of scientific consensus over the taxonomic classifications for the gray wolf have caused FWS to revise its analyses during or between rulemakings. The Services must base decisions about what entity to evaluate on the \"best scientific and commercial data available.\" But scientists do not always agree on their taxonomic conclusions. Taxonomists may classify species based on distinctive physical or behavioral traits, evolutionary pathways, interbreeding capabilities, or genetic composition. Taxonomists may disagree about whether and how to recognize subspecies within a species. Differences in methodology or datasets may also lead to disagreements about the taxonomic level to assign a particular entity. For example, various scientific studies have concluded that the eastern timber wolf is a full species ( C. lycaon ), a subspecies of gray wolf ( C. lupus lycaon ), a hybrid of different wolf species, a wolf-coyote hybrid, or a distinct gray wolf population not rising to the level of a subspecies. Different methodological approaches may also affect how many entities within a species taxonomists recognize as distinct. For example, FWS has observed that scientific studies had recognized as many as 24 subspecies of wolves in North America but that other taxonomists had suggested there were actually 5 or fewer subspecies. From these divergent scientific studies, the Services must determine what classification for an entity the \"best scientific and commercial data available\" support. The Services may also conclude that there is no scientific consensus on an entity's taxonomic status that would be defensible based on the data. For example, twice FWS has proposed to recognize the eastern timber wolf as a full species only to conclude later that the scientific community had not reached a consensus on its classification. In each case, FWS reverted to the eastern timber wolf's original classification as a subspecies of gray wolf ( C. lupus lycaon ). It is unclear how FWS would have proceeded if it could not have reverted to a status quo. Any determination on taxonomic classification for listing purposes must be defensible based on the best scientific and commercial data available. Classifications may also change over time as scientists reevaluate their conclusions based on additional data or improved methodologies. In its 2013 proposed rule, FWS determined that it would recognize only three gray wolf subspecies out of as many as 24 identified historicallyâ C. lupus nubilus (coastal wolf), C. lupus occidentalis (interior and mountain wolf), and C. lupus baileyi (Mexican wolf). As described above, FWS has continued to evaluate the taxonomic status of the eastern timber wolf as scientific research and opinion evolves. Changing classifications and disagreements within the scientific community may result in a previously listed entity no longer qualifying as a \"species\" under the ESA or in the Services being unable to identify any listable entity that qualifies as endangered or threatened. Such changes and disagreements can also affect other aspects of the Services' status analysis. For example, which areas FWS recognizes as comprising the gray wolf's current and historical range depends on whether the eastern timber wolf is a subspecies of gray wolf or a separate full species. Any areas solely occupied by the eastern timber wolf would be included in the gray wolf's range only if the eastern timber wolf is a subspecies. When FWS proposed to recognize the eastern timber wolf as a full species in 2011, it also proposed removing certain areas from the gray wolf listing that FWS considered listed in error because it determined that the wolves occupying those areas were eastern timber wolves rather than gray wolves. In addition, the Services use a species' current range to determine the species' status (i.e., whether it is endangered or threatened in \"all or a significant portion of its range \" ) and use the historical range to assess threats against the species' continued existence. Accordingly, changes to how a species is classified and defined can affect the Services' analysis of the species' status. FWS's efforts to designate and delist gray wolf DPSs have given rise to multiple legal challenges and vacated rules. To designate gray wolf DPSs, FWS has applied the DPS Policy. Under the policy, the Services may designate a DPS if it is discrete from the remainder of the species and significant to the species. The Services determine a population is discrete if it is \"markedly separate\" from other populations based on \"physical, physiological, ecological, or behavioral factors\" or international boundaries. The Services determine that a population is significantâbiologically and ecologicallyâbased on whether the population persists in an unusual setting for the species, differs markedly from the rest of the species genetically, represents the only naturally occurring population in the wild (i.e., excluding reintroduced populations), or would create a gap in the species range if the population were lost. The Services imposed the significance criteria to ensure they use the DPS designation authority \"sparingly,\" consistent with congressional guidance, to avoid potential abuse, such as listing numerous populations of otherwise abundant species. If the Services determine a population meets the discreteness and significance criteria, they evaluate the DPS's status to determine whether it is endangered or threatened in accordance with the ESA definitions and factors. For the gray wolf, FWS has generally evaluated discreteness by determining the distance between the areas occupied by different populations against average dispersal distances. The agency determined that the distances between the Western Great Lakes, Northern Rocky Mountain, and Mexican wolf populations were all greater than three times the average dispersal distance for a lone wolf, leading FWS to determine that each population is discrete. FWS also has used the Canada-U.S. border to demarcate DPSs based on the different regulatory regimes in the two countries. FWS determined the Western Great Lakes and Northern Rocky Mountain DPSs were significant because losing either population would leave a significant gap in the gray wolf's range. In the 2003 rulemaking, FWS also determined that the Western Great Lakes, Western (later Northern Rocky Mountain), and Mexican wolf populations each displayed distinct morphological traits that could represent different subspecies, presumably meaning they were genetically distinct. In the 2007 rule, FWS also concluded that the Western Great Lakes DPS persisted in a unique environment due to its presence in the Laurentian Mixed Forest Province where the boreal forest transitions to the broadleaf deciduous forest. However, it did not rely on those factors in later rules. FWS's determinations that gray wolf populations meet the DPS Policy's discreteness and significance criteria generally have not been the subject of legal challenge. Instead, parties have challenged FWS's determination of DPSs' geographic boundaries. The Oregon district court vacated FWS's rule designating the Western, Eastern, and Southwestern DPSs because it determined that FWS had inappropriately delineated the DPSs. In that 2003 final rule, FWS had combined the proposed Western Great Lakes DPS and Northeastern DPS into the Eastern DPS after it did not obtain sufficient evidence of gray wolves inhabiting the Northeast to designate a DPS. The agency also extended each DPS to include surrounding states such that the historical range of the gray wolf was carved up into DPSs. The court determined that FWS had inverted the DPS Policy's purpose by combining populations with dramatically different statuses into one DPS based on geography. The court held that FWS must delineate DPSs carefully to include only discrete, significant populations that qualify as DPSs and their occupied ranges. The Services' decisions to list a full species rather than a subspecies or DPS may also affect their ability to delist the species. Most of the challenges FWS has encountered with gray wolf DPSs have arisen when the agency has designated DPSs from listed full species for delisting purposes. Plaintiffs have argued that FWS can only designate a DPS to increase protectionsâeither listing a DPS of a species or subspecies that is not listed or reclassifying a DPS to endangered if the species or subspecies is listed as threatenedâand therefore can only delist a previously listed DPS. FWS has contended that it has authority to delist a DPS from a listed species or subspecies based on (1) the statutory definition of species including DPSs and (2) its authority to review species' statuses and revise listings pursuant to new determinations or designations. FWS has argued that its interpretation enables the flexibility Congress intended to provide the Services through the DPS category and is consistent with the Act's purposes by allowing the Services to direct resources to conserve those species or populations most in need of assistance. Courts have concluded that the ESA is ambiguous as to whether FWS may designate and delist a DPS from a listed species or subspecies. District courts had initially agreed with plaintiffs that FWS's interpretation was impermissible because DPSs are a \"one-way ratchet\" and FWS may only delist a DPS it had previously listed. But the D.C. Circuit reversed the district court's opinion in 2017, holding that it is reasonable to interpret the ESA as authorizing FWS to revise a full species or subspecies listing by designating and removing a DPS from the listed species. The D.C. Circuit also concluded, however, that FWS had improperly executed designating and delisting the Western Great Lakes DPS in the 2011 rule because the agency must consider the effects of removing the DPS on the status of the listed remnant of the species in its analysis. Thus although this most recent decision determined that FWS has the legal authority to designate and delist DPSs from listed species and subspecies, the agency has yet to do so in practice in a way that survives judicial review. The ESA allows the Secretary to release specimens of listed species into the wild and designate the population as an \"experimental population\" if it is \"wholly separate geographically\" from existing populations of the species. Experimental populations may be designated as essential or nonessential to the conservation of the species. An experimental population is protected as a threatened species even if the species is listed as endangered, allowing the Services to limit which acts are prohibited with respect to the experimental population. Additionally, federal agencies are not required to enter into Section 7 consultations if their actions are likely to affect only nonessential experimental populations. These more limited protections afforded to experimental populations reduce the regulatory burden on the local community where the specimens are released, which may reduce public opposition to introducing (or reintroducing) the species to the wild in that area. The Services must ensure that the released population is \"wholly separate geographically\" from existing populations to qualify as experimental and be subject to these reduced protections. FWS implemented two rules in 1994 establishing experimental populations of gray wolves in (1)Â the greater Yellowstone area and (2) central Idaho and southwestern Montana. FWS evaluated whether these populations would be \"wholly separate geographically\" based on the areas occupied by existing gray wolf populations , not where any individual gray wolvesâlone dispersers from the packâmight be found. In the rules, FWS stated that it would treat any individual gray wolves found in the experimental population area as part of that population. Farm bureaus, researchers, and conservation groups challenged this approach. A federal district court in Wyoming vacated the rules on three grounds, all centered on FWS's use of populations rather than individuals to evaluate geographic separation. First, the court held that FWS's interpretation was inconsistent with clear congressional intent by potentially lessening protections for individual members of the species that ventured from protected populations into the experimental population's range. Second, the court held that the rules conflicted with FWS's own regulations, which require that any overlapping experimental and nonexperimental animals all be treated as endangered under the Act. Third, it held that treating all gray wolves in the experimental area as part of the experimental population, including naturally occurring wolves who migrated there, effected a de facto delisting of those wolves contrary to the ESA. On appeal, the U.S. Court of Appeals for the Tenth Circuit (Tenth Circuit) disagreed. It found that Congress left the phrase \"wholly separate geographically from nonexperimental populations\" to the Services to interpret. Reviewing FWS's interpretation, the court observed that FWS's regulations define the term \"population\" as a group \"in common spatial arrangement.\" FWS had relied on this definition to conclude that individual dispersers would never be part of a \"population\" and therefore need not be accounted for when assessing geographic separation of populations . The court held that this interpretation was reasonable and consistent with the Act. It pointed to the use of species, subspecies, and DPSs rather than individuals as evidence that the Act's purpose is to conserve groups of organisms, not individual specimens. Consistent with that approach, the Tenth Circuit found that FWS reasonably determined the gray wolf's current range based on where populations were located rather than where individuals might disperse. Observing that wildlifeâparticularly wolvesâ moves, the court concluded that protecting specimens based on where they are rather than where they came from was a reasonable enforcement approach. The Tenth Circuit also held that the plaintiffs' contrary interpretation would require FWS to ensure that no individual specimens might cross between experimental and nonexperimental populations and would unnecessarily limit FWS's flexibility and discretion. The court determined that such a restrictive interpretation would prevent FWS from making full use of the experimental population tool and could hinder the conservation of the species, undermining the purposes of the Act. Accordingly, the Tenth Circuit reversed the district court's decision, allowing the central Idaho and greater Yellowstone area experimental populations to remain in place. Pursuant to the court's opinion, the Services may rely on areas occupied by populations rather than individuals to determine whether an experimental population would be \"wholly separate geographically\" as the Act required. Determining whether a species qualifies as endangered or threatened for purposes of listing or delisting requires the Services to examine whether the species is in danger of extinction (1)Â currently or in the foreseeable future, (2) in all or a significant portion of its range, and (3) due to one or more of the five statutory factors categorizing types of threats. Though some commenters have disagreed with FWS's analyses of threats under the five statutory factors, those analyses have not generally been a focal point in gray wolf litigation except for FWS's assessment of state management plans' adequacy under the five statutory factors. FWS has had difficulty in successfully interpreting \"significant portion of its range\"âparticularly the \"significant\" componentâin connection with gray wolf rulemakings. Plaintiffs and commenters have repeatedly challenged FWS's interpretation of \"significant portion of its range\" in such rulemakings. Following an adverse court decision, FWS currently treats \"significant portion of its range\" as an independent basis for listing a species, meaning FWS will list the species in all of its range if it finds that the species is endangered or threatened in either (1) all or (2) a significant portion of its range. FWS has successfully defended its interpretation of \"range\" by interpreting the phrase to mean current rather than historical range. But courts have recently rejected FWS's interpretation of which portions are \"significant.\" FWS has not yet issued a revised policy on the meaning of \"significant portion of its range\" or how it interprets \"significant\" in light of the new decisions. In its 2003 rule, plaintiffs challenged FWS's interpretation of \"significant\" using the current \"range\" of the species. FWS had used the gray wolf's current range (i.e., the areas occupied by the Western Great Lakes and Northern Rocky Mountain populations) as the \"significant\" areas when reclassifying the Eastern DPS and Western DPS as threatened. An Oregon district court held that FWS failed to adequately justify why the areas occupied by these populations were the only \"significant\" ones. The court determined that FWS had instead relied on the gray wolf's current range, without considering the areas where the gray wolf \"is no longer viable but once was.\" Based in part on this conclusion, the court vacated the rule and remanded it to FWS. On remand, FWS revisited its interpretation of the terms \"range\" and \"significant\" in its 2007 Western Great Lakes DPS rule: Interpreting \" Range . \" FWS explicitly interpreted \"range\" to refer to the species' current rather than historical range. FWS based its interpretation on the fact that the ESA defines an endangered species or threatened species as one that \" is in danger of extinction\" at the time or in the foreseeable future. FWS determined that while a species may be extinct in its historical range, it could only be in danger of extinction in all or part of its current range. The District of Columbia district court vacated this rule on other grounds, but the D.C. Circuit subsequently upheld FWS's interpretation of range as reasonable. FWS has since clarified that although it evaluates the current rather than historical range for purposes of determining the species' status, it considers the effect of losing the species' historical range when evaluating the statutory factors in listing decisions. Interpreting \" Significant . \" FWS explained in the 2007 rule that it would determine what constituted a \"significant\" part of a species range on a case-by-case basis depending on the biological needs of the species. To conduct this analysis, FWS would consider the ecosystems on which the species depends and the values identified in the Act. Relevant factors might include the quality and quantity of habitat, the historical and current use of the habitat, specific uses for the habitat such as breeding or migration, and the role of that part of the range in maintaining genetic diversity. Though a federal district court in the District of Columbia subsequently vacated this rule, it did so on other grounds without reviewing FWS's interpretation of \"significant.\" The Solicitor's Office of the Department of the Interior issued an opinion soon after the final rule affirming FWS's interpretation and providing a more extensive explanation of the position. FWS relied on this interpretation and the Solicitor's opinion in subsequent gray wolf rulemakings. Beginning with its 2011 Western Great Lakes DPS rule, FWS adjusted its explanation of \"significant portion of its range\" to incorporate principles of conservation biology. The agency interpreted the phrase to mean that the area is (1) within the current range of the species and (2)Â \"important to the conservation of the species because it contributes meaningfully to the representation, resiliency, or redundancy of the species.\" An area would \"contribute[] meaningfully\" if loss of the area would negatively affect FWS's ability to conserve the species. In 2014, the Services issued a joint policy on their interpretation of \"significant portion of its range\" under the ESA. The policy was generally consistent with FWS's and the Solicitor's past interpretations but contained a revised definition of \"significant\": A portion of the range of a species is \"significant\" if the species is not currently endangered or threatened throughout all of its range, but the portion's contribution to the viability of the species is so important that, without the members in that portion, the species would be in danger of extinction, or likely to become so in the foreseeable future, throughout all of its range. District courts later invalidated this definition, concluding that a species could never be listed based on a \"significant portion of its range\" under this interpretation, and prohibited the Services from applying it. These courts maintained that under this definition no species could be endangered or threatened in a significant portion of its range without being endangered or threatened in all its range. The courts reasoned that if a species were endangered or threatened in a \"significant portion\" of its range and would be endangered or threatened in all of its range without that portion, then the species would be listable as endangered or threatened in all its range. In its 2019 proposed rule to delist the remaining gray wolf entities, FWS acknowledged that the policy had been invalidated and addressed the courts' opinions by reviewing the gray wolf's range to identify any portion \"that could be significant under any reasonable definition of 'significant' that relates to the conservation of the gray wolf entity.\" The Services have not yet issued a revised policy interpreting the phrase \"significant portion of its range.\" Plaintiffs have also challenged FWS's interpretation of \"significant portion of its range\" to allow FWS to list a species only in those parts of its range where it is endangered or threatened. In its 2009 rule designating the Northern Rocky Mountain DPS and delisting it except in Wyoming, FWS implicitly interpreted the ESA as allowing the agency to list a species only in that portion of its range where FWS determined the species was endangered or threatened. This interpretation allowed FWS to keep the DPS listed in Wyoming (based on inadequate regulatory mechanisms) but delist it elsewhere. A Montana district court vacated this rule on the grounds that FWS's interpretation was inconsistent with the ESA and its legislative history. The court determined that Congress added the phrase \"significant portion of its range\" to expand the circumstances under which the Services could list a species to address concerns that the ESA's predecessors limited the Services to listing species that were endangered worldwide. The court accordingly concluded that the phrase was added to change \" when a species can be listed,\" not \" what must be listed and protected.\" The court also concluded that FWS's interpretation rendered superfluous DPSs and the vertebrate distinction for DPSs if the agency could limit its listing of a species to the part of its range that was endangered or threatened. The court held that \"significant part of its range\" refers to whether , not where , a species is endangered or threatened. In light of the court's decision, FWS has subsequently interpreted this phrase to constitute an independent basis for listing a species throughout its range. To determine whether a species is threatened, the Services must determine whether it is in danger of extinction in the \"foreseeable future.\" Though FWS's interpretation of this phrase has not been the focus of legal challenges to rules relating to the gray wolf, FWS's interpretation of the term as it applies to the gray wolf has changed over time. Originally, FWS used the term \"foreseeable future\" in its analyses but did not interpret it in general or with respect to the gray wolf specifically. In the 2007 Western Great Lakes DPS rule, however, FWS defined the term \"foreseeable future\" specifically for the gray wolf. The agency determined that 30 years was an appropriate measure of the foreseeable future for the gray wolf because wolves have 3-year generations, so 30 years represented 10 generations of wolves. FWS viewed 10 generations as a reasonable period to reliably predict the effects of threats on the species. FWS changed course again in the 2009 rules designating and delisting the Western Great Lakes DPS and Northern Rocky Mountain DPS. Rather than defining the \"foreseeable future\" for the species as a whole based on its reproductive patterns, FWS announced that it would determine the foreseeable future for each threat it considered based on its ability to project and predict effects of the threats reliably. For example, the agency used 30 years as the timeframe for available habitat and distribution models, but when considering the effect of genetic isolation on the species, it used a model that predicted those effects for the next 100 years. Though FWS's gray wolf rules have not been overturned based on its interpretation of \"foreseeable future,\" its approach is information as interpretations of this term have generated challenges for rules on other species. The Services' recent revisions to their ESA regulations codify an interpretation of \"foreseeable future\" much like the one FWS adopted in the 2009 rules. As revised, the Services interpret \"foreseeable future\" to \"extend[] only so far into the future as the Services can reasonably determine that both the future threats and the species responses to those threats are likely.\" The Services intend to evaluate \"foreseeable future\" on a case-by-case basis based on \"considerations such as the species' life-history characteristics, threat-projection timeframes, and environmental variability.\" Consistent with FWS's approach in the more recent gray wolf rules, the Services state that they need not identify the foreseeable future as a specific time period. The Services delist species using the same process they use to list species: They evaluate whether the species meets the definition of \"endangered species\" or \"threatened species\" due to one or more of the five statutory factors based on the best available scientific and commercial data. However, when delisting a species, the Services also generally evaluate the species' recovery pursuant to any identified objective recovery criteria in recovery plans and assesses the adequacy of state management plans following delisting. FWS has stated that a species need not meet all of the recovery criteria to be delisted. But a Montana district court has required FWS to provide an adequate explanation if it chooses to reject recovery criteria or delist a species that has not met these criteria, because FWS develops the recovery criteria pursuant to the statutory directive to establish \"objective, measurable criteria which, when met , would result in a determination ... that the species be removed from the list.\" State management plans fall under the purview of \"inadequate regulatory mechanisms\" in the five-factor analysis, but the Services give them particular attention in delisting rules because the regulatory mechanisms protecting a species necessarily change when it is delisted and no longer receives federal protection under the ESA. Accordingly, this section focuses specifically on two aspects of recovery and delisting species: (1) how FWS has addressed objective recovery criteria and (2) post-delisting state management plans. Plaintiffs have challenged how FWS has used recovery plan criteria when assessing the gray wolf's recovery in its delisting rules. The ESA directs the Services to develop and implement recovery plans for the conservation and survival of listed species if such a plan would promote conservation of the species. In any such plan, the Services must include \"objective, measurable criteria\" that, if met, would cause the Services to delist the species. The Act, however, directs the Services to determine whether a species should be reclassified or removed from the list during a status review based on the Section 4(a) and (b) criteriaânamely the endangered and threatened species definitions and the five statutory categories of threats as determined using the best available commercial and scientific dataâwithout mentioning recovery plan criteria. Though these two provisions do not inherently conflict, they have generated questions about the role of objective criteria in recovery plans when delisting species. Parties have challenged FWS's decision to delist a species when it had not met all of the objective recovery criteria. For example, plaintiffs challenged the 2008 rule to designate and delist the Northern Rocky Mountain DPS based in part on a study finding no evidence of genetic exchange between the greater Yellowstone area population and the other two recovery areas. The 1994 EIS included as a recovery criterion that the northern Rocky Mountain recovery areas have \"[t]hirty or more breeding pairs comprising some 300+ wolves in a metapopulation (a population that exists as partially isolated sets of subpopulations) with genetic exchange between subpopulations .\" The plaintiffs arguedâand a Montana district court agreedâthat this criterion required evidence of actual DNA exchange, not just the potential for genetic exchange or expectation of such exchange in the future. The court held that although the ESA did not prohibit FWS from finding that a species had recovered without meeting recovery criteria, FWS still needed to justify adequately rejecting its own recovery criteria to avoid violating the APA. FWS addressed these criticisms in its 2009 Northern Rocky Mountain DPS rule in multiple ways. The agency challenged the factual conclusion that genetic exchange had not occurred by questioning the assumptions of the underlying scientific study and identifying new studies showing wolf dispersal and genetic exchange. FWS further explained its interpretation of the recovery criterion, maintaining that the recovery criterion did not require confirmed genetic exchange and that genetic exchange need not result from natural migration and could be human-assisted. Finally, the agency explained why the criterion was not needed to find recovery, reasoning that genetic exchange was not a concern for the populations due to the high level of preexisting genetic diversity. In later rulemakings, FWS has stated that \"recovery may be achieved without all recovery criteria being fully met.\" When there are questions about whether a species FWS seeks to delist has met objective recovery criteria, the agency may use one or more of the following approaches based on past practice: (1) explaining flaws in evidence showing the criteria have not been met; (2) finding additional evidence supporting its position; (3) explaining its understanding of the recovery criteria to explain why they have been met; or (4) explaining why it views the species as having recovered despite not explicitly meeting the objective criteria. Finally, parties have challenged the recovery criteria in comments on proposed rules as either excessive or inadequate to determine whether the species had recovered. FWS generally has concluded that its recovery criteria are adequate, and, to date, courts generally have not addressed FWS's technical expertise in selecting the criteria. State plans for managing a species post-delisting can enter into the Services' delisting determinations in two ways: (1) the Services examine any state management plans under \"Factor D: The Inadequacy of Existing Regulatory Mechanisms,\" and (2) the Services may require in the recovery plan that they approve certain state management plans before delisting the species. For the gray wolf, the Eastern Timber Wolf Recovery Plan required as part of its recovery criteria that Minnesota, Michigan, and Wisconsin have in place state management plans FWS had approved as providing adequate wolf protection and management. Similarly, the Northern Rocky Mountain Gray Wolf Recovery Plan required in its recovery criteria that Montana, Wyoming, and Idaho have FWS-approved state management plans. To meet this recovery plan requirement, (1) the state must create a management plan that FWS approves, (2) FWS must adequately explain why it approved the plan, and (3) the state must implement the plan. The state or FWS failing to complete any of these steps has delayed FWS delisting gray wolf populations and caused courts to vacate final delisting rules. Formulating an Adequate Management Plan. First, the state must craft a management plan that FWS deems adequate to ensure the continued recovery of the species. In 2003, FWS designated but did not delist the Western DPS because the agency had rejected Wyoming's state management plan as inadequate. Wyoming challenged FWS's decision to not approve its management plan, but a Wyoming district court dismissed the case for failing to tie the decision to any final agency action that could be reviewed. FWS took a different approach in 2009 when it delisted the Northern Rocky Mountain DPS without Wyoming because it determined that the Wyoming plan remained inadequate and could not be approved. But a Montana district court determined that FWS could not delist the DPS only in part, effectively holding that Wyoming must enact an approved state management plan for the entire DPS to be delisted. Congress superseded this decision by enacting legislation in 2011 that directed FWS to reinstate the rule delisting the DPS except for Wyoming. Explaining the Agency 's Approval of the Management Plan. Second, FWS must adequately explain why it approved the state plan. In 2008, FWS delisted the Northern Rocky Mountain DPS after Wyoming revised its state management plan between the proposed and final rules. FWS proposed to delist the DPS only if Wyoming modified its plan to provide adequate protection for the species. Wyoming modified its statutes and wolf management plan after the proposed rule was published. In the final rule, FWS determined that the revised plan was adequate to ensure the gray wolf's continued recovery. A Montana district court, however, held that FWS's approval of Wyoming's plan was likely arbitrary and capricious and issued a preliminary injunction staying the delisting rule. The court determined that the plan suffered from the same flaws that FWS had identified in the plan it previously rejected and that FWS had failed to adequately explain why the plan was now sufficient. Several months after issuing the preliminary injunction, the court vacated and remanded the rule at FWS's request. Implementing the Management Plan. Finally, the state must enact and otherwise implement, as applicable, the approved management plan to ensure that the protections the Services rely on to delist the species are actually in place. For example, FWS stated in its 2000 proposed rule that it had intended to propose delisting the Western Great Lakes DPS as well as designating it but that the agency could not because the Minnesota legislature had failed to vote on the plan FWS had approved before FWS published its proposed rule. FWS accordingly proposed to designate the DPS but not delist it because the recovery criteria were not met without an approved Minnesota management plan in place. Once Minnesota enacted its plan, FWS moved forward with delisting the DPS (though courts ultimately vacated all the rules that followed). Similarly, FWS found Wyoming's management plan to be inadequate in the 2007 Northern Rocky Mountain DPS proposed rule because state laws and regulations prevented the Wyoming Game and Fish Commission from actually implementing certain components of the plan. Once Wyoming modified its state laws and regulations, FWS approved the plan. As the litigation over the FWS's 2012 rule illustrates, although states must enact management plans for the Services to move forward with delisting a species, the regulatory mechanisms need not all be legally binding so long as states assure the Services that adequate protections will be provided in practice. The federal district court for the District of Columbia vacated FWS's 2012 rule delisting the gray wolf in Wyoming because FWS relied on nonbinding promises from Wyoming that it would manage the population above the minimum recovery level. On appeal, the D.C. Circuit reversed the district court and restored the rule delisting the gray wolf in Wyoming, holding that \"regulatory mechanisms\" need not be binding with the force of law for FWS to determine they were adequate to protect the species. The Services' approval of state management plans and the adequacy of their explanations for approving the plans can accordingly play a central role in both finalizing delisting rules and surviving judicial review of those rules. For a particular species and state, the adequacy of the state's regulatory mechanisms and management plan are determined on a case-by-case basis through negotiation between the state and the Services. The history of the gray wolf under the ESA illustrates the challenges FWS has faced in conserving the species as the Act intended. In implementing the ESA, the Services must contend with disagreements over how to interpret ambiguous terms, uncertain and ever-changing scientific data, and conflicting views on what it means to conserve species and the role of the states in that effort. These issues can complicate the Services' efforts to conserve endangered and threatened species and delist them, consistent with the Act's purposes. Difficulties that delay delisting species may frustrate certain stakeholders, such as state wildlife agencies that want more flexibility in managing the species or private entities in the species' habitat who must comply with the Act's prohibitions and Section 7 consultation requirements. Other stakeholders such as conservation groups or animal rights activists may raise concerns that species are inadequately regulated to ensure their long-term recovery or continued biodiversity due to uncertainties in the science and ambiguities in the statute. Either set of stakeholders may question whether the Act is effectively promoting the recovery of listed species. In light of the scientific and administrative challenges FWS has encountered with regulating the gray wolf under the Act, Congress could consider amending the Act to address these issues and ensure the Act is implemented in accordance with congressional intent. Such legislation could amend the Act generally or specifically with respect to a particular action, such as the Act directing FWS to reinstate the rule designating and delisting the Northern Rocky Mountain DPS except for Wyoming. Legislative proposals have been introduced in the 116th Congress that would pursue each of these approaches: amending the Act generally or specifically directing FWS to issue new rules or reissue vacated ones regarding the gray wolf. ", "summary": "Under the Endangered Species Act of 1973 (ESA or the Act; 16 U.S.C. Â§Â§ 1531-1544), the U.S. Fish and Wildlife Service (FWS) and the National Marine Fisheries Service (NMFS) (together, the Services) determine which species to \"list\" as \"endangered species\" or \"threatened species,\" terms defined in the Act. Species, subspecies, and distinct population segments (DPSs) may all be listed as \"species\" under the Act. Listing a species invokes certain protections under the Act and a requirement that the Services develop a recovery plan to conserve the species. Listed species may be reclassified by the Services from threatened to endangered or vice versa. The Services may also remove a species from the list, often called delisting, if it no longer meets the definition of an endangered or threatened species. The Services list, reclassify, and delist species pursuant to statutory criteria and definitions through the agency rulemaking process. Persons mayâand often doâchallenge the legality of those final rules through litigation. When such challenges succeed, the court remands the rule to the applicable Service for further proceedings and may vacate the challenged rule. The gray wolf ( Canis lupus ) presents a useful example of the legal issues that arise with listing and delisting species as threatened and endangered under the ESA and how FWS has addressed them. FWS first listed the gray wolf as endangered in 1967 under the Endangered Species Preservation Act (ESPA), a predecessor of the ESA. The gray wolf's status and regulation under the ESA and its predecessors have been the subjects of numerous FWS rules and court opinions. FWS's gray wolf rules show how the agency's approach to interpreting and implementing the ESA has evolved and highlight hurdles that may arise with species' status determinations. As American pioneers settled the West, hunting and other human-caused mortality, spurred by federal and state bounties, brought the gray wolf to near extinction. By the 1960s, the only population remaining in the lower 48 states was in the northern Minnesota forests. FWS listed the eastern timber wolf ( C. lupus lycaon , a gray wolf subspecies found in Minnesota) as endangered under the ESPA. By 1976, three more gray wolf subspeciesâthe Mexican wolf ( C. lupus baileyi ), the northern Rocky Mountain wolf ( C. lupus irremotus ), and the Texas wolf ( C. lupus monstrabilis )âwere listed as endangered under the ESA. In 1978, FWS combined all gray wolf subspecies listings into one listing for the entire gray wolf species in the lower 48 states except Minnesota, which was listed as endangered, and a separate listing for the gray wolf in Minnesota as threatened. In the next few years, FWS created subspecies recovery plans that outlined management strategies and recovery criteria. In the 1990s, FWS reintroduced gray wolves to the northern Rocky Mountains and the Southwest as experimental populations under the ESA. Protected under the ESA from human-caused mortality, which FWS identified as the greatest threat to the species, gray wolf populations increased. In the 2000s, FWS tried on multiple occasions to reclassify or delist gray wolf DPSs it had determined were no longer in risk of extinction, but courts vacated many of the agency's rules. As of January 2020, the gray wolf is listed as endangered or threatened in the lower 48 states, except for a population in the northern Rocky Mountains. FWS's efforts to recover the gray wolf under the ESA exemplify the regulatory and legal challenges that arise when listing and delisting species under the Act. From initial listing to recovery and reintroduction efforts to more recent attempts to delist the gray wolf, FWS has addressed in its regulatory actions such issues as uncertainties in gray wolf taxonomy, ambiguous statutory terms (e.g., \"foreseeable future\" and \"significant portion of its range\"), and the adequacy of state management plans. Stakeholders have questioned FWS's choices in comments to the proposed rules and have challenged many of the agency's gray wolf rules in court. Many of the legal challenges to FWS's delisting rules have succeeded, with courts vacating the rules and remanding them to the agency. The history of FWS's regulation of the gray wolf under the ESA and related litigation serve as a useful case study in how regulatory and legal challenges have shaped FWS's interpretation and application of key terms when listing and delisting species under the Act.", "document_type": "crs"}
{"report": "Agriculture-based renewable energy can take several forms, including biofuels such as corn-based ethanol or soy-based biodiesel, wind-driven turbines located on farmland or in rural areas, anaerobic digesters that convert animal waste into methane and electric power, or biomass harvested for burning as a processing fuel or to generate heat as part of an industrial activity. Since the late 1970s, U.S. policymakers at both the federal and state levels have adopted a variety of incentives, regulations, and programs to encourage the production and use of agriculture-based renewable energy (mostly biofuels). Over the years, the two most widely used biofuelsâethanol produced primarily from corn starch and biodiesel produced primarily from soybean oilâhave received significant federal support in the form of tax incentives, loans and grants, and regulatory programs. Many of these support programs originate in legislation outside of the farm bill. For instance, the Energy Tax Act of 1978 ( P.L. 95-618 ) provided an exemption for ethanol from the excise tax on motor fuels. By executive order the Bioenergy Program was established in 1999 and in FY2001 began making payments from the U.S. Department of Agriculture's (USDA's) Commodity Credit Corporation (CCC) to eligible producers of ethanol and biodiesel based on year-to-year production increases in these fuels. The Biomass Research and Development Act of 2000 ( P.L. 106-224 ) directed USDA and the U.S. Department of Energy (DOE) to cooperate and coordinate research and development activities for biobased industrial products, including biofuels. The 2002 farm bill ( P.L. 107-171 ) authorized several new biofuel programs and added an energy title, Title IX. The 2008 farm bill ( P.L. 110-246 ) subsequently extended and expanded the programs promoting renewable energy, emphasizing particularly those utilizing biomass feedstock. The 2014 farm bill ( P.L. 113-79 ) extended the programs through FY2018. The 2018 farm bill, the Agriculture Improvement Act of 2018 ( P.L. 115-334 ), continues federal support for the programs through FY2023. Motivations cited for these legislative initiatives include energy security concerns, reduction of greenhouse gas emissions from fossil fuel combustion, and raising domestic demand for U.S.-produced farm products. Congress has enacted temporary tax incentives for biofuels, specifically tax credits for biodiesel and second generation (formerly cellulosic) biofuel and a tax credit for small producers. Some of these temporary tax incentives have been extended numerous times. Most recently, the Bipartisan Budget Act of 2018 (BBA; P.L. 115-123 ) retroactively extended the tax incentive for biodiesel and renewable diesel of $1.00/gallon through the end of 2017. In addition to these types of tax incentives, the Renewable Fuel Standard (RFS) mandates a minimum level of renewable fuel usage. Historically, there has been a revenue cost associated with tax incentives for ethanol and biofuels. The Volumetric Ethanol Excise Tax Credit (VEETC) provided a tax credit of $0.45/gallon before it expired at the end of 2011. From FY1980 through FY2013, excise tax credits and incentives for ethanol reduced federal tax revenue by a cumulative estimated total of $46.9 billion. In FY2011, the fiscal year immediately preceding the VEETC's expiration, its cost was an estimated $6.5 billion. Excise tax incentives for biodiesel producers have reduced federal excise tax revenue by an estimated $17.3 billion between FY2008 and FY2018. In FY2018, excise tax receipts were reduced by $3.4 billion due to biodiesel producer credits (the reduction in FY2018 excise tax receipts is associated with tax credit claims made for biodiesel production in calendar year 2017). Title IX of the 2018 farm bill continues long-standing congressional support for the production of renewable energy from agriculturally sourced materials. This report focuses on those policies contained in the 2018 farm bill that support agriculture-based renewable energy. The introductory sections of this report briefly describe how USDA bioenergy policies evolved and how they fit into the larger context of U.S. biofuels policy. Then, each of the bioenergy provisions of the 2018 farm bill are defined in terms of their function, goals, administration, funding, and implementation status. In an appendix at the end of this report, Table A-1 presents data on 2018 farm bill budgetary authority for energy provisions, while Table A-2 , Table A-3 , and Table A-4 present the original budget authority for Title IX programs under the previous 2014 farm bill, the 2008 farm bill, and the 2002 farm bill, respectively. Renewable energy production plays a key role not just in agricultural policy, but also in energy, tax, and environmental policy. As a result, many of the federal programs that support renewable energy production in general, and agriculture-based energy production in particular, are outside the purview of USDA and have origins outside of omnibus farm bill legislation. For example, the three principal federal biofuels policies of the past decade were all established outside of farm bills: The Renewable Fuel Standard (RFS) mandates an increasing volume of biofuels use and has its origins in the Energy Policy Act of 2005 ( P.L. 109-58 ). The RFS was expanded in the Energy Independence and Security Act of 2007 (EISA; P.L. 110-140 ) and divided into four distinct, but nested biofuel categoriesâtotal, advanced, cellulosic, and biodieselâeach with its own mandated volume. The VEETC, originally established in the American Jobs Creation Act of 2004 ( P.L. 108-357 ), provided a tax credit that varied in value over the years. It was $0.45 per gallon of pure ethanol blended with gasoline when it expired on December 31, 2011. The ethanol import tariff was intended to offset the ethanol tax incentives and was originally established by the Omnibus Reconciliation Act of 1980 ( P.L. 96-499 ). The ethanol import tariff also expired on December 31, 2011. In addition to the RFS, VEETC, and the ethanol import tariff, several other tax credits that originated outside of farm bills were available for biodiesel production as well as for small producers (less than 60 million gallons per year per plant) of ethanol and biodiesel. A substantial number of federal programs also support renewable energy sources other than biofuels. In addition to federal programs, many states offer additional support to biofuels producers, blenders, and consumers. An awareness of the non-USDA federal programs is important for appreciating the role envisioned for the energy title of both the 2018 farm bill and previous farm bills. The farm bill programs were designed to provide incentives for the research and development of new agriculture-based renewable fuels, especially second-generation biofuels (those based on non-food crop biomass such as cellulose and algae), and to expand their distribution and use. A summary of the evolution of these programs follows. The 2002 farm bill (Farm Security and Rural Investment Act of 2002; P.L. 107-171 ) was the first omnibus farm bill to explicitly include an energy title (Title IX). The energy title authorized grants, loans, and loan guarantees to foster research on agriculture-based renewable energy, to share development risk and to promote the adoption of renewable energy systems. Since enactment of the 2002 farm bill, interest in renewable energy has grown rapidly, due in large part to periods of steep increases in domestic and international petroleum prices and a dramatic acceleration in domestic biofuels production (primarily corn-based ethanol). Annual U.S. ethanol production expanded rapidly between 2002 and 2007, rising from approximately 2 billion gallons to over 6.5 billion gallons during that period. Similarly, corn use for ethanol grew from an 11% share of the U.S. corn crop in 2002 to an estimated 23% share of the 2007 corn crop. During the 2008 farm bill debate, government and industry projections had ethanol's corn-use share rising rapidly, sparking concerns about unintended consequences of the policy-driven expansion of U.S. corn ethanol production. Dedicating an increasing share of the U.S. corn harvest to ethanol production evoked fears of higher prices for all grains and oilseeds that compete for the same land, which could lead to higher livestock feed costs, higher food prices, and lower U.S. agricultural exports. In addition, several environmental concerns emerged regarding water impacts, and the expansion of corn production onto nontraditional lands, including native grass and prairie land, among other things. In response, policymakers sought to refocus biofuels policy initiatives in the 2008 farm bill (the Food, Conservation, and Energy Act of 2008; P.L. 110-246 ) in favor of non-corn starch feedstock, especially cellulosic-based feedstock, by introducing a number of programs aimed at facilitating the production and use of bioenergy from nonfood feedstock. The 2008 farm bill became law six months after the enactment of the EISA. A key component of EISA was a significant expansion of the RFS, which in part mandates the increasing use of \"advanced biofuels\" (i.e., non-corn starch biofuels), whose minimum use was scheduled to increase from zero gallons in 2008 to 21 billion gallons by 2022. The energy provisions of the 2008 farm bill were intended to reinforce EISA's program goals via a further refocusing of federal incentives toward non-corn-based sources of renewable energy. These advanced biofuel goalsâin particular for the RFSâhave proven difficult to meet. Funding for the majority of the energy programs from the 2008 farm bill expired at the end of FY2012 and lacked baseline funding going forward. The 2014 farm bill (Agricultural Act of 2014; P.L. 113-79 ) extended most of the renewable energy provisions of the 2008 farm bill and provided new mandatory funding, with some notable exceptions. Again, most of the 2014 farm bill energy programs lacked a mandatory funding baseline going forward beyond FY2018. The 2014 farm bill included some key changes to select programs including Section 9007, the Renewable Energy for America Program (REAP), which precludes the use of REAP funding for any mechanism for dispensing energy at the retail level (e.g., blender pumps). The 2014 farm bill repealed one program and two studiesâSection 9011, the Forest Biomass for Energy Program; Section 9013, the Biofuels Infrastructure Study; and Section 9014, the Renewable Fertilizer Study. Additionally, the 2014 farm bill did not address the Rural Energy Self-Sufficiency Initiative of the 2008 farm bill. The 2018 farm bill (Agriculture Improvement Act of 2018; P.L. 115-334 ) extends most of the 2014 farm bill energy title programs through FY2023 and provides new mandatory funding. It establishes one new programâthe Carbon Utilization and Biogas Education Program. It repeals one program and one initiativeâthe Repowering Assistance Program and the Rural Energy Self-Sufficiency Initiative. A key point of the 2018 farm bill is that it provides less mandatory funding than previous farm bills for energy title programs. For instance, the 2018 farm bill energy title programs mandatory funding level ($375 million) is approximately 46% less than the mandatory funding provided in the 2014 farm bill ($694 million). On the other hand, the total discretionary authorization provided by the 2018 farm bill ($1.7 billion) is approximately 13% more than what was authorized in the 2014 farm bill ($1.5 billion) for the energy programs. However, most energy title programs did not receive discretionary appropriations under previous appropriation acts. The 2018 farm bill energy title programs are described in more detail in the section below entitled \" Major Energy Provisions in the 2018 Farm Bill .\" In general, two types of funding are authorized by Congress in a farm billâmandatory and discretionary. Some farm bill programs receiving mandatory funds are automatically funded at levels \"authorized\" in the farm bill unless Congress limits funding to a lower amount through the appropriations or legislative process. For many of these programs, mandatory funding is provided through the borrowing authority of USDA's Commodity Credit Corporation (CCC). The farm bill may also specify some discretionary funding as \"authorized to be appropriated\"âsuch discretionary funding is actually determined each year through the annual appropriations process and may or may not reflect the funding level suggested in the authorizing legislation. The 2002 farm bill ( P.L. 107-171 ) provided mandatory funding of $801 million and identified discretionary authorizations of $294 million for the farm bill energy programs for FY2002-FY2007 ( Table A-4 ). The Section 9010 Continuation of the Bioenergy Program (7 U.S.C. Â§8108)âwhich was the predecessor to the Bioenergy Program for Advanced Biofuelsâreceived approximately 75% of the mandatory appropriations. The Section 9006 Renewable Energy Systems and Energy Efficiency Improvements program (7 U.S.C. Â§8106)âwhich became a part of REAP when it was created in the 2008 farm billâreceived approximately 15% of the mandatory appropriations. The entirety of the $294 million in discretionary authorizations went to Section 9008 Biomass Research and Development (26 U.S.C. Â§7624). The 2008 farm bill authorized slightly over $1.0 billion in mandatory funding and nearly $1.5 billion in discretionary appropriations to Title IX energy programs for FY2008-FY2012 ( Table A-3 ). Mandatory authorizations included $320 million for the Biorefinery Assistance Program, $300 million for the Bioenergy Program for Advanced Biofuels, and $255 million for the Rural Energy for America Program (REAP). The Biomass Crop Assistance Program (BCAP) was authorized to receive such sums as necessary (i.e., funding is open-ended and depends on program participation); however, limits were later set on BCAP outlays under the annual appropriations process beginning in FY2010. The $1.5 billion of discretionary funding authorization included $600 million for the Biorefinery Assistance Program, and $100 million for both the Bioenergy Program for Advanced Biofuels and REAP. However, actual discretionary appropriations through FY2012 to all Title IX energy programs were substantially below authorized levels. As regards mandatory funding, all of the bioenergy provisions of Title IXâwith the exception of Section 9010, the Feedstock Flexibility Program for Bioenergy Producers, which is authorized indefinitelyâhad mandatory funding only for the life of the 2008 farm bill, FY2008 through FY2012. As a result, all of the bioenergy provisions in Title IX of the 2008 farm bill, with the exception of the Feedstock Flexibility Program for Bioenergy Producers (Â§9010), expired on September 30, 2012. The 112 th Congress did not complete action on any of the regular FY2013 appropriations bills during 2012. Instead, a continuing resolution (CR) for the first half of FY2013 ( P.L. 112-175 ) was signed into law on September 28, 2012. This was followed by a second CR to provide appropriations for the second half of FY2013 ( P.L. 113-6 ). The Rural Energy for America Program was the sole Title IX bioenergy program that received an appropriation of discretionary funds ($3.4 million) in FY2013. Many of the 2008 farm bill programs were extended through September 30, 2013, by Section 701 of the American Taxpayer Relief Act of 2012 (ATRA; P.L. 112-240 ) signed into law by President Obama on January 2, 2013. Under ATRA, discretionary funding was authorized to be appropriated at the rate that programs were funded under the 2008 farm bill. The five-year reauthorization period (FY2014-FY2018) of the 2014 farm bill ( P.L. 113-79 ) contained a total of $694 million in new mandatory funding and authorized $1.5 billion to be appropriated for the various farm bill renewable energy programs ( Table A-2 ). Under the 2014 farm bill, Congress acted through annual appropriations bills to lower the amount of mandatory funding available to four of these programs (i.e., the Biorefinery Assistance Program, the Repowering Assistance Program, the Bioenergy Program for Advanced biofuels, and the Biomass Crop Assistance Program) and did not appropriate discretionary funding for most of these programs. Programs that did receive discretionary funding under the 2014 farm bill include the Rural Energy for America Program and the Rural Energy Savings Program. The 2018 farm bill reauthorizes the energy title programs for a five-year term, FY2019-FY2023. It contains $375 million in new mandatory funding and authorizes to be appropriated $1.7 billion ( Table A-1 ). Of the four farm bills since 2002, the 2018 farm bill gives the least amount of mandatory funding for energy title programs. The amount of discretionary authorization is comparable to what was provided in the 2014 farm bill. In short, under the 2018 farm bill, Congress has reduced the number of energy programs that receive mandatory funding, and reduced the amount of mandatory funding, while keeping both the number of discretionary programs and the discretionary funding similar to levels found in the 2014 farm bill. Further, some programs that received mandatory funding under the 2014 farm bill are now authorized to receive only discretionary funding under the 2018 farm bill (i.e., the Biodiesel Fuel Education Program, the Biomass Research and Development Initiative, and the Biomass Crop Assistance Program). Details of the funding levels provided in the 2018 farm billâand the 2014, 2008, and 2002 farm billsâare provided in the discussion of individual provisions below and are summarized in the appendix tables. Like the three preceding farm bills, the 2018 farm bill ( P.L. 115-334 ) contained a distinct energy title (Title IX) that extends many of the previous bioenergy programs. What follows is a summary of the bioenergy-related authorities found in the 2018 farm bill, including (where applicable) a brief description of each program, 2018 farm bill funding levels, and the status of program implementation, including any noteworthy legislative changes. This section provides a description for all sections listed under 7 U.S.C. Ch. 107 Renewable Energy Research and Development, which includes those sections that are under other titles of the 2018 farm bill. The 2018 farm bill made three substantive modifications to bioenergy-related definitions as follows (7 U.S.C. Â§8101): 1. \"biobased product\"â similar to prior law except it expands the term to include renewable chemicals; 2. \"biorefinery\"â defined as a facility that converts renewable biomass or an intermediate ingredient or feedstock of renewable biomass into biofuels, renewable chemicals, or biobased products and may produce electricity; and 3. \"renewable energy system \"â defined as a system that produces useable energy from a renewable source, including the distribution components necessary to move energy produced by the system to the initial point of sale, and other components and ancillary infrastructure such as a storage system, but not any mechanism for dispensing energy at retail (e.g., a blender pump). The first two modifications were designed to expand access to federal support for renewable chemicals and intermediate ingredients or feedstocks of renewable biomass, respectively. The last modification was designed to expand access to federal support for ancillary infrastructure (e.g., storage system) associated with a renewable energy system. Administered by: Rural Business and Cooperative Service, Rural Development Agency (RD), USDA. Program Overview : The Biobased Markets Program was originally established under the 2002 farm bill as a federal procurement preference program that required federal agencies to purchase biobased products under certain conditions (7 U.S.C. Â§8102). The 2008 farm bill renamed the federal biobased procurements preference program as the Biobased Markets Program. USDA refers to the program as the BioPreferredÂ® Program. The BioPreferredÂ® Program promotes biobased productsâthose derived from marine and forestry materialsâthrough two initiatives: (1) a mandatory purchasing requirement for federal agencies and their contractors and (2) a voluntary labeling initiative for biobased products. Products that meet the minimum biobased content criteria may display the USDA Certified Biobased Product label. Under the Biobased Markets Program, federal agencies and their contractors are generally required to purchase biobased products from 109 categories of goodsâamong which are cleaners, carpets, lubricants, office supplies, and paintsâwhen an agency procures $10,000 or more worth of an item within these categories during the course of a fiscal year, or where the quantity of such items or of functionally equivalent items purchased during the preceding fiscal year was $10,000 or more. Changes in 2018 Farm Bill: The 2018 farm bill ( P.L. 115-334 ) extended the Biobased Markets Program through FY2023, while adding some new implementation requirements. It requires the Secretary to update the eligibility criteria for determining which renewable chemicals will qualify for a \"USDA Certified Biobased Product\" label. The farm bill requires the Secretary and the Secretary of Commerce to develop North American Industry Classification System (NAICS) codes for both renewable chemical manufacturers and biobased product manufacturers, and for the Secretary to establish a national registry of testing centers for biobased products. The bill also requires USDA to establish an expedited approval process for products to be determined eligible for the procurement program and to receive a biobased product label. The farm bill prohibits a procuring agency from establishing procurement guidelines for biobased products that are more restrictive than what the Secretary has established. Funding: The 2018 farm bill authorized mandatory CCC funding of $3 million for each of FY2019-FY2023 for biobased products testing and labeling. Discretionary funding of $3 million was authorized to be appropriated for each of FY2019-FY2023. However, through FY2019 no discretionary funding has been appropriated for the Biobased Markets Program. Administered by: Rural Business and Cooperative Service, Rural Development Agency (RD), USDA in consultation with DOE. Program Overview : Originally called the Biorefinery Assistance Program (BAP) as authorized in the 2008 farm bill, this program assists in the development of new and emerging technologies for advanced biofuels, renewable chemicals, and biobased products. Competitive grants and loan guarantees are available for construction and/or retrofitting of demonstration-scale biorefineries to demonstrate the commercial viability of one or more processes for converting renewable biomass to advanced biofuels. Biorefinery grants can provide for up to 30% of total project costs. Each loan guarantee is limited to $250 million or 80% of project cost (7 U.S.C. Â§8103). Mandatory funds are used for the loan guarantee portion of BAP, whereas discretionary appropriations are to be used to fund grants. With no appropriation of discretionary funds for BAP during the life of the 2008 farm bill, Congress permitted USDA to move forward with only the loan guarantee portion of BAP. Rural Development administers the program under 7 C.F.R. Â§4279, Subpart C, and 7 C.F.R. Â§4287, Part D. For loan guarantees, project lenders (not prospective borrowers) must submit the application. Each loan guarantee application undergoes at least three rounds of review, including review by the Rural Development Agency, USDA; the National Renewable Energy Laboratory (NREL), DOE; and the Office of the Chief Economist (OCE), USDA. Changes in 2018 Farm Bill: The 2018 farm bill ( P.L. 115-334 ) extended the program through FY2023. It expanded the definition of eligible technology to include technologies that produce one or more of the following, or a combination thereof: an advanced biofuel, a renewable chemical, or a biobased product. Funding: The 2018 farm bill authorized mandatory CCC funding of $50 million for FY2019 and $25 million for FY2020 for the cost of loan guarantees. Discretionary funding of $75 million was authorized to be appropriated for each of FY2019-FY2023. No discretionary funds have been appropriated through FY2019. Administered by: Rural Business and Cooperative Service, RD, USDA. Program Overview : The Repowering Assistance Program (RAP) was originally established under the 2008 farm bill to encourage biorefineries to replace fossil fuels with renewable biomass as the feedstock. RAP made payments to eligible biorefineries (i.e., those in existence on the date of enactment of the 2008 farm bill, June 18, 2008) to encourage the use of renewable biomass as a replacement for fossil fuels used to provide heat for processing or power in the operation of these eligible biorefineries. Changes in 2018 Farm Bill: The Repowering Assistance Program was repealed. Administered by: Rural Business and Cooperative Service, RD, USDA. Program Overview : Originally created by a 1999 executive order during the Clinton Administration, the bioenergy program provided mandatory CCC incentive payments to biofuels producers based on year-to-year increases in the quantity of biofuel produced. The 2008 farm bill established a new Bioenergy Program for Advanced Biofuels to support and expand production of advanced biofuelsâthat is, fuel derived from renewable biomass other than corn kernel starchâunder which USDA would enter into contracts with advanced biofuel producers to pay them for production of eligible advanced biofuels. The policy goal is to create long-term, sustained increases in advanced biofuels production. Payments are of two types: one based on actual production, and a second based on incremental production increases. Not more than 5% of the funds in any year can go to facilities with total refining capacity exceeding 150 million gallons per year ( 7 C.F.R. Part 4288, Subpart B ). Changes in 2018 Farm Bill: The 2018 farm bill ( P.L. 115-334 ) extended the program through FY2023. It modifies the equitable distribution portion of the program by limiting the amount of payments for advanced biofuel produced from a single eligible commodity to not exceed one-third of the total program funding available in a fiscal year. Funding: The 2018 farm bill authorized mandatory CCC funding of $7 million for each of FY2019-FY2023. Discretionary funding of $20 million was authorized to be appropriated for each of FY2019-FY2023. However, no discretionary funding has been appropriated for the Bioenergy Program for Advanced Biofuels program through FY2019. Administered by: National Institute of Food and Agriculture (NIFA) and Office of Energy Policy and New Uses (OEPNU), OCE, USDA. Program Overview : Originally established under the 2002 farm bill, the Biodiesel Fuel Education Program was extended by the 2008, 2014, and 2018 farm bills (7 U.S.C. Â§8106). The Biodiesel Fuel Education Program awards competitive grants to nonprofit organizations that educate governmental and private entities that operate vehicle fleets, and educates the public about the benefits of biodiesel fuel use. The program is implemented by USDA through continuation grants. The final rule for the program was published on September 30, 2003 (68 Fed eral Reg ister 56137). Changes in 201 8 Farm Bill : Extended the Biodiesel Fuel Education Program from FY2019 through FY2023 without changes to program implementation other than new funding levels. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $2 million is authorized to be appropriated for each of FY2019-FY2023. However, through FY2019 no discretionary funding has been provided. Administered by: Rural Business and Cooperative Service, Rural Development, USDA. Program Overview: The 2008 farm bill combined elements of two existing programs from the 2002 farm billâthe Energy Audit and Renewable Energy Development Program and the Renewable Energy Systems and Energy Efficiency Improvements Programâinto a single program renamed the Rural Energy for America Program (REAP) (7Â U.S.C. Â§8107). REAP provides various types of financial assistance under a cost-share arrangement for the following purposes: grants, guaranteed loans, and combined grants and guaranteed loans for the development and construction of renewable energy systems (RES) and for energy efficiency improvement (EEI) projects (eligible entities include rural small businesses and agricultural producers); grants for conducting energy audits and for conducting renewable energy development assistance (eligible entities include state, tribe, or local governments; land-grant colleges and universities; rural electric cooperatives; and public power entities); and grants for conducting renewable energy systems (RES) feasibility studies (eligible entities include rural small businesses and agricultural producers). The cost share feature of REAP limits the government's contribution to no more than 75% of eligible project costs for RES systems and EEI funding for combined grant and loan guarantees, and to no more than 25% for grants. Under energy audit and renewable energy development assistance grants, a grantee must pay a minimum of 25% of the cost of the energy audit. RES systems include those that generate energy from biomass (but excluding any mechanism for dispensing energy at retailâe.g., a blender pump), anaerobic digesters, geothermal, hydrogen, solar, wind, and hydropower. EEI projects typically involve installing or upgrading equipment to significantly reduce energy use. REAP operates under regulations published under 7 C.F.R. Part 4280, subpart B. Changes in 2018 Farm Bill: The 2018 farm bill extends the program through FY2023. It amends the financial assistance for energy efficiency improvements and renewable energy systems section to include certain limitations for loan guarantees to purchase and install energy-efficient equipment or agricultural production or processing systems. Additionally, it limits funds for loan guarantees for energy-efficient equipment to agricultural producers to not exceed 15% of the annual funding provided to the program. Funding: The 2018 farm bill retains mandatory CCC funding of $50 million for FY2014 and each fiscal year thereafter (thus, unlike other farm bill renewable energy programs, REAP's mandatory funding authority does not expire with the 2018 farm bill). Mandatory funds are to remain available until expended. Discretionary funding is authorized to be appropriated at $20 million annually for each of FY2019-FY2023. Discretionary funding of $335,000 was appropriated for FY2019. Administered by: Rural Utilities Service, Rural Development, USDA. Program Overview : The Rural Energy Savings Program (7 U.S.C. Â§8107a) provides loans to qualified consumers to implement durable cost-effective energy-efficiency measures. The program was established in the 2014 farm bill. Loans are to be made to eligible entities that agree to use the loan funds to make loans to qualified consumers. Eligible entities include public power districts and public utility districts, among other entities. Loans to eligible entities are offered with no interest. Loan repayment by an eligible entity may not exceed 20 years from the loan's closing date, with an exception for special advances for start-up activities. A qualified consumer is a consumer served by an eligible entity with the ability to repay the loan. Changes in 2018 Farm Bill: The 2018 farm bill extends the program through FY2023. It modifies the definition of energy-efficiency measures to include cost-effective on- or off-grid renewable energy or energy storage systems. It amends the program such that the debt incurred by a borrower under this program may not be included when determining the borrower's eligibility for loans under programs authorized by the Rural Electrification Act of 1936. It requires the Secretary to streamline the accounting requirements on borrowers. Loans from eligible entities to qualified consumers may bear interest, not to exceed 5%, and must be used for certain purposes (e.g., to establish a loan loss reserve). Additionally, it requires the Secretary to publish an annual report containing the number of program applications received, the number of loans made to eligible entities, and the recipients of the loans. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $75 million is authorized to be appropriated for each of FY2019-FY2023. The program received $10 million in discretionary funding for FY2019. Administered by: National Institute of Food and Agriculture (NIFA), USDA, and DOE, jointly. Program Overview : BRDIâcreated originally under the Biomass Research and Development Act of 2000 (BRDA; P.L. 106-224 )âseeks to foster significant commercial production of biofuels, biobased energy innovations, development of biobased feedstocks, and biobased products and processes, including cost-competitive cellulosic ethanol. To this end, the program provides competitive funding in the form of grants, contracts, and financial assistance for research, development, and demonstration of technologies and processes. Eligibility is limited to institutions of higher learning, national laboratories, federal or state research agencies, private-sector entities, and nonprofit organizations. BRDI provides for coordination of biomass research and development, including life-cycle analysis of biofuels, between USDA and DOE by creating the Biomass Research and Development Board to coordinate government activities in biomass research, and the Biomass Research and Development Technical Advisory Committee to advise on proposal direction and evaluation. The 2008 farm bill moved BRDA in statute to Title IX of the 2008 farm bill and expanded the BRDI technical advisory committee (7 U.S.C. Â§8108). Since 2002 USDA and DOE jointly have announced annual solicitations and awards of funding allocations under BRDI. Pursuant to the 2008 farm bill, applicants seeking BRDI funding must propose projects that integrate science and engineering research in the following three technical areas that are critical to the broader success of alternative biofuels production: feedstock development, biofuels and biobased products development, and biofuels development analysis. A minimum of 15% of funding must go to each area. The minimum cost-share requirement for demonstration projects was increased in the 2018 farm bill to 50%, and for research projects to 20%. Changes in 2018 Farm Bill: The 2018 farm bill extends the program through FY2023. It amends the definition of biobased product to include carbon dioxide, and it requires the initiative's technical advisory committee to include an individual with expertise in carbon capture, utilization, and storage. Further, it expands the objectives of the initiative to include the development of high-value biobased products that permanently sequester or utilize carbon dioxide. It also expands the technical areas of the initiative to include the biofuels and biobased products development of technologies that permanently sequester or utilize carbon dioxide. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $20 million is authorized to be appropriated for each of FY2019-FY2023. However, no discretionary funding has been appropriated for BRDI through FY2019. Administered by: Rural Business and Cooperative Service, RD, USDA. Program Overview : The 2008 farm bill authorized the Rural Energy Self-Sufficiency Initiative to assist rural communities with community-wide energy systems that reduce conventional energy use and increase the use of energy from renewable sources. Grants were to be made available to assess energy use in a rural community, evaluate ideas for reducing energy use, and develop and install integrated renewable energy systems. Grants were not to exceed 50% of the total cost of the activity (7 U.S.C. Â§8109). No funding was ever appropriated, and regulations were never announced for this program. No provision was included in the 2014 farm bill for the Rural Energy Self-Sufficiency Initiative, with the result that program funding authority expired after FY2013. Changes in 2018 Farm Bill: The Rural Energy Self-Sufficiency Initiative was repealed. Administered by: Farm Service Agency (FSA), USDA. Program Overview : Under the 2008 farm bill, the FFP required that USDA establish and administer a sugar-for-ethanol program using sugar intended for food use but deemed to be in surplus. USDA would subsidize the use of sugar for ethanol production through federal purchases of surplus sugar for resale to ethanol producers. USDA would implement the program only in those years where purchases are determined to be necessary to ensure that the sugar program operates at no cost to the federal government (7 U.S.C. Â§8110). The intent of the FFP is to provide the CCC a tool for avoiding sugar forfeitures. Under the sugar program, domestic sugar beet or sugarcane processors may borrow from the CCC, pledging their sugar production as collateral for any such loan, and then satisfy their loans either by repaying the loan on or before loan maturity, or by transferring the title for the collateral to the CCC immediately following loan maturity, also known as ''forfeiture'' of collateral (as specified in 7 C.F.R.Â Â§1435). The CCC is required to operate the sugar program, to the maximum extent practicable, at no cost to the federal government, by avoiding forfeitures to CCC. If domestic sugar market conditions are such that market rates are less than forfeiture level (i.e., forfeitures appear likely), current law requires CCC to use FFP to purchase sugar and sell such sugar to bioenergy producers to avoid forfeitures. The FFP became effective upon publication of the final rule by USDA in the Federal Register on July 29, 2013. By late July 2013, U.S. sugar prices were below effective federal support levels, compelling USDA to activate FFP on August 15, 2013, and use an estimated $148 million of CCC funds to avoid possible sugar forfeitures. No outlays have been required since 2013. Changes in 201 8 Farm Bill : Extended the FFP through FY2023 with no changes to program implementation. Funding: The 2018 farm bill extends the mandatory funding authority of such sums as necessary through FY2023. The CBO baseline does not project any outlays for the program. Discretionary funding is not authorized for the program. Administered by: Farm Service Agency (FSA), USDA. Program Overview : BCAP provides financial assistance to owners and operators of agricultural land and nonindustrial private forest land who wish to establish, produce, and deliver biomass feedstocks to eligible processing plants. BCAP provides two categories of assistance: 1. establishment and annual payments , including a one-time payment of up to 50% of the cost of establishment for perennial crops, and annual payments (i.e., rental rates based on a set of criteria) of up to five years for nonwoody and 15 years for woody perennial biomass crops; and 2. matching payments , at a rate of $1 for each $1 per ton provided, up to $20 per ton, for a period of two years, which may be available to help eligible material owners with collection, harvest, storage, and transportation (CHST) of eligible material for use in a qualified biomass conversion facility. Establishment and annual payments are available to certain producers who enter into contracts with USDA to produce eligible biomass crops on contract acres within designated BCAP project areas. Eligible land for BCAP project area contracts includes agricultural land and nonindustrial private forestland, but does not include federal or state-owned land, or land that is native sod. Lands enrolled in existing land retirement programs for conservation purposesâthe Conservation Reserve Program (CRP) or the Agricultural Conservation Easement Program (ACEP)âalso become eligible during the fiscal year that their land retirement contract expires. Generally, crops that receive payments under Title I (the commodity title) of the farm bill (e.g., corn, wheat, rice, and soybeans) and noxious weeds or invasive species are not eligible for annual payments. Matching payments are available to eligible material owners who deliver eligible material to qualified biomass conversion facilities. Eligible material must be harvested directly from the land and separate from a higher-value product (e.g., Title I crops). Invasive and noxious species are considered eligible material, and land ownership (private, state, federal, etc.) is not a limiting factor to receive matching payments (7 U.S.C. Â§8111). The 2014 farm bill changed enrolled land eligibility by including land under expiring CRP or ACEP easement contracts. It also included residue from crops receiving Title I payments as eligible material, but extended exclusion to any whole grain from a Title I crop, as well as bagasse and algae. One-time establishment payments were limited to no more than 50% of cost of establishment from 75% previously, not to exceed $500 per acre ($750 per acre for socially disadvantaged farmers or ranchers). CHST matching payments may not exceed $20 per dry ton (down from $45 per dry ton) and are available for a two-year period. CHST funding shall be available for technical assistance. Not less than 10% or more than 50% of funding may be used for CHST. Not later than four years after enactment of the 2014 farm bill, USDA is to submit to the House and Senate Agriculture Committees a report on best practices from participants receiving assistance under BCAP. Changes in 2018 Farm Bill: The 2018 farm bill extends the program through FY2023. The 2018 farm bill expands the definition for eligible material to include algae. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $25 million is authorized to be appropriated for each of FY2019-FY2023. No discretionary funding was provided for FY2019. Administered by: Forest Service, USDA. Program Overview : The 2008 farm bill authorized the Forest Biomass for Energy program to function as a research and development program to encourage use of forest biomass for energy. The Forest Service, other federal agencies, state and local governments, Indian tribes, land-grant colleges and universities, and private entities were to be eligible to compete for program funds. Priority was to be given to projects that use low-value forest byproduct biomass for the production of energy; develop processes to integrate bioenergy from forest biomass into existing manufacturing streams; develop new transportation fuels; and improve the growth and yield of trees for renewable energy (7 U.S.C. Â§8112). In the end, the Forest Service never announced any regulations for this program. Changes in 201 4 Farm Bill : The Forest Biomass for Energy program was repealed. Administered by: Forest Service, USDA. Program Overview : The 2008 farm bill authorized the Community Wood Energy Program to provide matching grantsâup to $50,000 and subject to a match of at least 50%âto state and local governments to acquire community wood energy systems for public buildings. Under the 2008 and 2014 farm bills, participants were to implement a community wood energy plan to meet energy needs with reduced carbon intensity through conservation, reduced costs, utilizing low-value wood sources, and increased awareness of energy consumption (7 U.S.C. Â§8113). The 2014 farm bill defined a Biomass Consumer Cooperative and authorized grants of up to $50,000 to be made to establish or expand biomass consumer cooperatives that would provide consumers with services or discounts relating to the purchase of biomass heating systems or products (including their delivery and storage); and required that any biomass consumer cooperative that received a grant match at least the equivalent of 50% of the funds toward the establishment or expansion of a biomass consumer cooperative. Changes in the 2018 Farm Bill: The 2018 farm bill extends the program through FY2023. The 2018 farm bill changes the name to the Community Wood Energy and Wood Innovation Program, and modifies the scope of the program and participant requirements. The program provides financial assistance for the installation of community wood energy systems or building an innovative wood product facility. In short, the 2018 farm bill defines a community wood energy system as a system that produces thermal energy or combined thermal energy and electricity, services public facilities owned or operated by state or local governments, and uses woody biomass. The capacity of the community wood energy system shall not exceed 5 megawatts of thermal energy or combined thermal and electric energy. In short, an innovative wood product facility is defined as a manufacturing or processing plant or mill that produces building components that use large panelized wood (including mass timber), wood products from nanotechnology, or other innovative wood products that use low-value, low-quality wood. The 2018 farm bill removes the requirements for participants to implement a community wood energy plan and the requirements for biomass consumer cooperatives. Cost-share grants may cover up to 35% of the capital cost of the system or facility, and, for special circumstances, up to 50%. The Secretary is required to take into account certain selection criteria for awarding grants (e.g., energy efficiency, cost effectiveness, displacement of fossil fuel generation). The Secretary is to give priority to grant applicants that use the most stringent control technology for a wood-fired boiler; would be carried out in a location where markets are needed for low-value, low-quality wood; would be carried out in a location with limited access to natural gas pipelines; would include the use or retrofitting of existing sawmill facilities that meet certain conditions; and would be carried out in a location where the project will aide with forest restoration. A maximum of 25% of the funds for the program for a fiscal year may go toward grants for innovative wood facilities, unless the Secretary has received an insufficient number of community wood energy system proposals. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $25 million is authorized to be appropriated for each of FY2019-FY2023. No funds have been appropriated through FY2019. Administered by: NIFA, USDA. Each regional Sun Grant center manages the programs and activities within its region, although a process based on peer and merit review is used to administer grants. Program Overview: Created under the 2008 farm bill, the Sun Grant Initiative (SGI) is a national network of land-grant universities and federally funded laboratories coordinated through regional Sun Grant centers. The centers receive funding to enhance national energy security using biobased energy technologies, to promote diversification and environmental sustainability of agricultural production through biobased energy and product technologies, to promote economic diversification in rural areas through biobased energy and product technologies, and to enhance the efficiency of bioenergy and biomass research and development programs. Competitive grants are available to land-grant schools within each region to be used toward integrated, multistate research, extension, and education programs on technology development and implementation. The Sun Grant Program is an offshoot of the Sun Grant Research Initiative Act of 2003 (Â§778, Consolidated Appropriations Act, 2004; P.L. 108-199 ), which was created subsequent to the 2002 farm bill. The initiative was originally established with five Sun Grant research centers based at land-grant universities, each covering a different region, to enhance coordination and collaboration among USDA, DOE, and land-grant universities in the development, distribution, and implementation of biobased energy technologies. The 2008 farm bill established the Sun Grant Program and added a sixth regional center (7 U.S.C. Â§8114). NIFA administers the program under 7 C.F.R. part 3430. The 2014 farm bill extended the Sun Grant Program with its discretionary funding authority (i.e., subject to appropriations) of $75 million annually through FY2018. It also consolidated and amended the Sun Grant Program to expand input from other appropriate federal agencies and replace authority for gasification research with bioproducts research and makes the program competitive by removing designation of certain universities as regional centers. Changes in 201 8 Farm Bill: Extended the Sun Grant Program through FY2023 with no changes to program implementation. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $75 million is authorized to be appropriated for each of FY2019-FY2023. The program received $3 million in discretionary funding for FY2019. Administered by: USDA, in consultation with DOE. Program Overview: The 2018 farm bill establishes a carbon utilization and biogas education program. It requires the Secretary to award competitive grants to eligible entities for two purposes: (1) education to the public and biogas producers about the benefits of carbon utilization and sequestration, and (2) education about the opportunities to aggregate multiple sources of organic waste into a single biogas system. Changes in 2018 Farm Bill: The program was established in the 2018 farm bill. Funding: The 2018 farm bill provides no mandatory funding for the program. Discretionary funding of $2 million is authorized to be appropriated for each of FY2019-FY2023. No funds have been appropriated through FY2019.", "summary": "Title IX, the energy title, of the 2018 farm bill (Agriculture Improvement Act of 2018; P.L. 115-334 ) contains authority for the energy programs administered by the U.S. Department of Agriculture (USDA). USDA energy programs incentivize research, development, and adoption of renewable energy projects, including solar, wind, and anaerobic digesters. However, the primary focus of USDA energy programs has been to promote U.S. biofuels production and useâincluding corn starch-based ethanol (the predominant biofuel produced and consumed in the United States), cellulosic biofuels, and soybean-based biodiesel. The USDA energy programs via the farm bill are separate from the Renewable Fuel Standard (RFS) and tax incentives contained in separate energy and tax legislation. Four farm bills have contained an energy title: 2002, 2008, 2014, and 2018. For all four farm bills, the majority of the energy programs expire and lack baseline funding. Many of the energy title programs are authorized to receive both mandatory and discretionary funding. Historically, mandatory funding has been the primary support for these programs, as appropriators have not provided funding for most of the discretionary authorizations. The programs that have received discretionary authorizations under the 2018 farm bill are the Rural Energy for America Program, the Rural Energy Savings Program, and the Sun Grant Program. The 2018 farm bill extended most of the energy provisions of the 2014 farm bill with new funding authority. There are two exceptions, as the 2018 farm bill repealed both the Repowering Assistance Program and the Rural Energy Self-Sufficiency Initiative. Additionally, the 2018 farm bill established one new programâthe Carbon Utilization and Biogas Education Program. The 2018 farm bill contains initiatives that address noncorn feedstocks (e.g., cellulosic feedstocks). The most important programs to this end are the Bioenergy Program for Advanced Biofuels, which pays producers for production of eligible advanced biofuels; the Biorefinery, Renewable Chemical, and Biobased Product Manufacturing Assistance Program (formerly the Biorefinery Assistance Program), which assists in the development of new and emerging technologies for advanced biofuels; and the Renewable Energy for America Program (REAP), which has funded a variety of biofuels-related projects. Over the five-year reauthorization period (FY2019-FY2023), the 2018 farm bill contains a total of $375 million in new mandatory funding and authorizes discretionary funding (i.e., subject to annual appropriations) of $1.7 billion for the various farm bill energy programs. This discretionary total includes discretionary authorizations for the Sun Grant Program and the Rural Energy Savings Program. The mandatory funding provided for the energy programs under the 2018 farm bill is approximately 46% less than what was provided in the 2014 farm bill, which had authorized $694 million in mandatory funding over the five-year period of FY2014-FY2018. Conversely, the 2018 farm bill provides discretionary authorizations that are approximately 13% more than what was provided in the 2014 farm bill ($1.5 billion) for the energy programs (although, as noted above, farm bill energy programs generally have not received discretionary appropriations). At issue for Congress is oversight of the energy programs and the future of annual funding for these programs. This report provides an overview and funding summary of the various energy titles contained in the farm bills from 2002 to the present, and provides a description of the 2018 farm bill energy programs including their funding levels, program implementation status, and any changes made to the programs by the 2018 farm bill.", "document_type": "crs"}
{"report": "Congress uses an annual appropriations process to fund the routine activities of most federal agencies. This process anticipates the enactment of 12 regular appropriations bills to fund these activities before the beginning of the fiscal year. When this process has not been completed before the start of the fiscal year, one or more continuing appropriations acts (commonly known as continuing resolutions or CRs) can be used to provide interim funding pending action on the regular appropriations. DOD has started the fiscal year under a CR for 13 of the past 18 years (FY2002-FY2019) and every year since FY2010 excluding FY2019. DOD has operated under a CR for an average of 119 days per year during the period FY2010-FY2019 compared to an average of 32 days per year during the period FY2002-FY2009 (see Figure 1 ). All told, since 2010, DOD has spent 1,186 daysâmore than 39 monthsâoperating under a CR, compared to 259 daysâless than 9 monthsâduring the 8 years preceding 2010. To preserve congressional prerogatives to shape federal spending in the regular appropriations bills, the eventual enactment of which is expected, CRs typically contain limitations intended to allow execution of funds in a manner that provides for continuation of projects and activities with relatively few departures from the way funds were allocated in the previous fiscal year. However, DOD funding needs typically change from year to year across the agency's dozens of appropriations accounts for a variety of reasons, including emerging, increasing, or decreasing threats to national security. If accountsâand activities within accountsâare funded by a CR at a lower level than was requested in the pending Administration budget, then DOD cannot obligate funds at the anticipated rate. This can restrict planned personnel actions, maintenance and training activities, and a variety of contracted support actions. Delaying or deferring such actions can also cause a ripple effect, generating personnel shortages, equipment maintenance backlogs, oversubscribed training courses, and a surge in end-of-year contract spending. Given the frequency of CRs in recent years, many DOD program managers and senior leaders work well in advance of the outcome of annual decisions on appropriations to minimize contracting actions planned for the first quarter of the coming fiscal year. The Defense Acquisition University, DOD's education service for acquisition program management, advises students that, \"[m]embers of the [Office of the Secretary of Defense], the Services and the acquisition community must consider late enactment to be the norm [emphasis in original] rather than the exception and, therefore, plan their acquisition strategy and obligation plans accordingly.\" In anticipation of such a delay in the availability of full funding for programs, DOD managers can build program schedules in which planned contracting actions are pushed to later in the fiscal year when it is more likely that a full appropriation will have been enacted. Additionally, managers can take steps to defer hiring actions, restrict travel policies, or cancel nonessential education and training events for personnel to keep their spending within the confines of a CR. On their face, CRs are disruptive to routine agency operations and many of the procedures used by agencies to deal with limitations imposed by a CR entail costs. However, even though these disruptions have been routine for more than a decade, there has been little systematic analysis of the extent to which theses disruptions have led to measurable and significantly adverse impacts on U.S. military preparedness over the long run. An interim continuing resolution typically provides that budget authority is available at a certain rate of operations or funding rate for the covered projects and activities and for a specified period of time. The funding rate for a project or activity is based on the total amount of budget authority that would be available annually at the referenced funding level and is prorated based on the fraction of a year for which the interim CR is in effect. In recent fiscal years, the referenced funding level has been the amount of budget authority that was available under specified appropriations acts from the previous fiscal year, or that amount modified by some formula. For example, the first CR for FY2018 ( H.R. 601 \\ P.L. 115-56 ) provided, \"... such amounts as may be necessary, at a rate of operations as provided in the applicable appropriations Acts for fiscal year 2017 ... minus 0.6791%\" (Division D, Section 101). While recent CRs typically have provided that the funding rates for certain accounts are to be calculated with reference to the funding rates in the previous year, Congress could establish a CR funding rate on any basis (e.g., the President's pending budget request, the appropriations bill for the pending year as passed by the House or Senate, or the bill for the pending year as reported by a committee of either chamber). CRs have sometimes provided budget authority for some or all covered activities by incorporating the text of one or more regular appropriations bills for the current fiscal year. When this form of funding is provided in a CR or other type of annual appropriations act, it is often referred to as full text appropriations . When full text appropriations are provided, those covered activities are not funded by a rate for operations, but by the amounts specified in the incorporated text. This full text approach is functionally equivalent to enacting regular appropriations for those activities, regardless of whether that text is enacted as part of a CR. The \"Department of Defense and Full-Year Continuing Appropriations Act, FY2011\" ( P.L. 112-10 ) is one recent example. For DOD, the text of a regular appropriations bill was included as Division A, thus funding those covered activities via full text appropriations. In contrast, Division B of the bill provided funding for the projects and activities that normally would have been funded in the remaining eleven FY2011 regular appropriations according to a formula based on the previous fiscal year's appropriations laws. If formulaic interim or full-year continuing appropriations were to be enacted for DOD, the funding levels for both base defense appropriations and Overseas Contingency Operations (OCO) spending could be determined in a variety of ways. A separate formula could be established for defense spending, or the defense and nondefense spending activities could be funded under the same formula. Likewise, the level of OCO spending under a CR could be established by the general formula that applies to covered activities (as discussed above), or by providing an alternative rate or amount for such spending. For example, the first CR for FY2013 ( P.L. 112-175 ) provided the following with regard to OCO funding: Whenever an amount designated for Overseas Contingency Operations/Global War on Terrorism pursuant to Section 251(b)(2)(A) of the Balanced Budget and Emergency Deficit Control Act of 1985 (in this section referred to as an \"OCO/GWOT amount\") in an Act described in paragraph (3) or (10) of subsection (a) that would be made available for a project or activity is different from the amount requested in the President's fiscal year 2013 budget request, the project or activity shall be continued at a rate for operations that would be permitted by ... the amount in the President's fiscal year 2013 budget request. CRs may contain limitations that are generally written to allow execution of funds in a manner that provides for minimal continuation of projects and activities in order to preserve congressional prerogatives prior to the time a full appropriation is enacted. As an example, an interim CR may prohibit an agency from initiating or resuming any project or activity for which funds were not available in the previous fiscal year. Congress has, in practice, included a specific section (usually Section 102) in the CR to expressly prohibit DOD from starting production on a program that was not funded in prior years (i.e., a new start ), and from increasing production rates above levels provided in the prior year. Congress may also limit certain contractual actions such as multiyear procurement contracts. Figure 2. Air Force Appropriations for Combat Rescue Helicopter An interim CR that uses the same formula to specify a funding rate for different appropriations accounts may cause problems for programs funded by more than one account, if the ratio of funding between the accounts changes from one year to the next. For example, as the Air Force program to procure a new combat rescue helicopter transitions from development to production between FY2019 and FY2020, the amount requested for R&D dropped by about $200 million while the amount requested for procurement rose by a 12-percent larger amount. Although the total amount requested for the program in FY2020 is thus $25 million higher than the total appropriated in FY2019, a CR that continued the earlier year's funding for the program would problematic: The nearly $200 million in excess R&D money could not be used to offset the more than $200 million shortfall in procurement funding, absent specific legislative relief. This kind of mismatch at the account level between the request and the CR is sometimes referred to as an issue with the color of money . Even though CRs typically provide funds at a particular rate, CRs may also include provisions that enumerate exceptions to the duration, amount, or purposes for which those funds may be used for certain appropriations accounts or activities. Such provisions are commonly referred to as anomalies . The purpose of anomalies is to insulate some operations from potential adverse effects of a CR while providing time for Congress and the President to agree on full-year appropriations and avoiding a government shutdown. A number of factors could influence the extent to which Congress decides to include such additional authority or flexibility for DOD under a CR. Consideration may be given to the degree to which funding allocations in full-year appropriations differ from what would be provided by the CR. Prior actions concerning flexibility delegated by Congress to DOD may also influence the future decisions of Congress for providing additional authority to DOD under a longer-term CR. In many cases, the degree of a CR's impact can be directly related to the length of time that DOD operates under a CR. While some mitigation measures (anomalies) might not be needed under a short-term CR, longer-term CRs may increase management challenges and risks for DOD. An anomaly might be included to stipulate a set rate of operations for a specific activity, or to extend an expiring authority for the period of the CR. For example, the second CR for FY2017 ( H.R. 2028 \\ P.L. 114-254 ) granted three anomalies for DOD: Section 155 funded the Columbia Class Ballistic Missile Submarine Program ( Ohio Replacement) at a specific rate for operations of $773,138,000. Section 156 allowed funding to be made available for multi-year procurement contracts, including advance procurement, for the AHâ64E Attack Helicopter and the UHâ60M Black Hawk Helicopter. Section 157 provided funding for the Air Force's KC-46A Tanker, up to the rate for operations necessary to support the production rate specified in the President's FY2017 budget request (allowing procurement of 15 aircraft, rather the FY2016 rate of 12 aircraft). In anticipation of an FY2018 CR, DOD submitted a list of programs that would be affected under a CR to the Office of Management and Budget (OMB). This \"consolidated anomalies list\" included approximately 75 programs that would be delayed by a prohibition on new starts and nearly 40 programs that would be negatively affected by a limitation on production quantity increases. OMB may or may not forward such a list to Congress as a formal request for consideration. Arguably, to the extent that anomalies make a CR more tolerable to an agency, they may reduce the incentive for Congress to reach a budget agreement. According to Mark Cancian, a defense budget analyst at the Center for Strategic and International Studies, \"a CR with too many anomalies starts looking like an appropriations bill and takes the pressure off.\" H.R. 601 ( P.L. 115-56 ), the initial FY2018 CR, did not include any anomalies to address the programmatic issues included on the DOD list. H.R. 601 was extended through March 23, 2018, by four measures. The fourth measure ( P.L. 115-123 ) included an anomaly to address concerns raised by the Air Force regarding the effects of the CR on certain FY2018 construction requirements. After enactment of a CR, OMB provides detailed directions to executive agencies on the availability of funds and how to proceed with budget execution. OMB will typically issue a bulletin that includes an announcement of an automatic apportionment of funds that will be made available for obligation, as a percentage of the annualized amount provided by the CR. Funds usually are apportioned either in proportion to the time period of the fiscal year covered by the CR, or according to the historical, seasonal rate of obligations for the period of the year covered by the CR, whichever is lower. A 30-day CR might, therefore, provide 30 days' worth of funding, derived either from a certain annualized amount that is set by formula or from a historical spending pattern. In an interim CR, Congress also may provide authority for OMB to mitigate furloughs of federal employees by apportioning funds for personnel compensation and benefits at a higher rate for operations, albeit with some restrictions. In 2017 testimony before the Senate Subcommittee on Federal Spending Oversight and Emergency Management, Committee on Homeland Security and Governmental Affairs, a senior Government Accountability Office (GAO) analyst remarked that CRs can create budget uncertainty and disruptions, complicating agency operations and causing inefficiencies. Director of Strategic Issues Heather Krause asserted that \"this presents challenges for federal agencies continuing to carry out their missions and plan for the future. Moreover, during a CR, agencies are often required to take the most limited funding actions.\" Krause testified that agency officials report taking a variety of actions to manage inefficiencies resulting from CRs, including shifting contract and grant cycles to later in the fiscal year to avoid repetitive work, and providing guidance on spending rather than allotting specific dollar amounts during CRs, to provide more flexibility and reduce the workload associated with changes in funding levels. When operating under a CR, agencies encounter consequences that can be difficult to quantify, including additional obligatory paperwork, need for additional short-term contracting actions, and other managerial complications as the affected agencies work to implement funding restrictions and other limitations that the CR imposes. For example, the government can normally save money by buying in bulk under annual appropriations lasting a full fiscal year or enter into new contracts (or extend their options on existing agreements) to lock in discounts and exploit the government's purchasing power. These advantages may be lost when operating under a CR. All federal agencies face management challenges under a CR, but DOD faces unique challenges in providing the military forces needed to deter war and defend the country. In a letter to the leaders of the armed services committees dated September 8, 2017, then-Secretary of Defense James Mattis asserted that \"longer term CRs impact the readiness of our forces and their equipment at a time when security threats are extraordinarily high. The longer the CR, the greater the consequences for our force.\" DOD officials argue that the department depends heavily on stable but flexible funding patterns and new start activities to maintain a modernized force ready to meet future threats. Former Defense Secretary Ashton Carter posited that CRs put commanders in a \"straitjacket\" that limits their ability to adapt, or keep pace with complex national security challenges around the world while responding to rapidly evolving threats like the Islamic State. As discussed, a CR typically includes a provision prohibiting DOD from initiating new programs or increasing production quantities beyond the prior year's rate. This can result in delayed development, production, testing, and fielding of DOD weapon systems. An inability to execute funding as planned can induce costly delays and repercussions in the complex schedules of weapons system development programs. Under a CR, DOD's ability to enter into planned long-term contracts is also typically restricted, thus forfeiting the program stability and efficiencies that can be gained by such contracts. Additionally, DOD has testified to Congress that CRs impact trust and confidence with suppliers, which may increase costs, time, and potential risk. Because CRs constrain funding by appropriations account rather than by program, DOD may encounter significant issues with programs that draw funds from several accounts. Already mentioned, above, is the color of money issue that can arise when a weapons program transitions from development into production. In such cases, the program could have excess R&D funding (based on the prior year's appropriation) and a shortfall in procurement funds needed to ramp up production. A CR also can result in problems specific to the apportionment of funding in the Navy's shipbuilding account, known formally as the Shipbuilding and Conversion, Navy (SCN) appropriation account. SCN appropriations are specifically annotated at the line-item level in the DOD annual appropriations bill. As a consequence, under a CR, SCN funding is managed not at the appropriations account level, but at the line-item level. For the SCN accountâuniquely among DOD acquisition accountsâthis can lead to misalignments (i.e., excesses and shortfalls) in funding under a CR for SCN-funded programs, compared to the amounts those programs received in the prior year. The shortfalls in particular can lead to program execution challenges under an extended or full-year CR. Published reports on the effect of CRs on agency operations typically provide anecdotal assertions that such funding measures increase costs and reduce efficiencies. However, these accounts typically do not provide data that would permit a systematic analysis of CR effects. Nor do they address the impact of CR-caused near-term bureaucratic disruption on the combat capability and readiness of U.S. forces over the longer-term. One exception to this general ruleâdiscussed belowâis a 2019 study by the RAND Corporation of the effect of CRs on a limited number of DOD procurement programs. That analysis, \"did not find strong evidence â¦ indicating that CRs are generally associated with delays in procurement awards or increased costs,\" although the authors of the study emphasized that, because of its limited scope, the study, \"does not imply that the widely expressed concerns regarding CR effects are invalid.\" One widely publicized estimate of the cost of recent CRs stands apart in the level of detail available on how the figure was calculated. In a December 4, 2017, speech at a defense symposium, Secretary of the Navy Richard Spencer said that CRs had cost the Navy, \"about $4 billion since 2011.\" CRS asked the Navy for the source of the $4 billion figure and for details on how it was calculated. In response, the Navy provided CRS with an information paper that stated the following in part: CRs have averaged 106 days per year in the last decade, or 29% of each year. This means over one quarter of every year is lost or has to be renegotiated for over 100,000 DON [Department of the Navy] contracts (conservative estimate) and billions of dollars. Contractors translate this CR uncertainty into the prices they charge the government. â The cost factors at work here are: price uncertainty caused by the CR and reflected in higher rates charged to the government; government time to perform multiple incremental payments or renegotiate; and contractor time to renegotiate or perform unnecessary rework caused by the CR. These efforts are estimated at approximately 1/7 th of a man-year for all stakeholders or $26K [$26,000] per average contract. â $26K x 100,000 contracts = $2.6B [$2.6 billion] per year. While the estimate for each contract would be different, it can readily be seen that this is a low but reasonable estimate. The Navy paper did not provide any justification for the assumptions underpinning that calculation. The literature on CR effects includes one relatively rigorous effort to determine whether multi-month CRs are associated with delays and cost increases in DOD procurement programs. The study, conducted in 2017 by the RAND Corporation, was sponsored by the office of DOD's senior acquisition official (the then-Under Secretary of Defense for Acquisition, Technology, and Logistics). Summarizing its review of the literature on CR effects, the RAND team said Because of a lack of quantitative data, many of the [asserted] consequences â¦ would be very difficult to estimate quantitatively or to conclusively demonstrate. All of the research that we reviewed on the consequences of operating under a CR employed qualitative approaches that focused on case studies, assertions, and anecdotal information. To see whether CRs systematically are associated with cost increases and delays in DOD procurements, RAND examined 151 procurement awards for relatively high-profile programs during FY2013-FY2015. In each of those years, DOD operated under CRs for several months. Comparing procurement awards originally scheduled to occur while the agency was under a CR with those made after a regular appropriations bill had been enacted, the study found no statistically significant difference between the two groups in whether an award was delayed; if it was delayed, the length of the delay; or whether the unit cost increased compared with the projected cost. RAND also compared the 151 procurement awards made during FY2013-FY2015âyears when there were prolonged CRsâwith 48 awards made during FY1999, when DOD operated under a CR for only the first 3 weeks of the fiscal year. A comparison of the awards made during the period of \"long-CRs\" (2013-15) with awards made during a period in which there was one relatively short CR (FY1999) showed no statistically significant difference in the percentage of awards that were delayed; for cases in which a delay occurred, longer delays in FY2013-FY2015 than in the earlier period; and larger unit-cost increases (relative to original projections) for cases during the FY1999 (i.e., the \"short-CR\" period). In sum, RAND concluded, \"we did not find strong evidence â¦ that CRs are generally associated with delays in procurement awards or increased costs. On the other hand, given the limitations inherent in our statistical analysis, we cannot use its results to rule out the occurrence of these kinds of negative effects.\" Inasmuch as CRs have become relatively routine, Congress may wish to mandate a broader and more systematic assessment of DOD's use of what the RAND study calls \"levers of management discretion\" to ameliorate their potential adverse impacts. In addition to cataloguing the techniques used and estimating their near-term costs, if any, Congress also may sponsor assessments of the impact of CRs over the longer term. After nearly a decade of managerial improvisation to cope with relatively long-term CRs' disruption of normal procedures, Congress may wish to look for evidence that the DOD has suffered adverse systemic impactsâproblems that go beyond marginal increases in cost or time to impair DOD's ability to protect the national security.", "summary": "This report provides a basic overview of interim continuing resolutions (CRs) and highlights some specific issues pertaining to operations of the Department of Defense (DOD) under a CR. DOD has started the fiscal year under a CR for 13 of the past 18 years (FY2002-FY2019) and every year since FY2010 excluding FY2019. The amount of time DOD has operated under CR authorities during the fiscal year has tended to increase in the past 10 years and equates to a total of more than 39 months since 2010. As with regular appropriations bills, Congress can draft a CR to provide funding in many ways. Under current practice, a CR is an appropriation that provides either interim or full-year funding by referencing a set of established funding levels for the projects and activities that it funds (or covers ). Such funding may be provided for a period of days, weeks, or months and may be extended through further continuing appropriations until regular appropriations are enacted, or until the fiscal year ends. In recent fiscal years, the referenced funding level on which interim or full-year continuing appropriations has been based was the amount of budget authority that was available under specified appropriations acts from the previous fiscal year. CRs may also include provisions that enumerate exceptions to the duration, amount, or purposes for which those funds may be used for certain appropriations accounts or activities. Such provisions are commonly referred to as anomalies . The purpose of anomalies is to preserve Congress's constitutional prerogative to provide appropriations in the manner it sees fit, even in instances when only interim funding is provided. The lack of a full-year appropriation and the uncertainty associated with the temporary nature of a CR can create management challenges for federal agencies. DOD faces unique challenges operating under a CR while providing the military forces needed to deter war and defend the country. For example, an interim CR may prohibit an agency from initiating or resuming any project or activity for which funds were not available in the previous fiscal year (i.e., prohibit the use of procurement funds for \"new starts,\" that is, programs for which only R&D funds were appropriated in the previous year). Such limitations in recent CRs have affected a large number of DOD programs. Before the beginning of FY2018, DOD identified approximately 75 weapons programs that would be delayed by the FY2018 CR's prohibition on new starts and nearly 40 programs that would be affected by a restriction on production quantity. In addition, Congress may include provisions in interim CRs that place limits on the expenditure of appropriations for programs that spend a relatively high proportion of their funds in the early months of a fiscal year. Also, if a CR provides funds at the rate of the prior year's appropriation, an agency may be provided additional (even unneeded) funds in one account, such as research and development, while leaving another account, such as procurement, underfunded. By its very nature, an interim CR limits an agency's ability to take advantage of efficiencies through bulk buys and multi-year contracts. It can foster inefficiencies by requiring short-term contracts that must be reissued once additional funding is provided, requiring additional or repetitive contracting actions. On the other hand, there is little evidence one way or the other as to whether the military effectiveness of U.S. forces has been fundamentally degraded by the limitations imposed by repeated CRs of months-long duration.", "document_type": "crs"}
{"report": "O ver the past decade, Google, Amazon, Facebook, and Appleâcollectively known as the \"Big Four\" or \"Big Tech\"âhave revolutionized the internet economy and affected the daily lives of billions of people worldwide. Google operates a search engine that processes over 3.5 billion searches a day (Google Search), runs the biggest online video platform (YouTube), licenses the world's most popular mobile operating system (Android), and is the largest seller of online advertising. Amazon is a major online marketplace, retailer, logistics network, cloud-storage host, and television and film producer. Facebook boasts 2.4 billion monthly active users worldwide, meaning more people use the social network than follow any single world religion. Apple popularized the smartphone, making the device so ubiquitous that consumers have grown accustomed to carrying a supercomputer in their pocket. Collectively, the Big Four generated over $690 billion in revenue in 2018âa sum larger than the annual GDPs of most national economies. While these companies are responsible for momentous technological breakthroughs and massive wealth creation, they have also received scrutiny related to their privacy practices, dissemination of harmful content and misinformation, alleged political bias, andâas relevant hereâpotentially anticompetitive conduct. In June 2019, the Wall Street Journal reported that the Department of Justice (DOJ) and Federal Trade Commission (FTC)âthe agencies responsible for enforcing the federal antitrust lawsâagreed to divide responsibility over investigations of the Big Four's business practices. Under these agreements, the DOJ reportedly has authority over investigations of Google and Apple, while the FTC will look into Facebook and Amazon. The following month, the DOJ announced a potentially broader inquiry into Big Tech. Specifically, the Justice Department's Antitrust Division revealed that it intends to examine possible abuses of market power by unnamed \"market-leading online platforms\" âan announcement that has led some to speculate that a number of the Big Four may face investigations from both agencies despite the previously reported agreements. Big Tech's business practices have also attracted congressional interest. In May 2019, the Senate Judiciary Committee held a hearing to investigate privacy and competition issues in the digital advertising industry. And in June and July, the House Judiciary Committee held two separate hearings examining the market power of online platforms. This report provides an overview of antitrust issues involving the Big Four. The report begins with a general outline of the aspects of antitrust doctrine that are most likely to play a central role in the DOJ and FTC investigationsâspecifically, the case law surrounding monopolization and mergers. Next, the report discusses the application of this doctrine to each of the Big Four. Finally, the report concludes by examining policy options related to the promotion of digital competition. Contemporary antitrust doctrine reflects a commitment to the promotion of economic competition, which induces businesses to cut costs, improve their productivity, and innovate. These virtues of competition are often illustrated with the stylized hypothetical of a \"perfectly competitive\" market with homogenous products, a large number of well-informed buyers and sellers, low entry barriers, and low transaction costs. In such a market, businesses must price their products at marginal cost to avoid losing their customers to competitors. However, real-world markets almost always deviate from this textbook model of perfect competition. When one or more of the structural conditions identified above is absent, individual firms may have market power âthe ability to profitably raise their prices above competitive levels. At the extreme, a market can be monopolized when a single firm possesses significant and durable market power. According to standard justifications for antitrust law, the exercise of significant market power harms consumers by requiring them to pay higher prices than they would pay in competitive markets, purchase less desirable substitutes, or go without certain goods and services altogether. Moreover, significant market power harms society as a whole by reducing output and eliminating value that would have been enjoyed in a competitive market. Contemporary antitrust doctrine is focused on preventing these harms by prohibiting exclusionary conduct by dominant firms and anticompetitive mergers and acquisitions. The following subsections discuss these prohibitions in turn. Section 2 of the Sherman Antitrust Act of 1890 makes it unlawful to monopolize, attempt to monopolize, or conspire to monopolize \"any part of the trade or commerce among the several States, or with foreign nations.\" However, the statute itself does not define what it means to \"monopolize\" trade or commerce, leaving the courts to fill out the meaning of that concept through common law decisionmaking. Consistent with this approach, the Supreme Court's interpretation of Section 2 has evolved in response to changes in economic theory and business practice. In its monopolization case law, the Court has made clear that the possession of monopoly power and charging of monopoly prices do not by themselves constitute Section 2 violations. Instead, the Court has held that a company engages in monopolization if and only if it (1) possesses monopoly power, and (2) engages in exclusionary conduct to achieve, maintain, or enhance that power. To prevail in a Section 2 case, plaintiffs must show that a defendant possesses monopoly power. While the Supreme Court has explained that a firm has market power if it can profitably charge supra-competitive prices, the Court has described monopoly power as \"the power to control prices or exclude competition,\" which requires \"something greater\" than market power. Lower federal courts have held that a firm possesses monopoly power if it possesses a high degree of market power. A Section 2 plaintiff can establish that a defendant possesses monopoly power in two ways. First, plaintiffs can satisfy this requirement with direct evidence of monopoly powerâthat is, evidence that the defendant charges prices significantly exceeding competitive levels. However, such evidence is typically difficult to adduce because of complications in determining appropriate measures of a firm's costs, among other things. As a result, plaintiffs generally attempt to establish that a defendant has monopoly power with indirect evidence showing that the defendant (1) possesses a large share of a relevant market, and (2) is protected by entry barriers. To demonstrate that a defendant possesses a dominant market share, plaintiffs must define the scope of the market in which the defendant operates. Predictably, antitrust plaintiffs typically argue that a defendant operates in a narrow market with few competitors, while defendants ordinarily contend that they operate in a broad market with many rivals. Because the size of the market in which a defendant operates (the denominator in a market-share calculation) is generally harder to determine than its sales or revenue (the numerator in such a calculation), parties in antitrust litigation often vigorously contest the issue of market definitionâso much, in fact, that more antitrust cases hinge on that question than on \"any other substantive issue\" in competition law. Market Definition: Substitutability and the SSNIP Test . In analyzing market definition, the Supreme Court has explained that a relevant antitrust market consists of the product at issue in a given case and all other products that are \"reasonably interchangeable\" with it. According to the Court, whether one product is \"reasonably interchangeable\" with another product depends on demand substitutionâthat is, the extent to which an increase in one product's price would cause consumers to purchase the other product instead. The Court has further explained that a variety of \"practical indicia\" are relevant to an assessment of whether goods and services are reasonable substitutes, including 1. industry or public recognition of separate markets; 2. a product's peculiar characteristics and uses; 3. unique production facilities; 4. distinct customers; 5. distinct prices; 6. sensitivity to price changes; and 7. specialized vendors. These criteria are sometimes called the \" Brown Shoe \" factors based on the name of the 1962 decision in which the Court identified them. In addition to the Brown Shoe factors, the DOJ and FTC have provided specific market-definition guidance in their Horizontal Merger Guidelines. The 2010 version of the Guidelines endorses the \"hypothetical monopolist\" test for defining markets, whichâlike the Court's case lawâprincipally focuses on demand substitution. Under this test, a group of products qualifies as a relevant antitrust market if a hypothetical monopolist selling those products would find it profitable to raise their price notwithstanding buyers' incentives to substitute other goods and services in response. Specifically, the test asks whether a hypothetical monopolist would be able to profitably impose a \"small but significant and non-transitory increase in price\" (SSNIP)âgenerally, a 5% increase. If buyer substitution to other products would make such a price increase unprofitable, then the candidate market must be expanded until a hypothetical monopolist would benefit from such a strategy. One popular antitrust treatise illustrates the SSNIP test's application by comparing proposed markets consisting of Ford passenger cars and all passenger cars . Because Fordâwhich has a \"monopoly\" over the sale of Ford passenger carsâwould likely be unable to profitably raise its prices by 5% because of the business it would lose to other car companies, Ford passenger cars are unlikely to qualify as a properly defined antitrust market. However, because a hypothetical firm with a monopoly over passenger cars likely could profit from such a price increase, passenger cars likely qualify as a distinct antitrust market. Market Definition and Big Tech: The Challenge of Zero-Price Markets. The SSNIP test's application to certain technology markets raises difficult issues. In a number of technology markets, firms do not charge customers for access to certain services like online search and social networking. The difficulty with applying the SSNIP test to such markets is clear: as one commentator notes, there is \"no sound way\" to analyze a 5% increase in a price of zero because such an increase would result in a price that remains zero . The SSNIP test as traditionally administered is accordingly \"inoperable\" in a number of zero-price technology markets. Some courts and commentators have responded to this difficulty in applying the SSNIP test to zero-price markets by concluding that such markets are categorically exempt from antitrust scrutiny. In Kinderstart.com, LLC v. Google, Inc. , for example, a federal district court dismissed allegations that Google monopolized the market for online search on the grounds that Google does not charge customers to use its search engine. Several commentators have echoed the general line of reasoning behind the Kinderstart decision and questioned whether the provision of free services can result in the type of consumer harm that antitrust law is intended to remedy. However, others have rejected this argument and maintain that antitrust law has an important role to play in zero-price markets. Some of these commentators have argued that zero-price transactions are not in fact \"free\" to consumers, and that consumers ultimately \"pay\" for putatively \"free\" goods and services with both their attention and personal data. According to this line of argument, many of these consumers may actually be overpaying . That is, some observers have argued that certain \"free\" products and services may have negative equilibrium prices under competitive conditions, meaning that firms in the relevant markets would pay consumers for their attention and the use of their data if faced with sufficiently robust competition. Other commentators have argued that firms offering zero-price products and services can compete on a variety of nonprice dimensions such as quality and privacy, and that antitrust law can promote consumer welfare in zero-price markets by ensuring that companies engage in these types of nonprice competition. This argument appears to have persuaded regulators at the DOJ. In a February 2019 speech, Makan Delrahimâthe head of the Justice Department's Antitrust Divisionâcontended that antitrust law applies \"in full\" to zero-price markets because firms offering \"free\" products and services compete on a variety of dimensions other than price. While many observers accordingly agree that zero-price markets are not categorically immune from antitrust scrutiny, the optimal approach to defining the scope of such markets remains open to debate. Some commentators have argued that regulators should modify the SSNIP test to account for quality-adjusted prices, creating a new methodology called the \"small but significant and non-transitory decrease in quality\" (SSNDQ) test. According to these academics, decreases in the quality of \"free\" services (e.g., a decline in the privacy protections offered by a social network) are tantamount to increases in the quality-adjusted prices of those services. Under the SSNDQ test, then, a firm offering \"free\" goods or services would possess monopoly power if it had the ability to profitably raise its quality-adjusted prices significantly above competitive levels. In contrast, other analysts have proposed that courts and regulators evaluate the scope of zero-price markets by engaging in qualitative assessments of the degree to which various digital products and services are \"reasonably interchangeable.\" For example, in a 2019 European Commission report on digital competition, a group of commentators proposed a \"characteristics-based\" approach to market definition for zero-price industries under which regulators would compare the functions of relevant digital services. This type of qualitative method for defining relevant product markets has some support in U.S. antitrust doctrine. As discussed, under Brown Shoe 's \"practical indicia\" approach, a product's \"peculiar characteristics and uses\" are relevant factors in determining the appropriate scope of an antitrust market. While lower courts have described such informal methods as \"old school\" in light of the sophisticated econometric evidence typically produced in contemporary antitrust litigation, they have also recognized that Brown Shoe remains good law and have employed its \"practical indicia\" approach despite its somewhat anachronistic status. As a result, regulators may engage in qualitative comparisons of the functions of various digital services in assessing the scope of certain zero-price markets. Regulators could plausibly supplement such inquiries with surveys or other empirical evidence evaluating which products consumers regard as \"reasonably interchangeable\" with the product at issue in a given case. Finally, a number of courts employing the Brown Shoe criteria have emphasized \"industry recognition\" of the scope of certain markets. Specifically, these courts have relied on corporate conduct, internal strategy documents, and expert testimony to determine the types of companies that a defendant regards as competitors. Accordingly, courts and regulators may be able to rely on these types of qualitative evidence to determine the scope of certain zero-price digital markets. Market Shares: How Much Is Enough? Once a Section 2 plaintiff has defined a relevant antitrust market, it must show that the defendant occupies a dominant share of that market. Courts have recognized that there is no fixed market-share figure that conclusively establishes that a defendant-company has monopoly power. However, the Supreme Court has never held that a party with less than 75% market share has monopoly power. Lower court decisions provide a number of other useful data points. In the U.S. Court of Appeals for the Second Circuit's influential decision in United States v. Aluminum Co. of America , Judge Learned Hand reasoned that (1) a 90% market share can be sufficient to establish a prima facie case of monopoly power, (2) a 60% or 64% share is unlikely to be sufficient, and (3) a 33% share is \"certainly\" insufficient. Similarly, the Tenth Circuit has explained that courts generally require a market share between 70% and 80% to establish monopoly power. And the Third Circuit has reasoned that a defendant's market share must be \"significantly larger\" than 55%, while holding that a share between 75% and 80% is \"more than adequate\" to establish a prima facie case of monopoly power. Several courts have held that proof that a defendant occupies a large market share is insufficient on its own to establish that the defendant has monopoly power. Instead, these courts have concluded that a defendant must also be insulated from potential competitors by significant entry barriers to possess the type of durable monopoly power necessary for a SectionÂ 2 case. Courts and commentators generally use the concept of entry barriers to refer to long-run costs facing new entrants but not incumbent firms, including (1) legal and regulatory requirements, (2) control of an \"essential or superior resource,\" (3) \"entrenched buyer preferences for established brands,\" (4) \"capital market evaluations imposing higher capital costs on new entrants,\" and (5) in certain circumstances, economies of scale. The significance of any entry barriers shielding Big Tech companies is a fact-intensive question that will depend on the specific evidence that the DOJ and FTC uncover. However, commentators have identified a number of plausible entry barriers in certain digital markets, including: Network Effects . A digital platform benefits from network effects when its value to customers increases as more people use it. A platform exhibits \"direct\" or \"same-side\" network effects when its value to users on one side of the market increases as the number of users on that side of the market increases. Social networks arguably exhibit this category of network effects because their value to users is dependent on the number of other users that they are able to attract. In contrast, a platform exhibits \"indirect\" or \"cross-side\" network effects when its value to users on one side of the market increases as the number of users on the other side of the market increases. Search engines arguably benefit from indirect network effects because they become more valuable to advertisers as they attract additional users who can be targeted with ads. Some courts and commentators have concluded that both categories of network effects represent entry barriers that make it difficult for small firms to meaningfully compete with larger incumbents in certain digital markets. The Advantages of Big Data . A number of commentators have argued that the significant volume of user data generated by certain digital platforms confers important advantages on established companies. According to this theory, large firms with access to significant amounts of data can use that data to improve the quality of their products and services (e.g., by increasing the accuracy of a search engine, improving targeted advertising, or offering targeted discounts)âa process that attracts additional customers, who in turn generate more data. Some commentators have accordingly argued that access to \"big data\" can result in a feedback loop that reinforces the dominance of large firms. Costs of Switching and Multi-Homing . Some commentators have argued that consumers in certain digital markets are unlikely to switch from one platform to another or use multiple platforms simultaneouslyâa phenomenon that advantages large established companies. These \"lock-in\" effects can have a variety of causes. A digital platform's customers may be dissuaded from switching to another platform by the prospect of losing their photos, contacts, search history, apps, or other personal data. To similar effect, technology companies may \"tie\" various products or services together through contractual requirements or technical impediments that prevent customers from simultaneously using competing products or services. Finally, some consumers may exhibit behavioral biases that render their initial choice of a platform \"sticky,\" making them unlikely to switch platforms even when presented with superior alternatives. All of these factors can create a powerful \"first-mover advantage\" for incumbent firms that deters potential competitors. In contrast, others have questioned whether digital markets exhibit significant entry barriers. For example, Google has repeatedly denied the claim that it is insulated from rivals, arguing that consumers incur low costs in switching to alternative search engines because competition is only \"one click away.\" Similarly, other commentators have argued that the history of upstart rivals supplanting once-dominant technology companies suggests that any monopoly power in dynamic technology markets is unlikely to be durable. In addition to establishing that a defendant possesses monopoly power, Section 2 plaintiffs must demonstrate that the defendant engaged in exclusionary conduct to achieve, maintain, or enhance that power. While the Supreme Court has developed tests for evaluating whether specific categories of behavior qualify as prohibited exclusionary conduct, it has not endorsed a general standard for distinguishing such conduct from permissible commercial activities. However, courts have made clear that exclusionary conduct must involve harm to the competitive process and not simply harm to a defendant's competitors . The following subsections discuss how courts have evaluated specific categories of behavior under Section 2. A monopolist can violate Section 2 by pricing its products below cost to eliminate competitorsâa practice commonly known as \"predatory pricing.\" However, because price cutting ordinarily benefits consumers, the Supreme Court has \"carefully limited\" the circumstances in which charging low prices qualifies as impermissible exclusionary conduct. Specifically, under the so-called Brooke Group test, a plaintiff bringing predatory-pricing claims must show that a monopolist (1) priced the relevant product below an appropriate measure of cost, and (2) had a \"dangerous probability\" of recouping its losses by raising prices upon the elimination of its competitors. The Court has defended Brooke Group 's safe harbor for above-cost pricing on the grounds that courts cannot identify anticompetitive above-cost prices without chilling legitimate price competition. Similarly, the Court has explained that a \"dangerous probability\" of recoupment is necessary to state a predatory-pricing claim because without recoupment, low prices enhance consumer welfare. Some commentators have suggested that there may be cognizable affirmative defenses to predatory-pricing allegations even when the two Brooke Group requirements are satisfied. Specifically, firms accused of predatory pricing may be able to defend such charges on the grounds that certain below-cost pricing practices are procompetitive. For example, in a DOJ lawsuit targeting collusion in the e-book industry, regulators explained their decision not to pursue predatory-pricing charges against Amazon on the grounds that the company charged below-cost prices for certain categories of e-books because it intended those books to be \"loss leaders.\" Unlike a firm that engages in predatory pricingâwhich charges below-cost prices for certain products with an eye towards recouping its losses by charging monopoly prices for those products upon the elimination of competitorsâa firm that sells a loss-leader charges below-cost prices to induce consumers to purchase other goods or services at above-cost prices. Similarly, some commentators have suggested that below-cost prices that are intended to be promotional in nature or develop the type of user base necessary to realize network effects should not be condemned under Section 2. The application of predatory-pricing doctrine to Big Tech markets is discussed in greater detail in \" Amazon \" infra . Refusals to Deal . The Supreme Court has explained that companies are generally free to choose their business partners and counterparties. However, the Court has held that Section 2 requires monopolists to do business with their rivals in certain limited circumstances. In its key modern refusal-to-deal decision, Aspen Skiing Co. v. Aspen Highlands Skiing Co. , the Court affirmed a jury verdict holding a dominant ski-service operator liable under Section 2 for refusing to do business with a competitor. The defendant in Aspen Skiing âa ski-service operator that owned three of the four mountains in a popular skiing areaâterminated a joint venture with the owner of the fourth mountain under which the companies offered a combined four-mountain ski pass. The defendant also refused to sell its daily ski tickets to the competitor to prevent the competitor from creating an alternative ticket package that functionally replicated the previous offering. In affirming the verdict finding the dominant ski operator liable under Section 2, the Court explained that the jury could have reasonably concluded that the defendant elected to forgo short-term benefits from the joint venture and ticket sales to eliminate its rival from the market. According to the Court, this conclusion was reasonable because the defendant had (1) ceased what was presumably a profitable course of dealing, (2) refused to sell its tickets to the competitor at prevailing retail prices, and (3) failed to offer a plausible efficiency-based justification for its conduct. However, the Court has subsequently construed Aspen Skiing narrowly. In Verizon Communications, Inc. v. Law Offices of Curtis V. Trinko, LLP , the Court rejected the argument that Section 2 required a monopolist in the market for wholesale local telephone service to offer adequate interconnection services to its downstream rivals in the market for retail phone service. In reaching this conclusion, the Court characterized its previous decision in Aspen Skiing as \"at or near the outer boundary\" of Section 2 liability. The Court then distinguished that case on the grounds that unlike the dominant ski-service operator in Aspen Skiing , the wholesale telephone-service monopolist had not ceased a previous course of dealing with its competitors. The Court also observed that unlike the defendant in Aspen Skiing , the monopolist in Trinko did not refuse to sell its competitors a product that it offered to the publicâanother factor that can suggest an anticompetitive intent to forgo short-term profits to eliminate rivals. In the absence of these factors, the Court explained, Section 2 did not require the telephone monopolist to do business with its competitors. Essential Facilities . A number of lower courts have recognized a subset of cases in which monopolists have a duty to deal with rivals under what has been called the \"essential-facilities\" doctrine. In developing this doctrine, lower courts have relied principally on the Supreme Court's decisions in United States v. Terminal Railroad Association of St. Louis and Otter Tail Power Co. v. United States . In Terminal Railroad Association of St. Louis , the Court held that a consortium of railroads that controlled the facilities necessary to carry traffic across the Mississippi River in St. Louis violated Section 2 by refusing to grant other railroads access to those facilities. Similarly, in Otter Tail Power Co. , the Court held that a vertically integrated power company violated Section 2 by refusing to transmit wholesale power to municipalities seeking to operate their own retail distribution systems. According to the leading formulation of the essential-facilities doctrine that has been derived from these decisions, a plaintiff bringing an essential-facilities claim must show that (1) a monopolist controls access to an \"essential\" facility, (2) competitors cannot \"practically or reasonably\" duplicate that facility, (3) the monopolist has denied access to the facility to a competitor, and (4) the monopolist can feasibly share access to the facility. In applying this test, courts have held that a facility need not be \"indispensable\" to qualify as \"essential.\" Rather, essential-facilities plaintiffs need only establish that duplication of the facility would be \"economically infeasible,\" and that the denial of its use \"inflicts a severe handicap on potential market entrants.\" However, plaintiffs must show more than mere \"inconvenience\" to prevail on an essential-facilities cause of action, and courts have accordingly rejected Section 2 claims when plaintiffs had reasonable alternatives to the relevant facility. In assessing the third element of the essential-facilities testâwhich asks whether a dominant firm has denied access to an essential facilityâcourts have held that although monopolists need not allow competitors \"absolute equality of access,\" an offer to deal with competitors \"only on unreasonable terms and conditions\" may violate Section 2 by amounting to \"a practical refusal to deal.\" Finally, in assessing the \"feasibility\" requirement for essential-facilities claims, several courts have held that the viability of sharing an essential facility must be assessed in the context of a company's \"normal business operations,\" and that monopolists accordingly need not share such facilities if they can identify \"legitimate business reasons\" for refusing access. The application of the refusal-to-deal and essential-facilities doctrines to specific Big Tech companies is discussed in greater detail in \" Google Search: Refusals to Deal and Essential Facilities \" and \" Amazon \" infra . In certain circumstances, \"tying\" separate products togetherâthat is, selling one product (the \"tying\" product) on the condition that buyers also purchase another product (the \"tied\" product)âcan violate Section 2. Firms can tie products together in a variety of ways. In a \"bundled tie,\" a company simultaneously sells two or more products, one of which it does not sell separately. In contrast, \"contractual ties\" often involve a requirement that a buyer purchase different products at different times. And firms engage in \"technological ties\" when they physically integrate different products that are not sold separately or design their products in a way that makes them incompatible with products offered by other firms. According to the Supreme Court, certain tying arrangements can harm competition by allowing a firm with monopoly power in the market for the tying product to extend its dominance into the market for the tied product. Some commentators have also argued that tying arrangements can allow a monopolist to maintain its monopoly in the tying-product market by requiring potential rivals to enter both that market and the market for the tied product, which can act as a formidable entry barrier. Under contemporary tying doctrine, a plaintiff can establish that a defendant engaged in per se illegal tying if it can demonstrate (1) the existence of two separate products, (2) that the defendant conditioned the sale of one product on the purchase the other product, (3) that the arrangement affects a \"substantial volume\" of interstate commerce, and (4) that the defendant has market power in the market for the tying product. However, plaintiffs can also prevail on tying claims even if they cannot make these showings. When one or more of these conditions is absent, courts evaluate tying claims under a totality-of-the-circumstances approach known as the Rule of Reason. Under this three-step burden-shifting framework, the plaintiff bears the initial burden of establishing that a challenged tying arrangement harms competition. If the plaintiff makes this showing, the burden shifts to the defendant to rebut the plaintiff's case with evidence that the challenged tying arrangement has procompetitive benefits. And if the defendant succeeds in rebutting the plaintiff's prima facie case, the factfinder must weigh the procompetitive benefits of a challenged tying arrangement against its anticompetitive harms. In addition to these general principles of tying doctrine, lower courts have developed a separate body of case law concerning technological tiesâa category of conduct that is sometimes described as \"exclusionary product design.\" The standard exclusionary-design claim alleges that a monopolist changed a product's design in a way that makes the product difficult or impossible to use with complementary products sold by other firms, thereby extending its dominance into the market for the complementary products in a manner that is broadly similar to the effects of other sorts of tying arrangements. One commentator has described the case law on exclusionary design as \"somewhat tangled,\" but certain broad principles can be distilled from the relevant decisions. Generally courts are \"very skeptical\" about exclusionary-design claims out of fear that expansive liability for design decisions will chill innovation. In California Computer Products v. IBM Corp. , for example, the Ninth Circuit rejected claims that a dominant computer manufacturer violated Section 2 by introducing a new line of computers that were integrated with certain \"peripherals\" (e.g., disks and memory devices) and incompatible with peripherals sold by other companies. The court rejected this argument on the grounds that the manufacturer's integration of the peripherals lowered its costs and improved the computers' performance. The Second Circuit adopted a standard that is even more deferential toward exclusionary-design defendants in Berkey Photo, Inc. v. Eastman Kodak Co. , where it held that a dominant camera manufacturer had not violated Section 2 by launching a new camera and film that were incompatible with products sold by a rival. In that decision, the court held that the defendant had not engaged in exclusionary conduct even when faced with conflicting evidence as to whether the new camera was superior to previous versions. In the face of this evidence, the court opted to defer to market forces, explaining that consumers should be left to determine whether they preferred the new product. However, the D.C. Circuit's landmark 2001 decision in United States v. Microsoft Corp . marked a departure from previous exclusionary-design cases. In that case, the court evaluated Microsoft's integration of its internet-browser software (Internet Explorer) with its dominant personal-computer operating system (Windows OS). Microsoft had effectuated this integration in three ways: by (1) excluding Internet Explorer programs from Windows OS's \"Add/Remove Programs\" function, (2) programming Windows to sometimes override users' choice to set browsers other than Internet Explorer as their default browsers, and (3) commingling Internet Explorer's code with Windows code so that any attempt to delete Internet Explorer would cripple the operating system. The government alleged that this conduct harmed competition in the market for internet browsers by deterring consumers from using browsers other than Internet Explorer. In evaluating Microsoft's product design, the D.C. Circuit employed the Rule of Reason. At the first step of that inquiry, the court concluded that the government had made a prima facie case that each of the challenged practices harmed competition in the market for internet browsers, shifting the burden to Microsoft to identify procompetitive justifications for its actions. The D.C. Circuit proceeded to conclude that Microsoft successfully rebutted the government's case against the second category of challenged conductâprogramming Windows to sometimes override default browser choicesâbecause the company proffered valid technical reasons for its programming decisions. However, the court held that because Microsoft failed to establish that the remaining categories of conduct had procompetitive benefits, that conduct violated Section 2. In contrast, some post- Microsoft decisions from other federal circuits have been more favorable to exclusionary-design defendants. In Allied Orthopedic Appliances, Inc. v. Tyco Health Care Group LP , the Ninth Circuit eliminated the third step of the Rule-of-Reason test and refused to \"balance\" a challenged design's procompetitive benefits against its anticompetitive harms. Instead, the court rejected exclusionary-design claims on the grounds that it was \"undisputed\" that the new product had improved upon previous versions in certain respects. In such cases, the court explained, a monopolist's design change is \"necessarily tolerated by the antitrust laws\" irrespective of its anticompetitive effects. The lower federal courts are accordingly split on the proper analytical approach to exclusionary-design claims. The application of tying and exclusionary-design doctrine to specific Big Tech companies is discussed in greater detail in \" Android: Tying and Exclusive Dealing \" and \" Apple \" infra . In certain circumstances, a monopolist can violate Section 2 by entering into \"exclusive-dealing\" agreements with its customers or suppliersâthat is, agreements in which a buyer agrees to purchase certain goods or services only from the monopolist or a seller agrees to sell certain goods and services only to the monopolist for a certain time period. Such agreements can be anticompetitive when they allow a monopolist to harm competition by \"foreclosing\" potential sources of supply or distribution. For example, if a dominant widget manufacturer enters into exclusive-dealing arrangements with a significant number of large widget retailers, other widget manufacturers may be unable to secure an adequate distribution network. However, exclusive-dealing arrangements can also be procompetitive. For example, some exclusive-dealing agreements allow manufacturers to overcome free-rider problems by enabling them to train their distributors without fearing that the distributors will use that training to sell rival products. In other cases, exclusive-dealing arrangements may serve the procompetitive objective of allowing a company to guarantee a secure source of supply or distribution. Lower federal courts evaluate exclusive-dealing agreements under the Rule of Reason and accordingly weigh their anticompetitive harms against their procompetitive benefits. In conducting this analysis, courts have required plaintiffs to demonstrate that a challenged exclusivity provision resulted in \"substantial foreclosure\" of supply or distribution. The exclusive-dealing case law does not provide definitive guidance on the degree of foreclosure that qualifies as \"substantial,\" as courts have varied considerably in the degree of foreclosure that they consider unlawful. However, an author of the leading antitrust treatise has argued that single-firm foreclosure of less than 30% is unlikely to harm competition. In addition to requiring that plaintiffs demonstrate substantial foreclosure, courts have evaluated a range of other factors in exclusive-dealing cases, including the duration of specific exclusivity provisions, the strength of the defendant's procompetitive justification for the provisions, whether the defendant has engaged in coercive behavior, and the use of exclusive-dealing agreements by the defendant's competitors. The application of exclusive-dealing doctrine to Big Tech markets is discussed in greater detail in \" Android: Tying and Exclusive Dealing \" and \" Google AdSense: Exclusive Dealing \" infra . While Section 2 of the Sherman Act is concerned with unilateral exclusionary conduct, Section 7 of the Clayton Antitrust Act of 1914 prohibits mergers and acquisitions that may \"substantially lessen\" competition. Section 7 applies to both \"horizontal\" mergers between competitors in the same market and \"vertical\" mergers between companies at different levels of a distribution chain. In evaluating horizontal mergers, the DOJ and FTC typically evaluate the merged firm's market share and the resulting level of concentration in the relevant market, in addition to any efficiencies that the combined company will likely realize as a result of the proposed merger. In contrast, vertical mergers may raise competition concerns when they involve a firm with significant power in one market entering an adjacent market, which may foreclose potential sources of supply or distribution and raise entry barriers by requiring the firm's potential competitors to enter both markets to be competitive. For example, if a dominant widget manufacturer acquires a widget retailer, it may have incentives to discriminate against competing widget retailers by charging them higher prices or refusing to deal with them altogether. As a result of this vertical discrimination, such a merger may force prospective widget retailers to also enter widget manufacturing to be competitive, raising entry barriers in the retail market. Despite these potential concerns with certain vertical mergers, the DOJ and FTC police such mergers far less aggressively than horizontal mergers, largely on the basis of academic work suggesting that vertical integration can result in significant efficiencies and only rarely threatens competition. However, whether the antitrust agencies should scrutinize vertical mergers more closely remains a subject of ongoing debate. The DOJ and FTC apply Section 7 by reviewing large proposed mergers before they are finalized, though the agencies also have the authority to unwind consummated mergers. Under the Hart-Scott-Rodino Antitrust Improvements Act of 1976 (the HSR Act), parties to certain large mergers and acquisitions must report their proposed transactions to the antitrust agencies and wait for approval before closing. If the agencies determine that a proposed merger threatens to \"substantially lessen\" competition, they can sue to block the merger or negotiate conditions with the companies to safeguard competition. Section 7 of the Clayton Act also gives the agencies the authority to challenge previously closed mergers that \"substantially lessen\" competition, though lawsuits to unwind consummated mergers have been \"rare\" since the enactment of the HSR Act. The application of Section 7 to Big Tech markets is discussed in greater detail in \" Facebook \" infra . Applying the general legal principles discussed above to specific technology companies is a highly fact-intensive enterprise that will depend on the specific evidence that the DOJ and FTC uncover during their investigations. Moreover, the agencies have yet to publicly release details on the categories of conduct that they are evaluating in the course of their Big Tech inquiries, making it difficult to confidently assess the strength of antitrust cases against the relevant companies. With these caveats in mind, the following subsections discuss certain categories of conduct that the antitrust agencies may be investigating at each of the Big Four. Google is no stranger to antitrust scrutiny. The technology giantâwhich runs Google Search, licenses the Android mobile operating system, and owns a major online ad-brokering platform (AdSense)âhas found itself in the crosshairs of competition authorities several times over the past decade. In 2013, the FTC concluded a wide-ranging investigation into the company's business practices, including its alleged discrimination against vertical rivals, copying of content from other websites, restrictions on advertisers' ability to do business with competing search engines, and exclusivity agreements with websites that used AdSense. While agency staff had recommended that the FTC bring a lawsuit challenging some of these activities, the Commission unanimously declined to pursue such an action after Google committed to make certain changes to its business practices. In contrast, European antitrust authorities have pursued three separate investigations of Google that have each resulted in large fines. In June 2017, the European Commission (EC) fined Google 2.4 billion euros for antitrust violations related to Google Search's preferential treatment of the company's comparison-shopping service, Google Shopping. The EC later levied an additional 4.3 billion-euro penalty in July 2018 for tying and exclusive-dealing arrangements related to Android. And in March 2019, the EC imposed a further 1.49 billion-euro penalty for exclusive- and restrictive-dealing agreements involving AdSense. While the focus of the DOJ's inquiry into Google's conduct remains somewhat obscure, the investigation is likely to implicate some of the same practices that have occupied the attention of European antitrust authorities. The subsections below discuss these issues in turn. Google Search's allegedly preferential treatment of Google content has long been the subject of government investigations and academic discussion. The basic concern of these \"search bias\" allegations is the familiar worry about vertically integrated monopolists harming competition by discriminating against rivals who depend on a monopolized input or distribution channel. According to some critics, Google Search has monopoly power in the market for general-purpose (\"horizontal\") online searchâpower that Google has used to harm competition in the markets for various forms of specialized (\"vertical\") search by privileging its own vertical properties over those of its downstream competitors. The FTC evaluated these \"search bias\" complaints during its 2011-2013 investigation, which examined whether Google unfairly promoted its own vertical properties like Google Maps, Google Local, and Google Trips over competitors like MapQuest, Yelp, and Expedia. Specifically, these complaints alleged that Google Search privileged Google's vertical content by (1) introducing a \"Universal Search\" box that prominently displayed that content above rival websites, and (2) manipulating its search algorithms to demote vertical competitors in its search results. However, the FTC ultimately declined to pursue a lawsuit related to these practices after concluding that Google's \"primary goal\" in privileging its own content was to quickly answer users' search queries and improve the quality of its search results. In contrast, the EC concluded in June 2017 that Google's preferential treatment of Google Shopping violated EU antitrust law by harming competition in the market for comparison-shopping services. If the DOJ were to reevaluate Google's alleged search bias, it would face the threshold question of whether Google in fact possesses monopoly power in the market for horizontal search. During the FTC's previous investigation, agency staff concluded that horizontal search \"likely\" constituted a properly defined antitrust market and that Google had monopoly power in that market in light of its 71% market share. More recent estimates place Google's share of the horizontal search-engine market even higher. Moreover, certain academic reports on digital competition suggest that Google Search may be protected by significant entry barriers in the form of high fixed costs and access to the \"big data\" necessary to develop accurate search algorithms. However, several commentators have disputed the proposition that Google Search has monopoly power. Some of these observers have argued that the relevant market in an antitrust lawsuit based on Google's alleged \"search bias\" would be larger than the market for horizontal search, because users of horizontal search engines have reasonable alternatives to obtain information on the internet, including websites like Facebook, Twitter, and Amazon. Some skeptics have also argued that even if horizontal search is a properly defined antitrust market, Google's large share of that market does not necessarily give it monopoly power. According to these commentators, the low costs that consumers incur in switching to alternative search engines and the ability of those competing search engines to immediately increase \"output\" cast doubt on the claim that Google has monopoly power. If the DOJ could establish that Google has monopoly power, it would then need to show that Google's allegedly preferential treatment of its vertical properties represents an anticompetitive abuse of that power. Such a showing may be difficult under existing monopolization doctrine. In Aspen Skiing , the Supreme Court held that a monopolist's refusal to deal with a competitor can violate Section 2 where the evidence suggests that the refusal was motivated by a desire to sacrifice short-term profits in order to eliminate the competitor from the market. In that case, the Court held that a jury could have reasonably found such a desire because the defendant had terminated what was presumably a profitable course of dealing with its rival and refused to sell its daily ski tickets to the rival at prevailing retail prices. However, in Trinko , the Court narrowly construed Aspen Skiing , describing it as \"at or near the outer boundary\" of Section 2 liability. The Trinko Court proceeded to reject refusal-to-deal claims because the defendant in that case had not ceased a previous course of dealing or refused to sell its competitors a product that it sold to the public. The Court's decision in Trinko makes a refusal-to-deal case against Google difficult for several reasons. First, Google did not have previous courses of dealing with the websites that received high placement in its search results before the company implemented its allegedly discriminatory policies. While Google's search algorithm ranked these websites highly before this alleged discrimination, the websites did not pay Google for their high placement. Moreover, even if Google's relationships with these websites qualify as established courses of dealing, it is unlikely that Google's termination of those dealings involved a sacrifice of short-term profits that the company intends to recoup with long-term monopoly prices. Instead, Google's decision to give its own content premium placement likely maximizes the company's short-term profits by generating more user clicks, even if such actions also harm its vertical competitors. As a result, the factors that Trinko appears to have identified as necessary conditions for a refusal-to-deal claim would likely be absent in a case challenging Google's alleged search bias. A lawsuit challenging Google's vertical discrimination would also face difficulties under the essential-facilities doctrine. First, it is unclear whether high placement in Google's search results represents an \"essential\" facility. One court has held that a facility can qualify as \"essential\" when the denial of its use \"inflicts a severe handicap on potential market entrants.\" However, plaintiffs must show more than mere \"inconvenience\" in order to prevail on an essential-facilities cause of action, and courts have accordingly rejected Section 2 claims when plaintiffs had reasonable alternatives to the relevant facility. While premium placement in Google's search results was likely an important benefit for some of Google's vertical rivals, it is uncertain whether such placement would qualify as \"essential\" under these standards given the other ways in which vertical search engines can reach potential customers. Moreover, it is unlikely that a plaintiff could demonstrate that Google can \"feasibly\" share this allegedly essential facility. As one commentator has argued, only one website can receive the highest ranking in Google's search results, meaning that Google cannot give top placement to its own vertical properties and their competitors. Finally, Google may be able to identify legitimate business reasons for giving its own content premium placement. After its 2011-2013 investigation of Google's search bias, the FTC declined to pursue a lawsuit on the grounds that the company's use of the \"Universal Search\" box and privileging of its own content were motivated by a desire to quickly answer users' search queries. Google is therefore likely to rely on similar arguments in any actions challenging its search practices. In addition to evaluating Google's alleged search bias, the DOJ may follow the lead of European antitrust authorities in investigating the company's practices involving its Android mobile operating system. In a July 2018 press release announcing a record-setting antitrust fine, the EC concluded that Google occupied a dominant position in three markets related to the Commission's Android investigation. First, the EC concluded that Google occupied a dominant position in the market for \"general licensable smart mobile operating systems\" through Android. Second, the EC determined that Google occupied a dominant position in the market for \"app stores for the Android operating system\" through its app store Google Play. Finally, the EC concluded that Google occupied a dominant position in the market for \"general Internet search\" through Google Search. After identifying these markets in which Google is dominant, the EC determined that Google had abused its monopoly positions by engaging in three separate categories of behavior: First , the EC concluded that Google illegally \"tied\" the Google Search app and Google Chrome web browser to the Google Play store. Specifically, the EC determined that Google harmed competition in the online-search market by requiring mobile device manufacturers who pre-install Google Play to also pre-install Google Search and Google Chrome (which uses Google Search as its default search engine). According to the EC, this type of mandated pre-installation can create a \"status quo bias\" that discourages consumers from downloading competing search engines and web browsers. Second , the EC concluded that Google made illegal payments to certain large device manufacturers in exchange for their agreement to exclusively pre-install Google Search on all of their Android devices. Third , the EC concluded that Google illegally obstructed the development and distribution of competing Android operating systems by requiring that device manufacturers who pre-install Google Play and Google Search refrain from selling any devices that ran alternative versions of Android that Google had not approved (\"Android forks\"). Google is currently appealing the EC's decision. Tying. A DOJ lawsuit targeting Google's \"tying\" of Google Search and Google Chrome to Google Play would raise a number of complex issues. First, a court evaluating such a lawsuit would have to determine whether this conduct is per se illegal or instead subject to Rule-of-Reason scrutiny. As discussed, plaintiffs can establish a per se tying violation by demonstrating (1) the existence of two separate products, (2) that the defendant conditioned the sale of one product on the purchase the other product, (3) that the arrangement affects a \"substantial volume\" of interstate commerce, and (4) that the defendant has market power in the market for the tying product. However, courts have applied these requirements narrowly, and the D.C. Circuit held in Microsoft that the unique features of software platforms makes per se liability inappropriate for ties involving such platforms and related products. The general trend away from per se tying liability and the D.C. Circuit's Microsoft decision suggest that a court would likely evaluate Google's tying arrangements under the Rule of Reason. As an initial matter, it is unclear whether mandatory pre-installation of the relevant apps represents the type of \"forced sale\" necessary to trigger per se liability under the relevant case law. During its Android enforcement action, the EC contended that mandatory pre-installation had significant effects on consumer behavior by discouraging Android users from downloading alternative search engines and web browsers. However, this allegation is an empirical claim about a relatively novel business practice, and the Supreme Court has explained that per se antitrust liability is appropriate only when courts have sufficient experience with a challenged practice to conclude that it lacks significant redeeming virtues. Limited judicial experience with the effects of mandatory pre-installation (as opposed to conditional sales ) may accordingly counsel against per se liability for Google's Android ties. Moreover, this hesitance to extend per se antitrust rules to novel business arrangements caused the D.C. Circuit to conclude in Microsoft that ties involving software-platform products are subject to Rule-of-Reason scrutiny. While Google's Android ties differ from the ties at issue in Microsoft in certain respects, commentators have observed that a tying case against Google would raise issues that are \"very similar\" to those the D.C. Circuit confronted roughly two decades ago. As a result, a court evaluating Google's tying of Google Search and Google Chrome to Google Play may follow the D.C. Circuit and evaluate such conduct under the Rule of Reason. In balancing the anticompetitive harms of these ties against their procompetitive benefits under the Rule of Reason, courts will likely focus on the general concern that motivated the EC's enforcement actionânamely, the worry that Android users who find Google Search and Google Chrome pre-installed on their devices are unlikely to download and use alternative search engines. The magnitude of this concern is a fact-intensive question that will depend on the specific evidence concerning the effects of pre-installation that the DOJ can uncover. If the DOJ produces evidence that Google's tying arrangements harm competition, a Section 2 case will depend on the strength of the company's procompetitive justifications for these practices. During the EC litigation, Google argued that the relevant ties ultimately benefitted consumers because the revenue the company derived from increased use of Google Search by Android users allowed it to license Android to device makers for free. However, the EC rejected this claim and concluded that Google can monetize its investment in Android by other means. U.S. regulators and courts have the benefit of additional information on this issue. After the EC's decision, Google announced that instead of offering a suite of apps to device makers for free, it will charge manufacturers licensing fees for Google Play and certain other apps to make up for the revenue it previously earned as a result of the challenged tying arrangements. Some commentators have argued that this development raises questions about whether the EC's decision will ultimately benefit consumers, who may face higher device prices because of the new licensing fees. But the legal relevance of this argumentâthat a decision attempting to promote competition in one market (online search) will harm consumers in another market (mobile devices)âremains open to debate. In horizontal-restraint and merger cases, some courts have rejected the proposition that competitive harms in one market can be balanced against competitive benefits in another market. However, other courts have taken a different approach, concluding that it is appropriate to consider such cross-market tradeoffs in certain instances, including tying cases. Antitrust commentators also continue to debate whether and in what circumstances courts should balance harms in one market against benefits in another. As a result, it is difficult to predict whether a court would accept the argument that any harm caused by Google's tying arrangements in the market for online search should be balanced against benefits in the market for mobile devices. Antitrust regulators, by contrast, may engage in such balancing in deciding whether to bring a case, whether or not cross-market tradeoffs would be relevant during subsequent litigation. Exclusive Dealing. Like a potential tying case, a challenge to Google's exclusivity agreements with device manufacturers would depend on the specific facts the DOJ uncovers during its investigation. In evaluating any payments Google has made to U.S. device makers in exchange for their agreement to pre-install only Google Search, a court would likely assess the impact of pre-installation on consumer behavior, the share of the market \"foreclosed\" by such agreements, the ability of competing search engines to offer such payments, and the strength of Google's procompetitive justifications for the payments. Similarly, a court evaluating Google's requirement that device manufacturers who pre-install Google Play and Google Search refrain from selling any devices that run Android forks would apply the Rule of Reason and balance the anticompetitive harms of that restriction against its procompetitive benefits. On the \"harm\" side of the ledger, U.S. regulators might follow the EC in arguing that such a restriction obstructs the development of Android forks, which may serve as important channels for the distribution of search engines and other apps that compete with Google products. In contrast, Google may respond (as it argued in the EC litigation) that this restriction is necessary to prevent a \"fragmentation\" of the Android ecosystem in which consumers would impute the poor technical standards of nonapproved Android forks to Android. However, the EC rejected this argument after concluding that Google failed to produce evidence suggesting that Android forks would suffer from serious technical problems. U.S. antitrust regulators may also be able to rebut this \"fragmentation\" argument by demonstrating that Google could brand Android in a way that would adequately distinguish it from Android forks and thereby achieve the relevant procompetitive benefit by less restrictive means. Finally, the DOJ may be investigating Google's agreements with websites that use its ad-brokering platform AdSense, which connects advertisers with \"publisher\" websites seeking ad revenue. During the FTC's 2011-2013 investigation, agency staff concluded that clauses in these agreements that prohibited or restricted publisher websites from doing business with competing ad-brokering platforms violated Section 2. However, the FTC did not address this issue in announcing its unanimous decision not to charge Google with antitrust violations. In contrast, the EC concluded in March 2019 that similar clauses in Google's agreements with publisher websites violated EU antitrust law. In a press release announcing its conclusions, the EC identified three factual findings from its investigation: First , the EC found that from 2006-2009, some of Google's agreements with publisher websites contained \"exclusivity\" clauses prohibiting the websites from doing business with competing ad-brokering platforms. Second , the EC found that after 2009, Google began to replace these \"exclusivity\" clauses with \"Premium Placement\" clauses that required publisher websites to reserve the most visited and profitable spaces on their search results pages for ads brokered by AdSense. Third , the EC found that after 2009, some of Google's agreements with publisher websites required the websites to seek Google's written approval before making changes to the way that ads brokered by rival platforms were displayed, allowing Google to control how attractive those ads would be. The EC concluded that by engaging in these practices, Google used its dominant position in the market for \"online search advertising intermediation\" to illegally suppress competition. Google is currently appealing the EC's decision. The analysis of these sorts of agreements in a U.S. antitrust case would involve the same type of inquiry as an analysis of the Android exclusivity provisions discussed above. That is, in evaluating a challenge to these types of provisions, a court would likely assess the share of the market \"foreclosed\" by such agreements, the duration of the agreements, whether competing ad-brokering platforms enter into these types of contracts with publisher websites, and the strength of Google's procompetitive justifications for the challenged provisions. Commentators have identified a variety of competition-related issues surrounding Amazon. However, most of the antitrust discussion involving the e-commerce giant has concerned two general categories of conduct: discrimination against vertical rivals and predatory pricing. In addressing Amazon's alleged vertical discrimination, a number of analysts have focused on the company's dual role as both the operator of Amazon Marketplaceâa platform on which merchants can sell their products directly to consumersâand as a merchant that sells its own private-label products on the Marketplace. Some commentators have alleged that Amazon exploits this dual role by implementing policies that privilege its own products over competing products offered by other sellers. According to a 2016 ProPublica investigation, for example, Amazon has designed its Marketplace ranking algorithmâwhich determines the order in which products appear to consumersâto favor its own products and products sold by companies that buy Amazon's fulfillment services. Similarly, certain merchants have complained that Amazon has revoked their ability to use its Marketplace after deciding to move into the relevant markets with its own private-label products or products it distributes on behalf of other companies. Some observers have also raised the possibility that Amazon may engage in predatory pricing by selling certain products at below-cost prices to eliminate rivals. A number of these allegations involve Amazon's 2010 acquisition of Quidsiâthe parent company of the online baby-products retailer Diapers.com and several other online-retail subsidiaries. According to some commentators, Amazon aggressively cut its prices for baby products after Quidsi rebuffed its initial offer to purchase the company. When Amazon's below-cost prices began to impede Quidsi's growth, the company ultimately accepted Amazon's subsequent acquisition offer. And after the Quidsi acquisition, Amazon allegedly raised its prices for baby products. Other predatory-pricing allegations leveled against Amazon concern the company's sale of certain e-books. Specifically, some observers have argued that when it entered the e-book market in 2007, Amazon priced some categories of e-books below cost to eliminate potential competitors, ultimately securing 90% of the market by 2009. A monopolization case grounded in Amazon's alleged discrimination against third-party merchants would raise several issues. As a threshold matter, regulators bringing such a case would need to show that Amazon possesses monopoly power. While Amazon is significantly larger than its e-commerce rivals, most estimates place its share of the U.S. online retail market at below 50%. However, the company's share of a narrower market for online marketplaces connecting third-party merchants with consumers may be considerably larger. Moreover, reports indicate that Amazon has very large shares of the markets for online sales of certain categories of products, including home-improvement tools, batteries, skin-care products, and (as discussed) e-books. If regulators could show that Amazon has monopoly power in a properly defined antitrust market, they would then need to establish that Amazon used that power to harm competition. Such a showing may be difficult under existing refusal-to-deal doctrine for some of the reasons discussed above in connection with Google's alleged search bias. As discussed, in Trinko , the Supreme Court rejected Section 2 claims where it was unable to infer that a monopolist's refusal to deal with a competitor involved a desire to sacrifice short-term profits to eliminate the competitor from the market. Specifically, the Court was unable to discern such an intent because the monopolist in Trinko (unlike its counterpart in Aspen Skiing ) had not terminated a previous course of dealing with the competitor or refused to sell the competitor a product that it offered to the public. The Court's reasoning in Trinko suggests that one type of refusal-to-deal claim against Amazon for its alleged vertical discrimination would be unlikely to succeed. If such a claim concerned Amazon's preferential ranking of its own private-label products on its Marketplace, it would be difficult to demonstrate that the challenged practice involves a sacrifice of short-term profits. Rather, just as Google likely maximizes its short-term profits by ranking its own vertical properties above those of competing websites, Amazon likely maximizes its short-term profits by giving its private-label products premium placement. A claim targeting this type of vertical discrimination is also unlikely to be viable under the essential-facilities doctrine, because Amazon cannot feasibly share access to the allegedly \"essential\" facility of top placement in its Marketplace product rankings. In contrast, a refusal-to-deal claim premised on Amazon's decision to revoke certain merchants' ability to use its Marketplace altogether may present courts with a closer question. Such an action could involve termination of a previously profitable course of dealing, which can suggest an intent to sacrifice short-term profits in order to eliminate competitors. This conduct may also provide the basis for an essential-facilities claim, as one commentator has argued that Amazon's Marketplace is dominant enough in certain online-retail markets to justify the conclusion that it qualifies as \"essential\" under the case law. While a court's assessment of this argument would depend on a fact-intensive evaluation of the alternatives available to specific categories of third-party sellers, it is conceivable that lack of access to Amazon's Marketplace would inflict a \"severe handicap\" on merchants in at least some online-retail markets. As a result, Amazon's outright termination of profitable relationships with certain third-party merchants may raise harder questions about the application of Section 2 doctrine. Amazon may also be vulnerable to predatory-pricing claims. To the extent that commentators have accurately characterized the conduct surrounding the company's acquisition of Quidsi, Amazon may have engaged in below-cost pricing and exhibited a \"dangerous probability\" of recouping its losses by eliminating a key competitor from the market for online sales of certain baby products. However, other predatory-pricing allegations against Amazon may raise more complicated issues. Amazon may be able to defend certain predatory-pricing charges on the grounds that the company intended certain products to be \"loss leaders\" that induced customers to purchase other products at above-cost prices. A court's assessment of this defense would depend on a fact-intensive inquiry into the motivations behind Amazon's pricing of specific products. Most of the antitrust commentary directed toward Facebook has focused on its acquisitions of potential competitorsâin particular, its 2012 acquisition of the photo-sharing service Instagram and its 2014 acquisition of the messaging service WhatsApp. In a March 2019 letter to the FTC, the Chairman of the House Antitrust Subcommittee urged the Commission to examine whether these acquisitionsâwhich according to some estimates have resulted in Facebook owning three of the top four and four of the top eight social media applicationsâviolated Section 7 of the Clayton Act. Other legislators and commentators have echoed calls for regulators to unwind these acquisitions. The FTC appears to be taking these arguments seriously. In August 2019, the Wall Street Journal reported that Facebook's acquisition practices are a \"central component\" of the agency's investigation of the company. In addition to potentially focusing on the Instagram and WhatsApp deals, the Journal reported that the FTC could also be evaluating Facebook's 2013 acquisition of Onavo Mobile Ltd.âa mobile-analytics company that may have allowed Facebook to identify fast-growing social media companies and purchase them before they became competitive threats. Depending on the evidence that the FTC uncovers, Facebook's general acquisition strategy could plausibly serve as the basis for a Section 2 monopolization case to the extent that it suppressed competition. The success of a case to unwind some of Facebook's acquisitions may depend on an assessment of the relevant market in which Facebook competes. Because Facebook does not charge users of its social network, this inquiry would require regulators to confront difficult conceptual issues with defining zero-price markets. If the FTC views \"social networks\" or \"social media platforms\" as the relevant market in an action to unwind Facebook's key acquisitions, the strength of the agency's case would likely depend on the other companies that are included in the relevant market and the appropriate methodology for calculating market shares. Because estimates of Facebook's dominance vary widely based on differences in each of these factors, the company's market share would likely be vigorously litigated in an action to unwind its major acquisitions. However, regulators may seek to sidestep this process with direct evidence that the relevant acquisitions harmed competition. As discussed, while antitrust plaintiffs typically rely on indirect market-share evidence to show that a defendant has monopoly power, several courts have held that plaintiffs can also establish monopoly power with direct evidence of supra-competitive prices. One commentator has sketched a general outline of the form such direct evidence might take, arguing that Facebook began to \"degrade\" user privacy only after the disappearance of major rivals. While there is little case law on direct proof of monopoly power, such evidence of quality degradation abruptly following the elimination of key competitors could plausibly serve as the type of \"natural experiment\" that allows regulators to establish that Facebook has monopoly power without defining the precise boundaries of the market in which it operates. If the FTC could establish that Facebook's acquisitions had anticompetitive effects either directly or indirectly, a court would then need to weigh those harms against any merger-specific efficiencies that Facebook can identify. In defending an enforcement action, Facebook might argue that its large post-acquisition investments in the relevant companies have improved their performance and accordingly benefited consumers. However, the FTC may be able to rebut such a defense with evidence that these companies could have secured adequate funding through the capital markets or by showing that the anticompetitive harms of the acquisitions outweigh any investment-related benefits. Like Google, Apple has faced antitrust claims related to its mobile-device software. Specifically, the iPhone maker has faced separate class-action lawsuits related to its design of the device's operating system, iOS. In these lawsuits, classes of customers who purchased iPhone apps through the company's App Store and app developers claim that Apple has illegally monopolized the market for iPhone apps by designing iOS as a closed system and installing security measures to prevent customers from purchasing apps outside of the App Store. In May 2019, the Supreme Court rejected Apple's contention that App Store customers lacked standing to challenge this conduct, allowing their lawsuit to proceed. While these cases will accordingly continue to work their way through the courts, the DOJ may also be contemplating a similar action challenging Apple's design of iOS. The outcome of these exclusionary-design cases against Apple will depend on the specific findings that emerge over the course of litigation. Like the Microsoft case, these lawsuits involve a fact pattern that appears to suggest strong prima facie evidence of anticompetitive harm. If \"iPhone apps\" represent a properly defined antitrust market, Apple's decision to design iOS in a manner that requires users to purchase apps only from the App Store limits competition in that market to one seller/distributor. Section 2 claims challenging this conduct would accordingly depend on Apple's procompetitive justification for its design choices and the proper standard for evaluating that justification. If a court were to follow the D.C. Circuit's approach to these questions, it would balance the anticompetitive harms of Apple's product-design choices against their procompetitive benefits. In contrast, a court following the more deferential standards applied by the Ninth Circuit in Tyco Health Care Group or the Second Circuit in Berkey Photo would likely side with Apple as long as the company could identify a plausible reason to conclude that the challenged design choices represent product improvements. Such a justification may involve claims that the relevant security measures improve iPhone users' overall experience by preventing them from downloading technically unsound apps from non-App Store sources. However, the precise form that this type of argument would take remains to be seen. The current circuit split on the appropriate analytical framework for exclusionary-design claims may be a factor that prompts the DOJ to bring its own lawsuit challenging Apple's design of iOS. Both of the pending lawsuits have been brought in the Ninth Circuit, which will presumably follow its defendant-friendly precedent in Tyco Health Care Group . If the DOJ were to pursue litigation against Apple, regulators may accordingly choose to sue in a different circuit with more favorable case law. Although it is still early days, a DOJ lawsuit that further entrenches the circuit split surrounding exclusionary-design analysis may ultimately cause the Supreme Court to step in and clarify the doctrine. While the antitrust action surrounding the Big Four is currently concentrated in the executive branch and the courts, digital competition issues have also attracted the interest of Congress, which may pursue legislation to address anticompetitive conduct by large technology companies. Such legislation could take two general forms. First, some commentators have proposed that Congress enact certain changes to existing antitrust doctrine to promote digital competition. Second, a number of lawmakers and academics have advocated legislation that would impose sector-specific competition regulation on large technology companies. The subsections below discuss each category of potential legislation in turn. A number of commentators have proposed that Congress adopt certain changes to existing antitrust doctrine to promote competition in technology markets. These proposals include: Changes to Predatory-Pricing Doctrine . Some observers have proposed changes to predatory-pricing doctrine with an eye toward addressing the pricing practices of dominant technology firms like Amazon. Specifically, one commentator has criticized Brooke Group 's \"recoupment\" requirement on the grounds that it does not adequately deter predatory pricing by dominant online platforms. According to this line of criticism, Brooke Group 's requirement that plaintiffs demonstrate a \"dangerous probability\" of recoupment fails to account for dominant platforms' unique ability to persist in charging below-cost prices for years and employ difficult-to-detect recoupment strategies like price discrimination among different categories of customers. As a result, this commentator has advocated a presumption that below-cost pricing by dominant platforms qualifies as prohibited exclusionary conduct. Other academics have criticized the first Brooke Group requirement, which demands that predatory-pricing plaintiffs show that a monopolist charged below-cost prices. These commentators argue that pricing-cutting can be anticompetitive even when a firm prices its products above cost, especially in cases where a monopolist aggressively cuts prices in order to prevent a new rival from recovering its entry costs or realizing economies of scale. To address this concern, these observers contend that courts should evaluate whether challenged price-cutting strategies exclude potential entrants without screening predation claims with a price-cost test. Congress could accordingly remedy this alleged defect in current predatory-pricing doctrine with legislation eliminating the first Brooke Group requirement. Enhanced Merger Review for Dominant Technology Companies . Some commentators have advocated stricter scrutiny for mergers and acquisitions by dominant technology companies, including a rebuttable presumption that mergers and acquisitions between certain monopolist technology companies and their potential competitors are unlawful. A number of academics have also suggested that because promising technology startups often fall below the minimum-size thresholds that trigger DOJ and FTC review under the HSR Act, Congress should consider lowering or eliminating those thresholds for deals involving dominant technology companies. Enhanced Scrutiny of Product Design Decisions . Finally, some observers have argued that courts should be less deferential toward defendants' justifications of allegedly exclusionary product designs, arguing that product-design decisions are often \"key elements\" of large technology companies' business strategies. Congress could accordingly consider legislation to clarify the appropriate standards for evaluating exclusionary-design claims, perhaps by making clear that such claims are subject to full Rule-of-Reason scrutiny rather than the more permissive tests adopted by certain lower federal courts. As discussed, academic commentators have argued that certain digital markets possess structural characteristics that advantage large incumbent firms. In some cases, dominant firms in these markets can enhance such entry barriers by making it difficult for consumers to \"multi-home\" or use complementary products offered by competitors, and courts evaluating challenges to these product-design choices hesitate to hold companies liable under existing antitrust doctrine. Moreover, vertically integrated technology monopolists do not face general nondiscrimination rules requiring them to deal evenhandedly with rivals in adjacent markets. Some analysts have accordingly argued that large technology platforms require sector-specific regulations to address these competition concerns. These proposed regulations include \"data mobility\" rules giving consumers greater ability to control their data and move it to competing platforms, \"interoperability\" standards requiring companies to minimize technical impediments to the use of complementary products, and nondiscrimination requirements prohibiting vertically integrated technology monopolists from discriminating against rivals who use their platforms. Congress could legislate such requirements, direct an existing federal agency to develop them through rulemaking, or create a new agency tasked with regulating the technology industry. A number of lawmakers and academics have also argued that the infrastructure-like features of certain digital services justify separation regimes prohibiting monopolists that provide those services from entering adjacent markets. Such separation regimes are not without precedent. Historically, Congress and federal regulators have imposed a variety of structural prohibitions limiting the lines of business in which certain categories of firmsâincluding railroads, banks, television networks, and telecommunications companiesâcan engage. Commentators have justified these separation regimes on the grounds that they eliminate conflicts of interest that lead companies in key infrastructure-like sectors to discriminate against their vertical rivals. While the nondiscrimination requirements discussed above represent one means of addressing this concern, categorical separation rules are an alternative to such requirements that may prove easier to administer. In March 2019, Senator Elizabeth Warren proposed one type of separation regime for dominant technology companies, arguing that large \"platform utilities\"âincluding \"online marketplaces,\" \"exchanges,\" and \"platforms for connecting third parties\"âshould be prohibited from owing companies that participate on their platforms. The Chairman of the House Antitrust Subcommittee has also expressed support for similar separation requirements. Congress may also be interested in broader separation regimes prohibiting dominant technology platforms from entering other types of markets. Specifically, many lawmakers have expressed concern about Facebook's announcement that it intends to develop a new cryptocurrency. These worries have generated a legislative proposal to prevent any large technology platform from entering the financial industry, with Members on the House Financial Services Committee circulating draft legislation titled the Keep Big Tech Out of Finance Act. This draft bill would prohibit \"large platform utilities\" from (1) affiliating with financial institutions, or (2) establishing, maintaining, or operating digital assets intended to be \"widely used as a medium of exchange, store or value, or any other similar function.\"", "summary": "Over the past decade, Google, Amazon, Facebook, and Apple (\"Big Tech\" or the \"Big Four\") have revolutionized the internet economy and affected the daily lives of billions of people worldwide. While these companies are responsible for momentous technological breakthroughs and massive wealth creation, they have also received scrutiny related to their privacy practices, dissemination of harmful content and misinformation, alleged political bias, andâas relevant hereâpotentially anticompetitive conduct. In June 2019, the Wall Street Journal reported that the Department of Justice (DOJ) and Federal Trade Commission (FTC)âthe agencies responsible for enforcing the federal antitrust lawsâagreed to divide responsibility over investigations of the Big Four's business practices. Under these agreements, the DOJ reportedly has authority over investigations of Google and Apple, while the FTC will look into Facebook and Amazon. The DOJ and FTC investigations into Big Tech will likely involve inquiries into whether the relevant companies have illegally monopolized their respective markets or engaged in anticompetitive mergers or acquisitions. Under Section 2 of the Sherman Act, it is illegal for a company with monopoly power to engage in exclusionary conduct to maintain or enhance that power. And under Section 7 of the Clayton Act, companies may not engage in mergers or acquisitions that \"substantially lessen\" competition. The scope of the market in which a defendant-company operates is a key question in both monopolization and merger cases. The Supreme Court has identified certain qualitative factors that courts may consider in defining the scope of relevant antitrust markets. The DOJ and FTC have also adopted a quantitative market-definition inquiry known as the \"hypothetical monopolist\" or \"SSNIP\" test, according to which a relevant antitrust market consists of the smallest grouping of products for which a hypothetical monopolist could profitably impose a 5% price increase. The application of this quantitative inquiry to certain zero-price technology markets may present courts and regulators with important issues of first impression. However, commentators have proposed a variety of methods by which regulators could assess the scope of the markets in which the Big Four operate. In addition to demonstrating that a defendant-company possesses monopoly power in a properly defined market, monopolization plaintiffs must show that the defendant engaged in exclusionary conduct to maintain or enhance that power. In investigating allegedly exclusionary behavior by the Big Four, antitrust regulators may be evaluating Google Search's alleged discrimination against Google's vertical rivals, certain tying and exclusive-dealing arrangements related to the company's Android mobile operating system, and exclusive and restrictive-dealing arrangements related to the company's ad-brokering platform; Amazon's alleged predatory pricing and discrimination against third-party merchants on its online marketplace; Facebook's allegedly anticompetitive pattern of acquiring promising potential competitors, including its acquisitions of the photo-sharing service Instagram and the messaging service WhatsApp; and Apple's decision to design its mobile-operating system to prevent customers from downloading iPhone apps from any source other than the company's App Store. While the antitrust action surrounding Big Tech is currently concentrated in the executive branch and the courts, digital competition issues have also attracted the interest of Congress, which may pursue legislation to address anticompetitive conduct by large technology companies. Specifically, some commentators have proposed that Congress adopt changes to certain elements of antitrust law to promote competition in technology markets, including modifications to predatory-pricing doctrine, exclusionary-design law, and merger review. In contrast, other commentators have advocated sector-specific competition regulation for large technology companies that would include data-portability rules, interoperability standards, nondiscrimination requirements, and separation regimes.", "document_type": "crs"}
{"report": "Per- and polyfluoroalkyl substances (PFAS) are a large, diverse group of fluorinated compounds that have been used in numerous commercial, industrial, and U.S. military applications. Among other uses, PFAS have been used in fire-fighting foams and in the processing and manufacture of many commercial products (e.g., nonstick cookware, stain- and water-resistant fabrics). PFAS are persistent in the environment, and studies of several PFAS suggest that exposures above certain levels may lead to adverse health effects. Detections of PFAS contamination in drinking water and the environment, have increased in recent years with the availability of new analytical methods and increased monitoring. PFASâprimarily perfluorooctanoic acid (PFOA) and perfluorooctane sulfonate (PFOS)âhave been detected in soil, surface water, groundwater, and public water supplies in numerous locations. These detections have been associated primarily with releases from manufacturing and processing facilities, and from U.S. military installations and other facilities that use firefighting foams (e.g., civilian airports and fire departments). These detections have prompted calls for increased federal action and authority to prevent and mitigate exposures to PFAS. Federal actions to address potential health and environmental risks of exposure to PFAS have been taken primarily under the authorities of the following federal statutes: Toxic Substances Control Act (TSCA); Safe Drinking Water Act (SDWA); and Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and related U.S. Department of Defense (DOD) response authorities. The U.S. Environmental Protection Agency (EPA) has used the authorities of these three statutes to take most of its actions to address potential risks of PFAS. DOD and other federal agencies have also used CERCLA authorities to respond to releases of various PFAS at federal facilities. Some federal actions have involved the private sector in complying with reporting and other requirements. Other actions have involved voluntary measures taken by some companies. Although the federal government has taken a range of actions to address PFAS exposure, policymakers and stakeholders have urged federal agencies to act more quickly and broadly. For instance, some are calling for EPA to issue enforceable drinking water standards for some or all PFAS. Others want EPA to designate all PFAS as hazardous substances (and thus establish liability for responsible parties to pay response costs). Multiple bills introduced in the 116 th Congress would require EPA or other agencies to take various actions under existing law or would create new authorities. Some of these bills are incorporated into the House-passed and Senate-passed versions of the National Defense Authorization Act for FY2020 ( H.R. 2500 and S. 1790 ). For example, among other PFAS provisions, H.R. 2500 would establish liability for PFAS response costs through designation of PFAS as hazardous substances under CERCLA and also indirectly through listing PFAS as toxic pollutants under the Clean Water Act, whereas S. 1790 would expand DOD statutory responsibilities for response actions to include releases of any other pollutant or contaminant without establishing enforceable liability under CERCLA for such chemicals. S. 1790 also would direct EPA to issue drinking water standards for PFAS and to take various actions for other purposes. Bills related to the topics covered in this report are noted where relevant in the discussions, and these and other related bills are identified in this report in Table 2 . This report focuses on federal authorities under which EPA and other agencies have taken actions to address potential risks of PFAS. It does not discuss other laws under which EPA or other agencies may take additional actions, or actions under state laws. The report begins with a brief discussion of the chemical properties, uses, and varying risks of PFAS, followed by discussions of federal actions, relevant legislation enacted in the 115 th Congress, and relevant legislation in the 116 th Congress. PFAS are a large group of synthesized chemical compounds that do not occur naturally. Chemical manufacturers have produced various types of PFAS for a range of commercial, industrial, and U.S. military applications since the 1940s. EPA identifies over 1,200 PFAS manufactured in the United States over time. The specific types and quantities of PFAS produced and used have varied over time and continue to change. PFAS are not a single chemical or a single compound, but refer to a group of compounds that share similar chemical structures. Any compound that has the chemical structure of at least one carbon atom attached to two or more fluorine atoms, or a chain of at least two carbon atoms attached to two or more fluorine atoms, may be considered a PFAS. Individual PFAS vary in terms of the numbers of fluorinated carbon atoms. The extent to which a chain of carbon atoms is fluorinated would determine whether a chemical may be considered a perfluoroalkyl substance or a polyfluoroalkyl substance. Given the possible variations in the length of the carbon chain, number of fluorinated carbon atoms, and other atoms attached to the chain, PFAS potentially could include thousands of chemical compounds if every possible combination were created. Industry and government sources indicate that manufacturers have focused on producing PFAS with longer fluorinated carbon chains, primarily because they reduce the surface tension of liquids and resist heat. Some longer chain PFAS have been used in chemical manufacturing processes to produce fluoropolymers designed for multiple consumer uses, including non-stick and heat-resistant coatings for cookware and food packaging, and treatment of clothing, leather, and other materials for soil, stain, and water resistance. In some cases, PFAS may be used only as a processing aid to create a fluoropolymer-based product, and in other cases, PFAS may be a constituent in the resulting product. Fluoropolymer-based products may therefore contain varying amounts of PFAS depending on the manufacturing process. Fluoropolymers containing specific types of PFAS may also break down into other PFAS depending on the conditions. Some PFAS have also been used as an ingredient in a variety of products, including fire suppressants in Aqueous Film Forming Foam (AFFF) used by U.S. military installations, other federal agencies, civilian airports, and local fire departments as Class B agents to extinguish petroleum-based liquid fuel fires; and suppressants of oxidizing mist in industrial metal plating operations. Such products generally contain relatively small concentrations of PFAS that require further dilution of the product for its intended use. For example, AFFF products that contain PFAS are designed to be diluted with water in their application to form an aqueous film that restricts oxygen to extinguish petroleum-based liquid fuel fires. Perfluorooctane sulfonate (PFOS), perfluorooctanoic acid (PFOA), and certain other related perfluoroalkyl substances accounted for most of the historical production of PFAS prior to their phase-out, discussed below in \"Regulation of PFAS in Commerce under TSCA.\" Manufacturers have transitioned away from these longer chain PFAS because of their potential toxicity and environmental persistence. Policymakers and stakeholders have continued to raise questions about the relative toxicity and persistence of shorter chain or less fluorinated PFAS in comparison to longer chain PFAS. Some policymakers and stakeholders have also expressed concern about the continued use and disposal of existing stocks of longer chain PFAS and products containing these chemicals, including the disposal of AFFF stocks by the federal government, civilian airport operators, and local fire departments, as they move to alternative firefighting foams. Similar to other commercial chemicals, releases of PFAS may occur in multiple ways that could result in exposures. PFAS may be released from chemical manufacturing or processing operations; intended uses (such as the application of AFFF as a fire extinguishing agent); disposal of products or wastes containing these chemicals; or accidental spills or other unexpected incidents. Occupational exposures may occur among workers in facilities that manufacture or process PFAS, among workers that use products containing these chemicals (such as firefighters that use AFFF), or among workers involved in disposal. Exposures among the general public would depend on whether a release may move through the environment in a manner that an individual could come into contact with these chemicals. Exposures may also occur among individuals who use a product containing these chemicals. As with any chemical, potential risks to human health and the environment would depend on the properties of the specific PFAS, the conditions under which exposure may occur, and the characteristics of the exposed individual. How PFAS interact in the environment and in humans or animals would vary depending on the structure, toxicity, persistence, and other properties of the individual chemical. The breakdown rate of a particular chemical once released would determine how long it persists before reacting with other chemicals in the environment or in a human or animal that would produce new chemicals with different properties. Although some have characterized PFAS as \"forever chemicals,\" persistence varies among longer chain versus shorter chain PFAS, and among more fluorinated versus less fluorinated PFAS. Toxicity and potential health effects may also vary. Whereas persistence would affect how long the properties of the chemical remain intact, the potential risks associated with exposure would depend on the toxicity of the specific chemical, the exposure pathway and other exposure factors. Given this variability, evaluating the potential risks of all PFAS as a singular category presents scientific (and regulatory) challenges. Similarly, regulating all PFAS as a singular category would present challenges in developing a singular risk-based standard (i.e., a singular concentration level). Because of the diversity of the potential universe of these chemicals, designating all PFAS as a singular category for regulatory or reporting purposes would also present challenges in implementation to identify which chemicals would be subject to applicable requirements. Studies of the potential human health and environmental effects of PFAS have focused on PFOA, PFOS, and certain other longer chain perfluoroalkyls because of their more predominant manufacture and use. Fewer studies have examined shorter chain perfluoroalkyls or polyfluoroalkyls. Although scientific understanding of the potential risks of these chemicals has been evolving, uncertainties remain about health effects that may be associated with exposures to various PFAS. Much of the attention among policymakers, stakeholders, and the general public has focused on drinking water sources. Studies of these chemicals have mostly focused on drinking water or contaminated food sources. Less is known about risks that may be associated with other exposure pathways, such as dermal contact or inhalation. The Agency for Toxic Substances and Disease Registry (ATSDR) and EPA have developed guidelines for assessing chemical exposure risks under various agency programs. The National Research Council of the National Academy of Sciences has also established risk assessment guidelines and has examined some of the challenges, such as uncertainty stemming from data quantity and quality. Each of these guidelines outlines factors to evaluate potential risks that may be associated with exposure to a specific chemical, including toxicity and other properties of the chemical; frequency, concentration, and duration of exposure (i.e., the dose); pathway of exposure (e.g., inhalation, ingestion, or skin contact); interaction with other chemicals that may be present in the environment; and age, overall health, and genetic and behavioral characteristics of the exposed individual. Federal actions to address potential risks from PFAS have primarily been taken under the authorities of TSCA, SDWA, and CERCLA. Most of these actions have focused on PFOS and PFOA, because of predominant past uses, prevalence in the environment stemming from these uses, and the greater availability of scientific research on potential health effects than for other PFAS. Congress has also authorized specific federal actions in separate legislation. See the section on \" Relevant Legislation Enacted in the 115th Congress \" for a list of these laws. EPA has taken actions under TSCA over the past few decades to gather and assess existing information on the risks of PFOS, PFOA, and certain other PFAS. Based on the findings, TSCA authorizes EPA to require manufacturers to submit more information if needed to further evaluate potential risks, and the agency has done so. EPA has also required, or worked with, manufacturers to develop new information when existing information on a substance is insufficient to evaluate the risks. If EPA determines that the risks would meet the statutory threshold of \"unreasonable\" under TSCA, TSCA authorizes EPA to establish various regulatory controls if no other statute addresses the risks. EPA has not rendered a finding of unreasonable risk for any PFAS to date. Following a series of voluntary industry phase-outs in the United States for the manufacture of PFOS, PFOA, and other related substances, EPA used TSCA authority to promulgate multiple significant new use rules (SNURs) that require manufacturers to notify the agency prior to reintroducing these substances into commerce. TSCA also requires manufacturers to notify EPA of the intent to produce any new PFAS. When information on potential risks is insufficient, EPA has issued orders that restrict the manufacture, processing, distribution, use, disposal or any combination of these activities pending the development of new information on risks. EPA has used information on PFAS gathered under TSCA to inform its actions under SDWA and CERCLA. For over a decade, EPA has been evaluating PFOA and PFOS under SDWA to determine whether an enforceable Maximum Contaminant Level (MCL) for drinking water provided by public water systems may be warranted. EPA has also included four other PFAS among emerging contaminants being evaluated for potential regulation under SDWA. In 2009, EPA issued provisional health advisories for short-term exposures to PFOA and PFOS in drinking water. In 2016, EPA issued additional health advisories for exposures to these chemicals in drinking water over an individual's lifetime. These health advisories are not enforceable standards for public water systems. However, SDWA grants EPA \"emergency powers\" to issue enforceable orders to abate an imminent and substantial endangerment to health from a contaminant in drinking waterâwhether or not the contaminant is regulated under the act. EPA has issued such orders at certain sites where releases of PFOA or PFOS have threatened drinking water sources. EPA and other federal agencies have also responded to releases of PFAS under CERCLA. DOD administers the vast majority of federal facilities where PFAS has been detected. DOD has been responding to releases of PFOA and PFOS from the use of AFFF at active and decommissioned U.S. military installations under the Defense Environmental Restoration Program. DOD has been phasing out the use of AFFF that contains PFOA or PFOS to reduce the risks of future releases. EPA has responded to releases of PFOA and PFOS under the Superfund program at some sites located on non-federal lands, in coordination with the states in which these sites are located. Sites addressed under the Superfund program have varied in terms of manufacturing or uses of PFAS. In February 2019, EPA issued a PFAS Action Plan that established an administrative framework for multiple planned actions under TSCA, SDWA, CERCLA, and other related authorities, including determining whether to establish an MCL for PFOA and PFOS; proposing SDWA monitoring for additional PFAS under the fifth Unregulated Contaminant Monitoring Rule (UCMR5); proposing the designation of PFOA and PFOS as hazardous substances under CERCLA (or other related laws that trigger such designation); developing \"groundwater cleanup recommendations\" to guide decisions at Superfund sites and federal facilities under CERCLA (proposed in April 2019); proposing additional SNURs under TSCA for potential new uses; taking enforcement actions \"as appropriate\" under available authorities; and developing toxicity values and other risk assessment tools to inform decisions under multiple statutes. The status of federal actions to address potential risks of PFAS under TSCA, SDWA, CERCLA, and other related authorities are discussed in greater detail below. EPA and other federal agencies have been evaluating potential human health effects that may be associated with exposures to various PFAS. These agencies have revised some of their findings over time to reflect the developing scientific literature. EPA has gathered information about certain PFAS from manufacturers and others to evaluate whether regulation is warranted under TSCA. EPA has also been evaluating whether regulation is warranted under SDWA, and whether response actions are warranted under CERCLA at sites where certain PFAS have been released into the environment. EPA has reported that studies of exposures to PFOA and PFOS in laboratory animals have identified reproductive and developmental, liver and kidney, and immunological effects, and that exposures to both chemicals have caused tumors in laboratory animals. EPA has also referenced human epidemiology studies observing increased cholesterol levels among exposed populations, with more limited findings related to infant birth weights, effects on the immune system, cancer (for PFOA), and thyroid hormone disruption (for PFOS). Although some studies have identified potential cancer risks, EPA has not classified any PFAS as a likely or known human carcinogen. Other federal agencies have also been evaluating the risks of certain PFAS. The Centers for Disease Control and Prevention (CDC) has collected blood serum levels and other biomonitoring data from individuals selected for a long-term study of the prevalence of exposures to a range of chemicals, including several PFAS. The ATSDR, National Institute of Environmental Health Sciences (NIEHS), and the interagency National Toxicology Program (NTP), have also been researching potential health effects that may be associated with exposures to certain PFAS. Although the roles of these agencies are not regulatory, data and findings of these studies may be used to inform regulatory decisions of other federal or state agencies. The following sections discuss the CDC biomonitoring program, ATSDR studies of the toxicological properties of certain PFAS, ATSDR site-specific studies, and related joint CDC/ATSDR studies. EPA's actions to evaluate PFAS are discussed in \"Regulation of PFAS in Commerce under TSCA,\" \"Regulation of PFAS and Other Actions under SDWA,\" and \"Environmental Remediation.\" For two decades, CDC has collected biomonitoring data for multiple environmental chemicals from a group of randomly-selected individuals intended to be representative of the general U.S. population. These data have included blood serum levels for PFOA and PFOS and 14 other PFAS. This effort is part of the National Health and Nutrition Examination Survey (NHANES). The biomonitoring data that CDC has collected generally indicate that blood serum levels for the selected group of perfluoroalkyl substances among participating individuals declined between 1999 and 2016 (the most recent year for which biomonitoring data are available for these specific chemicals). Declining blood serum levels for a particular chemical generally indicate reduced exposures. CDC tracks the biomonitoring data by age group, gender, and race/ethnicity, but not occupation. CDC cautions that \"finding measureable amounts of PFAS in [blood] serum does not imply that the levels of PFAS cause an adverse health effect.\" The likelihood that a specific amount of PFAS in blood serum may be associated with an adverse health effect requires further study. The actual levels of PFAS in blood serum among the broader U.S. population is also uncertain, as the sample size is relatively small. Section 104(i) of CERCLA authorizes ATSDR to prepare toxicological profiles for hazardous substances, pollutants, or contaminants found at contaminated sites that warrant federal attention. Over the last decade, ATSDR has issued three draft Toxicological Profiles for perfluoroalkyls (i.e., perfluoroalkyl substances) to identify potential health effects that may be associated with exposures to certain chemicals within this group of compounds. ATSDR typically issues drafts for public comment prior to finalizing a Toxicological Profile for an individual chemical or a group of chemicals. ATSDR has produced multiple drafts for perfluoroalkyls without issuing a final version so far, reflecting continuing developments in the scientific literature. ATSDR issued its first draft Toxicological Profile for perfluoroalkyls in May 2009, its second draft in August 2015, and its third draft in June 2018. For its third draft, ATSDR determined that sufficient scientific information was available to evaluate 14 perfluoroalkyls, including PFOA and PFOS. ATSDR observed that scientific studies of this group of perfluoroalkyls have focused mostly on risks associated with ingestion, and less on inhalation or skin contact (i.e., dermal exposure). ATSDR determined that scientific information was sufficient to establish provisional ingestion Minimal Risk Levels (MRLs) for four of these 14 perfluoroalkyls: PFOA, PFOS, perfluorohexane sulfonic acid (PFHxS), and perfluorononanoic acid (PFNA). ATSDR proposed the following values for these MRLs in milligrams per kilograms per day (mg/kg/day) to quantify an intermediate exposure level (i.e., daily exposure from 15 to 364 days) for each chemical that accounts for variance in bodyweight among exposed individuals. PFOA (3 x 10 -6 mg/kg/day or 0.000003 mg/kg/day) PFOS (2 x 10 -6 mg/kg/day or 0.000002 mg/kg/day) PFHxS (2 x 10 - 5 mg/kg/day or 0.00002 mg/kg/day) PFNA (3 x 10 -6 mg/kg/day or 0.000003 mg/kg/day) These values are smaller than in previous draft Toxicological Profiles and are among the smallest MRLs for the body of chemicals that ATSDR has evaluated. Smaller values generally indicate greater toxicity in comparison to chemicals with larger values, given the same exposure. Although the proposed MRLs for the PFAS referenced above are relatively small, the values are based on conservative assumptions and incorporate uncertainty factors. The value of an MRL alone therefore does not necessarily indicate conclusiveness of the level of risk. MRLs are estimates of daily human exposure to a chemical that is not expected to present an appreciable risk of adverse non-cancer health effects over a specified route (i.e., pathway) and duration of exposure. MRLs are intended to serve only as screening levels to identify sites that warrant further evaluation to determine whether actions may be needed to mitigate risks. Some stakeholders have characterized the proposed MRLs as recommended standards for regulation or site remediation. However, ATSDR emphasized in its June 2018 draft that \"MRLs are not intended to define clean-up or action levels.\" Although some perfluoroalkyls have been detected in ambient air at certain locations, ATSDR noted in its June 2018 draft that scientific information on exposure through inhalation is relatively limited. ATSDR concluded that the data were insufficient to establish provisional MRLs for inhalation exposures for any of these 14 perfluoroalkyls. In its June 2018 draft, ATSDR also noted that findings from epidemiological studies that examined potential associations between serum PFAS levels and the occurrence of adverse health effects were not consistent across studies. ATSDR examined a range of epidemiological studies, including those in which reported serum PFAS levels were hundreds or thousands of times that of the general population. Because the findings of epidemiological studies were inconsistent, ATSDR relied on animal studies to calculate provisional MRLs. Under Section 104(i) of CERCLA, ATSDR has also conducted or funded multiple site-specific studies to examine potential health effects where certain PFAS were released into the environment. State health departments performed some of these studies through cooperative agreements with ATSDR. These studies have focused on sites where PFOS, PFOA, and various other PFAS were manufactured, used, or disposed. ATSDR reports that the agency or a state health department has conducted site-specific studies for more than 20 sites across the United States. Some of these sites are federal facilities, such as U.S. military installations, whereas other sites are privately owned. In addition to ATSDR site-specific studies under CERCLA, Congress has authorized CDC and ATSDR to conduct joint scientific studies to better understand the potential risks associated with exposure to PFAS. Subject to annual appropriations, Section 316 of the National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ), as amended, authorizes CDC and ATSDR to conduct a joint study in consultation with DOD on the \"human health implications\" from potential exposure in \"drinking water, ground water, and any other sources of water and relevant exposure pathways.\" Using appropriations made available to CDC and ATSDR for the joint study, the agencies have worked to develop procedures and methods for studying potential health risks at sites with PFAS contamination. In April 2019, ATSDR announced that it would fund epidemiological studies at multiple sites. Section 316 also authorizes CDC and ATSDR to conduct exposure assessments at no fewer than eight current or former U.S. military installations where PFAS contamination has been discovered in drinking water, groundwater, or any other sources of water, and relevant exposure pathways. In February 2019, CDC and ATSDR announced the selection of eight military installations for such exposure assessments. EPA's PFAS Action Plan includes over 1,200 PFAS out of approximately 85,000 chemicals in the inventory. EPA added some of these PFAS to the inventory soon after the original enactment of TSCA in 1976, and added others over time as manufacturers notified the agency of the intent to introduce these PFAS into commerce. EPA reports that over 600 of these PFAS were produced in the United States between 2006 and 2016. Using the information gathering authorities of TSCA, EPA has obtained information on the risks of various PFAS to assess if such risks may be unreasonable to warrant regulation under the statute. In 2000, the sole manufacturer of PFOS and related perfluoroalkyl sulfonate chemicals (3M) reported to EPA that information it had obtained on the potential risks of these chemicals justified a voluntary phase-out of their production. The phase-out occurred over several years. In 2006, EPA reached an agreement with a group of manufacturers that produced PFOA and related perfluoroalkyl carboxylate chemicals for the voluntary phase-out of these chemicals over a ten-year period. Subsequent to each phase-out, EPA promulgated \"significant new use rules\" (SNURs) under Section 5(a)(2) of TSCA to require any manufacturer to notify the agency before reintroducing these chemicals into commerce for historical uses. Promulgating SNURs for phased-out uses of existing chemicals is not uncommon. EPA also promulgated SNURs to require notification of entirely new uses of existing PFAS. SNURs give EPA the opportunity to evaluate risks associated with planned uses before they occur. Under Section 5(a)(1), EPA has also continued to evaluate the risks of new chemicals, including new PFAS, as manufacturers have notified the agency of their intent to produce new chemicals. For some premanufacture notices, EPA has determined that the submitted information is not sufficient to assess whether risks associated with a new PFAS may be unreasonable. In such instances, EPA has issued orders under Section 5(e) to require the manufacturer to produce new information on the chemical. EPA has also used Section 5(e) orders to place restrictions on a new PFAS until the manufacturer submits the requested information to EPA. Section 6 of TSCA authorizes EPA to establish regulatory controls on any stage of the lifecycle of a chemical (i.e., manufacture, processing, distribution, use, and disposal) only if such controls would be necessary to mitigate \"unreasonable risk of injury to health or the environment.\" To date, EPA has not rendered such finding of unreasonable risk for any PFAS to warrant regulatory controls under Section 6. Chemical manufacturers may choose to phase-out the production of a chemical as a business decision. Following negotiations with EPA, 3Mâthe sole manufacturer of PFOS and related perfluoroalkyl sulfonate chemicalsâannounced a voluntary phase-out of these chemicals in 2000 based on risk information that it had gathered. Pursuant to Section 8(e) of TSCA, the manufacturer had submitted this information to EPA after it determined that the information met the statutory criteria for reporting. In 2006, EPA initiated the PFOA Stewardship Program with eight major manufacturers to reduce the extent to which PFOA and related perfluoroalkyl carboxylate chemicals enters the environment by 95% below 2010 levels and to completely phase-out the manufacture of these chemicals by 2015. In 2017, EPA announced that all eight manufacturers had met their phaseout goals. To evaluate chemicals for potential regulation, other provisions of Section 8 also authorize EPA to gather existing information from manufacturers, processors, and distributors. For example, EPA has used Section 8(a) to gather information on manufacturing volumes of PFAS above particular thresholds at chemical manufacturing facilities. Under Section 8(d), EPA has required that chemical manufacturers, processors, and distributors submit lists of health and safety studies related to PFAS to the agency. If EPA finds that existing information is insufficient to evaluate risks, Section 4 of TSCA authorizes EPA to require manufacturers or processors to test a chemical and submit the findings to the agency. In 2005, EPA determined that existing information on fluoropolymers and other fluorinated compounds that contain PFOA and related chemicals was insufficient to assess potential environmental effects. To obtain new information, EPA entered into Section 4 consent orders with two industry organizations requiring them to test various PFAS-containing resins, dispersions, paper, and textiles for environmental effects. In 2015, EPA concluded that the testing data were sufficient at that time to determine that these uses were unlikely to present unreasonable risks. EPA has promulgated multiple SNURs under Section 5(a)(2) to require notification of various PFAS for significant new uses. EPA promulgated a SNUR in 1987 for any use of hexafluoropropylene oxide other than as an intermediate in the manufacture of fluorinated chemicals in an enclosed process. Between 2002 and 2007, EPA promulgated SNURs that generally designated all uses of PFOS and 270 related perfluoroalkyl sulfonate chemicals as \"significant new uses,\" except certain specialized existing uses. In 2013, EPA promulgated a SNUR that designated uses of PFOA and related perfluoroalkyl carboyxlate chemicals in carpets or carpet treatments as significant new uses requiring notification. In 2015, EPA proposed a SNUR that would designate all uses of PFOA and related perfluoroalkyl carboyxlate chemicals as \"significant new uses.\" EPA's PFAS Action Plan states that it \"plans to follow up on the 2015 SNUR.\" Section 5(a)(1) authorizes the primary information gathering mechanism for new chemicals that have never been manufactured in commerce. Prior to producing a new chemical, a manufacturer must submit a premanufacture notice to EPA. In 1984, EPA determined under Section 5(h)(4) that most polymers entering into commerce do not present unreasonable risks and exempted them from premanufacture notification. This exemption is commonly referred to as the \"polymer exemption.\" In 2010, EPA determined that polymers containing perfluoroalkyl constituents may present unreasonable risk and promulgated a new rule requiring notification prior to their manufacture. This regulatory change became effective in 2012 and is intended to allow EPA to determine whether regulation of such polymers may be warranted. If EPA were to determine that information provided in a premanufacture notice is insufficient to assess risks, Section 5(e) authorizes EPA to issue an order that requires the manufacturer to develop new information on the new chemical. EPA has issued Section 5(e) orders for specific PFAS. For example, EPA issued a Section 5(e) consent order in 2009 for hexafluoropropylene oxide dimer acid and its ammonium salt (i.e., the GenX chemicals). According to its manufacturer, the GenX chemicals are used to make fluoropolymers without the use of PFOA. EPA has assessed the risks of PFOS, PFOA, and other PFAS on multiple occasions using information that the agency has collected under TSCA. In 2000, EPA's assessment of PFOS consisted of summarizing various animal studies and did not involve a formal determination on whether the risks were considered unreasonable. In 2002, EPA issued a draft assessment for PFOA using a similar approach it took for PFOS. As EPA has gathered more information, the agency has compared the findings of newer studies with those of existing studies to determine if the agency's understanding of the risks of PFAS warranted revision. For instance, EPA submitted an updated draft assessment for PFOA in 2005 to its Science Advisory Board for review. These assessments have informed the agency's subsequent consideration of whether regulation of certain PFAS may be warranted under TSCA. In 2009, EPA announced its intention to consider initiating a Section 6 rulemaking under TSCA to manage risks of long-chain PFAS. EPA noted its intent to develop more detailed assessments to support a finding of unreasonable risk. If EPA were to make such a finding, Section 6 authorizes EPA to promulgate a rule to mitigate the unreasonable risk. In promulgating the rule, EPA may select among several regulatory options, including a prohibition or restriction on the manufacture, processing, distribution of the chemical or a limitation on the amount in which the chemical may be manufactured, processed, or distributed for all or particular uses; a requirement to label the chemical with clear and adequate warnings and instructions with respect to its use, distribution, or disposal; a requirement to track the processes used to manufacture or process the chemical or conduct tests that are reasonable and necessary to assure compliance with the rule; a prohibition or restriction on commercial use or disposal of a chemical; or a requirement for manufacturers and processors of the chemical to notify distributors, those in possession of, or exposed to, the chemical, and the public of the agency's unreasonable risk finding, and to replace or repurchase the chemical if requested. If EPA were to find an \"unreasonable risk,\" Section 9 requires EPA to determine whether other federal authorities may be available to mitigate the risk before establishing regulatory controls. Since its announcement in 2009 to consider a Section 6 rulemaking, EPA has not made an unreasonable risk finding for any PFAS. Additionally, none of the 10 chemicals that EPA prioritized in 2016 for risk evaluation under Section 6 are PFAS. Although EPA has not restricted existing PFAS through Section 6 rulemaking, the agency has issued Section 5(e) orders to restrict the manufacture, processing, distribution, use, and disposal of new PFAS reported to the agency under Section 5(a)(1). These restrictions remain effective until the manufacturer submits the new information requested by EPA. As an example, the Section 5(e) consent order for the two GenX chemicals noted above requires the manufacturer to \"recover and capture (destroy) or recycle [both chemicals] at an overall efficiency of 99% from all effluent process streams and the air emissions (point source and fugitive).\" Although EPA has not established Section 6 regulatory controls on any PFAS, the agency has used its enforcement authorities under TSCA to assess fines and penalties for violations of other statutory requirements. Section 15 of TSCA prohibits certain acts such as failure or refusal to comply with any requirement, rule, order, or consent agreement under Title I, or any requirement, rule, or order under Title II; use of a chemical for commercial purposes that violates any requirements established under Sections 5, 6, or 7; failure or refusal to establish or maintain records, submit reports, notices or other information, or permit access to or copying records, as required by TSCA; and failure or refusal to permit entry or inspection under Section 11. Section 16 authorizes civil and criminal penalties for taking actions that are prohibited under Section 15. In 2005, EPA announced a settlement with DuPont for reporting violations under Section 8(e) of TSCA and the Resource Conservation and Recovery Act (RCRA) that involve PFOA. According to EPA, the settlement required DuPont to pay $10.25 million in civil penalties and perform Supplemental Environmental Projects valued at $6.25 million. EPA has continued to take enforcement actions for other violations related to PFAS. For example, EPA sent a Notice of Violation to Chemours in February 2019 for alleged violations of Sections 5 and 8 of TSCA involving GenX chemicals. SDWA authorizes EPA to promulgate national primary drinking water regulations for contaminants in water provided by public water systems. These regulations generally include an enforceable standard (MCL) and associated monitoring, treatment, and reporting requirements. For substances that are not regulated under SDWA, EPA is authorized to issue health advisories that identify non-enforceable levels of contaminants in drinking water that are expected to be protective of sensitive populations. For both regulated and unregulated contaminants, SDWA emergency powers authorize EPA to take actions to abate an imminent and substantial endangerment to public health. To date, EPA has not promulgated drinking water regulations for any PFAS but plans to propose preliminary regulatory decisions for PFOA and PFOS in 2019. In 2016, the agency issued non-enforceable Lifetime Health Advisories for PFOS and PFOA. EPA also has used SDWA emergency powers to respond to releases of PFOA and PFOS detected in public water systems at several sites. The following sections further discuss these SDWA authorities and related actions. SDWA authorizes EPA to issue health advisories for contaminants that are not regulated under the act. Health advisories include non-enforceable concentrations for contaminants in drinking water and often include values for different exposure durations (e.g., one day, a lifetime). These non-regulatory levels are intended to help water suppliers and others address contaminants for which EPA has not promulgated drinking water standards. Advisories provide technical guidance on identifying, measuring, and treating such contaminants. In May 2016, EPA established the Lifetime Health Advisory levels for PFOA and PFOS at 70 parts per trillion (ppt), separately or combined. In calculating the health advisory level, EPA applied a relative source contribution of 20% (i.e., an assumption that 20% of PFOS and/or PFOA exposure is attributable to drinking water and 80% is from diet, dust, air or other sources). These levels are intended to protect the most sensitive subpopulations (i.e., nursing infants), with a margin of protection, over a lifetime of daily exposure. Previously in January 2009, EPA issued provisional health advisory levels of 400 ppt for PFOA and 200 ppt for PFOS to address short-term exposures to these substances from drinking water. For more than a decade, EPA has been assessing whether to promulgate national primary drinking water regulations for PFOA and PFOS. SDWA specifies a multistep process for evaluating contaminants to determine whether a national regulation is warranted. The evaluation process includes identifying contaminants of potential concern, assessing health risks, collecting occurrence data (and developing reliable analytical methods necessary to do so), and making determinations as to whether or not regulatory action is needed for a contaminant. Every five years, EPA is required to publish a contaminant candidate list (CCL) that identifies contaminants that are known or anticipated to occur in public water systems and that may require regulation under the act. In 2009, EPA placed PFOA and PFOS on the third such list (CCL 3) for evaluation. In 2016, EPA published the fourth list, CCL 4, which carried over PFOA and PFOS. EPA carried forward these contaminants to continue evaluating health effects, gathering national occurrence data, and developing analytical methods. SDWA Section 1445 requires EPA to promulgate, every five years, an unregulated contaminant monitoring rule (UCMR) that requires public water systems to test for no more than 30 such contaminants. A representative sample of systems serving 10,000 or fewer people is required to conduct monitoring. In 2012, EPA issued the third UCMR (UCMR 3), under which 4,864 public water systems tested their drinking water for 6 PFASâincluding PFOA and PFOSâbetween January 2013 and December 2015. Overall, 63 of the 4,864 (1.3%) water systems reported at least 1 sample with PFOA and/or PFOS (separately or combined) concentrations exceeding EPA's health advisory level of 70 ppt. EPA estimates that these 63 water systems serve approximately 5.5 million individuals. According to EPA's PFAS Action Plan , the agency intends to propose monitoring requirements for other PFAS in the next UCMR in 2020. As of August 2019, EPA had developed an analytical method to detect 18 PFAS in drinking water supplies. The plan states that the agency would use the monitoring data gathered through UCMR 5 to evaluate the national occurrence of additional PFAS. The agency has been developing analytical methods for monitoring additional PFAS. SDWA requires EPA, every five years, to make a regulatory determination (RD)âa determination of whether or not to promulgate a drinking water regulationâfor at least five contaminants on the CCL. To determine that a national drinking water regulation is warranted for a contaminant, EPA must find that a contaminant may have an adverse health effect; it is known to occur or there is a substantial likelihood that it will occur in public water systems with a frequency and at levels of public health concern; and in the sole judgment of the EPA Administrator, regulation of the contaminant presents a meaningful opportunity for health risk reduction for persons served by public water systems. To meet the statutory criteria for making an RD, EPA requires a peer-reviewed risk assessment; a widely available analytical method for monitoring; and nationally representative occurrence data. During the third RD round in 2014, when EPA published preliminary RDs for contaminants on CCL 3 (which included PFOA and PFOS), UCMR 3 monitoring was underway and national occurrence data for PFOA and PFOS were not available. EPA would not have been able to include any PFAS for the third RD without such data. In 2016, EPA included PFOA and PFOS on the agency's list of unregulated contaminants that met EPA data availability requirements to make RDs. The fourth round of RDs is scheduled for 2021. SDWA does not prevent EPA from making determinations outside of that five-year cycle. According to the Spring 2019 Unified Regulatory Agenda , EPA will propose preliminary RDs for PFOA and PFOS by the end of 2019 and make final determinations by the end of 2020. Several bills in the 116 th Congress would direct EPA to promulgate national primary drinking water regulations and establish an MCL for individual or total PFAS, including Senate-passed S. 1790 , National Defense Authorization Act for FY2020; S. 1507 ; S. 1473 ; H.R. 2377 , H.R. 4033 , and S. 2466 . Once the EPA Administrator makes a determination to regulate a contaminant, SDWA requires EPA to propose a rule within 24 months and promulgate a \"national primary drinking water regulation\" within 18 months after the proposal. When proposing a regulation, EPA must also propose a non-enforceable maximum contaminant level goal (MCLG), at which no known or anticipated adverse health effects are expected to occur and which allows an adequate margin of safety. An MCLG is based solely on health effects data and does not reflect cost or technical feasibility considerations. EPA derives an MCLG based on an estimate of the amount of a contaminant that a person can be exposed to on a daily basis that is not anticipated to cause adverse health effects over a lifetime. This level is further reduced to be protective of sensitive populations. Drinking water regulations generally include an MCLâan enforceable limit for a contaminant in public water supplies. SDWA requires EPA to set the MCL as close to the MCLG as feasible. When assessing feasibility, the law directs EPA to consider the best available (and field-demonstrated) treatment technologies, taking cost into consideration. Regulations also include monitoring, treatment, and reporting requirements. EPA has promulgated regulations that cover several similar contaminants and typically establishes an individual MCL for each contaminant covered by the regulation. Regulations generally take effect three years after promulgation. EPA may allow up to two additional years if the Administrator determines that more time is needed for public water systems to make capital improvements. States have the same authority for individual water systems. The law directs EPA to reviewâand if necessary reviseâeach regulation every six years. A revision may maintain or provide greater health protection, but it may not reduce protection. Several bills in the 116 th Congress would direct EPA to promulgate national primary drinking water regulations and establish an MCL for individual or total PFAS, including Senate-passed S. 1790 , National Defense Authorization Act for FY2020; S. 1507 ; S. 1473 ; H.R. 2377 , and H.R. 4033 . Among other amendments to SDWA, S. 1790 , Title LXVII, Subtitle B and S. 1507 reported, would also establish a standard-setting process specifically for PFAS. SDWA Section 1431 grants EPA \"emergency powers\" to issue orders to abate an imminent and substantial endangerment to public health from \"a contaminant that is present in or is likely to enter a public water system or an underground source of drinking water,\" and if the appropriate state and local authorities have not acted to protect public health. This authority is available to address both regulated and unregulated contaminants. The EPA Administrator \"may take such actions as he may deem necessary\" to protect the health of persons who may be affected. Actions may include requiring persons who caused or contributed to the endangerment to provide alternative water supplies, or to treat contamination. When using this authority, EPA generally coordinates closely with states. EPA reports that it has used its emergency powers under Section 1431 to require responses to PFOA and/or PFOS contamination of drinking water supplies in four cases, three of which involved DOD sites. Required actions included treating drinking water, offering connection to a public water system, or providing bottled water where PFOA or PFOS concentrations were above 70 ppt. SDWA Section 1431 emergency orders can require a person to perform an action to abate an imminent and substantial danger to public health. However, such orders do not establish liability in a manner comparable in scope to CERCLA, nor do such orders create or otherwise trigger liability under CERCLA. For additional discussion of drinking water issues related to PFAS, see CRS Report R45793, PFAS and Drinking Water: Selected EPA and Congressional Actions , by Elena H. Humphreys and Mary Tiemann. As with other chemicals, the federal role under CERCLA in remediating environmental contamination from releases of PFAS has focused on releases from federal facilities, and releases at sites on non-federal lands designated for priority federal attention under the Superfund program in coordination with the states in which the sites are located. The vast majority of PFAS known to be released from federal facilities has occurred from the use of AFFF at U.S. military installations, some of which have involved National Guard facilities. DOD has been responding to these releases under the Defense Environmental Restoration Program, pursuant to CERCLA and to SDWA emergency powers orders at the three U.S. military installations referenced above. The National Aeronautics and Space Administration (NASA) has also responded to releases of PFOA and PFOS from the use of AFFF detected at the Wallops Flight Facility in Virginia. As for other chemicals, the states have generally played a more prominent role under state law in responding to releases of PFAS at sites on non-federal lands that are not designated under the Superfund program. Authorities of CERCLA, and actions related to PFAS under the EPA Superfund program and DOD Defense Environmental Restoration Program, are discussed below. Section 104 of CERCLA authorizes the President to respond to releases of hazardous substances into the environment, and releases of other pollutants or contaminants that may present an imminent and substantial danger to public health or welfare. Response actions may include \"removal\" actions to address more immediate hazards and stabilize site conditions, and more extensive \"remedial\" actions intended to provide a more permanent solution. This Presidential response authority is delegated by executive order to EPA under the Superfund program for releases at sites on non-federal lands, and to other departments and agencies that administer federal facilities from which a release occurs. EPA is also responsible for designating sites on the National Priorities List (NPL) and for overseeing response actions at federal facilities performed by departments and agencies that administer those facilities. The federal response framework involves coordination with the states in which the sites are located, and state cost-shares for the use of Superfund appropriations to pay for remedial actions at sites on non-federal lands. Section 104(c) of CERCLA generally requires states to match 10% of the construction costs of remedial actions, and 100% of the costs of operation and maintenance once a remedial action is in place and operating as intended, with the exception of the treatment of groundwater or surface water for which the federal government may pay 100% of the costs for the first 10 years. More limited \"removal\" actions are not subject to state cost-shares and may be fully federally funded. Response actions for releases from federal facilities are not subject to state cost-shares. The availability of federal funding at Superfund sites or federal facilities is subject to annual appropriations. Section 111 of CERCLA generally restricts the use of Superfund appropriations at federal facilities funded with separate appropriations. Section 107 of CERCLA establishes liability for response costs, natural resource damages, and the costs of ATSDR public health studies at release sites. Categories of parties who may be held liable for these costs generally include current and former site owners and operators; persons who arranged for the treatment or disposal of a hazardous substance; persons who arranged for the transport of a hazardous substance for treatment or disposal; and persons who transported a hazardous substance for treatment or disposal and selected the receiving site. However, the statute exempts various categories of parties, including persons who acquired a site with preexisting contamination in certain circumstances and did not cause or contribute to the contamination; persons who contributed very small quantities or only household wastes to a site; persons who released a hazardous substance in accordance with a federal permit issued under certain other laws (including state permits issued with delegated federal authorities) referred to as \"federally permitted releases;\" and certain other categories of parties. Section 107 authorizes actions to recover response costs for which a party is liable. Section 106 also authorizes enforcement orders to require a liable party to perform a response action under federal oversight to avoid the need for federal and state funds upfront. Section 122 authorizes an additional mechanism under which liable parties may enter into negotiated settlements with the federal government to perform or pay for response actions. CERCLA Section 106 orders are similar in principle to SDWA Section 1431 emergency powers orders in terms of requiring a person to perform a specific action to mitigate potential risks. However, SDWA does not establish broader liability comparable to CERCLA and does not include cost-recovery or settlement authorities. CERCLA also is not limited to drinking water exposures and may address additional pathways through which exposures to contamination may occur. The scope of liability under CERCLA is more limited than response authority under the statute. Liability only applies to releases of designated hazardous substances, and not to other pollutants or contaminants. EPA has not designated any PFAS as hazardous substances to date. CERCLA authorizes federal actions to respond to releases of PFAS as pollutants or contaminants, but does not establish liability for such releases to compel the party that caused or contributed to a release to pay for or perform response actions. The scope of liability under CERCLA for hazardous substances does not include product liability, or liability for personal injury or property damages, both of which vary under state tort law. The Federal Tort Claims Act (FTCA) authorizes tort claims against the United States government for personal injury, death, or property damages that may be caused by negligent or wrongful federal acts or omissions, but authorizes a defense for discretionary functions of federal departments and agencies in carrying out their respective missions. EPA's PFAS Action Plan indicated that the agency is developing a rule to designate PFOA and PFOS as hazardous substances under Section 102 of CERCLA or other related laws that trigger a hazardous substance designation. Section 101(14) of CERCLA defines the term \"hazardous substance\" to include chemicals designated for regulation or enforcement under the following federal statutes: hazardous substances designated under Section 311(b)(2)(A) of the Clean Water Act; toxic pollutants designated under Section 307(a) of the Clean Water Act; characteristic or listed hazardous wastes under Section 3001 of the Solid Waste Disposal Act (commonly referred to as the Resource Conservation and Recovery Act or RCRA); hazardous air pollutants designated under Section 112 of the Clean Air Act; and any imminently hazardous chemical substance or mixture for which EPA has taken a civil action in the appropriate U.S. District Court of jurisdiction under Section 7 of TSCA. Contaminants for which EPA has promulgated an MCL under SDWA are not included in this definition. The designation of an MCL for any PFAS would therefore not trigger a hazardous substance designation under CERCLA. EPA's authority to designate hazardous substances is not restricted to chemicals designated under the laws referenced in Section 101(14) of CERCLA. Section 102(a) also authorizes EPA to promulgate regulations designating other chemicals as a hazardous substance if the chemical may present substantial danger to the public health or welfare or the environment when released into the environment. If PFAS were designated as hazardous substances, releases into the environment would be subject to liability and release reporting requirements under CERCLA to the same extent as other hazardous substances. Section 120 of CERCLA generally applies liability and other requirements of the statute to federal facilities to the same extent as other entities. Multiple bills introduced in the 116 th Congress would require EPA to designate PFAS as hazardous substances under CERCLA, whereas some bills requiring differing designations under other statutes would have the effect of a CERCLA hazardous substance designation. H.R. 535 and S. 638 would require EPA to designate \"all\" PFAS as hazardous substances under Section 102(a) of CERCLA within one year of the date of enactment. Section 330O of House-passed H.R. 2500 includes similar language. Section 330A of House-passed H.R. 2500 , H.R. 3616 , and H.R. 2605 would also have the effect of a CERCLA hazardous substance designation for PFAS. Section 330A of House-passed H.R. 2500 and H.R. 3616 would require EPA to list PFAS as toxic pollutants under Section 307(a)(1) of the Clean Water Act within 30 days of enactment, and would exempt PFAS from the listing criteria of that provision. H.R. 2605 would require EPA to list \"all\" PFAS as hazardous air pollutants under Section 112(b) of the Clean Air Act within 180 days of enactment. As noted above, Section 101(14) of CERCLA defines hazardous substances to include such pollutants designated under the Clean Water Act and Clean Air Act, and certain other statutes. The lists of hazardous substances, toxic pollutants, and hazardous air pollutants are codified in federal regulation. Revisions to these lists have been subject to federal rulemaking procedures. If PFAS were designated as hazardous substances, some potentially responsible parties (PRPs) may include the federal government at U.S. military installations and other federal facilities, civilian airport owners and operators, and local fire departments that released PFAS from the use of AFFF. Owners and operators of landfills could be PRPs if PFAS-containing products and wastes migrated into the environment. Chemical manufacturers and processors that release PFAS at sites they own or operate could also be PRPs. CERCLA does not more broadly establish product liability for companies that manufacture or process PFAS. Although CERCLA authorizes some exemptions from liability, these exemptions focus primarily on situations in which the site owner did not cause or contribute to the contamination or the party contributed very small quantities of waste or only household wastes to a site. Fertilizer applications of biosolids (i.e., treated sewage sludge) that may contain PFAS would generally not be subject to CERCLA because of the statutory exclusion of the \"normal application of fertilizer.\" Although PFAS are presently not subject to liability under CERCLA, states may establish liability for releases of these chemicals under their own laws. Section 120(a)(4) of CERCLA waives federal sovereign immunity to allow the application of state remediation laws to federal facilities that are not on the NPL. State laws establishing liability for PFAS may be applied to such facilities. Although federal sovereign immunity is not waived at federal facilities on the NPL, Section 121 of CERCLA requires the state in which a site is located to be provided the opportunity for involvement in the selection of remedial actions regardless of whether the site is on the NPL. This provision allows states to oversee remedial actions at federal facilities on the NPL, but not to enforce state law at such facilities. Absent a hazardous substance designation, EPA has responded to releases of PFAS under the Superfund program using CERCLA response authorities for pollutants and contaminants at certain sites on non-federal lands, in coordination with the states in which the sites are located. Sites where EPA has been involved under the Superfund program have typically been contaminated not only from PFAS but also releases of designated hazardous substances. For example, EPA added the Saint-Gobain Performance Plastics site in Hoosick Falls, NY to the NPL in August 2017 based on potential risks associated with multiple hazardous substances detected at that site in addition to PFOA. Without a hazardous substance designation, EPA's PFAS Action Plan indicated that the agency would continue to consider its use of CERCLA response authorities for pollutants and contaminants to respond to PFAS contamination, or the use of SDWA Section 1431 emergency powers or RCRA Section 7003 enforcement authorities applicable to solid or hazardous wastes. PFAS could be considered a solid waste under RCRA if released in a manner that constituted discarding, pursuant to the definition of \"solid waste\" in RCRA Section 1004(27). Hazardous waste is a subset of solid waste as defined in Section 1004(5) of RCRA. All solid wastes are therefore not necessarily hazardous wastes. EPA has not listed any PFAS as hazardous waste to date. The constituents for characterizing the toxicity of hazardous waste under RCRA also do not include any PFAS. On April 25, 2019, EPA proposed interim groundwater cleanup recommendations for PFOA and PFOS at Superfund sites, U.S. military installations, and other federal facilities. The public comment period closed on June 10, 2019. These recommendations would establish screening levels to identify sites for evaluation, and a preliminary remediation goal (PRG) as a starting point to inform site-specific remediation decisions under CERCLA. EPA proposed a concentration of 40 ppt in groundwater as a screening level, and a concentration of 70 ppt as a PRG for groundwater that is a current or potential source of drinking water at sites where no state, tribal, or other applicable, relevant, and appropriate requirement exists. The proposed 70 ppt PRG is the same concentration as the EPA Lifetime Health Advisory for PFOA or PFOS in drinking water. If EPA were to promulgate an MCL under SDWA, the concentration may be applied as a standard for remedial actions under Section 121 of CERCLA to protect current or potential sources of drinking water. EPA indicated that its proposed groundwater cleanup recommendations may also be used to evaluate risks at RCRA corrective action sites. However, as noted above, EPA has not listed any PFAS as hazardous waste under RCRA to date. DOD has responded to releases of various PFAS from the use of AFFF at current and former U.S. military installations under the Defense Environmental Restoration Program in conjunction with its delegated CERCLA response authorities. DOD response actions taken under this program are subject to the requirements of CERCLA. These program authorities apply to releases at facilities or sites that are or were owned by, leased to, or otherwise possessed by the federal government, and under the jurisdiction of DOD at the time of the release. DOD is required to respond to releases of hazardous substances at such facilities or sites. DOD may also respond to releases of other pollutant or contaminants, but is not required to do so consistent with CERCLA liability applying only to hazardous substances. Section 319(b) of Senate-passed S. 1790 would amend these program authorities to require DOD to respond to releases of either hazardous substances, pollutants, or contaminants at DOD facilities or sites, but without enforceable liability under CERCLA. Regardless of such statutory obligation, funding for DOD response actions would remain subject to annual appropriations. Releases caused by a state National Guard unit operating at a facility or site that DOD owns, leases, or possesses may be eligible for DOD response actions, but the contractual agreement with the state may relieve federal responsibility for actions of a state National Guard unit. National Guard facilities that are state-owned and state-operated have generally been ineligible for funding under the Defense Environmental Restoration Program, consistent with the statutory criteria of eligibility restricted to DOD facilities or sites. House-passed H.R. 2500 and Senate-passed S. 1790 both include provisions that would address the eligibility of DOD funding to respond to releases of PFAS at National Guard facilities. DOD actions to respond to PFAS contamination at eligible sites have ranged from providing bottled water or other alternative water supplies to treating contaminated water sources. The availability of funding for response actions under the Defense Environmental Restoration Program is subject to annual appropriations to multiple accounts. Each account funds a different inventory of sites, including Defense Environmental Restoration accounts of the U.S. Air Force, U.S. Army, U.S. Navy, and Defense-wide sites. A fifth Defense Environmental Restoration account funds Formerly Used Defense Sites (FUDS) decommissioned prior to 1986. The Defense Base Closure account funds sites closed under consolidated Base Realignment and Closure (BRAC) rounds in 1988, 1991, 1993, 1995, and 2005. The Explanatory Statement accompanying the Consolidated Appropriations Act, 2017 ( P.L. 115-31 ) \"encouraged\" DOD to establish procedures for prompt and cost-effective remediation of contamination from perfluorinated chemicals (PFCs, i.e., PFAS) released as a result of the use of AFFF at current and former U.S. military installations. The Explanatory Statement also directed DOD to submit a report to Congress assessing the number of current and former installations where AFFF was or is used, and the impact of contamination in drinking water on surrounding communities. The Explanatory Statement further directed DOD to develop plans for \"prompt\" community notification of such contamination and procedures for \"timely\" remediation. DOD issued this report in October 2017 identifying an initial inventory of release sites and stating Addressing elevated levels of PFOS and PFOA from DoD activities is a priority for DoD. The DoD Components have taken action to ensure safe drinking water for people living and working on their military installations and in the surrounding communities. Following the CERCLA process, DoD is addressing its cleanup responsibility and promptly notifying affected communities. DoD is also taking steps to remove and replace AFFF containing PFOS in the supply chain, and is committed to finding a fluorine-free alternative that safeguards its troops and military assets, meets critical mission requirements, and protects human health and the environment. In March 2018, DOD issued a presentation on the status of its efforts to respond to releases of PFOA and PFOS. The House Committee on Armed Services directed DOD to provide a status update, in its report accompanying the National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ). DOD identified 401 U.S. military installations with known or suspected releases of PFOA or PFOS from the use of AFFF. DOD detected PFOA or PFOS in groundwater wells above the EPA Lifetime Health Advisory of 70 ppt at 90 of these installations. DOD identified planned actions at these installations under the CERCLA site response process, subject to annual appropriations and prioritization of funding among eligible sites. DOD has been remediating contamination from hazardous substances and unexploded ordnance under the Defense Environmental Restoration Program for years at many of these same installations. Detections of PFOA or PFOS in groundwater are a more recent development that adds to existing challenges. Some stakeholders have expressed concern about the potential for environmental contamination from the disposal of PFAS. As with many other types of wastes, incineration and landfilling have been the two principal methods of disposal available for wastes containing PFAS. Incineration offers the potential to reduce the toxicity and volume of wastes, but generates air emissions and combustion residuals that necessitate disposal. Determining what temperatures are necessary to break down PFAS and ensuring that potential combustion byproducts are acceptable also have been issues for incineration. Wastewater discharges or sludge from industrial facilities and sewage treatment plants may contain PFAS depending on the constituency of the waste source. As industry transitions to shorter chain PFAS, some policymakers and stakeholders have also expressed concern about the disposal of existing stocks of longer chain PFAS and products containing these chemicals. For example, DOD, other federal agencies, civilian airport operators, and local fire departments face disposal needs for existing stocks of AFFF as they transition to alternatives. Waste streams generated from the treatment of PFAS in drinking water, or the remediation of PFAS contamination, also necessitate disposal. The disposal of PFAS wastes is regulated under multiple federal and state laws. EPA has not promulgated contaminant-specific standards for the disposal of PFAS to date. The disposal of PFAS wastes has been regulated similarly to other types of wastes for which contaminant-specific standards are not established. Although not presently listed as hazardous wastes, the disposal of PFAS wastes in landfills would generally be subject to RCRA Subtitle D solid waste criteria considering the breadth of the definition of \"solid waste\" in applying to garbage, refuse, sludge from a waste treatment plant, water supply treatment plant, or air pollution control facility, and other discarded material. Incineration facilities are also subject to RCRA for the disposal of combustion residuals, and to hazardous air pollutants standards under the Clean Air Act (CAA). Whereas these CAA standards are not specific to PFAS, some of them apply to related chemicals that may be created during combustion, such as hydrogen fluoride. Although EPA has not established effluent limitations or pretreatment standards for PFAS in wastewater, the Clean Water Act generally requires permits for the discharge of any pollutant into U.S. waters. Section 330D of House-passed H.R. 2500 would require DOD to ensure that PFAS is eliminated and not emitted into the air when using incineration to dispose of AFFF or other materials containing these chemicals. This House provision would also require DOD to ensure that applicable CAA requirements are met, the selected incineration facility has not violated the CAA within the past 12 months, and AFFF or other PFAS materials designated for disposal are stored in accordance with RCRA Subtitle C hazardous waste requirements. As a practical matter, DOD would be required to select incinerators designed for hazardous wastes that operate at temperatures sufficient to destroy carbon and fluorine bonds in PFAS. However, Section 330D would not designate PFAS as hazardous waste. The PFAS Waste Incineration Ban Act of 2019 ( H.R. 2591 ) would require EPA to promulgate regulations no later than six months after enactment that would prohibit the use of incineration to dispose of AFFF containing PFAS. H.R. 2591 would also require EPA to promulgate regulations no later than one year after enactment to identify other categories of PFAS wastes for which incineration would be prohibited if necessary to protect human health and the environment, and to review and revise these waste categories at least every four years. If incineration were prohibited, landfilling could increase if other disposal methods do not become more widely available. For wastewater discharges, Section 330A of House-passed H.R. 2500 would require EPA to list PFAS as toxic pollutants under the Clean Water Act within 30 days of enactment, and to establish effluent limitations and pretreatment standards for PFAS no later than January 1, 2022. DOD has revised its Military Specification for AFFF as a step in its transition away from the use of Class B firefighting foams containing PFOA and PFOS. Military Specifications provide instructions to U.S. military departments and agencies that establish standards and parameters for specific products that DOD has determined are suitable for procurement to meet U.S. military needs for DOD to carry out its mission. DOD Military Specifications are internal guidelines developed for U.S. military procurement, and are not binding and enforceable regulations. DOD initially issued its Military Specification on AFFF (MIL-F-24385) in 1969, specifying the use of \"fluorocarbon surfactants\" based on their effectiveness in extinguishing petroleum-based liquid fuel fires. DOD subsequently revised MIL-F-24385 for various purposes in the 1970s, 1980s, and 1990s, and on September 7, 2017, under MIL-PRF-24385F to address the amount of PFOA and PFOS and other criteria. DOD guidelines generally require reviews of Military Specifications at least once every five years. The next scheduled review of MIL-PRF-24385F is September 6, 2022. DOD issued a similar version of this Military Specification for the Naval Sea Systems Command on May 7, 2019. Both versions specify AFFF containing fluorocarbon surfactants for use as Class B fire extinguishing agents, but restrict the content of PFOA or PFOS to 800 parts per billion (ppb) or micrograms per liter. Neither version limits the content of other PFAS. Previous versions stated that AFFF must contain \"fluorocarbon surfactants\" but did not restrict the concentration of any PFAS. Section 6.6 of both the September 2017 version and the May 2019 version include the following DOD policy statement on the long-term objective to transition to the use of fluorine-free AFFF: The DoD's goal is to acquire and use a non-fluorinated AFFF formulation or equivalent firefighting agent to meet the performance requirements for DoD critical firefighting needs. The DoD is funding research to this end, but a viable solution may not be found for several years. In the short term, the DoD intends to acquire and use AFFF with the lowest demonstrable concentrations of two particular PFAS; specifically PFOS and PFOA. The DoD intends to be open and transparent with Congress, the Environmental Protection Agency (EPA), state regulators, and the public at large regarding DoD efforts to address these matters. AFFF manufacturers and vendors are encouraged to determine the levels of PFOS, PFOA, and other PFAS in their products and work to drive these levels toward zero while still meeting all other military specification requirements. DOD has funded the research and development of fluorine-free AFFF under its Strategic Environmental Research and Development Program (SERDP) and Environmental Security Technology Certification Program (ESTCP). In June 2018, DOD issued a report examining the status of alternatives to AFFF that contain PFOA and PFOS, and the plans of DOD for the phase-out and disposal of its existing stocks of AFFF that contain these chemicals. The report also discussed projects funded under SERDP and ESTCP. Section 1059 of the National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ) required DOD to issue this report to the House and Senate Committees on Armed Services. House-passed H.R. 2500 includes multiple provisions related to phasing out the use of AFFF for land-based application at U.S. military installations and replacement with fluorine-free foams. Senate-passed S. 1790 also includes a phase-out provision for land-based application at U.S. military installations. The Federal Aviation Administration (FAA) has been using the DOD Military Specification for AFFF as criteria for civilian airport operators to demonstrate compliance with certification requirements for Class B fire extinguishing agents. Section 332 of the FAA Reauthorization Act of 2018 ( P.L. 115-254 ) directed FAA to stop recommending the use of fluorinated AFFF for civilian airport certification, no later than three years from the date of enactment (October 5, 2018). On January 17, 2019, FAA updated its guidelines to reference the September 2017 version of the DOD Military Specification for AFFF that restricted the maximum content of PFOA or PFOS. The FAA noted that it is researching potential alternatives for fluorine-free AFFF to comply with P.L. 115-254 , but observed Currently, fluorine-free foams on the market do not match the performance of their fluorinated counterparts, and they require more agent to extinguish fires quickly. Fluorine-free foams are not able to provide the same level of fire suppression, flexibility, and scope of usage as MIL-PRF-24385 AFFF firefighting foam. The statutory deadline under P.L. 115-254 for FAA to allow the use of fluorine-free firefighting foams for civilian airport certification is October 5, 2021. Federal efforts to address potential health risks of PFAS have also focused on the potential for these chemicals to be present in foods, which may occur through interactions with environmental contamination or food contact applications. The U.S. Food and Drug Administration (FDA) has been evaluating potential exposures to PFAS in dairy milk, dairy products, other foods, and food contact applications, using its authorities under the Federal Food, Drug, and Cosmetic Act (FFDCA). The FDA has not established regulatory standards for specific concentrations of PFAS in milk or other foods to date. Federal safety standards for milk have generally been established in the Pasteurized Milk Ordinance. The FDA has examined multiple ways in which PFAS may become present in foods: PFAS may be present in dairy milk and dairy products from livestock that consume contaminated water. PFAS similarly may be present in meat from livestock that consume contaminated water. PFAS may be present in food crops if grown in contaminated soils or irrigated with contaminated water sources. PFAS may be present in fish and shellfish from contaminated water bodies. Food contact applications (e.g., cookware, food packaging, and processing) that contain PFAS are another potential source of contamination in foods. These situations are not unique to PFAS. They may present potential pathways of human exposure to any contaminant present in the environment that may interact with foods or that may be present in food contact applications. The uptake of PFAS or other chemicals in food would depend on the properties of the specific chemical, the conditions in which interaction with food occurs, and potentially other factors. As with drinking water, potential risks from PFAS or other contaminants in food would depend on the toxicity of the specific chemical, the conditions of exposure, and the characteristics of the exposed individual. The FDA has been assessing PFAS in foods from specific sites where PFAS contamination has been detected, certain foods with an increased likelihood of PFAS contamination not associated with specific sites, and foods more generally. The FDA has also regulated the uses of PFAS in food contact applications, and has been reviewing these regulations as more information becomes available. The FDA has generally found no or relatively low concentrations of PFAS in the foods that it has sampled. The FDA concluded that the sampled foods with detectable concentrations of PFAS were low enough not to present a human health concern. Of dairy milk sampled, FDA found elevated levels of certain PFAS in milk produced from livestock that consumed water from a contaminated well at a dairy farm in New Mexico. The FDA reports that the contaminated milk was discarded and did not enter the food supply. The U.S. Department of Agriculture (USDA) provided financial assistance to this affected New Mexico dairy farm through the Dairy Indemnity Payment Program (DIPP) for removing the contaminated milk from the commercial market. The USDA Agricultural Research Service (ARS) has also been examining blood and tissue samples from the contaminated livestock. ARS reports that the USDA Food Safety and Inspection Service notified state animal health officials that cattle from the New Mexico dairy farm should not be shipped to a federally inspected establishment and are not eligible to be processed for human food. The FDA reports that it conducts a safety assessment when discovering PFAS in foods \"using the best available current science to evaluate whether the levels present a possible human health concern\" considering the quantity of food consumed and the toxicity of the contaminants. The FDA has used EPA's reference dose (RfD) of 0.00002 mg/kg/day for ingestion of PFOA and PFOS as a toxicity value for its food safety assessments. The EPA lifetime health advisories of 70 ppt for PFOA and PFOS in drinking water are derived from this RfD, but are not intended for addressing other exposure scenarios. EPA did not recommend 70 ppt as an acceptable concentration of PFOA or PFOS individually or combined in milk or other foods. EPA stated in November 2016 that these health advisories \"only apply to exposure scenarios involving drinking water\" and \"are not appropriate for use in identifying risk levels for ingestion of food sources, including: fish, meat produced from livestock that consumes contaminated water, or crops irrigated with contaminated water.\" In a November 2016 agency memorandum, EPA also clarified these health advisories in relation to food: In the development of the health advisories, EPA took into consideration sources of exposure to PFOA and PFOS other than drinking water, including: air, food, dust, and consumer products. Thus, to be protective of exposure, the calculation of the health advisory accounts for the relative exposure to PFOA and PFOS from a variety of sources, including food. Calculation of specific risk levels for foods would require development of entirely different exposure assumptions and is not a part of the HA [health advisory] derivation methodology. Multiple bills in the 116 th Congress would address agricultural uses of water contaminated with PFAS, including provisions in the FY2020 NDAA bills. Section 323 of House-passed H.R. 2500 and Section 1073 of Senate-passed S. 1790 would authorize the use of DOD Operation and Maintenance accounts to fund alternative water sources or treat water contaminated with PFOA or PFOS at sites where U.S. military activities caused contamination of a water source used to produce agricultural products for human consumption. These provisions in both bills would authorize such DOD actions in these situations where PFOA or PFOS is detected in a water source at a concentration that exceeds EPA's May 2016 lifetime health advisories for PFOA or PFOS, or is equal to or exceeds any future FDA regulatory standard for PFOA or PFOS in raw agricultural commodities and milk associated with a contaminated water source. Section 323 of House-passed H.R. 2500 also would authorize alternative water sources or treatment of contaminated water in situations where PFOA of PFOS in raw agricultural commodities and milk exceeds a promulgated enforceable state standard, whereas Section 1073 of Senate-passed S. 1790 does not include such state standards. Section 4 of H.R. 1567 and Section 4 of S. 675 similarly would authorize DOD to provide alternative water sources or treat agricultural water sources contaminated with PFOA or PFOS, but do not include exceedances of state standards for raw agricultural commodities or milk as a threshold for DOD action. Use of the EPA lifetime health advisories for PFOA or PFOS in drinking water as a threshold for taking actions to address contamination of agricultural water sources may also be an issue from a scientific standpoint, as discussed above. Other legislation would address PFAS in food contact applications. H.R. 2566 would require EPA to revise the \"Safer Choice Standard\" to provide for a Safer Choice label for pots, pans, and cooking utensils that do not contain PFAS. H.R. 2827 would amend Section 409(h) of FFDCA to deem any PFAS used as a food contact substance as unsafe, beginning on January 1, 2022. Section 330B of House-passed H.R. 2500 would prohibit the DOD Defense Logistics Agency, beginning October 1, 2020, from procuring meals ready-to-eat (MREs) for U.S. military use that are assembled or packaged with any food contact substances that contain PFAS. In the 115 th Congress, multiple bills of broader purposes containing provisions related to PFAS were enacted. Some of these provisions were included in annual defense authorization legislation to authorize the CDC, ATSDR, and DOD to conduct additional health effects studies, and require DOD to submit reports to Congress related to the use of AFFF containing PFAS. Other provisions related to PFAS were included in Federal Aviation Administration (FAA) reauthorization legislation to allow the use of fluorine-free firefighting foams for civilian airport certification, and in a \"farm bill\" to authorize technical assistance for rural water systems. Table 1 on the following page identifies each of these laws, the specific provisions related to PFAS, the date of enactment, and a summary of the purpose of each relevant provision. Various appropriations acts have also allocated funding for DOD response actions at current and former U.S. military installations, joint CDC/ATSDR health effects studies, and certain other federal actions not identified in the table below. Multiple bills introduced in the 116 th Congress would also require EPA to take actions related to PFAS under various existing laws or would create new authorities, but none of these bills have been enacted to date. More than 40 bills have been introduced in the 116 th Congress to address PFAS through a broad range of actions and federal agencies, but none of these bills have been enacted to date. Among these bills, the House- and Senate-passed NDAA bills ( S. 1790 and H.R. 2500 ) contain numerous PFAS provisions specific to DOD. For example, some provisions involve the use, phase out, and disposal of AFFF, while others address DOD remediation of PFAS-contaminated drinking water, groundwater, and surface water. Multiple bills would require EPA to take actions related to PFAS under various existing laws or would create new authorities. The apparent intent of many of these bills is to reduce exposures to PFAS in drinking water and prevent or remediate the contamination of environmental media from releases of these substances. Table 2 identifies each of these bills and their status, the specific provisions related to PFAS, and a summary of the purpose of each relevant provision. ", "summary": "Per- and polyfluoroalkyl substances (PFAS) are a group of fluorinated compounds that have been used for various purposes, including numerous commercial, industrial, and U.S. military applications. Some common uses include food packaging, nonstick coatings, and stain-resistance fabrics, and as an ingredient in fire suppressants in Aqueous Film Forming Foam (AFFF) used at U.S. military installations, at civilian airports, and by state and local fire departments, and elsewhere. PFAS persist in the environment and in humans, and studies on several PFAS indicate that exposures above certain levels are associated with various adverse health effects. Some PFASâprimarily perfluorooctanoic acid (PFOA) and perfluorooctane sulfonate (PFOS)âhave been detected in soil, surface water, groundwater, and drinking water in numerous locations. These detectionsâassociated with releases from federal and industrial facilities, civilian airports, and fire department facilitiesâhave prompted calls for increased federal action and authority to prevent and mitigate releases of and exposures to PFAS. Federal actions to address potential risks from PFAS have focused mostly on PFOS and PFOA because of past uses, prevalence in the environment, and availability of health effects research. These actions have been taken primarily under the authorities of the Toxic Substances Control Act (TSCA); the Safe Drinking Water Act (SDWA); and the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and related Department of Defense (DOD) response authorities. The U.S. Environmental Protection Agency (EPA) has used various authorities to address PFAS in commerce, public water supplies, and in the environment. Under TSCA, EPA has taken actions over recent decades to gather and assess existing information on the risks of PFOS, PFOA, and certain other PFAS. The agency has required manufacturers to develop new information to evaluate risks of various PFAS and has issued orders restricting the manufacture, processing, distribution, use, and/or disposal pending the development of new risk information. In addition, EPA worked with U.S. manufacturers as they voluntarily phased out production of PFOS, PFOA, and related substances. Under SDWA, EPA is evaluating PFOA and PFOS to determine whether national drinking water regulations are warranted. EPA plans to propose preliminary determinations in 2019. Among other actions, EPA has issued nonenforceable health advisory levels for PFOA and PFOS, intended to be protective over a lifetime of daily exposure, and has used SDWA emergency powers to issue enforcement orders to require responses to drinking water contamination by PFAS. DOD and other federal agencies have used CERCLA authorities to respond to releases of various PFAS at federal facilities, although such responses are not statutorily required. DOD administers the vast majority of federal facilities where PFAS has been detected. DOD has been responding to releases of PFOA and PFOS from the use of AFFF at active and decommissioned U.S. military installations under the Defense Environmental Restoration Program. DOD has been phasing out the use of AFFF that contains PFOA or PFOS to reduce the risks of future releases. Several federal agencies, including EPA and the Agency for Toxic Substances and Disease Registry, have been evaluating potential health effects that may be associated with exposures to various PFAS. The U.S. Food and Drug Administration and the U.S. Department of Agriculture are addressing risks of PFAS in dairy milk, other foods, and food contact applications. Various stakeholders have urged federal agencies to act more quickly and broadly to address potential PFAS risks and to provide assistance to address contamination. In the 116 th Congress, more than 40 bills, including House- and Senate-passed National Defense Authorization Act (NDAA) bills for FY2020 ( H.R. 2500 and S. 1790 ), would address PFAS through various federal agencies and authorities (see Table 2 ). Among other PFAS provisions, H.R. 2500 would establish liability for PFAS response costs though designation of PFAS as hazardous substances, both under CERCLA and through the Clean Water Act, while S. 1790 would expand DOD response requirements to include releases of any pollutant or contaminant. Unlike H.R. 2500 , S. 1790 would amend SDWA to direct EPA to issue drinking water standards for PFAS and for other purposes. Both bills would address PFAS under other statutes and new authorities. Several bills, including H.R. 2500 and S. 1790 , would variously authorize funds to be appropriated to assist communities in addressing contaminated water supplies.", "document_type": "crs"}
{"report": "In January 2019, the House agreed to H.Res. 6 , a resolution adopting the rules of the House of Representatives for the 116 th Congress. This report summarizes amendments to House rules affecting floor proceedings in the 116 th Congress (2019-2020), as provided for in H.Res. 6 . In the 116 th Congress, rules changes affected the consideration of legislation on the floor, voting in the House and the Committee of the Whole, and procedures related to Delegates and the Resident Commissioner of Puerto Rico. H.Res. 6 also clarified that religious headdress may be worn in the House chamber at any time, and it included a separate order specifying that, during the 116 th Congress, the House may not table motions to discharge certain measures related to the War Powers Resolution. H.Res. 6 amended Rule IX to establish that a resolution declaring a vacancy in the Office of the Speaker will not qualify as a question of the privileges of the House unless it is offered by direction of a party caucus or party conference. Prior to this rules change, such a resolution offered by any Member would have qualified as a question of privilege. Rule IX concerns resolutions \"raising a question of the privileges of the House.\" Resolutions raising a question of the privileges of the House are those that affect the \"rights of the House collectively, its safety, dignity, and the integrity of proceedings.\" If they are offered from the floor by the majority leader or the minority leader, they have precedence over all other questions except the motion to adjourn. When offered by other Members, they have the same precedence but only at a time scheduled by the Speaker within two legislative days after the proponent announces an intention to offer the resolution. The Consensus Calendar is an addition to House rules. It is a list of certain measures that have not been reported by their committees of primary jurisdiction yet have at least 290 cosponsors. The new clause 7 of Rule XV states that, except at the start and the end of a Congress, the House must consider a measure on the Consensus Calendar designated by the Speaker each week should one or more be listed and the House is in session. The Consensus Calendar might provide an opportunity to vote on unreported, broadly supported legislation that would not otherwise be chosen by the Speaker for consideration under suspension of the rules or made in order by a resolution from the Rules Committee. In order to be placed on the Consensus Calendar, a non-reported measure must first achieve the 290-cosponsor threshold (two-thirds of the House's full membership). At that time, the measure's sponsor may present a motion to the Clerk to place the measure on the calendar. This motion is submitted in writing directly to the Clerk, as opposed to being offered on the floor. The written motion is then retained in the Clerk's custody and printed in the Congre ssional Record . The rule directs the Clerk to maintain a list of Consensus Calendar motions and make the list publicly available on the Clerk's website. Following the presentation of the motion, a measure will be placed on the Consensus Calendar once it has maintained 290 cosponsors for a \"cumulative period of 25 legislative days,\" a period of time that is usually equal to 25 calendar days in which the House is in session. (If the primary committee reports the measure during this period, the motion to place the measure on the Consensus Calendar will be considered withdrawn. ) The measure will remain listed on the calendar even if it falls below the 290-cosponsor threshold until it is considered by the House or is reported by the primary committee of jurisdiction. Thus, a committee may report a bill to prevent it from being placed on the Consensus Calendar or to remove it from the Consensus Calendar. The new rule did not create any special procedures for the floor consideration of a measure on the Consensus Calendar. According to the Section-by-Section summary of the rules changes prepared by the Rules Committee, Consensus Calendar measures may be considered \"in any manner otherwise available under the rules,\" which would include suspension of the rules or under the terms of a special rule reported by the Committee on Rules. The Section-by-Section summary also explains that the Speaker will meet the requirement of the rule that a measure on the Consensus Calendar be designated for consideration by making an announcement immediately preceding the consideration of a measure on the floor. H.Res. 6 amended clause 2 of Rule XV to require the Speaker to schedule consideration of a motion to discharge that has met the signature and layover requirements of Rule XV within two legislative days after a discharge proponent announces his or her intention to offer the motion. In previous Congresses, motions to discharge, which had met the Rule XV requirements, could be offered on the floor on the second and fourth Mondays of the month if the House was in session on those days. The \"discharge rule\" enables an unreported measure that has not been scheduled by leadership for floor consideration to be raised on the floor, provided that a majority of the House membership has signed a discharge petition. Any Member may submit to the Clerk a motion to discharge a committee from the consideration of a public measure that the committee has had before it for 30 legislative days or more. A Member may also submit a motion to discharge the Committee on Rules from the consideration of a special order of business (special rule) it has had before it for seven legislative days or more if the measure the rule makes in order has been in committee for at least 30 legislative days or has been reported. Once a majority of the House membership (218 Members) signs the associated discharge petition, the motion is placed on the Calendar of Motions to Discharge Committees. After the motion has been on the calendar for at least seven legislative days, a Member who has signed the discharge petition may announce to the House an intention to offer the motion. As amended, clause 2(c)(1) of Rule XVI now requires the Speaker to schedule motions to discharge the day of the announcement or on one of the next two legislative days. Prior to the change, even after meeting all the other requirements, motions to discharge could be made only on the second and fourth Mondays of a month. If the House was not in session on those days, considerable time could pass between when the other requirements of the rule were met and when proponents could force consideration of their motion. The Private Calendar lists private legislation (measures providing benefits to one or more specified individuals or entities) that has been reported out of committee. House Rule XV provides a special procedure for the consideration of private legislation on the calendar, but in recent Congresses, few measures have been called from the Private Calendar. H.Res. 6 . amended clause 5 of Rule XV to allow the Speaker to direct the Clerk to call a private bill on any day the House is in session if the measure has been on the Private Calendar for seven days. Prior to the 116 th Congress, the call of the Private Calendar was limited to the first and third Tuesdays of the month. If measures are listed on the calendar, the Speaker or designee is to direct the Clerk to call them on the first Tuesday of the month in the order they are listed. Under the amended rule, the Speaker may also direct the Clerk to call a specific measure on other days after the requisite seven-day period has passed. In the latter case, the Speaker must announce to the House an intention to call a private measure. The call, if it is to occur, must occur on the second legislative day after the legislative day the Speaker makes the announcement. Official Objectors are appointed by each party to examine measures on the Private Calendar. If, at the time a bill is called, two Objectors or two other Members object to the measure, the measure is recommitted to the committee that reported it. According to the Rules Committee's summary of H.Res. 6 , the specific requirement for two days' notice ensures that the \"Official Objectors are able to be on the Floor at the appropriate day and time.\" House rules generally afford a time period for Members to review legislative text before considering measures in the chamber. H.Res. 6 . amended Rules XXI, XXII, and XXII to establish, for certain legislative text and committee reports, a 72-hour review period, as opposed to the previous review period, which spanned until the \"third calendar day\" on which the measures' text or committee reports had been available. The rules amendments actually made two changes: they designated the 72-hour period and, for reported measures, enabled the layover period to begin when the \"proposed text of each report\" is made available, in contrast to when the official committee report is available. Prior to the changes to the rules, legislative text could meet the three-day layover requirement even if it was not always available for a 72-hour period. For instance, if an unreported bill's text was posted at 9:00 p.m. on a Monday, the bill might have been considered on Wednesday morning, less than 40 hours later. The new 72-hour availability requirement, however, provides an exact time period for layover review before measures may be considered in the House. The requirement applies to proposed text of committee reports and the text of unreported bills and joint resolutions, conference reports, and amendments reported in disagreement from conference committees. The review period begins at the time the text is posted electronically or otherwise made available. Thus, for committee reports, the clock can start with the posting of the report's proposed content, not when the committee has filed and delivered the report to the Clerk, which may occur at a later time. As stated in clause 4 of Rule XIII, the availability requirement excludes supplemental, minority, additional, or dissenting views that may be inserted in a committee report at the request of a committee member. Members are guaranteed two calendar days to submit these optional sections if notice of intent to file supplemental views was given at the time the committee approved the measure or matter. H.Res. 6 amended clause 8 of Rule XX to enable the Speaker to postpone a vote on any amendment considered in the House rather than restricting this action to amendments reported from the Committee of the Whole. Votes on the previous question to end debate on any amendment can now be postponed as well. Prior to the rules change, the rule referred only to amendments reported from the Committee of the Whole. Since 1979, House rules have allowed the Speaker to postpone and cluster votes by electronic device. In addition to amendments, several types of measuresâincluding bills, resolutions, and conference reportsâmay be subject to a postponed vote. The Speaker's ability to postpone, cluster, and announce upcoming votes provides some degree of certainty to the voting schedule. Under clause 2 of Rule XX, the time for electronic voting is no less than 15 minutes in the House. However, clauses 8 and 9 provide the Speaker with the discretion to reduce to five minutes the voting period in the House if the vote occurs following another electronic vote or following a report from the Committee of the Whole. In previous Congresses, clause 9 stated that the reduced-time option could be exercised if \"notice\" was given of possible five-minute voting. According to the amended clause 9(a), the Speaker may reduce the voting period if \"in the discretion of the Speaker Members would be afforded an adequate opportunity to vote,\" while clause 9(b) states, \"To the maximum extent practicable, notice of possible five-minute voting for a given series of votes shall be issued prior to the first electronic vote in the series.\" The 116 th rules package amended clause 6 of Rule XVIII to provide the chair of the Committee of the Whole with more discretion to reduce the time for electronic voting. Under clause 2 of Rule XX, the time for electronic voting is no less than 15 minutes in the Committee of the Whole. However, clause 6 of Rule XVIII allows the chair to reduce the voting period to not less than two minutes if the vote occurs in a series. In previous Congresses, the two-minute vote on any proposed question was to occur immediately following the initial 15-minute vote or after the Committee of the Whole resumes. There could be no intervening business or debate. H.Res. 6 removed references to intervening business or debate. Instead, clause 6 now authorizes a two-minute voting period \"if in the discretion of the chair Members, Delegates, and the Resident Commissioner would be afforded an adequate opportunity to vote.\" H.Res. 6 expanded the number of position categories allowed entrance to the Chamber when the House is in session. Under the amended clause 2 of Rule IV, the list of individuals eligible for floor privileges now explicitly includes Delegates-elect, the Resident Commissioner-elect, and contestants in elections for Delegate and the Resident Commissioner \"during the pendency of their cases on the floor.\" Clause 2 also states that, in addition to governors of the states, governors of the territories shall \"be admitted to the Hall of the House or rooms leading thereto.\" During any recess or adjournment of not more than three days, the Speaker, in consultation with the minority leader, may change the time or the location of the next meeting of Congress if circumstances warrant it. The rule granting the Speaker this authority contains notification requirements. H.Res. 6 added, \"Delegates and the Resident Commissioner\" to the requirements in clause 12 of Rule 1 that \"Members\" be notified of a change in the time of the next meeting. H.Res. 6 reinstated from previous Congresses the voting rights of the Delegates and the Resident Commissioner in the Committee of the Whole. It also re-instated the rules provision that prevents these votes from influencing the final outcome of questions initially decided in the committee. In the 116 th Congress, recorded votes in the Committee of the Whole, which are decided within the margin of the votes cast by the Delegates and the Resident Commissioner, are to be re-conducted in the House, a forum in which Delegates and the Resident Commissioner do not have voting rights. As amended, clause 3(a) of Rule III states that in the Committee of the Whole, the Delegates and the Resident Commissioner \"shall possess the same powers and privileges as Members of the House.\" The term powers and privileges includes the ability to vote. In the 103 rd Congress (1993-1994), Delegates and the Resident Commissioner first received the power to vote in the Committee of the Whole. Since then, their voting status has changed with each change in the majority party. Accordingly, they voted during the 103 rd , 110 th (2007-2008), and 111 th (2009-2010) Congresses, when the Democrats held the majority in the House, but not the 104 th -109 th Congresses (1995-2006) and the 112 th -115 th Congresses (2011-2018), when the Republicans held the majority. During the Congresses in which the Delegates and the Resident Commissioner voted in the Committee of the Whole, the House adopted the associated marginal vote provision under what is now clause 6 of Rule XVIII. That is, if a question is decided in the Committee of the Whole within the margin of votes cast by the Delegates and the Resident Committee, the committee shall rise. The Speaker shall then put the question to the House. After the House votes, the Committee of the Whole shall resume its sitting. The 116 th Congress rules package enabled Delegates and the Resident Commissioner to be counted when ascertaining the presence of a quorum, as well as toward the requisite number to request a recorded vote, in the Committee of the Whole. In addition, the chair was to consider the Delegates' and Resident Commissioner's opportunity to vote before reducing the minimum time for electronic voting. H.Res. 6 amended clause 6 of Rule XVIII to add the phrase Delegates and the Resident Commissioner after the word Members in three places. Consequently, a quorum in the committee became 100 Members, Delegates, and the Resident Commissioner. A request for a recorded vote needs the support of at least 25 Members, Delegates, and the Resident Commissioner. And the chair may reduce the time to vote on any postponed question \"if in the discretion of the Chair Members, Delegates, and the Resident Commissioner would be afforded an adequate opportunity to vote.\" H.Res. 6 amended clause 5 of Rule XVII to clarify that Members may wear religious headdress in the House chamber. The amendment added the phrase non-religious headdress to clause 5 in order to specify that the hat prohibition did not include religious headwear. Clause 5 now states, \"During the session of the House, a Member, Delegate, or Resident Commissioner may not wear non-religious headdress or a hat.\" The 116 th Congress rules package included a section on \"separate orders,\" which are provisions that affect House procedures but are not codified in the standing rules of the House. These separate orders have the same force and effect as House rules. Under one such separate order, H.Res. 6 clarifies that the House may not table a motion to discharge a measure introduced pursuant to Section 6 or Section 7 of the War Powers Resolution ( P.L. 93-148 ). The War Powers Resolution is an act that governs House consideration of joint resolutions, bills, and concurrent resolutions that are introduced after the U.S. Armed Forces engages \"in hostilities\" without a prior declaration of war. Measures introduced in compliance with the resolution are referred to the House Foreign Affairs Committee. The committee is to report such legislation within a time frame delineated in the resolution. The War Powers Resolution does not provide an automatic discharge process if the committee does not report. Should the measure not be reported, a Member may offer a motion to discharge the committee from further consideration in order to allow it to reach the floor. According to the Rules Committee summary for H.Res. 6 , previous House action on similar procedures \"made it unclear\" if a Member could then offer a motion to table the motion to discharge. The separate order is intended \"to provide certainty for all Members, Delegates, and the Resident Commissioner on this procedure.\"", "summary": "As agreed to in the House, H.Res. 6 , a resolution adopting the rules of the House of Representatives, provided amendments to the rules, as well as separate orders, that affect floor procedure in the 116 th Congress (2019-2010). These amendments changed procedures in the full House and in the Committee of the Whole. The rules changes altered when a resolution that would cause a vacancy in the Office of Speaker would qualify as a question of privilege. Under a new provision to clause 2 of Rule IX, resolutions declaring a vacancy of the chair are not privileged unless they are offered by direction of a party caucus or conference. H.Re s. 6 established a Consensus Calendar for the consideration of certain broadly supported measures that have not been reported by their committees of primary jurisdiction. One rules change allows the Speaker to schedule consideration of legislation that has been on the Private Calendar for seven days. Another change requires the Speaker to schedule the consideration of a motion to discharge that has garnered the necessary 218 signatures to be placed on the Discharge Calendar (and has been on that calendar for at least seven legislative days). Prior to the rules change, measures on the Private Calendar and motions on the Discharge Calendar were to be considered on specified days of the month. The 116 th rules package mandates that certain legislative texts must be available to the public for 72 hours before legislation can be raised on the House floor. The earlier rules provided a three-day layover, not including weekends and holidays, which could provide a review period of fewer or more than 72 hours. Rules changes allow the Speaker to postpone votes on amendment votes that occur in the House proper and no longer require a notice that a voting period on the amendment will be reduced to five minutes. In the Committee of the Whole, the chair is afforded greater flexibility to reduce voting periods to two minutes on record votes. Several rules changes concerned the five Delegates and the Resident Commissioner of Puerto Rico. Most significantly, H.Res. 6 enables these individuals to vote in the Committee of the Whole. The 116 th rules reinstated the policy from previous Congresses that allowed for voting in the Committee of the Whole but also mandated a revote in the House proper if the initial vote was decided within the margin of votes cast by the Delegates and the Resident Commissioner. The 116 th rules package clarified that the provision in Rule XVII that bans hats in the House chamber allows Members to wear \"religious headdress.\" In the 116 th Congress, Members can wear religious head coverings in the chamber at any time. Finally, H.Res. 6 included a separate order governing action in the 116 th Congress that clarified procedures concerning measures introduced pursuant to the War Powers Resolution. The separate order stated that motions to discharge such measures from committee would not be subject to a motion to table.", "document_type": "crs"}
{"report": "The government's purchase card program has its origins in Executive Order (E.O.) 12352, issued by President Ronald Reagan in 1982. E.O. 12352 directed agencies to develop programs that simplified procedures and reduced the administrative costs of procurement, particularly with regard to \"small\" purchases ($25,000 or less). Several agencies subsequently participated in a pilot program that evaluated the use of a commercial credit card, called a purchase card, as an acquisition tool. At the time, even a routine order for widely available items, such as office supplies, typically required agency program staff to submit a written procurement request to a contracting officer, who reviewed it, obtained the necessary signatures, made the actual purchase, and processed the associated paperwork. To critics, this process was inefficient, especially for small purchases. Not only was it time-consuming for both program and procurement personnel, but it also prevented program offices from quickly filling immediate needs. Under the pilot program, nonprocurement staff used purchase cards to conduct small-dollar transactions directly with local suppliers, thus bypassing procurement officers entirely. A report on the pilot program concluded that purchase cards could reduce administrative costs and improve delivery time, and in 1989 the Office of Management and Budget (OMB) tasked the General Services Administration (GSA) with making purchase cards available government-wide. Participation in GSA's purchase card program was not mandatory, and card use did not initially grow as rapidly as some had expected. In 1993, however, a report issued by the National Performance Review (NPR) sparked a number of legislative and regulatory reforms intended to increase purchase card use. The NPR was a Clinton Administration initiative that sought to \"reinvent\" the federal government by making government operations both less expensive and more efficient. One of the NPR's objectives was to identify opportunities to streamline a number of government-wide processes, including procurement. Drawing on input from experts in the public and private sectors, the NPR's initial report recommended expanding the use of purchase cards across the government, a step it said would \"lower costs and reduce bureaucracy in small purchases.\" In a separate report that focused solely on procurement, the NPR estimated that if half of all small acquisitions were made using purchase cards, the government would realize $180 million in savings annually. The report further recommended amending the Federal Acquisition Regulation (FAR)âthe government's primary source of procurement guidanceâto promote the use of purchase cards for small purchases. Building on the NPR's recommendations, Congress passed the Federal Acquisition Streamlining Act (FASA; P.L. 103-355 ) in 1994. FASA introduced several reforms that increased the use of purchase cards. Among these, Title IV of FASA established a simplified acquisition threshold (SAT) of $100,000 (increased to $250,000 in 2017). Purchases at or below the threshold were exempted from the provisions of a number of procurement laws. This reform obviated the need for procurement officials to make small purchases. To further streamline procedures for the smallest acquisitions, Title IV also established a \"micro-purchase\" threshold of $2,500 (which was increased to $3,000 in 2006, and again to $10,000 in 2017). FASA further exempted micro-purchases from sections of the Buy American Act and the Small Business Act, and they could be made without obtaining a competitive bid, if the cost was deemed reasonable by the cardholder. At the same time, the Clinton Administration took steps to increase the use of purchase cards. Citing the need to make agency procurement procedures \"more consistent with recommendations of the National Performance Review,\" President Clinton issued Executive Order 12931 on October 13, 1994. E.O. 12931 directed agency heads to (1) expand purchase card use; and (2) delegate the micro-purchasing authority provided in FASA to program offices, which would enable them to make purchases whose value did not exceed the micro-purchase threshold. E.O. 12931 also directed agency heads to streamline procurement policies and practices that were not mandated by statute, and to ensure that their agencies were maximizing their use of the new simplified acquisition procedures. In addition, the FAR was amended in 1994 to designate the purchase card as the \"preferred method\" for making micro-purchases. Card use increased sharply as agencies implemented these reforms. The dollar value of goods and services acquired with purchase cards increased from $527.0 million in FY1993 to $19.5 billion in FY2011. During that same time span, the number of cardholders nearly tripled to 278,000, and the number of purchase card transactions increased from 1.5 million to just under 22.8 million in FY2011. The flexibility of the purchase card may have contributed to its growth: it could be used for in-store purchases, which allowed the cardholder to take immediate possession of needed goods, or it could be used to place orders by telephone or over the internet and have goods delivered. According to GSA, the use of purchase cards now saves the government $1.7 billion a year in administrative costs. The federal purchase card program is implemented by individual agencies, with the involvement of GSA and OMB. In broad terms, agencies establish and maintain their own programs, but they select pu rchase card services from contracts that GSA negotiates with selected banks, and their programs must conform to the government-wide guidance issued by OMB. Each agency is responsible for establishing its own purchase card program. The agency, within the framework of OMB guidance, establishes internal rules and regulations for purchase card use and management, decides which of its employees are to receive purchase cards, and handles billing and payment issues for agency purchase card accounts. Two levels of supervision generally exist within an agency's purchase card program. Individual cardholders are assigned to an Approving Official (AO). The AO is considered the \"first line of defense\" against card misuse, and agency policies often require the AO to ensure that all purchases comply with statutes, regulations, and agency policies. To that end, the AO is responsible for authorizing cardholder purchases, either by approving purchases before they are made or by verifying their legitimacy through reviews of cardholder statements and supporting documentation, such as receipts. The AO may also be required to ensure that statements are reconciled and submitted to the billing office in a timely manner. Each agency also appoints an Agency Program Coordinator (APC) to serve as the agency's liaison to the bank and to GSA. At some agencies, each major component has an APC, one of whom is chosen to serve as the agency's liaison. The APCs are also usually responsible for agency-wide activities, such as developing internal program guidelines and procedures, sampling cardholder transactions to identify fraudulent or abusive purchases, setting up and deactivating accounts, and ensuring that officials and cardholders receive proper training. GSA's primary responsibility is to award and administer contracts with card vendors on behalf of the government. In November 1998, agency purchase card programs began operating under GSA's SmartPay initiative. SmartPay permitted agencies to select a range of credit card products from five banks with which GSA had negotiated contracts. The SmartPay contracts established prices, terms, and conditions for credit card products and services from these five banks. Purchase cards were established as centrally billed accounts under the contracts, which meant that agencies, and not individual cardholders, were billed for purchases. The contracts required agencies to make payment in full at the end of each billing cycle. New purchase card contractsâknown collectively as SmartPay2âtook effect government-wide in November 2008. In November 2018, all federal agencies began operating under SmartPay3 contracts. OMB issues charge card management guidance that all agencies must follow. This guidance, located in Appendix B of OMB Circular A-123, establishes agencies' responsibilities for implementing their purchase, travel, and fleet card programs. Chapter 4 of Appendix B identifies the responsibilities of charge card managers in developing and implementing risk management controls, policies, and practices (often referred to collectively as \"internal controls\") that mitigate the potential for charge card misuse. Agency charge card managers must ensure that cardholder statements, supporting documentation, and other data are reviewed to detect delinquency and misuse; key duties are separated, such as making purchases, authorizing purchases, and reviewing and auditing purchase documentation; records are maintained for training, appointment of cardholders and authorizing officials, cardholder purchase limits, and related information; disciplinary actions are initiated when cardholders or other program participants misuse their cards; appropriate training is provided for cardholders, approving officials, and other relevant staff; employees are asked about questionable or suspicious transactions; and charge card statement reconciliation occurs in a timely manner. Chapter 4 also identifies administrative and disciplinary actions that may be imposed for charge card misuse, such as deactivation of employee accounts, and it requires managers to refer suspected cases of fraud to the agency's Office of Inspector General or the Department of Justice. Circular A-123 provides OMB with oversight tools by requiring agencies to submit to OMB each year a charge card management plan that details their efforts to implement and maintain effective internal controls and minimize the risk of card misuse and payment delinquency. It also requires agencies to report the number of AOs it has appointed, the average number of monthly purchase card transactions each AO reviews, the number of reported cases of misuse, and the number of disciplinary actions taken in response to misuse. Audits of agency purchase card programs conducted by the Government Accountability Office (GAO) and agency inspectors general (IGs) through FY2011 attracted congressional attention with their revelations of abusive purchases made by government employees. Among the many cases of abuse cited by auditors were a Department of Agriculture (USDA) employee who, over a period of six years, used her purchase card to funnel $642,000 to her boyfriend; a Forest Service employee who charged $31,342 to his purchase card for personal items, including Sony PlayStations, cameras, and jewelry; and a Coast Guard cardholder who used his purchase card to buy a beer brewing kitâand then brewed alcohol while on duty. Congress held several hearings to address purchase card misuse and the underlying internal control weaknesses that auditors said allowed it to occur. The following section examines the weaknesses identified in audit reports published between 2002 and 2011, which highlight the issues that led to the passage of the Charge Card Act. One of the primary safeguards against improper use of government purchase cards is the review and approval of cardholder transactions by someone other than the cardholder. As noted, purchase card AOs are usually responsible for reviewing the cardholder's monthly statement. Given that the AO is often the only person other than the cardholder to assess the validity of a purchase before payment is made to the purchase card vendor, the review and approval process is considered one of the most critical components of an agency's purchase card control environment. Steven Kutz, GAO's Managing Director of Forensic Audits and Special Investigations, stated in testimony before the Senate, Basic fraud prevention concepts and our previous audits of purchase card programs have shown that opportunities for fraud and abuse arise if cardholders know that their purchases are not being properly reviewed. Despite the importance of the AO's role in preventing and detecting improper purchases, some agencies failed to ensure that cardholder statements were carefully reviewed prior to their approval. At the Department of Education, auditors estimated that 37% of monthly cardholder statements they reviewed had not been approved by the AO. GAO also estimated that nearly one of every six purchase card transactions government-wide had not been properly authorized. Even when AOs did conduct reviews, they sometimes failed to meet government standards. Agencies are required by OMB to ensure that cardholder statements are compared with supporting documentation, such as invoices and receipts, as part of the review process. This is necessary because purchase card statements are rarely itemized; they usually provide only the store or contractor name and the amount charged. For AOs, receipts and invoices are the principal means of verifying what items were purchased and determining whether those items were for legitimate program purposes. According to GAO, many agencies have not ensured that supporting documentation is available and examined as part of the review and approval process. An audit of the Department of Housing and Urban Development's (HUD's) purchase card program found that the agency did not have adequate documentation for 47% of transactions auditors deemed questionableâpurchases from merchants that are not normally expected to do business with HUDâwhich meant auditors \"were unable to determine what was purchased, for whom, and why.\" Similarly, an audit of the Veterans Health Administration's (VHA's) purchase card program estimated that $313 million of its transactions lacked key supporting documentation. One consequence of these weaknesses was that fraudulent and abusive transactions slipped through the review process unnoticed. For instance, GAO found that AOs at agencies across the government approved cardholder statements that included questionable transactions, such as purchases of jewelry, home furnishings, cruise tickets, electronics, and other consumer goods. At the Forest Service, one employee used her purchase card over a period of years to accumulate more than $31,000 in jewelry and electronics. Similarly, HUD cardholders spent $27,000 at department stores like Macy's and J.C. Penney in a single year. In one egregious case, a Federal Aviation Authority (FAA) employee had his statement approved even though it showed he violated agency policy by charging cash advances to his purchase cardâwhile at a casino. The lack of adequate oversight is also evident where AOs have approved duplicate transactionsâvendors charging the government twice for the same goods or servicesâand purchases made by someone other than the cardholder. One audit identified an estimated $177,187 in duplicate charges at one agency. An audit at FAA discovered that a cardholder had allowed unauthorized individuals to charge over $160,000 to her purchase card account. When an AO identifies unauthorized and duplicate transactions, the agency should use the process described in the SmartPay master contract to dispute the charges. When AOs fail to identify and dispute fraudulent charges, the government often pays them in full or fails to obtain a refund from the purchase card vendor. GAO further found that many agencies failed to monitor and evaluate the effectiveness of their purchase card controls, a responsibility that is often assigned to the APC. Monitoring and evaluation may include sampling purchase card transactions for potentially improper purchases, ensuring purchase card policies are being properly implemented across the agency or component, and assessing program results. These duties are often unfulfilled. At FAA, for example, an audit found that APCs \"generally were not\" utilizing available reports to detect misuse and fraud, nor was the headquarters APC taking steps to assess the overall program. Similarly, an audit of the Forest Service purchase card program found that the agency's APCs failed to review sampled transactions for erroneous or abusive purchases, as required by USDA regulations. Agencies are required to ensure that key procurement functions are handled by different individuals. When having goods shipped, for example, the same person should not approve and place the order, or place the order and receive the goods. At many agencies, however, the cardholder may perform two functions that should be separated, which increases the possibility that items may be purchased for personal use, lost, or stolen. In March 2008, GAO estimated that agencies were unable to document separation of duties for one of every three purchase card transactions. Three Navy cardholders ordered and received $500,000 of goods for themselves with their purchase cards before getting caught. In this way, inadequate separation of duties may result in millions of dollars of items that cannot be located. Items that are easily converted to personal useâcommonly referred to as \"pilferable property\"âare particularly vulnerable to loss and theft. The Department of Education, for example, could not account for 241 personal computers bought with purchase cards at a cost of $261,500. An audit of the Federal Emergency Management Agency's (FEMA's) spending on items related to hurricane recovery found that $170,000 worth of electronics equipment acquired with purchase cards had not been recorded in FEMA's property records and could not be found. Given the complexities of federal procurement policies and procedures, training on the proper use and management of purchase cards is considered an important component of an agency's internal control environment. Through training, cardholders, approving officials, and program managers learn their roles in ensuring compliance with applicable regulations and statutes, and in reducing the risk of improper card use. To that end, OMB requires all agencies to train everyone who participates in a purchase card program. Cardholder training covers federal procurement laws and regulations, agency policies, and proper card use. Approving officials are required to receive the same training as cardholders, in addition to training in their duties as AOs. Program managers are required to be trained in cardholder and AO responsibilities, as well as management, control, and oversight tools and techniques. In addition, all purchase card program participants are supposed to complete their initial training prior to appointment (e.g., becoming a cardholder, or being designated as an AO or program manager) and receive refresher training at least every three years. Agency audits published between 2002 and 2011 revealed a number of agencies had not fully implemented OMB's training requirements. A report by the inspector general at the Department of the Interior (DOI), for example, noted that DOI had not provided any training to its AOs, and concluded that many of those officials were not performing adequate reviews. The AOs themselves reportedly said that they did not know how to conduct a proper review of purchase card transactions, or how and why to review supporting documentationâboth subjects that are normally included in AO training. Similarly, an audit at FAA concluded that the agency's failure to provide refresher training for cardholders and AOs may have contributed to violations of statutory sourcing requirements. The failure to comply with sourcing statutes, which require agencies to purchase certain goods and services from specified vendor categories, may undermine congressional procurement objectives. The Javits-Wagner-O'Day Act (JWOD), for example, requires the government to buy office supplies and services from nonprofits that employ blind and disabled Americans. Cardholder failure to comply with the provisions of JWOD and other sourcing statutes was widespread enough that GAO estimated that tens of millions of dollars of purchase card transactions may have been conducted with vendors other than the ones Congress intended. The number of cardholders grew from under 100,000 in FY1993 to 680,000 in FY2000. After auditors expressed concerns that the government had issued too many credit cards and provided excessive credit limitsâfactors that raised the risk of card misuseâOMB issued a memorandum in April 2002 that required agencies to examine the number of purchase cards they issued and to consider deactivating all cards that were not a \"demonstrated necessity.\" That same year, provisions in the Bob Stump National Defense Authorization Act for FY2003 ( P.L. 107-314 ) required the Department of Defense (DOD) to establish policies limiting both the number of purchase cards it issued and the credit available to cardholders. These reforms contributed to a net decrease of 392,000 government purchase cards between FY2000 and FY2011. Despite this decrease in the total number of purchase card users, audits through FY2011 indicated that a number of agencies, including some with relatively large purchase card programs, did not establish appropriate controls over card issuance and credit limits. A 2006 GAO report on purchase cards at the Department of Homeland Security (DHS), for example, identified 2,468 cardholdersâabout 20% of all DHS cardholdersâwho had not made any purchases in over a year. Similarly, a congressionally directed audit of the Veterans Health Administration's (VHA's) $1.4 billion purchase card program found that VHA had issued cards with credit limits up to 11 times greater than the cardholders' historical spending levels, thereby exposing its program to unnecessary risk. In response to these findingsâand evidence of similar abuse in agency travel card programsâCongress passed the Government Charge Card Abuse Prevention Act of 2012 (Charge Card Act; P.L. 112-194 ). The Charge Card Act established new internal control and reporting requirements for both purchase cards (Â§2), and travel cards (Â§3 and Â§4). The following paragraphs examine the Charge Card Act's requirements for purchase cards. Given that the Charge Card Act directly amends the U.S. Code, the requirements are identified by their location in code rather than in the act itself. Statutory purchase card requirements for civilian agencies are located in a different title of the U.S. Code than those for DOD. The Charge Card Act therefore amended Title 41 to codify the civilian agency provisions and Title 10 to codify DOD's provisions. In addition, the Charge Card Act establishes similar, but not identical, requirements for civilian agencies and DOD. Section (2)(a)(1) of the Charge Card Act added civilian agency purchase card requirements to Chapter 19, Title 41, of the U.S. Code. The new requirements are found in 41 U.S.C. Â§1909(a) through (e). 41 U.S.C. Â§1909(a), Required Safeguards and Internal Controls, requires executive agencies to ensure 1. There is a record of each cardholder that includes the applicable limitations on single transaction and total transactions. 2. Each cardholder is assigned an AO other than the cardholder. 3. Each cardholder and AO are responsible for (a) reconciling the charges appearing on the cardholder's statements with receipts and other supporting documentation; and (b) forwarding a summary report to the certifying official. 4. Any disputed charges or discrepancies between the cardholder's receipts and bank statements are resolved in accordance with the terms of GSA's purchase card contract with the card issuer. 5. Payments on purchase card accounts are made by the prescribed deadlines to avoid interest penalties. 6. Rebates and refunds are reviewed for accuracy and recorded as receipts. 7. Records of each transaction are retained in accordance with record disposition policies. 8. Periodic reviews are performed to determine whether each cardholder needs a purchase card. 9. Appropriate training is provided to each purchase card holder and official responsible for overseeing purchase cards in the agency. 10. The agency has specific policies that establish the number of purchase cards issued by various component organizations and the authorized credit limits for those cards. 11. The agency uses effective systems, techniques, and technologies to identify illegal, improper, or erroneous purchases. 12. The agency invalidates the purchase card of each employee who (a) ceases to be employed by the agency, immediately upon termination, or (b) transfers to another unit of the agency, immediately upon transfer, unless both units are covered by the same purchase card authority. 13. The agency takes steps to recover the cost of any illegal, improper, or erroneous purchases made with a purchase card, including through salary offsets. 41 U.S.C. Â§1909(b), Guidance, requires the OMB Director to provide guidance on the implementation of the requirements of subsection (a). 41 U.S.C. Â§1909(c), Penalties and Violations, requires agencies to establish adverse personnel actions or other punishment for cases where a cardholder violates agency purchase card policies or otherwise makes illegal, improper, or erroneous purchases with a card. The prescribed penalties must include dismissal of the employee, as appropriate. In addition, subsection (c) requires the head of each agency with more than $10 million in annual purchase card expenditures to issue a semiannual report on purchase card violations by its employees. The report must be issued jointly with the agency IG and submitted to the OMB Director. 41 U.S.C. Â§1909(d), Risk Assessment and Audits, requires the IG of each agency to 1. Conduct periodic assessments of agency purchase card programs to identify and analyze the risks of misuse and to use these assessments to develop an audit plan. 2. Audit purchase card transactions in order to identify potential misuse, patterns of misuse, and categories of purchases that could be made with another payment method in order to obtain lower prices. 3. Report the audit results to the agency head, along with recommendations for addressing any findings. 4. Report to the OMB Director on the implementation of the IG's recommendations. The OMB Director must compile the IG reports and transmit them to Congress and the Comptroller General. 41 U.S.C. Â§1909(e), Relationship to Department of Defense Purchase Card Regulations, clarifies that subsections (a) through (d) do not apply to DOD. Section 2(a)(2) of the Charge Card Act amended 10 U.S.C. Â§2784(b) to codify new purchase card management requirements for DOD. Only the Charge Card Act requirements are listed below. 10 U.S.C. Â§2784(b)(2) requires DOD to ensure that each cardholder is assigned an approving official other than the cardholder. 10 U.S.C. Â§2784(b)(11) requires DOD to use effective systems, techniques, and technologies to prevent or identify potential fraudulent transaction. 10 U.S.C. Â§2784(b)(12) requires DOD to invalidate the purchase card of each employee who (a) ceases to be employed by DOD, immediately upon termination, (b) transfers to another unit of DOD, immediately upon transfer, unless both units are covered by the same purchase card authority, or (c) is separated or released from active duty or full-time National Guard duty. 10 U.S.C. Â§2784(b)(13) requires DOD to take steps to recover the cost of any illegal, improper, or erroneous purchases made with a purchase card, including through salary offsets. 10 U.S.C. Â§2784(b)(15) requires DOD to conduct periodic assessments of agency purchase card programs in order identify and analyze the risks of misuse and to report the results to the OMB Director and Congress. In an effort to assess compliance with the Charge Card Act and other purchase card requirements across the government, GAO reviewed agency policies and data from FY2014 and released its analysis in 2017. More recently, the Council of the Inspectors General on Integrity and Efficiency (CIGIE) launched a coordinated audit of FY2017 purchase card data. The IGs at 20 agencies sampled a total of 1,255 \"high-risk\" transactionsâpurchases that potentially violated program policies or proceduresâfrom and shared their findings with CIGIE. By July 2018, the IGs had released their own reports and CIGIE had issued a summary and analysis of the findings. According to the CIGIE analysis, while there were few examples of fraud at the 20 agencies that participated in the project, nearly 51% (501) of the purchases sampled failed to comply with at least one purchase card policy. Patterns of noncompliance, with examples and analysis from the GAO report, individual agency audits, and the CIGIE report are discussed below. Federal statutes and regulations, including agency-specific regulations, may prohibit the purchase of supplies and services from certain merchants or for certain items. USDA's purchase card guidance, for example, prohibits employees from using their purchase cards to obtain cash advances, bail bonds, personal items, or escort services. Agencies are often able to block merchants of certain categoriesâsuch as cruise lines or casinosâthrough the card-issuing bank. Some merchants, while not prohibited, are considered \"questionable\" because the items or services they offer may be allowed by agency policies, only if certain conditions are met. A purchase card may be used at a catering company, for example, but only under certain circumstances. Exceptions may be permitted for transactions with prohibited or questionable merchants under limited circumstances, but they must be justified by the cardholder and approved by the AO. The CIGIE analysis found that nearly 8% of high-risk purchases violated agency policies regarding prohibited or questionable merchants. Of those, nearly one-half lacked a written justification and/or authorization from the AO. An IG at one agency found an employee had used his purchase card to lease multiple vehicles at a cost of more than $5,700, and had provided no documentation to support the need and appropriateness of the transaction. In addition, agencies often failed to block merchant categories; one agency permitted transactions at seven types of prohibited businesses. Even when agencies attempted to block certain merchant categories, the technology did not work consistently. The EPA IG found 20 purchase card transactions at merchants who had been blocked by the agencyâthe cards had not been declined at the point of sale. Purchase card holders are required to use mandatory sources to obtain needed supplies, when possible. Cardholders may use other sources only after confirming that the supplies or services they need are not available from a mandatory source. Auditors found, however, that in nearly one out of every five transactions (19.9%), cardholders purchased supplies and services from nonmandatory sources when they could have acquired them from mandatory sources. As a consequence, agencies not only failed to support certain categories of merchants that are mandatory sources, such as people who are blind or severely disabled, but they also may not obtain the best available price and thereby reduce potential cost savings. One cardholder, for example, purchased batteries from a nonmandatory source for $64.49 when they were available from a mandatory source for $11.42âmeaning the agency overpaid by 565%. Similarly, a cardholder at USDA purchased a used Global Positioning System (GPS) device from a nonmandatory source when a new model was available from a mandatory source for 15% less. Purchases from nonmandatory sources may be authorized if a written justification is provided, but cardholders frequently failed to provide one. Auditors at the Department of the Interior (DOI), for example, determined that cardholders had failed to justify purchases from nonmandatory sources 65% of the time. Overall, the CIGIE reported that cardholders provided no justification for a majority of transactions with nonmandatory sources. Other documentation policies were violated as well. The CIGIE data showed that 36% of nonmandatory purchases lacked a requisition request, 32% lacked evidence of receipt, and 6% had no documentation at all. Generally, federal purchase card transactions are exempt from state and local sales taxes. Cardholders are responsible for ensuring that their transactions do not include sales taxes, and attempting to recover sales taxes if they are paid erroneously. IGs at 20 federal agencies found many instances of purchase card holders paying sales taxesâmore than 5% of the high-risk transactions in the CIGIE study included charges for sales taxes. Of the transactions that included sales tax, 58% lacked a written justification for paying the taxes and 20% of the items may not have been needed by the government. In many cases, agencies did not track whether the sales taxes were recovered. The USDA IG investigated seven transactions that included sales taxes, and none of the cardholders provided any documentation as to whether they attempted to recover the tax charges. An audit of NASA's purchase card transactions found that 7% of all high-risk purchases included sales tax, and that there was no evidence that the cardholders had attempted to reclaim those costs. While sales tax on any single transaction may not be considered significant, the cumulative amount in a fiscal year may total in the hundreds of thousands of dollars. The DOI IG obtained actual tax-paid data from the agency's purchase card program and determined that in the first six months of FY2017, DOI paid $338,212 in sales taxes involving 19,716 transactions. The IG for HUD found the agency expended $42,944 in sales tax on purchase card transactions during FY2018. Each purchase card holder is assigned a dollar amount, or threshold, which may not be exceeded on a single transaction. This threshold is known as the single purchase limit. Cardholders may not split a large purchase into smaller ones in order to circumvent the single purchase limit. Auditors typically flag an account that shows multiple purchases from the same vendor on the same day where the total costs exceed the cardholder's single purchase limitâthis pattern is often associated with split transactions. The CIGIE report estimated that 6.6% of all high-risk transactions involved split transactions. The USDA IG, for example, identified a series of transactions on the same day, with the same vendor, for the same product, where the sum of the charges was more than double the cardholder's single purchase limit. Similarly, the NASA IG determined that an employee had tried to circumvent the single transaction limit by making three purchases from the same vendor on the same day. Auditors at the Social Security Administration (SSA) identified split transactions in 6.5% of its sample. The agency suggested that its staff lacked the time to investigate these purchases and determine if they were inappropriate. Although the CIGIE initiative did not assess the implementation status of every requirement in the Charge Card Act, the IGs' findings indicated weaknesses remain in many agencies' internal controls. In particular, the audit results showed that AOs did not adequately monitor cardholder purchases; employee training on purchase card policies and procedures is insufficient; and agency policies and procedures have gaps. The Charge Card Act required agencies to strengthen AOs' capacity to monitor cardholder activity. AOs play a central role in preventing and detecting purchase card misuse, as they review cardholder statements to verify any suspicious or questionable transactions. In addition, AOs reconcile transaction records with supporting documentation to ensure that all purchases were appropriate. Audit findings highlighted the ongoing need for AOs to carefully review cardholder transactions. Many transactions that violated agency purchase card policies had not been reviewed and approved by an AO. GAO found that 11% of all the transactions it sampled from FY2014 had not been reviewed and approved by an AO. Similarly, the CIGIE report found that 44% of the transactions involving questionable or prohibited sources and 38% of split transactions had not been reviewed by the AO. These charges may have been questioned had the AOs thoroughly reviewed the purchases. In many cases, AOs approved transactions that lacked complete supporting documentation. GAO estimated that 22% of all purchase card transactions in FY2014 lacked complete documentation. IGs reported that 59% of the purchases that violated agency policies on the use of mandatory sources lacked written justification, as did 58% of the purchases that violated policies prohibiting the payment of sales taxes. In many cases, AOs approved transactions where there was no documentation that the goods or services had been received. The CIGIE report estimated that of the total number of transactions that violated an agency purchase card policy, 27% were approved without a receipt. The Charge Card Act specifies that agencies are to ensure that cardholders and AOs receive appropriate training on their duties. IGs found that at many agencies, purchase card training programs did not cover some policies or refresher training had not occurred within the past three yearsâconditions which are inconsistent with OMB training requirements. Auditors considered the lack of proper training to be a significant weakness with wide-ranging effects. As the EPA IG's office wrote, \"cardholder noncompliance primarily resulted from ineffective training and/or a lack of monitoring and control activities.\" The CIGIE report found, for example, that agency training programs often lacked adequate explanations of the rules governing split transactions, which meant that AOs did not know how to properly identify such purchases and cardholders were unaware that split purchases were violations of policy. The NASA IG recommended that the agency revise its purchase card training program to emphasize minimum documentation requirements, which constituted NASA's largest category of policy violations. Multiple agencies were unable to provide complete training records. The HUD IG found, for example, that the agency had not maintained records of the cardholders and managers who had completed the required training, as did the IG at the Small Business Administration (SBA). Agencies develop their own policies to implement government-wide and agency-specific purchase card requirements. The CIGIE report found that agency guidance was often unclear. Consequently, cardholders and managers did not always understand and properly follow purchase card policies. The IG at the Department of State recommended that the agency reissue its purchase card guidance to specify the frequency with which \"refresher training\" must be completedâa policy which was inconsistently represented at different components. The NASA IG linked one particular weaknessâthe absence of supporting documents for purchase card transactionsâto agency guidance, which was unclear about the document requirements for purchases below $500. The EPA IG recommended that the agency revise its guidance on the use of mandatory sources to make it easier to understand. More than 39% of EPA's noncompliant transactions were related to the inappropriate use of nonmandatory sources. In some cases, agency policies did not provide sufficient information about purchase card requirements. GAO found that several agencies did not require someone other than the cardholder to receive purchases. In addition, the CIGIE report found that while split transactions were a common violation, many agencies \"lacked the policies necessary to identify split purchases.\" The USDA IG identified 1,410 transactions in FY2018 where the agency paid sales taxes and could not determine if any efforts had been made to recover those charges. The IG wrote that This occurred because USDA does not have a policy requiring cardholders to document reasons for paying or attempting to recover sales tax, such as documenting on the receipt or using the AXOL system to describe the transaction. As a result, cardholders are improperly paying sales tax and not documenting why sales taxes were paid or if recovered, making it difficult for approving officials to determine why State and local sales taxes were paid or if any recovery was attempted. Auditors at EPA determined that the agency did not have adequate controls over its purchase card program, in part because the agency lacked a specific policy for the appropriate number of cardholders needed to make purchases at its various components. Oversight of agency purchase card programs is limited by the availability of data. While the CIGIE report identified areas where implementation of the Charge Card Act is incomplete, not all agencies had provided data and the data provided did not reflect or represent all of the law's requirements. Moreover, implementation of the Charge Card Act is ongoing and some agencies may have already addressed the weaknesses identified in the CIGIE initiative, which analyzed FY2017 data. Going forward, Congress has the option of requesting a study of the implementation of the Charge Chard Act. If GAO were to examine implementation of the Charge Card Act, it would possibly be able to use more recent data and it could target agencies with the highest risk of card misuse, as determined by dollar volume or history of violations, among other criteria. GAO might be asked to evaluate specific requirements, particularly in areas that were cited by auditors prior to the Charge Card Act. Have agencies implemented policies that require separation of duties? Have agencies established appropriate dollar thresholds for various categories of cardholders? Are agencies invalidating purchase cards when an employee terminates employment or is transferred to another component? The CIGIE report noted another potential weaknessâapproximately 8.6% of the high-risk transactions sampled involved purchase card activity on closed accounts. The extent of agency compliance with these and other purchase card requirements will not be known without additional, timely information. In addition to agency efforts, an evaluation of the effectiveness of SmartPay bank services and tools might be useful. As noted, agencies have reported that merchant block codes do not always prevent transactions from being approved at prohibited merchants. In addition, GAO found that SmartPay banks did not always retain records for the amount of time required by their contracts, in part due to confusion over which records were considered part of the transaction. An evaluation of bank services might identify additional issues that need to be addressed. It also might include a comparison of the technologies different agencies utilize and discuss what benefits they have realized. Given the potential for technology to enhance oversight, reduce administrative burden, and mitigate the risk of improper purchases, an assessment of SmartPay bank services may help agencies identify potentially useful technologies they have not yet incorporated into their charge card programs.", "summary": "Following their introduction in the mid-1990s, the usage of government purchase cards expanded at a rapid rate. Spurred by legislative and regulatory reforms designed to increase the use of purchase cards for small acquisitions, the dollar volume of government purchase card transactions grew from $527 million in FY1993 to $19.5 billion in FY2011. While the use of purchase cards was credited with reducing administrative costs during that time, audits of agency purchase card programs found varying degrees of waste, fraud, and abuse. One of the most common risk factors cited by auditors was a weak internal control environment: many agencies failed to implement adequate safeguards against card misuse, even as their purchase card programs grew. In response to these findings, Congress passed the Government Charge Card Abuse Prevention Act of 2012 (Charge Card Act; P.L. 112-194 ), which sought to enhance the management and oversight of agency purchase card programs. Drawing on recommendations from the Government Accountability Office (GAO), the Charge Card Act required executive branch agencies to implement a specific set of internal controls, establish penalties for employees who misuse agency purchase cards, and conduct periodic risk assessments and audits of agency purchase card programs. This report begins by providing background on the origin and structure of agency purchase card programs. It then discusses identified weaknesses in agency purchase card controls that have contributed to card misuse, and examines provisions of the Charge Card Act that are intended to address those weaknesses. Finally, the report examines implementation of the Charge Card Act and analyzes ongoing risks to agency purchase card programs.", "document_type": "crs"}
{"report": "Every year the Senate routinely considers whether to give its advice and consent to hundreds of nominations submitted by the President. From start to finish, the confirmation process can be a lengthy one, even for relatively noncontroversial nominees. Each nomination is typically referred to one or more committees having subject matter jurisdiction over the position. Committees may bear a significant workload in examining nomineesâoften including questionnaires, optional public hearings, and individual meetings with Senatorsâto determine whether to report a nomination to the full Senate. Once a committee has reported a nomination or been discharged from its further consideration, the Senate may take up a nomination for deliberation, though a cloture process may be required to ensure a final vote to confirm. As part of an effort to streamline the nominations process during the 112 th Congress (2011-2012), a standing order of the Senate, S.Res. 116 , created a new designation of certain nominations as \"privileged.\" These so-called privileged nominations are subject to special procedures that may save the time of committees in processing these appointments. In total, there are 285 positions to which nominations are privileged, the majority of which are part-time appointments to oversight boards and advisory commissions, but they also include full-time chief financial officers and certain assistant secretaries to cabinet-level agencies. A full list of privileged nominations, organized by their committees of jurisdiction, can be found in Appendix . This report first examines, in detail, the special procedures under which privileged nominations are processed, as well as the action by which a Senator may have a privileged nomination referred to its committee of jurisdiction. It then provides a brief legislative history of S.Res. 116 and subsequent legislation that has created additional privileged nominations. Finally, this report includes data on and a discussion of Senators' requests to refer privileged nominations to committee. Figure A-1 contains an example of the \"Privileged Nominations\" section of the Senate's Executive Calendar . The sections below discuss each step of how a privileged nomination might be processed under potentially expedited procedures before consideration by the full Senate. Pursuant to Section 1(d) of S.Res. 116 , any Senator may insist that a privileged nomination be referred to its committee of jurisdiction, making it no longer eligible for procedures under S.Res. 116 . Further discussion of when and why a Senator might make such a request follows after the sections on consideration. Unlike a typical nominationâwhich, when received by the Senate, is usually referred to its committee of jurisdictionâa privileged nomination goes directly to the \"Privileged Nominations\" section of the Executive Calendar . There, the nominee and position to which he or she was nominated is to be recorded, along with the date the nomination was received by the Senate. An example page of the \"Privileged Nominations\" section of the Executive Calendar appears in Figure A-1 . The same day a privileged nomination is received in the Senate, the Office of the Executive Clerk sends a notification form to its committee of jurisdiction. This transmittal from the Executive Clerk is not a referral of the nomination to the committee but rather serves to inform the committee it should proceed to request information from the nominee. A column in the Privileged Nominations section of the Executive Calendar entitled \"Information Requested by Committee\" is marked with a \"Yes\" to denote this transaction. Though under the terms of S.Res. 116 , privileged nominations are not referred to their committees of jurisdiction, these committees are still responsible for obtaining certain background information from nominees before they can be considered by the full Senate. Section 1(b) of S.Res. 116 directs that the \"appropriate biographical and financial questionnaires\" be collected by committees of jurisdiction from privileged nominees. This broad requirement gives committees some discretion in determining what information to collect. As a result, committee practices on obtaining information from privileged nominees can vary. Once a nominee has responded to a committee's questionnaires, the chair is required to notify the Executive Clerk in writing that the appropriate information has been received. This requirement is fulfilled, in practice, when the committee returns the notification form to the Executive Clerk's office. When a committee has affirmed receipt of the requested information from a nominee, that date is recorded under the \"Requested Information Received\" column in the Privileged Nominations section of the Executive Calendar . Senators have 10 session days from this date (and any time prior to this point, starting from the day the nomination was received in the Senate) to request that the nomination be referred to its committee of jurisdiction. After 10 session days have passed, the nomination is then moved to the \"Nominations\" section of the Executive Calendar and is eligible to be called up for consideration on the Senate floor (after lying over for one day or, by unanimous consent, immediately). Privileged nominations that have been considered under these procedures are to appear in the Nominations section of the Executive Calendar with the designation \"Placed on the Calendar pursuant to S.Res. 116 , 112 th Congress\" under the \"Reported By\" column, along with the date it first appeared there. Once a privileged nomination has moved to the Nominations section of the Executive Calendar , there is no expedited process under which the Senate can proceed to consider or vote on it. Instead, these nominations are equally eligible for consideration as any other found on the Nominations section of the Executive Calendar . As a result, even privileged nominations that may have moved quickly through the expedited committee process could face lengthy wait periods before being brought up for consideration by the full Senate. Some privileged nominations never receive a vote on the Senate floor and are returned to the President when the Senate adjourns sine die at the end of the first or second session of a Congress or when it recesses for more than 30 days. As noted earlier, pursuant to Section 1(d) of S.Res. 116 , any Senator may trigger, on his or her own behalf or the behalf of any identified Senator, that a privileged nomination be referred to its committee of jurisdiction for consideration under normal procedures. Any such request compels the referral of the nomination to committee. Senators do not need to obtain recognition on the floor to make such a request, nor are they required to provide a reason for their request. Instead, a form for this purpose is available at the dais on the Senate floor. A Senator's request is then to be reflected in that day's Congressional Record , and the nomination is to be referred to its committee of jurisdiction. Additional data on requests for the referral of a privileged nomination can be found in Table 1 . Senators may make such requests for a variety of reasons. Senators may have concerns over the qualifications or fitness of an individual to serve in the position to which he or she was nominated. Referring the nomination to committee ensures that it will need the support of a majority of the committee to be reported to the Senateâa higher threshold than under the procedures of S.Res. 116 , which require only that the committee's chair affirm that the requested biographical and financial information has been received. Alternatively, a Senator may desire more time for individual meetings with Senators or a public hearing where a nominee's credentials can be extolled, perhaps increasing the chances of a favorable floor vote. The creation of privileged nominations and the special procedures applied to them were part of a larger effort to reform the confirmation process in the Senate during the 112 th Congress (2011-2012). On January 5, 2011, Majority Leader Harry Reid and Minority Leader Mitch McConnell engaged in a brief colloquy to discuss the pace of processing nominations in the Senate, noting the increasing volume of Senate-confirmed positions and the need for reform. Connecting the oftentimes laborious confirmation process with difficulty in finding capable nominees, Majority Leader Reid said: Clearly, all Presidents are entitled to choose well-qualified individuals to serve in their administration. In the vast majority of instances, the individuals nominated by the President are not controversial, but many have faced delays before assuming their positions. These delays mean critical decision-makers are not in place. And, the delays make it harder to find qualified peopleâmany great nominees simply cannot wait around for months as the stress and uncertainty affects their families and careers. We need to do better in the 112 th Congress. The two leaders agreed to form a bipartisan nominations reform working group, consisting of Senators Chuck Schumer and Lamar Alexander, the chair and ranking minority member of the Committee on Rules and Administration; Senators Joe Lieberman and Susan Collins, the chair and ranking minority member of the Committee on Homeland Security and Governmental Affairs; and the floor leaders themselves. By the end of March, members of the group had introduced two measures: S. 679 , the Presidential Appointment Efficiency and Streamlining Act of 2011, and, S.Res. 116 , a resolution to provide for expedited Senate consideration of certain nominations subject to advice and consent. S.Res. 116 was submitted on March 30, 2011, by Senator Schumer on behalf of himself and 14 other Senatorsâincluding all members of the nominations reform working groupâand was referred to the Committee on Rules and Administration. The Rules Committee met on May 11 and ordered the resolution reported favorably by voice vote without amendment. The Senate took up S.Res. 116 for consideration on June 29. Three amendments to the resolution were proposed and considered, with a package of negotiated and technical changesâreferred to as a \"managers' amendment\"âultimately being agreed to. The first amendment, proposed by Senator Tom Coburn, contained language requiring reporting requirements on legislation creating new federal programs. The amendment was not agreed to, 63-34, after failing to achieve a two-thirds threshold for adoption, pursuant to an earlier unanimous consent agreement. A second amendment, proposed by Senator Tom Harkin on behalf of Senator Tom Udall, would have amended Senate Rule XXII to establish a majority-vote threshold for invoking cloture on executive branch nominees. This amendment was ruled out of order by the chair. The final amendment, offered by Senator Schumer, included provisions that expanded the positions to be considered as privileged nominations (including several full-time chief financial officers and certain assistant secretaries) and required that future legislation proposing new presidentially appointed positions be accompanied by a justification report. The amendment was adopted by unanimous consent. The Senate agreed to S.Res. 116 , as amended, by a vote of 89-8, on June 29, 2011. H.R. 26 , the Terrorism Risk Insurance Program Reauthorization Act of 2015, during the 114 th Congress (2015-2016), created a new 13-member Board of Directors for the National Association of Registered Agents and Brokers and designated these positions as privileged nominations established by S.Res. 116 (112 th Congress). To date, this legislation marks the first and only expansion of the privileged nominations category. The language establishing these new privileged nominations first appeared in the 113 th Congress (2013-2014) with the introduction of S. 534 , the National Association of Registered Agents and Brokers Reform Act of 2013. The legislative history of S. 534 offers no additional comment on the designating of these 13 positions as privileged nominations. Nonetheless, these positions fit the general profile of the type of nominations for which expedited consideration was designed (e.g., part-time boards and commissions). The Senate has considered 467 privileged nominations since S.Res. 116 was agreed to on June 29, 2011. Of those 467, 22 (4.7%) have been referred to committee at the request of a Senator. This rate of referral suggests that Senators are generally deferential to the expedited committee consideration of privileged nominations. Table 1 provides data on these 22 instances of requested referrals. Each entry contains identifying information about the nomination, including the Congress when the nomination was submitted, the name of the nominee, the position to which he or she was nominated, and the final disposition of the nomination by the Senate. Table entries also note the committee of jurisdiction for each nomination and a column indicating whether the Senator requesting referral was a member and/or leader of that committee at the time he or she made the request. As previously discussed, under the provisions of S.Res. 116 , any Senator has the right to request that a privileged nomination be referred to its committee of jurisdiction. The vast majority of these requests have been by a Senator on the nomination's committee of jurisdiction. Of the 22 instances where a privileged nomination has been referred, 20 have been made by a Senator from the committee of jurisdiction. Furthermore, 14 of those 20 requests were made by either the chair or ranking member of the committee of jurisdiction. ", "summary": "Privileged nominations are a subset of presidentially appointed and Senate-confirmed positions that are eligible for consideration under procedures established by S.Res. 116 (112 th Congress, 2011-2012). The vast majority of the 285 nominations designated as privileged are part-time positions to various boards and commissions, though some full-time positions are privileged as well (e.g., chief financial officers and certain assistant secretaries in Cabinet-level agencies). The procedures for privileged nominations may reduce the workload of committees of jurisdiction in processing these appointments for consideration by the Senate. The creation of privileged nominations and the special procedures for their consideration were part of a larger effort at reforming the confirmation process in the Senate during the 112 th Congress. At the outset of the 112 th Congress, a bipartisan working group was formed and ultimately produced both S.Res. 116 , \"A resolution to provide for expedited Senate consideration of certain nominations subject to advice and consent,\" and S. 679 , the \"Presidential Appointment Efficiency and Streamlining Act of 2011\" ( P.L. 112-166 ). The list of privileged nominations, first established in 2012, was expanded in 2015 by P.L. 114-1 , the Terrorism Risk Insurance Program Reauthorization Act of 2015, to include 13 members of the Board of Directors for the National Association of Registered Agents and Brokers. Unlike a typical nomination, a privileged nomination is not referred to committee unless requested by any Senator. Instead, it is entered into the \"Privileged Nominations\" section of the Senate Executive Calendar . Committees are required to request biographical and financial information from these nominees, typically in the form of committee questionnaires. Upon receipt of the requested information, the committee chair notifies the Executive Clerk in writing. The nomination then remains in the \"Privileged Nominations\" section of the Executive Calendar for 10 days of session before moving to the \"Nominations\" section, where it is eligible to be brought up for consideration on the floor of the Senate. This process allows a nomination to become eligible for floor consideration even though the committee did not hold a formal markup meeting to vote to report it. There are no expedited floor procedures for privileged nominations, and they are brought up and considered under the same procedures as any nomination reported by a committee. Any Senator may request on his or her own behalf, or on behalf of any identified Senator, that a privileged nomination be referred to committee. Such a request automatically triggers the referral of a privileged nomination. If a nomination is referred in this way, it must be reported by the committee (or the Senate must discharge the committee of the nomination) before the full Senate can consider it. The vast majority of privileged nominations considered on the Senate floor were not subject to a request for referral to committee. As of the end of 2019, the Senate has considered 467 privileged nominations, and there have been 22 instances of privileged nominations being referred to a committee at the request of a Senator. Such requests for referral are usually initiated by a Member on the committee with jurisdiction over the nomination and oftentimes originate with the committee's chair or ranking member.", "document_type": "crs"}
{"report": "This report focuses on selected ground electronic warfare (EW) systems. The Department of Defense (DOD) FY2020 budget requests funding for a number of ground EW systems associated with the Army and the Marine Corps. Generally, ground EW capabilities seek to use the electromagnetic spectrum to achieve one of three battlefield effects. First, ground EW systems can be used to defeat Improvised Explosive Devices (IED). This was the focus of the U.S. military's ground EW programs for the past decade and a half. A second role for ground EW can be to defeat Unmanned Aerial Systems (UAS). A third role, largely a legacy from the Cold War, can be to jam enemy communications and radars. An overall issue for Congress is whether to approve, reject, or modify DOD's proposals for ground EW programs. These programs also pose a number of potential oversight issues for Congress. Congress's decisions on these issues could affect future U.S. military capabilities and funding requirements. Potential issues for Congress include balancing EW programs between counter-improvised explosive device missions and great power competition, potentially standardizing how different services approach EW funding, and the role new technologies may play in EW operations. Electronic warfare (EW)âsometimes also called electromagnetic maneuver warfare (EMW) âis an integral component of modern warfare, particularly in operations against technologically sophisticated potential adversaries such as Russia and China. EW generally refers to operations that use the electromagnetic spectrum (i.e., the \"airwaves\") to detect, listen to, jam, and deceive (or \"spoof\") enemy radars, radio communication systems and data links, and other electronic systems. EW also refers to operations for defending against enemy attempts to do the same. More formally, DOD defines electronic warfare as \"[m]ilitary action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy.\" As shown in Figure 1 , DOD divides EW into electronic warfare support, electronic protection, and electronic attack. Electronic warfare support , sometimes also referred to as electronic support measures (ESM), involves listening to an adversary's radar and radio transmissions in an attempt to detect, locate, and understand how to avoid, jam, or deceive those systems. Electronic protection involves limiting the electromagnetic signatures of one's own military equipment and hardening one's own military equipment against the effects of enemy EW operations. Electronic attack (EA) involves jamming and deceiving enemy radars and radio communications and data links. Developing ever-better EW systems is a component of the competition in military capabilities between major military powers. Because EW programs tend to be classified and are sometimes related to intelligence systems and capabilities, these systems are not frequently discussed publicly in much detail. Ground EW systems provide EW support, electronic protection, and electronic attack. For instance, the Marine Corps' Mobile Electronic Warfare Support System categorizes enemy radio signals. Many of the counter-improvised explosive device countermeasures serve in both a protection and attack role by emitting a signal to jam radio communications to \"attack\" communications while protecting soldiers and marines. Counter-unmanned aerial systems provide a similar function for drones. In the immediate post-Cold War era, electronic warfare gained prominence as a potential way to mitigate threats from improvised explosive devices (IEDs). During counter-insurgency operations in Iraq and Afghanistan, U.S. and allied ground forces suffered many casualties from IEDs. To detonate IEDs, insurgents learned to use cell phones, small two-way radios, and other basic radio communications to maximize the amount of damage. One C-IED method the DOD developed was for EW systems to jam IED communications radio frequencies to prevent them from detonating. From FY2006 through FY2011, the Joint IED Defeat Organization received $18 billion to develop C-IED technologies, including electronic warfare systems. These C-IED techniques included the development of a \"man-portable\" platform (see Figure 2 ), which supports U.S. forces on foot patrol, without the protection of a vehicle. However, due to power constraints, these types of C-IEDs provide jamming in a limited area; the jammers use batteries that are heavy and must be carried. DOD also procured C-IED jamming systems for vehicles, such as the Duke Version 3 system ( Figure 3 ), which can be installed on nearly any vehicle, though typically it is installed on the Humvee or the Mine-Resistant Ambush Protected Vehicle. Although these vehicular-based C-IED jammers are more powerful, because they draw power from the vehicle's engine, they are not able to accompany ground forces into buildings or in constricted areas such as alleyways. Thus ground forces require both systems, for mounted (travelling by vehicle) and dismounted (travelling by foot) operations. The emergence of unmanned aerial systems (UAS), more commonly called drones, has created unique challenges for U.S. military forces. Both state and nonstate actors have employed drones for intelligence, surveillance, and reconnaissance (ISR) and certain strike capabilities (particularly large UAS platforms such as the MQ-9 Reaper for U.S. allies or the Wing Loong II developed by the People's Republic of China). Most UAS systems use radio frequencies to operate. Adversaries have used UAS to support ground operations in recent years. The Islamic State (IS, also known as Islamic State in Iraq and the Levant (ISIL)) modified commercial drones to perform reconnaissance and drop small explosives, such as hand-grenades and mortars, on unsuspecting personnel. The Russian military demonstrated its ability to pair EW drones with artillery fire, with devastating effects. According to U.S. intelligence sources, Russian forces used a single drone to provide intelligence for an artillery fire mission in July 2014 that resulted in the destruction of two Ukrainian battalions within minutes. Emerging concepts like \"swarming,\" where many small drones work together to accomplish a task, are also being developed. In 2015, IS demonstrated swarming tactics to attack a Russian airbase in Syriaâthough it is unclear how effective these swarming tactics were against Russian forces. As a result, DOD has developed EW techniques to deny potential adversaries the ability to use drone aircraft. These counter-UAS systems are divided into two categories: systems that detect UAS, and systems that interdict UAS systems kinetically or nonkinetically. Some counter-UAS systems are capable of both detection and attack. According to one analyst, as of February 2018 there were 235 counter-UAS products from 155 manufacturers. These counter-UAS products range from hand-held devices that can jam radio and global positioning system (GPS) signals for point defense (see Figure 4 ) to larger, ground-based systems that can defend larger areas (see Figure 5 ). The latest generation of counter-UASs by the Army and Marine Corps are being developed to destroy targets using directed energy such as lasers. The Army has recently developed vehicle-mounted lasers capable of engaging UAS. In 2018, the Army tested the Mobile Expeditionary High Energy Laser (MEHEL), a 5 kilowatt (kW) laser, which is placed on a Stryker-armored vehicle (see Figure 6 ). This laser has demonstrated being capable of destroying small drones in flight. The Army is planning to test a more powerful 10kW laser, and anticipates upgrading to a 50 kW laser, capable of destroying rockets, artillery, and mortars, by 2022. The Army plans to translate these technology demonstrators into future air defense systems by the mid-2020s. However, several challenges remain for the Army to field laser technologies. The first challenge is to develop a sufficient energy source that can fit into relatively small spaces. Some of the first lasers required a large power source housed in a semi-truck trailerâa power system too large to be practical for operational forces. The second challenge is providing sufficient power so that a laser beam can travel long distance. Light quickly diffuses in the atmosphere, thereby limiting the range of the system, particularly for lower-powered lasers. Similarly to the Army, the Marine Corps is developing its own counter-UAS systems through the ground-based air defense (GBAD) program. In June 2019, the Marine Corps Warfighting Lab announced the first laser-approved operations, named the Compact Laser Weapons System (CLaWS) (see Figure 7 ). According to the Marine Corps, the CLaWS program is a rapid prototyping effort to provide an affordable solution for the C-UAS challenge. The Marine Corps is also procuring the Marine Air Defense Integrated System (MADIS) as part of its GBAD future weapons system. MADIS is a C-UAS system designed to be integrated onto the Joint Tactical Light Vehicle. In the FY2020 budget request, the Marines requested procurement funding to integrate 28 MADIS systems into the service's vehicle fleet. Advances in networking sensors and computing power have made using the electromagnetic spectrum for communications an important task in any military operation. These networks allow a military to develop a comprehensive picture of the battlespace and enable forces to effectively coordinate attacks. Disrupting an enemy's communications systems limits their ability to command forces and maintain battlespace awareness. Both the Army and the Marine Corps have developed several programs to deny potential adversaries access to their communications networks. The Army's primary communications jammer is the EW tactical vehicle (EWTV), a modified mine-resistant ambush protected vehicle that incorporates a variant of the CREW Duke system (see Figure 8 ). According to the Army, the EWTV was \"developed to provide Army EW Teams with the ability to sense and jam enemy communications and networks from an operationally relevant range at the brigade combat team level.\" The Army states that the EWTV is designed to provide electronic attack capabilities for brigade combat teams. To manage electronic attack and electronic support capabilities, the Army uses the EW planning and management tool (EWPMT). This system is often installed between the antennae and radio transceiver. The EWPMT allows operators to neutralize and exploit enemy signals through a computer program called Raven Claw. The software gives EW commanders a comprehensive view of the electromagnetic spectrum, allowing them to detect and jam enemy communications systems and radars. Marine Corps radio battalions primarily employ the Communication Emitter Sensing and Attack System (CESAS) II to jam communications systems. According to a project officer, the CESAS II \"has the ability to operate in a larger frequency range, covering a much larger portion of the communications spectrum [high frequency, very high frequency, and ultra high frequency].\" CESAS II comes in two variants: a vehicle-transportable version (see Figure 9 ) and a man-portable system. According to Marine Corps Systems Command, CESAS II reduces the weight of the vehicle jammer from 1,300 pounds to 670 pounds; the man-portable version weighs 180 pounds. The Marine Corps declared initial operational capability in July 2016 and plans to declare full operational capability in FY2021. The AN/MLQ-36 Mobile Electronic Warfare Support System (MEWSS) is another vehicle the Marine Corps uses to jam communications and other electronic transmissionsâsuch as radar. The Marine Corps fields 12 MEWSSs, which are modified light-armored vehicles procured in 1987. The MEWSS has received a series of upgrades, including a program called the MEWSS Product Improvement Program, which added a 9-meter extendable mast. During the Cold War, competition in EW capabilities was an ongoing and significant component of the overall competition in military capabilities between the U.S.-led NATO alliance and the Soviet-led Warsaw Pact alliance. The end of the Cold War and the shift in the early 1990s to the post-Cold War eraâa period that featured reduced tensions between major powers and a strong U.S. military emphasis on countering terrorist and insurgent organizationsâmay have led to a reduced emphasis in U.S. defense plans and programs involving EW related to so-called high-end warfare, meaning high-intensity warfare against technologically sophisticated adversaries. The perceived shift in the international security environment from the post-Cold War era to an era of renewed great power competition has led to a renewed focus on EW in U.S. defense planning and programming. In particular, U.S. defense planning has focused on aspects of EW related to high-end warfare, and to concerns among some observers that the United States needs to strengthen its EW capabilities as part of its overall effort to preserve U.S. qualitative military superiority over potential adversaries such as Russia and China. China and Russia have developed sophisticated anti-access/area denial (A2/AD) systems to deny U.S. military forces many advantages; Chinese and Russian EW systems are considered A2/AD systems that deny the U.S military access to their communication and command and control. DOD notes that Russia has emphasized EW in its military modernization effort. Russia reportedly has employed EW as part of its military operations in Ukraine and Syria. DOD similarly states that China recognizes the importance of EW in modern military operations and is developing its EW capabilities as an integral part of its broad-based military modernization effort. China encouraged greater integration between its civil and military technological and industrial bases, which may enable its EW capabilities to benefit from the sophistication of its extensive civilian electronics industry. For more than a decade, the Russian military has focused on modernizing its forces, with a particular emphasis on command, control, communications, and computers (C4) and intelligence, surveillance, and reconnaissance (ISR) systems, of which EW plays an important part. According to military analyst Robert McDermott, the Russian military views electronic warfare as a \"type of armed struggle using electronic means against enemy C4ISR to 'change the quality of information,' or using electronic means against various assets to change the condition of the operational environment.\" McDermott describes a close relationship between Russian signals intelligence forces and EW forces, where several EW units perform signals intelligence (SIGINT) functionsâsimilar to U.S. ground force organizations such as the Marine Corps' Radio Battalions. What distinguishes Russian EW organizations, he claims, is also a close relationship with air defense and artillery. According to the Defense Intelligence Agency (DIA), the Russian military first tested its military modernization efforts in the Georgian war in 2008. DIA notes that \"Russian military limitations were fully on display during the August 2008 \"five-day war\" with Georgia. Russian forces prevailed and defeated their relatively weak Georgian opponents, but after-action analysis by the Russian military highlighted many failings.\" Based on this operational experience, Russian forces began instituting what is termed the \"New Look Program.\" According to the DIA, [p]artially-manned Soviet-style divisions were reorganized into what were planned to be fully-manned brigades; officer ranks were trimmed from 350,000 billets to initially 150,000, although later the number rose to 220,000; the contract manning effort was reshaped and reinvigorated, with a goal of 425,000 professional enlisted personnel in the force by 2017; the six extant military districts were reshaped initially into four joint strategic commands, which controlled all military assets in their areas in peace and war; and lastly, a massive state armaments program was initiated, allocating 1.1 trillion rubles over 10 years, aiming at fielding a Russian military with 70% new or modernized equipment by 2020. Investments in EW, through the New Look Program, have been significant. Since 2008, Russian military forces have continued to transform EW capabilities and organizations. There are some clues in the many statements by the defence ministry and senior EW officers that indicate the modernisation of EW is based on examining how such capability has been exploited by the US and NATO in military operations over the past two decades. There also appears to be some influence based on US Prompt Global Strike and developments in US and NATO high-precision weapons that is pushing the defence ministry to plan for countering these. At the outset, despite the opaque nature of the overall aims of the procurement processes, one statement that stands out is from the leadership of KRET, aware of the underlying drivers behind the need for modern EW systems in Russia's military. Indeed, by November 2016, the First Deputy General Director of KRET, Vladimir Mikheyev, referred to the \"National Strategic EW System\" as an \"asymmetric response to the network centric system of combat operations\" on the Murmansk -BN as a key part of the subsystem. The Murmansk -BN has a reported range of 5,000 km, is deployed on seven trucks, and monitors activity on airwaves, intercepting enemy signals with a broad jamming capability; it uses 32-metre-high antennas and has been deployed in Crimea. Mikheyev said the creation of the Russian EW strategic system can be called the \"implementation of a network centric defence concept\". Additionally, Russian forces have begun introducing EW forces into their main combat arms organizations. Both McDermott and the DIA indicate that each motorized brigade has at least one electronic warfare companyânumbering more than 100 personnelâto provide desired tactical effects (as depicted in Figure 11 ). Appendix A provides an overview of the organization and types of equipment these EW companies use. China has also seen a similar progression in EW capabilities over the past decade. Most defense analysts focus on Chinese aviation, maritime, and anti-space capabilities; however, the People's Liberation Army (PLA) has developed highly capable systems in the ground domain. China has developed a concept of \"informationized warfare,\" which attempts to gain an advantage in information through robust ISR networks, while attempting to deny adversaries access to informationâthus preventing them the ability to command and control forces. To accomplish this goal, the PLA organizes EW functions in a new command called the Strategic Support Force, which includes cyber, psychological, information, and space forces. Most of the focus on Chinese EW operations has been on air, maritime, and the space domains. However, China has developed sophisticated capabilities to counter U.S. forces on the ground as well. According to Jane's Defence Weekly, China has invested substantial resources into science and technology initiatives focused on improving its network and electronic warfare capabilities. These investments include ground-based sensors and jammers, space-based intelligence assets, and a number of airborne jammers. China has also invested in many unmanned systems that can swarm to provide desired effects, including signals intelligence interceptions and electronic attack. Balance of Ground EW Capabilities . A potential oversight issue for Congress is the balance of EW capabilities the Army and Marine Corps are fielding and plan to procure. During the height of the conflicts in Iraq and Afghanistan, EW programming was weighted toward counter-IED programs rather than on countering great power competition. Although U.S. military forces continue to operate in high-threat IED areasâas illustrated by recent casualties in Afghanistanâthese programs do not necessarily provide the necessary protection against potential Russian or Chinese weapons systems. Both services have acknowledged that they require new investments to support command and control in an electromagnetically contested environment. Congress may review how both the Marine Corps and Army allocate resources to counter the IED threat, while working to ensure that ground services are prepared to counter emerging threats. Part of the capabilities balance is overlapping programs between the Army and Marine Corps. As both the Army and Marine Corps have EW programs with similar functions. For instance, both services are developing competing C-UAS programsâthe Army MEHL and the Marine Corps CLaWSâthat appear to have similar capabilities. C-IED programs, on the other hand, are joint programs in which one service develops a solution that other services can procure (thus all DOD services use the same programs which can have efficiencies for sustainment). Congress may examine if it is worthwhile for the Army and Marine Corps to develop competing programs, or if funding competing programs allows technology research and development (R&D) to make greater progress. Funding of Programs . Funding for EW systems can be difficult to track due to the complexity and classification of EW programs. One challenge associated with ground EW funding is that both the Army and the Marine Corps use research and development appropriations to potentially fund procurement activities due to the relatively fast-paced changes to electronic components. A second, but related, challenge is tracking EW programs when they transition from development to procurement. Part of the challenge is that the procurement activities for EW systems can be relatively small compared with larger weapons systems. As a result, DOD procurement activities do not necessarily disclose these components from the larger acquisition, making it difficult to track both a breakout of EW components associated with larger systems (e.g., the M1 Abrams main battle tank) and the total dollar figure associated with EW procurement activities for the Army and Marine Corps. The Marine Corps and the Army use different funding policies to maintain EW programs. Many of the Army's EW capabilities, as either demonstrators or prototypes, receive R&D funding. As a result, funding for these programs is generally seen as inconsistent and lacking plans for sustainment. The Marine Corps' programs, on the other hand, are programs of record, receiving both R&D and procurement funding. By making these systems programs, the Marine Corps seeks to provide predictable funding for systems over long periods of time. However, these systems are developed through the acquisition system and therefore might not be at the forefront of technological advances. Emerging Technologies . Emerging technologies may change how the Army and Marine Corps conduct EW. Some experts argue that advances in electronics are already changing how ground forces perform electronic warfare, particularly with continuously improving active electronically scanned arrays and new software defined radios. Some argue that these advances in electronics, paired with artificial intelligence, could allow for some automated decision making. These algorithms could help manage the electromagnetic spectrum by making spectrum allocation decisions, determine when adversaries are jamming (or denying) a frequency band, and automatically develop a jamming plan to deny adversaries access by looking at trends in their electronic emissions. Artificial intelligence algorithms could also enable EW systems to locate and engage small unmanned aerial systems by using data sources to help identify radar contacts (versus environmental clutter from clouds or animals) and electronic emissions. Neither the Army nor the Marine Corps have publicly stated that they plan to use artificial intelligence for managing electromagnetic spectrum operations or electronic warfare. New materials are changing the size, weight, power, and cooling of electronics components and power supplies. Electronics are smaller and require less power, and therefore smaller batteries. These new electronics emit less heat because of their reduced consumption of energy, requiring less cooling to maintain ideal temperatures, further reducing energy consumption. Battery technology is improving energy density. These designs provide similar electrical power outputs while reducing their size and weight, making it easier to develop man-portable electronics (such as the Thor C-IED system and the CESAS II jammer). Furthermore, advances in electronics allow for new waveforms using advanced electronically scanned array (AESA) antennas and other designs. As new materials emerge, DOD may request additional funding to upgrade EW systems and potentially procure AESA technology to more effectively jam enemy communications and radar systems. Quantum technologies could potentially change electronic warfare. Emerging developments in quantum communications and quantum radars will likely change how the military communicates and observes enemies. Quantum technologies will likely have an impact on EW; however, the exact impact they will have on executing EW operations remains unclear. Appendix A. Russian EW Company Equipment", "summary": "Ground electronic warfare (EW) is a group of programs directed by the Army and Marine Corp which are designed to effect ground forces use of the electromagnetic spectrum. The U.S. military has several ground EW programs that are used for different missions. These programs can broadly be categorized into counter-improvised explosive device (C-IED) systems, counter-unmanned aerial systems (C-UAS), and communications and radar jammers. Over the past several years, senior leaders in the Army and Marine Corps have testified about the need to improve EW capabilities. Role of EW in Ground Operations EW is a component of modern warfare, particularly in response to threats posed by potential adversaries such as Russia and China. EW refers to operations that use the electromagnetic spectrum (i.e., the \"airwaves\") to detect, listen to, jam, and deceive (or \"spoof\") enemy radars, radio communication systems, data links, and other electronic systems. EW also refers to operations that defend against enemy attempts to do the same. Ground EW programs have gained importance in an era of \"great power competition.\" Countries like Russia and China have developed so-called anti-access/area denial (A2/AD) systems, some of which are designed to prevent U.S. military access to radio and satellite communications, and to deny the use of radars for artillery and air defense operations. Ground Forces EW Programs This report focuses on three categories of unclassified EW programs in the Army and Marine Corps, along with their respective programs and systems: C ounter -IED : the Thor and Duke Version III systems. C ounter -UAS : the Batelle Drone Defender, Blighter Counter-UAS system, the Mobile Expeditionary High Energy Laser, the Marine Air Defense Integrated System (MADIS), and the Compact Laser Weapons System (CLaWS). C ommunications and radar jammers : the EW Tactical Vehicle (EWTV), the EW Planning and Management Tool (EWPMT), the Communication Emitter Sensing and Attacking System II (CESAS II), and the Mobile EW Support System (MEWSS). Potential Oversight Issues for Congress Congress has continually shown interest in EW, and the decisions it makes regarding EW could affect future military capabilities and funding requirements. In particular, EW programs pose several potential issues for Congress: Is DOD's proposed mix of ground EW capabilities and investments appropriate? How do the Army and Marine Corps transition emerging technologies from demonstrations into programs, and are these programs funded adequately? What role might emerging technologies have in shaping current EW plans and programs?", "document_type": "crs"}
{"report": "Legislative proposals have been introduced since the 105 th Congress to create a national electricity portfolio standard that would require electric utilities to procure a certain share of the electricity they sell from specified sources. Twenty-nine states, three U.S. territories, and the District of Columbia are currently implementing mandatory portfolio standards, and an additional eight states and one territory have voluntary versions. Various existing and proposed portfolio standards use a range of terms for similar concepts. A renewable portfolio standard (RPS) typically means a requirement to procure electricity from renewable sources. A clean energy standard (CES) typically means a variant of an RPS that includes some nonrenewable sources, such as nuclear or selected fossil fuels, in the requirement. Some lawmakers and stakeholders use these terms interchangeably, and some use the term CES or \"clean energy\" to refer only to renewable sources. This report uses the more general term \"portfolio standard\" to avoid confusion between RPS and CES. At both the federal and state level, lawmakers express multiple goals for portfolio standards. These include greenhouse gas reduction, technology innovation, and job creation. Policy design choices, as discussed in this report, can influence the extent to which portfolio standards might achieve those or other goals. Other policies could potentially achieve the same goals as portfolio standards. For example, tax incentives or funding for technology research, development, and deployment could promote the use of certain types of electricity generation sources by reducing their costs. This report does not compare portfolio standards with other policy options, nor does it fully examine the costs and benefits of establishing a national portfolio standard compared to business-as-usual trends in the electric power sector. This report provides background on portfolio standards and an overview of policy design elements to inform debate around proposals introduced in the 116 th Congress, building on previous CRS reports addressing this topic. This report also analyzes potential effects of portfolio standard design choices, with an emphasis on economic effects, environmental effects, and potential interactions with state energy policies. Other potential effects that may be of congressional interest, but are outside the scope of this report, include public health, considerations regarding critical minerals used in some energy sources, electric reliability, cybersecurity, and geopolitics. A number of government agencies, nongovernmental organizations, academic researchers, and private sector entities analyzed potential effects of a national portfolio standard in 2011 and 2012 because of congressional interest at that time. Since 2012, the U.S. electric power sector has seen several changes in its generation profile that were unanticipated in those analyses. These include an increase in generation from sources using natural gas and renewable energy, along with a decrease in coal-fired generation. The current U.S. electricity generation profile and market trends may be important context for any congressional debate about a potential national portfolio standard. The U.S. Energy Information Administration (EIA) reports that total electricity generation was 4,047,766 gigawatt-hours (GWh) in 2012 and 4,207,353 GWh in 2018, an increase of 4%. Most of this increase occurred between 2017 and 2018, as shown in Figure 1 . Between 2012 and 2018, the share of electricity generation from different sources has changed. Coal generated 37% of total generation in 2012 and 27% in 2018. Natural gas generated 30% of total generation in 2012 and 35% in 2018. Renewable sources, including hydropower, wind, solar, geothermal, and biomass, generated 12% of total generation in 2012 and 18% in 2018. Many expect these trends to continue. For example, EIA's projection of current laws, regulations, and market trends show coal contributing 17% of total generation in 2050, natural gas contributing 39%, and renewable sources contributing 31%. Electric power sector observers generally agree on the factors causing these trends, although the relative importance of each factor is subject to some debate. The changes from 2012 to 2018 are due to a combination of (1) continued low natural gas prices and low wholesale electricity prices; (2) federal environmental regulations, especially on coal-fired power plants; (3) declining capital costs for wind and solar sources; (4) federal tax incentives for wind and solar sources; (5) state portfolio standards and other policies; (6) changing consumer preferences, especially large corporations' and institutions' commitments to procure more electricity from renewable sources; and (7) natural turnover as generators age. Differing perspectives over the relative influence of these factors could affect stakeholder views on the merits of a federal policy to promote greater use of certain energy sources for electricity generation. Some might argue that sources that are now cost competitive (e.g., natural gas, wind) may not require policy support to increase their share of the electricity generation profile. Others may see electricity generation as solely an area for state policy as discussed further in the section \" Interaction with Other State Energy Policies ,\" below. A related consideration may be whether increasing the pace of change in the U.S. electricity portfolio could pose reliability risks. Key concepts in portfolio standard policymaking may or may not have identical meaning when used in other contexts. For convenience and clarity, this section introduces key concepts used in this report. As noted above, lawmakers and observers are not consistent in their use of terms related to portfolio standards. Renewable portfolio standard (RPS) is the most frequently used term to describe a portfolio standard, though renewable energy standard, alternative energy portfolio standard, and others are in use. The term clean energy standard (CES) is frequently used to refer to a variant of RPS in which certain nonrenewable sources are eligible in addition to renewable sources, but some federal legislative proposals have used the term \"clean energy\" to refer only to renewable sources. The Appendix provides more information about previously introduced bills. Banking refers to the extent to which credits issued in the program may be used for compliance after their vintage year (see definition, below). Banking provisions can equivalently be described in terms of expiration. For example, if credits expire after two years, then banking for two years is allowed. A related concept is borrowing which allows credits of future vintage years to be used for compliance. Base quantity of electricity is the sales volume to which the portfolio standard applies. The base quantity could equal total electricity sales, but it need not. Excluding sources from the calculation of the base quantity changes the required amount of generation from eligible sources in absolute terms. The base quantity to which the portfolio standard applies also affects the financial incentive that different sources receive. Even sources deemed ineligible under the portfolio standard could receive some policy support if they were excluded from the base quantity of electricity. This concept is discussed further in the section \" Base Quantity of Electricity .\" Carve outs , tiers, multipliers, partial crediting, and usage limits are all policy options for influencing the relative support that different types of eligible sources receive under a portfolio standard. Eligible sources will be available at different costs. Policymakers may want to avoid a situation where compliance is achieved mostly through the use of a single, low-cost source. A carve out is a requirement within the overall policy requirement to achieve a minimum level of compliance by using a certain source. Carve outs have been used, for example, to require use of solar energy even when that was more expensive than other eligible sources. The same goal might be accomplished through use of tiers . Typically, a carve out will apply to a single source type while a tier might apply to multiple source types. A related concept is that of usage limits that set maximum levels for compliance from certain sources. Multipliers are rules under which selected sources receive more than the usual amount of credit for generating electricity, but the credits are completely fungible (see definition, below) with others. Sources that are eligible for multipliers would receive extra policy support, relative to other sources. Multipliers could be used, for example, to encourage demonstration and commercialization of new technologies. P artial crediting would give selected sources less than the usual amount of credit and could be applied to sources lawmakers wanted to give less policy support. Clean energy , as used in this report, refers to the set of sources that lawmakers might choose to include in a portfolio standard. These sources could include wind, solar, geothermal, biomass, hydropower, marine energy, nuclear, natural gas combined cycle generators, or fossil fuel-fired generators equipped with carbon capture and sequestration technology (herein, CCS). Lawmakers could also choose to include nongenerating sources such as energy storage or energy efficiency. Other considerations about the choice of eligible sources are discussed in the section \" Source Eligibility .\" Covered entities are the entities with a compliance obligation under a portfolio standard. Most portfolio standards being implemented by states or proposed at the federal level have electricity distribution utilities as the covered entities. These utilities may or may not own electricity generators, depending on state and local regulatory regimes. Typically, a utility procures electricity from a number of different generators using a variety of energy sources (its portfolio ). Other considerations about the choice of covered entities are discussed in the section \" Utility Applicability .\" Credits are the unit of accounting for portfolio standards and other market-based policies. Electricity cannot easily be traced from its point of generation to its point of consumption, so accounting measures are required to assess compliance with a portfolio standard. In many existing portfolio standards, credits are issued by an administrator to a generator that uses a clean energy source. The number of credits issued is based on actual measured electricity generation (i.e., ex post ). The generator can then sell credits to a utility, and the utility surrenders them to the program administrator to demonstrate compliance. If a generator sells both electricity and associated credits to the same entity, the credit is bundled . If a generator sells electricity and associated credits to different entities, the credit is unbundled . Lawmakers could allow entities other than generators and utilities (e.g., financial institutions) to buy and sell credits, or they could allow only utilities with a compliance obligation to purchase credits. The price that utilities would pay for credits would depend on the portfolio standard stringency, the overall volume of electricity generated by clean energy sources, and other market factors. The sale of credits could create an additional source of revenue for a generator, potentially improving its economic performance relative to a business-as-usual scenario with no portfolio standard. In some cases, the ability to sell credits might be the deciding factor for whether a new generator would be constructed (or, for existing generators, whether a generator would remain operational instead of being retired). In other cases, generators may be profitable without the sale of credits, and the credits might create a windfall profit. The requirement to buy credits would likely increase the overall costs for a utility. Typically, a utility's costs for complying with a portfolio standard would be passed on to its customers. If a utility were unable to fully pass on its compliance costs, it might see reduced profitability. Fungibility is the attribute of credits allowing them to be used interchangeably and without penalty. Since many state portfolio standards already exist, federal policymakers would have to decide if these state credits would be fungible with federal credits under a federal portfolio standard. If they were, then current holders of state-issued credits could use them for compliance with a federal portfolio standard or sell them to another entity for that purpose. If they were not, then state-issued credits could potentially lose value, depending on the relative stringency of a national portfolio standard and the state portfolio standard. Some states have implemented cap-and-trade programs in addition to portfolio standards, both of which aim to reduce greenhouse gas emissions from the electricity generation. Like portfolio standards, cap-and-trade uses credits (also called allowances) as an accounting mechanism and for compliance purposes. Under existing state policies and federal proposals, credits under portfolio standards are not fungible with allowances under cap-and-trade programs for greenhouse gases. Market-based policies attempt to use financial incentives to achieve policy goals. Many discussions contrast them with command-and-control policies that set specific permissions or prohibitions. Portfolio standards indirectly provide financial incentives because they create demand for generation from certain eligible sources in electricity markets, even if those eligible sources are more expensive than ineligible sources. Some observers argue this mechanism is a disruption of market forces. In comparison, tax credits, grants, and loan guarantees provide direct financial incentives for eligible sources and therefore lower the cost of those sources in the market. Most portfolio standard proposals do not expressly prohibit use of ineligible sources, but they do create a financial disincentive to use them. Monitoring, reporting, and verification (MRV) are three distinct steps that ensure that market-based policies achieve the desired goals. In the case of portfolio standards, MRV practices would measure the amount of electricity generated by eligible sources and verify that each unit of electricity from eligible sources was used only once for the purpose of compliance. Monitoring and reporting electricity generation is commonplace in the industry, at least for large-scale generators connected to the electricity transmission system. Verification for market-based policies is often completed by an independent third party. Qualifying facilities (QFs) are established in the Public Utility Regulatory Policies Act of 1978 ( P.L. 95-617 ; PURPA) as certain small power production facilities and cogeneration facilities that receive special treatment. Utilities must purchase electricity from QFs at a price determined by what the utility would otherwise have to pay for electricity. There is no direct relationship between QFs under PURPA and sources that would be eligible under a portfolio standard, though the term \"qualifying source\" is sometimes used in both contexts. To avoid confusion, this report refers to sources defined as clean energy under a portfolio standard as \"eligible sources.\" Registries , sometimes called tracking systems, are electronic databases used to facilitate credit issuance and transfer. State portfolio standards typically make use of registries in the following way. After an administrator verifies the amount of electricity generated from an eligible source, the administrator creates an appropriate number of credits. These credits are assigned a serial number and placed in the account of the appropriate entity in the registry. If the credit owner agrees to sell the credits to another entity, the owner files the necessary documentation with the administrator, who then authorizes the credits to be transferred to a different account in the registry. A covered entity would demonstrate compliance by transferring the required number of credits from its account to the administrator's account. The administrator would take action to retire the submitted credits to make sure they cannot be used again for compliance. Cybersecurity measures can help prevent theft of portfolio standard credits or other fraudulent activity. Some government agencies currently operate registries that could potentially be used to administer a national portfolio standard, and some private firms operate registries as well. Vintage refers to the time period in which a tradeable credit in a market-based policy is issued. Portfolio standards typically have annual compliance periods, with vintage expressed in years. In policies with shorter or longer compliance periods, the vintage could be associated with a specific month or a series of years. For example, if an eligible source generated electricity in the year 2025, it would receive a vintage 2025 credit. The banking and borrowing rules (see definitions, above) determine the years in which credits of a given vintage may be used for compliance. If Congress chose to establish a national portfolio standard, lawmakers would face choices about the design of the policy. This section discusses some key design elements and potential effects of different choices. Often, design choices reflect a balance between increasing the certainty of achieving policy goals and decreasing the likelihood that consumers will experience undesirable cost increases. Design elements can interact with each other, so the potential effect of a choice about one element may be influenced by choices about others. Not all portfolio standard design choices must be made in legislation. Congress could direct an agency to promulgate regulations that implement a portfolio standard. The previous federal proposals summarized in the Appendix take different approaches. Some proposals made very few design choices and left most decisions to an agency, while others specified most design choices and left few decisions to an agency. Specifying details in legislation could add complexity that potentially impedes the legislative process or creates challenges in policy implementation. On the other hand, specifying details in legislation would give lawmakers greater control over policy design decisions. Portfolio standards achieve their policy goals by increasing electricity generation from certain eligible energy sources, as defined by lawmakers. The various energy sources used for electricity generation have many different attributes that lawmakers might weigh in determining which sources could be eligible under a national portfolio standard. Recent state policy debates and many current discussions at the federal level have centered around three attributes: carbon intensity, technology maturity, and market competitiveness (i.e., cost). The debate around carbon intensity has focused on whether to include sources with a carbon intensity less than conventional coal-fired generators (i.e., low carbon sources), such as natural gas combined-cycle power plants, or include only those with a carbon intensity of zero (i.e., zero carbon sources). This debate closely relates to the desired environmental outcome of a portfolio standard. All else being equal, a portfolio standard that includes low carbon sources would likely result in higher greenhouse gas emissions from the electric power sector than a portfolio standard under which only zero carbon sources were eligible. Advocates for substantial greenhouse gas reductions disagree about whether all zero carbon sources should be eligible, with nuclear energy and CCS being particularly contentious. Advocates who support nuclear energy and CCS often present cost arguments, while advocates who oppose those sources often present arguments about environmental quality and environmental justice. The debates around technology maturity and market competitiveness both focus on the desired balance between supporting new technologies and supporting existing technologies. These debates closely relate to the desired economic and technological outcomes of a portfolio standard. Many mature technologies are less expensive than new technologies, so including them as eligible sources might achieve the policy goals at a lower overall cost. Mature technologies may be easier to deploy, from an operational point of view, since industry best practices and standards for their use are established. At the same time, a portfolio standard that includes mature technologies might not encourage the desired level of investment in new technologies. A compromise may be the use of carve outs, tiers, multipliers, partial crediting, or usage limits, as described above, to attempt to influence the extent to which covered entities used new or mature technologies for compliance. Energy storage and energy efficiency are not electricity sources, in the usual sense, because they do not generate electricity. Their supporters argue their deployment helps achieve similar policy goals as portfolio standards, namely technology innovation, greenhouse gas reduction, and job creation. Portfolio standards could incentivize energy storage and energy efficiency directly, for example, by defining them as eligible sources and providing an accounting methodology for issuing credits to them. Such accounting methodologies may be more complex than those used for electricity generation, especially for energy efficiency since energy savings cannot be directly measured. Alternatively, portfolio standards could indirectly incentivize deployment of energy storage or energy efficiency in the setting of the base quantity, as discussed in the section \" Base Quantity of Electricity .\" If lawmakers wanted to incentivize their deployment, another option could be to establish separate targets for energy storage deployment and energy efficiency alongside a portfolio standard. Some states with portfolio standards have taken that approach, and some previous federal proposals took that approach as well. Distributed energy resources (DER) are located near the point of consumption in the electric power sector (e.g., an individual home, commercial facility, or manufacturing plant). Federal portfolio standard proposals to date put a compliance obligation on electric utilities; however, utilities do not always own or operate DER. From the perspective of an electric utility, many DER are like energy efficiency in that they reduce electricity sales. Some, but not all, DER use renewable sources, so lawmakers might consider whether to include these as eligible sources. The electric power industry does not have established methodologies for measuring generation from DER, so these would need to be developed if DER were to receive credits. Alternatively, the setting of base quantities can influence the incentive DERs receive as discussed below. Other energy source attributes may be of interest to Congress. These include energy density, which can affect land requirements, and the geographic variability in resource quality. As is also the case for other topics, geographic variability in natural resources can potentially raise concerns about uneven wealth impacts in portfolio standard policymaking. For example, the nation's wind resources most suitable for wind energy development are concentrated in the central United States and offshore of the Northeast and Mid-Atlantic. The nation's largest solar resources are concentrated in the Southwest. If eligible sources under a portfolio standard were all concentrated in one region (or, similarly, if a lack of eligible sources were concentrated in one region), wealth transfer could occur, raising potential concerns over fairness. Relatedly, some regions have developed some resources more than others, for example via implementation of state portfolio standards. Including existing sources, such as those incentivized under state policies, could potentially result in wealth transfer from states that had not previously implemented supportive policies. On the other hand, excluding existing sources could be perceived as penalizing early actors. Most homes, businesses, and other consumers acquire electricity from the electric grid and pay electric utilities to provide that electricity to them. Over 3,200 electric utilities operate in the United States, and they are generally classified by three ownership models. Investor-owned utilities (IOUs) are operated by private companies on a for-profit basis, and they deliver electricity in at least portions of every state except Nebraska. Publicly owned utilities (POUs, sometimes municipal utilities or munis) are owned by local governments and operated on a not-for-profit basis. Electric co-operatives (co-ops, sometimes rural co-ops) are member-owned organizations operated on a not-for-profit basis, typically located in rural areas. State governments allow IOUs to act as monopolies in their service territory, with no competition on electricity distribution, in exchange for accepting electricity rates as determined by state regulators. Similar to IOUs, POUs and co-ops are allowed to operate as monopolies with respect to electricity distribution. Unlike IOUs, they are generally exempt from regulation by state governments regarding electricity rates, investment decisions, and other operations. POUs and co-ops together serve about 27% of Americans. Lawmakers would have to decide to which type of utility a national portfolio standard would apply, if they chose to implement such a policy. If one class of utilities, such as co-ops, were excluded, then the overall effect of the policy might be reduced, since the excluded utilities could still procure electricity from ineligible sources above the levels set by the portfolio standard. On the other hand, excluding some utilities based on ownership model might be desirable in order to address concerns about overall compliance costs and cost distribution. POUs and co-ops often serve fewer customers than IOUs, so any fixed administrative costs associated with compliance must be shared by a smaller number of customers, resulting in relatively larger shares of administrative costs. Some state portfolio standards establish different (usually less stringent) targets for POUs and co-ops, while some exclude them altogether. Utility size, expressed as annual electricity sales, could be a more precise characteristic than ownership model in addressing concerns about higher administrative costs for smaller utilities, since some IOUs are small and some POUs are large. Figure 2 shows the share of utilities of each ownership model for selected utility size ranges. Table 1 shows the total number of utilities of each ownership model in the selected size ranges. Previous legislation has included different utility size thresholds for inclusion. Utilities that did not meet the specified size threshold would not have had a compliance obligation under those proposals. For example, S. 2146 in the 112 th Congress would have initially included utilities with at least 2 million megawatt-hours (MWh) of sales and then phased in smaller utilities of at least 1 million MWh of sales. The provisions of Title I of the Public Utility Regulatory Policies Act of 1978 (PURPA; P.L. 95-617 ) apply to utilities with at least 0.5 million MWh of sales. A potential consideration is the share of total U.S. electricity sales that would be covered by a portfolio standard if utility size thresholds were established. Figure 3 shows the share of total U.S. electricity sales associated with utilities of different sizes, for all ownership models. In 2017, 82% of U.S. electricity sales came from distribution utilities that had annual sales volumes greater than 2 million MWh, 87% came from utilities with sales greater than 1 million MWh, and 92% came from utilities with sales greater than 0.5 million MWh. The target of a portfolio standard refers to \"how much?\" and \"by when?\" A target might be defined for a single year (e.g., 50% of electricity sales in 2050), or it might be phased in over multiple interim periods (e.g., 25% of electricity sales in 2020â2029; 40% of electricity sales in 2030â2039; 80% of electricity sales in 2040â2049). Target phase-in can be implemented in different approaches, as shown in Figure 4 . Each of these approaches has different implications for how individual source types might be affected, though actual outcomes would be influenced by other factors such as future technology costs and electricity demand. Linear phase-in would tend to benefit existing sources and mature technologies with relatively short development timelines, such as wind and solar. These sources could be available to generate electricity and meet near-term compliance obligations. A back-end loaded phase-in might avoid near-term electricity price increases and allow time for commercialization of new technologies, but it might not result in desired environmental results in the near term. A stepped phase-in could balance the advantages and disadvantages of the other two options. It might also lead to uneven investment patterns, with periods of relatively high project development associated with target increases followed by periods of relatively low project development during target plateau periods. The stringency of a policy indicates the changes the policy might make in generation profile compared to a business-as-usual scenario. Generally, the stringency of the policy will be positively correlated to the costs and benefits of implementing the policy, so as policy stringency increases, the costs and benefits will also increase. For example, a portfolio standard target of 50% of electricity sales by 2050 would likely cost more to implement than a target of 25% of electricity sales by 2050, all else being equal. Similarly, a portfolio standard target of 30% of electricity sales by 2030 would likely cost more to implement than a target of 30% of electricity sales by 2050. At the same time, the more stringent options (i.e., the higher target percentage or the earlier target date) could result in greater technology innovation and lower greenhouse gas emissions than the less stringent options. Another way to describe portfolio standards' stringency is the net change in generation from eligible sources. This approach acknowledges that the national electricity generation profile is currently quite diverse with many types of sources. The net change is the difference between the final requirement of the portfolio standard (i.e., the target) and the share of generation from eligible sources before the policy is implemented. Suppose a portfolio standard required 20% of generation to come from wind and solar sources by 2020. These sources contributed 9% of electricity generation in 2018, so the net change required by such a portfolio standard would be 11%. The different ways to describe portfolio standard stringency could influence public perception of it. In this example, the same target could either be described as 20% or 11%, with potentially different implications for perceived costs and benefits. For portfolio standards that express compliance obligation as the percentage of electricity sales coming from clean energy sources, the base quantity is the denominator used to calculate the compliance obligation. The base quantity of electricity can determine the amount of generation from eligible sources a portfolio standard requires in absolute terms. It has been described as \"perhaps the most important and least understood concept in the design of a [portfolio standard].\" The base quantity could equal total electricity sales, but it need not. The base quantity could instead be a specified subset of total sales. Some portfolio standard proposals have excluded electricity generated from certain sources in the base quantity calculation (see Appendix ). Under such an approach, a utility with a compliance obligation would be incentivized to procure electricity from sources excluded from the base quantity because doing so would lower the amount of electricity from clean sources it would have to procure. To illustrate this point, consider a hypothetical portfolio standard with a 50% clean energy requirement. The compliance obligation for this portfolio standard would be expressed as If a utility sold 10 million MWh annually and the base quantity of electricity equaled the total sales, then the utility would have to procure 5 million MWh from clean energy sources. If electricity from certain sources were excluded from the base quantity, the required procurement changes. If a utility procured 1 million MWh of the 10 million MWh it sold from sources excluded from the base quantity, then the utility would have to procure 4.5 million MWh from clean energy sources. The portfolio standard, in this case, would incentivize the utility to procure electricity from both kinds of sources, namely those excluded from the base quantity and those defined as clean energy by the policy. The utility's incentive to procure electricity from sources excluded from the base quantity would generally be less than the incentive to procure electricity from clean energy sources, depending upon the cost of different energy sources and the overall portfolio standard stringency. If policymakers wanted to provide some policy support to certain sources, but less support than other sources receive, they might exclude certain sources from the base quantity calculation. A related consideration is the treatment of energy efficiency (EE) and DER (including, potentially, customer-sited energy storage). These result in reduced utility sales, so, to some extent, they are inherently included in the base quantity calculation. Utility investments that increased EE or generation from DER could also help the utility achieve compliance with a portfolio standard by reducing the amount of electricity it would have to procure from clean energy sources. For many utilities, reducing sales reduces the company's profitability, but some regulatory models are being developed and implemented in which profitability can be maintained or can increase as use of EE and DER increases. Future electricity demand, technology development, and technology costs are all uncertain. Ultimately, these uncertainties result in uncertainties around the cost to consumers of a portfolio standard, which could be an important consideration for lawmakers. To protect consumers from undesirably high electricity costs, portfolio standards can include provisions that reduce stringency in response to high costs. These various provisions are sometimes called safety valves. Safety valves need not be included in legislation, since Congress could amend a law establishing a portfolio standard in response to any concerns that developed. Including safety valves in legislation could, however, promote regulatory certainty for covered entities and consumers, because legislative action to address any concerns that might arise could potentially be a lengthy process. Another option could be for Congress to explicitly authorize an agency to implement safety valves. An alternative compliance payment (ACP) allows a utility to pay a fee in lieu of surrendering credits. The degree of cost control it might provide would depend on the level at which an ACP were set. For example, if electricity generation from eligible sources were available at 5 cents per kilowatt-hour (cents/kWh) and an ACP were 10 cents/kWh, utilities would likely procure electricity from the eligible sources instead of paying the ACP. If, however, the ACP were 3 cents/kWh, utilities would likely pay the ACP and procure electricity from ineligible sources. Use of ACP could be unlimited, or it could be limited to a certain share of overall compliance. If an ACP were included in a national portfolio standard, lawmakers would also have to decide how any collected revenue would be disbursed. One option would be to use the revenue to further desired policy goals, for example by funding greenhouse gas reduction programs or technology research and development. Another option would be to return the revenue to electricity consumers as a way of further reducing the cost impacts of a portfolio standard. Other options include treating it as general fund revenue, deficit or debt reduction, or other spending. Portfolio standards could include provisions to suspend or delay compliance with targets under certain conditions. These conditions could include compliance costs reaching a specified threshold or identification of reliability risks. Some cost containment for portfolio standards comes from the use of tradable credits to demonstrate compliance, especially if a portfolio standard allows unbundled credits. A low cost eligible source might be located outside of a utility's service territory. When utilities can use unbundled credits, they can demonstrate compliance by surrendering credits from this low cost source. The alternative, namely, disallowing tradable credits, could require utilities to procure electricity from high cost sources or could require the development of more sources than would be required to meet electricity demand, resulting in overall higher costs for consumers. One argument against unbundled credits is that they might not address concerns over localized concentrations of co-pollutants from conventional generators, known as hot spots. For example, if a utility procured electricity from an ineligible source that also emitted harmful air pollutants such as particulate matter or nitrogen dioxide, and the utility complied with the portfolio standard with credits associated with eligible sources located outside its service territory, hot spots might not be reduced to the extent they might be if unbundled credits were not allowed. Banking or borrowing could also decrease overall compliance costs. For instance, in years when utilities had access to many credits from low cost eligible sources, relative to what were required by the target, utilities might bank credits. If fewer credits were available in future years, relative to what were required by the target, a utility could surrender the banked credits, resulting in lower compliance costs. Banking could reduce a utility's exposure to volatility that can occur in electricity markets. This reduced risk can also reduce overall compliance costs, since a utility would not have to take other actions to reduce its risk exposure. To the extent that banking or borrowing could reduce the net change in generation, it might lead to reduced environmental benefits and reduced incentive for technology innovation. Alternatively, lawmakers could establish mechanisms to increase the stringency of a portfolio standard if certain thresholds were passed. Stringency could be increased by increasing the target to a higher percentage of electricity sales or moving the deadline to achieve the target to an earlier year. The trigger for such an action could be credit price, greenhouse gas emissions levels, technology development, or other thresholds. This might be one way to increase the desired benefits of a portfolio standard in cases where compliance costs were unexpectedly low. It might also create uncertainty for covered entities and potentially result in unintended consequences such as market participants avoiding actions they might otherwise take in order to avoid triggering a change in stringency. The previous section discussed some potential effects of different choices about design elements for a portfolio standard. A key theme in discussion of design elements is the balance between achieving policy objectives and minimizing electricity cost increases for consumers, assuming a portfolio standard were implemented. The potential effects discussed in this section might be characterized instead as the potential effect of a portfolio standard compared to business as usual. While the previous section addressed the question \"How can a portfolio standard be designed?,\" this section addresses the question \"What might happen if a portfolio standard were implemented?\" Any projections of the effects of a policy on the U.S. electric power sector are subject to uncertainty around various factors. These include future economic activity, electricity demand, energy costs (e.g., natural gas prices), and technology costs. Some factors may be more strongly influenced by decisions made by foreign governments than by the federal government. For example, international demand for electricity from solar energy could lower the cost to produce solar panels, or countries with large critical mineral resources could impose export bans, increasing the cost in the United States of any technology using those minerals. The overall effect on the American economy of a national portfolio standard would be influenced by multiple factors. Increased electricity costs could reduce economic activity, depending on the price response throughout the economy. Potential price responses are reduced electricity consumption, increased investment in efficiency measures, or reduced spending on other goods or services. Some price responses might have minimal effect on overall economic activity, for example if consumers shifted spending from electricity consumption to energy efficiency improvements. Potential economic effects might not be uniformly distributed. There could be regional differences in electricity price changes, given the geographic variability in energy resources. Utilities in regions with relatively less potential to develop eligible sources (i.e., regions in which eligible sources are relatively costlier) might buy credits from eligible generators in other regions. The cost of credits might result in higher electricity prices for customers of the utility buying credits. At the same time, customers of any utilities selling credits might see lower electricity prices. As discussed above, the ability to use unbundled credits for compliance could reduce overall compliance costs relative to the case where only bundled credits were allowed because utilities across the country could take advantage of low cost eligible sources. At the same time, unbundled credits could result in wealth transfer between different regions of the country. Policy design choices might affect any potential wealth transfer. Electricity prices already vary across the country as a result of differences in resource availability, electricity demand, and utility regulatory models. There might also be differences in cost distribution among household income levels. Generally, poorer Americans spend a larger portion of their income on electricity than wealthier Americans, so electricity cost increases could disproportionately affect them. Within the electric power sector, businesses associated with eligible sources might be positively affected while businesses associated with ineligible sources might be negatively affected. The affected businesses might be individual generators and also firms associated with their supply chains. For negatively affected businesses, the potential impacts might include loss of capital investment (sometimes referred to as stranded costs) and reduced employment. Communities surrounding a negatively affected generator might experience negative effects such as loss of tax revenue base and increased demands on social services. For positively affected businesses and communities, the opposite might be true, namely increased capital investment, increased employment, and other positive economic effects. Additionally, American businesses that develop goods or services used to comply with a portfolio standard could potentially expand into international markets, depending on whether eligible sources also experienced demand growth internationally. Depending on policy design details, local electricity market factors, and local energy resources, some existing businesses in the electric power sector could experience negligible effects of a potential national portfolio standard. Proponents of portfolio standards describe multiple environmental benefits, such as reduced greenhouse gas (GHG) emissions (i.e., climate change mitigation) and reduced air pollutants (i.e., improved air quality). The extent to which a portfolio standard might produce potential environmental benefits would depend in part on choices about source eligibility and stringency. Potential eligible sources vary in their GHG and air pollutant emissions, as well as other attributes such as water consumption and power density (which can affect land requirements). Implementation could affect environmental outcomes too. For example, some eligible sources might be deployable in either large-scale or small-scale installations, with differing effects on environmental factors such as land use. Some would argue these potential effects should be compared with potential effects of other energy options. A comprehensive comparison of potential environmental effects of various energy sources is beyond the scope of this report. The conditions under which federal law preempts state law can vary, and determination of federal preemption can be complex. Twenty-nine states, three U.S. territories, and the District of Columbia are currently implementing mandatory portfolio standards, and an additional eight states and one territory have voluntary versions. As of September 6, 2019, nine of these have targets of 100%. If Congress implemented a national portfolio standard, it could expressly preempt existing state portfolio standards. If a national portfolio standard were enacted that did not preempt state portfolio standards, utilities in states with existing portfolio standards might have to comply with both simultaneously. In practice, whichever standard had the higher stringency would determine the amount of eligible sources in a utility's portfolio. In this case, the relevant stringency could be either the required percentage of generation from eligible sources or the set of eligible sources itself. For example, some existing state portfolio standards include nuclear energy as an eligible source. If a national portfolio standard did not include nuclear energy, then a utility might be out of compliance with the federal standard even if it were in compliance with the state standard and the state and federal standard required the same amount of electricity from eligible sources. Assuming a generator were eligible for both a state and national program, a utility could procure electricity (or credits) from that generator to demonstrate compliance with both. In other words, the presence of two portfolio standards would not necessarily double the amount of procurement from eligible sources required. A utility covered under two portfolio standards might, however, face increased administrative costs associated with compliance. Although few technical barriers exist to the simultaneous operation of state and federal portfolio standards, other concerns may make this undesirable. Administrative cost burden for covered entities is one such concern. Another might be confusion for eligible sources about whether and how to receive credits for two portfolio standards. If Congress chose to preempt state programs, this could potentially disrupt project finances for recently developed or proposed sources and lead to investment losses in clean energy industries. Congress might also consider exempting utilities facing state portfolio standards of equal or greater stringency than the federal portfolio standards. Congress could also allow credits issued by states to be used for compliance with a federal program. This option would, effectively, allow a utility to use one credit to demonstrate compliance with two portfolio standards, though it could also reduce the policy outcomes relative to a utility having two distinct compliance obligations. An option included in some of the bills listed in the Appendix is to compensate utilities facing a state standard with a specified number of federal credits. Alternatively, Congress could choose not to explicitly address the question, and instead let state governments or judicial review decide whether state programs would be suspended if a national one were implemented. Under current law, state and local governments have authority for approving electricity generation and transmission assets. Compliance with a national portfolio standard might require new generation and transmission assets, but it is unclear to what extent state approval processes would consider national clean energy policy goals. Some stakeholders have argued that state approval processes for new electricity transmission lines, in particular, create barriers for deployment of certain electricity generation sources, especially wind. To the extent that a national portfolio standard required new transmission capacity, interest might increase in a stronger federal role in approving electricity transmission infrastructure. Congress has considered this in the past. For example, the Energy Policy Act of 2005 ( P.L. 109-58 ) authorized federal approval for some transmission infrastructure under certain conditions, though this authority has never been used. As noted in \" Potential Environmental Effects \" a national portfolio standard might alternatively incentivize distributed energy development or projects in other locations that might not require new transmission capacity. Some states have adopted policies to create competition among electricity generators, an effort known as deregulation or restructuring. In these states (and some portions of states), competitive electricity markets create price signals meant to, among other things, drive long-term investment decisions. Congress demonstrated support for restructuring efforts in the Energy Policy Act of 1992 ( P.L. 102-486 ). Portfolio standards require utilities to purchase electricity from sources that might be more expensive than other sources. This creates so-called out-of-market payments, sometimes characterized as subsidies, for eligible sources that could distort the operation of electricity markets. Eligible sources would still compete with each other for market share, creating some competitive pressure on prices among eligible sources. This section lists previously introduced legislation that would have established national portfolio standards. CRS searched congress.gov using the phrases \"renewable portfolio standard,\" \"clean energy standard,\" \"renewable energy standard,\" \"renewable electricity standard,\" \"renewable energy,\" and \"clean energy,\" in full bill text or bill summaries for all Congresses. The earliest bill identified in this search was introduced in the 105 th Congress. Search results were refined by including only the Subject-Policy Area terms \"Energy\" and \"Environmental Protection.\" Table A-1 provides selected policy design elements of the bills that would have established national portfolio standards that were identified using this search methodology. Bills are listed in order of introduction by Congress, with House bills listed first and Senate bills listed second. This table only provides information related to the bills' portfolio standards. Some of the bills in the table had multiple provisions, including some that might also affect the electric power sector, but those are not described here.", "summary": "Electricity portfolio standards, such as renewable portfolio standards and clean energy standards, are policies aimed at changing the energy sources used to generate electricity. Supporters identify multiple policy goals, including greenhouse gas reduction, technology inno vation, and job creation. Twenty-nine states, three U.S. territories, and the District of Columbia are currently implementing mandatory portfolio standards. Congress, to date, has not established a national portfolio standard, though bills that would do so have been introduced in every Congress since the 105 th . Congressional interest in 2011 and 2012 prompted a variety of analyses about potential impacts of a national portfolio standard. The national electricity generation profile has changed since then in ways that might make previous analyses less relevant to any future policy debate. Between 2012 and 2018, in the U.S. generation from coal fell (from 37% to 27%), generation from natural gas increased (from 30% to 35%), and generation from renewable sources (e.g., hydropower, wind, solar) increased (from 12% to 18%). Many expect these trends to continue, regardless of any new federal policy related to the electric power sector. Portfolio standards are generally envisioned as market-based policies in the sense that they use financial incentives rather than prohibitions to achieve policy goals. Several key concepts in portfolio standards are common to other market-based policies. Credits are an accounting mechanism used for compliance and are tracked in electronic databases sometimes called registries. Lawmakers can choose the degree of flexibility around credit use in a portfolio standard, with potential impacts on overall policy costs and benefits. Procedures to monitor, report, and verify credits can help portfolio standards achieve their policy goals and reduce the risk of fraud. Other concepts are specific to portfolio standards. Choices about these design elements can strongly influence policy outcomes. Generally, choices that would tend to reduce costs would also tend to result in fewer changes in the electricity generation profile. The choice of which energy sources would be eligible for compliance, and therefore would be incentivized by the program, is often central to policy discussions about portfolio standards. Past proposals have included a range of eligible sources, including renewable sources, nuclear, fossil fuel-fired power plants equipped with carbon capture and sequestration technology (CCS), and natural gas combined cycle power plants. Some proposals have included nongenerating sources like energy storage and energy efficiency as well. Other design elements include whether all utilities should have to comply with a portfolio standard or whether some would be exempted; how much generation from eligible sources a portfolio standard is designed to achieve; by when should the desired amount of generation from those sources be achieved; to what share of a utility's electricity sales should a portfolio standard apply; and whether any provisions should be included that delay or halt compliance under certain circumstances (e.g., undesirably high prices). If established, a national portfolio standard would likely have economic effects, though estimating these in advance is subject to some uncertainty. Any sources and associated industries excluded from the definition of eligible sources would likely experience negative economic effects. At the same time, industries associated with sources included in the standard would likely experience positive economic effects. The net effect on national economic activity would depend on the design details of any portfolio standard and the ways that consumers might respond to potentially higher electricity prices. A national portfolio standard might also have environmental effects compared to a business-as-usual scenario, depending on design choices such as source eligibility and the change from business as usual a portfolio standard is designed to achieve. Potential eligible sources vary in their GHG and air pollutant emissions, as well as other attributes such as water consumption and power density (which can affect land requirements). Implementation could affect environmental outcomes too. For example, deploying small-scale distributed eligible sources might have different effects than deploying large-scale eligible sources. Another policy consideration is potential interaction with state energy policies like existing portfolio standards, electricity infrastructure siting, and the use of competitive markets to influence electricity investment decisions. Such interactions may generate debate regarding preemption and highlight potential federalism concerns.", "document_type": "crs"}
{"report": "The Constitution reserves to Congress the power of the purse, exercised through legislation that grants federal agencies legal authority to enter into financial obligations that will result in outlays of federal funds. When Congress enacts authority for agencies to enter into financial obligations for particular purposes, it is called \"budget authority.\" Newly enacted budget authority and unspent balances of prior year budget authority are referred to collectively as \"budgetary resources.\" Budgetary resources include two types of spending. The first, \"discretionary spending,\" refers to budget authority provided in annual appropriations funding bills. Discretionary spending makes up about 30% of federal spending but receives the largest share of budgetary scrutiny, because appropriations bills are subject to congressional decisionmaking each fiscal year. The other 70% of federal spending is called \"mandatory\" or \"direct\" spending, because the budget authority flows directly from multiyear authorizing laws enacted outside the annual appropriations process. Examples of mandatory spending are entitlement programs, supplemental nutrition assistance, and multiyear highway bills enacted by authorizing committees. Sequestration is a budgetary mechanism that requires automatic cancellation of budgetary resources through across-the-board reductions to programs, projects, and activities. Since the creation of the sequester mechanism in the Balanced Budget and Emergency Deficit Control Act of 1985 (BBEDCA), it has been used to enforce a variety of fiscal policy goals. The Budget Control Act of 2011 (BCA) included two parts: discretionary spending caps for an initial tranche of budgetary savings and a \"Joint Committee process\" to achieve broader budgetary savings. For the initial tranche of budgetary savings, the BCA placed statutory limits on discretionary spending for each fiscal year from FY2012 through FY2021. At the time of enactment, the BCA discretionary spending caps were projected to save $917 billion over the ensuing decade. To accomplish the second, and larger, tranche of savings, the BCA established a bipartisan, bicameral Joint Select Committee on Deficit Reduction (Joint Committee). The committee was to negotiate a deficit reduction package to save another $1.5 trillion through FY2021. As a fallback, the BCA provided that automatic spending reductions would be triggered if Congress did not enact at least $1.2 trillion in budget savings by January 15, 2012. The deadline was not met, and this triggered the BCA's $1.2 trillion in automatic spending reductions. The automatic reductions were designed to achieve $1.2 trillion in budgetary savings by reducing both discretionary and mandatory spending each year through FY2021: Most of the $1.2 trillion in additional budgetary savings was to be achieved by reducing the discretionary spending caps. Subsequent legislation has partially or fully rolled back these additional discretionary spending reductions. The remainder of the $1.2 trillion in savings was to be achieved through annual across-the-board cuts (sequestration) in all nonexempt mandatory spending. This portion of the automatic reductions has been fully implementedâand extended for an additional eight years through FY2029 (see below, \"Extension of the Joint Committee Sequester\"). The BCA includes detailed statutory directions for the Office of Management and Budget (OMB) to calculate, and the President to implement, the Joint Committee reductions for each fiscal year through 2021. As summarized below, the calculation of the discretionary cap reductions and the across-the-board cuts in mandatory spending are interdependent even though the discretionary spending caps have been revised by subsequent legislation. OMB must still calculate the annual spending cap reductionsâas set forth in the 2011 statuteâin order to arrive at the mandatory spending cuts. The Joint Committee reductions are calculated as follows (see Figure 1 ): In order to achieve the required $1.2 trillion of deficit reduction, the BCA first subtracts 18% ($216 billion) for debt service savings associated with the required deficit reduction. It then divides the remainder ($984 billion) over the nine years of the BCA to arrive at a required annual reduction of $109.3 billion for each fiscal year from FY2013 through FY2021. The BCA required the annual reduction of $109.3 billion to be split evenly between defense spending and nondefense spending so that each category is reduced by $54.667 billion in each fiscal year through FY2021. The required reductions of $54.667 billion were allocated between discretionary spending and mandatory spending within each category subject to exemptions and special rules for particular programs. The required reductions in discretionary spending were implemented by lowering the BCA discretionary spending limits, although the required cap reductions have been superseded by legislation revising the caps. The required reductions in mandatory spending were achieved through the mandatory sequesterâautomatic across-the-board cuts in nonexempt mandatory spending. Step 1 . Under the BCA, total spending in the defense category must be reduced by $54.667 billion, allocated proportionally between discretionary appropriations and mandatory spending. OMB calculates how much of the defense spending base is discretionary versus mandatory. The BCA calculates the discretionary-to-mandatory ratio for the defense category as follows: defense discretionary spending is set by the BCA defense spending limit for FY2020, which is $630 billion; and mandatory spending is set by OMB's baseline estimate of (nonexempt) mandatory spending, which is $9.844 billion. This calculation results in a ratio of 98.46% for defense discretionary spending and 1.54% for defense mandatory spending. Step 2 . To achieve the required overall defense category reduction of $54.667 billion, these percentages result in a defense discretionary reduction of $53.825 billion and a defense mandatory reduction of $842 million. Step 3 . The required defense discretionary reduction lowers the spending cap to the adjusted cap level of $576.175 billion. This cap level is now superseded by the revised level enacted in the Bipartisan Budget Act (BBA) of 2019, which is $666.5 billion. Step 4 . The defense mandatory reduction of $842 million is achieved by dividing that amount into the nonexempt mandatory spending base of $9.844 billion. This results in an 8.6% across-the-board cut (sequestration) to be applied to all nonexempt defense budget accounts with mandatory spending. Once this uniform percentage is determined, Section 256(k)(2) of BBEDCA requires that sequestration be applied equally to all programs, projects, and activities (PPAs) within the affected budget accounts. The BCA calculations for the nondefense category have more steps than the defense calculations due to special requirements for Medicare and student loans that are explained below. Step 1 . Under the BCA, total spending in the nondefense category must be reduced by $54.667 billionâwith reductions in discretionary and mandatory spending. The largest portion of the mandatory sequestration comes from the Medicare program, which is subject to 2% across-the-board cuts. For FY2020, the portion of Medicare subject to the 2% sequester is estimated by OMB to have outlays of $765.495 billion, so a 2% reduction would reduce Medicare outlays by $15.310 billion. This leaves a required non-Medicare reduction of $39.357 billion from the remaining nondefense category. Step 2 . The remaining reduction of $39.357 billion is allocated proportionally between nondefense discretionary appropriations and nondefense (non-Medicare) mandatory spending. The BCA calculates the discretionary-to-mandatory ratio for the nondefense category as follows: nondefense discretionary spending is set by the BCA nondefense spending limit for FY2020, which is $578 billion; and nondefense mandatory spending is set by OMB's baseline estimate of (nonexempt, non-Medicare) mandatory spending, which is $75.518 billion. This calculation results in a ratio of 88.44% for nondefense discretionary spending and 11.56% for nondefense, non-Medicare nonexempt mandatory spending. To achieve the required non-Medicare nondefense reduction of $39.357 billion, these percentages result in a nondefense discretionary reduction of $34.807 billion and a nondefense (non-Medicare) mandatory reduction of $4.550 billion. Step 3 . The nondefense discretionary reduction is implemented by lowering the BCA spending cap by $34.807 billion to the adjusted cap level of $543.193 billion (although this cap level is now superseded by the revised level enacted in the BBA of 2019, which is $621.5 billion). Step 4 : Under OMB's calculation, the remaining reduction ($4.550 billion) to direct spending is achieved by applying a 5.9% uniform percentage reduction to non-Medicare nonexempt mandatory spending and increasing student loan fees by the same 5.9%. Once this uniform percentage is determined, Section 256(k)(2) of BBEDCA requires that sequestration be applied equally to all PPAs within the affected budget accounts. As discussed above, the BCA established statutory limits on discretionary spending for FY2013-FY2021 to achieve about $900 billion in budgetary savings. The BCA triggered an additional tranche of automatic budgetary savingsâ$1.2 trillion over FY2013-FY2021âwhen Congress's Joint Committee did not report, and Congress did not enact, at least $1.2 trillion in budget savings by January 15, 2012. The automatic Joint Committee reductions include changes in the discretionary spending limits and sequestration (across-the-board cuts) in mandatory spending. The requirement for a Joint Committee (mandatory) sequester in FY2013-FY2021 has been extended on five occasionsâto offset increases in discretionary spending and other legislationâand is now required for each fiscal year through FY2029: The BBA of 2013 ( H.J.Res. 59 , P.L. 113-67 ) amended BBEDCA to increase the discretionary spending limits for FY2014 and FY2015 and added two years to the Joint Committee mandatory sequester (FY2022 and FY2023). P.L. 113-82 ( S. 25 , an Act relating to cost of living adjustments for military retirees, February 15, 2014) amended BBDECA to add one year to the Joint Committee mandatory sequester (FY2024). The BBA of 2015 ( H.R. 1314 , P.L. 114-74 ) amended BBEDCA to increase the discretionary spending limits for FY2016 and FY2017 and added one year to the Joint Committee mandatory sequester (FY2025). The BBA of 2018 ( H.R. 1892 , P.L. 115-123 ) amended BBEDCA to increase the discretionary spending limits for FY2018 and FY2019 and added two years to the Joint Committee mandatory sequester (FY2026 and FY2027). The BBA of 2019 ( H.R. 3877 , P.L. 116-37 ) amended BBEDCA to increase the discretionary limits for FY2020 and FY2021 and added two years to the Joint Committee mandatory sequester (FY2028 and FY2029). As explained above, the Joint Committee mandatory sequester is calculated based on the statutory requirement to save $109.3 billion in each fiscal year from FY2013 through FY2021, with half of the savings coming from defense and half from nondefense programs. The defense and nondefense reductions of $54.667 billion per year are apportioned between discretionary and mandatory programs according to the formulas explained in the FY2020 illustrations above. After FY2021, there is no statutory requirement to achieve $54.667 billion in budgetary savings in defense and nondefense spending and, consequently, no specific amounts to apportion to mandatory (or discretionary) savings. Therefore, the statutes extending the Joint Committee mandatory sequester have tied the defense and nondefense mandatory savings for FY2022-FY2029 to the uniform percentage reductions to be calculated by OMB for FY2021 in the Report on the Joint Committee Reduction that is to be released concurrent with the President's budget in February 2020. This means that for FY2022-FY2029 the percentage reduction for nonexempt direct spending for the defense category is the same percent as the percentage reduction for the defense category for FY2021, and the percentage reduction for nonexempt direct spending for the nondefense category is the same percent as the percentage reduction for the nondefense category for FY2021. Sequestration is a cancellation of budgetary resources by the Presidentârequired by statuteâin all nonexempt programs and accounts. While many programs and activities are fully or partially exempted from the mandatory sequester, the mechanism nevertheless has a broad reach. In addition to the sequestration of Medicare payments, the Joint Committee sequester automatically reduces more than 200 budget accounts impacting a broad array of programs, including Affordable Care Act cost-sharing reduction subsidies and risk adjustment; farm price and income supports; compensation and services for crime victims; citizenship and immigration services; agricultural marketing services and conservation programs; animal and plant health inspection; Federal Deposit Insurance Corporation orderly liquidation operations; vocational rehabilitation services; mineral leasing payments; Centers for Medicare and Medicaid Services (CMS) program management; social services block grants; Departments of Justice and the Treasury law enforcement activities; student loan origination fees; highway performance; school construction bonds; spectrum relocation activities; Trade Adjustment Assistance; Consumer Financial Protection Bureau; Drug Enforcement Administration operations; Tennessee Valley Authority; fish and wildlife restoration and conservation; affordable housing; the maternal, infant, and early childhood home visiting program; and Gulf Coast restoration. Many programs and activities are exempt from sequestration under Section 255 of BBEDCA (2 U.S.C. Â§905; see Appendix E for a complete list of exemptions). In dollar terms, three-quarters of all mandatory spending is exempt from the mandatory sequester as illustrated in Figure 2 . In addition to program exemptions, several programs are subject to special rules, including a 2% limit on sequestration reductions to Medicare, explained below. Medicare is the federal health insurance program for people who are 65 or older, for younger people with permanent disabilities, and for people of any age with end-stage renal disease. It is the largest mandatory spending program subject to sequestration, although special rules limit the sequestration of Medicare benefit payments to 2% rather than the uniform percentage applied to other nonexempt mandatory spending programs (5.9% in FY2020). Most Medicare spendingâ$765.5 billion in FY2020âis subject to the 2% sequester including payments to health care providers for hospitalizations, physician services, prescription drugs, skilled nursing facility care, home health visits, and hospice care. Generally, Medicare's provider payment and benefit structure remains unchanged under a mandatory sequestration order, and beneficiaries see few direct impacts. However, the indirect impact on particular health care providers and beneficiaries is more complexâparticularly for Medicare Advantage and Part D prescription drug coverage. In \"traditional Medicare,\" the program pays providers on a fee-for-service basis, and the 2% sequester reduction is applied directly to provider payments. Under Medicare Advantage, by contrast, private health plans are paid a per-person (\"capitated\") monthly amount to provide nearly all Medicare-covered benefits to beneficiaries who enroll in their plans. The Joint Committee 2% sequester is applied to Medicare's monthly capitation payment and the Medicare Advantage Organizations (MAOs) administering the plans determine how the reduced capitation payments are to be distributed among medical providers, administrative expenses, risk adjustments, and plan rebates to beneficiaries. Similarly, under Medicare Part D, the optional outpatient prescription drug benefit plans are paid through capitated monthly payments (the \"direct subsidy\") to private plans. The 2% Medicare sequester reduces these monthly direct subsidy amounts. A key consequence of the 2% Medicare sequester limit is that it increases the uniform percentage reduction applied to non-Medicare mandatory programs. For example, in FY2020, if there were no 2% limit on the Medicare sequester, a uniform percentage reduction applied to all nonexempt mandatory spending (including Medicare) would be 3.9% rather than the 5.9% reduction applied in the October 1, 2019, sequester order. Medicare sequester special rules follow: Part D low-income subsidies, Part D catastrophic subsidies (reinsurance), and Qualifying Individuals Part B premium assistance are exempted from sequestration. Medicare administrative expenses , if classified as mandatory spending, are subject to the full Joint Committee mandatory sequester (5.9% in FY2020) rather than protected by the 2% limit. Special rules determine whether Health Care Fraud and Abuse Control Program (HCFAC) funds are subject to the 2% limit. After a sequester order is issued, Medicare payments are sequestered beginning on the first day of the following month and remain in effect during the following one-year period, even if there is an intervening sequester order. The total amount sequestered from Medicare depends on actual Medicare spending in a given year rather than an amount based on OMB's estimate. (For example, if actual Medicare outlays exceed the estimated amount included in a sequestration order, the additional outlays would be subject to the sequester.) Medicare sequestration in FY2029 is subject to a special ruleâ4% during the first six months and 0% for the second six months of the order. Sequestration impacts federal student loans differently than it does other programs. For federal student loans, sequestration is applied to student loan origination fees. The origination fee is money the borrower (that is, the student or the student's parents) pays to the federal government to offset the costs of issuing the loan. The fee is calculated as a percentage of the loan's total and is subtracted from the loan amount. Direct Subsidized Loans and Direct Unsubsidized Loans generally have a fee of about 1%, and Direct PLUS loans generally have a fee of about 4%. For example, if a student's parents take out a federal PLUS loan of $16,450, with an origination fee of 4.248%, about $15,750 of the loan would go to the school and $700 to the federal government for the origination fee. Special sequestration rules (BBEDCA Â§256 , 2 U.S.C. Â§906 ) for student loans provide that the federal budgetary savings are achieved by increasing the origination feeâthe money going to the federal Treasuryârather than reducing the overall loan amount. For example, for FY2020, the 5.9% uniform sequester percentage is to be applied as an increase to federal student loan origination fees. In the above example, the result would be that the $700 origination fee would be increased by 5.9% or about $41âthe effect of which would be to reduce the amount of the loan going to the school. Community and migrant health centers providing primary care to people who have financial, geographic or other barriers to health care are supported by discretionary and mandatory funding under the Affordable Care Act. In years when mandatory spending is estimated, at the time OMB calculates a sequester, the spending reductions are limited to a 2% sequester. Indian Health Service (IHS) provides health services to 2.6 million American Indians and Alaska Natives. While most IHS funding is provided through discretionary appropriations, IHS receives mandatory appropriations for programs including treatment of diabetes. In years when mandatory spending is estimated at the time OMB calculates a sequester, the spending reductions are limited to a 2% sequester. Administrative expenses : Federal administrative expenses are subject to sequestrationâeven if they are incurred in connection with a program that is exempt or subject to a special rule. However, this special rule applies only to administrative expenses classified as mandatory spending. Defense unobligated balances: Unobligated balances of budget authority carried over from prior fiscal years in the defense category are subject to the mandatory sequester pursuant to Section 255(e) of BBEDCA. Intragovernmental payments: For intragovernmental payments, sequestration is applied to the paying account. The funds are generally exempt in the receiving account in accordance with Section 255(g)(1)(A) of BBEDCA so that the same dollars are not sequestered twice. Revo lving, trust, and special fund accounts and offsetting collections: Budgetary resources in revolving, trust, and special fund accounts and offsetting collections reduced by a mandatory sequester are not available for obligation during the fiscal year in which the sequestration occurs but are available in subsequent years to the extent otherwise provided. Appendix A. Mandatory Sequester by Fiscal Year Appendix B. FY2020 Programmatic Impact of the Joint Committee Sequester On March 18, 2019, OMB, as part of its annual budget transmittal to Congress and as required by the BCA, released the OMB Report to Congress on the Joint Committee Reductions for Fiscal Year 2020 . In addition to setting forth the calculations of the upcoming fiscal year's sequester as required by statute, the report includes account-by-account detail of the amount by which each mandatory spending account is required by statute to be reduced at the beginning of the new fiscal year. Specifically, the report identifies four mandatory spending accounts to be reduced by the 2% Medicare sequester, six mandatory spending accounts to be reduced by the 8.6% defense sequester, and 208 mandatory spending accounts to be reduced by the 5.9% nondefense sequester. For illustrative purposes, the table below displays the FY2020 mandatory sequester reductions of $20 million or more, with brief descriptions of the programs. For a complete list of mandatory spending accounts subject to sequester for FY2020, see the Appendix of the OMB Report to Congress . Appendix C. Sequestration Order for FY2020 EXECUTIVE ORDERS Sequestration Order for Fiscal Year 2020 Issued on: March 18, 2019 By the authority vested in me as President by the laws of the United States of America, and in accordance with section 251A of the Balanced Budget and Emergency Deficit Control Act (the \"Act\"), as amended, 2 U.S.C. 901a, I hereby order that, on October 1, 2019, direct spending budgetary resources for fiscal year 2020 in each non-exempt budget account be reduced by the amount calculated by the Office of Management and Budget in its report to the Congress of March 18, 2019. All sequestrations shall be made in strict accordance with the requirements of section 251A of the Act and the specifications of the Office of Management and Budget's report of March 18, 2019, prepared pursuant to section 251A(9) of the Act. DONALD J. TRUMP THE WHITE HOUSE March 18, 2019. Appendix D. OMB Description of Sequester Calculations Each year through FY2021, concurrent with transmittal of the President's budget, OMB transmits to Congress a report explaining the Joint Committee reductions for the upcoming fiscal year. Relevant portions of the OMB report for FY2020 are included below to illustrate how OMB calculates the mandatory sequester percentages. (The footnotes appearing in this Appendix are from the OMB report.) OMB Report to the Congress on the Joint Committee Reductions for Fiscal Year 2020âMarch 18, 2019 The Balanced Budget and Emergency Deficit Control Act (BBEDCA) requires the Office of Management and Budget (OMB) to calculate reductions of fiscal year (FY) 2020 budgetary resources and provide them to the Congress with the transmittal of the Budget. This report provides OMB's calculations of the reductions to the discretionary spending limits (\"caps\") specified in section 251(c) of BBEDCA for FY 2020 and a listing of the FY 2020 reductions required through sequestration for each nonexempt budget account with direct spending. OMB calculates that the Joint Committee reductions will lower the discretionary cap for the revised security (defense) category by $54 billion and for the revised nonsecurity (nondefense) category by $35 billion. Additionally, the Joint Committee reductions require sequestration reductions to nonexempt direct spending of 2.0 percent to Medicare, 5.9 percent to other nonexempt nondefense mandatory programs, and 8.6 percent to nonexempt defense mandatory programs. Calculation of Annual Reduction by Function Group Under section 251A of BBEDCA, the failure of the Joint Select Committee on Deficit Reduction to propose, and the Congress to enact, legislation to reduce the deficit by $1.2 trillion triggers automatic reductions in FY 2020 through adjustments in the discretionary spending limits and sequestration of direct spending. As shown in Table D-1 , the total amount of deficit reduction required is specified by formula in section 251A(1), starting with the total reduction of $1.2 trillion required for FY 2013 through FY 2021, deducting a specified 18 percent for debt service savings, and then dividing the result by nine to calculate the annual reduction of $109 billion for each year from FY 2013 to FY 2021. Section 251A(2) requires the annual reduction to be split evenly between budget accounts in function 050 (defense function) and in all other functions (nondefense function), so that each function group will be reduced by $54.667 billion. Base for Allocating Reductions and Method of Reduction The annual reduction is further allocated between discretionary and direct spending within each of the function groups. Once the reductions are allocated, separate methods are used to implement the reductions for discretionary appropriations and direct spending. Discretionary Reductions. The base for allocating reductions to discretionary appropriations is the discretionary spending limit for FY 2020 set forth in section 251(c). The reductions are implemented by lowering the discretionary spending limits for the revised security (defense) category and the revised nonsecurity (nondefense) category. Direct Spending Reductions. Pursuant to paragraphs (3) and (4) of section 251A, and consistent with section 6 of the Statutory Pay-As-You-Go Act of 2010, the base for allocating reductions to budget accounts with direct spending is the sum of the direct spending outlays in the budget year and the subsequent year that would result from sequestrable budgetary resources in FY 2020. Estimates of sequestrable budgetary resources and outlays for budget accounts with direct spending are equal to the current law baseline amounts contained in the President's FY 2020 Budget, and include direct spending unobligated balances in the defense function and Federal administrative expenses that would otherwise be exempt. The majority of estimated direct spending unobligated balances in the defense function are in Department of Defense accounts. The Department of Defense estimates of unobligated balances as of October 1, 2019, are consistent with the estimates in the FY 2020 Budget. For purposes of applying the Joint Committee sequestration to direct spending under BBEDCA, \"administrative expenses\" for typical Government programs are defined as the object classes for personnel compensation, travel, transportation, communication, equipment, supplies, materials, and other services. For Government programs engaging in commercial, business-like activities, administrative expenses constitute overhead costs that are necessary to run a business, and not expenses that are directly tied to the production and delivery of goods or services. The reductions to direct spending are implemented through sequestration of nonexempt budgetary resources. Pursuant to sections 251A(6), 255, and 256, most direct spending is exempt from sequestration or, in the case of the Medicare program and certain other health programs, is subject to a 2 percent limit on sequestration. Defense Function Reduction Steps 1 and 2 on Table D-2 show the calculation of the reduction required for discretionary appropriations and direct spending within the defense function. Steps 3 and 4 on Table D-2 reflect the implementation of the reductions calculated in steps 1 and 2 through an adjustment to the discretionary spending limit for the defense category and a sequestration of direct spending in the defense function. The calculation of the reduction involves the following steps: Step 1 . Pursuant to section 251A(3), the total reduction of $54.667 billion is allocated proportionately between discretionary appropriations and direct spending. The total base is the sum of the FY 2020 discretionary spending limit for the defense category ($630 billion) and OMB's baseline estimates of sequestrable direct spending outlays ($9.844 billion) in the defense function in FY 2020 and FY 2021 from direct spending sequestrable resources in FY 2020. Discretionary appropriations comprise approximately 98 percent of the total base in the defense function. Step 2 . Total defense function spending must be reduced by $54.667 billion. As required by section 251A(3)(A), allocating the reduction based on the ratio of the discretionary spending limit to the total base (the sum of the defense discretionary spending limit and sequestrable direct spending) yields a $53.825 billion reduction required to be made to discretionary appropriations. Under section 251A(3)(B), the remaining $0.842 billion is the reduction required for budget accounts with direct spending. The implementation of the reductions involves the following steps: Step 3 . As required by section 251A(5)(B), the discretionary spending limit for the defense category is lowered by the amount calculated in step 2, which results in a discretionary defense cap for FY 2020 of $576.175 billion. Step 4 . As required by section 251A(6), the percentage reduction for nonexempt direct spending is calculated by dividing the direct spending reduction amount ($0.842 billion) by the sequestrable budgetary resources ($9.844 billion) for budget accounts with direct spending, which yields a 8.6 percent sequestration for budget accounts with nonexempt direct spending. Nondefense Function Reduction Steps 1 and 2 on Table D-3 show the calculation of the reduction required for discretionary appropriations and direct spending within all other functions besides 050 (nondefense function). The calculation is more complicated than the calculation for the defense function due to a two percent limit in the reduction of Medicare non-administrative spending and a special rule for applying the reduction to student loans. Steps 3 and 4 on Table D-3 reflect the implementation of the reductions calculated in steps 1 and 2 through an adjustment to the discretionary spending limit for the nondefense category and a sequestration of direct spending in the nondefense function. The calculation of the reduction involves the following steps: Step 1 . Total spending in the nondefense function must be reduced by $54.667 billion. The portion of Medicare subject to the two percent limit is estimated to have combined FY 2020 and FY 2021 outlays of $765.495 billion from FY 2020 budgetary resources, so a two percentage point reduction would reduce outlays by $15.310 billion, leaving a reduction of $39.357 billion to be taken from discretionary appropriations and other direct spending in the nondefense function. Step 2 . Pursuant to section 251A(4), the remaining reduction of $39.357 billion is allocated proportionately between discretionary appropriations and other direct spending in the nondefense function. The base ($653.518 billion) is the sum of the FY 2020 discretionary spending limit for the nondefense category ($578.000 billion) and the remaining sequestrable direct spending base ($75.518 billion). The latter amount equals OMB's 2020 Budget baseline estimates of total sequestrable direct spending outlays in the nondefense function in FY 2020 and FY 2021 from direct spending sequestrable resources in FY 2020 ($841.013 billion) minus the portion of Medicare subject to the two percent limit ($765.495 billion). Discretionary appropriations account for 88.44 percent of the remaining base in the nondefense function, and direct spending accounts for 11.56 percent. As required by section 251A(4), applying these percentage allocations to the remaining required reduction for programs in the nondefense function yields the reduction for discretionary appropriations ($34.807 billion) and for remaining direct spending ($4.550 billion). The implementation of the reductions involves the following steps: Step 3 . As required by section 251A(5)(B), the discretionary spending limit for the nondefense category is lowered by the amount calculated in step 2, which results in a discretionary nondefense cap for FY2020 of $543.193 billion. Step 4 . The remaining reduction ($4.550 billion) to direct spending is applied as a uniform percentage reduction to the remaining budget accounts with sequestrable direct spending and by increasing student loan fees by the same uniform percentage, as specified in sections 251A(6) and 256(b). Each percentage point increase in the sequestration rate is estimated to result in $0.010 billion of savings in the direct student loan program. Solving simultaneously for the percentage that would achieve the remaining reduction when applied to both the remaining sequestrable direct spending ($75.518 billion) and to student loan fees yields a 5.9 percent reduction. This percentage reduction yields outlay savings of $0.059 billion in the direct student loan program and $4.491 billion from the remaining budget accounts with nonexempt direct spending. Appendix E. List of Federal Programs Exempt from the Mandatory Sequester Many programs and activities are exempt from the mandatory sequester under Sections 255 and 256(d)(7) of BBEDCA (2 U.S.C. Â§905). In dollar terms, three-quarters of all mandatory spending is exempt from the mandatory sequester (see Figure 2 ). Exempt manda tory spending programs include Social Security benefits and Tier I railroad retirement benefits Veterans' compensation, pensions, life insurance Net interest (payments on accumulated federal debt) Refundable income tax credits Nondefense unobligated balances of budget authority carried over from prior fiscal years Claims, judgments, and relief acts Exchange Stabilization Fund Federal Deposit Insurance Corporation, Deposit Insurance Fund Federal Home Loan Mortgage Corporation (Freddie Mac) Federal Housing Finance Agency, administrative expenses Federal National Mortgage Corporation (Fannie Mae) Federal Reserve Bank Reimbursement Fund National Credit Union Administration funds Federal retirement and disability including civil service, military, foreign service, and judicial Low-income programs including Child Care Entitlement to States Child Nutrition Programs (with the exception of Special Milk) Children's Health Insurance Program Family support programs (including Child Support Enforcement) Federal Pell Grants (under Section 1070a of Title 20) Grants to states for Medicaid Medicare Part D low-income subsidies, catastrophic subsidies, and Qualified Individual premiums Payments for foster care and permanency Supplemental Nutrition Assistance Program (formerly \"food stamps\") Supplemental Security Income Temporary Assistance for Needy Families Economic recovery programs including GSE preferred stock purchase agreements, Office of Financial Stability Federal-Aid Highways and Safety Programs Unemployment compensation (but federal share of extended benefits is not exempt) Postal Service Fund Salaries of Article III judges Certain tribal and Indian trust accounts Universal Service Fund Various prior legal obligations of the government including Credit liquidating accounts Federal Crop Insurance Corporation Fund (however, farm price and income supports are not exempt from the Joint Committee sequester) Federal Emergency Management Agency, National Flood Insurance Fund Pension Benefit Guaranty Corporation Fund Terrorism Insurance Program. Appendix F. Additional CRS Resources on Sequestration CRS Insight IN11148, The Bipartisan Budget Act of 2019: Changes to the BCA and Debt Limit , by Grant A. Driessen and Megan S. Lynch. CRS Report R44874, The Budget Control Act: Frequently Asked Questions , by Grant A. Driessen and Megan S. Lynch. CRS Report R45106, Medicare and Budget Sequestration , by Patricia A. Davis. CRS Report R42050, Budget \"Sequestration\" and Selected Program Exemptions and Special Rules , coordinated by Karen Spar. CRS Report R42972, Sequestration as a Budget Enforcement Process: Frequently Asked Questions , by Megan S. Lynch. CRS Report R43133, The Impact of Sequestration on Unemployment Insurance Benefits: Frequently Asked Questions , by Katelin P. Isaacs and Julie M. Whittaker. ", "summary": "The Budget Control Act of 2011 (BCA; P.L. 112-25 ) included two parts: discretionary spending caps, plus a \"Joint Committee process\" to achieve an additional $1.2 trillion in budgetary savings over FY2013-FY2021. For the initial tranche of savings, the BCA placed statutory limits on discretionary spending for each fiscal year from FY2012 through FY2021. At the time of enactment, the BCA discretionary spending caps were projected to save $917 billion. For the second, and larger, tranche of savings, the BCA established a bipartisan, bicameral Joint Select Committee on Deficit Reduction (\"Joint Committee\") to negotiate a broad deficit reduction package to save another $1.5 trillion through FY2021. As a fallback, the BCA provided that automatic spending reductions would be triggered if Congress did not enact at least $1.2 trillion in budget savings by January 15, 2012. The deadline was not met, which triggered the BCA's $1.2 trillion in automatic spending reductions. The automatic reductions were designed to achieve $1.2 trillion in budgetary savings by reducing both discretionary and mandatory spending in each year through FY2021. The largest share of the $1.2 trillion in additional savings was to be achieved by reducing the discretionary spending caps and the remainder through annual across-the-board cuts (sequestration) in all nonexempt mandatory spending. The mandatory spending portion of the automatic reductions (referred to in this report as the \"Joint Committee sequester\") has been fully implemented in each year since FY2013. It has been extended five times and is now, under current law, effective for each fiscal year through FY2029. This report explains the BCA provisions that established and triggered the Joint Committee sequester, the annual sequester calculations by OMB, the extension and calculation of the Joint Committee sequester through FY2029, the broad scope of the sequester across the federal budget, and sequester exemptions and special rules. The appendixes include a table summarizing each sequester since FY2013, a summary of the FY2020 sequester reductions, the text of the FY2020 sequester order, the text of the OMB sequester calculation, a list of mandatory sequester exemptions, and additional CRS resources on sequestration.", "document_type": "crs"}
{"report": "In an Executive Order (E.O. 13767) released during President Donald Trump's first week in office, on January 25, 2017, he declared, \"It is the policy of the executive branch to â¦ secure the southern border of the United States through the immediate construction of a physical wall on the southern border â¦ [and] 'Wall' shall mean a contiguous, physical or other similarly secure, contiguous, and impassable physical barrier.\" The Trump Administration has consistently pursued the deployment of fencing, walls, and other barriers along the U.S.-Mexico border as a high priority. On April 4, 2018, the President, citing \"a drastic surge of activity on the southern border,\" directed the Secretary of Defense, the Attorney General, and the Secretary of Homeland Security to coordinate action on securing the U.S. southern border \"to stop the flow of deadly drugs and other contraband, gang members and other criminals, and illegal aliens into this country.\" The President further directed DOD to mobilize the National Guard to support DHS at the border and to develop a plan for tapping additional military resources using executive authorities. Later that year, as part of budget negotiations over a FY2019 appropriations package, the Administration submitted a supplemental request of $5.7 billion for \"construction of a steel barrier for the Southwest border.\" The new funding request became the focal point of a partial government shutdown that began on December 22, 2018, and lasted 35 days, the longest on record. Unsatisfied with the negotiated agreementâwhich provided $1.375 billion of the Administration's supplemental $5.7 billion requestâPresident Trump declared a national state of emergency and undertook a series of executive actions that redirected $6.1 billion in DOD funds for border barrier construction using a combination of authorities. The Administration's plans were described in a fact sheet entitled, President Donald J. Trump 's Border Security Victory (hereinafter referred to as the factsheet ), and included $2.5 billion in defense funds authorized under (nonemergency authority of) 10 U.S.C. Â§284â Support for counterdrug activities and activities to counter transnational organized crime . $3.6 billion in defense funds authorized under (emergency authority of) Title 10 U.S.C. Â§2808â Construction authority in the event of a declaration of war or national emergency . This report is intended to provide a chronological summary of internal and interagency communication related to DOD's execution of President Trump's border wall funding plan. The information provided here has been drawn chiefly from court exhibits and declarations in ongoing legal proceedings. CRS has not independently authenticated the sworn declarations and accompanying documents submitted by litigants as part of legal proceedings. A declaration in court records describing communications with DOD suggests that DOD anticipated the use of 10 U.S.C. Â§284 to fund border barrier projects in early 2018 when the Under Secretary of Defense (Comptroller) temporarily froze $947 million in unobligated funds from the defense Drug Interdiction and Counter-Drug Activities account for possible construction of barriers on the Southwest Border. The frozen FY2018 appropriations were released beginning in July 2018, the final quarter of FY2018. In April 2018, DOD created a new office within the Department called the b order s ecurity s upport c ell with responsibility for coordinating and managing all border related issues. Assistant Secretary of Defense for Homeland Defense and Global Security, (ASD[HD&GS]) Kenneth Rapuano led the effort. In a letter to DOD dated February 25, 2019, following the release of the Administration's factsheet plan, DHS formally requested that the Defense Department support its ability to impede and deny illegal entry and drug smuggling activities along the southwest U.S.-Mexico border by assisting with the construction (or replacement) of fences, roads, and lighting. DHS specifically requested that DOD fund a total of 11 border barrier projects on federal lands. In a written reply dated March 25, 2019, to Acting Secretary of Homeland Security Kirstjen Nielsen, Acting Secretary of Defense Patrick Shanahan affirmed that the U.S. Army Corps of Engineers (USACE) would undertake the planning and construction of approved projects and, upon completion, hand over custody of all new infrastructure to DHS. Between March and April 2019, DOD approved $2.5 billion for seven of the border barrier projects requested by DHS and funded them in two tranches drawn from reprogrammed defense program savings. DOD completed a transfer of $1 billion for three projects (El Paso Sector Project 1 and Yuma Sector Projects 1-2) on March 26, 2019. On May 9, 2019, the Department completed a second transfer of $1.5 billion for four additional projects (El Centro Sector Project 1 and Tucson Sector Projects 1-3). The obligation of these funds was temporarily suspended by court injunctions between May and July 2019 issued in a lawsuit that challenged the legal basis of DOD's reprogramming actions. On July 26, 2019, the U.S. Supreme Court lifted the lower court's injunction, allowing work to once again proceed. Litigation in this case (and related) lawsuits remains ongoing. In August 2019, DHS notified DOD that new estimates indicated construction costs would be lower than first projected, resulting in an overall funding surplus. DHS requested the anticipated savings be applied to the execution of three additional projects. DOD approved the request but later terminated the plan after savings proved insufficient. On September 30, 2019, DOD announced the transfer of an additional $129 million in expiring FY2019 appropriations drawn from counternarcotics accounts that Military Departments determined were excess to need. The Department also stated USACE would require an additional $90 million in FY2020 funds for the management and oversight of border barrier projects underway. Unlike the Administration's use of the previous $2.5 billion in transfers, which derived largely from defense program savings drawn from non -drug related appropriations, the Administration plans to fund the anticipated costs in FY2020 from appropriations made directly to the counternarcotic account. On January 14, 2020, DHS requested DOD provide additional assistance, pursuant to 10 U.S.C. Â§284, with the construction of 38 new border barrier projects (and project segments) along drug smuggling corridors. On February 13, 2020, DOD approved 31 of these items and reprogrammed $3.8 billion in FY2020 military procurement funds for their execution. All $3.8 billion in reprogrammed funds were drawn from congressional special interest items included in the final FY2020 defense appropriation, P.L. 116-93 . Unlike DOD's use of 10 U.S.C. Â§284 transfer authority, which the Department began executing almost immediately following the release of the President's factsheet , its determination to exercise emergency statute 10 U.S.C. Â§2808 was the result of approximately eight months of additional deliberations. These deliberations included two assessments by the Chairman of the Joint Chiefs of Staff (CJCS) to determine whether the construction of border barriers qualified as a legitimate use under the requirements of 10 U.S.C. Â§2808. The statute specifies that new construction must support the use of armed forces mobilized to address a national emergency declared by the President. On February 11, 2019, CJCS provided a preliminary assessment to the Acting Secretary of Defense that broadly assessed the utility of physical barriers on DHS operations, as well as ongoing demand for DOD support. The report acknowledged empirical challenges associated with quantifying the effectiveness of physical barriers on migration flows \"because reliable data is scarce and opinions are divergent,\" but pointed to anecdotal and historical evidence to suggest that barriers might reasonably be expected to reduce the demand for DOD resources over time: Although military construction projects along the southern border may not alleviate all DHS requirements for DoD support, the construction of physical barriers should reduce the challenges to CBP and, therefore, can be reasonably expected to reduce DHS requirements for DoD support. On February 18, 2019, following the release of the Administration's factsheet plan, DOD requested that DHS provide a prioritized list of projects along with a supplemental analysis explaining how the construction would support military personnel pursuant to 10 U.S.C. Â§2808. DHS responded in March with the detailed information, characterizing the projects as force multipliers for mobilized DOD personnel: Because the requested projects will serve as force multiplier, it will also likely reduce DHS's reliance on DoD for force protection, surveillance support, engineering support, air support, logistical support, and strategic communications assistance. In other words, providing border barriers and the accompanies [sic] roads and technology will allow DoD to focus its efforts on a smaller, more focused area. In April 2019, having received the list of DHS projects, the Secretary of Defense requested the CJCS conduct a second, more detailed analysis of proposed construction and return with a recommendation on how to proceed. Concurrently, the Secretary directed the Under Secretary of Defense (Comptroller) to begin identifying $3.6 billion in existing military construction projects that might be deferred by use of the emergency authority under the statute. In a memorandum report dated May 2019, CJCS General Joseph Dunford delivered his final assessment to Acting Secretary of Defense Shanahan. The report's methodology was based on the presumption that while any barrier construction along the border could reasonably be expected to create \"ripple effects\" that would support the use of the armed forces, projects more beneficial than others should be prioritized, based on factors identified by DOD. The analysis assessed border barrier projects DHS had requested under 10 U.S.C. Â§2808, as well as those projects not funded by previous transfers under 10 U.S.C. Â§284. Though the CJCS team considered the type of land associated with each project area (federal or private), it developed a prioritization scheme that was missing key details related to land jurisdiction. As a consequence, the CJCS' final recommendations were later revised and included in an action memorandum to the Secretary of Defense on August 21, 2019. On September 3, 2019, Secretary of Defense Mark Esper, having determined that border barrier construction would serve as a \"force multiplier\" for reducing DHS's demand for DOD personnel and assets, directed the Acting Secretary of the Army to proceed with the construction of 11 DHS border barrier projects, and the deferral of approximately 127 existing military construction projects ($3.6 billion). In a public briefing later that day, DOD officials described a plan for deferring in stages, otherwise authorized military construction projects under 10 U.S.C. Â§2808 authority. Those military construction projects located at non-U.S. locations ($1.8 billion) would be deferred first, followed later by projects within the United States. ($1.8 billion). Officials stated The intent is prioritizing funds in this manner is to provide time to work with Congress to determine opportunities to restore funds, as well as work with our allies and partners on improving burden sharing for overseas construction projects. USACE has noted that the pace for obligating military construction (MILCON) funds for border barrier construction projects will be highly dependent on project location, since land must first be administratively transferred to the Department of the Army before work can proceed. Construction on land that currently falls under the jurisdiction of DOD can be undertaken relatively quickly, since the military effectively manages the parcels. Projects in locations that fall under one or more other federal jurisdictions may be delayed while transfers are negotiated. Projects on private land are expected to take the longest to complete, since the government must first obtain administrative jurisdiction of the land by either purchase or condemnation. On September 18, 2019, Department of the Interior (DOI) issued Public Land Orders that transferred jurisdiction of land required for five of projects for a period of three years to DOD. This section provides a detailed overview of key documents related to the Administration's use of 10 U.S.C. 284 and 10 U.S.C. 2808 to fund border barriers. The tables that follow each include a summary of source documents, citations, and links that allow readers to access the associated materials directly. (Due to technical considerations, documents are only made available to congressional users.) Table 1 , CRS Document Compilations , contains a collection of reference documents that CRS has compiled for the convenience of users. These include court declarations that do not fit neatly into a chronological framework and documents that describe activities that may be grouped as a single action (e.g., multiple reprogramming actions on the same date for an identical purpose). Where Table 1 documents are cited elsewhere in this report, they are identified by the record's \"Short Title\" shown in the indicated column. Table 2 , Chronology of 10 U.S.C. 284 Decisionm aking , and Table 3 , Chronology of 10 U.S.C. 2808 Decisionmaking, summarize actions related to each respective authority. The separate tables reflect the fact that interagency decisionmaking has generally operated along separate tracks; deliberations related to 10 U.S.C. 2808 were kept separate from correspondence related to 10 U.S.C. 284. ", "summary": "The Department of Defense (DOD, or the Department) has contributed $6.1 billion to the construction of new and replacement barriers along the U.S.-Mexico border in support of the Department of Homeland Security (DHS) by invoking a mixture of statutory and nonstatutory authorities. Congressional concerns surrounding the use of these authorities and the further possibility that DOD's actions may jeopardize legislative control of appropriations has generated interest about the decisionmaking process that drove the Department's funding decisions. DOD has not generally made internal and interagency communications related to these processes directly available to congressional staff. However, various letters, memoranda, and explanatory declarations from key decisionmakers have been released into the public record (primarily as the result of ongoing litigation) that provide a more complete picture of the issues the Department considered, along with its final determinations on border barrier funding. This report provides a chronological summary of internal and interagency communications related to DOD's border wall funding processes since approximately April 2018 as described chiefly through court exhibits and declarations in legal proceedings. Due to the technical difficulty of accessing legal records, CRS has made all relevant open source materials accessible to congressional staff via hyperlinks. A comprehensive set of legal citations has also been provided in the accompanying tables.", "document_type": "crs"}
{"report": "As the technological needs of an increasingly mobile society increase, the choices in how and when we use energy are growing. An increase in the power requirements for smaller and smaller devices has resulted in new technologies improving the density of energy storage in these devices. With these improvements has also come a wider array of applications for power storage on the electric grid and in electric vehicles (EVs). Energy storage is being increasingly investigated for its potential to provide significant benefits to the interstate transmission grid, and perhaps to local distribution systems and thus to retail electric customers. Interest in reducing greenhouse gas (GHG) emissions in the energy sector to mitigate climate change risks has increased the focus on renewable sources of electricity. While energy storage is seen as an enabling technology with the potential to reduce the intermittency and variability of wind and solar resources, energy storage resources would have to be charged by low or zero emission or renewable sources of electricity to ensure a reduction of greenhouse gases. This report will describe technologies for storing electric power, with an emphasis on battery systems, focusing on the readiness of the technologies for various storage applications for electric power services to the electric grid. Congress has held hearings in the 116 th session on a number of topicsâincluding climate change mitigation, electric power system resilience, incorporation of more renewable energy into the gridâall of which have considered the opportunities for increasing energy storage. As of September 2019, more than 40 bills have been introduced in the 116 th session addressing various aspects energy storage technologies and research. Given the many uses for energy storageâboth current and projectedâthis report will discuss some of the main drivers for energy storage. This report will also discuss the challenges for energy storage and potential options for Congress to further explore, if it chooses to advance the technologies to meet societal or other goals. Electricity, as it is currently produced, is largely a commodity resource that is interchangeable with electricity from any other source. Since opportunities for the large-scale storage of electricity are few, and electricity is transmitted almost instantaneously, it is essentially a just-in-time resource, produced as needed to meet the demand of electricity-consuming customers. The electric power system is largely designed to support electric system reliability, and sized to ensure that electricity generation resources will be available to meet the maximum load demand the system is expected to see. Given that most electric power is produced in bulk, at large power plants located at some distance from where the power is consumed, keeping power generation in balance with demand is an important function of system managers. Regional balancing authorities seek to ensure electricity supply is in balance with the demand for power. The normal frequency of the U.S. grid is 60 Hertz (i.e., cycles per second), and operational issues can arise with even with a small fluctuation of as little as 1% above or below this parameter. If the supply of power is less than demand (causing the frequency of power transmission to decrease) or if the supply of power is greater than demand (causing the frequency of transmitted power to increase), then damage to equipment or system infrastructure can result. Some regions of the United States have their maximum demand for electricity in the summer months (driven by air-conditioning loads), and some regions have a maximum demand for electricity in winter months (to meet residential and building heating purposes). Given that this variation in use can lead to some of the larger, less flexible generation resources being underutilized (especially during the night or even seasonally), some observers argue that the electric grid is overbuilt. Additionally, some have suggested that energy storage may be able to help reduce the need for large power generation projects in the future, and provide support for less costly renewable energy systems. Figure 1 is illustrative of the daily cycle of demand for electricity (i.e., the load), and how generation resources may be used to meet that demand. The figure also illustrates how \"frequency regulation,\" a service currently provided by some generators, is used to reconcile the momentary differences caused by the fluctuations between generation and demand. The thicker gray line in the figure shows a smoother system response after damping of the fluctuations (shown by the undulating yellow line) with frequency regulation. Peaking generation is power generation normally operated only during the hours of highest daily, weekly, or seasonal loads. Intermediate load generation is normally operated on a daily cycle to serve on-peak loads during the day but not off-peak loads during nights and weekends. Baseload generation serves the minimum level of electric power demand of a utility, region, or utility customer delivered or required over a given period of time at a steady rate. Renewables generation (in this instance) represents variable electric generation primarily from intermittent wind or solar photovoltaic sources whose peak generation does not necessarily coincide with electricity system periods of peak demand. Energy storage is one way to decrease the need for power generation on the grid at peak demand periods. But storage is not the only means of meeting these goals. Other means of potentially reducing the generation of electricity from large, central station power plants include: End-use efficiency (also called energy conservation) requires the reduction of consumption through improved efficiency. However, upgrading the technologies used by electric power customers to utilize equipment and appliances that are more efficient may be required to achieve end-use efficiency goals. End-user demand reduction (or demand response) is a process by which customers respond to a price signal from a utility or other power provider in return for incentive payments. While most demand response programs are focused on large industrial users with the flexibility to reduce or move consumption to other times of lower demand, commercial, apartment and other residential customers may be signed to aggregation agreements to gain the scale needed for participation in such programs. Distributed generation utilizing renewable sources such as wind, and tidal energy can potentially accomplish similar goals. Smaller gas turbines, if there are no local air quality or other environmental concerns, can also be used to meet peak demand. The capacity for storing large amounts of energy on the electric grid is presently limited. In one study, curtailing excess energy was reportedly seen as a possibly cost-effective alternative to deploying expensive energy storage options (at higher levels of solar photovoltaic (PV) penetration). However, with improvements in energy storage technologies, and regulatory regimes encouraging economic deployment of energy storage, the applications and opportunities to use storage on the grid are growing. The ability to store energy presents an opportunity to add flexibility in how electricity is produced and used, and provides an alternative to address peak loads on the system using renewable electricity stored at low-demand times. An arbitrage opportunity also exists under some circumstances to take advantage of power storage in regulatory regimes that attach value to such opportunities. Under such a scenario, electricity can be purchased from the grid and stored during times of lower demand. An energy storage system can be charged at this time so that the stored energy can be used or sold at another time when the price or costs are higher. Alternatively, energy storage can provide the opportunity to store excess energy production that may otherwise be curtailed from renewable sources such as wind or solar PV. However, the number opportunities for the storage system to perform efficiently in an arbitrage role can be limited by the technology. Additionally, opportunities for arbitrage may be limited by the number of storage participants potentially providing the service thus possibly reducing the sell-back price. Energy storage can take many forms, and can involve the storage of electricity directly or as potential (or kinetic) energy that can be used to generate electricity when it is needed. Electricity can also be stored in the chemical systems of batteries, both in bulk scale and in modular forms as summarized below. Storage systems generally replenish their energy using electricity generated at low-demand (off-peak) times. Storage of energy is measured both in terms of the maximum rated power capacity (for storage charge/discharge) measured in megawatts (MW) or in terms of energy storage capacity over time, measured in megawatt-hours (MWh). Hydropower pumped storage (HPS), compressed air energy storage (CAES), and cryogenic energy storage are examples of technologies that store potential (or kinetic) energy. These examples of the mostly large, monolithic systems used for energy storage today do not store electricity directly, but provide a means of producing electricity by use of a stored medium (e.g., water or air). The gradual release of the stored medium physically turns the shaft of a turbine connected to an electric generator, converting potential energy from the stored medium to electricity. Other opportunities for energy storage from the production of hydrogen gas are being explored, but are not a focus of this report. Batteries are chemical systems that produce electricity when the component parts and chemicals combine to create a flow of electrons, thus creating an electrical current. The potential to produce an electrical charge can be stored directly in large chemical systems (e.g. flow batteries) or in modular battery systems composed of smaller cells (such as lead-acid or lithium ion batteries). The smaller cells of modular battery systems do not store large amounts of electricity individually, but can be aggregated in battery systems to provide larger amounts of power. The major potential energy and battery storage technologies for energy storage discussed in this report are summarized below: Hydropower pumped storage : Water stored in an upper reservoir is released to a lower reservoir through a turbine to generate electricity. Water is pumped in reverse at times of low demand to store energy. HPS is the most widely-used technology for storing energy on the electric grid. Compressed air energy storage : Compressed air is heated and expanded in a turbine to generate electricity. Compressing air causes it to cool, and it is stored in a tank or cavern using off-peak electricity to store energy. Liquid air (cryogenic) energy storage : Ambient air cooled to a liquid state is re-gasified and injected into a turbine when used to generate electricity. Ambient air is cooled and compressed to a liquid state to restore the system, and is stored in insulated tanks. Flywheels : A cylinder rotating around a core in a vacuum at high speeds stores kinetic energy. Slowing the cylinder releases energy to turn a generator to produce electricity, and speeding up the cylinder stores energy. Flow Batteries : Liquid electrolytes with positive and negative charges are stored in large, separate tanks. Electric charge is drawn from the electrolytes by electrodes as they are pumped through a central tank where the liquids are separated by a membrane based on charge, and the spent liquids returned to separate tanks. Lead-acid batteries : One of the oldest and most used methods of energy storage uses connected compartments (cells) made of a lead alloy and lead, immersed in a water-sulfuric acid electrolyte, which combine to generate an electric charge. Lithium ion (Li Ion) batteries : Movement of lithium ions from the positive electrode (cathode) to the negative electrode (anode) through an electrolyte (commonly a lithium salt solution) creates an electric charge. Li Ion batteries have a cathode made of lithium-cobalt oxide, and an anode made of carbon. When batteries are recharged, the lithium ions move in reverse. Nickel Cadmium (NiCad), Nickel-metal Hydride (NiMH), Sodium S ulfur (NaS) , Sodium-Nickel C hloride (NaNiCl 2 ) batteries : Different chemical systems can be used for battery storage. Commonly, the movement of charged particles from cathode to anode through an electrolyte generates an electric current. These technologies are described in more detail in Appendix A of this report. Energy storage can help maintain the balance between supply and demand on an electricity system, and assist with system reliability by providing back-up power (for several hours at a time) during electricity outages. Since the storage of potential energy in larger, monolithic systems (e.g., HPS) is well established on the grid, this report focuses on the relatively new use of modular batteries for grid level storage. Battery storage technologies can also supply energy to the grid, and can also provide many of the ancillary services necessary to ensure the grid's stability. These services are described in more detail in Appendix B of this report. Currently, however, the best value of grid energy storage for energy storage project developers is likely to come from supplying energy to the grid, and additionally providing the ancillary services best-suited to the storage technology, when available (as the storage resource cannot do both simultaneously). Once stored energy is sent to the grid, how quickly the energy storage technology can recharge may influence when and how often recharging of the system is accomplished. When recharging, the energy storage system is a load on the grid, and is not a generation resource. The timing of the charging and recharging cycle during a day can affect the value proposition of storage, since it is unlikely that recharging would be scheduled at times of peak demand. The ability of an energy storage system to provide several services to the grid may also bear on the economics of a system. Figure 2 presents a current view of the opportunities for energy storage technologies to provide capacity and energy for the grid and various ancillary services. It provides a general summary and comparison of energy storage technologies for applications over various timescales for electric grid services. Larger, more monolithic bulk power energy storage projects (such as HPS or CAES) can supply electric power in a discharge time over tens of hours. Battery systems and flywheel energy storage are sometimes used for uninterruptible power supply (UPS) in backup power applications. UPS applications solely for energy storage typically have enough energy to operate for up to several minutes. UPS systems may also incorporate generation (e.g., diesel generation) which can provide power over an extended period. Energy storage can also provide a power quality service by storing power and quickly discharging energy to smooth out variations in voltage supply or frequency, or service interruptions from a fraction of a second to several minutes, which could negatively affect a customer's manufacturing process or operations. Energy storage for transmission and distribution (T&D) systems can support the grid in several ways. For example, a T&D upgrade project can be deferred by using modular storage to provide electric energy to customers until a permanent upgrade can be made. Another example may allow a utility to \"avoid making a potentially unneeded investment in more T&D capacity by using transportable, modular storage to serve peak demand for one or two years until there is more certainty.\" Energy storage can also potentially help to alleviate the bottlenecks of transmission congestion by providing a non-transmission alternative, and thus provide power locally at times of high demand. By using energy stored in off-peak hours, customers of utilities can potentially shift their energy use from one time period to another. Alternatively, utilities or energy storage providers can store energy in periods of low demand to serve loads in times of higher demand. Supercapacitors may be used in energy storage applications undergoing frequent charge and discharge cycles at high current and a very short duration. Similarly, superconducting magnetic energy storage (SMES) has rapid discharge capabilities that have been implemented in some instances for industrial pulsed-power, and system-stability applications on electric power systems. However, the components for SMES limit its uses, as the cost of high-temperature superconducting wires would make grid-scale SMES systems prohibitively expensive.\" SMES has long been pursued as a large-scale technology because it offers instantaneous energy discharge and a theoretically infinite number of recharge cycles. Matching an energy storage technology to the opportunity is key, and considerations will include: The application . For example, ancillary services in electricity markets provide an opportunity for storage by providing \"services necessary to support the transmission of electric power from seller to purchaser, given the obligations of control areas and transmitting utilities within those control areas, to maintain reliable operations of the interconnected transmission system.\" The duration of the application . For example, the duration may be relatively short (e.g., 30 minutes) requiring the quick provision of a large amount of power in applications such as frequency regulation. Alternatively, the duration may be relatively long (perhaps two hours or more) requiring energy to be provided such as for peak load shaving. The rates of charge . Storage resources used to provide power must be recharged. For potential energy resources, the resource used must be restored so it can be used again to provide electric power. All rechargeable batteries have a similar physical structure that allows for the flow of electricity from an outside source to recharge the chemical system once depleted. As shown in Figure 4 , the cathode is the positive terminal, and the anode is the negative terminal. The anode of a device is the side where current flows in, while the cathode is where current flows out. A conductive electrolyte allows the flow of electrons between the anode and the cathode. When a battery is discharged, electrons are released from the negative end and captured by the positive end. Cells can be built by stacking parallel plates (i.e., prismatic or box-shaped cells) or from single long strips rolled onto themselves into a cylinder or flattened cylinder (i.e., cylindrical or wound cells). They have the same chemistry with the main difference residing in their construction and ability to dissipate internally generated heat. Wound cells, and small cylindrical cells in particular, are cheaper to manufacture than the larger prismatic ones for a given capacity. They also have a higher volumetric energy density, but their round cross-section prevents from packing them together without gaps and this advantage does not extend to the assembled battery. The gaps between the cells can present an advantage for cooling when thermal management is necessary due to very high currents.... Mechanically, cylindrical cells are very robust and very resilient to mechanical damage from shocks and vibrations, which is good in electric vehicles. The evaluation of the performance and suitability of modular batteries for an application is typically based on several key characteristics, including: Specific Energy âthe capacity a battery can hold (defined in terms of Watt-hours per kilogram (Wh/kg)). For example, specific energy can determine the battery weight required to achieve range of a vehicle given its energy consumption. Specific Power âthe ability to deliver power (defined in terms of Watts per kilogram (W/kg)). For example, specific power can determine the battery weight required to achieve a given performance target for an engine. Energy Density âthe battery energy per unit volume (defined in terms of Watt-hours per liter (Wh/L). The three characteristics listed above are functions of the battery chemistry and its packaging, with the controlling characteristic being dependent on the particular application. For photovoltaic systems, the key technical considerations are that the battery experience a long lifetime under nearly full discharge conditions. Common rechargeable battery applications do not experience both deep cycling and being left at low states of charge for extended periods of time. For example, in batteries for starting cars or other engines, the battery experiences a large, short current drain, but is at full charge for most of its life. Similarly, batteries in uninterruptible power supplies are kept at full charge for most of their life. For batteries in consumer electronics, the weight or size is often the most important consideration. According to the U.S. Energy Information Administration (EIA), energy storage projects can be used in a variety of electricity production applications. Electricity storage can be deployed throughout an electric power systemâfunctioning as generation, transmission, distribution, or end-use assetsâan advantage when it comes to providing local solutions to a variety of issues. Sometimes placing the right storage technology at a key location can alleviate a supply shortage situation, relieve congestion, defer transmission additions or substation upgrades, or postpone the need for new capacity. Utility scale battery storage consists of projects of one MW or greater in capacity. Utility-scale battery storage operating in the United States has reportedly quadrupled from a total of 214 MW at the end of 2014 to 899 MW (through March 2019). EIA expects U.S. utility-scale battery storage capacity to grow to perhaps 2,500 MW by 2023 \"assuming currently planned additions are completed and no current operating capacity is retired.\" As of March 2019, the two largest U.S. operating utility-scale battery storage projects each provide 40 MW of power capacity, and there were another 16 operating battery storage sites with a power capacity rated at 20 MW or greater. For comparison, there is approximately 16,500 MW of HPS capacity deployed in the United States. Grid-connected battery storage projects commonly require a power management system to protect the battery and prevent uses that would damage or destroy the system. Of these systems for battery storage, balance of plant (BOP) costs are the most significant. BOP includes basic infrastructure (such as a building foundation and security fencing), and on-site electrical systems comprised of any equipment required to interconnect a battery storage system to the electric utility transmission or distribution grid. A 2018 study by the National Renewable Energy Laboratory (NREL) estimated the costs of Li Ion battery storage systems, both as standalone projects (e.g., with storage connected to the grid only), and projects connected to solar PV projects and the grid. A project capacity of 60 MW was used for the estimates. For standalone systems, a battery price of $209 per kilowatt-hour (KWh) was assumed, with total system costs varying from $380 per kWh (e.g., for a four hour duration system) to $895 per kWh (e.g., for a 0.5-hour duration system). The battery cost in these estimates accounted for 55% of total system cost in the 4-hour system, as compared to 23% in the 0.5-hour system. According to NREL, \"the per-energy-unit battery cost remains constant at $209/kWh, the total battery costâand the proportion of the cost attributed to the batteryâdecrease as system duration decreases.\" The report also stated that co-locating the solar PV and storage subsystems produces cost savings by \"reducing costs related to site preparation, land acquisition, permitting, interconnection, installation labor, hardware (via sharing of hardware such as switchgears, transformers, and controls), overhead, and profit.\" For comparison, a 2019 report from the Energy Information Administration estimates the overnight capital cost of a new natural gas-fired combined cycle powerplant (with a capacity of 1,100 MW) at approximately $794 per Kwh, and the overnight cost of a new onshore wind powerplant (with a capacity of 100 MW) at $1,624 per Kwh (before application of the investment tax credit). A solar PV powerplant with a capacity of 150 MW had an estimated overnight cost of $1,783 per Kwh. The report also estimated an overnight capital cost for a 30 MW capacity battery storage project at $1,950 per Kwh (but with no specific battery technology or length of storage duration identified). Most power outages occur in electric distribution systems where wind or other weather cause vegetation (e.g., trees and tree limbs or branches) to contact power lines and cause damage to the line or associated equipment. Power outages can also result from equipment failure, vehicle accidents knocking down distribution poles, and even animal incursions into equipment. Outages caused by these factors typically last in the range from minutes to a few hours. Most of the longer-lived power outages (i.e., lasting from hours to days or longer) are due to weather-related events causing extensive damage to power lines and associated equipment. More extreme events (i.e., those affecting a larger part of the electric power grid) can result in a widespread shutdown of generating plants/units and the de-energization of the transmission and distribution system. In 2007, DOE stated that since weather is the primary reason for reliability problems, and conclude that there is a need for resilient systems to ensure that when power outages occur \"they are short-lived and affect the fewest number of customers as possible.\" In the wake of recent major weather events in the United States (e.g., Superstorm Sandy), there has been an increased focus by federal and state officials on electric reliability and the need for investments in the grid. A recent study examined the statistical relationship between annual changes reported by U.S. distribution utilities in electricity reliability over a period of 13 years, and a broad set of variables (including various measures of weather and utility characteristics), and concluded that severe weather is causing longer, more severe power outages: We find statistically significant correlations between the average number of power interruptions experienced annually by a customer and a number of explanatory variables including wind speed, precipitation, lightning strikes, and the number of customers per line mileâ¦. In addition, we find a statistically significant trend in the duration of power interruptions over timeâespecially when major events are included. This finding suggests that increased severity of major events over time has been the principal contributor to the observed trend. FERC recently proposed defining resilience as \"the ability to withstand and reduce the magnitude and/or duration of disruptive events, which includes the capability to anticipate, absorb, adapt to, and/or rapidly recover from such an event.\" Energy storage could conceivably help reduce the impact of power outages in these instances. However, storage would have to be energized and available, which underscores the source of the electricity used to charge the batteries (or other storage media). Wind power is variable, and often the winds are strongest at night, while solar photovoltaic storage only charges in the daytime. The discharge characteristics would also determine the usefulness of battery storage, as power form these sources may only last for several hours. The type of event causing a power outage would also be key, as a severe weather event could stress or potentially take down power lines over a wide, possibly multistate region. Power can only reach electricity customers if the electrical wires (particularly the distribution lines) are still serviceable and connected. The plug-in hybrid and battery electric share of the U.S. light vehicle market in 2018 was 2.1%. Nearly all automakers offer electric vehicles for sale: 42 different models were sold in 2018, with Tesla and Toyota recording the largest number of vehicle sales. A recent study from NREL assumed that EVs would be an increasing part of an electrified U.S. transportation sector, estimating that \"electric vehicles would account for up to 76% of vehicle miles traveled in 2050,\" and could result in an increased demand for electricity to charge them. Some utilities have been considering whether EVs will be a longer-term avenue for increasing electricity demand, providing opportunities for vehicle-to-grid (V2G) energy storage and related services. Under V2G, EV batteries could eventually be used as storage of off-peak energy for the grid, and help provide demand response when the vehicles are not in use. A report from the Smart Power Electric Alliance observed that \"utilities do not want to just serve this new loadâthey want to take advantage of EVs as a distributed energy resource (DER) with the ability to modulate charge (i.e., managed charging), or even dispatch energy back into the grid (i.e., vehicle-to-grid).\" However, while the V2G concept has been discussed for well over a decade in the United States, some have expressed doubts about its adoption. The idea is attractive because of the growing amount of lithium-ion battery capacity tied up in electric vehicles, and the fact that this capacity is not being used for around 95 percent of the time. Ten new Nissan Leafs can store as much energy as a thousand homes typically consume in an hour.... However, despite numerous pilot studies over the last decade, V2G has yet to become a commercial reality. Among the major concerns expressed about V2G is the effect on the vehicle's batteries. V2G allows a utility to draw on energy storage from stationary vehicles, which could increase the stress on the batteries, one of the most expensive parts of the vehicle. As at least one observer has noted, it is unclear who would cover the cost of this usage or battery replacements under a V2G regime, or how vehicle owners might be otherwise compensated for taking part in V2G programs. A potential driver for further EV adoption (and perhaps V2G itself) could be GHG reduction in the transportation sector. Electrification of the transportation sector can conceivably reduce GHG emissionsâdepending on the electricity generation source, among other factors âseen as a contributor to potential climate change. According to projections by the U.S. Energy Information Administration, new sales of battery electric vehicles may increase by a factor of seven by the year 2025, over model year 2018, under a reference case scenario. Other studies project the possibility for an almost complete transition of U.S. automobiles from internal combustion engines to EVs by 2050, should that be a policy goal. The potential for a large scale GHG reduction from such a transition would depend, in part, on the electricity generation sources used across the life cycle of the vehicles assuming that U.S. policy is focused on almost exclusive use of low or zero-carbon fuels and sources. Batteries charged from renewable electricity sources may reduce climate change concerns, and aid renewable energy growth goals. However, fuel cell vehicles could present a competitive or alternative pathway to a potential transportation future dominated by battery-powered EVs. A team of researchers from Lawrence Berkeley National Laboratory (LBL) examined EV charging in California as a case study. The team suggested that controlling when EV charging happened could help accomplish California's goals for renewable electricity integration less expensively than its 2010 mandate for deploying grid energy storage. The LBL case study discussed California's growing system-wide balancing problems forecast out to 2025, as more renewables (especially solar PV) are deployed. This has been epitomized as the \"California Duck Curve\" issue. By implementing a policy regime to charge EVs in the middle of the day (when renewable solar generation is greatest, instead of the evening or overnight), EVs could use excess renewable electricity available at this time and help balance the grid, thus avoiding the cost of ramping up and down other electric generation. This regime is referred to as V1G, representing the \"one-way\" charging of EVs. According to the LBL researchers, the technology for a one-way charging regime largely exists (i.e., grid to vehicle charging) and could possibly be implemented for about $150 million in California. In addition, implementing a regime to also allow a V2G two-way flow of power from EVs could potentially allow the benefits of EV batteries to become even more pronounced. In the V1G only case, down-ramping and up-ramping are both mitigated by more than 2 GW/h by 2025. In the case with a mix of V1G and V2G vehicles, however, substantially larger gains are seen â¦ both down-ramping and up-ramping are substantially mitigated, by almost 7GW/h, equivalent to avoiding construction of 35 natural gas 600 MW plants for ramping mitigation. The LBL researchers estimated that such a proposal could save California the equivalent of $12.8 billion to $15.4 billion in stationary storage investment. While up to 98% of lead-acid battery component materials may be recycled at the end of a battery's useful life, estimates are that Li Ion battery recycling is less than 5% in the United States. This may become a growing concern as transportation electrification is expected to increase the use of Li Ion battery packs. Finding ways to increase the recycling and reuse of Li Ion battery components would seem to be an option, given the potential cost and difficulty of obtaining the lithium and cobalt used in battery manufacture. However, since it has been estimated that Li Ion battery packs in EVs may retain about 70% of their storage capacity at the end of the battery's service life to a vehicle, the potential for a second use in home energy storage may exist (especially for solar PV storage systems). Therefore, reuse in electric grid applications may present a larger opportunity. Reuse can provide the most value in markets where there is demand for batteries for stationary energy-storage applications that require less-frequent battery cycling (for example, 100 to 300 cycles per year). Based on cycling requirements, three applications are most suitable for second-life EV batteries: providing reserve energy capacity to maintain a utility's power reliability at lower cost by displacing more expensive and less efficient assets (for instance, old combined-cycle gas turbines), deferring transmission and distribution investments, and taking advantage of power-arbitrage opportunities by storing renewable power for use during periods of scarcity, thus providing greater grid flexibility and firming to the grid. In 2025, second-life batteries may be 30 to 70 percent less expensive than new ones in these applications, tying up significantly less capital per cycle. Under the Federal Power Act (FPA), the Federal Energy Regulatory Commission (FERC) has authority over the sale and transmission of wholesale power, the reliability of the bulk power system, utility mergers and acquisitions, and certain utility corporate transactions. FERC is required by the FPA to ensure that wholesale electric power rates are \"reasonable, nondiscriminatory, and just to the consumer.\" The Energy Policy Act of 1992 ( P.L. 102-486 ; EPACT) opened wholesale electricity markets to competition by allowing wholesale buyers to purchase electricity from any generator, requiring transmission line owners to transport (or \"wheel\") power for other generators and purchasers of wholesale power at \"just and reasonable\" rates. The next step was to ensure that these transactions could take place as efficiently as possible, and momentum for allowing access to the transmission grid for all users was realized with the issuance of FERC Order No. 888 in 1996. FERC oversees the competitive electricity markets served by regional transmission organizations (RTOs) and Independent System Operators (ISOs) established in accord with Order No. 888. The order required electricity transmission owners to allow open, non-discriminatory access to their transmission systems, thus promoting wholesale competition. In 2018, FERC issued its final version of Order No. 841 to remove what it saw as barriers to the participation of electric storage resources in RTO/ISO markets. Each RTO/ISO has until December 3, 2019 to revise and implement the Order No. 841 market rules. Subsequently, in April 2019, FERC issued Order No. 845, which changed \"the definition of \"Generating Facility\" to explicitly include electric storage resources.\" Order No. 845 also changed the interconnection rules to allow \"interconnection customers to request a level of interconnection service that is lower than their generating facility capacity.\" This could potentially allow some electric generators to add storage capacity to their facility (i.e., co-location), and use that storage capacity to send energy to the grid. This may provide an opportunity for renewable generators, in particular, to sell power when the renewable capacity is unavailable. In Order No. 841, FERC recognized that HPS has been operating in the competitive electricity markets that it regulates for years. However, FERC also acknowledged that existing market rules for traditional resources can create barriers to entry for emerging technologies. Order No. 841 defined an energy storage resource as \"a resource capable of receiving electric energy from the grid and storing it for later injection of electric energy back to the grid.\" FERC designed Order No. 841 to require \"each regional grid operator to revise its tariff to establish a participation model for electric storage resources that consist of market rules that properly recognize the physical and operational characteristics of electric storage resources.\" The participation model is to: ensure that electricity storage resources are eligible to provide all capacity, energy, and ancillary services that they are technically capable of providing in competitive markets; ensure that electricity storage resources can be dispatched, and can set the wholesale market clearing price as both a wholesale seller and wholesale buyer consistent with existing market rules; recognize that markets must account for the physical and operational characteristics of electricity storage resources through bidding parameters or other means; and establish a minimum size requirement for participation in the Regional Transmission Organization/Independent System Operator markets that does not exceed 100 kW. Electric storage resources may be a buyer and a seller of electricity from the markets, since they must charge and discharge their resources. FERC requires that the sale of electric energy from the wholesale electricity market to an electric storage resource (that the resource then resells back to those markets) must be at the wholesale locational marginal price (i.e., the market-clearing price for electricity at the location the energy is delivered or received). FERC recognized that various energy storage resources had the potential to provide ancillary services (e.g., battery storage can provide frequency regulation, voltage support, and spinning reserves), and provide energy to serve peak demand loads. FERC also recognized that \"electric storage resources tend to be capable of faster start-up times and higher ramp rates than traditional â¦ generators and are therefore able to provide ramping, spinning, and regulating reserve services without already being online and running.\" The compliance filings submitted by the RTO/ISO stakeholders had various degrees of existing energy storage participation. Several compliance responses are discussed in the following summaries. The PJM RTO (PJM) submitted its compliance filing to FERC in two submissions. One filing submitted details of PJM's proposed energy storage resource participation model (i.e., the \"Markets and Operations Proposal.\" PJM said that its energy storage resource (ESR) participation model is designed to ensure that \"ESRs are eligible to provide services in a manner consistent with other resources providing that service.\" PJM stated that its capacity, energy and ancillary services markets offer a number of products that participating resources can provide to serve load and to ensure the reliability of the electric grid. However, PJM noted that although ESRs are currently eligible to provide services in each of these markets, the ESR participation model explicitly addresses each available product to ensure that ESRs are eligible to provide all services which they are technically capable of providing. PJM said that its review of its markets and operations indicated that \"certain changes are needed to fully support the ESR participation model required by Order No. 841,\" and include: Modal Operation in Energy Markets : PJM proposes to allow ESRs to participate in the Day-ahead and Real-time Energy Markets under three different modes: (1) Continuous Mode; (2) Charge Mode; and (3) Discharge Mode. This feature provides significant flexibility and allows Market Participants of ESRs to best manage a resource's changing and discharging cycles. Reserves : PJM proposes to allow ESRs to participate in the Synchronized Reserve market without an energy offer. If an ESR is physically disconnected from the grid and capable of providing energy within ten minutes, then the resource's reserve MWs shall be treated as Non-Synchronized Reserve. An ESR wishing to clear in the Day-Ahead Scheduling Reserve market would require an energy schedule and must inform PJM that it would like to be considered. Cost-Based Offers : PJM proposes to continue to apply the same offer development rules applied to all generation resources. PJM proposes to modify the Operating Agreement to clarify that ESR fuel costs include charging costs for later injection to the grid. Make-Whole Payments : PJM proposes to allow ESRs to receive make-whole payments when moved off economic dispatch. Billing for ESR Charging : PJM proposes to adopt several different categories of ESR charging to account for the resource's behavior and later resale of the charging energy. PJM also proposes to modify the Tariff to exempt \"Direct Charging Energy\" from certain \"load\" charges related to administrative costs, uplift, and meter/scheduling reconciliation. PJM was developing a methodology to determine wholesale vs. non-wholesale charges for stored energy, since ESRs can be connected to transmission, distribution, or behind the meter (i.e., storage designed for a specific building or residential use). PJM says that this may be complicated since ESRs that are behind the customer meter (or that otherwise directly serve retail load) may not, in some cases, resell that energy to PJM per its proposed rules. A second response was filed separately by PJM focusing on metering, accounting and market settlement issues (i.e., the \"Energy Storage Resource (ESR) Accounting Proposal\") to address such issues. While noting that it did not have a single participation model as required by FERC Order No. 841, the New York ISO (NYISO) filed its existing plans for electric storage. NYISO stated that while electric storage can currently participate in its energy, ancillary services, and installed capacity markets under various existing participation models, it also recognized that energy storage be a component of a demand side plan in certain demand response programs. Nevertheless, NYISO proposed to establish a participation model with energy storage resources as a subset of generators under its tariffs. Electric storage facilities unable to satisfy a qualification as generators would be able to elect to participate in existing participation models that accommodate their physical and operational characteristics. For example, some storage resources may be able to participate as \"energy limited resources,\" e.g., installed capacity suppliers that are unable to operate continuously on a daily basis but that can provide energy for at least four contiguous hours each day. Alternatively, other energy storage resources may be able to participate as \"limited energy storage resources,\" i.e., generators that are not able to sustain continuous operation at maximum energy withdrawal or maximum energy injection for a minimum period of one hour. The California ISO (CAISO) expressed support for FERC Order No. 841, stating that its rules were already in compliance with Order No. 841, and are not, generally, technology specific. But there were areas on which CAISO requested clarification. These included whether metering would be required for storage resources, and how storage resources should be treated under models of dispatch for energy (i.e., providing spinning reserves) or when acting as a load and consuming energy from the grid. FERC was apparently not satisfied with the RTO/ISO compliance filings for Order no. 841. Requests for more information (as filing deficiency letters) were sent to each of the RTOs/ISOs. As one example of the information requested, FERC asked each grid operator to provide details of various aspects of energy storage market participation models, including size requirements, state of charge management, and how storage resources can participate as both buyers and sellers in wholesale market. In June 2019, the Senate Energy and Natural Resources Committee held a hearing to examine opportunities for the expanded deployment of grid-scale energy storage in the United States. Among the key statements from witnesses were observations on the developing nature of battery storage systems. Among the observations from Dr. George Crabtree, the director of the Joint Center for Energy Storage Research and Argonne National Laboratory was a statement on the readiness of battery technologies for long-term grid support: The present cost of lithium-ion battery packs, about $200/kWh, must fall by a factor of two or more to make storage economically appealing across all its uses in the grid. In addition, we must be able to purpose-design batteries for a diversity of applications in the grid spanning generation, transmission, and distribution. An example is long duration storage, needed to fill in for renewable generation when the wind does not blow or the sun is blocked by clouds for as many as seven days in a row. These long, cloudy, or calm periods are common in weather patterns in the Northeast and Midwest. The present generation of lithium-ion batteries can optimally discharge for about four hours, much too short to span many weather-related generation gaps. New battery materials, concepts, and technology are needed to meet the challenges of long-duration-discharge energy storage. Among other observations, the witness from Xcel Energy, Mr. Ben Fowke noted that Xcel Energy's long-term carbon strategy depends on the deployment of advanced clean technologies. He said that grid-scale storage helps with renewable integration, allowing higher renewable energy levels than would otherwise be possible. Storage can also provide other system benefits, including more reliable grid operations, voltage support and frequency control. At the same time, he pointed out that storage today still has limitations. Two significant challenges for storage were described in his testimony: First, storage cannot today solve the problem of the wide seasonal variation in renewable energy generation, which is the chief factor preventing the creation of fully renewable electricity system. Second, while storage can initially help integrate renewables by moving energy from the time it is produced to when it is needed, the value of each additional increment of storage capacity declines as more is added to the system. Finally, although storage can bring multiple services to the gridâpower quality and grid support, for exampleâthe value of all of these services are not all additive (or \"stackable\"). As a general rule, these services are not all available at the same time. Mr. Fowke also pointed to potential areas for further energy storage research: While lithium ion batteries are the dominant technology in the battery storage industry today, a federal research agenda should target those technologies that have the greatest potential to address long-term system needs and reach commercialization. Those technologies include pumped storage, flow batteries, compressed air energy storage, and other forms of mechanical, thermal and ice storage. The federal research agenda should also encourage the development of hydrogen and other power-to-gas technologies that have the potential to link renewables and other sources of clean electricity to the rest of the economy and dramatically increase the amount of energy storage capacity in the nation. Among other comments, the witness from the PJM RTO, Mr. Andrew Ott, discussed the readiness of ESRs for grid applications. He also discussed the potential for competition between demand response resources, ESRs, and other generation resources. One issue that has garnered attention is how energy storage resources can participate in PJM's capacity market and therefore displace a coal, nuclear or natural gas unit to be available on call to provide energy when needed in system emergencies. Consistent with FERC's requirements, we have indicated that battery storage resources can be deemed capacity resources and be fully paid to the extent to which they have the duration capability to be available on call when needed. We require the same of a coal, natural gas or nuclear unit, and we require the same of pumped storage hydro or a demand response resource. Our approach is consistent with FERC's directive that the markets need not create undue preferences for energy storage resources but instead must be open to their participation consistent with their \"technical capability\" of providing the service in question. Today, in PJM and in other areas of the country, battery duration is generally limitedâduration could be anything from 15 minutes to one or two hours (typically never longer than four hours) at their rated capacity before they need to be recharged. However, even with these relatively short durations compared to other resource types on the grid today, we don't exclude these batteries from participating in the capacity market. Instead, short-duration batteries are prorated based on their capability (just as we do with renewable resources) to recognize this limited duration. In short, we are treating batteries comparably to any other resource that seeks to serve as a capacity resource. As capacity resources are integral to ensuring reliability and keeping the lights on, we think it is only fair, as well as consistent with the FERC Order, to pay them comparably to what we would pay a cleared nuclear, coal or natural gas resource when they provide a comparable service. I would note that the duration requirements for energy storage capacity resources that we submitted to FERC are, in-part, driven by the success that demand response has had in our capacity market. The advent of demand response, in which industrial operations or buildings and other facilities agree to curtail their load during system emergencies, has worked to \"flatten\" our expected load curve when demand response is called upon. In effect, this has transformed our capacity design requirements from serving what used to be a one-hour \"needle\" peak demand into a lower, wider but more sustained multi-hour peak demand. As the U.S. electric grid is modernized to incorporate new technologies capable of making the system more efficient and responsive to the needs of the future, energy storage is increasingly seen as a key component in that future. Energy storage systems have the potential to provide many essential services to the electric grid that can potentially benefit electricity customers in a number of ways. Interest in reducing GHG emissions in the energy sector to mitigate climate change risks has increased the focus on renewable sources of electricity. While energy storage is seen as an enabling technology with the potential to reduce the intermittency and variability of wind and solar resources (in particular), energy storage resources would have to be charged by low or zero emission or renewable sources of electricity to ensure a reduction of greenhouse gases. Congress may look at providing guidance for regimes or incentives that promote energy storage in a manner that can ensure a decrease in greenhouse gas emissions. Energy storage resources can potentially delay the need or avoid the cost of constructing traditional power plants, depending on how, where used, and what type of storage system is used. For such a scenario, storage resources must be capable of providing the more than four hours of energy often mentioned as available from current battery storage resources. Congress may consider whether further research and development is needed to develop longer duration, higher capacity energy storage resources capable of a higher number of charging/discharging cycles. DOE and the national laboratories may be able to lead cooperative efforts in basic research to address basic science issues. As state governments, local communities, and U.S. businesses aim to increase their intake of renewable electricity, energy storage technologies are seen aiding increased renewable energy deployment and integration. While the cost of battery storage technologies is falling, a potential area for Congress to consider is efforts to reduce the cost of the many different items in balance of plant systems that may represent 20% to over 50% of a battery storage project's overall cost. Further electrification of the economy may be required if reducing emissions seen as contributing to climate change is a driver of federal policy. Electrification of the transportation sector may be a key part of such a strategy. Options for charging electric vehicles sometimes discuss V2G as an option or V1G to promote grid efficiency. Congress may want to define goals for battery storage technologies to support such goals, pathways for the infrastructure needs, a regulatory framework, and/or the interoperability of technologies, if transportation electrification is a policy goal. Recycling of spent Li Ion batteries and/or their components may be one way to ensure the sustainability of modular batteries systems. Over time however, the efficiency of any such technology for charging and discharging will diminish. Congress may want to investigate ways to promote a more efficient, less resource intensive future for modular battery systems, if electrification of the transportation sector to reduce GHG emissions is a policy goal. While Li Ion battery systems are currently the most prevalent form of modular storage, and a key technology for EVs, several issues exist with the procurement of materials for battery components, and the safety of Li Ion battery systems. Congress may want to direct further research into modular battery system materials and charging technologies to reduce the cost, improve the safety of systems, increase system performance and cycle efficiency, and to assure the sustainable development of modular battery systems. To-date, over 40 bills have been introduced in the 116 th Congress on various topics concerning energy storage. This section summarizes several bills considered representative of the overall goals and directions of the proposed legislative efforts. The Advancing Grid Storage Act of 2019 ( H.R. 1743 ), introduced in March 2019, would authorize a research program, loan program, and technical assistance and grant program, among other purposes. DOE would be required to carry out a program for research of energy storage systems, and provide to eligible entities loans for the demonstration of and deployment of energy storage systems. Included in the objectives of the programs improvements to energy storage for microgrids, improved security of emergency response infrastructure, use of energy storage for optimization of transmission and distribution system operation and power quality, and the use of energy storage to meet peak energy demand and make better use of existing grid assets. A public program for technical assistance would be established, and grants would be made available to eligible entities for technical assistance to identify, evaluate, plan, and design energy storage systems. Projects to be prioritized would be those that facilitate the use of renewable energy resources, strengthen reliability and resiliency, improve the feasibility of microgrids in rural areas (including rural areas with relatively high electricity costs), and that minimize environmental impacts and greenhouse gas emissions. The Promoting Grid Storage Act of 2019 ( H.R. 2909 ), introduced in May 2019, would authorize an energy storage research program, a demonstration program, and a technical assistance and grant program, among other purposes. DOE would be required to establish a cross-cutting national program within the Department of Energy for the research of energy storage systems, components, and materials. DOE would also be required to establish a technical assistance and grant program to disseminate information and provide technical assistance directly to eligible entities so the eligible entities can identify, evaluate, plan, design, and develop processes to procure energy storage systems. DOE would be authorized to make grants to eligible entities so that the eligible entities may contract to obtain technical assistance to identify, evaluate, plan, design, and develop processes to procure energy storage systems. DOE would also administer a competitive grant program for pilot energy storage systems for eligible entities to improve the security of critical infrastructure and emergency response systems. The goal of these demonstrations would be to improve the reliability of the transmission and distribution system, particularly in rural areas, including high energy cost rural areas; and, to optimize transmission or distribution system operation and power quality to defer or avoid costs of replacing or upgrading electric grid infrastructure, including transformers and substations, among other purposes. The Better Energy Storage Act ( S. 1602 ), introduced in May 2019, would authorize a research, development, and demonstration (RD&D) program for grid-scale energy storage, among other purposes. The bill would amend the U.S. Energy Storage Competitiveness Act of 2007 (42 U.S.C. 17231) to promote RD&D for grid-scale energy storage. DOE would be required to develop goals priorities, and cost targets for the program, and submit a report on a 10-year strategic plan for the program to the Senate Committee on Energy and Natural Resources, and the House Committee on Science, Space and Technology. The focus of the program would be to develop cost-effective energy storage systems able to provide output for 6 hours, over not less than 8,000 cycles at full output, capable of operating 20 years, and systems capable of storing energy over several months to address seasonal variations in supply and demand. Cost targets for the systems are to updated every five years. Not more than five grid-scale projects would be required to be ready by 2023 for DOE to enter agreements for demonstration. The Joint Long-Term Storage Act of 2019 ( S. 2048 ), introduced in June 2019, would authorize a demonstration initiative focused on the development and commercial viability of long-duration energy storage technologies, including a joint program to be established in consultation with the Secretary of Defense, and for other purposes. The Secretary of Energy, acting through the Director of the Advanced Research Projects Agency-Energy, would be required to establish a demonstration initiative composed of demonstration projects focused on the development of long-duration energy storage technologies. Among the goals of the initiative would be to demonstrate how long-duration energy storage could benefit the resilience of the electricity grid, and improve the efficient use of the grid by peak load reduction and avoiding investment in traditional grid infrastructure. Appendix A. Energy and Electricity Storage Technologies Storage of Potential Energy The large monolithic systems that are used for energy storage today do not store electricity directly, but provide a means of producing electricity by use of a stored medium (e.g., water or air). The gradual release of the stored medium physically turns the shaft of a turbine connected to an electric generator, converting potential energy from the stored medium to electricity. Several technologies storing potential energy for conversion to electricity are described in the next section. Hydropower Pumped Storage The largest current system and use of energy storage on the electric grid is from hydropower pumped storage (HPS) projects. Approximately 94% of U.S. energy storage capacity is from HPS, representing about 23 GigaWatts (GW - a gigawatt equals 1,000 megawatts) as of 2018. The generation of electricity from falling water takes the potential energy of water held behind an impoundment and coverts it to kinetic energy as it moves the blades of a turbine to generate electricity. A typical HPS design is illustrated in Figure A-1 . While traditional hydropower relies solely on favorable topography to allow for the gravity-aided flow of water to generate electricity on demand, HPS systems can be developed where the suitable geographic and ecological conditions exist. HPS systems also consider the time-related value of when electric power is needed on a system. Pumped storage projects move water between two reservoirs located at different elevations (i.e., an upper and lower reservoir) to store energy and generate electricity. Generally, when electricity demand is low (e.g., at night), excess electric generation capacity is used to pump water from the lower reservoir to the upper reservoir. When electricity demand is high, the stored water is released from the upper reservoir to the lower reservoir through a turbine to generate electricity. Most HPS projects operating today are \"open-loop\" systems, which utilize water from free-flowing sources for the upper or lower reservoir. According to the Federal Energy Regulatory Commission (FERC), approximately 24 HPS systems are currently operating with a total installed capacity of over 16.5 GW. However, FERC states that most of these systems were authorized more than 30 years ago. HPS systems are estimated to have an efficiency of conversion for energy to electricity of between 70% and 75%. A newer technology for HPS utilizes water that is not free-flowing (e.g., possibly from groundwater), and is therefore described as a \"closed-loop\" system. FERC states that it has issued three licenses since 2014 for closed-loop HPS with a total capacity of 2.1 GW. One of these projects will have an estimated 400 MW generation capacity and be able to provide an estimated annual energy generation of 1,300 GWh, and may see construction begin in 2020. With closed-loop pumped HPS systems, neither the upper reservoir nor the lower reservoir is located on a dammed stream. To qualify as a closed-loop pumped storage facility for the purpose of the expedited [hydropower] licensing process, a project should cause little or no change in existing surface and groundwater flows and uses and must not adversely affect threatened or endangered species under the Endangered Species Act. The final rule also adds qualifying criteria to ensure that a qualifying pumped storage project utilizes only reservoirs situated at locations other than natural waterways, lakes, wetlands, and other natural surface water features; and relies only on temporary withdrawals from surface waters or groundwater for the sole purposes of initial fill and periodic recharge needed for project operation. Compressed Air Energy Storage Compressed Air Energy Storage (CAES) facilities use ambient air that is compressed and stored under pressure in an underground cavern. When electricity is required, the pressurized air is heated and expanded in an expansion turbine driving a generator for power production. There are two CAES power plants currently operating in the world. Both plants store air underground in excavated salt caverns. The older plant in Huntorf, Germany has a 290 MW capacity, and was commissioned in 1978. A second plant was commissioned in McIntosh, Alabama in 1991, with a capacity of 110 MW. The Huntorf plant is reported to be capable of delivering power at its rated capacity for up to 4 hours, while the McIntosh plant is reported as able to provide generation at its rated capacity for 26 hours. Air heats up when it is compressed for storage. This heat energy is largely lost to the environment in the two CAES plants currently operating, as they use a diabatic process. When the air is decompressed to generate electric power, it loses this thermal energy and cools down. Therefore, the stored high-pressure air must be heated with natural gas before it is returned to the surface and expanded through a turbine that runs a generator. However, new systems may be able to store the thermal energy produced in the compression phase, thus avoiding the use of natural gas and its emissions. Compression and expansion of air introduces energy losses, resulting in a relatively low efficiency of energy to electricity conversion of 42%. CAES plants can use lower cost energy from the grid during off-peak hours for the compression cycle, including renewable electricity from excess wind generation at night that might not otherwise be used. While the McIntosh plant recovers some waste heat to reduce fuel consumption, some new designs for CAES power plants are looking at ways to increase energy conversion efficiency by capturing the waste heat from the compression process and storing it in molten salt for the decompression cycle. Since geological salt formations are rare, the U.S. Department of Energy (DOE) is looking at adapting CAES technology to more common porous and permeable rock formations. Underground CAES storage systems are most cost-effective with storage capacities up to 400 MW and discharge times of 8 to 26 hours. Siting such plants involves finding and verifying the air storage integrity of a geologic formation appropriate for CAES in a given utility's service territory. Liquid Air (Cryogenic) Energy Storage Liquid air or cryogenic is a type of thermal energy storage that uses liquefied air to create an energy storage resource in a manner with characteristics of both HPS and CAES. Electricity, generated at off-peak demand times, can be used to cool air until it liquefies (as mostly liquid nitrogen since air is approximately 78% nitrogen). The process uses currently available equipment and technologies, and proceeds as follows: Charging the systemâan air liquefier uses electrical energy to draw air from the surrounding environment, clean it, and then cool the air to subzero temperatures until the air liquefies. Seven hundred liters of ambient air become 1 liter of liquid air. Storing the energyâthe liquid air is stored in an insulated tank at low pressure, which functions as the energy store. These tanks are currently used for bulk storage of liquid nitrogen, oxygen and liquefied natural gas, and have the potential to hold several GWh of stored energy. Generating powerâwhen power is required, liquid air is drawn from the tank(s) and superheated to ambient temperature, producing a high-pressure gas that drives a turbine. According to one developer of cryogenic technology, the energy storage capacity is determined by the size of the tanks. The tanks can be located anywhere they need to be, unlike HPS which depends on the water resource and geography. Off peak renewable energy can be used to charge the system which, when fully charged, can provide electricity to support a large peak demand load for several hours. Storage of excess cold produced during the liquefaction of air can be captured and reused in a later liquefaction cycle. The low boiling point of liquefied air means the efficiency of the system cycle (from liquefaction and storage to power production) can be improved with the capture and storage of heat produced during the liquefaction process that can be used in the expansion process when power is generated. Flywheels Flywheel energy storage systems are comprised of a rotating cylinder (i.e., the flywheel rotor), balanced in a vacuum over an electricity-producing stator via magnetically levitated bearings. The rotor in many flywheels was often made of steel, but some newer, higher speed flywheels use fiber composite materials able to store more energy per unit of mass. Flywheels store kinetic energy in the cylinder that spins in a nearly frictionless environment. To charge the flywheel, a small electric motor using electricity from an external source brings the cylinder up to an extremely high speedâup to 60,000 rotations per minute. As the rim in the flywheel spins faster, it stores energy kinetically in the rotating mass, with a small amount of power used to maintain the operating speed. When energy is needed, the flywheel is slowed and the kinetic energy is converted back to electrical energy. Flywheels are used in applications where a large amount of power is needed over a short timeframe. While they are generally charged using power from the grid, they can go from a discharged to a fully charged state within a few seconds. According to the Energy Storage Association, flywheels generally require low maintenance. Some flywheel technologies can undergo more than 100,000 full discharge cycles or more without performance impacts. Today's flywheel systems are shorter energy duration systems and not generally attractive for large-scale grid support services that require many kWh or MWh of energy storage.â¦ They have a very fast response time of four milliseconds or less, can be sized between 100 kW and 1650 kW, and may be used for short durations of up to one hour. They have â¦ lifetimes estimated at 20 years. Storage of Electricity in Battery Systems This section describes several technologies for the storage of electricity in battery systems. These systems can be large, monolithic systems (such as flow batteries) or modular battery systems aggregating the capacity stored in smaller cells to provide larger amounts of power. Flow Battery Systems Flow batteries are large battery systems that store an electrical charge in tanks of a liquid electrolyte (e.g., a liquid solution with dissolved chemicals that stores energy). Electric charge is drawn from the electrolyte as it is pumped through electrodes to extract the electrons, and the spent liquid returns to the storage tank. Flow battery technology is scalable. The active chemicals are stored separately until power is needed, thus reducing fire safety concerns. Most flow batteries require the electrolyte to be separated by a membrane, as shown in Figure A-2 . Some newer flow battery technologies use a single flow loop design with no membrane, where \"energy is stored in a plated metal on the surface of titanium electrodes.\" Vanadium and zinc bromine are currently the most-used liquid electrolytes. Vanadium has become a popular electrolyte component because the metal charges and discharges reliably for thousands of cycles. However, one article cited vanadium's increasing price and its toxicity as leading researchers to look at other cheaper and less toxic chemistries (e.g., such as iron or organic compounds) for flow batteries. New electrolyte chemistries are being investigated that are able to maintain a high number of charge cycles, and retain a low viscosity to ease pumping between tanks. Any source of power can be used to charge flow batteries, including renewable electricity from wind and solar sources. Since flow batteries are scalable in size and able to undergo a large number of charging and discharging cycles, they are considered as a potential option to store off-peak electricity generation from renewable sources. Redox Flow Batteries Redox batteries are a specific type of flow battery. The name \"redox\" refers to the chemical reduction and oxidation reactions employed in the redox flow battery to store energy in liquid electrolyte solutions which flow through a battery of electrochemical cells during charge and discharge. Redox batteries can be further classified as either aqueous or nonaqueous systems, with aqueous systems using water as the electrolyte solvent. While aqueous flow batteries are generally safer, they do not currently store as much energy per unit of volume as nonaqueous chemistries. Redox flow batteries are said to offer an economical, low vulnerability means of storing electrical energy at scale, with greater flexibility to design a system based on power and energy rating for a given application. Redox flow batteries are suitable for energy storage applications with power ratings ranging from kiloWatts (kW) to the tens of MW over periods from two to 10 hours, and are capable of 10,000 or more charging cycles. The redox flow battery concept shown in Figure A-2 produces power by pumping liquid from external tanks into the battery's stack, a central area where the liquids are mixed. When the battery is fully discharged, both tanks hold the same electrolyte solution (which is a mixture of the positively charged ions and negatively charged ions. When power is needed, the two liquids are pumped into the central stack. Inside the stack, positive ions pass through a selective membrane and change into a solid on the stack's negative side thus generating electricity. According to EPRI, vanadium redox flow batteries have an important advantage among flow batteries as the two electrolytes are identical when fully discharged, which simplifies electrolyte management during operation. Modular Battery Technologies Modular batteries are used in many aspects of everyday life. They generally store electrical energy in chemical form, and consist of standardized individual cells. The individual cells have relatively small power and voltage capacities that can be aggregated to serve larger power loads. Battery energy storage can also provide ancillary services for the electric grid such as frequency regulation, voltage support and spinning reserves. This section of the report focuses on some of the major rechargeable modular battery technologies that currently serve applications from cell phones to electric or hybrid vehicles, and can provide some backup power or services to the electric grid. Modular battery systems may be suited to arbitrage opportunities. Such opportunities may be economically available to storage systems ranging from one to 500 MW, with a discharge duration range of one hour or greater. Some storage projects may be able to cycle their charging and discharging to meet such opportunities perhaps 250 or more times in a year. Lithium Ion Batteries Lithium ion (Li Ion) represents a family of battery chemistries, each with its own strengths and weaknesses regarding different applications and uses. Li Ion batteries store and release energy through a process called \"intercalation,\" which involves lithium ions entering and exiting microscopic spaces in between the atoms of a battery's two electrodes. The most commonly used type of Li Ion cell has a positive electrode (i.e., the cathode) of made of lithium-cobalt oxide (LiCoO 2 ), and a negative electrode made of carbon. Batteries are charged as ions of lithium move through the electrolyte (typically a lithium salt solution) from the positive to the negative electrode (i.e., the anode), and attach to the carbon. When discharged, lithium ions move back to the positive electrode. Li Ion batteries are used in many applications because lithium is highly reactive and has a high specific energy, which means it can store approximately 150 Wh of electricity in a one kilogram battery. Li Ion batteries hold their charge well over time, losing only about 5% per month, and generally have no memory effect. Li Ion battery packs have electronic circuitry built in to regulate charging and discharging of the batteries to prevent overcharging and excess heating of the batteries, which can potentially result in explosions or fires. However, the components of fuel, oxygen, and an ignition source exist in the battery system providing the prerequisites for combustion. Unlike other rechargeable batteries, Li Ion does not require a deep-discharge cycle to maintain the battery's ability to recharge to full capacity. Over time however, that ability to fully recharge weakens. Nevertheless, the Li Ion battery packs used for EV systems may still have as much as 50% to 70% of their original energy storage capacity at the end of their EV service life. This would allow EV Li Ion battery packs to have a second life in a variety of electricity storage uses from residential storage to renewable generation and other back-up power applications. However, Li Ion battery packs can catch fire (due to a flammable liquid electrolyte) if, for example, an electric vehicle car crash punctures the battery pack. The development of a solid-state battery (i.e., a battery with a solid instead of a liquid electrolyte) may make Li Ion batteries safer. It may also remove the issue with dendrite formation, the crystal-like buildup of lithium metal in the electrolyte that can puncture the cathode-anode separator, causing a short circuit that will destroy the battery and can cause a fire. The potential uses of Li Ion batteries at end-of-life highlights issues with the materials used in the construction of the battery cells. Cobalt is used in the construction of the cathode of the battery. While cobalt is not on a list of \"conflict materials\" that the federal government regulates from conflict zones, cobalt is mostly mined in the Democratic Republic of Congo (DRC), a recognized conflict zone from which about 70% of the world's cobalt originates. Until recently, as much as 20% of Congolese cobalt was estimated to be produced in unregulated artisanal mines (i.e., informal mines, often small-scale operations in local communities) that reportedly use child laborers in unhealthy conditions. The DRC regulates the large mines responsible for most of the cobalt supply, but unrest and economic conditions has driven people to artisanal mining. Even after a recent collapse of cobalt prices, child labor in Congolese artisanal mines reportedly continues to be a problem. However, a recovery of cobalt use from projected growth in EV adoption could exacerbate the issue. Due largely to concerns about child labor in artisanal mines, companies have been under pressure to document their cobalt supply chain to show where their cobalt is sourced. While some companies are now buying cobalt directly from the regulated mines in the DRC, the mixing of cobalt supplies in the refining process (which was reported as taking place mostly in China) complicates tracking efforts. Other companies are reducing their use of cobalt to \"minimize\" exposure to the issue. Since Li Ion battery manufacture utilizes a number of potentially toxic elements if improperly disposed of (i.e., in landfills where groundwater contamination could occur), and have rare earth and other valuable components with potential value, some countries have passed laws to ensure recycling of the batteries. China, where about half the world's EVs are sold, was reportedly implementing rules to make carmakers responsible for expired batteries. The European Union also has regulations for EV battery disposal. Recycling of Li Ion batteries may also help to reduce the need for new supplies from mining of cobalt. But the reuse of EV Li Ion batteries was reported to be more attractive than recycling at this time. Projected demand growth for EVs may overtake the immediate benefits of recycling on supply needs. Lithium Iron Phosphate Lithium Iron Phosphate (LFP) is another Li Ion chemistry for rechargeable battery cathodes. LFP can be used in similar high power applications as lithium-cobalt oxide cells, but LFP's chemistry has a lower specific energy at about 120 Wh/kg (compared to the LiCoO 2 chemistry with a specific energy of about 150 Wh/kg). However, LFP has a longer cycle life than lithium-cobalt oxide, and is reportedly a safer battery chemistry as it is less flammable. Nickel Cadmium and Nickel-Metal Hydride Batteries Nickel cadmium (NiCad) has been in use as a rechargeable battery since about 1910, and was the mostly widely used chemistry for rechargeable batteries until the commercialization of NiMH. NiCad and nickel-metal hydride (NiMH) were the mainstay of rechargeable battery applications before the widespread adoption of Li Ion batteries just over a decade ago. NiMH began to replace NiCad in applications requiring a higher power density in smaller package applications or where performance was more important, and can store about 70 watt-hours per kilogram. NiMH also does not suffer from a memory effect, thus will not require a full discharge cycle to maintain the ability to fully charge. But NiCad retains a charge longer and performs better than NiMH in cold weather applications, or in off-grid renewable energy storage or telecom operations (e.g., situations where near maintenance-free operation is needed with respect to the electrolyte). Lead-Acid Batteries One of the oldest and most widely used forms of energy storage is the lead-acid battery. These batteries are a mainstay of gasoline-powered vehicles, providing energy storage for the spark ignition system of internal combustion engines (ICEs). Lead-acid batteries used in passenger cars commonly have six cells, each with an electromotive force of about 2 volts (V). They can be discharged at a high rate but can require more than 14 hours to recharge. The battery cells are constructed in a grid made of a lead alloy that holds an electrolyte solution of water and sulfuric acid. Figure A-3 shows a wet-cell (also called a \"flooded\" battery due to the liquid electrolyte) lead-acid battery design with several cells with the electrodes connected to each cell. Wet-cell lead-acid batteries are usually made with vents and removable caps to allow for gases to escape while charging, and refilling with water when too much of the electrolyte has been converted to gas. A lead-acid battery can store perhaps 25 watt-hours of electric power per kilogram. Passenger car batteries are often called \"starter\" batteries as they provide a surge of power during the ignition stage to start the engine, and store power generated by the electrical system to prevent damage to system components. Lead-acid batteries can also be designed as \"deep cycle\" batteries to provide a low, steady level of power for a longer duration than a starting battery. Some applications require \"dual purpose\" batteries with characteristics designed to have a high starting power for cranking engines, but are able to withstand the cycle service demands from multiple accessory loads. Lead-acid batteries can be aggregated for \"back-up\" power applications to supply electrical power to critical systems in the event of a power outage. Batteries used for back-up power can also function as voltage stabilizers that smooth out fluctuations in electrical generation systems. However, a lead-acid battery would require six kilograms to store the same amount of energy that a one kilogram lithium-ion battery could store. Batteries designed for industrial uses provide a low, steady power for a longer duration than a typical deep cycle battery. This makes a higher amount of total energy available for a longer period of time. Industrial batteries have the ability to last for years and can be used in stationary applications that provide critical back-up power to systems that need constant power supply. Industrial batteries are often not called upon to deliver power, but when they are, it is required that they deliver an abundance of power that will last long enough for reserve generators to take over. Often times, industrial batteries are configured as systems to accommodate large power demands. Lead-acid battery components are often recycled at the end of the battery's useful service life. Even the spent sulfuric acid can be \"neutralized\" or converted to sodium sulfate and reused. Advanced Lead-Acid Batteries A key problem with lead-acid batteries is the growth of lead sulfate crystals in the electrolyte that eventually limits lead battery performance and is a key cause of battery failure. Researchers at the Argonne National Laboratory announced that they are working with industry to better understand the underlying chemistry of lead-acid batteries to find a solution to sulfation, and resulting dissolution issues (i.e., as the electrolyte loses much of its dissolved sulfuric acid and becomes primarily water). A main goal of the research effort is to unlock \"a significant portion ofâ¦unused potential [in lead-acid batteries that] would result in even better low-cost, recyclable batteries for mobile and stationary market applications.\" Since lead-acid batteries do not have as high a fire risk as Li Ion batteries, some researchers are investigating new technologies that may allow for a greater use of lead-acid batteries in electric grid and transportation applications. Lead-acid carbon technologies use a fundamentally different approach to lead-acid batteries through the inclusion of carbon, in one form or another, both to improve the power characteristics of the battery and to mitigate the effects of partial states of charge. Certain advanced lead-acid batteries are conventional valve-regulated lead-acid batteries with technologies that address the shortcomings of previous lead-acid products through incremental changes in the technology. Other advanced lead-acid battery systems incorporate solid electrolyte-electrode configurations, while others incorporate capacitor technology as part of anode electrode design. Sodium Sulfur Batteries Sodium sulfur (NaS) batteries are a liquid metal technology that operates at high temperatures to keep sulfur molten at both the positive and negative electrodes. A solid ceramic separates the electrodes and serves as the electrolyte, allowing only positively charged sodium-ions to pass through during the charging cycle. As the battery is discharged, electrons are stripped from the sodium metal producing free sodium-ions that move to the cathode compartment. One battery set currently available has a one MW capacity providing up to 6 MWh of energy from 20 modules each capable of supplying 50 kW. Sodium Nickel Chloride Batteries Sodium nickel chloride batteries are another high-temperature battery. When charging a Sodium-nickel-chloride battery at normal operating temperatures, salt (NaCl) and nickel (Ni) are transformed into nickel-chloride (NiCl2) and molten sodium (Na), with the chemical reactions reversed during discharge. The electrodes are separated by a ceramic electrolyte that is conductive for sodium ions but an isolator for electrons. Therefore, the cell reaction can only occur if an external circuit allows electron flow equal to the sodium ion current. Cells are hermetically sealed and packaged into modules of about 20 kWh each. The DOE/EPRI report says that utility systems were beginning to be deployed systems in the size range of 50 kW to 1 MW. New Modular Battery Technologies According to one observer of the modular battery industry, a new technology for grid scale storage \"will be needed to hit the cost levels for continuous deployment,\" if battery storage deployment is to be sustained beyond 2020. In that timeframe, a potential consolidation of the Li Ion industry was suggested by the observer, which would lead suppliers to potentially focus on new liquid metal technologies to achieve a \"necessary cost-competitive, 20-year life performance.\" Research into permeable membranes may result in replacements for brittle ceramic separators in today's NaS batteries. A team from the Massachusetts Institute of Technology (MIT) described how novel mesh membranes could lead to new grid-scale batteries with electrodes made of sodium and nickel chloride. The MIT team projected that the membranes could result in new types of liquid metal batteries, enabling \"inexpensive battery technology\" to make intermittent power sources such as wind and solar capable of delivering reliable baseload electricity. Appendix B. Ancillary Services for the Grid Ancillary services are used by grid operators to ensure the reliability and stability of the power system, by helping to match power generation and demand. The Federal Energy Regulatory Commission (FERC) defines ancillary services as: Those services necessary to support the transmission of electric power from seller to purchaser, given the obligations of control areas and transmitting utilities within those control areas, to maintain reliable operations of the interconnected transmission system. Ancillary services supplied with generation include load following, reactive power-voltage regulation, system protective services, loss compensation service, system control, load dispatch services, and energy imbalance services. According to one source, ancillary services can be put into three main categories. These include: Flexibility-related services, which balance supply and demand, are provided by operating reserves, Frequency-related services, which maintain a constant rate of 60 Hertz, and are provided by regulating reserves, and, Voltage-related services, which control stability across the system. Flexibility-related ancillary services include: Ramping or load following relate to the vital task of bringing online, or taking offline, power plants typically over the course of a few seconds or minutes to several hours to meet changing load or supply conditions. Such activity has long been a part of daily grid operations, particularly to meet expected changes in demand throughout the day. Demand for power commonly fluctuates sub-hourly, hourly, daily and seasonally. Natural gas-fired power plants, for example, have the flexibility to quickly ramp up or down their energy output as system conditions change throughout a given day. Operating reserves are ancillary services that explicitly provide the ability to quickly fill in new energy supply when needed because of unexpected changes in the supply/demand balance, as well as supporting voltage and frequency. Most systems rely on two types of operating reserves: (1) contingency spinning (or synchronous) reserves that usually can respond very quickly, within ten to fifteen minutes, and (2) non-spinning (or supplemental) reserves that typically have response times on the order of ten to 30 minutes or more. A reserve margin is the \"percentage of installed capacity exceeding the expected peak demand during a specified period,\" and varies according to regional regulatory requirements. For instance, a reserve margin of 15% means that an electric system has excess capacity in the amount of 15% of expected peak demand. Spinning reserves are provided by generation units that are actively generating (and whose turbines are \"spinning\") and thus can quickly increase or decrease their output when called upon within the required time. Non-spinning or non-synchronized reserves are provided by generation resources that are not actively generating, but are ready and able to start up quickly and begin providing energy to the grid within a specified timeframe. In some regions, these non-spinning reserves are referred to as fast-start resources. Frequency-related services include: Regulating reserves are actions that can respond in seconds to grid fluctuations or emergencies to stabilize frequency and to rebalance supply with demand. Technical Considerations: Storage System Size Range: 10-100 MW Target Discharge Duration Range: 10 minutes-1 hour Minimum Cycles/Year: 20-50 Down regulation can be provided by energy storage resources as they charge and absorb energy from the grid. However, the storage operator must pay for that energy. That is notableâespecially for storage with lower efficiencyâbecause the cost for that energy may exceed the value of the regulation service. Technical Considerations: Storage System Size Range: 10-40 MW. Target Discharge Duration Range: 15-60 minutes. Minimum Cycles/Year: 250-10,000. The rapid-response characteristic (i.e., fast ramp rate) of most storage systems makes it valuable as a regulation resource. Voltage-related ancillary services include: Voltage control is managed by injecting or absorbing \"reactive power\" at the site of generation, transmission, and distribution to maintain the appropriate level of voltage at a given location. Reactive power (measured in kilovolt-amperes reactive (KVAR)) is an integral part of generating alternating current, along with active (or real) power. Real power is what most would refer to as electricity, measured in kiloWatts (kW). Reactive power must be available locally to transfer active power across the network. In other words, to get and maintain the desired voltage at a given location, a precise amount of reactive power must be present. Normally, designated power plants are used to generate reactive power to offset reactance in the grid. Many smaller coal-fired power plants that were transitioned to provide reactive power as they aged, are now being retired. These power plants could potentially be replaced by strategically-placed energy storage within the grid at central locations or taking the distributed approach and placing multiple VAR-support storage systems near large loads. Technical Considerations: Storage System Size Range: 1-10 mega volt-ampere reactive (MVAR).", "summary": "Electricity, as it is currently produced, is largely a commodity resource that is interchangeable with electricity from any other source. Since opportunities for the large-scale storage of electricity are few, it is essentially a just-in-time resource, produced as needed to meet the demand of electricity-consuming customers. Climate change mitigation has increased the focus on the use of renewable electricity. While energy storage is seen as an enabling technology with the potential to reduce the intermittency and variability of wind and solar resources, energy storage resources would have to be charged by low- or zero-emission or renewable sources of electricity to ensure a reduction of greenhouse gases. Energy storage is being increasingly investigated for its potential to provide significant benefits to the interstate transmission grid, and perhaps to local distribution systems and thus to retail electric customers. The ability to store energy presents an opportunity to add flexibility in how electricity is produced and used, and provides an alternative to address peak loads on the system using renewable electricity stored at low-demand times. In addition to providing power on demand, energy storage technologies have the potential to provide ancillary services to the electricity grid to ensure the reliability and stability of the power system, and better match generation to demand for electricity. Hydropower pumped storage (HPS), compressed air energy storage, and cryogenic energy storage are examples of technologies that store potential (or kinetic) energy. These are examples of the mostly large, monolithic systems used for energy storage today do not store electricity directly, but provide a means of producing electricity by use of a stored medium (e.g., water or air). According to the Federal Energy Regulatory Commission (FERC), approximately 24 HPS systems are currently operating with a total installed capacity of over 16.5 Gigawatts. HPS is approximately 94% of existing U.S. energy storage capacity. Since the storage of potential energy systems is well established on the grid, this report focuses on the relatively new use of modular batteries for grid level storage. Modular battery technologies generally store electrical energy in chemical media that can be converted to electricity, and consist of standardized individual cells with relatively small power and voltage capacities that are typically aggregated to serve larger power loads. Lead-acid batteries and lithium ion (Li Ion) cells are the most used modular battery technologies for utility scale (i.e., projects of one megawatt or greater in capacity) applications on the electric grid. Li Ion cells are being used for a variety of applications, due largely to their high energy density and ability to undergo a number of full power charging cycles. However, battery technologies, in general, can provide energy for only a few hours, and vary with regard to the time required to recharge battery systems. Procurement of cobalt for Li Ion batteries has also been controversial due to child labor and safety concerns in many Congolese artisanal mines. While Li Ion battery systems are currently the most prevalent form of modular storage, and a key technology for electric vehicles, several issues exist with system cost, materials used, and the safety of these systems. Congress may want to direct further research into modular battery system materials and charging technologies to reduce the cost, improve the safety of systems, increase system performance and cycle efficiency, and to assure the sustainable development of modular battery systems. Congress may also want to look at providing guidance for policy regimes or incentives that promote energy storage in a manner that can decrease greenhouse gas emissions. FERC acknowledged that existing market rules for traditional resources can create barriers to entry for emerging technologies, and energy storage in particular. FERC designed its Order No. 841 to require \"each regional grid operator to revise its tariff to establish a participation model for electric storage resources that consist of market rules that properly recognize the physical and operational characteristics of electric storage resources.\"", "document_type": "crs"}
{"report": "U.S. Energy Information Administration (EIA) has forecast U.S. coal production to decline through 2050, with the sharpest reduction to occur by the mid-2020s. Consequently, the coal industry's decline has contributed to economic distress in coal-dependent communities, including increased unemployment and poverty rates. In response, the Obama Administration launched the Partnerships for Opportunity and Workforce and Economic Revitalization (POWER) Plus Plan, which addressed the coal sector's decline through funding for (1) economic stabilization, (2) social welfare efforts, and (3) environmental efforts. The economic elements were organized within the POWER Initiative, a multi-agency federal initiative to provide economic development funding and technical assistance to address economic distress caused by the effects of energy transition principally in coal communities. Although the initiative began as a multi-agency effort as part of the POWER Plus Plan, the POWER Initiative currently operates as a funded program administered by the Appalachian Regional Commission (ARC) in its 420-county service area. This report considers the background of the POWER Initiative and the broader effort of which it was originally a part, the POWER Plus Plan. It broadly surveys the state of POWER elements in the current administration, including elements of the initiative in the Economic Development Administration (EDA), the Appalachian Regional Commission (ARC), and funded efforts for abandoned mine land reclamation. The Appalachian Regional Commission's POWER Initiative program is the largest of these, and the only program to retain the POWER Initiative branding. This report considers its scope and activities as well as its funding history. The POWER Initiative is supported by Congress as reflected by consistent annual appropriations. The POWER Initiative may also be of interest to Congress as an economic development program that actively facilitates and eases the repercussions of energy transition in affected communities in Appalachia. More broadly, in light of the projected continued decline of the coal industry, as well as proposals to address greenhouse gas (GHG) emissions from hydrocarbon combustion, congressional interest in programs to address economic dislocations as a result of energy transition is likely to accelerate. The POWER Initiative was launched in 2015 as a multi-agency federal effort to provide grant funding and technical assistance to address economic and labor dislocations caused by the effects of energy transitionâprincipally in coal communities around the United States. The POWER Initiative was a precursor to a broader effort known as the POWER Plus Plan (dubbed POWER+ by the Obama Administration). This latter plan was launched using preexisting funds, and was intended to develop an array of grant programs across multiple agencies to facilitate energy transition and ameliorate the negative effects of that transition. Most legislative elements of the POWER+ Plan were carried out under existing authorities rather than new legislation. Certain features continue to be activeâparticularly elements of the POWER Initiative within the ARC and the EDA. The POWER+ Plan was organized to address three areas of concern: 1. economic diversification and adjustment for affected coal communities; 2. social welfare for coal mineworkers and their families, and the accelerated clean-up of hazardous coal abandoned mine lands; and 3. tax incentives to support the technological development and deployment of carbon capture, utilization, and sequestration technologies. The POWER+ Plan was proposed in the FY2016 President's Budget as a multi-agency approach to energy transition. As proposed, the POWER+ Plan involved the participation of the Department of Labor (DOL), the Appalachian Regional Commission (ARC), the Small Business Administration (SBA), the Economic Development Administration (EDA), the Department of Agriculture (USDA), the Environmental Protection Agency (EPA), the Department of the Treasury, the Department of Energy (DOE), the Corporation for National and Community Service, and the Department of the Interior (DOI). The FY2016 President's Budget requested approximately $56 million in POWER+ Plan grant funds: (1) $20 million for the DOL; (2) $25 million for the ARC; (3) $6 million for the EDA; and (4) $5 million for the EPA. In addition, a portion of USDA rural development fundsâ$12 million in grants and $85 million in loansâwere aligned to POWER+ Plan priorities. Also, the plan sought $1 billion for abandoned mine land reclamation and an additional $2 billion for carbon capture and sequestration technology investments. The Obama Administration described the POWER Initiative as a \"down payment\" on the POWER+ Plan, and focused on the Plan's economic development elements using existing funding sources ( Table 1 ). Those existing funding sources (or \"Targeted Funds\" in Table 1 ) refer to funds that were set aside by the respective federal executive agency in support of the POWER+ Plan in FY2015. These funding amounts are only those funds made available initially, and do not account for additional appropriations or set-asides made available as the program progressed. The EDA was initially designated as the lead agency for the POWER Initiative, with significant funding elements from the ARC, SBA, and DOL. While led by the EDA, POWER Initiative grants were determined by the individual awarding agency. Grants were divided into two funding streams: (1) planning grants; and (2) implementation grants. The POWER Initiative was announced in March 2015, with the first tranche of grants awarded in October 2016. With the exception of certain parts of the POWER Initiative and funding for reclaiming abandoned mine land (AML), broad elements of the POWER+ Plan were not enacted by Congress. Since the end of the Obama Administration, the ARC is the only federal agency with a POWER Initiative-designated program. As of November 2019, the POWER Initiative exists solely as a funded program of the ARC, and is no longer a multi-agency initiative. However, certain other elements originally included in the POWER+ Plan and the POWER Initiative continue to receive appropriations and continue to be active, but they are not designated as such by the Trump Administration. These elements are discussed below. The EDA continues to receive appropriations for its Assistance to Coal Communities (ACC) program. The ACC program was a grant-making element launched as a part of the EDA's role in the POWER Initiative. In FY2019, $30 million was designated for the ACC program as part of appropriations to the EDA. The FY2019 appropriations represent the fifth consecutive fiscal year of funding for the program, and reflect 300% growth from approximately $10 million appropriated in FY2015. However, the Trump Administration's FY2017 Budget sought to eliminate the ACC program; and subsequent Administration Budget requests have proposed eliminating the EDA entirely, including the ACC program. While the ACC is an active outgrowth of the POWER Initiative and POWER+ Plan, it is no longer associated with the POWER Initiative and instead is identified as a separate program drawing on Economic Adjustment Assistance (EAA) funds. Because it draws on EAA funding, ACC investments may only be used for projects located in, or substantially benefiting, a community or region that meets EDA distress criteria. EDA economic distress is defined as \"An unemployment rate that is, for the most recent 24-month period for which data are available, at least one percentage point greater than the national average unemployment rate; Per capita income that is, for the most recent period for which data are available, 80 percent or less of the national average per capita income; or A Special Need, as determined by EDA.\" One of the pillars of the POWER+ Plan was funding for the social welfare of miners and for cleanup and reclamation of former mine and other coal-related \"brownfield\" sites. While certain legislative proposals for these purposes were never enacted, Congress has approved annual funding since FY2016 for economic development grants to states for Abandoned Mine Land reclamation. The FY2016 appropriation of $90 million directed funds to be divided equally among the three Appalachian states with the greatest amount of unfunded AML needs ( P.L. 114-13 ). The $105 million appropriated for FY2017 set aside $75 million to be divided this way, with the balance of that amount being available more broadly to other eligible AML reclamation applicants ( P.L. 115-31 ). FY2018 appropriations of $115 million set aside $75 million for the three states demonstrating the greatest unmet need ( P.L. 115-141 ). For FY2019, the Department of the Interior, Environment, and Related Agencies Appropriations Act, 2019, Division E of the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), appropriated $115 million, which was subdivided further: $75 million for the three Appalachian states with the greatest amount of unfunded needs; $30 million for the next three Appalachian states with the \"subsequent greatest amount of unfunded needs\"; and $10 million for federally recognized Indian Tribes. The Appalachian Regional Commission (ARC) is the only federal agency that continues to receive regular appropriated funding for energy transition activities under the POWER Initiative designation. While the POWER Initiative was launched as a multi-agency effort, only the ARC chose to designate its contributions as the POWER Initiative. The ARC was established in 1965 to address economic distress in the Appalachian region (40 U.S.C. Â§14101-14704). The ARC's jurisdiction spans 420 counties in Alabama, Georgia, Kentucky, Ohio, New York, Maryland, Mississippi, North Carolina, Pennsylvania, South Carolina, Tennessee, Virginia, and West Virginia ( Figure 1 ). The ARC is a federal-state partnership, with administrative costs shared equally by the federal government and member states, while economic development activities are federally funded through appropriations. Thirteen state governors and a federal co-chair oversee the ARC. The federal co-chair is appointed by the President with the advice and consent of the Senate. The ARC's POWER Initiative program prioritizes federal resources to projects and activities in coal communities that exhibit elements that produce multiple economic development outcomes (e.g., promoting regional economic growth; job creation; and/or employment opportunities for displaced workers); are specifically identified under state, local, or regional economic development plans; and have been collaboratively designed by state, local, and regional stakeholders. The ARC funds three classes of grants as part of the POWER Initiative: (1) implementation grants, with awards of up to $1.5 million; (2) technical assistance grants, with awards of up to $50,000; and (3) broadband deployment projects, with awards of up to $2.5 million. For FY2019, $45 million in grant funding was made available, of which $15 million was reserved for broadband projects. POWER investments are subject to the ARC's grant match requirements, which are linked to the Commission's economic distress hierarchy. Those economic distress designations are, in descending order of distress distressed (80% funding allowance, 20% grant match); at-risk (70%); transitional (50%); competitive (30%); and attainment (0% funding allowance). Special allowances at the discretion of the commission may reduce or discharge matches, and match requirements may be met with other federal funds when allowed. Designations of county-level distress in the ARC's service area are represented in Figure 1 . POWER investments are also aligned to the ARC's strategic plan. The current strategic plan, adopted in November 2015, prioritizes five investment goals: 1. entrepreneurial and business development; 2. workforce development; 3. infrastructure development; 4. natural and cultural assets; and 5. leadership and community capacity. Given its programmatic breadth, POWER investments may link to any one of these investment goals. POWER investment determinations are made according to annual objectives outlined in the request for proposals, as well as broader investment priorities, which are building a competitive workforce; fostering entrepreneurial activities; developing industry clusters in communities; and responding to substance abuse. The ARC has designated $50 million annually (\"activities in support of the POWER+ Plan\" ) for POWER activities ( Table 4 ). According to the ARC, over $148 million in investments have been made since FY2016 through 185 projects in 312 counties across the ARC's service area, leveraging an estimated $772 million of private investment. Figure 2 is a representation of the ARC's POWER Initiative projects tallied by state. While the POWER Initiative does not receive appropriations separate from that of the ARC as a whole, congressional intent is signaled in House Appropriations Committee reports, which specify amounts to be reserved for the POWER Initiative. In committee report language, it is described as activities \"in support of the POWER+ Plan.\" Table 4 shows appropriations set aside for the POWER Initiative from FY2016 to FY2019, and for the ARC as a whole. The ARC received approximately $610 million in requests for POWER Initiative grant funding from FY2016 to FY2018 ( Table 5 ). This suggests that there was unmet demand for the POWER Initiative in the Appalachian region alone (the ARC's service area, as depicted in Figure 1 ). The Energy Information Administration projects that coal production overall will continue to decline as a consequence of falling market demand. In particular, the EIA forecasts coal to account for 24% of U.S. electric energy generation in 2019 and 2020, down from 28% in 2018. By 2050, coal is projected to decline to 17% of U.S. electricity generation, nuclear is projected to account for 12%, renewables 31%, and natural gas 39%, according to EIA projections. Coal's decline is a function of market forces, particularly its higher cost relative to natural gas and renewable energy options. In the future, under current policies, coal's cost disadvantage is expected to continue, and could be accelerated if policies are adopted to reduce GHG emissions that contribute to climate change. Even with federal incentives to invest in carbon capture, utilization, and storage as a means to mitigate fossil fuel-related emissions, coal may still not be competitive in many situations. As a result of falling demand, noncompetitive coal producers and their communities are expected to face continued economic dislocation. Should it wish to broaden or intensify federal efforts to address energy transition in local communities, Congress may have several options. In the past, Congress has demonstrated bipartisan interest in the federal government providing assistance to populations adversely affected by the ongoing energy transitions. It has done so through its appropriations for the ARC's POWER Initiative, the EDA's ACC program, and the AML investments. In combination with evidence of unmet demand for federal assistance, as measured by unfunded requests to the ARC ( Table 5 ), Congress may consider reviewing the balance among needs, appropriations, and effectiveness of past efforts. Congress could conduct a review of the POWER Initiative and the efficacy of its performance and resources. This potential review suggests some particular considerations: Geography : While the ACC is available for the nation as a whole, the ARC's POWER Initiative is restricted to the ARC's service area in the Appalachian region. Congress may consider expanding the POWER Initiative to be available more broadly across the nation, or in a more targeted fashion as demonstrated by the ARC's program. Alternatively, funding could be made available nationwide to any eligible coal community, such as through other federal regional commissions and authorities and/or EDA regions. Funding : Projections of U.S. coal production (cited earlier) suggest that the ongoing transition in U.S. energy systems may lead to further localized economic distress without the development of new regional opportunities. Congress may consider the level of funding for POWER Initiative programs in the context of those economic needs. Funding levels could be tied to the overall scale of the challenge, allocated to areas with the greatest need, and made in consideration of data-driven evaluations of the program effectiveness. In assessing scale, Congress may consider macroeconomic factors as well as social and environmental policy objectives. Energy Type : Congress may also consider expanding the POWER Initiative program beyond the coal industry to other energy industries or regions perceived to be in decline. For example, economic strain and job losses following the closure of other electrical generating units, such as aging nuclear power plants, may signal additional types of displacement. EIA forecasts anticipate a modest decline in nuclear power generation by 2050 as older, less efficient reactors are retired. Nuclear-industry communities may face similar issues of economic distress and labor dislocation. Congress may also consider other public policy goals, such as reducing GHGs, to assist in promoting renewable energy types and carbon capture technologies. Should Congress consider such efforts, the ARC's POWER Initiative program could serve as a potential model to be scaled or replicated as needed. In addition, other models have also been proposed in bills introduced in the 116 th Congress that would assist coal communities in transition. Although the POWER+ Plan was not enacted in its entirety, some of its legacy programs continue to receive annual appropriations and remain active. The persistence of such programs suggests support among many policymakers for federal efforts to rectify, or at least attenuate, economic distress as a consequence of energy transition. In addition, were Congress to pursue policy efforts reflective of broadening concern for climate issues, a POWER Initiative-type program could be developed to also facilitate energy transition from fossil fuel-based energy sources to a mix of renewables and other alternatives. Although the POWER+ Plan did not continue beyond the Obama administration, several constituent programs have continued to receive congressional backing, and applicant volumeâat least in the case of the ARC's POWER Initiativeâmay suggest further demand for additional federal resources in addressing energy transition issues. More broadly, these mechanisms could also be purposed to facilitate federal resources for other related issues, such as related to ecological/environmental resilience and adaptation. The POWER Initiative, as originally conceived or in its current form as a program of the ARC, has not been subjected to a formal evaluation by the U.S. Government Accountability Office (GAO) or other research organization of its effectiveness as either a mechanism for alleviating community economic distress caused by the declining coal industry, or economic development more broadly. One recent GAO report mentioned the Assistance to Coal Communities program, but did not seek to analyze its activities or efficacy. Similarly, older GAO reports exist that feature the Abandoned Mine Land Reclamation program (prior to its current configuration), and the Appalachian Regional Commission, but may be of limited relevance when evaluating current programming, including more recent activities such as the POWER Initiative. Meanwhile, a number of anecdotal and media reports appear to tout the POWER Initiative's success and viability. The ARC, for its part, reports that the POWER Initiative has \"invested over $190 million in 239 projects touching 326 counties across Appalachia.\" According to the ARC, those investments are \"projected to create or retain more than 23,000 jobs, and leverage more than $811 million in additional private investment.\" In the ARC's 2018 Performance and Accountability Report, the ARC reported that the annual outcome target for \"Students, Workers, and Leaders with Improvements\" in FY2018 was exceeded by 55% \"likely due to\" investments from the POWER Initiative; similarly, the ARC reported the outcome target for \"Communities with Enhanced Capacity\" in FY2018 was exceeded by 125%, \"due in part to priorities established for the POWER Initiative.\" The same report also noted that the ARC launched a new monitoring and evaluation effort on the POWER Initiative in September 2018 encompassing \"approximately 135 POWER grants\" in FY2015-FY2017. The results of that assessment have not yet been released.", "summary": "With the decline of the U.S. coal industry, managing the economic effects of energy transition has become a priority for the federal government. The Partnerships for Opportunity and Workforce and Economic Revitalization (POWER) Initiative, and the broader POWER Plus Plan of which it was a part, represent the U.S. government's efforts to ease the economic effects of energy transition in coal industry-dependent communities in the United States, and especially in Appalachia. Launched in 2015 by the Obama Administration as a multi-agency effort utilizing various existing programs, the POWER Plus plan received partial backing through appropriations for Fiscal Year 2016 (FY2016) to the Appalachian Regional Commission, the Economic Development Administration, and for abandoned mine land reclamation. While certain proposed provisions of POWER Plus were never enacted or funded, other elements of the POWER Initiative continue under the Trump Administration. Continuing programs include the Assistance to Coal Communities program within the Economic Development Administration, the POWER Initiative under the Appalachian Regional Commission (the only program to retain the original branding), and a funding program for abandoned mine land reclamation. Of these efforts, the Appalachian Regional Commission's POWER Initiative is the largest of the initiative's economic development programs, having funded nearly $150 million in projects (out of over $600 million in proposed projects) since it was first launched in FY2016. The Appalachian Regional Commission's POWER Initiative is regionally targeted to declining coal communities in Appalachia, unlike the Economic Development Administration's Assistance to Coal Communities program, which has a national scope. To date, the initiative has reportedly leveraged approximately $772 million of private investment into the Appalachian regional economy. This report provides background on the origins, development, and activities of the POWER Initiative.", "document_type": "crs"}
{"report": "The present structure of congressional oversight of the Intelligence Community (IC) largely resulted from investigations by two congressional committees in the 1970sâin the Senate, chaired by Idaho Senator Frank Church, and in the House, chaired by Representative Otis Pikeâthat suggested a need for permanent committees in each chamber: today's Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI). It is important to note, however, that oversight of intelligence is a function of more than just the two congressional intelligence committees. Ten other committeesâthe Armed Services, Foreign Affairs/Foreign Relations, Homeland Security, Judiciary, and Appropriations committees of both chambersâexercise oversight responsibility to varying degrees over intelligence programs or IC elements that fall under their jurisdiction. The Church and Pike committees' oversight focused primarily on two themes: investigation of past abuses and IC organizational reform. Over the succeeding years those efforts have been both beneficial and occasionally burdensome. In protecting against the IC's abuse of its authorities, Congress has helped ensure intelligence activities were legal, ethical and consistent with American values. Congress's influence in IC organizational reform has resulted in improved performance and accountability. On other occasions, however, congressional oversight has tended toward micromanagement resulting in strains in the relationship with the IC. This report posits a potential framework for congressional oversight of intelligence-related programs and activities using the existing committee structure and notification standards for the most sensitive intelligence activities: covert action and clandestine intelligence collection. The framework may assist Congress in assessing the premises justifying each of these activities, their impact on national security, operational viability, funding requirements, and possible long-term or unintended consequences. Unlike areas with a broad public following, such as health care, veterans' services, and agriculture, intelligence programs and activities are generally classified, receive little public exposure, and have no natural public constituency. Highly classified covert action and clandestine intelligence programs do not often have visibility outside of Congress. Congressional oversight, therefore, provides one of the few meaningful checks on the President's execution of intelligence policy and programs that may have significant bearing on U.S. foreign relations and national security. Among the recommendations of the National Commission on Terrorist Attacks upon the United States (the \"9/11 Commission\") were those aimed at strengthening intelligence oversight. Since the Church and Pike committees of the 1970s, Congress occasionally has been able to refine its oversight of the IC. However, it has not been able to sustain its early momentum. As the Final Report of the 9/11 Commission put it, \"...the oversight function of the Congressâ¦diminished over time. In recent years, traditional review of the administration of programs and implementation of laws has been replaced by 'a focus on personal investigations, possible scandals, and issues designed to generate media attention.' The unglamorous but essential work of oversight has been neglected, and few members past or present believe it is performed well....[T]he executive branch needed help from Congress in addressing the questions of counterterrorism strategy and policy, looking past day-to-day concerns....Congress...often missed the big questionsâas did the executive branch.\" Since 9/11, the Senate especially has made progress toward following through with organizational reform of the oversight process, following through on several of the 9/11 Commission's recommendations. S.Res. 445 (108 th Congress) amended Senate rules governing intelligence oversight ( S.Res. 400 ) aimed at increasing the authority of the SSCI relative to the standing committees, promoting bipartisanship, and building expertise. However, a number of factors have complicated Congress's efforts to improve oversight. This poses risks to national security when involving the most sensitive aspects of intelligenceâcovert action and clandestine activitiesâdue to their potential impact on U.S. foreign relations. Moreover, greater integration of military operations and intelligence activities has resulted in some confusion over the proper congressional jurisdiction for exercising oversight on Capitol Hill. Congress has expressed concern that the Department of Defense's (DOD) overuse of terms that are not defined in statute, such as operational preparation of the environment (OPE), to describe operations that may resemble intelligence activities allows DOD to circumvent the more stringent oversight requirements of the congressional intelligence committees. Despite these challenges, congressional oversight remains an important check on policy and decisions of the executive branch, to insure intelligence programs and activities are ethical, legal and properly aligned with U.S. national security and foreign policy objectives. Congressional oversight of covert action can be organized around a framework of five issue areas: (1) the activity's statutory parameters, (2) U.S. national security interests, (3) U.S. foreign policy objectives, (4) funding and implementation, and (5) risk assessment. These categories enable Congress to analyze and assess the specific elements of each activity from a strategic point of view. By extension, Congressional oversight of anticipated clandestine intelligence activities that might also shape the political, economic or military environment abroad can apply the same framework and, as with oversight of covert action, address the risk of compromise, unintended consequences, and loss of life. A conceptual framework for congressional oversight of covert action begins with its statutory definition: Covert action is codified as \"an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly.\" There are a number of exceptions in the statutory definition of covert action; these include some activities that could use clandestine methodology. Exceptions include activities primarily intended to collect intelligence; traditional counterintelligence activities; traditional military activities, or support to traditional military activities; traditional law enforcement activities, or routine support to law enforcement; and traditional diplomatic activities. How these exceptions are defined and applied to actual practice is not always straightforward and can complicate congressional oversight. For example, Congress has expressed concern that DOD too frequently applies the term traditional military activities to describe operations that in many respects resemble covert action. This is important insofar as it results in different committees being informed of the activity and different standards for the timeliness of notification. Oversight also requires a solid grasp of the U.S. national security interests and foreign policy objectives that each administration details its National Security Strategy, National Defense Strategy, and other strategy and policy documents. Covert action statutorily must support \"identifiable foreign policy interests of the United States.\" Although not required by statute, it would be logical for clandestine intelligence (and military) activities that do not constitute covert action but have in common a high risk of compromise of sources and methods, a high impact on U.S. foreign relations, and a potential for the loss of life also to support identifiable (clearly articulated, documented) foreign policy objectives expressly. Moreover, congressional overseers may wish to identify or have expressly identified for them, the executive branch's assumptions about the international environment since these assumptions influence policy that in turn, influences decisions on covert action and clandestine activities. Although Congress has no statutory prerogative to veto covert action when informed through a presidential finding, it can influence conduct of an operation through the exercise of congressional constitutional authority and responsibilities to authorize war, legislate, appropriate funds, and otherwise interact with the executive branch. As former CIA Inspector General L. Britt Snider wrote, If the committees do not support a particular operation or have concerns about aspects of it, an administration would have to think twice about proceeding with it as planned. If it is disclosed or ends in disaster, the administration will want to have had Congress on board. If it is going to last more than a year, the committees' support will be needed for continued funding. The committees are also likely to be better indicators of how the public would react if the program were disclosed than the administration's in-house pundits. As congressional oversight committees assess each impending covert action from a strategic point of view, Congress may wish to organize its review using the following five issue areas: 1. the activity's statutory parameters; 2. U.S. national security interests; 3. U.S. foreign policy objectives; 4. funding and implementation; and 5. risk of compromise, failure, loss of life, and unintended consequences. By extension, oversight of anticipated clandestine intelligence activities that might also shape the political, economic, or military environment abroad can apply the same framework, and, like oversight of covert action, address the risk of compromise, unintended consequences, and loss of life. Section 3093(a)(5) of Title 50, U. S. Code specifies that \"a finding [for a covert action] may not authorize any action that would violate the Constitution or any statute of the United States.\" Congressional oversight, then, ensures a covert action does not violate the law, to include any domestic law enacted to fulfill the terms of a non-self-executing treaty. Does the covert action or clandestine intelligence activity violate domestic U.S. law? Does the activity violate any domestic law connected to a non-self-executing treaty? Is the activity likely to violate international law? What are the national security implications of conducting a covert action that may violate international law? Is the risk justified by the operation's importance to U.S. national security? Would Congress likely choose to provide limitations on the covert action through legislation? Does the covert action or clandestine activity, if conducted during hostilities, comply with the laws of armed conflict in accordance with DOD policy? Congressional oversight of covert action is generally recognized to be especially important to ensuring proper checks and balances, particularly under circumstances in which it is likely that no one outside of a small number of authorized intelligence professionals will know anything about the covert action or clandestine activity. Yet, the 9/11 Commission observed, Congress had a distinct tendency to push questions of emerging national security threats off its own plate, leaving them for others to consider. Congress asked outside commissions to do the work that arguably was at the heart of its own oversight responsibilities. Oversight, in accordance with notification requirements of Title 50, enables Congress to provide a timely check on the development of a covert action or clandestine intelligence activity that might have serious flaws. Maintaining necessarily tight security surrounding planning for intelligence activities may present a challenge, because the few individuals outside the intelligence community with access may offer only limited perspective, overlook essential details, and too easily accept premises that might not bear up against broader scrutiny. What are the underlying premises of the threat and the international or regional environment that justify the covert action or clandestine activity? Is there any precedent for the particular covert action outlined in the presidential finding? If so, what were the similarities and differences with the covert action described in the current finding that may give perspective regarding the risk to U.S. personnel, unintended consequences, and implications for U.S. national security? What are the implications of involving third parties or countries in the covert action? Does the covert action or clandestine activity conform to American and democratic values, and promote free and fair elections? What are plausible long-term unintended consequences of the covert action? Do these possible long-term effects challenge the premises for conducting the covert action in the first place? What might be some plausible second/third order effects of not conducting the covert action? Section 3093(a) of Title 50, U. S. Code specifies \"[T]he President may not authorize the conduct of a covert action by departments, agencies, or entities of the United States Government unless the President determines such an action is necessary to support identifiable foreign policy objectives of the United States and is important to the national security of the United States.\" Is the covert action being initiated as an instrument of policy in support of \"identifiable\" foreign policy objectives elaborated in the National Security Strategy? Is covert action a viable means of achieving these objectives? Are there other means by which the United States might achieve the same objectives involving less risk? Is the covert action consistent with American values to the extent that it is something the American people would support (if the activity were known to the public)? Congress can provide another level of review to ensure important details for successfully implementing the activity are not overlooked. Moreover, Congress's constitutional responsibility for appropriating funds extends to its oversight of sensitive intelligence activities like covert action. As former CIA Director and former Member of Congress Leon Panetta once remarked, \"I do believe in the responsibility of the Congress not only to oversee our operations but to share in the responsibility of making sure that we have the resources and capability to help protect this country.\" Is the department or agency named in the presidential finding as the lead agency for the covert action best suited to achieve the objectives? Are the operational elements planned for the covert action comprehensive and developed to achieve tactical success? Is the covert action or clandestine activity sufficiently funded over its projected duration to achieve the objectives? \"The executive branch is chiefly concerned with achieving the objectives of the president, whatever they might be. Because of this, it is sometimes tempted to downplay the risk and accentuate the gain.\" Congress's relative distance from conceiving and planning the activity may enable it to provide more dispassionate risk assessment and more tempered analysis of likely outcomes. Does the covert action involve an unacceptable risk of escalating into a broader conflict or war? In the event of an unauthorized or untimely disclosureâor a popular perception of U.S. involvementâwhat are the risks to U.S. national security, U.S. personnel, or relations with states in the region? What are the consequences of failure of the covert action or clandestine intelligence activity to U.S. lives, U.S. national security, and relations with states in the region? If U.S. Armed Forces are involved, is the covert action or clandestine activity being conducted such that U.S. Armed Forces retain full protection under the terms of the Geneva Conventions? Is it plausible for the U.S. role to remain secret and deniable? Or is there substantial or unacceptable risk of compromising U.S. sponsorship to the detriment of U.S. national security? What risks does the covert action or clandestine activity pose to uninvolved American citizens who might be in the vicinity? Statute requires the President update Congress with notifications of changes in conditions from those described in the original notification of a covert action. Congressional oversight consequently extends to periodically reviewing changes in the operational environment on the ground that may suggest a different outcome, a change in strategy, a shift in U.S. interests, or the development of unintended consequences. Along these lines, Â§3093(d)(1) and (2) of Title 50 U. S. Code includes the following provision: The President shall ensure that the congressional intelligence committees, or, if applicable, [the Gang of Eight], are notified in writing of any significant change in a previously approved covert action, or any significant undertaking pursuant to a previously approved finding, in the same manner as findings are reported pursuant to subsection (c). In determining whether an activity constitutes a significant undertaking for these purposes, the President shall consider whether the activity- involves significant risk of loss of life; requires an expansion of existing authorities, including authorities relating to research, development, or operations; results in the expenditure of significant funds or other resources; requires notification; gives rise to a significant risk of disclosing intelligence sources or methods; or presents a reasonably foreseeable risk of serious damage to the diplomatic relations of the United States if such activity were disclosed without authorization. Former CIA Inspector General L. Britt Snider has suggested that Congress, in carrying out its oversight responsibility, might be vulnerable to failure to review the premises and conditions for the covert action that may have changed, perhaps significantly, subsequent to the initial notification. The risk, as articulated by Snider is that \"If members are satisfied with what they hear from administration witnesses [during the initial notification], not only will they acquiesce in the implementation of the operation, they are apt to devote less attention to it down the road.\" To guard against this outcome, this provision of the covert action statute underscores the importance of being alert to the possible tactical, political, and environment changes that warrant continued oversight to ensure the activity continues to be in the U.S. national interest. Do the original premises or environmental conditions justifying the activity remain valid? Have there been any outcomes to suggest the intelligence activity is achieving its intended result? Does the activity continue to have the funding necessary to be effective? Have there been any changes in conditions on the ground that might influence a significant change in how the activity is executed? Is there an increase in the risk of premature or unauthorized disclosure? Do American citizens face a greater threat of exposure? Does the risk involved remain acceptable? Does the activity still conform to the statutory guidelines on the conduct of covert action or significant clandestine intelligence activities?", "summary": "Since the mid-1970s, Congress's oversight of the Intelligence Community (IC) has been a fundamental component of ensuring that the IC's seventeen diverse elements are held accountable for the effectiveness of their programs supporting United States national security. This has been especially true for covert action and clandestine intelligence activities because of their significant risk of compromise and potential long-term impact on U.S. foreign relations. Yet, by their very nature, these and other intelligence programs and activities are classified and shielded from the public. Congressional oversight of intelligence, therefore, is unlike its oversight of more transparent government activities with a broad public following. In the case of the Intelligence Community, congressional oversight is one of the few means by which the public can have confidence that intelligence activities are being conducted effectively, legally, and in line with American values. Covert action is defined in statute (50 U.S.C. Â§3093(e)) as \"an activity or activities of the United States Government to influence political, economic, or military conditions abroad, where it is intended that the role of the United States Government will not be apparent or acknowledged publicly.\" When informed of covert actions through Presidential findings prior to their executionâas is most often the caseâCongress has a number of options: to provide additional unbiased perspective on how these activities can best support U.S. policy objectives; to express reservations about the plan and request changes; or withhold funding. Although Congress does not have the authority to approve or disapprove covert actions, it can have (and has had) influence on the President's decision. The term c landestine describes a methodology for a range of activities wherein both the role of the United States and the activity itself are secret. Clandestine activities can involve traditional intelligence or unconventional military assets. Like covert action, their impact can be strategic even though a specific activity may be tactical in scope. Their secret character suggests the potential harm to sources and methods in the event of an unauthorized or unanticipated public disclosure. Congressional oversight of covert action can be organized around a framework of five issue areas: (1) the activity's statutory parameters, (2) U.S. national security interests, (3) U.S. foreign policy objectives, (4) funding and implementation, and (5) risk assessment. These categories enable Congress to analyze and assess the specific elements of each activity from a strategic point of view. By extension, Congressional oversight of anticipated clandestine intelligence activities that might also shape the political, economic or military environment abroad can apply the same framework and, as with covert action oversight, address the risk of compromise, unintended consequences, and loss of life. This report is accompanied by two related reports: CRS Report R45175, Covert Action and Clandestine Activities of the Intelligence Community: Selected Definitions in Brief , by Michael E. DeVine, and CRS Report R45191, Covert Action and Clandestine Activities of the Intelligence Community: Selected Congressional Notification Requirements in Brief , by Michael E. DeVine.", "document_type": "crs"}
{"report": "Congress is responsible for funding, establishing rules regulating the Army, and conducting oversight of a number of functions including manning, equipping, training, and readiness. On an annual basis, shortly after the President's Budget Request is transmitted to Congress, congressional defense authorizing committees and subcommittees typically hold three separate oversight hearings focused on (1). the Army's budget request; (2). the Army's posture; and (3). Army modernization. In addition to these three hearings, Congress sometimes conducts additional hearings on a wide variety of topics to include specific weapons systems under development and other Army efforts, programs, or initiatives. The Army's 2019 Modernization Strategy, intended to guide Army modernization efforts through at least 2035, is arguably ambitious and proposes the development of a number of new weapons systems and capabilities that could also have implications for force structure as well. In its oversight role of the Army's modernization process, Congress may consider a common oversight architecture that provides both an element of continuity for hearings and a standard by which Congress might evaluate the efficacy of the Army Modernization Plan. The 2019 Army Modernization Strategy (AMS) aims to transform the Army into a force that can operate in the air, land, maritime, space, and cyberspace domains (i.e. multi-domain), by 2035. The previous 2018 AMS Report to Congress introduced the Army's six materiel modernization priorities (see below). The 2019 AMS expands the Army's approach beyond those six priorities, outlining a more holistic approach to modernization while maintaining the Army's six Materiel Modernization Priorities from the 2018 AMS. Army Modernization involves modernizing 1) how they fight (doctrine, tactics, techniques, and procedures); 2) what they fight with (equipment); and 3) who they are (Army culture and personnel). This report will focus on the \"what they fight with\" component of Army Modernization as well as associated force structure issues. The Army wants to transform itself into a force capable of implementing its new proposed operational concept referred to as Multi-Domain Operations (MDO) described below. According to the Army, in order to successfully execute MDO, the Army will need to change how it physically postures the force and how it organizes units. In addition, the Army says it will require new authorities and the ability to employ new capabilities and emerging technologies. The Army, in addition to integrating fully with the other Services, will need access to national-level capabilities and require a high level of day-to-day Interagency involvement to successfully prosecute MDO. In this regard, MDO would require not only Department of Defense (DOD) \"buy in\" and resources, but would also need similar support from the other members of the Interagency and Congress as well. The Army's Modernization Strategy is part of a hierarchy of strategies intended, among other things, to inform the Service's respective modernization plans. These strategies include: National Security Strategy (NSS): published by the Administration, it is intended to be a comprehensive declaration of global interests, goals, and objectives of the United States relevant to national security. National Defense Strategy (NDS): published by DOD, it establishes objectives for military planning in terms of force structure, force modernization, business processes, infrastructure, and required resources (funding and manpower). National Military Strategy (NMS): published by the Chairman of the Joint Chiefs of Staff (CJCS), it supports the aims of the NSS and implements the NDS. It describes the Armed Forces' plan to achieve military objectives in the near term and provides the vision for ensuring they remain decisive in the future. The NMS is a classified document. The Army Strategy : articulates how the Army achieves its objectives and fulfills its Title 10 duties to organize, train, and equip the Army for sustained ground combat. The Army Strategy provides guidance for budget planning and programming across multiple Future Year Defense Programs (FYDP). All strategies share a common theme, that of \"return to great power competition\" which posits that \"Russia and China are competitors to the United States and both nations are looking to overturn the current rules-based international order.\" This requires the U.S. military to focus its doctrine and resources on countering this perceived threat. In this regard, the aforementioned strategies also re-focus the Service's modernization efforts towards defeating the perceived Chinese and Russian military threat. As previously noted, the possibility exists for a variety of Army Modernization-hearings spanning a number of different Congresses. In this regard, a common oversight architecture could potentially provide both an element of continuity and a means by which Congress might evaluate the progress of the Army's modernization efforts. Such a potential architecture might examine: Is the Army's Modernization Strategy appropriate given the current and projected national security environment? Is the Army's Modernization Strategy achievable given a number of related concerns? Is the Army's Modernization Strategy affordable given current and predicted future resource considerations? To support this potential oversight architecture, a number of topics for discussion are provided for congressional consideration. The Army contends its modernization strategy addresses the challenges of the future operational environment and directly supports the 2018 National Defense Strategy's (NDS) line of effort, \"Build a More Lethal Force.\" The congressionally established Commission on the National Defense Strategy for the United States (Section 942, P.L. 114-328 ) questions this assertion, noting: We came away troubled by the lack of unity among senior civilian and military leaders in their descriptions of how the objectives described in the NDS are supported by the Department's readiness, force structure, and modernization priorities , as described in the Future Years Defense Program (FYDP) and other documents. (Emphasis added.) While the Commission's finding is directed at DOD as a whole, it suggests there are questions concerning how modernization priorities and plans support the National Defense Strategy and, by association, the National Security and Military strategies as well. While the aforementioned strategic documents all feature the central theme of \"return to great power competition\" vis-Ã -vis Russia and China, it is not readily apparent to many observers how the Army's modernization priorities directly support this goal. In this regard, a more detailed examination of the Army's new Modernization Strategy's alignment with the National Security, National Defense, and National Military Strategies could prove beneficial to policymakers. While it can be considered essential that the Army's Modernization Strategy aligns with and supports the National Security, National Defense, and National Military strategies of the United States, it can be argued that of equal importance is whether the Army's Modernization Strategy takes into account the military strategies of peer competitors. A May 2019 study offers a summary of Russian and Chinese strategies and suggests a U.S. response: The core of both countries' challenge to the U.S. military lies in what are commonly called anti-access/area denial (A2/AD) systems: in more colloquial terms, a wide variety of missiles, air defenses, and electronic capabilities that could destroy or neutralize U.S. and allied bases, surface vessels, ground forces, satellites, and key logistics nodes within their reach. Both China and Russia have also developed rapidly deployable and fearsomely armed conventional forces that can exploit the openings that their A2/AD systems could create. Despite these advances, both China and Russia still know that, for now, they would be defeated if their attacks triggered a full response by the United States. The key for them is to attack and fight in a way that Washington restrains itself enough for them to secure their gains. This means ensuring that the war is fought on limited terms such that the United States will not see fit to bring to bear its full weight. Focused attacks designed to pick off vulnerable members of Washington's alliance network are the ideal offensive strategy in the nuclear age, in which no one can countenance the consequences of total war. The most pointed form of such a limited war strategy is the fait accompli. Such an approach involves an attacker seizing territory before the defender and its patron can react sufficiently and then making sure that the counterattack needed to eject it would be so risky, costly, and aggressive that the United States would balk at mounting itânot least because its allies might see it as unjustified and refuse to support it. Such a war plan, if skillfully carried out in the Baltics or Taiwan, could checkmate the United States. The U.S. military must shift from one that surges to battlefields well after the enemy has moved to one that can delay, degrade, and ideally deny an adversary's attempt to establish a fait accompli from the very beginning of hostilities and then defeat its invasion. This will require a military that, instead of methodically establishing overwhelming dominance in an active theater before pushing the enemy back, can immediately blunt the enemy's attacks and then defeat its strategy even without such dominance. From an operational perspective, new systems developed as part of the Army's Modernization Strategy would potentially need to not only provide a technological improvement over legacy systems but also support the Army's operational conceptâin this case Multi Domain Operations (MDO)âintended to counter Russia and China. A detailed examination of how these systems directly counter Russian and Chinese military capabilities and strategies could prove beneficial to policymakers. In February 2011, then-Secretary of Defense Robert Gates told West Point Cadets; We can't know with absolute certainty what the future of warfare will hold, but we do know it will be exceedingly complex, unpredictable, andâas they say in the staff collegesâ\"unstructured.\" Just think about the range of security challenges we face right now beyond Iraq and Afghanistan: terrorism and terrorists in search of weapons of mass destruction, Iran, North Korea, military modernization programs in Russia and China, failed and failing states, revolution in the Middle East, cyber, piracy, proliferation, natural and man-made disasters, and more. And I must tell you, when it comes to predicting the nature and location of our next military engagements, since Vietnam, our record has been perfect. We have never once gotten it right, from the Mayaguez to Grenada, Panama, Somalia, the Balkans, Haiti, Kuwait, Iraq, and moreâwe had no idea a year before any of these missions that we would be so engaged. If former Secretary of Defense Gates' admonition that we have never accurately predicted our next military engagement holds true, it is a distinct possibility that a direct conventional confrontation with Russia or China posited by the National Security Strategy might not come to pass. In the case of China, it has been suggested it is more likely U.S. and Chinese interests will clash in the form of proxy wars and insurgencies as opposed to a great power war. The recent U.S.âIranian confrontation is an example of such a non-great power military challenge with the potential for a rapid escalation or a protracted proxy war. With this in mind, some may consider any strategy not relevant to other potential military challenges other than great power war to be ill-conceived. To insure the Army's new Modernization Strategy is relevant, an examination of how its applies to potential adversaries other than China and Russia as well as other possible military challenges not related to great power competition could be useful to policymakers. According to the Army's Strategy: The Army Missionâour purposeâremains constant: To deploy, fight, and win our Nation's wars by providing ready, prompt, and sustained land dominance by Army forces across the full spectrum of conflict as part of the Joint Force. As part of this Joint Force, it can be argued the Army's Modernization Strategy should complement the modernization strategies of the other Services and vice versa. In order for the Service's modernization strategies to complement one another, a joint war-fighting concept is essential and, at present, no such a concept is agreed by all Services. According to the Army: A Joint war-fighting concept would provide a common framework for experimentation and validation of how the joint force must fight, what capabilities each of the services must have, and how the Joint force should be organizedâfurther allowing civilian leaders to make cross-service resource decisions. While the Army favors and is promoting MDO for adoption by the other Services, the Air Force is focusing on Multi Domain Command and Control, the Navy on Distributed Maritime Operations, and the Marine Corps on the Marine Corps Operating Concept. While these operating concepts share some common themes such as great power competition and a need to be able to operate in a variety of domains, they differ in approach but not to an extent where a common joint warfighting concept could not be agreed upon. Despite this lack of a common joint warfighting concept, the Army claims its modernization programs are aligned with the other Services. Army leadership has noted that \"the three of us [Army, Air Force, and the Department of the Navy] are completely aligned,\" citing the \"development of a hypersonic weapon as a good example.\" While the Army might be collaborating now more than ever with the Air Force and Navy as it claims, collaborating at the programmatic level does not necessarily constitute a complementary relationship of the Service's modernization strategies. In this regard, Congress might decide to examine the relationship between the Service's modernization strategies to insure they are complementary. Army officials reportedly have identified 31 modernization initiativesânot all of them programs of recordâintended to support the Army's six modernization priorities. The Army notes that \"there are interdependencies among the 31 initiatives which need to fit together in an overall operational architecture.\" Examples of a few of the higher-visibility initiatives grouped by modernization priority include: Long Range Precision Fires: Strategic Long Range Cannon (SLRC). Precision Strike Missile (PrSM). Extended Range Cannon Artillery (ERCA). Next Generation Combat Vehicle: (NGCV) : Optionally Manned Fighting Vehicle (OMFV). Robotic Combat Vehicle (RCV): 3 variants. Armored Multi-Purpose Vehicle (AMPV). Mobile Protected Firepower (MPF). Decisive Lethality Platform (DLP). Future Vertical Lift: Future Attack Reconnaissance Aircraft (FARA). Future Attack Unmanned System (FUAS). Future Long Range Assault Aircraft. Air And Missile Defense: Maneuver Short-Range Air defense (M-SHORAD). Indirect Fire Protection Capability (IFPC). Soldier Lethality: Next Generation Squad Weapons â Automatic Rifle (NGSW-AR). Next Generation Squad Weapons â Rifle (NGSW-R). While some of these initiatives are currently in development and procurement, others are still in the requirements definition and conceptual phase. With so many initiatives and interdependencies, it is reasonable to ask \"can the Army's modernization effort survive the failure of one or more of the 31 initiatives?\" Another potential way of gauging if the Army is \"overreaching\" would be to establish how much modernization is required before the Army considers itself sufficiently modernized to successfully implement MDO as currently envisioned. One question for the Army might be \"What are the Army's absolute \"must-have\" systems or capabilities to ensure the Army can execute MDO at its most basic level?\" In March 2019 testimony to the Senate Armed Services Committee, then Secretary of the Army Mark Esper and Chief of Staff of the Army Mark Milley stated: To guide Army Futures Command, the Army established a clear set of modernization priorities that emphasize rapid maneuver, overwhelming fires, tactical innovation, and mission command. Our six modernization priorities will not change , and they underscore the Army's commitment to innovate for the future. We have one simple focusâto make Soldiers and units more capable and lethal. Over the last year, we identified $16.1B in legacy equipment programs that we could reinvest towards 31 signature systems that are critical to realizing Multi-Domain Operations and are aligned with these priorities. While the Army's prioritization of and commitment to its modernization initiatives can be viewed as essential to both resourcing and executing the Army's Modernization Strategy, some defense experts have questioned the Army's modernization priorities. For example, the Heritage Foundation's August 2019 report \"Rebuilding America's Military Project: The United States Army,\" suggests different modernization priorities: Given the dependence of MDO on fires and the poor state of Army fire systems, the inclusion and first placement of long-range precision fires is logical. Based on the importance of the network to MDO and the current state of Army tactical networks, logically the network should come next in priority. Third, based on the severely limited current capabilities, should come air and missile defense, followed by soldier lethality in fourth. Next-generation combat vehicles are fifth; nothing has come forward to suggest that there is a technological advancement that will make a next-generation of combat vehicles significantly better. Finally, the last priority should be future vertical lift, although a persuasive argument could be made to include sustainment capabilities instead. Nowhere in the MDO concept is a compelling case made for the use of Army aviation, combined with the relative youth of Army aviation fleets. Aside from differing opinions from defense officials and scholars, world events might also suggest the need to re-evaluate the Army's modernization priorities. One example is the September 14, 2019 attack against Saudi Arabian oil facilities, believed to have been launched from Iran, which employed a combination of unmanned aerial vehicles (UAVs) and cruise missiles. It has been pointed out U.S. forces are ill-prepared to address this threat although the Army has a variety of programs both underway and proposed to mitigate this vulnerability. If the September 14, 2019 attacks are replicated not only in the region but elsewhere by other actors, it might make a compelling case to reprioritize Army air and missile defense from fifth out of six modernization priorities to a higher level to address an evolving and imminent threat. Apart from the Army's stated modernization priorities, there might also be other technologies or systems that merit inclusion based on changing world events. First established in 2018, Army Futures Command (AFC) is intended to: Modernize the Army for the future-will integrate the future operational environment, threat, and technologies to develop and deliver future force requirements, designing future force organizations, and delivering materiel capabilities. According to the Army's 2019 Modernization Strategy: Modernization is a continuous process requiring collaboration across the entire Army, and Army Futures Command brings unity of effort to the Army's modernization approach. AFC, under the strategic direction of Headquarters, Department of the Army (HQDA), develops and delivers future concepts, requirements, and organizational designs based on its assessment of the future operating environment. AFC works closely with the Army's modernization stakeholders to integrate and synchronize these solutions into the operational force. While this broad statement provides a basic modernization management concept, it does not address specific authorities and responsibilities for managing Army modernization. Many in Congress have expressed concerns with the relationship between AFC and the Assistant Secretary of the Army for Acquisitions, Logistics, and Technology (ASA (ALT)) who has a statutory role in the planning and resourcing of acquisition programs. The Senate Appropriations Committee's report accompanying it's version of the Department of Defense Appropriations Bill, 2020, directs the Army to clearly define modernization responsibilities: ARMY ACQUISITION ROLES AND RESPONSIBILITIES The Committee has supported efforts by the Army to address modernization shortfalls and deliver critically needed capabilities to the warfighter through establishment of Cross-Functional Teams [CFTs] and ultimately the stand-up of Army Futures Command [AFC]. However, questions remain on the roles and responsibilities of AFC and the Assistant Secretary of the Army (Acquisition, Logistics & Technology) [ASA(ALT)]. As an example, the Committee recently learned of a newly created Science Advisor position within AFC, which seems to be duplicative of the longstanding role of the Deputy Assistant Secretary of the Army for Research and Technology. Additionally, the Committee was concerned to learn that funding decisions on investment accounts, to include science and technology programs, would be directed by AFC rather than ASA(ALT). While the Committee supports AFC's role in establishing requirements and synchronizing program development across the Army, it affirms that ASA(ALT) has a statutory role in the planning and resourcing of acquisition programs. The ASA(ALT) should maintain a substantive impact on the Army's long-range investments, not just serve as a final approval authority. Therefore, the Committee directs the Secretary of the Army to provide a report that outlines the roles, responsibilities, and relationships between ASA(ALT) and AFC to the congressional defense committees not later than 90 days after enactment of this act. The report shall include a clear description of the responsibilities of each organization throughout the phases of the planning, programming, budgeting, and execution of resources . (Emphasis added.) While the Army has placed significant emphasis on the \"revolutionary\" nature of AFC and its role in modernization, questions may remain about whether AFC will provide a significant level of \"value added\" to Army modernization and not encroach on the statutory responsibilities of the ASA (ALT) as well as other major Army organizations having a role in modernization. According to the Army's 2019 Modernization Strategy, the Army plans to build a \"MDO ready force by 2035.\" In order for this goal to be achieved, the Army assumes that: The Army's budget will remain flat, resulting in reduced spending power over time. Demand for Army forces will remain relatively constant while it executes this strategy. Research and development will mature in time to make significant improvements in Army capabilities by 2035. Adversary modernization programs will stay on their currently estimated trajectories in terms of capability levels and timelines. It is not clear if \"MDO ready\" equates to a \"fully modernized\" Army or if a certain undefined level of modernization is sufficient for the Army to successfully execute MDO. Originally, Army officials were hoping to field the M-2 Bradley replacementâthe Optionally Manned Fighting Vehicle (OMFV)âby 2026. They also planned to field one brigade's worth of OMFVs per yearâmeaning that it would have taken until 2046 to field OMFVs to all Armored Brigade Combat Teams (ABCTs). On January 16, 2020, the Army decided to cancel the current OMFV solicitation and revise and re-solicit the OMFV requirements on a competitive basis at an unspecified time in the future. Given this cancellation, it may take longer than 2046 to field all OMFVs unless significant budgetary resources are applied to the program. With the Army's somewhat optimistic assumptions about the budget, demand for forces, mature research and development, and the pace of adversary modernization, as well as the scope and complexity of overall Army Modernization, some policymakers may raise questions about whether a full realization of Army modernization initiatives is possible by 2035. In order to support MDO, Army officials reportedly noted in March 2019 that the Army was preparing to make major force structure changes within the next five years. These force structure changes will also be needed to support Army Modernization as new weapons systems could likely require new units and might also mean that existing units are deactivated or converted to different kinds of units. Potential questions for policymakers include: What kinds of new units will be required as a result of Army Modernization? Will existing units be deactivated or converted to support Army Modernization? Will additional endstrength be required to support Army Modernization or will fewer soldiers be needed? Will new Military Operational Specialties (MOSs) be required to support Army Modernization? How will new units be apportioned between the Active and Reserve Components? Where will these new units be stationed in the United States and overseas? Will new training ranges or facilities be required to support Army Modernization? Army officials have said they eliminated, reduced, or consolidated almost 200 legacy weapon systems catalogued in the Future Years Defense Program (FYDP) as part of an effort to shift more than $30 billion to programs related to the \"Big Six\" modernization priorities. The budget review process, known as \"Night Court,\" was initiated by then-Army Secretary Mark Esper. Army officials have said additional reviews will yield lower levels of savings. They have also acknowledged uncertainty in budget assumptions, including total projected funding for the service and long-term costs for modernization priorities as they shift from research, development, test, and evaluation (RDT&E) to procurement activities. Army Lieutenant General James Pasquarette, Deputy Chief of Staff of the Army for Programs (G-8), has said: Our strategy right now assumes a topline that's fairly flat. I'm not sure that's a good assumption. So, when the budget does go down ... will we have the nerve to make the hard choices to protect future readiness? Often that's the first lever we pullâwe try and protect end-strength and current readiness at the cost of future readiness.... We don't really have a clear picture of what those bills are right now [for long-term costs of modernization priorities].... There are unrealized bills out there that we're going to have to figure out how to resource and so, right now, I think they're underestimated. Some policymakers and observers have raised questions about the affordability of the Army's modernization strategy. This section seeks to provide context to this question by detailing the Army's requested funding for programs related to its six modernization priorities for FY2020 and the accompanying FYDP, historical and projected funding for the service's RDT&E and procurement efforts in real terms (i.e., inflation-adjusted dollars), changes in the service's budget allocations over time, and planned funding for the service's major defense acquisition programs. According to information provided by the Army, the service requested $8.9 billion in RDT&E and procurement funding for programs related to its six modernization priorities in FY2020. This amount reflects an increase of $3.9 billion (78%) from the FY2019 enacted amount of $5 billion. See Table 1 for a breakdown of projected funding by priority. For FY2020, the Army requested a total of $38.7 billion for its acquisition accounts, including $12.4 billion for RDT&E and $26.3 billion for procurement. Notably, for FY2020, funding requested for programs related to the Army's six modernization priorities, $8.9 billion, accounted for less than a quarter (23%) of its overall acquisition budget request. Potential questions for policymakers include: How has the Army identified funding to pay for programs related to its six modernization priorities? What officials and organizations have been involved? What is the status of these reviews? How can the Army provide more transparency in identifying sources of funding from these reviews? Why does funding for programs related to the Army's six modernization priorities account for a relatively small share of its overall acquisition budget? Should the Army devote a larger share of its overall acquisition budget to its six modernization priorities? What would be some challenges in doing so? When does the Army expect to fully resource programs related to its modernization priorities? How much of the Army's overall acquisition budget should go toward modernization priorities, current acquisition programs, and legacy programs? Some programs related to the Army's six modernization priorities, such as Future Vertical Lift, saw a higher percentage increase in requested funding for FY2020 than others, such as Air and Missile Defense. Do the percentage increases reflect the level of priority the Army is assigning these individual programsâor rising costs associated with new stages of development? The Army's FY2020 unfunded priorities list included $242.7 million for \"modernization requirements\" and $403.9 million for \"lethality requirements,\" among funding for other requirements. Why was the service unable to fund these requirements in its regular budget request? The service projected $57.3 billion in RDT&E and procurement funding for programs related to its six modernization priorities over the FYDP from FY2020 through FY2024. This amount, if authorized and appropriated by Congress, would reflect an increase of $33.1 billion (137%) from projections for the five-year period in the FY2019 budget request. See Table 2 for a breakdown of the projected cost by program. For the five-year period through FY2024, the Army projected a total of $187.5 billion for its acquisition accounts (in nominal dollars), including $58.7 billion for RDT&E and $128.8 billion for procurement. Notably, for the FY2020 FYDP, funding for programs related to the Army's six modernization priorities accounts for less than a third (31%) of its overall acquisition budget. In addition to the previous list, potential questions for policymakers include: How realistic are the Army's assumptions for funding programs related to its six modernization priorities, given uncertainty about their long-term costs and the projected decrease in real terms (i.e., inflation-adjusted dollars) in Army procurement and RTD&E funding over the Future Years Defense Program? Should the level of planned funding change for certain programs to reflect different priorities? What additional tradeoffs or divestments does the Army plan to make to its current acquisition programs or legacy weapon systems in order to fund programs related to its six modernization priorities? What programs may be cut? Taken together and adjusted for inflation (in constant FY2020 dollars), the Army's acquisition accountsâincluding RDT&E and procurementâhave experienced several buildup and drawdown cycles in past decades, with some of the biggest increases occurring during periods of conflict. See Figure 1 . For example, the service's acquisition budget spiked in FY1952 during the Korean War, again in FY1968 during the Vietnam War, and again in FY2008 during the wars in Afghanistan and Iraq. The FY2008 peak was driven in part by the service's procurement of Mine Resistant Ambush Protected (MRAP) vehicles and other programs intended to protect troops in combat zones from roadside bombs. In terms of a non-war peak, the Army received a combined total of $48.7 billion (in constant FY2020 dollars) for RDT&E and procurement in FY1985 during the Cold Warâan era in which the service's \"Big Five\" acquisition programs entered service, including the UH-60 Black Hawk utility helicopter (1979), M1 Abrams tank (1980), M2 Bradley fighting vehicle (1981), Patriot air defense system (1981), and AH-64 Apache attack helicopter (1986). The Army projects combined RDT&E and procurement funding will continue to decline in real dollars. The combined level of funding for these accounts is projected to decline from $38.7 billion in FY2020 to $34.3 billion in FY2024 (in constant FY2020 dollars), a decrease over the FYDP of $4.4 billion (11%). Even so, the FY2024 level would remain higher than the Army's historical average of $32.2 billion (in constant FY2020 dollars) for RDT&E and procurement. Potential questions for policymakers include: How may the projected decrease in RDT&E and procurement funding in constant FY2020 dollars over the Future Years Defense Program impact the Army's ability to execute its modernization strategy? If the Army's overall acquisition budget is projected to decrease (in real terms), and funding for programs related to its modernization strategy is projected to increase, what kinds of tradeoffs or divestments does the Army plan to make to its current acquisition programs or legacy weapon systems? How much, if any, of the increase in RDT&E and procurement funding in FY2018 went to programs related to the Army's six modernization priorities? To what extent will projected costs for programs related to the Army's six modernization priorities increase as they shift from RDT&E to procurement activities? The share of funding that the Congress has allocated to Army appropriations accounts has changed over time. Because every dollar spent on military personnel, operation and maintenance, and military construction is a dollar that cannot be spent on RDT&E or procurement, Army budget allocation decisions may impact the service's ability to execute its modernization strategy. For example, the Army uses funds from its Operation and Maintenance (O&M) account to pay the salaries and benefits of most of its civilian employees, train soldiers, and purchase goods and services, from fuel and office supplies to health care and family support. (Today, the account also covers most of the service's costs for Overseas Contingency Operations, or OCO. ) In FY1985, during the Reagan-era buildup, O&M accounted for a smaller share of the Army budget (28%) than it does today (41%) and than it has historically (36%). In the same year, procurement accounted for a larger share of the Army budget (26%) than it does today (14%) and than it has historically (16%). See Figure 2 . Potential questions for policymakers include: What changes in spending on military personnel could impact the Army's ability to execute its modernization strategy, particularly if the service increases end-strength? What changes in spending on operations and maintenance could impact the Army's ability to execute its modernization strategy? What changes in spending on Overseas Contingency Operations (OCO) could impact the Army's ability to execute its modernization strategy? How is the Army reviewing potential ways to control military personnel or operations and maintenance costs to be able to spend more on RDT&E and procurement in support of programs related to its modernization strategy? Including funding planned for FY2020 and FY2021 as part of the FY2020 President's budget request, the Army has an outstanding balance of $120.6 billion (in then-year dollars) for current major defense acquisition programs. Programs with balances greater than $10 billion include the following: CH-47F . The CH-47F Chinook Block II modernization program is intended to increase the carrying capacity of the cargo helicopter in part by upgrading its rotor blades and flight control and drive train components (estimated balance: $25.9 billion); Joint Light Tactical Vehicle (JLTV) . 59 This program is intended to replace a portion of the Humvee fleet with a new light-duty vehicle (estimated balance: $20.8 billion, $3 billion of which is projected to come from services other than the Army); and Armored Multi-Purpose Vehicle (AMPV). 60 This program is intended to replace the M113 armored personnel carrier family of vehicles with a new armored vehicle (estimated balance: $11.7 billion). For the cumulative funding status of each of the Army's current major defense acquisition programs as of the FY2020 President's budget re quest, including prior-year amounts and outstanding balances, see Figure 3 . For projected funding for each of the Army's current major defense acquisition programs as of the FY2020 President's budget request, see Figure 4 . As part of the FY2020 President's budget request, the Army proposed reducing funding for some current modernization programs, including the Joint Light Tactical Vehicle (JLTV) and the Armored Multi-Purpose Vehicle (AMPV), in part to pay for modernization priorities. As previously discussed, DOD has not yet designated many of the programs related to the Army's six modernization priorities as major defense acquisition programs (MDAPs). However, DOD appears to have designated as pre-major defense acquisition programs (pre-MDAPs) some programs related to the Army's six modernization priorities, such as Future Vertical Lift. When possible, the Army plans to begin equipping units with technology on a limited basis in coming years in advance of fully equipping units to take advantage of new technologies as soon as practicable. See Table 3 . Potential questions for policymakers include: How do programs included in the Army's six modernization priorities relate to current major defense acquisition programs? Should the Army fund certain current major defense acquisition programs, such as Integrated Air and Missile Defense, at higher levels to better conform to programs related to its six modernization priorities? How may resourcing requirements for programs related to the Army's six modernization priorities impact funding for its current major defense acquisition programs? Given the rapidly changing and unpredictable security challenges facing the United States and the scope of the Army's modernization program, congressional oversight could be challenged in the future as the Army attempts to develop and field an array technologies and systems. A potential oversight framework which constantly evaluates the relevance, the feasibility, and affordability of the Army's modernization efforts could benefit both congressional oversight and related budgetary activities.", "summary": "In October 2019, the Army published a new modernization strategy aimed at transforming the Army in order to conduct Multi-Domain Operations (MDO) which are intended to address the current and future actions of near-peer competitors Russia and China. The Army's Modernization Strategy is part of a hierarchy of strategies designed, among other things, to inform the Service's respective modernization plans. These strategies include the National Security Strategy (NSS), the National Defense Strategy (NDS), the National Military Strategy (NMS), and the Army Strategy. The Army's Modernization Strategy establishes six material modernization priorities: Long Range Precision Fires. Next Generation of Combat Vehicles. Future Vertical Lift. Army Network. Air and Missile Defense. Soldier Lethality. Because the Army's Modernization Strategy covers the years from 2020 to 2035, the possibility exists for a variety of Army modernization hearings spanning a number of different Congresses. In this regard a common oversight architecture could potentially provide both an element of continuity and a means by which Congress might evaluate the progress of the Army's modernization efforts. Such a potential architecture might examine: Is the Army's Modernization Strategy appropriate given the current and projected national security environment? Is the Army's Modernization Strategy achievable given a number of related concerns? Is the Army's Modernization Strategy affordable given current and predicted future resource considerations? For FY2020, funding requested for programs related to the Army's six modernization priorities, $8.9 billion, accounted for less than a quarter (23%) of its overall acquisition budget. The service projected $57.3 billion in research, development, test, and evaluation (RDT&E) and procurement funding for programs related to its six modernization priorities over the Future Years Defense Program (FYDP) from FY2020 through FY2024. This amount, if authorized and appropriated by Congress, would reflect an increase of $33.1 billion from spending projections for the five-year period in the FY2019 budget request. Meanwhile, the Army projected a total of $187.5 billion for its acquisition accounts (in nominal dollars) over this period, including $128.8 billion for procurement and $58.7 billion for RDT&E. Thus, for the FY2020 FYDP, funding for programs related to the Army's six modernization priorities accounts for less than a third (31%) of its overall acquisition budget. This report provides a number of possible questions and observations related to a potential Army modernization oversight architecture which could serve to provide both an element of continuity for hearings and a standard by which Congress might evaluate the efficacy of Army Modernization.", "document_type": "crs"}
{"report": "O ver the last several years, the public and lawmakers in the United States have been alarmed over the increasing number of drug overdose deaths , most of which have involved opioids. Congress has responded to the issue through legislative activity , oversight, and funding, while the Administration has sought to reduce the supply and demand of illicit drugs through enforcement, prevention, and treatment. This FAQ report answers questions about the opioid epidemic and federal efforts to control the supply of opioids. It does not provide a comprehensive overview of opioid abuse and the criminal justice response. Instead, it answers common questions that have arisen due to rising drug overdose deaths and the availability of illicit opioids in the United States. This section answers questions on the nature of the opioid epidemic in the United States. The answers provide background on the types of opioids that are being abused, the associated harm to the abusers of these substances, and the extent of the abuse. An opioid is a type of drug that, when ingested, binds to opioid receptors in the bodyâmany of which control a person's pain . While opioids are medically used to alleviate pain, some are abused by being used in a way other than prescribed (e.g., in greater quantity) or taken without a doctor's prescription. Many prescription pain medications, such as hydrocodone and fentanyl, are opioids, as are some illicit drugs, such as heroin. In its annual National Survey on Drug Use and Health (NSDUH), the Substance Abuse and Mental Health Services Administration (SAMHSA) does not ask questions about \"opioids\" specifically; rather, it asks respondents about their use of heroin and misuse of prescription pain relievers in two separate questions. In 2017, SAMHSA estimated that 11.4 million people misused an opioid at least once in the past yearâthis includes 11.1 million prescription pain reliever \"misusers\" and 886,000 heroin users. In 2017, SAMHSA also estimated that 3.2 million Americans ages 12 and older (1.2% of the population 12 and older) were current \"misusers\" of prescription pain relievers, and approximately 494,000 Americans ages 12 and older (0.2% of the population 12 and older) were current users of heroin. The University of Michigan administers an annual Monitoring the Future Survey , which measures drug use behaviors among 8 th , 10 th , and 12 th graders; college students; and young adults. In 2018, 3.4% of surveyed 12 th graders were current users of \"narcotics other than heroin\", and 0.1% of surveyed 8 th , 10 th , and 12 th graders were current users of heroin. For chronic and severe pain, opioids can improve the functioning of legitimate pain patients; however, there are short- and long-term physical risks of abusing opioids. For example, nonfatal overdoses have been associated with a number of health issues, including brain injury, pulmonary and respiratory problems, hypothermia, kidney and liver failure, seizures, and others. The most severe physical harm associated with opioid abuse is death due to overdose. Drug overdose deaths have increased four-fold from 16,849 in 1999 to 70,237 in 2017. Of the 70,237 overdose deaths, 47,600 (67.8%) involved opioids. The main driver of drug overdose deaths overall is synthetic opioids. Reports indicate that recent increases in overdose deaths are most likely driven by illicitly manufactured fentanyl. Aside from the harm associated with fatal and nonfatal opioid overdoses, addiction is a primary harm associated with opioids. Licit and illicit opioids are highly addictive. Addiction and general misuse of opioids have contributed to a series of public health, welfare, and social problems that have been widely discussed in public forums. The numbers and rates of drug overdose deaths vary by state and region of the United States. Table 1 shows the number of deaths and age-adjusted overdose death rates for each state and the national totals for 2017. As illustrated in Figure 1 , the states east of the Mississippi River have comparatively higher rates of drug overdose deaths than states west of the Mississippi River, although New Mexico, Arizona, and Utah all rank in the top half of states for age-adjusted rates of drug overdose deaths. The Drug Enforcement Administration (DEA) and the Centers for Disease Control and Prevention (CDC) have indicated that overdose deaths have increased in states also reporting large increases in fentanyl seizures. In addition, there is reportedly a \"strong relationship\" between the number of synthetic opioid deaths and the number of fentanyl reports in the National Forensic Laboratory Information System (NFLIS). The National Institute on Drug Abuse (NIDA) reports that the number of fentanyl-related deaths is likely underestimated because some medical examiners do not test for fentanyl and some death certificates do not list specific drugs. Heroin, fentanyl, and prescription opioids are significant drug threats in the United Statesâin 2017, approximately 44% of domestic local law enforcement agencies responding to the National Drug Threat Survey (NDTS) reported heroin as the greatest drug threat in their area. While the percentage of NDTS respondents reporting high availability of controlled prescription drugs (CPDs), which include some opioids, has declined over the last several years (75% of NDTS respondents reported high availability in 2014, compared to 52% in 2017), the reported availability of heroin has increased (30% reported high availability in 2014, compared to 49% in 2017). Further, there has been a rise in the availability of illicit fentanylâthe primary synthetic opioid available in the United States. While opioids have been available in the United States since the 1800s, the market for these drugs shifted significantly beginning in the 1990s. This section focuses on this latter period (see Figure 2 ). In the 1990s, the availability and abuse of prescription opioids, such as hydrocodone and oxycodone, increased as the legitimate production, and the subsequent diversion of some of these drugs, increased sharply. This continued into the early 2000s, as illegitimate prescription opioid users turned to family and friends, \"doctor shopping,\" bad-acting physicians, pill mills, the internet, pharmaceutical theft, and prescription fraud to obtain prescription opioids. The federal government has used varied approaches to reduce the unlawful prescription drug supply and prescription drug abuse, including diversion control through grants for state prescription drug monitoring programs ; a crackdown on pill mills; increased regulation of internet pharmacies ; the reformulation of a commonly abused prescription opioid, OxyContinÂ® (oxycodone hydrochloride controlled-release) ; and the rescheduling of hydrocodone. Some experts have highlighted a connection between the crackdown on the unlawful supply of prescription drugs and the subsequent rise in the availability and abuse of heroin (discussed in the next section). Heroin is a cheaper alternative to prescription opioids, and may be accessible to some who are seeking an opioid high. Notably, while most users of prescription drugs will not go on to use heroin, accessibility and price are central factors cited by patients with opioid dependence who decide to turn to heroin. In October 2018, the Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (SUPPORT Act; P.L. 115-271 ) imposed tighter oversight of opioid production and distribution, required additional reporting and safeguards to address fraud, and limited Medicare coverage of prescription opioids. Also in 2018, the DEA proposed a \"significant\" reduction in opioid manufacturing for 2019. In its final order setting the aggregate production quota for certain controlled substances in 2019, the DEA noted that it \"has observed a decline in the number of prescriptions written for schedule II opioids since 2014 and will continue to set aggregate production quotas to meet the medical needs of the United States while combating the opioid crisis.\" The trajectory of the heroin supply over the last several decades is much different than that of prescription opioids, but their stories are connected. In the late 1990s and early 2000s, white powder heroin produced in South America dominated the market east of the Mississippi River, and black tar and brown powder heroin produced in Mexico dominated the market west of the Mississippi. Most of the heroin found in the United States at that time came from South America, while smaller percentages came from Mexico and Southwest Asia. In the 1990s, the purity and price of retail-level heroin varied considerably by region. The average retail-level purity of South American heroin was around 46%, which was considerably higher than that of Mexican, Southeast Asian, or Southwest Asian heroin. Mexican heroin was around 27% pure, while Southeast Asian and Southwest Asian heroin were around 24% and 30% pure, respectively. Retail prices for heroin fell dramatically throughout the 1990sâit was 55% to 65% less expensive in 1999 than in 1989. Through 2017, retail-level heroin prices continued to decline (although they increased slightly from 2015 to 2016), while purity, in particular that of Mexican heroin, has increased (although purity also dipped slightly from 2015 to 2016). The availability of Mexican heroin has increased. In 2016, nearly 90% of the heroin seized and tested in the United States was determined to have come from Mexico, while a much smaller portion was from South America. Mexican-sourced heroin dominates the U.S. heroin market, in part, because of its proximity and its established transportation and distribution infrastructure. In addition, increases in Mexican production have ensured a reliable supply of low-cost heroin, even as demand for the drug has increased. Mexican transnational criminal organizations have particularly increased their production of white powder heroin as they have expanded their retail presence into the eastern part of the United States (where the primary form of heroin consumed has been white powder) and they have diversified the heroin sold in western states. Of further concern is the increasing amount of heroin seizures containing fentanyl and/or fentanyl-related substances. Exacerbating the current opioid problem is the rise of illicit nonpharmaceutical fentanyl available on the black market. Diverted pharmaceutical fentanyl represents only a small portion of the fentanyl market. Illicit nonpharmaceutical fentanyl largely comes from China, and it is often mixed with or sold as heroin. It is 50 to 100 times more potent than heroin, and over the last several years, reported prices ranged between $30,000 and $38,000 per kilogram. The increased potency of illicit nonpharmaceutical fentanyl compounds, such as \"gray death,\" is even more dangerous. Law enforcement expects that illicit fentanyl distributors will continue to create new fentanyl products to circumvent new U.S., Chinese, and Mexican laws and regulations. Illicit opioids include those from plant-based and synthetic sources. While some opium poppy crops are legally cultivated to meet global demand for scientific and medicinal purposes, the United Nations (U.N.) estimates that approximately 345,800 hectares of opium poppy crops were illicitly cultivated around the world in 2018âa 16.6% decrease from the estimated 414,500 hectares in 2017. The vast majority of illicit opium poppy is grown in Afghanistan, which cultivated approximately 263,000 hectares in 2018. Most heroin consumed in the United States is derived from illicit opium poppy crops cultivated in Mexico. According to U.S. government estimates, approximately 44,100 hectares of illicit opium poppy was cultivated in Mexico in 2017 (up from 28,000 hectares cultivated in 2015). Illicit cultivation of opium poppy has also been reported in Burma (37,300 hectares in 2018), Laos (5,700 hectares in 2015), and Colombia (282 hectares in 2017). Several dozen other countries have reported comparatively smaller seizures of opium poppy plants and eradication of opium poppy crops. Synthetic opioids may enter the illicit drug market through diversion from legitimate pharmaceutical manufacturing operations or through the clandestine production of counterfeit medicines and/or of psychoactive substances intended for recreational consumption. Illicit synthetic opioids consumed in the United States are mostly foreign-sourced. According to the State Department, \"China's large chemical and pharmaceutical industries provide an ideal environment for the illicit production and export of [synthetic drugs].\" The State Department also reports that India's pharmaceutical and chemical industries are particularly susceptible to criminal exploitation; India legally produces opium for pharmaceutical uses and manufactures synthetic opiate pharmaceuticals, in addition to numerous precursor chemicals that could be diverted and used as ingredients in the production of illicit opioids. Clandestine laboratories illicitly producing fentanyl have been discovered in Mexico, Canada, the Dominican Republic, the United States, and other countries. The active and inactive ingredients in prescription opioids may come from various countries around the world. Prescription drugs may be manufactured domestically or abroad. Current law and regulations allow for the importation of certain prescription drugs that are manufactured outside the country. Prescription drugs in the United States, regardless of where they were manufactured, flow through a regulated supply chain âinvolving manufacturers, processers, packagers, importers, and distributorsâuntil they are ultimately dispensed to end users. The majority of misused prescription opioids available in the United States have been prescribed for a legitimate use and then diverted. Counterfeit prescription opioids are also available; in these cases, substances have often been pressed into pills in the United States, or abroad and then transported into the country, and sold. The DEA has indicated that one of the reasons traffickers may be disguising other opioids as CPDs could be that they are attempting to \"gain access to new users.\" Mexican transnational criminal organizations (TCOs) are the major suppliers and key producers of most illegal drugs smuggled into the United States, and they have been increasing their share of the U.S. heroin market. The 2018 National Drug Threat Assessment notes that most illicit heroin flows into the United States over the Southwest border. It is primarily moved through legal ports of entry (POEs) in passenger vehicles or tractor trailers where it can be co-mingled with legal goods; a smaller amount of heroin is seized from individuals carrying the drugs on their person or in backpacks. Data from U.S. Customs and Border Protection (CBP) indicate that in FY2018, 5,205 pounds of heroin were seized at POEs, and 568 pounds were seized between POEs. The DEA notes that \"[f]entanyl continues to be smuggled into the United States primarily in powder or counterfeit pill form, indicating illicitly produced fentanyl as opposed to pharmaceutical fentanyl from the countries of origin.\" Fentanyl is smuggled into the United States directly from China through the mail, from China through Canada, or across the Southwest border from Mexico. Smaller quantities of fentanyl with relatively high purity (some over 90%) are smuggled from China, and larger quantities of fentanyl with relatively low purity (often less than 10%) are transported from Mexico. The DEA notes that Mexican traffickers often get fentanyl precursor chemicals from China. In addition, these traffickers may receive fentanyl from China, adulterate it, and smuggle it into the United States. Data from CBP indicate that in FY2018, 1,785 pounds of fentanyl were seized at POEs, and 388 pounds were seized between POEs. The DEA reports that the San Diego border sector has been the primary entry point for fentanyl coming into the United States across the Southwest border (85% of the fentanyl seized coming across the Southwest border in 2017 flowed through the San Diego sector, and 14% came through the Tucson sector). Most commonly, the fentanyl seized coming through Southwest border POEs was smuggled in personally operated vehicles. There are a number of federal departments and agencies involved in countering illicit opioid trafficking in the United States. ONDCP is responsible for creating, implementing, and evaluating U.S. drug control policies to reduce the use, manufacturing, and trafficking of illicit drugs as well as drug-related health consequences, crime, and violence. The ONDCP director is required to develop a National Drug Control Strategy (Strategy) to direct the nation's anti-drug efforts and a National Drug Control Budget (Budget) designed to implement the Strategy. The director also is required to coordinate implementation of the policies, goals, objectives, and priorities established by the Administration by agencies contributing to the Federal Drug Control Program. In addition, ONDCP manages several grant programs, including the High Intensity Drug Trafficking Areas (HIDTA) program. While ONDCP is not focused solely on countering opioid-related threats, it is a major priority of the office. The HIDTA program provides assistance to law enforcement agenciesâat the federal, state, local, and tribal levelsâthat are operating in regions of the United States that have been deemed critical drug trafficking areas. There are 29 designated HIDTAs throughout the United States and its territories. The program aims to reduce drug production and trafficking through four means: promoting coordination and information sharing between federal, state, local, and tribal law enforcement; bolstering intelligence sharing between federal, state, local, and tribal law enforcement; providing reliable intelligence to law enforcement agencies such that they may be better equipped to design effective enforcement operations and strategies; and promoting coordinated law enforcement strategies that rely upon available resources to reduce illegal drug supplies, not only in a given area but throughout the country. HIDTA funds can be used to support the most pressing drug trafficking threats in the region. As such, when heroin trafficking is found to be a top priority in a HIDTA region, funds may be used to support initiatives targeting it. In addition, in 2015 ONDCP launched the Heroin Response Strategy (HRS), \"a multi-HIDTA, cross-disciplinary approach that develops partnerships among public safety and public health agencies at the Federal, state, and local levels to reduce drug overdose fatalities and disrupt trafficking in illicit opioids.\" Within the HRS, a Public Health and Public Safety Network coordinates teams of public health analysts and drug intelligence officers in each state. The HRS not only provides information to these participating entities on drug trafficking and use, but it has \"developed and disseminated prevention activities, including a parent helpline and online materials.\" ONDCP has been involved in various other counter-trafficking operations since its creation in 1988. Recently, it collaborated with the U.S. Department of Homeland Security's Science and Technology Directorate (as well as CBP and the U.S. Postal Inspection Service) to launch the Opioid Detection Challengeâa $1.55 million global prize competition to seek new solutions to detect opioids in international mail. DOJ controls the opioid supply through law enforcement; regulation of manufacturers, distributors, and dispensers; and grants to state and local agencies. U.S. efforts to target opioid trafficking have centered on law enforcement initiatives. There are a number of DOJ law enforcement agencies involved in countering opioid trafficking. Within these agencies, there are a range of activities aimed at (or that may be tailored to) curbing opioid trafficking. The OCDETF program targetsâwith the intent to disrupt and dismantleâmajor drug trafficking and money laundering organizations. Federal agencies that participate in the OCDETF program include the DEA; Federal Bureau of Investigation (FBI); Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF); U.S. Marshals; Internal Revenue Service (IRS); U.S. Immigration and Customs Enforcement (ICE); U.S. Coast Guard; Offices of the U.S. Attorneys; and the Department of Justice's (DOJ's) Criminal Division. These federal agencies also collaborate with state and local law enforcement on task forces. There are 14 OCDETF strike forces around the country and an OCDETF Fusion Center that gathers and analyzes intelligence and information to support OCDETF operations. The OCDETFs target those organizations that have been identified on the Consolidated Priority Organization Targets (CPOT) List, the \"most wanted\" list for leaders of drug trafficking and money laundering organizations. During FY2018, 52% of active OCDETF investigations involved heroin. According to DOJ, \"OCDETF has adjusted its resources to target these investigations in an attempt to reduce the [heroin] supply.\" The DEA enforces federal controlled substances laws in all states and territories. The agency has developed a 360 Strategy aimed at \"tackling the cycle of violence and addiction generated by the link between drug cartels, violent gangs, and the rising problem of prescription opioid and heroin abuse.\" The 360 Strategy leverages federal, state, and local law enforcement, diversion control, and community outreach organizations to achieve its goals. Additionally, the DEA routinely uses community-based enforcement strategies as well as multijurisdictional task forces to address opioid trafficking. The DEA also operates a heroin signature program (HSP) and a heroin domestic monitor program (HDMP) to identify the geographic sources of heroin seized in the United States. The HSP analyzes wholesale-level samples of \"heroin seized at U.S. ports of entry (POEs), all non-POE heroin exhibits weighing more than one kilogram, randomly chosen samples, and special requests for analysis.\" The HDMP samples retail-level heroin seized in selected cities across the country. Chemical analysis of a given heroin sample can identify its \"signature,\" which indicates a particular heroin production process that has been linked to a specific geographic region. In addition, the DEA has started a Fentanyl Signature Profiling Program (FSPP), analyzing samples from fentanyl seizures to help \"identify the international and domestic trafficking networks responsible for many of the drugs fueling the opioid crisis.\" The FBI investigates opioid trafficking as part of its efforts to counter transnational organized crime and gangs, cybercriminals, fraudsters, and other malicious actors. The FBI participates in investigations that range from targeting drug distribution networks bringing opioids across the Southwest border to prioritizing illicit opioid distributors leveraging the Dark Web to sell their drugs. Other DOJ agencies have key roles in combatting the opioid epidemic. The Offices of the U.S. Attorneys are responsible for the prosecution of federal criminal and civil cases, which include cases against prescribers, pharmaceutical companies, and pharmacies involved in unlawful manufacturing, distribution, and dispensing of opioids as well as illicit opioid traffickers. Other enforcement agencies such as the ATF and U.S. Marshals may also be involved in seizing illicit opioids in the course of carrying out their official duties. The Office of Justice Programs (OJP) administers grant programs to address opioid supply and demand (some of which are discussed below in \" Which DOJ grant programs may be used to address the opioid epidemic? \"). CBP works to counter the trafficking of illicit opioids (among other drugs) along the U.S. borders as well as via mail curriers. To help detect and interdict these substances, CBP employs tools such as nonintrusive inspection equipment (including x-ray and imaging systems), canines, and laboratory testing of suspicious substances. The agency also uses information and screening systems to help detect illicit drugs, targeting precursor chemicals, equipment, and the drugs themselves. CBP, through the Office of Field Operations (OFO) and the U.S. Border Patrol, seizes illicit drugs coming into the United States at and between POEs. CBP data indicate that 90% of the heroin seized by CBP in FY2018 was seized by OFO at POEs, and 10% was seized by the Border Patrol between POEs. In addition, these data indicate that 82% of the fentanyl seized in FY2018 was seized by OFO at POEs, and 18% was seized by the Border Patrol between POEs. Drug interdiction is part of the Coast Guard's law enforcement mission. The agency is responsible for interdicting noncommercial maritime flows of illegal drugs. Cocaine is the primary illicit drug encountered by the Coast Guard, as it is the most common drug moved via noncommercial vessels. While the Coast Guard encounters other illicit drugs, including opioids, the agency notes that those drugs are more commonly moved on land or in commercial maritime vessels that are regulated by other enforcement agencies. The Coast Guard also participates in multi-agency counterdrug task forces, including OCDETF. USPIS is the law enforcement arm of the U.S. Postal Service. It shares responsibility for international mail security with other federal agencies, and as a result of the opioid epidemic, it has dedicated more resources to investigating prohibited substances in the mail. From FY2016 through FY2018, USPIS had a \"1,000% increase in international parcel seizures and a 750% increase in domestic parcel seizures related to opioids.\" In FY2018, USPIS and its law enforcement partners seized over 96,000 pounds of drugs in the mail, including marijuana, methamphetamine, synthetic opioids, and others, but their publicly available data does not describe what portion of these drugs were opioids. The DEA has a key regulatory function in drug control. While it conducts traditional law enforcement activities such as investigating drug trafficking (including trafficking of heroin and other illicit opioids), it also regulates the flow of controlled substances in the United States. The Controlled Substances Act (CSA) requires the DEA to establish and maintain a closed system of distribution for controlled substances; this involves the regulation of anyone who handles controlled substances, including exporters, importers, manufacturers, distributors, health care professionals, pharmacists, and researchers. Unless specifically exempted by the CSA, these individuals must register with the DEA. Registrants must keep records of all transactions involving controlled substances, maintain detailed inventories of the substances in their possession, and periodically file reports with the DEA, as well as ensure that controlled substances are securely stored and safeguarded. The DEA regulates over 1.5 million registrants. The DEA uses its criminal, civil, and administrative authorities to maintain a closed system of distribution and prevent diversion of drugs, such as prescription opioids, from legitimate purposes. Actions include inspections, order form requirements, education, and establishing quotas for Schedule I and II controlled substances. More severe administrative actions include immediate suspension orders and orders to show cause for registrations. As noted previously, in 2018 the DEA significantly lowered the aggregate production quota for opioids in 2019. Discussed below are grant programs that have a direct or possible avenue to address the opioid epidemic. This discussion provides examples of such programs, and should not be considered exhaustive. Many DOJ grant programs have broad purpose areas for which funds can be used. While some focus on broad crime reduction strategies that might include efforts to combat drug-related crime, othersâincluding the selected programsâhave purpose areas that are more specifically focused on drug threats. Of note, these programs do not solely address illicit drug supply control; some also address demand as well as other criminal justice issues. They are included because they are administered by DOJ agencies. COAP is a recently created DOJ grant program (administered by BJA) for states, units of local government, and Indian tribes (34 U.S.C. 10701 et seq.). This grant program supports projects primarily relating to opioid abuse, including (1) diversion and alternatives to incarceration projects; (2) collaboration between criminal justice, social service, and substance abuse agencies; (3) overdose outreach projects, including law enforcement training related to overdoses; (4) strategies to support those with a history of opioid misuse, including justice-involved individuals; (5) prescription drug monitoring programs; (6) development of interventions based on a public health and public safety understanding of opioid abuse; and (7) planning and implementation of comprehensive strategies in response to the growing opioid epidemic. The Harold Rogers Prescription Drug Monitoring Program (PDMP) was incorporated into COAP. The Harold Rogers PDMP is a competitive grant program that was created to help law enforcement, regulatory entities, and public health officials collect and analyze data on prescriptions for controlled substances. Law enforcement uses of PDMP data include (but are not limited to) investigations of physicians who prescribe controlled substances for drug dealers or abusers, pharmacists who falsify records in order to sell controlled substances, and people who forge prescriptions. The Community Oriented Policing Services (COPS) Office's Anti-Heroin Task Force (AHTF) Program provides funding assistance on a competitive basis to state law enforcement agencies to investigate illicit activities related to the trafficking or distribution of heroin or diverted prescription opioids. Funds are distributed to states with high rates of primary treatment admissions for heroin and other opioids. Further, the program focuses its funding on state law enforcement agencies with multi-jurisdictional reach and interdisciplinary team structuresâsuch as task forces. The Drug Court Discretionary Grant program (Drug Courts Program) is meant to enhance drug court services, coordination, and substance abuse treatment and recovery support services. It is a BJA-administered, competitive grant program that provides resources to state, local, and tribal courts and governments to enhance drug court programs for nonviolent substance-abusing offenders. Drug courts are designed to help reduce recidivism and substance abuse among participants and increase an offender's likelihood of successful rehabilitation through early, continuous, and intense judicially supervised treatment; mandatory periodic drug testing; community supervision; appropriate sanctions; and other rehabilitation services. The Drug Courts Program is not focused on opioid abusers, but drug-involved offenders, including opioids abusers, may be processed through drug courts. BJA administers the Veterans Treatment Court Program through the Drug Courts Program using funds specifically appropriated for this purpose. The purpose of the Veterans Treatment Court Program is \"to serve veterans struggling with addiction, serious mental illness, and/or co-occurring disorders.\" Grants are awarded to state, local, and tribal governments to fund the establishment and development of veterans treatment courts. While veterans treatment court grants have been part of the OJP's Drug Courts Program for several years, the Comprehensive Addiction and Recovery Act of 2016 (CARA; P.L. 114-198 ) authorized DOJ to award grants to state, local, and tribal governments to establish or expand programs for qualified veterans, including veterans treatment courts; peer-to-peer services; and treatment, rehabilitation, legal, or transitional services for incarcerated veterans. The Office of Juvenile Justice and Delinquency Prevention (OJJDP) supports juvenile and family drug court programs through its Drug Treatment Courts Program. This program supports the implementation or enhancement of state, local, and tribal drug court programs that focus on juveniles and parents with substance abuse issues. One of its specific goals is to help those with substance abuse problems related to opioid abuse or co-occurring mental health disorders who are involved with the court system. Administered by BJA, the JAG program provides funding to state, local, and tribal governments for state and local initiatives, technical assistance, training, personnel, equipment, supplies, contractual support, and criminal justice information systems in eight program purpose areas: (1) law enforcement programs; (2) prosecution and court programs; (3) prevention and education programs; (4) corrections and community corrections programs; (5) drug treatment and enforcement programs; (6) planning, evaluation, and technology improvement programs; (7) crime victim and witness programs (other than compensation); and (8) mental health and related law enforcement and corrections programs, including behavioral programs and crisis intervention teams. Given the breadth of the program, funds could be used for opioid abuse programs, but state and local governments that receive JAG funds are not required to use their funding for this purpose. Also administered by BJA, the JMHCP supports collaborative criminal justice and mental health systems efforts to assist individuals with mental illnesses or co-occurring mental health and substance abuse disorders who come into contact with the justice system. It encourages early intervention for these individuals; supports training for justice and treatment professionals; and facilitates collaborative support services among justice professionals, treatment and related service providers, and governmental partners. Three types of grants are supported under this program: (1) Collaborative County Approaches to Reducing the Prevalence of Individuals with Mental Disorders in Jail, (2) Planning and Implementation, and (3) Expansion. The JJDPA authorizes OJJDP to make formula grants to states that can be used to fund the planning, establishment, operation, coordination, and evaluation of projects for the development of more-effective juvenile delinquency programs and improved juvenile justice systems. Funds provided to the state may be used for a wide array of juvenile justice related programs, such as substance abuse prevention and treatment programs. None of the program purpose areas deal specifically with combating opioid abuse, but they are broad enough that the grants made under this program could be used for this purpose. The JJDPA authorizes OJJDP to make discretionary grants to the states that are then transmitted to units of local government in order to carry out delinquency prevention programs for juveniles who have come into contact, or are likely to come into contact, with the juvenile justice system. Purpose areas include (but are not limited to) alcohol and substance abuse prevention services, educational programs, and child and adolescent health (as well as mental health) services. None of the program purpose areas deal specifically with combating opioid abuse, but they are broad enough that they could be used for this purpose. The Opioid Affected Youth Initiative is a competitive grant program administered by OJJDP that funds state, local, and tribal government efforts to \"develop a data-driven coordinated response to identify and address challenges resulting from opioid abuse that are impacting youth and community safety.\" The program supports recipients in implementing strategies and programs to identify areas of concern, collect and interpret data to help develop youth strategies and programming, and implement services to assist children, youth, and families affected by opioid abuse. The RSAT Program is a formula grant program administered by BJA that supports state, local, and tribal governments in developing and implementing substance abuse treatment programs in correctional and detention facilities. Funds may also be used to support reintegration services for offenders as they reenter the community after a period of incarceration. Beginning in FY2018, BJA requires potential grantees to explain \"how funded programs will address the addition of opioid abuse reduction treatment and services.\" The COPS Office administers the Tribal Resources Grant Program. It generally supports tribal law enforcement needs, and specifically aims to enhance tribal law enforcement's capacity to engage in anti-opioid activities, among other objectives. For state-specific information on grants and funding from OJP, see the OJP Award Data web page and search by location or by grant solicitation. In FY2018, the Department of Justice released a document entitled, Fact Sheet: Justice Department is Awarding Almost $320 Million to Combat Opioid Crisis , which provides a list of FY2018 grantees. The United States has taken a multipronged foreign policy approach to addressing foreign flows of illicit opioids destined for the United States. To date, this approach has included multilateral diplomacy, bilateral efforts, and unilateral action. On the multilateral front, the U.S. government, primarily working through the U.S. Department of State, engages international organizations and entities involved in addressing drug control issues, including opioids. This includes diplomatic engagement with United Nations (U.N.) entities such as the Commission on Narcotic Drugs (CND), the primary U.N. counternarcotics policy decisionmaking body; the International Narcotics Control Board (INCB), which monitors how member states implement treaty commitments related to drug control; and the U.N. Office of Drugs and Crime (UNODC), mandated to provide technical cooperation and research and analytical projects that support member states' implementation of counternarcotics policies. The United States also addresses opioid trafficking through the Organization of American States' (OAS') Inter-American Drug Abuse Control Commission (CICAD). Through such organizations, the United States supports efforts to promote cross-border information sharing. One objective of U.S. efforts at the U.N. is to accelerate the rate at which new drugs and related precursor chemicals are incorporated into the U.N. international drug control regime. For example, U.S. diplomats advocated for the international control of two of the key chemical precursors used in the production of fentanyl: N-phenethyl-4-piperidone (NPP) and 4-anilino-N-phenethyl-4-piperidone (ANPP). The CND subsequently added NPP and ANPP to the U.N.'s list of drugs and chemicals under international control, effective October 2017. Until recently, the United States had also engaged the Universal Postal Union (UPU) on the issue of opioid trafficking through international mail. Through the UPU, the United States had, for example, supported the exchange of advance electronic data (AED) for international mail items specifically to improve global efforts to detect and interdict synthetic drugs shipped through the mail. In October 2018, however, the Trump Administration announced that it would begin a one-year withdrawal process from the UPU, potentially affecting how the United States and the UPU engage on opioid matters. Bilateral cooperation on opioids has included focused efforts in China, Mexico, and Canada, among other countries. Such engagement has variously taken the form of structured diplomatic dialogues, bilateral law enforcement cooperation, and foreign assistance programming. With respect to China, bilateral cooperation on counternarcotics matters is a top diplomatic priority for the United States. As with China, U.S. officials pursue bilateral cooperation with Mexico on counternarcotics matters through meetings, including through the cabinet-level U.S.-Mexico Strategic Dialogue on Disrupting Transnational Criminal Organizations, sub-cabinet level U.S.-Mexico Security Cooperation Group, U.S.-Mexico Bilateral Drug Policy Working Group, and National Fentanyl Conference for Forensic Chemists. Trilaterally, the United States, Mexico, and Canada have met several times through the North American Drug Dialogue to address heroin and fentanyl issues. In addition to structured dialogues, U.S. federal law enforcement agencies also engage regularly with their counterparts on ongoing investigations through their representatives based at U.S. embassies and consulates abroad; formal law enforcement cooperation is also facilitated through mutual legal assistance mechanisms. The United States also funds and conducts programming with China and Mexico to address opioids. In China, INL funding supports drug-related information exchanges, training for Chinese counterparts on specialized topics related to synthetic opioids, and efforts to promote effective drug demand reduction. INL also funds a Resident Legal Advisor, a DOJ prosecutor who is based at the U.S. Embassy in Beijing; a key project has been to conduct outreach to Chinese counterparts involved in amending China's legal and regulatory framework to place the entire fentanyl class of substances under drug control. In Mexico, current efforts to address illicit opioids fit within a broader context of longstanding U.S.-Mexico cooperation to disrupt drug production, dismantle drug distribution networks, prosecute drug traffickers, and deny transnational criminal organizations access to illicit revenue. In such efforts, U.S. support has included programming to address illicit opium poppy cultivation and eradication, drug production and trafficking, border security, and criminal justice judicial institution reform. In addition, the U.S. government has taken domestic action to address foreign sources and traffickers of opioids through the U.S. criminal justice system and through the application of financial sanctions against specially designated foreign nationals. Recent DOJ indictments have involved Chinese nationals allegedly involved in fentanyl production. Further targeting one of the Chinese nationals under indictment, Jian Zhang, the U.S. Department of the Treasury designated Zhang, four of his associates, and an entity used as a front for the trafficking of fentanyl and fentanyl analogues for sanction, pursuant to the Foreign Narcotics Kingpin Designation Act (Kingpin Act). The Treasury and DOJ have taken similar action against Mexican individuals and entities involved in trafficking heroin and fentanyl to the United States. The government of Mexico cooperates with the United States on counternarcotics matters, including opioid supply reduction. The government eradicates opium poppy; tracks, seizes, and interdicts opioids and precursor chemicals; dismantles clandestine drug laboratories; and carries out operations against transnational organized crime groups engaged in opioid trafficking and other related crimes. The Mexican government also participates in international efforts to control precursor chemicals, including fentanyl precursors NPP and ANPP. In 2018, the government of Mexico increased its budget for public security and justice (including antidrug efforts) by 6.2% as compared to 2017, and formed an Office of National Drug Policy within the Attorney General's Office to coordinate federal drug policy. Inaugurated to a six-year term in December 2018, President AndrÃ©s Manuel LÃ³pez Obrador has continued cooperation on drug control with the United States. Observers maintain that both governments could find a common interest in combating fentanyl smuggling, but predict that the LÃ³pez Obrador government's proposal to regulate opium cultivation for medicinal purposes could cause friction in bilateral relations. The Mexican military leads efforts to eradicate illicit drug crops in Mexico, including a reported 29,692 hectares of opium poppy in 2017. Mexican authorities reportedly seized approximately 766.9 kilograms of opium gum in 2017, up from 235 kilograms in 2016. The United States has provided specialized training and equipment to Mexican authorities that contributed to increased fentanyl seizures in 2017 and 2018. Various Mexican agencies have identified and seized fentanyl and fentanyl-laced counterfeit pills with U.S.-funded nonintrusive inspection equipment and canine teams. In September 2018, Mexican law enforcement discovered a production mill used to produce carfentanil (an analogue 100 times more potent than fentanyl). As discussed, China is a primary source of illicit fentanyl destined for the United States. As of December 1, 2018, China had imposed controls on 170 new psychoactive substances, including 25 fentanyl analogues. It had also imposed controls on two fentanyl precursor chemicals. According to the DEA, U.S. seizure data show that China's implementation of controls on fentanyl analogues has had \"an immediate effect on the availability of these drugs in the United States.\" President Xi Jinping said China was willing to go further and control the entire class of fentanyl substances, a move supported by President Trump. In April 2019, three Chinese government agencies jointly announced that effective May 1, 2019, all fentanyl-related substances will be added to China's \"Supplementary List of Controlled Narcotic Drugs and Psychotropic Substances with Non-Medical Use.\" Li Yuejin, Deputy Director of China's National Narcotics Control Commission, outlined a series of follow-on steps that he said China would take. He said China would issue \"guidance on applicable laws for handling criminal cases related to fentanyl substances\" and protocols for filing and prosecuting similar cases. Other actions he said China would take include the following: investigating suspected illicit fentanyl manufacturing bases; scrubbing drug-related content from the Internet; \"cut[ting] off online communication and transaction channels for criminals\"; pressuring parcel delivery services to require that senders register their real names; stepping up inspections of international parcels; setting up special teams to conduct criminal investigations focused on manufacturing and trafficking of fentanyl substances and other drugs; strengthening information-sharing and case cooperation with \"relevant countries,\" including the United States, with the goal of dismantling transnational drug smuggling networks; and stepping up development of technology for examining and identifying controlled substances. The DEA welcomed the Chinese government's announcement, saying, \"[t]his significant development will eliminate Chinese drug traffickers' ability to alter fentanyl compounds to get around the law.\" ONDCP noted that China's scheduling decision does not cover all the precursor chemicals used to make fentanyl substances, meaning that they might continue to flow to Mexico where traffickers use them to make fentanyl destined for the United States. China's postal service, China Post, has an existing agreement with the USPS to provide advanced electronic data (AED) on parcels mailed to the United States. China's government has also cracked down on illicit fentanyl rings in China and assisted DOJ investigations of Chinese nationals suspected of illicit fentanyl manufacturing and distributing. Congress largely has taken a public health approach (i.e., focusing on prevention and treatment) toward addressing the nation's opioid crisis, but recently enacted laws have addressed supply control and other criminal justice issues as well. Three major laws were enacted in the 114 th and 115 th Congresses that address the opioid epidemicâthe Comprehensive Addiction and Recovery Act (CARA, P.L. 114-198 ); the 21 st Century Cures Act (Cures Act; P.L. 114-255 ); and the SUPPORT for Patients and Communities Act (SUPPORT Act; P.L. 115-271 ). CARA focused primarily on opioids but also addressed broader drug abuse issues. The Cures Act authorized state opioid grants (in Division A) and included more general substance abuse provisions (in Division B) as part of a larger effort to address health research and treatment. The SUPPORT Act broadly addressed substance use disorder prevention and treatment as well as diversion control through extensive provisions involving law enforcement, public health, and health care financing and coverage. Further, Congress and the Administration provided funds to specifically address opioid abuse in FY2017-FY2019 appropriations. Many questions surround the amount of opioid funding appropriated each year. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), provided $347.0 million for \"comprehensive opioid abuse reduction activities, including as authorized by CARA, and for â¦ programs, which shall address opioid abuse reduction consistent with underlying program authorities\" (which includes many of the programs cited above in \" Which DOJ grant programs may be used to address the opioid epidemic? \"). In FY2019, the DEA received an increase of $77.8 million over FY2018 funding \"to help fight drug trafficking, including heroin and fentanyl.\" The additional DEA funding will also go toward the addition of \"at least four new heroin enforcement teams and DEA 360 Strategy programming.\" Other opioid-specific funding in FY2019 DOJ, DHS, and ONDCP appropriations includes $9.0 million for the Opioid-Affected Youth Initiative; $27.0 million for the COPS Program for improving tribal law enforcement, including anti-opioid activities among other purposes (the Tribal Resources Grant Program); $32.0 million for anti-heroin task forces (composed of state law enforcement agencies) in areas with high rates of opioid treatment admissions to be used for counter-opioid drug enforcement; $24.4 million for CBP for laboratory personnel, port of entry technology, canine personnel, and support staff for opioid detection; $44.0 million for Homeland Security Investigations (HSI) for additional personnel (criminal investigators, special agents, intelligence analysts, and support personnel) for domestic and international opioid/fentanyl-related investigations; $8.5 million for DHS research and development related to opioids/fentanyl; and $3.0 million for ONDCP for Section 103 of CARA - Community-based Coalition Enhancement Grants to Address Local Drug Crises. It is problematic, for many reasons, to identify and sum opioid funding. The amounts listed in the section above represent instances where Congress provided opioid-specific funding for agencies and programs within DOJ, DHS, and ONDCP only. It does not include funding for some broader drug programs, such as HIDTA, unless there was a specific appropriation for opioid-related activity. Some programs that can be used for opioid-related purposesâsuch as the JAG program, which is used for wide-ranging criminal justice purpose areasâare not included in the list. For some programs for which Congress specified opioid-related purposes, the amount appropriated for the program is not necessarily, and often is not, entirely for opioid-related issues. Across the country, states have adapted elements of their criminal justice responsesâincluding police, court, and correctional responses âin a variety of ways due to the opioid epidemic. While this section does not provide a state-by-state analysis, it highlights several examples of how states' justice systems have responded to the opioid crisis. These examples were selected because they are some of the more common state policy approaches to confronting the opioid epidemic. Many states are increasing law enforcement officer access to naloxone, an opioid overdose reversal drug, in an effort to reduce the number of overdose deaths. Officers receive training on how to identify an opioid overdose and administer naloxone, and they carry the drug so they can respond immediately and effectively to an overdose. As of November 2018, over 2,400 police departments in 42 states reported that they had officers that carry naloxone âthis figure more than doubled over two years. In addition, most states that have expanded access to naloxone have also provided immunity to those who possess, dispense, or administer the drug. Generally, immunity entails legal protections (for civilians) from arrest or prosecution and/or civil lawsuits for those who prescribe or dispense naloxone in good faith. State and local law enforcement coordinate special operations and task forces to combat fentanyl and heroin trafficking in their jurisdictions. In addition to participation in federal initiatives, state and local police and district attorneys lead operations to dismantle trafficking networks in areas plagued by high numbers of opioid overdoses. For example, in southeast Massachusetts the Bristol County District Attorney recently announced the conclusion of a year-long investigation of a \"highly organized and complex\" fentanyl network that resulted in 11 arrests. This investigation was led by the Bristol Country District Attorney's office and involved several local police agencies, the Massachusetts State Police, and the U.S. Department of Homeland Security. Another criminal justice adaptation is the enactment of what are known as \"Good Samaritan\" laws to encourage individuals to seek medical attention (for themselves or others) related to an overdose without fear of arrest or prosecution. In general, these laws prevent criminal prosecution for illegal possession of a controlled substance under specified circumstances. While the laws vary by state as to what offenses and violations are covered, as of June 2017, 40 states and the District of Columbia have some form of Good Samaritan overdose immunity law. Most states have drug diversion or drug court programs for criminal defendants and offenders with substance abuse issues, including opioid abuse. Some states view drug courts as a tool to address rising opioid abuse and have moved to expand drug court options in the wake of the opioid epidemic. Over the last several years, the National Governors Association has sponsored various activities to assist states in combatting the opioid epidemic, including learning labs to develop best practices for dealing with opioid abuse treatment for justice-involved populationsâsuch as the expansion of opioid addiction treatment in drug courts. In November 2017, the President's Commission on Combating Drug Addiction and the Opioid Crisis stated that DOJ should urge states to establish drug courts in every county. In recent years, several states have also enacted legislation increasing access to medication-assisted treatment (MAT) for drug-addicted offenders who are incarcerated or have recently been released. In March 2019, SAMHSA released guidance to state governments on increasing the availability of MAT in criminal justice settings.", "summary": "Over the last several years, lawmakers in the United States have responded to rising drug overdose deaths, which increased four-fold from 1999 to 2017, with a variety of legislation, hearings, and oversight activities. In 2017, more than 70,000 people died from drug overdoses, and approximately 68% of those deaths involved an opioid. Many federal agencies are involved in domestic and foreign efforts to combat opioid abuse and the continuing increase in opioid related overdose deaths. A subset of those agencies confront the supply side (some may also confront the demand side) of the opioid epidemic. The primary federal agency involved in drug enforcement, including prescription opioids diversion control, is the Drug Enforcement Administration (DEA). Other federal agencies that address the illicit opioid supply include, but are not limited to, the Federal Bureau of Investigation, Offices of the U.S. Attorneys, Office of Justice Programs, U.S. Customs and Border Protection, U.S. Department of State, U.S. Postal Inspection Service, and Office of National Drug Control Policy. This report focuses on efforts from these departments and agencies only. Lawmakers have addressed opioid abuse as both a public health and a criminal justice issue, and Congress enacted several new laws in the 114 th and 115 th Congresses. These include the Comprehensive Addiction and Recovery Act of 2016 (CARA; P.L. 114-198 ), the 21 st Century Cures Act (Cures Act; P.L. 114-255 ), and most recently the SUPPORT for Patients and Communities Act (SUPPORT Act; P.L. 115-271 ). Congress also provided funds specifically to address the opioid epidemic in FY2017-FY2019 appropriations. This report answers common supply and criminal justice-related questions that have arisen as drug overdose deaths in the United States continue to increase. It does not provide a comprehensive overview of opioid abuse as a criminal justice issue. The report is divided into the following sections: Overview of the Opioid Epidemic in the United States; Overview of the Opioid Supply; Opioids and Domestic Supply Control Policy; Opioids and Foreign Supply Control Policy; Recent Congressional Action on the Opioid Epidemic; and The Opioid Epidemic and State Criminal Justice Policies.", "document_type": "crs"}
{"report": "The increasing complexity and automation of flight control systems pose a challenge to federal policy regarding aircraft certification and pilot training. Over the past 30 years, pilot confusion in the face of unintended or unanticipated behaviors of cockpit automation has been implicated in a number of accidents and safety incidents. High-profile accidents overseas in 2018 and 2019 led to the grounding of the worldwide fleet of Boeing 737 Max aircraft and prompted investigations and policy inquiries regarding the design and certification of commercial airplanes. These inquiries have focused on three key policy issues: 1. the adequacy of standards and regulations pertaining to the design of cockpit interfaces between pilots and aircraft systems and to pilot training; 2. appropriate policies, standards, and regulations regarding the safety design of aircraft systems and sensors to ensure adequate fault and error detection, fault tolerance, and redundancy; and 3. the certification process for new aircraft technologies, and the roles of the Federal Aviation Administration (FAA) and other national regulators in certification. Modern jet airliners rely on numerous automated features to assist and alert pilots as well as to prevent aircraft from getting into precarious and potentially dangerous situations. In many cases, pilots' lack of understanding or familiarity with the design and operation of these automated features has led to inappropriate use of automation or inappropriate responses when cockpit automation has gone awry. In other cases, latent flaws and unintended consequences of highly complex automated flight control systems designs have been implicated in commercial airplane accidents. The complexity of these automated systems has also raised questions about the manner in which new aircraft flight control system designs are evaluated and certified. Two crashes involving the recently introduced Boeing 737 Max airplane prompted the grounding of the worldwide fleet of that model. The ensuing investigations into the process for certifying the Boeing 737 Max have triggered broader discussions about aircraft certification practices in general and also about global training, qualification, and flight currency standards for pilots flying commercial airplanes. The focus on aviation safety surrounding the Boeing 737 Max grounding has highlighted a number of long-standing challenges associated with systems design, failure and risk analysis, human-interface design of automated cockpits, aircraft-specific pilot training, and oversight of the certification processes under which these challenges are addressed in the design of new aircraft. These subjects are now the focus of a global policy debate. The two 737 Max crashes notwithstanding, the safety record of commercial airlines operating transport category airplanes is unsurpassed among modern transportation systems. Worldwide, the accident rate among scheduled commercial passenger operations for the 10-year period from 2008 through 2017 was 0.44 accidents per 100,000 flight departures, or roughly one accident in every 227,272 departures. The fatal accident rate was 0.16 per 100,000 departures, or roughly one fatal accident for every 625,000 departures. In Europe, Canada, and the United States, accident rates are even lower. The recent safety record of U.S. air carriers demonstrates a marked improvement from the decade of the 1990s, which saw a spate of U.S. air carrier accidents, including several fatal crashes (see Appendix A ). In 1996, the crash of Valujet flight 592 raised congressional concerns over airline safety and FAA oversight of air carriers. In response, the Federal Aviation Reauthorization Act of 1996 ( P.L. 106-264 ) eliminated FAA's role in promoting civil aeronautics and air commerce and mandated safety as its top priority. The legislation also established a framework of legal protections for voluntary safety reporting programs designed to encourage individuals to report safety concerns with protection from retribution. Also in 1996, following the crash of TWA flight 800, a Boeing 747 en route from New York to Paris, President Clinton established the White House Commission on Aviation Safety and Security. The commission was chaired by Vice President Gore and is commonly referred to as the Gore Commission. The commission urged policymakers to make aviation safety, as well as aviation security, a national priority. In particular, it set a goal of \"reducing the rate of accidents by a factor of five within a decade,\" and advocated for \"a re-engineering of the FAA's regulatory and certification programs to achieve that goal.\" The plan included recommendations for establishing standards for continuous safety improvement and targeting regulatory resources based on performance against those standards; developing vigorous certification standards, and the development of additional certification tools and processes to encourage the introduction of new technologies; establishing performance-based regulations rather than dictating procedures in order to \"break the regulatory logjam\"; emphasizing human factors and training to \"address issues relating to human interaction with changing technologies\"; developing standard databases of safety information that can be shared openly while protecting trade secrets and protecting industry employees who voluntarily disclose information about safety violations; and developing better quantitative models and analytic techniques to inform management decisionmaking. Of particular note, the Gore Commission emphasized the streamlining of certification processes and regulations to accelerate the adoption of new aircraft technologies in the hope that this would bring operational safety improvements. Commercial airline safety in the United States improved following the Gore Commission report, despite some major commercial airline accidents in the late 1990s and early 2000s. Fatal accidents involving major U.S. passenger airlines during this period included the June 1, 1999, crash of American Airlines at Little Rock, AR; the Alaska Airlines crash off the coast of California on January 31, 2000; and the crash of American Airlines flight 587 near JFK International Airport in New York on November 12, 2001 . Commercial aviation safety data since 2002 show a marked improvement compared to the 1990s, particularly among major U.S. airlines ( Figure 1 ). In more recent years, attention has shifted to the safety of the regional airlines that operate almost half of all scheduled domestic flights in the United States. In the 2000s, there were six regional airline accidents involving passenger fatalities, resulting in a total of 149 deaths , in addition to several crashes not involving passenger fatalities. Four of the six regional accidents resulting in passenger fatalities during the 2000s were attributed to human factors affecting flight crews, including pilots' failure to adhere to proper procedures, deficiencies in training, and fatigue. Following the crash of a regional turboprop near Buffalo, NY, in February 2009 that killed all 45 on board, the Airline Safety and Federal Aviation Administration Extension Act of 2010 ( P.L. 111-216 ) was enacted on August 1, 2010. That legislation mandated revised regulations generally requiring pilots to accumulate 1,500 hours of total flight time before being eligible to be a first officer aboard a commercial airliner in the United States. It also required pilots to accumulate an additional 1,000 hours of flight time in commercial airline operations before becoming a captain and serving as pilot in command. The legislation directed FAA to order improvements to airline training programs, including formal mentoring, leadership, and professional development programs for pilots; institute reforms to flight time and rest rules for pilots; and require that airlines establish formal approaches to safety management. Following the February 2009 crash, more than nine years passed before U.S. air carriers suffered another passenger fatality. On April 17, 2018, a passenger was killed when uncontained engine failure on a Southwest Airlines Boeing 737 damaged the fuselage and broke a cabin window, causing a rapid depressurization of the aircraft cabin. Other incidents resulting in serious passenger injuries aboard U.S. air carrier flights in recent years have most often been linked to inflight turbulence. The small number of domestic air carrier accidents in the United States over the past decade has made it difficult for safety experts to identify meaningful accident trends without examining the safety performance of aviation systems in other countries. Low accident rates have also prompted researchers to look beyond accident data to trends in safety incidents and reported unsafe practices to identify and remediate safety deficiencies. Worldwide aviation safety metrics point to continual improvements in commercial flight safety, corresponding to the trend in the United States. Worldwide, fatal accident rates for commercial airliners have dropped from about 4.2 per million flights in 1977 to less than 0.4 per million flights in 2017. Between 2014 and 2018, the fatal accident rate globally was 0.21 per million flights, but it was considerably lower in North America, Europe, and North Asia ( Table 1 ). While airline safety has shown overall improvements over time, safety indicators in certain regions remain a considerable concern to some. In particular, both the International Civil Aviation Organization (ICAO), a United Nations agency, and the International Air Transport Association (IATA), an industry group, have expressed concern about safety in Africa and the Asia-Pacific region. IATA found that, between 2014 and 2018, both the overall accident and the fatal accident rates for airlines in Africa were more than five times the worldwide average at 6.04 accidents and 1.03 fatal accidents per million flights. Between 2014 and 2018, the Asia-Pacific region stood out as having the highest number of airline accidents and the highest number of accident-related fatalities among world regions, accounting for 77 accidents and 748 fatalities over this period. While the region includes countries like Australia and New Zealand that have safety records on par with North America and Europe, it also includes the Philippines, Indonesia, and other countries in Southeast Asia that lag on aviation safety performance. In both Africa and the Asia-Pacific region, lax regulatory oversight and poor flight crew performance have been identified as primary contributors to comparatively high accident rates. Worldwide commercial airline safety has come under scrutiny following two high-profile crashes overseas involving the recently introduced Boeing 737 Max variant in 2018 and 2019. These accidents prompted the grounding of the entire worldwide fleet of 737 Max aircraft. Because FAA has the principal authority for certifying this aircraft, the crashes drew attention to FAA's certification process for that aircraft and raised broader questions about aircraft type certification practices for transport category aircraft. Many aviation safety experts attribute the safety advancements in commercial aviation over the past three decades, at least in part, to improvements in aircraft systems technology and flight deck automation. Paradoxically, these same factors have been implicated as causal or contributing factors in several aviation accidents and incidents. Modern aircraft flight systems incorporate advanced autopilot systems as well as traditional flight controls that interface with computers instead of directly actuating flight control surfaces, such as the rudders, ailerons, and elevators that control an airplane's movement in flight (see Figure 2 ). Flight data computers aboard the aircraft continuously analyze pilot inputs, aircraft states, and environmental factors, like winds, to maneuver the aircraft safely and efficiently. When the autopilot is engaged, flight control computers will command inputs to the flight control surfaces and aircraft engines to achieve the desired inputs in a manner that is optimized for efficiency. When pilots are flying manually, displays such as a flight director provide visual aids to pilots to achieve desired states of flight (e.g., a particular altitude, airspeed, or heading) most efficiently. The flight computers also continuously monitor pilot or autopilot inputs, aircraft states, and environmental states (e.g., winds) to ensure that the airplane continues to fly safely. These systems and displays are designed to enhance safety by improving pilot situation awareness, reducing pilot workload, and monitoring aircraft and aircraft system states to prevent unsafe operations such as flying at too high of a pitch angle or at too steep of a bank. However, the complexity of the modern cockpit can present considerable challenges to pilots, potentially leading to confusion and errors, particularly in high-workload situations. If these errors go undetected or if they are compounded by other mistakes or other situational factors, they can potentially lead to a serious incident or accident under rare and unusual circumstances. Worldwide, the most common causes of commercial jet accidents are (1) loss of control in flight and (2) controlled flight into terrain, two categories that often involve incomplete pilot situation awareness, poor judgment, and human errors in interaction with complex aircraft systems. The third most common type of accident, runway excursions (i.e., aircraft running off the end or side of a runway), also typically can be traced back to pilot performance and pilot understanding of aircraft performance, environmental factors, and flight control systems. Pilots require advanced training to understand the various features, modes, capabilities, and limitations of advanced flight control systems under various flight conditions. Airbus was the first manufacturer to incorporate computer interfaces between pilots and flight controls, commonly known as fly-by-wire technology, into commercial transport airplanes with the introduction of the A320, which entered service in 1988. In a fly-by-wire system, various sensors provide data to the flight control computers, which they, in turn, assess and analyze. The computers are linked to actuators, such as servo motors, that operate the flight controls and also to displays that provide pilots with information and alerts about aircraft performance and aircraft system states. Fly-by-wire technology offers a number of advantages over flight control systems operated using direct mechanical linkages between cockpit controls and the aircraft's control surfaces. First, the reduction in the number of mechanical parts and linkages can reduce aircraft weight considerably. Additionally, the systems can incorporate additional redundancies without adding as much weight as would be required with redundant mechanical systems. Redundancy is achieved in a fly-by-wire system through multiple sensors and multiple flight data computers that can cross-check each other. Typically, triple redundancy is built into fly-by-wire flight control systems: three flight control computers continuously monitor pilot inputs and aircraft sensor data and cross-check for any anomalies in information or in computations based on inputs. The flight data computers also incorporate what engineers refer to as \"flight control laws,\" logic embedded in the firmware and software that govern flight dynamics. These flight control laws can be designed to simplify the training required for a pilot to transition between different variants of an aircraft model and even different aircraft models. This is achieved by programming the flight control systems of an updated model of aircraft to perform similarly to those of existing aircraft despite differences in weight, power, and other factors that affect the aerodynamic performance. Minimizing handling differences between aircraft and designing cockpits of different models to have a similar look and feel can save airlines considerable time and money in training pilots to fly new aircraft. For this reason, manufacturers often seek to design aircraft to minimize the training requirements to transition to the new aircraft, known in the industry as \"differences training.\" Another often-cited advantage of fly-by-wire system flight control laws is the capability to protect the aircraft from operating outside a defined envelope of parameters (such as limits with respect to pitch, bank, and airspeed) that define the boundaries of safe flight operation. An airplane's flight envelope refers to its performance limitations and design capabilities with respect to aircraft attitude, airspeed, and aerodynamic loads. In fly-by-wire aircraft, logic is built into the flight control computer systems to inhibit maneuvers that might place the aircraft outside this envelope of safe operational conditions. The flight envelope is multidimensional and is affected by factors such as aircraft weight, center-of-gravity, airspeed, altitude, and winds. It also depends on the aircraft's configuration (e.g., whether it is configured for takeoff, for landing, or for cruise flight, and the position of aircraft flaps and slats). For this reason, the flight envelope protection logic involves continuous monitoring of the state of the aircraft with respect to its flight envelope. Flight control computers continuously receive and analyze data from airspeed sensors that take inputs from pitot tubes and static ports, angle-of-attack indicators that take data from vanes attached to the side of the fuselage, inertial units, gyroscopes, and accelerometers that sense aircraft attitude along all three axes (pitch, roll, and yaw) and acceleration along these axes, and, of course, altimeters and temperature sensors. Sensors also monitor engine thrust, fuel flow, and various other engine performance parameters, as well as aircraft configuration, including the position of various aircraft control surfaces like ailerons, vertical stabilizers, trim tabs, and wing flaps and slats. Every input made by the pilots when the airplane is being flown manually is also captured by sensors linked to the flight control computers. The manner in which the flight control automation responds to information from the various aircraft sensors depends, in part, on the manner in which the aircraft is being flown. If the airplane is being operated on autopilot and with autothrottles engaged, then the computers will largely operate directly to control the airplane to achieve objectives that the pilots have entered on a control panel, including things such as desired altitude, desired heading or course, airspeed, and climb or descent rates. If, on the other hand, pilots are operating the flight controls manually, the computers will provide them with information to guide maneuvers, and the flight envelope protections will override unsafe pilot actions such as commanding too much pitch up or too steep of a bank. Under normal conditions, these flight envelope protections will limit pilots' actions. However, in some situations, the computers may disable some of these protections by switching the flight control systems to what are referred to as alternate or secondary laws, direct laws, and mechanical backup modes. In these alternative states there are fewer flight envelope protections, and the pilots have progressively more direct control over the airplane. Pilot understanding of these various flight envelope protections and, particularly, awareness of how flight control systems behave in the various modes has been a critical safety consideration in the design of fly-by-wire systems and highly automated cockpits. The implications of modern flight deck automated systems design have been an issue of concern for more than two decades. In 1996, a human factors team convened by FAA released a comprehensive study of interfaces between flight crews and highly automated aircraft systems with a focus on interfaces affecting flight path management. The study was prompted by the April 26, 1994, crash of a China Airlines Airbus A300-600 at Nagoya, Japan, that stalled while attempting to perform a go-around during its landing approach, killing 264 of the 271 occupants. The event was triggered by the inadvertent activation of an autothrottle takeoff/go-around button, located on the throttle lever, during the approach to landing, and the flight crew's apparent lack of understanding as to how to disengage and override the autothrottle. The plane's autothrottle software had not been upgraded to disengage if certain manual inputs, including forward yoke movement, were made. This differed from the behavior of a training simulator that the accident pilot practiced on as well as the Boeing 747 that he had spent most of his career flying. The FAA human factors team found that pilots often lacked adequate understanding of automated systems and were often surprised by the behavior of automated flight control features. Moreover, flight crew situation awareness suffered from a lack of complete understanding of what modes or states automated features were in and the behavior of automated features in these states. It also was affected by poor understanding of current status regarding flight path and aircraft attitude, terrain clearance, and airspeed. The team made recommendations regarding design and certification of automated systems; pilot training; flight crew situation awareness, communication, and coordination; and ways to encourage and measure safety enhancements. The work prompted FAA to revise its certification requirements for flight guidance systems in 2006. Specifically, under 14 C.F.R. Â§25.1329, the design must incorporate quick disengagement controls for the autopilot and autothrust functions, and the effects of disengaging automatic features must be minor. Similarly, sensors or mode selections may not cause anything beyond a minor transient change to the aircraft's flight path under normal conditions. Automated flight guidance systems must also provide protections to avoid unsafe speeds or pitch or bank attitudes, and under no circumstances should the systems be capable of executing maneuvers that would produce hazardous forces or loads on the airplane. The regulations also require that controls be clearly labeled and designed to minimize flight crew errors and confusion. Additionally, flight crews must be alerted when automated flight guidance features disengage, and autopilot systems must not create potential hazards when overridden by manual flight control inputs. Despite the changes made to address human factors issues in flight guidance system design, the interface between pilots and automated flight guidance systems remains at the crux of commercial aviation safety. This issue has been highlighted in several high-profile international aviation accidents that have occurred over the past decade. Air France flight 447, an Airbus A330, crashed in the Atlantic Ocean on June 1, 2009, en route from Rio de Janeiro, Brazil, to Paris, France, killing all 228 on board. After lengthy efforts to locate the wreckage and recover the flight data and cockpit voice recorders, found lying on the ocean floor at a depth of about 13,000 feet, a detailed investigation was launched to determine the circumstances and safety implications of the crash. The investigation, led by the French Bureau d'EnquÃªtes et d'Analyses pour la SÃ©curitÃ© de l'Aviation Civile (BEA), found that icing on the airplane's pitot tubes resulted in a temporary inconsistency in airspeed measurements that caused the flight computers to disconnect the autopilot and switch the flight control logic into a different mode, known as an alternate law, in which normal protections against aerodynamic stalls and steep banks were disabled. Investigators concluded that the pilots failed to properly assess the situation and instead made inappropriate control inputs that destabilized the airplane, resulting in an aerodynamic stall. The crew failed to detect the stall and consequently did not make control inputs to recover from it. Investigators identified several factors that likely contributed to the flight crew's confusion and lack of appropriate response, including the lack of a clear display in the cockpit indicating airspeed inconsistencies identified by the computers, transient stall warnings that may have been considered spurious, the absence of visual information to confirm an approach-to-stall, possible confusion with an overspeed situation that, like a stall, could be accompanied by airframe buffeting, and difficulty in recognizing the shift to an alternate control law with no angle-of-attack protections. Several aviation experts cautioned that the Air France flight 447 disaster might be a harbinger of the latent dangers of highly complex, highly automated flight control designs. On July 6, 2013, a Boeing 777 operated by Asiana Airlines descended below the visual approach path and hit a seawall short of the runway at San Francisco International Airport. The impact tore the fuselage in two and ignited a post-crash fire. Three passengers were fatally injured and another 40 passengers, along with 9 crew members, suffered serious injuries. Others suffered less serious injuries. The National Transportation Safety Board (NTSB) determined that the complexities of the airplane's autopilot and autothrottle systems contributed to the accident. The NTSB noted that Boeing documentation describing those systems and the airline's training in the use of those systems were inadequate and increased the likelihood of a mode error , a situation in which the pilots misunderstood the state of the automated system and its operation during the approach. Specifically, the flight crew interacted with the autopilot and throttles in a manner that put the system into a state in which the autothrottle no longer controlled the airplane's airspeed. However, the flight crew apparently failed to understand that this mode or state was contributing to a continual decrease in airspeed that, coupled with too steep an approach, left the airplane flying too low and too slowly. The NTSB made a number of recommendations to improve flight crew understanding of the Boeing 777 autothrottle system and modes. It also called for a broader examination of the functionality of automated flightpath management systems and of the documentation and training guidance on the use of these systems. On October 29, 2018, Lion Air flight 610, a Boeing 737 Max 8 aircraft, crashed into the Java Sea shortly after takeoff from Jakarta, Indonesia, killing all 189 on board. A preliminary report on that crash noted that on the accident flight and on a flight by the same aircraft the previous day, flight data indicated discrepancies between the angle-of-attack sensor on the left side of the aircraft, which had been replaced two days prior to the accident, and the sensor mounted on the right side of the aircraft. Multiple automatic nose-down trim commands occurred during the last six to seven minutes of the accident flight, which the pilots attempted to counteract unsuccessfully by applying nose-up pitch trim commands. At the end of the recorded flight data, the vertical stabilizer had moved to almost the full nose-down position, and the airplane was in a steep dive. The second accident occurred on March 10, 2019, when Ethiopian Airlines flight 302 crashed shortly after departure from Addis Ababa, Ethiopia, killing all 157 on board. The preliminary report from that accident reveals several similarities to the Lion Air flight 610 crash. Notably, immediately upon takeoff and for the short duration of the flight, the left angle-of-attack sensor indicated an extremely high pitch (roughly 75 degrees nose up), while the angle-of-attack sensor on the right side appeared to report normal pitch variations of a few degrees consistent with a takeoff climb. Over the next few minutes the aircraft experienced a series of automatic aircraft nose-down trim commands. The flight data from the accident similarly ends with the pitch trim at almost a full nose-down position with the aircraft in a steep descent. The circumstances of the two Boeing 737 Max crashes led authorities in several countries, including China and the European Union (EU), to ground 737 Max airplanes as the crashes and the aircraft systems involved were investigated. Initially, FAA, Boeing, and U.S. air carriers did not follow suit. One day after the Ethiopian Airlines crash, FAA instead notified international civil aviation authorities that it anticipated mandatory design changes to be instituted no later than April 2019. However, on March 13, 2019, FAA issued an emergency order grounding all 737 Max aircraft. That order remains in place as Boeing seeks to fix identified flight control system issues in ways acceptable to FAA and safety regulators in other countries. The concerns center on how the Boeing 737 Max flight control systems were implemented to counteract high angle-of-attack conditions that could result in unsafe high-pitch situations and potential aerodynamic stalls and the single sensor Boeing relied on to detect these high angle-of-attack conditions. Designers of the Boeing 737 Max took a different approach to designing high angle-of-attack protection systems because the use of larger-diameter engines compared to earlier 737 models necessitated mounting those engines further forward and higher. Under certain conditions, high engine power from these further forward-slung engines could pitch the aircraft up. To address this, Boeing engineered an automated feature, called the Maneuvering Characteristics Augmentation System (MCAS), to counteract such undesirable and potentially unstable pitch up events. The MCAS system, as equipped on the two accident airplanes, reportedly receives aircraft angle-of-attack data from only one of the airplane's two angle-of-attack sensors. The sensors are essentially sensitive wind vanes affixed to the side of the fuselage that precisely measure the relative airflow and thereby convey information about the aircraft's pitch angle relative to the airflow around it. On November 7, 2018, following the Lion Air flight 610 crash, FAA issued an emergency directive ordering U.S. operators of Boeing 737 Max airplanes to apply runaway stabilizer procedures, that is, approved pilot actions to address an uncommanded pitch-down event, in situations involving erroneous high angle-of-attack indications that might trigger repeated nose-down trim commands by the MCAS. In December 2018, FAA expanded the scope of the airworthiness directive, ordering the procedural change for all Boeing 737 Max airplanes worldwide. The control laws for the MCAS have been described as being separate from and not integrated with the other flight control laws and logic embedded in the 737 Max air data computers. In engineer-speak, the MCAS is characterized as a federated systems architecture, that is one packaged in a self-contained unit that carries out its own unique functions. The MCAS control laws as originally designed only received inputs from a single angle-of-attack sensor located on either the left or right side of the aircraft, although the airplanes were equipped with two such sensors, one on each side. The MCAS was added to the Boeing 737 Max as a means to address longitudinal (pitch) stability requirements. Reportedly, the system is only needed and will only activate in highly unusual circumstances. Under most normal flight conditions, the MCAS should not be needed. However, on both Lion Air flight 610 and Ethiopian Airlines flight 302, it is suspected that the MCAS did engage because it received faulty data from the angle-of-attack sensor falsely indicating that the aircraft was in a nose-high attitude. In response to sensor data indicating a nose-high pitch, the MCAS would actuate a nose-down pitch trim command. Moreover, if the pilots counteracted this nose-down actuation with a nose-up pitch trim, the MCAS would reset after five seconds, then repeat the nose-down pitch command again, and would repeat this cycle for as long as it continued to sense that the aircraft was in a nose-high attitude, even if based on errant sensor data. Much of the engineering work done to address the safety concerns that led to the Boeing 737 Max grounding has focused on fixes to the MCAS system design and control laws. Where the original MCAS design relied on input from a single angle-of-attack sensor, the redesigned system will rely on two. Additionally, the new MCAS system will reportedly perform additional checks for reasonableness of data based on average values and for low-to-high data transitions that might indicate a catastrophic failure of the sensor. Boeing refers to this as a triple-validity check of the angle-of-attack sensor data. All 737 Max aircraft reportedly will also be fitted with angle-of-attack sensor disagree warnings to alert pilots when a sensor might be providing errant data. In addition to the redundancies being built into the MCAS sensor inputs, the MCAS control logic is reportedly being revised to limit the manner in which it applies nose-down stabilizer trim commands. Whereas the original system continued to apply repeated nose-down trim commands even if pilots tried to counteract it, the new system reportedly will not reset after a pilot makes electric pitch trim inputs. Also, the redesigned MCAS will not continue to trim the nose down to values close to the stabilizer trim limits, but instead will leave adequate nose-up pitch trim authority for pilots to work with. The Boeing 737 Max grounding has prompted broader inquiries regarding the entire certification process for that aircraft and the steps being taken to certify Boeing's proposed design changes to sensors and the flight control system. FAA stated that it \"is following a thorough process, not a prescribed timeline, for returning the Boeing 737 Max to passenger service. The FAA will lift the aircraft's prohibition order when we deem it safe to do so.\" FAA has convened a technical advisory board to review Boeing's MCAS software update and systems safety assessment and provide recommendations for steps needed to certify Boeing's changes and return the aircraft to service. Regulators in several other countries are pursuing reviews independently. In April 2019, FAA convened a multinational Joint Authorities Technical Review (JATR) chaired by former NTSB Chairman Christopher Hart to conduct a comprehensive review of the Boeing 737 Max aircraft's automated flight control system certification. The JATR is composed of experts from FAA, the National Aeronautics and Space Administration (NASA), and foreign aviation authorities and was convened to \"evaluate aspects of the 737 Max automated flight control system, including its design and pilots' interaction with the system, to determine its compliance with all applicable regulations and to identify future enhancements that might be needed.\" Representatives from air safety authorities in Canada and the European Union, as well as experts from Australia, Brazil, China, Japan, Indonesia, Singapore, and the United Arab Emirates, are participating on the JATR. The findings of the JATR review may help to develop international consensus regarding pilot interaction with Boeing 737 Max automated flight control systems and associated pilot training. The panel's work is separate from and not a required input to FAA and Boeing's ongoing work to address safety concerns identified by the two accidents and certify the aircraft for a return to service. Separately, the Department of Transportation Office of Inspector General announced on March 27, 2019, that it was initiating an audit of FAA's oversight of the Boeing 737 Max certification. The focus of the audit is on FAA's process for certifying the Boeing 737 Max series of aircraft based on a detailed factual history of the activities that culminated in the aircraft's certification. Additionally, the Department of Justice has reportedly launched a criminal probe based on a broad subpoena issued by a Washington, DC, grand jury immediately following the Ethiopian Airlines crash in March 2019. In June 2019, it was reported that the criminal investigation had expanded beyond the Boeing 737 Max to include certification work done on the Boeing 787 \"Dreamliner,\" Boeing's most recent entirely new type design, which first entered commercial service in 2011. The Boeing 787 fleet was grounded by FAA for roughly a three-month period in early 2013, following a number of in-flight fires and electrical problems tied to lithium ion batteries installed on the airplane. This marked the first time an entire fleet of a particular aircraft type was grounded since 1979, when the entire fleet of McDonnell Douglas DC-10s was grounded over a problematic cargo door design. The grounding of the Boeing 787 prompted an NTSB investigation that questioned the certification process for and testing of lithium ion batteries and other emerging technologies, resulting in a series of certification recommendations, including a recommendation that panels of expert consultants be included early in the certification process for new technologies installed on aircraft. In September 2019, NTSB issued a number of safety recommendations to FAA and to Boeing urging action to address design assumptions about pilot response to uncommanded flight control system events like an MCAS activation in the certification process. NTSB urged Boeing to ensure that assessments of the 737 Max consider the effect of all possible cockpit alerts and indications on pilot recognition and response and incorporate these factors into cockpit design changes as well as pilot procedures and training. It similarly urged FAA to change certification standards to ensure that cockpit designs are evaluated to ensure that cockpit warnings and indicators are assessed for pilot recognition and response and this information is incorporated into procedures and training requirements. NTSB also recommended that FAA develop and implement evaluation tools, based on input from industry and human factors experts, to help inform aircraft design certification regarding pilot response to safety-significant failure conditions. In many accidents and incidents, including the crash of Air France flight 447 and possibly including the Boeing 737 Max crashes, faulty sensor data set off a chain of subsequent events that ended in tragedy. Faulty sensor data can give automated systems and pilots inaccurate or incomplete information about airspeed, altitude, pitch, bank, and other aircraft parameters that can result in inappropriate flight commands and a loss of situation awareness. Design considerations during aircraft development, including engineering assessments of potential fault conditions, may not adequately take the risk of sensor failures into account. In the Air France flight 447 crash, airspeed data became unreliable after all three pitot tubes that measure air flow iced over, but a simple cross-check of the airplane's groundspeed based on Global Positioning Satellite (GPS) sensor readings coupled with computer models of winds at the airplane's altitude could have served as a means to detect the anomalies in the airspeed data and provide a rough approximation of what the actual airspeed was. Some researchers argue that certain critical systems on aircraft rely on data from too few sensors and fail to adequately aggregate and integrate available sensor data. Advances in sensor fusion, that is, taking and analyzing data from a more robust set of onboard sensors, may offer opportunities to improve sensor fault detection and flight control system recovery techniques. Automation-related aviation accidents such as those involving the 737 Max have brought complex human-systems interaction to the forefront of public policy. As noted, a number of accidents have also involved either failures of automated systems or pilot confusion over the operation of automated features resulting in improper interaction with these systems. Research has shown that piloting skills associated with maneuvering aircraft using manual controls decline as a consequence of flying highly automated aircraft. Studies indicate that pilots often do not understand how automated features operate and the modes and states of automation in the cockpit. Additionally, some research has shown that pilots may overestimate their ability to take over and safely maneuver the aircraft in situations when automation fails, particularly given the likelihood of unanticipated distractions in the cockpit during a system failure. These studies have raised questions about approaches to training pilots on highly automated aircraft. Complicating matters further, automated systems on modern air transport airplanes are highly adaptable. As a consequence, different air carriers and individual pilots use various different automated features and modes to suit their particular operational needs and personal preferences. For example, some pilots might minimize the use of automation to stay more engaged with piloting the aircraft and avoid boredom and complacency, while others might rely more heavily on automation to reduce workload. Experts continue to debate whether greater standardization of operations and training is desirable. In January 2016 a DOT Office of Inspector General audit found that while FAA had established certain requirements governing airline use of flight deck automation, it lacked a process to ensure that airline training and proficiency standards adequately addressed pilot monitoring capabilities. In response, Section 2102 of the FAA Extension, Safety, and Security Act of 2016 ( P.L. 114-190 ) directed FAA to develop a process for verifying that air carrier flight crew training programs incorporate automated systems monitoring and manual flying skills when autopilot or autoflight systems are not engaged. It also required FAA to establish metrics to gauge pilot proficiency, and issue guidance for implementing and overseeing enhanced pilot training. Subsequently, the Air Carrier Training Aviation Rulemaking Committee, established by FAA in response to NTSB recommendations issued in the wake of the Asiana Airlines flight 214 crash, has made a number of recommendations addressing training elements pertaining to pilot monitoring, as well as training and procedures to enhance operational mode awareness and manually recover from unintended autoflight states. FAA is incorporating these recommendations into its guidance for airline training programs and is considering rulemaking to address the design of flight crew interfaces and cockpit alerting systems. Aircraft type certification refers to the process of reviewing engineering data and performing inspections and tests to certify compliance with regulatory requirements and minimum standards for aircraft design and airworthiness. In addition to certifying new aircraft types, FAA inspects and tests variants of existing aircraft types to assess whether they can be covered under an existing aircraft type certification or whether the changes in design, power, thrust, or weight are so extensive as to require a new type design. These are primarily responsibilities of the FAA Aircraft Certification Service. This process typically involves extensive examinations, inspections, engineering tests and evaluations, and flight tests in which an aircraft designer or manufacturer must satisfactorily demonstrate that the aircraft and its systems and components meet safety standards and are safe for flight. Type certification is the first step in bringing a new aircraft or new aircraft technologies incorporated into the design of an existing aircraft to market. Once an aircraft design is type certified, a manufacturer must demonstrate that it can reliably reproduce that aircraft type to receive production certification to build deliverable aircraft. Upon final assembly, every completed aircraft must undergo examinations, inspections, and tests before it receives airworthiness certification and can begin routine operations for an airline or other operator (see Figure 3 ). Airworthiness certification has long been a delegated function carried out largely by FAA designees, be they employees of the manufacturer or consultants. After an aircraft is delivered, FAA maintains oversight responsibility to identify operational or maintenance difficulties. Under normal circumstances, safety deficiencies involving aircraft in operational use are addressed through the continued airworthiness process. That process involves FAA working with manufacturers and operators to identify safety deficiencies, approve fixes, and issue airworthiness directives ordering operators to address safety concerns through inspections, repairs, and/or replacements of faulty components. For electronic systems this might involve hardware replacements or software or firmware updates. FAA oversees aircraft type certification for aircraft designed in the United States. Other regulatory entities oversee type certification for products designed in other countries. Notably, the European Union Aviation Safety Agency (EASA) oversees the type certification process for aircraft and aircraft products designed in EU member countries and in several other European countries. The FAA's Aircraft Certification Service (AIR), which grants type certification approval, has a staff of about 1,330, mostly engineers and inspectors, who oversee product development phases, the manufacturing processes covered under production certification, and the airworthiness certification of all completed aircraft. FAA's aircraft certification workforce is augmented by FAA designees, employees from aircraft and aircraft component design and manufacturing organizations, and consultants who carry out certain certification functions, such as tests and inspections, on FAA's behalf. Delegation of certification functions to manufacturing employees and engineering consultants is a long-standing practice, but over the last decade FAA has established new regulations governing the manner in which it oversees and interacts with entities to which it has delegated some of these responsibilities (see \" Delegation of FAA Certification Functions \" below). Once a type certificate is issued, it typically remains valid indefinitely. In rare cases a type certificate can be voluntarily surrendered, or it can be suspended or revoked by FAA. As technology advances, type-certified airplane designs are updated and amended or supplemental type certifications may be granted to address modifications of the aircraft. Whether a new type certificate is required or an amended type certificate will suffice is governed by 14 C.F.R Â§21.19, which leaves it up to FAA to determine whether the proposed change \"is so extensive that a substantially complete investigation of compliance with the applicable regulations is required.\" Whereas FAA's Air Certification Service is responsible for aircraft certification, the FAA Flight Standards Service prescribes the standards for aircraft operations and verifies that operators, such as airlines, meet those standards. For each aircraft type design, the Flight Standards Service sets up an aircraft evaluation group to determine required training and operational procedures. Flight standardization boards are the functional elements of aircraft evaluation groups that deal specifically with the training and flight operational procedures of particular aircraft. A flight standardization board has primary responsibility for determining pilot training standards and requirements for a particular aircraft. This includes determinations regarding the requirement for a pilot to obtain an aircraft type rating, and minimum training recommendations and requirements for establishing initial flight crew member competency for the aircraft. For variants of an existing aircraft type, the flight standardization board may develop Master Difference Requirements tables that outline the specific differences among the various aircraft covered by the type certification as well as similar aircraft produced by the manufacturer of that aircraft. These tables form the basis for evaluating an operator's differences training curriculum for pilots who transition from one variant of an aircraft type to another or between aircraft with similar characteristics. The tables specify the training needed to learn and understand the differences between related aircraft types. The FAA operations inspector assigned to a particular airline or operator may then use this, along with more detailed flight standardization board reports, as a guide for review and approval of an operator's proposed training plan. FAA Advisory Circular 120-53B provides guidance to flight standardization boards on evaluating training requirements for newly manufactured or modified aircraft, including differences training requirements for pilots transitioning between similar aircraft or aircraft variants. The guidance sets standards for assessing proposed pilot training programs, delineating training resource and training device needs and available alternatives, and encourages manufacturers to include common characteristics in related aircraft. The advisory circular discusses the need to assure pilot understanding of differences between aircraft variants. It also instructs FAA inspectors how to evaluate each aircraft operator's application of flight standardization board recommendations in its training program, including evaluation of operational differences among aircraft in a mixed fleet and the effects of those differences on training needs. On April 16, 2019, the Boeing 737 flight standardization board issued a draft report for public comment. Notably, the draft report documented findings regarding the aircraft's MCAS based on studies and reexaminations of the system following the Boeing 737 Max grounding; prior Boeing 737 flight standardization board reports had not included information on the MCAS system. The master difference requirements updates associated with the introduction of the Boeing 737 Max had specified only computer-based, oral, or written instruction and testing on other new features of the Boeing 737 Max, with no requirement for simulator or in-flight training or testing for Boeing 737 type-rated pilots to qualify to fly the Boeing 737 Max. FAA has required no training of any type pertaining to the MCAS. The draft report included language mandating that training on the MCAS system be incorporated into ground training for initial, upgrade, transition, differences, and recurrent training for pilots. It specified that this training must include a description of the MCAS system, its functionality, associated failure conditions, and flight crew alerting. The draft report stated that this training could be provided in the form of aided instruction, such as tutorial computer-based instruction, and that required checking may be accomplished by self-tests administered during this computer-based instruction, or through oral or written exam. The draft report, however, did not call for any flight simulator or in-flight instruction or checking related to the MCAS system. On April 17, 2019, one day after the draft report was released, Canada's Transport Minister, Marc Garneau, said he favored simulator training over computer-based instruction. However, at the present time Canadian transportation authorities have not determined whether they will require simulator training related to the MCAS system for Boeing 737 Max pilots. Nonetheless, media coverage suggested that Garneau's comments signaled a growing rift between the United States and Canada over appropriate steps to address Boeing 737 Max training and operations. It was also reported that Air Canada, the only airline in North America that had a 737 Max simulator on hand, had already incorporated MCAS scenarios into its simulator training, even though such training has not been specifically mandated by Transport Canada. Once finalized, the Boeing 737 flight standardization board report will form the primary basis for establishing and approving U.S. air carrier training programs regarding the automated flight control features of the Boeing 737 Max, including transition training between the 737 Max and other 737 variants. Historically, other countries have generally followed FAA guidance in establishing training programs for U.S. manufactured aircraft, but the controversies surrounding the Boeing 737 Max grounding have raised questions as to whether other countries will indeed adopt FAA's training recommendations or whether they will insist on more stringent training requirements. Additional controversy over the Boeing 737 Max flight standardization board emerged following a U.S. Office of Special Counsel finding that numerous FAA safety inspectors, including inspectors assigned to the operational review of the 737 Max, were not sufficiently qualified to carry out those duties and that FAA had provided misleading information regarding FAA inspector qualifications and training in response to congressional inquiries. FAA, however, has reasserted its position that all inspectors who participated in the Boeing 737 Max flight standardization board were fully qualified to do so. Industry advisory groups and standards organizations play important roles in setting industry norms, best practices, and consensus standards that form the basis for aircraft design and production certification. The development of consensus standards represents a significant facet of industry input into the manner in which aircraft and aircraft systems are designed and the criteria against which they are evaluated for certification purposes. In some cases, consensus standards might be incorporated by reference into regulatory requirements. In other cases they might be referenced as means of compliance with specific FAA regulations. Often they serve as a preferred means of compliance because they have been broadly endorsed by industry experts and represent the approaches that are most often pursued and most familiar to FAA regulators. The International Organization for Standardization (ISO), an independent nongovernmental organization, is responsible for developing internationally accepted standards. ISO Technical Committee (TC) 20 is responsible for establishing international standards for air and space vehicles, including vehicle materials and components, as well as equipment used in servicing and maintaining aircraft and space vehicles. SAE International, initially established as the Society of Automotive Engineers, provides input from U.S. experts to ISO TC 20 technical advisory groups on matters pertaining to aircraft design. Within SAE, the Aerospace Council houses technical committees that address all facets of aircraft and aircraft systems design, including avionics, instruments, and flight controls. SAE Technical Committee S-7 addresses issues related to flight deck design and aircraft handling qualities for transport category aircraft. The work of the committee encompasses flight deck panels, controls, and displays; flight deck safety equipment; and flight control systems and their handling qualities. Given the increased importance of software in the design and operation of modern aircraft, another important industry consensus group is the Forum for Aeronautical Software. The forum was formed under a partnership between RTCA, a nonprofit organization founded in 1935 as the Radio Technical Commission for Aeronautics, and EUROCAE, the European Organization for Civil Aviation Equipment. The forum has developed a number of key guidance documents pertaining to the development of aviation software, including DO-178C, which serves as the primary reference for designing and evaluating software-based flight control and avionics systems. FAA Advisory Circular 20-115D recognizes DO-178C as acceptable guidance for meeting the type certification requirements for software aspects of airborne systems and equipment. Manufacturers can pursue alternative means of compliance to meet type certification requirements, but most follow the DO-178C guidance or parallel documents that are used for certification compliance in Europe. The RTCA/EUROCAE guidance is recognized worldwide as an industry standard for developing and certifying software for airborne systems. Besides developing industry consensus standards, companies provide direct input to FAA rulemaking by acting in an advisory capacity to FAA advisory and rulemaking committees. Advisory groups are established under the terms of the Federal Advisory Committee Act (FACA), which sets the legal framework for committees, task forces, and working groups to assist executive-branch policymaking. The FAA Aviation Rulemaking Advisory Committee (ARAC) provides FAA with information, advice, and recommendations concerning rulemaking activities. Under the ARAC, FAA has developed numerous taskings related to air carrier operations and aircraft certification procedures since the 1990s. The ARAC comprises representatives from aviation associations, aviation industry, public interest and advocacy groups, and foreign civil aviation authorities. Engineers employed by manufacturers, representatives of airlines and other operators, and pilots and mechanics representing various labor organizations participate in the ARAC and its working groups. FAA also convenes a number of rulemaking committees that are exempt from FACA requirements but generally must adhere to Administrative Procedures Act requirements in performing work related to rulemaking. FAA personnel carry out the administrative functions of these committees and the subcommittees and working groups formed under them . Congress has generally supported increased utilization of FAA's delegation and designation authorities in order to engage design and manufacturing organizations and their employees more directly in the aircraft certification process, often working as proxies for FAA and its aircraft certification inspector workforce. Nonetheless, legislative language in the 2012 FAA reauthorization ( P.L. 112-95 ) and the 2018 FAA reauthorization ( P.L. 115-254 ) has sought reviews of these practices to assess the efficiency and safety implications of these practices. FAA explains that because it does not have the resources to perform all the necessary certification activities and keep up with an expanding aviation industry, it must rely on delegating certain certification functions to qualified individuals and entities. FAA asserts that using designees for routine, well-established certification tasks allows it to focus its limited resources on safety-critical certification issues as well as new and novel technologies. Since the 1920s, federal aviation safety agencies have relied on private individuals to participate in examination, inspection, and testing of aircraft during the product certification process. In the 1940s, programs were established to appoint designees to perform certain product certification approvals. These included designated engineering representatives and designated manufacturing inspection representatives employed by aircraft, aircraft engine, and aircraft component manufacturers. In the 1980s, FAA established a designated airworthiness representative (DAR) program that expanded the role of individuals in performing airworthiness certification functions, and allowed organizations to serve as DARs under a program known as Organizational Designated Airworthiness Representatives (ODARs). These actions were taken under FAA's long-standing authority under 49 U.S.C. Â§44702(d), which allows for the delegation of activities related to aircraft type certification, production certification, and airworthiness certification, including examination, testing, and inspection necessary to issue a certificate, and certificate issuance to a private person. In this context, \"person,\" as defined in 1 U.S.C. Â§1, includes corporations, companies, partnerships, and other business entities in addition to individuals. FAA notes that \"[w]hen acting as a representative of the Administrator, these persons or organizations are required to perform in a manner consistent with the policies, guidelines, and directives of the Administrator. When performing a delegated function, designees are legally distinct from and act independent of the organizations that employ them.\" Under 49 U.S.C. Â§44702(d), FAA has the authority to rescind a delegation issued to a private person at any time for any appropriate reason. Moreover, any person affected by the action of an entity delegated certain FAA certification functions may petition FAA for reconsideration, and FAA may, at its own initiative, consider the actions of a delegated entity at any time. If FAA determines that the delegated entity's actions are unreasonable or unwarranted, it may change, modify, or reverse them. FAA formally established the Organization Designation Authorization (ODA) program in 2005. This prompted a significant change in the manner in which FAA delegates its certification functions and the manner in which it oversees aircraft and aircraft systems certification activities. The ODA program serves as a formal framework under which FAA may delegate authority to organizations or companies, including aircraft manufacturers such as Boeing; engine manufacturers such as Pratt and Whitney, General Electric, and Rolls Royce; and avionics and flight control systems suppliers such as Honeywell and Collins Aerospace. In the 1990s, the Aircraft Certification Procedures Issues tasking for the Aviation Rulemaking Advisory Committee sought industry input regarding FAA's delegation of aircraft and aircraft system certification activities. In 1998, the Aviation Rulemaking Advisory Committee recommended that FAA establish Organization Designation Authorization (ODA), generally authorizing companies to conduct a broad array of delegated functions on behalf of FAA. The ARAC recommendation, similar to one issued by the Gore Commission two years earlier, was based on a draft developed by the Delegation Systems Working Group, which was chaired by a Boeing employee. Over the past 15 years, the ODA program has been expanded. Based on recommendations from the certification process committee and mandates from the 2012 FAA Modernization and Reform Act ( P.L. 112-95 ), FAA adopted several initiatives for improving and expanding the ODA program. In a 2015 statement, the Government Accountability Office (GAO) observed that, while industry stakeholders favored expanding the ODA program, employee unions raised concerns that FAA lacked adequate resources to implement and oversee ODA expansion. However, two years later in March 2017, GAO reported that FAA had carried out its ODA action plan, launched an audit training initiative for personnel supervising ODA inspections, and had expanded delegation under ODA to authorize designees to approve instructions for continued airworthiness, emissions data, and noise certification. According to GAO, FAA, in collaboration with industry, had also developed an ODA scorecard to measure outcomes related to its ODA initiatives, including manufacturer compliance with standards set for delegated activities and FAA oversight. Following oversight hearings during the 115 th Congress, Congress expressed general support for the ODA framework, but included in the FAA Reauthorization Act of 2018 ( P.L. 115-254 ) extensive language directing FAA to further improve the efficiency and effectiveness of the ODA program, expanding upon the reform efforts that were initiated in part by provisions in the 2012 FAA reauthorization act. While policymakers have had a long-standing interest in certification reforms under the ODA framework, following the Boeing 737 Max grounding and crashes, FAA certification oversight and the ODA program specifically have been brought into the public spotlight. In some instances, journalists have characterized the ODA process as a mechanism for aircraft and aircraft component manufacturers to \"self-certify\" that their products meet applicable safety regulations and certification standards, a view that FAA officials say grossly distorts how the program was designed and how it functions in practice. In response to the mandates in the 2012 law, P.L. 112-95 , FAA chartered two aviation rulemaking committees, one to address certification processes and the other to examine regulatory consistency. Among the recommendations set forth by the Certification Process Committee was expanding delegation under ODA to include processes for certifying aircraft noise and emissions and for approving instructions regarding continued airworthiness of delivered aircraft. The recommendations also included initiatives to address FAA tracking of certification activities, updating certification regulations, and improving consistency of regulatory interpretations. The 2018 FAA act, P.L. 115-254 , mandated a number of aircraft certification reforms. The law directed FAA to establish an advisory committee, the Safety Oversight and Certification Advisory Committee, to develop policy recommendations for the aircraft certification process and for FAA safety oversight of certification activities. It also directed FAA to establish performance objectives and metrics for aircraft certification that both streamline the certification process and increase transparency and accountability for both FAA and the aviation industry. Among these objectives, the law seeks full utilization of FAA's delegation and designation authorities as well as full implementation of risk management principles and a systems safety approach. Following the Boeing 737 Max grounding, however, FAA's delegation and designation authorities in particular have come under scrutiny. Lawmakers have also questioned certain aircraft manufacturing practices and, in particular, have sought to curtail a perceived practice of marketing certain aircraft safety enhancements and features as options available at additional cost. Notably, the Safety is Not for Sale Act of 2019 ( S. 1178 ), introduced by Senator Markey, would require aircraft manufacturers to include certain nonrequired safety-enhancing equipment at no additional charge in the sale of new aircraft to U.S. air carriers. Equipment included under this proposal would include attitude indicators, traffic alerting systems, terrain advisories and warnings, weather advisories, aircraft configuration advisories, supplemental cockpit indicators, enhancements that improve aircraft crashworthiness, monitoring and detection systems, aircraft stability and control enhancements or alerts, and fire extinguishing systems. The legislation also would require FAA to establish performance standards for angle-of-attack indicators, angle-of-attack disagree alerts, and backup fire suppression systems for airliners. The interrelationships between FAA and manufacturers are complex and extend well beyond delegation of certification functions and the ODA program (see Table 2 ). In the case of manufacturers, companies like Boeing exert considerable influence over the development of industry standards as well as influencing regulatory changes through participation in standards organization committees and FAA advisory and rulemaking committees. Additionally, through delegation authority and the ODA program, manufacturers and their employees carry out certain certification functions on behalf of FAA. Through these channels, manufacturers can offer their knowledge and expertise to the safety regulation and certification processes. While FAA retains oversight of all of these activities, the perception of industry \"self-regulation\" may reflect broader concerns about FAA capabilities and resources to conduct adequate oversight of the certification process and related standards development activities and industry practices. Under international air safety agreements and a framework set forth by ICAO, other countries generally accept the airworthiness determinations of and the safety certifications issued by FAA for aircraft, aircraft engines, and other aircraft components designed or manufactured in the United States. These agreements are usually reciprocal: FAA typically accepts similar determinations made by its overseas counterparts for aviation products developed outside the United States. Because Boeing, based in Chicago, and Airbus, based in Toulouse, France, jointly control a large majority of worldwide sales of commercial passenger jets, FAA and the European Union Aviation Safety Agency (EASA) fulfill important roles in certifying passenger airliners operated worldwide. FAA generally accepts EASA certification of commercial aircraft manufactured by Airbus, and, reciprocally, European countries under EASA accept FAA certification of U.S.-manufactured aircraft, such as those built by Boeing. While the two regulatory agencies, like the industry giants that they regulate, generally cooperate on safety matters, they sometimes hold differing views regarding safety design. Following the Boeing 737 Max grounding, some international groups and observers have questioned FAA's certification processes and its extensive use of designees to conduct certification work, although similar programs are in place in Europe. FAA, EASA, and other civil aviation oversight entities have working arrangements with respect to each other's certification and safety oversight activities. For example, FAA might insist on certain additional testing or engineering evaluations to demonstrate safety of a modification to an aircraft design type certified by EASA. In such an instance, FAA would negotiate with EASA and the developer to specify the details of the additional testing and engineering analysis and, if agreed to, may send observers to witness tests and review engineering work. The continuing controversy surrounding the Boeing 737 Max is testing these international arrangements. Aviation authorities in other countries might insist on design fixes, inspections and validation tests, and documentation and training different from what FAA agrees to before allowing airlines to resume Boeing 737 Max operations. While the multinational Joint Authorities Technical Review (JATR) was formed to develop international consensus on these matters, differing views among major international aviation safety organizations could have significant implications for how these agencies cooperate moving forward, both on review of the Boeing 737 Max and on future aircraft certification activities. EASA has already insisted on an independent review of proposed design changes to the Boeing 737 Max, and if its conclusions differ significantly from those of FAA, evidence of a schism between key international regulators could create further uncertainty for both aircraft manufacturers and operators. There is less international coordination in regulating pilot qualifications. In the United States, pilots must hold an Airline Transport Pilot (ATP) certification to be hired by an airline. This certification usually requires 1,500 hours of total flight time to attain. In contrast, some foreign airlines hire individuals with little or no experience through ab initio programs that provide training to become an airline pilot. Under these programs, pilots can begin flying as first officers once they receive a commercial pilot certification that can be attained with around 250 hours of total flight time, and it is not unusual for entry-level first officers to have only a few hundred hours of total flight experience. Although the captain of Ethiopian Airlines flight 302 had more than 8,000 hours of total flight experience, the flight's first officer had less than 400. Questions concerning pilot experience have significant implications for how aircraft manufacturers address pilot interface design issues and training requirements for highly automated jet airplanes. If even experienced pilots might struggle to understand information presented to them and maneuver the airplane to expected professional standards when faced with a non-normal condition or emergency situation, pilots with limited experience may lack the training to handle potential failure scenarios. A central consideration in designing cockpits and cockpit procedures is how much detailed systems information pilots should be given to handle possible in-flight failures. On one end of the spectrum, some aircraft designers might argue that pilots can get by mainly with just procedural knowledge of the actions to take when faced with an urgent situation or event. On the other end of the spectrum, some aviation safety experts advocate providing pilots with more thorough knowledge of aircraft systems, particularly critical flight control systems, to help them make better-informed choices when working through a novel event or condition. This debate has important implications for how automated cockpit systems are developed and the training pilots receive. ICAO sets general training and licensing standards for pilots internationally, but it is up to individual countries to set formal requirements for their pilots. The strong demand for airline pilots in countries where air travel is growing rapidly has resulted in some airlines hiring pilots without extensive training and experience to operate revenue passenger flights. In general, international standards for multi-crew and commercial pilot licenses call for a minimum of 240 flight hours of experience, much lower than the 1,500 now required to fly for an airline in the United States. Economic factors make it unlikely that requirements and standards similar to those applicable to U.S. pilots will be implemented worldwide in the near future. While FAA has some limited regulatory authority over airlines that fly into the United States, it does not have minimum pilot experience requirements for foreign flight crews and defers to the country of aircraft registry in these matters. FAA also has limited influence over aircraft-specific training requirements of countries whose airlines purchase airplanes from Boeing and other U.S. manufacturers. Nonetheless, FAA has asserted its position that foreign pilots have become too dependent on cockpit automation. FAA has urged ICAO to address perceived pilot training deficiencies and recommended that ICAO update standards and guidance to include additional training to prepare airline pilots to operate aircraft manually when automated systems fail. Appendix A. U.S. Air Carrier Accidents in the 1990s Involving Passenger Fatalities During the 1990s there was a spate of U.S. air carrier accidents including several fatal crashes involving passenger flights: the February 1, 1991, runway collision between USAir flight 1493, a Boeing 737, and Skywest Airlines flight 5569, a commuter turboprop, at Los Angeles International Airport; the March 3, 1991, crash of United Airlines flight 585, a Boeing 737, on approach to Colorado Springs, CO; the April 5, 1991, crash of an Atlantic Southeast Airlines turboprop on approach to Brunswick, GA; the January 3, 1992, crash of a CommutAir turboprop on approach to Saranac Lake, NY; the March 22, 1992, crash of USAir flight 405, a Fokker F28 jet, taking off from LaGuardia Airport in New York, NY; the June 7, 1992, crash of American Eagle flight 5456, a turboprop on approach to Mayaguez, Puerto Rico; the June 8, 1992, crash of a GP Express turboprop on approach to Anniston, AL; the December 1, 1993, crash of Northwest Airlink flight 5719, a turboprop on approach to Chisolm-Hibbing, MN; the January 7, 1994, crash of United Express flight 6291, a turboprop on approach to Columbus, OH; the July 2, 1994, crash of USAir flight 1016, a McDonnell Douglas DC-9 on approach to Charlotte, NC; the September 8, 1994, crash of USAir flight 427, a Boeing 737 on approach to Pittsburgh, PA; the October 31, 1994, crash of American Eagle flight 4184, an ATR 72 turboprop, near Roselawn, IN; the August 21, 1995, crash of an Atlantic Southeast Airlines turboprop near Carrollton, GA; the December 20, 1995, crash of American Airlines flight 965, a Boeing 757, on descent into Cali, Colombia; the May 11, 1996, crash of ValuJet flight 592, a McDonnell Douglas DC-9, in the Florida Everglades after departing from Miami International Airport; the July 6, 1996, uncontained engine failure aboard Delta Airlines flight 1288, a McDonnell Douglas MD-88, during takeoff at Pensacola, FL; the July 17, 1996, crash of TWA flight 800, a Boeing 747, shortly after departure from John F. Kennedy International Airport in New York, NY; the November 19, 1996 runway collision between United Express flight 5925, a turboprop and a privately owned turboprop at Quincy Regional Airport, IL; the January 9, 1997 crash of Comair flight 3272 near Ida, MI, en route from Cincinnati, OH, to Detroit, MI; and the June 1, 1999, crash of American Airlines flight 1420, a McDonnell Douglas MD-82 landing at Little Rock, AR.", "summary": "The increasing complexity and automation of flight control systems pose a challenge to federal policy regarding aircraft certification and pilot training. Despite significant commercial aviation safety improvements over the past two decades, flight control automation and aircraft complexity have been cited as contributing factors in a number of major airline accidents, including two high-profile crashes overseas involving the recently introduced Boeing 737 Max variant in 2018 and 2019. These crashes have directed attention to Federal Aviation Administration (FAA) oversight of aircraft type certification and pilot training practices for transport category aircraft, particularly as they pertain to complex automated flight control systems. As aircraft systems have evolved over the past three decades to incorporate new technologies, Congress has mandated FAA to streamline certification processes, with the primary motivation being to facilitate the development of new safety-enhancing technologies. Modern commercial aircraft rely on \"fly-by-wire\" flight control technologies, under which pilots' flight control inputs are sent to computers rather than through direct mechanical linkages to flight control systems. The fly-by-wire software contains flight control laws and logic that, in addition to optimizing performance efficiency, protect the aircraft from commanded actions that could put the airplane in an unsafe state. Automated flight control systems have largely been viewed as having a positive effect on safety, and accident rates have improved considerably over the past two decades. However, the increasing complexity of automated flight systems has sometimes caused confusion and uncertainty, contributing to improper pilot actions during critical phases of flight and in some cases leading pilots to unintentionally place an aircraft in an unsafe condition. Besides designing these systems in a manner that minimizes pilot errors and the consequences of those errors, aircraft designers and operators face challenges regarding maintaining piloting skills for flight crews to be able to take over and manually fly the aircraft safely if critical systems fail. They also face challenges regarding documentation and pilot training effectiveness in building accurate mental models of how these complex systems operate. The primary goals of ongoing efforts to address these challenges are to enhance pilot situation awareness when using automation and reduce the likelihood of mode errors and confusion, while at the same time not overburdening pilots with intricate systems knowledge beyond what is necessary. In the ongoing investigations of two Boeing 737 Max crashes, Lion Air flight 610 and Ethiopian Airlines flight 302, concerns have been raised about the design of an automated feature called the Maneuvering Characteristics Augmentation System (MCAS) and its reliance on a single angle-of-attack sensor even though the aircraft is equipped with two such sensors. These concerns led to the worldwide grounding of all Boeing 737 Max aircraft until the MCAS safety concerns can be resolved, significantly impacting both U.S. and foreign airlines that operate the aircraft. These recent aviation accidents have prompted reviews of the manner in which modern transport category aircraft are certified by FAA and its foreign counterparts, and in particular, the roles of regulators and manufacturers in the certification process. The challenges of certifying increasingly complex aircraft are largely being met by delegating more of FAA's certification functions to aircraft designers and manufacturers. This raises potential conflicts between safety and quality assurance on the one hand and competitive pressures to market and deliver aircraft on the other. Under Organization Designation Authorization (ODA), FAA can designate companies to carry out delegated certification functions on its behalf. Congress has supported the ODA framework and in recent FAA reauthorization legislation ( P.L. 115-254 ) directed FAA to establish performance objectives and metrics for aircraft certification that both streamline the certification process and increase transparency and accountability for both FAA and the aviation industry. However, the Boeing 737 Max grounding has prompted reviews of the certification process to identify potential gaps in oversight. Foreign authorities have also put pressure on FAA to review its certification delegation practices, although similar approaches are used in Europe. The inquiries have led to broader discussions about aircraft certification practices and also about global training, qualification, and currency standards for airline pilots.", "document_type": "crs"}
{"report": "In 1883, following the assassination of President James A. Garfield by disgruntled job seeker Charles Guiteau, the Pendleton Act was signed into law by President Chester A. Arthur to ensure that \"government jobs be awarded on the basis of meritâ¦.\" The Pendleton Act ended the spoils system to ensure that qualified individuals were hired into federal service and to prevent the President from being \"hounded by job seekers.\" With the advent of the merit system, federal employees found themselves serving longer in government while also being attracted to private-sector jobs related to their federal employment. The movement of employees between the private sector and government is often referred to as the revolving door . Generally, the revolving door is described as the movement of individuals between the public and private sector, and vice versa. Individuals may move because they possess policy and procedural knowledge and have relationships with former colleagues that are useful to prospective employers, either in government or in the private sector. Some observers see the revolving door as potentially valuable to both private-sector firms and the government; other observers believe that employees leaving government to join the industries they were regulating, or leaving the private sector to join a relevant government agency, could provide an unfair representational advantage and create the potential for conflicts of interest. While Congress has passed laws regulating the revolving door phenomenon in the executive branch, there has to date been little data available about the underlying phenomenon. This report provides data on the movement into and out of government by executive branch personnel in President George W. Bush's and President Barack Obama's Administrations. Using a dataset of executive branch Cabinet department officials compiled by graduate students at the Bush School of Government and Public Service at Texas A&M University in partnership with CRS, this report provides empirical data about the use of the revolving door by a subset of federal officials, with a particular focus on those who were registered lobbyists either before or after their government service. This report begins with an overview of existing revolving door laws and regulations that affect executive branch personnel. It next examines the potential advantages and disadvantages of the revolving door phenomenon. Data collected in partnership with the Bush School of Government and Public Service at Texas A&M University are then presented and analyzed. The data provide an empirical picture of the executive branch revolving door as it relates to registered lobbyists. This analysis is followed by a discussion of select issues for potential congressional consideration. Revolving door provisions, which can include laws, regulations, and executive orders, are often considered as a subset of conflict-of-interest provisions that govern the interaction of government and nongovernmental individuals. While most historic revolving door provisions generally addressed individuals exiting government for work in the private sector, some have also addressed individuals entering government. Overall, revolving door conflict-of-interest laws have existed since the late 19 th century. The first identified conflict-of-interest provision was enacted in 1872. This provision generally prohibited a federal employee from dealing with matters in which they were involved prior to government service. In 1919, the first restrictions were placed on individuals who had specifically served as procurement officials from leaving government service \"to solicit employment in the presentation or to aid or assist for compensation in the prosecution of claims against the United States arising out of any contracts or agreements for the procurement of supplies â¦ which were pending or entered into while the said officer or employee was associated therewith.\" Similarly, the Contract Settlement Act of 1944 (58 Stat. 649) included a provision making it Unlawful for any person employed in any Government agency â¦ during the period such person is engaged in such employment or service, to prosecute or to act as counsel attorney or agent for prosecuting, any claim against the United States, or for any such person within two years after the time when such employment or serve has ceased, to prosecute, or to act as counsel, attorney, or agent for prosecuting, any claim against the United States involving any subject matter directly connected with which such person was so employed or performed duty. In 1962, portions of the current statutory provision at 18 U.S.C. Â§207 were enacted as part of a major revision of federal conflict-of-interest laws. Since the 1960s, postemployment restriction laws have been amended several times, including by the Ethics in Government Act of 1978 to add certain one-year \"cooling off\" periods for high-level executive branch personnel and limit executive branch official postemployment advocacy (i.e., lobbying) activities; by the Ethics Reform Act of 1989; and by the Honest Leadership and Open Government Act of 2007, which extended the \"cooling off\" period to two years for \"very senior\" executive branch officials. Revolving door provisions, including conflict-of-interest laws and \"cooling off\" periods, were initially designed to protect government interests against former officials using proprietary information on behalf of a private party and current officials against inappropriately dealing with matters on which they were involved prior to government service. Additionally, they attempted to limit the possible influence and allure of potential private arrangements by federal officials when they interact with prospective private clients or would-be future employers while still employed by the government. Historically, the decision to adopt, or amend, revolving door and conflict-of-interest provisions has been balanced against the potential deterrent of restricting the movement of individuals between the public and private sector. For example, in 1977, the Senate Committee on Governmental Affairs reported a bill that would have amended the existing revolving door provisions. As part of its justification for the measure, the committee explained the need to balance the appearance of impropriety against the need to attract skilled government workers. Its report noted the following: 18 USC Â§207, like other conflict of interest statutes, seeks to avoid even the appearance of public office being used for personnel or private gain. In striving for public confidence in the integrity of government, it is imperative to remember that what appears to be true is often as important as what is true. Thus government in its dealings must make every reasonable effort to avoid even the appearance of conflict of interest and favoritism. But, as with other desirable policies, it can be pressed too far. Conflict of interest standards must be balanced with the government's objective in attracting experienced and qualified persons to public service. Both are important, and a conflicts policy cannot focus on one to the detriment of the other. There can be no doubt that overly stringent restrictions have a decidedly [sic] adverse impact on the government's ability to attract and retain able and experienced persons in federal office. The revolving door allows movement in both directions, with individuals both entering and exiting government. Some past researchers have argued that those who enter government with prior industry experience are more supportive of regulated industry than those without industry experience. Similarly, two studies have concluded that the lure of private-sector employment has led regulators to support the regulated industry during their time in government. Whether or not the revolving door on net helps or hinders the functioning of government agencies may depend, however, on the potential benefits of transitioning individuals between government and the private sector versus the potential for conflicts of interest to develop on the part of those individuals. Some studies have identified positive aspects of the revolving door and the relationships developed between regulators and the regulated. Other studies find that government agencies are better run with stable leadership that does not often utilize the revolving door and keeps some distance between the agency and the regulated industry. Current laws and regulations generally govern the movement of federal employees from the government to the private sector and vice versa. These provisions can be divided into three categories: broadly applicable postemployment laws, supplemental regulations, and executive order requirements. Revolving door provisions, however, do not necessarily apply to all instances of an employee leaving government service. Rather, they are specific to covered officials (see below) who leave government and are then involved with an issue they were also involved in while a federal employee. For some circumstances, the Office of Government Ethics (OGE) \"has emphasized that the term [ particular matter ] typically involves a specific proceeding affecting the legal rights of the parties, or an isolatable transaction or related set of transactions between identified parties.\" Initially enacted in 1962, 18 U.S.C. Â§207 provides a series of postemployment restrictions and was enacted \"to prevent former Government employees from leveraging relationships forged during their Government service to assist others in their dealings with the Government.\" These include a lifetime ban on \"switching sides\" on a particular matter involving specific parties on which any executive branch employee had worked personally and substantially while with the government; a two-year ban on \"switching sides\" on a somewhat broader range of matters that were under the employee's official responsibility; a one-year restriction on assisting others on certain trade or treaty negotiations; a one-year \"cooling off\" period for certain \"senior\" officials, barring representational communications before their former departments or agencies; a two-year \"cooling off\" period for \"very senior\" officials, barring representational communications and attempts to influence certain other high-ranking officials in the entire executive branch of government; and a one-year ban on certain officials performing some representational or advisory activities for foreign governments or foreign political parties. Current law focuses on postemployment restrictions of former federal employees rather than on individuals entering government. These postemployment laws focus on \"representational\" activities of former federal employees and are \"designed to protect against the improper use of influence and government information by former employees, as well as to limit the potential influence that a prospective employment arrangement may have on current federal officials when dealing with prospective private clients or future employers while still in government service.\" One study found the appeal of postemployment contact with the government to be strong, especially when there is a \"demand for the personnel credentials\" of former officials within an industry, and when former officials can move from a regulatory agency to the regulated industry. The revolving door restrictions are in addition to statutes that apply more broadly to all individuals engaged in certain representational activities, regardless of whether they ever worked for the federal government. These restrictions, found primarily in the Foreign Agents Registration Act (FARA) and the Lobbying Disclosure Act (LDA), however, do not prohibit any particular behavior. Rather, they require registration as a foreign agent or lobbyist and the periodic disclosure of information about influence activities. Regulations for the implementation of revolving door provisions are issued by OGE. Found at 5 C.F.R. Â§2641, these regulations provide an overview and definitions for current revolving door, postemployment conflict-of-interest restrictions; list prohibitions covered by the regulations and the law; and provide a summary of statutory exceptions and waivers. The OGE regulations pertain only to postemployment restrictions found at 18 U.S.C. Â§207 and only to executive branch employees. In some cases, agencies have issued additional regulations that supplement OGE's regulations. For example, the Office of Management and Budget (OMB) provides guidance on the application of postemployment restrictions to all government employees, whereas the Federal Housing Finance Agency provides specific additional postemployment restrictions for its employees. In several instances, the President has issued an executive order to influence the interactions and relationships between the public and the executive branch. For example, President John F. Kennedy issued an executive order (E.O. 10939) that included provisions for behavior by government employees. In the years after President Kennedy's Administration, other Presidents also issued ethics executive orders to address postgovernment revolving door restrictions. These executive orders were issued by President Lyndon Johnson, President Richard Nixon, President Ronald Reagan, and President George H. W. Bush. In more recent Administrations, three Presidents have each issued an executive order that included additional revolving door restrictions for certain Administration appointees. They are President Clinton (1993), President Obama (2009), and President Trump (2017). Each of these executive orders contained an ethics pledge that provided additional conflict-of-interest requirements for executive branch personnel leaving the government and for individuals entering government. Each also extended statutory and regulatory revolving door provisions, included additional restrictions on lobbyists entering government and lobbying back government upon departure, and in two instances (Clinton and Trump) contained restrictions on former appointees leaving the government to represent a foreign principal. For a more detailed discussion of executive order ethics pledges, see CRS Report R44974, Ethics Pledges and Other Executive Branch Appointee Restrictions Since 1993: Historical Perspective, Current Practices, and Options for Change , by Jacob R. Straus. Discussion of whether revolving door restrictions are positive or negative generally focuses on whether former government employees, when they switch jobs, have an inherent or perceived conflict of interest. Though legislation often treats the revolving door as a negative trend, the movement of individuals between the government and private sector may also present multiple potential benefits. One argument in favor of the revolving door, for example, is that the promise of future private-sector employment could potentially improve the quality of candidates applying for government jobs. Further, direct connections with government officials are important, but a close relationship is not necessarily what drives postemployment activities. Although some believe that government employees contemplating a move to the private sector will be friendly to industry interests at the expense of the public interest, two studies have also concluded that regulators instead may engage in more aggressive actions, regardless of their future job prospects. Additionally, the flow of personnel between the public and private sectors may increase the knowledge base of both sectors. Critics of the revolving door and the movement of employees between the government and private sector often advocate for longer \"cooling off\" periods and stronger restrictions related to conflicts of interest. Additionally, critics often assert that the revolving door has negative effects for the transparency and efficiency of government. These critics see existing bias between those in government and their connections with lobbying firms and the potential for those connections to be exploited when the individual is employed by the private sector. Additional criticism of the revolving door focuses on the worth of a former government employee over time. One study has concluded that a majority of revenue generated by private lobbying firms was directly attributable to employees with previous government experience. Another study found that \"'who you know' rather than 'what you know' drives a good proportion of lobbying revenues.\" In every Administration, executive branch officials arrive from, and depart to, the private sector. The movement between the government and the private sector touches on many industries and professions. When such movement occurs, it is possible that conflicts of interest could arise for current and former government officials. Data on executive branch employees entering and exiting the government have historically been difficult to compile. During the 2017-2018 academic year (September 2017 to May 2018), CRS partnered with graduate students at the Bush School of Government and Public Service at Texas A&M University to collect and analyze data on the revolving door. Data were collected on the subset of former executive branch officials who were listed in the United States Government Policy and Supporting Positions (the Plum Book ). Published every four years, the Plum Book \"lists over 7,000 Federal civil service leadership and support positions â¦ that may be subject to noncompetitive appointment, nationwide. Data covers positions such as agency heads and their immediate subordinates, policy executives and advisors, and aides who report to these officials.\" The positions listed in the Plum Book are political appointments, which represent a subset of executive branch employees. Therefore, this report presents data on that subset of individuals who have worked in these executive branch positions. Additionally, since the Plum Book is published only once every four years, it is a \"snapshot\" of a given Administration's appointees and includes only individuals who were serving at the time of publication. Four Plum Books were used to build a dataset of political appointees who served in President George W. Bush's and President Barack Obama's Administrations. Overall, 6,665 federal appointees were included spanning the two Administrations. Table 1 reports the number of appointees from each Administration included in this dataset. If an appointee served in more than one Administration, data reported are for the most recent Administration served. Appointees were not included in the dataset twice. Further, if an appointee left the Administration prior to the Plum Book 's publication, then they do not appear in the data. Political appointees included in the dataset represented 15 Cabinet departments and were paid at the GS-13 level or higherâa pay rate generally considered to have supervisory authority in the executive branch. Table 2 lists the Cabinet departments included in this study and the number of employees from that Cabinet department included in the dataset. For most individuals and industries, data on both pregovernment and postgovernment service is not readily obtainable from public sources. Therefore, this report uses official Lobbying Disclosure Act (LDA) data on registered lobbyists to gain insight into the revolving door phenomenon. Administered by the Clerk of the House of Representatives and the Secretary of the Senate, LDA registration data are required by law to be published online. The LDA database includes all registration and disclosure statements for lobbyists and is searchable by name, lobbying firm, or lobbying client. Since the Plum Book provides the names of former executive branch officials, the LDA database was searched to match pregovernment and postgovernment service of individuals registered as lobbyists. Appointees were classified as lobbyists if they were registered under LDA at any time before or after their government service, regardless of the duration of their registration. These data, which reflect a subset of people who move between employment in the private sector and government in either direction, are the focus of this report's analysis. Of Bush and Obama Administration executive branch appointees in the dataset, approximately 92% (6,159) were never registered as lobbyists, while 8% (506) were registered either before, after, or both before and after their government service. Of those registered as lobbyists, approximately 36.5% registered before joining the government, 55.1% registered after leaving their executive branch jobs, and 8.3% registered both before and after their federal service. Overall, these numbers generally appear to be in line with other studies of the executive branch, which suggest that most high-level federal appointees were not employed as lobbyists either prior to, or after, their government service. Examining the number and percentage of lobbyists in the dataset by Administration ( Table 3 ) shows that the overall levels of registered lobbyists either before or after government service is relatively low in both the Bush Administration and the Obama Administration. The Obama Administration, however, had more of its appointees who were registered lobbyists before their government service than after their government service, while the Bush Administration had more of its appointees who were registered lobbyists after their government service than before their government service. As shown in Table 3 , the total number of registered lobbyists in the dataset from the Bush Administration (340) was higher overall than from the Obama Administration (166), although the number of lobbyists serving in either Administration is not particularly large compared to the total number of appointees included in the dataset. During his Administration, President Obama instituted an executive order to restrict the number of lobbyists entering the Administration, a policy that did not exist in the Bush Administration. The number of individuals who were registered lobbyists before serving in President Obama's first term is similar to the first term of the Bush Administration. The number of lobbyists entering government, however, was higher in President Obama's second term than in either the Bush Administration or President Obama's first term. For individuals leaving the Administration, the number of registered lobbyists is lower in the Obama Administration than in the Bush Administration. In the dataset, Cabinet departments differed greatly in the number of officials who were registered lobbyists either before or after their federal service. Some departments had few individuals who were registered lobbyists either before or after their time in government, whereas others had more. Figure 1 reports the percentage of registered lobbyists by department in the dataset collected by the Bush School of Government and Public Service and CRS. As shown in Figure 1 , the percentage of federal appointees in the dataset who registered as lobbyists before their government service, after their government service, or both ranges from a high of 18% (Department of Commerce) to a low of 1% (Department of Justice). The figures for other agencies ranges between 2% and 17%. The overall percentages of Cabinet department officials in the dataset who have ever been registered lobbyists might raise some questions for future research on the connections between government agencies and regulated industries. For example, some agencies appear to have a higher percentage of lobbyists than other agencies. Could a high percentage of lobbyists indicate stronger links to regulated industries? Similarly, how might lobbyists entering government differ in their government-industry connection than lobbyists leaving government? Might maintaining government-industry connections allow for better outreach by government agencies and access to information and resources by interest groups? The timing of when lobbyists registered may provide additional insight into how often federal officials in the dataset utilized the revolving door between government and lobbying. Figure 2 shows the percentage of LDA-registered officials at various agencies divided by when they registeredâbefore their service, after their service, or both. As Figure 2 shows, every Cabinet department for which data were gathered had some number of officials listed in the Plum Book who registered as lobbyists either before or after their government service, or both. The number of officials in the dataset identified as registered lobbyists is noted on the left-hand side of Figure 2 next to the name of the federal department at which they worked. As the figure shows, each department had a different mix of the percentage of its officials in the dataset identified as registered lobbyists who registered to lobby before their government service, after their government service, or both. The percentage of the total number of lobbyists who worked at a particular agency who were registered lobbyists before their government service ranged from 10% in the Department of Labor to 61% in the Department of Veterans Affairs. The percentage of the total number of lobbyists who worked at a particular agency who were registered lobbyists after their government service ranged from 39% in the Department of Veterans Affairs to 82% in the Department of Transportation. Additionally, all departments included in the data except the Department of Veterans Affairs had individuals who were registered lobbyists before and after their government service. For the Department of Labor, half of officials who were lobbyists registered both before and after their government service. For other agencies, the percentages ranged from 1% (Department of State) to 19% (Department of Housing and Urban Development). In every Administration, individuals move between the public and private sectors. In recent years, there has been greater focus on potential additional restrictions that might be placed on individuals entering and exiting government through the introduction of legislation to amend current revolving door restrictions and the issuance of executive orders to temporarily increase the \"cooling off\" period for executive branch appointees. Current law compartmentalizes the revolving door by placing distinctive postemployment restrictions on different types of government employees. For example, restrictions on government officials engaged in contracting do not necessarily apply to nonprocurement or noncontracting employees. Such varying restrictions were enacted because \"the present complexity and size of Executive departments require occasional separate treatment of certain departmental agencies and bureaus. It would be patently unfair in some cases to apply the one year no contact prohibition to certain employees for the purpose of an entire departmentâwhen, in reality, the agency in which he worked was separate and distinct from the larger entity.\" In past Congresses, legislation has been introduced to lengthen revolving door \"cooling off\" periods. Those measures often propose extending \"cooling off\" periods to as few as two years to instituting a lifetime ban. If enacted, increased restrictions could serve to diminish the interaction between former government officials and government agencies and could reduce the appeal of leaving the government for a private-sector position. Additionally, such additional restrictions might \"eliminate the appearance of favoritism a former official may have in lobbying his or her former office, and â¦ prevent a former official from financially benefiting from the use of confidential information obtained while working for the Federal Government.\" Conversely, extending the \"cooling off\" period could possibly be seen as an unreasonable restriction on postemployment and \"curtailing an individual's constitutional right of free association.\" Alternatively, Congress could reduce or eliminate the \"cooling off\" period. Having a shorter \"cooling off\" period, or eliminating it altogether, might arguably increase the talent pool available both inside and outside the government. Finally, Congress could codify past executive branch ethics pledges that generally placed additional restrictions on executive branch appointees. Codifying ethics pledge provisions would have the effect of making those changes permanent, and not subject to being revoked by a future executive order. This could allow for permanent changes to existing ethics and conflict-of-interest provisions. Administration and enforcement of revolving door provisions are spread among several entities. For example, each agency is responsible for collecting financial disclosure statements from individual employees and ensuring that they comply with conflict-of-interest provisions, including revolving door restrictions. Potential violations of revolving door laws, however, would likely be prosecuted by the Department of Justice. Congress could amend current law to consolidate the administration and enforcement of conflict of interest and revolving door provisions. Consolidation could provide a single office to help ensure compliance and enforcement of existing laws. Consolidation, however, would potentially add an additional layer to the collection and evaluation documents used to identify potential conflicts-of-interest or revolving door concerns. Since each agency collects financial disclosure forms from its employees, those forms would still need to be transmitted to a central location. Ethics enforcement, including the review of financial disclosure forms for potential conflicts of interest, has historically been conducted at the agency level, as each agency is often in the best position to determine whether a real or perceived conflict exists for its employees. Congress might determine that current revolving door laws and regulations are effective or that the potential costs of changes outweigh potential benefits. Instead of amending existing revolving door provisions, Congress could continue to use existing law and regulations to govern the movement of individuals between the federal government and private sector. Changes to the revolving door could be made on an as-needed basis through modifications to executive branch regulations or executive orders.", "summary": "Individuals may be subject to certain restrictions when leaving the government for private employment or joining the government from the private sector. These restrictions were enacted in response to what is often referred to as the revolving door . Generally, the revolving door is described as the movement of individuals between the public and private sector. Individuals may move because they possess policy and procedural knowledge and have relationships with former colleagues that are useful to prospective employers. Laws attempting to restrict the movement of individuals between the government and the private sector have existed since at least the late 1800s. Today's revolving door laws focus on restricting former government employees' representational activities that attempt to influence federal officials with whom they used to work. Found at 18 U.S.C. Â§207, revolving door laws for executive branch officials include (1) a lifetime ban on \"switching sides\" (e.g., representing a private party on the same \"particular matter\" involving identified parties on which the former executive branch employee had worked while in government); (2) a two-year ban on \"switching sides\" on a broader range of issues; (3) a one-year restriction on assisting others on certain trade and treaty negotiations; (4) a one-year \"cooling off\" period for certain senior officials on lobbying; (5) two-year \"cooling off\" periods for very senior officials from lobbying; and (6) a one-year ban on certain former officials from representing a foreign government or foreign political party. In addition to laws, executive orders have been used to place further restrictions on executive branch officials, including officials entering government. For example, President Trump issued an executive order (E.O. 13770) to lengthen \"cooling off\" periods for certain executive branch appointees both entering and exiting government. To date, much of the empirical work concerning the revolving door has focused on former Members of Congress or congressional staff leaving Capitol Hill, especially those who become lobbyists in their postcongressional careers. This report provides some empirical data about a different aspect of the revolving doorâthe movement into and out of government by executive branch personnel. Using research conducted by the Bush School of Government and Public Service at Texas A&M University's capstone class over the 2017-2018 academic year, this report presents data about the revolving door in the executive branch through the lens of President George W. Bush's and President Barack Obama's Administrations. The analysis includes Cabinet department officials who were listed, for either Administration, in the United States Government Policy and Supporting Positions (the Plum Book ). Through an examination of appointees in President Bush's and President Obama's Administrations, several findings emerge. First, approximately 92% of executive branch officials in the examined dataset were never registered lobbyists, while 8% were registered lobbyists at some point before or after their government service. Second, Cabinet departments differed greatly in the number of officials who were registered lobbyists either before or after their federal service. Although every Cabinet department surveyed had some percentage of officials registered as lobbyists either before or after their government service, the percentage of officials included in the dataset who registered as lobbyists before their government service, after their government service, or both ranged from a high of 18% (Department of Commerce) to a low of 1% (Department of Justice). Third, the data also show that for lobbyists entering government, the percentage of officials in the dataset who had been lobbyists before government serving in the Bush and Obama Administrations ranged from 10% in the Department of Labor to 61% in the Department of Veterans Affairs. The analogous percentages for government employees in the dataset leaving to become lobbyists ranged from 39% in the Department of Veterans Affairs to 82% in the Department of Transportation. Finally, the report identifies several areas for potential congressional consideration. In recent years, several bills have been introduced in Congress to address many of these potential areas. These include options to amend existing \"cooling off\" periods and evaluate the administration and enforcement of revolving door regulations. Alternatively, Congress may choose to maintain current \"cooling off\" periods, administration, and enforcement practices.", "document_type": "crs"}
{"report": "T ax policy is one of several policy tools that can be used for disaster relief. At various points in time, Congress has passed legislation to provide tax relief and to support recovery following disaster incidents. Permanent tax relief provisions may take effect following qualifying disaster events. Targeted, temporary tax relief provisions can be designed to respond to specific disaster events. The Internal Revenue Code (IRC) contains a number of permanent disaster-related tax provisions. These include provisions providing that qualified disaster relief payments and certain insurance payments are excluded from income, and thus not subject to tax. Taxpayers are also able to deduct casualty losses and defer gain on involuntary conversions (an involuntary conversion occurs when property or money is received in payment for destroyed property). The Internal Revenue Service (IRS) can also provide administrative relief to taxpayers affected by disasters by delaying filing and payment deadlines, waiving underpayment of tax penalties, and waiving the 60-day requirement for retirement plan rollovers. For disasters declared after December 20, 2019, the IRS is required to postpone federal tax deadlines for 60 days. The availability of certain tax benefits is triggered by a federal disaster declaration. Before 2017, casualty losses were generally deductible. However, changes made in the 2017 tax revision (commonly referred to as the \"Tax Cuts and Jobs Act\" [TCJA]; P.L. 115-97 ) restrict casualty loss deductions to federally declared disasters. Temporary tax-related disaster relief measures were enacted following a number of major disasters that occurred between 2001 and 2019. The following measures addressed specific disasters: The Job Creation and Worker Assistance Act of 2002 (Job Creation Act; P.L. 107-147 ) responded to the terrorist attacks of September 11, 2001. The Katrina Emergency Tax Relief Act of 2005 (KETRA; P.L. 109-73 ) responded to Hurricane Katrina. The Gulf Opportunity Zone Act of 2005 (GO Zone Act; P.L. 109-135 ) responded to Hurricanes Katrina, Rita, and Wilma. The Food, Conservation, and Energy Act of 2008 (2008 Farm Bill; P.L. 110-246 ) responded to severe storms and tornadoes in Kansas in 2007. The Heartland Disaster Tax Relief Act of 2008, enacted as Title VII of Division C of P.L. 110-343 (the Heartland Act), and other provisions in P.L. 110-343 responded to severe Midwest storms in summer 2008 and Hurricane Ike and provided general disaster relief for events occurring before January 1, 2010. The Disaster Tax Relief and Airport and Airway Extension Act of 2017 (Disaster Tax Relief Act of 2017; P.L. 115-63 ) responded to Hurricanes Harvey, Irma, and Maria. The 2017 tax act ( P.L. 115-97 ; commonly referred to using the title of the bill as passed in the House, the \"Tax Cuts and Jobs Act\") responded to disasters occurring in 2016. The Bipartisan Budget Act of 2018 (BBA18; P.L. 115-123 ) responded to the 2017 California wildfires. The Taxpayer Certainty and Disaster Tax Relief Act of 2019 (Division Q of the Further Consolidated Appropriations Act, 2020; P.L. 116-94 ) provided relief for major disasters that generally occurred in 2018 or 2019. This report provides an overview of permanent and temporary disaster tax provisions that have been enacted in response to specific disaster events. The report also summarizes which types of temporary provisions have been used to support different disaster events. Policy considerations related to business, individual, and charitable disaster relief are also addressed. There are several permanent disaster tax relief provisions. In some cases, these provisions apply to any property that is destroyed or damaged due to casualty or theft. In other cases, relief is limited to property lost as a result of federally declared disasters or for disasters for which the IRS undertakes administrative actions. Additionally, as discussed further below, there are instances where these permanent relief provisions have been temporarily enhanced in response to specific disaster events. Taxpayers may be able to deduct casualty losses resulting from damage to or destruction of personal property (property not connected to a trade or business). For tax years 2018 through 2025, the casualty loss deduction is limited to losses attributable to federally declared disasters. After 2025, under current law, the deduction is to be available to losses arising from any fire, storm, shipwreck, or other casualty or theft. Casualty losses are an itemized deduction. Each casualty is subject to a $100 floor, meaning that only losses in excess of $100 are deductible for each casualty. Additionally, casualty losses are deductible only to the extent that aggregate losses exceed 10% of the taxpayer's adjusted gross income (AGI). Only casualty losses not compensated for by insurance or otherwise can be deducted. An involuntary conversion occurs when property is destroyed, stolen, condemned, or disposed of under threat of condemnation, and the owner of the property receives money or payment for the property, such as an insurance payment. An involuntary conversion can also be viewed as a forced sale of property. The IRC allows taxpayers to defer recognizing a gain on property that is involuntarily converted. The replacement periodâthe time within which a taxpayer must replace converted property to receive complete deferralâis two years (three years for condemned business property). For a taxpayer's principal residence and its contents, the replacement period for an involuntary conversion stemming from a federally declared disaster is four years. Taxpayers whose principal residence or any of its contents are involuntarily converted as a result of a federally declared disaster qualify for additional special rules. First, gain realized from the receipt of insurance proceeds for unscheduled personal property (property in the home that is not listed as being covered under the insurance policy) is not recognized. Second, any other insurance proceeds received for the residence or its contents are treated as a common fund. If the fund is used to purchase property that is similar or related in service or use to the converted residence or its contents, then the owner may elect to recognize gain only to the extent that the common fund exceeds the cost of the replacement property. If a taxpayer's business property is involuntarily converted as a result of a federally declared disaster, then the taxpayer is not required to replace it with property that is similar or related in service to the original property in order to avoid having to recognize gain on the conversion, as long as the replacement property is still held for a type of business purpose. The low-income housing tax credit allows owners of qualified residential rental property to claim a credit over a 10-year period that is based on the costs of constructing, rehabilitating, or acquiring the building attributable to low-income units. Owners may claim a credit based on 130% of the project's costs if the housing is in a low-income or difficult development area. Owners must be allocated this credit by a state. Each state is limited in the amount of credits it may allocate to the greater of $2,000,000 or $1.75 multiplied by the state's population (both figures are adjusted for inflation and are $3,166,875 and $2.75625, respectively, for 2019), with adjustments. Owners of low-income housing tax credit (LIHTC) properties are eligible for relief from certain requirements of the program if the property is located in a major disaster area. Specifically, property owners are provided relief from credit recapture, carryover allocation rules, and income certifications for displaced households temporarily housed in an LIHTC unit. Property owners may also qualify for additional credits for rehabilitation expenditures, and, for severely damaged buildings in the first year of the credit period, the allocation of credits may either be treated as having been returned, or the first year of the credit period can be extended. State LIHTC allocating agencies are eligible for relief from compliance monitoring under the same IRS guidance. Additionally, households are eligible to occupy an LIHTC unit without being subject to the program's income limits if their principal residence was located in a major disaster area. Taxpayers can exclude from income qualified disaster relief and disaster mitigation payments. Excludable relief payments include payments for expenses that are not compensated for by insurance (or otherwise compensated). Excludable relief payments can include personal, family, living, or funeral expenses incurred as a result of the disaster; payments for home repairs or to replace damaged and destroyed contents; payments by a transportation provider for injuries or deaths resulting from a disaster; and payments from governments (or similar entities) for general welfare when disaster relief is warranted. Qualified disaster mitigation payments include amounts paid under the Robert T. Stafford Disaster Relief and Emergency Assistance Act or the National Flood Insurance Act (as in effect on April 15, 2005) for hazard mitigation. Taxpayers whose principal residence is damaged in a disaster (including a fire, storm, or other casualty) can exclude insurance reimbursements for living expenses while temporarily occupying another residence from income. This exclusion also applies to taxpayers who are denied access to their home by government authorities due to the threat of casualty or disaster. The IRS is authorized to postpone any federal tax deadline, including deadlines for filing returns, paying taxes, or claiming refunds, for up to one year for taxpayers affected by federally declared disasters. The IRS may also postpone certain Individual Retirement Account (IRA) deadlines. Specifically, the IRS can extend the 60-day period for plan participants to deposit rollover retirement plan distributions to another qualified plan or IRA. Additionally, the IRS may extend the time for a qualified plan to make a required minimum distribution. The IRS is required to postpone federal tax deadlines for 60 days for disasters declared after December 20, 2019. Taxpayers for whom deadlines are automatically postponed include (1) those whose principal residence is in a disaster area; (2) those whose principal place of business is in a disaster area; (3) individuals who are relief workers assisting in a disaster area; (4) individuals whose tax records are maintained in a disaster area; (5) any individual visiting a disaster area who was killed or injured as a result of the disaster; or (6) spouses filing a joint return with any person described in (1) to (5). The IRS is also authorized to waive underpayment penalties when a casualty, disaster, or other unusual circumstances have made it such that the imposition of a penalty would be against equity and good conscience. At times, Congress has chosen to use tax policy to provide temporary relief and support following disaster incidents. Temporary and event-specific disaster tax policy has been enacted following many major disaster events in recent years. However, temporary or targeted tax relief has not been enacted following all major disaster events. For example, no temporary or targeted disaster tax relief was enacted in response to Hurricane Irene in 2011 or Hurricane Sandy in 2012. The specific tax relief provisions enacted to respond to past disaster events are summarized in Table 3 and Table 4 . The following discussion provides additional information on these provisions. Tax provisions that have been used to respond to disasters most recently are discussed first . The disaster tax relief packages enacted in 2017 to respond to Hurricanes Harvey, Irma, and Maria; in 2018 to respond to the 2017 California wildfires; and in 2019 to respond to disasters that occurred in 2018 and 2019 contained the same five provisions: (1) an enhanced casualty loss deduction; (2) expanded access to retirement plan funds; (3) increased limits on charitable deductions; (4) employee retention tax credits; and (5) EITC/CTC credit computation look-back rules. Enhanced casualty loss deductions were allowed for losses associated with any federally declared disaster occurring in 2016 and 2017, and access to retirement plan funds was enhanced for 2016 disasters. Certain areas of California that were affected by natural disasters in 2017 and 2018 will receive additional LIHTC allocations in 2020. Additionally, disaster tax relief for 2018 and 2019 disasters will also be available in U.S. possessions. An enhanced casualty loss deduction has been made available for losses attributable to certain disasters or for losses occurring during certain periods of time. Most recently, an enhanced casualty loss deduction was provided for 2018 and 2019 disasters in the Taxpayer Certainty and Disaster Tax Relief Act of 2019 (Division Q of P.L. 116-94 ). Before that, an enhanced casualty loss deduction was provided for California wildfires in the Bipartisan Budget Act of 2018 (BBA18; P.L. 115-123 ); any disaster-related casualty loss in calendar years 2016 or 2017 in the 2017 tax act, commonly called the \"Tax Cuts and Jobs Act\" (TCJA; P.L. 115-97 ); and Hurricanes Harvey, Irma, and Maria in the Disaster Tax Relief and Airport and Airway Extension Act of 2017 ( P.L. 115-63 ). The enhancements (1) waive the 10% of AGI floor; (2) increase the $100 floor for each casualty to $500; and (3) allow taxpayers not itemizing deductions to add the deduction to their standard deduction. Generally, casualty loss deductions are claimed in the year of the loss. However, a loss in a federally declared disaster area may be deducted on the prior year's tax return. A similar provision was enacted in response to several previous disasters. The Disaster Tax Relief Act of 2019, BBA18, TCJA, and the Disaster Tax Relief Act of 2017 all provided tax relief relating to retirement plan distributions. First, each act waived the 10% penalty that would otherwise apply on early withdrawals made from a qualifying retirement plan if the individual's principal place of abode was in the disaster area and the individual sustained an economic loss due to the disaster. The distributions were required to occur within a specified time frame, and the maximum amount that could be withdrawn without penalty was $100,000 or 100% of the present value of the plan participant's benefits (but not less than $10,000). Funds could be recontributed to a qualified plan over a three-year period and receive tax-free rollover treatment. Additionally, with respect to any taxable portion of the distribution, the individual could include one-third of such amount in gross income each year over the course of three tax years rather than including the entire amount on the tax return for the year of distribution. The acts increased the amount disaster victims could borrow from their retirement plans without immediate tax consequences. Under current law, the maximum amount that may be borrowed without being treated as a taxable distribution is the lesser of (1) $50,000, reduced by certain outstanding loans, or (2) the greater of $10,000 or 50% of the present value of the employee's vested benefits. For loans made during the applicable period, the acts increased this to the lesser of (1) $100,000, reduced by certain outstanding loans, or (2) the greater of $10,000 or 100% of the present value of the employee's vested benefits, as well as extending certain loan repayment dates by one year. A similar provision was enacted in response to several previous disasters. Taxpayers are generally permitted to deduct contributions made to 501(c)(3) charitable organizations, subject to various limitations. Individuals may not claim a charitable deduction that exceeds 50% (temporarily increased to 60% beginning in 2018 through 2025) of their \"contribution base\" (adjusted gross income with certain adjustments), and corporations may not claim a deduction that exceeds 10% of their taxable income with certain adjustments. Any excess contributions may generally be carried forward for five years. The Disaster Tax Relief Act of 2019, BBA18, and the Disaster Tax Relief Act of 2017 temporarily suspended the 50% and 10% limitations for qualified contributions made for disaster relief efforts. An additional deduction is allowed for amounts by which the taxpayer's charitable contribution base exceeds the amount of all other allowable charitable contributions in the tax year. For individuals, the deduction could not exceed the amount by which the charitable contribution base exceeded other charitable contributions. For individuals, the earlier acts also suspended the overall limitation on itemized deductions for qualified contributions that was in effect through 2017. A similar provision was enacted in response to several previous disasters. The Disaster Tax Relief Act of 2019, BBA18, and the Disaster Tax Relief Act of 2017 provided a temporary retention credit for disaster-damaged businesses that continued to pay wages to their employees who were unable to work after the disaster rendered the business inoperable. Eligible employees were those whose principal place of employment was in the applicable disaster area. The credit equaled 40% of the employee's first $6,000 in wages paid between the date the business became inoperable and the date it resumed significant operations at that location (or the end of the first calendar year, whichever came first). Wages can be those paid even if the employee provides no services for the employer, or for wages paid for services performed at a different location or before significant operations resume. This employee retention may not be for an employee during any period that the employer claims a work opportunity credit for the employee. A similar provision was enacted in response to several previous disasters. The Disaster Tax Relief Act of 2019 and BBA18 permitted individuals affected by 2018 and 2019 disasters or California wildfires in 2017 to elect to use their earned income from the previous year for computing the Child Tax Credit (CTC) and the Earned Income Tax Credit (EITC), instead of their disaster-year income, if previous-year income was greater than disaster-year income. The Disaster Tax Relief Act of 2017 also included this provision for those affected by Hurricanes Harvey, Irma, and Maria. This may have benefited taxpayers whose income was reduced in the year of the disaster. Taxpayers generally qualified only if they lived in the disaster zone or lived in the disaster area and the disaster caused them to be displaced from their principal place of abode. A similar provision was enacted in response to several previous disasters. The Disaster Tax Relief Act of 2019 increased credits available to California in 2020. Specifically, for certain areas of California that were affected by natural disasters in 2017 and 2018, the act increased California's 2020 LIHTC allocation by the lesser of the state's 2020 LIHTC allocations to buildings located in qualified 2017 and 2018 California disaster areas, or 50% of the state's combined 2017 and 2018 total LIHTC allocations. In the past, disaster relief legislation has provided additional LIHTC allocations to disaster-affected areas. The GO Zone Act temporarily increased the credits available to Alabama, Louisiana, and Mississippi for use in the GO Zone by up to $18.00 multiplied by the state's population that was located in the GO Zone prior to the date of Hurricane Katrina. It also temporarily treated the disaster zones as difficult development areas and used an alternate test for determining whether certain GO Zone projects qualified as low-income housing. The Heartland Act permitted affected states to allocate additional amounts for use in the disaster area of up to $8.00 multiplied by the state's disaster area population. Puerto Rico, Guam, the U.S. Virgin Islands, American Samoa, and the Commonwealth of the Northern Mariana Islands are U.S. territories. Each has a local tax system with features that help determine the territory's local public finances. Guam, the U.S. Virgin Islands, and the Northern Mariana Islands are mirror code possessions, meaning these territories use the Internal Revenue Code as their territorial tax law. Puerto Rico and American Samoa are non-mirror code possessions. These two possessions have their own tax laws. The Disaster Tax Relief Act of 2019 requires payments from the U.S. Treasury to possessions for the temporary tax relief provided in the bill. Mirror code possessions will receive an amount equal to the loss in revenue by reason of the temporary disaster-related tax relief provided in the legislation. Non-mirror code possessions may receive a similar payment (a payment equal to the amount of temporary disaster tax relief that would have been provided if a mirror code had been in effect) if the possession has an approved plan for prompt distribution of payments . Provisions used to respond to 2016, 2017, 2018, and 2019 disasters were also used to respond to some disasters before 2010. Additionally, a number of other temporary tax provisions were used to respond to these pre-2010 disasters. The first time a temporary disaster tax relief package was enacted was in response to the September 11 terrorist attacks. The following sections summarize the various provisions included in temporary disaster tax relief legislation before 2010. In general, capital expenditures must be added to a property's basis rather than being expensed (i.e., deducted in the current year). IRC Section 179 provides an exception so that a business may expense the costs of certain property in the year it is placed in service. After 2018, the maximum expensing allowance is $1 million, with an investment limitation of $2.5 million (both amounts are adjusted for inflation). In the past, these thresholds have been lower. For example, in 2007, the maximum expensing allowance under Section 179 was $125,000, and the deduction decreased dollar-for-dollar as the total cost of all property the business placed in service during the year exceeded $500,000. The Heartland Act increased the Section 179 limitations by up to $100,000 and $600,000 for qualified disaster area property for federally declared disasters occurring prior to January 1, 2010. Increased expensing allowances were enacted in response to several disasters before 2007 as well. The Heartland Act also added IRC Section 198A, which permitted full expensing (subject to depreciation recapture) of qualified expenditures for the abatement or control of hazardous substances released on account of a federally declared disaster, the removal of debris or the demolition of structures on business-related real property damaged by such a disaster, and the repair of business-related property damaged by such a disaster. This provision applied only to federally declared disasters occurring prior to January 1, 2010. Under current law, a business's net operating loss (NOL) can be carried forward indefinitely. Additionally, NOLs are limited to 80% of taxable income. There is no carryback of NOLs. This treatment was enacted in the 2017 tax act ( P.L. 115-97 ). Before 2018, in general, a taxpayer's net operating loss (NOL) could be carried back and deducted in the two tax years before the NOL year, and then carried forward for up to 20 years after the NOL year. Additionally, before 2018, the carryback was extended to three years for individuals who had a loss of property arising from a casualty or theft. A three-year period also applied for small businesses and farmers for NOLs attributable to federally declared disasters. The Heartland Act provided for a five-year carryback period for qualified losses from any federally declared disaster occurring prior to January 1, 2010. For such disasters, it also suspended the alternative minimum tax (AMT) provision that generally limits NOL deductions to 90% of alternative minimum taxable income. The corporate AMT was repealed in the 2017 tax act. For eligible property acquired and placed in service after September 27, 2017, and before January 1, 2023, businesses may claim a 100% expensing (or bonus depreciation) allowance under Section 168(k). Like expensing limitations, the bonus depreciation allowance has changed over time. The Heartland Act provided a 50% bonus depreciation provision for qualified disaster assistance property from a federally declared disaster occurring prior to January 1, 2010. However, since other legislation provided 50% bonus depreciation during this time period, the provision was probably not meaningful. With 100% bonus depreciation in effect through 2022, providing additional bonus depreciation is not currently a policy option. Mortgage revenue bonds are tax-exempt bonds used to finance below-market-rate mortgages for low- and moderate-income homebuyers. In general, the homebuyers must not have owned a residence for the past three years, and the houses' costs may not exceed 90% of the average purchase price for the area. However, for areas that are low income or in chronic economic distress, the three-year restriction does not apply, and the purchase price limitation is increased to 110%. For individuals whose homes were declared unsafe or ordered to be demolished or relocated due to a federally declared disaster occurring prior to January 1, 2010, the Heartland Act waived the three-year restriction and increased the purchase price limitation from 90% to 110%. It also permitted individuals whose homes were damaged by the disaster to treat the amount of owner financing provided for home repair and construction as a qualified rehabilitation loan, limited to $150,000 (the amount is generally limited to $15,000), which had the effect of waiving the three-year requirement for such financing. The GO Zone Act and KETRA contained similar provisions. In the Heartland Act, the maximum amount of bonds each state could issue was $1,000 multiplied by that state's population in the disaster area, and need-based prioritization for state allocations was established. The GO Zone Act also expanded qualified private activity bond issuances for mortgage revenue bonds in disaster areas. The Go Zone Act added $2,500 per person in the federally declared Katrina disaster areas in which the residents qualify for individual and public assistance. The increased capacity added approximately $2.2 billion for Alabama, $7.8 billion for Louisiana, and $4.8 billion for Mississippi in aggregate bonds over the subsequent five years through 2010. Capital expenditures must generally be added to the property's basis rather than being expensed (i.e., deducted in the current year). IRC Section 198 provided an exception by allowing taxpayers to expense any qualifying environmental remediation costs paid or incurred prior to January 1, 2012, for the abatement or control of hazardous substances at a qualified contaminated site. Unlike the other provisions discussed in this report, Section 198 is not limited to federally declared disasters or specific disasters. The provision was enacted as a temporary one in the Taxpayer Relief Act of 1997 ( P.L. 105-34 ) and was extended a number of times before expiring at the end of 2011. The Heartland Act was among those laws that temporarily extended Section 198. The GO Zone Act had also extended the provision, but only for those costs for contaminated sites in the GO Zone, and treated petroleum products as a hazardous substance for the purposes of environmental remediation. Before 2005, donors of food inventory that were not C corporations could only claim a charitable deduction equal to their basis in the inventory (typically, its cost). C corporations were allowed an enhanced deduction, which was the lesser of (1) the basis plus 50% of the property's appreciated value, or (2) two times basis. KETRA provided special rules that allowed all donors of wholesome food inventory to benefit from the enhanced deduction and allowed C corporations to claim an enhanced deduction for donations of book inventory to public schools. Neither provision was limited to donations related to the hurricane, but both were originally set to expire on December 31, 2005. The provisions have been extended several times since then, including by the Heartland Act (as part of its tax extenders package, rather than its disaster relief provisions). The enhanced deduction for charitable contributions of food inventory was made permanent in the Protecting Americans from Tax Hikes Act of 2015, enacted as Division Q in the Consolidated Appropriations Act, 2016 ( P.L. 114-113 ). The enhanced deduction for book inventory expired as scheduled at the end of 2011. In addition to the general treatment of involuntary conversions (discussed above), the Job Creation Act, KETRA, the 2008 Farm Bill, and the Heartland Act increased the two-year time period to purchase the replacement property to five years for property in the applicable disaster area so long as substantially all of the use of the replacement property occurred in such area. When all or part of a debt is forgiven, the amount of the cancellation is ordinarily included in the income of the taxpayer receiving the benefit of the discharge. However, there are several exceptions to this general rule. For example, no amount of the discharge is included in income if the cancellation is intended to be a gift or is from the discharge of student loans for the performance of qualifying services. The Mortgage Forgiveness Debt Relief Act of 2007 ( P.L. 110-142 ) temporarily excluded qualified canceled mortgage debt income that is associated with a primary residence from taxation (this provision was extended multiple times, and expired at the end of 2017). There are also certain situations in which the taxpayer may defer taxation, with the possibility of permanent exclusion, on income from the discharge of indebtedness, such as if discharge occurs when the debtor is in Title 11 bankruptcy proceedings or legally insolvent. Both KETRA and the Heartland Act included provisions that allowed victims to exclude nonbusiness debt forgiveness from income in certain conditions. Victims of Hurricane Katrina were allowed to exclude nonbusiness debt that was forgiven by a governmental agency or certain financial institutions if the discharge occurred after August 24, 2005, and before January 1, 2007. Individuals were eligible for this benefit if (1) their principal place of abode was in the core disaster area, or (2) it was in the Hurricane Katrina disaster area and they suffered an economic loss due to the hurricane. Individuals with certain tax attributes (such as basis) were required to reduce them by the amount excluded from income, which has the effect of deferring (rather than permanently eliminating) the tax on the cancelled debt. For victims with a principal place of abode in a Midwestern disaster area, the Heartland Act provided similar relief. However, if that home was in an area determined by the President to warrant only public assistance, the individual also had to have suffered an economic loss due to the severe weather. Both the GO Zone Act and the Heartland Act excluded the value of certain employer-provided housing, limited to $600 per month, from the employee's income and allowed the employer to claim a credit equal to 30% of that amount. Among other requirements, the employee must have had a principal residence in the applicable disaster area and have performed substantially all employment services for that employer in that area. The employer must have had a trade or business located within the applicable disaster area. Both the GO Zone Act and the Heartland Act temporarily allowed affected states to issue tax-exempt bonds to finance (1) qualified activities involving residential rental projects, nonresidential real property, and public utility property located in the disaster area; and (2) below-market rate mortgages for low- and moderate-income homebuyers. Under the GO Zone Act, the maximum amount of bonds that each state could issue was $2,500 multiplied by that state's population located in the GO Zone as determined prior to the date of Hurricane Katrina. Under the Heartland Act, the maximum amount of bonds each state could issue was capped at $1,000 multiplied by that state's population in the disaster area, and the act expressly stated that the bonds would have to be designated by the appropriate state authority on the basis of providing assistance to where it was most needed. The Job Creation Act, meanwhile, allowed New York to issue up to $8 billion (divided equally between the state and New York City) in tax-exempt bonds to finance qualified activities involving residential rental projects, nonresidential real property, and public utility property located in the disaster zone. The Job Creation Act and the GO Zone Act also allowed one additional advance refunding of qualifying bonds that were issued by those states. The GO Zone Act, the 2008 Farm Bill, and the Heartland Act allowed operators of low-income residential rental projects financed by IRC Section 142(d) bonds to rely on the representations of displaced individuals regarding their income qualifications so long as the tenancy began within six months of the displacement. Both the GO Zone Act and the Heartland Act permitted affected states to issue tax credit bonds to pay the principal, interest, or premiums on qualified governmental bonds or to make loans to political subdivisions to make such payments. Bondholders may claim a credit based on the product of a credit rate and the bonds' outstanding face amount. The bonds were required to be issued within a certain time period and could not have a maturity date beyond two years, among other requirements. Further, each state was capped in the amount of bonds it could issueâfor example, under the Heartland Act, the maximum amount of bonds that could be issued by states with disaster area populations of at least 2 million was $100 million; the cap was $50 million for states with disaster area populations between 1 million and 2 million; and the other states could not issue any bonds. Bonds could not be used for certain activities. Both KETRA and the Heartland Act provided tax relief to those who provided free housing to those displaced by the storms. Individuals could claim additional personal exemptions of $500 each for up to four displaced people whom they housed for at least 60 consecutive days. These exemptions could be claimed in both the year of the disaster and the next year; however, no person could qualify the taxpayer for the exemption in both years. Among other requirements, the displaced person must have had a principal place of abode in the disaster area; if the home was not in the core disaster area, then the person must have been displaced due to either storm damage to the home or evacuation caused by the storm. Generally, individuals who use their personal vehicles for charitable purposes may claim a deduction based on the number of miles driven. The amount is set by statute at 14 cents per mile. KETRA and the Heartland Act each temporarily increased the charitable mileage rate to 70% of the standard business mileage rate if the vehicle was used for hurricane or Midwest disaster relief. The standard business mileage rate is periodically set by the IRS. In 2019, the standard mileage rate is 56 cents per mile. Additionally, both acts provided a temporary exclusion from a charitable volunteer's gross income for any qualifying mileage reimbursements received from the charity for the operating expenses of a volunteer's passenger automobile, when used for disaster relief. KETRA, the GO Zone Act, and the Heartland Act all contained similar provisions that authorized the Treasury Secretary to make adjustments in the application of the tax laws for the tax years of the disaster and the immediate subsequent year so that temporary relocations due to the disaster did not cause taxpayers to lose any deduction or credit or to experience a change of filing status. Individuals with eligible tuition and related expenses may claim certain higher education tax credits. Under the law existing when KETRA, the GO Zone Act, and the Heartland Act were enacted, the Hope credit was 100% of the first $1,000 of eligible expenses plus 50% of the next $1,000 of eligible expenses, both adjusted for inflation. The maximum Lifetime Learning credit is and was 20% of up to $10,000 of eligible expenses. Beginning in 2009, the partially refundable American Opportunity Tax Credit (AOTC) temporarily increased the Hope credit, allowing 100% of eligible expenses up to $2,000 plus 25% of the next $2,000 of eligible expenses. The Protecting Americans from Tax Hikes (PATH) Act (Division Q of P.L. 114-113 ) made the AOTC permanent, effectively eliminating the Hope credit. For individuals attending school in the GO Zone for 2005 and 2006, the GO Zone Act allowed certain nontuition expenses (e.g., books, equipment, and room and board) to qualify for the Hope and Lifetime Learning credits; doubled the $1,000 limitations in the Hope credit to $2,000; and increased the 20% limitation in the Lifetime Learning credit to 40%. The Heartland Act provided similar rules for students attending school in a Midwestern disaster area during 2008 or 2009. However, to take advantage of this provision for 2009, taxpayers were required to waive application of the AOTC provisions. Taxpayers may claim a credit equal to 10% of the qualifying expenditures to rehabilitate a qualified building or 20% of such expenditures for a certified historic structure. Both the GO Zone Act and the Heartland Act temporarily increased these percentages to 13% and 26%, respectively, for rehabilitating qualifying buildings and structures damaged by the applicable disasters. Under IRC Section 172, certain net operating losses, called specified liability losses, may be carried back for 10 years. Under IRC Section 165(i), certain disaster losses may be deducted in the year prior to the disaster. The GO Zone Act treated public utility casualty losses as a Section 172 loss. The GO Zone Act and the 2008 Farm Bill allowed public utility disaster losses to be deducted in the fifth taxable year preceding the disaster. The GO Zone included provisions to encourage the Treasury Secretary to designate at least one series of bonds as Gulf Coast Recovery Bonds. The Treasury designated Series I inflation-indexed savings bonds purchased through financial institutions as \"Gulf Coast Recovery Bonds.\" Under the new markets tax credit, taxpayers are allocated a credit for investments made in qualified community development entities. The credit is claimed over a period of seven years and equals the amount of the investment multiplied by a percentage: 5% for the first three years and 6% for the next four years. The credit was capped at $2 billion for 2005 and $3.5 billion for 2006 and 2007. The GO Zone Act increased the cap by $300 million for 2005 and 2006 and by $400 million for 2007, and it allocated these amounts to entities making low-income community investments in the GO Zone. Under IRC Section 194, taxpayers may expense up to $10,000 of qualifying reforestation expenditures. Under IRC Section 172, the general rule is that taxpayers may carry net operating losses back for two years. The GO Zone Act created two special rules for timber producers with less than 501 acres of timber property: it (1) increased the Section 194 limit by up to $10,000 for expenditures made for qualified timber property in the applicable disaster zones; and (2) increased the Section 172 carry back period to five years for certain losses attributable to timber property in those zones. Generally, businesses that hire individuals from groups with high unemployment rates or special employment needs, such as high-risk youths and veterans, may claim the work opportunity tax credit. The credit may be claimed for the wages of up to $6,000 that were paid during the employee's first year. For an employee who worked at least 400 hours, the credit equals 40% of his or her wagesâthus, the maximum credit is $2,400. KETRA allowed businesses to claim the work opportunity credit on wages paid to certain employees hired after Hurricane Katrina. Eligible employees were those who had a principal place of abode in the core disaster area and either (1) were hired during the two-year period beginning August 28, 2005, for a position in the area, or (2) were displaced by the hurricane and hired after August 27, 2005, and before January 1, 2006. Congress later extended the WOTC's expiration from August 28, 2007, to August 28, 2009, for firms who hire \"Hurricane Katrina employees\" to work in the core disaster area (see the Tax Extenders and Alternative Minimum Tax Relief Act of 2008 in P.L. 110-343 ). The Job Creation Act provided similar treatment for New York Liberty Zone business employees and certain employees outside the zone. For purposes of depreciation, the Job Creation Act generally shortened the recovery period for leasehold improvement property to five years for qualifying property located in the New York disaster zone. Tax policy for disaster relief might be motivated by multiple objectives. One objective could be distributional or relief-oriented. Tax policy could be designed to provide additional resources to businesses or individuals who experienced an uncompensated disaster loss. This relief could be targeted toward the low-income, although there are limitations when using tax policy to address low-income individuals and businesses. Tax policy can also be used to encourage investment in disaster-affected areas. Absent government intervention, some level of private rebuilding will occur. A policy question, however, is whether this private building is sufficient, or if there are other barriers to investment in the disaster-affected region that call for government intervention. When investment subsidies are provided, there is the question of how much new investment is supported relative to how much investment is subsidized that would have occurred absent the subsidy. There are also challenges associated with identifying the disaster area for the purposes of providing tax relief. In some cases, relief has been provided to a certain geographic area. In other cases, relief has been tied to a federal disaster declaration or provided only when individual assistance or individual and public assistance is provided. Narrowly defined geographic areas can limit tax benefits to those most likely to be harmed by the disaster, but can exclude some disaster victims. The following sections discuss considerations by examining instances in which disaster relief was provided through the tax code for businesses and individuals, as well as through tax policy designed to support disaster-related charitable giving. For businesses, hurricanes like Katrina, Maria, Irma, and Harvey caused unprecedented property and earnings losses. Employee displacement can create labor market challenges that persist over time. Further, longer-term supply chain disruptions can make it difficult for businesses to resume operations after initial clean-up efforts are complete. In the past, tax policy has been used to reduce the cost of business investment in cleanup and repairs. Bonus depreciation and enhanced expensing were used to provide disaster tax relief to businesses following several disasters before 2010. However, at present, with bonus depreciation at 100% (100% bonus depreciation is expensing), this policy tool is not readily available. Expensing allowances are higher than they have been historically, but could, if deemed necessary and under certain circumstances, be expanded further to provide additional expensing allowances in disaster areas. For instance, this could be a policy option should bonus depreciation be set at a rate of less than 100%, or eliminated altogether. An expansion to expensing for disaster-relief purposes could be accomplished through raising the expensing limit; expensing is currently allowed for investments up to $1,040,000. Expansions to net operating loss (NOL) carrybacks and lengthening of replacement periods for involuntary conversions have also been used to provide tax relief following past disasters. Under current law, there is no carryback of NOLs. Allowing an NOL carryback for disaster-related losses could provide relief for taxpayers experiencing losses who had positive tax liability in a recent tax year. Expanding the replacement period for involuntary conversions could provide more flexibility to taxpayers looking to rebuild or reestablish businesses in the disaster area. Tax policy can also be used to encourage businesses to provide employment and housing following disaster events. Employee retention credits encourage employers to continue paying employees in circumstances where the disaster affects business operations. Targeted hiring credits, such as the WOTC, can be used to provide an incentive to hire workers who were displaced by a disaster. With respect to housing, tax policy has been used to encourage employers to provide housing to their employees, as well as to support more low-income housing development in disaster-affected areas. Disaster recovery and rebuilding has also been supported following certain disasters by providing targeted tax benefits to disaster-impacted geographic zones. The New York Liberty Zone was established following the September 11 terrorist attacks. The Gulf Opportunity Zone was established following the 2005 Gulf Coast hurricanes. These zones can receive additional allocations of allocated tax credits, such as the NMTC or the LIHTC. Past disaster tax relief has also provided additional allocations of tax-exempt or tax-credit bonds in disaster-affected zones. Some have questioned the effectiveness of tax-exempt private activity bonds as a tool for disaster relief, noting that in the case of the GO Zone, areas with the most damage were less likely to have access to bonds to help finance recovery and rebuilding. Should special bond allocations be deployed in response to future disasters, there may be ways to improve the bond allocation process to better target small businesses or heavily impacted areas. Other provisions might be designed to support specific industries or sectors affected by the disaster. For example, tax provisions for small timber producers and public utilities have been included in past disaster tax legislation. Narrowly targeted tax benefits, however, might leave out disaster-affected taxpayers that suffered losses yet have business activities that differ from the sector targeted for relief. One consideration related to tax relief provisions for business is timing. The tax code is not well-suited to provide capital for cleanup, rebuilding, or recovery in the short term. Reduced tax liabilities provide a future financial benefit, but past disaster tax relief has not been designed to provide immediate access to capital that may be needed following a disaster. Another consideration related to business disaster tax relief is the potential scope of the benefit. For many business-related provisions, the benefit is limited to businesses with positive taxable income. Accelerated cost recovery, special deductions, and nonrefundable tax credits provide limited benefits to businesses with little profit or no tax liability. Businesses with limited current income or tax liability may, however, benefit from expanded NOL carrybacks. One policy question is whether certain disaster-related tax benefits are necessary or effective in achieving intended policy goals, given that much of the tax relief accrues to taxpayers who would have rebuilt without incentives. This critique raises the question of whether disaster-related tax benefits are intended to encourage certain behavior (rebuilding, for example), or primarily provide financial relief for businesses affected by the disaster. Tax provisions might be used to provide financial relief to individuals who have lost property, income, or both following a disaster. To provide relief for taxpayers experiencing a loss of property, Congress has enacted legislation following certain past disasters to expand the deduction for casualty losses (beyond what is available under the permanent provision). Relief has been provided to taxpayers experiencing a loss of income by providing enhanced access to retirement plan funds or by using look-back rules for computing refundable tax credits. Several past disaster relief packages have also included provisions to support providing housing to affected individuals. There are limits to using tax policy to provide disaster relief to low- and moderate-income taxpayers. Many low- and moderate-income individuals have zero individual income tax liability. For these individuals, additional exclusions from income or deductions will provide little or no relief, as there is no tax burden to eliminate. Further, low- and moderate-income individuals may have limited wealth. Tax provisions designed to enhance access to certain forms of savings (e.g., retirement accounts) also provide limited relief to the least well-off. Allowing refundable tax creditsâthe EITC and CTCâto be computed using the previous year's income is one form of individual disaster tax relief that is targeted at low- and moderate-income taxpayers. Tax policy is generally better suited for providing relief to taxpayers higher in the income distribution. These taxpayers tend to have a positive tax liability that can be offset with various forms of tax reductions. Additionally, taxpayers in higher tax brackets receive a larger tax benefit from additional deductions (a deduction of $100 is worth $35 to someone in the 35% tax bracket, but worth $12 to someone in the 12% tax bracket, for example). Empirical evidence suggests access to savings via retirement account withdrawals helped some taxpayers replace lost income or destroyed assets following Hurricane Katrina. Thus, policies that reduce penalties associated with early withdrawals from retirement accounts or otherwise enhance access to this form of savings is one option for providing relief to taxpayers that have such resources to draw on. There are also timing concerns in using the tax code to provide individuals relief following a disaster. As was noted for businesses, the tax code does not lend itself to providing immediate relief. Another question regarding individual disaster tax relief is whether relief should be contingent on an individual having suffered losses due to a federally declared disaster, as opposed to some other disaster event. Through 2025, the casualty loss deduction is limited to federally declared disasters. However, after 2025, individuals may be able to claim a deduction for casualty losses arising from a fire, storm, shipwreck, or other casualty, regardless of whether the casualty was caused by an event with a federal disaster declaration. Is there something about having one's personal property destroyed in a federally declared disaster that merits special relief, different from what is provided when property is destroyed from a disaster without a federal disaster declaration? As it stands, disaster tax policy is inconsistently applied across different types of disaster events (e.g., federally declared versus non-federally declared disasters; disaster areas receiving or not receiving individual or individual and public assistance). Disaster tax policy can also be designed to prevent taxpayers from facing a tax burden triggered by receipt of disaster relief. The permanent exclusions from income for disaster relief payments and insurance living expense payments clarify that these items are excluded from income for income tax purposes, and thus do not result in additional tax liability. In response to past disasters, temporary provisions have provided that certain forgiven debt would not be treated as income for income tax purposes. The charitable sector supports a wide range of activities associated with disaster relief and longer-term recovery. At times, Congress has acted following a disaster to provide additional tax incentives to support charitable disaster-related activities. To encourage charitable giving in the wake of a disaster, Congress has, in the past, relaxed certain income limitations associated with the deduction for charitable giving. The amount individuals can deduct for charitable use of a vehicle (the charitable mileage rate) was also temporarily increased in response to certain past disasters. Qualifying mileage reimbursements have also been allowed to be excluded from income. Other tax incentives enacted in response to disasters have encouraged particular types of charitable giving. Provisions designed to encourage charitable contributions of food inventory and books were enacted following Hurricane Katrina. The enhanced deduction for contributions of food inventory was later made permanent, while the enhanced deduction for book inventory expired in 2011. In some instances, Congress has relaxed charitable giving deadlines to allow contributions for disaster relief made early in the year to be deducted on the previous year's tax return. A key question regarding enhanced deductions for charitable giving is how much additional giving results from the policy change. Is it the tax benefits that drive giving, or individuals' desire to aid those affected by the storm? Another question to consider is whether individuals shift their giving to disaster-related causes at the expense of other charitable activities (i.e., does disaster-related giving \"crowd out\" other forms of charitable giving?). When evaluating enhanced charitable giving incentives following a disaster, another question is how much giving is for disaster-related charitable activities, as opposed to other activities or uses. Charitable giving incentives are often applied broadly, and it can be difficult to target them to a particular event or geographic region. Another consideration is who benefits from an enhanced charitable giving deduction. On the individual side, the value of the tax benefit of the charitable deduction is highly concentrated among high-income taxpayers. Since 2001, a variety of temporary tax policies have been used to respond to various disaster events. Following some disaster events, tax relief packages providing numerous types of tax relief were passed by Congress and became law. Following other disaster events, no temporary disaster relief was enacted. Certain permanent tax provisions provide tax relief to all affected by qualifying disasters, even in cases where specific or targeted disaster tax relief is not enacted. Disasters are inevitable. Each disaster is also unique, with damages affecting individuals, businesses, industries, and other economic sectors differently. This poses a challenge for policymakers in determining what type of disaster relief can provide efficient and effective one-size-fits-all relief. Some disasters may require a targeted and tailored policy response. Some disasters are especially catastrophic events that fundamentally change the economy of the affected region. If disasters cause economic hardships across the region, disaster relief might include broader economic development measures, ones that go beyond compensating individuals or businesses for lost income or property. Disaster tax relief as presently applied combines a base set of permanent disaster tax provisions, with additional provisions or relief provided for certain disaster events, targeted disaster zones, or time periods. Conceptually, this provides policymakers with flexibility regarding relief provided after certain disaster events. A question to consider is whether the current balance of permanent and temporary disaster tax relief provides the desired policy response efficiently and effectively. If temporary tax relief cannot be relied upon to deliver relief that is efficient and effective, one option could be to expand the set of permanent disaster-triggered tax relief provisions. Tax relief that is provided broadly, however, may not be particularly efficient, as it is not designed to provide the specific type of relief needed in the wake of a certain disaster event.", "summary": "The Internal Revenue Code (IRC) contains a number of provisions intended to provide disaster relief. Following certain disasters, Congress has passed legislation with temporary and targeted tax relief policies. At other times, Congress has passed legislation providing tax relief to those affected by all federally declared major disasters (disasters with Stafford Act declarations) occurring during a set time period. In addition, several disaster tax relief provisions are permanent features of the IRC. This report discusses the following permanent provisions: disaster casualty loss deductions; deferral of gain from involuntary conversions of property destroyed by a disaster; disaster relief for owners of low-income housing tax credit properties; income exclusion for disaster relief payments to individuals; income exclusion for certain insurance living expense payments; and IRS administrative relief in the form of extended deadlines and waiving of certain penalties. Congress began enacting tax legislation generally intended to assist victims of specific disasters in 2002 in the wake of the September 11, 2001, terrorist attacks. Laws targeting specific disasters contained provisions that were temporary in nature. Three acts, howeverâthe Heartland Disaster Tax Relief Act of 2008 ( P.L. 110-343 ), the 2017 tax act ( P.L. 115-97 ), and the Taxpayer Certainty and Disaster Tax Relief Act of 2019 ( P.L. 116-94 )âprovided more general, but still temporary, relief for any federally declared disaster occurring during designated time periods. The acts providing temporary relief include the following: The Job Creation and Worker Assistance Act of 2002 ( P.L. 107-147 ), which provided tax benefits for areas of New York City damaged by the terrorist attacks of September 11, 2001; The Katrina Emergency Tax Relief Act of 2005 (KETRA; P.L. 109-73 ), which provided tax relief to assist the victims of Hurricane Katrina in 2005; The Gulf Opportunity Zone (GO Zone) Act of 2005 ( P.L. 109-135 ), which provided tax relief to those affected by Hurricanes Katrina, Rita, and Wilma in 2005; The Food, Conservation, and Energy Act of 2008 (2008 Farm Bill; P.L. 110-234 ), which provided tax relief intended to assist those affected by severe storms and tornadoes in Kansas in 2007; The Heartland Disaster Tax Relief Act of 2008 ( P.L. 110-343 ), which provided tax relief to assist recovery from both the severe weather that affected the Midwest during summer 2008 and Hurricane Ike (this act also included general disaster tax relief provisions that applied to federally declared disasters occurring before January 1, 2010); The Disaster Tax Relief and Airport and Airway Extension Act of 2017 ( P.L. 115-63 ), which provided tax relief to those affected by Hurricanes Harvey, Irma, and Maria in 2017; The 2017 tax act ( P.L. 115-97 , commonly referred to using the title of the bill as passed in the House, the \"Tax Cuts and Jobs Act\") responded to major disasters occurring in 2016; The Bipartisan Budget Act of 2018 (BBA18; P.L. 115-123 ), which provided relief to those affected by the 2017 California wildfires; and The Taxpayer Certainty and Disaster Tax Relief Act of 2019 (Division Q of the Further Consolidated Appropriations Act, 2020; P.L. 116-94 ), which provided relief for major disasters generally occurring in 2018 and 2019. This report provides a basic overview of existing, permanent disaster tax provisions, as well as past, targeted legislative responses to specific disasters. The report also includes a discussion of economic and policy considerations related to providing disaster tax relief to individuals and businesses, and encouraging charitable giving to support disaster relief.", "document_type": "crs"}
{"report": "Driving a commercial vehicle is one of the most dangerous occupations in the country. In 2018, 28.3 out of 100,000 full-time equivalent truck transportation workers died on the job, eight times the average rate across all occupations. Commercial truck driving is also dangerous to others; in 2017, 3,920 people not engaged in trucking were killed in crashes involving trucks, in addition to 841 truck occupants. Nor has trucking become safer in recent years: the fatality rate for occupants of large trucks, including both drivers and passengers, rose from 0.17 per 100 million vehicle miles traveled in 2009 to 0.28 in 2017. In that same year, 232 buses were involved in fatal accidents, including 13 intercity buses. It has been estimated that up to 20% of crashes involving large truck or buses involve fatigued drivers. Long driving hours, irregular work schedules, and variable sleeping circumstances make driver fatigue a significant concern in the commercial truck and bus industries. Truck and bus drivers are typically driving within a few feet of other drivers whose actions are not entirely predictable, so the commercial drivers need a generally high level of alertness. Automated driver-assistance safety systems (e.g., lane departure warning, automatic emergency braking) are now becoming available for commercial vehicles to help commercial drivers deal with traffic interactions, but such systems are not yet widespread. Congress has legislated limits on the amount of time that commercial drivers are allowed to drive in a day and in a week since 1935. These regulations are known as the HOS rule. An estimated 3.42 million drivers and 540,000 carriers are subject to the HOS rule. In 2012, concerned about the impact of fatigue among truck and bus drivers on highway safety, Congress mandated that most commercial drivers of trucks and buses have their hours of service recorded by electronic logging devices (ELDs). This mandate went into effect in December 2017. This report reviews the ELD rule and the HOS rule that motivated it. The term \"driver,\" as used in the report, refers to commercial drivers of trucks and buses, unless otherwise indicated. The commercial motor vehicle industry operates 24 hours a day, 7 days a week. In addition, there are typically economic incentives for both carriers and individual commercial drivers to have drivers work well beyond a standard 40-hour workweek. As a result, managing fatigue among truck and bus drivers is a challenge. Fatigue includes a general lack of alertness and deterioration in mental and physical performance. Fatigue can increase a driver's risk of poor performance or impaired decision-making, leading to a crash or other incident harmful to the driver and to others. Studies have found that aviation, railroad, and public transportation workers face similar risks from fatigue. The National Transportation Safety Board has included managing fatigue among transportation workers on its \"most wanted\" list of safety improvements since 1990. A major complication in measuring the extent of fatigue-related crashes, as well as in managing fatigue among drivers, is that there is no convenient marker for measuring fatigue, akin to a blood-alcohol content level for measuring intoxication. In the absence of such a marker, it is difficult to determine the contribution of fatigue to crashes, with the result that the role of fatigue in crashes is likely underestimated. A National Academies of Sciences, Engineering, and Medicine panel concluded that, in spite of a number of studies that have produced various estimates of the proportion of crashes that can be attributed to driver fatigue, there is not enough information to support a reliable estimate. In any given case, it may be difficult to determine whether fatigue played a role in a commercial motor vehicle crash incident. The prevailing theory of crash investigators is that a crash is usually the result of a number of factors, not a single factor. In the case of commercial motor vehicle crashes, crash investigators, lacking a biological marker for fatigue that they can measure and typically not trained to recognize evidence of fatigue after the fact, are reluctant to list fatigue as a factor on crash reports, because they may be expected to explain their determination in court. While sleep is generally an antidote to fatigue, sleep is not always easy to come by and is not always restorative. Federal regulations can limit the number of hours drivers spend on duty and operating vehicles, but the regulations cannot mandate that those drivers rest when off duty; that is the responsibility of the driver. It is a common experience for a person to feel tired and attempt to fall asleep, and yet to lie awake, impatiently awaiting the onset of sleep. Moreover, medical conditions such as obstructive sleep apnea can result in people getting what appear to be adequate hours of sleep and yet still being subject to fatigue because their sleep is not restorative. Sleep apnea is widespread among commercial truck drivers. Many other factors contribute to the experience of, and severity of, fatigue. A study of fatigue among airline crew members, which is also relevant to drivers, identifies the following factors: the time of day. All else being equal, fatigue is most likely to occur and to be most severe between 2 a.m. and 6 a.m., due to circadian rhythms. the length of time a person has been working without a break. The longer the period, the more likely the worker is to experience fatigue. the length of time a person has been awake is directly related to the likelihood he or she will experience fatigue. the amount of sleep in the previous 24-hour period. The less sleep, the more likely the person is to experience fatigue. the amount of sleep a person has had in the previous several days. Getting insufficient sleep for several days has cumulative effects. variation in individuals' responses to these factors. Translated into the nature of a driver's work, these factors appear in such forms as long periods of wakefulness, long driving hours, inadequate sleep, erratic work schedules, disruption of circadian cycles, fatigue from work-related non-driving tasks (such as helping to load and unload the vehicle), difficulties in finding a safe place to rest when it's time to stop, and insufficient time to recover before starting the next work period. Other factors that have been cited as contributing to fatigue include prolonged experience of whole body vibration, noise, carbon monoxide exposure, extreme temperatures, and working in a high-pressure situation with little autonomy and control over one's time. Conversely, studies have identified safety practices that may help to offset fatigue-inducing factors associated with commercial driving, such as establishing a strong safety culture within a truck or bus firm, having dispatchers take account of fatigue when setting schedules, and providing assistance with fatiguing behaviors such as loading and unloading the truck. Directly studying the elements that affect driver fatigue is difficult, because individuals' reports of the quality and duration of their sleep are not very reliable, even in the absence of incentives to slant the reports. Techniques to directly measure sleep quality and duration are invasive and, at the scale needed for reliable studies, expensive. To address these difficulties, one approach taken by fatigue researchers has been to develop biomathematical models to estimate alertness based on sleep-wake schedules and the timing of work schedules. Such models can be used to improve safety and reduce risk of fatigue by comparing different work-shift or work-rest schedules. Such models are of interest to the Department of Defense as well as the Department of Transportation (DOT). Currently, the Federal Aviation Administration uses a biomathematical model as part of its process for evaluating fatigue risk management system applications from airlines. While such models can be useful for developing general work-rest schedules, current models do not account for individual differences in response to factors that lead to fatigue. A National Academies of Sciences, Engineering, and Medicine report on fatigue among truck drivers recommends caution in using biomathematical models to deal with irregular work schedules. Also, given the diversity of driver groups, the use of such models and other approaches to address fatigue is inconsistent. Drivers employed by carriers with large fleets of trucks may have more flexibility in scheduling and may also have company-sponsored health and wellness programs. Drivers for small firms and independent owner-operators may not have such resources. Lacking a conveniently measurable marker for fatigue, it is difficult for drivers or managers to know in advance the probability that a driver will experience an episode of fatigue. For this reason, attempts to manage fatigue among drivers have focused on limiting the number of hours they can work. Such \"hours of service\" regulations have been in place for many decades, and have changed over time. The regulations typically limit the length of daily and weekly work periods, and include minimum required periods off-duty during which workers may rest. Congress directed that hours of service regulations be established for the interstate trucking industry in the 1935 law that first subjected interstate trucking to federal safety and economic regulation. The HOS regulation is one facet of the safety standards Congress has established for commercial motor vehicle safety. These standards also address vehicle maintenance and operation, requiring that the tasks imposed on drivers do not impair their ability to drive safely, that their physical condition is adequate for them to drive safely, that the operation of their vehicle does not impair their health, and that they not be coerced by others to operate in violation of safety federal standards. Commercial long-haul truck and over-the-road bus drivers work face challenging conditions for maintaining health, including long work hours, variable work schedules, long periods of sitting still, and difficulties in getting adequate sound sleep. It is accepted now in the medical community that lack of exercise and insufficient sleep over a period of time has harmful effects on a person's health, including increasing the risk for obesity, diabetes, high blood pressure, and premature death. The International Agency for Research on Cancer has classified night shift work as \"probably carcinogenic to humans\" due to its disruption of circadian rhythms. Studies indicate that many commercial drivers sleep less than seven hours per night during a normal work week; in one survey the median was just under seven hours, with a significant number reporting average sleep of less than six hours. That is an improvement from the past. Prior to changes to the HOS rule in 2003, studies had found drivers getting an average of just over five hours of sleep a night. The 2003 changes included an increase in the minimum off-duty time from 8 to 10 consecutive hours. Studies suggest that drivers were getting more sleep after the 2003 HOS changes, an average of 6.28 hours in one study. However, this is still less than the seven to eight hours recommended by experts in the relationship of sleep and health. Although these studies suggest that drivers may be getting more sleep as a result of the 2003 HOS changes, fatigue continues to be a significant safety and health issue for drivers. Fatal crashes involving large trucks and buses, after a drop related to reduced activity during the Great Recession of 2008-2009, rose 40% between 2009 and 2017, the most recent year for which statistics are available. The HOS rule was most recently revised in 2011. It applies to drivers in both passenger and freight operations, though the rule for drivers carrying passengers is slightly different from that for drivers carrying freight (see Table 1 ). The extent to which drivers are affected by the rule depends greatly on the nature of their work. The 700,000 registered trucking carriers range from independent owner-operators to corporations with thousands of vehicles and employee-drivers. Drivers' work ranges from carrying passengers to carrying diverse types of freight, including specialized cargoes and hazardous materials that require certification beyond a commercial driver's license. Some drivers are at the wheel all day, while others drive a few hours each day and wait in between routes. Local delivery drivers can sleep in their own beds each night, whereas over-the-road truckers may be away from home for weeks at a time. School bus drivers typically work a few hours in the morning and a few hours in the afternoon with a break in between, and are little affected by the HOS rule, while drivers of transit buses may have their schedules determined as much by collective bargaining agreements as by the HOS rule. The HOS rule is most consequential for long-haul drivers, who may transport several loads during an extended period away from home, during which they may be driving at any hour of the day or night. These drivers represent roughly half of the drivers who are subject to the HOS limits. They are perhaps the most subject to fatigue among the different types of commercial drivers, due to the nature of their work. Because long-haul truck drivers are typically paid by the mile or by the load, and most roads have a maximum speed limit, the simplest way for a driver to increase income is to drive more hours. This is also the simplest way to deal with unexpected delays a driver may encounter. Thus, many drivers have an incentive to violate the HOS rule. In the period prior to the ELD mandate, violations were frequent. For many decades enforcement was based on review of a paper log-book in which each driver recorded hours of service by hand; due to the ease with which the driver could enter false information, the log-book was sometimes derisively referred to as a \"comic book.\" Surveys of commercial drivers found that 40% to 75% admitted to violating the hours of service regulations, depending on the definition of \"violation\" used in the survey. Penalties for violating the HOS rule can be imposed by federal, state, and local officials. A driver found to have violated the HOS limits in a roadside inspection can be forbidden to drive (placed \"out of service\") until enough off-duty time has passed to bring the driver back into compliance. Federal, state, and local officials can impose civil and criminal penalties for HOS violations. Additionally, both the driver and the employer's safety scores can be affected. A driver with a poor safety score may experience greater difficulty finding work, and a carrier with a poor safety score may be less attractive to prospective drivers and customers and may be subject to closer attention from the Federal Motor Carrier Safety Administration (FMCSA). Since the HOS rule limits the productivity and flexibility of the industry and the potential income of drivers, changes to the rule are often contentious. For example, one 2011 revision affected the so-called 34-hour restart rule. That provision formerly allowed drivers to resume work within the same week after hitting the 60-hour weekly limit by taking 34 consecutive hours off. The revision required that the 34-hour period would have to encompass two consecutive 1 a.m. to 5 a.m. periods in order to better align the rest period with drivers' circadian rhythms to improve the chances that the drivers got sufficient rest to prevent cumulative fatigue. Practically, it meant that the minimum 34-hour rest period could extend longer, depending on the time of day at which the driver began it. Portions of the industry and some drivers protested that this change limited the flexibility of the timing of the 34-hour rest period. Congress suspended enforcement of that change in 2014, with a provision that the suspension of enforcement would continue unless a new study by FMCSA found that the change provided \"statistically significant improvement in all outcomes related to safety, operator fatigue, driver health and longevity, and work schedules.\" The study, submitted to Congress in March 2017, found that the change did not meet all four of the required areas of improvement. As a result, the previous restart rule is once again in force. Fatigue management programs contain policies and procedures for managing and reducing fatigue among employees, and often include goals of promoting both operational safety and employee health. Such programs can be divided into two broad categories: fatigue risk management plans and fatigue risk management systems. Fatigue risk management plans typically include fatigue awareness training for employees as well as a process for reporting instances of fatigued driving (in the commercial motor vehicle industry). FMCSA, in concert with Transport Canada, trucking industry trade associations, and other associations, developed the North American Fatigue Management Program, an online education program for commercial drivers, their employers, and others involved in commercial trucking. It is intended to inform these groups about the causes of driver fatigue, the impact of driver fatigue on increasing the risk of crashes, the long-term consequences of fatigue for driver health, and measures that can be taken to manage driver fatigue. Fatigue risk management systems include the elements of a fatigue risk management plan, plus a means for continuously monitoring and measuring individual workers' schedules using both subjective and objective data. A recent report from the National Academies of Sciences Engineering, and Medicine noted that the effectiveness of the program has not been properly assessed, and as for the impact of fatigue management programs in general, A few large truck carriers have derived positive results from their almost 10 years of experience in integrating health and wellness and fatigue management programs, and they have shared those experiences, including the return on their investment in such initiatives. However, most studies of these programs have not sufficiently and reliably validated their efficacy for achieving the goal of reducing crash risk or their scalability. Also, little is known about the use of health and wellness programs by independent owner-operators. The report called for evaluation of the North American Fatigue Management Program. FMCSA is collaborating with the National Institute for Occupational Safety and Health on an evaluation of the effectiveness of the program. The results are not expected until 2022 or later. The purpose of the congressionally mandated ELD requirement is to promote highway safety by improving compliance with the commercial motor vehicle hours of service rule. An ELD is a piece of hardware that is connected to a vehicle's engine control module, often through the diagnostic port that mechanics use to investigate the engine's condition. The device must automatically record driving time, retain the data for at least seven days, and transmit it so that the driver's compliance with the HOS rule can be determined during a roadside inspection. It is generally regarded as more reliable than paper log books in recording drivers' start and stop times. In issuing its rule implementing the ELD mandate, FMCSA stated that the rule was expected to result in greater adherence to the HOS rule, and thus reduce the amount of driving while fatigued. The end result is expected to be fewer crashes caused by fatigued drivers. Several studies prior to the mandate found that ELDs installed voluntarily by fleet owners had this effect. FMCSA estimated 1,844 crashes would be avoided annually as a result of the mandate, thus avoiding injuries to 562 persons and 26 fatalities. FMCSA estimated that the financial benefit of the reduced number of crashes would be $575 million annually. Although data are available on the number of truck crashes in 2017 (before the mandate took effect) and 2018 (after the mandate took effect), real-world truck crash numbers are affected by many variables, including weather and changes in demand for freight carriage by truck. Sufficient time has not yet passed, and sufficient data are not yet available, to assess whether ELDs have reduced the number of crashes as FMCSA had anticipated. A study that looked at roadside inspection reports and crash data from the first nine months of 2018 found that HOS violations had gone down, particularly for owner-operators and very small fleets. (HOS violations by drivers for carriers with larger fleets were already low, in part because many of these carriers had already installed ELDs on their trucks.) The study also found that the average number of crashes per week had gone up slightly after the HOS mandate went into effect compared to 2017. For larger fleets the crash rate went down slightly. The study used freight shipment data and truck registration data to attempt to control for changes in vehicle miles traveled to see whether the increase in crashes was due to increased travel, and concluded that changes in freight shipment activity did not explain the increase in crashes. The study also found that the number of unsafe driving violations by individual owner-operators and drivers for very small fleets (two to six trucks) went up significantly after the ELD mandate went into effect, while such violations did not increase among drivers for larger carriers (who were more likely to have been operating with ELDs prior to the mandate).The authors hypothesized that in the period immediately after implementation of ELDs, independent owner-operators and drivers for small fleets had reduced the amount of time they spent driving and on duty, but were driving faster in order to travel the same number of miles and thus avoid a reduction in their incomes. If the results of this study are supported by other studies over time, it may suggest that differences between the drivers employed by large fleets and those who are self-employed or employed by very small fleetsâor between the circumstances facing drivers in those two industry groupsâlead to a higher propensity for risky behavior among drivers in the latter group. Such a difference would have implications for public safety and enforcement activity. FMCSA estimated that the savings from reduced paperwork would be $2.4 billion annually. This benefit accrues partially to drivers and partially to their employers. For drivers, who are customarily paid by the mile rather than by the hour, the savings come from reducing the amount of time spent filling out paper logs rather than driving. For carriers, the savings come from automating the process of compiling driver records for recordkeeping and reporting. With total costs estimated at $1.8 billion, the estimated administrative benefits ($2.4 billion) combined with the safety benefits ($575 million) provide an estimated net benefit of $1.2 billion annually, according to FMCSA. These are estimates, and critics of the mandate, such as the Owner-Operator Independent Drivers Association (OOIDA), have contended that FMCSA has underestimated the costs and overestimated the benefits. OOIDA represents operators who own their trucks and are responsible for the cost of the ELD; many of its members view the ELD as an intrusion into their work life. Conversely, the American Trucking Associations, representing larger carriers, some of which had installed electronic logging devices or similar technology in their fleets years before the mandate to better track their operations, contend that ELDs offer many benefits beyond the ones that FMCSA included in its estimate. Some carriers have responded to stricter enforcement of the HOS rule by using driver relays, in which one driver drives as far as the hours of service limit will allow, then is met by another driver who takes the trailer and continues the delivery. The first driver rests as required, then receives another load from a dispatcher. This method can also offer health and lifestyle benefits to drivers by enabling them to drive outbound one day and back toward their home on the following day, potentially making driving a more appealing job. The Government Accountability Office has noted that the ability of FMCSA and others to evaluate the impact of the commercial motor vehicle HOS regulation and proposed changes to it is limited due to the limited availability of data about driver schedules. The Federal Aviation Administration and the Federal Railroad Administration collect representative schedule data to evaluate the impact of hours of service rules in the aviation and railroad sectors, respectively, but FMCSA does not collect representative data that could be generalized to the trucking industry as a whole for purposes of better analyzing the impacts of the HOS rule. The widespread use of paper records by drivers made the task of collecting such data in representative amounts difficult. The ELD regulation, which requires carriers to collect and store such data in electronic form, aims to simplify the task of collecting representative data on drivers' schedules, and thus could provide the opportunity for FMCSA and other analysts to better evaluate the impact of the HOS rule and proposed changes to the rule. However, there are several obstacles to this use of such data, including a statute limiting DOT's use of this data to enforcement of motor carrier safety, as well as privacy and cost concerns. Given the potential value of the ELD data for regulatory analysis, Congress may examine how these data could be made available for this purpose. The primary direct costs of the ELD mandate are the purchase and maintenance of ELDs. FMCSA estimated this cost at $1 billion annually, an average of around $495 per truck or bus. While prices vary according to features and other factors, there are ELDs now available for less than FMCSA's estimated average cost, potentially reducing the economic impact of the mandate. One reason many truck drivers raised concerns about stricter enforcement of the HOS rule is that most interstate truck drivers are paid by the mile. Limiting the number of hours they can drive in a day and a week automatically imposes a ceiling on their earnings. That ceiling also amplifies the economic impact of any delays they may encounter during their workday, such as traffic congestion or time spent waiting for their cargo to be loaded or unloaded. Numerous studies have found a connection between drivers being paid by the mile, limits on driving time, and driver propensity to speed and work longer hours. Speeding is dangerous in two ways: it increases the risk of crashes by reducing a driver's time to react to events, and it increases the severity of crashes. Working longer hours is associated with fatigued driving and a resulting increased crash risk. The HOS regulation give drivers some flexibility to deal with delays, as they may have up to 14 duty hours each day, of which up to 11 hours may be spent driving. But that flexibility may not always feel beneficial, as it can allow a driver paid by the mile to be on duty without being paid for up to three hours a day. In 2015, prior to enactment of the Fixing America's Surface Transportation Act ( P.L. 114-94 ), which reauthorized surface transportation programs, including the activities of FMCSA, the Obama Administration proposed to require that commercial drivers subject to the HOS regulations who are paid by the mile be paid for time they spend on duty but not driving. Studies suggest that arrangement leads to drivers reducing their work hours, and thus reduces the risk of fatigued driving. The proposal was not enacted. The use of ELDs may help to quantify a challenge faced by drivers: inroads into their driving time caused by delays in loading and unloading their cargo by shippers and receivers. By one estimate, unpaid \"driver detention time\" costs drivers who are paid by the mile $1.1 billion to $1.3 billion a year (an average of $1,300 to $1,500 per driver). This detention time is also estimated to increase the risk of crashes, as it uses up a driver's available duty time, pushing their driving time later into their duty period when they are more likely to feel tired, and may lead them to speed to make up for the detention time. This and other studies have found that drivers working for smaller carriers experience longer average detention times than drivers for larger motor carriers. When a truck driver reaches the HOS driving time limit, the driver must stop and rest. It is not always easy to find parking for a large truck. A variety of factors, including weather and traffic, can make it difficult for a truck driver to know in advance the location at which it will become necessary to stop driving and park the vehicle, and a truck parking facility may be full when a driver reaches it. A shortage of truck parking facilities can pose two public safety hazards: a tired driver may continue driving in search of a place to park and thus increase the risk of a crash, and a driver may park in a place that is unsafe for himself or other drivers, such as on the shoulder of a busy road. In 2005 Congress directed DOT to create a pilot program to address the shortage of truck parking on the National Highway System. Following a 2009 incident in which a driver who had stopped to rest at an abandoned gas station often used by truck drivers in need of parking was robbed and murdered in South Carolina, Congress passed Jason's Law, which made safe parking for truck drivers a national priority, required DOT to periodically survey the extent of truck parking facilities, and explicitly made construction of truck parking facilities eligible for federal funding. State transportation agencies and private truck stop operators both supply parking spaces for truck drivers. The most recent survey of parking facilities found that the demand for truck parking exceeded the supply in most parts of the country, with an extreme shortage in the Mid-Atlantic region. A number of factors contribute to this situation, including the disinclination of truck drivers to pay for parking, a prohibition on commercial facilities at Interstate Highway rest areas, the interests of truck stop operators who oppose the provision of free public truck parking, and the relatively high cost of land at Interstate Highway access points. There are relatively few studies of the causes and effects of fatigue to bus drivers, compared to those examining truck drivers. In part this may be due to the relatively safer bus experience; as noted above, the number of people killed in bus crashes each year is a small fraction of the number killed in truck crashes. However, the comparatively low number of fatal bus crashes means that developing a nationally representative sample of bus crashes for analysis would require significant resources over many years. The shortage of information on whether fatigue among bus drivers has different causes and effects than among truck drivers makes it tempting to extrapolate truck driver fatigue research to bus drivers. However, this may not be justified, as the population of bus drivers differ in certain respects from the population of long-distance truck drivers. For example, females represent a larger portion of bus drivers than of long-distance truckers. On August 22, 2018, FMCSA published an Advance Notice of Proposed Rulemaking (ANPRM) seeking information and public comment about several potential changes in the Hours of Service rule for commercial drivers. The changes were described as providing more flexibility for drivers and carriers. The changes FMCSA is considering would mainly address complaints about the enforcement of the HOS rule through electronic logging from sectors of the trucking industry in which drivers' typical work schedules involve short periods of driving and long periods of being on duty but not driving, such as utility services and oilfield operations. The changes being considered are the following: Short haul operations . Drivers who operate within a 100 air-mile radius of their normal work reporting location, and whose on-duty time does not exceed 12 hours, are not required to record their driving time and thus are not required to use an ELD. These drivers are assumed to be returning to their homes when off duty. FMCSA is considering expanding this exemption to short-haul drivers who spend up to 14 hours on duty, matching the on-duty period for other truck drivers, but permitting drivers claiming this exemption to continue to operate without recording their driving time. There would thus be no way to enforce the HOS rule with respect to short-haul driver. Adverse driving conditions . Drivers are allowed two extra hours of driving time under adverse conditions, which are defined as \"snow, sleet, fog, other adverse weather conditions, a highway covered with snow or ice, or unusual road and traffic conditions, none of which were apparent on the basis of information known to the person dispatching the run at the time it was begun.\" This exception allows a driver up to 13 hours of driving time, but does not extend the 14-hour on-duty limit. FMCSA is considering adding 2 hours to the 14-hour on-duty period for adverse conditions, thus allowing a maximum of 16 consecutive hours on duty. 30-minute break . FMCSA is seeking information on alternatives to, and the impact of eliminating, the required minimum 30-minute rest break after no more than 8 hours have passed since the driver either (a) came on duty or (b) spent a period of at least 30 minutes in the sleeper berth of a truck. FMCSA added the 30-minute break requirement to the HOS rule in 2011 based on evidence from several studies that for a period after taking a break from driving a driver is less likely to be involved in a crash. Split sleeper berth time . A driver in a truck with a sleeper berth can divide the minimum 10 off-duty hours into 2 separate periods totaling at least 10 hours; one of those periods must include at least 8 hours spent in the sleeper berth. FMCSA initially planned to conduct a pilot program giving drivers more flexibility in the length of the sleeper berth periods, in order to collect data regarding the impact of providing such flexibility on driver rest and alertness. In October 2018, FMCSA announced that it was cancelling the proposed pilot program, saying it already had enough data and research on the topic and wanted to fast-track its proposed changes to the HOS rule. The public comment period on the potential changes closed in October 2019. FMCSA has not indicated when proposed regulations may be published. One of the industry segments that has objected most strenuously to being subjected to more stringent compliance with the HOS rule due to the ELD mandate is livestock hauling. These drivers transport living creatures that require food and water and that are subjected to increased stress and risk of injury by the process of being loaded onto and unloaded from a vehicle as well as by the experience of transport. Also, federal law provides that livestock being transported across state lines can be confined in a vehicle for a maximum of 28 consecutive hours, after which they must be unloaded for feeding, watering, and rest. The law, however, is apparently frequently ignored and not rigorously enforced by the U.S. Department of Agriculture. The livestock hauling industry already had several HOS exemptions prior to the ELD mandate: The private transportation of agricultural commodities (including livestock, bees, and horses) to or from a farm or ranch by the owner or operator of the farm or ranch, family members, or employees is exempt from the HOS rule. During agricultural planting and harvesting seasons (as determined by each state), haulers of agricultural commodities, including livestock, bees, and horses, who operate within a 150 air-mile radius of the source of the commodities, are exempted from the HOS rule. This area within which this exemption can be claimed was expanded from a radius of 100 air miles to 150 air miles in 2012, more than doubling the exempted area. HOS regulations do not apply to drivers transporting agricultural commodities (including livestock) who operate completely within a 150 air-mile radius of the source of the commodities. When a driver who is using one of those exemptions drives beyond the 150 air-mile radius, the HOS regulations start to apply and the driver must record driving time and on-duty time. The time spent working and driving within the 150 air-mile radius does not count toward the HOS limits, so a driver could have been driving for several hours before officially recording the first hour of driving time. Over the past few decades the declining cost of transportation and other factors have led the livestock industry, particularly the cattle sector, to adopt a business model that emphasizes hauling livestock from around the lower 48 states to feedlots and slaughterhouses concentrated in the center of the country. By making it harder for drivers to evade the HOS limits without detection, the ELD mandate effectively reduces the distance that livestock can be transported within the 28-hour limit set in law before they must be unloaded and fed, watered, and given a chance to rest. The livestock hauling industry contends that abiding by the HOS limits may force drivers who reach the driving time limit of 11 hours to either unload the livestock for the period of the off-duty rest time and then reload them, putting them under additional stress and risk of injury, or else leave the livestock on the vehicle during the off-duty period. Data are lacking on whether stricter compliance with the HOS rule increases the cost of shipping livestock and to what extent it reduces the number of crashes involving livestock haulers. Congress has barred FMCSA from using any of its funding to enforce the ELD mandate on livestock haulers through September 30, 2020.", "summary": "In response to the COVID-19 outbreak, on March 13, 2020, the Department of Transportation (DOT) issued a national emergency declaration to exempt from the Hours of Service (HOS) rule through April 12, 2020, commercial drivers providing direct assistance in support of relief efforts related to the virus. This includes transport of certain supplies and equipment, as well as personnel. Drivers are still required to have at least 10 consecutive hours off duty (eight hours if transporting passengers) before returning to duty. It has been estimated that up to 20% of bus and large truck crashes in the United States involve fatigued drivers. In order to promote safety by reducing the incidence of fatigue among commercial drivers, federal law limits the number of hours a driver can drive through the HOS rule. Currently the HOS rule allows truck drivers to work up to 14 hours a day, during which time they can drive up to 11 hours, followed by at least 10 hours off duty before coming on duty again; also, within the first 8 hours on duty drivers must take a 30-minute break in order to continue driving beyond 8 hours. Bus drivers transporting passengers have slightly different limits. Approximately 3 million drivers are subject to the federal HOS rule. For decades, drivers recorded their service hours in paper log books. This method made violations of the HOS rule easy to hide. Since many drivers are paid by the mile, some drivers violated the HOS rule in order to drive longer and make more money. Some drivers said they had to violate the rule to meet the schedules imposed on them by dispatchers. There were concerns about the safety impacts of having drivers become even more fatigued by driving longer than the maximum times allowed by the HOS rule. In an effort to improve compliance with the HOS rule, in 2012 Congress mandated that trucks be equipped with electronic logging devices (ELDs), hardware devices that are connected to the truck engine to record driving time and transmit it during roadside inspections. In 2015, the Federal Motor Carrier Safety Administration (FMCSA) finalized regulations to implement that mandate. The mandate took effect in December 2017. FMCSA determined that the mandatory use of ELDs would improve highway safety, and could improve driver health if drivers take advantage of the rest periods mandated under the regulations to get adequate sleep. Since the ELD mandate went into effect, certain sectors of the commercial trucking industry have raised concerns about its impact. Since the ELD mandate did not change the HOS rule, but made it harder to evade the HOS limits without being detected, those concerns suggest that some operators may have routinely been out of compliance with the HOS rule. One sector that has been particularly critical of the improved enforcement of the HOS limits is the livestock hauling industry. The industry's business model has evolved to depend on hauling livestock long distances from around the nation to feedlots and slaughterhouses located mostly in the central states, and each stop along the way poses hazards to the livestock. Congress has repeatedly provided temporary waivers from the ELD mandate for livestock haulers, pending proposed revisions of the HOS rule by FMCSA. Currently the agency is prohibited from using federal funding to enforce the HOS rule against livestock haulers until September 30, 2020. The use of ELDs may help to quantify a challenge faced by drivers: inroads into their driving time caused by delays in loading and unloading their cargo by shippers and receivers. Drivers are typically paid by the mile, and by one estimate this unpaid \"driver detention time\" costs drivers $1.1 billion to $1.3 billion a year (an average of $1,300 to $1,500 per driver). This detention time is also estimated to increase the risk of crashes due in part to encouraging drivers to speed to make up for mileage that otherwise could not be driven during the allowable work time because of detention time. As the ELD mandate has been in effect for two years now, some impacts are starting to come into focus. An array of ELDs are now offered, some at prices below FMCSA's initial estimates. The impact of improved enforcement on industry activity and truck safety is not yet clear. Legislation is being proposed to help address the shortage of parking spots for truck drivers that can make it difficult to find a safe place to stop when they reach their HOS time limit. FMCSA has proposed a set of relatively minor changes to the HOS rule to, in the agency's words, increase safety while providing flexibility to drivers.", "document_type": "crs"}
{"report": "Medicaid is a joint federal-state program that finances the delivery of primary and acute medical services, as well as long-term services and supports (LTSS), to a diverse low-income population. This population includes children, pregnant women, adults, individuals with disabilities, and those aged 65 and older. Medicaid is authorized under Title XIX of the Social Security Act (SSA) and financed by the federal government and the states. Federal Medicaid spending is an entitlement, with total expenditures dependent on state policy decisions and enrollees' use of services. Participation in Medicaid is voluntary, though all states, the District of Columbia, and the territories choose to participate. States design and administer their Medicaid programs based on broad federal guidelines. The federal government requires states to cover certain mandatory populations and services but allows states to cover other optional populations and services. In addition, several waiver and demonstration authorities in statute allow states to operate their Medicaid programs outside of certain federal rules. Due to this flexibility, factors such as eligibility, covered benefits, and provider payment rates vary substantially by state. At the federal level, the Centers for Medicare & Medicaid Services (CMS) within the Department of Health and Human Services (HHS) is responsible for administering Medicaid. This report focuses on Medicaid eligibility for adults aged 65 and olderâreferred to as older adultsâand adults under the age of 65 and children with disabilities. Specifically, this report examines the statutory provisions that provide Medicaid eligibility for individuals who are considered to be aged, blind, or disabled. These populations are of interest to lawmakers primarily for two reasons: (1) they are more likely to need LTSS, and (2) they account for a large share of Medicaid spending. Older adults and individuals with disabilities are more likely to need LTSS due to physical limitations, cognitive impairment, or chronic disabling health conditions. Those with LTSS needs are a diverse group that range in age from very young children to older adults. Disabilities can be wide ranging, including, for example, physical limitations, visual impairments (i.e., blindness), intellectual or developmental disabilities, cognitive and behavioral health conditions, traumatic brain injuries, and HIV/AIDS. Federal policymakers have an interest in understanding Medicaid eligibility as the program is an important source of coverage for those with long-term care needs. Medicaid provides LTSS coverage (e.g., extended nursing facility care, personal care, and other home and community-based services) that is generally not covered by Medicare or major health insurance plans offered in the private market. As the largest single payer of LTSS in the United States, Medicaid plays a key role in providing LTSS coverage. In 2016, total Medicaid LTSS spending (federal and state combined) was $154 billion, accounting for 42% of all LTSS expenditures nationally. Because many older adults and individuals with disabilities use LTSS, they tend to account for a disproportionate share of Medicaid spending, which has implications for both federal and state budgets. In FY2016, Medicaid provided health care services to about 71 million enrollees, with expenditures of approximately $538 billion (federal and state combined). Although older adults and individuals with disabilities made up only about one-quarter (23%) of all Medicaid enrollees that year, they accounted for more than half (54%) of all benefit spending. Among all Medicaid enrollees, 30% of Medicaid spending in FY2013 was on LTSS, compared with 62% among older adults (i.e., aged) and 36% among individuals with disabilities (i.e., disabled). The next section of this report provides an overview of Medicaid eligibility, followed by a summary of eligibility pathways for older adults and individuals with disabilities. The report then describes specific information about each eligibility pathway for older adults and individuals with disabilities. The Appendix includes summary tables with statutory references and general financial eligibility criteria for each of the eligibility pathways described in this report. Eligibility for Medicaid is determined by both federal and state law, whereby states set individual eligibility criteria within federal minimum standards. This arrangement results in substantial variability in Medicaid eligibility across states. Therefore, the ways that individuals can qualify for Medicaid reflect state policy decisions within broad federal requirements. In general, individuals qualify for Medicaid coverage by meeting the requirements of a specific eligibility pathway (sometimes referred to as an eligibility group) offered by the state. Some eligibility groups are mandatory, meaning all states with a Medicaid program must cover them. Other eligibility groups are optional, meaning states may elect to cover them. Within this framework, states may have some discretion to determine certain eligibility criteria for both mandatory and optional eligibility groups. In addition, states may apply to CMS for a waiver of federal law to expand health coverage beyond the mandatory and optional eligibility groups specified in federal statute. An \"eligibility pathway\" is the federal statutory reference(s) under Title XIX of the SSA that extends Medicaid coverage to one or more groups of individuals. Each eligibility pathway specifies the group of individuals covered by the pathway (i.e., the categorical criteria), the financial requirements applicable to the group (i.e., the financial criteria), whether the pathway is mandatory or optional, and the extent of the state's discretion over the pathway's requirements. Individuals who have met the categorical and financial requirements of a given eligibility pathway and are in need of Medicaid-covered LTSS must also meet additional requirements. In general, they must demonstrate the need for such care by meeting state-based level-of-care criteria. They may also be subject to a separate set of Medicaid financial eligibility rules to receive LTSS coverage. All Medicaid applicants, regardless of their eligibility pathway, must meet federal and state requirements regarding residency, immigration status, and documentation of U.S. citizenship. Not all Medicaid enrollees have access to the same set of services. An applicant's eligibility pathway often dictates the Medicaid services that a program enrollee is entitled to (e.g., women eligible due to their pregnancy status are entitled to Medicaid pregnancy-related services). Most Medicaid beneficiaries receive services in the form of what is sometimes called \"traditional\" Medicaidâan array of required or optional medical assistance items and services listed in statute. However, states may furnish Medicaid in the form of alternative benefit plans (ABPs). In addition, states may also offer LTSS under traditional Medicaid or through a waiver program for individuals who meet state-based level-of-care criteria for services. Low-income older adults and individuals with disabilities may qualify for Medicaid through a number of eligibility pathways. In general, Medicaid data report the following broad categorical eligibility groups: children, adults, aged, and disabled. This report focuses on the eligibility of older adults and individuals with disabilities based on their age or disability status; that is, the pathways where the categorical criteria are being aged, blind, or disabled (sometimes referred to as \"ABD\" or \"ABD eligibility\"). Individuals who qualify for Medicaid on the basis of being blind or disabled include adults under the age of 65 as well as children. Most (but not all) ABD pathways recognize blindness as a distinct condition from other disabilities and, as such, provide separate categorical criteria for this condition. However, when reporting data on broad categorical eligibility groups, CMS includes statutorily blind individuals in the \"disabled\" category. Individuals with disabilities may also be eligible for Medicaid under pathways available more broadly to able-bodied children and adults for a number of reasons; for example, because they do not meet the definition of disability under an ABD eligibility pathway, have income or assets above certain limits, do not meet the state-based level-of-care criteria, or have one or more chronic condition(s) but have not developed a chronic-disabling condition. Adults under the age of 65 and children who qualify for Medicaid on the basis of a reason other than being blind or disabled are classified by CMS as \"adults\" and \"children,\" respectively. Individuals applying for Medicaid may be eligible for the program through more than one pathway. In this situation, applicants may choose the pathway that would be most beneficial to themâboth in terms of how income and sometimes assets are used to determine Medicaid eligibility, and in terms of the available services associated with each eligibility pathway. This report classifies the ABD eligibility pathways for older adults and individuals with disabilities into two broad coverage groups: (1) Supplemental Security Income (SSI)-Related Pathways and (2) Other ABD Pathways (see Table 1 ). The SSI-Related Pathways consist of mandatory and optional eligibility groups that generally meet the requirements of the federal SSI program. These groups include older adults and individuals with disabilities who are SSI eligible, are deemed to be SSI eligible, or would be SSI eligible if not for a certain SSI program rule. The Other ABD Pathways consist of optional eligibility groups that have levels of income or resources above SSI program rules. These groups generally use SSI categorical criteria to define older adults and individuals with disabilities and may use certain SSI financial criteria to determine their financial eligibility for Medicaid. Each of the specific pathways under these broad coverage groups are described in more detail below. Table A-1 in the Appendix lists the statutory references and certain eligibility criteria for each Medicaid ABD eligibility pathway. Medicaid categorical eligibility criteria are the characteristics that define the population qualifying for Medicaid coverage under a particular eligibility pathway; in other words, the nonfinancial requirements that an individual must meet to be considered eligible under an eligibility group. Medicaid covers several broad coverage groups, including children, pregnant women, adults, individuals with disabilities, and individuals aged 65 and older (i.e., aged). Each of these broad coverage groups includes a number of distinct Medicaid eligibility pathways. Historically, Medicaid eligibility was limited to poor families with dependent children who received cash assistance under the former Aid to Families with Dependent Children (AFDC) program, as well as poor aged, blind, or disabled individuals who received cash assistance under the SSI program. Medicaid eligibility rules reflected these historical program linkagesâboth in terms of the categories of individuals who were served, and because the financial eligibility rules were generally based on the most closely related social program for the group involved (e.g., AFDC program rules for low-income families with dependent children and pregnant women, and SSI program rules for aged, blind, or disabled individuals). Over time, Medicaid eligibility has expanded to allow states to extend coverage to individuals whose eligibility is not based on the receipt of cash assistance, including the most recent addition of the ACA Medicaid expansion population (i.e., individuals under the age of 65 with income up to 133% of the federal poverty level). Moreover, Medicaid's financial eligibility rules have been modified over time for certain groups. Medicaid is a means-tested program that is limited to those with financial need. However, the criteria used to determine financial eligibilityâincome and, sometimes, resource (i.e., asset) testsâvary by eligibility group. These income and resource tests are expressed separately as an income standard and a resource standard . The income standard is expressed as a dollar amount or as a share of the federal poverty level (FPL). The resource standard is expressed as a dollar amount. The ways in which income and resources are counted for the purposes of applying the respective standard are referred to as the income - counting methodology and resource - counting methodology (see text box \"Medicaid Financial Criteria: Terminology\"). Under the income-counting methodology, certain types of income may be disregarded before comparing a person's (or household's) income against the income standard, enabling individuals with higher amounts of gross income to meet the income standard and qualify for Medicaid. Similarly, certain rules determine how an applicant's resources (i.e., assets) are counted before they are compared to the specified resource standard. For most eligibility groupsânonelderly and nondisabled individuals, children under the age of 18, and adults and pregnant women under the age of 65âthe financial criteria used to determine Medicaid eligibility are based on Modified Adjusted Gross Income (MAGI) income-counting rules. No resource or asset test is used to determine Medicaid financial eligibility for MAGI-eligible individuals. Although MAGI applies to most Medicaid eligible populations, certain populations (e.g., older adults and individuals with disabilities) are statutorily exempt from MAGI income-counting rules. Instead, Medicaid financial eligibility for MAGI-exempted populations is based on the income-counting rules that match the most closely related social program for the group involved (e.g., SSI program rules for the aged, blind, or disabled eligibility groups). Thus, SSI program rules form the foundation of Medicaid eligibility for older adults and individuals with disabilities under mandatory and optional eligibility pathways and include both an income and a resource or asset test (see the next section for more information on SSI rules). However, under optional SSI-Related and Other ABD eligibility pathways, states may modify SSI program rules when determining income- and resource-counting methodologies. For example, some optional eligibility pathways allow states to choose their own income- or resource-counting methodology. Other eligibility pathways allow states to use Section 1902(r)(2) of the SSA, which lets them choose more liberal income- or resource-counting methodologies than those under the SSI program. Thus, for certain optional eligibility pathways, a state can choose to include or disregard certain sources of income or resources, in part or in whole, when determining whether an applicant meets the income or resource standards for that optional eligibility pathway. (See Table A-2 in the Appendix , which lists the financial eligibility criteriaâincome standard and counting methodologies and resource standard and counting methodologiesâfor each Medicaid eligibility pathway identified in this report.) In addition, state Medicaid programs are required to establish an Asset Verification System (AVS) that meets certain minimum requirements to determine and re-determine Medicaid eligibility for aged, blind, or disabled Medicaid applicants and enrollees. Further discussion of AVS is beyond the scope of this report. SSI program rules form the foundation of Medicaid categorical and financial eligibility criteria for older adults and individuals with disabilities. Medicaid generally uses SSI categorical criteria to define the ABD populations. In addition, Medicaid often uses or adapts SSI's financial standards and counting methodologies to specify the financial eligibility requirements applicable to the SSI-Related Pathways and the Other ABD Pathways. Thus, understanding SSI program rules is important to understanding Medicaid eligibility rules for older adults and individuals with disabilities. SSI is a federal assistance program authorized under Title XVI of the SSA that provides monthly cash payments to aged, blind, or disabled individuals who have limited income and resources. SSI is intended to provide a guaranteed minimum income to adults who have difficulty covering their basic living expenses due to age or disability and who have little or no Social Security or other income. It is also designed to supplement the support and maintenance of needy children under the age of 18 who have severe disabilities. Unlike Medicaid, SSI eligibility requirements and benefit levels are based on nationally uniform standards. SSI is administered by the Social Security Administration but is not part of the Old Age, Survivors, and Disability Insurance program, commonly known as Social Security. The following sections provide a brief overview of SSI's categorical and financial eligibility criteria. For more information on these and other SSI criteria, see CRS Report R44948, Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI): Eligibility, Benefits, and Financing . To be categorically eligible for SSI, a person must be an \"aged, blind, or disabled individual,\" as defined in Title XVI of the SSA ( Table 2 ). The term \"aged\" refers to individuals aged 65 and older. The term \"blind\" refers to individuals of any age who have central visual acuity of 20/200 or less in the better eye with the use of a correcting lens, or a limitation in the fields of vision so that the widest diameter of the visual field subtends an angle of 20 degrees or less (i.e., tunnel vision). Adults aged 18 and older are considered \"disabled\" if they are unable to engage in any substantial gainful activity (SGA) by reason of any medically determinable physical or mental impairment that can be expected to result in death or that has lasted or can be expected to last for a continuous period of not less than 12 months. The Social Security Administration uses a monthly earnings standard to determine whether an individual's work activity constitutes SGA. The agency adjusts this standard annually to reflect changes in national wage levels. In 2019, the SGA earnings standard is $1,220 per month. (The SGA earnings standard is a proxy measure for total disability; it is not used to determine financial eligibility for SSI.) Adults generally qualify as disabled if they have an impairment (or combination of impairments) of such severity that they are unable to perform any kind of substantial work that exists in the national economy in significant numbers, taking into consideration their age, education, and work experience. Children under the age of 18 are considered \"disabled\" if they have a medically determinable physical or mental impairment that (1) results in marked and severe functional limitations and (2) can be expected to result in death or has lasted or can be expected to last for a continuous period of not less than 12 months. Children typically qualify as disabled if they have a severe impairment (or combination of impairments) that limits their ability to engage in age-appropriate childhood activities at home, in childcare, at school, or in the community. In addition, the child's earnings must not exceed the SGA standard. The Social Security Administration periodically reevaluates blind or disabled SSI recipients to determine if they continue to meet the applicable definition of blindness or disability. In general, the Social Security Administration schedules continuing disability reviews (CDRs) of blind or disabled SSI recipients at least once every three to seven years, depending on the likelihood of medical improvement. In addition, the agency reevaluates child SSI recipients under the adult definition of disability when they attain age 18. To be financially eligible for SSI, a person must have income and resources within certain limits ( Table 2 ). The SSI income standard is equal to the SSI federal benefit rate (FBR), which is the maximum monthly SSI payment available under the program. In 2019, the SSI FBR is $771 per month for an individual and $1,157 per month for a married couple if both members are SSI eligible. Expressed as a share of the federal poverty level (FPL), the SSI FBR in 2019 is about 74% of FPL for an individual and 82% of FPL for a couple. The SSI FBR is adjusted annually for inflation by the same cost-of-living adjustment (COLA) applied to Social Security benefits. The SSI resource standard is $2,000 for an individual and $3,000 for a couple. These amounts are not adjusted for inflation and have remained at their current levels since 1989. Under the SSI program, a person's income and resources are counted against the income and resource standards unless they are excluded by federal law or by the Commissioner of Social Security pursuant to discretionary authority provided in statute. The SSI income-counting methodology excludes, among other things, the first $20 per month of any income, as well as the first $65 per month of earned income plus one-half of any earnings above $65. These amounts are not adjusted for inflation and have remained in place since SSI was enacted in 1972. The SSI resource-counting methodology excludes, among other things, a person's primary residence, household goods and personal effects, one automobile used for transportation, and property essential to self-support. For an eligible individual without an eligible spouse, the SSI income- and resource-counting methodologies are generally person-based, meaning the program counts the income and resources owned or used by the individual to determine eligibility for SSI and the amount of the payment. In certain situations, however, SSI may count a portion of the income or resources of certain ineligible family members toward the eligible individual's income or resource standard. This process, known as \"deeming,\" applies primarily to eligible children under the age of 18 who live in the same household as their ineligible parent(s) and to eligible married adults who live in the same household as their ineligible spouse. SSI deeming rules are complex and beyond the scope of this report. The Social Security Administration calculates a person's countable income and resources (i.e., gross income and resources less applicable exclusions) and then subtracts those amounts from the income and resource standards to determine financial eligibility and the amount of the cash payment (if any). Individuals with countable income and resources at or below the applicable standards are eligible for SSI. The Social Security Administration periodically reevaluates an SSI recipient's financial circumstances (i.e., income, resources, and living arrangements) to determine if the person is still eligible for SSI and receiving the correct payment amount. Automatic redeterminations are scheduled annually or once every six years, depending on the likelihood of change in a recipient's circumstances. Medicaid enrolleesâincluding the ABD populationsâmay have long-term care needs as well. In general, to receive Medicaid LTSS coverage, enrollees must also meet state-based level-of-care eligibility criteria. In other words, they must demonstrate the need for long-term care. In addition, such individuals may be subject to a separate set of Medicaid financial eligibility rules to receive LTSS coverage. Level-of-care eligibility criteria for most Medicaid-covered LTSS specify that individuals must require care provided in a nursing facility or other institutional setting. A state's institutional level-of-care criteria, in general, are also applied to Medicaid Home and Community-Based Services (HCBS) eligibility. That is, eligibility for Medicaid LTSS, both institutional care and most HCBS, is tied to needs-based criteria that require an individual to meet an institutional level-of-care need. There is no federal definition for Medicaid institutional level-of-care, and each state defines its level-of-care criteria. To define institutional level-of-care criteria, states may use \"functional\" criteria, such as an individual's ability to perform certain activities of daily living (ADLs). States may also use \"clinical\" level-of-care criteria, such as the diagnosis of an illness, injury, disability or other medical condition; treatment and medications; and cognitive status or behavioral issues, among other criteria. Most states use a combination of functional and clinical criteria in defining the need for LTSS. Certain optional ABD eligibility pathways (as described in the section entitled \" Other ABD Pathways \") are available for older adults and individuals with disabilities âSpecial Income Level, Special Home and Community-Based Waiver Group, Home and Community-Based Services (HCBS) State Plan, and Katie Beckett. These optional eligibility pathways establish eligibility to Medicaid, in general, along with Medicaid-covered LTSS for individuals who receive institutional care, or for those who need the level of care provided in an institution and receive Medicaid-covered HCBS. Medicaid enrollees in other mandatory or optional eligibility pathways may also be eligible to receive LTSS if they meet the level of care criteria. Applicants seeking Medicaid-covered LTSS are subject to a separate set of Medicaid financial eligibility rules (e.g., limits on the value of home equity and asset transfer rules). These additional financial rules are in place to ensure that program applicants apply their assets toward the cost of their care and do not divest them to gain eligibility sooner. In addition, Medicaid specifies rules for equitably allocating income and assets to non-Medicaid-covered spouses to determine LTSS coverage eligibility for nursing facility services and some HCBS. Commonly referred to as spousal impoverishment rules , these rules are intended to prevent the impoverishment of the spouse who does not need LTSS. Medicaid has another set of rules for the treatment of income after an individual is determined eligible for certain Medicaid-covered LTSS, referred to as Post-Eligibility Treatment of Income (PETI) rules. In general, eligible beneficiaries whose income exceeds specified amounts are required to apply their income toward the cost of their care. Within federal guidelines, a participant may retain a certain amount of income for personal use based on the services he or she receives. This amount varies by care setting (i.e., institutional versus HCBS). These specific financial eligibility rules for Medicaid-covered LTSS are not described in this report; for more information, see CRS Report R43506, Medicaid Financial Eligibility for Long-Term Services and Supports . In addition, most states offer Medicaid-covered LTSS under waiver programs that operate outside requirements under the Medicaid State plan. Under SSA Section 1915(c), states can cover HCBS, which includes a wide variety of nonmedical, social, and supportive services that allow individuals who require an institutional level of care to live independently in the community. SSA Section 1915(c) authorizes the HHS Secretary to waive requirements regarding comparability of services and offering services statewide (i.e., referred to as statewideness). In addition, states may waive certain income and resource rules applicable to persons in the community, so that a spouse's or parent's income (and, to some extent, resources) are not considered available to the applicant for the purposes of determining Medicaid financial eligibility. States may use Section 1915(c) concurrently with other waiver authorities. For example, states may combine Section 1915(b) and 1915(c) authorities to offer mandatory managed care for HCBS. States may also limit or cap program enrollment in the waiver. For each Section 1915(c) waiver program, states must identify the Medicaid eligibility groups receiving waiver services from those groups already covered under the Medicaid State plan. In doing so, states may include both mandatory and optional groups. To expand LTSS coverage, states may use Section 1115 of the SSA to waive certain state plan requirements. States have used Section 1115 waivers to expand eligibility to groups beyond those the statute allows, to cap program enrollment, and to impose waiting periods prior to enrollment. States have also used Section 1115 waiver programs to modify the income- and resource-counting rules and methodologies for specified groupsâfor example, to encourage participation in managed LTSS, and to otherwise liberalize or limit income-counting rules for specified subpopulations. Moreover, states have used Section 1115 waiver authority to modify spend-down requirements, and to modify periods of retroactive eligibility and/or periods for eligibility redeterminations, among other eligibility-related purposes. Further discussion of Medicaid eligibility under these waiver programs is beyond the scope of this report. SSI-Related Pathways consist of mandatory and optional eligibility groups that meet the general requirements of the SSI program. These groups include aged, blind, or disabled individuals who are SSI eligible, deemed to be SSI eligible, or would be SSI eligible if not for a certain SSI program rule. This report organizes the SSI-Related Pathways into three subgroups, each of which contains multiple eligibility pathways: (1) SSI Recipients, (2) Special Groups of Former SSI Recipients, and (3) Other SSI-Related Groups. The pathways for SSI Recipients extend Medicaid coverage to individuals who are enrolled in the SSI program and who either receive SSI, are deemed to receive SSI, or receive only state supplementary payments (SSPs, discussed below). States are generally required to provide Medicaid coverage for SSI recipients. However, states may use more restrictive eligibility criteria than those of the SSI program if they were using such criteria in 1972. Individuals in receipt of SSI for a given month are usually eligible for Medicaid for that month. SSI recipients typically become ineligible for Medicaid whenever their cash payments are suspended or terminated. In December 2018, 8.1 million individuals received SSI or federally administered SSP. Unless states elect the option discussed in the next section, they must provide Medicaid coverage for all SSI recipients. Most states that provide Medicaid coverage for all SSI recipients do so automatically. Section 1634 of the SSA allows states to enter into an agreement with the Social Security Administration for the agency to conduct Medicaid eligibility determinations and redeterminations for SSI recipients on the state's behalf. In these states, an SSI application is also an application for Medicaid, and an SSI redetermination is also a redetermination of Medicaid eligibility. States that choose to contract with the Social Security Administration under Section 1634 of the SSA are known as \"1634 states.\" In 2019, 34 states and the District of Columbia provide Medicaid coverage for SSI recipients using this option (see Table 3 ). Some states that provide Medicaid coverage for all SSI recipients choose to conduct their own Medicaid eligibility determinations and redeterminations. These states use the same standards and methodologies of the SSI program to determine Medicaid eligibility but require SSI recipients to file a separate Medicaid application with the state or local Medicaid office. States that elect this option are known as \"SSI criteria states.\" In 2019, eight states provide Medicaid coverage for SSI recipients using this option (see Table 3 ). Under Section 1902(f) of the SSA, states have the option of applying eligibility criteria that are more restrictive than those of the SSI program in determining Medicaid eligibility for SSI recipients. However, any more restrictive eligibility criteria that are applied to SSI recipients may not be more restrictive than those contained in the state's Medicaid plan that was in effect on January 1, 1972. States that provide Medicaid coverage for only those SSI recipients who meet more restrictive eligibility criteria than SSI criteria are known as \"209(b) states,\" after the section of the Social Security Amendments of 1972 (P.L. 92-603) that established the option. In 2019, eight states provide Medicaid coverage for SSI recipients using this option (see Table 3 ). 209(b) states apply at least one eligibility criterion that is more restrictive than SSI criteria in determining Medicaid eligibility for SSI recipients, such as a stricter definition of blindness or disability, a lower income or resource standard, a less generous methodology for counting income or resources, or some combination of those factors. For example, New Hampshire imposes a longer duration-of-impairment requirement for individuals with a disability other than blindness (48 months instead of SSI's 12-month standard), and Virginia limits ownership of property contiguous to an individual's home (i.e., land other than the lot occupied by the home) to $5,000. 209(b) states may also use eligibility criteria that are more liberal than those of the SSI program under the authority provided in Section 1902(r)(2) of the SSA; however, they must retain at least one eligibility criterion that is more restrictive than SSI criteria to remain in 209(b) status. 209(b) states are required to deduct the value of SSI and any optional state supplementary payments (discussed below) from an SSI recipient's income in determining Medicaid eligibility. They must also allow SSI recipients to \"spend down\" or deduct incurred medical expenses from their income to the point where they meet the applicable income standard needed for Medicaid eligibility. Because SSI program rules form the foundation of Medicaid eligibility criteria for the ABD populations, 209(b) states may apply their more restrictive eligibility criteria to most other eligibility pathways for ABD individuals, subject to the same terms and conditions discussed above. Some states complement federal SSI payments with optional state supplementary payments (SSPs), which are made solely with state funds. SSPs are intended to help individuals whose basic needs are not fully met by the SSI federal benefit rate (FBR). States may provide SSPs to all SSI recipients, or they may limit payments to certain individuals, such as residents of domiciliary-care facilities or blind individuals. SSP amounts, standards, and methodologies are determined by the states, pursuant to certain federal requirements. States may self-administer their SSP program (i.e., state administered SSP), or they may contract with the Social Security Administration for the agency to administer the program on the state's behalf (i.e., federally administered SSP). In 2019, 44 states and the District of Columbia provide optional SSPs to some or all SSI recipients. States have the option to provide Medicaid coverage for individuals who receive only an optional SSP. Individuals receive an optional SSP, but no SSI payment, if their countable income is at least equal to the SSI income standard but less than the state-established income standard used to determine optional SSPs. The \"SSP income standard\" is effectively the combined amount of the SSI FBR and the maximum applicable SSP. For example, in 2019, the SSP income standard for a disabled individual living independently in California is $931.72 per month: the SSI FBR of $771 per month plus the maximum applicable SSP of $160.72 per month. In this case, the disabled individual would receive only an optional SSP if his or her countable income were at least $771 per month but less than $931.12 per month. In general, states must apply the same standards and methodologies to individuals under this pathway that they apply to individuals receiving SSI, including any standards or methodologies that are more restrictive than those of the SSI program in the case of 209(b) states. However, 209(b) states and SSI criteria states that self-administer their SSP program may apply a more restrictive income-counting methodology to individuals under this pathway than the one they apply to individuals receiving SSI. According to the Medicaid and CHIP Payment and Access Commission (MACPAC), 43 states and the District of Columbia provide Medicaid for individuals who receive only an optional SSP. (This pathway is closed to new enrollment and applies to relatively few people.) Section 212 of P.L. 93-66 requires nearly all states to maintain the December 1973 income levels of individuals who were transferred from the former federal-state cash assistance programs for the aged, blind, and disabled (hereinafter \"former adult assistance programs\") to the SSI program in January 1974. To receive federal Medicaid funding, states must provide a special payment, known as a mandatory SSP, to individuals who were converted from the former adult assistance programs to the SSI program if the individual's SSI payment plus other income from the current month is less than his or her December 1973 state grant amount plus certain other income. The amount of the mandatory SSP is the difference between the current SSI payment and the individual's December 1973 payment under the former adult assistance program. Section 13(c) of P.L. 93-233 requires states to provide Medicaid coverage for individuals who receive mandatory SSPs. All states (including 209[b] states) are required to provide Medicaid coverage for individuals who are enrolled in the SSI program but have earnings above certain SSI limits. Under Section 1619(a) and 1619(b) of the SSA, individuals who would continue to be eligible to receive SSI if not for their earnings may be deemed to be receiving SSI for Medicaid eligibility purposes if they continue to work and meet certain other requirements. To qualify under the 1619 provisions, individuals must have been eligible for and received SSI for at least one month before the month the 1619 determination is made. (Adults aged 65 and older may qualify for the 1619 provisions, provided they meet the SSI definition of blindness or disability.) Individuals who live in 209(b) states must also have been eligible for Medicaid in the month immediately prior to becoming eligible for 1619 status. Section 1619(a) of the SSA provides for the continuation of cash payments for disabled SSI recipients with earnings that would otherwise disqualify them from SSI. Under this provision, disabled individuals who have earnings at or above the substantial gainful activity (SGA) standard ($1,220 per month in 2019) but whose countable income is less than the SSI income standard are eligible to receive special SSI payments in lieu of regular SSI payments. (SSI does not require blind individuals to meet the SGA standard; thus, 1619[a] does not apply to blind SSI recipients.) These 1619(a) payments are calculated in the same manner as regular SSI payments and are payable for as long as an individual performs SGA and meets all other SSI eligibility criteria. In addition to providing special payments, Section 1619(a) requires all states to provide Medicaid coverage for 1619(a) recipients on the same basis as they provide Medicaid coverage for regular SSI recipients. Section 1619(b) of the SSA requires all states to provide Medicaid coverage for blind or disabled individuals who would continue to be eligible for regular SSI payments or 1619(a) payments if not for their earnings. Under this provision, blind or disabled individuals who lose SSI eligibility because their countable income exceeds the SSI income standard (or applicable SSP income standard) due to excess earnings are deemed to be receiving SSI for Medicaid eligibility purposes. To qualify under this pathway, individuals must (1) continue to be blind or disabled, (2) meet all SSI financial eligibility requirements except for earnings, (3) need Medicaid to continue working, and (4) have earnings that are considered insufficient to provide a reasonable equivalent of the benefits that would be provided if they did not have those earnings (i.e., SSI, SSP, Medicaid, and publically funded personal or attendant care). The Social Security Administration uses an annual earnings standard to determine when 1619(b) eligibility ends. The agency calculates this standard based on the sum of the amount of gross earnings that would reduce the SSI payment (or the combined amount of the SSI payment and the SSP) to zero for an individual living independently with no other income, and the state's average annual per capita Medicaid expenditures for blind or disabled SSI recipients. The standard varies from state to state, depending on the amount of the SSP (if any) and per capita Medicaid expenditures. In 2019, the annual earnings standard for disabled 1619(b) participants ranges from $27,826 in Alabama to $66,452 in Connecticut, with the median being $36,548. If an individual's annual earnings exceed the predetermined standard, then the Social Security Administration will determine his or her eligibility using an individualized standard that takes into account the person's actual Medicaid expenditures, as well as the value of any publicly funded personal or attendant care that the individual receives from a program other than Medicaid. The pathways for Special Groups of Former SSI Recipients extend Medicaid coverage to special former SSI/SSP recipients who would continue to be eligible for SSI/SSP if not for receipt of certain Social Security benefits. Special former recipients are deemed to be receiving SSI/SSP for Medicaid eligibility purposes; however, unlike 1619 participants, they no longer have a current connection to the SSI program (i.e., they have been formally terminated from the rolls). In determining Medicaid eligibility, most states must disregard the applicable Social Security benefit or increases in that benefit from the special former recipient's countable income. In most instances, 209(b) states have the option to disregard all, some, or none of the applicable Social Security benefit or increases in that benefit from the special former recipient's countable income in determining Medicaid eligibility. However, 209(b) states must provide Medicaid coverage for special former recipients on the same basis as they provide Medicaid coverage for individuals who receive SSI/SSP. Section 503 of P.L. 94-566 generally requires states to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their Social Security benefits due to COLAs. Individuals qualify under this pathway it they are receiving Social Security benefits, lost SSI/SSP but would still be eligible for those benefits if Social Security COLAs received since losing SSI/SSP were deducted from their income, and were eligible for and receiving SSI/SSP concurrently with Social Security for at least one month after April 1, 1977. 209(b) states may exclude all, some, or none of the Social Security benefit increases that caused ineligibility for SSI/SSP. This pathway is often known as the \"Pickle Amendment\" after the late Representative J.J. Pickle. (This pathway is closed to new enrollment and applies to relatively few people.) Social Security provides widow(er)'s benefits starting at age 60, or at age 50 if the individual is disabled and meets certain other criteria. The amount of the aged or disabled widow(er)'s benefit is based on the deceased insured worker's past earnings from covered employment, subject to a permanent reduction for each month of entitlement before the widow(er)'s full retirement age (65-67, depending on year of birth). Under P.L. 98-21 , lawmakers eliminated the additional reduction factor (ARF) for disabled widow(er)s aged 50-59, meaning their reduction penalty for claiming benefits before their full retirement age was capped at the percentage applicable to aged widow(er)s who first claim at age 60. All states (including 209[b] states) are required to provide Medicaid coverage for individuals who would continue to be eligible for SSI/SSP if not for increases in their widow(er)'s benefits due to the elimination of the ARF (known as \"ARF Widow[er]s\"). Individuals qualify under this pathway if they were entitled to Social Security benefits in December 1983 and received disabled widow(er)'s benefits and SSI/SSP in January 1984, lost SSI/SSP eligibility because of the elimination of the ARF, have been continuously entitled to widow(er)'s benefits since January 1984, filed for Medicaid continuation before July 1, 1988 (or a slightly later date in some cases), and would continue to be eligible for SSI/SSP if the value of the increase in disabled widow(er)'s benefits under P.L. 98-21 and any subsequent COLAs were deducted from their countable income. Disabled adult children of retired, disabled, or deceased insured workers typically qualify for Social Security disabled adult child's (DAC) benefits if they are at least age 18 and became disabled before they attained age 22. States are generally required to provide Medicaid coverage for individuals who lose eligibility for SSI/SSP due to entitlement to or an increase in DAC benefits. Individuals qualify under this pathway if they lose eligibility for SSI/SSP due to receipt of DAC benefits on or after July 1, 1987, and would continue to be eligible for SSI/SSP if not for their entitlement to or an increase in DAC benefits. 209(b) states may exclude all, some, or none of the DAC benefit or increases in that benefit that caused ineligibility for SSI/SSP. States are generally required to provide Medicaid coverage for individuals aged 50 to 64 who lose eligibility for SSI/SSP due to entitlement to Social Security widow(er)'s benefits but who are not yet entitled to Medicare Part A (Hospital Insurance). Individuals qualify under this pathway if they are at least age 50 but have not yet attained age 65, received SSI/SSP in the month before their widow(er)'s benefits began, are not entitled to Medicare Part A, and would continue to be eligible for SSI/SSP if not for their entitlement widow(er)'s benefits. Eligibility for Medicaid under this pathway continues until the individual becomes entitled to Medicare Part A. 209(b) states may exclude all, some, or none of the widow(er)'s benefit that caused ineligibility for SSP/SSI. (This pathway is closed to new enrollment and applies to relatively few people.) Section 249E of P.L. 92-603 requires states to provide Medicaid coverage for individuals who would be eligible for SSI/SSP in the absence of a Social Security COLA enacted in 1972 under P.L. 92-336. Individuals qualify under this provision if they were entitled to Social Security benefits in August 1972, were receiving cash assistance under the former adult assistance programs in August 1972 (or would have been eligible for such assistance in certain instances), and would be eligible for SSI/SSP had the COLA under P.L. 92-336 not been applied to their Social Security benefits. The pathways for Other SSI-Related Groups extend Medicaid coverage to certain individuals who were eligible for Medicaid just prior to SSI's start in 1974, and to aged, blind, or disabled individuals who would be eligible for SSI/SSP today if not for a certain requirement in those programs. Although these groups may have received SSI/SSP in the past, their eligibility for Medicaid under these pathways is not conditional on their prior receipt of such payments. (These pathways are closed to new enrollment and apply to relatively few people.) Sections 230 to 232 of P.L. 93-66 require states to provide Medicaid to three groups that were eligible for Medicaid in December 1973: (1) essential spouses, (2) institutionalized individuals, and (3) blind or disabled individuals. Essential spouses are the spouses of cash assistance recipients under the former adult assistance programs whose needs were included in determining the amount of the cash payment to the recipient. Institutionalized individuals are inpatients of medical institutions or residents of intermediate care facilities who received cash assistance under the former adult assistance programs (or who would have been eligible for such assistance if they were not institutionalized). Blind or disabled individuals are individuals who met the state-established criteria for blindness or disability under the state's Medicaid plan in December 1973. States must provide Medicaid for these groups if they continue to meet the respective eligibility criteria that were in effect in December 1973, in addition to meeting certain other requirements. States have the option to provide Medicaid coverage for aged, blind, or disabled individuals who meet the income and resource requirements for SSI/SSP but who do not receive cash payments. Individuals may be eligible for but not receiving SSI/SSP because they have not applied for benefits. According to estimates from HHS' Office of the Assistant Secretary for Planning and Evaluation, about 60% of single adults aged 18 and older who were eligible for SSI in 2015 participated in the program that year. In 209(b) states, eligibility under this pathway is determined before the deduction of any incurred medical expenses recognized under a state plan (i.e., before spend-down). Residents of public institutions are generally ineligible for SSI. However, residents of certain medical institutions are eligible for a reduced SSI payment if more than 50% of the cost of their care is paid for by Medicaid (or in the case of a child under the age of 18, by any combination of Medicaid and private health insurance). The reduced SSI payment, known as a personal needs allowance (PNA), is used to pay for small comfort items not provided by the facility. Capped at $30 per month, or $60 per month for couples in certain situations, the PNA is not indexed to inflation and has remained at its current level since July 1988. Some states supplement the PNA (i.e., provide an SSP) for institutionalized individuals who meet certain requirements. Any countable income reduces the PNA for institutionalized individuals; however, the SSI/SSP income standard is used in determining their eligibility for the SSI program. States have the option to provide Medicaid coverage for institutionalized individuals who are ineligible for SSI/SSP because of the lower income standards used to determine eligibility for the PNA but who would be eligible for SSI/SSP if they were not institutionalized. In other words, states may provide Medicaid to individuals who reside in certain Title XIX-reimbursable institutions who have countable income at or above the PNA standard ($30 for an individual) but within the SSI/SSP income standard ($771 for an individual in 2019). States are generally required to provide Medicaid coverage for aged, blind, or disabled individuals who would be eligible for SSI/SSP if not for an eligibility requirement used in those programs that is prohibited by Medicaid. For example, Section 4735 of the Balanced Budget Act of 1997 ( P.L. 105-33 ) requires states to exclude from eligibility determinations certain settlement payments made to hemophilia patients who were infected with HIV. However, federal law does not exempt such payments from being counted as income or resources under the SSI program. CMS regulations require states to provide Medicaid coverage for individuals who lost SSI eligibility because they received settlement payments. States may extend Medicaid coverage to older adults and individuals with disabilities who have higher levels of income or resources than those permitted by SSI program rules under optional aged, blind, or disabled (ABD) eligibility pathways. In addition, some optional ABD eligibility pathways allow states to choose their own methodology for counting income and resources; others permit states to use less restrictive income- or resource-counting methodologies compared with SSI rules. As previously mentioned, certain optional eligibility pathways for older adults and individuals with disabilities (e.g., Special Income Level, Special Home and Community-Based Waiver Group, Home and Community-Based Services [HCBS] State Plan, and Katie Beckett) establish eligibility to Medicaid, in general, along with Medicaid-covered LTSS. In addition, Medicaid gives states the option to extend eligibility to individuals who \"spend down\" or deplete their income on medical expenses, including LTSS, to specified levels. Therefore, some individuals with higher levels of income and resources compared with those permitted under SSI rules may be Medicaid-eligible. This section describes the following optional Medicaid eligibility pathways for ABD individuals: (1) Poverty-Related; (2) Special Income Level; (3) Special Home and Community-Based Services Waiver Group; (4) Home and Community-Based Services State Plan Option; (5) Katie Beckett; (6) Buy-In Groups; and (7) Medically Needy. Enacted under the Omnibus Budget Reconciliation Act of 1986 (OBRA '86; P.L. 99-509 ), the optional Poverty-Related eligibility pathway allows states to cover aged and/or disabled individuals who have incomes that are higher than SSI standards, with family income up to 100% of the federal poverty level (FPL), provided that the state also covers certain eligible pregnant women and children. Aged individuals are defined as being 65 years old and older, and disabled individuals must meet the SSI program's applicable definition of disability. States may employ a reasonable definition of a \"family\" for purposes of the individual's countable income. In general, states must use SSI rules in determining what income is counted or not counted. An individual's resources cannot exceed the SSI resource standard with SSI rules used in determining countable resources. However, states may use Section 1902(r)(2) of the SSA to disregard additional countable income or resources. In 2018, 24 states and the District of Columbia (DC) offered the optional Poverty-Related eligibility pathway. Seventeen states and DC had an income standard that was set at 100% of the FPL under the Poverty-Related pathway; seven maintained a more restrictive income standard than 100% of the FPL. For example, Florida's standard was 88% of the FPL, and Idaho's was 77% of the FPL. The optional Special Income Level eligibility pathway allows states to establish a higher income standard for Medicaid coverage of nursing facility services and other institutional services, sometimes referred to as the special income rule , or the \"the 300% rule.\" To be eligible for Medicaid through this pathway, individuals must require care provided by a nursing facility or other medical institution for no less than 30 consecutive days, and have an income standard that does not exceed a specified levelâno greater than 300% of the SSI FBR (i.e., the maximum SSI payment), which is approximately 222% of the FPL. Only the applicant's income (i.e., no income from spouses) is counted, and all income sources are counted in determining eligibility; there are no income disregards or deductions. For individuals seeking eligibility based on being aged 65 and older, or having blindness, or disability, the SSI resource standard and resource-counting methodology are used to determine eligibility. States may also use Section 1902(r)(2) of the SSA to disregard additional income or resources. Under the Special Income Level pathway, eligibility starts on the first of the 30 days that the individual resides in an institution. Thus, Medicaid can cover all of the care an individual receives in a nursing facility. In 2018, 42 states and the District of Columbia used the Special Income Level to enable persons to qualify for Medicaid coverage of institutional care. The Special Home and Community-Based Services (HCBS) Waiver Group eligibility pathway allows states to extend Medicaid eligibility to individuals receiving HCBS under a waiver program who require the level of care provided by a nursing facility or other medical institution. This eligibility pathway is sometimes referred to as the \"217 Group\" in reference to the specific regulatory section for this group, 42 C.F.R. Section 435.217. States use the highest income and resource standard of a separate eligibility group covered by the state plan under which an individual would otherwise qualify if institutionalized. For example, states that offer the Special Income Level pathway described above can extend eligibility to waiver program participants with income up to 300% of the SSI FBR. States must use the income- and resource-counting methodologies used to determine eligibility for this same eligibility group. States may also apply Section 1902(r)(2)'s more liberal income-counting rules to this group. States may establish an independent eligibility pathway into Medicaid through the Home and Community-Based Services (HCBS) State Plan option. This option is made available by extending the required and optional Medicaid state plan services, sometimes referred to as \"traditional\" Medicaid services, to individuals who are also receiving a targeted package of HCBS state plan services. In general, receipt of the Medicaid HCBS State Plan option is conditional on an individual having a need for long-term care (i.e., individuals must meet certain level-of-care criteria). Unlike Section 1915(c) HCBS waiver programs, which require that eligible individuals need the level of care provided in an institution (e.g., hospital or nursing facility), the HCBS state plan option delinks this requirement so that individuals with long-term care needs are not required to meet an institutional level of care need. The HCBS State Plan option was first enacted under the Deficit Reduction Act of 2005 (DRA; P.L. 109-171 ) and amended under the ACA. The income standard for the HCBS State Plan option applies to individuals who have income no higher than 150% of the FPL. For individuals who otherwise meet the requirements for an approved waiver program, the income standard can be no higher than 300% of the SSI FBR. States may choose to cover individuals under either or both income standards. Generally, states use SSI income-counting methodologies; however, states have some discretion to apply alternative methodologies, subject to the approval of the Secretary of HHS. There are no resource standards for this eligibility group, with the exception for those individuals who seek to establish eligibility based on an approved waiver program. For these individuals, states must use the same income and resource standards and counting methodologies as applied to those individuals eligible under the applicable waiver program. States may also use Section 1902(r)(2) of the SSA to disregard additional income or resources. In 2018, the most recent year for which data are available, 15 states and the District of Columbia offered at least one Section 1915(i) HCBS State Plan option; however, only two states (Indiana and Ohio) used this state plan authority as an independent eligibility pathway to Medicaid. As another option, states may choose to provide HCBS state plan services to those who are eligible for Medicaid under one of the state's existing Medicaid eligibility pathways. Enacted under the Tax Equity and Fiscal Responsibility Act of 1982 (TEFRA; P.L. 97-248 ), the Katie Beckett optional pathway provides coverage to severely disabled children whose parents' income is otherwise too high for the child to qualify for Medicaid LTSS at home. Under the Katie Beckett pathway, states may extend Medicaid coverage to disabled children who meet the applicable SSI definition of disability and who are age 18 or younger and live at home. In addition, the state must determine that (1) the child requires the level of care provided in an institution, (2) it is appropriate to provide care outside the facility, and (3) the cost of care at home is no more than institutional care. States electing this option are required to cover all disabled children who meet these criteria. States must use SSI income and resources rules to determine eligibility; however, only the child's income and resources, if any, are counted. Parents' income and resources are not counted. A child's income cannot exceed the highest income standard used to determine eligibility for any separate group under which the individual would be eligible if institutionalized. In general, states set income standards up to 300% of the SSI FBR, which is about 222% of the FPL. States may not use Section 1902(r)(2) of the SSA to use more liberal income- or resource-counting methodologies. In 2018, the most recent year for which data are available, 24 states and the District of Columbia offered the Katie Beckett pathway under their Medicaid state plan. There are several optional Medicaid Buy-In eligibility pathways for working individuals with disabilities or working families who have a child with a disability. In general, individuals eligible under Buy-In pathways would be eligible for Medicaid except for the fact that their income is higher than the income standard allowed by the SSI program under Section 1619(b) of the SSA, which varies by state. Medicaid Buy-In pathways are designed to allow disabled individuals to work and still retain their Medicaid coverage, or to use their Medicaid coverage to access wraparound services that are not covered under an employer-sponsored plan. States can also impose premiums or other types of cost-sharing requirements on eligible individuals, which can be done on a sliding scale based on income. The extent to which states impose premiums and cost-sharing varies by state. Medicaid Buy-In pathways include the BBA 97 Eligibility Group, the Basic Eligibility Group, and the Medical Improvement Group. There is also a separate Buy-In pathway for disabled children, called the Family Opportunity Act. In 2018, the most recent year for which data are available, 44 states and the District of Columbia chose to offer coverage through at least one Buy-In pathway. Enacted under Section 4733 of the Balanced Budget Act of 1997 (BBA 97; P.L. 105-33 ), this optional pathway is available to individuals with disabilities who work and have family income below 250% of the FPL, based on the size of the family. Individuals with disabilities must meet the SSI program's applicable definition of disability. Each state determines what constitutes a \"family\" for the purposes of this eligibility group. Family income is determined by applying the SSI income-counting methodology. In addition to the family income requirement, the applicant's unearned income must be less than the SSI income standard. All earned income is disregarded. An individual's countable resources must be less than or equal to the SSI resource standard using the SSI resource-counting methodology. However, states may use Section 1902(r)(2) of the SSA to disregard additional income or resources. Enacted under Section 201 of the Ticket to Work and Work Incentives Improvement Act of 1999 (TWWIIA; P.L. 106-170 ), this optional pathway is similar to the BBA 97 Eligibility Group but is available to people with higher levels of income (i.e., above 250% of the FPL). There are no federal income or resource standards for the Basic Eligibility Group; rather, states can determine the income and resource standards, including no standards, rather than using the SSI program's requirements. However, if a state chooses to establish an income and/or resource standard, SSI income- and resource-counting methodologies apply. States may use Section 1902(r)(2) of the SSA to disregard additional earned income above the SSI-earned-income disregard, including disregarding all earned income. Individuals with disabilities eligible under this pathway must be aged 16 to 64 and meet the SSI program's applicable definition of disability. The Medical Improvement Group pathway was also enacted under Section 201 of TWWIIA. For states to cover this eligibility group, they must also cover the TWWIIA Basic Eligibility Group. Individuals eligible under the Medical Improvement Group were previously eligible under the Basic Eligibility Group but lost that eligibility because they were determined to have \"medically improved,\" meaning they no longer meet the definition of disability under the SSI or Social Security Disability Insurance (SSDI) programs but continue to have a severe medically determinable impairment. Eligible individuals must be aged 16 to 64, earn at least the federal minimum wage, and work at least 40 hours per month or be engaged in a work effort that meets certain criteria for hours of work, wages, or other measures, as defined by the state and approved by the Secretary of HHS. As with the Basic Eligibility Group, states may determine the income and resource standards, including no standards, for this pathway. Similarly, states may use Section 1902(r)(2) of the SSA to disregard additional earned income above the SSI-earned-income disregard, including disregarding all earned income. Established under Section 6061 of the DRA, the Family Opportunity Act (FOA) optional pathway allows families with income up to 300% of the FPL to buy Medicaid coverage for their disabled child aged 18 or younger (states can exceed 300% of the FPL without federal matching funds for such coverage). When determining a child's Medicaid eligibility, states choosing this pathway use the SSI program's applicable definition of disability, as well as SSI's income-counting methodology for a family, based on its size. There is no resource standard or applicable resource-counting methodology. States may use Section 1902(r)(2) of the SSA to disregard additional earned income above the SSI-earned-income disregard. States must require certain parents of eligible children under the FOA optional coverage group to enroll in, and pay premiums for, family coverage through employer-sponsored insurance as a condition of continuing Medicaid eligibility for the child. The Medically Needy option is targeted toward individuals with high medical expenses who would otherwise be eligible for Medicaid except that their income exceeds the income standards for other state-covered eligibility pathways. Individuals may qualify in one of two ways: either (1) their income or resources are at or below a state established standard, or (2) they spend down their income to the state-established standard by subtracting incurred medical expenses from their income. For example, if an individual has $1,000 in monthly income and the state's income threshold is $600, then the applicant would be required to incur $400 in out-of-pocket medical expenses during a state-determined budget period before being eligible for Medicaid. Examples of medical expenses that may be deducted from income include Medicare and other health insurance premiums, deductibles and coinsurance charges, and other medical expenses included in the state's Medicaid plan or recognized under state law. For individuals who spend down to Medicaid eligibility, states select a specific time period for determining whether or not the applicant meets the spend-down obligation, often referred to as a \"budget period,\" which generally ranges from one to six months. States that choose to offer the Medically Needy option must cover pregnant women and children under the age of 18, and may choose to extend eligibility to the aged, blind, or disabled, among other groups. The Medically Needy option allows aged and disabled individuals who need expensive institutional LTSS to qualify for Medicaid nursing facility services. However, nursing facility services are optional services that states may elect to cover for Medically Needy individuals. Under the Medically Needy option, states establish the income eligibility standard; however, it may be no higher than 133â% of the state's AFDC level in 1996. Typically, the AFDC level is lower than the income standard for SSI benefits. For example, in 2015 the median Medically Needy income standard for an individual was $483 per month, or about 49% of the FPL. States use the SSI income-counting methodology for aged, blind, or disabled individuals. States also set the resource standards within certain federal requirements. For aged, blind, or disabled individuals, the resource standard is generally the same as in the SSI program. In general, states must use SSI's applicable definition of disability when determining eligibility for the disabled eligibility group. In 2018, 32 states and the District of Columbia offered coverage to the Medically Needy. Table A-1 lists selected Medicaid eligibility pathways that cover older adults and individuals with disabilities. These eligibility pathways are organized into two broad coverage groups: (1) SSI-Related Pathways and (2) Other ABD Pathways. The table includes a brief description of each pathway, the age criterion for eligibility, whether the pathway is mandatory or optional, the Social Security Act citation, and any applicable regulatory citations. Table A-2 lists the income and resource standards, as well as the counting methodology, that applies to each standard for the selected Medicaid eligibility pathways that cover older adults and individuals with disabilities. In general, standards or limits on the amount of income and resources required for eligibility are expressed in relationship to the federal poverty level (FPL) or the SSI federal benefit rate (FBR). Where applicable, the income standard is presented as a monthly dollar amount for an individual in 2019. For state-specific information on Medicaid eligibility pathways for older adults and individuals with disabilities, see the following resources: M. Musumeci, P. Chidambaram, and M. O'Malley Watts, Medicaid Financial Eligibility for Seniors and People with Disabilities: Findings from a 50-State Survey , The Kaiser Family Foundation, June 2019, https://www.kff.org/medicaid/issue-brief/medicaid-financial-eligibility-for-seniors-and-people-with-disabilities-findings-from-a-50-state-survey/ . MACPAC, MACStats: Medicaid and CHIP Data Book , Exhibit 37, pp. 109-111, December 2018, https://www.macpac.gov/wp-content/uploads/2018/12/December-2018-MACStats-Data-Book.pdf .", "summary": "Medicaid is a joint federal-state program that finances the delivery of primary and acute medical services, as well as long-term services and supports (LTSS), to a diverse low-income population. In general, individuals qualify for Medicaid coverage by meeting the requirements of a specific eligibility pathway. An eligibility pathway is the federal statutory reference that extends Medicaid coverage to certain groups of individuals. Each eligibility pathway specifies the group of individuals covered by the pathway (i.e., the categorical criteria). It also specifies the financial requirements applicable to the group (i.e., the financial criteria), including income and, sometimes, resources (i.e., assets). In addition, an eligibility pathway often dictates the services that individuals are entitled to under Medicaid. Some eligibility groups are mandatory, meaning all states with a Medicaid program must cover them; other eligibility groups are optional. Older adults and individuals with disabilities are more likely to require LTSS due to chronic disabling conditions or other functional or cognitive impairments (e.g., extended nursing facility care, personal care, and other home and community-based services). Federal policymakers have an interest in understanding Medicaid eligibility pathways for these populations, as Medicaid plays a key role in providing LTSS coverage. Generally, LTSS is not covered by Medicare or major health insurance plans in the private market. In fact, Medicaid is the largest single payer of LTSS in the United States, accounting for 42% of all LTSS expenditures in 2016 (or $154 billion). Individuals eligible for or enrolled in Medicaid who are in need of Medicaid-covered LTSS must demonstrate the need for long-term care by meeting state-based level-of-care criteria. They may also be subject to a separate set of Medicaid financial eligibility rules. This report focuses on the ways in which adults aged 65 and older and individuals with disabilities qualify for Medicaid based on their age or disability status; that is, the eligibility pathways where the categorical criteria are being aged, blind, or disabled (referred to as \"ABD\" or \"ABD eligibility\"). Individuals who qualify for Medicaid on the basis of being blind or disabled include adults under the age of 65 as well as children. Generally, ABD populations qualify for Medicaid through an eligibility pathway under one of two broad coverage groups described in this report: Supplemental Security Income (SSI)-Related Pathways and Other ABD Pathways. SSI-Related Pathways SSI is a federal program that provides cash assistance to aged, blind, or disabled individuals who have limited income and resources. SSI rules form the foundation of Medicaid eligibility criteria for ABD populations. Thus, the relationship between SSI and Medicaid is important to understanding Medicaid eligibility for ABD populations, as states are generally required to provide Medicaid coverage for SSI recipients. The SSI-Related Pathways consist of Medicaid eligibility groups that generally meet the categorical and financial criteria of the SSI program, including SSI Recipients, Special Groups of Former SSI Recipients, and Other SSI-Related Groups. Other ABD Pathways States may extend Medicaid coverage to older adults and individuals with disabilities who have higher levels of income or resources than SSI program rules permit. These optional pathways allow states to offer Medicaid eligibility to individuals receiving LTSS either in an institution or home and community-based setting; working individuals who may need LTSS to support employment; and individuals with high medical expenses who \"spend down\" or deplete their income and resources. These optional eligibility pathways, referred to as Other ABD Pathways, include the following: Poverty-Related, Special Income Level, Special Home and Community-Based Services (HCBS) Waiver Group, HCBS State Plan, Katie Beckett, Buy-In, and Medically Needy. Topics Covered in This Report This report begins with an overview of Medicaid eligibility, followed by a summary of ABD eligibility pathways (i.e., SSI-Related Pathways and Other ABD Pathways). Next, it provides information about the categorical and financial eligibility criteria for each Medicaid ABD eligibility pathway. The Appendix provides tables that include statutory references and certain financial eligibility criteria for each Medicaid ABD eligibility pathway.", "document_type": "crs"}
{"report": "Three-dimensional (3D) printing is a manufacturing process used to create real-world parts from digital 3D design files. This process is of particular relevance to Congress because of its use in federal programs; economic potential; continued applications in scientific research and development; roles in national security; and potential areas of concern, including weapons development and intellectual property law. This report describes the basic parts common to 3D printers and explains the operation of the technology. It also provides a snapshot of current materials and capabilities, traces the historical development of the technology since 1980, provides information on the federal role in 3D printing, communicates the primary properties of 3D printing with reference to manufacturing, explains secondary manufacturing impacts that stem from these properties, and highlights particular issues relevant to Congress. 3D printing is sometimes known as additive manufacturing . The term additive refers to the construction of a final part through the addition of consecutive layers of material on a build plate. In contrast, subtractive manufacturing processes carve out a final part from an initial block by removing unwanted material. Computer-controlled additive and subtractive manufacturing originated in the 1980s and 1970s, respectively. Yet, the basic techniques underlying these manufacturing methodsâthat is, addition or removal of material to create a productâhave existed for millennia. 3D printing is used in a wide variety of applications, including aerospace, medicine, defense, custom manufacturing, prototyping, art, hobbies, and education (see Table 1 ). The prices, capabilities, and dimensions of 3D printers also vary widely. For more information, see \" Current Materials and Capabilities \" section below. In general, 3D printers have five common parts: input material, print head, build plate, axes, and 3D design file (see Figure 1 ). Input material â3D-printed parts begin as input material. This material can be in the form of solid filament, pellets, liquid, or powder. Print head âThe input material is deposited at the tip of the print head. This process can occur through a variety of methods, including pushing filament or pellets through a metal extruder, using a laser to melt powder, or using a light to solidify liquid. Build plate âThe build plate is the base (flat surface) upon which the part is constructed. At the beginning of the 3D printing process, the print head is nearly touching the build plate. As more layers are added to the part, the distance between the print head and the build plate increases. Axes âThe axes move the print head relative to the build plate. This enables the 3D printer to create a particular pattern for each new layer of material. The final part is made up of the patterns in each layer, stacked on top of each other. 3D design file âThe 3D printing process is governed by a digital 3D design file. This file provides instructions to the 3D printer that describe how to move the axes, which in turn move the position of the print head relative to the build plate. The file controls exactly what patterns are produced in each layer; this determines which kind of part is produced by the 3D printer (see Figure 2 ). The prices and capabilities of 3D printers span a wide range of options. Prices vary from several hundred dollars to millions of dollars. More specifically, 3D printers at the price range of $5,000 and below (known as consumer printers ) often are designed to print plastic parts. Several different plastics are available, each with different capabilities and costs. These materials include tough nylon plastics; flexible, rubber-like plastics; plastics reinforced with carbon fiber; dissolvable plastics; clear plastics; and decorative plastics with the appearance of wood or metal. Some 3D printers in this price range can also print using materials such as ceramic or chocolate. Structural metal-infused plastic, as opposed to decorative metal-infused plastic, also can be used in 3D printers at this price range. However, structural metal-infused 3D-printed parts require additional high-temperature post-processing to burn off the plastic. This process leaves an entirely metal product behind. The necessary high temperatures for post-processing can be attained using pottery kilns, sintering machines, or other specialized devices. Commercial services are available that offer high-temperature post-processing of metal-infused 3D-printed parts. 3D printers at the price range of $5,000 and up (known as industrial printers) are able to use a wider variety of materials in an even greater variety of applications. These 3D printers can create structures that are larger, more detailed, or more reliable than structures created by consumer printers, or they can print in materials that are unavailable at lower price ranges. For example, medical biofabrication printers can print structures made of living cells. Metal 3D printers can create parts out of titanium, steel, and other metals, which may cost less than traditional subtractive machining processes. Large-format plastic 3D printers can create parts that are more than 6 feet tall. Some concrete 3D printers can manufacture the walls of an entire building. The development and growth of 3D printing can be described in three major periods. The period spanning 1980 to 2010 marks the creation of the technology, its industrial use, and the beginning of the consumer 3D printing movement. Between 2010 and 2015, the 3D printing market continued to expand, despite signs of weakening in 2014. Since 2015, prices for consumer 3D printers have fallen, while sales of consumer and industrial 3D printers have continued to rise as the technology has matured. The first major patents for 3D printing methods were filed in the 1980s, creating a nascent 3D printing market for industrial clients. In the 1990s, 3D printers using plastic, metal, paper, ceramic, and wax became available at prices from thousands of dollars to hundreds of thousands of dollars. In the early 2000s, the 3D printer market expanded into specialized industries, including medicine, dentistry, and jewelry. At the same time, new plastic printing materials were developed. The first decade of the 21 st century marked the expiration of several key 1980s 3D printing patents. In the same period, consumers gained access to improved web connectivity and user-friendly computer-aided design (CAD) tools. These factors contributed to the birth of the consumer 3D printing movement. Key developments in this movement included the formation of the open-source 3D printer community; the 2007 release of the first website for print-on-demand custom 3D prints (Shapeways); and the 2008 creation of the popular 3D printing file-sharing website Thingiverse. In 2009, MakerBot, one of the first consumer 3D printing companies, released a $750 3D printer that incorporated some of the off-patent technologies from the 1980s. The consumer market for 3D printers expanded in the 2010s, fueled in part by the continued expiration of 20 th -century patents. Offerings included branded 3D printers, unbranded kits sold on eBay, and 3D printers funded on crowdfunding sites. Prices of bare-bones consumer 3D printers fell to $500-$600. Higher-end consumer printers gained advanced features that made them easier to use and maintain. Innovations in 3D design software and improvements in printer reliability contributed to the spread of consumer and industrial 3D printers in shared makerspaces, commercial establishments, libraries, and universities. 3D file sharing also became widespread, both for paid and free models. One 3D file website, Thingiverse, had more than 2 million active users in 2015. Transmission of 3D design files occurred not only through mainstream file-sharing sites such as Thingiverse, 3DShook, and Cults but also through anonymous channels, including internet torrents (a distributed, hard-to-trace online file-sharing method). At the same time, materials for consumer and industrial 3D printers grew more diverse and were sold by more companies, helping to reduce 3D printing costs. Print-on-demand services also expanded in this period, offering a wide variety of materials, including plastics, precious metals, and ceramics. These services allowed consumers to purchase a 3D-printed part made from their own 3D design file but fabricated by a third party. Some of the early print-on-demand services offered the ability to purchase printing services from a peer-to-peer network of individually owned desktop 3D printers. The 3D printing industry began to show signs of weakening in 2014 after a period of growth and consolidation. In June 2015, Time magazine reported that the stocks of four leading 3D printing companies had \"lost between 71% and 80% of their market value in the past 17 months.\" Between January and October 2015, the 3D printing company Stratasys laid off 36% of staff in its MakerBot division. At the same time, annual grants of 3D printing-related patents more than doubled between 2010 and 2015, from 247 to 545. In 2015, industrial unit sales of 3D printers declined by 2.3% while consumer unit sales increased by 49.4%. Unit sales of both industrial and consumer 3D printers generally have shown sustained upward trends (see Figure 3 and Figure 4 ). Total 3D printing industry revenues increased year-over-year since 1993, with the exception of 2001, 2002, and 2009. On average, 3D printing industry revenues have grown annually over the past 30 years by 26.9%. The period from 2015 to 2019 has seen renewed 3D printing investment, in terms of both research and development and investment in growing companies. Corporations (such as General Electric, Google Ventures, Alcoa, and Norsk Titanium AS) and federal departments and agenciesâsuch as the Department of Defense (DOD) and the National Institutes of Health (NIH)âhave invested a combined total of hundreds of millions of dollars in 3D printing initiatives over this period. At the same time, the price of consumer 3D printers has continued to fall. As of July 2019, a basic 3D plastic printer can be purchased online for less than $150. 3D printers in the low hundred-dollar range generally can be used after simple assembly or directly out of the box. The input material for these basic 3D printers is usually a spool of plastic filament, which can be purchased for less than $9 per pound. Sales of both industrial and consumer 3D printers have continued to rise. According to one market analysis, 19,285 industrial 3D printers and 591,079 consumer 3D printers were sold in 2018 (see Figure 3 and Figure 4 ). Further, that analysis estimates that a total of more than 140,000 industrial 3D printers and 2 million consumer 3D printers have been sold worldwide. This may be an underestimation of consumer 3D printers, because it does not include those assembled from parts or those purchased as kits. 3D-print-on-demand services now serve the consumer and industrial markets. These services provide access to industrial-grade 3D printers, allowing users to create high-precision parts out of plastic or other materials. In general, individuals do not have to create their own files for 3D printing; many online databases of 3D design files are available. Users also may join online 3D printing communities, some of which have hundreds of thousands to millions of users. The Wohlers Report estimates that annual 3D printing industry revenues reached $9.975 billion globally in 2018. However, 3D printing makes up less than 1% of manufacturing revenues worldwide. Further, analysts predict that most future products will be created through traditional manufacturing methods, even when 3D printing is technologically mature. Some estimates predict that 3D printing will eventually account for 5%-10% of total global manufacturing revenues. Several issues may limit the overall effectiveness and utility of current 3D printing technologies, including quality control, cybersecurity, and relative production speed as compared to traditional manufacturing. New evaluation methods, certification programs, cybersecurity advances, and research and development programs may help to address these limiting issues. Private industry has long been the primary innovator in 3D printing technology, accounting for an estimated 90% of additive manufacturing patents through 2015. DOD's Institute for Defense Analysis (IDA) found that the federal government played a relatively small but instrumental role in the creation of 3D printing technology, providing \"direct funding for developing early phases of the technology and later refinements in two of the four processes.\" According to IDA, [Federal] support of early research ... created the knowledge, technologies, and tools later adopted in the [additive manufacturing] field and applied by inventors to develop foundational AM patents and technologies. The knowledge generated from federally sponsored [research and development] from the early 1970s influenced the patents filed in the 1980s and 1990s and later innovations. Observations from the backwards citations analysis of the foundational patents show that some of the earliest investors in AM were the Department of Defense Office of Naval Research (ONR) and the Defense Advanced Research Projects Agency (DARPA), which provided steady, continual streams of funding for both academic and industry-based researchers. NSF support was also instrumental in the development of early relevant AM research in the 1970s. The IDA report further credited federal \"support of knowledge diffusion from the foundational patents to improve the technologies and develop new applications.\" The report also noted that the National Science Foundation (NSF) participated in the development of four of six foundational 3D printing processes developed in the 1980s and 1990s. According to the 2015 report, NSF \"provided almost 600 grants for [additive manufacturing] research and other activities over the past 25 years, amounting to more than $200 million (in 2005 dollars) in funding.\" In 2012, President Obama announced the establishment of the National Additive Manufacturing Innovation Institute (NAMII) in Youngstown, OH, as a pilot institute under the National Network of Manufacturing Innovation (NNMI, now referred to as Manufacturing USA). Under NAMII, the Departments of Defense, Energy, and Commerce; the National Science Foundation; the National Aeronautics and Space Administration (NASA); 40 companies; 9 research universities; 5 community colleges; and 11 nonprofit organizations collaborated to share resources, move basic research toward product development, and provide workforce education and training. The National Center for Defense Manufacturing and Machining was selected to manage the NAMII pilot institute through a competitive selection process. In 2013, NAMII was rebranded as America Makes. The Manufacturing USA program's four stated goals are to increase the competitiveness of U.S. manufacturing; facilitate the transition of innovative technologies into scalable, cost-effective, and high-performing domestic manufacturing capabilities; accelerate the development of an advanced manufacturing workforce; and support business models that help the Manufacturing USA institutes to become stable and sustainable after the initial federal startup funding period. The Government Accountability Office (GAO) estimates that America Makes was to receive $56 million in federal funding and $85 million in nonfederal funding from August 2012 to August 2019. As of December 2018, America Makes had 225 members. Many national laboratories use 3D printing, including Oak Ridge National Laboratory, Lawrence Livermore National Laboratory, Sandia National Laboratories, Los Alamos National Laboratory, and Fermi National Accelerator Laboratory. The U.S. government also purchases 3D-printed products in several capacities; a 2016 report by the General Services Administration (GSA) notes that the Department of Defense purchases an especially wide variety of 3D-printed parts for defensive and medical purposes. The GSA offers a specific procurement subcategory for federal purchases of 3D printing technology. The federal government is involved in the creation of 3D printing standards, as well. Among other initiatives, the U.S. Air Force granted a private U.S. company $6 million in 2016 to develop standards for 3D-printed rocket engines. This grant was intended to reduce U.S. reliance on foreign-made launch vehicle components. Similarly, the Federal Aviation Administration (FAA) is working with industry organizations to develop certification methods for 3D-printed parts. The FAA published a road map in September 2018 that \"includes training and education, development of regulatory documents, Research and Development (R&D) plan and interagency communication.\" Further, the National Institute of Standards and Technology and the Food and Drug Administration operate several projects in pursuit of improved process qualification for 3D printing. At the same time, standards have been developed privately by Committee F42, a technical group formed in 2009 by ASTM International and the Society of Manufacturing Engineers. In some cases, 3D printing offers advantages when compared to traditional methods of manufacturing, such as injection molding, drilling, or welding. These benefits stem from the particular design of the technology (see \" Technical Overview \") and have changed the national security, manufacturing, and economic landscapes. The following list of properties provides an overview of ways in which 3D printing deviates from previously established manufacturing technologies. Reduced waste â In general, the additive manufacturing process uses only the approximate amount of material needed to produce a product; subtractive manufacturing processes remove materials to produce a product, which inherently generates waste. Accordingly, less input material may be wasted in additive manufacturing. To the extent that some input material is wasted in 3D printing, that material can sometimes be recycled into new stock for use in making other 3D-printed parts. Capacity to create parts with high internal complexity â 3D-printed parts are constructed layer by layer, which means complex internal geometries (such as hidden cavities or small channels) can be constructed easily. Cost-effectiveness of small production runs â 3D printers do not require significant retooling when a new or modified part is manufactured. In contrast, manufacturing technologies such as injection molding or die casting incur significant retooling costs when a part design is modified. Ease of design modification â Digital 3D design files can be easily modified and transmitted. Potential reduction in discrete parts per product â The high internal complexity of 3D-printed parts means that several distinct manufacturing processes (e.g., machining and welding) can often be integrated into a single 3D printing operation. This has supported manufacturing of parts that previously would have been impossible or prohibitively expensive. Single-piece construction can also result in parts that have fewer weak spots. Potential reduction in manufacturing costs â 3D printing provides an alternative for companies considering investments in machine tools. In some cases, 3D printing may be more cost-effective than traditional options; this is particularly true for short-run, custom, or complex parts. 3D printing may be less cost-effective for parts that would require fewer post-processing steps if manufactured using traditional methods. The smaller size of a 3D printer compared to traditional manufacturing equipment may also reduce required physical plant size and related costs. Improved prototyping abilities â Easy modification of design files, combined with the cost-effectiveness of short runs of parts, supports the ability to rapidly prototype parts using 3D printing. This rapid prototyping ability allows designs to be optimized and adjusted quickly. Potential reduction in part weight or improvement in part strengthâ The capacity to create complex internal structures using 3D printing has improved manufacturers' ability to create parts that are lighter or stronger. This has shown particular promise in the aerospace and automotive industries. Potential reduction in inventory â Large production runs usually are pursued in traditional manufacturing to minimize fixed costs per part. Often, many of the goods produced must be held in storage as inventory. The ability to create 3D-printed parts on demand may allow manufacturers to reduce their inventory of parts. Low set-up costs associated with additive manufacturing allow for smaller production runs, reducing the amount of capital tied up in inventory as well as overhead costs such as storage and insurance. Mass customization â 3D-printed parts may be individually customized on a large scale. Additive manufacturing allows for the production of unique parts, sometimes modified from a basic design, to suit the needs of individual consumers. Potential environmental efficiency â Reduced waste and the lack of a need for retooling 3D printers supports environmental efficiency in manufacturing. Energy costs also can be reduced by \"re-manufacturing\" parts using 3D printingâthat is, creating salable products by reconstructing worn-out areas of old parts, instead of manufacturing parts from entirely new input materials. Decentralized manufacturing â 3D printers can be used to develop parts in a decentralized capacity. This may reduce the time required to provide parts to consumers, as well as the cost, energy, and environmental impacts of shipping. Low barriers to entry â The comparatively low cost of 3D printing equipment may lower the barrier to entry to manufacturing. This may cause positive or negative impacts; although productivity in legal industry may increase, 3D printing also may be used to support manufacturing of contraband items, including light weapons or parts of nuclear weapons. Low barriers to entry also may create potential negative impacts for established businesses facing new competitors. 3D printing is a relatively new approach to manufacturing, and the number of 3D printers in use has expanded greatly over the past 15 years. Some industry leaders and policymakers have expressed optimism about the potential of this technology to address certain manufacturing needs. 3D printing is seen as a tool for enabling cost-effective, customized, local production of parts, and in some cases, it allows for the production of parts that cannot be made using traditional manufacturing processes. 3D printing is also seen as enabling innovation and entrepreneurship by lowering the cost of entry into manufacturing. The federal government has played an important R&D role in the development and improvement of 3D printers. In addition, some agenciesâsuch as DOD, NASA, and NIHâare using 3D printing capabilities to accomplish their missions, such as by making or acquiring parts that are no longer available, custom parts, or prototypes for testing and evaluation. As 3D printing technology matures, Congress may face a variety of related issues. Among these issues are how much funding to provide for R&D on 3D printing technology and materials; how much funding to provide for education and training activities focused on preparing scientists, engineers, technicians, and others for careers related to 3D printing; whether federal acquisition strategies need to be modified to reflect the availability of 3D-printed parts; how to ensure that U.S. regulatory agencies can appropriately address 3D printing processes and products; and whether and how the federal government can facilitate the development of industry standards and systems for testing and certification of 3D printing. One of the federal government's flagship efforts focused on 3D printing is the America Makes manufacturing institute, the first institute established as part of the Manufacturing USA program. America Makes is a public-private partnership that seeks to \"[accelerate] the adoption of additive manufacturing technologies in the United States to increase domestic manufacturing competitiveness.\" Some have raised concerns over the long-term sustainability of the Manufacturing USA institutes after their period of initial federal financial assistance, which extends for five to seven years. According to the GAO, the agency sponsors of the institutesâDepartment of Commerce, Department of Energy, and DODâ\"have taken steps to support their institutes' sustainability planning but have not developed criteria to evaluate whether institutes are on track to sustain their operations beyond the initial period of federal financial assistance.\" Institute representatives have expressed concern that the institutes may seek or accept support from foreign corporations, potentially undermining the competitiveness goals of the institutes. Congress may monitor the progress of the America Makes institute toward sustainability and consider whether the federal government should provide continuing financial support. Current bills in the 116 th Congress related to this issue include H.R. 2397 . Some have expressed concern about the potential use of 3D printing in the manufacture of firearms or other contraband material by individual criminals, criminal organizations, terrorists, or others precluded from the possession of such devices. Congress may wish to consider approaches to limiting or preventing such uses of 3D printing. Current bills in the 116 th Congress related to this issue include S. 1831 and H.R. 3265 . 3D printing may raise intellectual property (IP) issues. For example, the U.S. Army has stated that IP difficulties may impede the fabrication of 3D-printed parts in the field. A 2014 industry survey also indicated that manufacturers consider the \"threat to intellectual property\" to be a major concern created by the proliferation of 3D printing. Congress may explore how IP issues could impede the legitimate use of 3D printing, particularly its use by the federal government, and what options may be available for addressing such barriers. Current bills in the 116 th Congress related to this issue include H.R. 3313 . 3D printing is an alternative manufacturing process with particular strengths and weaknesses. Although the technology is not suitable for all types of manufacturing, it is used in a wide variety of industries, including aerospace, medicine, and custom manufacturing. 3D printing has remained in wide use by the federal government, as well. The technology is likely to grow in usage as new materials become available, material and machine costs continue to fall, and quality issues are addressed. The influences that 3D printing has on the U.S. manufacturing landscape stem from an improved capacity for relatively inexperienced users to create extremely complex parts. This may create regulatory, IP, or safety challenges. At the same time, the manufacturing abilities provided by 3D printers also promote economic development and new avenues of scientific and medical exploration. For these reasons, 3D printing is likely to offer both challenges and opportunities over the coming years.", "summary": "Three-dimensional (3D) printing, also known as additive manufacturing, is a highly flexible manufacturing process that has been used in product development and production for the past 30 years. Greater capabilities, lower prices, and an expanded range of manufacturing materials have vastly expanded adoption of 3D printers over the last decade and a half. The economic and scientific potential of this technology, as well as certain regulatory concerns (such as 3D printing of firearms), have recently increased congressional interest. 3D printers are used in a variety of industriesâsuch as aerospace, medicine, and educationâas well as in nonspecific custom prototyping. Both private industry and the federal government have supported these applications of 3D printing. Support from the federal government has included basic and applied research funding from the National Science Foundation, as well as research and development funding from mission agencies such as the Department of Defense, the National Institutes of Health, and the National Aeronautics and Space Administration. More broadly, federal support for additive manufacturing has been provided through the flagship institute of the Manufacturing USA program, the National Additive Manufacturing Innovation Institute (also known as America Makes). This consortium of industry, university, and government seeks to \"[accelerate] the adoption of additive manufacturing technologies in the United States to increase domestic manufacturing competitiveness.\" In recent years, hundreds of millions of dollarsâpublic and privateâhave been invested in 3D printing-related companies and 3D printing research and development. 3D printers span a range of alternative capabilities, print with many different kinds of materials, and are capable of building products at a variety of scales. The price of a 3D printer varies with its capabilities; machines may cost from hundreds of dollars to millions of dollars. 3D printing uses a fundamentally different process than most methods for traditional manufacturing. Much of modern manufacturing uses subtractive manufacturing processes, beginning with a block of material (e.g., a tube, a bar, or an ingot) and using a variety of tools to remove parts of the initial material to achieve a final design. 3D printers are additive, stacking up and fusing thin layer upon thin layer of a material (or materials) onto a blank platform to achieve a final design. This allows for flexibility and complexity in the manufacturing of 3D-printed items. Four primary properties of 3D printers stem from this unique additive construction method: reduced waste, capacity to create parts with high internal complexity, cost-effectiveness of small production runs, and ease of design modification. These four primary properties of 3D printers translate into several distinctive manufacturing impacts: potential reduction in discrete parts per product, potential reduction in manufacturing costs, improved prototyping abilities, potential reduction in part weight or improvement in part strength, potential reduction in inventory, mass customization, potential environmental efficiency, decentralized manufacturing, and low barriers to entry. Although these manufacturing impacts are particularly advantageous for some manufacturing activities, most experts say the current state of 3D printing tends to make the technology a poor fit for mass production of simple parts. For this reason, some have estimated that 3D printing may account for 5% to 10% of manufacturing in the long term. In general, 3D printing has been widely viewed as a driver for American economic development, national security, and combat readiness. At the same time, some have expressed concerns about potential adverse effects of this technology, such as its potential use in the manufacture of firearms or other contraband material by individual criminals, criminal organizations, or terrorists. 3D printing technology is expected to mature substantially in the coming decades to allow the use of new materials, faster production speeds, and lower costs. Prices of consumer 3D printers have fallen by about 80% over the past decade and appear poised to continue to fall. Industrial 3D printing is increasingly an essential part of the U.S. manufacturing portfolio, and it appears to be critical to the nation's upcoming advanced manufacturing strategy.", "document_type": "crs"}
{"report": "India is a federal parliamentary republic and the world's most populous democracy, with more than 1.3 billion citizens. In the spring of 2019 the country held elections to seat its 17 th Lok Sabha (House of the People), the 545-seat lower chamber of parliament and locus of Indian political power. Results were announced on May 23, with the incumbent Bharatiya Janata Party (BJP, or Indian Peoples Party) winning a sweeping and repeat victory under Prime Minister Narendra Modi. Having in 2014 become the first party to attain a parliamentary majority (52%) in 30 years, the BJP was able to expand that majority to 56% in 2019, becoming the first party to win consecutive majorities since 1971. The dynastic Indian National Congress (hereinafter, Congress Party)âwhich had dominated the country's politics from 1947 to 1977 and led a national coalition government from 2004 to 2014âagain failed to win the 10% minimum of seats required to officially lead the Lok Sabha opposition. Powerful regional and caste-based parties likewise posed no meaningful obstacles to the latest \"BJP wave.\" The Administration of President Donald Trump is seeking to expand upon a \"strategic partnership\" with India formally launched in 2005. Progress is ongoing, most notably in the area of defense and security cooperation. The U.S. Congress has been supportive of efforts to expand and deepen the bilateral partnership, formally designating India as a \"Major Defense Partner\" of the United States in 2016. Areas of engagement are broad and include an array of economic and security initiatives. Recent bilateral frictions have arisen over trade practices, religious freedom, and India's relations with Russia and Iran. A State Department release congratulated Prime Minister Modi and his ruling National Democratic Alliance (NDA) coalition for their \"decisive victory,\" and it applauded the Indian people for turning out in historic numbers and the Indian government for \"exceptional execution of this massive undertaking.\" It went on to declare that The United States and India enjoy a strong strategic partnership that stands on a foundation of shared values, extensive people-to-people ties, and a commitment to a secure and prosperous Indo-Pacific region. We look forward to working with the newly elected government on a range of important issuesâ¦. We are confident that the strong and upward trajectory of our partnership will continue. The Chairman of the House Foreign Affairs Committee also issued a laudatory statement and, in June, several Members of Congress penned an open letter to President Trump to \"highlight the continuing strategic importance of the U.S.-India relationship.\" Secretary of State Michael Pompeo met with Modi and other top Indian officials in New Delhi in June to express enthusiasm about America's \"natural strategic partner.\" President Trump has yet to visit India, and high-level engagement occurs under the rubric of a \"2+2 Ministerial Dialogue\" inaugurated in September 2018. Nevertheless, many independent observers express concern about emergent frictions and indications that the partnership is becoming dissonant. A recent substantive overview of the relationship concluded that it \"would benefit from some realism about its limitations.\" Officials in governments across the Indo-Pacific region expect the election results to bring general continuity in Indian policies. Given the instability and uncertainty that can accompany coalition governance, many likely regarded Prime Minister Modi's convincing reelection with some relief. Modi's internationalist orientation can be seen in his energetic pursuit of diplomacy with numerous major powers and regional governments. This includes though continued development of the U.S.-India strategic partnership, which is widely seen to be rooted in an array of mutually-held values and increasingly convergent visions for global order, lately conceived by Washington as a \"shared vision for a free, open, and rules-based Indo-Pacific region.\" On the economic front, Modi's reputation as a reformer and liberalizer has met with mixed reviews. Five years in office realized no major land or labor reforms or meaningful efforts to address bad bank debt that were widely anticipated. The BJP leader's assumed electoral vulnerabilitiesârelatively lackluster economic expansion (averaging below 7% annually), joblessness, rising prices, and a widely panned 2016 \"demonetization\" initiativeâdid not end up degrading his impressive political support. Most market-oriented analysts are hopeful, but not entirely confident, that a \"Modi 2.0\" government will redouble efforts to implement the kinds of economic reforms sought by the U.S. and other governments and business interests. India possesses a robust and competitive multiparty democratic system. Yet its politics also are described as \"beset by corruption\" by Freedom House, a think tank that ranks world countries on levels of political and civil liberties. In 2017, India had fallen 10 places on the Economic Intelligence Unit Democracy Index to 42 nd in the world, due in part to \"a rise of vigilantism and violence against minority communities, particularly Muslims, as well as other dissenting voices.\" For 2018, India was ranked 41 st worldwide, but its overall score was unchanged, and it maintained its designation as a \"flawed democracy\" (as did the United States). The scale of India's national election presents daunting logistical challenges, and voting was completed in seven phases. As with each iteration, the event was history's largest democratic exercise: About 880 million peopleâone-ninth of the world's populationâwere eligible to cast ballots in the country's 29 states and 7 Union Territories, including some 84 million first-time voters. More than 600 million Indians participated, for a turnout rate of 67.4%. More than 8,400 candidates and a record 669 parties vied for the Lok Sabha's 543 elected seats; 36 parties won at least one seat, as did 4 independent candidates. In addition to being history's largest democratic undertaking, India's 2019 national election was also history's most expensive: participating parties and candidates spent an estimated $8.7 billion on the campaign, more than double the 2014 spending. The BJP reportedly received nearly three-quarters of all political donations. Such massive outlays raise concerns among many about fairness: there is little transparency in India's campaign finance system, the Modi government had lifted caps on corporate donations, and the Election Commission's oversight is criticized for ineffectiveness. In the lead-up to the 2019 voting, analysts debated whether the BJP's 2014 sweep was an anomaly in a decades-long era of coalition politics in New Delhi, or marked the beginning of a new period of single-party domination as was seen under the Congress Party prior to 1989. The BJP's unexpected and even stronger showing in 2019 suggests that India's national political stage has undergone qualitative change back toward a hegemonic national party. The BJP won by securing 303 seats with more than 37% of the aggregate vote, significantly exceeding the 272 seats required for majority status, and increasing the party's seat total from 282 in the previous Lok Sabha. Their closest competitors, the Congress Party, took 52 seats with 19.5% of the national vote, a net gain of 8 seats (see Table 1 ). According to Election Commission of India data, the BJP won a majority of votes cast in 10 states, as well as in the Delhi National Capital Territory. It also took 49.6% of the votes cast in Uttar Pradesh (UP), India's most populous state. No other party was able to garner a majority of votes in any single state. While the BJP's core support in India's western and north-central \"Hindi belt\" states remained strong, and the party succeeded in expanding its appeal in the country's east, it was shut out completely in seven states, including the major southern states of Andhra Pradesh and Tamil Nadu, where regional parties prevailed. In a sign of the Congress Party's historic collapse nationally, the party failed to win a single seat in 14 states, and nearly half of the seats the party did win (23) came from India's two southernmost states, Kerala and Tamil Nadu (see Figure 1 , \"Map of Indian States\"). The newly seated Lok Sabha is, on average, younger, wealthier, and better educated than its predecessor, and the number of female members has increased to 15% (see Text Box ). Upper-caste Hindus and political families continue to enjoy disproportionately high representation, and India's large and relatively marginalized Muslim minority community of about 190 million (about 14% of the total) suffers from a declining voice in Parliament: Muslim representation in the Lok Sabha peaked at 10% in 1980 and lingered at about 6% until dropping to 4% in 2014. A net gain of three Muslim members in 2019 only slightly raised that percentage. India's parliamentarians are also notable for the numbers who face formal criminal allegations. The \"Modi 2.0\" cabinet includes some significant changes to the leadership of key Indian ministries. For the first time ever, a career diplomat, Subramanyam Jaishankar, is now External Affairs Minister, replacing BJP stalwart Sushma Swaraj. Jaishankar, until recently Foreign Secretary, is a former ambassador to both the United States and China, and is widely known in Washington as proponent and facilitator of closer U.S.-India ties. Another key new figure in the Modi cabinet is Home Minister Amit Shah, who succeeds senior BJP official Rajnath Singh, himself now holding the Defense Ministry portfolio. Also under new leadership is the Finance Ministry, where former Defense Minister Nirmala Sitharaman has become India's first female finance minister. Additionally, National Security Advisor Ajit Doval, a former intelligence chief in office since 2014 and considered a hardliner on Pakistan, was elevated to cabinet rank in 2019. India's Congress Party had hoped in 2019 to reverse its general decline after 2014. It had led a United Progressive Alliance coalition government under Prime Minister Manmohan Singh from 2004 to 2014. Party president Rahul Gandhiâson of former Prime Minister Rajiv Gandhi and grandson of Indira Gandhiâhad entered politics with apparent reluctance, winning the \"family seat\" in Amethi, UP, in 2004. Ten years later, Rahul oversaw Congress's worst electoral performance in history when the party took only 44 Lok Sabha seats, down from 206 previously. Gandhi's lackluster reputation took a new shine after the party's unexpectedly strong showing in the 2017 Gujarat state elections, and December 2018 Congress victories in three north-central states were a huge morale boost for the party, heartening potential Congress allies. During the 2019 campaign, Gandhi impressed many observers with what were described as creative policy proposals and a newly assured public speaking style. Still, going into the 2019 campaign, Congress had no significant presence in any of India's six most populous states and had shown an inability to recover in states where it had faltered. The party continued to struggle to both consolidate old alliances and to establish new ones. As put by one official from a BJP-allied regional party, the opposition had \"neither a program, nor a leader, nor a narrative.\" Gandhi suffered an embarrassing upset loss in his family's Amethi district, and the party's 2019 defeat has led to new leadership crises. The BJP and Congress are India's only truly national partiesâthey together won roughly half of all votes cast in 2009 and 2014, and their combined share rose to 57% in 2019 (attributable to a 6-point boost for the BJP). The influence of regional and caste-based partiesâalthough blunted by the BJP's outright majority victoriesâremains a crucial variable in Indian politics. Such parties now hold about one-third of Lok Sabha seats, but many of the most influential met with significant reversals in 2019. By early 2019, Narendra Modi had become the primary, if not sole target of his many electoral opponents, but no single challenger emerged. Still, the opposition's zeal to dislodge the incumbents had them ready to make unusual alliances, especially in Uttar Pradesh, where the effort failed conclusively. Other powerful regional parties experienced setbacks, most notably West Bengal's Trinamool Congress, led by Chief Minister Mamata Banerjee, which barely survived a surprise BJP surge in the key eastern state, winning 22 of 42 Lok Sabha seats to the BJP's 18 (up from 2 in 2014). Only in Odisha was a major regional partyâin this case the Biju Janata Dal of popular Chief Minister Naveen Patnaikâable to withstand the BJP onslaught. Because the BJP campaign was run largely on Narendra Modi's personal popularity rather than an explicit policy platform, it is unclear how Modi will use his mandate going forward. Since 2014, the Modi government arguably has realized some foreign policy successes compatible with U.S. interests: sustaining the partnership with the United States, solidifying the partnership with Japan, strengthening ties with Israel while making new outreach to key Persian Gulf states such as Saudi Arabia and the UAE, and articulating a vision for the Indo-Pacific region that tracks well with that of the United States. Modi has successfully projected India as the world's next big economic opportunity after China, but critics argue that he has mostly squandered an opportunity to move India into great power status, with a lack of strategic vision harming India's position vis-Ã -vis major powers and smaller neighbors, alike. Given India's myriad domestic problems, and still-limited capacity to project power, some American observers are skeptical about its near-term potential to play the role sought for it by the U.S. Congress and successive Administrations. The Modi/BJP victory has empowered the Indian leader domestically and this may provide Modi and India new opportunities on the global stage. Given Modi's reputation for favoring a \"muscular\" foreign policy, he may now be more willing to resist Chinese assertiveness and move closer to the United States. Yet troubles with the United States also could loom: Many Indian strategic thinkers say their country's national interests are well served by engaging not just with the United States but also with Russia and Iran, which could limit to New Delhi's willingness to abide what some Indian observers describe as \"America's short-term impulses.\" While New Delhi generally welcomes the U.S. \"free and open Indo-Pacific\" (FOIP) strategy, Indian leaders continue to demur from confronting China. The United States and India also seek to cooperate on energy, climate change, and space issues, and have sometimes clashing views on immigration. Trade and economic ties, an important and growing part of bilateral relations, have faced recent challenges. Prime Minister Modi's strong electoral mandate suggests India's mixed economic performance did not hurt his standing with the public, and the results may embolden the BJP to press ahead with its reform agenda with greater vigor (see Text Box , below). The Trump Administration takes issue with the U.S. trade deficit with India and \"unfair\" trade practices that restrict U.S. exports to and investment in India. Some U.S. policymakers and businesses have been disappointed that, during Modi's first term, India did not move forward with market-opening reforms as they had hoped, and instead increased tariffs and trade restrictions. For example, recent tariff hikes by New Delhi on cell phones and other products have elevated long-standing U.S. concerns about India's tariff regime, and President Trump has called India the \"tariff king.\" Other U.S. concerns include inadequate intellectual property protection and enforcement, and restrictive new rules on e-commerce and localization of certain financial data flowsâwhich affect major U.S. companies, such as Amazon, Walmart-owned Flipkart, Visa, and MasterCard. The United States and India also often have opposing stances on multilateral trade issues in the World Trade Organization. The outlook for bilateral trade relations is unclear. Both sides have taken decisive actions on simmering issues. President Trump terminated India's eligibility for the Generalized System of Preferences (GSP), effective on June 5, 2019, after determining that \"India has not assured the United States that India will provide equitable and reasonable access to its markets.\" This decision followed a U.S. investigation into India's market access practices and petitions by U.S. dairy and medical technology industries. In 2018, India was the largest beneficiary of GSP, with over one-tenth ($6.3 billion) of U.S. goods imports from India entering duty-free under the program. India, which called the eligibility termination \"unfortunate,\" announced soon after that it would impose higher retaliatory tariffs on 28 U.S. products, including almonds, apples, and walnuts, in response to U.S. Section 232 (national-security-based) steel and aluminum tariffs. During 2018, India repeatedly delayed applying retaliatory tariffs, in hopes of negotiating a resolution of bilateral trade issues. In late June, President Trump called India's 2019 imposition of retaliatory tariffs \"unacceptable\" and said they \"must be withdrawn.\" At the June 2019 G-20 Summit, the two sides appeared to strike a more conciliatory tone. President Trump said a \"very big\" trade deal would be coming with India. According to India's foreign secretary, the \"trade ministers of both countries would meet at an early date and would try to sort out these issues.\" Yet lack of progress in recent months reportedly is prompting the Administration to consider launching a Section 301 investigation of India's trade practicesâthis would make India the focus of the next major, in-depth investigation of unfair trade practices after China. On one hand, Section 301 could be a new way to address long-standing issues of U.S. concern with respect to India. On the other hand, it could raise the risk of protracted bilateral trade tensions and tit-for-tat escalation of tariffs across many economic sectors. Continuity in India's leadership may lead to continued rapid development of U.S.-India security cooperation, with U.S. leaders hoping that increased Indian capabilities will provide greater net security regionally and worldwide (in spite of some U.S. concerns about New Delhi's ties with Moscow). President Obama and Congress recognized India as a \"major defense partner\" (MDP) in 2016, a unique designation allowing India to receive license-free access to dual-use American technologies. The MDP designation was created in large part to carry over a presumption of license approvals into the new U.S. administration. It was linked to India's joining the four major multilateral export control regimes to become eligible to receive licensing for the most advanced defense systems the United States exports. In mid-2018, India received Strategic Trade Authorization Tier-1 status, putting it on par with NATO allies, and the two countries concluded a long-sought Communications, Compatibility, and Security Agreement (COMCASA), a military-to-military \"enabling agreement.\" The two governments also seek expanded collaboration via the Defense Technology and Trade Initiative, launched in 2012, which aims to facilitate greater defense trade and technology sharing. India participates in formalized \"quadrilateral consultations\" with the United States, Japan, and Australia while downplaying prospects that the \"Quad\" may become a security-related architecture. Defense trade is a leading facet of the bilateral partnership. India is now a major purchaser in the global arms market and a lucrative potential customer for U.S. companies. The two nations have signed defense contracts worth about $15 billion since 2008, up from $500 million in all previous years combined. Washington seeks to identify sales that can proceed under the technology-sharing and co-production model sought by New Delhi while also urging reform in India's defense offsets policy. Since 2002, the United States and India have held a series of increasingly complex combined bilateral exercises involving all military servicesâIndia now conducts more exercises and personnel exchanges with the United States than with any other country. A first-ever tri-service exercise is set for later in 2019. Bilateral intelligence and counterterrorism cooperation has accelerated over the past decade. In addition to intelligence sharing, homeland security cooperation has included growing engagement between respective law enforcement agencies, especially in the areas of mutual legal assistance and extradition, and on cyberterrorism and cybersecurity. Terrorist groups operating from Pakistani territory are of special interest. India broadly endorses the FOIP strategy pursued by Washington, and it benefits from the higher visibility this strategy provides for India's global role and for its immediate region. Yet India has not fully relinquished the \"nonalignment\" posture it maintained for most of the Cold War (more recently pursuing \"strategic autonomy\" or a \"pragmatic and outcome-oriented foreign policy\" ). Thus, Modi has articulated a vision of a free, open, and inclusive Indo-Pacific, and India remains wary of joining any nascent or potential security architectures that could antagonize Beijing. India-China . Modi's win likely means a continuation of New Delhi's multilateralist/multipolar approach to international politics in Asia, as well as efforts to resist Chinese \"assertiveness\" in South Asia. India's relations with China have been fraught for decades, with signs of increasing enmity in recent years. Areas of contention include major border and territorial disputes, China's role as Pakistan's primary international benefactor, the presence in India of the Dalai Lama and a self-described Tibetan \"government,\" and China's growing presence in the Indian Ocean region, which many Indians view as an encroachment in their neighborhood. New Delhi is ever watchful for signs that Beijing seeks to \"contain\" Indian influence both regionally and globally. China's BRIâwith \"flagship\" projects in Pakistanâis taken by many in India (and elsewhere) as an expression of Beijing's hegemonic intentions. India-Pakistan . The United States has long sought to assist in reducing India-Pakistan conflict and its impact on developments in Afghanistan. A surge of Indian nationalism grew out of a February 2019 international crisis involving Pakistan. Coming just weeks before voting began in India, the confrontation was widely seen to have boosted Modi's electoral prospects. In contrast to his 2014 inauguration, when Pakistan's then-prime minister was an invited guest, Modi in 2019 omitted Pakistani Prime Minister Imran Khan from swearing-in festivities. It is unclear if the Indian leader will seek to use his political capital to launch a new peace initiative with Islamabad or will continue pursuing punitive policies that aim to isolate Pakistan internationally. Some analysts contend that Modi now has sufficient standing to change tack. Others, however, suggest that his reelection \"will be projected as a vindication of his belligerent policy toward Pakistan.\" India-Russia . India maintained close ties with Russia throughout much of the Cold War and continues to rely on Moscow for the bulk of its defense imports. With the 2017 enactment of the Countering America's Adversaries Through Sanctions Act ( CAATSA, P.L. 115-44 ) in U.S. law , India's continued major arms purchases from Russiaâmost prominently a current multi-billion-dollar deal to purchase the Russian-made S-400 air defense systemâcould trigger U.S. sanctions. Although Congress subsequently provided for a national security waiver of these sanctions, the Administration has consistently counseled India to cancel the purchase and consider U.S.-supplied alternatives , while New Delhi insists that it will go forward in pursuit of its own national interest , a position possibly hardened with the BJP mandate . India-Iran . India has historically friendly relations with Iran, a country that lately has supplied about 30% of India's energy imports. It also opposes any potential acquisition of nuclear weapons by Iran and supports the Joint Comprehensive Plan of Action. Historically averse to unilateral (non-U.N.) sanctions, New Delhi until recently enjoyed exemption from U.S. efforts targeting Iran's energy sector. In April 2019, the Trump Administration ended such exemptions, and New Delhi has issued conflicting statements about its cessation of Iranian oil purchases while informing Washington that such cessation \"comes at a cost.\" Continued tensions in the Persian Gulf and/or a longer-term boycott of Iranian oil could be disruptive to the Indian economy; Modi's strong mandate could place limits on his willingness to abide such disruption. Other Notable Relations . The Trump Administration's South Asia strategy has included calls for greater Indian involvement in Afghanistan, even as such engagement vexes Pakistan (New Delhi has committed about $3 billion to Afghan reconstruction to date). Islamabad is wary of the Indian presence in Afghanistan and accuses New Delhi of supporting anti-Pakistan groups there, a dynamic that can in turn affect U.S. efforts to sustain Pakistan's help in facilitating Afghanistan reconciliation. Many analysts expect India-Afghanistan ties to grow stronger with Modi's reelection, and New Delhi appears wary of any precipitous U.S. withdrawal from Afghanistan. Meanwhile, India's deepening \"strategic partnership\" with Japan is a major aspect of New Delhi's broader \"Act East\" policy and a key axis in the greater FOIP strategies broadly pursued by all three governments participating in a newly established U.S.-Japan-India Trilateral Dialogue. Prime Minister Modi appears to have a convivial personal relationship with his Japanese counterpart and bilateral ties are seen as likely to strengthen going forward. While Prime Minister Modi and his party have long sought to emphasize development and good governance, the 2019 election cycle revolved around nationalism and other emotive issues, with many observers arguing that Hindu majoritarianism is a threat both to India's religious minorities and to the country's syncretic traditions. According to the U.S. State Department and independent watchdogs, India is the site of numerous human rights violations, many of them serious and some perpetrated, or at least tolerated, by state actors. Many observers are concerned about the impact of growing religious bigotry and Hindu nationalism on human rights. The BJP is an openly Hindu nationalist party and Prime Minister Modi is a self-avowed Hindu nationalist. In 2005, Modi was denied a U.S. visa over concerns about his role in government during lethal anti-Muslim violence in 2002. Modi hit conciliatory notes in a national address three days after the 2019 election results were announced, vowing to seek the trust of minority groups and to work for the good of all Indians. Human rights nongovernmental organizations and social service groups have seen their Indian operations constrained in recent years, and observers are watching closely for signs that the Modi/BJP mandate will lead to renewed efforts toward Hindu nationalist goals. Some of theseâincluding laws preventing religious conversions and cow slaughterâcontinue to cause sparks in U.S.-India relations, including explicit BJP criticism of the U.S. government for alleged \"bias\" against Modi. Future moves by the Modi government on other \"Hindutva\" policies could increase national divisions and lead to further international opprobrium.", "summary": "India, a federal republic and the world's most populous democracy, held elections to seat a new lower house of parliament in April and May of 2019. Estimates suggest that more than two-thirds of the country's nearly 900 million eligible voters participated. The 545-seat Lok Sabha (People's House) is seated every five years, and the results saw a return to power of the Bharatiya Janata Party (BJP) led by Prime Minister Narendra Modi, who was chief minister of the west Indian state of Gujarat from 2001 to 2014. Modi's party won decisivelyâit now holds 56% of Lok Sabha seats and Modi became the first Indian leader to win consecutive majorities since Indira Gandhi in 1971. The United States and India have been pursuing an expansive strategic partnership since 2005. The Trump Administration and many in the U.S. Congress welcomed Modi's return to power for another five-year term. Successive U.S. Presidents have deemed India's growing power and influence a boon to U.S. interests in Asia and globally, not least in the context of balancing against China's increasing assertiveness. India is often called a preeminent actor in the Trump Administration's strategy for a \"free and open Indo-Pacific.\" Yet there are potential stumbling blocks to continued development of the partnership. In 2019, differences over trade have become more prominent, and India's long-standing (and mostly commercial) ties to Russia and Iran may run afoul of U.S. sanctions laws. Additionally, India maintains a wariness of U.S. engagement with Pakistan and intentions in Afghanistan, with Islamabad presently facilitating a U.S.-Taliban dialogue and India counseling against a precipitous U.S. withdrawal from Afghanistan. Prime Minister Modi's return to power promises broad continuity, even with some notable changes to the federal cabinet. By many accounts, Modi's record as an economic reformer and liberalizer is mixed, and his reputation as a nationalist \"watchman\" has not always translated into effective foreign policy, according to some analysts. It is unclear if Modi will use his renewed domestic political mandate to pursue more assertiveness internationally, possibly in ways that challenge U.S. preferences. Still, most analysts contend that Modi and the BJP have been and will continue to be more open to aligning with U.S. regional strategy and more energetic in pursuing U.S.-favored economic reforms than would have been any alternative Indian leadership. The BJP is a Hindu nationalist party, born in 1980 of a larger social movement, and Narendra Modi is a self-avowed Hindu nationalist (India is roughly 79% Hindu and 14% Muslim). The 2019 Modi-BJP campaign was widely criticized for divisiveness, and nationalist fervor following a February India-Pakistan crisis may have benefitted the BJP at the polls. India's minority communities and the country's civil society are widely reported to be under increasing threats emanating from Hindu majoritarian policies and sentiment. These threats can take violent and repressive forms, at times with the involvement of Indian officials or political figures, as reported by the U.S. State Department and independent human rights watchdogs, and as criticized by some Members of Congress. This report reviews the recent Indian election process and results, the country's national political stage, and possible implications for U.S. interests in the areas of bilateral economic and trade relations, defense and security ties, India's other foreign relations, and human rights concerns.", "document_type": "crs"}
{"report": "Y oung people who have spent time in foster care as teenagers often face challenges during the transition to adulthood. Compared to their counterparts in the general population, these youth fare poorly in education, employment, and other outcomes. The federal government recognizes that foster youth may ultimately return to the care of the state as adults through the public welfare, criminal justice, or other systems. In response, federal policy has focused on supporting youth while they are in foster care and in early adulthood. This report provides background to Congress on teens and young adults in and exiting from foster care, and the federal support available to them. It begins with a discussion of the characteristics of youth who have had contact with the child welfare system, including those who entered care and those who exited care via \"emancipation.\" This process means that youth reached the state legal age of adulthood without being reunified with their families or placed in new permanent families. The report then discusses child welfare programs authorized under Title IV-E of the Social Security Act—specifically the Foster Care Maintenance Payments Program (\"foster care program\") and the John H. Chafee Program for Successful Transition to Adulthood (\"Chafee program\")—that are intended to help prepare youth for adulthood. The foster care program provides reimbursement to states for providing foster care, including, at state option, to youth between the ages of 18 and 21. It also includes certain requirements that are intended to support older youth in care. The Chafee program is the primary federal program that funds supportive services for teens and young adults during the transition from foster care. The text box below summarizes recent developments in the Chafee program. Appendix A includes funding data for the Chafee program. Appendix B includes a summary of other federal programs, outside of child welfare law, that address older youth in foster care and those who have aged out. Children and adolescents can come to the attention of state child welfare systems due to abuse, neglect, or other reasons such as the death of a parent or child behavioral problems. Some children remain in their own homes and receive family support services, while others are placed in out-of-home settings. Such settings usually include a foster home, the home of a relative, or group care (i.e., non-family settings ranging from those that provide specialized treatment or other services to more general care settings or shelters). A significant number of youth spend at least some time in foster care during their teenage years. They may stay in care beyond age 18, typically up to age 21, if they are in a state that extends foster care. The U.S. Department of Health and Human Services (HHS), which administers child welfare funding, collects data from states on the number and characteristics of children in foster care. On the last day of FY2017, approximately 122,000 youth ages 13 through 20 comprised 27% of the national foster care caseload. Youth ages 13 through 20 made up 28% of the exits from foster care in FY2017. Most of these youth were reunified with their parents or primary caretakers, adopted, or placed with relatives. However, 19,945 youth aged out that year, or were \"emancipated\" because they reached the legal age of adulthood in their states, usually at age 18. Youth who spend their teenage years in foster care and those who age out of care face challenges as they move to early adulthood. While in care, they may miss opportunities to develop strong support networks and independent living skills that their counterparts in the general population might more naturally acquire. Even older foster youth who return to their parents or guardians can still face obstacles, such as poor family dynamics or a lack of emotional and financial support, that hinder their ability to achieve their goals as young adults. These difficulties are evidenced by the fact that youth who have spent at least some years in care during adolescence exhibit relatively poor outcomes across a number of domains. Two studies—the Northwest Foster Care Alumni Study and the Midwest Evaluation of the Adult Functioning of Former Foster Youth—have tracked these outcomes. The Northwest Foster Care Alumni Study and the Midwest Evaluation of the Adult Functioning of Former Foster Youth have tracked outcomes for a sample of foster youth across several areas and compared them to those of youth in the general population. The studies indicate that youth who spent time in foster care during their teenage years tended to have difficulty as they entered adulthood and beyond. The Northwest Study was retrospective; it looked at the outcomes of young adults who had been in foster care and found that they were generally more likely to have mental health and financial challenges than their peers. They were just as likely to obtain a high school diploma but were much less likely to obtain a bachelor's degree. The Midwest Evaluation followed youth over time to examine the extent to which outcomes in early adulthood are influenced by the individual characteristics of youth or their out-of-home care histories. The study examined the outcomes of youth who were in foster care at age 17, and tracked them through age 26. Compared to their counterparts in the general population, youth in the Midwest study fared poorly in education, employment, and other outcomes. Despite these findings, many former foster youth have overcome obstacles, such as limited family support and financial resources, and have met their goals. For example, youth in the Northwest study obtained a high school diploma or passed the general education development (GED) test at close to the same rates as 25 to 34 year olds generally (84.5% versus 87.3%). Further, youth in the Midwest Evaluation were just as likely as youth in the general population at age 23 or 24 to report being hopeful about their future. States have reported to HHS since FY2010 on the characteristics and experiences of certain current and former foster youth through the National Youth in Transition Database (NYTD). Among other data, states must report on a cohort of foster youth beginning when they are age 17, and then later at ages 19 and 21. Information is collected on a new group of foster youth at age 17 every three years. While the first cohort of NYTD respondents had some positive outcomes by age 21, about 43% reported experiencing homelessness by that age and over one-quarter had been referred for substance abuse assessments or counseling at some point during their lifetimes. States must also report on the supports that eligible current and former foster youth—generally those ages 14 to 21, and sometimes older—receive to support their transition to adulthood. An analysis of NYTD data for FY2015 found that less than a quarter of youth who received a transition service received services for employment, education, or housing. The Children's Bureau at HHS' Administration for Children and Families (ACF) administers programs that are targeted to foster youth and authorized under Title IV-E of the Social Security Act, including the federal foster care program and the Chafee program (which includes the Education and Training Voucher (ETV) program). Under the federal foster care program, states may seek reimbursement for youth to remain in care up to age 18, or up to age 21 at state option. In addition, the program has protections in place to help meet the needs of older youth. Title IV-E entitlement (or mandatory) funding for foster care is authorized on a permanent basis (no year limit) and is provided in annual appropriations acts. Congress typically provides the amount of Title IV-E foster care funding (or \"budget authority\") that the Administration estimates will be necessary for it to provide state or other Title IV-E agencies with the promised level of federal reimbursement for all of their eligible Title IV-E foster care costs under current law. Separately, the Chafee program provides funding to states for services and supports to help youth who are or were in foster care make the transition to adulthood. It is available up to age 21 (or age 23 under certain circumstances). The ETV component includes a separate authorization for discretionary funding to support Chafee-eligible youth in attending an institution of higher education for up to five years (consecutive or nonconsecutive) until they reach age 26. Chafee program funding is mandatory and has no year limit. The ETV program is funded through discretionary appropriations, also with no year limit. Figure 1 summarizes the programs and the Title IV-E requirements on older youth in foster care and those leaving foster care. Any state, territory, or tribe seeking federal funding under Title IV-E must have a federally approved Title IV-E plan that meets all the requirements of the law. As discussed in Appendix B , other federal programs are intended to help current and former youth in foster care make the transition to adulthood. Federal law authorizes funding for states and local jurisdictions to provide workforce support and housing to this population. States must also provide Medicaid coverage to youth who age out of foster care until they reach age 26. Federal support is available to assist youth in pursuing higher education. Historically, states have been primarily responsible for providing child welfare services to families and children. When a child is in out-of-home foster care, the state child welfare agency, under the supervision of the court (and in consultation with the parents or primary caretakers in some cases), serves as the parent and makes decisions on the child's behalf to promote his/her safety, permanence, and well-being. In most cases, the state relies on public and private entities to provide these services. The federal government plays a role in shaping state child welfare systems by providing funds, which are linked to certain requirements under Title IV-E of the Social Security Act. Title IV-E requires states to follow certain case planning and management practices for all children in care ( Figure 1 shows these requirements related to youth in foster care). Though not discussed in this report, Title IV-B of the Social Security Act, which authorizes funding for child welfare services, includes provisions on the oversight of children in foster care and support for families more broadly. The federal foster care program reimburses states and some territories and tribes (hereinafter, \"states\") for a part of the cost of providing foster care to eligible children and youth who have been removed by the state child welfare agency due to abuse or neglect. The courts have given care and placement responsibility to the state. Under the program, a state may seek partial federal reimbursement to \"cover the cost of (and the cost of providing) food, clothing, shelter, daily supervision, school supplies, a child's personal incidentals, liability insurance with respect to a child, and reasonable travel to the child's home for visitation and reasonable travel for the child to remain in the school in which the child is enrolled at the time of placement.\" Federal reimbursement to states under Title IV-E may be made only on behalf of a child who meets multiple federal eligibility criteria, including those related to the child's removal and the income and assets of the child's family. For the purposes of this report, the most significant eligibility criteria for the federal foster care program are the child's age and placement setting. States may also seek reimbursement on behalf of Title IV-E eligible children for costs related to administration, case planning, training, and data collection. Beginning with FY2020, states can seek federal support for up to 12 months of (1) in-home parent skills-based programs and (2) substance abuse and mental health treatment services for any child a state determines is at \"imminent risk\" of entering foster care, any pregnant or parenting youth in foster care, and the parents or kin caregivers of these children. Also as of FY2020, any state electing to provide these prevention services and programs under its Title IV-E program will be entitled to receive federal funding equal to at least 50% of its cost, as long as the services and programs meet certain evidence-based standards, and the spending is above the state's maintenance of effort (MOE) level. Since FY2011, states have had the option to seek reimbursement for the cost of providing foster care to eligible youth until age 19, 20, or 21. These youth must be completing high school or a program leading to an equivalent credential, enrolled in an institution that provides post-secondary or vocational education, participating in a program or activity designed to promote or remove barriers to employment, employed at least 80 hours per month, or exempted by their state from these requirements due to a medical condition as documented and updated in their case plan. In program guidance, HHS advised that states can make remaining in care conditional upon whether youth are eligible under only specified eligibility criteria. For example, states could extend care only to those youth enrolled in post-secondary education. Still, the guidance advises that states should \"consider how [they] can provide extended assistance to youth age 18 and older to the broadest population possible consistent with the law to ensure that there are ample supports for older youth.\" In other guidance, HHS has advised that youth can remain in foster care at this older age even if they are married or enlist in the military. As of May 2019, HHS had approved Title IV-E state plans for 28 states, the District of Columbia, and nine tribal nations to extend the maximum age of federally funded foster care (see Figure 2 ). In general, the jurisdictions make foster care available to youth until they reach age 21 (except for Indiana, which extends foster care until age 20) and allow them to remain in care under any of the eligibility conditions specified in law (except for Tennessee, West Virginia, Wisconsin, the Eastern Band of Cherokee, and the Penobscot Indian Nation). A recent survey conducted by Child Trends, a nonprofit research organization, found that youth who are eligible to remain in care typically decide to leave earlier than the maximum age for foster care in their state by one to three years. HHS has advised that young people can leave care and later return before they reach the maximum age of eligibility in the state (with certain requirements pertaining to how long youth can leave for and remain eligible for foster care maintenance payments). In addition, state and tribal child welfare agencies can choose to close the original child abuse and neglect case and reopen the case as a \"voluntary placement agreement\" when the young person turns 18 or if they re-enter foster care between the ages of 18 and 21. In these cases, the income eligibility for Title IV-E would be based on the young adult's income only. HHS has further advised that states can extend care to youth ages 18 to 21 even if they were not in foster care prior to 18, but are not required to do so. Federal reimbursement of part of the costs of maintaining children in foster care may be sought only for children placed in foster family homes or child care institutions. Title IV-E does not currently include a definition of \"foster family\"; however, as of FY2020 the following definition of \"foster family home\" will go into effect: the home of an individual who is licensed as a foster parent, and who is residing with and providing 24-hour substitute care for not more than six children (with some exceptions) placed in foster care in the individual's licensed home. A \"child care institution\" is defined in law as a private institution, or a public institution that accommodates no more than 25 children, that is approved or licensed by the state. However, if a child in foster care is at least 18 years old, he/she may be placed in a \"setting in which the individual is living independently\" that meets standards established by the HHS Secretary (it does not have to meet state licensing rules). A child care institution may never include \"detention facilities, forestry camps, training schools, or any other facility operated primarily for the detention of children who are determined to be delinquent.\" In program instructions issued by HHS, the department stated that it did not have plans to issue regulations that describe the kinds of living arrangements considered to be independent living settings, how these settings should be supervised, or any other conditions for a young person to live independently. The instructions advised that states have the discretion to develop a range of supervised independent living settings that \"can be reasonably interpreted as consistent with the law, including whether or not such settings need to be licensed and any safety protocols that may be needed.\" States appear to allow youth ages 18 and older to live in a variety of settings. For example, Florida defines an independent living setting as a licensed foster home, licensed group home, college dormitory, shared housing, apartment, or other housing arrangement if the arrangement is approved and is acceptable to the youth, with the first choice being a licensed foster home. Federal child welfare provisions under Title IV-B and Title IV-E of the Social Security Act require state child welfare agencies, as a condition of receiving funding under these titles, to provide certain case management services to all children in foster care. These include monthly case worker visits to each child in care; a written case plan for each child in care that documents the child's placement and steps taken to ensure his/her safety and well-being, including by addressing their health and educational needs; and procedures ensuring a case review is conducted at least once every six months by a judge or an administrative review panel, and at least once every 12 months by a judge or administrative body who must consider the child's permanency plan. As part of the annual hearing, the court or administrative body must ensure that the permanency plan addresses whether—and, as applicable, when—the child will be returned to his/her parents, placed for adoption (with a petition for termination of parental rights filed by the Title IV-E agency), referred for legal guardianship, or placed in another planned permanent living arrangement. A court or administrative body may determine that a child's permanency plan is \"another planned permanent living arrangement\" only if the Title IV-E agency documents for the court a compelling reason why every other permanency goal is not in the child's best interest. Further, the court or administrative body conducting the hearings is to consult, in an age-appropriate manner, with the child regarding the proposed permanency plan or transition plan. As shown in Figure 1 , certain other provisions in Title IV-E apply to youth ages 14 and older. For example, the written case plan must include a description of the programs and services that will help the child prepare for a successful transition to adulthood. The John H. Chafee Foster Care Program for Successful Transition to Adulthood, authorized under Section 477 of Title IV-E of the Social Security Act, provides services to older youth in foster care and youth transitioning out of care. This section provides an overview of the program, as well as information about program eligibility, youth participation, program administration, funding, data collection, and training and technical assistance. The Foster Care Independence Act of 1999 ( P.L. 106-169 ) replaced the prior-law Independent Living Program that was established in 1986 ( P.L. 99-272 ). The 1999 law created the John H. Chafee Foster Care Independence program and doubled the annual mandatory funds available to states for independent living services from $70 million to $140 million. It also established new purpose areas, activities to be funded, and related requirements. The program has been amended five times, to (1) add the Education and Training Voucher (ETV) program for funding higher education opportunities ( P.L. 107-133 ), (2) expand eligibility for the Chafee and ETV programs to youth who exit foster care at age 16 or older for adoption or kinship guardianship ( P.L. 110-351 ), (3) ensure that foster youth are informed about designating others to make health care treatment decisions on their behalf ( P.L. 111-148 ), (4) increase funding for the Chafee program and add a purpose area about supporting activities that are developmentally appropriate ( P.L. 113-183 ), and (5) change data collection requirements and multiple purpose areas that address program eligibility ( P.L. 115-123 ). The purposes of the Chafee program are to support all youth who have experienced foster care at age 14 or older in their transition to adulthood through transitional services such as assistance in obtaining a high school diploma and post-secondary education, career exploration, vocational training, job placement and retention, training and opportunities to practice daily living skills (such as financial literacy training and driving instruction), substance abuse prevention, and preventive health activities (including smoking avoidance, nutrition education, and pregnancy prevention); help youth who have experienced foster care at age 14 or older achieve meaningful, permanent connections with a caring adult; help youth who have experienced foster care at age 14 or older engage in age- or developmentally appropriate activities, positive youth development, and experiential learning that reflects what their peers in intact families experience; provide financial, housing, counseling, employment, education, and other appropriate support and services to former foster care youth between the ages of 18 and 21 (or up to age 23 in states that have extended foster care to age 21 using federal, state, or other funds, as determined by the HHS Secretary) to complement their own efforts to achieve self-sufficiency and to ensure that program participants recognize and accept their personal responsibility for preparing for and then making the transition from adolescence to adulthood; make education and training vouchers, including postsecondary training and education, available to youth who have aged out of foster care; provide Chafee-funded services to youth who have left foster care for kinship guardianship or adoption after turning 16; and ensure that youth who are likely to remain in foster care until age 18 have regular, ongoing opportunities to engage in age- or developmentally appropriate activities. States may use Chafee funding to provide supports that are described in the purpose areas and other parts of the law. They may dedicate as much as 30% of their program funding toward room and board for youth ages 18 to 21 (or up to age 23 in states that have extended foster care to age 21 using federal, state, or other funds, as determined by the HHS Secretary). Room and board are not defined in statute, but they typically include food and shelter, and may include rental deposits, rent payments, utilities, and the cost of household startup purchases. Chafee funds may not be used to acquire property to provide housing to current or former foster youth. As described in HHS guidance, states may use Chafee funding to establish trust funds for youth eligible under the program. The Chafee program authorizes discretionary funding for the ETV program at $60 million annually, with no end year specified. The program is intended to provide financial support for the cost of attendance to Chafee-eligible youth enrolled at an institution of higher education, as defined by the Higher Education Act of 1965 (HEA), either on a full-time or part-time basis. The law refers to this support as a \"voucher,\" which must not exceed the lesser of $5,000 or the cost of attendance. Youth are eligible to receive ETVs for five years until age 26, regardless of whether they attend in consecutive years or not and are making satisfactory progress toward completion of their program. Funding received through the ETV program does not count toward the student's expected family contribution, which is used by the federal government to determine a student's need for federal financial aid. However, the total amount of education assistance provided under the ETV program and other federal programs may not exceed the total cost of attendance, and students cannot claim the same education expenses under multiple federal programs. The state child welfare agency is to take appropriate steps to prevent duplication of benefits under the Chafee ETV program and other federal programs, and to coordinate the program with other appropriate education and training programs. A current fiscal year's ETV funds may not be used to finance a youth's educational or vocational loans incurred prior to that year. To be eligible for Chafee and ETV funds, a state must submit a five-year plan (as part of what is known as the Child and Family Service Plan, or CFSP, and annual updates to that plan via the Annual Progress and Service Report, or APSR) to HHS that describes how it intends to carry out its Chafee-funded program. The plan must be submitted on or before June 30 of the calendar year in which it is to begin. States may make amendments to the plan and notify HHS within 30 days of modifying it. HHS is to make the plans available to the public. The Chafee program addresses eligibility under the purpose areas and in provisions on the ETV program. The program, including the ETV program, is available to youth in foster care between the ages of 14 and 21; who aged out of foster care and are between the ages of 18 and 21 (or up to age 23 in states that extend foster care to age 21); who left foster care at age 16 or older for kinship guardianship or adoption until they reach age 21 (or up to age 23 in states that extend care to age 21); who had been in foster care between the ages of 14 and 21 and left foster care for some other reason besides aging out of foster care, kinship guardianship, or adoption; and who are likely to remain in foster care until age 18 years (see the purpose area about \"regular, ongoing opportunities to engage in age- or developmentally appropriate activities\"). The Chafee program requires states to ensure that Chafee-funded services serve children of \"various ages\" and in \"various stages of achieving independence\" and use objective criteria for determining eligibility for benefits and services under the program. Former foster youth continue to remain eligible until age 21 (or age 23, if applicable) for services if they move to another state. The state in which the former foster youth resides—whether or not the youth was in foster care in that state—is responsible for providing independent living services to him/her. The number of youth who receive independent living program assistance from Chafee funds and other sources (state, local, and private) is collected by HHS via states through the National Youth in Transition Database (NYTD, discussed further in \" Data Collection \"). In FY2017, approximately 111,700 youth received an independent living service. Separately, states reported to HHS that they provided ETV vouchers to 16,400 youth in FY2008; 16,650 youth in FY2009; 17,400 youth in program year (PY) 2010; 17,100 youth in PY2011; 16,554 youth in PY2012; 16,548 youth in PY2013; 15,514 youth in PY2014, and 14,619 youth in PY2015. The Chafee program requires a state to certify that each federally recognized Indian tribe in it has been consulted about the state's Chafee-funded programs and that there have been efforts to coordinate the programs with these tribal entities. In addition, the Chafee program specifies that the \"benefits and services under the programs are to be made available to Indian children in the state on the same basis as to other children in the state.\" \"On the same basis\" has been interpreted by HHS to mean that the state will provide program services equitably to children in both state custody and tribal custody. The Chafee program requires states to ensure that youth in Chafee-funded programs participate directly in \"designing their own program activities that prepare them for independent living\" and that they \"accept personal responsibility for living up to their part of the program.\" This language builds on the positive youth development approach to serving young people. Youth advocates that support this approach view youth as assets and promote the idea that they should be engaged in decisions about their lives and communities. States have taken various approaches to involving young people in decisions about the services they receive. Most states have also established formal youth advisory boards to provide a forum for youth to become involved in issues facing those in care and aging out of care. Youth-serving organizations for current and former foster youth, such as Foster Club, provide an outlet for young people to become involved in the larger foster care community and advocate for other children in care. States are not required to utilize life skills assessments or personal responsibility contracts with youth to comply with the youth participation requirement, although some states use these tools to assist youth in making the transition to adulthood. States administer their Chafee-funded programs in multiple ways. Some programs are overseen by the state program that addresses older and former foster youth, with an independent living coordinator and other program staff. For example, in Maine the state's independent living coordinator oversees specialized life skills education coordinators assigned to cover all of the state's Department of Health and Human Services district offices. In some states, like California, each county administers its own program with some oversight and support from a statewide program. Other states, including Florida, use contracted service providers to administer their programs. Many jurisdictions have partnered with private organizations to help fund and sometimes administer some aspect of their independent living programs. For example, the Jim Casey Youth Opportunities Initiative has provided funding and technical assistance to multiple cities to provide financial support and training to youth exiting care. The state with the placement and responsibility for a youth in foster care is to provide the voucher to that youth. The state must also continue to provide a voucher to any youth who is currently receiving one and moves to another state for the sole purpose of attending an institution of higher education. If a youth moves permanently to another state after leaving care and subsequently enrolls in a qualified institution of higher education, the state where he or she resides would provide the voucher. Generally, states administer their ETV program through their program that addresses older and former foster youth. However, some states administer the ETV program through their financial aid office (e.g., California Student Aid Commission) or at the local level (e.g., Florida, where all child welfare programs are administered through community-based agencies). Some states contract with a nonprofit service provider, such as Foster Care to Success. States and counties may use ETV dollars to fund the vouchers and the costs associated with program administration, including for salaries, expenses, and training of staff. States are not permitted to use Title IV-E foster care or adoption assistance program funds for administering the ETV program. However, they may spend additional funds from state sources or other sources to supplement the ETV program or use ETV funds to expand existing postsecondary funding programs. Several states have scholarship programs, tuition waivers, and grants for current and former foster youth that are funded through other sources. Chafee and ETV funds are distributed to each state based on its proportion of the nation's children in foster care. States must provide a 20% match (in-kind or cash) to receive their full federal Chafee and ETV allotment. The Chafee program includes a \"hold harmless\" clause that precludes any state from receiving less than the amount of general independent living funds it received under the former independent living program in FY1998 or $500,000, whichever is greater. There is no hold harmless provision for ETV funds. States may use Chafee and ETV funds to supplement, and not supplant, any other funds that are available for the types of activities authorized under the Chafee program. Territories with an approved Title IV-E plan may also apply for Chafee funding. Currently, Puerto Rico and the U.S. Virgin Islands have approved plans. An Indian tribe, tribal organization, or tribal consortium may apply to HHS and receive a direct federal allotment of Chafee and/or ETV funds. To be eligible, a tribal entity must be receiving Title IV-E funds to operate a foster care program under a Title IV-E plan approved by HHS or via a cooperative agreement or contract with the state. Successful tribal applicants receive an allotment amount(s) out of the state's allotment for the program(s) based on the share of all children in foster care in the state under tribal custody. Tribal entities must satisfy the Chafee program requirements established for states, as HHS determines appropriate. Four tribes—the Prairie Band of Potawatomi (Kansas), Santee Sioux Nation (Nebraska), Confederated Tribe of Warm Springs (Oregon), and Port Gamble S'Klallam Tribe (Washington)—receive Chafee and ETV funds. A state must certify that it will negotiate in good faith with any tribal entity that does not receive a direct federal allotment of child welfare funds but would like to enter into an agreement or contract with the state to receive funds for administering, supervising, or overseeing Chafee and ETV programs for eligible Indian children under the tribal entity's authority. Appendix B provides the Chafee and ETV allotments for each state, four tribes, Puerto Rico, and the U.S. Virgin Islands in FY2018 and FY2019. Though not shown in the table, Chafee funds are often combined with state, local, and other funding sources. States and tribes have two fiscal years to spend their Chafee and ETV funds. If a jurisdiction does not apply for all of its allotment, the remaining funds may be redistributed among states that need these funds as determined by HHS. Table A-2 shows the percentage and share of funds returned for both programs from FY2005 through FY2014, as well as a list of jurisdictions that have returned these funds. FY2014 is the most recent year available. HHS was recently given authority to reallocate funds that are not spent within the two-year period to states and tribes that apply for the funding. If funds are reallocated, the statute specifies that the funds should be redistributed among the states and tribes that apply for any unused funds, provided HHS determines the state or tribe would use the funds according to the program purposes. Further, HHS is directed to allocate the funds based on the share of children in foster care among the states and tribes that successfully appl y for the unused funds. Any unspent funds can be made available to the applying states or tribes in the second fiscal year following the two-year period in which funds were originally awarded . Any redistributed funds are considered part of the state 's or tribe's allotment for the fiscal year in which the redistribution is made . Training and technical assistance grants for the Chafee and ETV programs had been awarded competitively every five years, most recently for FY2010 through FY2014. The National Child Welfare Resource Center for Youth Development (NCWRCYD), housed at the University of Oklahoma, provided assistance under the grant. Beginning with FY2015, HHS has operated the Child Welfare Capacity Building Collaborative via a contract with ICF International, a policy management organization, to provide training and technical assistance on a number of child welfare issues, including youth development. The Chafee program required that HHS consult with state and local public officials responsible for administering independent living and other child welfare programs, child welfare advocates, Members of Congress, youth service providers, and researchers to \"develop outcome measures (including measures of educational attainment, high school diploma, avoidance of dependency, homelessness, non-marital childbirth, incarceration, and high-risk behaviors) that can be used to assess the performance of states in operating independent living programs\"; identify the data needed to track the number and characteristics of children receiving services, the type and quantity of services provided, and state performance on the measures; and develop and implement a plan to collect this information beginning with the second fiscal year after the Chafee law was enacted in 1999. In response to these requirements, HHS created the National Youth in Transition Database (NYTD). The final rule establishing NYTD became effective April 28, 2008, and it required states to report data on youth beginning in FY2011. HHS uses NYTD to engage in two data collection and reporting activities. First, states collect demographic data and information about receipt of services on eligible youth who currently receive independent living services. This includes youth regardless of whether they continue to remain in foster care, were in foster care in another state, or received child welfare services through an Indian tribe or privately operated foster care program. Second, states track information on outcomes of foster youth on or about their 17 th birthday, around their 19 th birthday, and around their 21 st birthday. Consistent with the authorizing statute for the Chafee program, HHS is to penalize any state not meeting the data collection procedures for the NYTD from 1% to 5% of its annual Chafee fund allotment, which includes any allotted or re-allotted funds for the general Chafee program only. The penalty amount is to be withheld from the current fiscal year award of the funds. HHS is to evaluate a state's data file against data compliance standards, provided by statute. However, states have the opportunity to submit corrected data. The text box indicates new information that HHS must report to Congress. The authorizing statute for the Chafee program requires HHS to conduct evaluations of state (or tribal) programs funded by the Chafee program deemed to be \"innovative or of national significance.\" The law reserves 1.5% of total Chafee funding annually for these evaluations, as well as related technical assistance, performance measurement, and data collection. HHS conducted an evaluation of promising independent living programs from approximately 2007 to 2012, and is in the process of identifying new ways of conducting research in this area. For the initial evaluation, HHS contracted with the Urban Institute and its partners to conduct what is known as the Multi-Site Evaluation of Foster Youth Programs. The goal of the evaluation was to determine the effects of programs funded by the Chafee authorizing law in achieving key outcomes related to the transition to adulthood. HHS and the evaluation team initially conducted an assessment to identify state and local programs that could be evaluated rigorously, through random assignment to treatment and control groups, as required under the law. Their work is the first to involve random assignment of programs for this population. The evaluation team examined four programs in California and Massachusetts—an employment services program in Kern County, CA; a one-on-one intensive, individualized life skills program in Massachusetts; and a classroom-based life skills training program and a tutoring/mentoring program, both in Los Angeles County, CA. The evaluation of the Los Angeles and Kern County programs found no statistically significant impacts as a result of the interventions; however, the life skills program in Massachusetts, known as Outreach, showed impacts for some of the education outcomes that were measured. The Outreach program assists youth who enroll voluntarily in preparing to live independently and in having permanent connections to caring adults upon exiting care. Outreach youth were more likely than their counterparts in the control group to report having ever enrolled in college and staying enrolled. Outreach youth were also more likely to experience outcomes that were not a focus of the evaluation: these youth were more likely to remain in foster care and to report receiving more help in some areas of educational assistance, employment assistance, money management, and financial assistance for housing. In short, the Outreach youth may have been less successful on the educational front if they had not stayed in care. Youth in the program reported similar outcomes as the control group for multiple other measures, including in employment, economic well-being, housing, delinquency, and pregnancy. HHS has contracted with the Urban Institute and Chapin Hall for additional research on the Chafee program. Citing the lack of experimental research in child welfare, the research team is examining various models in other policy areas that could be used to better understand promising approaches of working with older youth in care and those transitioning from care. Researchers have identified a conceptual framework that takes into account the many individual characteristics and experiences that influence a youth's ability to transition successfully into adulthood. The research team has also classified the various types of programs that foster youth could access to help in the transition, and the extent to which they are ready to be evaluated. In addition, researchers have published a series of briefs that discuss outcomes and programs for youth in foster care in the areas of education, employment, and financial literacy. The briefs discuss that few programs have impacts for foster youth in these areas. The briefs also address issues to consider when designing and evaluating programs for youth in care. Appendix A. Funding for the John H. Chafee Foster Care (Chafee) Program for Successful Transition to Adulthood and Education and Training Voucher (ETV) Program Appendix B. Other Federal Support for Older Current and Former Foster Youth In addition to the child welfare programs under Title IV-E of the Social Security Act, other federal programs provide assistance to older current and former foster youth. This appendix describes Medicaid pathways for foster youth who emancipated; educational, workforce, and housing supports; and a grant to fund training for child welfare practitioners working with older foster youth and youth emancipating from care. Medicaid The Centers for Medicare and Medicaid Services (CMS) at HHS administers Medicaid, a federal-state health program jointly financed by HHS and the states. Medicaid law provides for mandatory and optional pathways for youth who have aged out of foster care. Mandatory Pathway As of January 1, 2014, certain former foster youth are eligible for Medicaid under a mandatory pathway created for this population in the Affordable Care Act (ACA, P.L. 111-148 ). Former foster youth are eligible if they were \"in foster care under the responsibility of the State\" upon reaching age 18 (or up to age 21 if the state extends federal foster care to that age); were enrolled in Medicaid while in foster care; and are not eligible or enrolled in other mandatory Medicaid coverage groups. The ACA specifies that income and assets are not considered when determining eligibility for this group. Nonetheless, foster youth with annual incomes above a certain level may be required to share in the costs of their health care. In addition to the law, CMS has provided additional parameters on the new pathway via a final rule promulgated in November 2016 and policy guidance. The final rule specifies that former foster youth are eligible regardless of whether Title IV-E foster care payments were made on their behalf. States may not provide Medicaid to individuals who left foster care before reaching age 18 via this pathway. Further, states may not provide Medicaid coverage to former foster youth who move from another state; however, states could apply to HHS under a waiver to provide such coverage via the research and demonstration waiver authority for the Medicaid program. The Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act ( P.L. 115-271 ) amended the Medicaid statute on the former foster youth pathway. It will permit states, as of January 2023, to use state plan authority for providing coverage to former foster youth who move across state lines. The law directs HHS, within one year of the its enactment, to issue guidance to states on best practices for removing barriers and ensuring timely coverage under this pathway, and on conducting related outreach and raising awareness among eligible youth. Consistent with existing regulations, the final rule affirms that states may not terminate Medicaid eligibility for foster youth who reach age 18 without first determining whether they are eligible for other mandatory Medicaid eligibility pathways available to adults (e.g., the coverage pathway for pregnant women). Optional Pathway The pathway for former foster youth appears largely to supersede an optional pathway also provided for this population. The 1999 law ( P.L. 106-169 ) that established the Chafee program also created a new optional Medicaid eligibility pathway for \"independent foster care adolescents\"; this pathway is often called the \"Chafee option.\" The law further defined these adolescents as individuals under the age of 21 who were in foster care under the responsibility of the state on their 18 th birthday. The law permits states to restrict eligibility based on the youth's income or resources, and whether or not the youth had received Title IV-E funding. As of late 2012, more than half (30) of all states had extended the Chafee option to eligible youth. Of these states, five reported requiring youth to have income less than a certain level of poverty (180% to 400%). Four states permitted youth who were in foster care at age 18 in another state to be eligible under the pathway. States also reported whether the youth is involved in the process for enrolling under the Chafee option. In 15 states, youth are not directly involved in the enrollment process. For example, some states automatically enroll youth. In the other 15 states, youth are involved in enrollment with assistance from their caseworker or they enroll on their own. Most states that have implemented the Chafee option require an annual review to verify that youth continue to be eligible for Medicaid. States generally have a hierarchy to determine under which pathway youth qualify. For example, in most states, youth who qualify for the Chafee option and receive Supplemental Security Income (SSI) would be eligible for Medicaid under the SSI Medicaid pathway. Educational Support Federal funding and other supports for current and former foster youth are in place to help these youth aspire to, pay for, and graduate from college. The Higher Education Act (HEA) authorizes financial aid and support programs that target this and other vulnerable populations. Federal Financial Aid For purposes of applying for federal financial aid, a student's expected family contribution (EFC) is the amount that can be expected to be contributed by a student and the student's family toward his or her cost of education. Certain groups of students are considered \"independent,\" meaning that only the income and assets of the student are counted. Individuals under age 24 who are or were orphans, in foster care, or wards of the court at age 13 or older are eligible to apply for independent student status. The law does not specify the length of time that the youth must have been in foster care or the reason for exiting as factors for independent student status eligibility. However, the federal financial aid form, known as the Free Application for Federal Student Aid (FAFSA), instructs current and former foster youth that the financial aid administrator at their school may require the student to provide proof that they were in foster care. As required by the FY2014 appropriations law (2014, P.L. 113-76 ), the Department of Education (ED) modified the FAFSA form so that it includes a box for applicants to identify whether they are or were in foster care, and to require ED to provide these applicants with information about federal educational resources that may be available to them. Higher Education Support Programs The Higher Education Act provides that youth in foster care, including youth who have left foster care after reaching age 16, and homeless children and youth are eligible for what are collectively called the federal TRIO programs. The programs are known individually as Talent Search, Upward Bound, Student Support Services, Educational Opportunity Centers, and McNair Postbaccalaureate. The TRIO programs are designed to identify potential postsecondary students from disadvantaged backgrounds, prepare these students for higher education, provide certain support services to them while they are in college, and train individuals who provide these services. HEA directs the Department of Education (ED), which administers the programs, to (as appropriate) require applicants seeking TRIO funds to identify and make services available, including mentoring, tutoring, and other services, to these youth. TRIO funds are awarded by ED on a competitive basis. In addition, HEA authorizes services for current and former foster youth (and homeless youth) through TRIO Student Support Services—a program intended to improve the retention and graduation rates of disadvantaged college students—that include temporary housing during breaks in the academic year. In FY2019, Congress appropriated $1.1 billion to TRIO programs. Separately, HEA allows additional uses of funds through the Fund for the Improvement of Postsecondary Education (FIPSE) to establish demonstration projects that provide comprehensive support services for students who were in foster care (or homeless) at age 13 or older. FIPSE is a grant program that seeks to support the implementation of innovative educational reform ideas and evaluate how well they work. As specified in the law, the projects can provide housing to the youth when housing at an educational institution is closed or unavailable to other students. Congress appropriated $6 million in FY2018 and $5 million in FY2019 for FIPSE. Workforce Support Workforce Innovation and Opportunity Act Programs The Workforce Innovation and Opportunity Act (WIOA) authorizes job training programs to unemployed and underemployed individuals through the Department of Labor (DOL). Two of these programs—Youth Activities and Job Corps—provide job training and related services to targeted low-income vulnerable populations, including foster youth. The Youth Activities program focuses on preventive strategies to help in-school youth stay in school and receive occupational skills, as well as on providing training and supportive services, such as assistance with child care, for out-of-school youth. Job Corps is an educational and vocational training program that helps students learn a trade, complete their GED, and secure employment. To be eligible, foster youth must meet age and income criteria as defined under the act. Young people currently or formerly in foster care may participate in both programs if they are ages 14 to 24. In FY2018, Congress appropriated $903 million to Youth Activities and $1.7 billion to Job Corps. Housing Support Family Unification Vouchers Program Current and former foster youth may be eligible for housing subsidies provided through programs administered by the Department of Housing and Urban Development's (HUD's) Family Unification Vouchers program (FUP vouchers). The FUP vouchers were initially created in 1990 under P.L. 101-625 for families that qualify for Section 8 tenant-based assistance and for whom the lack of adequate housing is a primary factor in the separation, or threat of imminent separation, of children from their families or in preventing the reunification of the children with their families. Amendments to the program in 2000 under P.L. 106-377 made youth ages 18 to 21 eligible for the vouchers for up to 18 months if they are homeless or are at risk of becoming homeless at age 16 or older. The Housing Opportunity Through Modernization Act ( P.L. 114-201 ), enacted in July 2016, extended the upper age of eligibility for FUP vouchers, from 21 to 24, for youth who emancipated from foster care. It also extended assistance under the program for these youth from 18 to 36 months and allows the voucher assistance to begin 90 days prior to a youth leaving care because they are aging out. It also requires HUD, after consulting with other appropriate federal agencies, to issue guidance to improve coordination between public housing agencies, which administer the vouchers, and child welfare agencies. The guidance must address certain topics, including identifying eligible recipients for FUP vouchers and identifying child welfare resources and supportive families for families and youth (including the Chafee program). As of the date of this report, HUD has not issued such guidance. In correspondence with CRS, HUD explained that it has requested funding for this work, and until those funds can be secured, HUD and HHS staff are studying how youth and families are served by FUP. FUP vouchers were initially awarded from 1992 to 2001. Over that period, approximately 39,000 vouchers were distributed. Each award included five years of funding per voucher and the voucher's use was restricted to voucher-eligible families for those five years. At the end of those five years, public housing authorities (PHAs) were eligible to convert FUP vouchers to regular Section 8 housing vouchers for low-income families. While the five-year use restrictions have expired for all family unification vouchers, some PHAs may have continued to use their original family unification vouchers for FUP-eligible families and some may have chosen to use some regular-purpose vouchers for FUP families (but the extent to which this happened is unknown). Congress appropriated $20 million for new FUP vouchers in each of FY2008 and FY2009; $15 million in FY2010, $10 million in FY2017, and $20 million in FY2018 and FY2019. Congress has specified that amounts made available under Section 8 tenant-based rental assistance and used for the FUP vouchers are to remain available for the program. A 2014 report on the FUP program examined the use of FUP vouchers for foster youth. The study was based on a survey of PHAs, a survey of child welfare agencies that partnered with PHAs that served youth, and site visits to four areas that use FUP to serve youth. The survey of PHAs showed that slightly less than half of PHAs operating FUP had awarded vouchers to former foster youth in the 18 months prior to the survey. PHAs reported that youth were able to obtain a lease within the allotted time, and many kept their leases for the full 18-month period they were eligible for the vouchers. In addition, 14% of total FUP program participants qualified because of their foster care status. According to the study, this relatively small share was due to the fact that less than half of PHAs were serving youth, and these PHAs tended to allocate less than one-third of their vouchers to youth, among other findings. Other Support Older current and former foster youth may be eligible for housing services and related supports through the Runaway and Homeless Youth program, administered by HHS. The program is comprised of three subprograms: the Basic Center program (BCP), which provides short-term housing and counseling to youth up to the age of 18; the Transitional Living program (TLP), which provides longer-term housing and counseling to youth ages 16 through 22; and the Street Outreach program (SOP), which provides outreach and referrals to youth who live on the streets. Youth transitioning out of foster care may also be eligible for select transitional living programs administered by HUD, though the programs do not specifically target these youth. The program was funded at $127 million in FY2019. The Foreclosure Prevention Act of 2008 ( P.L. 110-289 ) was signed into law on July 30, 2008, and enables owners of properties financed in part with Low-Income Housing Tax Credits (LIHTCs) to claim as low-income units those occupied by low-income students who were in foster care. Owners of LIHTC properties are required to maintain a certain percentage of their units for occupancy by low-income households; students (with some exceptions) are not generally considered low-income households for this purpose. The law does not specify the length of time these students must have spent in foster care nor require that youth are eligible only if they emancipated.", "summary": "While many young people have access to emotional and financial support systems throughout their early adult years, older youth in foster care and those who are emancipated from care often lack such security. This can be an obstacle for them in developing independent living skills and building supports that might ease their transition to adulthood. Older foster youth who return to their parents or guardians may continue to experience poor family dynamics or lack supports, and studies have shown that recently emancipated foster youth fare poorly relative to their counterparts in the general population on measures such as education and employment. The federal government recognizes that older youth in foster care and those who have been emancipated, or aged out, are vulnerable to negative outcomes and may ultimately return to the care of the state as adults through the public welfare, criminal justice, or other systems. The U.S. Department of Health and Human Services (HHS) administers the primary federal programs that are targeted to these youth. These include the federal foster care program and the John H. Chafee Program for Successful Transition to Adulthood program (\"Chafee program\"), both of which are authorized under Title IV-E of the Social Security Act. Foster care is a temporary living arrangement intended to ensure a child's safety and well-being until a permanent home can be re-established or newly established. Under the Title IV-E foster care program, a public child welfare agency must work to ensure that each child who enters foster care is safely returned to his/her parents, or, if this is determined not to be possible or appropriate (by a court), to find a new permanent home for the child. Jurisdictions (states, territories, and tribes) may seek reimbursement for youth to remain in care up to age 21. Approximately half of all states extend care to that age. In addition, the foster care program has certain protections for older youth. For example, jurisdictions must annually obtain the credit report of each youth in care who is age 14 and older. They must also assist youth with developing a transition plan that is in place 90 days before aging out. The law requires that a youth's caseworker—and as appropriate, other representative(s) of the youth—assist and support him/her in developing the plan. The law requires that the plan be guided by the youth, and should include specific options on housing, health insurance, education, local opportunities for mentors, and other supports. The Chafee program provides supports and services to youth ages 14 to 21 who are or were in foster care (with some exceptions). Youth in states that extend foster care to age 21 can be served under the program until age 23. The program authorizes funds to be used for providing assistance in obtaining a high school diploma, career exploration, training in daily living skills, training in budgeting and financial management skills, and preventive health activities, among other purposes. States must meet certain requirements, including that not more than 30% of Chafee funds are used for room and board expenses. The Chafee Education and Training Voucher (ETV) provides funding for Chafee-eligible youth to attend institutions of higher education. Youth can receive up to $5,000 annually for up to five years (consecutive or nonconsecutive) until they reach age 26. The Chafee law directs HHS to collect outcome and other information for current and former foster youth, and HHS established the National Youth in Transition Database (NYTD) for this purpose. Along with the foster care and Chafee programs, other federal programs are intended to help youth currently and formerly in foster care make the transition to adulthood. Federal law authorizes funding for states and local jurisdictions to provide workforce support and housing to older foster youth and youth emancipating from care. Further, beginning on January 1, 2014, eligible young people who were in foster care at age 18 are covered under a mandatory Medicaid pathway until age 26. Youth in foster care or recently emancipated youth are also specifically eligible for certain educational supports.", "document_type": "crs"}
{"report": "The Department of Veterans Affairs (VA) provides a range of benefits and services to veterans who meet certain eligibility criteria. These benefits and services include, among other things, hospital and medical ca re; disability compensation and pensions; education; vocational rehabilitation and employment services; assistance to homeless veterans; home loan guarantees; administration of life insurance, as well as traumatic injury protection insurance for servicemembers; and death benefits that cover burial expenses. The department carries out its programs nationwide through three administrations and the Board of Veterans' Appeals (BVA). The Veterans Health Administration (VHA) is responsible for health care services and medical and prosthetic research programs. The Veterans Benefits Administration (VBA) is responsible for, among other things, providing disability compensation, pensions, and education assistance. The National Cemetery Administration (NCA) is responsible for maintaining national veterans cemeteries; providing grants to states for establishing, expanding, or improving state veterans cemeteries; and providing headstones and markers for the graves of eligible persons, among other things. In addition to providing health care services to veterans and certain eligible dependents, the VHA is statutorily required to serve as a contingency backup to the Department of Defense (DOD) medical system during a national security emergency and to provide support to the National Disaster Medical System and the Department of Health and Human Services (HHS) as necessary in response to national crises. The department is also required to take appropriate actions to ensure VA medical centers are prepared to protect veteran patients and staff during a public health emergency. On December 31, 2019, the World Health Organization (WHO) was informed of a cluster of pneumonia cases in Wuhan City, Hubei Province of China. Illnesses have since been linked to a disease caused by a previously unidentified strain of coronavirus, designated Coronavirus Disease 2019, or COVID-19. On January 30, 2020, an Emergency Committee convened by the WHO Director-General declared the COVID-19 outbreak to be a Public Health Emergency of International Concern (PHEIC). On January 31, the Secretary of Health and Human Services (HHS) declared a public health emergency under Section 319 of the Public Health Service Act (42 U.S.C. 247d). On March 11, 2020, the WHO characterized the COVID-19 outbreak as a pandemic. Two days later, on March 13, the President declared the COVID-19 outbreak a national emergency, beginning March 1, 2020. The VHA plays a significant role in the domestic response to a pandemic. It is one of the largest integrated direct health care delivery systems in the nation, caring for more than 7.1 million patients in FY2020 and providing 123.8 million outpatient visits at approximately 1,450 VA sites of care. The VHA employs a workforce of 337,908 full-time equivalent employees (FTEs), largely composed of health care professionals. In addition, the VHA has a statutory mission to contribute to the overall federal emergency response capabilities. This report provides an overview of VA's response thus far to this rapidly evolving COVID-19 pandemic. It does not provide an exhaustive description of all of the department's activities, and it is based on very limited publicly available information from VA. It is organized as follows: first, it provides details on VHA's, VBA's, and NCA's response activities; second, it provides details on VA's emergency preparedness (\"Fourth Mission\") activities to provide support to the overall federal emergency response; and lastly, it briefly describes congressional activity as it pertains to VA and veterans. The Appendix provides a summary of VHA's emergency authorities. VHA's provision of medical care to veterans in response to the COVID-19 outbreak includes implementing mitigation strategies at VHA facilities, as well as testing and treating veterans diagnosed with or suspected of having COVID-19. (A general description of medical care to veterans is provided in other CRS reports. ) In late February 2020, VA provided information to congressional oversight committees on the number of positive and presumptive positive cases of COVID-19. On March 13, 2020, the department began publishing this information publicly on its website, which it updates on a regular basis. The number of positive diagnoses is likely to grow as testing for COVID-19 becomes more widespread. VA has reported on the measures it has taken to contain and mitigate further exposure. It has issued guidance for patients, implemented mitigation strategies at VHA facilities, and begun testing patients who present symptoms consistent with COVID-19. VA is advising veterans who may be sick or who are exhibiting flu-like symptoms not to come to a VA facility. Instead, patients are advised to call their health care providers, even if they already have a scheduled appointment. Alternatively, patients can send a secure message through the VHA online portal, My HealtheVet, or schedule a telehealth appointment. In addition, VA is advising patients to budget additional time for appointments due to enhanced screening measures at VA facilities. These enhanced screening measures, as well as other mitigation strategies at VHA facilities, are described below. On March 10, 2020, VA announced safeguards to protect nursing home residents and spinal cord injury patients. As of that date, no visitors are allowed at either VA nursing homes or spinal cord injury/disorder (SCI/D) centers. The only exception to this policy is if a veteran is in the last stages of life, in which case VA allows visitors in the veteran's room only. VA is not accepting any new admissions to nursing homes and is limiting new admissions to SCI/D centers. VA began implementing enhanced screening procedures at all sites of care to screen for respiratory illness and COVID-19 exposure. Enhanced screening procedures are determined at the local level, so they vary at each facility. However, VA has designed standardized screening questions for each facility. Each VA medical center is implementing a two-tiered system to mitigate the potential for spread of the virus, creating a zone for active COVID-19 cases and a passive zone for care unrelated to COVID-19. VA has canceled all elective surgeries and limited routine appointments. This section describes the current VA policy on testing patients for COVID-19 and treatment following a COVID-19 diagnosis. On March 13, 2020, the department began publishing the number of positive cases of COVID-19, and the number of tests conducted, on its public website, which it updates on a regular basis. Individual medical centers have discretion on where to send samples for testing. Samples can be tested at the Palo Alto VA Medical Center, state public health labs, or private labs. Individual providers decide whether to test for COVID-19 on a patient-by-patient basis. However, VA has advised providers that patients must be exhibiting respiratory symptoms and have another factor, such as recent travel or known exposure to someone who tested positive. Generally, diagnostic testing is a covered service under VA's standard medical benefits package, which is available to all veterans enrolled in the VA health care system. Some veterans are required to pay copayments for care that is not related to a service-connected disability. However, routine lab tests are exempt from copayments. VA has not announced whether cost-sharing for the COVID-19 diagnostic test is included under the exemption for routine lab tests. The Families First Coronavirus Response Act ( P.L. 116-127 ), enacted on March 18, 2020, allows VA to waive any copayment or other cost-sharing requirements charged to veterans for COVID-19 testing or medical visits during any period of this public health emergency. VA has not publicly announced whether cost-sharing for the COVID-19 diagnostic test will be waived for all veterans who are subject to cost-sharing. (For a discussion of P.L. 116-127 , see the \" Congressional Response \" section of this report.) VA has not indicated whether it has developed a treatment plan for patients diagnosed with COVID-19. Treatment depends largely on the severity of symptoms that each patient experiences. VA is handling coverage and cost of treatment for COVID-19 as it would for any other treatment for a condition that is not service-connected. Treatment for COVID-19 is a covered benefit under the VA standard medical benefits package. However, some veterans may have to pay copayments for both outpatient and inpatient care. Normal coverage rules apply for veterans who report to urgent care or walk-in clinics. To be eligible, a veteran must be enrolled in the VA health care system and must have received VA care in the past 24 months preceding the episode of urgent or walk-in care. Eligible veterans needing urgent care must obtain care through facilities that are part of VA's contracted network of community providers. These facilities typically post information indicating that they are part of VA's contracted network. If an eligible veteran receives urgent care from a noncontracted provider or receives services that are not covered under the urgent care benefit, the veteran may be required to pay the full cost of such care. Certain veterans are required to pay copayments for care obtained at a VA-contracted urgent care facility or walk-in retail health clinic. In addition, normal rules apply for veterans who report to non-VA emergency departments. To be eligible for VA payment or reimbursement, a veteran's non-VA care must meet the following criteria: The emergency care or services were provided in a hospital emergency department or a similar facility that provides emergency care to the public. The claim for payment or reimbursement for the initial evaluation and treatment was for a condition of such a nature that a prudent layperson would have reasonably expected that delay in seeking immediate medical attention would have been hazardous to life or health. A VA or other federal facility or provider was not feasibly available and an attempt to use them beforehand would not have been considered reasonable by a prudent layperson. At the time the emergency care or services were furnished, the veteran was enrolled in the VA health care system and had received medical services from the VHA within the 24-month period preceding the furnishing of such emergency treatment. The veteran was financially liable to the provider of emergency treatment for that treatment. The veteran had no coverage under a health plan contract that would fully cancel the medical liability for the emergency treatment. If the condition for which the emergency treatment was furnished was caused by an accident or work-related injury, the veteran is required pursue all claims against a third party for payment of such treatment first. Veterans experiencing homelessness live in conditions that could make them particularly vulnerable to COVID-19. Those who are unsheltered lack access to sanitary facilities. For those sleeping in emergency shelters, conditions may be crowded, with short distances between beds, and there may be limited facilities for washing and keeping clean. While VA itself administers programs to assist veterans experiencing homelessness, there are several grants for nonprofit and public entities to provide housing and services to homeless veterans. These include the Homeless Providers Grant and Per Diem program (transitional housing and services), the Supportive Services for Veteran Families (short- to medium-term rental assistance and services), and Contract Residential Services (housing for veterans participating in VA's Health Care for Homeless Veterans program). VA released guidance on March 13, 2020, for its grantees that administer programs for veterans who are homeless. The guidance suggests grantees take a number of actions: Develop a response plan, or review an existing plan, and coordinate response planning with local entities, including health departments, local VA medical providers, and Continuums of Care. Plans should address staff health, potential staff shortages, and acquisition of food and other supplies, as well as how to assist veteran clients. Prevent infection through methods recommended by the CDC, such as frequent handwashing, wiping down surfaces, and informing clients about prevention techniques. In congregate living facilities, such as those provided through VA's Grant and Per Diem program, keep beds at least three feet apart (preferably six, if space permits), sleep head-to-toe, or place barriers between beds, if possible. Develop questions to ask clients about their health to determine their needs and how best to serve them. For new clients, interviews should occur prior to entry into a facility (such as over the phone), if possible, or in a place separate from other clients. If a client' answers to questions indicate risk of COVID-19, separate them from other program participants (have an isolation area, if possible), clean surfaces, and reach out to medical professionals. If isolation is not practical, reach out to other providers who might be able to isolate. On March 18, 2020, the Veterans Benefits Administration (VBA) announced via Facebook and Twitter that all regional offices will be closed to the public starting March 19. While the regional offices are to remain open to ensure the continuity of benefits, the offices are to no longer accept walk-ins for claims assistance, scheduled appointments, counseling, or other in-person services. VBA is directing veterans who have claims-specific questions or any questions to use the Inquiry Routing & Information System (IRIS) or to call 1-800-827-1000. A March 16, 2020, Government Executive news article explained that VBA is facing \"network operationality\" issues after several regional offices told their employees to telework full time. VBA headquarters, in Washington, DC, then rescinded the telework directives due to the information technology issues. VBA is to continue performing tests on the network throughout the week. According to the article, a VA spokesperson said that regional office directors are to make decisions on work flexibility based on \"the circumstances in their communities\" but must discuss all plans with \"central office leadership.\" In FY2020, over 900,000 individuals are expected to receive veterans educational assistance from the GI Bills (e.g., the Post-9/11 GI Bill), Veteran Employment Through Technology Education Courses (VET TEC), Veterans Work-Study, Veterans Counseling, and VetSuccess on Campus (VSOC). As a result of COVID-19, some participants' training and education may be disrupted, and some participants may receive a lower level of or no benefits. These concerns may directly affect beneficiaries in several ways, including the following: Some students may be required to stop out, discontinue working, or take a leave of absence as a result of their own illness. Some training establishments, educational institutions, and work-study providers may close temporarily or permanently. Some training establishments, educational institutions, and work-study providers may be required to reduce participants' hours, enrollment rate, or rate of pursuit. Some educational institutions may transition some courses to a distance learning format. Some educational institutions may require students living on campus to move off campus. Individuals receiving benefits in foreign countries may encounter any of the above circumstances while residing in a foreign country whose COVID-19 situation may differ from that in the United States, or may stop out, discontinue working, or take a leave of absence and return to the United States. A related issue is that, in the past, GI Bill benefits could not be paid for pursuit of online courses that had not been previously approved as online courses. Given this limitation, VA requested that school-certifying officials \"temporarily refrain from making any adjustments to enrollment certifications\" pending subsequent VA guidance and/or legislative action. On March 12, 2020, VA reminded GI Bill participants and school-certifying officials of its ability to continue paying benefits as participants and institutions react to the COVID-19 emergency. In particular, VA may continue to pay GI Bill benefits for up to four weeks following the temporary closure of an educational institution under an established policy based on an executive order of the President, or due to an emergency situation. Other limitations noted in the correspondence would be alleviated by recently passed legislation (see the \" Congressional Response \" section of this report for a discussion of S. 3503 ). The National Cemetery Administration (NCA) has provided limited information for the survivors and dependents of veterans who have passed away and are scheduled to be buried in National Cemetery. As of March 18, 2020, NCA has provided some guidance for both families and funeral directors regarding interments and services for veterans. For f amilies and v isitors . VA National Cemeteries remain open to visitors and for interments, but visitors should follow their local communities' restrictions on visitations and travel. For families who prefer to inter now but hold the committal service at a later date, NCA says it will work to accommodate those requests. For families who prefer to have the committal service now, NCA asks them to adhere to CDC recommendations for group gatherings. For f uneral d irectors . NCA is asking funeral directors to follow the CDC guidelines and recommendations on group gatherings for families who proceed with full committal services. In addition, NCA informed organizers that it has discouraged all cemetery personnel from handshaking and any unnecessary physical contact with family members and funeral organizers. NCA is to work with the funeral directors and families to accommodate future committal services for those who decide to postpone. NCA has set up an \"Alerts\" web page for the public to check cemetery operating status and is directing the public to its Facebook and Twitter pages for the most recent operating information. In 1982, the Department of Veterans Affairs (VA)-Department of Defense (DOD) Health Resources Sharing and Emergency Operations Act ( P.L. 97-174 ) was enacted to serve as the primary health care backup to the military health care system during and immediately following an outbreak of war or national emergency. Since then, Congress has provided additional authorities to VA to \"use its vast infrastructure and resources, geographic reach, deployable assets, and health care expertise, to make significant contributions to the Federal emergency response effort in times of emergencies and disasters.\" Among other authorities, VHA may care for nonveterans, as well as veterans not enrolled in the VA health care system. This applies in situations where the President has declared a major disaster or emergency under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. Â§5121 et seq.) (the Stafford Act), or where the HHS Secretary has declared a disaster or emergency activating the National Disaster Medical System established pursuant to Section 2811(b) of the Public Health Service Act (42 U.S.C. Â§300hh-11(b)). The President's March 13, 2020, declaration of a national emergency under Section 501(b) of the Stafford Act allows VA to use this authority. According to VA, during declared major disasters and emergencies, service-connected veterans receive the highest priority for VA care and services, followed by members of the Armed Forces receiving care under 38 U.S.C. Section 8111A, and then by individuals affected by a disaster or emergency described in 38 U.S.C. Section 1785 (i.e., individuals requiring care during a declared disaster or emergency or during activation of the National Disaster Medical System [NDMS]). In general, care is prioritized based on clinical needâthat is, urgent, life-threating medical conditions are treated before routine medical conditions (see the Appendix ). During a disaster or emergency, VA can support HHS by providing resources to civilian health care systems. Furthermore, VA's National Acquisition Center can assist with acquisition and logistical support, such as by providing ventilators, medical equipment and supplies, and pharmaceuticals. Generally, if a state, tribal, or territorial government needs resources, they can request assistance from the federal government through their local HHS Regional Emergency Coordinator (REC). The HHS REC is to then submit a task order to the HHS Secretary's Operations Center (SOC) to be fulfilled by HHS, VA, or another federal agency. VA cannot receive direct requests for assistance from state and local governments. On March 14, 2020, the House passed the Families First Coronavirus Response Act ( H.R. 6201 ). The Senate passed the measure on March 18, and the President signed it into law the same day as P.L. 116-127 . The act provides $30 million for VHA's medical services account to fund health services and related items pertaining to COVID-19. In addition, the act provides $30 million for VHA's medical community care account. These funds are available until September 30, 2022. Among other things, the act allows VA to waive any copayment or other cost-sharing requirements for COVID-19 testing or medical visits during any period of this public health emergency. S. 3503 , as passed by the Senate on March 16, 2020, and then passed by the House on March 19, 2020, allows VA to continue to provide GI Bill benefits from March 1, 2020, through December 21, 2020, for courses at educational institutions that are converted from in-residence to distance learning by reason of an emergency or health-related situation. S. 3503 further permits VA to pay the Post-9/11 GI Bill housing allowance as if the courses were not offered through distance learning throughout the same period. With the exception of those covered under this S. 3503 exemption, Post-9/11 GI Bill participants enrolled exclusively in distance education are eligible for no more than one-half the national average of the housing allowance. On March 17, 2020, the Administration submitted to Congress a supplemental appropriations request. The Administration seeks $16.6 billion for FY2020 for VA's response to the COVID-19 outbreak. This includes $13.1 billion for the medical services account. According to the request, this additional amount would provide funding for \"healthcare treatment costs, testing kits, temporary intensive care unit bed conversion and expansion, and personal protective equipment.\" The request also includes $2.1 billion for the medical community care account to provide three months of health care treatment provided in the community in response to COVID-19. VA assumes that about 20% of care for eligible veterans will be provided in the community, since community care facilities would be at full capacity with nonveteran patients. Furthermore, the request includes $100 million for the medical support and compliance account for the provision of 24-hour emergency management coordination overtime payments; for costs associated with travel and transport of materials; and to enable VHA' s Office of Emergency Management to manage its response to COVID-19. The emergency supplemental appropriations request also includes $175 million for the medical facilities account to upgrade VA medical facilities to respond to the virus. The request also includes $1.2 billion for the information technology systems account to upgrade telehealth and related internet technology to deliver more health care services remotely. ", "summary": "The Department of Veterans Affairs (VA) provides a range of benefits to eligible veterans and their dependents. The department carries out its programs nationwide through three administrations and the Board of Veterans' Appeals (BVA). The Veterans Health Administration (VHA) is responsible for health care services and medical and prosthetic research programs. The Veterans Benefits Administration (VBA) is responsible for, among other things, providing disability compensation, pensions, and education assistance. The National Cemetery Administration (NCA) is responsible for maintaining national veterans cemeteries; providing grants to states for establishing, expanding, or improving state veterans cemeteries; and providing headstones and markers for the graves of eligible persons, among other things. With a vast integrated health care delivery system spread across the United States, VHA is also statutorily required to serve as a contingency backup to the Department of Defense (DOD) medical system during a national security emergency and to provide support to the National Disaster Medical System and the Department of Health and Human Services (HHS), as necessary, in support of national emergencies (also referred to as the \"Fourth Mission\" of the VHA). Based on limited information from VA, this report provides an overview of VA's response to the Coronavirus Disease 2019 (COVID-19) pandemic that is affecting communities throughout the United States. It also discusses recent congressional action as it pertains to the veterans' benefits and services, as well as the supplemental appropriations for the department.", "document_type": "crs"}
{"report": "This report provides background on Department of Defense's legacy Electronic Health Record (EHR) systems, reviews previous EHR modernization efforts, and describes DOD's process to acquire and implement a new EHR system known as MHS Genesis . DOD's new EHR system presents several potential issu es for Congress, including how to conduct oversight on a program that spans three federal departments, how to ensure an adequate governance structure for the program, and how to monitor the program's cost and effectiveness. Although this report mentions EHR modernization efforts by the Department of Veterans Affairs (VA) and U.S. Coast Guard (USCG), as well as DOD's Joint Operational Medical Information System (JOMIS); it does not provide an in-depth discussion of these programs. Appendix A provides a list of acronyms used throughout this report. For decades, the Department of Defense (DOD) has developed, procured, and sustained a variety of electronic systems to document the health care services delivered to servicemembers, military retirees, and their family members. DOD currently operates a number of legacy EHR systems and is, at the direction of Congress, in the process of implementing a new EHR called MHS Genesis. DOD's new EHR system is to be integrated with other EHR systems utilized by the VA, USCG, and civilian health care providers. DOD operates a Military Health System (MHS) that delivers to military personnel, retirees, and their families certain health entitlements under chapter 55 of Title 10, U.S. Code. The MHS administers the TRICARE program, which offers health care services worldwide to over 9.5 million beneficiaries in DOD hospitals and clinics â also known as military treatment facilities (MTFs) â or through participating civilian health care providers (i.e., TRICARE providers). There are currently 723 MTFs located in the United States and overseas that provide a range of clinical services depending on size, mission, and level of capabilities. Health care services delivered in MTFs or by TRICARE providers are documented in at least one of the following components of the DOD health record: service treatment record (STR) â documentation of all medical and dental care received by a servicemember through their military career; nonservice treatment record (NSTR) â documentation of all medical and dental care received by a nonservicemember beneficiary (i.e., military retiree, family member); and occupational health civilian employee treatment record (OHTR) â documentation of all occupational-related care provided by DOD (typically to DOD civilian or contractor employees). DOD maintains numerous legacy EHR systems that allow health care providers to input, share, and archive all documentation required to be in a beneficiary's health record. MTF or TRICARE providers can document medical and dental care directly in a DOD legacy EHR system, or can scan and upload paper records. Servicemembers and their families frequently change duty stations; the DOD health record can be accessed at most MTFs. However, sometimes beneficiaries are relocated to an area that lacks access to DOD's legacy EHR systems. In such cases, beneficiaries are required to maintain a paper copy of the health record. Since 1968, DOD has used various electronic medical information systems that automate and share patient data across its MTFs. Between 1976 and 1984, DOD invested $222 million to \"acquire, implement, and operate various stand-alone and integrated health-care computer systems.\" Over the next three decades, DOD continued to invest and to implement numerous electronic medical information systems to allow health care providers to input and review patient data across all MTFs, regardless of military service or geographic location. In 1998, DOD began to incorporate a series of efforts to increase interoperability with the VA's EHR systems (see Figure 1 ). DOD operates numerous legacy EHR systems as described below. Together, health care data documented and archived in the legacy EHR systems contribute to a beneficiary's overall medical and dental record, also known as the DOD health record. MHS Genesis is intended to replace these legacy systems and produce one comprehensive EHR. CHCS is a medical information system that has been in operation since 1993. CHCS primarily functions as the outpatient component of the EHR, with additional capabilities to order, record, and archive data for laboratory, radiology, and pharmacy services. Administrative functions such as patient appointment and scheduling, medical records tracking, and quality assurance checks, were also incorporated into CHCS. In March 1988, DOD awarded Science Applications International Corporation (SAIC) a contract to \"design, develop, deploy, and maintain CHCS.\" SAIC continues to provide ongoing sustainment and technical support for CHCS. The estimated life-cycle cost of CHCS is $2.8 billion. After deploying CHCS, DOD identified a need for integrated health care data that could be portable and accessible at any MTF. CHCS was developed as a facility-specific system that archived its data using regional network servers. However, accessing data across each server became a \"time- and resource-intensive activity.\" In 1997, DOD began planning for a new \"comprehensive, lifelong, computer-based health care record for every servicemember and their beneficiaries.\" The program would be known as CHCS II, later renamed the Armed Forces Health Longitudinal Technology Application (AHLTA). DOD intended to replace CHCS with AHLTA and initially planned to deploy the new system in 1999. However, the program sustained several delays resulting from \"failure to meet initial performance requirements\" and changes to technical and functional requirements. The implementation plan was later revised to reflect AHTLA deployment from July 2003 to September 2007. In 2010, the Government Accountability Office (GAO) reported that DOD's AHLTA life-cycle cost estimate through 2017 would be $3.8 billion. Essentris is the inpatient component of the current EHR that has been used in certain military hospitals since 1987. As a commercial-off-the-shelf (COTS) product developed by CliniComp International, Inc. (CliniComp), Essentris allows health care providers to document clinical care, procedures, and patient assessments occurring in the inpatient setting, as well as in emergency departments. In 2009, DOD selected CliniComp to deploy Essentris at all military hospitals. This deployment was completed in June 2011. DOD maintains an ongoing contract with CliniComp and LOUi Consulting Group, Inc. to provide sustainment, technical and customer support, training, and ongoing updates for Essentris. CDS, formerly named the Corporate Dental Application, is a web-based application that serves as DOD's current electronic dental record system. CDS allows DOD dental providers to document, review, and archive clinical information. The system also serves several administrative functions, such as tracking dental readiness of servicemembers, patient appointments and scheduling, and data reporting. CDS was initially developed as the Army's alternative dental solution to the AHLTA dental module. In 2000, all Army dental clinics implemented CDS. By 2016, Navy and Air Force dental clinics also transitioned to CDS as their electronic dental record system. In the same year, DOD awarded a four-year, $30 million contract to the Harris Corporation to sustain CDS. Paper medical records are another component of the DOD health record. While certain health care data are recorded and archived electronically, some administrative processes and clinical documentation exist only on paper forms. For example, clinical documentation from TRICARE providers, accession medical records, or medical evacuation records are usually in paper form. In such cases, DOD policy requires the scanning and archiving of paper medical records in an electronic repository called the Health Artifact and Image Management Solution (HAIMS). After being digitized, certain paper medical records are submitted to the National Archives and Records Administration while other documents are disposed of locally. Other DOD legacy systems document and archive various administrative and clinical data, such as: Referral Management System (RMS). An administrative information system that allows MTF staff to create and track referrals between health care providers. HAIMS. An electronic repository that stores DOD health care data, including digitally transmitted or scanned medical documentation. Data housed in HAIMS is also incorporated into a servicemember's official service treatment record , which is accessible to the VA. Medical Readiness Tracking Systems. Each military department utilizes an electronic information system that documents and tracks certain medical and dental readiness requirements, such as periodic health assessments, immunizations, dental exams, and laboratory tests. Theater Medical Information ProgramâJoint (TMIP-J). A suite of electronic systems, including modules for health care documentation and review, patient movement, and medical intelligence used in deployed or austere environments. Joint Legacy Viewer (JLV). A web-based, read-only application that allows DOD and VA health care providers to review certain real-time medical data housed in each department's EHR systems. Armed Forces Billing and Collection Utilization Solution (ABACUS). A web-based electronic system that allows MTFs to bill and track debt collection for health care services provided to certain beneficiaries. After Operation Desert Storm concluded in 1991, concern about deficient interoperability between DOD and VA health record systems began to grow. A number of committees and commissions issued reports highlighting the need for DOD and VA to standardize record-keeping; to improve health data sharing; and to develop a comprehensive, life-long medical record for servicemembers. Table 1 summarizes their recommendations. Between 1998 and 2009, DOD and VA established various methods to exchange limited patient health information across both departments, including: Federal Health Information Exchange (FHIE). Completed in 2004, the FHIE enables monthly data transmissions from DOD to VA comprised of patient demographics, laboratory/radiology results, outpatient pharmacy, allergies, and hospital admission data. Bidirectional Health Information Exchange (BHIE). Completed in 2004, the BHIE enables real-time, two-way data transmissions (DOD-to-VA and VA-to-DOD) comprised of FHIE information, additional patient history and assessments, theater clinical data, and additional inpatient data. Clinical Data Repository/Health Data Repository (CHDR). Completed in 2006, CHDR enables real-time, two-way data transmissions comprised of pharmacy and drug allergy information and a capability to add information to the patient's permanent medical record in the other department's repository. Virtual Lifetime Electronic Record (VLER). Initiated in 2009, the VLER enables real-time, health information exchange between DOD and VA, as well as certain civilian health care providers. While these information exchange systems enable DOD and VA health care providers to view or modify limited health care data, both departments continue to operate separate, disparate health record systems. In 2008, Congress began legislating mandates for DOD and VA to establish fully interoperable EHR systems that would allow for health care data sharing across departments. Section 1635 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2008 ( P.L. 110-181 ) directed DOD and VA to jointly: (1) \"develop and implement electronic health record systems or capabilities that allow for full interoperability of personal health care information,\" and (2) \"accelerate the exchange of health care information\" between both departments. Additionally, Congress directed the establishment of an interagency program office (IPO) that would serve as a \"single point of accountability\" for rapid development and implementation of EHR systems or capabilities to exchange health care information. The FY2008 NDAA also directed the IPO to implement the following, no later than September 30, 2009: \"â¦electronic health record systems or capabilities that allow for full interoperability of personal health care information between the Department of Defense and Department of Veterans Affairs, which health records shall comply with applicable interoperability standards, implementation specifications, and certification criteria (including for the reporting quality measures) of the Federal Government.\" In the conference report accompanying the Department of Defense Appropriations Act, 2008 ( H.Rept. 110-434 , P.L. 110-116 ), Congress also directed DOD and VA to \"issue a joint report\" by March 3, 2008, that describes the \"actions being taken by each department to achieve an interoperable electronic medical record (EMR).\" On April 17, 2008, the IPO was established with temporary staff from DOD and VA. On December 30, 2008, the Deputy Secretary of Defense delegated oversight authority for the IPO to the Under Secretary of Defense for Personnel and Readiness (USD[P&R]). The FY2008 NDAA also directed the Secretary of Defense (SECDEF) to appoint the IPO Director, with concurrence of the Secretary of Veterans Affairs (SECVA); and the SECVA to appoint the IPO Deputy Director, with concurrence of the SECDEF. To meet Congress's mandate on interoperability, the IPO established a mutual definition of interoperability. They posited it as the \"ability of users to equally interpret (understand) unstructured or structured information which is shared (exchanged) between them in electronic form.\" Shortly after, both departments identified and adopted six areas of interoperability capabilities intended to meet the requirements and deadline established by Congress: Expand Essentris implementation across DOD. Demonstrate the operation of the Partnership Gateways in support of joint DOD and VA health information sharing. Enhance sharing of DOD-captured social history with VA. Demonstrate an initial capability for DOD to scan medical documents into the DOD EHR and forward those documents electronically to VA. Provide all servicemembers' health assessment data stored in the DOD EHR to the VA in such a fashion that questions are associated with the responses. Provide initial capability to share with the VA electronic access to separation physical exam information captured in the DOD EHR. As a result of each department's work on interoperable capabilities, DOD and VA reported to Congress in 2010 that all requirements for \"full\" interoperability were met. DOD and VA continued to work on integrating their respective EHR systems through individual initiatives, while considering a larger EHR modernization strategy. Three strategy options were considered: 1. develop a new, joint EHR; 2. upgrade and adopt an existing legacy system across both departments (i.e., AHLTA or VistA); or 3. pursue separate solutions that would have \"common infrastructure with data interoperability.\" In March 2011, the SECDEF and SECVA agreed to work cooperatively to develop an integrated electronic health record (called the iEHR ) that would eventually replace each department's legacy systems. The IPO was assigned the oversight role for the iEHR initiative, which was then set to begin implementation no later than 2017. In February 2013, SECDEF and SECVA announced that they would no longer pursue the iEHR initiative. In making this decision, DOD and VA determined that the initial cost estimates for implementing the iEHR would be \"significant,\" given the \"constrained Federal Budget environment.\" After reevaluating their approach and considering alternatives, both departments decided to pursue other ongoing efforts to \"improve data interoperability\" and to preserve and develop separate EHR systems with a core set of capabilities that would allow for integrated sharing of health care data between DOD, VA, and private sector providers. After DOD and VA announced their change to the iEHR strategy in 2013, Congress expressed its sense that both departments had \"failed to implement a solution that allows for seamless electronic sharing of medical health care data.\" Given some Members' apparent frustration, Congress established a new deadline for both departments to deploy a new EHR solution. Section 713(b) of the NDAA for FY2014 ( P.L. 113-66 ) directed DOD and VA to implement an interoperable EHR with an \"integrated display of data, or a single electronic health record\" by December 31, 2016 (see text box below). The law also required DOD and VA to \"jointly establish an executive committee\" to support development of systems requirements, integration standards, and programmatic assessments to ensure compliance with Congress's direction outlined in Section 713(b). Given Congress's new mandate for both departments to implement an interoperable EHR, DOD conducted a 30-day review of the iEHR program in order to \"determine the best approach\" to meeting the law. While conducting its review, DOD identified two EHR modernization options that would support healthcare data interoperability with the VA: (1) adopt VistA and (2) acquire a commercial EHR system. On May 21, 2013, the Secretary of Defense issued a memorandum directing the department's pursuit of \"a full and open competition for a core set of capabilities for EHR modernization.\" The directive also delegated certain EHR responsibilities to various DOD leaders. Under Secretary of Defense for Acquisition, Technology, and Logistics (USD[AT&L]), whose office was later reorganized as the Under Secretary of Defense for Acquisition and Sustainment (USD[A&S]). Responsible for exercising milestone decision authority (MDA) and also holds technical and acquisition responsibilities for health records interoperability and related modernization programs; Under Secretary of Defense for Personnel and Readiness (USD[P&R]). Lead coordinator on DOD health care interactions with the VA. Assistant Secretary of Defense for Health Affairs (ASD[HA]). Responsible for functional capabilities of the EHR. Given the significant investments required to modernize DOD's EHR, MHS Genesis is a designated Defense B usiness S ystem (DBS). Because it is a DBS, certain decision reviews and milestones are required as part of the overall acquisition process. DBS programs are subject to significant departmental and congressional oversight activities. From June 2013 to June 2014, USD(AT&L) directed the Defense Healthcare Management Systems Modernization Program Management Office (DHMSM PMO) to oversee the EHR requirements development process, draft an acquisition strategy and request for proposal (RFP), and conduct activities required by DOD policy for DBS acquisitions. The ASD(HA) directed the Defense Health Agency (DHA) to establish various working groups to identify and develop the clinical and nonclinical functional requirements for the new EHR. The DHA led each working group, which included representatives from each military service medical department. Keeping in alignment with DOD's guiding principles for EHR modernization (see Figure 2 ), the working groups identified approximately 60 overarching capabilities to be required of a new EHR. An initial draft RFP incorporated functional capability requirements with certain technical requirements for interoperability, information security, and suitability with DOD infrastructure. The DHMSM PMO published three draft RFPs between January and June 2014 for interested contractors to review, provide comments, and submit questions for clarification on functional requirements. Additionally, the DHMSM PMO hosted four industry days that allowed interested contractors to \"enhance their understanding of the DHMSM requirement,\" gain insight on DOD's requirements development process, and provide feedback on particular aspects of the draft RFP. These activities also allowed the DHMSM PMO to conduct market research that would inform further revision of MHS Genesis functional requirements or its overall acquisition strategy. Between June 2014 and August 2014, DOD leaders certified that certain acquisition milestones had been achieved, allowing DOD to proceed with the solicitation process, including finalizing and approving all user-validated function requirements, approving the overall acquisition strategy, and issuing an authority to proceed . On August 25, 2014, DOD issued its official solicitation for proposals. The solicitation period concluded on October 9, 2014. The source selection process took place from October 2014 to July 2015. DOD reportedly had received five proposals during the solicitation period. Most of the proposals were from partnered vendors consisting of health information management, electronic medical records, information technology, and program management organizations. These partnerships included: Allscripts, Computer Sciences Corporation, and Hewlett-Packard; IBM and Epic Systems; Cerner, Leidos, and Accenture Federal; PricewaterhouseCoopers, General Dynamics, DSS, Inc., MedSphere; and InterSystems. Consistent with DOD source selection procedures, DOD experts were assigned to review and apply the evaluation criteria published in the RFP, to each proposal. Figure 3 illustrates a general overview of the evaluation and source selection process. On July 29, 2015, DOD awarded the MHS Genesis contract to Leidos Partnership for Defense Health (LPDH) to replace its legacy EHR systems with a commercial-off-the-shelf (COTS) EHR system. The contract has a potential 10-year ordering period that includes a two-year base period, two three-year optional ordering periods, and an award term period of up to two years. The initial total award ceiling for MHS Genesis was $4.3 billion. On June 15, 2018, DOD approved a contract modification to increase the award ceiling by $1.2 billion. According to the Justification and Approval for Other than Full and Open Competition documentation, the purpose of this increase was to \"support the incorporation of the United States Coast Guard (USCG) into the [DOD] MHS Genesis Electronic Health Record (EHR) implementation\" and \"establish a common standardized EHR baseline with the USCG and the [VA].\" The current award ceiling for MHS Genesis is more than $5.5 billion. Leidos leads LPDH with its core partners: Accenture Federal Services, Cerner, and Henry Schein One. The full partnership, through sub-contracts of the core partners, is comprised of over 34 businesses (see Figure 4 ). According to a redacted version of DOD's contract award documents, LPDH is required to meet the following overarching contract requirements: \"unify and increase accessibility of integrated, evidence-based healthcare delivery and decision making\"; \"support the availability of longitudinal medical records for 9.6 million DoD beneficiaries and approximately 153,000+ MHS personnel globally\"; \"enable the application of standardized workflows, integrated healthcare delivery, and data standards for improved and secure electronic exchange of medical and patient data between the DoD and its external partners, including the [VA] and other Federal and private sector healthcare providers\"; and \"leverage data exchange capabilities in alignment with the [IPO] for standards-based health data interoperability and secure information sharing with external partners to include the VA.\" Additionally, there are over 95 specific capability requirements across four concepts of operations (i.e., health service delivery, health system support, health readiness, and force health protection) that MHS Genesis must support (see Appendix B ). Ultimately, the Secretary of Defense is accountable for MHS Genesis. Various DOD entities, described below, have assigned responsibilities for MHS Genesis oversight, implementation, and sustainment (see Figure 5 ). While each entity has a separate chain of command, DOD chartered numerous governance groups to synchronize efforts across the department, delegate certain decisionmaking authorities, and provide direction on implementation and use of MHS Genesis. PEO DHMS was established in 2013. Its mission is to \"transform the delivery of healthcare and advance data sharing through a modernized electronic health record for service members, veterans, and their families.\" It responsible for implementing MHS Genesis as the assigned acquisition authority and currently reports to the Under Secretary of Defense for Acquisition and Sustainment (USD[A&S]). Under the PEO DHMS, three program management offices (PMOs) are tasked with modernizing DOD's EHR system and ensuring health data interoperability with the VA. DOD Healthcare Management System Moderniza tion (DHMSM) PMO. \"Oversees the deployment of MHS Genesis and the operations and sustain of the Joint Legacy Viewer.\" DOD/VA Interagency Program Office (IPO). \"Oversees the efforts of the DOD and VA to implement national health data standards for interoperability.\" Joint Operational Medicine Information Systems (JOMIS) PMO. \"Develops, deploys, and sustains MHS Genesis and other integrated operational medicine information systems to deployed forces.\" In 2013, the Secretary of Defense established the DHA to manage the TRICARE program; execute appropriations for the Defense Health Program; coordinate management of certain multi-service health care markets and MTFs in the National Capital Region; exercise management responsibility for shared services, functions, and activities within the Military Health System; and support DOD's medical mission. DHA is a designated Combat Support Agency that is scheduled to soon administer and manage all MTFs. DHA serves as the lead entity for MHS Genesis requirements development, in coordination with the military service medical departments, and currently reports to the ASD(HA). The military service medical departments are established under each respective military department to organize, train, and equip military medical personnel, maintain medical readiness of the Armed Forces, and administer, manage and provide health care in MTFs. The medical departments are led by a Surgeon General, who also functions as the principal advisor to their respective military service secretary and service chief for all health and medical matters. The three service medical departments are the Army Medical Command (MEDCOM), the Navy Bureau of Medicine and Surgery (BUMED), and the Air Force Medical Service (AFMS). Each service medical department provides subject-matter expertise, functional support, and consultation to the DHMSM PMO. The SSG and the CSB are DOD-chartered working groups established to provide oversight, recommendations, and \"direction on health-related acquisition programs,\" including those within PEO DHMS. The SSG is chaired by the USD(A&S) and is responsible for receiving updates on DHMS acquisition programs, ensuring adherence to DOD's EHR guiding principles, and providing recommendations and feedback on key EHR and interoperability decisions. The CSB is co-chaired by the USD(A&S) and the USD(P&R) and is specifically responsible for oversight on DHMSM and JOMIS programs. Figure 6 outlines the membership of each group. The ESB, previously named the Functional Champion Leadership Group (FLCG), is a governance body led by the DHA's Chief Health Informatics Officer with representation from each service medical department. The ESB's role is to: consider changes to standardized clinical, business, or technical processes; serve as a forum to validate, prioritize, and recommend modifications or new functional requirements for MHS Genesis; and oversee numerous working groups of subject matter experts and end-users. The OCHIO represents the \"voice of the customer\" to PEO DHMS. The office solicits input and recommendations from the ESB and coordinates with PEO DHMS to revise or modify MHS Genesis contract requirements. OCHIO is also responsible for \"change management, early adoption activities, standardization of functional workflows, functional collaboration with the [VA], management of configuration changes to MHS Genesis, adjudication of functional trouble tickets, sustainment training, current state workflow assessments, and coordination of DHA policy to support the use of MHS Genesis.\" DOD is using a phased implementation strategy to deploy MHS Genesis. Deployment began with its initial operational capability (IOC) sites in 2017. After the IOC sites, MHS Genesis is to be deployed at over 600 medical and dental facilities, grouped geographically into 23 waves (see Appendix F ). DOD anticipates \"full operational capability\" and implementation of MHS Genesis at all MTFs by the end of 2024. During the approximately 17 months between the July 2015 contract award date and Congress's December 2016 deadline to implement a new EHR system, DOD conducted certain pre-deployment activities (e.g., systems engineering, systems integration, and testing prior to deploying MHS Genesis). DOD acquisition policies and certain contract requirements mandate these activities. Some of the initial requirements include: contractor site visits to \"analyze operations, infrastructure, and detailed information for EHR System design and testing\"; gap analyses between existing site infrastructure, system requirements, and the contractor's system architecture; development of solutions to fill identified infrastructure gaps; testing interoperability with legacy systems; delivering various contractor plans to the government (e.g., integrated master plan, risk management plan, data management plan, disaster recovery plan, and cybersecurity vulnerability management plan); EHR system testing in government approved labs, including those conducted by the contractor, government independent testing and evaluation teams, and operational test agencies; and receiving authorization to proceed (ATP) with limited fielding at the IOC sites and to conduct an Initial Operational Test and Evaluation (IOT&E). Concurrently, the DOD Inspector General (DODIG) conducted a performance audit on the DHMSM PMO. The purpose of the audit was to determine if DOD had approved system requirements and if the MHS Genesis acquisition strategy was \"properly approved and documented.\" The audit was conducted from June 2015 through January 2016, with a final report issued on May 31, 2016. Overall, the DODIG found that the MHS Genesis requirements and acquisition strategy were properly approved and documented. However, the report raised concerns about the program's execution schedule (i.e., implementation timeline) not being \"realistic\" to meet Congress's deadline. The DODIG recommended that the PEO DHMS conduct a \"schedule analysis\" to determine if IOC would be achievable by December 2016, and to continue monitoring program risks and report progress to Congress quarterly. In response to the DODIG's recommendation, the PEO DHMS asserted, \"we remain confident we will achieve [IOC] later this year in accordance with the NDAA.\" As part of the implementation strategy, DOD selected MTFs in the Pacific Northwest as its IOC sites (see Table 2 ). On February 9, 2017, MTFs at Fairchild Air Force Base, Washington, were the first sites to transition to MHS Genesis. The purpose of fielding MHS Genesis at the IOC sites before full deployment was to observe, evaluate, and document lessons-learned on whether the new EHR was usable, interoperable, secure, and stable. DOD used several evaluation methods to measure MHS Genesis success at the IOC sites, including the Health Information Management Systems Society's (HIMSS) Electronic Medical Record Adoption Models (EMRAM) and the DOD IOT&E. The results of these assessments would later inform PEO DHMS in its decision to proceed with further deployments. The EMRAM includes two commercially developed assessment tools that health systems and facilities can use to measure adoption of an electronic medical record (EMR) system. The general EMRAM is for inpatient facilities and O-EMRAM is for outpatient facilities. Both tools consist of a self-administered survey, which is then analyzed by HIMSS to produce an EMRAM score. The score, ranging from Stage 0 to Stage 7, describes the level of adoption and utilization of an EMR within a health care organization (see Appendix C ). Generally, Stage 0 indicates minimal or no EMR adoption in a health care facility or clinic, whereas Stage 7 indicates complete EMR adoption, including demonstrated data sharing capabilities and eliminated use of paper charts. Prior to the go-live dates at the IOC sites and while using its legacy systems, DOD's average score was 1.59 for the EMRAM and 2.38 for the O-EMRAM. After all IOC sites transitioned to MHS Genesis, DOD reassessed each IOC site and observed increased EMRAM scores (see Figure 7 and Figure 8 ). MTFs at Fairchild Air Force Base received a score of 6.13 on the O-EMRAM, whereas all other IOC sites scored 5.04. In comparison to U.S. civilian hospitals, the IOC sites scored higher than the national average for the EMRAM (2.00) and O-EMRAM (3.00). However, media reports on EMRAM scoring trends at the end of 2017 note that 66.7% of U.S. hospitals participating in the EMRAM reached \"either Stage 5 or Stage 6.\" For the O-EMRAM, most participating outpatient facilities remained at Stage 1. DOD policy requires DBS programs to undergo an IOT&E to determine program or systems effectiveness and suitability. IOT&E findings provide the USD(A&S) and relevant acquisition or functional leadership with recommendations on whether a program, generally those with total contract values exceeding certain thresholds, should proceed with further implementation. Between September 2017 and December 2017, the Joint Interoperability Test Command (JITC) conducted an IOT&E at each IOC site, with the exception of Madigan Army Medical Center (MAMC). PEO DHMS postponed the MAMC IOT&E to 2018 in order to resolve issues identified at the other IOC sites. While at each site, the JITC conducted initial cybersecurity testing, evaluated interoperability data, observed MTF staff performing day-to-day tasks using MHS Genesis, and administered user surveys on performance and suitability. The Director of Operational Test and Evaluation (DOT&E) reviewed JITC's IOT&E findings and applied them to the following criteria: Does MHS Genesis provide the capabilities to manage and document health-related services? Do MHS Genesis interfaces support or enable accomplishment of mission activities and tasks? Does MHS Genesis usability, training, support, and sustainment ensure continuous operations? On April 30, 2018, DOT&E issued a partial IOT&E report asserting that MHS Genesis was \"neither operationally effective nor operationally suitable.\" DOT&E found that: MHS Genesis is not operationally effective because it does not demonstrate enough workable functionality to manage and document patient care. Users successfully performed only 56 percent of the 197 tasks used as Measures of Performance. MHS Genesis is not operationally suitable because of poor system usability, insufficient training, and inadequate help desk support. Survivability is undetermined because cybersecurity testing is ongoing. See Appendix D for IOT&E summary results by measure of effectiveness and measure of performance evaluation. Based on these preliminary findings, DOT&E recommended to the USD(A&S) a delay in further deployment of MHS Genesis until a full IOT&E was completed and the DHMSM PMO corrected \"outstanding deficiencies.\" Additional recommendations for the DHMSM PMO included: \"Fix all Priority 1 and 2 [incident reports] with particular attention given to those that users identified as potential patient safety concerns, and verify fixes through operational testing. Improve training and system documentation for both users and Adoption Coaches. Increase the number of Adoption Coaches and leave them on site until users are more comfortable with the new processes. Complete cybersecurity operational testing and continue to fix known deficiencies. Work with users to document, reduce, and standardize operational workarounds. Improve interoperability, focusing on interfaces identified as problematic during IOT&E. Monitor reliability and availability throughout the system lifecycle. Work with the Defense Health Agency and DISA to isolate network communications problems and reduce latency. Conduct operational testing at MAMC to evaluate untested functionality and corrective actions taken by the [DHMSM] PMO. Conduct follow-on operational testing at the next fielding site to evaluate revised training and Go-Live process improvements.\" On November 30, 2018, DOT&E issued a final IOT&E report, incorporating results from delayed testing at MAMC. DOD has not made the final report publicly available. DOT&E acknowledges ongoing improvements, but maintains that MHS Genesis is \"not yet effective or operationally suitable.\" A summary of the IOT&E released by the department describes several ongoing issue themes previously identified and described in the partial IOT&E report (e.g., continued incident reports, staff training, change management, and workflow adoption). With regard to cybersecurity, DOT&E described MHS Genesis as \"not survivable in a cyber-contested environment.\" In conjunction with the IOT&E, DOD \"successfully executed\" three cyberspace test attacks against MHS Genesis, highlighting potential security gaps and vulnerabilities with the new EHR system. Notwithstanding DOT&E's findings and recommendations, the DOD Chief Information Officer issued a conditional Authorization to Operate , valid for 12 months. Additionally, PEO DHMS concurred with DOT&E's recommendation for a follow-on operational test and evaluation \"at the next fielding to evaluate corrective actions and revised training, to inform future fielding decisions.\" Since February 2017, DOD has documented numerous issues requiring mitigation strategies prior to deploying the first wave. Selected issues reported by various DOD entities, LPDH, MHS Genesis users, and media outlets are summarized below. During the initial deployment, DHMSM PMO established a single process for all IOC sites to identify, document, and report MHS Genesis issues. Users encountering system inconsistencies, technical errors, or clinical inaccuracies must submit a \"trouble ticket\" to a global service center (GSC). Users can also submit recommendations for changes to current workflows or system configurations to the GSC, as well as through their chain of command. The GSC is a contracted service that reviews, sorts, and assigns technical trouble tickets to LDPH or its sub-contractors for resolution. The GSC also assigns trouble tickets relating to functional capabilities, requirements, or workflows to DHMSM PMO or DHA for further review and adjudication. In April 2018, PEO DHMS reported that 1,000 of approximately 7,000 total trouble tickets generated by users throughout all IOC sites from January 2018 to that point had been resolved. Of the remaining trouble tickets, DHMSM PMO approved 2,000 for \"work by the Leidos Partnership,\" while 2,500 were in review for further adjudication. CRS is unable to ascertain the status of the remaining 1,500 trouble tickets and the timeline in which they may have been resolved. In December 2018, PEO DHMS estimated that 3,607 open trouble tickets remained for resolution. As of October 14, 2019, PEO DHMS estimated 3,238 open trouble tickets from the IOC sites and 787 open trouble tickets from the first wave sites remained for resolution. MHS Genesis users at IOC sites described the issue resolution process as lengthy and lacking transparency. User concerns included: (1) tickets submitted to the GSC were resolved in a period of time that was \"not acceptable for all issues\"; (2) the length of time for decisionmakers to determine a solution; and (3) discovering that a solution had been implemented during a periodic system update, rather than being notified by DHMSM PMO, DHA, or LPDH. Unlike DOD's legacy systems, MHS Genesis is to be a standardized EHR platform across all military treatment facilities and is not customizable for each site. Technical or functional changes to MHS Genesis require DHA-led working groups and DHMSM PMO to review and approve such changes before directing LPDH to implement a solution. Changes exceeding the scope of the MHS Genesis contract require additional review, resourcing, and approval by the acquisition authority. Users reported that initial training provided four months prior to go-live was inadequate and did not allow super users to \"absorb/fully grasp one role before being introduced to the next role.\" Staff members were required to complete computer-based training, followed by instructor-led courses. Course curricula varied by user roles (e.g., clinician, clinical support, administrative staff). Users reported that the LPDH training focused primarily on navigating the various modules and features of MHS Genesis and did not include training on clinical or administrative workflows. For example, primary care clinic nurses were trained on the applicable MHS Genesis modules that would likely be found in the primary care setting. They said they were not trained on accessing other modules that would typically be used outside of the primary care setting, as part of a patient assessment or development of a treatment plan. Users reported having little or no ability to track military medical and dental readiness requirements in MHS Genesis. Pre-built reports to monitor certain health care quality and access metrics were available to MTF staff. Users defaulted to developing local, \"home-grown\" work-around tools in Microsoft Office products in order to meet specific DOD and military service requirements for tracking medical and dental readiness. For example, certain dental data documented in MHS Genesis were not available for data-mining or viewing in legacy dental readiness reporting systems. To compensate for this, dental clinic staff at each IOC site transcribed or manually maintained dental readiness reports by reviewing dental data in both Dentrix (MHS Genesis' dental module) and CDS (the legacy dental system). In reviewing the experience and challenges documented during MHS Genesis deployment at the IOC sites, DOD noted that they \"captured lessons learned, collaborated with our stakeholders, and optimized the system to enhance user adoption. Specific areas of improvement include network optimization, change management, and training enhancements.\" As such, DOD commenced the first wave of MHS Genesis deployments in September 2019. The deployment began with four MTFs in California and Idaho. Each wave is to last 18 months and is to include three major phases: pre-deployment planning with each MTF (3 months), deployment activities (12 months), and post go-live activities (3 months). As outlined in DOD's deployment schedule (see Appendix F ), a new wave is to begin every three months at designated MTFs through late 2022, with wave 23 scheduled to conclude in 2024. Since mid-1980s, Congress has kept abreast of DOD's efforts to implement, sustain, or modernize its EHR systems. Previous congressional oversight activities have primarily focused on (1) understanding DOD's EHR modernization strategy and how the strategy would integrate interoperability and improve coordination with the VA, or (2) describing certain barriers that delayed previous modernization initiatives. Currently, 12 congressional committees may exercise oversight authority of the broader EHR modernization efforts taking place in DOD, VA and USCG. The committees include: House Appropriations Committee. House Armed Services Committee. House Committee on Oversight and Reform. House Committee on Transportation and Infrastructure. House Veterans Affairs Committee. Senate Appropriations Committee. Senate Armed Services Committee. Senate Committee on Commerce, Science, and Transportation. Senate Committee on Homeland Security and Governmental Affairs. Given the complexity, size, and timeline of DOD's EHR modernization effort, as well as parallel efforts by the USCG and VA, a coordinated oversight strategy may be necessary. Such a strategy could allow Congress to conduct a wide range of oversight activities without creating redundancies for committee staff and executive branch officials and could facilitate information-sharing among congressional stakeholders. Since the initial deployment of MHS Genesis, there have been no congressional oversight hearings held solely on DOD's EHR modernization effort. On June 20, 2018, the House Committee on Veterans' Affairs established the Subcommittee on Technology Modernization. The role of the new subcommittee is to \"focus on conducting oversight of the EHR Modernization program and other major technology projects at the Department of Veterans Affairs.\" Both DOD and VA officials testified before the subcommittee at its June 2019 oversight hearing. In September 2018, then-SECDEF James Mattis and current SECVA Robert Wilkie signed a joint statement (see Appendix G ) that outlined each department's commitment to \"implementing a single, seamlessly integrated [EHR] that will accurately and efficiently share health data â¦ and ensure health record interoperability with our networks of supporting community healthcare providers.\" On April 3, 2019, DOD announced plans to re-charter the IPO into the \"Federal Electronic Health Record Modernization (FEHRM)\" program office. The new office would serve as an interagency governance group that provides oversight on DOD and VA's EHR modernization efforts and would have the \"authority to direct each Department to execute joint decisions for technical, programmatic, and functional functions.\" DOD stated that the FEHRM Director and Deputy Director will be appointed positions and will report to both the Deputy SECDEF and Deputy SECVA. While Congress directed the creation of the IPO in 2008, neither DOD nor VA has indicated if additional authorities, funding, or changes to current law are required to sustain the FEHRM program office. Congress may also examine the relationships between existing interagency governance groups (e.g., Joint Executive Committee), PEO DHMS, VA EHR Modernization Office, and the newly established FEHRM program office. Because MHS Genesis is being deployed across all MTFs and all USCG sites, as well as VA sites transitioning to a Cerner-based EHR system, observers have noted that this is the \"largest EHR undertaking in the country.\" Implementing a single EHR platform across three federal departments can produce certain economies of scale and standardization. However, the scale of these efforts can also result in future acquisition challenges particularly with conducting a full and open competition to procuring new requirements, or with follow-on contracts to sustain each EHR system. Congress may seek to understand how DOD and VA exercised their statutory authorities, provided through the Competition in Contracting Act of 1984 ( P.L. 98-369 ), to procure their EHR systems, as well as the possible impact of limited competition in future procurement activities needed to sustain both MHS Genesis and the VA's new EHR system. Generally, all federal departments procuring property, goods, or services are required to employ an acquisition process that allows for full and open competition. This process permits all potential vendors to \"submit sealed bids or competitive proposals on the procurement.\" For MHS Genesis, DOD's initial acquisition process included full and open competition. However, the process was not employed for subsequent requirements that were discovered after the initial award to LPDH. These additional requirements included upgrading DOD network infrastructure; incorporating USCG-specific requirements and clinic sites; and establishing common standards among DOD, VA, and USCG. The estimated value of the additional requirements was over $1.2 billion. DOD exercised its statutory authority to award a sole source contract modification to LPDH, citing that contracting with any other vendor would potentially \"create significant redundancies, inefficiencies, and other issues.\" DOD's acquisition strategy anticipates \"one or more competitive follow-on contracts to sustain the EHR solution, for which the Government owns a perpetual license, at the conclusion of the performance of the basic contract.\" However, Cerner declined DOD's request to enter into negotiations regarding the rights of its intellectual property. If DOD does not retain certain intellectual property rights on MHS Genesis, the Department may be limited in what EHR vendors it can consider when it becomes necessary to solicit for an MHS Genesis sustainment contract. Appendix A. Acronyms Appendix B. MHS Genesis Functional Capability Requirements Appendix C. Stages of Electronic Medical Record Adoption and Utilization Appendix D. IOT&E Summary Results Appendix E. Methodology for CRS Focus Groups on MHS Genesis Background On July 8-13, 2018, analysts from the Congressional Research Service (CRS) participated in a congressional staff delegation visit to various DOD facilities in the Puget Sound area of Washington State. DOD facilities visited were Madigan Army Medical Center, Naval Hospital Bremerton, and the Puyallup Community Medical Home. The purpose of the visit was to: review milestones, achievements, and challenges associated with the implementation of MHS Genesis; and understand implementation and continuous improvement processes utilized at initial operational capability sites. Methodology At each site, CRS conducted numerous focus groups comprised of various MTF staff members. Each focus group was comprised of 5â15 staff members selected by the MTF commander or his/her designee. Madigan Army Medical Center Focus Group #1: Patient Administration Division, Managed Care and Scheduling, and Patient Satisfaction Department representatives Focus Group #2: Health care providers (e.g., physicians, dentists, psychologists, physicians assistants) Focus Group #3: Nurses Naval Hospital Bremerton Focus Group #1: Nurses Focus Group #2: Health care providers (e.g., physicians, dentists, psychologists, physicians assistants) Focus Group #3: Enlisted personnel Focus Group #4: Patient Administration, Referral Management, and Patient Relations representatives Puyallup Community Medical Home Focus Group #1: Health care providers, nurses, health care administrators, enlisted personnel Prior to each site visit, CRS provided each MTF with questions for discussion during each focus group. CRS documented the themes and responses to each of the following questions: What challenges have you experienced with implementing MHS Genesis? How have you locally mitigated these issues? Are the mitigation processes in place working? Have these challenges impacted force readiness, access to care, quality of care, cost of care, or patient experience? Appendix F. MHS Genesis Deployment Schedule Appendix G. DOD and VA EHR Joint Commitment Statement Background On July 8-13, 2018, analysts from the Congressional Research Service (CRS) participated in a congressional staff delegation visit to various DOD facilities in the Puget Sound area of Washington State. DOD facilities visited were Madigan Army Medical Center, Naval Hospital Bremerton, and the Puyallup Community Medical Home. The purpose of the visit was to: review milestones, achievements, and challenges associated with the implementation of MHS Genesis; and understand implementation and continuous improvement processes utilized at initial operational capability sites. Methodology At each site, CRS conducted numerous focus groups comprised of various MTF staff members. Each focus group was comprised of 5â15 staff members selected by the MTF commander or his/her designee. Madigan Army Medical Center Focus Group #1: Patient Administration Division, Managed Care and Scheduling, and Patient Satisfaction Department representatives Focus Group #2: Health care providers (e.g., physicians, dentists, psychologists, physicians assistants) Focus Group #3: Nurses Naval Hospital Bremerton Focus Group #1: Nurses Focus Group #2: Health care providers (e.g., physicians, dentists, psychologists, physicians assistants) Focus Group #3: Enlisted personnel Focus Group #4: Patient Administration, Referral Management, and Patient Relations representatives Puyallup Community Medical Home Focus Group #1: Health care providers, nurses, health care administrators, enlisted personnel Prior to each site visit, CRS provided each MTF with questions for discussion during each focus group. CRS documented the themes and responses to each of the following questions: What challenges have you experienced with implementing MHS Genesis? How have you locally mitigated these issues? Are the mitigation processes in place working? Have these challenges impacted force readiness, access to care, quality of care, cost of care, or patient experience?", "summary": "Since 1968, the Department of Defense (DOD) has developed, procured, and sustained a variety of electronic systems to document the health care services delivered to servicemembers, military retirees, and their family members. DOD currently operates a number of legacy electronic health record (EHR) systems. Each system has separate capabilities and functions as a result of new or changing requirements over the past five decades. The primary legacy systems include the Composite Health Care System (CHCS), Armed Forces Health Longitudinal Technology Application (AHLTA), Essentris, and the Corporate Dental System. DOD also still uses paper medical records that are later scanned and digitally archived. Currently, only certain components of DOD's health records are accessible to the Department of Veterans Affairs (VA). In the early 1990s, concern grew about deficient interoperability between DOD and VA. This led to recommendations by various commissions on military and veterans health care calling for greater coordination and data sharing efforts between the two departments. Between 1998 and 2008, DOD and VA developed several capabilities to exchange patient health information across each department's EHR systems. However, Congress did not view these systems as an adequately integrated approach. This led to several congressional mandates being issued between 2008 and 2014, including for the development of an interoperable EHR (including a deadline to implement such system), for certain capability requirements, and for the creation of an interagency program office. After several strategy changes to meet Congress's mandates, DOD opted to acquire a commercial-off-the-shelf EHR product to replace its legacy EHR systems. The new system would be called MHS Genesis. In July 2015, DOD awarded the MHS Genesis contract to Leidos Partnership for Defense Health (LPDH). The contract includes a potential 10-year ordering period and an initial total award ceiling of $4.3 billion. DOD selected several MTFs in Washington to serve as Initial Operational Capability (IOC) sites and began fielding MHS Genesis in 2017. The designated IOC sites included: Madigan Army Medical Center, Fairchild Air Force Base, Naval Hospital Bremerton, and Naval Health Clinic Oak Harbor. The purpose of fielding MHS Genesis at the IOC sites before full deployment was to observe, evaluate, and document lessons-learned on whether the new EHR was usable, interoperable, secure, and stable. During initial deployment, DOD evaluators and IOC site personnel identified numerous functional and technical challenges. In particular, the Defense Department's Director of Operational Testing and Evaluation found that MHS Genesis was \"not yet effective or operationally suitable.\" Technical challenges included cybersecurity vulnerabilities, network latency, and delayed equipment upgrades and operational testing. Functional challenges included lengthy issue resolution processes, inadequate staff training, and capability gaps and limitations. DOD acknowledged these issues, implemented follow-on testing ongoing corrective actions, and revised its training approach for future fielding. DOD plans to implement MHS Genesis at all military treatment facilities (MTFs) in 23 waves through 2024. Each wave spans 18 months, with a new wave commencing every three months at designated MTFs. The first deployment wave began in September 2019 at MTFs in California, Oregon, and Idaho. As DOD moves to fully implement MHS Genesis, Congress may choose to address various issues including: how oversight can be conducted on a program that spans three federal departments; what kind of interdepartmental governance structure is needed to implement the program; and how to ensure fair and open competition in future procurement decisions.", "document_type": "crs"}
{"report": "Congress passed the Uranium Mill Tailings Radiation Control Act of 1978 (UMTRCA, P.L. 95-604 ) in the wake of environmental and public health concerns about exposures to radiological and non-radiological waste material originating from Cold Warâera uranium mill tailing sites. Title I of UMTRCA authorized a remedial action program for uranium mill tailing sites that were inactive prior to the law's enactment in 1978. Under Title I of UMTRCA, the federal government was mostly responsible for financing the remediation and decommissioning of Title I sites, most of which produced uranium for nuclear weapons and other defense purposes. Title II of UMTRCA authorized federal agencies to regulate uranium mill tailings produced at commercially licensed facilities still operating on or after 1978. For Title II sites, Congress intended that commercial uranium mill operators, not the federal government, pay for site decommissioning and tailings stabilization activities. The federal government assumes responsibility for both Title I and Title II uranium mill sites transferred to long-term federal management after site decommissioning has been completed. As of FY2019, the Department of Energy Office of Legacy Management (DOE-LM) administers long-term federal management at 31 Title I sites and six Title II sites. DOE-LM manages surface tailings and groundwater monitoring programs at sites under long-term federal management in an effort to minimize any unintended release of potentially radiological or non-radiological material. Long-term monitoring and maintenance activities may include stabilization of the engineered repository of uranium mill tailings and groundwater remediation or monitoring, if necessary. As of FY2019, 23 Title II sites remain owned by commercial operators, who are permitted to operate under the Nuclear Regulatory Commission (NRC) or an NRC agreement state license. When the Title II site operator has completed all site decommissioning requirements, the license is to be transferred to DOE for long-term federal management. This report presents the historical context for the law, the status of implementation since enactment, and selected issues for Congress. UMTRCA does not authorize the regulation of uranium miningâthe process of physically removing uranium ore from the earthâor the disposal of waste material produced by uranium mining. The regulation of uranium mining and the remediation of abandoned uranium mines are not discussed in this report. Uranium milling is the process of converting mined uranium ore to uranium concentrate, also known as yellowcake uranium. Milling is common to a number of mineral extraction industries and refers to the physical and chemical processes necessary to concentrate minerals from mined ore. Uranium milling operations use a series of physical (crushing and grinding the mined ore) and chemical processes (acid or alkaline solutions, ion exchange) to concentrate the mineralized uranium ore into yellowcake uranium. Heap leaching, a specific type of uranium milling operation, involves sprinkling sulfuric acid or another solvent directly over the ore in large earthen collection pits. The acidic stream trickles through the ore and dissolves uranium and that stream is collected and processed. Yellowcake uranium produced from the milling process is subsequently converted and enriched for civilian nuclear power production ( Figure 1 ). Tailings are the waste material produced from milling operations. The milling process produces tailings initially as a slurry material, which is disposed of in a settling pond. The slurry tailings material dries, resulting in a sand-like material. Milling operations produce a large quantity of tailings relative to the amount of uranium concentrate produced. NRC estimated that 2.4 pounds of yellowcake uranium oxide is produced from 2,000 pounds of uranium ore. Public health and environmental concerns from uranium milling has been associated with various aspects of historical operations and tailings disposal. The U.S. Environmental Protection Agency (EPA) has identified four health exposure routes from uranium mill tailings: 1. Increased risk of lung cancer from the diffusion of radon gas indoors if tailings material is used for construction material, 2. Inhalation of radon gas or ingestion of small particles directly emitted from the mill piles into the atmosphere, 3. Exposure to gamma radiation produced by radioactive decay products within the tailings, and 4. Wind and water erosion and mobilization of radioactive and other constituents into surface and groundwater. Physical and geochemical mechanisms can liberate trace metals and radionuclides within the tailings into groundwater or surface water. The hazards associated with the release of various radiological and non-radiological constituents from uranium tailings may persist for hundreds or thousands of years. During the 1950s and 1960s, the U.S. Atomic Energy Commission, a predecessor federal agency to DOE and NRC, procured uranium concentrate by funding domestic uranium ore mining exploration and development, entering into private purchasing contracts with domestic milling companies, and purchasing foreign produced uranium concentrate. The majority of domestic uranium concentrate production prior to 1971 primarily supported the development of nuclear weapons and naval reactors. From 1947 to 1971, annual domestic uranium concentrate production ranged from 20 million pounds to 35 million pounds ( Figure 2 ). After 1971, uranium mill operators produced uranium concentrate primarily for the production of civilian nuclear power. The 1970s were a period of growth for the U.S. nuclear power industry, as 59 nuclear reactors were first connected to the electricity grid between 1970 and 1979. NRC estimated in 1978 that over 109 uranium mills would be required by the year 2000 to support the fuel requirements of the growing reactor fleet. However, domestic uranium concentrate production in the United States decreased by roughly 92% from 1978 to 1993 ( Figure 2 ). By 2000, one active U.S. uranium mill, two partially active U.S. uranium mills, and three in-situ recovery (ISR) facilities combined to produce 4 million pounds of uranium concentrate. Continued growth by the domestic civilian nuclear power industry did not materialize as anticipated in 1978. Numerous factors led to decrease of domestic uranium production. In particular, U.S. nuclear power growth was far less than envisioned by Congress and federal agencies in 1978, as U.S. nuclear plant orders virtually halted after that year and dozens of previous orders were canceled. While the number of operational uranium mills was less than originally envisioned, potential risks from the uranium mills that did operate continue to present technical and regulatory challenges. The awareness of the technical and economic challenges posed during the decommissioning and long-term management of uranium mill tailings have increased since 1978. As of the second quarter of 2018, the U.S. uranium concentrate facilities consisted of one uranium mill and six ISR facilities in operation. The Uranium Mill Tailings Radiation Control Act of 1978 (UMTRCA; P.L. 95-604 ) includes three titles: Title I authorized the remediation of uranium mill tailings inactive prior to the law's enactment in 1978. Title II authorized the regulation of commercial uranium mills operating on or after 1978. Title III directed the NRC to consult with the state of New Mexico to study and designate two mill tailings sites in New Mexico. By 1998, DOE completed site decommissioning for all Title I sites, with the exception of the site located at Moab, UT. Legislation to authorize cleanup at Moab was enacted subsequent to UMTRCA. Title I provisions do not authorize remedial actions for sites in operation on or after 1978, which are addressed under Title II. Provisions under Title III have been resolved. Title I was enacted to address the environmental and public health risks associated with residual radioactive material produced at \"inactive\" uranium mill sites generated in support of the federal uranium procurement program during the mid-1940s through the 1970s. The majority of the uranium concentrate produced during this time period was for the development of nuclear weapons, nuclear fuel production, and other Atomic Energy Commission programs. After the federal procurement contracts ended in the early 1970s, operations at some uranium mills ceased and licenses were terminated with few environmental remediation requirements. Prior to 1978, federal agencies lacked legal authority to regulate uranium mill tailings. In 1966, federal agencies issued a \"Joint Federal Agency Position Regarding Control of Uranium Mill Tailings\" urging planning management and stabilization of the mill tailings as the responsibility of the individual owners. Yet without a legally binding regulatory program, DOE subsequently noted that actions resulting from the Joint Position were \"far from satisfactory.\" Multiple communities used uranium mill tailings as construction material for civilian building projects. The characteristically \"sandy\" uranium tailings were attractive to construct roads, sewers, farmlands, foundations in office buildings, schools, homes, and other structures. These sites became known as vicinity properties . In one instance, DOE reported that a uranium mill operator left a front-end loader on site for members of the public to take as much uranium tailings material as they could handle. NRC stated that 270,000 metric tons of uranium tailings at Grand Junction were used for building materials. In 1972, growing concerns about environmental and public health risks from uranium mill tailings used as construction material led to Congress appropriating funds for remedial action of contaminated sites near Grand Junction, CO. Section 201 of the 1972 Atomic Energy Commission Appropriation Authorization (P.L. 92-314) \"assumes the compassionate responsibility of the United States to provide to the state of Colorado financial assistance to undertake remedial action to limit the exposure of individuals to radiation emanating from uranium mill tailings which have been used as a construction related material in the area of Grand Junction, Colorado.\" The legislation addressing issues at Grand Junction served as the template for the remedial action program authorized under Title I of UMTRCA. Section 101 of UMTRCA defines key terms and identifies federal agencies authorized to implement UMTRCA. A processing site is defined as \"(A) any site, including the mill, containing residual radioactive materials at which all or substantially all of the uranium was produced for sale to any Federal agency prior to January 1, 1971 under a contract with any Federal agency â¦ and (B) any other real property or improvement thereon which (i) is in the vicinity of such site, and (ii) is determined by the Secretary [of Energy], in consultation with the [NRC], to be contaminated with residual radioactive materials derived from such site.\" Vicinity properties are off-site properties where uranium mill tailings were used as construction material prior to the law's enactment. A lesser amount of vicinity properties were adjacent sites contaminated by wind-borne dispersion of mill tailings particles. By 1999, DOE reported that it had remediated 5,300 vicinity properties. DOE's authority to perform surface remedial actions at Title I UMTRCA sites, including vicinity properties, expired on September 30, 1998. Residual radioactive material is defined under Section 101 as \"waste (which the Secretary determines to be radioactive) in the form of tailings resulting from the processing of ores for the extraction of uranium and other valuable constituents of the ores; and other waste (which the Secretary determines to be radioactive) at a processing site which relate to such processing, including any residual stock of unprocessed ores or low-grade materials.\" Tailings are defined as \"the remaining portion of a metal-bearing ore after some of all of such metal, such as uranium, has been extracted.\" DOE's remedial action efforts aimed to permanently isolate the residual radioactive material from the environment. Residual radioactive material was enclosed in engineered repositories consisting of multiple layers of relatively non-permeable materials and capped with rip-rap. These layers are intended to prevent the release of radon gas, limit downward infiltration and water seepage through the tailings piles, and minimize the erosion of repository by natural wind and water. The repository is designed to stabilize residual radioactive material for at least 200 years and up to 1,000 years. A disposal site identifies the location where the engineered tailings repository is sited, which is either at the original processing site or an alternative location. D isposal site is not explicitly defined by statute under Title I. However, EPA regulations define disposal site as \"the region within the smallest perimeter of residual radioactive material (excluding cover materials) following completion of control.\" The distinction between a processing site and disposal site has bearing on long-term federal management obligations. Under UMTRCA, DOE is required to consult with the EPA to prioritize which sites pose a potential health hazard. However, DOE is not bound by EPA's site priority evaluation, and nothing in the statute precludes DOE from proceeding with remedial actions on lower priority sites. UMTRCA instructed DOE to consult with NRC to develop site-specific boundaries. Site designations under this section are not subject to judicial review. Section 102 lists 22 processing sites originally designated under the Title I. The number of Title I and Title II sites has expanded, and a full inventory of UMTRCA sites is presented in Table A-1 and Table A-2 . Section 103 authorized DOE to enter into cooperative agreements with states or tribes to perform remedial actions at inactive uranium mill tailing sites. Cooperative agreements between DOE-LM and states are subject to NRC concurrence. Under Section 103, any cooperative agreement between DOE and states are conditional on the site owner releasing DOE of liability associated with any issues occurring during remedial actions. Section 103 authorizes DOE, NRC, and EPA access to any site for inspection and enforcement subject to the establishment of a cooperative agreement. Section 105 authorizes cooperative agreements between DOE and Indian tribes in consultation with the Department of the Interior's Bureau of Land Management (BLM), similar to provisions in Section 103, when processing sites are located on Indian lands. Generally, DOE remediated the inactive uranium mill tailings and constructed a repository at the original processing site location. However, Congress was aware of instances where inactive uranium mill tailings were located on a floodplain or directly adjacent to a stream or river. In those instances, designing, constructing, and maintaining an engineered repository for the uranium mill tailings located next to a stream may have been technically infeasible. UMTRCA authorizes agencies to determine whether an alternative disposal site was necessary to protect human health and the environment. Section 104 authorizes the state, under a cooperative agreement with DOE, to purchase surface and subsurface rights and transport tailings materials to an alternative disposal site. When NRC and DOE determined that an alternative disposal site was necessary, DOE constructed repositories that were separate from the original inactive uranium mill tailings. The management of the original processing site was returned to the state. Section 104 outlines four options for the state to manage the processing site: (1) sell the land, (2) retain the land, (3) donate the land for public or recreational purposes, or (4) transfer the land to the federal government. The state provides appropriate documentation of remedial actions on the processing site to future purchasers. DOE manages Title I disposal sites under a general NRC license. UMTRCA authorized DOE to obtain the surface and subsurface mineral rights for the disposal site. The acquisition of subsurface interests was required conditional to a cooperative agreement. Congress intended to avoid situations where the extraction of underlying minerals by subsurface mineral rights owners could disrupt the stabilized tailings. Under UMTRCA, inactive uranium mill tailings located on federal public lands are transferred to DOE as a public land withdrawal. Section 104(h) authorizes BLM to sell or lease rights to federal lands located within the disposal site boundary. BLM is required to follow all applicable U.S. laws to sell or lease and provide assurances that the stabilized residual radioactive materials will not be disturbed by mineral development activities. Any prospective mineral developer is subject to licensing. If the stabilized site is disturbed, the private operator must perform site remediation at no cost to the federal government. Section 106 authorizes the purchase of land to develop a consolidated disposal site. The section discourages use of any National Park System, National Wildlife Refuge System, and National Forest System lands. If land is acquired in a state where uranium milling has not occurred, the acquisition is subject to state concurrence. During the debate leading to the enactment of UMTRCA, Congress recognized that no clear entity was responsible for the cleanup of inactive uranium mill tailings among the federal government, states, and private site operators. In 1978, the U.S. General Accounting Office (now the Government Accountability Office, GAO) proposed that the federal government was most responsible to fund a cleanup program, as the majority of the uranium produced for the generation of uranium mill tailings was purchased at that time under federal supply contracts for the Manhattan Engineering District and other defense programs. In drafting UMTRCA, Congress decided that the federal government should be responsible for most of the remedial action costs at Title I sites and that the states where the Title I sites are located should share a portion of the costs. Section 107 establishes the financial responsibilities for remedial actions for the federal government and the cooperative states. Under Section 107, the federal government is responsible for 90% of the remediation costs, including costs for land acquisition and cleanup of buildings and structures in the vicinity. Under a cooperative agreement, a state commits the remaining 10% share of the remediation costs. The federal government was responsible for all remedial action costs at processing sites located on Indian lands pursuant to a cooperative agreements under Section 105. Congress authorized EPA to promulgate health and environmental standards for uranium mill tailing sites. Section 108 directed DOE to perform remedial actions in accordance with general health and environmental standards promulgated by the EPA pursuant to Section 275 of the Atomic Energy Act of 1954 (AEA, P.L. 83-703), amended by Section 206 under UMTRCA. EPA finalized standards for Title I sites, under 40 C.F.R. Part 192, Subparts A, B, C, on January 11, 1995. DOE identified groundwater contamination at UMTRCA sites during implementation. Groundwater contamination remains an ongoing issue at several sites. In the late 1980s, DOE expressed concern that groundwater contamination issues could not be resolved in a specified period of time. Congress enacted the Uranium Mill Tailings Remedial Action Amendments Act of 1988 (UMTRA, P.L. 100-616 ), which amended Section 112 of UMTRCA to extend indefinitely DOE's authority to perform groundwater remediation. UMTRA provides DOE groundwater remedial authority for Title I sites only. Title II of UMTRCA amended the AEA to authorize the regulation of licensed commercial uranium mills on or after the enactment of UMTRCA. Title II includes provisions authorizing the mechanism for transfer of land and mill tailings to the federal government; establishing regulatory roles of the states and federal agencies; and authorizing agencies to enter into bonding, surety, or other financial arrangements with a licensee to cover the costs of a federal agency administering long-term federal management. Section 201 amended Subsection 11e of the AEA to include mill tailings under the definition of byproduct material . Under Section 201, byproduct material is defined as \"the tailings or wastes produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material content.\" Section 202 amended the AEA by adding Section 83 authorizing the federal government to retain the byproduct material where the tailings are disposed of for long-term management. UMTRCA allows for the state, at its discretion, to retain the site under long-term management, but no state has elected to do so. Pursuant to Section 202, any license issued that \"results in the production of any byproduct material\" must comply with NRC decommissioning standards, and byproduct material and the land where it was disposed of must be transferred to long-term federal management. The site is transferred to long-term federal management when NRC, or the state, determines that the site decommissioning has met all applicable requirements. Unlike Title I sites, UMTRCA does not authorize DOE to perform remedial actions at Title II sites under long-term federal management. Section 202 authorizes DOE, as the custodial agency, to \"carry out maintenance, monitoring, and emergency measures, but shall take no other action pursuant to such license, rule or order, with respect to such property and materials unless expressly authorized by Congress after the date of the enactment of this Act.\" NRC may exempt the requirement for long-term federal management prior to the termination of the license if long-term federal management is found \"not necessary or desirable to protect the public health, safety, or welfare or to minimize or eliminate danger to life or property.\" The process to transfer a Title II site from an NRC license to long-term federal management is described in regulation and guidance. For Title II sites transferring federal public lands to long-term federal management under DOE, \"DOE must apply to BLM for permanent withdrawal of federal land and minerals from BLM's inventory.\" Any transfer of BLM lands is subject to National Environmental Policy Act review. The U.S. Army Corps of Engineers, state governments, and local governments may become involved with the land transfer depending on the location of the site and the land ownership. In the majority of UMTRCA public land withdrawals, DOE maintains full regulatory jurisdiction of surface and subsurface interests associated with the disposal site. More recently, there has been interest in alternative uses at federally managed disposal sites. As a result, BLM and DOE have proposed a \"partial-jurisdiction\" regulatory structure at certain sites. The DOE would regulate the mill tailings repository and ensure that statutory maintenance and monitoring requirements are met. BLM would lease surface and subsurface rights for alternative uses of the land (grazing, recreational, etc.) and mineral development (oil and gas, uranium, etc.). Section 205 of UMTRCA amended Section 84 of the AEA authorizing NRC as the principle federal regulator of Title II sites through issuance and enforcement of source and byproduct material licenses. Section 205 directs NRC to manage byproduct materials in manner that protects public health and environment from radiological and non-radiological hazards associated with the processing, possession, and transfer of byproduct materials. In establishing license conditions that would achieve protectiveness, Section 205 also allows NRC to consider costs and other factors. NRC and agreement states are also responsible for ensuring that licensees manage byproduct material in a manner that conforms to generally applicable standards promulgated by EPA. Section 206 of UMTRCA amended Section 275 of the AEA authorizing EPA to set generally applicable environmental and health standards. Congress intended standards to be consistent (to the maximum extent practicable) with the standards required under Subtitle C of the Solid Waste Disposal Act, as amended by the Resource Conservation and Recovery Act of 1976 (RCRA). Congress did not intend EPA standards to be site-specific in order to provide the agencies flexibility to address surface and groundwater issues at a broad range of sites. UMTRCA authorizes EPA to revise these standards periodically. On October 7, 1983, EPA published the final rule for applicable standards for Title II uranium mill tailings sites. The NRC determines whether the licensee has fulfilled all applicable decommissioning standards and license requirements prior to termination of the license and transfer of the site to long-term federal management. The NRC may delegate regulatory authority to an agreement state for issuing and enforcing byproduct material licenses in a manner that conforms to NRC requirements. NRC retains oversight authority over agreement states, and the state ensures that the licensee remains in federal regulatory compliance. Four UMTRCA Title II sites are listed on the National Priorities List under the Comprehensive Environmental Response, Compensation, and Liability Act ( P.L. 96-510 ), which authorizes remediation and enforcement actions against the releases of hazardous substances into the environment. At these four sites, NRC, EPA, and the state regulate remediation efforts by operating under a signed memorandum of agreement, which identifies the various agencies' responsibilities. Congress authorized DOE to implement remedial action programs under Title I and designated DOE as the federal agency responsible for long-term federal management of UMTRCA sites. DOE-LM was established in 2003 and manages environmental contamination at sites associated with legacy activities during World War II and the Cold War. As of FY2019, DOE-LM manages 19 Title I disposal sites, 12 Title I processing sites, and six of 29 Title II disposal sites. DOE-LM anticipates that it will assume custody of 17 additional Title II disposal sites over the next decade. UMTRCA processing and disposal sites are located in 12 states ( Figure 3 ). Site names and title descriptions are presented in the appendix ( Table A-1 ) . Section 204 of UMTRCA amended Section 274b of the AEA authorizing NRC to enter into agreements with states allowing the states to regulate uranium milling operations through the issuance and enforcement of radioactive material licenses. Such agreement states retain the primary regulatory authority over licenses for radioactive materials on the determination that their regulations are as stringent as those of NRC. The agreement state is responsible for issuing and enforcing the license to ensure that the licensee manages byproduct material in a manner that conforms to federal requirements. Section 204 of UMTRCA includes requirements for procedures for rulemaking, environmental analysis, and judicial review. NRC oversees agreement state programs through inspections, training, and varying degrees of participation in rulemakings or other administrative activities. Congress intended the NRC to regulate licenses in a manner such that decommissioning requirements would be so stringent as to minimize the need for long-term maintenance and monitoring activities. Section 203 amended Section 161 of the AEA authorizing NRC to enter into short- and long-term bonding, surety, or other financial arrangements with uranium mill licensees. Short-term financial arrangements pay any remaining decommissioning costs if the operator becomes insolvent or otherwise incapable of completing all NRC decommissioning requirements. Long-term financial arrangements pay for the costs for DOE to perform long-term maintenance and monitoring after the license has been transferred to long-term federal management. The legislative history suggests that public health and environmental concerns at the time were generally focused on preventing exposure to radiological emissions released into the air, such as radon gas. Many in Congress also expressed concern about potential exposure risks associated with the unrestricted use of radioactive tailings material used as fill material for buildings and other construction projects. Less understood at the time of UMTRCA's original enactment was the dispersion and migration of radiological and non-radiological contaminants in groundwater, which has been an issue at some UMTRCA sites. DOE's surface remedial authority expired in 1998 for Title I sites. DOE continues to administer groundwater remediation and monitoring programs at Title I sites under long-term federal management. The Moab processing site in Utah is the only Title I site that has not transferred to long-term federal management. Prior to UMTRCA, federal regulatory agencies had little authority to regulate tailings, and methods were not required under federal law to mitigate the erosion of tailings. Inactive uranium mill tailings piles were often susceptible to natural dispersal by wind, water, and human disturbances associated with unintended access to the tailings material. Under Title I of UMTRCA, state and federal agencies designed disposal sites as engineered repositories, which are intended to stabilize inactive uranium mill tailings for hundreds of years. As of 1994, the GAO reported for Title I remedial actions that \"DOE spent $2 billion on surface cleanup activities through fiscal year 1994 and expects to spend about $300 million more through 1998.\" Since 1998, when DOE's surface remedial authority expired, expenditures at Title I sites have been for groundwater remediation, disposal site stabilization, and monitoring activities. For Title II sites, private licensees are required to fund site decommissioning to all applicable requirements. After decommissioning of the site by the licensee, the disposal site is transferred to DOE-LM for long-term federal management. So far, six Title II sites have transferred to DOE-LM, while the decommissioning of the remaining Title II sites remains ongoing. Given the groundwater, stabilization, and erosion management issues experienced at Title I sites, DOE-LM may encounter similar challenges at Title II disposal sites once they are transferred to long-term federal management. The DOE-LM efforts to stabilize Title I and Title II disposal sites present continuing challenges. Natural factorsâsuch as wind erosion, intense rainfall and precipitation, and droughtsâcan deteriorate the physical integrity of the disposal site and potentially cause the unintended release of contaminants. Vegetation can aid in stabilizing tailings and minimizing erosion. Annual monitoring and maintenance costs may vary from year to year depending on the variability in climatic events. Some uranium mill operations have resulted in groundwater contamination from unlined surface tailings ponds, leach pads, and dissolution of hazardous constituents from water seepage through the tailings piles. Radiological and non-radiological contaminants may migrate if uncontrolled, remain in appreciable quantities, or naturally decrease in the aquifer depending upon site-specific geological characteristics. NRC has characterized groundwater contaminant plumes at some UMTRCA sites as up to three miles long. As such, off-site migration of groundwater contamination has been an issue at some UMTRCA sites. DOE has applied active and passive groundwater remediation strategies at UMTRCA sites. Active groundwater restoration methodsâsuch as pump-and-treatâhave been used with varying results. DOE has implemented natural flushing , a passive treatment method, to manage groundwater contamination. Natural flushing relies upon monitoring to characterize the movement rate and distribution of the contaminant plume. DOE-LM often applies institutional controls at UMTRCA sites in conjunction with groundwater remediation programs. Institutional controlsâwhich include providing alternative water sources, site use restrictions, drilling restrictions, fencing, and signsâare intended to minimize risks associated with exposures to impacted groundwater. For example, issues with persistent groundwater contamination at the Riverton, WY, Title I processing site prompted DOE to develop institutional controls at that site to minimize residents' groundwater use. DOE's institutional controls included certain restrictions and notifications for developing new water wells and arranging alternative sources of water within the control boundary. DOE-LM administers groundwater monitoring programs at several UMTRCA sites. DOE develops a long-term surveillance plan as part of the NRC general license requirements. Included in the long-term surveillance plan are detailed site-specific groundwater monitoring requirements. Groundwater monitoring requirements include the types of groundwater constituents sampled, the frequency of groundwater sampling, and the location and number of monitoring wells necessary to characterize the groundwater contamination. For Title I sites, the 1988 UMTRA amendment authorized DOE to perform groundwater remediation indefinitely. However, DOE is not authorized to perform groundwater remediation at Title II sites under long-term federal management. At Title II sites under long-term federal management, DOE is authorized to perform maintenance and monitoring and to take emergency measures when necessary to protect public health. In the debate leading to the enactment of UMTRCA, some Members expressed the intent to prevent \"additional and costly remedial action\" unless appropriated by Congress through legislative action. The annual funding needs for UMTRCA sites under long-term federal management are dependent on the degree of site-specific monitoring and maintenance requirements and, for Title I sites, groundwater remediation costs. By the late 1990s, Title I disposal sites were constructed and transferred to long-term federal management, with the exception of the Moab site in Utah. DOE-EM administers the Moab site remediation. The Moab site was originally designated as a Title II site under UMTRCA. The enactment of the Floyd D. Spence National Defense Authorization Act for Fiscal Year 2001 ( P.L. 106-398 ) in October 2000 designated Moab from a Title II site to a Title I site. In designating Moab as a Title I site, Congress terminated the specific license under Title II and transferred the ownership to DOE and the remaining decommissioning costs to the federal government. Uranium mill tailings at the Moab site are located on the north bank of the Colorado River. DOE-EM constructed a railway specifically for this project to transport the tailings to a disposal site, Crescent Junction, located approximately 30 miles to the north. DOE transports tailings and performs groundwater remediation at the site. DOE-EM reports that it had transported 59% of the roughly 16 million tons of uranium mill tailings by the end of December 2018. DOE-EM anticipates project completion by 2034. DOE had incurred costs of $527 million by the end of FY2018 and estimated the total lifecycle costs to range from $1.186 billion to $1.197 billion. Funding for Moab is appropriated annually in the Energy and Water Development and Related Agencies appropriations bill under the Non-Defense Environmental Cleanup account. Site remediation costs and time frames have exceeded amounts originally envisioned by Congress, the agencies, and the licensees due to an evolving understanding of the complexities and risks posed by unintended releases of contaminants from uranium mill tailings. In 1995, the GAO reported that DOE's total surface remediation costs were $2.3 billion, exceeding original 1982 estimates by $621 million. Additionally, long-term federal costs to manage disposal sites and persistent groundwater contamination remain uncertain due to unforeseen challenges and site-specific monitoring and maintenance needs. For Title II sites, six sites have been transferred to DOE-LM as of FY2019. Licensees of remaining Title II sites continue to decommission and transfer their sites to DOE-LM. Prior to long-term federal management, UMTRCA directs federal and state regulatory agencies to apply the stringency of decommissioning requirements on a licensee so that the degree of long-term monitoring and maintenance requirements are minimized. DOE-LM manages a Title II site once the NRC or the state transfers the license from the licensee following decommissioning. In certain instances, NRC, DOE-LM, state agencies, and licensees have disagreed about the adequacy of decommissioning, the degree of long-term monitoring, and the amount of funding needed to perform long-term federal management requirements. In some instances, differences in views among the agencies have affected the timing of decommissioning and license transfers to DOE-LM. In other instances, licensees have lacked adequate funding to complete decommissioning. The following sections describe selected issues regarding proposed legislation, site-specific issues decommissioning, and long-term financial assurance. DOE and residents continue to discover and excavate contaminated material at vicinity properties (i.e., buildings, roads, and sidewalks) around Grand Junction, CO, where uranium mill tailings were used as construction material prior to the enactment of UMTRCA. Discovered byproduct material from vicinity properties is disposed in the Cheney disposal cell, located 15 miles southeast of the Grand Junction processing site. DOE constructed the Cheney disposal cell in 1990 to accept residual radioactive material from the Title I Grand Junction processing site and vicinity properties contaminated by the use of uranium tailings as building materials. Under Section 112 of UMTRCA, DOE's authority to accept byproduct material at the Cheney disposal cell is scheduled to expire at the end FY2023 or until the cell reaches capacity, whichever comes first. DOE would be prohibited to operate the Cheney disposal cell after FY2023 absent the enactment of reauthorizing legislation. In the 116 th Congress, the House passed H.R. 347 authorizing DOE to dispose of residual radioactive material from processing sites and byproduct material from vicinity sites in the Cheney disposal cell through FY2031. Similar versions of this legislation were introduced in the 115 th Congress. Thirteen Title II uranium mills produced uranium concentrate under both federal procurement contracts and commercial civilian nuclear power production. Title X of the Energy Policy Act of 1992 ( P.L. 102-486 ) authorized reimbursements to pay Title II licensees for remedial costs proportional to the quantity of byproduct material produced under federal procurement contracts. Reimbursement payments under Title X do not absolve the licensees from completing site decommissioning. DOE-EM administers reimbursement payments to eligible Title II sites with funds appropriated from the Uranium Enrichment Decontamination and Decommissioning Fund, established under Title XI of the Energy Policy Act of 1992, to support remediation of federal uranium enrichment facilities. Title X reimbursements are subject to annual appropriations in the Energy and Water Development and Related Agencies appropriations bill. In 2000, eight years after the authorization of Title X reimbursements, the 106 th Congress recognized that the implementation of decommissioning by licensees was more costly and taking longer than originally envisioned. As of 2019, Title II licensees eligible for Title X continue to face similar decommissioning challenges. For example, committee report language in the FY2019 Energy and Water Development and Related Agencies appropriations bill directs DOE to use funds to \"reimburse licensees for approved claim balances in a timely manner and to avoid accumulating balances and liabilities.\" From FY1994 to FY2018, DOE reported that $355 million was reimbursed to 13 licensees. According to DOE, there were $26 million in approved but unpaid claims as of FY2018, and estimated remaining program liability was $99 million for the remaining sites eligible for reimbursements. Various technical, financial, and regulatory issues have affected the timing of the transfer of Title II sites to long-term federal management. NRC's statutory responsibility is to regulate uranium mills and tailings for Title II sites in a manner that allows a licensee to complete site decommissioning in manner so stringent that little long-term maintenance and monitoring would be required. Congress intended NRC to mitigate financial burdens to the licensees while requiring that all decommissioning requirements be fully met. The transfer of the remaining Title II sites to DOE-LM for long-term federal management would remain pending until NRC determines that the licensee has completed all decommissioning requirements. NRC estimates specific dates for some Title II sites, while others are listed as \"to be determined.\" Table A-1 identifies Title I and Title II sites that have transferred to long-term federal management, and Table A-2 identifies Title I and Title II sites that have not yet transferred to long-term federal management. DOE-LM would become responsible for long-term federal management of Title II sites currently licensed by NRC or an NRC agreement state upon the completion of decommissioning and site transfer. For some Title II sites, DOE-LM and NRC have reached differing conclusions regarding the adequacy of decommissioning, the degree and type of long-term monitoring requirements, and the funds needed to pay for long-term monitoring and maintenance costs. Section 203 of UMTRCA authorized NRC to collect a bond or other financial arrangement to pay for the costs in the event that a licensee was unable to fulfill all of their decommissioning requirements. UMTRCA does not authorize the use of federal funding to pay for the decommissioning of Title II sites. In the event that the bond were insufficient to pay for the full decommissioning costs, UMTRCA provides no additional mechanism for funding to complete decommissioning. In some instances, Title II licensees have lacked adequate financial resources to complete NRC's decommissioning requirements. If left unreclaimed, exposure risks from releases of radiological and non-radiological contaminants may present issues to affected communities. The magnitude of public health and environmental risks posed by unreclaimed tailings may vary among individual sites. For sites that have transferred to long-term federal management, DOE-LM administers Title I and Title II sites under an NRC general license. UMTRCA authorized long-term monitoring and maintenance costs at Title I sites to be paid by the federal government. For Title II sites, Congress intended that the licensee would pay for any necessary long-term monitoring and maintenance costs using a one-time long-time surveillance charge (LTSC). Annual costs are largely dependent on the extent of site-specific groundwater monitoring and intermittent maintenance activities on the repository. Under current federal law there are different statutory authorities for DOE-LM to perform remediation at Title I sites and Title II sites under long-term federal management. For Title I sites, Congress authorized DOE-LM to implement groundwater remediation indefinitely, recognizing the ongoing remediation challenges at some Title I sites after decommissioning. UMTRCA does not provide DOE-LM remedial authority for Title II sites under long-term federal management. At Title II sites under long-term federal management, DOE-LM is authorized to perform monitoring, maintenance, and emergency measures. Emergency measures is not explicitly defined by statute, potentially raising issues of interpretation in the event of future remedial action needs. Selected issues with Title I and Title II long-term financial assurance are discussed in the following sections. Congress provides funding for the long-term federal management of Title I sites through DOE annual appropriations. For Title I sites under long-term federal management, program funding for DOE-LM is funded under Environmental and Other Defense Activities account in the Energy and Water Development and Related Agencies appropriations bill. DOE-EM continues to administer remediation at the Moab site in Utah. Funding for the Moab site is appropriated annually in the Energy and Water Development and Related Agencies appropriations bill under the Non-Defense Environmental Cleanup account. DOE annual expenditures can vary from site to site depending on costs related to many factors, including the degree of groundwater remediation or monitoring and disposal site maintenance. For example, from 2008 and 2012, an interagency report from January 2013 noted that total DOE expenditures at the Tuba City disposal site were $13.96 million (approximately $2.8 million per year), while total expenditures at the Mexican Hat disposal site were $110,000 (approximately $22,000 per year). Neither DOE-LM annual budget justifications nor annual appropriations bills specify funding for annual long-term federal management costs by site or for the site inventory as a whole. Annual funding for DOE-LM is presented in annual budget requests and appropriations as a single line-item. In all, DOE-LM oversees over 100 sites contaminated by radiological, chemical, and hazardous wastes associated with the legacy of nuclear weapons production during World War II and the Cold War. UMTRCA processing and disposal sites constitute 37 of those sites. Congress appropriated $159 million to DOE-LM in the Energy and Water Development and Related Agencies Appropriations Act, 2019 ( P.L. 115-244 ), the same amount as requested. For Title II sites, Congress intended that commercial uranium mill operators will pay for site decommissioning and the costs for a federal agency to perform long-term federal management. To cover these long-term federal management costs, NRC requires licensees to pay an LTSC upon the transfer of the site to DOE. Section 203 of UMTRCA provides NRC authority to collect this LTSC from the licensee to pay for DOE's costs to perform long-term maintenance, monitoring, and emergency measures. This one-time LTSC fee is deposited as a miscellaneous receipt into the General Fund of the U.S. Treasury when each site license is transferred to DOE. In the 1980 Final Generic Environmental Impact Statement for uranium milling, NRC described the justification for the minimum LTSC fee based on the assumption that average long-term monitoring at UMTRCA Title II sites would cost $2,500 per year. NRC assumed an average annual real rate of return, and each licensee is required to pay the minimum one-time L TSC of $ 250,000 (in 1978 dollars, adjusted for inflation). NRC has not revised the minimum LTSC since regulations were promulgated in 1985. NRC allows for the minimum LTSC fee to be increased based on expected site-specific surveillance or controls requirements if needed. UMTRCA does not authorize a mechanism to recover additional fees from licensees once the license has been transferred to DOE-LM. The adequacy of the LTSC to cover DOE's costs to perform long-term maintenance and monitoring has been an issue. In 1995, the GAO recommended that NRC improve \"the accuracy of the one-time charge made to owner/operators to ensure that this charge fully covers future costs at their sites.\" In 2014, the DOE Office of Inspector General (IG) found that DOE-LM had spent $4.25 million at six Title II sites under long-term management. During the same three-year period, the IG report found that the available funds from the LTSC fees were $0.148 million. To the extent that the LTSC fees are insufficient to cover annual monitoring and maintenance costs, DOE-LM would be responsible to carry out long-term management responsibilities, subject to availability of annual appropriations. DOE-LM has discretion to allocate appropriated funding among eligible sites under long-term federal management. If the current minimum LTSC do not fully cover annual long-term federal management costs for the remaining Title II sites when they transfer to DOE-LM, the IG report states \"the total cost to the American taxpayers could be significant.\" Yet, there is a limited availability of information by site and by year for DOE-LM's monitoring and maintenance costs at UMTRCA sites under long-term management. DOE-EM has provided life-cycle cost ranges and completion date estimates for Environmental Management sites, including the Moab site, in annual budget justifications. CRS was unable to identify DOE cost estimates for any other UMTRCA site. The federal government will be responsible for the long-term management costs for all UMTRCA sites once transferred to DOE-LM. Potential issues for Congress may include the decommissioning and transfer status of the remaining Title II sites, the adequacy of funding to complete decommissioning at certain sites if the licensee is unable to fulfill its obligations, and the adequacy of the long-term surveillance charges to meet future long-term management needs. ", "summary": "In the wake of increasing concerns in the 1970s about human health and environmental risks posed by inactive uranium mill tailings, Congress enacted the Uranium Mill Tailings Radiation Control Act of 1978 (UMTRCA). Uranium milling operations generate uranium concentrate, also known as \"yellowcake\" uranium, and waste material, called tailings , which can harbor and liberate radioactive and non-radioactive constituents. Title I of UMTRCA authorized a remedial action program for uranium mill tailings sites that were inactive prior to 1978, which produced uranium concentrate under federal procurement contracts primarily for nuclear weapons and other defense purposes. Title II of UMTRCA authorized the regulation of uranium mills and tailings sites that were operating on or after the law's enactment, which largely produced uranium concentrate for civilian nuclear power plants. UMTRCA does not provide regulatory authority over uranium mining (the physical removal of uranium ore from the earth), waste material produced from uranium mining, or remediation of inactive uranium mine sites. The Department of Energy (DOE) is the federal agency responsible for implementing the remedial action program and administering long-term federal management of the tailings. The site remediation costs have exceeded costs originally envisioned by Congress, the agencies, and the licensees due to an evolving understanding of the complexities and risks posed by unintended releases of contaminants from uranium mill tailings. As part of the remediation action, the uranium mill tailings are enclosed in engineered repositories, located at disposal sites, which are designed to prevent unintended release of potentially hazardous constituents for hundreds of years. DOE's authority to perform surface remediation at Title I sites expired on September 30, 1998. Groundwater contamination has compounded the technical complexity and timeline of remedial actions at certain sites. Congress amended UMTRCA in 1988 to authorize DOE to perform groundwater remediation without expiration under the Uranium Mill Tailings Remedial Action Amendments Act (UMTRA). UMTRCA requires the transfer of both Title I and Title II disposal sites to long-term federal management. As of FY2019, the Department of Energy, Office of Legacy Management (DOE-LM) administers long-term federal management at 31 Title I sites, excluding the site at Moab, UT. Title II sites are regulated by the U.S. Nuclear Regulatory Commission (NRC) or an NRC agreement state and transferred to DOE-LM for long-term federal management when NRC, or the state, determines that applicable standards have been met. As of FY2019, six of 29 Title II sites have transferred to DOE-LM, and 23 Title II sites remain privately owned under an NRC or an agreement state license. DOE-LM expects to take long-term management responsibilities of the 23 remaining Title II sites by 2048. Under UMTRCA, Congress established that the federal government pay for long-term monitoring and maintenance costs at Title I sites, subject to annual appropriations to DOE-LM. For Title II sites, Congress intended that the licensee would pay for any long-term management costs with a one-time long-term surveillance charge (LTSC). In the event that the LTSCs are not sufficient to cover annual monitoring and maintenance costs, DOE-LM would be responsible to carry out long-term management responsibilities, subject to availability of annual appropriations. The long-term management efforts to stabilize tailings and monitor groundwater have proven more challenging, and expensive, than originally expected. The federal government will be responsible for long-term management of all UMTRCA sites once transferred to DOE-LM. Potential oversight issues for Congress may include understanding the decommissioning and transfer status of the remaining Title II sites, the adequacy of funding to complete decommissioning at certain sites if the licensee is unable to fulfill its obligations, and the adequacy of LTSCs to meet future management needs.", "document_type": "crs"}
{"report": "Since early 2018, certain foreign nations have targeted U.S. food and agricultural products with retaliatory tariffs (for more on tariffs, see Box 1 ) in response to U.S. Section 232 tariffs on steel and aluminum imports and U.S. Section 301 tariffs levied on imports from China. The first U.S. trade action occurred on March 8, 2018, when President Trump imposed tariffs of 25% on steel and 10% on aluminum imports (with some flexibility on the application of tariffs by country) using presidential powers granted under Section 232 of the Trade Expansion Act of 1962. Section 232 authorizes the President to impose restrictions on certain imports based on an affirmative determination by the Department of Commerce that the targeted import products threaten national security. The targeted exporters, China, Canada, Mexico, the European Union (EU), and Turkey, responded by levying retaliatory tariffs on U.S. food and agricultural products, and other goods. India proposed retaliatory tariffs but did not implement them until June 2019. A second action occurred in July 2018 when the Trump Administration used a Section 301 investigation to impose tariffs of 25% on $34 billion of selected imports from China, citing concerns over China's policies on intellectual property, technology, and innovation. In August 2018, the Administration levied a second round of Section 301 tariffs, also of 25%, on an additional $16 billion of imports from China. In September 2018, additional tariffs of 10% were applied to $200 billion of imports from China and, in May 2019, these were raised to 25%. On August 13, 2019, the Office of U.S. Trade Representative (USTR) published two lists of additional Chinese imports that would face 10% tariffs, effective September 1, 2019, and December 15, 2019. The imposition of the Section 301 tariffs on Chinese goods resulted in retaliatory tariffs by China. Additionally, in August 2019, China asked its state-owned enterprises to halt purchases of U.S. agricultural goods. On August 23, 2019, China further retaliated by levying two additional sets of tariffs: 5% or 10% tariffs on U.S. imports, including 695 different U.S. agricultural tariff lines effective September 1, 2019; and another 5% or 10% tariffs on U.S. imports including 184 different U.S. agricultural tariff lines effective December 15, 2019. During 2018, China, Canada, Mexico, the EU, and Turkey jointly levied retaliatory tariffs on more than 1,000 U.S. food and agricultural tariff lines. India prepared a list of U.S. products targeted for retaliatory tariffs in 2018 but refrained from implementing them. Then in 2019, India implemented retaliatory tariffs on certain U.S. lentils, apples, and tree nuts after the United States removed India from the U.S. Generalized System of Preferences (GSP) program on May 31, 2019. GSP provides duty-free tariff treatment for certain products from designated developing countries. India's removal from GSP is expected to raise duties valued at about $5 billion to $6 billion on goods the United States imports from Indiaâor slightly more than 10% of India's total 2018 exports of $54 billion to the United States. In response to U.S. action, India implemented the retaliatory tariffs identified in 2018, with some changes, effective June 16, 2019. On May 17, 2019, the Trump Administration reached an agreement with Canada and Mexico to remove the Section 232 tariffs on steel and aluminum imports from those countries and to remove all retaliatory tariffs imposed on U.S. goods. The Administration reduced tariffs on Turkish steel imports, and Turkey responded on May 21, 2019, by halving its retaliatory tariffs on U.S. imports. This report recaps the chronology and the effect of U.S. Section 232 and Section 301 actions on U.S. food and agricultural imports and the retaliatory tariffs imposed on U.S. agricultural exports by its trading partners during 2018 and the spring of 2019. As China is subjected to the largest set of U.S. tariff increases and has levied the most expansive set of retaliatory tariffs on U.S. agricultural products, this report largely focuses on the effects of Chinese retaliatory tariffs on U.S. agricultural trade. Because almost all U.S. food and agricultural tariff lines are affected by Chinese retaliatory tariffs, the report provides illustrative examples using selected agricultural products. Thus, the report is not a comprehensive review of the effect of Chinese retaliatory tariffs on every U.S. agricultural product exported to China. Retaliatory tariffs have made U.S. products relatively more expensive in China, with the result that Chinese imports from other countries have increased in lieu of U.S. products. This report discusses the short- and long-run economic effects of the changes in trade flows, locally, nationally, and globally. The long-run effects may potentially be more problematic, as China and Russia have increased their agricultural productivity over the past two to three decades, and China has increased investments in other countries to develop potential future sources of imports. Additionally, China has improved market access for imports from other countries while it has increased tariffs on U.S. imports. Finally, the report presents the views of selected U.S. agricultural stakeholders on retaliatory tariffs, and it identifies issues that may be of interest for Congress. Except for China, which faces both Section 232 and Section 301 tariffs, other countries' retaliatory tariffs respond only to U.S. Section 232 tariffs on U.S. imports of certain steel and aluminum products. Higher retaliatory tariffs represent increases above the World Trade Organization (WTO) Most Favored Nation (MFN) tariff rates or beyond any existing preferential tariff rates. Retaliatory tariffs for Canada and Mexico are increases from the existing North American Free Trade Agreement (NAFTA) rates, most of which, at zero percent, are below the MFN rates. Table 1 summarizes the retaliatory tariff increases on U.S. agricultural products by comparing tariff increases of September 2018 with the retaliatory tariffs in effect in June 2019. A potential reason for observed changes in applied tariffs rates is that some tariffs are levied based on quantity (such as per ton or per kilograms) and, for purposes of analyses, tariffs are converted to percentage of total import value, ad valorem rates (see Box 2 ). When the price of a traded product changes, the ad valorem tariff rate imposed on a product can change. Additionally, it is not always possible to match the U.S. Harmonized Tariff Schedule (HTS) with the retaliatory country's 8- or 10-digit tariff code (see Box 1 ) . Thus, it may be difficult to link the U.S. Census Bureau trade data with the tariff codes of products affected by retaliatory tariffs. Therefore, this report makes use of both U.S. export data and partner country import data as appropriate to provide the most accurate measure of the magnitude of the affected U.S. trade. For U.S. retaliating trade partners, Table 1 provides the minimum, maximum, and simple (not trade-weighted) average retaliatory tariff hike rates. China is subject to the largest set of U.S. tariff increasesâboth the U.S. Section 232 steel and aluminum tariffs and the Section U.S. 301 tariffs in response to unfair trade practices. As a result, China has countered with an expansive list of retaliatory tariffs. In particular, all U.S. products affected by Chinese retaliatory tariffs in response to the U.S. Section 232 action also faced additional retaliatory tariffs in response to U.S. Section 301 trade action. China first retaliated against U.S. Section 232 action in April 2018, by raising tariffs on certain U.S. imports including agricultural products. During the first round of Chinese retaliatory tariffs, these products included pork, fruit, and tree nuts. In July 2018, China retaliated against U.S. Section 301 tariffs by raising tariffs on an expanded number of products, including most U.S. agricultural products exported to China. Tariffs were also raised on products affected by the earlier April 2018 retaliatory tariffs in response to U.S. Section 301 action, with most subject to an additional tariff of 25%. China levied two more rounds of retaliatory tariff increases (against U.S. Section 301 action) in 2018âin August and Septemberâexpanding the coverage of the affected products. In September 2018, China imposed 5% and 10% tariff increases on certain products (including agricultural products) which had not been subject to any retaliatory tariffs in response to U.S. Section 301 action. In June 2019, China increased tariffs on some additional products that had not been previously targeted with retaliatory tariffs, as well as some products that had been hit with the 5% or 10% retaliatory tariff in September 2018. As a result, almost all U.S. agricultural products shipped to China face retaliatory tariffs, ranging from 5% to 50% above their MFN tariff rates through August 31, 2019, with a simple average tariff rate increase of 24% across all products as of July 2019. See Table A-1 for information on average Chinese retaliatory tariffs across different food and agricultural product categories. In June 2018, Mexico levied a 15% tariff on U.S. sausage imports; a 20% tariff on other pork products, certain cheeses, apples, potatoes, and cranberries; and a 25% tariff increase on whey, blue-veined cheese, and whiskies. Starting in July 2018, Canada imposed a retaliatory tariff of 10% on certain U.S. products including dairy, poultry, and beef products; coffee, chocolate, sugar, and confectionery; prepared food products; condiments; bottled water; and whiskies. To facilitate the ratification of the proposed U.S.-Mexico-Canada Agreement (USMCA) that the leaders of the three countries agreed to on September 30, 2018, the United States removed the Section 232 tariffs on steel and aluminum imports from Canada and Mexico on May 17, 2019, and, in turn, these countries removed their retaliatory tariffs on U.S. imports. In June 2018, in response to U.S. Section 232 tariffs, the EU imposed a 25% tariff on imports of U.S. corn, rice, sweetcorn, kidney beans, certain breakfast cereals, peanut butter, orange juice, cranberry juice, whiskies, cigars, and other tobacco products, and a 10% tariff on certain essential oils. In June 2018, Turkey also responded to U.S. Section 232 tariffs on Turkish steel imports by levying retaliatory tariffs on selected U.S. imports. On August 10, 2018, the United States doubled its tariffs on steel imports from Turkey to 50%, stating that the 25% tariffs did not reduce Turkish steel imports as much as anticipated. Turkey responded by doubling tariffs on certain U.S. imports including a 20% retaliatory tariff on U.S. tree nuts and certain prepared food, 25% and 50% tariffs on U.S. rice (depending on whether milled or unmilled), 60% tariff on U.S. tobacco, and 140% tariff on U.S. alcoholic beverages including whiskies. When the United States reduced its tariffs on Turkish steel imports on May 21, 2019, Turkey halved its retaliatory tariffs on U.S. imports. India identified certain U.S. food products for retaliatory tariffs in 2018 but did not levy them until June 16, 2019. Indian tariff hikes above the MFN rate are 10% for imports of U.S. chickpeas, 29% for over-quota shelled almonds (ad valorem rate), and 20% for U.S. walnuts, apples, and lentils. Foreign nations may target U.S. food and agricultural products with retaliatory tariffs for several reasons. First, the United States is the largest exporter of food and agricultural products, so many countries are able to retaliate against those goods. Second, agricultural commodities are often more easily substituted from among potential suppliers, so curbing imports from one country would not necessarily limit an importing country's access to the commodity. Third, several food and agricultural products are produced primarily in certain regions of the United States, and thus may be targeted with a view to negatively and disproportionately affecting the constituents of specific U.S. lawmakers. The retaliatory tariffs imposed by U.S. trading partners affected many products exported by the United States, including meats, grains, dairy products, specialty and horticultural crops, and alcoholic beverages. As discussed in Box 3 , \"Tariffs Increase Import Prices,\" a number of factors affect trade, including tariffs that tend to increase the price of imported goods. In 2018, total imports of affected U.S. food and agricultural products by all retaliating countries amounted to almost $22 billion, based on customs data from these countries. This represents a 27% decline from the $29.7 billion in 2017 ( Figure 1 ). Based on Chinese customs data, the total value of Chinese agricultural imports from the United States affected by retaliatory tariffs declined from $22.5 billion in 2017 to $14.7 billion in 2018. Canadian customs data show that imports of U.S. agricultural products declined to $2.3 billion in 2018 from $2.4 billion in 2017. Canadian retaliatory tariffs include certain tariff lines covering prepared product categories under beef, poultry, dairy, fruit, vegetables, drinks, coffee and spices, chocolate and confectionary, and whiskey. As noted earlier, Canada removed its retaliatory tariffs on U.S. imports in May 2019, in response to the U.S. removal of Section 232 tariffs on steel and aluminum imports from Canada. A review of Mexican customs data finds that imports of U.S. agricultural products by Mexico also declined from $2.6 billion in 2017 to $2.5 billion in 2018, largely accounted for by sausage and pork products. Mexico's imports of these products declined from $2.3 billion in 2017 to $1.6 billion in 2018. In addition to pork products, Mexico had imposed retaliatory tariffs on cheeses, apples, prepared fruit, vegetables and other food, and whiskey. Mexico also removed its retaliatory tariffs on U.S. imports in May 2019, in response to U.S. removal of Section 232 tariffs on steel and aluminum imports from Mexico. EU customs data show the import value of U.S. food and agricultural products affected by the EU retaliatory tariffs increased to $1.3 billion in 2018 from $1.1 billion in 2017. The EU imposed tariff hikes on certain prepared vegetables, pulses, breakfast cereals, fruit juices, peanut butter, tobacco products, whiskey, and essential oils. A temporary surge in sales in the months prior to the imposition of duties appears to have offset a slump in sales that coincided with the onset of retaliatory duties later in the year ( Figure 2 ). Based on the quarterly import data, by the first quarter of 2019, the total value of EU imports of U.S. products affected by retaliatory tariffs was lower than during the last quarter of 2017 or the first quarter of 2018. Since the second quarter of 2018, EU imports of affected food and agricultural products from the United States declined. As discussed above, beyond the tariff increases, a number of factors may have contributed to this reduction in imports. For instance, when countries first released their proposed lists of products that they targeted for retaliation, some EU importers may have imported larger quantities of the affected products prior to the imposition of the duties, thus boosting EU imports of U.S. agricultural goods in 2018. Similar to the EU, the total value of Turkish imports of U.S. food and agricultural products affected by retaliatory tariffs increased between 2017 ($299 million) and 2018 ($316 million), based on Turkish customs data. Turkey had imposed tariff hikes on certain tree nuts, prepared food, rice, tobacco, whiskey, and other alcoholic beverages. Imports in the months prior to the imposition of duties had increased ( Figure 2 ), which may have offset the decline in imports during the second half of 2018. In the third and fourth quarter of 2018, Turkish imports of affected U.S. food and agricultural products declined. Since May 2019, Turkey halved its retaliatory tariffs on imports from the United States. During 2018, India did not levy any retaliatory tariffs on imports of U.S. food and agricultural products. Starting in June 16, 2019, India implemented retaliatory tariffs on imports of U.S. almonds, walnuts, chickpeas, lentils, and apples. Based on the Indian customs data, the total value of Indian imports of these products was $824 million in 2017 and $859 million in 2018. Table 2 presents U.S. agricultural exports to retaliating and nonretaliating countries, in nominal values, from 2014 to 2018. As discussed in Box 1 , U.S. exports to trading partners and the reported import values in destination countries can differ due to differences in HS classification of goods in different countries. Canada, the EU, Mexico, and Turkey levied retaliatory tariffs in 2018 on selected U.S. agricultural products, while China imposed retaliatory tariffs on almost all U.S. food and agricultural products. During 2018, India did not levy any retaliatory tariffs. Thus, the changes in 2018 U.S. food and agricultural exports, compared to prior years, varied across these countries ( Table 2 ). Despite the retaliatory tariffs, U.S. agricultural exports grew from $138 billion in 2017 to $140 billion in 2018. Greater U.S. exports of products to nonretaliating countries ($76 billion in 2018, up from $66 billion in 2017) offset the value of trade lost to China and Turkey. In addition, increased U.S. exports of products without retaliatory tariffs and products targeted for retaliatory tariffs during the months prior to their implementation (to Canada, Mexico, and the EU) also helped to offset the decline in exports of products with retaliatory tariffs to these countries. The Chinese market is important for several U.S. agricultural products. For example, in 2016 and 2017, the United States supplied over a third of China's total soybean imports, almost all of China's distillers' grain imports (primarily used as animal feed), and most of China's sorghum imports. In 2017, the Chinese market accounted for about 57% of global U.S. soybean exports, 17% of global U.S. cotton exports, 80% of global U.S. sorghum exports, 11% of global U.S. dairy product exports, 10% of global U.S. pork exports, 6% of global U.S. wheat exports, and 5% of global U.S. fruit exports. In response to U.S. Section 232 and Section 301 tariffs on U.S. imports of Chinese goods imposed in 2018, China levied retaliatory tariffs on imports of almost all U.S. agricultural products. In 2017, China was the second-leading export market by value for U.S. agricultural products. However, after the imposition of retaliatory tariffs on U.S. imports beginning in April 2018, U.S. agricultural exports to China experienced a 53% decline from $19.5 billion in 2017 to $9.2 billion in 2018 ( Figure 3 ). China thus moved down in rank to become the fourth-largest U.S. agricultural market, after Canada, Mexico, and Japan. Among other goods, China imposed a 25% retaliatory tariff on U.S. soybeans in July 2018. Since 2000, China had been the top export market for U.S. soybeans. In 2017, China imported about $12 billion worth of U.S. soybeans, accounting for 57% of the total value of all U.S. soybean exports that year. With higher tariffs in place, China has been purchasing more soybeans from Brazil and other countries to meet its demand. Consequently, U.S. soybean exports to China in 2018 declined to $3 billion ( Figure 3 ). U.S. Census Bureau trade data indicate China was still the top foreign destination for U.S. soybeans in 2018, followed by Mexico, which imported $1.8 billion of U.S. soybeans. Reduced Chinese import demand in 2018 contributed to declining farm prices for affected commodities and lower U.S. agricultural exports to China for several commodities, including sorghum, soybeans, cotton, and pork. Consequently, U.S. soybean prices reached 10-year lows during July-October 2018 ( Figure 4 ), weighing on prices of other agricultural commodities, such as corn, that compete with soybeans for acreage. Prices recovered some during the last quarter of 2018, coincident with reported commitments by China to purchase a \"very substantial amount of U.S. agricultural\" goods. However, Chinese purchases failed to materialize and U.S. commodity prices resumed their downward trend through the first quarter of 2019 before stabilizing. As U.S. soybean prices declined in 2018, Brazilian soybean prices started to rise, indicative of a greater demand for Brazilian soybeans from China ( Figure 4 ). Since 2007, Brazilian and U.S. soybean prices had tended to move together. Starting in April 2018, U.S. soybean prices started to fall and Brazilian soybean prices started to rise. China's imposition of a 25% tariff on U.S. soybeans in July 2018 initially precipitated a widening of the gap between the two prices. On October 23, 2018, U.S. soybean Free on Board (FOB) prices were $86 per metric ton lower than Brazilian (ParanaguÃ¡) FOB prices. The Brazilian soybean price started to fall in late October in anticipation of a record-high South American soybean harvest. U.S. soybean prices started to climb at the same time, partly due to farmers' willingness to hold stocks and in response to larger exports to non-Chinese destinations. Anticipation of Chinese purchases also contributed to rebounding of U.S. prices. As Chinese purchases did not materialize, Brazilian and U.S. soybean prices started to diverge again in May 2019. Although soybeans have been the agricultural commodity most affected by retaliatory tariffs (largely due to China's dominant role in the global soybean market), nearly all U.S. agricultural exports to China declined in 2018 relative to 2017 (see Table 3 ). With retaliatory tariffs making U.S. agricultural products more expensive for Chinese buyers, exports from other countries to China increased during 2018. Some studies suggest that Brazil could become China's primary soybean supplier. Another study concludes that U.S.-China tariff escalation would make suppliers in the rest of the world more competitive relative to U.S. and Chinese suppliers. Russia also contends that it may become a major U.S. competitor for China's agricultural import market, although market watchers expect Russia will need years to become a major agricultural supplier to China. To explore these assertions, CRS examined Chinese import data to identify foreign sources that may have partially replaced some of the 2018 U.S. agricultural exports to China. Note that various factors can result in data differences between U.S. exports from the U.S. Census Bureau and imports from Chinese customs data ( Box 4 ). According to Chinese customs data, China's imports of agricultural products were $117 billion in 2014 as compared to $127 billion in 2018, in nominal terms ( Figure 5 ). In 2014, the United States was the largest source of Chinese agricultural imports, accounting for nearly a quarter, or $28 billion, of China's total imports. Since 2017, Brazil and several other countries increased their shares of China's total imports, with Brazil overtaking the United States as China's largest agricultural supplier in 2017. Since the imposition of the retaliatory tariffs on U.S. imports in 2018, U.S. agricultural shipments to China declined to $15 billion, compared to $23 billion in 2017, even as overall Chinese imports increased to $127 billion. It is noteworthy that in 2016, when China's total agricultural imports were at the lowest point between 2014 and 2018, at $105 billion, U.S. market share was 21%, compared with 2018, when China's total agricultural imports were at $127 billion but U.S. market share was 12%. During the same period, Brazil's market share grew from 18% in 2016 to 26% in 2018. Additionally, China's imports from other countries increased, as indicated in Figure 5 . Brazil appears to be the primary beneficiary of Chinese retaliatory tariffs on U.S. imports, with increased exports to China in 2018 of soybeans, cotton, tobacco, pork, and oilseeds. Australia also registered growth in import market shares for cotton, sorghum, pulses, fruit and nuts, dairy, and hides and skins. Canada increased its exports to China of feed and fodder products, hides and skins, and wheat. New Zealand's share of China's import market saw gains in dairy, and hides and skins. Thailand increased its export shipments of fruit, nuts and starches, and malt to China, while increased shipments from Indonesia were largely fats and oils. Additionally, Russia has stated that it is ready to step in to fill in the gaps created by reductions in U.S. food and agricultural exports to China, according to various news media reports, although market watchers expect Russia will need years to become a major agricultural supplier to China. In July 2018, Chinese Commerce Minister Zhong Shan agreed with his Russian counterparts to \"deepen trade in soybeans and other agricultural products.\" China's imports of food and agricultural products from Russia increased 61%, from $679 million to nearly $1.1 billion, between 2017 and 2018, with strong import growth in oilseeds, wheat, fats and oils, cocoa and related products, beer, and animal products. Various other countries from Central Asia, South and Southeast Asia, and Africa increased their exports of food and agricultural products to China during 2018 compared with 2017. Notably, China's wheat imports from Kazakhstan grew 34% and corn imports from Ukraine rose 20%. U.S. agricultural interests have reported concerns that the U.S.-China trade war in the form of tariffs and tariff retaliation could escalate further, potentially resulting in widespread, long-term damage, particularly for firms with complex international supply chains. For American farmers, the escalating conflict with China has contributed to declining soybean and related agricultural commodity prices in the short run, but studies indicate that the long-term consequences could be complex and have long-lasting impacts. The following section examines how major U.S. agricultural product market shares fared in the Chinese import market during 2018. It also presents China's imports of selected agricultural commodities on a monthly basis starting in January 2018, through the first trimester of 2019 when the different retaliatory tariffs became effective. According to Census data, China has been the top export market for U.S. soybeans since 2000. China imported $12 billion worth (32 million metric tons) of U.S. soybeans in 2017, accounting for 57% of the total value and volume of all U.S. soybean exports that year. With higher tariffs on U.S. soybeans, China has been purchasing more soybeans from Brazil and other countries to meet its demand. Consequently, U.S. soybean exports to China declined to $3 billion (8 million metric tons) in 2018. Based on Census trade data, China was still the top destination for U.S. soybeans in 2018, followed by Mexicoâwhich imported $1.8 billion worth of U.S. soybeans. According to China's monthly customs data, China's import of U.S. soybeans in January 2018 was $2.5 billion ( Figure 6 ). China's monthly imports of U.S. soybeans started to decline after China announced retaliatory tariffs in response to U.S. Section 232 tariffs in April 2018, which did not include U.S. soybeans. By the time China imposed retaliatory tariffs in response to U.S. Section 301 tariffs (which included U.S. soybeans) in July 2018, China's import of U.S. soybeans had decreased to about $140 million for that month (from $2.5 billion in January 2018). U.S. soybean shipments to China continued to decline until November 2018, when China did not import any U.S. soybeans. In December 2018, the White House announced that China had committed to purchase a \"very substantial amount of agricultural\" goods. Following this and other announcements, China purchased U.S. soybeans during the first trimester of 2019. The largest of these purchases, worth $700 million, occurred in April 2019. However, China's imports of U.S. soybeans declined in May 2019, coincident with the continued escalation of the U.S.-China trade dispute and the imposition of an increase in the third round of U.S. Section 301 tariffs on Chinese imports in May 2019. During this tariff dispute, China has turned increasingly to Brazil to meet its demand for soybeans. In January 2018âprior to the tariff disputeâChinese imports of Brazilian soybeans totaled less than $900 million, before increasing in May and June of 2018, when shipments of newly harvested soybeans from the Southern Hemisphere to China increased. By July 2018, Brazilian shipments were on the decline when China imposed 25% retaliatory tariffs on U.S. soybeans. Normally, newly harvested U.S. soybean shipments to China would have increased in the fall of 2018, whereas Chinese purchases of U.S. soybeans slowed to almost nil and were outpaced by Brazilian shipments to China. From February to May 2019, China expanded its purchases of U.S. soybeans, while also buying soybeans from Brazil, and increasing its soybean imports from Argentina, Russia, and Central Asian countries. According to Census trade data, U.S. cotton exports to China totaled over $1 billion in 2014. From 2017 to 2018, U.S. cotton exports to China declined 6%, from $978 million to $924 million. Monthly Chinese customs data indicate that China's imports of U.S. cotton have decreased since the imposition of retaliatory tariffs in July 2018 ( Figure 7 ). During January 2018, China's cotton imports from the United States totaled $140 million. Following the announcement of retaliatory tariffs on some U.S. imports (in response to U.S. Section 232 action) in April 2018, China's imports of U.S. cotton shrank to $27 million in October 2018. While Chinese imports from the United States declined, China's imports from other countries have increased. Cotton shipments from Brazil and Australia posted the largest increases, followed by imports from India and Uzbekistan. Additionally China's imports of cotton from other Central Asian and West African countries have risen since June 2018 ( Figure 7 ). On July 26, 2019, China reportedly approved some domestic textile mills to buy 50,000 metric tons of U.S. cotton without being subject to retaliatory tariffs. However, since President Trump's announcement to levy 10% Section 301 tariffs on the remaining Chinese imports that were not subject to Section 301 tariffs, China responded in August 2019 by asking its state-owned enterprises to halt purchases of U.S. agricultural goods. In 2016, the United States supplied 26% of China's wheat imports. This share increased to 40% in 2017, but declined to 14% in 2018. Canadian wheat exports have largely replaced U.S. wheat shipments to the Chinese market, with Canada's share of China's wheat imports rising from 27% in 2016 to 54% in 2018. Kazakhstan and Russia also have increased their wheat exports to China in the wake of 25% Chinese retaliatory tariffs on U.S. wheat imports, which have been in effect since July 2018. From January to June 2018, the United States shipped a total of $113 million of wheat to China ( Figure 8 ), compared with $256 million of U.S. wheat shipped during the same period in 2017. After China levied retaliatory tariffs on U.S. wheat in July 2018, U.S. wheat shipments to China were nil for the rest of the year. China imported $208 million of U.S. wheat in 2016 and $390 million of U.S. wheat in 2017. In March 2019, China imported $12 million of U.S. wheat. According to Chinese customs data, there have been no additional U.S. wheat shipments to China as of May 2019. The United States accounted for nearly 90% of China's total sorghum imports in 2016 and 2017. The value of U.S. shipments of sorghum declined 24%, from close to $1 billion in 2017 to $726 million in 2018. China's monthly imports of U.S. sorghum have been negligible since China implemented retaliatory tariffs on them in July 2018 ( Figure 9 ). U.S. imports started to decline after May 2018, following China's imposition of retaliatory tariffs on some agricultural products in response to U.S. Section 232 tariffs in April 2018. Later, China imposed a 25% retaliatory tariff on U.S. sorghum in July 2018, leading to declines in U.S. sorghum shipments to China. China's imports of U.S. sorghum declined after retaliatory tariffs were imposed, but China continued to import limited quantities from Australia, Myanmar, and Argentina. However, in the absence of Chinese purchases of U.S. sorghum, China's total sorghum imports since October 2018 have been negligible ( Figure 9 ). Therefore, despite the retaliatory tariffs, U.S. market share in 2018 was about 85% of China's total sorghum imports for the year. On July 26, 2019, China reportedly allowed several domestic companies to buy U.S. sorghum without being subject to retaliatory tariffs. However, since President Trump's announcement to levy 10% Section 301 tariffs on remaining Chinese imports that do not yet have any Section 301 tariffs imposed on them, China responded in August 2019 by asking its state-owned enterprises to halt purchases of U.S. agricultural goods. The United States supplied 13% of China's total pork imports in 2016 ($400 million) and 2017 ($286 million). In 2018, U.S. pork shipments to China declined to $130 million and accounted for 6% of China's total pork imports. U.S. pork shipments to China began to decline in April 2018 following China's imposition of 25% retaliatory tariffs on U.S. pork (HS 0203 lines) in response to U.S. Section 232 tariffs on U.S. imports of Chinese steel and aluminum products ( Figure 10 ). In July 2018, these HS lines were subject to an additional 25% retaliatory tariff. This coincided with a further decline in Chinese imports of U.S. pork products from July through December 2018. Unlike the case of sorghum, China has continued to import some U.S. pork products, and import volumes generally increased from January through May 2019. Since the summer of 2018, China has suffered from a serious outbreak of African Swine Fever (ASF). Between September 2018 and May 2019, China reported over 2 million culled hogs. In March 2019, USDA reported that despite the retaliatory tariffs, because of ASF, U.S. pork products are entering China and USDA expects China's imports of U.S. pork to climb in 2019 due to the liquidation of some of China's hogs in an effort to control ASF. However, USDA reported that U.S. pork products still face Chinese retaliatory tariffs, which makes U.S. products relatively more expensive compared with pork from other countries. On July 26, 2019, China reportedly approved requests from several domestic companies to buy U.S. pork products without being subject to retaliatory tariffs. However, since President Trump's August 2019 announcement to levy 10% Section 301 tariffs on remaining Chinese imports that do not yet have any Section 301 tariffs levied on them, China responded by asking its state-owned enterprises to halt purchases of U.S. agricultural goods. On August 23, 2019, China imposed additional 10% tariffs on certain U.S. pork products, effective September 1, 2019, in response to new U.S. Section 301 tariffs on U.S. imports from China. Since 2016, the United States has been the third-largest supplier of dairy products to China ($1.3 billion in 2018), among over 140 suppliers, behind New Zealand ($4.2 billion) and the Netherlands ($2 billion). China is a growing market for dairy products. Chinese imports of dairy products increased over 50% from $10 billion in 2016 to $15 billion in 2018. Given the diversity of dairy product tariff lines and the varying rates of Chinese retaliatory tariffs levied on them, the trade effects on the aggregate group are not as clear as they are for other individual commodities. Figure 11 presents China's monthly imports of U.S. dairy products, since the large number of suppliers and differences in market shares across the suppliers are difficult to present in a single chart. China imposed retaliatory tariffs on U.S. dairy products in July 2018. Given the diversity of dairy tariff lines, there is no clear trend in China's monthly imports of U.S. dairy products during the second half of 2018 and early 2019 ( Figure 11 ). Instead, annual U.S. dairy shipments to China increased 15% from $1.2 billion in 2017 to $1.3 billion in 2018. However, in China's growing market, imports from competitor countries grew faster from 2017 to 2018, with New Zealand's shipments increasing 15% from $3.7 billion to $4.2 billion; the Netherlands' shipments increasing 35% from $1.5 billion to $2 billion; and Australia's shipments increasing 32% from $1 billion to $1.3 billion. Although U.S. dairy shipments to China do not show any clear trend since January 2018, the retaliatory tariffs are likely contributing to faster market share growths for U.S. competitors in China than for the U.S. dairy sector, particularly since some dairy products are levied additional 5% retaliatory tariffs effective September 1, 2019. The United States is the largest supplier of hides and skins to China, accounting for about 41% of China's total imports from 2016 to 2018. In 2017, shipments of U.S. hides and skins to China amounted to $918 million. After the imposition of retaliatory tariffs in July 2018, Chinese imports of U.S. hides and skins declined, with China's 2018 U.S. hides and skins imports totaling $664Â million. Major U.S. competitors in China's hides and skins import market are Australia, Canada and New Zealand ( Figure 12 ). These countries have not been able to fill the gap created by the decline in U.S. shipments of hides and skins to China. Consequently, China's total hides and skins imports fell 25% in 2018, to $1.6 billion from $2.2 billion in 2017. U.S. shipments of hides and skins to China declined 28% during the same period. Notwithstanding the tariffs on U.S.-origin hides and skins, the decline in U.S. shipments largely mirrored the overall decline in China's imports, with the result that the United States continued to supply about 41% of China's total hides and skins imports in 2018, the same share as in the previous two years. U.S. shipments of hides and skins to China may further drop with the additional 10% retaliatory tariff on U.S. imports that became effective September 1, 2019. Analysis conducted by economists from University of California, Davis (UC Davis) found that Chinese retaliatory tariffs decreased U.S. alfalfa exports to China in 2018 compared to the previous two years. From 2016 to 2018, the United States supplied the largest share of China's alfalfa imports, accounting for about 79% of China's total alfalfa import market share in 2016 ($417 million) and 72% ($534 million) in 2018. In January 2018, China purchased U.S. alfalfa valued at $40 million. Following the imposition of retaliatory tariffs, U.S. monthly shipments of alfalfa to China started to decline in the summer of 2018. In November 2018, China's monthly imports of U.S. alfalfa amounted to $16 million and totaled $17 million in December 2018. Another study from UC Davis indicates that U.S. pistachio exports also declined due to retaliatory tariffs from China and Turkey. A third study from UC Davis estimated a combined short-run export loss for 2018 of $2.64 billion for almonds, apples, pistachios, walnuts, pecans, sweet cherries, oranges, table grapes, raisins, and sour cherries in four major import markets (China including Hong Kong, India, Mexico, and Turkey). It stands to reason that Chinese retaliatory tariffs may have also affected U.S. exports of certain other field crops, livestock and animal products, other specialty crops, and processed food products that are not covered in this report. U.S. agriculture, as a whole, is subject to intense competition, in both domestic and international markets. As a result, most commodity sectors operate with thin profit margins, making international sales an important component of revenue. Tariffs, by design, raise the cost of imported products (see Box 3 ). In general, an increase in import prices due to higher tariffs leads to a decrease in quantities purchased of the affected products as importers switch to other foreign suppliers or to alternate products within the domestic market. Thus, the trade impact of such a price increase will depend in large part on the number of available alternate foreign suppliers and the availability of substitutes within the domestic market. Furthermore, a decrease in exports will have an economy-wide effect as the supporting infrastructureâincluding farms, marketing cooperatives, warehousing and processing facilities, and transportation networks, for exampleâall lose business and revenues. This loss ripples further through the general economy and can cause decreases in employment and local, state, and federal tax revenues. This section of the report examines the short-term market impacts and selected economic analyses of longer-term impacts of the retaliatory tariffs. In the short run (see Box 5 ), retaliatory tariffs resulted in lower 2018 purchases of U.S. agricultural products by countries implementing these tariffs. The prospects for U.S. agricultural exports to China in 2019 appear to be along the same trajectory. As discussed earlier ( Figure 2 ), U.S. food and agricultural imports by the EU and Turkey during the first quarter of 2019 were below the level of imports during the same period in 2017 and 2018. Similarly, an examination of U.S. monthly exports to China from January to April 2019 demonstrates that the first quarter 2019 agricultural export levels have been below the export levels during the same period in 2017 and 2018 ( Figure 13 ). Generally, fall harvested crops are exported during late fall and early winter months, and export levels decline during the spring. Note that no retaliatory tariffs were in effect during 2017 or the first quarter of 2018. China levied the first round of retaliatory tariffs on U.S. imports in April 2018, in response to U.S. Section 232 tariffs. Other retaliating countries followed China's action with retaliatory tariffs in June 2018. Additionally, China expanded the range of affected U.S. imports and increased tariffs in additional rounds of retaliatory actions during the summer and fall of 2018, in response to U.S. Section 301 tariffs. With the continuation of existing retaliatory tariffs on almost all U.S. agricultural HS lines, China's proclamation that its state-owned enterprises will halt purchases of U.S. agricultural goods, and the 5% or 10% additional increase in retaliatory tariffs effective September and December 2019, U.S. exports of agricultural products affected by retaliatory tariffs could potentially continue to lose some market share in China. In addition to export losses, U.S. agriculture is facing other challenges in 2019. Abundant domestic and international supplies of grains and oilseeds in 2018 contributed to a fourth straight year of relatively weak agricultural commodity prices compared to previous years. U.S. soybean output and stocks were at record highs during 2018, putting downward pressure on soybean prices. Lower soybean prices contributed to lower corn prices during fall of 2018, as markets speculated that farmers would switch soybean acres to corn in 2019 ( Figure 14 ). On December 1, 2018, the White House released a statement saying that China had agreed to purchase \"substantial amount of agricultural\" goods, among other goods. This statement was followed by press reports at different times stating that China had announced it would buy additional U.S. soybeans. The reported Chinese commitments to purchase U.S. soybeans did not materialize, and soybean prices, which had been on a downward trajectory since early 2018, declined further in early 2019. Soybean farm prices reached a 12-year low point in May 2019 at $8.02 per bushel. This coincided with President Trump's threat to raise Section 301 tariffs, on U.S. imports from China, from 10% to 25% and to impose additional tariffs on all remaining imports from China not currently covered by Sections 301 measures. The tariff increases from 10% to 25% were effective May 10, 2019. The Trump Administration announced its intent to impose additional tariff increases of 10% on all other products currently not covered by Section 301 tariffs. China responded by asking its state-owned enterprises to halt purchases of U.S. agricultural goods, and by levying two additional sets of tariffs: 5% or 10% tariffs on U.S. imports, including 695 different U.S. agricultural tariff lines effective September 1, 2019; and another 5% or 10% tariffs on U.S. imports including 184 different U.S. agricultural tariff lines effective December 15, 2019. In 2018, the U.S. farm sector faced the challenge of declining exports and commodity prices for certain major field crops, in addition to rising operational costs. Various studies predicted that the imposition of U.S. Sector 232 tariffs on steel and aluminum, in tandem with the domestic content provisions of the USMCA, could increase the cost of production for U.S. farmers. A report released by the Association of Equipment Manufacturers states that the Trump Administration's Section 232 and Section 301 tariffs could hurt the U.S. economy by increasing consumer prices, including a 6% increase in the cost of manufacturing agricultural and construction equipment. U.S. agro-chemical manufacturers have also stated that cost increases, resulting from escalating tariffs, \"of pesticide products for crop and turf protection products ultimately will be passed on to American growers and businesses.\" In a sector with relatively thin profit margins, small increases in costs associated with tariffs can sometimes lead to postponed equipment purchases, causing a ripple effect through the farm input sector. In 2019, several agricultural commodity prices remain under pressure from a record soybean and near-record corn harvest in 2018, diminished export prospects due to the ongoing trade dispute with China, and high levels of carryover stocks from the previous year. A shift in trade patterns can become permanent if trade disruptions lead to new trade alliances or stimulate production in retaliating domestic markets or other competing foreign regions, thus increasing supplies from new sources. An example of such long-term impact of a disruption in trade on U.S. farm exports is the 1980 U.S. embargo on grain exports to the Soviet Union, which resulted in declines in U.S. commodity prices and export sales. A significant effect of the embargo was that the United States lost market share in sales to the Soviet Union. Additionally, during the early 1970s, the United States imposed a partial embargo on the exports of soybeans, cottonseed, and certain other products as an inflation fighting measure. The U.S. soybean export embargo and high prices during this period reportedly prompted greater Japanese investments in Brazil's soybean industry, which has since become the U.S. soybean industry's major export competitor. As discussed in the section \" Key Competitors for China's Agricultural Market ,\" major agricultural exporters such as Brazil, Canada, Australia, and the EU have recently increased their farm exports to China. Additionally, countries such as Russia, Ukraine, some Central Asian countries, some Southeast Asian countries, and some African countries are seeking to establish and expand footholds in the Chinese market. For the latter group of countries, a prolonged U.S.-China trade war could facilitate their agricultural development and their share of global exports. Assuming the continuation of retaliatory tariffs on U.S. soybeans, a USDA 10-year projection predicts that China's soybean imports would resume growing, but the volume of future soybean trade would be less than previously projectedâ122.8 million metric tons of Chinese imports from all origins with retaliatory tariffs in 2027 compared with 143 million metric tons of imports without retaliatory tariffs. With U.S. soybeans taxed by retaliatory tariffs, USDA projects that Brazil would likely account for two-thirds of the growth in global soybean exports to China. In comparison, the United States accounted for 35% of China's total soybean imports in 2017 and 18.5% in 2018, while Brazil accounted for 53% of China's total soybean imports in 2017 and 76% in 2018. For U.S. exporters, lower U.S. prices may stimulate additional demand by a number of countries, but these markets are not likely to absorb the entire volume displaced from China. The USDA report concludes that alternative export markets for U.S. soybeans can only absorb a fraction of the soybeans exported to China before trade tensions began, with imports in these countries growing by less than half of the reduction projected for Chinese soybean imports in 2027. China is also investing in agricultural production in U.S. competitor markets and is improving access for products from these countries. Russia has pledged land to Chinese farmers and has made a commitment to increase its exports of agricultural products to China. While these commitments are still speculative, during the last two decades, Russian agriculture has moved toward greater product specialization and strategic investments have been made based on agro-ecological characteristics. As a result, Russian regional agricultural productivity growth has increased between 25% and 75%, with higher productivity growths in parts of southern Russia. According to Chinese import data, Russia made inroads into China's food and agricultural market in 2018, with market share increases compared to 2017 of 14% for soybean oil; 4% for wheat; 1% for corn; 0.3% for soybeans; 2% for oilseeds; and some increases in hay market shares, among others. China's imports of food and agricultural products from Russia increased 61% between 2017 and 2018 ( Figure 15 ). China's imports of Russian cereals increased almost 400% during the same period, while oilseed imports grew 78%, fats and oils 72%, cocoa and related products 181%, beer 109%, and animal products 48%. While Russia's agricultural exports to China increased in 2018, the value of its shipments represented less than 1% of China's total agricultural product imports of $127 billion that year. Market watchers expect Russia will need years to become a major agricultural supplier to China. Globally, a USDA study reports that over 1,300 Chinese enterprises had overseas investments in agriculture, forestry, and fisheries valued at $26 billion in 2016. The investments include crop and livestock farming, fishing, processing, farm machinery, inputs, seeds, and logistics in over 100 countries. Most of China's foreign agricultural projects involve relatively small companies investing in neighboring countries in Southeast Asia, Russia's Far East, and Africa that have unexploited land and are often receptive to Chinese investment. China's agricultural investment decisions are linked to its \"One Belt, One Road\" initiative. Additionally, Chinese companies seeking sources of dairy, beef, and lamb imports have focused their investments and partnerships with New Zealand and Australia. Since 2018, China has taken additional actions to reduce import-export taxes and duties to facilitate agricultural imports from non-U.S. sources, particularly for non-U.S. oilseeds and products ( Box 6 ). Effective April 2019, value added taxes (VAT) on agricultural products were reduced to 9% from the original 11% or 17%. Starting January 1, 2019, reductions in customs duties, including MFN tariffs and temporary duty rates, were implemented for certain imported goods in order to boost imports and meet domestic demand. The temporary duty rates, which are even lower than the MFN tariffs, are in effect on 706 imported commodities, including some agricultural products. With retaliatory tariffs in place, U.S. agricultural exporters are unable to take full advantage of these improved terms of market access. The following section provides examples of estimated economic impacts associated with retaliatory tariffs imposed on U.S. agricultural products by U.S. trading partners. These impacts are estimated at different scales by different studies, or are derived from market data. The examples are illustrative; they are not meant to be comprehensive. Various studies have estimated potential economic impacts arising from retaliatory tariffs on specific U.S. commodities (see Box 5 for general assumptions regarding these studies). For example, one study of short-term effects predicted U.S. farm prices would decrease in response to China's retaliatory tariffs, the value of U.S. exports to China would decline and U.S. farmers would reduce acreage planted the following year to soybeans, cotton, sorghum, and would reduce pork production, ultimately resulting in revenue declines for U.S. producers. A similar short-term impact analysis conducted by the Center for North American studies at Texas A&M University examined the impact on U.S. dairy of a 25% retaliatory tariff levied by Mexico on U.S. cheese imports and a 25% retaliatory tariff imposed by China on imports of U.S. dairy products. The study estimated export losses and pointed out that U.S. dairy exports are supported by a large infrastructure, including dairy farms, marketing cooperatives, and warehousing and processing facilities. Thus, the study concluded that any significant change in exports is likely to ripple through the supporting infrastructure and affect the general economy. In the case of Mexican tariffs on U.S. cheese, which Mexico removed in May 2019, the study estimated that U.S. economy-wide economic losses would be $991 million per year with nearly 5,000 lost jobs. In the case of Chinese tariffs on U.S. dairy imports, the study suggested that the economy-wide losses could total $2.8 billion per year and lead to over 13,000 jobs lost. In September 2018, the Center for Agricultural and Rural Development (CARD) at Iowa State University estimated the short-run effects of the 2018 trade disruptions on the Iowa economy. This study incorporated the potential offsetting effects from USDA's trade-aid package. The study focused on the impact of foreign retaliatory tariffs on U.S. corn, soybean, hog, and ethanol markets along with labor and government revenue impacts from changes in these markets. It used a number of different modeling approaches that resulted in the following estimates of annual impact. The study estimated that Iowa's soybean industry would lose $159 million to $891 million, with an average revenue loss across all models of $545 million (Iowa soybeans are a $5.2 billion industry). The study estimated that Iowa's corn industry would lose $90 million to $579 million, with an average revenue loss across all models of $333 million (Iowa corn is an $8.5 billion industry). The study estimated that Iowa's pork/hog industry would lose $558 million to $955 million, with an average revenue loss across all models of $776 million (the Iowa pork/hog industry is a $7.1 billion industry). The study estimated that ethanol prices would drop 2%, resulting in approximately $105 million in lost revenues to Iowa ethanol producers (investors in the ethanol industry). The study points out that by mid-August 2018, corn prices retreated nearly 9% and ethanol prices receded by roughly 4%. Over the same period, corn futures for the 2018 crop declined 9% and ethanol futures declined 8%. In the longer term (see Box 5 for definition), according to the Iowa State University study, revenue losses in these industries would translate into additional lost labor income across the state. The study estimates that labor income declines from the impacts to the corn, soybean, and hog industries would range from $366 million to $484 million without federal offsets from the trade-aid package, and $245 million to $364 million with federal offsets. Iowa tax revenue losses (personal income and sales taxes) would range from $111 million to $146 million annually. Federal offsets would reduce tax losses to $75 million to $110 million. The study estimates overall losses in Iowa's gross state product of $1 billion to $2 billion annually (out of a total of $190 billion). Similarly, a study commissioned by the Nebraska Farm Bureau on the short-run economic costs in 2018 for the state from the retaliatory tariffs concluded that Nebraska's general economy would incur costs between $164 million and $242 million in lost labor income, along with the loss of 4,100 to 6,000 jobs. In total, together with the direct agriculture-related costs, Nebraska's overall economic loss in 2018 was estimated at $859 million to $1.2 billion. Retaliatory tariffs in 2018 (on corn, soybeans, and hogs from all retaliating countries) were expected to reduce corn prices by $0.14 to $0.21 per bushel, soybean prices by $0.95 to $1.54 per bushel, and hog prices by $17.81 to $18.80 per head. These estimated price declines would translate into farm revenue losses for each commodity of corn ($257 million to $327 million); soybeans ($384 million to $531 million); and pork ($111 million). The Nebraska Farm Bureau updated its analysis in 2019 and concluded that the ongoing retaliatory tariffs imposed by countries on U.S. agricultural exports would cost Nebraska producers $943 million in lost revenues in 2019. The methodology used for the analysis borrowed USDA's estimates of gross damages that were used in calculating USDA's trade-aid payments. The estimated loss calculation did not take into consideration trade-aid payments that Nebraska farmers may receive in 2019. Economists from University of California, Davis, found the short-run effects of the retaliatory tariffs on the 2018 crop for 10 selected specialty crops in four export marketsâChina, Mexico, Turkey, and Indiaâto be $2.64 billion of lost export value and $3.34 billion of combined U.S. revenue losses. The crops considered are almonds, pecans, pistachios, walnuts, apples, oranges, raisins, sour cherries, sweet cherries, and table grapes. Mexico had retaliatory tariffs on apples and prepared fruit in 2018, but removed them in May 2019. India had identified apples, almonds, and walnuts for retaliatory tariffs in 2018 but did not implement these until June 2019. Two studies conducted by researchers at Purdue University, using the Global Trade Analysis Project (GTAP) model (see Box 7 ), examined the potential long-run impacts of retaliatory tariffs on U.S. agriculture and the U.S. economy at the national level. As discussed in the box \"Key Economic Terms,\" the long-run effects are estimated assuming that the shock to the market, such as tariff increases, remains in place for a few years and sufficient time has passed to provide producers the opportunity to make changes in response to this shock. The studies discussed below assume that the retaliatory tariffs remain in place for three to five years. The first study estimated the long-run effects (defined in Box 7 as 3-5 years) of a 25% tariff imposed by China on soybeans and other selected U.S. agricultural productsâwheat, corn, sorghum, rice, rapeseed, and beef. This study concluded that U.S. soybean market losses in China would, over the years, benefit Brazil. Given the U.S. soybean industry's large share of China's import market prior to the retaliatory tariffs, the study estimated large price declines and export losses for U.S. soybeans. Other commodities in the study appeared less dependent on the Chinese market, and the estimated losses are relatively smaller. The study predicted that overall economic welfare (see Box 8 ) for both the United States and China would decline, while economic welfare for Brazil would increase. The second study examined a scenario in which the USMCA would be implemented but the retaliatory tariffs related to Section 232 steel and aluminum tariffs would also exist. The study looked at two separate cases for retaliatory tariffs: (1) retaliatory tariffs were considered only for Mexico and Canada; and (2) retaliatory tariffs from all countries were considered. This study estimated, in 2014 dollars, a net increase in annual U.S. agricultural exports of $450 million under USMCA, which is equal to about 1% of U.S. agricultural exports under NAFTAâ$41 billion in 2014. It projected the export losses from the retaliatory tariffs imposed by Canada and Mexico to be $1.8 billion per year (in 2014 dollars), which would more than offset the projected export gain of $450 million from USMCA. When retaliatory tariffs from all countries were considered, export losses were estimated at around $8 billion. Note that both Canada and Mexico have removed their retaliatory tariffs since May 2019. A study conducted by economists at Iowa State University examines the national-level effects of retaliatory tariffs imposed on U.S. pork, soybeans, corn, and wheat by China and Mexico during 2018. Note that Mexico removed the retaliatory tariffs in May 2019. The study simulates multiyear projections over a period of nine years. The study indicates that if the retaliatory tariffs were to continue, U.S. annual exports would decline by 30% for pork and corn, 15% for soybeans, and 1.5% for wheat compared with a baseline scenario that considers the average of the past three-year period. The study estimated that in the short run (which the paper defines as first three years with retaliatory tariffs), trade losses would translate to 26,000 job reductions on average annually in the United States and a decline in labor income of $1.5 billion due to a $5.3 billion reduction in national annual output. In the long run (defined by the paper as year seven through year nine with retaliatory tariffs), the annual impacts were estimated to grow to nearly 60,000 fewer jobs, $3.1 billion less labor income, and a loss of almost $12 billion in national output. The United Nations Conference on Trade and Development (UNCTAD) performed a global analysis of the U.S. Section 232 and Section 301 tariffs and the resulting retaliatory tariffs, including retaliatory tariffs on U.S. agricultural products. The analysis mainly focused on U.S.-China tariff escalation. Regarding agriculture, the study points out that China accounts for more than half of the global imports of soybeans and that the United States is the world's largest soybean producer. The study states that the Chinese tariffs on U.S. soybeans have substantially disrupted world trade of this commodity and observes that increased Chinese demand has resulted in higher prices for Brazilian soybeans. It cautions that while higher price premiums could be beneficial in the short run to Brazilian producers, they may hamper Brazilian procurers' long-run competitiveness. In a situation where the size and amount of the tariffs and their duration are unclear, Brazilian producers may be reluctant to make investment decisions that may turn unprofitable if tariffs are removed. Moreover, Brazilian firms using soybeans as inputs (e.g., feed for livestock) may lose competitiveness because of higher input prices. A USDA study released in 2019 found that the United States and Brazil are among the lowest-cost producers of soybeans. While land rental costs and labor costs are higher in the United States, poor soils and tropical ecology require Brazil to use higher levels of agrochemicals. Moreover, the United States has a transportation advantage over Brazil in exporting agricultural products to China. Specifically, the study concluded that transporting soybeans by truck from northern Mato Grosso to Brazil's primary soybean export port of ParanaguÃ¡ cost $93 per metric ton (MT) in 2017. During the same period, transporting soybeans from Davenport, Iowa, to the Gulf of Mexico by truck, rail, and barge cost $65 per MT. Shipping soybeans by truck and rail from Sioux Falls, South Dakota, to the U.S. Pacific Northwest cost $68 per MT. The United States, therefore, has lower transportation costs and greater production efficiency (requiring less agrochemicals) compared with Brazil in producing and shipping agricultural products to Asian markets. According to the study, the current trade dispute and retaliatory tariffs may, in the long run, lead to inefficient allocation of resources and exploitation of less-productive lands than those in the United States. Based on economic principles, if the price of an input such as soybeans or feed corn declines, the livestock sector would be expected to benefit. USDA's Economic Research Service's production expenses report states that the cost of livestock feed declined 1% between 2017 and 2018; however, it is expected to increase 4.5% in 2019. Additionally, the U.S. livestock sector is also facing retaliatory tariffs. Similarly, many processed food products that use raw agricultural products as inputs face Chinese retaliatory tariffs. Some sectors may nevertheless benefit from retaliatory tariffs. For example, the Coalition for a Prosperous America (CPA) released a study stating that a permanent across-the-board 25% tariff on all imports from China would stimulate GDP growth and jobs in the U.S. economy. The study uses data from Boston Consulting Group that are not publicly available, and the publicly available working paper does not describe the Regional Economic Models, Inc. (REMI model) or the assumptions underlying the model. Regarding agriculture, the study states that when the USDA trade-aid programs are incorporated \"into the model, the additional government spending fully offsets the negative impact of the Chinese retaliation on US GDP.\" In addition to the CPA study, there have been anecdotal reports in the media that organic and small-holder farmers are benefiting from China's retaliatory tariffs. In May 2019, American Farm Bureau Federation President Zippy Duvall stated that, \"Retaliatory tariffs are a drag on American farmers and ranchers at a time when they are suffering more economic difficulty than many can remember,\" and urged negotiators to continue their work toward reopening markets with the European Union, China, and Japan. The president of the National Farmers Union (NFU) echoed the same sentiment, stating that the retaliatory tariffs \"could not come at a worse time for family farmers and ranchers, who are already coping with depressed commodity prices, environmental disasters, and chronic oversupply.\" The NFU president further stated that although temporary relief is appreciated, \"temporary solutions are not sufficient to address the permanent damage the trade war has inflicted on agricultural export markets.\" Various U.S. agricultural commodity groups have voiced similar concerns. For example, the American Soybean Association expressed \"extreme disappointment\" over USTR's escalating tariffs on China that led to retaliatory tariffs on soybeans. The National Pork Producers Council (NPPC) stated that the retaliatory tariffs are \"threatening the livelihoods of thousands of U.S. pig farmers.\" Due to African Swine Fever (ASF), China normally would have turned to the United States to meet its pork demand. With retaliatory tariffs in place, U.S. pork is more expensive than products from other sources in the Chinese market. NPPC Vice President Nick Giordano stated that from a U.S. farmer's perspective, China's increased demand for imported pork resulting from ASF in Chinese hogs would have been \"the single greatest sales opportunity in our industry's history.\" According to a report in the South China Morning Post , Iowa State University economist Dermot Hayes estimates that the trade dispute with China has cost American pig farmers $8 per animal, or $1 billion in total losses. The U.S. Dairy Export Council, in turn, stated in 2018 that the retaliatory tariffs that China and Mexico imposed could result in billions of dollars of lost sales for U.S. dairy producers. A study released by the Association of Equipment Manufacturers states that tariffs on steel and aluminum have increased cost of agricultural production due to rising prices of farm equipment and their parts. In a comment filed with USTR, CropLife America and a specialty chemical trade group, Responsible Industry for a Sound Environment (RISE), state that cost increases, resulting from escalating tariffs, \"of pesticide products for crop and turf protection products ultimately will be passed on to American growers and businesses.\" Dozens of stakeholder panels provided testimony to the USTR during hearings in June 2019 regarding a proposed notice to begin imposing additional tariffs of 25% to virtually all remaining imports from China. Hundreds of U.S. companies and industry groups, including some of the largest companies argued that, \"both sides will lose\" in a protracted trade war. \"Tariffs are taxes paid directly by U.S. companies, including those listed belowânot China,\" stated a letter signed by more than 600 companies, including the Association of Equipment Manufacturers, American Bakers Association, Grocery Manufacturers Association, Juice Products Association, Distilled Spirits Council of the United States, and many other food retailers and associations related to the food industry. On June 21, 2019, hundreds of domestic producers and four manufacturing and labor groups sent a letter to President Trump urging him to maintain his hardline approach to China. The letter was signed by the Coalition for a Prosperous America, which includes mainly nonagricultural manufacturing companies and some food- and agriculture-related small companies like the Platt Cattle Company of Arizona and Johanna Foods of New Jersey. To help alleviate the losses from the retaliatory tariffs, USDA announced a second round of trade aid in 2019. Most industry groups welcomed this package but indicated their preference for trade rather than aid. American Farm Bureau Federation President Zippy Duvall stated, \"It is critically important to restore agricultural markets and mutually beneficial relationships with our trading partners around the world.\" Similar sentiments were expressed by a number of other major agricultural trade associations, such as the National Council of Farmer Cooperatives, the American Soybean Association, the National Cotton Council, the National Milk Producers Federation, and the National Pork Producers Council. For its part, the National Association of Wheat Growers stated that the trade-aid package \"is a Band-Aid when we really need a long-term fix.\" In May 2019, President Trump proposed levying additional tariff increases on imports from China, but they were held in abeyance following a meeting between President Trump and Chinese President Xi Jinping at the G-20 summit in June 2019. However, President Trump stated on August 2019 that he would impose a tariff hike increase on all other Chinese products currently not covered by Section 301 tariffs. China responded by asking its state-owned enterprises to halt purchases of U.S. agricultural goods. On August 13, 2019, USTR released the remaining list of Chinese products that would be levied a 10% Section 301 tariff effective September 1, 2019, and another list of products that would be levied 10% Section 301 tariffs effective December 15, 2019. China in turn has retaliated by levying additional two sets of tariffs: 5% or 10% tariffs on U.S. imports, including 695 different U.S. agricultural tariff lines effective September 1, 2019; and another 5% or 10% tariffs on U.S. imports including 184 different U.S. agricultural tariff lines effective December 15, 2019. Given the length of the trade dispute over Section 232 and Section 301 actions and the expanding list of U.S. exports affected by the retaliatory tariffs, the list of affected sectors is also expanding. A June 2019 USTR hearing for Section 301 tariffs included a diversity of witnesses across 55 panels over a seven-day period. As such, an issue for congressional consideration may be whether compensation for the losses arising from the various trade disputes should extend beyond those producers of agricultural commodities identified in the Administration's trade-aid initiative. USDA, using its authority under the CCC, is administering this assistance. Retaliatory tariffs have arguably affected businesses beyond the farm gate, including agricultural exporters, input suppliers, agricultural shippers, and others, potentially raising the question of whether these industries merit government compensation for tariff-related losses. Separately, some agricultural stakeholders have questioned the equity of the distribution of the 2018 trade aid payments. Once the formula became public, several commodity groups questioned the rationale for determining payments based on \"trade damage\" rather than the broader \"market loss\" measure. Similar questions have emerged about the 2019 trade-aid package. These questions concern the methodology used to calculate the payment rates, commodity coverage of the direct payments, and the equity of payments across regions and commodity sectors. The provision of trade aid has also raised questions regarding U.S. commitments under the WTO and other international agreements. Several WTO members, including the EU, Canada, Australia, New Zealand, India, and Ukraine, have asked for more details regarding USDA's trade-aid package to ascertain whether it could be considered market-distorting under U.S. WTO commitments. Given the growth of investments directed to increase agricultural productivity in many countries including Russia, and the recent gains that Russia, Brazil, and other countries have made in China's import market for agricultural products, it may be of interest to Congress to consider whether current policies are sufficient for U.S. agriculture to continue to expand its overseas markets. As other countries expand their agricultural production to meet China's import demand, studies by environmental groups caution that this agricultural expansion may occur at the expense of tropical forest and fragile habitats that are essential to maintain global biodiversity. The United States is one of the most efficient and lowest-cost producers of food and agricultural products. Congress may want to consider whether the current trade dispute could have long-term environmental costs as less productive or more environmentally vulnerable areas are cultivated for agricultural production in lieu of more efficient and less environmentally sensitive U.S. production.", "summary": "Certain foreign nations have targeted U.S. food and agricultural products with retaliatory tariffs since early 2018 in response to U.S. Section 232 tariffs on steel and aluminum imports and Section 301 tariffs levied on U.S. imports from China. Retaliatory tariffs have made imports of U.S. agricultural products relatively more expensive compared to similar products from competitor nations. In the short run, U.S. shipments of products to countries with retaliatory tariffs have declined, reducing overall global demand for affected U.S. agricultural products and driving down the prices of U.S. agricultural commodities. Depending on the length and depth of the tariffs and the range of products affected, some experts caution that the long-run trade impacts could inflict further harm as U.S. competitor countries have an incentive to expand their agricultural production. In response to U.S. Section 232 and Section 301 actions, China levied retaliatory tariffs on almost all U.S. agricultural products, ranging from 5% to 50%. In response to U.S. Section 232 tariffs, Canada, Mexico, the European Union (EU), and Turkey retaliated with tariffs during the summer of 2018 on U.S. fruit, nuts, prepared vegetables and meats, pork, cheese, breakfast cereal, fruit juices, and whiskey. India implemented retaliatory tariffs on certain U.S. products after a Presidential Proclamation removed India from the U.S. Generalized System of Preferences program in May 2019. Canada and Mexico levied retaliatory tariffs in mid-2018, but these tariffs were removed in May 2019 after the Trump Administration announced an agreement with Canada and Mexico to remove the Section 232 tariffs on imports from both countries to facilitate ratification of the U.S.-Mexico-Canada Agreementâa proposed regional free trade agreement that is meant to supersede the North American Free Trade Agreement (NAFTA). The total value of exports of U.S. food and agricultural products levied retaliatory tariffs in 2018 was $22 billion, down 27% from $30 billion in 2017. China accounted for about 80% of the total affected trade in both years. Despite the retaliatory tariffs, U.S. agricultural exports rose in 2018 to $140 billion from $138 billion in 2017, partly due to higher imports during the months leading up to the retaliatory tariffs and increased exports to other nonretaliating countries. With the continuation of retaliatory tariffs, U.S. Department of Agriculture (USDA) projects U.S. agricultural exports to decline about 4% in 2019. In the short run, retaliatory tariffs contributed to declining prices for certain U.S. agricultural commodities and reduced exports, particularly for soybeans. Declining prices and exports sales combined with rising input and farm machinery costs contributed to a 16% decrease in U.S. net farm income in 2018, compared with 2017. China's soybean imports are expected to resume growing over the next decade, but a USDA study expects the volume traded to be less than previously anticipated. Because of the retaliatory tariffs on U.S. soybeans, USDA projects that Brazil will account for two-thirds of the global growth in soybean exports to China. The United States accounted for 40% of China's total soybean imports in 2016 and 35% in 2017, compared with Brazil's 46% in 2016 and 53% in 2017. In 2018, the U.S. share of China's soybean import market dropped to 19% and Brazil's share was up at 76%. To help alleviate the financial loss incurred by U.S. farmers due to retaliatory tariffs, USDA announced $12 billion in financial assistance in 2018âreferred to as a trade aid packageâfor certain U.S. agricultural commodities using Section 5 of the Commodity Credit Corporation (CCC) Charter Act (15 U.S.C. 714c). In 2019, USDA announced a second trade-aid package of $16 billion. Increased trade aid to U.S. farmers has generated questions from some World Trade Organization (WTO) members about whether the trade-aid package may violate U.S. WTO commitments. While trade-aid packages may provide short-term financial assistance, some studies and critics of the President's actions caution that the long-term consequences of the retaliatory tariffs may present more challenges. Even as China has raised tariffs on U.S. imports, it has improved access to its markets for other exporting countries. Brazil, Russia, and other countries are expanding their agricultural production to meet China's import demand. For example, Russia's investments during the past two decades have resulted in agricultural productivity growth ranging from 25% to 75%, with higher productivity growth along its southern region. Although still at relatively modest levels, China's total food and agricultural imports from Russia increased 61% between 2017 and 2018. The continuation of trade disputes and retaliatory tariffs may be of interest to Congress for the following reasons. Trade disputes have disrupted global markets and increased uncertainty in the farm input and output sectors. They may add to production costs, and they have dampened exports, impacted farm income, and triggered additional federal assistance for the farm sector. In the short run, there could be some transient benefits associated with various aspects of the agricultural sector. In the long run, other countries may expand agricultural production, potentially displacing U.S. agricultural exports to become larger food and agricultural suppliers to China.", "document_type": "crs"}
{"report": "Household debt among older Americansâincluding mainly residential debt, auto loans, student loans, and credit cardsâhas grown substantially from 1989 to 2016. The proportion of households headed by individuals aged 65 and older (hereinafter referred to as elderly households ) who held any debt increased from 37.8% to 61.1%, and the real median household debt among elderly households with debt increased from $7,463 to $31,050 (in 2016 dollars). The increase in debt among older Americans has raised concerns about financial security for people near or during retirement for several reasons. First, Americans aged 65 and older represent a large and growing proportion of the U.S. population. Over the next 20 years, the share of the U.S. population aged 65 and older is expected to increase from about 17% to 22%. The increase in debt, together with the aging population, suggests that a large group of older Americans are not retiring debt free. Second, many older Americans, especially low-income people, rely on Social Security or other government-sponsored income transfers as their major sources of income. Increases in household debt might require retirees to devote a larger share of their fixed income and savings toward paying debt. Excessive debt payments may put more seniors, especially those living on limited incomes, at greater risk of financial insecurity. Third, researchers have shown that higher levels of debt may increase psychological stress and decrease physical health. These effects may be exacerbated for older people, as they usually have fixed income and limited ability to offset higher monthly debt obligations by working more. This report presents evidence of the increase in debt from 1989 to 2016 among households headed by those aged 65 and older, using Survey of Consumer Finances (SCF) data. The discussion focuses on changes in the percentage of households holding debt; in median and average household debts; in selected types of debt; and in relative measures, such as the debt payments-to-income ratio and the total debt-to-asset ratio. This report also analyzes how household debt among older Americans varies across different age groups and asset distributions, and it explores various groups of elderly households with the largest debt burdens. Major types of debt discussed in this report mainly include residential debt, auto loans, student loans, and credit card balances. Nonloan debtâsuch as medical debt, past-due utility and other bills, and government-assessed fines and feesâis not covered in this report, because the population with those debts tends to be underrepresented in the SCF. Traditional life-cycle theories predict that people tend to borrow in young adulthood when incomes are low but some costs such as education and housing are high, continue to borrow but at a slower pace during middle age as income and expenses converge, and then slowly deleverage through old age as they pay down debt. The SCF data show that Americans' debt experiences have generally conformed to life-cycle theories' predictions. During 1989 to 2016, the share of households who held any debt and the median and average level of household debts were highest among those headed by Americans aged 35 to 54 and lower among younger and older ages. In the past three decades, debt among households headed by individuals aged 65 and older grew faster than that among households headed by those aged 64 and younger. In 2016, average household debt increased from $59,134 in 1989 to $110,204 (in 2016 dollars) for households whose head was between the ages of 20 and 64, an increase of 86%, whereas the average household debt grew from $11,278 to $53,269 (in 2016 dollars) for households headed by those aged 65 and older, an increase of 3 72%. The average household debt nearly doubled for households in age groups younger than age 60, but it increased by about 4 times for the age groups 60-64, 65-69, and 70-74; by about 7 times for the age group 75-79; and by more than 10 times for the age group 80 and older (see Figure 1 ). From 1989 to 2016, debt increased among households whose head was aged 65 and older. Both the share of elderly households with any debt and the median and average levels of debt have increased. Household debt includes mortgages, auto loans, student loans, and credit cards, as well as other debt products. From 1989 to 2016, the share of households headed by individuals aged 65 and older who held debt increased, as did median and average household debt among elderly households with debt (see Figure 2 ). In 1989, about 37.8% of elderly households held debt, whereas in 2016 the share increased to 61.1%. The median debt of those elderly households with debt increased from $7,463 to $31,050 (in 2016 dollars) during the same time, and the real average debt increased from $29,918 to $86,797. The median debt lies at the middle of the debt distribution, and the average debt is generally higher than the median debt because a relatively small percentage of people have very high debt. The share of elderly households holding any debt has generally trended upward from 1989 to 2016. However, median and average debt peaked in 2010, the year after the 2007-2009 economic recession, and declined from 2010 to 2016. In 2016, the median amount of debt was about the same as in 2007, before the economic recession, and the average amount of debt was at about the midpoint of the averages in 2004 and 2007. The financial crisis might have had a profound effect on the older population for several reasons. First, older people are likely to have been affected by employment instability. Research suggests that when the elderly lose jobs, it takes them significantly longer to find new ones, and their new jobs, if any, typically pay less than their previous jobs. Second, defined contribution (DC) retirement plans have replaced defined benefit (DB) plans, and they have become an important source of income for older Americans. Unlike DB plans, which provide a steady stream of income during retirement, DC plans fluctuate in value with the financial market, and their value depends in part on employees' investment skills. Employees generally bear the risk in DC plans. A recent study indicates that individuals' retirement account mismanagement and the large drop in the stock market during the financial crisis reduced potential retirement income for many older Americans during the past decade. The growth in average household debt between 1989 and 2016 largely came from mortgages (see Figure 3 ), including both debt secured by a primary residence (from $12,970 to $57,943 in 2016 dollars) and debt for other residential properties (from $2,970 to $11,446 in 2016 dollars). In addition, the increase in auto loans (from $2,437 to $5,262) may explain part of the growth in household debt among elderly households. In 2016, primary residential mortgages accounted for 66.8% of overall elderly household debt on average, other residential debt for 13.2%, auto loans for 6.1%, student loans for 1.5%, credit card balances for 3.5%, and other debts for 8.9%. Residential loans are usually considered long-term wealth builders, as the residence's market value may increase over time, which is generally not true for auto loans or credit card debt. Researchers have found that both residential and nonresidential debt may contribute to debt-related stress for older households, but residential debt is much less stressful than other debt, such as credit card debt. The share of elderly households who held certain selected types of debt, such as debt on a primary and other residences, auto loans, student loans, and credit card balances, increased from 1989 to 2016. The median amounts of those types of debt have also increased among elderly households with those debts. The share of elderly households who held debt secured by a primary residence increased from 15.4% in 1989 to 33.4% in 2016 (see Table 1 ). During the same time, the median primary residential debt among those households with residential debt increased from $16,793 to $72,000 in real 2016 dollars (see Table 2 ). Studies suggest that much of the growth through 2007 might have resulted from the increased availability of mortgage credit during the build-up to the financial crisis. Some research indicates that millions of older Americans are carrying more mortgage debt than ever before, and recent cohorts have taken on more mortgage debt mostly because they purchased more expensive homes with smaller down payments. Since 2010, some scholars argue that tightening mortgage underwriting standards have made it more difficult for young borrowers to qualify for mortgages. Consequently, this trend has resulted in a shift of new mortgage originations toward older borrowers and an increase in the ages of borrowers with existing debt. A small proportion of elderly households held debt secured by other residential properties, such as a second house or a vacation property. The share of elderly households who held other residential debt slightly increased from 2.7% to 4.4% between 1989 and 2016, and the median debt on other residences increased from $23,323 to $98,000. Those types of debt were primarily concentrated among relatively higher-income elderly households. Auto loans also increased among households headed by individuals aged 65 and older from 1989 to 2016. The share of elderly households who held any auto loan increased from 10.3% to 21.2%, and the median auto loan grew from $7,463 to $11,000 (in 2016 dollars) for those households with auto debt. Rising auto loan debt among elderly households may have partly resulted from rising vehicle costs and longer auto loan maturities. A small share of elderly households held student loans, but the proportion increased over time. About 0.5% of elderly households held some student loans in 1989, and this share increased to 2.4% in 2016. Among those elderly households who held student loans, the median amount in 2016 dollars was $7,463 in 1989, which increased to $12,000 in 2016. Although the number of student loan borrowers aged 65 and older is much smaller than the younger population, elderly borrowers are more likely to default than their nonelderly counterparts. Student loan debt can be especially problematic for older Americans because, in the event of default on federal student loans, a portion of the borrower's Social Security benefits can be claimed to pay off the loans. The number of individuals aged 65 and older whose Social Security benefits were offset to pay student loans increased from about 6,000 in FY2002 to 38,000 in FY2015. Most of these federal student loans were incurred primarily for older Americans' own education rather than for their dependents' education. Credit card balances among elderly households increased from 1989 to 2016, and they were the most common type of debt for elderly households in 2016. From 1989 to 2016, the share of elderly households who held some credit card debt increased from 10.0% to 35.1%, and the median credit card balance increased from $952 to $2,400 (in 2016 dollars) among those with credit card debt. Studies suggest that credit card and other noncollateralized debt tends to carry higher interest rates than other types of credit, so with rising credit card debt, older Americans may need to dedicate more of their income to servicing their debt. Credit card debt is a leading reason for bankruptcy filings among older consumers. One study shows that elderly debtors in bankruptcy carried 50% more credit card debt than younger debtors, and the elderly cited credit card interest and fees as the main reason for filing bankruptcy. Measures of outstanding household debt say little about how much of a burden the debt is or how much risk it poses to the population's financial health. The debt payment-to-income ratio and the debt-to-asset ratio are relative measures commonly used to address the degree of debt burden on households. One measure of debt burden is calculated by comparing required debt payments to the income available to make those paymentsâthe debt payment-to-income ratio. The ratio can measure the effects of interest rate changes and loan sizes on a household's liquidity. The debt payment-to-income ratio among elderly households who had some debt increased from 8.7% in 1989 to 16.7% in 2010, and then it declined to 12.4% in 2016 (see Figure 4 ). This ratio among elderly households was much lower than that for nonelderly households in 1989 (8.7% for elderly households compared with 16.1% for nonelderly households), but the difference in the ratio between elderly households and nonelderly households decreased over time. In 2016, the debt payment-to-income ratio for nonelderly households was 13.8%, compared with 12.4% for elderly households. Delinquency on loan payments (e.g., the percentage of debtors with debt payment past due 60 days or more) can also suggest trouble meeting debt obligations. About 3.9% of households headed by individuals aged 65 and older with any debt had some payments past due 60 days or more in 2016 (see Figure 4 ). The share fluctuated between 1% and 5% from 1989 to 2016, and it did not show an increasing trend over time for older Americans. The share is generally higher for young households (around 10% for households headed by those aged between 18 and 34) and decreases as the head of household ages. These data suggest that although the debt payment-to-income ratio for elderly households is rising, this pattern might not indicate trouble meeting debt obligations. Another measure of debt burden is the debt-to-asset ratio. In addition to income, households can use assets to guard against financial risks. In general, the more assets a household has, the less likely it is to default on its debt. As predicted by the life-cycle model, the debt-to-asset ratio is generally lower for elderly households than for nonelderly households, but from 1989 to 2016, the ratio grew more quickly for elderly households than for nonelderly households. According to the SCF, the debt-to-asset ratio increased from 5.1% in 1989 to 9.0% in 2016 for elderly households with debt (see Figure 5 ), whereas the ratio remained relatively stable for nonelderly households, at around 20%, during the same time. Among all debt types, the residential debt-to-asset ratio, which increased from 2.7% in 1989 to 7.4% in 2016, contributed to a large proportion of the growth in the debt-to-asset ratio for elderly households. The debt-to-asset ratio reached 11.7% in 2010, including a residential debt-to-asset ratio of 10.0%, which might have resulted from the increased availability of mortgage credit through 2007. In addition to the rise in the debt-to-asset ratio, the proportion of elderly households whose debt-to-asset ratio was greater than 50% increased from 7.4% in 1989 to 11.2% in 2016. In addition to the increase in the debt-to-asset ratio, researchers have found a rise in the percentage of older Americans filing for relief under the bankruptcy code. Individuals may file for bankruptcy when they cannot meet their debt obligations. Scholars find that the proportion of bankruptcy filers aged 65 and older increased from 2.1% in 1991 to 12.2% in 2013-2016 (approximately 97,600 households), and the elderly cohort is the fastest-growing age demographic even after adjusting for the aging of the population. Those studies also suggest that although both younger (under age 65) and older (age 65 and older) bankruptcy debtors are financially struggling, older filers overall are in worse financial shape than younger filers in terms of secured and unsecured debt, income, assets, and the debt-to-income ratio. Bankruptcy can be even more problematic for older debtors than younger debtors because it is generally harder for them to accumulate assets postbankruptcy. For example, compared with younger debtors, elderly debtors are less likely to find well-paying jobs because of perceptions of decreasing productivity and are less likely to build retirement savings because they have less time to accumulate wealth. Scholars argue that if the debtors filed bankruptcy as a result of chronic illness, bankruptcy does not improve their health or access to affordable healthcare or prescriptions. For this and other reasons, research suggests that older bankruptcy filers are significantly more likely to continue to struggle financially than younger filers. Although household debt rose over the past three decades for elderly households overall and on average, the oldest Americans experienced the largest increase in debt. Among all elderly households, those headed by people aged 80 and older saw the fastest growth in the share of households with any debt, the median household debt, and the debt-to-asset ratio. Figure 6 displays the share of elderly households who held any debt among four age groups from 1989 to 2016. In general, the proportion of elderly households with any debt declined with age for most survey years. For example, in 2016, about 70% of households headed by individuals aged 65-74 held debt, but the proportion was 61% for households in the 75-79 age group and 42% for those in the age group 80 and older. Over time, the proportion of elderly households with any debt increased for all age groups. In 2016, the share of households headed by those aged 65-69 with debt increased from 54.0% in 1989 to 69.8%, from 44.6% to 70.7% for the age group 70-74, from 27.6% to 60.7% for the age group 75-79, and from 12.5% to 41.5% for the age group 80 and older. Among all age groups, the largest growth was for the oldest age groups, aged 75-79 and aged 80 and older. Figure 7 shows median household debt among elderly households who had some debt by age groups from 1989 to 2016. Median household debt generally increased over time for each age group and peaked around the financial crisis. For households headed by those aged 80 and older, real median debt (in 2016 dollars) was $933 in 1989 and increased to $20,000 in 2016, almost 20 times greater. On average, elderly households in all age groups hold more debt today than did similar households three decades ago in real dollars (see Table 3 ). Among all types of debt, primary residential debt experienced the largest growth, increasing by between 315% and 536% within the four elderly age groups. Following primary residential debt, elderly households experienced growth in other residential debt, auto loans, credit card balances, and student loans. Elderly households held almost no student loans in 1989, but the average amount in 2016 increased to more than $2,000 for households headed by those aged 65 to 69 and more than $1,000 for households headed by those aged 70 to 79. The debt-to-asset ratio increased for all age groups among elderly households from 1989 to 2016, and the ratio increased the most among households headed by people aged 80 and older (see Figure 8 ). The debt-to-asset ratio among elderly households with any debt increased from 4.0% to 9.9% for households headed by those aged 65 to 69, from 7.1% to 9.8% for the age group 70-74, from 5.3% to 8.2% for the age group 75-79, and from 2.4% to 7.2% for the age group 80 and older. Residential debt explains the majority of the growth in total debt for every elderly household age group. This section discusses changes in debt from 1989 to 2016 for elderly households with different asset levels. It is important to analyze changes in debt across the household asset distribution for several reasons. First, a small group of wealthy households hold high levels of assets and debt; thus, average measures may not accurately reflect less wealthy households' financial situations. Second, elderly households are more likely than their nonelderly counterparts to draw down existing assets, such as withdrawing from retirement savings accounts and other investment accounts. Asset measurement may provide an important view of an elderly household's ability to afford debt obligations. The change in household debt among elderly households from 1989 to 2016 varies widely across the household asset distribution. During this time period, elderly households in the middle of the asset distribution had a relatively larger growth in the probability of holding any debt, and those in the middle and the top of the asset distribution had the largest growth in median and average household debt. Elderly households in the bottom of the asset distribution usually held the least debt, but had the largest debt burden as reflected in the debt-to-asset ratio, whereas elderly households in the top of the asset distribution held the most debt, but had the smallest debt-to-asset ratio. Table 4 presents data on household debt by quintile of the total asset distribution among the elderly household population. Each quintile represents 20% of the elderly household population. The first quintile depicts the 20% of the elderly household population with the least assets, and the fifth quintile depicts the 20% of elderly households with the most assets. The share of elderly households that held some debt generally increased from 1989 to 2016 for all asset quintiles. Elderly households in the first asset quintile were generally least likely to hold debt, and the share of those households who held any debt increased from 36.2% to 49.5%. Elderly households in the second, third, and fourth quintiles of total assets had the largest growth in the probability of holding any debt, with an increase of about 30 percentage points. The share of elderly households in the highest 20% of the asset distribution that held debt also increased from 37.3% in 1989 to 54.9% in 2016, but the increase was not as large as that among households in the middle of the asset distribution. Table 5 presents median debt among elderly households with any debt by quintile of total assets from 1989 to 2016. Median debt generally increased for elderly households in all asset quintiles, with a larger percentage increase for elderly households in the middle of the asset distribution. Real median debt (in 2016 dollars) increased by about three times for elderly households in the first and the fifth asset quintiles, and it increased by about four times or more for elderly households in the second, third, and fourth quintiles. Average debt generally increased from 1989 to 2016 for elderly households across the asset distribution, but the magnitude of growth differed among asset quintiles (see Table 6 ). Real average debt (in 2016 dollars) for elderly households in the lowest asset quintile was approximately twice as much in 2016 compared to 1989, whereas average debt for elderly households in the second through the fourth asset quintiles was generally three times as much in 2016 as in 1989. Average debt for households in the highest asset quintile also doubled, with the largest real increase of about $135,000. For households in the lowest asset quintile, the growth in average debt mainly resulted from growth in primary residential debt, credit card debt, and auto loans. From 1989 to 2016, the increase in average primary residential debt contributed to 54% of the growth in average debt. The increase in average credit card debt explained about 30% of the growth in average debt among elderly households in the bottom asset quintile, and the increase in average auto loans explained almost 20% of the growth in average debt among those households. The growth in debt among middle- and high-asset elderly households also mainly resulted from growth in residential debt. For higher-asset households, mortgage debt for second homes was also a part of this increase in debt. For households in the second through the fourth quintiles of total assets, growth in debt secured by primary residences generally accounted for about 80% of the growth in average debt. For households in the top asset quintile, growth in primary residential debt explained almost 70% of the growth in average debt, and the remaining 30% came mostly from other residential debt. In addition, elderly households in the bottom asset quintile were more likely to have a higher proportion of debt held in other debt, including lines of credit, installment loans, loans against pensions or life insurance, margin loans, and miscellaneous, but the proportion decreased from 1989 to 2016. Elderly households in the first asset quintile on average held about 45% of their debt in other debt in 1989, and this proportion has declined to 20% in 2016. Figure 9 displays the debt-to-asset ratio among elderly households with debt by total asset quintiles in 1989 and 2016, decomposed into residential and nonresidential debt-to-asset ratios. The debt-to-asset ratios for households in the lowest asset quintile decreased during this time, although the residential debt-to-asset ratio slightly increased. In 2016, however, elderly households in the bottom 20% of the asset distribution still had a 43% debt-to-asset ratio, and most of the debt was based on nonresidential loans, such as credit card debt, auto loans, and student loans, which are usually considered as less effective long-term wealth builders than residential loans. Among households in the second through the fourth asset quintiles, the debt-to-asset ratio generally increased by around 10 percentage points from 1989 to 2016, with most of the increase in the residential debt-to-asset ratio. The debt-to-asset ratio increased slightly for elderly households in the top asset quintile, primarily because of growth in the residential debt-to-asset ratio, including debt on both the primary residence and other residences. Debt among households headed by individuals aged 65 and older has increased substantially over the past 30 years. The share of elderly households who held any debt almost doubled, and median debt among households with debt increased by about four times. Much of the rise in debt among older Americans is not necessarily associated with financial insecurity in retirement. Much of the change in debt among elderly households, across some age groups and through most of the asset distribution, is well balanced by their assets. As shown earlier, from 1989 to 2016, the debt-to-asset ratio among elderly households with debt increased from 5.1% to 9.0%. Individuals may also adjust behavior to meet their debt obligations. For instance, one study finds that both the presence and the level of debt increase the likelihood that older adults work and reduce the likelihood that they are retired. Data from the SCF also show that the percentage of elderly households with either the head of the household or a spouse working increased from 19.8% in 1989 to 29.7% in 2016. Rising debt among certain elderly households, however, has shown signs of an increase in debt burden. For example, the debt-to-asset ratio among households headed by individuals aged 80 and older increased by 5 percentage points between 1989 and 2016, and the ratio among elderly households with middle asset levels increased by more than 10 percentage points during the same time. Rising debt might be more problematic for persons aged 80 and older because they might be more vulnerable to income risks, as they are more likely to have lower or no earnings (as they phase out of the labor force), exhaust existing retirement resources, have reduced purchasing power in certain defined benefit pensions, and incur higher medical expenses. In addition, older Americans now hold historically high levels of housing debt, which might make them more vulnerable to housing market swings than previous cohorts of retirees. Therefore, in addition to retirement income and saving adequacy, debt management may also be an important determinant of retirement security.", "summary": "In the past three decades, debt has grown substantially among older Americans. The increase in debt among older Americans has raised concerns about financial security for people near or during retirement, not only because Americans aged 65 and older represent a large and growing proportion of the U.S. population, but also because increases in household debt might require retirees to devote a larger share of their fixed income from Social Security, pensions, or government subsidies toward paying debt. Older people also tend to have limited ability to adjust their labor supply to offset higher monthly debt obligations. Excessive debt payments may put more seniors, especially those living on limited incomes, at greater risk of financial insecurity. According to the Survey of Consumer Finances (SCF), the percentage of elderly households (i.e., those headed by individuals aged 65 and older) who held any debt increased from 37.8% in 1989 to 61.1% in 2016. During the same time, the median debt among elderly households with debt increased from $7,463 to $31,050 (in 2016 dollars), and the real average debt increased from $29,918 to $86,797 (in 2016 dollars). The median debt lies at the middle of the debt distribution, and the average debt is generally higher than the median debt because a relatively small percentage of people have very high debt. Between 1989 and 2016, growth in average household debt among elderly households with any debt largely resulted from mortgages, including growth in average debt secured by a residence (from $12,970 to $57,943 in 2016 dollars) and average debt for other residential properties (from $2,970 to $11,446 in 2016 dollars). Some researchers speculate that much of the growth in debt among elderly households through 2007 might have resulted from the increased availability of mortgage credit, whereas others argue that tightening underwriting standards on mortgage debt in the wake of the financial crisis have slowed mortgage originations among young borrowers, which consequently resulted in a shift of new mortgage originations toward older borrowers. Residential loans are usually considered to be long-term wealth builders, as the residence's market value may increase over time, and some researchers find that they are much less stressful to older people than other debt, such as credit card debt. However, some others also argue that households headed by individuals aged 65 and older held historically high levels of housing debt in 2016, which might expose them to greater vulnerability to housing market shocks than elderly households in previous cohorts. The change in debt among elderly households from 1989 to 2016 varied by age groups and asset levels. For example, the largest growth in the share of elderly households who have any debt was for those headed by individuals aged 75 and older. In terms of asset levels, households in the middle of the total asset distribution had the largest growth in the holding of any debt. Much of the change in debt among elderly households on average was well balanced by their assets. To measure the extent to which a household is burdened by debt, researchers and policymakers usually refer to the debt payments-to-income ratio and the total debt-to-asset ratio. Among elderly households with debt, the debt payment-to-income ratio increased from 8.7% in 1989 to 12.4% in 2016, and the debt-to-asset ratio increased from 5.1% to 9.0% during the same time. Both ratios peaked in 2010, the year after the recent economic recession, and then decreased from 2010 to 2016. The debt burden increased more rapidly for certain types of elderly households between 1989 and 2016. The debt-to-asset ratio among households headed by individuals aged 80 and older increased by 5 percentage points during this time. Likewise, the ratio among elderly households in the middle of the total asset distribution increased by more than 10 percentage points during the same time.", "document_type": "crs"}
{"report": "On March 11, 2019, the Trump Administration proposed its FY2020 budget for the Department of State, Foreign Operations, and Related Programs (SFOPS) accounts, which fund U.S. diplomatic activities, cultural exchanges, development and security assistance, and U.S. participation in multilateral organizations, among other international activities. The SFOPS budget includes most international affairs (function 150) funding, as well as funding for international commissions in the function 300 budget. Additional emergency funds were requested by the Administration on March 17, 2020, to respond to Coronavirus Disease 2019 (COVID-19). The total request, including these emergency supplemental funds, was $42.94 billion in discretionary funds ($43.10 billion when $158.9 million in mandatory retirement funds are included), which was 3% higher than the FY2019 request but 21% below the FY2019 enacted SFOPS funding level (after rescissions). It was lower than any SFOPS funding level in the last decade ( Figure 1 ), and represented about 3% of the total discretionary budget authority (an estimated $1.313 trillion) requested for federal programs in FY2020. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), signed into law on December 20, 2019, included $54.84 billion for SFOPS accounts in FY2020, a nearly 1% increase from the FY2019-enacted level and approximately 28% more than the Administration's request. Supplemental funds to address the COVID-19 outbreak, requested and enacted in March 2020, added $2.37 billion to SFOPS accounts, bringing the FY2020 total to $57.21 billion. Of that enacted total, $8.0 billion was designated as Overseas Contingency Operations (OCO) and $2.37 billion (the COVID-19 funds) was designated as emergency funding. In SFOPS, there is often disparity between requested and enacted appropriations. During the Obama Administration, Congress typically provided less SFOPS funding than was requested, though the gap narrowed over time. Thus far in the Trump Administration, Congress has enacted significantly more SFOPS funding than the amount requested, both because the requested amounts have represented large cuts and because enacted funding levels have been high relative to most recent years ( Table 1 ). The FY2020 budget request continued this pattern. Since FY2012, the appropriations process has been shaped by the discretionary spending caps put in place by the Budget Control Act of FY2011 (BCA; P.L. 112-25 ). Congress has repeatedly amended the BCA to raise the caps, most recently by the Bipartisan Budget Act of 2019 (BBA 2019; P.L. 116-37 ). The BBA 2019 raised discretionary spending limits set by the BCA for FY2020 and FY2021, the final two years the caps are in effect. In addition to raising the caps, another way that Congress has managed the constraints imposed by the BCA budget caps is through the use of Overseas Contingency Operations funding, which is excluded from the BCA discretionary budget caps. Congress began appropriating OCO in the SFOPS budget in FY2012, having previously provided OCO funds for the Department of Defense. Originally used to support shorter-term, temporary contingency-related programming in Afghanistan, Iraq, and Pakistan that was not part of the \"base\" or \"core\" budget, the use of OCO has expanded considerably over the years. In FY2019, OCO funds were used to support 11 different SFOPS accounts, from USAID operating expenses and the Office of Inspector General to International Disaster Assistance and Foreign Military Financing. When Congress raised the BCA caps for FY2019, the Administration chose not to request OCO funding for FY2019 SFOPS. Congress nevertheless designated $8 billion of FY2019 SFOPS funding as OCO, a 33% reduction in OCO spending compared to FY2018 and the second year in a row that SFOPS OCO levels declined significantly. While the FY2020 SFOPS request did not include OCO funding, the Administration's FY2020 defense budget request included an unprecedented amount of OCO funding, widely viewed as a means of increasing defense spending without amending the BCA's defense discretionary spending cap. Through BBA 2019, Congress established OCO funding targets for both defense and nondefense discretionary spending. For foreign affairs OCO, Congress designated $8 billion for FY2020 and FY2021, indicating its intent to continue to use OCO in SFOPS appropriation measures for the next two fiscal years. Congress adhered to that target, and remained consistent with FY2019 funding, in the final FY2020 SFOPS appropriation, providing $8 billion in OCO, representing nearly 14% of the total SFOPS funding ( Figure 2 ). House SFOPS Legislation. On May 16, 2019, FY2020 SFOPS legislation ( H.R. 2839 , with accompanying report H.Rept. 116-78 ) was introduced and approved by the full House Appropriations Committee. The legislation included total SFOPS funding of $56.54 billion, 0.4% higher than FY2019 enacted funding and 32% more than requested. Of that total, $48.54 billion was base fundingâthe 302(b) allocation level approved by the House committeeâand $8 billion was designated as OCO. On June 19, 2019, the House passed the FY2020 SFOPS legislation in a \"minibus\" measure that included three other appropriations billsâLabor, Health and Human Services, Education; Defense; and Energy and Water Development ( H.R. 2740 ). While the topline funding level remained the same, some monies were shifted among the various accounts due to adopted amendments. Senate SFOPS Legislation . On September 26, 2019, the Senate Appropriations Committee approved an SFOPS measure for FY2020, S. 2583 (with accompanying report S.Rept. 116-126 ), that would have provided $55.16 billion in total new funding. This represented an increase of 0.1% from FY2019-enacted funding and a 27% increase from the requested level. Of that total, $47.16 was base funding and $8 billion was designated as OCO. The measure did not reach the Senate floor for consideration. Continuing Resolutio ns . On September 26, 2019, the Senate approved H.R. 4378 , the Continuing Appropriations Act, 2020 (approved by the House on September 19 th ), which continued funding for most federal agencies and accounts at the FY2019 funding level through November 21, 2019. The legislation was signed by the President on September 27. On November 21, 2019, the Senate approved a second continuing resolutionâ H.R. 3055 , the Further Continuing Appropriations Act, 2020, and Further Health Extenders Act of 2019 (approved by the House on November 19 th ). The legislation, which funded federal operations at the FY2019 funding level through December 20, 2019, was signed by the President on November 21, 2019. Enacted Legislation. On December 20, 2019, the President signed into law P.L. 116-94 , a full-year appropriation that included $54.84 billion in total SFOPS funding (Division G). This enacted level represented a nearly 1% increase from the FY2019-enacted funding level and was approximately 28% more than the Administration's FY2020 request. Of that total, $16.72 billion was for State Department and related agencies operations, and $38.70 billion was for foreign operations accounts. Nearly 15%, or $8.0 billion of the total SFOPS appropriation was designated as OCO. COVID- 19 Supplemental s . On March 17, the Trump Administration requested $220 million in supplemental SFOPS funds as part of a larger supplemental FY2020 appropriations request to address the COVID-19 pandemic. Also in March 2020, Congress enacted multiple supplemental appropriations, including the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 , signed into law March 6) and the Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 , signed into law March 27). P.L. 116-123 included $1.25 billion for SFOPS accounts, including Diplomatic Programs ($264 million), USAID Inspector General ($1 million), Global Health Programs-USAID ($435 million), International Disaster Assistance ($300 million), and Economic Support Fund ($250 million). P.L. 116-136 included $1.115 billion for SFOPS accounts, including Diplomatic Programs ($324 million), USAID Operating Expenses ($95 million), International Disaster Assistance ($258 million), Migration and Refugee Assistance ($350 million), and the Peace Corps ($88 million).With these supplemental funds, enacted SFOPS funding for FY2020 totaled $57.208 billion, a 5.2% increase over the FY2019-enacted level and about 33% more than the Administration's request. For FY2020, the Administration sought to cut funding for the Department of State and Related Agency appropriations accounts from the $16.46 billion Congress enacted for FY2019 to $13.98 billion (including the supplemental request), a 15% reduction. The Administration's FY2020 request exceeded its FY2019 request for these accounts, which totaled $13.26 billion, by around 5.4%. The Administration's priorities to be funded through Department of State and Related Agency accounts included sustaining the global diplomatic workforce and operations; protecting U.S. government personnel and overseas missions; and preserving strategic participation in international organizations to achieve outcomes favorable to the United States and its allies. Conversely, the House bill and the Senate committee bill both sought to increase funding for these accounts. The House bill would have raised funding to $17.35 billion, or 5.4% above the FY2019 funding level. The Senate committee bill, if enacted, would have boosted funding to $16.53 billion, or 0.4% more than the FY2019 funding level. The FY2020 initial enacted appropriation ( P.L. 116-94 ) provided $16.72 billion for the Department of State and Related Agency accounts, which is about 1.6% above the FY2019-enacted level. This funding level exceeded that of the Senate committee bill by 1.1% and was approximately 3.6% less than the amount included in the House bill. The Administration requested an additional $115 million in the Diplomatic Programs account for COVID-19 response activities in March 2020. P.L. 116-123 , the COVID-19 supplemental appropriation, provided an additional $264 million for the Diplomatic Programs account, and P.L. 116-136 provided an addition $324 million for Diplomatic Programs, bringing the total enacted funding for Department of State and Related Agency accounts to $17.31 billion, or 5.2% more than the FY2019 funding level. Table 3 provides detailed information regarding the extent of the Administration's proposed cuts to these accounts, the House and Senate committee bill funding levels, and the appropriations provided in P.L. 116-94 and P.L. 116-123 . The Worldwide Security Protection (WSP) sub-account within the Diplomatic Programs account has been used to fund programs that the State Department's Bureau of Diplomatic Security (DS) and other bureaus implement to protect the department's staff, property, and information. As part of its FY2020 request, the Administration asked Congress to create a new WSP standalone account and authorize the transfer of all unobligated WSP funds into this account by no later than the onset of FY2021 (October 1, 2020). The Administration maintained that creating this account would increase the transparency of WSP expenditures through more clearly indicating distinctions between funding for diplomatic programs and security-related activities. For its FY2021 budget request, the State Department reportedly intends to request WSP funding in this new account. To date, no legislation has been introduced in Congress that would create a new WSP account. As in previous years, the majority of both the funding the Administration requested and the budget authority Congress provided for the Department of State and Related Agency appropriations accounts was for diplomatic programs, diplomatic security and embassy construction, and contributions to international organizations and international peacekeeping activities. For FY2020, such programs accounted for approximately 88% of the Administration's request and 84% of the funds Congress appropriated for these accounts. Some of the Administration's priorities within these areas, as identified by the Department of State in its Congressional Budget Justification and other materials provided to Congress, are detailed below. The Diplomatic Programs account is the State Department's principal operating appropriation and serves as the source of funding for several key functions. These include domestic and overseas State Department personnel salaries; the operations of the department's strategic and managerial units, such as the Office of the Secretary and the Bureaus of Administration, Budget and Planning, Information Resource Management, and Legislative Affairs; and foreign policy programs administered by the Bureaus of African Affairs, Conflict and Stabilization Operations, and others. The Administration's initial FY2020 request for Diplomatic Programs totaled $8.42 billion, an 8% reduction from the $9.17 billion Congress enacted for this account in FY2019. The House bill and Senate committee bill would have appropriated $9.25 billion and $8.89 billion, respectively, for this account. P.L. 116-94 , the FY2020-enacted appropriation, provided $9.13 billion for Diplomatic Programs, or 0.5% less than the FY2019 funding level and 8% more than the Administration's request The Administration maintained that its request was consistent with past congressional guidance regarding appropriate State Department on-board personnel volumes and would sustain the Foreign Service and Civil Service workforces at their end-of-2017 levels. Both the House bill and Senate committee bill included oversight provisions pertaining to Foreign Service and Civil Service personnel levels. The enacted legislation provided funding for not less than 12,870 permanent Civil Service staff and 13,031 permanent Foreign Service Officers, which the joint explanatory statement accompanying the law maintained was consistent with the State Department's current hiring targets and would restore State Department personnel to pre-hiring-freeze levels in place during FY2016. Among other priorities funded by the Diplomatic Programs account, the joint explanatory statement provided an additional $500,000 apiece to the Bureau of Democracy, Human Rights, and Labor and the Bureau of Economic and Business Affairs for implementation of the Global Magnitsky Human Rights Accountability Act (Subtitle F, Title XII, Division A of P.L. 114-328 ). The Senate committee report accompanying its bill, which also sought to provide this increased funding, stated that it was necessary for the hiring of additional staff to strengthen implementation of the law. The Senate committee report also expressed concern with what it characterized as the lack of information sharing between the Departments of State and the Treasury necessary for sanctioning foreign individuals for direct or indirect involvement in significant corruption or gross violations of human rights under this law. The committee report included a reporting requirement, which was made part of the enacted appropriations law, requiring the Secretary of State to submit a plan to Congress aimed at improving coordination with the Department of the Treasury on such efforts. An additional $115 million was requested for Diplomatic Programs in March 2020 to help the State Department prevent, prepare for, and respond to the coronavirus epidemic, including maintaining consular operations, reimbursement of evacuation expenses, and emergency preparedness. Congress appropriated an additional $588 million in FY2020 supplemental Diplomatic Programs funds for this purpose, including $264 million in P.L. 116-123 and $324 million in P.L. 116-136 . These supplemental funds brought FY2020-enacted funding for this account to a total of $9.71 billion, or 5.9% above the FY2019-enacted level. The Administration's FY2020 budget request sought to provide approximately $5.41 billion for the department's key diplomatic security accounts: $3.78 billion for the Worldwide Security Protection (WSP) allocation within the Diplomatic Programs account and $1.63 billion for the Embassy Security, Construction, and Maintenance (ESCM) account. The WSP allocation supports the Bureau of Diplomatic Security (DS), which is responsible for implementing security programs to protect U.S. embassies and other overseas posts, diplomatic residences, and domestic State Department offices. The ESCM account supports the Bureau of Overseas Buildings Operations (OBO); provides the State Department's share of costs involved with the planning, design, construction, and maintenance of U.S. overseas posts around the world; and funds \"brick and mortar\" security measures at these posts. As illustrated in Table 4 , enactment of the Administration's request would have marked a decline of 8% for WSP and 18% for ESCM relative to the FY2019 enacted figures. Among the priorities the Administration sought to fund through its request were the construction of new embassy compounds in Qatar, Brazil, and Malawi and new U.S. consulates in Italy and Indonesia. Proposed cuts included a $50 million reduction in DS operations in Iraq due to the suspension of operations at the U.S. Consulate General in Basrah. The enacted legislation, P.L. 116-94 , appropriated $4.10 billion for WSP and $1.98 billion for ESCM, for a total of approximately $6.08 billion in diplomatic security funding. This funding totals around 12% more than the Administration's request, 7% more than the Senate committee bill would have provided, and 0.2% less than the appropriated funds included in the House bill. The aggregate appropriation for diplomatic security is nearly identical to that provided in FY2019. However, P.L. 116-94 appropriated around $7.4 million more for Worldwide Security Upgrades, a sub-item within ESCM that includes the State Department's share of the costs to plan, design, and build new embassies and other facilities abroad, while providing an equivalent lesser amount for the operations and repair and construction programs funded through ESCM. The enacted appropriations law also carried over notification requirements from previous years that Congress applies to conduct oversight of diplomatic construction projects abroad, including ongoing embassy construction projects in Lebanon, Indonesia, Mexico, and India. With respect to the U.S. Consulate General in Basrah, the law requires that any change to the status of operations there is subject to consultation with and notification to Congress. Over the past several years, Congress provided no-year appropriations for both WSP and ESCM, thereby authorizing the State Department to indefinitely retain appropriated funds beyond the fiscal year for which they were appropriated. As a result, the department has carried over large balances of unexpired, unobligated WSP and ESCM funds each year that it is authorized to obligate for purposes including multiyear construction projects and unexpected security contingencies. For example, for FY2019, the State Department carried over more than $7.2 billion in previously appropriated funds for ESCM. In this context, P.L. 116-94 included a rescission of $242.5 million in unobligated ESCM funds previously appropriated pursuant to the Security Assistance Appropriations Act, 2017 (division B of P.L. 114-254 ) for embassy construction projects in high-threat countries that were subsequently postponed indefinitely. Through the Contributions to International Organizations (CIO) account, the United States pays its assessed contributions (membership dues) to the United Nations (U.N.), the U.N. system of organizations (including, for example, the International Atomic Energy Agency), inter-American organizations such as the Organization of American States, and other international organizations. Additional funding is provided to international organizations through the various multilateral assistance accounts, as described in the Foreign Operations section of this report. Separately, the United States pays its assessed contributions to U.N. peacekeeping missions through the Contributions for International Peacekeeping Operations (CIPA) account. Recent funding levels for both accounts are detailed in Table 5 . The Administration's CIO account request noted that it prioritized funding for international organizations \"whose missions substantially advance U.S. foreign policy interests\" while cutting contributions to organizations whose work either does not directly affect U.S. national security interests or renders unclear results. While the request sought to fund the North Atlantic Treaty Organization (NATO) and the International Atomic Energy Agency near recent levels, it looked to cut funding for the World Health Organization (WHO) and the Food and Agriculture Organization (FAO) by approximately 50% each. The Administration's request specifically noted that these cuts owed to \"these entities' less direct linkages to U.S. national security and economic prosperity.\" With regard to CIPA, the Administration's request assumed that the State Department would make progress in efforts to negotiate reductions in the overall budgets of peacekeeping missions or the closure of certain missions altogether. The U.S. assessment for U.N. peacekeeping (last negotiated in 2018) is 27.89%; however, Congress has capped the U.S. contribution at 25%. If the Administration's request was enacted, it would have provided 58% of total U.S. assessed dues owed for FY2020. The remainder of these dues would have been compounded into arrears. The State Department estimated that the United States accumulated about $725 million in peacekeeping arrears from FY2017 to FY2019 as a result of the U.S. cap. The FY2020 appropriations law provided a combined total of $3 billion for CIO and CIPA, which marked an increase of 40% relative to the Administration's request, and was 17% and 2% less, respectively, than the House and Senate committee funding levels. The joint explanatory statement explicitly provided that not less than $67.4 million of the CIO appropriation was for the FY2020 U.S. contribution to NATO, which totaled approximately 9% more than the U.S. contribution to the alliance in FY2018. The joint explanatory statement further noted that no funds were included in the law to withdraw the United States from NATO. Information provided to Congress by the Department of State indicates that the department intends to fund the WHO and FAO through this account near recent-year levels. With regard to CIPA, the joint explanatory statement maintained that sufficient funds were appropriated for the United States to continue providing contributions at the statutory level of 25% rather than the assessed rate of 27.89%. Both the House and Senate committee reports made note of compounding U.S. peacekeeping arrears. The House committee report recommended applying a share of the FY2020 CIPA appropriation for the payment of arrears accumulated in FY2017 and FY2018âhowever, this may not be possible as the final FY2020 CIPA appropriation provided in P.L. 116-94 was around $600 million less than the level included in the House bill. The Senate committee report encouraged the State Department to alleviate the issue of compounding arrears through reviewing peacekeeping missions for potential cost savings while ensuring mission effectiveness. The foreign operations accounts in the SFOPS appropriation, together with the Food for Peace and McGovern-Dole food aid programs funded through the agriculture appropriation, comprise the foreign assistance component of the international affairs budget. The Administration's initial FY2020 foreign operations request totaled $29.01 billion, about 1.5% more than the Administration requested for these accounts for FY2019 and 23% less than Congress enacted for FY2019. Total foreign aid, including the food aid programs in the agriculture appropriation, would have been cut by 27%. The foreign aid request outlined four general priorities: Supporting U.S. friends and allies Winning the great power competition Promoting a \"journey to self-reliance\" for developing countries Sharing the burden of international security and development with more partners Under the President's proposal, assistance levels would have been cut across all aid types and sectors. The House legislation, H.R. 2740 , included $39.2 billion for foreign operations, a slight increase compared to FY2019, and about 34% more than the Administration requested. The Senate committee bill, S. 2583 , included $38.95 billion for foreign operations accounts, almost level with the House recommendation. The omnibus appropriation, P.L. 116-94 , included $38.70 billion for foreign operations accounts, a 1.2% increase over FY2019 funding and 33% more than requested. In response to the COVID-19 pandemic, the Administration requested an additional $105 million in the USAID Operating Expenses and Peace Corps accounts for FY2020. Congress in turn enacted $1.777 billion in additional foreign operations funds in COVID-19 supplemental appropriations legislation, primarily in the Global Health Programs, International Disaster Assistance, Migration and Refugee Assistance, and Economic Support Fund accounts, bringing total enacted foreign operations funding to $40.48 billion ( Table 6 ). In the FY2020 request, the Administration proposed to consolidate accounts in two areas: Most non-health development assistance accountsâDevelopment Assistance; Economic Support Fund; Assistance to Europe, Eurasia and Central Asia; and the Democracy Fundâwould have been combined into a single new Economic Support and Development Fund (ESDF). The Administration made a similar request for both FY2018 and FY2019, but Congress did not enact the proposed account restructuring. For the first time, the Administration proposed to consolidate the four humanitarian assistance accountsâInternational Disaster Assistance (IDA), Migration and Refugee Assistance (MRA), Food for Peace, Title II and Emergency Refugee and Migration Assistance (ERMA)âinto a single International Humanitarian Assistance (IHA) account. Budget documents stated that the consolidated account would be managed by USAID under the policy authority of the State Department (see Humanitarian Assistance section below). The Administration suggested that consolidation of these accounts would streamline management to allow more efficient deployment of resources. The House passed legislation, H.R. 2740 , did not adopt the account structure proposed by the Administration. However, it did move the Economic Support Fund account from Title III (bilateral economic assistance) of the bill to Title IV (security assistance), making comparisons of the two titles to the request or to prior appropriations potentially misleading. The committee report notes that ESF funds \"are provided to advance United States interests by helping countries meet political and security needs,\" and may be provided in countries that also receive Development Assistance funds, seemingly clarifying the purpose for distinct accounts rather than a combined ESDF. The Senate committee bill did not adopt the account structure changes proposed by the Administration or the House bill. It did, however, add a \"restructured debt\" account line under the Treasury Programs heading, with $20 million in recommended funding, that was included in neither the Administration request nor the House bill. P.L. 116-94 , like the Senate bill, maintained the development and humanitarian assistance account structure used in the FY2019 legislation, but added a $15 million line item for debt restructuring under Treasury Programs. Under the original FY2020 request, funding for independent SFOPS agencies would have been reduced by 12% overall from FY2019 levels. Requested Peace Corps funding was $396.2 million (a 3.5% reduction from FY2019) and for the Millennium Challenge Corporation (MCC), $800 million (an 11.6% reduction). As in the FY2019 budget request, the FY2020 request proposed elimination of two independent development agenciesâthe Inter-American Foundation (IAF) and the U.S. Africa Development Foundation (USADF)âand incorporation of their staff and small grant activities into USAID's Western Hemisphere and Africa bureaus, respectively. The request specified that funding was included for 40 staff positions to enable this transition, as well as $20 million in ESDF to support small grants. H.R. 2740 , as passed, would have maintained funding for the MCC and USADF at FY2019 levels while increasing funding for the Peace Corps (3.5% increase) and IAF (44%, with the increase to be used to support the Central America Strategy, the Caribbean Basin Strategy, and for programs in Colombia). The committee report made clear that the committee did not assume the proposed consolidation of IAF and USADF into USAID. S. 2583 , the committee-passed bill, would have provided overall funding for independent agencies at much the same level recommended by the House bill, but would have maintained Peace Corps and MCC funding at the FY2019 level. USADF funding would have increased by 10% and IAF by 67% compared to FY2019, with the committee specifying that the funds were not for close-out costs. The enacted legislation adopted the Senate funding levels for all the independent agencies, a 1.3% increase, in total, over FY2019 funding. In March 2020, The Administration requested an additional $73 million for the Peace Corps to fund the emergency evacuation of volunteers during the COVID-19 pandemic. Congress enacted $88 million for this purpose in P.L. 116-136 . Including this funding, FY2020 appropriations for independent agencies to date total $1.474 billion. The various multilateral assistance accounts, through which the United States contributes to multilateral development banks and international organizations that pool funding from multiple donors to finance development activities, would have been cut by about 18% from FY2019, to $1.52 billion, under the request. As in the FY2018 and FY2019 requests, the Administration included no funding in the FY2020 request for the International Organizations and Programs (IO&P) account, which funds U.S. voluntary contributions to international organizations, primarily United Nations entities such as UNICEF. Congress appropriated $339 million for IO&P in FY2019. The Administration also requested no funding for the Global Environment Facility (GEF), describing the FY2019 appropriation as sufficient to cover FY2019 and FY2020. The House legislation, H.R. 2740 , would have increased total funding for international organizations by nearly 26%, to $2.34 billion. This included a 91% increase compared to FY2019 for the IO&P account, with report language allocating funds for core contributions to specific agencies, including $147.5 million for UNICEF and $55.5 million for the U.N. Population Fund. The IO&P allocation also included $170.5 million for the U.N. Relief and Work Agency (UNRWA, which works in Palestinian territories) and report language specified that $226.6 million of multilateral assistance should support humanitarian and development efforts in the West Bank and Gaza. The bill also included $139.6 million for the GEF and $30 million for the International Fund for Agricultural Development. The Senate committee bill, S. 2583 , included $2.07 billion for multilateral aid accounts, an 11.5% increase over FY2019 funding. The increase was driven by a 12% IO&P funding increase and inclusion of $206.5 million in International Bank of Reconstruction and Development funding that was in the Administration request but not the House bill or the FY2019-enacted appropriation. The enacted legislation included a total of $2.082 billion for multilateral assistance, a 12% increase over FY2019 funding. Within that total, IO&P funding was increased by 15% to $390.5 million, offset in part by the lack of a contribution to the African Development Bank ($32 million in FY2019). All other multilateral accounts were funded at the same level as FY2019. Export promotion activities in FY2020, as in all recent years, are expected in total to return more to the Treasury through offsetting collections (such as fees and loan interest payments) of the Export-Import Bank and the Overseas Private Investment Corporation (OPIC) than is appropriated for these programs. In 2019, OPIC was dissolved and replaced by the new U.S. International Development Finance Corporation (DFC), which also incorporates USAID's Development Credit Authority (DCA). The request included increased administrative funding to support this transition ($98 million, compared to $80 million for OPIC administration and $10 million for DCA administration in FY2019). The FY2020 request also included $200 million in program funds to support DFC credit subsidies, technical assistance and feasibility studies. As in FY2018 and FY2019, the Administration's export promotion request called for the elimination of the U.S. Trade and Development Agency (TDA), seeking $12.1 million for an orderly shutdown. Congress appropriated $79.5 million for TDA in both FY2018 and FY2019. H.R. 2740 , as passed, did not include funding for OPIC, anticipating its termination under the BUILD Act, and instead provided funds for the DFC, including $164 million for the capital account (45% less than requested), to include $101 million for administrative expenses. It also set an $80 million limit on transfers to the DFC to support direct and guaranteed loans and included several reporting requirements for the new agency. The bill also included $75 million for TDA, a 5.7% cut from current year funding. The Senate committee bill, S. 2583 , would have funded the DFC through several specific budget allocations: $98 million for administrative expenses, $150 million for an equity fund, $50 million (by transfer from the Development Assistance account) for a program accounts, and $2 million for the Inspector General. Like the House bill, the Senate committee bill anticipated offsetting collections to exceed DFC appropriations in FY2020. S. 2583 also included $79.5 million for TDA. P.L. 116-94 provided $299 million for a DFC corporate capital account (including $119 million for administrative expenses, $150 million for equity investments, and $30 million for other programs), $80 million for the cost of direct and guaranteed loans through a program account, and $2 million for the Inspector General. Like the House and Senate bills, the enacted legislation assumes that offsetting collections will make appropriations for the DFC unnecessary. The bill also included $79.5 million for TDA. As in previous years, the bulk of aid requested for FY2020 was for global health, humanitarian, and security assistance programs. The total request for the Global Health Programs (GHP) account for FY2020 was $6.34 billion, a 28% cut from the FY2019 enacted funding level. Global health sub-accounts would have been cut across the board under the request, with reductions ranging from 11% for malaria programs to nearly 55% for family planning and reproductive health programs ( Table 7 ). HIV/AIDS program funding would have been cut by nearly 30% from FY2019 funding levels, though the Administration asserted that the requested funding would be sufficient to maintain treatment for all current recipients. The Administration proposed limiting U.S. Global Fund contributions to 25% of all donations, rather than the 33% that the United States has provided since the George W. Bush Administration. The House legislation, H.R. 2740 , included nearly $9.30 billion for GHP, which would have increased GHP funding by 5% over FY2019 levels and was 47% more than requested. Sub-sector allocations specified in the accompanying report would have maintained level funding or slight increases for most health subsectors compared to FY2019 levels, with the exception of family planning and reproductive health funding, which would have increased by 30%. The bill included $1.56 billion for the Global Fund, retaining the U.S. contribution limit at 33% of the total, and directed the Administration to fully obligate the funds for the first installment of the new replenishment round. In addition, the House committee bill included a provision that would have prohibited funds appropriated in the act, or prior SFOPS Acts, from being used to implement the Administration's expansion of the \"Mexico City Policy,\" which prohibits all global health funding (expanded from family planning funding) to foreign NGOs engaged in voluntary abortion activities, even if such activities are conducted with non-U.S. funds. S. 2583 would have provided $9.12 billion for GHP in total, about 3% more than the FY2019 funding, with slight increases in all health subsectors compared to the FY2019 subsector allocations, as specified in the accompanying report. Compared to the House bill, the Senate committee bill included significantly less funding for family planning and reproductive health programs (-22%) and more for malaria programs (+4.5%). The bill would have provided $1.56 billion for the Global Fund, the same as the House bill. P.L. 116-94 included a total of $9.09 billion for GHP, 2.9% more than the FY2019 funding level and 43% more than the Administration's request. The increase over FY2019 funding was driven by modest increases across all global health subcategories, as detailed in the explanatory statement, with the exception of family planning and reproductive health, which was maintained at the FY2019 funding level. The biggest increases were to HIV/AIDS (+3.5%) and nutrition (+3.4%) activities. Like the House and Senate bills, the enacted appropriation allocated $1.56 billion for the Global Fund. P.L. 116-123 , the first COVID-19 supplemental bill, included an additional $435 million for Global Health Programs, to be administered by USAID, \"for necessary expenses to prevent, prepare for and respond to coronavirus.\" This funding brought the GHP total for FY2020 to $9.53 billion, or nearly 8% more than the FY2019-enacted funding. The initial FY2020 budget request for humanitarian assistance was $5.97 billion, a 37% decrease from the FY2019 appropriation (including funds for Food for Peace in the Agriculture appropriation). The request continued a long-standing trend of humanitarian budget requests being significantly smaller than prior-year enacted funding levels, at times reflecting the fact that humanitarian assistance funds may be carried over from year to year and unobligated balances from prior years may still be available ( Figure 3 ). The Administration's budget justification asserted that \"when combined with all available resources, average funding available for 2019 and 2020 roughly matches the highest-ever level of U.S. overseas humanitarian programming, and is sufficient to address needs for Syria, Yemen, and other crisis areas.\" For FY2020, as noted earlier, the budget proposed to fund all humanitarian assistance through a new, single global International Humanitarian Assistance (IHA) account. IHA would have been managed by the newly consolidated Humanitarian Assistance Bureau at USAID, but with a \"senior dual-hat leader\" under the policy authority of the Secretary of State reporting to both the Secretary of State and the USAID Administrator. The proposal would have effectively moved the administration of refugee and migration assistance funding from State to USAID. The State Department would have retained approximately 10% of MRA funding to support refugee diplomacy and administrative expenses, costs associated with resettlement of refugees in the United States, and support for refugee resettlement in Israel. Within USAID, the proposal would also have eliminated the Food for Peace Act, Title II funding currently appropriated through the agriculture appropriation but administered by USAID. The Administration previously proposed this in FY2018 and FY2019, citing inefficiency and the ability to provide food assistance through other accounts. Under the proposed plan, emergency food assistance would also have been funded through the IHA account. H.R. 2740 , as passed, would have provided $7.97 billion in foreign operations humanitarian assistance, a 2% increase over FY2019 funding and about 26% more than requested. Funding was provided through the traditional accounts (IDA, MRA and ERMA) rather than the proposed IHA account. An additional $1.85 billion was included in the Senate committee-passed agriculture appropriation, H.R. 3164 , for Food for Peace. S. 2583 included $7.82 billion for foreign operations through the traditional account structure. The Senate committee-passed agriculture appropriation, S. 2522 , included $1.716 billion for Food for Peace, for a humanitarian aid total of $9.53 billion, almost level with FY2019-enacted funding. The enacted omnibus legislation maintained both the account structure and funding levels for humanitarian assistance. P.L. 116-94 included a total of $9.55 billion for humanitarian assistance in the SFOPS ($7.83 billion) and Agriculture ($1.725 billion) divisions, a 0.2% increase over FY2019 funding, with slight increases to the IDA and Food for Peace accounts. COVID-19 supplemental appropriations enacted in March 2020 made additional humanitarian assistance available to prevent, prepare for and respond to the pandemic. P.L. 116-123 added $300 million to the IDA account and P.L. 116-136 added an additional $258 million for IDA and $350 million for MRA, bringing the enacted humanitarian assistance total to $10.46 billion ($8.74 billion in SFOPS), or about 10% more than the enacted FY2019 funding. The FY2020 request for military and security assistance was $7.415 billion, a 19% cut from FY2019 enacted levels. Reductions were proposed for every account ( Figure 4 ). As is typical, the bulk of security assistance requested by the Administration (67%) would have been Foreign Military Financing (FMF) aid to Israel ($3.3 billion), Egypt ($1.3 billion), and Jordan ($350 million). As in FY2018 and FY2019, the Administration's FY2020 request sought authority to provide FMF assistance through a combination of grants and loans, including loan guarantees, rather than the current use of FMF on an almost exclusive grant basis. The Administration asserted that loan authority would enable partners to purchase more U.S.-made defense equipment and promote burden sharing in security cooperation activities. FY2020 International Narcotics Control and Law Enforcement (INCLE) funding would have decreased by 37%, with a notable increase requested for Colombia ($209 million from $143 million in FY2018) and decrease for Afghanistan ($95 million, down from $160 million in FY2018). The House legislation, H.R. 2740 , included $11.21 billion for security assistance, an almost 23% increase over the FY2019 funding level and a more than 50% increase over the Administration request. The difference was almost entirely due to the House bill including the Economic Support Fund account under security assistance rather than bilateral economic assistance. Excluding ESF funds, security assistance in the bill would have been reduced about 1% from FY2019 funding. The Senate committee bill, S. 2483 , included the traditional accounts under the security assistance heading and provided a total of $9.11 billion, on par with FY2019 funding. However, within that total INCLE funding would have decreased by 9% and NADR funding would have increased by 11% compared to FY2019. P.L. 116-96 provided $9.014 billion in security assistance accounts, a reduction of about 1.5% from FY2019 funding, keeping the FY2019 account structure. Funding was reduced from the FY2019 level for the INCLE, PKO and FMF accounts (-7.1%, -6.4%, and -0.6%, respectively), while NADR and IMET funding increased (+3.6% and +1.9%, respectively). In addition to proposed cuts to global health and humanitarian assistance, the FY2020 budget request would have reduced funding from the previous year's enacted levels for almost all development sectors. Programs to counter trafficking in persons would have been cut the least, 25%, while activities related to environmental protection, microenterprise, water and sanitation, and education would have been cut by more than 60%. Democracy promotion and food security funding would have been reduced by about half. One exception to the proposed sector cuts was gender equality funding, which would have increased by about 80%, driven by the Women's Global Development and Prosperity Initiative (WGDP), rolled out by Ivanka Trump in February 2019, for which the budget request included $100 million ( Table 8 ). The House legislation, H.R. 2740 , recommended development sector allocations similar to those enacted for FY2019, with the exception of environment programs, for which the allocation would have increased by 77%. In addition to the funding allocation, the environmental programs section also specified that funding may be used to support the U.N. Framework Convention on Climate Change (Paris Agreement) and that none of the funds in the act, or in prior SFOPS appropriations acts, may be used to withdraw from the Paris Agreement. The report accompanying the legislation ( H.Rept. 116-78 ) called for the USAID Administrator to provide a detailed implementation plan of the WGDP to Congress, including focus countries and planned metrics, within 90 days of enactment. Sector allocations in the Senate committee bill, S. 2483 , would have increased funding for democracy and environment programs relative to the FY2019 funding (+17% and +90%) and the House bill (+17% and +7%, respectively), while providing fewer funds for education and gender equality programs than both the FY2019 legislation (-28% and -25%) and the House bill (-30% and -35%). Senate committee allocation in all sectors, with the exception of gender equality (-59%), would have been higher than the Administration requested for FY2020. P.L. 116-94 included sector allocations more similar to the FY2019 legislation than to the Administration's request. As in the House and Senate bills, the enacted legislation significantly increased environment sector funding compared to FY2019 (+81%). Funding for education (+7.2%), water and sanitation (+3.4%) and gender equality (+53.5%) also increased compared to FY2019, though the gender equality funding total included \"up to\" $100 million for the WGDP, creating potential for a significantly lower allocation. Top aid recipients under the request, consistent with recent years, would have been allies in the Near East who receive the bulk of military aid, including Israel and Egypt; strategically significant development partners such as Jordan and Afghanistan; and several global health focus countries in Africa ( Table 9 ). Notable reductions in aid were proposed for South Africa (-171%) and West Bank/Gaza (-43%). The Near East and Africa would have continued to be the top regional aid recipients under the request, together comprising more than 75% of aid allocated by country or region ( Figure 5 ).The FY2020 request emphasized large increases for the Indo-Pacific and Europe and Eurasia regions relative to the FY2019 request, as part of the emphasis on countering Chinese and Russian influence. However, the requested funding for East Asia and the Pacific was 14% less, and the South and Central Asia request almost 17% less, than the FY2018 allocations for those regions (FY2019 country and regional allocations are not yet available). Aid to Europe and Eurasia would have been reduced by 54%, and aid to sub-Saharan Africa by 35%. Aid to the Western Hemisphere would decrease by 30%, though the FY2020 budget request sought authority to transfer $500 million in aid from unspecified accounts as necessary to meet needs related to the crisis in Venezuela. The MENA region would have seen the smallest proportionate cuts under the request, about 8%, and increased its share of regionally allocated aid from 36% to 44%. These country and regional allocations do not include the nearly $6 billion requested for humanitarian assistance. Humanitarian assistance is not requested by country and could significantly change country and regional aid totals once allocated. Nor do they include nonhumanitarian supplemental funds appropriated for COVID-19 response, which were not appropriated by country or region. The House legislation and report, H.R. 2740 / H.Rept. 116-78 , did not provide comprehensive country and regional allocations, but did specify aid levels for several countries and regions, including $3.305 billion for Israel, $1.403 billion for Egypt, $1.525 billion for Jordan, $457 million for Colombia, $160 million to support the Indo-Pacific Strategy, $541 million designated for Central America as a region, and $280 million for the Countering Russian Influence Fund. S. 2583 / S. 126 also did not provide comprehensive allocations by country, but did specify many such aid levels, including $3.305 billion for Israel, $1.432 billion for Egypt, $1.650 billion for Jordan, $448 million for Ukraine, $403 million for Colombia, $322 million for Afghanistan, and $453.6 million for Iraq. The bill and report also included a total of $515 million for Central America as a region, $285 million for the Countering Russian Influence Fund, $375 million for a new Countering Chinese Influence Fund, and $200 million for the Relief and Recovery Fund to assist areas formerly controlled by ISIS. P.L. 116-94 and the accompanying explanatory statement include detailed funding directives for many countries and regional programs. Among the largest allocations are $3.305 billion for Israel, $1.525 billion for Jordan, $1.432 billion for Egypt, $448 million each for Ukraine and Colombia, and $452 million for Iraq. Major allocations for regional activities include $1.482 billion to support the Indo-Pacific Strategy and the Asia Reassurance Initiative Act of 2018 ( P.L. 115-409 ), $300 million for the Countering Chinese Influence Fund, $520 million for Central America (and a directive that funds appropriated for Central America in FY2019 be made available), and $290 million to carry out the purposes of the Countering Russian Influence Fund. Appendix A. SFOPS Funding, by Account Appendix B. International Affairs Budget The International Affairs budget, or Function 150, includes funding that is not in the Department of State, Foreign Operations, and Related Programs appropriation: foreign food aid programs (P.L. 480 Title II Food for Peace and McGovern-Dole International Food for Education and Child Nutrition programs) are in the Agriculture Appropriations, and the Foreign Claim Settlement Commission and the International Trade Commission are in the Commerce, Justice, Science appropriations. In addition, the Department of State, Foreign Operations, and Related Programs appropriation measure includes funding for certain international commissions that are not part of the International Affairs Function 150 account. Appendix C. SFOPS Organization Chart", "summary": "Each year, Congress considers 12 distinct appropriations measures, including one for the Department of State, Foreign Operations, and Related Programs (SFOPS), which includes funding for U.S. diplomatic activities, cultural exchanges, development and security assistance, and U.S. participation in multilateral organizations, among other international activities. On March 11, 2019, the Trump Administration submitted to Congress its SFOPS budget proposal for FY2020, which totaled $42.72 billion in discretionary funds ($42.88 billion when $158.9 million in mandatory retirement funds are included), reflecting adherence to discretionary funding caps, as determined by the Budget Control Act of 2011 (BCA; P.L. 112-25 ). The initial FY2020 request would have represented a 2.5% increase in SFOPS when compared to the FY2019 request but a 21% decrease in SFOPS funding when compared to the FY2019 enacted funding levels. Within these totals, Department of State and Related Agency funding would have been reduced by 15.7%, with the greatest cuts to the Educational and Cultural Exchange Programs (56%), International Organizations (26%), and the U.S. Agency for Global Media (22%) accounts. The Foreign Operations accounts would have seen a reduction of 23.5%, with the greatest cuts to the non-health development assistance (39%), humanitarian assistance (34%), and global health (28%) sectors. On May 16, 2019 the House Appropriations Committee agreed to its SFOPS measure ( H.R. 2839 ) that would have provided $56.54 billion in total spending ($56.39 billion in discretionary spending). The bill included either level or increased funding in nearly all accounts compared to FY2019. It did not include the President's proposal to consolidate spending into the proposed Economic Support and Development Fund (ESDF) and International Humanitarian Assistance (IHA) accounts, and moved the Economic Support Fund (ESF) account from Title III (Bilateral Economic Assistance) into Title IV (International Security Assistance) to make clear the committee's desire to keep ESF distinct from the Development Assistance (DA) account. Finally, the bill would have provided funds to make operational the new U.S. International Development Finance Corporation (pursuant to the BUILD Act of 2018; P.L. 115-254 ). On June 19, 2019, the House passed the FY2020 SFOPS legislation in a \"minibus\" measure that included three other appropriations billsâLabor, Health and Human Services, Education; Defense; and Energy and Water Development ( H.R. 2740 ). While the topline funding level remained the same, some monies were shifted among the various accounts due to adopted amendments. On September 26, 2019, the Senate Appropriations Committee approved its SFOPS measure for FY2020, S. 2583 , which would have provided $55.16 billion in total new funding ($54.377 billion net, after proposed rescission of $316 million of prior-year funds). Much like the House measure, the bill included level or increased funding for most accounts compared to FY2019 and did not include the President's proposals to consolidate spending into the ESDF and IHA accounts. However, unlike the House bill, the Senate committee measure kept ESF in Title III (Bilateral Economic Assistance), consistent with prior year appropriations. FY2020 began with all appropriations bills unfinished. Congress and the President approved two continuing resolutions to fund federal agencies through November 21, 2019 ( P.L. 116-59 ) and December 20, 2019 ( P.L. 116-69 ), respectively, at the FY2019 funding level. On December 20, 2019, Congress passed, and the President later signed, two consolidated appropriations bills ( P.L. 116-93 and P.L. 116-94 ). SFOPS funding was included as Division G of P.L. 116-94 , Further Consolidated Appropriations Act, 2020. The measure included $54.84 billion for SFOPS accounts in FY2020, a nearly 1% increase from the FY2019-enacted level and approximately 28% more than the Administration's request. Of that enacted total, $8.0 billion, or approximately 15% was designated as Overseas Contingency Operations (OCO). In March 2020, in response to the global spread of a novel coronavirus, COVID-19, Congress enacted three supplemental appropriations acts: the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 , signed into law March 6), the Family First Coronavirus Response Act ( P.L. 116-126 , signed into law March 18), and the Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 , signed into law March 27). P.L. 116-123 included $1.25 billion in SFOPS accounts to prevent, prepare for, and respond to the virus, and the CARES Act added an additional $1.115 billion in SFOPS funds for this purpose. P.L. 116-127 did not include funds for SFOPS accounts. The Administration also amended its FY2020 budget request in a March 17 letter to Congress, requesting an additional $220 million in emergency SFOPS funds for COVID-19 response. With supplemental funds, total enacted SFOPS funding for FY2020 was $57.21 billion (after rescissions), a 5.2% increase over the FY2019-enacted level. This report provides an account-by-account comparison of the FY2020 SFOPS request (including the supplemental request), House and Senate SFOPS legislation, and the final FY2020 SFOPS appropriation (including supplemental appropriations) to FY2019 funding in Appendix A . The International Affairs (function 150) budget in Appendix B provides a similar comparison. This report will not be updated further unless there is renewed congressional activity on FY2020 appropriations.", "document_type": "crs"}
{"report": "The U.S. Election Assistance Commission (EAC) is an independent federal agency charged with helping improve the administration of federal elections. It was established by the Help America Vote Act of 2002 (HAVA; P.L. 107-252 ; 116 Stat. 1666; 52 U.S.C. Â§Â§20901-21145) as part of Congress's response to administrative issues with the 2000 elections. The EACâand the legislation that created itâmarked a shift in the federal approach to election administration. Congress had set requirements for the conduct of elections before HAVA, but HAVA was the first federal election administration legislation also to back its requirements with substantial federal support. In addition to setting new types of requirements, it provided federal funding to help states meet those requirements and facilitate other improvements to election administration and created a dedicated federal agencyâthe EACâto manage election administration funding and collect and share election administration information. There was broad support in Congress during the HAVA debate for the idea of providing some assistance along these lines. Both at the time and since, however, opinions have differed about exactly what kind of assistance to provide and for how long. Members have disagreed about whether the EAC should be temporary or permanent, for example, and about whatâif anyâregulatory authority it should have. Changes in the election administration landscape and in Congress have brought different aspects of the debate to the forefront at various times. The 112 th Congress saw the start of legislative efforts in the House to limit or eliminate the EAC, for example, while the agency's participation in the federal response to attempted foreign interference in the 2016 elections has been cited as new grounds to extend or expand it. This report provides an introduction to the EAC in the context of such developments. It starts with an overview of the EAC's duties, structure, and operational funding, and then summarizes the history of the EAC and legislative activity related to the agency. The report closes with some considerations that may be of interest to Congress as it conducts oversight of the EAC and weighs whether or how to take legislative action on either the agency or election administration more broadly. HAVA defines \"states\" as the 50 states, the District of Columbia, American Samoa, Guam, Puerto Rico, and the U.S. Virgin Islands. This report takes a similar approach. Except where context makes clear that another meaning is intended, such as in references to \"the 50 states,\" \"state\" is intended to include U.S. territories and the District of Columbia. \"Election Assistance Commission\" and \"EAC\" are used by some to refer to the four-member commission that is part of the agency. To avoid confusion, this report reserves those terms for the agency as a whole and uses \"commission\" for the four-member commission. The EAC was created by HAVA, Congress's primary legislative response to problems with the administration of the 2000 elections. Issues with the vote count in Florida delayed the results of the 2000 presidential race for weeks. Subsequent investigations revealed widespread problems with states' conduct of elections. They also generated recommendations about how to prevent similar problems in the future, including via more expansive federal partnerships with states and localities. Exactly what those partnerships should look like was a matter of debate. There was broad agreement that they should involve some federal assistance to states and localities. Proposals from Members on both sides of the aisle and in both chambers of Congress included federal funding for improvements to election administration and federal guidance on voting system standards, for example. Members disagreed, however, about other features of the partnerships. These disagreements were rooted in part in competing concerns. Some Members were concerned that certain types of federal involvement would shift the balance of election administration authority from states and localities, which have traditionally had primary responsibility for administering elections, to the federal government. Others worried that states and localities would notâor could notâmake necessary changes to their election systems without federal intervention. Disagreements about the federal government's role in election administration played out in at least two discussions that were relevant to the EAC: (1) whether new federal election administration responsibilities should be assumed by extant federal entities like the Federal Election Commission's (FEC's) Office of Election Administration (OEA) or an entirely new agency; and (2) whether the new responsibilities should be focused solely on supporting states and localities or should also include more expansive authority to compel states and localities to act. The EAC, like HAVA as a whole, was a compromise. It was a new agency, but its role was envisioned primarily as a support role. As one of the primary architects of HAVA, Representative Robert Ney, noted in the markup of the 2001 version of the bill, [T]he name that we did choose, by the way, for this Commission is not an accident. The purpose of this Commission is to assist State and local governments with their election administration problems, basically taking the attitude we are the government, we are here to help. Its purpose is not to dictate solutions or hand down bureaucratic mandates. The following subsections provide an overview of the agency that emerged as a compromise from HAVA. They describe the EAC's duties, structure, and operational funding. Consistent with the positioning of the EAC as a support agency, HAVA strictly limits the agency's power to compel action by states and localities. Responsibility for enforcing HAVA's national election administration requirements is assigned by the act to the U.S. Department of Justice (DOJ) and state-based administrative complaint procedures rather than to the EAC. Decisions about exactly how to comply with those requirements are reserved to the states. And EAC rulemaking is explicitly restricted to regulations for the voter registration reports and federal mail voter registration form required by the National Voter Registration Act of 1993 (NVRA; P.L. 103-31 ; 107 Stat. 77). Those limits do not mean the agency has no ability to influence state or local action. The EAC can trigger DOJ investigations of suspected violations of federal election law, for example, and revoke voting system certifications and testing lab accreditations. The agency can audit its grantees and specify how they should address issues identified by the audits. Its voting system testing and certification program can be binding on states that chooseâas some states haveâto make some or all of it mandatory under state law. Its voluntary guidance, while nonbinding, could be used by other agencies to inform HAVA enforcement. However, the EAC's duties are primarily envisioned by HAVAâand have primarily functionedâas support tasks. They fall into two general categories: (1) administration of funding and (2) collection and sharing of information. The EAC is responsible for administering federal funding for improvements to election administration, including most of the grant and payment programs authorized by HAVA and an election data collection grant program that was authorized and funded by the FY2008 Consolidated Appropriations Act ( P.L. 110-161 ). Congress appropriated $380 million for payments to states under HAVA in FY2018 ( P.L. 115-141 ), following reports of attempted foreign interference in the 2016 elections. Prior to those appropriations, funding was last provided for EAC-administered grants and payments in FY2010 (see Table 1 for details). The EAC's administrative responsibilities typically extend past the fiscal year for which funding is appropriated. Much of the funding it administers has been provided as multiyear or no-year funds, and it performs ongoing funding maintenance tasks, such as providing technical assistance to funding recipients and issuing advisory opinions about proposed uses of funds. Through its Office of Inspector General (OIG), the EAC also audits grantees to confirm that they are meeting funding conditions, such as matching-fund and maintenance-of-effort requirements, and using funds as intended. HAVA folded the FEC's OEA into the EAC, transferring its staff, duties, and funding to the new agency. The OEA had performed a clearinghouse function at the FEC. That function was first established by the Federal Election Campaign Act of 1971 (P.L. 92-225; 86 Stat. 3) at the General Accounting Office (now called the Government Accountability Office [GAO]), as a source of election administration research and a forum for sharing election administration information. The function was transferred to the FEC when that agency was created in 1975 ( P.L. 93-443 ; 88 Stat. 1263). The mandate expanded at the FEC to include creating and updating voluntary federal standards for voting systems and, following the enactment of the NVRA in 1993, producing a biennial voter registration report and developing and maintaining a federal mail voter registration form. These information collection and sharing functions have carried over toâand undergone further expansion atâthe EAC. The following subsections describe the EAC's information collection and sharing duties. Like its clearinghouse predecessors at GAO and the FEC, the EAC conducts election administration research and provides opportunities for election administration stakeholders to share their experience and expertise. Some of the work the EAC does as part of its research function is mandated specifically. The Election and Voting Survey (EAVS) it produces after each regular federal general election, for example, includes an NVRA-mandated voter registration report and reporting on military and overseas voting that is required by UOCAVA. The EAC was also directed by HAVA to conduct studies of military and overseas voting; voting system usability and accessibility; HAVA's voter identification requirement; use of Social Security information for voter verification; use of the internet in electoral processes; and postage-free absentee voting. The EAC also has considerable latitude to conduct other election administration research. It has issued a number of reports under this authority, including studies of rural versus urban election administration, alternative voting methods, and voter fraud and intimidation. The EAC has also released products that are specifically geared toward practitioners, such as a series of Quick Start Guides for election managers. The EAC facilitates information exchanges among election administration stakeholders in multiple ways, from publishing state and local best practices and requests for proposals to convening meetings and hosting roundtables and summits. One particularly high-profile example of the EAC's coordination work is its participation in the federal response to reports of attempted foreign interference in the 2016 elections. For more on that work, see the \" The Agency's Role in Federal Election Security Efforts \" section of this report. The FEC adopted the first voluntary federal voting system standards (VSS) in 1990 and updated them in 2002. The National Association of State Election Directors (NASED), a professional organization for state election directors, established a program to accredit labs to test voting systems to the VSS and certify systems as meeting the standards. When the EAC was created, it inherited enhanced versions of the FEC's and NASED's voting system guidelines, testing, and certification responsibilities. The VSS were replaced at the EAC by Voluntary Voting System Guidelines (VVSG), which were called \"guidelines\" to distinguish them from the mandatory voting systems standards included among HAVA's national election administration requirements. One of the EAC's advisory bodies, the Technical Guidelines Development Committee (TGDC), is charged with drafting the VVSG. The draft guidelines are made available to the public, the agency's executive director, and the EAC's other two advisory bodies, the Board of Advisors and the Standards Board, for review and comment before they are submitted to the commissioners for a vote on adoption. The commissioners are also responsible for accrediting laboratories to test voting systems to the VVSG and revoking lab accreditations; certifying, decertifying, and recertifying systems as meeting the VVSG; and issuing advisories to help voting system manufacturers and testing labs interpret the VVSG. The National Institute of Standards and Technology (NIST), which provides the TGDC with technical support on request and whose Director chairs the TGDC, is charged with monitoring voting system testing labs and making recommendations to the commission about lab accreditations and accreditation revocations. The VVSG were first adopted in 2005 and updated in 2015. The 2005 version updated and expanded the 2002 VSS to account for technological advances and to increase security and accessibility requirements. The 2015 iteration aimed to update outdated portions of the 2005 VVSG and increase the guidelines' testability. As of May 2019, the EAC was working on a second update (VVSG 2.0). Unlike previous versions of the VVSG, which were presented as device-specific recommendations, VVSG 2.0 separates higher-level principles and guidelines from technical details. The main document, which was released for public comment on February 28, 2019, sets out function-based principles, such as auditability, and guidelines, such as capacity to support efficient audits and resilience against intentional tampering. Supplementary documents are expected to provide the technical specifications required to help voting system manufacturers to implementâand voting system testing labs to test whether systems meetâthe higher-level principles and guidelines. States are not required by federal law to adhere to the VVSG, but some have made the guidelines mandatory under their own state laws. States may also adopt other parts of the federal voting system testing and certification program. For example, they may choose to require voting systems to be tested by a federally accredited lab. HAVA set new national election administration requirementsâsuch as certain standards for voting systems and requirements to offer provisional voting, post sample ballots at the polls on Election Day, and create and maintain a computerized statewide voter registration list âand charged the EAC with adopting voluntary guidance about how to meet them. This voluntary guidance is intended to offer specifics about how to implement HAVA's general mandates. The EAC's guidance on statewide voter registration lists, for example, indicates that either a \"top-down\" system, in which a centrally located voter registration database is connected to local terminals, or a \"bottom-up\" system, in which information from locally hosted databases is used to update a central list, is acceptable under the law. As indicated by the name, this guidance is voluntary; states and localities can choose whether or not to adopt it. As noted above, however, the voluntary guidance the EAC issues could be used by other agencies to inform HAVA enforcement. The EAC includes a four-member commission, a professional staff led by an executive director and general counsel, an OIG, and three advisory bodies: the Board of Advisors, the Standards Board, and the TGDC. Its primary oversight committees are the House Committee on House Administration and the Senate Committee on Rules and Administration. The components of the EAC are described in more detail in the subsections below. The structure of the EAC was informed by at least three objectives: State and Local Partnership . The EAC's advisory bodies play a central role in the agency's functioning, and state and local officials or the professional associations that represent them serve on or appoint members to all three bodies. Expert Input . The advisory bodies also feature a wide range of experience and expertise. In addition to state and local officials, members include representatives of voters, scientific and technical specialists, and disability access experts, among others. Bipartisanship . The commission and two of the advisory bodies are designed to be politically balanced, and the commission cannot take certain actions without a three-vote majority of its members. The agency's structure has also had implications for its functioning. For example, the three-vote quorum requirement for commission action has led at times to delays and inactivity. For more on such implications, see the \" Debate About the Permanence of the Agency \" section of this report. The commission is designed to have four members, each of whom is required to have elections experience or expertise and no more than two of whom may be affiliated with the same political party. Candidates for the commission are recommended by the majority or minority leadership of the House or Senate and appointed by the President subject to the advice and consent of the Senate. Commissioners are appointed to four-year terms on staggered two-year cycles. They may be reappointed to up to one additional term and may continue to serve on \"holdover\" status after their terms expire, pending appointment of a successor. Two commissioners representing different political parties are chosen by the commission membership each year to serve one-year terms as chair and vice chair. Certain actions by the commission require a three-vote majority of its members. According to an organizational management document adopted by the commission in February 2015, the commission is responsible for setting EAC policy. Among the actions that require a policymaking quorum of the EAC's commissioners are adopting voluntary guidance and the VVSG, appointing an executive director or general counsel, and promulgating regulations for the NVRA-mandated voter registration reports and federal mail voter registration form. The EAC has two statutory officersâan executive director and a general counselâwho are appointed by the commission. Both serve four-year terms and are eligible for reappointment. HAVA grants the executive director the authority to hire other professional staff (see Figure 1 for an organizational chart of the agency as of 2019). As a matter of policy, the executive director is also responsible for the day-to-day operations of the agency, including preparing policy recommendations for consideration by the commissioners, implementing adopted policies, and handling administrative affairs. The size of the EAC's staff has varied, from the four commissioners and handful of OEA transfers in FY2004 to 50 full-time equivalent staff (FTEs) in FY2010 and around 30 FTEs since FY2015. The number of FTEs the agency could maintain was capped at 22 in FY2005 and 23 in FY2006. The cap was lifted in FY2007 and, as of May 2019, had not been reinstated. HAVA created three advisory bodies for the EAC: the Board of Advisors, the Standards Board, and the TGDC. The three bodiesâwhose members represent a variety of agencies, associations, organizations, and interestsâplay important roles in the agency's functioning. The following subsections describe their structures and responsibilities. The EAC's Board of Advisors and its Standards Board review voluntary guidance and the VVSG before they are presented to the commissioners for a vote on adoption. In the event of a vacancy for executive director of the EAC, each of the boards is directed by HAVA to appoint a search committee for the position, and the commission is required to consider the candidates the search committees recommend. The commission is also directed to consult with the two boards on research efforts, program goals, and long-term planning; and the National Institute of Standards and Technology (NIST) must consult with the boards on its monitoring and review of voting system testing labs. The Board of Advisors was initially assigned 37 members, but its membership dropped to 35 with the 2016 merger of two of the organizations responsible for appointing its members. Sixteen members of the board are appointed by organizations that represent state and local officials, and seven represent federal entities. Four members are science and technology professionals, who are each appointed by the majority or minority leadership of the House or Senate. The remaining eight are voter representatives, two of whom are appointed by each of the chairs and ranking members of the EAC's two primary oversight committees. The overall membership of the board is intended to be bipartisan and geographically representative. The Standards Board has 110 members. They include two representatives of each of the U.S. jurisdictions that are eligible for HAVA's formula-based payments: the 50 states, the District of Columbia, American Samoa, Guam, Puerto Rico, and the U.S. Virgin Islands. Each pair of representatives consists of one state election official and one local election official who are not affiliated with the same political party. The Standards Board chooses nine of its members to serve two-year terms on its Executive Board. Executive Board members may serve no more than three consecutive terms, and no more than five Executive Board members may be either state officials, local officials, or members of the same political party. The 15-member TGDC is charged with helping the executive director of the EAC develop and maintain the VVSG. The Director of NIST serves as the chair of the committee and, in consultation with the commission, appoints its other 14 members. Appointees to the TGDC must include an equal number of members of the Board of Advisors, Standards Board, and Architectural and Transportation Barriers Compliance Board (Access Board); one representative of each of the American National Standards Institute (ANSI) and the Institute of Electrical and Electronics Engineers (IEEE); two NASED representatives who are chosen by the organization and neither share a political party nor serve on the Board of Advisors or Standards Board; and other individuals with voting system-related scientific or technical expertise. The EAC is required to have an OIG under HAVA and the Inspector General Act of 1978, as amended ( P.L. 95-452 ; 92 Stat. 1101). As noted in the \" Administration of Funding \" section of this report, the EAC's OIG oversees audits of the use of HAVA funding and refers issues identified in audits to EAC management for resolution and, if necessary, corrective action. In one instance, for example, the OIG determined that a HAVA grantee could not document its grant costs, and the EAC put the organization on a payment plan to return the funds. In another case, some of a state's spending was found to be impermissible and some was found to be inadequately documented. The state was directed to repay the former funding to the U.S. Treasury and the latter to its HAVA state election fund. The OIG also oversees internal audits and investigations of the EAC. This work includes regular audits of the EAC's finances and compliance with federal laws, such as the Federal Information Security Management Act of 2002 ( P.L. 107-347 ; 116 Stat. 2899), and reports on management challenges facing the agency. It also includes special audits and investigations in response to complaints about fraud, waste, mismanagement, or abuse at the EAC, such as a 2008 investigation of allegations of political bias in the agency's preparation of a voter fraud and intimidation report and a 2010 investigation of complaints about its work environment. The EAC has received operational funding for salaries and expenses, including for its OIG, in addition to the funding it has received for the grants and payments it administers and for transfers to NIST for HAVA-related activities like monitoring voting system testing labs. EAC appropriations have been under the jurisdiction of the Financial Services and General Government (FSGG) Subcommittees of the House and Senate Appropriations Committees since those subcommittees were created in 2007. HAVA explicitly authorized up to $10 million in operational funding for the EAC in each of FY2003, FY2004, and FY2005. Congress appropriated significantly less than the authorized ceiling in the first two fiscal years: $2 million in FY2003 ( P.L. 108-7 ) and $1.2 million, plus approximately $500,000 transferred from the OEA, in FY2004 ( P.L. 108-7 ; P.L. 108-199 ). The House Appropriations Committee also recommended significant cuts to the President's budget request for the agency from FY2012 through FY2018, although the enacted bills hewed more closely to presidential and Senate proposals. For more on those cases, see the \" Setting up the Agency \" section of this report and Table 2 , respectively. Congress appropriated $10.8 million for EAC salaries and expenses in the final year for which operational funding was explicitly authorized for the agency, FY2005 ( P.L. 108-447 ). Although the explicit authorization of appropriations for EAC operations only ran through FY2005, the agency has continued to receive operational funding in subsequent years pursuant to its enabling legislation (see Table 2 for details). Some Members have proposed explicitly reauthorizing appropriations for EAC operations, although none of the proposals had been enacted as of May 2019. For more on such proposals, see the \" Proposals That Engage the Existing Role of the EAC \" section of this report. It took some time for the EAC to become operational. HAVA called for members to be appointed to the agency's commission within 120 days of the act's enactment (on October 29, 2002), but the first four commissioners did not take office for more than a year. Without commissioners, the agency drew limited appropriations, and the lack of commissioners and funding led to inactivity and missed deadlines. After nearly a decade of agency operations, the 112 th Congress saw the start of efforts to limit or eliminate the EAC, as some Members of Congress questioned whether there was still a need for the agency. More recentlyâfollowing reports of attempted foreign interference in the 2016 electionsâproponents of the EAC have cited the agency's participation in federal election security efforts as new grounds to preserve it. This section traces the history of the EAC from its origins in the wake of the 2000 elections to its position after the 2016 elections. HAVA called for members to be appointed to the commission by February 26, 2003, but the first four commissioners did not take office until December 13, 2003. The act also explicitly authorized up to $10 million in funding for EAC operations for each of FY2003, FY2004, and FY2005. With no commissioners in place for the first of those fiscal years or the start of the second, Congress appropriated significantly less than that amount in FY2003 and FY2004 ( P.L. 108-7 ; P.L. 108-199 ). In a 2004 oversight hearing on the EAC, some Members of Congress expressed concern that the limited early funding and delays in establishing the EAC had affected the agency's ability to perform its duties. One Member referred, for example, to missed deadlines for adopting voluntary guidance. As set out in HAVA, the deadlines for the EAC to adopt voluntary guidance for meeting the act's requirements preceded the deadlines for states to start meeting them. In theory, that would have given states the chance to review the agency's guidance before they finalized action on the requirements. In practice, the commissioners took office nearly a month-and-a-half after the first guidance was due and less than three weeks before states were supposed to have started meeting requirements. Some of the deadlines for conducting statutorily mandated research had also passed before the commissioners were sworn in, and some commissioners testified that the early issues had caused them to limit the scope of their ambitions for other projects. \"We are unable to do anything more than â¦ really recite anecdotal things that we have heard as opposed to giving research-based guidance to States on how to implement\" certain election measures, then-Commissioner Ray Martinez said about the commission's ongoing guidance work, for example. He added, \"That is a critical point. We just don't have the means at this point to do anything other than how we are going about it, which I think is a very responsible and the best possible way that we can, but it is within the context of some very severely limited funds.\" Some aspects of HAVA, such as the provision for reappointment of EAC commissioners to a second four-year term and the absence of a sunset provision for the agency, are consistent with a vision of the EAC as a continuing agency. Others, such as explicitly authorizing only three years of operational funding, suggest something more temporary. That has left room for debate about how long-lasting the EAC should be. Some have viewed its proper role as permanent. At various points in the HAVA debate, for example, Members of the Senate characterized the agency as permanent. Other Members of Congress have highlighted benefits of ongoing EAC responsibilities like updating the VVSG, conducting the EAVS, and providing technical and other assistance to the states. They have argued that the tasks the EAC performs are essential and could not be carried out as effectivelyâor much more cost-effectivelyâby other agencies. Other Members have seen the agency as temporary. As of the beginning of the 112 th Congress, the EAC had distributed much of the funding it was authorized by HAVA to administer and completed a number of the studies HAVA directed it to conduct. The National Association of Secretaries of State had recently renewed a resolutionâfirst adopted in 2005 and subsequently to be approved again in 2015âthat called for the agency's elimination. The EAC's inspector general reported ongoing issues with the agency's performance management, information security, work environment, records management, and overhead expenses. Such factors were cited by some as evidence that the agency had outlived its usefulness. Bills were introduced to terminate the EAC, and the House Appropriations Committee recommended cutting or eliminating its operational funding. For more on those activities, see the \" Proposals to Terminate the EAC \" section of this report and Table 2 , respectively. The Senate also stopped confirmingâand some congressional leaders stopped recommending ânominees to the EAC. The commission lost the numbers required for a policymaking quorum in December 2010 and both of its remaining members in December 2011 (see Figure 2 for details). The Senate, some of whose Members cited opposition to the ongoing existence of the agency rather than to individual nominees, did not confirm any new commissioners until December 2014. Without the numbers for a policymaking quorum, the commission could not take official action. One notable consequence was that it could not update the VVSG. The creation of the EAC was, in part, a response to the FEC's handling of the VSS. The committee report on legislation containing a precursor to the VVSG provisions of HAVA, for example, cited the FEC's failure to keep the VSS up to date. The lack of numbers for a quorum between December 2011 and the swearing-in of the newly confirmed commissioners in January 2015, however, left an almost 10-year gap between the EAC's initial adoption of the VVSG in 2005 and its first update in 2015. The U.S. Intelligence Community reported in 2016 that foreign entities had attempted to interfere with that year's elections. The U.S. Department of Homeland Security (DHS) responded in January 2017 by designating election systems as critical infrastructure, and Congress responded in March 2018 by appropriating $380 million for payments to states that, it indicated in an accompanying explanatory statement, it intended to be used for enhancing election technology and improving election security (see Table 1 for details). The EAC has participated in both responses. First, it was charged with administering the new payments to states ( P.L. 115-141 ). Second, it helped set upâand, in some cases, serves as a member ofâthe special channels for sharing threat information and facilitating sector and subsector coordination that came with the critical infrastructure designation. Those channels include the Election Infrastructure Subsector's Government Coordinating Council and Executive Committee, Sector Coordinating Council, and Elections Infrastructure Information Sharing and Analysis Center. The EAC has also focused on election security in some of its other work. It has provided information technology management trainings for election officials, for example, and produced election security and critical infrastructure resources for voters. Supporters of a permanent role for the EAC have pointed to its participation in the federal government's election security efforts as a new reason to keep the agency. Other Members have also indicated that they see a longer-term role for the agency in light of the 2016 elections. For example, the House Appropriations Committee proposed increasing the EAC's operational funding above the President's budget request in FY2019 after seven years of recommending substantial cuts (see Table 2 for details). The EAC has continued to be a subject of legislative activity since its creation by HAVA. It has been part of the appropriations process, receiving operational funding each fiscal year. For more on appropriations activity on the EAC, see the \" Operational Funding \" section of this report. It has also featured in a range of authorizing legislation. Some post-HAVA authorization bills have tapped into the existing role of the agency, while others have proposed changes to that role. There have also been proposals that focused less on the nature of the role the EAC performs than on how it performs that role. The EAC has traditionally been responsible for managing certain election administration-related funding, adopting guidance for meeting some national election administration requirements, serving as a federal source of election administration expertise, conducting election administration research, and helping connect election administration stakeholders with one another. Members looking for a federal agency to perform such tasksâto administer new grants to states to conduct risk-limiting audits, for example, or to set standards for electronic poll booksâhave often turned to the EAC in their legislative proposals. Members have also proposed explicitly reauthorizing appropriations for EAC operations either permanently or for a set number of years. Table 3 presents selected examples of such bills. The long-standing disagreements about the federal role in election administration that played out in the HAVA debate and in discussions about filling seats on the commission have also played out in post-HAVA legislative proposals. There have been proposals both to expand the EAC's authority and to eliminate the agency entirely. There have also been proposals to eliminate or substantially reduce the agency's funding. For more on proposed funding cuts, see the \" Operational Funding \" and \" Debate About the Permanence of the Agency \" sections of this report. Some post-HAVA legislation has proposed eliminating the EAC. By the beginning of the 112 th Congress, almost a decade had passed since HAVA was enacted. As noted in the \" Debate About the Permanence of the Agency \" section of this report, the EAC was nearing the end of some of the bigger projects it had been assigned by HAVA. And other agencies, such as NIST, were already playing a central role in ongoing EAC responsibilities like the federal voting system testing and certification program. There was a sense among some Members that there was no longer a need for a separate agency to fill the role the EAC had been filling. Combined with concerns about how the agency was being managed, this prompted calls to terminate it. Bills to disband the EAC and transfer duties to other agencies were introduced in each Congress from the 112 th to the 115 th . Other bills have taken the opposite tack, proposing new authority for the EAC. One such approach has been to revisit the limit on EAC rulemaking, proposing lifting it in certain casesâsuch as to permit the agency to promulgate regulations for a proposed new federal write-in absentee ballotâor striking it entirely. Another approach has been to propose giving the agency new powers to direct state or local action, such as imposing penalties for noncompliance with certain national election administration requirements or designating types of evidence that state and local officials may not use as grounds for removing individuals from the voter rolls. Table 4 presents selected examples of proposals to terminate the EAC or to expand its authority. Some post-HAVA legislation on the EAC has focused less on what the agency does and more on how it does it. Bills have been introduced that propose structural changes to the agency, such as adding members to its advisory bodies or creating new advisory boards or task forces, and procedural changes, such as adjusting the payment process for voting system testing, changing how the EAC submits its budget requests, and exempting the agency from certain federal requirements. Such proposals aim to address perceived weaknesses in the way the agency operates. Some proposals may be responses to perceived inefficiencies in current processes, such as delays caused by the commission's quorum requirement or the public comment requirement of the Paperwork Reduction Act of 1980 ( P.L. 96-511 ; 94 Stat. 2812), or to a perceived need for new kinds of experience or expertise at the agency. Other proposals may aim to prevent possible conflicts of interest, such as by eliminating direct payments from vendors to voting system testing labs, or to give Congress more insight into the agency's resource needs, such as by requiring it to submit budget requests to Congress at the same time as it sends them to the President or the Office of Management and Budget. Table 5 presents selected examples of these kinds of structural and procedural proposals. Congress has the authority to conduct oversight of the EAC and to legislate on both the EAC in particular and election administration more generally. In addition to issues raised by previous legislative proposals, such as whether to terminate the agency, the following issues may be of interest to Members as they consider whether or how to undertake such activities or whether to maintain the status quo: Providing for New Expertise . The EAC was structured to ensure input from a range of election administration stakeholders, from voters to technical specialists to accessibility experts. However, new developments, such as new election security threats, might call for experience or expertise not currently represented at the agency. If Congress seeks to assure the EAC access to such experience or expertise, how might it do so? Some possible options include directing the EAC to consult with specialist organizations or agencies, funding specialized professional staff or creating specialized departments within the agency, adding members to one or more of the advisory bodies, and establishing new advisory bodies or task forces. Are there reasons to prefer some of these options over others? For example, the EAC's advisory bodies play a particularly central role in the functioning of the agency. Are there reasons to want certain stakeholders to haveâor not to haveâsuch direct access to EAC actions and decisionmaking? Assigning (and Reassigning) Responsibilities . The EAC is the only federal agency dedicated to election administration as a whole. As such, it is often taken to be the obvious choice to assume federal election administration responsibilities. As noted above, however, some Members have suggested that some of the duties currently in the EAC's portfolio might be better performed by other agencies or in other ways. Are there election administration-related issues about which parts of the federal government other than the EAC might have relevant expertise? For example, the EAC has traditionally been the primary federal repository of election administration best practices, but DHS also provides resources related to election security. Questions might arise, with respect to certain elections-related duties, about which agencyâor combination of agenciesâis best positioned to perform them. More broadly, how might the EAC's and other agencies' comparative advantages guide assignment of new federal election administration responsibilities or reassignment of existing responsibilities? Assessing and Meeting Resource Needs . The EAC has been described variously as both overfunded and underfunded. Developments like the emergence of new election security threats have prompted calls for additional resources for agency operations and for distribution to states via the EAC. How do current levels of funding match up to the agency'sâand its grantees'âresource needs? Are there tools, such as concurrent budget submission or research into appropriate funding levels for HAVA payments, that might help Congress better assess those needs? Are there resources other than funding, such as security clearances for commissioners or professional staff, that the EAC needs and does not currently have? Considering the Role of the Quorum Requirement . The quorum requirement for official action by the commission has led at times to delays and inactivity, such as deferred updates to the VVSG. Does Congress seek to consider ways to reduce the likelihood or frequency of such delays? If so, would it prefer an approach that eliminated the need for a quorum in certain cases, such as by exempting certain actions from the quorum requirement, or one that reduced the likelihood of the commission being without a quorum? Options for the latter approach might include structural changes to the commission, such as adding or removing a seat, or procedural changes to the way commissioners are seated, such as revising the roles of the President and congressional leadership in the candidate selection process. Scheduling EAC Action . HAVA envisioned that the EAC would adopt voluntary guidance about how to meet the act's national election administration requirements before the states actually had to meet them. The idea was to give states the opportunity to review the federal guidance before finalizing their actions on the requirements. Subsequent legislative proposals have similarly called for new national election administration requirements and EAC guidance about how to meet them. How might deadlines be set in such proposals to give the EAC time to research and adopt meaningful guidance and the states time to make best use of it? Are there additional conditions that might need to be setâor support that might need to be providedâto ensure that the deadlines can be met?", "summary": "The U.S. Election Assistance Commission (EAC) is an independent federal agency charged with helping improve the administration of federal elections. It was established by the Help America Vote Act of 2002 (HAVA; P.L. 107-252 ; 116 Stat. 1666; 52 U.S.C. Â§Â§20901-21145) and includes a four-member commission, a professional staff, an inspector general, and three advisory bodies. The EACâand the legislation that created itâmarked a shift in the federal approach to election administration. Congress had set requirements for the conduct of elections before HAVA, but HAVA was the first federal election administration legislation also to back its requirements with substantial federal support. In addition to setting new types of requirements, it provided federal funding to help states meet those requirements and facilitate other improvements to election administration and created a dedicated federal agencyâthe EACâto manage election administration funding and collect and share election administration information. There was broad support in Congress during the HAVA debate for the idea of providing some assistance along these lines. Both at the time and since, however, opinions have differed about exactly what kind of assistance to provide and for how long. Members have disagreed about whether the EAC should be temporary or permanent, for example, and about whatâif anyâregulatory authority it should have. Changes in the election administration landscape and in Congress have brought different aspects of the debate to the forefront at various times. The 112 th Congress saw the start of legislative efforts in the House to limit or eliminate the EAC, for example, while the agency's participation in the federal response to attempted foreign interference in the 2016 elections has been cited as new grounds to extend or expand it. These shifts have been reflected in some cases in legislative activity related to the agency. For example, bills have been introduced to grant the EAC additional authority as well as to eliminate it. Other legislative proposals would leave the fundamental role of the EAC largely as it is but add new versions of its existing responsibilities or change the way it performs those responsibilities. Such proposals would direct the EAC to administer new types of grants, for example, or add new members to its advisory bodies.", "document_type": "crs"}
{"report": "T he manner in which staff are integrated and utilized within an organization may reflect the missions and priorities of that organization. In Congress, staff work for Members of Congress in personal, committee, and leadership offices, and are involved with every facet of congressional activity. Activities might include supporting a Member's representational, legislative, leadership, or administrative responsibilities as they arise in those settings. House and Senate staff activities may be of particular interest as one Congress comes to a close, and another Congress integrates new Members and staff in support of addressing its constitutional and representational responsibilities. Interest in staff issues may also arise when considering committee funding or appropriations for the legislative branch. CRS has several products about congressional staff, listed below, that provide information about staff roles and data over time about the number of staff, pay levels, and time in specific positions in Member office and committee settings. Congressional clients may contact the authors of the individual reports for additional information. CRS Report R43947, House of Representatives Staff Levels in Member, Committee, Leadership, and Other Offices, 1977-2016 , by R. Eric Petersen and Amber Hope Wilhelm. CRS Report R44323, Staff Pay Levels for Selected Positions in House Member Offices, 2001-2018 , coordinated by R. Eric Petersen. CRS Report R44682, Staff Tenure in Selected Positions in House Member Offices, 2006-2016 , by R. Eric Petersen and Sarah J. Eckman. CRS Report R44322, Staff Pay Levels for Selected Positions in House Committees, 2001-2015 , coordinated by R. Eric Petersen. CRS Report R44683, Staff Tenure in Selected Positions in House Committees, 2006-2016 , by R. Eric Petersen and Sarah J. Eckman. CRS Report R43946, Senate Staff Levels in Member, Committee, Leadership, and Other Offices, 1977-2016 , by R. Eric Petersen and Amber Hope Wilhelm. CRS Report R44324, Staff Pay Levels for Selected Positions in Senators' Offices, FY2001-FY2018 , coordinated by R. Eric Petersen. CRS Report R44684, Staff Tenure in Selected Positions in Senators' Offices, 2006-2016 , by R. Eric Petersen and Sarah J. Eckman. CRS Report R44325, Staff Pay Levels for Selected Positions in Senate Committees, FY2001-FY2015 , coordinated by R. Eric Petersen. CRS Report R44685, Staff Tenure in Selected Positions in Senate Committees, 2006-2016 , by R. Eric Petersen and Sarah J. Eckman. CRS Report R46262, Congressional Staff: Duties, Qualifications, and Skills Identified by Members of Congress for Selected Positions , by R. Eric Petersen.", "summary": "The manner in which staff are integrated and utilized within an organization may reflect the missions and priorities of that organization. In Congress, staff work for Members of Congress in personal, committee, and leadership offices, and are involved with every facet of congressional activity. Activities might include supporting a Member's representational, legislative, leadership, or administrative responsibilities as they arise in those settings. House and Senate staff activities may be of particular interest as one Congress comes to a close, and another Congress integrates new Members and staff in support of addressing its constitutional and representational responsibilities. Interest in staff issues may also arise when considering committee funding or appropriations for the legislative branch. CRS has several products about congressional staff, listed below, that provide information about staff roles and data over time about the number of staff, pay levels, and time in specific positions in Member office and committee settings. Congressional clients may contact the authors of the individual reports for additional information.", "document_type": "crs"}
{"report": "President Trump and various U.S. lawmakers have expressed concerns about U.S. reliance on critical mineral imports and the vulnerability to critical mineral disruptions of supply chains for various end uses, including defense and electronics applications. Chinese export quotas on a type of critical minerals referred to as rare earth elements (REEs) and China's curtailment of rare earth shipments to Japan over a maritime dispute in 2010 represented a wakeup call for the United States on China's near-monopoly control over global REE supply. The actions of the Chinese led to record high prices for REEs and, as a result, began to shine a light on the potential supply risks and supply chain vulnerability for rare earths and other raw materials and metals needed for national defense, energy technologies, and the electronics industry, among other end uses. U.S. legislators have introduced and deliberated on bills that would address the potential supply risk and vulnerability with respect to rare earth supply and bills that would promote domestic rare earth mine development. After 2010, decisionmakers were faced with various policy questions, including is a domestic supply chain necessary to address potential supply risk; and would an RRE alternative supply chain outside China among allies provide reliable and less risky access to RREs? As events unfolded during the 2010s, it became clear that providing an upstream supply outside China was not enough, and that access to and the reliability of entire supply chains for rare earths and other minerals essential for the economy and national security also were vulnerable. The concern among many in Congress has evolved from rare earths and REE supply chains, to also include other minor minerals or metals that used in small quantities for a variety of economically significant applications. These minor metals are used in relatively small amounts in everyday applications such as laptops, cell phones and electric vehicles, and renewable energy technologies, in addition to national defense applications. In December 2017, the Presidential Executive Order (E.O.) 13817, \"A Federal Strategy to Ensure Secure and Reliable Supplies of Critical Minerals,\" tasked the Department of the Interior (DOI) to coordinate with other executive branch agencies to publish a list of \"critical minerals.\" DOI published a final list of 35 critical minerals in May 2018. Initially after China's actions in 2010 contributed to prices for the various elements increasing, the focus in Congress was on rare earth supply (e.g., where in the United States new REE production could begin). Since 2010, several bills have been introduced that would use a variety of policy options and approachesâfrom streamlining the permitting framework for rare earth elements and other mining and processing projects on federal land, to the additions of REEs to the National Defense Stockpile. Sections 1411 and 1412 of the National Defense Authorization Act for FY2014 ( P.L. 113-66 ) contained language for Department of Defense to begin studies of rare earth materials and to require purchases of heavy REEs for the national defense stockpile. In 2010 the sole U.S. rare earth mine located in Mountain Pass, CA, owned by Molycorp, Inc., was dormant. From the mid-1960s through the 1980s, Molycorp's Mountain Pass mine was the world's dominant source of rare earth oxides. However, by 2000, nearly all of the separated rare earth oxides were imported, primarily from China. Because of China's REE oversupply and lower-cost production, as well as a number of environmental (e.g., a pipeline spill carrying contaminated water) and regulatory issues at Mountain Pass, Molycorp, Inc. ceased production at its mine in 2002. Between 2010 and 2012, there was some optimism but also criticism over Molycorp Inc.'s approach to reopen the only rare earth mine in the United States and establish a vertically integrated operation including oxide separation, production of metal alloys, and permanent magnet production. A few important questions relevant to a vertically integrated approach were raised then as they are now How can a fully integrated supply chain be developed domestically? Is a domestic supply chain necessary to address potential supply risk?; and With China in a near-monopoly position in all aspects of the rare earth supply chain, would an alternative supply chain outside China among allies provide reliable and less risky access to needed rare earth elements? Another immediate concern focused on the investment and skill level needed to build-out a reliable supply chain outside of China. In 2012, Molycorp, Inc., reopened its Mountain Pass mine, and the Lynas Corporation, Ltd. began production in Australia which added more REEs to the global mixâalbeit most of the production was in light rare earth elements (LREEs), not the heavy rare earth elements (HREEs) are needed for permanent magnetsâthe fastest growing use for rare earth elements at the time. Permanent magnets are important parts for national defense missile systems, wind turbines, and automobiles. With higher prices came lower demand as some companies began to use less REEs, try substitutes, or diversify their source of raw material supply outside of China. With China's production (including illegal production), there was more supply than demand for many of the REEs and prices declined. As a result of rapidly falling prices and Molycorp's debt, the Mountain Pass mine was not economically sustainable. Molycorp filed for Chapter 11 bankruptcy protection in June 2015. In June 2017, MP Mine Operations LLC (MPMO) purchased the Mountain Pass mine for $20.5 million. MPMO is an American-led consortium of which the Chinese-owned Leshan Shenghe Rare Earth Company has a 10% nonvoting minority share. In 2018, MMPO reportedly restarted production at Mountain Pass. See Table 1 for Molycorp's timeline. In March 2019, the Chinese government announced a reduction in REE production quotas and suggested that the REE produced in China would be sold only in China for its domestic manufacturing activity. As previously noted, the vulnerability concerned expanded from RREs to critical minerals. Assessments using a criticality matrix identified minerals (such as REEs, cobalt, and tantalum, among others) that could face supply restrictions and result in vulnerabilities to the economy and national security. Broad criticality assessments were prepared by the National Research Council, the Department of Energy (DOE), and the Massachusetts Institute of Technology (MIT) early in the recent discussion of mineral supply risk and potential mineral demand from the energy technology sector. Many others, such as Nassar, Du, and Graedel, have weighed in since 2010 on the criticality and supply risk question, providing a variety of models that examine the supply risk and vulnerabilities associated with these minerals. It is beyond the scope of this report to evaluate those models. Proposed Congressional findings mentioned in a number of bills introduced since the 111 th Congress on critical minerals include: Emerging economies are increasing their demand for REEs as they industrialize and modernize; A variety of minerals are essential for economic growth and for infrastructure; The United States has vast mineral resources but at the same time is becoming more dependent on imports; Mineral exploration dollars in the United States are approximately 7% of the world total (compared to 19% in the early 90s); Heavy rare earth elements are critical to national defense; China has near-monopoly control over the rare earth value chain, and there has been a transfer of technology from U.S. firms and others to China in order to gain access to rare earths and downstream materials; Thorium regulations are a barrier to rare earth development in the United States; A sense of Congress that China could disrupt REE and other critical mineral supplies to the United States; It is important to develop the domestic industrial base for the production of strategic and critical minerals; and The United States must accept some risk in the form of aiding domestic investment opportunities. The Senate Committee on Energy and Natural Resources held a hearing on S. 1317 , the American Mineral Security Act, on May 14, 2019, \"Examining the Path to Achieving Mineral Security.\" Two congressional hearings were held on critical minerals in the 115 th Congress: one on December 12, 2017, by the House Natural Resources Subcommittee on Energy and Mineral Resources on \"Examining Consequences of America's Dependence on Foreign Minerals,\" and a second on July 17, 2018, by the Senate Committee on Energy and Natural Resources to examine the final list of critical minerals. Public resource and minerals policy options are among the options for creating reliable supply chains of these minerals and metals. The Administration and many in Congress have combined concerns over import dependence and developing domestic supply into a number of policy proposals that would aim to streamline the permitting process for domestic critical mineral production and possibly open more public lands to mineral exploration. A 2017 U.S. Geological Survey (USGS) report, Critical Mineral Resources of the United States , presents its mineral assessments of 23 critical minerals for the nation as a whole, but does not break out what might be available on federal lands, where many of the legislative proposals are directed. Others in Congress want to be sure that if a more efficient permitting process is put in place, all the mechanisms for environmental protection and public input are left intact, if not enhanced. This report examines the process by which the critical minerals list was drafted, why these minerals are being classified as critical, where production is taking place, and countries holding the largest reserves of critical minerals. There is a brief review of materials required for lithium-ion batteries and solar and wind energy systems, and a discussion of supply chains for rare earth elements and tantalum. This report also presents the statutory and regulatory framework for domestic mineral production, legislative proposals, and congressional and executive branch initiatives (and actions), as well as an overview of U.S. critical mineral policy. There are a number of policy issues related to U.S. critical minerals, such as trade policy (particularly with China) and conflict minerals, just to name two. Treatment of these issues is beyond the scope of this report. Minerals for national security have long been a concern in the United States. For example, there were concerns over shortages of lead for bullets during the early 1800s. There were material shortages during WWII and the Korean War that contributed to the formation of the National Defense Stockpile. The current stockpile of strategic and critical minerals and materials was developed to address national emergencies related to national security and defense issues; it was not established as an economic stockpile. In 1939, after Germany invaded Poland, the Strategic Materials Act of 1939 (50 U.S.C. Â§98, P.L. 76-117) provided the authority for the United States to establish a strategic materials stockpile. Then in 1946, the Strategic and Critical Materials Stockpiling Act was enacted so that the United States would be prepared for national military emergencies and to prevent material shortages. The 1946 Act (P.L. 79-520) set a target of $2.1 billion of materials to be spent for the stockpile. Congress increased funding for supplying the stockpile to $4 billion over four years (1950-1953). The Defense Production Act of 1950 (50 U.S.C. Â§4501, P.L.81-774) added $8.4 billion to expand supplies of strategic and critical materials. In 1951, President Truman formed the Materials Policy Commission (also known as the Paley Commission) which recommended a stockpile for strategic materials and the use of lower cost foreign sources of supply. President Eisenhower established long term stockpile goals during a national emergency as a way to prevent the shortages that occurred during World War II and the Korean War. The initial time frame for the duration of the emergency the stockpile was intended to cover was three years, but later reduced to one year. However, with the passage of the 1979 Strategic and Critical Minerals Stockpiling Revision Act ( P.L. 96-41 ), a three-year military contingency was reestablished as a criterion for stockpile goals. Funding for the stockpile was subsequently increased to $20 billion. During the Cold-War era, the National Defense Stockpile (NDS) had an inventory of large quantities of strategic and critical materials. In the early 1990s, after the Cold War with the Soviet Union, the U.S. Congress supported an upgrade and modernization of the strategic materials stockpile. By FY1993, the National Defense Authorization Act (NDAA) for Fiscal Year 1993 ( P.L. 102-484 ) authorized a major sell-off of 44 obsolete and excess materials in the stockpile such as aluminum metal, ferrochromium, ferromanganese, cobalt, nickel, silver, tin, and zinc. The majority of these materials were sold to the private sector. Proceeds of these sales were transferred to other federal or Department of Defense (DOD) programs. In 1988, the Secretary of Defense delegated the management of the stockpile to the Undersecretary of Defense for Acquisition, Technology, and Logistics and operational activities of the NDS to the Director of the Defense Logistics Agency (DLA). Among other duties, the DLA manages the day-to-day operations of the stockpile program. The current stockpile contains 37 materials valued at $1.152 billion. Much of the materials are processed metals or other downstream products such as, columbium (niobium) metal ingots, germanium metal, tantalum metal, metal scrap, beryllium rods, quartz crystals, and titanium metal. Congressional action starting in 2014 led to the acquisition of REEs and other materials for the NDS. The DLA is acquiring six materials based on the NDAA for FY2014: Ferro-niobium; dysprosium metal; yttrium oxide; cadmium-zinc-telluride substrates; lithium-ion precursors; and triamino-trinitrobezene. In FY2016, the DLA made progress on its FY2014 goals for high-purity yttrium and dysprosium metal. The NDS initiated a program to develop economical methods to recycle REEs from scrap and waste. The goal was to investigate technologies to determine whether recycling is feasible in the United States. Work on this project goal is ongoing. In addition to acquisitions and upgrades, Congress approved a DOD proposal to sell materials determined to be in excess of program needs as part of the FY2017 NDAA ( P.L. 114-328 ). E.O. 13817, \"A Federal Strategy to Ensure Secure and Reliable Supplies of Critical Minerals,\" published on December 20, 2017, tasked the Department of the Interior (DOI) to coordinate with other executive branch agencies in establishing a draft list of critical minerals published in the F ederal R egist er 60 days from the initial order. On December 17, 2017, the Secretary of the Interior issued Secretarial Order (No. 3359, \"Critical Mineral Independence and Security\") directing the U.S. Geological Survey (USGS) and Bureau of Land Management (BLM) to develop the list. DOI agencies, with cooperation from others (e.g., DOD, DOE, and members of the National Science and Technology Council Subcommittee on Critical and Strategic Mineral Supply Chains [CSMSC]), developed using specific criteria an unranked list of 35 minerals. The Secretary of the Interior issued the final list of critical minerals in May 2018. The USGS used the critical mineral early warning methodology developed by the CSMSC as its starting point for the draft list. One of the metrics used was the Herfindahl-Hirschman Index which measures the concentration of production by country or company. Another metric used was the Worldwide Governance Index, which was used to ascertain the political volatility of a country and is based on six indicators. The early warning methodology is a two-stage process. The first stage uses the geometric mean of three indicators to determine if the mineral is potentially critical: supply risk (production concentration), production growth (change in market size and geological resources), and market dynamics (price changes). The second stage uses the results of the first stage to determine which of the potentially critical minerals require an in-depth analysis. In developing the list, the USGS also relied on its net import reliance data; its Professional Paper 1802, (referenced in footnote 14 of this report); NDAA FY2018 ( P.L. 115-91 ) from DOD; U.S. Energy Information Administration (EIA) data on uranium; and the input of several subject matter experts. The USGS established a threshold above which the minerals were deemed to be critical. Some minerals below the threshold that had critical applications were also included on the list. The USGS used a supply chain analysis to include some metals, such as aluminum, because the United States is 100% import reliant on bauxite, the primary source mineral for aluminum production. The unranked list of 35 minerals does not indicate the levels of criticality for some versus others. This is of note because some earlier studies had shown that the supplies of platinum group metals, REEs, niobium, and manganese are potentially far more vulnerable than lithium, titanium, and vanadium. Further, the REEs are not broken out by element. Some of the heavy rare earth elements have been shown to be more critical and vulnerable to supply shortages than some of the lighter elements. In addition to developing a critical minerals list, Congress and various executive branch entities have invested in other actions related to critical minerals. Investment in research and development (R&D) is considered by many experts (e.g., DOE, MIT, and elsewhere) to play a critical role in the support for and development of new technologies that would address three primary areas: greater efficiencies in materials use; substitutes or alternatives for critical minerals; and recycling of critical minerals. Below is a summary of selected current federal R&D, and information and analysis activities on critical minerals at federal agencies. DOE's FY2019 budget request included funding for R&D on rare earth and other critical materials. DOE's \"Critical Materials Hub\" is conducting R&D on a number of critical material challenges, including \"end of life\" recycling to help mitigate any possible supply chain disruptions of REEs. Funding for the program was at $25 million, each year, for the past three fiscal years (FY2017-FY2019), as FY2019 is the third year of its second five-year research phase. Congress approved this level of support despite the Trump Administration's proposal to eliminate the program in FY2019 and FY2020. The Critical Materials Hub is funded under the Advanced Manufacturing R&D Consortia within DOE's Energy Efficiency and Renewable Energy Program. Additionally, in FY2019 DOE proposed to launch its Critical Materials Initiative within the Fossil Energy R&D program under the Advanced Coal Energy Systems program to examine new technologies to recover REEs from coal and coal byproducts. Congress had appropriated funding for this project under the National Energy Technology Lab (NETL) R&D program during the Obama Administration, despite no request for funding. For FY2019, the Trump Administration requested $30 million in funding for the Critical Materials Initiative; Congress elected to support the initiative at $18 million. In December 2010 and December 2011, DOE issued Critical Materials Strategy reports. These reports examine and provide demand forecasts for rare earths and other elements required for numerous energy and electronic applications. An update on this research is forthcoming, according to DOE. The National Minerals Information Center housed within the USGS provides an annual summary of critical mineral activity in its Mineral Commodities Summaries report and Minerals Yearbook. The USGS also provides mineral resource assessments and has in 2017 published a study on 23 mineral commodities, all of which have been listed as critical by the Administration. In 2010, the USGS released a report on the rare earth potential in the United States. A 2017 collaboration between the USGS and the State of Alaska issued a report on critical and precious minerals in Alaska and conducted a geospatial analysis identifying critical mineral potential in Alaska. The results of the analysis provided new information on areas of Alaska that might contain deposits of critical minerals. In a DOD-led assessment of the U.S. manufacturing and defense industrial base and supply chain resiliency, there are sections on critical minerals and impacts on national security. The DOD continues to fulfill its stockpile goals for various critical materials and has funded small R&D projects related to rare earths. In 2009, the Office of Industrial Policy reviewed the rare earth mineral supply chain. The Office of the Secretary of Defense reviewed its National Defense Stockpile and issued a report titled: Reconfiguration of the National Defense Stockpile Report to Congress . As part of the Ike Skelton National Defense Authorization Act for FY2011 (Section 843 of P.L. 111-383 ), the DOD was required by Congress to prepare an \"Assessment and Plan for Critical Rare Earth Materials in Defense Applications\" and report to a number of congressional committees by July 6, 2011. A DOD assessment and congressional appropriations supported new stockpile goals for HREEs. In an April 2012 interview with Bloomberg News , the DOD head of industrial policy stated that DOD uses less than 5% of the rare earths used in the United States, and that DOD was closely monitoring the rare earth materials market for any projected shortfalls or failures to meet mission requirements. In 2010, the White House Office of Science and Technology Policy (OSTP) formed an Interagency Working Group on Critical and Strategic Minerals Supply Chains. The group's focus is to establish critical mineral prioritization and to serve as an early warning mechanism for shortfalls, to establish federal R&D priorities, to review domestic and global policies related to critical and strategic minerals (e.g., stockpiling, recycling, trade, etc.), and to ensure the transparency of information. The White House National Science and Technology Council Subcommittee on Critical and Strategic Mineral Supply Chains produced a report describing a screening methodology for assessing critical minerals. The \"early warning screening\" approach for material supply problems was first included as a U.S. policy goal in the National Materials and Minerals Policy, Research and Development Act of 1980 (30 U.S.C. Â§1601) ( P.L. 96-479 ). According to the 2019 USGS Mineral Commodity Summaries report, China ranked as the number one producer of 16 minerals and metals listed as critical. While there are no single monopoly producers in China, as a nation China is a near-monopoly producer of yttrium (99%), gallium (94%), magnesium metal (87%), tungsten (82%), bismuth (80%), and rare earth elements (80%). China also produces roughly 60% or more of the world's graphite, germanium, tellurium, and fluorspar. In 2017, the United States had no primary production of 22 minerals and byproduct production of five minerals on the critical minerals list. There is some U.S. primary production of nine minerals, and the United States is a leading producer of beryllium and helium (see Table 2 , Figure 1 ). China had gains in production that far outpaced the rest of the world. By 2003, China had already dominated in the production of graphite, indium, magnesium compounds, magnesium metal, REEs, tungsten, vanadium, and yttrium; it solidified its number one producing status of these minerals about a decade later. Chinese producers are seeking not only to expand their production capacity at home but to continue to negotiate long-term supply agreements or create equity partnerships around the world, particularly in Africa (cobalt and tantalum), Australia (lithium), and South America (lithium). The dominant producing region for chromium, manganese, platinum group metals, tantalum, and cobalt is southern Africa. Brazil produces 88% of the world's niobium, and Australia accounts for 58% of the world's lithium production, according to USGS data. According to USGS data, critical minerals dominated by a single producing country include: niobium from Brazil, cobalt from the Democratic Republic of the Congo (DRC), platinum group metals from South Africa, REEs (including yttrium), and tungsten from China. Current mineral production information on federal land is not available from the DOI. The Government Accountability Office (GAO) noted in a 2008, report that the DOI does not have the authority to collect information from mine operators on the amount of minerals produced or the amount of mineral reserves on public lands, and there is no requirement for operators to report production information to the federal government. However, previous DOI and GAO reports completed in the early 1990s reported that gold, copper, silver, molybdenum, and lead were the five dominant minerals produced on federal lands under the General Mining Law of 1872 (30 U.S.C. Â§Â§21-54). Currently, the vast majority of mining activity on federal lands is for gold in Nevada, based on past DOI information. The DOI report also showed that federal lands mineral production represented about 6% of the value of all minerals produced in the United States. There is uncertainty over how much production of minerals occur on federal lands. Most minerals listed as critical are locatable on U.S. federal lands under the General Mining Law of 1872; comprehensive information on which minerals are located and produced on federal land remains incomplete. An unanswered question is the extent that critical mineral resource potential exists on federal land. Until more is known through mineral resource assessments of federal land, it will be hard to determine the impact of opening federal land to development that is now withdrawn from mineral development. Some mining advocates support developing domestic supply chains in critical minerals. Other stakeholders support a diversified portfolio of reliable suppliers, particularly if foreign sources are more economic or if domestic production (or manufacturing) is uneconomic, not technically feasible, or environmentally unacceptable. There are six critical minerals that are classified as byproducts: indium, tellurium, gallium, germanium, cobalt, and rhenium. There are important differences between main product and byproduct supply. Byproduct supply is limited by the output of the main product. For example, the amount of indium recoverable in zinc cannot be more than the quantity of indium in the zinc ore. As production of the main product continues, the byproduct supply may be constrained because a higher price of the byproduct does not increase its supply in the immediate term. Even in the long run, the amount of byproduct that can be economically extracted from the ore is limited. That is, byproduct supply is relatively inelastic (i.e., not particularly responsive to price increases of the byproduct). For byproducts, it is the price of the main product, not the byproduct that stimulates efforts to increase supply. But a high enough byproduct price may encourage new technologies that allow for greater byproduct recovery from the main product. There may be occasions when the main product supply contains more byproduct than is needed to meet demand. If this were the case, byproduct processing facilities would need to be expanded so that byproduct processing capacity would not be a limiting factor in byproduct supply. Another important difference between byproduct and main product is that only costs associated with byproduct production affect byproduct supply. Joint costs (costs associated with production of both products) are borne by the main product and do not influence byproduct supply. Byproducts are typically available at lower costs then the same product produced elsewhere as a main product, (e.g., REEs produced as a byproduct of iron ore in China would have lower production costs than would REEs produced elsewhere in the world as a main product). Byproducts, typically, are not free goods, meaning that there are costs associated with their production. Byproducts could be without cost if two conditions are met: (1) production of main product must require the separation of the byproduct, and (2) no further processing of the byproduct is required after separation. Table 2 provides data on the global production of critical minerals and the leading producing countries. The data shows that production for nearly all of the critical minerals has increased since 2000, many of which have doubled (e.g., chromium, indium, lithium, manganese, niobium, and tantalum) or tripled (e.g., cobalt, gallium, and tellurium) in the amount produced. Secondary recovery can occur from waste products during the metal refining and manufacturing process or from discarded end use products. As indicated in Table 3 , in the United States, there is little to no production or reserves and little to no secondary recovery currently for many (but not all) of the critical minerals of high net import reliance. There is a significant amount of secondary recovery in the United States of nine critical minerals according to the USGS Mineral Commodity Summaries: aluminum, chromium, cobalt, gallium, indium, magnesium metal, platinum group metals, tin, and titanium. While U.S. capacity for secondary recovery of metals and other materials has not grown much between 1997 and 2016, rates of recovery have fluctuated annually. Steel is the most recycled material in the United States. There are well established infrastructures, for old and new scrap, for selected metals such as steel, copper, aluminum, cobalt, and chromium. For many other metals, such as manganese, REEs, and niobium, little-to-no recycling takes place in the United States because it is either economically or technically not viable. Countries in the European Union, Japan, and South Korea are strengthening their efforts in secondary recovery as emerging markets (e.g., China and India) seek to secure greater access to primary materials. The quantity of most metal and materials available for recycling will likely continue to meet a fraction of demand, particularly if demand is rising. The rate of availability (i.e., based on the useful life of the product) puts a limit on how much can be recycled. According to the National Research Council, the primary impediment facing secondary recovery in the United States is the lack of clear policies and programs at all levels of government to embrace the recovery of materials. Without a national mandate, the National Research Council report indicates that state and local governments are likely to continue a \"patchwork\" of programs and policies. Table 3 illustrates the point that there is very little secondary recovery of critical minerals and metals in the United States. The data could indicate that there is a lack of infrastructure for secondary recovery of critical minerals and metals. Economic and technological factors must also be evaluated as to whether the benefits outweigh the costs for recovering certain materials, particularly the small amounts of critical minerals that may be available for secondary recovery (from manufacturing waste or end use products). Additional R&D may be needed to determine whether secondary recovery of the most import-dependent minerals could be increased to reduce U.S. import reliance. In 2018, the USGS reports that for base metals and precious metals the recycling rate is much different. For example, the recycling rates were 28% for aluminum, 35% for copper, 52% for nickel, 18% for silver, and 25% for zinc. In 2014, steel in the auto industry was recycled at 106%âmore steel than was used for domestic manufacturing. The recycling rate of steel is 90% for appliances containing steel and 67% for steel cans. There is a distinction between what is described when using the terms reserves and resources in the context of minerals. Reserves are quantities of mineral resources anticipated to be recovered from known deposits from a given date forward. All reserve estimates involve some degree of uncertainty. Proved reserves are the quantities of minerals estimated with reasonable certainty to be commercially recoverable from known deposits under current economic conditions, operating methods, and government regulations. Current economic conditions include prices and costs prevailing at the time of the estimate. Estimates of proved reserves do not include reserves appreciation. Resources are concentrations in the earth's crust of naturally occurring minerals that can conceivably be discovered and recovered. Undiscovered technically recoverable resources are minerals that may be produced as a consequence of natural means, or other secondary recovery methods, but without any consideration of economic viability. They are primarily located outside of known deposits. Regarding reserves, the USGS lists little to no reserves in all 35 of the critical minerals except for helium and beryllium and significant resource potential in only tungsten, lithium, vanadium, uranium, and REEs. Of the 14 critical minerals listed as 100% import dependent, the USGS lists some reserves for two: REEs and vanadium (see Table 4 and Figure 2 ). Regarding resources, USGS identifies some resource potential for cesium, manganese, and niobium. There are byproduct resources of cobalt, germanium, tellurium, and rhenium that are associated with main products such as copper, zinc, and bauxite (see Table 4 ). The USGS is uncertain about U.S. and global reserves of several critical minerals as not enough data are available according to the USGS. According to the USGS, at the global level, there are significant or abundant resource potential for the critical minerals for which the agency has data, which is some but not all of the critical minerals. Global resource potential is either unknown or uncertain for bismuth, cesium, germanium, indium, and tellurium. Most of the germanium, indium, and tellurium are obtained as byproducts of base metal production. China leads the world in reserves in seven critical minerals, including antimony, REEs, strontium, tellurium, tin, tungsten, and vanadium (see Table 4 ). China is among the top three reserve holders in barite, fluorspar, graphite, magnesium compounds, and titanium. Table 4 provides available information on global resources of critical minerals, as well as information on the size of the reserves. Figure 2 provides information on the regional distribution of the reserves. Exploration expenditures for minerals in the United States have been rising since 2001. The United States has maintained about 8% of the annual exploration budget for minerals worldwide from 1997 to 2017. In 2017, these expenditures in the United States were at 225 exploration sites (out of 2,317 exploration sites worldwide); 41% of the U.S. sites were in Nevada, 14% in Alaska, and 11% in Arizona. It can take many years for mining firms to find and bring an economic deposit into production. Thus, it is important for the industry to keep mineral projects in the exploration-development process. In general, mineral exploration in the United States remains focused on a few minerals, most of which not considered critical. Exploration activity in the western states is primarily for gold, copper, molybdenum, silver, tungsten, and uranium. There had been some reported interest in expanding silica sand operations in Nevada, developing a copper-cobalt-gold project in Idaho on Forest Service land, and thorium production on federal lands along the Idaho/Montana border. Globally, Canada leads with the most active exploration sites, mostly for gold and base metals (over 500 sites), followed by Australia (about 500 sites) with investments mostly in gold, base metals, and uranium. The locations and minerals being explored can be shape how critical mineral supply chains are or may evolve. These supply chains have relevance to various policy questions, including what is the long-term investment strategy in the United States to develop mineral extraction and downstream metal and manufacturing capacity; and, if the focus is on building a reliable supply chain, what part of that supply chain makes sense to develop in the United States? There have been recent new additions to the annual USGS mineral exploration review. Data on lithium, niobium, rare earth elements, and tungsten are now included. Data for other minerals such as scandium, vanadium, and yttrium have been compiled since 2014. The big global exploration story is about lithium. In 2016, global exploration dollars for lithium, cobalt, and gold rose significantly. The lithium exploration expenditures increased four-fold since 2015 and active exploration sites rose from 56 in 2012 to 167 sites in 2017. Lithium exploration expenditures, for example, rose from $22 million in 2015 to $128 million in 2017 as the number of lithium exploration companies grew from 23 in 2015 to 125 in 2017. The price of lithium rose by more than 150% from 2007 to 2016 and sits at 83% higher than its 10-year average. The number of cobalt sites rose by 121% since 2016. In the United States in 2017, gold remains in the top spot for the number of exploration sites (47%) followed by copper (12%), then lithium with 7% of the sites. USGS noted that there is continued interest in graphite, REEs, and tungsten in the United States, but the most notable sites are in gold exploration. Overall, 54% of the sites actively explored in the United States are for gold and silver and 22% for base metals. Worldwide, gold or silver accounts for 84% of the sites actively explored. The USGS reported that the United States has accounted for about 7% to 8% of overall global exploration budget over the past 10 years (about $611 million in 2017). However, the annual review is not exactly a country-by-country comparison because the USGS uses regions such as Latin America and Africa to compare with individual countries such as Canada, Australia, and the United States. The mineral exploration budget directed at U.S. mineral deposits is above that of China (5%), Russia (4%), and many countries in Latin America. Latin America attracts the most exploration dollars with $2.4 billion, most of which are for gold and silver (58%) followed by base metals at 22% of exploration expenditures. Chile has seen the most investment in Latin America, followed by Peru. Latin America is home to 70% of the world's known lithium deposits, known as the \"lithium triangle\" consisting of Chile, Argentina, and Bolivia. In Argentina, lithium exploration sites account for 44% of exploration expenditures followed by gold/silver at 42%, and copper at 9%. Lithium is most developed in Chile because of its superior infrastructure for mining. Most exploration projects in Chile are for copper (49%) and gold (29%). There has been an uptick in lithium exploration in Australia as well. China invested $650 million (in U.S. dollars) in Australia in 2016, looking for lithium and gold, primarily. As ore grades decline at known reserve locations, many exploration companies are searching for high-grade deposits in remote locations, including the ocean floor. The demand for mineral commodities is a derived demand which differs from consumer goods demand. Minerals are used as inputs for the production of goods and services. For example, the demand for rare earth elements is derived from the production of their end-use products or use, such as flat panel displays, automobiles, or catalysts. As a result, the demand for critical minerals depends on the strength of the demand of the final products for which they are inputs. An increase in the demand for the final product will lead to an increase in demand for critical minerals (or their substitutes). In the case of derived demand, when mineral and metal prices rise, the extent to which the quantity of a material declines depends largely on the degree to which its price increase can be passed on to the final consumer, as well as the proportion of the final good's price that is accounted for by the mineral/metal commodity. That is, it might depend on the amount of critical mineral or metal used per unit of output. The major variables that determine the growth in demand for consumer goods are price and income growth. U.S. demand has declined for some critical minerals, and for others, demand has increased but not as much (in relative terms) as the increase in global supply. For example, over the past 20 years consumption fell for aluminum, chromium, manganese, platinum group metals, REEs, titanium, and tantalum, among others, and demand grew slowly for lithium, germanium, and graphite. Only for tellurium, niobium, and indium did the United States experience rapid demand growth (relative to supply). Some of the demand drivers in recent decades for critical minerals include permanent magnets using REEs, batteries using cobalt and lithium, automobiles and electronics using tantalum and niobium, and vanadium for steel production. Global demand data for each of the minerals listed as critical were not available at the time of this writing. Global demand data could shed more light on where the minerals are being used for metal alloying, the manufacturing of component parts, and final products. Embodied metals (those that are imported as final products) are not counted as demand. Many critical minerals, (e.g., manganese, tungsten, and vanadium) are used for steelmaking and infrastructure projects, such as roads, housing, rail lines, and electric power grids. Others (e.g., REEs, lithium, indium, tantalum, gallium, and germanium) are used in the manufacturing of high-value electronic products, such as laptops and batteries, renewable energy systems, and other consumer goods, such as automobiles and appliances (see Table 5 ). There has been a surge in demand for critical minerals in China. China's demand for natural resources rose to historic levels and may continue to rise over the long term, even with a slowing economy. In the recent past, China has been the fastest growing market for niobium, and in 2010 accounted for 25% of world niobium consumption. Manganese consumption rose from about 2,200 metric tons (mt) in 2003 to about 9,000 mt in 2008. China's demand for vanadium paralleled that of steel demand and rose 13% annually from 2003 to 2009. In general, vanadium demand in China is projected to double from 2010 to 2025 because of its continued use in steelmaking (including new steel-hardening requirements) and because of the potential for application in new battery technology used for large-scale renewable energy storage (e.g., vanadium-redux flow battery-VRFB). In 2010, China accounted for 85% of chrome ore import demand and is the world's leading producer of steel (accounting for over half the world's production in 2017 based on the most recent data). Chromium is a major production input for stainless steel. China's chrome imports will likely continue to increase as stainless steel demand at the global level remains a big part of China's high-valued exports, urbanization, and future industrial practices. Overall, in 2017, China's cobalt smelters accounted for 60% of global supply, and 77% of cobalt demand in China went into batteries. In 2017, China accounted for about 25% of platinum demand, primarily used in jewelry making, and 26% of palladium demand, much of which is used in catalytic converters in automobiles. In order for this increasing demand scenario in China to play out, the cities would need to fill up with enough people who are making high enough wages to support the economic growth that China is seeking. It is uncertain whether such a high level of consumer demand will materialize. China's economic growth has slowed considerably in the recent past from around 10% annually in the first decade of the 2000s, to around 6% in 2014. However, China's demand for minerals will continue to put pressure on U.S. access to reliable supplies. Aside from a small amount of recycling, the United States is 100% import reliant on 14 minerals on the critical minerals list, minerals that provide critical support for the U.S. economy and national security such as, graphite, manganese, niobium, rare earths, and tantalum, among others. The United States is more than 75% import reliant on an additional 10 critical minerals, including antimony, barite, bauxite, bismuth, potash, rhenium, tellurium, tin, titanium concentrate, and uranium. The United States has increased its mineral imports from China over the past 20 years. Although the United States has diversified its sources for some of its material requirements since 1997, the United States imports significant quantities of critical minerals and metals and is dependent on China as either a primary or major provider of raw materials and several metals as of 2017 (see Table 5 and Figure 3 ). While import reliance may be a cause for concern (and high levels of import reliance potentially a security risk), high import reliance is not necessarily the best measure, or even a good measure, of supply risk. A more relevant measure may be the reliability of the suppliers. The supply risk for potash or bauxite, for example, may not be the same as that for REEs or niobium due to the multiplicity of potential sources. There are a number of factors that affect the availability of mineral supplies that may have little to do with import reliance. A company that is the sole supplier, or a single country as a primary source, with export restrictions, would likely constitute supply risks. But any number of bottlenecks that might arise among both domestic and foreign producers, such as limited electric power, skilled labor shortages, equipment shortages, labor unrest, weather or transportation delays, and opposition on environmental policy grounds, could also pose supply risks. Any of these above-mentioned potential supply disruptions could raise costs or prices, and exacerbate the tightness of supplies. For other minerals, such as iron ore and molybdenum, the United States is self-sufficient. For aluminum, uranium, potash, cesium, and rubidium, the United States' chief trading partner is Canada, a stable ally. Also, U.S. companies have invested in overseas operationsâfor example, copper and bauxite minesâand, thus, U.S. supply sources for some materials are diversified, of higher quality, or lower cost, and located in countries that have extensive reserves and production capacity. Such conditions may not always exist in the United States, even when resources are present. Materials analysis is a useful tool to better understand various aspects of mineral demand. For example, such analysis can provide information on how material inputs are used in component parts and how components are used in larger systems such as solar arrays, wind turbines, and automobiles. Using a material analysis, an analyst can obtain information on the material intensity of a unit of production. This analysis can lead to manufacturing efficiencies (i.e., getting the same or better performance using fewer materials) or show where and how material substitution, if possible, could occur. Manufacturing firms could then make short-term or long-term adjustments to their production processes. Even with materials efficiencies, where less metal is used per unit of output, overall demand growth and lack of short-term supply capacity often drives up mineral prices. For example, households in some countries are likely to have multiple units of a variety of products such as laptops, flat panel televisions, and cell phones, etc. And because the materials intensity (small amounts per unit output) of critical minerals is relatively low for most end-use applications, low-cost manufactured goods may contain some high-cost materials. The remainder of this section of the report provides information on the materials content of lithium-ion batteries, solar energy arrays, wind technologies, and permanent magnets, with a more detailed discussion of the material requirements for wind and solar energy systems. The use of lithium-ion batteries for the rapidly growing electric vehicle market is expected to transform the material requirements for battery technology. Material analysis of lithium-ion batteries would bring to light useful insights on materials composition, cost, technologies, and supply chains. In the case of the lithium-ion (li-ion) battery for electric vehicles, what is the material composition of the battery? In other words, how much cobalt, lithium, nickel, and other materials are needed per battery, how much are the material costs for each battery, and what percent of the total battery manufacturing cost do the materials represent? Then, further, what is the battery cost per electric vehicles? Analysts would want to know the point at which material price increases would warrant a shift in the use of those materials. Other useful insights in materials analysis would be to understand the suite of battery technologies being developed, their manufacturing capacity, and the ownership structure of the supply chain for the materials and the batteries. A 2017 study by a group of battery technology researchers examined the supply risks associated with lithium-ion batteries and other battery technologies to examine the implication for a carbon-reduced environment. The authors posed the question: What are the material requirements for the battery? They identified features of a li-ion battery, e.g., low cost, high energy, and long life. They examined the raw material requirements for li-ion batteries, secondary supply potential, and supply risks associated with an exhaustible resource (e.g., mineral extraction may become uneconomic), the structure of the industry (e.g., whether there is a cartel or a monopoly producer involved), and a surge in demand. They used supply risk indicators discussed earlier, such as the risk of supply reduction, the risk of a surge in demand, market concentration, political stability, substitutability, and recyclability. The researchers' second step was to determine the supply risk score on the technology level, for each of the six battery types. There is a lithium-cobalt oxide battery which has a high energy density but also a high cobalt content and price. The steep country risk associated with cobalt production in the Democratic Republic of the Congo (DRC) led researchers to look for alternative suppliers and materials that would provide high energy density and long life with less or no cobalt. One example would be to use a manganese-oxide battery, wherein cobalt is partially replaced by nickel and manganese. They pointed out that there are several new battery types that use combinations of lithium, aluminum, cobalt, iron, nickel, copper, graphite, phosphate, titanium, and manganese. The researchers identified lithium as needed for all battery types and graphite used for all except the lithium-iron-phosphate (LFP-LTO) type, which uses titanium instead. They reported that with a market breakthrough (by 2035) in the use of electric vehicles containing lithium battery technology , an annual growth rate of 7.5% is needed for lithium supply and 3% growth rate in cobalt supply to meet electric vehicle demand. In the case of solar arrays and wind turbine technologies, USGS Minerals Information Center conducted a technical analysis of byproduct minerals that are contained in solar energy systems: silver, cadmium, tellurium, indium, gallium, selenium, germanium, and four of the REEs used in wind technologies (dysprosium (Dy), neodymium (Nd), terbium (Te), and praseodymium (Pr)), using Clean Power Plan (CPP) and no-CPP scenarios. USGS concluded that regardless of the scenario, the transition to renewables is very likely to accelerate in the coming decades and that a number of minor metals are likely to be constrained; thus rates of production of those metals would need to be increased to meet demand unless there are manufacturing shifts. The analysis concluded that the supply of heavy REEs used in permanent magnets (currently used in some of the new wind turbines) will not keep pace with demand from multiple end uses. The USGS assumed an aggressive electric vehicle market, the increased use of the magnets in electric vehicles, and new wind turbines' use of permanent magnets containing REEs. There is some disagreement over whether significant increases in REEs for magnets that would be used in wind energy systems will occur. Additionally, USGS concluded that the growth in demand for byproduct metals in solar and wind energy systems would compete with usage in electric and hybrid vehicles, and consumer electronics. The report asserts that a key uncertainty is net material intensity, i.e., the quantity of the byproduct metal required per unit of installed electric generating capacity, minus the amount of recycled material. For solar cells, net material intensity per generating capacity is dependent on the conversion efficiency of solar cells. Related questions are: Where are the wind turbines and solar arrays being manufactured and which countries and firms would be impacted the most by any disruption in critical mineral supply for these end uses? REEs in permanent magnets is another example of how materials analysis for end uses may inform understanding of critical minerals vulnerability. For example, some of the pertinent questions that might be raised with respect to permanent magnets include: How much Dy, Nd, Te, and Pr go into a neodymium-iron-boron (NdFeB) permanent magnet and what fraction of the total cost is each element? What are permanent magnet unit production costs and what portion of the total costs of a wind turbine or an automobile do the permanent magnets represent? And what is the likelihood and the economics of substitution? Below are simplified examples of material requirements for wind and solar systems. Based on the Department of Energy Report, 20% Wind Energy by 2030 , wind power installations consist of four major parts: wind tower, rotor, electrical system, and drivetrain (e.g., generator, gearbox, and motor). Most of the common large wind turbines have tower heights over 200 feet and rotor blades as long as 150 feet. The average rated capacity of an onshore wind turbine is between 2.5 megawatts (MW) and 3 MW. DOE lists the following as the most important materials for large-scale manufacturing of wind turbines: steel, fiberglass, resins (for composites and adhesives), core materials, permanent magnets, and copper. Some aluminum and concrete is also required (see Table 6 below). DOE considers the raw materials for large-scale wind turbines to generally be in ample supply. Turbine manufacturing, however, would be 100% dependent on permanent magnet imports, primarily from China, as that country produces 75% of the world's permanent magnets which contain REEs (assuming certain drivetrains are used). But DOE and other wind power analysts also identify, as a potential concern, the need for increased manufacturing capacity for fiberglass and other components such as generators, and gear boxes. Wind power development trends at the time of the 20% Wind Energy by 2030 study were moving towards lighter-weight materials and high-strength composites such as glass fiber-reinforced plastic and carbon fiber-reinforced plastic. Increased production of fiberglass, commercial-grade carbon fiber, and permanent magnets (containing REEs) would be necessary if the United States were to achieve 20% wind energy by 2030. Recent analysis indicates that the offshore wind industry could be a major driver for increasing REE demand. There are indications that the larger turbines which are better suited for offshore locations, which also contain REEs, may be more reliable and require less maintenance than onshore turbines. There are two major types of photovoltaic (PV) cells: crystalline silicon cells (most widely used) and thin film solar cells. The silicon based PV cells are combined into modules (containing about 40 cells) then mounted in an array of about 10 modules. Ethylene-vinyl acetate and glass sheets typically frame the PV module with additional aluminum frames for added protection. Thin-film solar cells use layers of ultra-thin semi-conductor materials that can serve directly in rooftop shingles, roof tiles, and building facades. Thin-film PV cells have been noted to use cadmium-telluride or copper-indium-gallium-diselenide (see Table 7 below). A separate category of solar technology is concentrating solar power; these systems use mirrors to convert the sun's energy into heat and then into electricity. With a supply chain analysis, it is just as important to know where new downstream capacity (processing, refining, and metals alloying) is being built or likely to be built in the world as it is to know the likely investors in upstream production capacity for critical minerals. When looking at the complete supply picture it could be more easily determined where the potential risks are and what mitigation efforts may be available. Below, two illustrative supply chains are described: rare earth elements and tantalum. Rare earth elements often occur with other elements, such as copper, gold, uranium, phosphates, and iron, and have often been produced as a byproduct. The lighter elements, such as lanthanum, cerium, praseodymium, and neodymium, are more abundant and concentrated and usually make up about 80%-99% of a total deposit. The heavier elementsâgadolinium through lutetium and yttriumâare scarcer but very \"desirable,\" according to USGS commodity analysts. Most REEs throughout the world are located in deposits of the minerals bastnaesite and monazite. Bastnaesite deposits in the United States and China account for the largest concentrations of REEs, while monazite deposits in Australia, South Africa, China, Brazil, Malaysia, and India account for the second-largest concentrations of REEs. Bastnaesite occurs as a primary mineral, while monazite is found in primary deposits of other ores and typically recovered as a byproduct. Over 90% of the world's economically recoverable rare earth elements are found in primary mineral deposits (e.g., in bastnaesite ores). The supply chain for rare earth elements generally consists of mining, separation, refining, alloying, and manufacturing (devices and component parts). A major issue for REE development in the United States is the lack of refining, alloying, and fabricating capacity that could process any rare earth production. An April 2010 GAO report illustrates the lack of U.S. presence in the REE global supply chain at each of the five stages of mining, separation, refining oxides into metal, fabrication of alloys, and the manufacturing of magnets and other components. According to the 2010 GAO report, China produced about 95% of the REE raw materials and about 97% of rare earth oxides, and was the only exporter of commercial quantities of rare earth metals (Japan produced some metal for its own use for alloys and magnet production). About 90% of the metal alloys were produced in China, and China manufactures 75% of the NdFeB magnets and 60% of the samarium cobalt (SmCo) magnets. Thus, even as U.S. rare earth production ramps up, without significant supply chain investments, much of the processing and metal fabrication would likely occur in China. In the case of rare earths, it is not enough to develop REE mining operations outside of China alone without building the value-added refining, metal production, and alloying capacity that would be needed to manufacture component parts for end-use products. According to rare earth analyst Jack Lifton, vertically integrated companies may be more desirable. It may be the best way to secure investor financing for REE production projects. Joint ventures, consortiums, and cooperatives could be formed to support production at various stages of the supply chain at optimal locations around the world. Each investor or producer could have equity and offtake commitments. Where U.S. firms and U.S. allies invest may contribute to meeting the goal of providing a secure and stable supply of REEs, intermediate products, and component parts needed for the assembly of end-use products. In 2019, rare earth analyst James Kennedy of ThREE Consulting writes that China's dominance and \"absolute advantage\" in the rare earth space is fundamentally reflected in its R&D efforts at its national labs and the Baotou Research Institute of Rare Earths in the fields of basic sciences, materials science, and rare earth metallurgy. ThREE Consulting has shown that China has filed more rare earth patents than the rest of the world combined and Kennedy states that patents acquired in the rare earth space are likely a proxy for next generation rare earth-related technology. China's whole-of-government approach in the field of rare earths and other critical minerals may keep China in its position of dominance for the foreseeable future. Tantalum is a metallic element contained in the mineral tantalite and is extracted from primary and placer mineral deposits. It often occurs with niobium but is also present with other minerals such as rare earths, uranium, and cassiterite (tin ore). Tantalum has been produced as a primary product, a co-product, and as a byproduct of other ores. Tantalum's high melting point (3,000 degrees Centigrade) and corrosion resistance makes it super-capacitive, (i.e., characterized by a high capacity to store and release electrical charges). This metal, which is used in numerous high-tech electronic devices, is produced and traded in conflict areas in Central Africa; thus, in certain instances, tantalum is classified as a conflict mineral and subject to disclosure rules promulgated from the Dodd-Frank Wall Street Reform and Consumer Protection Act ( P.L. 111-203 , 15 U.S.C. Â§78). Section 1502 of the law includes a sense of the Congress that conflict minerals in the Democratic Republic of the Congo or adjoining countries are financing extreme levels of violence in the DRC. There are four major sources of tantalum market supplies: primary production (industrial and artisanal ); tin slag processing; scrap reprocessing and recycling; and byproduct production (also referred to as secondary concentrate). Primary production accounts for about 70% of global supply. Historically, tantalum obtained from tin slag (waste) was primarily produced in Malaysia, Thailand, and Brazil. Tantalum has also been a byproduct of niobium, titanium, tin, and uranium produced in Malaysia, Brazil, China, and Russia. Recycled tantalum contributes to 30% of global supply, mostly recovered from \"pre-consumer scrap\" at the manufacturing plant. The United States and Mexico account for 61% of tantalum scrap recovery and it is estimated that scrap could provide 50% of global tantalum supply by 2025. Based on USGS data , Brazil, Canada, Mozambique, and Nigeria were countries that led in primary tantalum production during the 1970s. Brazil and Canada continued to be the major producing countries in the 1980s. Australia took over the top spot in the late 1980s and 1990s, followed by Brazil until 2009, after which no primary production was reported for Australia by the USGS. The Australian mines were closed following the 2008 recession, reopened in 2012, but closed again shortly thereafter in 2012. Since about 2009, it has been noted by several sources that the DRC, with tens of thousands of artisanal miners, is a leading producing country (see Table 4 ). Recorded production for tantalum by the USGS indicates a shift in productionâat least what has been reportedâsince 2000 from Australia and Brazil, to the DRC and Rwanda. Over the past several decades, there were material gaps in the publically available data for tantalum; production data reported has been much less than processor receipts. In one example, the average producer's supply to total processor's receipts gap measured over six quarters was 73%. On average, reported production represents about 27% of total processors' receipts over the period. There was an average material difference of 381 metric tons. Part of the explanation for such reporting patterns may be the highly unregulated nature of tantalum ore production and trade in Central Africa. High production in the unreported (informal) sector of the mining community drove prices down and forced many of the major production regions to close their operations. With low prices, investor interest is limited; investors are thus constrained by high risk in greenfield projects, (i.e., new projects or work that does not follow previous work). The USGS data does not reflect the amount of production from unauthorized (often illegal) mining operationsâusually artisanal mining operations. The USGS collects its data from a variety of sources but considers the tantalum industry as operating under \"a shroud of secrecy\" with incomplete access to data and not very transparent. Generally, there is insufficient data to make definitive determinations on the true production, capacity, and reserve levels for tantalum on a global basis. There are several reasons for this supply/demand material difference, including the following: Nonreporting or under-reporting all forms of supply (primary, byproduct, tin slag, and scrap) through the Tantalum-Niobium International Study Center (TIC) or elsewhere. High inventories. Several analysts have noted that since the recession of 2008 many companies were selling from their above-ground stocks. Illicit mining and trading. There are well-established networks for smuggling tantalum and other minerals out of Central Africa (and elsewhere) and into the marketplace. Dependence on Africa's supply and that disruption could have consequences, e.g., price rises. Africa provides 80% of the primary tantalum production (60% from the DRC and Rwanda) as China dominates downstream processing and manufacturing capacity. The illicit mining component in the tantalum market makes it vulnerable and possibly unsustainable because it prevents large-scale producers from entering the market. Illegal tantalum trade has long-term implications for the entire supply chain leading to lower investment in all phases of the supply chain. In 2016, the USGS listed Australia and Brazil as having 85% of the world's tantalum reserves, but the USGS regularly states that data is not available for other countries or is just unknown. The USGS lists Australia, Brazil, and Canada as having the majority of the world identified tantalum resources. In 2017, Mancheri, et al., published a study that assessed the tantalum supply chain for regional production dependence, the potential for supply disruptions, and mechanisms to prevent disruptions using a \"resiliency\" of supply model. This method examines four resilience of supply indicators: diversity of supply, material substitution, recycling, and stockpiling, and is dependent on three factors: resistance, rapidity, and flexibility. Mancheri's study concludes that the tantalum market is flexible and resilient based on its handling of unreported and presumably illegal trade along with its impact on conventional large-scale tantalum producers. Mancheri's study concluded that stockpiling and substitution can mitigate some supply disruption. Generally, tantalum follows the following supply chain steps: The primary ore is crushed and milled into an ore concentrate which is further refined into oxides (metal or powder) or K-Salt (which is reduced to tantalum metal), which is used for the manufacture of capacitors, wire, super alloys, and other fabricated forms. Downstream manufacturers use these materials for parts that are used by consumer product manufacturers and others. China has 16 tantalum processing plants; the United States has one, according to the Mancheri study. There are four processing plants in Germany and four in Japan. The metal or powder form is then used by electronics manufacturers to produce capacitors and other products. The manufactured parts are shipped to consumer product producers such as Motorola, Sony, Apple, Dell, and others. China dominates the production of capacitors. As noted in two key statutes, the current goal of U.S. mineral policy is to promote an adequate, stable, and reliable supply of materials for U.S. national security, economic well-being, and industrial production. U.S. mineral policy emphasizes developing domestic supplies of critical materials and encourages the domestic private sector to produce and process those materials. But some raw materials do not exist in economic quantities in the United States, and processing, manufacturing, and other downstream ventures in the United States may not be cost competitive with facilities in other regions of the world. However, there have been public policies enacted or executive branch measures taken (for example, the percentage depletion allowance for U.S. mining operations and royalty-free production on public domain lands) to offset the U.S. disadvantage of its potentially higher-cost operations. The private sector also may achieve lower-cost operations with technology breakthroughs. Based on this policy framework, Congress has held numerous legislative hearings on the impact of the U.S. economy's high import reliance on many critical materials, and on a range of potential federal investments that would support the development of increased domestic production and production from reliable suppliers. There has been a long-term policy interest in mineral import reliance and its impact on national security and the U.S. economy. Mining of locatable minerals (also referred to as hardrock minerals) on federal lands is governed primarily by the General Mining Law of 1872 (30 U.S.C. Â§Â§21-54). The original purposes of the Mining Law were to promote mineral exploration and development on federal lands in the western United States, offer an opportunity to obtain a clear title to mines already being worked, and help settle the West. The Mining Law grants free access to individuals and corporations to prospect for minerals on open public domain lands, and allows them, upon making a discovery, to stake (or \"locate\") a claim on the deposit. A valid claim entitles the holder to develop the minerals. The 1872 Mining Law originally applied to all valuable mineral deposits except coal (17 Stat. 91, 1872, as amended). Public domain lands are those retained under federal ownership since their original acquisition by treaty, cession, or purchase as part of the general territory of the United States, including lands that passed out of but reverted back to federal ownership. \"Acquired\" landsâthose obtained from a state or a private owner through purchase, gift, or condemnation for particular federal purposes rather than as general territory of the United Statesâare subject to leasing only and are not covered by the 1872 Law. Acquired lands are governed under the authority of the Mineral Leasing for Acquired Lands Act of 1947. Under the General Mining Law, mineral claims may be held indefinitely without any mineral production. Once lands were patented to convey full title to the claimant, the owner could use the lands for a variety of purposes, including nonmineral ones. However, using land under an unpatented mining claim for anything but mineral and associated purposes violates the General Mining Law. Critics believe that many claims are held for speculative purposes. However, industry officials argue that a claim may lie idle until market conditions make it profitable to develop the mineral deposit. Congress has placed a moratorium on patenting lands since 1994 under annual appropriation bills. The vast majority of mineral production in the United States occurs on private land and is regulated by the states which may use a leasing and permitting framework. The regulatory framework described below applies primarily to minerals produced on federal land but has implications for the entire U.S. mining industry. There is debate over whether streamlining the permitting process on federal lands would make investing in mining in the United States more attractive or would incentivize investors. Proponents of streamlining the framework maintain that mining firms would be more likely to invest in the United States given a more rapid turnaround of the mine permitting process. However, mining firms have multi-factor decision making processes; they go to where the minerals are, and they often look for low political and country risk (good governance) and a sense of certainty of the regulatory environment, as well as low-cost production opportunities. A debate has emerged over the past several decades over whether the federal government should impose a royalty on the value of minerals produced on public lands, as is the practice on other lands in the United States (i.e., state lands and private lands) and other parts of the world. Further discussion of this debate is beyond the scope of this report. Mineral development activities in the United States are subject to a suite of federal regulatory requirements. The specific statutes and regulations that will apply and how compliance is accomplished will vary depending on the specific mineral development project (e.g., specific actions may be required for compliance with federal law if the mining project may affect a federally protected species). That is, for mining on federal lands, there are various federal regulatory requirements that may apply in addition to the Federal Mining Law of 1872. These requirements encompass environmental reviews, adequate proof of financing, permits, surface management requirements, bonding, and public participation, among other requirements. The Appendix provides a list of the selected statutes and regulations related to mineral development on federal land. A discussion of the regulatory compliance process and the various federal, state, and other entities that may be involved is beyond the scope of this report. The following discussion focuses on the regulatory framework associated with management of and access to minerals for development on federal land. During the 1960s and 1970s, the Multiple Use Sustained Yield Act (16 U.S.C. Â§Â§528-531), Wilderness Act of 1964 (16 U.S.C. Â§Â§1131-1136), National Forest Management Act of 1976 (43 U.S.C. Â§Â§1701 et seq.), National Environmental Policy Act of 1969 (NEPA, 42 U.S.C. Â§Â§4321 et seq.), and Federal Land Policy Management Act (FLPMA) (43 U.S.C. Â§1701 et seq.) addressed environmental protection, multiple use, and management of federal land generally. By imposing requirements on agency actions, these acts have affected mineral development under both the leasing system and the General Mining Law of 1872 claim-patent system. The General Mining Law contains no direct environmental controls, but mining claims are subject to all general environmental laws as a precondition for development. The Bureau of Land Management (BLM) administers the mineral program on all federal land but other land managing agencies, such as the Forest Service (FS) must approve surface disturbing activity on its land. BLM and FS use the mine plan review process (which includes mining methods and reclamation plans) to determine the validity of the mine proposal and to determine how extensive of an environmental review is required under the Federal Land Policy and Management Act of 1976. Under the Federal Land Policy and Management Act of 1976, Resource Management Plans (RMPs) are required for tracts or areas of public lands prior to development. BLM must consider environmental impacts during land-use planning when RMPs are developed and implemented. RMPs can cover large areas, often hundreds of thousands of acres across multiple counties. Through the land-use planning process, BLM determines which lands are open for mining claims and potential development. Regarding land use plans FLPMA states: \"the Secretary [of the Interior] shall with public involvement and consistent with the terms and conditions of this Act, develop, maintain and, when appropriate, revise land use plans which provide by tracts or areas for the use of the public lands.\" Current planning regulations require preparation of an environmental review document for the land use plans under the National Environmental Policy Act. FLPMA requires that RMPs reflect diverse usesâsuch as timber, grazing, wildlife conservation, recreation, and energyâand consider the needs of present and future generations . Impacts of various uses are identified early in the process so that they can be weighed equitably against one another by the BLM. The plans are also intended to weigh the various benefits associated with public lands. The President and executive branch agencies historically issued executive orders, secretarial orders, and public land orders to withdraw federal lands from mineral entry and other uses under what was viewed as the President's authority, including certain statutory authorities such as the Antiquities Act (34 Stat. 225). Since 1976 executive withdrawals are governed by FLPMA. FLPMA repealed earlier land withdrawal authorities. Withdrawals of parcels exceeding 5,000 acres require congressional approval. A withdrawal pursuant to FLPMA restricts the use of land under the multiple-use management framework, typically segregating the land from some or all public land laws as well as some or all of the mining and mineral leasing laws for a period of 20 years. Initially, the area is segregated for two years during which time an environmental review is conducted to determine whether a longer-term withdrawal of 20 years is warranted. The longer-term withdrawal is often subject to renewal by the Department of the Interior. The withdrawal can be temporary or permanent. Under this section of the code the Secretary of the Interior may make, modify, extend, or revoke withdrawals. Generally, federal land withdrawals are subject to valid existing rights, meaning that the minerals rights holder may develop those minerals subject to terms of the federal land-managing agency (e.g., the National Park Service, BLM, or the Forest Service). Mineral industry representatives maintain that federal withdrawals inhibit mineral exploration and limit the reserve base even when conditions are favorable for production. Thus, they state that without new reserves or technological advancements mineral production costs may rise. They further contend that higher domestic costs may lead to greater exploration on foreign soil, potentially boosting U.S. import dependence. Critics of U.S. mineral development state that mining often is an exclusive use of land inasmuch as it can preclude other uses, and that in many cases there is no way to protect other land values and uses short of withdrawal of lands from development under the General Mining Law. They point to unreclaimed areas associated with previous hardrock mineral development, Superfund sites related to past mining and smelting, and instances where development of mineral resources could adversely affect or destroy scenic, historic, cultural, and other resources on public land. Congressional debate has been ongoing for decades over how much federal land should be available for the extractive industries or other uses and how much should be set aside (e.g., off limits or restricted) for conservation or environmental purposes. H.R. 2531 , National Strategic and Critical Minerals Production Act , introduced by Representative Mark E. Amodei on May 7, 2019, and referred to House Committee on Natural Resources. The bill would define critical and strategic minerals and seeks to streamline the federal permitting process for domestic mineral exploration and development. It would establish responsibilities of the \"lead\" federal agency to set mine permitting goals, minimize delays, and follow time schedules when evaluating a mine plan of operations. The review process would be limited to 30 months, and the bill would establish the priority of the lead agency maximizing the development of the mineral resource while mitigating environmental impacts. H.R. 2500 , National Defense Authorization Act (NDAA) for Fiscal Year 2020 , reported in the House. The bill would require the Secretary of Defense to provide guidance on acquiring items containing rare earth elements and guidance on establishing a secure rare earth materials supply chain within the United States. The bill provides authority for the Secretary to acquire rare earth cerium and lanthanum compounds and electrolytic manganese metal. And further, for DOD purposes, the bill would prohibit the acquisition of tantalum from nonallied foreign nations. The reported Senate version ( S. 1790 ) of the FY2020 NDAA does not contain similar language. S. 1317 , American Mineral Security Act , introduced by Senator Murkowski on May 2, 2019, and referred to the Senate Committee on Energy and Natural Resources. The bill would define what critical minerals are, but also would request that the Secretary of the Interior establish a methodology that would identify which minerals qualify as critical. The Secretary of the Interior would be required to maintain a list of critical minerals. The bill would establish an analytical and forecasting capability on mineral/metal market dynamics as part of U.S. mineral policy. The Secretary of the Interior would be required to direct a comprehensive resource assessment of critical mineral resource potential in the United States, assessing the most critical minerals first. The bill would require that an agency review and report be intended to facilitate a more efficient process for critical minerals exploration on federal lands, and specifically would require performance metrics for permitting mineral development activity and report on the timeline of each phase of the process. The bill would require that the Department of Energy establish an R&D program to examine the alternatives to critical minerals and explore recycling and material efficiencies through the supply chain. The Department of the Interior would be required to produce an Annual Critical Minerals Outlook report that would provide forecasts of domestic supply, demand, and price for up to 10 years. The Secretary of Labor, in consultation with the National Science Foundation and other relevant institutions, would be required to assess the availability of domestic technically trained personnel in the exploration production, manufacturing, recycling, forecasting, and analysis of minerals critical to the United States, noting, among other things, skills in short supply now, and those projected to be in short supply in the future. The Secretary would be required to design an interdisciplinary curriculum study on critical minerals and further, establish a competitive grants program for new faculty positions, internships, equipment needs, and research related to critical minerals. There would be $50 million authorized to carry out this act each year for fiscal years 2020-2029. H.R. 520 , National Strategic and Critical Minerals Production Act , introduced by Representative Mark E. Amodei on January 13, 2017, and referred to House Committee on Natural Resources. This bill is similar to H.R. 2531 described above (in the 116 th Congress). H.R. 1407 , METALS Act , introduced by Representative Duncan Hunter on March 7, 2017, and referred to the House Committee on Armed Services. This bill would have established a strategic materials investment fund and allowed the Secretary of Defense to provide loans for domestic production and domestic processing of strategic and critical materials, and supported the development of new technologies for more efficient processing of strategic and critical materials. For fiscal years 2018 through 2023, 1/10 of 1% of the amounts appropriated for \"covered programs\" would have been deposited into the fund. Covered programs would have been all major defense acquisition programs for development or procurement of aircraft or missiles. The bill would have established a prohibition on sale of domestic rare earth mines to foreign firms. H.R. 5515 ( P.L. 115-232 ) , John S. McCain N ational D efense A uthorization A ct for F iscal Year 2019 , included a provision to direct the Secretary of Defense to purchase rare earth permanent magnets and certain tungsten, tantalum, and molybdenum from sources outside of China, Russia, North Korea, and Iran to the extent possible. S. 1460 , Energy and Natural Resources Act of 2017, Subtitle D âCritical Minerals , introduced by Senator Murkowski on June 18, 2017, and referred to the Senate Committee on Energy and Natural Resources. This bill is similar to S. 1317 above (in the 116 th Congress). S. 145 , National Strategic and Critical Minerals Production Act (similar to H.R. 520 in the 115 th Congress), introduced by Senator Heller on January 12, 2017, and referred to the Senate Committee on Energy and Natural Resources. Similar bills on critical minerals were introduced in earlier Congresses. For example, in the 113 th Congress, there was S. 1600 , Critical Minerals Policy Act of 2013, and H.R. 761 , the National Strategic and Critical Minerals Production Act of 2013, which passed the House on September 18, 2013. Another bill in the 113 th Congress, H.R. 4883 , the National Rare Earth Cooperative Act of 2014, proposed to advance domestic refining of heavy rare earth oxides and the safe storage of thorium for future uses using a cooperative ownership approach. Thorium is associated with certain rare earth deposits and waste materials. The cooperative would have operated under a federal charter composed of suppliers and consumers as owners. This section provides a discussion of selected policy options related to critical minerals that were included in legislation introduced in the 115 th and 116 th Congresses. In addition to weighing the advantages and disadvantages of the various policy options discussed above and below, policymakers have the option of maintaining the status quo of current policies. The USGS could establish a Minerals Information Administration for information and analysis on the global mineral/metal supply and demand picture. Companies producing minerals on public lands could be required to report production data to the federal agency. Encouragement of greater exploration for critical minerals in the United States, Australia, Africa, and Canada could be part of a broad international strategy. There are only a few companies in the world that can provide the exploration and development skills and technology for critical mineral development. These few companies are located primarily in the above four regions and China, and may form joint ventures or other types of alliances for R&D, and for exploration and development of critical mineral deposits worldwide, including those in the United States. Whether there should be restrictions on these cooperative efforts in the United States is a question for congressional deliberations. Other action by Congress could include oversight of free trade issues associated with critical mineral supply. Two raw material issues associated with China export restrictions were taken up by the World Trade Organization (WTO). One case, settled in 2011, was filed by the United States against China and was related to restrictions on bauxite, magnesium, manganese, silicon metal, and zinc, among others (using export quotas and export taxes). The other case, resolved in 2012, was filed by the United States, Japan, and the European Union on export restrictions of rare earth oxides, tungsten, and molybdenum. The WTO ruled against China in both cases, concluding that China did not show the link between conservation of resources or environmental protection (and protection of public health) and the need for export restrictions. The United States could support more trade missions; support U.S. commercial delegations to China and other mineral-producing countries; and assist smaller and less-developed countries in improving their governance capacity. Although there are concerns that trade tariffs with China could impact the prices and availability of critical minerals and downstream metals imported from China, the effects would depend on the specifics of the tariffs as well as the particular mineral and metal involved. In China and other emerging economies, economic development will continue to have a major impact on the world supply and availability of raw materials and downstream products. Various countries may be faced with making adjustments to secure needed raw materials, metals, and finished goods for national security and economic development. China, Japan, and others are already actively engaged in securing reliable mineral supplies. Many firms have moved to China to gain access to its market, raw materials, or intermediate products, and generally lower-cost minerals production. At the same time, China is seeking technology transfer from many of these firms to expand its downstream manufacturing capacity. Despite China's current overcapacity and increased exports of some commodities, in the long run it may be in China's interest to use its minerals (plus imports) for domestic manufacturing of higher-valued downstream products (e.g., component parts and consumer electronics). Higher-cost, inefficient facilities and mines may close, resulting in China seeking more imports as mining industry consolidations are implemented. The effects on China's dominance in the supply and demand of global raw materials could be addressed in part through consistent development of alternate sources of supply, use of alternative materials when possible, efficiency gains, aggressive R&D in development of new technologies, and comprehensive minerals information to support this effort. China is likely entering an era of fewer raw material exports which may instigate long-term planning by the private sector and government entities that want to meet U.S. national security, economic, and energy policy interests and challenges. Some stakeholders may seek to have some concerns addressed through the WTO. Additional questions that may be deliberated by Congress include how long would it take to develop the skill set in the United States for downstream manufacturing activities? Would an international educational exchange program with those countries already involved in the refining and recycling of critical minerals be appropriate? More analysis would be useful to investigate U.S. firms' capacity to adjust to supply bottlenecks such as restrictions in other countries' exports, underinvestment in capacity, materials use in other countries and domestically, single source issues, strikes, power outages, natural disasters, political risk, and lack of substitutes. Having such analysis and understanding may inform public policy. More information could inform deliberations as Congress and other policymakers evaluate the available policy options and their effectiveness at minimizing the risk of potential supply interruption of critical and strategic minerals and metals. Selected Statutes that May Impact Mining Activities on Federal Lands (in alphabetical order) American Indian Religious Freedom Act ( P.L. 95-341 ) Clean Air Act, 42 U.S.C. Â§7401 et seq. Clean Water Act, 33 U.S.C. Â§1251 et seq. Endangered Species Act, 16 U.S.C. Â§1531 et seq. Federal Land Policy and Management Act, 43 U.S.C. Â§1701-1784 Federal Mine Safety and Health Act of 1977 ( P.L. 95-164 ) General Mining Law of 1872, 30 U.S.C. Â§21-54 Historic Preservation Act (P.L. 89-665) Mineral Leasing For Acquired Lands Act of 1947, 30 U.S.C. Â§351-359 Mining and Minerals Policy Act of 1970, 30 U.S.C. Â§21a National Environmental Policy Act, 42 U.S.C. Â§4321 et seq. National Forest Management Act 16 U.S.C. Â§1600-1687 National Materials and Minerals Policy, Research, and Development Act of 1980, 30 U.S.C. Â§1601 Resource Conservation and Recovery Act, 42 U.S.C. Â§6901 et seq. Toxic Substance Control Act ( P.L. 94-469 ) Mining-Specific Regulations Bureau of Land Management (BLM): 43 C.F.R. 3809âRegulations on surface management U.S. Forest Service (FS): 36 C.F.R. Part 228âRegulations on minerals", "summary": "President Trump and various U.S. lawmakers have expressed concerns about U.S. reliance on critical mineral imports and potential disruption of supply chains that use critical minerals for various end uses, including defense and electronics applications. Chinese export quotas on a subset of critical minerals referred to as rare earth elements (REEs) and China's 2010 curtailment of REE shipments to Japan heightened U.S. vulnerability concern. In December 2017, Presidential Executive Order 13817, \"A Federal Strategy to Ensure Secure and Reliable Supplies of Critical Minerals,\" tasked the Department of the Interior to coordinate with other executive branch agencies to publish a list of critical minerals. The Department of the Interior published a final list of 35 critical minerals in May 2018. The concern among many in Congress has evolved from REEs and REE supply chains to include other minor minerals and metals that are used in small quantities for a variety of economically significant applications (e.g., laptops, cell phones, electric vehicles, and renewable energy technologies) and national defense applications. Also, as time passed, concerns increased about access to and the reliability of entire supply chains for rare earths and other minerals. Congressional action (e.g., National Defense Authorization Act for FY2014, P.L. 113-66 ) has led to the acquisition of REEs and other materials for the National Defense Stockpile. In 2017, the United States had no primary production of 22 minerals and was limited to byproduct production of 5 minerals on the critical minerals list. In contrast, the United States is a leading producer of beryllium and helium, and there is some U.S. primary production of 9 other critical minerals. China ranked as the lead global producer of 16 minerals and metals listed as critical. Although there are no single monopoly producers in China, as a nation, China is a dominant or near-monopoly producer of yttrium (99%), gallium (94%), magnesium metal (87%), tungsten (82%), bismuth (80%), and rare earth elements (80%). The United States is 100% import reliant on 14 minerals on the critical minerals list (aside from a small amount of recycling). These minerals are difficult to substitute inputs into the U.S. economy and national security applications; they include graphite, manganese, niobium, rare earths, and tantalum, among others. The United States is more than 75% import reliant on an additional 10 critical minerals: antimony, barite, bauxite, bismuth, potash, rhenium, tellurium, tin, titanium concentrate, and uranium. The current goal of U.S. mineral policy is to promote an adequate, stable, and reliable supply of materials for U.S. national security, economic well-being, and industrial production. U.S. mineral policy emphasizes developing domestic supplies of critical materials and encourages the domestic private sector to produce and process those materials. But some raw materials do not exist in economic quantities in the United States, and processing, manufacturing, and other downstream ventures in the United States may not be globally cost competitive. Congress and other decisionmakers have multiple legislative and administration options to weigh in deliberating on whether, and if so how, to address the U.S. role and vulnerabilities related to critical minerals.", "document_type": "crs"}
{"report": "Relations between the United States and Russia have shifted over timeâsometimes reassuring and sometimes concerningâyet most experts agree that Russia is the only nation that poses, through its arsenal of nuclear weapons, an existential threat to the United States. While its nuclear arms have declined sharply in quantity since the end of the Cold War, Russia retains a stockpile of thousands of nuclear weapons, with more than 1,500 warheads deployed on missiles and bombers capable of reaching U.S. territory. The United States has always viewed these weapons as a potential threat to U.S. security and survival. It has not only maintained a nuclear deterrent to counter this threat, it has also signed numerous arms control treaties with the Soviet Union and later Russia in an effort to restrain and reduce the number and capabilities of nuclear weapons. The collapse of the 1987 Intermediate-range Nuclear Forces (INF) Treaty and the possible expiration of the 2010 New Strategic Arms Reduction Treaty (New START) in 2021 may signal the end to mutual restraint and limits on such weapons. The 2018 National Defense Strategy identifies the reemergence of long-term, strategic competition with Russia and China as the \"the central challenge to U.S. prosperity and security.\" It notes that Russia seeks \"to shatter the North Atlantic Treaty Organization and change European and Middle East security and economic structures to its favor.\" It argues that the challenge from Russia is clear when its malign behavior is \"coupled with its expanding and modernizing nuclear arsenal.\" The 2018 Nuclear Posture Review (NPR) amplifies this theme. It notes that \"Russia has demonstrated its willingness to use force to alter the map of Europe and impose its will on its neighbors, backed by implicit and explicit nuclear first-use threats.\" The NPR describes changes to Russia's nuclear doctrine and catalogues Russia's efforts to modernize its nuclear forces, arguing that these efforts have \"increased, and will continue to increase, [Russia's] warhead delivery capacity, and provides Russia with the ability to rapidly expand its deployed warhead numbers.\" Congress has shown growing concern about the challenges Russia poses to the United States and its allies. It has expressed concerns about Russia's nuclear doctrine and nuclear modernization programs and has held hearings focused on Russia's compliance with arms control agreements and the future of the arms control process. Moreover, Members have raised questions about whether U.S. and Russian nuclear modernization programs, combined with the demise of restraints on U.S. and Russian nuclear forces, may be fueling an arms race and undermining strategic stability. This report seeks to advise this debate by providing information about Russia's nuclear doctrine, its current nuclear force structure, and its ongoing nuclear modernization programs. It is divided into five sections. The first section describes Russia's nuclear strategy and focuses on ways in which that strategy differs from that of the Soviet Union. The second section provides a historical overview of the Soviet Union's nuclear force structure. The third section details Russia's current force structure, including its long-range intercontinental ballistic missiles (ICBM), submarine-launched ballistic missiles (SLBM), and heavy bombers and shorter-range nonstrategic nuclear weapons. This section also highlights key elements of relevant infrastructure, including early warning, command and control, production, testing, and warhead storage. It also describes the key modernization programs that Russia is pursuing to maintain and, in some cases, expand its nuclear arsenal. The fourth section focuses on how arms control has affected the size and structure of Russia's nuclear forces. The fifth section discusses several potential issues for Congress. The Soviet Union valued nuclear weapons for both their political and military attributes. From a political perspective, nuclear weapons served as a measure of Soviet status, while nuclear parity with the United States offered the Soviet Union prestige and influence in international affairs. From a military perspective, the Soviet Union considered nuclear weapons to be instrumental to its plans for fighting and prevailing in a conventional war that escalated to a nuclear one. As a leading Russian analyst has written, \"for the first quarter-century of the nuclear age, the fundamental assumption of Soviet military doctrine was that, if a global war was unleashed by the 'imperialist West,' the Soviet Union would defeat the enemy and achieve victory, despite the enormous ensuing damage.\" Soviet views on nuclear weapons gradually evolved as the United States and the Soviet Union engaged in arms control talks in the wake of the 1962 Cuban Missile Crisis, and as the Soviet Union achieved parity with the United States. During the 1960s, both countries recognized the reality of the concept of \"Mutually Assured Destruction\" (MAD)âa situation in which both sides had nuclear retaliatory capabilities that prevented either side from prevailing in an all-out nuclear war. Analysts argue that the reality that neither side could initiate a nuclear war without facing the certainty of a devastating retaliatory attack from the other was codified in the agreements negotiated during the Strategic Arms Limitation Talks (SALT). With the signing of the 1972 Anti-Ballistic Missile (ABM) Treaty, both sides accepted limits on their ability to protect themselves from a retaliatory nuclear attack, thus presumably reducing incentives for either side to engage in a nuclear first strike. The Soviet Union offered rhetorical support to the nonuse of nuclear weapons throughout the 1960s and 1970s. At the time, this approach placed the Soviet Union on the moral high ground with nonaligned nations during the negotiations on the Nuclear Nonproliferation Treaty. The United States and its NATO allies refused to adopt a similar pledge, maintaining a \"flexible response\" policy that allowed for the possible use of nuclear weapons in response to a massive conventional attack by the Soviet Union and its Warsaw Pact allies. At the same time, however, most U.S. analysts doubted that Soviet support for the nonuse of nuclear weapons actually influenced Soviet warfighting plans, even though Soviet-Warsaw Pact advantages in conventional forces along the Central European front meant that the Soviet Union would not necessarily need to use nuclear weapons first. U.S. and NATO skepticism about a Soviet nonuse policy reflected concerns about the Soviet military buildup of a vast arsenal of battlefield and shorter-range nuclear delivery systems. These systems could have been employed on a European battlefield in the event of a conflict with the United States and NATO. On the other hand, interviews with Soviet military officials have suggested that this theater nuclear buildup was intended to \"reduce the probability of NATO's first use [of nuclear weapons] and thereby to keep the war conventional.\" In addition, many U.S. commentators feared that the Soviet Union might launch a \"bolt from the blue\" attack against U.S. territory even in the absence of escalation from a conflict in Europe. Other military analysts suspect that the Soviet Union would not have initiated such an attack and likely did not have the capability to conduct an disarming attack against U.S. nuclear forcesâa capability that would have been needed to restrain the effectiveness of a U.S. retaliatory strike. Instead, the Soviet Union might have launched its weapons on warning of an imminent attack, which has sometimes been translated as a retaliatory reciprocal counter strike , or in a retaliatory strike after initial nuclear detonations on Soviet soil. Many believe that, in practice, the Soviet Union planned only for these latter retaliatory strikes. Regardless, some scholars argue that the Soviet leadership likely retained the option of launching a first strike against the United States. Improvements to the accuracy of U.S. ballistic missiles raised concerns in the Soviet Union about the ability of retaliatory forces to survive a U.S. attack. For Soviet leaders, the increasing vulnerability of Soviet missile silos called into question the stability of mutual deterrence and possibly raised questions about the Soviet Union's international standing and bargaining position in arms control negotiations with the United States. In 1982, General Secretary Leonid Brezhnev officially announced that the Soviet Union would not be the first nation to use nuclear weapons in a conflict. When General Secretary Brezhnev formally enunciated the Soviet no-first-use policy in the 1980s, actual Soviet military doctrine may have become more consistent with this declaratory doctrine, as the Soviet military hoped to keep a conflict in the European theater conventional. In addition, by the end of the decade, and especially in the aftermath of the accident at the Chernobyl Nuclear Power Plant, Soviet leader Mikhail Gorbachev believed that the use of nuclear weapons would lead to catastrophic consequences. Russia has altered and adjusted Soviet nuclear doctrine to meet the circumstances of the post-Cold War world. In 1993, Russia explicitly rejected the Soviet Union's no-first-use pledge, in part because of the weakness of its conventional forces at the time. Russia has subsequently revised its military doctrine and national security concept several times over the past few decades, with successive versions in the 1990s appearing to place a greater reliance on nuclear weapons. For example, the national security concept issued in 1997 allowed for the use of nuclear weapons \"in case of a threat to the existence of the Russian Federation as an independent sovereign state.\" The military doctrine published in 2000 expanded the circumstances in which Russia might use nuclear weapons, including in response to attacks using weapons of mass destruction against Russia or its allies, as well as in response to \"large-scale aggression utilizing conventional weapons in situations critical to the national security of the Russian Federation.\" These revisions have led to questions about whether Russia would employ nuclear weapons preemptively in a regional war or only in response to the use of nuclear weapons in a broader conflict. In mid-2009, Nikolai Patrushev, the head of Russia's Security Council, hinted that Russia would have the option to launch a \"preemptive nuclear strike\" against an aggressor \"using conventional weapons in an all-out, regional, or even local war.\" However, when Russia updated its military doctrine in 2010, it did not specifically provide for the preemptive use of nuclear weapons. Instead, the doctrine stated that Russia \"reserves the right to utilize nuclear weapons in response to the utilization of nuclear and other types of weapons of mass destruction against it and (or) its allies, and also in the event of aggression against the Russian Federation involving the use of conventional weapons when the very existence of the state is under threat.\" Compared with the 2000 version, which allowed for nuclear use \"in situations critical to the national security of the Russian Federation,\" this change seemed to narrow the conditions for nuclear weapons use. The language on nuclear weapons in Russia's most current 2014 military doctrine is similar to that in the 2010 doctrine. Analysts have identified several factors that contributed to Russia's increasing reliance on nuclear weapons during the 1990s. First, with the demise of the Soviet Union and Russia's subsequent economic collapse, Russia no longer had the means to support large and effective conventional forces. Conflicts in the Russian region of Chechnya and, in 2008, neighboring Georgia also highlighted seeming weaknesses in Russia's conventional military forces. In addition, Russian analysts saw emerging threats in other neighboring post-Soviet states; many analysts believed that by even implicitly threatening that it might resort to nuclear weapons, Russia hoped it could enhance its ability to deter the start of, or NATO interference in, such regional conflicts. Russia's sense of vulnerability, and its view that its security was being increasingly threatened, also stemmed from NATO enlargement. Russia has long feared that an expanding alliance would create a new challenge to Russia's security, particularly if NATO were to move nuclear weapons closer to Russia's borders. These concerns contributed to the statement in the 1997 doctrine that Russia might use nuclear weapons if its national survival was threatened. For many in Russia, NATO's air campaign in Kosovo in 1999 underlined Russia's growing weakness and NATO's increasing willingness to threaten Russian interests. Russia's 2000 National Security Concept noted that the level and scope of the military threat to Russia was growing. It cited, specifically, \"the desire of some states and international associations to diminish the role of existing mechanisms for ensuring international security.\" It also noted that \"a vital task of the Russian Federation is to exercise deterrence to prevent aggression on any scale, nuclear or otherwise, against Russia and its allies.\" Consequently, it concluded, Russia \"must have nuclear forces capable of delivering specified damage to any aggressor state or a coalition of states in any situation.\" The potential threat from NATO remained a concern for Russia in its 2010 and 2014 military doctrines. The 2010 doctrine stated that the main external military dangers to Russia were \"the desire to endow the force potential of the North Atlantic Treaty Organization (NATO) with global functions carried out in violation of the norms of international law and to move the military infrastructure of NATO member countries closer to the borders of the Russian Federation, including by expanding the bloc.\" It also noted that Russia was threatened by \"the deployment of troop contingents of foreign states (groups of states) on the territories of states contiguous with the Russian Federation and its allies and also in adjacent waters\" (a reference to the fact that NATO now included states that had been part of the Warsaw Pact). Russian concerns also extend ed to U.S. missile defense deployed on land in Poland and Romania and at sea near Russian territory as a part of the European Phased Adaptive Approach (EPAA). Russia's possession of a large arsenal of nonstrategic nuclear weapons and dual-capable systems, combined with recent statements designed to remind others of the strength of Russia's nuclear deterrent, have led some to argue that Russia has increased the role of nuclear weapons in its military strategy and military planning. Before Russia's invasion of Ukraine in 2014, some analysts argued that Russia's nonstrategic nuclear weapons had \"no defined mission and no deterrence framework [had] been elaborated for them.\" However, subsequent Russian statements, coupled with military exercises that appeared to simulate the use of nuclear weapons against NATO members, have led many to believe that Russia might threaten to use its shorter-range, nonstrategic nuclear weapons to coerce or intimidate its neighbors. Such a nuclear threat could occur before or during a conflict if Russia believed that a threat to use nuclear weapons could lead its adversaries, including the United States and its allies, to back down. Consequently, several analysts have argued that Russia has adopted an \"escalate to de-escalate\" nuclear doctrine. They contend that when faced with the likelihood of defeat in a military conflict with NATO, Russia might threaten to use nuclear weapons in an effort to coerce NATO members to withdraw from the battlefield. This view of Russian doctrine has been advanced by officials in the Trump Administration and has informed decisions made during the 2018 Nuclear Posture Review. However, Russia does not use the phrase \"escalate to de-escalate\" in any versions of its military doctrine, and debate exists about whether this is an accurate characterization of Russian thinking about nuclear weapons. Conflicting statements from Russia have contributed to disagreements among U.S. analysts over the circumstances under which Russia would use nuclear weapons. During a March 2018 speech to the Federal Assembly, President Putin seemed to affirm the broad role for nuclear weapons that Russia's military doctrine assigns: I should note that our military doctrine says Russia reserves the right to use nuclear weapons solely in response to a nuclear attack, or an attack with other weapons of mass destruction against the country or its allies, or an act of aggression against us with the use of conventional weapons that threaten the very existence of the state. This all is very clear and specific. As such, I see it is my duty to announce the following. Any use of nuclear weapons against Russia or its allies, weapons of short, medium or any range at all, will be considered as a nuclear attack on this country. Retaliation will be immediate, with all the attendant consequences. There should be no doubt about this whatsoever. Putin and other Russian officials have extensively used what some Western analysts have described as \"nuclear messaging\" in the wake of Russia's annexation of Crimea and instigation of conflict in eastern Ukraine. Their references to Russia's nuclear capabilities have seemed like an effort to signal that Russia's stakes are higher than those of the West and that Russia is willing to go to great lengths to protect its interests. At times, however, President Putin has offered a more restrained view of the role of nuclear weapons. In 2016, Putin stated that \"brandishing nuclear weapons is the last thing to do. This is harmful rhetoric, and I do not welcome it.\" He also dismissed suggestions that Russia would consider using nuclear weapons offensively, stating that \"nuclear weapons are a deterrent and a factor of ensuring peace and security worldwide. They should not be considered as a factor in any potential aggression, because it is impossible, and it would probably mean the end of our civilization.\" In October 2018, President Putin made a statement that some analysts interpreted as potentially moving toward a \"sole purpose\" doctrine, by which Russia would use nuclear weapons only in response to others' use of nuclear weapons. Putin declared: There is no provision for a preventive strike in our nuclear weapons doctrine. Our concept is based on a retaliatory reciprocal counter strike. This means that we are prepared and will use nuclear weapons only when we know for certain that some potential aggressor is attacking Russia, our territory [with nuclear weapons]â¦. Only when we know for certainâand this takes a few seconds to understandâthat Russia is being attacked will we deliver a counterstrikeâ¦. Of course, this amounts to a global catastrophe, but I would like to repeat that we cannot be the initiators of such a catastrophe because we have no provision for a preventive strike. The Soviet Union conducted its first explosive test of a nuclear device on August 29, 1949, four years after the United States employed nuclear weapons against Japan at the end of World War II. After this test, the Soviet Union initiated the serial production of nuclear devices and work on thermonuclear weapons, and it began to explore delivery methods for its nascent nuclear arsenal. The Soviet Union tested its first version of a thermonuclear bomb in 1953, two years after the United States crossed that threshold. The Soviet stockpile of nuclear warheads grew rapidly through the 1960s and 1970s, peaking at more than 40,000 warheads in 1986, according to unclassified estimates (see Figure 1 ). Within this total, around 10,700 warheads were carried by long-range delivery systems, the strategic forces that could reach targets in the United States in the mid-1980s. By the 1960s, the Soviet Union, like the United States, had developed a triad of nuclear forces: land-based intercontinental ballistic missiles (ICBMs), submarine-launched ballistic missiles (SLBMs), and heavy bombers equipped with nuclear weapons. In 1951, the Soviet Union conducted its first air drop test of a nuclear bomb and began to deploy nuclear weapons with its Long-Range Aviation forces soon thereafter. Bomber aircraft included the M-4 Bison, which barely had the range needed to attack the United States and then return home. The Tu-95 Bear strategic bomber, which had a longer range, entered service in 1956. Later modifications of the Bear bomber have since been the mainstay of the Soviet/Russian nuclear triad's air leg. In 1956, the Soviet Union tested and deployed its first ballistic missile with a nuclear warhead, the SS-3, a shorter-range, or theater, missile. It tested and deployed the SS-4, a theater ballistic missile that would be at the heart of the 1962 Cuban Missile Crisis, by 1959. Soviet missile ranges were further extended with the deployment of an intermediate-range ballistic missile, the SS-5. The 1957 launch of the Sputnik satellite on a modified SS-6 long-range missile heralded the Soviet Union's development of ICBMs. By the end of the decade, the Soviet Union had launched an SS-N-1 SLBM from a Zulu-class attack submarine of the Soviet Navy. The undersea leg of the triad would steadily progress over the following decade with the deployment of SLBMs on the Golf class attack submarine and then the Hotel and Yankee class nuclear-powered submarines. Manned since 1959 by a separate military service called the Strategic Rocket Forces, the ICBM leg came to dominate the Soviet nuclear triad. During the 1960s, the Soviet Union rapidly augmented its force of fixed land-based ICBMs, expanding from around 10 launchers and two types of missiles in 1961 to just over 1,500 launchers with eight different types of missiles in 1971. Because these missiles were initially based on soft launch pads or in vertical silos that could not withstand an attack from U.S. nuclear warheads, many concluded that the Soviet Union likely planned to use them in a first strike attack against U.S. missile forces and U.S. territory. Moreover, the United States believed that the design of Soviet ICBMs provided the Soviet Union with the ability to contemplate, and possibly execute, a successful disarming first strike against U.S. land-based forces. Half of the ICBM missile types were different variants of the largest missile, the SS-9 ICBM. The United States referred to this as a \"heavy\" ICBM due to its significant throwweight, which allowed it to carry a higher-yield warhead, estimated at around 20 megatons. The United States believed, possibly inaccurately, that the missile's combination of improved accuracy and high yield posed a unique threat to U.S. land-based missiles. Concerns about Soviet heavy ICBMs persisted throughout the Cold War, affecting both U.S. force structure decisions and U.S. proposals for arms control negotiations. Although smaller and less capable than its land-based forces, the sea-based leg of the Soviet triad was built up during the 1960s, with the deployment of SLBMs on Golf-, Hotel-, and Yankee- class submarines. These submarines carried intermediate-range (rather than intercontinental-range) missiles, but their mobility allowed the Soviet Union to threaten targets throughout Europe and, to a lesser extent, in the United States. The Soviet Union began the decade with 30 missile launchers on 10 submarines and ended it with 228 launchers on 31 submarines. By the end of the 1960s, the United States and the Soviet Union had initiated negotiations to limit the numbers of launchers for long-range missiles. The emerging parity in numbers of deployed nuclear-armed missiles, coupled with several nuclear crises, had paved the way for a recognition of their mutual deterrence relationship and arms control talks. As noted below, the Interim Agreement on Offensive Armsânegotiated as part of the Strategic Arms Limitation Talks (SALT I) and signed in 1972âcapped the construction and size of ICBM silo launchers (in an effort to limit the number of heavy ICBMs in the Soviet force) and limited the number of launchers for SLBMs. It did not, however, limit the nuclear warheads that could be carried by ICBMs or SLBMs. As a result, the Soviet Union continued to modernize and expand its nuclear forces in the 1970s. During this time, the Soviet Union commissioned numerous Delta-class strategic missile submarines, armed with the single-warhead, intercontinental-range SS-N-8 SLBM; developed the Tu-22M Backfire intermediate-range bomber aircraft; began to develop a new supersonic strategic heavy bomber (eventually the Tu-160 Blackjack); and began to deploy the SS-20 intermediate-range ballistic missile in 1976, which, along with other missiles of its class, would be eliminated under the 1987 INF Treaty. The Soviet Union also pursued an extensive expansion of its land-based ICBM force. It not only developed a number of new types of ICBMs, but, in 1974, it began to deploy these missiles with multiple warheads (known as MIRVs, or multiple independent reentry vehicles). During this time frame the Soviet Union developed, tested, and deployed the 4-warhead SS-17 ICBM, 10-warhead SS-18 ICBM (a new heavy ICBM that replaced the SS-9), and 6-warhead SS-19 ICBM. Because each of these missiles could carry multiple warheads, the SALT I limit on ICBM launchers did not constrain the number of warheads on the Soviet missile force. Moreover, the ICBM force began to dominate the Soviet triad during this time (see Figure 2 ). U.S. analysts and officials expressed particular concern about the heavy SS-18 ICBM and its subsequent modifications. The Soviet Union deployed 308 of these missiles, each with the ability to carry up to 10 warheads and numerous decoys and penetration aides designed to confuse missile defense radars. These concerns contributed to a debate in the U.S. defense community about a \"window of vulnerability\" in the U.S.-Soviet nuclear balance due to a Soviet advantage in cumulative ballistic missile throwweight. Some asserted that the Soviets' throwweight advantage could translate into an edge in the number of warheads deployed on land-based missiles. They postulated that the Soviet Union could attack all U.S. land-based missiles with just a portion of the Soviet land-based force, leaving it with enough warheads after an initial nuclear attack to dominate and possibly coerce the United States into surrendering without any retaliation. Others disputed this theory, noting that the United States maintained a majority of its nuclear warheads on sea-based systems that could survive a Soviet first strike and that the synergy of U.S. land-based, sea-based, and air-delivered weapons would complicate, and therefore deter, a Soviet first strike. Recent research examining the records of Soviet planners and officials suggests that Soviet missile developments during the 1970s did not seek to achieve, and did not have the capabilities needed for, a first-strike advantage or a warfighting posture. Instead, the Soviet Union began to harden its missile silos so they could survive attack and to develop an early warning system, thus moving toward a second-strike capability. Moreover, the 1980s saw Soviet planners worrying about maintaining their second-strike capability in light of U.S. strategic offense and missile defense programs. The United States was modernizing its land-based ICBMs, ballistic missile submarines and SLBMs, and heavy bombers. Each of the new U.S. missiles would carry multiple warheads, and the Soviets believed all would have the accuracy to target and destroy Soviet land-based missiles. In March 1983, President Reagan announced the Strategic Defense Initiative, a missile defense program that he pledged would make ballistic missiles \"impotent and obsolete.\" The SS-18 ICBM, with its capacity to carry 10 warheads and penetration aids, provided a counter to these U.S. capabilities. During the 1980s, development continued across all three legs of the Soviet nuclear triad. The Typhoon-class strategic submarine and the Tu-160 Blackjack bomber entered into service. Anti-ship cruise missiles were joined by modern AS-15 land-attack cruise missiles. The Soviet Union continued to improve the accuracy of its fixed, silo-based missiles and began to deploy mobile ICBMs, adding both the road-mobile, single warhead SS-25 missile and the rail-mobile, 10-warhead SS-24 missile. By the end of the 1980s, prior to the signing of the 1991 Strategic Arms Reduction Treaty (START), the Soviet Union had completed the backbone of what was to become the Russian nuclear triad of the 1990s. Its air leg consisted of Bear, Backfire, and Blackjack bombers. Its undersea leg consisted of Delta- and Typhoon-class submarines with MIRV SLBMs. Its ICBM leg consisted of the SS-18, SS-19, and SS-25 missiles. During the Cold War, the Soviet Union produced and deployed a wide range of delivery vehicles for nonstrategic nuclear weapons. At different times during the period, it deployed devices small enough to fit into a suitcase-sized container; nuclear mines; shells for artillery; short-, medium-, and intermediate-range ballistic missiles; short-range, air-delivered missiles; and gravity bombs. The Soviet Union deployed these weapons at nearly 600 bases, with some located in Warsaw Pact countries in Eastern Europe, some in the Soviet Union's non-Russian republics along its western and southern perimeter, and others throughout the Soviet Union. Estimates vary, but many analysts believe that by 1991 the Soviet Union had more than 20,000 of these weapons. Before the collapse of the Warsaw Pact in 1989, the numbers may have been higher, in the range of 25,000 weapons. Like the Soviet Union, the Russia Federation maintains a triad of nuclear forces consisting of ICBMs, SLBMs, and heavy bombers. The total number of warheads in the Soviet and Russian arsenal and the number deployed on Soviet and Russian strategic forces began to decline in the late 1980s (see Figure 1 and Figure 2 above). These reductions were primarily driven by the limits in the 1991 START I Treaty, the 2002 Strategic Offensive Reductions Treaty, and the 2010 New START Treaty. The reductions also reflect the retirement of many older Soviet-era missiles and their replacement with new missiles that carry fewer warheads, as well as the effects of the fiscal crisis in the late 1990s, which slowed the deployment of the next generation of Russian missiles and submarines. Moreover, under the Nunn-Lugar Cooperative Threat Reduction program, the United States helped Russia, Ukraine, Belarus, and Kazakhstan move Soviet-era nuclear weapons back to Russian territory and to dismantle portions of the Soviet Union's nuclear arsenal. Russia deploys its strategic nuclear forces at more than a dozen bases across its territory. These bases are shown on Figure 4 , below. Russia is currently modernizing most of the components of its nuclear triad. The current phase of modernization essentially began in 1998. The Soviet Union replaced its land-based missiles frequently, with new systems entering the force every 10-15 years and modifications appearing every few years. Russia has not kept up this pace. When it began the most recent modernization cycle, it was in the midst of a financial crisis. The crisis not only reduced the number of new missiles entering the force each year, but slowed the process. As a result, some of the systems that have had been under development since the late 1990s and early 2000s began to enter the force in the late 2000s, but others will not do so until the 2020s. As was the case during the Soviet era, Russia's Strategic Rocket Forces (SRF) are a separate branch of the Russian armed forces. These forces are still the mainstay of Russia's nuclear triad. Today, the SRF includes three missile armies, which, in turn, comprise 11 missile divisions (see Figure 3 ). These divisions are spread across Russia's territory, from Vypolzovo in the west to the Irkutsk region in eastern Siberia. The Strategic Rocket Forces are estimated to have approximately 60,000 personnel. According to official and unofficial sources, Russia's ICBM force currently comprises 318 missiles that can carry up to 1,165 warheads, although only about 860 warheads are deployed and available for use. Over half of these missiles are MIRVed, carrying multiple warheads. Russia is modernizing its ICBM force, replacing the last of the missiles remaining from the Soviet era with new single warhead and multiple warhead missiles. According to U.S. estimates, Russia is likely to complete this modernization around 2022. It is anticipated that, after modernization, Russia's ICBM force will come to rely primarily on two missiles: the single-warhead SS-27 Mod 1 (Topol-M) and the SS-27 Mod 2 (Yars), which can carry up to 4 MIRV warheads. As discussed below, Russia is developing a new heavy ICBM, known as the Sarmat (SS-X-30), which is expected to deploy with 10 or more warheads on each missile. It may also carry the new Avangard hypersonic glide vehicle, also described below. According to unclassified reports, Russia has pursued other projects, including an intermediate-range version of the SS-27 Mod 2 (known as the RS-26) and a rail-mobile ICBM called Barguzin, but their future is unclear. Russia's Strategic Naval Forces are a part of the Russian Navy. Ballistic missile submarines are deployed with the Northern Fleet, headquartered in Severomorsk in the Murmansk region, and the Pacific Fleet, headquartered in Vladivostok. The Strategic Naval Forces have 10 strategic submarines of three different types: Delta, Typhoon, and Borei class. Some of these are no longer operational. The last submarine of the Typhoon class is used as a testbed for launches of the Bulava missile, which is deployed on the Borei-class submarines. The Delta and Borei-class submarines can each carry 16 SLBMs, with multiple warheads on a missile, \"for a combined maximum loading of more than 700 warheads.\" However, because Russia may have reduced the number of warheads on some of the missiles to comply with limitations set by the 2010 New START Treaty, the submarine fleet may carry only 600 warheads. Most of the submarines in Russia's fleet are the older Delta class, including one Delta III submarine and 6 Delta IV submarines. The last of these was built in 1992; they are based with Russia's Northern Fleet. Although older Delta submarines were deployed with three-warhead SS-N-18 missiles, the Delta IV submarines carry the four-warhead SS-N-23 missile. An upgraded version of this missile, known as the Sineva system, entered into service in 2007. Another modification, known as the Liner (or Layner), could reportedly carry up to 10 warheads. Russia began constructing the lead ship in its Borei class of ballistic missile submarines (SSBN) in 1996. After numerous delays, the lead ship joined the Northern Fleet in 2013. According to public reports, Russia will eventually deploy 10 Borei-class submarines, with 5 in the Pacific Fleet and 5 in the Northern Fleet. Three submarines are currently in service, all in the Northern Fleet, and five more are in \"various stages of construction.\" The latter five submarines will be an improved version, known as the Borei-A/II. The first of these has recently completed its sea trials. Russia plans to complete the first eight ships by 2023 and to finish the last two by 2027. Borei-class submarines can carry 16 of the SS-N-32 Bulava missiles; each missile can carry six warheads. The Bulava missile began development in the late 1990s. It experienced numerous test failures before it entered service in 2018. Russia's strategic aviation units are part of the Russian Aerospace Forces' Long-Range Aviation Command. This command includes two divisions of Tu-160 (Blackjack) and Tu-95MS (Bear H) aircraft, which are the current mainstay of Russia's strategic bomber fleet. These are located in the Saratov region, in southwestern Russia, and the Amurskaya region, in Russia's Far East. Unclassified sources estimate that Russia has 60 to 70 bombers in its inventoryâ50 of them count under the New START Treaty. Around 50 of these are Tu-95MS Bear bombers; the rest are Tu-160 Blackjack bombers. The former can carry up to 16 AS-15 (Kh-55) nuclear-armed cruise missiles, while the latter can carry up to 12 AS-15 nuclear-armed cruise missiles. Both bombers can also carry nuclear gravity bombs, though experts contend that the bombers would be vulnerable to U.S. or allied air defenses in such a delivery mission. Russia has recently modernized both of its bombers, fitting them with a new cruise missile system, the conventional AS-23A (Kh-101) and the nuclear AS-23B (Kh-102). A newer version of the Tu-160, which is expected to include improved stealth characteristics and a longer range, is set to begin production in the mid-2020s. Experts believe the fleet will then include around 50-60 aircraft, with the eventual development of a new stealth bomber, known as the PAK-DA, as a part of Russia's long-term plans. Russia has a variety of delivery systems that can carry nuclear warheads to shorter and intermediate ranges. These systems are generally referred to as nonstrategic nuclear weapons, and they do not fall under the limits in U.S.-Soviet or U.S.-Russian arms control treaties. According to unclassified reports, Russia has a number of nuclear weapons available for use by its \"naval, tactical air, air- and missile defense forces, as well as on short-range ballistic missiles.\" It is reportedly engaged in a modernization effort focused on \"phasing out Soviet-era weapons and replacing them with newer versions.\" Unclassified estimates place the number of warheads assigned to nonstrategic nuclear weapons at 1,830. Recent analyses indicate that Russia is both modernizing existing types of short-range delivery systems that can carry nuclear warheads and introducing new versions of weapons that have not been a part of the Soviet/Russian arsenal since the latter years of the Cold War. In May 2019, Lt. Gen. Robert P. Ashley of the Defense Intelligence Agency (DIA) raised this point in a public speech. He stated that Russia has 2,000 nonstrategic nuclear warheads and that its stockpile \"is likely to grow significantly over the next decade.\" He also stated that Russia is adding new military capabilities to its existing stockpile of nonstrategic nuclear weapons, including those employable by ships, aircraft, and ground forces. These nuclear warheads include theater- and tactical-range systems that Russia relies on to deter and defeat NATO or China in a conflict. Russia's stockpile of non-strategic nuclear weapons [is] already large and diverse and is being modernized with an eye towards greater accuracy, longer ranges, and lower yields to suit their potential warfighting role. We assess Russia to have dozens of these systems already deployed or in development. They include, but are not limited to: short- and close-range ballistic missiles, ground-launched cruise missiles, including the 9M729 missile, which the U.S. Government determined violates the Intermediate-Range Nuclear Forces or INF Treaty, as well as antiship and antisubmarine missiles, torpedoes, and depth charges. It is not clear from General Ashley's comments, or from many of the other assessments of Russia's nonstrategic nuclear forces, whether Russia will deploy these new delivery systems with nuclear warheads. Many of Russia's medium- and intermediate-range missile systems, including the Kalibr sea-launched cruise missile and the Iskander ballistic and cruise missiles, are dual-capable and can carry either nuclear or conventional warheads. This is also likely true of the new 9M729 land-based, ground-launched cruise missile, the missile that the United States has identified as a violation of the 1987 INF Treaty. It unclear why Russia retains, and may expand, its stockpile of nonstrategic nuclear weapons. Some argue that these weapons serve to bolster Russia's less capable conventional military forces and assert that as Russia develops more capable advanced conventional weapons, it may limit its nonstrategic modernization program and retire more of these weapons than it acquires. Others, however, see Russia's modernization of its nonstrategic nuclear weapons as complementary to an \"escalate to de-escalate\" nuclear doctrine and argue that Russia will expand its nonstrategic nuclear forces as it raises the profile of such weapons in its doctrine and warfighting plans. Russia deploys an extensive early warning system. Operated by its Aerospace Forces, the system consists of a network of early warning satellites that transmit to two command centers: one in the East, in the Khabarovsk region, and one in the West, in the Kaluga region. The data are then transmitted to a command center in the Moscow region. Russia also operates an extensive network of ground-based radars across Russia, as well as in neighboring Kazakhstan and Belarus, that are used for early warning of missile launches and to monitor objects at low-earth orbits. Russia uses the Okno observation station, located in Tajikistan, to monitor of objects that orbit at higher altitudes. The Russian President is the Supreme Commander in Chief of the Russian Armed Forces, and he has the authority to direct the use of nuclear weapons. According to a 2016 DIA report, \"The General Staff monitors the status of the weapons of the nuclear triad and will send the direct command to the launch crews following the president's decision to use nuclear weapons. The Russians send this command over multiple C2 systems, which creates a redundant dissemination process to guarantee that they can launch their nuclear weapons.\" According to DIA, Russia \"also maintains the Perimetr system, which is designed to ensure that a retaliatory launch can be ordered when Russia is under nuclear attack.\" It is unknown whether the order to transfer warheads from central storage and release them to the forces is part of the launch authorization. Russia has an extensive infrastructure of facilities for the production of nuclear weapons and missiles, although it has consolidated and reduced the size of this infrastructure since the end of the Cold War. Moreover, Russia has improved the security of its nuclear weapons facilities through U.S.-Russian cooperation under the Nunn-Lugar CTR program. Russia has about a dozen research institutes and facilities that participate in the design and manufacture of nuclear and nonnuclear components for its nuclear weapons, provide stockpile support, and engage in civilian nuclear and other research. Russia, which has a significant stockpile of weapons-usable materials, no longer produces highly enriched uranium or plutonium for use in nuclear weapons. Russia's nuclear weapons are stored at approximately 12 national central storage sites. According to analysts, Russia also maintains 34 base-level storage facilities (see Appendix B ). A special unit, the 12 th Main Directorate (GUMO), is responsible for security, transportation, and handling of the warheads. In a period immediately preceding a conflict, it is anticipated that nuclear warheads could be transferred from the national central storage sites to the base-level facilities. Russia ratified the Comprehensive Test Ban Treaty (CTBT) in 2000. Although this treaty has yet to enter into force, Russia claims it has refrained from explosive nuclear testing in accordance with the treaty's requirements. Russia conducts hydrodynamic tests, which do not produce a nuclear yield, at a site located on Novaya Zemlya, an archipelago located in the Arctic Ocean. In his May 2019 speech, DIA Director General Ashley stated that \"the United States believes that Russia probably is not adhering to its nuclear testing moratorium in a manner consistent with the 'zero-yield' standard.\" However, when questioned about this assertion, he said that the U.S. intelligence community does not have \"specific evidence that Russia had conducted low-yield nuclear tests\" but that the DIA thinks Russia has \"the capability to do that.\" In addition to replacing aging Soviet-era ICBMs, SLBMs, and ballistic missile submarines, Russia is developing several kinds of nuclear delivery vehicles. Some of these, like the Sarmat ICBM, may replicate capabilities that already exist; others could expand the force with new types of delivery systems not previously deployed with nuclear warheads. President Putin unveiled most of these systems during his March 1, 2018, annual State of the Nation address to the Federal Assembly, when he presented a range of weapons systems currently under development in Russia. His speech also featured videos and animations of new weapons systems. During his speech, President Putin explicitly linked Russia's new strategic weapons programs to the U.S. withdrawal from the ABM Treaty in 2002. He said: We did our best to dissuade the Americans from withdrawing from the treaty. All in vain. The US pulled out of the treaty in 2002. Even after that we tried to develop constructive dialogue with the Americans. We proposed working together in this area to ease concerns and maintain the atmosphere of trust. At one point, I thought that a compromise was possible, but this was not to be. All our proposals, absolutely all of them, were rejected. And then we said that we would have to improve our modern strike systems to protect our security . [Emphasis added] In reply, the US said that it is not creating a global BMD system against Russia, which is free to do as it pleases, and that the US will presume that our actions are not spearheaded against the USâ¦. â¦ the US, is permitting constant, uncontrolled growth of the number of anti-ballistic missiles, improving their quality, and creating new missile launching areas. If we do not do something, eventually this will result in the complete devaluation of Russia's nuclear potential. Meaning that all of our missiles could simply be intercepted. Let me recall that the United States is creating a global missile defence system primarily for countering strategic arms that follow ballistic trajectories. These weapons form the backbone of our nuclear deterrence forces, just as of other members of the nuclear club. As such, Russia has developed, and works continuously to perfect, highly effective but modestly priced systems to overcome missile defence. They are installed on all of our intercontinental ballistic missile complexes. These comments, and President Putin's repeated reference to U.S. ballistic missile defenses, provide a possible context for many of the ongoing modernization programs. The Avangard hypersonic glide vehicle (HGV), previously known as Project 4202, is a reentry body carried atop an existing ballistic missile that can maneuver to evade air defenses and ballistic missile defenses to deliver a nuclear warhead to targets in Europe and the United States. Russia views the Avangard system as a hedge to buttress its second-strike capability, ensuring that a retaliatory strike can penetrate U.S. ballistic missile defenses. In his March 2018 remarks, President Putin specifically stressed that Russia would pursue \"a new hypersonic-speed, high-precision new weapons systems that can hit targets at inter-continental distance and can adjust their altitude and course as they travel\" in response to the U.S. withdrawal from the ABM Treaty. Some U.S. analysts, however, have noted that the Avangard could be used \"as a first strike system to be used specifically against missile defenses, clearing the way for the rest of Russia's nuclear deterrent.\" Others have stressed that the Avangard is likely to serve as a niche capability that adds little to Russia's existing nuclear force structure. The Soviet Union first experimented with HGV technology in the 1980s, partly in response to the expected deployment of U.S. ballistic missile defense systems under the SDI program. The current program has been under development since at least 2004 and has undergone numerous tests. In the most recent test, on December 26, 2018, the glider was launched atop an SS-19 ICBM from the Dombarovskiy missile base in the Southern Urals toward a target on the Kamchatka Peninsula more than 3,500 miles away. According to some sources, Russia might deploy the Avangard on the SS-18, SS-19 and, potentially, on the new Sarmat ICBMs. Experts continue to debate Avangard's true technical characteristics. However, President Putin has stated that the system is capable of \"intensive maneuvering\" and achieving \"supersonic speeds in excess of Mach 20.\" After the December 2018 test, President Putin announced that the weapon would be added to Russia's nuclear arsenal in 2019. In January 2019, an official with Russia's Security Council confirmed that the Avangard had been integrated onto the SS-19 force. According to the Commander of Russia's Strategic Rocket Forces, the Dombarovskiy Missile Division will stand up a \"missile regiment comprising a modified command-and-control post and two silo-based launchers\" in 2019. On December 27, 2019, the Russian military announced that the Strategic Rocket Forces had activated two SS-19 missiles equipped with Avangard hypersonic glide vehicles. Although not specified in the Russian announcement, the missiles are likely deployed with the 13 th regiment of the Dombarovskiy (Red Banner) missile division based in the Orenburg region. The regiment has reportedly received two retrofitted UR-100NUTTkH (NATO reporting name: SS-19 Stiletto) ICBMs armed with one Avangard hypersonic boost-glide warhead each. According to earlier reports, the 13 th regiment is expected to eventually receive four more SS-19 ICBMs fitted with Avangard warheads. Reports have stated that the Strategic Rocket Forces will have two missile regiments, each with six Avangard systems by 2027. Each converted missile would carry one HGV. Russian officials have indicated that these missiles will count under the New START Treaty. Consequently, Russians officials conducted an exhibition of the system for U.S. inspectors, as mandated by the New START Treaty, prior to deployment. The exhibition demonstrated that each missile will carry one Avangard HGV, but it is not clear whether or how Russia demonstrated that each HGV would carry only one warhead. The RS-28 Sarmat (SS-X-30) missile is a liquid-fueled heavy ICBM that Russia intends to eventually deploy as a replacement for the SS-18 heavy ICBM. Russia has been reducing the number of SS-18 missiles in its force since the 1990s, when the original START Treaty required a reduction from 308 to 154 missiles. Russia likely would have eliminated all of the missiles if the START II Treaty (described below) had entered into force, but it has retained 46 of them under New START, while awaiting the development of the Sarmat. Reports indicate that the Sarmat can carry 10, or according to some sources, 15 warheads, along with penetration aids, and potentially several Avangard hypersonic glide vehicles. Putin stated in his March 2018 speech that Sarmat weighs over 200 tons, but details about the ICBM's true weight, and thus its payload, remain unclear. Russia began testing the Sarmat missile in 2016; reports indicate that it is likely to be deployed in the Uzhur Missile Division around 2021. Russia also may deploy the missile at the Dombarovsky Missile Division, with an eventual total of seven Sarmat regiments with 46 missiles. This number is equal to roughly the number of SS-18 ICBMs that Russia has retained under New START and, therefore, indicates that Russia could be planning to deploy the Sarmat in a manner consistent with the limits in the treaty. Some have speculated, however, that Russia could exceed the limits in the treaty by eventually expanding its deployment of Sarmat missiles or increasing the number of warheads on each missile to exceed the treaty's warhead limits. In his March 2018 speech, President Putin highlighted the Sarmat missile's ability to confound and evade ballistic missile defense systems. As was the case with the SS-18 missile, the large number of warheads and penetration aids are designed to increase the probability that the missile's warhead could penetrate defenses and reach its target. In addition, President Putin noted that Sarmat could attack targets by flying over both the North and South Poles, evading detection by radars seeking missiles flying in an expected trajectory over the North Pole. He also stated that the missile \"has a short boost phase, which makes it more difficult to intercept for missile defense systems.\" He emphasized that Sarmat is a formidable missile and, owing to its characteristics, \"is untroubled by even the most advanced missile defense systems.\" The existence of Poseidon, a nuclear-powered autonomous underwater vehicle (also known as Status 6 or Kanyon, its NATO designation), was first \"leaked\" to the press in November 2015, when a slide detailing it appeared in a Russian Ministry of Defense briefing. According to that slide, the autonomous underwater vehicle, or drone, could reach a depth of 1,000 meters, go at a speed of 100 knots, and have a range of up to 10,000 km. The slide indicated that the system would be tested between 2019 and 2025. Press reports indicate, however, that Russia has been testing the system since at least 2016, with the most recent test occurring in November 2018. However, the system may not be deployed until 2027. Russia may deploy the Poseidon drone on four submarines, two in the Northern Fleet and two in the Pacific Fleet. Each submarine would carry eight drones. According to some reports, each drone would be armed with a two-megaton nuclear or conventional payload that could be detonated \"thousands of feet\" below the surface. Russia could release the drone from its submarine off the U.S. coast and detonate it in a way that would \"generate a radioactive tsunami\" that could destroy cities and other infrastructure along the U.S. coast. When Russia first revealed the existence of this new drone, some analysts questioned whether Russia was developing a new first-strike weapon that could evade U.S. defenses and devastate the U.S. coastline. Russia, however, views the weapon as a second- or third-strike option that could ensure a retaliatory strike against U.S. cities. Like the Avangard and Sarmat, this system, according to Russian statements, would also serve as a Russian response to concerns about the U.S. withdrawal from the ABM Treaty and U.S. advances in ballistic missile defenses. As President Putin noted in his March 2018 speech, \"we have developed unmanned submersible vehicles that can move at great depths (I would say extreme depths) intercontinentally, at a speed multiple times higher than the speed of submarines, cutting-edge torpedoes and all kinds of surface vesselsâ¦. They are quiet, highly manoeuvrable and have hardly any vulnerabilities for the enemy to exploit.\" The Burevestnik (SSC-X-9 Skyfall) is a nuclear-powered cruise missile intended to have \"unlimited\" range, because it would be powered by a nuclear reactor. In his March 2018 speech, Putin stressed that the \"low-flying stealth missile carrying a nuclear warhead, with almost an unlimited range, unpredictable trajectory and ability to bypass interception boundaries\" would be \"invincible against all existing and prospective missile defense and counter-air defense systems.\" According to reports, Russia has been conducting tests with a prototype missile, and with an electric power source instead of a nuclear reactor, since 2016. Tests have continued to take place as recently as January 2019. Reports indicate, however, that most of the tests have ended in failure, and that tests using a nuclear power source are unlikely to occur in the near future, as failed tests could spread deadly radiation. According to some reports, Russia is unlikely to deploy the cruise missile for at least another decade and, even then, the high cost could limit the number introduced into the Russian arsenal. Russia is developing a nuclear-capable air-launched ballistic missile, known as the Kinzhal, that could be launched on MiG-31K interceptor aircraft or Tu-22M bombers. According to press reports, the Kinzhal is a variant of the Iskander short-range ballistic missile currently in service with the Russian Armed Forces. The air-launched version may be intended to be launched while the aircraft is at supersonic speeds, adding to the system's invulnerability to U.S. air and missile defenses. President Putin noted this capability in his March 2018 speech, when he said that the missile \"flying at a hypersonic speed, 10 times faster than the speed of sound, can also maneuver at all phases of its flight trajectory, which also allows it to overcome all existing and, I think, prospective anti-aircraft and anti-missile defense systems, delivering nuclear and conventional warheads in a range of over 2,000 kilometers.\" Unless Russian aircraft approach U.S. shores before releasing the missile, however, it will not have the range needed to target U.S. territory. Instead, experts believe the missile is intended primarily to target naval vessels. President Putin stated that the system entered service in the Southern Military District in December 2017. Russia's Minister of Defense stated in February 2019 that MiG-31 crews have taken the Kinzhal on air patrols over the Black and Caspian seas. Russia has been developing the Tsirkon (3M-22, NATO designated SS-N-33), an anti-ship hypersonic cruise missile, since at least 2011. The missile is \"designed for naval surface vessels and submarines, able to attack both ships and ground targets.\" It is intended to replace the SS-N-19 cruise missile on the Kirov-class cruisers and is expected to be test-launched from the new Yasen-class submarine Kazan . In a February 2019 address to the Federal Assembly, Putin stated that Tsirkon is a \"hypersonic missile that can reach speeds of approximately Mach 9 and strike a target more than 1,000 km away both under water and on the ground.\" He also stated that the missile could be launched from submarines. In late 2019, President Putin also noted that Russia would develop a land-based version of this missile as a response to the U.S. withdrawal from the INF Treaty. The Tsirkon is undergoing testing with potential deployment around 2020. Russia has been developing a rail-mobile ICBM system to replace the SS-24 Mod 3 Scalpel since 2013. An ejection test of the missile appears to have been conducted. However, Russia may have canceled the program in 2017. Russia has been developing a version of its three-stage RS-24 Yars ICBM with only two stages. According to unclassified reports, Russia conducted four flight tests of this missile in the early part of this decade. Two of these flight testsâone that failed in September 2011 and one that succeeded in May 2012âflew from Plesetsk to Kura, a distance of approximately 5,800 kilometers (3,600 miles). The second two testsâin October 2012 and June 2013âwere both successful. In both cases, the missile flew from Kapustin Yar to Sary-Shagan, a distance of 2,050 kilometers (1,270 miles). These tests raised questions about whether the missile was designed to violate, or circumvent, the limits in the 1987 INF Treaty, as that treaty banned the testing and deployment of missiles with a range between 500 and 5,500 kilometers. Russia appears to have cancelled this missile program in 2018, but some analysts believe it might reappear now that the INF Treaty has lapsed. The number of warheads on Soviet strategic nuclear delivery vehicles reached its peak in the mid-1980s and began to decline sharply by the early 1990s (see Figure 2 ). This decline continued, with a few pauses, through the 1990s and 2000s. While a number of factors likely contributed to this decline, most experts agree that these reductions were shaped by the limits in bilateral arms control agreements. The United States and the Soviet Union signed their first formal agreements limiting nuclear offensive and defensive weapons in May 1972. The Strategic Arms Limitation Talks (SALT) produced two agreements: the Interim Agreement on Certain Measures with Respect to the Limitation of Strategic Offensive Arms (Interim Agreement) and the Treaty on the Limitation of Anti-Ballistic Missile Systems (ABM Treaty). The parties paired these two agreements, in part, to forestall an offense-defense arms race, where increases in the number of missile defense interceptors on one side would encourage the other to increase the number of missiles needed to saturate those defenses. The United States also sought to limit the number of large ICBMs in the Soviet offensive force, an area where the Soviet Union had an advantage over the United States. As a result, the Interim Agreement imposed a freeze on the number of launchers for ICBMs that the United States and the Soviet Union could deploy. (At the time the United States had 1,054 ICBM launchers and the Soviet Union had 1,618 ICBM launchers.) The two countries also agreed to freeze their number of SLBM launchers and modern ballistic missile submarines, though they could add SLBM launchers if they retired old ICBM launchers. Although the Interim Agreement limited the number of Soviet ICBM and SLBM launchers, it did not restrain the growth in the number of warheads carried on the missiles deployed in those launchers. After signing the agreement, both nations expanded the number of warheads on their missiles by deploying missiles with multiple warheads (MIRVs). The Soviet deployment of MIRVs led to a sharp increaseâfrom around 2,000 to more than 6,100âin the number of warheads on ICBMs and SLBMs between 1972 and 1979. The second Strategic Arms Limitation Treaty (SALT II) sought to curb this growth by limiting the number of missiles that could carry multiple warheads. The treaty would have capped all strategic nuclear delivery systems at 2,400 and limited each side to 1,320 MIRVed ICBMs, MIRVed SLBMs, and heavy bombers equipped to carry nuclear-armed, air-launched cruise missiles (ALCMs). The treaty would not have limited the total number of warheads that could be carried on these delivery vehicles, even though the parties agreed that they would not deploy MIRVed ICBMs with more than 10 warheads each and MIRVed SLBMs with more than 14 warheads each. SALT II proved to be highly controversial. Some analysts argued that it would fail to reduce nuclear warheads or curb the arms race, while others argued that the treaty would allow the Soviet Union to maintain strategic superiority over the United States with its force of large, heavily MIRVed land-based ballistic missiles. Shortly after the Soviet Union invaded Afghanistan in December 1979, President Carter withdrew the treaty from the Senate's consideration. The Soviet Union continued to increase the number of warheads on its ICBMs and SLBMs, reaching around 10,000 warheads in 1989. President Reagan entered office in 1981 planning to expand U.S. nuclear forces and capabilities in an effort to counter the perceived Soviet advantages in nuclear weapons. Initially, at least, he rejected the use of arms control agreements, but after Congress and many analysts pressed for more diplomatic initiatives, the Reagan Administration outlined negotiating positions to address intermediate-range missiles, long-range strategic weapons, and ballistic missile defenses. These negotiations began to bear fruit in the latter half of President Reagan's second term, with the signing of the Intermediate-Range Nuclear Forces (INF) Treaty in 1987. In the INF Treaty, the United States and Soviet Union agreed to destroy all intermediate-range and shorter-range ground-launched ballistic missiles and ground-launched cruise missiles with ranges between 500 and 5,500 kilometers (between 300 and 3,400 miles). The Soviet Union destroyed 1,846 missiles, including 654 SS-20 missiles that carried three warheads apiece, resulting in a reduction of more than 3,100 deployed warheads. The INF Treaty was seen as a significant milestone in arms control because it established an intrusive verification regime and eliminated entire classes of weapons that both sides regarded as modern and effective. The United States and the Soviet Union began negotiations on the Strategic Arms Reduction Treaty (START) in 1982, although the talks stopped between 1983 and 1985 after a Soviet walkout in response to the U.S. deployment of intermediate-range missiles in Europe. The Soviet Union viewed START as a continuation of the SALT process and initially proposed limits on the same categories of weapons defined in the SALT II Treaty: total delivery vehicles, MIRVed ballistic missiles, and heavy bombers equipped to carry nuclear-armed ALCMs. The United States, however, sought to change the units of account from launchers to missiles and warheads, and proposed deep reductions rather than marginal changes from the SALT II level. The United States specifically sought sublimits on heavy ICBMs (the Soviet SS-18) and heavily MIRVed ICBMs (at the time, the Soviet SS-19), but it did not include any limits on heavy bombers. The nations adjusted their positions in 1985 and 1986 and saw the beginnings of a convergence after the October 1986 summit in Reykjavik, Iceland. However, they were unable to reach agreement by the end of the Reagan Administration. President George H. W. Bush continued the negotiations during his term, and the United States and the Soviet Union signed START in July 1991. The countries agreed that each side could deploy up to 6,000 attributed warheads on 1,600 ballistic missiles and bombers, with up to 4,900 warheads on ICBMs and SLBMs (see Table 4 ). START also limited each side to 1,540 warheads on \"heavy\" ICBMs, which represented a 50% reduction in the number of warheads deployed on the SS-18 ICBMs. The United States placed a high priority on reductions in Soviet heavy ICBMs during the negotiations (as it had during the SALT negotiations) and seemed to succeed, with this provision, in reducing the Soviet advantage in this category of weapons. When the Soviet Union collapsed at the end of 1991, about 70% of the strategic nuclear weapons covered by START were deployed at bases in Russia, and the other 30% were deployed in Ukraine, Belarus, and Kazakhstan. In May 1992, the four newly independent countries and the United States signed a protocol that made all four post-Soviet states parties to the treaty, and Ukraine, Belarus, and Kazakhstan agreed to eliminate all of the nuclear weapons on their territory. The collapse of the Soviet Union also led to calls for deeper reductions in strategic offensive arms. As a result, the United States and Russia signed a second treaty, known as START II, in January 1993, weeks before the end of the Bush Administration. START II would have limited each side to between 3,000 and 3,500 warheads; reductions initially were to occur by the year 2003, but that deadline would have been extended until 2007 if the nations had approved a new protocol. In addition, START II would have banned all MIRVed ICBMs. As a result, it would have accomplished the long-standing U.S. objective of eliminating the Soviet SS-18 heavy ICBMs. Although START II was signed in early January 1993, its full consideration was delayed until START entered into force at the end of 1994, during a dispute over the future of the Arms Control and Disarmament Agency. The U.S. Senate eventually consented to its ratification on January 26, 1996. The Russian Duma also delayed its consideration of START II as members addressed concerns about some of the limits. Russia also objected to the economic costs it would bear when implementing the treaty, because, with many Soviet-era systems nearing the end of their service lives, Russia would have to invest in new systems to maintain forces at START levels. This proved difficult as Russia endured a financial crisis in the latter half of the 1990s. The treaty's future clouded again after the United States sought to negotiate amendments to the 1972 ABM Treaty. With these delays and disputes, START II never entered into force, although Russian nuclear forces continued to decline as Russia retired its older systems. Although the START Treaty was due to remain in force through December 2009, the United States and Russia signed the Strategic Offensive Reductions Treaty, known as the Moscow Treaty, in May 2002. The United States had not expected to negotiate a new treaty. During a summit meeting with Russian President Putin, President Bush stated that the United States would reduce its \"operationally deployed\" strategic nuclear warheads to between 1,700 and 2,200 warheads during the next decade. President Putin indicated that Russia wanted to use the formal arms control process to reach a \"reliable and verifiable agreement\" in the form of a legally binding treaty that would provide \"predictability and transparency\" and ensure the \"irreversibility of the reduction of nuclear forces.\" The United States preferred a less formal processâsuch as an exchange of letters and, possibly, new transparency measuresâthat would allow the United States to maintain the flexibility to size and structure its nuclear forces in response to its own needs. The resulting treaty satisfied these objectives; it codified the planned reductions to 1,700-2,200 warheads, but it contained no definitions, counting rules, or schedules to guide implementation. Each party would simply declare the number of operationally deployed warheads (a term that remained undefined) in its forces at the implementation deadline of December 31, 2012. The treaty would then expire, allowing both parties to restore forces or remain at the limit. The treaty also lacked monitoring and verification provisions, but because the original START Treaty remained in force, its verification provisions continued to provide insights into Russian forces. Knowing that the verification provisions in START were due to expire in late 2009, the United States and Russia began to discuss options for arms control after START in mid-2006, but they were unable to agree on a path forward. The United States initially did not want to negotiate a new treaty, but it would have been willing to informally extend some of START's monitoring provisions. Russia wanted to replace START with a new treaty that would further reduce deployed forces while using many of the same definitions and counting rules in START. In December 2008, the two sides agreed that they wanted to replace START before it expired, but acknowledged that this task would have to be left to negotiations between Russia and the Obama Administration. These talks began in early 2009; the United States and Russia signed the new Strategic Arms Reduction Treaty (New START) in April 2010. The New START Treaty limits each side to no more than 800 deployed and nondeployed ICBM and SLBM launchers and deployed and nondeployed heavy bombers equipped to carry nuclear armaments. Within that total, it limits each side to no more than 700 deployed ICBMs, SLBMs, and heavy bombers equipped to carry nuclear armaments. The treaty also limits each side to no more than 1,550 deployed warheads; this limit counts the actual number of warheads carried by deployed ICBMs and SLBMs, and one warhead for each deployed heavy bomber equipped for nuclear armaments. New START also contains a monitoring regime, similar to the regime in START, that requires extensive data exchanges, exhibitions, and on-site inspections to verify compliance with the treaty. The limits in New START differ from those in the original START Treaty in a number of ways. First, START contained sublimits on warheads attributed to different types of strategic weapons, in part because the United States wanted the treaty to impose specific limits on elements of the Soviet force that were deemed to be destabilizing. New START, in contrast, contains only a single limit on the aggregate number of deployed warheads, thereby providing each nation with the freedom to mix their forces as they see fit. Second, under START, to determine the number of warheads that counted against the treaty limits, the United States and Russia tallied the number of deployed launchers, assuming that each launcher contained a missile carrying the number of warheads \"attributed\" to that type of missile. Under New START, the United States and Russia also count the number of deployed launchers, but instead of calculating an attributed number of warheads, they simply declare the total number of warheads deployed across their force. Table 4 summarizes the limits in START, the Moscow Treaty, and New START. Figure 4 shows how the numbers of warheads and launchers in Russia's strategic nuclear forces have declined over the last 20 years. Because the definitions and counting rules differ, it is difficult to compare the force sizes across treaties. Moreover, Russia's fiscal crisis in the late 1990s and subsequent delays in some of its modernization programs may have produced similar reductions even in the absence of arms control. Nevertheless, while the numbers of warheads on Soviet strategic nuclear forces peaked in the late 1980s, the numbers have declined since the two sides began implementing the reductions mandated by these treaties. Congress has held several hearings in recent years where it has sought information about Russian nuclear weapons and raised concerns about the pace and direction of Russia's nuclear modernization programs. Specifically, some Members have questioned whether Russia and the United States are approaching a new arms race as both modernize their forces; they have addressed concerns about the future size and structure of Russia's nuclear forces if the New START Treaty lapses in 2021, and they have sought to understand the content of and debate about Russia's nuclear doctrine. This section reviews some of the key issues discussed in these hearings. The United States and Russia are both pursuing modernization programs to rebuild and recapitalize their nuclear forces. Each began this process to replace existing systems that have been in service since the Cold War and are reaching the end of their service lives. In many cases, both nations have extended the life of these aging systems. Russia retains some ballistic missiles that the Soviet Union first fielded in the 1980s (and, therefore, were expected to be replaced by the early 2000s); it may retire many of these over the next 10 years as it completes its current modernization programs. The United States extended the life of its Ohio-class submarines from 30 to 42 years by refueling their reactor cores, and it extended the lives of both land-based and submarine-based missiles by replacing the propellant in existing motors and replacing guidance systems. The United States plans to begin fielding new systems in the late 2020s. Many analysts and observers have identified an arms race dynamic in these parallel modernization programs. Some believe that Russia is at faultâthat the United States is falling behind because Russia began to deploy new missiles and submarines in the early 2000s, while the United States will not field similar systems until the late 2020s, and because Russia is developing new and more exotic systems, as described above. David Trachtenberg, the Principal Deputy Under Secretary of Defense for Policy, raised this point in April 2018, when he noted that \"it takes two to race.\" He stated that the United States is \"not interested in matching the Russians system for system. The Russians have been developing an incredible amount of new nuclear weapons systems, including the novel, nuclear systems that President Putin unveiled to great fanfare a number of months ago.\" Franklin Miller, a former Pentagon and National Security Council official, made a similar point during a Senate Armed Services Committee hearing in early 2019 when he noted that \"the [U.S.] program is not creating a nuclear arms race. Russia and China began modernizing and expanding their nuclear forces in the 2008-2010 timeframe and since then have been placing large numbers of new strategic nuclear systems in the field. The United States has not deployed a new nuclear delivery system in this century and the first products of our nuclear modernization program will not be deployed until the mid to late 2020s.\" Others argue that the United States is spurring the arms race, in that the expansive U.S. modernization program might heighten the mistrust between the two nations and provide Russia with an incentive to expand its programs beyond what was needed to replace aging Soviet-era systems. Former Secretary of Defense William Perry raised this point in an interview in 2015, when the Obama Administration offered its support to the full scope of U.S. nuclear modernization programs. He noted that \"we're now at the precipice, maybe I should say the brink, of a new nuclear arms race\" that \"will be at least as expensive as the arms race we had during the Cold War, which is a lot of money.\" Some have disputed the notion that the modernization programs are either evidence of an arms race or an incentive to pursue one. Both nations are modernizing their forces because existing systems are aging out; neither is pursuing these programs because the other is modernizing its forces, and neither would likely cancel its programs if the other refrained from its efforts. As former Secretary of Defense Ashton Carter noted in 2016, \"In the end, though, this is about maintaining the bedrock of our security and after too many years of not investing enough, it's an investment that we, as a nation, have to make because it's critical to sustaining nuclear deterrence in the 21 st century.\" Russia seems to be in a similar position; it delayed a planned modernization cycle in the late 1990s and has been pursuing a number of programs at a relatively slow pace since that time. Moreover, the new types of strategic offensive arms introduced recently seem to be more of a response to concerns about U.S. missile defense programs than a response to U.S. offensive modernization programs. The New START Treaty is due to lapse in 2021 unless the United States and Russia agree to extend it for a period of no more than five years. The Trump Administration is reportedly conducting an interagency review of New START to determine whether it continues to serve U.S. national security interests, and this review will inform the U.S. approach to the treaty's extension. Among the issues that might be under consideration are whether the United States should be willing to extend New START following Russia's violation of the INF Treaty, whether the limits in the treaty continue to serve U.S. national security interests, and whether the insights and data that the monitoring regime provides about Russian nuclear forces remain of value for U.S. national security. Russia's nuclear modernization programs, in general, and its development of new kinds of strategic offensive arms have also figured into the debate about the extension of New START. For example, General John Hyten, the commander of U.S. Strategic Command (STRATCOM), has stated that he believes New START serves U.S. national security interests because its monitoring regime provides transparency and visibility into Russian nuclear forces, and because its limits provide predictability about the future size and structure of those forces. However, in testimony before the Senate Armed Services Committee in February 2019, General Hyten expressed concern about Russia's new nuclear delivery systemsâthe Poseidon underwater drone, the Burevestnik nuclear-powered cruise missile, the Kinzhal air-launched ballistic missile, and the Tsirkon hypersonic cruise missileâwhich would not count under New START's limits. He noted that these weapons could eventually pose a threat to the United States and that he believed the United States and Russia should expand New START so they would count them under the treaty. Some analysts have questioned whether this approach makes sense. As noted above, Russia is not likely to deploy these systems until later in the 2020s and, even then, the numbers are likely to be relatively small. On the other hand, Russia began to deploy the Avangard hypersonic glide vehicle in late December 2019 and may deploy the Sarmat heavy ballistic missile in 2020 or 2021. Both will count under New START if it remains in force. If Russia refuses to count the more exotic weapons under New START and the treaty expires, it will no longer be bound by any numerical limits on the number of long-range missiles and heavy bombers it can deploy, or the number of nuclear warheads that could be deployed on those missiles and bombers. Because Russia is already producing new missiles like the Yars, it could possibly accelerate production if New START expires to increase the number of warheads added to the force. Russia could also possibly add to the number of warheads deployed on some of these missiles, increasing them from four warheads to six to eight warheads per missile. In addition, Russia would likely have to limit the deployment of the Sarmat missile and retire old SS-18 missiles to remain under New START limits, but it could deploy hundreds of new warheads on the Sarmat between 2021 and 2026 if the treaty were not in place. According to some analyses, if Russia expanded its forces with these changes, it could possibly add more than 1,000 warheads to its force without increasing the number of deployed missiles between 2021 and 2026. The 2018 Nuclear Posture Review (NPR) adheres to the view that Russia has adopted an \"escalate to de-escalate\" strategy and asserts that Russia \"mistakenly assesses that the threat of nuclear escalation or actual first use of nuclear weapons would serve to 'de-escalate' a conflict on terms favorable to Russia.\" The NPR's primary concern is with a scenario where Russia executes a land-grab on a NATO ally's territory and then presents U.S. and NATO forces with a fait accompli by threatening to use nuclear weapons. The NPR thus recommends that the United States develop new low-yield nonstrategic weapons that, it argues, would provide the United States with a credible response, thereby \"ensuring that the Russian leadership does not miscalculate regarding the consequences of limited nuclear first use.\" While some experts outside government agree with the assessment of Russian nuclear doctrine described in the Nuclear Posture Review, others argue that it overstates or is inconsistent with Russian statements and actions. Some have argued that the NPR's \"evidence of a dropped threshold for Russian nuclear employment is weak.\" They note that, although some Russian authors and analysts advocated such an approach, was not evident in the government documents published in 2010 and 2014. As a result, they argue that the advocates for this type of strategy may have lost the bureaucratic debates. Others have reviewed reports on Russian military exercises and have disputed the conclusion that there is evidence that Russia simulated nuclear use against NATO in large conventional exercises. One analyst has postulated that Russia may actually raise its nuclear threshold as it bolsters its conventional forces. According to this analyst, \"It is difficult to understand why Russia would want to pursue military adventurism that would risk all-out confrontation with a technologically advanced and nuclear-armed adversary like NATO. While opportunistic, and possibly even reckless, the Putin regime does not appear to be suicidal.\" As a study from the RAND Corporation noted, Russia has \"invested considerable sums in developing and fielding long-range conventional strike weapons since the mid-2000s to provide Russian leadership with a buffer against reaching the nuclear thresholdâa set of conventional escalatory options that can achieve strategic effects without resorting to nuclear weapons.\" Others note, however, that Russia has integrated these \"conventional precision weapons and nuclear weapons into a single strategic weapon set,\" lending credence to the view that Russia may be prepared to employ, or threaten to employ, nuclear weapons during a regional conflict. Appendix A. Russian Nuclear-Capable DeliveryÂ Systems Appendix B. Russian Nuclear Storage Facilities", "summary": "Russia's nuclear forces consist of both long-range, strategic systemsâincluding intercontinental ballistic missiles (ICBMs), submarine-launched ballistic missiles (SLBMs), and heavy bombersâand shorter- and medium-range delivery systems. Russia is modernizing its nuclear forces, replacing Soviet-era systems with new missiles, submarines and aircraft while developing new types of delivery systems. Although Russia's number of nuclear weapons has declined sharply since the end of Cold War, it retains a stockpile of thousands of warheads, with more than 1,500 warheads deployed on missiles and bombers capable of reaching U.S. territory. Doctrine and Deployment During the Cold War, the Soviet Union valued nuclear weapons for both their political and military attributes. While Moscow pledged that it would not be the first to use nuclear weapons in a conflict, many analysts and scholars believed the Soviet Union integrated nuclear weapons into its warfighting plans. After the Cold War, Russia did not retain the Soviet \"no first use\" policy, and it has revised its nuclear doctrine several times to respond to concerns about its security environment and the capabilities of its conventional forces. When combined with military exercises and Russian officials' public statements, this evolving doctrine seems to indicate that Russia has potentially placed a greater reliance on nuclear weapons and may threaten to use them during regional conflicts. This doctrine has led some U.S. analysts to conclude that Russia has adopted an \"escalate to de-escalate\" strategy, where it might threaten to use nuclear weapons if it were losing a conflict with a NATO member, in an effort to convince the United States and its NATO allies to withdraw from the conflict. Russian officials, along with some scholars and observers in the United States and Europe, dispute this interpretation; however, concerns about this doctrine have informed recommendations for changes in the U.S. nuclear posture. Russia's current modernization cycle for its nuclear forces began in the early 2000s and is likely to conclude in the 2020s. In addition, in March 2018, Russian President Vladimir Putin announced that Russia was developing new types of nuclear systems. While some see these weapons as a Russian attempt to achieve a measure of superiority over the United States, others note that they likely represent a Russian response to concerns about emerging U.S. missile defense capabilities. These new Russian systems include, among others, a heavy ICBM with the ability to carry multiple warheads, a hypersonic glide vehicle, an autonomous underwater vehicle, and a nuclear-powered cruise missile. The hypersonic glide vehicle, carried on an existing long-range ballistic missile, entered service in late 2019. Arms Control Agreements Over the years, the United States has signed bilateral arms control agreements with the Soviet Union and then Russia that have limited and reduced the number of warheads carried on their nuclear delivery systems. Early agreements did little to reduce the size of Soviet forces, as the Soviet Union developed and deployed missiles with multiple warheads. However, the 1991 Strategic Arms Reduction Treaty, combined with financial difficulties that slowed Russia's nuclear modernization plans, sharply reduced the number of deployed warheads in the Russian force. The 2010 New START Treaty added modest reductions to this record but still served to limit the size of the Russian force and maintain the transparency afforded by the monitoring and verification provisions in the treaty. Congressional Interest Some Members of Congress have expressed growing concerns about the challenges Russia poses to the United States and its allies. In this context, Members of Congress may address a number of questions about Russian nuclear forces as they debate the U.S. nuclear force structure and plans for U.S. nuclear modernization. Congress may review debates about whether the U.S. modernization programs are needed to maintain the U.S. nuclear deterrent, or whether such programs may fuel an arms race with Russia. Congress may also assess whether Russia will be able to expand its forces in ways that threaten U.S. security if the United States and Russia do not extend the New START Treaty through 2026. Finally, Congress may review the debates within the expert community about Russian nuclear doctrine when deciding whether the United States needs to develop new capabilities to deter Russian use of nuclear weapons.", "document_type": "crs"}
{"report": "T he constitutional system of checks and balances and the separation of powers among the legislative, executive, and judicial branches is a cornerstone of the American system of government. By separating and checking powers in this way, the Framers hoped to prevent any person or group from seizing control over the nation's government. For example, the Framers checked congressional legislative power by providing the President the power to veto legislation and, in turn, checked the President's veto power by providing Congress a means to override that veto. Over time, it has become clear that the presidential veto power, even when not formally exercised, provides the President with an important tool to engage in the legislative process. Most Presidents have exercised their veto power in an effort to block legislation. Of 45 Presidents, 37 have exercised their veto power. As of the end of 2019, Presidents have issued 2,580 vetoes, and Congress has overridden 111. President George W. Bush vetoed 12 bills during his presidency. Congress attempted to override six of them and succeeded four times. President Barack Obama also vetoed 12 bills during his presidency. Congress attempted to override six of them and succeeded once. Presidents have also attempted to influence the shape of legislation through the use of veto threats. Since the 1980s, formal, written Statements of Administration Policy (SAPs, pronounced \"saps\") have frequently been used to express the President's support for or opposition to particular pieces of legislation. SAPs sometimes threaten to use the veto power if the legislation reviewed reaches the President's desk in its current form. Among the George W. Bush Administration (2001-2009) and the Obama Administration (2009-2017) SAPs examined later in this report, for example, 24% and 48%, respectively, contained a veto threat. This report begins with a brief discussion of the veto power and Congress's role in the veto process. It then examines the ways Presidents communicate their intention to veto, oppose, or support a bill. The report then provides and discusses summary data on veto threats and vetoes during the Bush and Obama Administrations. As specified by the U.S. Constitution (Article I, Section 7), the President has 10 days, Sundays excepted, to act once he has been presented with legislation that has passed both houses of Congress and either reject or accept the bill into law. Within those 10 days, Administration officials consider various points of view from affected agencies (as is the case throughout the legislative process) and recommend a course of action to the President regarding whether or not to veto the presented bill. The President has three general courses of action during the 10-day presentment period: The President may sign the legislation into law, take no action and allow the bill to become law without signature after the 10 days, or reject the legislation by exercising the office's veto authority. The President may reject legislation in two ways. The President may veto the bill and \"return it, with his Objections to that House in which it shall have originated.\" This action is called a \"regular\" or \"return\" veto (hereinafter return veto). Congress typically receives the objections to the bill in a written veto message. If Congress has adjourned during the 10-day period, the President might also reject the legislation through a \"pocket veto.\" This occurs when the President retains, but does not sign, presented legislation during the 10-day period, with the understanding that the President cannot return the bill to a Congress that has adjourned. Under these circumstances, the bill will not become law. A pocket veto is typically marked by a type of written veto message known as a \"Memorandum of Disapproval.\" As discussed in greater detail below, this practice has sometimes been controversial, because arguably it prevents Congress from attempting to override the President's veto. A President's return veto may be overridden, or invalidated, by a process provided for in Article 1, Section 7, of the U.S. Constitution. To override a return veto, Congress may choose to \"proceed to reconsider\" the bill. Passage by two-thirds of Members in each chamber is required to override a veto before the end of the Congress in which the veto is received. Neither chamber is under any constitutional, legal, or procedural obligation to conduct an override vote. It is not unusual for either chamber of Congress to make no effort to override the veto if congressional leaders do not believe they have sufficient votes to do so. If a two-thirds vote is successful in both chambers, the President's return veto is overridden, and the bill becomes law. If a two-thirds vote is unsuccessful in one or both chambers, the veto is sustained, and the bill does not become law. In contrast, Congress cannot override the President's pocket veto. By definition, a pocket veto may occur only when a congressional adjournment prevents the return of the vetoed bill. If a bill is pocket vetoed while Congress is adjourned, the only way for Congress to pass a version of the policy contained in the vetoed bill is to reintroduce the legislation as a new bill, pass it through both chambers, and present it to the President again for signature. Recent Presidents and Congresses have disagreed about what constitutes an adjournment that prevents the return of a bill such that a pocket veto may be used. For purposes of the sections below concerning the use of veto threats, the unit of analysis is a veto. The analysis does not distinguish between regular and pocket vetoes. Because Congress faces a two-thirds majority threshold to override a President's veto, veto threats may deter Congress from passing legislation that the President opposes. The veto override threshold may also prompt Congress to change a bill in response to a veto threat. The Framers of the U.S. Constitution viewed the veto power as a way of reminding Congress that the President also plays an important legislative role and that threatening to use the veto power can influence legislators into creating more amenable bills. Political scientist Richard A. Watson writes that \"the veto is available to a President as a general weapon in his conflicts with Congress: Franklin Roosevelt sometimes asked his aides for 'something I can veto' as a lesson and reminder to congressmen that they had to deal with a President.\" Veto threats are, therefore, an important component in understanding the use of the President's veto power. In recent presidencies, these threats have generally been expressed either through SAPs or verbally. President Trump has also used social media to communicate his intention to veto, oppose, or support a bill. Presidents may signal their intention to support, oppose, or veto a bill early in the legislative process using both verbal and written means. For example, Presidents can mention in a speech that they intend to veto legislation, or they can authorize others (such as a press secretary) to verbally indicate the Administration's position on specific legislation. Presidents can also issue, through the Office of Management and Budget (OMB), formal, written SAPs to communicate their intention to veto, oppose, or support a bill. Verbal veto threats may include commentary related to the President's strategy for working with Congress along with a threat to veto legislation if the President's policy agenda is not heeded. For example, at a press conference President George W. Bush explained, \"I want the Members of Congress to hear that once we set a budget we're going to stick by it. And if not, I'm going to use the veto pen of the President of the United States to keep fiscal sanity in Washington, D.C.\" In another instance, President Obama said that the House \"is trying to pass the most extreme and unworkable versions of a bill that they already know is going nowhere, that can't pass the Senate and that if it were to pass the Senate I would veto. They know it.\" In these remarks, both President Bush and President Obama used their words to attempt to deter Congress from passing bills that did not match the President's policy agenda and unambiguously remind the public of their veto power. Formal, written SAPs are frequently used to express the President's support for or opposition to particular pieces of legislation. The decision to issue a SAP is a means for the President to insert the Administration's views into the legislative debate. While SAPs provide Presidents an opportunity to assert varying levels of support for or against a bill, perhaps the most notable statement in a SAP is whether the Administration intends to veto the bill. Members of Congress may pay particular attention to a SAP when a veto threat is being made. At least one congressional leader has characterized SAPs as forerunner indicators of a veto. SAPs are often the first public document outlining the Administration's views on pending legislation and allow for the Administration to assert varying levels of support for or opposition to a bill. Because written threats are typically required to be scrutinized by the Administration through the central legislative clearance process in advance of their release, written SAP veto threats are often considered more formal than verbal veto threats. When a SAP indicates that the Administration may veto a bill, it appears in one of two ways: 1. A statement indicating that the President intends to veto the bill (hereinafter a presidential veto threat) or 2. A statement that agencies or senior advisors would recommend that the President veto the bill (hereinafter a senior advisors veto threat). These two types of SAPs indicate degrees of veto threat certainty. Generally speaking, a presidential veto threat signals the President's strong opposition to the bill. A senior advisors veto threat, on the other hand, may signal that the President may be more likely to enter into negotiations in order to reach a compromise with Congress on the bill. By publicly issuing a veto threat, the President may leverage public pressure upon Congress to support the President's agenda. Furthermore, many SAPs propose a compromise to Congress wherein the President would not exercise a veto. In addition, a President or an Administration's senior advisors may not always issue a veto threat prior to a decision to veto passed legislation. As discussed below, both Presidents Bush and Obama vetoed legislation for which they never issued a written veto threat. During both the Obama and Bush Administrations, roughly three-quarters of SAPs issued were on non-appropriations bills, and roughly one-quarter concerned appropriations bills. Each SAP signaled the Administration's intent to veto, oppose, or support a bill. There are fundamental differences between non-appropriations bill SAPs and appropriations bill SAPs. Non-appropriations bill SAPs typically involve specific policy objections, such as how a program operates or what constituency the program is designed to serve. Appropriations bill SAPs, in contrast, often involve more general budgetary policy objections, such as the perceived need to balance the budget or to reallocate resources for other purposes. Therefore, the President may generally support a particular provision in an appropriations bill on programmatic policy grounds but oppose it for budgetary reasons. Or the President may oppose a particular provision in an appropriations bill for both programmatic and budgetary reasons. This report focuses on the impact of the President's veto threat in non-appropriations bill SAPs given their more targeted nature. Data in this report were compiled from SAPs located on the archived White House websites of the Bush and Obama Administrations. Using the classification of SAPs on each website, analysis was conducted with only non-appropriations SAPs for reasons described above. The analysis examined each SAP and individually assessed whether the SAP contained a veto threat, the type of threat (presidential or senior advisor), and whether the veto threat concerned a part of the bill or the whole bill. The analysis considers each SAP to be an individual veto threat. In instances where one bill received veto threats in multiple SAPs, veto threats were counted individually and not combined. To assess the final outcome of bills, the analysis used information on bill statuses located at Congress.gov and does not track whether bills that received a SAP were later combined into other legislative vehicles. The inherent limitations in this methodology make it difficult to determine direct effects of any veto threat on the final outcome of a bill. However, in the aggregate, general trends may be observed. The proportion of non-appropriation bill SAPs with veto threats steadily increased over the course of each of the two presidencies reviewed. SAPs containing veto threats as a proportion of all SAPs was at its highest at the conclusion of both President Bush's and President Obama's second terms. Figure 1 illustrates this trend by showing SAP veto threats as a percentage of issued SAPs. While the Bush Administration remained relatively consistent in the number of veto threats issued in SAPs during its first six years, the number of threats increased during the final two years of the Administration. The Bush Administration issued a total of 491 SAPs on non-appropriations bills. Just under one-quarter (24%) of the non-appropriations bill SAPs contained a veto threat: 24 presidential veto threats and 94 senior advisors veto threats. Of bills that received a presidential veto threat, one was signed by the President, seven were vetoed, and the remaining 16 did not make it to the President's desk. Of bills that received a senior advisors veto threat, 16 were signed, one was vetoed, and the remaining 77 were not passed by both chambers. Seven of the 12 Bush Administration vetoes were preceded by a SAP containing a veto threat. While the number of veto threats in SAPs slowly increased during the first three Congresses of the Bush Administration (two in the 107 th Congress, three in the 108 th Congress, and seven in the 109 th Congress), the number of veto threats grew sharply in the 110 th Congressâto 107 veto threatsâcoinciding with Democrats gaining control of both chambers of Congress during the Republican President's final two years in office. This might suggest (and is supported by Obama Administration data) that the partisan constitution of Congress, as well as whether the Administration is in its first or second term, may impact the number of veto threats issued. Below, Figure 2 illustrates this change in the number of veto threats over time across the four Congresses associated with President Bush's two terms in office. Nevertheless, presidential veto threats in the Bush Administration remained a fraction of overall veto threats and often resulted in an actual veto. The rarity with which the Bush Administration issued presidential veto threats suggests that the Administration viewed them as a message to be used sparingly. Although the relationship between Congress and a President may change every two years with each new Congress, the relationship between an Administration and its President may also change by presidential term. Compared to a President's first term, in a second term Administration, executive branch officials may become more adept in coordinating the veto power. Additionally, a second-term President cannot be re-elected, which may allow the Administration to take a stronger position on unfavorable legislation. Alternatively, it could be that the President lacks the political influence necessary to advance his legislative agenda and instead relies on veto power to block legislative vehicles more often as his presidency concludes. Figure 3 presents veto threat percentages by presidential term for the Bush Administration, showing an increase in the President's second term. During President Bush's first term (2001-2005), 98% of SAPs did not contain a veto threat, 1% contained a senior advisors veto threat, and 1% contained a presidential veto threat. During President Bush's second term (2005-2009), 60% did not contain a veto threat, 32% contained a senior advisors veto threat, and 8% contained a presidential veto threat. In comparison to the Bush Administration, the Obama Administration steadily increased its use of veto threats issued in SAPs in every subsequent Congress. The Obama Administration issued 472 SAPs on non-appropriations bills. Just under half (48%) of these contained a veto threat: 43 presidential veto threats and 186 senior advisors veto threats. Of bills that received a presidential veto threat, four were ultimately signed by the President, five were vetoed, and 34 did not make it to the President's desk. Of bills that received a senior advisors veto threat, 17 were signed, two were vetoed, and 167 were not passed by the two chambers. Six of the 12 Obama Administration vetoes were preceded by a SAP containing a veto threat. President Obama (a Democrat) issued more veto threats in his SAPs with each passing Congress. (Democrats controlled both chambers during the 111 th Congress and the Senate during the 112 th Congress, and Republicans controlled the House during the 113 th Congress and both chambers during the 114 th Congress. ) Below, Figure 4 illustrates this change in the number of veto threats over time by Congress. Although the number of veto threats increased over the course of the Obama presidency (eight in the 111 th Congress, 54 in the 112 th Congress, 63 in the 113 th Congress, and 104 in the 114 th Congress), the number of presidential veto threats remained small when compared to the total number of veto threats, varying from a low of 14.3% in the 111 th Congress to a high of 28.3% in the 114 th Congress. The increase over time in total number of veto threats may indicate that President Obama was presented with more legislation he was likely to oppose. However, the increase is mostly composed of senior advisors veto threats. This suggests that the Administration nonetheless treated presidential veto threats, compared to senior advisors veto threats, as a tool to be used more rarely. As with the Bush Administration, President Obama's use of veto threats in the first and second terms differ. Figure 5 presents veto threat percentages by presidential term as opposed to by Congress. During President Obama's first term (2009-2013), 69% of SAPs did not contain a veto threat, 27% contained a senior advisors veto threat, and 4% contained a presidential veto threat. During President Obama's second term (2013-2017), 39% of SAPs did not contain a veto threat, 49% contained a senior advisors veto threat, and 13% contained a presidential veto threat. CRS analyzed all veto threats contained in SAPs on non-appropriations legislation across these two Administrations and determined whether the veto threat was isolated to a provision of the bill (a partial bill veto threat) or if the veto threat was not particularized (a whole bill veto threat). President Bush issued partial bill veto threats and whole bill veto threats an equal amount of the time. However, the type of threat he used in each category varied. Of partial bill veto threats, 7% were presidential veto threats and the remaining 93% were senior advisors veto threats. Of whole bill veto threats, 34% were presidential veto threats and the remaining 66% were senior advisors veto threats. In contrast, President Obama issued partial bill veto threats more sparingly (8% versus 92% for whole bill veto threats). Similar to President Bush, however, of partial bill veto threats, 6% were presidential veto threats and the remaining 94% were senior advisors veto threats. Of whole bill veto threats, 20% were presidential veto threats and the remaining 80% were senior advisors veto threats. The difference in frequency of partial and whole bill veto threats across the Administrations may suggest that the two Presidents viewed the use of veto threats differently: One President may have used partial threats to negotiate more with Congress, whereas another President preferred to threaten a veto only when he viewed an entire bill as unfavorable. Likewise, the increased frequency of partial bill senior advisors veto threats suggests that both Presidents preferred to use presidential veto threats in rejecting an entire bill and leaving senior advisors veto threats for negotiations where only part of a bill is unfavorable. A presidential veto threat in a SAP may be more likely than a senior advisors veto threat to deter passage of a bill because of the President's direct association with the threat. However, an analysis of these two Administrations does not necessarily support this argument. Figure 6 shows that bills appeared less likely to pass when the bill received a senior advisors veto threat versus a presidential veto threat. This may be due to a number of factors, including that senior advisors threats are more frequently issued than presidential veto threats (279 senior advisors threats and 67 presidential veto threats were issued across these two presidencies) or that Congress may perceive it to be beneficial to pass presidentially threatened legislation anyway based on certain political calculations and circumstances. During the Bush and Obama Administrations, enrolled bills that passed both chambers and were met with a presidential veto threat SAP were vetoed more often than were those that were met with a senior advisors threat. Figure 7 shows the outcomes of bills receiving veto threats that were passed by Congress and sent to the President. Across both the Bush and Obama Administrations, a bill that received a presidential veto threat and was passed was followed by a veto 70.6% of the time, whereas a bill that received a senior advisors veto threat was later vetoed 8.3% of the time. When a President vetoes a bill, it marks the end of the President's ability to procedurally affect whether or not a bill becomes law. Whether or not that specific bill becomes law is no longer in the President's hands. Congress may or may not elect to attempt an override. President Bush exercised the veto power 12 times. Four of these vetoes were overridden. Six vetoed bills were forewarned with a written veto threat. (Four received a presidential threat, and two received senior advisors threats.) Three additional bills received statements noting the Administration's opposition to the bill but did not include a veto threat. None of the bills that Congress later overrode were preceded by a presidential veto threat. Three-quarters of President Bush's vetoes (9 of 12) were preceded by a written statement of opposition to the bill. President Bush also issued multiple written veto threats on four bills that would later receive a veto: Three bills received two threats each, and one bill received two statements of opposition. President Obama vetoed 12 bills, and Congress overrode his veto once. As was true for President Bush, six of President Obama's vetoes were preceded by a written veto threat (four presidential and two senior advisors threats). Unlike the patterns observed for the Bush presidency, however, all of President Obama's veto threats were whole bill veto threats. Whereas President Bush also communicated in SAPs his opposition to three bills short of threatening a veto, President Obama either did not issue a SAP at all or issued one that contained a veto threat. One of President Obama's vetoed bills received two veto threats. President Obama's approach of issuing either no statement at all on a bill or a statement containing a veto threat marks a different approach from the one used by President Bush.", "summary": "The Framers checked congressional legislative power by providing the President the power to veto legislation and, in turn, checked the President's veto power by providing Congress a means to override that veto. Over time, it has become clear that the presidential veto power, even if not formally exercised, provides the President some degree of influence over the legislative process. Most Presidents have exercised their veto power as a means to influence legislative outcomes. Of 45 Presidents, 37 have exercised their veto power. This report begins with a brief discussion of the ways Presidents communicate their intention to veto, oppose, or support a bill. It then examines the veto power and Congress's role in the veto process. The report then provides analysis of the use of veto threats and vetoes and the passage of legislation during the George W. Bush Administration (2001-2009) and the Obama Administration (2009-2017) with some observations of the potential influence of such actions on legislation. As specified by the U.S. Constitution (Article I, Section 7), the President has 10 days, Sundays excepted, to act once he has been presented with legislation that has passed both houses of Congress and either reject or accept the bill into law. The President has three general courses of action during the 10-day presentment period: The President may sign the legislation into law, take no action, or reject the legislation by exercising the office's veto authority. A President's return veto may be overridden, or invalidated, by a process also provided for in Article 1, Section 7, of the U.S. Constitution. Because Congress faces a two-thirds majority threshold to override a President's veto, veto threats may deter Congress from passing legislation that the President opposes. By going public with a veto threat, the President may leverage public pressure upon Congress to support his agenda. For purposes of this report, which focuses on the use of veto threats, the unit of analysis throughout is a veto (or a threatened veto), and the report does not distinguish between regular and pocket vetoes. Formal, written Statements of Administration Policy (SAPs, pronounced \"saps\") are frequently used to express the President's support for or opposition to particular pieces of legislation and may include statements threatening to use the veto power. Among the Bush and Obama Administrations' SAPs examined later in this report, for example, 24% and 48%, respectively, contained a veto threat. Although the relationship between Congress and a President may change every two years with each new Congress, the relationship between an Administration and its President may also change by presidential term. For example, while the number of veto threats in SAPs slowly increased during the first three Congresses of the Bush Administration, the number of veto threats grew sharply in the 110 th Congress. In comparison to the Bush Administration, the Obama Administration steadily increased its use of veto threats issued in SAPs in every subsequent Congress. President George W. Bush exercised the veto power 12 times during his presidency. Congress attempted to override six of President Bush's 12 vetoes and succeeded four times. President Barack Obama similarly exercised the veto power 12 times during his presidency. Congress also attempted to override six of President Obama's 12 vetoes and succeeded once. During the Bush and Obama Administrations, enrolled bills that passed both chambers and were met with a statement indicating that the President intended to veto the bill (a presidential veto threat SAP) were vetoed more often than were those that were met with a statement that agencies or senior advisors would recommend that the President veto the bill (a senior advisors threat SAP).", "document_type": "crs"}
{"report": "Approximately 27 million trips are taken on public transportation on an average day. Federal assistance to public transportation is provided primarily through the public transportation program administered by the Department of Transportation's (DOT's) Federal Transit Administration (FTA). The federal public transportation program was authorized from FY2016 through FY2020 as part of the Fixing America's Surface Transportation (FAST) Act ( P.L. 114-94 ). This report discusses the major issues that may arise as Congress considers reauthorization. In federal law, public transportationâalso known as public transit, mass transit, and mass transportationâincludes local buses, subways, commuter rail, light rail, paratransit (often service for the elderly and disabled using small buses and vans), and ferryboats, but excludes Amtrak, intercity buses, and school buses (49 U.S.C. Â§5302). About 48% of public transportation trips are made by bus, 38% by heavy rail (also called metro and subway), 5% by commuter rail, and 6% by light rail (including streetcars). Paratransit accounts for about 2% of all public transportation trips, and ferries about 1%. Public transportation accounts for about 3% of all daily transportation trips and about 7% of commute trips. Although ridership is heavily concentrated in a few large cities and their surrounding suburbs, especially the New York City metropolitan area, public transportation is provided in a wide range of places including small urban areas, rural areas, and Indian land. Most federal funding for public transportation is authorized in multiyear surface transportation acts. The FAST Act authorized $61.1 billion for five fiscal years beginning in FY2016, an average of $12.2 billion per year. The authorization for FY2020 is $12.6 billion. Of the total five-year amount, 80% was authorized from the mass transit account of the Highway Trust Fund. Funding authorized from the Highway Trust Fund is provided as contract authority, a type of budget authority that may be obligated prior to an appropriation. The other 20% was authorized from the general fund of the U.S. Treasury as appropriated budget authority. Funding for public transportation is sometimes provided under other authorities. The FY2018, FY2019, and FY2020 appropriations acts ( P.L. 115-141 , P.L. 116-6 , P.L. 116-94 ), for example, provided additional general fund money for several programs that typically receive funding only from the Highway Trust Fund, thereby raising the general fund share of federal public transportation expenditures to about 28% in FY2018, 26% in FY2019, and 21% in FY2020. Funding for the Public Transportation Emergency Relief Program, which provides grants for emergency repairs following natural disasters or other emergencies, is typically from the general fund provided in supplemental appropriations acts. Transit projects can also be funded with money transferred (or \"flexed\") from federal highway programs by state and local officials. In FY2016, the last year for which data are available, $1.3 billion in highway funds was flexed to transit. Excluding flexed highway funds and emergency relief funding, funding provided in FY2017 through FY2020 was above the level authorized in the FAST Act ( Figure 1 ). There are six major programs for public transportation authorized by the FAST Act: (1) Urbanized Area Formula; (2) State of Good Repair; (3) Capital Investment Grants (CIG) (also known as \"New Starts\"); (4) Rural Area Formula; (5) Bus and Bus Facilities; and (6) Enhanced Mobility of Seniors and Individuals with Disabilities. Typically, funding for all of these programs, except CIG, comes from the mass transit account of the Highway Trust Fund. CIG funding comes from the general fund. There are also a number of other much smaller programs ( Figure 2 ). The average of $12.2 billion per year authorized for the federal public transportation program in the FAST Act represented about a 14% increase (unadjusted for inflation) from the previous authorization, the Moving Ahead for Progress in the 21 st Century Act (MAP-21; P.L. 112-141 ). The Senate Committee on Environment and Public Works reported a bill in August 2019 ( S. 2302 ) that would reauthorize highway infrastructure programs through FY2025 with a 27% increase over the funding provided by the FAST Act. A similar increase in the annual authorization of public transportation funding would provide for federal expenditures of about $15.5 billion per year. A higher level of federal funding might improve the condition and performance of public transportation infrastructure. One indicator of the condition of public transportation infrastructure is the reinvestment backlog, which DOT defines as \"an indication of the amount of near-term investment needed to replace assets that are past their expected useful lifetime.\" DOT estimated the reinvestment backlog to be $98 billion in 2014, about 13% of the total value of transit assets. In its biennial Conditions and Performance report, DOT projects how various future spending levels might affect the condition of public transportation infrastructure. The most recent report was published in November 2019 and used 2014 as the base year for projections. Capital expenditures on public transportation in 2014, DOT noted, totaled $17.7 billion from all sources, including federal, state, and local government support. Of this amount, $11.3 billion was spent on preserving the existing system and $6.4 billion on expansion. If this spending pattern were to continue over the 20 years between 2015 and 2034, DOT estimates, the investment backlog would grow to $116 billion (in 2014 inflation-adjusted dollars), an increase of 18%. DOT constructed two scenarios to estimate how much spending would be needed to eliminate the backlog and accommodate new riders. Under the assumption of low ridership growth, DOT estimated, $23.4 billion would be needed annually, an increase of about 32% (in 2014 inflation-adjusted dollars). In a scenario projecting high ridership growth, $25.6 billion would be needed annually, an increase of 45% (in 2014 inflation-adjusted dollars). DOT did not estimate the spending necessary if ridership is stagnant or dropping. However, it did estimate that $18.4 billion annually (adjusted for inflation) would eliminate the reinvestment backlog over 20 years if there was no spending on expansion. The focus of the federal public transportation program is on capital expenditures, but the program also supports operational expenses in some circumstances, as well as safety oversight, planning, and research. Greater federal support for transit operations could increase the quantity of transit service offered or reduce fares. In the past, particularly in the 1970s and early 1980s, such support caused the costs of providing service to increase, particularly through increases in wages and fringe benefits and by expanding services on routes with less demand. With greater flexibility to use federal funding for operating expenses, transit agencies could neglect maintenance and asset renewal, leading to a more rapid decline in the condition of capital assets. Existing flexibility to use capital funds for maintenance may help agencies preserve equipment and facilities. DOT does not make any recommendations about the relative shares of public transportation funding that should be borne by federal, state, and local governments. The federal share of government spending on public transportation has been around 15% to 20% over the past 30 years. A higher level of funding by the federal government may not necessarily translate into more spending overall if transit providers substitute federal dollars for their own. The solvency of the Highway Trust Fund and its two accounts, the highway account and the mass transit account, is a major issue in reauthorization of funding for the public transportation program. Outlays from the mass transit account have outpaced receipts for over a decade, an imbalance the Congressional Budget Office (CBO) projects will continue in the future under current law. For the five-year period beginning in FY2021, CBO expects the gap between revenues and outlays to total $26 billion, an average of $5.2 billion annually ( Table 1 ). The primary revenue source for the Highway Trust Fund is motor fuel taxes, which were last raised in 1993. Currently, of the 18.3 cents-per-gallon tax on gasoline and 24.3 cents-per-gallon tax on diesel that go to the Highway Trust Fund, 2.86 cents is deposited in the mass transit account. Congress has chosen to transfer general fund monies into the mass transit account to permit a higher level of spending than motor fuel tax revenues alone could sustain. These transfers have totaled $29 billion since they began in 2008. The FAST Act transferred $18.1 billion to the mass transit account from the general fund. According to FTA, a balance of at least $1 billion in the mass transit account is required to ensure that the agency has sufficient funds to make mandated payments to transit agencies. CBO estimates that if Congress were to extend current law without providing for further transfers from the general fund to the mass transit account, the balance in the mass transit account would be about $300 million at the end of FY2021 and would reach zero at some point in FY2022. This would likely require FTA to slow payments to transit agencies. Outlays also outpace receipts in the highway account, but solvency problems are expected to arrive earlier in the mass transit account. Bringing the receipts and outlays of the mass transit account into balance would involve a cut in program spending, an increase in revenues paid into the account, or a combination of the two. An increase in revenues could involve a commitment to regular transfers from the general fund. With the highway account facing similar problems, another possible change would be to redirect revenues from the mass transit account to the highway account and to fund the transit account with a general fund appropriation each year. This likely would make transit funding less certain, and it would not make up the entire shortfall in the highway account. In addition to grants, the federal government supports public transportation infrastructure with direct loans and tax preferences for municipal bonds. Changes to two major federal loan programs relevant to public transportationâthe Transportation Infrastructure Finance and Innovation Act (TIFIA) program and the Railroad Rehabilitation and Infrastructure Finance (RRIF) programâcould be considered in reauthorization. TIFIA provides long-term, low-interest loans and other types of credit assistance for the construction of surface transportation projects (23 U.S.C. Â§601 et seq.). Although the maximum federal share of project costs that may be provided by the TIFIA program was raised in MAP-21 from 33% to 49%, DOT has stated that it will provide more than 33% only in exceptional circumstances. To date, TIFIA has not covered more than 33% of the cost of any project. By limiting the TIFIA share in this way, DOT appears to be trying to maximize the leveraging of nonfederal resources, but it may be excluding projects that may not be financially viable without greater federal assistance. Public transportation projects typically cover a relatively small share of their costs from user fees, thus they usually need more government support than highway and bridge projects. Congress could direct DOT to consider a higher federal share in more circumstances or across the board. Some project sponsors have stated that the lengthy process and upfront costs for obtaining TIFIA assistance led them not to seek TIFIA loans. The FAST Act required DOT to expedite projects thought to be lower-riskâthose requesting $100 million or less in credit assistance with a dedicated revenue stream unrelated to project performance and standard loan termsâbut this has apparently not had a significant effect: two projects have received TIFIA loans of less than $100 million since the passage of the FAST Act. Congress could make small TIFIA loans more attractive by changing a requirement that project sponsors obtain two credit ratings; at present, that requirement applies to TIFIA loans for projects with debt of $75 million or more. Less stringent requirements for credit ratings may increase the risk to the government of these loans. Reauthorization legislation also could incorporate various proposals that have been suggested to speed up approvals, such as requiring more frequent meetings of the DOT officials who make recommendations on project loans to the Secretary of Transportation (known as the Council on Credit and Finance), hiring additional staff to more quickly assess applications, and mandating that DOT regularly publish information about the time it takes loan applications to reach milestones. The RRIF program was originally created to support freight railroads, particularly small freight railroads known as short lines, but loans are increasingly being made to commuter railroads. Legislative changes have made RRIF loans more attractive to commuter railroads. Recent changes also permit loans for transit-oriented development, that is economic development projects, including commercial and residential development, physically or functionally related to a passenger rail station. Several large loans have been made to transit agencies for commuter rail projects in the past few years, including $908 million to the Dallas Area Rapid Transit to finance a project from Dallas-Fort Worth Airport, $220 million to the Massachusetts Bay Transportation Authority for positive train control (PTC), and almost $1 billion to the New York Metropolitan Transportation Authority, also for PTC. The federal government requires project sponsors to make a payment known as a credit risk premium to offset the risk of a default. No federal funding has been authorized to pay the credit risk premiums for RRIF borrowers, although $25 million was made available for this purpose in the 2018 appropriations act. To enhance the attractiveness of RRIF for public transportation projects, Congress could authorize a federal subsidy for the credit risk premium from the Highway Trust Fund. Alternatively, Congress could provide for the credit risk premium from the general fund directly or as part of another program. For example, the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) makes RRIF credit risk premiums eligible for grants under the BUILD Transportation Discretionary Grants Program. Another RRIF-related proposal is to extend the authority to provide loans for transit-oriented development projects, which expires on September 30, 2020. Because the CIG program receives funding from the general fund, not the Highway Trust Fund, appropriators have greater influence over its funding than they do over other transit programs. Nevertheless, the authorization sets a benchmark for the program's funding level, creates the program's overall structure, and can provide more or less discretion for FTA in the program's implementation. These characteristics could be more important in reauthorization than usual because of disagreements about the existence and operation of the program between Congress and the Trump Administration. During the Obama Administration, FTA, among others, recommended significant increases in CIG funding to accommodate demand by project sponsors, especially because projects to expand the capacity of existing transit facilities, known as Core Capacity projects, were made eligible for funding beginning in FY2013. FTA noted in its FY2017 budget submission that the number of projects in the CIG \"pipeline\" had grown from 37 in FY2012 to 63 in FY2016. In addition, FTA asked Congress in its FY2017 budget request to increase annual CIG funding from the $2.3 billion authorized by the FAST Act to $3.5 billion, to accelerate projects to \"not only potentially lower financing costs incurred on these projects, but also allow FTA to better manage the overall program given the ever growing demand for funds.\" For FY2018 and FY2019, the Trump Administration proposed that funding should be limited to projects with existing commitments from the federal government, and that CIG funding should be phased out. In its funding recommendation for FY2018, FTA noted that \"future investments in new transit projects would be funded by the localities that use and benefit from these localized projects.\" House and Senate appropriators rejected this approach, directing FTA to continue working with project sponsors to develop projects, including issuing project evaluation ratings, and requiring the allocation of appropriations, with deadlines, to projects that have met the program requirements. With pressure for continued operation of the program, FTA has made several announcements of allocations of CIG funding to new projects. In July 2019, FTA stated that from the beginning of the Trump Administration in January 20, 2017, FTA had made CIG funding commitments to 25 new projects totaling $7.63 billion. It appears that FTA has dropped its call for phasing out the program; it recommended funding of $1.5 billion in FY2020, including $500 million for new projects. Congress agreed to nearly $2 billion for the program in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The Gateway Program, which involves a set of projects in a 10-mile section of the Northeast Corridor (NEC) between Penn Station in Newark, NJ, and Penn Station in New York City, would be designed to improve intercity passenger rail service by Amtrak, which owns the underlying infrastructure, as well as commuter rail service provided by New Jersey (NJ) Transit. NJ Transit ridership in the corridor is approximately 50 million passenger trips per year, making this among the most heavily traveled public transportation routes in the country. The project sponsorsâthe Port Authority of New York and New Jersey, in cooperation with the Gateway Program Development Corporation, New Jersey Transit Corporation, and Amtrakâhave proposed $7 billion in CIG program funding for the costliest Gateway Program project to date. The $14 billion project is for the construction of a new tunnel under the Hudson River, the restoration of the current tunnel that was damaged by Hurricane Sandy in 2012, and the preservation of the Hudson Yards right-of-way linking the proposed new tunnel with Pennsylvania Station in New York City. In addition, the project sponsors propose to borrow several billion dollars for tunnel construction from the federal government through the RRIF program. NJ Transit, the lead sponsor of the $1.6 billion Portal North Bridge project across the Hackensack River in New Jersey, has proposed a CIG grant to cover about half the cost. The Gateway Program overall is estimated to cost about $30 billion. The federal amount sought for the Gateway Program is equal to several years of funding for CIG, at recent funding levels, and could potentially overwhelm a program that is responsible for aiding projects throughout the country. The largest CIG grant since FY2007 is $2.6 billion. FTA typically pays out such grants in smaller amounts over a prolonged construction period; single-year allocations of funding for individual projects have rarely exceeded $200 million. The proposed use of federal loans in conjunction with federal grants for the Gateway Program is also controversial. The statute governing TIFIA (23 U.S.C. Â§603(b)(8)) states that proceeds from a TIFIA loan \"may\" be used as a nonfederal share of project costs if the loan will be repaid from nonfederal funds. The Trump Administration has been critical of CIG project sponsors using both federal grants and loans on public transportation projects. In June 2018, FTA circulated a letter stating the following: given the competitive nature of this discretionary program, the [CIG] statute specifically urges FTA to consider the extent to which the project has a local financial commitment that exceeds the required non-government share of the cost of the project. To this end, FTA considers U.S. Department of Transportation loans in the context of all Federal funding sources requested by the project sponsor when completing the CIG evaluation process, and not as separate from the Federal funding sources. The appropriations committees have taken action to prevent this policy from being implemented. For instance, Section 165 of Division G of the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), states that \"none of the funds made available under this Act may be used for the implementation or furtherance of new policies detailed in the 'Dear Colleague' letter distributed by the Federal Transit Administration to capital investment grant program project sponsors on June 29, 2018.\" In a potential reauthorization, Congress could seek to eliminate permanently DOT's discretion to block project sponsors from combining CIG grants and TIFIA loans on a single project. Bills pending in the House, H.R. 731 and H.R. 1849 , would allow recipients of TIFIA and RRIF support to elect to have the loans treated as nonfederal funds. Applying for CIG funding requires the development of extensive data and the preparation of many detailed reports and other documents, all of which are reviewed by FTA in making project approval determinations. Legislative changes in MAP-21 and the FAST Act sought to simplify the process. For example, MAP-21 reduced the number of separate FTA approvals for more expensive projects from four to three, and for less expensive projects from three to two. The less expensive projects, known as small starts projects, are those that cost $300 million or less to build and require $100 million or less of CIG funding. Moreover, MAP-21 authorized the use of project justification warrants in certain cases \"that allow a proposed project to automatically receive a satisfactory rating on a given criterion based on the project's characteristics or the characteristics of the project corridor.\" The FAST Act created an Expedited Project Delivery for Capital Investment Grants Pilot Program to more quickly review up to eight projects involving public-private partnerships in which the federal grant is 25% or less of the project cost. The federal share of a CIG project is typically about 50%. There have been no comprehensive evaluations of whether these changes have resulted in projects progressing more quickly through the CIG pipeline. However, there are options that could be considered to further speed CIG projects. For instance, the threshold for projects to qualify as small starts could be increased, and the use of warrants could be permitted in more circumstances. FTA has been slow to implement the Expedited Project Delivery for Capital Investment Grants Pilot Program. Increasing the permitted maximum federal share of project costs under the pilot program, currently 25%, might make the program more attractive to transit agencies. According to data from the American Public Transportation Association (APTA), annual transit ridership reached a modern-era high of 10.7 billion trips in 2014. Since then, it has fallen by almost 8% to 9.9 billion trips in 2018. National trends in public transportation ridership are not necessarily reflected at the local level; thus, different areas may have different reasons for growth or decline. But at the national level, the two factors that most affect public transportation ridership are competitive factors and the supply of transit service. Several competitive factors, notably increased car ownership, the relatively low price of gasoline over the past few years, and the growing popularity of bikeshare, scooters, and ridesourcing services such as Lyft and Uber, appear to have reduced transit ridership. The amount of transit service supplied has generally grown over time, along with government investment, but average fares have risen faster than inflation, possibly deterring riders. The future of public transportation ridership in the short to medium term is likely to depend on population growth, the public funding commitment to supplying transit, and factors that make driving more or less attractive, such as the price of parking, the extent of highway congestion, and the implementation of fuel taxes, tolls, and mileage-based user fees. Under current law, federal grants to transit agencies are based mainly on population, population density, and the amount of service provided. Congress could address the issue of declining ridership by tying the allocation of federal formula funds to agencies' success in boosting ridership or fare revenue. Over the long term, the introduction of fully autonomous vehicles could reduce transit ridership, unless restrictions or fees make them an expensive alternative. However, there is significant uncertainty about when, or whether, fully autonomous vehicles will affect ridership. Given this uncertainty, federal capital funding might focus on buses, which last about 10 years, and not new rail systems that take many years to build and will remain in service for decades. Another option would be to redirect CIG funding from building new rail systems and lines to refurbishing rail transit in the large and dense cities where rail transit currently carries large numbers of riders. The emergence of new mobility options may have reduced transit ridership, but it also may present an opportunity for transit agencies to provide new services to improve customer mobility. FTA has funded some pilot projects through the Research, Development, Demonstration, and Deployment program. An option in reauthorization would be to fund a program that focuses on boosting transit ridership through mobility and technological innovations. Surface transportation is a major source of carbon dioxide (CO 2 ) in the atmosphere, the main human-related greenhouse gas (GHG) contributing to climate change. At the same time, the effects of climate change on environmental conditions, such as extreme heat and global sea level rise, pose a threat to transportation infrastructure. Surface transportation reauthorization may seek to address environmental conditions with mitigation provisions that aim to reduce GHG emissions from surface transportation and adaptation provisions that aim to make the surface transportation system more resilient. S. 2302 , the reauthorization bill reported by the Senate Committee on Environment and Public Works in August 2019, included provisions that address climate change. GHG emissions from the transportation sector come mainly from passenger cars and light trucks. Public transportation might contribute to a reduction of GHG emissions if trips made in personal vehicles, particularly single-occupant trips, are made by trains and buses instead. The efficiency of public transportation in terms of GHG emissions depends, in part, on the amount of ridership in relation to the amount of transit supplied. GHG emissions from public transportation are also dependent on the sources of fuel used to power trains and buses, including the way in which electricity is generated. Specific policy options that might be considered to reduce GHG gases from public transportation vehicles could include funding for alternatives to diesel-powered buses, particularly electric buses using electricity generated from renewable sources. This could include a higher level of funding for the Low or No Emission Vehicle (Lo-No) Program. In the FAST Act, the discretionary Lo-No Program was funded as a $55 million annual set-aside from the Bus and Bus Facilities Program. Another possibility would be to require buses purchased using federal funds to have low or no emissions. Electric buses cost more to purchase than traditional diesel-powered buses, although the lifecycle cost is comparable. To overcome this, the federal government could offer low-interest or no-interest loans for the nonfederal share of the cost of buying electric buses. Adaptation is action to reduce the vulnerabilities and increase the resilience of the transportation system to the effects of climate change. Although much of the funding administered by FTA can be used to assess the potential impacts of climate change on public transportation infrastructure and to apply adaptation strategies, there is currently no dedicated surface transportation funding for adaptation projects. Reauthorization could create a new grant program dedicated to adaptation planning and projects or require that funds from other programs be set aside for such purposes. The Public Transportation Emergency Relief (ER) Program (49 U.S.C. Â§5324; 49 C.F.R. Â§602) provides federal funding on a reimbursement basis to states, territories, local government authorities, Indian tribes, and public transportation agencies for damage to public transportation facilities or operations as a result of a natural disaster or other emergency and to protect assets from future damage, so-called resilience projects. FTA's ER program does not have a permanent annual authorization. Rather, all funds are authorized on a \"such sums as necessary\" basis and require an appropriation from the Treasury's general fund. Because of this, FTA cannot provide funding immediately after a disaster or emergency is declared. Transit agencies, therefore, typically rely on the Federal Emergency Management Agency (FEMA) to fund immediate needs beyond the capacity of state and local government. This could slow the response of transit agencies and blur the lines of responsibility between FTA and FEMA if funds are later appropriated for the ER program. Adding a quick-release mechanism to FTA's ER program would allow FTA funds to be approved and distributed within a few days of a disaster. Such a program already exists for the Federal Highway Administration, with an annual authorization of funds from the Highway Trust Fund, and FTA's program could similarly be authorized an amount from the mass transit account of the fund. Such an authorization, however, would place a new claim on resources of the mass transit account. The FTA's ER program does not have a limit on the amount that can be spent on resilience projects. Although this may allow for better projects, it can result in Congress appropriating larger amounts than might otherwise be necessary, and it could also be a way for transit agencies to fund betterments and new facilities that have little direct connection to the goals of repairing damages and making the transit systems resilient to future natural hazards. A separate resilience program and changes to the ER program may be a more effective way to protect public transportation infrastructure from future disasters. Public transportation is a relatively safe mode of passenger transportation compared with traveling by car and light truck. The fatality rate per passenger mile for cars and light trucks is about double that of transit buses and five times that of heavy rail. While the fatality rate per passenger mile for commuter rail is more comparable with cars and light trucks, most commuter rail fatalities are nonusers, such as trespassing pedestrians and those in vehicles struck at grade crossings. The federal government's role in public transportation safety has been expanded significantly since 2008. One of the major changes was the requirement in the Rail Safety Improvement Act of 2008 ( P.L. 110-432 ) for commuter railroads, along with Amtrak and freight railroads, to install positive train control (PTC), systems that use signals and sensors to monitor and control railroad operations. The federal requirement for PTC resulted in significant capital costs for commuter rail agencies, of which about 10% has been borne by the federal discretionary and formula funds. In addition to the initial costs of installing PTC, commuter rail agencies claim that there will be ongoing costs associated with PTC estimated to be about $160 million per year. Consequently, PTC implementation may have a detrimental effect on the overall financial condition of commuter rail agencies, and, without more funding from federal, state, or local government, may have a detrimental effect on the condition of commuter rail assets. Commuter rail agencies have proposed the creation of a new federal PTC funding program that could pay some or all of these ongoing costs. Separately, proposals have been advanced to dedicate federal funding for commuter railroads to improve the safety of highway-rail grade crossings. With the aim of protecting American manufacturing and manufacturing jobs, Buy America laws place domestic content restrictions on federally funded transportation projects. Buy America requirements vary according to the specific DOT funding program and administering agency. For projects funded by FTA there is a 100% U.S.-made requirement for iron, steel, and manufactured goods. However, Buy America does not apply to rolling stock if more than 70% of components, by value, are produced domestically and final assembly is in the United States. An addition to Buy America law in the National Defense Authorization Act for Fiscal Year 2020 ( P.L. 116-92 , Â§7613) prohibits transit agencies purchasing railcars and buses from certain government-owned, -controlled or -subsidized companies, such as the China Railway Rolling Stock Corporation and BYD, even if they are otherwise Buy America-compliant. Waivers of Buy America requirements can be provided by DOT agencies under certain circumstances, but these can be difficult and time-consuming to obtain. To speed up the waiver process, Congress could require that a waiver decision be made within a specific number of days. Each DOT agency has its own Buy America requirements, creating complications when a project involves funding from more than one of the agencies. Congress might seek to standardize Buy America requirements across the department. Other proposals have been to make Buy America requirements more stringent. For example, the Buy America 2.0 Act ( H.R. 2755 , 116 th Congress) would increase the share of public transit rolling stock components and subcomponents that must be produced in the United States by five percentage points annually beginning in FY2021, reaching 100% by FY2026. Such measures may make it more costly and time-consuming for transit agencies to procure vehicles.", "summary": "The federal public transportation program is currently authorized through FY2020 as part of the Fixing America's Surface Transportation (FAST) Act ( P.L. 114-94 ). This report highlights several major issues that may arise as Congress considers program reauthorization. Public transportation includes local buses, subways, commuter rail, light rail, paratransit (often service for the elderly and disabled using small buses and vans), and ferryboat, but excludes Amtrak, intercity buses, and school buses. The FAST Act authorized $61.1 billion for five fiscal years beginning in FY2016, an average of $12.2 billion per year. Of the total amount, 80% was authorized from the mass transit account of the Highway Trust Fund, and 20% was authorized from the general fund of the U.S. Treasury. Most federal funding from the mass transit account is distributed to transit agencies through formula programs. Most of the general funding authorized is for the Capital Investment Grants (CIG) Program, also known as New Starts, which provides discretionary funding for large capital projects to create and extend rail and bus rapid transit systems. Reauthorization issues discussed in this report include the following: Funding levels and the solvency of the mass transit account . Annual spending from the mass transit account is projected to exceed annual revenues by about $5 billion through FY2025. Bringing receipts and expenditures into balance would require a cut in spending of the federal transit program, an increase in revenues paid into the account, or a combination of the two. Revenue options include increasing taxes that are dedicated to the mass transit accounts and transferring money from the general fund. C hanges to two federal loan programs that may be used for transit capital expenditures , t he Transportation Infrastructure Finance and Innovation Act (TIFIA) program and the Railroad Rehabilitation and Infrastructure Finance (RRIF) program . Issues include TIFIA's share of project costs, the speed and cost of obtaining a loan, and the authorization of federal funding to pay the credit risk premium of RRIF loans. Declining public transportation ridership . Options include linking federal formula funds to transit agencies' success in boosting ridership; redirecting CIG funding from building new rail facilities to refurbishing lines in dense cities where rail transit currently carries large numbers of riders; and funding research projects to explore partnerships between transit agencies and firms offering new mobility options such as ridesharing and bike sharing. F unding the CIG program . CIG has been proposed as a major source of funding for the Gateway Program, which is intended to build new rail tunnels and repair existing tunnels between New Jersey and New York. The amount sought for the Gateway Program is equal to several years of funding for CIG, at recent funding levels, and could overwhelm a program that is responsible for aiding projects throughout the country. Public transportation and climate change. Congress may consider how to reduce greenhouse gas emissions from surface transportation and adaptation provisions that aim to make the public transportation system more resilient. Options considered might include dedicated funding for resilience projects and greater funding for buying low and no emission buses. Buy America . This law places domestic content restrictions on federally funded transportation projects, including procurement of rolling stock. Issues that might arise include the share of components and subcomponents that have to be domestically sourced, the availability of waivers, and the standardization of requirements across modes.", "document_type": "crs"}
{"report": "Paid family leave (PFL) refers to partially or fully compensated time away from work for specific and generally significant family caregiving needs, such as the arrival of a new child or serious illness of a close family member. Although the Family and Medical Leave Act of 1993 (FMLA; P.L. 103-3 ) provides eligible workers with a federal entitlement to unpaid leave for a limited set of family caregiving needs, no federal law requires private-sector employers to provide paid leave of any kind. Currently, employees may access PFL if offered by an employer. In addition, some states have created family leave insurance (FLI) programs, which provide cash benefits to eligible workers who engage in certain (state-identified) family caregiving activities. In these states, workers can access PFL by combining an entitlement to unpaid leave with state-provided insurance benefits. Some Congressional proposals to expand national access to paid family leave expand upon these existing mechanisms. A new tax credit, created in December 2017 ( P.L. 115-97 ), seeks to expand voluntary employer-provided PFL, and—similar to the state insurance approach—the Family and Medical Insurance (FAMILY Act; S. 463 / H.R. 1185 ), which proposes to create a national wage insurance program for persons engaged in family caregiving activities or who take leave for their own serious health condition. The New Parents Act ( S. 920 / H.R. 1940 ) would allow parents of a new child to receive Social Security benefits, to be repaid at a later date, for the purposes of financing parental leave. Others proposals, such as the Working Parents Flexibility Act of 2019 ( H.R. 1859 ) and the Freedom for Families Act ( H.R. 2163 ), would amend the tax code to provide tax-advantages to individuals with caregiving responsibilities. Members of Congress who support increased access to paid leave generally cite as their motivation the significant and growing difficulties some workers face when balancing work and family responsibilities, and the financial challenges faced by many working families that put unpaid leave out of reach. In general, expected benefits of expanded access to PFL include stronger labor force attachment for family caregivers and greater income stability for their families, and improvements to worker morale, job tenure, and other productivity-related factors. Potential costs include the financing of payments made to workers on leave, other expenses related to periods of leave (e.g., hiring a temporary replacement or productivity losses related to an absence), and administrative costs. The magnitude and distributions of costs and benefits will depend on how the policy is implemented, including the size and duration of benefits, how benefits are financed, and other policy factors. This report provides an overview of paid family leave in the United States, summarizes state-level family leave insurance programs, notes PFL policies in other advanced-economy countries, and notes recent federal legislative action to increase access to paid family leave. Throughout their careers, many workers encounter a variety of family caregiving obligations that conflict with work time. Some of these are broadly experienced by working families but tend to be short in duration, such as episodic child care conflicts, school meetings and events, routine medical appointments, and minor illness of an immediate family member. Others are more significant in terms of their impact on families and the amount of leave needed, but occur less frequently in the general worker population, such as the arrival of a new child or a serious medical condition that requires inpatient care or continuing treatment. Although all these needs for leave may be consequential for working families, the term family leave is generally used to describe the latter, more significant, group of needs that tend to require longer periods of time away from work. As defined in state law and federal proposals, family caregiving activities that are eligible for PFL or leave insurance benefits generally include caring for and bonding with a newly arrived child and attending to the serious medical needs of certain close family members; some also allow leave or benefits for workers with certain military family needs. In practice, day-to-day needs for leave to attend to family matters (e.g., a school conference or lapse in child care coverage), minor illness (e.g., common cold), or preventive care are not included among family leave categories. Employer-provided PFL in the private sector is voluntary. According to a national survey of employers conducted by the Bureau of Labor Statistics (BLS), 16% of private-industry employees had access to PFL (separate from other leave categories) through their employer in March 2018. These statistics, displayed in Table 1 , further show that PFL was more prevalent among managerial and professional occupations; information, financial, and professional and technical service industries; high-paying occupations; full-time workers; and workers in large companies (as measured by number of employees). Recent announcements by several large companies suggest that access may be increasing among certain groups of workers. Among new company policies announced in recent years, some emphasize parental leave (i.e., leave taken by mothers and fathers in connection with the arrival of a new child), and others offer broader uses of family leave. A 2017 study by the Pew Research Center (Pew) examined U.S. perceptions of and experiences with paid family and medical leave; its results provide insights into the need for such leave among U.S. workers and its availability for those who need it. Pew reports, for example, that 27% of persons who were employed for pay between November 2014 and November 2016 took leave (paid and unpaid) for family caregiving reasons or their own serious health condition over that time period, and another 16% had a need for such leave but were not able to take it. Among workers who were able to use leave, 47% received full pay, 36% received no pay, and 16% received partial pay. Consistent with BLS data, the Pew study indicates that lower-paid workers have less access to paid leave; among leave takers, 62% of workers in households with less than $30,000 in annual earnings reported they received no pay during leave, whereas this figure was 26% among those with annual household incomes at or above $75,000. Some states have enacted legislation to create state paid FLI programs, which provide cash benefits to eligible workers who engage in certain caregiving activities. Four states—California, New Jersey, New York, and Rhode Island—have active programs. Three additional programs—those in the District of Columbia (DC), Washington State, and Massachusetts—await implementation. Table 2 summarizes key provisions of state FLI laws and shows the following: The maximum weeks of benefits available to workers and wage replacement rates vary across states. Existing state FLI programs offer between 4 weeks (Rhode Island) and 10 weeks (New York) of benefits. Starting July 1, 2020, New Jersey is to increase benefit weeks from 6 to 12. When its plan is implemented, DC is to offer 8 weeks of paid family leave in 2020, and Washington State is to offer 12 weeks of paid family leave in the same year. New York's entitlement is to increase to 12 weeks of benefits when its plan is fully implemented in 2021. Massachusetts is to provide up to 12 weeks for family leave, unless leave is used to provide care to a seriously ill or injured military service member, when up to 26 weeks may be used. Program eligibility typically involves in-state employment of a minimum duration, minimum earnings in covered employment, or contributions to the insurance funds. All state FLI programs currently in operation are financed entirely by employee payroll tax receipts; however, when implemented, the DC program is set to be financed by employers. Massachusetts' and Washington State's programs are to be jointly financed by employers and employees, with some exceptions. Some FLI programs (e.g., Rhode Island) provide job protection directly to workers who receive FLI benefits, meaning that employers must allow a worker to return to his or her job after leave has ended. Workers in other states may receive job protection if they are entitled to leave under federal or state family and medical leave laws, and coordinate such job-protected leave and FLI benefits. Many advanced-economy countries entitle workers to some form of paid family leave. Whereas some provide leave to employees engaged in family caregiving (e.g., of parents, spouse, and other family members), many emphasize leave for new parents, mothers in particular. As of 2016, the Organization for Economic Co-operation and Development (OECD) family leave database counts 34 of its 35 members as providing some paid parental leave (i.e., to care for children) and maternity leave, with wide variation in the number of weeks and rate of wage replacement across countries. This is shown in Figure 1 , which plots the OECD's estimates of weeks of full-wage equivalent leave available to mothers. Weeks of full-wage equivalent leave are calculated as the number of weeks of leave available multiplied by the average wage payment rate. For example, a country that offers 12 weeks of leave at 50% pay would be said to offer 6 full-wage equivalent weeks of leave (i.e., 12 weeks x 50% = 6 weeks). A smaller share (27 of 35) of OECD countries provides paid leave to new fathers. In some cases, fathers are entitled to less than a week of leave, often at full pay (e.g., Greece, Italy, and the Netherlands), whereas others provide several weeks of full or partial pay (e.g., Portugal provides five weeks at full pay, and the United Kingdom provides two weeks at an average payment rate of 20.2%). Some countries provide a separate entitlement to fathers for child caregiving purposes. This type of parental leave can be an individual entitlement for fathers or a family entitlement that can be drawn from by both parents. In the latter case, some countries (e.g., Japan, Luxembourg, and Finland) set aside a portion of the family entitlement for fathers' use, with the goal of encouraging fathers' participation in caregiving. Figure 2 summarizes paid leave entitlements reserved for fathers in OECD countries in 2016; it plots the OECD's estimates of weeks of full-wage equivalent paternity leave and parental leave reserved for fathers. The OECD examined the availability of family caregiver leave among its member countries in 2011 and found that of the 25 countries for which it could identify information, 14 had polices providing paid leave to workers with ill or dying family members; these are summarized in Table 3 . Qualifying needs for leave, leave entitlement durations, benefit amounts, and eligibility conditions varied considerably across the countries included in the OECD study. The overarching goal of PFL legislative activity in the 116 th Congress has been to increase access to leave by reducing the costs associated with providing or taking leave. The Strong Families Act, which became law in December 2017 ( P.L. 115-97 ), allows employers to claim tax credits for a portion of wages paid to certain employees taking family or medical leave; this approach potentially increases access to PFL for workers while reducing the costs to employers of providing the leave. A second approach addresses costs incurred by workers taking leave. For example, the establishment of a national family leave insurance program, such as that proposed in the Family and Medical Insurance Leave Act (FAMILY Act; S. 463 / H.R. 1185 ), would provide cash benefits to eligible individuals who are engaged in certain caregiving activities, potentially making the use of unpaid leave (e.g., as provided by FMLA or voluntarily by employers) affordable for some workers. Proposals such as the New Parents Act ( S. 920 / H.R. 1940 ) would allow eligible new parents to receive to up to three months of Social Security benefits, in return for deferring retirement (or early retirement) by a period of time determined by the Social Security Administration to cover the costs of the parental benefit. Other approaches include proposals to create tax-advantaged parental leave savings accounts (e.g., the Working Parents Flexibility Act of 2019, H.R. 1859 ) and tax-advantaged distributions from health savings accounts for family and medical leave purposes (e.g., the Freedom for Families Act, H.R. 2163 ). In addition, the President's FY2020 budget proposes to provide six weeks of financial support to new parents through state unemployment compensation (UC) programs. A similar approach was taken in 2000 by the Clinton Administration, which—via Department of Labor regulations—allowed states to use their UC programs to provide UC benefits to parents who take unpaid leave under the FMLA, other approved unpaid leave, or otherwise take time off from employment after the birth or adoption of a child. The Birth and Adoption Unemployment Compensation rule took effect in August 2000, and it was later removed from federal regulations in November 2003.", "summary": "Paid family leave (PFL) refers to partially or fully compensated time away from work for specific and generally significant family caregiving needs, such as the arrival of a new child or serious illness of a close family member. Although the Family and Medical Leave Act of 1993 (FMLA; P.L. 103-3) provides eligible workers with a federal entitlement to unpaid leave for a limited set of family caregiving needs, no federal law requires private-sector employers to provide paid leave of any kind. Currently, employees may access paid family leave if it is offered by an employer. In addition, workers in certain states may be eligible for state family leave insurance benefits that can provide some income support during periods of unpaid leave. As defined in state law and federal proposals, family caregiving activities that are eligible for PFL or family leave insurance generally include caring for and bonding with a newly arrived child and attending to serious medical needs of certain close family members. Some permit leave for other reasons, but in practice, day-to-day needs for leave to attend to family matters (e.g., a school conference or lapse in child care coverage), minor illness, and preventive care are not included among \"family leave\" categories. Employer provision of PFL in the private sector is voluntary. According to a national survey of employers conducted by the Bureau of Labor Statistics, 16% of private-industry employees had access to PFL through their employers in March 2018. The availability of PFL was more prevalent among professional and technical occupations and industries, high-paying occupations, full-time workers, and workers in large companies (as measured by number of employees). Recent announcements by several large companies indicate that access may be increasing among certain groups of workers. In addition, some states have enacted legislation to create state paid family leave insurance (FLI) programs, which provide cash benefits to eligible workers who engage in certain caregiving activities. California, Rhode Island, and New Jersey currently operate FLI programs, which offer 4 to 10 weeks of benefits to eligible workers. Three other states and the District of Columbia have enacted FLI programs, but they are not yet fully implemented and paying benefits. The New York program began phased implementation in 2018. The District of Columbia FLI legislation took effect in April 2017, and Washington State's FLI law took effect in July 2017; benefit payments start in 2020 for both programs. Massachusetts' family leave program was signed into law in June 2018; its benefit payments are to begin in January 2021. Many advanced-economy countries entitle workers to some form of paid family leave. Whereas some provide leave to employees engaged in family caregiving (e.g., of parents, spouses, and other family members), many emphasize leave for new parents, mothers in particular. The United States is the only Organization for Economic Co-operation and Development (OECD) member to not offer paid leave to new mothers. In December 2017, Congress passed H.R. 1 (P.L. 115-97), which included tax incentives to employers to voluntarily offer paid family and medical leave to employees. Proposals to expand national access to paid family leave have been introduced in the 116th Congress, such as the Family and Medical Insurance Leave Act (FAMILY Act; S. 463/H.R. 1185), which proposes to create a national wage insurance program for persons engaged in family caregiving activities or who take leave for their own serious health condition (i.e., a family and medical leave insurance program), and the New Parents Act (S. 920/ H.R. 1940) which would allow parents of a new child to receive Social Security benefits for the purposes of financing parental leave. Others have proposed using the tax code to provide tax advantages to individuals with caregiving responsibilities.", "document_type": "crs"}
{"report": "As Congress continues to consider reforms to secure the Social Security program's solvency, a related discussion has e merged around targeted reforms for vulnerable groupsâwidows, low earners, caregivers, older beneficiaries, spouses, and never-married individualsâwho may deserve targeted benefit enhancements as part of a broader Social Security reform package. This report focuses on widows and Social Security policy levers to aid them. Researchers and policymakers have commented on both benefit adequacy and benefit equity in the context of Social Security benefits for widows. Concerns about the adequacy of Social Security benefits for widows stem from the fact that the widow has outlived the spouse and likely contends with a reduced monthly income after the spouse's death. The widow also may confront significant medical or long-term care expenses associated with the deceased spouse's end-of-life care. In addition, on average, women outlive men and today's widows face increased life expectancy relative to earlier birth cohorts, thus increasing the possibility of outliving their retirement resources and incurring significant expenses for their own long-term care. Benefit equity concerns stem from Social Security program rules that provide higher benefits to one-earner couples than to two-earner couples with identical lifetime earnings and payroll tax contributions. Social Security was designed in the era of a traditional family with a working husband and a wife devoted to home production. Marital patterns, gender roles, and work patterns have changed substantially since the 1930s. Benefit equity would be improved by providing equal benefits for equal contributions. This report seeks to discuss current-law Social Security provisions pertaining to widows; describe the characteristics of Social Security widow beneficiaries; illustrate the benefit adequacy and benefit equity concerns leading to a perceived need for targeted benefit enhancements for widows; explain policy levers that may be modified to aid widows; outline legislative proposals and proposals in the literature concerning widows, highlighting their projected effects on program solvency and estimated distributional effects; and identify other Social Security reform options that would indirectly benefit widows. Social Security provides monthly cash benefits to retired or disabled workers and their family members and to the family members of deceased workers. Workers become eligible for Social Security benefits by working in Social Security covered employment. A worker generally needs 40 earnings credits (10 years of covered employment) to obtain insured status and become eligible for a Social Security retired-worker benefit. Employers and employees each contribute payroll taxes of 6.2% of covered earnings, up to an annual limit on taxable earnings ($132,900 in 2019). Monthly benefits are based on the worker's career-average earnings in covered employment. Full retired-worker benefits are available at the full retirement age (FRA), currently age 66 and gradually increasing to age 67 in 2022 for individuals born in 1960 or later. Reduced retired-worker benefits are available beginning at age 62. Workers who claim benefits after the FRA are eligible for delayed retirement credits up to age 70. The spouse of a retired worker may receive a spousal benefit of up to 50% of the retired worker's basic benefit amount, called the primary insurance amount (PIA). The widow of a deceased worker may receive a survivor benefit of up to 100% of the deceased worker's PIA. Spousal and survivor (widow) benefits are subject to adjustments based on the (surviving) spouse's age at entitlement, the retired or deceased worker's age at entitlement, the receipt of a Social Security benefit based on the (surviving) spouse's own work record, earnings prior to the FRA above certain thresholds, and earnings from employment not covered by Social Security. Survivor benefits are derived from the deceased worker's Social Security insurance status and lifetime covered earnings. Spouses and former spouses of fully insured deceased workers (those with 40 or more earnings credits) are eligible for survivor benefits as long as they meet the other requirements for those benefits. For example, the surviving spouse (widow) must be aged 60 or older (sometimes referred to as a nondisabled widow ) and must not have remarried before age 60. A surviving spouse with a qualifying disability who has not remarried before age 50 may begin to receive survivor benefits at age 50 (referred to as a disabled widow ). The surviving spouse also may receive disabled widow benefits if disabled within 7 years after the death of the fully insured spouse, or before age 60, whichever is earlier. A divorced surviving spouse (divorced widow) who has not remarried before age 60 (age 50 if disabled) can claim a survivors benefit beginning at age 60 (age 50 if disabled) based on a marriage that lasted at least 10 years. The widow benefit is a specified percentage of the deceased worker's PIA, depending on the widow's age and relationship to the deceased worker. If a widow qualifies for a retirement benefit based on the widow's own work record and the deceased spouse's work record, the widow has dual entitlement and receives the higher amount of the two benefits. In essence, if the widow's own worker benefit is lower than the deceased spouse's worker benefit, the widow receives the widow's own worker benefit plus a reduced widow benefit equal to the difference between the full widow benefit and the widow's retired worker benefit. Monthly benefits are adjusted each year by the cost-of-living adjustment that is applied to all Social Security benefits. Widow benefits are payable in the month of the deceased spouse's death, regardless of when the death occurred during the month. A widow's benefit is affected by both the widow's own claiming age and the deceased spouse's claiming age. A widow who begins to collect a widow benefit at the FRA will receive 100% of the deceased spouse's PIA. A widow who begins collecting benefits before the FRA will receive reduced benefits. A nondisabled widow who claims benefits at age 60 or a disabled widow who claims at age 50 will receive 71.5% of the deceased worker's PIA, the largest reduction possible. If the deceased worker claimed reduced benefits before the FRA, the widow benefit will be reduced as well, because it cannot exceed the deceased worker's reduced benefit amount. This provision is referred to as the widow(er)'s limit , under which the widow benefit may be reduced to a floor of 82.5% of the deceased worker's full PIA. Conversely, if the deceased worker claimed benefits after the FRA, the deceased worker's delayed retirement credits increase the widow benefit. In considering the reduction for the widow claiming benefits before the widow's FRA and the widow(er)'s limit reduction if the deceased worker claimed benefits before the deceased worker's FRA, the widow receives the smaller of the two benefit amounts. Among nondisabled widow beneficiaries in December 2018, about 52.2% had their benefits reduced by claiming benefits before their own FRA, about 23.1% had their benefits reduced because their deceased spouse claimed benefits before the FRA, and about 4.1% had their benefits reduced because both the widow and the deceased spouse claimed benefits before their respective FRAs. The total amount of survivor benefits paid on a deceased worker's account to qualifying family members is capped at 150% to 188% of the deceased worker's PIA, depending on the value of the PIA. If total survivor benefits exceed this family maximum , each person's benefit is reduced proportionately. In addition, if a widow claims benefits before the FRA and is working, the benefit may be reduced by the retirement earnings test, depending on the amount of earnings. Finally, widows with earnings not covered by Social Security may face reduced benefits due to the government pension offset. In December 2018, 3.91 million individuals received Social Security widow benefits, representing about 6.2% of the 62.9 million Social Security beneficiaries ( Table 1 ). Women accounted for 96.3% of widow beneficiaries. More than 41% of nondisabled widow beneficiaries are aged 80 or older. In total, Social Security paid $5.26 billion in widow benefits in December 2018, averaging $1,388 per month for nondisabled widows and $747.41 per month for disabled widows ( Table 1 ). Among nondisabled widow beneficiaries, 12.1% had a monthly benefit less than $750, whereas 11.2% had a monthly benefit of $2,000 or more. About 79.4% of nondisabled widow beneficiaries aged 65 or older had their monthly benefit reduced because of their own early retirement (52.2%), early retirement by their deceased spouse (23.1%), or both (4.1%). Researchers and policymakers have raised concerns about both benefit adequacy and benefit equity in the context of Social Security benefits for widows. Concerns about benefit adequacy stem from the facts that the widow has outlived the spouse, may contend with a reduced monthly income after the spouse's death, may confront significant medical and long-term care expenses associated with the deceased spouse's end-of-life care, and is at risk of outliving retirement resources and incurring significant expenses for long-term care. Concerns about benefit equity stem from Social Security program rules that provide higher benefits to one-earner couples than to two-earner couples with identical lifetime earnings and Social Security payroll tax contributions. More equitable program rules, reflecting changes in family structure and the work patterns of husbands and wives, would provide equal benefits for equal contributions. A widow is at risk of a substantial income reduction after the spouse's death, compared with the couple's total income prior to the spouse's death. The widow's Social Security benefit may be 33% to 50% lower than the combined couple's Social Security benefit. The deceased spouse's pension from work may be lost or cut in half. The widow also may confront depleted assets from the deceased spouse's medical or long-term care expenses. In addition, on average, women outlive men and today's widows face increased life expectancy relative to earlier cohorts, potentially incurring significant expenses for their own long-term care and increasing the risk of outliving their retirement resources. These factors contribute to high observed poverty rates among widows and concerns about the adequacy of Social Security benefits in widowhood. Table 2 provides hypothetical examples of the differing benefit reductions experienced by widows depending on the relative earnings of the husband and wife. In Example 1, spouse A (worker) in a single-earner couple receives a Social Security benefit at the FRA of $1,770 per month and spouse B (nonworker) receives a Social Security spouse benefit at the FRA of $885 per month (50% of the worker's benefit). The combined couple's retirement benefit is $2,655, or 150% of the worker's PIA (100% of the worker's PIA plus a spouse benefit equal to 50% of the worker's PIA). After the worker's death, the widow (spouse B) receives a widow benefit equal to 100% of the deceased worker's benefit, which is 67% of the combined couple's benefit while both were alive (or a 33% reduction). For the two-earner couple in Example 2, where spouse A and spouse B have equal earnings and both claim benefits at the FRA, their combined benefit is 200% of either worker's PIA ($1,120 for spouse A plus $1,120 for spouse B equals $2,240 combined for the couple). After spouse A's death, the widow (spouse B) continues to receive a worker benefit (which is equivalent to the widow benefit from the deceased husband). The total monthly benefit is 50% of the combined couple's benefit while both spouses were alive (or a 50% reduction). Example 3 shows a two-earner couple with unequal earnings. Spouse A receives a Social Security retirement benefit at the FRA of $1,770 per month. Spouse B, with lower earnings, receives a worker benefit at the FRA of $1,120 per month. The combined couple's benefit is $2,890 per month. Upon spouse A's death, the widow (spouse B) continues to receive a worker benefit, increased by the widow benefit to equal $1,770 per month, or 100% of the deceased worker's benefit. The widow's monthly benefit is 61% of the combined couple's benefit while both were alive (or a 39% reduction). Placing the Social Security benefit reduction experienced by a widow upon the spouse's death in the broader context of benefit adequacy requires assessing a single person's consumption needs relative to a couple's. Clearly, a single person's consumption (and thus income) needs are lower than a couple's. The precise amount of the reduction depends upon the extent of economies of scale experienced by a couple relative to a single person, that is, the degree to which a single person needs more than half the income of a couple to sustain the same standard of living. One way to operationalize this concept is to look at the differences between poverty thresholds for one-person and two-person families. The federal poverty threshold in 2018 for a one-person family over the age of 65 was 79% of the federal poverty threshold for a two-person family over the age of 65. The Census Bureau's Supplemental Poverty Measure results in a threshold for a one-adult family equal to about 70% of the threshold for a two-adult family. These measures suggest that Social Security widow benefits equaling between 50% and 67% of the combined couple's benefit while both spouses were alive may not be sufficient to sustain the widow's consumption. In addition to reduced Social Security benefits, widows are likely to lose partâor in some cases, allâof any private pension payments that were received by the deceased spouse. Prior to the Employee Retirement Income Security Act (ERISA) reforms in 1974, the default pension payout scheme was a single-life annuity that ended upon the retired worker's death. ERISA changed the default to a joint-and-survivor benefit that would continue payments to the widow, albeit at a reduced rate (typically 50%). Further reforms under the Retirement Equity Act of 1984 require the signatures of both the worker and the spouse when choosing a single-life benefit instead of the (default) joint-and-survivor benefit. In either case, the reduction in pension income upon widowhood can be substantial. Pension income also tends to decrease in real value over time, with very few private-sector defined-benefit pensions offering postretirement cost-of-living adjustments. Widows may experience significant reductions in wealth and private savings following their spouse's death because of medical and long-term care expenses at the end of life. One study finds that end-of-life out-of-pocket medical expenses are large both in absolute terms and relative to income. Among those in the lowest 25% of the income distribution, end-of-life medical expenses were found to equal roughly 70% of income. On average, women live longer than men, and women today live longer than women from earlier cohorts. Remaining life expectancy at retirement is projected to be 2.5 years greater for women reaching age 65 in 2019 compared with men reaching age 65 in 2019. In addition, remaining life expectancy at retirement has increased substantially across birth cohorts. For example, remaining cohort life expectancy for a woman reaching age 65 in 2019 is projected to be 21.5 years, compared with 20.0 years for a woman reaching age 65 in 1999 and 18.8 years for a woman reaching age 65 in 1979. However, these life expectancy gains are not shared equally by all men and women. Greater improvements in life expectancy have been experienced by those in the upper portions of the income distribution relative to those with lower incomes, resulting in a growing gap in life expectancy by income. With that as background, consider that in 2017, about 18% of all individuals aged 60 or older were widows; however, nearly 26% of individuals aged 60 or older who lived in families with income below the federal poverty threshold were widows, as shown in Table 3 . Table 4 shows the poverty rate in 2017 among individuals aged 60 or older by Social Security beneficiary status and marital status. Among individuals aged 60 or older, the poverty rate among widows was 13.7%, compared with 9.5% for all individuals, 4.4% for married individuals living together, 17.6% for divorced or separated individuals, and 23.7% for never-married individuals. Poverty rates were lower across the board for individuals aged 60 or older who receive Social Security benefits, but still relatively high for widows (10.1%). Never-married individuals had the highest poverty rate among Social Security beneficiaries aged 60 or older, at 19.8%, whereas 2.4% of married individuals living together and receiving Social Security benefits lived in poverty. Although considerably smaller in number, non-Social Security beneficiaries aged 60 or older had substantially higher poverty rates, reaching 30.5% among widows (not shown). Older womenâin general and among Social Security beneficiaries; among widowed women in particular as well as women who are divorced or separatedâhad higher poverty rates than older men. In 2017, the poverty rate was 14.6% for widowed women aged 60 or older and 10.8% for widowed women aged 60 or older receiving Social Security benefits, compared with 10.5% and 7.7%, respectively, for men aged 60 or older (see Table 5 ). Table 5 also provides the poverty rate for widows and widowers aged 60 or older, and widows and widowers aged 60 or older receiving Social Security benefits by age, race, ethnicity, educational attainment, and earnings in 2017. The poverty statistics provide clear evidence that widows are more vulnerable than widowers across all subgroups. The poverty statistics also show that receipt of Social Security benefits reduces poverty overall and, for many subgroups, narrows the gap in poverty rates between widows and widowers. Focusing on widows receiving Social Security benefits, young widows (aged 60-64) have a higher poverty rate (19.5%), and older widows (aged 75 or older) have moderately higher poverty rates (10%-11%), compared with widows aged 65-74 (roughly 8%). White, Asian, and non-Hispanic widows aged 60 or older receiving Social Security benefits have substantially lower poverty rates (around 9%) than black and Hispanic widows aged 60 or older receiving Social Security benefits (20.4% and 19.6%, respectively). Better-educated widows aged 60 or older receiving Social Security benefits have lower poverty rates. Among the small fraction of widows aged 60 or older receiving Social Security benefits who had any earnings in 2017, the poverty rate was 0.9%. Considering changes in all income sources, studies find that widows experience an income reduction of 35% to 40% upon their spouse's death. The reduction in income leads to significant increases in poverty rates among widows, the effects of which may compound over time for women who become widowed at younger ages and experience widowhood for longer time periods. Moreover, a substantial fraction of older adults living alone (which may include widows as well as divorced or separated individuals and never-married individuals) has income above the poverty threshold but still below a level that achieves long-term economic stability. Estimates from the CPS show that, in 2017, 16.7% of all widows aged 60 or older and 18.3% of all widows aged 60 or older receiving Social Security benefits lived in near poverty , meaning their family income is above the federal poverty threshold but below 150% of the federal poverty threshold. Changes over the past 80-plus years in family structure and the work patterns of husbands and wives are not reflected in current Social Security program rules, leading to some concerns about benefit equity. Benefit equity suggests that equal lifetime earnings should yield equal benefits. However, under existing program rules, some two-earner couples with substantially higher earnings and contributions receive only slightly higher retirement and widow benefits than traditional one-earner couples with a working husband and a wife devoted to home production. Social Security benefits for a spouse with no labor market earnings were designed to be relatively generous. Thus, a traditional one-earner couple receives higher benefits than a two-earner couple with identical lifetime earnings and payroll tax contributions. Consider the examples in Table 6 , which follow the same couples from Table 2 but add detail about their underlying earnings and Social Security payroll taxes paid. As before, the examples assume that both spouses retire at their full retirement age and receive unreduced benefits. Example 1 is the traditional one-earner couple, where spouse A earns wages in the workforce and spouse B specializes in home production (no wage earnings). Example 2 is a two-earner couple, with the same total annual earnings and payroll taxes as in Example 1, earned and paid in equal proportions by spouse A and B. Despite paying equal payroll taxes, the couple in Example 2 receives lower Social Security benefits during retirement and the total monthly benefit to the widow (spouse B) is substantially lower. In Example 3, spouse A's earnings are the same as in Example 1, but now spouse B also has earnings and makes payroll tax contributions. Although the combined benefit in retirement is somewhat higher in Example 3 than in Example 1, reflecting spouse B's earnings, the total monthly benefit to the widow is equal in both examples. Spouse B's earnings in example 3 do not increase the total monthly benefit in widowhood. Driven by concerns about Social Security benefit adequacy and benefit equity for widows, researchers, advocates, and policymakers have considered several approaches to modifying Social Security benefits to aid widows. One approach is to adjust the Social Security program policy levers that most directly affect widows. These levers include the fraction of the deceased worker's PIA that the surviving spouse would receive under the widow(er)'s limit, the provision of credits for delayed claiming, the parameters around benefits for disabled widows, and the lump-sum death benefit. Another approach is to develop an alternative widow benefit, envisioned as a percentage of the couple's combined Social Security benefits while both were alive, with the widow receiving the higher of this alternative benefit amount and the current-law widow benefit. This section looks to the research and policy literature, and previously introduced legislation in some cases, to describe policy options. The discussion identifies potential effects on benefit adequacy and benefit equity, and highlights projected effects on program solvency and estimated distributional effects. As described earlier, the widow(er)'s limit reduces the widow benefit by as much as 17.5%, to a floor of 82.5% of the deceased worker's full PIA, if the deceased worker claimed reduced benefits before the FRA. The idea behind the widow(er)'s limit is that the widow's benefit cannot exceed the deceased worker's reduced benefit amount. The widow(er)'s limit also provides incentives for married workers to delay claiming Social Security benefits. However, it negatively affects benefit adequacy for widows, some of whom may have limited access to non-Social Security sources of income. Although the widow(er)'s limit is a little-known feature of the Social Security program, it affected the benefits of about 27% of Social Security nondisabled widow beneficiaries aged 65 or older in December 2018, or 857,135 beneficiaries. The effects of eliminating or modifying the widow(er)'s limit were estimated in a 2001 Social Security Administration (SSA) study, with data pertaining to the mid- to late 1990s. Eliminating the widow(er)'s limit would produce the largest estimated effects, increasing the total amount of widow benefit payments by about 5%. For widows who experience the maximum benefit reduction of 17.5% under the widow(er)'s limit, eliminating the widow(er)'s limit would substantially improve benefit adequacy. However, the SSA study estimated that only 14% of the increased benefit payments would be received by widows in poverty and that 40% would be received by widows near poverty (with income under 150% of the federal poverty threshold). Adjustments to the widow(er)'s limit could be designed to direct more of the increased benefit payments to widows in or near poverty, but then would affect fewer widows and would do less to improve benefit adequacy. Other options explored in the SSA study to modify the widow(er)'s limit, again affecting fewer widows, focus on individuals who are widowed before the FRA or cases in which the worker dies before the FRA. Eliminating the widow(er)'s limit would mean that the widow would receive better survivor protection from Social Security than the (deceased) worker, considering that, if the spouse were to die before the worker, the worker would continue to receive a reduced worker benefit (for claiming before the FRA). None of the potential changes to the widow(er)'s limit address the equity concerns with current-law widows benefits. Two billsâ S. 345 and H.R. 4123 âhave been introduced in the 116 th Congress that would provide credits, or increased benefits, for widows who delay claiming or temporarily suspend receipt of benefits on their deceased spouse's work record. Among other changes, S. 345 would modify widow benefits as follows: For widows whose current-law benefit would be less than 100% of the deceased spouse's PIA, it would increase benefits by between 0.34% and 0.39% per month (up to 4.1% to 4.7% annually), depending on the widow's FRA, for each month of delayed claiming or suspension beyond age 60, up to 100% of the deceased spouse's PIA. For widows whose current-law benefit would be equal to or greater than 100% of the deceased spouse's PIA, it would increase monthly benefits at the retired-worker delayed retirement credit rate (0.67% per month, up to 8% annually, for individuals born in 1944 and later) for each month of delayed claiming or suspension, up to 124% of PIA if the deceased spouse's FRA was 67 or 132% of PIA if the deceased spouse's FRA was 66. Under H.R. 4123 , monthly widow benefits would be increased at the retired-worker delayed retirement credit rate (0.67% per month, up to 8% annually, for individuals born in 1944 and later) for widows who delay claiming or suspend benefits beyond their FRA, up to age 70. SSA's Office of the Chief Actuary (OCACT) estimated the financial effects on Social Security of S. 3457 , a 115 th Congress version of S. 345 . The estimates are based on the 2018 Trustees Report's intermediate assumptions and address the policy change's effects on the combined reserves of the Old-Age and Survivors Insurance and Disability Insurance Trust Funds. OCACT estimated that Section 4 of S. 3457 , pertaining to the increased widow benefits for delayed or suspended claiming described above, would worsen the Social Security program's actuarial balance by 0.02% of taxable payroll and would have resulted in about 400,000 widow beneficiaries receiving higher monthly benefits in 2018 if the provision had always been in effect. OCACT estimates of H.R. 4123 are not available. Both bills would improve benefit adequacy for affected widows, but would not address the equity concerns with current-law widow benefits. Three bills introduced in the 116 th Congress would adjust the parameters for disabled widow benefits. S. 345 , H.R. 4122 , and H.R. 4125 would expand eligibility for disabled widow benefits by eliminating the requirements that a disabled widow be at least 50 years old and that, if not disabled at the time of the spouse's death, the widow become disabled within seven years of the spouse's death (or by age 60, whichever is earlier). The bills would enhance benefits by eliminating the reduction of disabled widow benefits for those claiming before their FRA, effectively establishing a floor for disabled widow benefits equal to 100% of the deceased spouse's PIA. OCACT's estimates of S. 3457 's financial effects (mentioned above in \" Credits for Delayed Claiming \") found that Section 2 of the bill, pertaining to the expanded eligibility and benefit enhancements for disabled widow benefits described above, would worsen the Social Security program's actuarial balance by 0.02% of taxable payroll and would have resulted in about 600,000 widow beneficiaries receiving higher monthly benefits, or additionally receiving benefits, in 2018 if the provision had always been in effect. Although not directly addressed in the OCACT estimates, these eligibility expansions and benefit expansions could induce some widows with disabilities to apply for benefits who would not have done so under current law. OCACT did not produce estimates for H.R. 4122 and H.R. 4125 . These bills would improve benefit adequacy for affected disabled widows, but would not address the equity concerns with current-law widow benefits. When a Social Security-insured worker dies, the surviving spouse who was living with the deceased worker is entitled to a one-time, lump-sum death benefit of $255. The dollar value of the lump-sum death benefit has not changed since 1954, meaning that its real value, after adjusting for inflation, has eroded significantly over time. Over the years, proposals have been put forward to modify or eliminate the lump-sum death benefit, including several proposals to increase it. In the context of aiding widows as a vulnerable group, even a substantial increase in the lump-sum death benefit would provide only partial reliefâthrough a one-time paymentâfor the deceased spouse's end-of-life expenses (medical and burial). As such, it would address the adequacy concerns with current-law widow benefits in only a limited fashion. As an across-the-board increase for all widows, it would not be targeted to those in poverty or near poverty. Moreover, it would not alleviate the equity concerns with current-law widow benefits. Another approach to modifying Social Security benefits to aid widows is to calculate an alternative widow benefit. Many authors in the research and policy literature envision the alternative widow benefit as a percentage of the sum of the widow's own worker benefit (including any actuarial reductions or delayed retirement credits) and the deceased spouse's PIA (potentially including any actuarial reductions or delayed retirement credits). The widow would receive the higher of this alternative benefit amount and the current-law widow benefit. This approach is thought to both increase benefit adequacy and improve benefit equity. The alternative widow benefit could be capped at a specified level to improve targeting to low- and moderate-income widows and reduce cost. Current-law spouse benefits also could be reduced to offset the alternative widow benefit's cost. When calculating the combined benefit, the widow's own worker benefit would be reduced for claiming before the FRA, if applicable. Some proposals include the spouse benefit for this portion of the calculation as well, while others use only the widow's own worker benefit. Including the spouse benefit would broaden eligibility to include single-earner couples and provide greater improvements to benefit adequacy. Using only the widow's worker benefit would do more to improve the proposal's effects on benefit equity. If the deceased spouse claimed benefits before the FRA, the calculation could use the deceased spouse's reduced worker benefit, or it could use the full PIA as if the deceased spouse had claimed benefits at the FRA. The latter approach would effectively eliminate the widow(er)'s limit for those who receive the alternative widow benefit, and is more effective at improving benefit adequacy for lower earners. Most proposals for an alternative widow benefit specify that the widow would receive the greater of 75% of the couple's combined worker benefits when both were alive and the current-law widow benefit, as illustrated in Table 7 following the example couples from Table 2 and Table 6 . For the single-earner couple in Example 1a, assuming that both spouses claim benefits at the full retirement age, the alternative widow benefit would be 75% of $1,770, or $1,327.50. Since the alternative widow benefit is less than the current-law widow benefit of $1,770, the widow would continue to receive the current-law amount (equal to 67% of the combined couple's benefit). Note that if spouse benefits were included in the alternative widow benefit computation, and assuming that both spouses claim benefits at the full retirement age, the widow in Example 1b would receive 75% of the combined couple's benefit of $2,655, or about $1,991.25 per month, compared with 67% of the combined couple's benefit while both were alive under current law. For a two-earner couple where the husband and wife have equal earnings, and again assuming that both spouses claim benefits at the full retirement age, the widow benefit would increase from 50% of the combined couple's benefit while both spouses were alive to 75%, as shown in Example 2. The monthly widow benefit would increase from $1,120 under current law to $1,680 under the alternative widow benefit proposal. Example 3 shows a two-earner couple where the husband and wife have unequal earnings. Again assuming that both spouses claim benefits at the full retirement age, the widow benefit would increase from 61% of the combined couple's benefit while both spouses were alive to 75%. Although the monthly widow benefit would increase from $1,770 under current law to $2,167.50 under the alternative widow benefit proposal, the percentage increase in the widow benefit would be smaller than for the couple with equal earnings. The examples in Table 7 show that the alternative widow benefit proposal, which does not include the value of the spouse benefit, would not improve widow benefits for nonworking survivors in single-earner couples. It would provide the greatest benefit to two-earner couples with roughly equal earnings. Including spouse benefits in the alternative widow benefit calculation would magnify the favorable treatment of nonworking spouses under current law. From the perspective of benefit equity, excluding the spouse benefit would allow the widow's own worker benefit to contribute to the alternative widow benefit on an equal footing with the deceased spouse's worker benefit. Without a cap on the alternative widow benefit, one study found that most of the proposal's benefits would go to higher-earning couples. Imposing a cap on the alternative widow benefit can improve benefit adequacy by targeting benefit increases to widows at the lower end of the income distribution. Several approaches are available, such as setting the cap at the PIA of a career average earner, the average benefit of all retired workers, or the average benefit of newly retired workers. The solvency and distributional analyses below impose a cap based on the PIA of a career average earner who becomes eligible for retired worker benefits in the same year the deceased spouse became entitled to worker benefits. As explained in detail below, based on SSA analysis, the alternative widow benefit's cost is modest and the distributional effects point to improvements in both benefit adequacy and benefit equity. The alternative widow benefit proposal would not reduce benefits for anyone. Thus, no transition period would be needed and it could be applied to new widow beneficiaries as well as current widow beneficiaries. If other changes to the Social Security program were desired to offset the alternative widow benefit's cost, policymakers could consider raising revenue (e.g., increasing the payroll tax), reducing cost (e.g., reducing spouse benefits, other benefit reductions), or both. However, depending on the alternative widow benefit's exact formulation, some approaches may be less desirable. For example, if the widow's spouse benefit is not included in the alternative widow benefit calculation, then offsetting the proposal's cost by reducing spouse benefits would not be appropriate. Additional solvency and distributional analyses could help policymakers to refine the details of any formal proposals. Three bills introduced in the 116 th Congress contain a provision for the alternative widow benefit, constructed largely as described above. OCACT estimated the financial effects on Social Security of previous versions of two of these bills. OCACT also updates alternative widow benefit estimates after the Trustees Report is released each year. The estimates are based on the Trustees Report's intermediate assumptions and address the policy change's effects on the combined reserves of the Old-Age and Survivors Insurance and Disability Insurance Trust Funds. OCACT's latest estimates of the alternative widow benefit proposal's cost and solvency effects reflect the 2019 Trustees Report's intermediate assumptions. The estimates assume the proposal would be implemented for widows receiving benefits at the beginning of 2021 and those becoming eligible after 2021. The alternative widow benefit estimated by OCACT would be 75% of the couple's combined worker benefits when both were alive (the widow's own worker benefit and the deceased worker's PIA). It would apply actuarial reductions or delayed retirement credits to the widow's own worker benefit and the deceased spouse's PIA. Finally, it would impose a cap defined by the PIA of a hypothetical worker who earns the SSA average wage index every year and becomes eligible for retired worker benefits in the same year the deceased spouse became entitled to worker benefits. Under these alternative widow benefit parameters, the long-range actuarial balance would worsen by 4%. However, the changes are not large enough to change the year of reserve depletion, estimated to be 2035 in the 2019 Trustees Report under both current law and the alternative widow benefit proposal. SSA's Office of Research, Evaluation, and Statistics (ORES) estimated the alternative widow benefit proposal's distributional effects using the same underlying proposal parameters modeled by OCACT. The ORES estimates are derived from the Modeling Income in the Near Term, Version 7 (MINT7) microsimulation model. The estimates pertain to current-law beneficiaries aged 60 or older in 2030, 2050, and 2070. Outcomes of interest from the ORES MINT estimates include changes in benefits, household income, and poverty, among all beneficiaries and affected beneficiaries, disaggregated by gender, marital status, educational attainment, and household income quintile. Among current-law beneficiaries aged 60 or older in 2030, the ORES MINT estimates suggest that 8% of beneficiaries will experience higher benefits under the alternative widow benefit relative to current law, including 10% of female beneficiaries, 11% of beneficiaries whose education was limited to high school, and 14% of beneficiaries with less than a high school education. The proposal would result in higher benefits for nearly one-third of current-law widow beneficiaries, with gains concentrated among those in poverty and in the bottom two-fifths of the household income distribution (due to the cap at the PIA of a career average wage worker). Similar, though slightly stronger, results are obtained for current-law beneficiaries aged 60 or older in 2050 and 2070. Among beneficiaries affected by the alternative widow benefit in 2030, the median benefit increase is 17%, again with the largest gains among those in poverty. The poverty rate is estimated to decrease by 10.2% (or 0.5 percentage points) among all current-law beneficiaries aged 60 or older in 2030, and by 38% (or 1.9 percentage points) among current-law widow beneficiaries aged 60 or older in 2030. In 2070, 43% of current-law widow beneficiaries aged 60 or older are estimated to experience a benefit increase. While the gains continue to be concentrated among the lowest income quintiles in 2050 and 2070, the poverty effects are muted in 2070 relative to 2030 and 2050. Gains relative to payable benefits (rather than scheduled benefits) in 2050 and 2070 are orders of magnitude larger but follow the same general patterns. When considering the alternative widow benefit's distributional effects, some of the proposal's limitations are worth noting. First, a person must have a qualifying marital history to receive widow benefits. As such, the alternative widow benefit would not improve benefit adequacy for a growing group of women who do not have a marital history that would qualify for widow benefits, including never-married women, who have a high poverty rate ( Table 4 ). Further, if the alternative widow benefit is based only on the widow's own worker benefit (not also including the spouse benefit), then both members of the couple would need to have a work history sufficient to earn Social Security worker benefits. Under this scenario, the alternative widow benefit would not improve benefit adequacy for nonworking survivors in single-earner couples. Finally, a higher Social Security widow benefit could lead to reduced or lost Supplemental Security Income payments for some widows, which in turn could lead to lost eligibility for other means-tested programs, such as Medicaid, the Supplemental Nutrition Assistance Program (formerly known as Food Stamps), and the Low Income Home Energy Assistance Program. Policymakers may wish to consider offsets or exclusions (hold-harmless provisions) in these programs to prevent loss of eligibility. Several other policy changes proposed for other vulnerable groups would aid widows who are members of those targeted groups. Brief descriptions follow, along with references for more detailed information. Under current law, the Social Security program has a special minimum benefit (SMB) for workers with many years of low earnings. However, the SMB grows with prices rather than wages, and thus affects fewer beneficiaries every year. In December 2018, 35,505 beneficiaries received the SMB, with an average monthly benefit of just over $900. In addition, the SMB is computed based on years of coverage, rather than lifetime earnings. The earnings threshold for a year of coverage in 2019 is $14,805 (by comparison, in 2019 a worker earns four quarters of coverage for traditional Social Security benefits with annual earnings of $5,440). A worker must have at least 11 years of coverage to qualify for the SMB, and the maximum SMB is obtained with 30 years of coverage. Proposals to improve benefit adequacy by providing an enhanced minimum benefit under Social Security take many forms and may serve to increase retirement income and reduce poverty among some older women and widows. Some proposals would reform the SMB to apply to a larger group of workers with substantial work histories and low earnings. The initial SMB could be tied to wage growth rather than price growth, the amount of earnings required for a year of coverage could be reduced, partial years of coverage could be allowed, and the amount of the SMB could be tied to a fraction of the federal poverty threshold, increasing with the number of years of coverage. Others point out that workers with shorter working careers are a larger group at greater risk of poverty in older age and would not be aided by a reformed SMB. Some options to address this group include (1) creating a new basic minimum benefit as a supplement to traditional Social Security benefits for low-income beneficiaries above the FRA and (2) revising the bend points and PIA factors in the traditional Social Security benefit formula to increase benefits for low earners and improve progressivity. Older women and widows from birth cohorts currently of retirement age may be well represented among workers with shorter working careers, given traditional propensities to leave the workforce for raising children and potentially for providing elder care. However, recent research suggests that women's labor force participation patterns are changing, with higher levels of employment early in life, motherhood coming later in life, motherhood's impact on employment lessening, and women working longer at older ages. Among women who worked at some point during their pregnancy, the fraction who reported quitting their jobs around the time of the birth decreased substantially for those having their first child in the early 2000s compared with those having their first child in the 1980s, whereas the fraction taking paid leave increased substantially and the fraction taking unpaid leave remained constant. Cohorts of women born in the 1950s and later are expected to enter their retirement ages with more work experience and more steeply sloped earnings patterns. Under current law, a divorced spouse may claim Social Security spouse and/or survivor benefits if the marriage lasted at least 10 years and the person claiming benefits is unmarried. Divorced spouse benefits may be claimed beginning at age 62, whereas divorced survivor benefits may be claimed beginning at age 60 (or age 50 if disabled). Divorced spouses are entitled to the same spouse and survivor benefits as a married spouse, including applicable reductions when benefits are claimed before the divorced spouse's FRA. As shown in Table 3 , divorced individuals made up 16.6% of the population aged 60 or older in 2017, but 30.7% of the population aged 60 or older in poverty. The poverty rate among all divorced individuals aged 60 or older was 17.6% in 2017 ( Table 4 ), and 19.0% among divorced women aged 60 or older (not shown). Two studies found that the fraction of women aged 50-59 and 60-69 who are divorced from a marriage of less than 10 yearsâand thus not eligible for Social Security divorced spouse and divorced survivor benefits under current lawâincreased substantially between 1990 and 2004/2009. Since the 1950s, the age of first marriage (among women and men) has increased markedly, whereas the prevalence of divorce doubled between the 1960s and 1970s, with the probability of divorce substantially higher for those with some college or a high school degree compared with college graduates. Reducing the duration-of-marriage requirement for divorced spouses and survivors, for example to five, seven, or nine years, has been discussed as a way to reduce the poverty rate among this vulnerable population. One study found that, although such a policy change would affect a relatively small fraction of female retirees, the greatest potential income gain (and thus poverty reduction) would accrue to low-income divorced widows with marriages that lasted between five years and nine years. As noted earlier, women tend to outlive men and remaining cohort life expectancy for a woman attaining age 65 has increased by nearly 2 years over the past 40 years, reaching 21.5 years in 2019 (compared with a greater gain of 4.4 years over the past 40 years for men, reaching 19.0 years for men attaining age 65 in 2019). With increased life expectancy comes greater risk of outliving one's non-Social Security retirement resources and, consequently, greater reliance on Social Security benefits. Poverty rates also increase with age, particularly among women (although Table 5 shows an even higher poverty rate among young widows aged 60-64). Some have outlined a modest longevity increase in Social Security benefits (specified as a percentage of the individual's benefit or a fixed dollar amount within a given retiree cohort) starting around age 80 to 85, or after 18 years to 20 years of benefit receipt. One proposal would target the benefit increase to low-income beneficiaries. Another would provide a delayed annuity for older beneficiaries whose benefit is below some minimum level relative to the federal poverty threshold and increase it with years of covered earnings. Estimates of an option to increase benefits by 5% for beneficiaries aged 85 or older (about 64% of whom are widows) in 2030 point to modest reductions in poverty. Proposals to increase the Social Security cost-of-living adjustment, for example by using the experimental Consumer Price Index for Americans 62 years of age and older (CPI-E) instead of the Consumer Price Index for urban wage earners and clerical workers (CPI-W), also tend to favor older beneficiaries. Providing earnings credits for periods out of the labor force or with reduced earnings due to caregiving responsibilities has been proposed in many forms. Although not targeted toward widows, such policies would result in enhanced benefits for widows to the extent that the enhanced benefits were available for periods out of the labor force while caring for young children or elderly parents, or perhaps caring for a now-deceased spouse. Women are more likely than men to experience time out of the workforce while raising children. In March 2017, the labor force participation rate was 63.1% for mothers with children under the age of 3, 65.1% for mothers with children under the age of 6, and 76.0% for mothers with children aged 6 to 17. Comparable rates for men were 95.1%, 94.4%, and 91.5%, respectively. Women also are more likely than men to be caregivers, provide more hours of care, and provide more hands-on care. Women caregivers are less likely to be in the labor force than women who are not caregivers, whereas among men, the labor force participation rate for caregivers is essentially the same as the labor force participation rate for noncaregivers. Options include providing caregivers with a number of dropout years (e.g., up to five years) to be excluded from the Social Security benefit formula, providing earnings credits (e.g., tied to a fraction of the average wage index for a given year or a fraction of the worker's prior earnings) to caregivers for years of caregiving (e.g., up to five years), and supplementing the retired worker benefit for caregivers in households with limited income (e.g., up to 125% of the federal poverty threshold). Related are ongoing policy discussions about establishing a system for paid family leave, which refers to partially or fully compensated time away from work for specific and generally significant family caregiving needs, such as the arrival of a new child or serious illness of a close family member. The National Defense Authorization Act for Fiscal Year 2020 ( P.L. 116-92 ) conferred a paid parental-leave benefit on certain federal employees covered by the Family and Medical Leave Act of 1993 ( P.L. 103-3 , as amended). Employer provision of paid family leave in the private sector is currently voluntary, and in March 2019 such leave was available to 18% of private-industry employees, according to data from the Bureau of Labor Statistics. As of January 2020, five statesâCalifornia, New Jersey, New York, Rhode Island, and Washington Stateâhave active programs. Four additional programsâthose in Connecticut, the District of Columbia, Massachusetts, and Oregonâawait implementation. Several bills have been introduced in the 116 th Congress to establish a national paid family leave program. Some would implement paid family leave through the Social Security program, either by creating a new program component in which covered workers and employers pay into the program and covered workers with periods of qualified caregiving draw benefits from the program, or by allowing eligible caregivers (parents) to receive some months of Social Security benefits in exchange for deferred claiming of retirement benefits to cover the caregiver benefit's costs. ", "summary": "As Congress actively considers Social Security reform options, one area of interest is Social Security policy levers to aid vulnerable groupsâwidows, low earners, caregivers, older beneficiaries, spouses, and never-married individuals. In the context of widows, researchers and policymakers have raised concerns about both benefit adequacy and benefit equity. In 2017, about 18% of all individuals aged 60 or older were widows; however, nearly 26% of individuals aged 60 or older living in poverty were widows. Benefit adequacy concerns stem from the facts that the widow has outlived the spouse, may contend with a reduced monthly income after the spouse's death, may confront significant medical and long-term care expenses associated with the deceased spouse's end-of-life care, and is at risk of outliving retirement resources and incurring significant expenses for long-term care. The focus tends to be on widows (women) rather than widowers (men). In 2017, the poverty rate was 14.6% for widowed women aged 60 or older and 10.8% for widowed women aged 60 or older receiving Social Security benefits, compared with 10.5% and 7.7%, respectively, for widowed men aged 60 or older. Benefit equity concerns stem from Social Security program rules that provide higher benefits to one-earner couples than to two-earner couples with identical lifetime earnings and Social Security payroll tax contributions. More equitable program rules, reflecting changes in family structure and work patterns of husbands and wives, would provide equal benefits for equal contributions. Several approaches to modifying Social Security benefits to aid widows are available. One approach is to adjust the Social Security program policy levers that most directly affect widows. These levers include the widow(er)'s limit, the provision of credits for delayed claiming, the parameters around benefits for disabled widows, and the lump-sum death benefit. Another approach is to develop an alternative widow benefit, envisioned as a percentage of the couple's combined Social Security benefits while both were alive, with the widow receiving the higher of this alternative benefit amount and the current-law widow benefit. Finally, proposals that would aid other vulnerable groupsâenhanced benefits for low earners, reduced marriage requirements for divorced spouse and divorced survivor benefits, increased benefits for older beneficiaries, caregiver credits, and paid family leaveâalso would aid widows who are members of those targeted groups.", "document_type": "crs"}
{"report": "Small businesses are owned by and employ a wide variety of entrepreneursâskilled trade technicians, medical professionals, financial consultants, technology innovators, and restaurateurs, among many others. As do large corporations, small businesses rely on loans to purchase inventory, to cover cash flow shortages that may arise from unexpected expenses or periods of inadequate income, or to expand operations. The Federal Reserve has reported that lending to small businesses declined during the Great Recession of 2007-2009. During the recession, many firms scaled down operations in anticipation of fewer sales, and lenders also tightened lending standards. A decade after the recession, evidence on whether lending to small business has increased is arguably inconclusive. Some small firms may be able to access the credit they need; however, others may still face credit constraints, and still others may be discouraged from applying for credit. Furthermore, drawing direct conclusions about small business access to credit can be difficult because available data are limited and fragmented. Congress has demonstrated an ongoing interest in small business loans (SBLs), viewing small businesses as a medium for stimulating the economy and creating jobs. Congress's interest in small business credit access generally focuses on (1) whether small businesses can secure credit from private lenders and (2) whether small businesses can obtain such credit at fair and competitive lending rates. In other words, policymakers are interested in whether market failures exist that impede small business access to credit and, if so, what policy interventions might be warranted to address those failures. Market failures, in economics and specifically in the SBL market context, refer to barriers that impede credit allocation by private lenders. For example, some lenders may be reluctant to lend to businesses with collateral assets (e.g., inventories) that are difficult to liquidate, as may be typical of some small businesses (e.g., restaurants). Under certain financial or regulatory circumstances, small loans may not generate sufficient returns to justify their origination costs, which also may be considered a market failure. In addition, market failures may exist when borrowers pay noncompetitive lending rates in excess of their default risk. Start-ups and some small businesses that provide niche products frequently must rely on mortgage or consumer credit or private equity investors rather than more traditional SBLs because lenders find it challenging to price loans for these firms, which could be another indicator of SBL market failure. Obtaining conclusive evidence on SBL market performance in terms of quantities and pricing is difficult for several reasons. First, there is no consensus definition of a small business across government and industry. Moreover, as the Federal Reserve stated, \"fully comprehensive data that directly measure the financing activities of small businesses do not exist.\" Drawing conclusions about the availability and costs of SBLs is not possible using existing data sources, which lack information such as the size and financial characteristics of the businesses that apply for credit, the types of loan products they seek, the types of lenders to whom they applied for credit, and which credit requests were rejected and which were approved. Second, the risks small business owners take are not standardized and vary extensively across industries and locations. For this reason, determining whether SBL prices (lending rates and fees) are competitive is difficult without standardized benchmark prices that can be used to compare the relative prices of other SBLs. To address SBL market failures, Congress passed legislation to facilitate lending to small businesses that are likely to face hurdles obtaining credit. For example, the Small Business Act of 1953 (P.L. 83-163) established the Small Business Administration (SBA), which administers several types of programs to support capital access for small businesses that can demonstrate the inability to obtain credit at reasonable terms and conditions from private-sector lenders. The Community Reinvestment Act (CRA; P.L. 95-128 ) encouraged banks to address persistent unmet small business credit demands in low- and moderate-income (LMI) communities. The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act; P.L. 111-203 ) required the Bureau of Consumer Financial Protection (CFPB) to collect data from small business lenders to identify the financing needs of small businesses, especially those owned by women and minorities. (The CFPB has not yet implemented this requirement.) In addition, various bills addressing the SBL market have been introduced in the 116 th Congress. For example, H.Res. 370 would express \"the sense of the House of Representatives that small business owners seeking financing have fundamental rights, including transparent pricing and terms, competitive products, responsible underwriting, fair treatment from financing providers, brokers, and lead generators, inclusive credit access, and fair collection practices.\" H.R. 3374 would amend the Equal Credit Opportunity Act to require the collection of small business loan data related to LGBTQ-owned businesses. H.R. 1937 and S. 212 , the Indian Community Economic Enhancement Act of 2019, among other things, would require the Government Accountability Office to assess and quantify the extent to which federal loan guarantees, such as those provided by the SBA, have been used to facilitate credit access in these communities. This report examines th e difficulty of assessing and quantifying market failures in the SBL market, which consists of small business borrowers (demanders) and lenders (suppliers). It begins by reviewing various ways to define a small business, illustrating that there is no consensus definition of the demand side of the SBL market across government or industry. The focus then shifts to describing the supply sideânamely the types of lenders that lend to small businesses, as well as their lending business models and practices. The report subsequently attempts to identify credit shortages in certain SBL market segments (e.g., the market for small loans, loans for businesses with risky or unsuitable collateral, and loans for businesses in underserved communities). It also examines whether market failures associated with SBL pricing can be identified. Finally, the report concludes by briefly discussing the Dodd-Frank Act requirement that the CFPB collect data to facilitate the understanding of SBL market activity. There is no universally accepted definition of a small business. The federal government and industry define small businesses differently in different circumstances. Although factors such as annual earnings, number of employees, type of business, and market share are typically considered, determining the universe of small businesses from which to collect data is difficult without a consensus definition. If a consensus definition existed, then identifying a small business for data-collection purposes would become more feasibleâfor example, a concise question on a loan application might identify whether the business applying for the loan met certain defined factors making it a small business. Below are examples of the ways regulators, researchers, Congress, and industry have defined small businesses: The SBA defines a small business primarily by using a size standards table it compiles and updates periodically. The table lists size thresholds for various industries by either average annual receipts or number of employees. The SBA also defines small businesses differently for different SBA programs. For example, the SBA's 7(a), Certified Development Company/504, and Small Business Investment Company (SBIC) programs have alternative size standards based on tangible net worth and average net income. Academic research frequently uses a firm that has 500 employees or fewer (but does not monopolize an industry) as a proxy measure for a small business. This definition has been adopted by various federal agencies, such as the U.S. Census Bureau, the Bureau of Labor Statistics, and the Federal Reserve. In addition, some research views microbusinesses as a subset of small businesses. A common academic definition of a microbusiness is a firm with only one owner, five employees or fewer, and annual sales and assets under $250,000. Small business definitions in statute also vary. For example, the Internal Revenue Service (IRS) sets different size standards for small businesses under various tax laws. The IRS provides certain tax forms for self-employed taxpayers and small businesses with assets under $10 million. The Patient Protection and Affordable Care Act of 2010 (ACA; P.L. 111-148 ), however, defined a small business in multiple ways (e.g., fewer than 50 full-time employees to avoid ACA's employer shared responsibility provision; fewer than 25 full-time equivalent employees for tax credits, etc.). According to a Federal Deposit Insurance Corporation (FDIC) survey, small and large banks have their own definitions of a small business. Small banks (defined as banks with $10 billion or less in assets) view a small business as one in which the owner \"wears many hats,\" referring to an owner who performs multiple tasks, perhaps because the firm is a start-up or still in its early growth stage. Large banks define small businesses more formally, in terms of annual revenues and sales. This section provides background on small business lenders and underwriting practices. Although small businesses rely on a variety of credit sources that include personal (consumer or mortgage) credit, family, friends, and crowd-funding, they also rely on various types of financial institutions (banks and nonbanks). Financial institutions vary in how they are regulated, the business models they adopt, the types of loans they offer, and the growth stages of the small businesses they serve. These differences are all factors involved when evaluating whether shortages exist in the SBL market. Some lenders are increasingly using business credit scores to assess creditworthiness, and they may deny SBLs due to either a lack of or poor business credit history. The SBA since 2014 has also relied upon credit scores to qualify applicants for its 7(a) loan program. In 2016, the Small Business American Dream Gap Report found that many businesses failed to understand their business scores or even know that they had one. The text box below summarizes the information used to compute credit scores specifically for businesses. Because banks have historically been the principal sources for commercial business lending, credit availability is frequently evaluated in terms of banking trends; however, nonbank financial institutions also engage in commercial business and industrial (C&I) lending. The Federal Reserve has reported that smaller firms are more likely than large firms to apply to nonbank lenders for credit. Credit unions have become an important source of small business loans in recent years. Likewise, nonbank fintech lenders have become an important source of credit in market segments that banks may have exited (e.g., business loans of $100,000 or less). Because the types of SBLs made by a bank may be related to its size, this section begins with bank size definitions. Small community banks , which may be defined as having total assets of $1 billion or less, are considered a subset of the larger category of community banks; c ommunity banks may be defined as having total assets up to $10 billion. Large banks have total assets that exceed $10 billion. Community banks hold approximately 50% of outstanding SBLs (defined as the share of loans with principal amounts less than $100,000); however, the number and market share of community banks have been declining for more than a decade. Overall, the number of FDIC-insured institutions fell from a peak of 18,083 in 1986 to 5,477 in 2018. The number of institutions with less than $1 billion in assets fell from 17,514 to 4,704 during that time period, and the share of industry assets held by those banks fell from 37% to 7%. Meanwhile, the number of banks with more than $10 billion in assets rose from 38 to 138, and the share of total banking industry assets held by those banks increased from 28% to 84%. 87 The decline in community banks is meaningful because they have historically been one of the largest sources of funding for small businesses. Furthermore, some academic research suggests that, as banks grow, their enthusiasm for lending to starts-ups and small businesses may diminish. In 2015, the Federal Reserve highlighted a decline in the share of community banks' business loan portfolios with initial principal amounts under $100,000, suggesting that these banks were making fewer loans to small businesses. Although some credit unions make SBLs, their commercial lending activities are limited. The Credit Union Membership Access Act of 1998 (CUMAA; P.L. 105-219 ) codified the definition of a credit union member business loan (MBL) and established a commercial lending cap, among other provisions. An MBL is any loan, line of credit, or letter of credit used for an agricultural purpose or for a commercial, corporate, or other business investment property or venture. The CUMAA limited (for one member or group of associated members) the aggregate amount of outstanding business loans to a maximum of 15% of the credit union's net worth or $100,000, whichever is greater. The CUMAA also limited the aggregate amount of MBLs made by a single credit union to the lesser of 1.75 times the credit union's actual net worth or 1.75 times the minimum net worth required to be well-capitalized. Three exceptions to the credit union aggregate MBL limit were authorized for (1) credit unions that have low-income designations or participate in the Community Development Financial Institutions program; (2) credit unions chartered for making business loans; and (3) credit unions with a history of primarily making such loans. Generally speaking, the volume of credit union MBL lending is minor in comparison to the banking system. As of September 30, 2015, for example, credit unions reportedly accounted for approximately 1.4% of the commercial lending done by the banking system. A large credit unionâone with $10 million or more in assetsâmight adopt a business lending model comparable to a small community bank or perhaps a midsize regional bank in the commercial loan market. Similar to community banks, approximately 85% of MBLs were secured by real estate in 2013, with some credit unions heavily concentrated in agricultural loans. A larger credit union (e.g., $1 billion or more in assets) could originate larger loans relative to most community banks with assets less than $1 billion. Despite competition with some banks in certain localities, the credit union system is significantly smaller than the banking system in terms of overall asset holdings and, correspondingly, has a smaller footprint in the broader commercial lending market. The share of SBLs originated by nonbank fintech lenders has expanded. However, whether the increase in originations reflects an increase in small business lending is unclear because not all fintechs retain their loan originations in their asset portfolios. Fintechs may generate revenues by (1) originating loans and collecting underwriting fees; (2) selling the loans to third-party investors (via adoption of a private placement funding model, discussed in the below text box \"Funding Options for Lenders\"); and (3) collecting loan servicing fees (from either the borrowers or investors). The fintech lending model has attained a competitive edge by streamlining and expediting the more traditional labor- and paper-intensive manual underwriting process by, for example, adopting online application submission and proprietary artificial intelligence for underwriting. For this reason, marketplace lending has been both a substitute (providing credit in some loan markets not served by banks) and a complement (via numerous bank partnerships) to the banking system. If, for example, a fintech partners with a bank and subsequently transfers (sells) its loan originations to a bank's balance sheet, the loan would be reported as a banking asset; such scenarios make it difficult to isolate fintech firms' impact in the broader SBL market. This section explains the relationship between the growth stage of a small business and its access to credit. Start-ups and more established firms are likely to have different experiences obtaining business loans. In addition, underwriting requirements and the degree of loan product customization, which vary among lenders, may also be more suitable for borrowers at different stages. The text box at the end of this section summarizes some funding options for lenders that may also influence their underwriting practices and the types of loans they offer. A firm's growth stage matters for credit access. During the initial start-up stage, small businesses typically have little collateral; their financial statements often lack sufficient histories of earnings and tax returns to meet lender requirements; and they typically do not have a performance track record during an economic downturn. As a result, lenders often find it difficult, time-consuming, and costly to determine whether a start-up is creditworthy. For this reason, start-ups often obtain funds from friends and family and drawdowns of personal savings. In addition, start-ups rely on financing from the owner's personal consumer credit products (e.g., credit cards, home equity loans) rather than a traditional commercial loan made by a financial institution. According to the Federal Reserve Small Business Credit Survey, which defines a small business as having $1 million or less in annual revenue, 42% of the small business owners surveyed used their personal credit scores to secure a loan and 45% used both their business and personal credit scores. Furthermore, having a low business credit score was reported as the number one reason why small businesses were rejected for credit, followed by an insufficient credit history. Because many small businesses rely on personal credit history and consumer credit products (rather than business credit), declines in consumer credit availability during economic downturns are also likely to affect small businesses' access to credit. Home equity credit during the 2007-2009 recession declined along with real estate collateral prices, contributing to tighter lending standards. Likewise, any consumer credit cost increase is likely to affect certain small businesses. For example, given the rise in credit card rates over the recession, small businesses that carried large debt balances over several payment cycles might have paid higher borrowing costs relative to a more conventional business loan. Hence, changes in the availability and pricing of consumer credit are likely to have similar effects on consumers and some small businesses, especially start-ups. Once a firm enters into a more advanced growth stage, it may have one or more of the following attributes: a positive cash flow, more than two years of experience, a high business credit score, or achieves $1 million or more in annual revenues. Lenders can subsequently provide more mature businesses with one or more loans secured by their assets, supported by their credit and earnings histories. Accordingly, firms in later growth stages tend to have greater access to SBLs. Nevertheless, small firms still are more likely to obtain credit via relationship lending . Two prevailing commercial lending underwriting models are relationship and transactional lending . Small and community banks typically engage in relationship lending (or relationship banking), meaning that they develop close familiarity with their customers (i.e., soft information) and provide financial services within a circumscribed geographical area. Relationship lending provides a comparative advantage for pricing lending risks that are unique, infrequent, and localized. A relationship lender may also prefer being in close geographical proximity to the collateral (e.g., local real estate) borrowers used to secure their loans. The nature of the risks requires the loan underwriting process to be more labor-intensive. By contrast, large institutions typically engage in transactional lending that frequently relies on automated, statistical underwriting methodologies and large volumes. Transactional lending provides a comparative advantage for loan pricing when the borrowers face more conventional business risks (i.e., hard information, such as sales fluctuations, costs of inputs, specific industry factors, and other relevant metrics) rather than idiosyncratic risks that are difficult for an automated underwriting model to quantify. By relying on conventional financial metrics and documentation, transactional lenders do not need to be located near their borrowers to monitor their financial health. Moreover, because underwriting is more automated for these institutions, credit requests are most frequently denied because of (1) weak business performance, (2) insufficient loan collateral, and (3) having too much existing debt outstanding. A lender's underwriting model influences the way it defines a small business. As previously mentioned, community banks tend to describe small businesses as those whose owners multitask, meaning that they perform multiple large-scale tasks rather than relying on designated, full-time employees. Small businesses who face these types of challenges are unlikely to provide (in a timely manner) the metrics necessary for automated underwriting and, therefore, tend to be underwritten manually when requesting credit. For manual underwriting, small firms' credit scores are often not essential to evaluate creditworthiness and determine loan terms. Instead, relationship lending allows for more tailoring of loans (e.g., customized lending terms or repayment schedules) to small firms' idiosyncratic needs. Hence, lenders with relationship lending models are likely more well-adapted to underwrite businesses with risks that are unusual and oftentimes difficult to quantify. By contrast, large banks use metrics such as the dollar amount of annual sales revenues to categorize a small business. Automated underwriting becomes more amenable for businesses with business credit scores and the ability to provide financial documentation in a timely manner. A bank may offer an unsecured credit card loan to a firm with reliable financial performance records, thus reducing the monitoring costs associated with collateralized lending. Furthermore, firms with standardized financials can obtain more standardized (noncustomized) and competitively priced loans, which can be delivered faster. In general, the average costs to originate (and fund) loans decrease as the volume of loans or loan amounts increase. Lenders with transactional lending models can benefit more (relative to manual underwriters) from such economies of scale because their customer bases include more borrowers with standardized and quantifiable risks. Although they tend to rely on different types of credit, both start-ups and well-established firms may be highly dependent on certain lenders that specialize in underwriting loans for certain industries (e.g., maritime, breweries and distilleries, or moving). In addition, some lenders primarily engaged in transactional underwriting may still rely on relationship lending under some limited circumstances. For example, a larger firm may be willing to relax supplementary financial requirements (known as covenants) designed to reduce credit risk for borrowers with whom the firm has an ongoing relationship. This type of action may be considered a form of manual underwriting. This section attempts to find evidence of market failures that may be addressed by policy interventions. The specific areas of potential concern are (1) whether the lending industry is providing enough small loans for small businesses; (2) whether certain small businesses lack the type of collateral that lenders require to secure the loans; (3) whether the amount of credit provided in low- and moderate-income (LMI) communities is insufficient; and (4) whether the price of credit is too expensive for small businesses. Reviewing the number of small-sized loans may help determine if a SBL market shortage exists, assuming that (1) lenders make small-sized loans to small businesses and (2) an ideal size definition exists. The FDIC provides multiple size definitions of SBLs: loans with origination amounts less than or equal to $100,000; loans with origination amounts less than or equal to $250,000; loans to firms with gross annual revenues less than or equal to $1 million; and loans with origination amounts greater than $250,000 to firms satisfying any amenable small business definition. The FDIC's 2018 Small Business Lending Survey of 1,200 banks uses a C&I loan size limit of $1 million as a proxy for small business lending. In 2015, the Federal Reserve specifically highlighted the decline of community banks' business loans with initial principal amounts under $100,000. The current interest-rate environment, which has been at a historic low since the recent recession, may influence this outcome. In a low-interest-rate environment, even relationship lenders may have a greater incentive to increase loan sizes to generate sufficient interest income to cover the costs of providing them. Assuming that the underwriting, servicing, and compliance costs do not vary with loan size, then incurring those fixed costs for larger-sized loans, which may be more likely to generate more interest revenue, may be more economical for lenders. The retreat from the $100,000 loan market might be temporary if interest rates rise in the future. Nonetheless, denials of SBL requests because of a shift in lenders' preferences toward originating larger loans may indicate a market failure. Attempting to find a proxy for market failure by examining the availability of SBLs of $100,000 or any size threshold is challenging for the following reasons: According to the Federal Reserve's Survey of Lending Terms , at the beginning of 2017, the average C&I loan size for all domestic commercial banks (excluding U.S. branches and agencies of foreign banks) was approximately $575,000; the average business loan size at small domestic banks was approximately $123,000; and the average loan size at large domestic banks was approximately $729,000. By contrast, at the beginning of 2007 (prior to the 2007-2009 recession), the average C&I loan size for all domestic commercial banks was approximately $379,000; the average business loan size at small domestic banks was approximately $117,000; and the average loan size at large domestic banks was approximately $578,000. Despite the 51.7% increase in average C&I loan size for all domestic commercial banks, the average C&I loan size for small commercial banksâwhich hold approximately 50% of outstanding SBLsâincreased by a relatively modest 5.13%. Thus, it is not apparent that the smaller-size SBL market segment has been displaced. If lenders increase the total amount of SBLs made at $250,000 or $1 million, for example, while simultaneously making fewer loans of $100,000, then whether that outcome represents an increase or decrease in overall small business lending is subject to debate. Similarly, the FDIC noted that even the $1 million loan size limit may underestimate the amount of loans made to small firms. Some small firms (with annual revenues under $1 million) may get loans that exceed $1 million. Some SBLs may be secured by residential real estate and counted as mortgages. Conversely, the data collected may overstate SBLs to small businesses. The financial data on bank C&I loans do not report on loans made to a well-defined group of small firms. Instead, the data only report on small loans to all businesses (regardless of size), thus overstating the amount of SBLs, given that large businesses also receive loans of these sizes. The demand for $100,000 SBLs (from community banks) may have decreased. For example, technology firms, which represent many start-ups since the 2007-2009 recession, frequently do not purchase large amounts of inventory. Such firms that are able to operate out of the owners' homes may finance operations with personal savings and credit cards. Conversely, the demand for large loans may have increased . For example, some firms may determine that obtaining larger-size loans during the current low-interest-rate environment is more economical than having to reborrow at some point in the future at higher lending rates. In addition to the abovementioned issues, drawing conclusions about SBL shortages based primarily on the lending practices of community banks is premature in the absence of a comprehensive dataset that includes loans made by nonbank lenders. Fintech lenders may be filling the gap in small business lending left by a decline in community banks. Because fintech lenders generally are not required to hold capital against their portfolio loans or can fund via private placement, they may be able to take advantage of opportunities to lend to small businesses that would not generate sufficient profit margins for community banks. Loans retained in fintech lenders' portfolios or funded via private placement, however, are currently not reported to the federal banking regulators. Furthermore, businesses may have multiple loans and often seek credit from multiple lenders. In some cases, small businesses may be able to obtain credit from some lenders and not others, particularly in cases when borrowers inadvertently seek credit from lenders using incompatible underwriting models. In short, the focus on a particular loan size or particular lender type is arguably too narrow for evaluating performance in the SBL market. A market failure may exist if lenders are unwilling to provide loans backed by illiquid collateral (i.e., collateral that cannot be easily liquidated if the borrower fails to repay the loan)âan issue that may disproportionately affect certain small businesses. Banks and credit unions provide business loans via asset-based lending (ABL) guidelines that require firms to pledge assets (e.g., cash, receivables from inventory sales, inventory) as collateral for loans. For ABL purposes, federal banking regulators define a SBL as any loan to a small business (as defined by Section 3(a) of the Small Business Act of 1953 [P.L. 83-163 as amended] and implemented by the SBA) or a loan that does not exceed $2 million for commercial, corporate, business, or agricultural purposes. A bank typically provides fully collateralized short-term loans (under five years) to firms based upon their performance records (e.g., sufficient credit and earnings histories and assets), and it monitors the risks to the collateral that would need to be liquidated (sold) if the small business experienced financial distress. Similarly, credit unions can provide MBLs that comply with NCUA's ABL guidelines. Some firms' inventory, however, may not be ideal for ABL guidelines. Collateral that would be difficult to liquidate without losing too much value may not be acceptable. For example, restaurants (a common type of small business) have leases, cooking equipment (likely to resell for less than its initial sale price), and inventories of food that would not generate the income necessary to recoup losses from a loan default. Restaurants also have difficulty demonstrating the ability to repay a loan over a period of years. For this reason, lenders may not accept a restaurant's collateral as security for a loan. In response to this market failure, the SBA administers various programs to facilitate small business credit access (typically loans for up to $5 million and for 5-25 years) for financially healthy firms with collateral or inventory less likely to satisfy ABL requirements. Some borrowers that can demonstrate the ability to repay (e.g., minimum business credit score, management experience, minimum levels of cash flow, some collateral, and personal guarantees by the business owners) still may not be able to obtain affordable credit elsewhere (i.e., from other lenders), which might seem paradoxical. This may be because the firm's inventory does not turn over at a steady pace (e.g., seasonal merchandise), and a lender would face difficulty quickly liquidating the collateral if the firm became financially distressed. For a fee, the SBA may retain the credit risk of a small business loan up to a certain percentage, and the lender assumes the remaining share of credit risk to ensure incentive alignment during underwriting. SBA-guaranteed loans frequently have higher lending rates relative to ABL loans, taking into account the guarantee (and loan servicing) fees charged to borrowers to compensate the federal agency for retaining a majority of the default risk and the additional risk correlated with illiquid collateral. Following the recent recession, the SBA has reported an increase in the dollar amount of guaranteed lending over 2013-2018, which might indicate the ability to mitigate more market failures. If, however, borrowers fail to repay their loans and it is not possible to recover sufficient fees and proceeds from asset liquidations to cover the losses, then the SBA may need additional appropriations from Congress to account for the shortfall. The utility of government intervention in the form of SBA-guaranteed lending, therefore, is debatable. When borrowers are unable to obtain private-sector credit but subsequently repay their SBA loans, that outcome may suggest that a government guarantee helped correct a failure and improve SBL market performance. Conversely, when borrowers are unable to obtain private-sector credit and subsequently default on their SBA loans, that outcome suggests no market failure initially existed in the private SBL market. Monitoring loan performance is useful in distinguishing between a legitimate credit market barrier and an excessive lending risk, but such monitoring can only occur after loans have been originated and guaranteed, which underscores the difficulty of correctly identifying and effectively mitigating market failures. A market failure may exist if lenders make fewer SBLs in low- and moderate-income (LMI) areas than in higher-income areas. The Community Reinvestment Act of 1977 (CRA; P.L. 95-128 ) was designed to encourage banking institutions to meet the credit needs of their entire communities. The federal banking regulatory agenciesâthe Board of Governors of the Federal Reserve System, the Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currencyâcurrently implement the CRA. The regulators issue CRA credits, or points, when banks engage in qualifying activitiesâsuch as mortgage, consumer, and business lending; community investments; and low-cost services that would benefit LMI areas and entitiesâthat occur within a designated assessment area. These credits are then used to issue each bank a performance rating. The CRA requires these ratings be considered when banks apply for charters, branches, mergers, and acquisitions, among other things. Under the CRA, the banking regulators award CRA credit to certain SBLs (including small farm loans), provided these loans meet both (1) a size test and (2) a purpose test. Small businesses that receive an SBL must either (1) meet the size eligibility standards for the SBA's Certified Development Company/504 or SBIC programs or (2) have gross annual revenues of $1 million or less to qualify for CRA credit. The loans must also promote community and economic development, as explained in the federal bank regulators' guidelines, to qualify for CRA credit. Figure 1 shows the distribution of SBLs for $1 million or less that were eligible for CRA credit over the 2009-2017 period across census tracts grouped into four relative income categories as measured against median family income (MFI). For comparison, the last column shows the median percentages of total SBLs over the entire period. The median figures are as follows: 5.2% in the low-income tracts (< 50% of MFI), 16.7% in the moderate-income tracts (50% â¥ MFI < 80%), 40% in the middle-income tracts (80% â¥ MFI <120%), and 37.9% in the upper-income tracts (120% â¥ of MFI). This figure does not capture all CRA business lending because SBLs exceeding $1 million may also receive CRA credit. (In addition, the data in this figure represent a subset of lending activity that occurs in LMI tracts because large C&I loans, as well as consumer loans, may qualify for CRA credit.) Furthermore, changes in the number of SBL or CRA loans could indicate a change in the percentage of CRA credit awarded to SBLs, a change in total SBL originations, or both. Despite data limitations, the trends suggest that the share of SBLs in LMI areas has remained steady at approximately 20% for almost a decade. Whether that share can increase furtherâwhich would suggest that credit may not be accessible for small businesses located in LMI areasâis difficult to determine. For example, the demand for small business credit in LMI areas may be lower relative to higher-income areas. The number of potential businesses and lending opportunities in LMI areas may be comparatively lower if a greater percentage of small businesses locate in areas where their prospective customers would have sufficient incomes to sustain demand for the products or services they offer. In short, the data on SBLs awarded CRA credit do not provide a way to measure the demand for SBLs. There is no information on the number of businesses located in LMI areas that applied for loans and were subsequently rejected, making it difficult to conclude that a failure exists in the SBL market in LMI areas. Accordingly, Congress has called for the collection of data from small business lenders, discussed in more detail in the section entitled \" CFPB Collection of Small Business Data .\" The pricing of SBLsâspecifically interest rates and feesâis another consideration for evaluating the small business credit market's overall performance. A small business might not seek credit if it is too expensive. A small business might determine that it cannot afford an offer for credit if more of its financial resources (e.g., net income) must be devoted to paying interest than reinvesting in operations. When loan prices are set substantially higher than the risks posed by borrowers and the costs to acquire the funds used to make the loans, the pricing is not considered competitive. In economics, a competitive price is one that multiple suppliers would offer to buyers for the same good or service. A competitive price is often the best or lowest that a buyer can find for a good or service and, therefore, can be used as a benchmark price when comparison shopping to evaluate other offers. Determining whether SBLs are competitively priced is challenging. A common market failure is imperfect information, or information asymmetry âwhen one party in a transaction has more accurate or more detailed information than the other party. This imbalance can result in inefficient outcomes. In the case of the small business credit market, the risks taken by small business owners are not standardized and vary extensively across industries and geographical locations. It is difficult for lenders to determine competitive loan pricing without sufficient comparable businesses from which to obtain reasonable estimates of expected losses and predict cash flows. Similarly, it may be difficult for small businesses to determine whether a loan offer is competitive without sufficient comparable business loans. Relationship lending, as previously discussed, can alleviate an SBL market failure that arises from the inability to price credit risks. Relationship lending allows a lender to collect more information about a borrower's financial behaviors, which may result in less stringent collateral requirements and greater access to credit at a lower price over time. Disclosure laws are another way to potentially resolve this type of market failure. In consumer credit markets, the Truth-In-Lending Act of 1968 (TILA; P.L. 90-301) requires lenders to disclose the total cost of credit to consumers in the form of an annual percentage rate (APR). TILA is designed to ensure borrowers are aware of their loan costs. For some consumer products, regulators require lenders to provide greater disclosures about product features that could result in borrowers paying excessive rates and fees, especially in cases where they are unaware of assessed penalty fees and interest-rate increases. Effective disclosures arguably mitigate the incentive for lenders to charge substantial markups above funding costs and borrowers' risks, thus resulting in lower loan prices. Although TILA applies to mortgage and consumer loans, it does not apply to business loans. For this reason, legislative proposals have been introduced in Congress to extend TILA disclosures to small firms. For example, H.R. 5660 , the Small Business Credit Card Act of 2018, would extend TILA disclosures to firms with 50 or fewer employees. Whether TILA protections for business credit would result in more competitive business loan terms is unclear. First, evidence suggests that TILA protections do not necessarily encourage consumers to shop for lower borrowing rates despite having more standardized (e.g., collateral) lending risks relative to businesses, suggesting it is unlikely TILA protections for small business would encourage them to shop around for credit. Second, some small businesses may already rely on certain types of credit to which TILA does apply. For example, some businesses obtain credit via personal credit cards and home equity loans, to which TILA disclosure requirements already apply. In addition, many lenders already disclose APRs on their business credit cards. The Dodd-Frank Act requires financial institutions to compile, maintain, and report information concerning credit applications made by women-owned, minority-owned, and small businesses. This data collection is intended to \"facilitate enforcement of fair lending laws\" and to \"enable communities, governmental entities, and creditors to identify business and community development needs and opportunities of women-owned, minority-owned, and small businesses.\" The Dodd-Frank Act authorizes the CFPB to collect various data from financial institutions about the credit applications they receive from small businesses, including the number of the application and date it was received; the type and purpose of loan or credit applied for; the amount of credit applied for and approved; the type of action taken with regard to each application and the date of such action; the census tract of the principal place of business; the business's gross annual revenue; and the race, sex, and ethnicity of the business's principal owners. On May 10, 2017, the CFPB announced that it was seeking public comment about the small business financing market, including relevant business lending data used and maintained by financial institutions and the costs associated with the collection and reporting of data. Specifically, the CFPB requested information on five categories: \"(1) small business definition, (2) data points, (3) financial institutions engaged in business lending, (4) access to credit and financial products offered to businesses, and (5) privacy.\" With respect to definition, the CFPB sought comment on the best definition of a small business and the burden of collecting data under that definition. In addition, the CFPB requested information on what data financial institutions should be required to collect and report, and which institutions should be exempted. The CFPB also requested feedback on product types offered to small businesses because the variety of terms and loan covenants that can be used to tailor loans, in addition to the interest rate, are part of the overall cost (price) of credit. The comment period closed on September 14, 2017. The CFPB has not yet issued a proposed rule, but it recently announced that such a rule was part of its spring 2019 regulatory agenda. Evaluating the small business lending market's overall performance (in terms of market failures) would be easier with less fragmented, more complete data. Collecting data, however, poses challenges for the CFPB and industry lenders. First, the Equal Credit Opportunity Act prohibits the collection of race and gender information, thus increasing the difficulty for the CFPB to implement a rule that would require such reporting. In addition, the collection and reporting of SBL data would likely need to be converted to a digital format. The fixed costs to implement digital reporting systems could be relatively larger for small financial institutions than for large institutions. Large institutions have more customers (to justify the initial expense) and offer a more limited range of standardized products. Depending upon the collection requirements eventually implemented, some institutions might decide to offer more standardized, less tailored financial products to reduce reporting costs. It is possible that more financial institutions may require minimum loan amounts (e.g., exit the loan market delineated as $100,000 and below) to ensure that the loans generate enough revenue to cover the costs to fund and report data. From an economics viewpoint, the ability to evaluate the performance of various SBL market segmentsâspecifically whether (1) a small business credit shortage exists or (2) pricing for loans to small businesses is significantly above the lending risks and funding costsâis extremely challenging. Policymakers have been interested in whether market failures that impede small business access to capital exist and, if so, what policy interventions might address those market failures. However, it is difficult to discern which policy interventions would be most well-suited to addressing potential small business credit market failures without better data about the market itself. Arriving at more definitive conclusions about the availability and costs of SBLs might be possible with information such as the size and financial characteristics of the businesses that apply for loans, the types of loan products they request, the type of lenders to whom they applied, and which applications were approved and rejected. Collecting the necessary data, however, presents both legal and cost challenges.", "summary": "Small businesses are owned by and employ a wide variety of entrepreneursâskilled trade technicians, medical professionals, financial consultants, technology innovators, and restaurateurs, among many others. As do large corporations, small businesses rely on credit to purchase inventory, to cover cash flow shortages that may arise from unexpected expenses or periods of inadequate income, or to expand operations. During the Great Recession of 2007-2009, lending to small businesses declined. A decade after the recession, it appears that while many small businesses enjoy increased access to credit, others might still face credit constraints. Congress has demonstrated an ongoing interest in credit availability for small businesses, viewing them as a medium for stimulating the economy and creating jobs. In general, Congress's interest in the small business credit market focuses on quantity and priceâspecifically (1) whether small businesses can reasonably obtain loans from private lenders and (2) whether the prices (lending rates and fees) of such credit are fair and competitive. Congress passed legislation to facilitate lending to small businesses that are likely to face hurdles in obtaining credit: The Small Business Act of 1953 (P.L. 83-163) established the Small Business Administration (SBA), which administers several types of programs to support capital access for small businesses that struggle to obtain credit on reasonable terms and conditions from private-sector lenders. The Community Reinvestment Act (CRA; P.L. 95-128 ) encouraged banks to address persistent unmet small business credit demands in low- and moderate-income (LMI) communities. The Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act; P.L. 111-203 ) required the Bureau of Consumer Financial Protection (CFPB) to collect data from small business lenders concerning credit applications made by women-owned, minority-owned, and small businesses with the goal of better understanding their financing needs. The CFPB has not yet implemented this requirement. Data that capture small business borrowers' characteristics and lenders' underwriting processes (i.e., their processes for determining whether borrowers are creditworthy) could help to accurately determine whether small businesses have sufficient and fairly priced access to private credit. Various government agencies and financial institutions define small business using factors that may be based upon annual revenues, number of employees, market scope, market share, and some or all of the above factors. Because no consensus definition of a small business exists, data to analyze the small business credit market's performance are limited and fragmented. Moreover, certain small businesses face additional challenges that may force them to seek financing outside of traditional business credit markets. Many new start-up firms, for example, do not have the financial track records to qualify for standard business loans and frequently must rely on mortgage and consumer credit. In addition, many small businesses rely on customized lending products, thus limiting their choice of lenders to those with specialized underwriting methodologies or business models. The lack of a consensus definition of small business, along with the wide variety of idiosyncratic business risks, hinders the availability of conclusive evidence on the small business credit market's overall performance and, therefore, the ability to assess the effectiveness of various policy actions designed to increase small business lending. In 2017, the CFPB issued a request for information on the small business lending market to solicit feedback on how to implement the Dodd-Frank requirement to collect data from financial institutions on small business credit applications. Final rulemaking, however, has been delayed. In addition, various bills regarding the small business credit market have been introduced in the 116 th Congress. For example, H.Res. 370 would express \"the sense of the House of Representatives that small business owners seeking financing have fundamental rights, including transparent pricing and terms, competitive products, responsible underwriting, fair treatment from financing providers, brokers, and lead generators, inclusive credit access, and fair collection practices.\" H.R. 3374 would amend the Equal Credit Opportunity Act to require the collection of small business loan data related to LGBTQ-owned businesses. H.R. 1937 and S. 212 , the Indian Community Economic Enhancement Act of 2019, among other things, would require the Government Accountability Office to conduct a study to assess and quantify the extent to which federal loan guarantees, such as those provided by the SBA, have been used to facilitate credit access in these communities.", "document_type": "crs"}
{"report": "Congress plays an overarching role in shaping outdoor recreation throughout the nation through legislation and oversight. Congress's role in outdoor recreation resources, policies, and programs often involves the agencies that manage recreation resources on federal lands and waters. However, Congress also has supported crosscutting legislative, analytic, and planning efforts dedicated to outdoor recreation broadly, and it has established programs that facilitate recreation on nonfederal lands. Legislation, hearings, and congressional reports have indicated the significance of outdoor recreation economic activity as a decisionmaking consideration in many contexts, not just those involving federal lands. As Congress continues to debate outdoor recreation issuesâincluding provision of federal resources, planning efforts, and fundingâdata on the size, distribution, and relative importance of the outdoor recreation economy may inform these debates. In April 2016, the Secretary of the Interior announced that the Department of the Interior would sign a memorandum of understanding with the Department of Commerce to undertake a feasibility study to analyze outdoor recreation's impact on the U.S. economy. The Secretary noted that \"credible data on the tangible economic benefits of public lands\" would be a valuable resource for stakeholders, including Congress, and that the study would count the contributions of the outdoor recreation economy in a \"comprehensive and impartial\" way. Later that year, Congress explicitly authorized these efforts through passage of the Outdoor Recreation Jobs and Economic Impact Act. In addition to ensuring the availability of economic data on outdoor recreation, the act ensured methodological uniformity with other statistical activities of the Bureau of Economic Analysis (BEA) that analyze the economic impact of private industries. The act directed the Secretary of Commerce, acting through BEA, to assess and analyze the outdoor recreation economy of the United States and its contributions to the economy generally. The act required the Secretary to consider employment, sales, and contributions to travel and tourism, in addition to any other items the Secretary considered appropriate. Consequently, BEA developed the Outdoor Recreation Satellite Account (ORSA), an account using the same data and methods as BEA's gross domestic product (GDP) statistics. BEA released the first ORSA prototype statistics for comment in February 2018, and it released the first official ORSA statistics in September 2018. BEA released the most recent ORSA statistics on September 20, 2019. Congress has indicated general approval of the ORSA and directed BEA to develop regional statistics in future years; BEA included state-level prototype statistics in the 2019 release. The House Appropriations Committee also directed the Department of Commerce, in coordination with the agencies of the Federal Recreation Council, to continue to refine the account and to report on the feasibility of identifying amounts allocated by the federal government to outdoor recreation efforts. BEA prepares the ORSA statistics as required by the Outdoor Recreation Jobs and Impact Act. The most recent ORSA statistics, released in September 2019, measured the period from 2012 to 2017. The ORSA \"measures the size of the outdoor recreation economy and the link between outdoor recreation and the broader U.S. economy.\" BEA constructed the ORSA by isolating outdoor recreation spending and production from the broader industries and categories that BEA already tracked. BEA compiles data into industry accounts (e.g., retail trade, manufacturing, construction, and others) and uses all this data to calculate gross domestic product (GDP). The ORSA is a satellite account in that it isolates and combines the parts of many individual industries that are related to outdoor recreation. For example, as described by BEA, existing industry accounts show \"the production of all apparel, whereas the ORSA shows the production of apparel used specifically for outdoor recreation activities, such as wetsuits and hiking boots.\" The ORSA divides outdoor recreation activity into core activities and supporting activities. Core activities include the production and purchase of goods and services used directly for outdoor recreation, such as equipment, fuel, concessions, and fees. Supporting activities are defined as goods and services that facilitate access to outdoor recreation activities, such as travel and tourism expenses, local trips, construction, and government expenditures that support outdoor recreation (including local, state, and federal spending). BEA also organizes its statistics using conventional and broad views of outdoor recreation. The conventional activities include \"all recreational activities undertaken for pleasure that generally involve some level of intentional physical exertion and occur in nature-based environments outdoors,\" such as camping, fishing, hiking, and hunting. Other activities include additional activities undertaken for pleasure that occur outdoors that may not meet the conventional definition (i.e., do not require intentional physical exertion or occur in a nature-based setting), such as outdoor concerts and festivals and games and sports fields. The two categories of activities can be combined to generate a broad view of the outdoor recreation economy. BEA calculates the ORSA from the same data used to calculate GDP broadly. Â As such, the ORSA is directly comparable to other BEA products, including other satellite accounts, like those for arts and cultural production. In addition, the estimates used to create the ORSA follow internationally recognized standards for national accounting, including creating GDP, value added, and other measures. Thus, in theory, the ORSA results can be compared to other measures of GDP, gross output, and value added, although differing assumptions, data, and methods may influence to what degree other measures are equivalent to ORSA statistics. As described above, the ORSA combines data from many different BEA industries; thus, although very general comparisons can be made, direct comparisons risk double-counting. For example, comparing the size of the ORSA to the size of the apparel industry would be inaccurate, because some value added from the apparel industry is included in the ORSA. According to the ORSA statistics, in 2017, the current-dollar value added of the outdoor recreation economy was $427 billion. The outdoor recreation economy accounted for 2.2% of GDP. As shown in Figure 1 , supporting activities, such as construction and travel and tourism expenses, accounted for approximately half of outdoor recreation value added in 2017, approximately $213.9 million current dollars. Conventional outdoor recreation accounted for 30.7% of value added. Other recreation accounted for 19.3%. BEA organizes its accounts by industry. BEA reports that the arts, entertainment, recreation, accommodation, and food services industry was the largest contributor to the outdoor recreation economy in 2017, accounting for $112.9 billion of current-dollar outdoor recreation value added. The second-largest industry in 2017 was retail trade, accounting for $95.7 billion of current-dollar value added. Figure 2 provides a full breakdown of contribution to value added by industry. BEA reported that the outdoor recreation economy generated approximately 5.1 million jobs in 2017. The arts, entertainment, recreation, accommodation, and food services industry was the largest industry included in the ORSA for both compensation ($67.3 billion current dollars) and employment (2.1 million) in 2017. Retail trade was the second-largest industry for both compensation ($49.8 billion current dollars) and employment (1.6 million) in 2017. The largest amount of value added in 2017 from an individual conventional outdoor recreation activity (as defined by BEA) came from boating/fishing, accounting for approximately $21Â billion in current-value dollars, or approximately 5% of value added from outdoor recreation (see Figure 3 ). The activities that generated the most value added are not necessarily the most popular, according to an FS participation survey. For example, although equestrian activities were among the six largest activities in terms of value added, an FS survey found that equestrian activities were among the three smallest activities for number of participants (see \" National Outdoor Recreation Participation \" for more information). Although much of the economic activity tracked by BEA to calculate value added can be linked to a specific activity (see \" About the Outdoor Recreation Satellite Account \"), some economic activity cannot. For example, multiuse apparel and accessories (such as backpacks, bug spray, and other items) that can be used for many activities accounted for approximately $48.6 billion in current dollars, or over 11% of value added. In real terms, the outdoor recreation economy grew 3.9% between 2016 and 2017, faster than the 2.4% growth for the overall U.S. economy. Real gross output, compensation, and employment all grew faster in the outdoor recreation economy than in the overall economy in 2017. Between 2012 and 2017, the outdoor recreation economy grew by approximately 9.9%. In 2017, BEA released prototype statistics on the percentage of each state's GDP from outdoor recreation (see Figure 4 ). BEA's preliminary results found that Hawaii, Montana, Maine, Vermont, and Wyoming had the five highest proportions of state GDP from outdoor recreation. However, other measures of economic importance vary considerably by state. For example, California, Florida, and Texas had the highest total outdoor recreation value added. Wyoming, Hawaii, and Alaska and Maine (tied) had the highest percentage of state employment from outdoor recreation. The relative importance of recreation in individual states depends on the size of the outdoor recreation economy, the state's economy generally, and the state's employment and compensation patterns. It is unclear to what extent these estimates may change if BEA adjusts its methods for calculating state statistics. Official state statistics are scheduled for release in fall 2020. Other Estimates of Economic Activity In addition to the estimates created by BEA, researchers, advocacy groups, and industry associations create estimates of the outdoor recreation economy. Many groups estimate impacts of individual activities, sectors, geographic areas, or outdoor recreation areas (e.g., angling, winter snow sports, a given watershed, or a given state). The broadest of these is the Outdoor Industry Association's (OIA's) Outdoor Recreation Economy report, which has been produced annually since 2006. Prior to publication of the ORSA, OIA estimates were sometimes cited to gauge the size of the outdoor recreation economy as a whole. According to OIA's 2017 report, the outdoor recreation economy generated $887 billion in consumer spending, the majority of which ($702 billion) was trip and travel spending, including airfare, lodging, fuel, groceries, tickets, lessons, guides, and other unspecified expenses spent anywhere away from home. OIA estimates that the outdoor recreation economy directly supports 7.6 million jobs. OIA also estimates that the outdoor recreation economy generates $65.3 billion in federal tax revenue and $59.2 billion in state and local tax revenue. OIA's estimates of the size of the outdoor recreation economy, and other estimation efforts, cannot be directly compared to the ORSA. This may be due to differences in method, assumptions, measurement, or statistics reported. Specifically, the OIA reports measure consumer spending and tax revenue, which are not part of the ORSA and are not directly comparable to any statistic reported in the ORSA. OIA's estimate of jobs (7.6 million) is higher than BEA's estimate of jobs (5.2 million), but it is unclear to what extent the data reported are similar in measurement or whether they represent the same year. BEA excluded exports and imports in its calculation, and these figures may be captured in OIA's statistics. BEA states that external reports on the outdoor recreation economy that include \"activities with a high share of spending on imported goods and services (such as apparel) will likely have higher estimates than the ORSA.\" BEA also states that other reports may include spending on items not used for outdoor recreation (for example, bicycles used for commuting). In general, because other reports do not give the same statistics as the ORSA, and due to methodological differences, it is unclear whether (and to what degree) the ORSA and other reports may or may not be in disagreement, despite apparent large differences in results. The results of the ORSA and OIA reports have certain broad commonalities. For example, both reports find that large amounts of economic activity are driven by activities requiring relatively expensive purchases, such as vehicles (for example, boating or off-highway vehicle activities). Both reports also find that expenses related to travel, such as lodging, airfare, and food away from home, constitute large shares of the economic activity generated by outdoor recreation. According to one source, measures of national trends in outdoor recreation participation are based primarily on the National Survey on Recreation and the Environment (NSRE), a population-based survey conducted by the U.S. Forest Service (FS), sampling all areas of the country and participation in 17 outdoor activities. The NSRE measures both participation (the number of respondents who report engaging in the activity at least once over the course of a year) and consumption (the number of times the respondent indicates engaging in the activity). The survey does not estimate the total number of participants in outdoor recreation generally, only participation rates in the 17 activities studied. The most recent NSRE was completed for the period 1999-2009, and an update is ongoing. The NSRE estimated that, for the activities considered, a maximum of 194 million people (visiting developed sites) and a minimum of 8 million people (primitive skiing) participated every year (see Table 1 for additional details). FS estimated that approximately 82% of NSRE respondents participated in visiting developed sites, the activity with the highest participation rate. In terms of the frequency with which participants engaged in each activity (shown as \"Activity Days\" in Table 1 ), FS estimated that participants engaged in the most popular activity (viewing nature) over 32.4 billion times; this activity, however, is a major outlier, and participants engaged in the next several most popular activities between 8.3 billion and 1.8 billion times. Between 1999 and 2009, FS estimated that participation in nature-based outdoor recreation generally increased. The number of U.S. participants in the surveyed activities increased by 7.1% over this period. Certain activities, such as those oriented toward viewing and photographing nature, off-highway vehicle activities, and several physically challenging activities (e.g., kayaking, snowboarding, surfing) had relatively large increases in participation compared to the average over this period. More people overall participate in outdoor recreation in the eastern United States than in the western United States, in large part because most of the U.S. population resides in the East. However, participation rates (measured as the number of participants per hundred people) are higher in the West for all activities except hunting and fishing. In addition to this broad trend, demographic factors, such as population size, age, gender, race, ethnicity, education, and income, are correlated with the rate of outdoor recreation. For example, relative to the general population, people engaging in hunting and fishing are more likely to be rural residents, and people engaging in skiing and snowboarding are more likely to be urban residents. Availability of and proximity to recreation settings also are highly correlated with the rate of outdoor recreation participation. The amount of recreation that occurs on lands of differing ownershipâfor example, federal, state, local, and privateâlikely varies widely by activity and location (see section on \" Recreation Visits to Federal Lands \" for further discussion of recreation on federal lands). Approximately 60% of lands in the United States are privately owned, and approximately 28% of the total land area is federally owned; the remainder is in a mix of state, local, tribal, and other ownerships. Over 92% of federal land is located in 11 western states and Alaska. The uneven distribution of federal land between the eastern and western United States influences what lands provide outdoor recreation opportunities in different regions of the United States, particularly given that, for some federal land management agencies, at least half of visits to the properties they administer come from people who live within 50 miles. FS found that private lands were a more important recreation setting in the East, with the total number of recreation visits on private lands in the East nearly four times the number in the West. In the West, respondents reported that they spent the majority of activity days in all surveyed activities on publicly owned lands of any kind. In contrast, respondents in the East spent the majority of activity days in some surveyed activities on private lands and some on publicly owned lands. The ORSA statistics measures the state of the outdoor recreation economy generally. From the standpoint of public lands management, there is often congressional interest in how the government's provision of recreational opportunities translates into economic activity in communities around federal recreation resources. Legislation, hearings, and congressional reports have indicated the significance of this economic activity as a policy consideration in contexts involving federal lands. In the past decade, federal agencies and interagency groups have conducted studies measuring economic contributions specific to federal lands. Because these studies examine multiple agencies under a single framework, and because they report value added, the results are comparable to one another. In the sense that value added is a consistent concept, they also may be generally comparable to other measures of value added, such as the ORSA results, although differences in methods, data, and assumptions mean any comparison can be, at best, highly general. According to these studies, in FY2017 dollars, visitors spent approximately $54 billion in the local economies of federal recreation areas in FY2012 and $49.8 billion in FY2016, generating $55 billion in value added in FY2012 and $53.9 billion in value added in FY2016 (see Table 2 ). The studies indicate that outdoor recreation on federal lands directly supported 880,000 jobs in FY2012 and 826,000 jobs in FY2016. The authors of the studies in Table 2 limited their studies of visitor spending to areas within 50 miles of the federal recreation site. The authors state that this limitation provides a conservative estimate. Although research suggests that many visits to federal recreation sites do indeed originate from nearby, the nationwide estimates discussed above (see \" The National Outdoor Recreation Economy \") indicate that a large proportion of economic activity derives from travel-related expenses. If the travel-related portion of economic activity related to federal sites is not being captured in these results because that activity occurs more than 50 miles from the federal recreation site, these studies may undercount the true value. Similarly, results of national studies indicate that activities requiring major purchases (e.g., vehicles) account for a large proportion of the outdoor recreation economy. If visitors do not report such expenditures, it also may result in undercounting. The agencies used different methods to measure visitation and economic activity; thus, estimates may be only generally comparable. Federal lands comprise approximately 640 million acres in the United States, about 28% of the total land area. Approximately 92% (573 million acres) of federal lands are located in 11 western states and Alaska, with over one-third (224 million acres) of all federal land in Alaska alone. The Forest Service (FS) and the Bureau of Land Management (BLM) manage the majority of federal land. Nearly all federal land is open and available to the public for recreation. Although there is considerable overlap in the recreation opportunities across agencies, some agencies could be considered to have dominant niches. FS and BLM offer a range of opportunities, from camping, picnicking, and birdwatching in developed settings to activities in undeveloped backcountry, motorized recreation, and others. Opportunities on Fish and Wildlife Service land emphasize wildlife, fish, and birds. The National Park Service (NPS) is associated with \"iconic natural and cultural resources.\" Opportunities on land owned by the Bureau of Reclamation, National Oceanic and Atmospheric Administration, and U.S. Army Corps of Engineers (USACE) tend to center on water and underwater resources. Although some agencies' resources are used mostly by locals, all agencies have resources with regional, national, or international markets. Table 3 presents information from various sources on recreation visits to federal lands from FY2012 to FY2017. In general, these statistics are not comparable to the NSRE estimates given above due to differences in measurement. The statistics indicate that, in general over this period for agencies with complete data, FS and NPS had the most visits. These statistics underscore that size and location are imperfect predictors of recreation resource use; USACE, for example, has higher visitation than several agencies that manage more federal land area. These differences may be due to proximity to population centers, the types of resources available on different lands, and other factors. ", "summary": "Congress plays an overarching role in shaping outdoor recreation throughout the nation through legislation and oversight. As Congress continues to debate outdoor recreation issuesâincluding provision of federal resources, planning efforts, and fundingâdata on the size, distribution, and relative importance of the outdoor recreation economy may inform these debates. Both historical and recent legislative and executive efforts centered on outdoor recreation have identified the economic importance of outdoor recreation. In 2016, Congress passed the Outdoor Recreation Jobs and Economic Impact Act ( P.L. 114-249 ), which directed the Bureau of Economic Analysis (BEA) in the Department of Commerce to create an account that would measure the outdoor recreation economy. BEA released the first official Outdoor Recreation Satellite Account (ORSA) statistics in September 2018 and updated them in September 2019. According to the ORSA statistics, in 2017, the current-dollar value added of the outdoor recreation economy was $427Â billion, or 2.2% of gross domestic product (GDP). ORSA statistics show that supporting activities, such as construction and travel and tourism expenses, accounted for approximately half of value added. Conventional outdoor recreation activities, as defined by BEA, accounted for another 30.7% of real outdoor recreation gross output; o ther recreation accounted for 19.3%. The outdoor recreation economy grew by 3.9% in 2017, faster than the 2.4% growth for the overall U.S. economy, and has grown approximately 9.9% since 2012. Real gross output, real compensation, and real employment all grew faster in the outdoor recreation economy than in the overall economy in 2016. BEA reports that the \"arts, entertainment, recreation, accommodation, and food services industry\" was the largest contributor to the outdoor recreation economy in 2017, accounting for $112.9 billion of current-dollar outdoor recreation value added, followed by retail trade. These two sectors were also the largest industries included in the ORSA statistics for both compensation ($67.3 billion) and employment (2.1 million) in 2017. BEA released prototype statistics for states, which found that Hawaii, Montana, Maine, Vermont, and Wyoming had the five highest proportions of state GDP generated from outdoor recreation in 2017. In addition to the ORSA statistics, which are measured for the nation as a whole or for individual states, federal agencies sometimes measure the specific economic impact of federal lands. According to some studies, visitors to federal lands generated $55 billion in value added in FY2012 and $53.9 billion in value added in FY2016 (FY2017 dollars). Differences in methods, data, and assumptions mean any comparison between these figures and the ORSA statistics can be highly general at best. It is difficult to precisely measure the total amount of outdoor recreation that Americans engage in, due to differences in data collection, measurement, definitions, and other factors between sources. One source, the National Survey on Recreation and the Environment (NSRE), measures the number of people who engage in 17 different outdoor activities and how often they do so. According to the NSRE, over 194 million respondents (approximately 82% of respondents) engage in the most popular form of outdoor recreation (visiting developed sites) in a given year. Americans report engaging in the most popular surveyed activity, viewing nature, over 32.4 billion times in a given year, although this activity is a major outlier. Rates of participation in surveyed activities vary substantially and can depend on geographic location, proximity to recreation resources, demographic factors, and other influences. In FY2017, lands managed by the four federal land management agencies (the Bureau of Land Management, Fish and Wildlife Service, Forest Service, and National Park Service) had approximately 596 million visits. Lands managed by other federal agencies (the Bureau of Reclamation, National Oceanic and Atmospheric Administration, and United States Army Corps of Engineers) also had significant visitation. Visits to the lands of these other agencies sometimes exceeded visits to lands managed by the four federal land management agencies. Although publicly owned lands (including federal lands) generally have the greatest amount of recreation visits, private lands can dominate certain types of recreation, particularly in the eastern United States.", "document_type": "crs"}
{"report": "The federal government supports the charitable sector by providing charitable organizations and donors with favorable tax treatment. A primary source of support is allowing a tax deduction for charitable contributions made by individuals who itemize deductions, by estates, and by corporations. For charitable organizations, earnings on funds held by such organizations are exempt from the federal income tax. The tax revision enacted in late 2017, popularly known as the Tax Cuts and Jobs Act ( P.L. 115-97 ), made some temporary changes that, while not specifically aimed at charitable deductions, reduced the scope of the tax benefit for charitable giving. These changes have caused more individuals to take the standard deduction, rather than itemizing deductions, and exempted more estates from the estate tax, eliminating the benefit of deducting charitable contributions in these cases. These changes are expected to lead to a reduction in charitable giving. There were other more minor changes, some enhancing the charitable deduction and some imposing more taxes on charitable organizations. The report begins with a description of the charitable sector and tax provisions affecting the sector. The following sections discuss the magnitude of charitable deductions, including sources and beneficiaries, with historical data. The report then discusses the incentive effects of the deductions and the consequences for charitable giving, including potential effects of the 2017 tax revision. The report concludes with a discussion of policy options. The focus of this report is the charitable sector . Charities are one type of tax-exempt organization. Specifically, they are organizations with 501(c)(3) public charity status. As illustrated in Figure 1 , most 501(c) organizations are 501(c)(3) \"religious, charitable, and similar organizations.\" Charitable organizations fall within the broader nonprofit sector . In public policy discussions, the term nonprofit sector is often intended to include all organizations with federal tax-exempt status. The Internal Revenue Code (IRC) describes approximately 30 types of tax-exempt organizations. Other types of tax-exempt organizations, in addition to charities, include social welfare organizations, labor unions, trade associations, chambers of commerce, fraternal societies, and political organizations. Within the nonprofit tax-exempt sector, the bulk of organizations are exempt from tax under IRC Section 501(c)(3) (they are \"religious, charitable, or similar organizations\"). Most of the tax-exempt sector's financial activity also takes place in 501(c)(3) organizations. Every 501(c)(3) organization is classified as either a \"public charity\" or \"private foundation.\" Public charities have broad public support and tend to provide charitable services directly to the intended beneficiaries. Private foundations often are tightly controlled, receive significant portions of their funds from a small number of donors or a single source, and make grants to other organizations rather than directly carry out charitable activities. 501(c)(3) organizations are presumed to be private foundations unless they qualify for public charity status based on support and control tests. In 2015, there were 1,088,447 registered 501(c)(3) public charities. Of this total, 314,744 were reporting public charities, and filed a Form 990. Form 990 collects information about the organization's finances, assets, and activities. Organizations with gross receipts of $50,000 or more are generally required to file a Form 990 or Form 990-EZ. Private foundations file a Form 990-PF. Smaller organizations are not required to file an annual return, but may be required to file an annual electronic notice, the \"e-postcard.\" Churches and other qualifying religious organizations are exempt from the annual information-reporting requirements. The informational returns (i.e., Form 990s) of exempt organizations are public, unlike individual and corporate income tax returns. In addition to the information return, there are situations when tax-exempt organizations must file an income tax return. For example, tax-exempt organizations are subject to tax on income from business activities unrelated to their exempt purpose. Organizations subject to this tax, known as the unrelated business income tax (UBIT), must file a tax return using the Form 990-T. Two recent changes to UBIT became effective in 2018 (see the shaded box \"UBIT Changes for 2018\" below). Additionally, tax-exempt organizations must generally pay the same employment taxes (i.e., withhold income and payroll taxes of their employees) as for-profit employers. Finally, an organization's activities might require it to file other returns, such as an excise tax return. Federal statute includes multiple tax preferences for nonprofit and charitable organizations. Donations to charitable organizations may be tax deductible, which subsidizes charitable giving. Additionally, nonprofit and charitable organizations are generally exempt from tax on most income, including investment income. Some of the tax benefits are considered \"tax expenditures\" by the Joint Committee on Taxation (JCT), meaning the JCT provides an estimate of the amount of forgone revenue associated with the provision. Other tax benefits confer financial benefits to the sector, although the value of those benefits is not regularly estimated by the JCT. In addition to the federal tax benefits discussed here, there may also be state and local tax benefits associated with nonprofit or charitable status. For example, in addition to income tax benefits that mirror federal income tax benefits, state and local governments may provide property or sales tax exemptions. The primary tax expenditure for charities is the charitable deduction. Individual taxpayers who itemize their deductions canâsubject to certain limitationsâdeduct charitable donations to qualifying organizations. The JCT estimated that in 2019, approximately 13% of taxpayers will itemize deductions. Corporations may also be able to deduct charitable contributions. Organizations qualified to receive tax-deductible charitable contributions include public charities and private foundations; federal, state, or local governments; and other less common types of qualifying organizations. Contributions to civic leagues, labor unions, most foreign organizations, lobbying organizations, political contributions, and contributions directly made to individuals are not deductible as charitable contributions. There are limits on the deduction for charitable contributions for both individuals and corporations. For individuals, the deduction for gifts of cash or short-term capital gain property given to a public charity; private operating foundation; or federal, state, or local government is 60% of the taxpayer's adjusted gross income (AGI) (these limitations are summarized in Table 1 ). Gifts of cash or short-term capital gain property to private nonoperating foundations or certain other qualifying organizations are generally limited to 30% of AGI. The contribution of appreciated assets has particularly beneficial treatment, as the value of most appreciated assets can be deducted without including the capital gains in income that would be subject to tax. Thus, gifts of appreciated property are generally subject to lower deduction limits. Donations of long-term capital gain property to public charities; private operating foundations; or federal, state, or local government are limited to 30% of AGI, while contributions to private nonoperating foundations or certain other qualifying organizations are generally limited to 20% of AGI. Individuals are allowed to carry forward charitable contributions that exceed the percentage limits for up to five years. Corporate charitable contributions are generally limited to 10% of a corporation's taxable income. For a corporation, transfer of property to a charity might qualify as a deductible charitable contribution or a deductible business expense, but cannot be both. Like individuals, corporations are allowed to carry forward charitable contributions that exceed the percentage limits for up to five years. There are several rules related to the valuation of charitable contributions (also summarized in Table 1 ). For cash contributions, the value is simply the amount donated. However, when property is donated, the charitable deduction may be limited to the fair market value of the property, the taxpayer's tax basis in the property, or some other amount. Generally, as noted above, taxpayers can deduct the full fair market value of long-term capital gain property. Taxpayers may also be able to deduct the full fair market value of tangible personal property donated to a charity whose use of the property is related to their tax-exempt purpose. In some cases, the amount that can be deducted is limited to the donor's tax basis in the property. Specifically, deductions for contributions of property may be limited to basis for contributions of inventory or short-term capital gain property, contributions of tangible personal property that are used by a recipient organization for a purpose unrelated to the recipient's exempt purpose, or contributions to private foundations (other than certain private operating foundations). Donations of appreciated stock to private nonoperating foundations are not subject to this limit, and may be deducted using fair market value. Contributions of patents or other intellectual property may also be limited to the donor's basis in the property. Deductions are generally limited to the fair market value of the donated property, if the fair market value is less than the tax basis. There are a number of special rules related to donations of certain types of property, not all of which are discussed here. Special rules provide an enhanced deduction for C corporations contributing inventory to 501(c)(3) organizations for the care of the ill, the needy, or infants. There is also an enhanced deduction for businesses' contributions of food inventory. There are special rules associated with donations of vehicles, intellectual property, and clothing and household items. Another special provision allows for tax-free distributions from individual retirement accounts (IRAs) for charitable purposes. The IRA distribution provision is especially beneficial to nonitemizers because it excludes the distribution from income, which is equivalent to receiving the distribution and making a charitable deduction. Generally, a charitable deduction can be claimed only if the donor transfers their full interest in the property to a qualified recipient organization. This partial interest rule generally prohibits charitable deductions for contributions of income interests, remainder interest, or rights to use property. There is an exception to the partial interest rule for conservation contributions. Conservation contributions allow for charitable donations of conservation easements, where land, natural habitats, open space, or historically important sites are protected from development without the owner having to give up ownership of the property. Additionally, special rules increase the limit for appreciated property contributed for conservation purposes to 50% of AGI for individuals. For farmers and ranchers, including individuals and corporations that are not publicly traded, the limit is increased to 100% of income. Conservation contributions that exceed the 50% or 100% of income giving limits can be carried forward for 15 years, instead of the usual 5 years. Individuals can take a deduction for donations of property in the future with rights to the income stream for themselves or others, through a charitable remainder trust. In a charitable remainder trust, assets are transferred to a trust and a deduction taken for the present value of the future donation. The donor or other designated individual can receive a stream of income from the trust, for example, until death. Appreciated assets can be donated to the trust, which is tax exempt and pays no tax on the gain from the sale of assets. Due to the 2017 tax revision (TCJA), the tax expenditure associated with the charitable deduction has fallen. Under TCJA, however, there were limited direct changes in tax policies affecting charities. The one change to the charitable deduction expanded the deduction, raising the AGI limit for individual cash contributions to public charities from 50% to 60% through 2025. However, other changes that reduced the number of itemizers, such as the expanded standard deduction and the limit on state and local tax deductions, reduced the number of itemizers and reduced the marginal incentive to give to charity for many taxpayers. At times, Congress had passed legislation eliminating the percentage of AGI limit for charitable contributions made for disaster relief purposes. Recently, the Disaster Tax Relief and Airport and Airway Extension Act of 2017 ( P.L. 115-63 ) eliminated the limit for charitable contributions of cash for Hurricane Harvey, Irma, or Maria disaster relief. The Bipartisan Budget Act of 2018 ( P.L. 115-123 ) eliminated the limit for charitable contributions of cash associated with the 2017 California wildfires. JCT's tax expenditure budget includes several charitable tax expenditures: the deduction for charitable giving, tax expenditures for certain tax-exempt bonds, and the exclusion for ministers housing allowance. The JCT provides charitable deduction tax expenditure estimates separately for contributions to 501(c)(3) educational institutions and health organizations. In FY2019, the tax expenditure for charitable deductions associated with giving to organizations other than education institutions or health organizations was $32.6 billion, while the tax expenditures for giving to educational institutions and health organizations were $8.2 billion and $4.3 billion, respectively (see Table 2 ). Tax expenditures for the charitable deduction have recently declined. For FY2019, it is estimated that the charitable deduction will be associated with $45.1 billion in forgone revenue (see Figure 2 ). This is down from the estimated $61.0 billion in forgone revenue for FY2017, and $58.1 billion for FY2018. The decline in the charitable deduction tax expenditure is the result of (1) fewer taxpayers itemizing deductions following the 2017 tax revision ( P.L. 115-97 ); and (2) lower tax rates following the 2017 tax revision. Most of the forgone revenue associated with the charitable deduction is from individual giving, as opposed to corporate giving. The charitable deduction does not reflect forgone revenue associated with giving from bequests (which is discussed further below). There are also revenue effects associated with allowing nonprofit educational institutions and hospitals to issue tax-exempt bonds, and for the provision exempting the housing allowance of ministers from tax. Tax expenditures for charities in FY2019 are reported in Table 2 . For charities, most investment income is exempt from tax (there is a tax on the investment income of certain endowments, which is discussed below). The JCT does not consider the exemption of charities' investment income from tax a tax expenditure, and thus does not provide an estimate of the forgone revenue associated with this tax treatment. Data from IRS Form 990 informational returns can be used to understand the magnitude of 501(c)(3)s' exemption for investment income. In 2015, charities had $32.6 billion in investment income, $35.8 billion in net capital gains (mostly from the sale of securities), $4.0 billion in net rental income, and $3.9 billion in royalties. If this income had been subject to a 35% income tax (the corporate income tax rate in 2015), $26.7 billion in revenue would have been raised. This number does not include religious organizations. IRS data for 2015 reported assets of $3.8 trillion held by charities, with about $1 trillion of that amount in land, buildings, and equipment. Private foundations had $0.8 trillion in assets, with $0.7 trillion in investment assets. A significant share of investment assets held in charities is held in university endowments, with an estimated value of $0.6 trillion in FY2018. Assets do not include assets of nonreporting religious organizations. Most private foundations differ from operating charities in that they often have a single donor or small group of donors. In addition, while a gift to a foundation is deductible for income (and estate and gift) tax purposes, the donated funds are not immediately used for active charitable purposes. Rather, funds are invested and donations are often made to charitable organizations from earnings that may allow the corpus of the foundation to be maintained and grow. Contributions to foundations benefit from both the charitable deduction, when the contribution is made, as well as the exemption on investment earnings, as earnings accrue on invested contributions over time. To address concerns that foundations could retain earnings and grow indefinitely, and because foundations are often closely tied to a family or specific group of donors, tax laws require a minimum payout rate (5% of assets) and restrict activities that may benefit donors. The tax code imposes taxes and/or penalties for self-dealing, for failure to distribute income on excess business holdings, for investments that jeopardize the charitable purposes, and for taxable expenditures (such as lobbying or making open-ended grants to institutions other than charities). Private foundations are subject to a 2% excise tax on their net investment income. However, the rate is reduced to 1% if qualifying charitable distributions are increased. In FY2017, excise taxes on private foundations generated $643.6 million in revenue. Donor-advised funds (DAFs) allow individuals to make a gift to a fund in a sponsoring organization. Sponsoring organizations are charities that are allowed to receive tax-deductible donations. The gift is irrevocable, as in the case of a gift to a foundation or any other charity. The donor does not legally oversee the payment of grants to charities from the fund, which is determined by the sponsoring organizations. Donors make recommendations for grants (hence donor advised), and there is general agreement that these recommendations determine, with few exceptions, the contributions. DAFs, like private foundations, can accumulate assets and earn a return tax free, but they are not subject to many of the restrictions on foundations, including the minimum payout rate. These funds have been growing rapidly, in part through funds set up by major financial institutions. According to the National Philanthropic Trust, in 2017 there were 463,622 individual DAFs, with contributions of $29.2 billion, assets of $110.0 billion, and recommended grants of $19.1 billion. The DAFs were managed by 53 national charities, 604 community foundations, and 345 single-issue charities. In 2018, more than 200,000 donors had accounts at Fidelity Charity, with grants of over $5.2 billion. Supporting organizations are organized for the benefit of public charities, and they provide grants to these charities. There are several types of supporting organizations (DAFs are themselves supporting organizations). Type I and Type II organizations support a single charity and are supervised or controlled by the supported charity (with Type I similar to a parent-subsidiary relationship and Type II similar to a brother-sister relationship). A Type III organization supports more than one charity and falls into the category of a functionally integrated supporting organization, or FISO (either through performing certain activities directly or exercising governance and direction) and nonfunctionally integrated (non-FISO). A Type III non-FISO has a number of additional restrictions, including a requirement to distribute the greater of 85% of net income or 3.5% of nonexempt-use assets. A college or university endowment fundâoften referred to simply as an endowmentâis an investment fund maintained for the benefit of the educational institution. University endowments have been the subject of some scrutiny, in part because of the juxtaposition of growing endowment sizes with increasing tuition at private universities. The 2017 tax revision, P.L. 115-97 , added a 1.4% excise tax on net investment income of nonprofit colleges and universities with assets of at least $500,000 per full-time student and more than 500 full-time students. The revenue gain was projected to be $0.2 billion per year. For private nonprofit hospitals to be eligible for tax-exempt status, to be able to receive tax-deductible charitable contributions, and to be eligible for tax-exempt bond financing, they must meet a community benefit standard . Health care is not by itself a stated objective in the tax provisions determining charitable (501(c)(3)) status. Generally, the community benefit standard requires the hospital to show that it has provided benefits that promote the health of a broad class of persons in the community. One way hospitals may demonstrate that they have met the community benefit standard is by providing charity care (free or discounted services to charity patients). Other types of community benefit include participation in means-tested programs such as Medicaid; providing health professions education, conducting health services research, providing subsidized health services, funding community health improvement, and donating cash or in-kind contributions to other health-related community groups. Community-building activities (such as for housing and the environment) may qualify if a link to community health can be shown. The IRS does not count shortfalls associated with Medicare or bad debts from those not qualifying for charity care as part of the community benefit standard. The Patient Protection and Affordable Care Act (PPACA; P.L. 111-148 ) added additional requirements for 501(c)(3) tax-exempt hospitals. Specifically, 501(r) requires these hospitals to conduct community health needs assessments, establishing a written financial assistance policy, limit charges to financial-assistance-eligible patients to amounts billed to insured patients, and not engage in extraordinary billing collections until an effort is made to determine eligibility for financial assistance. Tax-exempt hospitals report their community benefit actions on their Form 990. In 2014, total net community benefit expenses were $63.0 billion (8.84% of expenses); of that amount, $12.7 billion was for charity care (1.78% of expenses) and $26.3 billion for unreimbursed means-tested costs (3.7%, almost entirely Medicaid). One study estimated the cost of all federal, state, and local subsidies for tax-exempt hospitals (income, sales, and property tax benefits) to be $24.6 billion in 2011. Another study using 2012 data found that nonprofit hospitals' community benefit expenses were 7.63% of total expenses, while the value of nonprofit hospitals' tax exemption was 5.87% of total expenses. The study also evaluated incremental community benefits, or community benefits beyond those provided by for-profit hospitals. Incremental community benefits provided by nonprofit hospitals were estimated to be 5.71% of expenses in 2012. Charitable donations made by an estate are generally referred to as charitable bequests . Decedents potentially subject to the estate tax can deduct charitable contributions. Estates are effectively subject to a 40% rate on amounts above the statutorily exempted value, which was set at $11.18 million per decedent for 2018. The estate tax exemption was doubled temporarily through 2025 by the 2017 tax revision, P.L. 115-97 . Transfers to a spouse at death are also excluded from the estate tax, and any unused exemption can be added to the exemption of the second spouse. Because of the large exemption, a small share of estates are subject to the estate tax, although a significant share of charitable contributions made by bequests appear on estate tax returns. The increase in the exemption decreased the amount of bequests that receive a benefit from the charitable deduction. The data from decedents dying in 2013 showed $18.1 billion of bequests reported on all estate tax returns, with $10.2 billion reported on taxable returns. Some of the bequests reported on nontaxable returns may benefit from the tax deduction, indicating a range of revenue costs from $4.0 billion to $7.2 billion. While there are no data available for the effects after the 2017 tax revision, estimates suggest a revenue cost of around $4 billion to $5 billion. The following sections describe the charitable sector. Specifically, data are presented on the size of the sector and the sector's revenues (including charitable contributions). Since the potential effect of the 2017 tax revision on charitable giving is a policy issue of interest, changes in charitable giving between 2017 and 2018 are examined in more detail. For 2015, 501(c)(3) organizations reported $3.8 trillion in total assets ($2.3 trillion in net assets) and total revenues of $2.0 trillion (or approximately 11% of GDP). Most of IRS Form 990 filers are small (assets of less than $500,000) or medium-sized (assets of $500,000 up to $10 million) charities (41.2% and 47.2%, respectively). Large organizations, those with at least $10 million in assets, were 11.6% of Form 990 filers. Assets and revenues, and to a lesser extent contributions, are concentrated in these larger organizations. While large organizations are 11.6% of charitable organizations filing Form 990s, 93.1% of assets are held by, 87.1% of revenues are received by, and 71.5% of contributions are made to these large organizations. Charitable contributions are a small share of revenues of 501(c)(3) organizations reporting to the IRS, accounting for 12.9% of revenue in 2015 ( Figure 4 ). The primary source of revenue (73.1%) is program services, such as tuition paid by college and university students, payments for hospital stays, and entry fees. Charitable organizations' revenue sources depend on the type of charity, with charitable giving, for example, being much less important for fee-for-service organizations such as educational institutions and hospitals. (These data represent those filing Form 990 returns. This excludes nonfiling religious organizations, which are likely to rely more on contributions.) In absolute terms, charitable giving has increased over time. In 2015, total giving was $375.9 billion, including data not represented in the IRS data (primarily gifts to religious organizations). When considering the magnitude of the charitable sector in the economy, one metric is charitable giving as a share of GDP. In 2018, estimated total giving was $427.7 billion, or 2.1% of GDP. Charitable giving since 1978 has averaged 1.9% of GDP. However, as seen in Figure 5 , this average obscures variation over time and across business cycles. The smallest share of charitable giving occurred in 1995 (1.6% of GDP) while the largest share occurred five years later in 2000 (2.2% of GDP). Private contributions to charitable organizations come from four different sources: individuals, foundations, bequests, and corporate giving. As shown in Figure 6 , individuals were the largest source of charitable giving in 2018 and totaled $292.1 billion, or 68.0%. As estimated subsequently in this report, 54% of that giving received a tax benefit from itemized deductions. Grants from foundations were the second-largest source of charitable contributions in 2018 at ($75.9 billion, or 17.7%), followed by charitable bequests ($39.7 billion, or 9.3%) and corporate giving ($20.1 billion, or 4.7%). Changes in giving from different sources are consistent with expectations following the changes in incentives for giving resulting from the 2017 tax revision. As illustrated in Figure 7 , individual giving as a percentage of GDP fell by 6.0% between 2017 and 2018. Individual giving was expected to fall as (1) fewer taxpayers itemized deductions; and (2) lower marginal tax rates reduced the incentive to give. Taxpayers may also have shifted the timing of gifts, making gifts late in 2017 instead of 2018 to take advantage of larger deductions in 2017, when tax rates were higher and more taxpayers itemized deductions. Giving from bequests as a percentage of GDP fell by 4.9% between 2017 and 2018. The share of bequests on taxable estate tax returns declined following the tax law changes. In contrast, there was little change in corporate charitable giving as a percentage of GDP (an increase of 0.3%). For corporations, the large change in the corporate tax rate might have reduced the incentive to give. Giving from foundations as a percentage of GDP increased by 2.0% between 2017 and 2018. Foundation giving was less likely to be directly affected by the tax policy changes between 2017 and 2018 (although contributions to foundations and future foundation giving might be affected). Religious charities receive the largest share of charitable giving, receiving 29.1% of total giving in 2018 ( Figure 8 ). Education ranked next, at 13.7%, with human services 12.1%, gifts to foundations 11.8%, and health 9.5%. Other beneficiaries each accounted for less than 9.5%. Giving to most beneficiaries as a percentage of GDP fell between 2017 and 2018, as shown in Figure 9 , with the exception of gifts to international affairs. Giving to public-society benefit organizations as a percentage of GDP fell by 8.4%. Giving to religious organizations as a percentage of GDP fell by 6.4%, while giving to education as a percentage of GDP fell by 6.2%. Gifts to foundations as a share of GDP experienced a larger decline that other categories, falling by 11.5%. Giving to religion as a percentage of GDP and as a share of total giving has declined over time, as shown in Figure 10 . Giving to most other beneficiaries has increased as a share of GDP, with the largest increases (in absolute terms) in giving to foundations and education. The decline in giving to religion from 2017 to 2018 may have just been part of a continuing trend, while the decline in giving to foundations may have reflected effects of the estate tax, or have been part of regular fluctuations in giving to foundations. To understand how much charitable giving is induced by tax incentives, it is important to understand how donors respond to tax incentives. Individuals give for a variety of reasons (e.g., altruism); research indicates that tax benefits may also influence charitable giving. Tax benefits encourage charitable giving by reducing the cost of giving, with the federal government effectively subsidizing charitable giving. For ordinary donations during donors' lifetimes (inter-vivos giving) and for donors not claiming the standard deduction, their marginal income tax rate determines the incentive effect by lowering the cost of giving. Donors who do not claim itemized deductions do not receive an incentive effect from the tax code. For gifts of appreciated property, subsidies are affected by the capital gains tax rate as well, regardless of whether itemized deductions are used. For bequests, the tax rate is the estate tax rate, but only a small fraction of estates are subject to tax. Corporate giving is potentially affected by the corporate tax rate. Taxes also have income effects, which may be important for wealthy donors who donate large shares of income or leave large shares of their estates to charity; taxes reduce charitable giving by reducing disposable income. Deductions for charitable contributions not only provide a tax incentive for donating or leaving bequests, but also have an income effect that increases giving. Taxpayers who itemize their deductions face a lower cost of giving than other taxpayers. Prior to the 2017 tax revision, the majority of individuals' charitable giving was deducted. For the most recent year of tax data available, 2016, charitable deductions of $233.9 billion were reported on tax returns, although $12.3 billion of that number was on returns with no ultimate tax liability. According to Giving USA , in that same year individuals donated $279.4 billion, indicating that approximately 80% of charitable deductions benefited from some subsidy in that year. Taxpayers with $500,000 of adjusted gross income or more, representing slightly under 1% of returns, accounted for 38% of charitable contributions. Taxpayers with $100,000 to $500,000 of income, slightly over 16% of returns, accounted for 38% of itemized charitable contributions as well. The amount of giving that benefits from tax reductions through itemized deductions is expected to have declined substantially in 2018 due to provisions of the 2017 tax revision. (Actual data on charitable deductions claimed from the IRS based on 2018 tax returns are not yet available.) This legislation is expected to decrease the share of itemizers due to a significant increase in the standard deduction and restrictions on itemized deductions, most importantly a $10,000 cap on deductions for state and local taxes. The Tax Policy Center (TPC) estimated the share of households reporting a benefit from deducting charitable contributions would fall from 21% to 9.1%. (This share reflects the share of the entire population, including nonfilers.) Data from the TPC that estimate itemized charitable contributions can be used to estimate the share of individual charitable contributions that would be claimed as itemized deductions. For 2018, TPC estimates that itemized charitable deductions would have been $212.1 billion without the 2017 tax revision, with itemized deductions for charitable giving being an estimated $143.1 billion as a result of the 2017 tax revision. In other words, charitable contributions itemized on individual income tax returns are estimated to have fallen by about one-third as a result of the 2017 tax revision. Assuming a similar level of itemized deductions in 2018 under prior law as reflected in actual data for 2016 (80%), the share of charitable contributions itemized would be projected at 54%. The tax savings from charitable contributions reflecting both the decline in itemizing and the small decline in tax rates also fell by about a third. The steepest declines were in the middle and upper middle of the income distribution (the benefit fell by 62% in the fourth quintile, while the benefit fell by 1.4% in top 0.1%). The TPC reported that taking into account all returns (including those not itemizing before the tax change), the average marginal tax rate across all donations fell from 20.7% to 15.2%. About two-thirds of charitable contributions in 2016 were in cash, and high-income taxpayers have a smaller share of cash contributions (47% in 2016 for taxpayers with income greater than $1 million). The price of charitable contributions for itemizers is (1-t), where t is the taxpayer's tax rate at which contributions are deducted. For example, if the individual is in a 25% tax bracket, every dollar the taxpayer donates and deducts from their income reduces their taxes by 25 cents. Hence, the tax price is 0.75, indicating that a taxpayer has to give up 75 cents for each dollar of charitable contributions. That is, if the taxpayer in that bracket contributes a dollar, he or she saves 25 cents in taxes and loses 75 cents that could have been used for other purposes. Charitable giving is concentrated at higher income levels, and the effect of the incentive depends on the tax rate. Consider the top tax rate (applicable for taxpayers with very high income levels), which has fluctuated substantially since the income tax was introduced in 1913, beginning at rates as low as 7% and rising as high as 92%. Starting in the mid-1960s, the top rate was 70% for many years (although it rose slightly with the Vietnam War surcharge). Beginning with legislation in 1981, the top tax rate has been reduced substantially. Effective in 1982, it was reduced from 70% to 50%. In 1986, it was further reduced to 28%. Rate increases occurred in 1990 and 1993, decreases in 2001, increases in 2013, and decreases in 2017. Table 3 compares the magnitude of those past changes in tax price. Importantly, as marginal tax rates fall, the tax price of giving increasesâin effect, the subsidy from the charitable deduction is reduced. Conversely, when marginal rates increase, the tax price of giving falls, and the subsidy of the charitable deduction increases. There were very large percentage changes in the 1981 and 1986 tax cuts, with much smaller changes subsequently. The effect of the top rate change in 2017 is relatively small compared to these earlier changes. The TPC estimated that across all taxpayers the tax price rose by 6.9%, to reflect the change in itemized deductions as well as the small change in tax brackets. The value of donating property differs from the value of cash donations; most property is appreciated property such as stocks and other property gaining value. Taxpayers with incomes of $500,000 or more account for 69% of these contributions. Currently, taxpayers are allowed to deduct the entire cost of donated property, without paying the capital gains tax. Since the cost of a dollar of consumption from sale of an appreciated asset is 1/(1-at g ), where t g is the capital gains tax rate and a is the share of value that would be taxed as a gain, the tax price of charitable giving of appreciated property is (1-t)/(1-at g ). The tax price effects in Table 3 reflect tax prices of assets with no appreciation. Table 4 shows the effects at the top rates for cases with appreciation of 50% of the value and 100% of the value. An appreciation approaching the full value would occur with assets that have been held for a long time and had a faster growth rate. Although changes in capital gains tax rates in isolation can affect the price of giving (for example, causing an increase in the price of giving by up to 10% in 1997), they sometimes offset the effects of a change in ordinary rates (as in 1986) and at other times exacerbate the effects. As with cash gifts, however, the largest changes to the tax price of appreciated property occurred in 1981 followed by 1986, where the price of charitable giving increased; the largest price decrease remains in 1993. A small share of estates are subject to the estate tax, and that share has been further reduced by the 2017 tax revision, which doubled the estate tax exemption. According to the TPC, 0.2% of deaths were subject to the estate tax before the change, which fell to 0.1% after the increase in the exemption. The latest IRS estate tax data are for decedents dying in 2013, before enactment of the 2017 tax revision. These data showed $18.1 billion of bequests reported on all estate tax returns, with $10.2 billion reported on taxable returns. The amount potentially benefiting from the estate tax deduction presumably fell between those two values, as the charitable deduction could have resulted in some estates not being taxable. Giving USA reported bequests of $26.3 billion in 2013 and $28.1 billion in 2014; thus, between 30% and 53% of bequests received the benefits of estate tax deductions. The tax price of a bequest is (1-t e ), where t e is the estate tax rate. The capital gains tax rate does not apply because the capital gain on assets passed on at death is not recognized. The current estate tax rate is 40%. The estate tax rate has fluctuated over time. From the post-World War II period to 1976, the top rate was 77%, when it was reduced to 70%. In 1981, the rate was reduced over a three-year period to 55% from 1982 to 1984, an increase in tax price of 50%. The estate tax rate was lowered from 55% to 45% over the period from 2002 to 2007, a 22% price increase. The estate tax was repealed for 2010, an 82% increase in the tax price (although individuals were retroactively allowed to pay an estate tax at 2011 rates of 35% to avoid a provision that would have required future capital gains to be recognized on sale by heirs, called carryover basis ). For those electing the 2011 tax rate, the price increase was 18%. The tax rate was reduced to 35% temporarily for 2011 and 2012; in 2013, the rate was set at 40%, a decrease in the tax price compared to the temporary rates of 8%. Aside from the year of repeal in 2010, the largest price increase was 50%, and significant price changes were fewer than for inter-vivos gifts. The benefits of the subsidy for bequests are also affected by the exemption, and the recent increases in exemptions make the tax subsidy less applicableâreducing the tax incentive for charitable bequests. Nevertheless, for bequests reported on estate tax returns, these bequests are concentrated in large estates. The 2013 estate tax data report only estates of $5 million or more, since smaller estates would be exempt, but 57% of contributions on these estates were in estates of $50 million or more, and 74% were reported for estates of $20 million or more. For taxable estates, 78% were reported on estates of $50 million or more, and 92% were reported on estates of $20 million or more. Thus, it appears that most charitable contributions that benefited from the tax subsidy would continue to do so under the new exemption level. Corporate giving is a relatively small share of total giving. In 2013, the last year for which tax data were available, tax statistics indicated total contributions of $15.9 billion, while Giving USA reported $20.05 billion in 2018. The incentive effects for corporate giving depend on the motivation. If charitable contributions are an expenditure for purposes of advertising and public relations, the deduction is like any other cost, and the corporate tax rate does not matter. If the contribution increases the welfare of managers, the donation reduces profit, and the corporate tax matters. To the extent that the corporate tax price affects charitable giving, the tax price has changed infrequently. In 1981, the corporate tax rate was 46%. The 1986 legislation phased the rate down over two years to 34%, increasing the tax price by 22%. In 1993, the corporate tax rate increased to 35%, for a small tax price reduction of less than 2%. The corporate tax rate stayed at that level, until 2018, when the rate was reduced to 21%, for a tax price increase of 25%. Numerous opportunities are available for adding to the tax benefit of a charitable contribution by accumulating earnings that are not subject to tax. In effect, the deduction for the charitable contribution is provided before it is actually spent on charitable activity. An example illustrates this point. If the interest rate is 10%, a dollar donated today and spent a year later by a tax-exempt charity will provide $1.10 in resources. If a taxpayer is subject to the 37% top tax rate on the earnings, the amount available to give to charity after paying taxes is $1.063. In the tax-exempt case, the tax price of giving is $0.61, while the tax price of giving in the taxable case is $0.63. The longer the asset is held by a tax-exempt entity, the greater the benefit to the charitable organizations: after 10 years tax-exempt accumulation leads to $2.69, while the amount available after paying tax is $1.84. There are a number of ways to accumulate funds without paying taxes on earnings, most notably through foundations, although they are required to pay out a minimum amount each year in charitable purposes. Other methods of delaying the payment of taxes is through private charities' endowment funds and supporting organizations, and well as DAFs, none of which is subject to payout restrictions. A DAF can act, in many ways, as a private foundation but without many of the restrictions of a private foundation. Taxing these earnings directly at the corporate rate would reduce the tax incentive for those subject to high individual marginal tax rates, but not eliminate it, given the lower corporate rate now in place. As previously discussed, the effect of changes in tax incentives on giving depends on the behavioral response to changes in tax rates. The measure is a price elasticity, which is the percentage change in charitable contributions divided by the percentage change in the tax price (in the case of individual cash giving, the tax price is one minus the tax rate). Given the large changes in tax price that have occurred over time, it is useful to examine some historical data. Figure 5 above shows the pattern of giving as a percentage of GDP over the period 1978-2018. There is little indication of significant shifts in giving due to tax rate changes. Contributions after 1981, despite pronounced tax price increases at higher incomes, remained relatively stable as a percentage of GDP. The small peak around 1986 is generally attributed by most researchers to a temporary rise in deductions reflecting a timing shift as tax cuts for 1987 and 1988 were preannounced in the Tax Reform Act of 1986 (TRA86; P.L. 99-514 ), but by 1989 contributions had returned to their previous levels. Contributions following enactment of the 1993 tax increase fell rather than increased. Thus, there is little in the historical record to suggest a significant response to changes in tax incentives. Economists have employed a variety of statistical methods to try to formally estimate the effects of tax incentives on charitable giving. The effects can be measured by estimating a price elasticity, which is the percentage change in charitable contributions divided by the percentage change in tax price. Since increasing the price of giving will reduce the amount of giving (and vice versa), the price elasticity is a negative number. For example, if the elasticity is -0.7, a 10% increase in the tax price (1-t) will result in a 7% decrease in the amount of charitable contributions. Some early statistical estimates indicated that giving was very responsive to the tax rate. The temporary increase in individual charitable contributions following the 1986 tax revision, where lower tax rates were announced in advance, caused researchers to suspect that some of these estimated effects were due to transitory changes. The most common instance of this transitory effect would be when income fluctuated: the periods when income rises and individuals are in higher tax brackets would be the best time to concentrate charitable giving. Thus, some of the relationship between high tax rates and higher contributions reflected timing and would overstate the response (i.e., the elasticity) to a permanent tax change. Statistical estimates are also made more difficult because charitable giving responds to income, so that higher incomes lead both to higher charitable contributions and, in a progressive tax rate system, to higher tax rates. Appendix A contains a review of studies of the price elasticity of charitable giving that control for transitory effects. The elasticities in those studies range from close to 0 to -1.2. The review of that evidence points to an elasticity of around -0.5. That elasticity would imply that the percentage change in individual charitable contributions due to the 2017 tax revision (where the price rose by 7%) was a 3.5% decline in individual charitable contributions. For 2017, individual giving was $302.5 billion, suggesting a decline in charitable contributions of around $11 billion as a result of the 2017 tax revision. With a current average tax rate for individual contributions of 15.2%, the tax price would rise by 9% if all charitable deductions were eliminated. These effects would be twice as large with an elasticity of -1.0. The National Council on Nonprofits has estimated a similar effect of the 2017 tax change for individual contributions, a decline in charitable giving of $13 billion or more. As a percentage of GDP, individual giving declined by about 6% from 2017 to 2018. Some of that decline might reflect a shift in giving from 2018 to later in 2017, to take advantage of the higher tax rates or the expectation of taking the standard deduction in the following year. Contributions as a percentage of GDP grew about 1.4% from 2016 to 2017. Many other factors, however, influence giving as a percentage of GDP, and individual giving as a share of GDP in 2018 was about the same as in 2015. The 2017 tax revision eliminated many charitable deductions taken for the middle and upper-middle-income taxpayers, leaving a charitable tax incentive mostly claimed by high-income individuals. The TPC estimates that in 2018 91.5% of the benefit for charity accrues to the top quintile (taxpayers with incomes of $153,300 or more), 83.5% is received by the top 10% (taxpayers with incomes of $222,900 or more), 56.4% is received by the top 1% (taxpayers with incomes of $754,800 or more), and 35% accrues to the top 0.1% (taxpayers with income of $3,318,600). The 2017 Panel Study of Income Dynamics (PSID) can be used to examine the patterns of giving by income class to different types of charitable organizations and also to examine the share of contributions likely to benefit low-income individuals (i.e., that go to charities and foundations that serve the poor). According to CRS's analysis of the PSID data, higher-income individuals give a larger share of their contributions to organizations that focused on health, education, arts, the environment, and international aid relative to contributions by lower-income individuals, while giving a smaller share to organizations focused on religion, youth and family services, community improvement, and directly providing basic necessities. For example, nearly two-thirds of contributions of those with incomes under $200,000 went to religious organizations, compared to roughly 47% for those with incomes over $200,000. In contrast, just over 5% of giving from families with income under $200,000 was directed to education purposes, compared to almost 19% for those with income over $200,000. The PSID data can also be used to estimate the share of various charitable benefits focused on the needs of the poor. Nearly 36% of charitable giving made by families with income under $200,000 was focused on the poor, compared to nearly 33% for families with income over $200,000. While the PSID sample sizes limit the ability to draw conclusions about charitable giving at very high income levels (greater than $1,000,000), they are suggestive that the share focused on the poor may further decline as income levels increase. As the changes from the TCJA resulted in a further concentration of charitable incentives toward high-income taxpayers, they also focused incentives on charitable giving less likely to benefit the poor and more likely to benefit organizations that focus on health, education, arts, the environment, and international aid. Although it is difficult to separate various causal factors, the recipient organizations that experienced the largest decline in giving in 2018 were foundations, although there was also extraordinary growth in giving to foundations in 2017. Foundations may be the most likely beneficiary of transitory giving (in this instance, making of gifts that otherwise might be made in 2018 into 2017). Other recipient organizations that saw larger declines in donations were public society benefit (an umbrella for many types of organizations), religious organizations, and educational organizations. Beneficiary organizations that saw an increase in donations or smaller declines were international affairs, environment and animals, arts, and health. Again, it is difficult to determine any causal relationships; for example, religious giving has been declining as a share of total giving for many years. Empirical estimates of the price elasticities for bequests are also reported in Appendix A . These estimates also vary significantly, although the evidence suggests they are more responsive to taxes than inter-vivos contributions. In the following calculations, an elasticity of -2.0 is used. It is difficult to determine the effect of the recent changes in the exemption in the 2017 act because the share of bequests reported on estate tax returns differs substantially from the share represented by taxable returns (30%) and the share represented by all returns (53%). Some returns that would have been taxable without the charitable deduction but are not taxable without the deduction benefit from the incentive. In addition, a much smaller share of taxable estate returns would fall below the exemption for taxable returns. Assuming that the share with an estate of less than $20 million would no longer be subject to the estate tax, that share is 92% for taxable returns, indicating 2.4% of bequests would lose the tax incentive (8% of 30%). For all estates the share is 74%, which suggests 13.8% of bequests would lose the benefit of the charitable deduction (26% of 53%). The tax price increase for those estates affected by the TCJA is 66%. Such a large price increase does not permit the use of a point elasticity estimate, so the underlying exponential formula is used, leading to a reduction in affected estates of 64% with an elasticity of -2.0. These calculations produce a range of percentage reductions in total bequests of 1.5% (0.64 times 2.4%) to 8.8% (0.64 times 13.8%). Bequests were $39.7 billion in 2017, suggesting a decline in bequests ranging from $0.6 billion to $3.5 billion. This same methodology can be used to estimate the effect on bequests of either eliminating the charitable deduction or repealing the estate tax, which would result in a further reduction of $7.0 billion to $10.0 billion. These estimates depend, however, on the elasticity. Excluding the one study that found no effect, the smallest elasticity estimated (-0.6) would result in an effect 30% smaller, and the largest (-3.0) would result in an effect 22% larger than these amounts. The National Council on Nonprofits has estimated a decline in bequests of $4 billion as a result of the 2017 tax revision. Because bequests vary considerably from year to year (and can be affected by very wealthy decedents as well as economic factors), examining changes from the previous year provides a limited amount of information. As noted above, some theories of corporate giving suggest that taxes do not affect a decision that is made for purposes of maximizing profits by generating advertising and goodwill. Empirical studies of the response are limited, dated, and quite mixed, including findings of large responses, small responses, no responses, and responses that are positive rather than negative. All of these findings make estimated effects on giving responses difficult to determine, although the corporate rate cut in 2017 substantially increased the tax price (by 22%) to the extent giving provided a benefit to managers. Corporate giving constituted the smallest share of total giving, amounting to $19.5 billion in 2017; therefore, the effects of the TCJA on overall corporate giving are likely small. Some proposals to revise the tax treatment of charitable giving are aimed at increasing the incentive to give or changing the distribution of incentives across donors, while others are aimed at what may be perceived as abuses. As mentioned previously, tax incentives for giving are largely confined to higher-income households because these taxpayers are more likely to itemize their deductions (largely deductions for state and local taxes, mortgage interest, and charitable contributions), which tend to rise with income, or choose the standard deduction of a fixed dollar amount. This concentration of tax benefits on higher-income individuals also tends to favor the charities they favor, such as those pertaining to health, education, and the arts, while disfavoring religion and charities aimed at human services. The concentration of charitable giving incentives to those with higher incomes has increased as a result of the 2017 tax revision. Nonitemizers were able to claim a deduction for charitable contributions in the early 1980s. A temporary charitable deduction for itemizers was adopted in the Economic Recovery Tax Act of 1981 ( P.L. 97-34 ), initially allowing a deduction for 25% of contributions in 1982-1984, 50% in 1985, and a full deduction in 1986, with the provision then expiring. The deduction was also capped in the first three years, at $100 in the first two years and $300 in the third year. Over time, policymakers have continued to propose policies that would extend charitable tax benefits to all taxpayers, either by allowing a deduction for nonitemizers (often termed an above-the-line deduction , reflecting its position on the tax form) or by replacing the itemized deduction with a credit available to all taxpayers. In the 116 th Congress, Representative Danny Davis has introduced legislation that would allow an above-the-line deduction for charitable giving H.R. 1260 ), as have Representatives Henry Cuellar and Christopher Smith ( H.R. 651 ). (A similar bill was introduced in the 115 th Congress as H.R. 5771 .) Earlier proposals for an above-the-line charitable deduction include the Universal Charitable Giving Act of 2017 ( H.R. 3988 / S. 2123 ) in the 115 th Congress, introduced by Representative Mark Walker in the House and Senator James Lankford in the Senate. In the 116 th Congress, Representative Danny Davis has introduced legislation that would allow an above-the-line deduction for charitable giving ( H.R. 1260 ), as have Representatives Henry Cuellar and Christopher Smith ( H.R. 651 ). (A similar bill was introduced in the 115 th Congress as H.R. 5771 .) Different models have been used to estimate the budgetary cost of a nonitemizer deduction. Using the Penn-Wharton Budget Model, the Indiana University Lilly Family School of Philanthropy estimates a nonitemizer deduction would cost between $14.4 billion and $16.1 billion in 2020 (see Table 5 for a summary of the revenue and charitable giving effects of the policy options evaluated in the study). Building on the Open Source Policy Center's Tax Calculator, Brill and Choe estimated such a change would cost $25.8 billion at 2018 levels (the revenue and charitable giving effects of the policy options in the study are summarized in Table 6 ). These studies also estimated the effect of the proposals on charitable giving. One concern is whether further encouraging charitable contributions is an efficient way of achieving the benefits such charitable giving might bring. In general, if the price elasticity of giving is less than 1.0, the induced charitable giving will be less than the revenue cost, and more charitable giving could be obtained by making direct expenditures. If the elasticity is greater than 1.0, charitable giving will be greater than the revenue loss. (This argument also applies to existing charitable deductions.) Brill and Choe used a unitary elasticity (an elasticity of -1.0) in their study, but found a smaller increase in charitable contributions ($21.5 billion) than the lost revenue (the absolute value of lost revenue) when evaluating an above-the-line or nonitemizer deduction. Presumably some additional revenue beyond the amount of induced giving is lost because some itemizers would move to the standard deduction, causing a loss of revenue unrelated to the charitable incentive. (Even very-high-income individuals who had no mortgages might be better off moving to a standard deduction because of the $10,000 cap on state and local tax deductions; the standard deduction for a married couple is $24,000). The Indiana University study looks at giving under a \"low-elasticity\" scenario (an elasticity of -0.5), a high-elasticity scenario (an elasticity of -1.0), and an income-based elasticity scenario. The increase in giving in 2020 under each scenario was $8.4 billion, $16.8 billion, and $24.9 billion, respectively. Under the low-elasticity scenario, an above-the-line deduction for giving would reduce revenues by $15.0 billion in 2020, while generating $8.4 billion in additional charitable giving. Under the high-elasticity scenario, the revenue reduction in 2020 is estimated at $15.5 billion, with additional charitable giving estimated at $16.8 billion. In the income-based elasticity scenario, the revenue reduction in 2020 is $16.1 billion, while additional charitable giving is $24.9 billion in 2020. Thus, if elasticities are less than 1.0, as the survey of studies accounting for transitional effects in Appendix A indicates, charitable deductions would likely be smaller than the revenue cost. In evaluating the trade-off between revenue loss and charitable contributions, the charitable contributions from an above-the-line deduction would tend to go to charitable causes favored by lower- and middle-income taxpayers. These include religion, youth and family services, community improvement, and directly providing basic necessities. If the desired objective is to increase resources devoted to these activities, additional resources could be provided directly by the federal government, instead of induced via charitable giving incentives (which result in a loss in federal revenue). The Indiana University study also looks at a scenario that would provide an enhanced nonitemizer deduction. In this policy, single filers with less than $20,000 in income ($40,000 for joint filers) would be able to deduct 200% of their charitable contributions. Taxpayers making less than $40,000 ($80,000 for joint filers) would be able to deduct 150% of their contributions. Under this policy, revenue losses would be between $15.9 billion and $18.2 billion in 2020, depending on the elasticities assumed. Charitable giving would increase by an estimated $9.2 billion to $27.7 billion, with the rise in giving greater than the loss in revenue in both the high-elasticity and income-based-elasticity case. This policy would tend to encourage additional giving by lower-income taxpayers. Adding a deduction for nonitemizers (or replacing the existing itemized deduction with a credit, as discussed below) would increase the complexity of the tax code for the individuals now taking the standard deduction. Charitable deductions require various types of substantiation and recordkeeping, and it is difficult for the IRS to monitor these contributions, especially with respect to small contributions where audit and investigation by the IRS are not cost effective. Charitable deductions are among the items with no third-party reporting, which makes enforcement more costly and difficult. Allowing a charitable deduction or credit to be taken regardless of whether a taxpayer itemizes or takes the standard deduction would further increase the share of taxpayers who take the standard deduction rather than itemizing deductions. The remaining major itemized deductions are state and local taxes and mortgage interest. Such a move would, for example, reduce the incentives for owner-occupied housing even further than the effects of the 2017 tax revision, which some might see as desirable and others as undesirable. An alternative to a nonitemizer deduction is to provide for a nonrefundable tax credit. It could either be as a substitute for or an addition to the current itemized deduction. Both the Indiana University and Brill and Choe studies estimate revenue effects and increased charitable contributions for a 25% credit. Indiana University considers a credit as an addition to the current itemized deduction, with an estimated revenue cost in 2020 of $20.6 billion to $24.6 billion, depending which elasticity is assumed. Brill and Choe consider a 25% credit that replaces the current itemized deduction, costing $31.1 billion at 2018 levels. Brill and Choe estimate the credit would (at their assumed -1.0 price elasticity) increase charitable giving by $23.3 billion. The Indiana University study estimates increased contributions in 2020 of $35.1 billion for the higher income-based elasticities, $22.8 billion for the elasticity of -1.0, and $11.4 billion for an elasticity of -0.5. The induced contributions associated with the elasticities of -1.0 and -0.5 are smaller than the revenue losses and raises the basic concerns about the tradeoff between revenue loss and contributions. If the credit replaced the itemized deduction, it would shift more of the incentive to lower- and middle-income individuals by creating the same tax price for all taxpayers and thus to their preferred beneficiaries. Expanding the scope of the benefit for charitable contributions would, like a deduction, tend to increase complexity in compliance and tax administration, as well as potentially reduce the incentive for home ownership by reducing the number of itemizers. If a credit substituted for the itemized deduction, it would be possible to set the credit so as not to lose revenue while equalizing the treatment of the charitable contribution incentive across taxpayers. For example, in a 2011 report by the Congressional Budget Office (CBO), an option of a 15% credit was considered, which, compared to a 25% credit, would have cost $20.4 billion less in 2006 dollars, and a larger amount at current income levels. Some proposals would cap expanded deductions. For example, the Universal Charitable Giving Act of 2017 ( H.R. 3988 / S. 2123 ) in the 115 th Congress would have limited the nonitemizer deduction to be one-third of the standard deduction that was available at that time. When a nonitemizer deduction was available in the early 1980s, it was limited to a certain percentage of contributions in the first three years of the temporary policy. Proposals have also been made to provide a floor, either under nonitemizer deductions or all deductions. A cap for a deduction that provides a desired incentive could be inefficient, as the cap eliminates the incentive for those with giving above the cap while still resulting in a revenue loss. Nevertheless, a cap may be useful for a deduction for nonitemizers or a credit that does not replace the itemized deduction, as it would reduce the number of current itemizers who would switch to the standard deduction. The Indiana University study finds that imposing a cap of $8,000 for a joint return (and $4,000 for a single return) applied only to the nonitemizer deductions would have, depending on what giving elasticity is assumed, a revenue cost in the range of $5.6 billion to $16.6 billion in 2020 (less than the $8.4 billion to $24.9 billion estimate for a nonitemizer deduction without a cap). This cap is generous compared the one proposed in the Universal Charitable Giving Act of 2017 (one-third of the standard deduction in 2017, which was $12,700 for a married couple and $6,350 for a single return). The $8,000/$4,000 cap is about a third of the current standard deduction under the new law ($24,000 for married couples and $12,000 for singles in 2018). The Indiana University study found an itemized deduction with this cap would increase charitable giving in 2020 by $16.6 billion assuming their high income-based elasticities, $11.2 billion at the elasticity of -1.0, and $5.6 billion at the elasticity of -0.5. With this cap, induced contributions are less than the revenue loss in all but the high income-based elasticity case (induced contributions are less than the revenue loss in all cases over the 10-year period). Caps for itemized deductions could also be set at a certain rate, instead of a fixed dollar amount. For example, the Obama Administration's FY2010 and FY2011 budgets proposed limiting the value of itemized deductions to 28% (a rate below the top individual income tax rate at the time of 35%). By limiting the amount of the deduction, the value of the charitable tax incentive would decrease for taxpayers in tax brackets above 28%. However, the subsidy would become more equal across taxpayers in different tax brackets. The policy would also raise additional revenue and result in a decline in charitable giving. Floors would allow charitable deductions in excess of a given amount, either a dollar amount or a percentage of income. As opposed to a cap, a floor could increase the efficiency of the incentive; to the extent that contributions are above the floor in the absence of the incentive, the floor does not affect the incentive at the margin, even though it reduces revenue loss. The floor would also, if applied only to the nonitemizer deduction, reduce the attractiveness of this deduction and thus reduce the number of taxpayers who shift to a standard deduction. A 2% floor was included in the 2014 major tax reform proposal by then-chairman of the House Ways and Means Committee Dave Camp (the Tax Reform Act of 2014, H.R. 1 in the 113 th Congress). The Brill and Choe study estimated the revenue effect of a nonitemizer above-the-line deduction and the 25% credit with a floor of $1,000 for married couples and $500 for singles. For the above-the-line deduction, they found a substantial fall in the revenue loss from $25.8 billion to $14.6 billion, but a relatively small effect on charitable contributions (at their -1.0 price elasticity), which were estimated to fall from $21.5 billion to $19.1 billion. Thus, at their unitary price elasticity, the induced contributions were expected to be larger than the revenue loss. Looking at the same dollar floor for the 25% credit, the revenue loss was reduced even more, from $31.1 billion to $15.4 billion, presumably because the floor would apply to existing itemizers as well. The induced contributions (at the -1.0 price elasticity) fell from $23.3 billion to $20.0 billion. The Indiana University study examined a modified percentage-of-income floor where contributions below 1% of AGI would receive a 50% deduction and the remainder a full deduction. The estimates of revenue loss and induced giving depend on the elasticity that is assumed. In the high-elasticity case, giving in 2020 would increase by $23.7 billion, while the revenue loss would be $13.4 billion. At the elasticity of -1.0, induced giving would be $15.9 billion, while the revenue loss would be $12.8 billion. With an elasticity of -0.5, induced giving would be $7.9 billion, with a revenue loss of $12.3 billion. In addition to potentially creating more \"bang for the buck,\" a floor (as long as it completely excluded contributions below a dollar amount or percentage of income) would simplify administration and compliance by having no deductions for small contributions. In considering a percentage of income versus a dollar floor, a dollar floor would be more transparent and serve the purpose of excluding deductions for minor contribution amounts, but the percentage-of-income floor would be more efficient because it could provide a meaningful floor for wealthy taxpayers. As noted previously, in the past Congress has passed legislation eliminating the percentage of AGI limit for charitable contributions made for disaster-relief purposes following certain disaster events. Senator Tim Scott has introduced legislation that would temporarily increase the limitation on charitable contributions made for relief efforts related to Hurricane Dorian ( S. 2476 ). Other proposals in the 116 th Congress would temporarily increase charitable giving limits following disaster events generally (the Tax Relief and Expedited Assistance for Disasters Act of 2019 (TREAD Act) ( H.R. 3287 ), introduced by Representative Tom Rice), or for disasters in 2019 (the Disaster Tax Relief Act of 2019, introduced by Representative Adrian Smith [ H.R. 2284 ] and Senator Deb Fischer [ S. 1133 ]). Other legislation introduced earlier in the 116 th Congress would have increased the limitation on charitable contributions made for relief efforts for disasters in 2018 (the 2018 Natural Disasters Tax Relief Act [ H.R. 1148 ], introduced by Representative Rice). Gifts of appreciated property, as noted above, receive a double benefit: a deduction for the fair market value and an exclusion of the gain from tax. These benefits also create an incentive to overvalue a gift so as to maximize the value of the charitable deduction. Charities may also incur costs to maintain or sell the property and may not even want the contribution but will accept it so as not to antagonize a wealthy donor. Several options could be considered for gifts of appreciated property. First, only contributions made in cash could be deductible, which would force the taxpayer to sell the property and then donate the proceeds to charity (thus incurring a capital gains tax and valuing the deduction at market value). A similar approach would be to allow a deduction equal to the basis in the property (usually, the amount originally paid for it). Taxpayers might still donate property with little appreciation, but that approach would also eliminate the double benefit and address the valuation issue. One difficulty with this option is that it would require either a loss of deduction or limit the optimal recipient in cases where the property was particularly desired to be used by the recipient, such as a contribution of a work of art to a museum. An option that would eliminate the double benefit but not address the valuation problem would be to allow the contribution of appreciated property but to tax the appreciation as if it were a realized capital gain. This approach would address the problem of donating an artwork to a museum. The Tax Reform Act of 2014 ( H.R. 1 ) had provisions aimed at limiting the problems attached to valuation. The deduction would have been limited to basis except for property related to the purpose of the charitable institution, certain property receiving special treatment such as conservation easements, and publicly traded stock as long as it was no more than 10% of the total shares. Another option is to allow a deduction only for the amount that the charity receives from a sale. One analyst has suggested (presumably to address property used by the charity) that the deduction be limited to the lesser of the benefit from sale, or the donor's tax basis plus one-half of the untaxed appreciation. There are proposals to address concerns about inflated values of easements that may be associated with the use of syndicated partnerships to donate conservation easements. One proposal would limit the value of these deductions to 2.5 times the partnership adjusted basis (the Charitable Conservation Easement Program Integrity Act of 2019, introduced by Senator Steve Daines [ S. 170 ] and Representative Mike Thompson [ H.R. 1992 ]). Charitable organizations can reimburse volunteers (without income tax consequences) for miles driven for charitable purposes. Nontaxable reimbursements by charities can be made up to the charitable mileage rate of 14 cents per mile. This rate was set in 1997, and has not been adjusted since. The IRS has the authority to adjust the business mileage rate (58 cents per mile for 2019) and the medical and moving expense mileage rate (20 cents per mile for 2019). The charitable mileage reimbursement rate is set in statute. Legislation in the 116 th Congress, the CHARITY Act of 2019 ( S. 1475 / H.R. 3259 ), would align the charitable mileage reimbursement with the rate used for medical and moving expense purposes. Other legislation, the Volunteer Driver Tax Appreciation Act of 2019 ( H.R. 2072 ), introduced by Representative Collin Peterson, and the Nonprofit Relief Act of 2019 ( H.R. 3323 ), introduced by Representatives Carolyn Maloney and James Clyburn, propose increasing the charitable rate to match the business mileage rate. The Delivering Elderly Lunches and Increasing Volunteer Engagement and Reimbursements (DELIVER) Act of 2019, introduced by Representatives Joseph Morelle and Ron Wright ( H.R. 2928 ) and Senators Angus King and John Cornyn ( S. 1603 ), would raise the standard charitable mileage rate for delivery of meals to homebound individuals who are elderly, disabled, frail, or at-risk. Increasing the charitable mileage reimbursement rate could encourage charitable activity, such as meal delivery, and help adjust for the increase in the cost of automobile use since the late 1990s. A concern with increasing the charitable mileage rate, particularly to the business mileage rate, is that a higher rate could overcompensate volunteers for their automobile-related expenses (i.e., allow taxpayers to take a deduction that exceeds actual driving/vehicle use costs). Some proposals relate to the treatment of the charitable organizations. Certain types of tax-exempt or charitable organizations may have specific or additional requirements. Several policy options are related to entities that receive charitable contributions, but do not immediately use these contributions for a charitable purpose. These entities include DAFs, supporting organizations, and university endowments. One option could be to subject these organizations to rules similar to private foundations and Type III Non-FISO supporting organizations, and require a minimum payout. Another option is to require all funds in a DAF account to be distributed within five to seven years. A proposal has been made to not allow foundations to make donations to DAFs, or require that if they do, the funds be spent immediately and with full disclosure. This option might address the concern that DAFs can be used to avoid transparency that is otherwise required of private foundations. The New York State Bar Association (NYSBA) Tax Section, commenting on an advance version of Treasury Notice 2017-73, addressing certain issues relating to DAFs, suggested that foundations could give to DAFs if the DAFs agree to distribute the funds immediately. The NYSBA also recommends applying the same rules as applied to foundations in cases where a pledge is made and DAF distributions satisfy it. A proposal to encourage greater use of DAFs would allow IRA rollover contributions to charity to go to DAFs (generally these contributions must go to public charities but cannot go to supporting organizations or DAFs). This proposal was included in the Charities Helping Americans Regularly Throughout the Year (CHARITY) Act of 2019, introduced by Senator John Thune ( S. 1475 ) and Representative Earl Blumenhauer ( H.R. 3259 ). Several policy options that relate to university endowments might be considered. These could include payout requirements, or measures to address offshore sheltering of earnings from the UBIT. Another proposal is to modify or repeal the tax on endowment net investment income enacted in the 2017 tax revision. The Reducing Excessive Debt and Unfair Costs of Education (REDUCE) Act of 2018 ( H.R. 5916 ) would have imposed an excise tax on undistributed required payouts from college and university endowments, with payout requirements designed to direct support lower- and middle-income students. Also in the 115 th Congress, the Don't Tax Higher Education Act ( H.R. 5220 ) would have repealed the endowment excise tax. Another proposal would eliminate the provision that reduces the excise tax rate on private foundations contingent on distributions and directly reduce the excise tax rate to 1%. This proposal is included in the proposed CHARITY Act of 2019. A nonprofit hospital applying for, or seeking to maintain, tax-exempt status as a \"charitable\" organization under IRC Section 501(c)(3) must meet the \"community benefit standard.\" Broadly, and as previously discussed, this standard requires the hospital to show that it has provided benefits that promote the health of a broad class of persons to the community. One way hospitals can demonstrate that they have met the community benefit standard is by providing charity care. The potential for increased coverage of health care for low-income individuals in the Affordable Care Act may have reduced the need for charity care and has raised questions about the need for the tax benefits for nonprofit hospitals. Disallowing tax-exempt bond financing was an option discussed during debates leading up to the 2017 tax revision. In addition, concerns have been raised about the enforcement of the community benefit standard. Some proposals reconsider the UBIT provisions adopted in the 2017 tax revision ( P.L. 115-97 ). One proposal would eliminate the separate business calculation of the UBIT (see the Nonprofit Tax Relief Act of 2019; H.R. 3323 ). Requiring that unrelated business taxable income be computed separately for each trade or business activity treats nonprofits differently from for-profit businesses, and it complicates administration and compliance because of the difficulties of classifying businesses. This provision may have been motivated by concerns about improper allocation of expenses across 501(c)(3) colleges' and universities' unrelated business activities. A 2013 IRS compliance report found that some colleges and universities were misallocating expenses between nonprofit and for-profit activities (which was already disallowed) and underpaying UBIT. Criticisms have also arisen about a change in the 2017 tax revision that subjects transportation benefits for employees to the UBIT. The purpose of this provision was to treat nonprofit business like for-profit businesses (where deductions are denied). This provision includes free parking, which would require nonprofits (including churches) that provide parking for their employees to determine the value of this benefit and file a tax return, in some cases for the first time. The House Committee on Ways and Means has approved legislation (the Economic Mobility Act of 2019; H.R. 3300 ) that would, among other things, repeal the inclusion of certain fringe benefits in UBIT. Other legislation that would repeal the inclusion of nonprofit fringe benefits in UBIT includes Representative James Clyburn's Stop the Tax Hike on Charities and Places of Worship Act ( H.R. 1223 ); the Lessen Impediments From Taxes (LIFT) for Charities Act ( S. 632 ), introduced by Senators James Lankford and Christopher Coons; the Stop the Tax Hike on Charities and Places of Worship Act ( S. 501 ), introduced by Senator Sherrod Brown; and legislation introduced by Representative Mark Walker ( H.R. 1545 ). The Preserve Charities and Houses of Worship Act ( S. 1282 ), introduced by Senator Ted Cruz, and the Nonprofits Support Act ( H.R. 513 ), introduced by Representative Michael Conaway, would repeal both of the TCJA provisions discussed above. Several proposals have been made to provide administrative reforms. One such proposal is to require electronic filling of 990 forms. This proposal is included in the CHARITY Act of 2019. Another proposal, considering the task of monitoring a large number of charities, would be to provide more funds to the IRS or even to create a separate regulatory authority, given that the IRS is a revenue collection agency, not a nonprofit regulator. For that reason the IRS has few incentives to devote resources to enforcing the rules regarding nonprofits. Appendix A. Evidence on Elasticities for Charitable Giving Lifetime (Inter-Vivos) Giving Table A-1 reports the results of seven different studies (with a number of specifications that attempt to measure both permanent and transitory effects of changes in price and income on charitable giving). Two of these studies (Bakija 2000, and Bakija and McClelland 2002) also provided some critiques of other studies and some sensitivity analysis that is useful in understanding the studies and their strengths and weaknesses. Results that are not statistically significant have an asterisk. Lack of statistical significance means that, although a relationship that most closely fits the data is estimated, there is such deviation from that relationship in the observations that there is not a clear causal effect. Estimates that are not statistically significant are usually, although not always, associated with very small values that are close to zero. While the studies differ in methodology, as discussed below, one difference is the type of data used. Tax return data are available for general use only to researchers in the Treasury Department and the Joint Committee on Taxation. (The Congressional Budget Office [CBO] has access to taxpayer data but must have uses approved by the Joint Committee on Taxation.) The data on giving and tax rates are probably superior in these studies and contain a larger sample of high-income taxpayers; however, such research cannot be replicated or subjected to any sensitivity analysis by others. Other researchers have to use public-use data constructed from other sources. Of the seven studies in Table A-1 four (Randolph 1995, Auten et al. 2002, and Bakija and Heim 2008 and 2011) used taxpayer data, and all had as authors or coauthors a Treasury employee. The Bakija and McClelland (2002) study, with a CBO coauthor, included a sensitivity analysis for the Auten et al. study, but used a public-use file, not the tax data. The other two studies also used a public-use file. Many of the studies listed below report multiple results using different specifications and, in general, an attempt is made to report the results that appear to be preferred by the author(s). In the case of the Bakija and Heim (2011) report, the preferred estimate for the permanent elasticity is associated with variations in the state tax rate, and estimates from other specifications (such as allowing coefficients to vary across incomes) are even larger (see the discussion of that study). For comparison with this table and to illustrate the importance of dealing with transitory effects, Bakija and McClelland (2002), who presented a range of strategies, also estimated a standard pooled cross-section estimate, the type that had been done prior to the evidence shown by the 1980s tax cuts that did not deal with transitory effects. That estimate showed results that are typical of past cross-sectional studies, a price elasticity of -1.22 and an income elasticity of 0.84. In general, the theoretical expectation is that transitory price effects are large and transitory income effects are small (due to the permanent income hypothesis or consumption smoothing). Price elasticities and income elasticities in cross-section studies are a combination of permanent and transitory effects. Thus, a lower permanent price elasticity and a higher permanent income elasticity would be expected than those observed in cross-section studies. Only two studies, Randolph (1995) and Bakija and Heim (2008) find these results, and the Bakija and Heim income elasticity is only marginally higher. Randolph (1995) was the first study to focus on the problem of transitory effects, and the technique used a 10-year panel that treated deviations from average income (and the resultant deviations from tax rates) as transitory. Permanent tax rates varied through changes in the tax law (and years around the 1981 and 1986 changes were excluded). This study allowed a long period of time to be transitory; therefore, it is possible that some of the permanent price and income effects are reflected in the transitory estimates, as the author acknowledges. Other studies tend to allow much shorter-term transitory effects, which might go too far in the other direction. Randolph's model allowed the price elasticity to vary by the share of giving, and he reports two measures: one unweighted with a price elasticity of -0.08, which is not statistically significant, and one weighted more heavily toward large contributors, which Randolph appears to prefer. The results in the Randolph study are consistent in general magnitude with the expectations based on the aggregate data discussed in the text: a small permanent price elasticity, a large transitory price elasticity, an income elasticity of around 1.0, and a smaller transitory income elasticity. Bakija (2000), who among other things replicates the Randolph results with public-use data, argues that the second weight, which yields an insignificant price elasticity, is more appropriate (although he criticizes other aspects of the model). In his own replications with public-use files he finds effects similar to Randolph's unweighted results but suggests the appropriate measure of the aggregate elasticity evaluated over the full sample. These results are similar to Randolph's unweighted results: he also finds similar results for the elasticity when confined to incomes over $100,000. Based on the specification he prefers and his replication, this approach basically finds no evidence of a permanent price response. The Randolph study differs from the other studies in some important ways. By using average income over the panel as permanent income and estimating transitory effects based on deviations, he allows a broad scope for shifting over time, whereas other studies use shorter periods. This choice may be influenced by experience with capital gains realizations studies, where using short periods to control for transitory effects was not successful in producing reasonable results. Barrett et al. (1997) allow limited intertemporal shifting variation and also a lagged value of giving to deal with adjustment. They focus particularly on how quickly adjustment takes place, which they find to be very rapid. Their panel also does not include tax rate changes after 1986, which are an important exogenous source of variation. They find a lower price elasticity than a standard cross section, but also a small income elasticity. Like the other studies, this study includes individual fixed effects that are designed to control for heterogeneity among taxpayers (e.g., a taste for philanthropy, religiosity). (Randolph could not employ individual fixed effects because he used an average over the entire panel for permanent income, which was then indistinguishable from a fixed effect.) One drawback, however, of fixed effects, as Barrett et al. acknowledge, is that the fixed effect could also be picking up permanent income effects, and so suppressing the value of that elasticity. The Barrett et al. study also allowed a more limited scope for intertemporal substitution. Auten et al. (2002) also use fixed effects and more limited intertemporal substitutions. As pointed out by Bakija and McClelland (2002), they also did not address known changes in the tax law (that is, 1986 was a higher-tax year than 1987, even though the high realizations in 1989 were associated with a preannounced drop in tax rates), which would tend to bias their price elasticities upward. This was a particular problem for panels that included 1986, and Bakija and McClelland reestimated their model using a public data file and found a much lower elasticity. Bakija (2000) mainly contrasted his model with Randolph's by using legislated transitory changes in tax rates as the way to determine the transitory component of taxes. Bakija and McClelland base their analysis off Auten et al., and while they introduce a number of innovations, their main changes are to model expected tax changes and introduce adjustment lags. Bakija and Heim (2008) use a panel approach with tax data, with fixed effects, with more limited substitution frameworks than Randolph, and with attention to expectations of tax changes. They characterize intertemporal substitution mainly through those preannounced tax changes and allow shorter substitution periods. The main source of determining the price elasticity is the difference in response across taxpayers who had different changes in their tax rates. They also examine separate estimates for higher-income individuals. They obtain different estimates depending on how they deal with fixed time effects (variables meant to control for changes that affect all observations in a given year), which cannot be introduced into the higher income levels because they are so closely correlated across the sample with legislated changes in tax rates. The first one they reported, which did not use fixed time effects but incorporated a time trend, is included in the assessment. Bakija and Heim (2011) is similar to their 2008 study but reports effects for using the state tax rate alone, the federal tax rate alone, and the combined federal and state rate. The authors believe the state tax rate provides a more reliable measure of response because state tax rates allow a comparison of people with the same income but living in different states, and thus is less likely to reflect the effects of omitted variables. The federal rate or combined rate (where the federal rate would dominate) captures the effects of changes in income and the effects of exogenous federal tax changes. The study also reports effects when coefficients of nonprice variables (i.e., other than the tax variables) differ across income, finding higher permanent price elasticities (a permanent elasticity of -1.53). When the study allows price elasticities to vary across income, there is some indication that elasticities increase with higher incomes, but some estimates are statistically insignificant (including estimates for some high-income individuals). Statistically significant estimates of -1.19 are found for the $200,000-$500,000 class and of -1.71 for the over $1 million class; but estimates for the other classes were not statistically significant. Ultimately no study is perfect, and thus it is difficult to choose a central elasticity from among these. Excluding the high elasticities in Auten et al. for the panel that covers 1986 and that are likely overstated, the elasticities range from essentially 0 to 1.2. It seems likely that the unweighted Randolph estimate may be biased downward, but some others may be biased upward because of fixed effects or short periods for intertemporal substitution. In addition, the response to the 1986 tax revision suggests a higher transitory price elasticity than permanent price elasticity, and intuition would suggest that charitable giving is a luxury that would tend to have an income elasticity above 1.0. Only the Randolph study finds effects consistent with these expectations, suggesting an elasticity of around 0.5. Table A-2 reports the results of seven different studies that attempt to estimate both the price and wealth elasticities of charitable bequests. Although these studies find a diverse set of estimated elasticities, they reach two common general conclusions: (1) the price elasticity dominates the wealth elasticity and (2) charitable bequests, generally, respond elastically to changes in the tax price of bequests. The exception to this second conclusion is provided by Greene and McClelland (2001) and is likely explained by their focus on the portion of the tax price related to the exemption level. Appendix B. History of the Tax Treatment of Charitable Contributions and Organizations Charitable Contributions The charitable deduction was added by passage of the War Revenue Act of 1917 (P.L. 65-50). Senator Henry Hollis, the sponsor, argued that high wartime tax rates would absorb the surplus funds of wealthy taxpayers, which were generally contributed to charitable organizations. The deduction was originally limited to individuals. A deduction for trusts and estates was added in the Revenue Act of 1918 (P.L. 65-254), and a deduction for corporations was added in the Revenue Act of 1936 (P.L. 74-740). The deduction allowed in 1917 was limited to 15% of taxable income. Most of the revisions in the early tax law related to this limit. In 1944, it was changed to 15% of adjusted gross income. The corporate deduction was limited to 5% of income when introduced. In 1952, the individual limit was increased to 20%. The limit was increased to 30% in 1954, but the additional 10% had to go to specified charities (churches or religious orders, educational institutions, and hospitals). Thus, the 20% limit was retained for foundations and other charities. A carryover of unused deductions for two years was first allowed for corporations in 1954. In 1964, the carryover was increased to five years and extended to individuals. The percentage limit on individual contributions to charities was increased to 50% by the Tax Reform Act of 1969 (P.L. 91-172) but was restricted to 30% for gifts of appreciated property. The percentage limit on corporate charitable contributions was increased to 10% of taxable income in the Economic Recovery Tax Act of 1981 ( P.L. 97-34 ). The limit on contributions to private foundations was increased to 30% for cash contributions by the Deficit Reduction Act of 1984 ( P.L. 98-369 ). The Economic Recovery Tax Act of 1981 also allowed a temporary deduction for nonitemizers, but this provision was not extended by the Tax Reform Act of 1986 ( P.L. 99-514 ). Concerns about abuse led to provisions requiring greater substantiation of gifts. The Deficit Reduction Act of 1984 ( P.L. 98-369 ) required written substantiation of contributions in excess of $2,000, and the Omnibus Budget Reconciliation Act of 1993 ( P.L. 103-66 ) lowered that amount to $250. The American Jobs Creation Act of 2004 ( P.L. 108-357 ) increased reporting requirements for donors of noncash gifts. The Pension Protection Act of 2006 ( P.L. 109-280 ) provided for some temporary additional benefits (part of the \"extenders\") that were effective through 2007 at that time. The 2006 act also added restrictions on DAFs and certain supporting organizations. The 2006 law also tightened rules governing charitable giving in certain areas, including gifts of taxidermy, contributions of clothing and household items, contributions of fractional interests in tangible personal property, and recordkeeping and substantiation requirements for certain charitable contributions. Temporary charitable giving incentives were further extended through 2009 by the Economic Emergency Economic Stabilization Act of 2008 ( P.L. 110-343 ), enacted in October 2008, and through 2011 by the Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010 ( P.L. 111-312 ). Some provisions were extended through 2013 by the American Taxpayer Relief Act ( P.L. 112-240 ). These provisions were made permanent in the Consolidated Appropriations Act ( P.L. 114-113 ). The 2017 tax change, P.L. 115-97 , popularly known as the Tax Cuts and Jobs Act, increased the percentage-of-income limit for contributions of cash to public charities to 60% and eliminated the phase-out of itemized deductions on a temporary basis (through 2025). Charitable Organizations Corporations or associations organized for religious, charitable, or educational purposes were defined as exempt from tax in the original 1913 law establishing the income tax. These organizations could earn exempt income from activities related to their mission and also from unrelated business activities whose profits were used for the exempt purpose. The Revenue Act of 1950 (P.L. 81-814) established the unrelated business income tax (UBIT) on the income from commercial activities (other than on churches). The UBIT also applied to rents from real estate sale-leaseback arrangements that relied on debt finance. The Tax Reform Act of 1969 (P.L. 91-172) defined private foundations, established a series of restrictions on them, imposed a 4% excise tax on their investment income (to share the cost of enforcement), and established a minimum payout requirement of 6% of assets to avoid a penalty. The 1969 legislation also expanded the UBIT to all tax-exempt organizations (including churches), and applied it to all debt-financed income. The Tax Reform Act of 1976 ( P.L. 94-455 ) changed the minimum distribution requirement to 5% of assets. The Revenue Act of 1978 ( P.L. 95-600 ) reduced the net investment income excise tax to 2%. The Deficit Reduction Act of 1984 ( P.L. 98-369 ) exempted certain operating foundations from the excise tax and reduced the tax to 1% for foundations making improvements in their distributions. The 2017 tax reduction ( P.L. 115-97 ) imposed an excise tax of 1.4% on investment income of certain private colleges and universities (excluding smaller ones), added certain fringe benefits (such as parking) to the UBIT base, and required UBIT to be calculated separately for each business activity. ", "summary": "The federal government supports the charitable sector by providing charitable organizations and donors with favorable tax treatment. Individuals itemizing deductions may claim a tax deduction for charitable contributions. Estates can make charitable bequests. Corporations can deduct charitable contributions before computing income taxes. Further, earnings on funds held by charitable organizations and used for a related charitable purpose are exempt from tax. In FY2019, projected tax subsidies for charities, not including the value of the tax exemption on earnings of charities or the estate tax deduction, totaled $51.8 billion. If investment income of nonprofits were taxed at the 35% corporate tax rate in 2015, revenue collected is estimated at $26.7 billion (this amount excludes religious organizations). The cost of deducting bequests on estates is estimated at $4 billion to $5 billion. Charitable organizations include both operating charities (including religious institutions) and organizations that tend to hold assets and make grants to operating charities, most notably private foundations, but also donor-advised funds (DAFs) and supporting organizations. The tax code treats different types of organizations differently. For example, foundations and certain supporting organizations have minimum payout requirements, while DAFs do not. Limits on charitable giving also differ across gifts to different types of organizations. Changes in the tax revision enacted in late 2017, popularly known as the Tax Cut and Jobs Act (TCJA; P.L. 115-97 ), while not generally aimed at charitable deductions, reduced the scope of the tax benefit for charitable giving. A higher standard deduction and the limit on the deduction for state and local taxes caused more individuals to take the standard deduction, as opposed to itemizing deductions. As a result, many individuals who were able to deduct charitable contributions no longer claim this itemized deduction. Other changes exempted more estates from the estate tax, eliminating the benefit of deducting charitable contributions in these cases. Concerns have arisen that these changes are expected to lead to a reduction in charitable contributions. In 2018, charitable contributions were estimated at $427.7 billion, or 2.1% of gross domestic product (GDP). Charitable gifts come from four sources: individual contributions (accounting for 68%), foundations (accounting for 18%), bequests (accounting for 9%), and corporations (accounting for 5%). In 2018, estimates suggest approximately 54% of individual contributions are expected to have received a tax subsidy. Comparing giving levels in 2017 and 2018 provides some insight into the possible impacts of the 2017 tax revision on charitable giving and the charitable sector. Compared to 2017, 2018 contributions from individuals and bequests declined as a percentage of GDP (by 6% and 5%, respectively), while corporate contributions were virtually unchanged and foundation contributions rose by 2%. In 2017, an estimated 80% of individual contributions benefited from the tax subsidy for itemized deductions. Surveying the literature can also provide some insight regarding the effect of tax subsidies on charitable giving. Based on statistical estimates of the responsiveness of individual giving to tax subsidies, a decrease in individual giving of around 3% to 4% might be expected from the 2017 tax revision. Limitations in the data make the effect on estates difficult to estimate, but it could be a decrease of up to 8%; the small share of bequests in total giving, however, would lead even that effect to reduce overall charitable giving by less than 1%. A number of policy options could be considered with respect to the tax treatment of charitable giving or the tax treatment of charitable entities. The charitable deduction could be modified in ways that could extend charitable giving incentives to taxpayers not itemizing deductions, or with the intent of making charitable giving tax incentives more effective (inducing more giving for each dollar of lost federal tax revenue). There are also options related to the type of treatment of certain types of gifts, such as appreciated property or charitable miles driven. Some proposals have also been made to address concerns about aspects of certain charitable organizations, such as payouts by DAFs and university endowments. Some proposals would reverse certain changes made by the 2017 tax revision to the unrelated business income tax (UBIT) or impose administrative reforms.", "document_type": "crs"}
{"report": "S afe and affordable financial services are an important tool for most American households to avoid financial hardship, build assets, and achieve financial security over the course of their lives. In the United States, robust consumer credit markets allow most consumers to access financial services and credit products to meet their needs in traditional financial markets. The vast majority of consumers have, for example, a bank account, a credit score, a credit card, and other types of credit products. However, some consumersâwho tend to be younger adults, low- and moderate-income (LMI) consumers or possess imperfect credit repayment historyâcan find gaining access to these prod ucts and services difficult. For those excluded, consumers may find managing their financial lives expensive and difficult. This report provides an overview on financial inclusion. It then focuses on three areas: (1) access to bank and other payment accounts; (2) inclusion in the credit reporting system; and (3) access to affordable short-term credit. These areas are generally considered foundational for households to successfully manage their financial affairs and graduate to wealth building activities in the future. Wealth building activitiesâsuch as access to homeownership, education, and other financial investmentsâare outside the scope of this report. Financial inclusion refers to the idea that individuals \"have access to useful and affordable financial products and services that meet their needsâtransactions, payments, savings, credit, and insuranceâdelivered in a responsible and sustainable way.\" Access to financial products allows households to better manage their financial lives, such as storing funds safely, making payments in exchange for goods and services, and coping with unforeseen financial emergencies, such as medical expenses or car or home repairs. In the United States, most households rely on financial products found at traditional depository intuitionsâcommercial banks or credit unions. Some households also use financial products and services outside of the banking system, either by choice or due to a lack of access to traditional institutions. While products outside the banking sector may better suit some households' needs, these products might also lack consumer protections or other benefits that traditional financial institutions tend to provide. Different barriers affect different populations. For some younger consumers, a lack of a co-signer might make it more difficult to build a credit report history or a lack of knowledge or familiarity with financial institutions may be a barrier to obtaining a bank account. For consumers living paycheck to paycheck, a bad credit history or a lack of money could serve as barriers to obtaining affordable credit or a bank account. For immigrants, the absence of a credit history in the United States or language differences could be critical access barriers. For consumers who do not have familiarity or access to the internet or mobile phones, a group in which older Americans may be overrepresented, technology can be a barrier to accessing financial products and services. Some consumers face barriers that make it more difficult for them to access traditional bank products, such as a bank account, enter the credit system, and gain access to financial product and service offerings in traditional financial markets. These barriers can be significant because they may disadvantage these consumers from effectively managing their financial lives and achieving financial well-being, which the Bureau of Consumer Financial Protection (CFPB) defines as 1. having control over day-to-day, month-to-month finances; 2. having the ability to absorb a financial shock; 3. being on track to meet financial goals; and 4. being able to make choices that allow a person to enjoy life. Research has examined the factors involved in achieving financial well-being. For example, a CFPB study found thatâafter controlling for certain economic factorsâmoney management is strongly associated with financial well-being. In addition, the CFPB has found that not having a bank account and nonbank transaction product use (e.g., check cashing or money orders) is correlated with lower financial well-being. Although nonbank short-term credit is also correlated with lower financial well-being, the effect is not as large as the financial products previously mentioned. Lastly, holding liquid savings is highly correlated with the CFPB's financial well-being scale. Academic research conducted abroad also suggests the importance of access to financial products to improve financial well-being. For example, some studies suggest that access to bank accounts can lead to more savings. In particular, debit accounts seem to have strong effects, by helping consumers save more by reducing money spent on financial services and monitoring costs. Moreover, access to faster and more secure payment services has also been shown to provide significant benefits to consumers, including helping lower-income consumers better handle financial shocks. Likewise, inclusion in credit bureaus also have positive effects on consumers by reducing market information asymmetry and allowing some consumers to obtain better terms of credit. In contrast, the evidence on the effect of small-dollar short-term credit on individuals' financial well-being is mixed. Many Americans have low financial well-being and live paycheck to paycheck. National surveys suggest that about 40% of Americans find \"covering expenses and bills in a typical month is somewhat or very difficult,\" and they could not pay all of their bills on time in the past year. In addition, more than 40% of households did not set aside any money in the past year for emergency expenses. Therefore, a sizable portion of the adult population report they would have difficulty meeting an unexpected expense. If faced with a $400 unexpected expense, 39% of adults say they would borrow, sell something, or not be able to cover the expense. These financial struggles lead to real impacts on the health and wellness of these families; those with low financial well-being are more likely to face material hardship. The banking sector provides valuable financial services for households that allow them to save, make payments, and access credit. Most U.S. consumers choose to open a bank account because it is a safe and secure way to store money. For example, the Federal Deposit Insurance Corporation (FDIC) insures up to $250,000 per depositor against an institution's failure. In addition, consumers gain access to payment services through checking accounts, such as bill pay and paper checks. Frequently, a checking account includes access to a debit card, which increases a consumer's ability to make payment transactions through the account. For most consumers, a checking or savings account is less expensive than alternative ways to access these types of services. Some studies suggest that affordable access to payment transactions may be particularly important for consumers to manage their financial lives. For most consumers, opening a bank account is relatively easy. Consumers undergo an account verification process and sometimes provide a small initial opening deposit of money into the account. Many consumers open their first depository account when they get their first job or start post-secondary education. Checking and savings accounts are often the first relationship that a consumer has with a financial institution, which can later progress into other types of financial products and services, such as loan products or financial investments. Safe and affordable financial services, especially for families with unpredictable income or expenses, have the potential to help households avoid financial hardship. However, many U.S. householdsâoften those with low incomes, lack of credit histories, or credit histories marked with missed debt paymentsâdo not use banking services. According to the FDIC's 2017 National Survey of Unbanked and Underbanked Households, 6.5% of households in the United States were unbanked , meaning that these households do not have a bank account (see Figure 1 ). In addition, another 18.7% of households were underbanked , meaning that although these households had a bank account, they still obtained one or more of certain financial products and services outside of the banking system in the past year. These specified nonbank financial products, called alternative financial services , include check cashing, money orders, payday loans, auto title loans, pawn shop loans, refund anticipation loans, and rent-to-own services. Unbanked consumers tend to be lower-income, younger, have less formal education, of a racial or ethnic minority, disabled, and have incomes that varied substantially from month to month compared with the general U.S. population. Unbanked persons may be electing not to open a bank account due to costs, a lack of trust, or other barriers. According to the survey, these households report that they do not have a bank account because they do not have enough money, do not trust banks, and to avoid high and unpredictable bank fees. In addition, for immigrants, the account verification process may be more challenging to complete, and the consumer's country of origin may influence their trust of banks. In the past decade or so, the availability of free or low-cost checking accounts has reportedly diminished, and fees associated with checking accounts have grown. Some bank accounts require minimum account balances to avoid certain maintenance or service fees. The most common fees that checking account consumers incur are overdraft and nonsufficient fund fees. Overdraft services can help consumers pay bills on time, but fees can be costly particularly if used repeatedly. For consumers living paycheck to paycheck, maintaining bank account minimums and avoiding account overdrafts might be difficult, leading to unaffordable account fees. In addition, unpaid fees can lead to involuntary account closures, making it more difficult to obtain a bank account in the future. Depository institutions incur expenses to provide checking and savings accounts to consumers. In addition to specific account maintenance costs, physical banking branches incur costs to hire staff and maintain retail locations. To recoup these costs, depository institutions make money from interest rate spreads (i.e., loaning out funds in checking and savings accounts) and account fees. Historically, some banks were willing to lose money on these types of accounts to begin a relationship with a client and later get more profitable business from the client, such as a credit card or mortgage loan. In fact, checking and savings accounts data might allow a bank to better underwrite and price loans to a consumer. In this way, banks with a checking account relationship with a consumer might be able to provide more attractive loan terms than other banks without this relationship. Given these dynamics, lower-balance or less credit-worthy consumers may generally be less profitable for banks to serve. Consumers with low checking or savings account balances provide banks minimal funds to lend out and make a profit with. Moreover, less credit-worthy consumers may be less likely to develop into a profitable relationship for the banks if the consumer is not in a position to obtain loans from the bank in the near future. Therefore, bank fees may be seen as the best way for banks to recoup their account costs for these consumers. Because of the way bank fees are structured, consumers with lower balances using checking and savings accounts tend to incur more fees than consumers with higher balances. Bank access may also have a geographic component, as some observers are concerned that banking des erts â areas without a bank branch nearby â exist in certain communities. Branch offices are still important to many consumers, even as mobile and online banking has become more popular. For example, most banked households visit a bank branch regularly, and one-third of banked households visit 10 or more times in a year. However, in the past 10 years, the number of bank branch offices has declined in the United States due to many causes, such as bank consolidations and the rise of online banking. Some argue that this has left some communities without any nearby bank branches, making it more difficult to access quality banking services, particularly in lower-income, non-urban areas. Yet others argue that banking deserts are not a major issue in the United States because they have been stable over time, and minority areas are less likely to be affected than other areas of the country. Unbanked households rely on nonbank alternative financial products and services. Both unbanked and underbanked households are more likely to use transaction alternative financial products than credit alternative financial products. Transaction alternative financial products include check cashing, money orders, and other nonbank transaction products. In a typical month, unbanked consumers are more likely to use cash, nonbank money orders, and prepaid cards to pay bills and receive income, in contrast to banked consumers, who are most likely to use direct deposit, electronic bank payments, personal checks, debit cards, and credit cards. Alternative financial products can sometimes be less expensive, faster, and more convenient for some consumers. For example, although check cashing, money orders, and other nonbank transaction products might charge high fees, some consumers may incur higher or less predictable fees with a checking account. In addition, such alternative financial products might allow consumers to access cash more quickly, which might be valuable for consumers with tight budgets and little liquid savings or credit to manage financial shocks or other expenses. Lastly, nonbank stores often are open longer hours including evenings and weekends than banks, which might be more convenient for working households. Moreover, these nonbank stores might also be more likely to cater to a local ethnic or racial community, for example, by hiring staff who speak a native language and live in the local community. Although consumers may find benefits in using alternative financial products substitutes, these products may not always have all of the benefits of bank accounts, such as FDIC insurance or other consumer protections. General-purpose prepaid cards are another popular alternative to a traditional checking account. Use of prepaid cards is more prevalent among unbanked householdsâ26.9% of unbanked and 14.5% of underbanked households used a prepaid card in the past year. These cards can be obtained through a bank, at a retail store, or online, and they can be used in payment networks, such as Visa and MasterCard. General-purpose reloadable prepaid cards generally have features similar to debit and checking accounts, such as the ability to pay bills electronically, get cash at an ATM, make purchases at stores or online, and receive direct deposits. However, unlike checking accounts, prepaid card funds are not always federally insured against an institution's failure. Prepaid cards often have a monthly maintenance fee and other particular service fees, such as using an ATM or reloading cash. Some banks offer prepaid cards, yet unbanked consumers are much more likely to use a prepaid card from a store or website that is not a bank. Nonbank private-sector innovation could also provide more affordable financial products to unbanked and underbanked consumers. Whereas bank products may be expensive to provide to lower-income or less credit-worthy consumers, technology may be able to reduce the cost. For example, internet-based mobile wallets may provide access to payment services for unbanked consumers. Alternatives to a banking-based payment system have been proposed or pursued in other countries. For example, the M-pesa, a mobile payment system that does not use banks, has achieved a relatively high level of usage in parts of Africa. In addition, new mobile products aim to help consumers manage their money better and save by automating savings behavior. Yet, concerns continue to exist for internet-based products around data privacy and cybersecurity issues. Policymakers debate whether existing regulation can accommodate financial innovation or whether a new regulatory framework is needed. Some research suggests that emergency savings is crucial for a household's financial stability. The ability to meet unexpected expenses is particularly important, because within any given year, most households face an unexpected financial shock. For example, one study found that families with even a relatively small amount of non-retirement savings (e.g., $250-$750) are less likely in a financial shock to be evicted, miss a housing or utility payment, or receive means-tested public benefits. These findings are consistent throughout the income spectrum, not only for lower-income families. One barrier for building emergency savings may include not having a separate account dedicated to saving. For example, money in a transaction account intended for emergencies can be vulnerable to unintentional overspending. Although almost all banked households report having a checking account, roughly a quarter do not have a savings account. These households tend to be lower-income and living in rural areas and are more likely to be an ethnic or racial minority or working-age disabled compared with the U.S. population. Moreover, unbanked households are much less likely to report saving for unexpected expenses and emergencies (17.4%) than banked households (61.6%). Whereas most households save using a checking or savings account, most unbanked households save at home or with family or friends. In addition, saving with a prepaid card is much more common for unbanked households. Some recent research suggests that saving, not only through a savings account, but also through savings wallets on prepaid cards, can help consumers avoid high-cost credit and alternative financial services. In regard to accessing financial products and services that help consumers manage their finances and achieve financial success, some research suggests that consumers may particularly benefit from (1) access to affordable electronic payment system services, for example, through a traditional bank account; and (2) a safe way to accumulate and hold emergency savings. The government, the private sector, and the nonprofit sector all may be in a position to help increase access to these types of financial products for the underserved. Some propose changes to bank regulation to try to increase access to bank accounts. For example, the Community Reinvestment Act (CRA) encourages banking institutions to meet the credit needs of the areas they serve, particularly in LMI neighborhoods. Banks receive \"CRA credits\" for qualifying activities, such as mortgage, consumer, and business loans. Currently, providing bank accounts to LMI consumers or neighborhoods is not included in the calculation. Bank regulators are considering updating the CRA, and they recently received public comments on reforming implementation of the law. The Federal Reserve indicated that it is considering, due to public feedback, expanding the list of products and services that are eligible for CRA credits, including \"financial services and products aimed at helping consumers get on a healthier financial path,\" such as affordable checking and savings accounts for LMI consumers. Bank regulators may need to balance expanding CRA credit for these products with the CRA's statutory purpose, which was focused on encouraging bank lending activities to meet local communities' credit needs. Payment system improvements, either by the government or the private sector, may also have the potential to improve welfare for unbanked or underbanked consumers. Many of these consumers choose alternative financial payment products such as check cashers to access their funds quickly. These consumers might not require such alternative services if bank payment systems operated faster than they normally do. Both the private sector and the government are currently working on initiatives to make the bank payment system faster. For example, the Federal Reserve plans to introduce a real time payment system called FedNow in 2023 or 2024, which would allow consumers access to funds quickly after initiating the transfer. Faster payments may help some consumers avoid overdraft fees on checking accounts. However, some payments that households make would also be cleared fasterâdebiting their accounts more quicklyâwhich could be disadvantageous to some of these households compared with the current system. Other policy proposals include the government directly providing accounts to retail customers. For example, offering banking services through postal offices or providing banking services online to the public through the Federal Reserve, which already provides accounts to banks. Opposition to these proposals often centers on the appropriate role for the government. Some argue that the government should not be competing with the private sector to provide these services to consumers, especially in the competitive banking market. Moreover, government bank accounts may not attract consumer demand. For example, the Treasury Department's myRA account programâwhich provided workers without a work retirement account a vehicle for retirement savingsâclosed after about three years, in part due to lack of participation. Financial education programs or outreach initiatives coordinated by the government, nonprofit organizations, and financial institutions could support financial inclusion as well. Given the importance of emergency savings, in 2019, CFPB Director Kraninger announced that the CFPB wants to focus on increasing consumer savings, through financial education initiatives and joint research projects with the financial industry. In addition, the \"Bank On\" movementâa coalition between city, state, and federal government agencies, community organizations, financial institutions, and othersâaims to encourage unbanked consumers to open and use bank accounts. Bank accounts associated with the movement must have no overdraft fees, charge a minimal amount of monthly fees, have deposits that are federally insured, and offer traditional banking services, such as direct deposit, debit or prepaid cards, and online banking. Nearly 3 million accounts have been opened through the movement, generally to new bank customers, and consumers tend to actively use these accounts. This topic may continue to be the subject of congressional interest and legislative proposals. In the 116 th Congress, the House Financial Services Committee marked up and ordered reported H.R. 4067 , directing the CFPB to report to Congress on unbanked, underbanked, and underserved consumers. In addition, other legislation introduced proposes establishing an office within the CFPB to work on unbanked and underbanked issues ( H.R. 1285 ) and proposes developing short-term non-retirement savings accounts for consumers with their employers automatically deducting from their paychecks ( S. 1019 , H.R. 2120 , S. 1053 ) or using their tax refund to save ( H.R. 2112 , S. 1018 ). The credit reporting industry collects information on consumers and uses it to estimate the probability of future financial behaviors, such as successfully repaying a loan or defaulting on it. The information collected has largely related to consumers' past financial performance and repayment history on traditional credit products. Consumer files generally do not contain information on consumer income or assets or on alternative financial services. Credit bureaus collect and store payment data reported to them by financial firms, and they or other credit scoring companies use this data to estimate individual consumers' creditworthiness, generally expressed as a numerical \"score.\" The three largest credit bureausâEquifax, Experian, and TransUnionâprovide credit reports nationwide that include repayment histories. Credit reports generally may not include information on items such as race or ethnicity, religious or political preference, or medical history. This industry significantly affects consumer access to financial products, because lenders and other financial firms use consumer data when deciding whether to provide credit or other products to an individual and under what terms. Consumers who find it challenging to enter the traditional credit reporting system face challenges accessing many consumer credit products, such as mortgages or credit cards, because creditors are unable to assess the consumer's credit worthiness. This section examines some consumer credit reporting issues and related developments and policy issues. According to the CFPB, credit scores cannot be generated for approximately 20% of the U.S. population due to their limited credit histories. The CFPB categorizes consumers with limited credit histories into several groups. One category of consumers, referred to as credit invisibles , have no credit record at the three nationwide credit reporting agencies and, thus, do not exist for the purposes of credit reporting. Credit invisibles represents 11% of the U.S. adult population, or 26 million consumers (see Figure 2 ). Another category of consumers have a credit record and thus exist, but they cannot be scored or are considered un scorable . Unscorable consumers either have insufficient (short) histories or stale (outdated) histories. The insufficient and stale unscored groups, each containing more than 9 million individuals, collectively represent 8.3% of the U.S. adult population, or approximately 19 million consumers. Limited credit history is correlated with age, income, race, and ethnicity. Many consumers that are credit invisible or unscorable are young. For example, 40% of credit invisibles are under 25 years old. Moreover, consumers who live in lower-income neighborhoods or are black or Hispanic are also disproportionately credit invisible or unscorable compared with the U.S. population. Most young adults transition into the credit reporting system in their early twentiesâ80% of consumers transition out of credit invisibility before age 25 and 90% before age 30. For young consumers, the most common ways to become credit visible is through credit cards, student loans, and piggybacking (i.e., becoming a joint account holder or authorized user on another person's account, such as a parent's account). Young adults in LMI neighborhoods tend to make the transition to credit visibility at older ages than young adults in higher-income neighborhoods. In urban areas, consumers over 25 years old from LMI neighborhoods have higher rates of credit invisibility than those in middle and upper income areas. In addition, the highest rates of credit invisibility for consumers over 25 years old are in rural areas, and these rates do not vary much based on neighborhood income. Credit invisible consumers in LMI and rural areas are less likely to enter the credit bureaus through a credit card than credit invisible consumers in other parts of the country, possibly because piggybacking is notably less common in LMI communities. Moreover, using student loans to become credit visible is also less common in LMI areas. Recent immigrants also have trouble entering the credit system when they come to the United States. Existing credit history from other countries does not transfer to the U.S. system. In addition, immigrants' alternative forms of identification, such as the Individual Taxpayer Identification Numbers (ITINs) might not be accepted by some financial services providers. Consumers without a credit record have trouble accessing credit, but without access to credit, a consumer cannot establish a credit record. In general, there are two ways that policymakers tend to approach this issue, either by (1) expanding uptake of financial products reported in the current system or (2) expanding the types of information in the credit reporting system using alternative data. The first approach often focuses on financial education and entry-level products. Financial education and partnerships between financial services providers and nonprofit groups may help consumers learn how credit reporting works, develop a credit history, and become scorable. For example, financial wellness programs at workplaces are a growing way to deliver these types of programs. Yet financial education, coaching, and counseling can be expensive and difficult to provide to consumers. On the financial product side, tensions exist between expanding credit access to build a credit history and upholding consumer protection. For example, credit cards are the most common first product reported to credit bureaus, yet consumer protection regulations, such as the CARD Act of 2009, reduce young consumers' access to credit cards. Stakeholders believe that large financial services providers should develop entry-level credit products that are profitable and sustainable, without sacrificing consumer protections. For example, secured credit cardsâwhich are \"secured\" by a consumer deposit, so the issuer faces little risk of defaultâcan help establish a credit history, but currently, are less likely to move consumers to credit visibility than unsecured (regular) credit cards. Some consumer advocates believe that the security deposit is an obstacle for lower-income consumers. This issue epitomizes the difficulty in developing credit-building financial products for unscorable consumers that are safe, accessible, and prudent for the financial institution. Alternative data generally refers to data that the national consumer reporting agencies do not traditionally use (e.g., information other than traditional financial institution credit repayments) to calculate a credit score. It can include both financial and nonfinancial data. In a 2017 Request for Information, the CFPB included examples of alternative data, such as payments on telecommunications; rent or utilities; checking account transaction information; educational or occupational attainment; how consumers shop, browse, or use devices; and social media information. Alternative data could potentially be used to expand access to credit for current credit invisible or unscorable consumers, but it also could create data security risks or consumer protection violations. Alternative data used in credit scoring could increase accuracy, visibility, and scorability in credit reporting by including additional information beyond that which is traditionally used. The ability to calculate scores for the credit invisible or unscoreable consumer groups could allow lenders using these scores to better determine the creditworthiness of people in these groups. Arguably, this would increase access toâand lower the cost ofâcredit for some credit invisible or unscorable individuals, as lenders using alternative data are able to find new creditworthy consumers. However, in cases where the alternative data includes negative or derogatory information, it has the potential to harm some consumers' existing credit scores. Some prospective borrowers may be unaware that alternative data has been used in credit decisions, raising privacy and consumer protection concerns. Moreover, alternative data may pose fair lending risks if the data used are correlated with characteristics, such as race or ethnicity. Using alternative data for credit reporting raises regulatory compliance questions, which may be why adaption of alternative data in the credit reporting system is currently limited. The main statute regulating the credit reporting industry is the Fair Credit Reporting Act (FCRA), which establishes consumers' rights in relation to their credit reports, as well as permissible uses of credit reports. It also imposes certain responsibilities on those who collect, furnish, and use the information contained in consumers' credit reports. Alternative data providers outside of the traditional consumer credit industry may find FCRA data furnishing requirements burdensome. Some alternative data may have accuracy issues, and managing consumer disputes requires time and resources. These regulations may discourage some organizations from furnishing alternative data, even if the data could help some consumers become scorable or increase their credit scores. In an effort to address such concerns, many consumer data industry firms use alternative data only when consumers' opt-in. Using alternative data for credit reporting may continue to be the subject of congressional interest and legislative proposals. In the 116 th Congress, the House Financial Services Committee marked up and ordered reported H.R. 3629 , which among other things directs the CFPB to report to Congress on the impact of using nontraditional data on credit scoring. In addition, other legislation introduced allows types of alternative data to be furnished to the credit bureaus ( S. 1828 , H.R. 4231 ). Short-term, small-dollar loans are consumer loans with relatively low initial principal amounts, often less than $1,000, with relatively short repayment periods, generally for a small number of weeks or months. Small-dollar loans can be offered in various forms and by both traditional financial institutions (e.g., banks) and alternative financial services providers (e.g., payday lenders). Many U.S. consumers do not have access to affordable small-dollar credit; often for these consumers, small-dollar credit is either expensive or difficult to access. The extent to which borrowers' financial situations would be harmed by using expensive credit or having limited access to credit is widely debated. Credit is an important way households pay for unexpected expenses and compensate for emergencies, such as a car or home repair, a medical expense, or a pay cut. Credit that can be paid back flexibly is particularly valued by consumers, especially those living paycheck to paycheck. Research suggests that access to this type of short-term credit can help households during short-term emergencies, yet unsustainable debt can harm households. Consumer groups often raise concerns regarding the affordability of small-dollar loans. Some borrowers may fall into debt traps , situations where borrowers repeatedly roll over existing loans into new loans and find it difficult to repay outstanding balances. Regulations aimed at reducing costs for borrowers may result in higher costs for lenders, possibly limiting or reducing credit availability for financially distressed individuals. This section focuses on expanding access to affordable small-dollar credit. Policymakers continue to be interested in ways to increase access to affordable credit because it is an important step in achieving financial stability. About 80% of U.S. households have access to bank or traditional financial institution credit products, such as a general or store credit card, a mortgage, an auto loan, a student loan, or a bank personal loan. Credit cards are the most common form of credit, and they are what most households use for small-dollar credit needs. In general, banks require a credit score or other information about the consumer to prudently underwrite a loan. Scorable and credit-worthy consumers are in a position to gain access to credit from traditional sources. Financial institutions also sometimes provide consumer loans to existing customers, even if the borrower lacks a credit score (e.g., a consumer with a checking account who is a student or young worker). Some institutions make these loans to build long-term relationships. The remaining 20% of households do not have access to any traditional bank credit products, generally because they are either unscorable or have a blemished credit history. They are more likely to be unbanked, low-income, and minority households. Not having access to traditional bank credit is also correlated with age, formal education, disability status, and being a foreign-born noncitizen. According to an FDIC estimate, 12.9% of households had unmet demand for bank small-dollar credit. Of these households interested in bank credit, over three-quarters were current on bills in the last year, suggesting these households might be creditworthy. Policymakers often face a trade-off between consumer protection and access to credit when regulating the banking sector. Consumer protection laws at the state and federal levels often limit the profitability of small-dollar, short-term loans. For example, legislation such as the CARD Act of 2009 placed restrictions on subprime credit card lending. Small-dollar, short-term loans can be expensive for banks to provide. Although many of the underwriting and servicing costs are somewhat fixed regardless of size, smaller loans earn less total interest income, making them more likely to be unprofitable. Moreover, excluded consumers often are either unscorable or have a blemished credit history, making it difficult for banks to prudently underwrite loans for these consumers. In addition, banks face various regulatory restrictions on their permissible activities, in contrast to nonbanks. For these reasons, many banks choose not to offer credit products to some consumers. Nevertheless, banks have demonstrated interest in providing certain small-dollar financial services such as direct deposit advances, subprime credit cards, and overdraft protection services. In these cases, banks may face regulatory disincentives to providing these services, because bank regulators and legislators have sometimes demonstrated concerns about banks providing these products. For example, before 2013, some banks offered deposit advance products to consumers with bank accounts, which were short-term loans paid back automatically out of the borrower's next qualifying electronic deposit. Research findings from the CFPB suggest that although deposit advance was designed to be a short-term product, many consumers used it intensively. In the CFPB's sample, the median user was in debt for 31% of the year. Because of this sustained use and concerns about consumer default risk, in 2013, the Office of the Comptroller of the Currency (OCC), FDIC, and Federal Reserve issued supervisory guidance, advising banks to make sure deposit advance products complied with consumer protection and safety and soundness regulations. Many banks subsequently discontinued offering deposit advances. At the same time, regulators and policymakers have implemented policies aimed at increasing credit availability. Regulation implemented pursuant to the CRA (the 1977 law discussed in the \"Access to Checking and Other Banking Accounts\" section above) encourages banking institutions to meet the credit needs of consumers in the areas they serve, particularly in LMI neighborhoods that tend to include these excluded consumers. However, the CRA applies only to individuals with an established relationship with a bank, excluding unbanked consumers in an area. Likewise, many small-dollar loan products may not be considered qualifying activities. Moreover, the CRA does not encourage banks from engaging in unprofitable activities, so the incentives it creates might be limited. Credit alternative financial products include payday loans, pawn shop loans, auto title loans, and other types of loan products from nonbank providers. According to the FDIC, 6.9% of American households used a credit alternative financial service in 2017. Households that rely on credit alternative financial services are more likely to be lower-income, younger, and a racial or ethnic minority compared with the general U.S. population. Some argue that credit alternative financial products are expensive and are more likely than bank products to lead to debt traps. Bank small-dollar credit may be less expensive for prime borrowers with credit histories or relationships with banks. For other consumers, credit alternative financial products might better serve their needs due to fee structure or less stringent underwriting. Yet, some of these consumers may not have access to bank products and thus rely on credit alternative financial products for their credit needs. New technology may have the potential to help expand access to affordable credit to underserved consumers. For example, new nonbank digital or mobile-based financial products may lower the cost to provide small-dollar loans, making it easier to expand credit access to the underserved. Other nonbank products try to reduce default risk, for example, through employer-based lending models, to expand access to credit for more consumers. In addition, some lenders choose not to rely solely on the credit reporting system, and instead use alternative data directly to make credit decisions. New products that use alternative data on prospective borrowersâeither publicly or with the borrower's permissionâmay be able to better price lenders' default risk, which could expand credit access or make credit cheaper for some consumers. Recent findings suggest that some types of alternative dataâsuch as education, employment, and cash-flow informationâmight be promising ways to expand access to credit. For example, initial results from the Upstart Network's credit model, which uses alternative data to make credit and pricing decisions, shows that the model expands the number of consumers approved for credit, lowers the rate consumers pay for credit on average, and does not increase disparities based on race, ethnicity, gender, or age. Moreover, another recent study suggests that cash-flow data may more accurately predict creditworthiness, and its use would expand credit access to more borrowers, while meeting fair lending rules. One market segment is particularly illustrative of this practice. With the proliferation of internet access and data availability, some new lendersâoften referred to as marketplace lenders or fintech lendersârely on online platforms and frequently underwrite loans using alternative data. Although fintech lending remains a small part of the consumer lending market, it has grown rapidly in recent years. According to the Government Accountability Office (GAO), \"in 2017, personal loans provided by these lenders totaled about $17.7 billion, up from about $2.5 billion in 2013.\" In addition, incumbent bank and nonbank lenders have adopted certain of these technologies and practices to varying degrees, and in some cases have partnered or contracted with fintech companies to build or run online, algorithmic platforms. Yet, despite the potential of new technology in small-dollar lending markets, these technologies also create risks for consumers. For example, new digital technology exposes consumers to data security risks. In addition, lenders' alternative data used to make credit decisions could result in disparate impacts or other consumer protection violations. Policymakers and observers will likely continue to explore ways to make affordable and safe credit accessible to a greater portion of the population (in addition to including more people in the credit reporting system, as discussed in a previous section of the report). Changes to bank regulation could encourage more banking institutions to increase access to credit to underserved consumers. For example, some question the effectiveness of how the CRA is currently implemented, particularly with regard to short-term, small-dollar loans. As bank regulators consider updating the CRA, the Federal Reserve said that another area they are considering changing, due to public feedback, is expanding CRA-eligible products and services, such as payday loan alternatives and other small-dollar short-term loans for LMI consumers. Yet, as stated earlier in the report, bank regulators need to balance new CRA criteria with federal prudential regulations for safety and soundness , which requires banks to prudently undertake CRA-qualified activities and not engage in activities that are likely unprofitable to the bank. Reducing regulatory barriers may also allow more banking institutions to increase access to credit to underserved consumers. Financial regulators have taken recent steps to encourage banks to re-enter the small-dollar lending market. In October 2017, the OCC rescinded the 2013 guidance, and in May 2018 issued a new bulletin to encourage their banks to enter this market. In November 2018, the FDIC solicited advice about how to encourage more banks to offer small-dollar credit products. It is unclear whether these efforts will encourage banks to enter the small-dollar market with a product similar to deposit advance. In terms of using new technology and alternative data in consumer lending, questions exist about how to comply with fair lending and other consumer protection regulations. Currently, the federal financial regulators are monitoring these new technologies, but they have not provided detailed guidance. In February 2017, the CFPB requested information from the public about the use of alternative data and modeling techniques in the credit process. Information from this request led the CFPB to outline principles for consumer-authorized financial data sharing and aggregation in October 2017. These nine principles include, among other things, consumer access and usability, consumer control and informed consent, and data security and accuracy. According to the GAO, both fintech lenders and federally regulated banks that work with fintech lenders reported that additional regulatory clarification would be helpful. Therefore, the GAO recommended \"that the CFPB and the federal banking regulators communicate in writing to fintech lenders and banks that partner with fintech lenders, respectively, on the appropriate use of alternative data in the underwriting process.\" Lastly, some advocate for the federal government providing small-dollar short-term loans to consumers directly if the private sector leaves some underserved, for example, through postal offices. Yet, providing credit to consumers is more risky than providing bank accounts or other banking services because some consumers will default on their loans. Opponents of the government directly providing consumer loans often centers on concerns about the federal government managing the credit risks it would undertake. These opponents generally argue that the private sector is in a more appropriate position to take these risks. Access to bank and other payment accounts, the credit reporting system, and affordable short-term small-dollar credit are generally considered foundational for households to manage their financial affairs, improve their financial well-being, and graduate to wealth building activities in the future. In the United States, robust consumer credit markets allow most consumers to access financial services and credit products to meet their needs in traditional financial markets. Yet currently, consumers tend to rely on family or community connections to get their first bank account, establish a credit history, and gain access to affordable and safe credit. Given the importance of financial inclusion to financial well-being, and the challenges facing certain segments of the population, this topic is likely to continue to be the subject of congressional interest and legislative proposals. As markets develop and technology continues to change, new financial products have the potential to lower costs and expand access. Yet, as this report described, relevant laws and regulations may need to be reconsidered or updated in response to these technological developments. Moreover, policymakers may consider whether other policy changes could help expand consumers' affordable access to these financial products and services. Disagreements will continue to exist around whether government programs or regulation should be used to directly support financial inclusion or whether laws and regulations make it more difficult for the private sector to create new or existing products targeted at underserved consumers. ", "summary": "Access to basic financial products and services is generally considered foundational for households to manage their financial affairs, improve their financial well-being, and graduate to wealth building activities in the future. Financial inclusion in three domains can be particularly important for households: access to bank and other payment accounts; access to the credit reporting system; and access to affordable short-term small-dollar credit. In the United States, robust consumer credit markets allow most consumers to access financial services and credit products to meet their needs in traditional financial markets. For example, the vast majority of consumers have a bank account, a credit score, a credit card, and other types of credit products. Some consumersâwho tend to be younger adults, low- and moderate-income (LMI) or possess an imperfect credit repayment historyâcan find gaining access to these banking and credit products and services difficult. Currently, consumers tend to rely on family or community connections to get their first bank account, establish a credit history, and gain access to affordable and safe credit. For those excluded, consumers may find managing their financial lives expensive and difficult. Different barriers affect different populations. For some younger consumers, a lack of a co-signer might make it more difficult to build a credit report history or a lack of knowledge or familiarity with financial institutions may be a barrier to obtaining a bank account. For consumers living paycheck to paycheck, a bad credit history or a lack of money could serve as barriers to obtaining affordable credit or a bank account. For immigrants, the absence of a credit history in the United States or language differences could be critical access barriers. For consumers who do not have familiarity or access to the internet or mobile phones, a group in which older Americans may be overrepresented, technology can be a barrier to accessing financial products and services. Financial institutions may find serving these consumers expensive or difficult, given their business model and safety and soundness regulation requirements. For example, lower-balance or less credit-worthy consumers may generally be less profitable for banks to serve. Likewise, some consumers may lack a credit history, making it difficult for lenders to determine their credit risk on a future loan. New technology has the potential to lower the cost of financial products and expand access to underserved consumers. For example, alternative (nontraditional) data may be able to better price default risk for lenders, which could expand credit access or make credit less expensive for some consumers. In addition, internet-based mobile wallets may provide affordable access to payment services for unbanked consumers. Yet, relevant consumer protection and data security laws and regulations may need to be reconsidered or updated in response to these technological developments. Policymakers debate whether existing regulation can accommodate financial innovation or whether a new regulatory framework is needed. Given the importance of financial inclusion to financial well-being, and the challenges facing certain segments of the population, this topic may continue to be the subject of congressional interest and legislative proposals. In the 116 th Congress, the House Financial Services Committee marked up and ordered reported H.R. 4067 , directing the Bureau of Consumer Financial Protection (CFPB) to report to Congress on these issues. In general, political debates around how to best achieve financial inclusion for underserved consumers relate to whether policy changes could help expand consumers' affordable access to these financial products and services. Disagreements exist about whether government programs or regulation should be used to directly support financial inclusion or whether laws and regulations make it more difficult for the private sector to create new or existing products targeted at serving underserved consumers.", "document_type": "crs"}
{"report": "The rapid growth of digital technologies in recent years has created new opportunities for U.S. consumers and businesses but also new challenges in international trade. For example, consumers today access e-commerce, social media, telemedicine, and other offerings not imagined thirty years ago. Businesses use advanced technology to reach new markets, track global supply chains, analyze big data, and create new products and services. New technologies facilitate economic activity but also create new trade policy questions and concerns. Data and data flows form a pillar of innovation and economic growth. The \"digital economy\" accounted for 6.9% of U.S. GDP in 2017, including (1) information and communications technologies (ICT) sector and underlying infrastructure, (2) digital transactions or e‐commerce, and (3) digital content or media. The digital economy supported 5.1 million jobs, or 3.3% of total U.S. employment in 2017, and almost two-thirds of jobs created in the United States since 2010 required medium or advanced levels of digital skills. As digital information increases in importance in the U.S. economy, issues related to digital trade have become of growing interest to Congress. While there is no globally accepted definition of digital trade, the U.S. International Trade Commission (USITC) broadly defines digital trade as follows: The delivery of products and services over the Internet by firms in any industry sector, and of associated products such as smartphones and Internet-connected sensors. While it includes provision of e-commerce platforms and related services, it excludes the value of sales of physical goods ordered online, as well as physical goods that have a digital counterpart (such as books, movies, music, and software sold on CDs or DVDs). The rules governing digital trade are evolving as governments across the globe experiment with different approaches and consider diverse policy priorities and objectives. Barriers to digital trade, such as infringement of intellectual property rights (IPR) or protective industrial policies, often overlap and cut across sectors. In some cases, policymakers may struggle to balance digital trade objectives with other legitimate policy issues related to national security and privacy. Digital trade policy issues have been in the spotlight recently, due in part to the rise of new trade barriers, heightened concerns over data privacy, and an increasing number of cybertheft incidents that have affected U.S. consumers and companies. These concerns may raise the general U.S. interest in promoting, or restricting, cross-border data flows and in enforcing compliance with existing rules. Congress has an interest in ensuring the global rules and norms of the internet economy are in line with U.S. laws and norms. Trade negotiators continue to explore ways to address evolving digital issues in trade agreements, including in the proposed U.S.-Mexico-Canada Agreement (USMCA). Congress has an important role in shaping digital trade policy, including oversight of agencies charged with regulating cross-border data flows, as part of trade negotiations, and in working with the executive branch to identify the right balance between digital trade and other policy objectives. This report discusses the role of digital trade in the U.S. economy, barriers to digital trade, digital trade agreement provisions and negotiations, and other selected policy issues. The internet is not only a facilitator of international trade in goods and services, but is itself a platform for new digitally-originated services. The internet is enabling technological shifts that are transforming businesses. According to one estimate, the volume of global data flows (sending of digital data such as from streaming video, monitoring machine operations, sending communications) is growing faster than trade or financial flows. One analysis forecasts the global flows of goods, foreign direct investment (FDI), and digital data will add 3.1% to gross domestic product (GDP) from 2015-2020. The volume of global data flows is growing faster than trade or financial flows, and its positive GDP contribution offsets the lower growth rates of trade and FDI (see Figure 1 ). Focusing domestically, the Bureau of Economic Analysis (BEA) estimates that, from 1997-2017, real value added for the digital economy outpaced overall growth in the economy each year and, in 2017, the real value-added growth of the digital economy accounted for 25% of total real GDP growth. The increase in the digital economy and digital trade parallels the growth in internet usage globally. According to one study, over half of the world's population use the internet, including 95% of people in North America. As of 2017, 75% of U.S. households use wired internet access, but an increasing number rely on mobile internet access as the internet is integrated into people's everyday lives; 72% of U.S. adults own a smartphone. As of the end of 2018, approximately 40% of internet traffic in the United States came from mobile devices. Each day, companies and individuals across the United States depend on the internet to communicate and transmit data via various media and channels that continue to expand with new innovations (see Figure 2 ). Cross-border data and communication flows are part of digital trade; they also facilitate trade and the flows of goods, services, people, and finance, which together are the drivers of globalization and interconnectedness. The highest levels reportedly are those flows between the United States and Western Europe, Latin America, and China. Efforts to impede cross-border data flows could decrease efficiency and other potential benefits of digital trade. Powering all these connections and data flows are underlying ICT. ICT spending is a large and growing component of the international economy and essential to digital trade and innovation. According to the United Nations, world trade in ICT physical goods grew to $2 trillion in 2017 with U.S. ICT goods exports over $146 billion. Semiconductors, a key component in many electronic devices, are a top U.S. ICT export. Global sales of semiconductors were $468.8 billion in 2018, an increase of 6.81% over the prior year. U.S.-based firms have the largest global market share with 45% and accounted for 47.5% of the Chinese market. Given the importance of semiconductors to the digital economy and continued advances in innovation, countries such as China are seeking to grow their own semiconductor industry to lessen their dependence on U.S. exports. ICT services are outpacing the growth of international trade in ICT goods. The OECD estimates that ICT services trade increased 40% from 2010 to 2016. The United States is the fourth-largest OECD exporter of ICT services, after Ireland, India, and the Netherlands. ICT services include telecommunications and computer services, as well as charges for the use of intellectual property (e.g., licenses and rights). ICT-enabled services are those services with outputs delivered remotely over ICT networks, such as online banking or education. ICT services can augment the productivity and competitiveness of goods and services. In 2017, exports of ICT services grew to $71 billion of U.S. exports while services exports that could be ICT-enabled were another $439 billion, demonstrating the impact of the internet and digital revolution. ICT and other online services depend on software; the value added to U.S. GDP from support services and software has increased over the past decade relative to that of telecommunications and hardware. According to one estimate, software contributed more than $1.14 trillion to the U.S. value added to GDP in 2016, an increase of 6.4% over 2014, and the U.S. software industry accounted for 2.9 million jobs directly in 2016. Internet-advertising, an industry that would not exist without ICT, generated an additional 10.4 million U.S. jobs. As the internet and technology continue to develop rapidly, increasing digitization affects finance and data flows, as well as the movement of goods and people. Beyond simple communication, digital technologies can affect global trade flows in multiple ways and have broad economic impact (see Figure 3 ). First, digital technology enables the creation of new goods and services, such as e-books, online education, or online banking services. Digital technologies may also add value by raising productivity and/or lowering the costs and barriers related to flows of traditional goods and services. For example, companies may rely on radio-frequency identification (RFID) tags for supply chain tracking, 3-D printing based on data files, or devices or objects connected via the Internet of Things (see text box ). In addition, digital platforms serve as intermediaries for multiple forms of digital trade, including e-commerce, social media, and cloud computing. In these ways, digitization pervades every industry sector, creating challenges and opportunities for established and new players. Looking at digital trade in an international context, approximately 12% of physical goods are traded via international e-commerce. Global e-commerce grew from $19.3 trillion in 2012 to $27.7 trillion in 2016, of which 86% was business-to-business (B2B). One source estimates that cross-border business-to-consumer (B2C) e-commerce sales will reach approximately $1 trillion by 2020. These estimates do not quantify the additional benefits of digitization upon business efficiency and productivity, or of increased customer and market access, which enable greater volumes of international trade for firms in all sectors of the economy. Digitization efficiencies have the potential to both increase and decrease international trade. For example, one analysis found that logistics optimization technologies could reduce shipping and customs processing times by 16% to 28%, boosting overall trade by 6% to 11% by 2030; at the same time, however, automation, Artificial Intelligence (AI), and 3-D printing could enable more local production, thereby reducing global trade by as much as 10% by 2030. The overall impact of digitization has yet to be seen. One study coined the term \"digital spillovers\" to fully capture the digital economy and estimated the global digital economy, including such spillovers, was $11.5 trillion in 2016, or 15.5% of global GDP. Their analysis indicated that the long-term return on investment (ROI) for digital technologies is 6.7 times that of nondigital investments. Blockchain is one emerging software technology some companies are using to increase efficiency and transparency and lower supply chain costs that depends on open data flows of digital trade. For example, in an effort to streamline processes, save costs, and improve public health outcomes, Walmart and IBM built a blockchain platform to increase transparency of global supply chains and improve traceability for certain imported food products. The initiative aims to expand to include several multinational food suppliers, farmers, and retailers and depends on connections via the Internet of Things and open international data flows. With increased applications, the Internet of Things may have a global economic impact of as much as $11.1 trillion per year, according to one study. Because of its ubiquity, the benefits and economic impact of digitization are not restricted to certain geographic areas, and businesses and communities in every U.S. state feel the impact of digitization as new business models and jobs are created and existing ones disrupted. One study found that the more intensively a company uses the internet, the greater the productivity gain. The increase in internet usage is also associated with increased value and diversity of products being sold. The internet, and cloud services specifically, has been called the great equalizer, since it allows small companies access to the same information and the same computing power as large firms using a flexible, scalable, and on-demand model. For example, Thomas Publishing Co., a U.S. mid-sized, private, family-owned and -operated business, is transporting data from its own computer servers to data centers run by Amazon.com Inc. Digital platforms can minimize costs and enable small and medium-sized enterprises (SMEs) to grow through extended reach to customers or suppliers or integrating into a global value chain (GVC). More than 50% of businesses globally rely on data flows for cloud computing (see text box ). Digitization of customs and border control mechanisms also helps simplify and speed delivery of goods to customers. Regulators are looking to blockchain technology to improve efficiency in managing and sharing data for functions such as border control and customs processing of international shipments. With simpler border and customs processes, more firms are able to conduct business in global markets (or are more willing to do so). A study of U.S. SMEs on the e-commerce platform eBay found that 97% export, while that number is a full 100% in countries as diverse as Peru and Ukraine. Netflix, a U.S. firm offering online streaming services, increased its international revenue from $4 million in 2010 to more than $5 billion in 2017. A similar argument has been made for firms and governments in low- and middle-income countries who can take advantage of the power of the internet to foster economic development. According to one official of the Asia-Pacific Economic Cooperation Forum (APEC), technology has enabled SMEs to open in new sectors such as ride-sharing and online order delivery services, and provides them with a \"bigger, better opportunity to grow and learn that to join a global value chain.\" Another study of SMEs estimated that the internet is a net creator of jobs, with 2.6 jobs created for every job that may be displaced by internet technologies; companies that use the internet intensively effectively doubled the average number of jobs. However, the costs of digital trade can be concentrated on particular sectors (see next section). The U.S. digital economy supported 3.3% of total U.S. employment in 2017, and those jobs earned approximately one and a half times the average annual worker compensation of the overall U.S. economy, making them attractive source for future growth. Software, and the software industry, contributes to the GDP in all 50 states, with the value-added GDP of the software industry growing more than 40% in Idaho and North Carolina. Industries, such as media and firms in urban centers, account for a larger share of the benefits. Many in business and research communities are only beginning to understand how to take advantage of the vast amounts of data being collected every day. However, sources of \"e-friction\" or obstacles can prevent consumers, companies, and countries from realizing the full benefits of the online economy. Causes of e-friction can fall into four categories: infrastructure, industry, individual, and information. Government policy can influence e-friction, from investment in infrastructure and education to regulation and online content filtering. According to some experts, economies with lower amounts of e-friction may be associated with larger digital economies. While there are numerous positive digital dividends, there are also possible negative and uneven results across populations, such as the displacement of unskilled workers, an imbalance between companies with and without internet access, and the potential for some to use the internet to establish monopolies. While new technologies and new business models present opportunities to enhance efficiency and expand revenues, innovate faster, develop new markets, and achieve other benefits, new challenges also arise with the disruption of supply chains, labor markets, and some industries. For example, one study found a mismatch between workforce skills and job openings such as in Nashville, TN, which has an abundance of workers with music production and radio broadcasting skills but a scarcity of workers with IT infrastructure, systems management, and web programming skills. Another source notes over 11,000 open computing jobs in Michigan, with average salaries of over $80,000. The World Bank identified policy areas to try to ensure, and maintain, the potential benefits of digitization. Policy areas include establishing a favorable and competitive business climate, developing strong human capital, ensuring good governance, investing to improve both physical and digital infrastructure, and raising digital literacy skills. According to the World Economic Forum Global Competitiveness Index 4.0, the United States is ranked at the top with a score of 85.6% compared to the global median score of 60%. The study identifies the key drivers of productivity as human capital, innovation, resilience, and agility, noting that future productivity depends not only on investment in technology but investment in digital skills. While the United States is considered a \"super innovator,\" the report also notes \"indications of a weakening social fabric … and worsening security situation … as well as relatively low checks and balances, judicial independence, and transparency.\" With the rapid pace of technology innovation, more jobs may become automated, with digital skills becoming a foundation for economic growth for individual workers, companies, and national GDP. Over two-thirds of U.S. jobs created since 2010 require some level of digital skills. The OECD found that generic ICT skills are insufficient among a significant percentage of the global workforce and few countries have adopted comprehensive ICT skills strategies to help workers adapt to changing jobs. Policies that affect digitization in any one country's economy can have consequences beyond its borders, and because the internet is a global \"network of networks,\" the state of a country's digital economy can have global ramifications. Protectionist policies may erect barriers to digital trade, or damage trust in the underlying digital economy, and can result in the fracturing, or so-called balkanization, of the internet, lessening any gains. What some policymakers see as protectionist, however, others may view as necessary to protect domestic interests. For examples of the types of digital trade barriers that are in place around the globe, please see Appendix. Despite common core principles such as protecting citizen's privacy and expanding economic growth, governments face multiple challenges in designing policies around digital trade. The OECD points out three potentially conflicting policy goals in the internet economy: (1) enabling the internet; (2) boosting or preserving competition within and outside the internet; and (3) protecting privacy and consumers more generally. Ensuring a free and open internet is a stated policy priority for the U.S. government. Like other cross-cutting policy areas, such as cybersecurity or privacy, no one federal entity has policy primacy on all aspects of digital trade, and the United States has taken a sectoral approach to regulating digitization. According to an OECD study, the United States is the only OECD country that uses a decentralized, market-driven approach for a digital strategy rather than having an overarching national digital strategy, agenda, or program. The Department of Commerce works to promote U.S. digital trade policies domestically and abroad. In 2015, Commerce launched a Digital Economy Agenda that identifies four pillars: 1. \"Promoting a free and open Internet worldwide, because the Internet functions best for our businesses and workers when data and services can flow unimpeded across borders\"; 2. \"Promoting trust online, because security and privacy are essential if electronic commerce is to flourish\"; 3. \"Ensuring access for workers, families, and companies, because fast broadband networks are essential to economic success in the 21 st century\"; and 4. \"Promoting innovation, through smart intellectual property rules and by advancing the next generation of exciting new technologies.\" Commerce's digital attaché program under the foreign commercial service helps U.S. businesses navigate regulatory issues and overcome trade barriers to e-commerce exports in key markets. The Administration also works to promote U.S. digital priorities by identifying and challenging foreign trade barriers and through trade negotiations. As with traditional trade barriers, digital trade constraints can be classified as tariff or nontariff barriers. Tariff barriers may be imposed on imported goods used to create ICT infrastructure that make digital trade possible or on the products that allow users to connect, while nontariff barriers, such as discriminatory regulations or local content rules, can block or limit different aspects of digital trade. Often, such barriers are intended to protect domestic producers and suppliers. Some estimates indicate that removing foreign barriers to digital trade could increase annual U.S. real GDP by 0.1%-0.3% ($16.7 billion-$41.4 billion), increase U.S. wages up to 1.4%, and add up to 400,000 U.S. jobs in certain digitally intensive industries. Historically, trade policymakers focused on overt trade barriers such as tariffs on products entering countries from abroad. Tariffs at the border impact goods trade by raising the prices of products for producers or end customers, if tariff costs are passed down, thus limiting market access for U.S. exporters selling products, including ICT goods. Quotas may limit the number or value of foreign goods, persons, suppliers, or investments allowed in a market. Since 1998, WTO countries have agreed to not impose customs duties on electronic transmissions covering both goods (such as e-books and music downloads) and services. While the United States is a major exporter and importer of ICT goods, tariffs are not levied on many of the products due to free trade agreements (FTAs) and the World Trade Organization (WTO) Information Technology Agreement (see below). Tariffs may still serve as trade barriers for those countries or products not covered by existing FTAs or the WTO ITA. U.S. ICT services are often inputs to final demand products that may be exported by other countries, such as China. U.S. ICT services have shown increasing growth rates since the middle of 2014. Nontariff barriers (NTBs) are not as easily quantifiable as tariffs. Like digital trade, NTBs have evolved and may pose significant hurdles to companies seeking to do business abroad. NTBs often come in the form of laws or regulations that intentionally or unintentionally discriminate and/or hamper the free flow of digital trade. Nondiscrimination between local and foreign suppliers is a core principle encompassed in global trading rules and U.S. free trade agreements. While WTO agreements cover physical goods, services, and intellectual property, there is no explicit provision for nondiscrimination for digital goods. As such, NTBs that do not treat digital goods the same as physical ones could limit a provider's ability to enter a market. Broader governance issues, including rule of law, transparency, and investor protections, can pose barriers and limit the ability of firms and individuals to successfully engage in digital trade. Similarly, market access restrictions on investment and foreign ownership, or on the movement of people, whether or not specific to digital trade or ICT sectors, may limit a company's ability enter a foreign market. Other NTBs are more specific to digital trade. Localization measures are defined as measures that compel companies to conduct certain digital-trade-related activities within a country's borders. Governments often use privacy protection or national security arguments as justifications for these measures. Though localization policies can be used to achieve legitimate public policy objectives, some are designed to protect, favor, or stimulate domestic industries, service providers, or intellectual property at the expense of foreign counterparts and, in doing so, function as nontariff barriers to market access. In recent free trade agreements, the United States has aimed to ensure an open internet and eliminate digital trade barriers, while preserving flexibility for governments to pursue legitimate policy objectives (see below). According to a 2017 USITC report, data localization was the most cited policy measure impeding digital trade, and the number of data localization measures globally has doubled in the last six years. One study found that over 120 countries have laws related to personal data protection, often requiring data localization. Regulations limiting cross-border data flows and requiring local storage are a type of localization requirement that prohibit companies from exporting data outside a country. Such restrictions can pose barriers to companies whose transactions rely on the internet to serve customers abroad and operate more efficiently. For example, data localization requirements can limit e-commerce transactions that depend on foreign financial service providers or multinational firms' full analysis of big data from across an entire company or global value chain. Regulations limiting cross-border data flows may force companies to build local server infrastructure within a country, not only increasing costs and decreasing scale, but also creating data silos that may be more vulnerable to cybersecurity risks. According to some analysts, computing costs in markets with localization measures can be 30%-60% higher than in more open markets. Data localization requirements pose barriers to companies' efforts to operate more efficiently by migrating to the cloud or to SMEs attempting to enter new markets. According to some estimates, cloud computing accounted for 70% of related IT market growth between 2012 and 2015, and is expected to represent 60% of growth through 2020. Most of the largest global providers of cloud computing services are U.S. companies (Amazon, Microsoft, Google, and IBM). Regulations or policies that limit data flows create barriers to firms and countries seeking to consume cloud services. One U.S. business group noted increased forced localization measures, citing examples in China, Colombia, the European Union (EU), Indonesia, South Korea, Russia, and Vietnam. The Business Software Alliance's 2018 Global Cloud Computing Scorecard highlighted barriers to cloud services in Indonesia, Russia, and Vietnam. For example, to comply with localization requirements and continue to serve consumers of Google's many cloud services (e.g., Gmail, search, maps) globally, the company is opening more data centers in the United States and internationally. Finding a global consensus on how to balance open data flows, cybersecurity, and privacy protection may be key to maintaining trust in the digital environment and advancing international trade. Countries are debating how to achieve the right balance and potential paths forward in plurilateral and multilateral forums and trade negotiations (see \" U.S. Bilateral and Plurilateral Agreements \"). In addition to cross-border data flow restrictions, localization policies include requirements to use local content, whether hardware or software, as a condition for manufacturing or access to government procurement contracts; use local infrastructure or computing facilities; or partner with a local company and transfer technology or intellectual property to that partner. Localization requirements can also pose a threat to intellectual property (discussed below). In April 2018, the Commerce Department announced plans to develop a \"comprehensive strategy to address trade-related forced localization policies, practices, and measures impacting the U.S. information and communications technology (ICT) hardware manufacturing industry.\" In creating a strategic response to the increase in protectionist localization policies globally, Commerce aims to preserve the competitiveness of the U.S. ICT sector. While the internet and digital technologies have opened up markets for international trade, they also present ongoing and unique challenges for the protection and enforcement of intellectual property (IP), which are creations of the mind—such as an invention, literary/artistic work, design, symbol, name, or image—embodied in a physical or digital object. Intellectual property rights (IPR) are legal, private, enforceable, time-limited rights that governments grant to inventors and artists to exclude others from using their creations without their permission. Examples of IPR include patents, copyrights, trademarks, and trade secrets. Innovations in digital technologies fuel IPR infringement by enabling the rapid duplication and distribution of content that is low-cost and high-quality, making it easy, for instance, to pirate music, movies, software, and other copyrighted works, and to share them globally. The internet provides \"ease of conducting commerce through unverified vendors, inability for consumers to inspect goods prior to purchase, and deceptive marketing.\" Both copyright- and trademark-based industries face challenges tackling not only infringement in physical marketplaces, but increasingly also online marketplaces. Cyber-enabled theft of trade secrets is of growing concern. Trade secrets are essential to many businesses' operations and important assets, including those in ICT, services, biopharmaceuticals, manufacturing, and environmental and other technologies. IPR infringement in the digital environment is particularly difficult to quantify but considered to be significant, potentially exceeding the volume of sales through traditional physical markets. A 2016 industry study estimated the value of digitally pirated music, movies, and software (not actual losses) to be $213 billion in 2013 and growing to as much as $384-$856 billion in 2022. The IP Commission estimated that the annual cost to the U.S. economy from counterfeit goods, pirated software, and theft of trade secrets continues to surpass $225 billion and could reach $600 billion. Efforts to address IPR infringement raise issues of balance about, on one hand, protecting and enforcing IPR to protect the rights of content holders and incentivize innovation in the digital environment and, on the other hand, setting appropriate limitations and exceptions to ensure other economically and socially valuable uses. Content industries say that IP theft costs them sales, detracts from legitimate services, harms investors in these businesses, damages their brand or reputation, and hurts \"law-abiding\" consumers. Some technology product and service companies, as well as some civil society groups, assert that overly stringent IPR policies may stifle information flows and legitimate digital trade and these groups support \"fair use\" exceptions and limitations to IPR. Other IPR-related barriers to digital trade include government measures, policies, and practices that are intended to promote domestic \"indigenous innovation\" (i.e., develop, commercialize, and purchase domestic products and technologies) but that can also disadvantage foreign companies. These measures can be linked to \"forced\" localization barriers to trade. China, for instance, conditions market access, government procurement, and the receipt of certain preferences or benefits on a firm's ability to show that certain IPR is developed in China or is owned by or licensed to a Chinese party. Another example is India's data and server localization requirements, which USITC firms assert hurt market access and innovation in their sector. (See above.) Local or national standards that deviate significantly from recognized international standards may make it difficult for firms to enter a particular market. An ICT product or software that conforms to international standards, for example, may not be able to connect to a local network or device based on a local or proprietary standard. Also, proprietary standards can limit a firm's ability to serve a market if their company practices or assets do not conform with (nor do their personnel have training in) those standards. As a result, U.S. companies may not be able to reach customers or partners in those countries. Similarly, redundant or burdensome conformity assessment or local registration and testing requirements often add time and expense for a company trying to enter a new market, and serve as a deterrent to foreign companies. For example, India's Compulsory Registration Order (CRO) mandates that manufacturers register their products with laboratories affiliated with or certified by the Bureau of Indian Standards, even if the products have already been certified by accredited international laboratories, and is an often-cited concern for U.S. businesses facing delays getting products to market. If a company is required to provide the source code, proprietary algorithms, or other IP to gain market access, it may fear theft of its IP and not enter that market (see above). In some nations, government seeks strict control over digital data within its borders, such as what information people can access online, and how information is shared inside and outside its borders. Governments that filter or block websites, or otherwise impede access, form another type of nontariff barrier. For example, China has asserted a desire for \"digital sovereignty\" and has erected what is termed by some as the \"Great Firewall.\" A change to China's internet filters also blocks virtual private network (or VPN) access to sites beyond the Great Firewall. VPNs have been used by Chinese citizens to use websites like Facebook and by companies to access data outside of China (e.g., information from foreign subsidiaries or partners). While China is the most well-known, it is not alone in seeking to control access to websites. For example, Thailand established a Computer Data Filtering Committee to use the court system to block websites that it views as violating public order and good order, as well as intellectual property. In Russia, citizens protested government censorship, including the blocking of a popular messaging application along with other websites and online tools. Several U.S. and foreign policymakers have expressed concern about the influence that violent or harmful content online may have upon those who view or read it. In response, some countries have introduced legislation to regulate internet content, for example, to fight the impact and spread of violent material and false information. In the United States, significant First Amendment freedom of speech issues are raised by the prospect of government restrictions on the publication and distribution of speech, even speech that advocates terrorism. As a result, what users can access online may vary across countries, depending on national policy and preferences. These differences illustrate the complexity of the internet and evolving technologies, and the lack of global standards that prevails in other areas of international trade. National-level net neutrality policies also differ widely. Net neutrality rules govern the management of internet traffic as it passes over broadband internet access services, whether those services are fixed or wireless. Allowing internet access providers to limit or otherwise discriminate against content providers, foreign and domestic, may create a nontariff barrier. In the United States, the Federal Communications Commission (FCC) classification of broadband internet service providers (ISPs) has been controversial domestically and may differ from how U.S. trading partners regulate ISPs. The growth in digital trade has raised issues related to cybersecurity, the act of protecting ICT systems and their contents from cyberattacks. Cyberattacks in general are deliberate attempts by unauthorized persons to access ICT systems, usually with the goal of theft, disruption, damage, or other unlawful actions. Cybersecurity can also be an important tool in protecting privacy and preventing unauthorized surveillance or intelligence gathering. Although there is overlap between data protection and privacy, the two are not equivalent. Cybersecurity measures are essential to protect data (e.g., against intrusions or theft by hackers). However, they may not be sufficient to protect privacy. Cyberattacks can pose broad risks to financial and communication systems, national security, privacy, and digital trade and commerce. According to the White House Council of Economic Advisers, malicious cyberactivity (i.e., business disruption, theft of proprietary information) cost the U.S. economy up to $109 billion in 2016. Cybersecurity risks run across all industry sectors that rely on digital information. In the entertainment industry, for example, Iranian hackers stole unreleased episodes of HBO's \"Game of Thrones\" series, holding them for ransom, and potentially costing the company and risking intellectual property and harm to the corporate reputation. The Federal Bureau of Investigations (FBI) suspects Chinese hackers were behind a cyberattack on the Marriot's Starwood hotel chain that resulted in potentially stealing IPR and the personal information of up to 327 million hotel customers, including their birthdates and passport numbers. An FBI official testified to the Senate Judiciary Committee that Chinese espionage efforts have become \"the most severe counterintelligence threat facing our country today.\" Cybersecurity threats can disrupt business operations or supply chains. The 2017 WannaCry ransomware attack impacted public and private sector entities in over 150 countries with direct costs of at least $8 billion due to computer downtime, according to one estimate. In the widespread attack, computers in homes, schools, hospitals, government agencies, and companies were hit. The United States publicly attributed the cyberattack to North Korea, stating that \"these disruptions put lives at risk.\" Compromises of ITC supply chains can also pose a threat to organizations that rely on the tampered hardware as was alleged, for example, with some Supermicro microchips used in ITC manufacturing in China. Companies that rely on cloud services to store or transmit data may choose to use enhanced encryption to protect the communication and privacy, both internally and of their end customers. This, in turn, may impede law enforcement investigations if they are unable to access the encrypted data. However, restrictions on the ability for a firm to use encryption may make a company vulnerable to cyberattacks or cybertheft, demonstrating the need for policies and regulations to balance competing objectives. The European Union (EU) and China are large U.S. digital trade partners and each has presented various challenges for U.S. companies, consumers, and policymakers. Differences in U.S. and EU policies have ramifications on digital flows and international trade. The two partners' varying approaches to digital trade, privacy, and national security, have, at times, threatened to disrupt U.S.-EU data flows. The transatlantic economy is the largest in the world, and cross-border data flows between the United States and EU are the highest in the world. In between 2003 and 2017, total U.S.-EU trade in goods and services (exports plus imports) nearly doubled from $594 billion to $1.2 trillion. ICT and potentially ICT-enabled services accounted for approximately $190 billion of U.S. exports to the EU in 2017. The two sides also account for a significant portion of each other's e-commerce trade (see Figure 4 ). The United States and EU account for almost half of each other's digitally deliverable service exports (e.g., business, professional, and technical services) and many of these services are incorporated into exported goods as part of GVCs (see Figure 5 and Figure 6 ). The UK alone accounted for 23% of U.S. digitally deliverable services exports. Almost 40% of the data flows between the United States and EU are through business and research networks. Despite close economic ties, differences between the United States and EU in their approaches to data flows and digital trade have caused friction in U.S.-EU economic and security relations. To address some of these differences, in 2013, the United States and the EU began, but did not conclude, negotiating a broad FTA. Negotiations included a number of digital trade issues such as market access for digital products, IPR protection and enforcement, cybersecurity, and regulatory cooperation, among other things. On October 16, 2018, the Trump Administration notified Congress under Trade Promotion Authority (TPA) of its intent to enter into negotiations with the EU. The Administration's specific negotiating objectives envision a wide-ranging agreement, including addressing digital trade, along with trade in goods, services, agriculture, government procurement, and other rules, such as on IPR and investment. However, no agreement exists on the scope of the negotiations. The EU negotiating mandates, in contrast, are narrower; they authorize EU negotiations with the United States to address industrial tariffs (excluding agricultural products) and nontariff regulatory barriers to make it easier for companies to prove that their products meet U.S. and EU technical requirements. The Administration also notified Congress under TPA of its intent to negotiate a trade agreement with the UK post-Brexit, and the corresponding specific negotiating objectives likewise envision a broad agreement addressing digital trade issues. The UK cannot formally negotiate or conclude a new agreement until it exits the EU, which has exclusive competence over trade policy and negotiates trade deals on behalf of all EU member states. Details about the future UK-EU trade relationship remain largely unknown, and it is uncertain when and to what extent the UK will regain control of its national trade policy—a major objective for Brexit supporters. These factors directly shape prospects for a proposed bilateral U.S.-UK free trade agreement. The United States and EU have different legal approaches to information privacy that extends into the digital world. After extensive negotiations, the EU-U.S. Privacy Shield entered into force on July 12, 2016, creating a framework to provide U.S. and EU companies a mechanism to comply with data protection requirements when transferring personal data between the EU and the United States. Under the Privacy Shield program, U.S. companies can voluntarily self-certify compliance with requirements such as robust data processing obligations. The agreement includes obligations on the U.S. government to proactively monitor and enforce compliance by U.S. firms, establish an ombudsman in the U.S. State Department, and set specific safeguards and limitations on surveillance. The United States and Switzerland also agreed to the Swiss-U.S. Privacy Shield, which will be \"comparable\" to the EU-U.S. agreement. The Privacy Shield also involves an annual joint review by the United States and the EU, the second of which was completed in October 2018. Under the review, the commission found that the Privacy Shield is working and that the United States had made improvements and changes since the first review. The Commission, however, also noted areas of concern and specific recommendations. The EU's General Data Protection Regulation (GDPR), effective May 2018, established rules for EU member states to safeguard individuals' personal data. The GDPR is a comprehensive privacy regime that builds on previous EU data protection rules. It grants new rights to individuals to control personal data and creates specific new data protection requirements. The GDPR applies to (1) all businesses and organizations with an EU establishment that process (perform operations on) personal data of individuals (or \"data subjects\") in the EU, regardless of where the actual processing of the data takes place; and (2) entities outside the EU that offer goods or services (for payment or for free) to individuals in the EU or monitor the behavior of individuals in the EU. These measures have raised concerns about the GDPR's extraterritorial implications. While the GDPR is directly applicable at the EU member state level, individual countries are responsible for establishing some national-level rules and policies as well as enforcement authorities, and some are still in the process of doing so. As a result, some U.S. stakeholders have voiced concern about a lack of clarity and inadequate country compliance guidelines, as well as about the potential high cost of data storage and processing needed for compliance. Despite the lack of precise guidance, many companies have taken steps to implement its requirements. For example, Amazon touts its compliance with GDPR requirements and aims to assist its Amazon Web Services (AWS) corporate customers, many of whom are small and medium businesses, with their own compliance. It can be more challenging for SMEs to fully understand GDPR and comply with its notification and other requirements such as an individual's \"right to be forgotten\" and on data portability; there are indications that some U.S. businesses have chosen to exit the EU market. Some experts contend that the GDPR may effectively set new global data privacy standards, since many companies and organizations are striving for GDPR compliance to avoid being shut out of the EU market, fined, or otherwise penalized. In addition, some countries outside of Europe are imitating all or parts of the GDPR in their own privacy regulatory and legislative efforts. European Data Protection Authorities may have reinforced U.S. companies' concerns by initiating several enforcement actions in the fall of 2018, including a €50 million (approximately $57 million) fine on Google. Like the GDPR, EU policymakers are attempting to bring more harmonization across the region through the Digital Single Market (DSM). The DSM is an ongoing effort to unify the EU market, facilitate trade, and drive economic growth. The DSM's three pillars revolve around better online access to cross-border digital goods and services; a regulatory environment supporting investment and fair competition; and driving growth through investment in infrastructure, human capital, research, and innovation. Among its initiatives is a mandate to allow cross-border flows for nonpersonal data within the EU (with limited exceptions), but not necessarily externally. China presents a number of significant opportunities and challenges for the United States in digital trade. The modernization of the Chinese economy, coupled with a large and increasingly prosperous population, has led to a surge in the number of Chinese Internet users and made China a major source of global ecommerce. China's internet users grew from 21.5 million in 2000 to 829 million as of March 2019, and this trend will likely continue, given China's relatively low internet penetration rate (see Figure 7 .) China's online retail sales in 2018 totaled $1.1 trillion (more than double the U.S. level at $505 billion) and were the world's largest. E-Marketer predicts that China's e-commerce retail sales will reach $1.99 trillion in 2019, accounting for 35.3% of total sales and 55.8% of global online sales. U.S. firms may benefit from expanding digital trade in China, but they may also face numerous challenges in the Chinese market. The USTR's 2019 report on foreign trade barriers included a digital trade fact sheet that cited countries and practices of \"key concern.\" Three Chinese digital policies were listed, including its restrictions on cross-border data flows and data localization requirements; extensive web filtering and blocking of legitimate sites, including blocks 10 of the top 30 global sites and up to 10,000 sites in total, affecting billions of dollars in potential U.S. business; and cloud computing restrictions and requirements to partner with a Chinese firm to enter the market and to transfer technology and IP to the partner. The American Chamber of Commerce in China (AmCham China) 2019 business survey found that 73% of respondents who were engaged in technology and R&D-intensive industries stated that they faced significant or somewhat significant market barriers in China. The lack of sufficient IPR protection (cited by 35% of respondents) and restrictive cybersecurity-related policies (cited by 27% of respondents) ranked among the top three factors prohibiting firms from increasing innovation activities in China. The survey reflected significant concerns by member firms over eight Chinese ICT policies and restrictions (such as internet restrictions and censorship, IPR theft, and data localization requirements), with 72% to 88% of respondents stating that such measures impacted their competiveness and operations in China either somewhat or severely (see Table 1 ). A Digital Trade Restrictiveness Index (DTRI) of 65 economies created by the European Centre for International Political Economy found China to have the most restrictive digital policies, followed by Russia, India, Indonesia, and Vietnam. The index report noted: China applies the most restrictive digital trade measures in many areas, including public procurement, foreign investment, Intellectual Property Rights (IPRs), competition policy, intermediary liability, content access and standards. The restrictions do not only impose higher costs for trading digital goods and services, they can also block digital trade altogether in certain sectors. In addition, China's data policies are extremely burdensome for companies, and the country also applies some quantitative trade restrictions and restrictions on e-commerce. The Chinese government has sought to advance its views on how the internet should be expanded to promote trade, but also to set guidelines and standards over the rights of governments to regulate and control the internet, a concept it has termed \"Internet Sovereignty.\" The Chinese government appears to have first advanced a policy of \"Internet Sovereignty\" around June 2010 when it issued a White Paper titled \"the Internet of China,\" which stated the following: Within Chinese territory the Internet is under the jurisdiction of Chinese sovereignty. The Internet sovereignty of China should be respected and protected. Citizens of the People's Republic of China and foreign citizens, legal persons and other organizations within Chinese territory have the right and freedom to use the Internet; at the same time, they must obey the laws and regulations of China and conscientiously protect Internet security. In 2014, the Chinese government established the Central Internet Security and \"Informatization\" Leading Group, headed by Chinese president Xi Jinping, to \"strengthen China's Internet security and build a strong cyberpower.\" A year later, President Xi addressed an internet conference, stating \"we should respect the right of individual countries to independently choose their own path of cyber development, model of cyber regulation and Internet public policies, and participate in international cyberspace governance on an equal footing.\" Some analysts contend that China's internet sovereignty initiative represents an assertion that the government has the right to fully control the internet within China. Some see this as an attempt by the government to control information that is deemed a threat to social stability, in violation of the right to freedom of speech, which is guaranteed in China's Constitution. Other critics of China's internet sovereignty policy view it as an attempt by the government to limit market access by foreign internet, digital, and high technology firms in China, in order to boost Chinese firms and reduce China's dependence on foreign technology. China is considered by most analysts to be the largest source of global theft of IP and a major source of cybertheft of U.S. trade secrets, including by government entities. To illustrate, a 2011 report by the U.S. Office of the Director of National Intelligence (DNI) stated: \"Chinese actors are the world's most active and persistent perpetrators of economic espionage. U.S. private sector firms and cybersecurity specialists have reported an onslaught of computer network intrusions that have originated in China, but the IC (Intelligence Community) cannot confirm who was responsible.\" The report goes on to warn that China will continue to be driven by its longstanding policy of \"catching up fast and surpassing\" Western powers. The growing interrelationships between Chinese and U.S. companies—such as the employment of Chinese-national technical experts at U.S. facilities and the off-shoring of U.S. production and R&D to facilities in China—will offer Chinese government agencies and businesses increasing opportunities to collect sensitive US economic information. In May 2014, the U.S. Department of Justice issued a 31-count indictment against five members of the People's Liberation Army for cyber-espionage and other offenses that allegedly targeted five U.S. firms and a labor union for commercial advantage, the first time the Federal government had initiated such action against state actors. In April 2015, President Obama issued Executive Order 13964 authorizing certain sanctions against \"persons engaging in significant malicious cyber-enabled activates.\" This led to China send ing a high-level delegation to Washington, DC , a nd, o n September 25, 2015, Presidents Obama and Xi announced that they had reached an agreement on cyber-security and trade secrets that stated that neither country's government \" will conduct or knowingly support cyber-enabled theft of IP, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors. \" Specifically, the two s ides agreed to Not conduct or knowingly support cyber-enabled theft of IP, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors; Establish a high-level joint dialogue mechanism on fighting cybercrime and related issues; Work together to identify and promote appropriate norms of state behavior in cyberspace internationally; and Provide timely responses to requests for information and assistance concerning malicious cyber activities. The two sides also agreed to set up a high-level dialogue mechanism (which would take place twice a year) to address cybercrime and improve two-way communication when cyber-related concerns arise (including the creation of a hotline). The first meeting of the U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues was held in December 2015. China and the United States reached agreement on a document establishing guidelines for requesting assistance on cybercrime or other malicious cyber activities and for responding to such requests. Two more meetings were held in 2016. The dialogue was continued in October 2017 under the Trump Administration. The Administration's Section 301 trade dispute between the United States and China may have led to a suspension of the dialogue (see below). It is difficult to assess the effectiveness of the September 2015 U.S.-China cyber agreement in reducing the level of Chinese cyber intrusions against U.S. entities seeking to steal trade secrets as no official U.S. statistics on such activities are publicly available. In August 2018, the U.S. Deputy Director of the Cyber Threat Intelligence Integration Center stated that \"the intelligence community and private-sector security experts continue to identify ongoing cyber activity from China, although at volumes significantly lower than before the bilateral U.S.-China cyber commitments of September 2015.\" In October 2018, CrowdStrike, a U.S. cybersecurity technology company, identified China as \"the most prolific nation-state threat actor during the first half of 2018.\" It found that Chinese entities had made targeted intrusion attempts against multiple sectors of the economy. In December 2018, U.S. Assistant Attorney General John C. Demers stated at a Senate hearing that from 2011-2018, China was linked to more than 90% of the Justice Department's cases involving economic espionage and two-thirds of its trade secrets cases. According to the USTR's 2017 report on China's WTO accession, China has not fulfilled all of its WTO market opening commitments. The USTR cited \"significant declines in commercial sales of foreign ICT products and services in China,\" as evidence that China continued to maintain \"mercantilist policies under the guise of cybersecurity.\" The Chinese government pledged not to use recently enacted cyber and national security laws and regulations to unfairly burden foreign ICT firms, or to discriminate against foreign ICT firms in the implementation of various policy initiatives to promote indigenous innovation in China. Some Chinese laws or proposals include language stating that critical information infrastructure should be \"secure and controllable,\" an ambiguous term that has not been precisely defined by Chinese authorities. Other proposals of concern to U.S. firms appear to lay out policies that would require foreign ICT firms to hand over proprietary information. Examples of measures of concern to foreign ICT firms include Cybers ecurity Law , passed by the government on November 7, 2016 (effective June 1, 2017), ascertains the principles of cyberspace sovereignty; defines the security-related obligations of network product and service providers; further enhances the rules for protection of personal information; establishes a framework of security protection for \"critical information infrastructure\"; and establishes regulations pertaining to cross-border transmissions of important data by critical information infrastructure. Some analysts have expressed concerns that one of the main goals of the new law is to promote the development of indigenous technologies and impose restrictions on foreign firms, and many multinational companies continue to voice concerns about the lack of clarity of the law's requirements, how the law will be interpreted and implemented through subsequent regulations, and to what extent it will impact their operations in China. National Security Law , enacted in July 2015, emphasizes the state's role in driving innovation and reviewing \"foreign commercial investment, special items and technologies, internet information technology products and services, projects involving national security matters, as well as other major matters and activities, that impact or might impact national security.\" Such restrictions could have a significant impact on U.S. ICT firms. According to BEA, U.S. exports of ICT services and potentially ICT-enabled services (i.e., services that are delivered remotely over ICT networks) to China totaled $18.7 billion in 2017. Concerns over China's policies on IP, technology, and innovation policies led the Trump Administration, in August 2017, to launch a Section 301 investigation of those policies. On March 22, 2018, President Trump signed a Memorandum on Actions by the United States Related to the Section 301 Investigation that identified four broad IPR-related policies that justified U.S. action under Section 301, stating that China 1. Uses joint venture requirements, foreign investment restrictions, and administrative review and licensing processes to force or pressure technology tra nsfers from American companies; 2. Uses discriminatory licensing processes to transfer technologies from U.S. companies to Chinese companies; 3. D irects and facilitates investments and acquisitions which generate large-scale technology transfer; and 4. Conducts and supports cyber intrusions into U.S. computer networks to gain access to valuable business information. The USTR estimates such policies cost the U.S. economy at least $50 billion annually. Under the Section 301 action, the Administration proposed to (1) implement 25% ad valorem tariffs on certain Chinese imports (which in sum are comparable to U.S. trade losses); (2) initiate a WTO dispute settlement case against China's \"discriminatory\" technology licensing (which it did on March 23, 2018); and (3) propose new investment restrictions on Chinese efforts to acquire sensitive U.S. technology. The Administration did not act on the last issue after Congress passed the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA) ( P.L. 115-232 ) in August 2018 to modernize the existing U.S. review process of foreign investments in terms of national security. Among its changes, FIRRMA expanded the types of investment subject to review, including certain noncontrolling investments in \"critical technology.\" The Trump Administration subsequently imposed tariff hikes on $250 billion worth of imports from China in three separate stages in 2018, while China increased tariffs on $110 billion worth of imports from the United States (See Figure 8 ). In May 2019, the United States increased the tariff levels on the third tranche of products imported from China. China subsequently increased its tariff levels on its third tranche. As the above analysis of EU and China policies demonstrates, there is not a single set of international rules or disciplines that govern key digital trade issues, and the topic is treated inconsistently, if at all, in trade agreements. As digital trade has emerged as an important component of trade flows, it has risen in significance on the U.S. trade policy agenda and that of other countries. Given the stalemate in comprehensive WTO multilateral negotiations, trade agreements have not kept pace with the complexities of the digital economy and digital trade is treated unevenly in existing WTO agreements. More recent bilateral and plurilateral deals have started to address digital trade policies and barriers more comprehensively. The use of digital trade provisions in bilateral and plurilateral trade negotiations may help spur interest in the creation of future WTO frameworks that focus on digital trade and provide input for ongoing plurilateral negotiations occurring in the aegis of the WTO (see below). While no comprehensive agreement on digital trade exists in the WTO, other WTO agreements cover some aspects of digital trade and new plurilateral negotiations may set new rules and disciplines. The WTO General Agreement on Trade in Services (GATS) entered into force in January 1995, predating the current reach of the internet and the explosive growth of global data flows. GATS includes obligations on nondiscrimination and transparency that cover all service sectors. The market access obligations under GATS, however, are on a \"positive list\" basis in which each party must specifically opt in for a given service sector to be covered. As GATS does not distinguish between means of delivery, trade in services via electronic means is covered under GATS. While GATS contains explicit commitments for telecommunications and financial services that underlie e-commerce, digital trade and information flows and other trade barriers are not specifically included. Given the positive list approach of GATS, coverage across members varies and many newer digital products and services did not exist when the agreements were negotiated. To address advances in technology and services, the Committee on Specific Commitments is examining how certain new online services, such as platform services, or specific regulations, such as data localization, could be classified and scheduled within GATS. In May 1998, WTO members established the \"comprehensive\" Work Programme on Electronic Commerce and established a temporary customs duties moratorium on electronic transmission that has been extended multiple times. While multiple members submitted proposals to advance multilateral digital trade negotiations under the Work Programme, no clear path forward was identified. The WTO Information Technology Agreement (ITA) aims to eliminate tariffs on the goods that power and utilize the internet, lowering the costs for companies to access technology at all points along the value chain. Originally concluded in 1996, the ITA was expanded to further cut tariffs beginning in July 2016. The expanded ITA is a plurilateral agreement among 54 developed and developing WTO members who account for over 90% of global trade in these goods. Some WTO members, such as Vietnam and India, are party to the original ITA, but did not join the expanded agreement. Like the original ITA, the benefits of the expanded agreement will be extended on a most-favored nation (MFN) basis to all WTO members. Under the expanded ITA, the parties agreed to review the agreement's scope in the future to determine if additional product coverage is warranted as technology evolves. While the WTO ITA has expanded trade in the technology products that underlie digital trade, it does not tackle the nontariff barriers that can pose significant limitations. The TRIPS Agreement, in effect since January 1, 1995, provides minimum standards of IPR protection and enforcement. The TRIPS Agreement does not specifically cover IPR protection and enforcement in the digital environment, but arguably has application to the digital environment and sets a foundation for IPR provisions in subsequent U.S. trade negotiations and agreements, many of which are \"TRIPS-plus.\" The TRIPS Agreement covers copyrights and related rights (i.e., for performers, producers of sound recordings, and broadcasting organizations), trademarks, patents, trade secrets (as part of the category of \"undisclosed information\"), and other forms of IP. It builds on international IPR treaties, dating to the 1800s, administered by the World Intellectual Property Organization, or WIPO (see below). TRIPS incorporates the main substantive provisions of WIPO conventions by reference, making them obligations under TRIPS. WTO members were required to fully implement TRIPS by 1996, with exceptions for developing country members by 2000 and least-developed-country (LDC) members until July 1, 2021, for full implementation. TRIPS aims to balance rights and obligations between protecting private rights holders' interests and securing broader public benefits. Among its provisions, the TRIPS section on copyright and related rights includes specific provisions on computer programs and compilations of data. It requires protections for computer programs—whether in source or object code—as literary works under the WIPO Berne Convention for the Protection of Literary and Artistic Works (Berne Convention). TRIPS also clarifies that databases and other compilations of data or other material, whether in machine readable form or not, are eligible for copyright protection even when the databases include data not under copyright protection. Like the GATS, TRIPS predates the era of ubiquitous internet access and commercially significant e-commerce. TRIPS includes a provision for WTO members to \"undertake reviews in the light of any relevant new developments which might warrant modification or amendment\" of the agreement. The TRIPS Council has engaged in discussions on the agreement's relationship to electronic commerce as part of the WTO Work Programme on Electronic Commerce, focusing on protection and enforcement of copyright and related rights, trademarks, and new technologies and access to these technologies; new activity by the TRIPS Council to this end appears to be limited in recent years. The World Intellectual Property Organization (WIPO) has been a primary forum to address IP issues brought on by the digital environment since the TRIPS Agreement. The WIPO Copyright Treaty and WIPO Performances and Phonograms Treaty—often referred to jointly as the WIPO \"Internet Treaties\"—established international norms regarding IPR protection in the digital environment. These treaties were agreed to in 1996 and entered into force in 2002, but are not enforceable, including under WTO dispute settlement. Shaped by TRIPS, the WIPO Internet Treaties are intended to clarify that existing rights continue to apply in the digital environment, to create new online rights, and to maintain a fair balance between the owners of rights and the general public. Key features of the WIPO Internet Treaties include provisions for legal protection and remedies against circumventing TPMs, such as encryption, and against the removal or alteration of rights management information (RMI), which is data identifying works or their authors necessary for them to manage their rights (e.g., for licenses and royalties). The liability of online service providers and other communication entities that provide access to the internet was contested in the negotiations on the WIPO Internet Treaties. In the end, WIPO Internet Treaties leave it to the discretion of national governments to develop the legal parameters for ISP liability. As of March 2019, the WIPO Internet Treaties had 96 contracting parties. The United States implemented the WIPO Internet Treaties through the Digital Millennium Copyright Act of 1998 (DMCA) ( H.R. 2281 ), which set new standards for protecting copyrights in the digital environment, including prohibiting the circumvention of antipiracy measures incorporated into copyrighted works and enforcing such violations through civil, administrative, and criminal remedies. The DMCA also, among other things, limits remedies available against ISPs that unknowingly transmit copyright infringing information over their networks by creating certain \"safe harbors.\" India was one of the latest countries to join the treaties, entering them into force on December 25, 2018. The United States continues to call on trading partners, such as Turkey and Mexico, to fully implement the WIPO Internet Treaties. On the sidelines of the WTO Ministerial Conference, in December 2017, the United States, as part of a group of over 70 WTO members, agreed to \"initiate exploratory work together toward future WTO negotiations on trade related aspects of electronic commerce.\" The U.S. objectives include market access, data flows, nondiscriminatory treatment of digital products, protection of intellectual property and digital security measures, and intermediary liability, among others. The group formally launched the e-commerce initiative in January 2019. The official joint statement lists includes advanced economies such as the United States, the EU, and Australia, and also several developing countries such as China and Brazil. India stated it will not join, preferring to maintain its flexibility to favor domestic firms, limit foreign market access, and raise revenue in the future through potential customs duties. After the meeting, the U.S. Trade Representative's (USTR) statement emphasized the need for a high-standard agreement that includes enforceable obligations. The EU noted e-signatures, customs duties, forced disclosure of source code, and data localization measures among the potential new rules to be discussed. Some analysts raise concerns that the EU may seek more limited commitments on issues such as cross-border data flows. China has proposed the negotiations be limited to exploratory discussions rather than establishing obligations on topics such as data flows and data storage. The negotiating parties continue to discuss the scope of any potential agreement, but the outlook may be challenging given the different approaches and policies especially among the U.S., EU, and China. As traditional trade policy does not clearly reflect the pervasiveness of the digital economy, and data is increasingly incorporated into international trade, the line between goods and services, and the application of the existing multilateral trade agreement system, is not always clear. As discussed above, the WTO agreements provide limited treatment of some aspects of digital trade. The United States has sought to establish new rules and disciplines on digital trade in its bilateral and plurilateral trade negotiations. The United States has included an e-commerce chapter in its FTAs since it signed an agreement with Singapore in 2003 that has progressively evolved. The e-commerce chapter of U.S. FTAs usually begins by recognizing e-commerce as an economic driver and the importance of removing trade barriers to e-commerce. Most chapters contain provisions on nondiscrimination of digital products, prohibition of customs duties, transparency, and cooperation topics such as SMEs, cross-border information flows, and promoting dialogues to develop e-commerce. Some of the FTAs also include cooperation on consumer protection, as well as providing for electronic authentication and paperless trading. All FTAs allow certain exceptions to ensure that each party is able to achieve legitimate public policy objectives, protecting regulatory flexibility. The U.S.-South Korea FTA (KORUS) contains the most robust digital trade provisions in a U.S. FTA currently in force. In addition to the provisions in prior FTAs, KORUS includes provisions on access and use of the internet to ensure consumer choice and market competition. Most significantly, KORUS was the first attempt in a U.S. FTA to explicitly address cross-border information flows. The e-commerce chapter contains an article that recognizes its importance and discourages the use of barriers to cross-border data but does not explicitly mention localization requirements. The financial services chapter of KORUS also contains a specific, enforceable commitment to allow cross-border data flows \"for data processing where such processing is required in the institution's ordinary course of business.\" In 2018, the Trump Administration and South Korea agreed to limited modifications of the agreement, but no changes were made to provisions directly impacting digital trade. The released text of the proposed USMCA with Canada and Mexico aims to revise and update the trilateral North American Free Trade Agreement (NAFTA), and illustrates the Trump Administration's approach to digital trade. The final text of the agreement pulls from and builds on many of the provisions from the Trans-Pacific Partnership (TPP) negotiated under President Obama which the United States did not ratify. The provisions of the proposed USMCA establish new rules and disciplines to remove trade barriers and counter discriminatory action while also providing governments with flexibility. The provisions go much further than the KORUS agreement in establishing obligations on multiple aspects of digital trade, and contrast sharply with China's authoritarian approach discussed above. USMCA provisions prohibit customs duties and discrimination against digital products, requirements for source code or algorithms disclosure, or technology transfer mandates. The agreement protects electronic authentication and signatures, electronic payment systems, and consumer access to the Internet. Provisions require anti-spam measures, domestic legal frameworks for online consumer and personal privacy protection, and identifies specific key principles and international guidelines that the parties must take into account. USMCA contains broad provisions to protect cross-border data flows and restrict data localization requirements; for financial services, open data flows is subject to the financial regulator having access to data necessary to fulfill its regulatory and supervisory role. The digital trade chapter also prohibits liability of internet intermediaries, in line with current U.S. law, and promotes the publication of government data through open-data formats. The parties agree to cooperate on and promote a number of issues including risk-based cybersecurity, privacy, SMEs, and the APEC Cross-Border Privacy Rules (see below). Given the cross-cutting nature of the digital world, digital trade issues touch on other policy objectives and priorities, such as privacy and national security. While U.S. and international trade agreements are one way for the United States to establish market opening and new rules and disciplines to govern digital trade, not every issue is necessarily suitable for an international trade agreement and not every international partner is ready, or willing, to take on such commitments. In other international forums outside of trade negotiations, other tools can be used to encourage high-level, nonbinding best practices and principles and align expectations. G-20. The influential Group of 20 (G-20) is one venue for establishing common principles, and digital issues have been on its agenda recently. At the 2017 meeting, G-20 leaders established the Digital Economy Task Force (DETF). The G-20 Digital Economy Ministerial Meeting issued a declaration that identified requisites for a thriving digital economy and specific recommendations. As host, Japan is expected to build on the digital economy agenda in 2019, with a specific emphasis on privacy and data governance. OECD. The OECD provides a forum to discuss principles and norms to facilitate a thriving digital economy. The OECD issued a series of reports in 2017 and 2018 related to digital trade, including an assessment of the digital transformation of each OECD economy and bridging the digital gender divide. The reports identified specific challenges and recommendations, including establishing a national digital strategy and removing market access barriers. The United States could work with its OECD partners to reinforce principles, including an open Internet and the need to balance public policy objectives. The OECD Global Forum on the Digital Security for Prosperity also allows for multi-stakeholder international engagement to discuss issues such as the governance of digital security issues. APEC. The Asian Pacific Economic Cooperation (APEC) forum presents another opportunity for sharing best practices and setting high-level principles on issues that may be of greater concern to developing countries with less advanced digital economies and industry. APEC is implementing the Cross-Border Privacy Rules (CBPR) system to be consistent with the already established APEC Privacy Framework. According to the Business Software Alliance, most countries across the globe have data protection frameworks based on either the APEC CBPR system or the EU regime, but some countries still lack privacy laws. Currently, the United States, Japan, Mexico, Canada, South Korea, Singapore, Taiwan, and Australia are CBPR members; the Philippines is in the process of joining. Some observers view CBPR, which aims to reflect a diversity of national privacy regimes, as a scalable solution that could potentially be adopted multilaterally. Others may view the EU regime as a more comprehensive, top-down approach. Due to its voluntary nature, APEC has served as an incubator for potential plurilateral agreements. Regulatory cooperation. Ongoing regulatory cooperation efforts are another important tool for addressing differences between parties, better aligning regulatory requirements, and reducing inconsistencies and redundancies that can hamper or discriminate against the free flow of data, goods, and services. These forums provide an opportunity for U.S. agencies to work directly with overseas counterparts and focus on specific aspects of digital trade such as online privacy, consumer protection, and rules for online contract formation and enforcement. The EU-U.S. Privacy Shield is one example of regulatory authorities working together to address such issues. Policy questions continue to evolve as the internet-driven economy and innovations grow. Digital trade is intimately connected to and woven into all parts of the U.S. economy and overlaps with other sectors, requiring policymakers to balance many different objectives. For example, digital trade relies on cross-border data flows, but policymakers must balance open data flows with public policy goals such as protecting privacy, supporting law enforcement, and improving personal and national security and safety. The complexity of the debate related to cross-border data flows and digital trade more generally involves complementary and competing interests and stakeholders. Companies and individuals who seek to do business abroad, and trade negotiators who seek to open markets may focus on maintaining open market access, which may include cross-border data flows, while others may want to limit foreign competition. Privacy advocates may focus on protecting personal information. Meanwhile, law enforcement and defense advisors may seek the ability to access or limit information flows based on national security interests. Digital trade raises numerous complex issues of potential interest to Congress with possible legislative and oversight implications. Issues include Understanding of the economic impact of digital trade on the U.S. economy and the effects of localization and other digital trade barriers on U.S. exports, jobs, and competition. Examining how best to balance market openness and cross-border data flows with other policy goals, such as right to privacy and the government's need for access to protect safety and national security. Considering if the United States would benefit from overarching digital privacy policy and what lessons can be drawn from other countries' experiences, and how to best balance this with U.S. trade negotiating objectives. Effectively addressing important digital trade barriers and cybertheft. Considering how best to assure public confidence and trust in network reliability and security that underlie the global digital economy and allow it to effectively and efficiently function. Examining evolving U.S. trade policy efforts, including how the proposed USMCA, WTO plurilateral, and potential new bilateral negotiations may address U.S. trade barriers, set new rules and disciplines, and respond to different standard-setting practices that may have global reach, including by the EU and China. Assessing if U.S. agencies have the necessary tools to accurately measure the size and scope of digital trade in order to analyze the impact of potential policies. Assessing the effectiveness of the Trump Administration's Section 301 actions involving Chinese trade practices and other bilateral efforts related to cybersecurity and digital trade. Barriers to Internet Services Discriminatory treatment of digital goods and services Duties on digital goods or services Foreign investment restrictions Intermediary liability without safe harbor or fair-use provisions that could make internet platforms responsible for content posted by users Low de minimis threshold for customs duties on imported goods, including e-commerce purchases \"Snippet tax\" on search engines that quote text snippets as part of search results Taxes on over-the-top (OTT) services such as media, messaging, or voice-over-internet-protocol (VOIP) Web filtering and blocking of content Localization Barriers Data localization requirements prohibiting cross-border data flows and requiring the use of local servers for data storage or processing Limited or no access to foreign government procurement markets Requirement for use of local technology Comprehensive privacy regulations that may discriminate against foreign providers Technology Barriers Restrictions or prohibitions on use of encryption Source code, technology, or other intellectual property rights (IPR) forced transfer requirements Local testing and certification for imported information technology (IT) equipment may add costs or delays for imported goods Other Barriers Cybersecurity threats or local requirements Weak IPR enforcement", "summary": "As the global internet develops and evolves, digital trade has become more prominent on the global trade and economic policy agenda. The economic impact of the internet was estimated to be $4.2 trillion in 2016, making it the equivalent of the fifth-largest national economy. The digital economy accounted for 6.9% of current‐dollar gross U.S. domestic product (GDP) in 2017. Digital trade has been growing faster than traditional trade in goods and services. Congress has an important role to play in shaping global digital trade policy, from oversight of agencies charged with regulating cross-border data flows to shaping and considering legislation implementing new trade rules and disciplines through trade negotiations. Congress also works with the executive branch to identify the right balance between digital trade and other policy objectives, including privacy and national security. Digital trade includes end-products, such as downloaded movies, and products and services that rely on or facilitate digital trade, such as productivity-enhancing tools like cloud data storage and email. In 2017, U.S. exports of information and communications technology-enabled services (excluding digital goods) were an estimated $439 billion. Digital trade is growing on a global basis, contributing more to global domestic product (GDP) than financial or merchandise flows. The increase in digital trade raises new challenges in U.S. trade policy, including how to best address new and emerging trade barriers. As with traditional trade barriers, digital trade constraints can be classified as tariff or nontariff barriers. In addition to high tariffs, barriers to digital trade may include localization requirements, cross border data flow limitations, intellectual property rights (IPR) infringement, forced technology transfer, web filtering, economic espionage, and cybercrime exposure or state-directed theft of trade secrets. China's policies, in particular, such as those on internet sovereignty and cybersecurity, pose challenges for U.S. companies. Digital trade issues often overlap and cut across policy areas, such as IPR and national security; this raises questions for Congress as it weighs different policy objectives. The Organisation for Economic Co-operation and Development (OECD) points out three potentially conflicting policy goals in the internet economy: (1) enabling the internet; (2) boosting or preserving competition within and outside the internet; and (3) protecting privacy and consumers, more generally. While no multilateral agreement on digital trade exists in the World Trade Organization (WTO), other WTO agreements cover some aspects of digital trade. Recent bilateral and plurilateral agreements have begun to address digital trade rules and barriers more explicitly. For example, the proposed U.S.-Mexico-Canada Agreement (USMCA) and ongoing plurilateral discussions in the WTO on a potential e-commerce agreement could address digital trade barriers to varying degrees. Digital trade is also being discussed in a variety of international forums, providing the United States with multiple opportunities to engage in and shape global norms. With workers in the high-tech sector in every U.S. state and congressional district, and over two-thirds of U.S. jobs requiring digital skills, Congress has an interest in ensuring and developing the global rules and norms of the internet economy in line with U.S. laws and norms, and in establishing a U.S. trade policy on digital trade that advances U.S. interests.", "document_type": "crs"}
{"report": "On August 1, 2018 , the World Health Organization (WHO) reported a new Ebola outbreak in eastern DRC, about a week after having declared the end of a separate outbreak in the west of the country. As of September 24, 2019, the WHO had reported 3,175 cases in the current outbreak, including 2,119 deaths. About 58% of all cases have been women and 28% children. The current outbreak is the 10 th on record in DRC, the largest to have occurred in the country, and the second largest ever, after the 2014-2016 Ebola outbreak in West Africa. Cases have been concentrated in North Kivu and Ituri provinces ( Figure 1 ), where long-running conflicts had already caused a protracted humanitarian crisis and are complicating Ebola control efforts. The number of new Ebola cases identified per week has fluctuated since the start of the outbreak ( Figure 2 ), but has generally trended downward slowly since peaking in April 2019. The current outbreak has coincided with a fraught political transition process in DRC. A new president, parliament, provincial-level assemblies, and governors were elected between late 2018 and mid-2019, after years of delays, gridlock, political violence, and repression of opposition voices. Election delays in the Ebola-affected areas, an opposition stronghold, heightened tensions and spurred conspiracy theories, arguably hindering Ebola response. President Felix Tshisekedi, inaugurated in January 2019, was previously an opposition figure, but the coalition of his predecessor Joseph Kabila won supermajorities in parliament and at the provincial level. Observers questioned the legitimacy of the election results, and tense negotiations between the two political blocs (Tshisekedi's and Kabila's) delayed the naming of a new cabinet until late August 2019, while complicating relations between the national and provincial/local officials. Several factors have foiled outbreak control efforts, including low Ebola awareness (early symptoms are similar to other common ailments like malaria), community distrust of health interventions, belated visits to health facilities (at which point survival prospects decline rapidly), and infection prevention control lapses in health facilities. Attacks by militia and criminal groups, political protests, health worker strikes, and security force abuses have also disrupted and impeded the response. In mid-September, for example, violent attacks in a new hotspot (Lwemba, Ituri Province) after the death of a local healthcare worker from Ebola prompted the indefinite suspension of Ebola control activities in the area. As a result, new cases continue to stem from unknown chains of transmission, and deaths continue to occur outside Ebola treatment centers. U.S. officials and other health experts have repeatedly raised concerns about broader challenges in DRC related to its health care system, political tensions, local grievances, and instability. USAID Administrator Mark Green testified to Congress in April 2019 that in DRC, \"You have a failed democracy in many, many waysâ¦. It will take more than simply a medical approach. It will take a development approach to try to tackle this terrible disease and to contain its outbreak.\" After traveling to DRC in August 2019, Administrator Green wrote, \"Decades of corrupt, authoritarian rule during which communities were denied any meaningful voice in their government have undermined the Congolese people's trust in institutions.\" Health experts have been troubled by reports of Ebola cases in major DRC cities (including the capital of North Kivu, Goma) and outside of DRC. Between June and August 2019, a total of four cross-border cases were detected in Uganda. Observers expressed optimism about the rapid detection and containment of these cases, but new concerns have arisen about subsequent suspected cases in Tanzania. In mid-September, WHO was informed by unofficial sources of a number of suspected Ebola cases in that country, including in the capital city of Dar es Salaam, while Tanzanian authorities asserted that there were no confirmed or suspected Ebola cases in the country. WHO has reportedly since sent personal protective equipment (PPE) and vaccination supplies to Tanzania, and recommended that the sickened patients (one of whom reportedly died) receive secondary confirmation testing at a WHO facility. As of September 21, none of the cases had received secondary confirmation. Ebola control in other neighboring countries such as South Sudan, Burundi, or Central Africa Republic, which have minimal state capacity and are affected by protracted conflicts and political crises, could be highly challenging if required. Outbreak control, treatment, and disease surveillance activities are being carried out primarily by DRC government employees (including health workers and frontline workers, who provide routine and essential services), as well as by international nongovernmental organizations, with U.N. agencies (including the WHO), other multilateral entities (including the World Bank), and foreign governments providing funding, expertise, coordination, and logistical assistance. Classic Ebola outbreak control protocol entails infection prevention control (IPC) in health care facilities; management and isolation of patients in Ebola Treatment Centers (ETCs); fever surveillance with rapid diagnosis; tracing of Ebola cases and their contacts; and community awareness and adherence to IPC protocols, safe patient and body transport, safe burials, and household and environmental decontamination. The extraordinary conditions on the ground in affected areas of eastern DRC have limited the effectiveness of conventional control measures, however, and are requiring ever-evolving strategies for containment, including aggressive vaccination campaigns (see text box below). Since the WHO declared the outbreak to be a Public Health Emergency of International Concern (PHEIC) in July 2019, it has sought to garner additional donor funds, as well as international support for addressing the political and security issues affecting Ebola control. In July 2019, the WHO and the DRC Ministry of Health (MoH) released a fourth strategic response plan to \"definitively defeat\" the Ebola epidemic ( Table 1 ). The strategic plan is expected to cost over $462 million, including about $288 million for the public health response portion ( Table 1 ). In July 2019, the World Bank announced that it would provide $300 million toward the plan, about half of which would support the public health response, on top of prior funding commitments (discussed below). The public health portion of the strategic plan, covering July 1 through December 31, 2019, purportedly takes into account lessons learned from the third strategic response plan (February through July 2019). This portion of the plan is based on strengthening political commitment, security, and operational support to improve acceptance of the response and access to insecure areas; deepening support for addressing the varied needs of communities affected by Ebola (beyond a single-minded focus on containment efforts), as a means toward fostering community ownership and involvement in Ebola responses; improving financial planning, monitoring and reporting; and bolstering preparedness of neighboring provinces and countries. The World Bank has urged other countries to provide additional support, and the WHO Director-General has urged donors to address disbursement delays. As of September 11, 2019, the WHO had received less than $60 million of the $288 million it sought for the current phase of the public health response. The United States is the top country donor for the public health response and has provided almost $158 million for the Ebola humanitarian response, largely supporting activities by nongovernmental organizations (NGOs), as discussed below. DRC government employees and other Congolese nationals are the primary responders to the Ebola epidemic on the ground. As WHO Executive Director for Health Emergencies Dr. Michael Ryan noted in June 2019, \"If you go into the treatment facilities now it is Congolese doctors and nurses in the front line. There may be NGO or WHO badges on the tents but the doctors and nurses are Congolese; surveillance officers are Congolese; 80% of the vaccinators in this response are Congolese.\" The DRC government has provided health workers and administrative personnel, hired local frontline workers, organized volunteers, and conducted information awareness campaigns. The government has also offered certain health services free of charge in selected government health facilities, with donor support (discussed below). From the start of the current outbreak, the DRC government's health responses were coordinated by the MoH, as in past Ebola outbreaks in DRC. In July 2019, however, President Tshisekedi transferred coordination responsibilities to an expert committee headed by the director of DRC's biomedical research institute, Dr. Jean-Jacques Muyembe, who reports directly to the president. Dr. Muyembe is a recognized expert on Ebola who helped investigate the first known outbreak of the disease, in DRC in 1976. Then-Health Minister Dr. Oly Ilunga resigned following Dr. Muyembe's appointment, citing a dilution of his authority as well as confusion about the coordination of DRC government Ebola responses, an insufficient focus on the health system, and opposition to utilizing the Johnson & Johnson experimental vaccine (see text box above). Ilunga was subsequently the target of scathing criticism in the leaked report of a DRC government investigative commission, which indicated, among other things, that Ilunga and his team had displayed an \"aggressive and ostentatious attitude\" when visiting the outbreak area and had squandered Ebola response funds on fancy cars and hotel rooms. These developments have suggested an internal power struggle over policy and control of funds for Ebola response. Humanitarian experts, including U.S. officials, have repeatedly asserted that broader humanitarian access and security issues have stymied outbreak control efforts, and that international response efforts require increased coordination and transparency. In response to such concerns, in May 2019 U.N. Secretary-General AntÃ³nio Guterres appointed MONUSCO Deputy Special Representative David Gressly, a U.S. citizen, to serve as a new U.N. Emergency Ebola Response Coordinator charged with establishing a \"strengthened coordination and support mechanism\" for Ebola response. While the WHO is to continue to lead \"all health operations and technical support activities to the government,\" Gressly is leading a broader U.N.-wide effort to strengthen political engagement, financial tracking, humanitarian coordination, and \"preparedness and readiness planning\" for Goma and surrounding countries. Gressly, who continues to report to the head of MONUSCO, portrayed his new role as a reflection of the need for \"more than just a public health response.\" The WHO has deployed some 700 personnel to DRC since the current outbreak began. These personnel are coordinating the public health response and providing operational and technical support to DRC government personnel and other actors. Particular areas of focus include detection and rapid isolation of Ebola cases, intensification of rapid multidisciplinary public health actions for Ebola cases, community engagement, and health system strengthening. In addition, the WHO is coordinating regional readiness exercises and assessments in adjacent areas of DRC and neighboring countries. Vaccination and disease surveillance efforts have been bolstered in Uganda, Rwanda, and Burundi. The World Bank has stepped up its role in supporting the Ebola response effort since mid-2019. On July 24, the World Bank Group announced it was mobilizing up to $300 millionâto be financed through the Bank's International Development Association and its Crisis Response Windowâon top of $100 million disbursed previously through the International Development Association and the Bank's Pandemic Emergency Financing Facility (PEF). The PEF announced a further $30 million disbursement for DRC on August 23, 2019. World Bank resources have financed free health care and essential medicines in clinics in all affected areas, hazard pay for frontline health workers, handwashing stations, mobile laboratories, decontamination teams, psychosocial support teams, community engagement campaigns, and vaccination efforts. The injection of new resources aims to build on existing World Bank support to strengthen the DRC health system. The African Union (AU) Africa Centers for Disease Control and Prevention (Africa CDC) has supported international response efforts by deploying members of its voluntary response corps to DRC and neighboring countries. Africa CDC voluntary responders include epidemiologists and anthropologists, as well as communication, laboratory, and logistics experts from various African countries who are \"on standby for emergency deployment.\" To date, these responders have trained local health workers and community volunteers, set up laboratories, supplied personal protective equipment, and trained people in port-of-entry screening. USAID and the U.S. Centers for Disease Control and Prevention (CDC) deployed staff to DRC and the region when the outbreak was first detected in August 2018. The United States is also the top country donor to the Ebola response effort, as noted above. As of September 10, USAID had announced more than $148 million for direct support to the Ebola response within DRC and another $9.8 million to support preparedness and prevention activities in neighboring countries. Those funds were drawn primarily ($156.1 million) from unobligated FY2015 International Disaster Assistance (IDA) funds that Congress appropriated on an emergency basis for Ebola response during the West Africa outbreak ( P.L. 113-235 ). According to USAID, the available balance of FY2015 emergency IDA Ebola funds stood at $105.5 million as of September 9. More broadly, the United States is the top bilateral humanitarian donor to DRC and the top financial contributor to MONUSCO, which is providing logistical and security support to Ebola response efforts. USAID Administrator Green testified before Congress in April 2019 that \"there is sufficient money for fighting Ebola in DRC,\" asserting that nonfinancial challenges posed the primary constraint to containment efforts. U.S. funding commitments have continued to grow since then, however, as the outbreak has persisted and broadened. U.S. personnel are providing technical support from Kinshasa, Goma, and neighboring Rwanda and Uganda, while implementing partners (U.N. agencies and NGOs) are administering Ebola response efforts within the outbreak zone with U.S. resources. The Administration has placed strict constraints on the movement of U.S. personnel to and within affected areas, due to security threats. In September 2018, USAID and CDC withdrew personnel from the immediate outbreak zone due to security concerns, despite CDC's stated preference to maintain staff in the field. U.S. support for outbreak control has included the following: USAID has provided grant funding to NGOs and U.N. entities carrying out Ebola response and preparedness activities, drawing primarily on IDA funds (as noted above). In October 2018, USAID deployed a Disaster Assistance Response Team (DART) to coordinate the U.S. response in support of the DRC government, the WHO, and other partners. USAID Ebola response funds have supported disease surveillance, infection prevention and control, safe and dignified burials, water and sanitation aid, prepositioning of medical supplies, humanitarian coordination, and logistics. U.S. bilateral economic and health aid funding for DRC has also supported programs that may ease humanitarian access or otherwise complement Ebola response activities. CDC personnel have provided direct technical support to the DRC government, the WHO, and USAID's DART for disease surveillance, contact tracing, data management, infection protection and control, risk communication and community engagement, laboratory strengthening, emergency management, and surveillance at points of entry. CDC staff also have supported Ebola preparedness efforts in neighboring countries. The Department of Defense has supplied laboratory training to Ugandan researchers and has partnered with them to conduct clinical Ebola vaccine trials. Security threats have periodically forced the temporary cessation of Ebola case management in some areas, interrupted contact tracing, and frustrated surveillance efforts in high-transmission areas. Dozens of armed groups are active in the areas most affected by the outbreak. These include an array of local militias, along with the Allied Democratic Forces (ADF), a relatively large and opaque group implicated in attacks on U.N. peacekeepers, local military forces, and civilians. Road travel is often dangerous, with frequent reports of militia attacks, armed robbery, and kidnappings. In April 2019, the Islamic State claimed responsibility for an attack on local soldiers previously attributed to the ADF, the latest in a series of signs of emerging ties between the two. State security force personnel reportedly maintain ties with armed groups and have been implicated in atrocities, including civilian massacres in Beni territory since 2014. Local mistrust of government officials and outsiders (including Congolese who are not from the immediate area)âsometimes rooted in conflict dynamics, ethnic tensions, and political frictionâhas prompted some community resistance to Ebola control efforts and led to attacks on health workers and facilities, including Ebola treatment centers. Some communities in Beni and Butembo have long opposed DRC's central government and complained of neglect and persecution. WHO officials have urged broader international support for \"political mediation, engagement with opposition, and negotiated solutions,\" asserting that \"[j]ust purely focusing on community engagement and participation will not fix what are deep seated political issues that need to be addressed at a higher level.\" Perceptions that outsiders are profiting financially from the outbreak, or that international intervention is driven more by fear of contagion than concern for locals' wellbeing, appear to have fueled conspiracy theories and community resistance. At a July 15 donors event on Ebola response in Geneva, WHO Director-General Dr. Tedros Adhanom Ghabreyesusi said that Congolese in the outbreak zone had asked him, \"Are you here to help us, or to prevent this thing from coming to you? Are you doing this for us, or for yourself?\" He added, \"It embarrasses me.â¦ We should not appear to be seen as if we are parachuting in and out because of Ebola.\" DRC's then-Health Minister argued in the same meeting that local perceptions that the response was bringing cash into the region had fueled threats to health workers, including kidnappings. Local perceptions that donors are more concerned with preventing the spread of Ebola to their countries than with helping Congolese communities are rooted, in part, in enduring health challenges. Maternal and infant deaths, for example, have for years regularly exceeded the current count of Ebola deaths but have received comparatively little attention. Authorities have redirected health resources in some areas for Ebola control, deepening local frustrations. Vaccination campaigns have also been interrupted in some Ebola hotspots. In Ituri province, for example, inadequate supply of measles vaccine has limited containment of a measles outbreak that began in January and has infected over 161,000 people, claiming over 3,000 lives. Health workers also are fighting a cholera outbreak that has infected over 15,000 people and killed at least 287. The WHO has reported that Ebola transmission is likely occurring in ill-equipped and understaffed health facilities. Inconsistent adherence to infection prevention and control, periodic disruptions in supply chain systems, and limited access to water for handwashing in some health facilities have complicated Ebola control efforts. In addition, some health workers have refused to wear personal protective equipment in health facilities or perform rudimentary infection prevention and control measures due to threats of violence by some members of the community. As of August 27, 2019, 156 health workers had contracted Ebola, at least 34 of whom had died. The MoH, WHO, and other partners have identified health facilities of concern and are addressing lapses in triage, case detection, and infection prevention and control. Community Engagement. The WHO and implementing partners have worked to deepen local engagement, with some reported positive results. Local Ebola committees in Butembo and Katwa (at the center of the outbreak zone in North Kivu), for example, are chaired and managed by community members who plan Ebola awareness and sensitization campaigns. Improved community engagement has reportedly contributed to increased participation in vaccine campaigns and safe and dignified burial practices. For example, the WHO reported in July 2019 that a high-risk contact in Katwa had sought vaccination and offered to bring other contacts. In an effort to reduce the risk of transmission and broaden access to Ebola treatment and case finding, the WHO also plans to establish smaller patient transit centers closer to communities. Replicating engagement activities in emergent hot spots remains a challenge, however. Ebola Therapeutics Advance. In August 2019, a clinical trial of four investigational Ebola treatments in DRC identified two \"strong performers,\" leading the WHO to state that \"these are the only drugs that future patients will be treated with.\" The trial, launched in late 2018, was co-sponsored by DRC's national biomedical research institute and the U.S. National Institutes of Health, and was carried out by an international research consortium coordinated by the WHO. In FY2015, in the context of the West Africa outbreak, Congress appropriated $5.1 billion for Ebola response and preparedness on an emergency basis, including $1.436 billion in multiyear International Disaster Assistance (IDA) funds (Title IX of Division J, P.L. 113-235 ). U.S. funding for responding to the current outbreak has drawn primarily on the unobligated balance of these IDA funds. According to USAID, $105.5 million of these funds remained available for expenditure as of September 9, 2019. Should the outbreak continue or expand in new ways, Congress may consider what funding mechanisms, if any, the United States might use to support Ebola control. At the same time, the United States remains the lead country donor to the current Ebola response effort. Members may examine the U.S. role, vis-Ã -vis other actors (including other countries, multilateral entities, and private sources), in financing Ebola response activities, and may debate strategies for securing additional contributions from other donors. DRC is ranked as \"Tier III\" (worst) under the Trafficking Victims Protection Act (TVPA, P.L. 106-386 , as amended), which triggers prohibitions on certain types of U.S. aid absent a full or partial presidential waiver. In FY2019, in a departure from previous practice, President Trump did not partially waive the restrictions for DRC. Thus, pursuant to the TVPA, no \"nonhumanitarian, nontrade-related\" assistance may be provided \"to the government\" of DRC. IDA funds, the core source of funding for U.S. Ebola response support to date, are exempt from the TVPA restrictions (22 U.S.C. Â§7102[10]). The TVPA further exempts economic and development assistance \"in support of programs of nongovernmental organizations.\" In practice, the Administration has interpreted the TVPA restrictions to apply broadly to various programs funded through the Development Assistance (DA) and Economic Support Fund (ESF) accounts, including some that would be implemented by NGOs, though it has not publicly provided a full account of affected activities. Some Members of Congress have expressed concern that some U.S. assistance that could help promote humanitarian access in Ebola-affected areas has been held up as a result. Testifying before the Senate in July 2019, a senior USAID official affirmed that some FY2018 aid resources that could help with Ebola control remained restricted in connection with the TVPA, but he and other Administration witnesses did not provide further details. Two bills introduced in the 116 th Congress ( S. 1340 , the Ebola Eradication Act of 2019, and H.R. 3085 , a House companion bill) would authorize assistance for a range of activities that could help lower community resistance or otherwise support Ebola control efforts in DRC and neighboring states, \"notwithstanding\" the TVPA restrictions. S. 1340 passed the Senate on September 23, 2019. Similar language was included in a draft FY2020 State, Foreign Operations Appropriations bill circulated by the Senate Appropriations Committee on September 18, 2019. That bill would also broadly provide at least $298.3 million in U.S. bilateral assistance for \"stabilization, global health, and bilateral economic assistance\" to DRCâslightly higher than the U.S. allocation for DRC in recent years, not counting food aidâ\"including in areas affected by, and at risk from, the Ebola virus disease.\" The current Ebola outbreak has prompted resumption of discussions about strengthening health systems worldwide, particularly with regard to pandemic preparedness. In 2014, during the Obama Administration, the United States and the WHO co-launched the Global Health Security Agenda (GHSA) to improve countries' ability to prevent, detect, and respond to infectious disease threats. The United States, the largest donor to this multilateral effort, pledged to support it with $1 billion from FY2015 through FY2019. The Trump Administration has built on these efforts. In May 2019, the White House released the United States Government Global Health Security Strategy , which outlined the U.S. role in extending the Global Health Security Agenda and improving global health security worldwide. Although the Trump Administration, through the strategy and public statements, has supported extending the GHSA through 2024, officials have not provided comprehensive information on what that support would entail. Members of Congress may continue to debate what role, if any, the United States should play in supporting global health system strengthening efforts to bolster global health security, and whether to adjust funding levels to meet ongoing and future infectious disease threats. Through regular appropriations, disease outbreak prevention and global health security efforts are funded through USAID pandemic influenza and CDC global health protection line items ( Table 2 ). On September 19, 2019, the House passed the Continuing Appropriations Act, 2020, and Health Extenders Act of 2019 ( H.R. 4378 ), which would authorize the transfer to the CDC of up to $20 million for Ebola preparedness and response activities from the Infectious Disease Rapid Response Reserve Fund. Other relevant bills introduced in the 116 th Congress include H.R. 2166 , which would codify U.S. engagement in the GHSA as specified in an executive order issued by the Obama Administration, and H.R. 826 , which seeks to facilitate research and treatment of neglected tropical diseases, including Ebola.", "summary": "The Ebola outbreak in the Democratic Republic of Congo (DRC) that began in August 2018 has eluded international containment efforts and posed significant challenges to local and international policymakers. The current outbreak is the 10 th and largest on record in DRC, and the world's second largest ever (after the 2014-2016 West Africa outbreak). On July 17, 2019, the World Health Organization (WHO) declared the current DRC outbreak to be a Public Health Emergency of International Concern (PHEIC) and called for increased donor funding. To date, the U.S. Agency for International Development (USAID) has announced nearly $158 million to support the response to the outbreak in DRC and neighboring countries, most of which has been funded through USAID-administered International Disaster Assistance (IDA) funds appropriated by Congress in FY2015. Challenges Broad challenges in DRCâincluding unresolved armed conflicts, shortfalls in the local health care system, political tensions, community grievances, and criminal activitiesâhave hindered outbreak control. The main outbreak zone is an area of eastern DRC where long-running conflicts had already caused a protracted humanitarian crisis. In addition, the outbreak has coincided with a fraught political transition process in DRC, where a former opposition figure, Felix Tshisekedi, was inaugurated president in January 2019. The electoral process and tense negotiations over a coalition government have complicated Ebola response efforts, as well as coordination between national and provincial officials. Ebola and related response efforts have also diverted or interrupted already limited local health resources in affected areas. This phenomenon, in turn, has been linked to interruptions in routine immunization campaigns. Inadequate measles vaccine supplies have limited capacity to control a measles outbreak in DRC that began in January 2019 and has claimed more than 3,000 lives. Since June 2019, a handful of Ebola-infected individuals have been identified in the large city of Goma in eastern DRC (a staging area for humanitarian operations and U.N. peacekeeping activities in the country), in the city of Bukavu (south of the main outbreak zone), and in Uganda. Suspected cases were reported, but not confirmed, in Tanzania in mid-September 2019. Transmission outside the outbreak zone has been limited to date, which may be attributable to internationally supported surveillance and prevention efforts, as well as the use of an investigational vaccine. Concerns nevertheless persist that cases could spread to new areas and/or countries. Uganda (which borders the most affected areas in DRC) has prior experience in Ebola control, but Rwanda, Tanzania, and Burundi do not. Minimal state capacity and protracted conflict in South Sudan and the Central African Republic suggest that a coordinated disease control response in either setting could be highly challenging. Issue s for Congress A potential issue for Congress is the level of funding allocated for global health security and pandemic preparedness versus outbreak response, with funding for outbreak response to date outweighing support for global outbreak prevention. Separately, the State Department's designation of DRC as a \"Tier III\" (worst-performing) country under the Trafficking Victims Protection Act (TVPA, Division A of P.L. 106-386 , as amended) triggers restrictions on certain types of U.S. aid (not including IDA-funded activities). Several bills would authorize U.S. funding for programs intended to lower community resistance and otherwise support Ebola control in DRC and neighboring states, \"notwithstanding\" the TVPA restrictions. These include S. 1340 , the Ebola Eradication Act of 2019, which passed the Senate in September 2019; H.R. 3085 , a House companion bill; and a Senate committee draft of the FY2020 Department of State, Foreign Operations, and Related Programs appropriations bill circulated on September 18, 2019. Some Members of Congress have also monitored State Department security policies that have restricted U.S. government experts' travel to and within the outbreak zone.", "document_type": "crs"}
{"report": "The Small Business Administration (SBA) administers several types of programs to support small businesses, including direct disaster loan programs for businesses, homeowners, and renters to assist their recovery from natural disasters; loan guaranty and venture capital programs to enhance small business access to capital; small business management and technical assistance training programs to assist business formation and expansion; and contracting programs to increase small business opportunities in federal contracting. Congressional interest in the SBA's programs has increased in recent years, primarily because small businesses are viewed as a means to stimulate economic activity and create jobs. Congressional interest, however, has become especially acute in the wake of the Coronavirus Disease 2019 (COVID-19) pandemic's widespread adverse economic impact on the national economy, including productivity losses, supply chain disruptions, major labor dislocation, and significant financial pressure on both businesses and households. P.L. 116-123 , the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020, was the first act during the 116 th Congress that included provisions targeting SBA assistance to small businesses adversely affected by COVID-19. The act provided the SBA an additional $20 million for SBA disaster assistance administrative expenses and deemed the coronavirus to be a disaster under the SBA's Economic Injury Disaster Loan (EIDL) program. This change made economic injury from the coronavirus an eligible EIDL expense. Congress followed with P.L. 116-136 , the Coronavirus Aid, Relief, and Economic Security Act (CARES Act). The CARES Act makes numerous changes to SBA programs, including the creation of the Paycheck Protection Program (PPP), which are loans 100% guaranteed by the SBA with a maximum term of 10 years and a maximum interest rate of no more than 4%. These loans are available to small businesses, small 501(c)(3) nonprofit organizations, and small 501(c)(19) veterans organizationsâand are eligible for loan forgiveness. The SBA announced that the loans will have a two-year term at a 1.0% interest rate. The CARES Act provides deferment relief for PPP loans and existing loans made under the 7(a), 504/CDC, and Microloan programs. The act also appropriates $349 billion for PPP loan guarantees and subsidies (to remain available through FY2021), $10 billion for Emergency EIDL grants, $675 million for the SBA's salaries and expenses account, $25 million for the SBA's Office of Inspector General (OIG), $265 million for entrepreneurial development programs ($192 million for small business development centers (SBDCs), $48 million for women's business centers (WBCs), and $25 million for SBA resource partners to provide online information and training), and $17 billion for subsidies for the SBA's 7(a), 504/CDC, and Microloan programs. A summary of the CARES Act's major small business-related provisions is presented in the Appendix . The SBA started accepting PPP loan applications on April 3, 2020. Because the SBA neared its $349 billion authorization limit for section 7(a) lending, which includes the PPP, the SBA stopped accepting new PPP loan applications on April 15, 2020. More than 1.66 million PPP loans totaling nearly $342.3 billion were approved by nearly 5,000 lenders. Most of the loans (74%) were for less than $150,000 (see Table 1 ). The SBA also stopped accepting COVID-19-related EIDL and Emergency EIDL grant applications on April 15, because the SBA was approaching its disaster loan assistance credit subsidy limit. COVID-19-related EIDL and Emergency EIDL grant applications already received continued to be processed on a first-in first-out basis. The SBA began accepting new EIDL and Emergency EIDL grant applications on a limited basis on May 4 to accommodate agricultural businesses that were provided EIDL eligibility by the Paycheck Protection Program and Healthcare Enhancement Act ( P.L. 116-139 ). The SBA is also processing applications from agricultural businesses that had submitted an EIDL application prior to the legislative change. Those agricultural businesses do not need to reapply. All other EIDL loan applications that were submitted before the SBA stopped accepting new applications on April 15 are being processed on a first-in, first-out basis. A summary of the Paycheck Protection Program and Healthcare Enhancement Act's major small business-related provisions is presented in the Appendix . As of May 17, 2020, the SBA had approved 252,340 COVID-19-related EIDL loans, totaling $24.8 billion. As of May 8, the SBA had approved just over three million Emergency EIDL grants, totaling nearly $9.9 billion. The SBA resumed the acceptance of PPP applications on April 27, 2020, following enactment of the Paycheck Protection Program and Health Care Enhancement Act. The act increased the SBA's section 7(a) loan authorization limit from $349 billion to $659 billion, and appropriated $321.335 billion to support that level of lending. The act also appropriated $50 billion for EIDL, $10 billion for Emergency EIDL grants, and $2.1 billion for SBA salaries and expenses. As of May 16, 2020, the SBA had approved, after cancellations, more than 4.3 million PPP loans totaling more than $513 billion (see Table 1 ). For comparative purposes, that loan approval amount is more than the amount the SBA has approved in all of its loan programs, including disaster loans, during the last 29 years (from October 1, 1991 through December 31, 2019; $509.9 billion). On May 15, 2020, the House passed H.R. 6800 , the Health and Economic Recovery Omnibus Emergency Solutions Act (HEROES Act) . The HEROES Act , among other provisions, would expand PPP eligibility to include all 501(c) nonprofit organizations and appropriate another $10 billion for Emergency EIDL grants . A summary of the HEROES Act's major small business-related provisions is presented in the Appendix . This report begins with an overview of SBA disaster loans and discusses various issues related to providing disaster assistance to small businesses adversely affected by COVID-19. It presents an overview and discussion of SBA access to capital programs (including the 7(a) loan guarantee, 504/CDC loan guarantee, and Microloan program), SBA management and technical training programs (SBDCs, WBCs, SCORE, and Microloan technical assistance), and SBA contracting programs. SBA disaster assistance is provided in the form of loans, not grants, which must be repaid to the federal government. The SBA's disaster loans are unique in two respects: (1) they go directly to the ultimate borrower, and (2) they are not limited to small businesses. SBA disaster loans for physical damage are available to individuals, businesses of all sizes, and nonprofit organizations in declared disaster areas. SBA disaster loans for economic injury (EIDL) are available to eligible small businesses, small agricultural cooperatives, small businesses engaged in aquaculture, and most private, nonprofit organizations in declared disaster areas. The SBA issues about 80% of its direct disaster loans to individuals and households (renters and property owners) to repair and replace homes and personal property. The SBA disbursed $401 million in disaster loans in FY2016, $889 million in FY2017, $3.59 billion in FY2018, and $1.5 billion in FY2019. The SBA Disaster Loan Program includes home disaster loans, business physical disaster loans, and EIDLs. This report focuses on the EIDL program because it is currently being used to address the adverse economic impact of COVID-19 on small businesses and other EIDL-eligible organizations. P.L. 116-123 , the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020, deemed the coronavirus to be a disaster under the EIDL program. This change made economic injury from the coronavirus an eligible EIDL expense. The act also provided the SBA an additional $20 million for disaster loan administrative expenses. For a discussion of all SBA disaster loans, see CRS Report R41309, The SBA Disaster Loan Program: Overview and Possible Issues for Congress , by Bruce R. Lindsay. EIDLs provide up to $2 million for working capital (including fixed debts, payroll, accounts payable and other bills that cannot be paid because of the disaster's impact) to help small businesses, small agricultural cooperatives, small businesses engaged in aquaculture, and most private, nonprofit organizations meet their financial obligations and operating expenses that cannot be met as a direct result of the disaster. Public nonprofit organizations and several specific business types are not eligible for EIDL assistance. Ineligible businesses include, but are not limited to, the following: businesses that do not meet the SBA's small business eligibility criteria, including the SBA's size standards; businesses that derive more than one-third of their annual gross revenue from legal gambling activities; casinos and racetracks; religious organizations; political and lobbying concerns; government-owned concerns (expect for businesses owned or controlled by a Native American tribe); and businesses determined by the SBA to have credit available elsewhere. EIDL loan amounts are based on actual economic injury and financial needs, regardless of whether the business or eligible nonprofit suffered any property damage. If an applicant is a major source of employment, the SBA may waive the $2 million statutory limit. In addition, EIDL loan proceeds cannot be used to refinance long-term debt, expand facilities, pay dividends or bonuses, or for relocation. Applicants must have a credit history acceptable to the SBA, the ability to repay the loan, and present collateral for all EIDL loans over $25,000 if available. The SBA collateralizes real estate or other assets when available, but it will not deny a loan for lack of collateral. EIDL interest rates are determined by formulas established in law (discussed later) and are fixed for the life of the loan. EIDL interest rate ceilings are statutorily set at no more than 4% per annum. EIDL applicants are not eligible if the SBA determines that the applicant has credit available elsewhere. EIDL loans can have maturities up to 30 years. The SBA determines an appropriate installment payment based on each borrower's financial condition, which, in turn, determines the loan term. There are no prepayment penalties. SBA EIDL assistance is not automatically available. It must be requested in one of two ways: (1) a state or territory governor can submit a request to the President for a major disaster declaration under the Robert T. Stafford Disaster Relief and Emergency Assistance Act or (2) a state or governor can submit a request for SBA EIDL from the SBA Administrator under the Small Business Act. There was some initial concern that COVID-19 would not be a declarable disaster under the Small Business Act because it did not meet the legal definition for a disaster. As mentioned, to prevent any potential ambiguity, Title II of P.L. 116-123 deemed the coronavirus a disaster under Section 7(b)(2)(D) of the Small Business Act, making economic injury from the coronavirus an eligible expense under the SBA's Economic Injury Disaster Loan program. On March 16, 2020, the SBA Administrator began issuing declarations for SBA EIDLs in response to states seeking SBA disaster assistance for small businesses. The SBA changed its requirement that a state or territory \"provide documentation certifying that at least five small businesses have suffered substantial economic injury as a result of the disaster, with at least one business located in each declared county/parish.\" Under new criteria, states and territories now \"are only required to certify that at least five small businesses within the state/territory have suffered substantial economic injury, regardless of where the businesses are located.\" The SBA announced that under the new criteria EIDL assistance may be available statewide instead of just within specific identified counties in declarations related to COVID-19. Prior to the CARES Act's enactment, the SBA had about $1.1 billion in disaster loan credit subsidy available to support about $7 billion to $8 billion in disaster loans. Loan credit subsidy is the amount provided to cover the government's cost of extending or guaranteeing credit. The loan credit subsidy amount is about one-seventh of the cost of each disaster loan. The credit subsidy amount is used to protect the government against the risk of estimated shortfalls in loan repayments. There was some concern that the SBA's funding for disaster loan credit subsidies would have proven to be insufficient to meet the demand for disaster loans now that EIDL eligibility has been extended to economic injuries related to COVID-19. The CARES Act addressed this issue by providing an additional $10 billion to support the EIDL program. As mentioned, the Paycheck Protection Program and Health Care Enhancement Act (P.L. 116-139) appropriated an additional $50 billion for EIDL and $10 billion for Emergency EIDL grants. Historically, the majority (80%) of SBA disaster loans have been for individuals and households. The significant number of businesses that will likely apply for EIDL assistance because of the economic damage the coronavirus caused may require the SBA to enhance its disaster business loan portfolio and increase staff to meet demand. As mentioned, in anticipation of increased EIDL demand, Title II of P.L. 116-123 provided the SBA with an additional $20 million, to remain available until expended, for SBA Disaster Loan Program administrative expenses. A Government Accountability Office (GAO) report found that the SBA provided disaster loans in roughly 18 days or less in response to Hurricanes Harvey, Irma, and Maria in 2017. Although the 2017 hurricanes created a high demand at that time for SBA disaster loans, it is unclear if GAO's findings can be extrapolated to the current COVID-19 pandemic. The sheer volume of EIDL applications in response to COVID-19 could be significantly higher because COVID-19 affects a much larger number of small businesses and organizations. In addition, the time needed for the SBA to expand the disaster loan portfolio and hire and train new and existing staff could compromise loan processing times. Loan processing times may be of significant concern to Congress and business owners alike. If loans are not processed quickly enough, businesses nationwide may suffer economic damage and, potentially, collapse. Consequently, Congress may examine options that could expedite loan processing, such as increased staffing and surge capabilities, waiving application requirements, and the use of expedited loans or bridge loans. In response to criticism of SBA's disaster loan processing following the Gulf Coast hurricanes of 2005 and 2008, Congress passed P.L. 110-234 , the Small Business Disaster Response and Loan Improvements Act of 2008. The act created several programs to improve the disaster loan processing. Among them were the following: Expedited Disaster Assistance Loan Program (EDALP) to provide eligible EIDL applicants with expedited access to short-term guaranteed loans of up to $150,000. Immediate Disaster Assistance Program (IDAP) to provide eligible EIDL applicants with guaranteed bridge loans of up to $25,000 from private-sector lenders, with an SBA decision within 36 hours of a lender's application on behalf of a borrower. Private Disaster Assistance Program (PDAP) to make guaranteed loans available to homeowners and eligible EIDL applicants in an amount up to $2 million. The SBA, however, had difficulty implementing these programs. In his statement before the House Committee on Small Business, then-acting (and now the current) SBA Inspector General, Hannibal \"Mike\" Ware, stated, In the wake of disasters like Hurricane Sandy, congressional representatives expressed concern that SBA did not effectively develop and utilize programmatic innovations intended to assist in disbursing funds quickly and effectively. For instance, SBA did not implement statutory provisions of the Immediate Disaster Assistance Program (IDAP), Economic Injury Disaster Assistance Program (EDAP), and the Private Disaster Assistance Programs (PDAP), collectively known as the \"Guaranteed Disaster Assistance Programs\" mandated by Congress in 2008. These provisions were enacted with the expectation that they would allow SBA to provide expedited disaster loans in partnership with private sector lenders. These provisions remain unimplemented. He added that the SBA had difficulty implementing the programs because private lenders were reluctant to participate in the program. He mentioned the following impediments: [the] cost of program participation under the current pricing structure and the lender's lack of infrastructure to deliver loans that meet SBA standards (such as evaluating eligibility and duplication of benefits); loan terms that include longer maturities than conventional lending practices; the high cost of providing these loans; inadequate collateral security; and their lack of expertise in the home loan sector. Lenders were also concerned that loan guarantees would be denied due to improper eligibility determinations. Because these programs had limited use, Congress included a provision in P.L. 115-141 , the Consolidated Appropriations Act, 2018 , which permanently cancelled $2.6 million in unobligated balances available for the IDAP and the EDALP. The CARES Act addressed loan processing issues by authorizing the SBA Administrator, in response to economic injuries caused by COVID-19, to waive the \"credit not available elsewhere\" requirement, approve an applicant based solely on their credit score, not require applicants to submit a tax return or tax return transcript for approval, waive any rules related to the personal guarantee on advances and loans of not more than $200,000, and waive the requirement that the applicant needs to be in business for the one-year period before the disaster declaration (except that no waiver may be made for a business that was not in operation on January 31, 2020). Under present law and regulations, the first SBA EIDL payment is normally due five months after disbursement. However, on March 23, 2020, the SBA announced that it would defer payments on existing disaster loans through December 31, 2020, \"to help borrowers during this unprecedented time.\" The SBA also announced that payments on new EIDL loans would be deferred for one year (interest does accrue). The CARES Act provides \"impacted borrowers\" adversely affected by COVID-19 complete payment deferment relief on a covered loan in its Paycheck Protection Program (PPP). The deferment may be for not less than six months and not more than one year if the borrower was in operation on February 15, 2020, and has an application for a covered loan approved or pending approval on or after the date of enactment. The SBA announced that PPP loan payments will be deferred for six months. However, interest will continue to accrue on these loans during the six-month deferment. The CARES Act also provides for PPP loan forgiveness under specified conditions related to the borrower's retention of employees. Loan forgiveness is rare, but has been used in the past to help businesses that were having difficulty repaying their loans. For example, loan forgiveness was granted after Hurricane Betsy, when President Lyndon B. Johnson signed the Southeast Hurricane Disaster Relief Act of 1965. Section 3 of the act authorized the SBA Administrator to grant disaster loan forgiveness or issue waivers for property lost or damaged in Florida, Louisiana, and Mississippi as a result of the hurricane. The act stated that, to the extent such loss or damage is not compensated for by insurance or otherwise, (1) shall at the borrower's option on that part of any loan in excess of $500, (A) cancel up to $1,800 of the loan, or (B) waive interest due on the loan in a total amount of not more than $1,800 over a period not to exceed three years; and (2) may lend to a privately owned school, college, or university without regard to whether the required financial assistance is otherwise available from private sources, and may waive interest payments and defer principal payments on such a loan for the first three years of the term of the loan. Historically, businesses that suffer uninsured loss as a result of a major disaster declaration are not eligible for Federal Emergency Management Agency (FEMA) grant assistance, and grant assistance from other federal sources is limited. On some occasions, Congress has provided disaster assistance to businesses through the Department of Housing and Urban Development's (HUD's) Community Development Block Grant (CDBG) program. The CDBG program provides loans and grants to eligible businesses to help them recover from disasters as well as grants intended to attract new businesses to the disaster-stricken area. In a few cases, CDBG has also been used to compensate businesses and workers for lost wages or revenues. Although the President issued the first major disaster declaration to New York for COVID-19, CDBG disaster assistance is not available for all major disasters. States can use CDBG funding to respond to emergencies or other \"urgent needs\" through the conventional CDBG entitlement and states program, but existing (or future) CDBG monies generally must be reprogrammed in consultation with HUD to respond to the emergency. For these reasons, CDBG is generally used for long-term recovery needs rather than providing immediate, direct disaster assistance. Thus, Congress could consider providing business grants through FEMA or the SBA. Enlisting FEMA to administer the program may offer several benefits. First, FEMA already has grant processing operations in place. It might be relatively easier to expand the operations to include small businesses disaster grants rather than establishing new grant-making operations within SBA. Second, having FEMA administer the small business disaster grant program may limit duplication of administrative functions between FEMA and SBA. Third, it would provide access to FEMA's Disaster Relief Fund (DRF) which at the time of this writing has roughly $41 billion for disaster assistance activities. In contrast, Congress could decide to have SBA administer the program because it already has a framework in place to evaluate business disaster needs and disaster loan eligibility. Congress may need to make statutory changes to SBA's disaster loan account or authorize a new account to receive appropriations for disaster grants. Another concern about providing grants to businesses is whether businesses provided SBA EIDL will be eligible for grant assistance. For example, in some cases homeowners and businesses that accepted disaster loans were deemed ineligible for disaster grants. This may make some businesses reluctant to apply for SBA EIDL and instead hold out for the possibility of a grant. Congress may therefore allow businesses to use grant money to pay down their SBA EIDL. Another potential concern is waste, fraud, and abuse. For example, Section 1210 of the Disaster Recovery Reform Act of 2018 (DRRA, Division D of P.L. 115-254 ) prohibits the President from determining loans as duplicative assistance provided all federal assistance is used toward loss resulting from an emergency or major disaster under the Stafford Act. Consequently, businesses that obtain SBA EIDL and a grant for the same purposes would conceivably not be required to pay back the duplicative award. Congress could consider limiting grants to relatively small businesses as compared to what is considered a small business according to SBA size standards. For example, business grants could be limited to businesses with 10 or fewer employees. The CARES Act authorizes the SBA Administrator to provide up to $10,000 as an advance payment in the amount requested within three days after receiving an EIDL application from an eligible entity. Applicants are not required to repay the advance payment, referred to in the CARES Act as an Emergency EIDL grant, even if subsequently denied an EIDL loan. Due to anticipated demand, the SBA limited Emergency EIDL grants to $1,000 per employee, up to a maximum of $10,000. The CARES Act addresses waste, fraud, and abuse by providing the SBA's OIG $25 million for oversight of the SBA's administration of its lending programs and for investigations to serve as a general deterrent to fraud, waste, and abuse. According to the SBA's March 17, 2020, press release, SBA EIDL interest rates for COVD-19 are 3.75% for businesses and 2.75% for nonprofit organizations. SBA disaster loan interest rates have been a long-standing congressional concern. First, there is concern about the ability of disaster victims to pay off their loans. Second, there is concern about how interest rates are determined given the complexity of the statutory language about disaster loan interest rates. 15 U.S.C. Â§636(d)(5)(C)) states that interest rates are \"in the case of a business, private nonprofit organization, or other concern, including agricultural cooperatives, unable to obtain credit elsewhere, not to exceed 4 per centum per annum.\" To determine EIDL interest rates, SBA uses a formula under 15 U.S.C. Â§636(d)(4)(A): Notwithstanding the provisions of the constitution of any State or the laws of any State limiting the rate or amount of interest which may be charged, taken, received, or reserved, the maximum legal rate of interest on any financing made on a deferred basis pursuant to this subsection shall not exceed a rate prescribed by the Administration, and the rate of interest for the Administration's share of any direct or immediate participation loan shall not exceed the current average market yield on outstanding marketable obligations of the United States with remaining periods to maturity comparable to the average maturities of such loans and adjusted to the nearest one-eighth of 1 per centum, and an additional amount as determined by the Administration, but not to exceed 1 per centum per annum: Provided, That for those loans to assist any public or private organization for the handicapped or to assist any handicapped individual as provided in paragraph (10) of this subsection, the interest rate shall be 3 per centum per annum. Congress could request SBA to reevaluate its interpretation of 15 U.S.C. Â§636(d)(4)(A) and provide detailed information explaining how the formula provides nonprofit organizations with lower interest rates than small businesses. Alternatively, Congress could change the formula under the Small Business Act if it considered the language ambiguous, or it could designate an interest rate (including a zero interest rate) for all SBA EIDL for the duration of COVID-19. The SBA has authority to make direct loans but, with the exception of disaster loans and loans to Microloan program intermediaries, has not exercised that authority since 1998. The SBA indicated that it stopped issuing direct business loans primarily because the subsidy rate was \"10 to 15 times higher\" than the subsidy rate for its loan guaranty programs. Instead of making direct loans, the SBA guarantees loans issued by approved lenders to encourage those lenders to provide loans to small businesses \"that might not otherwise obtain financing on reasonable terms and conditions.\" With few exceptions, to qualify for SBA assistance, an organization must be both a for-profit business and small. To participate in any of the SBA loan guaranty programs, a business must meet the Small Business Act's definition of small business . This is a business that is organized for profit; has a place of business in the United States; operates primarily within the United States or makes a significant contribution to the U.S. economy through payment of taxes or use of American products, materials, or labor; is independently owned and operated; is not dominant in its field on a national basis; and does not exceed size standards established, and updated periodically, by the SBA. The business may be a sole proprietorship, partnership, corporation, or any other legal form. The SBA uses two measures to determine if a business is small: SBA-derived industry specific size standards or a combination of the business's net worth and net income. For example, businesses participating in the SBA's 7(a) loan guaranty program are deemed small if they either meet the SBA's industry-specific size standards for firms in 1,047 industrial classifications in 18 subindustry activities described in the North American Industry Classification System (NAICS) or do not have more than $15 million in tangible net worth and not more than $5 million in average net income after federal taxes (excluding any carryover losses) for the two full fiscal years before the date of the application. All of the company's subsidiaries, parent companies, and affiliates are considered in determining if it meets the size standard. The SBA's industry size standards vary by industry, and they are based on one of the following four measures: the firm's (1) average annual receipts in the previous three (or five) years, (2) number of employees, (3) asset size, or (4) for refineries, a combination of number of employees and barrel per day refining capacity. Historically, the SBA has used the number of employees to determine if manufacturing and mining companies are small and average annual receipts for most other industries. The SBA's size standards are designed to encourage competition within each industry. They are derived through an assessment of the following four economic factors: \"average firm size, average assets size as a proxy of start-up costs and entry barriers, the 4-firm concentration ratio as a measure of industry competition, and size distribution of firms.\" The SBA also considers the ability of small businesses to compete for federal contracting opportunities and, when necessary, several secondary factors \"as they are relevant to the industries and the interests of small businesses, including technological change, competition among industries, industry growth trends, and impacts of size standard revisions on small businesses.\" The SBA provides loan guarantees for small businesses that cannot obtain credit elsewhere. Its largest loan guaranty programs are the 7(a) loan guaranty program, the 504/CDC loan guaranty program, and the Microloan program. The SBA's loan guaranty programs require personal guarantees from borrowers and share the risk of default with lenders by making the guaranty less than 100%. In the event of a default, the borrower owes the amount contracted less the value of any collateral liquidated. The SBA can attempt to recover the unpaid debt through administrative offset, salary offset, or IRS tax refund offset. Most types of businesses are eligible for loan guarantees. A list of ineligible businesses (such as insurance companies, real estate investment firms, firms involved in financial speculation or pyramid sales, and businesses involved in illegal activities) is contained in 13 C.F.R. Â§120.110. With one exception, nonprofit and charitable organizations are also ineligible. Most of these programs charge fees to help offset program costs, including costs related to loan defaults. In most instances, the fees are set in statute. For example, for 7(a) loans with a maturity exceeding 12 months, the SBA is authorized to charge lenders an up-front guaranty fee of up to 2% for the SBA guaranteed portion of loans of $150,000 or less, up to 3% for the SBA guaranteed portion of loans exceeding $150,000 but not more than $700,000, and up to 3.5% for the SBA guaranteed portion of loans exceeding $700,000. Lenders who have a 7(a) loan that has a SBA guaranteed portion in excess of $1 million can be charged an additional fee not to exceed 0.25% of the guaranteed amount in excess of $1 million. 7(a) loans are also subject to an ongoing servicing fee not to exceed 0.55% of the outstanding balance of the guaranteed portion of the loan. In addition, lenders are authorized to collect fees from borrowers to offset their administrative expenses. In an effort to assist small business owners, the SBA has, from time-to-time, reduced its fees. For example, in FY2019, the SBA waived the annual service fee for 7(a) loans of $150,000 or less made to small businesses located in a rural area or a HUBZone and reduced the up-front one-time guaranty fee for these loans from 2.0% to 0.6667% of the guaranteed portion of the loan. In addition, pursuant to P.L. 114-38 , the Veterans Entrepreneurship Act of 2015, the SBA is required to waive the up-front, one-time guaranty fee on all veteran loans under the 7(a) SBAExpress program (up to and including $350,000) \"except during any upcoming fiscal year for which the President's budget, submitted to Congress, includes a cost for the 7(a) program, in its entirety, that is above zero.\" The SBA's goal is to achieve a zero subsidy rate, meaning that the appropriation of budget authority for new loan guaranties is not required. The 7(a) loan guaranty program is named after the section of the Small Business Act that authorizes it. The loans are made by SBA lending partners (mostly banks but also some other financial institutions) and partially guaranteed by the SBA. Borrowers may use 7(a) loan proceeds to establish a new business or to assist in the operation, acquisition, or expansion of an existing business. 7(a) loan proceeds may be used to acquire land (by purchase or lease); improve a site (e.g., grading, streets, parking lots, landscaping), including up to 5% for community improvements such as curbs and sidewalks; purchase one or more existing buildings; convert, expand, or renovate one or more existing buildings; construct one or more new buildings; acquire (by purchase or lease) and install fixed assets; purchase inventory, supplies, and raw materials; finance working capital; and refinance certain outstanding debts. In FY2019, the SBA approved 51,907 7(a) loans to 46,111 small businesses totaling $23.2 billion. In FY2019, there were 1,708 active lending partners providing 7(a) loans. The 7(a) program's current guaranty rate is 85% for loans of $150,000 or less and 75% for loans greater than $150,000 (up to a maximum guaranty of $3.75 million, or 75% of $5 million). Although the SBA's offer to guarantee a loan provides an incentive for lenders to make the loan, lenders are not required to do so. A 7(a) loan is required to have the shortest appropriate term, depending upon the borrower's ability to repay. The maximum term is 10 years, unless the loan finances or refinances real estate or equipment with a useful life exceeding 10 years. In that case, the loan term can be up to 25 years, including extensions. Lenders are permitted to charge borrowers fees to recoup specified expenses and are allowed to charge borrowers \"a reasonable fixed interest rate\" or, with the SBA's approval, a variable interest rate. The SBA uses a multistep formula to determine the maximum allowable fixed interest rate for all 7(a) loans (with the exception of the Export Working Capital Program and Community Advantage loans) and periodically publishes that rate and the maximum allowable variable interest rate in the Federal Register . In May 2020, the maximum allowable fixed interest rates are 11.25% for 7(a) loans of $25,000 or less; 10.25% for loans over $25,000 but not exceeding $50,000; 9.25% for loans over $50,000 up to and including $250,000; and 8.25% for loans greater than $250,000. Maximum interest rates allowed on variable-rate 7(a) loans are pegged to either the prime rate, the 30-day London Interbank Offered Rate (LIBOR) plus 3%, or the SBA optional peg rate, which is a weighted average of rates that the federal government pays for loans with maturities similar to the guaranteed loan. The allowed spread over the prime rate, LIBOR base rate, or SBA optional peg rate depends on the loan amount and the loan's maturity (under seven years or seven years or more). The adjustment period can be no more than monthly and cannot change over the life of the loan. The 504/CDC loan guaranty program uses Certified Development Companies (CDCs), which are private, nonprofit corporations established to contribute to economic development within their communities. Each CDC has its own geographic territory. The program provides long-term, fixed-rate loans for major fixed assets, such as land, structures, machinery, and equipment. Program loans cannot be used for working capital, inventory, or repaying debt. A commercial lender provides up to 50% of the financing package, which is secured by a senior lien. The CDC's loan of up to 40% is secured by a junior lien. The SBA backs the CDC with a guaranteed debenture. The small business must contribute at least 10% as equity. To participate in the program, small businesses cannot exceed $15 million in tangible net worth and cannot have average net income of more than $5 million for two full fiscal years before the date of application. Also, CDCs must intend to create or retain one job for every $75,000 of the debenture ($120,000 for small manufacturers) or meet an alternative job creation standard if they meet any one of 15 community or public policy goals. Maximum 504/CDC participation in a single project is $5 million and $5.5 million for manufacturers and specified energy-related projects; the minimum is $25,000. There is no limit on the project size. Loan maturity is 10 years for equipment and 20 or 25 years for real estate. Unguaranteed financing may have a shorter term. The maximum fixed interest rate allowed is established when the debenture backing the loan is sold and is pegged to an increment above the current market rate for 5-year and 10-year U.S. Treasury issues. The SBA is authorized to charge CDCs a one-time, up-front guaranty fee of up to 0.5% of the debenture (0.5% in FY2020), an annual servicing fee of up to 0.9375% of the unpaid principal balance (0.3205% for regular 504/CDC loans and 0.322% for 504/CDC debt refinance loans in FY2020), a funding fee (not to exceed 0.25% of the debenture), an annual development company fee (0.125% of the debenture's outstanding principal balance), and a one-time participation fee (0.5% of the senior mortgage loan if in a senior lien position to the SBA and the loan was approved after September 30, 1996). In addition, CDCs are allowed to charge borrowers a processing (or packaging) fee of up to 1.5% of the net debenture proceeds and a closing fee, servicing fee, late fee, assumption fee, Central Servicing Agent (CSA) fee, other agent fees, and an underwriters' fee. In FY2019, the SBA approved 6,099 504/CDC loans to 6,008 small businesses totaling nearly $5.0 billion. In FY2019, 212 CDCs provided at least one 504/CDC loan. During the Great Recession (2007-2009), Congress authorized the SBA to temporarily allow, under specified circumstances, the use of 504/CDC program funds to refinance existing commercial debt (e.g., not from SBA-guaranteed loans) for business expansion under the 504/CDC program. In 2010, Congress authorized, for two years, the expansion of the types of projects eligible for refinancing of existing debt under the 504/CDC program to include projects not involving business expansion, provided the projects met specific criteria. In the 114 th Congress, Congress reinstated the expansion of the types of projects eligible for refinancing under the 504/CDC loan guaranty program in any fiscal year in which the refinancing program and the 504/CDC program as a whole do not have credit subsidy costs. Specifically, each CDC is required to limit its refinancing so that, during any fiscal year, the new refinancing does not exceed 50% of the dollars it loaned under the 504/CDC program during the previous fiscal year. This limitation may be waived if the SBA determines that the refinance loan is needed for good cause. Commercial loans eligible for the 504/CDC Refinancing program being used to finance long-term fixed asset debt cannot have a loan-to-value (LTV) ratio of more than 90% of the fair market value of the eligible fixed asset(s) serving as collateral. Loans that are used to partly refinance eligible business operating expenses (e.g., salaries, rent, utilities) cannot exceed an LTV ratio of more than 85% of the fair market value of the collateral. The fees associated with the 504/CDC Refinancing program are the same as the 504/CDC Loan Guaranty program except the ongoing guaranty servicing fee may vary. In FY2020, the annual guaranty servicing fee is 0.3205% for regular 504/CDC loans and 0.322% for 504/CDC debt refinance loans. In FY2019, the SBA approved 166 refinancing loans totaling $154.8 million. The Microloan program provides direct loans to qualified nonprofit intermediary Microloan lenders that, in turn, provide \"microloans\" of up to $50,000 to small businesses and nonprofit child care centers. Microloan lenders also provide marketing, management, and technical assistance to Microloan borrowers and potential borrowers. The program was authorized in 1991 as a five-year demonstration project and became operational in 1992. It was made permanent, subject to reauthorization, by P.L. 105-135 , the Small Business Reauthorization Act of 1997. Although the program is open to all small businesses, it targets new and early stage businesses in underserved markets, including borrowers with little to no credit history, low-income borrowers, and women and minority entrepreneurs in both rural and urban areas who generally do not qualify for conventional loans or other, larger SBA guaranteed loans. Microloans can be used for working capital and acquisition of materials, supplies, furniture, fixtures, and equipment. Loans cannot be made to acquire land or property. Loan terms are up to seven years. The SBA charges intermediaries an interest rate that is based on the five-year Treasury rate, adjusted to the nearest one-eighth percent (called the Base Rate), less 1.25% if the intermediary maintains a historic portfolio of Microloans averaging more than $10,000 and less 2.0% if the intermediary maintains a historic portfolio of Microloans averaging $10,000 or less. The Base Rate, after adjustment, is called the Intermediary's Cost of Funds. The Intermediary's Cost of Funds is initially calculated one year from the date of the note and is reviewed annually and adjusted as necessary (called recasting). The interest rate cannot be less than zero. On loans of more than $10,000, the maximum interest rate that can be charged to the borrower is the interest rate charged by the SBA on the loan to the intermediary, plus 7.75%. On loans of $10,000 or less, the maximum interest rate that can be charged to the borrower is the interest charged by the SBA on the loan to the intermediary, plus 8.5%. Rates are negotiated between the borrower and the intermediary and typically range from 7% to 9%. The SBA does not charge intermediaries up-front or ongoing service fees under the Microloan program. In FY2019, 5,533 small businesses received a Microloan, totaling $81.5 million. The average Microloan was $14,735 and the average interest rate was 7.5%. Many of the proposals under consideration to address the capital needs of small businesses adversely affected by the COVID-19 pandemic were used to address the severe economic slowdown during and immediately following the Great Recession (2007-2009). The main difference is that given the unique nature of the COVID-19 pandemic's impact on households, especially physical distancing and the resulting decrease in consumer spending, there is an added emphasis today on SBA loan deferrals, loan forgiveness, and expanded eligibility, including, for the first time, specified types of nonprofit organizations. During the 111 th Congress, P.L. 111-5 , the American Recovery and Reinvestment Act of 2009 (ARRA), provided the SBA an additional $730 million, including $375 million to temporarily subsidize the 7(a) and 504/CDC loan guaranty programs' fees ($299 million) and to temporarily increase the 7(a) program's maximum loan guaranty percentage to 90% ($76 million). ARRA also included provisions designed to increase the amount of leverage issued under the SBA's Small Business Investment Company (SBIC venture capital) program. SBICs provide loans and equity investments in small businesses. ARRA's funding for the fee subsidies and 90% maximum loan guaranty percentage was about to be exhausted in November 2009, when Congress passed the first of six laws to provide additional funding to extend the loan subsidies and 90% maximum loan guaranty percentage. P.L. 111-118 , the Department of Defense Appropriations Act, 2010, provided the SBA $125 million to continue the fee subsidies and 90% maximum loan guaranty percentage through February 28, 2010. P.L. 111-144 , the Temporary Extension Act of 2010, provided the SBA $60 million to continue the fee subsidies and 90% maximum loan guaranty percentage through March 28, 2010. P.L. 111-150 , an act to extend the Small Business Loan Guarantee Program, and for other purposes, provided the SBA authority to reprogram $40 million in previously appropriated funds to continue the fee subsidies and 90% maximum loan guaranty percentage through April 30, 2010. P.L. 111-157 , the Continuing Extension Act of 2010, provided the SBA $80 million to continue the SBA's fee subsidies and 90% maximum loan guaranty percentage through May 31, 2010. P.L. 111-240 , the Small Business Jobs Act of 2010, provided $505 million (plus an additional $5 million for administrative expenses) to continue the SBA's fee subsidies and 90% maximum loan guaranty percentage from the act's date of enactment (September 27, 2010) through December 31, 2010. P.L. 111-322 , the Continuing Appropriations and Surface Transportation Extensions Act, 2011, authorized the SBA to use funds provided under the Small Business Jobs Act of 2010 to continue the SBA's fee subsidies and 90% maximum loan guaranty percentage through March 4, 2011, or until available funding is exhausted. On January 3, 2011, the SBA announced that the fee subsidies and 90% maximum guarantee percentage ended because funding for these enhancements had been exhausted. In addition to providing additional funding for fee subsidies, P.L. 111-240 , among other provisions increased the 7(a) program's gross loan limit from $2 million to $5 million; increased the 504/CDC Program's loan limits from $1.5 million to $5 million for \"regular\" borrowers, from $2 million to $5 million if the loan proceeds are directed toward one or more specified public policy goals, and from $4 million to $5.5 million for manufacturers; temporarily expanded for two years the eligibility for low-interest refinancing under the SBA's 504/CDC program for qualified debt; temporarily increased for one year the SBAExpress Program's loan limit from $350,000 to $1 million (expired on September 26, 2011); increased the Microloan Program's loan limit for borrowers from $35,000 to $50,000; and increased the loan limits for Microloan intermediaries after their first year in the program from $3.5 million to $5 million; authorized the U.S. Treasury to make up to $30 billion of capital investments for a Small Business Lending Fund ($4 billion was issued); authorized to be appropriated $1.5 billion for the State Small Business Credit Initiative Program; authorized a three-year Intermediary Lending Pilot Program to allow the SBA to make direct loans to not more than 20 eligible nonprofit lending intermediaries each year totaling not more than $20 million. The intermediaries, in turn, would be allowed to make loans to new or growing small businesses, not to exceed $200,000 per business; established an alternative size standard for the 7(a) and 504/CDC loan programs to enable more small businesses to qualify for assistance; and provided small businesses with about $12 billion in tax relief. There were also efforts during the 111 th and 112 th Congresses to require the SBA to reinstate direct lending to small businesses. During the 111 th Congress H.R. 3854 , the Small Business Financing and Investment Act of 2009, was passed by the House on October 29, 2009, by a vote of 389-32. It would have authorized a temporary SBA direct lending program. During the 112 th Congress H.R. 3007 , the Give Credit to Main Street Act of 2011, introduced on September 21, 2011, and referred to the House Committee on Small Business, would have authorized the SBA to provide direct loans to small businesses that have been in operation as a small business for at least two years prior to its application for a direct loan. The maximum loan amount would have been the lesser of 10% of the firm's annual revenues or $500,000. H.R. 5835 , the Veterans Access to Capital Act of 2012, introduced on May 18, 2012, and referred to the House Committee on Small Business, would have authorized the SBA to provide up to 20% of the annual amount available for guaranteed loans under the 7(a) and 504/CDC loan guaranty programs, respectively, in direct loans to veteran-owned and -controlled small businesses. During the 111 th Congress (2009-2010), there was a consensus in Congress that the federal government had to take decisive action to address the capital needs of small businesses, primarily as a means to promote job retention and creation. Similar sentiments are being expressed today as Congress considers proposals to assist small businesses adversely affected by the COVID-19 pandemic. Many Members of Congress argued during the 111 th Congress that the SBA should be provided additional resources to assist small businesses in acquiring capital necessary to start, continue, or expand operations with the expectation that in so doing small businesses will create jobs. Others worried about the long-term adverse economic effects of spending programs that increase the federal deficit. They advocated business tax reduction, reform of financial credit market regulation, and federal fiscal restraint as the best means to help small businesses further economic growth and job creation. Given the coronavirus's widespread adverse economic impact, including productivity losses, supply chain disruptions, labor dislocation, and financial pressure on businesses and households, there has been relatively little concern expressed about federal fiscal restraint during the current pandemic. The debate has been primarily over which specific policies would have the greatest impact and which types of small businesses and small business owners should be helped the most. As mentioned, many of the enhancements to the SBA's capital access programs that were made during the 111 th Congress, such as increasing loan limits, providing fee subsidies, increasing loan guaranty percentages, and expanding eligibility criteria are being considered again. These changes had a demonstrated impact on small business lending during and immediately following the Great Recession. SBA lending increased. For example, the SBA's OIG found that SBA 7(a) loan approvals increased 39% and 504/CDC loan approval increased 73% from March to July 2009, largely due to ARRA's fee reductions and increased loan guarantee percentages. Lending volume remained below pre-recession levels, but was much higher than before the fee reductions and increase in the loan guarantee percentage were implemented. The OIG also noted that the increased loan volume \"may be impacting Agency staffing requirements and program risk.... Without adequate training and supervision, the increased demands on loan center staff could impact the quality of Agency loan reviews.\" Also, in 2012, the SBA issued a press release lauding P.L. 111-240 's impact on SBA loan volume: With loan volume steadily increasing for the past six quarters, the U.S. Small Business Administration's loan programs posted the second largest dollar volume ever in FY 2012, supporting $30.25 billion in loans to small businesses. That amount was surpassed only by FY 2011, which was heavily boosted by the loan incentives under the Small Business Jobs Act of 2010. The data demonstrate that ARRA and the Small Business Jobs Act of 2010 helped small businesses access capital. However, because the SBA primarily gathers data on program output (e.g., loan volume, number of small businesses served, default rates) as opposed to program outcomes (e.g., small business solvency, job creation, wealth generation) it is difficult to know how effective these programs were in assisting small businesses or if other approaches might have produced better (or different) results. Among the lessons learned from earlier small business stimulus packages is that additional funding for the SBA OIG to conduct oversight of the SBA's implementation of stimulus changes could help Congress in its oversight responsibilities. Additional funding for the SBA OIG to conduct investigations of potentially fraudulent behaviors by borrowers and lenders could also prove useful in deterring fraud, waste, and abuse. In addition, requiring the SBA to periodically report to Congress and on its website both output and outcome performance data could help Congress in its oversight responsibilities and assure the public that the taxpayer's dollars are being spent both efficiently and effectively. The SBA has provided technical and managerial assistance to small businesses since it began operations in 1953. Initially, the SBA provided its own small business management and technical assistance training programs. Over time, the SBA has relied increasingly on third parties to provide that training. Congressional interest in the SBA's management and technical assistance training programs has increased in recent years, primarily because these programs are viewed as a means to assist small businesses create and retain jobs. The FY2020 budget appropriated $239 million, funding about 14,000 resource partners, including 63 lead small business development centers (SBDCs) and nearly 900 SBDC local outreach locations, 125 women's business centers (WBCs), and 350 chapters of the mentoring program, SCORE. The SBA reports that nearly a million aspiring entrepreneurs and small business owners receive mentoring and training from an SBA-supported resource partner each year. Most of this training is free, and some is offered at low cost. The Department of Commerce also provides management and technical assistance training for small businesses. For example, its Minority Business Development Agency provides training to minority business owners to assist them in obtaining contracts and financial awards. SBDCs provide free or low-cost assistance to small businesses using programs customized to local conditions. SBDCs support small businesses in marketing and business strategy, finance, technology transfer, government contracting, management, manufacturing, engineering, sales, accounting, exporting, and other topics. SBDCs are funded by SBA grants and matching funds equal to the grant amount. SBDC funding is allocated on a pro rata basis among the states (including the District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin Islands, Guam, and American Samoa) by a statutory formula \"based on the percentage of the population of each State, as compared to the population of the United States.\" If, as is currently the case, SBDC funding exceeds $90 million, the minimum funding level is \"the sum of $500,000, plus a percentage of $500,000 equal to the percentage amount by which the amount made available exceeds $90 million.\" There are 63 lead SBDC service centers, one located in each state (four in Texas and six in California), the District of Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, and American Samoa. These centers manage more than 900 SBDC outreach locations. In FY2020, the SBA was provided $135 million for SBDC grants through the regular appropriations process and an additional $192 million in supplemental funding for SBDC grants in the CARES Act. In FY2019, SBDCs provided technical assistance training and counseling services to 254,821 unique SBDC clients, and 17,810 new businesses were started largely as a result of SBDC training and counseling. Congress authorized the SBA's Microloan lending program in 1991 ( P.L. 102-140 , the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations Act, 1992) to address the perceived disadvantages faced by women, low-income, veteran, and minority entrepreneurs and business owners gaining access to capital to start or expand their business. The program became operational in 1992. Initially, the SBA's Microloan program was authorized as a five-year demonstration project. It was made permanent, subject to reauthorization, by P.L. 105-135 , the Small Business Reauthorization Act of 1997. The SBA's Microloan Technical Assistance Program is affiliated with the SBA's Microloan lending program but receives a separate appropriation. This program provides grants to Microloan intermediaries for management and technical training assistance to Microloan program borrowers and prospective borrowers. There are currently 144 active Microloan intermediaries serving 49 states, the District of Columbia, and Puerto Rico. Under the Microloan program, intermediaries are eligible to receive a Microloan technical assistance grant \"of not more than 25% of the total outstanding balance of loans made to it.\" Grant funds may be used only to provide marketing, management, and technical assistance to Microloan borrowers, and no more than 50% of the funds may be used to provide such assistance to prospective Microloan borrowers and no more than 50% of the funds may be awarded to third parties to provide that technical assistance. Grant funds also may be used to attend required training. In most instances, intermediaries must contribute, solely from nonfederal sources, an amount equal to 25% of the grant amount. In addition to cash or other direct funding, the contribution may include indirect costs or in-kind contributions paid for under nonfederal programs. The SBA does not require Microloan borrowers to participate in the Microloan Technical Assistance Program. However, intermediaries typically require Microloan borrowers to participate in the training program as a condition of the receipt of a microloan. Combining loan and intensive management and technical assistance training is one of the Microloan program's distinguishing features. The SBA was provided $34.5 million for Microloan Technical Assistance grants in FY2020. The WBC Renewable Grant Program was initially established by P.L. 100-533 , the Women's Business Ownership Act of 1988, as the Women's Business Demonstration Pilot Program, targeting the needs of socially and economically disadvantaged women. The act directed the SBA to provide financial assistance to private, nonprofit organizations to conduct demonstration projects giving financial, management, and marketing assistance to small businesses, including start-up businesses, owned and controlled by women. The WBC program was expanded and provided permanent legislative status by P.L. 109-108 , the Science, State, Justice, Commerce, and Related Agencies Appropriations Act, 2006. Since the program's inception, the SBA has awarded WBCs a grant of up to $150,000 per year. WBC initial grants are currently awarded for up to five years, consisting of a base period of 12 months from the date of the award and four 12-month option periods. The SBA determines if the option periods are exercised and makes that determination subject to the continuation of program authority, the availability of funds, and the recipient organization's compliance with federal law, SBA regulations, and the terms and conditions specified in a cooperative agreement. WBCs that successfully complete the initial five-year grant period may apply for an unlimited number of three-year funding intervals. During their initial five-year grant period, WBCs are required to provide a nonfederal match of one nonfederal dollar for each two federal dollars in years one and two (1:2), and one nonfederal dollar for each federal dollar in years three, four, and five (1:1). After the initial five-year grant period, the matching requirement in subsequent three-year funding intervals is not more than 50% of federal funding (1:1). The nonfederal match may consist of cash, in-kind, and program income. Today, there are 125 WBCs located throughout most of the United States and the territories. In FY2019, WBCs provided technical assistance training and counseling services to 64,527 unique WBC clients, and 2,087 new businesses were started largely as a result of WBC training and counseling. In FY2020, the SBA was provided $22.5 million for WBC grants in the regular appropriations process and an additional $48 million in supplemental funding for WBC grants in the CARES Act. SCORE was established on October 5, 1964, by then-SBA Administrator Eugene P. Foley as a national, volunteer organization, uniting more than 50 independent nonprofit organizations into a single, national nonprofit organization. The SBA currently provides grants to SCORE to provide in-person mentoring, online training, and \"nearly 9,000 local training workshops annually\" to small businesses. SCORE's 350 chapters and more than 800 branch offices are located throughout the United States and partner with more than 10,000 volunteer counselors, who are working or retiredÂ business owners, executives and corporate leaders, to provide management and training assistance to small businesses \"at no charge or at very low cost.\" In FY2019, SCORE provided technical assistance training and counseling services to 195,242 unique SCORE clients, and 480 new businesses were started largely as a result of SCORE training and counseling. In FY2020, the SBA was provided $11.7 million for SCORE grants. Congress provided additional funding for SBA entrepreneurial development programs during and immediately following the Great Recession. For example, ARRA provided an additional $24 million for Microloan Technical Assistance grants. The Small Business Jobs Act of 2010 provided SBDCs an additional $50 million and temporarily waived SBDC, Microloan Technical Assistance, and WBC matching requirements. Similar proposals have been made to address the COVID-19 pandemic. For example, S. 3518 , the COVID-19 RELIEF for Small Businesses Act of 2020, as introduced, would provide an additional $150 million for SBA's entrepreneurial development programs, including $40 million for SBDCs, $18.75 for WBCs, $1 million to SCORE, and $50 million for M icroloan T echnical A ssistance grants . The bill also would waive SBDC , Microloan Technical Assistance, and WBC grant matching requirements . The CARES Act appropriates $265 million for entrepreneurial development programs ($192 million for SBDCs, $48 million for WBCs, and $25 million for SBA resource partners to provide online information and training). The act also waives SBDC and WBC matching requirements. Congress could require the SBA's resource partners to report to the SBA both output and outcome performance data for these grants and to require the SBA to report that information to Congress and make that information available to the public on the SBA website. Federal agencies are required to facilitate the maximum participation of small businesses as prime contractors, subcontractors, and suppliers. For example, federal agencies are generally required to reserve contracts that have an anticipated value greater than the micro-purchase threshold (currently $10,000), but not greater than the simplified acquisition threshold (currently $250,000) exclusively for small businesses unless the contracting officer is unable to obtain offers from two or more small businesses that are competitive with market prices and the quality and delivery of the goods or services being purchased. Several SBA programs assist small businesses in obtaining and performing federal contracts and subcontracts. These include various prime contracting programs, subcontracting programs, and other assistance (e.g., contracting technical training assistance and oversight of the federal small business goaling program and the Surety Bond Guarantee program). The SBA's 8(a) Minority Small Business and Capital Ownership Development Program provides business development assistance to businesses owned and controlled by persons who are socially and economically disadvantaged, have good character, and demonstrate a potential for success. Although the 8(a) Program was originally established in the 1980s for the benefit of disadvantaged individuals, Congress expanded the program to include small businesses owned by four disadvantaged groups. Small businesses owned by Alaska Native Corporations (ANCs), Community Development Corporations (CDCs), Indian tribes, and Native Hawaiian Organizations (NHOs) are also eligible to participate in the 8(a) Program under somewhat different requirements. Federal agencies are authorized to award contracts for goods or services, or to perform construction work, to the SBA for subcontracting to 8(a) firms. The SBA is authorized to delegate the function of executing contracts to the procuring agencies and often does so. Once the SBA has accepted a contract for the 8(a) Program, the contract is awarded through either a restricted competition limited to just 8(a) participants (a set aside) or on a sole source basis, with the contract amount generally determining the acquisition method used. For individually owned small businesses, when the contract's anticipated total value, including any options, is less than $4 million ($7 million for manufacturing contracts), the contract is normally awarded without competition (as a sole source award). In contrast, when the contract's anticipated value exceeds these thresholds, the contract generally must be awarded via a set aside with competition limited to 8(a) firms so long as there is a reasonable expectation that at least two eligible and responsible 8(a) firms will submit offers and the award can be made at fair market price. Similar to other participants, firms owned by ANCs, CDCs, NHOs, and Indian tribes are eligible for 8(a) set asides and may receive sole source awards valued at less than $4 million ($7 million for manufacturing contracts). However, firms owned by ANCs and Indian tribes can also receive sole source awards in excess of $4 million ($7 million for manufacturing contracts) even when contracting officers reasonably expect that at least two eligible and responsible 8(a) firms will submit offers and the award can be made at fair market price. NHO-owned firms may receive sole source awards from the Department of Defense under the same conditions. The 8(a) program is designed to help federal agencies achieve their statutory goal of awarding at least 5% of their federal contracting dollars to small disadvantaged businesses. In FY2018, the federal government awarded $29.5 billion to 8(a) firms. The SBA oversees the Historically Underutilized Business Zones (HUBZones) Program. The program assists small businesses located in HUBZone-designated areas through set asides, sole source awards (so long as the award can be made at a fair and reasonable price, and the anticipated total value of the contract, including any options, is below $4 million, or $7 million for manufacturing contracts) and price evaluation preferences (of up to 10%) in full and open competitions. The HUBZone program targets assistance to small businesses located in areas with low income, high poverty, or high unemployment. To be certified as a HUBZone small business, at least 35% of the small business's employees must generally reside in a HUBZone. The HUBZone contracting program is designed to help federal agencies achieve their statutory goal of awarding at least 3% of their federal contracting dollars to HUBZone small businesses. In FY2018, the federal government awarded $9.8 billion to HUBZone-certified small businesses. The SBA oversees the Service-Disabled Veteran-Owned Small Business (SDVOSB) Program. The program allows agencies to set aside contracts for SDVOSBs. Federal agencies may award sole source contracts to SDVOSBs so long as the award can be made at a fair and reasonable price, and the anticipated total value of the contract, including any options, is below $4 million ($6.5 million for manufacturing contracts). For purposes of this program, veterans with service-related disabilities are defined as they are under the statutes governing veterans affairs. The SDVOSB contracting program is designed to help federal agencies achieve their statutory goal of awarding at least 3% of their federal contracting dollars to SDVOSBs. In FY2018, the federal government awarded $22.5 billion to SDVOSBs. The SBA oversees the Women-Owned Small Businesses (WOSB) Program. Under this program, federal contracting officers may set aside federal contracts (or orders) for WOSBs and Economically Disadvantaged Women-Owned Small Businesses (EDWOSBs) in industries in which the SBA determines WOSBs are substantially underrepresented in federal procurement. Federal contracting officers can also set aside federal contracts for EDWOSBs exclusively in industries in which the SBA determines WOSBs are underrepresented in federal procurement. The WOSB Program is designed to help federal agencies achieve their statutory goal of awarding at least 5% of their federal contracting dollars to WOSBs. Federal agencies may award sole source contracts to WOSBs so long as the award can be made at a fair and reasonable price, and the anticipated total value of the contract, including any options, is below $4 million ($6.5 million for manufacturing contracts). In FY2018, the federal government awarded $23.4 billion to WOSBs. The SBA's Surety Bond Guarantee Program has been operational since April 1971. It is designed to increase small business' access to federal, state, and local government contracting, as well as private sector contracting, by guaranteeing bid, performance, payment, and specified ancillary bonds \"on contracts â¦ for small and emerging contractors who cannot obtain bonding through regular commercial channels.\" The program guarantees individual contracts of up to $6.5 million, and up to $10 million for federal contracts if a federal contracting officer certifies that such a guarantee is necessary. The $6.5 million limit is periodically adjusted for inflation. The SBA's guarantee currently ranges from 80% to 90% of the surety's loss if a default occurs. In FY2019, the SBA guaranteed 9,905 bid and final surety bonds (a payment bond, performance bond, or both a payment and performance bond) with a total contract value of nearly $6.5 billion. A surety bond is a three-party instrument between a surety (who agrees to be responsible for the debt or obligation of another), a contractor, and a project owner. The agreement binds the contractor to comply with the contract's terms and conditions. If the contractor is unable to successfully perform the contract, the surety assumes the contractor's responsibilities and ensures that the project is completed. Surety bonds encourage project owners to contract with small businesses that may not have the credit history or prior experience of larger businesses and may be at greater risk of failing to comply with the contract's terms and conditions. Surety bonds are important to small businesses interested in competing for federal contracts because the federal government requires prime contractorsâprior to the award of a federal contract exceeding $150,000 for the construction, alteration, or repair of any building or public work of the United Statesâto furnish a performance bond issued by a surety satisfactory to the contracting officer in an amount that the officer considers adequate to protect the government. Congress included enhancements for small business contracting in both ARRA (increased funding and higher maximum bond amounts for the SBA Surety Bond program) and the Small Business Jobs Act of 2010 (new restrictions on the consolidation or bundling of contracts that make it more difficult for small businesses to be awarded the contract). The CARES Act authorizes federal agencies to modify a contract's terms and conditions to reimburse contractorsâat the minimum billing rate not to exceed an average of 40 hours per weekâfor any paid leave (including sick leave) the contractor provides to keep its employees or subcontractors in a ready state through September 30, 2020. Eligible contractors are those whose employees or subcontractors cannot perform work on a federally-approved site due to facility closures or other restrictions because of COVID-19 and cannot telework because their job duties cannot be performed remotely. In response to the Great Recession, Congress took a number of actions to enhance small businesses' access to capital, management and training programs, and contracting opportunities. The goal then, as it is now, was to provide small businesses with the resources necessary to survive the economic downturn and retain or create jobs. Some of the CARES Act's provisions (e.g., fee waivers, increased loan limits, and increased guarantee percentages) were used in legislation passed during the 111 th Congress to address the severe economic slowdown during and immediately following the Great Recession (2007-2009). The main difference between that legislation and the CARES Act is that the CARES Act includes loan deferrals, loan forgiveness, and greatly expanded eligibility, including, for the first time, specified types of nonprofit organizations. The CARES Act's inclusion of loan deferral and forgiveness is, at least partly, due to the unique economic dislocations and reduction in consumer spending resulting from individuals and households engaging in physical distancing to avoid COVID-19 infection. As mentioned, because COVID-19's adverse economic impact is so widespread, including productivity losses, supply chain disruptions, labor dislocation, and financial pressure on businesses and households, there has been relatively little concern expressed about federal fiscal restraint during the current pandemic. The debate has been primarily over which specific policies would have the greatest impact and which types of small businesses and small business owners should be helped the most. Among the lessons learned from the 111 th Congress is the potential benefits that can be derived from providing additional funding for the SBA's Office of Inspector General and the Government Accountability Office. GAO and the SBA's OIG can provide Congress information that could prove useful as Congress engages in congressional oversight of the SBA's administration of the CARES Act, provide an early warning if unforeseen administrative problems should arise, and, through investigations and audits, serve as a deterrent to fraud. Requiring the SBA to report regularly on its implementation of the CARES Act could also promote transparency and assist Congress in performing its oversight responsibilities. In addition, requiring output and outcome performance measures and requiring the SBA to report this information directly to both Congress and the public by posting that information on the SBA's website could enhance both congressional oversight and public confidence in the SBA's efforts to assist small businesses. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136) established a Paycheck Protection Program (PPP) to provide \"covered loans\" with a 100% SBA loan guarantee, a maximum term of 10 years, and an interest rate not to exceed 4% to assist small businesses and other organizations adversely affected by the Coronavirus Disease 2019 (COVID-19). The SBA announced that PPP loans will have a two-year term at a 1.0% interest rate; defines a covered loan as a loan made to an eligible recipient from February 15, 2020, through June 30, 2020; waives the up-front loan guarantee fee and annual servicing fee, the no credit elsewhere requirement, and the requirements for collateral and a personal guarantee for a covered loan; expands eligibility for a covered loan to include 7(a) eligible businesses and any business, 501(c)(3) nonprofit organization, 501(c)(19) veteran's organization, or tribal business not currently eligible that has not more than 500 employees or, if applicable, the SBA's size standard in number of employees for the industry in which they operate. Sole proprietors, independent contractors, and eligible self-employed individuals are also eligible to receive a covered loan; increases the maximum loan amount for a covered loan to the lesser of (1) 2.5 times the average total monthly payments by the applicant for payroll costs incurred during the one-year period before the date on which the loan is made plus the outstanding balance of any 7(a) loan (made on or after January 31, 2020) that is refinanced as part of a covered loan, or (2) $10 million; allows borrowers to refinance 7(a) loans (made on or after January 31, 2020) as part of a covered loan; specifies that covered loans are nonrecourse (meaning that the SBA cannot pursue collections actions against the recipient(s) in the case of nonpayment) except to the extent that the covered loan proceeds are used for nonauthorized purposes; allows covered loans to be used for payroll costs, costs related to the continuation of group health care benefits during periods of paid sick, medical, or family leave, and insurance premiums, employee salaries, commissions, or similar compensations, mortgage payments, rent, utilities, and interest on any other debt obligations that were incurred before the covered period; expands lender delegated loan approval authority for making covered loans to all 7(a) lenders to expedite PPP loan processing; requires lenders, when evaluating borrower eligibility for a covered loan, to consider whether the borrower was in operation on February 15, 2020, had employees for whom the borrower paid salaries and payroll taxes, and paid independent contractors; requires borrowers to, among other acknowledgements, make a good faith certification that the covered loan is needed because of the uncertainty of current economic conditions and to support ongoing operations, and acknowledge that the funds will be used to retain workers, maintain payroll, or make mortgage payments, lease payments, and utility payments; requires lenders to provide \"impacted borrowers\" adversely affected by COVID-19 \"complete payment deferment relief\" on a covered PPP loan for not less than six months and not more than one year if the borrower was in operation on February 15, 2020, and has an application for a covered loan approved or pending approval on or after the date of enactment. The SBA announced that covered loan payments will be deferred for six months. However, interest will continue to accrue on these loans during the six-month deferment; presumes that each eligible recipient that applies for a PPP loan is an impacted borrower and authorizes the SBA Administrator to purchase covered loans sold on the secondary market so that affected borrowers may receive a deferral for not more than one year. The SBA has announced that the deferment relief on covered loans will be for six months; provides for the forgiveness of covered loan amounts equal to the amount the borrower spent during an 8-week period after the loan's origination date on payroll costs, interest payment on any mortgage incurred prior to February 15, 2020, payment of rent on any lease in force prior to February 15, 2020, and payment on any utility for which service began before February 15, 2020. The amount of loan forgiveness cannot exceed the covered loan's principal amount. The forgiveness is reduced proportionally by formulas related to the borrower's retention of full-time equivalent employees compared to the borrower's choice of either: (1) the period beginning on February 15, 2019, and ending on June 30, 2019, or (2) January 1, 2020, and February 29, 2020; and by the amount of any reduction in pay of any employee beyond 25% of their salary or wages during the most recent full quarter before the covered period. Borrowers that re-hire workers previously laid off will not be penalized for having a reduced payroll at the beginning of the period. Cancelled debt resulting from loan forgiveness would not be included in the borrower's taxable federal income; The SBA has announced that due to likely high subscription, at least 75% of the forgiven loan amount must have been used for payroll; requires the SBA to pay the principal, interest, and any associated fees that are owed on an existing 7(a), 504/CDC, or Microloan that is in a regular servicing status for a six-month period starting on the next payment due. Loans that are already on deferment will receive six months of payment by the SBA beginning with the first payment after the deferral period. Loans made up until six months after enactment will also receive a full six months of SBA loan payments; requires federal banking agencies or the National Credit Union Administration Board applying capital requirements under their respective risk-based capital requirements to provide a covered loan with a 0%-risk weight; increases the SBA's lending authorization under Section 7(a) of the Small Business Act from $30 billion to $349 billion during the covered period; increases the SBAExpress loan limit from $350,000 to $1 million (reverts to $350,000 on January 1, 2021); permanently eliminates the zero subsidy requirement to waive SBAExpress loan fees for veterans; appropriates $349 billion for loan guarantees and subsidies (remaining available through FY2021), $675 million for the SBA's salaries and expenses account, $25 million for the SBA's Office of Inspector General (OIG), $265 million for entrepreneurial development programs ($192 million for SBDCs, $48 million for WBCs, and $25 million for SBA resource partners to provide online information and training), $17 billion for subsidies for certain loan payments, and $10 million for the Department of Commerce's Minority Business Development Agency; allows the period of use of FY2018 and FY2019 grant awards made under the State Trade Expansion Program (STEP) through FY2021; reimburses (up to the grant amount received) STEP award recipients for financial losses relating to a foreign trade mission or a trade show exhibition that was cancelled solely due to a public health emergency declared due to COVID-19; waives SBDC and WBC matching requirements; requires federal agencies to continue to pay small business contractors and revise delivery schedules, holding small contractors harmless for being unable to perform a contract due to COVID-19 caused interruptions until September 2021; requires federal agencies to promptly pay small business prime contractors and requires prime contractors to promptly pay small business subcontractors within 15 days, notwithstanding any other provision of law or regulation, for the duration of the President invoking the Defense Production Act in response to COVID-19; and provides SBA Emergency Injury Disaster Loan (EIDL) enhancements during the covered period of January 31, 2020, through December 31, 2020, including expanding eligibility beyond currently eligible small businesses, private nonprofit organizations, and small agricultural cooperatives, to include startups, cooperatives, and eligible ESOPs (employee stock ownership plans) with not more than 500 employees, sole proprietors, and independent contractors; authorizing the SBA Administrator, in response to economic injuries caused by COVID-19, to waive the no credit available elsewhere requirement, approve an applicant based solely on their credit score, not require applicants to submit a tax return or tax return transcript for approval, waive any rules related to the personal guarantee on advances and loans of not more than $200,000, waive the requirement that the applicant needs to be in business for the one-year period before the disaster declaration, except that no waiver may be made for a business that was not in operation on January 31, 2020; authorizing the SBA Administrator, through December 31, 2020, to provide up to $10,000 as an advance payment in the amount requested within three days after receiving an EIDL application from an eligible entity. Applicants are not required to repay the advance payment, even if subsequently denied an EIDL loan. The funds may be used for any eligible EIDL expense, including, among other expenses, providing paid sick leave to employees unable to work due to COVID-19, maintaining payroll to retain employees, and meeting increased costs to obtain materials due to supply chain disruptions. The SBA limited EIDL-advance payments to $1,000 per employee, up to a maximum of $10,000; and appropriating an additional $10 billion for EIDL assistance. The Paych eck Protection Program and Health Care Enhancement Act ( P.L. 116-139 ) increases the SBA's lending authorization under Section 7(a) of the Small Business Act from $349 billion during the covered period to $659 billion; requires that no less than $30 billion of this authorization amount be set aside for loans issued by insured depository institutions and credit unions with consolidated assets of $10 billion to $50 billion; requires that no less than $30 billion of this authorization amount be set aside for loans issued by community financial institutions (including community development financial institutions (CDFIs), minority depository institutions, SBA-certified development companies, and SBA microloan intermediaries), and insured depository institutions and credit unions with consolidated assets less than $10 billion; increases the PPP appropriation amount from $349 billion to $670.335 billion; appropriates an additional $50 billion for EIDL loans; appropriates an additional $10 billion for Emergency EIDL grants; appropriates an additional $2.1 billion for the SBA's salaries and expenses account (to remain available until September 30, 2021); and provides agricultural enterprises eligibility for Emergency EIDL grants and EIDL loans during the covered period (January 31, 2020 through December 31, 2020). The Health and Economic Recovery Omnibus Emergency Solutions Act (HEROES Act; H.R. 6800 ) H.R. 6800 , would, among other provisions: expand the PPP loan covered period from June 30, 2020, to December 31, 2020; extend PPP eligibility to all 501(c) nonprofit organizations of all sizes; establish a minimum PPP loan maturity of five years; require, as of the date of enactment, that 25% of existing PPP funds be issued to small businesses with 10 or fewer employees; 25% of existing funds be issued to nonprofit organizations, with at least half of this amount going to nonprofit organizations with not more than 500 employees; and the lesser of 25% of existing PPP funds or $10 billion be issued to community financial institutions, such as Community Development Financial Institutions (CDFIs), SBA microloan intermediaries, and SBA-certified development companies; establish technical assistance grants for small community financial institutions with assets of less than $10 billion; bifurcate the SBA's lending authority for the 7(a) and PPP programs; increase the SBA's 7(a) loan authorization amount from $30 billion to $75 billion for FY2020; provide SCORE and veterans business outreach centers eligibility for $10 million each from the CARES Act's $265 million entrepreneurial development resource partners grant program; amend the PPP loan forgiveness by extending the 8-week period to the earlier of 24 weeks or December 31, 2020, mandate loan forgiveness data collection and reporting, and eliminate the 75%/25% rule on the use of loan proceeds; allow certain previously incarcerated individuals to be approved for PPP and SBA disaster loans; temporarily increase, for FY2020, the 7(a) loan program guaranty from up to 75% for loans with an outstanding loan balance exceeding $150,000 and 85% for loans with an outstanding loan balance of $150,000 or less to 90% of the outstanding loan balance; temporarily increase, through December 31, 2020, the SBAExpress loan guaranty from not more than 50% of the outstanding loan balance to not more than 90% of the outstanding loan balance on loans up to $350,000 and not more than 75% of the outstanding loan balance on loans greater than $350,000; temporarily reduce, for FY2020, 7(a) and 504/CDC fees to the maximum extent possible given available appropriations; temporarily increase, for FY2020, the maximum 7(a) loan amount from $5 million to $10 million and the maximum 504/CDC loan amount from $5.5 million to $10 million; and permanently increase the 504/CDC maximum loan amount for small manufacturers from $5.5 million to $10 million; authorize, for each of fiscal years 2021-2025, $80 million for Microloan technical assistance grants and $110 million for Microloan; and authorize to be appropriated during FY2020, to remain available until expended, $50 million for Microloan technical assistance grants and $7 million for Microloans; appropriate $500 million for fee reductions and guaranty and maximum loan amount increases; and appropriate $10 billion for Emergency EIDL grants.", "summary": "The U.S. Small Business Administration (SBA) administers several types of programs to support small businesses, including direct disaster loan programs for businesses, homeowners, and renters to assist their recovery from natural disasters; loan guaranty and venture capital programs to enhance small business access to capital; small business management and technical assistance training programs to assist business formation and expansion; and contracting programs to increase small business opportunities in federal contracting. Congressional interest in these programs has always been high, primarily because small businesses are viewed as a means to stimulate economic activity and create jobs, but it has become especially acute in the wake of the Coronavirus Disease 2019 (COVID-19) pandemic's widespread adverse economic impact on the national economy, including productivity losses, supply chain disruptions, major labor dislocation, and significant financial pressure on both businesses and households. This report provides a brief description of the SBA's programs, examines congressional action to assist small businesses during and immediately following the Great Recession (2007-2009), and discusses legislation to assist small businesses adversely affected by the COVID-19 pandemic, including P.L. 116-123 , the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020, which provided the SBA an additional $20 million for SBA disaster assistance administrative expenses and deemed the coronavirus to be a disaster under the SBA's Economic Injury Disaster Loan (EIDL) program. This change made economic injury from the coronavirus an eligible EIDL expense. P.L. 116-136 , the Coronavirus Aid, Relief, and Economic Security Act (CARES Act), which, among other provisions, created the Paycheck Protection Program (PPP) to provide \"covered loans\" with a 100% SBA loan guarantee, a maximum term of 10 years, and an interest rate not to exceed 4% to assist small businesses, small 501(c)(3) nonprofit organizations, and small 501(c)(19) veterans organizations that have been adversely affected by COVID-19. The act also provides for loan deferment and forgiveness under specified conditions. A c overed loan is defined as a loan made to an eligible recipient from February 15, 2020, through June 30, 2020. The SBA announced that PPP loans will have a two-year term at an interest rate of 1.0%. P.L. 116-139 , the Paycheck Protection Program and Health Care Enhancement Act (Enhancement Act), among other provisions, appropriates an additional $321.335 billion for the PPP. H.R. 6800 , the Health and Economic Recovery Omnibus Emergency Solutions Act (HEROES Act), among other provisions, would expand PPP eligibility and provide small businesses additional flexibility by extending the PPP loan forgiveness covered period from eight weeks to the earlier of 24 weeks or December 31, 2020 . Some of the CARES Act's provisions (e.g., fee waivers, increased loan limits, and increased guarantee percentages) were used in legislation passed during the 111 th Congress to address the severe economic slowdown during and immediately following the Great Recession (2007-2009). The main difference between that legislation and the CARES Act is that the CARES Act includes loan deferrals, loan forgiveness, and greatly expanded eligibility, including, for the first time, specified types of nonprofit organizations. The SBA started accepting PPP loan applications on April 3, 2020. Because the SBA neared its $349 billion authorization limit for section 7(a) lending, which includes the PPP, the SBA stopped accepting new PPP loan applications on April 15. The SBA started accepting PPP loan applications once again on April 27, following the Enhancement Act's enactment on April 24, 2020. The act increased the SBA's section 7(a) loan authorization limit from $349 billion to $659 billion, and appropriated an additional $321.335 billion to support that level of lending. One lesson learned from the actions taken during the 111 th Congress to assist small businesses during and immediately following the Great Recession is the potential benefits that can be derived from providing additional funding for the SBA's Office of Inspector General (OIG) and the Government Accountability Office (GAO). GAO and the SBA's OIG can provide Congress information that could prove useful as Congress engages in congressional oversight of the SBA's administration of legislation to address COVID-19's adverse economic impact on small businesses, provide an early warning if unforeseen administrative problems should arise, and, through investigations and audits, serve as a deterrent to fraud. Requiring the SBA to report regularly on its implementation of the CARES Act could promote transparency and assist Congress in performing its oversight responsibilities. In addition, requiring both output and outcome performance measures and requiring the SBA to report this information to Congress and the public by posting that information on the SBA's website could enhance congressional oversight and public confidence in the SBA's efforts to assist small businesses.", "document_type": "crs"}
{"report": "The federal law regulating flags (\"flag code\") sets forth guidelines for private citizens on the appearance and display of the U.S. flag (\"flag\"). The flag code also specifies how to deliver the Pledge of Allegiance to the flag and appropriate conduct while watching a performance of the National Anthem. Most of the flag code contains no explicit enforcement mechanisms, and relevant case law would suggest that provisions without enforcement mechanisms are declaratory and advisory only. Efforts by states to punish either verbal flag disparagement or disrespectful flag display (\"flag-misuse laws\") have been struck down under First Amendment free speech precepts that apply to the states through the Due Process Clause of the Fourteenth Amendment. Federal law and many state laws also provide penalties for physical mistreatment of the flag (\"flag-desecration\" laws), although application of these laws would generally violate the U.S. Constitution. For instance, the federal Flag Protection Act, which criminalizes flag desecration, was struck down on First Amendment free speech grounds as prohibiting symbolic speech. Some federal and state flag-misuse laws also prohibit placing advertising images on the U.S. flag or displaying the U.S. flag on merchandise; these laws may also be vulnerable to free speech challenges, although the Supreme Court has reserved this question. Finally, there are mandatory state requirements directing the daily recital of the Pledge of Allegiance by teachers that have been upheld against Establishment Clause challenges, although a requirement that students participate in such recitation was struck down as a violation of free speech. The flag code provides detailed guidelines for the appearance and display of the flag. The flag is to contain thirteen horizontal stripes, alternating red and white, and the union of the flag (the blue field) is to contain one star for each state. Flags are displayed from sunrise to sunset; however, a properly illuminated flag may be displayed at night. The flag should be hoisted briskly and lowered ceremoniously and should not be displayed during days of inclement weather unless an all-weather flag is used. The flag should be displayed daily on or near the main building of every public institution, in or near polling places on election day, and in or near schools on school days. There are guidelines for when a flag is used in a procession, displayed on a float or motorcar, displayed with other flags, or displayed from a flagpole. There are also detailed guidelines for when and how flags are to be displayed at half-staff. There are guidelines for when a flag is used to cover a casket and for when a flag is suspended across a building corridor or lobby. There is a description of the appropriate conduct of persons during the hoisting, lowering, and passing of the flag, and there are directions for how a flag is not to be treated. Finally, the President can modify the flag display requirements of the flag code. The Supreme Court has repeatedly struck down the application of flag improper use or desecration laws on free speech grounds. In Street v. New York , the Court considered a challenge to a law that made it a misdemeanor to \"publicly mutilate, deface, defile, or defy, trample upon, or cast contempt upon either by words or act [any flag of the United States].\" In Street , the defendant, learning of the shooting of civil rights activist James Meredith, burned a flag on a Brooklyn street corner while stating \"Yes; that is my flag; I burned it. If they let that happen to Meredith, we don't need an American flag.\" The Court in Stree t first concluded that the trial record did not establish whether the defendant's conviction had been for burning the flag or for the accompanying words, so it considered either as possible grounds for the conviction. The Court evaluated the purported governmental interest in punishing the defendant's words, rejecting the argument that the government's intent was to deter the incitement of unlawful acts. The Court next held that the speech in question was not \"fighting words,\" i.e., words so inherently inflammatory that they were \"likely to provoke the average person to retaliations, and thereby cause a breach of the peace.\" Nor, the Court concluded, was the statute narrowly drawn to punish only words of that character. Further, the Court dismissed the argument that government interests in avoiding \"shocking\" or disrespectful speech outweighed the freedom to express one's opinions about the flag. Finally, the Court concluded that freedom of speech protected public expression of opinions about the flag, even if such opinions are defiant or contemptuous. Because it had sufficient basis to overrule the conviction based on the spoken words alone, the Court declined to pass upon the validity of the New York law as applied to the flag burning. In the subsequent flag-misuse case of Spence v. Washington , a college student was convicted under a Washington State improper use law for affixing a peace symbol made of removable tape to a U.S. flag and hanging the flag upside down from an apartment window. The defendant testified that he had put the peace symbol on the flag as a protest against the Cambodian invasion and the killing of students at Kent State University during anti-war protests. The Court held that the student's act was symbolic speech, an activity imbued with communication. The Court also held there were no facts to support a breach of the peace, nor was there a valid governmental interest in avoiding offensive speech. The Court concluded that the flag had not been damaged by the removable tape, so maintaining the physical integrity of the flag was not at issue. Thus, the Court concluded that no governmental interest existed to support the conviction within the contours of the First Amendment. In Texas v. Johnson , a political demonstration participant at the 1984 Republican National Convention in Dallas was convicted of burning a flag in front of Dallas City Hall. He was convicted under a Texas statute that prohibited the desecration of a venerated object, sentenced to a year in jail, and fined $2000. Texas conceded that the flag burning was expressive conduct, but argued that there was sufficient governmental interest in such prohibition. The Court rejected the argument that the law was designed to prevent breaches of the peace, noting that no such breach occurred in this case and that Texas had not shown that every flag-burning was \"directed to inciting or producing imminent lawless action and is likely to incite or produce such action.\" Further, Texas already had a statute that prohibited breaches of the peace. The Court in Johnson also held that Texas's assertion that the law was needed to preserve the flag as a symbol of nationhood and national unity only showed that the law was targeting expression, not conduct. Further, the law's application only to severe acts of physical abuse against the flag that were likely to be offensive made clear that the restriction was content-based. The Court found Texas's expressed interestâthat flag-burning casts doubts on the meaning of the flag as a national symbolâcould not be justified because society found the burning offensive or disagreeable. Thus, the defendant's conviction was held to violate the First Amendment. In response to the Johnson decision, Congress enacted the Flag Protection Act of 1989. Two separate groups of protestors were prosecuted for flag burning under this act, and their cases were considered by the Supreme Court in U nited S tates v. Eichman . As the government in Eichman conceded that the defendant's conduct was expressive, the Court limited its decision to whether the Flag Protection Act was constitutionally distinct from the Texas statute in Johnson . The government contended the Flag Protection Act did not target expressive conduct, but was intended to protect the physical integrity of the flag in order to safeguard the flag's identity \"as the unique and unalloyed symbol of the Nation.\" It argued that, unlike the Texas statute in Johnson that prohibited only flag desecration \"that seriously offend[s]\" onlookers, the act's prohibitions were not based on motive, intended message, or the likely effects of the conduct on onlookers. The Court, however, held that the mere destruction of a U.S. flag did not affect the significance of the flag as a symbol of national unity unless that destruction was done with the intent to communicate a message. Further, the language of the actâwhich prohibits mutilating, defacing, defiling or trampling upon a flagâconnotes disrespectful treatment of a flag in order to damage the flag's symbolic value, and the exception for disposal of \"worn or soiled\" flags exempts acts traditionally associated with patriotic respect for the flag. Thus, the Court held that the act was a regulation of expressive activity and, consistent with its decision in Johnson , struck it down. Resolutions were introduced in the 115th Congress proposing a constitutional amendment to authorize Congress to prohibit physical desecration of the flag, but no similar resolutions have been introduced in the 116th Congress thus far. Flag-misuse laws sometimes include a prohibition on the use of the U.S. flag for certain forms of commercial speech such as advertising. Commercial speech, however, has fewer constitutional protections than other forms of speech. The Supreme Court considers speech commercial when: (1) it is contained in an advertisement; (2) refers to a specific product or service; and (3) the speaker has an economic motivation for making it. The Court in Eichman , when striking down the Flag Protection Act, noted that its opinion did not extend to prohibitions on the commercial exploitation of the U.S. flag. Thus, the question remains whether prohibitions on the use of flags for advertising purposes violates the First Amendment. It does not appear that any court has directly addressed whether the use of a U.S. flag in advertising is commercial speech. One difficulty in analyzing this issue is that the display of a flag in advertising appears to add little expressive content to the commercial aspects of the advertisement. In other words, while a U.S. flag may be used in an advertisement and its use may be economically motivated (fulfilling the first and third criteria for commercial speech), the display of a flag is unlikely to convey information about the specific product or service. Rather, the expressive content of displaying the flag would appear to be to link the product or service to a political message such as patriotism or national pride. To the extent that the display of the flag in an advertisement communicated an idea such as patriotism, then it might not even be treated as commercial speech but would be analyzed as expressive conduct. Even if advertising using a flag was evaluated as commercial speech, the statute prohibiting it might still be found to violate free speech, as commercial speech does retain some free speech protections. In Central Hudson Gas & Elec. v. Public S ervice Comm ission , the Court considered whether the Public Service Commission of the State of New York could order electric utilities in New York State to cease advertising promoting electricity use. The Court noted a \"common sense\" distinction between speech proposing commercial transactions that occurs in an area traditionally subject to government regulation and other varieties of speech. Consequently, the Court applied a four-part analysis for commercial speech. First, for commercial speech to be protected, it must concern lawful activity and not be misleading. Next, there must be a substantial government interest in its regulation. If both inquiries yield positive answers, the Court must determine whether the regulation directly advances the governmental interest asserted and whether it is \"narrowly drawn\" to be no more extensive than necessary to serve that interest. In Central Hudson , the Court held that New York's interest in reducing inequities in the regulated electricity market that would be caused by increased energy consumption was substantial, as was the government's energy conservation interest. The Court went on to hold, however, that it was speculative whether the governmental interest in avoiding inequities would be served, and that this interest was only served if other factors that affected electricity rates remained constant. The Court did find that the State's interest in energy conservation was substantial and that the parties did not dispute that advertising would increase sales. The Court, however, struck down the advertising ban as not narrowly drawn to that interest, in that it prohibited not only advertising that would increase energy use but also advertising that would have an energy neutral effect or would lead to a net decrease in energy consumption. It should be noted that, despite the more limited protection afforded commercial speech, the Supreme Court has not upheld governmental suppression of truthful commercial speech in more than twenty years. Further, several post- Central Hudson cases seem to afford more protection to commercial speech than originally contemplated by the case. For instance, in City of Cincinnati v. Discovery Network, Inc. , the Court, considering a City of Cincinnati regulation banning commercial publications from public newsracks, rejected the \"bare assertion that the 'low value' of commercial speech is a sufficient justification for [a] selective and categorical ban on newsracks dispensing 'commercial handbills.'\" Rejecting the city's regulation, the Court noted that \"the city's argument attaches more importance to the distinction between commercial and noncommercial speech than our cases warrant and seriously underestimates the value of commercial speech.\" Similarly, in 44 Liquormart, Inc. v. Rhode Island , Justice Stevens, writing for a plurality, suggested that the First Amendment requires a full, \"rigorous review\" of any commercial speech regulations \"unrelated to the preservation of a fair bargaining process[.]\" Even applying the Hudson analysis, there are arguments that flag-misuse laws regarding advertising would violate free speech. Assuming such advertising neither involved an inherently unlawful activity nor was intended to mislead a viewer (the first prong of the Central Hudson test), the law would be subject to the remaining three prongs of Central Hudson : whether there is a substantial government interest, whether the law directly advances that governmental interest and whether the law is \"narrowly drawn.\" While this analysis would occur in the context of commercial speech, the Court's analysis of restrictions on symbolic speech, which is similar to the analysis of commercial speech, would be relevant. For instance, while concerns about avoiding a breach of the peace is a substantial governmental interest, it seems unlikely that, after Spence and Johnson , the Court would find that prohibiting using a flag for commercial advertising was intended to avoid a breach of the peace. Similarly, preserving the flag as a symbol of national unity, while it might be a substantial governmental interest, would also seem unlikely to be significantly damaged by the use of flags for commercial activity. Finally, as in Eichman , preserving the physical integrity of a privately owned flag would be unlikely to be a sufficient government interest to outweigh the suppression of expressive conduct. Thus, a court would be likely to find that enforcement of a flag-misuse statute against a commercial advertisement violates precepts of free speech. Teacher-led recitations of the Pledge of Allegiance have been challenged as violations of the Establishment Clause of the First Amendment. Specifically, a variety of federal courts have addressed whether the use of the phrase \"one Nation under God\" in the Pledge of Allegiance renders a recitation of the Pledge by a teacher to students unconstitutional. For instance, the U.S. Court of Appeals for the Ninth Circuit Court (Ninth Circuit) held that daily recitations of the Pledge of Allegiance violates the Establishment Clause of the First Amendment. That decision was overturned by the Supreme Court on other grounds, however, and a later decision by the Ninth Circuit reached the opposite conclusion. In Newdow v. Unite d States Congress , the Ninth Circuit considered a case brought by a father that argued the Pledge of Allegiance recitation by his daughter's public school teacher violated the Establishment Clause of the First Amendment. The father did not claim that his daughter was compelled to recite the Pledge, but argued that his daughter was compelled to watch her state-employed teacher proclaim that there is a God and that the United States is nation under that God. The Ninth Circuit considered this challenge using the \"coercion test,\" first articulated in the case of Lee v. Weisman , which held that \"the Constitution guarantees that government may not coerce anyone to support or participate in religion or its exercise, or otherwise to act in a way which establishes a state religion or religious faith, or tends to do so.\" In Weisman , the court concluded that \"the graduation prayers bore the imprint of the State and thus put school-age children who objected in an untenable position.\" The Court also considered the \"heightened concerns with protecting freedom of conscience from subtle coercive pressure in the elementary and secondary public schools,\" holding that the school district's supervision and control of the graduation ceremony put impermissible pressure on students to participate in, or at least show respect during, the prayer. The court in Newdow similarly reasoned that the school had placed its students in the untenable position of choosing between participating in the Pledge or protesting and that the monotheistic religious content of the Pledge was not de minimus. The Supreme Court, however, overturned the Newdow case on other grounds, holding that the child's father, who had disputed custody over his child, lacked standing to bring the case. Subsequently, the Ninth Circuit, considering a Pledge of Allegiance passed by Congress after the Newdow decision (but using the same words), concluded that its previous opinion in Newdow was no longer binding precedent, that Supreme Court Establishment Clause case law had subsequently changed, and that Congress, when passing the new version of the Pledge of Allegiance, established a secular purpose for the use of the terms \"Under God.\" Thus, the Ninth Circuit upheld the recitation of the Pledge of Allegiance by public school teachers. Other United States Courts of Appeals have also rejected Establishment Clause challenges to the recitation of the Pledge of Allegiance in public schools. The flag code provides that the Pledge of Allegiance shall be rendered standing at attention facing the flag with the right hand over the heart. Many states have statutes providing that schools provide for an opportunity for the daily recitation of the Pledge by public school students. The Court in West Virginia State Board of Education v. Barnette , however, held that that mandating that a student participate in a recitation of the Pledge of Allegiance violates free speech principles under the First Amendment. As noted previously, the federal \"flag code\" specified conduct when delivering the Pledge of Allegiance is voluntary. In West Virginia State Board of Education , the Supreme Court considered a West Virginia Board of Education (Board) mandate for public school students to perform the Pledge on a daily basis. A child who would not participate was expelled until such time as they complied and the child's parent or guardian could be fined $50 or jailed for up to 30 days. The Court concluded that the requirement, that students perform a stiff-arm salute and recite the Pledge, was a violation of the free speech protections of the First Amendment. The plaintiffs in Ba rnette were Jehovah's witnesses whose religious beliefs conflicted with the requirement of pledging allegiance to the laws of a secular government. The Court analyzed the Board requirement as compelled speech holding that the mandated flag salute was a form of symbolic utterance. The Court also noted that remaining passive during a flag salute did not present the kind of clear and present danger that would justify regulation. The Court also discounted arguments that the Pledge fostered national unity, noting that \"[a]uthority here is to be controlled by public opinion, not public opinion by authority.\" The Court held that these precepts applied regardless of whether there was a religious basis for the student's objection to performing the Pledge.", "summary": "The \"flag code\" is the federal law that sets forth guidelines for the appearance and display of the U.S. flag (\"flag\") by private citizens. These guidelines specify times and conditions for display of the flag, manners and methods of display, and buildings where such display should occur. The guidelines for flag display vary based on the context and occasion, and there are detailed specifications for displaying flags at \"half-staff.\" The flag code also specifies how to deliver the Pledge of Allegiance to the flag and appropriate conduct while watching a performance of the National Anthem. Most of the flag code contains no explicit enforcement mechanisms, and relevant case law would suggest that the provisions without enforcement mechanisms are declaratory and advisory only. Efforts by states to punish verbal flag disparagement or prevent disrespectful flag display (\"flag-misuse laws\") have been struck down by the Supreme Court in Street v. New York and Spence v. Washington as free speech violations under the First and Fourteenth Amendments of the U.S. Constitution. Federal and many state laws also specify punishments for physical mistreatment of the U.S. flag (\"flag-desecration laws\"), although under Texas v. Johnson and U nited S tates v. Eichman , the Court held that application of these laws against expressive conduct violates free speech precepts. A separate issue is that federal and many state flag-misuse laws provide punishment for placing advertising images on a U.S. flag or displaying an image of a flag on merchandise. While these laws have not been challenged on free speech grounds, the Court has reserved the question whether the Johnson and Eichman holdings would apply in a commercial context, and it seems likely these laws would survive judicial scrutiny. Finally, while federal courts of appeals have rejected Establishment Clause challenges to recitation of the Pledge of Allegiance in classrooms despite language in the Pledge describing \"one Nation under God,\" the Court in West Virginia State Board of Education v. Barnette held that a state law mandating that students participate in a recitation of the Pledge of Allegiance violates free speech precepts.", "document_type": "crs"}
{"report": "Under the terms of the U.S. Constitution, it is the responsibility of the House to impeach (meaning, formally accuse) a federal officer of high crimes and misdemeanors, and the responsibility of the Senate to try and then possibly convict that officer. The Senate therefore does not initiate impeachment proceedings, but instead acts after the House has charged a federal officer with wrongdoing. The Constitution grants the Senate the sole power to try all impeachments, and establishes four requirements for an impeachment trial in the Senate: (1) the support of two-thirds of Senators present is necessary to convict; (2) Senators must take an oath or an affirmation; (3) the punishments the Senate can issue cannot extend further than removal from office and disqualification from holding future office; and (4) in the case of a presidential impeachment trial, the Chief Justice, and not the Vice President or a Senator, is the presiding officer. All other trial procedures are left to the Senate to determine itself. Indeed, in 1993, the Supreme Court ruledâin response to a claim by an impeached federal judge that his trial was unconstitutional because the Senate relied, in part, on a committee to collect evidenceâthat the judicial branch did not have a role to play in assessing the validity of Senate impeachment procedures. According to the Supreme Court, the Constitution placed a few specific requirements on the trial, and \"their nature suggests that the Framers did not intend to impose additional limitations on the form of the Senate proceedings.\" In each of the 15 impeachment trials the Senate has completed since 1789, the Senate has therefore determined its method of proceeding. Although attention was certainly paid to past precedent, the Senate established unique procedures for each trial to some extent, and sometimes the decisions reached regarding process were consensual or even unanimous. Notably, of the 5 full trials conducted in the last 80 years, 4 were of federal judges. In these four cases the Senate appointed a trial committee, composed of an equal number of Senators from each party, to hear and consider evidence and report it to the Senate. This history did not provide the Senate with a robust set of precedents to look to for guidance on how to conduct a modern trial, particularly if a committee will not be used. Trial committees were not intended to be used for presidential impeachments, and the only trial since 1936 conducted without a committee was that of President William Jefferson Clinton. That trial illustrates the many procedural decisions reached that were tailored for that particular set of circumstances. This report summarizes the existing rules and some past practices of the Senate related to an impeachment trial of a federal official. It does not discuss possible grounds for impeachment or other Constitutional or legal issues which are addressed in CRS Report R46013, Impeachment and the Constitution , by Legislative Attorneys Jared P. Cole and Todd Garvey. The information presented in this report is drawn from published sources of congressional rules and precedents, as well as the public record of past impeachment trial proceedings. It provides an overview of the procedures and should not be treated or cited as an authority on congressional proceedings. Consultation with the Office of the Senate Parliamentarian is always advised regarding the possible application of rules and precedents. The Senate adopted a set of impeachment rules in 1868, recommended by a select committee appointed for that purpose, in anticipation of the trial of President Andrew Johnson. These were not the first rules regarding impeachment ever agreed to in the Senate. The Senate had agreed to rules for its two earliest impeachment trials (Senator William Blount, 1798-1799, and District Judge John Pickering, 1803-1804), but it seems to have considered the rules to apply only to the trial of that particular individual. For the third impeachment trial, that of Supreme Court Justice Samuel Chase (1804-1805), the Senate approved 19 impeachment rules, and these rules appear to have been used in the next two trials (District Judge James H. Peck, 1831-1832, and District Judge West H. Humphreys, 1862). The 1868 select committee in the Johnson impeachment was explicit in its intent to recommend permanent rules, deeming it \"proper, to report general rules for the trial of all impeachments.\" The select committee recommended 25 rules, many of which were the same as those adopted for the Chase trial, and some of which codified practices from previous trials. The rules reported by the 1868 select committee in the Johnson impeachment chiefly concerned the mode and manner of preparing for a trial. Some Senators argued that impeachment rules should not be too prescriptive regarding the actual trial proceedings, believing such decisions to be best made after the Senate had convened for the trial. They recognized that the outcome of a trial could depend \"upon the rulings and mode of proceeding during the trial.\" But the lack of detail in the rules also reflected the nature of Senate proceedings in the middle of the 19 th century. Without designated party floor leaders and with very few staff, Senators were accustomed to discussing procedures on the floor, effectively working out a method of proceeding on legislation as they went along. The Senate adopted the rules reported by the select committee, and they have operated as the rules for impeachment trials since 1868, with very few changes. During the Johnson trial, when disputes arose about the interpretation of the rules, the Senate agreed to three changes to clarify their intent. Despite calls to revise the rules for the impeachment trials conducted early in the 20 th century, the impeachment rules were not changed again until 1935. At that time, the Senate, in response to reported low attendance by Senators during the 1933 trial of district judge Harold Louderback, agreed to the current Rule XI, which allows for the establishment of a committee to receive evidence and hear testimony from witnesses (see discussion of trial committees below). The Senate next reviewed its impeachment rules in 1974, when the House was expected to impeach President Richard Nixon. (The House had not impeached a federal officer since 1936.) At that time, the Senate directed the Committee on Rules and Administration to examine Senate impeachment rules and precedents with a view toward recommending necessary revisions for the conduct of a trial. The Committee met twice to discuss the rules and to pose questions to the Senate Parliamentarian and his assistant, and over two additional days it also heard testimony from Senators regarding the rules. The Majority Leader wrote a letter to the Rules Committee proposing significant changes to the impeachment rules, and the Committee discussed these proposed changes as well. The Rules Committee reported an original resolution (S.Res. 390, 93 rd Congress) proposing adjustments to 13 of the 26 rules. Of the suggested changes, nearly all were meant to clarify the meaning of the rule or to codify what had been the practice in past trials. The Committee did not recommend any major changes to the rules or report any new rules. As the accompanying committee report explained, \"there appeared to be a consensus among the Members that for the most part the existing rules should be retained and that amendments thereto should be proposed only with the most valid justification.\" The Senate, however, never took up the resolution reported by the Rules Committee in 1974 because President Nixon resigned before being impeached by the House. Twelve years later, when the House next impeached an officer, the Senate again directed the Rules and Administration Committee to review the rules. The Rules Committee in 1986 recommended the changes that had been approved by the committee in 1974, and the Senate agreed to them. No further changes have been made to the impeachment rules. The rules, formally titled the \"Rules of Procedure and Practice in the Senate When Sitting on the Trial of Impeachments\" are printed in the Senate Manual as well as in a 1986 Senate document that also describes precedents and practices at an impeachment trial, Procedure and Guidelines for Impeachment Trials in the United States Senate. When the Senate conducts an impeachment trial, it does so in a procedural mode that is distinct both from legislative session (where bills and resolutions are considered) and from executive session (where nominations and treaties are considered). The differences are significant, but precedent does dictate that if the impeachment rules are silent, the regular Standing Rules of the Senate, where applicable, may guide proceedings. The impeachment rules prescribe a series of steps for the start of the trial, which are described below. The Senate follows these steps to organize itself for the trial and then requests written statements from the impeached officer and from the House regarding the charges. The next stage is the receipt and presentation of evidence, and the impeachment rules provide little guidance regarding this process. Actions taken at this stage have varied from trial to trial. Arguments are made on the Senate floor by House managers (Members of the House selected to prosecute the case in the Senate) and counsel for the impeached officer (an attorney or attorneys who were chosen by the accused). The Senate could decide to request documents and hear testimony from witnesses, who could receive questions from the House managers, counsel for the impeached officer, and Senators. Senators are expected to attend the trial, but their individual participation in open session is limited. They can submit questions in writingâfor a witness, House manager, or counsel for the impeached officerâbut the Presiding Officer of the trial, not the Senator, reads the question, announcing which Senator posed it. Debate among Senators is not allowed during the trial unless the Senate, by majority vote, goes into closed session, where the length of time each Senator can speak is limited. The Senate impeachment rules refer to opportunities for both Senators and the parties to the case to place proposals before the Senate for a vote; in modern practice, however, the Senate has structured the order of considering proposals, either by unanimous consent or by agreeing to a resolution by majority vote. Votes can occur in open or closed session on procedural questions, such as those that might set the schedule for the trial, structure time for arguments and questions, and arrange for witnesses. In previous trials, the vote on the final question of whether or not to convict has always occurred in open session. Conviction requires a vote of two-thirds of Senators present on any article of impeachment. The impeachment rules establish a timeline for the Senate to take several actions after it receives formal notice from the House regarding an impeachment. Specifically, under Impeachment Rule I, Senate action is triggered by the receipt of notice from the House \"that managers are appointed\" and \"are directed to carry articles of impeachment to the Senate.\" The House, in modern practice, first agrees to articles of impeachment in the form of a simple resolution (H.Res.), and then agrees to another privileged resolution (or sometimes multiple resolutions) that serves to instigate action in the Senate as prescribed by the rule. In this second resolution (or series of resolutions), the House selects Representatives who serve as \"impeachment managers.\" These Members of the House will argue the case for impeachment before the Senate. The resolution also grants authority to the House managers to take actions to prepare and conduct the trial in the Senate. Finally, the resolution directs that a message be sent to the Senate to inform them that managers have been appointed. In practice, after receipt of the message from the House, the following actions take place in the Senate: The Senat e, by unanimous consent, establishes a time for the House Managers to prese nt the articles of impeachment to the Senate . Impeachment Rule I provides that the \"Secretary of the Senate shall immediately inform the House of Representatives that the Senate is ready to receive the managers.\" Instead of following the letter of the rule, however, the Senate reaches a unanimous consent agreement that sets a specific time for the Secretary to invite the House managers to appear. The time agreed upon in modern trials has been within a day or two of receipt of the House message. Scheduling a time is more convenient for all Senators, and these unanimous consent agreements have been reached within the context of a rule that appears to require immediate action. A House manager reads the articles of impeachment aloud on the Senate floor, sometimes after a live quorum call to bring Senators into the chamber. The impeachment rules require that the articles of impeachment be \"exhibited,\" which means read before the Senate. At a time arranged by unanimous consent, and sometimes after a live quorum call to ascertain the presence of Senators, the House Managers arrive on the floor of the Senate, are announced by the Secretary to the Majority or the Sergeant at Arms, and are escorted by the Sergeant at Arms to seats assigned to them in front of the Senate rostrum. The Presiding Officer then directs the Sergeant at Arms to make a proclamation required by Impeachment Rule II: \"All persons are commanded to keep silence, on pain of imprisonment, while the House of Representatives is exhibiting to the Senate of United States articles of impeachment against _____.\" A House Manager, typically the Chair of the House Judiciary Committee, then reads the articles in full before the Senate. The House Manager also makes a statement that the House reserves the right to amend the articles of impeachment. The Presiding Officer then announces, again using language from Impeachment Rule II, that the Senate will \"take proper order on the subject of impeachment\" and notify the House. The House Managers then exit the Senate chamber. Impeachment Rule III provides that after the articles are presented by the House managers, the Senate will proceed to consider the articles at 1 o'clock the next day (unless the next day is a Sunday), or sooner if ordered by the Senate. In modern trials, the Senate has most often taken the steps necessary to organize for an impeachment trial on the same day that the articles of impeachment were read on the floor. After the presentation of the articles, the Senate takes the following steps to organize for a trial: The Presiding Officer of the trial takes the oath of office. The Constitution requires that Senators be \"on Oath or Affirmation\" when sitting for the purpose of trying an impeachment. The Senate developed the practice of first swearing in the presiding officer of the trial, who then administers the oath to all Senators. In the case of a presidential impeachment, the Chief Justice acts as presiding officer. Impeachment Rule IV requires that notice be given to the Chief Justice of the time and place of the trial. It further provides that the Chief Justice is to be administered the oath by the \"Presiding Officer of the Senate.\" The Chief Justice takes the same oath as the Senators (see below for text). Although the Vice President of the United States, as President of the Senate, could act as Presiding Officer of the Senate and administer the oath to the Chief Justice, in the Clinton impeachment trial, the President Pro Tempore of the Senate administered the oath to the Chief Justice. In the Clinton trial the Senate also agreed by unanimous consent that a bipartisan group of six Senators escort the Chief Justice to the dais. Senators are administered the oath of office. The Presiding Officer of the Trial administers the following oath to Senators, as provided in Impeachment Rule XXV: [Do you] solemnly swear (or affirm, as the case may be) that in all things appertaining to the trial of the impeachment of____, now pending, [you] will do impartial justice according to the Constitution and laws: So help [you] God. In modern practice, the Chief Justice asks all Senators, who are standing at their desks, to raise their right hands as he reads the oath, and Senators respond, all together, \"I do.\" Senators also sign an official oath book, which serves as the permanent record of the administration of the oath. Senators are required to take the oath before participating in the trial, and Senators who might be absent at the time the oath is administered en masse inform the presiding officer as soon as possible so that they can take the oath separately. At this point, any Senator wishing to be excused from participating in the trial could ask to be excused from this service. In the past, the Senate has excused Senators from service in an impeachment trial only at their request. The Senate issues a \" s ummons\" and request s an \"answer\" from the impeached official and a \"replication\" (or response) from the House Managers. It is a necessary early step of an impeachment trial that the impeached officer be informed of the charges through an official process. Impeachment Rule VIII states that after the articles have been presented and the Senate has organized for a trial, \"â¦a writ of summons shall issue to the person impeachedâ¦\" The Senate accomplishes this by agreeing to an \"order,\" sometimes in the form of a resolution, directing that a summons be issued. Impeachment Rule XXV provides the language of the summons, which, in accordance with Rule VIII, includes the articles of impeachment. The Senate, when it adopts an order for a summons, also directs the accused official to file a written answer to the articles of impeachment. The Senate determines the date by which this answer must be filed. Under long-standing practice, the Senate also sets a date by which the House Managers can file a formal written response to the impeached officer's answerâwhich is called a \"replication\"âwith the Senate. The length of time the Senate provides for the impeached officer to file an answer and for the House managers to file a replication has varied in modern practice, from a few days to several weeks. An order or resolution regarding the summons and replication is not subject to debate, pursuant to Impeachment Rule XXIV, but is subject to amendment. The order or resolution can be approved by a majority of Senators voting, a quorum being present. On the day that the Senate majority has established for the return of the summons, Impeachment Rule IX provides that the Senate convene the trial at 12:30 p.m. The officer who served the summons (typically the Sergeant at Arms under Impeachment Rule VI) swears an oath, administered by the Secretary of the Senate, that the service was performed. Other administrative and organization al decisions. Impeachment Rule VII states that \"The Presiding Officer of the Senate shall direct all necessary preparations in the Senate Chamber.\" Note that this is the regular presiding officer of the Senate, as these arrangements could be made in advance of the trial. In practice, the Senate, through a unanimous consent agreement or a resolution, makes decisions regarding such matters as staff access to the floor and the placement of furniture and equipment in the well to be used for trial presentations. The Senate might take such actions in legislative session before the trial, or the actions could be taken shortly after the Senate convenes for the trial. For example, in the Clinton impeachment trial, the Senate agreed to guidelines specifying which Senate staff with official impeachment duties would have access to the floor. It did so by unanimous consent in legislative session before the start of the trial. Additional unanimous consent agreements granted privileges of the floor to the counsel and assistants to counsel for the President, as well as to assistants to the Chief Justice and to the House Managers. The Senate also, by unanimous consent, established a method for allocating tickets to the Senate gallery. While the previously identified steps have occurred, with minor variations, in every Senate impeachment trial, actions subsequent to organization have varied considerably. To establish impeachment trial procedures, the Senate could reach unanimous consent agreements or vote on propositions offered by Senators, House Managers, or counsel for the impeached officer. When adopted, these procedural agreements are referred to as \"orders\" of the Senate. Impeachment Rule XXIV contains the provision that, when the Senate is convened to conduct a trial, \"orders and decisions\" of the Senate shall be voted on \"without debate.\" This prohibition on debate applies when the Senate trial is meeting in open session; if a majority of Senators wished to discuss a proposed order, they could agree to do so in closed session, and in that forum each Senator would be limited to speaking only once, and for a maximum of 10 minutes. (See \"Closed Deliberations by Senators\" section below.) Furthermore, Impeachment Rule XXI provides further that \"all preliminary or interlocutory questions, and all motions, shall be argued for not exceeding one hour (unless the Senate otherwise orders) on each side,\" which means that, in some cases, the Senate could hear arguments from House Managers and counsel for the impeached on procedural proposals for up to two hours. In contrast, under the regular rules of the Senate, most matters are not subject to any debate restrictions. As a result, a cloture processârequiring the support of three-fifths of the Senate on legislation and most other itemsâis sometimes necessary to end debate and reach a vote. It is for this reason that the support of three-fifths of the Senate (or 60 Senators, assuming no more than one vacancy) is usually considered to be necessary for the Senate to reach a decision that cannot be reached by consensus. The limits on debate when the Senate is sitting for an impeachment trial, however, allow the Senate to reach decisions without the threat of a filibuster. Without the need for cloture, most questions voted on during a Senate impeachment trial can be approved with the support of a majority of Senators voting. The major exception to this, of course, is that conviction requires the support of two-thirds of Senators present. Because cloture is not required, a Senate majority can agree to orders that affect the proceedings in a trial. It is not clear, however, how quickly a majority could do so in the absence of broad agreement among Senators and the parties to the case. Orders proposed by Senators are subject to amendment offered by other Senators. For example, in the trial of Secretary of War William W. Belknap, Senators offered multiple amendments to a series of orders that the Senate considered. In a more recent example, during the Clinton impeachment trial, the Minority Leader offered two amendments to a resolution ( S.Res. 30 ) to establish trial procedures offered by the Majority Leader. (Both amendments, which attempted to shorten the trial, failed.) Senators cannot, in open session, debate amendments to orders proposed by Senators. Furthermore, in past trials Senators have demanded the division of an \"order,\" and the division of amendments to an order, that contained substantive, separate directions for a trial. Under regular Senate procedures, both amendments and resolutions containing separate provisions are susceptible to division. If any single Senator demanded a division, each provision would be considered separately for amendment and voted upon. Finally, there is little guidance in Senate published precedents as to what constitutes a proper \"order\" that would be eligible to be called up expeditiously and decided by majority vote during an impeachment trial. The impeachment rules mention several rules that could be altered by an \"order\": the time the Senate meets for the first day of the trial (Rule XII), and other days of meeting thereafter (Rule XIII); the length of time for the House Managers and counsel for the impeached officer to argue propositions before the Senate (Rule XXI); the number of people who may make opening and closing arguments (Rule XXII); and who may serve a summons (Rule XXV). Impeachment Rule XXVI permits the Senate to adopt a non-debatable order to fix the date and time for considering articles, even if it had missed a previously scheduled meeting. Impeachment Rule XI, which, as noted above, the Senate approved in 1935 to allow the use of committees to receive evidence, also states such committees can be created by order. The Senate, however, while sitting for an impeachment trial, has agreed to many other orders that are not directly mentioned in the impeachment rules. During the Clinton trial in the 106 th Congress, for example, the Senate agreed to S.Res. 16 and S.Res. 30 , which structured most aspects of proceedings by establishing deadlines for filings, allotting time for arguments, and making certain motions in order at specific points in the trial. If these resolutions constituted \"orders\" under Impeachment Rule XXIV, they were among the most comprehensive orders agreed to for a trial. Thus, based on Senate practice, it appears that \"orders\" of the Senate during impeachment trials can affect many more procedures than those specifically delineated in the impeachment rules. Senate precedents, however, might limit what can be included in such an order. In the absence of broad agreement regarding how to proceed with a trial, Senators might contest the inclusion of particular provisions of an orderâfor example, those that appear to be in direct conflict with the impeachment rules or past practice, or those that Senators argue are unconstitutional. While Senators can be expected to consult the precedents for guidance, ultimately a Senate majority will decide these questions, using the process for interpreting procedures discussed below. If all Senators are voting, the majority necessary to approve an order of the Senate is 51 Senators; tie votes fail in the Senate. If all Senators are not voting, however, this number changes. The vote necessary for approval is a majority of those voting, assuming a quorum is present. The quorum required for an impeachment trial is 51 Senatorsâthe same as in regular Senate proceedings. During impeachment trials, however, the party leaders often implore Senators to attend all sessions, and committee meetings are unlikely to be scheduled during times the Senate is expected to be sitting for the trial. This is due to past criticisms of the Senate for light attendance at trials when evidence was presented, including from counsel of impeached officers who feel Senators must be present to listen to arguments before they vote. The actions taken by the Senate to consider and collect evidence in each trial have varied considerably. The impeachment rules provide guidance only on a few particulars, necessitating that the Senate determine, each time it organizes for a trial, the manner of proceeding from that point forward. It is therefore not possible to describe, in the same manner as above, the parliamentary steps the Senate is expected to take to consider evidence in a trial. This section instead reviews the impeachment rules related to this stage of the trial, how these rules have been interpreted, and how their terms have been modified in past practice. Because in most modern trials the Senate has relied on a trial committee to consider and collect evidence, it then describes how these committees are established and some of their practices. During an impeachment trial in the Senate, Senators spend most of the time listening to arguments presented by the House Managers and the counsel for the impeached officer. Impeachment Rule XV states that counsel for the parties \"shall be admitted to appear and be heard upon an impeachment.\" The impeachment rules further reference both opening and closing arguments that would be made by the parties to the case. Specifically, Impeachment Rule XXII states that the House of Representatives will provide opening remarks first, followed by the counsel for the impeached. It also provides that the case shall be opened \"by one person\" on each side, but in practice opening remarks have been divided among multiple managers and multiple counsel for the impeached. With regard to closing arguments, Rule XXII provides that the House Managers will speak last, and permits two House Managers and two people for the impeached officer to make closing arguments. The number of individuals allowed to participate in closing arguments has been modified in past trials by order of the Senate. The impeachment rules do not place a time limit on opening and closing statements, although in past trials the Senate has agreed to place such limits on the parties. The Senate has also allowed the side speaking first to reserve time for rebuttal. Impeachment Rule XXI limits the time for arguments that can be made during the trial on any \"questions\" or \"motions\" that might arise to one hour on each side, unless otherwise ordered by the Senate. The impeachment rules provide no guidance regarding what particular questions or motions can be raised by the parties to the case. Rule XVI simply requires that all such motions (and \"objections, requests, or applications\") should be addressed to the Presiding Officer and put in writing if demanded by any Senator or the Presiding Officer. Examples of questions that have been argued pursuant to this rule include, from the 1868 trial of President Johnson, a motion by the defense that the trial be postponed for 40 days to allow for preparation of the answer to the articles of impeachment and, from the 1936 trial of Judge Ritter, a motion by the counsel for the impeached to strike an article deemed repetitive. In general, in past trials, the Senate has controlled, through the adoption of orders, what propositions can be placed before the body and voted on while it is sitting for an impeachment trial. The impeachment rules do not address which side speaks first on questions and motions, but it is by practice the side proposing the motion. The Senate has altered the time available for such arguments by unanimous consent or other order of the Senate. The side speaking first has asked to reserve time for rebuttal. It is important to note that there appears to be a distinction between motions filed and argued by the parties to the case in an impeachment trial, and motions offered by Senators. When House managers or counsel for an impeached officer propose a \"motion,\" they are requesting that the Senate reach a judgement (perhaps by agreeing to an order on the subject). They are not necessarily forcing Senate action on their proposal as written. During an impeachment trial, the Senate, at least in modern practice, has generally controlled when and what motions are proposed before the full Senate by the parties to the case, and it also determines the method of responding to such motions (which might not be a direct vote on the question). For example, in the 2010 trial of Judge Porteous, counsel for the impeached filed three motions that were argued by the parties to the case: a motion to dismiss Article 1, a motion to dismiss Article 2, and a motion to dismiss all articles because they aggregated multiple charges. The Senate heard arguments from each side (pursuant to a unanimous consent agreement that limited arguments on all motions to two hours, equally divided) and deliberated in closed session. When the Senate reconvened in open session, rather than act directly on the propositions as presented, the Majority Leader moved to hold preliminary votes on individual allegations within the articles. This motion was defeated 94-0. Effectively, it served as a response to the three motions filed by the defense and argued by the parties to the case. In another modern example, the Senate heard arguments by the parties, under the terms of a unanimous consent agreement, regarding a motion by the impeached officer that Impeachment Rule XI, allowing the creation of a trial committee, was unconstitutional and that there be a full and free trial before the Senate and witnesses be subpoenaed for that purpose. After deliberating in closed session, the Senate returned to open session and the Majority Leader moved that the Senate not hear additional witnesses in the case. The motion was agreed to 61-32 (7 Senators not voting), and served as a response to the arguments by counsel for the impeached officer that the full Senate, not the trial committee, should receive evidence. Impeachment Rule XXIV refers to \"orders and decisions\" of the Senate, which in practice have been proposed by Senators, not by the parties to the case. As discussed above, such \"orders\" are sometimes offered in the form of resolutions. In impeachment trials, however, it appears that such resolutions were proposed as if they were motions and were not subject to layover requirements, or taken up by a motion to proceed, which is the usual way that the Senate would process a resolution. Impeachment Rule XIX requires any motion or order proposed by a Senator (except a motion to adjourn) be in writing and put by the Presiding Officer. Impeachment Rule XXIV prohibits debate on orders of the Senate in open session, but the Senate could vote to go into closed session, in which case each Senator could speak for up to 10 minutes on the motion or order. Impeachment Rule XXIV also provides that orders of the Senate can be agreed to by unanimous consent but, short of unanimous consent, the vote on an order must be by the yeas and the nays (a roll call vote). An exception is made for the motion to adjourn, which could be voted on by voice vote or division (or if the yeas and nays are ordered, by roll call vote, as under regular Senate procedures). Otherwise, the impeachment rules do not reference proposals offered by Senators. In the 19 th and early 20 th century trials, it appears that a variety of propositions regarding procedure were proposed by Senators. In the modern trials, some motions were permitted pursuant to a previously-agreed-to resolution, or under the terms of a unanimous consent agreement. For example, in the 1999 trial of President Clinton, a Senator offered a motion to dismiss the articles that was permitted under the terms of S.Res. 16 . Similarly, later in the same trial, the Minority Leader offered a motion that the Senate proceed to closing arguments, and this motion appears to have been permitted under the terms of S.Res. 30 . In other modern instances, however, Senators appear to have offered motions that were not explicitly allowed under a previous order and presumably were permitted by the standing impeachment rules and precedents. For example, during the trial of President Clinton, a Senator moved that Senators be permitted to insert statements they made in the closed session into the Congressional Record . In another example, during the 1986 trial of Judge Harry Claiborne, a Senator moved to postpone the decision on motions filed by the defendant. It is also possible that such motions were effectively offered by a kind of tacit unanimous consent, and if any Senator had objected, they could not have been considered. Unanimous consent cannot always be required for a Senator to propose a motion or order, however, as that would allow a single Senator to block procedural decisions. Neither the impeachment rules nor the published precedents provide explicit guidance on what propositions can be offered by Senators while sitting on an impeachment trial. There is also no guidance regarding precedence among the various motions, although the Senate precedents establishing that the Majority Leader is entitled to priority in recognition, followed by the Minority Leader, presumably continue to apply in an impeachment trial. Still other motions have been offered pursuant to the regular standing rules of the Senate. In 1999, for example, several Senators moved to suspend certain impeachment rules (to allow for unlimited debate on questions in open session). To suspend the rules, Senators must provide one calendar day's notice in writing of their intent to offer a motion to suspend. Adoption of such a motion requires a two-thirds affirmative vote. During the Clinton trial, the Senate considered motions to suspend under the terms of a unanimous consent agreement or a resolution, and it is not entirely clear from the proceedings or published precedents when such motions would otherwise be in order. The impeachment rules contain little guidance in relation to the calling and questioning of witnesses. Impeachment Rule XVII states that witnesses shall be examined first by the side who requested them, and then cross-examined by the other side. It also specifies that only one person from each side shall conduct the examination and cross-examination. Witnesses are also required to be sworn by the Secretary of the Senate or other authorized person, in a form provided by Senate Rule XXV: \"You, ______, do swear (or affirm, as the case may be) that the evidence you shall give in the case now pending between the United States and ______, shall be the truth, the whole truth, and nothing but the truth, so help you God.\" Impeachment Rule VI is intended to grant the Senate the ability to compel the attendance of witnesses (and, more generally, to enforce any \"orders, mandates, writs, precepts, and judgments\" deemed \"essential or conducive to the ends of justice\"). In modern practice, the Senate has relied on the other branches of government to enforce its subpoenas, as discussed in detail in other CRS reports. For example, in the 1989 trial of Judge Alcee Hastings, when a key witness refused to testify, the Senate in legislative session took up and approved by unanimous consent a resolution directing the Senate Legal Counsel to bring a civil action to enforce the subpoena. Senate Legal Counsel obtained an order from the U.S. District Court for the District of Columbia directing the witness to testify, and when the witness continued to refuse to do so, he was incarcerated until the end of the trial. The Senate impeachment rules do not address the selection of witnesses. In practice, the Senate determines which witnesses will be heard, if any. (If a trial committee is used, the trial committee selects and subpoenas the witnesses.) The parties to the case do not have the right under the rules to call whom they choose. To be clear, it is the House Managers and counsel for the impeached who know the charges and know what evidence they would like to present, and, in practice, the Senate weighs their requests heavily. In some recent trials, the Senate has requested pretrial statements or trial memoranda from both parties, which discuss possible evidence to be presented, including desired witnesses. On the basis of such requests, the Senate (or the trial committee) decides which witnesses to hear and possibly subpoena. In the modern judicial trials, witnesses were examined in the trial committees, and not on the floor before the full Senate. In the Clinton trial in 1999, the Senate agreed to an order that depositions from three witnesses be taken, but did not agree to hear testimony from any witness on the floor. The last time witnesses were examined and cross-examined on the Senate floor was during the impeachment trial of Judge Ritter in 1936. During the presentation of evidence by the House Managers and counsel for the impeached officer, Senators are generally expected to attend, but not speak. Impeachment Rule XIX, however, does allow a Senator to question a witness, manager, or counsel of the person impeached. The Senator must put the question in writing and submit it to the Presiding Officer, who then reads the question out loud. In practice, the Presiding Officer identifies the Senator posing the question before reading it. As noted, witnesses have not testified before the full Senate since the 1936 trial of Judge Ritter, so there are no modern examples to look to concerning Senators questioning witnesses on the floor. In trial committees, Senators have submitted questions for witnesses. In addition, resolutions establishing trial committees have explicitly authorized the chair of the trial committee to \"waive the requirementâ¦that questions by a Senator to a witness, a manager, or counsel shall be reduced to writing and put by the presiding officer.\" In modern trials, Senators have posed questions to House managers and counsel for the impeached. In the 1999 trial of President Clinton, the Senate agreed to a resolution ( S.Res. 16 , 106 th Congress) that established procedures in addition to the impeachment rules to structure a period of questioning by Senators. S.Res. 16 provided that after opening arguments by the House Managers and the President's counsel, \"Senators may question the parties for a period of time not to exceed 16 hours.\" During the Clinton trial, Senators directed their questions to one side or the other, and the party leaders asked that questions be submitted to them first, so that they could identify duplications and structure the order of questions (which alternated between Republican and Democratic Senators' questions). The Chief Justice announced that he thought five minutes would be a sufficient time to answer each question, and an effort was made to keep the time used by each side roughly equal. Over 100 questions were posed by Senators over the course of two days. In other modern trials, Senators asked questions of the House Managers and counsel for the accused on the floor, apparently without a unanimous consent agreement or other order of the Senate structuring the questioning process. During the 2010 trial of Judge Porteous, for example, after the trial committee had issued its report, the Senate agreed by unanimous consent to limit the time for arguments on all motions filed by Judge Porteous to one hour for each side, and to limit the time for final arguments on all four articles of impeachment to one and a half hours for each side. The agreement did not explicitly address time for questions. Senators, during the arguments, sent questions in writing to the Presiding Officer, who asked the clerk to read them at a time deemed appropriate, including after the expiration of the time limits set by unanimous consent. In this trial, Senators' questions were sometimes directed to both sides. Impeachment Rule XI allows for the appointment of a trial committee of Senators to receive evidence and take testimony on behalf of the Senate for an impeachment. Rule XI does not contain language explicitly limiting the application of trial committees; however, the 1974 Rules and Administration Committee report regarding amendments to the impeachment rules stated that, \"nothing but action by the full Senate on all aspects of a presidential impeachment was conceivable\" and that the legislative history to the proposed amendments should \"clearly reflect\" this understanding by members of the Committee. The Senate has chosen to appoint trial committees for every modern impeachment of a judge since the 1980s. Trial committees serve to relieve the full Senate of the potentially lengthy process of these early trial tasks and instead devote time to its legislative workload. Transcripts of all proceedings conducted and evidence received by the trial committee are transmitted to the full Senate when the committee's work is completed. This material provides a potential opportunity to move quickly to closing arguments and deliberation on the final question of whether an impeached officer is guilty or not guilty. Trial committees are typically created by a simple resolution that authorizes the majority and minority leaders to each recommend six Senators, including, more recently, a chair and vice chair, respectively. Impeachment Rule XI does not fix the membership or size of a trial committee, nor does it require party balance; in modern practice, however, the Senate has routinely agreed to a bipartisan 12-member committee. Resolutions creating trial committees also typically include a funding provision, and may authorize a committee to waive certain impeachment rules, direct a committee on what it should report to the Senate, or establish a date at which the committee will terminate. In addition to receiving evidence and testimony, trial committees can reach decisions concerning certain pre-trial requests and motions filed by the parties to the case, and they can question witnesses. Trial committees process motions filed by House Managers in a fashion similar to that which the Senate would use when sitting as a court of impeachment. The committee holds a hearing to receive oral arguments from the trial parties, allots time for questioning by committee members, deliberates in closed session, and ultimately votes to make a determination in relation to the request. Modern trial committees have routinely declined to consider motions to dismiss an article or articles of impeachment, citing a lack of authority to do so. Trial committees also have examined witnesses called by House managers and counsel to the accused. Typically, a witness is first examined by the trial parties, after which committee members have been able to ask their own questions. Under the impeachment rules, questions by Senators are to be submitted in writing, although the Senate has waived this rule to allow for direct questioning by Senators in trial committees. Once a trial committee has completed its work, as previously discussed, it will issue a report to the Senate compiling all evidence, exhibits, and witness testimony it received. That material is considered as having been received and taken before the full Senate for the purposes of delivering a final vote on articles of impeachment. The trial committee's work does not preclude the Senate itself from calling additional witnesses, hearing further testimony, or revisiting motions raised by House managers and counsel for the accused. The full Senate did not choose to hear witnesses or request any further evidence in any of the four completed trials in which a committee was used. Closed door deliberation by the Senate while sitting for an impeachment trial is established through Impeachment Rules XX and XXIV. Rule XX states that a Senate impeachment trial is to be conducted in open session, except for when the doors shall be closed for deliberation. A motion to go into closed door session can be acted upon without objection, or if an objection is raised, by a roll call vote without debate. Note that this method of entering closed session when the Senate is sitting for an impeachment trialâapproving a motion by majority voteâis different from the method used during regular Senate session. Outside of an impeachment trial, a single Senator can move that the Senate go into closed session, and, if the motion is seconded by another Senator, the Senate will proceed to secret session. Rule XXIV specifies, in part, that during closed door deliberations, each Senator may speak only once on each question. Such remarks are limited to 10 minutes per Senator on \"interlocutory\" questions and to 15 minutes on \"the final question,\" (i.e., whether the impeached officer is guilty or not guilty), regardless of the number of articles of impeachment. In other words, in the final debate, regardless of whether the Senate is considering one article of impeachment or many, each Senator has only one opportunity to speak for no more than 15 minutes. When the Senate enters a closed session, the specific procedures followed are guided by the Senate's standing rules, rather than its impeachment rules. The Sergeant at Arms clears the chamber and galleries of everyone except for Senators and staff designated under Senate Rule XXIX, paragraph 2, who are sworn to secrecy. The Senate rule further provides access for the Senate Secretary, the Assistant Secretary, the Principal Legislative Clerk, the Parliamentarian, the Executive Clerk, the Minute and Journal Clerk, the Sergeant at Arms, and the Secretaries to the Majority and Minority, as well as other individuals the Presiding Officer \"shall think necessary.\" During impeachment trials, the Senate has, in practice, extended floor privileges in closed session to additional designated staff by unanimous consent agreement. A record of closed session deliberations is kept, as with all proceedings of impeachment trials, pursuant to Impeachment Rule XIV. Unlike open session records, which are made available to the public, closed session transcripts are kept under an injunction of secrecy unless lifted by the Senate by resolution or unanimous consent. Accordingly, Senators and staff are expected to refrain from public discussion of closed door deliberations. Senate Standing Rule XXIX, paragraph 5, provides for possible expulsion from the Senate (if a Senator) or dismissal from service (if an officer or employee) as punishment for divulging closed door proceedings. In recent Senate impeachment trials, the Senate has allowed Senators to insert their closed session remarks into the Congressional Record . As mentioned above, in the 1999 trial of President Clinton, Senators attempted to allow for open deliberation and debate in an impeachment trial by moving to suspend the impeachment rules. No such proposals were agreed to by the Senate during the Clinton trial, and all deliberation throughout the trial occurred in closed sessions. Conviction requires a guilty vote on at least one article of impeachment by two-thirds of Senators present. Assuming 100 Senators present, the support of 67 Senators is needed to convict on an article. If fewer Senators are present, the threshold to convict will accordingly be reduced as well (e.g., 97 Senators present would require 65 votes to convict). A response of \"present\" effectively supports acquittal, as it counts in the denominator against which the threshold to convict is calculated. Following closed door deliberations on the final question of whether to convict or acquit an impeached officer, the Senate reconvenes in open session to vote on the articles of impeachment. Articles are typically voted on in the order they were exhibited by House Managers. It is not in order to further divide an article. Pursuant to Impeachment Rule XXIII, the Presiding Officer puts the question on each article separately, and each vote is required to be by roll call. The legislative clerk is directed to read the article of impeachment aloud and then the roll is called, to which Senators must rise from their seats and answer \"guilty\" or \"not guilty\" on the question of impeachment. Voting on the articles of impeachment is to continue without interruption, pursuant to Rule XXII, unless the Senate adjourns the trial. After voting has commenced, adjournments of the trial can be for only one day, or sine die , that is, without a specific date to return, if ever. Under the rule, a motion to reconsider a vote on an article of impeachment is not in order. Under Senate Standing Rule XII, Senators are required to vote upon call of their name unless excused by the Senate or due to a conflict of interest. The question of excusing a Senator from voting is disposed of after the call of the roll is completed but before the result is announced. Senators have been excused from voting on articles of impeachment in past trials due to their absences from arguments or owing to their participation as a witness in the trial. (Senators have also been excused from participating in the trial at all; see above \"Organizing for the Trial.\") If an officer is convicted by two-thirds of Senators present, \"such a vote operates automatically and instantaneously to separate the person impeached from office.\" The Senate may then choose to take the additional action to move to disqualify a convicted officer from holding further office, although this step is not required. The Senate has established that a vote to disqualify requires a simple majority voting affirmatively, and not two-thirds as with conviction. The Presiding Officer of an impeachment trial does not possess any more independent control over proceedings than the Presiding Officer does during the more common Senate deliberations on legislation or nominations. While the Presiding Officer, in either case, may rule on the proper interpretation of the rules and procedures of the Senate, that ruling can be challenged by any Senator. In legislative or executive sessions of the Senate, if any Senator appeals a ruling by the Presiding Officer, the full Senate considers the question, \"Shall the decision of the Chair stand as the judgment of the Senate?\" Impeachment Rule VII lays out the process of challenging a ruling as it applies during an impeachment trial. It states in part And the Presiding Officer on the trial may rule on all questions of evidence including, but not limited to, questions of relevancy, materiality, and redundancy of evidence and incidental questions, which ruling shall stand as the judgment of the Senate, unless some Member of the Senate shall ask that a formal vote be taken thereon, in which case it shall be submitted to the Senate for decision without debate; or he may at his option, in the first instance, submit any such question to a vote of the Members of the Senate. In other words, while the impeachment rules grant the Presiding Officer the authority to rule on questions, they also state that a single Senator could instead request that the full Senate vote on any such question. In that case, pursuant to this rule, the question is not debatable, and a majority of Senators voting would determine the outcome. (By precedent, House Managers or counsel for the impeached could not ask that a question be submitted to the Senate. ) The published precedents state that all decisions of the Chair are subject to appeal. If a ruling concerning the admissibility of evidence is appealed (or if the Presiding Officer submits such a question), the question put to the Senate is: \"Is the evidence admissible?\" In the case of other procedural issues the Senate would vote on, the phrasing of the question put to the Senate could vary with the question. For example, in 1986, during the trial of Judge Claiborne, the Presiding Officer ruled, in response to a motion by the defense counsel and at the request of the Majority Leader, \"It is the Chair's determination that the question of standard of evidence is for each Senator to decide individually when voting on Articles of Impeachment.\" A Senator requested that the Senate vote on the question instead, and the Presiding Officer put the question on whether the motion of the counsel for the impeached judgeâthat the Senate establish a \"beyond a reasonable doubt\" standard of proof in the trialâwas \"well taken.\" By a vote of 17 yeas and 75 nays (8 Senators not voting), the Senate voted that the motion was not well taken, effectively agreeing with the ruling of the Presiding Officer. The Senate, in short, is the final arbiter on any procedural questions. Impeachment Rule VII states that \"the vote shall be taken in accordance with the Standing Rules of the Senate.\" That means these questions could be settled by roll call vote, but only if that request for the yeas and nays is supported by 1/5 of a quorum (11 Senators), or, if the Senate recently voted, 1/5 of the Senators who voted. The impeachment rules make several other references to the Presiding Officer of the trial. Impeachment Rule IV restates the constitutional requirement that when the President of the United States has been impeached, the Chief Justice of the United States shall serve as the Presiding Officer. Impeachment Rule III tasks the Presiding Officer with administering the oath to Senators. Rule V grants him general power to execute decisions of the Senate where necessary (which would include, for example, signing a summons the Senate ordered to be issued to the person impeached, or signing a subpoena that the Senate had agreed to issue). Rule XIII directs the Presiding Officer to cause the proclamation to be declared at the start of each day commanding those present to keep silent. Rule XVI requires that the parties to the caseâthe House Managers and the impeached officer and his counselâaddress the Presiding Officer when proposing motions, objecting to proceedings, or making any request related to the trial. As mentioned above, Rule XIX requires the Presiding Officer to read aloud any question submitted in writing by a Senator. The Presiding Officer also puts the question on the vote on the articles of impeachment, pursuant to Rule XXIII and as described above. The Presiding Officer of the trial can vote when he or she is a Senator. If the Vice President is presiding over a trial, and if there is a tie vote, then the Vice President may vote. In presidential impeachment trials, however, the Vice President cannot preside and cannot vote. The Chief Justice, when presiding over an impeachment trial, would not be expected to vote, even in the case of a tie. If a vote on a question results in a tie, the question is decided in the negative. When the Senate convenes as a Court of Impeachment, it is in a distinct procedural mode, different from legislation session, where it considers bills and resolutions, and executive session, where it considers treaties and nominations. In addition to having its own set of rules, the Court of Impeachment also keeps a separate Journal. (The Journal is the Constitutionally-required record of parliamentary actions taken by the Senate.) Business in these distinct procedural modes is kept entirely separate. For example, bills and resolutions cannot be introduced when the Senate is in the mode of sitting for the trial, and committee reports cannot be filed. This might mean that the Senate chooses to spend some period of a day meeting in legislative or executive session and also spend a period meeting as Court of Impeachment, in order to provide an opportunity for other actions to occur. For some legislative actions, unanimous consent may effectively be required. Notably, the Senate must have a period for \"morning business\" in legislative session for various actions to occurâincluding the introduction of legislation and the filing of committee reports. In modern practice, this is provided for in unanimous consent agreements for each day the Senate meets. The Senate would need to reach a similar unanimous consent agreement for legislative sessions held on days during the trial in order for these actions to be allowed. Alternatively, the Senate could agree by unanimous consent to arrange other methods for these actions to occur, even though the Senate has not met that day in legislative session. The impeachment rules provide for the Senate to convene for an impeachment trial at noon (Rule XIII) every day except Sunday after a trial has begun (Rule III). While this might have been the expected schedule in the middle of the 19 th century, the impeachment rules also provide for the Senate to modify this schedule by \"order.\" In modern practice, the Senate has adjusted the meeting days and times. Most often, the Senate agreed by unanimous consent to the time of the next meeting. Alternatively, a motion to adjourn the Senate sitting in a trial of impeachment to a time certain is subject to amendment, but it is not debatable and could be agreed to by majority vote. The Senate also could agree to an order altering the default time for the Senate to sit for the trial each day, and this order would not be subject to debate. In short, a numerical majority can determine the day and times of meeting for an impeachment trial. Impeachment Rule XIII also provides that, when the trial adjourns, the Senate resumes consideration of legislative (or executive) business. The Rule states, \"(t)he adjournment of the Senate sitting in said trial shall not operate as an adjournment of the Senate.\" As a result, it is possible for the Senate to convene to conduct business in legislative (or executive) session before noon, convene the trial at noon pursuant to the rules (or at some other time if decided by the Senate), adjourn the impeachment trial for the day and return to legislative (or executive) session to conduct more business. The Senate could also meet for other purposes on days the Senate is not meeting for the trial. In the modern judicial trials and during the Clinton trial, the Senate did conduct other business on some of the days on which it also considered articles of impeachment. Limited legislative business was accomplished during the six weeks of the Clinton trial, but that trial occurred at the very start of the 106 th Congress (1999-2000), while committees were still organizing and legislation may have still been developing. Other factors could certainly affect the ability of the Senate to approve legislation while a trial is being conducted. Bipartisan support is generally necessary to take up most legislation in the Senate, and forming such coalitions could be challenging if the impeachment proceedings are contentious. The attention of Senators and their staff might also be expected to be directed toward impeachment proceedings. In addition, it is not clear how some procedures that apply to the consideration of legislation and nominations in the Senate are impacted when the Senate sits for an impeachment trial. For example, if cloture was filed on a matter in legislative session, and the Senate was sitting in trial when the cloture motion matured, it is not clear if the Senate would vote on the cloture motion at that time, or instead not until it adjourned the trial for the day. It is also not clear how legislation to be considered under expedited procedure statutes, such as the Congressional Review Act, the War Powers Resolution, or the Trade Act (each of which provide for specific Senate actions at times certain) could be impacted by a Senate trial. ", "summary": "After the House impeaches a federal officer, the Senate conducts a trial to determine if the individual should be removed from office. The Senate has a set of rules specific to the conduct of an impeachment trial, most of which originated in the early 19 th century. The impeachment rules lay out specific steps that the Senate takes to organize for a trial. House managers (Members of the House who present the case against the impeached officer in the Senate) read the articles of impeachment on the Senate floor. The Presiding Officer and Senators take an oath to do impartial justice, and the Senate issues a \"summons\" to the accused and requests that a written answer be filed. The House Managers are also invited to respond to the answer of the impeached officer. Actions after these organizing steps, however, are not specified in the impeachment rules. The impeachment rules mention some actions that are common in judicial trials, such as opening and closing statements by the parties to the case and the examination of witnesses, but provide little specific guidance. Instead, the rules allow the Senate, when sitting for a trial, to set particular procedures through the approval of \"orders.\" Some orders of the Senate are unanimous consent agreements, but others are proposals adopted by the Senate. If such a proposal is considered while the Senate is sitting for the trial, then debate is limited by the impeachment rules. As a result, the support of three-fifths of the Senate to invoke cloture is not necessary to reach a vote to approve a procedural proposal. In previous trials, such proposals have been subject to amendment. Senate published precedents do not provide guidance on what can or cannot be included in such an order. Compared to when the Senate meets in legislative and executive session, the opportunity for individual participation by Senators in a Senate trial is limited. The rules require that any debate among Senators take place in closed session. Senators can make motions under the impeachment rules, but these rules are silent on what motions can be offered, and when. In modern trials, when Senators proposed motions, it was often pursuant to a previously-agreed-to order of the Senate. Senators can also submit written questions during the trialâto House Managers, counsel for the impeached officer, or witnessesâthat the Presiding Officer presents on their behalf. Orders of the Senate, however, might structure the time and process for posing questions. During the open portion of an impeachment trial, Senators spend most of the time listening to arguments presented by House Managers and counsel for the impeached officer. Impeachment Rule XI allows the Senate to create trial committees to hear and consider evidence and report it to the Senate. Such committees were not intended to be used for presidential impeachments, but four of the five impeachment trials completed since 1936 concerned federal judges, and in each of these cases the Senate established a trial committee. When the Senate meets in closed session to deliberate, each Senator may speak only once on each question. Such remarks are limited to 15 minutes on the final questionâwhether the impeached officer is guilty or not guiltyâand to 10 minutes on other questions. On the final question, Senators respond \"guilty\" or \"not guilty\" on each article of impeachment. The support of two-thirds of Senators present on an article is necessary to convict. The Presiding Officer of a trial operates much like the Presiding Officer in regular Senate session, in that the Chair may issue an initial ruling, but any Senator could request that the full Senate vote instead. Because of the debate limitations in the impeachment rules, procedural decisions appealed or submitted by the Chair can be reached with majority support. In a presidential impeachment trial, the Chief Justice of the United States is the Presiding Officer. Although the impeachment rules prescribe that the Senate convene at noon for a trial, six days a week, a Senate majority can alter this schedule. It is possible for the Senate to conduct legislative and executive business on the same calendar days that it meets for a trial, but it must meet in legislative or executive session to do so. When the Senate is sitting as a Court of Impeachment, legislative and executive business cannot occur. The information presented in this report is drawn from published sources of congressional rules and precedents, as well as the public record of past impeachment trial proceedings. It provides an overview of the procedures, and some past actions, but should not be treated or cited as an authority on congressional proceedings. Authoritative guidance on the interpretation and possible application of rules and precedents can be obtained only through consultation with the Office of the Senate Parliamentarian.", "document_type": "crs"}
{"report": "T he Agriculture appropriations billâformally called the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Actâfunds all of the U.S. Department of Agriculture (USDA), excluding the U.S. Forest Service. For FY2020, the House Appropriations Committee reported H.R. 3164 on June 6, 2019 (including H.Rept. 116-107 ). Funding for USDA was included in a five-bill minibus appropriations bill ( H.R. 3055 ) that passed the House on June 25, 2019. The Senate Appropriations Committee reported S. 2522 on September 19, 2019 (including S.Rept. 116-110 ). The full Senate did not act on this bill by October 1, 2019, so FY2020 began without a full-year appropriation. To avoid a lapse in funding, Congress and the President approved two consecutive continuing resolutions to fund federal agencies at the FY2019 level ( P.L. 116-59 and P.L. 116-69 , respectively). The Senate passed a four-bill minibus appropriations bill ( H.R. 3055 ) on October 31, 2019, setting up negotiations with the House for a final bill. On December 20, 2019, Congress passed and the President signed the FY2020 Further Consolidated Appropriations Act ( P.L. 116-94 ), which includes agriculture and related agencies under Division B. This report provides a brief overview of the conservation-related provisions in the FY2020 Agriculture appropriations acts. For a general analysis of the FY2020 appropriations for agriculture, see CRS Report R45974, Agriculture and Related Agencies: FY2020 Appropriations . USDA administers a number of agricultural conservation programs that assist private landowners with natural resource concerns. These include working lands programs, land retirement and easement programs, watershed programs, technical assistance, and other programs. The two lead agricultural conservation agencies within USDA are the Natural Resources Conservation Service (NRCS), which provides technical assistance and administers most conservation programs, and the Farm Service Agency (FSA), which administers the Conservation Reserve Program (CRP). Most conservation program funding is mandatory, obtained through the Commodity Credit Corporation (CCC) and authorized in omnibus farm bills (about $6.4 billion of CCC budget authority for conservation in FY2020). The Agriculture Improvement Act of 2018 (2018 farm bill; P.L. 115-334 ) reauthorized most mandatory conservation programs through FY2023. Other conservation programsâmostly providing technical assistanceâoperate with discretionary funding provided in annual appropriations (about $1 billion annually). The FY2020 appropriation included an increase from FY2019 levels for discretionary conservation programs. The Administration's FY2020 request proposed a decrease for discretionary conservation funding from the FY2019 enacted levels and reductions in funding for mandatory conservation programs. The FY2020 appropriation does not generally include these proposed reductions and would continue to redirect some conservation funding to the Farm Production and Conservation (FPAC) Business Center. NRCS administers all discretionary conservation programs. The largest program and the account that funds most NRCS activities is Conservation Operations (CO). The CO account primarily funds Conservation Technical Assistance (CTA), which provides conservation planning and implementation assistance from field staff placed in almost all counties within the United States and its territories. Other components of CO include the Soil Survey, Snow Survey and Water Supply Forecasting, and Plant Materials Centers ( Figure 1 ). Technical assistance for conservation is currently funded through both mandatory and discretionary sources, with CO being the primary account receiving discretionary funding from annual appropriations. The Trump Administration's FY2020 budget requested $755.0 million for CO, $64.5 million less than the amount enacted for FY2019, in part due to a proposed consolidation of mandatory and discretionary accounts to pay for conservation technical assistance. USDA has proposed consolidating funding through multiple Administrations, but Congress has never adopted this approach (see \" Funding for Technical Assistance \" section below). The FY2020 appropriation increases CO funding in FY2020 by $10.1 million from FY2019 and directs CO funding for a number of conservation programs ( Table 1 ). Report language further directs funding to selected activities ( Table 4 ). NRCS is the current federal provider of technical assistance for agriculture conservation. NRCS provides technical assistance at the request of the landowner to conserve and improve natural resources. The assistance includes technical expertise combined with knowledge of local conditions and is provided through a network of federal staff located throughout the United States. Much of the conservation technical assistance provided by NRCS is funded through the CTA program within CO. Funds are used to support salaries and expenses for NRCS staff, technology development, conservation system design, compliance reviews, grants to partners for additional technical assistance capacity, and resource assessment reports. Total funding for CO has fluctu ated in recent years. In some cases, such fluctuation is the result of an Administration's request. In other cases, funding changes reflect national budget dynamics that are not unique to CO (e.g., reductions caused by sequestration in FY2013, and funding increases through budget agreements in FY2014-FY2020). In inflation-adjusted dollars, CO has declined over the past 20 years (see Figure 2 ). The other side of agricultural conservation assistance is financial assistance. Financial assistance provides direct payments to landowners to implement certain conservation practices or to conserve and protect natural resources on private land. Most programs that provide financial assistance are authorized through omnibus farm bills and receive funding from mandatory sources, and thus do not require an annual appropriation. In addition to technical assistance provided through CTA and CO, technical assistance is also part of farm bill conservation programs, which are funded through a program's mandatory authorization. Most technical assistance activities within mandatory programs support the delivery of some level of financial assistance as part of a contract or agreement. These activities could include providing designs, standards, and specifications needed to install approved conservation practices and activities. Generally, technical assistance prior to a producer entering into a contract for financial assistance is considered to be part of CTA. It is not until after a producer signs a contract for financial assistance that technical assistance is funded from the individual mandatory program rather than CTA. Once the financial assistance contract is complete, most mandatory program funds are no longer available to support ongoing assistance in maintaining the conservation plans, practices, and activities implemented under the financial assistance program. Since the mid-1990s, Congress and various Administrations have proposed changes to how technical assistance is funded. The Administration's FY2020 budget request proposed to transfer funding from mandatory conservation programs and discretionary appropriations to a consolidated account dedicated to technical assistance for farm bill conservation programs. This concept is not new. A similar proposal was included in the FY2018-FY2019 (Trump) and FY2014-FY2017 (Obama) presidential budget requests. The CO account funds more than half of NRCS staff, with other, smaller discretionary programs and mandatory conservation programs accounting for the remainder. A decline in CO funding, therefore, correlates to a decline in the number of NRCS staff. Total, actual, permanent positions at NRCS that are funded by CO have generally declined through FY2018. This reduction in staff has been further magnified by a growing number of unfilled positions at the agency (see Figure 3 ). The FPAC Business Center has also impacted NRCS staffing and funding levels (for more information on the Business Center, see the \" Farm Production and Conservation Business Center \" section). The FY2020 appropriation provides the Administration's requested level of $206.5 million in discretionary funding for the FPAC Business Center. This is $10 million less than Congress provided in FY2019. This appropriation is separate from the transfer of funds from the three FPAC agencies. In FY2019, Congress realigned funding and staff to the Business Center, including funding from NRCS discretionary accounts and $60.2 million from mandatory farm bill conservation program accounts. The FY2019 realignment of funds and staff included the transfer of approximately 882 staff years from NRCS to the Business Center (over 9% of effective NRCS staff years). The transfer of funding and functions are a part of the Business Center's goal of achieving efficiencies within the FPAC mission area. Given the decline in CO-funded technical assistance staff years, it is difficult to evaluate how the transfer of NRCS positions to the FPAC Business Center has impacted the agency's overall operations and ability to provide technical assistance to farmers and ranchers. Also unclear is the extent to which the Business Center's realignment of staff may have contributed to the decrease in NRCS staffing levels and to the increase in total unfilled NRCS positions. The FY2020 appropriation includes funding for watershed activities, including Watershed and Flood Prevention Operations (WFPO)âa program that assists state and local organizations with planning and installing measures to prevent erosion, sedimentation, and flood damage. The appropriation increases WFPO funding to $175 million, $25 million more than the FY2019 level of $150 million. The FY2020 Administration request proposed that no funding be provided for the program. Since FY2014, Congress has directed a portion of CO funds to select WFPO activities. The enacted appropriation includes similar directive language ($5.6 million; see Table 1 ), in addition to the $175 million for the program as a whole. This is less than the $11.2 million proposed in the Senate-passed bill. Neither the House-passed bill nor the Administration's request included such directive language. The FY2020 appropriation also includes $10 million for the Watershed Rehabilitation Programââthe same as the FY2019 level. The Watershed Rehabilitation Program repairs aging dams previously built by USDA under WFPO. The Administration's request included no funding for FY2020. The 2018 farm bill provides $50 million annually in permanent mandatory funding for WFPO and Watershed Rehabilitation activities. The mandatory funding is in addition to discretionary funding provided through annual appropriations. Mandatory conservation programs are generally authorized in omnibus farm bills and receive funding from the CCC and thus do not require an annual appropriation. The 2018 farm bill reauthorized mandatory funding for many of the agricultural conservation programs through FY2023. Because most of these programs are classified as mandatory, nonexempt spending, they are reduced annually by sequestration. The President's FY2020 budget requested a reduction of $40 million annually to the Agricultural Conservation Easement Program and the elimination of the Conservation Stewardship Program. Both programs were reauthorized to receive mandatory funding in the 2018 farm bill through FY20203. The FY2020 appropriation does not reduce these or other mandatory farm bill conservation programs. The Farm Production and Conservation (FPAC) mission area was created in 2017 as part of a larger departmental reorganization. FPAC includes NRCS, FSA, the Risk Management Agency (RMA), and a new FPAC Business Center. The FPAC Business Center is responsible for financial management, budgeting, human resources, information technology, acquisitions/procurement, strategic planning, and other customer-oriented operations of three agenciesâNRCS, FSA, and RMA. Congress reduced funding for NRCS, FSA, and RMA in FY2019 to realign funding and staff to the FPAC Business Center. The FY2020 appropriation includes the Administration's requested level of $206.5 million for the Business Center. This is $9.8 million less than the enacted FY2019 appropriation (see Table 2 ). According to the Administration's FY2020 request, the proposed reduction is the result of \"realizing efficiency improvements.\" The proposed reduction for FY2020 to the FPAC Business Center's appropriation could affect the implementation of conservation programs if efficiencies are not realized. The explanatory statement of the FY2020 appropriation directs USDA to produce a report to the Appropriations Committees within 60 days of enactment on the center's efficiency gains, the metrics by which such gains are measured, and its hiring acceleration and reorganization plans. Similar language was included in the Senate committee report ( S.Rept. 116-110 ), which also cited concerns related to the Business Center's delays in filling critical vacancies, potentially resulting in delayed deployment of conservation and commodity programs. The Senate committee report expressed concern that additional functions and staff positions affiliated with NRCS state offices are being moved to the FPAC Business Center. The FY2020 appropriation directs a transfer of funds to the FPAC Business Center from other accounts, including mandatory conservation programs and farm loan accounts. This transfer could result in NRCS effectively receiving less in total funding if the amount shifted would have been used for NRCS administrative or technical assistance had the Business Center not been created. In total, the direct appropriation and transfer of funds would provide the FPAC Business Center with $282.8 million in FY2020 (see Table 2 ). In addition to setting budgetary amounts, the Agriculture appropriations bill may also include policy-related provisions that direct how the executive branch should carry out an appropriation. These provisions may have the force of law if they are included in the text of an appropriations act, but their effect is generally limited to the current fiscal year (see Table 3 ). Policy-related provisions generally do not amend the U.S. Code or have long-standing effects. For example, the WFPO program has historically been called the \"small watershed program,\" because no project may exceed 250,000 acres, and no structure may exceed 12,500 acre-feet of floodwater detention capacity or 25,000 acre-feet of total capacity. The FY2020 enacted appropriation includes a policy provision that waives the 250,000-acre project limit when the project's primary purpose is something other than flood prevention. This provision does not amend the WFPO authorization and therefore is effective only for the funds provided during the current appropriation year. Table 3 compares some of the policy provisions in the Farm Production and Conservation Programs (Title II) and General Provisions (Title VII) titles of the FY2019 and FY2020 Agriculture appropriations bills related to conservation. Many of these provisions were also included in past years' appropriations acts. The table is divided by agency and account according to their location within the FY2019 and FY2020 acts. The explanatory statement that accompanies the final appropriationsâand the House and Senate report language that accompanies the committee-reported billsâmay also provide policy instructions. These documents do not have the force of law but often explain congressional intent, which Congress expects the agencies to follow (see Table 4 ). The committee reports and explanatory statement may need to be read together to capture all of the congressional intent for a given fiscal year. Many of these provisions have been included in past years' appropriations acts. Some provisions in report language and bill text address conservation programs that are not authorized or funded within the annual appropriations (i.e., mandatory spending for farm-bill-authorized programs). Table 4 is divided by the administering agency and by account according to the location of each provision within the two reports.", "summary": "The Agriculture appropriations bill funds the U.S. Department of Agriculture (USDA) except for the Forest Service. The FY2020 Further Consolidated Appropriations Act ( P.L. 116-94 , Division B) includes funding for conservation programs and activities at USDA, among other departments. Agricultural conservation programs include both mandatory and discretionary spending. Most conservation program funding is mandatory and is authorized in omnibus farm bills. Other conservation programsâmostly technical assistanceâare discretionary spending funded through annual appropriations. The FY2020 appropriation includes an increase from FY2019 levels for discretionary conservation programs and generally rejects the Administration's proposed reductions to discretionary and mandatory conservation programs. The largest discretionary conservation program is the Conservation Operations (CO) account, which funds conservation planning and implementation assistance on private agricultural lands across the country. The CO account is administered by the Natural Resources Conservation Service (NRCS) and funds more than half of the agency's total staff positions. The FY2020 enacted appropriation increases funding for CO by $10.1 million above FY2019 levels to $829.6 million. A decline in funding for CO over time has resulted in declining NRCS staffing levels. Much of the conservation technical assistance provided by NRCS is funded through the Conservation Technical Assistance program within CO. Funds are used to support salaries and expenses for NRCS staff, technology development, conservation system design, compliance reviews, grants to partners for additional technical assistance capacity, and resource assessment reports. Reduced staff could impact NRCS's ability to provide technical assistance and administer farm bill conservation programs to farmers and ranchers. The recently created Farm Production and Conservation (FPAC) Business Center receives $206.5 million in the FY2020 appropriationâ$9.8 million less than in FY2019. The FPAC Business Center is responsible for various administrative services for three USDA agencies, including NRCS. In FY2019, Congress realigned funding from NRCS discretionary and mandatory program accounts and NRCS staff to the Business Center. It is unclear how the transfer of NRCS positions and funding to the FPAC Business Center has impacted the agency's overall operations relative to the decline in CO funding. The FY2020 explanatory statement directs USDA to report to Congress on the efficiencies gained through the Business Center's creation, along with other staffing plans. Other discretionary spending is primarily for watershed programs. The largestâWatershed and Flood Prevention Operations (WFPO)âis funded at $175 million in FY2020. This is an increase in WFPO funding from FY2019 levels of $150 million. The FY2020 appropriation also funds other discretionary water-related programs, such as the Watershed Rehabilitation Program ($10 million), Water Bank program ($4 million), and wetland mitigation banking ($5 million). Most mandatory conservation programs are authorized in omnibus farm bills and do not require an annual appropriation. However, previous Congresses have reduced mandatory conservation program funding through Changes in Mandatory Program Spending (CHIMPS) in the annual agricultural appropriations law every year between FY2003 and FY2018. The Trump Administration requested CHIMPS to two mandatory conservation programs for FY2020, but neither of these proposed reductions to mandatory conservation programs is included in the enacted FY2020 appropriation. Agriculture appropriations bills may also include policy-related provisions that direct how the executive branch should carry out the appropriations. In the FY2020 appropriations act, these range from waiving specific programmatic requirements to requiring reports to Congress.", "document_type": "crs"}
{"report": "The Temporary Assistance for Needy Families (TANF) block grant provides grants to states, the District of Columbia, territories, and tribes to help them finance a wide range of benefits and services that address economic disadvantage among children. It is best known as a source to help states finance public assistance benefits provided to needy families with children. However, a state may use its TANF funds \"in a ny manner that is reasonably calculated\" to help achieve TANF's statutory goals to assist families so that children may live in their own homes or with relatives; end dependence on government benefits for needy parents through work, job preparation, and marriage; reduce out-of-wedlock pregnancies; and promote the formation and maintenance of two-parent families. TANF was created by the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA; P.L. 104-193 ). That law provided TANF program authority and funding through FY2002. Since that original expiration of funding, TANF has been funded through a series of extensions (one for five years, and others for shorter periods of time). Most current TANF policies date back to the 1996 law. The major TANF issues facing the 116 th Congress stem from questions about whether or not TANF's current policy framework allows states to de-emphasize addressing the original concerns that led to the creation of TANF, which centered on the terms and conditions under which needy families with children could receive public assistance benefits. Most families receiving public assistance in TANF's predecessor programs were headed by single mothers. TANF public assistance (for the remainder of this report, the term \"assistance\" will be used) takes the form of payments to families to help them meet ongoing basic needs, such as food, clothing, and shelter. The assistance is often paid in cash (a monthly check), but it might also be paid on behalf of families in the form of vouchers or payments to third parties. To be eligible for assistance, a family must have a minor child and be determined as \"needy\" according to the rules of the state. The amount of the assistance benefit is also determined by the state. In July 2017, the monthly TANF assistance benefit for a family of three ranged from $170 a month in Mississippi to $1,021 per month in New Hampshire. To provide context for a discussion of TANF issues in the 116 th Congress, this report describes the main issues discussed in the debates leading to the enactment of PRWORA in 1996; provides an overview of the TANF block grant and its funding; discusses current uses of TANF funds; describes how states are held accountable for achieving the federal goals of TANF and the \"work participation requirements\"; and discusses the decline in the TANF caseload and the implications for how it affects child poverty. The report also describes legislation introduced in the 115 th and the 116 th Congress as it relates to the issues of TANF funding levels and distribution, the uses of funds, and the \"work participation\" requirements. This report does not address all potential issues related to TANF, particularly those related to issues of family structure (a discussion of responsible fatherhood issues, for example, can be found in CRS Report RL31025, Fatherhood Initiatives: Connecting Fathers to Their Children ). The modern form of assistance to needy families with children dates back to the mothers' pensions (sometimes called \"widows' pensions\") funded by state and local governments beginning in the early 20 th century. Federal funding for these programs was first provided in the Social Security Act of 1935, through grants to states in the Aid to Dependent Children (ADC) program, later renamed the Aid to Families with Dependent Children (AFDC) program. The purpose of these grants was to help states finance assistance to help mothers (mostly single mothers and widows or women married to a disabled father) stay at home and care for their children. The goal of keeping mothers out of the labor force to rear their children was met by resistance from some states and localities. Politically, any consensus regarding this policy goal eroded over time, as increasing numbers of womenâparticularly married white womenâjoined the labor force. Additionally, those receiving assistance were increasingly African American families where the father was alive but absent. Benefits and the terms and conditions under which benefits were provided varied considerably by state. A series of administrative and court decisions in the 1950s and 1960s made the terms under which AFDC was provided more uniform across the states, though income eligibility thresholds and benefit levels continued to vary considerably among states up to the end of AFDC and the enactment of TANF. In 1969, the Nixon Administration proposed ending AFDC and replacing it with a negative income tax. While the program would have provided an income guarantee, it also would have gradually phased out benefits as an incentive to work. This proposal passed the House twice but never passed the Senate. In 1972, the Senate Finance Committee proposed to guarantee jobs to AFDC recipients who had school-age children. This proposal was not adopted in the full Senate. President Carter proposed combining the negative income tax with a public service jobs proposal. This, too, was not enacted. In 1981, during the Reagan Administration, the focus of debates over assistance to needy families shifted to a greater emphasis on work requirements and devolution of responsibility to the states. In 1982, President Reagan proposed to shift all responsibility for AFDC to the states, while the federal government would assume all responsibility for Medicaid. This was not enacted. The 1980s also saw an increasing concern that single parents were becoming dependent on assistance. Research showed that while most individuals used AFDC for short periods of time, some received assistance for long periods. There was continuing concern that receipt of AFDCâassistance generally limited to single mothersâled to more children being raised in single parent families. The Family Support Act of 1988 established an education and training program and expanded participation requirements for AFDC recipients. Additionally, the federal government and states fielded numerous experiments that tested approaches to moving assistance recipients (mostly single mothers) into work. These experiments indicated that mandatory participation in a program providing employment services could increase employment and earnings and reduce receipt of assistance. The cash assistance caseload began to increase in 1988, rising to its historical peak in March of 1994. Amid that caseload increase, then-Presidential candidate Bill Clinton pledged to \"end welfare as we know it.\" The subsequent plan created by the Clinton Administration was not adopted; instead, House Republicans crafted a plan following the 1994 midterm elections that became the basis of the legislation enacted in 1996. PRWORA created TANF and established a statutorily set amount of funding to states under the TANF basic block grant through FY2002; new rules for assistance recipients, such as a five-year time limit on federally funded benefits; and a broad-purpose block grant, giving states flexibility in how funds are used. The bulk of TANF funding is in the form of a basic block grant. Both the total amount of the basic block grant ($16.5 billion per year) and each state's share of the grant are based on the amount of federal and state expenditures in TANF's predecessor programs (AFDC and related programs) in the early to mid-1990s. States must also expend a minimum amount of their own funds on TANF or TANF-related programs under the maintenance of effort (MOE) requirement. That minimum totals $10.4 billion per year. The MOE is based on state expenditures in the predecessor programs in FY1994. PRWORA froze funding at both the national and state levels through FY2002. TANF has never been comprehensively reauthorized; rather, it has been extended through a series of short-term extensions and one five-year extension. Thus, a funding freeze that originally was to run through FY2002 has now extended through FY2019. There have been no adjustments for changesâsuch as inflation, the size of the cash assistance caseload, or changes in the poverty populationâto the total funding level or each state's level of funding. While there were some federal rules for the AFDC program, states determined their own income eligibility levels and benefit amounts paid under it. There were wide variations among the states in benefit amounts, and some states varied benefit amounts by locality. In January 1997, the maximum AFDC benefit for a family of three was $120 per month in Mississippi (11% of the federal poverty level) and $703 per month in Suffolk County, NY (63% of the federal poverty level). The variation in AFDC benefit amounts created wide differences in TANF funding relative to each state's number of children in poverty because PRWORA \"locked in\" these historical variations in the funding levels among the states. The state disparities in TANF funding, measured as the TANF grant per poor child, have persisted. Figure 1 shows that, generally, Southeastern states have lower grants per child living in poverty than states in the Northeast, on the West Coast, or in the Great Lakes region. PRWORA included a separate fund, supplemental grants, that addressed the funding disparity among the states. From FY1998 to FY2011, supplemental grants were made to 17 states, all in the South and West, based on either low grant amounts per poor person or high rates of population growth. Supplemental grants were funded at $319 million (compared to the $16.5 billion in the basic TANF block grant), and hence had a limited effect on total TANF grant per poor child. Funding for these grants expired at the end of June 2011 and has not been reauthorized by Congress since. Over time, inflation has eroded the value (purchasing power) of the TANF block grant and the MOE spending level. While annual inflation has been relatively low since FY1997 (averaging 2.1% per year), the decline in TANF's purchasing power has compounded to a loss in value of 36% from FY1997 to FY2018. Under the Congressional Budget Office's (CBO's) January 2019 inflation projections, if TANF funding remains at its current (FY2019) level through FY2029, the value of the TANF block grant would degrade even further, falling to half of its value in FY1997. Figure 2 shows the decline in the value of the TANF grant from FY1997 through FY2018, and as projected under the CBO January 2019 economic forecast. PRWORA established a contingency fund (originally $2 billion) that would be available in states with high unemployment or increased food assistance caseloads. Its funding was depleted in the last recession (exhausted in FY2010). Beginning with FY2011, the fund has received appropriations of $608 million per year. The fund provides extra grants for states that have high and rising unemployment (a 6.5% unemployment rate that is also at least 110% of the rate in the prior two years) or Supplemental Nutrition Assistance Program (SNAP) caseloads that are at least 10% higher than they were in 1994 or 1995; and spend more from their own funds than they spent in FY1994. The law provides that a state may receive up to 20% of its basic block grant in contingency funds; however, the funds are paid on a first-come-first-served basis. If the appropriation is insufficient to pay the full amount of contingency funds, they are prorated to the qualifying states. Both population growth and the increase in the rate at which SNAP-eligible households receive benefits have resulted in most states continuing to meet the SNAP caseload trigger for contingency funds through FY2019. Thus, most states with sufficient state spending on TANF-related activities could continue to draw from the contingency fund. The fund generally spends all of its total each year, regardless of the health of the economyâand thus, it is not serving its original purpose to provide a source of counter-cyclical funding. The bills discussed in this report, with the exception of the RISE Out of Poverty Act ( H.R. 7010 , 115 th Congress), would maintain the overall TANF funding level and its distribution among the states, essentially extending the funding freeze that has prevailed since FY1997. A five-year reauthorization was proposed in the Jobs and Opportunity with Benefits and Services for Success Act, both as reported from the House Ways and Means Committee in the 115 th Congress ( H.R. 5861 ) and in its revised version in the 116 th Congress ( H.R. 1753 / S. 802 ). Both versions of the bill would eliminate the TANF contingency fund and use savings to offset an equal increase in mandatory child care spending. The Promoting Employment and Economic Mobility Act ( S. 3700 ; 115 th Congress) would have been a three-year reauthorization. H.R. 7010 would have indefinitely authorized funding for TANF. It would have provided for both an initial increase in TANF funding and ongoing annual increases. The initial increase for each state would have reflected both inflation and child population growth since 1997; future increases would have increased the block grant annually for those factors. While H.R. 7010 would not have redistributed funds among the states, the increases in funding would have been greater for those states that experienced faster child population growth than for those with slower growth, no growth, or population losses. In addition to the higher, capped funding amount of the basic block grant, H.R. 7010 would have provided open-ended (unlimited) matching funds for subsidized employment and to guarantee child care to certain populations. It would also have increased TANF contingency funds. Table 1 summarizes provisions related to TANF funding levels and the distribution of funds in selected legislation introduced in the 115 th and 116 th Congresses. Though most of the debates leading to PRWORA in 1996 and the creation of TANF focused on assistance to needy families with children, the law as written created a broad-purpose block grant. Thus, TANF is not a program. It is a funding stream that is used by states for a wide range of benefits and services. States have broad discretion on how they expend federal TANF grants. States may use TANF funds \"in any manner that is reasonably calculated\" Â to accomplish the block grant's statutory purposes, which involve TANF increasing the flexibility of states in operating programs designed to provide assistance to needy families so that children may be cared for in their own homes or in the homes of relatives; end the dependence of needy parents on government benefits by promoting job preparation, work, and marriage; prevent and reduce the incidence of out-of-wedlock pregnancies and establish annual numerical goals for preventing and reducing the incidence of these pregnancies; and encourage the formation and maintenance of two-parent families. There are no requirements on states to spend TANF funds for any particular benefit or activity. Current law does not have a statutory definition of \"core activities\" to guide states to prioritize spending among the wide range of benefits and services for which TANF funds may be used. States also determine what is meant by \"needy\" for activities related to the first two statutory goals of TANF. And states may use federal TANF funds for activities related to reducing out-of-wedlock pregnancies and promoting two-parent families without regard to need. In addition to expending federal funds on allowable TANF activities, federal law permits states to use a limited amount of these funds for other programs. A maximum of 30% of the TANF block grant may be used for the following transfers or expenditures: transfers to the Child Care and Development Block Grant (CCDBG); transfers to the Social Services Block Grant (SSBG) (the maximum transfer to the SSBG is set at 10% of the basic block grant); and a state match for reverse commuter grants, providing public transportation from inner cities to the suburbs. The range of expenditures on activities that states may count toward the maintenance of effort requirement isâlike the authority to spend federal fundsâquite broad. The expenditures need not be \"in TANF\" itself, but in any program that provides benefits and services to TANF-eligible families in cash assistance, child care assistance, education and job training, administrative costs, or any other activity designed to meet TANF's statutory goals. States may count expenditures made by local governments toward the MOE requirement. Additionally, there is a general rule of federal grants management that permits states to count as a state expenditure third-party (e.g., nongovernmental) in-kind donations, as long as they meet the requirements of providing benefits or services to TANF-eligible families and meet the requirements for the types of activities that states may count toward the MOE requirement. Most federal rules about state accountability apply only to expenditures on assistance and families receiving assistance. TANF has few federal rules for the other expenditure categories. Thus, the federal rules under the CCDBG (e.g., the CCDBG health and safety requirements) apply only to federal TANF dollars transferred to CCDBG. These rules do not apply to TANF funds spent on child care but not transferred to CCDBG. The same principle applies to spending in most other expenditure categories where federal programs exist (e.g., child welfare services and early childhood education, such as Head Start). There is also little in the way of accountability for TANF spending other than assistance spending. Expenditures on TANF assistance have shrunk as a share of total TANF spending. As shown in Figure 3 , total (federal and state) expenditures on assistance totaled $21.9 billion in FY1995 under AFDC. This accounted for more than 7 out of 10 dollars spent on AFDC and related programs. However, by FY2018 assistance accounted for 1 out of 5 TANF dollars. Figure 4 shows the national total of TANF federal and state dollars by activity in FY2018. Most states shifted spending toward areas such as refundable tax credits and child welfare, pre-kindergarten, and other services. Additionally, for child care and work education and training, the reported expenditures are the total expenditures made from TANF and MOE fundsânot necessarily expenditures to support families receiving assistance. There is also considerable variation among the states in the share of spending devoted to each of these major categories of expenditures. Figure 5 shows expenditures by major category and state for FY2018. States are sorted by the share of their total expenditures devoted to assistance. The figure shows a wide range of expenditure patterns among the states. For example, the share of total expenditures devoted to assistance range from a low of 2.5% (Arkansas) to a high of 65.8% (Kentucky). Child care expenditures vary from zero in two states (Tennessee and Texas) to a high of 65.6% (Delaware). TANF's flexible funding permits states to use TANF funds in different and innovative ways. For example, states used TANF funds to develop nurse home visiting programs prior to the creation of the primary federal program (Maternal, Infant, and Early Childhood Home Visiting). States also used the flexibility inherent in TANF to develop subsidized jobs programs and different models of subsidizing jobs, including subsidizing private sector jobs. The Jobs and Opportunity with Benefits and Services for Success Act, both as reported from the House Ways and Means Committee in the 115 th Congress ( H.R. 5861 ) and its revised version in the 116 th Congress ( H.R. 1753 / S. 802 ), has provisions that would require at least 25% of TANF expenditures from federal funds and expenditures counted as MOE dollars to be spent on \"core\" activities. The bills would provide a statutory definition of \"core\" activities that includes assistance, work activities, work supports, case management, and nonrecurrent short-term benefits. They would prohibit direct spending on child care within TANF by requiring that TANF dollars be transferred to the CCDBG in order for states to use federal TANF funds for child care, and they would restrict TANF spending on child welfare services. They would also phase out the ability of states to count the value of donated, in-kind services toward their MOE spending requirement. Additionally, they would limit TANF funds to providing benefits and services only to families with incomes under 200% of the federal poverty level (FPL). The version in the 116 th Congress would prohibit direct spending on early childhood education with TANF federal dollars. The RISE Out of Poverty Act ( H.R. 7010 , 115 th Congress) would not have directly limited states' use of basic block grant funds, though it had some provisions related to standards for cash benefit amounts that could affect state spending on assistance versus other benefits and services. H.R. 7010 also had separate matching funds for subsidized employment and guaranteed child care. S. 3700 (115 th Congress) would not have restricted the use of TANF funds. Rather, it would have required additional reporting by states on TANF expenditures. It would have required separate reports on the amount of TANF spending on (1) families that received assistance, and (2) those below 200% of the federal poverty level. Table 2 summarizes provisions related to the use of TANF funds in legislation proposed in the 115 th and 116 th Congresses. A major focus of the debates that led to the enactment of PRWORA was how to move assistance recipients into employment. Under AFDC law, most adult recipients were reported as not working (at least, not working in the formal labor market). In the 1980s and 1990s, both the federal government and the states conducted a series of demonstrations of different employment strategies for AFDC recipients, which concluded that mandatory work participation requirementsâin combination with funded employment servicesâcould, on average, increase employment and earnings and reduce assistance expenditures. These demonstrations also found that if such requirements and services were further combined with continued government support to supplement wages, family incomes could, on average, be increased. Mandatory participation requirements meant that if an individual did not comply with work requirements, they would be sanctioned through a reduction in their family's benefit. TANF implemented work requirements through a performance system that applies to the state , rather than implementing requirements on individuals; thus, the mandatory work participation requirements that apply to individual recipients are determined by the states rather than federal law. States have considerable flexibility in how they may implement their requirements. The performance standard states must meet, or risk being penalized, is a minimum work participation rate (WPR). The minimum WPR is a performance standard for the state; it does not apply directly to individual recipients. The TANF statute requires states to have 50% of their families receiving assistance who have a \"work-eligible individual\" meet standards of participation in work or activitiesâthat is, a family member must be in specified activities for a minimum number of hours. There is a separate participation standard of 90% that applies to the two-parent families. A state that does not meet its minimum WPR is at risk of being penalized through a reduction in its block grant. The WPR represents the percentage of families with a work-eligible individual who are either working or participating in job preparation activities. Federal rules list those activities, and also require participation for a minimum number of hours per week (which vary by family type). Federal TANF law limits the extent to which states may count pre-employment activities such as job search and readiness or education and training. The complex rules of the WPR can be met through several different routes in addition to engaging unemployed recipients in job preparation activities: assistance paid to needy parents who are already working, caseload reduction, and state spending beyond what is required under TANF. States receive credit toward their minimum WPR for \"unsubsidized employment\"âemployment of a work-eligible individual in a regular, unsubsidized job. In the early years of TANF, states began to increase aid to families that obtained jobs while they received assistance. States changed the rules of their programs to allow families with an adult who went to work while on TANF to continue receiving assistance at higher earnings levels and for longer periods of time after becoming employed. This policy helped states meet their minimum WPR, as unsubsidized employment counts toward meeting that requirement. Additionally, such \"earnings supplements\" helped raise incomes of working recipients. In recent years, states have implemented new, separate programs that provide assistance to low-income working parents. For example, Virginia has a program that provides $50 per month for up to one year to former recipients who work and are no longer eligible for regular TANF assistance. Other states, such as California, provide small (e.g., $10 per month) TANF-funded supplements to working parents who receive Supplemental Nutrition Assistance Program (SNAP) benefits. Because these programs are TANF-funded and are assistance, they too help states meet the minimum WPR requirements. The statutory work participation targets (50% for all families, 90% for two-parent families) can be reduced by a \"caseload reduction credit.\" This credit reduces the participation standard one percentage point for each percentage point decline in the number of families receiving assistance since FY2005. Additionally, under a regulatory provision, a state may get extra credit for caseload reduction if it spends more than is required under the TANF MOE. Because of the caseload reduction credit, the effective standards states face are often less than the 50% and 90% targets, and they vary by state and by year. Another practice states have engaged in to help meet their minimum WPR is aiding families in \"solely state-funded programs\"âthose funded with state dollars that do not count toward the TANF MOE. If a family is assisted with state monies not counted toward the TANF MOE, the state is not held accountable for that family by TANF's rules. Many states have moved two-parent families out of TANF and into solely state-funded programs, as these families carry a higher minimum work participation rate. In FY2018, 25 jurisdictions reported no two-parent families in their TANF assistance caseload, though all but two of these jurisdictions did aid two-parent families. Some states have excluded other families from TANF, particularly those less likely to be employed. For example, Illinois assists several categories of families in a non-TANF, solely state-funded program: parents with infants, refugees, pregnant women, unemployed work-eligible individuals not assigned to an activity, and individuals in their first month of TANF receipt. In FY2018, all states except Montana met their all-family (50%) minimum WPR standard. In that year, 18 states met their minimum all-family WPR through caseload reduction alone; and 4 additional states plus Puerto Rico met their minimum all-family WPR through a combination of caseload reduction and credit for state spending in excess of what is required under MOE rules. That is, 23 jurisdictions met their mandatory work participation standard without needing to engage a single recipient in work or job preparation activities. Note that these jurisdictions did report that some recipients in some of their families were working or engaged in job preparation activities, although they did not have to be in order to meet federal requirements. In terms of participation in work or job preparation activities in FY2018, states relied heavily on \"unsubsidized employment\" (i.e., families that receive TANF assistance while a work-eligible member is employed in a regular, unsubsidized job). As shown in Figure 6 , participation in unsubsidized employment was the most common activity, with a monthly average of 40.8% of TANF work-eligible individuals reporting unsubsidized employment during FY2018. In terms of funded employment services, the highest rate of participation among work-eligible individuals was 6.5% in job search and readiness in FY2018. In that year, 3.0% of work-eligible individuals participated in vocational educational training. Close to half of all work-eligible individuals reported no work or participation in activities during a typical month in FY2018. Work requirements mean that participation in work or a job activity is mandatory for certain recipients of assistance. Individuals who do not comply with a work requirement risk having their benefits reduced or ended; thus, such financial sanctions operate as an enforcement mechanism. TANF requires a state to sanction a family by reducing or ending its benefits for refusing to comply with work requirements; however, under current law TANF does not prescribe the sanction the state must use, and the amount of the sanction is determined by the state. Most states ultimately end benefits to families who do not comply with work requirements, though a lesser sanction is often used for first, and sometimes second, instances of noncompliance. States can define \"good cause\" and other exceptions for families refusing to comply, allowing them to avoid sanctions. Additionally, federal law and regulations provide protections against sanctioning certain recipients. States are prohibited from sanctioning single parents with a child under the age of six if the parent cannot obtain affordable child care. States can also provide a waiver of program rules (including work requirements) for victims of domestic violence. Data indicating that nearly half of all work-eligible individuals were not engaged in activities in a typical month and states' reliance on unsubsidized employment has raised concerns that states have not focused on moving unemployed recipients into work. The effectiveness of the minimum WPR standardâthe primary federal provision to motivate states to try to engage unemployed recipientsâhas been questioned. As discussed above, the caseload reduction credit has lowered the minimum WPR required of states, sometimes to zero. States have engaged in various practices to help them meet the minimum WPR. Even with relatively low rates of participation in job preparation activities, most states have met their WPR, raising the question as to whether states are \"hitting the target, but missing the point.\" The Jobs and Opportunity with Benefits and Services for Success Act, both as reported from the House Ways and Means Committee in the 115 th Congress ( H.R. 5861 ) and its revised version in the 116 th Congress ( H.R. 1753 / S. 802 ), would replace the minimum WPR with a new performance system based on employment outcomes. H.R. 5861 would have replaced the WPR with employment outcomes based on the measures used in the Workforce Innovation and Opportunity Act (WIOA) programs, measuring employment rates and earning levels among those who exit TANF assistance. Each state would have been required to negotiate performance levels with HHS. States that failed to meet those levels would have been at risk of being penalized. The proposal would also have required the development of a model to adjust the outcomes statistically for differences across states in the characteristics of their caseloads and economic conditions. H.R. 1753 / S. 802 introduced in the 116 th Congress would also end the minimum WPR, but replace it with a different outcome measure: the number of people who have left TANF assistance and are employed after six months divided by the total TANF caseload. Each state would negotiate a performance level with HHS on this measure, and risk being penalized through a reduction in its block grant if it fell short of that level. States would also be required to collect and report data on the WIOA measures that were contained in the 115 th Congress version of the bill, but these would be for informational purposes only. The other bills discussed in this report would have retained the WPR. However, S. 3700 (115 th Congress) would have required the collection of WIOA-like performance measure data and a study by HHS of the impact of moving from the WPR to a performance system based on outcome measures. Examining outcomes is often intuitively appealing. Outcomes such as job entry or leaving assistance with a job seem to measure more aptly whether TANF is achieving its goal of ending dependence of needy parents on government benefits through work. However, outcome measures can have their own unintended consequences in terms of influencing the design of state programs. The most commonly cited unintended consequence is \"cream skimming,\" improving performance outcomes through serving only those most likely to succeed and leaving behind the hardest-to-serve. The statistical adjustment models contained in these proposals attempt to mitigate the incentive to \"cream skim,\" but such models might not capture all relevant differences in caseload characteristics. In addition, it can be argued that outcomes do not directly measure the effectiveness of a program. Some families would leave the cash assistance rolls even without the intervention of a program. The effectiveness of a program can also be measured by whether the program made a difference: that is, did it result in more or speedier exits from the program and improve a participant's employment and earnings? That can only be measured by an evaluation of the impact of a program. There is research indicating that long-term impacts of labor force programs are not necessarily related to short-term outcome measures. Current law requires that each adult (or minor who is not in high school) be assessed in terms of their work readiness and skills. States have the option to develop an Individual Responsibility Plan (IRP) on the basis of that assessment, in consultation with the individual, within 90 days of the recipient becoming eligible for assistance. As of July 2017, 37 states and the District of Columbia had IRP plans for TANF assistance recipients. Under current law, the contents of the plan must include an assessment of the skills, prior work experience, and employability of the recipient. The IRP is also required to describe the services and supports that the state will provide so that the individual will be able to obtain and keep employment in the private sector. In 2002, the George W. Bush Administration proposed, as part of its TANF reauthorization, a \"universal engagement\" requirement. The legislation written to implement the Administration's reauthorization proposal would have required states to create a written individualized plan for each family. This universal engagement proposal passed the House three times between 2002 and 2005 and was included in bills reported from the Senate Finance Committee during that period, but it was never enacted. H.R. 5861 , the version of the Jobs and Opportunity with Benefits and Services for Success Act in the 115 th Congress, revived the notion of requiring a plan for each work-eligible individual. The plan, required within 60 days of an individual becoming eligible for benefits, would have incorporated a requirement that the individual participate in the same activities that currently count toward the WPR for the minimum number of hours that currently apply in the rules for WPR participation. The minimum hours vary by family type (e.g., 20 hours per week for single parents, 30 for other family types). States would have had the ability to determine the sanction for noncompliance. H.R. 1753 / S. 802 , the revised version of this bill in the 116 th Congress, directs states to require that all work-eligible individuals who have been assessed and have an individualized plan, except single parents caring for infants, engage in the listed activities for a minimum number of hours based on the individuals' family types. Further, it specifies a formula (hours of participation divided by required hours) for sanctioning families with individuals who refuse to comply with work requirements, instead of allowing states to determine the sanction. States with families who fail to meet these requirements would be at risk of being penalized through a reduction in their block grant. The requirement in H.R. 1753 / S. 802 that all work-eligible individuals participate or be subject to sanction may raise a number of issues: As discussed, current law and regulations afford protections against sanctioning single parents with children under six who cannot obtain affordable child care, and victims of domestic violence. It is unclear how these protections would interact with a new \"universal engagement\" proposal. The emphasis on an individual participation requirementârather than a participation rateâmay raise questions about whether other groups should be exempted or afforded special treatment. For example, should ill, disabled, aged parent, or caretaker recipients be exempt from requirements? Further, individuals with disabilities must be accommodated in the workplace, and reduced hours is one of the potential accommodations. Thus, if Congress were to consider requiring disabled individuals to work, it might consider special dispensations for them that included a reduced-hour requirement. Research suggests that mandatory participation requirements result in fairly large amounts of noncompliance. The bill specifies how that noncompliance would be dealt withâa proportional reduction in benefitsâbut evidence is lacking on the impacts of that specific sanction versus other forms of sanctioning. The pre-1996 research, while finding that sanctioning was important in enforcing mandatory requirements, which led to higher employment and lower assistance, did not produce evidence on whether any specific form of sanctioning was more effective than others. H.R. 7010 (115 th Congress) also included \"universal engagement\" provisions, but their general intent was to require that each family have a plan rather than to enforce work participation requirements. This bill also would have required states, before sanctioning noncomplying recipients, to notify the family of the noncompliance; provide the noncomplying individual with an opportunity for a face-to-face meeting; and consider whether the noncompliance resulted from mental or physical barriers to employment, limited English proficiency, or failure to receive or access services in the family's plan. Table 3 summarizes the work participation provisions of the selected TANF legislation in the 115 th and 116 th Congresses. The debate that led to the creation of TANF in 1996 focused on assistance to needy families with childrenâprimarily those with one parent, usually a mother without employment in the formal labor market. As discussed earlier in this report, three provisions of law largely shaped the current TANF landscape: limited funding for TANF; TANF's broad authority for states to use funds on a wide range of activities, which has allowed states to use TANF funds for activities unrelated to assistance and the population receiving assistance; and the mandatory work participation rates, which provide states incentives to reduce the cash assistance caseload as well as expand aid to families with earnings. Figure 7 shows estimates that fewer eligible people actually received cash assistance for selected years over the period covered. The selected years include 1995, the year before the enactment of PRWORA; 2000 and 2007, which both represent peaks in the economic cycle; 2010, the year following the end of the most recent recession; and 2016, the most recent year for which data are available. The figure shows that the population eligible for assistance has varied with the economic cycle. However, except for a brief uptick in the caseload during the most recent recession, the number of people receiving assistance has generally declined. The TANF caseload decline resulted from both a decline in the population eligible for assistance (the population in need) and a decline in the share of the eligible population actually receiving benefits; however, much of it was the result of the decline in the share of the eligible population receiving benefits. In 1995, 81.6% of estimated AFDC-eligible individuals received benefits. In 2016, 26.6% of people estimated to be eligible for TANF cash assistance received benefits. How has the decline in the share of eligible individuals affected the child poverty rate? Figure 8 compares the national child poverty rate using income that does not include assistance and income with assistance (AFDC in 1995, TANF thereafter) included. In the selected years the figure covers, both AFDC and TANF reduced the child poverty rate by less than 1 percentage point. In 1995, AFDC income reduced the observed poverty rate by 0.9 percentage points. In 2016, TANF reduced the observed poverty rate by 0.2 percentage points. Though AFDC did relatively little to change the child poverty rate, it did reduce the severity of poverty for children. Figure 9 compares the child deep poverty rate (family incomes under 50% of the poverty threshold) using income that does not include assistance and income with assistance (AFDC in 1995, TANF thereafter) included. AFDC income reduced the deep child poverty rate from 11.2% to 6.6% in 1995. In contrast, TANF assistance decreased the child deep poverty rate from 7.7% to 7.1% in 2016. Another way to examine how the decline in the share of individuals eligible for TANF has diminished the role assistance has played in alleviating child poverty is to examine the pre- and post-assistance aggregate poverty gap. The poverty gap for a poor family is the difference between its poverty threshold and total money income. For example, if a family's poverty threshold is $25,000 and it has money income equal to $20,000, its poverty gap is $5,000. If another family with the same poverty threshold has money income equal to $10,000, its poverty gap is $15,000. The poverty gap for a nonpoor family is, by definition, $0. The aggregate poverty gap is the poverty gap for each poor family summed, and it therefore represents a measure of the depth of poverty (in dollars) for every family in the country combined. If the aggregate gap were somehow filled (i.e., if the family in the first example earned or received an extra $5,000, the family in the second earned or received an extra $15,000, and this same pattern repeated for all families in poverty) poverty would be eliminated. Table 4 shows the pre- and post-assistance poverty gaps for families with children for selected years from 1995 to 2016 in constant (inflation-adjusted) 2016 dollars. In 1995, AFDC reduced the poverty gap by over $24 billion (more than 27% of the pre-assistance poverty gap of approximately $90 billion). After 1996, the poverty gap varied with the economic cycle. However, the share of the gap that was reduced by TANF assistance declined throughout the period in both dollar and percentage terms. In 2016, TANF cash assistance reduced the poverty gap by approximately $4 billion, or 5.7%. The drop in the share of TANF-eligible individuals who receive benefits may raise the question of whether a goal of TANF should be caseload reduction per se, regardless of whether or not the size of the population in need is growing. Under TANF, the primary incentive for states to maintain or reduce the number of families receiving assistance is that states are provided a limited amount of TANF funds. States bear the financial risk of the costs of an increase in the number of families receiving assistance. Such an increase would mean a state would have fewer TANF funds to spend on activities other than assistance. The state might have to use more non-TANF dollars if it wanted to make up the shortfall. On the other hand, fewer families receiving assistance frees up funds to use for such activities. All the bills discussed in this report would maintain a limitation on TANF funds distributed to states to finance assistance, though the RISE Out of Poverty Act ( H.R. 7010 , 115 th Congress) would increase those funds for inflation and population growth. All the bills discussed in this report would either eliminate or limit the caseload reduction credit against the TANF work participation standards. This would eliminate or limit one incentive for states to reduce their assistance caseload. However, states would still have the incentive to reduce their caseload because of limited funding. The bills discussed in this report that would require a minimum percentage of TANF spending be on \"core\" activities do not directly address the question of whether the caseload decline has left a population unserved. They would constrain states in what they spend TANF dollars on, not who benefits from this spending. States would be able to meet the requirement by spending a sufficient amount on work activities, but those dollars could serve disadvantaged parents who do not receive assistance. H.R. 7010 would have required states to have procedures in place, such as pre-sanction reviews, and prohibit full-family sanctions for failure to meet program requirements. These provisions could have affected the share of the TANF-eligible population that receives assistance. All of the bills discussed in this report except S. 3700 (115 th Congress) would make child poverty reduction a goal of the TANF block grant. H.R. 7010 would have also required states to determine family budgets sufficient to meet needs and required them to ensure that the amount of assistance paid by the state meets those needs. This is not a requirement under current law. Under AFDC, states were required to determine a dollar standard of \"need,\" but were not required to pay assistance in the amount of \"need.\" Table 5 summarizes provisions related to child poverty reduction and incentives for caseload reduction in selected TANF legislation proposed in the 115 th and 116 th Congress. The debates that led to the creation of TANF focused on the terms and conditions under which assistance for needy families with children had been provided. However, Congress created TANF as a broad-purpose block grant that funds a wide range of benefits and services related to childhood economic disadvantage. Since the mid-1990s, states have shifted spending from assistance to those other TANF-funded benefits and services. Spending on assistance fell as the number of families and individuals receiving assistance fell. Much of the decline in the assistance caseload resulted from a drop in the share of eligible people receiving benefits. A substantial number of children and their parents were eligible for TANF assistance but did not receive it; in 2016, an estimated total of 12.4 million individuals were eligible but did not receive TANF assistance, compared to 4.5 million individuals who received benefits at some point in that year. The result was a diminished impact of assistance on alleviating child poverty. Other means-tested programs have grown in terms of spending and recipients (e.g., the Earned Income Tax Credit (EITC), the child credit, the Supplemental Nutrition Assistance Program (SNAP), and Medicaid). However, these programs do not provide ongoing cash assistance to families to meet basic needs. SNAP provides food assistance, Medicaid provides medical assistance, and the refundable tax creditsâthe EITC and the refundable portion of the child creditâprovide families with income only once a year at tax refund time. If policymakers conclude there is an unmet need for ongoing cash assistance to families to meet basic needs, they might consider changes to TANF or consider other alternatives outside of TANF. A common feature of most of the bills discussed in this report is an attempt to focus a greater share of TANF dollars on activities related to assistance and work, and revamp the way state programs are assessed on their performance in engaging assistance recipients in work or job preparation activities. The elimination of the caseload reduction credit would remove one of the incentives to reduce the number of families receiving assistance. However, there are proposals that would go beyond changes to TANF to address issues related to economic security for families with children. In 2019, a National Academy of Sciences panel on child poverty proposed converting the child tax credit, with a refundable portion that is currently paid once a year through tax refunds, into a monthly, almost universal child allowance. The NAS proposal would provide the child allowance to families both with and without earnings. The NAS stated: The principal rationale for a child allowance paid on a monthly basis is that it would provide a steady, predictable source of income to counteract the irregularity and unpredictability of market incomeâ¦. Because the child allowance would be available to both low-income and middle-class families, it would carry little stigma and would not be subject to the varying rules and administrative discretion of a means-tested program, thereby promoting social inclusion. Other proposals would seek to guarantee jobs or subsidize jobs. For example, the ELEVATE Act ( H.R. 556 / S. 136 ), introduced by Representative Danny Davis and Senator Wyden, would provide matching grants to states (100% federally funded grants during recessions) to subsidize wage paying jobs for individuals. These proposals echo some of the proposals that were made during past debates. Guaranteed incomesâa child allowance is, in effect, a guaranteed income for families with childrenâand guaranteed or expanded jobs programs were both proposed in the past. Should Congress again consider such proposals, they may raise issues that have been recurring themes in the debates on policies for low-income individuals, such as whether benefits should be universal or targeted; whether intervention should be in the form of income, services, or employment; whether there should be behavioral conditions (e.g., a requirement to work) attached to aid; and whether policies should be determined nationally or at the state and local levels.", "summary": "The Temporary Assistance for Needy Families (TANF) block grant was created by the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA; P.L. 104-193 ). That law culminated four decades of debate about how to revise or replace the Aid to Families with Dependent Children (AFDC) program. Most AFDC assistance was provided to families headed by single mothers who reported no work in the labor market, and the debates focused on whether such aid led to dependency on assistance by discouraging work and the formation and maintenance of two-parent families. TANF provides a fixed block grant to states ($16.5 billion total per year) that has not been adjusted at either the national or state levels since 1996. The TANF block grant is based on expenditures in the AFDC program in the early to mid-1990s, and thus the distribution of funds among the states has been \"locked in\" since that time. The purchasing power of the block grant has also declined over time due to inflation. Since 1997, it has lost 36% of its initial value. The debates that led to the creation of TANF in 1996 focused on the terms and rules around public assistance to needy families with children. However, PRWORA created TANF as a broad-purpose block grant. States may use TANF funds \"in any manner that is reasonably calculated\" to achieve the block grant's statutory purposes, which involve TANF providing states flexibility to address the effects or the root causes of economic and social disadvantage of children. For pre-TANF programs, public assistance benefits provided to families comprised 70% of total spending. In FY2018, such public assistance comprised 21% of all TANF spending. States spend TANF funds on activities such as child care, education and employment services (not necessarily related to families receiving assistance), services for children \"at risk\" of foster care, and pre-kindergarten and early childhood education programs. There are few federal rules and little accountability for expenditures other than those made for assistance. Before the 1996 law, many states experimented with programs to require work or participation in job preparation activities for AFDC recipients. PRWORA established \"work participation requirements.\" Most of these requirements relate to a performance system that applies to the state as a whole, and are not requirements that apply to individuals. The system requires states to meet a minimum work participation rate (WPR). The complex rules of the WPR can be met through several different routes in addition to engaging unemployed recipients in job preparation activities: caseload reduction, state spending beyond what is required under TANF, and assistance to needy parents who are already working. In FY2018, all but one state met the participation standard. A total of 18 states met their minimum WPR through caseload reduction alone. Spending on assistance and the number of individuals receiving assistance have both declined substantially since the mid-1990s. The reduction in the assistance caseload was caused more by a decline in the percentage of those who were eligible receiving benefits than a decline in the number of people who met TANF's state-defined definitions of financial need. Assistance under TANF alleviates less poverty than it did under AFDC. While there have been expansions in other low-income assistance programs since PRWORA was enacted, such as the refundable tax credits from the Earned Income Tax Credit (EITC) and the child tax credit, those programs do not provide ongoing assistance on a monthly basis. Some of the TANF reauthorization bills introduced in the 115 th and 116 th Congresses attempt to focus a greater share of TANF dollars on activities related to assistance and work. Additionally, these bills would revise the system by which state programs are assessed on their performance in engaging assistance recipients in work or job preparation activities.", "document_type": "crs"}
{"report": "Over the years, the federal intergovernmental system of governance has been characterized by many scholars as becoming increasingly centralized and coercive, with the federal government using federal grants, federal mandates, and federal preemption of state authority to expand its influence in many policy areas previously viewed as being the traditional responsibility of state and local governments. In FY2019, the federal government is expected to provide state and local governments about $750 billion in federal grants encompassing a wide range of public policy areas, such as health care, transp ortation, income security, education, job training, social services, community development, and environmental protection. Federal grants account for just under one-third of total state government funding, and more than half of state government funding for health care and public assistance. Congress has a central role in determining the scope and nature of federal grant programs. In its legislative capacity, Congress first determines what it wants to accomplish and then decides whether a grant-in-aid program is the best means to achieve it. Congress then selects which of the six grant mechanisms to use (project categorical grant, formula categorical grant, formula-project categorical grant, open-end reimbursement categorical grant, block grant, or general revenue sharing), and crafts legislation to accomplish its purpose, incorporating the chosen grant instrument. As with all legislation generally, Congress oversees the grant's implementation to ensure that the federal administrating agency is held accountable for making certain that congressional expectations concerning program performance are met. Federalism scholars agree that congressional decisions concerning the scope and nature of the federal grants-in-aid system are influenced by both internal and external factors. Internal factors include congressional party leadership and congressional procedures; the decentralized nature of the committee system; the backgrounds, personalities, and ideological preferences of individual Members (especially those of party leaders and committee and subcommittee chairs and ranking minority Members); and the customs and traditions (norms) that govern congressional behavior. Major external factors include input provided by voter constituencies, organized interest groups (especially the National Governors Association, the National League of Cities, U.S. Conference of Mayors, and the National Association of Counties), the President, and executive branch officials. Although not directly involved in the legislative process, the Supreme Court, through its rulings on federalism issues, also influences congressional decisions concerning federal grant-in-aid programs. Overarching all of these factors is the evolving nature of cultural norms and expectations concerning government's role in American society. Over time, although the American public has become increasingly skeptical of government performance, they have also become increasingly accepting of government activism in domestic affairs generally, and of federal government activism in particular. Federalism scholars attribute this increased acceptance of, and sometimes demand for, government action as a reaction to the industrialization and urbanization of American society; technological innovations in communications, which have raised awareness of societal problems; and exponential growth in economic interdependencies brought about by an increasingly global economy. This report provides a historical synopsis of the evolving nature of the federal grants-in-aid system, focusing on the role Congress has played in defining the system's scope and nature. It begins with an overview of the contemporary federal grants-in-aid system and then examines its evolution over time, focusing on the internal and external factors that have influenced congressional decisions concerning the system's development. It concludes with an assessment of the scope and nature of the contemporary federal grants-in-aid system and raises several issues for congressional consideration, including possible ways to augment congressional capacity to provide effective oversight of this system. Different federal departments and agencies, including the U.S. Census Bureau, the Government Accountability Office (GAO), and the U.S. Office of Management and Budget (OMB), use different definitions to determine what counts as a federal grant-in-aid program. However, there is agreement on the general characteristics associated with each grant type. The three general types of federal grants to state and local governments are categorical grants, block grants, and general revenue sharing (see Table 1 ). Categorical grants can be used only for a specifically aided program and usually are limited to narrowly defined activities. Block grants can be used only for a specifically aided set of programs and usually are not limited to narrowly defined activities. General revenue sharing can be used for any purpose not expressly prohibited by federal or state law and is not limited to narrowly defined activities. The four types of categorical grants are project categorical grants, formula categorical grants, formula-project categorical grants, and open-end reimbursement categorical grants. Project categorical grants are awarded on a competitive basis through an application process specified by the federal agency making the grant. Formula categorical grants are allocated among recipients according to factors specified within enabling legislation or administrative regulations (e.g., population, median household income, per capita income, poverty, and number of miles driven). Formula-project categorical grants use a mixture of fund allocation means, typically involving the use of a formula specified within enabling legislation or administrative regulations to allocate available funds among the states, followed by an application process specified by each recipient state to allocate available funds on a competitive basis among local governments or other eligible applicants. Open-end reimbursement categorical grants, often regarded as the equivalent of formula categorical grants, provide a reimbursement of a specified proportion of recipient program costs, eliminating competition among recipients as well as the need for an allocation formula. Of the six grant types, project categorical grants typically impose the most restraint on recipients (see Table 1 ). Federal administrators have a high degree of control over who receives project categorical grants (recipients must apply to the appropriate federal agency for funding and compete against other potential recipients who also meet the program's specified eligibility criteria); recipients have relatively little discretion concerning aided activities (funds must be used for narrowly specified purposes); and there is a relatively high degree of federal administrative conditions attached to the grant, typically involving the imposition of federal standards for planning, project selection, fiscal management, administrative organization, and performance. General revenue sharing imposes the least restraint on recipients. Federal administrators have a low degree of discretion over who receives general revenue sharing (funding is allocated automatically to recipients by a formula or formulas specified in legislation); recipients have broad discretion concerning aided activities; and there is a relatively low degree of federal administrative conditions attached to the grant, typically involving periodic reporting criteria and the application of standard government accounting procedures. Block grants are at the midpoint in the continuum of recipient discretion. Federal administrators have a low degree of discretion over who receives block grants (after setting aside funding for administration and other specified activities, the remaining funds are typically allocated automatically to recipients by a formula or formulas specified in legislation); recipients have some discretion concerning aided activities (typically, funds can be used for a specified range of activities within a single functional area); and there is a moderate degree of federal administrative conditions attached to the grant, typically involving more than periodic reporting criteria and the application of standard government accounting procedures, but with fewer conditions attached to the grant than project categorical grants. As indicated in Table 2 , outlays for federal grants to state and local governments have generally increased over the years, with a relatively rapid increase from FY2008 through FY2010 due primarily to the enactment of P.L. 111-5 , the American Recovery and Reinvestment Act of 2009 (ARRA). ARRA provided state and local governments $274.7 billion in grants, contracts, and loans combined. State and local governments received $52.9 billion in ARRA grants, contracts, and loans in FY2009, $111.9 billion in FY2010, $68.8 billion in FY2011, $25.6 billion in FY2012, 11.8 billion in FY2013, and $1.6 billion in FY2014 to assist their recovery from the \"Great Recession\" (December 2007-June 2009). As expected, after reaching $608.4 billion in FY2010, outlays for federal grants to state and local governments declined somewhat in FY2011 as ARRA funding began to unwind, and then declined further to $544.6 billion in FY2012 and to $546.2 billion in FY2013 as most of ARRA's funding expired. Outlays for federal grants to state and local governments have increased since then, primarily due to increased outlays for Medicaid. As indicated in Table 2 and Figure 1 , in FY2019 health care is anticipated to account for more than half of total outlays for federal grants to state and local governments (an estimated $453.9 billion in FY2019, or 60.6% of the total), followed by income security ($114.2 billion, or 15.2%), education, training, employment, and social services ($67.5 billion, or 9.0%), transportation ($67.2 billion, or 9.0%), community and regional development ($21.9 billion, or 2.9%), and all other ($24.9 billion, or 3.3%). Medicaid, with $418.7 billion in expected federal outlays in FY2019, has, by far, the largest budget of any federal grant-in-aid program. Ten other federal grants to state and local governments are expected to have federal outlays in excess of $10 billion in FY2019: Federal-Aid Highways ($43.9 billion), Child Nutrition ($23.9 billion), Tenant Based Rental Assistance—Section 8 vouchers ($22.3 billion), the Children's Health Insurance Fund ($18.4 billion), Accelerating Achievement and Ensuring Equity (Education for the Disadvantaged—$17.4 billion), Temporary Assistance for Needy Families ($16.5 billion), Special Education ($13.2 billion), State Children and Families Services Programs ($10.9 billion), Urban Mass Transportation Grants ($10.3 billion), and the Disaster Relief Fund ($10.2 billion). Table 3 provides data on outlays for federal grants to state and local governments in nominal and constant (inflation-adjusted) dollars, as a percentage of total federal outlays and as a percentage of national gross domestic product (GDP) for selected fiscal years since FY1960. It also indicates the percentage of these outlays that are payments for individuals, as opposed to payments for capital improvements and government operations. As indicated in Table 3 , total outlays for federal grants to state and local governments have generally increased since the 1960s. However, the magnitude of those increases has varied over the years. For example, outlays for federal grants to state and local governments increased, in nominal dollars, 187.3% during the 1960s, 246.4% during the 1970s, 33.4% during the 1980s, 98.0% during the 1990s, and 98.6% during the first decade of the 2000s. Outlay growth for federal grants to state and local governments has, in most years, exceeded inflation. However, as indicated in Table 3 , those outlays, expressed in constant (FY2012) dollars, did not keep pace with inflation during the early 1980s and during the early 2010s. Federalism scholars have noted that since the 1980s, the focus of federal grants to state and local governments has shifted from providing assistance to places (e.g., to build public highways, support public education, criminal justice systems, economic development endeavors, and government administration) to people (e.g., providing health care benefits, social welfare income, housing assistance, and social services). Much of this shift is attributed to Medicaid, which has experienced relatively large outlay growth over the past several decades. As shown in Table 3 , during the 1960s and 1970s about one-third of total outlays for federal grants to state and local governments were for individuals, compared with more than 75% in FY2018. In the past, the now-defunct U.S. Advisory Commission on Intergovernmental Relations (ACIR) and OMB used information contained in the Catalog of Federal Domestic Assistance (CFDA) to count the number of federal grants to state and local governments. The CFDA \"is a government-wide compendium of Federal programs, projects, services, and activities that provide assistance or benefits to the American public.\" It lists 15 categories of federal grants: formula grants (including formula categorical grants, formula-project categorical grants, and block grants); project grants; direct payments for specified uses to individuals and private firms; direct payments with unrestricted use to beneficiaries who meet federal eligibility requirements; direct loans; guaranteed/insured loans; insurance; sale, exchange, or donation of property and goods; use of property, facilities, and equipment; provision of specialized services; advisory services and counseling; dissemination of technical information; training; investigation of complaints; and federal employment. It lists all authorized federal grant programs, including grants that have not received an appropriation. Because the CFDA focuses on the needs of applicants, if a program uses a separate application or other delivery mechanism, the CFDA considers it a separate program. This complicates efforts to count federal grants to state and local governments. ACIR periodically published counts of funded federal grants to state and local governments during the 1960s and then for Fiscal Years 1975, 1978, 1981, 1984, 1987, 1989, 1991, 1993, and 1995. OMB provided counts of funded grants to state and local governments for FY1980-FY2003. Because they used a different methodology to determine which grant programs to include in their count, their results differed. OMB consistently identified fewer federal grants to state and local governments than ACIR. For example, in FY1995, OMB identified 608 funded federal grants to state and local governments compared to ACIR's count of 633. No authoritative count of funded federal grants to state and local governments is known to have been issued in recent years. ACIR included in its counts all direct cash grants to state or local governmental units, other public bodies established under state or local law, or their designee; payments for grants-in-kind, such as purchases of commodities distributed to state or local governmental institutions; payments to nongovernmental entities when such payments result in cash or in-kind services or products that are passed on to state or local governments; payments to state and local governments for research and development that is an integral part of their provision of services; and payments to regional commissions and organizations that are redistributed at the state or local level to provide public services. OMB counted only grants for traditional governmental operations, as defined in OMB Circular A-11. The definition covered only grants that \"support State or local programs of government operations or provision of services to the public.\" It excluded federal grants that went directly to individuals, fellowships, most grants to nongovernmental entities, and technical research grants. A search of the CFDA's 2018 print edition and electronic version indicated that state governments, local governments, U.S. territories, and federally recognized tribal governments are eligible to apply for 1,616 federal grants (defined as authorized project grants, formula grants, cooperative agreements, direct payments for specified uses, and direct payments for unrestricted uses). Of these grants, 141 were not currently funded, 160 were research or fellowship programs that were not targeted solely at either public institutions of higher education or other public agencies, and 41 had broad eligibility extending beyond state and local governments. Removing them from the list left 1,274 funded federal grants to state and local governments (see Table 4 ). Because there is no consensus on the methodology used to count federal grants to state and local governments, the 1,274 count of federal grants to state and local governments listed in Table 4 should be viewed as illustrative, as opposed to definitive, of the current number of federal grants to state and local governments. As the data in the table suggest, the number of federal grants to state and local governments increased slowly from 1902 to 1930. Then, partly in reaction to the Great Depression, Congress doubled the number of federal grants to state and local governments during the 1930s, and continued to increase the number of federal grants to state and local governments during the 1940s and 1950s. During the mid-1960s, Congress increased the number of federal grants to state and local governments exponentially, primarily in response to national social movements concerning poverty and civil rights. Nine federal grants to state and local governments were added in 1961, 17 in 1962, 20 in 1963, 40 in 1964, 109 in 1965, 53 in 1966, 3 in 1967, and 4 in 1968. Congress continued to increase the number of federal grants to state and local governments during the 1970s, but at a relatively slow pace as it addressed budgetary constraints presented by \"guns versus butter\" issues associated with the Vietnam conflict. Then, at the urging of President Ronald Reagan in 1981, Congress approved the largest reduction in the number of federal grants to state and local governments in American history by creating 9 new block grants which consolidated 77 categorical grants and revised two earlier block grants. The Reagan Administration also eliminated funding for 62 categorical grants in 1981, mainly through authority provided under P.L. 97-35 , the Omnibus Budget Reconciliation Act of 1981. The number of federal grants to state and local governments increased relatively slowly during the remainder of the 1980s, as Congress faced budgetary constraints presented by demographic changes in American society that led to escalating costs for several federal entitlement programs, especially for Social Security, Medicare and Medicaid, and by the Reagan Administration's general opposition to the expansion of the federal grants-in-aid system. As the data in Table 4 indicate, the number of federal grants to state and local governments continued to increase during the 1990s, and has continued to do so, but more slowly in recent years. The relative influence of internal versus external factors on congressional decisions affecting the federal grants-in-aid system has varied, both over time and in each specific policy area. Prior to the Civil War, external factors, especially cultural norms and expectations concerning government's role in American society, restricted congressional options concerning enactment of federal grant-in-aid programs for state and local governments. During this time period, America was primarily a rural nation of farmers. Travel conditions were, compared with today's standards, primitive. Many Americans rarely left their home state, and many others never set foot in another state. Government as we know it today, with regulations and spending programs affecting many aspects of American life, did not exist. Although ratification of the Articles of Confederation and Perpetual Union on March 1, 1781, formally established the United States of America, personal allegiance was still directed more toward the individual's home state than to the nation. It was an era of what federalism scholars have called \"dual federalism,\" where states were expected to be the primary instrument of governance in domestic affairs. However, even before the Constitution's ratification, the federal government found ways to provide state and local governments with assistance to encourage them to pursue national policy objectives. For example, under the Articles of Confederation and Perpetual Union, Congress did not have the power to lay and collect taxes and relied heavily on state donations to fund the government. This lack of revenue, and expenses related to national defense, limited congressional spending options in domestic affairs. The Congress of the Confederation addressed that issue by adopting the Land Ordinance of 1785. The Ordinance generated revenue for the government by authorizing the sale of land acquired from Great Britain at the conclusion of the American Revolutionary War. The Ordinance also required every new township incorporated in those lands, called the Ohio Country, to be subdivided into 36 lots (or sections), each 1 mile square. Lots 8, 11, 26, and 29 were reserved for the United States. The new townships were required to use Lot 16 \"for the maintenance of public schools, within the said township. \" Some schools are still located in lot 16 of their respective townships, although many of the school lots were sold to raise money for public education. These land grants for public education were reauthorized by Congress in the Northwest Ordinance of 1787. Congress subsequently adopted similar legislation for all states admitted to the union from 1802 to 1910, with exceptions for Texas, which retained all of its public land, and Maine and West Virginia, which were formed from other states. From 1802 to 1848, one lot in each township was to be used for education, from 1848 to 1890 two lots, and from 1894 to 1910, with one exception, four lots. When the Framers met in Philadelphia in 1787 to rework the Articles of Confederation and Perpetual Union, the national economy was in recession, state governments were saddled with large debts left over from the Revolutionary War, the continental dollar was unstable and destined to be a national joke (\"not worth a continental\"), the navy could not protect international shipping, and the army proved unable to protect its own arsenal during Shay's rebellion in 1786. To address these issues, Congress was provided 17 specific powers in Article 1, Section 8 of the U.S. Constitution, ratified in 1789, including the power to coin money, establish post offices, regulate copyright laws, declare war, regulate the Armed Forces, borrow money, and, importantly, lay and collect taxes. The power to lay and collect taxes provided Congress the means to expand the federal government's role in domestic affairs. Moreover, the Supreme Court issued several rulings under Chief Justice John Marshall concerning congressional authority to regulate interstate commerce that effectively cleared the way for congressional activism in domestic policy. However, the prevailing view in Congress at this time was that any power not explicitly provided to Congress in the Constitution was excluded purposively, suggesting that in the absence of specific, supporting constitutional language the exercise of governmental police powers (the regulation of private interests for the protection of public safety, health, and morals; the prevention of fraud and oppression; and the promotion of the general welfare) was either meant to be a state or local government responsibility, or outside the scope of governmental authority altogether. Nevertheless, during the 1800s there were congressional efforts, primarily from representatives from western states, to adopt legislation to provide federal cash assistance for various types of internal improvement projects to encourage western migration and promote interstate commerce. Most of these efforts failed, primarily due to sectional divisions within Congress which, at that time, made it difficult to build coalitions large enough to adopt programs that targeted most of their assistance to western states. Some opposition came from Members of Congress who viewed reducing the national debt from the American Revolutionary War as a higher priority. Other Members opposed federal interventions as a matter of political philosophy. They viewed the provision of cash assistance for internal improvements, other than for post roads, which were specifically mentioned in the Constitution as a federal responsibility, a violation of states' rights, as articulated in the Tenth Amendment: \"The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.\" Given the prevailing views concerning the limited nature of the federal government's role in domestic affairs, Congress typically authorized federal land grants to states instead of authorizing direct cash assistance to states for internal improvements. For example, in 1823 Ohio received a federal land grant of 60,000 acres along the Maumee Road to raise revenue to improve that road. In 1827, Ohio received another federal land grant of 31,596 acres to raise revenue for the Columbus and Sandusky Turnpike. In 1841, nine states (Ohio, Indiana, Illinois, Alabama, Missouri, Mississippi, Louisiana, Arkansas, and Michigan) ̶ and, with three exceptions, all subsequent newly admitted states ̶ were designated land grant states and guaranteed at least 500,000 acres of federal land to be auctioned to support transportation projects, including roads, railroads, bridges, canals, and improvement of water courses, that expedited the transportation of United States mail, military personnel, and military munitions. By 1900, over 3.2 million acres of federal land were donated to these states to support wagon road construction. Congress also authorized the donation of another 4.5 million acres of federal land to Illinois, Indiana, Michigan, Ohio, and Wisconsin to raise revenue for canal construction and 2.225 million acres to Alabama, Iowa, and Wisconsin to improve river navigation. In addition, states were provided 37.8 million acres for railroad improvements and 64 million acres for flood control. States were provided wide latitude in project selection, and federal oversight and administrative regulations were minimal. Although land grants were prevalent throughout the 1800s, given prevailing views concerning states' rights, land grants, as well as cash grants, were subject to opposition on constitutional grounds. For example, in 1854, Congress adopted legislation authorizing the donation of 10 million acres of federal land to states to be sold to provide for the indigent insane. President Franklin Pierce vetoed the legislation, claiming that I cannot find any authority in the Constitution making the federal government the great almoner of public charity throughout the United States. To do so would, in my judgment, be contrary to the letter and spirit of the Constitution, and subversive of the whole theory upon which the union of these States is founded.... I respectfully submit that, in a constitutional point of view, it is wholly immaterial whether the appropriation be in money, or in land.... should this bill become a law, ... the several States instead of bestowing their own means on the social wants of their own people, may themselves ... become humble supplicants for the bounty of the Federal Government, reversing the state's true relation to this Union. One notable exception to the federal reluctance to provide cash grants to states occurred in 1837. The federal government used proceeds from western land sales to retire the federal debt in 1836. The Deposit Act of 1836 directed that, after reserving $5 million, any money in the federal Treasury on January 1, 1837, shall be distributed to states in proportion to their respective representation in the House and Senate. There were no restrictions placed on how states were to use the funds. About $30 million was distributed to states in three quarterly payments in 1837 before the banking crisis of 1837 led to a recession and payments were stopped. To avoid a promised veto from President Andrew Jackson, the legislation indicated that the funds were a deposit subject to recall, rather than an outright grant of cash. Overall, domestic policy in the United States prior to the Civil War was dominated by states. As a federalism scholar put it: With respect to the classic trinity of sovereign powers–taxation, the police power, and eminent domain–the states enjoyed broad autonomous authority, which they exercised vigorously. Indeed, property law, commercial law, corporation law, and many other aspects of law vital to the economy were left almost exclusively to the states.... Federalism thus provided a receptive structure for expressions of state autonomy and pursuit of state-oriented economic objectives, not only as a matter of constitutional theory and the distribution of formal authority but also as a matter of real power. The Union's victory in the Civil War marked the beginning of a second evolutionary era in American federalism. It effectively put to an end to the doctrine that the Constitution was a compact among sovereign states, each with the right to nullify an act of Congress that the state deemed unconstitutional, and each with the legal right to secede from the Union. It also signaled the triumph of the northern states' commercialism over the southern states' agrarianism: Unimpeded by the political opposition of the southern slavocracy, the Republican coalition of north and west carried through a program of comprehensive changes that insured the expansion of industry, commerce, and free farming.... Instead of the policies of economic laissez faire that the slavocracy had demanded ... the Republicans substituted the doctrine that the federal government would provide assistance for business, industry, and farming; the protective tariff, homestead, land subsidies for agricultural colleges, transcontinental railroads and other internal improvements, national banks. When the defeated south came back into the Union, it had to accept the comprehensive alternation in government policy and economic institutions that historian Charles A. Beard was later to name the Second American Revolution. Following the war, three constitutional amendments—the Thirteenth adopted in 1865, the Fourteenth adopted in 1868, and the Fifteenth Amendment adopted in 1870—abolished slavery, prohibited states from denying due process or equal protection to any of their citizens, and banned racial restrictions on voting, respectively. In addition, Congress enacted the Reconstruction Acts of 1867 and 1868, which imposed military government on the formally secessionist states and required universal manhood suffrage. Despite this active federal presence in domestic policy in the South following the Civil War, the concept of dual federalism and deference to states in domestic affairs remained a part of American culture. For example, several Supreme Court rulings during this time period limited congressional efforts to override state laws on civil rights, in effect leaving civil and voting rights matters to states until the 1950s and 1960s. The Supreme Court also limited congressional efforts to regulate interstate commerce by limiting the Interstate Commerce Commission's authority. Reflecting prevailing views concerning dual federalism, and limited federal fiscal resources, the first on-going, federal cash grant to states, other than for the support of the National Guard, was not adopted until 1879. P.L. 45-186, the Federal Act to Promote the Education of the Blind, appropriated $250,000 to create a perpetual source of income for the purchase of teaching materials for the blind. It marked the beginning of the modern federal grants-in-aid system. The funds were used to purchase interest bearing bonds. The interest was used to purchase teaching materials for the blind. These teaching materials were then distributed among the states (and the District of Columbia) annually, with each state applying for assistance receiving a share of the available teaching materials based on the state's share of the total number of pupils enrolled in public schools of education for the blind. The second federal cash grant to states was authorized by the Hatch Act of 1887. It provided each state an annual cash grant of $15,000 to establish agricultural experiment stations. In 1888, an annual grant of $25,000 was appropriated for the care of disabled veterans in state hospitals. States were provided $100 per disabled veteran. In 1890, funding was provided to subsidize resident instruction in the land grant colleges made possible by the Morrill Act of 1862, which provided each existing and future state with 60,000 acres of federal land, plus an additional 30,000 acres for each of its congressional representatives, to be sold for the endowment, support, and maintenance of at least one college where the leading subject was agriculture and the mechanic arts. In 1902, there were five federal grants to states and local governments (in addition to funding for the National Guard): teaching materials for the blind, agricultural experiment stations, the care of disabled veterans, resident instruction in the land grant colleges, and funding to the District of Columbia. Outlays for these grants were about $7 million in FY1902, or about 1% of total federal outlays. State and local government total outlays at that time were slightly over $1 billion, evidence of the relatively limited nature of federal involvement in domestic policy at that time. An important difference between land grants and cash grants had emerged, even at this early date. Because federal grants were funded from the federal treasury, many in Congress felt that they had an obligation to ensure that the funds were spent by states in an appropriate manner. As a result, Congress began to attach an increasing number of administrative requirements to these grant programs. For example, in 1889, states were required to match federal funding for the care of disabled veterans or lose it. The Morrill Act of 1890 authorized the Secretary of the Interior to withhold payments, pending an appeal to Congress, from states that failed to meet conditions specified in the act. In 1895, expenditures authorized by the Hatch Act for agricultural experiment stations were conditioned by annual audits. In 1911, funding authorized by the Weeks Act to support state efforts to prevent forest fires was conditioned by advance approval of state plans for the funds' use, annual audits and inspections, and a state matching requirement. The Sixteenth Amendment's ratification in 1913 provided Congress the authority to lay and collect taxes on income. Although the federal income tax initially generated only modest amounts, it provided Congress an opportunity to shift from land grants to cash grants to encourage state and local governments to provide additional attention to policy areas Congress considered of national interest. Between 1913 and 1923, Congress adopted new federal grant-in-aid programs for highway construction, vocational education, public health, and maternity care. Outlays for federal grants to state and local governments increased from $12 million in FY1913 to $118 million in FY1922. In 1923, Massachusetts brought suit against the Secretary of the Treasury, Andrew Mellon, claiming that the maternal care grants authorized by the Sheppard-Towner Act of 1921 were unconstitutional infringements on states' rights. The Supreme Court dismissed the case on the grounds that it lacked jurisdiction. Nonetheless, Justice George Sutherland, writing on behalf of the unanimous Court, indicated that, in his view, this form of congressional spending was not unconstitutional because federal grants to state and local governments were optional and, as such, were not coercive instruments. As a result, although few new federal grants to state and local governments were adopted during the remainder of the 1920s, those grants were now accepted as a legal means for Congress to encourage state and local governments to pursue national goals. Political scientists contend that about once in every generation partisan affiliations realign across the nation, typically taking a few years to materialize but often becoming apparent during a \"critical\" presidential election. Critical elections typically result in relatively dramatic and lasting changes in the partisan composition within Congress and state governments. They also usually signal the coming to power of a new partisan coalition that dominates congressional decisionmaking for a relatively long period of time. For example, the election of 1896 ended the political stalemate between the Democratic and Republican parties and solidified the Republican Party's position as the majority party for the next 36 years. The election of 1932 signaled a new period of Democratic Party dominance, particularly in the \"Solid South,\" that lasted until the 1970s, when partisan attachments began to weaken, southern states became increasingly Republican, and the two major political parties became increasingly competitive, each seemingly on the verge of achieving majority party status at various times, but unable to retain that status permanently. The 1932-1960 period also saw the emergence of the \"congressional conservative coalition,\" the unofficial title given to the shifting political alliances of southern, conservative Democrats and Republican Members. The conservative coalition became an increasingly important counter-balance to large Democratic majorities in both houses of Congress. Members of the conservative coalition generally advocated balanced budgets and states' rights, especially in civil rights legislation. They used congressional procedures, such as the filibuster or threat of a filibuster, to win concessions from the Democratic majority, and, in some instances, to prevent legislation they opposed from becoming law. They also benefitted from the congressional seniority system, which, during this time period, allocated committee chairmanships according to seniority. Because many of the congressional districts in the \"solid south\" were noncompetitive seats, southern representatives held a disproportionate number of committee chairmanships in the House, further strengthening the conservative coalition's influence on congressional policymaking. The conservative coalition prevented civil rights legislation from being enacted during this time period, but it could not prevent Democratic majorities in the House and Senate from expanding the federal government's presence in domestic policy. However, throughout this time period, the conservative coalition actively sought concessions to ensure that any new federal programs, including any new grants to state and local governments, respected state rights. As a result, the grant-in-aid programs adopted during this time period tended to be in policy areas where state and local governments were already active, such as in education, health care, and highway construction, or where additional federal assistance was welcomed, such as job creation. Also, federal administrative conditions attached to these grants during this era focused on the prevention of corruption and fraudulent expenditures as opposed to encouraging states to move in new policy directions. As a result, federalism scholars have labeled this time period as an era of \"cooperative federalism,\" where intergovernmental tensions were relatively minor and state and local governments were provided flexibility in project selection. Faced with unprecedented national unemployment and economic hardship, President Franklin Delano Roosevelt advocated a dramatic expansion of the federal government's role in domestic affairs during his presidency, including an expansion of federal grant-in-aid programs as a means to help state and local governments combat poverty and create jobs. Congress approved 16 new, continuing federal grants to state and local governments from 1933 to 1938, and increased funding for federal grants to states and local governments from $214 million in FY1932 to $790 million in FY1938. Congress also enacted several temporary, emergency relief grant-in-aid programs that distributed federal funds to states according to the state's fiscal capacity. Congress devised mathematical formulas, based on a variety of economic and business measures, to allocate funding to each state, resulting in the share of relief funds varying among states based on the formula's assessment of need. At their peak, in 1935, emergency relief measures provided states nearly $1.9 billion to create jobs and provide emergency assistance for the unemployed. The emergency relief programs were terminated during the 1940s, but they established a precedent for extensive federal involvement with state and local governments in areas of national concern and for the use of mathematical formulas for distributing federal assistance. The Social Security Act of 1935 (SSA) was, arguably, the most significant legislative enactment of the New Deal period. It established a federal presence in social welfare policy. New federal grant-in-aid programs were established for old age assistance, aid to the blind, aid to dependent children, unemployment compensation, maternal and child health, crippled children, and child welfare. The act also enhanced federal oversight of grants to state and local governments as auditing requirements were now required in almost all grant programs. In addition, in 1939, state employees administering SSA programs were required to be selected by merit system procedures, a major advancement for the development of professional state and local government administration and a signal of the declining influence of state and local party bosses in American society. In 1940, the Hatch Act restricted the political activities of state and local government employees paid with federal funds. Legally, New Deal legislation was based on an expanded interpretation of congressional authority to spend through grant-in-aid programs to promote the nation's welfare under Article 1, Section 8, clause 1 of the Constitution, often referred to as the congressional \"spending power.\" Federal expenditures through grant-in-aid programs during the New Deal were made in several functional areas, including some, such as social welfare, that were traditionally viewed as state responsibilities. Opponents of an expanded role for the federal government in domestic policy argued that New Deal grant programs precluded state action in these traditionally state functional areas and, as such, violated the Constitution's Tenth Amendment. Advocates of an expansion of federal involvement in domestic affairs argued that the power of Congress to spend is more extensive than, rather than concurrent with, enumerated or even implied law-making powers. This disagreement led to a number of Supreme Court cases, a full discussion of which is beyond the scope of this report. The Supreme Court rejected the New Deal's expansion of federal authority in 8 of the first 10 cases that it decided. Then, after President Roosevelt's failed legislative proposal to \"pack the Court\" in 1937, the Supreme Court upheld the constitutionality of several New Deal laws, including the Social Security Act. As a federalism scholar noted, A new era of judicial construction had been launched. The commerce power was given broad interpretation in cases upholding the Labor Relations Act. The older distinction between direct and indirect effects of commercial activity was abandoned and the more realistic \"stream-of-commerce\" concept adopted. The scope of Federal taxing power was also broadened expansively. In sanctioning the Social Security Act, the unemployment excise tax on employers was upheld as a legitimate use of the tax power, and the grants to the states were viewed as examples of Federal-state collaboration, not Federal coercion. The act's old-age and benefit provisions were deemed to be proper because \"Congress may spend money in aid of general welfare.\" When combined, these decisions obviously amounted to last rites for judicial dual federalism. Although the Supreme Court was no longer viewed as a major obstacle for the expansion of the federal grants-in-aid system, external factors led to a reduction in outlays for federal grants to state and local governments from FY1939 to FY1946 as Congress focused on defense-related issues during World War II. For example, outlays for federal grants to state and local governments averaged $947 million from FY1939 through FY1946, less than half of the New Deal's peak. Following the war, the number of federal grants to state and local governments began to increase at a somewhat accelerated pace, reaching 68 grants in 1950 and 132 grants in 1960. Outlays for federal grants to state and local governments also accelerated, from $859 million in FY1945, to $2.3 billion in FY1950, to $3.2 billion in FY1955, and to $7 billion in 1960. A new development was increased outlays targeted at urban areas, such as grants for airport construction (1946), urban renewal (1949), and urban planning (1954). The most significant federal grant-in-aid program enacted during the 1950s was the $25 billion, 13-year Federal-Aid Highway Act of 1956, which authorized the construction of the then-41,000 mile National System of Interstate and Defense Highways, with a 1972 target completion date. For the next 35 years, federal surface transportation policy focused on the completion of the interstate system. The 1960s was a turbulent decade, marked by both political and social upheaval of historic proportions. Three leading public figures were assassinated: President John F. Kennedy in 1963, civil rights leader the Reverend Martin Luther King Jr. in 1968, and President Kennedy's brother, presidential candidate and Senator Robert Kennedy, in 1968. The civil rights movement, led by the Reverend King, was often met with violent resistance, with bombings of black churches, murders of civil rights workers, and televised police beatings of civil rights demonstrators. One of the defining moments of the civil rights movement was the march on Washington, DC, in August 1963, where the Reverend King made his famous \"I Have A Dream\" speech. Congress responded to the social turmoil by adopting the Civil Rights Act of 1964, which superseded state civil rights laws by prohibiting discrimination based on race, color, religion, or national origin; the Voting Rights Act of 1965, which superseded state election laws by outlawing literacy tests, poll taxes, and other means to discourage minority voting; and the Civil Rights Act of 1968, which superseded state civil rights laws by prohibiting discrimination in the sale, rental, and financing of housing. Nonetheless, race riots took place in several urban areas in 1965 and in 1967. During the latter half of the decade, the civil rights movement was joined by what has been called the hippie movement, where young people rebelled against the conservative norms of the time and disassociated themselves from mainstream liberalism and materialism. This \"counterculture\" movement began in the United States and sparked a social revolution throughout much of the Western world. It began as a reaction against the conservatism and social conformity of the 1950s, and the U.S. government's military intervention in Vietnam. These groups questioned authority and government, and demanded more freedom and rights for women, gays, and minorities, as well as greater awareness of the need to protect the environment and address poverty. The social movements and social unrest that swept across the nation during the 1960s had a strong impact on Congress. Reflecting the growing public demand for congressional action to address civil rights, poverty, and the environment, in 1961 the House approved, 217-212, a proposal by Speaker Sam Rayburn to enlarge the House Rules Committee from 12 to 15 Members. Prior to the change, the House Rules Committee was divided, 6 to 6, along ideological lines. Because a majority vote is necessary for the issuance of a legislative rule, the House Rules Committee served as an institutional barrier to the passage of legislation that the committee's more conservative Members believed infringed on states' rights, including civil rights legislation. The enlargement of the House Rules Committee in 1961 signaled the weakening of the conservative coalition's influence within Congress and enabled the large Democratic majorities elected during the early 1960s in the House and Senate to adopt a succession of civil rights laws, highlighted by the previously mentioned Civil Rights Act of 1964. It also enabled Congress to expand the federal grants-in-aid system, focusing on grants designed to protect the environment and address poverty, both directly through public assistance and job training programs and indirectly through education, housing, nutrition, and health care programs. These legislative efforts were both supported and encouraged by President Lyndon Baines Johnson. For example, during his commencement address at the University of Michigan on May 22, 1964, President Johnson announced that he would establish working groups to prepare a series of White House conferences and meetings to develop legislative proposals to revitalize urban America, address environmental problems, and improve educational opportunities \"to begin to set our course toward the Great Society\" which \"demands an end to poverty and racial injustice, to which we are totally committed.\" The term \"The Great Society\" came to symbolize legislative efforts during the 1960s to address poverty and racial injustice. In concert with President Johnson's Great Society initiatives, Congress nearly tripled the number of federal grants to state and local governments during the 1960s, from 132 in 1960 to 387 in 1968. In 1965 alone, 109 federal grants to state and local governments were adopted, including Medicaid, which now has, by far, the largest budget of any federal grant-in-aid program. Outlays for federal grants to state and local governments also increased, from $7 billion in FY1960 to $20 billion in FY1969. Functionally, federal grants for health care increased from $214 million in FY1960 to $3.8 billion in FY1970, for income security from $2.6 billion to $5.7 billion, for education, training, employment, and social services from $525 million to $6.4 billion, for transportation from $3 billion to $4.6 billion, and for community and regional development from $109 million to $1.7 billion. For the most part, these legislative efforts were not opposed by state and local government officials and their affiliated public interest groups (e.g., National Governors Association, National League of Cities, U.S. Conference of Mayors, and National Association of Counties), primarily because federal grants are voluntary and, in many instances, provided funding for activities that had broad public support. However, the new grants had a number of innovative features that distinguished them from their predecessors. Previously, most federal grants to state and local governments supplemented existing state efforts and, generally, did not intrude on state and local government prerogatives. Most of the federal grants created during the 1960s, on the other hand, were designed purposively by Congress to encourage state and local governments to move into new policy areas, or to expand efforts in areas identified by Congress as national priorities, especially in environmental protection and water treatment, education, public assistance, and urban renewal. In addition, there was an increased emphasis on narrowly focused project, categorical grants to ensure that state and local governments were addressing national needs. Most of the new grants had relatively low, or no, matching requirements, to encourage state and local government participation. New incentive grants encouraged states to move into new policy areas and to diversify eligible grant recipients, including individuals, nonprofit organizations, and specialized public institutions, such as universities. A greater emphasis also was on grants to urban areas. For example, outlays for federal grants targeted at metropolitan areas more than tripled during the 1960s, and grew to include about 70% of total federal grant-in-aid funding, up from about 55% at the beginning of the decade. There was also a greater emphasis on mandated planning requirements. Although most of the federal grants adopted during the 1960s were narrowly focused project, categorical grants, the first two block grants were enacted during this time period. P.L. 89-749, the Comprehensive Health Planning and Public Health Services Amendments of 1966, later known as the Partnership for Public Health Act, created a block grant for comprehensive health care services (now the Preventive Health and Health Services Block Grant). It replaced nine formula categorical grants. Two years later, Congress created the second block grant, the Law Enforcement Assistance Administration's Grants for Law Enforcement program (sometimes referred to as the \"Crime Control\" or \"Safe Streets\" block grant) in the Omnibus Crime Control and Safe Streets Act of 1968. Unlike the health care services block grant, it was created de novo , and did not consolidate any existing categorical grants. The rapid expansion of federal grants to state and local governments during the 1960s led to a growing concern that the intergovernmental grant-in-aid system had become dysfunctional and needed to be reformed. For example, ACIR argued that along with the expansion of the federal grant system came \"a rising chorus of complaints from state and local government officials\" concerning the inflexibility of fiscal and administrative requirements attached to the grants. It suggested that state and local government officials were subjected to an information gap because they found it difficult to keep up with the host of new programs and administrative requirements. It also cited the need for improved coordination among programs, noting that many state and local government officials were reporting administrative difficulties dealing with federal agencies and those agencies' regional offices: Between 1962 and 1965 four new systems of regional offices were established as a consequence of grants-in-aid legislation. Adding these bodies to the separate, already existing regional structures brought the total number of regional systems to 12. Regional boundaries and field office locations varied widely. Kentucky, to cite the most extreme case, had to deal with federal agencies in ten different cities. This confusion imposed burdens on the recipients of grants and also made the task of coordinating operations by federal agencies in pursuit of national objectives more difficult. During the 1970s, President Richard Nixon and his successor, President Gerald R. Ford, argued that the intergovernmental grant-in-aid system was dysfunctional and advocated the sorting out of governmental responsibilities, with the federal government taking the lead in some functional areas and states in others. They also advocated a shift from narrowly focused categorical grants, especially project categorical grants, toward block grants and revenue sharing. They argued that block grants and general revenue sharing provided state and local governments additional flexibility in project selection and promoted program efficiency by reducing administrative costs. They, and others, believed that state and local governments should be provided additional flexibility in project selection and relief from federal administrative requirements because greater reliance on state and local governments promotes a sense of state and local community responsibility and self-reliance; state and local government officials are closer to the people than federal administrators and, as a result, are better positioned to discern and adapt public programs to state and local needs and conditions; state and local governments encourage participation and civic responsibility by allowing more people to become involved in public questions; active state and local governments encourage experimentation and innovation in public policy design and implementation; active state and local governments reduce administrative workload on the federal government, which creates program efficiencies; and active state and local governments reduce the political turmoil that sometimes results from single policies that govern the entire nation. Opponents of a shift from categorical grants to block grants and revenue sharing presented several arguments, including because funding comes from the federal Treasury, Congress has both the right and an obligation to determine how that money is spent; many state and local governments lack the fiscal resources to provide levels of government services necessary to provide the poor and disadvantaged a minimum standard of living and equal access to governmental services, such as education and health care, which are essential to economic success. Therefore, Congress must act to ensure uniform levels of essential governmental services throughout the nation; state and local governments that have the fiscal resources to provide levels of government services necessary to provide the poor and disadvantaged a minimum standard of living and equal access to governmental services essential to economic success are often unable to do so because they compete with other state and local governments for business and taxpaying residents. As a result, state and local governments tend to focus available resources on programs designed to attract business investment and taxpaying residents to their communities and states rather than on programs assisting the poor and disadvantaged. Therefore, Congress must act to ensure uniform levels of essential governmental services throughout the nation; Congress has both the right and the obligation to ensure through the carrot of grant-in-aid programs and the stick of federal requirements that certain national goals, such as civil rights, equal employment opportunities, protection for the environment, and care for the poor and aged, are met because it is difficult to achieve change when reform-minded citizens must deal with 50 state governments and more than 79,000 local governments; and some governmental services have either costs or benefits that spill over onto other localities or states. Water and air pollution controls, for example, benefit not only the local community that pays for the air or water pollution controls, but all of the communities that are located downwind or downstream from that community. Because state and local taxpayers are generally reluctant to pay for programs whose benefits go to others, state and local governments often underfund programs with significant spillover effects. Therefore, Congress must act to ensure that these programs are funded at logical levels. Opponents also asserted that the arguments presented by advocates for a shift in emphasis to block grants and revenue sharing were actually a \"smoke screen\" masking their true intent which, allegedly, was to shift federal resources to their core constituencies. As mentioned previously, most federal grant-in-aid funding during the 1960s and 1970s was targeted to metropolitan areas, which, at that time, were considered Democratic Party strongholds. Many observers believed that shifting from project categorical grants to block grants or general revenue sharing would result in less money for metropolitan areas and more money for suburban and rural areas, areas that were more likely to be populated by Republicans than Democrats. This shift would occur because project categorical grants are awarded on a competitive basis by federal administrators while block grant and revenue sharing funding is allocated according to pre-determined formula, often with minimum funding guarantees for each state and with a portion of the funding determined by either population or per capita income. Because block grant and revenue sharing funding tends to be more geographically dispersed than project categorical grants, congressional debates over which grant mechanism was best had partisan overtones that often transcended discussions over which grant mechanism would improve grant performance. Some federalism scholars have also suggested that Congress tends to prefer categorical grants over block grants and revenue sharing because Members take pride in the authorship of sponsored programs. They argue that categorical grants provide more opportunities for sponsorship, and more opportunities for receiving political credit for that sponsorship, than block grants or revenue sharing. In their view, constituents are more interested in a Member's ability to serve in a material way than in their competence in broad policymaking or in \"the rightness of positions on issues of principle, form or structure.\" As a result, they argue that Members are more likely to be recognized for sponsoring or supporting specific, narrowly focused categorical grants than by championing a more general block grant or revenue sharing approach. For example, they assert that Members are more likely to receive recognition and political credit from constituents for sponsoring and supporting legislation to prevent lead-based paint poisoning among children than for legislation covering the broad area of preventive health services. Presidents Nixon's and Ford's efforts to gain congressional approval for a shift in emphasis from categorical grants to block grants and revenue sharing were only partially successful. For example, in his 1971 State of the Union speech, President Nixon announced a plan to consolidate 129 federal grant programs in six functional areas—33 in education, 26 in transportation, 12 in urban community development, 17 in manpower training, 39 in rural community development, and 2 in law enforcement—into what he called six \"special revenue sharing\" programs. Unlike the categorical grants they would replace, the proposed special revenue sharing programs had no state matching requirements and relatively few auditing or oversight requirements, and the funds were distributed automatically by formula without prior federal approval of plans for their use. The education, transportation, rural community development, and law enforcement proposals failed to gain congressional approval, primarily because they generated opposition from interest groups affiliated with the programs who worried that the programs' future funding would be compromised. However, three block grants, the first signed by President Nixon and the remaining two signed by President Ford, were approved. The Comprehensive Employment and Training Assistance Block Grant program, created by the Comprehensive Employment and Training Act of 1973, merged 17 existing manpower training categorical grant programs. The Community Development Block Grant program (CDBG), created by the Housing and Community Development Act of 1974, consolidated six existing community and economic development categorical grant programs. Title XX social services, later renamed the Social Services Block Grant program, was created de novo and, therefore, did not consolidate any existing categorical grant programs. It was authorized by the 1974 amendments of the Social Security Act, which was signed into law on January 4, 1975. Also, in 1972, general revenue sharing was approved by Congress. General revenue sharing distributed funds to states from 1972 to 1981 and to localities from 1972 to 1986. Nevertheless, Congress retained an emphasis on the use of categorical grants. On December 31, 1980, there were 534 categorical grant programs, 5 block grant programs, and 1 general revenue sharing program. Of the categorical grant programs, 361 were project categorical grants, 42 were project, formula categorical grants, 111 were formula categorical grants, and 20 were open-ended reimbursement categorical grants. Overall, categorical grants accounted for 79.3% of the $91.3 billion in outlays for federal grants to state and local governments that year, block grants accounted for 11.3%, and general revenue sharing 9.4%. Efforts to sort out governmental responsibilities were also met with resistance in Congress. For example, President Nixon's six special revenue sharing proposals would have provided state and local governments the leading role in decisionmaking in those six functional areas. Also, his proposed Family Assistance Plan would have replaced several public assistance categorical grant programs with a national public assistance system covering all low-income families with children. Although his Family Assistance Plan was not adopted, Congress did nationalize several adult-age public assistance grant-in-aid programs in 1972, including old-age assistance, aid to the blind, and aid to the permanently and totally disabled. Another related, new development during the 1960s and 1970s was the imposition by Congress of numerous federal mandates on state and local government officials. The concept of mandates covers a broad range of policy actions with centralizing effects on the intergovernmental system, including statutory direct-order mandates, both total and partial statutory preemption of state and local government law, federal tax policies affecting state and local tax bases, and regulatory action taken by federal courts and agencies. Many federalism scholars also consider program-specific and crosscutting federal grant administrative conditions mandates, even though the grants themselves are voluntary. Crosscutting requirements are, perhaps, the most widely recognized mandate. They are a condition of federal assistance that applies across-the-board to all, or most, federal grants to advance a national social or economic goal. Title VI of the Civil Rights Act of 1964 was the first post-World War II statute to use a crosscutting requirement. It specifies that No person in the United States shall, on the ground of race, color, or national origin, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program receiving Federal financial assistance. In 1980, OMB counted 59 crosscutting requirements intended to further national social or economic goals in a variety of functional areas, including education and the environment. Some of the statutory direct-order mandates adopted during this era included the Equal Employment Opportunity Act of 1972, which extended the prohibitions against discrimination in employment contained in the Civil Rights Act of 1964 to state and local government employment; the Fair Labor Standards Act Amendments of 1974, which extended the prohibitions against age discrimination in the Age Discrimination in Employment Act of 1967 to state and local government employment; and the Public Utilities Regulatory Policy Act of 1978, which established federal requirements concerning the pricing of electricity and natural gas. ACIR suggested that the expansion of federal intergovernmental regulatory activity during the 1960s and 1970s fundamentally changed the nature of intergovernmental relations in the United States: During the 1960s and 1970s, state and local governments for the first time were brought under extensive federal regulatory controls.... Over this period, national controls have been adopted affecting public functions and services ranging from automobile inspection, animal preservation and college athletics to waste treatment and waste disposal. In field after field the power to set standards and determine methods of compliance has shifted from the states and localities to Washington. The continued emphasis on categorical grants, the increased emphasis on provisions encouraging states to move in new policy directions, and, especially, the increased imposition of federal mandates on state and local governments during the 1960s and 1970s led some federalism scholars to label the 1960s and 1970s as the beginnings of a shift toward \"coercive federalism.\" Cooperative features were still present, but congressional deference to state and local government prerogatives seen in previous eras was no longer in force. Instead of focusing primarily on the \"carrot\" of federal assistance to encourage state and local governments to pursue policies that aligned with national goals, Congress increasingly relied on the \"stick\" of federal mandates. By the end of the 1970s, the social turmoil that marked the previous two decades had receded. Into the 1980s, the United States and most of the Western world experienced a revival of conservative politics, the advancement of free market solutions to improve government efficiency and solve social problems, and a renewed emphasis on materialism and the possession of consumer goods. Yet, at the same time, social change continued to affect American lifestyles, as women became fixtures in the workplace, the gay rights movement become more active, environmental concerns intensified, and rock concerts featuring the leading rock bands and performers of the era were televised to millions of viewers across the nation and the world to raise money for various social causes, such as famine relief, support for family farms, and AIDS prevention and treatment. The seemingly contradictory societal trends of self-promotion and altruism that swept across American society during the 1980s and 1990s were reflected in responses to national public opinion polls concerning politics and government. These polls evidenced a growing public hostility toward government intrusion and government performance, especially the federal government's performance, despite growing support for specific programs and regulations that represented the polar opposite of these attitudes. Perhaps reflecting these seemingly contradictory trends, during this era the public tended to elect a President of one political party and a Congress of another. Moreover, nationally, the two-party political system became more competitive as the once solid Democratic South turned increasing Republican. The Republican Party's resurgence was evidenced by its winning the presidency from 1981 to 1993, and its achieving majority status in the Senate from 1981 to 1987, and in both houses of Congress from 1995 to 2001. President Ronald Reagan's election in 1980, coupled with the Republican Party's resurgence, especially its winning majority party status in the Senate that year, signaled for some the potential for a \"devolution revolution\" in American federalism, where unfunded federal mandates would be rescinded, \"burdensome\" administrative federal grant-in-aid conditions removed, and the cooperative features of the federal grants-in-aid system enhanced. This belief was based on President Reagan's commitment to reducing the federal budget deficit. Because he was convinced that it was necessary to increase defense spending, President Reagan concluded that the only way to reduce the federal budget deficit was to increase revenue by encouraging economic growth through tax reduction and regulatory relief, and limiting the growth of federal domestic expenditures. As a former governor, he trusted state and local governments' ability to provide essential government services. As a result, he advocated a sorting out of governmental responsibilities that would reduce the federal government's role in domestic affairs, increase the emphasis on block grants to provide state and local government officials greater flexibility in determining how the program's funds are spent, and impose fiscal restraint on all federal grant-in-aid programs. For example, on February 18, 1981, President Reagan addressed a joint session of Congress and proposed the consolidation of 84 existing categorical grants into 6 new block grants and requested significant funding reductions for a number of income maintenance categorical grants, including housing (rental) assistance, food stamps (now Supplemental Nutrition Assistance Program), Medicaid, and job training. Congress subsequently approved P.L. 97-35 , the Omnibus Budget Reconciliation Act of 1981, which consolidated 77 categorical grants and two earlier block grants into the following nine new block grants: Elementary and Secondary Education (37 categorical grants), Alcohol, Drug Abuse, and Mental Health Services (10 categorical grants), Maternal and Child Health Services (9 categorical grants), Preventive Health and Human Services Block Grant (merged 6 categorical grants with the Health Incentive Grants for Comprehensive Health Services Block Grant), Primary Care (2 categorical grants), Community Services (7 categorical grants), Social Services (one categorical grant and the Social Services for Low Income and Public Assistance Recipients Block Grant), Low-Income Home Energy Assistance (1 categorical grant), and a revised Community Development Block Grant program (adding an existing discretionary grant and 3 categorical grants). Overall, funding for the categorical grants bundled into these block grants was reduced 12%, about $1 billion, from their combined funding level the previous year. President Reagan argued that the funding reductions would not result in the loss of services for recipients because the reductions would be offset by administrative efficiencies. In addition, the Reagan Administration eliminated funding for 62 categorical grants in 1981, mainly through authority provided under the Omnibus Budget Reconciliation Act of 1981. Some observers were convinced that the adoption of the Omnibus Budget Reconciliation Act of 1981 was proof of the coming devolution revolution. The number of federal grants to state and local governments was reduced and outlays for federal grants to state and local governments fell for the first time since World War II, from $94.7 billion in FY1981 to $88.1 billion in FY1982. However, in retrospect, federalism scholars now consider the 1981 block grants as more \"historical accidents than carefully conceived restructurings of categorical programs\" because they were contained in a lengthy bill that was primarily designed to reduce the budget deficit, not to reform federalism relationships. The bill was adopted under special parliamentary rules requiring a straight up or down vote without the possibility of amendment, and it was not considered and approved by authorizing committees of jurisdiction. Nonetheless, largely due to the Omnibus Budget and Reconciliation Act of 1981, in 1984 there were 12 block grants in operation (compared to 392 categorical grants), accounting for about 15% of total grants-in-aid funding. During the remainder of his presidency, President Ronald Reagan submitted 26 block grant proposals to Congress, with only one, the Federal Transit Capital and Operating Assistance Block Grant, added in 1982. In addition, Congress approved the Job Training Partnership Act of 1982, which created a new block grant for job training to replace the block grant contained in the Comprehensive Employment and Training Act of 1973. Federalism scholars generally agree that President Reagan had unprecedented success in achieving congressional approval for block grants in 1981. However, they also note that most of President Reagan's subsequent block grant proposals failed to gain congressional approval, primarily because they were opposed by organizations that feared, if enacted, the block grants would result in less funding for the affected programs. For example, in 1982, President Reagan proposed, but could not get congressional approval for, a $20 billion \"swap\" in which the federal government would return to states full responsibility for funding Aid to Families With Dependent Children (AFDC) (now Temporary Assistance for Needy Families) and food stamps (now Supplemental Nutrition Assistance Program) in exchange for federal assumption of state contributions for Medicaid. As part of the deal, he also proposed a temporary $28 billion trust fund or \"super revenue sharing program\" to replace 43 other federal grant programs, including 19 social, health, and nutrition services programs, 11 transportation programs, 6 community development and facilities programs, 5 education and training programs, Low Income Home Energy Assistance, and general revenue sharing. The trust fund, and federal taxes supporting it, would begin phasing out after four years, leaving states the option of replacing federal tax support with their own funds to continue the programs or allowing the programs to expire. Both the swap proposal and the proposed devolution of 43 federal grants failed to gain congressional approval, primarily because they were opposed by organizations and Members who feared that, if enacted, the proposals would result in less funding for the affected programs. For example, the National Governors Association supported the federal takeover of Medicaid, but objected to assuming the costs for AFDC and food stamps. The economy was weakening at that time and governors worried that they would not have the fiscal capacity necessary to support the programs without continued federal assistance. Evidence of a coming devolution revolution proved elusive as the upward trend in outlays for federal grants to state and local programs resumed in FY1983, although at a somewhat lower rate of increase than during the previous two decades. As shown in Table 2 , outlays for federal grants to state and local governments increased from $91.4 billion in FY1980 to $135.3 billion in FY1990 and $285.9 billion in FY2000. Medicaid accounted for much of that revenue growth, increasing from $13.9 billion in FY1980 to $41.1 billion in FY1990 and $117.9 billion in FY2000. Functionally, as shown in Table 2 , outlays for federal grants to state and local governments for health care increased from $15.8 billion in FY1980 to $124.8 billion in FY2000. Also, outlays for federal grants to state and local governments for income security increased from $18.5 billion in FY1980 to $68.7 billion in FY2000; for education, training, employment, and social services from $21.9 billion to $36.7 billion; for transportation from $13.0 billion to $32.2 billion; and for community and regional development from $6.5 billion to $8.7 billion. The number of federal grants to state and local governments fell at the beginning of this era, from 541 in 1981 to an era low of 405 in 1984, but then resumed an upward trend. As indicated in Table 4 , there were 541 grants to state and local governments in 1981, 405 in 1984, 435 in 1987, 492 in 1989, 557 in 1991, 593 in 1993, 633 in 1995, and 664 in 1998. Moreover, the number of intergovernmental mandates continued to increase throughout the era. ACIR, for example, identified 36 significant federal mandates affecting state and local governments in 1980. In 1990, it identified 63. ACIR concluded that \"despite efforts to constrain the growth of intergovernmental regulation, the 1980s remained an era of regulatory expansion rather than contraction.\" It offered the following explanation for the increased number of federal mandates during the 1980s: The causes of this continued regulatory growth are complex and varied. Many regulations address important and well documented problems from pollution to health care to civil rights. The goals associated with these programs are popular not only with the general public but with state and local government officials as well. But, whereas the Congress in the past might have responded to emerging needs with a new federal aid program, the scarcity of federal funds during a decade of historic deficits has made the alternative of federal mandates look increasingly attractive to federal policymakers. Some observers believed that the anticipated devolution revolution might be realized following the 1994 congressional elections, which resulted in the Republican Party gaining majority status in both the House and Senate. As evidence of the potential for a devolution revolution they pointed to the Unfunded Mandate Reform Act of 1995 (UMRA). Its intent was to limit the federal government's ability to impose costs on state and local governments or on the private sector through unfunded mandates. Providing relief from unfunded mandates was one of the stated goals of the Republican Party's 1994 Contract With America. Under UMRA, congressional committees have the initial responsibility to identify certain federal mandates in measures under consideration. If the measure contains a federal mandate, the authorizing committee must provide the measure to the Congressional Budget Office (CBO). It reports back to the committee an estimate of the mandate's costs. The office must prepare full quantitative estimates for each reported measure with mandate costs over pre-determined thresholds in any of the first five fiscal years the legislation would be in effect. CBO's cost estimates include the direct costs of the federal mandates contained in the measure, or in any necessary implementing regulations; and the amount of new or existing federal funding the legislation authorizes to pay these costs. The thresholds triggering a full CBO cost estimate are adjusted annually for inflation. They were originally $50 million for intergovernmental mandates and $100 million for private sector mandates. The thresholds in 2019 are $82 million for intergovernmental mandates and $164 million for private sector mandates. CBO must prepare brief statements of cost estimates for those mandates that have estimated costs below these thresholds. Members can raise a point of order if the measure containing the mandate lacks a CBO cost estimate, either because the committee failed to publish the CBO's cost estimate in its report or in the Congressional Record , or CBO determined that no reasonable estimate of the mandate's cost was feasible. Members can also raise a point of order if the measure has an intergovernmental cost estimate that exceeds the annually adjusted cost threshold in any of the first five fiscal years the mandate would be in effect. UMRA's impact on unfunded mandates has been relatively limited. For example, from 1996 to May 2019, 62 points of order were raised in the House and 4 in the Senate. One point of order, concerning a 1996 minimum wage bill, was sustained in the House and two points of order, concerning amendments relating to an increase in the minimum wage in 2005, were sustained in the Senate. In addition, UMRA covers only certain types of unfunded federal mandates. As a federalism scholar argued, UMRA primarily covers only statutory direct orders, excluding most grant conditions and preemptions whose fiscal effects fall below the threshold. Statutory direct orders dealing with constitutional rights, prohibition of discrimination, national security, and Social Security are among those excluded from coverage. Moreover, analytic and procedure requirements do not apply to appropriations bills, floor amendments or conference reports–those tools of \"unorthodox lawmaking\" that have become increasingly prevalent in the Congress. Moreover, another federalism scholar noted that the overall record of the 104 th Congress, expected by some to decentralize and devolve federalism relationships, was more status quo than devolutionary: Shifting back to the overall record of the 104 th Congress, it is appropriate here to note the various proposed devolutionary bills that were defeated. Chief among these was the proposed Medicaid block grant with a $163 billion cut in funding over five years. Both a public housing blocking proposal and the big regulatory reform measure that would have seriously limited the Federal government's power to issue rules affecting health, safety, and the environment were scuttled. Extension of the Clean Water Act, enactment of a consolidation of eighty-odd manpower training programs, and passage of a revised Endangered Species Act, which eliminated the Federal authority to restrict threatening activities, were all successfully resisted. A rollback of affirmative action, a conservative shift in the Superfund's program and rules, and the proposed Product Liability Legal Reform Act of 1996 were also scuttled. Of the nine here, two died because of Senate rejection; three, because of a presidential veto or the threat of one; two others failed because neither chamber dared take either one up; and the last two died because of a deadlocked Conference Committee and a lack of time to consider a Conference Report. The devolution revolution never fully materialized during this era, despite growing public hostility toward the federal government. The emphasis on categorical grants and the issuance of federal mandates continued. Yet, some decentralization of decisionmaking authority did take place during the era. For example, in 1980, there were four block grants in operation. In 2000, there were 24 block grants, including the Surface Transportation Program (1991) and the Temporary Assistance for Needy Families (TANF) program (1996). Funded at $16.7 billion annually, TANF rivaled the Surface Transportation Program during this era for the largest budget of all the block grants. In addition, Congress authorized state waivers for Medicaid starting in 1981, and for child welfare assistance programs starting in 1994. The seemingly contradictory trends of centralization and decentralization that took place in the federal intergovernmental system during the 1980s and 1990s perhaps reflected the contradictory societal trends that swept across America at the time. As mentioned previously, national public opinion polls indicated that the public was increasingly dissatisfied with the performance of government, especially the federal government's performance, and expressed a growing hostility toward government (and Congress) as a whole. It could be argued that these views suggest that the public wanted Congress to devolve federal grant-in-aid programs to state and local governments or, at least, provide state and local governments greater flexibility in determining how the grants' funding should be spent. Yet, at the same time, the public also expressed relatively strong support for individual federal government programs (and individual Members of Congress). It could be argued that these views suggest that the public wanted Congress to maintain federal government control over these programs, and expressed approval of their individual Members for doing so. Another possible explanation for the continued focus on categorical grants and the imposition of federal mandates during this era is that federalism issues tend to be a second order priority for many federal policymakers. For example, it could be argued that President Reagan's commitment to strengthening federalism through program decentralization and devolution was unrivaled in the modern era. Yet, in an analysis of the Reagan Administration's federalism policies, a leading federalism scholar concluded that \"devolutionary policies consistent with the president's definition of federalism reform ... consistently lost out in the Reagan Administration when they ... conflicted with the sometimes competing goals of reducing the federal deficit, deregulating the private sector, and advancing the conservative social agenda.\" For example, this scholar noted that President Reagan opposed the expansion of General Revenue Sharing, advocated the elimination of the deductibility of state and local taxes, supported the preemption of state laws regulating double-trailer trucks and establishing minimum drinking ages, overrode state objections to increased off-shore oil drilling and increased use of nuclear power, and supported efforts to require states to establish workfare programs for public assistance recipients and suing localities which sought to retain aggressive affirmative action hiring policies. Some observers thought that the number of federal grants to state and local governments and outlays for federal grants to state and local governments might fall during George W. Bush's presidency (2001-2009), given federal budgetary pressures created by what many called the \"war on terror\" following 9/11, President Bush's commitment to reducing the annual federal budget deficit and addressing the federal debt, and the Republican Party's winning majority status in the House of Representatives from 2001 to 2007 and in the Senate for portions of 2001 and 2002, and from 2003 to 2007. Yet, outlays for federal grants to state and local governments increased during his presidency, from $285.8 billion in FY2000 to $461.3 billion in FY2008. Others thought that the \"the ascendancy of George W. Bush to the presidency, in concert with a remarkably unified Republican control of the Congress, presaged a period of unified government … [that would lead to] the arrest and even reversal of federal policy centralization.\" For example, President Bush used his authority to grant state waivers to increase state flexibility in the use of Medicaid funds and, in his second term, in complying with No Child Left Behind requirements. He also proposed grant consolidations of community development programs, state control of the Head Start program, and waivers of regulations in many low-income programs (called superwaivers). However, despite these efforts, federalism scholars argue that the federal government continued to further centralize its authority in many policy areas during his presidency, often with President Bush's approval. For example, President Bush supported the extension of \"federal goals and standards to such areas as education testing, sales tax collection, emergency management, infrastructure, and elections administration\" and the imposition of restrictions on partial-birth abortions, new work requirements for TANF recipients, and new standards for issuing secure driver's licenses. President Bush also supported legislative efforts to prohibit same-sex marriage. The expansion and centralization of the federal grants-in-aid system continued under President Barack Obama and has continued, albeit counter to his recommendations, under President Trump. As shown in Table 2 , outlays for federal grants to state and local governments has continued to increase in recent years (from $660.8 billion in FY2016 to $674.7 billion in FY2017, and to an anticipated $728.0 billion in FY2018), largely due to increased outlays for Medicaid (increasing from $368.3 billion in FY2016 to $374.7 billion in FY2017, and to an anticipated $400.4 billion in FY2018). However, outlays for federal grants to state and local governments has increased in other policy areas as well. As shown in Table 4 , the number of federal grants to state and local governments has also increased, from 664 in 1998, to 953 in 2009, 996 in 2012, 1,188 in 2015, and 1,274 in 2018. In addition, the emphasis on categorical grants has been retained, as 1,253 of the 1,274 funded federal grants to state and local governments in 2018 were categorical grants, and 21 were block grants. Also, despite UMRA, unfunded federal mandates have continued to be issued in many policy areas. For example, CBO reports that from January 1, 2006, to December 31, 2018, 217 laws were enacted with at least one intergovernmental mandate as defined under UMRA. These laws imposed 443 mandates on state and local governments, with 16 of these mandates exceeding UMRA's threshold, 14 with estimated costs that could not be determined, and 413 with estimated costs below the threshold. CBO reported that hundreds of other laws had an effect on state and local government budgets, but those laws did not meet UMRA's definition of a federal mandate. Grant conditions, historically the predominant means used to impose federal control over state and local government actions, have also continued to be used to promote national goals. For example, many observers consider the adoption of the No Child Left Behind Act of 2001, signed into law on January 8, 2002, to be President George W. Bush's signature federalism achievement. Although the act allows states to define the standards used for testing, it imposed federal testing, teaching, and accountability standards on states and school districts that, overall, significantly increased federal influence on public elementary and secondary education throughout the nation. In addition, during his presidency, the Help America Vote Act of 2002 instituted \"sweeping new federal standards, along with new funding, that regulated significant features of state and local election processes.\" President Obama did not issue a formal federalism plan and did not formally advocate a major shift in funding priorities within functional categories. Instead, the Obama Administration attempted to cultivate a place-based approach, customizing support for communities based on their specific assets and challenges. This new approach seeks out communities' plans or vision for addressing a set of challenges and then works across agency and program silos to support those communities in implementing their plans. However, the expansion of Medicaid eligibility under P.L. 111-148 , the Patient Protection and Affordable Care Act (ACA), which President Obama strongly endorsed, increased health care's position as the leading category of federal assistance to state and local governments. The ACA also either authorized or amended 71 federal categorical grants to state and local governments, further enhancing the role of categorical grants in the intergovernmental grant-in-aid system. The Obama Administration did not formally advocate a major shift in funding priorities from categorical grants to block grants, or from block grants to categorical grants. However, the number of funded block grants declined somewhat during the Obama Administration, from 24 in 2009 to 20 in 2016. Also, although the Obama Administration did support ARRA's funding for two relatively significant temporary block grants (the $53.6 billion Government Services State Fiscal Stabilization Fund for public education; and the $3.2 billion Energy Efficiency and Conservation Block Grant for energy efficiency and conservation programs) and ARRA's provision of additional, temporary funding to TANF ($5 billion), the Child Care and Development Block Grant ($2 billion), the Community Development Block Grant ($1 billion), the Community Services Block Grant ($1 billion), and the Native American Housing Block Grant ($510 million) programs, the Obama Administration generally advocated enactment of new competitive categorical grant programs (e.g., TIGER surface transportation grants and Race to the Top education grants) rather than the expansion of existing block grants or the creation of new ones. However, the Obama Administration did advocate the consolidation of categorical grant programs in several functional areas as a means to reduce duplication and promote program efficiency. For example, the Obama Administration supported the consolidation of dozens of surface transportation categorical grant programs into other surface transportation categorical grant programs in P.L. 112-141 , the Moving Ahead for Progress in the 21 st Century Act of 2012 (MAP-21). The Obama Administration also advocated the merging of categorical grant programs in the Department of Homeland Security as a means to \"better target these funds.\" The Trump Administration indicated in its FY2018 budget request that it intended to refocus federal grants on \"the highest priority areas,\" provide \"a greater role for state and local governments,\" \"slow the growth of grant spending over the 10-year budget window,\" and \"rein in the growth of Medicaid.\" This budget proposes to cap federal funding for the Medicaid program, to establish a state matching requirement for the Supplemental Nutrition Assistance Program, to eliminate the Community Development Block Grant and Social Services Block Grant programs, and to make other reductions that reestablish an appropriate federal-state fiscal relationship and contribute to achieve a balanced federal budget by 2027. Among other grant initiatives, the budget proposes to establish a 25% non-federal cost match for FEMA [Federal Emergency Management Agency] preparedness grant awards that currently require no cost match … authorizes a new Federal Emergency Response Fund to rapidly respond to public health outbreaks … reforms the Centers for Disease Control and Prevention through a new $500 million block grant to increase state flexibility and focus on the leading public health challenges specific to each state … [and] includes $200 billion in budget authority related to the [Trump Administration's] infrastructure initiative. The Trump Administration continued to advocate for these objectives in its FY2019 and FY2020 budget requests. For example, the Administration indicated in its FY2019 budget request that Over many decades, the increasing number of grants and size of grants has created overlap between programs, and complexity for grantees, and has made it difficult to compare program performance and conduct oversight. The multiple layers of grants administration can increase the cost of administration and create inefficiencies and duplication. Less Federal control gives State and local recipients more flexibility to use their knowledge of local conditions and need to administer programs and projects more efficiently. The 2019 Budget takes steps toward limiting the Federal role, and reducing spending. This budget slows the growth of grant spending over the 10-year budget window and, in particular, starts to rein in the growth of Medicaid ... The Budget provides $749 billion in outlays for aid to State and local governments in 2019, an increase of 3% from 2018. The increase is entirely due to spending for the Administration's infrastructure initiative; all grant spending other than Medicaid and the infrastructure initiative will decline by 11% in 2019. The Trump Administration repeated its intent to slow the growth of federal aid to state and local governments in its FY2020 budget request: This budget slows the growth of grant spending over the 10-year budget window and, in particular, starts to rein in the growth of Medicaid, which accounts for 56 percent of total grant spending to State and local governments. The Budget provides $751 billion in outlays for aid to State and local governments in 2020, an increase of less than one percent from spending in 2019. Among its proposals to slow the growth of federal aid to state and local governments and improve federal grant performance, the Administration recommended that Medicaid be converted to a block grant or be subject to a per capita spending cap indexed to the Consumer Price Index \"to support States as they transition to more sustainable health care programs and encourage them to pursue innovative ideas to that aim to curb costs moving forward.\" states be provided \"maximum flexibility over their Medicaid programs\" to place the program \"on a sound fiscal path.\" funding be eliminated for \"lower priority grant programs,\" such as the Sea Grant, Coastal Zone Management Grants, and the Pacific Coastal Salmon Recovery Fund. funding be eliminated for Community Development Block Grants and the Economic Development Administration. In addition, the Trump Administration noted that its President's Management Agenda, released in March 2018, included a cross-agency priority goal of achieving results-oriented accountability for federal grants funding. The Administration's goal is to ensure that federal grants to state and local governments are \"delivered to intended recipients as efficiently as possible\" by standardizing the grants management process and data, building shared IT infrastructure, managing risk, and achieving program goals and objectives. The Administration also included proposals \"to require able-bodied adults participating in the Supplemental Nutrition Assistance Program (SNAP) enter and re-enter the job market and work toward self-sufficiency.\" As the data in Table 2 , Table 3 , and Table 4 attest, outlays for federal grants to state and local governments, in both nominal and constant dollars, and the number of federal grants to state and local governments have continued to increase since the mid-1980s. Given its increased size and cost, providing effective congressional oversight of federal grants to state and local governments can be a daunting task. Given the decentralized nature of the congressional committee system, Congress is well positioned to provide effective oversight of individual federal grants to state and local governments. However, it could be argued that the decentralized nature of the congressional committee system is not optimally conducive to providing effective oversight of the interactive effects of multiple federal grants to state and local governments, or of the potential interactive effects of federal grants to state and local governments and federal tax policy. In the past, the independent, bipartisan ACIR, which operated from 1959 to 1996, provided Congress and others a series of authoritative reports on the status and operation of intergovernmental grants, both as individual programs and as a collective system. GAO has published several reports over the years on federal grants that have helped to fill the informational and analytic void left by ACIR's demise. However, it could be argued that Congress may wish to examine whether a reconstituted ACIR, perhaps one that focuses on the structure and operation of the intergovernmental system as a whole, might prove useful as an additional source of information and analysis as it conducts oversight of the federal grants to state and local governments. For example, such an organization could provide an accepted methodology for counting federal grants to state and local governments, and provide Congress periodic assessments of the intergovernmental grant system's overall performance. It could be argued that the recent upward trend in outlays for federal grants to state and local governments is about to end because there is a general consensus that anticipated growth in federal discretionary spending, which includes outlays for federal grants to state and local governments, may be targeted for reductions as part of an effort to address the federal deficit and debt. However, Congress's historical tendency to use federal grants to state and local governments as a means to create jobs and promote national economic growth suggests that the upward trend in federal grant outlays and federal grant numbers that has been experienced over the past several decades may continue, although at a slower pace. President Trump's FY2020 budget request estimates that total outlays for federal grants to state and local governments will increase from $696.5 billion in FY2018 to an anticipated $749.5 billion in FY2019 and $750.7 billion in FY2020. In retrospect, with the exception of the early 1980s, federal grant funding, the number of federal grants, and the issuance of federal mandates have increased under both Democratic and Republican Congresses and Presidents. Historically, there have been notable differences between the two parties' approaches toward federalism. Although both parties have generally opposed unfunded federal mandates, the Republican Party has done so more aggressively, as evidenced by its 1994 Contract With America, sponsorship of UMRA, and recent legislative efforts to broaden UMRA's coverage to include, when requested by the chair or ranking Member of a committee, the prospective costs of legislation that would change conditions of federal financial assistance. The Republican Party has also advocated the devolution of certain federal grant-in-aid programs to state and local governments while the Democratic Party has generally opposed devolution. The Republican Party has also been more aggressive in its support of the decentralization of grants-in-aid decisionmaking to state and local governments through the consolidation of categorical grants into block grants, for revenue sharing, and administrative relief from various grant conditions. But, overall, the historical record suggests that for most Members of both political parties, regardless of their personal ideological preferences, federalism principles are often subordinated to other policy goals, such as reducing the federal budget deficit, promoting social values or environmental protection, and guaranteeing equal treatment and opportunity for the disadvantaged. As long at this continues to be the case, and the public continues to express support for specific government programs ̶ even if they generally oppose \"big\" government as a whole ̶ there is little evidence to suggest that the general historical trends of increasing numbers of federal grants to state and local governments, increasing outlays for those grants, an emphasis on categorical grants, and continued enactment of federal mandates, both funded and unfunded, are likely to change.", "summary": "The federal government is expected to provide state and local governments about $750 billion in federal grants in FY2019, funding a wide range of public policies, such as health care, transportation, income security, education, job training, social services, community development, and environmental protection. Federal grants account for about one-third of total state government funding, and more than half of state government funding for health care and public assistance. Congressional interest in federal grants to state and local governments has always been high given the central role Congress has in determining the scope and nature of the federal grant-in-aid system, the amount of funding involved, and disagreements over the appropriate role of the federal government in domestic policy generally and in its relationship with state and local governments. Federalism scholars agree that congressional decisions concerning the scope and nature of the federal grants-in-aid system are influenced by both internal and external factors. Internal factors include congressional party leadership and congressional procedures; the decentralized nature of the committee system; the backgrounds, personalities, and ideological preferences of individual Members; and the customs and traditions (norms) that govern congressional behavior. Major external factors include input provided by voter constituencies, organized interest groups, the President, and executive branch officials. Although not directly involved in the legislative process, the Supreme Court, through its rulings on federalism issues, also influences congressional decisions concerning the federal grants-in-aid system. Overarching all of these factors is the evolving nature of cultural norms and expectations concerning government's role in American society. Over time, the American public has become increasingly accepting of government activism in domestic affairs generally, and of federal government intervention in particular. Federalism scholars attribute this increased acceptance of, and sometimes demand for, government action as a reaction to the industrialization and urbanization of American society; technological innovations in communications, which have raised awareness of societal problems; and exponential growth in economic interdependencies brought about by an increasingly global economy. This report provides a historical synopsis of the evolving nature of the federal grants-in-aid system, focusing on the role Congress has played in defining the system's scope and nature. It begins with an overview of the contemporary federal grants-in-aid system and then examines its evolution over time, focusing on the internal and external factors that have influenced congressional decisions concerning the system's development. It concludes with an assessment of the scope and nature of the contemporary federal grants-in-aid system and raises several issues for congressional consideration, including possible ways to augment congressional capacity to provide effective oversight of this system.", "document_type": "crs"}
{"report": "Mozambique, in southeastern Africa, faces political, economic, and security headwinds, some arguably related to the continuous domination of the state by the Mozambique Liberation Front (FRELIMO) political party. FRELIMO, a former armed liberation movement that fought for self-determination and freedom from Portuguese colonial rule, has held a parliamentary majority since achieving independence in 1975. Prior to a resurgence of political tensions and violence in 2013 between FRELIMO and RENAMO, a former armed rebel movement that is now the main opposition party, Mozambique was widely viewed as having made a durable transition to peace after its postindependence civil war (1977-1992). It also made a transition, beginning in the late 1980s, from politically and economically centralized, one-party, socialist rule, to a multiparty democratic system underpinned by a largely market-based economy. The development of large offshore natural gas reserves discovered in the country's north in 2010 is expected to lead to gas exports in the early to mid-2020s and, together with rising exports of coal, to spur rapid economic growth and reverse a slump that began in 2016. This downturn was preceded by nearly two decades of post-civil war economic expansion underpinned, in part, by inflows of foreign direct investment (FDI) tied to large industrial projects. Mozambique has also received large inflows of foreign aid aimed at addressing its myriad development challenges. While there has been marked progress in reducing poverty rates and raising a range of once very low socioeconomic indicators, most Mozambicans (see Figure 1 ) have remained poor, and there are many unmet development needs. There also have been regional and demographic disparities regarding access to the fruits of growth. Large FDI-driven industrial projects prioritized by the state, for instance, have helped speed macroeconomic growth rates, but often have provided relatively few jobs or economic gains for the general population. Corruption and elite use of political influence to accumulate private wealth also have grown over the post-civil war period (see below), with worrisome implications for the economy and stability. The post-2015 economic decline followed disclosures that the government had failed to report to the International Monetary Fund (IMF) over $2 billion in state-guaranteed debt, which violated the terms of Mozambique's cooperation with the IMF. Two foreign banks provided these loans, in an allegedly corrupt manner, to state-owned firms registered as private entities and controlled by state intelligence officials. This set of events, known as the \"hidden debt affair,\" has had far-reaching consequences. It has spurred an ongoing major political scandal, Mozambican and U.S. prosecutions, and aid suspensions by multiple donor governments (albeit not by the United States). Along with broader indicators of corruption, the debt affair also has prompted some observers to question whether the state has the political will and capacity to administer effectivelyâand in the public interestâa large projected windfall of earnings from the energy sector. The government recently requested IMF technical assistance in undertaking an assessment of governance and corruption challenges. The scandal also reduced Mozambique's sovereign debt ratings and placed it in debt distress, reducing the state's access to credit needed for development projects and government operations. As of late 2018, Mozambique's public debt totaled about $15.9 billionâ110.5% of gross domestic product (GDP)âand the country was $1.2 billion in arrears. Mozambique also faces security challenges. It is gradually overcoming a destabilizing political dispute spurred by long-standing RENAMO grievances over alleged electoral misconduct and continuous de facto FRELIMO control of the state. The dispute turned into a low-level armed conflict between RENAMO and state forces between 2013 and late 2016, when a temporary cease-fire was signed. It was later extended. In 2018, the two parties signed political and military agreements to end their dispute, and in August 2019 they signed a permanent cease-fire prior to signing a comprehensive peace accord. Since late 2017, the country also has faced a brutal insurgency by armed Islamist extremists in its far north, in an area where large-scale gas development operations are underway. Trafficking of persons, wildlife, and illicit drugs, along with other organized crime activity, also poses security challenges. Mozambique enjoys cordial relations with the United States and receives sizable U.S. global health assistance, but has received relatively limited congressional attention since the early 2000s. However, the country hosted congressional delegations in 2016 and 2018 that focused on such issues as U.S. health and wildlife aid and the RENAMO-FRELIMO conflict. Recent developments and policy challenges in Mozambique have the potential to draw increased congressional attention. These include increasing U.S. private-sector stakes in the energy sector, the implications of state corruption for the government's integrity and status as a U.S. development and investment partner, U.S. government counterterrorism concerns, and recovery from two powerful cyclones that hit the country in March and April 2019. The devastation caused by the cyclones has prompted an ongoing U.S. assistance responseâfunded at a level of $74 million as of May 31âin support of humanitarian needs and longer-term recovery efforts, alongside a broader international response. (On these issues, see CRS Report R45683, Cyclones Idai and Kenneth in Southeastern Africa: Humanitarian and Recovery Response in Brief .) Mozambique gained independence in 1975, after a long FRELIMO-led armed struggle against Portuguese colonial rule. In 1977, RENAMO, a guerrilla group initially formed as a proxy of the white minority regime in Rhodesia (now Zimbabwe), initiated attacks against the socialist FRELIMO-led state, sparking a civil war. The war caused hundreds of thousands of deaths, social displacement, a mass refugee exodus into nearby countries, and widespread destitution. These effects were exacerbated by natural disasters, as well as by FRELIMO's abortive attempts to control the economy, which prompted a turn toward economic liberalization in the late 1980s. After internationally aided peace talks, a new constitution was ratified in 1990. Peace accords signed in 1992 ended the war and, along with U.N.-aided peacebuilding efforts, paved the way for RENAMO's transformation into a political party and multiparty elections in 1994. Postwar politics mainly have centered on intra-FRELIMO competition and polarized rivalry between FRELIMO, which has held an electoral majority since 1994, and RENAMO. Broad public postwar support for reconciliation and peacebuilding initially led to a system of informal bargaining among political elites over policymaking, giving RENAMO influence that it might not otherwise have had. Over time, however, FRELIMO increasingly wielded its electoral majority, aided by its strong influence over the electoral system, to marginalize RENAMO. The country's constitution, which concentrates executive power in the office of the directly elected president, augmented FRELIMO's power, as did its influence over the economy and FDI flows. This was notably the case under former President Armando Guebuza (in office 2005-2015), a FRELIMO hardliner who accrued substantial private wealth. He centralized power in the presidency, appointed loyalists to state posts, and reportedly fostered an influential network of relatives and associates, many of whom used political ties to advance their business interests. Resentful of FRELIMO's continuous political and economic dominance and of not being allocated governorships in provinces where it claimed electoral majoritiesâand due to enduring bitterness over a narrow 1999 presidential election lossâRENAMO has routinely engaged in a politics of obstruction and protest. It has repeatedly boycotted elections or parliament, usually citing electoral grievances, and periodically it has threatened to withdraw from the political process or resort to violence to achieve its aims. Afonso DhlakamaâRENAMO's sole postwar leader until his death in 2018âspearheaded this approach, to mixed effect. While RENAMO's approach periodically won it concessions, such as incremental electoral reforms, Dhlakama often appeared to overplay his hand, making weighty demands that the FRELIMO government often rejected, either outright or after parliamentary debate. RENAMO was also considered to be afflicted by internal divisions, poor organization, and erratic leadership under Dhlakama. He also thwarted the emergence of rivals within the party, which helped spur the formation in 2009 of the Democratic Movement of Mozambique (MDM) by RENAMO dissidents led by Daviz Simango, the mayor of Beira, a key city. The MDM became the third-largest party in parliament in 2009 and nearly doubled its gains in the 2014 election. It also won four city elections in 2013, but lost all but Beira in 2018. Until 2013, periodic warnings by RENAMO that it might resort to coercion or violence to achieve its aims remained only threats, notwithstanding many small-scale, mostly unarmed confrontations between its supporters and authorities. Its potential to employ the force of arms, however, was always a risk, as the 1992 peace accords had permitted Dhlakama to maintain an armed personal protection unit with police-like powers. RENAMO also has long held the loyalty of ex-fighters who were not integrated into the national military at the end of the war, some with access to civil war-era arms caches and abiding postwar reintegration grievances. In late 2012, Dhlakama retreated to his former wartime base and began to marshal a military force. In early 2013, RENAMOâin a manner reminiscent of its civil war tacticsâlaunched armed attacks on police and military personnel, state facilities (e.g., health posts), and some civilian targets. Periodic clashes with state forces led to dozens of fatalities, including of civilians. Conflict waned for a time after a 2014 preelection cease-fire accord. RENAMO, however, dissatisfied with the 2014 election results and other responses to its demands, later abandoned the accord, and hostilities resumed. The renewed conflict, Human Rights Watch (HRW) reported, featured \"enforced disappearances, arbitrary detentions, summary killings and destruction of private property allegedly committed by government forces, and political killings, attacks on public transport and looting of health clinics by alleged RENAMO forces.\" Throughout the conflict, there were numerous on-again-off-again peace talks and provisional agreements, but binding accord was stymied repeatedly by violence, brinksmanship, and intransigence by the two sidesâand by RENAMO's often shifting demands. At the start of the conflict, these centered on electoral law reforms and equitable party representation on the electoral commission. Later, among other ends, RENAMO sought the inclusive and nonpartisan allocation of the fruits of economic growth, including extractive sector earnings; completion of the integration of an agreed number of RENAMO fighters into the military, command posts for RENAMO officers, and related demands; and an end to FRELIMO domination of the state, including through a process of increased political decentralization under which RENAMO would be allocated governorships in areas where it has claimed high rates of electoral support. A 2016 cease-fire largely halted hostilities, and in early 2018, President Filipe Jacinto Nyusi and Dhlakama negotiated a framework accord on political decentralization. Uncertainty over prospects for the agreement arose after Dhlakama's death in early May 2018, but weeks later parliament enacted a series of constitutional amendments largely in line with the accord. These provide for elected provincial, district, and municipal assemblies, and for the leading delegate of the party with a simple majority in each assembly to become the chief executive at that level (i.e., governor, district administrator, or mayor.) RENAMO's disarmament has remained a bone of contention for FRELIMO. After the May 2018 decentralization reforms, FRELIMO parliamentarians delayed action on additional legislation necessary to implement the reforms, pending RENAMO's disarmament. In July 2018, however, the government and RENAMO signed a memorandum of understanding (MOU) on RENAMO military integration and demobilization. Parliament then passed some decentralization laws, and in early August, an agreement for implementing the July military accord was signed. Tensions over RENAMO's claims of fraud in the October 2018 local elections slowed the demobilization process, as did late 2018 disputes over RENAMO integration into the military and police. In July 2019, a group of 50 RENAMO fighters began the process of demilitarization, demobilization, and reintegration (DDR) at a largely symbolic ceremony at Satunjira, RENAMO's wartime headquarters in central Mozambique. The DDR process was conducted by a committee of government and RENAMO military representatives and foreign military observers, including a U.S. officer. Six demobilizing RENAMO members handed over weapons. Why more did not turn in weapons is not clear from news accounts, but this outcome could raise questions over RENAMO's commitment to the process if it resulted from a deliberate decision by RENAMO to defer a more extensive handover of arms. DDR began on the same day that the parliament passed a law providing immunity from prosecution for those accused of crimes related to the post-2013 armed hostilities between the government and RENAMO. On August 1, 2019, President Nyusi and RENAMO leader Ossufo Momade signed an agreement making the 2016 cease-fire permanent, and on August 6 signed a final peace accord. The signing drew widespread international plaudits. During a September 2019 visit to Mozambique, Pope Francis strongly endorsed the accords and the message of reconciliation underlying them. He also warned against corruption and plundering of natural resources. On August 21, a parliamentary majority adopted the peace accords as lawâthough MDM, the third largest party, abstained, and 37 of 89 RENAMO legislators were absent. The law includes the two 2019 agreements accords, the August 2018 DDR agreement, and related documents on implementation and monitoring. Key outcomes are to include the final disarmament and DDR of all armed RENAMO elements, the decommissioning of RENAMO bases, the provision of police protection for senior RENAMO officials, and the integration of selected RENAMO elements into the police and military, including at unit command levels. The accord does not provide for a RENAMO role in the State Information and Security Service (SISE), a longstanding RENAMO demand; RENAMO reportedly views SISE as having played key roles in the government's post-2012 security operations against RENAMO. International funding to support implementation of the accord is anticipated under the accords, which provide for a donor-funded \"basket fund,\" but do not specify which governments would contribute to the fund, the amounts needed, or what the fund would support. Press reports have suggested that an informal side agreement or \"elite bargain\" may exist under which \"significant monetary compensation\" might be paid to RENAMO leaders. Whether provided officially by donors or through unofficial supplementary arrangements, the allocation of funding for the peace processâparticularly any payments to individualsâcould become contentious. Successful implementation of the accords would require progress on a number of fronts, including final passage of pending legislation relating to the decentralization of state power, a free, fair, and transparent electoral process, and completion of the DDR process for all of RENAMO's 5,000-plus fighters. Such demobilization could be hindered by internal RENAMO splits (see below) or if armed RENAMO members perceive that they face threats if they proceed with disarmament. The possible salience of the latter concern was underscored by RENAMO's mid-August claim that \"dozens\" of its members had \"been assaulted by police and members of the ruling Frelimo party across the country\" after the August 6 peace agreement was signed. RENAMO has also reported that its members have faced harassment and property arson, as well as removal of party flag displays, which it blames on government elements. Another potential hindrance to disarmamentâand possibly to RENAMO's electoral prospectsâare ongoing intra-RENAMO divisions. Such splits emerged in early 2019 when Momade replaced several top RENAMO civilian and military officials after he was elected president of RENAMO. In June 2019, a group of RENAMO combatants accused MomadeâRENAMO's 2019 presidential candidateâof ethnically centered nepotism over the allocation of internal party and military integration posts. They also accused him of cooperating with the state intelligence service and of ordering the execution of two RENAMO officers. They demanded he resign, threatened to kill him if he did not, and asserted that demobilization would not proceed while he was leader. The group, whose members call themselves the RENAMO \"Junta Militar\" (military board), claim to represent RENAMO nationally and consider the peace accords null and void. They elected RENAMO general Mariano Nhongo as their leader in mid-August. A key Junta Militar grievance is their claim that Momade has \"excluded 60%\" of RENAMO forces from the DDR and security service integration process. The group also has called for elections to be postponed to enable Nhongo to compete in the electoral contest. The Junta Militar may not be able to force a postponement of the election or displace Momade as national RENAMO leader. Observers and the opposition MDM party, however, see a need for the Junta's concerns to be addressed, as the group is a potential peace- and electoral-process spoiler. The Junta has threatened to violently halt the 2019 election, and press reports have attributed several attacks by unidentified assailants to the group, which reported in early September 2019 that the national military had attacked a Junta's base. A separate smaller RENAMO subgroup also has demanded Momade's departure. General elections were last held in 2014, after tense local elections in 2013, which RENAMO boycotted. Electoral preparations took place amid armed RENAMO-government clashes, but hostilities waned after a prevote cease-fire. Because then-President Guebuza was term-limited, FRELIMO chose as its candidate then-Minister of Defense Filipe Jacinto Nyusi, a longtime party member from the gas-rich north. Nyusi won the presidency with 57% of the voteâa sharp drop from Guebuza's 75% in 2009. Dhlakama won 37%, and MDM leader Simango won 6%. FRELIMO garnered 144 of 250 seats in parliament, RENAMO, 89, and the MDM, 17. Despite some local and international criticism of the vote and a reported range of electoral process irregularities, the results were internationally accepted as generally credible and confirmed by the constitutional courtâalthough it questioned the vote tabulation process. RENAMO rejected the results, boycotted parliament in protest, and demanded the creation of a joint FRELIMO-RENAMO caretaker government, as well as the appointment of governors, ministers, and other officials from both parties. FRELIMO rejected these demands and RENAMO later took its parliamentary seats. Local elections in October 2018 were generally peaceful in most of the country, notwithstanding some electoral violence and procedural irregularities, and allegations of police protection of FRELIMO supporters involved in violent acts. Prior to the vote, RENAMO threatened to deploy armed men to stop what it asserted were state efforts to rig the results. After the vote, opposition parties launched multiple legal appeals, but local courts reportedly rejected nearly all on technical grounds. RENAMO and the MDM, claiming fraud and irregularities, protested the outcomes in multiple cities, and RENAMO threatened to halt the peace process, but ultimately did not do so. As discussed above, the peace process has continued, but remains incomplete. National elections are to be held in October 2019, and campaigning opened in late August. Press outlets have reported the alleged FRELIMO use of state resources and pressuring of public workers to support the party, localized intimidation of election campaigners of various parties, and sporadic election violence, including two murders. Pre-election voter registration in spring 2019 was controversial. Some 90% of voting-age adults reportedly registered to vote, but the process featured indications of possible manipulation by STAE, the election administration secretariat. STAE calculated an unusually high adult population in at least two historically pro-FRELIMO provinces and sent extra registration teams to those areas, while doing the opposite in Zambezia, a RENAMO stronghold. As a result, registration in several key pro-FRELIMO provinces exceeded the number of voting-age adults. On the basis of the larger electorate in Gaza, the national election commission, the CNE, awarded nine additional seats to the traditionally FRELIMO-leaning province. RENAMO appealed the registration in Gaza, but its case was thrown out on a technicality. In August the CNE rejected a private organization's offer to audit the Gaza registration. The Gaza controversy also prompted the resignation of the head of the National Statistics Institute. He had faced sharp criticism from President Nyusi after strongly defending the integrity of the census data at the heart of questions over 2019 voter registrations in the province, thus bolstering questions over the integrity of the voter registration process. Another factor that could work in the government's favor is the impact of the large cyclones that hit the country March and April 2019, primarily in areas where RENAMO is viewed as enjoying positive electoral prospects. Thousands of potential voters in the affected region were displaced and/or lost identification or voter registration papers as a result of the storms and related flooding. RENAMO has also accused STAE's chief of favoring FRELIMO. Mozambique faces a growing security threat that is separate and distinct from the RENAMO-state conflict. Since October 2017, members of an Islamist extremist group have carried out many attacks in mostly Muslim coastal districts of Cabo Delgado Province, adjacent to Tanzania. The group is known locally as Al Shabaab (\"the youth\" in Arabic, and also the name of a separate Al Qaeda-linked Somali group) and as Ansar al Sunnah (\"Defenders of the Sunnah\" [Islamic prophetic tradition]) or Al Sunnah wa Jama'ah (ASWJ, \"Adherents of the Sunnah\"). The group, whose leadership and aims remain opaque, has targeted police stations, other state facilities and personnel, and local civiliansâalong with contractors working for the U.S.-based energy firm Anadarko. ASWJ attackers have raided provisions and arms and used arson to cause extensive destruction to village buildings and crops. They often employ crude weapons, notably machetes, but also guns and explosives and have reportedly killed more than 300 peopleâoften by beheadingâspurring population displacements. Group members often reportedly target those they view as cooperating with the state. Several recent attacks attributed to ASWJ have killed significant numbers of state security forces, as well as civilians. Numerous insurgents have also been killed in clashes with security forces. Information on the group is limited and contested, as access to the affected area by journalists and researchers has been curtailed by insecurity largely viewed as attributable to the group and by systemic state obstruction and harassment of journalists in the area. The group may include members of a violent Islamist Tanzanian movement and may have ties to the potentially Islamic State (IS)-linked Allied Democratic Forces (ADF) group in Central Africa; several reported ADF members from Uganda with alleged links to ASWJ have been arrested in Mozambique. In May 2018, several ASWJ members posted a social media video stating that they planned to pledge allegiance to IS. In 2019, IS has claimed responsibility for several attacks. ASWJ was reportedly formed in 2014 by two or more local Islamists, some of whom may have received military training abroad, and foreign African Islamist extremists. It may also have roots in a group formed by dissidents from the state-affiliated Islamic Council who formed a group called Ansar al Sunna in the late 1990s. The group generally does not claim its attacks and has issued few statements about its goals. Some researchers report that the group espouses jihad (armed struggle against perceived enemies of Islam), the creation of a Sharia (Islamic law)-based state, and rejection of state institutions and services (e.g., education, taxation, and voting). Its ideas may be influenced by foreign Islamist ideologies, and by trade and social ties to the Swahili Coast, a cultural-linguistic and religious region extending northward to southern Somalia. Some accounts suggest that the group has been influenced, in particular, by Sheikh Aboud Rogo Mohammed, a Kenyan preacher whose Swahili-language teachings circulated widely in East Africa. Rogo, who was subject to U.S. and U.N. sanctions for supporting Somalia's Al Shabaab, was assassinated in 2012. ASWJ members reportedly initially proselytized locally to advance their beliefs and build a base of adherents, and later employed a mix of payments and coercion to recruit. Their activities attracted a mix of local opposition, including from the provincial officials of the national Islamic Council, and local support. ASWJ reportedly has provided business loans and employment to locals in exchange for fealty to the group. Poor young males with limited education appear to be key targets, and ASWJ may sponsor the Islamic education abroad of some. Some analysts contend that ASWJ, like many African Islamist armed groups, largely comprises disaffected youth who may be influenced by Islamist ideology but are driven primarily by anger over local grievances (e.g., economic disparities, limited or poor state services, and high unemployment). Other notably intense sources of local anger that the group may exploit include the loss of local agricultural and fishing livelihoods, the seizure of land by local and state elites, and nontransparency and corruption in compensation processes associated with the growth of the natural gas and gemstone mining industries. Other sources of local tension are rivalries, including over land and political party affiliation, between the mostly Catholic Makonde and mostly Muslim Mwani people, among other local ethnic groups. Some analysts believe that ASWJ is directly involved in illicit activity that is prevalent in the region. Others suggest that the group does \"not control any major contraband trade\" and that the \"illicit economy as a whole provides varied opportunities\" exploited by the group, which in the future could potentially become more deeply involved in illicit trafficking and other networks. Illicit activity in the affected region includes petty corruption (e.g., police and public services bribery), trafficking of heroin, persons, ivory and other poached wildlife items, gold, and gemstones, as well as illicit timber trade and an untaxed cross-border trade in consumer goods. State officials are key reported beneficiaries of such trade. State security forces' heavy-handed, arguably often ineffective responses to ASWJ violence also appear to have alienated local populations. Security forces reportedly often arrive at attack sites well after the insurgents have departed and arrest locals whom they identify as linked to the group, often on dubious grounds. Detainees have been beaten or treated inhumanely and illegally detained by military forces, or held by police without charges and beyond the legally permitted period. Some have reported torture, and there are unconfirmed reports of extrajudicial killings by security forces. Mass arrests, starting after ASWJ's October 2017 initiation of conflict, have been followed by mass trials of alleged perpetrators of ASWJ-linked crimes. Mozambique sustained rapid post-civil war growth: GDP grew by an annual average of 8.4% from 1993, at the end of the war, through 2015. In 2016, however, growth fell to 3.8% from 6.6% in 2015, and in 2018 has slumped further, to 3.3%. The IMF has attributed this decline to weak global commodity prices, poor weather conditions, and \"the issue of undisclosed loans in the spring of 2016 and the ensuing freeze in donor support.\" The RENAMO-government conflict also may have contributed to the slowdown, and the effects of the two cyclones in 2019 may further reduce growth in the short to medium term. While Mozambique's long period of post-civil war growth reduced extreme poverty, poverty rates generally remain high. In 1996, shortly after the war, 83% of the population lived on less than $1.90 a day (the international comparative poverty line, as measured in constant 2011 dollars); by 2014 (when last measured) 62.4% did so. Mozambicans have remained among the world's poorest people, with an estimated average GDP per capita of $476 in 2018 (current dollars)âthe seventh-lowest globally, and down from a peak of $620 in 2014. In addition, income is unequally distributed. Similarly, while multiple social indicators have improved since the war (e.g., rates of child and maternal mortality and access to health care and education), they have advanced from a low starting point, and many remain poor by regional and global standards. Mozambique ranked 180 th among 189 countries assessed on the 2018 U.N. Human Development Index (HDI, a comparative statistical composite measure), and is making limited progress toward achieving most of the U.N. Sustainable Development Goals. Development gains may have remained limited due to a growth pattern in which FDI inflows have centered on large export-oriented industrial projects (e.g., bauxite smelting, power plants, mining, large-scale agriculture, and, recently, natural gas development). While such projects have helped spur high aggregate GDP growth rates, they often have functioned as commercial enclaves with weak linkages to the broader economy. Many such projects have generated relatively few permanent jobs or other benefits for the general population, and some have enjoyed state policy favoritism and tax breaks that tend to benefit project investors, rather than society at large. Financial gains from such activities have strongly favored politically connected elites involved in such projects as investor intermediaries, technical experts, regulators, and local business partners. Some megaprojects, such as large mines, have resulted in loss of farmland and population displacements, sometimes to marginal areas where subsistence farming is difficult. Some large projects, however, may be starting to benefit the broader society, as with extractive sector investment in multiuse infrastructure (e.g., roads and railways). The disjuncture between the local economy and megaproject activity is significant. Most Mozambicans, an estimated 86% or more of the work force, make their living in the informal sector, often as subsistence and cash crop farmers, fishermen, and small-scale manufacturers and traders. Productivity within this large segment of the economy, however, is constrained by little access to credit, business training, or technical expertise. Youth unemployment is a particular challenge. Nearly 68% of Mozambicans are age 25 or younger, and many young people from rural areas, home to 65% of the population in 2017, often gravitate toward cities, where job growth has not kept up with increasing education and training ratesâeven though these are low. Mozambique's socioeconomic development gains have remained moderate, despite sizable inflows of net official development assistance (ODA). Such aid averaged $1.96 billion annually from 2008 through 2017, making the country the 15 th -largest recipient globally in the period, during which the United States provided an average of $367 million annually (19% of net ODA) and was the largest bilateral donor. Despite some improvements in the ease of doing business, the economy remains constrained by high transaction costs and taxes, cumbersome regulations and laws, poor transport and other infrastructure, and corruption (see below). Mozambique scored 16 th out of 48 sub-Saharan African countries assessed in the World Bank Doing Business 2019 survey score, but it scored 135 th out of 190 countries globally. Its indicators for starting a business, access to credit, certain investor protections, and tax payment complexity were notably poor. Recent FDI activity has centered on the growing coal sector and natural gas development (see below). FDI peaked at $6.2 billion in 2013 but has since declined steadily, to $2.3 billion in 2017 (latest data), though levels remain far higher than prior to the discovery of gas. Mozambique is a top regional FDI destination; it received the sixth-largest FDI inflows in Africa in 2017. Its total FDI stock is also large; at $37.5 billion in 2017, it was the fourth-largest in Africa. Annual U.S. FDI into Mozambique from 2013 to 2017 averaged $824 million a year (18% of such FDI). Agriculture. Agriculture is the backbone of the domestic economy and plays an indirect role in ensuring stability, as a source both of incomes and affordable food for urban consumers. Mozambique has extensive agricultural land and water resources and favorable agro-climatic conditions in many areas, though soil quality is often nutrient-poor, and droughts and floods are frequent. In 2017, the sector employed an estimated 72% of the labor force and contributed about 21% of GDP. The sector is dominated by smallholders (about 90% of producers) but has attracted more than 400 large commercial investment projects over the past two decades. Such projects have centered on food production, sugar, tobacco, cotton, cashew nuts, biofuels, and timber, and attracted at least $6.5 billion in investment between 2002 and 2012. The sector, and notably agro-processing, remains a key source of FDI opportunities. Notwithstanding agriculture's prominence in the economy and in state economic plans, for years the sector has reportedly received relatively limited state funding. Key challenges include low productivity rates and diverse constraints (e.g., relating to transport, input and credit access, and underinvestment in various areas), and contested land rights. The impacts of large FDI agro-projects have been mixed. Some have been given preferential access to prime land by the state and/or displaced smallholders, but a number have created jobs, often via smallholder contract farming involving the provision of technical assistance and inputs. Many also contribute to the national food supply; farming projects targeting local markets have enjoyed particular success. Mining . Mozambique is reported to have up to 25.6 billion tons of coal reserves, although the amount that may be recovered on economically favorable terms may be far smaller. Production and exports began in 2010 and have risen rapidly, notwithstanding a price-induced slump in coal export volumes in 2016. Mozambique is now Africa's second-largest coal producer (after South Africa). Coal exports contributed 45% of all export value in 2017 and are expected to rise. Mining of other resources is also growing. Exports of graphite (used in lithium ion batteries), titanium, and related ores (niobium and tantalum) are increasing: these exports contributed 4% of export value in 2017. Mozambique has long exported precious stones (3% of exports in 2017) and has other varied, largely untapped mineral and ore reserves. Power Sector . About 27% of Mozambicans had access to electricity in 2017. The power sector is a key focus of FDI and state investment, both for export and local use. Hydropower accounts for about 81% of installed capacity, but there are several coal, natural gas, and solar electricity generation projects underway, primarily for industrial and commercial use, and sizable further generation potential. Key challenges include grid weaknesses, regional domestic access disparities, poverty (i.e., an inability to pay), and regulatory and policy challenges (e.g., a need for price, market, and sector financing reforms). In 2017, the World Bank provided $150 million to upgrade the grid and improve the public utility. Mozambique also receives support under the U.S. Agency for International Development (USAID) Power Africa program. Natural Gas . Mozambique is estimated to have at least 100 trillion cubic feet (TCF) of proved reserves of natural gas (hereinafter, \"gas\"), placing it among the top 15 countries in terms of reserves. Some sources report far higher estimates, and further exploration and assessment is underway. Energy firms are building gas extraction and processing infrastructure to export output from the main reserves, which were discovered beginning in 2010 in a complex of offshore gas fields in the Rovuma Basin, a geologic zone in Mozambique's far north. Such activity is expected to grow; the IMF has projected that total Rovuma Basin investments may exceed $100 billion. U.S.-based Anadarko Petroleum leads one international consortium developing the Rovuma reserves, with production slated to begin in 2024. U.S.-based ExxonMobil leads development of a second area in partnership with Italy's ENI and several smaller energy firms. An ENI-operated offshore floating liquefied gas processing and export platform is expected to produce Mozambique's first Rovuma exports in 2022. Additional offshore blocks are also being explored. Gas exports are expected to greatly expand public revenuesâafter the state's share of capital development costs are paid offâand fuel rapid GDP growth. The IMF projects a gas-linked spike in GDP growth from 4% in 2022 to 11.1% in 2024. Gas is also forecast to be used domestically in a variety of industries. Since 2004, gas has been exported via a pipeline to South Africa from two smaller onshore gas fields in central Mozambique. The pipeline also feeds a power plant in Mozambique. Beginning in 2013, the government guaranteed a series of allegedly corrupt, off-budget bank loans to state-owned enterprises (SOEs) totaling more than $2 billion. It did not report this debt to the IMF until 2016, well after the loans were revealed in the press. This failure to report violated its obligations to the IMF and created an ongoing scandal that led some donors to suspend some aid. The funds at issue, loans or securities syndicated by foreign private banks, went to three SOEs owned by the State Information and Security Service (SISE), the Defense Ministry, and other state agencies. The SOEs' affairs could be kept confidential because technically they were private and because SISE classified their activities as secret on national security grounds. SISE ostensibly formed the SOEsâProIndicus, Mozambique Asset Management (MAM), and Empresa MoÃ§ambicana de Atum (Ematum)âto, respectively, perform coastal surveillance; build and maintain shipyards; and engage in tuna fishing. Ematum reportedly was also to be used as a channel for off-budget maritime security spending. The SOEs' business plans were based on dubious assumptions and the firms pursued few of their ostensible intended purposes. None turned a profit and all entered credit default, saddling the state with repayment. In late 2018, the U.S. Department of Justice (DOJ) indicted three Mozambican officials, an executive of Privinvest, a foreign shipbuilding firm, and foreign investment bankers whom DOJ accused of a joint conspiracy \"to defraud investors and potential investors\" in relation to the SOEs' loans. DOJ said the indictees \"created the maritime projects\" to divert parts of the financing to \"pay at least $200 million in bribes and kickbacks to themselves,\" state officials, and others. The loans at issue were provided by Russian state-owned VTB Bank and multinational investment bank Credit Suisseâand/or syndicated as securities sold by the latter. Indictees include then-Finance Minister Manuel Chang, a SISE official, and a representative of the office of then-President Guebuza. They collaborated with two Privinvest officials and three Credit Suisse employees, all indictees in the case. No employees of VTB Bank were charged. DOJ also charged that \"to hide from the public and the IMF\" the fraud-related \"near bankruptcy\" of the SOEs, the indicted bankers proposed an exchange of Mozambican-issued Eurobonds for Credit Suisse securities sold to fund the Ematum loan. The state and Ematum's investors accepted the exchange in April 2016. The three SOEs then defaulted on their loans. After the debts were revealed, the government resisted disclosing further information about the loans, but was forced to do so as a condition for continuing cooperation with IMF, which has publicly linked the loans to corruption. The IMF and the World Bank demanded an audit, which the independent firm Kroll Associates conducted on behalf of Mozambique's national prosecutor. The government restricted Kroll's access to documents, but the firm was able to identify $713 million in apparent deal price inflation and $500 million in unaccounted-for financing. Mozambique's parliament also investigated the loans, and national judicial authorities are pursuing criminal prosecutions, although local civil society groups have criticized these efforts as slow and selective. Local arrests in the case, including a son of ex-President Guebuza, SISE officials, and other high-profile figures, began only after the U.S. indictment was issued. In late 2018, Chang was arrested in South Africa on a U.S. extradition warrant, but South African officials instead accepted an extradition request from Mozambique. In late May 2019, the government and its creditors provisionally agreed to restructure the Ematum Eurobond bonds and $535 million in VTB MAM debts, though further negotiation is likely. The case has generated multiple lawsuits, including a government effort to negate portions of the debt. Two of the indicted bankers have pled guilty to various charges. More legal and financial fallout is possible, particularly if the government of President Nyusiâthe defense minister when the loans were signedâdoes not effectively ensure that those responsible are held to account, or if indictees in the case reveal new information or other cases of corruption. Meanwhile, local and international civil society groups are advocating nonpayment of the debt and asserting that the debt is \"odious,\" or morally and legally illegitimate, and thus subject to repudiation. On June 4, the Mozambique Constitutional Council ruled that the Ematum debt was illegal, but the implications are unclear. The debt scandal is the highest-profile instance of corruption, but it is not unique. Corruption, both small- and large-scale, is \"endemic ... particularly in the police, judiciary and civil service,\" but corruption prosecutions, especially of officials, are rare. The country ranked 158 out of 180 countries on Transparency International's Corruption Perceptions Index 2018 , and its World Bank Worldwide Governance Indicators (WGI) rankings also have declined. While the IMF reports that Mozambique has a \"relatively comprehensive anti-corruption legislative framework,\" the institutional capacity to implement the framework has remained weak, as has judicial accountability. Heavy state involvement in multiple economic sectors, and nontransparency in state processes, contracting, and outcomes, the IMF reports, also create opportunities for corruption and conflicts of interest, notably in the extractive sector. A nexus also reportedly exists between public corruption, organized crime, and large black markets in goods. Drug trafficking has been reported to fund political party activity, and corruption may be tied to some political killings. The analytical nonprofit Global Financial Integrity (GFI) reports that illicit financial outflows (i.e., business bribery, tax evasion, money laundering, and trade and transfer mispricing/misinvoicing) may have contributed as much as 48% of the country's trade with advanced economies in 2015. According to the State Department, \"[f]inancial fraud, especially tax evasion, and drug trafficking,\" alongside \"misappropriation of state funds, kidnappings, human trafficking ... and wildlife trafficking,\" generate a large share of money laundering. Trafficking is facilitated by a \"largely unpatrolled coastline, porous land borders, and a limited rural law enforcement presence,\" making the country a major corridor for flows of illicit goods. Drug trafficking is a notable challenge. Mozambique has long been and remains a transit point for illicit trafficking of heroin (mostly from South Asia, notably Pakistan, via sea), cocaine (from South America, via air), and precursor chemicals. Most narcotics are reportedly bound for South Africa and other countries in the region, but some transit onward to Europe and North America. The heroin trade is especially well developed. The volume trafficked through the country may total 40 tonnes or more a year and contribute $100 million or more to the local economy. Given the weakness of fiscal and anticorruption institutions, some observers have questioned whether the state has the political will and ability to effectively govern the large expected influx of gas revenue. The government has taken some steps to address such challenges. For instance, in 2009, Mozambique joined the Extractive Industries Transparency Initiative (EITI), a voluntary international effort to make extractive industry revenue contracts and revenue payment and receipt data publicly accessible, and to increase related fiscal accountability. The government plans to require beneficial ownership and business interest transparency, to establish a sovereign wealth fund to preserve and manage gas income, and to allocate a fixed share of gas revenue to fund infrastructure development, poverty reduction, and economic diversification. Bilateral relations are cordial, although the United States has expressed concern over the hidden debts affairâa concern underlined by the late 2018 U.S. DOJ indictment of several high-ranking Mozambican officials in the matter. Stated U.S. policy goals in Mozambique include democratic, transparent, and inclusive governance; enhanced health and education; sustainable economic growth, trade, poverty reduction, and investment; and food security and access to nutrition. U.S. aid programs also have sought to strengthen Mozambique's ability to respond to transnational crime, including trafficking in persons, narcotics, and wildlife. Efforts to counter the growing extremist threat in an area that hosts large U.S. natural gas industrial operations are another growing priority. The United States also is the leading bilateral donor in international efforts to address humanitarian and rebuilding needs caused by widespread destruction in central and northern areas hit by massive cyclones in early 2019. The State Department projects that cyclone recovery may require billions of dollars in the years ahead. The United States also supports efforts to reach a durable settlement between RENAMO and the government. It is a member of the ad hoc international contact group on Mozambique, which helps mediate between the two parties and includes the European Union, China, Botswana, the UK, Norway, and Switzerland (the group's chair). The United States also planned to deploy military observers to join a team that was to monitor implementation of the 2014 cease-fire, but never did, as the accord fell apart due to RENAMO's refusal to disarm. Cooperative bilateral ties were reflected in a five-year, $506.9 million Millennium Challenge Corporation compact signed in 2007 and completed in 2013. The compact supported increased access to clean water and sanitation, transportation upgrades, land tenure improvements, and increased farmer income and production, primarily in northern Mozambique. In addition, a 196-volunteer member Peace Corps program supports education and health care projects. According to the FY2020 State Department budget request for Mozambique, U.S. bilateral aid seeks to address key drivers of instability in northern Mozambique, including ineffective local governance and government service delivery, and a pervasive lack of jobs, especially for youth. Assistance will help local institutions to transparently and effectively address citizens' basic needs; support the government in providing high quality basic education services; and catalyze private sector investment to help the large youth population develop workforce skills essential to participate in emerging economic opportunities. U.S. nonemergency bilateral development aid totaled nearly $472 million in FY2018 appropriations. Of this, $428 million was for health programs, nearly $40 million for development activities, $0.7 million for International Military Education and Training (IMET), and $3.6 million for food aid. The Trump Administration requested $251.7 million in development aid for Mozambique for FY2019, of which it proposed to allocate 97% to health programs. While Congress has enacted FY2019 foreign aid appropriations, country allocationsâwhich the Administration and appropriators negotiate annuallyâhave not yet been finalized. The FY2020 request is for $403.5 million, of which health aid would compose 98.5% ($397.5 million), with $5.6 million for other development activities and $0.5 million for IMET. Health care programs have been the main focus of U.S. aid programs for years. The bulk of funding has supported HIV/AIDS programming to address Mozambique's high adult HIV prevalence rate of 12.5% (2017). Most of this aid has been funded under the Global Health Program (GHP)-State Department account and administered under the U.S. President's Emergency Plan for AIDS Relief (PEPFAR). Additional GHP-USAID funds support programs to combat malariaâthe cause of roughly 29% of all deaths and 42% of deaths of children under the age of fiveâunder the President's Malaria Initiative. Such funds also support programs to combat tuberculosis and enhance maternal and child health, family planning and reproductive health, and nutrition. Until FY2017, agricultural development, mostly under the U.S. Feed the Future (FTF) initiative, was another priority area for U.S. aid. FTF activities have focused on enhancing agricultural productivity, improving nutrition, and connecting farmers to markets, notably in north-central Mozambique in areas with poor nutrition that contain or are near key trade corridors. Basic education was a key priority in FY2018, with funding at $13.7 million, but requested funding for education decreased to $3.5 million in FY2019 and $3 million in FY2020. Aid has also supported good governance programs, with a focus on building the capacity of civil society groups to engage in policy analysis and advocacy. Mozambique periodically receives some U.S. Fish and Wildlife Service funding, and USAID supports a range of wildlife law enforcement capacity building, conservation, and CBNRM programs. In recent years, USAID has also supported coastal urban city governments' adaptation to rising sea levels and regional conservation and management, as in the Limpopo River Basin. Wildlife-centered programs aim to address widespread wildlife poaching, wildlife traffickingâboth of wildlife from Mozambique and that trafficked through Mozambique to and from other countriesâand the recovery of wildlife populations that in some areas were systematically depleted by hunting during the civil war. In addition to being a key ivory source country, Mozambique is a key regional wildlife trafficking transit country, notably of elephant ivory and rhino horn destined for Asia. Other key species, including lions and other big cats, are also systematically poached in Mozambique. According to the State Department, Mozambique's government lacks adequate capacity to deal with the \"complexity of violent extremism.\" The department is helping the government to develop a comprehensive counterextremism approach, including a \"holistic security, community engagement, and communications approach ... to address governance and development issues\" while also helping to build the capabilities of Mozambican security forces. Together with other donor governments, the State Department is working to help foster those outcomes and increase U.S. counterextremism program assistance. U.S. government interagency teams and experts have consulted in Mozambique with state, civil society, academic, and private-sector actors to better understand the drivers of violent extremism and unmet socioeconomic needs and grievances that may underlie the phenomenon. They have also compiled an \"extensive list of recommended interventions\" aimed at countering the growth of extremism and addressing unmet needs. The State Department nevertheless reports that \"there are still significant gaps in our understanding of the violent extremism affecting northern Mozambique ... [including] the extent of the groups, their motivations, objectives and funding sources.\" It plans to adjust the U.S. strategy as knowledge increases. According to State Department Southern African Affairs Director Stefanie Amadeo, some recommended activities are underway, including [a] grant program to promote constructive dialogue between local residents and youth, religious leaders, and security forces in Cabo Delgado province through the Islamic Council; a baseline assessment and strategic communications program to assist key stakeholders with more effective youth messaging and outreach; the provision of U.S. logistics and communications advisors to support the Mozambican government's efforts; and programs to build the capacity of civilian law enforcement to engage with affected communities and investigate suspected acts of terrorism. USAID is also funding a $2 million program centered on mitigating drivers of instability and violent extremism in Cabo Delgado through efforts to increase youth economic and civic empowerment, foster constructive community-local government engagement, and build local governments' capacity to address community and youth priorities. In addition, in mid-2018, Mozambique became a Partnership for Regional East Africa Counterterrorism (PREACT) country. PREACT activities have yet to be determined, but may include funding for law enforcement, justice, military, and civil society programs. PREACT is a multiyear, multisector initiative that supports a range of counterextremism programs and efforts to contain and/or disrupt terrorist networks. Programs range from vocational and educational efforts to counter extremist messaging and economic inducements to law enforcement, military, and specialized counterterrorism unit training and capacity-building to intelligence, surveillance, and reconnaissance equipment and technical assistance. International narcotics smuggling through Mozambique is a long-standing U.S. concern. In 2017, the Drug Enforcement Administration (DEA) opened an office in Maputo, and it is currently \"developing mechanisms to facilitate future information sharing on money laundering.\" These include a \"working relationship\" with Mozambique's attorney general and National Criminal Investigations Service (SERNIC), the lead antidrug law enforcement agency, which in 2018 \"agreed to establish a joint DEA/SERNIC drug investigative unit to combat transnational organized crime.\" The State Department reports that while a range of weaknesses remain, the government has shown progress in enforcing anti-money-laundering (AML) laws and regulationsâincluding by investigating ties between heroin trafficking and official corruptionâand that efforts are underway to establish bilateral AML records-exchange procedures. In addition, Mozambique engages in military-to-military cooperation with the U.S. Defense Department's Africa Command (AFRICOM), and in early 2019 participated in Cutlass Express 2019, a multination naval exercise. A portion of the exercise focused on combatting illegal trafficking and maritime piracy, and the interception of illegal fishing vessels in Pemba and offshore waters near Mozambique's gas fields. Mozambique is eligible for trade benefits under the African Growth and Opportunity Act (AGOA, Title I, P.L. 106-200 , as amended), including textile benefits, but its AGOA exports are limited. They accounted for less than 1% of an average annual $123 million in total exports to the United States from 2014 through 2018. U.S. exports to the country averaged $231 million a year during the same period. To help the government increase firms' use of AGOA, USAID supported development of a Mozambique AGOA utilization strategy, released in May 2018. Mozambique hosted the U.S. Corporate Council on Africa's US-Africa Business Summit in June 2019, which was attended by a U.S. high-level delegation. The U.S. Commercial Service has recently expanded its presence in Mozambique, in part due to rising U.S. investment in the energy sector. Mozambique may enjoy substantial economic growth after expected gas exports begin in the mid-2020s, and as coal exports rise, but the government may face significant challenges in effectively using those resources for the benefit of its people. A range of governance challengesâincluding corruption, state institutional weaknesses, and an untested new system of political decentralizationâmay continue to hinder socioeconomic development. The still-incomplete peace process between RENAMO and the government also poses a risk to stability, as does the geographically limited but extremely brutal extremist violence in the north. The United States is providing assistance to help the country address these challenges, in addition to continuing to provide significant amounts of assistance for the health sector. If recent-year aid allocation trends are maintained, such cooperation is likely to persist in the coming years.", "summary": "Mozambique, a significant recipient of U.S. development assistance, is a southeastern African country nearly twice the size of California, with a population of 27.9 million people. It achieved rapid growth following a postindependence civil war (1977-1992), but faces a range of political, economic, and security challenges. These include a political scandal over state-guaranteed, allegedly corrupt bank loans received by state-owned firms, which created public debt that the government did not disclose to the International Monetary Fund (IMF). This placed the country's relations with the IMF at risk and has had major negative repercussions for the economy, donor relations, and Mozambique's governance record. Other challenges include unmet development needs, a range of governance shortcomings, organized crime, an ongoing economic slump, and political conflict and violence involving both mainstream political actors and violent extremists. Mozambique is also recovering from two powerful cyclones that hit the country in March and April 2019 (addressed in CRS Report R45683, Cyclones Idai and Kenneth in Southeastern Africa: Humanitarian and Recovery Response in Brief ). Between 2013 and 2016, the country experienced political violence arising from a dispute between the former socialist majority party, FRELIMO, and the leading opposition political party, RENAMO. (The latter is a former armed rebel group that fought the FRELIMO government during the civil war.) Their recent dispute, prompted by years of varied RENAMO grievances linked to FRELIMO's control of the state, led to numerous armed clashes between government and RENAMO forces. In 2019, the two parties signed a permanent cease-fire and a final political and military accord to end their dispute, but they have yet to fully implement those agreements, and the potential for failure remains. Since late 2017, Mozambique also has faced attacks by a violent Islamist extremist group that is active along its far northern coast. The groupâknown as Al Sunnah wa Jama'ah (ASWJ), among other namesâhas killed hundreds, often via beheading. The loan scandal has had far-reaching consequences: It has spurred local and U.S. criminal prosecutions, led some donor governments to suspend aid, undermined the state's credibility, and placed the country in debt distress, reducing its access to credit financing needed to help fund development and government operations. The scandal also is widely seen as contributing to a post-2015 slump in economic growth, which had been rapid for most of the post-civil war period. While that growth expanded the economy and contributed to a decline in extreme poverty, the majority of Mozambicans have remained poor, and while some socioeconomic indicators have improved, the country faces a range of persistent socioeconomic challenges. Development gains have remained limited despite large inflows of foreign assistance and foreign direct investment (FDI). Much of this FDI has financed large industrial projects, many of which have been criticized for being poorly integrated with the broader domestic economyâin which the informal sector and small-scale economic activity prevailâand for generating relatively few jobs or broad reductions in poverty. Mozambique's future may be transformed by the development of large natural gas reserves, discovered in the county's north in 2010. Gas exports are expected to begin in the early to mid-2020s and, together with rising exports of coal, to spur rapid economic growth. The U.S.-based firms Anadarko and ExxonMobil, the latter in partnership with Italy's ENI energy firm, lead international oil company consortia developing the reserves, although a merger involving Anadarko is likely to result in the sale of its Mozambique assets to France's Total SA. While the state may face challenges in effectively governing and managing the large anticipated influx of gas revenue, it has taken some steps to address such challenges. The government plans to establish a sovereign wealth fund to preserve gas income, which it intends to allocate, in part, to infrastructure development, poverty reduction, and economic diversification. U.S.-Mozambican ties are cordial and historically have centered on development cooperation. U.S. assistance, funded at an annual average of $452 million between FY2016 and FY2018, has focused primarily on health programs. Given recent events, U.S. engagement and aid may increasingly focus on the development of economic ties and security cooperation, notably to counter ASWJ, which is active in the area where large-scale gas processing development is underway. For many years, Mozambique received relatively limited congressional attention, but interest in the country may be growing; the country hosted congressional delegations in 2016 and 2018. U.S. humanitarian responses to the recent cyclones have also drawn congressional engagement. Developments in the countryâincluding the rise of violent extremism and prospects for U.S. private-sector investment and U.S. bilateral aid program outcomes in a context in which state corruption poses substantial challengesâcould attract increasing congressional attention in the coming years.", "document_type": "crs"}
{"report": "The Small Business Administration (SBA) administers programs to support small businesses, including several loan guaranty programs designed to encourage lenders to provide loans to small businesses \"that might not otherwise obtain financing on reasonable terms and conditions.\" The SBA's 504 Certified Development Company (504/CDC) loan guaranty program provides long-term fixed rate financing for major fixed assets, such as land, buildings, equipment, and machinery. Its name is derived from Section 504 of the Small Business Investment Act of 1958 (P.L. 85-699, as amended), which provides the most recent authorization in the act concerning the SBA's monthly sale of 20-year and 25-year 504/CDC debentures and bimonthly sale of 10-year 504/CDC debentures. The 504/CDC loan guaranty program is administered through nonprofit Certified Development Companies (CDCs). Of the total project costs, a third-party lender must provide at least 50% of the financing, the CDC provides up to 40% of the financing backed by a 100% SBA-guaranteed debenture, and the applicant provides at least 10% of the financing. The borrower makes two loan payments, one to the third-party lender and another to the CDC. The third-party loan, typically provided by a bank, can have a fixed or variable interest rate, is negotiated between the lender and the borrower, is subject to an interest rate cap, and must have at least a 7-year term for a 10-year debenture and at least 10-year term for a 20- or 25-year debenture. The CDC loan has a fixed interest rate that is determined when the SBA sells the debenture to fund the loan. The CDC loan's term is either 10 years (typically for machinery or equipment) or 20 years or 25 years (typically for real estate). The SBA's debenture is backed by the full faith and credit of the United States and is sold to underwriters that form debenture pools. Investors purchase interests in the debenture pools and receive Development Company Participation certificates (DCPC) representing ownership of all or part of the pool. DCPCs have a minimum value of $25,000 and can be sold on the secondary market. The SBA and CDCs use various agents to facilitate the sale and service of the certificates and the orderly flow of funds among the parties. After a 504/CDC loan is approved and disbursed, accounting for the loan is set up at the Central Servicing Agent (CSA, currently PricewaterhouseCoopers Public Sector LLP), not the SBA. The SBA guarantees the timely payment of the debenture. If the small business is behind in its loan payments, the SBA pays the difference to the investor on every semiannual due date. In FY2018, the SBA approved 5,874 504/CDC loans amounting to nearly $4.8 billion. At the end of FY2018, there were 56,601 504/CDC loans with an unpaid principal balance of about $25.8 billion. Historically, one of the justifications presented for funding the SBA's loan guaranty programs has been that small businesses can be at a disadvantage, compared with other businesses, when trying to obtain access to sufficient capital and credit. Congressional interest in small business access to capital, in general, and the 504/CDC program, in particular, has increased in recent years because of concern that small businesses might be prevented from accessing sufficient capital to enable them to grow and create jobs. Congress authorized several changes to the 504/CDC program during the 111 th Congress in an effort to increase the number and amount of 504/CDC loans. For example P.L. 111-5 , the American Recovery and Reinvestment Act of 2009 (ARRA), provided $375 million to temporarily reduce fees in the SBA's 7(a) and 504/CDC loan guaranty programs ($299 million) and to temporarily increase the 7(a) program's maximum loan guaranty percentage to 90% ($76 million). Congress subsequently appropriated another $265 million and authorized the SBA to reprogram another $40 million to extend those subsidies and the loan modification through May 31, 2010. ARRA also authorized the SBA to allow, under specified circumstances, the use of 504/CDC program funds to refinance existing debt for business expansion. P.L. 111-240 , the Small Business Jobs Act of 2010, increased the 504/CDC program's loan guaranty limits from $1.5 million to $5 million for \"regular\" borrowers, from $2 million to $5 million if the loan proceeds are directed toward one or more specified public policy goals, and from $4 million to $5.5 million for manufacturers. The act also temporarily expanded for two years after the date of enactment (or until September 27, 2012) the types of projects eligible for refinancing of existing debt under the 504/CDC program; provided $505 million (plus an additional $5 million for administrative expenses) to continue fee subsidies for the 7(a) loan guaranty program and the 504/CDC program through December 31, 2010; and established an alternative size standard that allows more companies to qualify for 504/CDC assistance. P.L. 111-322 , the Continuing Appropriations and Surface Transportation Extensions Act, 2011, authorized the SBA to continue the fee subsidies and the 7(a) program's 90% maximum loan guaranty percentage through March 4, 2011, or until funding provided for these purposes in P.L. 111-240 was exhausted (which occurred on January 3, 2011). During the 114 th Congress, P.L. 114-113 , the Consolidated Appropriations Act, 2016, reinstated the expansion of the types of projects eligible for refinancing under the 504/CDC loan guaranty program in any fiscal year in which the refinancing program and the 504/CDC program as a whole do not have credit subsidy costs. The act requires each CDC to limit its refinancing so that, during any fiscal year, the new refinancings do not exceed 50% of the dollars it loaned under the 504/CDC program during the previous fiscal year. This limitation may be waived if the SBA determines that the refinance loan is needed for good cause. An interim final rule implementing the new refinancing program was issued by the SBA on May 25, 2016, effective June 24, 2016. During the 115 th Congress, P.L. 115-371 , the Small Business Access to Capital and Efficiency (ACE) Act, amended the Small Business Investment Act of 1958 to increase the threshold amount for determining when a CDC is required to secure an independent real estate appraisal for a 504/CDC loan (from if the estimated value of the project property is greater than $250,000 to if the estimated value of the project property is greater than the federal banking regulator appraisal threshold, which was increased from $250,000 to $500,000 in 2018). In addition, the Trump Administration proposed in its FY2020 budget request that the maximum dollar amount for a 504 loan to a small manufacturer be increased to $6.5 million from $5.5 million. This report opens with a discussion of the rationale for the 504/CDC program and then examines the program's borrower and lender eligibility standards; program requirements; and program statistics, including loan volume, loss rates, proceeds usage, borrower satisfaction, and borrower demographics. Next, it surveys congressional action taken during recent Congresses to enhance small business access to capital, including ARRA, P.L. 111-240 , P.L. 114-113 , and P.L. 115-371 . This report also discusses issues raised concerning the SBA's administration of the program, including the oversight of 504/CDC lenders. As shown in Table 1 , 504/CDC projects generally have three main participants: a third-party lender provides 50% or more of the financing; a CDC provides up to 40% of the financing through a 504/CDC debenture, which is 100% guaranteed by the SBA; and the borrower contributes at least 10% of the financing. The CDC's contribution, and the amount of the SBA's 100% guaranteed debenture, generally cannot exceed 40% of the financing for standard 504/CDC loans. It cannot exceed 35% of the financing for new businesses (defined as \"a business that is two years old or less at the time the loan is approved\") or if the loan is for either a limited-market property (defined as \"a property with a unique physical design, special construction materials, or a layout that restricts its utility to the use for which it is designed\") or a special purpose property. The SBA lists 27 limited and special purpose properties (e.g., dormitories, golf courses, hospitals, and bowling alleys). The CDC's contribution cannot exceed 30% of the financing when the borrower is a new business and the loan is for either a limited-market property or a special purpose property. Borrowers must contribute at least 10% of the financing for standard 504/CDC loans and at least 15% of the financing if the borrower is a new business or if the loan is for a limited-market property or a special purpose property. They must contribute at least 20% of the financing if the borrower is a new business and the loan is for either a limited-market property or a special purpose property. To be eligible for a SBA business loan, a small business applicant must be located in the United States; be a for-profit operating business (except for loans to eligible passive companies); qualify as small; demonstrate a need for the desired credit and that the funds are not available from alternative sources, including personal resources of the principals; and be certified by a lender that the desired credit is unavailable to the applicant on reasonable terms and conditions from nonfederal sources without SBA assistance. Several types of businesses are prohibited from participating in the program. For example, financial businesses primarily engaged in the business of lending, such as banks and finance companies; life insurance companies; businesses located in a foreign country; businesses deriving more than one-third of their gross annual revenue from legal gambling activities; businesses that present live performances of a prurient sexual nature; and businesses with an associate who is incarcerated, on probation, on parole, or has been indicted for a felony or a crime of moral turpitude are ineligible. To qualify for a SBA business loan, applicants must be creditworthy and able to reasonably assure repayment. The SBA requires lenders to consider the applicant's character, reputation, and credit history; experience and depth of management; strength of the business; past earnings, projected cash flow, and future prospects; ability to repay the loan with earnings from the business; sufficient invested equity to operate on a sound financial basis; potential for long-term success; nature and value of collateral (although inadequate collateral will not be the sole reason for denial of a loan request); and affiliates' effect on the applicant's repayment ability. A 504/CDC loan can be used to purchase land and make necessary improvements to the land, such as adding streets, curbs, gutters, parking lots, utilities, and landscaping; purchase buildings and make improvements to the buildings, such as altering the building's facade and updating its heating and electrical systems, plumbing, and roofing; purchase, transport, dismantle, or install machinery and equipment, provided the machinery and equipment have a useful life of at least 10 years; purchase essential furniture and fixtures; pay professional fees that are directly attributable and essential to the project, such as title insurance, title searches and abstract costs, surveys, and zoning matters; finance short-term debt ( bridge financing ) for eligible expenses that are directly attributable to the project and the financing term is three years or less; pay interim financing costs, including points, fees, and interest; create a contingency fund, provided the fund does not exceed 10% of the project's construction costs; finance \"do-it-yourself\" construction expenses, including renovations and the installation of machinery and equipment; and finance permissible debt refinancing with or without business expansion. A 504/CDC loan cannot be used for working capital or inventory. All 504/CDC borrowers must meet at least one of two specified economic development objectives. First, borrowers, other than small manufacturers, must create or retain at least one job for every $75,000 of project debenture within two years of project completion. Borrowers who are small manufacturers (defined as a small business with its primary North American Industry Classification System Code in Sectors 31, 32, and 33 and all of its production facilities located in the United States) must create or retain at least one job per $120,000 of project debenture within two years of project completion. Borrowers enter the number of jobs to be created or retained as a result of the project in their application for funds and the CDC verifies that the project meets the job creation or retention requirements. The jobs created do not have to be at the project facility, but 75% of the jobs must be created in the community in which the project is located. Using job retention to satisfy this requirement is allowed only if the CDC \"can reasonably show that jobs would be lost to the community if the project was not done.\" If the borrower does not meet the job creation or retention requirement, the borrower can retain eligibility by meeting (1) any 1 of 5 community development goals, (2) any 1 of 10 public policy goals, or (3) any 1 of 3 energy reduction goals, provided that the CDC's overall portfolio of outstanding debentures meets or exceeds the job creation or retention criteria of at least 1 job opportunity created or retained for every $75,000 in project debenture (or for every $85,000 in project debenture for projects located in special geographic areas such as Alaska, Hawaii, state-designated enterprise zones, empowerment zones, enterprise communities, labor surplus areas, or opportunity zones). Loans to small manufacturers are excluded from the calculation of this average. The five community development goals are improving, diversifying, or stabilizing the economy of the locality; stimulating other business development; bringing new income into the community; assisting manufacturing firms; or assisting businesses in labor surplus areas as defined by the U.S. Department of Labor. The 10 public policy goals are revitalizing a business district of a community with a written revitalization or redevelopment plan; expanding exports; expanding the development of women-owned and -controlled small businesses; expanding small businesses owned and controlled by veterans (especially service-disabled veterans); expanding minority enterprise development; aiding rural development; increasing productivity and competitiveness (e.g., retooling, robotics, modernization, and competition with imports); modernizing or upgrading facilities to meet health, safety, and environmental requirements; assisting businesses in or moving to areas affected by federal budget reductions, including base closings, either because of the loss of federal contracts or the reduction in revenues in the area due to a decreased federal presence; or reducing unemployment rates in labor surplus areas, as defined by the U.S. Department of Labor. The three energy reduction goals are reducing existing energy consumption by at least 10%; increasing the use of sustainable designs, including designs that reduce the use of greenhouse gas-emitting fossil fuels or low-impact design to produce buildings that reduce the use of nonrenewable resources and minimize environmental impact; or upgrading plant, equipment, and processes involving renewable energy sources such as the small-scale production of energy for individual buildings' or communities' consumption, commonly known as micropower, or renewable fuel producers including biodiesel and ethanol producers. If the project cannot meet any of these guidelines, then the debenture amount must be reduced to meet the job creation or retention requirement. The minimum 504/CDC debenture is $25,000. P.L. 111-240 increased the maximum gross debenture amount from $1.5 million to $5 million for regular 504/CDC loans; from $2 million to $5 million if the loan proceeds are directed toward one or more of the public policy goals described above; from $4 million to $5.5 million for small manufacturers; from $4 million to $5.5 million for projects that reduce the borrower's energy consumption by at least 10%; and from $4 million to $5.5 million for projects for plant, equipment, and process upgrades of renewable energy sources, such as the small-scale production of energy for individual buildings or communities consumption (commonly known as micropower), or renewable fuel producers, including biodiesel and ethanol producers. The SBA determines the 504/CDC program's loan terms and publishes them in the Federal Register . The current maturity for a 504/CDC loan is generally 20 or 25 years for real estate; 10 years for machinery and equipment; and 10, 20, or 25 years based upon a weighted average of the useful life of the assets being financed. The maturities for the first mortgage issued by the third-party lender must be at least 7 years when the CDC/504 loan is for a term of 10 years and at least 10 years when the loan is for 20 or 25 years. As mentioned previously, 504/CDC borrowers make two loan payments, one to the third-party lender and one to the CDC. The third-party loan can have a fixed or variable interest rate, is negotiated between the lender and the borrower, and is subject to an interest rate cap. The third-party loan's interest rate \"must be reasonable\" and the interest rate cap is published by the SBA in the Federal Register . The current maximum interest rate that a third-party lender is allowed to charge for a commercial loan that funds any portion of the cost of a 504/CDC project is 6% greater than the New York prime rate or the maximum interest rate permitted in that state, whichever is less. Borrowers have a general sense of what their 504/CDC loan's interest rate will be when their completed loan application is submitted to the SBA for approval. However, the loan's exact interest rate is not known until after it is pooled with other 504/CDC loan requests and sold to private investors (typically large institutional investors such as pension funds, insurance companies, and large banks). Investors receive interest on the debt, called a debenture, semi-annually. Borrowers make monthly payments. The 504/CDC loan's interest rate has several components: the debenture interest rate (i.e., the rate that determines interest paid semi-annually to investors who purchase the debenture), the note rate (i.e., the monthly-pay equivalent of the debenture rate, which is typically four to eight basis points higher than the debenture interest rate depending on the length of the loan's term), and the effective rate (i.e., the note rate and the cost impact of ongoing fees). Effective rates are provided to CDCs on a full-term basis and in 5-year increments. The debenture interest rate is based on comparable market conditions for long-term government debt at the time of sale and pegged to an increment above the current market rate. The SBA's fiscal agent, currently Eagle Compliance, LLC, reaches an agreement with the underwriters on the sale price of the debentures and, after reaching this agreement, must obtain approvals from the SBA and Treasury before proceeding. In May 2019, the 10-year 504/CDC debenture rate was 2.66%, the comparable Treasury market rate was 2.22%, the note rate was 2.76%, and the effective full-term interest rate was 4.69%. In May 2019, the 20-year 504/CDC debenture rate was 2.88%, the comparable Treasury market rate was 2.43%, the note rate was 2.93%, and the effective full-term interest rate was 4.69%. For 25-year 504/CDC debentures sold in May 2019, the debenture rate was 3.07%, the comparable Treasury market rate was 2.43%, the note rate was 3.11%, and the effective full-term interest rate was 4.97%. The SBA usually takes a second lien position on the project property to secure the loan. The SBA's second lien position is considered adequate when the applicant meets all of the following criteria: strong, consistent cash flow that is sufficient to cover the debt; demonstrated, proven management; the business has been in operation for more than two years; and the proposed project is a logical extension of the applicant's current operations. If one or more of the above factors is not met, additional collateral or increased equity contributions may be required. All collateral must be insured against such hazards and risks as the SBA may require, with provisions for notice to the SBA and the CDC in the event of impending lapse of coverage. However, for 504/CDC loans, the applicant's cash flow is the primary source of repayment, not the liquidation of collateral. Thus, \"if the lender's financial analysis demonstrates that the small business applicant lacks reasonable assurance of repayment in a timely manner from the cash flow of the business, the loan request must be declined, regardless of the collateral available or outside sources of cash.\" CDCs apply to the SBA for certification to participate in the 504/CDC program. A CDC must be a nonprofit corporation, and it must be in good standing in the state in which it is incorporated; be in compliance with all laws, including taxation requirements, in the state in which it is incorporated and any other state in which it conducts business; provide the SBA a copy of its IRS tax exempt status; indicate its area of operations, which is the state of the CDC's incorporation; and have a board of directors that fulfills specified requirements, such as having at least nine voting members, requiring a quorum of at least 50% of its voting membership to transact business, and meets at least quarterly. If approved by the SBA, newly certified CDCs are on probation for two years. At the end of this time, the CDC must petition for either permanent CDC status or a single, one-year extension of probation. To be considered for permanent CDC status or an extension of probation, the CDC must have satisfactory performance as determined by the SBA in its discretion. Examples of the factors that may be considered in determining satisfactory performance include the CDC's risk rating, on-site review and examination assessments, historical performance measures (like default rate, purchase rate, and loss rate), loan volume to the extent that it impacts performance measures, and other performance-related measurements and information (such as contribution toward SBA's mission). In FY2018, 194 CDCs provided at least one 504/CDC loan. The CDC's board of directors is allowed to establish a loan committee composed of members of the CDC who may or may not be on the CDC's board of directors. The loan committee reports to the board and must meet specified requirements, such as having at least two members with commercial lending experience satisfactory to the SBA, generally requiring all of its members to live or work in the area of operations of the state in which the 504/CDC project they are voting on is located, not allowing any CDC staff to serve on the loan committee, and requiring a quorum of at least five committee members authorized to vote to hold a meeting. In addition, multistate CDCs are required to have a separate loan committee \"for each state into which the CDC expands.\" The SBA also has a number of requirements concerning CDC staff, such as requiring CDCs to \"have qualified full-time professional staff to market, package, process, close and service loans\" and \"directly employ full-time professional management,\" typically including an executive director (or the equivalent) to manage daily operations. CDCs are also required to operate \"in accordance with all SBA loan program requirements\" and provide the SBA \"current and accurate information about all certification and operational requirements.\" CDCs with 504/CDC loan portfolio balances of $20 million or more are required to submit financial statements audited in accordance with generally accepted accounting principles (GAAP) by an independent certified public accountant (CPA). CDCs with 504/CDC loan portfolio balances of less than $20 million must, at a minimum, submit a review of their loan portfolio balances by an independent CPA or independent accountant in accordance with GAAP. The auditor's opinion must state that the financial statements are in conformity with GAAP. CDCs must analyze each application in a commercially reasonable manner, consistent with prudent lending standards. The CDC's analysis must include a financial analysis of the applicant's pro forma balance sheet. The pro forma balance sheet must reflect the loan proceeds, use of the loan proceeds, and any other adjustments such as required equity injection or standby debt; a financial analysis of repayment ability based on historical income statements, tax returns (if an existing business), and projections, including the reasonableness of the supporting assumptions; a ratio analysis of the financial statements including comments on any trends and a comparison with industry averages; a discussion of the owners' and managers' relevant experience in the type of business, as well as their personal credit histories; an analysis of collateral adequacy, including an evaluation of the collateral and lien position offered as well as the liquidation value; a discussion of the applicant's credit experience, including a review of business credit reports and any experience the CDC may have with the applicant; and other relevant information (e.g., if the application involves a franchise and the success of the franchise). CDCs submit this information, using required SBA forms, to the Sacramento, CA, loan processing center. In 1991, the SBA established the ALP on a pilot basis to provide CDCs that \"have developed a good partnership with their SBA field office in promoting local economic development and have demonstrated a good track record in the submission of documentation needed for making and servicing of sound loans\" an expedited process for approving loan applications and servicing actions. P.L. 103-403 , the Small Business Administration Reauthorization and Amendments Act of 1994, authorized the SBA to establish the ALP on a permanent basis. CDCs may apply to the SBA for ALP status. Selection is based on several factors, including the CDC's experience as a CDC, the number of 504/CDC loans approved, the size of the CDC's portfolio, its record of compliance with SBA loan program requirements, and its record of cooperation with all SBA offices. The SBA is able to process loan requests from ALP-CDCs more quickly than from regular CDCs because it relies on their credit analysis when making the decision to guarantee the debenture. About one-third of CDCs have ALP status (77 of 226) and they account for about 60% to 70% of all 504/CDC lending each year. P.L. 103-403 also authorized the SBA's Premier Certified Lenders Program (PCLP) on a pilot basis through October 1, 1997. The program's authorization was later extended through October 1, 2002, and given permanent statutory authorization by P.L. 106-554 , the Consolidated Appropriations Act, 2001 (§1: H.R. 5667 , the Small Business Reauthorization Act of 2000). ALP-CDCs must apply to the SBA for PCLP status. CDCs provided PCLP status have increased authority to process, close, service, and liquidate 504/CDC loans. The loans are subject to the same terms and conditions as other 504/CDC loans, but the SBA delegates to the PCLP-CDC all loan approval decisions, except eligibility. Selection is based on several factors, including all of the factors used to assess ALP status plus evidence that the CDC is \"in compliance with its Loan Loss Reserve Fund (LLRF) requirements [described below], has established a PCLP processing goal of 50%, and has a demonstrated ability to process, close, service and liquidate 504 and/or PCLP loans.\" PCLP-CDCs are required to establish and maintain a LLRF for its financings under the program. The LLRF is used to reimburse the SBA for 10% of any loss sustained by the SBA resulting from a default in the payment of principal or interest on a PCLP debenture. Each LLRF must equal 1% of the original principal amount of each PCLP debenture. As of September 30, 2017, 15 CDCs had active PCLP status. In recent years, the number and amount of 504/CDC loans made through the PCLP program have declined. In FY2009, 373 PCLP loans amounting to $185.4 million were disbursed. In FY2018, 27 PCLP loans totaling $23.8 million were dispersed. As part of its analysis of each application, CDCs are required to have an independent appraisal conducted of the real estate if the estimated value of the project property is greater than the federal banking regulator appraisal threshold (currently $500,000). CDCs may be required to have an independent appraisal conducted of the real estate if the estimated value of the project property is equal to or less than the federal banking regulator appraisal threshold \"and such appraisal is necessary for appropriate evaluation of creditworthiness.\" The appraiser must have no appearance of a conflict of interest and be either state licensed or state certified. When the project property's estimated value is more than $1 million, the appraiser must be state certified. SBA-approved 504/CDC loans are not closed until after project-related construction is complete, which often takes one to two years. All loans must be disbursed within 48 months of approval. Prior to the sale of a debenture and the SBA's funding of the 504/CDC loan, the borrower may obtain interim financing from a third-party lender, usually the same lender that provided the loan covering 50% of the total 504 project financing. The proceeds from the debenture sale repay the interim lender for the amount of the 504/CDC project costs that it advanced on an interim basis. The CDC closes the loan in time to meet a specific debenture funding date. At the time of closing, the project must be complete (except funds put into a construction escrow account to complete a minor portion of the project). The SBA's district counsel reviews the closing package and notifies the Central Servicing Agent (CSA, currently PricewaterhouseCoopers Public Sector LLP) and the CDC via email if the loan is approved for debenture funding. If the loan is approved, the CDC forwards specified documents needed for the debenture funding directly to the CSA using a transmittal letter or spreadsheet. As mentioned, because the 504/CDC program provides permanent or take-out financing, an interim lender (either the third-party lender or another lender) typically provides financing to cover the period between SBA approval of the project and the debenture sale. Proceeds from the debenture sale are used to repay the interim lender for the amount of the project costs that it advanced on an interim basis. Borrowers are currently charged fees amounting to about 3.5% of the net debenture proceeds plus annual servicing and guaranty fees of about 1% of the unpaid debenture balance. Some of these fees are charged by the SBA to the CDC and others are charged by the CDC directly to the borrower. The SBA is authorized to charge CDCs five fees to help recoup the SBA's expenses: a guaranty fee, servicing fee, funding fee, development company fee, and participation fee. The SBA is authorized to charge CDCs a one-time, up-front guaranty fee of 0.5% of the debenture. The SBA elected not to charge this fee in FY2009, FY2010, and FY2011, and in FY2016, FY2017, and FY2018. The SBA charged this fee in FY2012, FY2013, FY2014, and FY2015, and is charging this fee in FY2019. The SBA is authorized to charge CDCs an ongoing servicing fee paid monthly by the borrower and adjusted annually based on the date the loan was approved. By statute, the fee is the lesser of the amount necessary to cover the estimated cost of purchasing and guaranteeing debentures under the 504/CDC program or 0.9375% per annum of the unpaid principal balance of the loan. The SBA's servicing fee for FY2019 is 0.368% of the unpaid principal balance for regular 504/CDC loans and 0.395% for 504 refinancing loans. The SBA charges CDCs a funding fee, not to exceed 0.25% of the debenture, to cover costs incurred by the trustee, fiscal agent, and transfer agent. For SBA loans approved after September 30, 1996, the SBA charges CDCs an annual development company fee of 0.125% of the debenture's outstanding principal balance. The fee must be paid from the servicing fees collected by the CDC and cannot be paid from any additional fees imposed on the borrower. The SBA charges third-party lenders a one-time participation fee of 0.5% of the senior mortgage loan if in a senior lien position to the SBA and the loan was approved after September 30, 1996. The fee may be paid by the third-party lender, CDC, or borrower. CDCs are allowed to charge borrowers a processing (or packaging) fee, closing fee, servicing fee, late fee, assumption fee, CSA fee, other agent fees, and underwriters' fee. The CDC is allowed to charge borrowers a processing (or packaging) fee of up to 1.5% of the net debenture proceeds. Two-thirds of this fee is considered earned and may be collected by the CDC when the SBA issues an Authorization for the Debenture. The portion of the processing fee paid by the borrower may be reimbursed from the debenture proceeds. The CDC is also allowed to charge \"a reasonable closing fee sufficient to reimburse it for the expenses of its in-house or outside legal counsel, and other miscellaneous closing costs.\" Up to $2,500 in closing costs may be financed out of the debenture proceeds. CDCs can also charge an annual servicing fee of at least 0.625% per annum and no more than 2% per annum on the unpaid balance of the loan as determined at five-year anniversary intervals. A servicing fee greater than 1.5% for rural areas and 1% elsewhere requires the SBA's prior written approval, based on evidence of substantial need. The servicing fee may be paid only from loan payments received. The fees may be accrued without interest and collected from the CSA when the payments are made. CSAs are entities that receive and disburse funds among the various parties involved in 504/CDC financing under a master servicing agent agreement with the SBA. Loan payments received after the 15 th of each month may be subject to a late payment fee of 5% of the late payment or $100, whichever is greater. Late fees will be collected by the CSA on behalf of the CDC. Also, with the SBA's written approval, CDCs may charge an assumption fee not to exceed 1% of the outstanding principal balance of the loan being assumed. CSAs are allowed to charge an initiation fee on each loan and an ongoing monthly servicing fee under the terms of the master servicing agreement. The current ongoing CSA monthly servicing fee is 0.1% per annum of the loan amount. Also, \"agent fees and charges necessary to market and service debentures and certificates may be assessed to the borrower or the investor.\" CDCs must review the agent's services and related fees \"to determine if the fees are necessary and reasonable when there is an indication from a third party that an agent's fees might be excessive, or when an applicant complains about the fees charged by an agent.\" In cases in which fees appear to be unreasonable, CDCs \"should contact\" the SBA and if a SBA investigation determines that the fee is excessive, the agent \"must reduce the fee to an amount SBA deems reasonable, refund any sum in excess of that amount to the applicant, and refrain from charging or collecting from the applicant any funds in excess of the amount SBA deems reasonable.\" Borrowers are also charged an up-front underwriters' fee of 0.4% for 20-year loans and 0.375% for 10-year loans. The underwriters' fee is paid by the borrower to the underwriter. Underwriters are approved by the SBA to form debenture pools and arrange for the sale of certificates. As mentioned previously, the SBA was provided more than $1.1 billion in funding in 2009 and 2010 to subsidize the 504/CDC program's third-party participation fee and CDC processing fee, subsidize the SBA's 7(a) program's guaranty fee, and increase the 7(a) program's maximum loan guaranty percentage from up to 85% of loans of $150,000 or less and up to 75% of loans exceeding $150,000 to 90% for all standard 7(a) loans. The last extension, P.L. 111-322 , the Continuing Appropriations and Surface Transportation Extensions Act, 2011, authorized the SBA to continue the fee subsidies and the 7(a) program's 90% maximum loan guaranty percentage through March 4, 2011, or until funding provided by the Small Business Jobs Act of 2010 for this purpose was exhausted (which occurred on January 3, 2011). The Obama Administration argued that additional funding for the SBA's loan guaranty programs, including the 504/CDC program's fee subsidies, improved the small business lending environment, increased both the number and amount of SBA guaranteed loans, and supported \"the retention and creation of hundreds of thousands of jobs.\" Critics contended that small business tax reduction, reform of financial credit market regulation, and federal fiscal restraint are better means to assist small business economic growth and job creation. Table 2 shows the number and amount of 504/CDC loans that the SBA approved and the number and amount of 504/CDC loans after cancellations and other modifications are taken into account in FY2005-FY2018. Each year, 5% to 15% of SBA-approved 504/CDC loans are subsequently canceled for a variety of reasons, typically by the borrower (e.g., funds are no longer needed or there was a change in ownership). As the data indicate, the number and amount of 504/CDC loans declined in FY2008 and FY2009. The most likely causes for the decline were decreased small business demand for capital during the recession; difficulties in secondary credit markets, especially from October 2008 to February 2009; and a tightening of small business credit lending standards. The number and amount of 50 4/CDC loans increased during FY2010 and FY2011 and reached prerecession levels in FY2012. The SBA attributed the increase in FY2010 and FY2011 to the continuation of 504/CDC fee subsidies, which were in place through most of FY2010 and the first quarter of FY2011. The continuing economic recovery, which contributed to increased demand for small business loans generally, and the temporary two-year expansion of the types of projects eligible for 504/CDC program refinancing of existing commercial debt (through September 27, 2012) under P.L. 111-240 , the Small Business Jobs Act of 2010, most likely also contributed to the program's increased loan volume in FY2011 and FY2012. For example, the SBA approved 307 loans amounting to $255.3 million in 504/CDC refinancing under the temporary expansion in FY2011 and 2,424 loans amounting to $2.26 billion in 504/CDC refinancing under the temporary expansion in FY2012 (see Table 3 ). As expected, given the expiration of the temporary refinancing expansion, 504/CDC loan volume declined in FY2013 and FY2014. The program's loan volume has generally increased somewhat since then. The SBA's goal is to achieve a zero subsidy rate for its loan guaranty programs. A zero subsidy rate occurs when the SBA's loan guaranty programs generate sufficient revenue through fees and recoveries of collateral on purchased (defaulted) loans to not require appropriations to issue new loan guarantees. As indicated in Table 4 , fees and recoveries did not generate enough revenue to cover 7(a) loan losses from FY2010 through FY2013, and 504/CDC loan losses from FY2012 through FY2015. Appropriations were provided to address the shortfalls. In FY2016, borrowers used 504/CDC loan proceeds to purchase land and existing building (51.56%), building (construction, remodeling, improvements, etc.) (21.10%), machinery and equipment (purchase, installation, etc.) (7.09%), make renovations to a building (4.90%), purchase land (5.18%), other expenses (eligible contingency expenses, interim interest, etc.) (2.84%), purchase improvements (2.30%), debt to be refinanced (1.51%), professional fees (appraiser, architect, legal, etc.) (1.41%), add an addition to a building (1.04%), purchase or install fixtures (0.55%), or make leasehold improvements to a building (0.52%). In 2008, the Urban Institute surveyed 504/CDC borrowers and found that two-thirds of the respondents rated their overall satisfaction with their 504/CDC loan and loan terms as either excellent (21%) or good (45%). About one out of every four borrowers (23%) rated their overall satisfaction with their loan and loan terms as fair, 8% rated their overall satisfaction as poor, and 4% reported that they did not know or did not respond. In addition, 87% of the survey's respondents reported that the 504/CDC loan was either very important (53%) or somewhat important (34%) to their business success (4% reported that it was somewhat unimportant, 4% reported very unimportant, and 6% reported that they did not know or did not respond). In March 2014, the Government Accountability Office (GAO) released a report examining the 504/CDC program. GAO reported that from FY2003 through March 31, 2013, the top four types of small businesses funded by 504/CDC loans were hotels (12%), restaurants (5%), doctor's offices (4%), and dentist's offices (3%). GAO also reported that 85% of approved 504/CDC loans and dollars went to existing small businesses and 15% went to new small businesses. In 2008, the Urban Institute found that about 9.9% of private-sector small business loans were issued to minority-owned small businesses and about 16% of those loans were issued to women-owned businesses. In FY2018, 28.7% of the total amount of 504/CDC approved loans went to minority-owned businesses (20.5% Asian, 6.6% Hispanic, 1.4% African American, and 0.1% Native American) and 10.6% went to women-owned businesses. Based on its comparative analysis of private-sector small business loans and the SBA's loan guaranty programs, the Urban Institute concluded that Overall, loans under the 7(a) and 504 programs were more likely to be made to minority-owned, women-owned, and start-up businesses (firms that have historically faced capital gaps) as compared to conventional small business loans. Moreover, the average amounts for loans made under the 7(a) and 504 programs to these types of firms were substantially greater than conventional small business loans to such firms. These findings suggest that the 7(a) and 504 programs are being used by lenders in a manner that is consistent with SBA's objective of making credit available to firms that face a capital opportunity gap. As mentioned previously, the SBA was provided more than $1.1 billion in funding in 2009 and 2010 to subsidize the 504/CDC program's third-party participation fee and CDC processing fee, subsidize the SBA's 7(a) program's guaranty fee, and increase the 7(a) program's maximum loan guaranty percentage from up to 85% of loans of $150,000 or less and up to 75% of loans exceeding $150,000 to 90% for all standard 7(a) loans. The Obama Administration argued that this additional funding improved the small business lending environment, increased both the number and amount of SBA guaranteed loans, and supported \"the retention and creation of hundreds of thousands of jobs.\" Critics argued that small business tax reduction, reform of financial credit market regulation, and federal fiscal restraint are a better means to assist small business economic growth and job creation. The SBA's Office of Inspector General (OIG) and the GAO have independently reviewed the administration of SBA's loan guaranty programs. Both agencies have reported deficiencies that they argued needed to be addressed, including issues involving the oversight of 504/CDC lenders. On March 23, 2010, the SBA's OIG released the results of an audit of \"25 of 100 statistically selected CDC/504 loans approved under Premier Certified Lender (PCL) authority that were disbursed during fiscal year (FY) 2008.\" The loans \"had been approved by 3 of the most active of the 24 PCLs\" operating in 2008. The audit was initiated \"based on concerns that PCLs were engaging in risky underwriting practices and that five PCLs were paying their executives excessive compensation.\" The OIG determined that PCLs may not have used prudent practices in approving and disbursing 68% of the sampled loans, totaling nearly $8.9 million, due to poor loan underwriting, and eligibility or loan closing issues. Specifically, 40% of the loans had faulty underwriting repayment analyses, and 52% of the loans had eligibility and/or loan closing issues.... Projecting our sample results to the universe of CDC/504 loans disbursed in 2008 by these three PCLs, we estimate with 90% confidence that at least 572 loans, totaling nearly $254.9 million in CDC/504 loan proceeds, had weaknesses in the underwriting process, eligibility determinations or loan closing. Of this amount, we estimate that a minimum of 183 loans, totaling $56.4 million or more, were made to borrowers based on faulty repayment analyses. We also estimate that lenders disbursed $209 million or more to borrowers who had eligibility and/or loan closing issues. In terms of dollars paid for CDC executive compensation, the OIG found that 4 of the 5 CDCs reviewed were among the top 10 highest for executive compensation.... In terms of percentage of gross receipts spent on executive compensation, 3 of the 5 questioned CDCs ranked among the top 10 highest of the 56 CDCs that had gross receipts over $1 million. The OIG made several recommendations to address these issues, including changing the SBA's Standard Operating Procedures (SOP) to require lenders to use (1) the actual cash flow method to determine borrower repayment ability for businesses using accrual accounting, (2) historical salary levels to estimate salaries of the borrower's officers, and (3) historical sales data to make sales projections. It also recommended that the SBA develop a process \"to ensure that corrective actions are taken in response to the Agency's onsite reviews to ensure these conditions do not continue, and/or guidance for these reviews should be modified, as appropriate, to ensure that reviewers properly assess lender determination of borrower repayment ability and eligibility.\" The OIG reported that the SBA disagreed that SOP 50 10 should be revised to strengthen lender repayment analyses by requiring the use of the actual cash flow method and historical salary and sales data. The Agency also did not believe an additional process was needed to ensure that corrective actions are taken to improve lender performance, but acknowledged that better use of onsite review results are needed to make more informed lender decisions and programmatic determinations. In 2009, GAO released an analysis of the SBA's oversight of the lending and risk management activities of lenders that extend 7(a) and 504/CDC loans to small businesses. GAO recommended that the SBA strengthen its oversight of these lenders and argued that although the SBA's \"lender risk rating system has enabled the agency to conduct some off-site monitoring of lenders, the agency does not use the system to target lenders for on-site reviews or to inform the scope of the reviews.\" GAO also noted that the SBA targets for review those lenders with the largest SBA-guaranteed loan portfolios. As a result of this approach, 97% of the lenders that SBA's risk rating system identified as high risk in 2008 were not reviewed. Further, GAO found that the scope of the on-site reviews that SBA performs is not informed by the lenders' risk ratings, and the reviews do not include an assessment of lenders' credit decisions. GAO argued that although the SBA \"has made improvements to its off-site monitoring of lenders, the agency will not be able to substantially improve its lender oversight efforts unless it improves its on-site review process.\" As mentioned previously, in recent years, both the number and amount of 504/CDC loans made through the PCLP has declined. In FY2009, 373 PCLP loans amounting to $185.4 million were disbursed. In FY2018, 27 PCLP loans totaling $23.8 million were dispersed. In addition, the SBA's Office of Credit Risk Management (OCRM) created new metrics in 2015 for monitoring 504/CDC lender loan performance called SMART (measuring the lender's solvency and financial condition, management and governance, asset quality and servicing, regulatory compliance, and technical issues and mission) and updated those metrics in 2016. SMART is designed to \"assist OCRM in identifying high risk lenders and ensuring that lender oversight drives meaningful review activities, findings, and corrective actions that reduce risk to the SBA.\" OCRM also created a \"detailed bench-marking analysis project that will serve to establish quantitative performance metrics and indicators of quality (Preferred, Acceptable and Less than Acceptable) to be incorporated into each area of risk assessment identified in the ... SMART protocol measurement attributes.\" As mentioned previously, Congress approved legislation in 2009 (ARRA) that provided the SBA an additional $730 million, including $299 million to temporarily reduce fees in the SBA's 504/CDC loan guaranty and 7(a) programs and $76 million to temporarily increase the 7(a) program's loan guaranty from up to 85% of loans of $150,000 or less and up to 75% of loans exceeding $150,000. Congress approved legislation in 2010 ( P.L. 111-240 , the Small Business Jobs Act of 2010) that was designed to enhance small business access to capital. Among other provisions, the act provided $510 million to extend the 504/CDC and 7(a) loan guaranty programs' fee subsidies and the 7(a) program's 90% maximum loan guaranty percentage through December 31, 2010 (later extended to March 4, 2011) or until available funding was exhausted (which occurred on January 3, 2011); increased the 504/CDC program's loan limits from $1.5 million to $5 million for regular 504/CDC loans; from $2 million to $5 million if the loan proceeds are directed toward one or more of the program's specified public policy goals; from $4 million to $5.5 million for small manufacturers; from $4 million to $5.5 million for projects that reduce the borrower's energy consumption by at least 10%; and from $4 million to $5.5 million for projects for plant, equipment, and process upgrades of renewable energy sources, such as the small-scale production of energy for individual buildings or communities consumption (commonly known as micropower), or renewable fuel producers, including biodiesel and ethanol producers; temporarily expanded, for two years after enactment (through September 27, 2012), the types of projects eligible for 504/CDC program refinancing of existing commercial debt; and authorized the SBA to establish an alternative size standard for the 7(a) and 504/CDC programs that uses maximum tangible net worth and average net income as an alternative to the use of industry standards and established an interim size standard of a maximum tangible net worth of not more than $15 million and an average net income after federal taxes (excluding any carryover losses) for the preceding two fiscal years of not more than $5 million. The Obama Administration argued that increasing maximum loan limit for SBA programs (including the 504/CDC program) would allow the SBA to \"support larger projects,\" which would \"allow the SBA to help America's small businesses drive long-term economic growth and the creation of jobs in communities across the country.\" The Administration also argued that increasing the maximum loan limits for these programs will be \"budget neutral\" over the long run and \"help improve the availability of smaller loans.\" Critics of increasing the SBA's maximum loan limits argued that doing so might increase the risk of defaults, resulting in higher guaranty fees or the need to provide the SBA additional funding. Others advocated a more modest increase in the maximum loan limits to ensure that the 7(a) program \"remains focused on startup and early-stage small firms, businesses that have historically encountered the greatest difficulties in accessing credit\" and \"avoids making small borrowers carry a disproportionate share of the risk associated with larger loans.\" Others contended that creating a small business direct lending program within the SBA would reduce paperwork requirements and be more efficient in providing small businesses access to capital than modifying existing SBA programs that rely on private lenders to determine if they will issue the loans. Also, as mentioned previously, others argued that providing additional resources to the SBA or modifying the SBA's loan programs as a means to augment small businesses' access to capital is ill-advised. In their view, the SBA has limited impact on small businesses' access to capital. They argued that the best means to assist small business economic growth and job creation is to focus on small business tax reduction, reform of financial credit market regulation, and federal fiscal restraint. As mentioned previously, Congress did not approve any changes to the 504/CDC program during the 112 th Congress. However, legislation was introduced during the 112 th Congress to change the program, including several proposals to extend the now-expired two-year temporary expansion of the eligibility of 504/CDC refinancing projects not involving expansions. Proponents of extending the 504/CDC refinancing expansion provision, initially enacted as part of P.L. 111-240 , the Small Business Jobs Act of 2010, argued that it would create jobs by enabling small business owners to lower their monthly payments \"at no cost to taxpayers\" and \"is one of many things that we should be doing to put more capital in the hands of America's job creators.\" Opponents worried that the provision may require funding to cover loan losses in the future, arguing that \"commercial refinancing may pose an undue risk … at a time of significant budgetary constraints.\" Others opposed the expansion of 504/CDC refinancing on economic or ideological grounds, arguing that federal fiscal restraint, business tax reduction, and business regulatory relief would provide greater assistance to small businesses than expanding an existing SBA spending program. H.R. 2950 , the Small Business Administration 504 Loan Refinancing Extension Act of 2011, was introduced on September 15, 2011, and referred to the House Committee on Small Business. The bill would have allowed 504/CDC loans to be used to refinance projects not involving expansions as long as the financing did not exceed 90% of the value of the collateral for the financing for an additional year beyond the two years from the date of enactment that was authorized by the Small Business Jobs Act of 2010. S.Amdt. 1833 , the INVEST in America Act of 2012—an amendment in the nature of a substitute for H.R. 3606 , the Jumpstart Our Business Startups Act—was introduced on March 15, 2012. It would have allowed 504/CDC loans to be used to refinance projects not involving expansions for an additional year beyond the two years from the date of enactment authorized by the Small Business Jobs Act of 2010. The amendment was ruled nongermane by the chair on March 21, 2012, and was not included in the final version of the bill that was approved by the Senate the following day. S. 3572 , the Restoring Tax and Regulatory Certainty to Small Businesses Act of 2012, was introduced on September 19, 2012, and referred to the Senate Committee on Small Business and Entrepreneurship and the Senate Committee on Finance. It would have allowed 504/CDC loans to be used to refinance projects not involving expansions for an additional year and a half beyond the two years from the date of enactment authorized by the Small Business Jobs Act of 2010. S. 1828 , a bill to increase small business lending, and for other purposes, was introduced on November 8, 2011, and referred to the Senate Committee on Small Business and Entrepreneurship. The bill would have reinstated for a year following the date of its enactment the fee subsidies for the 504/CDC and 7(a) loan guaranty programs and the 90% loan guaranty percentage for the 7(a) program that were originally funded by ARRA. Two bills were introduced during the 113 th Congress to reinstate the temporary two-year expansion of projects eligible for 504/CDC program refinancing of existing debt, which expired on September 27, 2012. H.R. 1240 , the Commercial Real Estate and Economic Development (CREED) Act of 2013, would have reinstated the temporary expansion of the projects eligible for 504/CDC program refinancing of existing debt for five years following the bill's enactment. It was referred to the House Committee on Small Business on March 18, 2013. Its companion bill in the Senate ( S. 289 ) was referred to the Senate Committee on Small Business and Entrepreneurship on February 12, 2013, and was ordered to be reported favorably, with an amendment, on June 17, 2013. As amended, S. 289 would have reinstated the temporary expansion of the projects eligible for 504/CDC program refinancing of existing debt during any fiscal year in which the 504/CDC program is operating at zero subsidy. In addition, H.R. 4652 , the Increasing Small Business Lending Act, would have authorized fee waivers for the 7(a) and 504/CDC programs. As mentioned previously, P.L. 114-113 , the Consolidated Appropriations Act, 2016, reinstated the expansion of the types of projects eligible for refinancing under the 504/CDC loan guaranty program in any fiscal year in which the refinancing program and the 504/CDC program as a whole do not have credit subsidy costs. The act requires each CDC to limit its refinancing so that, during any fiscal year, the new refinancings do not exceed 50% of the dollars it loaned under the 504/CDC program during the previous fiscal year. This limitation may be waived if the SBA determines that the refinance loan is needed for good cause. An interim final rule implementing the new refinancing program was issued by the SBA on May 25, 2016, effective June 24, 2016. The act also eliminated an alternative job retention goal provision that allowed borrowers that do not meet the 504/CDC program's job creation and retention goals to participate in the expanded refinancing program, but limited that participation to \"not more than the product obtained by multiplying the number of employees of the borrower by $65,000.\" Previously, H.R. 2266 , the Commercial Real Estate and Economic Development Act of 2015, would have reinstated the temporary expansion of projects eligible for 504/CDC program refinancing of existing debt for five years following enactment. Its companion bill in the Senate ( S. 966 ), as amended in committee, would have reinstated the temporary expansion of the refinancing program during any fiscal year in which the 504/CDC program is operating at zero subsidy. Also, the Obama Administration had requested in its FY2016 budget request authority to reinstate the 504/CDC refinancing program (without a business expansion requirement) in FY2016 to support up to $7.5 billion in lending. As mentioned previously, P.L. 115-371 , the Small Business Access to Capital and Efficiency (ACE) Act, increased the threshold amount for determining when a CDC is required to secure an independent real estate appraisal for a 504/CDC loan (from if the estimated value of the project property is greater than $250,000 to if the estimated value of the project property is greater than the federal banking regulator appraisal threshold, which was recently increased from $250,000 to $500,000). The act also increased the threshold amount for determining when a CDC may be required to secure an independent real estate appraisal for a 504/CDC loan (from if the estimated value of the project property is equal to or less than $250,000 and such appraisal is necessary for appropriate evaluation of creditworthiness to if the estimated value of the project property is equal to or less than the federal banking regulator appraisal threshold and such appraisal is necessary for appropriate evaluation of creditworthiness). The change was designed to \"remove the uncertainty lenders now have juggling two different real estate appraisal thresholds.\" In addition, S. 347 , the Investing in America's Small Manufacturers Act, among other provisions, would have allowed CDCs to provide up to 50% of project costs instead of up to 40% if the borrower is a small manufacturer and the 504/CDC loan guarantee program's subsidy cost for that current fiscal year is not above zero. During the 111 th Congress, congressional debate concerning proposed changes to the SBA's loan guaranty programs, including the 504/CDC program, centered on the likely impact the changes would have on small business access to capital, job retention, and job creation. As a general proposition, some, including President Obama, argued that economic conditions made it imperative that the SBA be provided additional resources to assist small businesses in acquiring capital necessary to start, continue, or expand operations, and create jobs. Others worried about the long-term adverse economic effects of spending programs that increase the federal deficit and advocated business tax reduction, reform of financial credit market regulation, and federal fiscal restraint as the best means to assist small business economic growth and job creation. In terms of specific program changes, continuing the 504/CDC program's temporary fee subsidies, increasing its loan limits, temporarily (and later permanently) expanding its refinancing options, and authorizing the SBA to establish an alternative size standard were designed to achieve the same goal: to enhance job creation and retention by increasing the ability of 504/CDC borrowers to obtain credit at affordable rates. Critics argued that these actions might increase the risk of defaults and result in higher guaranty fees or the need to provide the SBA additional funding to cover loan subsidy costs. Others advocated a more modest increase in the maximum loan limits to ensure that the programs focus on start-ups and early-stage small firms, \"businesses that have historically encountered the greatest difficulties in accessing credit,\" and that they avoid \"making small borrowers carry a disproportionate share of the risk associated with larger loans.\" During the 112 th -115 th Congresses, congressional oversight focused on the SBA's administration of the program changes enacted during the 111 th Congress, the impact of those changes on the SBA's lending, and ways to address and minimize increased costs associated with loan losses. Although there continues to be widespread congressional support for providing assistance to small businesses, federal fiscal constraints may impede efforts to further expand the 504/CDC program in the near future. Given existing fiscal constraints, it is likely that congressional oversight during the 116 th Congress will continue to focus on (1) the SBA's administration of the 504/CDC program to ensure that the program is as efficient as possible; and (2) the program's efficacy in job retention and creation.", "summary": "The Small Business Administration (SBA) administers programs to support small businesses, including several loan guaranty programs designed to encourage lenders to provide loans to small businesses \"that might not otherwise obtain financing on reasonable terms and conditions.\" The SBA's 504 Certified Development Company (504/CDC) loan guaranty program is administered through nonprofit Certified Development Companies (CDCs). It provides long-term fixed rate financing for major fixed assets, such as land, buildings, equipment, and machinery. Of the total project costs, a third-party lender must provide at least 50% of the financing, the CDC provides up to 40% of the financing through a 100% SBA-guaranteed debenture, and the applicant provides at least 10% of the financing. Its name is derived from Section 504 of the Small Business Investment Act of 1958 (P.L. 85-699, as amended), which provides the most recent authorization for the SBA's sale of 504/CDC debentures. In FY2018, the SBA approved 5,874 504/CDC loans amounting to nearly $4.8 billion. Congressional interest in the SBA's 504/CDC program has increased in recent years because of concern that small businesses might be prevented from accessing sufficient capital to enable them to grow and create jobs. For example, during the 111th Congress, P.L. 111-240, the Small Business Jobs Act of 2010 increased the 504/CDC program's loan guaranty limits from $1.5 million to $5 million for \"regular\" borrowers, from $2 million to $5 million if the loan proceeds are directed toward one or more specified public policy goals, and from $4 million to $5.5 million for manufacturers; temporarily expanded, for two years, the types of projects eligible for 504/CDC program refinancing of existing debt; created an alternative 504/CDC size standard to increase the number of businesses eligible for assistance; and provided $505 million (plus an additional $5 million for administrative expenses) to extend temporary fee subsidies for the 504/CDC and 7(a) loan guaranty programs and a temporary increase in the 7(a) program's maximum loan guaranty percentage to 90%. The temporary fee subsidies and 90% loan guaranty percentage ended on January 3, 2011, and the temporary expansion of the projects eligible for 504/CDC program refinancing of existing debt expired on September 27, 2012. During the 114th Congress, P.L. 114-113, the Consolidated Appropriations Act, 2016, reinstated the expansion of the types of projects eligible for refinancing under the 504/CDC loan guaranty program in any fiscal year in which the refinancing program and the 504/CDC program as a whole do not have credit subsidy costs. The act requires each CDC to limit its refinancing so that, during any fiscal year, the new refinancings do not exceed 50% of the dollars it loaned under the 504/CDC program during the previous fiscal year. This report examines the rationale provided for the 504/CDC program; its borrower and lender eligibility standards; operating requirements; and performance statistics, including loan volume, loss rates, proceeds usage, borrower satisfaction, and borrower demographics. This report also examines congressional action taken to help small businesses gain greater access to capital, including enactment of P.L. 111-5, the American Recovery and Reinvestment Act of 2009 (ARRA); P.L. 111-240; P.L. 114-113; and issues related to the SBA's oversight of 504/CDC lenders.", "document_type": "crs"}
{"report": "The United States has actively pursued the development of hypersonic weapons as a part of its conventional prompt global strike (CPGS) program since the early 2000s. In recent years, it has focused such efforts on hypersonic glide vehicles and hypersonic cruise missiles with shorter and intermediate ranges for use in regional conflicts. Although funding for these programs has been relatively restrained in the past, both the Pentagon and Congress have shown a growing interest in pursuing the development and near-term deployment of hypersonic systems. This is due, in part, to the growing interest in these technologies in Russia and China, leading to a heightened focus in the United States on the strategic threat posed by hypersonic flight. Open-source reporting indicates that both China and Russia have conducted numerous successful tests of hypersonic glide vehicles, and both are expected to field an operational capability as early as 2020 . Experts disagree on the potential impact of competitor hypersonic weapons on both strategic stability and the U.S. military's competitive advantage. Nevertheless, current Under Secretary of Defense for Research and Engineering (USD R&E) Michael Griffin has testified to Congress that the United States does not \"have systems which can hold [China and Russia] at risk in a corresponding manner, and we don't have defenses against [their] systems.\" Although the John S. McCain National Defense Authorization Act for Fiscal Year 2019 (FY2019 NDAA, P.L. 115-232 ) accelerated the development of hypersonic weapons, which USD R&E identifies as a priority research and development area, the United States is unlikely to field an operational system before 2023. However, the United States, in contrast to Russia and China, is not currently considering or developing hypersonic weapons for use with a nuclear warhead. As a result, U.S. hypersonic weapons will likely require greater accuracy and will be more technically challenging to develop than nuclear-armed Chinese and Russian systems. In addition to accelerating development of hypersonic weapons, Section 247 of the FY2019 NDAA required that the Secretary of Defense, in coordination with the Director of the Defense Intelligence Agency, produce a classified assessment of U.S. and adversary hypersonic weapons programs, to include the following elements: (1) An evaluation of spending by the United States and adversaries on such technology. (2) An evaluation of the quantity and quality of research on such technology. (3) An evaluation of the test infrastructure and workforce supporting such technology. (4) An assessment of the technological progress of the United States and adversaries on such technology. (5) Descriptions of timelines for operational deployment of such technology. (6) An assessment of the intent or willingness of adversaries to use such technology. This report was delivered to Congress in July 2019. Similarly, Section 1689 of the FY2019 NDAA requires the Director of the Missile Defense Agency to produce a report on \"how hypersonic missile defense can be accelerated to meet emerging hypersonic threats.\" The findings of these reports could hold implications for congressional authorizations, appropriations, and oversight. The following report reviews the hypersonic weapons programs in the United States, Russia, and China, providing information on the programs and infrastructure in each nation, based on unclassified sources. It also provides a brief summary of the state of global hypersonic weapons research development. It concludes with a discussion of the issues that Congress might address as it considers DOD's funding requests for U.S. hypersonic technology programs. Several countries are developing hypersonic weapons, which fly at speeds of at least Mach 5 (five times the speed of sound), but none have yet introduced them into their operational military forces. There are two primary categories of hypersonic weapons Hypersonic glide vehicles (HGV) are launched from a rocket before gliding to a target. Hypersonic cruise missiles are powered by high-speed, air-breathing engines, or \"scramjets,\" after acquiring their target. Unlike ballistic missiles, hypersonic weapons do not follow a ballistic trajectory and can maneuver en route to their destination. As Vice Chairman of the Joint Chiefs of Staff and former Commander of U.S. Strategic Command General John Hyten has stated, hypersonic weapons could enable \"responsive, long-range, strike options against distant, defended, and/or time-critical threats [such as road-mobile missiles] when other forces are unavailable, denied access, or not preferred.\" Conventional hypersonic weapons use only kinetic energyâenergy derived from motionâto destroy unhardened targets or, potentially, underground facilities. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. For example, terrestrial-based radar cannot detect hypersonic weapons until late in the weapon's flight. Figure 1 depicts the differences in terrestrial-based radar detection timelines for ballistic missiles versus hypersonic glide vehicles. This delayed detection compresses the timeline for decision-makers assessing their response options and for a defensive system to intercept the attacking weaponâpotentially permitting only a single intercept attempt. Furthermore, U.S. defense officials have stated that both terrestrial- and current space-based sensor architectures are insufficient to detect and track hypersonic weapons, with USD R&E Griffin noting that \"hypersonic targets are 10 to 20 times dimmer than what the U.S. normally tracks by satellites in geostationary orbit.\" Some analysts have suggested that space-based sensor layersâintegrated with tracking and fire-control systems to direct high-performance interceptors or directed energy weaponsâcould theoretically present viable options for defending against hypersonic weapons in the future. Indeed, the 2019 Missile Defense Review notes that \"such sensors take advantage of the large area viewable from space for improved tracking and potentially targeting of advanced threats, including HGVs and hypersonic cruise missiles.\" Other analysts have questioned the affordability, technological feasibility, and/or utility of wide-area hypersonic weapons defense. As physicist and nuclear expert James Acton explains, \"point-defense systems, and particularly [Terminal High-Altitude Area Defense (THAAD)], could very plausibly be adapted to deal with hypersonic missiles. The disadvantage of those systems is that they can only defend small areas. To defend the whole of the continental United States, you would need an unaffordable number of THAAD batteries.\" In addition, some analysts have argued that the United States' current command and control architecture would be incapable of \"processing data quickly enough to respond to and neutralize an incoming hypersonic threat.\" (A broader discussion of hypersonic weapons defense is outside the scope of this report.) The Department of Defense (DOD) is currently developing hypersonic weapons under the Navy's Conventional Prompt Strike program, which is intended to provide the U.S. military with the ability to strike hardened or time-sensitive targets with conventional warheads, as well as through several Air Force, Army, and DARPA programs. Those who support these development efforts argue that hypersonic weapons could enhance deterrence, as well as provide the U.S. military with an ability to defeat capabilities such as advanced air and missile defense systems that form the foundation of U.S. competitors' anti-access/area denial strategies. In recognition of this, the 2018 National Defense Strategy identifies hypersonic weapons as one of the key technologies \"[ensuring the United States] will be able to fight and win the wars of the future.\" Unlike China and Russia, the United States is not currently developing hypersonic weapons for use with a nuclear warhead. As a result, U.S. hypersonic weapons will likely require greater accuracy and will be more technically challenging to develop than nuclear-armed Chinese and Russian systems. Indeed, according to one expert, \"a nuclear-armed glider would be effective if it were 10 or even 100 times less accurate [than a conventionally-armed glider]\" due to nuclear blast effects. According to open-source reporting, the United States has a number of major offensive hypersonic weapons and hypersonic technology programs in development, including the following (see Table 1 ): U.S. NavyâConventional Prompt Strike (CPS); U.S. ArmyâLong-Range Hypersonic Weapon (LRHW); U.S. Air ForceâAGM-183 Air-Launched Rapid Response Weapon (ARRW, pronounced \"arrow\"); DARPAâTactical Boost Glide (TBG); DARPAâOperational Fires (OpFires); and DARPAâHypersonic Air-breathing Weapon Concept (HAWC, pronounced \"hawk\"). These programs are intended to produce operational prototypes, as there are currently no programs of record for hypersonic weapons. Accordingly, funding for U.S. hypersonic weapons programs is found in the Research, Development, Test, and Evaluation accounts, rather than in Procurement. In a June 2018 memorandum, DOD announced that the Navy would lead the development of a common glide vehicle for use across the services. The common glide vehicle is being adapted from a Mach 6 Army prototype warhead, the Alternate Re-Entry System, which was successfully tested in 2011 and 2017. Once development is complete, \"Sandia National Laboratories, the designer of the original concept, then will build the common glide vehiclesâ¦. Booster systems are being developed separately.\" The Navy's Conventional Prompt Strike (CPS) is expected to pair the common glide vehicle with a submarine-launched booster system, achieving initial operational capability (IOC) on a Virginia-class submarine with Virginia Payload Module in FY2028. The Navy is requesting $1 billion for CPS in FY2021âan increase of $415 million over the FY2020 request and $496 million over the FY2020 appropriationâand $5.3 billion across the five-year Future Years Defense Program (FYDP). The Army's Long-Range Hypersonic Weapon program is expected to pair the common glide vehicle with the Navy's booster system. The system is intended to have a range of 1,400 miles and \"provide the Army with a prototype strategic attack weapon system to defeat A2/AD capabilities, suppress adversary Long Range Fires, and engage other high payoff/time sensitive targets.\" The Army is requesting $801 million for the program in FY2021â$573 million over the FY2020 request and $397 million over the FY2020 appropriationâand $3.3 billion across the FYDP. It plans to conduct flight tests for LRHW from FY2021 to FY2023, field combat rounds in FY2023, and transition to a program of record in the fourth quarter of FY2024. T he AGM-183 Air- L aunched Rapid Response Weapon is expected to leverage DARPA's Tactical Boost Glide technology to develop an air-launched hypersonic glide vehicle prototype capable of travelling at speeds up to Mach 20 at a range of approximately 575 miles. Despite testing delays due to technical challenges, ARRW completed a successful flight test in June 2019 and is expected to complete flight tests in FY2022. The Air Force has requested $382 million for ARRW in FY2021âup from $286 million in the FY2020 request and appropriationâand $581 million across the FYDP, with no funds requested beyond FY2022. ARRW is a project under the Air Force's Hypersonics Prototyping Program Element, which is intended to demonstrate concepts \"to [enable] leadership to make informed strategy and resource decisions â¦ for future programs.\" In February 2020, the Air Force announced that it had cancelled its second hypersonic weapon program, the Hypersonic Conventional Strike Weapon (HCSW), which had been expected to use the common glide vehicle, due to budget pressures that forced it to choose between ARRW and HCSW. Air Force acquisition chief Will Roper explained that ARRW was selected because it was more advanced and gave the Air Force additional options. \"[ARRW] is smaller; we can carry twice as many on the B-52, and it's possible it could be on the F-15,\" he explained. The Air Force will continue its technical review of HCSW through March 2020. DARPA, in partnership with the Air Force, continues to test Tactical Boost Glide, a wedge-shaped hypersonic glide vehicle capable of Mach 7+ flight that \"aims to develop and demonstrate technologies to enable future air-launched, tactical-range hypersonic boost glide systems.\" TBG will \"also consider traceability, compatibility, and integration with the Navy Vertical Launch System\" and is planned to transition to both the Air Force and the Navy. DARPA has requested $117 millionâdown from the $162 million FY2020 request and the $152 million FY2020 appropriationâfor TBG in FY2021. DARPA's Operational Fires reportedly seeks to leverage TBG technologies to develop a ground-launched system that will enable \"advanced tactical weapons to penetrate modern enemy air defenses and rapidly and precisely engage critical time sensitive targets.\" DARPA has requested $40 million for OpFires in FY2021âdown from the $50 million FY2020 request and appropriationâand intends to transition the program to the Army. In the longer term, DARPA, with Air Force support, is continuing work on the Hypersonic Air-breathing Weapon Concept, which \"seeks to develop and demonstrate critical technologies to enable an effective and affordable air-launched hypersonic cruise missile.\" Assistance Director for Hypersonics Mike White has stated that such a missile would be smaller than DOD's hypersonic glide vehicles and could therefore launch from a wider range of platforms. Director White has additionally noted that HAWC and other hypersonic cruise missiles could integrate seekers more easily than hypersonic glide vehicles. DARPA requested $7 million to develop HAWC in FY2021âdown from the $10 million FY2020 request and $20 million FY2020 appropriation. DOD is also investing in counter-hypersonic weapons capabilities, although USD R&E Michael Griffin has stated that the United States will not have a defensive capability against hypersonic weapons until the mid-2020s, at the earliest. In September 2018, the Missile Defense Agency (MDA)âwhich in 2017 established a Hypersonic Defense Program pursuant to Section 1687 of the FY2017 NDAA ( P.L. 114-840 )âcommissioned 21 white papers to explore hypersonic missile defense options, including interceptor missiles, hypervelocity projectiles, laser guns, and electronic attack systems. In January 2020, MDA issued a draft request for prototype proposals for a Hypersonic Defense Regional Glide Phase Weapons System interceptor. This effort is intended to \"reduce interceptor key technology and integration risks, anchor modeling and simulation in areas of large uncertainty, and to increase the interceptor technology readiness levels (TRL) to level 5.\" MDA has also awarded four companiesâNorthrop Grumman, Raytheon, Leidos, and L3Harrisâwith $20 million contracts to design prototype space-based (low-Earth orbit) sensors by October 31, 2020. Such sensors could theoretically extend the range at which incoming missiles could be detected and trackedâa critical requirement for hypersonic missile defense, according to USD Griffin. MDA requested $206.8 million for hypersonic defense in FY2021âup from its $157.4 million FY2020 requestâand $659 million across the FYDP. In addition, DARPA is working on a program called Glide Breaker, which \"will develop critical component technology to support a lightweight vehicle designed for precise engagement of hypersonic threats at very long range.\" DARPA requested $3 million for Glide Breaker in FY2021âdown from $10 million in FY2020. According to a study mandated by the FY2013 National Defense Authorization Act ( P.L. 112-239 ) and conducted by the Institute for Defense Analyses (IDA) , the United States had 48 critical hypersonic test facilities and mobile assets in 2014 needed for the maturation of hypersonic technologies for defense systems development through 2030 . These specialized facilities, which simulate the unique conditions experienced in hypersonic flight (e.g., speed, pressure, heating), included 10 DOD hypersonic ground test facilities, 11 DOD open-air ranges, 11 DOD mobile assets, 9 NASA facilities, 2 Department of Energy facilities, and 5 industry or academic facilities. In its 2014 evaluation ofÂ  U.S. hypersonic test and evaluation infrastructure, IDAÂ noted thatÂ  \" no current U.S. facility can provide full-scale, time-dependent, coupled aerodynamic and thermal-loading environments for flight durations necessary to evaluate theseÂ characteristics aboveÂ Mach 8. \" Â Since the 2014Â study report was published,Â the University of Notre Dame has opened a Mach 6 hypersonic wind t unnel and at least one hypersonic testing facility has been inactivated. D evelopment of Mach 8 and Mach 10 wind tunnels at Purdue University and the University of Notre Dame , respectively, is ongoing. In addition, t he University of Arizona plans to modify one of its wind tunnels to enable Mach 5 testing by early 2021 , while Texas A&M Universityâ in partnership with Army Futures Commandâplans to complete construction of a kilometer-long Mach 10 wind tunnel by 2021 . ( For a list of U.S. hypersonic test assets and their capabilities, see the Appendix .) The United States also uses the Royal Australian Air Force Woomera Test Range in Australia and the AndÃ¸ya Rocket Range in Norway for flight testing. In January 2019, the Navy announced plans to reactivate its Launch Test Complex at China Lake, CA, to improve air launch and underwater testing capabilities for the conventional prompt strike program. In addition, in March 2020, DOD announced that it had established a \"hypersonic war room\" to assess the U.S. industrial base for hypersonic weapons and identify \"critical nodes\" in the supply chain. Initial findings are to be released in mid-2020. Although Russia has conducted research on hypersonic weapons technology since the 1980s, it accelerated its efforts in response to U.S. missile defense deployments in both the United States and Europe, and in response to the U.S. withdrawal from the Anti-Ballistic Missile Treaty in 2001. Detailing Russia's concerns, President Putin stated that \"the US is permitting constant, uncontrolled growth of the number of anti-ballistic missiles, improving their quality, and creating new missile launching areas. If we do not do something, eventually this will result in the complete devaluation of Russia's nuclear potential. Meaning that all of our missiles could simply be intercepted.\" Russia thus seeks hypersonic weapons, which can maneuver as they approach their targets, as an assured means of penetrating U.S. missile defenses and restoring its sense of strategic stability. Russia is pursuing two hypersonic weapons programsâthe Avangard and the 3M22 Tsirkon (or Zircon)âand has reportedly fielded the Kinzhal (\"Dagger\"), a maneuvering air-launched ballistic missile. Avangard ( Figure 2 ) is a hypersonic glide vehicle launched from an intercontinental ballistic missile (ICBM), giving it \"effectively 'unlimited' range.\" Reports indicate that Avangard is currently deployed on the SS-19 Stiletto ICBM, though Russia plans to eventually launch the vehicle from the Sarmat ICBM. Sarmat is still in development, although it may be deployed by 2021. Avangard features onboard countermeasures and will reportedly carry a nuclear warhead. It was successfully tested twice in 2016 and once in December 2018, reportedly reaching speeds of Mach 20; however, an October 2017 test resulted in failure. Russian news sources claim that Avangard entered into combat duty in December 2019. In addition to Avangard, Russia is developing Tsirkon, a ship-launched hypersonic cruise missile capable of traveling at speeds of between Mach 6 and Mach 8. Tsirkon is reportedly capable of striking both ground and naval targets. According to Russian news sources, Tsirkon has a range of between approximately 250 and 600 miles and can be fired from the vertical launch systems mounted on cruisers Admiral Nakhimov and Pyotr Veliky , Project 20380 corvettes, Project 22350 frigates, and Project 885 Yasen-class submarines, among other platforms. These sources assert that Tsirkon was successfully launched from a Project 22350 frigate in January 2020. U.S. intelligence reports indicate that the missile will become operational in 2023. In addition, Russia has reportedly fielded Kinzhal, a maneuvering air-launched ballistic missile modified from the Iskander missile. According to U.S. intelligence reports, Kinzhal was successfully test fired from a modified MiG-31 fighter (NATO code name: Foxhound) as recently as July 2018âstriking a target at a distance of approximately 500 milesâand is expected by U.S. intelligence sources to become ready for combat by 2020. Russia plans to deploy the missile on both the MiG-31 and the Su-34 long-range strike fighter. Russia is working to mount the missile on the Tu-22M3 strategic bomber (NATO code name: Backfire), although the slower-moving bomber may face challenges in \"accelerating the weapon into the correct launch parameters.\" Russian media has reported Kinzhal's top speed as Mach 10, with a range of up to 1,200 miles when launched from the MiG-31. The Kinzhal is reportedly capable of maneuverable flight, as well as of striking both ground and naval targets, and could eventually be fitted with a nuclear warhead. However, such claims regarding Kinzhal's performance characteristics have not been publicly verified by U.S. intelligence agencies, and have been met with skepticism by a number of analysts. Russia reportedly conducts hypersonic wind tunnel testing at the Central Aero-Hydrodynamic Institute in Zhukovsky and the Khristianovich Institute of Theoretical and Applied Mechanics in Novosibirsk, and has tested hypersonic weapons at Dombarovskiy Air Base, the Baykonur Cosmodrome, and the Kura Range. According to Tong Zhao, a fellow at the Carnegie-Tsinghua Center for Global Policy, \"most experts argue that the most important reason to prioritize hypersonic technology development [in China] is the necessity to counter specific security threats from increasingly sophisticated U.S. military technology, including [hypersonic weapons].\" In particular, China's pursuit of hypersonic weapons, like Russia's, reflects a concern that U.S. hypersonic weapons could enable the United States to conduct a preemptive, decapitating strike on China's nuclear arsenal and supporting infrastructure. U.S. missile defense deployments could then limit China's ability to conduct a retaliatory strike against the United States. China has demonstrated a growing interest in Russian advances in hypersonic weapons technology, conducting flight tests of a hypersonic-glide vehicle (HGV) only days after Russia tested its own system. Furthermore, a January 2017 report found that over half of open-source Chinese papers on hypersonic weapons include references to Russian weapons programs. This could indicate that China is increasingly considering hypersonic weapons within a regional context. Indeed, some analysts believe that China may be planning to mate conventionally armed HGVs with the DF-21 and DF-26 ballistic missiles in support of an anti-access/area denial strategy. China has reportedly not made a final determination as to whether its hypersonic weapons will be nuclear- or conventionally-armedâor dual-capable. China has conducted a number of successful tests of the DF-17, a medium-range ballistic missile specifically designed to launch HGVs. U.S. intelligence analysts assess that the missile has a range of approximately 1,000 to 1,500 miles and could be deployed in 2020. China has also tested the DF-41 intercontinental ballistic missile, which could be modified to carry a conventional or nuclear HGV, according to a report by a U.S. Congressional commission. The development of the DF-41 thus \"significantly increases the [Chinese] rocket force's nuclear threat to the U.S. mainland,\" the report states. China has tested the DF-ZF HGV (previously referred to as the WU-14) at least nine times since 2014. U.S. defense officials have reportedly identified the range of the DF-ZF as approximately 1,200 miles and have stated that the missile may be capable of performing \"extreme maneuvers\" during flight. Although unconfirmed by intelligence agencies, some analysts believe the DF-ZF will be operational as early as 2020. According to U.S. defense officials, China also successfully tested Starry Sky-2 (or Xing Kong-2), a nuclear-capable hypersonic vehicle prototype, in August 2018. China claims the vehicle reached top speeds of Mach 6 and executed a series of in-flight maneuvers before landing. Unlike the DF-ZF, Starry Sky-2 is a \"waverider\" that uses powered flight after launch and derives lift from its own shockwaves. Some reports indicate that the Starry Sky-2 could be operational by 2025. U.S. officials have declined to comment on the program. China has a robust research and development infrastructure devoted to hypersonic weapons. USD (R&E) Michael Griffin stated in March 2018 that China has conducted 20 times as many hypersonic tests as the United States. China tested three hypersonic vehicle models (D18-1S, D18-2S, and D18-3S)âeach with different aerodynamic propertiesâin September 2018. Analysts believe that these tests could be designed to help China develop weapons that fly at variable speeds, including hypersonic speeds. Similarly, China has used the Lingyun Mach 6+ high-speed engine, or \"scramjet,\" test bed ( Figure 3 ) to research thermal resistant components and hypersonic cruise missile technologies. According to Jane's Defence Weekly , \"China is also investing heavily in hypersonic ground testing facilities.\" CAAA operates the FD-02, FD-03, and FD-07 hypersonic wind tunnels, which are capable of reaching speeds of Mach 8, Mach 10, and Mach 12, respectively. China also operates the JF-12 hypersonic wind tunnel, which reaches speeds of between Mach 5 and Mach 9, and the FD-21 hypersonic wind tunnel, which reaches speeds of between Mach 10 and Mach 15. China is expected to have an operational wind tunnel capable of reaching speeds of Mach 25 by 2020. China is known to have tested hypersonic weapons at the Jiuquan Satellite Launch Center and the Taiyuan Satellite Launch Center. As Congress reviews the Pentagon's plans for U.S. hypersonic weapons programs during the annual authorization and appropriations process, it might consider a number of questions about the rationale for hypersonic weapons, their expected costs, and their implications for strategic stability and arms control. This section provides an overview of some of these questions. Although the Department of Defense is funding a number of hypersonic weapons programs, it has not established any programs of record, suggesting that it may not have approved requirements for hypersonic weapons or long-term funding plans. Indeed, as Assistant Director for Hypersonics (USD R&E) Mike White has stated, DOD has not yet made a decision to acquire hypersonic weapons and is instead developing prototypes to \"[identify] the most viable overarching weapon system concepts to choose from and then make a decision based on success and challenges.\" As Congress conducts oversight of U.S. hypersonic weapons programs, it may seek to obtain information about DOD's evaluation of potential mission sets for hypersonic weapons, a cost analysis of alternative means of executing these mission sets, and an assessment of the enabling technologiesâsuch as space-based sensors or autonomous command and control systemsâthat may be required to employ or defend against hypersonic weapons. Assistant Director for Hypersonics (USD R&E) Mike White has noted that DOD is prioritizing offensive programs while it determines \"the path forward to get a robust defensive strategy.\" This approach is reflected in DOD's FY2021 request, which allocates $206.8 million for hypersonic defense programsâof a total $3.2 billion request for all hypersonic-related research. Similarly, in FY2020, DOD requested $157.4 million for hypersonic defense programsâof a total $2.6 billion for all hypersonic-related research. Although the Defense Subcommittees of the Appropriations Committees increased FY2020 appropriations for both hypersonic offense and defense above the FY2020 request, they expressed concerns, noting in their joint explanatory statement of H.R. 1158 \"that the rapid growth in hypersonic research has the potential to result in stove-piped, proprietary systems that duplicate capabilities and increase costs.\" To mitigate this concern, they appropriated $100 million for DOD to establish a Joint Hypersonic Transition Office to \"develop and implement an integrated science and technology roadmap for hypersonics\" and \"establish a university consortium for hypersonic research and workforce development\" in support of DOD efforts. Given the lack of defined mission requirements for hypersonic weapons, it may be challenging for Congress to evaluate the balance of funding for hypersonic weapons programs, enabling technologies, supporting test infrastructure, and hypersonic missile defense. Analysts disagree about the strategic implications of hypersonic weapons. Some have identified two factors that could hold significant implications for strategic stability: the weapon's short time-of-flightâwhich, in turn, compresses the timeline for responseâ and its unpredictable flight pathâwhich could generate uncertainty about the weapon's intended target and therefore heighten the risk of miscalculation or unintended escalation in the event of a conflict. This risk could be further compounded in countries that co-locate nuclear and conventional capabilities or facilities . Some analysts argue that unintended escalation could occur as a result of warhead ambiguity, or from the inability to distinguish between a conventionally armed hypersonic weapon and a nuclear-armed one. However, as a United Nations report notes, \"even if a State did know that an HGV launched toward it was conventionally armed, it may still view such a weapon as strategic in nature, regardless of how it was perceived by the State firing the weapon, and decide that a strategic response was warranted.\" Differences in threat perception and escalation ladders could thus result in unintended escalation. Such concerns have previously led Congress to restrict funding for conventional prompt strike programs. Other analysts have argued that the strategic implications of hypersonic weapons are minimal. Pavel Podvig, a senior research fellow at the United Nations Institute for Disarmament Research, has noted that the weapons \"don't â¦ change much in terms of strategic balance and military capability.\" This, some analysts argue, is because U.S. competitors such as China and Russia already possess the ability to strike the United States with intercontinental ballistic missiles, which, when launched in salvos, could overwhelm U.S. missile defenses. Furthermore, these analysts note that in the case of hypersonic weapons, traditional principles of deterrence hold: \"it is really a stretch to try to imagine any regime in the world that would be so suicidal that it would even think threating to useânot to mention to actually useâhypersonic weapons against the United States ... would end well.\" Some analysts who believe that hypersonic weapons could present a threat to strategic stability or inspire an arms race have argued that the United States should take measures to mitigate risks or limit the weapons' proliferation. Proposed measures include expanding New START, negotiating new multilateral arms control agreements, and undertaking transparency and confidence-building measures. The New START Treaty, a strategic offensive arms treaty between the United States and Russia, does not currently cover weapons that fly on a ballistic trajectory for less than 50% of their flight, as do hypersonic glide vehicles and hypersonic cruise missiles. However, Article V of the treaty states that \"when a Party believes that a new kind of strategic offensive arm is emerging, that Party shall have the right to raise the question of such a strategic offensive arm for consideration in the Bilateral Consultative Commission (BCC).\" Accordingly, some legal experts hold that the United States could raise the issue in the BCC of negotiating to include hypersonic weapons in the New START limits. However, because New START is due to expire in 2021, unless extended through 2026, this solution is likely to be temporary. As an alternative, some analysts have proposed negotiating a new international arms control agreement that would institute a moratorium or ban on hypersonic weapon testing. These analysts argue that a test ban would be a \"highly verifiable\" and \"highly effective\" means of preventing a potential arms race and preserving strategic stability. Other analysts have countered that a test ban would be infeasible, as \"no clear technical distinction can be made between hypersonic missiles and other conventional capabilities that are less prompt, have shorter ranges, and also have the potential to undermine nuclear deterrence.\" These analysts have instead proposed international transparency and confidence-building measures, such as exchanging weapons data; conducting joint technical studies; \"providing advance notices of tests; choosing separate, distinctive launch locations for tests of hypersonic missiles; and placing restraints on sea-based tests.\" ", "summary": "The United States has actively pursued the development of hypersonic weaponsâmaneuvering weapons that fly at speeds of at least Mach 5âas a part of its conventional prompt global strike program since the early 2000s. In recent years, the United States has focused such efforts on developing hypersonic glide vehicles, which are launched from a rocket before gliding to a target, and hypersonic cruise missiles, which are powered by high-speed, air-breathing engines during flight. As Vice Chairman of the Joint Chiefs of Staff and former Commander of U.S. Strategic Command General John Hyten has stated, these weapons could enable \"responsive, long-range, strike options against distant, defended, and/or time-critical threats [such as road-mobile missiles] when other forces are unavailable, denied access, or not preferred.\" Critics, on the other hand, contend that hypersonic weapons lack defined mission requirements, contribute little to U.S. military capability, and are unnecessary for deterrence. Funding for hypersonic weapons has been relatively restrained in the past; however, both the Pentagon and Congress have shown a growing interest in pursuing the development and near-term deployment of hypersonic systems. This is due, in part, to the growing interest in these technologies in Russia and China, both of which have a number of hypersonic weapons programs and are expected to field an operational hypersonic glide vehicleâpotentially armed with nuclear warheadsâas early as 2020. The United States, in contrast to Russia and China, is not currently considering or developing hypersonic weapons for use with a nuclear warhead. As a result, U.S. hypersonic weapons will likely require greater accuracy and will be more technically challenging to develop than nuclear-armed Chinese and Russian systems. The Pentagon's FY2021 budget request for all hypersonic-related research is $3.2 billionâup from $2.6 billion in the FY2020 requestâincluding $206.8 million for hypersonic defense programs. At present, the Department of Defense (DOD) has not established any programs of record for hypersonic weapons, suggesting that it may not have approved either requirements for the systems or long-term funding plans. Indeed, as Assistant Director for Hypersonics (Office of the Under Secretary of Defense for Research and Engineering) Mike White has stated, DOD has not yet made a decision to acquire hypersonic weapons and is instead developing prototypes to assist in the evaluation of potential weapon system concepts and mission sets. As Congress reviews the Pentagon's plans for U.S. hypersonic weapons programs, it might consider questions about the rationale for hypersonic weapons, their expected costs, and their implications for strategic stability and arms control. Potential questions include the following: What mission(s) will hypersonic weapons be used for? Are hypersonic weapons the most cost-effective means of executing these potential missions? How will they be incorporated into joint operational doctrine and concepts? Given the lack of defined mission requirements for hypersonic weapons, how should Congress evaluate funding requests for hypersonic weapons programs or the balance of funding requests for hypersonic weapons programs, enabling technologies, and supporting test infrastructure? Is an acceleration of research on hypersonic weapons, enabling technologies, or hypersonic missile defense options both necessary and technologically feasible? How, if at all, will the fielding of hypersonic weapons affect strategic stability? Is there a need for risk-mitigation measures, such as expanding New START, negotiating new multilateral arms control agreements, or undertaking transparency and confidence-building activities?", "document_type": "crs"}
{"report": "Both legislators and regulators have expressed concern about the safety and effectiveness of prescription drugs prescribed for \"off-label uses\"âpurposes other than those for which the Food and Drug Administration (FDA) has approved their sale. Two recent incidents illustrate the bases for those concerns. The first involves a drug already on the market. Safety experts raised concerns about ketamine, a drug available as an injectable anesthetic. They noted that physicians have created outpatient clinics to administer intravenous ketamine in an off-label use to treat depression and migraines. FDA has not reviewed clinical data that could support the clinics' promotional claims of safety and effectiveness. In August 2018, a second incident occurred in a Texas courtroom. Astra Zeneca settled a case concerning its alleged promotion of Seroquel for uses other than those for which it had sought and obtained FDA approval for sale in the United States. The core of the complaint by the state of Texas was that the company promoted the drug's use in children, although the FDA-approved labeling of the drug was for adult use. It was one of a number of settlements since 2000 resulting in payments by drug companies for the promotion of off-label uses. To help understand the issues involving off-label use, and how these issues might concern Congress, this report addresses five questions: What is drug labeling? What is off-label use? How are off-label prescriptions used in medicine today? What are the risks and benefits associated with off-label prescriptions? What concerns, if any, does Congress have about such prescriptions? If Congress wanted to do something about off-label prescriptions, what would be some of the options? To market a prescription drug in the United States, a manufacturer needs FDA approval. To obtain that approval, the manufacturer must demonstrate the drug's safety and effectiveness according to criteria specified in law and agency regulations. It must also ensure that its manufacturing plant passes FDA inspection. Finally, it must obtain FDA approval for the drug's labelingâa term that covers all written material about the drug, including, for example, packaging, prescribing information for physicians, and patient brochures. FDA, thus, approves the drug and its labeling for a specific use. That use specifies the disease or condition, the population, and the way the drug is packaged and administered. When a physician prescribes a drug for reasons other than those specified in the FDA approval and labeling, the medical profession considers this to be off-label use . FDA regulates the drug and the manufacturer. Each state regulates clinicians and pharmacies. A licensed physician mayâexcept in highly restricted circumstances âprescribe the approved drug without limitation. A prescription to an individual whose demographic or medical characteristics differ from those indicated in a drug's FDA-approved labeling is accepted medical practice. In a 2006 study of drug prescribing by office-based physicians, 21% of prescriptions were written for off-label uses. Of those off-label prescriptions, the study's authors found that 27% were backed by strong scientific support. A 2016 Canadian study of primary care clinics found an overall rate of 12% of prescriptions for off-label uses. The percentage varied, however, by therapeutic class, ranging from 5% for ear, nose, and throat medications to 25% for central nervous system medications. An econometric model from the National Ambulatory Medical Care Survey estimated a 38% rate of off-label use. Research has shown that more than half of oncology drug use is off-label. A 2018 study examined 43 FDA-approved cancer drugs and compared their 99 labeled uses with the acceptable uses published by a national compendium Medicare relies on to make coverage decisions. Of the 451 compendium-accepted uses, 56% were off-label. Of the off-label uses, the authors deemed 91% as \"well-accepted off-label use.\" History. Drug labeling has been central to FDA's role as a protector of the public's health since 1906. That year, Congress (1) required that sellers state on a drug's label the \"quantity or proportion of any alcohol [or] opium\" contained, and (2) considered as \"misbranded\" any drug whose label was \"false or misleading.\" Requirements that drugs be safe were not established until 1938. Congress did not require they be effective until 1962. Requirements. Today, a drug's labeling is more than the sticker the pharmacy places on the amber vial it dispenses to a customer. The Federal Food, Drug, and Cosmetics Act (FFDCA) and associated FDA regulations require and describe a product's labeling as \"a compilation of information about the product, approved by FDA, based on the agency's thorough analysis of the new drug application (NDA) or biologics license application (BLA) submitted by the applicant. This labeling contains information necessary for safe and effective use.\" FDA requires that labeling begin with a highlights section that includes, if appropriate, black-box warnings, so called because their black borders signify importance. The regulations list the required elements of labeling: Value. Labeling plays a major role in the presentation of safety and effectiveness information. For clinicians, it is a primary source of prescribing information. The manufacturer submits the approved labeling for publication in the widely used Physician's Desk Reference . That labeling also serves as the basis for several patient-focused information sheets that manufacturers, pharmacy vendors, and many web-based drug information sites produce. Off-label prescribing can reflect cutting-edge clinical expertise. It can also be a response to price: a physician may choose to prescribe a lower-priced drug instead of a specifically labeled higher-priced one. Or a physician may prescribe off-label in an attempt to try a different treatment approach when other options have failed. Sometimes an off-label use becomes so widespread that it becomes accepted practice. However, without the backing of carefully designed clinical trials and expert analysis, it remains unknown whether the drug is, in fact, safe and effective for the off-label use. Also unknown are dosing details and systematically evaluated associated adverse events. Examples of off-label use include a drug tested for the treatment of one disease prescribed in an attempt to prevent or treat another; a drug tested at one dose used at higher or lower doses; a drug tested in adults prescribed to children; and a drug tested in an eight-week trial prescribed for long-term use. Table 1 lists several examples of FDA-approved drugs widely prescribed for off-label uses. Although FDA materials do not list off-label uses, several drug compendia include both labeled and off-label uses. For Medicare coverage, for example, the Social Security Act defines \"medically accepted indication\" as those, in addition to uses approved by FDA, that have been evaluated and supported and listed in one of several compendia, or for which there is \"supportive clinical evidence in peer reviewed medical literature.\" Why has Congress given FDA the authority to regulate whether a drug may be on the U.S. market? Two key reasons: to protect patients and to encourage research in a competitive pharmaceutical industry. By statute and regulation, FDA now approves a drug for a specific use once its sponsor (usually the manufacturer) has provided sufficient evidence that the drug is safe and effective for that use. FDA has developed procedures for the review of that evidence. The FDA-approved labeling, which informs the clinician about dosing and likely and unlikely adverse events, helps protect the individuals for whom the drug is prescribed. Labeling also helps protect the interests of the manufacturers who invest in the clinical trials that demonstrate safety and effectiveness. For new drugs and new uses of already approved drugs, the sponsor receives a period of market protection, in the form of regulatory exclusivity for the sale of the drug for those uses. Payorsâsuch as private health insurers or Medicareâbenefit from FDA-approved labeling in their evaluation of whether to pay for a drug's use. But use of a drug evolves as clinicians (and the manufacturer) share their experiences regarding off-label uses, which, by definition, were not part of the premarket clinical studies used to obtain FDA approval. Off-label use can benefit patients. In some instances, such as in the treatment of rare diseases, clinical practice may use drugs approved for other indications. A manufacturer may choose not to invest in trials for such a small patient group. A patient whose physician is already prescribing the drug off-label may not want to enroll in a clinical trial where there is a chance he or she may be assigned to the placebo group. Once drugs are well-established in off-label uses, manufacturers rarely design studies to determine or verify the safety and effectiveness of such uses. Individuals and groups wanting to conduct such studies may find it hard to obtain funding. Examples of adverse events (AEs) associated with the use of drugs for specific off-label uses include heart valve damage from the use of fenfluramine and phentermine (fen-phen) for weight loss, and seizures from the use of tiagabine hydrochloride for depression. Using a Canadian primary care database that captured all prescriptions, the reason for each prescription, and adverse events, researchers looked at the rate of AEs for on-label use, off-label use associated with \"strong scientific evidence,\" and off-label use without such evidence. They found more AEs for off-label prescriptions than for on-label prescriptions. However, off-label use associated with strong scientific evidence had similar rates of AEs as did on-label uses. The increased risk of AEs for off-label use was concentrated in those uses without strong scientific evidence. Manufacturers benefit from sales for off-label uses. However, they risk losing that market should a competitor complete studies to obtain FDA approval and labeling for those uses. Researchers who are not supported by the manufacturer who try to assess the safety and effectiveness of off-label uses are hampered by the inexact nature of secondary data sources: the standard clinical trial data collection in preparation for an FDA application is not available for off-label uses. What may begin as hopeful and intermittent off-label use may gain momentum and offer opportunities for planned studies. Drug and device companies argue that current regulations prevent them from distributing important information to physicians and payors about unapproved, off-label uses of their products. In November 2016, FDA held a two-day public meeting to hear from various groups regarding off-label uses of approved or cleared medical products. In June 2018, FDA issued final guidances explaining the agency's policy about medical product communications that include data and information not contained in FDA-approved labeling. One FDA guidance document, in particular, described the types of information that a manufacturer could provide payors and formulary committees about unapproved uses of approved products. FDA made two points especially relevant to off-label uses. First, FDA differentiates among its audiences in its presentation of information. The material it allows in product labeling is directed to a clinical audience. FDA staff have reviewed the information and require that it be presented in a way that is understandable by individual clinicians, who often do not have the statistical sophistication or data analysis skills or resources to fully evaluate the claims of manufacturers. This guidance notes, though, that payors and formulary committees do have such expertise and resources. FDA also acknowledges that it is useful for payors to have information in their decisions on coverage, but it wants to ensure that the information manufacturers provide is not misleading. Second, the FDA guidance describes what harm could come from allowing more sharing of information about off-label use. Some firm communications regarding unapproved products or unapproved uses of approved/cleared/licensed medical products may potentially undermine substantial government interests related to health and safety. These interests include motivating the development of robust scientific data on safety and efficacy; maintaining the premarket review process for safety and efficacy of each intended use in order to prevent harm, to protect against fraud, misrepresentation, and bias, and to develop appropriate instructions for use for medical products; protecting the integrity and reliability of promotional information regarding medical product uses; and preventing the diversion of health care resources toward ineffective treatments. The concerns FDA raised in the June 2018 final guidance documents might explain why Congress may be interested in exploring the issue of off-label use further. Congress has developed a system to protect the public by ensuring that drugs sold in the United States have met clinical and manufacturing standards of safety and effectiveness. Labeling is the mechanism that bridges the regulated drug and the use of that drug in clinical practice. The labeling establishes the uses for which the manufacturer has demonstrated safety and effectiveness to FDA's satisfaction. Congress and the FDA have tried several approaches, using labeling as a tool, to reduce the risk to patients. Table A-1 includes examples of congressional and FDA actions to expand the information provided in a drug's labeling. The actions have addressed topics such as content labeling, directions for use, permissible and prohibited advertising, research incentives to support labeling specific to population subgroups (e.g., children), criteria for Medicare coverage, required and permissible labeling changes, and balance of benefit and risk information in labeling and advertising. Manufacturers, meanwhile, want to be able to provide information to insurers and other entities (such as the Centers for Medicare and Medicaid Services [CMS] and hospital pharmacy and therapeutics committees) that decide whether to cover a drug in a policy and whether to limit reimbursement for specific uses. Congress has provided some leeway relative to its earlier prohibition on promotional activities. For example, in 2016, it broadened the types of health care economic information drug and device manufacturers could provide to payors (e.g., insurance companies). Although the underlying FFDCA section continues to exclude information related only to an off-label use, it now requires \"a conspicuous and prominent statement describing any material differences between the health care economic information and the labeling approved for the drug.\" Several bills concerning off-label use have been introduced that would have expanded the information that manufacturers could provide about off-label uses. For example, the Subcommittee on Health of the House Committee on Energy and Commerce marked up H.R. 2026 (115 th Congress), the Pharmaceutical Information Exchange Act, in January 2018, which would have allowed the provision of scientific information to payors, in addition to health care economic information. Then-Subcommittee Chair Michael Burgess, in commenting on the bill's effort to clarify how manufacturers can share \"if it is based on competent and reliable evidence,\" expressed strong support for the bill. He noted \"the importance of cutting edge information in medicine and science to optimize patient care and outcomes â¦ and [how the bill] could have the potential to save patients' lives.\" Then-Ranking Member (now, Chair) Frank Pallone, Jr., though, argued that the ability to communicate about off-label use \"had great potential to undermine\" FDA's approval process and to \"hamstring\" its enforcement efforts. H.R. 2026 passed the subcommittee, although it did not reach the floor in the 115 th Congress. Off-label use presents both opportunities and risks to clinicians, patients, manufacturers, and researchers. At times, those interests clash. Academics, public health organizations, and journals have suggested what actions Congress might take based on their particular concerns regarding off-label prescriptions. These actions include both direct legislation and oversight activities to encourage action by other entities. The 116 th Congress might consider some of these varied approaches, summarized in the issues described below. Disclosure to patients. Most individuals, unaware of the nuances of FDA regulation, may not know that physicians may prescribe drugs for uses that FDA has not reviewed for safety and effectiveness. Several potential opportunities for providing this information exist. Congress could require or work with the states to require that the prescriber inform the patient about the off-label use and describe the meaning of off-label use; the prescriber note in the prescription why the drug is being prescribed; or the pharmacist inform the patient that the use is off-label. Data collection and availability. FDA, under federal law, determines whether a drug requires a prescription. The states, under their individual laws, determine what information the prescription order contains. Because clinicians do not need to note on the prescription order why they are prescribing a drug (e.g., simvastatin for high cholesterol or citalopram for depression), the information in pharmacy, administrative, and clinical databases often cannot directly identify off-label uses. Therefore, as Congress and other public policy groups consider whether and how to address off-label drug prescribing, they do not have adequate information on the scope and details of the practice. Congress could require or work with the states to encourage clinicians to note on prescriptions the reason for medication use (e.g., the specific condition, disease, or symptom), thereby allowing that information to appear in pharmacy databases, which would enable focused analysis of off-label uses; the establishment of confidential registries of off-label prescribing and follow-up information that FDA (or other designated scientifically appropriate agencies) could use in its electronic surveillance systems to identify associated adverse events and other drug use problems; or FDA to increase its surveillance of available data sources, such as registries and administrative and clinical databases, to identify patterns of off-label use and evidence suggesting effectiveness and associated adverse events. Dissemination. Because some information may be valuable to clinicians and entities that influence prescribing decisions (such as insurers and pharmacy and therapeutics committees), Congress could allow manufacturers to disseminate information about off-label uses that they have developed or of which they are aware, perhaps subject to certain limitations or accompanying reporting requirements. Possibilities include broader sharing of clinical analyses of off-label use with coverage deciders (e.g., CMS, insurers, pharmacy and therapeutics committees) to support requests that they cover a particular use of the drug; and dissemination of clinical analyses of off-label use at clinical and pharmaceutical conferences. Oversight. With an estimated 12% to 38% of all prescriptions' (and 56% of oncology prescriptions') being written for uses not listed on FDA-approved labeling, valid information on the extent of off-label use and the effect of such use on manufacturer, insurer, and clinician behavior could potentially better inform debate on how to best protect the public's health. Congress could direct the Government Accountability Office (GAO) to study the extent of off-label use in government-provided care (e.g., Department of Veterans Affairs, Bureau of Prisons, and Indian Health Service) and in government-funded care (e.g., Medicare and Medicaid); the Secretary of Health and Human Services (HHS) to contract with the National Academy of Medicine or a similar organization to assemble management or industrial policy experts to study the costs and rewards to industry of off-label prescriptions; or FDA and the Federal Trade Commission to investigate drugs whose off-label prescriptions account for a particularly high percentage of all prescriptions or that generate a particularly high percentage or high dollar value of sales. Pricing. The decision to use a drug off-label based solely or primarily on price introduces a new element to study. For example, the pricing difference between Avastin and Lucentis, both made by the same manufacturer with the same active ingredient, is so large that many ophthalmologists use the lower priced Avastin in their treatment of macular degeneration, despite its being an off-label use. The manufacturer included the treatment of macular degeneration in its application to FDA for Lucentis. To explore the ramifications of a traditionally nonclinical element in prescribing decisions, Congress could require the HHS Secretary to study the relationship among pricing, access, and prescribing and its effect on patient safety. Reimbursement. Although FDA approval of a drugânot for each use of a drugâis a requirement for sale in the United States, the decision to reimburse a physician or patient for a drug is made by entities such as the CMS and private insurers. Such decisions, therefore, influence what drugs are prescribed and, in part, for what uses drugs are prescribed. Congress could direct the HHS Secretary to study such coverage decisions or to contract with the National Academy of Medicine or a similarly equipped entity to do so; or HHS to form a task force to include CMS and FDA, along with private insurers and others involved in coverage decisions, and patient and clinician groups representing those affected by coverage decisions, to identify areas in need of action and to recommend steps in those directions. Congress also could encourage payors to require safety and effectiveness evidence before covering off-label uses. Research. The traditional path toward adding an indication (reason for use) to the labeling of a drug already approved for other uses has been for the sponsor of the drug to conduct clinical trials and submit a supplemental new drug application (NDA) to FDA. The widespread extent of off-label use suggests that relying on that model is not helping prescribers get better information. Congress could consider assigning responsibility (and funding) to the National Institutes of Health and the Patient-Centered Outcomes Research Institute for safety and effectiveness evaluations of off-label uses; or requiring, for a drug that has substantial (to be defined) off-label sales, that the manufacturer fund studies, such as clinical trials, to assess the safety and effectiveness of the drug for the off-label use and submit evidence to the HHS Secretary. Depending on the Secretary's assessment of the evidence, the Secretary could request that the manufacturer amend the drug's labeling either to add the off-label use to the label as an approved use or to add a statement that clinical evidence does not support the safety and effectiveness of the drug for the off-label use. Research transparency. FDA regulations describe standards for the design and analysis of clinical trials that a sponsor uses in an NDA. Studies done by or for the manufacturer or by other groups or individuals are not always made public, in which case their findings cannot be reviewed and evaluated. Because the results of such studies may be used in support of off-label uses, by providing positive and negative incentives, Congress could consider requiring or encouraging prospective posting of the designs and statistical plans of studies of off-label uses; or public reporting of studies of off-label use. Clinical guidance. Professional societies and other clinical groups often supplement the information available to prescribers from FDA-approved labeling, medical journals, and information from manufacturers. They can issue guidelines and recommend best practices. Congress could engage such groups and encourage professional societies to develop evidence-based clinical guidelines and training regarding off-label use. Precedents from other countries. The United States is not alone in facing the health care and economic implications of off-label use. For example, the member countries of the European Union have addressed measures involving reimbursement, guidance for prescribers, professional standards, and informed consent. Congress could require HHS to contract with the National Academy of Medicine or a similarly equipped entity to review measures taken by the European Union and other regulatory bodies and recommend legislative or administrative actions as appropriate. Concerns over off-label use overlap with questions raised by some legislators and regulators in other contexts. In addition to clearly related issues such as what is allowable information in direct-to-consumer advertising, promotion to clinicians, and material shared with payors and insurers, off-label use also affects the entire basis of FDA regulation of drugs through its authority to approve drugs. That means it directly or indirectly affects research, clinical innovation, transparency, patents and exclusivities, pricing, and access. Changes in law or regulation in any one area may have benefits in some areas and drawbacks in others. For example, FDA's initiative to encourage research in drugs used traditionally but never reviewed and approved by FDAâso-called legacy drugsâstems from its desire for evidence of safety and effectiveness. Such evidence helps protect patients from possible use of ineffective, unsafe, or misdosed drugs. That initiative, in turn, helps enable sponsors to conduct the clinical trials, submit new drug applications, obtain regulatory exclusivity with the new drug approvalâand then raise the price of the new branded product while expecting FDA to honor the exclusivity and block the sale of the drug by others. For example, clinicians had been prescribing a compounded version of progestin for use in preventing preterm delivery. Such use had never been adequately tested in clinical trials. One company conducted those trials, and FDA approved its new drug application. The initial price for the new drug, Makena, was $30,000 for a 20-week course; patients had been paying pharmacists $200-$400 for the same course. Unanticipated price increases can also arise from the apparent following of FDA procedures. For example, a new owner of the FDA-approval of an old antiparasitic generic drug raised the price from $14 per tablet to $750, Daraprim's initial price. Such sudden and large price increases become a barrier to patient access and, therefore, a potential threat to health. In the case of off-label prescribing, actions in any directionâwhether by Congress, FDA, or the courtsâcould have both intended and unanticipated effects. Actions to limit off-label prescribing could have the intended effects of reducing safety risks and the economic cost of using drugs ineffective for their prescribed purposes. Such limits, however, could also stifle informed clinical exploration. Similarly, incentives to mount clinical trials needed to add an indication to the label could help identify and disseminate information on dosing and contradictions. Such incentives, however, could also hurt. For example, a brand drug that added a new indication to its labeling could prevent, through exclusivities, generics from similarly modifying their labeling. Patients could need to pay more. The recent debates over the right-to-try movement regarding use of investigational drugs by terminally ill patients may preview discussion about any proposed restrictions on off-label use. The Goldwater Institute, considered a key impetus to development and passage of the 2018 enactment of a right-to-try act, looks to diminish government's role in an individual's choice and has supported dissemination of off-label information. Congress has built a process in which a robust FDA can regulate drugs to protect the public's health. Is there cause for concern that perhaps a third of prescriptions are for off-label uses and that, in at least one study, three-quarters of those had minimal or no accepted scientific evidence to support their use? Policy tension exists over the line between wanting to ensure individuals' freedom to take drugs for off-label uses and wanting to protect the public from the risk of unsafe or ineffective drugs. Where to draw that lineâand how to know when it may be time to move the lineâis of continuing interest to regulators and legislators.", "summary": "When the Food and Drug Administration (FDA) approves a drug for sale in the United States, the approval includes a section entitled \"Indications for Use.\" This section lists the one or more diseases, conditions, or symptoms for which the drug's sponsor (usually the manufacturer) has provided, to FDA's satisfaction, evidence in support of the drug's safety and effectiveness. FDA approval is also based on its review of the drug's dosage, packaging, manufacturing plan, and labeling. Before changing any of those elements, the sponsor must inform, and usually receive permission from, FDA. In essence, FDA regulates all approval and post-approval aspects of a drug product. But FDA traditionally has not regulated the practice of medicine. Physicians, therefore, may prescribe an FDA-approved drug for indications that FDA has not reviewed for safety and effectiveness. Those uses, furthermore, are not addressed in the labeling information regarding, among other things, dosing, warnings about interactions with other drugs, and possible adverse events. How Are Off-Label Prescription Drugs Used? Prescribing for so-called off-label uses can be accepted medical practice, often reflecting cutting-edge clinical expertise. For example, this is the case with oncology drug use, more than half of which is off-label. Off-label prescribing can be a reasonable choice when labeling overlooks certain populationsâfor example, when a drug tested in adults is prescribed to children. A drug may be used off-label when it was tested for the treatment of one disease and prescribed in an attempt to prevent or treat another, when it was tested at one dose and used at higher or lower doses, or when it was tested in an eight-week trial and prescribed for long-term use. Estimates for how common off-label prescriptions are in the United States are hardly precise. Credible researchers have estimated they make up as little as 12% and as much as 38% of doctor-office prescriptions. What Are the Risks of Off-Label Prescriptions? Prescriptions for off-label uses of FDA-approved drugs are made without the benefit of an FDA-reviewed analysis of safety and effectiveness data. Physicians may resort to such prescribing to take advantage of new ideas and treatment approaches when available information to support them is inadequate. However, despite the potential risks associated with off-label uses, efforts to prohibit such uses might hurt the public. Some off-label prescribing may result because manufacturers have chosen not to invest the resources needed to have FDA add indications to the drug's approval and labeling. A worst-case scenario for the nation's health would be the widespread acceptance of a drug for an off-label use that sufficient research would have revealed to be ineffective, unsafe, or both. Aside from the drug's direct harm, the time spent waiting to see whether it worked would have been time not spent exploring other treatment options. Unchecked off-label prescribing may also threaten the FDA gold standard of drug approval. If clinicians had already accepted a new use into practice through off-label prescribing, a manufacturer may choose to not invest resources to go through clinical trials and the FDA process to win approval. Although manufacturers do share information on off-label uses, courts have sometimes found they had overstepped allowable bounds. Congress has given permission for limited sharing. Are there other ways to share clinical information that do not put the public's health or FDA's authority at risk? What Role Can Congress Play in the Use of Off-Label Prescriptions? How might Congress, in its legislative or oversight roles, consider the use of off-label drugs to protect the public's health? Legislators and health analysts have suggested both restrictive and permissive actions regarding off-label use. Ideasâsome of which conflict with othersâinclude disclosure to patients; data collection, availability, and analysis; dissemination of clinical data; linking reimbursement and coverage to evidence of safety and effectiveness; clinical research and research transparency; clinical guidance; congressional oversight through the Government Accountability Office, the Federal Trade Commission, and the Department of Health and Human Services; and consideration of other countries' approaches to off-label use. Some actions would require federal legislation. Other proposals would involve actions by other entities, such as state authorities and professional organizations, which Congress could urge.", "document_type": "crs"}
{"report": "The National Flood Insurance Program (NFIP) is the primary source of flood insurance coverage for residential properties in the United States, with more than five million policies in over 22,000 communities in 56 states and jurisdictions. The program collects about $4.6 billion in annual revenue from policyholders' premiums, fees and surcharges and provides over $1.3 trillion in coverage. The NFIP was established by the National Flood Insurance Act of 1968. The general purpose of the NFIP is both to offer primary flood insurance to properties with significant flood risk, and to reduce flood risk through the adoption of floodplain management standards. A longer-term objective of the NFIP is to reduce federal expenditure on disaster assistance after floods. The Federal Emergency Management Agency (FEMA), which administers the NFIP, is planning to introduce Risk Rating 2.0 , which represents the biggest change to the way the NFIP calculates flood insurance premiums since its inception. The new rates are scheduled to go into effect on October 1, 2021, for all NFIP policies. The price of insurance is generally based on three components: (1) the average annual loss, which is the expected loss per year; (2) the risk, which depends on the variability or uncertainty in loss estimates; and (3) expenses. These rating factors are used to calculate the premium that is sufficient to cover expected losses. The methodologies used to estimate these components, particularly the average annual loss and the risk, have changed over the decades that the NFIP has been in operation. This report will outline how the NFIP currently rates risks and sets premiums to cover losses, and how these are expected to change with the introduction of Risk Rating 2.0. The NFIP's current rating structure follows general insurance practices in effect at the time that the NFIP was established and has not fundamentally changed since the 1970s. The current NFIP rating structure uses several basic characteristics to classify properties based on flood risks. Structures are evaluated by their specific flood zone on a Flood Insurance Rate Map (FIRM), occupancy type, and the elevation of the structure relative to the Base Flood Elevation (BFE). In addition, the premium structure includes estimates for the expenses of the NFIP, including servicing of policies. FEMA uses a nationwide rating system that combines flood zones across many geographic areas. Individual policies do not necessarily reflect topographical features that affect flood risk. FEMA calculates expected losses for groups of structures that are similar in flood risk and key structural aspects, and assigns the same rate to all policies in a group. For example, two properties that are rated as the same NFIP risk (e.g., both are one-story, single-family dwellings with no basement, in the same flood zone, and elevated the same number of feet above the BFE ) , are charged the same rate per $100 of insurance, although they may be located in different states with differing flood histories or rest on different topography, such as a shallow floodplain as opposed to a steep river valley. In addition, two properties in the same flood zone are charged the same rate, regardless of their location within the zone. FEMA's current efforts to model risk consider only the potential for coastal storm surge and fluvial (river) flooding. The NFIP expresses flood risk in terms of the expected economic loss due to inundation and the probability of that loss. Information about the flood hazard is determined through NFIP flood studies, the vulnerability of the structure being insured, and the performance of certain flood protection measures. This is incorporated into a flood risk assessment, which yields an estimate of the average annual loss. The insurance rate is determined from this loss after adjusting for expenses, deductibles, underinsurance (because not all structures are insured to their full value), and other factors. In inland areas, NFIP flood studies focus on a river's watershed, the topography along the river and adjacent floodplain where structures are located, and the hydraulic characteristics of the river and floodplain. In coastal areas, the studies also assess the effects of storm surge and wave action. Models of relevant physical processes are coupled with statistical models of weather events to compute flood depths and velocities, and their likelihood of occurring. The model prediction results are summarized in reports and portrayed on FIRMs which show water surface elevations, floodplain boundaries, and flood zones. An area of specific focus on the FIRM is the Special Flood Hazard Area (SFHA). Properties in an SFHA are subject to the mandatory purchase requirement, which requires owners of properties in the mapped SFHA, in a community that participates or has participated in the NFIP, to purchase flood insurance as a condition of receiving a federally backed mortgage. Within the SFHA, there are two broad flood zones, the A zone and the V zone. V zones are distinguished from A zones in that V zones are subject to wave action (i.e., coastal flooding). To calculate the premium, the current rating system considers the flood zone , the building occupancy type, the foundation type, the number of floors, the presence or not of a basement, whether the property is entitled to a subsidy, whether or not the property is a primary residence, prior claims, and the structure's elevation relative to the BFE. The amount of coverage and the deductible will also affect the premium. Except for certain subsidies, flood insurance rates in the NFIP are directed to be \"based on consideration of the risk involved and accepted actuarial principles,\" meaning that the rate is reflective of the true flood risk to the property. FEMA determines full-risk rates by estimating the probability of a given level of flooding, damage estimates based on that level of flooding, and accepted actuarial principles. However, Congress has directed FEMA not to charge actuarial rates for certain categories of properties and to offer subsidies or cross-subsidies to certain classes of properties in order to achieve the program's objectives so that that owners of certain existing properties in flood zones are able to afford flood insurance. There are three main categories of properties which pay less than full risk-based rates: 1. Those built or substantially improved before FEMA published the first post-1974 flood insurance rate map (FIRM); 2. Most properties newly mapped into a SFHA on or after April 1, 2015, if the applicant gets flood insurance coverage within a year of the mapping; and 3. Those that had flood insurance on the property that complied with a prior FIRM, but the property was remapped into a different rate class (a practice known as \"grandfathering\"). Pre-FIRM properties are those which were built or substantially improved before December 31, 1974, or before FEMA published the first FIRM for their community, whichever was later. By statute, premium rates charged on structures built before they were first mapped into a flood zone that have not been substantially improved, known as pre-FIRM structures, are allowed to have lower premiums than what would be expected to cover predicted claims. The availability of this pre-FIRM subsidy was intended to allow preexisting floodplain properties to contribute in some measure to pre-funding their recovery from a flood disaster instead of relying solely on federal disaster assistance. In essence, flood insurance could distribute some of the financial burden among those protected by flood insurance and the public. As of September 2018, approximately 13% of NFIP policies received a pre-FIRM subsidy. Historically, the total number of pre-FIRM policies is relatively stable, but the percentage of those policies by comparison to the total policy base has decreased. The Homeowner Flood Insurance Affordability Act of 2014 (HFIAA) established a new subsidy for properties that are newly mapped into a SFHA on or after April 1, 2015, if the applicant obtains coverage that is effective within 12 months of the map revision date. Certain properties may be excluded based on their loss history. The rate for eligible newly mapped properties is equal to the Preferred Risk Policy (PRP) rate, but with a higher Federal Policy Fee, for the first 12 months following the map revision. After the first year, the newly mapped rate begins to transition to a full-risk rate, with annual increases to newly mapped policy premiums calculated using a multiplier that varies by the year of the map change. As a result of the increases to the multiplier, premiums for newly-mapped policies are increasing 15% per year. As of September 2018, about 4% of NFIP policies receive a newly mapped subsidy. FEMA allows owners of properties that were built in compliance with the FIRM which was in effect at the time of construction to maintain their old flood insurance rate class if their property is remapped into a new flood rate class. This practice is colloquially referred to as grandfathering, and is separate and distinct from the pre-FIRM subsidy. A property can be grandfathered due to a change in its flood zone or a change in its BFE. Zone grandfathering is the most common form of grandfathering. An example of zone grandfathering would be a property that is initially mapped into a flood zone and is built to the proper building code and standards, and is later remapped to a higher-risk flood zone. If the policyholder has maintained continuous insurance coverage under the NFIP, the owner of this property can pay the flood insurance premium based on the prior mapped zone. Elevation grandfathering occurs when a new FIRM increases the BFE, but the property itself does not change flood zones. For example, a property that was initially mapped as being four feet above BFE but is now, under the revised FIRM, only one foot above BFE, would still be allowed to pay the premium associated with a property four feet above BFE. FEMA does not consider the practice of grandfathering to be a subsidy for the NFIP, per se, because grandfathered properties are within a class of policies that are not subsidized for the class as a whole; instead, the discount provided to an individual policyholder is cross-subsidized by other policyholders in the NFIP. Thus, while grandfathering does intentionally allow policyholders to pay premiums that are less than their actuarial rate, the discount is offset by others in the same rate class as the grandfathered policyholder. As of September 2018, about 9% of NFIP policies were grandfathered. In addition to the building and contents premium, NFIP policyholders pay a number of fees and surcharges mandated by law. The Federal Policy Fee (FPF) was authorized by Congress in 1990 and helps pay for the administrative expenses of the program, including floodplain mapping and some of the insurance operations. The amount of the Federal Policy Fee is set by FEMA and can increase or decrease year to year. Since October 2017, the FPF has been $50 for Standard Flood Insurance Policies (SFIPs), $25 for Preferred Risk Policies (PRPs), and $25 for contents-only policies. A reserve fund assessment was authorized by Congress in the Biggert-Waters Flood Insurance Reform Act of 2012 (BW-12) to establish and maintain a reserve fund to cover future claim and debt expenses, especially those from catastrophic disasters. Since April 2016, FEMA has charged every NFIP policy a reserve fund assessment equal to 15% of the premium. All NFIP policies are also assessed a surcharge following the passage of HFIAA. The amount of the HFIAA surcharge is dependent on the type of property being insured. For primary residences, the charge is $25; for all other properties, the charge is $250. The NFIP requires most policyholders to purchase Increased Cost of Compliance (ICC) coverage . This is in effect a separate insurance policy to offset the expense of complying with more rigorous building code standards when local ordinances require them to do so. The ICC policy has a separate rate premium structure, and provides an amount up to $30,000 in payments for certain eligible expenses. Congress has capped the amount that can be paid for ICC coverage at $75. ICC coverage is not required on condominium units and content-only policies. In April 2019, FEMA began charging a Severe Repetitive Loss premium equivalent to 5% of the premium on all severe repetitive loss properties. If a community is on probation from the NFIP, all policyholders in that community will be charged a probation surcharge of $50 for a full one-year period, even if the community brings its program into compliance and is removed from probation. As proposed, NFIP premiums calculated under Risk Rating 2.0 will reflect an individual property's flood risk, in contrast to the current rating system in which properties with the same NFIP flood risk are charged the same rates. This will involve the use of a larger range of variables than in the current rating system, both in terms of modeling the flood risk and also in assessing the risk to each property. The current rating system includes only two sources of flood risk: the 1%-annual-chance fluvial flood and the 1 %-annual-chance coastal flood . In contrast, Risk Rating 2.0 is designed to incorporate a broader range of flood frequencies and sources, including pluvial flooding (flooding due to heavy rainfall) , flooding due to tsunami, and coastal erosion outside the V zone. Risk Rating 2.0 is expected to use a multi-model approach to support the development of the new rates, with data from multiple sources including existing NFIP map data, NFIP policy and claims data, United States Geological Survey (USGS) 3-D elevation data, National Oceanographic and Atmospheric Administration (NOAA) SLOSH storm surge data, and U.S. Army Corps of Engineers data sets. According to FEMA, Risk Rating 2.0 will also use three commercial catastrophe models to estimate future loss potential. The use of catastrophe models to estimate potential losses caused by events such as hurricane wind, storm surge, inland flooding, tornadoes, earthquakes, and wildfires has become a standard risk management practice in the insurance industry. Catastrophe models were initially developed to address the shortcomings inherent in using historical data to project potential losses from infrequent, severe events that impacted many properties that were not geographically diverse. While each peril model reflects factors specific to the peril being modeled, catastrophe models generally have similar components, including modules simulating (1) the probability of the particular catastrophe occurring; (2) the intensity of the catastrophe; (3) the damage to structures; and (4) the allocation of the amount of the loss among those responsible for payment. The first stage of catastrophe modeling is to generate a stochastic event set, which is a database of simulated events. Each event is characterized by a probability of occurrence (event rate) and geographic area affected. Thousands of possible event scenarios are simulated, based on realistic parameters and historical data, to model probabilistically what could happen in the future. The hazard component of catastrophe models quantifies the severity of each event in a geographical area, once the event has occurred. An event footprint is generated, which is a spatial representation of hazard intensity from a specific event. For example, a model could calculate the peak wind speeds at each location affected by hurricane winds. Property vulnerability is modeled using mean damage ratios (MDRs), which are losses expressed as a percent of value, for a given hazard level (e.g., hurricane wind speed) and location. MDRs give the average percentages of damage that are expected for a structure with the characteristics input into the model. Finally, a financial or insurance module quantifies the financial consequences of each event from various financial perspectives. The policy terms such as deductibles, limits, and reinsurance are applied to the damage from each insured property from the vulnerability model to calculate the allocation of the loss amount. In the first stage of Risk Rating 2.0 modeling, FEMA is to conduct probabilistic flood risk analyses, in which structures are assigned specific annualized probabilities of being impacted by flood, and to validate these results with NFIP historical data. The next step is to compare the results of this analysis with the output of commercial catastrophe models. Finally, FEMA is to generate average annual loss values for certain geographies, focusing particularly on leveed areas and complex flooding hazards. Geographical variables to be used in Risk Rating 2.0 are to include the distance to water and the type of water (e.g., river, stream, coast), the elevation of the property relative to the flooding source, and the stream order, which is a measure of the relative size of streams and rivers. The structural variables which have been identified by FEMA for use in Risk Rating 2.0 include the foundation type of the structure, the height of the lowest floor of the structure relative to BFE, and the replacement cost value of the structure. In the current NFIP rating system, rates are based on the amount of insurance purchased for a structure rather than the replacement cost of that structure. For most actuarially-rated structures, the NFIP classifies the first $60,000 of building coverage for single-family residences ($175,000 for businesses) and $25,000 of contents coverage as the basic limit. It charges higher rates for coverage below this amount, because losses are more likely to occur in this range. Rates for additional coverage above the basic limit are lower. The basic and additional rates are weighted to account for the average tendency to buy less insurance than the replacement value. For example, a post-FIRM single-family property in Zone A with no basement would currently pay a basic rate of 1.1% per $100 coverage on the first $60,000 and an additional rate of 0.3% per $100 of coverage over $60,000. The two-tiered rating structure was used by the NFIP for two reasons. First, it ensured that the premium collected is sufficient to cover the typical claim, even if a policy is under-insured; according to FEMA, most NFIP claims are below $60,000. By charging a high rate for coverage up to $60,000, a policyholder's premium is likely to be sufficient to cover a typical claim. Secondly, it encouraged policyholders to insure their structure fully. By charging a low additional rate, policyholders are encouraged not just to insure a typical claim, but to insure against the unlikely but possible higher claim. For much of the NFIP's existence, the two-tiered rating structure operated with minimal inequity. However, as the range of replacement values widened, particularly through the 2000s, the potential for inequity caused by rating based on coverage instead of structure value grew. Two groups are most subject to inequity. First, structures whose value is closer to the $60,000 basic limit pay more than they would if their rate was based on their structure value because their entire rate is mainly comprised of the higher basic rate. Second, structures whose value is above $250,000 pay less than they would if their rate was based on structure value, because their rate is based on an average structure value that is much less than their actual structure value. In addition, high-valued structures can produce much higher claims than lower valued structure with the same intensity of damage. If replacement cost value were to be used in setting NFIP premium rates, it is anticipated that those structures with higher replacement costs than current local or national averages would begin paying more for their NFIP coverage than those structures that are below the average, which would pay less. How much more, or how much less, is undetermined. Risk Rating 2.0 is to initially provide credits for three mitigation actions: 1. installing flood openings according to the criteria in 44 C.F.R. Â§60.3 ; 2. elevating onto posts, piles, and piers; and 3. elevating machinery and equipment above the lowest floor . FEMA has not yet given any information on how these credits will be applied to individual property premiums. Currently the only mitigation activity for which the NFIP gives premium credit is elevating a structure, so Risk Rating 2.0 could encourage individual policyholders to do more to mitigate the flood risk for their property. Flood zones are to no longer be used in calculating a pro perty's flood insurance premium following the introduction of Risk Rating 2.0; instead, the premium are to be calculated based on the specific features of an individual property. However, as proposed, flood zones will still be needed for floodplain management purposes ; for example, all new construction and substantial improvements to buildings in Zone V must be elevated on pilings, posts, piers, or columns. T he boundary of the SFHA will still be required for the mandatory purchase requirement . The FIRM map appeal process will still exist, but once Risk Rating 2.0 begins, map appeals are not to have any effect on the premium that a policyholder pays. Although FEMA has not yet given any details of how grandfathered properties will be affected by Risk Rating 2.0, other than to say that \"all properties will be on a glide path to actuarial rates,\" the implication of the fact that flood zones will no longer be used to set premiums appears to indicate that zone grandfathering, at least, will no longer be relevant. FEMA has statutory authority to set premium rates. The limitations on annual premium increases are also set in statute, and Risk Rating 2.0 will not be able to increase rates annually beyond these caps. HFIAA set maximum rate increases for primary residences at 5-18% per year. HFIAA permits individual property increases of up to 18%, but limits the rate class increases to 15% per year. In other words, the average annual premium rate increase for primary residences within a single risk classification rate may not be increased by more than 15% a year, while the individual premium rate increase for any individual policy may not be increased by more than 18% each year. Other categories of properties are required to have their premium increased by 25% per year until they reach full risk-based rates: this includes non-primary residences, non-residential properties, business properties, properties with severe repetitive loss, properties with substantial cumulative damage, and properties with substantial damage or substantial improvement after July 6, 2012. However, FEMA does not consider everything that policyholders pay to the NFIP to be part of the premium and therefore subject to these caps. When premium rates are calculated for compliance with the statutory caps, FEMA only includes the building and contents coverage, the Increased Cost of Compliance coverage, and the reserve fund assessment. Other fees and surcharges are not considered part of the premium and therefore are not subject to the premium cap limitations, including the Federal Policy Fee, the HFIAA surcharge and, if relevant, the 5% Severe Repetitive Loss premium and/or probation surcharge. Table 1 shows the effects of a maximum statutory increase on the national average premium for a Standard Flood Insurance Policy (SFIP) which pays the full $75 for Increased Cost of Compliance (ICC) coverage. According to FEMA, the national average premium for an SFIP is $700. The reserve fund assessment for this policy would be $105 and the ICC premium would be $75, for a total premium of $880. For an SFIP primary residence, the maximum 18% increase would be calculated on this premium of $880, leading to an increase of $158.40 and a new premium of $1038.40. However, an SFIP primary residence would also pay an FPF of $50 and a HFIAA surcharge of $25, so the total amount due to the NFIP after an 18% increase would be $1113.40. An SFIP for a non-primary residence would be subject to a 25% increase on the initial premium of $880, leading to an increase of $220 and a new premium of $1100. Costs for such a policy for a non-primary residence would also include an FPF of $50 and a HFIAA surcharge of $250, so the total amount due to the NFIP after a 25% increase would be $1,400. The current three categories of properties which pay less than the full risk-based rate (pre-FIRM, newly-mapped, and grandfathered) are determined by the date when the structure was built relative to the date of adoption of the FIRM, rather than the flood risk or the ability of the policyholder to pay. As proposed, the new rating system will not eliminate the three categories, nor the process of phasing out subsidies which began with BW-12, but rate changes will not necessarily be uniform within each category. Premiums for individual properties will be tied to their actual flood risk rather than the flood zone, but the rate at which the subsidies will be phased out will continue to be constrained by law. In general, Risk Rating 2.0 is expected to lead to the reduction of cross-subsidies between NFIP policyholders, and the eventual elimination of premium subsidies and cross-subsidies once all properties are paying the full risk-based rate. However, certain non-insurance activities of the NFIP are funded by cross-subsidies from NFIP policyholders' premiums. For example, through a program called the Community Rating System (CRS), FEMA encourages communities to improve upon the minimum floodplain management standards that are required to participate in the NFIP. Policyholders in communities which participate in the CRS can get discounts of 5% to 45% on their flood insurance premiums. These discounts are determined by the activities carried out by the community to reduce flood and erosion risk and adopt measures to protect natural and beneficial floodplain functions. The National Research Council estimated that the CRS program provided an average 11.4% discount on SFIP premiums across the NFIP. The CRS discount is cross-subsidized into the NFIP program, such that the discount for one community ends up being offset by increased premium rates in all communities across the NFIP. An average 11.4% discount for CRS communities is cross-subsidized and shared across NFIP communities through a cost (or load) increase of 13.4% to overall premiums. It is not yet clear how Risk Rating 2.0 will affect the CRS cross-subsidy. In addition, as much as 42% of the funding for flood mapping and floodplain management is collected from NFIP policyholders in the form of the FPF. About 66% of the resources from the FPF are allocated to flood mapping, with floodplain management receiving about 19% of the overall income from the FPF. Again, it is not yet clear how Risk Rating 2.0 might affect funding for floodplain management and flood risk mapping. FEMA believes that the more transparent and accurate flood insurance pricing in Risk Rating 2.0 will lead to better risk communication and an increase in flood insurance take-up rate. However, Risk Rating 2.0 is not designed to increase or decrease revenue for the NFIP. According to FEMA, Risk Rating 2.0 will not be allowed to create a shortfall relative to the amount of premium income under the current rating system. If the new rates lead to a shortfall, the rating plan will be revised. FEMA is carrying out an actuarial analysis and cannot give any information at the time of writing about the number or percentage of properties which will see their premiums change under Risk Rating 2.0. However, certain types of properties may be more likely to be affected, either positively or negatively. These may include zone-grandfathered properties, properties which are currently on the border of flood zones, properties currently outside the SFHA at risk of pluvial flooding, and properties with above-average or below-average replacement cost values. For example, the use of distance to water, rather than flood zone, may mean that premiums for properties at the landward boundary of an SFHA could go down, while premiums for a property at the water boundary could go up. Concerns about premium increases in the past have focused on certain subsidized properties, but under Risk Rating 2.0 all types of properties may be subject to higher rates of increase than at present. For example, as of April 1, 2019, the premium for pre-FIRM properties increased by 7.3% and the premium for newly mapped properties increased by 15%. Premiums for post-FIRM V zone properties increased by 6%, post-FIRM A zones increased by 4%, and X zone properties increased by 1%. These properties could face higher premiums under Risk Rating 2.0. Risk Rating 2.0 is may lead to premium increases for some NFIP policyholders, which could raise questions of affordability. When the Biggert-Waters Flood Insurance Reform Act of 2012 (BW-12) went into effect, constituents from multiple communities expressed concerns about the elimination of lower rate classes, arguing that it created a financial burden on policyholders, risked depressing home values, and could lead to a reduction in the number of NFIP policies purchased. Similar concerns may be expressed with Risk Rating 2.0. Although risk-based price signals could give policyholders a clearer understanding of their true flood risk, charging actuarially sound premiums may mean that insurance for some properties is considered unaffordable, or that premiums increase at a rate which may be considered to be politically unacceptable. FEMA does not currently have the authority to implement an affordability program, nor does FEMA's current rate structure provide the funding required to support an affordability program. However, affordability provisions are included in the three bills which have been introduced in the 116 th Congress for long-term reauthorization of the NFIP: the National Flood Insurance Program Reauthorization Act of 2019 ( H.R. 3167 ), and the National Flood Insurance Program Reauthorization and Reform Act of 2019 ( S. 2187 ) and its companion bill in the House, H.R. 3872 . As Congress considers a long-term reauthorization of the NFIP, a central question may be who should bear the costs of floodplain occupancy in the future and how to address the concerns of constituents facing increases in flood insurance premiums. ", "summary": "The National Flood Insurance Program (NFIP) is the primary source of flood insurance coverage for residential properties in the United States, with more than five million policies in over 22,000 communities in 56 states and jurisdictions. FEMA is planning to introduce the biggest change to the way the NFIP calculates flood insurance premiums, known as Risk Rating 2.0 , since the inception of the NFIP in 1968 . The new premium rates are scheduled to go into effect on October 1, 2021, for all NFIP policies across the country. Risk Rating 2.0 will continue the overall policy of phasing out NFIP subsidies, which began with the Biggert-Waters Flood Insurance Reform Act of 2012 and continued with the Homeowner Flood Insurance Affordability Act of 2014. Under the change, premiums for individual properties will be tied to their actual flood risk. Because the limitations on annual premium increases are set in statute, Risk Rating 2.0 will not be able to increase rates faster than the existing limit for primary residences of 5%-18% per year. According to FEMA, Risk Rating 2.0 will reflect an individual property's risk, reflect more types of flood risk in rates, use the latest actuarial practices to set risk-based rates, provide rates that are easier to understand for agents and policyholders, and reduce complexity for agents to generate a flood insurance quote. The NFIP's current rating structure follows general insurance practices in effect at the time that the NFIP was established and has not fundamentally changed since the 1970s . The current NFIP rating structure uses several basic characteristics to classify properties based on flood risks. Structures are evaluated by their flood zone on a Flood Insurance Rate Map (FIRM), occupancy type, and the elevation of the structure. FEMA uses a nationwide rating system that combines flood zones across many geographic areas, and calculates expected losses for groups of structures that are similar in flood risk and key structural aspects, assigning the same rate to all policies in a group. According to FEMA, flood zones will no longer be used in calculating a property's flood insurance premium following the introduction of Risk Rating 2.0. Instead, the premium will be calculated based on the specific features of an individual property, including structural variables such as the foundation type of the structure, the height of the lowest floor of the structure relative to base flood elevation, and the replacement cost value of the structure. The current rating system includes two sources of flood risk: the 1%-annual-chance fluvial (river) flood and the 1%-annual-chance coastal flood. As proposed, Risk Rating 2.0 will incorporate a broader range of flood frequencies and sources than the current system, as well as geographical variables such as the distance to water, the type and size of nearest bodies of water, and the elevation of the property relative to the flooding source. According to FEMA, although flood zones on a FIRM will not be used to calculate a property's flood insurance premium, flood zones will still be used for floodplain management purposes, and the boundary of the Special Flood Hazard Area will still be required for the mandatory purchase requirement.", "document_type": "crs"}
{"report": "The energy in sunlight can be converted into electricity in either of two ways: by using solar photovoltaic cells or by concentrating solar energy to produce heat for electricity generation. Solar energy can also be used to heat water for direct use, but this report focuses only on electricity generation applications. Sunlight can interact with certain materials to directly produce electricity in a process known as the photovoltaic (PV) effect. Silicon (more specifically, crystalline-silicon, or c-Si) is the most commonly used material today, but other materials (e.g., cadmium telluride) also can be used. Research is ongoing into alternative materials and designs that might be more efficient or less expensive than c-Si. To construct a PV cell to generate electricity, PV material is manufactured into ingots, which are then cut into wafers ( Figure 1 ). Wafers are typically 15 centimeters (cm) wide along each side and around one-hundredth of a centimeter thick, although exact dimensions may vary by manufacturing process. Wafers are processed into cells, which are then assembled into modules, also called panels. A module typically consists of 60 to 72 cells mounted on a plastic backing within a frame. Modules are typically installed in groups, known as arrays, with the number of modules in the array depending upon the available space and the desired generation capacity of the project. A PV system includes modules and a variety of structural and electronic components, known as balance of system (BOS) equipment, to tie the system together. Structural BOS equipment includes brackets, on which the modules are mounted. For ground-mounted systems, these brackets can be either fixed or able to rotate during the day to face the sun. Mounting systems that can rotate are known as tracking systems. Modules mounted on tracking systems tend to generate more electricity than modules on fixed-mount systems, all else being equal, because the tracking systems can optimize the amount of sunlight hitting the module over the course of a day. One key piece of BOS equipment is an inverter, an electronic device that converts the electricity generated by PV modules into a form that is usable in the U.S. electric system. Other electronic BOS equipment includes charge controllers, circuit breakers, meters, and switch gear. Some PV systems also include integrated energy storage systems such as batteries. PV systems can be divided into three categories, based primarily on capacity. Utility- scale systems (i.e., solar farms) may range in capacity from a few megawatts (MW) to a few hundred MW. They are typically owned and operated like other central power plants. Utility-scale projects are typically connected to the electricity transmission system, the network of high-voltage lines that move electricity over long distances. Commercial-scale systems typically range in capacity from a few kilowatts (kW; 1,000 kW = 1 MW) to a few hundred kW. They may be installed on the ground or on rooftops, and are typically owned or hosted by commercial, industrial, or institutional entities. Some may be connected to the transmission system, and some may be connected to the electricity distribution system, the network of low-voltage lines that deliver electricity directly to most consumers. Residential -scale systems typically have generation capacity of a few kW. Most residential-scale projects are installed on rooftops and connected to the distribution system. Another way to categorize PV systems is by ownership model. Systems connected to the transmission system (typically utility-scale) are generally owned by utilities or independent power producers, as is the case for other central power plants. Smaller systems may use other ownership models, depending on what applicable state laws allow. Customer-owned systems are owned directly by the electricity consumer benefiting from the system. The consumer might buy the system outright or finance it in the same way as for other property improvements (e.g., loan). Third-party ownership (i.e., solar leasing) is an ownership model in which an electric consumer, such as a homeowner, allows a company to build a solar system on the consumer's property. The company owns and maintains the solar system while the consumer uses the electricity produced by the system. The consumer pays back the cost of the system to the company through either lease payments or a power purchase agreement. Community solar (i.e., solar gardens) is an ownership model in which multiple electricity consumers may purchase or lease shares of a solar system through a subscription. Subscribers can benefit from the project by receiving electricity, financial payments, or both. Community solar systems are usually not installed on a subscriber's property, and the systems may be owned by a utility or another type of entity. Concentrating solar power (CSP) technologies collect and concentrate energy from sunlight to heat certain fluids (liquids or gases). CSP plants use these heated fluids to produce electricity, either by creating steam to drive a steam turbine or by directly running a generator. CSP plants can be designed with thermal energy storage systems. At least one CSP plant with storage operating in the United States is capable of generating electricity 24 hours a day. Electricity generation from solar energy has grown in recent years, as shown in Figure 2 . Solar energy overall (PV and CSP combined) accounted for 0.7% of total U.S. electricity generation in 2014 and 2.2% of the total in 2018, according to data from the U.S. Energy Information Administration (EIA). Most generation (96% in 2018) from solar energy comes from PV systems. Large-scale systems, defined by EIA as those greater than 1 MW, accounted for 61% of overall generation from solar energy in 2014, the first year for which EIA reported generation data for different size categories. By 2018, the share from large-scale systems had increased to 68%. Costs for solar PV systems vary by size, as shown in Figure 3 . The figure shows an estimate of average U.S. solar PV system costs per unit of capacity, as of the first quarter of 2018 (Q1 2018), based on an analysis by the Department of Energy's National Renewable Energy Laboratory (NREL). Costs for any individual project could differ based on project-specific circumstances. Two general findings from NREL's analysis are supported by numerous other studies, namely that larger projects tend to be cheaper on a per-unit basis, and that costs for projects of all sizes have declined in recent years. Utility-scale systems have the lowest unit costs, ranging from an average of $1.06 per watt of direct current (hereinafter, W) to $1.13/W in 2018, depending on whether projects were mounted on fixed brackets or tracking systems, respectively. Commercial-scale systems cost $1.83/W on average in Q1 2018, and residential-scale systems cost $2.70/W on average. The total system cost differences shown in Figure 3 are driven primarily by higher \"soft costs.\" These costs include, for example, costs associated with permitting, interconnecting with the grid, and installer overhead costs. The soft costs are much higher for smaller-scale systems, per watt, than for utility-scale systems. PV system costs have declined, as shown by data from the NREL analysis shown in Figure 4 . NREL reported costs from 2010 to Q1 2018. NREL credits cost declines over this time period to cost declines in all system components (i.e., modules, inverters, BOS equipment, labor, and other soft costs). PV module costs increased between 2017 and 2018 as a result of tariffs discussed in the section \" How Are U.S. Tariffs Affecting Domestic Solar Manufacturing? ,\" offsetting cost declines in other system components, according to the NREL report. Generalizing the cost impacts to consumers for solar systems is challenging because costs for these systems vary across the United States. Additionally, solar system costs are declining in both absolute terms (as discussed in the previous section) and relative to other sources of electric power. In parts of the country, new solar systems are sometimes among the least cost-options for generating electricity. This was not generally the case a few years ago. Policies aimed at promoting solar energy make an assessment of costs more complex. For example, tax incentives, as discussed in the section \" What Federal Tax Incentives Support Solar Energy Development? ,\" can reduce the ownership costs for businesses or individuals that purchase solar energy systems. Some of those costs are then transferred to taxpayers. The following discussion focuses on electricity costs only from a consumer's point of view. Consumers' electricity costs can be measured in two ways. The first way is the electricity rate, typically expressed in cents per kilowatt-hour (cents/kWh). The second way is the electricity bill, typically the total costs for electricity that consumers pay each month expressed in dollars. In most cases, an electricity bill reflects the costs to produce electricity (typically, the applicable electricity rate times the amount of electricity consumed), the costs to deliver electricity to the consumer, and any other fees as determined by state or local regulators (e.g., contributions to funds that provide bill relief to low-income households). Electricity rates can go down while bills go up, and vice versa. Multiple factors can determine how solar energy might affect what consumers pay for electricity. Many of these factors vary based on local circumstances. They can also change over time as the profile of electricity sources changes. One way to compare electricity costs is by estimating the lifetime costs of energy systems. Lifetime costs include the initial construction and installation cost plus operation and maintenance (O&M) costs, fuel costs, and other costs. Electricity rates are strongly influenced by total lifetime costs for all the electricity generators serving a given area. Lifetime costs for solar energy have historically been higher than for many other sources, but that is changing in many parts of the United States. For example, one commonly used measure of lifetime costs is the levelized cost of electricity (LCOE), usually expressed in dollars per megawatt-hour of generation ($/MWh) and averaged over the lifetime of a project. LCOE estimates attempt \"apples-to-apples\" comparisons among technologies because the estimates account for how much electricity a given power plant is expected to produce over its lifetime. According to widely cited estimates from one consulting firm, 2019 LCOE for new utility-scale solar systems ranged from $32/MWh to $42/MWh. By comparison, LCOE for new wind generation was $28/MWh-$54/MWh and for natural gas combined cycle generation was $44/MWh-$68/MWh. Another factor in consumers' bills is the extent to which electricity from solar energy displaces electricity generation from existing sources. If existing power plants are called upon to produce less electricity than planned when they were first built due to the availability of power from less expensive sources, the owners still need to pay the construction cost of their unneeded capacity. Such costs are known as stranded costs. Depending on each state's regulatory framework, stranded costs might be borne by power plant owners or be passed through to consumers in electric bills. To the extent that solar systems require new transmission lines to deliver electricity to consumers, the cost of building those lines may result in higher electricity bills. Utility-scale solar, which is frequently located in rural areas distant from consumers, may have higher associated cost impacts on bills than, for example, residential-scale solar, depending upon project details. On the other hand, installation of solar systems can sometimes avoid upgrades to transmission systems, resulting in potentially lower costs for consumers. In other cases, though, solar systems necessitate upgrades to local distribution systems, which might increase costs for customers. In states with carbon pricing policies in place, increased solar energy deployment could reduce the bill impacts associated with the carbon price. Generating solar energy has approximately zero marginal cost. Marginal costs reflect the variable costs of producing incremental amounts of electricity from an existing source. Marginal costs are typically dominated by fuel costs, which are not relevant for solar energy. When solar energy is present in an area, fewer fuel-consuming electricity sources are required, which tends to drive down marginal costs for the regional electricity system overall. This effect may diminish as the number of solar electricity generators increases in an area, because nearby solar PV systems tend to maximize their electricity production at the same time (usually midday). If all of the midday electricity demand were to be met by solar PV, there would no incremental cost benefit to adding more solar PV systems to the region. The rate and bill impacts discussed above would apply to all electricity consumers within a region in which solar energy development is taking place. Consumers that install rooftop solar systems or participate in community solar projects (\"solar customers\") could have different bill impacts. Most states allow solar customers to be financially compensated for the electricity generated by the projects they host. The most common type of policy for this compensation is net metering, though some states have established net metering alternatives. Depending on a consumer's electricity demand and the size of the solar energy project, solar consumers participating in net metering or related policies could reduce their electricity bills to zero. One potential reliability concern for solar energy is due to its variable nature, dependent on the availability of sunlight. For example, solar PV systems cannot produce electricity at night, and their output can vary during the day depending on local weather conditions (e.g., cloudiness). The physical requirements of the electricity system are such that the supply and demand of electricity must equal each other at all times. Currently, to ensure reliability, other sources of electricity generation are used when solar energy is not available. Expanding other types of electricity system infrastructure, such as transmission lines or energy storage assets, could also address this limitation. Alternatively, policies and regulatory frameworks that incent greater electricity consumption during daytime hours and less at night (i.e., load shifting) could reduce the reliability impact of solar energy's variability. Another potential reliability concern for solar energy arises from the mismatch between the hours of the day when generation from solar energy peaks (typically midday) and when electricity demand peaks (typically several hours later). To maintain reliability, some sources of electricity have to quickly increase their output to account for the simultaneous drop-off in output from solar generators and increase in demand. As more solar systems are installed, the need for other sources that can quickly change output levels typically increases. This situation is often referred to as the \"duck curve\" because the shape of the plot showing the difference between demand and output from solar generators resembles a duck. Not all electricity generators are capable of quickly changing their output, and their deployment may not match the levels of deployment of solar generators. Load shifting, operational changes to non-solar sources, and deployment of more flexible resources (e.g., energy storage) are all possible ways to address the duck curve. Some analysis suggests that electric vehicle deployment might also act as a form of load shifting and address the duck curve, at least if vehicle charging occurs when output from solar sources is high. A third potential reliability concern comes from the fact that solar PV produces direct current (DC) electricity. Conventional generators produce alternating current (AC) electricity, and the grid is optimized for AC. An inverter is an electrical device that converts DC to AC; grid-connected solar PV systems require an inverter. For this reason, solar is sometimes referred to as an \"inverter-based resource.\" Generators that produce AC also inherently contribute to grid reliability by providing what are known as \"essential reliability services\" or \"ancillary services.\" Most of these services arise from the way generators physically respond to changes in the balance of electricity supply and demand over fractions of seconds. Inverter-based resources do not inherently provide these services, although inverters can be designed (and are being deployed) to provide some of these services. The electric power industry and its federal and state regulators have been studying ways to protect system reliability from the unique nature of inverter-based resources since at least 2008. Additionally, Congress has funded a variety of research programs related to electric reliability. No widespread reliability issues due to solar appear to have occurred to date, though some local reliability issues have been reported. Various provisions in the Internal Revenue Code (IRC) support investment in solar energy equipment. These provisions reduce the after-tax cost of investing in solar property, thereby encouraging taxpayers to invest in more solar property than they would have absent tax incentives. Tax incentives for solar energy property were first enacted in 1978. Several incentives for solar are currently part of the tax code. Historically, the value of tax incentives for solar has fluctuated, although the current tax credit rates were established in 2005. Under current law, solar tax incentives are scheduled to phase down in the coming years from their 2019 rates. Investments in certain renewable energy property, including solar, qualify for an investment tax credit (ITC). The amount of the credit is determined as a percentage of the taxpayer's basis in eligible property (generally, the basis is the cost of acquiring or constructing eligible property). The credit rate for solar was 30% through 2019, 26% in 2020 and 22% in 2021. Solar energy has a permanent 10% ITC that is to go into effect in 2022. The expiration dates for the ITC are commence construction deadlines. For example, solar property that was under construction by the end of 2019 may qualify for the 30% tax credit, even if the property is not placed in service (or ready for use) until a later date. Special provisions in the tax code allow solar energy property to be depreciated over a shorter period of time than would normally be the case. Specifically, solar energy property is classified as five-year property in the Modified Accelerated Cost Recovery System (MACRS). The depreciable basis (the amount that is recovered through depreciation deductions over time) of solar energy property is reduced by 50% of any ITC claimed. Thus, if a 30% ITC was claimed on a $1 million investment in solar energy property, $850,000 would be depreciated under the schedule for five-year MACRS property. Accelerating depreciation reduces the after-tax cost of investing in solar energy property. Temporarily, through 2022, certain investments in solar energy property are eligible for 100% bonus depreciation. This eligibility means that for these investments, the expense can be deducted immediately (i.e., expensed). Bonus depreciation is scheduled to phase down after 2022. It is scheduled to decrease to 80% in 2023, 60% in 2024, 40% in 2025, and 20% in 2026, before being 0% in 2027. Bonus depreciation may be claimed for new as well as used property. Regulated public utilities cannot claim bonus depreciation. Tax-exempt organizations, such as electric cooperatives, also cannot claim bonus depreciation, and typically are limited in their ability to benefit from tax incentives more broadly. Individuals purchasing solar energy property may qualify for the residential energy-efficient property credit. Through 2019, the tax credit for individuals is 30% of the cost of solar electric property installed on the taxpayer's residence. The tax credit rate is scheduled to be 26% in 2020 and 22% in 2021, with the credit expiring after 2021. The tax credit is nonrefundable, meaning that the amount of the credit a taxpayer can claim in the tax year is limited to the taxpayer's income tax liability. However, unused tax credits can be carried forward to the following tax year. Tax expenditure estimates are one source of information on the \"cost\" of solar tax incentives. Tax expenditures are, by definition, the amount of forgone revenue associated with special provisions in the tax code, such as tax credits and accelerated cost recovery. For FY2019, the Joint Committee on Taxation (JCT) estimates that the amount of forgone revenue associated with the business ITC for solar was $3.4 billion. The amount of forgone revenue associated with the residential energy-efficient property credit for FY2019 was an estimated $2.0 billion. This figure, however, includes all eligible technologies. While most of this was due to solar energy property, JCT does not estimate the forgone revenue associated with solar separate from other eligible technologies. The revenue loss for five-year MACRS for all eligible energy property (primarily wind and solar, but other technologies are eligible) is estimated at less than $50 million in FY2018. Because bonus depreciation is not a solar- or even energy-specific provision, a tax expenditure estimate for bonus depreciation for solar is not available. Internal Revenue Service (IRS) data also provide information on individual claims of tax credits for solar electric property. In 2017, individuals filed 381,242 tax returns that claimed the residential energy-efficient property credit for solar electric property. The total cost of solar electric property for which tax credits were claimed was $5.5 billion, generating approximately $1.6 billion in individual income tax credits. Per the Federal Power Act, states have jurisdiction over most aspects of electricity generation and distribution. Consequently, many policies that affect the development solar energy are implemented by states. This section discusses one common state policy, a renewable portfolio standard. Other state policies designed to accelerate the deployment of solar energy include net metering (mentioned in the section \" How Does Solar Energy Impact Electricity Costs for Consumers? \"), state tax credits, and allowing third-party ownership (i.e., solar leasing). Renewable portfolio standards (or, more broadly, electricity portfolio standards), as typically implemented, set requirements on utilities to procure a minimum share of their electricity sales from specified renewable sources such as solar. Many factors influence solar energy development, but renewable portfolio standards are widely credited as being a key factor historically, as they have provided a policy-driven source of demand for renewable electricity generation. Twenty-nine states, three U.S. territories, and the District of Columbia are implementing mandatory electricity portfolio standards, and an additional eight states and one territory have voluntary standards. Of these, nine jurisdictions have targets of 100% clean energy. Jurisdictions differ in their definitions of eligible clean energy sources, but solar is eligible in all cases. Nineteen of these policies include specific requirements or extra incentives for solar. The United States has applied tariffs on imports of solar energy equipment since 2012. The different types of equipment comprising a solar PV system are discussed in the section \" How Does Solar Energy Work? \" The Obama Administration imposed double- and triple-digit antidumping and countervailing duty tariffs on U.S. imports of solar cells and modules from China in 2012 and 2015 and on imports from Taiwan in 2015. The Trump Administration imposed a tariff, which started at 30% in 2018 and declines by 5% yearly until reaching 15% in 2021, on photovoltaic solar cells and modules from most countries. The tariff includes some exemptions, such as an annual 2.5 gigawatt (GW) tariff-free quota for solar cells as long as the final module assembly takes place in the United States. Several dozen developing countries are excluded from the tariff as long as their import levels stay small, and certain technologies, such as thin-film solar PV products or smaller crystalline silicon PV cells, are not subject to the tariff. This tariff is scheduled to expire in February 2022, but it may be extended, at the President's discretion, for up to four additional years. It is assessed on top of the previously existing tariffs on Chinese and Taiwanese producers, leading to tariff rates as high as 239% on some PV products made in China. In 2018, the Trump Administration placed a 25% duty on steel and a 10% duty on aluminum imported from most countries. These duties affect BOS equipment, such as PV brackets, module frames, cabling, power electronics housing, batteries, and wiring, and are projected to add 2% - 5% to PV system costs. Additional tariffs on a long list of Chinese products, including inverters and other solar equipment, were imposed at a 10% rate in September 2018. The rate was raised to 25% in May 2019. The tariff effects have not been felt evenly across the solar industry's manufacturing segments (i.e., polysilicon production, ingot and wafer production, solar cell production, and module assembly). To date the tariffs have not encouraged expansion of U.S. manufacturing in the more technologically advanced segment of the PV manufacturing supply chain, namely the production of crystalline-silicon solar cells. However, U.S. production of solar modules, into which cells are assembled, rose in 2018, and a few companies, including one Chinese manufacturer, have opened solar module assembly plants in the United States. The increased domestic production of modules draws on imported parts and components, reflecting the industry's global supply chain. U.S. solar tariffs have negatively affected the one segment of the PV supply chain in which the United States traditionally has been the most competitive, the production of polysilicon, the key raw material used in the manufacture of the vast majority of solar cells. China retaliated against the Obama Administration tariffs by imposing double-digit tariffs on polysilicon shipped from the United States to China, which had been a significant export market for U.S. producers. These tariffs have had an adverse effect on U.S. production of polysilicon, which shrank 40% between 2015 and 2018. The U.S. share of global polysilicon production is also down, falling to 11% of the global total in 2017 from 29% in 2010. The production of wafers made from polysilicon, which in turn are cut to make individual cells, has largely been discontinued in the United States, with China accounting for more than 80% of global wafer production in 2017. Solar cell production has significant economies of scale, so manufacturers generally centralize production in large plants. As shown in Figure 5 , annual domestic U.S. PV cell production shrank to 124 megawatts (MW) in 2018, the lowest level since 2010. Domestic manufacturers of PV modules import nearly all of their solar cells, which represent a substantial portion of the cost and value of a finished module (27% in Q4 2018, according to Wood Mackenzie, an energy consultancy). China accounted for more than two-thirds of the world's solar cell production in 2017. Despite the various trade actions in 2018, solar cell prices in the United States declined from 20 cents per watt at the beginning of that year to 10 cents per watt at year-end 2018, which represented a 50% decrease in cost. Meanwhile, figures from the United States International Trade Commission (ITC) show U.S. imports of solar cells more than doubled by value from 2016 to 2018. This trend continued despite the additional tariffs on solar cells and modules that took effect in 2018, with U.S. imports of solar cells rising 32% during the first seven months of 2019 compared to the same period in 2018. One possible reason for the rise in cell imports is that the Trump Administration's solar tariff allows up to 2.5 GW of unassembled solar cells to be imported into the United States duty-free each year the tariff is in effect. These can then be assembled into solar modules in the United States. From February 2018 to the end of 2018, about a quarter, or 650 MW, of the duty-free tariff rate quota was filled. The low fill rate during the first year may be because there was not enough module assembly capacity in the United States to use those cells, and because some PV cells were stockpiled prior to the imposition of the tariff. If the 2.5 GW quota is reached in any year, foreign-made cells will be subject to U.S. tariffs for the balance of that year. The uncertainty surrounding the tariffs limits the incentive to expand solar cell production in the United States. For example, the Trump Administration's solar tariff is initially set to last four years, with the tariff rate declining by five percentage points in each year the tariff is in effect. The other tariffs may be discontinued at the President's discretion. A new cell factory would need a large capital investment and about two years to construct. The possibility that some or all of the tariffs will be eliminated in the near future may discourage creation of new manufacturing capacity. At present, Panasonic is the only major domestic producer of crystalline-silicon solar cells, and several producers of solar cells have closed U.S. plants since 2012. Unlike cell production, domestic module assembly is growing. A count by the Solar Foundation, a trade group, indicates that approximately 20 factories assembled PV modules in the United States in 2018. Annual U.S. PV module production increased to 1.4 GW in 2018, up from 970 MW in 2017, but down from a record high of 1.7 GW in 2016, the year the federal investment tax credit had been set to expire (see Figure 5 ). It typically takes about six months to construct a new solar-module assembly facility and begin operation at scale. PV Magazine , an industry publication, reported that 3.9 GW of new module manufacturing capacity was under construction or had recently come online as of late 2018. Hanwha Q Cells, a South Korean company, and Jinko Solar, a Chinese company (the largest module producer in the world), have opened new module-assembly facilities in the United States. A Canadian company, Heliene, reopened a shuttered solar module facility in Minnesota. NREL reports that several additional solar companies expect to add another 4 GW of U.S. module assembly capacity. In 2017, China accounted for more than 70% of total global module production. One challenge for domestic producers is that U.S. module facilities are smaller than the most efficient plants in Asia, meaning they generally lack the economies of scale that are central in driving down unit costs. The two companiesâSolarWorld and Sunivaâthat petitioned the Trump Administration to put tariffs on imported cells and modules have both ceased production. Because U.S. tariffs are much higher on imports from China and Taiwan than on products of other countries, the tariffs have encouraged manufacturers of cells and modules to serve the U.S. market from other Asian countries. PV module shipments into the United States from Malaysia, South Korea, Vietnam, Mexico, and Thailand have largely replaced module imports from China, which shrank to less than 1% of total U.S. imports by 2018. These five countries accounted for nearly 85% of $2.8 billion in PV modules imported into the United States in 2018. Inverters made in China now face a 25% U.S. tariff. To avoid the U.S. tariff, two large suppliers of inverters to the U.S. market are reportedly planning to shift production from China to other locations. According to the Solar Energy Industries Association (SEIA), U.S. inverter production is declining, primarily due to the closure of two major U.S. facilities at the end of 2016. Backsheets and junction boxes are other examples of solar energy components needed for solar panel assembly, and they are also among the products that face a 25% tariff if they are imported from China. Module prices globally have declined steeply over the past decade. While prices in the U.S. market have fallen as well, despite the tariffs on imported cells and modules, they remained 61% higher, on average, than the global average selling price in 2018, according to NREL. One factor contributing to this price differential is the preference of U.S. purchasers for Tier 1 solar modules, which may be 10% to 30% more expensive and may be more reliable than Tier 2 and Tier 3 solar modules, although they may not necessarily be the best-performing modules on the market. Projects using Tier 1 modules may be easier to finance than those using modules not classified as Tier 1. The federal government does not collect data on employment in the solar energy industry. According to a report by the Solar Foundation, the industry provided 242,300 full-time equivalent jobs in 2018 ( Figure 6 ). Of these positions, 85% involved work other than manufacturing, such as installation of solar systems and project management, wholesale trade and distribution, and operations and maintenance. Most employment in the solar energy industryâ64% in 2018âinvolves two solar sectors, the installation of solar systems and project development, whether on rooftops of individual homes or larger projects. Although the federal government does not track employment specific to the solar energy industry, the Bureau of Labor Statistics (BLS) publishes occupational data for solar PV installers. These data indicate that employment in PV installation may be significantly lower than the figures reported by SEIA for the combined solar installation and project development segment of the industry. BLS predicts the overall employee occupational count for solar PV installers of 9,700 workers in 2018 will rise by 63% to 15,800 jobs in 2028. BLS predicts that solar installation will be the fastest-growing occupation in the nation over the next decade. BLS reports the median pay for a PV installer in 2018 was $42,680 per year, or $20.52 per hour, about 13% above the national median for all workers. At the end of 2018, the number of solar jobs as reported by the Solar Foundation was approximately 7% lower than in 2016, with installation jobs accounting for most of the decline. The annual number of PV systems installed in the United States shrank 14% to about 327,000 in 2018 from approximately 380,000 in 2016. Direct employment in U.S. solar manufacturing was about 34,000 workers in November 2018, according to the Solar Foundation, accounting for about 14% of total employment related to the solar energy sector. The number of reported jobs dropped by 4,400 from November 2016. One reason for the decline may be that the tariffs raised the cost of foreign inputs that are assembled into solar systems in U.S. factories, making those factories' products more expensive. Due to automation, a significant increase in employment in U.S. solar manufacturing is considered to be unlikely. One market research firm says module manufacturing accounted for about 1,200 U.S. jobs in 2018, but is projected to fall to just over a 1,000 workers by 2024. A review of publicly available information by CRS suggests that there are fewer than 2,000 workers involved in domestic polysilicon production. There is also limited employment related to the assembly of solar factory production equipment for wafers, cells, and modules in the United States because this equipment is made mainly in Europe and China. Land is required for the extraction, production, and consumption of energy and for the generation, transmission, and distribution of electricity. There is not a generally accepted standard metric or methodology for a comparison of land use impacts across energy technologies. Different studies evaluate land use in different ways and may or may not account for upstream and downstream process steps associated with electricity generation (e.g., extraction of fuels or resources used for electricity generation), for the intensity of the impact of the activity on the occupied land, or for the time-to-recovery. Other factors that may not be incorporated into comparisons include location-dependent factors, such as solar incidence, or co-location of different activities with the energy generation, such as solar panels on rooftops. Estimates of power density for different energy sources vary by methodology and technology type studied. Some estimates consider the area of the power plant only, while others include land areas used for fuel production, electricity transmission, waste disposal, or other factors. Estimates can change with time as technology innovation leads to increased energy efficiency; such is the case for solar energy, with newer and more efficient technologies leading to increased power density. When considering total land area occupied, renewable energy sources generally require more land to produce the same amount of electricity than nonrenewable sources. One metric used in the energy sector that accounts for land use is power density, which can be expressed as a unit of power per unit of area (e.g., watts per square meter). A review of 54 studies which examined the power density of electric power production in the United States found that solar energy has a lower power density than natural gas, nuclear, oil, and coal, but solar energy has a higher power density than wind, hydro, biomass, and most geothermal. The review accounted for energy conversion efficiencies, capacity factors, and infrastructure area, including infrastructure associated with energy production (e.g., mines). The review did not control for time, reporting that the earliest study included in the analysis was from 1974; however, the review concluded that, of the nine energy types evaluated, only solar had a statistically significant relationship between power density and time. Published values for power density for solar systems range from 1.5 to 19.6 W e /m 2 . Generally, solar thermal and utility-scale photovoltaic (PV) were found to require more land area to produce the same amount of electricity than residential PV and concentrated solar. While the technology for residential PV and utility-scale PV is similar, sloped rooftops may allow more sunlight to reach otherwise flat panels for residential systems, and the spacing of panels at utility-scale facilities (regardless of tilt) to provide for maintenance and to avoid shading may lead to lower power densities. Another review found that both location-dependent parameters and technology-dependent parameters affect the variability of land use energy intensity of solar electricity generation. In addition to power density, other factors may be relevant when evaluating energy sources and land use. Two examples are land use and land cover change, which account for the previous state of the land before an energy project was developed. In the case of solar, some solar energy systems may change land use and land cover to a smaller degree than others. For example, rooftop solar PV systems do not change how the underlying land is used or covered. Another factor is co-location of activities where land can be occupied but not used exclusively by its occupier. For example, farming and grazing can occur on land around wind turbines and underneath solar panels (this dual-use solar is referred to as \"agrivoltaics\"). Time-to-recovery is another factor to consider. Some technologies may impact land such that the land can recover to its previous state after use in a matter of months or a few years; other technologies may impact the land in such a way that it may take decades or centuries for the land to recover to its previous state. According to the Department of Energy, \"further work is critically needed to determine appropriate land-use metrics for meaningful cross-comparisons.\" Agricultural land has become increasingly desirable for siting utility-scale solar PV systems (i.e., solar farms) for electrical generation. One concern that some raise about solar farm development is that siting solar arrays on agricultural lands can also displace agricultural production. With solar generation capacity in the United States increasing from less than 1 GW in 2010 to 50 GW in 2018, demand for large tracts of reliably sunlit, cleared, unobstructed acreage is also growing. California, North Carolina, Texas, and Florida had the largest U.S. cumulative solar capacity in the third quarter of 2019, with California the largest. While some individual farm operations develop PV arrays through their own investments in solar technologies as an income supplement or as an on-site energy source for their farming operations, private solar development companies have increasingly turned to long-term leasing arrangements with farmers to site PV arrays. Farmers benefit from the lease and solar developers get access to the scarce commodity of land. Prime agricultural lands often represent very large tracts of land in potentially suitable locations. As important as large tracts of acreage may be, other variables determine whether a satisfactory lease is negotiated. The quality of the terrain, local weather factors, proximity to grid connections, local transmission capacity, proximity to main roads, conservation and environmental impact issues, local/regional land use regulations, and flood risks all contribute to the suitability of particular agricultural acreage for a solar development company. In potential lease arrangements, farmers are often interested in whether or not the PV array will curtail, if not completely end, their ability to continue farming. Typically, contractors constructing solar farms will strip the topsoil and then mount the PV modules on concrete footings. Not only does this remove the land from agricultural production during the period of the lease, it can become prohibitively expensive to restore the land to production after a lease terminates. The concern that the agricultural land can be permanently lost to production even after a lease ends is a factor when considering whether to maximize energy capacity on land at the expense of agricultural production. Suitable land where solar generation can be maximized will tend to be highly compensated relative to the potential of the agricultural operation. For example, while marginally productive acreage may be tilled, its yield potential is often quite low, and the environmental costs can be high (e.g., erodible soils). This type of acreage may be suitable for maximization of solar generation without significant threat to overall agricultural production. Under other lease arrangements, solar energy development might occur without detriment to farming. While the land is attractive for siting solar PV arrays, it is also valuable as productive farmland. In these arrangements, vegetation growth may be possible under and around the solar system. The University of Massachusetts Crop Research and Education Center is exploring agrivoltaics, where modules are raised high enough off the ground and spaced in a way that crops can still grow around and beneath them, but also permit an economically viable solar development. Fear of a decline in agricultural production may be an important factor in some opposition to solar development, particularly where the value of the land for solar exceeds the current value for agriculture. Research examining the impact on agricultural yields of solar development could prove important to informing future investment in solar generation. State and federal grants to support development of dual-use agrivoltaic systems, such as the Solar Massachusetts Renewable Target (SMART), could help offset these systems' additional costs. Because U.S. agricultural land often enjoys favorable property tax treatment, different states/regions may establish regulations governing the use of agricultural lands for nonagricultural purposes. Local and regional planning commissions can constrain solar development, and may require various permits and clearances that could challenge the longer-term economic feasibility of the solar development, regardless of the suitability of the land for solar deployment. Successfully co-locating agricultural production with solar development could reduce some of the land use planning constraintsâor outright prohibitionsâthat may come with productive agricultural lands proposed for solar development.", "summary": "Use of solar energy for electricity generation is growing in the United States and globally. In the United States, solar energy overall accounted for 2.2% of total electricity generation in 2018, up from 0.7% in 2014. This report addresses a dozen frequently asked questions that may be of interest to lawmakers as the growing use of solar energy potentially affects a variety of areas of congressional interest. The first set of questions looks at different technologies that use solar energy to generate electricity and their costs and prevalence over time. Costs for all components of solar photovoltaic (PV) systems, including cells, modules, inverters, and other related equipment, have generally declined in recent years. Assessing solar energy costs for consumers is challenging because there are many local factors to consider. Another question considers whether using solar energy is a reliable form of electricity generation given its variable nature. The second set of questions discusses federal and state policies aimed at promoting deployment of solar energy in the United States. At the federal level, tax incentives reduce the after-tax cost of investing in solar property, thereby encouraging taxpayers to invest in more solar property than they would have absent tax incentives. Federal tax incentives include an investment tax credit for businesses, eligibility for accelerated depreciation for businesses, and a residential energy efficient property tax credit for individuals. At the state level, renewable portfolio standards (or, more broadly, electricity portfolio standards) require electric utilities to procure a specified amount of electricity from designated, eligible sources. Twenty-nine states, three U.S. territories, and the District of Columbia are implementing electricity portfolio standards. All of these policies include solar energy as an eligible source. Utility-scale solar systems typically benefit from electricity portfolio standards, while commercial- and residential-scale systems typically benefit from a different state policy called net metering. Net metering allows individual electricity consumers to receive payment for the electricity produced by systems installed on their property (or, in some cases, systems not installed on their property but with which consumers have a contractual arrangement). Another set of questions considers the U.S. manufacturing base for solar products and U.S. tariffs, which have been applied over the years on imports of solar equipment. The results on the nation's solar manufacturing industry have been mixed. Different parts of the solar PV supply chain have responded differently to the tariffs. For some components, such as the assembly of solar modules, domestic production has increased since the imposition of tariffs. By one count, about 20 factories assembled PV modules in the United States in 2018. For other components, such as solar cell production, tariffs have not had this effect. At present, there is one major domestic producer of crystalline-silicon solar cells; several producers of solar cells have closed U.S. plants since 2012. A related question discusses the number of U.S. jobs supported by the domestic solar industry, which employed more than 240,000 full-time equivalent workers in 2018. Of these positions, 64% involved two solar sectors, the installation of solar systems and project development. The final questions address some potential environmental considerations associated with the use of solar energy, such as land use. Standard metrics for measuring land use impacts for different energy technologies do not exist. When considering total land area occupied, solar typically requires more land to produce the same amount of electricity than many other sources. Other aspects of land requirements affect comparisons among energy sources, including technology developments over time, land cover change, and time-to-recovery. Po ssible effects on agricultural production are also discussed. Some farmers view solar energy favorably as an income supplement, but others raise concerns about long-term damage to soil health and agricultural productivity. Some researchers are investigating options for dual-use solar PV systems known as agrivoltaics, in which the same land could be used for simultaneous crop production and electricity generation.", "document_type": "crs"}
{"report": "The joint federal-state Unemployment Compensation (UC) program, created by the Social Security Act of 1935, provides unemployment benefits to eligible individuals who become involuntarily unemployed and meet state-established eligibility rules. Federal laws and regulations provide some broad guidelines on UC benefit coverage, eligibility, and benefit determination. However, state laws determine the specific parameters, resulting in essentially 53 different UC programs. States administer UC benefits with oversight from the U.S. Department of Labor (DOL). The main objectives of UC are to (1) offer workers income maintenance during periods of unemployment due to lack of work, providing partial wage replacement as an entitlement; (2) help maintain purchasing power and to stabilize the economy; and (3) help prevent dispersal of the employer's trained labor force, skill loss, and the breakdown of labor standards during temporary high levels of unemployment. The UC program attempts to meet these objectives in a number of ways. For example, individuals who receive UC are required to register with the Employment Service and to be able, available and searching for suitable work. Under federal law, all states currently have the option to disqualify individuals for UC benefits if they lost their job because of illegal drug use. In addition, there has been recent and sustained congressional interest in prohibiting individuals who are engaged in unlawful use of controlled substances (whether or not such use was the cause of unemployment) from receiving UC benefits. In the 112 th Congress, states were given the option to require drug testing for UC applicants under specific and limited circumstances. A portion of these circumstances required that DOL issue a rule listing occupations that regularly require drug testing. On October 4, 2019, the new rule was finalized after a previous, promulgated rule was repealed using the Congressional Review Act. This new final rule is effective November 4, 2019. Thus, after this date, nothing in federal UC law would prohibit states from drug testing UC applicants who are searching for employment solely in those occupations listed in this final rule. The issue of drug testing in the UC program may be viewed in the context of two larger policy trends. First, some state legislatures have expressed interest in drug testing individuals receiving public assistance benefits. Although UC is generally considered to be social insurance (rather than public assistance), drug testing UC beneficiaries could be interpreted as a potential extension of this state-level interest. Second, there has been sustained congressional interest in UC program integrity generally, and this has included drug testing certain applicants or beneficiaries. For instance, during the period from 2011 to 2015 Congress passed three laws ( P.L. 112-40 , P.L. 112-96 , Â andÂ  P.L. 113-67 ) that either added or clarified state administrative responsibilities to decrease UC benefit overpayments, and one of those laws ( P.L. 112-96 ) also imposed new restrictions on UC eligibility. Furthermore, P.L. 112-96 clarified that drug testing may be included among UC program integrity measures to ensure that benefits are not distributed to individuals who are involved in illegal drug use, presuming that this behavior may impede prospects for future employment. This report provides general background on issues related to UC benefits and illegal drug use; discusses recent developments related to the expansion of UC drug testing under state and federal laws as well as federal regulation; and analyzes selected policy considerations relevant to UC drug testing, including arguments for and against expanded drug testing, potential legal concerns, and administrative considerations. The UC program generally does not provide UC benefits to the self-employed, individuals who are unable to work, or individuals who do not have a recent earnings history. Eligibility for UC benefits is based on attaining qualified wages and employment in covered work over a 12-month period (called a base period) prior to unemployment. To receive UC benefits, claimants must be able, available, and actively searching for work. UC claimants generally may not refuse suitable work, as defined under state laws, and maintain their UC eligibility. In addition, states may disqualify claimants who lost their jobs because of inability to work, voluntarily quit without good cause, were discharged for job-related misconduct, or refused suitable work without good cause. The methods states use to determine monetary eligibility (based on an individual's previous earnings history) and nonmonetary eligibility (based on other characteristics related to an individual's unemployment status) vary across state UC programs. An ineligible individual is prohibited from receiving UC benefits under a state's laws until the condition serving as the basis for ineligibility no longer exists. UC eligibility is generally determined on a weekly basis. State UC programs may also disqualify individuals who apply for UC benefits. In this situation, which is distinct from ineligibility, an individual has no rights to UC benefits until she or he requalifies under a state's laws, usually by serving a predetermined disqualification period or obtaining new employment. In some situations, UC benefits may be reduced or wage credits may be cancelled for disqualified individuals. Virtually all states currently disqualify individuals for UC benefits if they lost their jobs because of illegal drug use; it may be considered a \"discharge for misconduct connected with the work.\" In addition, 20 states have UC laws that specifically address other circumstances under which alcohol misuse, illegal drug use, and related occurrences, including refusing to undergo a drug test or testing positive for drugs or alcohol, may be disqualifying. Table 1 reproduces DOL's recent summary information on the 20 states with UC drug provisions. DOL's current interpretation of federal law requires states to determine UC entitlement based only on facts or causes related to the individual's unemployment status, subject to specific exceptions. Current state laws and regulations that disqualify individuals based upon illegal drug use (as discussed above) have been tailored to fit this DOL interpretation. Recent federal legislative and regulatory developments, however, have expanded states' authority to prospectively drug test UC applicants and beneficiaries. These recent developments include the enactment of a federal law permitting two new types of drug testing, the issuance of guidance and regulations to support the implementation of the law, the overturning of these regulations, and the issuing of a new final rule. Section 2105 of the Middle Class Tax Relief and Job Creation Act of 2012 ( P.L. 112-96 ; enacted on February 22, 2012) amended federal law to allow (but not require) states to conduct two types of drug testing. First, it expanded the long-standing state option to disqualify UC applicants who were discharged from employment with their most recent employer (as defined under state law) for unlawful drug use by allowing states to drug test these applicants to determine UC benefit eligibility or disqualification. Second, it allowed states to drug test UC applicants for whom suitable work (as defined under state law) is available only in an occupation that regularly conducts drug testing, with such occupations to be determined under new regulations required to be issued by the Secretary of Labor. On October 9, 2014, DOL released guidance on disqualifying UC applicants based upon certain \"for cause\" discharges. This guidance (which remains in effect at this time) provided states with direction on how to conduct drug testing of UC applicants who are discharged from employment with their most recent employer for illegal use of controlled substances. States are permitted to deny benefits to individuals under these circumstances. On August 1, 2016, DOL issued 20 C.F.R. Part 620, implementing the provisions of P.L. 112-96 related to the drug testing of UC applicants for whom suitable work (as defined under state law) is available only in an occupation that regularly conducts drug testing (as determined under regulations issued by DOL). The rule provided a list of the applicable occupations (20 C.F.R. Part 620.3) for which drug testing is regularly conducted. Significantly, the section of the regulations following this list (20 C.F.R. Part 620.4) limited a state's ability to conduct a drug test on UC applicants to those individuals who are only available for work in an occupation that regularly conducts drug testing under 20 C.F.R. Part 620.3. Thus, although an individual's previous occupation may have been listed in 20 C.F.R. Part 620.3, as long as she or he was currently able to work, available to work, and searching for work in at least one occupation not listed in 20 C.F.R. Â§620.3, the individual could not be subject to drug testing to determine eligibility for UC (unless she or he had been discharged for a drug-related reason). Various stakeholders raised concerns about the UC drug testing provisions enacted under P.L. 112-96 and the 2016 DOL rule finalized under 20 C . F . R . Part 620 . For example, advocates for UC beneficiaries claimed that drug testing applicants did not address any policy problem. On the other hand, a state administration stakeholder group and some Members of Congress contended that states needed more flexibility in implementing drug testing than was offered under the DOL rule. As the 115 th Congress met, the DOL rule was unpopular with some M embers , who considered DOL's interpretation too narrow . Shortly after DOL released the final 2016 rule related to establishing state UC program occupations that regularly conduct drug testing, policymakers used the Congressional Review Act (CRA) to overturn 20 C.F.R. Â§620. On January 1, 2017, Representative Kevin Brady introduced a CRA resolution ( H.J.Res. 42 ) to nullify DOL's 2016 rule. H.J.Res. 42 was passed by the House on February 15, 2017, and passed by the Senate on March 14, 2017. President Trump signed H.J.Res. 42 into law as P.L. 115-17 on March 31, 2017. Because the list of occupations that require regular drug testing no longer exists within the Code of Federal Regulations (as a result of P.L. 115-17 ), the ability to prospectively test UC claimants based upon occupation became no longer available to states. Without this rule, states could drug test UC claimants only if they were discharged from employment because of unlawful drug use or for refusing a drug test. In the Congressional Record for H.J.Res. 42 , several Members provided justifications for their support or opposition of the measure. Representative Kevin Brady, a supporter of the measure, argued that although the intent of the UC drug testing provisions in P.L. 112-96 was to provide states the ability to determine how to best implement drug testing programs, the final regulation narrowed the law to circumstances in which testing is legally required (rather than the broader definition of generally required by employer) and removed state discretion in conducting drug testing in their UC programs. Representative Richard E. Neal, an opponent of the measure, argued there was no evidence that unemployed workers have higher rates of drug abuse than the general population. He also noted that it appeared that some states may be trying to limit the number of workers who collect UC benefits. In addition, in the Congressional Record for S.J.Res. 23 , the Senate companion bill to H.J.Res. 42 , Senator Cruz stated his reasons for support of the Disapproving Rule: The wording of the 2012 job creation act clearly demonstrated that Congress intended to provide States the ability to determine how to best implement these plans.... However, years after the law's passage, the Obama Department of Labor substantially narrowed the law beyond congressional intent to circumstances where testing is legally required, not where it is merely permitted. That narrow definition undermined congressional intent and it undermined the flexibility of the States to conduct drug testing in their programs, as permitted by Congress. This regulation is overly prescriptive. It removes State discretion regarding implementation, and it ignores years of congressional concern on both sides of the aisle. On November 5, 2018, DOL published a Notice of Proposed Rulemaking (NPRM) to reissue the rule identifying occupations that regularly conduct drug testing for purposes of Section 2105 of P.L. 112-96 . It was subsequently issued, with no substantive changes, as a new final rule on October 4, 2019. Because the 2016 regulation on this issue was repealed using the Congressional Review Act, this new rule is subject to the reissue requirements of the CRA. The CRA prohibits an agency from reissuing the rule in \"substantially the same form\" or issuing a \"new rule that is substantially the same\" as the disapproved rule, \"unless the reissued or new rule is specifically authorized by a law enacted after the date of the joint resolution disapproving the original rule.\" According to the front matter of the 2018 NPRM, DOL addressed the reissue requirements of the CRA by asserting that the new rule represents: a substantially different and more flexible approach to the statutory requirements than the 2016 Rule, enabling States to enact legislation to require drug testing for a far larger group of UC applicants than the previous Rule permitted. This flexibility is intended to respect the diversity of States' economies and the different roles played by employment drug testing in those economies. Table 2 compares the list of occupationsâfor which states were permitted to drug test UC applicants for whom suitable work (as defined under state law) is available only in an occupation that regularly conducts drug testingâprovided in 20 C.F.R. Section 620.3 in the 2016 DOL rule and the 2019 DOL reissued final rule. The 2019 reissued final rule includes the same occupations listed in the repealed 2016 rule (20 C.F.R. Â§620.3(a)-(h)) and also provides for two additional types of occupations: those identified by state laws as requiring drug testing (20 C.F.R. Â§620.3(i)); and those for which states have a \"factual basis for finding that employers hiring employees in that occupation conduct pre- or post-hire drug testing as a standard eligibility requirement for obtaining or maintaining employment in that occupation\" (20 C.F.R. Â§620.3(j)). DOL developed the list of occupations set out under 20 C.F.R. Section 620.3(a)-(h) in both the 2016 rule and the reissued 2018 proposed/2019 final rule in consultation with federal agencies that have expertise in drug testing: the Substance Abuse and Mental Health Services Administration (SAMHSA) of the U.S. Department of Health and Human Services; the U.S. Department of Transportation; the U.S. Department of Defense; the U.S. Department of Homeland Security; DOL's Bureau of Labor Statistics (BLS); and DOL's Occupational Safety and Health Administration (OSHA). In the NPRM 2018, DOL justified the additional types of occupations that are included in the 2019 reissued rule (20 C.F.R. Â§620.3(i) and (j)) by highlighting the flexibility that these categories provide, such as their responsiveness to heterogeneity across states in labor market conditions and policy preferences: Employers exercise a variety of approaches and practices in conducting drug testing of employees. Some States have laws that impose very minimal restrictions on employer drug testing of employees while other States have very detailed and proscriptive requirements about what actions the employer can take. That diversity of State treatment also renders an exhaustive list of such occupations impractical. The proposed Rule therefore lays out a flexible standard that States can individually meet under the facts of their specific economies and practices. In the context of recent legislative and regulatory developments, stakeholders have made a number of arguments in support of and in opposition to expanded UC drug testing. This section provides a discussion of these arguments, including comments on the proposed 2018 UC drug testing rule, which contribute additional context for this issue. Policymakers may also consider several types of administrative issues raised by expanded UC drug testing, including program establishment, funding considerations, and the provision of drug treatment services. These are discussed in this section as well. In addition to the expanded UC drug testing authorized under P.L. 112-96 , recent Congresses have considered two alternative approaches to the drug testing of UC applicants and beneficiaries: adding a new federal UC drug testing requirement (i.e., rather than a state option to drug test) or using some type of risk-assessment tool to guide the drug testing of UC claimants. Appendix A provides a discussion of legislation introduced in recent Congresses that would have used these alternative approaches to expanding UC drug testing. None of these bills advanced out of the committees to which they were referred. Proponents of prospective drug testing assert this new UC program function is warranted by program integrity concerns. Additionally, they argue that in today's job market, the ability to pass a drug test is required to be \"job ready.\" Finally, proponents contend that allowing a state to determine the jobs requiring drug testing for itself reflects the UC system's general approach of allowing states flexibility to shape their own UC programs. The Office of Management and Budget (OMB) has designated the UC program as one of 19 \"high-error\" programs. In FY2017, the UC improper payment rate was 12.5%, with a total of $4.1 billion in improper payments. Thus, expanded UC drug testing may be viewed as one type of program integrity measure. The authority for the expanded UC drug testing under Section 2105 of P.L. 112-96 was enacted along with several other program integrity measures (authorized under Sections 2103 and 2104 of P.L. 112-96 ) to ensure that UC benefits are not distributed to individuals involved in illegal drug use, presuming that this behavior may impede prospects for future employment. More specifically, expanded UC drug testing has been described by supporters as a type of program integrity activity that promotes \"job readiness.\" Because federal law requires that UC claimants be able to work, available to work, and actively searching for work as a condition of eligibility, drug testing may be viewed as a measure that helps to verify an ability and availability to work; the logic being that individuals with substance abuse problems would not meet this UC eligibility requirement. For example, Representative Kevin Brady's statements at a September 7, 2016, House Ways and Means Human Resources Subcommittee hearing on \"Unemployment Insurance: An Overview of the Challenges and Strengths of Today's System,\" provide an example of this argument: In a world where more and more industries and careers require workers who are drug free, especially in security-sensitive professions with many directed, by the way, by Federal law, this important reform signed by President Obama made sound policy since then and continues to today. If you have lost a job due to drug use, you have established you are not fully able to work. If you can't take a new job because you can't pass a required basic routine drug test, you are not really available for work either. In both cases, you have forfeited your eligibility to receive unemployment payments subsidized by employers. Additionally, in a letter supportive of H.J.Res. 42 , which nullified DOL's 2016-finalized rule related to establishing state UC program occupations that regularly conduct drug testing, the UWC â Strategic Services on Unemployment & Workers' Compensation (UWC) presented a similar argument: Drug testing is a critical requirement of employment in many industries and generally in determining whether a prospective employee will be able to perform the responsibilities of work for which the individual has applied. The results of drug tests are also indications of whether an individual is able to work and available to work so as to be eligible to be paid unemployment compensation. Supporters of expanded UC drug testing also make the argument that states ought to have the option to prospectively drug test UC claimants as an extension of general state discretion in UC eligibility and administration. Although there are broad requirements under federal law regarding UC benefits, much of the specifics of eligibility are set out under each state's laws. In this way, expanded drug testing, at the option of states, fits with the joint federal-state nature of the UC system. Opponents of the prospective drug testing of UC claimants raise a number of concerns: increased administrative costs, conflicts with the goals of the UC program to provide timely income replacement, and potential legal concerns (see the \" Potential Legal Concerns \" section). Some of the organizations that provided comments on DOL's 2018 proposed rule cite the increased costs of expanded UC drug testing. Details of UC administrative funding are discussed in more detail below in the section on \" Funding a State Drug Testing Program .\" But briefly, the addition of new administrative functions performed by state UC programs without additional administrative funding amounts and/or funding sources is of concern to some stakeholders. For example, in its letter to DOL commenting on the 2018 proposed rule, the Michigan Employment Lawyers Association claims: It is well documented that states don't have adequate funding to truly run their UI programs in a fully efficient and effective manner. As states are experiencing record low administrative funding which is based on unemployment levels, which are historically low, they can scarcely afford additional administrative burdens. Because federal law prohibits assigning this cost to claimants, states would have to absorb the full cost of drug testing thousands of unemployed workers. At a time when they are already struggling to administer their UI programs because of reductions in federal administrative funding, this is a cost they can ill-afford. Opponents of expanded UC drug testing also make the argument that it does not serve, and could even undermine, the fundamental goals of the UC program, which include the timely provision of income replacement to individuals who lost a job through no fault of their own. For instance, advocates for UC beneficiaries claim that drug testing applicants does not address any policy problem. Some stakeholders also worry that expanded UC drug testing could create barriers to UC benefit receipt among eligible individuals (e.g., by discouraging UC claims filing). The comment from Southeastern Ohio Legal Services on DOL's 2018 proposed rule includes the following claims: \"There is no evidence that unemployed workers have higher rates of drug abuse than the general population. Requiring this testing would also add just one more barrier to UI applicants trying to meet the cost of living.\" Similarly, in their comment on the 2018 proposed rule, Senator Ron Wyden and Representative Danny K. Davis asserted: Not only is UI recipiency near a record low, but numerous states in recent years have shortened the number of weeks of UI benefits available to workers. On top of that, more than half of states have insufficient UI trust fund balances, meaning they could only pay unemployment benefits for a short time if a recession hits. The Department of Labor should focus on protecting workers and addressing these challenges to the UI system before the next recession, not proposing regulations to further undermine access to earned benefits. Stakeholders have also raised at least two legal concerns with DOL's 2019 final rule. First, some commenters have argued that UC drug testing programs implemented in accordance with the final rule may violate the Fourth Amendment of the U.S. Constitution. Second, some commenters argue that the rule improperly delegates authority to the states to identify occupations that regularly conduct drug testing. These issues are analyzed in turn. Congress amended Section 303 of the Social Security Act in 2012 to clarify that nothing in federal law prevents states from testing two groups of UC applicants for illicit drug use: (1) those terminated from their previous positions because of drug use (hereinafter referred to as the \"previously terminated\" group), and (2) those who are suited to work \"in an occupation that regularly conducts drug testing\" (hereinafter referred to as the \"regularly tested occupation\" group). As discussed above, DOL issued regulations to guide states on how to design and implement drug testing programs in accordance with Section 303 of the Social Security Act. Constitutional considerations, including protections against unreasonable government searches, may inform the implementation of government-mandated drug testing programs. This section begins with a general overview of the Fourth Amendment and then reviews three Supreme Court opinions addressing the constitutionality of drug testing programs in the employment context, as well as two lower court cases involving similar state laws that conditioned the receipt of federal benefits on passing drug tests. The section concludes with an assessment of factors that might affect the constitutionality of a UC drug testing program in light of the Fourth Amendment. The Fourth Amendment protects the \"right of the people\" to be free from \"unreasonable searches and seizures\" by the federal government. Although Fourth Amendment protections do not extend to purely private action, the Supreme Court has held that its protections extend to state and local action through the Due Process Clause of the Fourteenth Amendment. Governmental conduct generally has been found to constitute a \"search\" for Fourth Amendment purposes where it infringes \"an expectation of privacy that society is prepared to consider reasonable.\" The Court has held on a number of occasions that government-administered drug tests are searches under the Fourth Amendment. Therefore, the constitutionality of a law that requires an individual to pass a drug test to receive UC likely would turn on whether the drug test is reasonable under the circumstances. Whether a search is reasonable depends on the nature of the search and its underlying governmental purpose. Reasonableness under the Fourth Amendment generally requires individualized suspicion, which often, particularly in the criminal law enforcement context, takes the form of a court-issued warrant based on probable cause that a legal violation has occurred. The purpose of a warrant is to ensure that government-conducted searches are legally authorized, rather than \"random or arbitrary acts of government actors.\" However, the Court has held that a warrant is not \"essential\" under all circumstances to make a search reasonable, particularly when \"the burden of obtaining a warrant is likely to frustrate the governmental purpose behind the search.\" The Court has noted, for instance, that \"the probable-cause standard ... may be unsuited to determining the reasonableness of administrative searches\" that are conducted for purposes unrelated to criminal investigations. For these noncriminal, administrative searches, courts typically employ a reasonable suspicion standard, which is \"a lesser standard than probable cause.\" The Court has \"deliberately avoided reducing [the reasonable suspicion standard] to a neat set of legal rules,\" but at a minimum, the standard requires that, in light of the \"totality of the circumstances,\" there is a \"particularized and objective basis,\" beyond \"a mere hunch,\" that a search would uncover wrongdoing. Additionally, while a search generally must be based on \"some quantum of individualized suspicion\" to be reasonable under the Fourth Amendment, the Court has held that \"a showing of individualized suspicion is not a constitutional floor.\" \"In limited circumstances,\" when a search imposes a minor intrusion on an individual's privacy interests, while furthering an \"important government interest\" that would be undermined by requiring individualized suspicion, \"a search may be reasonable despite the absence of such suspicion.\" The Court has recognized an exception to the typical individualized suspicion requirement \"when special needs, beyond the normal need for law enforcement, make the warrant and probable-cause requirement impracticable,\" and the government's needs outweigh privacy interests invaded by a search. The Court noted that \"[o]ur precedents establish that the proffered special need for drug testing must be substantialâimportant enough to override the individual's acknowledged privacy interest.\" The Court has recognized two categories of \"special needs\" substantial enough to justify suspicionless drug testing: in the employment context, where individuals perform activities involving matters of public safety, and the public school setting, involving children in the government's care. In instances where the government argues that \"drug tests 'fall within the closely guarded category of constitutionally permissible suspicionless searches',\" courts determine whether such searches are reasonable under the circumstances by balancing the competing interests of the government conducting the search and the private individuals who are subject to the search. Thus, even if special needs exist, government-mandated searches could still run afoul of the Fourth Amendment if they are excessively intrusive or otherwise significantly invade the privacy interests of affected individuals. The Court has assessed the constitutionality of governmental drug testing programs in a number of contexts. Three opinions in the employment context seem especially relevant to the question of whether a mandatory, suspicionless drug test for the receipt of UC would be considered an unreasonable search in violation of the Fourth Amendment. Additionally, two lower court cases, in which state laws that established mandatory, suspicionless drug testing programs as a condition to receiving Temporary Assistance for Needy Families (TANF) (formerly welfare) benefits were successfully challenged on Fourth Amendment grounds, could provide relevant insight into how future courts might assess the constitutionality of a UC drug testing program. These five cases are assessed in turn. In Skinner v. Railway Labor Executives Association , the Court upheld as reasonable under the Fourth Amendment Federal Railroad Administration (FRA) regulations that required breath, blood, and urine tests of railroad workers involved in train accidents. The Court held that the \"special needs\" of railroad safetyâfor \"the traveling public and the employees themselves\"âmade traditional Fourth Amendment requirements of a warrant and probable cause \"impracticable\" in this context. According to the Court, covered rail employees had \"expectations of privacy\" as to their own physical condition that were \"diminished by reasons of their participation in an industry that is regulated pervasively to ensure safety,\" and the testing procedures utilized \"pose[d] only limited threats to the justifiable expectations of privacy of covered employees.\" In these circumstances, the majority held, it was reasonable to conduct the tests, even in the absence of a warrant or reasonable suspicion that any employee may be impaired. In National Treasury Employees Union v. Von Raab , which was handed down on the same day as Skinner , the Court upheld suspicionless drug testing of U.S. Customs Service personnel who sought transfer or promotion to certain \"sensitive\" positionsâi.e., those that require carrying guns or are associated with drug interdiction. The Court concluded that covered employees had \"a diminished expectation of privacy interests\" due to the nature of their job duties. Additionally, the applicable testing procedures were minimally invasive on privacy interests because employees were provided advanced notice of testing procedures; urine samples were only tested for specified drugs and were not used for any other purposes; urine samples were provided in private stalls; employees were not required to share personal medical information except to licensed medical professionals, and only if tests were positive; and the testing procedures were \"highly accurate.\" Therefore, the Court held that the suspicionless drug testing program was reasonable under the Fourth Amendment. In contrast, the Court in Chandler v. Miller struck down a Georgia statute requiring candidates for certain elective offices be tested for illicit drug use. The majority opinion noted several factors distinguishing the Georgia law from drug testing requirements upheld in earlier cases. First, there was no \"fear or suspicion\" of generalized illicit drug use by state elected officials. The Court noted that, while not a necessary constitutional prerequisite, evidence of historical drug abuse by the group targeted for testing might \"shore up an assertion of special need for a suspicionless general search program.\" In addition, the law did not serve as a \"credible means\" to detect or deter drug abuse by public officials because the timing of the test was largely controlled by the candidate rather than the state and legal compliance could be achieved by a mere temporary abstinence. Finally, the \"relentless scrutiny\" to which candidates for public office are subjected made suspicionless testing less necessary than in the case of safety-sensitive positions beyond the public view. The Chandler Court went on to stress that searches conducted without individualized suspicion generally must be linked to a degree of public safety \"important enough to override the individual's acknowledged privacy interest\" to be reasonable. At least outside the context of drug testing related to children in the government's care, the Chandler Court seemed to indicate that \"where ... public safety is not genuinely in jeopardy, the Fourth Amendment precludes the suspicionless search, no matter how conveniently arranged.\" The federal district court ruling in Marchwinski v. Howard , which was affirmed by the U.S. Court of Appeals for the Sixth Circuit as a result of an evenly divided en banc panel, involved a state program requiring the suspicionless drug testing of TANF applicants. The district court in Marchwinski stated that \"the Chandler Court made clear that suspicionless drug testing is unconstitutional if there is no showing of a special need [] that ... [is] grounded in public safety.\" According to the Marchwinski court, the state's \"primary justification ... for instituting mandatory drug testing is to move more families from welfare to work.\" This legislative objective, however, is not \"a special need grounded in public safety\" that would justify a suspicionless search, in the court's view. The court also noted that allowing the state to conduct suspicionless drug tests in this context would provide a justification for conducting suspicionless drug tests of all parents of children who receive governmental benefits of any kind, such as student loans and a public education, which \"would set a dangerous precedent.\" Thus, the court granted the plaintiffs' motion for a preliminary injunction, concluding that the \"Plaintiffs have established a strong likelihood of succeeding on the merits of their Fourth Amendment claim.\" The state subsequently agreed to halt suspicionless drug testing. In another TANF case, Lebron v. Secretary, Florida Department of Children and Families , a three-judge panel of the U.S. Court of Appeals for the Eleventh Circuit unanimously affirmed a district court's ruling that a mandatory drug testing law applicable to TANF beneficiaries in Florida was unconstitutional. While \"viewing all facts in the light most favorable to the State,\" the panel concluded that \"the State has not demonstrated a substantial special need to carry out the suspicionless search.\" The panel also determined that the state had not provided evidence to support the notion that drug use by TANF recipients was any different than that of the Florida population at-large, and even if it had, this \"drug-testing program is not well designed to identify or deter applicants whose drug use will affect employability, endanger children, or drain public funds.\" The state did not seek en banc review or appeal the panel decision to the Supreme Court. Whether a government drug testing program comports with the Fourth Amendment may depend largely on the program's purpose and scope. Supreme Court precedent indicates that drug testing programs, unrelated to criminal law enforcement, that only authorize testing based on an individualized, reasonable suspicion of drug useâsuch as through direct observation of an individual's drug impairment by trained personnel at a UC application siteâare more likely to comport with the Fourth Amendment. In the absence of suspicion, the Court has held that governmental drug tests must promote \"special needs\" compelling enough to outweigh the privacy interests of the individuals subject to the test. Under current precedent, the Court has only recognized two contexts where \"special needs\" have justified suspicionless drug tests when balanced against the subjects' competing privacy interests: in cases where individuals were employed in occupations involving public safety concerns; and the public school setting , where the government is responsible for the health and safety of children. Although not dispositive, Supreme Court case law also suggests that suspicionless drug testing programs imposed on a subset of the population that has a \"demonstrated problem of drug abuse\" may help tilt the balancing test in the government's favor, especially if the testing program is designed to effectively address the problem. Moreover, drug testing programs that require results to be kept confidential to all but a small group of nonlaw enforcement officials, are not conducted for criminal law enforcement purposes, and only minimally affect an individual's life are more likely to be considered reasonable. On the other hand, programs that allow drug test results to be shared, especially with law enforcement, or that otherwise have the potential to negatively impact multiple or significant aspects of an individual's life, may be less likely to be considered reasonable. Given this case law, the constitutionality of a UC drug testing program will likely depend on how the program is structured. Additionally, the constitutional analysis might vary as it applies to each of the two categories of UC applicants that states are permitted to test under Section 303 of the Social Security Actâi.e., the \"regularly tested occupation\" and \"previously terminated\" categories. Specifically, questions of whether individualized suspicion might justify testing appears potentially relevant to certain \"previously terminated\" UC applicants. Additionally, \"special needs\" analysis could be relevant to UC applicants who fall in DOL's proposed \"regularly tested occupation\" category. The remainder of this section addresses these potentially constitutionally significant characteristics of any UC drug testing program, in turn. The reasons why an individual falls into the \"previously terminated\" category could be relevant to a reasonable suspicion analysis, but, as discussed below, whether or not there is reasonable suspicion to support testing a particular applicant will likely depend on how the category is defined and the facts and circumstances associated with that applicant's employment termination. For example, the strength of the evidence tying an individual's termination to illicit drug use might be relevant. If a UC applicant was terminated from his or her previous position because of a criminal drug conviction or because of a failed employer-mandated drug test, there might be more compelling evidence for a reasonable suspicion analysis than if an at-will employee was fired for a number of reasons unrelated to drugs but also, in part, because he or she was rumored to have used illicit drugs outside of work. If a termination was based on the results of an employer-administered drug test, the relative strength of the test results on a reasonable suspicion analysis might be affected by the reliability of the drug test's results, whether or not the test was conducted pursuant to procedures sufficient to ensure urine or blood samples had not been tampered with, and whether or not those who performed the test were adequately trained. A reasonable suspicion analysis might also be affected by the time lapse between the termination and the UC drug test. A court might conclude, for instance, that a UC drug test is less likely to uncover illicit drug use if many months have passed since a UC applicant was fired, than if the termination and test happened within a few days of each other. A special needs analysis could be relevant to mandatory drug testing of UC applicants who fall in the \"regularly tested occupation\" cohort. The relative strength of a special needs legal defense of such a suspicionless drug testing program would likely depend on how the \"regularly tested occupation\" group is defined by implementing states. Additionally, there are notable differences between (1) individuals applying for UC benefits while searching for jobs in a \"regularly tested occupation\" and who are tested for illicit drugs by UC administrators and (2) individuals who are currently performing or in the final stages of being hired to perform safety-sensitive duties and who are drug tested by an employer. As discussed below, whether a reviewing court would consider these distinctions to be constitutionally significant is unclear. The remainder of this section first analyzes potentially relevant factors associated with how states might define the \"regularly tested occupation\" category, and then assesses the potentially constitutionally relevant distinctions between employer-mandated and UC administrator-mandated drug testing. In the absence of individualized suspicion, the Supreme Court has cautioned that \"where ... public safety is not genuinely in jeopardy, the Fourth Amendment precludes the suspicionless search, no matter how conveniently arranged.\" Absent a court recognizing a new category of special needs that may outweigh an individual's privacy interests, states, at a constitutional minimum, would likely need to define the \"regularly tested occupation\" group to encompass only occupations that involve matters of public safety in accordance with the Supreme Court special needs precedent. The \"regularly tested occupations\" category in DOL's 2019 regulation delineates a number of occupations that appear to be in line with those previously upheld under special needs precedent. These include an occupation that requires the employee to carry a firearm and an occupation that is subject to drug testing under Federal Railway Administration, Federal Motor Carrier Safety Administration, Federal Aviation Administration, or Federal Transit Administration regulations. However, the regulations also do not prohibit states from testing for \"[a]n occupation where the State has a factual basis for finding that employers hiring employees in that occupation conduct pre- or post-hire drug testing as a standard eligibility requirement for obtaining or maintaining employment in the occupation.\" As described below, it might be possible for an occupation to fall within the latter category but not comport with current Fourth Amendment precedent. Because the Fourth Amendment's protections against unreasonable searches and seizures only apply to governmental action, drug testing imposed by private employers \"not acting as an agent of the Government or with the participation or knowledge of any governmental official \" are completely \"unguarded by Fourth Amendment constraints.\" Consequently, private employers might regularly impose suspicionless drug tests in some occupations that do not involve safety-sensitive special needs because they are not constrained by the Fourth Amendment. However, Fourth Amendment protections would apply to drug tests imposed on the same individuals to the extent they are mandated by a state as part of a UC program. As a result, state programs that require suspicionless drug tests of UC applicants who are suitably employed in occupations that are regularly subject to drug testing by private employers but, nevertheless, are not related to public safety functions in accordance with Supreme Court precedent could potentially run afoul of the Fourth Amendment. However, even if a state's \"regularly tested occupation\" drug testing program is limited to individuals whose suitable work is grounded in public safety in line with the Supreme Court's special needs jurisprudence, the program might still raise constitutional concerns. UC beneficiaries, unlike the plaintiffs in Skinner and Von Raab , are not actively performing or directly being considered for employment to perform duties grounded in public safety by the governmental entity that would be administering drug tests tied to the UC program. To the contrary, these individuals would merely be applying for or receiving unemployment benefits while agreeing not to turn down \"suitable work\" as defined by state law. A reviewing court might find this distinction constitutionally significant and, consequently, consider a UC drug testing program as more akin to the TANF drug testing programs addressed by the Marchwinski and Lebron courts than the testing programs upheld in Skinner and Von Raab . Under this line of reasoning, a reviewing court could conclude that, regardless of how it is structured, the underlying purpose of a UC drug testing program is primarily designed \"to promote work ... and conserve resources\" and, consequently, not sufficiently tied to public safety concerns that would warrant a special needs exception to the Fourth Amendment's protection against unreasonable searches. Additional factors that a reviewing court might weigh when balancing the government's interest in conducting a drug test and the individual's competing privacy interests include the prevalence of illicit drug use in the cohort of UC applicants who are subject to suspicionless drug testing; how effectively the drug testing program is designed to identify and eliminate illicit drug use; whether procedural safeguards are in place to ensure that sufficiently trained personnel conduct the test, testing samples are protected from contamination, test results are accurate, and the test subject's medical and other personal information are protected; and the extent to which drug test results are shared beyond the UC program and could negatively affect other aspects of an individual's life. Regarding the latter factor, laws that authorize drug test results to be shared with law enforcement personnel, in particular, might raise heightened Fourth Amendment concerns. Section 303( l )(1)(A)(ii) of the Social Security Act permits a state to adopt legislation for the drug testing of UC applicants when the only suitable work for such applicants is in occupations that regularly conduct drug testing. The section provides that these occupations will be determined \"under regulations issued by the Secretary of Labor.\" DOL's 2019 final regulations identify eight occupations that regularly conduct drug testing, including certain aviation and motor carrier occupations described in existing Federal Aviation Administration and Federal Motor Carrier Safety Administration regulations. In addition, the regulations identify two more occupations with reference to a state's involvement in the determination: (1) An occupation specifically identified in the State law of that State as requiring an employee to be tested for controlled substances; and (2) An occupation where the State has a factual basis for finding that employers hiring employees in that occupation conduct pre- or post-hire drug testing as a standard eligibility requirement for obtaining or maintaining employment in the occupation. Because these two additional occupations would seem to be determined by the state, some have contended that DOL is improperly subdelegating the authority it was provided by Section 303( l )(1)(A)(ii) to the state. Commenting on the 2018 reproposed regulations, the National Employment Law Project maintained: Congress mandated that occupations that regularly drug test are to be \"determined under regulations issued by the Secretary of Labor.\" In violation of that explicit directive, DOL has issued an NPRM that simply hands that power to the States, and provides little to no guidance concerning how that determination is to be made. When a statute delegates authority to a federal officer or agency, subdelegation to an outside party other than a subordinate federal officer or agency is generally assumed to be improper absent an affirmative showing of congressional authorization. In U.S. Telecom Association v. Federal Communications Commission , the U.S. Court of Appeals for the District of Columbia Circuit (D.C. Circuit) explained that subdelegations to outside parties are problematic because \"lines of accountability may blur, undermining an important democratic check on government decision-making.\" The D.C. Circuit further observed that subdelegation increases the risk that an outside party may pursue policy goals that are inconsistent with those of the agency and the underlying statute. While subdelegation by a federal agency to an outside party is generally prohibited, courts have permitted some outside party input into an agency's decisionmaking. In U.S. Telecom , the D.C. Circuit concluded that outside party input is permissible when it acts as a reasonable condition for granting federal approval, such as the need to obtain a local license or permit; when the outside party is simply providing factual information to a federal agency; and when the outside party is providing advice or policy recommendations to a federal agency that retains final decisionmaking authority. In Fund for Animals v. Kempthorne , the U.S. Court of Appeals for the Second Circuit determined that the U.S. Fish and Wildlife Service (FWS) did not improperly subdelegate its authority when it issued an order permitting state fish and wildlife agencies to kill certain migratory birds without a permit to prevent depredations of wildlife and plants. Pursuant to the Migratory Bird Treaty Act, the FWS is authorized to make certain determinations involving migratory birds, including when to allow for their hunting, capture, or killing. The plaintiffs in Fund for Animals , a group of individuals and environmental organizations, challenged the depredation order, arguing that the killing of the relevant birds could only be authorized by the FWS and not a state fish and wildlife agency. The Second Circuit contended that the depredation order operated as a \"grant of permission\" that was conditioned on a state fish and wildlife agency's determination that a depredation would occur if action were not taken. Citing U.S. Telecom , the court viewed this kind of determination as permissible outside party input. The court maintained that the depredation order did not represent a delegation of authority, but was an exercise of FWS's permitting authority that incorporated relevant local concerns. In light of Fund for Animals , it seems possible to argue that a state's role in identifying \"occupations that regularly conduct drug testing\" should be viewed like the state fish and wildlife agency's role in making determinations about depredations. One might contend that DOL's 2019 regulations are not a delegation of authority to the states, but instead provide for an incorporation of local concerns to identify the relevant occupations. Like the FWS, DOL would arguably be conditioning the drug testing of unemployment compensation applicants, at least for some individuals, on the state's identification of certain occupations. Ultimately, a legal challenge of the final regulations seems possible. Opponents of the state's role in identifying \"occupations that regularly conduct drug testing\" would likely maintain that the regulations provide more than a condition for identifying when the drug testing of UC applicants is appropriate, but are a delegation to an outside party without the explicit authorization of Congress. Proponents might insist, however, that the regulations simply provide the state an opportunity to identify a condition for such drug testing. In order for a state to begin actively drug testing individuals applying for UC benefits under the authority provided by P.L. 112-96 and the newly reissued final DOL rule required by Section 2105, it must consider several policy issues related to designing, financing, and implementing a program. States must establish drug testing programsâand, according to DOL, three states (Mississippi, Texas, and Wisconsin) have already enacted laws to do so. States may also consider the issue of providing and funding drug treatment services for UC claimants. States that enact laws to drug test UC applicants under the authority provided them by P.L. 112-96 must establish their own drug testing programs. According to DOL guidance, states may enter into a contract with an entity to conduct the drug tests on behalf of the state. When conducting tests for illegal use of controlled substances, the state must use a test that meets or exceeds the standards of the Mandatory Guidelines for Federal Workplace Drug Testing Programs, published by the Substance Abuse and Mental Health Services Administration (SAMHSA), or the U.S. Department of Transportation (DOT) procedures. Tests that do not meet or exceed (i.e., have more rigorous standards for sample collection, chain of custody, and other procedural requirements) SAMHSA guidelines or DOT procedures may not be used to determine an individual's eligibility for UC. Funding for the additional costs associated with DOL-approved drug testing programs would come from the same state administrative grants that states use to run their UC programs generally; states would be prohibited from requiring UC claimants to pay for any drug testing costs. Administrative costs for state UC programs are financed through the Federal Unemployment Tax Act (FUTA), one of two types of payroll taxes on employers. The 0.6% effective net FUTA tax paid by employers on the first $7,000 of each employee's earnings (no more than $42 per worker per year) funds federal and state administrative costs, loans to insolvent state UC accounts, the federal share (50%) of Extended Benefit (EB) payments, and state employment services. In FY2018, an estimated $6.3 billion was collected in federal FUTA taxes, whereas an estimated $37.1 billion was collected in State Unemployment Tax Acts (SUTA) taxes to finance UC benefits. As discussed above in the section on \" Arguments Against Expanded UC Drug Testing ,\" some opponents of expanded UC drug testing are concerned about the adequacy of the existing stream of FUTA revenue for the new administrative function of drug testing UC applicants. According to DOL, three statesâMississippi, Texas, and Wisconsinâhave enacted laws under the UC drug testing authority provided by P.L. 112-96 . For summary information on these state laws, see Appendix B . The implementation of these laws is subject to applicable federal law, including the final DOL rule required by Section 2105 of P.L. 112-96 . Thus, in the absence of a final rule and until the issuance of the new rule, the three states had not implemented their programs. One of the underlying goals of the UC program is to provide income security after an individual becomes unemployed so that she or he may find suitable work. At least one state (Wisconsin) has a program addressing the underlying barriers of illicit drug use preventing work-readiness. In this program, if an employer voluntarily reports that a claimant failed a pre-employment drug test (without a valid prescription) and the claimant has not established that she or he had good cause, the claimant is to be offered the option to attend a drug treatment program and complete a skills assessment. If the claimant agrees to undergo drug treatment and complete a skills assessment, and does so in the required timeframe, the individual may continue to collect UC benefits. The Wisconsin UC program is to furnish the claimant with referrals and instructions in order to complete the assessment and access treatment directly. The claimant must also continue to meet all other UC program requirements. The program includes a budget of $500,000 to fund and administer a statewide substance abuse program. Currently, no funding streams exist within the UC program dedicated to financing drug treatment services. Federal law sets limits on the permissible uses of SUTA funds. Section 3304(a)(4) of the Internal Revenue CodeÂ (IRC)Â and Section 303(a)(5) of the SSA set out the \"withdrawal standard\" for how states may use SUTA funds deposited within their state account in the Unemployment Trust Fund (UTF). Neither Section 3304(a) of the IRC nor Section 303(a)(5) of the SSA includes drug treatment services as a permissible use of SUTA funds. Additionally, grants to states for administrative expenses, which are financed by FUTA revenue, are limited under current law. Section 901(c)(1)(A) of the SSA sets out the authorized uses of these FUTA funds, which do not include drug treatment services. Nothing in federal UC law, however, prohibits states from using funding from non-FUTA or non-SUTA sources to finance drug treatment services for UC claimants. For instance, many states collect additional taxes for administrative purposes, including job training, employment service administration, or technology improvements. According to DOL, in 2019 there were 30 states with additional taxes for administrative purposes. It appears that none of these taxes have been collected for the purposes of funding drug treatment services. Appendix A. Additional Recent Legislative Approaches to UC Drug Testing In addition to the recent statutory and regulatory developments in UC drug testing related to P.L. 112-96 , legislation introduced in recent Congresses has proposed using other approaches to drug test UC applicants and beneficiaries. These approaches have generally either proposed a new federal UC drug testing requirement or some type of risk-assessment tool to guide the drug testing of UC claimants. New Federal Requirement to Drug Test One legislative option would be to add a new federal requirement to drug test UC applicants and beneficiaries. This type of approach differs from allowing states to expand UC drug testing (as under P.L. 112-96 ). There have been some proposals calling for this approach in recent Congresses. For example, H.R. 2001 (112 th Congress)Â would have created a new federal requirement that individuals be deemed ineligible for UC benefits based on previous employment from which they were separated due to an employment-related drug or alcohol offense. This proposal would have required states to amend their state UC laws. H.R. 1172 Â (113 th Congress) also would have created a new federal requirement that individuals be deemed ineligible for UC benefits based on previous employment from which they were separated due to an employment-related drug or alcohol offense. It would have denied benefits to anyone who (1) was discharged from employment for alcohol or drug use, (2) was in possession of controlled substance at a place of employment, (3) refused the employer's drug test, or (4) tested positive on the employer's drug test for illegal or controlled substances. This proposal would have required states to amend their state UC laws. Another proposal, the Accountability in Unemployment Act ( H.R. 3615 in the 112 th Congress, H.R. 1277 in the 113 th Congress, and H.R. 1136 in the 114 th Congress),Â would have created a new federal requirement for states to drug test all UC claimants as a condition of benefit eligibility. Under this proposal, if an individual tested positive for certain controlled substances (in the absence of a valid prescription or other authorization under a state's laws), he or she would have been required to retake a drug test after a 30-day period and test negative in order to be eligible for UC benefits. This proposal would have made individuals ineligible for UC benefits for five years after a third positive drug test. Risk Assessment-Based Drug Testing Another policy approach toward UC drug testing proposed in recent Congresses involves using a substance abuse risk assessment tool to screen UC applicants and beneficiaries and then drug test those individuals determined likely to be engaged in the unlawful use of controlled substances. In this way, such an approach attempts to avoid suspicionless drug testing. This type of proposal was introduced in the Ensuring Quality in the Unemployment Insurance Program (EQUIP) Act in the 112 th Congress ( H.R. 3601 ) , 113 th Congress ( H.R. 3454 ) , 114 th Congress ( H.R. 2148 ) , 115 th Congress ( H.R. 3330 ) , and the 116 th Congress ( H.R. 1121 ) . The EQUIP Act would have added a new federal requirement that individuals undergo a substance abuse risk assessment for each benefit year as a condition of eligibility for UC in all states. This new federal requirement would also have required individuals deemed to be at high risk for substance abuseâbased on the assessment resultsâto test negative for controlled substances within one week after the assessment to qualify for UC benefits. Under this proposal, the screening assessment tool would have had to have been approved by the director of the National Institutes of Health and been \"designed to determine whether an individuals has a high risk of substance abuse.\" Appendix B. Enacted State UC Laws Subsequent to P.L. 112-96 According to DOL's 2018 Comparison of State Unemployment Compensation Laws , three states have enacted laws under the authority provided by P.L. 112-96 (with \"implementation subject to applicable Federal law\"): Mississippi, Texas, and Wisconsin. Mississippi Section 40 of SB2604, Regular Session 2012 (Chapter 515; signed by Governor on May 1, 2012) added drug testing provisions to state UC eligibility requirements under Mississippi state law. This 2012 Mississippi law permits drug testing on individuals as a condition of eligibility for benefits if the individual was discharged because of unlawful drug use or if s/he is seeking suitable work only in an occupation that requires drug testing. Individuals may be denied benefits based on the results of these drug tests, but may end the disqualification period early by submitting acceptable proof of a negative drug test from an approved testing facility. Texas In Texas, SB21 (Chapter 1141, enacted July 14, 2013; effective September 1, 2013) added drug testing provisions to state UC eligibility requirements under state law. This 2013 Texas law permits drug testing, as a condition of eligibility of benefits, on individuals for whom suitable work is available only in an occupation that regularly conducts pre-employment drug testing. Wisconsin Section 3115 of 2015 Wisconsin Act 55 (2015 Senate Bill 21, enacted July 12, 2015) added drug testing provisions to state UC eligibility requirements under Wisconsin state law. This 2015 Wisconsin law require[s] the establishment of rules for a drug testing program for controlled substances, including rules identifying occupations for which drug testing is regularly conducted in the State. ", "summary": "Recent interest in Unemployment Compensation (UC) drug testing has grown at both the federal and state levels. The policy interest in mandatory drug testing of individuals who are applying for or receiving UC benefits parallels two larger policy trends. First, some state legislatures have considered drug testing individuals receiving public assistance benefits. While UC is generally considered social insurance (rather than public assistance), the concept of drug testing UC recipients (who are receiving state-financed benefits from a program authorized under state laws) could be interpreted as a potential extension of this state-level interest. Second, over recent years, Congress has considered issues related to UC pro gram integrity, including drug testing, which may be viewed as addressing UC program integrity concerns. Under the current interpretation of federal law, and subject to specific exceptions, the U.S. Department of Labor (DOL) requires states to determine entitlement to benefits under their UC programs based only on facts or causes related to the individual's state of unemployment. Under this reasoning, individuals may be disqualified for UC benefits if they lost their previous job because of illegal drug use. Until recently, the prospective drug testing of UC applicants or beneficiaries has been generally prohibited. However, P.L. 112-96 expanded the breadth of allowable UC drug testing to include prospective drug testing based upon job searches for suitable work in an occupation that regularly conducts drug testing. On October 4, 2019, DOL issued a new final rule on this type of prospective testing after a previous, promulgated rule was repealed using the Congressional Review Act. This new final rule is effective November 4, 2019. Stakeholders have made a variety of arguments for and against expanded UC drug testing. Proponents of prospective drug testing cite not only program integrity concerns, but also the importance of job readiness for UC claimants as well as state discretion in matters of UC eligibility and administration. Opponents of the prospective drug testing of UC claimants argue that it would impose additional costs and undermine the fundamental goals of the UC program, which include the timely provision of income replacement to individuals who lost a job through no fault of their own. Some stakeholders also expressed concern that expanded UC drug testing could create barriers to UC benefit receipt among eligible individuals and discourage UC claims filing. Stakeholders have also raised at least two legal concerns with the new final UC drug testing rule: (1) some commenters have argued that the new final rule may violate the Fourth Amendment of the U.S. Constitution, and (2) some commenters have argued that the new final rule improperly delegates authority to the states to identify occupations that regularly conduct drug testing. Other policy issues to consider related to expanding UC drug testing include administrative concerns, such as state establishment of a drug testing program for UC claimants as well as the potential provision of and funding for drug treatment services. For a shorter summary of recent events related to UC drug testing, see CRS Insight IN10909, Recent Legislative and Regulatory Developments in States' Ability to Drug Test Unemployment Compensation Applicants and Beneficiaries . For additional information on the federal-state UC system generally, see CRS Report RL33362, Unemployment Insurance: Programs and Benefits . For additional insights on reissuing a rule that had been repealed under the Congressional Review Act, see CRS Insight IN10996, Reissued Labor Department Rule Tests Congressional Review Act Ban on Promulgating \"Substantially the Same\" Rules .", "document_type": "crs"}
{"report": "The U.S. Army Corps of Engineers (USACE) is an agency within the Department of Defense with both military and civil works responsibilities. Congress directs USACE's civil works activities through authorization legislation, annual and supplemental appropriations, and oversight activities. This report summarizes USACE's annual discretionary appropriations for civil works activities, which typically are funded through Title I of annual Energy and Water Development appropriations acts. First, the report introduces USACE and its funding. Second, it summarizes the appropriations process through discussions of three major milestones: President's budget request, congressional appropriations process, and annual USACE work plan. Third, the report provides a brief discussion of trends and policy questions related to USACE annual appropriations. A military Chief of Engineers commands USACE's civil and military operations. The Assistant Secretary of the Army for Civil Works (ASACW) provides civilian oversight of USACE. The agency's responsibilities are organized into eight geographically based divisions, which are further divided into 38 districts. As part of USACE's civil works activities, Congress has authorized and appropriated funds for the agency to perform the following: water resource projects for maintaining navigable channels and harbors, reducing risk of flood and storm damage, and restoring aquatic ecosystems, among other purposes; environmental infrastructure assistance; regulation of activities affecting certain waters and wetlands activities; and remediation of sites involved in the development of U.S. nuclear weapons from the 1940s through the 1960s, administered under the Formerly Utilized Sites Remedial Action Program (FUSRAP). From FY2010 to FY2020, Congress provided USACE with appropriations ranging from $4.72 billion in FY2013 to $7.65 billion in FY2020. Unlike federal funding for highways and municipal water infrastructure, the majority of federal funds provided to USACE are not distributed by formula to states or through competitive grant programs. Instead, USACE generally expends the appropriations on its congressionally authorized water resource projects. That is, the majority of USACE's appropriations are for the planning, construction, and operation of the agency's water resource projects, such as multipurpose dams and commercial navigation improvements along coasts and inland waterways. Congress generally funds USACE civil works through Title I of annual Energy and Water Development appropriations acts. In addition to funding the agency's water resource activities, Congress provided $100 million for environmental infrastructure activities, $210 million for USACE regulatory activities, and $200 million for FUSRAP in FY2020. Each year, some USACE projects receive construction funds; however, many authorized USACE construction projects have not been federally funded for years after their authorization. That is, Congress has authorized construction projects and rehabilitation and repair work that totals an estimated $96 billion: approximately $32 billion of authorized but unfunded projects and approximately $64 billion of rehabilitation and repair work (e.g., for dam safety). This is often referred to as the agency's construction backlog . The backlog includes much more authorized work than can be accomplished with annual construction appropriations, which has ranged from $2.1 billion to $2.7 billion annually during FY2018 through FY2020. A subset of the projects in the backlog are funded in a given year, and many projects in the backlog receive no funds for years. Congress also has provided USACE with emergency supplemental appropriations in some years, typically in response to floods. Most of these supplemental funds are directed to repairing damage to existing USACE facilities, paying for flood fighting and repair of certain levees and dams maintained by nonfederal entities, and constructing new riverine and coastal flood control improvements. For more information on supplemental funds for USACE and associated congressional direction, see CRS In Focus IF11435, Supplemental Appropriations for Army Corps Flood Response and Recovery , by Nicole T. Carter and Anna E. Normand. In addition to federal funding, most USACE activities require a nonfederal sponsor to share some portion of project costs. For some project types (e.g., levees), nonfederal sponsors are required to perform operation, maintenance, repairs, replacement, and rehabilitation of the works once construction is complete. For more information on nonfederal cost-share requirements, see CRS Report R45185, Army Corps of Engineers: Water Resource Authorization and Project Delivery Processes , by Nicole T. Carter and Anna E. Normand. The annual appropriations process generally involves three major milestones: President's budget request, congressional deliberation and enactment of appropriations, and Administration development of a USACE work plan (see Figure 1 ). The process begins with the release of the President's budget request, typically in early February (i.e., roughly eight months before the start of the fiscal year addressed by the request), although it is sometimes delayed. Congress may consider the President's budget request, stakeholder interests, and other factors when creating an annual Energy and Water Development appropriations bill that includes USACE civil works activities. The length of the congressional appropriations process varies from year to year, as shown in Figure 1 . Following enactment of the Energy and Water Development bill, the Administration develops a USACE work plan, which identifies the amount of additional funding provided to specific studies and projects. The following sections describe these major milestones in more detail. The President's budget request for USACE typically is for funding at the account level (i.e., Investigation, Construction, and Operation and Maintenance), as shown in the appendix to the President's FY2020 budget request. The agency's budget justification includes more detailed information regarding the request by providing information for specific activities, such as the level of funding requested for particular USACE studies and construction projects. USACE also publishes a summary of this information in a document it refers to as the p ress b ook . The press book shows the requested funding for USACE projects for each state and identifies how the President's requests for various accounts are distributed across the agency's business line s (i.e., types of activities, such as navigation, restoration, and recreation) in a crosswalk (see Appendix A ). In recent years, the executive branch has used various metrics, including benefit-cost ratios and other performance criteria, to identify which projects and activities to include in the President's request. For example, to identify operation and maintenance investments, the Administration's budget development guidance has used risk assessments, which consist of an evaluation of an existing project's condition and the consequences of reduced project performance (i.e., the consequence of not making an investment). USACE budget development guidance describes these metrics and other aspects of the budget development process each year. Recent Administrations also have limited funding for new starts to focus on completing existing projects and on actions to address aging infrastructure. As shown in Figure 2 , since FY2006, Congress has appropriated more for USACE civil works than the President requested in all but one year. In the text of enacted appropriations laws, Congress generally provides appropriations to USACE at the account level (see Table 1 for a description of the accounts and their FY2018 to FY2020 appropriations amounts). Accompanying appropriations reports (i.e., conference reports, committee reports, or explanatory statements), which sometimes are incorporated into law by reference, often identify specific USACE projects and programs to receive appropriated funds. In addition to regular appropriations, Congress provided USACE with various emergency supplemental appropriations from FY2006 to FY2019. For example, Congress provided a total of more than $47 billion for flood fighting (e.g., construction of temporary levees) and flood recovery (e.g., construction of flood risk reduction in states and territories affected by flooding) over those years, as well as $4.6 billion for economic recovery as part of the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ). These supplemental appropriations are not shown in Figure 2 . Generally, Congress provides the majority of USACE's funding to two accountsâthe Construction account and the Operation and Maintenance (O&M) account. The O&M account has made up a growing portion of the agency's use of annual appropriations, as shown in Figure 3 . Between FY2006 and FY2020, the O&M account increased from 37% of USACE annual appropriations in FY2006 and FY2007 to a high of 53% in FY2018 and FY2019. For decades, Congress provided funding to USACE projects that were not included in the President's request until the House and Senate earmark moratoriums limited Congress's ability to select which site-specific projects would receive funding. Since the 112 th Congress, in lieu of increasing funding for specific projects, Congress has provided additional funding for specified categories of work within some USACE budget accounts. That is, in recent appropriations cycles, Congress has included additional funding categories for various types of USACE projects (e.g., additional funding for inland navigation), along with directions and limitations on the use of these funds on authorized studies and projects. Recent levels of additional funding are shown in Figure 4 . For example, Congress provided $2.69 billion more in P.L. 116-94 than the President's request for FY2020. Of this $2.69 billion, $2.53 billion was identified as additional funding for 26 categories of USACE activities in four budget accounts (see Appendix B ). In Figure 4 , categories are aggregated into navigation activities, flood risk reduction activities, and other authorized project purposes (e.g., environmental restoration). Since FY2014, Congress also has specified in each appropriations bill the number and types of studies and projects to be selected to receive funding for the first time (referred to as new starts ). For example, Congress directed USACE to use FY2020-enacted funding to initiate a maximum of six new studies and six new construction projects. Since FY2012, Congress has directed USACE to produce an annual work plan describing how funds will be allocated at the project level. For example, in FY2020, the explanatory statement accompanying the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), called for USACE, within 60 days after enactment of the appropriations bill, to issue a work plan that includes the specific amount of additional funding to be allocated to each project. The Administration develops the work plan, which typically consists of tables that list the projects, the amount of additional funding that each project is to receive, and a one- or two-sentence description of what USACE is to accomplish with the funds for the project. For projects not in the budget justifications that accompanied the President's budget request, the information included in the work plan may be the extent of the Administration's public explanation of the project-level work to be accomplished during the fiscal year. During the FY2014 to FY2019 period, investments in some USACE business lines increased and investments in other business lines decreased. As shown in Figure 5 , Congress provided year-to-year increases in funding for navigation, which exceeded annual navigation spending in the FY2006 to FY2013 period. In contrast, annual funding for the environment (i.e., environmental restoration and environmental stewardship business lines) was less from FY2014 to FY2019 (ranging from $470 million to $591 million annually) compared with funding in the earlier FY2006 to FY2012 period, which ranged from $609 million to $680 million annually. Funding for flood risk reduction has remained around 30% of the total annual appropriations for most of the years in the FY2006 to FY2019 period shown in Figure 5 . The majority of the annual flood-related funds shown in Figure 5 are for riverine flood risk reduction activities. For example, of the construction funds for flood risk reduction provided in annual appropriations acts for FY2017, FY2018, and FY2019, funding for coastal storm damage reduction represented 11%, 9%, and 7%, respectively. The explanatory statement accompanying the FY2020 appropriations act ( P.L. 116-94 ) includes the following statement: \"Within the flood and storm damage reduction mission, the Corps is urged to strive for an appropriate balance between inland and coastal projects.\" Of the previously mentioned $47 billion in flood-related supplemental appropriations from FY2006 to FY2019, Congress provided around $24 billion for construction of flood risk reduction projects. Congress provided almost $15 billion of the $47 billion to the Flood Control and Coastal Emergencies (FCCE) account for flood fighting and repair of certain nonfederal flood risk reduction projects during the FY2006 to FY2019 period. In contrast, annual appropriations for FCCE generally have been less than $35 million and used for emergency response training and preparedness ( Table 1 ). Congress may consider the following trends and policy questions when determining future appropriations and funding allocation language directed to USACE. Shift to Administration -Developed Work Plans Since earmark moratorium policies were introduced in the 112 th Congress, Congress has provided annual appropriations above the President's request to fund various additional categories of work (see Figure 4 for funding levels from FY2012 to FY2020). The Administration follows congressional guidance regarding priorities, new starts, and other matters, in part, to develop post-enactment agency work plans that specify which projects are to receive the additional funding. Unlike the justification documents that accompany the President's budget request, the Administration limits the project-level details in the work plan to a few sentences per project. Potential policy questions related to the shift to Administration-developed work plans include the following: What is the effect on congressional oversight when the USACE work plan provides fewer project-level details than the budget request? As Congress debates the limits on congressionally directed spending (or earmarks), will considerations include the type of direction Congress can provide USACE on the use of additional funding? How might Congress address differences between its priorities and the Administration's priorities for USACE in future fiscal years' appropriations? Construction Backlog According to USACE, in early FY2020, there was a construction backlog of $96 billion, including projects with signed Chief's reports (i.e., reports recommending new projects for congressional construction authorization), dam modifications, and deferred maintenance. At the FY2021 budget release press conference, the Chief of Engineers stated that since the enactment of the last Water Resources Development Act (Title I of America's Water Infrastructure Act of 2018; P.L. 115-270 ), he had signed 19 Chief's reports, representing over $9 billion in proposed construction; he also said he anticipated signing another 19 Chief's reports by the end of CY2020. If Congress authorizes these projects, the construction backlog would likely continue to increase more quickly than construction would progress using available USACE appropriations. For example, Congress appropriated $2.2 billion in FY2019 and $2.7 billion in FY2020 for the Construction account and required five new construction starts in FY2019 and six new construction starts in FY2020. Potential policy questions related to the construction backlog include the following: How might Congress address the national demand for water resource infrastructure projects, in part illustrated by the USACE construction backlog? How might Congress address stakeholder interest in new starts and identify a path to construction for authorized but unfunded USACE projects? Shift to Operation and Maintenance U.S. water infrastructure is aging; the majority of the nation's dams, locks, and levees are more than 50 years old. An increasing share of USACE's annual discretionary appropriations goes to O&M activities, including activities to maintain USACE-constructed water infrastructure (see Table 1 for description of activities funded by the O&M account). The O&M account increased from 37% of USACE annual appropriations in FY2006 and FY2007 to a high of 53% in FY2018 and FY2019. The following is a potential policy question related to the shift toward more annual appropriations being used to for O&M: How might Congress address the funding of aging USACE infrastructure, while also meeting the other demands for agency projects and funds? Navigation As discussed in the box titled \"Navigation Trust Funds,\" in P.L. 116-136 , Congress altered how some Harbor Maintenance Trust Fund spending is accounted for in relation to budget caps. Congress, as recently as for FY2020 appropriations in P.L. 116-94 , has reduced the funds to be derived from the Inland Waterways Trust Fund for some projects to allow more inland waterway construction projects to proceed. The Administration has proposed identifying additional ways for waterway interests to contribute to the costs of inland waterway construction and O&M. Potential policy questions related to funding navigation actives include the following: How might Congress address the interest of the inland waterways industry and its stakeholders in spending on waterway construction that exceeds the Inland Waterways Trust Fund's ability to cover 50% of the construction costs? Will the anticipated changes to Harbor Maintenance Trust Fund accounting toward budget caps and allocations result in congressional adjustments to the annual appropriations levels for USACE or other federal agencies' appropriations? Flood Risk Reduction Congress has directed around 30% of USACE's annual appropriations to support flood risk reduction activities, with around 90% of these funds, in most years, supporting riverine flood risk reduction. In addition, as previously noted, the FCCE account typically receives annual appropriations around $35 million, and its flood response and repair activities are primarily funded through supplemental appropriations. Potential policy questions related to funding flood risk reduction actives include the following: Will Congress or the Administration address the balance between inland and coastal projects referenced in the explanatory statement accompanying USACE's FY2020 appropriations in P.L. 116-94 ? What are the consequences of primarily using supplemental appropriations to fund FCCE activities, including repair of damaged nonfederal levees? Environment As previously noted, appropriations for USACE's environmental activities in recent years have been less than in the late 2000s. Annual funding for the environment was less from FY2014 to FY2019 (ranging from $470 million to $591 million) compared with funding in the earlier FY2006 to FY2012 period, which ranged from $609 million to $680 million annually. Postponed investments in aquatic ecosystem restoration may result in missed opportunities to attenuate wetlands loss and realize related ecosystem benefits. Potential policy questions related to the funding of USACE environmental actives include the following: What are the consequences of the current level and distribution of USACE restoration funding? Appendix A. USACE Business Line/Account Crosswalk Congress appropriates funding to the U.S. Army Corps of Engineers (USACE) for its civil works activities at the account level (e.g., Investigation, Construction, and Operation and Maintenance [O&M]). Table 1 provides a description of each account. Activities funded in these accounts are categorized by business lines based on the type of activities. Whereas some business line activities (e.g., navigation, flood damage reduction, restoration, recreation) are spread across accounts (e.g., Investigations, Construction, O&M), other business line activities are exclusive to one account with the same name (e.g., Formerly Utilized Sites Remedial Action Program, regulatory, expenses). Along with the President's budget request, USACE publishes a press book that identifies in a crosswalk how the President's requests for various accounts are distributed across the agency's business lines. For example, Figure A-1 shows the crosswalk for the FY2018 President's budget request for USACE; the columns are the accounts, and the rows are the business lines. Following enactment of appropriations and work plan development, USACE typically also calculates the level of funding for each business line. Appendix B. Additional Funding Categories and Amounts Since the 112 th Congress, Congress has provided additional funding for specific categories of work within some USACE budget accounts (e.g., Investigations, Construction, O&M, Mississippi River and Tributaries). Table B-1 shows the additional funding Congress provided in FY2018 to FY2020 for 26 categories of USACE activities across four budget accounts. Congress directed USACE to produce a work plan no later than 60 days after enactment of the appropriations bill, allocating these additional funds to projects meeting the criteria of the categories and any other direction provided in the explanatory statement or conference report. Some states received funding for larger projects, whereas others received funding for less extensive work. For example, under the Construction account, the work plan allocated $100 million or more per state in additional funding to 10 statesâAlabama, California, Florida, Illinois, Louisiana, North Dakota, New Jersey, Pennsylvania, Tennessee, and Texasâin at least one of FY2018, FY2019, or FY2020; the work plans over that same period included between $1 million and $7 million annually per state for other states (e.g., Minnesota, Montana, New Mexico, Nevada, and Utah). ", "summary": "The U.S. Army Corps of Engineers (USACE) is an agency within the Department of Defense with both military and civil works responsibilities. The agency's civil works activities consist largely of the planning, construction, and operation of water resource projects to maintain navigable channels, reduce the risk of flood and storm damage, and restore aquatic ecosystems. Congress directs USACE's civil works activities through authorization legislation, annual and supplemental appropriations, and oversight. Unlike federal funding for highways and municipal water infrastructure, the majority of federal funds provided to USACE are not distributed by formula to states or through competitive grant programs. Instead, USACE generally is directly engaged in the planning and construction of projects. The majority of the agency's appropriations are used to perform work on geographically specific studies and congressionally authorized projects. Between FY2010 and FY2020, USACE discretionary appropriations, typically funded through Title I of annual Energy and Water Development appropriations acts, have ranged from $4.72 billion in FY2013 to $7.65 billion in FY2020. Congress also has provided USACE with emergency supplemental appropriations, most often as part of flood response and recovery efforts (see CRS In Focus IF11435, Supplemental Appropriations for Army Corps Flood Response and Recovery , for more information). USACE's annual appropriations process generally involves three major milestones: the President's budget request, congressional deliberation and enactment of appropriations, and Administration development of a USACE work plan. Each of the milestones is accompanied by various documents, such as USACE budget justifications, congressional conference reports, and USACE work plans. The process begins with the release of the President's budget request, typically in early February. The request's appendix includes funding levels for different USACE accounts (e.g., Investigations, Construction, Operation and Maintenance). USACE also releases more detailed documents (i.e., press book, budget justifications) providing information on the projects that the request would fund. Congress may consider the President's budget request, stakeholder interests, and other factors when creating an annual Energy and Water Development appropriations bill and its USACE civil works title. In reports accompanying appropriations bills, Congress provides direction to USACE on how to allocate enacted appropriations to various USACE activities and types of projects. In the months following enactment, the Administration develops a work plan that adheres to congressional direction regarding the priorities for the funding provided above the requested amount (e.g., $2.7 billion for 26 categories of USACE activities in FY2020) and the number of new starts (e.g., six new studies and six new construction projects using FY2020 appropriations). Some USACE-related topics repeatedly arise in congressional appropriations deliberations For example, Congress often considers how to address the increasing maintenance needs of USACE's aging infrastructure, stakeholder demand for USACE projects, and the number of finalized project studies awaiting construction. Issues for Congress also may include the distribution of appropriations (e.g., activity type, new starts, and geographic distribution) and the level of discretion Congress provides the Administration in allocating USACE's funding in the work plan.", "document_type": "crs"}
{"report": "The federal tax treatment of the family is affected by several major structural elements of the income tax code applicable to all taxpayers: deductions such as the standard deduction, personal exemptions, and itemized deductions; the marginal tax rate structure (which varies by filing status); the earned income credit and the child credit; and the alternative minimum tax. Some of these provisions affect only high-income families and some only low-income families, but they are the tax code's fundamental structural features. They lead to varying tax burdens on families depending on whether the family is headed by a married couple or a single individual, whether children are in the family, and the number of children if so. The 2017 tax revision ( P.L. 115-97 , popularly known as the Tax Cuts and Jobs Act, or TCJA) changed many of these fundamental provisions, although those changes are scheduled to expire after 2025. This report examines these temporary changes and how they affect families. The prior provisions (and ones that will return absent legislative changes) are discussed in a previous CRS report, which also includes the historical development of family-related provisions and some of the justifications for differentiating across families, especially with respect to the number of children. This report does not consider other, more narrowly focused tax code provisions, such as those that apply only to certain types of income (e.g., special treatment for certain types of capital income or self-employment income) or particular additional benefits (e.g., benefits for the blind and elderly or for child care expenses). The first section discusses the structural changes made in the TCJA, and the following sections discuss equity issues and the marriage penalty. Taxes are determined by first subtracting deductions (either the standard deduction or the sum of itemized deductions) and personal exemptions (for the taxpayer, their spouse [if married filing jointly], and any dependents) from income to arrive at taxable income. Then the marginal rate structure is applied to this measure of taxable income. Finally, tax credits are subtracted from this amount to determine tax liability. Two of the major credits claimed by families are the earned income tax credit (EITC) and the child tax credit. The new law expanded the child credit for many taxpayers, although it did not change the earned income tax credit. In addition to these provisions, the law changed the exemption levels for the alternative minimum tax (a tax aimed at broadening the overall tax base and applying flat rates with a large fixed exemption), which is imposed if it is larger than the regular tax. All amounts in this discussion are for 2018, the year the tax changes were first implemented. Some amounts will change in the future as they are indexed for inflation. The revision also changed the measure used to index for inflation to the chained consumer price index (CPI) rather than the basic CPI. The chained CPI takes into account changes in the mix of spending, and because spending tends to increase for goods with smaller price increases, the chained CPI is smaller than the basic CPI. For 2018, it only affected the EITC (in a minor way), as the other provisions (such as standard deductions and the rate structure) were stated explicitly in the tax revision. In calculating their taxable income, taxpayers may subtract either the standard deduction or the sum of their itemized deductions. The standard deduction varies by the taxpayer's filing status: single (an unmarried individual with no dependents), joint (a married couple), and head of household (a single parent). The standard deduction is beneficialâthat is, it results in a lower tax liabilityâwhen itemized deductions (such as for state and local taxes, mortgage interest, and charitable contributions) are smaller than the standard deduction amount. The standard deduction is annually adjusted for inflation. Under prior law, taxpayers could claim a personal exemption for themselves and each family member. In addition, a child credit was allowed for children under the age of 17. The child credit was (and still is) partially refundable, so that taxpayers with no tax liability can receive some or all of the child credit as a refund greater than taxes owed. The refundable portion of the credit was limited to 15% of earned income in excess of $3,000. (The refundable portion of the child credit is sometimes referred to as the additional child tax credit or ACTC. The lowest-income taxpayers generally receive all of the child credit in the form of the ACTC.) Personal exemptions and child credits were phased out under prior law. Personal exemptions were indexed for inflation, but the child credit was not. As shown in Table 1 , the 2017 tax revision substantially increased the standard deduction and the maximum amount of the child credit while eliminating the personal exemption. It also increased the refundable portion of the child credit, both by increasing the maximum amount of the ACTC and by reducing the earned income amount used to calculate the ACTC. It also substantially increased the level at which the child credit is phased out. For many taxpayers, the amount of income exempt from tax (i.e., the amount subtracted before applying tax rates) has increased under the 2017 tax revision. For example, prior to P.L. 115-97 , a married couple with no children that claimed the standard deduction would have $21,300 in tax-exempt income (the combination of a standard deduction of $13,000 and two personal exemptions for the taxpayers of $4,150). Under current law, their first $24,000 would not be subject to tax. In general, the loss of personal exemptions for children was more than offset by increases in the maximum child credit from $1,000 per child to $2,000 per child. The act also provided a $500 credit for dependents that did not qualify for the child credit. Higher-income families with children also benefited from the increase in the new child credit's phaseout level, which was higher than the previous personal exemption and significantly higher than the prior-law child credit's phaseout range (see Table 1 ). As under prior law, the standard deduction will be annually adjusted for inflation and the child credit (or family credit) will not be adjusted for inflation (with the exception of the $1,400 limit on refundability, which is indexed). The prior-law personal exemption was indexed annually for inflation. Were these provisions to be continued over a long period, the child credit would continually decline in real value, whereas the prior-law personal exemption would not. Moreover, the new inflation index is less generous than the prior one. The tax change also restricted itemized deductions. Although it retained the major itemized deductions for mortgage interest, state and local taxes, and charitable contributions, it limited the deduction for state and local taxes to $10,000, reduced the cap on mortgages with interest eligible for the deduction from $1 million to $750,000, and eliminated a number of other minor itemized deductions. These amounts are not indexed for inflation. As a result of increases in the standard deduction and restrictions on itemized deductions, about 13% of taxpayers are expected to itemize deductions, compared to 30% under prior law. Analysis suggests most of those who continue to itemize are higher income. The other major tax credit for families under current law is the earned income tax credit (EITC). This credit is aimed at helping lower-income workers and is fully refundable, meaning that those with little to no income tax liability can receive the credit's full amount. While the credit is generally available to all low-income workers, the credit formula is much more generous for families with children, and the majority of benefits go to families with children. The EITC varies based on a recipient's earnings: the credit equals a fixed percentage (the credit rate ) of earned income until it reaches its maximum level. The EITC then remains at its maximum level over a subsequent range of earned income, between the earned income amount and the phaseout amount threshold . Finally, the credit gradually phases out to zero at a fixed rate (the phaseout rate ) for each additional dollar of adjusted gross income (AGI) (or earned income, whichever is greater) above the phaseout amount threshold. The credit rate, earned income amount, maximum credit, and phaseout amount threshold all vary by number of children, and are more generous for families with more children, as illustrated in Figure 1 . In 2018, the maximum credit amounts were $519, $3,461, $5,716, and $6,431 for families with zero, one, two, or three or more children, respectively. In addition, the phaseout amount threshold is higher for married couples than for unmarried recipients. Hence, the income level at which the credit begins to phase out is slightly more than $5,000 greater for married joint filers than it is for unmarried filers (heads of households and singles). The 2017 revision made no explicit changes to the EITC, but the change in the inflation indexing formula slightly lowered the credit's value. For example, the credit's maximum value for a family with three or more children under prior law would have been $6,444, rather than $6,431 for a family with three or more children under the revision. A taxpayer with no qualifying children must be between 25 and 64 years of age to be eligible for the EITC. The 2017 tax revision also altered the statutory marginal tax rates that apply to taxable income. There are currently seven marginal tax rates, and the income ranges over which they apply ( tax brackets ) differ based on the taxpayer's filing status, with brackets at the lower rates half the width for singles as those of married couples (who file jointly) and heads of household in between. The width of the bracket determines how much income is taxed at a given rate and the wider the brackets the more income is taxed at lower rates. That means singles (and to a lesser extent heads of households) are subject to higher tax rates at lower levels of income than married couples. Under prior law, most taxpayers were subject to tax rates of 10% and 15%. The 10% rate applied for the first $19,050 of taxable income for joint returns, the first $13,600 for head of household returns, and the first $9,525 for single returns. The 15% bracket ended at $77,400 of taxable income for joint returns, $51,850 for heads of households, and $38,700 for singles. The tax revision retained the 10% rate, but reduced the 15% rate to 12%. Above those income levels, rates of 25%, 28%, 33%, 35%, and 39.6% applied, and single bracket widths were less than half as wide as the equivalent married brackets. The 2017 revisions reduced those rates by amounts ranging from 3 to 9 percentage points, with new rates of 22%, 24%, 32%, 35%, and 37%. Under prior law, the top rate of 39.6% applied to taxable income over $480,050 for joint returns. The new law reduced the top rate to 37% and applied it to taxable income over $600,000; the remaining taxable income that had been subject to a 39.6% rate is taxed at 35%. Under prior law, the 39.6% top rate was reached at $426,700 for singles; under the revision, the new top rate of 37% applies to taxable income over $500,000 for singles. The law also revised the alternative minimum tax. Under prior law, the alternative minimum tax imposed a 26% tax rate on alternative minimum taxable income above $86,000 for married couples and $55,400 for unmarried tax filers. The exemption began to phase out at $164,100 for married couples and $123,100 for singles. A higher rate of 28% applied to AMT taxable income above $191,500 for joint returns and $95,750 for single returns. AMT income begins with ordinary taxable income and adds back the standard deduction, personal exemptions, and state and local tax deductions for itemizers, as well as some other tax preferences (such as tax-exempt interest from private activity bonds and accelerated depreciation). The tax revision left the AMT's basic structure unchanged, but increased the exemption amounts to $109,400 for married couples and $70,300 for single returns. It also increased the phaseout point for the exemption to $1,000,000 for joint returns and $500,000 for singles. Other elements of the 2017 tax revision affected whether a taxpayer would be subject to the AMT. Whether the AMT applies depends on deductions from the regular tax compared to the AMT exemption, as well as the tax rates. Lower regular tax rates and a higher standard deduction increase the chance a taxpayer is subject to the AMT, whereas higher AMT exemptions, elimination of personal exemptions, and the limit on the deduction for state and local taxes decrease the chance a taxpayer is subject to the AMT. The rate brackets and AMT amounts are indexed annually for inflation. At higher income levels (up to slightly over $300,000 of taxable income for joint returns and about half that amount for other returns), several factors contribute to lower tax liabilities under the 2017 tax revision, primarily the relatively large reduction in marginal tax rates, as shown in the tax rates in Table 2 , Table 3 , and Table 4 . As indicated in those tables, as a result of P.L. 115-97 , marginal rates increase somewhat over narrow bands of higher income levels, particularly for heads of households and to a lesser extent single returns, before declining again. The changes in tax rates are only one factor determining tax liabilities, as other tax code featuresâincluding broadly applicable features discussed in this report and others that apply to a narrower range of taxpayersâcan affect tax liability. The new income tax code (as well as the income tax under prior law) is progressive: as income increases and taxpayers have an increased ability to pay, tax rates rise. Studies generally suggest, however, that after taking all of the 2017 tax revision's provisions into account, higher-income groups tend to have the largest percentage increase in after-tax income. Hence, while still progressive, the new income tax is less progressive in comparison to the prior-law income tax. In addition, as time goes on, the relative tax burden on low-income families is expected to increase. This increase at the lower end of the income distribution is partially due to the new inflation indexing provision, which will reduce the earned income credit's value for low-income working families. The increased tax burden also reflects the loss of health care subsidies due to the elimination of the penalty for not purchasing health insurance. The decreased tax burdens (relative to prior law) for high-income individuals also reflect, in this distributional estimate, lower taxes' effects on capital income (including lower corporate tax rates and the pass-through deduction for business income), which affect higher-income individuals, who own most of the capital. The tax change had no effect on after-tax income in 2018 for low-income families that already had effectively no or negative tax liability and did not have enough income to be eligible for the maximum child credit. In future years, the inflation indexing could eventually reduce the earned income credit's value. As incomes rise, families with children will tend to benefit more than families without children, primarily due to the expanded child credit. These effects can be illustrated by comparing the prior- and current-law breakeven levels. The breakeven level is the amount of income at which a taxpayer begins to owe income taxes (i.e., the level at which tax liability turns from negative or zero to positive). Table 5 shows these levels for married and single-headed families with zero to three children. The smallest increase in the income level at which taxes begin to be owed is for singles with no children. These taxpayers began to owe taxes when income was $12,669 under prior law, but begin to owe at $13,419 under current law, an increase of $750. Under prior law, this income level was in part a result of the standard deduction and personal exemption (a combined $10,650 that was exempt from tax) and in part a result of a reduced EITC (the taxpayer's income resulted in a partially phased out credit). Under current law, a greater amount of income is exempt from taxâ$12,000 compared to $10,650âand the EITC is slightly reduced as a result of the new inflation adjustment. A married couple without children begins to pay taxes when their income is $24,000 under current law, compared with $21,300 under prior law, a $2,700 increase entirely driven by the changes in the personal exemptions and the standard deduction. For these taxpayers, under prior law their first $21,300 was exempt from tax as a result of the standard deduction and personal exemptions, and they were ineligible for the EITC at this income level because the credit was entirely phased out. Under current law, their first $24,000 is exempt from tax as a result of the increased standard deduction (and they remain ineligible for the EITC). The breakeven point for families with children is greater than the standard deduction (or under prior law, the standard deduction and personal exemptions) as a result of the EITC (although it is phased out from its maximum level) and the child credit. Although the increased standard deduction increases exempt levels and the additional $1,000 of the child credit is the equivalent of a $8,333 deduction for each child at the new tax bracket these income levels fall into ($1,000/.12), these income levels are mostly still in the earned income credit's phaseout range. Thus, although taxpayers gain from the increased deductions and child credits as income rises, they lose earned income tax credits, making the increase in the exemption level smaller. The benefit increases when the increased income levels tend to be largely out of the EITC's phaseout range (which is largely the case for families with three children). Lower-income families either receive a negligible benefit (for those without children) or a significant benefit (for those with children) because the new child credit is more generous than the prior personal exemption in terms of tax savings. As income rises, the child credit continues to contribute to lower taxes. It is not until marginal tax rates reach 24% (which occurs at $165,000 of taxable income for a joint return) that the increased child credit has the same value as the prior personal exemption in terms of tax savings. The moderate income levels also benefit from lower tax rates, as the 15% rate that applies to taxable income from $19,050 to $77,000 is reduced to 12%. At higher income levels, lower tax rates (which are quite large for taxable incomes of slightly more than $300,000 for joint returns and about half that amount for other returns) account for lower taxes, as shown in the tax rates in Table 2 , Table 3 , and Table 4 . As indicated in those tables, rates increase at somewhat higher levelsâparticularly for head of household and, to a lesser extent, single returnsâbefore declining again. For joint returns, the larger rate reductions occur between $156,150 and $316,000 of taxable income, as well at incomes of $480,050 to $600,000, while these reductions appear at lower income levels for head of household and single returns. Taxpayers are also less likely to pay the alternative minimum tax. Although regular tax rates are lowered, two factors reduce the AMT's scope. One is the significant increase in the AMT exemption. In addition, taxpayers at the upper end of the distribution have smaller itemized deductions for state and local taxes, which are a preference item for the AMT. Larger families also have a reduction in the difference between the regular and AMT base, as personal exemptions and standard deductions were part of that base under prior law, but child credits were not. Replacing personal exemptions for children with the child credit reduces the difference between the AMT and the regular base. At higher income levels, losing the full state and local tax deduction can increase tax burdens. The average state and local tax deduction is about 5% of income; evaluated at a 35% or 37% tax rate, the loss is equivalent to a two percentage point change in marginal tax rates. For high-income families with children, the increase in the phaseout levels lowers burdens, particularly as compared to the phaseout for the preexisting tax credit, although the benefit relative to income diminishes as income rises because of the fixed dollar amount. Overall data on distributional effects show significantly larger effects at high income levels, but some of the estimated relatively larger benefit to high-income taxpayers is due to reductions in the tax burden on capital income, including the pass-through deduction (which allows a 20% reduction in capital income for some earnings from unincorporated business) and the lower corporate tax rate, which benefits higher-income individuals, who receive most of the capital income. The effect of structural features at high income levels is ambiguous because the tax change raised tax rates for certain portions of taxable income and lowered them for others, and also capped the state and local tax deduction. This section examines the patterns of both vertical equity (how tax rates change as incomes rise) and horizontal equity (how tax rates change across different types of families with the same ability to pay using effective tax rate calculations [taxes as a percentage of income]). These rates can also be compared to those calculated for prior law in a previous CRS report. With respect to horizontal equity, this report uses an equivalency scale similar to the one used to calculate variations in poverty lines by family size. An equivalency scale estimates how much income families of different sizes and compositions need to achieve the same standard of living. In defining families that have the same ability to pay, CRS used an adjustment based on a research study that reviewed a broad range of equivalency studies and is similar to that used for adjusting official poverty levels for different family sizes. The scale has a smaller adjustment for children than for adults. The equivalency scale also accounts for the common use of resources (such as a kitchen or bathroom) in a family, which means increases in required income are not proportional to family size. Under this standard, a single person requires about 62% of the income of a married couple; a couple with four children requires about three times the income. Thus, compared to a married couple with no children with $20,000 of income, an equivalent single person would need slightly over $12,000, and a married couple with four children would need $60,000 to have the same standard of living. Provisions included in the calculations are the rate structure, the larger of the standard deduction or itemized deductions (the latter are assumed to be 12.7% of income, with 5.3% of income reflecting the state and local tax deduction included in the alternative minimum tax base, based on the latest tax data), personal exemptions, the earned income credit, the child credit, and the alternative minimum tax. Table 6 reports the 2018 effective tax rates for low- and middle-income taxpayers at different levels of income, for family sizes of up to seven individuals, and for the three basic types of returnsâsingle, joint, and head of household. Table 7 reports the tax rates for higher-income families. The column heading indicates the income level for married couples. Effective tax rates in each column reflect the effective tax rates of families with the same standard of living. The rates for different families should be compared by looking down the columns. For example, in Table 6 , a married couple with no children (the reference family) and $25,000 in income pays 0.4% of their income in taxes, but a married couple with one child with the same ability to pay (i.e., same standard of living at about $30,844 of income) receives a subsidy (i.e., on net they get a refund greater than taxes owed) of 12.1% of their income, whereas a single with an equivalent before-tax standard of living pays 2.2% of income in taxes. Overall, these effective tax rates indicate that low-income families with children receive significant benefits from the income tax, compared to those with similar abilities to pay but without children. These numbers assume that taxpayers (and their children) are eligible for both the child credit and the EITC. These are illustrative calculations that do not account for any other tax preferences and are designed to show how the tax law's basic structural, family-related features affect burdens. Across each family type, effective tax rates are progressive, increasing as income increases. Compared to prior law, tax rates change relatively little at the lowest income level due to the lack of change in the earned income credit and because the child credit increases by a limited amount (about $75) for many of the poorest families. As incomes rise into the lower-middle, middle-, and upper-middle-income levels, rates fall slightly for families without children, whereas families with children have significant reductions in effective tax rates due to the increase in the maximum child credit and the increases in the child credit phaseout levels. At the highest income levels, effects range from small rate cuts to small rate increases, which reflect the trade-off between the changes in rates and the reductions in itemized deductions. In contrast with prior law, none of the examples in these tables are subject to the AMT. These tables suggest that the pattern of tax burden by family size varies across the income scale, and reflects the interactions of the earned income credit, the child credit, and graduated rates, including phaseout effects. Moreover, the variation across families that have the same ability to pay is substantial. At low incomes, families with children, whether headed by a married couple or a single parent, are favored (i.e., receive significant subsidies from the tax code) because of the EITC and the child credit. The largest negative tax rates tend to accrue to returns with around two or three children, because the largest EITCs are available for three or more children and the child credits increase with the number of children. The rate increases (or rather, negative rates decline in absolute value) because larger families need more income, which may begin to phase them out of the EITC. As incomes rise, families with children are still favored, but the largest families have the largest subsidies or the smallest tax rates, because the child credit lowers taxes more for these families. Eventually, large families begin to be penalized because the value of the child credit and personal exemptions relative to income declines and larger families that require more income are pushed up through the rate brackets. As incomes reach very high levels, however, the rates converge as the tax approaches a flat tax. Note that itemized deductions are assumed to be a constant fraction of income, and thus a proportional exclusion, except when the $10,000 limit on state and local tax deductions is binding. Compared to prior law, the new system retains and expands the favorable treatment of families with children through most of the income spectrum. This effect occurs partly because the EITC rate is much lower for single taxpayers or two-member joint returns with no qualifying children than it is for families with children. Also, if one accepts the ability-to-pay standard, the EITC has an inappropriate adjustment for family size. To achieve equal tax rates based on the ability-to-pay standard, the amount on which the EITC applies and the income at which the phaseout begins should be tied to family size but the EITC credit rate should be the same for all families. Changing the rate, as was done in 1990 and retained when the EITC was expanded in 1993, does not accomplish equal treatment across families of different sizes, providing too much adjustment for some families and not enough for others. The child credit also contributes to the favorable treatment of families with children, including in the middle- and upper-middle-income levels, where it is not phased out. The greater refundability level, the increased size of the credit beyond that needed to replace the personal exemption at most income levels, and the significantly increased phaseout levels all make the child credit a significant factor in increasing the favorable treatment for families with children. Tax rates also differ for families without children (singles and married couples). At most income levels, childless singles have higher effective tax rates than childless married couples. This effect reflects efforts to eliminate marriage penalties, which in turn result in a tax penalty for single individuals. Other aspects of the tax system should also be considered, such as the child care credit and the treatment of married couples where only one individual works outside the home. These families are better off because the spouse not employed outside the home can perform services at home that result in cost savings, perform household tasks that increase leisure time for the rest of the family, or enjoy leisure. The value of this time, which is not counted in the measured transactions of the economy, is referred to as imputed income . This imputed income is not taxed, and it would probably be impractical to tax it. Nevertheless, the tax burden as a percentage of cash plus imputed income is lower for such a family. Because of the progressive rate structure, taxes can be affected by marriage, introducing either a penalty or a bonus when two individuals get married. Concerns about the marriage penalty reflect a reluctance to penalize marriage in a society that upholds such traditions. As the tax law shifted in the past to reduce the marriage penalty, it also expanded marriage bonuses. Studies of this issue indicate that the tax system favors marriage, conferring significant bonuses on married couples (or penalties on singles). The new law retains many of the elements that affect marriage penalties and bonuses, including wider tax brackets for joint returns (which eliminate marriage penalties and produce bonuses for those without children in the middle-income brackets), the more generous rate structure for head of household (which affects penalties and bonuses for families with children), and marriage penalties embedded in the alternative minimum tax. Under the new rate structure, the income levels at which marriage penalties are precluded because of the doubling of the brackets are higher. At the same time, the law also introduces a new potential source of a marriage penalty at high income levels by retaining the same dollar cap on state and local tax deductions for both joint and single returns. These choices have consequences not only for incentives but for equitable treatment of singles and married couples. As shown above in Table 6 and Table 7 , in the middle-income brackets, where the marriage penalty was largely eliminated, singles with the same ability to pay are subject to higher taxes than married couples. Singles benefit at lower income levels because their lower required incomes do not phase them out of the earned income credit. In contrast, lower-income married taxpayers are more likely to be subject to marriage penalties because of the EITC's structure. Under prior law, at very high incomes, married couples may have paid a larger share of their income because of marriage penalties that remained in the AMT and the upper brackets of the rate structure, but these effects do not appear in any of the current-law examples, in part because the AMT does not apply. This section explores the treatment of married couples and singles in an additional dimension by assuming that singles live together and share the same economies of scale that married couples do. These individuals could be roommates, but they could also be partners who differ from married couples only in that they are not legally married. Single individuals who live together in the same fashion as married couples have the same ability to pay with the same income. However, remaining single can alter their tax liability, causing it to either rise or fall, depending on the split of income between the two individuals. If one individual earns most of the income, tax burdens will be higher for two individuals who are not married than for a married couple with the same total income, because the standard deductions are smaller and the rate brackets narrower (up to the 35% tax rate, tax brackets for singles are half those of joint returns). If income is evenly split between the two individuals, there can be a benefit from remaining single. Married individuals have to combine their income, and the rate brackets for joint returns in the higher-income brackets, although wider than those for single individuals, are not twice as wide. At all levels they are not twice as wide as for heads of household. In addition, the earned income credit contains marriage penalties and bonuses. The marriage penalty or bonus might, in the context of the measures of household ability to pay, also be described as a singles bonus or penalty. In any case, in considering this issue's incentive and equity dimensions, these families' tax rates should be compared across family marital status at each income level. Table 8 and Table 9 show the average effective tax rates for married couples and for unmarried couples with the same combined income, both where income is evenly split and where all income is received by one person. In one case there is no child and in the other one child. These income splits represent the extremes of the marriage penalty and the marriage bonus. The same reference income classes and equivalency scales as in Table 6 and Table 7 are used. Note that uneven income splits in the case of a family with a child can yield different results depending on whether the individual with the income can claim the child and therefore receive the benefits of the head-of-household rate structure, the higher earned income credit, the dependency exemption, and the child credit. If not, that individual files as a single. The tables indicate that both marriage penalties and bonuses persist. In the case of families without children, however, penalties do not exist in the middle-income ranges, only bonuses. In this case, singles who live together and have uneven incomes would see their tax rates fall if they got married. Both bonuses and penalties exist at the lower income levels because of the earned income tax credit. If income is evenly split, the phaseout ranges are not reached as quickly for singles because each of the partners has only half the income. If all of the income is earned by one of the singles in the single partnership, phaseout of the credit still occurs and the individual also has a smaller standard deduction, and thus pays a higher tax. The smaller deductions and narrower rate brackets also cause the higher tax rates through the middle-income brackets. At very high income levels, marriage penalties can also occur. The penalty is due to not doubling the rate brackets after the 12% bracket. In addition, the dollar limit on the deduction of state and local taxes is the same for married couples and individual taxpayers, so that if two singles with high incomes and high state and local taxes marry, they can lose $10,000 in deductions. At the same time, taxpayers tend not to be subject to the AMT, which retains marriage penalties (by having an exemption for joint returns that is less than twice that for single returns). As compared to prior law, marriage penalties at higher income levels are mixed. In some cases penalties are lower, presumably due to the extension of the reach of the double width of rate brackets for singles versus joint returns, as well as lower tax rates in general and the AMT's more limited reach. In some cases penalties are higher due to the state and local tax deduction limit. Matters are more complex for families with children. Table 8 and Table 9 illustrate this effect for a family with one child. At the lowest income level, and a 50/50 split, one of the singles files a single return with a very small negative rate because of the small earned income credit for those without children, whereas the other claims a child and has a much higher negative tax rate than a married couple because there is no phaseout of benefits. The combination also involves a smaller child credit because it is not completely refundable. The combined result is a lower benefit than that of a married couple, and thus there is a marriage bonus. This income split eventually leads to a marriage penalty because of the favorable head-of-household standard deduction and rate structure, as well as the state and local tax deduction cap. With one of the pair earning all of the income, the results depend on whether the partner with the income can claim the child. If that person cannot, the tax burden is higher throughout the income scale, reflecting the loss of benefits from the child via credits and the rate structure. If the person with the income can claim the child (thus using the more favorable head-of-household schedule and receiving a child credit), joint returns are still favored (except at the lowest income levels), but not by nearly as much. Which of these last two assumptions seems more likely depends on the circumstances. When couples divorce, they typically move to different residences, and the most usual outcome is that the mother, who typically has lower earnings, has the child. According to the Census Bureau, 83% of children who live with one parent live with their mother. In that case, there would likely be a marriage bonus. If the couple divorce but live together, presumably the higher-income spouse would claim the child. However, if a couple never married and the child is only related to one parent, that person, more likely the mother and more likely to have low income, would claim the child. If such a couple married and had low incomes, they could obtain the earned income credit, and a study of low-income families indicates that this latter effect, the bonus, is the EITC's most common effect. Which circumstances are more characteristic of the economy? Note first that, although people refer to the marriage penalty for a particular family situation or the aggregate size of the marriage penalty, it is really not possible, in many cases, to determine the size of the penalty or bonus. The effect of the assignment of a child is demonstrated in Table 8 and Table 9 , but other features matter. Only when a married couple has only earned income, no dependent children, and no itemized deductions or other special characteristics, and only if it is assumed that their behavior would not have been different if their marital status had been different, can one actually measure the size of the marriage penalty or bonus. There is no way to know which of the partners would have custody of the children and therefore be eligible for head-of-household status and the accompanying personal exemptions and child credits. If the marriage bonus is viewed instead as a singles penalty on cohabitating partners, the share of the population affected is limited to less than 10% of households. About a third of those have children. Cohabitating partners are more likely than roommates to fully enjoy the consumption of joint goods that would equate them to married couples. The 2017 tax revision continued, and in some cases expanded, the favorable treatment of families with children in the lower and middle income levels on an ability-to-pay basis. At the lowest incomes, this treatment was maintained largely due to the EITC's preexisting effects, although increasing the refundable child tax credit added to this favorable treatment. More favorable treatment was increased and extended up through the income classes because of the increase in the child tax credit amount and the increase in the income level at which the credit is phased out. At the highest income levels, rate changes tended to favor joint returns over singles and heads of household, largely due to the rate structure. As was the case with prior law, marriage bonuses occur through most income brackets, but penalties can exist at the lower end of the income distribution, particularly for families with children in which the lower income earner has custody of children, due to the earned income credit and the child credit. The rate structure continues to lead to a potential marriage penalty at high income levels. The 2017 revisions also introduced a new provision that could contribute to the marriage penalty at high incomes: the $10,000 limit on itemized deductions for state and local taxes, which is the same amount for married and single individuals.", "summary": "The federal income tax treatment of the family is affected by several major structural elements applicable to all taxpayers: amounts deductible from taxable income through standard deductions, personal exemptions, and itemized deductions; the rate structure (which varies across taxpayer types); the earned income credit and the child credit; and the alternative minimum tax. Some of these provisions only affect high-income families and some only low-income families, but they are the tax code's fundamental structural features. They lead to varying tax burdens on families depending on whether the family is headed by a married couple or a single individual, whether children are in the family, and the number of children if so. These provisions also affect the degree to which taxes change when a couple marries or divorces. The 2017 tax revision ( P.L. 115-97 , popularly known as the Tax Cuts and Jobs Act) changed many of these fundamental provisions, although those changes are scheduled to expire after 2025. This report examines these temporary changes and how they affect families. The prior provisions (which will return absent legislative changes) are discussed in CRS Report RL33755, Feder a l Income Tax Treatment of the Family , by Jane G. Gravelle, which also includes the historical development of family-related provisions and some of the justifications for differentiating across families, especially with respect to the number of children. The 2017 tax revision effectively eliminated personal exemptions claimed for the taxpayer, their spouse (if married), and any dependent (often referred to as the dependent exemption ). However, the increased standard deduction more than offset these losses for taxpayers (and their spouses, if married). In addition, for many taxpayers, the increased child credit more than offset the losses from the eliminated dependent exemption. The tax revision also lowered rates for all three types of tax returns (joint, single, and head of household), although the effects were more pronounced for joint returns. In general, the changes retain significant aspects of prior law. The income tax code after the 2017 tax revision remains progressive across income levels for any given type of family, although effective tax rates are slightly lower. Among families with the same ability to pay (using a measure that estimates how much additional income families need to attain the same standard of living as their size increases), families with children are still favored at the lower end of the income scale, whereas families with children are still penalized at the higher end of the scale. This favorable treatment toward families with children is extended further up into the middle-income level under the 2017 revisions due to the changes in the child credit. The tax system is largely characterized by marriage bonuses (lower taxes when a couple marries than their combined tax bill as singles) through most of the income distribution, although marriage penalties still exist at the bottom (due to the earned income credit) and top (due to the rate structure) of the income distribution. The penalties at the top appear to be somewhat smaller in the new law due to changes in the rate structure and lower tax rates.", "document_type": "crs"}
{"report": "The Immigration and Nationality Act (INA) authorizesâand in some cases requiresâthe Department of Homeland Security (DHS) to detain non-U.S. nationals (aliens) arrested for immigration violations that render them removable from the United States. The immigration detention regime serves two primary purposes. First, detention may ensure an apprehended alien's presence at his or her removal hearing and, if the alien is ultimately ordered removed, makes it easier for removal to be quickly effectuated. Second, in some cases detention may serve the additional purpose of alleviating any threat posed by the alien to the safety of the community while the removal process is under way. The INA's detention framework, however, is multifaceted, with different rules turning on whether the alien is seeking initial admission into the United States or was lawfully admitted into the country; whether the alien has committed certain criminal offenses or other conduct rendering him or her a security risk; and whether the alien is being held pending removal proceedings or has been issued a final order of removal. In many cases detention is discretionary, and DHS may release an alien placed in formal removal proceedings on bond, on his or her own recognizance, or under an order of supervision pending the outcome of those proceedings. But in other instances, such as those involving aliens who have committed specified crimes, there are only limited circumstances when the alien may be released from custody. This report outlines the statutory and regulatory framework governing the detention of aliens, from an alien's initial arrest and placement in removal proceedings to the alien's removal from the United States. In particular, the report examines the key statutory provisions that specify when an alien may or must be detained by immigration authorities and the circumstances when an alien may be released from custody. The report also discusses the various legal challenges to DHS's detention power and some of the judicially imposed restrictions on that authority. Finally, the report examines how these legal developments may inform Congress as it considers legislation that may modify the immigration detention framework. The Supreme Court has long recognized that the federal government has \"broad, undoubted power over the subject of immigration and the status of aliens,\" including with respect to their admission, exclusion, and removal from the United States. This authority includes the power to detain aliens pending determinations as to whether they should be removed from the country. The Court has predicated this broad immigration power on the government's inherent sovereign authority to control its borders and its relations with foreign nations. Notably, the Court has \"repeatedly emphasized that 'over no conceivable subject is the legislative power of Congress more complete than it is over' the admission of aliens,\" and that \"Congress may make rules as to aliens that would be unacceptable if applied to citizens.\" Despite the government's broad immigration power, the Supreme Court has repeatedly declared that aliens who have physically entered the United States come under the protective scope of the Due Process Clause of the Fifth Amendment, which applies \"to all 'persons' within the United States, including aliens, whether their presence here is lawful, unlawful, temporary, or permanent.\" Due process protections generally include the right to a hearing and a meaningful opportunity to be heard before deprivation of a liberty interest. And one of the core protections of the Due Process Clause is the \"[f]reedom from bodily restraint.\" But while the Supreme Court has recognized that due process considerations may constrain the federal government's exercise of its immigration power, there is some uncertainty regarding when these considerations may be consequential. Generally, aliens seeking initial entry into the United States typically have more limited constitutional protections than aliens present within the country. The Supreme Court has long held that aliens seeking entry into the United States have no constitutional rights regarding their applications for admission, and the government's detention authority in those situations seems least constrained by due process considerations. Thus, in Shaughnessy v. United States ex rel. Mezei , the Supreme Court upheld the indefinite detention of an alien who was denied admission into the United States following a trip abroad. The Court ruled that the alien's \"temporary harborage\" on Ellis Island pending the government's attempts to remove him did not constitute an \"entry\" into the United States, and that he could be \"treated as if stopped at the border.\" Nevertheless, some courts have suggested that the constitutional limitations that apply to arriving aliens pertain only to their procedural rights regarding their applications for admission, but do not foreclose the availability of redress when fundamental liberty interests are implicated . Thus, some lower courts have concluded that arriving aliens have sufficient due process protections against unreasonably prolonged detention, and distinguished Mezei as a case involving the exclusion of an alien who potentially posed a danger to national security that warranted the alien's detention. Furthermore, regardless of the extent of their due process protections, detained arriving aliens may be entitled to at least some level of habeas corpus review, in which courts consider whether an individual is lawfully detained by the government. But due process considerations become more significant once an alien has physically entered the United States. As discussed above, the Supreme Court has long recognized that aliens who have entered the United States, even unlawfully, are \"persons\" under the Fifth Amendment's Due Process Clause. That said, the Court has also suggested that \"the nature of that protection may vary depending upon [the alien's] status and circumstance.\" In various opinions, the Court has suggested that at least some of the constitutional protections to which an alien is entitled may turn upon whether the alien has been admitted into the United States or developed substantial ties to this country. Consequently, the government's authority to detain aliens who have entered the United States is not absolute. The Supreme Court, for instance, construed a statute authorizing the detention of aliens ordered removed to have implicit temporal limitations because construing it to allow the indefinite detention of aliens ordered removedâat least in the case of lawfully admitted aliens later ordered removedâwould raise \"serious constitutional concerns.\" Declaring that the government's immigration power \"is subject to important constitutional limitations,\" the Court has determined that the Due Process Clause limits the detention to \"a period reasonably necessary to secure removal.\" Additionally, while the Supreme Court has recognized the government's authority to detain aliens p ending formal removal proceedings, the Court has not decided whether the extended detention of aliens during those proceedings could give rise to a violation of due process protections. But some lower courts have concluded that due process restricts the government's ability to indefinitely detain at least some categories of aliens pending determinations as to whether they should be removed from the United States. In sum, although the government has broad power over immigration, there are constitutional constraints on that power. These constraints may be most significant with regard to the detention of lawfully admitted aliens within the country, and least powerful with regard to aliens at the threshold of initial entry into the United States. From the outset, U.S. federal immigration laws have generally authorized the detention of aliens who are subject to removal. The first U.S. law on alien detention was the Alien Enemies Act in 1798, which subjected certain aliens from \"hostile\" nations during times of war to being detained and removed. But Congress passed no other laws on the detention of aliens for nearly a century. Starting in 1875, however, Congress enacted a series of laws restricting the entry of certain classes of aliens (e.g., those with criminal convictions), and requiring the detention of aliens who were excludable under those laws until they could be removed. In construing the government's detention authority, the Supreme Court in 1896 declared that \"[w]e think it clear that detention or temporary confinement, as part of the means necessary to give effect to the provisions for the exclusion or expulsion of aliens, would be valid.\" Over the next few decades, Congress continued to enact laws generally mandating the detention and exclusion of proscribed categories of aliens seeking entry into the United States, as well as aliens physically present in the United States who became subject to removal. In 1952, Congress passed the INA, which distinguished between aliens physically arriving in the United States and those who had entered the country. Aliens arriving in the country who were found ineligible for entry were subject to \"exclusion,\" and those already present in the United States who were found to be subject to expulsion were deemed \"deportable.\" For aliens placed in exclusion proceedings, detention generally was required, unless immigration authorities, based on humanitarian concerns, granted the alien \"parole,\" allowing the alien to enter and remain in the United States pending a determination on whether he or she should be admitted. In the case of deportable aliens, detention originally was authorized but not required, and aliens in such proceedings could be released on bond or \"conditional parole.\" Congress later amended the INA to require, in deportation proceedings, the detention of aliens convicted of aggravated felonies, and authorized their release from custody only in limited circumstances, such as when the alien was a lawful permanent resident (LPR) who did not pose a threat to the community or a flight risk. In 1996, Congress enacted the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA), which made sweeping changes to the federal immigration laws. IIRIRA replaced the INA's exclusion/deportation framework, which turned on whether an alien had physically entered the United States, with a new framework that turned on whether an alien had been lawfully admitted into the country by immigration authorities. Aliens who had not been admitted, including those who may have unlawfully entered the country, could be barred entry or removed from the country based on specified grounds of inadmissibility listed under INA Section 212. Aliens who had been lawfully admitted, however, could be removed if they fell under grounds of deportability specified under INA Section 237. A standard, \"formal\" removal proceeding was established for deportable aliens and most categories of inadmissible aliens. But IIRIRA created a new \"expedited removal\" process that applied to a subset of inadmissible aliens. This process applies to arriving aliens and certain aliens who recently entered the United States without inspection, when those aliens lack valid entry documents or attempted to procure their admission through fraud or misrepresentation. IIRIRA generally authorized (but did not require) immigration authorities to detain aliens believed to be removable pending those aliens' formal removal proceedings, but permitted their release on bond or \"conditional parole.\" IIRIRA, however, required the detention of aliens who were inadmissible or deportable based on the commission of certain enumerated crimes or for terrorist-related grounds, generally with no possibility of release from custody. IIRIRA also generally required the detention of \"applicants for admission,\" including aliens subject to expedited removal, pending determinations as to whether they should be removed (such aliens, however, could still be paroled into the United States by immigration officials in their discretion). This mandatory detention requirement has been applied even if those aliens were subsequently transferred to formal removal proceedings. Finally, IIRIRA created a detention scheme in which aliens with final orders of removal became subject to detention during a 90-day period pending their removal, and the government could (but was not required to) continue to detain some of those aliens after that period. A table showing the development of these immigration detention laws can be found in Table A-1 . Since IIRIRA's enactment, the statutory framework governing detention has largely remained constant. This detention framework is multifaceted, with different rules turning on whether the alien is seeking admission into the United States or was lawfully admitted within the country; whether the alien has committed certain enumerated criminal or terrorist acts; and whether the alien has been issued a final administrative order of removal. Four provisions largely govern the current immigration detention scheme: 1. INA Section 236(a) generally authorizes the detention of aliens pending formal removal proceedings and permits (but does not require) aliens who are not subject to mandatory detention to be released on bond or their own recognizance; 2. INA Section 236(c) generally requires the detention of aliens who are removable because of specified criminal activity or terrorist-related grounds; 3. INA Section 235(b) generally requires the detention of applicants for admission (e.g., aliens arriving at a designated port of entry) who appear subject to removal; and 4. INA Section 241(a) generally mandates the detention of aliens during a 90-day period after formal removal proceedings, and authorizes (but does not require) the continued detention of certain aliens after that period. While these statutes apply to distinct classes of aliens at different phases of the removal process, the statutory detention framework \"is not static,\" and DHS's detention authority \"shifts as the alien moves through different phases of administrative and judicial review.\" This section explores these detention statutes and their implementing regulations, including administrative and judicial rulings that inform their scope and application. (Other detention provisions in the INA that apply to small subsets of non-U.S. nationals, such as alien crewmen, or arriving aliens inadmissible for health-related reasons, are not addressed in this report. ) A table providing a comparison of these major INA detention statutes can be found in Table A-2 . INA Section 236(a) is the \"default rule\" for aliens placed in removal proceedings. The statute is primarily administered by Immigration and Customs Enforcement (ICE), the agency within DHS largely responsible for immigration enforcement in the interior of the United States. Section 236(a) authorizes immigration authorities to arrest and detain an alien pending his or her formal removal proceedings. Detention under INA Section 236(a) is discretionary, and immigration authorities are not required to detain an alien subject to removal unless the alien falls within one of the categories of aliens subject to mandatory detention (e.g., aliens convicted of specified crimes under INA Section 236(c), discussed later in this report). If ICE arrests and detains an alien under INA Section 236(a), and the alien is not otherwise subject to mandatory detention, the agency has two options: 1. it \"may continue to detain the arrested alien\" pending the removal proceedings; or 2. it \"may release the alien\" on bond in the amount of at least $1500, or on \"conditional parole.\" Generally, upon release (whether on bond or conditional parole), the alien may not receive work authorization unless the alien is otherwise eligible (e.g., the alien is an LPR). And ICE may at any time revoke a bond or conditional parole and bring the alien back into custody. In the event of an alien's release, ICE may opt to enroll the alien in an Alternatives to Detention (ATD) program, which allows ICE the ability to monitor and supervise the released alien to ensure his or her eventual appearance at a removal proceeding. Following the arrest of an alien not subject to mandatory detention, an immigration officer may, at any time during formal removal proceedings, determine whether the alien should remain in custody or be released. But when an alien is arrested without a warrant, DHS regulations provide that the immigration officer must make a custody determination within 48 hours of the alien's arrest, unless there is \"an emergency or other extraordinary circumstance\" that requires \"an additional reasonable period of time\" to make the custody determination. DHS has defined \"emergency or other extraordinary circumstance\" to mean a \"significant infrastructure or logistical disruption\" (e.g., natural disaster, power outage, serious civil disturbance); an \"influx of large numbers of detained aliens that overwhelms agency resources\"; and other unique facts and circumstances \"including, but not limited to, the need for medical care or a particularized compelling law enforcement need.\" After ICE's initial custody determination, an alien may, at any time during the removal proceedings, request review of that decision at a bond hearing before an immigration judge (IJ) within the Department of Justice's (DOJ's) Executive Office for Immigration Review. While the alien may request a bond hearing, INA Section 236(a) does not require a hearing to be provided at any particular time. If there is a bond hearing, regulations specify that it \"shall be separate and apart from, and shall form no part of, any deportation or removal hearing or proceeding.\" During these bond proceedings, the IJ may, under INA Section 236(a), determine whether to keep the alien in custody or release the alien, and the IJ also has authority to set the bond amount. Following the IJ's custody decision, the alien may obtain a later bond redetermination only \"upon a showing that the alien's circumstances have changed materially since the prior bond redetermination.\" Both the alien and DHS may appeal the IJ's custody or bond determination to the Board of Immigration Appeals (BIA), the highest administrative body charged with interpreting federal immigration laws. The filing of an appeal generally will not stay the IJ's decision or otherwise affect the ongoing removal proceedings. The BIA, however, may stay the IJ's custody determination on its own motion or when DHS appeals that decision and files a motion for a discretionary stay. Moreover, if ICE had determined that the alien should not be released or had set bond at $10,000 or greater, any order of the IJ authorizing release (on bond or otherwise) is automatically stayed upon DHS's filing of a notice of intent to appeal with the immigration court within one business day of the IJ's order, and the IJ's order will typically remain held in abeyance pending the BIA's decision on appeal. Following the enactment of IIRIRA, the DOJ promulgated regulations to govern discretionary detention and release decisions under INA Section 236(a). These regulations require the alien to \"demonstrate to the satisfaction of the officer that . . . release would not pose a danger to property or persons, and that the alien is likely to appear for any future proceeding.\" Based on this regulation, the BIA has held that the alien has the burden of showing that he or she should be released from custody, and \"[o]nly if an alien demonstrates that he does not pose a danger to the community should an [IJ] continue to a determination regarding the extent of flight risk posed by the alien.\" Some federal courts, however, have held that if an alien's detention under INA Section 236(a) becomes prolonged, a bond hearing must be held where the burden shifts to the government to prove that the alien's continued detention is warranted. For example, the U.S. Court of Appeals for the Ninth Circuit (Ninth Circuit ) has reasoned that, given an individual's \"substantial liberty interest\" in avoiding physical restraint, the government should prove by clear and convincing evidence that the detention is justified. The Supreme Court has not yet addressed the proper allocation of the burden of proof for custody determinations under INA Section 236(a). On the one hand, the Court has held that the statute does not itself require the government to prove that an alien's continued detention is warranted or to afford the alien a bond hearing. On the other hand, the Court has not decided whether due process considerations nonetheless compel the government to bear the burden of proving that the alien should remain in custody if detention becomes prolonged. While INA Section 236(a) and its implementing regulations provide standards for determining whether an alien should be released from ICE custody, they do not specify the factors that may be considered in weighing a detained alien's potential danger or flight risk. But the BIA has instructed that an IJ may consider, among other factors, these criteria in assessing an alien's custody status: whether the alien has a fixed address in the United States; the alien's length of residence in the United States; whether the alien has family ties in the United States; the alien's employment history; the alien's record of appearance in court; the alien's criminal record, including the extent, recency, and seriousness of the criminal offenses; the alien's history of immigration violations; any attempts by the alien to flee prosecution or otherwise escape from authorities; and the alien's manner of entry to the United States. The BIA and other authorities have generally applied these criteria in reviewing custody determinations. In considering an alien's danger to the community or flight risk, \"any evidence in the record that is probative and specific can be considered.\" The BIA has also instructed that, in deciding whether an alien presents a danger to the community and should not be released from custody, an IJ should consider both direct and circumstantial evidence of dangerousness, including whether the facts and circumstances raise national security considerations. In addition, although bond proceedings are \"separate and apart from\" formal removal proceedings, evidence obtained during a removal hearing \"may be considered during a custody hearing so long as it is made part of the bond record.\" Under DOJ regulations, an IJ may not determine the conditions of custody for classes of aliens subject to mandatory detention. In these circumstances, ICE retains exclusive authority over the alien's custody status. These limitations apply to arriving aliens in formal removal proceedings (including arriving aliens paroled into the United States); aliens in formal removal proceedings who are deportable on certain security and related grounds (e.g., violating espionage laws, criminal activity that \"endangers public safety or national security,\" terrorist activities, severe violations of religious freedom); and aliens in formal removal proceedings who are subject to mandatory detention under INA Section 236(c) based on the commission of certain enumerated crimes. Although aliens who fall within these categories may not request a custody determination before an IJ, they may still seek a redetermination of custody conditions from ICE. In addition, aliens detained under INA Section 236(c) based on criminal or terrorist-related conduct may request a determination by an IJ that they do not properly fall within that designated category, and that they are thus entitled to a bond hearing. An alien may generally request review of ICE's custody determination at a bond hearing before an IJ, and the alien may also appeal the IJ's custody decision to the BIA. INA Section 236(e), however, expressly bars judicial review of a decision whether to detain or release an alien who is subject to removal: The Attorney General's discretionary judgment regarding the application of this section shall not be subject to review. No court may set aside any action or decision by the Attorney General under this section regarding the detention or release of any alien or the grant, revocation, or denial of bond or parole. Even so, the Supreme Court has determined that, absent clear congressional intent, INA provisions barring judicial review do not foreclose the availability of review in habeas corpus proceedings because \"[i]n the immigration context, 'judicial review' and 'habeas corpus' have historically different meanings.\" Thus, despite INA Section 236(e)'s limitation on judicial review, the Court has held that the statute does not bar federal courts from reviewing, in habeas corpus proceedings, an alien's statutory or constitutional challenge to his detention. The Court has reasoned that an alien's challenge to \"the statutory framework\" permitting his detention is distinct from a challenge to the \"discretionary judgment\" or operational \"decision\" whether to detain the alien, which is foreclosed from judicial review under INA Section 236(e). Lower courts have similarly held that they retain jurisdiction to review habeas claims that raise constitutional or statutory challenges to detention. For that reason, although a detained alien may not seek judicial review of the government's discretionary decision whether to keep him or her detained, the alien may challenge the legal authority for that detention under the federal habeas statute. The Supreme Court has also considered whether a separate statute, INA Section 242(b)(9), bars judicial review of detention challenges. That statute provides: Judicial review of all questions of law and fact, including interpretation and application of constitutional and statutory provisions, arising from any action taken or proceeding brought to remove an alien from the United States under this subchapter shall be available only in judicial review of a final order [of removal] under this section. The Court has construed INA Section 242(b)(9) as barring review of three specific actions (except as part of the review of a final order of removal): (1) an order of removal, (2) the government's decision to seek removal (including the decision to detain the alien), and (3) the process by which an alien's removability would be determined. But the Court has declined to read the statute as barring all claims that could technically \"arise from\" one of those three actions. Thus, the Court has held that INA Section 242(b)(9) does not bar review of claims challenging the government's authority to detain aliens because such claims do not purport to challenge an order of removal, the government's decision to seek removal, or the process by which an alien's removability is determined. While INA Section 236(a) generally authorizes immigration officials to detain aliens pending their formal removal proceedings, INA Section 236(c) requires the detention of aliens who are subject to removal because of specified criminal or terrorist-related grounds. INA Section 236(c)(1) covers aliens who fall within one of four categories: 1. An alien who is inadmissible under INA Section 212(a)(2) based on the commission of certain enumerated crimes, including a crime involving moral turpitude, a controlled substance violation, a drug trafficking offense, a human trafficking offense, money laundering, and any two or more criminal offenses resulting in a conviction for which the total term of imprisonment is at least five years. 2. An alien who is deportable under INA Section 237(a)(2) based on the conviction of certain enumerated crimes, including an aggravated felony, two or more crimes involving moral turpitude not arising out of a single scheme of criminal misconduct, a controlled substance violation (other than a single offense involving possession of 30 grams or less of marijuana), and a firearm offense. 3. An alien who is deportable under INA Section 237(a)(2)(A)(i) based on the conviction of a crime involving moral turpitude (generally committed within five years of admission) for which the alien was sentenced to at least one year of imprisonment. 4. An alien who is inadmissible or deportable for engaging in terrorist activity, being a representative or member of a terrorist organization, being associated with a terrorist organization, or espousing or inciting terrorist activity. The statute instructs that ICE \"shall take into custody any alien\" who falls within one of these categories \"when the alien is released [from criminal custody], without regard to whether the alien is released on parole, supervised release, or probation, and without regard to whether the alien may be arrested or imprisoned again for the same offense.\" While INA Section 236(c)(1) requires ICE to detain aliens who are removable on enumerated criminal or terrorist-related grounds, INA Section 236(c)(2) provides that ICE \"may release an alien described in paragraph (1) only if\" the alien's release \"is necessary to provide protection to a witness, a potential witness, a person cooperating with an investigation into major criminal activity, or an immediate family member or close associate of a witness, potential witness, or person cooperating with such an investigation,\" and the alien shows that he or she \"will not pose a danger to the safety of other persons or of property and is likely to appear for any scheduled proceeding.\" Under the statute, \"[a] decision relating to such release shall take place in accordance with a procedure that considers the severity of the offense committed by the alien.\" Without these special circumstances, an alien detained under INA Section 236(c) generally must remain in custody pending his or her removal proceedings. Furthermore, given the mandatory nature of the detention, the alien may not be released on bond or conditional parole, or request a custody redetermination at a bond hearing before an IJ. Although an alien detained under INA Section 236(c) has no right to a bond hearing before an IJ, DOJ regulations allow the alien to seek an IJ's determination \"that the alien is not properly included\" within the category of aliens subject to mandatory detention under INA Section 236(c). The BIA has determined that, during this review, the IJ should conduct an independent assessment, rather than a \"perfunctory review,\" of DHS's decision to charge the alien with one of the specified criminal or terrorist-related grounds of removability under INA Section 236(c). According to the BIA, the alien is not \"properly included\" within the scope of INA Section 236(c) if the IJ concludes that DHS \"is substantially unlikely to establish at the merits hearing, or on appeal, the charge or charges that would otherwise subject the alien to mandatory detention.\" If the IJ determines that the alien is not properly included within INA Section 236(c), the IJ may then consider whether the alien is eligible for bond under INA Section 236(a). The mandatory detention requirements of INA Section 236(c) have been challenged as unconstitutional but, to date, none of these challenges have succeeded. In Demore v. Kim , an LPR (Kim) who had been detained under INA Section 236(c) for six months argued that his detention violated his right to due process because immigration authorities had made no determination that he was a danger to society or a flight risk. The Ninth Circuit upheld a federal district court's ruling that INA Section 236(c) was unconstitutional. The Ninth Circuit determined that INA Section 236(c) violated Kim's right to due process as an LPR because it afforded him no opportunity to seek bail. The Supreme Court reversed the Ninth Circuit's decision, holding that mandatory detention of certain aliens pending removal proceedings was \"constitutionally permissible.\" The Court noted that it had previously \"endorsed the proposition that Congress may make rules as to aliens that would be unacceptable if applied to citizens,\" and the Court also cited its \"longstanding view that the Government may constitutionally detain deportable aliens during the limited period necessary for their removal proceedings, . . .\" The Court concluded that \"Congress, justifiably concerned that deportable criminal aliens who are not detained continue to engage in crime and fail to appear for their removal hearings in large numbers, may require that persons such as [Kim] be detained for the brief period necessary for their removal proceedings.\" The Court also distinguished its 2001 decision in Zadvydas v. Davis , where it declared that \"serious constitutional concerns\" would be raised if lawfully admitted aliens were indefinitely detained after removal proceedings against them had been completed. The Court reasoned that, unlike the post-order of removal detention statute at issue in Zadvydas , INA Section 236(c) \"governs detention of deportable criminal aliens pending their removal proceedings ,\" and thus \"serves the purpose of preventing deportable criminal aliens from fleeing prior to or during their removal proceedings, . . .\" Yet in Zadvydas , removal was \"no longer practically attainable\" for the detained aliens following the completion of their proceedings, and so their continued detention \"did not serve its purported immigration purpose.\" The Court further distinguished Zadvydas because that case involved a potentially indefinite period of detention, while detention under INA Section 236(c) typically lasts for a \"much shorter duration\" and has a \"definite termination point\"âthe end of the removal proceedings. Although the Supreme Court in Demore ruled that mandatory detention pending removal proceedings is not unconstitutional per se, the Court did not address whether there are any constitutional limits to the duration of such detention under INA Section 236(c). Some lower courts, however, have construed Demore to apply only to relatively brief periods of detention. Ultimately, in Jennings v. Rodriguez , the Supreme Court held that DHS has the statutory authority to indefinitely detain aliens pending their removal proceedings, but did not decide whether such prolonged detention is constitutionally permissible. INA Section 236(c)(1) instructs that ICE \"shall take into custody any alien\" who falls within one of the enumerated criminal or terrorist-related grounds \" when the alien is released \" from criminal custody. And under INA Section 236(c)(2), ICE may not release \"an alien described in paragraph (1)\" except for witness protection purposes. In its 2019 decision in Nielsen v. Preap , the Supreme Court held that INA Section 236(c)'s mandatory detention scheme covers any alien who has committed one of the enumerated criminal or terrorist-related offenses, no matter when the alien had been released from criminal incarceration. The Court observed that INA Section 236(c)(2)'s mandate against release applies to \"an alien described in paragraph (1)\" of that statute, and that INA Section 236(c)(1), in turn, describes aliens who have committed one of the enumerated crimes. The Court determined that, although INA Section 236(c)(1) instructs that such aliens be taken into custody \"when the alien is released,\" the phrase \"when . . . released\" does not describe the alien, and \"plays no role in identifying for the [DHS] Secretary which aliens she must immediately arrest.\" The Court thus held that the scope of aliens subject to mandatory detention under INA Section 236(c) \"is fixed by the predicate offenses identified\" in INA Section 236(c)(1), no matter when the alien was released from criminal custody. The Court also opined that, even if INA Section 236(c) requires an alien to be detained immediately upon release from criminal custody, ICE's failure to act promptly would not bar the agency from detaining the alien without bond. The Court relied, in part, on its 1990 decision in United States v. Montalvo-Murillo , which held that the failure to provide a criminal defendant a prompt bond hearing as required by federal statute did not mandate the defendant's release from criminal custody. Citing Montalvo-Murillo , the Court in Preap recognized the principle that if a statute fails to specify a penalty for the government's noncompliance with a statutory deadline, the courts will not \"'impose their own coercive sanction.'\" In short, the Court declared , \"it is hard to believe that Congress made [ICE's] mandatory detention authority vanish at the stroke of midnight after an alien's release\" from criminal custody. The Court thus reversed a Ninth Circuit decision that had restricted the application of INA Section 236(c) to aliens detained \"promptly\" upon their release from criminal custody, but noted that its ruling on the proper interpretation of INA Section 236(c) \"does not foreclose as-applied challengesâthat is, constitutional challenges to applications of the statute as we have now read it.\" In sum, based on the Court's ruling in Preap , INA Section 236(c) authorizes ICE to detain covered aliens without bond pending their formal removal proceedings, regardless of whether they were taken into ICE custody immediately or long after their release from criminal incarceration. That said, the Court has left open the question of whether the mandatory detention of aliens long after their release from criminal custody is constitutionally permissible. The INA provides for the mandatory detention of aliens who are seeking initial entry into the United States, or who have entered the United States without inspection, and who are believed to be subject to removal. Under INA Section 235(b), an \"applicant for admission,\" defined to include both an alien arriving at a designated port of entry and an alien present in the United States who has not been admitted, is generally detained pending a determination about whether the alien should be admitted into the United States. The statute thus covers aliens arriving at the U.S. border (or its functional equivalent), as well as aliens who had entered the United States without inspection, and are later apprehended within the country. The statute's mandatory detention scheme covers (1) applicants for admission who are subject to a streamlined removal process known as \"expedited removal\" and (2) applicants for admission who are not subject to expedited removal, and who are placed in formal removal proceedings. INA Section 235(b)(1) provides for the expedited removal of arriving aliens who are inadmissible under INA Section 212(a)(6)(C) or (a)(7) because they lack valid entry documents or have attempted to procure admission by fraud or misrepresentation. The statute also authorizes the Secretary of Homeland Security to expand the use of expedited removal to aliens present in the United States without being admitted or paroled if they have been in the country less than two years and are inadmissible on the same grounds. Based on this authority, DHS has employed expedited removal mainly to (1) arriving aliens; (2) aliens who arrived in the United States by sea within the last two years, who have not been admitted or paroled by immigration authorities; and (3) aliens found in the United States within 100 miles of the border within 14 days of entering the country, who have not been admitted or paroled by immigration authorities. More recently, however, DHS has expanded the use of expedited removal to aliens who have not been admitted or paroled, and who have been in the United States for less than two years (a legal challenge to this expansion is pending at the time of this report's publication). Generally, an alien subject to expedited removal may be removed without a hearing or further review unless the alien indicates an intention to apply for asylum or a fear of persecution if removed to a particular country. If the alien indicates an intention to apply for asylum or a fear of persecution, he or she will typically be referred to an asylum officer within DHS's U.S. Citizenship and Immigration Services (USCIS) to determine whether the alien has a \"credible fear\" of persecution or torture. If the alien establishes a credible fear, he or she will be placed in \"formal\" removal proceedings under INA Section 240, and may pursue asylum and related protections. INA Section 235(b)(1) and DHS regulations provide that an alien \"shall be detained\" pending a determination on whether the alien is subject to expedited removal, including during any credible fear determination; and if the alien is found not to have a credible fear of persecution or torture, the alien will remain detained until his or her removal. Typically, the alien will be initially detained by Customs and Border Protection (CBP) for no more than 72 hours for processing (e.g., fingerprints, photographs, initial screening), and the alien will then be transferred to ICE custody pending a credible fear determination if the alien is subject to expedited removal and requests asylum or expresses a fear of persecution. Under INA Section 212(d)(5), however, DHS may parole an applicant for admission (which includes an alien subject to expedited removal) on a case-by-case basis \"for urgent humanitarian reasons or significant public benefit.\" Based on this authority, DHS has issued regulations that allow parole of an alien in expedited removal proceedings, but only when parole \"is required to meet a medical emergency or is necessary for a legitimate law enforcement objective.\" INA Section 235(b)(1) provides that aliens who establish a credible fear of persecution or torture \"shall be detained for further consideration of the application for asylum\" in formal removal proceedings. The alien will typically remain in ICE custody during those proceedings. As noted above, DHS retains the authority to parole applicants for admission, and typically will interview the alien to determine his or her eligibility for parole within seven days after the credible fear finding. Under DHS regulations, the following categories of aliens may be eligible for parole, provided they do not present a security or flight risk: persons with serious medical conditions; women who have been medically certified as pregnant; juveniles (defined as individuals under the age of 18) who can be released to a relative or nonrelative sponsor; persons who will be witnesses in proceedings conducted by judicial, administrative, or legislative bodies in the United States; and persons \"whose continued detention is not in the public interest.\" Under DHS regulations, a grant of parole ends upon the alien's departure from the United States, or, if the alien has not departed, at the expiration of the time for which parole was authorized. Parole may also be terminated upon accomplishment of the purpose for which parole was authorized or when DHS determines that \"neither humanitarian reasons nor public benefit warrants the continued presence of the alien in the United States.\" For some time, the BIA took the view that aliens apprehended after unlawfully entering the United States (i.e., not apprehended at a port of entry), and who were first screened for expedited removal but then placed in formal removal proceedings following a positive credible fear determination, were not subject to mandatory detention under INA Section 235(b)(1). Instead, the BIA determined, these aliens could be released on bond under INA Section 236(a) because, unlike arriving aliens, they did not fall within the designated classes of aliens who are ineligible for bond hearings under DOJ regulations. Thus, the BIA concluded, INA Section 235(b)(1)'s mandatory detention scheme \"applie[d] only to arriving aliens.\" In 2019, Attorney General (AG) William Barr overturned the BIA's decision and ruled that INA Section 235(b)(1)'s mandatory detention scheme applies to all aliens placed in formal removal proceedings after a positive credible fear determination, regardless of their manner of entry. The AG reasoned that INA Section 235(b)(1) plainly mandates that aliens first screened for expedited removal who establish a credible fear \"shall be detained\" until completion of their formal removal proceedings, and that the INA only authorizes their release on parole. The AG also relied on the Supreme Court's 2018 decision in Jennings v. Rodriguez , which construed INA Section 235(b) as mandating the detention of covered aliens unless they are paroled. Finally, the AG concluded, even though nonarriving aliens subject to expedited removal are not expressly barred from seeking bond under DOJ regulations, that regulatory framework \"does not provide an exhaustive catalogue of the classes of aliens who are ineligible for bond.\" In a later class action lawsuit, the U.S. District Court for the Western District of Washington ruled that INA Section 235(b)(1)'s mandatory detention scheme is unconstitutional, and that aliens apprehended within the United States who are first screened for expedited removal and placed in formal removal proceedings following a positive credible fear determination are \"constitutionally entitled to a bond hearing before a neutral decisionmaker\" pending consideration of their asylum claims. The court thus ordered the government to (1) provide bond hearings within seven days of a bond hearing request by detained aliens who entered the United States without inspection, were first screened for expedited removal, and were placed in formal removal proceedings after a positive credible fear determination; (2) release any aliens within that class whose detention time exceeds that seven-day limit and who did not have a bond hearing; and (3) if a bond hearing is held, require DHS to prove that continued detention is warranted to retain custody of the alien. The DOJ has appealed the district court's ruling to the Ninth Circuit. The Ninth Circuit has stayed the lower court's injunction pending appeal insofar as it requires the government to hold bond hearings within seven days, to release aliens whose detention time exceeds that limit, and to require DHS to have the burden of proof. But the court declined to stay the lower court's order that aliens apprehended within the United States who are initially screened for expedited removal, and placed in formal removal proceedings after a positive credible fear determination, are \"constitutionally entitled to a bond hearing.\" Thus, the Ninth Circuit's order \"leaves the pre-existing framework in place\" in which unlawful entrants transferred to formal removal proceedings after a positive credible fear determination were eligible for bond hearings. As a result of the district court's ruling, aliens apprehended within the United States who are initially screened for expedited removal and transferred to formal removal proceedings following a positive credible fear determination remain eligible to seek bond pending their formal removal proceedings. On the other hand, arriving aliens who are transferred to formal removal proceedings are not covered by the court's order, and generally must remain detained pending those proceedings, unless DHS grants parole. INA Section 235(b)(2) covers applicants for admission who are not subject to expedited removal. This provision would thus cover, for example, unadmitted aliens who are inadmissible on grounds other than those described in INA Section 212(a)(6)(C) and (a)(7) (e.g., because the alien is deemed likely to become a public charge, or the alien has committed specified crimes). The statute would also cover aliens who had entered the United States without inspection, but who are not subject to expedited removal because they were not apprehended within two years after their arrival in the country. The INA provides that aliens covered by INA Section 235(b)(2) \"shall be detained\" pending formal removal proceedings before an IJ. As discussed above, however, DHS may parole applicants for admission pending their removal proceedings, and agency regulations specify circumstances in which parole may be warranted (e.g., where detention \"is not in the public interest\"). Absent parole, aliens covered by INA Section 235(b)(2) generally must be detained and cannot seek their release on bond. INA Section 241(a) governs the detention of aliens after the completion of removal proceedings. The statute's detention authority covers two categories of aliens: (1) aliens with a final order of removal who are subject to detention during a 90-day \"removal period\" pending efforts to secure their removal; and (2) certain aliens who may (but are not required to) be detained beyond the 90-day removal period. The Supreme Court has construed the post-order of removal detention statute as having implicit temporal limitations. INA Section 241(a)(1) provides that DHS \"shall remove\" an alien ordered removed \"within a period of 90 days,\" and refers to this 90-day period as the \"removal period.\" The statute specifies that the removal period \"begins on the latest of the following\": The date the order of removal becomes administratively final. If the alien petitions for review of the order of removal, and a court orders a stay of removal, the date of the court's final order in the case. If the alien is detained or confined for nonimmigration purposes (e.g., criminal incarceration), the date the alien is released from that detention or confinement. INA Section 241(a)(2) instructs that DHS \"shall detain\" an alien during the 90-day removal period. The statute also instructs that \"[u]nder no circumstance during the removal period\" may DHS release an alien found inadmissible on criminal or terrorist-related grounds under INA Section 212(a)(2) or (a)(3)(B) (e.g., a crime involving moral turpitude); or who has been found deportable on criminal or terrorist-related grounds under INA Section 237(a)(2) or (a)(4)(B) (e.g., an aggravated felony conviction). The former Immigration and Naturalization Service (INS) previously issued guidance interpreting these provisions as only authorizing, but not requiring, the detention of \"non-criminal aliens\" during the 90-day removal period. There is no indication that DHS has rescinded that policy. But according to the agency, the statute generally requires the detention during the removal period of terrorists and aliens who have committed the specified crimes enumerated in the statute. Under this policy, however, if a criminal alien subject to mandatory detention has been granted withholding of removal or protection under the Convention Against Torture (CAT), the alien may be released if the agency is not pursuing the alien's removal. While INA Section 241(a)(1) specifies a 90-day removal period, it also provides that this period may be extended beyond 90 days and that the alien may remain in detention during this extended period \"if the alien fails or refuses to make timely application in good faith for travel or other documents necessary to the alien's departure or conspires or acts to prevent the alien's removal subject to an order of removal.\" INA Section 241(a)(3) provides that, if the alien either \"does not leave or is not removed within the removal period,\" the alien will be released and \"subject to supervision\" pending his or her removal. DHS regulations state that the order of supervision must specify the conditions of release, including requirements that the alien (1) periodically report to an immigration officer and provide relevant information under oath; (2) continue efforts to obtain a travel document and help DHS obtain the document; (3) report as directed for a mental or physical examination; (4) obtain advance approval of travel beyond previously specified times and distances; and (5) provide ICE with written notice of any change of address. Typically, an alien with a final order of removal is subject to detention during the 90-day removal period, and must be released under an order of supervision if the alien does not leave or is not removed within that period. INA Section 241(a)(6), however, states that an alien \"may be detained beyond the removal period\" if the alien falls within one of three categories: 1. an alien ordered removed who is inadmissible under INA Section 212(a) (e.g., an arriving alien who lacks valid entry documents); 2. an alien ordered removed who is deportable under INA Sections 237(a)(1)(C) (failure to maintain or comply with conditions of nonimmigrant status), 237(a)(2) (specified crimes including crimes involving moral turpitude, aggravated felonies, and controlled substance offenses), or 237(a)(4) (security and terrorist-related grounds); or 3. an alien whom DHS has determined \"to be a risk to the community or unlikely to comply with the order of removal.\" DHS regulations provide that, before the end of the 90-day removal period, ICE will conduct a \"custody review\" for a detained alien who falls within one of the above categories, and whose removal \"cannot be accomplished during the period, or is impracticable or contrary to the public interest,\" to determine whether further detention is warranted after the removal period ends. The regulations list factors that ICE should consider in deciding whether to continue detention, including the alien's disciplinary record, criminal record, mental health reports, evidence of rehabilitation, history of flight, prior immigration history, family ties in the United States, and any other information probative of the alien's danger to the community or flight risk. ICE may release the alien after the removal period ends if the agency concludes that travel documents for the alien are unavailable (or that removal \"is otherwise not practicable or not in the public interest\"); the alien is \"a non-violent person\" and likely will not endanger the community; the alien likely will not violate any conditions of release; and the alien does not pose a significant flight risk. Upon the alien's release, ICE may impose certain conditions, including (but not limited to) those specified for the release of aliens during the 90-day removal period, such as periodic reporting requirements. If ICE decides to maintain custody of the alien, it may retain custody authority for up to three months after the expiration of the 90-day removal period (i.e., up to 180 days after final order of removal). At the end of that three-month period, ICE may either release the alien if he or she has not been removed (in accordance with the factors and criteria for supervised release), or refer the alien to its Headquarters Post-Order Detention Unit (HQPDU) for further custody review. If the alien remains in custody after that review, the HQPDU must conduct another review within one year (i.e., 18 months after final order of removal), and (if the alien is still detained) annually thereafter. Although INA Section 241(a) authorizes (and in some cases requires) DHS to detain an alien after removal proceedings, the agency's post-order of removal detention authority has been subject to legal challenge, particularly when the alien remained detained indefinitely pending efforts to secure his or her removal to another country. Eventually, in Zadvydas v. Davis , a case involving the prolonged detention of lawfully admitted aliens who had been ordered removed, the Supreme Court interpreted the statute consistently with due process principles to limit detention generally to a six-month period after a final order of removal. In Zadvydas , the Supreme Court considered whether INA Section 241(a)'s post-order of removal detention statute should be construed as having an implicit time limitation to avoid serious constitutional concerns. The Court determined that \"[a] statute permitting indefinite detention of an alien would raise a serious constitutional problem\" under the Due Process Clause. The Court reasoned that \"[f]reedom from imprisonmentâfrom government custody, detention, or other forms of physical restraintâlies at the heart of the liberty that Clause protects,\" and found no justifications for the indefinite detention of aliens whose removal is no longer practicable. While the Court recognized that a potentially indefinite detention scheme may be upheld if it is \"limited to specially dangerous individuals and subject to strong procedural protections,\" INA Section 241(a)(6)'s post-removal period detention scheme was different because it applied \"broadly to aliens ordered removed for many and various reasons, including tourist visa violations.\" The Court thus concluded that the statute could not be lawfully construed as authorizing indefinite detention. Notably, the Court rejected the government's contention that indefinite detention pending removal was constitutionally permissible under Shaughnessy v. United States ex rel. Mezei , which, many decades earlier, had upheld the indefinite detention on Ellis Island of an alien denied admission into the United States and ordered excluded. The Zadvydas Court distinguished Mezei , which involved an alien considered at the threshold of entry, because \"once an alien enters the country, the legal circumstance changes, for the Due Process Clause applies to all 'persons' within the United States, including aliens, whether their presence here is lawful, unlawful, temporary, or permanent.\" The Zadvydas Court determined there was no indication that Congress had intended to confer immigration authorities with the power to indefinitely confine individuals ordered removed. Although INA Section 241(a)(6) states that an alien \"may be detained\" after the 90-day removal period, the Court reasoned, the statute's use of the word \"may\" is ambiguous and \"does not necessarily suggest unlimited discretion.\" For these reasons, applying the doctrine of constitutional avoidance, the Court held that INA Section 241(a)(6) should be construed as authorizing detention only for \"a period reasonably necessary to secure removal.\" The Court thus construed the statute as having an implicit temporal limitation of six months following a final order of removal. If that six-month period elapses, the Court held, the alien generally must be released from custody if he \"provides good reason to believe that there is no significant likelihood of removal in the reasonably foreseeable future.\" In Clark v. Martinez , the Supreme Court considered whether the presumptive six-month time limitation established in Zadvydas applied to aliens who had not been lawfully admitted into the United States, and who were being detained after their 90-day removal periods had lapsed. The Court concluded that the time limitation read into INA Section 241(a)(6) for deportable aliens in Zadvydas equally applied to inadmissible aliens. But unlike in Zadvydas, the Court did not rest its decision on matters of constitutional avoidance. Instead, the majority opinion (written by Justice Scalia, who had dissented in Zadvydas ), relied on the principle of statutory construction that a provision should have the same meaning in different circumstances. \"[B]ecause the statutory text provides for no distinction between admitted and nonadmitted aliens,\" the Martinez Court reasoned, the provision should be interpreted as having the same, presumptive six-month time limit for both categories of aliens. In reaching this conclusion, the Supreme Court rejected the government's invitation to construe the detention statute differently when applied to unadmitted aliens, which the government contended was proper because of the limited constitutional protections available to such aliens. The majority stated that \"[b]e that as it may, it cannot justify giving the same detention provision a different meaning when such aliens are involved.\" Following the Supreme Court's decision in Zadvydas , the former INS issued regulations that established \"special review procedures\" for aliens who remain detained beyond the 90-day removal period. Under these rules, an alien may \"at any time after a removal order becomes final\" submit a written request for release because there is no significant likelihood of removal in the reasonably foreseeable future. The HQPDU will consider the alien's request and issue a decision on the likelihood of the alien's removal. Generally, if the HQPDU determines that there is no significant likelihood of removal, ICE will release the alien subject to any appropriate conditions. But if the HQPDU concludes that there is a significant likelihood of the alien's removal in the reasonably foreseeable future, the alien will remain detained pending removal. The regulations provide, however, that even if the HQPDU concludes that there is no significant likelihood of the alien's removal in the reasonably foreseeable future, the alien may remain detained if \"special circumstances\" are present. The regulations list four categories of aliens whose continued detention may be warranted because of special circumstances: (1) aliens with \"a highly contagious disease that is a threat to public safety\"; (2) aliens whose release \"is likely to have serious adverse foreign policy consequences for the United States\"; (3) aliens whose release \"presents a significant threat to the national security or a significant risk of terrorism\"; and (4) aliens whose release \"would pose a special danger to the public.\" Some courts, though, have ruled that the former INS exceeded its authority by issuing regulations allowing the continued detention of aliens in \"special circumstances.\" Both the Fifth and Ninth Circuits have concluded that the Supreme Court in Zadvydas never created an exception for the indefinite detention post-order of removal of aliens considered particularly dangerous. Instead, these courts concluded, the Supreme Court had merely suggested that it might be within Congress's power to enact a law allowing for the prolonged detention of certain types of aliens following an order of removal, not that Congress had done so when it enacted INA Section 241(a)(6), which does not limit its detention authority to \"specific and narrowly defined groups.\" The Tenth Circuit, on the other hand, has ruled that the former INS's interpretation of the statute to permit indefinite detention in special circumstances was reasonable. The Supreme Court has not yet considered whether INA Section 241(a)(6) authorizes indefinite post-order of removal detention in special circumstances. As the above discussion reflects, DHS has broad authority to detain aliens who are subject to removal, and for certain classes of aliens (e.g., those with specified criminal convictions) detention is mandatory with no possibility of release except in limited circumstances. Further, while the Supreme Court has recognized limits to DHS's ability to detain aliens after removal proceedings, the Court has recognized that the governing INA provisions appear to allow the agency to detain aliens potentially indefinitely pending those proceedings. But some have argued that the prolonged detention of aliens during their removal proceedings without bond hearings is unconstitutional. Moreover, the government's ability to detain alien minors, including those accompanied by adults in family units, is currently limited by a binding settlement agreement known as theÂ  Flores Settlement, which generally requires the release of minors in immigration custody. Apart from concerns raised by prolonged detention, there has been criticism over the lack of regulations governing the conditions of confinement. Additionally, for aliens detained by criminal law enforcement authorities, DHS's authority to take custody of such aliens for immigration enforcement purposes through \"immigration detainers\" has been subject to legal challenge. The following sections provide more discussion of these developing issues. In Zadvydas v. Davis , discussed above, the Supreme Court in 2001 ruled that the indefinite detention of aliens after the completion of removal proceedings raised \"a serious constitutional problem,\" at least for those who were lawfully admitted, and thus construed INA Section 241(a)(6)'s post-order of removal detention provision as containing an implicit six-month time limitation. In 2003, the Court in Demore v. Kim held that the mandatory detention of aliens pending removal proceedings under INA Section 236(c) was \"constitutionally permissible,\" but did not decide whether there were any constitutional limits to the duration of such detention. Later, though, some lower courts ruled that the prolonged detention of aliens pending removal proceedings raised similar constitutional issues as those raised after a final order, and, citing Zadvydas , construed INA Section 236(c) as containing an implicit temporal limitation. In 2018, the Supreme Court held in Jennings v. Rodriguez that the government has the statutory authority to indefinitely detain aliens pending their removal proceedings, but left the constitutional questions unresolved. The Jennings case involved a class action by aliens within the Central District of California who had been detained under INA Sections 235(b), 236(c), and 236(a), in many cases for more than a year. The plaintiffs claimed that their prolonged detention without a bond hearing violated their due process rights. In 2015, the Ninth Circuit upheld a permanent injunction requiring DHS to provide aliens detained longer than six months under INA Sections 235(b), 236(c), and 236(a) with individualized bond hearings. The court expressed concern that the detention statutes, if construed to permit the indefinite detention of aliens pending removal proceedings, would raise \"constitutional concerns\" given the reasoning of the Supreme Court in Zadvydas . Although the Supreme Court in Demore had upheld DHS's authority to detain aliens without bond pending removal proceedings, the Ninth Circuit construed Demore's holding as limited to the constitutionality of \"brief periods\" of detention, rather than cases when the alien's detention lasts for extended periods. Recognizing the constitutional limits placed on the federal government's authority to detain individuals, the Ninth Circuit, as a matter of constitutional avoidance, ruled that the INA's detention statutes should be construed as containing implicit time limitations. The court therefore interpreted the mandatory detention provisions of INA Sections 235(b) and 236(c) to expire after six months' detention, after which the government's detention authority shifts to INA Section 236(a) and the alien must be given a bond hearing. The court also construed INA Section 236(a) as requiring bond hearings every six months. In addition, the court held that continued detention after an initial six-month period was permitted only if DHS proved by clear and convincing evidence that further detention was warranted. In Jennings , the Supreme Court rejected as \"implausible\" the Ninth Circuit's construction of the challenged detention statutes. The Court determined that the Ninth Circuit could not rely on the constitutional avoidance doctrine to justify its interpretation of the statutes. The Court distinguished Zadvydas , which the Ninth Circuit had relied on when invoking the constitutional avoidance doctrine, because the post-order of removal detention statute at issue in that case did not clearly provide that an alien's detention after the 90-day removal period was required. According to the Jennings Court, the statute at issue in Zadvydas was sufficiently open to differing interpretations that reliance on the constitutional avoidance doctrine was permissible. But the Jennings Court differentiated the ambiguity of that detention statute from INA Sections 235(b) and 236(c), which the Court held were textually clear in generally requiring the detention of covered aliens until the completion of removal proceedings. And the Court also observed that nothing in INA Section 236(a) required bond hearings after an alien was detained under that authority, or required the government to prove that the alien's continued detention was warranted after an initial six-month period. According to the Court, the Ninth Circuit could not construe the statutes to require bond hearings simply to avoid ruling on whether they passed constitutional muster. Having rejected the Ninth Circuit's interpretation of INA Sections 235(b), 236(a), and 236(c) as erroneous, the Court remanded the case to the lower court to address, in the first instance, the plaintiffs' constitutional claim that their indefinite detention under these provisions violated their due process rights. In short, the Jennings Court held that the government has the statutory authority to detain aliens potentially indefinitely pending their removal proceedings, but did not decide whether such indefinite detention is unc onstitutional . While the Supreme Court has not yet addressed the constitutionality of indefinite detention during removal proceedings, the Court had indicated in Demore v. Kim that aliens may be \"detained for the brief period necessary for their removal proceedings.\" And in a concurring opinion in Demore , Justice Kennedy declared that a detained alien \"could be entitled to an individualized determination as to his risk of flight and dangerousness if the continued detention became unreasonable or unjustified.\" After the Jennings decision, some lower courts have concluded that the detention of aliens during removal proceedings without a bond hearing violates due process if the detention is unreasonably prolonged. Some courts have applied these constitutional limitations to the detention of aliens arriving in the United States who are placed in removal proceedings, reasoning that, although such aliens typically have lesser constitutional protections than aliens within the United States, they have sufficient due process rights to challenge their prolonged detention. In reaching this conclusion, some courts have addressed the Supreme Court's 1953 decision in Shaughnessy v. United States ex rel. Mezei , which upheld the detention without bond of an alien seeking entry into the United States. These courts determined that Mezei is distinguishable because, in that case, the alien had already been ordered excluded when he challenged his detention, and the alien potentially posed a danger to national security that warranted his confinement. In addition, while the Jennings Court held that INA Section 236(a) does not mandate that a clear and convincing evidence burden be placed on the government in bond hearings, some courts have concluded that the Constitution requires placing the burden of proof on the government in those proceedings. At some point, whether in the Jennings litigation or another case, the Supreme Court may decide whether the indefinite detention of aliens pending removal proceedings is constitutionally permissible. In doing so, the Court may also reassess the scope of constitutional protections for arriving aliens seeking initial entry into the United States. The Court may also decide whether due process compels the government to prove that an alien's continued detention is justified at a bond hearing. The Court's resolution of these questions may clarify its view on the federal government's detention authority. As discussed, DHS has broad authority to detain aliens pending their removal proceedings, and in some cases detention is mandatory except in certain limited circumstances. But a 1997 court settlement agreement (the \" Flores Settlement\") currently limits the period in which an alien minor (i.e., under the age of 18) may be detained by DHS. Furthermore, under federal statute, an unaccompanied alien child (UAC) who is subject to removal is generally placed in the custody of the Department of Health and Human Services' Office of Refugee Resettlement (ORR), rather than DHS, pending his or her removal proceedings. In 2019, DHS promulgated a final rule that purports to incorporate these limitations with some modifications. The Flores Settlement originates from a 1985 class action lawsuit brought by a group of UACs apprehended at or near the border, who challenged the conditions of their detention and release. The parties later settled the plaintiffs' claims regarding the conditions of their detention, but the plaintiffs maintained a challenge to the INS's policy of allowing their release only to a parent, legal guardian, or adult relative. In 1993, following several lower court decisions, the Supreme Court in Reno v. Flores upheld the INS's release rule, reasoning that the plaintiffs had no constitutional right to be released to any available adult who could take legal custody, and that the INS's policy sufficiently advanced the government's interest in protecting the child's welfare. Ultimately, in 1997, the parties reached a settlement agreement that created a \"general policy favoring release\" of alien minors in INS custody. Under the Flores S ettlement, the government generally must transfer within five days a detained minor to the custody of a qualifying adult or a nonsecure state-licensed facility that provides residential, group, or foster care services for dependent children. But the alien's transfer may be delayed \"in the event of an emergency or influx of minors into the United States,\" in which case the transfer must occur \"as expeditiously as possible.\" In 2001, the parties stipulated that the Flores Settlement would terminate \"45 days following [the INS's] publication of final regulations implementing this Agreement.\" In 2008, Congress enacted the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (TVPRA), which \"partially codified the Flores Settlement by creating statutory standards for the treatment of unaccompanied minors.\" Under the TVPRA, a UAC must be placed in ORR's custody pending formal removal proceedings, and typically must be transferred to ORR within 72 hours after DHS determines that the child is a UAC. Following transfer to ORR, the agency generally must place the UAC \"in the least restrictive setting that is in the best interest of the child,\" and may place the child with a sponsoring individual or entity who \"is capable of providing for the child's physical and mental well-being.\" In 2015, the Flores plaintiffs moved to enforce the Flores Settlement, arguing that DHS (which had replaced the former INS in 2003) violated the settlement by adopting a no-release policy for Central American families and confining minors in secure, unlicensed family detention facilities. In response, the government argued that the Flores Settlement did not apply to accompanied minors. In an order granting the plaintiffs' motion, the federal district court ruled that the Flores Settlement applied to both accompanied and unaccompanied minors, and that accompanying parents generally had to be released with their children. In a later order, the court determined that, upon an \"influx of minors into the United States,\" DHS may \"reasonably exceed\" the general five-day limitation on detention, and suggested that 20 days may be reasonable in some circumstances. In 2016, the Ninth Circuit upheld the district court's ruling that the Flores Settlement applies to both accompanied and unaccompanied minors, but held that the settlement does not require DHS to release parents along with their children. In any event, the effect of the Flores Settlement has been that DHS typically will release family units in their entirety pending removal proceedings, apparently because of the risks and difficulties that releasing the children only (while keeping the parents in detention) would pose, and the absence of a state licensing scheme for family detention facilities. Moreover, a federal district court has ruled that a \"government practice of family separation without a determination that the parent was unfit or presented a danger to the child\" likely violates due process. On August 23, 2019, DHS published a final rule that it claims \"parallel[s] the relevant and substantive terms of the Flores Settlement\" with some important modifications. Among other things, the rule c reates an alternative federal licensing scheme for DHS family detention facilities (which are not eligible for state licensing) that would enable DHS to detain minors together with their accompanying parents throughout the removal proceedings. This modification arguably conflicts with the Flores Settlement's \" general policy favoring release\" of alien minors from government custody. Yet DHS argues that the modification is compelled by changed circumstances, including the increased number of family unit apprehensions since 1997, and that detaining families together pending their removal proceedings \"will enable DHS to maintain family unity \" while enforcing federal immigration laws . Under the terms of the 2001 stipulation, the Flores Settlement will terminate 45 days after the government publishes final regulation s \"implementing the A greement. \" The key question in the Flores litigation likely will be whether the final rule \" implement [s] the Agreement\" within the meaning of the settlement's termination provision. If the court overseeing the Flores Settlement concludes that the rule meets that criteria, the DHS rule will effectively supersede the Flores Settlement. That said, w hile the final rule modifies the Flores Settlement to some degree, it largely incorporates the terms of that agreement . Thus, if the rule is upheld, DHS's detention authority over alien minors would remain subject to some constraints . Although the INA describes when an alien subject to removal may be detained and released from custody, neither the INA nor its implementing regulations currently provide any specific standards for the conditions of confinement. ICE, however, has developed \"Performance-Based National Detention Standards\" (PBNDS) governing the treatment of detained aliens. These standards apply to all ICE detention facilities, contract detention facilities, and state or local government facilities used by ICE through intergovernmental service agreements. The PBNDS require, among other things, clean and safe facilities; adequate food services; access to medical care; adequate bedding and personal hygiene; reasonable disability accommodations; communication and language assistance; access to telephone and mail; visitation rights; access to recreational programs; religious accommodations; work opportunities; and access to legal materials. In addition, CBP, the DHS component with primary responsibility for immigration enforcement along the border, has created similar standards governing the detention of aliens in CBP custody (e.g., arriving aliens in expedited removal proceedings). While the Supreme Court has generally addressed challenges to the duration of immigration detention, the Court has not addressed challenges to the conditions of immigration confinement. Lower courts, however, have considered detained aliens' constitutional challenges to the conditions of their confinement, generally under the standard applicable to pretrial detention in criminal cases. Under that standard, a detainee's conditions of confinement violate his or her right to due process if they amount to \"punishment.\" To meet that threshold, a detainee must show that prison officials intended to punish him or her, or that the conditions of detention are not reasonably related to a legitimate governmental objective. More specifically, in cases involving claims of inadequate medical treatment, courts have typically analyzed such claims under the \"deliberate indifference\" standard. This standard looks to whether the detaining authority \"knows of and disregards an excessive risk to inmate health or safety.\" In addition, even though aliens seeking initial entry into the United States typically have lesser constitutional protections than aliens within the United States, some courts have held that aliens detained at the border have substantive due process protections, such as the right to be free from \"inhumane treatment\" or \"gross physical abuse.\" These cases suggest that aliens detained at the border may sometimes challenge the conditions of their confinement. In the past, some courts have rejected constitutional challenges to the conditions of immigration detention (or, in some cases, conditions of release), concluding that, while the alleged conditions may have been unpleasant or restrictive, they did not amount to a due process violation. As the Supreme Court once stated in a case about pretrial detention, \"[l] oss of freedom of choice and privacy are inherent incidents of confinement in such a facility. And the fact that such detention interferes with the detainee's understandable desire to live as comfortably as possible and with as little restraint as possible during confinement does not convert the conditions or restrictions of detention into 'punishment.'\" Other courts, however, have ruled unconstitutional conditions of immigration confinement that are particularly unreasonable, such as the deprivation of medical care and other basic necessities. As for minors, the Flores Settlement provides that those apprehended by DHS may be detained only in a \"safe and sanitary\" facility. The Flores Settlement also requires that state-licensed facilities comply with applicable state child welfare laws and building codes, and provide various services including routine medical care and education. In a few instances, the federal district court overseeing the Flores litigation has ruled that DHS violated the Flores Settlement by exposing minors to substandard conditions. Additionally, Congress, through appropriations legislation, has imposed certain requirements on the conditions of detention. For example, Congress has directed CBP and ICE to report their compliance with applicable detention facility standards (such as the PBNDS), and to provide certain other detention-related information, including the average length of detention and any instances in which an individual has died while in DHS custody. Thus, while federal statutes or regulations generally do not specify the standards for immigration detention, there are some important legal constraints on the treatment of detained aliens. Generally, upon issuing an administrative warrant, ICE may arrest and detain an alien pending a determination about whether the alien should be removed from the United States. But if an alien is in criminal custody by state or local law enforcement officers (LEOs) (e.g., if an alien is arrested by local police), ICE may take custody of the alien through the use of an \"immigration detainer.\" An immigration detainer is a document by which ICE advises the LEOs of its interest in individual aliens whom the LEOs are detaining, and requests the LEOs to take certain actions that could facilitate removal (e.g., holding the alien temporarily, notifying ICE before releasing the alien). ICE's predecessor agency, the INS, had long issued detainers for potentially removable aliens in criminal custody. Eventually, in 1986, Congress enacted the Anti-Drug Abuse Act, which, among other things, explicitly authorized the use of detainers for deportable aliens who were arrested for violating controlled substance laws. Citing this authority, as well as its general immigration enforcement powers under the INA, the INS promulgated two separate regulations on detainers, one governing aliens arrested for controlled substance offenses, and another governing aliens arrested for other criminal offenses. In 1997, the INS merged both regulations into one, and that regulation is currently codified at 8 C.F.R. Â§ 287.7. The detainer regulation, as amended, provides the following: Any authorized immigration officer may at any time issue a Form I-247, Immigration Detainer-Notice of Action, to any other Federal, State, or local law enforcement agency. A detainer serves to advise another law enforcement agency that the Department seeks custody of an alien presently in the custody of that agency, for the purpose of arresting and removing the alien. The detainer is a request that such agency advise the Department, prior to release of the alien, in order for the Department to arrange to assume custody, in situations when gaining immediate physical custody is either impracticable or impossible. The regulation further instructs that, upon issuance of a detainer, the LEO \"shall maintain custody of the alien for a period not to exceed 48 hours\" beyond the time when the alien would have otherwise been released (excluding Saturdays, Sundays, and holidays) to facilitate transfer of custody to ICE. Although the detainer regulation instructs that LEOs \"shall maintain custody\" of an alien, reviewing courts have construed the regulation as being permissive rather than mandatory. For example, the Third Circuit has reasoned that the regulation calls a detainer a \"request,\" that INA Section 287(d) does not require state or local LEOs to detain aliens subject to removal, and that DHS's (and the former INS's) policy statements have construed detainers as being \"requests rather than mandatory orders.\" And the Third Circuit has also ruled that construing immigration detainers as mandatory would run afoul of the \"anti-commandeering\" principles of the Tenth Amendment, which prohibits the federal government from compelling state and local officials to enforce a federal regulatory scheme. As a result of judicial construction of the detainer regulation, LEOs may (but need not) notify ICE about an alien's release date and hold the alien pending transfer to ICE. Given the permissive nature of detainers, some state and local jurisdictions have restricted compliance with detainers except in limited circumstances (e.g., the alien has been convicted of or charged with a serious crime). Despite these restrictions, ICE generally issues detainers \"[r]egardless of whether a federal, state, local, or tribal [LEO] regularly cooperates\" with the detainer request. While DHS regulations authorize immigration detainers for removable aliens in criminal custody, courts have addressed legal challenges to the continued detention of aliens who would have otherwise been released from criminal custody (e.g., on bail, upon completion of sentence), but who remain detained pending their transfer to ICE. For example, in the past, ICE issued detainers so long as there was \"reason to believe\" the alien was subject to removal. But some courts have invalidated, on statutory or constitutional grounds, the use of detainers that are based only on ICE's representations about an alien's removability or the initiation of an investigation into the alien's immigration status. In Moreno v. Napolitano , a federal district court ruled that ICE's issuance of a detainer without an administrative arrest warrant exceeded its statutory authority under the INA absent a determination that the alien was likely to escape before a warrant could be obtained. In Morales v. Chadbourne , which involved the detention of a naturalized U.S. citizen, the First Circuit held that a detainer constitutes a new arrest under the Fourth Amendment, and must be supported by probable cause of the alien's removability. And in Orellana v. Nobles County , a federal district court held that a detainer claiming a \"reason to believe\" that an alien is subject to removal \"does not provide a constitutionally sufficient basis\" to detain an alien absent a \"particularized assessment\" of the alien's likelihood of escaping. In response to these court rulings, ICE in 2017 created new immigration detainer guidelines. Among other things, ICE officers \"must establish probable cause to believe that the subject is an alien who is removable from the United States before issuing a detainer.\" And the detainer must come with either an administrative arrest warrant or a warrant of removal (if the alien has been ordered removed) signed by an authorized ICE officer. Despite ICE's revised detainer policy, some courts have held that, under the Fourth Amendment, immigration detainers supported by probable cause that an alien is removable still do not justify the alien's continued detention by state or local LEOs unless there is probable cause that the alien has committed a criminal offense giving those LEOs a basis to detain the alien for criminal prosecution. These rulings are largely informed by the Supreme Court's 2012 decision in Arizona v. United States , which held that a state statute authorizing police officers unilaterally to arrest an alien suspected of being removable was preempted by federal law, which exclusively gave the authority to enforce civil immigration laws to federal immigration officers. So these courts reason, because state and local LEOs generally lack the authority to enforce civil immigration laws, they may not hold an alien under an immigration detainer unless there is an independent basisâsuch as probable cause of a crimeâto justify the continued detention. In City of El Cenizo v. Texas , however, the Fifth Circuit held that state and local LEOs do not need probable cause of a crime to hold an alien pursuant to an immigration detainer. The court reasoned that many state laws permit seizures without probable cause of a crime, such as those relating to mentally ill individuals, and that \"civil removal proceedings necessarily contemplate detention absent proof of criminality.\" The circuit court also distinguished Arizona because that case \"involved unilateral status-determinations [by the state] absent federal direction ,\" while a detainer \"always requires a predicate federal request before local officers may detain aliens for the additional 48 hours.\" Courts are thus divided over whether immigration detainers are permissible under the Fourth Amendment. Some courts have held that a detainer need be supported only by probable cause of an alien's removability to avoid constitutional violations, while other courts require probable cause of criminal activity before an alien may be held pending transfer to ICE. Given that ICE considers detainers to be integral to its efforts to arrest and remove aliens convicted of specified crimes, the split in court opinion on the circumstances when detainers may be honored could have significant consequences for ICE's enforcement policies in different jurisdictions. DHS generally has substantial authority to detain aliens who are subject to removal. But the governing laws on detention may differ depending on the circumstances, including (1) whether the alien is seeking initial admission into the United States or had been lawfully admitted into the country; (2) the type of removal proceedings in which the alien is placed; (3) whether the alien has committed specified criminal or terrorist-related activity; (4) whether the alien is a UAC or falls within some other category subject to special rules for detention; and (5) whether the alien is being held for formal removal proceedings or has been ordered removed and is awaiting effectuation of the removal order. Typically, DHS may detain aliens who are placed in formal removal proceedings, but may release the alien on bond, on his or her own recognizance, or under an order of supervision pending the outcome of those proceedings. In some cases, such as those involving aliens who have committed specified crimes, or aliens arriving in the United States who are placed in expedited removal proceedings, detention is mandatory and the alien may not be released from custody except in limited circumstances. Furthermore, DHS generally must detain aliens who have received final orders of removal for up to 90 days while their removal is effectuated, and the agency retains the discretion to detain certain classes of aliens after that 90-day period has lapsed. However, there are some constraints on DHS's detention power. The Supreme Court has determined that the indefinite detention of aliens after formal removal proceedings would raise \"serious constitutional concerns,\" at least for those who were lawfully admitted into the United States and became subject to removal. And while the Court has recognized that governing statutes confer broad authority to DHS to detain aliens without bond pending their removal proceedings, some lower courts have held that due process requires the government to provide detained aliens with bond hearings after prolonged periods of detention and to prove that any continued detention is justified. Furthermore, DHS's ability to detain family units pending their proceedings remains constrained by the Flores Settlement, which limits the length of detention of alien minors. In addition, while detention litigation has largely centered on the duration of detention, detained aliens have also sometimes brought challenges to the conditions of their confinement. And more recently, some courts have imposed restrictions on DHS's ability to take custody of aliens in state or local law enforcement custody through immigration detainers. As courts continue to grapple over the scope of DHS's detention power, Congress may consider legislative proposals that would either limit or expand that authority. For instance, some recent bills would end mandatory detention entirely, afford all aliens the opportunity to be released on bond pending removal proceedings, and require DHS to prove that any continued detention is warranted. Certain bills would also require DHS to promulgate regulations for detention facilities; require the periodic inspection of those facilities; or impose standards governing the conditions of detention, such as requiring medical screenings and access to food, water, shelter, and hygiene. As for custody determinations, some bills would require DHS to consider ATD programs instead of bond or conditional parole, and require placing some aliens in such programs (e.g., asylum applicants). Other bills would generally require the release of aliens considered \"vulnerable,\" such as those who are detained with children, and limit the amount of any bond. In addition, some bills would create time limitations for an IJ to conduct bond hearings, and require periodic bond hearings while an alien remains in custody. Conversely, some bills would specify that an alien may be detained for an indefinite period pending removal proceedings, and require the alien to prove by clear and convincing evidence that he or she is not a flight or escape risk in order to be released. Some bills would also expand the classes of aliens subject to mandatory detention to include aliens present in the United States without inspection, criminal gang members, and aliens arrested for (but not yet convicted of) specified crimes. Other bills would override the Flores Settlement effectively to extend INA Section 235(b)(1)'s mandatory detention scheme governing applicants for admission to family units. Finally, some bills would clarify DHS's detainer authority to provide that ICE may issue detainers so long as there is probable cause that an alien is removable. In short, as reviewing courts continue to test the outer limits to DHS's detention authority, Congress may consider additional legislative options that inform the scope of that authority. The following tables provide (1) an overview of the development of U.S. immigration detention laws, and (2) a comparison of the various detention regimes under current law.", "summary": "The Immigration and Nationality Act (INA) authorizesâand in some cases requiresâthe Department of Homeland Security (DHS) to detain non-U.S. nationals (aliens) arrested for immigration violations that render them removable from the United States. An alien may be subject to detention pending an administrative determination as to whether the alien should be removed, and, if subject to a final order of removal, pending efforts to secure the alien's removal from the United States. The immigration detention scheme is multifaceted, with different rules that turn on several factors, such as whether the alien is seeking admission into the United States or has been lawfully admitted into the country; whether the alien has engaged in certain proscribed conduct; and whether the alien has been issued a final order of removal. In many instances DHS maintains discretion to release an alien from custody. But in some instances, such as when an alien has committed specified crimes, the governing statutes have been understood to allow release from detention only in limited circumstances. The immigration detention scheme is mainly governed by four INA provisions that specify when an alien may be detained: 1. INA Section 236(a) generally authorizes the detention of aliens pending removal proceedings and permits aliens who are not subject to mandatory detention to be released on bond or on their own recognizance; 2. INA Section 236(c) generally requires the detention of aliens who are removable because of specified criminal activity or terrorist-related grounds after release from criminal incarceration; 3. INA Section 235(b) generally requires the detention of applicants for admission, such as aliens arriving at a designated port of entry as well as certain other aliens who have not been admitted or paroled into the United States, who appear subject to removal; and 4. INA Section 241 (a) generally requires the detention of aliens during a 90-day period after the completion of removal proceedings and permits (but does not require) the detention of certain aliens after that period. These provisions confer substantial authority upon DHS to detain removable aliens, but that authority has been subject to legal challenge, particularly in cases involving the prolonged detention of aliens without bond. DHS's detention authority is not unfettered, and due process considerations may inform the duration and conditions of aliens' detention. In 2001, the Supreme Court in Zadvydas v. Davis construed the statute governing the detention of aliens following an order of removal as having implicit, temporal limitations. The Court reasoned that construing the statute to permit the indefinite detention of lawfully admitted aliens after their removal proceedings would raise \"serious constitutional concerns.\" In 2003, however, the Court in Demore v. Kim ruled that the mandatory detention of certain aliens pending their removal proceedings, at least for relatively brief periods, was constitutionally permissible. The interplay between the Zadvydas and Demore rulings has called into question whether the constitutional standards for detention prior to a final order of removal differ from those governing detention after a final order is issued. Several lower courts have interpreted Demore to mean that mandatory detention pending removal proceedings is not per se unconstitutional, but that Zadvydas cautions that if this detention becomes \"prolonged\" it may not comport with due process requirements. Additionally, some lower courts have recognized constraints on DHS's detention power that the Supreme Court has not yet considered. For instance, some courts have ruled that the Due Process Clause requires aliens in removal proceedings to have bond hearings when detention becomes prolonged, where the government bears the burden of proving that the alien's continued detention is justified. In addition, a settlement agreement known as the \" Flores Settlement,\" which is enforced by a federal district court, currently limits DHS's ability to detain alien minors who are subject to removal. Further, while litigation concerning immigration detention has largely centered on the duration of detention, some courts have considered challenges to the conditions of immigration confinement, generally under the standards applicable to pretrial detention in criminal cases. Some courts have also restricted DHS's ability to take custody of aliens detained by state or local law enforcement officials upon issuance of \"immigration detainers.\" In short, while DHS generally has broad authority over the detention of aliens, that authority is not without limitation. As courts continue to grapple with legal and constitutional challenges to immigration detention, Congress may consider legislative options that clarify the scope of the federal government's detention authority.", "document_type": "crs"}
{"report": "Federal rulemaking is one of the crucial methods through which public policy is established and implemented in the United States. Under the constitutional separation of powers system, Congress enacts statutes th at often delegate rulemaking authority to federal agencies. Using that delegated authority, agencies issue regulations to implement those statutes and set the details of public policy. To structure the ways in which agencies issue regulations pursuant to their delegated authority, Congress has created a statutory scheme of procedural controls. The most significant of these controls is the Administrative Procedure Act (APA) of 1946, which generally requires agencies to issue a proposed rule and take public comment prior to issuing a final rule. Congress designed these basic stepsâwhich create the backbone of the federal rulemaking processâto allow for public input into federal agencies' policymaking decisions. As one scholar noted, \"One of the APA's objectives was to open rulemaking to public participation, especially by those whose interests might be adversely affected by an agency's actions. Congress viewed hearing from such parties as a normal part of the legislative process, and therefore applicable to rulemaking.\" The APA's notice and comment requirements are possibly the best known and most significant mechanism allowing for public input into the rulemaking process. A lesser known procedural control that Congress created in the APA is a petition mechanism through which any interested party can request an agency to issue, amend, or repeal a rule. An agency is not necessarily required to grant the petition or take the requested action, but the APA does require the agency to respond and to do so in a \"reasonable time.\" Thus, the APA petition mechanism is a potentially efficient (and arguably underused) means for an individual or stakeholder to call on an agency to take a particular action. This report briefly discusses the origin of the APA petition mechanism, outlines the mechanism's requirements for agencies, provides information from various outside sources about what may make an effective petition, discusses potential benefits to agencies and the public, and, finally, identifies some examples of statutory petition mechanisms that Congress created in addition to the APA's. The APA's petition mechanism essentially re-stated the right to petition the government established by the U.S. Constitution, which can be traced as far back as the Magna Carta and Declaration of Independence. The principles on which the APA's petition mechanism are based are generally traced by scholars to the Magna Carta and, in the American context, to the Declaration of Independence. Though it was centuries old by the time of the American Revolution, the Magna Carta was a heavy influence on the colonists who declared their independence from Britain in the 1770s. The Declaration of Independence, which relied on many of the stated rights and liberties granted under the Magna Carta, referenced the failure of the British government to respond to petitions by stating the following immediately after its list of grievances: \"In every stage of these Oppressions We have Petitioned for Redress in the most humble terms: Our repeated Petitions have been answered only by repeated injury.\" Thus, the implication was that the colonists had an inherent right to petition the king, as well as a right to a response. Likely as a direct consequence of this perceived slight by the British government, the founders explicitly stated in the First Amendment of the U.S. Constitution that the people had a right to petition the government. Specifically, the First Amendment states that \"Congress shall make no law â¦ abridging â¦ the right of the people â¦ to petition the Government for a redress of grievances.\" Although the First Amendment establishes a right to petition the government, it goes no further in detailing whether or how the government shall respond. The lineage of this constitutional provision can be traced forward into the 20 th century and directly to the APA itself. The APA's petition mechanism, which allows interested persons to petition the government to take a rulemaking action, could easily be considered a more modern application of the constitutional right to petition. One scholar described the APA as \"the bill of rights for the new regulatory state\" that \"defined the relationship between government and governed.\" The petition mechanism appears to fit within that characterization. Indeed, the APA's legislative history confirms the link: \"Every agency possessing rule-making authority will be required to set up procedures for the receipt, consideration, and disposition of these petitions. The right of petition is written into the Constitution itself. This subsection confirms that right where Congress has delegated legislative powers to administrative agencies.\" Congress enacted the APA in 1946 following a large expansion of the federal government's size and authorities during the Franklin D. Roosevelt Administration's New Deal. The APA is considered by most observers to be a compromise between two groups in Congress: conservatives who were wary of the rapid growth of the administrative state and liberals who wanted to protect the ability of agencies to exercise their delegated administrative power. This balance was reflected in the foreword to the compiled legislative history of the APA, in which Senate Judiciary Committee Chairman Pat McCarran stated that although the APA \"is brief, it is a comprehensive charger of private liberty and a solemn undertaking of official fairness. It is intended as a guide to him who seeks fair play and equal rights under law, as well as to those invested with executive authority. It upholds law and yet lightens the burden of those in whom the law may impinge.\" The petition mechanism, like other elements of the APA, can be contextualized by considering this balancing act between these two main perspectives on the administrative process reforms of the 1930s and 1940s. Many conservatives in Congress who believed that the rapid expansion of the government in the New Deal had the potential to threaten individual rights saw a petition mechanism as a way to provide individuals a means through which they could address grievances directly to government agencies. Some liberals in Congress who were generally more trusting of regulatory agencies and wanted to protect recently enacted New Deal programs were willing to agree to a petition mechanism, but they were cautious about how much would be required of agencies to respond. The petition provision that was ultimately included in the final version of the APA can be seen as a compromise between these two sides and is discussed in detail below. Section 553(e) of the APA states, \"Each agency shall give an interested person the right to petition for the issuance, amendment, or repeal of a rule.\" Such petitions are sometimes referred to as 553(e) petitions, petitions for rulemaking, petitions for reconsideration, administrative petitions, or citizens' petitions. The APA's requirement for a petition mechanism applies to all agencies covered by the APA, which includes executive agencies and independent regulatory agencies. Section 553(e) states that the right to petition applies to any \"interested person.\" The Attorney General's Manual on the A dministrative P rocedure A ct , which was published in 1947 and provides the executive branch's interpretation of the APA, states that the right to petition \"must be accorded to any 'interested person'\" and that \"it will be proper for an agency to limit this right to persons whose interests are or will be affected by the issuance, amendment or repeal of a rule.\" The scope of agency actions that are covered by the right to petition is wide-ranging. The APA's definition of rule is broad and covers a variety of agency actions, including several types of actions that are not subject to the APA's notice-and-comment rulemaking procedures. Such actions include agency interpretive rules and policy statementsâcategories that are often colloquially referred to as \"guidance documents\"âand rules of agency organization, procedure, and practice. Thus, the petition mechanism could potentially be used for more than just rules that have undergone, or would be required to undergo, the APA's notice-and-comment procedures. If an agency grants a petition requesting that it issue, amend, or repeal a rule, any relevant procedural requirements for rulemaking or other type of action would still apply. The Attorney General's Manual states, \"If the agency is inclined to grant the petition, the nature of the proposed rule would determine whether public rule making proceedings under section 4(a) and (b) are required.\" In other words, a rulemaking action is not subject to, or exempt from, any procedural requirements as a result of the action having been taken pursuant to a petition under the APAâit does not provide an alternative means for an agency to take an action without going through otherwise-required procedures. Rather, the granting of the petition merely serves as a starting point for the agency to take an action. If the nature of the action requires notice-and-comment rulemaking, for example, the agency must still engage in those procedures. In any action an agency chooses to take pursuant to a petition, the agency may act only within the delegated authority that Congress has provided to it in statute. A petition can serve only as a procedural mechanism that could cause or encourage an agency to take action under its established authority. Although Section 553(e) is only one sentence in length and provides very little detail, other sections of the APA contain some additional requirements for agencies with regard to receiving, considering, and responding to matters presented to them, including rulemaking petitions. Those requirements are discussed below. Notably, however, agencies have a great deal of discretion in determining the specifics of their procedures for receiving, considering, and responding to petitions. Whereas the constitutional right to petition under the First Amendment does not require the government to consider or respond to a petitionâas described by one scholar, \"it is little more than the right to make a clamor\" âthe legislative history of the APA's petition mechanism stated that Congress did not intend for agencies to consider petitions \"in a merely pro forma manner.\" Furthermore, the legislative history states that \"where such petitions are made, the agency must fully and promptly consider them.\" Thus, the APA's legislative history suggests that agencies are minimally required to consider rulemaking petitions and arguably to do so in a timely manner. The text of the APA itself provides little information, however, on how agencies are to consider petitions, thus leaving quite a bit of discretion regarding the process and elements of agencies' consideration of petitions. The Attorney General's Manual states that agencies should establish, and publish â¦ procedural rules governing the receipt, consideration and disposition of petitions filed pursuant to section 4(d) [of the APA]. These procedural rules may call, for example, for a statement of the rulemaking action which the petitioner seeks, together with any data available in support of his petition, a declaration of the petitioner's interest in the proposed action, and compliance with reasonable formal requirements. Several agencies have established such requirements for the submission of petitions. For example, the Food and Drug Administration (FDA) has issued regulations requiring certain petitioners to submit four copies of a petition, sign the petition, and include information referenced in the petition as applicable, among other things. Under those same regulations, the FDA commissioner must follow certain procedures and consider specified criteria when making a decision on whether to grant a petition, such as whether the petition is in the public interest and is being pursued in good faith. On the contrary, some agencies have not established additional requirements for petitioners and merely have the minimal requirements of the APA as a basis for their petition process. For example, the Securities and Exchange Commission provides an address for petitions and asks petitioners to \"set forth the text of any proposed rule or amendment\" or \"specify the rule the repeal of which is sought\" but requires little else of petitioners explicitly in its regulations. In some cases, agencies publish a notice in the Federal Register acknowledging receipt of a petition and asking for public comment as part of its consideration process. For example, in June 2017, the Department of Transportation's Federal Motor Carrier Safety Administration (FMCSA) issued a notice stating, \"In response to petitions for reconsideration of the final rule on lease and interchange of passenger-carrying commercial motor vehicles (CMVs) published on May 27, 2015, and effective on July 27, 2015, FMCSA intends to revise the regulations to address 'chartering' (subcontracting) and the 48-hour delay in preparing a lease. FMCSA is requesting public comment on the proposed responses to the petitions discussed below.\" This public input would not substitute for the notice-and-comment rulemaking requirements of the APA if the agency decides to grant a petition, but it could assist the agency in gauging public interest and could provide information to assist the agency in its decision. In 2014, the Administrative Conference of the United States (ACUS) reported that \"few agencies have in place official procedures for accepting, processing, and responding to petitions for rulemaking\" and that \"how petitions are received and treated varies acrossâand even withinâagencies.\" ACUS issued several recommendations related to petitions for rulemaking, including some that addressed the consideration of petitions. The recommendations stated that, for example, \"Each agency that has rulemaking authority should have procedures, embodied in a written and publicly available policy statement or procedural rule, explaining how the agency receives, processes, and responds to petitions\" and that \"the procedures should indicate how the agency will coordinate the consideration of petitions with other processes and activities used to determine agency priorities, such as the Unified Agenda and retrospective review of existing rules.\" ACUS also recommended that \"the procedures should explain what type of data, argumentation, and other information make a petition more useful and easier for the agency to evaluate.\" Such information could be of assistance to petitioners as they are preparing to petition agencies. The APA requires that agencies respond to petitions in a timely manner. Specifically, Section 555(b) states that \"with due regard for the convenience and necessity of the parties or their representatives and within a reasonable time, each agency shall proceed to conclude a matter presented to it.\" This provision has generally been interpreted to apply to a number of potential matters brought to an agency, including petitions for rulemaking: \"Citing various combinations of Â§Â§ 553(e), 555(b), and 555(e), courts have repeatedly found that agencies must at least 'respond' to petitions for rulemaking.\" Furthermore, the APA appears to require that if the response to a petition is a denial, the agency must provide a reason for the denial. Section 555(e) states that \"prompt notice shall be given of the denial in whole or in part of a written application, petition, or other request of an interested person made in connection with any agency proceeding. Except in affirming a prior denial or when the denial is self-explanatory, the notice shall be accompanied by a brief statement of the grounds for denial.\" Although these provisions appear to establish a requirement for the agency to provide a timely response and a reason for denial, the APA does not further explicate what a response might or should entail. Presumably, if an agency grants a petition, the agency would conduct any procedural requirements that may apply (such as if the petition requested the agency to issue a rule subject to the APA's notice-and-comment requirements). Simply receiving a petition, however, does not require the agency to grant a petitioner's request. The legislative history of the APA states that agencies have several options in responding to petitions, including denial: \"The agency may either grant the petition, undertake public rulemaking proceedings as provided by subsections (a) and (b) of this section, or deny the petition.\" The Attorney General's Manual appears to express a similar view: \"the mere filing of a petition does not require the agency to grant it or to hold a hearing or to engage in any other public rule making proceedings.\" Thus, it appears that the agency is not necessarily obligated to grant any petition, but it must meet the minimum requirements of receiving the petition and responding to it in a timely manner. The ACUS recommendations mentioned above also addressed agencies' responses to petitions, stating that agencies \"should provide a reasoned explanation beyond a brief statement of the grounds for denial\" and \"should not reflexively cite only resource constraints or competing priorities.\" Furthermore, ACUS recommended that agencies should adopt in their procedures \"an expectation that it will respond to all petitions for rulemaking within a stated period (e.g., within 6, 12, or 18 months of submission),\" \"[e]stablish and make publicly available an individual target timeline for responding to that petition,\" and \"provide the petitioner and the public with a brief explanation for the delay, along with a reasonable new target timeline,\" if the target cannot be met. An agency's denial of a petition may also be subject to judicial review. Section 706(2) of the APA states that courts can review and set aside final agency actions that are \"arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law.\" Section 555's requirement for the agency to give notice of the denial of a petition and to generally accompany the denial with a \"brief statement of the grounds for denial\" has, at times, been interpreted in combination with Section 706(2) of the APA to require the agency to issue a rational (but potentially brief) explanation for a denial of a petition. In some instances, courts have found agencies' denials of petitions to be in violation of the APA. Frequently when this has occurred, courts have remanded the denial to the agency to reconsider the petition. Rulemaking petitions have several potential benefits, such as that they can provide additional, low-cost opportunities for public participation in federal rulemaking. The subsections below identify and discuss several potential benefits of rulemaking petitions. However, as discussed in the last subsection below, responding to rulemaking petitions could potentially require agencies to allocate resources they would otherwise use elsewhere. The primary benefit is arguably the opportunity for stakeholders and interested persons to engage directly in a significant type of federal policymaking. Federal rulemaking is the means through which most federal statutes and programs are implemented, and public participation in that process has been an essential component since the APA was enacted in 1946. The benefits of public participation could flow in both directions: Non-agency parties have a chance to make their views known to agencies, and agencies could learn from petitioners about the impacts of their rulesâpreviously issued or not-yet-issuedâby obtaining additional information or perspectives they may not otherwise consider. One study of the use of petitions for rulemaking under the Endangered Species Act found that outside groups petitioning the Fish and Wildlife Service provided useful information for identifying species that are \"at least as deserving of protection under the Act as species identified by the agency on its own,\" further concluding that \"these public participation tools might have an important role to play in collecting dispersed or diffuse information to help better inform agency decisionmaking.\" The rulemaking petition process provides an arguably more democratic, widely available opportunity for public access by individuals and entities who may not otherwise have an opportunity to challenge agency rules through the courts by seeking judicial review. Filing a petition with a federal agency under the APA or another statutory petition mechanism is likely to be less costly financially and resource-wise than the potential cost of litigation. Petitions for rulemaking can potentially serve as a mechanism to try to force an agency to issue a rule through a court challenge: On occasion, rulemaking petitions that were denied and challenged have led to court orders for the issuance of a rule. For example, in 1999, a group of stakeholders petitioned the Environmental Protection Agency (EPA) to regulate greenhouse gas emissions from new motor vehicles under its Clean Air Act regulatory authority. EPA took comments on the petition and published notice in 2003 that it was denying the petition. After a judicial challenge to the denial of the petition, in 2007, the Supreme Court held that EPA's reasons for denial of the petition were invalid and that EPA did have the authority to regulate greenhouse gas emissions under the Clean Air Act. The Court determined that, under the Clean Air Act, EPA must make a determination on the merits of whether to regulate greenhouse gas emissions or provide a reasonable explanation why it cannot or will not make that decision. Rulemaking petitions can also encourage agencies to review or eliminate specific regulations that are outdated, ineffective, or overly burdensome. Administrations going back at least to the 1970s have required agencies to engage in retrospective regulatory review. The Trump Administration has taken that requirement a step further with its \"one-in-two-out\" regulatory requirement, which requires agencies to identify offsetting costs from at least two rules for every rule that imposes new costs. Rulemaking petitions could provide an information mechanism for agencies to comply with these requirements: Outside parties could help identify regulations or portions of regulations that are ripe for revision or elimination. Additionally, by allowing for participation in addition to the notice-and-comment requirements of the APA, agencies could potentially increase their public legitimacyâeither for a particular regulation or as a more general matter. The APA's legislative history acknowledges a potential \"public relations\" improvement for agencies that use petitions, stating that petitions \"should be a most useful instrument of both improving the public relations of administrative agencies and protecting the public by affording interested persons a legal and regulatory means of securing the issuance, change, or rescission of a rule.\" An announcement in the Federal Register that an agency is considering granting a petition could serve as a notification similar to an advance notice of proposed rulemaking (ANPRM), which is another mechanism for early public participation in the rulemaking process. Such a notice could indicate, even in highly tentative terms, the type of action being considered by the agency and invite public input. Nonetheless, considering and responding to rulemaking petitions can be time- and resource-intensive for agencies. In 2013, the Nuclear Regulatory Commission (NRC) published a proposed rule to amend its procedures for receiving and considering petitions. In the document, the agency cited an increase in the number of rulemaking petitions it had received recently, stating that this \"presented a significant resource challenge to the NRC.\" Such allocation of resources could cause delays in other activities at an agency, such as issuing other regulations. The use of resources to respond to a petition varies widely depending on the nature and content of the petition, however. The effectiveness of, and timing of response to, a petition for rulemaking likely depends on many factors, including the quality and nature of the arguments presented, the policy preferences of the agency and the Administration, any statutory requirements or constraints the agency faces, the evidence available to the agency and its ability to justify taking any particular action, and whatever preferences the agency and Administration may have for prioritization of resources at the agency. Many of these factors are outside of the control of a petitioner, but there are certain steps a petitioner might take to make a stronger case to the agency. Some outside groups have offered advice to the public for how to petition agencies more effectively. For example, the Center for Effective Government suggested that a petition for rulemaking should include information such as an explanation of the proposed action; the language the petitioner would like to propose for a new or amended rule or eliminate from a rule; information and arguments that support the petitioner's proposed action, including relevant technical and scientific data; specific facts or circumstances that support the proposed action; and relevant legal information about any specific laws or statutory provisions that is relevant to the petition and the rule in question. Individual agencies may provide guidance, or even requirements, for petitioners on their websites or in their regulations. For example, some of the suggestions provided by the Center for Effective Government above are from the Federal Aviation Administration's (FAA) regulations and guidance, which are on its website. Similarly, the NRC has regulations and detailed information on its website on how to submit petitions, as well as information tracking petitions that have been submitted to it, including visual information on the number and status of the petitions that have been submitted. As noted above, however, ACUS found in 2014 that few agencies had established official procedures for receiving, considering, and responding to petitions. As such, guidance may not necessarily be available for any particular agency's expectations or requirements. In such circumstances, general guidelines, such as those referred to above from the Center for Effective Government, may be useful. In addition to the APA petition mechanism, Congress has enacted various criteria for specific agencies' decisionmaking processes. Generally, these additional statutory mechanisms appear to build upon the 553(e) petition mechanism. A comprehensive list of all such provisions is beyond the scope of this report, but some examples include the following: The Fixing America's Surface Transportation Act required FMCSA to publish on a publicly accessible website a summary of all petitions for regulatory action submitted to FMCSA; \"prioritize the petitions submitted based on the likelihood of safety improvements resulting from the regulatory action requested;\" respond to each petition within 180 days of posting the summary; prioritize responses to petitions consistent with a petition's potential to reduce crashes, improve enforcement, and reduce unnecessary burdens; and keep an updated inventory of the petitions on its website. The Endangered Species Act states, \"To the maximum extent practicable, within 90 days after receiving the petition of an interested person under section 553(e) of title 5, to add a species to, or to remove a species from, either of the lists published under subsection (c), the Secretary [of the Interior] shall make a finding as to whether the petition presents substantial scientific or commercial information indicating that the petitioned action may be warranted. If such a petition is found to present such information, the Secretary shall promptly commence a review of the status of the species concerned. The Secretary shall promptly publish each finding made under this subparagraph in the Federal Register.\" The Food, Drug, and Cosmetic Act contains requirements for the Secretary of Health and Human Services and for individuals petitioning the agency for a regulation on food additives. The statute lists information the petitions shall include, such as detailed scientific information about the additive and \"full reports of investigations made with respect to the safety for use of such additive, including full information as to the methods and controls used in conducting such investigations.\" It also requires a petition to respond to requests from the Secretary for additional information and further requires the Secretary to publish notice of the regulation proposed by the petitioner. ", "summary": "The Administrative Procedure Act (APA), enacted in 1946, is known primarily for its procedural requirements for notice-and-comment rulemaking. Those requirements state that when issuing regulations, agencies must generally give public notice (i.e., issue a proposed rule), hold a public comment period, and publish a final rule. A lesser known provision in the APA is a petition mechanism through which any interested party can request an agency to issue, amend, or repeal a rule (Section 553(e)). Such petitions are sometimes referred to as 553(e) petitions, petitions for rulemaking, petitions for reconsideration, administrative petitions, or citizens' petitions. The APA petition mechanism is a potentially efficient (and arguably underused) means for an individual or stakeholder to call on an agency to take a particular action. Although Section 553(e) is only one sentence in length and provides very little detail, other sections of the APA contain some additional requirements for agencies with regard to receiving, considering, and responding to rulemaking petitions. An agency is not necessarily required to grant the petition or take the requested action, but the APA does require the agency to consider the petition and respond and to do so \"within a reasonable time.\" Notably, however, agencies have a great deal of discretion in determining the specifics of their procedures for receiving, considering, and responding to petitions. In 2014, the Administrative Conference of the United States (ACUS) found that \"few agencies have in place official procedures for accepting, processing, and responding to petitions for rulemaking\" and that \"how petitions are received and treated varies acrossâand even withinâagencies.\" The APA's requirement for a petition mechanism applies to all agencies covered by the APA, which includes executive agencies and independent regulatory agencies. The APA's definition of rule is broad and covers a variety of agency actions, including several types of actions that are not subject to the APA's notice-and-comment rulemaking procedures. Such actions include agency interpretive rules and policy statementsâcategories that are often colloquially referred to as \"guidance documents\"âand rules of agency organization, procedure, and practice. Thus, the petition mechanism could potentially be used for more than just rules that have undergone, or would be required to undergo, the APA's notice-and-comment procedures. If an agency grants a petition for rulemakingâthus issuing, amending, or repealing a rule per request of the petitionerâany relevant procedural requirements for rulemaking or other type of action would still apply. Furthermore, in taking any action pursuant to a petition, the agency may act only within the delegated authority Congress has provided to it in statute. This report briefly discusses the origin of the APA petition mechanism, outlines the mechanism's requirements for agencies, provides information from various outside sources about what may make an effective petition, discusses potential benefits to agencies and the public, and, finally, identifies some examples of statutory petition mechanisms that Congress created in addition to the APA's.", "document_type": "crs"}
{"report": "The Department of Veterans Affairs (VA) Caregiver Support Program was born from a new challenge facing veterans returning from recent conflicts. The conflicts in Afghanistan and Iraq (Operation Enduring Freedom, Operation Iraqi Freedom, and subsequent operations, hereinafter referred to as OEF/OIF ) led to a growing number of seriously disabled veterans, many of whom require extended care for the remainder of their lives. Some of those seriously injured while serving in these conflicts survived with injuries that would have been fatal in previous conflicts. In the Vietnam Era, five out of every eight seriously injured servicemembers survived. In OEF/OIF, seven out of eight seriously injured servicemembers survived. Seriously injured servicemembers returning from OEF/OIF conflicts often sustained polytraumatic injuries requiring medically complex care, intensive rehabilitation, and extended or long-term care. Such injuries can include physical injuries (e.g., traumatic brain injuries, amputations, serious burns, spinal cord injuries, and blindness), as well as mental health issues (e.g., posttraumatic stress disorder [PTSD], anxiety, and depression). These types of injuries often have lasting implications for the Department of Defense (DOD) and VA health care and disability systems. Researchers found that family members and close friends to veterans often shouldered much of the burden in the rehabilitation of returning veterans. Family members and friends relocated for extended periods of time while veterans received treatment in hospital settings. Moreover, family and friends often left jobs to act as caregivers for veterans. In recognition of this significant challenge to families, Congress enacted the Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ), which required VA to establish specific supports for caregivers of veterans. The Veterans Health Administration (VHA), within VA, offers caregiver support through two programs established by the act: a Program of General Caregiver Support Services (general caregivers program) ; and a Program of Comprehensive Assistance for Family Caregivers ( family caregivers program ). The general caregivers program offers a basic level of support, such as education and training, to caregivers of veterans of all eras enrolled in VA health care. The family caregivers program offers comprehensive supports, such as health care benefits and a monthly stipend, to caregivers of veterans who were seriously injured in the line of duty on or after September 11, 2001. VA refers to these two programs collectively as the Caregiver Support Program. The Caregiver Support Program is distinct from other VA programs in that the beneficiary is a nonveteran with some relationship to a living veteran. VA services and benefits are typically provided only to veterans. (VA does provide some services and benefits to families of deceased veterans, with a few exceptions. ) Generally, caregiver services and benefits are available to caregivers only while the veteran receiving care is living. After many years of advocacy from veterans organizations, among others, the VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (VA MISSION Act; P.L. 115-182 , as amended) was enacted. It required VA to expand eligibility for supports under the family caregivers program to caregivers of veterans of all eras. Expansion is being implemented in two phases, as required by the VA MISSION Act. Veterans who were seriously injured in the line of duty before May 7, 1975, are to become eligible first. Two years later, veterans who served and were injured in the line of duty between May 7, 1975, and September 11, 2001, are to become eligible for the program. This expansion, which has yet to go into effect, is expected to generate a large increase in enrollment and may lead to changes to the underlying structure of the family caregivers program due to a large increase in the number of eligible individuals. Unlike the population currently eligible for the program, this newly eligible population is older and may have different disabling conditions that require personal care assistance, characteristics that may present a challenge to determining eligibility based on an injury in the line of duty. (See the text box \"Proposed Rule Published on March 6, 2020\" for information on a proposed rule to implement requirements under the VA MISSION Act.) Title I of the Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ) includes programs and services to provide support to caregivers of veterans. Specifically, the act amends Title 38, Chapter 17, Subchapter II of the United States Code (U.S.C.) by establishing two programs to assist family caregivers. The first is a Program of Comprehensive Assistance for Family Caregivers, for caregivers of eligible veterans who incurred a serious injury in the line of duty while actively serving in the military on or after September 11, 2001 (referred to as the as the family caregivers program in this report). The second is a Program of General Caregiver Support Services, for caregivers of covered veterans of all eras enrolled in the VA health care system (referred to as the general caregivers program in this report). VA refers to the two programs together as the Caregiver Support Program. The Appendix provides a legislative history of the Caregiver Support Program. Title I of the act also amends Title 38 of the U.S.C. to provide the following services: (1) medical care to certain primary family caregivers; (2) counseling and mental health services to certain family caregivers and other caregivers; and (3) lodging and subsistence for attendants who travel with veterans for medical treatment, regardless of whether they require an attendant for such travel. The VA MISSION Act required VA to add additional services to the family caregivers program, to implement a new information technology (IT) system to support the family caregivers program, and to expand eligibility for the program to caregivers of veterans of all eras. Title I of the Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ) creates two caregiver designations: general caregiver and family caregiver. Within the family caregiver designation, the act established a primary designation. VA refers to individuals not designated primary as secondary family caregivers. Multiple individuals can be designated as a family caregiver for one veteran, hence the primary and secondary designations. Both primary and secondary family caregivers are provided supports through the family caregivers program. General caregivers are provided supports through the general caregivers program. Caregiver designation is conferred based on both the veteran's and the caregiver's eligibility for either of the two programs. Figure 1 shows these caregiver designations under the appropriate VA program. The general caregivers program does not have a formal application process. Likewise, VA does not require a clinical evaluation to obtain benefits through the general caregivers program. A general caregiver may not be a primary or secondary family caregiver, as designated under the family caregivers program, and must provide personal care services to a veteran who is enrolled in the VA health care system and is either unable to perform an activity of daily living (ADL), or in need of supervision or protection based on symptoms or residuals of neurological or other impairment or injury (supervision or protection). The veteran's general caregiver is not required to reside with the veteran. To receive services under the general caregivers program, the veteran or the caregiver must contact a local VA medical center. The caregiver is identified in the veteran's medical record for the purpose of care coordination. VA health care providers are required to recognize the caregiver as a collaborative partner in the care of the veteran. The family caregivers program requires veterans and their caregivers to undergo an eligibility determination process before conferring caregiver designation under the program. Individuals who wish to be designated by VA as primary or secondary family caregivers must complete and sign a joint application with the veteran. Figure 2 describes the eligibility requirements that veterans and caregivers must meet before submitting an application, and the process used to determine eligibility after the application is submitted. To qualify for the family caregivers program, an individual must first either (1) meet the statutory definition of a veteran , meaning an individual who served in the active military, naval, or air service and who was discharged or released under conditions other than dishonorable, or (2) be a servicemember who has been issued a date of medical discharge from the military. Since the inception of the family caregivers program, the basis of veteran eligibility has been a serious injury incurred in the line of duty on or after September 11, 2001. As such, veterans eligible for this program are referred to as post-9/11 veterans. (See the \" Issues for Congress \" section for information on eligibility for pre-9/11 veterans.) In addition to this post-9/11 requirement, the veteran must have been in need of personal care services for a minimum of six continuous months due to either of the following clinical criteria: an inability to perform one or more activities of daily living (ADL), or a need for supervision or protection based on symptoms or residuals of neurological or other impairment or injury (supervision or protection). In addition to those criteria, the veteran's primary care team must determine clinically that it is in the best interest of the veteran to participate in the program. The veteran cannot receive personal care services simultaneously and regularly by another individual or entity who is not the family caregiver. The veteran must agree to receive care at home from the family caregiver and to receive ongoing care from a primary care team after VA designates a family caregiver. The following section describes the ADLs recognized by VA for the purpose of establishing eligibility for the family caregivers program. The section below that one describes the VA-recognized reasons why a veteran may need supervision or protection; these reasons are based on symptoms or residuals of neurological or other impairment or injury. VA considers the following seven ADLs when determining a veteran's eligibility for the family caregiver program: 1. Eating. The ability to feed oneself. Specifically, the process of eating, chewing, and swallowing. This does not include preparing food. 2. Grooming. The ability to safely tend to personal hygiene needs. 3. Bathing. The ability to wash the entire body safely. 4. Dressing and u ndressing. The ability to dress and/or undress the upper and lower body with or without dressing aids. 5. Toileting. The ability to maintain perineal hygiene and adjust clothing before and/or after using the toilet or bedpan; the ability to manage an ostomy, including cleaning the area around stoma but not managing equipment; or ability to manage urinary catheter or urinal. 6. Prosthetic a djustment. The ability to adjust special prosthetic or orthopedic appliances without assistance. The adjustment of appliances that any person (with or without a disability) would need assistance with should not be scored (e.g., supports, belts, lacing at back). 7. Mobility. The ability to transfer safely from bed to chair and/or chair to toilet, the ability to turn and position self in bed, the ability to walk safely on a variety of surfaces, and the ability to go upstairs. The inability to perform any one of these ADLs for a minimum of six continuous months is a qualifying factor for enrollment in the program. The VA also tracks a veteran's ability to perform instrumental activities of daily living (IADLs). However, IADLs are not considered in the eligibility determination process. VA recognizes seven reasons that a veteran may need supervision or protection under this clinical criterion: 1. Seizures . The veteran is unable to manage seizures independently. 2. Planning and o rganizing. The veteran has difficulty planning and organizing daily tasks, appointments, and medication regiments. 3. Safety. The veteran is unable to maintain safety with self and others. This may include a risk of falling or wandering. 4. Sleep. The veteran has difficulty regulating sleep without intervention. 5. Delusions/ h allucinations. The veteran is unable to maintain safe behavior in response to delusions (irrational beliefs) or hallucinations (serious disturbances in perception). 6. Impairment of r ecent m emory. The veteran has difficulty remembering recent events and learning new information. 7. Affective/ b ehavioral d ysregulation ( s elf- r egulation) . The veteran is unable to regulate behavior without exhibiting any of the following behaviors: aggressive or combative with self or others, verbally disruptive including yelling, threatening and excessive profanity, impaired decision making, inability to appropriately stop activities, and disruptive, infantile or socially inappropriate behavior. The need for supervision or protection based on any one of these reasons for a minimum of six continuous months is a qualifying factor for enrollment in the program. Under the family caregivers program, a caregiver must be at least 18 years of age, and be either a family member or a person who is living with the veteran or will live with the veteran upon approval. An individual is considered a family member if he or she is the eligible veteran's spouse, son, daughter, parent, step-family member, or extended family member. Although the family caregiver status includes the term family , the individual is not required to have any familial relationship with the veteran. Furthermore, to apply for the family caregivers program, an individual is not required to currently live with the veteran. The individual simply has to certify that he or she will live with the veteran upon approval as a family caregiver. If a veteran meets the eligibility criteria for the family caregivers program, he or she is encouraged to apply using VA form 10-10CG. The application can either be mailed to the VA Health Eligibility Center or submitted to the caregiver support coordinator at the veteran's local VA medical center. The application asks the veteran to identify up to three family caregiversâone primary family caregiver and two secondary family caregivers. The qualification requirements are the same for the primary or secondary family caregivers. However, primary family caregivers are provided additional benefits, which are listed in Table 1 . After receiving the application, VA evaluates eligibility by identifying the veteran's potential qualifying injury and assessing whether it may render the veteran in need of personal care services. Before the approval and designation of family caregiver(s), the applicant undergoes an initial assessment, education, training, and an initial home care assessment. The entire VA approval process should be completed within 45 calendar days from the date of submission of an application. The 45-day deadline can be extended if a veteran is hospitalized during the application process or if the caregiver has not completed the required education and training. A VA primary care team initially assesses each caregiver applicant to confirm that he or she is able to complete caregiver education and training. This initial assessment is completed at a VA medical center. The primary goals of this initial assessment are to assess whether the caregiver applicant can (1) communicate and understand details of the specific care needs related to the veteran and (2) follow a specific treatment plan for the veteran. During this initial assessment, the VA primary care team determines whether the veteran is eligible for the program. The team examines administrative eligibility (i.e., whether the veteran is enrolled in the VA health care system and has a documented serious injury that was incurred or aggravated in the line of duty on or after September 11, 2001) and clinical eligibility (i.e., the veterans need for personal care services). The veteran is assigned to a tier level during the clinical evaluation based on the number of hours of personal care services needed. (See the text box \"Centralized Eligibility and Appeals Teams\" for information on how VA is implementing centralized teams to change the eligibility determination process.) During the initial assessment, prospective caregivers are eligible for the Veterans Transportation Service (VTS) program. The VTS provides free transportation services to and from a VA medical center. Following the initial assessment, VA administers a training program that consists of topics generally applicable to caregivers, as well as topics targeted to the needs of the specific veteran. The training program must cover 10 specific core competencies: medication management, vital signs and pain control, infection control, nutrition, functional activities, activities of daily living, communication and cognition skills, behavior management skills, skin care, and caregiver self-care. During this education and training process, prospective caregivers are eligible for either VTS or the VA beneficiary travel program, which reimburses travel expenses related to the veteran's medical appointments. The prospective caregiver can be reimbursed for expenses such as the cost of transport, lodging, and meals. In addition, during this period VA provides respite care for the veteran, if necessary. (For information on respite care, see the \" Services and Benefits for General Caregivers \" section.) The final step before approval and designation is an initial home care assessment. In this step, a VA clinician or clinical team visits the veteran's home to assess whether the caregiver is competent to provide personal care services and to measure the veteran's well-being. The clinician or clinical team assesses the veteran's ability to complete ADLs and IADLs, identifies special care needs (e.g., use of a feeding tube), monitors vital signs, looks for signs of abuse or neglect, notes other potential health or safety risks, and screens both the veteran and the caregiver for depression. The clinician or clinical team is not responsible for developing a care plan or for management of the veteran's conditions. However, the clinician or clinical team is responsible for reporting any findings to the veteran's primary care team. The clinician or clinical team can also recommend referrals for follow-up care. VA requires that this assessment be completed within 10 days of certification that the caregiver completed the requisite education and training curriculum. If the veteran is hospitalized before the assessment is conducted, VA must conduct the assessment within 10 days from the date the veteran returns home. If the veteran and his or her caregiver(s) are deemed eligible following the initial home care assessment, VA will approve the application and designate the primary and/or secondary family caregivers. Approval of one caregiver is not contingent on the approval of other caregivers listed on the application. For instance, if a veteran designates two caregivers, but only one of the two completed the required training, VA may still approve the individual who completed the training. VA informs veterans and caregivers deemed ineligible of their ability to appeal the decision. Appeals may be filed at either the local VA facility or at the VISN level. Veterans and family caregivers are subject to ongoing monitoring while enrolled in the family caregivers program. VA requires ongoing assessments every 90 days. Assessments can be completed in-person, through video telehealth, or by phone, as well as with an annual in-home visit. The annual visit must be completed in the veteran's home. The purpose of ongoing monitoring is to monitor the veteran's overall health and well-being and adequacy of the personal care services provided by the family caregiver. Caregiver status can be revoked immediately if VA determines that the caregiver or the veteran no longer meet eligibility criteria, or if VA makes a clinical determination that having the family caregiver is no longer in the best interest of the veteran. If the family caregiver designation is revoked because the veteran's condition improvesâor as the result of the veteran's death or institutionalizationâthe caregiver will continue to receive benefits for 90 days following the loss of the caregiver designation. The family caregiver or the veteran can request that the caregiver designation be revoked. If requested by the caregiver, benefits will terminate immediately upon the date that the caregiver requests revocation. If requested by the veteran, the caregiver will continue to receive benefits for 30 days. If the caregiver whose status is being revoked was a primary family caregiver and another primary family caregiver is designated within 30 days, the revoked caregiver's benefits will terminate the day before the new family caregiver is designated as such. Table 1 lists the services and benefits available under the two caregiver support programs (i.e., the Program of General Caregiver Support Services and the Program of Comprehensive Assistance for Family Caregivers). The table also details which of the three categories of caregiver status (i.e., general caregiver, secondary family caregiver, or primary family caregiver) are eligible for the specific service or benefit. The general caregiver category, which confers the least services and benefits, is presented first; followed by the primary family caregiver category, which confers the most services and benefits. In developing Table 1 , CRS consulted Title 38 of the Code of Fe deral Regulations (38 C.F.R. Â§Â§71.40 and 71.50), as well as publicly available VHA Directive 1152(1). A detailed description of each service and benefit appears below the table. As shown in Table 1 , the general caregivers are eligible for various services and benefits: limited to access to the VA caregiver support line; peer mentoring; education, training, and technical support; telehealth; counseling; and respite care. These services and benefits are detailed below. The caregiver support line is available to general and family caregivers, as well as to any individual who calls to learn more about offered services and eligibility. The support line serves as a resource referral center for individuals seeking caregiver information, provides referrals to local VA medical center caregiver support coordinators and other VA or community resources, and provides emotional support to callers. The caregiver support line also hosts monthly education calls for caregivers. An individual must be a caregiver of a veteran enrolled in VA health care, and participants must register for the call in advance. This optional benefit includes courses on managing difficult behavior, self-care, and other topics. The peer support mentoring program facilitates a mentor/mentee relationship between caregivers. Caregivers can join the program as both mentors and mentees. Mentors receive training and are considered volunteers by VA. This program generally asks mentees to commit to a minimum of six months of mentoring. However, VA also offers one-time connections for caregivers who cannot commit to long-term mentoring but who may need brief support. VA offers a variety of education, training , and t echnical s upport , which includes specific programs such as the Building Better Caregivers program and REACH VA, as well as online tools to assist in caregiving duties. This is separate and distinct from the required training that family caregivers must participate in to qualify under the family caregivers program. Building Better Caregivers is an online workshop that offers weekly lessons, guidance, group support, and access to an alumni community for graduates of the program. The workshops are anonymous to facilitate open communication among caregivers. REACH VA is an individual coaching program for caregivers designed to help them build skills to take care of themselves and the veterans for whom they are providing personal care services. This program, unlike others available to general caregivers, is available only to caregivers of veterans diagnosed with amyotrophic lateral sclerosis (ALS), dementia, multiple sclerosis (MS), PTSD, or spinal cord injury/disorder. Coaches generally provide four individual hour-long coaching sessions over a period of two to three months. Additional sessions can be provided if the caregiver and coach believe that they will be beneficial. Telehealth services are provided directly to the veteran. However, they are an indirect benefit to the caregiver, because they allow the veteran to receive medical services without needing a caregiver's assistance in transporting the veteran to medical appointments. Caregivers are able to access VA mobile applications, such as MyHealtheVet , which allows them to view electronic health records, reorder medication, and contact health care providers via secure messaging, among other things. The counseling services provided to general caregivers include consultation, professional counseling, marriage and family counseling, training, and mental health services. However, these services are available only if a veteran's medical team determines that the service is \"in connection with the treatment\" of a veteran's disability. In other words, the counseling services may be authorized only if they further the objectives of a veteran's treatment plan. For instance, marriage and family counseling may be provided only if it is intended to address the veteran's mental health. VA clinicians are authorized to refer caregivers to the community for counseling when it is not related to the veteran's treatment. Veterans are eligible for 30 days of respite care per calendar year, in general. Respite care is short-term relief for the caregiver, in which another individual acts as the primary caregiver. This care can be provided in an institutional setting or as 24-hour per day in-home care. The respite care must be medically and age-appropriate. Respite care can be provided at the home, in a VA community Living Center, through a contracted community skilled nursing home, or through a VA adult day care program. Secondary family caregivers are eligible for the same suite of benefits as general caregivers. In addition, veterans under the family caregivers program receive primary care team support and monitoring. Secondary family caregivers receive more comprehensive mental health services and travel reimbursement (described below). Unlike the counseling services provided to general caregivers, secondary family caregivers can receive mental health services regardless of the medical benefit to the veteran. These services can be provided with the health of the caregiver in mind rather than treatment of the veteran. Services include individual and group therapy, individual counseling, and peer support groups. Mental health services are limited to outpatient care and do not include medication or medication management. Secondary family caregivers are eligible for travel reimbursement through the VA Beneficiary Travel program when travel is related to the veteran's medical treatment. Reimbursement is not provided when travel is related solely to the treatment of the caregiver (e.g., travel to a VA medical center for mental health services). To receive travel reimbursement, the veteran must be eligible for the program. If eligible, reimbursement includes expenses for lodging and meals, as well as for travel to and from medical appointments. Primary family caregivers are eligible for all of the benefits available to both general caregivers and secondary family caregivers. In addition to those benefits, primary family caregivers are eligible to receive health care through the Civilian Health and Medical Program of the Department of Veterans Affairs (CHAMPVA) and to receive a monthly stipend based on the number of hours of personal care services that a veteran requires. Enrollment in the family caregivers program does not confer eligibility for h ealth care services to all primary family caregivers. Individuals must meet additional criteria to be eligible for enrollment in CHAMPVA. Specifically, caregivers must be unable to access any other form of health plan contract, such as health insurance or a state health plan. Distinct from VA health care provided to enrolled veterans, CHAMPVA is primarily a health insurance program where individuals receive care from private sector health care providers. In the clinical determination process during the initial assessment, VA assigns veterans to one of three tier levels based on the amount of hours of personal care service required: Tier 1. A maximum of 10 hours of caregiver assistance per week. Tier 2. A maximum of 25 hours of caregiver assistance per week. Tier 3. A maximum of 40 hours of caregiver assistance per week. The tier level is used to calculate monthly stipend levels for primary family caregivers. VA determines the monthly value of the stipend by multiplying the hours corresponding to the assigned tier level by the hourly wage for a home health aide, then multiplying the result by 4.35 weeks (the average number of weeks in a month, according to VA). VA uses the 75 th percentile hourly wage index for a home health aide for the geographic region in which the veteran and caregiver reside, as determined by the Bureau of Labor Services (see the text box \"Caregiver Stipend Formula\" for the stipend formula). The monthly stipend varies based on the assigned tier level and the geographic region in which the veteran and caregiver reside. The 75 th percentile hourly wage for home health aides ranges from $8.91 in Ponce, PR, to $36.48 in Santa Rosa, CA, with a median nationwide of $13.00. Table 2 provides the average monthly stipend amounts nationwide by tier level. Despite receiving a stipend, primary family caregivers are not considered VA employees and the stipend is not considered taxable income. This section details the administrative structure of the Caregiver Support Program and provides historical funding for the program. The narrative explaining the administrative structure of the program is largely adapted from the publicly available VHA Directive 1152(1). The funding history is compiled from VA congressional budget submissions. The Caregiver Support Program is administered by a central office within VHA. The Caregiver Support Program Office develops national policy and procedures and provides guidance, oversight, and support to regional and local VA staff regarding caregiver support. Two other VA national offices, the Health Eligibility Center (HEC) and the Office of Community Care, perform significant roles in administration of the Caregiver Support Program. The HEC is responsible for processing applications for the family caregiver program. The Office of Community Care calculates and processes stipend payments for family caregivers and administers enrollment and claims processing for family caregivers in CHAMPVA. Regionally, each VISN ensures that every medical center within the VISN employs at least one full-time equivalent Caregiver Support Coordinator and that the program is operated consistently across the VISN. The VISN also maintains a process for appeals related to clinical disputes, which includes independent external review. The VISN employs a clinical staff member as a VISN lead for the Caregiver Support Program. The VISN lead acts as an intermediary between the central office and the Caregiver Support Coordinators at the local level. The VISN lead provides guidance and support to the Caregiver Support Coordinators within the VISN. The caregiver support coordinator administers the program locally at each VA medical center. The coordinator is responsible for managing the family caregiver program at the operational level by coordinating the application process, the initial home care assessment, and ongoing monitoring. The individual also acts as an advocate for caregivers and veterans internally by ensuring that services and benefits are available, as well as by creating educational tools and developing programs. VA has mandated that each medical center have at least one full-time equivalent caregiver support coordinator. VA began reporting actual operating expenditures for the Caregiver Support Program in its annual budget submissions in FY2012. Figure 3 shows actual expenditures for FY2012 through FY2019. Between FY2012 and FY2015âthe first years of implementation of the Caregiver Support Programâexpenditures grew by 41.0% annually. Since FY2015, expenditures for the program have stabilized substantially. Between FY2015 and FY2018, expenditures grew by 2.3% annually. In FY2019, expenditures were lower than anticipated, decreasing by 13% from expenditures in FY2018. VA has indicated that decreasing enrollment in recent years may be due to decreasing application approval rates and increases in revocations for veterans and caregivers who do not meet eligibility requirements. The monthly stipend for primary family caregivers in the family caregivers program comprises the largest portion of spending under the Caregiver Support Program. In FY2019, for instance, stipend payments totaled approximately $347 million, or 79% of total program expenditures. Expansion of the family caregiver program to pre-9/11 veterans is expected to significantly increase demand for the program. VA has factored this expected increase into future budget estimates. VA estimates that the program will cost $710 million in FY2020 and nearly $1.2 billion in FY2021. Title 1 of the VA MISSION Act expands eligibility for the family caregiver program to pre-9/11 veterans in two phases. This expanded eligibility depends on certification of a new information technology (IT) system to administer the program: Phase 1. Veterans who have a serious injury incurred or aggravated in the line of duty in the active military, naval, or air service on or before May 7, 1975. Phase 2. Two years after certification, the program is to expand to cover veterans of all eras. Expanding eligibility for the Caregiver Support program raises two potential issues: (1) delays in implementation of an IT system to fully support the system and (2) increased costs associated with eligibility expansion under the act. As program eligibility expands, these issues may be of interest to policymakers. In addition to these two issues, the program may change in other significant ways when VA modifies the regulations necessary to implement the eligibility expansion. VA published a proposed rule to implement the changes required under the VA MISSION Act on March 6, 2020. The public comment period for the proposed rule ends on May 5, 2020. Furthermore, rulemaking to add the expansion populations must be finalized, at the very least, prior to expansion becoming effective. The act required VA to implement a new IT system to fully support the family caregiver program by October 1, 2018ânearly four months after the legislation was enacted. The IT system must be able to (1) retrieve the data needed to assess and monitor program and workload trends, (2) manage data for program participation that exceeds VA estimates, and (3) integrate the system with other VHA IT systems. The act required VA to certify that the system had been implemented no later than October 1, 2019. The first phase of eligibility expansion is to become effective when the IT system is certified. However, VA has not yet certified an IT system. Prior to enactment of the VA MISSION Act, the IT system used to support the family caregivers program, the Caregiver Application Tracker (CAT), was deemed inadequate. Specifically, limitations with CAT did not grant the Caregiver Support Program office ready access to the workload data needed to monitor the effects of the program on VA medical center resources. VA attempted to add functionality to CAT in a project called CAT Rescue. However, CAT Rescue was terminated in April 2018 after VA reported defects during system testing. When the VA MISSION Act was enacted, VA was in the midst of replacing CAT with a new IT system, called the Caregivers Tool (CareT). This project began in September 2015. However, VA identified deficiencies in CareT during acceptance testing and terminated the project in February 2019. In March 2019, VA began a third effort to acquire a replacement system, which is based on an existing commercial product. The new system is referred to as the Caregiver Record Management Application (CARMA). VA is deploying CARMA in three phases. The first phase replaced CAT with CARMA and was completed in October 2019. The second phase automated stipend processing within CARMA and was completed in January 2020. The third phase is expected to be completed in summer 2020. In this third phase, VA is updating other legacy systems, enabling online application submission, and enhancing reporting functionality (e.g., business analytics tools). VA has indicated that it expects to certify the system at the completion of phase 3 and the first eligibility expansion will occur at that time. Figure 4 illustrates a timeline of VA initiatives designed to replace the current IT system that supports the program and requirements of the VA MISSION Act. The family caregivers program currently serves approximately 20,000 post-9/11 veterans and their caregivers. When the first phase of expansion begins, to pre-9/11 veterans injured in the line of duty before May 7, 1975, VA projects that approximately 83,000 additional veterans and their caregivers will become eligible for the program. The number of eligible veterans and caregivers would potentially continue to grow when eligibility expands to all pre-9/11 veterans. The largest cost driver in the family caregivers program is the monthly stipend to family caregivers. In FY2019, stipend payments totaled approximately $347 million, or 79% of total program expenditures. With expansion of the magnitude projected by VA, the number of caregivers receiving monthly stipends will increase. VA estimates that expenditures for the stipend will total $870 million in FY2021 and nearly $1.2 billion in FY2022. As the program expands, other program components may require additional resources to meet the demand resulting from the increased numbers of eligible veterans and caregivers. For instance, as it is currently structured, the program requires ongoing monitoring in a veteran and caregiver's home. In general, a VA clinical team that includes at least two individuals must visit each home on at least an annual basis. To continue to meet this requirement, VA will likely need to increase staffing levels to conduct similar program monitoring and oversight. VA requested nearly $1.2 billion in FY2021 (the first full year implementation of phase 1 of the eligibility expansion), a 276% increase from FY2019 (the last full year in which eligibility was available only to post-9/11 veterans). The FY2022 advance appropriation request is $1.5 billion, which represents only a partial year of implementation of phase 2 of the eligibility expansion. Program Evolution As military operations in Afghanistan and Iraq progressed, the provision of services and supports to family caregivers of veterans seriously injured in these conflicts moved to the forefront. Family caregiver issues became a focus of the President's Commission on Care for America's Returning Wounded Warriors, established by President G.W. Bush on March 8, 2007. Tasked with providing a comprehensive review of the care provided to injured servicemembers returning from the recent conflicts in Afghanistan and Iraq, the commission issued several recommendations to the President, Congress, DOD, and VA in a final report. Among these recommendations were several DOD and VA recommendations to strengthen family support programs, including providing \"families of servicemembers who require long-term personal care with appropriate training and counseling to support them in their new caregiving roles.\" VA Advisory Committee on OEF/OIF Veterans and Families In April 2007, VA established an independent advisory committee to assess the situation of OEF/OIF veterans and families. The committee was tasked with examining existing VA benefits and services and the need for new benefits and services tailored to OEF/OIF veterans. Committee membership included representation from veterans, family members, and caregivers, as well as veteran service organizations and other advocates and specialists. In 2008, the committee issued an interim report with preliminary observations and recommendations that centered around several themes, including family and caregivers. The Advisory Committee's recommendations, among others, were to increase support to families and caregivers. Specifically, the committee's recommendations and findings consisted of three priorities for caregivers: (1) mental health counseling services for those caregiving for severely injured veterans, particularly over a prolonged time period; (2) financial counseling and fiscal support while caring for severely disabled veterans, as well as training programs; and (3) enhanced efforts regarding information and education about available VA benefits and services. VA Caregiver Advisory Board In June 2008, VA established an interdisciplinary Caregiver Advisory Board to develop a caregiver assistance program. The board's chartered activities include identifying core caregiver needs, developing initial recommendations for VA caregiver support services, and overseeing eight caregiver assistance pilot programs. The pilot programs were conceptualized in December 2007 to examine ways to improve education and to provide training and resources for caregivers assisting veterans. Most of the programs focus on supporting caregivers of veterans with specific conditions, such as dementia and traumatic brain injury. These pilot programs were conducted through the end of FY2009. Caregivers and Veterans Omnibus Health Services Act of 2010 Leading up to enactment of the Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ), the 111 th Congress engaged in considerable debate and deliberation about various legislative proposals to assist family caregivers of veterans. The following provides a legislative history of significant proposals to address assistance to family caregivers of veterans and, more specifically, veterans injured in the conflicts in Afghanistan and Iraq. This history begins with legislation first enacted in the 109 th Congress to address greater services and support to family caregivers and ends with passage of the Caregivers and Veterans Omnibus Health Services Act of 2010 in the 111 th Congress. The initial congressional response to providing assistance to family caregivers of veterans from recent conflicts in Iraq and Afghanistan dates back to the 109 th Congress. On May 4, 2006, S. 2753 was introduced by Senator Daniel Akaka. The bill would have required a VA program to improve the provision of caregiver assistance services for veterans. Although the bill did not necessarily focus on caregiving assistance to veterans serving in recent conflicts, but rather all veterans, in his introductory speech Senator Akaka stated: With more veterans returning from combat with severely debilitating injuries, young spouses and parents have been forced to take on an unexpected role as caregivers. Many have interrupted their own careers to dedicate time and attention to the care and rehabilitation of loved ones. These caregivers do not plan for this to happen and are not prepared mentally or financially for their new role. Therefore, we must protect, educate, and lend a helping hand to the caregivers who take on the responsibility and costly burden of caring for veterans, both young and old. This legislation serves to provide comprehensive assistance to these caregivers. Provisions from S. 2753 were included as Section 214 of the Veterans Benefits, Healthcare, and Information Technology Act of 2006 ( P.L. 109-461 ) and enacted on December 22, 2006. P.L. 109-461 authorized VA to conduct a two-year pilot program to improve assistance provided to caregivers, particularly in home-based settings, and authorized $5 million to be appropriated for each of FY2007 and FY2008. The 110 th Congress extended authorization of the caregiver assistance pilot programs through the end of FY2009 under Section 809 of the Veterans' Mental Health and Other Care Improvements Act of 2008 ( P.L. 110-387 ). Assistance to family caregivers received further legislative attention in the 111 th Congress, with legislative proposals introduced to specifically target caregivers of veterans injured while serving in OEF/OIF. In the Senate, Senator Akaka introduced the Family Caregiver Program Act of 2009 ( S. 801 ) on April 2, 2009. In his introductory remarks, Senator Akaka stated: Some veterans returning from the recent wars in Iraq and Afghanistan, as well as previous conflicts, suffer from disabilities that prevent them from being fully independent. This is a sad fact of war. The legislation I am introducing today is designed to provide for several improvements in health care for veterans by supporting the family members who care for them. The challenges faced by family caregivers are well known to us. We have been working on this issue for nearly two years â¦ I think we are now beyond the scope of that original pilot program and I believe that a full-fledged permanent program is needed in VA that would have a national program for the caregivers of seriously injured veterans to provide them with education, grants, counseling, and other support services. An amended version of S. 801 was reported by Senator Akaka on September 29, 2009 ( S.Rept. 111-80 ). The amended version would have, among other things, authorized VA to waive the cost of emergency care for caregivers of veterans; created a comprehensive program to provide assistance to the caregivers of severely injured veterans; authorized VA to pay for the caregivers' lodging and subsistence, as well as the expenses of travel for the period consisting of travel to and from a treatment facility and the duration of a treatment episode at that facility; and required VA to collaborate with DOD to conduct a national survey of family caregivers. The House also introduced legislation that would specifically provide assistance to caregivers of OEF/OIF veterans. On July 9, 2009, Representative Michael H. Michaud introduced the Caregiver Assistance and Resource Enhancement Act ( H.R. 3155 ). On July 15, 2009, H.R. 3155 as amended, was ordered reported out of the House Veterans' Affairs Committee ( H.Rept. 111-224 ). The bill was then passed by the House on July 27, 2009. As passed by the House, H.R. 3155 would have required VA to provide support services (including CHAMPVA medical care and stipends) to the eligible caregivers of OEF and OIF veterans. To be eligible, veterans would need to meet three conditions: (1) have a severe service-connected disability or illness; (2) be in need of caregiver services, such that without such services, the veteran would require hospitalization, nursing home care, or other residential institutional care; and (3) be unable to carry out the activities of daily living (including instrumental activities of daily living). A \"hold\" was placed on S. 801 that prevented the Senate from considering this measure. Subsequently, on October 28, 2009, Senator Akaka introduced a separate bill, the Caregivers and Veterans Omnibus Health Services Act of 2010 ( S. 1963 ), which included provisions from S. 801 , among other provisions. S. 1963 was passed by the Senate on November 11, 2009. The family caregiver provisions in the Senate-passed bill would have waived charges for humanitarian care to attendants of covered veterans under certain circumstances; provided family caregiver assistance including training, respite care, mental health services, and stipends; and provided lodging and subsistence for family caregivers. It would have also required VA, in coordination with DOD, to design and conduct a survey on caregivers and family caregivers. On April 22, 2010, an amended version of S. 1963 was passed by Congress. The final version reflected a compromise agreement between the House and the Senate and included provisions derived from a number of bills, including the earlier Senate-passed S. 1963 and House-passed H.R. 3155 . On May 5, 2010, President Obama signed into law P.L. 111-163 , the Caregivers and Veterans Omnibus Health Services Act of 2010. Title I of the act provides programs and services to provide support to caregivers of veterans. Following enactment of the 2010 legislation that established the Caregiver Support Program, there were a number of legislative attempts to expand eligibility for the Program of Comprehensive Assistance for Family Caregivers to veterans of all eras. This effort ultimately culminated with the enactment of the VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (VA MISSION Act; P.L. 115-182 , as amended). ", "summary": "The conflicts in Iraq and Afghanistan have presented a new challenge for the United States as servicemembers returned from combat with serious injuries that may have been fatal in previous conflicts. These servicemembers require ongoing personal care services, which are often provided by family members and loved ones. In recognition of this significant challenge, Congress enacted the Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ), which required the Department of Veterans Affairs (VA) to establish specific supports for caregivers of veterans. The Veterans Health Administration (VHA), within VA, offers caregiver support through two programs that were established by the act: a Program of General Caregiver Support Services ( general caregivers program ); and a Program of Comprehensive Assistance for Family Caregivers ( family caregiver s program ). The general caregivers program offers a basic level of support, such as education and training, to caregivers of veterans of all eras enrolled in VA health care. The family caregivers program offers comprehensive supports, such as health care benefits and a monthly stipend, to caregivers of veterans who were seriously injured in the line of duty on or after September 11, 2001 (post-9/11 veterans). VA refers to these two programs collectively as the Caregiver Support Program. The general caregivers program does not have an application or eligibility determination process. The limited services provided under this program are, generally, available to all caregivers of veterans enrolled in VA health care. Veterans and caregivers who apply for the family caregivers program undergo a multistep eligibility determination process that includes an initial assessment, education, training, and an in-home assessment. VA determines both administrative and clinical eligibility of veterans and caregivers. Caregivers who are eligible and designated as a family caregiver receive a unique suite of comprehensive services and benefits to help them provide care to the veteran. The VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (VA MISSION Act; P.L. 115-182 , as amended) required VA to expand eligibility for the family caregivers program to caregivers of veterans of all eras. Expansion is being implemented in two phases, as required by the VA MISSION Act. Veterans who were seriously injured in the line of duty before May 7, 1975, are to become eligible first. Two years later, veterans who served and were injured in the line of duty between May 7, 1975, and September 11, 2001, are to become eligible for the program. This expansion, which has yet to go into effect, is expected to generate a large increase in enrollment and may lead to changes to the underlying structure of the family caregivers program due to a large increase in the number of eligible individuals. Unlike the population currently eligible for the program, this newly eligible population comprises older individuals who may have different disabling conditions that require personal care assistance, which may present a challenge to eligibility determination based on an injury in the line of duty. Eligibility expansion is contingent on the implementation and certification of a functioning information technology (IT) system required to fully support the program. The VA MISSION Act required that VA complete certification of a system by October 1, 2019. VA did not meet that deadline and has not yet certified an IT system. VA published a proposed rule to implement the changes required under the VA MISSION Act on March 6, 2020. The public comment period for the proposed rule ends on May 5, 2020. This report provides an overview of the VA Caregiver Support Program, including eligibility criteria that veterans and caregivers must meet to qualify for both the family caregivers program and the general caregivers program; a catalogue of the services and benefits provided under the two programs; and current issues related to implementation of modifications under the VA MISSION Act. The Appendix provides background on the program evolution and a legislative history of the program.", "document_type": "crs"}
{"report": "This report identifies selected current major trade issues for U.S. agriculture that may be of interest in the second session of the 116 th Congress. It provides background on individual trade issues and attempts to bring perspective on the significance of each for U.S. agricultural trade. Each trade issue summary concludes with an assessment of its status. The report begins by examining a series of overarching issues. These include U.S. agricultural trade and its importance to the sector; a brief description of the trade policy being pursued by the Trump Administration in 2020 and its ramifications for U.S. agricultural exports; an update on the Administration's 2019 trade policy actions; a discussion of the ongoing and proposed new trade negotiations planned for 2020; and an update on World Trade Organization (WTO) agricultural issues related to the United Statesâincluding the Administration's 2020 plans to engage in reforming the institution. The report then reviews a number of ongoing trade policy concerns to U.S. agriculture, including non-tariff measures, and trade barriers and disputes involving specialty crops, livestock, and dairy issues. The format for these trade issues is similar, consisting of background and perspective on the issue at hand and an assessment of their current status. U.S. agricultural exports have long been a bright spot in the U.S. balance of trade, with exports exceeding imports in every year since 1960. In recent years, the value of farm exports has remained below the record level of $152 billion reached in FY2014. The U.S. Department of Agriculture (USDA) reports U.S. agricultural exports in FY2019 of $136 billion (see Figure 1 ). The FY2019 export total represents an $8 billion decline from FY2018. The decline in the value of farm exports since FY2014 initially reflected lower market prices for bulk commodities, such as soybeans and corn. Agricultural prices and U.S. exports of certain commodities, such as soybeans, were further affected by retaliatory tariffs imposed on U.S. agricultural imports by China and some other countries since 2018 in response to the Trump Administration's imposition of tariffs on certain imports from China and on U.S. imports of steel and aluminum from selected countries. In FY2019, U.S. agricultural imports were $131 billion, up $3 billion from FY2018, resulting in an agricultural trade surplus of $5 billion. This is below the surplus of $16 billion in FY2018 and below the record high in nominal dollars of $43 billion in FY2014. Agricultural exports are important both to farmers and to the U.S. economy. During the calendar years 2017 and 2018, the value of U.S. agricultural exports accounted for 8% and 9% of total U.S. exports, respectively. USDA's Economic Research Service (ERS) estimates that in 2017 U.S. agricultural exports generated about 1,161,000 full-time civilian jobs, including 795,000 jobs outside the farm sector. Exports account for around 20% of total farm production by value and are a major outlet for many farm commodities, absorbing over three-fourths of U.S. output of cotton and about half of total U.S. production of wheat and soybeans. Although feed crops and wheat account for most exports by volume, the high value product (HVPs) categoryâwhich includes live animals, meat, dairy products, fruits and vegetables, nuts, fats, hides, manufactured feeds, sugar products, processed fruits and vegetables, and other processed food productsâaccounted for 68% of the value of agricultural exports in FY2019. All states export agricultural commodities, but a minority of states account for a majority of farm export sales. In calendar year 2018, the 10 leading agricultural exporting states based on valueâCalifornia, Iowa, Illinois, Minnesota, Texas, Nebraska, Kansas, Indiana, North Dakota, and Missouriâaccounted for 58% of the total value of U.S. agricultural exports that year. In December 2018, Congress reauthorized major agricultural export promotion programs through FY2023 with the 2018 farm bill ( P.L. 115-334 ). Title III of the farm bill includes provisions covering export credit guarantee programs, export market development programs, and international science and technical exchange programs designed to develop agricultural export markets in emerging economies. Among other provisions, the 2018 farm bill permits funding to operate two U.S. agricultural export promotion programs in Cubaâthe Market Access Program and the Foreign Market Development Cooperator Program. In establishing policy for U.S. participation in international trade, the Trump Administration has emphasized reducing U.S. bilateral trade deficits; focusing on renegotiating existing trade agreements that it viewed as being \"unfair;\" initiating new bilateral agreements; and responding to the trade practices of U.S. trading partners that it viewed as unfair, in violation of international trading commitments, or threatening to U.S. industry. Under various provisions of law, the Administration imposed punitive tariffs on U.S. imports of steel and aluminum from certain countries and on U.S. imports of selected products from China. These countries in turn, responded with retaliatory tariffs on U.S. exports, particularly agricultural products. During the second session of the 116 th Congress, the Trump Administration's agenda may focus on the following priorities: Legislation implementing a new trade agreement among the United States, Mexico, and Canada was enacted on January 29, 2020. The agreement awaits ratification by Canada, and certification by the United States that all parties have completed the necessary steps for entry into force. The U.S.-Mexico-Canada agreement replaces the North American Free Trade Agreement (NAFTA), which took effect in 1994. On October 7, 2019, the Trump Administration signed the \"Stage One\" trade agreement with Japan, which included significant market access improvements in Japan for U.S. agricultural exports. The agreement took effect on January 1, 2020. Because it dealt only with tariffs and other market access issues, pursuant to P.L. 114-26 , the agreement did not require congressional approval. The Administration has indicated that it hopes to negotiate a second trade agreement with Japan that addresses a broader range of issues. Such an agreement might require congressional approval. On January 15, 2020, President Trump signed a \"Phase One\" executive agreement with China on trade and investment issues, including agriculture. This agreement, which entered into force on February 14, 2020, did not require congressional approval as it consisted largely of commitments by China. The Administration has stated its intent to negotiate a second phase of the agreement with China. Depending on the scope of such a negotiation, the Administration could be required under law to consult with Congress in advance and to submit an eventual agreement for congressional approval. The Office of the U.S. Trade Representative (USTR) has indicated that the United States may also pursue new trade agreements with the European Union (EU), India, Kenya, the United Kingdom (UK), and a number of other countries. The Administration has stated that the U.S.-Kenya and the U.S.-UK negotiations will be \"comprehensive,\" dealing with other trade-related issues in addition to market access. In those cases, the Administration might be required to consult with Congress in advance of negotiations and to submit any agreements for congressional approval. USTR has indicated interest in WTO institutional reform. The upcoming WTO Ministerial Conference in June 2020 in Kazakhstan presents the United States and WTO members with an opportunity to address reform efforts, which are expected to include consideration of the WTO's treatment of agricultural trade. Some Members of Congress have indicated WTO reform to be a priority for 2020. Since early 2018, Canada, China, the EU, India, Mexico, and Turkey targeted U.S. food and agricultural products with retaliatory tariffs in response to tariffs imposed by the United States on imports of steel and aluminum and certain imports from China. To facilitate ratification of USMCA, the United States removed tariffs on steel and aluminum imports from Canada and Mexico and these countries removed their retaliatory tariffs on U. S. agricultural imports in May 2019. The retaliatory tariffs made imports of U.S. agricultural products relatively more expensive compared to similar products from competitor nations. Initially, the announcements of retaliatory tariffs led to an increase in U.S. agricultural exports as importing countries built stocks in anticipation of the tariffs. U.S. agricultural exports increased slightly in 2018. In 2019, however, U.S. agricultural exports declined about 2%, due to lower global demand for affected U.S. agricultural products and downward pressure on prices of some commodities. In the short run, retaliatory tariffs contributed to price declines for certain U.S. agricultural commodities and to a reduction in exports, particularly for soybeans. Declining prices and export sales, combined with rising input and farm machinery costs, contributed to a 16% decrease in U.S. net farm income in 2018, which prompted USDA to provide trade aid payments to the farm sector in 2018 and 2019. Imports from China have been subject to U.S. tariff increases on steel and aluminum under Section 232 of the Trade Expansion Act, which allows the President to impose tariffs on imports that \"threaten to impair the national security.\" Additionally, U.S. imports of certain other Chinese products are subject to tariff increases under Section 301 of the Trade Act of 1974, which allows tariffs in response to trade practices that are determined to be unfair and injurious to a U.S. industry. China first retaliated in April 2018, by raising tariffs on certain U.S. imports, including agricultural products such as pork, fruit, and tree nuts. These retaliatory tariffs are in addition to existing Most Favored Nation (MFN) tariffs that China levies on imports from all countries including the United States. By September 2019, China had levied retaliatory tariffs on almost all U.S. agricultural products, ranging from 5% to 60%. After the imposition of retaliatory tariffs on U.S. products, U.S. agricultural exports to China experienced a 53% decline from $19.5 billion in 2017 to $9.2 billion in 2018. The Chinese market is important for several U.S. agricultural products. For example, in 2016 and 2017, the United States supplied over one-third of China's total soybean imports, almost all of China's distillers' grain imports (primarily used as animal feed), and most of China's sorghum imports. With the retaliatory tariffs in effect, U.S. soybean exports to China in 2018 declined in value to $3 billion (8 billion metric tons [MT]) from $12 billion (32 billion MT) in 2017. Similarly, the value of U.S. exports of sorghum and distillers dry grain declined about 40% and 30% respectively from 2017 to 2018. Most other U.S. agricultural exports to China also declined in 2018. Negotiations to resolve the U.S.-China dispute began in the fall of 2019 and resulted in a \"Phase One\" executive agreement (that does not require congressional approval) on trade and investment issues, including agriculture, signed in January 2020. Under the agreement, China is to import $32 billion worth of additional U.S. agricultural products over a two-year period. This implies an average annual increase of two-thirds from a 2017 base of $24 billion. Products mentioned in the agreement include oilseeds, meat, cereals, cotton, and seafood. China has not committed to tariff exemptions or import levels for any specific products, but it may grant tariff exclusions on U.S. imports on a case-by-case basis. On February 18, 2020, China released a list indicating that it may be willing to grant one-year tariff exemptions on most agricultural products. China agreed to improve its administration of tariff-rate quotas (TRQs) on wheat, corn, and rice to comply with a WTO ruling in favor of the United States in a dispute case regarding China's TRQ administration. Changes in China's TRQ administration would be expected to improve market access for these U.S. grains. Domestic support : China agreed to improve the transparency of its domestic agricultural support measures. Sanitary and phytosanitary measures: China agreed to implement science- and risk-based food safety regulations. China also agreed to finalize phytosanitary protocols for U.S. avocadoes, blueberries, potatoes, barley, alfalfa pellets and cubes, almond meal pellets and cubes, hay, and California nectarines, and to implement a transparent, predictable, efficient, science- and risk-based regulatory process for the evaluation and authorization of products of agricultural biotechnology. In exchange, the United States agreed to complete its regulatory notice process for imports of Chinese fragrant pears, citrus, and jujube, and to complete a phytosanitary protocol for bonsai. L ivestock and fish: China agreed to improve access for U.S. beef products, including eliminating age restrictions on cattle slaughtered for export, eliminating traceability requirements, and establishing maximum residue levels for three hormones that are approved for use in livestock in the United States. It agreed to engage in technical discussions to import U.S. live cattle for breeding. China agreed to broaden the list of pork products that are eligible for importation, and to conduct a risk assessment for the veterinary drug ractopamine, which is allowed in U.S. beef and pork production. With respect to poultry, after having lifted a five-year ban on imports of U.S. poultry in November 2019, China agreed to adopt import regulations consistent with the World Organization for Animal Health Terrestrial Animal Health Code; this would potentially limit future import bans imposed due to avian influenza to poultry from the affected U.S. region rather than the entire country. China also agreed to approve for importation 26 aquatic species from the United States, and to streamline its procedures for registering U.S. seafood facilities and products. Technical Barriers to Trade: China agreed to implement the USDA Public Health Information System, an electronic system to provide export health certificates to an importing country in advance of shipment arrival. It also made commitments to provide regulatory certainty and market stability regarding U.S. dairy and infant formula products, rice, distillers' dried grains with solubles, feed additives, and pet foods. It agreed not to undermine market access for U.S. exports that use trademarks and generic terms by recognizing geographical indications (GI) in international agreements. GIs are place names used to identify products that come from certain regions or locations. Status and Outlook : The U.S.-China Phase One agreement is expected to improve opportunities for certain U.S. exporters; however, it may not create notable new market demand. Instead, it may produce a rearrangement of trading patterns between China and its various import suppliers, in which case the market price effects may be limited. Additionally, the coronavirus outbreak is expected to slow China's economic growth in the near-term, and may reduce Chinese overall import demand for agricultural products. It has also been disrupting global supply chains going in and out of China. Therefore, U.S. agricultural exports to China could fall short of the target of $32 billion additional exports to the 2017 base over a two-year period. The agreement provides China some flexibility to meet its purchase commitment. Both the United States and China \"acknowledge that purchases will be made at market prices based on commercial considerations and that market conditions, particularly in the case of agricultural goods, may dictate the timing of purchases within any given year\" (Chapter 6, Article 6.2.1 of the Phase One agreement). Under the agreement, China is not required to repeal any tariffs, but it has reduced certain retaliatory tariffs and will grant one-year tariff exclusions for various agricultural products in order to reach a target level of U.S. imports. Effective February 14, 2020, China halved the additional 5% and 10% retaliatory tariffs that it had imposed on U.S. products in August 2019. Nevertheless, tariffs imposed in April and July 2018, ranging from 2.5% to 55%, remain in place. USDA and USTR have stated that China has also taken a number of other actions to begin implementing its agriculture related commitments. Both China and the United States have indicated they expect to engage in further negotiations on trade during 2020. Soon after taking office in January 2017, the Trump Administration announced its desire to renegotiate the North America Free Trade Agreement (NAFTA) among the three countries. Nonetheless, the United States imposed tariffs on steel and aluminum imports from Canada and Mexico in 2017. The United States also threatened tariffs on imported passenger vehicles, an action that would have a significant impact on both Canada and Mexico. In June 2018, Mexico retaliated against the steel and aluminum tariffs with a 15% tariff on U.S. sausage imports; a 20% tariff on other pork products, certain cheeses, apples, potatoes, and cranberries; and a 25% tariff on whey, blue-veined cheese, and whiskies. The following month, Canada imposed a retaliatory tariff of 10% on certain U.S. products, including dairy, poultry and beef products; coffee, chocolate, sugar and confectionery; prepared food products; condiments; bottled water; and whiskies. A new trade agreement, referred to as the United States-Mexico-Canada Agreement (USMCA), was announced in 2018. The U.S. implementing legislation was enacted on January 29, 2020. Mexico has ratified the USMCA and the Canadian Parliament has begun deliberations on the agreement. After ratification by all three countries, and certification by the United States that all parties have taken actions required under the agreement, the agreement would enter into force. The agricultural provisions of USMCA are summarized below. All food and agricultural products that had zero tariffs under NAFTA is to remain at zero under USMCA. This includes all agricultural imports from Mexico and almost all from Canadaâexcepting certain dairy and poultry products. Canada is to increase market access for U.S. dairy products via TRQs. U.S. dairy imports within a TRQ is to enter Canada duty-free, while imports beyond the quota level face higher over-quota tariff rates of over 200% in many cases. Canada is to replace poultry TRQs under NAFTA with new TRQs. These are expected to lead to greater imports of U.S. eggs, turkey meat, and eggs, but reduce the quantity of U.S. chicken meat that can be imported into Canada duty free. Imports of U.S. poultry products above the set quotas is to face tariffs exceeding 200%. The United States, agreed to provide additional access to Canadian dairy products, sugar, peanuts and peanut products. Canada is to provide treatment and price to U.S. wheat equivalent to those of Canadian wheat if the U.S. wheat variety is registered as being similar to a Canadian variety. Currently, U.S. wheat exports to Canada are graded as feed wheat, and as such command a lower price. Four Members of Congress have requested USTR to work closely with Canada, through the Consultative Committee on Agriculture, to expedite the process for the registration of U.S. wheat varieties in Canada. The United States, Canada, and Mexico are required to treat the distribution of each other's spirits, wine, beer, and other alcoholic beverages as they do for products of national origin. The agreement establishes listing requirements for a product to be sold, along with specific limits on cost markups. Regarding sanitary and phytosanitary measures (SPS), USMCA requires greater transparency in rules and regulatory alignment among the three countries. It also would establish a new mechanism for technical consultations to resolve SPS issues. USMCA includes procedural safeguards for recognition of new geographical indications. USMCA would protect the GIs for food products that Canada and Mexico have already agreed to in trade negotiations with the EU, and would lay out transparency and notification requirements for recognition of any proposed new GIs. In a side letter accompanying the agreement, Mexico confirmed a list of 33 terms for cheese that would remain available as common names for U.S. cheese producers to use in exporting cheeses to Mexico. The list includes some terms that are protected as GIs by the EU. USMCA provisions also would protect certain U.S., Canadian, and Mexican spirits as distinctive products. USMCA signatories agreed to protect the confidentiality of proprietary formula information in the same manner for domestic and imported products. USMCA includes provisions for a Working Group for Cooperation on Agricultural Biotechnology to facilitate information exchange on policy and trade-related matters associated with agricultural biotechnology, an issue that was not covered under NAFTA. Status : The United States removed the tariffs it had imposed on steel and aluminum imports from Canada and Mexico on May 17, 2019, and, in turn, these countries removed their retaliatory tariffs on U.S. imports. USMCA requires ratification by Canada to enter into force. On October 7, 2019, the United States and Japan signed the U.S.-Japan Trade Agreement (USJTA), which provides for limited tariff reductions and quota expansions to improve U.S. access to Japan's market, including for agricultural products. The agreement, which entered into force January 1, 2020, also provides for reciprocal U.S. tariff reductions, largely on industrial goods. Japan previously negotiated agricultural market access provisions with the United States in the context of the Trans-Pacific Partnership (TPP), a 2016 agreement among 12 Pacific-facing nations that the United States did not ratify. Those provisions were folded into the agreement that the remaining TPP countries agreed uponâTPP-11âthat went into force for Japan on December 30, 2018. As Japan began to improve market access for TPP-11 countries, various U.S. agricultural exports to Japan became less competitive compared to products from TPP-11 countries. Under the USJTA, Japan provides the same level of market access to U.S. products included in the USJTA as it provides to exports from TPP-11 member countries. Japan agreed to eliminate or reduce tariffs for certain U.S. agricultural exports and to provide preferential quotas for other U.S. agricultural products. Some products included in TPP-11 such as rice and certain dairy products are not included in the USJTA. Key agricultural provisions of USJTA are provided below. Japan is to reduce tariffs on meat products such as beef and pork or gradually eliminate them. Upon entry into force, tariffs were eliminated for certain products, including almonds, walnuts, blueberries, cranberries, corn, sorghum, and broccoli. Japan is to phase out tariffs in stage s for products such as cheeses, processed pork, poultry, beef offal, ethanol, wine, frozen potatoes, oranges, fresh cherries, egg products, and tomato paste. Japan agreed to provide country-specific quotas (CSQ) to all products that the United States had negotiated CSQs for under TPP, excepting for rice. Products covered by CSQs include wheat, wheat products, malt, whey, processed cheese, glucose, fructose, corn starch, potato starch, and inulin. Japan agreed to reduce the mark-ups on U.S. products that Japanese state trading enterprises import under quotas and sell in the domestic market with an additional price mark-up that makes them more expensive that the domestic product. Under Japan's WTO market access schedule, it reserves the right to temporarily increase tariffs on imports of sensitive agricultural products when they exceed a set threshold, or when the price of the imported product is below a set threshold. Under USJTA, Japan agreed to restrict the use of these additional tariffs (known as safeguards) on U.S. beef, pork, whey, oranges and race horses. Under TPP, the United States had negotiated market access under TRQs that were open to all TPP members, for barley and barley products other than malt; butter; skim and other milk powder; cocoa products; evaporated and condensed milk; edible fats and oils; vegetable preparations; coffee, tea and other preparations; chocolate, candies and confectionary; and sugar. No corresponding U.S. access to these TPP-wide TRQs is included in USJTA. The United States agreed to reduce tariffs on imports of certain perennial plants and cut flowers, persimmons, green tea, chewing gum, certain confectionary products, and soy sauce. The United States also agreed to provid e Japan the opportunity to export more beef by fold ing a country-specific quota for Japan of 200 MT into a larger TRQ designated for \"other countries.\" Status: The Administration took a staged approach to U.S. negotiations with Japan in order to facilitate expedited market access improvements for U.S. agricultural products in Japan. The first stage agreement (USJTA) is much more limited than a traditional U.S. free trade agreement, allowing the USJTA ( P.L. 114-26 ) to take effect without approval by Congress. In consequence, the text does not address non-tariff issues such as sanitary and phytosanitary measures, agricultural biotechnology, technical barriers to trade, or geographical indications. These issues are expected to be covered in a further negotiation, which may commence in 2020. In February 2019, after the USJTA entered into force, Japan reached a trade agreement with the EU under which Japan agreed to recognize more than 200 EU GIs. If USTR were to determine that any of these European GIs poses a barrier to U.S. agricultural exports to Japan, the lack of legal text regarding geographical indications and the absence of a formal dispute settlement mechanism could limit U.S. ability to challenge such a barrier under the USJTA. Both the United States and Japan are members of the WTO, so the United States could challenge potential new trade barriers as inconsistent with Japan's WTO commitments. The Trump Administration's decision to impose tariffs on steel and aluminum affected imports from the EU. In June 2018, the EU responded to the steel and aluminum tariffs by imposing a 25% tariff on imports of U.S. corn, rice, sweetcorn, kidney beans, certain breakfast cereals, peanut butter, orange juice, cranberry juice, whiskies, cigars, and other tobacco products, and a 10% tariff on certain essential oils. The EU also could be affected if the United States were to impose tariffs on passenger vehicles, and could respond with further punitive tariffs against U.S. exports. On October 18, 2019, the United States imposed additional tariffs on $7.5 billion worth of U.S. imports from the EU. The action, authorized by WTO dispute settlement procedures, came after USTR determined that the EU and certain EU member states had not complied with a WTO Dispute Settlement Body ruling recommending the withdrawal of subsidies on the manufacture of large civil aircraft. USTR has indicated that additional tariffs initially will be limited to 10% of the product value on large civil aircraft and 25% on agricultural and other products from the EU. In total, 561 agricultural tariff lines are affected, including cheeses, biscuits, pork products, fish products, fruit products, olives, whiskies, liquors, and wine. The UK, which left the EU in January 2020, is included among the affected countries, and 56 tariff lines of UK products are subject to additional 25% tariffs. Against this background, in October 2018, USTR officially notified the Congress of the Trump Administration's plans to enter into formal trade negotiations with the EU. This action followed a July 2018 U.S.-EU Joint Statement by President Trump and then-European Commission President Jean-Claude Juncker announcing that they would work to reduce tariffs and other trade barriers, address unfair trading practices, and increase U.S. exports of soybeans and certain other products. Previously, in 2016, U.S.-EU negotiations to create a Transatlantic Trade and Investment Partnership (T-TIP) under the Obama Administration stalled after 15 rounds. Among the areas of contention were certain regulatory and administrative differences between the United States and the EU on issues of food safety, public health, and product naming schemes for some types of food and agricultural products. The United States and the EU are the world's largest trade and investment partners. While food and agricultural trade between the United States and the EU27 accounts for less than 1% of the value of overall trade in total goods and services, the EU27 remains a leading export market for U.S. agricultural exports. It accounted for about 8% of the value of all U.S. exports and ranked as the fifth largest market for U.S. food and farm exports in 2019âafter Canada, Mexico, China, and Japan. In 2019, U.S. exports of agricultural and related product exports to the EU27 totaled $12.4 billion, while U.S. imports of agricultural and related product imports from the EU27 totaled $29.7 billion, resulting in a U.S. trade deficit of approximately $17.3 billion. This is the reverse of U.S. trade surpluses with the EU27 during the 1990s. Leading U.S. agricultural exports to the EU27 were corn and soybeans, tree nuts, distilled spirits, fish products, wine and beer, planting seeds, tobacco products, and processed foods. Leading U.S. agricultural imports from the EU27 were wine, distilled spirits, beer, drinking waters, olive oil, cheese, baked goods, processed foods, and cocoa products. In January 2019, USTR announced its negotiating objectives for the agricultural portion of a U.S.-EU trade agreement following a public comment period and a hearing involving several leading U.S. agricultural trade associations. The objectives include greater market access, changes to EU administration of tariff-rate quotas, and changes to a variety of EU regulations. Among regulatory issues, key U.S. objectives include harmonizing regulatory processes and standards to facilitate trade, including sanitary and phytosanitary standards, and establishing specific commitments for trade regarding agricultural biotechnologies. The U.S. objectives also include addressing geographical indications by protecting generic terms for common use. U.S. agricultural interests generally support including agriculture as part of the U.S. negotiating objectives for a U.S.-EU trade agreement. The EU negotiating mandate, however, states that a key EU goal is \"a trade agreement limited to the elimination of tariffs for industrial goods only, excluding agricultural products.\" Several Members of Congress have stated their opposition to the EU's decision to exclude agricultural policies in their negotiating mandate. The U.S.-EU trade negotiations come amid heightened U.S.-EU trade frictions. In response to U.S. Section 232 tariffs on steel and aluminum imports, the EU had retaliated in June 2018 by imposing a tariff increase of 25% on imports of certain U.S. food and beverage products. The value of U.S. agricultural exports to the EU28 (included the UK) targeted by these additional tariffs is approximately $1.2 billion in 2018, or about 9% of total U.S. agricultural exports to the EU28. In October 2019, U.S.-EU trade tensions escalated further when the United States imposed additional tariffs on $7.5 billion worth of certain U.S. imports from the EU, including food products. This actionâauthorized by the WTOâfollowed a USTR investigation initiated in April 2019 under Section 301 of the Trade Act of 1974. Aside from ongoing trade tension, some of the same issues that stalled U.S.-EU agricultural talks in the T-TIP negotiations could prove to be equally intractable today. For food and agricultural products, a series of non-tariff issues stem in part from commercial and cultural practices often enshrined in EU laws and regulations that vary from those of the United Statesânamely differences involving SPS and technical barriers to trade, broadly covering laws and regulations measures intended to protect public healthâas well as differences involving GIs. Status: The outlook for the new U.S.-EU trade talks remains uncertain, given ongoing trade tensions. Whether or not the talks will include food and agriculture is also uncertain, as there continues to be disagreement between the two trading partners about the scope of the negotiations, particularly the EU's intent to exclude agriculture from the talks. Perhaps the overarching goal for the U.S. side is addressing the U.S. trade deficit in agricultural products with the EU. Public statements by U.S. and EU officials in early 2020 signaled that the U.S.-EU trade talks might include SPS and regulatory barriers to agricultural trade. It is not clear, however, that both sides agree which specific types of non-tariff trade barriers might actually be part of the talks. Some press reports indicate that USDA officials have said that selected SPS barriers as well as GIs would need to be addressed. Specific SPS issues important to the U.S. side include the EU's prohibitions on the use of hormones in meat production (see \" U.S.-EU Beef Hormone Dispute \") and pathogen reduction treatments for poultry (see section \" U.S.-EU Dispute Over Pathogen Reduction Treatments (PRTs) \"), and EU restrictions on the use of biotechnology (see section \" Agricultural Biotechnology \"). Other press reports, however, indicate that some EU officials have downplayed the extent that certain non-tariff barriersâsuch as biotechnology product permits, approval of certain pathogen rinses for poultry, regulations on pesticides or food standardsâwould be part of the talks. The United States continues to push for additional concessions from the EU. More formal discussions are expected in spring 2020. Against this background, in October 2018, USTR officially notified the Congress of the Trump Administration's plans to enter into formal trade negotiations with the EU. This action followed a July 2018 U.S.-EU Joint Statement by President Trump and then-European Commission President Jean-Claude Juncker announcing that they would work to reduce tariffs and other trade barriers, address unfair trading practices, and increase U.S. exports of soybeans and certain other products. Previously, in 2016, U.S.-EU negotiations to create a Transatlantic Trade and Investment Partnership under the Obama Administration stalled after 15 rounds. Among the areas of contention were certain regulatory and administrative differences between the United States and the EU on issues of food safety, public health, and product naming schemes for some types of food and agricultural products. The United States and the EU are the world's largest trade and investment partners. While food and agricultural trade between the United States and the EU27 accounts for less than 1% of the value of overall trade in total goods and services, the EU27 remains a leading export market for U.S. agricultural exports. It accounted for about 8% of the value of all U.S. exports and ranked as the fifth largest market for U.S. food and farm exports in 2019âafter Canada, Mexico, China, and Japan. In 2019, U.S. exports of agricultural and related product exports to the EU27 totaled $12.4 billion, while U.S. imports of agricultural and related product imports from the EU27 totaled $29.7 billion, resulting in a U.S. trade deficit of approximately $17.3 billion. This is the reverse of U.S. trade surpluses with the EU27 during the 1990s. Leading U.S. agricultural exports to the EU27 were corn and soybeans, tree nuts, distilled spirits, fish products, wine and beer, planting seeds, tobacco products, and processed foods. Leading U.S. agricultural imports from the EU27 were wine, distilled spirits, beer, drinking waters, olive oil, cheese, baked goods, processed foods, and cocoa products. In January 2019, USTR announced its negotiating objectives for the agricultural portion of a U.S.-EU trade agreement following a public comment period and a hearing involving several leading U.S. agricultural trade associations. The objectives include greater market access, changes to EU administration of tariff-rate quotas, and changes to a variety of EU regulations. Among regulatory issues, key U.S. objectives include harmonizing regulatory processes and standards to facilitate trade, including sanitary and phytosanitary standards, and establishing specific commitments for trade regarding agricultural biotechnologies. The U.S. objectives also include addressing geographical indications by protecting generic terms for common use. U.S. agricultural interests generally support including agriculture as part of the U.S. negotiating objectives for a U.S.-EU trade agreement. The EU negotiating mandate, however, states that a key EU goal is \"a trade agreement limited to the elimination of tariffs for industrial goods only, excluding agricultural products.\" Several Members of Congress have stated their opposition to the EU's decision to exclude agricultural policies in their negotiating mandate. The U.S.-EU trade negotiations come amid heightened U.S.-EU trade frictions. In response to U.S. Section 232 tariffs on steel and aluminum imports, the EU had retaliated in June 2018 by imposing a tariff increase of 25% on imports of certain U.S. food and beverage products. The value of U.S. agricultural exports to the EU28 (included the UK) targeted by these additional tariffs is approximately $1.2 billion in 2018, or about 9% of total U.S. agricultural exports to the EU28. In October 2019, U.S.-EU trade tensions escalated further when the United States imposed additional tariffs on $7.5 billion worth of certain U.S. imports from the EU, including food products. This actionâauthorized by the WTOâfollowed a USTR investigation initiated in April 2019 under Section 301 of the Trade Act of 1974. Aside from ongoing trade tension, some of the same issues that stalled U.S.-EU agricultural talks in the T-TIP negotiations could prove to be equally intractable today. For food and agricultural products, a series of non-tariff issues stem in part from commercial and cultural practices often enshrined in EU laws and regulations that vary from those of the United Statesânamely differences involving SPS and technical barriers to trade, broadly covering laws and regulations measures intended to protect public healthâas well as differences involving GIs. Status: The outlook for the new U.S.-EU trade talks remains uncertain, given ongoing trade tensions. Whether or not the talks will include food and agriculture is also uncertain, as there continues to be disagreement between the two trading partners about the scope of the negotiations, particularly the EU's intent to exclude agriculture from the talks. Perhaps the overarching goal for the U.S. side is addressing the U.S. trade deficit in agricultural products with the EU. Public statements by U.S. and EU officials in early 2020 signaled that the U.S.-EU trade talks might include SPS and regulatory barriers to agricultural trade. It is not clear, however, that both sides agree which specific types of non-tariff trade barriers might actually be part of the talks. Some press reports indicate that USDA officials have said that selected SPS barriers as well as GIs would need to be addressed. Specific SPS issues important to the U.S. side include the EU's prohibitions on the use of hormones in meat production (see \" U.S.-EU Beef Hormone Dispute \") and pathogen reduction treatments for poultry (see section \" U.S.-EU Dispute Over Pathogen Reduction Treatments (PRTs) \"), and EU restrictions on the use of biotechnology (see section \" Agricultural Biotechnology \"). Other press reports, however, indicate that some EU officials have downplayed the extent that certain non-tariff barriersâsuch as biotechnology product permits, approval of certain pathogen rinses for poultry, regulations on pesticides or food standardsâwould be part of the talks. The United States continues to push for additional concessions from the EU. More formal discussions are expected in spring 2020. During 2018 and 2019, the Secretary of Agriculture used his authority under the Commodity Credit Corporation Charter Act to initiate two ad hoc trade assistance programs in response to foreign trade retaliation targeting U.S. agricultural products. The trade aid packages were part of the Administration's effort to provide short-term assistance to farmers for the temporary loss of important international markets. On July 24, 2018, USDA announced the first \"trade aid\" package, which targeted production of selected agricultural commodities in 2018 and was valued at up to $12 billion. On May 23, 2019, USDA announced a second package, which targeted production of an expanded list of commodities and was valued at up to an additional $16 billion. Thus, the two years of combined trade assistance were valued at up to $28 billion. Both trade aid packages included (1) a Market Facilitation Program (MFP) of direct payments to producers of commodities most affected by the trade retaliation, (2) a Food Purchase and Distribution Program (FPDP) designed to partially offset lost export sales of affected commodities, and (3) an Agricultural Trade Promotion (ATP) program to expand foreign markets. The largest part of the aid is two years of MFP payments initially valued at a combined $24.5 billion (up to $10 billion in 2018 and $14.5 billion in 2019). Status: As of February 10, 2020, USDA estimates that it has spent $8.6 billion under the 2018 MFP and $14.2 billion under the 2019 MFP. Payments of this magnitude could attract international attention about whether they are consistent with WTO rules and U.S. commitments on domestic support, as some WTO member countries are questioning whether this additional aid violates U.S. spending limits under the WTO. The trade aid packages raise other potential questions as well. For instance, if the U.S.-China Phase One trade agreement does not produce the commodity purchases promised by China, or if commodity prices remain relatively low, should another trade aid package, or some alternative compensatory measure, be provided in 2020, and possibly beyond? If MFP payments are provided in the future, should USDA revise its payment formulation to provide a broader distribution of payments across the U.S. agricultural sector? India is the world's second most populous country after China. Since 2000, its economy has been the fastest growing in the world. Given the rapid growth in population and income among a large segment of the population, demand for higher-value food products such as fruits, nuts, dairy products, and other livestock products, is expected to increase among Indian consumers. While India is among the world's largest producers and consumers of a range of crop and livestock commodities, USDA projects India will continue to be an important importer of dairy products, vegetable oils, pulses, tree nuts, and fruit, and that it will continue to be a major exporter of rice, cotton and buffalo meat. U.S. agricultural exports to India have increased since 2015, reaching $1.6 billion in 2017 ( Figure 2 ). In 2018, U.S. exports declined to $1.5 billion, coinciding with India's imposition of retaliatory tariffs on imports of U.S. almonds, walnuts, apples, chickpeas, and lentils, but U.S. exports rebounded to $1.8 billion in 2019 due to increased sales of cotton and tree nuts (largely pecans, pistachios, and dried coconut). Tree nuts (mainly almonds), cotton, and fresh fruit are key U.S. exports to India. However, other U.S. high-value products are registering rapid growth. For example, U.S. dairy exports to India grew by almost 300% from $16 million in 2015 to $60 million in 2019. In 2019, the United States imported agricultural products valued at $2.6 billion from India. Spices, rice, essential oils, tea, processed fruit and vegetables, and other vegetable oils are the leading U.S. imports from India. U.S.-India trade negotiations follow a period of trade tensions. In March 2018, the United States levied additional tariffs on steel and aluminum imports from India. India responded by identifying certain U.S. food products for retaliatory tariffs but did not levy them until June 16, 2019, after the United States terminated preferential treatment for India under the Generalized System of Preferences (GSP). India's retaliatory tariffs range from 10% to 25% on imports of U.S. chickpeas, shelled almonds, walnuts, apples, and lentils. Both countries' tariffs are likely to become an issue if the United States and India undertake a major trade negotiation, as USTR has proposed. India's tariffs and non-tariff barriers have prevented greater market penetration of U.S. agricultural products. India maintains very high tariffs on many products, for example 60% on flowers, 100% on raisins, and 150% on alcoholic beverages. Since 2017, a system of annual import quotas on pulses has restricted U.S. exports of pulses to India. U.S. exports of wheat and barley to India are currently restricted due to its zero-tolerance standard for certain pests and weeds, and restrictions also exist on imports of livestock genetic material. Similarly, processed products, including ethanol, are subject to various restrictions that prevent U.S. exports to India. India bans imports of tallow, fat, and oils of animal origin. India's complex requirements for U.S. dairy products have been a barrier for expanding U.S. exports. In 2015, India revised its health certificate requirement for pork imports. Since then, the United States has been seeking approval to export pork to India. USTR asserts that India's customs regulations are not transparent or predictable. India's approval process for genetically engineered products are slow and not transparent. India maintains a large and complex program for public food stockholding, both to distribute food to poor consumers and to stabilize market prices, essentially subsidizing domestic production. India provides a broad range of support to its agricultural sector. In May 2018, the United States argued at the WTO that India was under-reporting its price supports for rice and wheat. In November 2018, the United States questioned India's price support for cotton, while Australia has questioned India's price support for sugarcane. Status : In 2019, in response to various U.S. concerns over India's trade barriers, the United States revoked India's eligibility for preferential tariff treatment under the U.S. GSP. Total value of U.S. imports of agricultural products from India were down 1% in 2019 from $2.7 billion in 2018 to $2.6 billion in 2019. USTR has stated that it hopes to reach an agreement in 2020 that will, among other things, provide greater access to the Indian market for U.S. agricultural products, potentially in exchange for U.S. restoration of India's eligibility under GSP. On February 6, 2020, the Trump Administration announced that the United States intends to negotiate a comprehensive trade agreement with Kenya using the authority under P.L. 114-26 . The Administration asserts that such a trade agreement will complement Africa's regional integration efforts, including as part of the African Continental Free Trade Area (AfCFTA), to which the United States has pledged support. Kenya hosts three international agricultural research centers that focus on innovations, including agricultural biotechnology, to sustainably improve global food security. These institutions are the International Livestock Research Institute, the World Agroforestry Center, and the International Centre of Insect Physiology and Ecology. Kenya is an emerging middle-income country, home to more than 47 million people with an estimated population growth rate of 2.5% in 2017. USDA projects Kenya's real GDP per capita to grow at an annual rate of about 4% though 2031. With anticipated growth in population and per capita income, Kenya has the potential to increase its imports of food and other agricultural products. Kenya's top five agricultural imports are wheat, palm oil, sugar, corn and rice. Its top exports from the United States are wheat, vegetable oils excluding soybean oil, pulses, coarse grains, and other products that include many prepared food products ( Figure 3 ). Kenya is a beneficiary of the African Growth and Opportunity Act, most recently extended in P.L. 114-27 , under which it has duty-free access to the U.S. market for 6,400 products including agricultural products. In 2019, the United States imported agricultural products valued at $126 million from Kenya, with major products being macadamia and cashew nuts, coffee, tea, roses, and non-edible vegetable and nut oils. Kenya's MFN tariffsârates that apply to imports from the United Statesâare relatively high. For example, simple average MFN tariffs for animal products are 23.1%, dairy products are 51.7%, fruit and vegetables are 22%, cereals and preparations are 22.2%, sugar is 40%, and fish products are 24.8%. Other concerns raised by USDA include a Kenyan ban on imports of genetically engineered (GE) agricultural products (although it has approved field trials for GE cotton and drought and insect resistant corn), bans on imports of U.S. whole peas and lentils, and had a ban on wheat from the U.S. Pacific Northwest over concerns regarding a certain fungus. In February 2020, Kenya adopted a phytosanitary protocol that allows wheat growers in Washington State, Oregon, and Idaho access to Kenya's wheat market, potentially allowing increased U.S. wheat exports to Kenya. Status : USTR has said it plans to officially notify Congress of its intent to start negotiations following consultations with Congress as required by the Bipartisan Congressional Trade Priorities and Accountability Act of 2015 ( P.L. 114-26 ). Subsequently, USTR is to publish notices in the Federal Register requesting public comment on the direction, focus, and content of the trade negotiations with Kenya. USTR is to publish objectives for the negotiations at least 30 days before trade negotiations begin. Some Members of Congress have expressed their support for a free trade agreement with Kenya. In January 2020, the UK left the EU. It remains a member of the EU customs union, so U.S.-UK trade continues to be governed by agreements between the United States and the EU in addition to WTO rules. However, the UK has announced its intention to withdraw from the EU customs union on December 31, 2020. Thereafter, U.S.-UK trade will occur under WTO rules unless a separate agreement is reached between the United States and the UK. The UK entered the WTO as a member of the EU, and does not have its own schedule of commitments under the WTO. U.S.-UK trade would thus continue to be governed by the EU WTO schedule, with some confusion regarding what share of quota and subsidy commitments made by the EU will henceforth apply to the UK. Therefore, some Members of Congress have indicated that a comprehensive U.S.-UK trade agreement should be a priority for the United States. The UK has accounted for about 1.3% of total U.S. agricultural exports from 2015 to 2019. Major U.S. exports are wine and beer, tree nuts, prepared food, soybeans, live animals and other products ( Figure 4 ). The United States does not export notable quantities of meat products to the UK, and the Trump Administration and some Members of Congress and U.S. agricultural industry would like to expand exports of these products in the post-Brexit environment. As a member of the EU, the UK posed the same set of trade barriers to U.S. agricultural exports as those discussed under \" U.S.-EU Agricultural Trade \". In particular, hormone treated beef, chlorine-washed poultry, and bio-engineered food products have faced restrictions in accessing EU markets. The UK has sent mixed signals regarding these issues and has hinted that it may allow imports of genetically engineered U.S. agricultural products. At the same time, some reports indicate the UK will not allow imports of chlorine-washed chicken meat. Among other goals for U.S. agricultural trade, USTR has identified reducing or eliminating tariffs, providing adjustment periods for U.S. import-sensitive products before initiating tariff reduction, eliminating non-tariff barriers that discriminate against U.S. agricultural goods, improving UK's TRQ administration, promoting regulatory compatibility, and establishing commitments for trade in agricultural biotechnology products. USTR has also articulated specific goals regarding sanitary and phytosanitary provisions, customs and trade facilitation, rules of origin, and technical barriers to trade. Some Members of Congress have requested that improved market access for U.S. rice be an objective of U.S. negotiators. Status : On October 16, 2018, the Trump Administration notified Congress of proposed trade agreement negotiations with the UK. The UK could not formally negotiate or conclude a new agreement until it exited the EU, which occurred on January 31, 2020, and any agreement could not take effect until the UK exits the EU single market and customs union. Given the proposed scope of the negotiations, any resulting agreement would likely be subject to ratification by Congress. The World Trade Organization is an international organization that administers the rules and agreements negotiated among its 164 members to eliminate trade barriers and govern trade. It also serves as an important forum for resolving trade disputes through its committee structures and its Dispute Settlement Body, which approves reports issued by panels of legal experts and a separate Appellate Body. The United States was a major force behind the establishment of the WTO in 1995. Under the WTO's Agreement on Agriculture (AoA), agreed in 1995, national agricultural policiesâincluding domestic farm support, agricultural export subsidies, and restrictive import controlsâwere placed under a multilaterally agreed-upon set of disciplines for the first time. WTO members agreed to reform their domestic agricultural support policies, increase access to imports, and reduce export subsidies. The disciplines on these three \"pillars\" of agricultural policy involved freezing (or \"binding\") protective measures and subsidies at base period levels, then instituting annual reductions from the bound levels. Article 15 of the AoA granted developing and least-developed countries special rights or extra leniencyâtermed \"special and differential treatment\"âin the implementation of their policy commitments. Specifically, they had longer periods over which to reduce subsidies and to improve market access. They were also allowed to retain certain subsidies that were prohibited for other countries. During the AoA's early years, Article 13, known as the Peace Clause or \"due restraint\" clause, provided additional impetus for reform. The Peace Clause provided temporary protection for market-distorting domestic support and export subsidy measures from challenges under other WTO provisions, as long as these measures complied with certain requirements. However, such subsidies would be open to challenge after the Peace Clause expired around January 2004. The AoA was envisioned as a first step in the process of global market liberalization in the agricultural sector. The impending expiration of the Peace Clause coupled with Article 20's directive to continue the reform process led WTO members to launch the Doha Round of negotiations in 2001. But, the Doha Round failed to reach consensus on formulas to reduce tariffs and agricultural subsidies, due in part to disagreements among developing countries that wished to retain their special and differential treatment under the AoA and wealthier countries that wanted to limit such preferences. The Doha Round has been at an impasse since 2009. The WTO's effectiveness as a negotiating body for broad-based trade liberalization and its role in resolving trade disputes therefore have come under intensified scrutiny in recent years. The WTO has struggled to address newer issues, such as digital trade and regulations affecting services. In addition, the Appellate Body is effectively non-functional due to the United States' decision to block the nomination of members, which prevents it from having a quorum needed to resolve disputes. Status: USTR has stated that WTO institutional reform is a priority in 2020. Some Mof Congress have voiced their agreement. The WTO's chair for agricultural negotiations may circulate a negotiating framework for the June 2020 meeting of WTO trade ministers in Kazakhstan that includes rules designed to increase sustainable agricultural production. The meeting may also consider a proposal by a group representing 19 countries, known as the Cairns Group, to \"cap and reduce by at least half the current sum of global agricultural trade- and production-distorting domestic support entitlements by 2030.\" Under the AoA, the United States has committed to limit its domestic support program spending deemed most trade-distorting (referred to as \"amber box\" outlays) to $19.1 billion per year. The AoA spells out the rules for countries to determine whether their policies are potentially trade-distorting, how to calculate the costs of any distortion using a specially defined indicator, the \"Aggregate Measure of Support\" (AMS), and how to report those costs to the WTO in a public and transparent manner. While the AMS is subject to a spending limit, the AoA provides four potential exemptions from the AMS spending limit. First, if a program's outlays are considered to be minimally trade distorting or non-trade distorting (in accordance with specific criteria listed in Annex 2 of the AoA), then they may qualify as \"green box\" programs and not be included in the AMS. Second, if program spending is trade-distorting but has offsetting features that limit the production associated with support payments, then they may qualify as \"blue box\" programs and not be included in the AMS. Third, if AMS outlays for a specific commodity are sufficiently small relative to the output value of that commodity (product-specific de minimis), they may be exempted. Finally, if aggregate AMS outlays are small relative to the value of total agricultural production (non-product-specific de minimis)âthen they may be exempted. Any AMS left over after applying these four exemptions constitutes the amber box. Since the WTO's establishment, the United States has generally met its WTO amber box spending commitment. However, in some years U.S. compliance has hinged on judicious use of de minimis exemptions, which permit it to exclude certain spending from being considered under its amber box limit (see Figure 5 ). To date, no WTO member has challenged these exemptions. Since 2010, U.S. outlays on potentially market-distorting farm programs have been trending upward ( Figure 5 ). From 2011 through 2016, AMS outlays (amber box plus de minimis exemptions) averaged $14.6 billion per year. However, several policy developments since 2016 have created uncertainty about whether the United States will remain in compliance with the rules and spending limits for domestic support programs that it has agreed to in the WTO. These developments are, first, farm program changes under both the 2018 farm bill ( P.L. 115-334 ), which expanded payment eligibility and eliminated certain programs from payment limits, and, second, USDA trade aid programs implemented in 2018 and 2019 under other statutory authorities in response to foreign trade retaliation targeting U.S. agricultural products (see \" Trade Aid in Response to Trade Retaliation \"). U.S. AMS spending is estimated to have been higher in 2017 through 2019, based on CRS compilation of USDA program data. Outlays in 2017 are estimated to have been $16.5 billion; however, the classification of $10.1 billion in program spending as de minimis exemptions would limit amber box outlays to $6.3 billion. The addition of the Administration's two MFP \"trade aid\" payments, valued at $8.6 billion in 2018 and approximately $10.7 billion in 2019, are estimated to push total AMS outlays above the U.S. amber box spending limitâto $22.4 billion in 2018 and $23.6 billion in 2019. Whether the United States will violate its spending commitment or not would be expected to depend on the extent that de minimis exemptions apply for those two years. The United States has yet to notify spending to the WTO under any of the trade assistance programs, so the exact WTO spending classification is currently unknown. However, past practice can serve as a guide for the likely notification. The FPDP and ATP programs for 2018 and 2019 are expected to have been implemented in a similar manner during both years. USDA outlays under food purchase and distribution programs have historically been notified to the WTO as green box compliant and thus not subject to any spending limit. Trade promotion programs, such as ATP, are not notified under domestic support, because they do not involve direct payments to producers. Thus, the FPDP and ATP programs are not expected to affect the United States' ability to meet its WTO commitments. Payments under the two MFP programs were structured differently during 2018 and 2019. As a result, they are likely to be notified under different WTO classifications. The specific manner of determining how payments are made to individual producers is likely to determine their WTO status. Potential AMS classifications are: USDA's MFP payments for 2018 were based on each farm's harvested production of eligible crops during 2018 times a fixed per-unit payment rate. Payments to dairy were based on historical production, while hog payments used mid-year inventory data. Under this specification, 2018 MFP payments are likely to be notified as coupled, product-specific AMS and would count against the U.S. annual spending limit of $19.1 billion (unless they are exempted under the product-specific de minimis exemption). USDA's MFP payments for 2019 were coupled to a producer having planted at least one eligible commodity within the county, but they are independent of which commodity or commodities were planted. Under this specification, the 2019 MFP payments would appear to be coupled to planted acresâa producer has to plant an eligible crop to get a paymentâbut are non-product-specific, thus possibly notifiable as non-product-specific AMS. Status: Most recent studies suggest that, for U.S. program spending to exceed the $19.1 billion cumulative spending limit, even with the addition of large MFP payments and higher traditional program support levels, a combination of events would have to occur that would broadly depress commodity prices. Perhaps more relevant to U.S. agricultural trade is the concern that, because the United States plays such a prominent role in most international markets for agricultural products, any distortion resulting from U.S. policy could be both visible and potentially vulnerable to challenge under WTO rules. Since the inception of the WTO in 1995, the United States has initiated 46 WTO dispute cases related to agriculture. Of these cases, 34 were fully or partially decided in favor of the United States by the WTO panel hearing the case. In September 2016, USTR filed a dispute settlement case (DS511) at the WTO over China's domestic agricultural support policies, alleging they were inconsistent with WTO rules and commitments. USTR contended that the level of support that China provided for rice, wheat, and corn had exceededâby nearly $100 million from 2012 through 2015âthe level to which China had committed to when it joined the WTO. USTR also asserted that China's price support for domestic production had been above the world market prices since 2012, thereby creating an incentive for Chinese farmers to increase production of the subsidized crops, which in turn displaced imports from the United States and elsewhere. In December 2016, USTR requested that the WTO establish a dispute settlement panel to examine China's domestic support levels for these crops. On February 28, 2019, the WTO dispute settlement panel found that China had exceeded its domestic support limits for wheat and rice in each year between 2012 and 2015 and therefore was not in compliance with its WTO commitment. The panel made recommendations that China change its calculations of reference prices and domestic support in order to comply with its WTO commitments. The panel did not make a ruling on corn because China had already made changes to its support for corn that were found to be less trade distorting than the method used prior to 2015. Status: Under the U.S.-China Phase One trade agreement, China stated that it will respect its WTO obligations and publish in its official journal its laws, regulations and other measures pertaining to its domestic support programs and policies. On December 15, 2016, USTR filed another WTO dispute settlement case (DS517) against China, alleging that China administered its TRQs for wheat, rice, and corn in such a way that the duty-free quotas were never filled, even when imported grains were priced lower than domestic grains. USTR stated that China's TRQ administration appeared to restrict imports and failed to provide sufficient information to permit the processing of quota applications and importation. On September 22, 2017, a WTO dispute settlement panel was established on China â Tariff Rate Quotas for Certain Agricultural Products . On April 18, 2019, the panel ruled in favor of the United States, stating that \"China's administration of its TRQs for wheat, rice and corn were inconsistent with its obligations under the WTO to administer TRQs on a transparent, predictable and fair basis.\" The panel recommended that China make changes to its TRQ administration to conform to its WTO obligations. Status : In the U.S.-China Phase One trade agreement, China stated that it will ensure that its TRQ measures conform with the WTO panel ruling. In May 2018, the United States asserted at the WTO that India had not accurately notified the WTO of its spending on its market price support for rice and wheat for the marketing years 2010/11 through 2013/14. The United States alleged that India's market price support for wheat and rice exceeded its allowable levels of trade distorting domestic support under the WTO. In November 2018, the United States also challenged India's domestic support for cotton at the WTO, stating that it exceeded its allowable level under its WTO commitments. At about the same time, Australia, Brazil, and Guatemala challenged India's level of domestic support for sugar, charging that India had violated its WTO commitment levels. In February 2019, the United States further challenged India at the WTO, stating that it had substantially underreported its market price support for chickpeas, pigeon peas, black matpe (a type of black lentil), mung beans, and lentils. According to USTR, when calculated using the AoA methodology, India's market price support for each of these pulses has exceeded the allowable levels of trade-distorting domestic support under India's WTO commitments. The United States' challenge to India's domestic support for rice and wheat was raised at the May 2018 WTO Committee on Agriculture meeting. USTR raised the issue concerning India's cotton price support during the November 2018 committee meeting, and the challenge against India's domestic support for pulses was raised at the February 2019 meeting. Status: USTR may continue challenging India's domestic support for agriculture at upcoming WTO Committee on Agriculture (COA) meetings and, if necessary, could pursue these concerns through WTO's dispute settlement mechanism. India's domestic support for agriculture could be an issue during U.S.-India trade negotiations or during the discussions related to WTO reform on agriculture. The U.S. shift toward greater use of domestic trade laws and less reliance on the WTO to address concerns about other countries' trade policies could also produce unintended consequences as trading partners consider responding to a pattern of increasing U.S. farm support outlays over the past decade. For example, in lieu of using the WTO's dispute settlement process to have an independent panel resolve disputes, countries may choose to use trade remedy investigations performed by their national authorities to impose anti-dumping (AD) duties on products found to be sold below cost and countervailing duties (CVD) on imports found to be unfairly subsidized or otherwise traded unfairly. Under the Article 13 of the 1995 WTO Agreement on Agriculture (AoA), a provision known as the Peace Clause kept members from taking action against domestic subsidies of WTO members who complied with their AoA commitments. Article 13's protection expired in January 2004, making countries with subsidies to their agricultural sectors vulnerable to AD or CVD actions by their trading partners. Since then, a number of challenges to U.S. imports have involved repeated or multiple investigations into the same products (examples include Mexican investigations into apples and the Peruvian investigation into corn). Large trade aid payments to the U.S. farm sector in 2018 and 2019 have raised new questions from some WTO members, who may perceive these payments as providing an unfair advantage for the U.S. agricultural sector. When a country initiates an AD or a CVD investigation of U.S. agricultural exports, the U.S. government and the affected industries may participate in the investigation by providing evidence, such as showing that any subsidies were permissible under WTO rules or that the imposition of duties is not justified. U.S. exporters may also challenge an AD or CVD ruling under free trade agreements, such as NAFTA or USMCA in the future. A third option is for the United States to bring a claim via the WTO dispute settlement process, alleging that the trading partner has violated the WTO Anti-Dumping Agreement or the Agreement on Subsidies and Countervailing Measures. However, the WTO Appellate Body, which hears appeals of cases from WTO dispute settlement panels, currently lacks a sufficient number of judges to issue rulings, because the United States has blocked the appointment of judges to replace those whose terms have expired. This means that the Appellate Body is unable to adjudicate disputes. Peru currently imposes countervailing duties on U.S. ethanol imports. In May 2019, Colombia imposed preliminary duties on U.S. ethanol for a four-month period during a countervailing duty investigation. In 2018, Peru initiated a similar investigation into U.S. corn, and China launched an investigation into U.S. sorghum, although neither case has resulted in countervailing duties to date. Status : Over the years, trading partners have expanded the scope of U.S. programs that they considered to be \"actionable\"âthat is, potentially subject to punitive duties. In some cases, programs other than those that the United States reports to the WTO under its amber box commitments have been the subject of foreign government investigations. These have included direct payments to farmers, subsidies for biodiesel and ethanol, export credit guarantees, farm ownership and operating loans, and Market Access and Foreign Market Development Programs operated by the Foreign Agricultural Service. In 2019, a European Parliament report suggested that perhaps the U.S. Environmental Quality Incentives Program could be considered an unfair subsidy to the U.S. farm sector. Given the WTO's limited ability to resolve disputes though legal procedures at present, the United States may have difficulty challenging duties levied on U.S. agricultural products by a country with which the United States does not have a trade agreement that includes dispute resolution provisions. SPS measures are laws, regulations, standards, and procedures that governments employ as \"necessary to protect human, animal or plant life or health\" from the risks associated with the spread of pests, diseases, or disease-carrying and causing organisms, or from additives, toxins, or contaminants in food, beverages, or feedstuffs. Examples include product standards, requirements that products be produced in disease-free areas, quarantine and inspection procedures, sampling and testing requirements, residue limits for pesticides and drugs in foods, and limits on food additives. Technical barriers to trade (TBTs) cover both food and non-food traded products. TBTs in agriculture include SPS measures, but also include other types of measures related to health and quality standards, testing, registration, and certification requirements, as well as packaging and labeling regulations. Both SPS and TBT measures regarding food safety and related public health protection are addressed in various multilateral trade agreements and are regularly notified to and debated within both the SPS Agreement and TBT Agreement within the WTO. Under the agreements, countries are encouraged to observe established and recognized international standards, and avoid any improper use of SPS and TBT measures that might create barriers to trade that are not supported by science. Examples of prominent U.S. trade concerns involving SPS and TBT issues include restrictions in some global markets on the use of agricultural biotechnology (see section \" Agricultural Biotechnology \"), EU prohibitions on the use of hormones in meat production (see \" U.S.-EU Beef Hormone Dispute \"), and the use of pathogen reduction treatments for poultry (see section \" U.S.-EU Dispute Over Pathogen Reduction Treatments (PRTs) \"). Bilateral and regional free trade agreements (FTAs) between the United States and other countries address SPS and TBT matters. Provisions in most U.S. FTAs have generally reaffirmed rights and obligations of both parties under the WTO SPS and TBT agreements. Some FTAs have resulted in the establishment of a standing bilateral committee to enhance understanding of each other's measures and to consult regularly on related matters. Some FTAs have included side letters or agreements for the parties to continue to cooperate on scientific and technical issues, which in some cases may be related to certain specific market access concerns. However, to date, most FTAs have not addressed specific non-tariff trade concerns directly. In the early 2010s, as part of the lead up to negotiations , with the EU and with Asia-Pacific countries, there were active efforts to \"go beyond\" the rules, rights, and obligations in the WTO SPS and TBT Agreements, as well as beyond commitments in existing U.S. FTAs. These efforts were often referred to as \"WTO-Plus\" rules, or alternatively, as \"SPS-Plus\" and \"TBT-Plus\" rules, and they were intended to address concerns that trade negotiations might not adequately address SPS concerns and cover \"all significant barriers in a single comprehensive agreement.\" Related issues involved the need to more effectively address enhanced regulatory cooperation and coherence between trading partners in an FTA. Many in Congress also continued to call for \"effective rules and enforceable rules to strengthen the role of science\" to resolve international trade differences in FTA negotiations. Status: Statements by USDA and EU officials in early 2020 signaled that issues involving SPS barriers and regulatory cooperation could become part of the U.S.-EU Trade Agreement negotiations. Other statements by USDA officials further indicated that certain long-standing SPS disputesâincluding the EU's continued ban on the use of hormones and certain pathogen reduction treatments in meat productionâmight also be part of the negotiations. These and other non-tariff barriers continue to be actively debated as part of the official U.S. trade agenda. Among U.S. concerns involving the application of such measures in some countries is the perception that their use may not be based on accepted science or on international standards, and that they instead constitute disguised protectionist barriers to U.S. exports. In recent developments, both USMCA and the U.S.-China Phase One trade agreement incorporated policy changes regarding SPS and TBT measures that go beyond the rules, rights, and obligations in the WTO. Those changes also go beyond commitments in existing U.S. trade agreements. Specifically, according to the U.S. International Trade Commission, USMCA \"goes further [than previous agreements] in requiring transparency and encouraging harmonization or equivalence of SPS measures\" and incorporates all of the proposed enhanced TPP disciplines \"in the areas of equivalence, science and risk analysis, transparency, and cooperative technical consultations.\" Some industry representatives claim USMCA \"goes beyond TPP in establishing deadlines for 'import checks,' by requiring importing parties to inform exporters or importers within five days of shipments being denied entry.\" The final U.S.-China Phase One trade agreement also requires both parties to \"engage each other cooperatively\" on agriculture-related technical and SPS measures, including \"risk communication.\" It further requires that China implement a phytosanitary protocol to allow the importation of U.S. agricultural crops, and establish various protocols and certificate requirements. Both of these U.S. FTAs are notable in that they specifically address agricultural biotechnology in the agreement. Outside of the FTA negotiation process, various U.S. federal agencies regularly address trade concerns involving SPS and TBT measures as part of their day-to-day oversight and regulatory responsibilities. For example, the United States maintains ongoing interagency processes and mechanisms to identify, review, analyze, and address foreign government standards-related measures that may function as barriers to trade. These activities are coordinated through the USTR-led Trade Policy Staff Committee, which comprises representatives from several federal agencies, including USDA, the Department of Commerce (DOC), and the State Department. USTR also chairs an interagency group (i.e., both USDA and non-USDA agencies with SPS and TBT responsibilities) that meets weekly to review SPS and TBT measures involving globally traded goods that are notified to the WTO, as required under the SPS and TBT agreements. These agency officials also work with their international counterparts on an ongoing basis on various trade concerns involving SPS and TBT measures. USTR tracks issues related to SPS and TBT measures as part of a series of ongoing annual reports. In addition, USDA's Animal and Plant Health Inspection Service (APHIS) administers various regulatory and control programs pertaining to animal and plant health and quarantine, humane treatment of animals, and the control and eradication of pests and diseases. APHIS also oversees SPS certification requirements for imported and exported agricultural goods. This work is ongoing. Status: While specific SPS and TBT issues regarding individual agricultural commodities generally fall outside most formal FTA negotiations, statements by USDA officials in early 2020 have signaled that certain issues that arise from normal day-to-day operations within the Executive Branch could become part of the U.S.-EU trade agreement negotiations. Press reports indicate that such issues could include EU concerns involving phytosanitary certificates for U.S. imports of apples and pears from some EU countries as well as post-arrival requirements for U.S. imports of sheep and goat semen from the EU. U.S. concerns include the EU's restrictions on the use of agricultural chemicals and biotechnology, animal cloning, pesticide maximum residues limits, and import requirements for live cattle and animal byproducts. Agricultural biotechnology refers primarily to the commercial development of plants and animals through recombinant DNA techniques to provide certain desired characteristics, primarily herbicide tolerance and pest resistance. More recently, the term has come to encompass a range of new technologies that manipulate genetic material through targeted in vivo or in vitro techniques, popularly referred to as genomic \"editing\" (e.g., CRISPR-Cas9) rather than just recombinant DNA techniques. U.S. soybean, corn, cotton, and sugar beet producers have rapidly adopted genetically engineered (GE) varieties of these crops since commercialization began in the mid-1990s. Globally, the United States leads in cultivating GE crops, accounting for nearly 40% of total acres growing GE crops worldwide. Elsewhere in the world, the adoption and cultivation of GE crops by both producers and consumers are mixed. Argentina and Brazil, for example, are major cultivators and exporters of GE corn and soybeans. India is a major cultivator of GE cotton. EU policy is more complicated. Through labeling requirements, strict traceability rules for imported food and commodities, and comparatively strong democratic pressures from the public at local levels, the EU has made cultivation and sale of GE foods and crops very difficult. Moreover, while the European Commission (EC) has approved varieties of GE commodities for import and marketing, individual member states may maintain bans. This opposition in the EU has also been a factor in opposition to GE crops in less developed countries. Many African countries have largely followed the EU in restricting or banning the commercial cultivation of GE crops, confining cultivation mostly to field trials and greenhouse containment. In March 2018, the U.S. Secretary of Agriculture stated that the United States will not regulate plants created through genomic editing as long as they are developed without using a plant pest as the donor or vector, and are not plant pests themselves. In contrast, the European Court of Justice ruled in July 2018 that organisms obtained by mutagenesis are genetically modified organisms (GMOs) and are, in principle, within the scope of the GMO Directive, which governs the deliberate release of GMOs into the environment. The European Court considers the risks posed by new mutagenic techniques such as gene editing (CRISPR-Cas9), to be similar to crops created from transgenesis, where GE crops have genetic material from other, unrelated organisms introduced into the host plant. China's reluctance to approve GE crops or GE imports remains a source of frustration for U.S. agricultural interests. Nonetheless, U.S.-developed GE varieties appear to be grown in China despite Chinese laws banning their cultivation. In September 2016, China agreed to improve its agricultural biotechnology approval process and, in January 2019, it announced approval of five new GE traits in imported crops for processing, the first new approvals since June 2017. At the same time, the ministry amended regulations on safety assessment, import approval, and labeling of agricultural GMOs without notifying the changes to the WTO, nor soliciting comments from stakeholders. In the U.S.-China Phase One trade agreement, China agreed to establish a predictable and risk-based regulatory regime with respect to its safety evaluation of agricultural biotechnology. With respect to GE products for animal feed or further processing, China also agreed to reduce the time between submission of applications for authorization and a final decision to approve or disapprove. For the first time in an FTA, the USMCA specifically includes provisions to improve transparency and coordination in approving and bringing to market products of agricultural biotechnology. USMCA provisions will cover crops produced with all biotechnology methods, including recombinant DNA and gene editing. Trade negotiations concerning agricultural biotechnology also involve labeling issues and other provisions that address the unintended presence of unapproved GE products in food and commodity imports. In 2016, Congress enacted P.L. 114-216 , comprehensive legislation to govern the mandatory labeling of bioengineered foods, a term defined in the act and similar to the terms GE foods and GMOs . USDA's Agricultural Marketing Service established the National Bioengineered Food Disclosure Standard to regulate the mandatory disclosure of bioengineered foods and food ingredients to consumers. Food manufacturers, retailers, and importers are responsible for making disclosures. Importers are responsible for ensuring that all imported bioengineered foods comply with the new regulation. Implementation of the labeling standard began on January 1, 2020, and compliance is voluntary until January 1, 2022, when it becomes mandatory. The labeling standard does not require refined products derived from bioengineered crops (e.g., refined soy oil, high-fructose corn syrup) to be labeled if the modified genetic material is not detectable in the food product. The Agricultural Marketing Service stated that it does not expect the new regulation to disrupt foreign trade. Status: A key objective of U.S. trade negotiations has been to establish a common framework for GE approvals and adoption. This includes labeling practices consistent with the U.S. guidelines and harmonized regulatory procedures concerning GE presence in products that are consistent with the Codex Alimentarius Commission Annex on Food Safety Assessment in Situations of Low-Level Presence of Recombinant-DNA Plant Material in Food. This general policy was reiterated through publication of the June 2019 Executive Order on Modernizing the Regulatory Framework for Agricultural Products . For the first time in an FTA, the USMCA specifically includes provisions to improve transparency in approving and bringing to market products of agricultural biotechnology. The Phase One trade agreement with China has resulted in China's agreement to establish a predictable and risk-based regulatory regime regarding its safety evaluation of agricultural biotechnology. GIs are geographical names that act to protect the quality and reputation of a distinctive product originating in a certain region. The term GI is most often applied to wines, spirits, and agricultural products. Some food producers benefit from the use of GIs because their products gain recognition for their distinctiveness, thereby differentiating them in the marketplace. In this manner, GIs can be commercially valuable. GIs may also be eligible for relief from acts of infringement or unfair competition. While the use of GIs may protect consumers from deceptive or misleading labels, they also have the potential to impair trade when the use of names that are considered common or generic in one market are protected in another. Examples of registered or established GIs include Parmigiano Reggiano cheese and Prosciutto di Parma ham from the Parma region of Italy, Roquefort cheese from France, Champagne from the region of the same name in France, Irish whiskey, Darjeeling tea, Florida oranges, Idaho potatoes, Vidalia onions, Washington State apples, and Napa Valley wines. GIs are protected by the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), which obligates WTO members to recognize and protect GIs as intellectual property. The United States is a signatory of TRIPS and is subject to its rights and obligations. Accordingly, under TRIPS, the United States and EU have committed to providing a minimum standard of protection for GIs (i.e., protecting GI products to avoid misleading the public and prevent unfair competition) and an \"enhanced level of protection\" to wines and spirits that carry a GI, subject to certain exceptions. However, the United States considers some EU GIs to be generic or semi-generic terms. For example, in the United States, feta is considered the generic name for a type of cheese; however, it is protected as a GI in Europe. As such, cheese produced in the United States may not be exported for sale as feta cheese in the EU, since only feta produced in countries or regions currently holding GI registrations may be sold there commercially. Laws and regulations governing GIs differ markedly between the United States and EU, which further complicates this issue. More than 3,300 product names registered and protected in the EU for foods, wine, and spirits originating in both EU member states and other countries. In addition, registered products often fall under GI protections in certain third-country markets, and some EU GIs have been trademarked in some non-EU countries pursuant to those countries' trade agreements with the EU. For example, Canada has agreed to recognize a list of 143 EU GIs in Canada, and Japan has agreed to recognize more than 200 EU GIs in Japan. These GI protections could limit U.S. sales of certain products to these countries. The EU is in the process of negotiating trade agreements with several other U.S. trading partners, including Mexico, Australia, New Zealand, and the Mercosur states (Argentina, Brazil, Paraguay, and Uruguay). Each of these efforts include a selected list of GIs that would become protected under the proposed trade agreement. In December 2019, the EU also entered into an agreement with China regarding GIs that would protect a reported 100 EU GIs in China. Some Members of Congress, particularly those with dairy constituencies, have claimed that EU protections for GIs are being misused to create market and trade barriers. Much of this debate is focused on expanding restrictions on the use of certain terms used by cheesemakers, such as \"parmesan,\" \"asiago,\" and \"feta,\" which are generally regarded as generic names in the United States. Some U.S. industry groups, however, are trying to institute GI protections to promote distinctive American agricultural products. For example, the American Origin Products Association, which represents certain U.S. potato, maple syrup, ginseng, coffee, and chili pepper producers and certain U.S. winemakers, seeks to work with federal authorities to \"create of a list of qualified U.S. distinctive product names, which correspond to the GI definition.\" Status: Statements by USDA officials in early 2020 have signaled that concerns about GIs could resurface as part of the U.S.-EU trade talks. In addition, both USMCA and the U.S.-China Phase One trade agreement address GIs in ways that could further complicate future U.S.-EU discussions. Specifically, USMCA includes language regarding the transparency of GI applications, approvals, and cancellations, along with guidelines for determining whether a term is customary in common use. USMCA also includes a side letter between the United States and Mexico regarding more than 30 cheese terms. These provisions may prove to be incompatible with GI provisions that are likely to be part of a trade agreement between the EU and Mexico, as well as existing provisions in the EU-Canada Comprehensive Economic and Trade Agreement. The U.S.-China Phase One trade agreement requires China to \"not undermine market access for U.S. exports to China of goods,\" and provides the United States with \"necessary opportunities to raise disagreement\" regarding GIs, among other provisions. These provisions may also prove to be incompatible with provisions agreed to in the 2019 EU-China agreement which protect certain EU GIs in China. The United States and the EU have engaged in a long-standing trade dispute over the EU's ban on hormone-treated meat. The EU adopted restrictions on livestock production in the early 1980s, limiting the use of natural hormones to therapeutic purposes, banning the use of synthetic hormones, and prohibiting imports of animals and meat from animals that have been administered the hormones. In response, the United States, which maintains that beef produced using hormones is safe for consumers, suspended trade concessions with the EU in 1999 by imposing retaliatory tariffs of 100% ad valorem on selected EU food products. Despite an ongoing series of WTO dispute settlement proceedings and decisions, the United States and the EU continue to disagree on a range of legal and procedural issues, as well as the scientific evidence and consensus affirming the safety of hormone-treated beef. In January 2009, USTR announced its intent to make changes to the list of EU products subject to increased tariffs under the dispute, including changes to the EU countries and products affected, with additional tariffs on some products. The EU claimed that this action constituted an \"escalation\" of the dispute. In May 2009, following a series of negotiations, the United States and the EU signed a memorandum implementing an agreement specifying actions intended to resolve this dispute over the next several years, and the United States suspended its retaliatory tariffs for imported EU products under the dispute. As part of the 2009 memorandum, the EU agreed to expand market access to U.S. exports of beef raised without hormones as part of its High-Quality Beef (HQB) TRQ. The EU's HQB quota is set at 45,000 MT annually and assessed a tariff of 20%. However, as the HQB quota is open to other beef-exporting nations, this has effectively limited the ability for U.S. beef producers to fully benefit under the quota. According to USTR and the U.S. beef industry, most of the HQB quota was being filled by countries other than the United States, and the EU has been unwilling to consider an allocation that would reserve a significant part of the HQB quota for the United States. In December 2016, USTR proposed reinstating retaliatory tariffs on EU products under the U.S.-EU beef hormone dispute, given the U.S. contention that the U.S.-specific allocation of the EU's HQB import quota for hormone-free beef had not expanded pursuant to the 2009 memorandum. In February 2017, USTR convened a hearing to review this possible retaliatory action. In late 2018, the EU agreed to review its existing HQB quota and renegotiate its quota with the United States with the expectation that a revised HQB agreement would be implemented in early 2019. The United States ultimately did impose retaliatory tariffs in connection with the dispute. Status: The U.S. and the EU reached an agreement in principle regarding U.S.-specific allocation of the EU's HQB import quota for hormone-free beef in June 2019. The agreement provides that the United States would be allocated 35,000 MT of the 45,000 HQB quota (about 78%), phased-in over a seven year period. Starting January 1, 2020, the phased-in quota allocations are as follows: 18,500 MT (2020), 23,000 MT (2021), 25,400 MT (2022), 27,800 (2023), 30,200 MT (2024), 32,600 MT (2025), 35,000 (2026 and subsequent years). During this time, the remaining amount of the quota each year would be available to other exporting countries. Current substantial users of EU's HQB quotaâAustralia, Argentina, and Uruguayâall had to agree to the reallocation in order for the agreement to be compliant with WTO rules. The EU continues to impose bans and restrictions on meat produced using hormones, beta agonists, and other growth promotants, and it allows only imports of beef produced without hormones subject to the EU's HQB quota. The EU's restrictions involving meat production continues to be actively debated as part of the official U.S. trade agenda, as these types of practices are common in U.S. meat production. Statements by USDA officials in early 2020 have signaled that this issue could resurface as part of the U.S.-EU trade agreement negotiations. In January 2009, the United States escalated a long-running dispute with the EU over its refusal to accept imports of U.S. poultry that are subject to certain pathogen reduction treatments (PRTs). PRTs are antimicrobial rinses that have been approved for use by the USDA in poultry production to reduce the amount of microbes on meat. Meat and poultry products processed with PRTs are judged safe by the United States and also by European food safety authorities. However, the EU prohibits the use of PRTs and the importation of poultry treated with these substances. The EU generally opposes such chemical interventions and asserts that its own poultry producers follow much stricter production and processing rules that are more effective in reducing microbiological contamination than simply washing poultry products. In general, EU consumer groups argue that the use of such treatments compensates for poor hygiene in the supply chain. The United States requested WTO consultations with the EU on the matter, a prerequisite first step toward the establishment of a formal WTO dispute settlement panel. A WTO panel was subsequently established in November 2009, but this case has not moved forward. In 2013, USDA submitted an application for the approval of peroxyacetic acid as a PRT for poultry. Although the EU initially put forward a proposal to authorize the PRT, it withdrew its proposal in December 2015, citing the European Food Safety Authority's (EFSA) opinion of insufficient evidence of peroxyacetic acid's efficacy against campylobacter. EFSA cleared lactic acid for reducing pathogens on beef carcasses, cuts, and trimmings in 2011. In 2013, the EU lifted its ban on the use of lactic acid in beef PRTs on beef carcasses, half-carcasses, and beef quarters in the slaughterhouse. In 2017, the National Pork Producers Council submitted an application to EFSA to approve organic lactic and acetic acid for use on pork carcasses and cuts. EFSA's panel report, issued in October 2018, concluded that use of the treatments does not pose a safety concern provided that the substances comply with EU specifications for food additives and that their use is efficacious compared to untreated meat. However, EFSA raised questions about whether lactic and acetic acid were more efficacious than water treatment for certain applications. Status: The United States continues to maintain that PRTs are a \"critical tool during meat processing that helps further the safety of products being placed on the market\" and continues to seek EU approval of certain PRTs for beef, pork, and poultry. To date, the United States and the EU have not been able to agree on a number of issues related to veterinary equivalency, and the EU continues to prohibit any substance other than water to remove contamination from animal products unless the EU approves the substance. Statements by USDA officials in early 2020 have signaled that this issue could resurface as part of the U.S.-EU trade agreement negotiations. Ractopamine, an animal drug that increases animal weight gain and meat yield, is approved by the U.S. Food and Drug Administration (FDA) for use in U.S. cattle, hog, and turkey production. It is also approved for use in countries such as Canada, Japan, Mexico, and South Korea, but many other countries ban the use of ractopamine in meat production. In 2012, the Codex Alimentariusâthe international food standards organization that sets guidelines to protect public health and ensure fair practices in the food tradeâset maximum residue levels for ractopamine in beef and pork. However, several of the largest markets for U.S. meat exports have restricted imports of meat produced with ractopamine, despite U.S. adherence to the residue standards established by Codex. USTR, in its \"2019 National Trade Estimate Report on Foreign Trade Barriers,\" states that the EU, China, Taiwan, and Thailand continue to restrict U.S. meat exports produced with ractopamine. According to USDA's Food Safety and Inspection Service, U.S. meat exportsâparticularly porkâmay be shipped to markets with ractopamine restrictions if the exported product is raised without ractopamine and is certified through USDA's Never Fed Beta Agonists Program. U.S. exports to markets that have ractopamine restrictions are subject to increased certification and testing costs, potentially affecting competitiveness and dampening market opportunities. Status : USDA and USTR continue to encourage trading partners to accept international standards on the use of ractopamine. Under the U.S.-China Phase One trade agreement, China agreed to consult with U.S. experts and conduct a risk assessment of ractopamine that is consistent with Codex standards. The assessment is to be based on conditions and use in the United States. The countries are to set up a working group to discuss steps to follow based on a risk assessment of ractopamine. The United States exported 250% more pork to China in 2019 than 2018 largely because of China's African Swine Fever outbreak. An agreement on a ractopamine maximum residue limit (MRL) should facilitate more U.S. pork shipments to China going forward. The United States has gone from being a net exporter of fresh and processed fruits and vegetables in the early 1970s to being a net importer of fruits and vegetables today. Although U.S. fruit and vegetable exports totaled $9.2 billion in 2018, U.S. imports of fruits and vegetables were $24.8 billion, resulting in a gap between imports and exports of $15.6 billion (excludes nuts). Several factors have contributed to this trade imbalance including a relatively open import regime and lower average tariffs in the United States, increased competition from low-cost or government-subsidized producing countries, and non-tariff trade barriers to U.S. exports in some countries. Additionally, other market factors, such as exchange rate fluctuations and structural changes in the U.S. food industry, as well as increased U.S. overseas investment and diversification in market sourcing by U.S. companies, have contributed to the trade imbalance. Increased domestic and year-round demand for fruits and vegetables as well as opportunities for counter-seasonal supplies through imports have also contributed to this trade situation. Despite U.S. efforts to address some of these issues as part of recent FTA discussion, a number of these issues are unresolved. Other U.S. concerns include import competition regarding seasonal produce from Mexico, long-standing suspensions agreements between the U.S. and Mexico involving fresh tomatoes, and regulatory requirements regarding retail wine sales in Canada. Mexico remains the largest foreign supplier of U.S. imports of vegetables and fruits (excluding bananas). Production of some Mexican fruits and vegetablesâtomatoes, peppers, cucumbers, berries, and melonsâhas increased in recent years in part due to Mexico's investment in large-scale greenhouse production facilities and other types of technological innovations. Reportedly, protected (greenhouse/shade) production in Mexico has risen to nearly 101,000 acres in 2016, up from about 19,500 acres in 2000. According to researchers, Mexican growers benefit from a combination of relatively lower labor costs and subsidies invested in the specialty crop sector under various government programs, including Mexico's Agriculture Promotion Program and its AgriFood Productivity and Competiveness Program. These programs are generally focused on increasing the infrastructure capacity of Mexico's agricultural sector. The Florida Fruit and Vegetable Association (FFVA) claims that Mexico's produce industry benefits from subsidies paid by the Mexican government and that it prices its products below fair market value, and therefore should be subject to both AD duties and CVD on U.S. imports of some fruits and vegetables. Trade concerns by U.S. growers have primarily centered on imported tomatoes, peppers, and berries. One of the Trump Administration's initial agriculture-related objectives in the renegotiation of NAFTA included a proposal to establish new rules for seasonal and perishable products, such as fruits and vegetables. The proposal would have established a separate domestic industry provision for perishable and seasonal products in AD and CVD proceedings, making it easier for a group of regional producers to initiate an injury case and to prove injury, thereby resulting in CVD or AD duties on the imported products responsible for the injury. This could protect certain U.S. seasonal produce growers in some regions by making it easier to initiate trade remedy cases. The U.S. International Trade Commission (USITC) has previously reviewed trade remedy cases involving perishable agricultural productsânamely, Fall-harvested Round White Potatoes from Canada and Spring Table Grapes from Chileâthat proved difficult to settle. As noted by USTR, current trade laws \"are really not set up for seasonal product,\" making it difficult to prove injury over a period of time. Support for seasonal produce protections through changes to U.S. trade laws is mixed. Some Members of Congress supported including seasonal protections as part of NAFTA's renegotiation. Others opposed including such protections, contending that seasonal production complements rather than competes with U.S. growing seasons. Others worried it could open the door to an \"uncontrolled proliferation of regional, seasonal, perishable remedies against U.S. exports.\" Most U.S. food and agricultural sectors, including some fruit and vegetable producer groups, opposed including seasonal protections as part of the renegotiation. Some worried that efforts to push for seasonal protections would derail the renegotiation. Others claimed that such efforts would favor a few \"politically-connected, wealthy agribusiness firms from Florida\" at the expense of others in the U.S. produce industry and at the expense of both consumers and growers in other fruit and vegetable producing states, such as California. The Agricultural Technical Advisory Committee for Trade in Fruits and Vegetables (F&V ATAC) supported not including seasonal provisions in the NAFTA renegotiation. In January 2018, F&V ATAC passed a resolution supporting the withdrawal of the seasonal and perishable trade remedy proposal from the U.S. negotiating objectives. Changes to USMCA released in October 2018 did not alter U.S. trade remedy laws to address seasonal produce trade. USTR claimed it tried to include such provisions but was unable to do so. In response, the Agricultural Trade Improvement Act of 2018 ( S. 3510 ; H.R. 7015 ) was introduced in the House and the Senate. These bills were reintroduced in the 116 th Congress but renamed as Defending Domestic Produce Production Act of 2019 ( S. 16 ; H.R. 101 ). Status: USMCA does not include changes to U.S. trade remedy laws to address seasonal produce trade. Although lawmakers from Florida and Georgia continued to push USTR for seasonal produce provisions in USMCA, others in Congress continued to oppose such changes. In January 2020, USTR announced that it planned to investigate trade practices by Mexico's produce industry, hold field hearings in Florida and Georgia, and engage the help of U.S. International Trade Commission (USITC) and DOC to monitor imports, among other actions. One Member of Congress claimed USTR's plan would \"sidestep the issue and install policies\" that could result in future trade conflicts; another encouraged USTR to \"consider data from a variety of sources\" when examining the issue. Some in Congress have raised concerns about the possible negative impacts of imported fruits and vegetables on U.S. growers more broadly. Legislation introduced in the 116 th Congress ( S. 564 ) would establish a task force to identify countervailable subsidies and dumping practices to counter perceived unfair trade practices involving imports within the U.S. produce market. The U.S.-Mexico Tomato Suspension Agreement is an agreement between DOC and signatory producers/exporters of fresh tomatoes grown in Mexico that suspends the U.S. AD investigation into whether Mexican fresh tomatoes were sold into the U.S. market at less than fair value. Fresh tomatoes imported from Mexico have been governed by suspension agreements since 1996. The first suspension agreement became effective in November 1996. The Mexican signatory growers and the United States entered into new agreements in 2002, 2008, and 2013. Under the 2013 agreement, the signatories agreed to suspend the AD investigation and monitor compliance with the agreement. The basis for the suspension agreement was a commitment by each signatory producer/exporter to sell tomatoes at or above the stated reference price in order to eliminate the injurious effects of exports of fresh tomatoes to the United States. The agreement set different floor prices for Mexican fresh tomatoes during the summer and winter and specifies prices for open field/adapted-environment and controlled-environment production. These price floors covered all types of fresh or chilled tomatoes from Mexico. The agreement did not cover tomatoes that are for processing. In early 2018, DOC initiated consultations with the Mexican tomato growers and exporters to negotiate possible revisions to the 2013 agreement. DOC also initiated its five-year sunset review of the suspended AD investigation and published the preliminary and final results of its analysis in late 2018. DOC's analysis indicated that dumping of fresh tomatoes was likely to occur/recur and calculated weighted-average dumping margins of up to 188%. In November 2018, the Florida Tomato Exchange requested that the United States withdraw from the suspension agreement, eliminate the reference prices, and resume the related initial 1996 AD investigation. They claim the pricing agreements failed to ensure that Mexico did not undercut U.S. growers, costing the Florida tomato industry $3.4 billion to $6.8 billion per year in lost sales. Several Members of Congress expressed support for withdrawing from the agreement. Among the groups that opposed withdrawal were the Fresh Produce Association of the Americas and other groups representing Mexican growers and exporters as well as businesses, various associations, and local and county governments. These groups claim the U.S. lost sales because Mexico offers more variety of tomatoes that appeal to consumers and commercial users. DOC initially announced its intention to withdraw from the agreement in February 2019 following its periodic review of the agreement, which concluded that Mexican fresh tomatoes have been sold into the U.S. market at less than fair value. In May 2019, the United States terminated the 2013 agreement and announced it would resume collecting tariffs on chilled and fresh tomatoes from Mexico, and later set a preliminary dumping margin of 25.28%. Mexican tomato grower filed a suit at the Court of international Trade requesting an injunction against the reimposed tariffs. The Mexican government claimed that the new duties would cost its tomato industry more than $350 million annually. USITC resumed its AD investigation of Mexican tomatoes, and concluded that U.S. growers are \"threatened with material injury\" from imports. Status: Between May and September 2019, the United States and Mexican tomato growers considered various proposals regarding a possible revised agreement. On September 19, 2019, DOC signed a new suspension agreement with Mexico's growers and exporters of fresh tomatoes. DOC and USITC suspended their respective AD investigations. The new suspension agreement sets increased minimum prices for specialty and organic tomatoes at certain times of the year, and establishes new inspections requirements of tomato shipments crossing the border to prevent low-quality tomatoes from entering the United States where they might undercut domestic prices. More recently, there have been growing concerns that a virus (brown rugose) found in tomatoes imported from Mexico could be harmful to U.S.-grown tomatoes and peppers. Increased inspections have reportedly caused border delays of product shipments, and have led to complaints from Mexican officials that such detentions are \"unjustified.\" During the last two months of 2019, the United States reportedly returned 43 tomato shipments inspected at the U.S.-Mexico border. In Canada, the authority to import and distribute alcohol rests with the provincial governments. Starting in 2015, British Columbia (BC) initiated a series of policies and regulations that provide BC wine exclusive access to retail channels and grocery store shelves, while imported wine may be sold in grocery stores only through a \"store within a store\" âthat is, a space that is physically separated from the main retail outlet with separate cash registers. In 2016, Quebecâthe largest wine-importing province in Canadaâenacted policies that would streamline provincial approval for Quebec wines. Most wine in Quebec is distributed through retail outlets owned by its provincial liquor authority, the SociÃ©tÃ© des alcools du QuÃ©bec. The rules allow Quebec small wine producers to bypass the provincial liquor board. Regulations are also in place in Ontario requiring that 50% of the wine on display at a grocery store meet certain requirements that some claim make it difficult for imported products to compete with like domestic products. According to the U.S.-based Wine Institute, Canada is the leading export market for California wineâthe leading wine producing state in the United Statesâaccounting for $448 million in sales in 2018. In January 2017, the Obama Administration initiated trade enforcement action against Canada at the WTO regarding Canada's BC wine measures. Subsequent actions by the Trump Administration, in September 2017, led to the United States requesting formal consultations with Canada regarding BC wine measures. USTR states that \"discriminatory regulations implemented by British Columbia are unfairly keeping U.S. wine off of grocery store shelves\" and that the measures are inconsistent with Canada's commitments and obligations under the WTO. The United States reiterated its concerns as part of a second complaint issued in this case in July 2018. Argentina, Australia, New Zealand, and the EU joined the consultation. The WTO case remains active. Status: The USMCA includes a side letter addressing U.S. concerns about Canada's BC wine measures. As outlined in the side letter, Canada would modify certain measures that provide preferential grocery store shelf space to wines produced within the province and \"implement any changes no later than November 1, 2019.\" At this time, it is unclear whether Canada has taken additional action to address U.S. concerns about the status of BC's regulations. The USMCA side letter does not address potential market barriers to U.S. wine in Quebec and Ontario. Canada's wine regulations in certain provinces continues to be a concern to some in Congress. In 2019, exports of U.S. livestock and poultry products totaled $24.1 billion, and imports totaled $14.2 billion. Foreign demand for U.S. animals and products supports prices of domestic livestock and poultry producers, while imports supplement U.S. consumer demand for a variety of livestock and poultry products. Recent trade agreements with Canada and Mexico, China, and Japan will facilitate increased livestock and poultry product exports to these four markets, which accounted for 65% of the value of total U.S. exports of these products in 2019. The U.S.-Japan agreement lowers tariffs for U.S. beef and pork products, and adjusts beef and pork safeguards. These measures offer U.S. livestock producers benefits that competing exporters have enjoyed under the TPP-11, the successor to Trans-Pacific Partnership agreementâfrom which the Trump Administration withdrew the United States before its ratification. Under U.S.-China Phase One trade agreement, China agreed to abide by international standards and guidelines for trade, while expanding market access for more meat products that the USDA Food Safety and Inspection Service regulates should ease the process for U.S. meat and poultry exporters. USDA forecasts that exports of meat and poultry products will represent about 17% of U.S. domestic production in 2020. Periodically, foreign countries impose export bans on U.S. meat products in response to an outbreak of certain animal diseases. The bans are disruptive for livestock producers and meat exporters, are often inconsistent with internationally accepted protocols, and vary in terms of scope and duration. For example, bans were imposed on U.S. beef exports because of the discovery of bovine spongiform encephalopathy (BSE, or mad cow disease) in 2003. An outbreak of highly pathogenic avian influenza (HPAI) at the end of 2014 and early 2015 in U.S. turkey and egg-laying flocks triggered export bans on poultry products by more than 30 countries. The bans were imposed on all U.S. products even though the HPAI outbreaks were not in areas in close proximity to commercial broiler production. The World Organization for Animal Health (known as OIE) has established trade protocols when disease outbreaks occur in countries that export meat and poultry products. According to OIE, in most cases total export bans are not recommended or needed when there is a BSE or HPAI discovery or outbreak in exporting countries. In 2013, the OIE determined that the United States is at \"negligible risk\" for BSE, meaning that U.S. surveillance and safeguard systems are adequate. For HPAI, USDA, in collaboration with states, has implemented increased flock biosecurity and has placed a system to rapidly contain and eradicate an outbreak of HPAI. Over the years, while some foreign markets imposed total bans on U.S. beef exports following the 2003 BSE incident, other export markets for U.S. beef imposed specific conditions for imports of U.S. beef. For example, Japan and South Koreaâtwo major importers of U.S. beefârequired that imported U.S. beef be produced from cattle under 30 months of age. China did not lift its ban on U.S. beef exports until 2017 and included an under 30-month age restriction. Regarding poultry, some foreign markets imposed total bans on poultry exports during the HPAI outbreak, while other markets imposed export bans only from the regions affected by the outbreak, consistent with the recommended OIE regionalization protocol that allows for trade from regions that are disease free. As the United States demonstrated that the outbreak was contained and then eliminated, most of these bans were lifted. Status: China lifted the ban on U.S. beef in 2017 but continued to restrict imports of U.S. beef to cattle under 30 months of age, similar to other countries maintaining age restrictions. However, under the U.S.-China Phase One trade agreement, China agreed to amend import protocols that align with international standards. China agreed to (1) eliminate the cattle age restriction; (2) recognize that the U.S. traceability system meets or exceeds OIE guidelines for maintaining \"negligible risk\" for bovine disease, and if the U.S. status should change, China would set import regulations that follow OIE guidelines; and (3) adopt MRLs for certain hormones used in U.S. beef production, and follow Codex MRL guidelines. China continues to require that U.S. beef exporters participate in the USDA Agricultural Marketing Service export verification program, which verifies that U.S. suppliers are meeting importing country requirements. In 2019, the U.S. shipped about 10,507 MT of beef to China, representing about 1% of total U.S. beef exports. U.S. beef exports to China were valued at $85.3 million. China lifted its ban on the import of U.S. poultry meat in November 2019, allowing U.S. poultry exports from FSIS-approved poultry plants. Under the U.S.-China Phase One trade agreement, the United States and China agreed to finalize a protocol accepting regionalization when there are outbreaks of poultry diseases, and China agreed to follow OIE guidelines on international trade. Poultry industry analysts believe U.S. poultry exports to China could reach $1 billion in a short time, which would exceed record exports of $750 million in 2008. China's hog industry was hit hard with African Swine Fever in 2019, leaving a large gap in China's pork supplies and increasing demand for pork imports. In 2019, the value of U.S. pork and pork product exports (includes pork offal) to China more than doubled to $1.3 billion. Under the U.S.-China Phase One trade agreement, China is to increase the number of U.S. pork products inspected by FSIS that are eligible for import. Currently, 33 countries are eligible to export meat and poultry to the United States. Before the United States authorizes imports of meat or poultry, APHIS conducts risk assessments of any foreign animal diseases that could pose a threat to U.S. animal health. APHIS maintains a list of countries and their animal health status for critical diseases. Also, FSIS must determine if foreign meat or poultry inspection systems provide an \"equivalent\" level of sanitation and protection of public health as the U.S. system. Foreign governments provide documentation on how their inspection systems are regulated, and FSIS conducts onsite audits of foreign facilities. FSIS also conducts equivalency verification and periodic audits of countries already approved to export meat and poultry to the United States. In August 2013, FSIS confirmed that China's poultry processing inspection system was equivalent to the U.S. inspection system. This allowed China to export processed (cooked) poultry meat that is sourced raw from the United States or from countries eligible to export poultry to the United States. In March 2016, FSIS recommended that the process of verifying equivalency for China's poultry slaughter inspection system move forward. In August 2017, FSIS released an audit report confirming that China's poultry processing system remained equivalent. In November 2019, FSIS issued a final rule that determined that China's poultry slaughter system is equivalent and that China could export domestically slaughtered poultry meat to the United States. China may only export fully cookedânot shelf stable-products. China is not permitted to export raw poultry products due to animal disease risks. The United States did not import poultry meat from China in 2018 and 2019. These actions were the culmination of a process that began in 2005, when China requested that USDA evaluate its poultry inspection system. Congress halted the process in FY2006, when appropriations provisions prohibited FSIS from expending funds to evaluate China's poultry inspection system. The process resumed in FY2010 on the condition that FSIS provide Congress with regular reports on the equivalency process. The possibility that the United States could import poultry meat from China has alarmed some food safety advocates and some Members of Congress because of concerns about relatively lax food safety enforcement in China for both domestically consumed products and exports. Testimony presented during a Congressional-Executive Commission on China hearing highlighted concerns regarding China's food safety. Status: In response to concern about China's record on food safety, Section 738 of Division B of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) prohibits USDA from using any funds to purchase Chinese raw or processed poultry products for feeding programs, including the school lunch and school breakfast programs. Section 741 of Division B of the FY2020 appropriations act prohibits USDA from finalizing the proposed rule to allow the importation of slaughtered Chinese poultry unless certain conditions are met to ensure the food safety of poultry meat imports from China. Under the U.S.-China Phase One trade agreement, China may submit a formal request to the United States to evaluate regional avian influenza (AI) status. Within 30 days of receipt of the request, APHIS would initiate an evaluation of conditions in the regions in order to determine if a region or regions could be recognized as AI-free. Such a determination would allow China to export raw poultry meat if FSIS determines that poultry plants in the region(s) met equivalency standards. The United States restricts or prohibits imports of animals or animal products (including meat) from countries where highly infectious animal diseases exist in order to protect U.S. herds. Fresh beef imports from Brazil and Argentina have been prohibited or restricted because of foot-and-mouth disease (FMD) in the two countries. U.S. beef imports from Brazil and Argentina have mostly been limited to fully cooked/processed product. Argentina was approved to export fresh beef to the United States from 1997-2001, until the United States halted exports after an Argentine FMD outbreak in 2001. In December 2013, APHIS proposed a rule that would allow fresh beef imports from 13 regions in Brazil. In August 2014, APHIS proposed a separate rule to allow fresh beef imports from Patagonia and northern Argentina. In July 2015, APHIS released final rules to allow the import of fresh beef from these regions of Brazil and Argentina. USDA risk assessments determined that, under certain circumstances, fresh beef could be safely imported from Brazil and Argentina without threatening the FMD-free status of the United States. Some livestock industry stakeholders, such as the National Cattlemen's Beef Association and the National Farmers Union, have expressed opposition to allowing fresh beef from Brazil and Argentina because neither country is considered to be free of FMD. FMD was eradicated in the United States in 1929, and any introduction of the disease back into the United States could be economically devastating for the livestock industry. In 2013, the Department of Homeland Security estimated that the cost of an FMD outbreak in the United States could exceed $50 billion. In May 2015, FSIS found that Brazil's beef inspection system would provide an equivalent level of food safety as the U.S. system. In August 2016, USDA announced that Brazil was approved to ship fresh beef to the United States, and the first shipments arrived the following month. In June 2017, USDA suspended imports of fresh beef from Brazil after FSIS found problems with re-inspected Brazilian beef at the U.S. port of entry. According to USDA, FSIS was re-inspecting 100% of Brazilian fresh beef imports and refused entry to 11% of shipments, well above the 1% refusal rate for other beef imports. In November 2018, FSIS announced that the Argentine beef inspection system was equivalent, and the country could export fresh beef to the United States. FSIS also announced that within six months of the November 2018 equivalency determination, the agency would undertake additional onsite audits of Argentina's raw beef inspection system. The United States imported about 1,623 MT of fresh beef from Argentina in 2019. Argentina holds a 20,000 MT ton duty-free TRQ allotment for beef shipments to the United States. Status : On February 21, 2020, the United States lifted the suspension on imports of raw, intact beef from Brazil. FSIS released a targeted on-site audit report on February 20, 2020 that addressed corrective actions taken by Brazil. Raw beef imports from Brazil will be subject to re-inspection at U.S. points of entry by FSIS. FSIS released an on-site audit report on Argentina's meat inspection system in September 2019 and noted that further on-site audits would be conducted to ensure that corrective actions undertaken as a result of the audit were implemented. Japan is a leading export market for U.S. beef and pork products. In 2019, U.S. beef and beef product exports to Japan totaled about $2 billion, and pork and pork products amounted to $1.5 billion. Exports of both products were lower than the value of shipments in 2018, partly due to the preferential tariff treatment that competing exporters, such as Australia, New Zealand, Canada, and Mexico, have with Japan through the TPP-11 agreement. For example, Japan's beef imports from TPP-11 member nations entered at a 26.6% tariff rate in 2019 (year 2 of the TPP-11 agreement), but U.S. beef entered with a tariff rate of 38.5%. Under USJTA, the tariff on U.S. beef is now aligned with the TPP-11 tariff rates. Under these agreements, Japan's tariff on beef from the TPP-11 countries and the United States is scheduled to decline until it reaches 9% in year 15 of the USJTA (year 16 of TPP-11). Similarly, Japan's tariffs on imports of U.S. pork are reduced under the agreement, matching the TPP-11 tariff rates. Instead of an ad valorem rate of 4.3% on U.S. pork, the rate is 1.9% in the first year of the agreement, and is phased out in year 9. Japan maintains a variable duty mechanism (gate price), which is set to a fixed value and will gradually decline until year 9. U.S. beef and pork exports are not subject to Japan's WTO safeguards, but to U.S.-specific safeguards for beef and pork. The U.S. beef safeguard threshold is set at 242,000 MT and increases annually after year 2 of the agreement. Japan will terminate the beef safeguard measure if it does not trigger for four consecutive years after year 14 of the agreement. The U.S. pork safeguard will trigger if imports of U.S. pork exceed 112% of the largest import volume in the previous three years. The pork safeguard will terminate after year 10 of the agreement. Status: USJTA has been in effect since January 1, 2020, and U.S. meat exports to Japan are expected to increase as a result. The United States exported $6.0 billion in dairy products in 2019, and imported $3.1 billion worth of products. Reform of dairy pricing and establishing specific dairy product TRQs in Canada is expected to expand access in that market for U.S. dairy producers. The USJTA lowers tariffs for U.S. dairy products and expands some dairy product TRQs. Like U.S. livestock producers, dairy producers gain benefits that competing exporters have enjoyed under the TPP-11. Under the U.S.-China Phase One trade agreement, China is to streamline the regulatory process to facilitate trade in U.S. dairy and infant formula. The Canadian dairy sector limits production, sets prices, and restricts imports. Canadian imports of dairy products are restricted through TRQs, with over-quota tariffs in excess of 200% for some products. Although Canada is the second-largest market for U.S. dairy exports, U.S. exports would likely be higher but for Canadian import restrictions. In recent years, U.S. milk producers began exporting increased quantities of ultra-filtered (UF) milk to Canada. UF milk is a high-protein liquid product made by separating and concentrating certain milk components (such as protein and fat) for use as ingredients in dairy products, such as cheese, yogurt, and ice cream. U.S. UF milk found a market among Canadian cheese makers in 2008 after Canada revised its compositional standards for cheese. This revision significantly reduced the use of several milk products that U.S. processors had been supplying to Canadian food manufacturers, including milk protein concentrates and dried protein products. In recent years, growing demand for butterfat in Canada resulted in increased Canadian milk production and, consequently, surplus supplies of skim milk. To address the surplus, Canada adopted the Class 7 milk price classification in 2017 (Class 6 in Ontario). Milk classified as Class 7 comprises skim milk componentsâprimarily milk protein concentrates and skim milk powder (SMP)âused to process dairy products. Prices for Class 7 products were set at low levels. Once the Class 7 regime was implemented, Canadian skim milk products became cheaper. Canada expanded global exports of SMP with the consequence that U.S. producers lost exports of high-protein UF milk to Canadian cheese and yogurt processors. According to USDA, the value of U.S. UF milk exports to Canada peaked at nearly $107 million in 2015 but declined after the Class 7 regime was implemented in 2017 to $49 million in 2017 and $32 million in 2018. At the same time, Canada's exports of SMP more than tripled in 2017 to $133 million, compared with $42 million in 2016 before the Class 7 price regime was implemented. Eliminating Canada's Class 7 pricing regime became a priority for the U.S. dairy industry when NAFTA renegotiations commenced in 2017. Status : Under USMCA, Canada agreed to eliminate the Class 7 pricing regime six months after USMCA enters into force. Canada also agreed to reclassify Class 7 products according to their end use and base its selling price on a formula that takes into consideration the USDA reported nonfat dry milk price. Also under the agreement, Canada would be required to monitor its exports of milk protein concentrates, SMP, and infant formula and report at the harmonized tariff schedule level monthly. Although Canada would maintain its milk supply management system under USMCA, it would expand TRQs for U.S. milk, cheese, cream, skim milk powder, condensed milk, yogurt, and several other dairy products. U.S. dairy products within the USMCA TRQs would enter Canada duty free, while U.S. exports above the TRQ quantities would be subject to the existing over-quota tariffs. In return, the United States agreed to establish TRQs for imports of Canadian dairy products. In total, under USMCA Canada would grant the United States duty-free access to nearly 17,000 MT of dairy products in the first year of the agreement, 100,000 MT in the sixth year, and 109,000 MT in year 19. The USMCA quota is specific to the United States and would be in addition to the 93,648 MT of WTO global quota, which is open to U.S. dairy products as well as to those from other WTO member countries as was the case under NAFTA. U.S. exports of dairy products to Japan totaled nearly $283 million in 2019, making Japan the fifth largest dairy export market for the United States. The Japanese dairy sector is protected by high import tariff rates and TRQ. In addition, competing exporters of dairy products to Japan (Australia, New Zealand, Canada, and the EU) have preferential tariffs through free trade agreements. The USJTA is expected to improve the competitive position of U.S. dairy producers through tariff reductions, and eventual tariff elimination in 15 years. Japan also established a country specific TRQ of 5,400 MT for U.S. whey products that is to increase to 9,000 MT in year 10. In-quota exports are to enter duty-free at the beginning of the agreement and tariffs on over-quota exports are to be eliminated in five years. Over-quota tariffs on other dairy products are to be phased out at various times through the agreement. Status: \"Stage One\" of USJTA became effective on January 1, 2020. Unlike the provisions the United States had negotiated with Japan under the Trans-Pacific Partnership (TPP), USJTA does not include TRQs for certain dairy products such as butter and skim milk powder. The U.S. dairy industry has identified that the lack of provisions on non-tariff measures, such as GIs, could prove to be a market access barrier for certain U.S. cheese exports to the Japanese market. Additional negotiations with Japan toward a more comprehensive agreement are expected in 2020 and may address these issues. China was the third-largest market for U.S. dairy exports in 2019 at nearly $374 million, but this total was 25% lower than in 2018 as retaliatory tariffs hindered trade. Under the U.S.-China Phase One trade agreement, China is to streamline the regulatory process to facilitate U.S. exports. China is to accept dairy products manufactured in facilities compiled by FDA and which have a USDA dairy sanitary certificate. China is to accept that the U.S. dairy regulatory system provides the same level of safety as China's system. FDA is to provide China updated lists of dairy facilities under FDA jurisdiction. In addition, China's General Administration of Customs China and the FDA is to hold technical discussions regarding FDA guidance (U.S. Import Alert 99-30) on dairy products and the presence of melamine in imports of Chinese milk products. For infant formula, China is to also streamline its import approval process (such as issuing product registrations, technical reviews, and considering FDA's review, inspections and regulatory determinations). Status: The U.S.-China Phase One trade agreement entered into force February 14, 2020. In December 2014, DOC signed suspension agreements with the government of Mexico and Mexican sugar producers and exporters that prevented the imposition of CVD and AD on U.S. imports of Mexican sugar. This was a consequence of U.S. government determinations that Mexican sugar was being subsidized by the government of Mexico and was being sold into the U.S. market at less than fair value. The suspension agreements limit Mexico's sugar exports to the United States to the residual of U.S. needs for domestic human use in a given marketing year after subtracting U.S. production and imports from other countries. The agreements establish minimum reference prices for Mexican sugar that are above U.S. sugar program loan levels for domestically produced sugar. Another provision limits the share of Mexican sugar that can enter the United States as refined sugar. After the suspension agreements took effect, a number of stakeholders in the U.S. sugar market asserted that the suspension agreements had not worked as intended and had not entirely eliminated the injury caused by the subsidization and dumping of Mexican sugar. One widely held criticism was that cane refiners who were dependent on imports of raw cane from Mexico had received an inadequate share of sugar from Mexico. Another criticism leveled at the agreements was that Mexican exporters were not always adhering to limits on the share of Mexican sugar imports that are refined sugar as compared with raw sugar, nor to the specified minimum reference prices. In November 2016, the American Sugar Coalitionârepresenting sugar cane and sugar beet producers and sugar processors, refiners, and workersâcalled on DOC to withdraw from the agreements, an action that could have caused AD and CVD duties to be imposed on Mexican sugar. Imperial Sugar Company, a U.S. cane refiner, also advocated for withdrawal. The Sweetener Users Association, which represents sugar-using businesses, recommended renegotiating the agreements to address their shortcomings and warned that terminating them would virtually eliminate Mexican sugar from the U.S. market. In November 2016, DOC issued results of a preliminary administrative review, in which it concluded that the agreements may not have entirely redressed the injury, and that certain import transactions may not have adhered to the terms in the agreements. In June 2017, the United States and Mexico agreed to amendments to the suspension agreements. Under the amendments, effective October 1, 2017, the price of imported Mexican raw sugar was increased from $0.2225 per pound to $0.23 per pound. The price of imported refined sugar was increased from $0.26 per pound to $0.28 per pound. The maximum share of refined sugar imports was limited to 30%, with raw sugar imports constituting at least 70% of the total, compared with 53% and 47%, respectively, under the 2014 agreement. The agreement also requires that imported raw sugar be loaded in bulk and be free flowingâthat is, not packaged. Any raw sugar imports that are packaged would be counted toward the refined sugar allotment. In addition, if USDA determines that the United States requires additional sugar imports to meet its needs, Mexico would be awarded the first opportunity to fill the need. Status: In October 2019, the U.S. Court of International Trade (USCIT) voided the 2017 suspension agreements because DOC failed to follow recordkeeping requirements during the negotiations over the agreement. CSC Sugar LLC, a sugar trader and refiner of liquid sugar sued because the agreement changed the purity definition of refined sugar, harming its business, and it was unable to provide comment on the changes. As a result of the USCIT ruling, the 2014 suspension agreement provisions went back into force. On January 15, 2020, the DOC and Mexico agreed to new terms for the suspension agreement, specifically limiting imports from Mexico to 1,004,726 short tons from October 2019 through September 2020, with the share of refined sugar limited to 30% of import volume. CSC Sugar LLC again filed suit in the USCIT to block the new agreements between the United States and Mexico.", "summary": "Sales of U.S. agricultural products to foreign markets absorb about one-fifth of U.S. agricultural production, thus contributing significantly to the health of the farm economy. Farm product exports, which totaled $136 billion in FY2019 (see chart), make up about 8% of total U.S. exports and contribute positively to the U.S. balance of trade. The economic benefits of agricultural exports also extend across rural communities, while overseas farm sales help to buoy a wide array of industries linked to agriculture, including transportation, processing, and farm input suppliers. A major area of interest for the 116 th Congress during its first session was the loss of export demand for agricultural products in the wake of tariff increases imposed by the Trump Administration on U.S. imports of steel and aluminum from certain countries and other imported products from China. Some of the affected countries levied retaliatory tariffs on U.S. agricultural products, contributing to a 53% decline in value of U.S. agricultural exports to China in 2018 and a broader decline in exports across countries imposing retaliatory tariffs in 2019. To help mitigate the economic impact from export losses, the U.S. Department of Agriculture (USDA) authorized two short-term assistance (\"trade aid\") programs to producers of affected agricultural commodities, valued at up to $12 billion in 2019 and $16 billion in 2019. Other major agricultural trade developments in 2019 included efforts to ratify the U.S.-Mexico-Canada Agreement (USMCA), trade negotiations with China, Japan, and the European Union, and continued review of U.S. participation in the World Trade Organization (WTO). The USMCA was ratified by Mexico and the U.S. Congress, and awaits ratification by Canada before it can enter into force. The United States and Japan signed an agreement increasing market access for many U.S. agricultural exports to Japan. This agreement, which does not require congressional approval, excludes provisions pertaining to non-tariff measures that could become future trade barriers for U.S. agricultural exporters. A second-stage negotiation toward a more comprehensive pact could commence in 2020. In January 2020, President Trump signed a \"Phase One\" executive agreement (that also does not require congressional approval) with the Chinese government on trade and investment issues, including agriculture. Under the agreement, China is not required to repeal any tariffs, but it has reduced certain retaliatory tariffs and is granting tariff exclusions for various agricultural products in order to reach a target level of U.S. importsâ$32 billion (relative to a 2017 base of $24 billion) over a two-year period. The coronavirus outbreak since January 2020 may affect China's ability to meet these commitments. In addition to further negotiations with Japan and China, the Administration has stated its intent to pursue trade agreements with the European Union, India, Kenya, the United Kingdom, and possibly other countries. The Trump Administration has also indicated that reforming the WTO is a priority for 2020. The WTO Ministerial Conference in June 2020 presents an opportunity to address pressing concerns over agricultural reform efforts. Among other agricultural trade issues that may arise in the 116 th Congress are proposed changes to U.S. trade remedy laws to address imports of seasonal produce affecting growers in the Southeast, the establishment of a common international framework for approval, trade, and marketing of the products of agricultural biotechnology, and foreign restrictions on U.S. exports of meat that are inconsistent with international trade protocols. Additionally, U.S. beef and pork face trade barriers in several markets because of U.S. producers' use of growth promotants and the feed additive ractopamine.", "document_type": "crs"}
{"report": "T he Constitution's Supremacy Clause provides that \"the Laws of the United States . . . shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the Contrary notwithstanding.\" This language is the foundation for the doctrine of federal preemption, according to which federal law supersedes conflicting state laws. Federal preemption of state law is a ubiquitous feature of the modern regulatory state and \"almost certainly the most frequently used doctrine of constitutional law in practice.\" Indeed, preemptive federal statutes shape the regulatory environment for most major industries, including drugs and medical devices, banking, air transportation, securities, automobile safety, and tobacco. As a result, \"[d]ebates over the federal government's preemption power rage in the courts, in Congress, before agencies, and in the world of scholarship.\" These debates over federal preemption implicate many of the themes that recur throughout the federalism literature. Proponents of broad federal preemption often cite the benefits of uniform national regulations and the concentration of expertise in federal agencies. In contrast, opponents of broad preemption often appeal to the importance of policy experimentation, the greater democratic accountability that they believe accompanies state and local regulation, and the \"gap-filling\" role of state common law in deterring harmful conduct and compensating injured plaintiffs. These broad normative disputes occur throughout the Supreme Court's preemption case law. However, the Court has also identified different ways in which federal law can preempt state law, each of which raises a unique set of narrower interpretive issues. As Figure 1 illustrates, the Court has identified two general ways in which federal law can preempt state law. First, federal law can expressly preempt state law when a federal statute or regulation contains explicit preemptive language. Second, federal law can impliedly preempt state law when its structure and purpose implicitly reflect Congress's preemptive intent. The Court has also identified two subcategories of implied preemption: \"field preemption\" and \"conflict preemption.\" Field preemption occurs when a pervasive scheme of federal regulation implicitly precludes supplementary state regulation, or when states attempt to regulate a field where there is clearly a dominant federal interest. In contrast, conflict preemption occurs when compliance with both federal and state regulations is a physical impossibility (\"impossibility preemption\"), or when state law poses an \"obstacle\" to the accomplishment of the \"full purposes and objectives\" of Congress (\"obstacle preemption\"). Figure 1. Preemption TaxonomySource: CRS. While the Supreme Court has repeatedly distinguished these preemption categories, it has also explained that the presence of an express preemption clause in a federal statute does not preclude implied preemption analysis. In Geier v. American Honda Motor Co ., the Court held that although a preemption clause in a federal automobile safety statute did not expressly displace state common law claims involving automobile safety, the federal statute and associated regulations nevertheless impliedly preempted those claims based on conflict preemption principles. Congress must therefore consider the possibility that the laws it enacts may be construed as impliedly preempting certain categories of state law even if those categories do not fall within the explicit terms of a preemption clause. This report provides a general overview of federal preemption to inform Congress as it crafts laws implicating overlapping federal and state interests. The report begins by reviewing two general principles that have shaped the Court's preemption jurisprudence: the primacy of congressional intent and the \"presumption against preemption.\" The report then discusses how courts have interpreted certain language that is commonly used in express preemption clauses. Next, the report reviews judicial interpretations of statutory provisions designed to insulate certain categories of state law from federal preemption (\"savings clauses\"). Finally, the report discusses the Court's implied preemption case law by examining illustrative examples of its field preemption, impossibility preemption, and obstacle preemption decisions. The Supreme Court has repeatedly explained that in determining whether (and to what extent) federal law preempts state law, the purpose of Congress is the \"ultimate touchstone\" of its statutory analysis. The Court has further instructed that Congress's intent is discerned \"primarily\" from a statute's text. However, the Court has also noted the importance of statutory structure and purpose in determining how Congress intended specific federal regulatory schemes to interact with related state laws. Like many of its statutory interpretation cases, then, the Court's preemption decisions often involve disputes over the appropriateness of consulting extra-textual evidence to determine Congress's intent. In evaluating congressional purpose, the Court has at times employed a canon of construction commonly referred to as the \"presumption against preemption,\" which instructs that federal law should not be read to preempt state law \"unless that was the clear and manifest purpose of Congress.\" The Court regularly appealed to this principle in the 1980s and 1990s, but has invoked it inconsistently in recent cases. Moreover, in a 2016 decision, the Court departed from prior case law when it held that the presumption no longer applies in express preemption cases. The Court's repudiation of the presumption in express preemption cases can be traced to the growing popularity of textualist approaches to statutory interpretation, as many textualists have expressed skepticism about such \"substantive\" canons of construction. Unlike \"semantic\" or \"linguistic\" canons, which express rules of thumb concerning ordinary uses of language, substantive canons favor or disfavor particular outcomes âeven when those outcomes do not follow from the most natural reading of a statute's text. Because of these effects, prominent textualists have expressed suspicion about substantive canons' legitimacy. According to textualist critics of the presumption against preemption, a statute's inclusion of a preemption clause provides sufficient evidence of Congress's intent to preempt state law. These critics contend that in light of this clear expression of congressional intent, preemption clauses should be given their \"ordinary meaning\" rather than any narrower constructions that the presumption might dictate. The Supreme Court ultimately adopted this position in its 2016 decision in Puerto Rico v. Franklin California Tax-Free Trust . The Court has also endorsed certain narrower exceptions to the presumption against preemption. Specifically, the Court has declined to apply the presumption in cases involving (1) subjects which the states have not traditionally regulated, and (2) areas in which the federal government has traditionally had a \"significant\" regulatory presence. In Buckman Company v. Plaintiffs' Legal Committee , for example, the Court declined to apply the presumption when it held that federal law preempted state law claims alleging that a medical device manufacturer had defrauded the Food and Drug Administration during the pre-market approval process for its device. The Court refused to apply the presumption in Buckman on the grounds that states have not traditionally policed fraud against federal agencies, reasoning that the relationship between federal agencies and the entities they regulate is \"inherently federal in character.\" Likewise, in Arizona v. Inter Tribal Council of Arizona, Inc. , the Court declined to apply the presumption in holding that the National Voter Registration Act preempted a state law requiring voter-registration officials to reject certain registration applications. In refusing to apply the presumption, the Court explained that state regulation of congressional elections \"has always existed subject to the express qualification that it terminates according to federal law.\" Similarly, the Court has declined to apply the presumption in cases involving areas in which the federal government has traditionally had a \"significant\" regulatory presence. In United States v. Locke , the Court held that the federal Ports and Waterways Safety Act preempted state regulations regarding navigation watch procedures, crew English language skills, and maritime casualty reporting based in part on the fact that the state laws concerned maritime commerceâan area in which there was a \"history of significant federal presence.\" In such an area, the Court explained, \"there is no beginning assumption that concurrent regulation by the State is a valid exercise of its police powers.\" However, the status of the Locke exception to the presumption against preemption is unclear. In its 2009 decision in Wyeth v. Levine , the Court invoked the presumption when it held that federal law did not preempt certain state law claims concerning drug labeling. In allowing the claims to proceed, the Court acknowledged that the federal government had regulated drug labeling for more than a century, but explained that the presumption can apply even when the federal government has long regulated a subject. This reasoning stands in some tension with the Court's conclusion in Locke that the presumption does not apply when states regulate an area where there has been a \"history of significant federal presence.\" Whether the presumption continues to apply in fields traditionally regulated by the federal government accordingly remains unclear. Congress often relies on the language of existing preemption clauses in drafting new legislation. Moreover, when statutory language has a settled meaning, courts often look to that meaning to discern Congress's intent. This section of the report discusses how the Supreme Court has interpreted federal statutes that preempt (1) state laws \"related to\" certain subjects, (2) state laws concerning certain subjects \"covered\" by federal laws and regulations, (3) state requirements that are \"in addition to, or different than\" federal requirements, and (4) state \"requirements,\" \"laws,\" \"regulations,\" and \"standards.\" While preemption decisions depend heavily on the details of particular statutory schemes, the Court has assigned some of these phrases specific meanings even when they have appeared in different statutory contexts. Preemption clauses frequently provide that a federal statute supersedes all state laws that are \"related to\" a specific matter of federal regulatory concern. The Supreme Court has characterized such provisions as \"deliberatively expansive\" and \"conspicuous for [their] breadth.\" At the same time, however, the Court has cautioned against strictly literal interpretations of \"related to\" preemption clauses. Instead of reading such clauses \"to the furthest stretch of [their] indeterminacy,\" the Court has relied on legislative history and purpose to cabin their scope. The following subsections discuss the Court's interpretation of three statutes that contain \"related to\" preemption clauses: the Employee Retirement Income Security Act, the Airline Deregulation Act, and the Federal Aviation Administration Authorization Act. The Employee Retirement Income Security Act (ERISA) contains perhaps the most prominent example of a preemption clause that uses \"related to\" language. ERISA imposes comprehensive federal regulations on private employee benefit plans, including (1) detailed reporting and disclosure obligations, (2) schedules for the vesting, accrual, and funding of pension benefits, and (3) the imposition of certain duties of care and loyalty on plan administrators. The statute also contains a preemption clause providing that its requirements preempt all state laws that \"relate to\" regulated employee benefit plans. In interpreting this provision, the Supreme Court has identified two categories of state laws that are preempted by ERISA because they \"relate to\" regulated employee benefit plans: (1) state laws that have a \"connection with\" such plans, and (2) state laws that contain a \"reference to\" such plans. The Court has held that state laws have an impermissible \"connection with\" ERISA plans if they govern or interfere with \"a central matter of plan administration.\" In contrast, state laws that indirectly affect ERISA plans are not preempted unless the relevant effects are particularly \"acute.\" Applying these standards, the Court has held that ERISA preempts state laws governing areas of \"core ERISA concern,\" like the designation of ERISA plan beneficiaries and the disclosure of data regarding health insurance claims. In contrast, the Court has held that ERISA does not preempt state laws imposing surcharges on certain types of insurers and mandating wage levels for specific categories of employees who work on public projects. The Court has explained that these state laws are permissible because they affect ERISA plans only indirectly, and that ERISA preempts such laws only if the relevant indirect effects are particularly \"acute.\" The Court has also held that ERISA preempts state laws that contain an impermissible \"reference to\" ERISA plans. Under the Court's case law, a state law will contain an impermissible \"reference to\" ERISA plans where it \"acts immediately and exclusively upon ERISA plans,\" or where the existence of an ERISA plan is \"essential\" to the state law's operation. In Mackey v. Lanier Collection Agency & Service, Inc. , for example, the Court held that ERISAâwhich does not prohibit creditors from garnishing funds in regulated employee benefit plansâpreempted a state statute that prohibited the garnishment of funds in plans \"subject to . . . [ERISA].\" Because the challenged state statute expressly referenced ERISA plans, the Court held that it fell within the scope of ERISA's preemption clause even if it was enacted \"to help effectuate ERISA's underlying purposes.\" Similarly, in Ingersoll-Rand Company v. McClendon , the Court held that ERISAâwhich provides a federal cause of action for employees discharged because of an employer's desire to prevent a regulated pension from vestingâpreempted an employee's state law claim alleging that he was terminated in order to prevent his regulated pension from vesting. The Court reasoned that ERISA preempted this state law claim because the action made \"specific reference to\" and was \"premised on\" the existence of an ERISA-regulated pension plan. Finally, in District of Columbia v. Greater Washington Board of Trade , the Court held that ERISA preempted a state statute that required employers providing health insurance to their employees to continue providing coverage at existing benefit levels while employees received workers' compensation benefits. The Court reached this conclusion on the grounds that ERISA regulated the relevant employees' existing health insurance coverage, meaning that the state law specifically referred to ERISA plans. The Airline Deregulation Act (ADA) is another example of a statute that employs \"related to\" preemption language. Enacted in 1978, the ADA largely deregulated domestic air transportation, eliminating the federal Civil Aeronautics Board's authority to control airfares. In order to ensure that state governments did not interfere with this deregulatory effort, the ADA prohibited states from enacting laws \" relating to a price, route, or service of an air carrier.\" The Supreme Court's interpretation of the ADA's preemption clause has largely followed its ERISA decisions in applying the \"connection with\" and \"reference to\" standards. In Morales v. Trans World Airlines, Inc ., for example, the Court relied in part on its ERISA case law to conclude that the ADA preempted state consumer protection statutes prohibiting deceptive airline fare advertisements. Specifically, the Court reasoned that because the challenged state statutes expressly referenced airfares and had a \"significant effect\" on them, they \"related to\" airfares within the meaning of the ADA's preemption clause. The Federal Aviation Administration Authorization Act of 1994 (FAAA) is a third example of a statute that utilizes \"related to\" preemption language. While the FAAA (as its title suggests) is principally concerned with aviation regulation, it also supplemented Congress's deregulation of the trucking industry. The statute pursued this objective with a preemption clause prohibiting states from enacting laws \" related to a price, route, or service of any motor carrier . . . with respect to the transportation of property.\" In interpreting this language, the Supreme Court has relied on the \"connection with\" standard from its ERISA and ADA case law. However, the Court has also acknowledged that the clause's \"with respect to\" qualifying language significantly narrows the FAAA's preemptive scope. In Rowe v. New Hampshire Motor Transport Association , the Supreme Court relied in part on its ERISA and ADA case law to hold that the FAAA preempted certain state laws regulating the delivery of tobacco, including a law that required retailers shipping tobacco to employ motor carriers that utilized certain kinds of recipient-verification services. The Court reached this conclusion for two principal reasons. First, the Court reasoned that the requirement had an impermissible \"connection with\" motor carrier services because it \"focuse[d] on\" such services. Second, the Court concluded that the state law fell within the terms of the FAAA's preemption clause because of its effects on the FAAA's deregulatory objectives. Specifically, the Court reasoned that the state law had a \"connection with\" these objectives because it dictated that motor carriers use certain types of recipient-verification services, thereby substituting the state's commands for \"competitive market forces.\" However, the Court has also held that the FAAA's \"with respect to\" qualifying language significantly narrows the statute's preemptive scope. In Dan's City Used Cars, Inc. v. Pelkey , the Court relied on this language to hold that the FAAA did not preempt state law claims involving the storage and disposal of a towed car. Specifically, the Court held that the FAAA did not preempt state law claims alleging that a towing company (1) failed to provide the plaintiff with proper notice that his car had been towed, (2) made false statements about the condition and value of the car, and (3) auctioned the car despite being informed that the plaintiff wanted to reclaim it. In allowing these claims to proceed, the Court observed that the FAAA's preemption clause mirrored the ADA's preemption clause with \"one conspicuous alteration\"âthe addition of the phrase \"with respect to the transportation of property.\" According to the Court, this phrase \"massively\" limited the scope of FAAA preemption. And because the relevant state law claims involved the storage and disposal of towed vehicles rather than their transportation , the Court held that they did not qualify as state laws that \"related to\" motor carrier services \"with respect to the transportation of property.\" The Supreme Court's case law concerning \"related to\" preemption clauses reflects a number of general principles. The Court has consistently held that state laws \"relate to\" matters of federal regulatory concern when they have a \"connection with\" or contain a \"reference to\" such matters. Generally, state laws have an impermissible \"connection with\" matters of federal concern when they prescribe rules specifically directed at the same subject as the relevant federal regulatory scheme, or when their indirect effects on the federal scheme are particularly \"acute.\" As a corollary to the latter principle, the Court has made clear that state laws having only \"tenuous, remote, or peripheral\" effects on an issue of federal concern are not sufficiently \"related to\" the issue to warrant preemption. In contrast, a state law contains an impermissible \"reference to\" a matter of federal regulatory interest (and therefore \"relates to\" such a matter) when it \"acts immediately and exclusively upon\" the matter, or where the existence of a federal regulatory scheme is \"essential\" to the state law's operation. Finally, the inclusion of qualifying language can narrow the scope of \"related to\" preemption clauses. As the Court made clear in Dan's City , the scope of \"related to\" preemption clauses can be significantly limited by the addition of \"with respect to\" qualifying language. The Supreme Court has interpreted a preemption clause that allowed states to enact regulations related to a subject until the federal government adopted regulations \"covering\" that subject as having a narrower effect than \"related to\" preemption clauses. The Court reached this conclusion in CSX Transportation, Inc. v. Easterwood , where it interpreted a preemption clause in the Federal Railroad Safety Act allowing states to enact laws related to railroad safety until the federal government adopted regulations \"covering the subject matter\" of such laws. In Easterwood , the Court explained that \"covering\" is a \"more restrictive term\" than \"related to,\" and that federal law will accordingly \"cover\" the subject matter of a state law only if it \"substantially subsume[s]\" that subject. Applying this standard, the Court held that federal laws and regulations did not preempt state law claims alleging that a train operator failed to maintain adequate warning devices at a grade crossing where a collision had occurred. The Court allowed these claims to proceed on the grounds that the relevant federal regulationsâwhich required states receiving federal railroad funds to establish a highway safety program and \"consider\" the dangers posed by grade crossingsâdid not \"substantially subsume\" the subject of warning device adequacy. Specifically, the Court reasoned that the federal regulations did not \"substantially subsume\" this subject because they established the \"general terms of the bargain\" between the federal government and states receiving federal funds, but did not reflect an intent to displace supplementary state regulations. However, the Easterwood Court held that federal law preempted other state law claims alleging that the relevant train traveled at an unsafe speed despite complying with federal maximum-speed regulations. In holding that these claims were preempted, the Court reasoned that federal maximum-speed regulations \"substantially subsumed\" (and therefore \"covered\") the subject of train speeds because they comprehensively regulated that issue, reflecting an intent to preclude additional state regulations. Accordingly, while the Court has made clear that \"covering\" preemption clauses of the sort at issue in Easterwood have a narrower effect than \"related to\" clauses, specific determinations that federal law \"covers\" a subject will depend heavily on the details of particular regulatory schemes. A number of federal statutes preempt state requirements that are \"in addition to, or different than\" federal requirements. The Supreme Court has explained that these statutes preempt state law even in cases where a regulated entity can comply with both federal and state requirements. The Court adopted this position in National Meat Association v. Harris , where it interpreted a preemption clause in the Federal Meat Inspection Act (FMIA) prohibiting states from imposing requirements on meatpackers and slaughterhouses that are \"in addition to, or different than\" federal requirements. In Harris , the Court held that certain California slaughterhouse regulations were \"in addition to, or different than\" federal regulations because they imposed a distinct set of requirements that went beyond those imposed by federal law. Because the California requirements differed from federal requirements, the Court explained, they fell within the plain meaning of the FMIA's preemption clause even if slaughterhouses were able to comply with both sets of restrictions. Preemption clauses that employ \"in addition to, or different than\" language often raise a second interpretive issue involving the status of state requirements that are identical to federal requirements (\"parallel requirements\"). The Supreme Court has interpreted two statutes employing this language to not preempt parallel state law requirements. In instructing lower courts on how to assess whether state requirements in fact parallel federal requirements, the Court has explained that state law need not explicitly incorporate federal standards in order to avoid qualifying as \"in addition to, or different than\" federal requirements. Rather, the Court has indicated that state requirements must be \" genuinely equivalent\" to federal requirements in order to avoid preemption under such clauses. One lower court has interpreted this instruction to mean that state restrictions do not genuinely parallel federal restrictions if a defendant could violate state law without having violated federal law. The Court has also explained that state requirements do not qualify as \"in addition to, or different than\" federal requirements simply because state law provides injured plaintiffs with different remedies than federal law. Accordingly, absent contextual evidence to the contrary, preemption clauses that employ \"in addition to, or different than\" language will allow states to give plaintiffs a damages remedy for violations of state requirements even where federal law does not offer such a remedy for violations of parallel federal requirements. Federal statutes frequently preempt state \"requirements,\" \"laws,\" \"regulations,\" and/or \"standards\" concerning subjects of federal regulatory concern. These preemption clauses have required the Supreme Court to determine whether such terms encompass state common law actions (as opposed to state statutes and regulations) involving the relevant subjects. The Supreme Court has explained that absent evidence to the contrary, a preemption clause's reference to state \"requirements\" includes state common law duties. In contrast, the Court has interpreted one preemption clause's reference to state \"law[s] or regulation[s]\" as encompassing only \"positive enactments\" and not common law actions. The Court reached this conclusion in Sprietsma v. Mercury Marine , where it considered the meaning of a preemption clause in the Federal Boat Safety Act of 1971 (FBSA) prohibiting states from enforcing \"a law or regulation\" concerning boat safety that is not identical to federal laws and regulations. The FBSA also includes a \"savings clause\" providing that compliance with the Act does not \"relieve a person from liability at common law or under State law.\" In Sprietsma , the Court held that the phrase \"a law or regulation\" in the FBSA did not encompass state common law claims for three reasons. First, the Court reasoned that the inclusion of the article \"a\" before \"law or regulation\" implied a \"discreteness\" that is reflected in statutes and regulations, but not in common law. Second, the Court concluded that the pairing of the terms \"law\" and \"regulation\" indicated that Congress intended to preempt only positive enactments. Specifically, the Court reasoned that if the term \"law\" were given an expansive interpretation that included common law claims, it would also encompass \"regulations\" and thereby render the inclusion of that latter term superfluous. Finally, the Court reasoned that the FBSA's savings clause provided additional support for the conclusion that the phrase \"law or regulation\" did not encompass common law actions. Lastly, while the Court had the opportunity to determine whether a preemption clause's use of the term \"standard\" encompassed state common law actions in Geier v. American Honda Motor Co., Inc. , it ultimately declined to take up that question and resolved the case on other grounds discussed in greater detail below. Many federal statutes contain provisions that purport to restrict their preemptive effect. These \"savings clauses\" make clear that federal law does not preempt certain categories of state law, reflecting Congress's recognition of the need for states to \"fill a regulatory void\" or \"enhance protection for affected communities\" through supplementary regulation. The law regarding savings clauses \"is not especially well developed,\" and cases involving such clauses \"turn very much on the precise wording of the statutes at issue.\" With these caveats in mind, this section discusses three general categories of savings clauses: (1) \"anti-preemption provisions,\" (2) \"compliance savings clauses,\" and (3) \"remedies savings clauses.\" Some savings clauses contain language indicating that \"nothing in\" the relevant federal statute \"may be construed to preempt or supersede\" certain categories of state law, or that the relevant federal statute \"does not annul, alter, or affect\" state laws \"except to the extent that those laws are inconsistent\" with the federal statute. Certain statutes containing this \"inconsistency\" language further provide that state laws are not \"inconsistent\" with the relevant federal statute if they provide greater protection to consumers than federal law. Some courts and commentators have labeled these clauses \"anti-preemption provisions.\" While the case law on anti-preemption provisions is not well-developed, some courts have addressed such provisions in the context of defendants' attempts to remove state law actions to federal court. Specifically, certain courts have relied on anti-preemption provisions to reject removal arguments premised on the theory that federal law \"completely\" preempts state laws concerning the relevant subject. In Bernhard v. Whitney National Bank , for example, the U.S. Court of Appeals for the Fifth Circuit relied on an anti-preemption provision in the Electronic Funds Transfer Act to reject a defendant-bank's attempt to remove state law claims involving unauthorized funds transfers to federal court. A number of federal district courts have also adopted similar interpretations of other anti-preemption provisions. Some savings clauses provide that compliance with federal law does not relieve a person from liability under state law. The principal interpretive issue with such clauses is whether they limit a statute's preemptive effect (a question of federal law) or are instead intended to discourage the conclusion that compliance with federal regulations necessarily renders a product nondefective as a matter of state tort law. While the Supreme Court has not adopted a generally applicable rule concerning the meaning of compliance savings clauses, it has concluded that such clauses can support a narrow interpretation of a statute's preemptive effect. In Geier v. American Honda Motor Co., Inc. , the Court relied in part on a compliance savings clause in the National Traffic and Motor Vehicle Safety Act (NTMVSA) to hold that the statute did not expressly preempt state common law claims against an automobile manufacturer. The NTMVSA contains (1) a preemption clause prohibiting states from enforcing safety standards for motor vehicles that are not identical to federal standards, and (2) a \"savings clause\" providing that compliance with federal safety standards does not \"exempt any person from any liability under common law.\" In Geier , the Court explained that although it was \"possible\" to read the NTMVSA's preemption clause standing alone as encompassing the state law claims, that reading of the statute would leave the Act's savings clause without effect. The Court accordingly held that the NTMVSA did not expressly preempt the state law claims based in part on the Act's savings clause. Similarly, in Sprietsma v. Mercury Marine , the Court reasoned that a nearly identical savings clause in the FBSA \"buttresse[d]\" the conclusion that state common law claims did not qualify as \"law[s] or regulation[s]\" within the meaning of the statute's preemption clause. The Court has accordingly relied on compliance savings clauses to inform its interpretation of express preemption clauses, but has not held that such clauses automatically insulate state laws from preemption. Some savings clauses provide that \"nothing in\" a federal statute \"shall in any way abridge or alter the remedies now existing at common law or by statute.\" While the case law on these \"remedies savings clauses\" is limited, the Supreme Court has interpreted one such clause as evincing Congress's intent to disavow field preemption, but not as preserving state laws that conflict with federal objectives. Some savings clauses limit a federal statute's preemptive effect on certain laws enacted by \"State[s] or political subdivisions thereof,\" while others by their terms protect only \"State\" laws. The Supreme Court has twice held that savings clauses that by their terms applied only to \"State\" laws also insulated local laws from preemption. In Wisconsin Public Intervenor v. Mortier , the Court held that the Federal Insecticide, Fungicide, and Rodenticide Act did not preempt local ordinances regulating pesticides based in part on a savings clause providing that \"State[s]\" may regulate federally registered pesticides in certain circumstances. In concluding that the term \"State\" included political subdivisions of states, the Court relied on the principle that local governments are \"convenient agencies\" by which state governments can exercise their powers. Similarly, in City of Columbus v. Ours Garage & Wrecker Service , the Court held that the Interstate Commerce Act (ICA) did not preempt municipal safety regulations governing tow-truck operators based in part on a savings clause providing that the ICA \"shall not restrict the safety regulatory authority of a State with respect to motor vehicles.\" Relying in part on its reasoning in Mortier , the Court explained that absent a clear statement to the contrary, Congress's reference to the regulatory authority of a \"State\" should be read to preserve \"the traditional prerogative of the States to delegate their authority to their constituent parts.\" As discussed, federal law can impliedly preempt state law even when it does not do so expressly . Like its express preemption decisions, the Supreme Court's implied preemption cases focus on Congress's intent. The Supreme Court has recognized two general forms of implied preemption. First, \"field preemption\" occurs when a pervasive scheme of federal regulation implicitly precludes supplementary state regulation, or when states attempt to regulate a field where there is clearly a dominant federal interest. Second, \"conflict preemption\" occurs when state law interferes with federal goals. The Supreme Court has held that federal law preempts state law where Congress has manifested an intention that the federal government occupy an entire field of regulation. Federal law may reflect such an intent through a scheme of federal regulation that is \"so pervasive as to make reasonable the inference that Congress left no room for States to supplement it,\" or where federal law concerns \"a field in which the federal interest is so dominant that the federal system will be assumed to preclude enforcement of state laws on the same subject.\" Applying these principles, the Court has held that federal law occupies a variety of regulatory fields, including alien registration, nuclear safety, aircraft noise, the \"design, construction, alteration, repair, maintenance, operation, equipping, personnel qualification, and manning\" of tanker vessels, wholesales of natural gas in interstate commerce, and locomotive equipment. In its 1947 decision in Rice v. Santa Fe Elevator Corp oration , the Supreme Court held that federal law preempted a number of fields related to grain warehousing, precluding even complementary state regulations of those fields. In that case, the Court held that the federal Warehouse Act and associated regulations preempted a variety of state law claims brought against a grain warehouse, including allegations that the warehouse had engaged in unfair pricing, maintained unsafe elevators, and impermissibly mixed different qualities of grain. The Court discerned Congress's intent to occupy the relevant fields from an amendment to the Warehouse Act that made the Secretary of Agriculture's authorities \"exclusive\" vis-Ã -vis federally licensed warehouses. Because the text and legislative history of this amendment reflected Congress's intent to eliminate overlapping federal and state warehouse regulations, the Court held that federal law occupied a number of fields involving grain warehousing. As a result, the Court concluded that the Warehouse Act preempted certain state law claims that intruded into those federally regulated fields, even if federal law established standards that were \"more modest\" and \"less pervasive\" than those imposed by state law. The Court has also held that federal law preempts the field of alien registration. In its 1941 decision in Hines v. Davidowitz , the Court held that federal immigration lawâwhich required aliens to register with the federal governmentâpreempted a Pennsylvania law that required aliens to register with the state, pay a registration fee, and carry an identification card. In reaching this conclusion, the Court explained that because alien regulation is \"intimately blended and intertwined\" with the federal government's core responsibilities and Congress had enacted a \"complete\" regulatory scheme involving that field, federal law preempted the additional Pennsylvania requirements. The Court reaffirmed these general principles from Hines in its 2012 decision in Arizona v. United States . In Arizona , the Court held that the Immigration and Nationality Act (INA), which requires aliens to carry an alien registration document, preempted an Arizona statute that made violations of that federal requirement a crime under state law. In holding that federal law preempted this Arizona requirement, the Court explained that like the statutory framework at issue in Hines , the INA represented a \"comprehensive\" regulatory regime that \"occupied the field of alien registration.\" Specifically, the Court inferred Congress's intent to occupy this field from the INA's \"full set of standards governing alien registration,\" which included specific penalties for noncompliance. The Court accordingly held that federal law preempted even \"complementary\" state laws regulating alien registration like the challenged Arizona requirement. However, the Court has also made clear that other types of state laws concerning aliens do not necessarily fall within the preempted field of alien registration . In its 1976 decision in De Canas v. Bica , the Court held that federal law did not preempt a California law prohibiting the employment of aliens not entitled to lawful residence in the United States. The Court reached this conclusion on the grounds that nothing in the text or legislative history of the INAâwhich did not directly regulate the employment of such aliens at the timeâsuggested that Congress intended to preempt all state regulations concerning the activities of aliens. Instead, the Court reasoned that while the INA comprehensively regulated the immigration and naturalization processes, it did not address employment eligibility for aliens without legal immigration status. As a result, the Court held that the challenged California law fell outside the preempted field of alien registration. The Court has also upheld several state laws regulating the activities of aliens since De Canas . In Chamber of Commerce v. Whiting , for example, the Court held that federal law did not preempt an Arizona statute allowing the state to revoke an employer's business license for hiring aliens who did not possess work authorization. The Court has accordingly made clear that the preempted field of alien registration does not encompass all state laws concerning aliens. The Supreme Court has also held that federal law preempts the field of nuclear safety regulation. However, the Court has explained this field does not encompass all state laws that affect safety decisions made by nuclear power plants. Instead, the Court has concluded that state laws fall within the preempted field of nuclear safety regulation if they (1) are motivated by safety concerns and implicate a \"core federal power,\" or (2) have a \"direct and substantial\" effect on safety decisions made by nuclear facilities. This division of authority is the result of a regulatory regime that has changed significantly over the course of the 20th century. Before 1954, the federal government maintained a monopoly over the use, control, and ownership of nuclear technology. However, in 1954, the Atomic Energy Act (AEA) allowed private entities to own, construct, and operate nuclear power plants subject to a \"strict\" licensing and regulatory regime administered by the Atomic Energy Commission (AEC). In 1959, Congress amended the AEA to give the states greater authority over nuclear energy regulation. Specifically, the 1959 Amendments allowed states to assume responsibility over certain nuclear materials as long as their regulations were \"coordinated and compatible\" with federal requirements. While the 1959 Amendments reserved certain key authorities to the federal government, they also affirmed the states' ability to regulate \"activities for purposes other than protection against radiation hazards.\" Congress reorganized the administrative framework surrounding these regulations in 1974, when it replaced the AEC with the Nuclear Regulatory Commission (NRC). The Supreme Court has held that while this regulatory scheme preempts the field of nuclear safety regulation, certain state regulations of nuclear power plants that have a non-safety rationale fall outside this preempted field. The Court identified this distinction in Pacific Gas and Electric Company v. State Energy Resources Conservation & Development Commission , where it held that federal law did not preempt a California statute regulating the construction of new nuclear power plants. Specifically, the California statute conditioned the construction of new nuclear power plants on a state agency's determination concerning the availability of adequate storage facilities and means of disposal for spent nuclear fuel. In challenging this state statute, two public utilities contended that federal law made the federal government the \"sole regulator of all things nuclear.\" However, the Court rejected this argument, reasoning that while Congress intended that the federal government regulate nuclear safety , the relevant statutes reflected Congress's intent to allow states to regulate nuclear power plants for non-safety purposes. The Court then concluded that the California law survived preemption because it was motivated by concerns over electricity generation and the economic viability of new nuclear power plantsânot a desire to intrude into the preempted field of nuclear safety regulation. In addition to holding that the AEA does not preempt all state statutes and regulations concerning nuclear power plants, the Court has upheld certain state tort claims related to injuries sustained by power plant employees. In Silkwood v. Kerr-McGee Corp oration , the Court upheld a punitive damages award against a nuclear laboratory arising from an employee's injuries from plutonium contamination. In upholding the damages award, the Court rejected the laboratory's argument that the award impermissibly punished and deterred conduct related to the preempted field of nuclear safety. Instead, the Court concluded that federal law did not preempt such damages awards because it found \"no indication\" that Congress had ever seriously considered such an outcome. Moreover, the Court observed that Congress had failed to provide alternative federal remedies for persons injured in nuclear accidents. According to the Court, this legislative silence was significant because it was \"difficult to believe\" that Congress would have removed all judicial recourse from plaintiffs injured in nuclear accidents without an explicit statement to that effect. The Court also reasoned that Congress had assumed the continued availability of state tort remedies when it adopted a 1957 amendment to the AEA. Under the relevant amendment, the federal government partially indemnified power plants for certain liabilities for nuclear accidentsâa scheme that reflected an assumption that plaintiffs injured in such accidents retained the ability to bring tort claims against the power plants. Based on this evidence, the Court rejected the argument that Congress's occupation of the field of nuclear safety regulation preempted all state tort claims arising from nuclear incidents. The Court applied this reasoning from Silkwood six years later in English v. General Electric Company , where it held that federal law did not preempt state tort claims alleging that a nuclear laboratory had retaliated against a whistleblower for reporting safety concerns. In allowing the claims to proceed, the Court rejected the argument that federal law preempts all state laws that affect plants' nuclear safety decisions. Rather, the Court explained that in order to fall within the preempted field of nuclear safety regulation, a state law must have a \"direct and substantial\" effect on such decisions. While the Court acknowledged that the relevant tort claims may have had \"some effect\" on safety decisions by making retaliation against whistleblowers more costly than safety improvements, it concluded that such an effect was not sufficiently \"direct and substantial\" to bring the claims within the preempted field. In making this assessment, the Court relied on Silkwood , where it held that the relevant punitive damages award fell outside the field of nuclear safety regulation despite its likely impact on safety decisions. Because the Court concluded that the type of damages award at issue in Silkwood affected safety decisions \"more directly\" and \"far more substantially\" than the whistleblower's retaliation claims, it held that the retaliation claims were not preempted. A determination that federal law preempts a field has powerful consequences, displacing even state laws and regulations that are consistent with or complementary to federal law. However, because of these effects, the Court has cautioned against overly hasty inferences that Congress has occupied a field. Specifically, the Court has rejected the argument that the comprehensiveness of a federal regulatory scheme is sufficient to conclude that federal law occupies a field, explaining that Congress and federal agencies often adopt \"intricate and complex\" laws and regulations without intending to assume exclusive regulatory authority over the relevant subjects. The Court has accordingly relied on legislative history and statutory structureâin addition to the comprehensiveness of federal regulationsâin assessing field preemption arguments. The Court has also adopted a narrow view of the scope of certain preempted fields. For example, the Court has rejected the proposition that federal nuclear energy regulations preempt all state laws that affect the preempted field of nuclear safety regulation, explaining that state laws fall within that field only if they have a \"direct and substantial\" effect on it. As a corollary to this principle, the Court has held that in certain contexts, generally applicable state laws are more likely to fall outside a federally preempted field than state laws that \"target\" entities or issues within the field. In O neok, Inc. v. Learjet, Inc. , for example, the Court held that state antitrust claims against natural gas pipelines fell outside the preempted field of interstate natural gas wholesaling because the relevant state antitrust law was not \"aimed\" at natural gas companies and instead applied broadly to all businesses. Finally, the Court's case law underscores that Congress can narrow the scope of a preempted field with explicit statutory language. In Pacific Gas , for example, the Court held that the preempted field of nuclear safety regulation did not encompass state laws motivated by non-safety concerns based in part on a statutory provision disavowing such an intent. While the Court has subsequently narrowed the circumstances in which it will apply Pacific Gas 's purpose-centric inquiry to state laws affecting nuclear energy, it has reaffirmed the general principle that Congress can circumscribe a preempted field's scope with such \"non-preemption clauses.\" Federal law also impliedly preempts conflicting state laws. The Supreme Court has identified two subcategories of conflict preemption. First, federal law impliedly preempts state law when it is impossible for regulated parties to comply with both sets of laws (\"impossibility preemption\"). Second, federal law impliedly preempts state laws that pose an obstacle to the \"full purposes and objectives\" of Congress (\"obstacle preemption\"). The two subsections below discuss these subcategories of conflict preemption. The Supreme Court has held that federal law preempts state law when it is physically impossible to comply with both sets of laws. To illustrate this principle, the Court has explained that a hypothetical federal law forbidding the sale of avocados with more than 7% oil content would preempt a state law forbidding the sale of avocados with less than 8% oil content, because avocado sellers could not sell their products and comply with both laws. The Court has characterized impossibility preemption as a \"demanding defense,\" and its case law on the issue is not as well-developed as other areas of its preemption jurisprudence. However, the Court extended impossibility preemption doctrine in two recent decisions concerning prescription drug labeling. In PLIVA v. Mensing and Mutual Pharmaceutical Co. v. Bartlett , the Court held that federal regulations of generic drug labels preempted certain state law claims brought against generic drug manufacturers because it was impossible for the manufacturers to comply with both federal and state law. In both cases, plaintiffs alleged that they suffered adverse effects from certain generic drugs and argued that the drugs' labels should have included additional warnings. In response, the drug manufacturers argued that the Hatch-Waxman Amendments (Hatch-Waxman) to the Food, Drug, and Cosmetic Act preempted the state law claims. Under Hatch-Waxman, drug manufacturers can secure Food and Drug Administration (FDA) approval for generic drugs by demonstrating that they are equivalent to a brand-name drug already approved by the FDA. In doing so, the generic drug manufacturers need not comply with the FDA's standard preapproval process, which requires extensive clinical testing and the development of FDA-approved labeling. However, generic drug makers that use the streamlined Hatch-Waxman process must ensure that the labels for their drugs are the same as the labels for corresponding brand-name drugs, meaning that generic manufacturers cannot unilaterally change their labels. In both PLIVA and Bar t lett , the Court held that the Hatch-Waxman Amendments preempted the relevant state law claims because it was impossible for the generic drug manufacturers to comply with both federal and state law. Specifically, the Court reasoned that it was impossible for the drug makers to comply with both sets of laws because federal law prohibited them from unilaterally altering their labels, while the state law claims depended on the existence of a duty to make such alterations. In other words, the Court reasoned that it was impossible for the manufacturers to comply with both their state law duty to change their labels and their federal duty to keep their labels the same. In reaching this conclusion in PLIVA , the Court rejected the argument that it was possible for manufacturers to comply with both federal and state law by petitioning the FDA to impose new labeling requirements on the corresponding brand-name drugs. The Court rejected this argument on the grounds that impossibility preemption occurs whenever a party cannot independently comply with both federal and state law without seeking \"special permission and assistance\" from the federal government. Similarly, in Bartlett , the Court rejected the argument that it was possible for generic drug makers to comply with both federal and state law by refraining from selling the relevant drugs. The Court rejected this \"stop-selling\" argument on the grounds that it would render impossibility preemption \"all but meaningless.\" As a result, an evaluation of whether it is \"impossible\" to comply with both federal and state law must presuppose some affirmative conduct by the regulated party. Despite its decisions in PLIVA and Bartlett , the Court has rejected impossibility preemption arguments made by brand-name drug manufacturers, who are entitled to unilaterally strengthen the warning labels for their drugs. In Wyeth v. Levine , the Court held that federal law did not preempt a state law failure-to-warn claim brought against the manufacturer of a brand-name drug, reasoning that it was possible for the manufacturer to strengthen its label for the drug without FDA approval. However, the Wyeth Court noted that an impossibility preemption defense may be available to brand-name drug manufacturers when there is \"clear evidence\" that the FDA would have rejected a proposed change to a brand-name drug's label. Federal law also impliedly preempts state laws that pose an \"obstacle\" to the \"full purposes and objectives\" of Congress. In its obstacle preemption cases, the Court has held that state law can interfere with federal goals by frustrating Congress's intent to adopt a uniform system of federal regulation, conflicting with Congress's goal of establishing a regulatory \"ceiling\" for certain products or activities, or by impeding the vindication of a federal right. However, the Court has also cautioned that obstacle preemption does not justify a \"freewheeling judicial inquiry\" into whether state laws are \"in tension\" with federal objectives, as such a standard would undermine the principle that \"it is Congress rather than the courts that preempts state law.\" The subsections below discuss a number of cases in which the Court has held that state law poses an obstacle to the accomplishment of federal goals. The Supreme Court has concluded that state laws can pose an obstacle to the accomplishment of federal objectives by interfering with Congress's choice to concentrate decisionmaking in federal authorities. The Court's decision in Crosby v. National Foreign Trade Council illustrates this type of conflict between state law and federal policy goals. In Crosby , the Court held that a federal statute imposing sanctions on Burma preempted a Massachusetts statute that restricted state agencies' ability to purchase goods or services from companies doing business with Burma. The Court identified several ways in which the Massachusetts law interfered with the federal statute's objectives. First, the Court reasoned that the Massachusetts law interfered with Congress's decision to provide the President with the flexibility to add or waive sanctions in response to ongoing developments by \"imposing a different, state system of economic pressure against the Burmese political regime.\" Second, the Court explained that because the Massachusetts statute penalized certain individuals and conduct that Congress explicitly excluded from federal sanctions, it interfered with the federal statute's goal of limiting the economic pressure imposed by the sanctions to \"a specific range.\" In identifying this conflict, the Court rejected the state's argument that its law \"share[d] the same goals\" as the federal act, reasoning that the additional sanctions imposed by the state law would still undermine Congress's intended \"calibration of force.\" Finally, the Court concluded that the Massachusetts law undermined the President's capacity for effective diplomacy by compromising his ability \"to speak for the Nation with one voice.\" The Court has concluded that some federal laws and regulations evince an intent to establish both a regulatory \"floor\" and \"ceiling\" for certain products and activities. The Court has interpreted certain federal automobile safety regulations, for example, as not only imposing minimum safety standards on carmakers, but as insulating manufacturers from certain forms of stricter state regulation as well. In Geier v. American Honda Motor Co. , the Court held that the National Traffic and Motor Vehicle Safety Act (NTMVSA) and associated regulations impliedly preempted state tort claims alleging that an automobile manufacturer had negligently designed a car without a driver's side airbag. While the Court rejected the argument that the NTMVSA expressly preempted the state law claims, it reasoned that the claims interfered with the federal objective of giving car manufacturers the option of installing a \"variety and mix\" of passive restraints. The Court discerned this goal from, among other things, the history of the relevant regulations and Department of Transportation (DOT) comments indicating that the regulations were intended to lower costs, incentivize technological development, and encourage gradual consumer acceptance of airbags rather than impose an immediate requirement. The Court accordingly held that the NTMVSA impliedly preempted the state law claims because they conflicted with these federal goals. However, the Court has rejected the argument that federal automobile safety standards impliedly preempt all state tort claims concerning automobile safety. In Williamson v. Mazda Motor of America, Inc. , the Court held that a different federal safety standard did not preempt a state law claim alleging that a carmaker should have installed a certain type of seatbelt in a car's rear seat. While the regulation at issue in Williamson allowed manufacturers to choose between a variety of seatbelt options, the Court distinguished the case from Geier on the grounds that the DOT's decision to offer carmakers a range of choices was not a \"significant\" regulatory objective. Specifically, the Court reasoned that because the DOT's decision to offer manufacturers a range of options was based on relatively minor design and cost-effectiveness concerns, the state tort action did not conflict with the purpose of the relevant federal regulation. The Court has also held that state law can pose an obstacle to federal goals where it impedes the vindication of federal rights. In Felder v. Casey , the Court held that 42 U.S.C. Â§ 1983 (Section 1983)âwhich provides individuals with the right to sue state officials for federal civil rights violationsâpreempted a state statute adopting certain procedural rules for bringing Section 1983 claims in state court. Specifically, the state statute required Section 1983 plaintiffs to provide government defendants 120 days' written notice of (1) the circumstances giving rise to their claims, (2) the amount of their claims, and (3) their intent to bring suit. The Court held that federal law preempted these requirements because the \"purpose\" and \"effect\" of the requirements conflicted with Section 1983's remedial objectives. Specifically, the Court reasoned that the requirements' purpose of minimizing the state's liability conflicted with Section 1983's goal of providing relief to individuals whose constitutional rights are violated by state officials. Moreover, the Court concluded that the state statute's effects interfered with federal objectives because its enforcement would result in different outcomes in Section 1983 litigation based solely on whether a claim was brought in state or federal court. The Supreme Court has held that state law can conflict with federal law in a number of ways. First, state law can conflict with federal law when it is physically impossible to comply with both sets of laws. While the Court has characterized this type of impossibility preemption argument as a \"demanding defense,\" its decisions in PLIVA and Bartlett arguably extended the doctrine's scope. In those cases, the Court made clear that impossibility preemption remains a viable defense even in instances in which a regulated party can petition the federal government for permission to comply with state law or stop selling a regulated product altogether. State law can also conflict with federal law when it poses an \"obstacle\" to federal goals. In evaluating congressional intent in obstacle preemption cases, the Court has relied upon statutory text, structure, and legislative history to determine the scope of a statute's preemptive effect. Relying on these indicia of legislative purpose, the Court has held that state laws can pose an obstacle to federal goals by interfering with a uniform system of federal regulation, imposing stricter requirements than federal law (where federal law evinces an intent to establish a regulatory \"ceiling\"), or by impeding the vindication of a federal right. While obstacle preemption has played an important role in the Court's preemption jurisprudence since the mid-20th century, recent developments may result in a narrowing of the doctrine. Indeed, commentators have noted the tension between increasingly popular textualist theories of statutory interpretationâwhich reject extra-textual evidence as a possible source of statutory meaningâand obstacle preemption doctrine, which arguably allows courts to consult such evidence. Identifying this alleged inconsistency, Justice Thomas has categorically rejected the Court's obstacle preemption jurisprudence, criticizing the Court for \"routinely invalidat[ing] state laws based on perceived conflicts with broad federal policy objectives, legislative history, or generalized notions of congressional purposes that are not embodied within the text of federal law.\" The Court's recent additions may also presage a narrowing of obstacle preemption doctrine, as some commentators have characterized Justices Gorsuch and Kavanaugh as committed textualists. Indeed, the Court's 2019 decision in Virginia Uranium, Inc. v. Warren suggests that Justices Gorsuch and Kavanaugh may share Justice Thomas's skepticism toward obstacle preemption arguments. In that case, Justice Gorsuch authored an opinion joined by Justices Thomas and Kavanaugh in which he rejected the proposition that implied preemption analysis should appeal to \"abstract and unenacted legislative desires\" not reflected in a statute's text. While Justice Gorsuch did not explicitly endorse a wholesale repudiation of what he characterized as the \"purposes-and-objectives branch of conflict preemption,\" he emphasized that any evidence of Congress's preemptive purpose must be sought in a statute's text and structure.", "summary": "The Constitution's Supremacy Clause provides that federal law is \"the supreme Law of the Land\" notwithstanding any state law to the contrary. This language is the foundation for the doctrine of federal preemption, according to which federal law supersedes conflicting state laws. The Supreme Court has identified two general ways in which federal law can preempt state law. First, federal law can expressly preempt state law when a federal statute or regulation contains explicit preemptive language. Second, federal law can impliedly preempt state law when Congress's preemptive intent is implicit in the relevant federal law's structure and purpose. This report begins with an overview of certain general preemption principles. In both express and implied preemption cases, the Supreme Court has made clear that Congress's purpose is the \"ultimate touchstone\" of its statutory analysis. The Court's analysis of Congress's purpose has at times been informed by a canon of statutory construction known as the \"presumption against preemption,\" which instructs that federal law should not be read as preempting state law \"unless that was the clear and manifest purpose of Congress.\" However, the Court has recently applied the presumption somewhat inconsistently, raising questions about its current scope and effect. Moreover, in 2016, the Court held that the presumption no longer applies in express preemption cases. After reviewing these general themes in the Supreme Court's preemption jurisprudence, the report turns to the Court's express preemption case law. In this section, the report analyzes how the Court has interpreted federal statutes that preempt (1) state laws \"related to\" certain subjects, (2) state laws concerning certain subjects \"covered\" by federal laws and regulations, (3) state requirements that are \"in addition to, or different than\" federal requirements, and (4) state \"requirements,\" \"laws,\" \"regulations,\" and \"standards.\" While preemption decisions depend heavily on the details of particular statutory schemes, the Court has assigned some of these phrases specific meanings even when they have appeared in different statutory contexts. Finally, the report reviews illustrative examples of the Court's implied preemption decisions. In these cases, the Court has identified two subcategories of implied preemption: \"field preemption\" and \"conflict preemption.\" Field preemption occurs when a pervasive scheme of federal regulation implicitly precludes supplementary state regulation, or where states attempt to regulate a field where there is clearly a dominant federal interest. Applying these principles, the Court has held that federal law occupies a number of regulatory fields, including alien registration, nuclear safety regulation, and the regulation of locomotive equipment. In contrast, conflict preemption occurs when simultaneous compliance with both federal and state regulations is impossible (\"impossibility preemption\"), or when state law poses an obstacle to the accomplishment of federal goals (\"obstacle preemption\"). The Court has extended the scope of impossibility preemption in two recent decisions, holding that compliance with both federal and state law can be \"impossible\" even when a regulated party can (1) petition the federal government for permission to comply with state law, or (2) avoid violations of the law by refraining from selling a regulated product altogether. In its obstacle preemption decisions, the Court has concluded that state law can interfere with federal goals by frustrating Congress's intent to adopt a uniform system of federal regulation, conflicting with Congress's goal of establishing a regulatory \"ceiling\" for certain products or activities, or by impeding the vindication of a federal right.", "document_type": "crs"}
{"report": "The mission of HHS is to \"enhance the health and well-being of Americans by providing for effective health and human services and by fostering sound, sustained advances in the sciences underlying medicine, public health, and social services.\" HHS is currently organized into 11 main agencies, called operating divisions (listed below), which are responsible for administering a wide variety of health and human services programs, and conducting related research. In addition, HHS has a number of staff divisions within the Office of the Secretary (OS). These staff divisions fulfill a broad array of management, research, oversight, and emergency preparedness functions in support of the entire department. HHS Operating Divisions Eight of the HHS operating divisions are part of the U.S. Public Health Service (PHS). PHS agencies have diverse missions in support of public health, including the provision of health care services and supports (e.g., IHS, HRSA, SAMHSA); the advancement of health care quality and medical research (e.g., AHRQ, NIH); the prevention and control of disease, injury, and environmental health hazards (e.g., CDC, ATSDR); and the regulation of food and drugs (e.g., FDA). The three remaining HHS operating divisionsâACF, ACL, and CMSâare not PHS agencies. ACF and ACL largely administer human services programs focused on the well-being of vulnerable children, families, older Americans, and individuals with disabilities. CMSâwhich accounts for the largest share of the HHS budget by farâis responsible for administering Medicare, Medicaid, and the State Children's Health Insurance Program (CHIP), in addition to certain programs related to private health insurance. (For a summary of each operating division's mission and links to agency resources related to the FY2021 budget request, see the Appendix .) The Budget and Accounting Act of 1921 (P.L. 67-13), as amended, requires the President to submit an annual consolidated federal budget to Congress at the beginning of each regular congressional session, not later than the first Monday in February. Many of the proposals in the President's budget would require changes to laws that govern mandatory spending levels or policies, which are typically established on a multiyear or permanent basis. Discretionary spending , however, which is roughly one-third of the budget, is decided and controlled each fiscal year through the annual appropriations process. While Congress is ultimately not required to adopt the President's proposals or recommendations, the submission of the President's budget typically initiates the congressional budget process and informs Congress of the President's recommended spending levels for agencies and programs. The FY2021 President's budget request was submitted to Congress on February 10, 2020. Less than two months before this, all 12 of the annual appropriations acts for FY2020 had been enacted into law on December 20, 2019. The FY2020 funding levels shown in FY2021 President's budget materials generally reflect enacted annual levels, with limited exceptions. The exceptions include cases in which full-year mandatory funds had not yet been provided for programs typically funded outside of the annual appropriations process (e.g., mandatory funding for the Temporary Assistance for Needy Families Block Grant or the Community Health Center Fund). In such cases, the FY2021 President's budget generally uses estimated FY2020 funding levels based on annualized amounts provided in the most recent short-term funding extensions. Because some FY2020 amounts have not been finalized, this report generally refers to FY2020 funding levels as estimates , whereas amounts for earlier years are called actual or final . In addition, amounts shown for FY2020 do not include supplemental appropriations or other spending effects resulting from coronavirus disease response measures that have been enacted since the FY2021 President's budget request was submitted. Under the President's budget request, HHS would spend an estimated $1.370 trillion in outlays in FY2021 (see Table 1 ). This is $48 billion (+4%) more than estimated HHS outlays in FY2020 and about $156 billion (+13%) more than actual HHS outlays in FY2019. Historical estimates by the Office of Management and Budget (OMB) indicate that HHS has accounted for at least 20% of all federal outlays in each year since FY1995. Most recently, OMB estimated that HHS accounted for 27% of all federal outlays in FY2019, and projects that it would account for 28% of outlays if all proposals in the President's budget request were enacted. Figure 2 displays proposed FY2021 HHS outlays by major program or spending category in the President's request. As this figure shows, mandatory spending typically accounts for the vast majority of the HHS budget. In fact, two mandatory spending programsâMedicare and Medicaidâare expected to account for 86% of all estimated HHS spending in FY2021. Medicare and Medicaid are entitlement programs, meaning the federal government is required to make mandatory payments to individuals, states, or other entities based on criteria established in authorizing law. This figure also shows that discretionary spending accounts for about 8% of estimated FY2021 HHS outlays in the President's request. Although discretionary spending represents a relatively small share of total HHS spending, the department nevertheless receives more discretionary funding than most federal departments. According to OMB data, HHS accounted for almost 8% of all discretionary budget authority across the government in FY2019. The Department of Defense was the only federal agency to account for a larger share of all discretionary budget authority in that year (50%). As previously mentioned, the HHS budget reflects funding from a broad set of budgetary resources that includes, but is not limited to, the amounts provided to HHS through the annual appropriations process. As a result, certain amounts shown in FY2021 HHS budget materials (including amounts for prior years) will not match amounts provided to HHS by annual appropriations acts and displayed in accompanying congressional documents. There are several reasons for this, discussed briefly below. Mandatory spending makes up a large portion of the HHS budget. Whereas all discretionary spending is controlled and provided through the annual appropriations process, all mandatory spending is controlled by the program's authorizing statute. In most cases, that authorizing statute also provides the funding for the program (e.g., State Children's Health Insurance Program). However, the budget authority for some mandatory programs (including Medicaid), while controlled by criteria in the authorizing statute, must still be provided through the annual appropriations process; such programs are commonly referred to as appropriated entitlements or appropriated mandatories . Certain budget documents may show only discretionary spending, while others may also show some or all types of mandatory spending. The HHS budget request accounts for the department as a whole, while the appropriations process divides HHS funding across three different appropriations bills. Most of the department's discretionary appropriations are provided through the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS) Appropriations Act. However, funding for certain HHS agencies and activities is provided in two other billsâthe Departments of the Interior, Environment, and Related Agencies Appropriations Act (INT) and the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act (AG). Table 2 lists HHS agencies by appropriations bill. Each of these three appropriations acts provides discretionary HHS funding. In some cases, these acts also provide the necessary funding for appropriated mandatories at HHS. However, authorizing laws provide funding for other mandatory spending programs. HHS budget materials include two different estimates for mandatory spending programs when appropriate: proposed law and current law . The p roposed law estimates take into account changes in mandatory spending proposed in the FY2021 HHS budget request. Such proposals would generally need to be enacted into law to affect the budgetary resources ultimately available to the mandatory spending program. HHS materials may also show a current law or current services estimate for mandatory spending programs. These estimates assume that no changes will be made to existing policies, and instead estimate mandatory spending for programs based on criteria established in current authorizing law. The HHS budget estimates in this report reflect the proposed law estimates for mandatory spending programs, but readers should be aware that other HHS, OMB, or congressional estimates might reflect current law instead. In some cases, agencies within HHS have the authority to expend user fees and other types of collections that effectively supplement their appropriations. In addition, agencies may receive transfers of budgetary resources from other sources, such as from the Public Health Service Evaluation Set-Aside (also referred to as the PHS Tap) or one of the mandatory funds established by the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 , as amended). Budgetary totals that account for these sorts of resources in the HHS estimates are often referred to as being at the program level . HHS agencies that have historically had notable differences between the amounts in the appropriations bills and their program level include, for instance, FDA (due to user fees) and AHRQ (due to transfers). The Administration may choose to follow different conventions than those of congressional scorekeepers for its estimates of HHS programs. For example, certain transfers of funding between HHS agencies (or from HHS to other federal agencies) that occurred in prior fiscal years, or are expected to occur in the current fiscal year, may be accounted for in the Administration's estimates but not necessarily in the congressional documents. Figure 3 provides a breakdown of the FY2021 HHS budget request by operating division. When taking into account mandatory and discretionary budget authority (i.e., total budget authority), CMS accounts for the largest share of the request: nearly $1.3 trillion. The majority of the CMS budget request would go toward mandatory spending programs, such as Medicare and Medicaid. Spending on Medicare and Medicaid is expected to increase from FY2020 levels under the President's request, both in terms of proposed law and current law estimates. The request also includes a number of legislative proposals that would reduce spending on these programs (relative to current law, but not the prior year) if enacted. When looking exclusively at discretionary budget authority (as illustrated in Figure 3 and detailed in Table 3 ), funding for CMS is comparatively smaller, accounting for $3.7 billion of the HHS discretionary request. Discretionary CMS funds primarily support program operations and federal administrative activities, though some funds also go toward efforts to reduce health care fraud and abuse. The largest share of the HHS discretionary request would go to the PHS agencies: roughly $64.8 billion in combined public health funding for FDA, HRSA, IHS, CDC, ATSDR, NIH, and SAMHSA (no funds would go to AHRQ under the request ). NIH would receive the largest amount of discretionary budget authority of any single HHS operating division: $37.7 billion. This represents a decrease of roughly $2.6 billion (-6%) from FY2020. All of the existing NIH institutes and centers would receive a decrease under the request. The majority of the proposed NIH budget would support biomedical research performed by hospitals, medical schools, universities, and other research institutions around the country. ACF would receive the second-largest discretionary funding level among the HHS operating divisions: $20.2 billion. This would represent a decrease of roughly $4.2 billion (-17%) from FY2020. The majority of the discretionary ACF request (more than 80%) would go to early childhood care and education programs, such as Head Start and the Child Care and Development Block Grant. As has been the case since FY2018, the budget proposes to eliminate several ACF programs, including the Low Income Home Energy Assistance Program (LIHEAP) and the Community Services Block Grant (CSBG). Table 4 puts the FY2021 request for each HHS operating division and the Office of the Secretary into context, displaying it along with estimates of funding provided over the four prior fiscal years (FY2017-FY2019). These totals are inclusive of both mandatory and discretionary funding. The amounts in this table are shown in terms of budget authority (BA) and outlays. BA is the authority provided by federal law to enter into contracts or other financial obligations that will result in immediate or future expenditures involving federal government funds. Outlays occur when funds are actually expended from the Treasury; they could be the result of either new budget authority enacted in the current fiscal year or unexpended budget authority that was enacted in previous fiscal years. As a consequence, the BA and outlays in this table represent two different ways of accounting for the funding that is provided to each HHS agency through the federal budget process. For example, Table 4 shows $0 in FY2021 BA for AHRQ because the President's budget proposes to eliminate this agency; however, the table shows an estimated $299 million in FY2021 AHRQ outlays, reflecting the expected expenditure of funds previously provided to the agency. This appendix provides for each operating division a brief summary of its mission, the applicable appropriations bill, the FY2021 budget request level, and links to additional resources related to that request. Food and Drug Administration (FDA) The FDA mission is focused on regulating the safety, efficacy, and security of human foods, dietary supplements, cosmetics, and animal foods; and the safety and effectiveness of human drugs, biological products (e.g., vaccines), medical devices, radiation-emitting products, and animal drugs. It also regulates the manufacture, marketing, and sale of tobacco products. Relevant Appropriations Bill: Agriculture, Rural Development, Food and Drug Administration, and Related Agencies (AG) FY2021 Request: BA: $3.293 billion Outlays: $3.552 billion Additional Resources Related to the FY202 1 Request: Congressional Justification (all-purpose table on p. 19), https://www.fda.gov/media/135078/download BIB chapter (p. 20), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=24 Health Resources and Services Administration (HRSA) The HRSA mission is focused on \"improving health care to people who are geographically isolated, economically or medically vulnerable.\" Among its many programs and activities, HRSA supports health care workforce training; the National Health Service Corps; and the federal health centers program, which provides grants to nonprofit entities that provide primary care services to people who experience financial, geographic, cultural, or other barriers to health care. Relevant Appropriations Bill: LHHS FY2021 Request: BA: $11.444 billion Outlays: $11.951 billion Additional Resources Related to the FY2021 Request: Congressional Justification (all-purpose table on p. 17), https://www.hrsa.gov/sites/default/files/hrsa/about/budget/budget-justification-fy2021.pdf BIB chapter (p. 28), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=32 Indian Health Service (IHS) The IHS mission is to provide \"a comprehensive health service delivery system for American Indians and Alaska Natives\" and \"raise the physical, mental, social, and spiritual health of American Indians and Alaska Natives to the highest level.\" IHS provides health care for approximately 2.2 million eligible American Indians and Alaska Natives through a system of programs and facilities located on or near Indian reservations, and through contractors in certain urban areas. Relevant Appropriations Bill: Departments of the Interior, Environment, and Related Agencies (INT) FY2021 Request: BA: $6.391 billion Outlays: $6.479 billion Additional Resources Related to the FY202 1 Request: Congressional Justification (all-purpose table on p. 8), https://www.ihs.gov/sites/budgetformulation/themes/responsive2017/display_objects/documents/FY_2021_Final_CJ-IHS.pdf BIB chapter (p. 37), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=41 Centers for Disease Control and Prevention (CDC) and Agency for Toxic Substances and Disease Registry (ATSDR) The CDC mission is focused on \"disease prevention and control, environmental health, and health promotion and health education.\" CDC is organized into a number of centers, institutes, and offices, some focused on specific public health challenges (e.g., injury prevention) and others focused on general public health capabilities (e.g., surveillance and laboratory services). In addition, the ATSDR is headed by the CDC director. For that reason, the ATSDR budget is often shown within CDC. Following the conventions of the FY2021 HHS BIB, ATSDR's budget request is included in the CDC totals shown in this report. ATSDR's work is focused on preventing or mitigating adverse effects resulting from exposure to hazardous substances in the environment. Relevant Appropriations Bills: LHHS (CDC) INT (ATSDR) FY202 1 Request (CDC and ATSDR combined): BA: $7.134 billion Outlays: $8.174 billion Additional Resources Related to the FY202 1 Request: CDC Congressional Justification (all-purpose table on p. 25), https://www.cdc.gov/budget/documents/fy2021/FY-2021-CDC-congressional-justification.pdf ATSDR Congressional Justification, https://www.cdc.gov/budget/documents/fy2021/FY-2021-ATSDR-congressional-justification.pdf BIB chapter (p. 43), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=47 National Institutes of Health (NIH) The NIH mission is focused on conducting and supporting research \"in causes, diagnosis, prevention, and cure of human diseases\" and \"in directing programs for the collection, dissemination, and exchange of information in medicine and health.\" NIH is organized into 27 research institutes and centers, headed by the NIH Director. (The FY2021 President's budget assumes that AHRQ's functions will be consolidated within NIH, in the new National Institute for Research on Safety and Quality [NIRSQ]. This assumption is reflected in the figures below. ) Relevant Appropriations Bill: LHHS FY2021 Request: BA: $37.905 billion Outlays: $39.807 billion Additional Resources Related to the FY2021 Request: Congressional Justification (all-purpose table on p. 15), available at https://officeofbudget.od.nih.gov/pdfs/FY21/br/1-OverviewVolumeSingleFile-toPrint.pdf BIB chapter (p. 54), available at https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=58 Substance Abuse and Mental Health Services Administration (SAMHSA) The SAMHSA mission is focused on reducing the \"impact of substance abuse and mental illness on America's communities.\" SAMHSA coordinates behavioral health surveillance to improve understanding of the impact of substance abuse and mental illness on children, individuals, and families, and the costs associated with treatment. Relevant Appropriations Bill: LHHS FY2021 Request: BA: $5.598 billion Outlays: $5.984 billion Additional Resources Related to the FY202 1 Request: Congressional Justification (all-purpose table on p. 6), https://www.samhsa.gov/sites/default/files/about_us/budget/fy-2021-samhsa-cj.pdf BIB chapter (p. 63), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=67 Agency for Healthcare Research and Quality (AHRQ) The AHRQ mission is focused on research to make health care \"safer, higher quality, more accessible, equitable, and affordable.\" Specific AHRQ research efforts are aimed at reducing the costs of care, promoting patient safety, measuring the quality of health care, and improving health care services, organization, and financing. The FY2021 President's budget proposes eliminating AHRQ and consolidating certain key AHRQ functions within NIH, in the new National Institute for Research on Safety and Quality (NIRSQ). Relevant Appropriations Bill: LHHS FY202 1 Request: BA: $0 Outlays: $0.303 billion Additional Resources Related to the FY202 1 Request: Congressional Justification for the proposed National Institute for Research on Safety and Quality, https://www.ahrq.gov/sites/default/files/wysiwyg/cpi/about/mission/budget/2021/FY_2021_CJ_NIRSQ.pdf There is no FY2021 BIB chapter for AHRQ. Centers for Medicare & Medicaid Services (CMS) The CMS mission is focused on supporting \"innovative approaches to improve quality, accessibility, and affordability\" of Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private insurance, and on supporting private insurance market reform programs. The President's budget estimates that in FY2021, \"over 145 million Americans will rely on the programs CMS administers including Medicare, Medicaid, the Children's Health Insurance Program (CHIP), and the [Health Insurance] Exchanges.\" Relevant Appropriations Bill: LHHS FY2021 Request: BA: $1,297.294 billion Outlays: $1,232.275 billion Additional Resources R elated to the FY2021 Request: Congressional Justification (all-purpose table on p. 9), https://www.cms.gov/About-CMS/Agency-Information/PerformanceBudget/FY2021-CJ-Final.pdf BIB chapter (p. 69), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=73 Administration for Children and Families (ACF) The ACF mission is focused on promoting the \"economic and social well-being of children, youth, families, and communities.\" ACF administers a wide array of human services programs, including Temporary Assistance for Needy Families (TANF), Head Start, child care, the Social Services Block Grant (SSBG), and various child welfare programs. Relevant Appropriations Bill: LHHS FY202 1 Request: BA: $54.976 billion Outlays: $57.489 billion Additional Resources Related to the FY2021 Request: Congressional Justification (all-purpose table on p. 6), https://www.acf.hhs.gov/sites/default/files/olab/fy_2021_congressional_justification.pdf BIB chapter (p. 141), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=145 Administration for Community Living (ACL) The ACL mission is focused on maximizing the \"independence, well-being, and health of older adults, people with disabilities across the lifespan, and their families and caregivers.\" ACL administers a number of programs targeted at older Americans and the disabled, including Home and Community-Based Supportive Services and State Councils on Developmental Disabilities. Relevant Appropriations Bill: LHHS FY202 1 Request: BA: $2.097 billion Outlays: $2.153 billion Additional Resources Related to th e FY2021 Request: Congressional Justification (not yet available online); see excerpts, including a downloadable version of the all-purpose table, at https://acl.gov/about-acl/budget BIB chapter (p. 159), https://www.hhs.gov/sites/default/files/fy-2021-budget-in-brief.pdf#page=163", "summary": "This report provides information about the FY2021 budget request for the U.S. Department of Health and Human Services (HHS). Historically, HHS has been one of the larger federal departments in terms of budgetary resources. Estimates by the Office of Management and Budget (OMB) indicate that HHS has accounted for at least 20% of all federal outlays in each year since FY1995. Most recently, HHS is estimated to have accounted for 27% of all federal outlays in FY2019. (FY2019 funding levels are generally considered final, whereas some FY2020 funding levels remain estimates.) The FY2021 President's budget request was submitted to Congress on February 10, 2020. Subsequently, on March 17, 2020, the President submitted a letter to Congress about FY2021 budget amendments (along with a supplemental appropriations request for FY2020) related to the response to the Coronavirus Disease 2019 (COVID-19) outbreak. According to the letter, these budget amendments would have budgetary effects for the FY2021 President's request for some HHS accounts at the Centers for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). The letter did not contain sufficient details to incorporate potential effects of these amendments into the FY2021 request numbers contained in this report. As a result, the report reflects the President's initial request as submitted on February 10. Under the FY2021 President's budget request, as submitted in February 2020, HHS would spend an estimated $1.37 trillion in outlays in FY2021. This would be $48 billion (+4%) more than estimated HHS outlays in FY2020 and $156 billion (+13%) more than actual HHS outlays in FY2019. Mandatory spending typically comprises the majority of the HHS budget. Two mandatory spending programsâMedicare and Medicaidâare expected to account for 86% of all estimated HHS outlays in FY2021, according to the President's budget request. Medicare and Medicaid are entitlement programs, meaning the federal government is required to make mandatory payments to individuals, states, or other entities based on criteria established in authorizing law. While mandatory spending is controlled (but not always provided) by authorizing laws, all discretionary spending is controlled and provided through the annual appropriations process. Discretionary spending accounts for about 8% of HHS outlays in the FY2021 President's budget request. Although discretionary spending represents a relatively small share of the HHS budget, the department nevertheless receives more discretionary money than most federal departments. According to OMB data, HHS accounted for nearly 8% of all discretionary budget authority across the government in FY2019.", "document_type": "crs"}
{"report": "The annual National Defense Authorization Act (NDAA) authorizes appropriations for the Department of Defense (DOD) and defense-related atomic energy programs of the Department of Energy. In addition to authorizing appropriations, the NDAA establishes defense policies and restrictions, and addresses organizational administrative matters related to DOD. The bill incorporates provisions governing military compensation, the department's acquisition process, and aspects of DOD policy toward other countries, among other subjects. Enacted to authorize annual defense appropriations since FY1962, the bill also sometimes serves as a vehicle for legislation that originates in congressional committees other than the armed services committees. Unlike an appropriations bill, the NDAA does not provide budget authority for government activities. While the NDAA does not provide budget authority, historically it has provided a fairly reliable indicator of congressional sentiment on funding for particular programs. The bill authorizes funding for DOD activities at the same level of detail at which budget authority is provided by the corresponding defense and military construction appropriations bills. As defense authorization and appropriations bills can differ on a line-item level, some observers view defense authorizations as funding targets rather than amounts. According to the Government Accountability Office (GAO), \"An authorization act is basically a directive to Congress itself, which Congress is free to follow or alter (up or down) in the subsequent appropriation act.\" In addition, committee reports accompanying the NDAA often contain language directing an individual, such as a senior DOD official, to take a specified action by a date certain. Although such directive report language is not legally binding, agency officials generally regard it as a congressional mandate and respond accordingly. Table 1 and Table 2 below provide an overview of legislative actions taken on the FY2019 NDAA, along with relevant funding authorization figures for budget functions in different versions of the bill considered by the 115 th Congress. For FY2019, the Trump Administration requested $708.1 billion to fund programs falling under the jurisdiction of the House and Senate Armed Services Committees and subject to authorization by the annual National Defense Authorization Act (NDAA). On May 24, 2018, the House voted 351-66 to pass H.R. 5515 (Roll no. 230), an amended version of the FY2019 NDAA reported by the House Armed Services Committee. That bill would have authorized approximately the same amount as the President's request, including $639.1 billion ($1.1 million less than the request) for the so-called base budgetâthat is, funds intended to pay for defense-related activities that DOD and other agencies would pursue even if U.S. armed forces were not engaged in contingency operations in Afghanistan, Iraq, Syria, and elsewhere. The remaining $69 billion ($158,000 less than the request), designated as funding for Overseas Contingency Operations (OCO), would have funded the incremental costs of those ongoing contingency operations, as well as any other costs that Congress and the President agreed to so designate. On June 18, 2018, the Senate voted 85-10 to pass its version of H.R. 5515 (Record Vote Number 128), after replacing the House-passed text of H.R. 5515 with an amended version of the FY2019 proposal reported by the Senate Armed Services Committee ( S. 2987 ). That bill would have authorized $707.9 billion, including $639.4 billion ($492.4 million more than the request) for the base budget and $68.5 billion ($515.4 million less than the request) for OCO. On July 23, 2018, a conference committee reported a compromise version of the bill ( H.Rept. 115-863 ). However, the initial conference report required revision due in part to technical issues. On July 25, 2018, the conference committee reported a revised conference report ( H.Rept. 115-874 ). That bill authorized approximately the same amount as the President's request, though with several billions of dollars of adjustments to amounts within the appropriation titles. On July 26, 2018, the House voted 359-54 to approve the conference report (Roll no. 379). On August 1, the Senate voted 87-10 to approve the conference report (Record Vote Number 181). On August 13, 2018, President Donald J. Trump signed the bill into law ( P.L. 115-232 ). The legislation marked the first NDAA since the FY1997 act enacted prior to the start of the fiscal year. House and Senate conferees authorized $708.1 billion in discretionary budget authority for national defense programs in the final version of the conference report for H.R. 5515 ( H.Rept. 115-874 ), an increase of $16 billion (2.3%) from the FY2018 enacted amount. While that figure was approximately the same amount as the President's request for FY2019, it included billions of dollars in adjustments to amounts for individual DOD appropriation titles, as well as for atomic energy defense programs and other defense-related activities. See Table 2 . For example, of the $616.9 billion authorized for DOD base budget activities, the conference report included $132.3 billion for procurement, an increase of $1.8 billion (1.3%) from the President's request; $91.7 billion for research, development, test, and evaluation (RDT&E), an increase of $670 million (less than 1%) from the request; $198.5 billion for operation and maintenance, a decrease of $960 million (less than 1%) from the request; $147.1 billion for military personnel, a decrease of $1.2 billion (approximately 1%) from the request; and $10.3 billion for military construction and family housing, a decrease of $123 million (1.2%). The conference report also included $21.9 billion for atomic energy defense programs, an increase of $108.6 million (less than 1%) from the President's request; and $300 million for other defense-related activities, an increase of $86 million (40%) from the request. Congressional authorization of FY2019 defense authorizations reflects a running debate about the size of the defense budget given the strategic and budgetary issues facing the United States. The President's FY2019 budget request for DOD was shaped in part by the department's efforts to align its priorities with its 2018 National Defense Strategy and conform to discretionary spending limits set by the Budget Control Act of 2011 (BCA; P.L. 112-25 ) as amended by the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-23 ). On December 18, 2017, the Trump Administration released its first National Security Strategy (NSS). The NSS maintains that, in addition to the threats posed to the United States by rogue regimes and violent extremist organizations that have been a central focus of national security policy since the end of the Cold War, great power rivalry and competition have once again become a central feature of the international security landscape. To advance U.S. interests effectively within this strategic context, the Administration argues, the United States must improve domestic American security and bolster economic competitiveness while rebuilding its military. The NSS further argues that that since the 1990s, the United States has \"displayed a great degree of strategic complacency,\" largely as a result of overwhelming and unchallenged U.S. military and economic superiority. Operations in the Balkans, Africa, Afghanistan, and Iraq, while challenging and complex undertakings, did not require fundamental revision of the capabilities of the United States. Yet both China and Russia appear to be developing capabilities and concepts that potentially \"overmatch,\" or demonstrate technological superiority, to U.S. military capabilities. Released in January 2018, DOD's 11-page unclassified summary of the 2018 National Defense Strategy (NDS) articulates how the department plans to advance U.S. objectives outlined in the White House's National Security Strategy (NSS). Consistent with comparable documents issued by prior Administrations, the NDS maintains that there are five central external threats to U.S. interests: China, Russia, North Korea, Iran, and terrorist groups with global reach. In a break from previous Administrations, however, the NDS views retaining the U.S. strategic competitive edge relative to China and Russia as a higher priority than countering violent extremist organizations. It also contends that, unlike most of the period since the end of the Cold War, the Joint Force must now operate in contested domains where freedom of access and maneuver is no longer assured. Accordingly, the NDS summary called for \"increased and sustained investment\" to counter evolving threats from China and Russia: \"Long-term strategic competitions with China and Russia are the principal priorities for the Department, and require both increased and sustained investment, because of the magnitude of the threats they pose to U.S. security and prosperity today, and the potential for those threats to increase in the future.\" The NDS organizes DOD activities along three central interconnected \"lines of effort\": rebuilding military readiness and improving the joint force's lethality, strengthening alliances and attracting new partners, and reforming the department's business practices. In June 2017, several months before the release of the NDS, Chairman of the Joint Chiefs of Staff Marine General Joseph Dunford recommended that Congress increase the regular, or base, defense budget between 3% and 5% a year above inflation (\"real growth\") to maintain the U.S. competitive advantage against strategic competitors such as China and Russia. \"We know now that continued growth in the base budget of at least 3% above inflation is the floor necessary to preserve just the competitive advantage we have today and we can't assume that our adversaries will stand still,\" he said. Congressional action on the FY2019 NDAA was shaped in part by a focus on controlling federal spending amid rising federal debt. The Budget Control Act emphasized limiting discretionary spending, including defense spending. However, mandatory spending makes up the largest share of federal spending and is projected to increase at a faster rate than discretionary spending. See Figure 1 . As the 115 th Congress considered the President's FY2019 request for defense spending, OMB had estimated that since 9/11, outlays for defense discretionary programs in nominal dollars (not adjusted for inflation) would increase 122% from $306.1 billion in FY2001 to $678 billion in FY2019, while outlays for non-defense discretionary programs would increase 83% from $343 billion in FY2001 to $626 billion in FY2019. OMB had also estimated that outlays for mandatory programs would increase 172% from $1 trillion in FY2001 to $2.7 trillion in FY2019, while outlays for net interest payments on the national debt would increase 76% from $206.2 billion in FY2001 to $363.4 billion in FY2019. The Congressional Budget Office had projected mandatory spending and net interest payments would increase at faster rates than defense and nondefense discretionary spending over the next decade. CBO had also projected net interest payments on the national debt would surpass defense discretionary outlays in FY2023. President Donald J. Trump's FY2019 budget request, released on February 12, 2018, included $726.8 billion for national defense, a major federal budget function that encompasses defense-related activities of the federal government. National defense is one of 20 major functions used by the Office of Management and Budget (OMB) to organize budget data and is the largest in terms of discretionary spending. The national defense budget function (identified by the numerical notation 050) comprises three subfunctions: DODâMilitary (051); atomic energy defense activities primarily of the Department of Energy (053); and other defense-related activities (054), such as FBI counterintelligence activities. The $726.8 billion national defense budget request included $716 billion in discretionary budget authority and $10.8 billion in mand atory budget authority. Of the $726.8 billion requested for national defense, approximately $708.1 billion was subject to authorization by the annual National Defense Authorization Act (NDAA). The remainder of the request was either for mandatory funds not requiring annual authorization or for discretionary funds under the jurisdiction of other congressional committees. Of the $708.1 billion, the Trump Administration's revised request included $639.1 billion in discretionary funding for the so-called base budget âthat is, funds intended to pay for defense-related activities that the Department of Defense (DOD) and other agencies would pursue even if U.S. armed forces were not engaged in contingency operations, designated Overseas Contingency Operations (OCO), in Afghanistan, Iraq, Syria, and elsewhere. The remaining $69 billion of the request would fund the incremental costs of OCO, as well as any other costs that Congress and the President agreed to so designate. The request was consistent with discretionary spending limits (or caps) on defense activities originally established by the Budget Control Act of 2011 (BCA; P.L. 112-25 ) and amended by the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). The FY2019 defense spending cap was $647 billion and applied to discretionary defense programs (excluding OCO). The cap included programs outside the scope of the NDAA and for which the Administration requested approximately $8 billion. Thus, the portion of the cap applicable to spending authorized by the NDAA was approximately $639 billion. As part of an agreement to increase the statutory limit on public debt, the BCA aimed to reduce annual federal budget deficits by a total of at least $2.1 trillion from FY2012 through FY2021 compared to projected levels, with approximately half of the savings to come from defense. The spending limits (or caps) apply separately to defense and nondefense discretionary budget authority. The caps are enforced by a mechanism called sequestration that automatically cancels previously enacted appropriations by an amount necessary to reach pre-specified levels. The BCA effectively exempted certain types of discretionary spending from the statutory limits, including funding designated for Overseas Contingency Operations (OCO)/Global War on Terrorism (GWOT). In the past, Congress has amended the legislation to raise the spending limits (thus lowering its deficit-reduction effect by corresponding amounts), but, as of July 2019, it had not changed the limits for FY2020 and FY2021. OCO Funding Shift Of the $686.1 billion for DOD, the Trump Administration's initial request included $597.1 billion for the base budget. The remaining $89 billion was designated as funding for OCO. However, in an amendment to the budget after Congress raised spending caps as part of the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ), the Administration removed the OCO designation from $20 billion of funding, in effect, shifting that amount into the base budget request. In a statement on the budget amendment, White House Office of Management and Budget Director Mick Mulvaney said the amended request fixed \"long-time budget gimmicks\" in which OCO funding had been used for base budget requirements. Beginning in FY2020, \"the Administration proposes returning to OCO's original purpose by shifting certain costs funded in OCO to the base budget where they belong,\" he wrote. The Administration requested authorization for an active-duty end-strength of 1.3 million personnel, an increase of 15,600 personnel from the enacted FY2018 level; and for a reserve component end-strength of 824,700 personnel, an increase of 800 personnel from the enacted FY2018 level. The House version of the bill would have supported the Administration's request, while the Senate amendment would have authorized an end-strength of 9,439 fewer personnel than requested, including 8,639 fewer active-duty personnel and 800 fewer reserve component personnel. The act authorizes the Administration's requested end-strength. See Table 3 . Title 37, Section 1009, of the United States Code (37 U.S.C. Â§1009) provides a permanent formula for an automatic annual increase in basic pay that is indexed to the annual increase in the Employment Cost Index (ECI), a survey prepared by the Department of Labor's Bureau of Labor Statistics, for \"wages and salaries\" of private industry workers. The FY2019 budget request proposed a 2.6% increase in basic pay for military personnel in line with the formula in current law. The Senate amendment included a provision that would have waived the automatic increase in basic pay under 37 U.S.C. Â§1009 and specified a pay raise of 2.6%. The enacted bill contains no provision relating to a general increase in basic pay, thereby leaving in place the automatic adjustment of 37 U.S.C. Â§1009 amounting to 2.6% in 2019. Title V of the act contains provisions that modified key parts of the Defense Officer Personnel Management Act (DOPMA; P.L. 96-513 ) governing the appointment, promotion, and separation of military officers. Changes include allowing civilians with operationally relevant training or experience to enter the military up to the rank of O-6âa colonel in the Army, Air Force, or Marine Corps; or captain in the Navyâand creating an \"alternative promotion\" process for officers in specialized fields. The Administration requested $11.4 billion in new budget authority for DOD military construction and family housing projects, including $10.5 billion in base budget funding and $921 million in Overseas Contingency Operations (OCO) funding. See Table 4 . The act authorizes less funding than requested for some of the most valuable military construction projects. For example, the act authorizes $105 million for the MIT-Lincoln Laboratory, West Lab Compound Semiconductor Laboratory and Microsystem Integration Facility (CSL/MIF), at Hanscom Air Force Base, MA ($120 million less than requested); $181 million for Phase 1, Increment 2 of the National Geospatial-Intelligence Agency complex known as Next NGA West (N2W) in St. Louis, MO ($33 million less than requested); and $140 million for Phase 2 of the long-range discriminating radar system complex at Clear Air Force Station, AK ($44 million less than requested). Most of the $921 million requested for military construction using OCO funds was for projects related to the European Deterrence Initiative (see the \" European Deterrence Initiative (EDI) \" section). The act authorizes an additional $30.4 million for flight line support facilities and an additional $40 million for a personnel deployment processing facility, both at Al Udeid Air Base, Qatar. The act does not authorize the $69 million requested for a high-value detention facility at Guantanamo Bay, Cuba. Congress generally exercises its legislative powers to affect defense acquisitions through Title VIII of the NDAA, typically entitled Acquisition Policy, Acquisition Management, and Related Matters . In some years, the NDAA also contains titles specifically dedicated to aspects of acquisition, such as Title XVII of the FY2018 NDAA, entitled Small Business Procurement and Industrial Base Matters . Congress has been particularly active in legislating acquisition reform over the last four years. For FY2016-FY2019, NDAA titles specifically related to acquisition reform contained an average of 80 provisions (318 in total), compared to an average of 47 such provisions (466 in total) in the NDAAs for the preceding 10 fiscal years. Examples of recent acquisition reform-related provisions include the following: Changes to the role of the Chiefs of the Military Services and the Commandant of the Marine Corps (collectively referred to as the Service Chiefs) in the acquisition process (Section 802 of P.L. 114-92 , the FY2016 NDAA); Splitting the office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD [AT&L]) into two separate offices: the office of the Under Secretary of Defense for Acquisition and Sustainment (USD A&S) and the office of the Under Secretary of Defense for Research and Engineering (USD R&E) (Section 901 of P.L. 114-328 , the FY2017 NDAA); Strengthening the role of the military departments in acquisitions (see, for example, Section 897 of P.L. 114-328 , the FY2017 NDAA); Increasing the government-wide simplified acquisition threshold from $150,000 to $250,000 (Section 805 of P.L. 115-91 ); and, Creating or expanding numerous rapid acquisition authorities, such as establishing middle tier acquisition pathways for rapid production and fielding (Section 804 of the FY2016 NDAA), and expanding and making permanent authorities relating to prototyping and follow-on production conducted using procurement authorities known as other transactions (Section 815 of P.L. 114-92 , the FY2016 NDAA) . While the FY2019 NDAA generally does not include sweeping defense acquisition system reform-related provisions similar to those included in the FY2016-FY2018 NDAAs, it does include numerous provisions making other changes relating to defense acquisitions, such as the following: Creating a framework to consolidate defense acquisition-related statutes in a new Part V of Subtitle A of Title 10, U.S. Code (Sections 801-809); Increasing the DOD micro-purchase threshold from $5,000 to $10,000 (Section 821); Requiring DOD to conduct a study of the frequency and effects of so-called \"second bite at the apple\" bid protests involving the same contract award or proposed award filed through both the Government Accountability Office (GAO) and the U.S. Court of Federal Claims (Section 822); Splitting the Title 41 definition of commercial item into separate definitions for commercial product and commercial service (Section 836); and Limiting the government-wide use of lowest price technically acceptable (LPTA) source selection criteria (Section 880). The act authorizes $6.3 billion in OCO funding for the European Deterrence Initiative (EDI), an effort DOD began in 2014 to reassure NATO allies in Central and Eastern Europe of a continued U.S. commitment to their national security after the Russian military intervention in Ukraine, in addition to $250 million for Ukraine security assistance. Of the latter amount, $50 million was authorized for \"lethal assistance,\" including anti-armor weapon systems, mortars, crew-served weapons and ammunition, grenade launchers and ammunition, small arms and ammunition; as well as counter-artillery radars, including medium-range and long-range counter-artillery radars that can detect and locate long-range artillery. Most of the EDI funding is intended for prepositioning a division-sized set of equipment in Europe and boosting the regional presence of U.S. forces. The act authorizes $1.4 billion in OCO funding for activities to counter the Islamic State of Iraq and Syria (ISIS) by training and equipping Iraqi Security Forces and vetted Syrian opposition forces. The act includes a provision (Section 1233) limiting the use of roughly half of the $850 million for Iraq until the Secretary of Defense submits a report to the congressional defense committees on the U.S. strategy in Iraq. Another provision (Section 1231) limits the use of all of the $300 million for Syria until the President submits a report to congressional committees on the U.S. strategy in Syria. The Administration submitted the required reports to Congress in early 2019. In response to concerns from some Members of Congress that certain foreign direct investment, primarily by Chinese firms, may pose risks to U.S. national defense and economic security, Title XVII of the act incorporates provisions designed to limit foreign access to sensitive U.S. technology. Subtitle A of Title XVII, the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA), expands the purview of the Committee on Foreign Investment in the United States (CFIUS) to address national security concerns in part by amending the current process for the committee to review, on behalf of the President, the national security implications of foreign direct investment in U.S. companies. Subtitle B of Title XVII, the Export Controls Act of 2018, includes provisions to expand controls for exporting certain \"dual-use\" civilian and military items in part by requiring the establishment of an \"interagency process to identify emerging and foundational technologies.\" In response to concerns from some Members of Congress that Chinese telecommunications equipment manufacturers may pose a security risk to U.S. communications infrastructure, the act includes a provision (Section 889) prohibiting the heads of federal agencies from procuring telecommunications equipment or services from companies linked to the government of China, including Huawei Technologies Company and ZTE Corporation, among others. Huawei filed suit against the United States over the provision, arguing that it amounts to an unconstitutional \"bill of attainder.\" Another provision of the act (Section 1091) prohibits DOD from obligating funds authorized to be appropriated by the act or otherwise available for Chinese language instruction provided by Confucius Institutes, language and culture centers affiliated with China's Ministry of Education, unless the Under Secretary of Defense for Personnel and Readiness issues a waiver. It also bars DOD use of any obligated funds to support a Chinese language program at an institution of higher education that hosts a Confucius Institute. DOD has described upgrading the nuclear triadâthat is, submarines armed with submarine-launched ballistic missiles, land-based intercontinental ballistic missiles, and strategic bombers carrying gravity bombs and air-launched cruise missilesâas its \"number one priority.\" The Trump Administration's 2018 Nuclear Posture Review, released in February 2018, reiterated the findings of previous reviews \"that the nuclear triadâsupported by North Atlantic Treaty Organization (NATO) dual-capable aircraft and a robust nuclear command, control, and communications systemâis the most cost-effective and strategically sound means of ensuring nuclear deterrence.\" The department said that programsâsuch as the Columbia-class ballistic missile submarine, B-21 long-range strike bomber, and Long-Range Standoff (LRSO) cruise missileâto replace the existing inventory of systems intended to deliver nuclear weapons would be \"fully funded\" for the year if its FY2019 budget requests were met. See Table 5 for information on the FY2019 budget request and authorizations for selected strategic offense and long-range systems. The Columbia-class program, previously known as the Ohio replacement program (ORP) or SSBN(X) program, is a program to design and build a new class of 12 ballistic missile submarines (SSBNs) to replace the Navy's current force of 14 Ohio-class SSBNs. The Navy has identified the Columbia-class program as its top priority program. The service wants to procure the first Columbia-class boat in FY2021. The Navy's proposed FY2019 budget requested $3 billion in advance procurement (AP) funding and $705 million in research and development funding for the program. The budget also included $1.3 billion to continue refurbishing the Trident II (or D-5) missiles that arm the submarines. The act authorizes $3.2 billion for the Columbia-class program. The act supports the President's request for refurbishment of the Trident II missiles, and increased research-and-development funding for the effort. The budget request included $2.3 billion to continue development of the B-21 long-range bomber, which the Air Force describes as one of its top three acquisition priorities. Acquisition of the airplane is slated to begin in 2023. The new bomberâlike the B-2s and B-52s currently in U.S. serviceâcould carry conventional as well as nuclear weapons. For the latter role, the request included $615 million to continue development of the Long-Range Standoff Weapon (LRSO), a cruise missile that would replace the 1980s-vintage Air-Launched Cruise Missile (ALCM) currently carried by U.S. bombers. The act supports the President's budget request for the B-21 bomber. The act authorizes an increase of $85 billion for the LRSO to $700 million. The budget request included $345 million to continue developing a new, land-based intercontinental ballistic missile (ICBM), known as the Ground-Based Strategic Deterrent (GBSD), which in 2029 would begin replacing the Minuteman III missiles currently in service. The act authorizes an increase of $69 million to $414 million for the new Ground-Based Strategic Deterrent. The budget request included $65 million for the W76-2 warhead modification program. The effort is intended to modify an unspecified number of Trident II MK4/W76 warheads, each of which has a yield of 100 kilotons, into a lower-yield variant referred to as the W76-2. The atomic weapons used at Hiroshima and Nagasaki were roughly 15 and 20 kilotons, respectively. The Trump Administration's February 2018 Nuclear Posture Review called for \"low-yield\" nuclear options to preserve \"credible deterrence against regional aggression.\" The act authorizes the requested funding. Since the late 1940s, the United States has developed and deployed ballistic missile defenses (BMD) to defend against enemy missiles. Since the start of an expanded initiative under President Ronald Reagan in 1985, BMD has been a key national security interest in Congress. Lawmakers have since appropriated more than $200 billion for a broad range of research and development programs and deployment of BMD systems. The United States has deployed a global array of networked ground-, sea-, and space-based sensors for target detection and tracking, an extensive number of ground- and sea-based hit-to-kill (direct impact) and blast fragmentation warhead interceptors, and a global network of command, control, and battle management capabilities to link those sensors with those interceptors. The Trump Administration's FY2019 budget request included a total of $12.9 billion for defense against ballistic missiles, of which $9.9 billion would be allocated to the Missile Defense Agency (MDA). See Table 6 for information on the FY2019 budget request and authorization actions for selected ballistic missile defense systems. The Administration requested a total of approximately $2.6 billion for the Ground-Based Midcourse Defense (GMD), which included funding for systems and related improvements such as Common Kill Vehicle Technology, Pacific Discriminating Radar, and Long Range Discrimination Radar. As of November 2017, the system comprised 44 interceptor missiles at two sites, including 40 at Fort Greely in Alaska and four at Vandenberg Air Force Base in California. The interceptors are intended to destroy intercontinental ballistic missiles (ICBMs) with ranges in excess of 5,500 kilometers launched toward U.S. territory from countries such as North Korea. The department is adding another site at Fort Greely with 20 interceptors as part of a plan to expand the system to include 64 interceptors. The request included funding for an additional four interceptors and 10 silos, as well as continued development of a new warhead called the Redesigned Kill Vehicle (RKV) intended to replace the existing warhead known as the Exoatmospheric Kill Vehicle (EKV). While the House and Senate generally supported the request for the GMD systemâthey authorized the procurement request and most of the RDT&E requestâconferees included a provision (Section 1683) that requires at least one successful flight intercept test of the RKV before it could enter production. The provision also requires the director of the Missile Defense Agency to report on ways to accelerate the fielding of the additional 20 interceptors with RKVs at Fort Greely. The Administration's budget request included $1.1 billion for procurement and additional development work associated with the Terminal High-Altitude Air Defense (THAAD) interceptors, intended to intercept short-, medium-, and intermediate-range ballistic missiles. THAAD is a transportable system designed to defend troops abroad and population centers. In testing, the system has generally performed well by most measures, but it has not operated in combat. Both the House and Senate supported the Administration's request for $874 million in procurement for 82 THAAD interceptors and increased funding for associated research and development. The request included $1.4 billion in procurement funding for the Army's Patriot system, including 240 Patriot Advanced Capability (PAC-3)/Missile Segment Enhancement (MSE) interceptors. The most mature U.S. BMD system, Patriot was used with mixed results in combat in the 1991 and 2003 wars against Iraq and is fielded around the world by the United States and other countries that have purchased the system. Patriot is a mobile system and designed to defend relatively small areas such as military bases and airfields. Patriot works with THAAD to provide an integrated and overlapping defense against incoming missiles in their final phase of flight. The act supports the Administration's request. The act includes a provision (Section 241) requiring the Secretary of the Army to report on the survivability of air defense artillery, including \"an analysis of the utility of relevant active kinetic capabilities, such as a new, long-range counter-maneuvering threat missile and additional indirect fire protection capability units to defend Patriot and Terminal High Altitude Area Defense batteries.\" The President's budget request included $9.3 billion in funding for National Security Space (NSS) acquisition programs. National Security Space is one of 12 Major Force Programs (MFP) of the DOD and includes funding for space launches, satellites, and support activities. MFP-12 includes funding for some classified programs and, for the most part, does not include funding for National Geospatial-Intelligence Agency (NGA) and National Reconnaissance Office (NRO) programs. See Table 7 for information on the FY2019 budget request and authorization actions for selected military space programs. The budget request for NSS acquisition programs included approximately $2 billion to continue acquiring satellite launchers under the Evolved Expendable Launch Vehicle (EELV) program and to continue developing a replacement for the Russian-made rocket engine used in some national security space launches since the early 2000s. The act supported the budget request. The act includes a provision (Section 1603) to designate the EELV program as the National Security Space Launch (NSSL) program, effective March 1, 2019. The provision also requires the Secretary of Defense to consider both \"reusable and expendable launch vehicles\" in any future solicitations \"for which the use of a reusable launch vehicle is technically capable and maintains risk at acceptable levels.\" The budget request included approximately $1.5 billion for the GPS satellite program and related projects. The technology provides worldwide positioning, navigation, and timing (PNT) information to military and civilian users. Funding would support launch of two GPS III satellites, development of GPS Next Generation Operational Control System (OCX), and integration of Military GPS User Equipment (MGUE) intended in part to provide a more powerful jam-resistant signal and information to military personnel in contested environments. The act authorizes $18 million less than the requested $1.4 billion in research and development funding due to what the conferees described as \"insufficient justification.\" The budget request included $842 million for the Space-Based Infrared System (SBIRS), including $704 million for research, development, test, and evaluation and $138 million for procurement. The system is a successor to the Defense Support Program (DSP) designed in part to provide early warning of a strategic missile attack on the United States and to support missile defense activities. The request was intended to support launch of Geosynchronous Earth Orbit (GEO) satellites and development of Next-Generation Overhead Persistent Infrared (OPIR) satellites. The act authorizes increasing RDT&E funding by $100 million to $804 million to \"accelerate sensor development.\" The act includes a provision (Section 1613) requiring the Secretary of Defense to evaluate supply chain vulnerabilities for protected satellite communications and OPIR. The conference report accompanying the bill directs the head of the Government Accountability Office (GAO) \"to review the early planning for the next generation OPIR system and associated ground capabilities,\" and assess, in part, \"to what extent will the next generation OPIR system continue to fulfill existing key SBIRS capabilities?\" The budget request included $842 million for Advanced Extremely High Frequency (AEHF) and Satellite Communications (SATCOM) projects, including $677 million in research, development, test, and evaluation and $91 million in procurement. The projects are intended in part to provide communications that are secure, survivable, and resistant to jamming. Funding was to support the fifth and sixth AEHF satellites, as well as activities to improve AEHF operational resiliency through programs such as Protected Tactical Service (PTS), Protected SATCOM Services-Aggregated (PSCS-A), and Protected Tactical Enterprise Service (PTES). The act supports the budget request. The act includes a provision (Section 1614) requiring the Secretary of Defense to report on how the evolved strategic satellite program, PTS, and PTES \"will meet the requirements for resilience, mission assurance, and the nuclear command, control, and communication missions of the Department of Defense.\" The act includes a provision (Section 1601) requiring the President, with the advice and assistance of the Chairman of the Joint Chiefs of Staff and through the Secretary of Defense, to establish U.S. Space Command as a subordinate unified command under U.S. Strategic Command \"for carrying out joint space warfighting operations.\" The provision states the commander of U.S. Space Command is responsible for \"ensuring the combat readiness of forces assigned to the space command\" and \"monitoring the preparedness to carry out assigned missions of space forces assigned to unified combatant commands other than the United States Strategic Command.\" In addition to modernizing the ground forces' existing armored combat vehicles such as the M-1 Abrams tank, M-2 Bradley Infantry Fighting Vehicle (IFV), and Stryker wheeled combat vehicle, the Administration's FY2019 budget request included funding for newer capabilities, including mobile defense against cruise missiles and unmanned aircraft, and improved firepower and mobility for infantry units. See Table 8 for information on the FY2019 budget request and authorizations for selected ground vehicle programs. The act authorizes most of the approximately $2.7 billion requested to upgrade the Army's fleet of M-1 Abrams tanks, the service's main battle tank that entered service in 1980. The funding was intended to upgrade a portion of the fleet with a system enhancement package (SEP) that includes new armor, electronics, and weapons stations. It was also to equip three brigades with the Trophy active protection system (APS), designed in part to automatically acquire, track, and respond with hard or soft kill capabilities to a variety of threats, including rocket-propelled grenades (RPGs) and anti-tank guided missiles (ATGMs). The act authorizes more funds than requested to accelerate two other components of the Army's current combat vehicle fleet. It authorizes $413 million, $44 million more than requested, to replace the flat underside of many types of the Stryker wheeled combat vehicles with a V-shaped bottom intended to more effectively mitigate the explosive force of buried landmines or improvised explosive devices (IEDs). It also authorized $529 million, $110 million more than requested, to replace the chassis and powertrain of the M-109 Paladin self-propelled howitzer with the more powerful and robust chassis of the Bradley troop carrier. The act authorizes fewer funds than requested for components of the Army's existing combat vehicle fleet. It authorizes $875 million, $172 million less than requested, to continue modernizing the Bradley primarily due to a \"program decrease.\" It also authorizes $244 million, $22 million less than requested, for the Amphibious Combat Vehicle (ACV), a successor to the Marine Corps' AAV-7 amphibious troop carrier; and $797 million, $31 million less than requested, for the Armored Multi-Purpose Vehicle (AMPV), intended to the place the Vietnam-era M-113 tracked personnel carrier. The act includes a provision (Section 254) requiring the Secretary of the Army to develop a strategy to competitively procure a new transmission for the Bradley fighting vehicle, including an analysis of potential cost savings and performance improvements from a transmission common to the Bradley family of vehicles, including the AMPV and Paladin. The Administration requested $449 million to develop and begin purchasing vehicles intended to boost the lethality and mobility of Army Infantry Brigade Combat Teams (IBCTs). The bulk of the funds were to develop a lightweight tank, designated Mobile Protected Firepower (MPF). The remainder of the funds were to begin purchasing four-wheel-drive, off-road vehicles for reconnaissance missions and troop transport, designated Light Reconnaissance Vehicle (LRV) and Ground Mobility Vehicle (GMV), respectively. The act authorizes $370 million for the programs, $79 million less than requested, with most of the reduction due to a \"Mobile Protected Firepower decrease.\" The act includes a provision (Section 248) requiring the Secretary of the Army to submit a report to the Armed Services Committees on active protection systems (APS) for armored combat and tactical vehicles. Specifically, the provision required the report to: assess the effectiveness of such systems recently tested on the Abrams, Bradley, and Stryker; discuss plans for further testing, proposals for future development, and a timeline for fielding; and describe how the service plans to incorporate such systems into new armored combat and tactical vehicles, such as MPF, AMPV, and the Next Generation Combat Vehicle (NGCV), the Army's replacement for the Bradley. The Administration requested $504 million for programs intended to enhance mobile Army defense against aircraft, including unmanned aerial systems and cruise missiles. These include a Stryker combat vehicle equipped to launch Stinger missiles, designated Interim Maneuver Short-Range Air Defense systems (IM-SHORAD), and a larger, truck-mounted missile launcher, designated Indirect Fire Protection Capability (IFPC). The act authorizes $565 million for the programs, $61 million more than requested, driven by an increase to IFPC for \"interim cruise missile defense.\" The act includes a provision (Section 241) requiring the Secretary of the Army to submit a report to the Armed Services Committees on the service's efforts to improve the survivability of air defense artillery, including an analysis of new technology and additional units to defend Patriot and THAAD batteries. In December 2016, the Navy adopted a new force goal of 355 shipsâa total similar to the 350-ship fleet President Trump had called for during the 2016 election campaign. The 355-ship plan replaced a previous 308-ship plan the Navy had adopted in March 2015. The Navy's proposed FY2019 budget requested the procurement of 10 combat ships, including two Virginia-class attack submarines, three DDG-51 class destroyers, one Littoral Combat Ship (LCS), two TAO-205 class oilers, one Expeditionary Sea Base ship, and one towing, salvage, and rescue ship. The act authorizes $1.9 billion more than the request, including funding for the 10 combat ships requested, as well as two additional LCSs. The act authorizes procurement of a fourth Ford-class aircraft carrier (CVN-81). The act also authorizes procurement of additional noncombat ships, including a cable ship that was not requested and three more ship-to-shore connectors than the five that were requested. See Table 9 for summary information on the FY2019 budget request and authorization actions for selected shipbuilding programs. The Administration's $1.6 billion request to fund a Ford-class aircraft carrier was intended as the fourth of eight annual increments to cover the estimated $12.6 billion cost of what will be the third ship of the Ford class. That ship, designated CVN-80 and named Enterprise , is slated for delivery to the Navy at the end of FY2027. While the act does not authorize appropriations for a fourth Ford-class aircraft carrier (CVN-81), the law allows for the procurement to occur in conjunction with CVN-80. Proponents of such an arrangement, known as block buy contracting, contend that it could accelerate the delivery of the fourth ship and reduce the overall cost of the two vessels. The act includes a provision (Section 121) stating that before the funds could be used for a block buy, the Secretary of Defense would have to certify to the congressional defense committees an analysis demonstrating that the approach would \"result in significant savings compared to the total anticipated costs of carrying out the program through annual contracts.\" In addition to the Administration's request of $646 million to procure a Littoral Combat Ship, the act authorizes $950 million to procure two more LCSs, which conferees described as a \"program increaseâtwo ships.\" The increase more than offset a decrease of $37.7 million in procurement funding for the program to \"align plans and other costs with end of production.\" The act authorizes an additional $500 million for an LPD-17-class amphibious landing transport or a variant of that ship designated LX(R) and an additional $182.5 million for three more air-cushion landing craft in addition to the five requested to haul tanks and other equipment ashore from transport ships. The act includes provisions intended to address factors perceived to have contributed to the two separate collisions in 2017 involving Pacific Fleet destroyers that resulted in the deaths of 17 U.S. sailors. A provision (Section 322) requires that Navy ships be subject to inspections with \"minimal notice\" to the crew and annual reports on \"the material readiness of Navy ships as compared to established material requirements standards,\" among other topics. Another provision (Section 323) limited to 10 years the time that aircraft carriers, amphibious ships, cruisers, destroyers, frigates, and littoral combat ships can be based outside the United States. Another provision (Section 526) stated the Secretary of the Navy is to require key watch standersâthat is, a person standing watch on a ship, such as an officer of the deck, engineering officer of the watch, conning officer or piloting officerâto \"maintain a career record of watchstanding hours and specific operational evolutions.\" The act, for the most part, authorizes funding for the Administration's request for military aircraft acquisition. The act authorizes additional funding for 15 more aircraft than requested, including six AH-64 Apache attack helicopters, five UH-60 Black Hawk utility helicopters, two MQ-9 Reaper reconnaissance and attack unmanned aerial vehicles (UAVs), one RQ-4 Global Hawk long-range reconnaissance UAV, and one E-2 Hawkeye airborne surveillance aircraft. The act authorizes less funding than requested for other programs, including the MQ-25 Stingray carrier-based refueling and reconnaissance UAV and the KC-46 refueling tanker aircraft. See Table 10 for information on the FY2019 budget request and authorizations for selected aircraft programs. The budget request included $8.8 billion for the procurement of 77 F-35 Lightning II aircraft as part of the Joint Strike Fighter (JSF) program. The quantity includes 48 Air Force F-35As, equipped for conventional runway operations, 20 Marine Corps F-35Bs, equipped for short takeoff and vertical landing (STOVL) operations; and nine Navy F-35Cs, equipped for aircraft carrier operations. The House version of the bill generally would have supported the Administration's request, while the Senate amendment would have cut funding associated with two aircraftâone F-35A and one F-35Câdue to \"program realignment.\" While the act authorizes $133 million (1%) less procurement funding than requested, it authorizes the requested quantity of F-35 aircraft. The act includes a provision (Section 1282) limiting the delivery of any F-35s to Turkey (which plans to buy 100 of the aircraft) until the Secretary of Defense submits a report to congressional committees on the Turkish government's plan to purchase the S-400 air and missile defense system from Russia. The report was to include \"an assessment of impacts on other United States weapon systems and platforms operated jointly with the Republic of Turkey,\" including the F-35, Patriot surface-to-air missile system, CH-47 Chinook heavy-lift helicopter, AH-64 Apache helicopter, UH-60 Black Hawk helicopter, and F-16 Fighting Falcon fighter jet. To compensate for the slower-than-planned fielding of the F-35 aircraft, the budget request included funds to mitigate a shortfall in the Navy's fleet of strike fighters by buying new F/A-18s and upgrading planes of that type already in service. The House version of the bill and the Senate amendment would have supported the request. The act generally supports the request, authorizing $56 million (3%) less than the $2 billion requested for 24 F/A-18s and $18 million (1%) more than the $1.5 billion requested to modify existing versions of the aircraft. Section 127 of the act requires the Secretary of the Navy to work to modify the F/A-18 aircraft \"to reduce the occurrence of, and mitigate the risk posed by, physiological episodes affecting crewmembers of aircraft,\" by replacing the cockpit altimeter, upgrading the onboard oxygen system generation system, redesigning aircraft life support systems, and installing equipment associated with improved physiological monitoring and alert systems. The act authorizes $300 million in procurement funding not included in the President's request to begin buying an unspecified number of new OA-X light attack aircraft. Section 246 of the act requires the Secretary of the Air Force to submit to the congressional defense committees a report on the service's OA-X \"experiment\" and how the program incorporates partner nation requirements. The act authorizes $201 million for modifications to the A-10 Thunderbolt II ground-attack aircraft known as the Warthog, including $65 million more than the President's request for additional wing replacements. The Administration requested $2.6 billion to procure 15 KC-46A Pegasus aircraft as part of low-rate initial production (LRIP). The KC-46A Pegasus is an aerial refueling tanker intended to replace approximately one-third of the existing Cold War-era KC-135 Stratotanker fleet. The House version of the bill would have cut the procurement quantity to 12 planes and the Senate amendment to 14 planes. While the act authorizes $213 million (8%) less than requested in procurement funding for the program, it authorizes the requested quantity of aircraft. Section 146 of the act limits the use of the funding to procure some of the aircraft until the Secretary of the Air Force certifies to the congressional defense committees the plane's refueling and mission avionics systems meet FAA and Air Force requirements. The act authorizes $1.1 billion to procure five E-2D Advanced Hawkeye early-warning aircraft, $152 million and one aircraft more than the Administration's request. The report accompanying the Senate Armed Services Committee's version of the bill noted \"the vital contributions of the E-2D Advanced Hawkeye to present and future carrier air wing operations\" and recommended the increase, which was included on the Chief of Naval Operations' unfunded priorities list. The President's budget request included an Air Force plan to develop a network of sensors called Advanced Battle Management System (ABMS) rather than move forward, as planned, with recapitalizing the E-8C Joint Surveillance Target Attack Radar System (JSTARS) aircraft, which provides airborne battle management, command and control, intelligence, surveillance, and reconnaissance. The House version of the bill would have authorized $623 million not included in the request to fund the E-8C recapitalization. The act authorizes $30 million to \"continue JSTARS recap [ground moving target indicator] radar development.\" The act also includes a provision (Section 147) limiting funds to retire any JSTARS aircraft until the Secretary of Defense certifies to the congressional defense committees that ABMS is ready for operations. The act authorizes $820 million to procure 31 MQ-9 Reapers, a reconnaissance and ground-attack unmanned aerial vehicle (UAV), $46 million and two aircraft more than the Administration's request, to accelerate development of ABMS. The act authorizes $780 million to procure four MQ-4 Global Hawks, a long-range reconnaissance UAV, $81 million and one aircraft more than the Administration's request. The report accompanying the House Armed Services Committee's version of the bill recommends an increase in funding to procure an additional EQ-4 variant equipped with the Battlefield Airborne Communications Node (BACN) to improve tactical communications. The act authorizes $567 million to continue research and development of the MQ-25 Stingray, a carrier-based aerial refueling and reconnaissance UAV, $117 million less than the Administration's request due to what conferees described as \"Insufficient Air Vehicle budget justification.\" Section 219 of the act instructs the Secretary of the Navy to work to modify the aircraft carrier USS George Washington (CVN-73) to support the fielding of the MQ-25. The act authorizes $1.5 billion to procure 66 AH-64 Apache attack helicopters (including new and remanufactured models), $168 million and six helicopters more than the request \"to address [Army National Guard] shortfalls.\" Similarly, the act authorizes $1.3 billion to procure 73 UH-60 Black Hawk utility helicopters (including new models and upgrades), $85 million and five helicopters more than the request for \"additional UH-60Ms for [Army National Guard].\" Following are the full citations of CRS products identified in tables by reference number only. CRS Reports CRS Report R41129, Navy Columbia (SSBN-826) Class Ballistic Missile Submarine Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R44463, Air Force B-21 Raider Long-Range Strike Bomber , by Jeremiah Gertler. CRS Report R43049, U.S. Air Force Bomber Sustainment and Modernization: Background and Issues for Congress , by Jeremiah Gertler. CRS Report R41464, Conventional Prompt Global Strike and Long-Range Ballistic Missiles: Background and Issues , by Amy F. Woolf. CRS Report RL33745, Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R44498, National Security Space Launch at a Crossroads , by Steven A. Hildreth. CRS Report R43240, The Army's Armored Multi-Purpose Vehicle (AMPV): Background and Issues for Congress , by Andrew Feickert. CRS Report R42723, Marine Corps Amphibious Combat Vehicle (ACV): Background and Issues for Congress , by Andrew Feickert. CRS Report R44968, Infantry Brigade Combat Team (IBCT) Mobility, Reconnaissance, and Firepower Programs , by Andrew Feickert. CRS Report RS20643, Navy Ford (CVN-78) Class Aircraft Carrier Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL32418, Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL32109, Navy DDG-51 and DDG-1000 Destroyer Programs: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL33741, Navy Littoral Combat Ship (LCS) Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R44972, Navy Frigate (FFG[X]) Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL30563, F-35 Joint Strike Fighter (JSF) Program , by Jeremiah Gertler. CRS Report RL34398, Air Force KC-46A Tanker Aircraft Program , by Jeremiah Gertler. CRS Report RS22103, VH-71/VXX Presidential Helicopter Program: Background and Issues for Congress , by Jeremiah Gertler. CRS Report R43618, C-130 Hercules: Background, Sustainment, Modernization, Issues for Congress , by Jeremiah Gertler and Timrek Heisler. CRS Report RL31384, V-22 Osprey Tilt-Rotor Aircraft Program , by Jeremiah Gertler. Insights, In Focus CRS Insight IN10931, U.S. Army's Initial Maneuver, Short-Range Air Defense (IM-SHORAD) System , by Andrew Feickert. CRS In Focus IF10954, Air Force OA-X Light Attack Aircraft Program , by Jeremiah Gertler.", "summary": "For FY2019, the Trump Administration requested $708.1 billion to fund programs falling under the jurisdiction of the House and Senate Armed Services Committees and subject to authorization by the annual National Defense Authorization Act (NDAA). The annual National Defense Authorization Act (NDAA) authorizes appropriations for the Department of Defense (DOD) and defense-related atomic energy programs of the Department of Energy. In addition to authorizing appropriations, the NDAA establishes defense policies and restrictions, and addresses organizational administrative matters related to DOD. Unlike an appropriations bill, the NDAA does not provide budget authority for government activities. The President's FY2019 budget request for DOD reflected in part the department's efforts to align its priorities with the 2018 National Defense Strategy and conform to discretionary spending limits set by the Budget Control Act of 2011 (BCA; P.L. 112-25 ) as amended by the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-23 ). Of the $708.1 billion, the Trump Administration's request included $639.1 billion in discretionary funding for the so-called base budgetâthat is, funds intended to pay for defense-related activities that DOD and other agencies would pursue even if U.S. armed forces were not engaged in contingency operations in Afghanistan, Iraq, Syria, and elsewhere. The remaining $69 billion of the request, designated as funding for Overseas Contingency Operations (OCO), would fund the incremental costs of those ongoing contingency operations, as well as any other costs that Congress and the President agreed to so designate. The request was consistent with discretionary spending limits (or caps) on defense activities originally established by the Budget Control Act of 2011 (BCA; P.L. 112-25 ) and amended by the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). The FY2019 defense spending cap is $647 billion and applies to discretionary defense programs (excluding OCO). The cap includes programs outside the scope of the NDAA and for which the Administration requested approximately $8 billion. Thus, the portion of the cap applicable to spending authorized by the NDAA is approximately $639 billion. On May 24, 2018, the House voted 351-66 to pass H.R. 5515 , an amended version of the FY2019 NDAA reported by the House Armed Services Committee. On June 18, 2018, the Senate voted 85-10 to pass its version of H.R. 5515 , after replacing the House-passed text of H.R. 5515 with an amended version of the FY2019 proposal reported by the Senate Armed Services Committee ( S. 2987 ). On July 25, 2018, a conference committee reported a revised version of the bill ( H.Rept. 115-874 ). On July 26, 2018, the House voted 359-54 to approve the conference report. On August 1, the Senate voted 87-10 to approve the conference report. The conference version authorized approximately the same amount as the President's request, though with several billions of dollars of adjustments to amounts within the appropriation titles. On August 13, 2018, President Donald J. Trump signed the bill into law ( P.L. 115-232 ). Congressional authorization of FY2019 defense authorizations reflected a running debate about the size of the defense budget given the strategic and budgetary issues facing the United States.", "document_type": "crs"}
{"report": "The detection of certain per- and polyfluoroalkyl substances (PFAS) in some public water supplies has generated public concern and increased congressional attention to the U.S. Environmental Protection Agency's (EPA) efforts to address these substances. Over the past decade, EPA has been evaluating several PFAS under the Safe Drinking Water Act (SDWA) to determine whether national drinking water regulations may be warranted. EPA has not issued SDWA regulations for any PFAS but has taken various actions to address PFAS contamination. Using SDWA authorities, in 2016, EPA issued non-enforceable health advisories for two PFASâperfluorooctanoic acid (PFOA) and perfluorooctane sulfonate (PFOS)âin drinking water. The 116 th Congress has held hearings on PFAS and passed legislation to address PFAS contamination issues through various authorities and departments and agencies. The National Defense Authorization Act (NDAA) for Fiscal Year 2020 ( P.L. 116-92 ) includes several PFAS provisions involving the Department of Defense (DOD) and other federal agencies. Of the EPA provisions related to drinking water, Title LXXIII, Subtitle A, directs EPA to require public water systems to conduct additional monitoring for PFAS and establishes a grant program for public water systems to address PFAS and other emerging contaminants. On January 10, 2020, the House passed H.R. 535 , a broad PFAS bill that would direct EPA and other federal agencies to take numerous actions to address PFAS. Among its provisions, H.R. 535 would amend SDWA to direct EPA to regulate PFAS in drinking water and would authorize grants for communities for treatment technologies. Other bills would variously direct EPA to take regulatory and other actions under several environmental statutes, including SDWA. Similar to H.R. 535 , multiple SDWA bills would require EPA to establish final or interim drinking water regulations for some or all PFAS, require monitoring for more of these substances, or authorize grants to assist communities in treating PFAS in drinking water. (See Table 1 .) PFAS are a large, diverse group of fluorinated compounds, some of which have been used for decades in a wide array of commercial, industrial, and U.S. military applications. Since the 1940s, more than 1,200 PFAS compounds have been used in commerce, and about 600 are still in use today. The chemical characteristics of PFAS have led to the widespread use of these substances for beneficial purposes (such as firefighting) and in the processing and manufacture of many commercial products, such as nonstick cookware, food wrapper coatings, stain-resistant carpets, waterproof clothing, and food containers. The two PFAS most frequently detected in water supplies are PFOA and PFOS. Since 2002, U.S. manufacturers have phased out the production and most uses of PFOS. In coordination with EPA, manufacturers completed the phase-out of PFOA production by 2015. EPA reports that food and consumer products represent a large portion of exposure to PFOA and PFOS, while drinking water can be an additional source in the small percentage of communities with contaminated water supplies. Among the thousands of different PFAS, few have sufficient health effects studies for determining a threshold at which adverse effects are not expected to occur. Most studies of potential health effects of PFAS have focused on PFOA and PFOS because of their predominant historical use. For those PFAS for which scientific information is available, animal studies suggest that exposure to particular substances above certain levels may be linked to various health effects, including developmental effects; changes in liver, immune, and thyroid function; and increased risk of some cancers. A discussion of these studies and their results is beyond the scope of this report. In 2016, EPA reported that public water systems in 29 states had detected at least one PFAS in their water supplies. In total, 63 public water systems serving approximately 5.5 million people reported detections of PFOA and PFOS (separately or combined) above EPA's health advisory level of 70 parts per trillion (ppt). EPA has reported that PFAS contamination of drinking water \"is typically localized and associated with a specific facility.\" According to the Agency for Toxic Substances and Disease Registry, PFAS may have been released to surface or ground water from manufacturing sites, industrial use, use and disposal of PFAS-containing consumer products (e.g., unlined landfills), fire/crash training areas, wastewater treatment facilities, and the spreading of contaminated biosolids. A discussion of PFAS use, including at U.S. military installations, and PFAS disposal is not included in this report. Uncertainty about potential health effects that may be associated with exposure to specific PFAS above particular concentrationsâcombined with the absence of a federal health-based drinking water standardâhas posed challenges and created uncertainty for states, water suppliers and their customers, homeowners using private wells, and others regarding treatment or other potential responses. State drinking water regulators and others have called for greater federal leadership to address these substances through several federal laws and, specifically, have urged EPA to set federal drinking water standards for one or more PFAS under SDWA. Representatives of public water systems have supported EPA's commitment to follow the statutory process for regulating contaminants in drinking water, which prioritizes regulating those that occur at levels and frequency of public health concern. SDWA provides EPA with several authorities to address emerging contaminants in public water supplies and drinking water sources. These include the authority to (1) issue health advisories, (2) regulate contaminants in water provided by public water systems, and (3) issue enforcement orders in certain circumstances. For more than a decade, EPA has been using SDWA authorities to evaluate several PFASâparticularly PFOA and PFOSâto determine whether national drinking water regulations may be warranted. To date, EPA has not promulgated drinking water regulations for any PFAS but has taken a number of related actions. In February 2019, EPA issued a PFAS Action Plan, which identifies and discusses the agency's current and proposed efforts to address PFAS through several statutory authorities, including SDWA. These actions range from potential regulatory actions to public outreach on PFAS. Many of these actions support EPA's evaluation of PFAS for potential regulation under SDWA. These include research and development of analytical methods needed to accurately measure substances in drinking water, development of additional toxicity information to increase understanding of potential health risks associated with exposures to different PFAS, and research on drinking water treatment effectiveness and costs for various PFAS. EPA also plans to generate occurrence data for more PFAS to determine their frequencies and concentrations in public water supplies. Further, EPA is working with federal, state, and tribal partners to develop risk communication materials on PFAS and plans to develop an interactive map on potential PFAS sources and occurrence. Table A-1 includes EPA's selected actions and associated timelines relevant to addressing PFAS in drinking water. The challenges of regulating individual substances or categories of PFAS in drinking water are multifaceted and may raise several policy and scientific questions. Technical issues involve availability of data, detection methods, and treatment techniques for related but diverse contaminants. Scientific questions exist about health effects attributed to many individual PFAS and whether health effects can be generalized from one or a category of PFAS to others. Policy and regulatory considerations may involve setting priorities among numerous unregulated contaminants, the value of establishing uniform national drinking water standards, and the ability to demonstrate the relative risk-reduction benefits compared to compliance costs to communities associated with regulating individual or multiple PFAS. The absence of a federal health-based standard can pose challenges for states and communities with PFAS contamination. State drinking water regulators have noted that many states may face significant obstacles in setting their own standards. This report provides an overview of EPA's ongoing and proposed actions to address PFAS under SDWA authorities, with particular focus on the statutory process for evaluating PFASâparticularly PFOA and PFOSâfor potential regulation. It also reviews PFAS-related legislation introduced in the 116 th Congress, with emphasis on bills that would amend SDWA. This report does not address the status of scientific research on health effects that may be associated with exposure to one or more PFAS, nor does it discuss federal actions regarding other environmental statutes, such as the Toxic Substances Control Act (TSCA) and the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA). SDWA provides EPA with several authorities to address emerging contaminants in drinking water supplies and sources. The act authorizes EPA to promulgate regulations that include enforceable standards and monitoring requirements for contaminants in water provided by public water systems. For contaminants that are not regulated under the act, SDWA authorizes EPA to issue contaminant-specific health advisories that include technical guidance and identify concentrations that are expected to be protective of sensitive populations. In addition, if the appropriate state and local authorities have not acted to protect public health, SDWA authorizes EPA to take actions to abate an imminent and substantial endangerment to public health from \"a contaminant that is present in or is likely to enter a public water system or an underground source of drinking water.\" SDWA specifies a multistep process for evaluating contaminants to determine whether a national primary drinking water regulation is warranted. The evaluation process includes identifying contaminants of potential concern, assessing health risks, collecting occurrence data (and developing reliable analytical methods necessary to do so), and making determinations as to whether or not regulatory action is needed for a contaminant. To make a positive determination that a national drinking water regulation is warranted for a contaminant, EPA must find that a contaminant may have an adverse health effect; it is known to occur or there is a substantial likelihood that it will occur in public water systems with a frequency and at levels of public health concern; and in the sole judgment of the EPA Administrator, regulation of the contaminant presents a meaningful opportunity for health risk reduction for persons served by water systems. SDWA Section 1412(b) requires EPA to publish, every five years, a list of contaminants that are known or anticipated to occur in public water systems and may require regulation under the act. Before publishing a final contaminant candidate list (CCL), EPA is required to provide an opportunity for public comment and consult with the scientific community, including the Science Advisory Board. In 2009, EPA placed PFOA and PFOS on the third such list (CCL 3) for evaluation. In preparing the CCL 3, EPA considered over 7,500 chemical and microbial contaminants and screened these contaminants based on their potential to occur in public water systems and potential health effects. EPA selected 116 of the contaminants on the proposed CCL based on more detailed evaluation of occurrence, health effects, expert judgement, and public input. In 2016, EPA published the fourth list, CCL 4, which carried over many CCL 3 contaminants, including PFOA and PFOS. EPA carried forward these contaminants to continue evaluating health effects, gathering national occurrence data, and developing analytical methods. To generate data on the nationwide occurrence of emerging contaminants in public water supplies, EPA is required to administer a monitoring program for unregulated contaminants. SDWA directs EPA to promulgate, every five years, an unregulated contaminant monitoring rule (UCMR) that requires public water systems to test for no more than 30 contaminants. Only a representative sample of systems serving 10,000 or fewer people is required to conduct monitoring. EPA uses data collected through UCMRs to estimate whether the occurrence of the contaminant in public water supplies is local, regional, or national in scope. UCMRs set a minimum reporting level (MRL) for each contaminant. MRLs are not health based; rather, they establish concentrations for reporting and data collection purposes. EPA makes the UCMR monitoring results available to the public and reports the number of detections above the MRL and also detections above EPA's health-based reference levels (discussed below), where available. The act includes an authorization of appropriations to cover monitoring and related costs for small systems (serving 10,000 persons or fewer). However, large systems pay UCMR monitoring and laboratory costs. In 2012, EPA issued the third UCMR (UCMR 3), under which 4,864 public water systems tested their drinking water for six PFASâincluding PFOA and PFOSâbetween January 2013 and December 2015. Among these systems, EPA reported the following monitoring results for PFOA and PFOS: 117 of the public water systems reported detections of PFOA at levels above the MRL of 20 ppt, and 95 reported detections of PFOS at concentrations above the MRL of 40 ppt. Overall, 63 of the 4,864 (1.3%) water systems that conducted PFAS monitoring reported at least one sample with PFOA and/or PFOS (separately or combined) concentrations exceeding EPA's health advisory level of 70 ppt for PFOA and PFOS. Actual exposures among individuals served by these systems would be expected to vary depending on water use and consumption. EPA estimates that these 63 water systems serve approximately 5.5 million individuals. Of the 63 systems: 9 reported detections of both PFOS and PFOA above 70 ppt; 4 reported detections of PFOA above 70 ppt; 37 reported detections of PFOS above 70 ppt; and 13 reported detections of PFOA and PFOS (combined but not separately) above 70 ppt. Systems with PFOA or PFOS detections above 70 ppt were located in 21 states, the Pima-Maricopa Indian community, and 2 U.S. territories. EPA's PFAS Action Plan notes that the agency intends to propose monitoring requirements for other PFAS when it proposes the next UCMR (UCMR 5) in 2020. As of January 2020, EPA has developed an analytical method to detect 29 PFAS in drinking water supplies. The plan states that the agency would use the monitoring data gathered through UCMR 5 to evaluate the national occurrence of additional PFAS. The agency is currently working to develop analytical methods to support monitoring for additional PFAS. SDWA requires EPA, every five years, to make a regulatory determinationâa determination of whether or not to promulgate a national primary drinking water regulationâfor at least five contaminants on the CCL. To consider a contaminant for a regulatory determination (RD), EPA requires, at a minimum, a peer-reviewed risk assessment and nationally representative occurrence data. In selecting contaminants for an RD, SDWA requires EPA to give priority to those that present the greatest public health concern while considering a contaminant's health effects on specified subgroups of the population (e.g., infants, children, pregnant women) who may be at greater risk of adverse health effects due to exposure to a contaminant. As noted above, to make a positive determination to regulate a contaminant, EPA must find that (1) a contaminant may have an adverse health effect; (2) it is known to occur or there is a substantial likelihood that it will occur in public water systems with a frequency and at levels of public health concern; and (3) in the sole judgment of the EPA Administrator, regulation of the contaminant presents a meaningful opportunity for health risk reduction for persons served by water systems. SDWA directs EPA to publish a preliminary determination and seek public comment prior to making an RD. EPA may also make RDs for contaminants not listed on the CCL if EPA finds that the statutory criteria regarding health effects and occurrence are satisfied. EPA has issued RDs for CCL 1 through CCL 3. EPA published final determinations that no regulatory action was appropriate or necessary for nine contaminants on CCL 1 (2003) and 11 contaminants (including perchlorate) on CCL 2 (2008). In the most recent RD (2016), EPA determined that regulation was not needed for four of the 116 contaminants listed on CCL 3. EPA delayed a determination on a fifth contaminant, strontium, \"in order to consider additional data and decide whether there is a meaningful opportunity for health risk reduction by regulating strontium in drinking water.\" In 2014, when EPA published preliminary RDs for contaminants on CCL 3 (including PFOA and PFOS), UCMR 3 monitoring was underway and national occurrence data were not available. EPA did not include any PFAS among the contaminants selected for the third RD. In November 2016, EPA included PFOA and PFOS on the agency's list of unregulated contaminants for which sufficient health effect and occurrence data were available to make RDs. The next round of RDs is scheduled for 2021, although SDWA does not prevent EPA from making determinations outside of that five-year cycle. In the Fall 2019 Unified Regulatory Agenda , EPA expected to propose preliminary determinations for two PFASâPFOA and PFOSâby the end of 2019, followed by final determinations by January 2021. Once the Administrator makes a determination to regulate a contaminant, SDWA allows EPA 24 months to propose a \"national primary drinking water regulation\" and request public comment. EPA is required to promulgate a final rule within 18 months after the proposal. SDWA authorizes EPA to extend the deadline to publish a final rule for up to nine months, by notice in the Federal Register . For each contaminant that EPA determines to regulate, EPA is required to establish a non-enforceable maximum contaminant level goal (MCLG) at a level at which no known or anticipated adverse health effects occur and which allows an adequate margin of safety. An MCLG is based solely on health effects data and does not reflect cost or technical feasibility considerations. EPA derives an MCLG based on an estimate of the amount of a contaminant that a person can be exposed to on a daily basis that is not anticipated to cause adverse health effects over a lifetime. This amount is derived using the best available peer-reviewed studies and incorporates uncertainty factors to provide a margin of protection for sensitive subpopulations. In developing an MCLG, EPA also estimates the general population's exposure to a contaminant from drinking water and other sources (e.g., food, dust, soil, and air). After considering other exposure routes, EPA estimates the proportion of exposure attributable to drinking water (i.e., the relative source contribution). When exposure information is not available, EPA uses a default assumption that 20% of exposure to a contaminant is attributable to drinking water. EPA applies the relative source contribution to ensure that an individual's total exposure from all sources remains within the estimated protective level. The MCLG provides the basis for calculating a drinking water standard. Thus, EPA's ability to develop a drinking water regulation for a contaminant is dependent, in part, on the availability of peer-reviewed scientific studies. Drinking water regulations generally specify a maximum contaminant level (MCL)âan enforceable limit for a contaminant in public water supplies. SDWA requires EPA to set the MCL as close to the MCLG as feasible. When assessing feasibility, the law directs EPA to consider the best available (and field-demonstrated) treatment technologies, taking cost into consideration. If the treatment of a contaminant is not feasibleâtechnologically or economicallyâEPA may establish a treatment technique in lieu of an MCL. Each regulation also establishes associated monitoring, treatment, and reporting requirements. These regulations can cover multiple contaminants and, generally, establish an MCL for each contaminant covered by the regulation. Regulations generally take effect three years after promulgation. EPA may allow up to two additional years if the Administrator determines that more time is needed for public water systems to make capital improvements. (States have the same authority for individual water systems. ) The law directs EPA to reviewâand if necessary reviseâeach regulation every six years and requires that any revision maintain or provide greater health protection. For emerging contaminants of concern, data may be limited, particularly regarding a contaminant's potential health effects and occurrence in public water supplies. SDWA authorizes EPA to issue health advisories for contaminants in drinking water that are not regulated under the act. These advisories provide information on a contaminant's health effects, chemical properties, occurrence, and exposure. They also provide technical guidance on identifying, measuring, and treating contaminants. Health advisories include non-enforceable levels for concentrations of contaminants in drinking water. EPA sets health advisories at levels that are expected to protect the most sensitive subpopulations (e.g., nursing infants) from any deleterious health effects, with a margin of protection, over specific exposure durations (e.g., one-day, 10-day, or lifetime). These non-regulatory levels are intended to help states, water suppliers, and others address contaminants for which federal (or state) drinking water standards have not been established. Some states may use health advisories to inform their own state-specific drinking water regulations. Health advisories may be used to address various circumstances: to provide interim guidance while EPA evaluates a contaminant for possible regulation, to provide information for contaminants with limited or localized occurrence that may not warrant regulation, and to address short-term incidents or spills. EPA has issued health advisories for more than 200 contaminants to address different circumstances and subsequently established regulations for many of these contaminants. In May 2016, EPA issued health advisory levels for lifetime exposure to PFOA and PFOS in drinking water. EPA established the Lifetime Health Advisory level for PFOA and PFOS at 70 ppt, separately or combined. In calculating the health advisory level, EPA applied a relative source contribution of 20% (i.e., an assumption that 20% of PFOS and/or PFOA exposure is attributable to drinking water and 80% is from diet, dust, air or other sources). These levels are intended to protect the most sensitive subpopulations (e.g., nursing infants), with a margin of safety, over a lifetime of daily exposure. The Lifetime Health Advisories replaced Provisional Health Advisories that EPA issued in 2009 to address short-term exposures to PFOA and PFOS. SDWA Section 1431 grants EPA \"emergency powers\" to issue orders to abate an imminent and substantial endangerment to public health from \"a contaminant that is present in or is likely to enter a public water system or an underground source of drinking water\" and if the appropriate state and local authorities have not acted to protect public health. This authority is available to address both regulated and unregulated contaminants. The EPA Administrator \"may take such actions as he may deem necessary\" to protect the health of persons who may be affected. Actions may include issuing orders requiring persons who caused or contributed to the endangerment to provide alternative water supplies or to treat contamination. When using this authority, EPA generally coordinates closely with states. EPA reports that it has used its emergency powers under Section 1431 to require responses to PFOA and/or PFOS releases and related contamination of drinking water supplies at four sites, three of which involved the Department of Defense (DOD). Warminster Naval Warfare Center, Pennsylvania. In 2014, EPA issued an administrative enforcement order directing the U.S. Navy to address PFOS in three drinking water supply wells at and near this National Priorities List site. Former Pease Air Force Base, New Hampshire. In August 2015, EPA issued an administrative enforcement order to require the U.S. Air Force to design and construct a system to treat water systems contaminated from releases of PFOA and PFOS at the former Pease Air Force Base in New Hampshire. Horsham Air Guard Station/Willow Grove, Pennsylvania . In 2015, EPA issued an order directing the Air Guard/Air Force to treat onsite drinking water wells and to provide treatment for private offsite wells. Chemours Washington Works Facility , West Virginia/Ohio. EPA issued three emergency orders to this facility in 2002, 2006, and 2009âand amended the 2009 order in 2017 to incorporate the 2016 Lifetime Health Advisory levelârequiring DuPont and Chemours to offer water treatment, connection to a public water system, or bottled water where PFOA concentrations exceeded 70 ppt. In the 116 th Congress, more than 40 bills have been introduced to address PFAS through a broad range of actions and federal agencies. The NDAA for FY2020 (P.L 116-92) and House-passed H.R. 535 include provisions to reduce exposures to PFAS in drinking water and to prevent or remediate the contamination of groundwater, surface water, and drinking water supplies from releases of these substances. This discussion focuses primarily on legislation that amends the Safe Drinking Water Act (SDWA) or otherwise affect public water systems. Table 1 briefly describes relevant provisions of such bills offered in the 116 th Congress. In the context of SDWA, congressional attention has focused primarily on whether EPA might set drinking water standards (MCLs) for PFOA, PFOS, and/or other PFAS. SDWA directs EPA to follow a regulatory development process for contaminants, which includes consideration of technical feasibility and the assessment of health risk reduction benefits and costs, among other factors. On occasion, Congress has directed EPA to promulgate a regulation for a particular contaminant within a specified time frame. Congress has used this approach to prompt EPA to regulate certain contaminants already under review and/or to specify a deadline for issuing regulations under development. In the case of PFAS, representatives of public water systems and others have cautioned against bypassing SDWA's science-based and risk-driven process. As regulatory compliance costs are borne by communities, public water suppliers have urged that regulations be data-driven to better ensure risk reduction benefits. Others have urged \"federal leadership\" to provide more certainty to states and communities with contaminated water supplies. State drinking water regulators have noted that some states may lack the resources to assess and/or the authority to regulate drinking water contaminants that are not federally regulated, including PFAS. As with certain other contaminants, some states have urged EPA to set national standards. A further concern is that state-by-state actions could create public confusion regarding the safety of drinking water. Enacted December 20, 2019, the NDAA for FY2020 ( P.L. 116-92 ) contain PFAS provisions specific to DOD, EPA, and several other federal agencies. Some NDAA provisions involve the use of aqueous film forming foam, while others address DOD remediation of PFAS-contaminated drinking water, groundwater, and surface water. Among the EPA provisions, the NDAA addresses drinking water as follows: Section 7311 requires EPA to add to UCMR 5 all PFAS or categories of PFAS with validated test methods. Section 7312 amends SDWA to establish a grant program within the Drinking Water State Revolving Fund to assist water systems in addressing emerging contaminants with an emphasis on PFAS. Section 7312 authorizes appropriations of $100 million annually for FY2020-FY2024 for this purpose. On January 10, 2020, the House passed H.R. 535 , a broad PFAS bill. H.R. 535 contains a range of provisions that would address PFAS using multiple authorities, including several EPA-administered laws. Regarding drinking water, the bill includes several specific provisions, some of which would amend SDWA: Section 5 would amend SDWA to require EPA, within two years of enactment, to promulgate a national primary drinking water regulation for PFAS with standards for PFOA and PFOS at a minimum. It would establish a separate regulatory process for PFAS to accelerate EPA's promulgation of drinking water standards. Among other provisions, this section would require EPA to propose a regulation for a PFAS within 18 months (rather than 24 months) of making a determination to regulate it. This section would allow EPA, when developing regulations, to rely on health risk information for one PFAS to make reasoned extrapolations regarding the health risks of other PFAS. It would also direct EPA to issue a health advisory within a year of finalizing a toxicity value for a single PFAS or class of PFAS. Section 6 would prohibit EPA (but not states) from imposing penalties for violations of PFAS drinking water regulations until five years after the date of promulgation (to allow systems time to make capital improvements as needed for compliance). Section 7 would add SDWA Section 1459E to direct EPA to establish a competitive grant program to assist community water systems with installing treatment technologies to address PFAS contamination. To support this program, Section 7 would authorize annual appropriations of $125 million for FY2020 and FY2021 and $100 million for FY2022-FY2024. EPA would be required to give funding priority to community water systems that (1) serve a \"disadvantaged community or a disproportionately exposed community,\" (2) provide at-least a 10% cost share, or (3) demonstrate the capacity to maintain the treatment technology. Other bills introduced in the 116 th Congress would variously require EPA to establish an MCL for specific PFAS or for PFAS as a group. These include S. 1507 (as reported), S. 1473 , and H.R. 2377 . Additionally, S. 1507 and H.R. 2800 would require public water systems to conduct monitoring for more PFAS in drinking water. Several billsâincluding S. 1507 , H.R. 2533 / H.R. 2741 (Title II), and H.R. 1417 / S. 611 âwould authorize grants for public water systems and/or households to treat PFAS in drinking water. In contrast, H.R. 2570 would direct EPA to establish PFAS manufacturing fees to support the \"PFAS Treatment Trust Fund.\" Amounts in the trust fund would be available to EPA, without further appropriation, to make grants to community water systems and municipal wastewater treatment works for costs associated with PFAS removal.", "summary": "Per- and polyfluoroalkyl substances (PFAS) are fluorinated chemicals that have been used in an array of commercial, industrial, and U.S. military applications for decades. Some of the more common applications include nonstick coatings, food wrappers, waterproof materials, and fire suppressants. Detections of some PFAS in drinking water supplies and uncertainty about potential health effects associated with exposure to particular PFAS above certain concentrations have increased calls for the U.S. Environmental Protection Agency (EPA) to address these substances in public water supplies. For those few PFAS for which scientific information is available, animal studies suggest that exposure to particular substances above certain levels may be linked to various health effects, including developmental effects; changes in liver, immune, and thyroid function; and increased risk of some cancers. In 2009, EPA listed certain PFAS for formal evaluation under the Safe Drinking Water Act (SDWA) to determine whether regulations may be warranted. EPA has not issued drinking water regulations for any PFAS but has taken various actions to address PFAS contamination. In the 116 th Congress, Members have introduced more than 40 bills to address PFAS through various means. The National Defense Authorization Act (NDAA) for FY2020, P.L. 116-92 , includes multiple PFAS provisions regarding primarily the Department of Defense (DOD), but several involve EPA and other federal agencies. Among the EPA provisions, Title LXXIII, Subtitle A, directs EPA to require public water systems to conduct additional monitoring for PFAS and creates a grant program for public water systems to address PFAS and other emerging contaminants. The House of Representatives passed H.R. 535 , a broad PFAS bill, on January 10, 2020. Among SDWA provisions, H.R. 535 would direct EPA to issue drinking water regulations for at least two PFAS within two years and establish a separate standard-setting process for PFAS. In February 2019, EPA released its PFAS Action Plan, which discusses the agency's current and proposed actions to address these substances under its various statutory authorities. Regarding SDWA, the plan notes that EPA is following the statutory process for evaluating PFASâparticularly perfluorooctanoic acid (PFOA) and perfluorooctane sulfonate (PFOS)âto determine whether national primary drinking water regulations are warranted. The Fall 2019 Regulatory Agenda indicated that EPA planned to propose preliminary regulatory determinations for PFOA and PFOS by the end of 2019 and finalize determinations by January 2021. The absence of a national health-based drinking water standard for any PFAS has increased interest in the SDWA process for regulating contaminants. The statute prescribes a risk- and science-based process for evaluating and regulating contaminants in drinking water. The evaluation process includes identifying contaminants of potential concern, assessing health risks, collecting occurrence data (and developing reliable analytical methods necessary to do so), and making determinations as to whether a national drinking water regulation is warranted for a contaminant. PFAS include thousands of diverse chemicals, and setting drinking water standards for individual or groups of PFAS raises technical and scientific challenges. For example, SDWA requires EPA to make determinations and set standards using the best available peer-reviewed science and occurrence data. However, data on the potential health effects and occurrence are available for few of these substances. Further, EPA may face challenges in developing test methods and identifying treatment technologies for a diverse array of PFAS. Contamination of drinking water by PFAS can pose challenges for states and communities, and some have called for EPA to establish enforceable standards. State drinking water regulators have noted that many states may face significant obstacles in setting their own standards. For contaminants not regulated under SDWA, EPA is authorized to issue non-enforceable health advisories, which provide information on health effects, testing methods, and treatment techniques for contaminants of concern. In 2016, EPA established health advisory levels for PFOA and PFOS in drinking water at 70 parts per trillion (separately or combined). SDWA also authorizes EPA to take actions it deems necessary to abate an imminent and substantial endangerment to public health from a contaminant present in or likely to enter a public water system or an underground source of drinking water. Actions may include issuing orders requiring persons who caused or contributed to the endangerment to provide alternative water supplies or to treat contamination. Since 2002, EPA has used this authority to require responses to PFOA and/or PFOS contamination of water supplies associated with four sites, including three DOD sites.", "document_type": "crs"}
{"report": "The United States is currently experiencing the longest economic expansion in its history. Although short-term forecasts are predicting continued economic expansion, some economists have expressed uncertainty over how long the expansion will continue. History has shown that economic expansions inevitably give way to economic slowdowns. If the next slowdown is significant, the economy could enter a recession, which is typically characterized by falling output and rising unemployment. Predicting when the economy may transition from expansion to recession, however, is notoriously difficult, as the ebb and flow of the economy is determined by many different factors, including a number that lie outside the country's borders. Countercyclical fiscal policy may help to stabilize the economy when it enters a recession. Countercyclical fiscal policy refers to short-term tax and spending adjustments to stimulate consumer and business demand in an effort to counteract economic contraction and return the economy to its potential. Effective fiscal stimulus does not always require contemporaneous legislative action by Congress. There are certain \"automatic stabilizers\" that work without congressional action to lower taxes and increase spending as the economy weakens. As a result, an economic slowdown or recession does not necessarily warrant a policy response. However, Congress has a range of options it could consider when designing a stimulus package should a recession occur and automatic stabilizers are not sufficient to counteract it. This report identifies and summarizes options Congress may consider in response to a recession. The analysis begins by reviewing the features effective countercyclical fiscal policies are commonly thought to have, and then distinguishes between countercyclical and growth-oriented policies. Next, the report summarizes and evaluates potential fiscal policy options that Congress could consider. The options presented are drawn from those policies considered during the Great Recession for which estimates of their potential economic impact exist. The report concludes with a brief discussion about enacting fiscal stimulus in the context of the country's long-run budget outlook. Effective fiscal policy in response to recessions of average duration and severity is usually considered to have three general features: it is timely, targeted, and temporary. For fiscal policy to be effective in returning the economy to its potential, it must stimulate the economy at the appropriate time. Implemented too early, and there is a risk that fiscal tools are wasted and not available if the downturn becomes more severe. Implemented too late, and there is a risk that the downturn becomes so severe that much more fiscal (and monetary) stimulus is needed to stabilize the economy. Alternatively, the economy could have already returned to a path toward full potential on its own, in which case untimely stimulus risks overheating the economy. Timely implementation of fiscal policy is made inherently difficult by three well-known lags: the lag in recognizing a recession, the lag in negotiating and implementing a policy response, and the lag between policy implementation and when the economy is affected. A targeted fiscal stimulus will produce the most \"bang for the buck,\" or, in economics jargon, involve changes with the largest \"multipliers.\" Fiscal policy multipliers measure the change in economic output in response to a dollar change in taxes or a dollar change in spending. For example, a multiplier of 1.5 means that $1.00 of stimulus will lead to a $1.50 change in output. Conversely, a multiplier of 0.75 means that $1.00 of stimulus will lead to a $0.75 change in output. Larger multipliers suggest larger stimulative effects. Economists use multipliers to estimate the impact a particular fiscal policy, or collection of polices, will have on the economy. On the revenue side, it appears that the largest multipliers are associated with tax reductions that are targeted at lower-income households and those with less access to liquid assets. These individuals are more likely, out of necessity, to increase their spending in response to a tax cut or rebate than those with higher incomes or more accessible forms of wealth. Business tax reductions also are estimated to stimulate demand, but most analyses find the multiplier effects to be smaller than those of well-targeted individual tax reductions. This finding is the result of research that indicates businesses are slow to respond to investment tax incentives, that business tax rate reductions primarily benefit existing capital rather than new investment, and that hiring incentives do not directly address the primary factor that influences the decision to bring on more employees, which is the demand for businesses' products and services. Direct spending increases usually register as highly stimulative on a per-dollar basis, although some spending increases are able to work their way more quickly into the economy than others. For example, spending on unemployment benefits and food stamp assistance increase automatically during a recession and are targeted at households most vulnerable during a downturn. As a result, their potential to stimulate demand are usually estimated to be quite large. Assistance to state and local governments to relieve budgetary pressures and maintain spending are estimated to be moderately cost effective. Spending on infrastructure, while believed to have a significant impact on the economy given enough time, can take many months to take effect due to the length of time it takes to plan and complete such projects. Temporary stimulus can help to contain the budgetary impact of tax reductions and spending increases, which, in turn, can increase the effectiveness of the stimulus by mitigating the adverse effect large deficits can have on long-term growth. Although fiscal stimulus must result in a deficit to affect overall spending, deficits themselves are not necessarily problematic. Large and sustained deficits, however, can have undesirable effects. For example, as the economy starts to recover from a downturn, continued deficits can lead to higher interest rates as the government competes with the private sector for loanable funds. Higher interest rates can counteract the stimulus as the government's need to finance deficits \"crowds out\" private-sector investment and consumption. These higher interest rates can also attract borrowing from abroad, causing the dollar to appreciate and reducing net exports. Deficits can also harm longer-run economic growth since they reduce national saving, which is closely linked to the capital formation process that is critical for economic growth. Before discussing potential policy options for countering an economic downturn, it is useful to distinguish between countercyclical fiscal policies and growth-oriented policies. Some confusion arises because of the terminology used and the time frame in question. Economists view cyclical fluctuations, also known as the business cycle, as short-run phenomena that occur as the result of various external \"shocks\" that temporarily move the economy away from its long-run growth path. These transitory shocks often influence the economy via changes in total spending or, in economic terms, aggregate demand. During a recession, total spending generally falls below the economy's productive capacity, resulting in rising unemployment and falling capital utilization. In an expansion, total spending rises until it matches the economy's productive capacity, requiring firms to deploy previously idle resources. Countercyclical fiscal (and monetary) policies have the potential to affect aggregate demand (i.e., total spending) and decrease the severity of fluctuations in the economy that occur over the business cycle. In contrast to the business cycle, economic growth is a long-run phenomenon that is tied to factors that determine the productive capabilities of the economy. Thus, whereas countercyclical policies tend to focus on the demand side of the economy, growth-oriented polices target the supply side with the goal of influencing the sources of growthâmainly, the quantity and quality of employed labor, the amount of capital, and the level of technology. The sources of long-run growth are taken to be more or less fixed in the short run, making them less of a concern over a single business cycle. Growth-oriented policies therefore take a longer-term approach to structuring the government's tax and spending initiatives with the aim of improving the incentives to work, invest, and innovate. Part of this approach is minimizing uncertainty over tax and spending policy itself, so that households and businesses can make long-lasting decisions that will support growth. Another part of this approach is prudent management of deficits and the debt so that high interest rates do not inhibit growth factors, such as investment. This report analyzes policy options from a countercyclical, and not a long-term growth, perspective. Countercyclical fiscal policy tools may be sorted into two categoriesâautomatic stabilizers and discretionary changes that require legislative action. Automatic stabilizers are features built into the economy's tax and transfer system that lower taxes and increase spending as the economy weakens. They take effect automatically without the need for congressional action. Discretionary policies refer to legislative changes to individual and business taxes, and to government spending enacted in response to economic conditions. The distinction between the two can become blurred; automatic stabilization policies can be modified in response to an economic downturn by legislative action, and discretionary changes could be made to take effect and expire automatically if certain criteria are met. The following sections review a select set of policy options that are often considered in response to a recession. The options are drawn from the Congressional Budget Office (CBO) and Moody's Analytics, both of which estimated the impact of specific policies or approaches in response to the Great Recession. While a general approach to stimulating a weakened economy with reduced taxes and increased spending is often advocated, specific policies have different impacts on the economy and differing administrative complexities. CBO's and Moody's estimates provide insight into which specific policy options may be most worthwhile to implement during the next downturn. The policy options presentedâor variations of themâare ones commonly considered when designing a fiscal stimulus package and are not unique to either CBO or Moody's. However, policymakers may consider that the economy has the potential to return to full employment without intervention. As such, one policy option is to allow the economy to correct itself. Fiscal policy's estimated impact in response to the next recession is likely different from the impact estimated by CBO and Moody's in response to the Great Recession. Generally accepted economic theory holds that fiscal policy has a greater impact on the economy the further it is from full employment. This is because there is a greater abundance of idle resources that can be brought back into producing goods and services. The Great Recession was the most severe downturn since the Great Depression, and the economy was far from full employment. Thus, estimates of the impact of stimulus at that time may be an upper bound for fiscal policy's stimulative effect. Additionally, hindsight has allowed economists to improve their estimation techniques. Still, the relative magnitudes estimated by CBO and Moody's will conceivably still hold if they are updated in the future. It is important to briefly discuss the inherent difficulty of estimating the exact impact specific fiscal policies could have on the economy. All of the estimates presented below (and elsewhere) are based on models that rely on a set of assumptions about how individuals and businesses may react to policy changes, and on assumptions about how the Federal Reserve may adjust monetary policy to accommodate or to offset a fiscal policy change. The assumptions are subject to significant uncertainty. It is also never known what would happen in the absence of a particular stimulus package change (i.e., the counterfactual). As a result, the focus should be on the relative magnitudes of policies' impacts and not on individual point estimates. One set of CBO estimates presented below is qualitative. Still, the estimates presented in this section were made using conventional methods and provide a starting point for understanding how specific policies may affect the economy. The automatic stabilizers that receive the most attention are the progressive structure of the income tax system and Unemployment Compensation (UC) benefits. During an economic downturn, more taxpayers begin to move into lower marginal tax brackets as employment and incomes fall, reducing the proportion of income subject to tax and helping to cushion the fall in spending. Likewise, with rising unemployment, more individuals will have met the conditions required to qualify for UC benefits (i.e., state government spending increases), which provide some income support and, in turn, can help mitigate the negative impact rising unemployment has on aggregate demand. Other programs that may act as automatic stabilizers include the Supplemental Nutrition Assistance Program (SNAP, formerly the Food Stamp program), Medicaid, and Temporary Assistance for Needy Families (TANF). Automatic stabilizers are attractive because they can be designed to satisfy the three criteria for effective countercyclical policy. These programs take effect automatically in a timely fashion to help stabilize demand as the economy begins to weaken and even before a recession has been declared. Therefore, the lag between recognition and implementation is reduced. Automatic stabilizers are also targeted to individuals whose incomes are falling, which suggests a large \"bang for the buck.\" And finally, these programs generally continue to provide support if the downturn becomes more severe, but gradually taper off as the economy begins to improve, making them temporary. However, if the recession is long enough, some individuals may exhaust their benefits before the recession is over. For example, UC benefits may be claimed by an individual for six months or less in most cases. Making adjustments to automatic stabilizers in response to a recession is discussed in the \" Government Spending \" section. While an attractive first line of defense against a weakening economy, automatic stabilizers may not provide enough stimulus to counteract a severe or prolonged economic downturn. In such cases, the stabilizers may need to be adjusted or supplemented with additional fiscal tools. Modifying automatic stabilizers before or in response to a recessionâfor example, by expanding or extending coverageâarguably crosses into the realm of discretionary fiscal policy. Potential modifications to current automatic stabilizers are discussed in the \" Direct Payments and Transfers to Households \" section of the report, along with estimates of the economic impact of these changes. Neither CBO nor Moody's estimated the impact of the baseline automatic stabilizers. Enacting individual tax relief to boost demand is an option for stimulating the economy since personal consumption accounts for approximately 70% of U.S. GDP. Tax cuts or rebates that are spent will have the largest impact; tax cuts that are saved do not lead to additional spending and therefore have no stimulative impact. As discussed previously, tax relief directed toward lower- and moderate-income households appears to provide the most \"bang for the buck.\" Delivering targeted tax relief to these households, however, can be complicated by the fact that many of them do not pay income taxes and may not file tax returns. Additionally, careful consideration is needed about how to deliver any tax relief so that household incomes are increased as soon as possible. Table 1 summarizes CBO's and Moody's estimates of the impact of several individual tax policiesâdiscussed in more detail belowâthat were considered, and in some cases enacted, in response to the Great Recession. One way to provide an infusion of money directly into the budgets of lower- and moderate-income households is to issue tax \"rebates.\" Limitations on the administrative aspects of delivering such rebates, sometimes also referred to as \"lump-sum\" or \"cash\" rebates, has resulted in the stimulus being structured as an advanced tax credit based on a prior year's income, but used to offset a future year's tax liabilities. This was the general approach used most recently in response to the 2001 recession and again during the Great Recession. The Economic Growth and Tax Relief Reconciliation Act of 2001 (EGTRRA; P.L. 107-16 ) provided a lump-sum rebate check of up to $600 for joint filers, $500 for head of household filers, and $300 for single filers. However, the rebate was actually an advanced credit for taxes to be paid on income earned in 2001. The advanced credit was based on taxpayers' 2000 tax returns. Taxpayers then included the credit when completing their 2001 tax returns and were allowed to keep any overpayment if the credit they received (estimated using their 2000 returns) was too large. Individuals who had no tax liability in 2000 were ineligible for the credit. Eligible rebate recipients received their checks between July and October of 2001. The legislation was enacted in early June. The Economic Stimulus Act of 2008 (ESA; P.L. 110-185 ) also provided a tax rebate to individuals. Like the 2001 rebate, the ESA rebate was actually an advanced credit for 2008 taxes, based on returns filed in 2007. Unlike the 2001 rebate, the ESA rebate was made partly refundable to target lower-income households. The rebate was equal to the lesser of $600 ($1,200 for joint filers) and the individual's 2007 tax liability. Since the calculation depended on taxes paid in 2007, lower-income households who did not need to file a 2007 return would have been ineligible for a rebate. However, the law stipulated that for those who had not filed a 2007 tax return, but whose total income was at least $3,000, the rebate was equal to $300 ($600 for joint filers). Rebate recipients also were eligible for an additional $300 rebate per child under the age of 17. Disbursements of rebate checks mostly occurred between the end of April and middle of May of 2008. An alternative to issuing lump sum rebates is to spread the tax reduction over time. The American Recovery and Reinvestment Act (ARRA; P.L. 111-5 ) attempted such an approach by creating the Making Work Pay (MWP) tax credit, which was available in 2009 and 2010. The MWP tax credit was equal to 6.2% of a taxpayer's earned income up to $400 for single filers and $800 for joint filers. Because individuals must pay 6.2% of their income toward the Social Security portion of payroll taxes, and because the credit was fully refundable, the credit effectively eliminated the Social Security tax on the first $6,450 of a single filer's income and the first $12,900 of joint filers' income. The credit began phasing out for workers with incomes exceeding $75,000 ($150,000 for joint filers), and was not available to those with incomes greater than $95,000 ($190,000 for joint filers). The refundability of the credit helped to benefit lower-income households. The MWP tax credit expired at the end of 2010. Following the expiration of the MWP credit, the Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010 ( P.L. 111-312 ) enacted a payroll tax \"holiday.\" The holiday reduced workers' share of the Social Security payroll tax by 2 percentage points, from 6.2% to 4.2% on income up to $106,800 for 2011. The analogous tax for self-employed workers was reduced similarly from 12.4% to 10.4%. Because payroll taxes are withheld from each paycheck a worker receives, the reduction provided a benefit spread out over the year. The holiday did not benefit the lowest-income workers as much as the MWP credit because to receive the same $400 benefit, an individual needed to earn $20,000. Additionally, workers whose income was not subject to the Social Security tax did not benefit from the holiday because they had no tax to be reduced. The holiday was extended two more times, once through February 2012, and then again through the end of 2012. Both the MWP tax credit and the payroll holiday assisted only individuals who were working. Because unemployment typically increases during a recession, neither of these policies assisted those who had lost their job. However, unemployed individuals did receive UC benefits. Taxes could be reduced by lowering individual income tax rates. The Internal Revenue Service (IRS) would need to publish new withholding tables to enable employers to adjust employee withholdings so the reduction would be reflected in workers' paychecks. The IRS could make this change rather quickly; new withholding tables were published within two months of the enactment of P.L. 115-97 , commonly referred to as the Tax Cuts and Jobs Act, or TCJA. A drawback of an across-the-board tax rate reduction, from a short-term stimulus perspective, is that it would not have the maximum effect on demand. To have maximum effect, tax reductions must target lower- and moderate-income households because the spending of these households is most responsive to increases in after-tax income. However, an across-the-board income tax rate reduction is not well-targeted to these households because they pay little or no income taxes, and therefore would not benefit much, or at all, from a tax rate reduction. At the same time, many of those who would not benefit from an income tax rate reduction are working and therefore paying payroll taxes. Because the stimuluative effect of an across-the-board rate reduction is low, so too is its cost effectiveness. Although households in the lower tax brackets would receive a benefit, the majority of such a tax reduction would flow to taxpayers at the upper end of the income distribution. This is because higher-income households pay a disproportionate share of income taxes. But as previously discussed, these households are estimated not to be as responsive to increases in after-tax income as lower- and moderate-income households. Combined with a likely large revenue loss from an across-the-board rate reduction, this implies that the \"bang for the buck\" would be low. The stimulative effect is further diminished if sizable deficits lead to higher interest rates, crowding out private investment. The cost associated with this approach could be reduced by limiting the reduction to the lower brackets. However, because of the marginal structure of the income tax, many upper-income households would receive a tax cut, albeit small relative to their income, because a portion of their earnings falls within the lower tax brackets. The costs could also be contained by making the reduction temporary, but compared to other options, it would still be relatively expensive. A reduction in taxes on capital gains and dividends is another option for providing individual tax relief as a countercyclical measure. Currently, long-term capital gains and dividends are taxed at rates of 0%, 15%, or 20%, depending on an individual's tax bracket. Capital gains and dividends qualify as long term if the underlying asset has been held for at least a year. Short-term capital gains are taxed at the individual's ordinary income tax rate; the maximum individual income tax rate in 2019 is 37%. Long-term capital gains and dividends have received preferential tax treatment to varying degrees since the Omnibus Budget Reconciliation Act of 1990 (OBRA90; P.L. 101-508 ). Prior to 1990, capital gains and dividends had been taxed at ordinary rates as the result of the Tax Reform of 1986 ( P.L. 99-514 ). Capital gains and dividends tax rates were last reduced (to 0% and 15%) in an attempt to stimulate the economy by the Jobs and Growth Tax Relief Reconciliation Act of 2003 ( P.L. 108-27 ). The American Taxpayer Relief Act of 2012 ( P.L. 112-240 ) increased the top rate to 20% for high-income individuals, resulting in the current three-rate regime. The Health Care and Education Reconciliation Act of 2010 ( P.L. 111-152 ) added a 3.8% tax on high-income individuals, bringing the effective top tax rate to 23.8%. The effectiveness of reducing taxes on capital gains and dividends in stimulating the economy is likely to be small. The overwhelming majority of capital gains and dividends income is received by taxpayers in the upper end of the income distribution, which implies the majority of any tax reduction would accrue to these taxpayers. For example, the Urban-Brookings Tax Policy Center (TPC) estimates that 95.8% of the tax on long-term capital gains and dividends is paid by taxpayers in the top 20% of the income distribution, and 76.5% is paid by taxpayers in the top 1%. Although there is an argument that lower taxes on investment income may be beneficial for longer-term growth, effective stimulus must increase demand in the short run. The economy can also be stimulated by boosting business spending. The primary focus when targeting business spending has been new investment, which is a component of aggregate spending (demand). Business investment, while comprising a smaller share of GDP than consumer spending, is much more volatile than consumer spending and hence typically decreases more during recessions. However, the decline in investment spending may be in direct response to the decline in overall spending, which makes it difficult for policy to induce businesses to invest more. This section reviews a number of possible business tax incentives that Congress may consider during the next recession. Table 2 summarizes CBO's and Moody's estimates of the impact of several business tax policesâdiscussed in more detail belowâthat were considered, and in some cases enacted, in response to the Great Recession. Incentives that directly target new investment are thought to be one of the more effective stimulus policies among business tax incentives. Two general approaches for encouraging investment are by accelerating depreciation or offering an investment tax credit. Accelerated depreciation allows a business to deduct from its income the cost of an investment faster than its useful (economic) life would dictate and, as a result, increases the after-tax return on eligible new investments. The most accelerated form of depreciation is expensing, and it allows a business to deduct the full cost of a qualified investment in the year it is purchased instead of spreading the deduction over a number of years. Accelerated depreciation is not currently available as a stimulus option since the 2017 tax revision ( P.L. 115-97 ) provided expensing for equipment through 2022, followed by a four-year phase-out period. An investment tax credit would allow a business to offset its tax liability by an amount equal to a fraction of its investment. The amount of investment that occurs in response to a tax credit depends on how responsive investment is to reduced investment costs. The empirical literature has not generally found total investment to be considerably responsive to tax incentives. Intuitively, this can be explained by the fact that investments require large and one-off expenditures involving durable assets that require time to plan and incorporate into the production process. The responsiveness of investment to tax incentives may be lower during recessions than more normal times since recessions are periods of heightened uncertainty, which reduces the desire to make investments. If investment incentives are to be included in a stimulus package, they are likely to be more effective if they are available for a short period of time to encourage businesses to take advantage of them and to limit the budgetary impact. Reducing the corporate income tax rate could provide stimulus by increasing new corporate investment. Historically, however, corporate tax rate reductions have not been part of stimulus packages. When compared to alternative options, the short-term stimulus effect of a corporate rate reduction is likely to be small. This is for two primary reasons. First, investment incentives are most effective when they stimulate new investment. Although a reduction in the corporate tax rate would encourage some new investment by increasing the after-tax return to investment, it would also, and primarily, provide a windfall benefit to existing capital. Thus, the \"bang for the buck\" is expected to be quite low. Second, investment decisions are made with an eye toward future economic conditions since many assets are long-lived. If a rate reduction is temporary, or if corporate decisionmakers suspect rates will be higher in the future, the incentive to invest is lower. A rate reduction in response to the next recession may even be smaller than could be expected in the past because P.L. 115-97 permanently lowered the corporate tax rate from 35% to 21%. Allowing net operating losses to be carried back could provide tax relief for some businesses. When a business experiences a loss it owes no tax in that year (known as a loss year ). Currently, the business may use a loss to reduce future taxes by claiming it as a deduction against income earned after the loss year. This process is known as carrying forward a loss , and a business may carry a loss forward indefinitely until there is no more loss to be deducted. Prior to the 2017 tax revision ( P.L. 115-97 ), businesses were able to use losses to obtain a refund for past taxes paid, a process known as carrying back a loss . Losses had generally been limited to a two-year carryback since 1997, but this was temporarily extended to five years during the Great Recession. Businesses prefer to carry losses back rather than carry them forward because carrybacks produce an immediate and certain benefit, whereas carryforwards reduce taxes at some uncertain time in the future. Allowing losses to be carried back would help some firms with cash flow problems. A business in a loss position may have trouble making payroll and covering other operating expenses. Carryback losses would provide these firms with an infusion of cash and potentially allow them to ride out an economic downturn with less need to lay off workers. It would also allow firms in a loss position (or close to it) to benefit more from immediate expensing, which would help investment. The stimulative effects of loss carrybacks are generally thought to be small because they are not tied to increased investment or employment. Economic uncertainty may overshadow the incentive to invest during a recession, and profitable investment opportunities are less available during a recession. The tax code could be used to directly target rising unemployment during a recession via a hiring tax credit. During a downturn businesses cut back on hiring, and, depending on the severity of the recession, lay off employees. One way to address the reduction in the demand for employees is to reduce the cost of hiring and retaining workers by offering a tax credit tied to firms' payroll costs. To be most effective, only hiring and retention that would not otherwise occur would be eligible. This is inherently difficult because it is impossible to know whether a business is being encouraged to hire an employee or simply claiming the tax incentive because it is eligible. Past attempts to better target hiring and retention incentives have resulted in complex administrative issues, which have discouraged participation. These issues have created some skepticism over the effectiveness of this policy, and the literature has found mixed results. A deeper structural relationship between the employment decisions of firms and the performance of the economy would likely limit even a well-designed hiring incentive during a recession. The demand for labor by firms depends on the demand for its products and services. If consumers are withholding spending on goods and services, the firms' desire to hire workers to fill orders and produce goods is reduced regardless of a hiring incentive. The government can boost aggregate demand directly with increased spending. Like tax incentives, spending policies can take many forms, but three broad categories are helpful for classifying government spending: direct payments and transfers to households, aid to states and local governments, and government purchases of goods and services. This section discusses each of these categories. Table 3 summarizes CBO's and Moody's estimates of the impact of several spending policiesâdiscussed in more detail belowâthat were enacted in response to the Great Recession. Examples of direct payments and transfers to households include extending or enhancing UC benefits and increasing SNAP (formerly the Food Stamp program) benefits. These options would boost the disposable income of unemployed or underemployed individuals, who could be expected to spend nearly all of the stimulus. Therefore, the stimulative effect of direct payments and transfers to households in distress is believed to be large. These policies may also be comparatively simple to enact and administer because they would build on programs already in place. Congress has extended UC benefits in response to eight recessions in recent history. Extending the duration of UC benefits would give individuals who are unemployed more time to secure employment. Congress could also, or additionally, enhance the benefit amount recipients received. In addition to extending the duration of UC benefits, ARRA ( P.L. 111-5 ) also increased the amount eligible beneficiaries received by $25 each week. ARRA also provided for a tax exclusion up to the first $2,400 of unemployment benefits received. The increase in the standard deduction enacted by P.L. 115-97 , however, reduces the ability of an exclusion to enhance benefits. There is no consensus about how long of an extension or how large of an enhancement is appropriate. If the appropriate balance is not struck, there could be adverse effects, particularly with respect to accepting gainful employment once the economy has improved. SNAP benefits were also increased across-the-board during the Great Recession by ARRA ( P.L. 111-5 ). SNAP households' monthly benefit amounts are calculated using a maximum benefit and household-specific circumstances (such as household size). The ARRA provision specifically increased the maximum monthly benefit by 13.6%, thereby increasing the food purchasing power of eligible low-income households. Though the ARRA increase was originally expected to be effective through 2018, the duration of the increase in SNAP benefits was subsequently shortened to March 31, 2014, by P.L. 111-226 , and then to October 31, 2013, by P.L. 111-296 to offset the cost of these bills. Aid to states and localities could support aggregate demand if their budgets become strained due to an economic downturn. Most states have balanced-budget requirements that limit their ability to carry out independent countercyclical policy. As states and municipalities experience budgetary pressure from declining tax revenue, state and local governments may need to raise taxes and cut spending, including laying off employees. Therefore, aid to states and localities, while not generally believed to be as stimulative as direct transfers to individuals, is predicted to be moderately effective at combating a downturn as a \"defensive\" stimulus that can help to maintain services, taxes, and employment. Typically aid to states has been provided through existing programs. Assistance could be provided through a general revenue transfer, although this approach is not typically used. In the past, one way Congress has provided aid to states is via Medicaid enhancement. In response to the Great Recession, ARRA ( P.L. 111-5 ) temporarily increased the federal medical assistance percentage (FMAP) by 6.2 percentage points. FMAP is the rate at which the federal government reimburses states for Medicaid expenditures and is used for determining the federal government's share of a number of other domestic social policy programs, such as the State Children's Health Insurance Program (CHIP) and foster care and adoption assistance. ARRA also provided funding to support state and local first responders, as well as school systems. Direct federal infrastructure investment, and aid to state and local governments to invest in infrastructure, is an option for supporting demand and stimulating the economy. Economic downturns often experience a drop in overall investment by the private sector. By making expenditures in public works, the government can offset the reduction in private investment while at the same time making investments in long-lived projects that will reap a benefit after the downturn has passed. Examples of types of infrastructure investments the government may make include roads, bridges, railroads, ports, airports, energy grids, and management of water resources, among others. Infrastructure investment may not be the ideal policy tool to combat a mild recession. The \"bang for the buck\" measure for government investment is usually estimated to be high, but infrastructure projects take a long time to get under way and a longer time to complete. There is a good chance that a recession could be over by the time the stimulus from such investment affects the economy. This does not mean that infrastructure investment is not desirable, and it may be justified based on longer-term growth policies. The United States' recent budget deficits and the country's long-run budget outlook could influence the size of any stimulus package. The FY2018 real (inflation-adjusted) deficit equaled 3.8% of gross domestic product (GDP), which was higher than the average federal deficit since FY1969 (2.9% of GDP). Real deficits are projected to increase over the next 10 years. In its latest economic forecast, the Congressional Budget Office (CBO) projected that U.S. debt held by the public would also increase over the next 10 years, from 77.8% of GDP in FY2018 to 92.7% of GDP in FY2029. Large and persistent budget deficits can hamper economic growth by lowering the rate of capital formation via reduced national saving, and can potentially offset short-term economic stimulus. At the same time, high levels of debt relative to GDP can constrain a country's borrowing capacity. There are no signs that federal borrowing capacity will be exhausted in the short term. However, Congress may consider the consequences of exhausted fiscal space in designing the next potential stimulus package since it would increase both deficits and the debt. ", "summary": "Although the United States is currently experiencing its longest economic expansion, history has shown that economic expansions inevitably give way to economic slowdowns. If the next slowdown is significant, the economy could enter a recession, which is typically characterized by falling output and rising unemployment. Short-term forecasts are predicting continued economic expansion, but predicting when the economy may transition from expansion to recession is notoriously difficult, as the ebb and flow of the economy is determined by many different factors, including a number that lie outside the country's borders. This report identifies and summarizes options Congress may consider in response to a possible recession. Recognizing that the economy has the potential to return to full employment without intervention, one policy option is simply to allow the economy to correct on its own with the support of certain \"automatic stabilizers\" already in place. Automatic stabilizers work without congressional action to lower taxes and increase spending as the economy weakens. Examples include the progressive structure of the income tax system and Unemployment Compensation (UC) benefits, among others. Congress also has a range of other options it could consider when designing a stimulus package should a recession occur and automatic stabilizers are not sufficient to counteract it. The options presented in this report are drawn from the Congressional Budget Office (CBO) and Moody's Analytics, both of which estimated the impact of specific policies or approaches in response to the Great Recession. While a general approach to stimulating a weakened economy with reduced taxes and increased spending is often advocated, specific policies have different impacts on the economy and differing administrative complexities. CBO's and Moody's estimates provide insight into which specific policy options may be most worthwhile to implement during the next downturn. The policy options presentedâor variations of themâare ones commonly considered when designing a fiscal stimulus package and are not unique to either CBO or Moody's. The United States' recent budget deficits and the country's long-run budget outlook could influence the size of any stimulus package. Large and persistent budget deficits can hamper economic growth by lowering the rate of capital formation via reduced national saving, and can potentially offset short-term economic stimulus. At the same time, high levels of debt relative to gross domestic product can constrain a country's borrowing capacity. There are no signs that federal borrowing capacity will be exhausted in the short term. However, the consequences of exhausted fiscal space may be worth considering in designing the next stimulus package since it would increase both deficits and the debt.", "document_type": "crs"}
{"report": "The Higher Education Act of 1965 (HEA; P.L. 89-329, as amended) authorizes the operation of three federal s tudent loan programs: the William D. Ford Federal Direct Loan (Direct Loan) program, the Federal Family Education Loan (FFEL) program, and the Federal Perkins Loan program. While new loans are authorized to be made only through the Direct Loan program, FFEL and Perkins Loan program loans remain outstanding and borrowers of such loans remain responsible for repaying them. As of December 31, 2019, $1.5 trillion in these loans, borrowed by or on behalf of 42.8 million individuals, remained outstanding. Direct Loan program loans are owned by the U.S. Department of Education (ED). As of December 31, 2019, approximately 35.3 million borrowers owed about $1.3 trillion in Direct Loan debt. FFEL program loans may be held by private lenders, guaranty agencies, or ED. As of December 31, 2019, approximately 11.8 million borrowers owed about $257.2 billion in FFEL program debt. Of that, approximately $87.7 billion was held by ED, representing between 3.3 million and 6 million borrowers, and $169.3 billion was held by private lenders or guaranty agencies, representing debt for between 6.0 million and 7.2 million borrowers. Perkins Loan program loans may be held by institutions of higher education (IHEs) that made the loans or by ED. As of December 31, 2019, about 1.9 million borrowers owed approximately $5.9 billion in Perkins Loans. In response to the current coronavirus disease 2019 (COVID-19) pandemic, numerous questions have arisen regarding student loan repayment flexibilities and debt relief that may be available to individuals to alleviate potential financial effects related to COVID-19. The HEA generally authorizes several options for qualifying individuals. Recent administrative and congressional action, including the enactment of the Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ), provide additional student loan relief measures. This report provides an overview of student loan repayment flexibilities and debt relief provisions that may be available to borrowers facing financial difficulties resulting from the pandemic. It first lists some pre-existing loan terms and conditions (authorized through statute and regulations) that may be available to individuals. It then discusses specific administrative and congressional actions taken to address student loan debt in the context of COVID-19. The report concludes with a brief description of additional existing authorities that could be utilized to address other aspects of student loan relief. Several loan terms and conditions that offer forms of repayment relief to borrowers were authorized in statute and regulations prior to the onset of the COVID-19 pandemic. These include periods of deferment and forbearance, which offer borrowers temporary relief from the obligation to make monthly payments; and the availability of income-driven repayment (IDR) plans (e.g., income-based repayment, Pay As You Earn [PAYE]), which afford borrowers the opportunity to make payments in amounts that are capped at a specified share or proportion of their discretionary income, for a maximum repayment period of 20 or 25 years. A deferment is a temporary period during which a borrower's obligation to make regular monthly payments of principal or interest is suspended, and during which an interest subsidy (i.e., interest does not accrue) may be provided. Where an interest subsidy is not provided, unpaid interest that has accrued on a borrower's loan during a deferment is capitalized (i.e., added to the principal) at the expiration of the deferment period. Periods of deferment do not count toward the 120 monthly payments required to qualify for Public Service Loan Forgiveness (PSLF), and most are not included in a borrower's repayment period (e.g., periods of unemployment deferment do not count toward the maximum repayment periods of 20 or 25 years under the IDR plans). In most instances, a borrower must proactively apply for and request a deferment. A deferment may be granted for a variety of reasons. Unemployment deferment and economic hardship deferment (described below) may be especially relevant to individuals facing financial difficulties due to COVID-19. These types of deferment are available to borrowers of loans made under the Direct Loan, FFEL, and Perkins Loan programs. A borrower who is seeking to obtain full-time employment and is either not employed or employed less than full-time may be granted an unemployment deferment . To be eligible, a borrower must either be receiving unemployment benefits or document that he or she has registered with a public or private employment agency (if one is available within 50 miles) and is diligently seeking to obtain full-time employment. The deferment may be granted for an initial six-month period, and may be extended in six-month increments. A borrower may receive the deferment for a maximum cumulative period of three years, which may include one or more episodes of unemployment. During an unemployment deferment, an interest subsidy is provided on Direct Subsidized Loans, the subsidized component of Direct Consolidation Loans, FFEL Stafford (Subsidized) Loans, the subsidized component of FFEL Consolidation Loans, and Perkins Loans. A borrower may qualify for a deferment during periods while he or she is experiencing an economic hardship. To qualify, a borrower must be (1) receiving payments under a federal or state public assistance program (e.g., Temporary Assistance for Needy Families [TANF], Supplemental Security Income [SSI], Supplemental Nutrition Assistance Program [SNAP], state general public assistance, other means-tested benefits), or (2) working full-time and have a monthly income that does not exceed an amount equal to 150% of the poverty line applicable to the borrower's family size, as calculated on a monthly basis. The deferment may be granted for periods of up to one year at a time, and may be extended up to a cumulative maximum of three years. Periods of up to three years while a borrower qualifies for an economic hardship deferment may be counted as part of the repayment period for each of the IDR plans. During an economic hardship deferment, an interest subsidy is provided on Direct Subsidized Loans, the subsidized component of Direct Consolidation Loans, FFEL Stafford Loans, the subsidized component of FFEL Consolidation Loans, and Perkins Loans. Forbearance constitutes permission for a borrower to temporarily cease making monthly payments, to make payments in reduced amounts, or to make payments over an extended period of time. During periods of forbearance, no interest subsidies are provided (i.e., interest continues to accrue) and borrowers ultimately remain responsible for paying all of the interest that accrues on their loans. Borrowers may pay the interest as it accrues during forbearance. At the end of the forbearance period, any unpaid accrued interest is capitalized into the principal balance of Direct Loan program and FFEL program loans; it is not capitalized (but remains due) for Perkins Loan program loans. Periods of forbearance do not count toward the 120 monthly payments required to qualify for PSLF, and are not included in a borrower's repayment period (e.g., periods of student loan debt burden forbearance do not count toward the maximum repayment periods of 20 or 25 years under the IDR plans). Generally, borrowers must apply for forbearance. General forbearance and student loan debt burden forbearance (described below) may be especially relevant to individuals facing financial difficulties due to COVID-19. These types of forbearance are available to borrowers of loans made under the Direct Loan, FFEL, and Perkins Loan programs. A borrower may request a general forbearance (sometimes referred to as a discretionary forbearance) on the basis of experiencing a temporary hardship due to financial difficulties, a change in employment, medical expenses, or other reasons. General forbearance may be granted for an initial period of up to 12 months, renewed upon the borrower's request, and limited to a maximum of 36 months. At the end of the forbearance period, any unpaid interest that accrued during the period is capitalized. A borrower may receive a forbearance on the basis of having a federal student loan debt burden that equals or exceeds 20% of his or her total monthly taxable income. To qualify, a borrower must demonstrate that his or her required monthly payments on HEA Title IV federal student loans (e.g., loans made under the Direct Loan, FFEL, or Perkins Loan programs) equal or exceed that amount. Student loan debt burden forbearance may be granted for an initial period of up to 12 months, may be renewed upon the borrower's request, and is limited to a maximum of 36 months. IDR plans afford borrowers the opportunity to make payments in amounts that are capped at a specified share or proportion of their discretionary income over a repayment period not to exceed 20 to 25 years, depending on the plan. At the end of the repayment period, the remaining balance of an individual's loans is forgiven. Under these plans, it is possible for a borrower's monthly payment to equal $0. There are several IDR plans currently available to borrowers: the Income-Contingent Repayment (ICR) plan, the Income-Based Repayment (IBR) plans (one version of which is available to individuals who qualify as a new borrower on or after July 1, 2014; and another which is available to individuals who do not qualify as a new borrower as of that date), the Pay As You Earn (PAYE) repayment plan, and the Revised Pay As You Earn (REPAYE) repayment plan. In general, Direct Loan borrowers (other than Parent PLUS Loan borrowers) are eligible for any of these plans. FFEL program borrowers (other than Parent PLUS loan borrowers) are only eligible for the IBR plans. Perkins Loan borrowers are not eligible for any IDR plan. Individuals must apply to repay their loans according to an IDR plan. In addition, they must annually provide documentation of their income and family size to remain eligible for IDR repayment. Borrowers may update their income and family size at any time if either changes. Upon submission of such information, a borrower's monthly payment amount will be recalculated accordingly. Recently, ED and Congress have taken steps to provide additional forms of relief to federal student loan borrowers. This includes cancelling Direct Loans for payment periods during which qualifying individuals withdrew from their course of study due to COVID-19, waiving Direct Subsidized Loan limitations for students affected by COVID-19, temporarily setting interest rates to 0% on qualifying loans, expanding the instances under which a forbearance may be available to borrowers of qualifying loans, and temporarily ceasing collections on qualifying defaulted loans. Under the HEA, a Direct Loan borrower may be required to return or repay all or part of the Direct Loans borrowed if the student does not complete a payment or enrollment period at an IHE for which the loan was received. Required procedures for such returns or repayments vary depending on whether a student did not begin attendance at an IHE or whether he or she withdrew. If a student does not begin attendance at an IHE in a payment or enrollment period, Title IV funds (including Direct Loan funds) must be returned to ED by the IHE and/or the student according the regulatory provisions. For Direct Loan amounts required to be returned by the student, the IHE must immediately notify ED (or its loan servicers) when it becomes aware that the student will not begin or has not begun attendance. Loan servicers then issue a final demand letter to the borrower. The demand letter requires the borrower to repay any loan principal and accrued interest within 30 days from the date the letter is mailed. If the borrower fails to comply with the demand letter, he or she is considered in default on the loan. In March 2020, ED issued guidance to IHEs specifying some flexibilities that may be used to address the return of Direct Loans by recipients who did not begin attendance at an IHE due to COVID-19. ED stated that if a student was unable to begin attendance due to a COVID-19-related school closure, the IHE is not required to notify the loan servicer of the student's failure to begin attendance. By waiving this requirement, loan servicers would not issue demand letters, and borrowers would be able to repay any loans according to the terms of the promissory note, including receiving a six-month grace period prior to the start of repayment. HEA Section 484B specifies that when a Title IV aid recipient withdraws from an IHE before the end of the payment or enrollment period for which funds were disbursed, Title IV funds (including any Direct Loans received) must be returned to ED by the IHE and/or aid recipient according to statutorily prescribed rules (this is often referred to as Return of Title IV Aid). If an aid recipient is required to return any portion of a Direct Loan, he or she repays it in accordance with the terms of the loan. The CARES Act authorizes several waivers with respect to Return of Title IV Aid procedures. Specific to Direct Loan borrowers, the act requires ED to cancel a borrower's obligation to repay the entire portion of a Direct Loan associated with a payment period during which the student withdraws from an IHE as a result of a qualifying emergency . Since July 1, 2013, a student who is a first-time borrower may only borrow Direct Subsidized Loans for a period that may not exceed 150% of the published length of the academic program in which he or she is currently enrolled (e.g., six years for enrollment in a four-year bachelor's degree program). This is referred to as the Direct Subsidized Loan maximum eligibility period. If a Direct Subsidized Loan borrower subject to this provision remains enrolled beyond the applicable maximum eligibility period, he or she will lose the interest subsidy and will become responsible for paying the interest that accrues on his or her Direct Subsidized Loans after the date that the maximum eligibility period is exceeded. The CARES Act specifies that ED shall exclude from the maximum eligibility period any semester (or equivalent) that the student does not complete due to a qualifying emergency, if ED is \"able to administer such policy in a manner that limits complexity and the burden on the student.\" In general, borrowers of Direct Loan, FFEL, and Perkins Loan program loans are required to make payments on the loans during a repayment period. The repayment period for Direct Subsidized Loans, Direct Unsubsidized Loans, FFEL Stafford Loans, FFEL Unsubsidized Loans, and Perkins Loans begins after a grace period. The grace period begins after the borrower ceases to be enrolled in an eligible postsecondary program on at least a half-time basis (enrollment on at least a half-time basis is often referred to as in-school status for federal student loan purposes). The repayment period for Direct PLUS Loans (to graduate students and to parents of dependent undergraduate students), Direct Consolidation Loans, FFEL PLUS Loans, and FFEL Consolidation Loans is required to begin when the loan is fully disbursed. However, borrowers of these loans, along with borrowers of Direct Subsidized Loans, Direct Unsubsidized Loans, FFEL Stafford Loans, FFEL Unsubsidized Loans, and Perkins Loans, may qualify for a deferment on the basis of their in-school status (or the in-school status of the student on whose behalf a PLUS Loan was made to a parent borrower), during which time they are not required to make payments on their loans but interest may accrue. A borrower qualifies for such an in-school deferment if he or she, or the student on whose behalf a PLUS Loan is made, is enrolled on at least a half-time basis. ED has announced some flexibilities for borrowers of Direct Loan and FFEL program loans whose loan status was in-school on the date the student's attendance at an IHE was interrupted due to COVID-19. The loan status of such borrowers will continue to be reported as in-school until the IHE determines that the student has withdrawn from it. ED has permitted IHEs to defer reporting a student's withdrawn status if the IHE has a reasonable expectation that it will reopen at the start of a payment period that begins no later than 90 days following its COVID-19-related closure and that the student will resume attendance when the IHE reopens. ED guidance does not address Perkins Loans. Interest is charged on loans made under the Direct Loan, FFEL, and Perkins Loan programs. Typically, under a limited set of circumstances the federal government subsidizes some or all of the interest that would otherwise accrue on certain Direct Subsidized Loans, FFEL Stafford Loans, and Perkins Loans. For March 13, 2020, through September 30, 2020, the Administration has set interest rates on federally held student loans (e.g., all Direct Loan program loans, and FFEL and Perkins Loan program loans held by ED) to 0%. The CARES Act specifies that during this time interest will not accrue. This means borrowers will not be responsible for paying interest on their ED-held loans for this period. This will permit borrowers to enter into a period of deferment or forbearance without concern for whether interest would accrue and capitalize. Borrowers who continue making payments on their loans during this time of 0% interest will not have decreased monthly payments. They will have the full amount of the payments applied toward loan principal. Borrowers who are eligible for this benefit need not apply for it; ED will automatically adjust their accounts to reflect the 0% interest. In addition, ED has authorized FFEL program lenders and institutions that hold Perkins Loans to provide the same 0% interest rate on these nonfederally held loans on a voluntary basis. Borrowers who are ineligible for the 0% interest rate benefit because their FFEL program loan holder or Perkins Loan program IHE is not providing it may take advantage of the 0% interest period by consolidating such loans into a Direct Consolidation Loan, which is eligible for the 0% interest rate. This 0% interest rate, coupled with the various options for temporary cessation of payments (e.g., forbearance, deferment) discussed throughout this report, means that qualifying borrowers may temporarily cease payments on their loans without interest accruing or being subject to capitalization when they begin to make payments again at a later point in time. In addition to the pre-existing deferment and forbearance options available to borrowers, ED and Congress have recently taken further steps to enable borrowers to temporarily cease making payments on their qualifying loans. For March 13, 2020, through September 30, 2020, federally held student loans (e.g., all Direct Loan program loans, and FFEL and Perkins Loan program loans held by ED) will be placed in an administrative forbearance. During this time, borrowers will not be required to make payments due on their loans. Borrowers who are eligible for this benefit need not apply for it; ED will automatically suspend payments. In implementing these provisions, ED has indicated that borrowers may opt out of this special administrative forbearance by contacting their loan servicer. In addition, any payments made on a borrower's account between March 13, 2020, and September 30, 2020, can be refunded to the borrower. A borrower must contact his or her loan servicer to request a refund. ED has also authorized FFEL program lenders and institutions that hold Perkins Loans to provide this special administrative forbearance to borrowers on a voluntary basis. Borrowers who are ineligible for this benefit because their FFEL program loan holder or Perkins Loan program IHE is not providing it may take advantage of the benefit by consolidating such loans into a Direct Consolidation Loan. Generally, periods of forbearance do not count toward the 120 monthly payments required to qualify for PSLF, and are not included in a borrower's repayment period (e.g., periods of unemployment deferment do not count toward the maximum repayment periods of 20 or 25 years under the IDR plans). However, the CARES Act specified that ED \"shall consider each month for which a loan payment was suspended\" under this special administrative forbearance \"as if the borrower of the loan had made a payment for the purpose of any loan forgiveness program or loan rehabilitation program.\" Thus, for Direct Loan borrowers (the only borrowers eligible for PSLF) this special administrative forbearance will count toward the 120 monthly payments required to qualify for PSLF if the borrower was in a qualifying repayment plan prior to the payment suspension and also works full-time in qualifying employment during the suspension. For borrowers of federally held loans, the suspended payments will also count toward the 20- and 25-year repayment periods under the IDR plans, and toward the nine voluntary payments within 10 consecutive months required for individuals to rehabilitate their defaulted loans. It is unclear whether suspended payments on nonfederally held FFEL program loans whose lender has authorized this special administrative forbearance would count toward the 20- and 25-year repayment periods under applicable IDR plans. Perkins Loans, regardless of whether they are held by ED or an IHE, are ineligible for IDR plans. In addition, ED recently authorized institutions that hold Perkins Loans to grant a forbearance to borrowers who are in repayment and are unable to make payments due to COVID-19. Under this forbearance, interest would continue to accrue. The initial forbearance period may not exceed three months, but it may be extended upon a borrower providing supporting documentation. Borrowers must request the forbearance from the IHE. This period of forbearance counts toward the three-year maximum limit on the number of years of forbearance that may be granted to a Perkins Loan borrower. Defaulting on a federal student loan can result in a number of adverse consequences for a borrower. Upon default, the borrower's obligation to repay the loan is accelerated (i.e., the entire unpaid balance of principal and interest becomes due in full). In addition, the borrower loses eligibility for certain borrower benefits (e.g., deferment, loan forgiveness), as well as eligibility to receive additional Title IV federal student aid. A defaulted borrower may have his or her student loan account transferred to an ED-contracted private collection agency (PCA) that will contact the borrower and offer him or her options for voluntary debt resolution, such as loan rehabilitation, consolidation out of default, or entry into a voluntary repayment agreement. If such voluntary debt resolution attempts do not succeed, involuntary collection practices may be utilized, which include administrative wage garnishment; offset of federal income tax returns, Social Security benefits, and certain other federal benefits; and civil litigation. For March 13, 2020, through September 30, 2020, ED will halt the above-described involuntary debt collection practices, and ED-contracted PCAs will stop proactive collection activities (i.e., stop making collection calls and sending letters or billing statements to defaulted borrowers) for all federally held student loans (e.g., all Direct Loan program loans, and FFEL and Perkins Loan program loans held by ED). However, borrowers may contact PCAs to continue repayment arrangements they had made prior to implementation of this policy or to consolidate their loans out of default. Borrowers of federally held loans whose federal tax refund or Social Security benefits were in the process of being withheld on or after March 13, 2020, and before September 30, 2020, will have any offset portion returned to them. Borrowers whose wages were garnished between March 13, 2020, and September 30, 2020, will have their wages refunded. In addition, ED has authorized institutions to stop collection activities on defaulted Perkins Loans that they hold through September 30, 2020, upon notification from a borrower, a member of the borrower's family, or another reliable source that the borrower has been affected by COVID-19. To regain Title IV student aid eligibility, a defaulted federal student loan borrower must make six on-time, voluntary monthly payments on a defaulted loan. In addition, loan rehabilitation offers defaulted borrowers an opportunity to have their loan(s) reinstated as active and to have other borrower benefits and privileges restored. To rehabilitate a loan, Direct Loan, FFEL, or Perkins Loan program borrowers must make nine on-time payments according to generally applicable procedures. Alternatively, a borrower may use the proceeds of a new Direct Consolidation Loan to pay off one or more defaulted Direct Loan, FFEL, and Perkins Loan program loans. To become eligible to do so, a borrower must make three consecutive, on-time, full monthly payments on a defaulted loan. ED has stated that for specified periods, if a borrower of a defaulted Direct Loan, FFEL, or Perkins Loan program loan fails to make any of the consecutive monthly payments required to re-establish eligibility for Title IV federal student aid, to rehabilitate such defaulted loans, or to consolidate such defaulted loans out of default, the borrower shall not be considered to have missed any of those payments. Information about a borrower's federal student loans is reported to nationwide consumer reporting agencies on a regular basis. Information reported includes items such as loan amount and repayment status (e.g., whether a borrower is current on making payments). The CARES Act specifies that through September 30, 2020, ED shall ensure that any payment that has been suspended under the special administrative forbearance described above shall be reported to a consumer reporting agency as if it were a regularly scheduled payment made by the borrower. The Teacher Loan Forgiveness program provides loan forgiveness benefits to borrowers of qualifying Direct Loan and FFEL program loans. To qualify for benefits, a borrower must serve as a full-time teacher for at least five consecutive complete academic years in a qualifying school or public education service agency that serves children from low-income families. The CARES Act specifies that ED shall waive the requirement that years of qualifying teaching service be consecutive if an individual's service was temporarily interrupted due to a qualifying emergency, and after such temporary disruption the borrower resumes teaching and ultimately completes a total of five years of qualifying service. Qualifying service may include service performed before, during, and after the qualifying emergency. In addition to the above-described administrative and congressional actions that have been taken in response to COVID-19, further flexibility and authority is provided through the Higher Education Relief Opportunities for Students Act (HEROES Act). The HEROES Act can only be implemented, however, in connection with a war or other military action or a national emergency declared by the President. The HEROES Act provides the Secretary with authority to waive or modify statutory and regulatory requirements that apply to the HEA Title IV student aid programs in an effort to help affected individuals. There are three categories of affected individuals: 1. those who are serving on active duty or performing qualifying National Guard duty during a war or other military operation or national emergency; 2. those who reside or are employed in an area that is declared a disaster area by any federal, state, or local official in connection with a national emergency; and 3. those who suffered direct economic hardship as a direct result of a war or other military operation or national emergency. Examples of support that may be available to student loan borrowers under the HEROES Act include the following: For borrowers of loans made under the Direct Loan, FFEL, and Perkins Loan programs who are in the 1 st or 2 nd categories of affected individuals, the initial grace period excludes any period, not to exceed three years, during which a borrower is an affected individual. Borrowers of loans made under the Direct Loan, FFEL, and Perkins Loan programs who were in an \"in-school\" status but left school because they became a 1 st or 2 nd category affected individual may retain their in-school status for up to three years. During this period, the Secretary will pay any interest that accrues on a FFEL Stafford Loan. Borrowers of loans made under the Direct Loan, FFEL, and Perkins Loan programs who were in an \"in-school\" deferment or a graduate fellowship deferment but left school because they became a 1 st or 2 nd category affected individual may retain their deferment for a period of up to three years during which they are affected. During this period, the Secretary will pay any interest that accrues on a FFEL Stafford Loan. For borrowers of Perkins Loans who are in the 1 st or 2 nd categories of affected individuals, any forbearance granted on the basis of their status as an affected individual is excluded from the usual three-year limit on forbearance. Also, for these categories of affected individuals, borrowers of Perkins Loans may be granted forbearance based on an oral request and without written documentation for a one-year period and an additional three-month transition period. Borrowers of FFEL program loans who are in the 1 st or 2 nd categories of affected individuals may be granted forbearance based on an oral request and without written documentation for a one-year period and an additional three-month transition period. For borrowers that may qualify for Teacher Loan Forgiveness (Direct Loan and FFEL program borrowers) or Perkins Loan Cancellation (Perkins Loan program borrowers) on the basis of continuous or uninterrupted qualifying service, such service will not be considered interrupted by any period during which they are in the 1 st or 2 nd categories of affected individuals or during a three-month transition period. For borrowers who defaulted on Direct Loan, FFEL, or Perkins Loan program loans and are seeking to rehabilitate their loans by making nine on-time payments according to generally applicable procedures, any payments missed during periods when they are in the 1 st or 2 nd categories of affected individuals or during a three-month transition period shall not be considered an interruption in the series of payments required for loan rehabilitation. For borrowers who defaulted on Direct Loan, FFEL, or Perkins Loan program loans and are seeking to reestablish eligibility for Title IV federal student aid by making six consecutive on-time payments, any payments missed during periods when they are in the 1 st or 2 nd categories of affected individuals or during a three-month transition period shall not be considered an interruption in the series of payments required for purposes of reestablishing Title IV eligibility. For borrowers who defaulted on Direct Loan or FFEL program loans and are seeking to consolidate loans out of default, any payments missed during the period when they are in the 1 st or 2 nd category of affected individuals or during a three-month transition period shall not be considered an interruption in the series of payments required for purposes of reestablishing Title IV aid eligibility. Borrowers who are repaying their Direct Loan or FFEL program loans according to an IDR plan and because of their status as 1 st or 2 nd category affected individuals are unable to provide information normally required annually to document their income and family size may maintain their current payment amount for a period of up to three years, including a three-month transition period. This flexibility is made in lieu of having their payment amount adjusted to be based on a standard 10-year repayment plan or an alternative repayment plan, as applicable.", "summary": "The Higher Education Act of 1965 (HEA; P.L. 89-329, as amended) authorizes the operation of three federal student loan programs: the William D. Ford Federal Direct Loan (Direct Loan) program, the Federal Family Education Loan (FFEL) program, and the Federal Perkins Loan program. As of December 31, 2019, $1.5 trillion in such loans, borrowed by or on behalf of 42.8 million individuals, remained outstanding. In response to the current coronavirus disease 2019 (COVID-19) pandemic, numerous questions have arisen regarding student loan repayment flexibilities and debt relief that may be available to individuals to alleviate potential financial effects related to COVID-19. The HEA authorizes several flexibilities that may be relevant to individuals facing financial difficulties resulting from COVID-19. These include the following: Loan deferment and forbearance options offer a borrower temporary relief from the obligation to make monthly payments. In certain instances, interest does not accrue during deferment periods; although interest does accrue during forbearance periods. Periods of deferment or forbearance do not count toward the 120 monthly payments required to qualify for Public Service Loan Forgiveness (PSLF), nor do they count toward the 20- or 25-year repayment periods under the income-driven repayment plans. Income-driven repayment (IDR) plans afford borrowers the opportunity to make payments in amounts that are capped at a specified share or proportion of their discretionary income over a repayment period not to exceed 20 or 25 years, depending on the plan. At the end of the repayment period, the remaining balance of an individual's loans is forgiven. Recent administrative and congressional actions, including the enactment of the Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ), provide additional student loan relief measures: Interest rates on federally held student loans are being set to 0% from March 13, 2020, through September 30, 2020. Federally held student loans are being placed in a special administrative forbearance for March 13, 2020, through September 30, 2020. During this time, borrowers will not be required to make payments due on their loans. This special administrative forbearance will count toward the 120 monthly payments required to qualify for PSLF, the 20- and 25-year repayment periods under the IDR plans, and the nine voluntary payments required for individuals to rehabilitate their defaulted loans. Debt collections activities, including involuntary collection activities such as wage garnishment and offset of certain federal benefits (e.g., federal income tax return benefits, Social Security benefits) are being suspended on federally held student loans for March 13, 2020, through September 30, 2020.", "document_type": "crs"}
{"report": "By late February and early March 2020, the global outbreak of Coronavirus Disease 2019 (COVID-19), a viral respiratory illness caused by a novel coronavirus, had entered a new phase, with community spread occurring in many countries and several U.S. states. Concerns grew over the potential for the disease to spread widely, leading to increased hospitalizations and deaths. On March 6, 2020, Congress and the President enacted the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), to provide emergency supplemental appropriations to prevent, prepare for, and respond to the coronavirus outbreak. This report provides an overview of appropriations in Division A and relevant policies and requirements pursuant to the supplemental. Funding in Division A is designated as being provided as an emergency requirement. For the purposes of the supplemental, the term \"coronavirus\" refers to SARS-CoV-2, the virus that causes COVID-2019, or another coronavirus with pandemic potential. For an overview of congressional reporting requirements in the act, see CRS Insight IN11236, Oversight Provisions in H.R. 6074, the Coronavirus Preparedness and Response Supplemental Appropriations Act , by Ben Wilhelm. Prior to the enactment of P.L. 116-123 , domestic health coronavirus preparedness and response activities were primarily supported by the U.S. Department of Health and Human Services (HHS) using certain existing funding streams and transfer authorities. For instance, on January 25, 2020, the HHS Secretary determined that COVID-19 response activities would be supported by an allotment of $105 million from existing balances in the Infectious Disease Rapid Response Reserve Fund (IDRRRF; see the \" Centers for Disease Control and Prevention (CDC) \" section of this report). In addition, on February 2, 2020, HHS reportedly notified Congress of its intention to transfer up to $136 million to COVID-19 response efforts from other existing HHS accounts. On February 24, 2020, the Administration asked Congress for emergency supplemental appropriations of $1.25 billion for the HHS Public Health and Social Services Emergency Fund (PHSSEF) to support COVID-19 response efforts. The Administration's request included a number of other proposals, mostly related to repurposing existing funds from across the government, including HHS funds for current Ebola response activities. All told, the Administration estimated needing to allocate about $2.5 billion toward COVID-19 repose efforts. The supplemental appropriations bill, H.R. 6074 , was introduced and passed in the House on March 4, 2020; passed in the Senate on March 5, 2020; and signed into law ( P.L. 116-123 ) by the President on March 6, 2020. Division A of P.L. 116-123 provides a total of $7.767 billion in supplemental appropriations to aid in the U.S. and global coronavirus preparedness and response. This total includes $6.497 billion for the HHS (including contingent amounts), $20 million for the Small Business Administration, and $1.250 billion for foreign operations activities provided across several agencies and funding mechanisms. The funding is largely intended to aid in the domestic public health response to the outbreak, with limited amounts available for global health, diplomatic programs, and domestic and international economic assistance activities. Division B, which addresses telehealth services, is covered in CRS Report R46239, Telehealth and Telemedicine: Frequently Asked Questions . Table 1 displays funds appropriated in Division A. The table is organized by each federal department or agency, with funds further broken down by account, program, or activity. The text below the table is organized in the same order and includes more detailed information on the purposes and specified uses of these funds. Titles I and III of P.L. 116-123 provide a total of about $6.5 billion in appropriations to the Department of Health Human Services (HHS) for health emergency response activities related to COVID-19. The funds in these titles are provided to \"prevent, prepare for, and respond to coronavirus, domestically or internationally.\" Funds largely support domestic activities, but certain accounts have available funding for HHS global health activities. (For information on additional international funding, see the \" Foreign Operations \" section of this report.) Title I provides $61 million to FDA for domestic and international efforts \"to prevent, prepare for, and respond to coronavirus\" to be used for activities such as development of medical countermeasures (e.g., therapeutics, vaccines, and diagnostics), advanced manufacturing for medical products, monitoring of medical product supply chains, and related administrative activities. Title III makes $2.2 billion available to CDC for domestic and international preparedness and response activities, including the following: Not less than $950 million is for grants or cooperative agreements to \"States, localities, territories, tribes, tribal organizations, urban Indian health organizations, or health service providers.\" (The bill calls for HHS to allocate at least half of these funds within 30 days of enactment.) The funds are for core public health functions, including surveillance, laboratory capacity, infection control, and other activities. Per the bill, each grantee that received a Public Health Emergency Preparedness (PHEP) grant for FY2019 shall receive 90% of that amount (totaling $561 million). In addition, not less than $40 million shall be allocated to tribes and tribal organizations. The bill requires certain grantees receiving these funds to submit a spend plan to the CDC not later than 45 days after the date of enactment. Several days after enactment, on March 11, 2020, CDC announced almost $600 million in awards to state and local PHEP grantees, additional funding to the cities of Houston and Philadelphia, and $750,000 to the Cherokee Nation, for a total of $605 million. On March 20, HHS announced that the CDC was preparing to provide an additional $80 million in funding to tribes, tribal organizations, and urban Indian organizations for response activities. In total, the $81 million to tribes and tribal organizations exceeds the required allocation in the supplemental. Based on these initial reports, CRS estimates that, as of the date of this report, about $265 million remains to be used at the CDC Director's discretion to target funds for certain jurisdictions or organizations, research, public health activities, and administrative functions. Not less than $300 million is for global disease detection and emergency response. $300 million shall be transferred to the CDC Infectious Disease Rapid Response Reserve Fund (IDRRRF). Amounts in the IDRRRF may be used to prevent, prepare for, and respond to an infectious disease emergency, as authorized by several titles of the Public Health Service Act, and may be transferred by the CDC Director between CDC, the National Institutes of Health (NIH), and the Public Health and Social Services Emergency Fund (PHSSEF) accounts. Funds may be used for domestic and global activities. In addition to the activities detailed above, the supplemental specifies that the funds appropriated to the CDC may be used for grants for the construction, alteration, or renovation of nonfederally owned facilities to improve preparedness and response capability at the state and local level. Title III makes $836 million available to the National Institute of Allergy and Infectious Diseases (NIAID) at NIH. These funds are for preparedness and response to COVID-19. NIAID supports scientific research on COVID-19 and other coronaviruses, as well as product development for medical countermeasures (e.g., vaccines) that could be used to curb the spread of the virus and/or to lessen its health impact. The bill specifies that of the total provided to NIAID, not less than $10 million is to be transferred to National Institute of Environmental Health Sciences (NIEHS) for worker-based training to prevent and reduce exposure of hospital employees, emergency first responders, and other workers who are at risk of exposure to coronavirus through their work duties. NIEHS is the primary NIH institute for environmental health research. The Public Health and Social Services Emergency Fund is an account used in appropriations acts to provide the HHS Secretary with one-time or emergency funding, as well as annual funding for the office of the HHS Assistance Secretary for Preparedness and Response (ASPR). Title III of P.L. 116-123 makes $3.1 billion available to the PHSSEF for domestic and international coronavirus preparedness and response. PHSSEF funds may support a variety of activities, including product development and manufacturing for medical countermeasures (vaccines, diagnostics, and therapeutics) prioritizing platform-based technologies with U.S.-based manufacturing capabilities; the development of manufacturing platforms for such products; the purchase of medical countermeasures and medical supplies; the expansion of medical surge capacity; grants to improve nonfederally owned facilities to improve preparedness and response capabilities at the state and local level; and grants to improve nonfederally owned facilities for the production of medical countermeasures. Title III also states that the HHS Secretary may take actions authorized under current law to ensure that products developed with provided funding will be affordable in the commercial market; however, the Secretary cannot take actions that delay the development of such products. The bill specifies that, out of the $3.1 billion: $100 million is to be transferred to the Health Resources and Services Administration (HRSA) Bureau of Primary Health Care for grants under the Health Centers Program. Up to $2 million is to be transferred to, and merged with, funding for the HHS Office of Inspector General for the oversight of the activities supported with funds appropriated to HHS in titles I and III. An unspecified amount may be transferred to, and merged with, the Covered Countermeasure Process Fund. This fund may compensate eligible individuals who suffer injuries as a result of a medical countermeasure administered or used under a declaration of the Public Readiness and Emergency Preparedness Act (PREP Act). In addition to the $3.1 billion appropriation to the PHSSEF, the supplemental provides another $300 million in PHSSEF appropriations that are contingent upon future actions by HHS. The contingent funds may be used to purchase medical products (e.g., vaccines, therapeutics, and diagnostics). However, in order for the additional $300 million to become available, HHS must certify to the House and Senate Appropriations Committees that (1) funds from the initial $3.1 billion that had been allotted for purchase of such products will be obligated imminently and (2) the additional funds are necessary to purchase vaccines, therapeutics, or diagnostics in quantities that will adequately address the public health need. Title III contains a number of general and other provisions that provide further guidance or additional requirements associated with the supplemental funds. For example, these provisions give HHS certain hiring and contract flexibilities. In addition, they authorize HHS to use funds to restore certain prior obligations, and they establish certain expectations with respect to spend plans, transfers, and reporting and notifications to Congress. Title III includes general provisions authorizing HHS to use amounts appropriated in this title to restore certain obligations incurred by HHS prior to the date of enactment for activities related to coronavirus preparedness and response. In some cases, HHS is required to reverse these actions. Specifically, HHS is directed to restore any amounts that had been transferred or reprogrammed for these purposes pursuant to a notice to appropriations committees on February 2, 2020. Title III general provisions also specify that funds for certain grant awards or cooperative agreements to states, localities, and other entities are to include amounts to reimburse those entities for costs incurred for relevant public health and other preparedness and response activities between January 20, 2020, and the date of enactment. Titles III includes the following reporting and notification requirements for HHS, generally, and for specific HHS agencies: Spend Plan: HHS must provide a spend plan to the House and Senate Appropriations Committees not later than 30 days after the date of enactment. The spend plan must address anticipated uses of all funds made available to HHS in the supplemental. The spend plan must be updated and submitted to these committees every 60 days until September 30, 2024, and must include a list of each contract obligation in excess of $5 million that has not previously been reported. Transfer Authority: HHS must notify the House and Senate Appropriations Committees 10 days in advance of a transfer made between CDC, NIH, and PHSSEF accounts. HHS may transfer nearly all amounts appropriated in Title III to these specified agencies and accounts, provided the transfers are made to prevent, prepare for, and respond to coronavirus, domestically or internationally. Contracting: HHS must notify the House and Senate Appropriations Committees prior to using funding provided under Title III to enter into contracts with individuals for the provision of personal services to support coronavirus preparedness and response. Infectious Disease Rapid Response Reserve Fund (IDRRRF): The HHS Secretary, in consultation with the CDC Director, shall provide a report to the House and Senate Appropriations Committees every 14 days for a full year after the Secretary has made certain determinations with respect to the IDRRRF. Specifically, these reports must be made if the Secretary, pursuant to Section 231 of P.L. 115-245 , has made IDRRRF funds available (1) after declaring a Public Health Emergency or (2) determining that an infectious disease emergency has significant potential to imminently occur and to affect national security or the health and security of U.S. citizens. In the case of the COVID-19 outbreak, the HHS Secretary issued a determination allowing for the allotment of funds from the IDRRRF on January 25, 2020. The Secretary subsequently declared COVID-19 to be a Public Health Emergency Public Emergency effective January 27, 2020. The report to the appropriations committees must detail IDRRRF commitment and obligation information in excess of $5 million and upon request of the committees. Title II of P.L. 116-123 provides the Small Business Administration (SBA) with $20 million until expended for administrative expenses to carry out the SBA Disaster Loan Program. Title II also deems the coronavirus outbreak a disaster under Section 7(b)(2)(D) of the Small Business Act. Prior to the amendment, some questioned whether the coronavirus outbreak would meet the Small Business Act's legal definition of a disaster. The amendment addresses this question and clarifies that SBA Economic Injury Disaster Loans (EIDL) can be made available. Title II does not provide additional funding to the SBA for disaster loans, including SBA EIDL. Instead, SBA EIDL loan funding in response to the coronavirus outbreak (as well as SBA disaster loan funding for other incidents) is to be funded by roughly $1.2 billion in disaster loan credit subsidy, which includes just over $1.1 billion in disaster loan credit subsidy carried over from previous years. This is possible because the Disaster Loan Account is a \"no-year\" account. No-year funding does not lapse at the end of the fiscal year. Rather, it is carried over to the next fiscal year. A summary of the supplemental released by the House Appropriations Committee noted that the SBA is expected to make $1 billion in credit subsidy available to support the cost of anticipated defaults and related expenses of about $7 billion in EIDL loans. Still, the $1.2 billion in loan subsidy may be of concern to some if EIDL assistance in response to the outbreak becomes significant, if there is an uptick in 2020 disasters, or both. Consequently, Congress could consider providing additional supplemental funding through another appropriations package. In addition, though the coronavirus outbreak is now considered by the SBA to be a disaster, SBA EIDL is not being made automatically available to businesses. Instead, EIDL must be requested by the state or territory governor by requesting one of the following types of declarations: (1) a major disaster declaration under the under the Robert T. Stafford Disaster Relief and Emergency Assistance Act ( P.L. 93-288 , as amended); (2) an SBA EIDL declaration under the Small Business Act (P.L. 83-163); (3) an SBA EIDL declaration under the Small Business Act based on the determination of a natural disaster by the Secretary of Agriculture; or (4) an SBA EIDL declaration based on the determination of the Secretary of Commerce that a fishery resource disaster has occurred. Title IV of P.L. 116-123 provides a total of $1.25 billion for Department of State, Foreign Operations, and Related Programs (SFOPS) appropriations accounts, $264 million of which is to be managed by the Department of State and $971 million of which is to be managed by the U.S. Agency for International Development (USAID). Title IV designates $264 million for the Department of State's Diplomatic Programs account, which is the department's principal operating account. Generally, the account provides for human resources functions, overseas programs, security programs, and diplomatic policy and support. P.L. 116-123 indicates that the emergency funds for Diplomatic Programs are meant to support consular operations, reimburse evacuation expenses, and bolster emergency preparedness measures. The act specified the provision of $971 million across a number of bilateral assistance appropriations accounts. These include the following: Office of Inspector General. $1 million to USAID's Office of Inspector General to support oversight of COVID-19-related programming. Global Health Programs. $435 million to the Global Health Programs (GHP) account, with which USAID intends to prioritize the following interventions in developing countries affected by and at-risk of COVID-19: screening at points of entry and exit; the purchase of key health commodities (e.g., diagnostics, personal protective equipment, and disinfectants); the prevention and control of infections in critical health facilities; readiness to identify, diagnose, manage, and treat cases rapidly; the identification and follow-up of contacts; awareness-raising in populations through risk-communication and community-engagement; the implementation of health measures for travelers; logistics and supply-chain management; global and regional coordination; and country-level readiness and response. According to USAID, the \"funding will help address the threat of COVID-19 in the following high-priority countries:Â The Islamic Republic of Afghanistan; the Republics of Angola, Indonesia, Iraq, Kazakhstan, Kenya, South Africa, Tajikistan, The Philippines, Turkmenistan, Uzbekistan, Zambia, and Zimbabwe; the People's Republic of Bangladesh; Burma; the Kingdom of Cambodia; the Federal Democratic Republic of Ethiopia; the Kyrgyz Republic; the Lao People's Democratic Republic; Mongolia; the Federal Republic of Nepal; the Federal Republic of Nigeria; the Islamic Republic of Pakistan; the Kingdom of Thailand; and the Socialist Republic of Vietnam.\" The supplemental specifies that, out of the total appropriated to the GHP account, $200 million is to be transferred into USAID's Emergency Reserve Fund (ERF) to support coronavirus-related programs, including pandemic prevention, preparedness, and control. The ERF was established under the GHP account within final FY2017 appropriations ( P.L. 115-31 ) \"to enable the United States and the international public health community to respond rapidly to emerging health threats.\" International Disaster Assistance. $300 million for coronavirus response efforts through the International Disaster Assistance (IDA) account. Broadly, the account is used for relief and recovery efforts in the wake of disastersâboth natural and human-induced. Economic Support Fund. $250 million in emergency funds for addressing coronavirus-related \"economic, security, and stabilization requirements\" through the Economic Support Fund (ESF). The ESF account supports myriad objectives, ranging from more traditional development activities to those that advance U.S. political and strategic goals. In the general provisions of Title IV of P.L. 116-123 , Congress primarily offers guidance and requirements on transfer authorities, the Administration's strategy for fighting COVID-19 on an international scale, and the intervals in which Congress requires reporting. Transfer Authorities. The act provides broad transfer authorities across GHP, IDA, and ESF, in an effort to grant flexibility to USAID in its COVID-19 response. However, five days prior to transferring funds, the Secretary of State or USAID Administrator must notify the House and Senate Appropriations Committees of the transfer's details. Strategy. The act requires the Secretary of State and USAID Administrator to issue a joint strategy to \"prevent, prepare for, and respond to coronavirus abroad\" within 15 days of the supplemental's enactment. Reporting. In addition to regular reporting requirements for each appropriations account, the act includes a provision that requires additional reporting for the supplemental funds. The act requires the Secretary of State and USAID Administrator to jointly submit to the House and Senate Appropriations Committees a report detailing the use of the supplemental funds within 30 days of enactment. Following submission of the report, it is required to be updated every 60 days until September 30, 2022, and then every 180 days after that until all funds have been expended. This reporting structure is relatively consistent with other SFOPS supplemental appropriations measures that have been enacted in the past decade. Use of Funds to Restore Prior Obligations. The act specifies that supplemental funds appropriated to certain accounts (Diplomatic Programs, GHP, IDA, and ESF) may be used to reimburse accounts administered by the Department of State and the USAID for obligations incurred prior to enactment for activities to prevent, prepare for, and respond to coronavirus. (Certain limitations are placed on use of these funds for certain obligations previously incurred by ESF.) ", "summary": "In the early months of 2020, the federal government began to express concern over the global outbreak of Coronavirus Disease 2019 (COVID-19). COVID-19 is a viral respiratory illness caused by a novel coronavirus. By late January, the Secretary of the U.S. Department of Health and Human Services (HHS) had invoked certain authorities to direct existing funds to respond to the COVID-19 outbreak. The HHS Secretary declared COVID-19 to be a Public Health Emergency, effective January 27, 2020. On February 24, 2020, the Trump Administration submitted an initial emergency supplemental appropriations request to Congress. The Administration requested $1.25 billion in new funds for the HHS Public Health and Social Services Emergency Fund (PHSSEF) to support COVID-19 response efforts. The request included a number of other proposals, mostly related to repurposing existing funds from across the government toward response activities. All told, the Administration estimated needing to allocate about $2.5 billion toward COVID-19 response efforts. On March 4, 2020, the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( H.R. 6074 ), was introduced in the House. The bill was passed by the House (415-2) on March 4 and by the Senate (96-1) on March 5. The bill was signed into law ( P.L. 116-123 ) on March 6. This supplemental appropriations act is the first such act to be enacted in the aftermath of the COVID-19 outbreak. Any subsequent such actions are beyond the scope of the report. According to the Congressional Budget Office (CBO), Division A of P.L. 116-123 provides roughly $7.8 billion in discretionary supplemental appropriations. (CBO estimates that provisions in Division B will cost roughly $490 million, but those provisions are not the focus of this report.) The funds in Division A of P.L. 116-123 are primarily intended to prevent, prepare for, and respond to the coronavirus. (For purposes of the bill, the term coronavirus refers to SARS-CoV-2, the virus that causes COVID-2019, or another coronavirus with pandemic potential.) The majority of the funds in Division A are appropriated to HHS agencies and accounts. In total, the bill appropriates $6.5 billion to HHS, representing 84% of all funds in the bill. In general, these funds are for health emergency prevention, preparedness, and response activities related to COVID-19. Funds largely support domestic activities, but certain accounts include funds that may be allocated for global health activities. The HHS funds are distributed as follows: The PHSSEF receives almost half of all funds in Division A, with appropriations totaling $3.4 billion when including $300 million in appropriations that are contingent upon future actions by HHS. PHSSEF funds are provided for the development of countermeasures and vaccines, as well as for the purchase of vaccines, therapeutics, diagnostics, necessary medical supplies, medical surge capacity, and administrative activities. The Centers for Disease Control and Prevention (CDC) receives the next-largest share of all funds in the supplemental: $2.8 billion, accounting for more than a quarter of all funds in Division A. In general, these funds are intended to support core public health functions, including surveillance, laboratory capacity, infection control, and other activities. The funds are also for global disease detection and emergency response, as well as for activities carried out using the Infectious Diseases Rapid Response Reserve Fund (IDRRRF). Remaining HHS funds are appropriated to the Food and Drug Administration ($61 million) and the National Institutes of Health ($836 million). In addition to amounts appropriated to HHS, the supplemental provides $20 million in administrative funds for the Disaster Loans Program Account within the Small Business Administration (SBA). The supplemental also includes provisions clarifying that SBA disaster loans and economic injury disaster loans may be made in response to COVID-19. Finally, the supplemental provides nearly $1.3 billion (about 16% of all funds in Division A) to support foreign operations activities across several agencies and funding mechanisms. This includes funding to help the Department of State maintain consular operations, reimburse for evacuation expenses, and support emergency preparedness. Additional funds are provided for global health, international disaster assistance, economic support, and certain oversight activities.", "document_type": "crs"}
{"report": "R ecently, the Federal Bureau of Investigation (FBI) announced that it would only accept mailed Freedom of Information Act (FOIA) requests and not those submitted electronically due to the COVID-19 pandemic. Conversely, the Centers for Disease Control and Prevention (CDC) has adopted a contrasting policy, saying that CDC would not be able to respond to mailed FOIA requests and that requests should be placed electronically. These examples of differing policies, among others examples not mentioned, when combined with agencies' adoption of additional telework flexibilities , raise questions about how agencies will be responding to FOIA requests in the near future. This report provides an overview of the FOIA request process and actual and potential FOIA request processing changes within federal government agencies as a result of COVID-19. FOIA does not require requests for agency information to be submitted in a particular format, only that the request reasonably describes the records sought and complies with agency regulations. Most agencies accept requests via mail, email, web form, or fax. The statute also requires the affirmative disclosure of certain categories of agency information, such as \"substantive rules of general applicability,\" \"rules of procedure,\" and, since 2016, records requested three or more times. While the text of FOIA does not specifically dictate the method in which the public must request information from an agency, FOIA does prescribe how an agency is to respond to the request. From an administrative perspective, FOIA directs the amount of time an agency has to respond to a request, defines whether and how an agency may recoup costs for providing services in response to a request, and provides nine instances where an agency may exempt information from public disclosure. After an agency receives a request, the agency is to inform the requester of its receipt. Generally, an agency is to respond to a correctly routed, simple request within 20 days with a determination of the scope of the documents the agency will produce and any exemptions it will apply to withhold records or information. Complex or incorrectly routed requests may be subject to additional days of processing, per the statute (5 U.S.C. Â§552(a)(6)). Also, agencies managing backlog s of FOIA requests do not always process requests within the statutory period. When completed, a written response may provide the information requested or some of the information requested with redactions per one of FOIA's nine exemptions, inform the requester that the agency does not have responsive records, or deny a request entirely due to one of the nine exemptions. Requesters may administratively appeal an agency's adverse decision. Government information requests through FOIA may be impacted by COVID-19 in two ways: (1) certain types of information related to the outbreak may be eligible for expedited consideration; and (2) processes for locating information may change due to employees working remotely or on administrative leave. Pursuant to 5 U.S.C. Â§552(a)(6)(E), processing of FOIA requests is to be expedited as soon as practicable in cases in which the person requesting the records demonstrates a compelling need. Statute defines a \"compelling need\" as a case where the lack of expedited treatment could reasonably be expected to pose an imminent threat to someone's life or physical safety; or there is an urgency to inform the public about an actual or alleged federal government activity, but only if the request is made by a person who is primarily engaged in disseminating information. Agencies may also establish additional standards for granting expedited processing. Whereas agencies are to initially respond to most FOIA requests within 20 days, they must determine whether to grant expedited processing within 10 days. Locating information responsive to a FOIA request requires employees and systems to search and review the information . Additionally, not all agency information is created or available in a digital format. Per the Department of Justice's FOIA.gov portal, There is no central office in the government that handles FOIA requests for all federal departments and agencies.... There are many different officials at these agencies who work hard every day to make sure that the FOIA works. There are the FOIA professionals who search for and process records in response to FOIA requests, FOIA Contacts and FOIA Public Liaisons who work with FOIA requesters to answer questions and resolve concerns, and Chief FOIA Officers who oversee their agency's compliance with the FOIA. Because of the decentralized FOIA process at federal agencies, multiple physical and digital systems and many people may be involved in processing a single request. However, given the work flexibilities at many agencies due to COVID-19, some or all of the members of an agency's FOIA team may currently be working offsite. If a record responsive to a request is only available on-site in a paper format, that record's practical availability may be limited by these conditions. While challenges in locating responsive information may occur at any agency, responses to requests for information during the COVID-19 outbreak have varied. CRS performed a search of federal department websites and their components. As of March 26, 2020, CRS identified statements by 13 agencies regarding COVID-19's impact on FOIA request processing. Table 1 presents these recent statements regarding the impact of COVID-19 or simply changes in agencies' abilities to process FOIA requests, provides Code of Federal Regulations (C.F.R.) citations to each agency's policy regarding expedited FOIA requests, and notes whether the agency has made additional allowances for expediting requests. The table should be considered a snapshot in time, as agencies may update or change their statements. Of the 13 agencies identified, 8 altered the transmission method by which a FOIA request should be submitted. Some statements also discuss current operating status, and mention anticipated delays due to COVID-19. Six of the identified agencies have additional allowances for expediting requests: U.S. Air Force, Department of Housing and Urban Development, Department of Labor, Department of Veterans Affairs, National Archives and Records Administration, and Office of Government Information Services. Of the six agencies that established additional allowances for expediting requests, five permit expediting cases where due process rights would be impacted, four permit expediting cases where there exist possible questions affecting public confidence in the federal government's integrity, one permits expediting due to humanitarian needs, and one permits expediting at the discretion of the agency's FOIA Officer. The exact language from the C.F.R. is provided in Table 1 below.", "summary": "As federal agencies adjust their operations in light of the COVID-19 pandemic, activities related to the processing and release of government information are also changing. Agencies such as the Federal Bureau of Investigation within the Department of Justice, the U.S. Postal Service, and the Centers for Disease Control and Prevention within the Department of Health and Human Services, among others, have announced changes to their processing of Freedom of Information Act (FOIA) requests due to the pandemic. Government information requests through FOIA may be impacted by COVID-19 in two ways. First, certain types of information related to the outbreak may be eligible for expedited consideration; FOIA requests are to be expedited as soon as practicable in cases in which the person requesting the records demonstrates a compelling need. Second, processes for locating information may change due to employees working remotely or on administrative leave. This In Brief report provides an overview of the typical FOIA request process and usual conditions for requesting expedited processing of a request. The report then provides analysis of the impact of agency procedures in response to the pandemic on government information availability, and concludes with a survey of announced agency processing alterations.", "document_type": "crs"}
{"report": "The mission of HHS is to \"enhance the health and well-being of Americans by providing for effective health and human services and by fostering sound, sustained advances in the sciences underlying medicine, public health, and social services.\" HHS is currently organized into 11 main agencies, called \"operating divisions\" (listed below), which are responsible for administering a wide variety of health and human services programs, and conducting related research. In addition, HHS has a number of \"staff divisions\" within the Office of the Secretary (OS). These staff divisions fulfill a broad array of management, research, oversight, and emergency preparedness functions in support of the entire department. HHS Operating Divisions Eight of the HHS operating divisions are part of the U.S. Public Health Service (PHS). PHS agencies have diverse missions in support of public health, including the provision of health care services and supports (e.g., IHS, HRSA, SAMHSA); the advancement of health care quality and medical research (e.g., AHRQ, NIH); the prevention and control of disease, injury, and environmental health hazards (e.g., CDC, ATSDR); and the regulation of food and drugs (e.g., FDA). The three remaining HHS operating divisionsâACF, ACL, and CMSâare not PHS agencies. ACF and ACL largely administer human services programs focused on the well-being of vulnerable children, families, older Americans, and individuals with disabilities. CMSâwhich accounts for the largest share of the HHS budget by farâis responsible for administering Medicare, Medicaid, and the State Children's Health Insurance Program (CHIP), in addition to some aspects of the private health insuranceÂ market. (For a summary of each operating division's mission and links to agency resources related to the FY2020 budget request, see the Appendix .) The initial President's budget request for FY2020 was submitted to Congress on March 11, 2019, about five weeks after the statutory deadline. (Additional components of the FY2020 request were released in subsequent weeks.) The delay in the budget submission was attributable, in part, to protracted negotiations over seven of the FY2019 annual appropriations acts, which resulted in a five-week partial government shutdown. (Five of the 12 annual appropriations acts had already received full-year appropriations for FY2019 when the shutdown commenced.) At HHS, the FY2019 shutdown primarily affected FDA, IHS, and ATSDR. The remaining HHS operating and staff divisions generally had already received full-year FY2019 funding prior to the start of the fiscal year (Division B of P.L. 115-245 ). Full-year appropriations for FDA, IHS, and ATSDR were ultimately enacted on February 15, 2019, almost five months after the start of the fiscal year ( P.L. 116-6 ). In light of this delay, the source of the FY2019 numbers contained in the FY2020 President's budget materials varies by HHS agency. In the case of FDA, IHS, and ATSDR, amounts shown for FY2019 were estimated based on annualized funding levels under the FY2019 continuing resolution (Division C of P.L. 115-245 , as amended), not final full-year enacted levels. By contrast, amounts shown for the remaining HHS agencies generally reflect enacted full-year appropriations provided in Division B of P.L. 115-245 . Under the President's budget request, HHS would spend an estimated $1.286 trillion in outlays in FY2020 (see Table 1 ). This is $56 billion (+5%) more than estimated HHS spending in FY2019 and about $166 billion (+15%) more than actual HHS spending in FY2018. Historical estimates by the Office of Management and Budget (OMB) indicate that HHS has accounted for at least 20% of all federal outlays in each year since FY1995. Most recently, OMB estimated that HHS accounted for 27% of all federal outlays in FY2018. Figure 1 displays proposed FY2020 HHS outlays by major program or spending category in the President's request. As this figure shows, mandatory spending typically accounts for the vast majority of the HHS budget. In fact, two programsâMedicare and Medicaidâare expected to account for 86% of all estimated HHS spending in FY2020. Medicare and Medicaid are \"entitlement\" programs, meaning the federal government is required to make mandatory payments to individuals, states, or other entities based on criteria established in authorizing law. This figure also shows that discretionary spending accounts for about 8% of estimated FY2020 HHS outlays in the President's request. Although discretionary spending represents a relatively small share of total HHS spending, the department nevertheless receives more discretionary money than most federal departments. According to OMB data, HHS accounted for 7% of all discretionary budget authority across the government in FY2018, the same as the Department of Homeland Security. The Department of Defense was the only federal agency to account for a larger share of all discretionary budget authority in that year (47%). Readers should be aware that the HHS budget includes a broader set of budgetary resources than the amounts provided to HHS through the annual appropriations process. As a result, certain amounts shown in FY2020 HHS budget materials (including amounts for prior years) will not match amounts provided to HHS by annual appropriations acts and displayed in accompanying congressional documents. There are several reasons for this: M andatory spending makes up a large portion of the HHS budget, and much of that spending is provided directly by authorizing laws, not through appropriations acts. All discretionary spending is controlled and provided through the annual appropriations process. By contrast, all mandatory spending is controlled by the program's authorizing statute. In most cases, that authorizing statute also provides the funding for the program. However, the budget authority for some mandatory programs (including Medicaid), while controlled by criteria in the authorizing statute, must still be provided through the annual appropriations process; such programs are commonly referred to as \"appropriated entitlements\" or \"appropriated mandatories.\" The HHS budget request takes into account the department as a whole, while the appropriations process divides HHS funding across three different appropriations bills. Most of the discretionary funding for the department is provided through the Departments of Labor, Health and Human Services, and Education, and Related Agencies (LHHS) Appropriations Act. However, funding for certain HHS agencies and activities is appropriated in two other billsâthe Departments of the Interior, Environment, and Related Agencies Appropriations Act (INT) and the Agriculture, Rural Development, Food and Drug Administration, and Related Agencies Appropriations Act (AG). Table 2 lists HHS agencies by appropriations bill. The Administration may choose to follow different conventions than those of congressional scorekeepers for its estimates of HHS programs. For example, certain transfers of funding between HHS agencies (or from HHS to other federal agencies) that occurred in prior fiscal years, or are expected to occur in the current fiscal year, may be accounted for in the Administration's estimates but not necessarily in the congressional documents. HHS budget materials include two different estimates for mandatory spending programs in FY2019 when appropriate: proposed law and current law . Proposed law estimates take into account changes in mandatory spending proposed in the FY2020 HHS budget request. Such proposals would need to be enacted into law to affect the budgetary resources ultimately available to the mandatory spending program. HHS materials may also show a current law or current services estimate for mandatory spending programs. These estimates assume that no changes will be made to existing policies, and instead estimate mandatory spending for programs based on criteria established in current authorizing law. The HHS budget estimates in this report reflect the proposed law estimates for mandatory spending programs, but readers should be aware that other HHS, OMB, or congressional estimates might reflect current law instead. In some cases, agencies within HHS have the authority to expend user fees and other types of collections that effectively supplement their appropriations. In addition, agencies may receive transfers of budgetary resources from other sources, such as from the Public Health Service Evaluation Set-Aside (also referred to as the PHS Tap) or one of the mandatory funds established by the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 , as amended). Budgetary totals that account for these sorts of resources in the Administration estimates are referred to as being at the \"program level.\" HHS agencies that have historically had notable differences between the amounts in the appropriations bills and their program level include FDA (due to user fees) and AHRQ (due to transfers). The program level for each agency is listed in the table entitled \"Composition of the HHS Budget Discretionary Programs\" in the HHS FY2020 Budget in Brief. Figure 2 provides a breakdown of the FY2020 HHS budget request by operating division. When taking into account both mandatory and discretionary budget authority (i.e., total budget authority shown in Figure 2 ), CMS accounts for the largest share of the request (nearly $1.17 trillion). The majority of the CMS budget request would go toward mandatory spending programs, such as Medicare and Medicaid. When looking exclusively at discretionary budget authority, funding for CMS is comparatively smaller, accounting for just $3.6 billion of the HHS discretionary request. The largest share of the discretionary request would go to the PHS agencies (roughly $59.4 billion in combined funding for FDA, HRSA, IHS, CDC, ATSDR, NIH, and SAMHSA; no funds would go to AHRQ under the request ). NIH would receive the largest amount ($33.5 billion) of discretionary budget authority of any HHS operating division, and ACF would receive the second-largest amount ($18.3 billion). Table 3 puts the FY2020 request for each HHS operating division and the Office of the Secretary into context, displaying it along with estimates of funding provided over the three prior fiscal years (FY2017-FY2019). These totals are inclusive of both mandatory and discretionary funding. The amounts in this table are shown in terms of budget authority (BA) and outlays. BA is the authority provided by federal law to enter into contracts or other financial obligations that will result in immediate or future expenditures involving federal government funds. Outlays occur when funds are actually expended from the Treasury; they could be the result of either new budget authority enacted in the current fiscal year or unexpended budget authority that was enacted in previous fiscal years. As a consequence, the BA and outlays in this table represent two different ways of accounting for the funding that is provided to each HHS agency through the federal budget process. For example, Table 3 shows $0 in FY2020 BA for AHRQ because the President's budget proposes to eliminate this agency; however, the table shows an estimated $299 million in FY2020 AHRQ outlays, reflecting the expected expenditure of funds previously provided to the agency. This appendix provides for each operating division a brief summary of its mission, the applicable appropriations bill, the FY2020 budget request level, and links to additional resources related to that request. Food and Drug Administration (FDA) The FDA mission is focused on regulating the safety, efficacy, and security of human foods, dietary supplements, cosmetics, and animal foods; and the safety and effectiveness of human drugs, biological products (e.g., vaccines), medical devices, radiation-emitting products, and animal drugs. It also regulates the manufacture, marketing, and sale of tobacco products. Relevant Appropriations Bill: AG FY2020 Request: BA: $3.329 billion Outlays: $2.837 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 15), https://www.fda.gov/downloads/AboutFDA/ReportsManualsForms/Reports/BudgetReports/UCM633738.pdf . BIB chapter (p. 21), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=25 . Health Resources and Services Administration (HRSA) The HRSA mission is focused on \"improving health care to people who are geographically isolated, economically or medically vulnerable.\" Among its many programs and activities, HRSA supports health care workforce training; the National Health Service Corps; and the federal health centers program, which provides grants to nonprofit entities that provide primary care services to people who experience financial, geographic, cultural, or other barriers to health care. Relevant Appropriations Bill: LHHS FY2020 Request: BA: $11.004 billion Outlays: $11.864 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 16), https://www.hrsa.gov/sites/default/files/hrsa/about/budget/budget-justification-fy2020.pdf . BIB chapter (p. 29), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=33 . Indian Health Service (IHS) The IHS mission is to provide \"a comprehensive health service delivery system for American Indians and Alaska Natives\" and \"raise the physical, mental, social, and spiritual health of American Indians and Alaska Natives to the highest level.\" IHS provides health care for approximately 2.2 million eligible American Indians and Alaska Natives through a system of programs and facilities located on or near Indian reservations, and through contractors in certain urban areas. Relevant Appropriations Bill: INT FY2020 Request: BA: $6.104 billion Outlays: $5.970 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 7), https://www.ihs.gov/sites/budgetformulation/themes/responsive2017/display_objects/documents/FY2020CongressionalJustification.pdf BIB chapter (p. 36), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=40 . Centers for Disease Control and Prevention (CDC) and Agency for Toxic Substances and Disease Registry (ATSDR) The CDC mission is focused on \"disease prevention and control, environmental health, and health promotion and health education.\" CDC is organized into a number of centers, institutes, and offices, some focused on specific public health challenges (e.g., injury prevention) and others focused on general public health capabilities (e.g., surveillance and laboratory services). In addition, the Agency for Toxic Substances and Disease Registry (ATSDR) is headed by the CDC director. For that reason, the ATSDR budget is often shown within CDC. Following the conventions of the FY2020 HHS BIB, ATSDR's budget request is included in the CDC totals shown in this report. ATSDR's work is focused on preventing or mitigating adverse effects resulting from exposure to hazardous substances in the environment. Relevant Appropriations Bills: LHHS (CDC) INT (ATSDR) FY2020 Request (CDC and ATSDR combined): BA: $6.767 billion Outlays: $7.877 billion Additional Resources Related to the FY2020 Request: CDC Congressional Justification (all-purpose table on p. 23), https://www.cdc.gov/budget/documents/fy2020/fy-2020-cdc-congressional-justification.pdf . ATSDR Congressional Justification, https://www.cdc.gov/budget/documents/fy2020/fy-2020-atsdr.pdf . BIB chapter (p. 43), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=47 . National Institutes of Health (NIH) The NIH mission is focused on conducting and supporting research \"in causes, diagnosis, prevention, and cure of human diseases\" and \"in directing programs for the collection, dissemination, and exchange of information in medicine and health.\" NIH is organized into 27 research institutes and centers, headed by the NIH Director. (The FY2020 President's budget assumes that AHRQ's functions will be consolidated within NIH, in the new National Institute for Research on Safety and Quality (NIRSQ). This assumption is reflected in the figures below. ) Relevant Appropriations Bill: LHHS FY2020 Request: BA: $33.669 billion Outlays: $36.652 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 18), available at https://officeofbudget.od.nih.gov/pdfs/FY20/br/Overview-Volume-FY-2020-CJ.pdf . BIB chapter (p. 52), available at https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=56 . Substance Abuse and Mental Health Services Administration (SAMHSA) The SAMHSA mission is focused on reducing the \"impact of substance abuse and mental illness on America's communities.\" SAMHSA coordinates behavioral health surveillance to improve understanding of the impact of substance abuse and mental illness on children, individuals, and families, and the costs associated with treatment. Relevant Appropriations Bill: LHHS FY2020 Request: BA: $5.535 billion Outlays: $5.684 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 8), https://www.samhsa.gov/sites/default/files/samhsa-fy-2020-congressional-justification.pdf . BIB chapter (p. 60), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=64 . Agency for Healthcare Research and Quality (AHRQ) The AHRQ mission is focused on research to make health care \"safer, higher quality, more accessible, equitable, and affordable.\" Specific AHRQ research efforts are aimed at reducing the costs of care, promoting patient safety, measuring the quality of health care, and improving health care services, organization, and financing. The FY2020 President's budget proposes eliminating AHRQ and consolidating certain key AHRQ functions within NIH, in the new National Institute for Research on Safety and Quality (NIRSQ). Relevant Appropriations Bill: LHHS FY2020 Request: BA: $0 Outlays: $0.299 billion Additional Resources Related to the FY2020 Request: Congressional Justification for the proposed National Institute for Research on Safety and Quality, https://www.ahrq.gov/sites/default/files/wysiwyg/cpi/about/mission/budget/2020/FY_2020_CJ_-NIRSQ.pdf . There is no FY2020 BIB chapter for AHRQ. Centers for Medicare & Medicaid Services (CMS) The CMS mission is focused on supporting \"innovative approaches to improve quality, accessibility, and affordability\" of Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private insurance, and on supporting private insurance market reform programs. The President's budget estimates that in FY2020, \"over 145 million Americans will rely on the programs CMS administers including Medicare, Medicaid, the Children's Health Insurance Program (CHIP), and the [Health Insurance] Exchanges.\" Relevant Appropriations Bill: LHHS FY2020 Request: BA: $1,169.091 billion Outlays: $1,156.333 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 9), https://www.cms.gov/About-CMS/Agency-Information/PerformanceBudget/FY2020-CJ-Final.pdf . BIB chapter (p. 65), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=69 . Administration for Children and Families (ACF) The ACF mission is focused on promoting the \"economic and social well-being of children, youth, families, and communities.\" ACF administers a wide array of human services programs, including Temporary Assistance for Needy Families (TANF), Head Start, child care, the Social Services Block Grant (SSBG), and various child welfare programs. Relevant Appropriations Bill: LHHS FY2020 Request: BA: $52.121 billion Outlays: $53.208 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 6), https://www.acf.hhs.gov/sites/default/files/olab/acf_congressional_budget_justification_2020.pdf . BIB chapter (p. 122), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=126 . Administration for Community Living (ACL) The ACL mission is focused on maximizing the \"independence, well-being, and health of older adults, people with disabilities across the lifespan, and their families and caregivers.\" ACL administers a number of programs targeted at older Americans and the disabled, including Home and Community-Based Supportive Services and State Councils on Developmental Disabilities. Relevant Appropriations Bill: LHHS FY2020 Request: BA: $1.997 billion Outlays: $2.238 billion Additional Resources Related to the FY2020 Request: Congressional Justification (all-purpose table on p. 13), https://acl.gov/sites/default/files/about-acl/2019-04/FY2020%20ACL%20CJ%20508.pdf . BIB chapter (p. 136), https://www.hhs.gov/sites/default/files/fy-2020-budget-in-brief.pdf#page=140 .", "summary": "Historically, the U.S. Department of Health and Human Services (HHS) has been one of the larger federal departments in terms of budgetary resources. Estimates by the Office of Management and Budget (OMB) indicate that HHS has accounted for at least 20% of all federal outlays in each year since FY1995. Most recently, HHS is estimated to have accounted for 27% of all federal outlays in FY2018. Final FY2019 appropriations had not been enacted for a few HHS operating divisions and accounts prior to the development of the FY2020 President's budget request. As a result, the FY2019 estimates contained in FY2020 President's budget materials (and this report) are based on annualized amounts provided in the FY2019 continuing resolution for this subset of HHS accounts. The remainder of the HHS estimates for FY2019 are based on enacted full-year appropriations contained in Division B of P.L. 115-245 , along with current services estimates for mandatory spending. Under the FY2020 President's budget request, HHS would spend an estimated $1.286 trillion in outlays in FY2020. This is $56 billion (+5%) more than estimated HHS spending in FY2019 and $166 billion (+15%) more than actual HHS spending in FY2018. Mandatory spending typically comprises the majority of the HHS budget. Two programsâMedicare and Medicaidâare expected to account for 86% of all estimated HHS spending in FY2020, according to the President's budget request. Medicare and Medicaid are \"entitlement\" programs, meaning the federal government is required to make mandatory payments to individuals, states, or other entities based on criteria established in authorizing law. Discretionary spending accounts for about 8% of HHS outlays in the FY2020 President's budget request. Although discretionary spending represents a relatively small share of total HHS spending, the department nevertheless receives more discretionary money than most federal departments. According to OMB data, HHS accounted for 7% of all discretionary budget authority across the government in FY2018. This report provides information about the FY2020 HHS budget request. It begins with a review of the department's mission and structure. Next, the report provides some context for the FY2020 President's budget request. It then discusses the concept of the HHS budget as a whole, in comparison to how funding is provided to HHS through the annual appropriations process. The report continues with a breakdown of the HHS request by operating division. An appendix summarizes the mission of each HHS operating division and identifies additional agency-level resources related to the FY2020 budget request.", "document_type": "crs"}
{"report": "This report provides background information and discusses potential issues for Congress regarding the Navy's FFG(X) program, a program to procure a new class of 20 guided-missile frigates (FFGs). The Navy's proposed FY2020 budget requests $1,281.2 million for the procurement of the first FFG(X). The FFG(X) program presents several potential oversight issues for Congress. Congress's decisions on the program could affect Navy capabilities and funding requirements and the shipbuilding industrial base. This report focuses on the FFG(X) program. A related Navy shipbuilding program, the Littoral Combat Ship (LCS) program, is covered in detail in CRS Report RL33741, Navy Littoral Combat Ship (LCS) Program: Background and Issues for Congress , by Ronald O'Rourke. Other CRS reports discuss the strategic context within which the FFG(X) program and other Navy acquisition programs may be considered. In discussing its force-level goals and 30-year shipbuilding plans, the Navy organizes its surface combatants into large surface combatants (LSCs), meaning the Navy's cruisers and destroyers, and small surface combatants (SSCs), meaning the Navy's frigates, LCSs, mine warfare ships, and patrol craft. SSCs are smaller, less capable in some respects, and individually less expensive to procure, operate, and support than LSCs. SSCs can operate in conjunction with LSCs and other Navy ships, particularly in higher-threat operating environments, or independently, particularly in lower-threat operating environments. In December 2016, the Navy released a goal to achieve and maintain a Navy of 355 ships, including 52 SSCs, of which 32 are to be LCSs and 20 are to be FFG(X)s. Although patrol craft are SSCs, they do not count toward the 52-ship SSC force-level goal, because patrol craft are not considered battle force ships, which are the kind of ships that count toward the quoted size of the Navy and the Navy's force-level goal. At the end of FY2018, the Navy's force of SSCs totaled 27 battle force ships, including 0 frigates, 16 LCSs, and 11 mine warfare ships. Under the Navy's FY2020 30-year (FY2020-FY2049) shipbuilding plan, the SSC force is to grow to 52 ships (34 LCSs and 18 FFG[X]s) in FY2034, reach a peak of 62 ships (30 LCSs, 20 FFG[X]s, and 12 SSCs of a future design) in FY2040, and then decline to 50 ships (20 FFG[X]s and 30 SSCs of a future design) in FY2049. In contrast to cruisers and destroyers, which are designed to operate in higher-threat areas, frigates are generally intended to operate more in lower-threat areas. U.S. Navy frigates perform many of the same peacetime and wartime missions as U.S. Navy cruisers and destroyers, but since frigates are intended to do so in lower-threat areas, they are equipped with fewer weapons, less-capable radars and other systems, and less engineering redundancy and survivability than cruisers and destroyers. The most recent class of frigates operated by the Navy was the Oliver Hazard Perry (FFG-7) class ( Figure 1 ). A total of 51 FFG-7 class ships were procured between FY1973 and FY1984. The ships entered service between 1977 and 1989, and were decommissioned between 1994 and 2015. In their final configuration, FFG-7s were about 455 feet long and had full load displacements of roughly 3,900 tons to 4,100 tons. (By comparison, the Navy's Arleigh Burke [DDG-51] class destroyers are about 510 feet long and have full load displacements of roughly 9,300 tons.) Following their decommissioning, a number of FFG-7 class ships, like certain other decommissioned U.S. Navy ships, have been transferred to the navies of U.S. allied and partner countries. In the program designation FFG(X), FF means frigate, G means guided-missile ship (indicating a ship equipped with an area-defense AAW system), and (X) indicates that the specific design of the ship has not yet been determined. FFG(X) thus means a guided-missile frigate whose specific design has not yet been determined. The Navy wants to procure 20 FFG(X)s, which in combination with the Navy's planned total of 32 LCSs would meet the Navy's 52-ship SSC force-level goal. A total of 35 (rather than 32) LCSs have been procured through FY2019, but Navy officials have stated that the Navy nevertheless wants to procure 20 FFG(X)s. The Navy's 355-ship force-level goal is the result of a Force Structure Analysis (FSA) that the Navy conducted in 2016. The Navy conducts a new or updated FSA every few years, and it is currently conducting a new FSA that is scheduled to be completed by the end of 2019. Navy officials have stated that this new FSA will likely not reduce the required number of small surface combatants, and might increase it. Navy officials have also suggested that the Navy in coming years may shift to a new surface force architecture that will include, among other things, a larger proportion of small surface combatants. Figure 2 shows a Navy briefing slide depicting the potential new surface force architecture, with each sphere representing a manned ship or an unmanned surface vehicle (USV). Consistent with Figure 2 , the Navy's 355-ship goal, reflecting the current force architecture, calls for a Navy with twice as many large surface combatants as small surface combatants. Figure 2 suggests that the potential new surface force architecture could lead to the obverse—a planned force mix that calls for twice as many small surface combatants than large surface combatants—along with a new third tier of numerous USVs. The Navy wants to procure the first FFG(X) in FY2020, the next 18 at a rate of two per year in FY2021-FY2029, and the 20th in FY2030. Under the Navy's FY2020 budget submission, the first FFG(X) is scheduled to be delivered in July 2026, 72 months after the contract award date of July 2020. As mentioned above, the (X) in the program designation FFG(X) means that the design of the ship has not yet been determined. In general, the Navy envisages the FFG(X) as follows: The ship is to be a multimission small surface combatant capable of conducting anti-air warfare (AAW), anti-surface warfare (ASuW), antisubmarine warfare (ASW), and electromagnetic warfare (EMW) operations. Compared to an FF concept that emerged under a February 2014 restructuring of the LCS program, the FFG(X) is to have increased AAW and EMW capability, and enhanced survivability. The ship's area-defense AAW system is to be capable of local area AAW, meaning a form of area-defense AAW that extends to a lesser range than the area-defense AAW that can be provided by the Navy's cruisers and destroyers. The ship is to be capable of operating in both blue water (i.e., mid-ocean) and littoral (i.e., near-shore) areas. The ship is to be capable of operating either independently (when that is appropriate for its assigned mission) or as part of larger Navy formations. Given the above, the FFG(X) design will likely be larger in terms of displacement, more heavily armed, and more expensive to procure than either the LCS or an FF concept that emerged from the February 2014 LCS program restructuring. Figure 3 shows a January 2019 Navy briefing slide summarizing the FFG(X)'s planned capabilities. For additional information on the FFG(X)'s planned capabilities, see the Appendix A . To help maximize the time that each ship spends at sea, the Navy reportedly is considering operating FFG(X)s with dual crews—an approach, commonly called blue-gold crewing, that the Navy uses for operating its ballistic missile submarines and LCSs. The Navy wants the follow-on ships in the FFG(X) program (i.e., ships 2 through 20) to have an average unit procurement cost of $800 million to $950 million each in constant 2018 dollars. The Navy reportedly believes that the ship's cost can be held closer to the $800 million figure. By way of comparison, the Navy estimates the average unit procurement cost of the three LCSs procured in FY2019 at $523.7 million (not including the cost of each ship's embarked mission package), and the average unit procurement cost of the three DDG-51 class destroyers that the Navy has requested for procurement in FY2020 at $1,821.0 million. As shown in Table 2 , the Navy's proposed FY2020 budget requests $1,281.2 million for the procurement of the first FFG(X). The lead ship in the program will be considerably more expensive than the follow-on ships in the program, because the lead ship's procurement cost incorporates most or all of the detailed design/nonrecurring engineering (DD/NRE) costs for the class. (It is a traditional Navy budgeting practice to attach most or all of the DD/NRE costs for a new ship class to the procurement cost of the lead ship in the class.) As shown in Table 2 , the Navy's FY2020 budget submission shows that subsequent ships in the class are estimated by the Navy to cost roughly $900 million each in then-year dollars over the next few years. The Navy's FY2020 budget submission estimates the total procurement cost of 20 FFG(X)s at $20,470.1 million (i.e., about $20.5 billion) in then-year dollars, or an average of about $1,023.5 million each. Since the figure of $20,470.1 million is a then-year dollar figure, it incorporates estimated annual inflation for FFG(X)s to be procured out to FY2030. The Navy's desire to procure the first FFG(X) in FY2020 does not allow enough time to develop a completely new design (i.e., a clean-sheet design) for the FFG(X). (Using a clean-sheet design might defer the procurement of the first ship to about FY2024.) Consequently, the Navy intends to build the FFG(X) to a modified version of an existing ship design—an approach called the parent-design approach. The parent design could be a U.S. ship design or a foreign ship design. Using the parent-design approach can reduce design time, design cost, and cost, schedule, and technical risk in building the ship. The Coast Guard and the Navy are currently using the parent-design approach for the Coast Guard's polar security cutter (i.e., polar icebreaker) program. The parent-design approach has also been used in the past for other Navy and Coast Guard ships, including Navy mine warfare ships and the Coast Guard's new Fast Response Cutters (FRCs). As an additional measure for reducing cost, schedule, and technical risk in the FFG(X) program, the Navy envisages developing no new technologies or systems for the FFG(X)—the ship is to use systems and technologies that already exist or are already being developed for use in other programs. Given the currently envisaged procurement rate of two ships per year, the Navy's baseline plan for the FFG(X) program envisages using a single builder to build the ships. Consistent with U.S. law, the ship is to be built in a U.S. shipyard, even if it is based on a foreign design. Using a foreign design might thus involve cooperation or a teaming arrangement between a U.S. builder and a foreign developer of the parent design. The Navy has not, however, ruled out the option of building the ships at two or three shipyards. At a December 12, 2018, hearing on Navy readiness before two subcommittees (the Seapower subcommittee and the Readiness and Management Support subcommittee, meeting jointly) of the Senate Armed Services Committee, the following exchange occurred: SENATOR ANGUS KING (continuing): Talking about industrial base and acquisition, the frigate, which we're talking about, there are 5 yards competing, there are going to be 20 ships. As I understand it, the intention now is to award all 20 ships to the winner, it's a winner take all among the five. In terms of industrial base and also just spreading the work, getting the—getting the work done faster, talk to me about the possibility of splitting that award between at least two yards if not three. SECRETARY OF THE NAVY RICHARD SPENCER: You bring up an interesting concept. There's two things going on here that need to be weighed out. One, yes, we do have to be attentive to our industrial base and the ability to keep hands busy and trained. Two, one thing we also have to look at, though, is the balancing of the flow of new ships into the fleet because what we want to avoid is a spike because that spike will come down and bite us again when they all go through regular maintenance cycles and every one comes due within two or three years or four years. It gets very crowded. It's not off the table because we've not awarded anything yet, but we will—we will look at how best we can balance with how we get resourced and, if we have the resources to bring expedition, granted, we will do that. As a means of reducing their procurement cost, the Navy envisages using one or more fixed-price block buy contracts to procure the ships. As shown in Table 1 , at least four industry teams are reportedly competing for the FFG(X) program. Two of the teams are reportedly proposing to build their FFG(X) designs at the two shipyards that have been building Littoral Combat Ships (LCSs) for the Navy—Austal USA of Mobile, AL, and Fincantieri/Marinette Marine (F/MM) of Marinette, WI. The other two teams are reportedly proposing to build their FFG(X) designs at General Dynamics/Bath Iron Works (GD/BIW), of Bath, ME, and Huntington Ingalls Industries/Ingalls Shipbuilding (HII/Ingalls) of Pascagoula, MS. As also shown in Table 1 , a fifth industry team that had been interested in the FFG(X) program reportedly informed the Navy on May 23, 2019, that it had decided to not submit a bid for the program. As shown in the table, this fifth industry team, like one of the other four, reportedly had proposed building its FFG(X) design at F/MM. On February 16, 2018, the Navy awarded five FFG(X) conceptual design contracts with a value of $15.0 million each to the leaders of the five industry teams shown in Table 1 . Being a recipient of a conceptual design contract was not a requirement for competing for the subsequent Detailed Design and Construction (DD&C) contract for the program. The Navy plans to announce the outcome of the FFG(X) competition—the winner of the DD&C contract—in July 2020. Table 2 shows funding for the FFG(X) program under the Navy's FY2020 budget submission. One issue for Congress is whether to approve, reject, or modify the Navy's FY2020 funding request for the program. In assessing this question, Congress may consider, among other things, whether the work the Navy is proposing to do in the program in FY2020 is appropriate, and whether the Navy has accurately priced that work. Another issue for Congress is whether the Navy has appropriately defined the cost, capabilities, and growth margin of the FFG(X). One aspect of this issue is whether the Navy has an adequately rigorous analytical basis for its identification of the capability gaps or mission needs to be met by the FFG(X), and for its decision to meet those capability gaps or mission needs through the procurement of a FFG with the capabilities outlined earlier in this CRS report. The question of whether the Navy has an adequately rigorous analytical basis for these things was discussed in greater detail in earlier editions of this CRS report. Another potential aspect of this issue is whether the Navy has arrived at a realistic balance between its desired capabilities for the FFG(X) and the its estimated procurement cost for the ship. An imbalance between these two could lead to an increased risk of cost growth in the program. The Navy could argue that a key aim of the five FFG(X) conceptual design contracts and other preliminary Navy interactions with industry was to help the Navy arrive at a realistic balance by informing the Navy's understanding of potential capability-cost tradeoffs in the FFG(X) design. Another potential aspect of this issue concerns the planned number of Vertical Launch System (VLS) missile tubes on the FFG(X). The VLS is the FFG(X)'s principal (though not only) means of storing and launching missiles. As shown in Figure 3 (see the box in the upper-left corner labeled \"AW,\" meaning air warfare), the FFG(X) is to be equipped with 32 Mark 41 VLS tubes. (The Mark 41 is the Navy's standard VLS design.) Supporters of requiring the FFG(X) to be equipped with a larger number of VLS tubes, such as 48, might argue that the FFG(X) is to be roughly half as expensive to procure as the DDG-51 destroyer, and might therefore be more appropriately equipped with 48 VLS tubes, which is one-half the number on recent DDG-51s. They might also argue that in a context of renewed great power competition with potential adversaries such as China, which is steadily improving its naval capabilities, it might be prudent to equip the FFG(X)s with 48 rather than 32 VLS tubes, and that doing so might only marginally increase the unit procurement cost of the FFG(X). Supporters of requiring the FFG(X) to have no more than 32 VLS tubes might argue that the analyses indicating a need for 32 already took improving adversary capabilities (as well as other U.S. Navy capabilities) into account. They might also argue that the FFG(X), in addition to having 32 VLS tubes, is also to have a separate, 21-cell Rolling Airframe Missile (RAM) missile launcher (see again the \"AW\" box in the upper-left corner of Figure 3 ), and that increasing the number of VLS tubes from 32 to 48 would increase the procurement cost of a ship that is intended to be an affordable supplement to the Navy's cruisers and destroyers. Potential oversight questions for Congress might be: What would be the estimated increase in unit procurement cost of the FFG(X) of increasing the number of VLS tubes from 32 to 48? What would be the estimated increase in unit procurement cost of equipping the FFG(X) with 32 VLS tubes but designing the ship so that the number could easily be increased to 48 at some point later in the ship's life? Another potential aspect of this issue is whether, beyond the specific question of the number of VLS tubes, the Navy more generally has chosen the appropriate amount of growth margin to incorporate into the FFG(X) design. As shown in the Appendix A , the Navy wants the FFG(X) design to have a growth margin (also called service life allowance) of 5%, meaning an ability to accommodate upgrades and other changes that might be made to the ship's design over the course of its service life that could require up to 5% more space, weight, electrical power, or equipment cooling capacity. As shown in the Appendix A , the Navy also wants the FFG(X) design to have an additional growth margin (above the 5% factor) for accommodating a future directed energy system (i.e., a laser or high-power microwave device) or an active electronic attack system (i.e., electronic warfare system). Supporters could argue that a 5% growth margin is traditional for a ship like a frigate, that the FFG(X)'s 5% growth margin is supplemented by the additional growth margin for a directed energy system or active electronic attack system, and that requiring a larger growth margin could make the FFG(X) design larger and more expensive to procure. Skeptics might argue that a larger growth margin (such as 10%—a figure used in designing cruisers and destroyers) would provide more of a hedge against the possibility of greater-than-anticipated improvements in the capabilities of potential adversaries such as China, that a limited growth margin was a concern in the FFG-7 design, and that increasing the FFG(X) growth margin from 5% to 10% would have only a limited impact on the FFG(X)'s procurement cost. A potential oversight question for Congress might be: What would be the estimated increase in unit procurement cost of the FFG(X) of increasing the ship's growth margin from 5% to 10%? Another potential oversight issue for Congress concerns the parent-design approach for the program. One alternative would be to use a clean-sheet design approach, under which procurement of the FFG(X) would begin about FY2024 and procurement of LCSs might be extended through about 2023. As mentioned earlier, using the parent-design approach can reduce design time, design cost, and technical, schedule, and cost risk in building the ship. A clean-sheet design approach, on the other hand, might result in a design that more closely matches the Navy's desired capabilities for the FFG(X), which might make the design more cost-effective for the Navy over the long run. It might also provide more work for the U.S. ship design and engineering industrial base. Another possible alternative would be to consider frigate designs that have been developed, but for which there are not yet any completed ships. This approach might make possible consideration of designs, such as (to cite just one possible example) the UK's new Type 26 frigate design, production of which was in its early stages in 2018. Compared to a clean-sheet design approach, using a developed-but-not-yet-built design would offer a reduction in design time and cost, but might not offer as much reduction in technical, schedule, and cost risk in building the ship as would be offered by use of an already-built design. Another potential oversight issue for Congress concerns cost, schedule, and technical risk in the FFG(X) program. The Navy can argue that the program's cost, schedule, and technical risk has been reduced by use of the parent-design approach and the decision to use only systems and technologies that already exist or are already being developed for use in other programs, rather than new technologies that need to be developed. Skeptics, while acknowledging that point, might argue that lead ships in Navy shipbuilding programs inherently pose cost, schedule, and technical risk, because they serve as the prototypes for their programs, and that, as detailed by CBO and GAO, lead ships in Navy shipbuilding programs in many cases have turned out to be more expensive to build than the Navy had estimated. A May 2019 report from the Government Accountability Office (GAO) on the status of various Department of Defense (DOD) acquisition programs states the following about the FFG(X) program: Current Status The FFG(X) program continues conceptual design work ahead of planned award of a lead ship detail design and construction contract in September 2020. In May 2017, the Navy revised its plans for a new frigate derived from minor modifications of an LCS design. The current plan is to select a design and shipbuilder through full and open competition to provide a more lethal and survivable small surface combatant. As stated in the FFG(X) acquisition strategy, the Navy awarded conceptual design contracts in February 2018 for development of five designs based on ships already demonstrated at sea. The tailoring plan indicates the program will minimize technology development by relying on government-furnished equipment from other programs or known-contractor-furnished equipment. In November 2018, the program received approval to tailor its acquisition documentation to support development start in February 2020. This included waivers for several requirements, such as an analysis of alternatives and an affordability analysis for the total program life cycle. FFG(X) also received approval to tailor reviews to validate system specifications and the release of the request for proposals for the detail design and construction contract…. Program Office Comments We provided a draft of this assessment to the program office for review and comment. The program office did not have any comments. Another potential issue for Congress is whether any additional LCSs should be procured in FY2020 as a hedge against potential delays in the FFG(X) program. Supporters might argue that, as detailed by GAO, lead ships in Navy shipbuilding programs in many cases encounter schedule delays, some quite lengthy, and that procuring additional LCSs in FY2020 could hedge against that risk at reasonable cost by taking advantage of hot LCS production lines. Skeptics might argue that the Navy does not have a requirement for any additional LCSs, and that funding the procurement of additional LCSs in FY2020 could reduce FY2020 funding available for other Navy or DOD programs, with an uncertain impact on net Navy or DOD capabilities. Another issue for Congress concerns the potential industrial-base impacts of the FFG(X) for shipyards and supplier firms. One aspect of this issue concerns the potential impact on shipyards of the Navy's plan to shift procurement of small surface combatants from LCSs to FFG(X)s starting in FY2020, particularly in terms of future workloads and employment levels at the two LCS shipyards, if one or both of these yards are not involved in building FFG(X)s. If a design proposed for construction at one of the LCS shipyards is chosen as the winner of the FFG(X) competition, then other things held equal (e.g., without the addition of new work other than building LCSs), workloads and employment levels at the other LCS shipyard (the one not chosen for the FFG(X) program), as well as supplier firms associated with that other LCS shipyard, would decline over time as the other LCS shipyard's backlog of prior-year-funded LCSs is completed and not replaced with new FFG(X) work. If no design proposed for construction at an LCS shipyard is chosen as the FFG(X)—that is, if the winner of the FFG(X) competition is a design to be built at a shipyard other than the two LCS shipyards—then other things held equal, employment levels at both LCS shipyards and their supplier firms would decline over time as their backlogs of prior-year-funded LCSs are completed and not replaced with FFG(X) work. As mentioned earlier, the Navy's current baseline plan for the FFG(X) program is to build FFG(X)s at a single shipyard. One possible alternative to this baseline plan would be to build FFG(X)s at two or three shipyards, including one or both of the LCS shipyards. This alternative is discussed further in the section below entitled \" Number of FFG(X) Builders .\" Another possible alternative would be would be to shift Navy shipbuilding work at one of the LCS yards (if the other wins the FFG(X) competition) or at both of the LCS yards (if neither wins the FFG(X) competition) to the production of sections of larger Navy ships (such as DDG-51 destroyers or amphibious ships) that undergo final assembly at other shipyards. Under this option, in other words, one or both of the LCS yards would function as shipyards participating in the production of larger Navy ships that undergo final assembly at other shipyards. This option might help maintain workloads and employment levels at one or both of the LCS yards, and might alleviate capacity constraints at other shipyards, permitting certain parts of the Navy's 355-ship force-level objective to be achieved sooner. The concept of shipyards producing sections of larger naval ships that undergo final assembly in other shipyards was examined at length in a 2011 RAND report. Another aspect of the industrial-base issue concerns the FFG(X) program's potential impact on supplier firms (i.e., firms that provide materials and components that are incorporated into ships). Some supporters of U.S. supplier firms argue that the FFG(X) program as currently structured does not include strong enough provisions for requiring certain FFG(X) components to be U.S.-made, particularly since two of the five industry teams reported to be competing for the FFG(X) program (see the earlier section entitled \" Competing Industry Teams \") are reportedly using European frigate designs as their proposed parent design. For example, the American Shipbuilding Suppliers Association (ASSA)—a trade association for U.S. ship supplier firms—states: The US Navy has historically selected US manufactured components for its major surface combatants and designated them as class standard equipment to be procured either as government-furnished equipment (GFE) or contractor-furnished equipment (CFE). In a major departure from that policy, the Navy has imposed no such requirement for the FFG(X), the Navy's premier small surface combatant. The acquisition plan for FFG(X) requires proposed offerings to be based on an in-service parent craft design. Foreign designs and/or foreign-manufactured components are being considered, with foreign companies performing a key role in selecting these components. Without congressional direction, there is a high likelihood that critical HM&E components on the FFG(X) will not be manufactured within the US shipbuilding industrial supplier base.…. The Navy's requirements are very clear regarding the combat system, radar, C4I suite, EW [electronic warfare], weapons, and numerous other war-fighting elements. However, unlike all major surface combatants currently in the fleet (CGs [cruisers], DDGs [destroyers]), the [Navy's] draft RFP [Request for Proposals] for the FFG(X) does not identify specific major HM&E components such as propulsion systems, machinery controls, power generation and other systems that are critical to the ship's operations and mission execution. Instead, the draft RFP relegates these decisions to shipyard primes or their foreign-owned partners, and there is no requirement for sourcing these components within the US shipbuilding supplier industrial base. The draft RFP also does not clearly identify life-cycle cost as a critical evaluation factor, separate from initial acquisition cost. This ignores the cost to the government of initial introduction [of the FFG(X)] into the [Navy's] logistics system, the training necessary for new systems, the location of repair services (e.g., does the equipment need to leave the US?), and the cost and availability of parts and services for the lifetime of the ship. Therefore, lowest acquisition cost is likely to drive the award—certainly for component suppliers. Further, the US Navy's acquisition approach not only encourages, but advantages, the use of foreign designs, most of which have a component supplier base that is foreign. Many of these component suppliers (and in some cases the shipyards they work with) are wholly or partially owned by their respective governments and enjoy direct subsidies as well as other benefits from being state owned (e.g., requirements relaxation, tax incentives, etc.). This uneven playing field, and the high-volume commercial shipbuilding market enjoyed by the foreign suppliers, make it unlikely for an American manufacturer to compete on cost. As incumbent component manufacturers, these foreign companies have a substantial advantage over US component manufacturers seeking to provide equipment even if costs could be matched, given the level of non-recurring engineering (NRE) required to facilitate new equipment into a parent craft's design and the subsequent performance risk. The potential outcome of such a scenario would have severe consequences across the US shipbuilding supplier base…. the loss of the FFG(X) opportunity to US suppliers would increase the cost on other Navy platforms [by reducing production economies of scale at U.S. suppliers that make components for other U.S. military ships]. Most importantly, maintaining a robust domestic [supplier] manufacturing capability allows for a surge capability by ensuring rapidly scalable capacity when called upon to support major military operations—a theme frequently emphasized by DOD and Navy leaders. These capabilities are a critical national asset and once lost, it is unlikely or extremely costly to replicate them. This would be a difficult lesson that is not in the government's best interests to re-learn. One such lesson exists on the DDG-51 [destroyer production] restart, where the difficulty of reconstituting a closed production line of a critical component manufacturer—its main reduction gear—required the government to fund the manufacturer directly as GFE, since the US manufacturer for the reduction gear had ceased operations. Other observers, while perhaps acknowledging some of the points made above, might argue one or more of the following: foreign-made components have long been incorporated into U.S. Navy ships (and other U.S. military equipment); U.S-made components have long been incorporated into foreign warships (and other foreign military equipment); and requiring a foreign parent design for the FFG(X) to be modified to incorporate substitute U.S.-made components could increase the unit procurement cost of the FFG(X) or the FFG(X) program's acquisition risk (i.e., cost, schedule, and technical risk), or both. Current U.S. law requires certain components of U.S. Navy ships to be made by a manufacturer in the national technology and industrial base. The primary statute in question—10 U.S.C. 2534—states in part: §2534. Miscellaneous limitations on the procurement of goods other than United States goods (a) Limitation on Certain Procurements.-The Secretary of Defense may procure any of the following items only if the manufacturer of the item satisfies the requirements of subsection (b):… (3) Components for naval vessels.-(A) The following components: (i) Air circuit breakers. (ii) Welded shipboard anchor and mooring chain with a diameter of four inches or less. (iii) Vessel propellers with a diameter of six feet or more. (B) The following components of vessels, to the extent they are unique to marine applications: gyrocompasses, electronic navigation chart systems, steering controls, pumps, propulsion and machinery control systems, and totally enclosed lifeboats. (b) Manufacturer in the National Technology and Industrial Base.- (1) General requirement.-A manufacturer meets the requirements of this subsection if the manufacturer is part of the national technology and industrial base…. (3) Manufacturer of vessel propellers.-In the case of a procurement of vessel propellers referred to in subsection (a)(3)(A)(iii), the manufacturer of the propellers meets the requirements of this subsection only if- (A) the manufacturer meets the requirements set forth in paragraph (1); and (B) all castings incorporated into such propellers are poured and finished in the United States. (c) Applicability to Certain Items.- (1) Components for naval vessels.-Subsection (a) does not apply to a procurement of spare or repair parts needed to support components for naval vessels produced or manufactured outside the United States…. (4) Vessel propellers.-Subsection (a)(3)(A)(iii) and this paragraph shall cease to be effective on February 10, 1998…. (d) Waiver Authority.-The Secretary of Defense may waive the limitation in subsection (a) with respect to the procurement of an item listed in that subsection if the Secretary determines that any of the following apply: (1) Application of the limitation would cause unreasonable costs or delays to be incurred. (2) United States producers of the item would not be jeopardized by competition from a foreign country, and that country does not discriminate against defense items produced in the United States to a greater degree than the United States discriminates against defense items produced in that country. (3) Application of the limitation would impede cooperative programs entered into between the Department of Defense and a foreign country, or would impede the reciprocal procurement of defense items under a memorandum of understanding providing for reciprocal procurement of defense items that is entered into under section 2531 of this title, and that country does not discriminate against defense items produced in the United States to a greater degree than the United States discriminates against defense items produced in that country. (4) Satisfactory quality items manufactured by an entity that is part of the national technology and industrial base (as defined in section 2500(1) of this title) are not available. (5) Application of the limitation would result in the existence of only one source for the item that is an entity that is part of the national technology and industrial base (as defined in section 2500(1) of this title). (6) The procurement is for an amount less than the simplified acquisition threshold and simplified purchase procedures are being used. (7) Application of the limitation is not in the national security interests of the United States. (8) Application of the limitation would adversely affect a United States company…. (h) Implementation of Naval Vessel Component Limitation.-In implementing subsection (a)(3)(B), the Secretary of Defense- (1) may not use contract clauses or certifications; and (2) shall use management and oversight techniques that achieve the objective of the subsection without imposing a significant management burden on the Government or the contractor involved. (i) Implementation of Certain Waiver Authority.-(1) The Secretary of Defense may exercise the waiver authority described in paragraph (2) only if the waiver is made for a particular item listed in subsection (a) and for a particular foreign country. (2) This subsection applies to the waiver authority provided by subsection (d) on the basis of the applicability of paragraph (2) or (3) of that subsection. (3) The waiver authority described in paragraph (2) may not be delegated below the Under Secretary of Defense for Acquisition, Technology, and Logistics. (4) At least 15 days before the effective date of any waiver made under the waiver authority described in paragraph (2), the Secretary shall publish in the Federal Register and submit to the congressional defense committees a notice of the determination to exercise the waiver authority. (5) Any waiver made by the Secretary under the waiver authority described in paragraph (2) shall be in effect for a period not greater than one year, as determined by the Secretary.... In addition to 10 U.S.C. 2534, the paragraph in the annual DOD appropriations act that makes appropriations for the Navy's shipbuilding account (i.e., the Shipbuilding and Conversion, Navy, or SCN, appropriation account) has in recent years included this proviso: … Provided further , That none of the funds provided under this heading for the construction or conversion of any naval vessel to be constructed in shipyards in the United States shall be expended in foreign facilities for the construction of major components of such vessel…. 10 U.S.C. 2534 explicitly applies to certain ship components, but not others. The meaning of \"major components\" in the above proviso from the annual DOD appropriations act might be subject to interpretation. The issue of U.S.-made components for Navy ships is also, for somewhat different reasons, an issue for Congress in connection with the Navy's John Lewis (TAO-205) class oiler shipbuilding program. Another issue for Congress whether to build FFG(X)s at a single shipyard, as the Navy's baseline plan calls for, or at two or three shipyards. As mentioned earlier, one possible alternative to the Navy's current baseline plan for building FFG(X)s at a single shipyard would be to build them at two or three yards, including potentially one or both of the LCS shipyards. The Navy's FFG-7 class frigates, which were procured at annual rates of as high as eight ships per year, were built at three shipyards. Supporters of building FFG(X)s at two or three yards might argue that it could boost FFG(X) production from the currently planned two ships per year to four or more ships per year, substantially accelerating the date for attaining the Navy's small surface combatant force-level goal; permit the Navy to use competition (either competition for quantity at the margin, or competition for profit [i.e., Profit Related to Offers, or PRO, bidding]) to help restrain FFG(X) prices and ensure production quality and on-time deliveries; and perhaps complicate adversary defense planning by presenting potential adversaries with multiple FFG(X) designs, each with its own specific operating characteristics. Opponents of this plan might argue that it could weaken the current FFG(X) competition by offering the winner a smaller prospective number of FFG(X)s and perhaps also essentially guaranteeing the LCSs yard that they will build some number of FFG(X)s; substantially increase annual FFG(X) procurement funding requirements so as to procure four or more FFG(X)s per year rather than two per year, which in a situation of finite DOD funding could require offsetting reductions in other Navy or DOD programs; and reduce production economies of scale in the FFG(X) program by dividing FFG(X) among two or three designs, and increase downstream Navy FFG(X) operation and support (O&S) costs by requiring the Navy to maintain two or three FFG(X) logistics support systems. Another potential oversight issue for Congress concerns the potential impact on required numbers of FFG(X)s of a possible change in the Navy's surface force architecture. As mentioned earlier, Navy officials have stated that the new Force Structure Assessment (FSA) being conducted by the Navy may shift the Navy to a new fleet architecture that will include, among other thing, a larger proportion of small surface combatants—and, by implication, a smaller proportion of large surface combatants (i.e., cruisers and destroyers). A change in the required number of FFG(X)s could influence perspectives on the annual procurement rate for the program and the number of shipyards used to build the ships. A January 15, 2019, press report states: The Navy plans to spend this year taking the first few steps into a markedly different future, which, if it comes to pass, will upend how the fleet has fought since the Cold War. And it all starts with something that might seem counterintuitive: It's looking to get smaller. \"Today, I have a requirement for 104 large surface combatants in the force structure assessment; [and] I have [a requirement for] 52 small surface combatants,\" said Surface Warfare Director Rear Adm. Ronald Boxall. \"That's a little upside down. Should I push out here and have more small platforms? I think the future fleet architecture study has intimated 'yes,' and our war gaming shows there is value in that.\" An April 8, 2019, press report states that Navy discussions about the future surface fleet include the upcoming construction and fielding of the [FFG(X)] frigate, which [Vice Admiral Bill Merz, the deputy chief of naval operations for warfare systems] said is surpassing expectations already in terms of the lethality that industry can put into a small combatant. \"The FSA may actually help us on, how many (destroyers) do we really need to modernize, because I think the FSA is going to give a lot of credit to the frigate—if I had a crystal ball and had to predict what the FSA was going to do, it's going to probably recommend more small surface combatants, meaning the frigate … and then how much fewer large surface combatants can we mix?\" Merz said. An issue the Navy has to work through is balancing a need to have enough ships and be capable enough today, while also making decisions that will help the Navy get out of the top-heavy surface fleet and into a better balance as soon as is feasible. \"You may see the evolution over time where frigates start replacing destroyers, the Large Surface Combatant [a future cruiser/destroyer-type ship] starts replacing destroyers, and in the end, as the destroyers blend away you're going to get this healthier mix of small and large surface combatants,\" he said—though the new FSA may shed more light on what that balance will look like and when it could be achieved. Table 3 summarizes congressional action on the Navy's FY2020 funding request for the LCS program. Appendix A. Navy Briefing Slides from July 25, 2017, FFG(X) Industry Day Event This appendix reprints some of the briefing slides that the Navy presented at its July 25, 2017, industry day event on the FFG(X) program, which was held in association with the Request for Information (RFI) that the Navy issued on July 25, 2017, to solicit information for better understanding potential trade-offs between cost and capability in the FFG(X) design. The reprinted slides begin on the next page. Appendix B. Competing Industry Teams This appendix presents additional background information on the industry teams competing for the FFG(X) program. February 16, 2018, Press Report About Five Competing Industry Teams A February 16, 2018, press report about the five competing industry teams reportedly competing for the FFG(X) program (i.e., the five industry teams shown in Table 1 ) stated the following: The Navy would not confirm how many groups bid for the [FFG(X)] work. At least one U.S.-German team that was not selected for a [conceptual] design contract, Atlas USA and ThyssenKrupp Marine Systems, told USNI News they had submitted for the [DD&C] competition.... During last month's Surface Navy Association [annual symposium], several shipbuilders outlined their designs for the FFG(X) competition. Austal USA Shipyard: Austal USA in Mobile, Ala. Parent Design: Independence-class [i.e., LCS-2 class] Littoral Combat Ship One of the two Littoral Combat Ship builders, Austal USA has pitched an upgunned variant of the Independence-class LCS as both a foreign military sales offering and as the answer to the Navy's upgunned small surface combatant and then frigate programs. Based on the 3,000-ton aluminum trimaran design, the hull boasts a large flight deck and space for up to 16 Mk-41 Vertical Launching System (VLS) cells. Fincantieri Marine Group Shipyard: Fincantieri Marinette Marine in Marinette, Wisc. Parent Design: Fincantieri Italian FREMM As part of the stipulations of the FFG(X) programs, a contractor can offer just one design in the competition as a prime contractor but may also support a second bid as a subcontractor. Fincantieri elected to offer its 6,700-ton Italian Fregata europea multi-missione (FREMM) design for construction in its Wisconsin Marinette Marine shipyard, as well as partner with Lockheed Martin on its Freedom-class pitch as a subcontractor. The Italian FREMM design features a 16-cell VLS as well as space for deck-launched anti-ship missiles. General Dynamics Bath Iron Works Shipyard: Bath Iron Works in Bath, Maine Parent Design: Navantia Álvaro de Bazán-class F100 Frigate The 6,000-ton air defense guided-missile frigates fitted with the Aegis Combat System have been in service for the Spanish Armada since 2002 and are the basis of the Australian Hobart-class air defense destroyers and the Norwegian Fridtjof Nansen-class frigates. The Navantia partnership with Bath is built on a previous partnership from the turn of the century. The F100 frigates were a product of a teaming agreement between BIW, Lockheed Martin and Navantia predecessor Izar as part of the Advanced Frigate Consortium from 2000. Huntington Ingalls Industries Shipyard: Ingalls Shipbuilding in Pascagoula, Miss. Parent Design: Unknown Out of the competitors involved in the competition, HII was the only company that did not present a model or a rendering of its FFG(X) at the Surface Navy Association symposium in January. A spokeswoman for the company declined to elaborate on the offering when contacted by USNI News on Friday. In the past, HII has presented a naval version of its Legend-class National Security Cutter design as a model at trade shows labeled as a \"Patrol Frigate.\" Lockheed Martin Shipyard: Fincantieri Marinette Marine in Marinette, Wisc. Parent Design: Freedom-class [i.e., LCS-1 class] Littoral Combat Ship Of the two LCS builders, Lockheed Martin is the first to have secured a foreign military sale with its design. The company's FFG(X) bid will have much in common with its offering for the Royal Saudi Navy's 4,000-ton multi-mission surface combatant. The new Saudi ships will be built around an eight-cell Mk-41 vertical launch system and a 4D air search radar. Lockheed has pitched several other variants of the hull that include more VLS cells. \"We are proud of our 15-year partnership with the U.S. Navy on the Freedom-variant Littoral Combat Ship and look forward to extending it to FFG(X),\" said Joe DePietro, Lockheed Martin vice president of small combatants and ship systems in a Friday evening statement. \"Our frigate design offers an affordable, low-risk answer to meeting the Navy's goals of a larger and more capable fleet.\" May 28, 2019, Press Report About One Industry Team Deciding to Not Submit a Bid On May 28, 2019, it was reported that one of the five industry teams that had been interested in the FFG(X) program had informed the Navy on May 23 that it had decided to not submit a bid for the program. The May 28, 2019, press report about this industry team's decision stated: Lockheed Martin won't submit a bid to compete in the design of the Navy's next-generation guided-missile (FFG(X)) frigate competition, company officials told USNI News on Tuesday [May 28]. The company elected to focus on its involvement developing the frigate combat system and other systems rather than forward its Freedom-class LCS design for the detailed design and construction contract Naval Sea Systems Command plans to issue this summer, Joe DePietro, Lockheed Martin vice president of small combatants and ship systems, told USNI News. \"We reviewed the entire program and obviously, given some of the stuff that has already happened that is outside of the contract for the program—that includes the designation of our combat management system, COMBATSS 21, derived off of Aegis; we have the Mk-41 vertical launch system; the processing for our anti-submarine warfare area; advanced [electronic warfare] and platform integration,\" he said. \"As we evaluated all of those different areas, we determined not to pursue, as a prime contractor, the FFG(X) detailed design and construction.\" The company informed the Navy on May 23 it would not join the other bidders for the hull design, two sources familiar with the notification told USNI News. While the design passed two Navy reviews, the company told the service it felt the Freedom design would be stretched too far to accommodate all the capabilities required, one source told USNI News…. While Lockheed is moving away from leading a frigate team, the company will be heavily involved with whoever wins. The FFG(X)'s COMBATSS-21 Combat Management System will be derived from the company's Aegis Combat System, and Lockheed Martin makes the ship's vertical launch system.", "summary": "The FFG(X) program is a Navy program to build a class of 20 guided-missile frigates (FFGs). The Navy wants to procure the first FFG(X) in FY2020, the next 18 at a rate of two per year in FY2021-FY2029, and the 20th in FY2030. The Navy's proposed FY2020 budget requests $1,281.2 million for the procurement of the first FFG(X). The Navy's FY2020 budget submission shows that subsequent ships in the class are estimated by the Navy to cost roughly $900 million each in then-year dollars. The Navy intends to build the FFG(X) to a modified version of an existing ship design—an approach called the parent-design approach. The parent design could be a U.S. ship design or a foreign ship design. At least four industry teams are reportedly competing for the FFG(X) program. Two of the teams are reportedly proposing to build their FFG(X) designs at the two shipyards that have been building Littoral Combat Ships (LCSs) for the Navy—Austal USA of Mobile, AL, and Fincantieri/Marinette Marine (F/MM) of Marinette, WI. The other two teams are reportedly proposing to build their FFG(X) designs at General Dynamics/Bath Iron Works, of Bath, ME, and Huntington Ingalls Industries/Ingalls Shipbuilding of Pascagoula, MS. On May 28, 2019, it was reported that a fifth industry team that had been interested in the FFG(X) program had informed the Navy on May 23, 2019, that it had decided to not submit a bid for the program. This fifth industry team, like one of the other four, reportedly had proposed building its FFG(X) design at F/MM. The Navy plans to announce the outcome of the FFG(X) competition in July 2020. The FFG(X) program presents several potential oversight issues for Congress, including the following: whether to approve, reject, or modify the Navy's FY2020 funding request for the program; whether the Navy has appropriately defined the cost, capabilities, and growth margin of the FFG(X); the Navy's intent to use a parent-design approach for the FFG(X) program rather than develop an entirely new (i.e., clean-sheet) design for the ship; cost, schedule, and technical risk in the FFG(X) program; whether any additional LCSs should be procured in FY2020 as a hedge against potential delays in the FFG(X) program; the potential industrial-base impacts of the FFG(X) for shipyards and supplier firms; whether to build FFG(X)s at a single shipyard, as the Navy's baseline plan calls for, or at two or three shipyards; and the potential impact on required numbers of FFG(X)s of a possible change in the Navy's surface force architecture.", "document_type": "crs"}
{"report": "The House of Representatives has standing rules that govern how bills and resolutions are to be taken up and considered on the floor. However, to expedite legislation receiving floor action, the House may temporarily set aside these rules for measures that are not otherwise privileged for consideration. This can be done by agreeing to a special order of business resolution (special rule) or by adopting a motion to suspend the rules and pass the underlying measure. In general, special rules enable the consideration of complex or contentious legislation, such as major appropriations or reauthorizations, while the suspension of the rules procedure is usually applied to broadly supported legislation that can be approved without floor amendments or extensive debate in the chamber. Most bills and resolutions that receive floor action in the House are called up and considered under suspension of the rules. The suspension procedure allows non-privileged measures to be raised without a special rule, waives points of order, limits debate, and prohibits floor amendments. Motions to suspend the rules and pass the measure require a two-thirds vote, so the procedure is typically reserved for bills and resolutions that can meet a supermajority threshold. Decisions to schedule bills for consideration under suspension are generally based on how widely supported the measures are, how long Members wish to debate them, and whether they want to propose floor amendments. These decisions are not necessarily related to the subject matter of the measure. Accordingly, measures brought up under suspension cover a wide range of policy areas but most often address government operations, such as the designation of federal facilities. This report describes the suspension procedure, which is defined in clause 1 of House Rule XV, and provides an analysis of measures considered under suspension during the 115 th Congress (2017-2018). Figures 1-8 display statistical data, including the prevalence and form of suspension measures, sponsors of measures, committee consideration, length of floor debate, voting, and resolution of differences between the chambers. Table 1 summarizes the final legislative status of measures initially considered in the House under the suspension of the rules. Finally, the Appendix depicts the use of the suspension procedure from the 110 th through the 115 th Congresses (2009-2018). The suspension of the rules procedure is established by clause 1 of House Rule XV. Bills, resolutions, House amendments to Senate bills, amendments to the Constitution, conference reports, and other types of business may be considered under suspension, even those \"that would otherwise be subject to a point of order â¦ [or have] not been reported or referred to any calendar or previously introduced.\" Suspension motions are in order on designated days. Rule XV states that \"the Speaker may not entertain a motion that the House suspend the rules except on Mondays, Tuesdays, and Wednesdays and during the last six days of a session of Congress.\" Suspension measures, however, may be considered on other days by unanimous consent or under the terms of a special order of business (special rule) reported by the Committee on Rules and agreed to by the House. A motion to suspend the rules is a compound motion to suspend the House rules and pass a bill or agree to a resolution. When considering such a motion, the House is voting on the two questions simultaneously. Once recognized, the Member making the motion will say, \"Mr. [or Madam] Speaker, I move to suspend the rules and pass___.\" The House rules that are suspended under this procedure include those that \"would impede an immediate vote on passage of a measure â¦ such as ordering the previous question, third reading, recommittal, or division of the question.\" A measure considered under the suspension procedure is not subject to floor amendment. The motion to suspend and pass the measure, though, may provide for passage of the measure in an amended form. That is, the text to be approved may be presented in a form altered by committee amendments or by informal negotiations. Suspension measures that are passed with changes incorporated into the text are passed \"as amended.\" There are no separate votes on the floor approving such amendments. Suspension motions are \"debatable for 40 minutes, one-half in favor of the motion and one-half in opposition thereto.\" However, in most instances, a true opponent never claims half the time, and most speakers come to the floor to express support for the measure. Debate time is controlled by two floor managers, one from each party, who sit on a committee of jurisdiction. Each manager makes an opening statement and may yield increments of the 20 minutes they control to other Members to debate the measure. Once debate has concluded, a single vote is held on the motion to suspend the rules and pass the measure. The motion requires approval by \"two-thirds of the Members voting, a quorum being present.\" Should the vote fall short of the two-thirds required for passage (290, if all Members vote), the measure is not permanently rejected. Before the end of the Congress, the House may consider the measure again under suspension, or the Committee on Rules may report a special rule that provides for floor consideration of the measure. As illustrated in Figure 1 , the majority of measures considered on the House floor during the 115 th Congress were initially called up under the suspension of the rules procedure. Sixty-four percent of all measures that received floor action were initially considered under suspension (952 out of the 1,498), compared to those under the terms of a special rule (12%), unanimous consent (10%), or privileged business (15%). Figure 2 displays the form of suspension measures. Most of the measures considered under suspension during the 115 th Congress (94%) were bills. House bills made up 83% of the suspension total, Senate bills 10%. The remaining measures were House resolutions, House concurrent resolutions, and House joint resolutions. There were no Senate concurrent or joint resolutions considered under suspension of the rules in the 115 th Congress. As represented in Figure 3 , most suspension measures were sponsored by members of the majority party during the 115 th Congress. House or Senate majority-party members sponsored 73% of all bills and resolutions initially considered in the House under suspension, while House majority-party members sponsored 627 (73%) of the 855 House-originated measures (designated with an H.R., H.Res., H.Con.Res. or H.J.Res. prefix). Suspension is, however, the most common procedure used to consider minority-sponsored legislation in the House by a wide margin. In the 115 th Congress, 77% of the minority-sponsored measures that were considered on the House floor were raised under the suspension procedure. Members of the House or Senate minority parties sponsored 27% of all suspension measures originating in either chamber, compared to 14% of legislation subject to different procedures, including privileged business (27 measures) and unanimous consent (48 measures). Minority-party House Members sponsored 228 (27%) of the 855 House measures considered under suspension. There were no minority-sponsored measures considered under the terms of a special rule. Most suspension measures are referred to at least one House committee before their consideration on the chamber floor. In the 115 th Congress, 896 out of the 952 suspension measures considered (94%) were previously referred to a House committee. Of the 55 measures that were considered without a referral, 51 were Senate bills that were \"held at the desk,\" and four were House resolutions that provided concurrence to Senate amendments with an amendment. Measures may be referred to multiple House committees before receiving floor action. When a bill or resolution is referred to more than one House committee, the Speaker will designate one committee as primary, meaning it is the committee exercising jurisdiction over the largest part of the measure. Generally, the chair of the committee of primary jurisdiction works with majority party leadership to determine if and when a measure should be considered under suspension. Figure 4 shows the number and percentage of measures brought up under suspension from each House committee of primary jurisdiction. The House Committee on Natural Resources was the committee of primary jurisdiction for the plurality of measures considered under suspension in the 115 th Congress: 146, or 15%, of the total number of suspension measures considered. Many of these bills concerned the designation or use of federally owned land. For most House committees, the majority of their referred measures that reached the floor were raised under the suspension procedure. In the 115 th Congress, the three exceptions were the Committee on House Administrationâwhich had several measures considered by unanimous consentâand the Committees on Budget and Appropriations, which had all or most of their measures considered pursuant to special rules, respectively. For the other committees, suspension measures ranged from 56% to 100% of the total number of the committee's measures receiving floor action ( Figure 5 ). Since suspension motions require a two-thirds majority for passage, House committees that handle less contentious subjects tend to have more of their measures considered under the suspension procedure in comparison to other committees. In the 115 th Congress, high-suspension committees included Small Business and Homeland Security (100% of measures receiving floor action); Veterans' Affairs (92%); and Science, Space, and Technology (90%). The Small Business Committee's measures sought to authorize new business development programs. Veterans' Affairs measures included authorizations, reauthorizations, and bills designating federal facilities. While suspension measures are not subject to floor amendments, committees may recommend amendments to legislative texts during markup meetings or through informal negotiations. The motion to suspend the rules can include these proposed changes when a Member moves to suspend the rules and pass the measure \"as amended.\" In the 115 th Congress, 521 suspension measures (55% of the total) were considered \"as amended,\" meaning that the text to be approved differed from the measure's introduced text. Clause 2 of House Rule XIII requires that measures reported by House committees must be accompanied by a written report. Otherwise, they are not placed on a calendar of measures eligible for floor consideration. However, the written report requirement is among those rules suspended under the suspension procedure. Thus, measures may be called up on the floor under suspension of the rules even if a committee never ordered them to be reported or wrote an accompanying committee report. Instead, the motion to suspend the rules discharges the committee and moves the legislation directly to the House floor. In the 115 th Congress, 659 (69%) suspension measures were ordered to be reported by a House committee. Of this number, 505 were reported with an accompanying House committee report. Fifty-seven measures that did not have a House report did have a Senate report (of these, 24 were Senate bills that did not receive a House committee referral), while 390 measures had no written report from either chamber (41% of the total number of suspension measures). Pursuant to Rule XV, motions to suspend the rules are regularly in order on Mondays, Tuesdays, and Wednesdays or on the last six days of a session of Congress. However, suspension motions may be considered on other days by unanimous consent or under the terms of a special rule reported by the Committee on Rules and agreed to by the House. As displayed in Figure 6 , in the 115 th Congress, the plurality of suspension measures were considered on Tuesdays (446, 47% of the total number considered), followed by Mondays (279, 29%) and Wednesdays (168, 18%). In addition, 31 suspension measures were considered on Thursdays and 28 on Fridays. Of these, seven were considered by unanimous consent, while 52 were called up under suspension pursuant to permission included in a special rule reported by the Rules Committee and agreed to by the full House. Such special rules included a provision stating, \"It shall be in order at any time on the legislative day of ___ for the Speaker to entertain motions that the House suspend the rules as though under clause 1 of rule XV.\" Pursuant to Rule XV, suspension measures are \"debatable for 40 minutes, one-half in favor of the motion and one-half in opposition thereto.\" In practice, there is rarely a true opponent to a motion to suspend the rules, and the time is divided between two floor managers, usually one from each party, who both favor the motion. The floor managers each control 20 minutes of debate. The managers may be their parties' sole representatives for or against the motion, or they may yield increments of the 20-minute allotment to other Members. Typically, the relevant committee chairs and ranking members select the majority and minority floor managers for particular bills and resolutions. These managers may be the measure's sponsor, the chair or ranking member of the measure's committee of primary jurisdiction, or another committee member. In the 115 th Congress, the measure's sponsor served as the majority manager on 23% of the suspension measures receiving floor action. The committee chair managed 28% of the measures. The minority manager was the measure's sponsor for 9% of the measures and the committee's ranking member for 25% of the measures considered. Occasionally, floor managers controlling time on a motion to suspend the rules ceded their control to other Members during debate. By unanimous request, the other Member then controlled the remaining amount of time allotted. In one identified case, another Member claimed the time in true opposition during the initial floor consideration on the basis of both the majority and minority floor managers favoring the measure. Pursuant to the rule, the Member in true opposition then controlled 20 minutes of debate. In at least two instances, the minority manager opposed the measure. A majority floor manager makes the motion to suspend the rules by stating, \"Mr. [or Madam] Speaker, I move to suspend the rules and pass the bill [or resolution] ____.\" The Speaker (or Speaker pro tempore) responds, \"Pursuant to the rule, the gentleman[woman] from [state] and the gentleman[woman] from [state] each will control twenty minutes.\" The majority and minority managers then, in turn, make opening statements regarding the measure using the 20 minutes each controls. If the majority and minority managers have secured additional speakers, the speakers generally alternate between the parties within the 40-minute limit. During the 115 th Congress, on a motion to suspend the rules, the average number of speakers in addition to the floor managers was fewer than two. On 56% of the measures (531) considered, there were one or two additional speakers. On 28% of the measures (268) considered, there were no additional speakers, and in 14% of the measures (136) considered, there were three to 13 additional speakers. Seventeen measures had 14 or more additional speakers. The measure with the most additional speakers (34), H.J.Res. 2 , proposing an amendment to the Constitution, was allowed four hours of debate under the terms of a special rule ( H.Res. 811 ). At the start of the debate period, the majority manager may request \"unanimous consent that all Members may have five legislative days in which to revise and extend their remarks and add extraneous materials on this bill [resolution].\" This request enables general leave statements to be inserted into the Congressional Record . In 20% of the suspension measures considered in the 115 th Congress, a written general leave statement appeared in the Record following in-person remarks, indicating that the remarks were submitted on the day the legislation was considered. General leave statements submitted on a day other than the day of consideration appear in the Extension of Remarks section of the Congressional Record . Suspension measures are limited to a maximum of 40 minutes of debate under Rule XV. However, if there are time gaps between speakers or procedural interruptions, such as a vote on a motion to adjourn, the time period between the start of the first speaker's remarks and the conclusion of debate may exceed 40 minutes. The statistics displayed in Figure 7 show the length of consideration of suspension measures as documented in Congress.gov, not the accumulated length of statements, as kept by official timekeepers in the chamber. In the 115 th Congress, the average length of consideration on a motion to suspend the rules was 12 minutes and 21 seconds, and more than half of the measures considered had a debate period of 10 minutes or less. Thus, while overall debate is limited to 40 minutes under the rule, on most suspension measures, a fraction of that time was actually expended during consideration. Twenty-eight measures, however, had consideration periods that exceeded 40 minutes due to procedural delays or, in the case of H.J.Res. 2 , proposing an amendment to the Constitution, due to the terms of a special rule ( H.Res. 811 ), which enabled four hours of debate. House leaders generally choose measures for suspension that are likely to achieve the two-thirds majority threshold for passage. Thus, almost all suspension measures were passed by the House in the 115 th Congress. The House passed, via motions to suspend the rules, 790 of the 794 House bills that were initially considered under suspension. Four House bills did not receive the requisite supermajority. Three of these bills were later considered and approved under the terms of a special rule. The other bill did not return to the floor and therefore did not pass the House. The House agreed to all House resolutions (47) and concurrent resolutions (10) that were considered under suspension. The House approved three out of the four House joint resolutions. The House joint resolution that did not receive the requisite supermajority was H.J.Res. 2 , proposing a balanced budget amendment to the Constitution. The House approved 93 out of the 97 Senate bills under the suspension procedure. One of the Senate bills, which initially failed in the House, was later passed under the terms of a special rule. The other three Senate bills did not receive further consideration in the House. Most suspension motions are agreed to in the House by voice vote, which is the chamber's default method of voting on most questions. In 2017 and 2018, this method of voting led to the final approval of 72% (687) of the motions to suspend the rules and pass the measures (see Figure 8 ). After the initial voice vote, Members triggered an eventual record vote (often called a roll call vote) on 266 (28%) of the suspension measures considered in the 115 th Congress. This was done by demanding the \"yeas and nays,\" objecting to the vote \"on the grounds that a quorum is not present,\" or, in two cases, demanding a recorded vote. In most instances, the chair elected to postpone the vote to a later period within two additional legislative days, pursuant to clause 8 of House Rule XX. Of the 266 record votes, two immediately followed debate on the measure. The remaining 264 votes were postponed to another time on the legislative schedule, usually later the same day. In the 115 th Congress, 257 suspension motions were adopted by record vote, and nine motions to suspend the rules were defeated by record votes. The defeat of a motion to suspend the rules, however, does not necessarily kill the legislation. The Speaker may choose to recognize a Member at a later time to make another motion to suspend the rules and pass the bill, or the House may consider the measure pursuant to a special rule reported by the Committee on Rules. Accordingly, four of the initially unsuccessful measures were later called up and passed under the terms of a special rule. The House Rules Committee reported a special rule for another measure, but the special rule was not considered on the floor, so the measure did not receive further action. Four additional measures were not considered again, via any procedure, before the end of the 115 th Congress. Thus, of the measures initially considered on the House floor under suspension of the rules, five did not receive House approval. Although suspension measures generally receive broad support, measures that receive the requisite two-thirds majority in the House are not guaranteed passage in the Senate. As noted in Table 1 , in the 115 th Congress, the Senate agreed to one of the four House joint resolutions and six of the 10 House concurrent resolutions considered under suspension of the rules. The Senate passed 229 of the 794 House bills initially considered under suspension (29%). Of the number of suspension measures that passed the House and Senate, 77 entered a \"resolution of differences\" stage between the chambers. Fifty-eight House measures and 19 Senate bills were subject to an amendment exchange process. (No measure initially considered under suspension of the rules had bicameral differences resolved in a conference committee.) Two of these measures, H.R. 88 and H.R. 695 , did not have their differences resolved because the House and Senate did not agree on the final text as amended by both chambers. The House passed, with amendments, two Senate bills ( S. 488 and S. 2497 ) that did not enter the \"resolving differences\" stage because the Senate did not take up the House amendments. Likewise, the Senate passed, with amendments, four House bills ( H.R. 4969 , H.R. 4203 , H.R. 1967 , and H.R. 1020 ) that did not receive final passage because the House did not take up the Senate amendments. Thus, these bills, as well as H.R. 88 and H.R. 695 , were not enacted into law. Of the measures initially considered under suspension during the 115 th Congress, President Trump was presented with 223 House bills, 92 Senate bills, and one House joint resolution for signature or veto. The President signed all of these measures (vetoing none), so a total of 315 bills, and one joint resolution, were enacted into law (see Table 1 ).", "summary": "Suspension of the rules is the most commonly used procedure to call up measures on the floor of the House of Representatives. As the name suggests, the procedure allows the House to suspend its standing and statutory rules in order to consider broadly supported legislation in an expedited manner. More specifically, the House temporarily sets aside its rules that govern the raising and consideration of measures and assumes a new set of constraints particular to the suspension procedure. The suspension of the rules procedure has several parliamentary advantages: (1) it allows non-privileged measures to be raised on the House floor without the need for a special rule, (2) it enables the consideration of measures that would otherwise be subject to a point of order, and (3) it streamlines floor action by limiting debate and prohibiting floor amendments. Given these features, as well as the required two-thirds supermajority vote for passage, suspension motions are generally used to process less controversial legislation. In the 115 th Congress (2017-2018), measures considered under suspension made up 64% of the bills and resolutions that received floor action in the House (952 out of 1,498 measures). The majority of suspension measures were House bills (83%), followed by Senate bills (10%) and House resolutions (5%). The measures covered a variety of policy areas but most often addressed government operations, such as the designation of federal facilities or amending administrative policies. Most measures that are considered in the House under the suspension procedure are sponsored by a House or Senate majority party member. However, suspension is the most common House procedure used to consider minority-party-sponsored legislation regardless of whether the legislation originated in the House or Senate. In 2017 and 2018, minority-party members sponsored 27% of suspension measures, compared to 14% of legislation subject to different procedures, including privileged business (27 measures) and unanimous consent (48 measures). There were no minority-party sponsored bills that were considered under the terms of a special rule. Most suspension measures are referred to at least one House committee before their consideration on the floor. The House Committee on Natural Resources was the committee of primary jurisdiction for the plurality of suspension measures considered in the 115 th Congress. Additional committeesâsuch as Energy and Commerce, Homeland Security, Oversight and Government Reform (now Oversight and Reform), Foreign Affairs, and Veterans' Affairsâalso served as the primary committee for a large number of suspension measures. Suspension motions are debatable for up to 40 minutes. In most cases, a fraction of that debate time is actually used. In the 115 th Congress, the average amount of time spent considering a motion to suspend the rules was 12Â½ minutes. The House adopted nearly every suspension motion considered in 2017 and 2018. Approval by the House, however, did not guarantee final approval in the 115 th Congress. The Senate passed or agreed to 37% of the bills, joint resolutions, and concurrent resolutions initially considered in the House under suspension of the rules, and 316 measures were signed into law. This report briefly describes the suspension of the rules procedure, which is defined in House Rule XV, and provides an analysis of measures considered under this procedure during the 115 th Congress. Figures and one table display statistics on the use of the procedure, including the prevalence and form of suspension measures, sponsorship of measures by party, committee consideration, length of debate, voting, resolution of differences between the chambers, and the final status of legislation. In addition, an Appendix illustrates trends in the use of the suspension procedure from the 110 th through the 115 th Congresses (2007-2018).", "document_type": "crs"}
{"report": "Robocalls are the top complaint received by the Federal Communications Commission (FCC) and a consistent congressional concern. A robocall, also known as \"voice broadcasting,\" is any telephone call that delivers a pre-recorded message using an automatic (computerized) telephone dialing system, more commonly referred to as an automatic dialer or \"autodialer.\" The Telephone Consumer Protection Act of 1991 (TCPA) regulates robocalls. Legal robocalls are used by legitimate call originators for political, public service, and emergency messages, which are legal. Other legitimate uses can be, for example, to announce school closures or to remind consumers of medical appointments. Illegal robocalls are usually associated with fraudulent telemarketing campaigns, but an illegal robocall under the TCPA does not necessarily mean that the robocall is fraudulent. Illegal, fraudulent calls usually include misleading or inaccurate Caller ID information to disguise the identity of the calling party and trick called parties, which is called \"spoofing.\" Scammers sometimes use \" neighbor spoofing \" so it will appear that an incoming call is coming from a local number . They may also spoof a number from a legitimate company or a government agency that consumers know and trust . Like robocalls more generally, spoofing can also be used for legitimate purposes, such as to hide the number of a domestic violence shelter or an individual employee extension at a business or government agency. This report addresses robocalls that are both illegal under the TCPA as well as intended to defraud, not robocalls that are defined only as illegal. The number of robocalls continues to grow in the United States, and the figures tend to fluctuate based on the introduction of new government and industry attempts to stop them and robocallers' changing tactics to thwart those attempts (see Figure 1 ). In 2019, U.S. consumers received 58.5 billion robocalls, an increase of 22% from the 47.8 billion received in 2018, according to the YouMail Robocall Index. In 2016, the full first year the Robocall Index was tabulated, that figure was 29.1 billion callsâhalf the number of calls in 2019. Further, the FCC states that robocalls make up its biggest consumer complaint category, with over 200,000 complaints each yearâaround 60% of all the complaints it receives. Over the past three years, the FCC has pursued a multi-part strategy for combatting spoofed robocalls. The agency has issued hundreds of millions of dollars in fines for violations of its Truth in Caller ID rules; expanded its rules to reach foreign calls and text messages; enabled voice service providers to block certain clearly unlawful calls before they reach consumers' phones; clarified that voice service providers may offer call-blocking services by default; and called on the industry to \"trace back\" illegal spoofed calls and text messages to their original sources. The FCC estimates that eliminating illegal scam robocalls would provide a public benefit of $3 billion annually. A survey by Truecaller, a company that tracks and blocks robocalls, puts that figure as high as $10.5 billion. The Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act (TRACED Act) empowered the FCC to take specific actions to fight illegal robocalls; it was signed into law on December 30, 2019 ( P.L. 116-105 ). The law requires the FCC to administer a forfeiture penalty for violations (with or without intent) of the prohibition on certain robocalls; promulgate rules establishing when a provider may block a voice call based on information provided by the call authentication framework, called Secure Telephony Identity Revisited (STIR) and Signature-based Handling of Asserted information using toKENs (SHAKEN) (together known as \"STIR/SHAKEN\"), and establish a process to permit a calling party adversely affected by the framework to verify the authenticity of its calls; initiate a rulemaking to help protect subscribers from receiving unwanted calls or texts from a caller using an unauthenticated number; assemble, in conjunction with the Department of Justice, an interagency working group to study and report to Congress on the enforcement of the prohibition of certain robocalls; and initiate a proceeding to determine whether its policies regarding access to number resources could be modified to help reduce access to numbers by potential robocall violators. STIR/SHAKEN is seen by many, including the FCC, as a particularly important part of achieving the projected cost savings associated with eliminating illegal robocalls. STIR/SHAKEN must be implemented by June 30, 2021. Both the telecommunications industry and the FCC are taking steps to counter illegal robocalls. The telecommunications industry has developed new technologies and other tools to detect and block illegal robocalls. The FCC has taken steps to create a policy environment in which those tools can be implemented. The FCC has also expanded the scope of some existing rules and continues to target and fine illegal robocallers. In November 2017, the FCC authorized telecommunications providers to block calls originating from numbers that should not originate calls, or that are invalid, unallocated, or unused, without violating call completion rules. In December 2018, the FCC adopted a declaratory ruling clarifying that wireless providers are authorized to take measures to stop unwanted text messaging as well as unwanted calls. The FCC has also encouraged companies that block calls to establish an appeals process for erroneously blocked callers. The telecommunications industry has now widely implemented the blocking of numbers that should not originate calls, called the \"Do Not Originate\" (DNO) Registry. In November 2017, the FCC promulgated rules on the creation and use of the DNO Registry. The rules explicitly allow service providers to block calls from two categories of number: (1) numbers that the subscriber has asked to be blocked, such as \"in-bound only\" numbers (numbers that should not ever originate a call); and (2) unassigned numbers, as the use of such a number indicates that the calling party is intending to defraud a consumer. USTelecom, a trade association representing telecommunications-related businesses in the United States, maintains this registry and works with industry to implement DNO call blocking for in-bound numbers associated with government agencies. On December 20, 2019, the FCC released a public notice seeking comments for its first of two staff reports on call blocking issues mandated by the TRACED Act. The agency asked for comments on the availability and effectiveness of call blocking tools offered to consumers; the impact of the FCC's actions on illegal calls; the impact of call blocking on 911 services and public safety; and any other issues parties would like to see addressed. Comments were due January 29, 2020, and reply comments were due February 28, 2020. Illegitimate robocallers nearly always spoof their originating number. That is, they deliberately falsify the Caller ID information they are transmitting to disguise their identity. One way to help consumers recognize spoofing and identify scams is to verify who is calling through Caller ID authentication. Over the past few years, the telecommunications industry developed a set of protocols, the STIR/SHAKEN framework that enables phone companies to verify that the Caller ID information transmitted with a call matches the caller's phone number. Once fully implemented, STIR/SHAKEN is expected to reduce the effectiveness of illegal spoofing and enable the identification of illegal robocallers. The FCC mandated the adoption of STIR/SHAKEN on March 31, 2020. These steps are discussed in detail in the section of this report, \" FCC Order and Further Notice of Proposed Rulemaking, March 2020 .\" More than 30 voice service providers participate in the USTelecom Industry Traceback Group (ITG), which was formally established in May 2016. The ITG is a collaborative effort of companies across the wireline, wireless, voice over internet protocol, and cable industries that actively trace and identify the source of illegal robocalls. The ITG coordinates with federal and state law enforcement agencies to identify non-cooperative providers so those agencies can take enforcement action, as appropriate. During 2019, ITG members conducted more than 1,000 tracebacks, associated with more than 10 million illegal robocalls. This activity has resulted in more than 20 subpoenas and/or civil investigative demands from federal and state enforcement agencies. The ITG published its first status report in January 2020. When a consumer cancels service with a voice provider, the provider may reassign the number to a new consumer. If callers are unaware of the reassignment, they can make unwanted calls to the new consumer, unintentionally violating the Telephone Consumer Protection Act. In March 2018, the FCC proposed that one or more databases be created to provide callers with the comprehensive and timely information they need to discover potential number reassignments before making a call. In December 2018, the commission authorized the creation of a reassigned numbers database to enable callers to verify whether a telephone number has been permanently disconnected and is therefore eligible for reassignmentâbefore calling that numberâthereby helping to protect consumers with reassigned numbers from receiving unwanted calls. On January 24, 2020, the FCC requested public comment on the technical requirements developed for the database by the North American Numbering Council (NANC). Comments were due February 24, 2020, and reply comments were due March 9, 2020. On June 6, 2019, the FCC adopted a declaratory ruling and third further notice of proposed rulemaking (FNPRM), \"Advanced Methods to Target and Eliminate Unlawful Robocalls and Call Authentication Trust Anchor.\" The declaratory ruling empowers phone companies to block suspected illegal robocalls by default (customers may opt out) and asserts the FCC's view that carriers can allow consumers to opt in to more aggressive call-blocking tools, known as white-listing. Both blocking by default and opt-in white-listing tools seek to stop unwanted calls on the voice provider's network before calls reach the consumer's phone. Call-blocking programs have become more popular and effective in the past few years. There are numerous blocking tools for different platforms, and the number of available tools is growing. Many service providers only offer these programs on an opt-in basis, limiting their potential impact. Providing a call-blocking program as the default option can significantly increase consumer participation while maintaining consumer choice. White-list programs require consumers to specify the telephone numbers from which they wish to receive callsâall other calls are blocked. Smartphones have provided a new way to implement white-list programs, because they store the consumer's contact list. When the consumer's contacts change, the white list can be updated. The declaratory ruling asserts the FCC's view that nothing in the Communications Act of 1934 or the FCC's rules prohibits a service provider from offering opt-in white-list programs. The FNPRM requested feedback on several proposals: a safe harbor for providers that implement blocking of calls that fail caller authentication under STIR/SHAKEN, protections for critical calls, mandating Caller ID authentication, and measuring the effectiveness of robocall solutions. Comments were due on July 24, 2019, and reply comments were due on August 23, 2019. The FCC proposed a narrow safe harbor for voice service providers that offer call-blocking programs that take into account (1) whether a call has been properly authenticated under the SHAKEN/STIR framework and (2) may potentially be spoofed. The safe harbor limits liability for voice service providers if they block a legal robocall. Among other elements, the FCC proposed a safe harbor for voice service providers that choose to block calls that fail SHAKEN/STIR authentication and asked whether there might be other instances where authentication would fail. The FCC also asked how it could ensure that wanted calls are not blocked and sought comment as to how to identify and remedy the blocking of wanted calls. The FCC requested comments on whether it should require voice providers offering call-blocking to maintain a \"critical calls list\" of emergency numbers that must not be blocked. Such lists would include, for example, the outbound numbers of 911 call centers and other government emergency services. The blocking prohibition would apply only to STIR/SHAKEN-authenticated calls. The FCC requested comments on its proposal to mandate implementation of the STIR/SHAKEN authentication framework, if major voice providers fail to meet the end-of-2019 deadline for voluntary implementation. This is the topic of the FCC order issued on March 31, 2020, and is discussed in detail in the next section of this report, \" FCC Order and Further Notice of Proposed Rulemaking, March 2020 .\" The FCC requested feedback on whether it should create a mechanism to provide information to consumers about the effectiveness of voice providers' robocall solutions and, if so, how it should define and evaluate that effectiveness. The FCC also asked how it could obtain the information needed for such an evaluation. The FCC published its latest guidance and proposals on March 31, 2020, in a new order and FNPRM. The new rules require implementation of Caller ID authentication using STIR/SHAKEN. Specifically, the rules require \"all originating and terminating voice service providers to implement STIR/SHAKEN in the Internet Protocol (IP) portions of their networks by June 30, 2021, a deadline that is consistent with Congress's direction in the recently-enacted TRACED Act,\" described earlier in, \" The Telephone Robocall Abuse Criminal Enforcement and Deterrence Act .\" Most experts say that widespread deployment of STIR/SHAKEN will reduce the effectiveness of illegal spoofing, allow law enforcement to identify bad actors more easily, and help phone companies to identify calls with illegally spoofed Caller ID information before those calls reach their subscribers. The FNPRM requests public comments on expanding the STIR/SHAKEN implementation mandate to cover intermediate voice service providers; extending the implementation deadline by one year for small voice service providers pursuant to the TRACED Act; adopting requirements to promote caller ID authentication on voice networks that do not rely on IP technology; and implementing other aspects of the TRACED Act. Comments to the FNPRM are due on May 15, 2020, and reply comments are due on May 29, 2020. Other FCC actions to fight illegal robocallers include ongoing enforcement actions, an extension of a robocall ban to international callers, and the establishment of a hospital robocall protection group. Since January 2017, the FCC has imposed or proposed about $240 million in forfeitures against robocallers. One case involved an individual who made more than 96 million illegal robocalls over the course of three months. Another involved an individual who conducted a large-scale robocalling campaign that marketed health insurance to vulnerable populations. In both cases, the illegal calls disrupted an emergency medical paging service. In 2018, Congress amended the Communications Act of 1934 to prohibit spoofing activities directed at U.S. consumers from callers outside the United States and Caller ID spoofing using alternative voice and text messaging services. To implement these amendments, the FCC issued rules in July 2019 that expanded the act's prohibition on the use of misleading and inaccurate Caller ID information. The TRACED Act of 2019 required the FCC to establish a Hospital Robocall Protection Group. For most consumers, robocalls are a potentially fraudulent nuisance. For hospitals, though, the robocalls can present challenges that are increasingly threatening doctors and patients: At Tufts Medical Center, administrators registered more than 4,500 calls between about 9:30 and 11:30 a.m. on April 30, 2018, said Taylor Lehmann, the center's chief information security officer. Many of the messages seemed to be the same: Speaking in Mandarin, an unknown voice threatened deportation unless the person who picked up the phone provided their personal information. The FCC began soliciting nominations for the group in March 2020. Once established, the group is to be charged to develop and issue best practices regarding (1) how voice service providers can better combat unlawful robocalls made to hospitals; (2) how hospitals can better protect themselves from such calls; and (3) how the federal government and state governments can help combat such calls. The FCC has taken wide-ranging steps to stop illegal robocalls, including imposing fines on law breakers; mandating the implementation of call authentication technologies by the telecommunications industry; creating databases of numbers that should not be called; and providing regulatory permission to implement call blocking. Although these steps appear to be having some impact, scammers remain determined to continue their attempts to defraud consumers using robocalls. Historically, decreases in the number of robocalls are sometimes followed shortly thereafter by spikes in those numbers, illustrating how robocallers continue to overcome measures to stop them (e.g., by changing their originating numbers). Most of the tools being used against robocalls have been developed recently, while some are still under development. Therefore, it may take telecommunications providers some time to fully implement them, and it may be some time before a long-term and ongoing decrease in robocall numbers will be realized. The positive impacts of FCC initiatives on fraudulent robocalls, as well as potential negative impacts on the telemarketing industry due to blocking legitimate calls, may be the subject of continued oversight by Congress.", "summary": "The number of robocalls continues to grow in the United States, and the figures tend to fluctuate based on the introduction of new government and industry attempts to stop them and robocallers' changing tactics to thwart those attempts (see Figure ). In 2019, U.S. consumers received 58.5 billion robocalls, an increase of 22% from the 47.8 billion received in 2018, according to the YouMail Robocall Index. In 2016, the full first year the Robocall Index was tabulated, that figure was 29.1 billion callsâhalf the number of calls in 2019. Further, the Federal Communications Commission (FCC) states that robocalls make up its biggest consumer complaint category, with over 200,000 complaints each yearâaround 60% of all the complaints it receives. A robocall is any telephone call that delivers a pre-recorded message using an automatic (computerized) telephone dialing system. The Telephone Consumer Protection Act of 1991 ( P.L. 102-243 ) regulates robocalls. Legal robocalls are used by legitimate call originators for political, public service, and emergency messages. Illegal robocalls are usually associated with fraudulent telemarketing campaigns. The FCC estimates that eliminating illegal scam robocalls would provide a public benefit of $3 billion annually. A survey by Truecaller, a company that tracks and blocks robocalls, puts that figure as high as $10.5 billion. Figure . Robocalls per Month, April 2019 through March 2020 (in billions) Source: Robocall Index, https://www.robocallindex.com . Over the past three years, the FCC has pursued a multi-part strategy for combatting illegal robocalls. The agency has issued hundreds of millions of dollars in fines for violations of its Truth in Caller ID rules; expanded its rules to reach foreign calls and text messages; enabled voice service providers to block certain clearly unlawful calls before they reach consumers' phones; clarified that voice service providers may offer call-blocking services by default; and called on the industry to \"trace back\" illegal spoofed calls and text messages to their original sources. Other wide-ranging steps by the FCC to stop illegal robocalls include mandating the implementation of call authentication technologies by the telecommunications industry, creating databases of numbers that should not be called, and establishing a reassigned numbers database. Major recent FCC regulatory actions include a June 2019 FCC Declaratory Ruling and Third Further Notice of Proposed Rulemaking, and a March 2020 FCC Order and Further Notice of Proposed Rulemaking. The FCC was empowered to take many of these actions by the Pallone-Thune Telephone Robocall Abuse Criminal Enforcement and Deterrence Act (TRACED Act) signed into law on December 30, 2019 ( P.L. 116-105 ). Although these steps appear to be having some impact, scammers remain determined to continue their attempts to defraud consumers using robocalls. Historically, decreases in the number of robocalls are sometimes followed shortly thereafter by spikes in those numbers, illustrating how robocallers continue to overcome measures to stop them (e.g., by changing their originating numbers). Most of the tools being used against robocalls have been developed recently, while some are still under development. Therefore, it may take telecommunications providers some time to fully implement them, and it may be some time before a long-term and ongoing decrease in robocall numbers will be realized. The positive impacts of FCC initiatives on fraudulent robocalls, as well as potential negative impacts on the telemarketing industry due to blocking legitimate calls, may be the subject of continued oversight by Congress.", "document_type": "crs"}
{"report": "The remnants of the Vietnam War (1963-1975) and other regional conflicts have left mainland Southeast Asia as a region heavily contaminated with unexploded ordnance, or UXO. More than 45 years after the United States ceased its extensive bombing of Cambodia, Laos, and Vietnam, hundreds of civilians are still injured or killed each year by UXO from those bombing missions or by landmines laid in conflicts be tween Cambodia and Vietnam (1975-1978), China and Vietnam (1979-1990) and during the Cambodian civil war (1978-1991). While comprehensive surveys are incomplete, it is estimated that more than 20% of the land in Cambodia, Laos, and Vietnam are contaminated by UXO. Over more than 25 years, Congress has appropriated more than $400 million to assist Cambodia, Laos, and Vietnam in clearing their land of UXO. More than 77% of the assistance has been provided via programs funded by the Department of State. In addition, the United States has provided treatment to those individuals maimed by UXO through U.S. Agency for International Development (USAID) programs and the Leahy War Victims Fund. Despite ongoing efforts by the three countries, the United States, and other international donors, it reportedly could take 100 years or more, at the current pace, to clear Cambodia, Laos, and Vietnam of UXO. During that time period, more people will likely be killed or injured by UXO. In addition, extensive areas of the three nations will continue to be unavailable for agriculture, industry, or habitation, hindering the economic development of those three nations. In 2016, President Obama pledged $90 million over a three-year period for UXO decontamination programs in Laosâan amount nearly equal to the total of U.S. UXO assistance to that nation over the previous 20 years. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) provides $196.5 million globally for \"conventional weapons destruction,\" including $159.0 million for \"humanitarian demining,\" under the Department of State's International Security Assistance programs. Of the humanitarian demining funds, $3.85 million is appropriated for Cambodia, $30.0 million for Laos, and $15.0 million for Vietnam. The act also provides $13.5 million for global health and rehabilitation programs under the Leahy War Victims Fund. Moving forward, the 116 th Congress will have an opportunity to consider what additional efforts, if any, the U.S. government should undertake to address the war legacy issue of UXO in mainland Southeast Asia in terms of the decontamination of the region and the provision of medical support or assistance to UXO victims. Beyond the immediate assistance such UXO-related programs would provide to Cambodia, Laos, and Vietnam, U.S. aid on this war legacy issue may also foster better bilateral ties to those nations. For example, some observers view U.S. assistance to Vietnam for the war legacy issue of Agent Orange/dioxin contamination as playing an important role in improving bilateral relations. Unexploded ordnance (UXO) is defined as military ammunition or explosive ordnance which has failed to function as intended. UXO is also sometimes referred to as Explosive Remnants of War (ERW) or \"duds\" because of their failure to explode or function properly. UXO includes mines, artillery shells, mortar rounds, hand or rocket-propelled grenades, and rocket or missile warheads employed by ground forces (see Figure 1 ). Aerial delivered bombs, rockets, missiles, and scatterable mines that fail to function as intended are also classified as UXO. While many of these weapons employ unitary warheads, some weaponsâprimarily certain artillery shells, rocket and missile warheads and aerial bombsâemploy cluster munitions, which disperse a number of smaller munitions as part of their explosive effect. Often times, these submunitions fail to function as intended. In addition, abandoned or lost munitions that have not detonated are also classified as UXO. The probability of UXO detonating is highly unpredictable; it depends on whether or not the munition has been fired, the level of corrosion or degradation, and the specific arming and fusing mechanisms of the device. \"Similar items may respond very differently to the same actionâone may be moved without effect, while another may detonate. Some items may be moved repeatedly before detonating and others may not detonate at all.\" In all cases, UXO poses a danger to both combatants and unaware and unprotected civilians. Military munitions are used in a variety of ways. Some are used in direct force-on-force combat against troops, combat vehicles, and structures. Others, such as emplaced anti-personnel and anti-vehicle mines or scatterable mines, can be used to attack targets, deny enemy use of key terrain, or establish barriers to impede or influence enemy movement. Cluster munitions can either explode on contact once dispensed or can remain dormant on the ground until triggered by human or vehicular contact. The military utility of cluster weapons is that they can create large areas of destruction, meaning fewer weapons systems and munitions are needed to attack targets. Two particular classes of ordnanceâmines and cluster munitionsâhave received a great deal of attention. Emplaced mines by their very nature pose a particular threat because they are often either buried or hidden and, unless their locations are recorded or some type of warning signs are posted, they can become easily forgotten or abandoned as the battlefield shifts over time. Cluster munitions are dispersed over an area and are generally smaller than unitary warheads, which can make them difficult to readily identify (see Figure 2 ). Since the conclusion of the Vietnam War, many of the newer mines and cluster munitions have a self-destruct or disarming capability. However, as long as their explosive charge remains viable, they pose a hazard to people. Both mines and cluster munitions have been subject to international protocols to limit or ban their development, transfer, and use. The 1999 Ottawa Convention \"prohibits the use, stockpiling, production, and transfer of anti-personnel landmines (APLs). It requires states to destroy their stockpiled APLs within four years and eliminate all APL holdings, including mines currently planted in the soil, within 10 years.\" The 2010 Convention on Cluster Munitions prohibits all use, stockpiling, production and transfer of cluster munitions. The United States has refused to sign either convention, citing the military necessity of these munitions. The United States has, however, been a States Party to the Convention on the Use of Certain Conventional Weapons (CCW) since 1995, which \"aims to protect military troops from inhumane injuries and prevent noncombatants from accidentally being wounded or killed by certain types of arms.\" In 2009, the United States ratified Protocol V of the CCW, Explosive Remnants of War. Protocol V \"covers munitions, such as artillery shells, grenades, and gravity bombs, that fail to explode as intended, and any unused explosives left behind and uncontrolled by armed forces.\" Under Protocol V \"the government controlling an area with explosive remnants of war is responsible for clearing such munitions. However, that government may ask for technical or financial assistance from others, including any party responsible for putting the munitions in place originally, to complete the task. No state-party is obligated to render assistance.\" The United States has undertaken a variety of initiativesâincluding mandating changes to munitions design and adopting federal safeguards and policy regulating their usageâto help limit the potential hazards posed to noncombatants by these UXO. On June 19, 2008, then-Secretary of Defense Robert Gates issued a new policy on the use of cluster munitions. The policy stated that \"[c]luster munitions are legitimate weapons with clear military utility,\" but it also recognized \"the need to minimize the unintended harm to civilians and civilian infrastructure associated with unexploded ordnance from cluster munitions.\" To that end, the policy mandated that after 2018, \"the Military Departments and Combatant Commands will only employ cluster munitions containing submunitions that, after arming, do not result in more than 1% unexploded ordnance (UXO) across the range of intended operational environments.\" On November 30, 2017, then-Deputy Secretary of Defense Patrick Shanahan issued a revised policy on cluster munitions. The revised policy reverses the 2008 policy that established an unwaiverable requirement that cluster munitions used after 2018 must leave less than 1% of unexploded submunitions on the battlefield. Under the new policy, combatant commanders can use cluster munitions that do not meet the 1% or less unexploded submunitions standard in extreme situations to meet immediate warfighting demands. Furthermore, the new policy does not establish a deadline to replace cluster munitions exceeding the 1% rate, and these munitions are to be removed only after new munitions that meet the 1% or less unexploded submunitions standard are fielded in sufficient quantities to meet combatant commander requirements. However, the new DOD policy stipulates that the Department \"will only procure cluster munitions containing submunitions or submunition warheads\" meeting the 2008 UXO requirement or possessing \"advanced features to minimize the risks posed by unexploded submunitions.\" Although UXO in Southeast Asia can date back to World War II, the majority of the hazard is attributed to the Vietnam War. While an undetermined amount of UXO associated with the Vietnam War was from ground combat and emplaced mines, an appreciable portion of UXO is attributed to the air war waged by the United States from 1962 to 1973, considered by some to be one of the most intense in the history of warfare. One study notes the United States dropped a million tons of bombs on North Vietnam. Three million more tons fell on Laos and Cambodiaâsupposedly \"neutral\" countries in the conflict. Four million tons fell on South VietnamâAmerica's ally in the war against communist aggression. When the last raid by B-52s over Cambodia on August 15, 1973, culminated American bombing in Southeast Asia, the United States had dropped more than 8 million tons of bombs in 9 years. Less than 2 years later, Cambodia, Laos, and South Vietnam were communist countries. The U.S. State Department in 2014 characterized the problem by country. Cambodia: Nearly three decades of armed conflict left Cambodia severely contaminated with landmines and unexploded ordnance (UXO). The Khmer Rouge, the Royal Cambodian Armed Forces (RCAF), the Vietnamese military, and, to a lesser extent, the Thai army, laid extensive minefields during the Indochina wars. These minefields are concentrated in western Cambodia, especially in the dense \"K-5 mine belt\" along the border with Thailand, laid by Vietnamese forces during the 1980s. UXOâmostly from U.S. air and artillery strikes during the Vietnam War and land battles fought along the border with Vietnamâcontaminates areas in eastern and northeastern Cambodia. While the full extent of contamination is unknown, the Landmine and Cluster Munition Monitor reports that a baseline survey completed in 2012 of Cambodia's 124 mine-affected districts found a total of 1,915 square kilometers (739 square miles) of contaminated land. Laos: Laos is the most heavily bombed country per capita in the world as a result of the Indochina wars of the 1960s and 1970s. While landmines were laid in Laos during this period, UXO, including cluster munitions remnants (called \"bombies\" in Laos), represents a far greater threat to the population and account for the bulk of contamination. UXO, mostly of U.S. origin, remains in the majority of the country's 18 provinces. Vietnam: UXO contaminates virtually all of Vietnam as a result of 30 years of conflict extending from World War II through the Vietnam War. The most heavily contaminated provinces are in the central region and along the former demilitarized zone (DMZ) that divided North Vietnam and South Vietnam. Parts of southern Vietnam and areas around the border with China also remain contaminated with UXO. The Kingdom of Cambodia is among the world's most UXO-afflicted countries, contaminated with cluster munitions, landmines, and other undetonated weapons. U.S. bombing of northeastern Cambodia during the Vietnam War, the Vietnamese invasion in 1979, and civil wars during 1970s and 1980s all contributed to the problem of unexploded ordnance. In 1969, the United States launched a four-year carpet-bombing campaign on Cambodia, dropping 2.7 million tons of ordnance, including 80,000 cluster bombs containing 26 million submunitions or bomblets. Up to one-quarter of the cluster bomblets failed to explode, according to some estimates. In addition, the Vietnamese army mined the Cambodia-Thai border as it invaded the country and took control from the Khmer Rouge in 1979. The Vietnamese military, Vietnam-backed Cambodian forces, the Khmer Rouge, and Royalist forces reportedly all deployed landmines during the 1979-1989 civil war period. Cambodian Prime Minister Hun Sen occasionally has referred to the U.S. bombing of Cambodia, which occurred between 1969 and 1973, when criticizing the United States; however, the historical event has not been a major issue in recent U.S.-Cambodian relations. There have been over 64,700 UXO casualties in Cambodia since 1979, including over 19,700 deaths. The Cambodia Mine/ERW Victim Information System (CMVIS) has recorded an overall trend of significant decreases in the number of annual casualties: 58 in 2017 compared to 111 in 2015, 186 in 2012 and 286 in 2010. Despite progress, the migration of poor Cambodians to the northwestern provinces bordering Thailand, one of the most heavily mined areas in the world, has contributed to continued casualties. Cambodia, with 25,000 UXO-related amputees, has the highest number of amputees per capita in the world. The economic costs of UXO include obstacles to infrastructure development, land unsuitable for agricultural purposes, and disruptions to irrigation and drinking water supplies. Open Development Cambodia, a website devoted to development-related data, reports that since the early 1990s, about 580 square miles (1,500 square kilometers) of land has been cleared of UXO. Â Estimates of the amount of land still containing UXO vary. According to some reports, about 50% of contaminated land has been cleared, and an estimated 630 square miles (1,640 square kilometers) of land still contain UXO. Many of the remaining areas are the most densely contaminated, including 21 northwestern districts along the border with Thailand that contain anti-personnel mines laid by the Vietnamese military and that account for the majority of mine casualties. Between 1993 and 2017, the U.S. government contributed over $133.6 million for UXO removal and disposal, related educational efforts, and survivor assistance programs in Cambodia. These activities are carried out largely by U.S. and international nongovernmental organizations (NGOs), in collaboration with the Cambodian Mine Action Center, a Cambodian NGO, and the Cambodian government. USAID's Leahy War Victims Fund has supported programs to help provide medical and rehabilitation services and prosthetics to Cambodian victims of UXO. Nonproliferation, Anti-terrorism, Demining and Related Programs (NADR) funding for demining activities was $5.5 million in both 2015 and 2016, $4.2 in 2017, and $2.9 million in 2018. Global donors contributed over $132 million between 2013 and 2017, mostly for clearance efforts. In 2017, the largest contributors of demining and related assistance were the United States, United Kingdom, Australia, Japan, and Germany, providing approximately $10.6 million in total. In 2018, the Cambodian government and Cambodian Mine Action and Victim Assistance Authority (CMAA), a government agency, launched the National Mine Action Strategy (NMAS) for 2018-2025. The goal of removing UXO from all contaminated areas by 2025 would require the clearance of 110 square kilometers per year at a cost of about $400 million. The NMAS estimated that at the current rate of progress, however, Cambodia would need a little over 10 years to complete clearance of all known mined areas. Some experts are concerned that declining international assistance could jeopardize clearance goals. In 2017, total international demining support to Cambodia decreased by 61%, largely due to lower contributions from Australia and Japan. From 1964 through 1973, the United States military reportedly flew 580,000 bombing runs and dropped over 2 million tons of cluster munitions, including over 270 million cluster bombs, on the small land-locked country. The total was more than the amount dropped on Germany and Japan combined in World War II. An estimated one-third of these munitions failed to explode. The Lao government claims that up to 75-80 million submunitions or bomblets released from the cluster bombs remain in over one-third of the country's area. Military conflicts during the French colonial period and the Laotian Civil War during the 1960s and 1970s have also contributed to the problem of UXO/ERW. The U.S. bombing campaign in Laos was designed to interdict North Vietnamese supply lines that ran through Laos. The bombing campaign also supported Lao government forces fighting against communist rebels (Pathet Lao) and their North Vietnamese allies. Cluster munitions were considered the \"weapon of choice\" in Laos because they could penetrate the jungle canopy, cover large areas, and successfully attack convoys and troop concentrations hidden by the trees. The most heavily bombed areas in Laos were the northeastern and southern provinces, although UXO can be found in 14 of the country's 17 provinces. The bombings in the northeast were intended to deny territory, particularly the Plain of Jars, to Pathet Lao and North Vietnamese forces and, in the south, to sever the Ho Chi Minh Trail, which crossed the border into eastern Laos. The northeastern part of Laos was also used as a \"free drop zone\" where planes that had taken off from bases in Thailand and had been unable to deliver their bombs, could dispose of them before returning to Thailand. According to the Geneva-based Landmine and Cluster Munition Monitor , since 1964, there have been over 50,000 mine and ERW casualties in Laos, including over 29,000 people killed. An estimated 40% of victims are children. In 2012, the Lao government's Safe Path Forward Strategic Plan II set a target to reduce UXO-related casualties to 75 per year by 2020, from levels between 100-200 victims annually during the 2000s. The country has already met these goals: in 2017, the number of reported casualties was 41, including four killed. Cluster munitions have hampered economic development in the agricultural country. UXO contamination affects one-quarter of all Lao villages, and 22% of detonations occur through farming activities. Unexploded ordnance adversely affects not only agricultural production, but also mining, forestry, the development of hydropower projects, and the building of roads, schools, and clinics. Expenditures on demining efforts and medical treatment divert investment and resources from other areas and uses. Many injured UXO survivors lose the ability to be fully productive. According to the Lao government, there appears to be a significant correlation between the presence of UXO and the prevalence of poverty. Lao PDR officials state that the country needs $50 million annually for ongoing UXO/ERW clearance, assistance to victims, and education, of which the Lao government contributes $15 million. International assistance comes from numerous sources, including Japan, the United States, and the United Nations Development Program (UNDP). The United States has contributed a total of $169 million for UXO clearance and related activities since 1995, with funding directed to international NGOs and contractors. That makes Laos the third largest recipient of conventional weapons destruction funding over that period, after Afghanistan and Iraq. In 2016, the United States announced a three-year, $90 million increase in assistance covering FY2016-FY2018. Half the amount, or $45 million, is aimed at conducting the first nationwide cluster munitions remnant survey, while the other half is aimed at clearance activities. Since the early 1990s, the U.S. Department of Defense (DOD) has been involved in training Lao personnel in demining techniques. U.S. UXO clearance and related humanitarian aid efforts, administered by the State Department (DOS), began in 1996. U.S. support also helped to establish the Lao National Demining Office, the UXO Lao National Training Center, and the Lao National Regulatory Authority. The United States finances the bulk of its mine clearance operations through the NADR foreign aid account. NADR demining programs constitute the largest U.S. assistance activity in Laos, which receives little U.S. development aid compared to other countries in the region. It has been channeled primarily to international nongovernmental organizations (NGOs), the UNDP's trust fund for UXO clearance, and the Lao National Unexploded Ordnance Program (UXO Lao). Laos also has received humanitarian assistance through the USAID Leahy War Victims Fund for prosthetics, orthotics, and rehabilitation ($1.4 million in 2011-2013). For many years in the 1990s and 2000s, UXO-related clearance programs were one of the primary areas of substantive cooperation between the United States and Laos. Some argue that such activity has helped foster bilateral ties with a country whose authoritarian government is deeply inward looking. When President Obama became the first U.S. President to visit Laos in 2016, announcing the $90 million UXO aid package, he said: \"Given our history here, I believe that the United States has a moral obligation to help Laos heal. And even as we continue to deal with the past, our new partnership is focused on the future.\" War Legacy issuesâAgent Orange/dioxin contamination, MIAs, and UXOâplayed an important role in the reestablishment of diplomatic relations between the United States and Vietnam, and it led to the development of a comprehensive partnership between the two nations. Vietnam's voluntary effort to locate and return the remains of U.S. MIAs was a significant factor in the restoration of diplomatic relations. U.S. assistance to decontaminate Da Nang airport of Agent Orange/dioxin likely contributed to the two nations' move to a comprehensive partnership. While not as prominent, U.S. UXO assistance to Vietnam most likely has been a factor in establishing trust between the two governments. The UXO in Vietnam are remnants from conflicts spanning more than a century, potentially as far back as the Sino-French War (or Tonkin War) of 1884-1885 and as recent as the Cambodian-Vietnamese War (1975-1978) and the border conflicts between China and Vietnam from 1979 to 1991. According to one account, during Vietnam's conflicts with France and the United States (1945-1975), more than 15 million tons of explosives were deployedâfour times the amount used in World War II. It is generally presumed, however, that the majority of the UXO in Vietnam are from the Vietnam War, also known in Vietnam as \"the Resistance War Against America\" (1955-1975). Estimates of the amount of UXO in Vietnam vary. According to one source, \"at least 350,000 tons of live bombs and mines remain in Vietnam.\" Another source claims \"around 800,000 tons of unexploded ordnance remains scattered across the country.\" Viewed in terms of land area, the Vietnamese government estimates that between 6.1 and 6.6 million hectares (23,500-25,500 square miles) of land in Vietnamâor 19% to 21% of the nationâis contaminated by UXO. An official Vietnamese survey started in 2004 and completed in 2014 estimated that 61,308 square kilometers (23,671 square miles) was contaminated with UXO. According to the survey, UXO is scattered across virtually all of the nation, but the province of Quang Tri, along the previous \"demilitarized zone\" (DMZ) between North and South Vietnam, is the most heavily contaminated (see Figure 3 ). Figures on the number of UXO casualties in Vietnam also vary. One source says, \"No one really knows how many people have been injured or killed by UXO since the war ended, but the best estimates are at least 105,000, including 40,000 deaths.\" In its report on UXO casualties in Vietnam, however, the Landmine and Cluster Munition Monitor listed the casualty figures for 1975-2017 as 38,978 killed and 66,093 injured. For 2017 only, the Landmine and Cluster Munition Monitor reported eight deaths and six injured. A survey of UXO casualties determined that the three main circumstances under which people were killed or injured by UXO were (in order): scrap metal collection (31.2%); playing/tampering (27.6%); and cultivating or herding (20.3%). In some of Vietnam's poorer provinces, people proactively seek out and collect UXO in order to obtain scrap metal to sell to augment their income, despite the inherent danger. On March 8, 2018, Vietnam's Ministry of National Defence (MND) established the Office of the Standing Agency of the National Steering Committee of the Settlement of Post-war Unexploded Ordnance and Toxic Chemical Consequences, or Office 701, to address the nation's UXO issue. Office 701 is responsible for working with individuals and organizations to decontaminate Vietnam of UXO to ensure public safety, clean the environment, and promote socio-economic development. Under a 2013 directive by the Prime Minister, the Vietnam National Mine Action Center (VNMAC) was established within the MND with responsibility for proposing policy, developing plans, and coordinating international cooperation for UXO clearance. The MND's Center for Bomb and Mine Disposal Technology (BOMICEN) is the central coordinating body for Vietnam's UXO clearance operations. In addition, Vietnam created a Mine Action Partnership Group (MAPG) to improve coordination of domestic and international UXO clearance operations. BOMICEN typically sets up project management teams (PMTs) that work with provincial or local officials to identify, survey, and decontaminate UXO. The PMTs usually interview local informants about possible UXO sites and then conduct field evaluations to determine if UXO is present and suitable for removal by Vietnam's Army Engineering Corps. The PMTs also collect information about the decontamination site and report back to BOMICON about the location and type of UXO removed. Besides the clearance operations directly conducted by Vietnam, several nations and international organizations conduct UXO removal projects in Vietnam, including the Danish Demining Group (DDG), the Mines Advisory Group (MAG), Norwegian People's Aid (NPA), and PeaceTrees Vietnam. In 2016, the Korea International Cooperation Agency (KOICA), in cooperation with VNMAC and the United Nations Development Programme (UNDP), initiated a $32 million, multi-year UXO project in the provinces of Binh Dinh and Quang Binh. The joint project began operations in March 2018 and is scheduled to end in December 2020. NGOs working in Vietnam report some issues in their collaboration with the MND, which has declared portions of contaminated provinces off limits for UXO surveying and decontamination. Many of these areas contain villages and towns inhabited by civilians. In addition, the MND has not been providing information about any UXO clearance efforts being conducted in these areas. The lack of information sharing has hindered efforts to establish a nationwide UXO database that is being used to refine UXO location and clearance techniques. Since 1993, the United States has provided UXO and related assistance to Southeast Asia via several different channels, including the Center for Disease Control (CDC), the Department of Defense (DOD), the Department of State (DOS), and the U.S. Agency for International Development (USAID)(see Table 1 ). For all three countries covered by this report, most of the assistance has been provided by DOS through its Nonproliferation, Anti-terrorism, Demining and Related Programs/Conventional Weapons Destruction (NADR-CWD) account. USAID assistance to Cambodia, Laos, and Vietnam has consisted primarily of Leahy War Victims Fund programs for prostheses, physical rehabilitation, training, and employment. Laos, Cambodia, and Vietnam have been the largest recipients of U.S. conventional weapons destruction (CWD) funding in East Asia. In December 2013, the United States and Vietnam signed a Memorandum of Understanding on cooperation to overcome the effects of \"wartime bomb, mine, and unexploded ordnance\" in Vietnam. In their November 2017 joint statement, President Trump and President Tran Dai Quang \"committed to cooperation in the removal of remnants of explosives from the war.\" Department of State and USAID demining and related assistance support the work of international NGOs in Cambodia, Laos, and Vietnam. International NGOs work primarily with local NGOs in Cambodia and, to a greater extent, collaborate with government entities in Laos and Vietnam. The main areas of assistance are clearance, surveys, and medical assistance. In Cambodia, the Department of State and USAID support programs that collaborate with and train Cambodian organizations in clearance activities, conduct geographical surveys, help process explosive material retrieved from ERW, and provide mine risk education. In Laos, U.S. assistance includes clearance and survey efforts, medical and rehabilitation services, education and training assistance to victims and families, and mine risk education. In Vietnam, the United States provides mine clearance and survey support, capacity building programs, and medical assistance and vocational training for victims. DOD's role in remediating UXO in Southeast Asia falls under the category of \"Support to Humanitarian Mine Action (HMA).\" Chairman of the Joint Chiefs of Staff (CJCS) Instruction \"Department of Defense Support to Humanitarian Mine Action, CJCSI 3207.0IC\" dated September 28, 2018, covers DOD's responsibilities in this regard. DOD's stated policy is to relieve human suffering and the adverse effects of land mines and other explosive remnants of war (ERW) on noncombatants while advancing the Combatant Commanders' (CCDRs') theater campaign plan and U.S. national security objectives. The DOD HMA program assists nations plagued by land mines and ERW by executing \"train-the-trainer\" programs of instruction designed to develop indigenous capabilities for a wide range of HMA activities. It is important to note that U.S. Code restricts the extent to which U.S. military personnel and DOD civilian employees can actively participate in UXO activities as described in the following section: Exposure of USG Personnel to Explosive Hazards. By law, DOD personnel are restricted in the extent to which they may actively participate in ERW clearance and physical security and stockpile management (PSSM) operations during humanitarian and civic assistance. Under 10 U.S.C. 401(a)(1), Military Departments may carry out certain \"humanitarian and civic assistance activities\" in conjunction with authorized military operations of the armed forces in a foreign nation. 10 U.S.C. 407(e)(1) defines the term \"humanitarian demining assistance\" (as part of humanitarian and civic assistance activities) as \"detection and clearance of land mines and other ERW, and includes the activities related to the furnishing of education, training, and technical assistance with respect to explosive safety, the detection and clearance of land mines and other ERW, and the disposal, demilitarization, physical security, and stockpile management of potentially dangerous stockpiles of explosive ordnance.\" However, under 10 U.S.C. 407(a)(3), members of the U.S. Armed Forces while providing humanitarian demining assistance shall not \"engage in the physical detection, lifting, or destroying of land mines or other explosive remnants of war, or stockpiled conventional munitions (unless the member does so for the concurrent purpose of supporting a United States military operation).\" Additionally, members of the U.S. Armed Forces shall not provide such humanitarian demining and civic assistance \"as part of a military operation that does not involve the armed forces.\" Under DOD policy, the restrictions in 10 U.S.C. 407 also apply to DOD civilian personnel. In general terms, U.S. law restricts DOD to \"train-the-trainer\" type UXO remediation activities unless it is required as part of a U.S. military operation involving U.S. armed forces. U.S. Indo Pacific Command (USINDOPACOM) is responsible for U.S. military activities in Vietnam, Cambodia, and Laos. As part of USINDOPACOM's Theater Campaign Plan, selected UXO remediation activities for Vietnam, Cambodia, and Laos are briefly described in the following sections: Vietnam: USINDOPACOM has tasked U.S. Army Pacific (USARPAC) as the primary component responsible for land-based UXO operations and the Pacific Fleet (PACFLT) as the primary component responsible for underwater UXO operations in Vietnam. FY2018 accomplishments and FY2019 and FY2020 plans are said to include: FY2018 : Trained individuals on International Mine Action Standards (IMAS) Level I and II; Trained individuals on Explosive Ordnance Disposal (EOD) instructor development; Familiarized individuals on EOD equipment; Conducted medical first responder training; Trained individuals on medical instructor development; Trained individuals on underwater remote vehicle operations; and Trained individuals on ordnance identification. FY2019 : Continue training on International Mine Action Standards Level I; Train individuals on how to develop training lanes for demining; Exercise IMAS Level I concepts; Increase Vietnamese medical first responder force structure; and Continue EOD instructor development. FY2020 : Plan to train on IMAS Level II with qualified IMAS Level I students; Plan to enhance advanced medical-related technique training; Plan to train in demolition procedures; Plan to train in maritime UXO techniques; Plan to conduct mission planning and to conduct a full training exercise; and Plan to conduct instructor development. Cambodia: USINDOPACOM has tasked Marine Forces Pacific (MARFORPAC) to be responsible for land-based UXO operations in Cambodia. Plans for FY2019 through FY2021 include: FY2019 : Train in IMAS EOD Level I; Train on EOD instructor development; Familiarize students on EOD Level I equipment; Review medical first responder training; Train on medical instructor development; Train in ordnance identification; and Train in IMAS Demining Non-Technical Survey/Technical Survey (NTS/TS) techniques. FY2020 : Plan to continue to develop capacity with IMAS EOD Level I and II training; Plan to continue to build capacity with IMAS Demining Non-Technical Survey/Technical Survey techniques; If EOD Level I and II training successful, plan to initiate EOD Level III training in late FY2020; Plan to increase student knowledge of lane training development; Plan to exercise IMAS Level II concepts; Plan to increase Cambodian medical first responder force structure; and Plan to continue EOD instructor development. FY2021 : Plan to train on IMAS EOD Level II and EOD Level III with the qualified Level I and Level II students to increase their numbers; Plan to train on IMAS Demining NTS/TS with the qualified students to increase their numbers; Plan to enhance advanced medical-related techniques; Plan to train in demolition procedures; Plan to conduct mission planning and a full training exercise; and Plan to conduct instructor development events. Laos: USINDOPACOM has tasked Marine Forces Pacific (MARFORPAC) to be responsible for land-based UXO operations in Laos. Plans for FY2019 through FY2021 include: FY2019: Conduct training on IMAS EOD Level I; Conduct training on EOD instructor development; Conduct familiarization on EOD Level I equipment; Conduct a review of medical first responder training; Conduct medical instructor development training; and Conduct training on ordnance identification. FY2020 : Plan to continue to build capacity with training in IMAS EOD Level I and II; Plan to increase knowledge on lane training development; Plan to exercise IMAS Level II concepts; Plan to increase medical first responder force structure and knowledge; and Plan to continue EOD instructor development. FY2021 : Plan to train on IMAS EOD Level II with the qualified Level I and Level II students to increase their numbers; Plan to enhance advance medical-related techniques; Plan to train in demolition procedures; Plan to conduct mission planning and conduct a full training exercise; and Continue to conduct instructor development. The U.S. government has been providing UXO-related assistance to Southeast Asia for over 25 years, with contributions amounting to over $400 million. Despite this sustained level of support, as well as the efforts of the governments of Cambodia, Laos, and Vietnam, it may take decades to clear these three nations of the known UXO contamination. These estimates, however, are based on incomplete information, as systematic nationwide UXO surveys have not been completed in either Cambodia or Laos. The Legacies of War Recognition and Unexploded Ordnance Removal Act ( H.R. 2097 ) would authorize $50 million each year for fiscal years 2020 to 2024 for address the UXO issue in Cambodia, Laos, and Vietnam. The legislation also would authorize the President to provide humanitarian assistance for developing national UXO surveys, UXO clearance, and support for capacity building, risk education and UXO victims assistance in each nation. It would require the President to provide an annual briefing on related activities to the House Committee on Appropriations, the House Committee on Foreign Affairs, the Senate Committee on Appropriations, and the Senate Committee on Foreign Relations. Southeast Asia's ongoing UXO challenge may present a number of issues for Congress to consider and evaluate. Among those issues are F undin g levels âIt is uncertain how much money it would take to decontaminate all three nations or provide adequate assistance to their UXO victims. Given this uncertainty, is the level of U.S. assistance being provided to Cambodia, Laos, and Vietnam to conduct humanitarian demining projects adequate to significantly reduce the UXO casualty risk in a reasonable time period? In addition, is the recent distribution of funding across the three nations equitable given their relative degrees of UXO contamination and their internal ability to finance demining projects? Coordination across agencies âIs there appropriate coordination across the U.S. agenciesâthe Department of Defense, the Department of State, and USAIDâin providing demining assistance in Southeast Asia? Are these agencies utilizing the appropriated funds efficiently and effectively? Focus on clearance âMost of the appropriated funds have been for humanitarian demining projects and technical support, with less funding for assistance to UXO victims. The focus on clearance, rather than assistance on UXO victims, may in part be due to a concern about possible post-conflict liability issues. In light of past practices, should the U.S. government increase its support for UXO victims in Cambodia, Laos, and Vietnam beyond those being currently provided via the Leahy War Victims Fund? Implications for bilateral relations âHas the amount and types of U.S. UXO assistance to Cambodia, Laos, and Vietnam been a significant factor in bilateral relations with each of those nations? In Vietnam, work on war legacy issues formed an early part of building normalized relations in the post-War periodâties that have broadened into closer strategic and economic linkages. In Cambodia and Laos, UXO-related assistance has been one of the broadest areas for substantive cooperation between the United States and two countries with which the United States has had relatively cool relations. Would a change in the amount or type of assistance provided be beneficial to U.S. relations with Cambodia, Laos, or Vietnam? Should the U.S. government use UXO assistance to pressure other entities, such as Vietnam's MND, to be more cooperative in the UXO decontamination effort? UXO p revention âThe Department of Defense has implemented a policy that is to eventually replace all cluster munitions with ones whose failure rate is below 1%. Should the U.S. government undertake additional efforts to reduce the amount of post-conflict UXO from U.S. munitions, including prohibiting the use of U.S. funding for certain types of submunitions that may leave UXO? Given DOD's current views and policies on cluster munitions and landmines, does this preclude the United States from joining the 2010 Convention on Cluster Munitions or 1999 Ottawa Convention on Landmines? Precedents and lessons for other parts of the world âAre there lessons that can be drawn from U.S. assistance for UXO clearance and victim relief in Southeast Asia that may be applicable to programs elsewhere in the world, including Afghanistan and Iraq? Have the levels of assistance the United States has offered in Southeast Asia signaled a precedent for other parts of the world? During the 115 th Congress, legislation was introduced that would have addressed some of these general issues associated with UXO, though none directly addressed the current situation in Southeast Asia. The Unexploded Ordnance Removal Act ( H.R. 5883 ) would have required the Secretary of Defense, in concurrence with the Secretary of State, to develop and implement a strategy for removing UXO from Iraq and Syria. The Cluster Munitions Civilian Protection Act of 2017 ( H.R. 1975 and S. 897 ) would have prohibited the obligation or expenditure of U.S. funds for cluster munitions if, after arming, the unexploded ordnance rate for the submunitions was more than 1%. ", "summary": "More than 40 years after the end of the Vietnam War, unexploded ordnance (UXO) from numerous conflicts, but primarily dropped by U.S. forces over Cambodia, Laos, and Vietnam during the Vietnam War, continues to cause casualties in those countries. Over the past 25 years, the United States has provided a total of over $400 million in assistance for UXO clearance and related activities in those three countries through the Department of Defense (DOD), Department of State (DOS), and United States Agency for International Development (USAID), as well as funding for treatment of victims through USAID and the Leahy War Victims fund. Although casualty numbers have dropped in recent years, no systematic assessment of affected areas has been done, and many observers believe it may still take decades to clear the affected areas. War legacy issues such as UXO clearance and victim assistance may raise important considerations for Congress as it addresses the impact of U.S. participation in conflicts around the world and how the United States should deal with the aftermath of such conflicts. The continued presence of UXO in Southeast Asia raises numerous issues, including appropriate levels of U.S. assistance for clearance activities and victim relief; coordination in efforts among DOD, DOS, and USAID; the implications of U.S. action on relations with affected countries; whether U.S. assistance in Southeast Asia carries lessons for similar activity in other parts of the world, including Iraq and Afghanistan; and, more generally, efforts to lessen the prevalence of UXO in future conflicts. Many observers argue that U.S. efforts to address UXO issues in the region, along with joint efforts regarding other war legacy issues such as POW/MIA identification and Agent Orange/dioxin remediation, have been important steps in building relations with the affected countries in the post-war period. These efforts that have proceeded furthest in Vietnam, where the bilateral relationship has expanded across a wide range of economic and security initiatives. In Cambodia and Laos, where bilateral relations are less developed, UXO clearance is one of the few issues on which working-level officials from the United States and the affected countries have cooperated for years. Although some Cambodians and Laotians view U.S. demining assistance as a moral obligation and the U.S. government has viewed its support for UXO clearance as an important, positive aspect of its ties with the two countries, the issue of UXO has not been a major factor driving the relationships. The Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) provides $196.5 million for \"conventional weapons destruction\" around the world, including $159.0 million for \"humanitarian demining,\" with $3.85 million appropriated for Cambodia, $30.0 million for Laos, and $15.0 million for Vietnam. The Legacies of War Recognition and Unexploded Ordnance Removal Act ( H.R. 2097 ) would authorize $50 million per year for fiscal years 2020 to 2024 for humanitarian assistance in Cambodia, Laos, and Vietnam to develop national UXO surveys, conduct UXO clearance, and finance capacity building, risk education, and support for UXO victims.", "document_type": "crs"}
{"report": "Following a presidential declaration of emergency or major disaster, the Federal Emergency Management Agency (FEMA) may provide three primary forms of assistance: Individual Assistance (IA), Public Assistance (PA), and Hazard Mitigation Assistance (HMA). IA, which is the focus of this report, provides aid to affected individuals and households, and can take the form of assistance for housing and for other needs through the Individuals and Households Program, crisis counseling, disaster unemployment assistance, disaster legal services, and disaster case management services, as well as mass care and emergency assistance. PA provides grants to local, state, territorial, and Indian tribal governments, as well as certain private nonprofit organizations, for emergency protective measures, debris removal operations, and repair or replacement of damaged public infrastructure. HMA funds pay for mitigation and resiliency projects and programs to reduce the threat or impacts of future disasters. This report provides brief descriptions of the categories of IA authorized under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act; P.L. 93-288, as amended; 42 U.S.C. Â§Â§5121 et seq.). The information is based on the program guidance that FEMA released in March 2019, to serve as a comprehensive IA program policy resource; the Individual Assistance Program and Policy Guide (IAPPG) applies to emergencies and disasters declared on or after March 1, 2019. State, territorial, and Indian tribal governments do not automatically receive IA when a disaster occurs. Following an incident , the governor or tribal chief executive must request that the President declare an emergency or major disaster and that IA be authorized. When drafting a request for a major disaster declaration authorizing IA, the state, territorial, or Indian tribal government must demonstrate that the incident exceeds their capacity to effectively respond without federal assistance. FEMA then evaluates the request using a set of factors before providing a recommendation to the President. In March 2019, FEMA released the updated factors considered when evaluating a governor's request for IA, which became effective June 1, 2019. Thus, this report also lists and briefly describes the updated IA factors. Various types of FEMA IA may be provided to disaster survivors. The available IA options depend on the type of declaration (i.e., an \"emergency\" or \"major disaster\"), and the type(s) of IA requested by the governor of the affected state or the tribal chief executive. These requests must be authorized by FEMA (for information on the factors considered when determining whether to authorize IA, see the \" IA Factors \" section, below) . FEMA's IA program includes 1. Mass Care and Emergency Assistance ; 2. Crisis Counseling Assistance and Training Program ; 3. Disaster Unemployment Assistance ; 4. Disaster Legal Services ; 5. Disaster Case Management ; and 6. Individuals and Households Program. A brief description of each form of IA is included below. Mass Care and Emergency Assistance (MC/EA) involves the provision of life-sustaining services to disaster survivors prior to, during, and following an incident through short-term recovery. MC/EA includes seven service \"activities\": (1) sheltering; (2) feeding; (3) distribution of emergency supplies; (4) support for individuals with disabilities and others with access and functional needs; (5) reunification services for adults and children; (6) support for household pets, service animals, and assistance animals; and (7) mass evacuee support. The Crisis Counseling Assistance and Training Program (CCP) provides grant funding to eligible local, state, territorial, and Indian tribal governments, as well as nongovernmental organizations. CCP supplements efforts to assist individuals and communities with recovering from the effects of a disaster through community-based outreach and the provision of services, such as crisis counseling, psycho-education, and coping skills development. CCP also provides support by linking the disaster survivor with other resources, such as individuals and agencies that help survivors in the recovery process. The program provides short- to intermediate-term assistance to support mental and emotional health needs. Two CCP programs provide assistance for different lengths of time: (1) the Immediate Services Program provides funding for up to 60 days following a major disaster declaration; and (2) the Regular Services Program provides funding for up to nine months from the notice of award. Disaster Unemployment Assistance (DUA) provides benefits to individuals who were previously employed or self-employed, were rendered jobless or whose employment was interrupted as a direct result of a major disaster, and are ineligible for regular unemployment insurance. DUA may also provide re-employment assistance. DUA benefits may continue for up to 26 weeks following the declaration of a major disaster. Disaster Legal Services (DLS) are provided free to low-income individuals who require them because of a major disaster. The provision of services is \"confined to the securing of benefits under the [Stafford] Act and claims arising out of a major disaster.\" Assistance may include help with insurance claims, drawing up new wills and other legal documents lost in the disaster, help with home repair contracts and contractors, and appeals of FEMA decisions. Disaster Legal Services are provided through an agreement with the American Bar Association's Young Lawyers Division. Neither the statute nor the regulations establish cost-share requirements or time limitations for DLS. The Disaster Case Management (DCM) program partners case managers with disaster survivors to develop and implement disaster recovery plans that address their unmet needs. The program is time-limited, and shall not exceed 24 months from the date of the major disaster declaration. The Individuals and Households Program (IHP) provides financial and/or direct assistance to eligible individuals and households who, as a result of a disaster, have uninsured or under-insured necessary expenses and serious needs that cannot be met through other means or forms of assistance. The IHP is the primary way FEMA assists disaster survivors. Although it may meet basic needs, it cannot compensate for all losses. The categories of IHP assistance are Housing Assistance and Other Needs Assistance (ONA) (see Table 1 ). The period of assistance is generally limited to 18 months following the date of the emergency or major disaster declaration. Multiple types of Housing Assistance may be provided to meet disaster survivors' post-disaster housing needs. Housing Assistance includes the subcategories of Financial Housing Assistance and Direct Housing Assistance. The appropriate types of housing assistance depend on various considerations, including, but not limited to, cost-effectiveness; availability; suitability; and access to services. The federal cost share for FEMA housing assistance is 100%. The following sections provide a brief overview of each type of Housing Assistance organized by subcategory. Financial Housing Assistance Financial Housing Assistance is grant funding provided directly to the individual or household by FEMA. Some types of Financial Housing Assistance are subject to a limit on the amount of Financial Housing Assistance an individual or household is eligible to receive. Lodging Expense Reimbursement (LER) provides funding for out-of-pocket short-term lodging costs and taxes when the applicant is displaced from their primary residence because it is uninhabitable or inaccessible. Rental Assistance (including Initial Rental Assistance and Continued Rental Assistance) provides funding to rent alternate housing accommodations while the applicant is displaced from their primary residence because it is uninhabitable, inaccessible, affected by a utility outage, or unavailable. Home Repair Assistance provides funding to repair an owner-occupied primary residence, utilities, and infrastructure, subject to the maximum amount of financial assistance. Home Replacement Assistance provides funding to help replace a disaster-destroyed owner-occupied primary residence, subject to the maximum amount of financial assistance. Direct Housing Assistance Direct Housing Assistance is housing provided to the individual or household by FEMA or the state, territorial, or Indian tribal government. Direct Housing Assistance is not subject to the limit on the maximum amount of financial assistance an individual or household is eligible to receive. However, FEMA may only provide Direct Housing Assistance when Rental Assistance (a type of Financial Housing Assistance) is not available or is insufficient. Multifamily Lease and Repair (MLR) places disaster survivors in leased, repaired or improved multifamily temporary housing units (e.g., apartments). Transportable Temporary Housing Units (TTHUs) place disaster survivors in purchased or leased temporary housing units. TTHU sites must meet specific requirements, including (1) providing access to available and functional utilities; (2) complying with government ordinances; and (3) satisfying federal floodplain management and Environmental Planning and Historic Preservation (EHP) compliance review requirements. Direct Lease places disaster survivors in leased residential properties. Permanent Housing Construction (PHC) is a last resort used to provide home repair and new construction services to homeowners in insular areas or another location where no alternative housing resources are available. Other Needs Assistance (ONA) provides a grant of financial assistance for other disaster-related necessary expenses and serious needs, and includes the subcategories of SBA-Dependent ONA and Non-SBA-Dependent ONA. ONA is subject to a limit on the amount of assistance an individual or household is eligible to receive. Further, ONA assistance may be somewhat limited because some ONA-eligible items and amounts available to be awarded are predetermined by FEMA and the state, territorial, or Indian tribal government. The federal cost share for ONA is 75%, and the non-federal cost share is the remaining 25%. The following sections provide an overview of each type of ONA organized by subcategory. SBA-Dependent ONA FEMA and the SBA collaborate in determining applicant eligibility for SBA-Dependent ONA. To receive SBA-Dependent types of ONA, applicants must first apply for an SBA disaster loan. SBA-Dependent ONA is only available to individuals or households who do not qualify for an SBA disaster loan or whose SBA disaster loan amount is insufficient. Personal Property Assistance provides funding to repair or replace eligible items damaged or destroyed as a result of a disaster. Transportation Assistance provides funding to repair or replace a vehicle damaged by a disaster. Moving and Storage Assistance provides funding to relocate and store essential personal property while repairs are made, and then return the property to the repaired primary residence. Group Flood Insurance Policy enables FEMA or the state, territorial, or Indian tribal government to pay $600 for three years of flood insurance for real and personal property through the National Flood Insurance Program (NFIP). Upon the expiration of the group policy, the applicant must purchase and maintain their own flood insurance; failure to do so may affect future IHP eligibility. Non-SBA-Dependent ONA Non-SBA-Dependent types of ONA may be awarded regardless of the individual or household's SBA disaster loan status. Funeral Assistance provides funding to assist with eligible expenses. Medical and Dental Assistance provides funding to assist with eligible expenses. Childcare Assistance is provided in the form of a one-time payment that covers up to eight cumulative weeks of childcare and eligible expenses to care for children aged 13 and under, and/or children up to age 21 who have a disability. Miscellaneous Expenses provides funding for reimbursement of eligible items purchased or rented after a disaster to assist with recovery. Critical Needs Assistance (sometimes referred to as \"Immediate Needs Assistance\") is provided in the form of a one-time payment of $500 to individuals or households who need life-saving and life-sustaining items because they are displaced from their primary dwelling as a result of a disaster. Clean and Removal Assistance is provided in the form of a one-time payment to address floodwater contamination for individuals or households whose primary residence experienced flood damage (any assistance received will be deducted from any subsequent award of Home Repair Assistance). State, territorial, and Indian tribal governments do not automatically receive Individual Assistance (IA) when an incident occurs. The governor or tribal chief executive must request that the President declare an emergency or major disaster and that IA be authorized. This is because federal assistance is intended to supplementânot supplantâlocal, state, territorial, or Indian tribal government response and recovery efforts. In making such a request, the governor or tribal chief executive is claiming and must demonstrate that they are unable to effectively respond to the incident without federal assistance. The governor or tribal chief executive's request for a presidential declaration of emergency or major disaster must include information about the actions and resources that have been or will be committed, and an estimate of the amount and severity of the disaster-caused damages, in addition to other required information. Specific factors are considered by FEMA when evaluating the need for supplemental federal assistance to individuals (i.e., IA) pursuant to a request for a major disaster declaration. FEMA provides a recommendation to the President, and the decision to grant a declaration request is at the President's discretion. The authority to designate assistance types to be made available is delegated to the FEMA Assistant Administrator for the Disaster Assistance Directorate. On March 21, 2019, as required by Section 1109 of the Sandy Recovery Improvement Act of 2013 (SRIA, Division B of P.L. 113-2 ), FEMA issued a final rule revising the factors considered when evaluating a governor's request for IA. The factors were revised to establish more objective criteria for evaluating the need for assistance, clarify eligibility requirements, and expedite a presidential declaration determination. These factors became effective June 1, 2019. In addition to the revised factors, FEMA also produced guidance for use by state, territorial, and Indian tribal governments when drafting requests for major disaster declarations authorizing IA. In addition to determining IA eligibility, the factors are also used to identify the types of IA that will be made available to the requesting state/territory/Indian tribal government. The factors considered when evaluating a governor's request for a major disaster declaration authorizing Individual Assistance are intended to assess the \"severity, magnitude, and impact of a disaster, as well as the capabilities of the affected jurisdictions.\" \"FEMA will always consider all relevant information submitted as part of a declaration request.\" As was the case prior to the adoption of the revised IA factors, major disaster declarations are made at the President's discretion and the IA factors do not limit presidential discretion. Brief descriptions of the factors are as follows: 1. State Fiscal Capacity and Resource Availability requires an evaluation of the resources available to the local and state/territorial/Indian tribal government, nongovernmental organizations, and the private sector, combined with the circumstances that contribute to a lack of sufficient resources, resulting in a need for supplemental federal assistance. This factor includes two subfactors: a. Fiscal Capacity evaluates the state's ability to raise revenue for disaster response and recovery using one of two variables: (1) increasing or decreasing, or higher or lower state total taxable resources (TTR); or (2)Â higher or lower state gross domestic product (GDP), which may be considered as the primary alternative to TTR for requesting territories or when TTR data is unavailable. Higher or lower per capita personal income by local area may also be considered with TTR or state GDP when FEMA needs to better assess the need for supplemental federal assistance within a local area. In addition, other factors may be considered because even states with a high fiscal capacity may be affected by disasters that overwhelm their capabilities, or the variables (i.e., TTR and state GDP) may not accurately reflect a state's fiscal capacity due to extenuating circumstances; and b. Resource Availability evaluates whether the disaster-caused needs can be met using non-Stafford Act sources. Two variables are considered: (1)Â resources and services provided by local and state/territorial/Indian tribal governments, and nongovernmental and private sector organizations; and (2)Â the cumulative effect of recent disasters occurring in the previous 24-month period. 2. Uninsured Home and Personal Property Losses considers the results of the FEMA-State Preliminary Damage Assessment (PDA) process to evaluate the extent of damage and estimated cost of assistance. The subfactors considered include (1) the \"peril that caused the disaster damage\" because it may affect insurance coverage; (2) the percentage of affected applicants with insurance for the peril that caused the damage; (3) whether the concentration of damages is in one area or if it is widespread; (4) the number of homes damaged and degree to which they are damaged (i.e., whether habitability is affected); (5) the estimated cost of assistance based on the PDA data and historical data; (6) the estimated rate of homeownership for the affected homes, which may influence whether the IHP is needed, and what types of housing assistance should be made available; and (7) other relevant PDA data that may demonstrate a need for supplemental federal assistance. 3. Disaster Impacted Population Profile evaluates the recovery challenges of the impacted population considering the affected community's demographics as compared with national averages. 4. Impact to Community Infrastructure evaluates the disaster's impact by considering disruption, damage, or destruction for more than 72 hours to any of the following three subfactors: (1) Life-Saving and Life-Sustaining Services that provide an \"essential community function that ... will affect public health and safety\", such as police, fire, and emergency medical services (EMS), medical facilities, and water treatment services; (2) Essential Community Services that improve quality of life, such as schools and childcare providers, and social services; and (3) Transportation Infrastructure and Utilities that, for example, render housing uninhabitable or inaccessible, or affect the delivery of services. 5. Casualties , including the number of individuals who are missing, injured, or deceased as a result of a disaster, indicate the level of trauma, which may influence the appropriate types of IA assistance to provide. Disaster Related Unemployment identifies the number of individuals who may have lost work or become unemployed as a result of the disaster and who do not qualify for standard unemployment insurance.", "summary": "Following a presidential declaration of emergency or major disaster, the Federal Emergency Management Agency (FEMA) may provide three primary forms of assistance: Individual Assistance (IA), Public Assistance (PA), and Hazard Mitigation Assistance (HMA). IA, which is the focus of this report, provides aid to affected individuals and households. PA provides grants to local, state, territorial, and Indian tribal governments, as well as certain private nonprofit organizations for emergency protective measures, debris removal operations, and repair or replacement of damaged public infrastructure. HMA funds pay for mitigation and resiliency projects and programs to reduce the threat or impacts of future disasters. State, territorial, and Indian tribal governments do not automatically receive IA when a disaster occurs. Instead, the governor or tribal chief executive must request that the President declare an emergency or major disaster and that IA be authorized. When drafting such a request, the state, territorial, or Indian tribal government must demonstrate that the incident exceeds their capacity to effectively respond without federal assistance. FEMA then evaluates the request using a set of factors and provides a recommendation to the President. The evaluation of the IA factors, in addition to helping FEMA determine whether or not to recommend the President declare a major disaster, helps FEMA identify the types of IA that are needed. This report provides brief descriptions of the categories of IA authorized under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act; P.L. 93-288 , as amended; 42 U.S.C. Â§Â§5121 et seq.): 1. Mass Care and Emergency Assistance; 2. Crisis Counseling Assistance and Training Program; 3. Disaster Unemployment Assistance; 4. Disaster Legal Services; 5. Disaster Case Management; and 6. Individuals and Households Program. The information regarding the Individuals and Households Program (IHP) is covered in greatest detail herein, because it is the primary assistance program for providing federal assistance to individuals and households following a presidential declaration of emergency or major disaster. The IHP provides financial and/or direct assistance to eligible individuals and households who, as a result of a disaster, have uninsured or under-insured necessary expenses and serious needs that cannot be met through other means or forms of assistance. Forms of financial assistance include some categories of Housing Assistance (e.g., Rental Assistance) and Other Needs Assistance (ONA), and forms of direct assistance include other categories of Housing Assistance (e.g., Transportable Temporary Housing Units). The IA program information is based on the guidance that FEMA released in March 2019, to serve as a comprehensive IA program policy resource; the Individual Assistance Program and Policy Guide (IAPPG) applies to emergencies and disasters declared on or after March 1, 2019. This report also briefly describes the updated factors considered when evaluating a governor's request for IA pursuant to a presidential declaration of emergency or major disaster, which became effective June 1, 2019. As required by Section 1109 of the Sandy Recovery Improvement Act of 2013 (SRIA, Division B of P.L. 113-2 ), FEMA released these updated factors to establish more objective criteria for evaluating the need for assistance, clarify eligibility requirements, and expedite a presidential declaration determination.", "document_type": "crs"}
{"report": "The primary source of federal aid to elementary and secondary education is the Elementary and Secondary Education Act (ESEA)âparticularly its Title I-A program, which authorizes federal aid for the education of disadvantaged students. The ESEA was initially enacted in 1965 (P.L. 89-10) \"to strengthen and improve educational quality and educational opportunities in the Nation's elementary and secondary schools.\" It was most recently comprehensively amended and reauthorized by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), which was enacted \"to ensure that every child achieves.\" The ESSA authorized appropriations for ESEA programs through FY2020. FY2019 appropriation for ESEA programs are $25.2 billion. Under Title I-A, the ESEA as amended by the ESSA continues to require states and public schools systems to focus on educational accountability as a condition for the receipt of grant funds. Public school systems and individual public schools are held accountable for monitoring and improving achievement outcomes for students and closing achievement gaps, sustaining a focus that was initiated by amendments to the ESEA made by the No Child Left Behind Act of 2001 (NCLB; P.L. 107-110 ) but modified under the ESSA. While states were given more latitude to develop their educational accountability systems under the ESSA provisions, as a condition for receiving Title I-A funds each state must continue to have content and academic achievement standards and aligned assessments in reading/language arts (RLA), mathematics, and science for specific grade levels. States must now have an accountability system that incorporates (1) long-term and interim performance goals for specified measures; (2) weighted indicators based, in part, on these goals; and (3) an annual system for meaningful differentiation that is used to identify schools that need additional support to improve student achievement. Beyond Title I-A, other authorized ESEA programs provide, for example, grants to support: the education of migratory students; recruitment and professional development of teachers; language instruction for English learners (ELs); well-rounded education, safe and healthy students, and technology initiatives; after-school instruction and care programs; expansion of charter schools and other forms of public school choice; education services for Native American, Native Hawaiian, and Alaska Native students; Impact Aid to compensate local educational agencies (LEAs) for taxes forgone due to certain federal activities; and innovative educational approaches or instruction to meet particular student needs. In order to receive funds under Title I-A and several other formula grant programs authorized by the ESEA, each state educational agency (SEA) must submit a state plan to the U.S. Department of Education (ED). These plans can be submitted for individual formula grant programs or, if permitted by the Secretary of Education (hereinafter referred to as the Secretary), the SEA may submit a consolidated state plan based on requirements established by the Secretary. Following the enactment of the ESSA, all SEAs submitted consolidated state plans. The Secretary has approved these plans for all 50 states, the District of Columbia, and Puerto Rico. This report provides a brief overview of major provisions of the ESEA. It is organized by title and part of the act. Annual appropriations for ESEA programs are provided through the Departments of Labor, Health and Human Services, and Education, and Related Agencies (L-HHS-ED) Appropriations Act, and are shown in this report based on the most recent data available from the U.S. Department of Education, Budget Service for FY2017 through FY2019. Table 2 provides ESEA appropriations for FY2016 and FY2017 to depict the transition from the ESEA as amended by the NCLB to the ESEA as amended by the ESSA. Table 3 provides authorizations of appropriations included in the ESEA as amended by the ESSA. The Appendix provides a list of selected acronyms used in the report. The introductory text for ESEA Title I includes the purpose of Title I and authorizations of appropriations for FY2017 through FY2020 for each part of the title. The purpose of Title I is \"to provide all children significant opportunity to receive a fair, equitable, and high-quality education, and to close educational achievement gaps.\" The introductory text prior to Title I-A also requires states to reserve funds provided under Title I-A for school improvement activities and allows them to reserve Title I-A funds for direct students services. As such, while these reservations of funds appear before Title I-A in the ESEA, they are examined following the Title I-A discussion to provide greater context. The introductory text prior to Title I-A also provides authority for states to reserve funds for state administration for Title I-A, Title I-C, and Title I-D. Section 1004 permits states to reserve funds under Title I-A, Title I-C, and Title I-D for administration. Under this provision, a state may reserve 1% of the amount received under parts A, C, and D, or $400,000 (whichever is greater) for state administration. Title I-A authorizes federal aid to LEAs for the education of disadvantaged children. Title I-A grants provide supplementary educational and related services to low-achieving and other students attending elementary and secondary schools with relatively high concentrations of students from low-income families, as well as eligible students who live in the areas served by these public schools but attend private schools. Title I-A is also a vehicle to which a number of requirements affecting broad aspects of public elementary and secondary education for all students have been attached as conditions for receiving these grants. Title I-A grants are calculated by ED at the LEA level. The funds are then provided to SEAs, which are required to reserve funds for school improvement activities and may reserve funds for administration and direct student services. SEAs also adjust grant amounts for LEAs for which ED is unable to determine grant amounts, such as newly created LEAs or charter schools that are their own LEAs. In calculating Title I-A grant amounts, ED determines grant amounts under four different formulasâBasic, Concentration, Targeted, and Education Finance Incentive Grants (EFIG)âalthough funds allocated under all of these formulas are combined and used for the same purposes by recipient LEAs. While the allocation formulas have several distinctive elements, the primary factor used in all four is the estimated number of children aged 5-17 in families in poverty. Other factors included in one or more formulas include a state expenditure factor based on average per pupil expenditures for public elementary and secondary education, weighting schemes designed to increase aid to LEAs with the highest concentrations of poverty, and a factor to increase grants to states with high levels of expenditure equity among their LEAs. Each formula also has an LEA hold harmless provision and a state minimum grant provision. While there are several rules related to school selection, LEAs must generally rank their public schools by their percentages of students from low-income families, and serve them in rank order. This must be done without regard to grade span for any eligible school attendance area in which the concentration of children from low-income families exceeds 75%. An LEA also has the option of serving all high schools in rank order in which the concentration of children from low-income families is 50% or greater. Below these benchmarks, an LEA can choose to serve schools in rank order at specific grade levels (e.g., only serve elementary schools in order of their percentages of children from low-income families) or continue to serve schools at all grade levels in rank order. Once schools are selected, Title I-A funds are allocated among them on the basis of their number of students from low-income families. LEAs are not required to allocate the same amount of Title I-A funds per low-income child to each school. They may provide higher grants per low-income child at schools with high rates of these children than are allocated per low-income child to schools with lower rates of these children. There are two basic types of Title I-A programs. Schoolwide programs are authorized if the percentage of low-income students served by a school is 40% or higher. In schoolwide programs, Title I-A funds may be used to improve the performance of all students in a school. For example, funds might be used to provide professional development services to all of a school's teachers, upgrade instructional technology, or implement new curricula. The other basic type of Title I-A school service model is the targeted assistance program (TAP). Under TAPs, Title I-A-funded services are generally limited to the lowest-achieving students in the school. For example, students may receive additional instruction in an after-school program, or funds may be used to hire a teacher's aide who provides additional assistance to low-achieving students in their regular classroom. In general, schools have substantial latitude in how they use Title I-A funds, provided the funds are used to improve student academic achievement. As previously mentioned, each SEA must submit a state plan to ED to receive funds under Title I-A and several other state formula grant programs authorized under the ESEA. For Title I-A purposes, the plan requires the SEA to provide information or assurances related to its standards, assessments, and accountability system. Requirements related to each of these areas are discussed below. In its state plan, each SEA receiving Title I-A funds is required to provide an assurance that it has adopted challenging academic content standards and aligned academic achievement standards (hereinafter collectively referred to as academic standards) in RLA, mathematics, and science (and any other subject selected by the state). The academic standards must include at least three levels of achievement (e.g., basic, proficient, and advanced). In addition, states are required to demonstrate that these academic standards are aligned with entrance requirements for credit-bearing coursework in the state's system of public higher education and relevant state career and technical education standards. A state is permitted to adopt alternate academic achievement standards for students with the most significant cognitive disabilities provided, among other requirements, that the standards are aligned with the state's challenging academic content standards. The state is also required to demonstrate that it has adopted English language proficiency standards that are derived from the domains of speaking, listening, reading, and writing; address the different proficiency levels of English learners; and align the English language proficiency standards with the challenging state academic standards. The ESEA explicitly maintains that a state is not required to submit any of the aforementioned standards to the Secretary of Education (the Secretary) for review or approval. Also, the Secretary does not have the authority \"to mandate, direct, control, coerce, or exercise any direction or supervision over any of the challenging State academic standards adopted or implemented by a State.\" Each state plan must demonstrate that the SEA, in consultation with LEAs, has implemented assessments in RLA, mathematics, and science. The mathematics and RLA assessments must be administered in each of grades 3-8 and once during high school. The science assessment must be administered once in grades 3-5, grades 6-9, and grades 10-12. Thus, each state must administer 17 assessments each school year, but no individual student will take more than 3 of these assessments in a given school year. The assessments must be aligned with the state academic standards. A state may implement alternate assessments aligned with state academic standards and alternate academic achievement standards for students with the most significant cognitive disabilities. However, for each subject tested no more than 1% of all students tested may take the alternate assessment. Each state plan must also demonstrate that the LEAs in the state will administer an annual assessment of English proficiency for all English learners that is aligned with the state's English language proficiency standards. In addition to state assessments, each state receiving Title I-A funds must also agree to participate in the National Assessment of Educational Progress (NAEP) assessments of 4 th and 8 th grade students in reading and math every two years. In its state plan, each SEA is required to describe its academic accountability system. The system must include state established long-term goals (and measures of interim progress) for all students and separately for each focal subgroup of students for academic achievement as measured by proficiency on the state RLA and mathematics assessments and high school graduation rates. In addition, the goals for subgroups of students who are behind on any of these measures must take into account the improvement needed to close statewide achievement gaps. Also, the system must include long-term goals (and measures of interim progress) for increases in the percentage of English learners making progress in achieving English proficiency, as defined by the state. The state must then use a set of indicators that are based, in part, on the long-term goals it established to measure annually the performance of all students and each subgroup of students to evaluate public schools. These indicators must include the following: 1. public school student performance on the RLA and mathematics assessments as measured by student proficiency, and for high schools this may also include a measure of student growth on such assessments; 2. for public elementary and secondary schools that are not high schools, a measure of student growth or another indicator that allows for \"meaningful differentiation\" in school performance; 3. for public high schools, graduation rates; 4. for all public schools in the state, progress in achieving English language proficiency ; and 5. for all public schools in the state, at least one indicator of school quality or student success (e.g., a measure of student engagement, postsecondary readiness, or school climate). Based on these indicators, the SEA must establish a system for annually \"meaningfully differentiating\" all public schools that gives substantial weight to each indicator but in the aggregate provides greater weight to the first four than to the school quality and student success indicators. The system must also identify any school in which any subgroup of students is \"consistently underperforming,\" as determined by the state. Based on the state's system for annual meaningful differentiation, each SEA must establish a state-determined methodology to identify for comprehensive support and improvement (CSI): (1) at least the lowest-performing 5% of all schools receiving Title I-A funds, (2) all public high schools failing to graduate 67% or more of their students, (3) schools required to implement additional targeted support (see below) that have not improved in a state-determined number of years, and (4) additional statewide categories of schools, at the state's discretion. The LEAs in which schools are identified for CSI are required to work with stakeholders to develop a school improvement plan that, among other requirements, must include evidence-based interventions, be based on a school-level needs assessment, and identify resource inequities. An LEA may also offer students enrolled in a school identified for CSI the option to transfer to another public school in the LEA. If a school does not improve within a state-determined number of years (no more than four years), the school must be subject to more rigorous state-determined actions. States are required to identify for targeted support and improvement (TSI) any school in which one or more subgroups of students are consistently underperforming as determined by the state. Each of these schools is required to develop and implement a plan to improve student outcomes that includes evidence-based interventions. If a school fails to improve within a number of years determined by the LEA, additional actions must be taken. For a school in which one or more subgroups are performing at a level that if reflective of an entire school's performance would result in its identification for CSI, the school must be identified for additional targeted support and improvement (ATSI) activities, which must include an identification of resource inequities. If a school identified as meeting the criteria for ATSI does not improve within a state-determined number of years, the state is required to identify the school for CSI. In its state plan, the SEA must also provide an explanation of how the state will factor into its accountability system the requirement that 95% of all students and each subgroup of students participate in the required assessments. Any teacher or paraprofessional working in a program supported with Title I-A funds must meet applicable state certification and licensure requirements. In addition, states participating in Title I-A must describe in their state plans how low-income and minority children enrolled in Title I-A schools are not served at disproportionate rates by \"ineffective, out-of-field, or inexperienced teachers.\" The state must also describe the measures that will be used to assess and evaluate the state's success in this area. To serve schools that are identified for comprehensive support and improvement or targeted support and improvement under Title I-A, SEAs are required to reserve the greater of (1) 7% of the total amount the state receives under Title I-A or (2) the sum of the amount that the state reserved for school improvement in FY2016 and received under the School Improvement Grant (SIG) program for FY2016. Beginning in FY2018, an SEA is only permitted to reserve the full amount of funds for school improvement if no LEA receives a smaller Title I-A grant than it did during the prior fiscal year due to the implementation of this provision. Of the funds reserved for school improvement, states are required under ESSA provisions to provide at least 95% to LEAs through formula or competitive grants to serve schools that are implementing comprehensive support and improvement activities or targeted support and improvement activities. In addition to the required reservation of Title I-A funds for school improvement, SEAs have the option of reserving up to 3% of the Title I-A funds they receive for direct student services. This optional reservation of funds was not included in the law prior to the ESSA. Of the funds reserved, states must distribute 99% to geographically diverse LEAs using a competitive grant process that prioritizes grants to LEAs that serve the highest percentages of schools identified for comprehensive support and improvement or that are implementing targeted support and improvement plans. Funds for direct student services may be reserved without regard to how the reservation of funds may affect LEA grant amounts. Funds may be used by LEAs for a variety of purposes, including to pay the costs associated with the enrollment and participation of students in academic courses not otherwise available at the students' school; credit recovery and academic acceleration courses that lead to a regular high school diploma; activities that lead to the successful completion of postsecondary level instruction and examinations that are accepted for credit at institutions of higher education (IHEs), including reimbursing low-income students for the costs of these examinations; and public school choice if an LEA does not reserve funds for this purpose under Section 1111. Title I-B authorizes the State Assessment Grant program to support the development of the state standards and assessments required under Title I-A; the administration of those assessments; and related activities, such as improving assessments for English learners. Two funding mechanisms are authorized: (1) formula grants to states for the development and administration of the state standards and assessments required under Title I-A, and (2) competitive grants to states to carry out related activities beyond the minimum assessment requirements. The allocation of funds depends on a statutorily established \"trigger amount\" of $369.1 million. For annual appropriations at or below the trigger amount, the entire appropriation is used to award formula grants to states. Under the formula grant program, the Secretary then provides each state with a minimum grant of $3 million. Any remaining funds are subsequently allocated to states in proportion to their number of students ages 5 to 17. For an annual appropriation above the trigger amount, the difference between the appropriation and trigger amount is used to award competitive grants to states. The ESEA as amended by the ESSA permits the Secretary to reserve up to 20% of the funds appropriated for the State Assessment Grant program to make grants to states to conduct assessment system audits. From the funds reserved for this purpose, the Secretary is required to make an annual grant to the state of not less than $1.5 million to conduct a statewide assessment system audit and provide subgrants to LEAs to conduct assessment audits at the LEA level. The ESEA as amended by the ESSA includes a new demonstration authority for the development and use of an \"innovative assessment system.\" A state, or a consortium of states, may apply for the demonstration authority to develop an innovative assessment system that \"may include competency-based assessments, instructionally embedded assessments, interim assessments, cumulative year-end assessments, or performance based assessments that combine into an annual summative determination for each student\" and \"assessments that validate when students are ready to demonstrate mastery or proficiency and allow for differentiated student support based on individual learning needs.\" During the first three years in which the Secretary grants demonstration authority, not more than seven SEAs may have their applications for the authority approved. Separate funding is not provided under the demonstration authority; however, states may use a portion of the formula and competitive grant funding provided through the State Assessment Grant program discussed above to carry out this demonstration authority. Title I-C authorizes grants to SEAs for the education of migratory children and youth. A migratory child or youth is one who made a qualifying move in the preceding 36 months as a migratory agricultural worker or migratory fisher or moved with or to join a parent or spouse who is a migratory agricultural worker or migratory fisher. Among other purposes, the program assists states in supporting high-quality, comprehensive educational programs and services during the school year, summer, and intersession periods that address the unique needs of migratory children. Funds are allocated by formula on the basis of each state's number of migratory children and youth aged 3-21 and Title I-A state expenditure factor (discussed above). ED may also make grants for the coordination of services and transfer of educational records for migratory students. Title I-D authorizes a pair of programs intended to improve education for students who are neglected, delinquent, or at risk of dropping out of school. Subpart 1 authorizes grants for the education of children and youth in state institutions for the neglected or delinquent, including community day programs and adult correctional institutions. Funds are allocated to SEAs on the basis of the number of such children and youth and the Title I-A state expenditure factor. A portion of each SEA's grant is to be used to provide transition services to children and youth transferring to regular public schools. Under Subpart 2, Title I-A funds are provided to each SEA based on the number of children and youth residing in local correctional facilities or attending community day programs for delinquent children and youth. These Title I-A funds are used to make grants to LEAs with high numbers or percentages of children and youth in locally operated correctional facilities for children and youth. These children and youth are then served in accordance with Title I-D provisions. Funds are used, for example, to provide transition programs, dropout prevention programs, special programs to meet the unique academic needs of participating children and youth, and mentoring and peer mediation. ESEA Title I-E provides the Secretary with the authority to enter into demonstration agreements that provide flexibility to LEAs to deliver equitable per-pupil funding. The weighted per-pupil funding system must allocate substantially more funding to students from low-income families, English learners, and students with other characteristics associated with educational disadvantage selected by the LEA than is allocated to other students. Prior to the 2019-2020 school year, up to 50 LEAs were permitted to apply for the flexibility to consolidate eligible federal funds and state and local funds to create a single school funding system based on weighted per-pupil allocations (using weights or allocations to provide funding to schools). Beginning with the 2019-2020 school year, the number of LEAs permitted to participate under Title I-E is not capped provided a \"substantial majority\" of the LEAs participating in previous years have met program requirements. Title I-F provides for the development of federal regulations for Title I programs and state administration of these programs. Part F also prohibits federal control of the \"specific instructional content, academic achievement standards and assessments, curriculum or program of instruction\" of states, LEAs, or schools, and clarifies that nothing in Title I is to be \"construed to mandate equalized spending per pupil for a State, local educational agency, or school.\" Title II includes programs centered on teachers, school leaders (e.g., principals), literacy, and American history and civics education. Programs focused on teachers and school leaders support activities and initiatives such as professional development, staff recruitment and retention, performance-based compensation systems, and the establishment of a statewide science, technology, engineering, and mathematics (STEM) master teacher corps. Other Title II programs focus on literacy education, providing grants to support literacy efforts from birth through grade 12 and supporting school library programs, early literacy services, and the provision of high-quality books to children and adolescents. Title II also includes American history and civic education programs that provide academies for teachers and students to learn more about these topics and authorizes national activities related to American history and civics education. Title II's introductory text includes the purpose of the title, several definitions, and authorizations of appropriations for FY2017 through FY2020 for the programs authorized in Title II. Part A authorizes a program of state grants that may be used for a variety of purposes related to preparation, training, recruitment, retention, and professional development of elementary and secondary education teachers and school leaders. The formula grants are allocated to SEAs based on student population and poverty counts, as well as a base guarantee determined by the amount each state received in FY2001 under antecedent programs. The base guarantee is being phased out through FY2022. SEAs may reserve a share of funds for administration and statewide services, such as teacher or principal support programs; preparation academies; licensing or certification reform; improving equitable access to effective teachers; reforming or improving teacher and principal preparation programs; training teachers in the use of student data; and technical assistance to LEAs. SEAs are required to suballocate at least 95% of grants to LEAs. Grants to LEAs are made based on student population and poverty counts. However, states are authorized to reserve up to 3% of the amount otherwise reserved for subgrants for LEAs for state-level activities focused on school leaders. Funds received by LEAs may be used for a variety of purposes including recruiting, hiring, and retaining effective teachers; teacher and school leader evaluation and support systems; professional development activities for teachers and principals; and class-size reduction. Subpart 1 authorizes the Teacher and School Leader Incentive Fund. This program provides competitive grants to LEAs, SEAs or other state agencies, the Bureau of Indian Education, or a partnership of one of these entities with one or more nonprofit or for-profit entities to develop, implement, improve, or expand performance-based teacher and principal compensation systems or human capital management systems for teachers, principals, and other school leaders in high-needs schools. Subpart 2 authorizes Literacy Education for All, Results for the Nation to improve student academic achievement in reading and writing from early education through grade 12. Under Subpart 2, competitive Comprehensive Literacy State Development Grants (Section 2222) are provided to SEAs. SEAs subsequently provide competitive subgrants to one or more eligible LEAs for the development and implementation of a comprehensive literacy instruction plan, professional development, and other activities. SEAs may also award competitive subgrants for early literacy services to one or more eligible early childhood education programs. In addition, SEAs may use funds to develop or enhance comprehensive literacy instruction plans. SEAs must ensure that at least 15% of funds are used to serve children from birth through age 5, 40% to serve children in kindergarten to grade 5, and 40% to serve children in grades 6 through 12. Funds reserved under Section 2222 for evaluation purposes must be used to conduct a national evaluation of the grant and subgrant programs authorized under Subpart 2 (Section 2225). Under the Innovative Approaches to Literacy program (Section 2226), the Secretary may award grants, contracts, or cooperative agreements to eligible entities to promote literacy programs that support the development of literacy skills in low-income communities through school library programs, early literacy services, and programs to provide high-quality books regularly to children from low-income communities. Subpart 3 authorizes American History and Civics Education programs. Section 2232 authorizes the Presidential and Congressional Academies for American History and Civics. Presidential Academies offer professional development opportunities for teachers of American history and civics. Congressional Academies provide a seminar or institute for outstanding students of American history and civics. Section 2233 authorizes national activities that provide competitive grants to promote new and existing evidence-based strategies to encourage innovative American history, civics and government, and geography instruction and learning strategies, and professional development for teachers and school leaders. Subpart 4 authorizes several programs related to educators, school leaders, technical assistance, and evaluation. Section 2242 authorizes the Supporting Effective Educator Development (SEED) program, which provides competitive grants to support nontraditional teacher certification or preparation routes, evidence-based professional development, professional development to support dual or concurrent enrollment, and professional enhancement activities that may lead to an advanced credential. Section 2243 authorizes the School Leader Recruitment and Support program, which provides competitive grants to improve the recruitment, placement, support, and retention of principals and other school leaders in high-need schools. Section 2244 authorizes a comprehensive center focused on students at risk of not attaining full literacy skills due to a disability. Funds may also be used to provide technical assistance or evaluate state and LEA activities under Title II-B. Section 2245 authorizes the STEM Master Teacher Corps program, which provides competitive grants to support the development of a statewide STEM master teacher corps or to support the implementation, replication, or expansion of effective STEM professional development programs. Part C includes a supplement, not supplant provision that applies to funds provided under Title II. It also states that nothing in Title II authorizes the Secretary or any federal employee to mandate, direct, or control specific aspects of a state's, LEA's, or school's educational program, including, for example, instructional content, curricula, academic standards, academic assessments, staff evaluation systems, specific definitions of staff effectiveness, professional standards, licensing, or certification. Title II also states that none of the provisions in the title shall be construed to affect collective bargaining or other such agreements between school or district employees and their employers. Title III authorizes programs that are focused on improving the academic attainment of ELs, including immigrant students. Under the Title III-A state grants program, funds are used at the state level to support activities such as consultation to develop statewide standardized entrance and exit procedures. Funds are used by LEAs for activities such as effective language instructional programs, professional development, and supplemental activities. Title III also authorizes two national programs, a professional development project and a clearinghouse related to the education of ELs. The introductory text to Title III authorizes appropriations for FY2017 through FY2020. The English Language Acquisition program was designed to help ensure that ELs, including immigrant students, attain English proficiency, develop high levels of academic attainment in English, and meet the same challenging state academic standards that all students are expected to meet. The program was also designed to assist educators, SEAs, and LEAs in developing and implementing effective language instruction educational programs to assist in teaching ELs and developing and enhancing their capacity to provide effective instructional programs to prepare ELs to enter all-English settings. Title III-A also promotes parental, family, and community participation in language instruction educational programs for the parents, families, and communities of ELs. Formula grant allocations are made to SEAs based on the proportion of EL students and immigrant students in each state relative to all states. These amounts are weighted by 80% and 20%, respectively. SEAs may reserve not more than 5% of the funds received for working with LEAs to establish standardized statewide entrance and exit procedures, providing effective teacher and principal preparation and professional development activities, and planning evaluation, administration, and interagency coordination. SEAs are required to make subgrants to eligible entities based on the relative number of EL students in schools served by those entities. SEAs are also required to reserve not more than 15% of the state allocation to make grants to eligible entities that have experienced a significant increase in the percentage or number of immigrant students enrolled in schools in the geographic area served by the entity. Eligible entities receiving subgrants are required to use funds for three activities. First, funds must be used to increase the English language proficiency of ELs by providing effective language instructional programs that demonstrate the program is successfully increasing English language proficiency and student academic achievement. Second, funds must be used to provide effective professional development to school staff or community-based personnel. Third, funds must be used to provide and implement other \"effective activities or strategies that enhance or supplement language instruction educational programs for ELs,\" including parent, family, and community engagement activities. Eligible entities receiving grants from the funds reserved specifically for immigrant students are required to use these funds to support activities that \"provide enhanced instructional opportunities\" for immigrant students. While Title III-A focuses on the education of ELs, Title I-A also contains provisions that specifically apply to this student population, as noted previously. For example, Title I-A requires that states establish English language proficiency standards that are derived from the domains of speaking, listening, reading, and writing and are aligned with challenging state academic standards. Under Title I-A, LEAs are required to assess English language proficiency annually using assessments aligned with the state English language proficiency standards. A portion of Title III-A funds are reserved to support two specific national programs: (1) the National Professional Development Project (Section 3131), and (2) the National Clearinghouse for English Language Acquisition and Language Instruction Educational Programs (Section 3202). Under the National Professional Development Project, grants are awarded on a competitive basis for a period of up to five years to IHEs or public or private entities with relevant experience and capacity working in consortia with SEAs or LEAs to provide for professional development activities that will improve classroom instruction for ELs and help personnel working with these students to meet professional standards. The National Clearinghouse is responsible for collecting, analyzing, synthesizing, and disseminating information about language instruction educational programs for ELs and related programs. Part B includes definitions relevant to Title III, statutory provisions authorizing the National Clearinghouse (discussed above), and the development of regulations for Title III. Title IV authorizes a range of programs and activities including a block grant program, a program to support learning opportunities during non-school hours, programs to support charter schools and magnet schools, a family engagement program, an innovation and research program, programs to provide community support for student success, national activities for school safety, and programs focused on arts education, video programming for preschool and elementary school children, and gifted and talented education. Title IV-A authorizes SSAE grants to improve students' academic achievement by increasing the capacity of states, LEAs, schools, and local communities to (1) provide all students with access to a well-rounded education, (2) improve school conditions for student learning, and (3) improve the use of technology in order to increase the academic achievement and digital learning of all students. Formula grants are made to states based on their Title I-A funding from the prior year. States then make formula subgrants to LEAs. LEAs must use SSAE funds for three broad categories of activities: (1) supporting well-rounded educational opportunities, (2) supporting safe and healthy students, and (3) supporting the effective use of technology. If an LEA receives a grant of $30,000 or more, it must provide assurances that it will use at least 20% for activities to support a well-rounded education, at least 20% for activities to support safe and healthy students, and at least some of its funds to support the effective use of technology. If an LEA receives a grant of less than $30,000, it is only required to provide an assurance regarding the use of funds for at least one of the three categories. Title IV-B supports activities provided during non-school hours that offer learning opportunities for school-aged children. Formula grants are made to SEAs based on their Title I-A funding from the prior year. States subsequently award grants to local entities (e.g., LEAs, community-based organizations) on a competitive basis for a period of three to five years. In awarding subgrants, SEAs are required to give priority to applicants proposing to target services to students who attend schools implementing CSI or TSI activities or other schools identified by the LEA in need of intervention support to improve student academic achievement and other outcomes; enroll students who may be at risk for academic failure, dropping out, or involvement with criminal or delinquent activities, or who lack \"strong positive role models\"; or target the families of such students. Local entities may use funds for activities that improve student academic achievement and support student success, such as academic enrichment learning programs, mentoring, tutoring, well-rounded education activities, programs to support a healthy and active lifestyle, technology education, expanded library service hours, parenting skills programs, drug and violence prevention programs, counseling programs, STEM programs, and programs that build career competencies and career readiness. The Charter Schools Program (CSP) supports the startup of new charter schools and the replication and expansion of high-quality charter schools (Section 4303). It also assists charter schools in accessing credit to acquire and renovate facilities and includes a competitive grant program that provides per-pupil facilities aid (Section 4304). The CSP also provides funding for national activities to support the startup, replication, and expansion of charter schools; the dissemination of best practices; program evaluation; and stronger charter authorizing practices (Section 4305). Of the funds appropriated for Title I-C, 65% is provided for the startup, replication, and expansion of charter schools; 22.5% for national activities; and 12.5% for facilities financing. Title IV-D provides grants to LEAs to plan and operate magnet schoolsâpublic schools of choice designed to encourage voluntary enrollment by students of different racial backgrounds. LEAs that are operating under a court-ordered desegregation plan or have voluntarily adopted a federally approved desegregation plan are eligible to receive grants to establish and operate magnet schools. In awarding grants, the Secretary is required to give priority to LEAs that demonstrate the greatest need for assistance, based on the expense or difficulty of effectively carrying out approved desegregation plans and the magnet school program; propose to implement a new or revise an existing magnet school program based on evidence-based methods and practices or replicate an existing magnet school with a demonstrated track record of success; plan to admit students by methods other than academic examinations, such as a lottery; and propose to increase racial integration by taking into account socioeconomic diversity in the design and implementation of the magnet school program. Title IV-E provides competitive grants to statewide organizations to establish family engagement centers. These centers promote parent education and family engagement in education programs and provide comprehensive training and technical assistance to SEAs, LEAs, and schools identified by SEAs and LEAs; organizations that support family-school partnerships; and other organizations that carry out such programs. Title IV-F authorizes a range of programs. Each is discussed briefly below. Subpart F-1 authorizes the Education Innovation and Research (EIR) program, which provides competitive grants to eligible entities to create, develop, implement, replicate, or take-to-scale entrepreneurial, evidence-based, field-initiated innovations to improve achievement and attainment for high-need students. Three types of grants (early phase, mid-phase, and expansion grants) are awarded primarily based on the past demonstrated success of the grantee in meeting these goals. Subpart F-2 authorizes the Promise Neighborhoods program (Section 4624) and the Full-Service Community Schools (FSCS) program (Section 4625). They were authorized by the ESEA prior to the enactment of the ESSA using authority previously available in Title V-D-1 to create programs of national significance. Both programs are designed to provide pipeline services, which deliver a \"continuum of coordinated supports, services, and opportunities,\" to children in distressed communities. More specifically, the Promise Neighborhoods program provides a comprehensive, effective continuum of coordinated services in neighborhoods with high concentrations of low-income individuals, multiple signs of distress (e.g., high rates of poverty, academic failure, and juvenile delinquency), and schools implementing comprehensive or targeted support and improvement activities under Title I-A. The FSCS program provides grants to public elementary and secondary schools to participate in a community-based effort to coordinate and integrate educational, developmental, family, health, and other comprehensive services through community-based organizations and public and private partnerships. Access to such services is provided in schools to students, families, and the community. Subpart F-3 authorizes National Activities for School Safety. A portion of funds appropriated for these activities must be used for the Project School Emergency Response to Violence (Project SERV). Project SERV provides grants to LEAs, IHEs, and the Bureau of Indian Education (BIE) for BIE schools where the learning environment has been disrupted due to a violent or traumatic crisis. Funds for National Activities for School Safety that are not used for Project SERV may be used for other activities to improve student well-being during or after the school day. Subpart F-4 authorizes three programs focused on academic enrichment. Section 4642 authorizes competitive grants for arts education under the Assistance for Arts Education Program. Section 4643 authorizes grants to support educational and instructional video programming, accompanying support materials, and digital content to promote school readiness for preschool and elementary school children and their families through the Ready to Learn Programming program. Section 4644 authorizes the Javits Gifted and Talented Students Education Program, which provides grants to enhance the ability of elementary and secondary schools to identify gifted and talented students, including low-income and at-risk students, and meet their special educational needs. The section also supports the National Research Center for the Education of Gifted and Talented Children and Youth. Title V includes both funding transferability authority and programs to support rural education. Funding transferability authority allows states and LEAs to transfer federal funds from certain ESEA programs to other ESEA programs to enable them to address their particular needs. The Rural Education Assistance Program (REAP) provides additional resources to rural LEAs that might lack the resources to compete effectively for federal grants or might receive formula grant allocations that are too small to meet their intended purposes. The two rural education programs included in Title V provide LEAs with substantial flexibility in how they use their grant funds. Funding transferability for states and LEAs is included under Title V-A to provide states and LEAs with the \"flexibility to target Federal funds to the programs and activities that most effectively address\" their \"unique needs.\" In general, states are able to transfer funds from three formula grants programs that focus on teachers and school leaders, provide block grants, and provide after-school programming to formula grant programs focused on special populations (i.e., disadvantaged students, migratory students, neglected and delinquent students, and ELs). More specifically, states are permitted to transfer up to 100% of the funds allotted to them for state-level activities under Title II-A, Title IV-A, or Title IV-B to Title I-A, Title I-C, Title I-D, Title III-A, and one other ESEA program. Similarly, LEAs are also permitted to transfer funds from formula grant programs that focus on teachers and school leaders or provide block grants to formula grant programs focused on special populations. More specifically, LEAs are permitted to transfer 100% of the funds received under Title II-A or Title IV-A to Title I-A, Title I-C, Title I-D, Title III-A, and one other ESEA program. SEAs and LEAs are prohibited from transferring funds from Title I-A, Title I-C, Title I-D, Title III-A, and one other ESEA program to any other program. Title V-B authorizes the Rural Education Achievement Program (REAP), which is designed to assist rural LEAs that may lack the resources to compete effectively for competitive grants and that may receive grants under other ESEA programs that are too small to be effective in meeting their specified purposes. Subpart 1 authorizes the Small, Rural School Achievement (SRSA) program, which (1) provides eligible rural LEAs with the flexibility to use funds received under Title II-A and Title IV-A to carry out local activities authorized under certain ESEA programs, and (2) authorizes a formula grant program for rural LEAs under which funds received may be used under several other ESEA programs. Eligibility for both the flexibility authority and the grant program is based on criteria such as average daily attendance or population density and locale codes. Subpart 2 authorizes the Rural and Low-Income School (RLIS) program, which provides formula grants to states. SEAs then make subgrants to eligible LEAs by formula or competition as determined by the SEA. LEA eligibility criteria include a school-age child poverty rate of 20% or more and meeting certain locale requirements. Similar to the SRSA grants, RLIS grants may be used under several other ESEA programs or for parent involvement activities. LEAs cannot receive both an SRSA grant and a RLIS grant. An LEA that is eligible for grants under both the SRSA and RLIS programs must select the grant program under which it will receive funds. Part C contains several prohibitions against federal control of educational curricula, academic standards and assessments, or programs of instruction as a condition of receipt of funds under Title V. It also states that nothing in Title V shall be construed to mandate equalized spending per pupil for a state, LEA, or school. Title VI provides funds specifically for the education of Indian, Native Hawaiian, and Alaska Native children. With respect to Indian education, the ESEA authorizes formula grants to LEAs, Indian tribes and organizations, BIE schools, and other entities to support elementary and secondary school programs that meet the unique cultural, language, and educational needs of Indian children. Funds are also provided for competitive grants to examine the effectiveness of services for Indian children and to provide support and training for Indian individuals to work in various capacities in the education system. Title VI also authorizes competitive grants to organizations with experience in operating Native Hawaiian programs to provide services to improve Native Hawaiian education. A Native Hawaiian Education Council is also authorized under Title VI. In addition, Title VI authorizes competitive grants for activities and services intended to improve education for Alaska Natives, such as the development of curricular materials and professional development. Subpart 1 authorizes formula grants to eligible LEAs, Indian tribes and organizations, BIE schools, and other entities to support the development of elementary and secondary school programs for Indian students that are designed to meet the unique cultural, language, and educational needs of such students and ensure that all students meet their state's challenging academic standards. Grant allocations are determined based on the number of eligible Indian children served by the eligible entity and state average per pupil expenditures. Subpart 2, Special Programs and Projects to Improve Educational Opportunities for Indian Children, authorizes two competitive grant programs: (1) Improvement of Educational Opportunities for Indian Children and Youth (Section 6121) and (2) Professional Development for Teachers and Education Professionals (Section 6122). The former supports projects to develop, examine, and demonstrate the effectiveness of services and programs to improve educational opportunities and achievement of Indian children and youth. The latter focuses on efforts such as providing support and training to qualified Indian individuals to become effective teachers, school leaders, and administrators. Subpart 3, National Activities, authorizes funds for a variety of purposes including research, evaluation, and data collection and analysis. It also authorizes Grants to Tribes for Education Administrative Planning, Development, and Coordination (Section 6132), as well as for Native American and Alaska Native Language Immersion Schools and Programs (Section 6133). Subpart 4 establishes the National Advisory Council on Indian Education (NACIE; Section 6141) and authorizes a preference for Indian entities under programs authorized by Subparts 2 and 3. Part B authorizes competitive grants to Native Hawaiian educational or community-based organizations, charter schools, or other public or private nonprofit organizations with experience in operating Native Hawaiian programs, or consortia of these entities, to provide a wide variety of services intended to improve education for Native Hawaiians. In the awarding of grants, priority is to be given to activities that are intended to improve reading skills for Native Hawaiian students in grades K-3, meet the needs of at-risk children and youth, increase participation by Native Hawaiians in fields or disciplines in which they are underemployed, or increase the use of the Hawaiian language in instruction. Specifically authorized activities include early childhood education and care, services for Native Hawaiian students with disabilities, and professional development for educators. Title VI-B also establishes a Native Hawaiian Education Council, which provides coordination activities, technical assistance, and community consultations related to the educational needs of Native Hawaiians. Part C authorizes competitive grants for a variety of activities and services intended to improve education for Alaska Natives. Eligible grantees include Alaska Native organizations with relevant experience, Alaska Native organizations that lack relevant experience and partner with an SEA, LEA, or Alaska Native organization operating relevant programs; or an entity located in Alaska that is predominantly governed by Alaska Natives and meets other specified criteria. Authorized uses of funds include, for example, the development of curriculum materials that address the special needs of Alaska Native students, training and professional development, early childhood and parenting activities, and career preparation activities. Title VII compensates LEAs for the \"substantial and continuing financial burden\" resulting from federal activities. These activities include federal ownership of certain lands, as well as the enrollments in LEAs of children of parents who work and/or live on federal land (e.g., children of parents in the military and children living on Indian lands). The federal government provides compensation via Impact Aid for lost tax revenue because these activities deprive LEAs of the ability to collect property or other taxes from these individuals (e.g., members of the Armed Forces living on military bases) even though the LEAs are obligated to provide free public education to their children. Title VII authorizes several types of Impact Aid payments. These include payments under Section 7002, Section 7003, Section 7007, and Section 7008, which are discussed briefly below. Payments Relating to Federal Acquisition of Real Property ( Section 7 002 ) . Section 7002 compensates LEAs for the federal ownership of certain property. To qualify for compensation, the federal government must have acquired the property, in general, after 1938 and the assessed value of the land at the time it was acquired must have represented at least 10% of the assessed value of all real property within an LEA's area of service. Payments for Eligible Federally Connected Children (Basic Support Payments, Section 7 003 ) . Section 7003 compensates LEAs for enrolling \"federally connected\" children. These are children who reside with a parent who is a member of the uniformed services living on or off federal property, reside with a parent who is an accredited foreign military officer living on or off federal property, reside on Indian lands, reside in low-rent public housing, or reside with a parent who is a civilian working and/or living on federal land. Two payments are made under Section 7003. Section 7003(b) authorizes \"basic support payments\" for federally connected children. Basic support payments are allocated directly to LEAs by ED based on a formula that uses weights assigned to different categories of federally connected children and cost factors to determine maximum payment amounts. Section 7003(d) authorizes additional payments to LEAs based on the number of certain children with disabilities who are eligible to receive services under the Individuals with Disabilities Education Act (IDEA). Payments are limited to IDEA-eligible children whose parents are members of the uniformed services (residing on or off federal property) and those residing on Indian lands. Construction ( Section 7 007 ) . Section 7007 provides funds for construction and facilities upgrading to certain LEAs with high percentages of children living on Indian lands or children of military parents. These funds are used to make formula and competitive grants. Facilities Maintenance ( Section 7 008 ) . Section 7008 provides funds for emergency repairs and comprehensive capital improvements at schools that ED currently owns but LEAs use to serve federally connected military dependent children. Part A (Section 8101) provides definitions of a variety of terms used frequently throughout the ESEA, such as \"local educational agency,\" \"state educational agency,\" \"evidence-based,\" \"four-year adjusted cohort graduation rate,\" \"professional development,\" \"state,\" and \"well-rounded education.\" Part B authorizes SEAs and LEAs to consolidate and jointly use funds available for administration under multiple ESEA programs. In order to qualify for this flexibility, SEAs must demonstrate that a majority of their resources are provided from nonfederal sources. LEAs need SEA approval to consolidate their funds. Part B also authorizes the consolidation of funds set aside for the Department of the Interior under various ESEA programs and the McKinney-Vento Homeless Education program. Part C authorizes SEAs and LEAs to prepare single, consolidated plans and reports for all \"covered\" ESEA programs. In general, the covered programs are the ESEA formula grant programs administered via SEAs. Under this provision, the Secretary is authorized to waive most statutory and regulatory requirements associated with any program authorized by the ESEA, if specifically requested by an SEA or Indian tribe. LEAs may submit waiver requests through their SEA. The SEA may then submit the request to the Secretary if it approves the waiver. Schools must submit their waiver requests to their LEAs, which in turn submit those requests to the SEA. Part E includes provisions related to secretarial approval of state ESEA plans and SEA approval of LEA plans. In both cases, the Secretary and the SEA, respectively, have 120 days from the day the plan was submitted to make a written determination that the submitted plan does not comply with relevant requirements. If such a determination is made, among other actions, the state or LEA must be notified immediately of the determination, provided with a detailed description of the specific plan provisions that failed to meet the requirements, offered an opportunity to revise and resubmit the plan within 45 days of the determination being made, provided technical assistance upon request (from the Secretary or SEA, respectively), and provided with a hearing within 30 days of the plans resubmission. Subpart 1 contains provisions for the participation of private school students and staff in those ESEA programs where such participation is authorized. Under the relevant ESEA programs, services provided to private school students or staff are to be equitable in relation to the number of such students or staff eligible for each program; secular, neutral, and non-ideological, with no funds to be used for religious worship or instruction; and developed through consultation between public and private school officials. Provision is made for bypassing SEAs and LEAs that cannot or have not provided equitable services to private school students or staff, and serving private school students and staff in these areas through neutral, third-party organizations. Provision is also made for the submission of complaints regarding implementation of these requirements. Subpart 1 also prohibits federal control of private or homeschools, or the application of any ESEA requirement to any private school that does not receive funds or services under any ESEA program. It also states that no ESEA provisions apply to homeschools. Subpart 2 contains a wide range of provisions, including the following: a general definition of \"maintenance of effort,\" as applied in several ESEA programs (Section 8521); a requirement that ED publish guidance on prayer in public schools, and a requirement that LEAs receiving ESEA funds certify to their SEAs that they do not limit the exercise of \"constitutionally protected prayer\" in public schools (Section 8524); a requirement that recipient SEAs, LEAs, and public schools have a \"designated open forum\" to provide equal access to the Boy Scouts (Section 8525); a prohibition on the use of ESEA funds to \"promote or encourage sexual activity (Section 8526)\"; a prohibition on federal control of educational curricula, content or achievement standards, building standards, or allocation of resources (Section 8526A and Section 8527); a requirement that LEAs receiving funds under any ED program provide to the armed services access to directory information on secondary school students, unless students or their parents request that such information not be released (Section 8528); a prohibition on federally sponsored testing of students or teachers, with some exceptions (Section 8529); an \"Unsafe School Choice Option\" under which students in states receiving ESEA funds who attend a \"persistently dangerous\" public school, or who are victims of violent crime at school, are to be offered the opportunity to transfer to a \"safe\" public school (Section 8532); a requirement related to the transfer of school disciplinary records (Section 8537); a requirement related to consultation between LEAs and Indian tribes and tribal organizations (Section 8538); a requirement that ED provide outreach and technical assistance to rural LEAs (Section 8539); and a prohibition related to the aiding and abetting of sex abuse (Section 8546). Subpart 3 includes teacher liability protection. This subpart provides limitations on liability for teachers in school for harm caused by an act or omission of the teacher on behalf of the school if certain conditions (e.g., the teacher was acting within the scope of his or her employment) are met. Subpart 4 contains gun-free requirements. Each state receiving funds under the ESEA must have a state law that requires LEAs to expel for at least one year any student who is determined to have brought a firearm to a school or possessed a firearm at a school under the jurisdiction of an LEA in the state. The chief administering officer of the LEA may modify this requirement on a case-by-case basis. In addition, no LEA may receive funds unless it has a policy requiring that any student who brings a firearm or weapon to a school served by the LEA is referred to the criminal justice or juvenile delinquency system. Subpart 5 prohibits smoking within indoor facilities providing kindergarten, elementary, or secondary education or library services to children, if the services are funded directly or indirectly by the federal government, or the facility is constructed, operated, or maintained using federal funds. Part G authorizes ED to reserve 0.5% of the funds appropriated for ESEA programs, other than Titles I, for program evaluations if funds for this purpose are not separately authorized. Appropriations included in Table 1 are based on the most recent data available from ED's Budget Service Office. The amounts shown reflect any reprogramming or transfers of funds done by ED as of the time this table was prepared to provide the actual level of funding allocated to each program/activity. This list of \"programs/activities\" does not take into account the number of programs, projects, or activities that may be funded under a single line-item appropriation, so the actual number of ESEA programs, projects, or activities being supported through appropriations is not shown. It should be noted that ED considers all of the funds provided in an appropriations act for a given fiscal year, including advance appropriations provided for the following fiscal year, to be appropriations for the given fiscal year. For example, for the purposes of appropriations, ED considers all of the funds provided in the FY2019 appropriations act, including advance appropriations provided in FY2020, to be FY2019 appropriations. Table 2 provides ESEA appropriations for FY2016 and FY2017 to depict the transition from the ESEA as amended by the NCLB to the ESEA as amended by the ESSA. Programs authorized under the ESEA as amended by either the NCLB or the ESSA are included. Programs and activities are referred to by their names in the ESEA as amended by the ESSA if a program was in both the ESEA as amended by the ESSA and by the NCLB. If the program had a different name in the ESEA as amended by the NCLB, the name is included in parentheses. Programs are listed in the order in which they appear in the ESEA as amended by the ESSA if they also appeared in the ESEA as amended by the NCLB. For programs that appear in only the ESEA as amended by either the ESSA or the NCLB, programs are listed in the order they appear or appeared in law. For some programs that were funded in FY2016 but not in FY2017, it is possible that another program authorized in FY2017 provided funding for similar purposes. For example, the Elementary and Secondary School Counseling program was funded in FY2016 but not in FY2017. School counseling activities are an allowable use of funds under the SSAE program created under the ESSA. The same methodology as discussed above was used in determining appropriations amounts for each program. Table 3 provides the authorized level of appropriations for each program included in the ESEA that has a specified authorization of appropriations. The ESEA includes authorizations of appropriations for FY2017 through FY2020.", "summary": "The primary source of federal aid for elementary and secondary education is the Elementary and Secondary Education Act (ESEA)âparticularly its Title I-A program, which authorizes federal aid for the education of disadvantaged students. The ESEA was initially enacted in 1965 (P.L. 89-10), and was most recently comprehensively amended and reauthorized by the Every Student Succeeds Act (ESSA; P.L. 114-95 ). Under Title I-A, the ESEA as amended by the ESSA continues to require states and public schools systems to focus on educational accountability as a condition for the receipt of grant funds. Public school systems and individual public schools are held accountable for monitoring and improving achievement outcomes for students and closing achievement gaps, sustaining a focus that was initiated by amendments to the ESEA made by the No Child Left Behind Act of 2001 (NCLB; P.L. 107-110 ) but modified under the ESSA. While states were given more latitude to develop their accountability systems under the ESSA provisions, as a condition of receiving Title I-A funds each state must continue to have content and academic achievement standards and aligned assessments in reading/language arts (RLA), mathematics, and science for specific grade levels. States must now have an accountability system that incorporates (1) long-term and interim performance goals for specified measures; (2) weighted indicators based, in part, on these goals; and (3) an annual system for meaningful differentiation that is used to identify schools that need additional support to improve student achievement. Beyond Title I-A, other ESEA programs provide grants and contracts for a variety of educational purposes. ESEA programs and general provisions are included in eight titles, which collectively received appropriations of $25.2 billion in FY2019. The ESEA's titles are as follows: Title I: Programs for disadvantaged students, student assessment, migratory students, and neglected and delinquent students. Title II: Programs for teachers, principals, and school leaders; literacy; and American history and civics education. Title III: Programs to support English language acquisition for English learners. Title IV: Programs to support a well-rounded education, safe and healthy students, and technology; after-school instruction and care; charter schools; magnet schools; family engagement in education; and various national activities. Title V: Programs to support rural education. Title VI: Programs for Indian education, Native Hawaiian education, and Alaska Native education. Title VII: Impact Aid programs. Title VIII: General provisions. This report provides an overview of major provisions of the ESEA. It also includes a table showing annual appropriations for ESEA programs for FY2017 through FY2019, as well as a table showing the transition in authorized programs and related appropriations from FY2016, when NCLB provisions were still in effect, to FY2017, when ESSA provisions took effect. Finally, a table detailing authorizations of appropriations under current law is also included. The ESSA authorized appropriations for ESEA programs through FY2020.", "document_type": "crs"}
{"report": "This report provides an overview of the FY2020 Defense Appropriations Act ( P.L. 116-93 ) and serves as an access portal to other CRS products providing additional context, detail, and analysis relevant to particular aspects of that legislation. The following Overview tracks the legislative history of the FY2020 defense appropriations act and summarizes the budgetary and strategic context within which it was being debated. Subsequent sections of the report summarize the act's treatment of major components of the Trump Administration's budget request, including selected weapons acquisition programs and other provisions. For FY2020, the Trump Administration requested a total of $750.0 billion in discretionary budget authority for national defense-related activities. This included $718.3 billion (95.8% of the total) for the military activities of the Department of Defense (DOD). The balance of the national defense budget request is for defense-related activities of the Energy Department and other agencies. Of the amount requested for DOD, $689.5 billion fell within the scope of the annual defense appropriations bill, as did $1.1 billion for certain expenses of the intelligence community. This bill does not include funding for military construction and family housing, which is provided by the appropriations bill that funds those activities, the Department of Veterans Affairs, and certain other agencies. Also not included in the FY2020 defense bill is $7.8 billion in accrual payments to fund the TRICARE for Life program of medical insurance for military retirees, funding for which is appropriated automatically each year, as a matter of permanent law (10 U.S.C. 1111-1117). (See Figure 1 .) The FY2020 Defense Appropriations Act, enacted as Division A of H.R. 1158 , the Consolidated Appropriations Act for FY2020, provides a total of $687.8 billion for DOD, which is $2.86 billion less than President Trump requested for FY 2020. (See Table 1 .) Since the terrorist attacks of September 11, 2001, DOD has organized its budget requests in various ways to designate funding for activities that either are related to the aftermath of those attacks or otherwise are distinct from regularly recurring costs to man, train, and equip U.S. armed forces for the long haul. The latter are funds that have come to be referred to as DOD's \"base budget.\" Since 2009, the non-base budget funds have been designated as funding for Overseas Contingency Operations (OCO). Since enactment of the Budget Control Act (BCA) of 2011 ( P.L. 112-25 ), which set binding annual caps on defense and non-defense discretionary spending, the OCO designation has taken on additional significance. Spending designated by the President and Congress as OCO or for emergency requirements (such as the storm damage remediation funds in the enacted FY2020 defense bill) is effectively exempt from the spending caps. Under the law in effect when the FY2020 budget was submitted to Congress, the defense spending cap for FY2020 was $576.2 billion. The Administration's FY2020 budget request for defense-related programs included that amount for the base budget plus an additional $97.9 billion that also was intended to fund base budget activities but which was designated as OCO funding, in order to avoid exceeding the statutory defense spending cap. The Armed Services and Appropriations Committees of both the Senate and the House treated the \"OCO for base\" funds as part of the base budget request. The issue became moot with the enactment on August 2, 2019 of the Bipartisan Budget Act of 2019 ( P.L. 116-37 ) which raised the defense spending cap for FY2020 to $666.5 billion. Separate versions of the FY2020 defense appropriations bill were reported by the Appropriations Committees of the House and Senate. After the House committee reported its version ( H.R. 2968 ), the text of that bill was incorporated into H.R. 2740 , which the House passed on June 19, 2019, by a vote of 226-203. The Senate committee reported its version of the bill ( S. 2474 ) on September 12, 2019, but the Senate took no action on that measure. A compromise version of the defense bill was agreed by House and Senate negotiators and then was incorporated by amendment into another bill ( H.R. 1158 ), which was passed by both chambers. (See Table 2 .) In the absence of a formal conference report on the bill, House Appropriations Committee Chairman Nita Lowey inserted in the Congressional Record an Explanatory Statement to accompany the enacted version of H.R. 1158 . The President's FY2020 budget request for DOD reflects a shift in strategic emphasis based on the 2018 National Defense Strategy (NDS), which called for \"increased and sustained investment\" to counter evolving threats from China and Russia. This marks a change from the focus of U.S. national security policy for nearly the past three decades and a renewed emphasis on competition between nuclear-armed powers, which had been the cornerstone of U.S. strategy for more than four decades after the end of World War II. During the Cold War, U.S. national security policy and the design of the U.S. military establishment were focused on the strategic competition with the Union of Soviet Socialist Republics and on containing the spread of communism globally. In the years following the collapse of the Soviet Union, U.S. policies were designed â and U.S. forces were trained and equipped â largely with an eye on dealing with potential regional aggressors such as Iraq, Iran, and North Korea and recalibrating relations with China and Russia. After the terrorist attacks of September 11, 2001, U.S. national security policy and DOD planning focused largely on countering terrorism and insurgencies in the Middle East while containing, if not reversing, North Korean and Iranian nuclear weapons programs. However, as a legacy of the Cold War, U.S. and allied military forces had overwhelming military superiority over these adversaries and, accordingly, counter-terrorism and counterinsurgency operations were conducted in relatively permissive environments. The 2014 Russian invasion of the Crimean peninsula and subsequent proxy war in eastern Ukraine fostered a renewed concern in the United States and in Europe about an aggressive and revanchist regime in Moscow. Meanwhile, China began building and militarizing islands in the South China Sea in order to lay claim to key shipping lanes and to reinforce its claims to sovereignty over the South China Sea, itself. Together, these events highlighted anew the salience in the U.S. national security agenda of competing with other great powers , that is, states able and willing to use military force unilaterally to accomplish their objectives. At the same time, the challenges that had surfaced at the end of the Cold War (e.g., fragile states, genocide, terrorism, and nuclear proliferation) remained serious threats to U.S. interests. In some cases, adversaries appear to be collaborating to achieve shared or compatible objectives and to take advantage of social and economic tools to advance their agendas. Some states are also collaborating with non-state proxies (including, but not limited to, militias, criminal networks, corporations, and hackers) and deliberately blurring the lines between conventional and irregular conflict and between civilian and military activities. In this complex security environment, conceptualizing, prioritizing, and managing these numerous problems, arguably, is more difficult than it was in eras past. The Trump Administration's December 2017 National Security Strategy (NSS) and the 11-page unclassified summary of the January 2018 National Defense Strategy (NDS) explicitly reorient U.S. national security strategy (including defense strategy) toward a primary focus on great power competition with China and Russia and on countering their military capabilities. In addition to explicitly making great power competition the primary U.S. national security concern, the NDS also argues for a focus on bolstering the competitive advantage of U.S. forces, which, the document contends, has eroded in recent decades vis-Ã -vis the Chinese and Russian threats. The NDS also maintains that, contrary to what was the case for most of the years since the end of the Cold War, U.S. forces now must assume that their ability to approach military objectives will be vigorously contested. The Trump Administration's strategic orientation, as laid out in the NSS and NDS is consistent with the strategy outlined in comparable documents issued by prior Administrations, in identifying five significant external threats to U.S. interests: China, Russia, North Korea, Iran, and terrorist groups with global reach. In a break from previous Administrations, however, the NDS views retaining the U.S. strategic competitive edge relative to China and Russia as a higher priority than countering violent extremist organizations. Accordingly, the new orientation for U.S. strategy is sometimes referred to a \"2+3\" strategy, meaning a strategy for countering two primary challenges (China and Russia) and three additional challenges (North Korea, Iran, and terrorist groups). In the more than four decades since the end of U.S. military involvement in Vietnam, annual outlays by the federal government have increased by a factor of nine. The fastest growing segment of federal spending during that period has been mandatory spending for entitlement programs such as Social Security, Medicare, and Medicaid. (See Figure 2 .) Over the past decade, a central consideration in congressional budgeting was the Budget Control Act of 2011 (BCA; P.L. 112-25 ) as amended, which was intended to control federal spending by enforcement through sequestration of government operating budgets in case discretionary spending budgets failed to meet separate caps on defense and nondefense discretionary budget authority. The act established binding annual limits (or caps) to reduce discretionary federal spending through FY2021 by $1.0 trillion. Sequestration provides for the automatic cancellation of previous appropriations, to reduce discretionary spending to the BCA cap for the year in question. The caps on defense-related spending apply to discretionary funding for DOD and for defense-related activities by other agencies, comprising the national defense budget function which is designated budget function 050 . The caps do not apply to funding designated by Congress and the president as emergency spending or spending on OCO. Congress repeatedly has enacted legislation to raise the annual spending caps. However, at the time the Administration submitted its budget request for FY2020, the national defense spending cap for that year remained $576 billion â a level enacted in 2013 that was $71 billion lower than the revised cap for FY2019. To avert a nearly 11% reduction in defense spending, the Administration's FY2020 base budget request conformed to the then-binding defense cap. But the Administration's FY2020 request also included $165 billion designated as OCO funding (and thus exempt from the cap) of which $98 billion was intended for base budget purposes. The Armed Services and Appropriations Committees of the House and Senate disregarded this tactic, and considered all funding for base budget purposes as part of the base budget request. P.L. 116-93 funds the Administration's proposal for a relatively modest net increase in the number of active-duty military personnel in all four armed forces, but includes a reduction of 7,500 in the end-strength of the Army. According to Army budget documents, the reduction was based on the fact that the service had not met higher end-strength goals in FY2018. The act also funds the proposed reduction in the end-strength of the Selected Reserve â those members of the military reserve components and the National Guard who are organized into operational units that routinely drill, usually on a monthly basis. (See Table 3 ) As was authorized by the FY2020 National Defense Authorization Act ( P.L. 116-92 ), P.L. 116-93 funds a 3.1% increase in military basic pay that took effect on January 1, 2020. The act appropriates $61.7 million for DOD's Sexual Assault Prevention and Response Office (SAPRO), adding to the amount requested $35.0 million for the Special Victims' Counsel (SVC) program . The SVC organization provides independent legal counsel in the military justice system to alleged victims of sexual assault. The act also provides $3.0 million (not requested) to fund a pilot program for treatment of military personnel for Post-Traumatic Stress Disorder related to sexual trauma. The program was authorized by Section 702 of the FY2019 National Defense Authorization Act ( P.L. 115-232 ). P.L. 116-93 added a total of $110 million to the $1.1 billion requested for DOD's childcare program. This is the largest employer-sponsored childcare program in the United States, with roughly 23,000 employees attending to nearly 200,000 children of uniformed service members and DOD civilians. The act and its accompanying explanatory statement let stand a requirement in the Senate Appropriations Committee report on S. 2474 for the Secretary of Defense to give Congress a detailed report on DOD's childcare system including plans to increase its capacity and a prioritized list of the top 50 childcare center construction requirements. P.L. 116-93 generally supports the Administration's FY2020 budget request to continue the across-the-board modernization of nuclear and other long-range strike weapons started by the Obama Administration. The Trump Administration's FY2020 budget documentation described as DOD's \"number one priority\" this modernization of the so-called nuclear triad: ballistic missile-launching submarines, long-range bombers, and land-based intercontinental ballistic missiles (ICBMs). P.L. 116-93 generally supported the Administration's effort to develop an array of long-range missiles that could travel at hypersonic speed â that is, upwards of five times the speed of sound (3,800 mph) â and that would be sufficiently accurate to strike distant targets with conventional (non-nuclear) warheads. Although ballistic missiles travel as fast, the types of weapons being developed under the \"hypersonic\" label differ in that they can maneuver throughout most of their flight trajectory. DOD has funded development of hypersonic weapons since the early 2000s. However, partly because of reports that China and Russia are developing such weapons, DOD identified hypersonic weapons as an R&D priority in its FY2019 budget request and is seeking â and securing from Congress â funding to accelerate the U.S. hypersonic program. The FY2020 DOD budget request continued this trend, and Congress supported it in the enacted FY2020 defense appropriations bill. P.L. 116-93 also provided more than three times the amount requested to develop defenses against hypersonic missiles. Such weapons are difficult to detect and track because of the low altitude at which they fly and are difficult to intercept because of their combination of speed and maneuverability. The act also added $100 million, not requested, to create a Joint Hypersonics Transition Office to coordinate hypersonic R&D programs across DOD. In the Explanatory Statement accompanying the enacted FY2020 defense bill, House and Senate negotiators expressed a concern that the rapid growth in funding for hypersonic weapons development might result in duplication of effort among the services and increased costs. In general, P.L. 116-93 supported the Administration's proposals to strengthen defenses against ballistic missile attacks, whether by ICBMs aimed at U.S. territory, or missiles of shorter range aimed at U.S. forces stationed abroad, or at the territory of allied countries. The missile defense budget request reflected recommendations of the Administration's Missile Defense Review , published in January 2019. (See Table 6 ) Compared with the Administration's budget request, P.L. 116-93 shifted several hundred million dollars among various components of the system intended to defend U.S. territory against ICBMs. In the explanatory statement accompanying the bill, House and Senate negotiators indicated that the impetus for these changes was DOD's August 2019 cancellation of an effort to develop an improved warhead -- designated the Replacement Kill Vehicle (RKV) -- to be carried by the system's Ground-Based Interceptors (GBIs). Partly by reallocating funds that had been requested for the RKV programs, the act provides a total of $515.0 million to develop an improved interceptor missile that would replace the GBI and its currently deployed kill vehicle. It also provides: $285 million for additional GBI missiles and support equipment; and $180 million for R&D intended to improve the reliability GBIs. P.L. 116-93 was generally supportive of the Administration's funding requests for acquisition of military space satellites and satellite launches. (See Table 7 .) Congress approved $40.0 million of the $72.4 million requested for operation of the newly created Space Force, authorized by P.L. 116-92 , the FY2020 National Defense Authorization Act. The Explanatory Statement accompanying the bill asserted that DOD had provided insufficient justification for the Space Force budget request. Therefore, DOD received nearly 44% less in Space Force operating funds than it requested. The Explanatory Statement also directed the Secretary of the Air Force to give the congressional defense committees a month-by-month spending plan for FY2020 Space Force O&M funding. The act supported major elements of the Army's plan to upgrade its currently deployed fleet of ground-combat vehicles. One departure from that plan was the act's provision of 30% more than was requested to increase the firepower of the Stryker wheeled troop-carrier. The program would replace that vehicle's .50 caliber machine gun â effective against personnel â with a 30 mm cannon that could be effective against lightly armored vehicles. (See Table 8 .) The act sends a mixed message regarding congressional support for the Army's strategy for developing a new suite of combat capabilities. The service plans to pay for the new programs â in part -- with funds it anticipated in future budgets that were slated to pay for continuation of upgrade programs for existing systems. Under the Army's new plan, those older programs would be truncated to free up the anticipated funds. In effect, this means that planned upgrades to legacy systems would not occur so investments in development of new systems could be made sooner. The Army has proposed that programs to upgrade Bradley fighting vehicles and CH-47 Chinook helicopters be among those utilized as these \"bill-payers\". The enacted bill provides one-third less than was requested for Bradley upgrades, with the $223.0 million that was cut being labelled by the Explanatory Statement as \"excess to need.\" However, the enacted version of the appropriations bill â like the versions of that bill passed by the House and Senate â provides nearly triple the amount requested for the Chinook upgrade, appropriating $46.2 million rather than the $18.2 million requested. The amount appropriated is the amount that had been planned for the Chinook upgrade in FY2020, prior to the publication of the Army's new modernization plan. In the reports accompanying their respective versions of the bill, the House and Senate Appropriations Committees each had challenged the Army's plan to forego upgrades to the existing CH-47 fleet. P.L. 116-93 reined in the Army's third effort in 20 years to develop a replacement for the 1980s-vintage Bradley infantry fighting vehicle, providing $205.6 million of the $378.4 million requested for the Optionally-Manned Fighting Vehicle (OMFV) program. The program had come under fire on grounds that it was too technologically ambitious to be managed under a streamlined acquisition process (Section 804 authority), as the Army proposed. The issue became moot after P.L. 116-93 was enacted, when the Army announced on January 16, 2020, that it was cancelling the OMFV contracting plan and restarting it with new design parameters. P.L. 116-93 generally supports the budget request for the major aviation programs of all four armed forces. (See Table 9 ) An indicator of potential future disagreements between Congress and the Army was the act's insistence that a planned upgrade of the service's CH-47 Chinook helicopter continue as had been planned prior to submission of the FY2020 budget request. As discussed above, this is one of several programs to improve currently deployed equipment that the Army wants to curtail in order to free up funds in future budgets for the wide-ranging modernization strategy it announced in late 2019. Prior to tagging the program as a \"bill-payer\" for new programs, the Army had projected a FY2020 request of $46.4 million associated with procurement of improved \"Block II\" CH-47s. The amended FY2020 request for the program was $18.2 million, reflecting the Army's decision to truncate the planned procurement. The enacted version of the FY2020 defense bill â like the versions passed by the House and approved by the Senate Appropriations Committee â provided $46.2 million for the program. The act provides $985.5 million of the $1.05 billion requested for eight F-15s to partly fill the gap in Air Force fighter strength resulting from later-than-planned fielding of the F-35A Joint Strike Fighter. The act shifted funds for two of the eight aircraft and some design efforts (a total of $364.4 million) to the Air Force's Research and Development account on grounds that those F-15s would be used for testing. The Explanatory Statement accompanying the act directs the Secretary of the Air Force to provide the House and Senate Armed Services and Appropriations Committees with a review of options for reducing the Air Force's shortfall in its planned complement of fighters. P.L. 116-93 supports major elements of the Navy's shipbuilding budget request. The request in turn reflects a 2016 plan to increase the size of the fleet to 355 ships, a target some 15% higher than the force goal set by the previous Navy plan. The request included â and the act generally supports â funds to begin construction of a number of relatively large, unmanned surface and subsurface ships that carry weapons and sensors and would further enlarge the force. The act departed from the budget request on two issues that involved more than $1 billion apiece: It denied a total of $3.2 billion budgeted for one of the three Virginia -class submarines included in the Administration's request, adding $1.4 billion of those funds instead to the funds requested (and approved by the act) for the other two subs. The increase is intended to pay for incorporating into the two funded ships the so-called Virginia Payload Module -- an 84-foot-long, mid-body section equipped with four large-diameter, vertical launch tubes for storing and launching additional Tomahawk missiles or other payloads. It provided a total of $1.2 billion, not requested, for specialized ships and a landing craft to support amphibious landings by Marine Corps units. (See Table 10 .) Notes: The Appendix lists the full citation of each CRS product cited in this table by its ID number. Following, in numerical order, are the full citations of CRS products cited in this report. CRS Reports CRS Report RS20643, Navy Ford (CVN-78) Class Aircraft Carrier Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL30563, F-35 Joint Strike Fighter (JSF) Program , by Jeremiah Gertler. CRS Report RL30624, Navy F/A-18E/F and EA-18G Aircraft Program , by Jeremiah Gertler. CRS Report RL31384, V-22 Osprey Tilt-Rotor Aircraft Program , by Jeremiah Gertler. CRS Report RL32109, Navy DDG-51 and DDG-1000 Destroyer Programs: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL32418, Navy Virginia (SSN-774) Class Attack Submarine Procurement: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL32665, Navy Force Structure and Shipbuilding Plans: Background and Issues for Congress , by Ronald O'Rourke. CRS Report RL33640, U.S. Strategic Nuclear Forces: Background, Developments, and Issues , by Amy F. Woolf. CRS Report R41129, Navy Columbia (SSBN-826) Class Ballistic Missile Submarine Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R42972, Sequestration as a Budget Enforcement Process: Frequently Asked Questions , by Megan S. Lynch. CRS Report R43049, U.S. Air Force Bomber Sustainment and Modernization: Background and Issues for Congress , by Jeremiah Gertler. CRS Report R43240, The Army's Armored Multi-Purpose Vehicle (AMPV): Background and Issues for Congress , by Andrew Feickert. CRS Report R43838, Renewed Great Power Competition: Implications for DefenseâIssues for Congress , by Ronald O'Rourke. CRS Report R43543, Navy LPD-17 Flight II and LHA Amphibious Ship Programs: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R43546, Navy John Lewis (TAO-205) Class Oiler Shipbuilding Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R44039, The Defense Budget and the Budget Control Act: Frequently Asked Questions , by Brendan W. McGarry. CRS Report R44229, The Army's M-1 Abrams, M-2/M-3 Bradley, and M-1126 Stryker: Background and Issues for Congress , by Andrew Feickert. CRS Report R44463, Air Force B-21 Raider Long-Range Strike Bomber , by Jeremiah Gertler. CRS Report R44519, Overseas Contingency Operations Funding: Background and Status , by Brendan W. McGarry and Emily M. Morgenstern. CRS Report R44874, The Budget Control Act: Frequently Asked Questions , by Grant A. Driessen and Megan S. Lynch. CRS Report R44891, U.S. Role in the World: Background and Issues for Congress , by Ronald O'Rourke and Michael Moodie. CRS Report R44968, Infantry Brigade Combat Team (IBCT) Mobility, Reconnaissance, and Firepower Programs , by Andrew Feickert. CRS Report R44972, Navy Frigate (FFG[X]) Program: Background and Issues for Congress , by Ronald O'Rourke. CRS Report R45288, Military Child Development Program: Background and Issues , by Kristy N. Kamarck. CRS Report R45349, The 2018 National Defense Strategy: Fact Sheet , by Kathleen J. McInnis. CRS Report R45519, The Army's Optionally Manned Fighting Vehicle (OMFV) Program: Background and Issues for Congress , by Andrew Feickert. CRS Report R45811, Hypersonic Weapons: Background and Issues for Congress , by Kelley M. Sayler. CRS Report R46002, Military Funding for Border Barriers: Catalogue of Interagency Decisionmaking , by Christopher T. Mann and Sofia Plagakis. CRS Report R46107, FY2020 National Defense Authorization Act: Selected Military Personnel Issues , coordinated by Bryce H. P. Mendez. CRS Report R46211, National Security Space Launch , by Stephen M. McCall. CRS Report R46216, The Army's Modernization Strategy: Congressional Oversight Considerations , by Andrew Feickert and Brendan W. McGarry. Congressional In Focus CRS In Focus IF10541, Defense Primer: Ballistic Missile Defense , by Stephen M. McCall. CRS In Focus IF10657, Budgetary Effects of the BCA as Amended: The \"Parity Principle\" , by Grant A. Driessen. CRS In Focus IF11244, FY2020 National Security Space Budget Request: An Overview , by Stephen M. McCall and Brendan W. McGarry. CRS In Focus IF11326, Military Space Reform: FY2020 NDAA Legislative Proposals , by Stephen M. McCall. Congressional Insights CRS Insight IN11052, The Defense Department and 10 U.S.C. 284: Legislative Origins and Funding Questions , by Liana W. Rosen. CRS Insight IN11083, FY2020 Defense Budget Request: An Overview , by Brendan W. McGarry and Christopher T. Mann. CRS Insight IN11148, The Bipartisan Budget Act of 2019: Changes to the BCA and Debt Limit , by Grant A. Driessen and Megan S. Lynch. CRS Insight IN11210, Possible Use of FY2020 Defense Funds for Border Barrier Construction: Context and Questions , by Christopher T. Mann.", "summary": "The FY2020 Defense Appropriations Act, enacted as Division A of H.R. 1158 , the Consolidated Appropriations Act for FY2020, provides a total of $687.8 billion in discretionary budget authority, all to fund activities of the Department of Defense (DOD), except for $1.1 billion for certain activities of the intelligence community. As enacted, the bill provides 99.6% of the funding requested by President Trump requested for programs falling within the scope of this bill. To comply with the FY2020 cap on DOD base budget funding that was in effect at the time the FY2020 budget request was submitted, the Administration included in its request $97.9 billion intended for DOD base budget activities, but which was designated as part of the Overseas Contingency Operations (OCO) request and thus was exempt from the cap for all practical purposes. The Appropriations Committees of the House and Senate treated these funds as part of the base budget request. Activities funded by the annual defense appropriations act accounted for more than 90% of the budget authority included in the Trump Administration's $761.8 billion budget request for national defense-related activities in FY2020. The balance of the request consisted of activities funded by other appropriations bills (e.g., DOD's military construction program and defense-related nuclear energy work of the Energy Department) and certain amounts appropriated automatically as a result of permanent law.", "document_type": "crs"}
{"report": "T he Constitution grants Congress enormous power and freedom to engage in what we now refer to as budgeting. First, the Constitution grants Congress the power of the purse but does not prescribe or require any specific budgetary legislation or budgetary outcomes. Further, the Constitution allows the House and Senate to determine the rules of their internal proceedings but does not prescribe or establish any budgetary rules or restrictions. Congress has thus developed certain types of budgetary legislation as well as rules and practices that govern the content and consideration of that budgetary legislation. This collection of budgetary legislation, rules, and practices is referred to as the congressional budget process. Some have criticized the current congressional budget process and the budget outcomes that it has produced and have suggested that Congress adopt a more long-term budget focus. There is no consensus on what is meant by long term . For example, advocates of biennial budgeting (i.e., two-year budget resolutions, two-year appropriations legislation) sometimes characterize a two-year cycle as long-term budgeting. Some view the current 10-year budget window (described below) as being a form of long-term budgeting, while others consider long-term budgeting to span a lengthier period, such as 30 years or 50 years. There is also no general consensus on what is required by long-term budgeting. Would it simply require Congress to stay informed of the long-term projections for spending, revenue, deficits, and debt? Would it require Congress to affirmatively vote annually on policies that are projected to continue year to year? Would it require Congress to adopt a long-term budget plan or long-term fiscal targets (e.g., debt-to-GDP ratio limits)? And if targets were agreed upon, would it require automatic triggers to enforce fiscal targets (e.g., automatic spending cuts or automatic tax increases)? Members of Congress, the Administration, and outside groups have expressed concern over projected levels of deficits and debt. The Congressional Budget Office (CBO) recently stated that federal deficits and debt held by the public, which are higher than average, are projected to increase sharply over the next 30 years. CBO states that deficits would rise from 4.2% of gross domestic product (GDP) in 2019 to 8.7% in 2049. According to CBO, federal debt held by the public is currently 78% of GDP, significantly higher than the 50-year average of 42%. Under current law, budget deficits would cause the debt to be 92% of GDP by 2029 and 144% of GDP by 2049, which \"would be the highest in the nation's history by far.\" If policymakers want debt in 2049 to equal its current share of GDP (78%), the deficit would need to be reduced by $400 billion every year until then, CBO has projected. Some have argued that the current congressional budget process has created, or at least exacerbated, the projected long-term deficit and debt challenges. One recurring criticism is that the process does not encourage or require the consideration of long-term budgetary outcomes. Some argue that the lack of a formal requirement for Congress to consider long-term budget outcomes discourages long-term planning and encourages policy outcomes that are desirable in the short term at the expense of the long-term budget situation. Further, they argue that the current process does not even deter or prohibit Congress from enacting legislation that worsens the long-term deficit and debt projections. They argue that Congress needs to adopt a long-term budget focus. This report provides information on existing resources and congressional rules related to a long-term budget focus. There are potential challenges or obstacles associated with the adoption of a long-term budget focus within the current congressional budget process. Many think of the budget as being decided annually, but most policies that dictate how much will be spent and collected are fixed. Mandatory spending makes up 70% of total spending, is generally set by laws enacted years or decades ago, and remains in effect without the need for annual congressional approval. (Mandatory spending includes Medicare, Social Security, Medicaid, and interest on the debt.) Likewise, the collection of revenue as prescribed by the tax code continues without the need for legislative action. These mandatory spending and revenue policies change only if Congress and the President enact legislation making such changes. Under current law, these fixed spending and revenue policies are projected to result in increasing deficits and debt. Many argue that addressing rising deficit and debt in the long term would require policy changes. Another challenge associated with long-term budgeting is that any projected levels of spending and revenue are inherently uncertain. The further out spending and revenue are projected, the more uncertain they become. For example, within CBO's long-term budget projections (referenced above), the agency notes that such projections are \"very uncertain.\" CBO concludes that while debt as a percentage of GDP in 2049 would likely be much greater than it is today if current laws remain unchanged, many factors (e.g., labor force participation, productivity in the economy, interest rates on federal debt, and health care costs per person) may alter actual outcomes. Other challenges associated with long-term budgeting include the difficulty of budgeting for unforeseen events (such as military engagements, natural disasters, and downturns in the economy); underlying projection assumptions; and the problem of setting fiscal policy or establishing long-term goals that a future Congress may not support. Information and data are publicly available to assist Congress in understanding the projected long-term budget situation. Projections are available that show spending, revenue, deficits, and debt in the long term, and in some instances, data evaluating the long-term outlook of specific programs are available. Selected examples of that information are described below. CBO regularly publishes budgetary and economic projections, which are formally known as the annual Budget and Economic Outlook but are often referred to in Congress as the annual baseline. These baseline projections cover a 10-year period, which is often referred to as the budget window. These projections are based on the assumption that current laws regarding federal spending and revenues will generally remain in place. The Budget and Economic Outlook includes information on projected spending, revenue, deficits, debt, economic growth, and alternative fiscal scenarios. Congress typically uses this baseline as a benchmark against which it measures legislative proposals. The Office of Management and Budget (OMB) also publishes budgetary and economic projections. As required by law, OMB includes information in the President's annual budget request on projected spending and revenue. Such projections typically span 10 years. In addition to the information provided on the 10-year budgetary outlook under current law, CBO provides Congress with cost estimates of certain proposed legislation. The Congressional Budget Act of 1974 (the Budget Act) requires that the CBO provide an estimate for any bill reported from committee. These cost estimates provide information on how the legislation would affect spending, revenues, and the deficit over the next 10 years relative to the baseline. Such cost estimates assist Congress in adhering to the budget resolution and other points of order, described below. Each year, CBO provides Congress with its Long-Term Budget Outlook , which shows the effects of demographic trends, economic developments, and rising health care costs on federal spending, revenues, and deficits over the next 30 years. The report also shows the long-term budgetary and economic effects of some alternative policies. In addition, in its cost estimates, CBO is required to note whether the underlying legislation would increase deficits in future decades. To assist the Senate in complying with its \"long-term deficit rule\" (described below), CBO notes whether the legislation would increase on-budget deficits in any of the four consecutive 10-year periods beginning with 2030. OMB provides long-term projections in the President's annual budget request in a section titled, \"Long Term Budget Outlook.\" These projections recently spanned a 25-year period and include projections under different fiscal scenarios. The Government Accountability Office also provides information and interactive tools on projected spending, revenue, deficits, and debt over the next 70 years. Long-term information and projections are available for some individual programs. For example, the Social Security and Medicare Trustees issue respective actuarial estimates of each trust fund for the next 75 years. These reports contain both short- and long-range projections of annual program expenditures and payroll tax receipts. There are also estimates of the actuarial deficits over the next 75 years that represent the shortfall between the program's projected expenditures and income. In addition, the CBO provides long-term projections on specific programs. For example, CBO publishes recurring reports on the long-term projections for Social Security, the long-term implications of the Future Years Defense Program, and 10-year costs of U.S. nuclear forces. The Constitution grants Congress the power of the purse. In carrying out such duties, Congress has developed budget-related rules and legislation as well as committees to carry out this responsibility. Some of these tools might be used in long-term budgeting. Congressional committees serve Congress by specializing in particular policy areas. They do this by gathering information, making policy recommendations, and performing oversight. In the course of this work, committees study and make recommendations related to the long-term implications of the specific programs within their jurisdiction. For example, the Senate Finance Committee and the House Ways and Means Committee may hold hearings on the long-term outlook for Social Security. In addition, the House and Senate each have a Budget Committee, established by the Budget Act. They enjoy jurisdiction over the budget resolution, the budget reconciliation process (described below), and the budget process generally. As stated by the Senate Budget Committee, \"The [Budget] Committee, the budget resolution and reconciliation process, and enforcement authorities were created to enable Congress to create, enforce, and manage the annual Federal budget, including all types of Federal spending and revenues.\" The Budget Committees may impact the budget and the budget process in many ways. They are responsible for developing and drafting a budget plan in the form of a budget resolution. A budget resolution agreed to by the House and Senate may trigger the budget reconciliation process, which has been used to make legislative changes reducing future deficits (described below). During the development of the budget plan, the Budget Committees gather information on the budget from many sources. They review the President's budget submission, and the director of OMB typically testifies before each Budget Committee. Additionally, the committees closely review CBO's annual budget and economic outlook for the upcoming 10 years, and the director of CBO testifies before the Budget Committees to answer questions. The Budget Committees also hold hearings and consider legislation related to the budget process and the budget as a whole. This has included examining the long-term budget outlook and the potential for a more long-term budget process. Since the Budget Committees enjoy jurisdiction over the budget process generally, they would likely be involved in any efforts to alter the current process. The budget resolution reflects an annual agreement between the House and Senate on spending and revenue levels for the upcoming fiscal year and at least four additional years. The budget resolution does not become law. Therefore, no money is spent or collected as a result of its adoption. Instead, it is an agreement between the House and Senate meant to assist Congress in considering an overall budget plan. Once agreed to by both chambers in the exact same form, the budget resolution creates parameters that may be enforced in two primary ways: (1) by points of order and (2) by using the budget reconciliation process. Once the budget resolution has been agreed to by both chambers, certain levels contained in it are enforceable through points of order. This means that if legislation is being considered on the House or Senate floor that would violate certain levels contained in the budget resolution, a Member may raise a point of order against the consideration of that legislation. The Budget Act requires that the budget resolution include the following budgetary levels for the upcoming fiscal year and at least four additional years (often referred to as out years): total spending, total revenues, the surplus/deficit, new spending for each major functional category, the public debt, and (in the Senate only) Social Security spending and revenue levels. The Budget Act also requires that the aggregate amounts of spending recommended in the budget resolution be allocated among committees. While points of order can be effective in enforcing the budgetary goals outlined in the budget resolution, they can be raised against legislation only when it is pending on the House or Senate floor. Moreover, points of order cannot limit direct spending or revenue levels resulting from current law. Often, for the budgetary levels in the budget resolution to be achieved, Congress must pass legislation to alter the levels of revenue and/or direct spending resulting from existing law. In this situation, Congress seeks to reconcile the levels of direct spending and revenue under existing law with those budgetary levels expressed in the budget resolution. To assist in this process, the budget reconciliation process allows special consideration of legislation that would accomplish those budgetary levels expressed in the budget resolution. If Congress intends to use the reconciliation process, reconciliation directives must be included in the annual budget resolution. These directives instruct individual committees in the House and Senate to develop and report legislation that would change laws within their jurisdiction related to direct spending, revenue, or the debt limit. Such reconciliation legislation is then eligible to be considered under special expedited procedures in both the House and Senate. These procedures are especially important in the Senate as they include a limit on debate time. This means the legislation does not require the support of three-fifths of Senators to bring debate to a close. Since 1980, Congress has sent the President 25 reconciliation acts, 21 of which were signed into law. Reconciliation has most often been used to enact legislation that was projected to reduce deficits. For example, between 1981 and 1984, four reconciliation bills were enacted that were each projected to decrease the deficit. Reconciliation legislation can be used to make policy changes that are temporary or permanent, therefore affecting the long-term budget. For a brief description of each reconciliation bill enacted into law, see CRS Report R40480, Budget Reconciliation Measures Enacted Into Law: 1980-2017 , by Megan S. Lynch. While the reconciliation process has been used to enact legislation that was projected to increase the net deficit, a Senate rule (known as the Byrd rule) prohibits reconciliation legislation from increasing the net deficit outside the \"budget window.\" (The budget window is the period covered by the underlying budget resolution and recently has spanned 10 years. ) The House and Senate have many additional budget-related points of order that seek to restrict or prohibit consideration of different types of budgetary legislation, some of which have long-term implications. These points of order are found in various places such as the Budget Act, House and Senate standing rules, and past budget resolutions. For example, the House and Senate have pay-as-you-go (PAYGO) rules that prohibit the consideration of direct spending or revenue legislation that is projected to increase the deficit in either of two time periods: (1) the period consisting of the current fiscal year, the budget year, and the four ensuing fiscal years following the budget year and (2) the period consisting of the current fiscal year, the budget year, and the ensuing nine fiscal years following the budget year. Additionally, in the Senate, a rule exists that is often referred to as the \"long-term deficit point of order.\" It prohibits the consideration of legislation that would cause a net increase in deficits of more than $5 billion in any of the four consecutive 10-year periods beginning after the upcoming 10 years. Previously, the House had a similar rule that prohibited consideration of legislation that would cause a net increase in mandatory spending in excess of $5 billion during the same period. The House rule is no longer in effect. In addition to points of order, there are other types of budget enforcement mechanisms that seek to restrict or prohibit the enactment of budgetary legislation over the long term. The Budget Control Act of 2011 (BCA; P.L. 112-25 ) established statutory limits on discretionary spending for a 10-year period ( FY2012-FY2021 ) . (S imilar discretionary spending limits were in effect between FY1991 and FY2002.) The BCA sets separate annual limits for defense discretionary and nondefense discretionary spending. The defense category consists of discretionary spending in budget function 050 (national defense) only. The nondefense category includes discretionary spending in all other budget functions. If discretionary appropriations are enacted that exceed a statutory limit for a fiscal year, across-the-board reductions (i.e., sequestration) of nonexempt budgetary resources are triggered to eliminate the excess spending within the applicable category. In February 2010, the Statutory Pay-As-You-Go Act of 2010 ( P.L. 111-139 ) was enacted establishing a budget enforcement mechanism commonly referred to as \"Statutory PAYGO.\" Statutory PAYGO is generally intended to discourage enactment of legislation that is projected to increase the on-budget deficit over five and 10 years. To enforce Statutory PAYGO, OMB is required to record the budgetary effects of newly enacted revenue and direct spending legislation over the course of a year. After the end of a congressional session, OMB is required to issue an annual PAYGO report noting whether a debit has been recorded for the current budget year. If no such debit is found, no action occurs. If a debit is found, however, the President must issue a sequestration order, which automatically implements across-the-board cuts to non-exempt direct spending programs to compensate for the amount of the debit. While the following budget related mechanisms are no longer in effect, they provide insight into Congress's past budget process reform efforts and the desire for long-term budgeting. In 1985, the Balanced Budget and Emergency Deficit Control Act ( P.L. 99-177 )âreferred to as the Gramm-Rudman-Hollings Actâemployed budget process mechanisms in an attempt to force Congress and the President to balance the budget within a six-year period by specifying annual deficit limits for each fiscal year (1986-1991). The act required that both the President and Congress adhere to the deficit limits when developing their budget plans. The act did not specify what policy changes should be made to achieve deficit reduction, leaving Congress and the President to negotiate over possible revenue increases and spending decreases. To enforce the specified deficit limits, the act set forth a specific process for the cancellation of spending by sequestration in the event that the deficit limits were breached. These deficit targets and related enforcement mechanism were amended by the Balanced Budget and Emergency Deficit Control Act of 1987 ( P.L. 100-119 ) and then were fundamentally revised by the Budget Enforcement Act of 1990 ( P.L. 101-508 ), which replaced the focus on deficit targets under Gramm-Rudman-Hollings with a two-pronged approach to budgetary enforcement: the implementation of PAYGO procedures to control new direct spending and revenue legislation and discretionary spending limits to control the level of discretionary spending. For more information, see CRS Report R41901, Statutory Budget Controls in Effect Between 1985 and 2002 , by Megan S. Lynch. The BCA created a Joint Select Committee on Deficit Reduction. The committee comprised 12 Members from the House and Senateâthree chosen by each of the chambers' party leaders. The committee was instructed to develop legislation to reduce the budget deficit by at least $1.5 trillion over the 10-year period FY2012-FY2021. Legislation reported by the committee would then be eligible to be considered under special expedited procedures in both the House and Senate. These procedures are especially important in the Senate since they include a limit on debate time. This means the legislation does not require the support of three-fifths of Senators to bring debate to a close. The BCA stipulated that if a measure meeting specific requirements was not enacted by January 15, 2012, then an automatic process would be triggered to enforce the budgetary goal established for the committee. The committee did not reach agreement on such legislation, and while the committee is no longer in effect, the automatic process triggered by the lack of enactment still remains. This comprises annual downward adjustments of the discretionary spending limits (described above) and sequester of nonexempt mandatory spending programs through FY2027. The Bipartisan Budget Act of 2018 ( P.L. 115-123 ) created the Joint Select Committee on Budget and Appropriations Process Reform. The committee comprised 16 Members from the House and Senateâfour chosen by each of the chambers' party leaders. The committee was tasked with formulating recommendations and legislative language to \"significantly reform the budget and appropriations process.\" The committee held a markup on draft legislation that concluded on November 29, 2018. The principal recommendation in the draft provided that the budget resolution would be adopted for a two-year cycle rather than the current annual cycle. The committee ultimately did not vote to report the bill as amended, and it was never considered by the full house.", "summary": "Members of Congress, the Administration, and outside groups have expressed concern over long-term projections of deficits and debt levels. The Congressional Budget Office (CBO) has stated that federal deficits and debt held by the public, which are higher than average, are projected to increase sharply over the next 30 years. Some have argued that the current congressional budget process has created, or at least exacerbated, the projected long-term deficit and debt challenges. It has been said that the current process does not encourage or require the consideration of long-term budgetary outcomes. Some argue that the lack of a formal requirement for Congress to consider long-term budget outcomes discourages long-term planning and encourages policy outcomes that are desirable in the short term at the expense of the long-term budget situation. It has therefore been suggested that Congress adopt a long-term budget focus. In considering budget or budget process reform, it may be useful to review current congressional tools that may be used for long-term budgeting. For example, information and data are publicly available that project spending, revenue, deficit, and debt levels in the long term, and in some instances, data evaluating the long-term outlook of specific programs are available. Congressional committees are useful resources for long-term budgeting as they gather information and make policy recommendations on individual programs, as well as the budget as a whole. In addition, Congress is able to develop and consider a multiyear budget plan in the form of a budget resolution. The budget resolution may also trigger the budget reconciliation process, which has been used to make legislative changes addressing long-term budgetary levels. Also, the House and Senate have internal rules that restrict or prohibit consideration of legislation that would have certain long-term budgetary effects (e.g., the PAYGO rule and the long-term deficit rule). And lastly, there are laws that restrict or prohibit the enactment of budgetary legislation that would have certain long-term budgetary effects (such as 10-year discretionary spending limits and statutory PAYGO).", "document_type": "crs"}
{"report": "T he Constitution contains three provisions that mention the term \"emolument\": 1. The Foreign Emoluments Clause . Article I, Section 9, Clause 8 provides that \"no Person holding any Office of Profit or Trust under [the United States], shall, without the Consent of Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State\"; 2. The Domestic Emoluments Clause . Article II, Section 1, Clause 7 provides that \"[t]he President shall, at stated Times, receive for his Services, a Compensation, which shall neither be encreased nor diminished during the Period for which he shall have been elected, and he shall not receive within that Period any other Emolument from the United States, or any of them\"; and 3. The Ineligibility Clause. Article I, Section 6, Clause 2 provides (among other things) that no Member of Congress shall \"be appointed\" during his or her term \"to any civil Office under the Authority of the United States, which shall have been created, or the Emoluments whereof shall have been encreased during such time[.]\" The first two of these Clauses are the focus of this report. For most of their history, the Foreign and Domestic Emoluments Clauses (collectively, the Emoluments Clauses or the Clauses) were little discussed and largely unexamined by the courts. Recent litigation involving the President, however, has led to multiple federal court decisions more fully addressing the Clauses' scope and application. This report accordingly provides an overview of the Emoluments Clauses as they relate to the President, focusing on the legal issues that have been central to the recent litigation. More specifically, this report discusses (1) the history and purpose of the Clauses; (2) whether the President is a person holding an \"Office of Profit or Trust under [the United States]\" for purposes of the Foreign Emoluments Clause; (3) the scope of the Emoluments Clauses, focusing specifically on disputes over the breadth of the term \"emolument\"; and (4) how the Clauses may be enforced. The Foreign Emoluments Clause's basic purpose is to prevent corruption and limit foreign influence on federal officers. At the Constitutional Convention, Charles Pinckney of South Carolina introduced the language that became the Foreign Emoluments Clause based on \"the necessity of preserving foreign Ministers & other officers of the U.S. independent of external influence.\" The Convention approved the Clause unanimously without noted debate. During the ratification debates, Edmund Randolph of Virginiaâa key figure at the Conventionâexplained that the Foreign Emoluments Clause was intended to \"prevent corruption\" by \"prohibit[ing] any one in office from receiving or holding any emoluments from foreign states.\" The Clause reflected the Framers' experience with the then-customary European practice of giving gifts to foreign diplomats. Following the example of the Dutch Republic, which prohibited its ministers from receiving foreign gifts in 1651, the Articles of Confederation provided that \"any person holding any office of profit or trust under the United States, or any of them\" shall not \"accept of any present, emolument, office, or title of any kind whatever, from any king, prince, or foreign state.\" The Foreign Emoluments Clause largely tracks this language from the Articles, although there are some differences. During the Articles period, American diplomats struggled with how to balance their legal obligations and desire to avoid the appearance of corruption, against prevailing European norms and the diplomats' wish to not offend their host country. A well-known example from this period, which appears to have influenced the Framers of the Emoluments Clause, involved the King of France's gift of an opulent snuff box to Benjamin Franklin. Concerned that receipt of this gift would be perceived as corrupting and violate the Articles of Confederation, Franklin sought (and received) congressional approval to keep the gift . Following this precedent, the Foreign Emoluments Clause prohibits federal officers from accepting foreign presents, offices, titles, or emoluments, unless Congress consents. The Domestic Emoluments Clause's purpose is to preserve the President's independence from Congress and state governments. To accomplish this end, the Clause contains two key provisions. First, it provides that the President shall receive a compensation for his services, which cannot be increased or decreased during his term, thus preventing Congress from using its control over the President's salary to exert influence over him. To preserve presidential independence further, the Clause provides that, apart from this fixed salary, the President shall not receive \"any other Emolument\" from the United States or any state government. In light of its purpose, the Domestic Emoluments Clauseâunlike the Foreign Emoluments Clauseâdoes not permit Congress to assent to the receipt of otherwise prohibited emoluments from the state or federal governments. The Domestic Emoluments Clause, which drew upon similar provisions in state constitutions, received little noted debate at the Constitutional Convention. Its meaning, however, was elucidated by Alexander Hamilton in The Federalist No. 73 . Hamilton wrote that the Domestic Emoluments Clause was designed to isolate the President from potentially corrupting congressional influence: because the President's salary is fixed \"once for all\" each term, the legislature \"can neither weaken his fortitude by operating on his necessities, nor corrupt his integrity by appealing to his avarice.\" Similarly, Hamilton explained that because \"[n]either the Union, nor any of its members, will be at liberty to give . . . any other emolument,\" the President will \"have no pecuniary inducement to renounce or desert the independence intended for him by the Constitution.\" Other Framers echoed this sentiment during the ratification debates. The Foreign Emoluments Clause provides a role for Congress in determining the propriety of foreign emoluments, in that receipt of an emolument otherwise prohibited by the Clause is permitted with the consent of Congress. Under this authority, Congress has in the past provided consent to the receipt of particular presents, emoluments, and decorations through public or private bills, or by enacting general rules governing the receipt of gifts by federal officers from foreign governments. For example, in 1966, Congress enacted the Foreign Gifts and Decorations Act, which provided general congressional consent for foreign gifts of minimal value, as well as conditional authorization for acceptance of gifts on behalf of the United States in some cases. Several Presidents in the 19th centuryâsuch as Andrew Jackson, Martin Van Buren, John Tyler, and Benjamin Harrison ânotified Congress of foreign presents that they had received, and either placed the gifts at its disposal or obtained consent to their receipt. Other 19th century Presidents treated presents that they received as \"gifts to the United States, rather than as personal gifts.\" Thus, in one instance, President Lincoln accepted a foreign gift on behalf of the United States and then deposited it with the Department of State. In the 20th century, some Presidents have sought the advice of the Department of Justice's Office of Legal Counsel (OLC) on whether acceptance of particular honors or benefits would violate the Emoluments Clauses. Three such OLC opinions addressed whether (1) President Kennedy's acceptance of honorary Irish citizenship would violate the Foreign Emoluments Clause; (2)Â President Reagan's receipt of retirement benefits from the State of California would violate the Domestic Emoluments Clause; and (3)Â President Obama's acceptance of the Nobel Peace Prize would violate the Foreign Emoluments Clause. An important threshold issue in examining the Emoluments Clauses is determining who is subject to their terms. The scope of the Domestic Emoluments Clause is clear: it applies to \"[t]he President.\" The Clause prohibits the President from receiving emoluments from state or federal governments, aside from his fixed federal salary. The Foreign Emoluments Clause applies to any person holding an \"Office of Profit or Trust under [the United States].\" OLC, which has developed a body of opinions on the Emoluments Clauses, has opined that the President \"surely\" holds an \"Office of Profit or Trust\" under the Constitution. OLC opinions are generally considered binding within the executive branch. There has been significant academic debate about whether OLC's conclusion comports with the original public meaning of the Foreign Emoluments Clause. Some legal scholars have argued that the Foreign Emoluments Clause does not apply to elected officials such as the President, but only to certain appointed federal officers. Other scholars support OLC's view that the President holds an office of profit and trust under the United States under the original meaning of the Foreign Emoluments Clause. In addition to textual and structural arguments, these scholars debate the significance of Founding-era historical evidence. To support the view that the Foreign Emoluments Clause does not apply to the President, academics have observed that, among other things, (1) a 1792 list produced by Alexander Hamilton of \"every person holding any civil office or employment under the United States\" did not include elected officials such as the President and Vice President; (2)Â George Washington accepted gifts from the Marquis de Lafayette and the French Ambassador while President without seeking congressional approval; and (3)Â Thomas Jefferson similarly received and accepted diplomatic gifts from Indian tribes and foreign nations, such as a bust of Czar Alexander I from the Russian government, without seeking congressional approval. On the other side of the debate, scholars have observed that, among other things, (1) during Virginia's ratification debates, Edmund Randolph directly stated that the Foreign Emoluments Clause applies to the President; (2) George Mason, another Framer, articulated a similar view in those same debates; and (3) Alexander Hamilton, discussing the dangers of foreign influence on republics in The Federalist No. 22 , stated that this concern extends to a republic's elected officials. Beyond examining contemporaneous historical evidence of the Foreign Emoluments Clause's original public meaning, other evidence (such as text, precedent, and settled practice) is often usedâat least by some juristsâto inform constitutional meaning and interpretation. As a textual matter, both the Constitution itself and contemporaneous sources refer to the Presidency as an \"Office.\" The President receives compensation for his service in office (that is, \"Profit\") and is tasked with many important constitutional duties (that is, \"Trust\"). Furthermore, as discussed earlier, historical practice from the 19th and 20th centuries could support the view that the President is subject to the Foreign Emoluments Clause. Unlike Washington's and Jefferson's actions, several 19th century Presidents notified Congress or sought congressional approval upon receipt of gifts by foreign governments. Finally, the common practice among recent Presidents of placing their financial interests in a blind trust or its equivalent could reflect a concern that presidential financial holdings may implicate the Foreign Emoluments Clause. The parties in recent litigation involving the Emoluments Clauses have not disputed that the Foreign Emoluments Clause applies to the President. A single district court decision has reached the merits of this issue. Weighing the evidence discussed above, that court held that \"the text, history, and purpose of the Foreign Emoluments Clause, as well as executive branch precedent interpreting it, overwhelmingly support the conclusion\" that the Foreign Emoluments Clause applies to the President. This case is currently on appeal before the full Fourth Circuit. A key disputed issue regarding the scope of the Emoluments Clauses is what constitutes an \"emolument.\" This question has divided legal scholars and has only recently been addressed by any federal courts. Scholars, courts, and executive branch agencies have offered several potential definitions of \"emolument\": 1. Office-related definitions . Black's Law Dictionary defines an \"emolument\" as an \"advantage, profit, or gain received as a result of one's employment or one's holding of office.\" Some scholars argue that this employment- or office-centric definition of the term is the definition encompassed by the Emoluments Clauses, meaning that the Clauses prohibit covered officials from receiving compensation \"for the personal performance of services\" as an officer or employee but do not bar \"ordinary business transactions\" between a covered official and government. 2. Any \"profit, gain, advantage, or benefit . \" Others argue that the term \"emolument\" is broader in scope, applying to any profit, gain, advantage, or benefit. Under this broader conception, even \"ordinary, fair market value transactions\" between a covered official and foreign or domestic governments would be prohibited. Two recent district court decisions adopted this broader definition of \"emolument.\" 3. Functional or purpose-based d ef initions. Both the Department of Justice's OLC and the Comptroller General of the United States, on behalf of the Government Accountability Office (GAO), have issued opinions on whether the acceptance of particular payments, benefits, or positions would implicate the Emoluments Clauses. These opinions have at times appeared to adopt a fact-specific, functional view of the Clauses, focusing on the purpose and potential effect of the specific payments or benefits at issue as they relate to the Clauses' goals of limiting influence on the President and federal officers. The relevant assessment in some of these opinions has appeared to be whether the payments or benefits are intended to or could \"influence . . . the recipient as an officer of the United States\" under the totality of the circumstances. At least one commentator has asserted that the OLC and GAO opinions support a middle view that Presidents or other federal officers may receive \"certain fixed benefits\" without those benefits being considered emoluments so long as they are not \"subject to foreign or domestic government manipulation or adjustment in connection with\" the office. Debates over the scope of the Clauses have largely centered on their text, their history and purpose, and historical practice. With respect to text, for instance, proponents of a broad definition emphasize the use of the word \"any\" in both Clauses and the phrase \"any kind whatever\" in the Foreign Emoluments Clause. They also contrast those provisions with the limiting term \"whereof\" that links emoluments to \"civil Office\" in the Ineligibility Clause (the provision that limits the ability of Members of Congress to hold dual positions). But proponents of a narrower, office- or employment-limited definition note that the word \"any\" in the Clauses may simply be read as extending coverage to multiple forms of emoluments (beyond just monetary remuneration). They further assert that the use of \"emolument\" in the Ineligibility Clause is clearly tied to an office-based definition and supports applying the same definition to the other provisions. As for the Clauses' history and purpose, both sides point to dictionary definitions and other uses of the word (including by Framers) contemporaneous with the Constitution's drafting to support their preferred definition. Proponents of a broad definition also argue that statements about the general anti-corruptive purpose of the Clauses support reading it expansively, while proponents of an office- or employment-limited definition assert that the Clauses were the product of a \"balancing of values\" that included attracting candidates for federal service who may have had conflicting commercial interests. As for the corpus of OLC and GAO opinions interpreting the Clauses, proponents of the broader and narrower definitions both cite opinions that they argue support their favored definitions. In 2018 and 2019, two federal district courts substantively addressed the Emoluments Clauses' scope for the first time. Both courts concluded that the term \"emolument\" as used in the Clauses \"is broadly defined as any profit, gain, or advantage.\" As to the Clauses' text, the courts found significant the use of \"expansive modifiers\" like \"any other\" and \"any kind whatever,\" and rejected the proposition that the term's office-related use in the Ineligibility Clause should control its use in the other Clauses. With respect to the Clauses' history and purpose, the courts, while acknowledging that broader and narrower definitions of \"emolument\" both existed at the time of ratification, found the weight of the historical evidence and the Clauses' \"broad anti-corruption\" purpose supported the more expansive definition. Finally, the courts viewed executive branch precedent and practice as \"overwhelmingly consistent with .Â .Â . [an] expansive view of the meaning of the term 'emolument,'\" observing that \"OLC pronouncements repeatedly cite the broad purpose of the Clauses and the expansive reach of the term 'emolument.'\" The recent court decisions construing the Emoluments Clauses are not final, however. In fact, as discussed below, one of the decisions was reversed by a panel of the Fourth Circuit on a separate issue regarding the standing of the plaintiffs to sue, and the full Fourth Circuit has agreed to consider the district court's rulings. The other decision has been certified for an immediate appeal to the District of Columbia Circuit. Thus, the import of these decisions is uncertain. Separate from issues regarding the scope of the Emoluments Clauses is how the provisions' mandates are enforced, including whether and to what extent the federal courts and Congress have a role in addressing violations of the Clauses. A principal hurdle in recent litigation involving the President has been the doctrine of standing. Standing is a threshold limitation concerning whether the person or entity suing in federal court has a \"right to make a legal claim or seek judicial enforcement of a duty or right.\" The limitation includes a constitutional component stemming from Article III of the U.S. Constitution, which limits the exercise of federal judicial power to \"Cases\" or \"Controversies.\" The Supreme Court has interpreted this \"case-or-controversy limitation\" to require, among other things, that a litigant have \"a personal stake in the outcome of the controversy\" before the court. At a minimum, a plaintiff must establish that he or she has suffered a personal injury (often called an \"injury-in-fact\") that is actual or imminent and concrete and particularized. In other words, the injury cannot be \"abstract,\" must affect the plaintiff in a \"personal and individual way,\" and must actually exist or at least be \"certainly impending\" rather than merely possible in the future. The plaintiff must also show \"a sufficient causal connection between the injury and the conduct complained of\" (causation) and \"a likelihood that the injury will be redressed by a favorable decision\" (redressability). Recent lawsuits over the Emoluments Clauses have been filed in three federal courts by (1)Â private parties who argue they compete for business with properties related to the alleged violations of the Clauses, as well as a public interest organization (the \"SDNY litigation\"); (2)Â the State of Maryland and the District of Columbia (the \"Maryland litigation\"); and (3) over 200 Members of Congress (the \"Congressional litigation\"). Each set of plaintiffs implicate distinct legal issues and precedents related to standing. Private-party competitor plaintiffs rely on the notion of \"competitor standing,\" which holds that an economic actor may have standing to challenge unlawful action that benefits a direct competitor in a way that increases competition in the relevant market. State plaintiffs also rely on a competitor standing theory and additionally assert harms to certain sovereign and \"quasi-sovereign\" interests of the state related to tax revenue, diminution of their sovereign authority, and the economic well-being of state residents in general. Finally, Members of Congress assert standing stemming from the alleged deprivation of their constitutionally prescribed opportunity to vote on the permissibility of particular emoluments under the Foreign Emoluments Clause, which implicates a unique set of standing principles that apply specifically to legislative plaintiffs. More broadly, regardless of the status or classification of the plaintiffs, the fact that a lawsuit involving the Emoluments Clauses seeks a court ruling on the constitutionality of the conduct of an official within another branch of the federal government means that courts must conduct an \"especially rigorous\" standing inquiry given underlying separation-of-powers concerns. Attempts by these various plaintiffs to sue for alleged violations of the Emoluments Clauses have thus far met with mixed results. With respect to private-party competitor plaintiffs, the district court in the SDNY litigation concluded that several such plaintiffs lacked standing because it was \"wholly speculative\" that any loss of business or increase in competition could be traced to alleged violations of the Emoluments Clauses rather than \"government officials' independent desire to patronize [the] businesses\" allegedly involved in those violations based on factors such as service and location. But the Second Circuit recently reversed the district court's ruling regarding the competitor plaintiffs, concluding that \"a plaintiff-competitor who alleges a competitive injury caused by a defendant's unlawful conduct that skewed the market in another competitor's favor [has standing] notwithstanding other possible, or even likely, causes for the benefit going to the plaintiff's competition.\" As for state plaintiffs, a different district court concluded in the Maryland litigation that the State of Maryland and the District of Columbia (D.C.) had standing to sue as competitors based on their interests, along with the interests of their citizens, in hotels and event spaces that competed with a hotel in D.C. related to the alleged unconstitutional conduct. The court reasoned that, based on specific factual allegations regarding diversion of business to that hotel, the plaintiffs were \"placed at a competitive disadvantage\" because of violations of the Clauses that \"unfairly skew[ed] the hospitality market\" against them. Yet a panel of the Fourth Circuit reversed this decision, concluding that the theory of standing hinged on the proposition that government customers were patronizing the relevant hotel \"because the [h]otel distributes profits or dividends\" in violation of the Clauses \"rather than due to any of the [h]otel's other characteristics.\" In the panel's view, such a proposition required \"speculation into the subjective motives of independent actors . . . not before the court, undermining a finding of causation.\" The Fourth Circuit panel's decision has itself now been vacated, however, with the full Fourth Circuit agreeing to hear the case. Finally, as to Members of Congress, the district court in the Congressional litigation determined in 2018 that over 200 Members had standing to sue under the Foreign Emoluments Clause based on the deprivation of their \"opportunity to exercise their constitutional right to vote on whether to consent prior to . . . acceptance of prohibited emoluments.\" Faced with Supreme Court precedent indicating that individual legislators generally lack standing to sue for institutional injuries that amount to \"abstract dilution of institutional legislative power,\" but may have standing when their votes on specific items \"have been completely nullified,\" the district court concluded that the Members alleging violations of the Foreign Emoluments Clause fell into the latter category. Central to the district court's decision in the Congressional litigation was its view that the Member-plaintiffs lacked an adequate legislative remedy for the alleged violations without court intervention. According to the court, although Congress as a whole could pass \"legislation on the emoluments issue\" to consent to or reject perceived emoluments, the political process would do nothing to address the deprivation of the Members' opportunity to give advance approval or disapproval of particular emoluments in the first instance. As with the court rulings on the definition of the term \"emolument,\" the judicial decisions on standing to enforce the Emoluments Clauses are all subject to further review by the respective circuit courts. It is thus possible that the outcomes in some or all the opinions just described could change. If the effective split between the Second and Fourth Circuits on the viability of competitor standing theories as they relate to alleged violations of the Emoluments Clauses endures, Supreme Court review is also possible. Beyond standing, other doctrines may present potential roadblocks to judicial enforcement of the Clauses. For instance, though its continued vitality is questionable, the Supreme Court has traditionally applied a \"zone of interests\" test as a prudential aspect of the standing inquiry, which \"denies a right of review if the plaintiff's interests are marginally related to or inconsistent with the purposes implicit in the constitutional provision\" at issue. Applying this test in the context of the Emoluments Clauses, the district court in the SDNY litigation involving private competitors concluded that such competitors fell outside the zone of interests of the Clauses, because the Emoluments Clauses stemmed from \"concern with protecting the . . . government from corruption and undue influence\" and were not \"intended . . . to protect anyone from competition.\" Another potential barrier is the political question doctrine, a separation-of-powers-based limitation on the ability of courts to hear disputes where there is, among other things, a \"textually demonstrable constitutional commitment of the issue to a coordinate political department; or a lack of judicially discoverable and manageable standards for resolving it.\" In the SDNY litigation, the district court concluded that Congress's authority to \"consent to violations\" of the Foreign Emoluments Clause meant that Congress, rather than the judiciary, would be \"the appropriate body to determine whether\" the alleged conduct \"infringes on that power.\" Reversing both these rulings, however, the Second Circuit recently concluded that (1) \"a plaintiff who sues to enforce a law that limits the activity of a competitor satisfies the zone of interests test even though the limiting law was not motivated by an intention to protect entities such as plaintiffs from competition,\" and (2) the judiciary's responsibility to adjudicate alleged violations of the Constitution was not lessened by the \"mere possibility that Congress might grant consent\" to particular emoluments. The district courts in the Maryland litigation and the Congressional litigation likewise agreed that the zone of interests test and political question doctrine did not bar those suits. But like the other issues raised in recent litigation involving the Emoluments Clauses, further review of the application of these doctrines is possible. Ultimate resolution of the issues is thus uncertain and will likely depend on the nature of the plaintiff involved. If the courts lack jurisdiction to enforce the Emoluments Clauses, the political process would be the remaining avenue for enforcement. In this vein, Congress could seek to enforce the Emoluments Clauses through legislation, political pressure, or potentially impeachment and removal. For instance, given that the Foreign Emoluments Clause explicitly provides a role for Congress in evaluating the propriety of the receipt of foreign emoluments by federal officers, Congress may be empowered to create civil or criminal remedies for violations or establish prophylactic reporting requirements through legislation. Indeed, one bill from the 115th Congress would have required certain reports and divestiture of personal financial interests of the President posing a potential conflict of interest, among other things. Resolutions have also been introduced in the 115th and 116th Congresses objecting to perceived violations of the Foreign Emoluments Clause, as well as calling on the President to take certain actions based on alleged potential violations. That said, it is unclear whether legislative actions would provide an effective means to enforce the Emoluments Clauses against the President, given the possibility of veto and potential separation-of-powers objections. As noted above, the adequacy of these legislative options has been a central issue in the Congressional litigation as it relates to Members' standing, and the issue is subject to further review at the appellate level.", "summary": "Recent litigation involving the President has raised legal issues concerning formerly obscure constitutional provisions that prohibit the acceptance or receipt of \"emoluments\" in certain circumstances. First, the Foreign Emoluments Clause (Article I, Section 9, Clause 8 of the Constitution) prohibits any person \"holding any Office of Profit or Trust under\" the United States from accepting \"any present, Emolument, Office, or Title, of any kind whatever\" from a foreign government unless Congress consents. Second, the Domestic Emoluments Clause (Article II, Section 1, Clause 7) prohibits the President from receiving \"any other Emolument [beyond a fixed salary] from the United States, or any of them.\" These two provisions (collectively, the Emoluments Clauses) have distinct, but related, purposes. The purpose of the Foreign Emoluments Clause is to prevent corruption and limit foreign influence on federal officers. The Clause grew out of the Framers' experience with the European custom of gift-giving to foreign diplomats, which the Articles of Confederation prohibited. The purpose of the Domestic Emoluments Clause is to preserve the President's independence by preventing the legislature and the states from exerting influence over him \"by appealing to his avarice.\" An important threshold issue in examining the Emoluments Clauses is determining who is subject to their terms. The scope of the Domestic Emoluments Clause is clear: it applies to \"[t]he President.\" The scope of the Foreign Emoluments Clause is less clear. By its terms, the Clause applies to any person holding an \"Office of Profit or Trust under\" the United States. The prevailing view is that this language reaches only federal, and not state, officeholders. According to the Department of Justice's Office of Legal Counsel (OLC), which has a developed body of opinions on the Foreign Emoluments Clause, offices \"of profit\" include those that receive a salary, while offices \"of trust\" require discretion, experience, and skill. There is some disagreement over whether elected federal officers, such as the President, are subject to the Foreign Emoluments Clause. Some legal scholars have argued that, as a matter of original public meaning, the Foreign Emoluments Clause reaches only appointed officers (and not elected officials). Other legal scholars dispute that argument, however, and OLC has presumed that the Foreign Emoluments Clause applies to the President. A recent district court opinion on this issue came to the same conclusion. Another key disputed issue over the scope of the Emoluments Clauses is what constitutes an \"emolument.\" This question has divided legal scholars, and federal courts have only recently addressed the issue. Debate has largely centered on whether the Emoluments Clauses restrict private, arm's-length market transactions between covered officials and governments, or whether the Clauses are limited to office- or employment-based compensation. For its part, OLC has at times appeared to adopt a fact-specific, functional view of the Clauses, focusing on the purpose and potential effect of the specific payments or benefits at issue as they relate to the Clauses' goals of limiting influence on the President and federal officers. The only two courts to decide the issue adopted a broad definition of \"emolument\" as reaching any benefit, gain, or advantage of more than de minimis value, but those decisions are not final. Courts are divided over whether the Emoluments Clauses may be enforced through civil litigation. Among other things, the doctrine of standing may present a significant limitation on the ability of public officials or private parties to seek judicial enforcement of the Emoluments Clauses. Standing, grounded in Article III of the Constitution, requires a plaintiff to identify a personal injury (known as an \"injury-in-fact\") that is actual or imminent, concrete, and particularized. The injury must also be \"fairly traceable\" to allegedly unlawful conduct of the defendant and \"likely to be redressed by the requested relief.\" Different plaintiffs in ongoing Emoluments Clause cases have relied on various theories to support standing, with mixed results. States and private parties, including business competitors to an office holder, have asserted injuries in the form of increased competition and loss of business from the alleged constitutional violations. Some Members of Congress have relied on the alleged deprivation of their opportunity to vote on the acceptance of emoluments under the Foreign Emoluments Clause to support their standing to sue. The lower courts have reached different conclusions on these standing issues, and the Supreme Court has yet to weigh in on the matter. If the courts lack jurisdiction to enforce the Emoluments Clauses, the political process would be the remaining avenue to enforce the provisions, such as through legislation or political pressure. The adequacy of those options is, however, disputed.", "document_type": "crs"}
{"report": "The Unfunded Mandates Reform Act of 1995 (UMRA) established requirements for enacting certain legislation and issuing certain regulations that would impose enforceable duties on state, local, or tribal governments or on the private sector. UMRA refers to obligations imposed by such legislation and regulations as \"mandates\" (either \"intergovernmental\" or \"private sector,\" depending on the entities affected). The direct cost to affected entities of meeting these obligations are referred to as \"mandate costs,\" and when the federal government does not provide funding to cover these costs, the mandate is termed \"unfunded.\" UMRA incorporates numerous definitions, exclusions, and exceptions that specify what forms and types of mandates are subject to its requirements, termed \"covered mandates.\" Covered mandates do not include many federal actions with potentially significant financial impacts on nonfederal entities. This report's primary purpose is to describe the kinds of legislative and regulatory provisions that are subject to UMRA's requirements, and, on this basis, to assess UMRA's impact on federal mandates. The report also examines debates that occurred, both before and since UMRA's enactment, concerning what kinds of provisions UMRA ought to cover, and considers the implications of experience under UMRA for possible future revisions of its scope of coverage. This report also describes the requirements UMRA imposes on congressional and agency actions to establish covered mandates. For most legislation and regulations covered by UMRA, these requirements are only informational. For reported legislation that would impose covered mandates on the intergovernmental or private sectors, UMRA requires the Congressional Budget Office (CBO) to provide an estimate of mandate costs. Similarly, for regulations that would impose covered mandates on the intergovernmental or private sectors, UMRA requires that the issuing agency provide an estimate of mandate costs (although the specifics of the estimates required for legislation and for regulations differ somewhat). Also, solely for legislation that would impose covered intergovernmental mandates, UMRA establishes a point of order in each house of Congress through which the chamber can decline to consider the legislation. This report examines UMRA's implementation, focusing on the respective requirements for mandate cost estimates on legislation and regulations, and on the point of order procedure for legislation proposing unfunded intergovernmental mandates. The concept of unfunded mandates rose to national prominence during the 1970s and 1980s primarily through the response of state and local government officials to changes in the nature of federal intergovernmental grant-in-aid programs and to regulations affecting state and local governments. Before then, the federal government had traditionally relied on the provision of voluntary grant-in-aid funding to encourage state and local governments to perform particular activities or provide particular services that were deemed to be in the national interest. These arrangements were viewed as reflecting, at least in part, the constitutional protections afforded state and local governments as separate, sovereign entities. During the 1970s and 1980s, however, state and local government advocates argued that a \"dramatic shift\" occurred in the way the federal government dealt with states and localities. Instead of relying on the technique of subsidization to achieve its goals, the federal government was increasingly relying on \"new, more intrusive, and more compulsory\" programs and regulations that required compliance under the threat of civil or criminal penalties, imposed federal fiscal sanctions for failure to comply with the programs' requirements, or preempted state and local government authority to act in the area. These new, more intrusive and compulsory programs and regulations came to be referred to as \"unfunded mandates\" on states and localities. State and local government advocates viewed these unfunded federal intergovernmental mandates as inconsistent with the traditional view of American federalism, which was based on cooperation, not compulsion. They argued that a federal statute was needed to forestall federal legislation and regulations that imposed obligations on state and local governments that resulted in higher costs and inefficiencies. UMRA's enactment in 1995 culminated years of effort by state and local government officials to control, if not eliminate, the imposition of unfunded federal mandates. Advocates of regulatory reform adapted the concept of unfunded mandates to their view that federal regulations often impose financial burdens on private enterprise. Critics of government regulation of business argued that these regulations impose unfunded mandates on the private sector, just as federal programs and regulations impose fiscal obligations on state and local governments. As a result, various business organizations subject to increased federal regulation came to support state and local government efforts to enact federal legislation to control unfunded federal intergovernmental mandates. Private-sector advocates argued that they, too, should be provided relief from what they viewed as burdensome federal regulations that hinder economic growth. Subsequently, proposals to control unfunded mandates that were developed in the early 1990s contained provisions addressing not only federal intergovernmental mandates, but federal private-sector mandates as well. During floor debate on legislation that became UMRA, sponsors of the measure emphasized its role in bringing \"our system of federalism back into balance, by serving as a check against the easy imposition of unfunded mandates.\" Opponents argued that federal mandates may be necessary to achieve national objectives in areas where voluntary action by state and local governments or business failed to achieve desired results. See Appendix A for a more detailed examination of the rise of unfunded federal mandates as a national issue and of UMRA's legislative history. The congressional commitment to reshaping intergovernmental relations through UMRA is reflected in its eight statutory purposes: (1) to strengthen the partnership between the Federal Government and State, local, and tribal governments; (2) to end the imposition, in the absence of full consideration by Congress, of Federal mandates on State, local, and tribal governments without adequate Federal funding, in a manner that may displace other essential State, local, and tribal governmental priorities; (3) to assist Congress in its consideration of proposed legislation establishing or revising Federal programs containing Federal mandates affecting State, local, and tribal governments, and the private sector by—(A) providing for the development of information about the nature and size of mandates in proposed legislation; and (B) establishing a mechanism to bring such information to the attention of the Senate and the House of Representatives before the Senate and the House of Representatives vote on proposed legislation; (4) to promote informed and deliberate decisions by Congress on the appropriateness of Federal mandates in any particular instance; (5) to require that Congress consider whether to provide funding to assist State, local, and tribal governments in complying with Federal mandates, to require analyses of the impact of private sector mandates, and through the dissemination of that information provide informed and deliberate decisions by Congress and Federal agencies and retain competitive balance between the public and private sectors; (6) to establish a point-of-order vote on the consideration in the Senate and House of Representatives of legislation containing significant Federal intergovernmental mandates without providing adequate funding to comply with such mandates; (7) to assist Federal agencies in their consideration of proposed regulations affecting State, local, and tribal governments, by—(A) requiring that Federal agencies develop a process to enable the elected and other officials of State, local, and tribal governments to provide input when Federal agencies are developing regulations; and (B) requiring that Federal agencies prepare and consider estimates of the budgetary impact of regulations containing Federal mandates upon State, local, and tribal governments and the private sector before adopting such regulations, and ensuring that small governments are given special consideration in that process; and (8) to begin consideration of the effect of previously imposed Federal mandates, including the impact on State, local, and tribal governments of Federal court interpretations of Federal statutes and regulations that impose Federal intergovernmental mandates. To achieve its purposes, UMRA's Title I established a procedural framework to shape congressional deliberations concerning covered unfunded intergovernmental and private-sector mandates. This framework requires CBO to estimate the direct mandate costs of intergovernmental mandates exceeding $50 million and of private-sector mandates exceeding $100 million (in any fiscal year) proposed in any measure reported from committee. It also establishes a point of order against consideration of legislation that contained intergovernmental mandates with mandate costs estimated to exceed the threshold amount. In addition, Title II requires federal administrative agencies, unless otherwise prohibited by law, to assess the effects on state and local governments and the private sector of proposed and final federal rules and to prepare a written statement of estimated costs and benefits for any mandate requiring an expenditure exceeding $100 million in any given year. All threshold amounts under these provisions are adjusted annually for inflation. In 2019, the threshold amounts are $82 million for intergovernmental mandates and $164 million for private sector mandates. In general, the requirements of Titles I and II apply to any provision in legislation, statute, or regulation that would impose an enforceable duty upon state and local governments or the private sector. However, UMRA does not apply to duties stemming from participation in voluntary federal programs, rules issued by independent regulatory agencies, or rules issued without a general notice of proposed rulemaking. Exceptions also exist for rules and legislative provisions that cover individual constitutional rights, discrimination, emergency assistance, grant accounting and auditing procedures, national security, treaty obligations, and certain elements of Social Security legislation. In most instances, UMRA also does not apply to conditions of federal assistance. UMRA's Title III also called for a review of federal intergovernmental mandates to be completed by the now-defunct U.S. Advisory Commission on Intergovernmental Relations (ACIR) within 18 months of enactment. ACIR completed a preliminary report on federal intergovernmental mandates in January 1996, but the final report was not released. Finally, UMRA's Title IV authorizes judicial review of federal agency compliance with Title II provisions. One of the first issues Congress faced when considering unfunded federal mandate legislation was how to define the concept. For example, during a November 3, 1993, congressional hearing on unfunded mandate legislation, Senator Judd Gregg argued, Any bill reported out this committee [Governmental Affairs] should precisely define what constitutes an unfunded federal mandate.... An appropriate definition is crucial because it will drive almost everything else that occurs. Without a precise definition, endless litigation would likely ensue over what is and what is not an unfunded federal mandate. A true solution to the problem cannot allow it to become more cost-effective to pay the bills than to seek payment. Furthermore, the definition cannot be too restrictive. It would solve nothing to cut off one particular type of unfunded mandate, only to prompt Congressional use of another to accelerate. The difficulty Congress faced in defining the concept was that there were strong disagreements, among academics, practitioners, and elected officials, over how to define it. These disagreements appear motivated by concerns about which classes of costs incurred by state and local governments (or the private sector) should be identified and controlled for in the legislative or regulatory process. They have typically been conducted, however, as disputes about which classes of such costs are properly considered as obligatory requirements on the affected entities. The resulting focus on whether or not particular kinds of costs are \"mandatory\" has tended to obscure consideration of the core policy question concerning what kinds of costs should be subjected to informational requirements or procedural restrictions such as those that UMRA establishes. In 1979, one set of federalism scholars defined unfunded federal intergovernmental mandates broadly as including \"any responsibility, action, procedure, or anything else that is imposed by constitutional, administrative, executive, or judicial action as a direct order or that is required as a condition of aid.\" In 1984, ACIR offered a rationale for defining unfunded federal intergovernmental mandates which excluded conditions of aid. ACIR argued that defining unfunded federal intergovernmental mandates was difficult because federal grant-in-aid programs typically include both incentives and mandates backed by sanctions or penalties: Few federal programs affecting state and local governments are pure types.... Every grant-in-aid program, including General Revenue Sharing, the least restrictive form of aid, comes with federal \"strings\" attached. Here, as in other areas, there is no such thing as a free lunch.... In the intergovernmental sphere, then, [mandates] and subsidy are less like different parts of a dichotomy than opposing ends of a continuum. At one extreme is the general support grant with just a few associated conditions or rules; at the other is the costly, but wholly unfunded, national \"mandate.\" In between are many programs combining subsidy and [mandate] approaches, in varying degrees and in various ways. ACIR argued that because federal grant-in-aid programs typically combine subsidy and mandate approaches, grant-in-aid programs should be classified according to their degree of compulsion. It argued that conditions of grant aid should not be classified as a mandate because \"one of the most important features of the grant-in-aid is that its acceptance is still viewed legally as entirely voluntary\" and \"although it is difficult for many jurisdictions to forego substantial financial benefits, this option remains real.\" ACIR also argued that most grant conditions affect only the administration of those activities funded by the program, and \"grants-in-aid generally provide significant benefits to the recipient jurisdiction.\" ACIR argued that federal grant-in-aid programs that \"cannot be side-stepped, without incurring some federal sanction, by the simple expedient of refusing to participate in a single federal assistance program\" should be considered mandates. ACIR provided four examples of federal activities that, in the absence of sufficient compensatory funding, could be an unfunded intergovernmental mandate: (1) direct legal orders that must be complied with under the threat of civil or criminal penalties; (2) crosscutting or generally applicable requirements imposed on grants across the board to further national social and economic policies; (3) programs that impose federal fiscal sanctions in one program area or activity to influence state and local government policy in another area; and (4) federal preemption of state and local government law. In 1994, several organizations representing state and local governments issued a set of unfunded mandate principles which defined unfunded federal intergovernmental mandates as any federal requirement that compels state or local activities resulting in additional state or local expenditures; any federal requirement that imposes additional conditions or increases the level of state and local expenditures needed to maintain eligibility for existing federal grants; any reduction in the rate of federal matching for existing grants; and any federal requirement that reduces the productivity of existing state or local taxes and fees and/or that increases the cost of raising state and local revenue (including the costs of borrowing). Also in 1994, ACIR introduced the term \"federally induced costs\" to replace what it described as \"the pejorative and definitional baggage associated with the term 'mandates.'\" ACIR identified the following types of federal activities that expose states and localities to additional costs: statutory direct orders; total and partial statutory preemptions; grant-in-aid conditions on spending and administration, including matching requirements; federal income tax provisions; federal court decisions; and administrative rules issued by federal agencies, including regulatory delays and nonenforcement. ACIR defended its inclusion of grant-in-aid conditions in its list of \"federally induced costs,\" which it had excluded from its definition of federal mandates a decade earlier, by asserting that although the option of refusing to accept federal grants \"seemed plausible when federal aid constituted a small and highly compartmentalized part of state and local revenues, it overlooks current realities. Many grant conditions have become far more integral to state and local activities—and far less subject to voluntary forbearance—than originally suggested by the contractual model.\" On April 28, 1994, John Kincaid, ACIR's executive director, testified at a congressional hearing that legislation concerning unfunded mandates \"should recognize that unfunded Federal mandates include, in reality, a range of Federally-induced costs for which reimbursements may be legitimate considerations.\" State and local government officials generally advocated the inclusion of ACIR's \"federally induced costs\" in legislation placing conditions on the imposition of unfunded intergovernmental mandates. However, organizations representing various environmental and social groups, such as the Committee on the Appointment of People With Disabilities, the Natural Resources Defense Council, the American Federation of State, County, and Municipal Employees, and the Service Employees International Union, argued that ACIR's definition was too broad. These groups testified at various congressional hearings that some federal mandates, particularly those involving the environment and constitutional rights, should be retained, even if they were unfunded. With respect to definitions, there was, and continues to be, a general consensus among federalism scholars, state and local government officials, and other organizations that federal policies which impose unavoidable costs on state and local governments or business are, in the absence of sufficient compensatory funding, unfunded federal mandates. Because statutory direct orders, such as the Equal Employment Opportunity Act of 1972, which bars employment discrimination on the basis of race, color, religion, sex, and national origin, are compulsory, they are considered federal mandates. In the absence of sufficient compensatory funding, they are unfunded federal mandates. However, there was, and continues to be, a general consensus that some statutory direct orders, particularly those involving the guarantee of constitutional rights, should be exempt from legislation placing conditions on the imposition of unfunded federal mandates. For example, on April 28, 1994, then-Governor (and later Senator) Benjamin Nelson, testifying on behalf of the National Governors Association at a congressional hearing on unfunded mandate legislation, argued, At the outset, Mr. Chairman, I want to make it absolutely crystal clear that the Governors' position opposing unfunded environmental mandates must not be interpreted as an effort to discontinue environmental legislation and regulations or oppose any individual's civil or constitutional rights. The Governors consider the protection of public health and State natural resources as among the most important responsibilities of our office. We all take an oath of office to protect the health and safety of our citizens. In addition, we have worked with Congress over the years to enact strong Federal environmental laws. Total and partial preemptions of state and local spending and regulatory authority by the federal government are compulsory, but there was, and continues to be, disagreement concerning whether they should be considered federal mandates, or whether they should be included in legislation designed to provide relief from unfunded federal mandates. Total preemptions in the intergovernmental arena prevent state and local government officials from implementing their own programs in a policy area. For example, states have been \"stripped of their powers to engage in economic regulation of airlines, bus, and trucking companies, to establish a compulsory retirement age for their employees other than specified state policymakers and judges, or to regulate bankruptcies with the exception of the establishment of a homestead exemption.\" Partial preemption typically is a joint enterprise, \"whereby the federal government exerts its constitutional authority to preempt a field and establish minimum national standards, but allows regulatory administration to be delegated to the states if they adopt standards at least as strict as the federal rules.\" Legally, the state decision to administer a partial preemption program is voluntary. States that do not have a program in a particular area or do not wish to assume the costs of administration and enforcement can opt out and allow the federal government to enforce the standards. Nonetheless, the federal standards apply. Total and partial statutory preemptions are distinct from unfunded federal intergovernmental mandates because they do not necessarily impose costs or require state and local governments to take action. Nonetheless, some federalism scholars and state and local government officials have argued that total and partial statutory preemptions should be included in legislation placing conditions on the imposition of unfunded federal mandates because they can have similar adverse effects on state and local government flexibilities and, in some instances, resources. A leading federalism scholar identified 557 federal preemption statutes as of 2005. Others argue that total and partial preemptions are distinct from unfunded federal mandates and, therefore, should not be included in legislation placing conditions on the imposition of unfunded federal mandates. In addition, some business organizations oppose including preemptions in any law or definition involving unfunded federal mandates because federal preemptions can result in the standardization of regulation across state and local jurisdictions, an outcome favored by some business interests, particularly those with interstate and global operations. Conditions of grants-in-aid are generally not considered unfunded mandates because the costs they impose on state and local governments can be avoided by refusing the grant. However, federalism scholars and state and local government officials have argued that, in the absence of sufficient compensatory funding, grant conditions should be considered unfunded federal intergovernmental mandates, even though the grants themselves are voluntary. In their view, federal \"grants often require major commitments of state resources, changes in state laws, and even constitutional provisions to conform to a host of federal policy and administrative requirements\" and that some grant programs, such as Medicaid, are \"too large for state and local governments to voluntarily turn down, or when new and onerous conditions are added some time after state and local governments have become dependent on the program.\" For example, on April 28, 1994, Patrick Sweeney, a Democratic Member of Ohio's state House of Representatives testifying on behalf of the National Conference of State Legislatures (NCSL), asserted at a congressional hearing on unfunded mandate legislation that A great majority of the current problem can be attributed to Federal entitlements that are defined but then not adequately funded, and the proliferation of a mandatory requirement for what previously were voluntary programs. Programs like Medicaid are voluntary in theory only. A State cannot unilaterally opt out of Medicaid at any time it wishes, once it is in the program, without having to obtain a Federal waiver or face certain lawsuits. Federalism scholars and state and local government officials argue that federal tax policies that preempt state and local authority to tax specific activities or entities are unfunded mandates, and should be covered under legislation placing restrictions on unfunded mandates, because the fiscal impact of preempting state or local government revenue sources cannot be avoided and \"can be every bit as costly\" as mandates ordering state or local government action. For example, P.L. 105-277 , the Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999 (Title XI, Internet Tax Freedom Act) created a three-year moratorium preventing state and local governments from taxing internet access, or imposing multiple or discriminatory taxes on electronic commerce. A grandfather clause allowed states that had already imposed and collected a tax on internet access before October 1, 1998, to continue implementing those taxes. The moratorium on internet access taxation was extended eight times and made permanent by P.L. 114-125 , the Trade Facilitation and Trade Enforcement Act of 2015. The grandfather clause was temporarily extended through June 30, 2020. The NCSL has cited research suggesting that states could receive an additional $6.5 billion annually in state sales tax revenue if the moratorium was lifted. In addition, because most state and local income taxes have been designed purposively to conform to federal tax law, changes in federal tax policy can impact state and local government finances. For example, federal tax cuts adopted in 2001 and 2003 affecting depreciation, dividends, and estate taxes \"forced states to acquiesce and accept their consequences or decouple from the federal tax base.\" Yet, federal tax changes are generally considered not to be unfunded mandates because states and localities can avoid their costs by decoupling their income tax from the federal income tax. Nevertheless, because federal tax changes can affect state and local government tax bases, most state and local government officials advocate their inclusion in federal legislation placing conditions on the imposition of unfunded federal mandates. Federalism scholars, state and local government officials, and other organizations argue that, in the absence of sufficient compensatory funding, court decisions and regulatory actions taken by federal agencies, including regulatory delays and nonenforcement, are unfunded mandates and should be included in legislation placing conditions on the imposition of unfunded mandates because these actions can impose costs on state and local governments that cannot be avoided. UMRA's provisions concerning administrative rules are discussed in greater detail later in this report (see the section on \" UMRA and Federal Rulemaking (Title II) \"). After taking various definitions into consideration, Congress defined federal mandates in UMRA more narrowly than state and local government officials had hoped. Federal intergovernmental mandates were defined as any provision in legislation, statute, or regulation that \"would impose an enforceable duty upon State, local, or tribal governments\" or \"reduce or eliminate the amount\" of federal funding authorized to cover the costs of an existing mandate. Provisions in legislation, statute, or regulation that \"would increase the stringency of conditions of assistance\" or \"would place caps upon, or otherwise decrease\" federal funding for existing intergovernmental grants with annual entitlement authority of $500 million or more could also be considered a federal intergovernmental mandate, but only if the state, local, or tribal government \"lack authority under that program to amend their financial or programmatic responsibilities to continue providing required services that are affected by the legislation, statute, or regulation.\" Private-sector mandates were defined as \"any provision in legislation, statute, or regulation that would impose an enforceable duty upon the private sector\" or \"reduce or eliminate the amount\" of federal funding authorized \"for the purposes of ensuring compliance with such duty.\" Key words in both definitions are \"enforceable duty.\" Because statutory direct orders, total and partial preemptions, federal tax policies that preempt specific state and local tax policies, and administrative rules issued by federal agencies cannot be avoided, they are enforceable duties and are covered under UMRA. In contrast, because federal grants are voluntary, grant conditions are not considered enforceable duties and, therefore, are not covered under UMRA. Federal tax policies that impose costs on state and local governments that can be avoided by decoupling the state or local government's affected income tax provision from the federal income tax code are not enforceable duties, and, therefore, also are not covered under UMRA. UMRA considers a mandate unfunded unless the legislation authorizing the mandate fully meets its estimated direct costs by either (1) providing new budget authority (direct spending authority or entitlement authority) or (2) authorizing appropriations. If appropriations are authorized, the mandate is still considered unfunded unless the legislation ensures that in any fiscal year, either (1) the actual costs of the mandate are estimated not to exceed the appropriations actually provided; (2) the terms of the mandate will be revised so that it can be carried out with the funds appropriated; (3) the mandate will be abolished; or (4) Congress will enact new legislation to continue the mandate as an unfunded mandate. This mechanism for reviewing and revising mandates on the basis of their actual costs, which was introduced into UMRA in the \"Byrd look-back amendment\" (as described in Appendix A ), applies only to intergovernmental mandates enacted in legislation as funded through appropriations. UMRA generally excluded preexisting federal mandates from its provisions, but, as mentioned previously, it did include any provision in legislation, statute, or regulation that \"would increase the stringency of conditions of assistance\" or \"would place caps upon, or otherwise decrease\" federal funding for existing intergovernmental grants with annual entitlement authority of $500 million or more. However, this provision applies \"only if the state or locality lacks authority to amend its financial or programmatic responsibilities to continue providing the required services.\" On June 28, 2012, the Supreme Court ruled in National Federation of Independent Business (NFIB) v. Sebelius that the withdrawal of all Medicaid funds from the states for failure to comply with Medicaid's expansion under health care reform ( P.L. 111-148 ; the Patient Protection and Affordable Care Act) violated the Tenth Amendment. Prior to that ruling, CBO determined that large intergovernmental entitlement grant programs, such as Medicaid and Temporary Assistance to Needy Families, \"allow states significant flexibility to alter their programs and accommodate new requirements,\" and, as a result, it determined that UMRA provisions generally did not apply to these programs. Subsequent to the Supreme Court's ruling, CBO has indicated that UMRA's provisions may apply to changes in \"the stringency of conditions\" or reductions in funding for \"certain large mandatory programs … if the affected governments lack the flexibility to alter the programs.\" Otherwise, UMRA's Title I does not apply to conditions of federal assistance; duties stemming from participation in voluntary federal programs; and legislative provisions that cover individual constitutional rights, discrimination, emergency assistance, grant accounting and auditing procedures, national security, treaty obligations, and certain parts of Social Security relating to the old-age, survivors, and disability insurance program under title II of the Social Security Act. UMRA did not indicate that these exempted provisions and rules were not federal mandates. Instead, it established that their costs would not be subject to its provisions requiring written cost estimate statements, or to its provisions permitting a point of order to be raised against the consideration of reported legislation in which they appear. The Senate Committee on Governmental Affairs report accompanying S. 1 , The Unfunded Mandates Reform Act of 1995, provided its reasoning for adopting the exempted provisions and rules: A number of these exemptions are standard in many pieces of legislation in order to recognize the domain of the President in foreign affairs and as Commander-in-Chief as well as to ensure that Congress's and the Executive Branch's hands are not tied with procedural requirements in times of national emergencies. Further, the Committee thinks that Federal auditing, accounting and other similar requirements designed to protect Federal funds from potential waste, fraud, and abuse should be exempt from the Act. The Committee recognizes the special circumstances and history surrounding the enactment and enforcement of Federal civil rights laws. During the middle part of the 20th century, the arguments of those who opposed the national, uniform extension of basic equal rights, protection, and opportunity to all individuals were based on a States rights philosophy. With the passage of the Civil Rights Acts of 1957 and 1964 and the Voting Rights Act of 1965, Congress rejected that argument out of hand as designed to thwart equal opportunity and to protect discriminatory, unjust and unfair practices in the treatment of individuals in certain parts of the country. The Committee therefore exempts Federal civil rights laws from the requirements of this Act. In addition, as will be discussed in the next section, UMRA does not require all legislative provisions that contain federal mandates, even those that contain mandates that meet UMRA's definition, to have a CBO written cost estimate statement. In some instances, CBO may determine that cost estimates may not be feasible or complete. In addition, UMRA only requires estimates of direct costs imposed by the legislation. Estimates of indirect, secondary costs, such as effects on prices and wages when the costs of a mandate imposed on one party are passed on to others, such as customers or employees, are not required. Under Title I, which took effect on January 1, 1996, CBO was directed, to the extent practicable, to assist congressional committees, upon their request, in analyzing the budgetary and financial impact of any proposed legislation that may have (1) a significant budgetary impact on state, local, and tribal governments; (2) a significant financial impact on the private sector; or (3) a significant employment impact on the private sector. In addition, CBO was directed, if asked by a committee chair or committee ranking minority member, to conduct a study, to the extent practicable, of the budgetary and financial impact of proposed legislation containing a federal mandate. If reasonably feasible, the study is to include estimates of the future direct costs of the federal mandate \"to the extent that such costs significantly differ from or extend beyond the 5-year period after the mandate is first effective.\" Although the actions noted above are technically discretionary, UMRA does contain mandatory directives. When an authorizing committee reports a public bill or joint resolution containing a federal mandate, UMRA requires the committee to provide the measure to CBO for budgetary analysis. CBO is required to provide the committee a cost estimate statement of a mandate's direct costs if those costs are estimated to equal or exceed predetermined amounts, adjusted for inflation, in any of the first five fiscal years the legislation would be in effect. In 2019, those threshold amounts are $82 million for intergovernmental mandates and $164 million for private-sector mandates. CBO is also required to inform the committee if the mandate has estimated direct costs below these thresholds and briefly explain the basis of the estimate. CBO must also identify any increase in federal appropriations or other spending that has been provided to fund the mandate. The federal mandate is considered unfunded unless estimated costs are fully funded. As described above, under \" UMRA's Definition of an Unfunded Federal Mandate ,\" UMRA provides that mandate costs be considered as funded only if the legislation covers the mandate costs either by providing new direct spending or entitlement authority or by authorizing appropriations and incorporating a mechanism to provide for the mandate to be revised or abolished if the requisite appropriations are not provided. Direct costs for intergovernmental mandates are defined as \"the aggregate estimated amounts that all State, local and tribal governments would be required to spend or would be prohibited from raising in revenues in order to comply with the Federal intergovernmental mandate.\" Direct costs for private-sector mandates are defined as \"the aggregate estimated amounts that the private sector will be required to spend in order to comply with the Federal private sector mandate.\" To accomplish these tasks, CBO created the State and Local Government Cost Estimates Unit within its Budget Analysis Division to prepare intergovernmental mandate cost estimate statements as well as other studies on the budgetary effects of mandates. It also added new staff to its program analysis divisions to prepare private-sector mandate cost estimate statements. A congressional committee is required to include the CBO estimate of mandate costs in its report on the bill. If the mandate cost estimate is not available, or if the report is not expected to be in print before the legislation reaches the floor for consideration, the committee is to publish the mandate cost estimate in the Congressional Record in advance of floor consideration. In addition to identifying direct costs, the committee's report must also assess the likely costs and benefits of any mandates in the legislation, describe how they affect the competitive balance between the private and public sectors, state the extent to which the legislation would preempt state, local, or tribal law, and explain the effect of any preemption. For intergovernmental mandates alone, the committee is to describe in its report the extent to which the legislation authorizes federal funding for direct costs of the mandate, and detail whether and how funding is to be provided. CBO submitted 13,310 estimates of mandate costs to Congress from January 1, 1996, when UMRA's Title I became effective, to May 20, 2019 (see Table 1 ). Each of these statements examined the mandate costs imposed on the private sector or state, local, and tribal governments by provisions in a specific bill, amendment, or conference report. About 11.5% of these cost estimate statements (1,537 of 13,310 cost estimate statements) identified costs imposed by intergovernmental mandates, and less than 1.0% of them (115 of 13,310 cost estimate statements) identified intergovernmental mandates that exceeded UMRA's threshold. CBO was unable to determine costs imposed by intergovernmental mandates in 79 bills, amendments, or conference reports. CBO has submitted 13,187 estimates to Congress that examined private-sector mandate costs imposed by provisions in a specific bill, amendment, or conference report from January 1, 1996, when UMRA's Title I became effective, to May 20, 2019 (see Table 2 ). The number of statements transmitted to Congress shown in Table 2 is less than the number shown in Table 1 because CBO is sometimes asked to review a specific bill, amendment, or conference report solely for intergovernmental mandates. About 15.3% of these private-sector estimates (2,022 of 13,187 cost estimate statements) identified costs imposed by mandates, and about 3.2% of them (427 of 13,187 cost estimate statements) identified costs that exceeded UMRA's threshold. CBO was unable to determine costs imposed by private-sector mandates in 299 bills, amendments, or conference reports. UMRA provides for the enforcement of its informational requirements on legislation by establishing a point of order in each chamber against consideration of a measure on which the reporting committee has not published the required estimate of mandate costs. This point of order applies only to measures reported by committees (for which CBO estimates of mandate costs are required), but it applies for both intergovernmental and private-sector mandates. In addition, however, if the informational requirement is met, a point of order against consideration of a measure may still be raised, if, for any fiscal year, the estimated total mandate cost of unfunded intergovernmental mandates in the measure exceeds UMRA's threshold amount ($82 million in 2019). This point of order may be raised also if CBO reported that no reasonable estimate of the cost of intergovernmental mandates was feasible. Uniquely among the requirements established by UMRA, this substantive point of order addressing intergovernmental mandates contained in legislation constitutes a potential means of control over the actual imposition of mandate costs. Even in this case, however, the mechanisms established by UMRA provide a means of controlling mandates only on the basis of estimates of the costs that will be incurred in subsequent fiscal years. The only provision of UMRA that offers a possibility of controls based on costs actually incurred by affected entities is the requirement, mentioned earlier, that a mandate can be considered funded through appropriations only if it directs that, if insufficient appropriations are made, the mandate must be revised, abolished, or reenacted as unfunded. In several respects, the applicability of the substantive point of order differs from that of the informational point of order. First, it applies to any measure coming to the floor for consideration, whether or not reported by a committee, and also to conference reports. For a measure that has been reported, this point of order applies to the measure in the form reported, including, for example, to a committee amendment in the nature of a substitute. In addition, this point of order applies against an amendment or motion (such as a motion to recommit with amendatory instructions), and does so on the basis not that the mandate costs of the amendment or motion itself exceeds the threshold, but that the amendment or motion would cause the total mandate costs in the measure to do so. Finally, however, this point of order applies only against intergovernmental mandates. UMRA imposes no comparable control in relation to private-sector mandates. Because federal mandates are created through authorization bills, the UMRA points of order generally do not apply to bills reported by the House and Senate Committees on Appropriations. However, if an appropriation bill, resolution, amendment, or conference report contains legislative provisions that would either increase the direct costs of a federal intergovernmental mandate that exceeds the threshold, or cause those costs to exceed the threshold, a point of order may be raised against the provisions themselves. In the Senate, if this point of order is sustained, the provisions are stricken from the bill. In the House, the chair does not rule on a point of order raised under these provisions. Instead, the House, by majority vote, determines whether to consider the measure despite the point of order. To prevent dilatory use of the point of order, the chair need not put the question of consideration to a vote unless the Member making the point of order meets the \"threshold burden\" of identifying specific language that is claimed to contain the unfunded mandate. Also, if several points of order could be raised against the same measure, House practices under UMRA allow all of them to be disposed of at once by a single vote on consideration. If the Committee on Rules proposes a special rule for considering the measure that waives the point of order, UMRA subjects the special rule itself to a point of order, which is disposed of by the same mechanism. In the Senate, if questions are raised challenging the applicability of an UMRA point of order (e.g., to prevent its use for dilatory purposes), the presiding officer, to the extent practicable, consults with the Committee on Homeland Security and Governmental Affairs to determine if the measure contains an intergovernmental mandate and with the Senate Committee on the Budget to determine if the mandate's direct costs meet UMRA's threshold for allowing a point of order to be raised. The Senate Committee on the Budget may draw for this purpose on CBO cost estimate statements. If there are no such challenges, or the presiding officer rules against the challenge, the Senate determines whether to consider the measure despite the point of order. It may do so by voting on a motion to waive the point of order. Initially, a majority vote was sufficient to waive the point of order in the Senate. In 2005, the Senate increased its threshold to waive an UMRA point of order to three-fifths of Senators duly chosen and sworn (normally 60 votes), as was already required of many other Budget Act points of order. Two UMRA points of order were raised in the Senate that year, and both were sustained, defeating two amendments to an appropriations bill that would have increased the minimum wage (see Table 3 ). In 2007, the Senate returned its threshold for waiving an UMRA point of order to a majority vote. On April 2, 2009, the Senate approved, by unanimous consent, an amendment ( S.Amdt. 819 ) to S.Con.Res. 13 , the concurrent budget resolution for FY2010, which would have again increased the vote necessary in the Senate to waive an UMRA point of order to three-fifths of Senators duly chosen and sworn (normally 60 votes). The amendment was subsequently dropped in the final version of the concurrent budget resolution for FY2010. On March 23, 2013, the Senate agreed, by voice vote, to an amendment ( S.Amdt. 538 ) to S.Con.Res. 8 , the concurrent budget resolution for FY2014. It would have restored the requirement for waiving an UMRA point of order in the Senate to three-fifths of the full Senate (normally 60 votes). S.Con.Res. 8 was received in the House on April 15, 2013, and held at the desk. Because the House did not act on the measure, and no other legislation on the matter was approved by Congress, the simple majority requirement for appealing or waiving UMRA points of order in the Senate remained in effect. On May 5, 2015, the Senate agreed to the conference report on S.Con.Res. 11 , the concurrent budget resolution for FY2016, which the House had previously agreed to on April 30, 2015. The resolution included a provision that restored the requirement for waiving an UMRA point of order in the Senate to three-fifths of Senators duly chosen and sworn (normally 60 votes). Prior to the Senate's increasing the threshold necessary to waive an UMRA point of order, a scholar familiar with UMRA argued that, inasmuch as the general floor procedures of the Senate already allows Senators to force a majority vote on a mandate by moving to strike it from the bill, UMRA's enforcement procedure of waiving a point of order by majority vote meant that UMRA mattered only in the House. As evidence of this, the scholar noted that during UMRA's first 10 years of operation, when the threshold to waive an UMRA point of order was a majority vote in both the House and Senate, 13 UMRA points of order were raised, all in the House (see Table 3 ). As indicated in Table 3 , 62 UMRA points of order have been raised in the House. Only one of these points of order, the first one, which was raised on March 28, 1996, in opposition to a proposal to add a minimum wage increase to the Contract With America Advancement Act of 1996, resulted in the House voting to reject consideration of a proposed provision. During the 111 th -114 th Congresses, UMRA points of order in the House were often raised not to challenge unfunded federal mandates per se , but to use the 10 minutes of debate allowed each House Member initiating an UMRA point of order to challenge the pace of legislative consideration, limitations on the offering of amendments to appropriations bills, or the inclusion of earmarks in legislation. Also, as indicated in Table 3 , UMRA points of order have been raised in the Senate four times. In 2005, points of order were raised against two amendments relating to an increase in the minimum wage. In each case the Senate declined to waive the point of order, and the chair ruled that the amendment was out of order because it contained unfunded intergovernmental mandates in excess of the threshold. In 2009, an UMRA point of order was raised against intergovernmental mandates in a health care reform bill. The Senate voted to waive the point of order, 55-44. The Senate subsequently approved the bill with the mandates. In 2016, an UMRA point of order was raised against intergovernmental mandates in a bill designed to assist Puerto Rico in addressing its debt. The Senate voted to waive the point of order, 85-13. The Senate subsequently approved the bill with the mandates. Although UMRA points of order have been sustained just three times, most state and local government officials assert that UMRA has reduced \"the number of unfunded federal mandates by acting as a deterrent to their enactment.\" For example, in 2001, Raymond Scheppach, then-NGA's executive director, testified before a House subcommittee that UMRA had slowed the growth of unfunded mandates and improved communications between federal policymakers and state and local government officials: Direct mandates have declined sharply in the wake of the Act. But I would venture that UMRA has had an even greater intangible benefit. As Congressman Portman once told us, he was certain this would be one of those bills that he could frame and hang on his wall, and it would become just another relic of history. But, to his surprise, the Act has led—time and again—to members asking his advice: \"Do you think this bill will cause an UMRA problem? With whom should I work?\" The very threat of a CBO report has engendered efforts to reach out to state and local leaders before the fact—instead of after. It has changed the nature of our intergovernmental discussion in a very positive way. More recently, NCSL has argued that UMRA has brought increased attention to the fiscal effects of federal legislation on state and local governments, improved federal accountability, and enhanced consultation. In addition, there have been documented instances in which either sponsors of legislation have modified provisions to avoid a CBO statement that unfunded intergovernmental mandate costs exceeded the threshold, or measures with such costs estimated to exceed the threshold were altered prior to floor consideration to reduce their costs below the threshold. As mentioned previously, since UMRA's Title I became effective in 1996, CBO has submitted 13,310 written cost estimate statements to Congress that examined the costs imposed by provisions in a specific bill, amendment, or conference report on the private sector and/or state and local governments. It identified intergovernmental mandates in 1,537 of them (11.5%). CBO reports that, as of December 31, 2018, 15 laws (containing 21 intergovernmental mandates) have been enacted since UMRA became effective in 1996 that have costs estimated to exceed the statutory threshold. Those laws are as follows: Two increases in the minimum wage. P.L. 104-188 , the Small Business Job Protection Act of 1996, enacted in 1996, was estimated to cost state and local governments more than $1 billion during the first five years that it was in effect. P.L. 110-28 , the U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007, enacted in 2007, was estimated to cost state and local governments slightly less than $1 billion during the first five years that it was in effect. A reduction in federal funding for administering the food stamp program, now the Supplemental Nutrition Assistance Program, in P.L. 105-185 , the Agricultural Research, Extension, and Education Reform Act of 1998, enacted in 1998, was estimated to cost states between $200 million and $300 million annually. Preemption of state taxes on premiums for certain prescription drug plans in P.L. 108-73 , the Family Farmer Bankruptcy Relief Act of 2003, enacted in 2003, was estimated to cost states $70 million in revenue in 2006, the first year it was in effect, and increase to about $95 million annually by 2010. The temporary preemption of states' authority to tax certain internet services and transactions in P.L. 108-435 , the Internet Tax Nondiscrimination Act, enacted in 2004, was estimated to reduce state and local government tax revenue by at least $300 million. The extension of this preemption in P.L. 110-108 , the Internet Tax Freedom Act Amendments Act of 2007, enacted in 2007, was estimated to reduce state and local government tax revenue by about $80 million annually. Making the moratorium permanent (while allowing state and local governments that had been collecting such taxes prior to October 1, 1998 to continue to collect such taxes, but only through June 2020) in P.L. 114-125 , the Trade Facilitation and Trade Enforcement Act of 2015, enacted in 2016, was estimated to cost state and local governments more than $100 million in the final three months of fiscal year 2020 (July through September) and more than several hundred million dollars annually thereafter. The requirement that state and local governments meet certain standards for issuing driver's licenses, identification cards, and vital statistics documents in P.L. 108-458 , the Intelligence Reform and Terrorism Prevention Act of 2004, enacted in 2004, was estimated to cost state and local governments more than $100 million over 2005-2009, with costs exceeding the threshold in at least one of those years. The elimination of matching federal payments for some child support spending in P.L. 109-171 , the Deficit Reduction Act of 2005, enacted in 2006, was estimated to cost states more than $100 million annually beginning in 2008. The requirement that state and local governments withhold taxes on certain payments for property and services in P.L. 109-222 , the Tax Increase Prevention and Reconciliation Act of 2005, enacted in 2006, was estimated to cost state and local governments more than $70 million annually beginning in 2011. Requirements on rail and transit owners and operators to train workers and submit reports to the Department of Homeland Security in P.L. 110-53 , the Implementing Recommendations of the 9/11 Commission Act of 2007, enacted in 2007, was estimated to cost state and local governments more than UMRA's threshold in at least one of the first five years following enactment. The requirement that commuter railroads install train-control technology in P.L. 110-432 , the Railroad Safety Enhancement Act of 2008, enacted in 2008, was estimated to cost state and local governments more than UMRA's threshold in at least one of the first five years following enactment. The requirement that public entities that handle health insurance information comply with new regulations; health insurance plans pay an annual fee based on average number of people covered by the policy; public employers pay an excise tax on employer-sponsored health insurance coverage defined as having high costs; health insurance plans comply with new standards for extending coverage; and public entities must comply with new notice and reporting requirements on health insurance plans in P.L. 111-148 , the Patient Protection and Affordable Care Act, enacted in 2010, was estimated to have costs for state and local governments that would greatly exceed UMRA's thresholds in each of the first five years following enactment. The requirement that schools provide meals that comply with new standards for menu planning and nutrition and with nutrition standards for all food sold in schools in P.L. 111-296 , the Healthy, Hunger-Free Kids Act of 2010, enacted in 2010, was estimated to have costs for state and local governments that would exceed UMRA's threshold beginning the first year that the mandates take effect. The aggregate cost of requiring Puerto Rico and its instrumentalities to comply with the directives and processes of a federal oversight board tasked with overseeing the territory's fiscal affairs and to pay for the costs of the oversight board's staff and operating expenses in P.L. 114-187 , the Puerto Rico Oversight, Management, and Economic Stability Act (PROMESA), enacted in 2016, was estimated to exceed UMRA's threshold. State and local government interest groups argue that these statistics confirm UMRA's effectiveness in serving as a deterrent to the enactment of new unfunded mandates that exceed UMRA's threshold and meet UMRA's definition of a federal mandate. However, they also argue that many mandates with costs below UMRA's threshold, or that do not meet UMRA's definition of a federal mandate, have been adopted since UMRA's enactment. CBO also reports that from January 1, 2006, to December 31, 2018, 217 laws were enacted with at least one intergovernmental mandate as defined under UMRA. These laws imposed 443 mandates on state and local governments, with 16 of these mandates exceeding UMRA's threshold, 14 with estimated costs that could not be determined, and 413 with estimated costs below the threshold. CBO reported that hundreds of other laws had an effect on state and local government budgets, but those laws did not meet UMRA's definition of a federal mandate. As mentioned previously, CBO has submitted 13,187 cost estimate statements to Congress that examined the costs imposed by provisions in a specific bill, amendment, or conference report that might impact the private sector. It identified private-sector mandates in 2,022 of them (15.3%). CBO reports that from January 1, 2006, to December 31, 2018, 330 laws were enacted with at least one private-sector mandate as defined under UMRA. These laws imposed 836 mandates on the private sector, with 128 of these mandates exceeding UMRA's threshold, 96 with estimated costs that could not be determined, and 612 with estimated costs below the threshold. State and local government officials argue that UMRA's exemptions and exclusions reduce its effectiveness in limiting the enactment of unfunded federal intergovernmental mandates. They argue that federal programs in the exempted and excluded areas can still result in the imposition of costs on state, local, and tribal governments. Also, because UMRA does not include these costs as \"mandates,\" they are exempt even from the requirement for CBO to estimate these costs. For example, in 2008, NCSL asserted that \"although fewer than a dozen mandates have been enacted that exceed the threshold established in UMRA, Congress has shifted at least $131 billion in costs to states over the past five years\" and that during the 110 th Congress at least $31 billion in additional costs were imposed on states through new mandates. To reduce these costs, NCSL has recommended that UMRA's provisions on points of order and requirements for written cost estimate statements also apply to (1) all open-ended entitlement grant-in-aid programs, such as Medicaid, and legislative provisions that would cap or enforce a ceiling on the cost of federal participation in any entitlement or mandatory spending program; (2) new conditions of federal funding for existing federal grants and programs; (3) legislative provisions that reduce state revenues, especially when changes to the federal tax code are retroactive or otherwise provide states with little or no opportunity to prospectively address the impact of a change in federal law on state revenues; and (4) mandates that fail to exceed the statutory threshold only because they do not affect all states. For the most part, business interests have generally supported state and local government officials in their efforts to broaden UMRA's coverage of federal intergovernmental mandates. In perhaps the most extensive effort to obtain various viewpoints on UMRA, in 2005, the Government Accountability Office (GAO) held group meetings, individual interviews, and received written responses from 52 individuals and organizations, including academic centers and think tanks, businesses, federal agencies, public interest advocacy groups, and state and local governments, concerning unfunded mandates. GAO reported that UMRA's coverage was the issue most frequently commented on by parties from all five sectors, including business, and that most of the parties representing business viewed UMRA's relatively narrow coverage as a major weakness that leaves out many federal actions with potentially significant financial impacts on nonfederal parties. However, GAO also found that the business sector has \"generally been in favor of federal preemptions for reasons such as standardizing regulation across state and local jurisdictions.\" Although GAO found that most of the parties it contacted viewed UMRA's coverage of intergovernmental mandates as being too narrow, it also reported that some of the participants opposed an expansion of UMRA's coverage: A few parties from the public interest sector and academic/think tank sectors considered some of the existing exclusions important or identified UMRA's narrow scope as one of the act's strengths.... Specifically, these parties argued in favor of maintaining UMRA's exclusions or expanding them to include federal actions regarding public health, safety, environmental protection, workers' rights, and the disabled.... [They also] focused on the importance of the existing exclusions, particularly those dealing with constitutional and statutory rights, such as those barring discrimination against various groups. With respect to private-sector mandates in legislation, UMRA allows a point of order to be raised only if UMRA's informational requirements are not met; that is, only if the committee reporting the measure fails to publish a CBO cost estimate statement of the private-sector mandate's costs. Over the years, various business organizations, including the U.S. Chamber of Commerce, have advocated the extension of UMRA's substantive point of order for intergovernmental mandates to the private sector, permitting a point of order to be raised against consideration of legislation that includes private-sector mandates with costs that exceed UMRA's threshold. The GAO report also noted that \"parties primarily from the academic/think tank and state and local governments sectors ... noted that while much attention has been focused on the actual (direct) costs of mandates, it is important to consider the broader implications on affected nonfederal entities beyond direct costs, including indirect costs such as opportunity costs, forgone revenues, shifting priorities, and fiscal trade-offs.\" During the 114 th Congress, H.R. 50 , the Unfunded Mandates Information and Transparency Act of 2015, passed by the House on February 4, 2015, and its Senate companion bill, S. 189 , would have broadened UMRA's coverage to include both direct and indirect costs, such as foregone profits and costs passed onto consumers, and, when requested by the chair or ranking member of a committee, the prospective costs of legislation that would change conditions of federal financial assistance. The bills also would have made private-sector mandates subject to a substantive point of order and remove UMRA's exemption for rules issued by most independent agencies. H.R. 50 , and its Senate companion bill, S. 1523 , were reintroduced in the 115 th Congress as the Unfunded Mandates Information and Transparency Act of 2017. The House passed H.R. 50 on July 13, 2018. The House also passed similar legislation during the 112 th Congress ( H.R. 4078 , the Red Tape Reduction and Small Business Job Creation Act: Title IV, the Unfunded Mandates Information and Transparency Act of 2012), the 113 th Congress ( H.R. 899 , the Unfunded Mandates Information and Transparency Act of 2014; and H.R. 4 , the Jobs for America Act: Division III, the Unfunded Mandates Information and Transparency Act of 2014), and, as just mentioned, during the 114 th Congress ( H.R. 50 , the Unfunded Mandates Information and Transparency Act of 2015). During the 116 th Congress, H.R. 300, the Unfunded Mandates Information and Transparency Act of 2019, was introduced on January 8, 2019. UMRA's Title II, which became effective on March 22, 1995, generally requires federal agencies, unless otherwise prohibited by law, to prepare written statements that identify costs and benefits of a federal mandate to be imposed through the rulemaking process that may result in the expenditure by state, local, and tribal governments, in the aggregate, or by the private sector, of $100 million or more (adjusted annually for inflation) in any one year, before \"promulgating any general notice of proposed rulemaking.\" In 2019, the threshold for preparing a written statement is $164 million. These informational requirements for regulations, like the Title I cost estimate requirements for legislation, apply to both intergovernmental and private-sector mandates. Title II establishes no equivalent to the point of order mechanism in Title I through which either house can decline to consider legislation proposing covered unfunded intergovernmental mandates above the applicable threshold level. The written assessments that federal agencies are to prepare for their regulations must identify the law authorizing the rule and include a qualitative and quantitative assessment of anticipated costs and benefits, the share of costs to be borne by the federal government, and the disproportionate budgetary effects upon particular regions, state, local, or tribal governments, or particular segments of the private sector. Assessments must also include estimates of the effect on the national economy, descriptions of consultations with nonfederal government officials, and a summary of the evaluation of comments and concerns obtained throughout the promulgation process. Impacts of \"any regulatory requirements\" on small governments must be identified, notice must be given to those governments, and technical assistance must be provided. Also, federal agencies are required, to the extent permitted in law, to develop an \"effective process to permit elected officers of State, local, and tribal governments (or their designated employees with authority to act on their behalf) to provide meaningful and timely input in the development of regulatory proposals containing significant Federal intergovernmental mandates.\" UMRA also requires federal agencies to consider \"a reasonable number\" of regulatory alternatives and select the \"least costly, most cost-effective or least burdensome alternative\" that achieves the objectives of the rule. UMRA requires the Office of Management and Budget's (OMB's) director to collect the executive branch agencies' written cost estimate statements and periodically forward copies to CBO's director. It also directs OMB to establish pilot programs in at least two federal agencies to test innovative regulatory approaches to reduce regulatory burdens on small governments, and provide Congress a written annual report detailing compliance with the act by each agency for the preceding reporting period. OMB's director has delegated these responsibilities to its Office of Information and Regulatory Affairs (OIRA). Most of these provisions were already in place when UMRA was adopted. For example, Executive Order 12866, issued in September 1993, required agencies to provide OIRA with assessments of the costs and benefits of all economically significant proposed rules (defined as having an annual impact on the economy of $100 million or more), including some rules that were not mandates; identify regulatory alternatives and explain why the planned regulatory action is preferable to other alternatives; issue regulations that were cost-effective and impose the least burden on society; and seek the views of state, local, and tribal officials before imposing regulatory requirements that might significantly or uniquely affect them. UMRA's requirement for federal agencies to issue written cost estimate statements for mandates issued through the rulemaking process that may result in expenditures of $100 million or more (adjusted annually for inflation) by state and local governments, in the aggregate, or by the private sector, in any one year, is subject to the exemptions and exclusions that apply to legislative provisions (e.g., conditions of federal assistance, duties arising from participation in a voluntary federal program, and constitutional rights of individuals). UMRA's requirements also do not apply (1) to provisions in rules issued by independent regulatory agencies; (2) if the agency is \"otherwise prohibited by law\" from considering estimates of costs in adopting the rule (e.g., under the Clean Air Act the primary air quality standards are health-based and the courts have affirmed that the U.S. Environmental Protection Agency is not to consider costs in determining air quality standards for ozone and particulate matter); or (3) to any rule for which the agency does not publish a general notice of proposed rulemaking in the Federal Register . GAO has found that about half of all final rules published in the Federal Register are published without a general notice of proposed rulemaking, including some rules with impacts over $100 million annually. In addition, UMRA's threshold for federal mandates in rules is limited to expenditures, in contrast to the thresholds in Title I which refer to direct costs. As a result, a federal rule's estimated annual effect on direct costs might meet Title I's threshold, but might not meet Title II's threshold if the rule does not compel nonfederal entities to spend that amount. For example, under Title I, direct costs include any amounts that state and local governments are prohibited from raising in revenue to comply with the mandate. These costs are not considered when determining whether a mandate meets Title II's threshold because funds not received are not expenditures. Also, in contrast to Title I, Title II does not require the agencies issuing regulations to address the question of whether federal funding is available to cover the costs to the private sector of mandates imposed by regulations. In general, agencies lack authority to provide such funding, which could be provided only by legislative action. Title II addresses the funding only of intergovernmental mandates, and only by requiring that agencies identify the extent to which federal resources may be available to carry out those mandates. The differences in the coverage of Title I and Title II may reflect a compromise reached with congressional Members who opposed using UMRA as a vehicle to address broader regulatory reform advocated by business interests. For example, Senator John Glenn argued in the Senate Committee on Governmental Affairs' committee report on UMRA: Another problematic change from S. 993 is the expansion of the \"regulatory accountability and reform\" provisions of Title 2 to go beyond intergovernmental mandates to address any and all regulatory effects on the private sector. The intended purpose of S. 1 is to control unfunded Federal mandates on State and local governments. I have always supported that goal. Moreover, I believe that if we keep the bill sharply focused on that purpose, we can get the legislation passed quickly and signed into law. If, however, we let the bill be stretched to cover other issues, we hurt prospects for enactment and we break our pledge to our friends in the State and local governments.... I believe that the bill should be brought back to its original purpose by limiting regulatory analysis to intergovernmental mandates.... In short, I support using this legislation to control intergovernmental regulatory costs. I oppose using this bill to address broader regulatory reform issues. From March 22, 1995, when UMRA's Title II became effective, to the end of FY2016, OMB reviewed 1,060 final rules with estimated benefits and/or costs exceeding $100 million annually. Most (73.6%) of those \"major\" rules (780) did not contain provisions meeting UMRA's definition of a mandate. Whereas, as Table 1 and Table 2 show, CBO identified slightly more private-sector mandates than intergovernmental mandates, Table 4 shows that most of the mandates identified in regulations have been directed at the private sector. This emphasis appears consistent with the original concern of business advocates to extend the concept of mandates to the area of regulatory reform. As indicated in Table 4 , during the time period covered, 280 major rules met UMRA's definition of a mandate on the private sector and, therefore, were issued an UMRA cost estimate statement and 15 met UMRA's definition of a mandate on state, local, and tribal governments and, therefore, were issued an UMRA cost estimate statement. The 15 intergovernmental rules, 9 issued by the U.S. Environmental Protection Agency (EPA), were as follows: EPA's Rule on Standards of Performance for Municipal Waste Combustors and Emissions Guidelines (1995), with estimated costs of $320 million annually; EPA's Standards of Performance for New Stationary Sources and Guidelines for Control of Existing Sources: Municipal Solid Waste Landfills (1996), with estimated costs of $110 million annually; EPA's National Primary Drinking Water Regulations: Disinfectants and Disinfection Byproducts (1998), with estimated costs of $700 million annually; EPA's National Primary Drinking Water Regulations: Interim Enhanced Surface Water Treatment (1998), with estimated costs of $300 million annually; EPA's National Pollutant Discharge Elimination: System B Regulations for Revision of the Water Pollution Control Program Addressing Storm Water Discharges (1999), with estimated costs of $803.1 million annually; EPA's National Primary Drinking Water Regulations; Arsenic and Clarifications to Compliance and New Source Contaminants Monitoring (2001), with estimated costs of $189 million to $216 million annually; EPA's National Primary Drinking Water Regulations: Long Term 2 Enhanced Surface Water Treatment (2005), with estimated costs between $80 million and $130 million per year; EPA's National Primary Drinking Water Regulations: Stage 2 Disinfection Byproducts Rule (2006), with estimated costs of at least $100 million annually; U.S. Department of Health and Human Services' (DHHS's) Health Insurance Reform; Modifications to the Health Insurance Portability and Accountability Act (HIPAA) Electronic Transaction Standards (2009), with estimated costs of $1.1 billion per year; EPA's National Emission Standards for Hazardous Air Pollutants from Coal- and Oil-Fired Electric Utility Steam Generating Units and Standards for Performance for Electric Utility Steam Generating Units (2011), with estimated costs of $9.6 billion annually; U.S. Department of Agriculture's (USDA's) Nutrition Standards in the National School Lunch and School Breakfast Programs (2012), with estimated costs of $479 million annually; DHHS's Patient Protection and Affordable Care Act; Benefit and Payment Parameters for 2014 (issued FY2013), 2015 (issued FY2014), 2016 (issued FY2015), and 2017 (issued FY2016). Although DHHS was unable to quantify the user fees that will be associated with these three rules, CBO found that the combined administrative cost and user fee impact for each of them may be high enough to constitute a state, local, or tribal government mandate under UMRA; and U.S. Department of Labor's Defining and Delimiting the Exemptions for Executive, Administrative, Professional, Outside Sales and Computer Employees (2016) revised and indexed for inflation salary thresholds for determining overtime requirements for salaried workers. CBO found that employee enumeration impacts and compliance costs were estimated to be well over $100 million annually and that, in addition to private sector industries, some local government entities will be substantially affected by the rule. In 1997, Senators Fred Thompson and John Glenn, chair and ranking minority member of the Senate Committee on Governmental Affairs, respectively, asked GAO to review federal agencies' implementation of UMRA's Title II. On February 4, 1998, GAO issued its report, concluding that \"our review of federal agencies' implementation of Title II of UMRA indicates that this title of the act has had little direct effect on agencies' rulemaking actions during the first 2 years of its implementation.\" GAO concluded that Title II had limited impact on agencies' rulemaking primarily because of its limited coverage. For example, GAO noted that written mandate cost estimate statements were not on file at CBO for 80 of the 110 economically significant rules published in the Federal Register between March 22, 1995, and March 22, 1997. GAO examined the 80 economically significant rules that lacked a written mandate cost estimate statement and concluded that UMRA did not require a written mandate cost estimate statement for 78 of them because the rule either did not have an associated notice of proposed rulemaking (18 instances); did not impose an enforceable duty (3 instances); imposed such a duty but only as a condition of federal assistance (33 instances); imposed such a duty but only as part of a voluntary program (11 instances); did not involve an expenditure of $100 million in any single year by the private sector or by state, local, and tribal governments (12 instances); or incorporated requirements specifically set forth in law (1 instance). GAO concluded that written mandate cost estimate statements should have been filed at CBO for two of the rules that lacked one, but, in both instances, the rules appeared to satisfy UMRA's written statement requirements. Even where UMRA applied, GAO concluded that the act did not appear to have had much effect on federal agencies' rulemaking actions because UMRA does not require agencies to take the actions required in the statute if the agencies determine that the actions are duplicative of other actions or that accurate estimates of the rule's future compliance costs are not feasible. Because federal agencies' rules commonly contain an estimate of compliance costs, GAO found that most agencies rarely prepared a separate UMRA written cost estimate statement. Moreover, Executive Order 12866, which was issued more than a year before UMRA's enactment, already required federal agencies to provide OIRA with assessments of the costs and benefits of all economically significant rules. GAO also concluded that UMRA did not substantially change agencies' intergovernmental consultation processes. In 2001, OMB's director, Mitchell L. Daniels Jr., acknowledged at a House hearing coinciding with UMRA's fifth anniversary that UMRA's Title II had not resulted in major changes in federal agency rulemaking. He noted that, according to OMB's five annual reports to Congress on the implementation of Title II, 80 rules had required the preparation of a separate written mandate cost estimate statement (see Table 4 ). He said that \"it was hard to believe that only 80 regulations had significant impacts on state, local, or tribal governments, or the private sector. In fact, it appears that agencies have attempted to limit their consultative processes, and ignored potential alternative remedies, by aggressively utilizing the exemptions outlined by the Act.\" He added that \"when agencies fail to solicit or consider the views of states and localities, they deny themselves the benefit of state and local innovation and experience. This will not be accepted practice in this [George W. Bush] Administration.\" In 2004, GAO released a second study of UMRA's implementation of Title II (and the first for Title I), focusing on statutes enacted and rules published during 2001 and 2002. GAO found that 5 of 377 statutes enacted and 9 of 122 major or economically significant final rules issued in 2001 or 2002 were identified as containing federal mandates at or above UMRA's thresholds. GAO concluded its report by stating that \"the findings raise the question of whether UMRA's procedures, definitions, and exclusions adequately capture and subject to scrutiny federal statutory and regulatory actions that might impose significant financial burdens on affected nonfederal parties.\" As noted earlier, in 2005, GAO sought and received input from participating parties about UMRA's strengths and weaknesses and potential options for reinforcing the strengths or addressing the weaknesses. It also held a symposium on federal mandates to examine those identified strengths and weaknesses in more depth. Although the symposium's participants viewed UMRA's coverage as its most significant issue, GAO reported that comments received concerning federal agency consultation with state and local governments under Title II \"focused on the quality of consultations across agencies, which was viewed as inconsistent\" and that \"a few parties commented that UMRA had improved consultation and collaboration between federal agencies and nonfederal levels of government.\" At a Senate hearing held on April 14, 2005, OIRA's director, John Graham, testified that OMB includes summaries of agency consultations with state and local government officials in its annual report to Congress and that \"this year's report shows an increased level of engagement.\" He added that there were \"some very good examples of consultation that are documented in that report at the Department of Education, the Environmental Protection Agency and so forth, but I think that it would be fair to say that those best practices are not necessarily uniform across the federal government or across any particular agency.\" State and local government officials testifying at the hearing stated that federal agency consultation had improved somewhat, but remained \"sporadic.\" State and local government public interest groups continue to advocate a broadening of Title II's coverage. For example, as mentioned previously, they advocate a broader definition of what UMRA considers a mandate, under the presumption that a broader definition would subject more rules to Title II. An alternative approach would be to separate debates concerning the definition of \"mandate\" and UMRA's coverage, and, instead, apply Title II's information requirements to whatever classes of federally induced costs Congress deems appropriate to cover. This approach might be implemented by incorporating coverage of various kinds of \"federally induced costs,\" adopting the terminology proposed earlier by ACIR. In either case, inasmuch as Title II's requirements are informational only, their extension to new classes of regulations, or to new kinds of federally induced costs, would not affect the authority of agencies to issue regulations or the substance of the regulations that could be issued. As mentioned previously, UMRA's threshold for federal mandates in rules is limited to expenditures, in contrast to the thresholds in Title I that refer to direct costs. Introduced during the 116 th Congress, H.R. 300 , the Unfunded Mandates Information and Transparency Act of 2019, would broaden UMRA's coverage to include both direct and indirect costs, such as foregone profits and costs passed onto consumers, and, when requested by the chair or ranking member of a committee, the prospective costs of legislation that would change conditions of federal financial assistance. State and local government advocacy groups have also argued that Title II should apply to rules issued by independent regulatory agencies. Although OMB does not review rules issued by independent regulatory agencies, in recent years it has included information concerning independent regulatory agency rules in its annual UMRA report to Congress. According to those reports, independent regulatory agencies issued 271 major rules from FY1997 through FY2016. H.R. 300 would remove UMRA's exemption for rules issued by most independent agencies. The National Association of Counties (NACO) and other state and local government public interest groups have also advocated a strengthening of OMB's role in the enforcement of Title II to ensure consistent application of UMRA's provisions across federal agencies. For example, NCSL's current policy statement on unfunded mandates recommends that UMRA be amended to include \"the creation of an office within the Office of Management and Budget that is analogous to the State and Local Government Cost Estimates Unit at the Congressional Budget Office.\" Business organizations, led by the U.S. Chamber of Commerce, also have advocated an independent review of federal agency cost estimates, recommending that the reviews be conducted by OMB or GAO. They also have advocated the permitting of early judicial challenges to an agency's failure to complete an UMRA cost estimate statement or for completing one that is deficient. During the 112 th Congress, H.R. 214 , the Congressional Office of Regulatory Analysis Creation and Sunset and Review Act of 2011, would have created a Congressional Office of Regulatory Analysis. The bill included a provision that would have transferred from CBO's director to the director of the proposed Congressional Office of Regulatory Analysis the responsibility to compare federal agency estimates of the cost of regulations implementing an act containing a federal mandate with the CBO's estimate of those costs. The Congressional Office of Regulatory Analysis would also have received federal agency statements that accompany significant regulatory actions. As mentioned previously, organizations representing various environmental and social groups have argued that UMRA has achieved its stated goals of strengthening the partnership between the federal government and state, local, and tribal governments by promoting informed and deliberate decisions by Congress on the appropriateness of federal mandates. In their view, broadening UMRA's coverage would dilute its impact. For example, a participant at GAO's 2005 symposium on federal mandates argued that eliminating any of UMRA's exclusions and exemptions might make the identification of mandates less meaningful, saying \"The more red flags run up, the less important the red flag becomes.\" Also, some of the participants at the symposium from the academic, policy research institute, and public interest advocacy sectors argued that it was essential that some of the existing exclusions, such as those dealing with constitutional and statutory rights barring discrimination against various groups, be retained. They also advocated additional exclusions to include federal actions regarding public health, safety, environmental protection, workers' rights, and the disabled. State and local government public interest groups assert that enhanced requirements for federal agency consultation with state and local government officials during the rulemaking process are needed. For example, the NCSL has asserted that federal agency \"consultation with state and local governments in the construction of these rules is haphazard.\" It recommends that Title II be amended to include \"enhanced requirements for federal agencies to consult with state and local governments.\" OMB asserts that \"federal agencies have been actively consulting with states, localities, and tribal governments in order to ensure that regulatory activities were conducted consistent with the requirements of UMRA.\" In addition, OMB notes that it has had guidelines in place since September 21, 1995, to assist federal agencies in complying with the act. The current guidelines suggest that (1) intergovernmental consultations should take place as early as possible, beginning before issuance of a proposed rule and continuing through the final rule stage, and be integrated explicitly into the rulemaking process; (2) agencies should consult with a wide variety of state, local, and tribal officials; (3) agencies should estimate direct benefits and costs to assist with these consultations; (4) the scope of consultation should reflect the cost and significance of the mandate being considered; (5) effective consultation requires trust and significant and sustained attention so that all who participate can enjoy frank discussion and focus on key priorities; and (6) agencies should seek out state, local, and tribal views on costs, benefits, risks, and alternative methods of compliance, and whether the federal rule will harmonize with and not duplicate similar laws in other levels of government. OMB often includes summaries of selected consultation activities by agencies whose actions affect state, local, and tribal governments in its annual draft and final UMRA reports to Congress. OMB has argued that the summaries are an indication that federal agencies are complying with the act. For example, in OMB's final 2015 UMRA report to Congress, OMB wrote in the introduction to these summaries: Four agencies subject to UMRA (the Departments of Energy, Health and Human Services, Interior, and Labor) provided examples of consultation activities that involved State, local, and tribal governments not only in their regulatory processes, but also in their program planning and implementation phases. These agencies have worked to enhance the regulatory environment by improving the way in which the Federal Government relates to its intergovernmental partners. Many of the departments and agencies not listed here (i.e., the Departments of Justice, State, Treasury, and Veterans Affairs, the Small Business Administration, and the General Services Administration) do not often impose mandates upon States, localities, or tribes, and thus have fewer occasions to consult with these governments. Other agencies, such as the National Archives and Records Administration, are exempt from UMRA's reporting requirements, but may nonetheless engage in consultation where their activities would affect State, local, and Tribal governments. As the following descriptions indicate, Federal agencies conduct a wide range of consultations. Agency consultations sometimes involve multiple levels of government, depending on the agency's understanding of the scope and impact of its rule or policy. As mentioned previously, H.R. 300 , the Unfunded Mandates Information and Transparency Act of 2019, would require federal agencies to enhance their consultation with UMRA stakeholders. In 1995, UMRA's enactment was considered an historic, milestone event in the history of American intergovernmental relations. For example, when signing UMRA, President Bill Clinton said, Today, we are making history. We are working to find the right balance for the 21 st century. We are recognizing that the pendulum had swung too far, and that we have to rely on the initiative, the creativity, the determination, and the decisionmaking of people at the State and local level to carry much of the load for America as we move into the 21 st century. Since UMRA's enactment, parties participating in its implementation and researchers in the academic community, policy research institutes, and nonpartisan government agencies have reached different conclusions concerning the extent of UMRA's impact on intergovernmental relations and whether UMRA should be amended. State and local government officials and federalism scholars generally view UMRA as having a limited, though positive, impact on intergovernmental relations. In their view, the federal government has continued to expand its authority through the \"carrots\" of increased federal assistance and the \"sticks\" of grant conditions, preemptions, mandates, and administrative rulemaking. Facing what they view as a seemingly ever growing federal influence in American governance, they generally advocate a broadening of UMRA's coverage to enhance its impact, emphasizing the need to include conditions of grant assistance and a broader range of federal agency rulemaking, including rules issued by independent regulatory agencies. Other organizations, representing various environmental and social groups, argue that UMRA's coverage does not need to be broadened. In their view, UMRA has accomplished its goals of fostering improved intergovernmental relations and ensuring that when Congress votes on major federal mandates it is aware of the costs imposed by the legislation. They assert that UMRA's current limits on coverage should be maintained or reinforced by adding exclusions for mandates regarding public health, safety, workers' rights, environmental protection, and the disabled. During the 111 th Congress, UMRA received increased attention as Congress considered various proposals to reform health care. Governors, for example, expressed opposition to proposals that would have required states to contribute toward the cost of expanding Medicaid eligibility, asserting that the expansion could inflate state deficits and impose on states what Tennessee Governor Philip Bredesen reportedly described as the \"mother of all unfunded mandates.\" As mentioned previously, at that time, CBO had determined that UMRA provisions did not apply to Medicaid's conditions of federal assistance because, in its view, states had \"significant flexibility to make programmatic adjustments in their Medicaid programs to accommodate\" new federal requirements. Following the Supreme Court's ruling in National Federation of Independent Business (NFIB) v. Sebelius (June 28, 2012), CBO indicated that UMRA's provisions may apply to changes in \"the stringency of conditions\" or reductions in funding for \"certain large mandatory programs … if the affected governments lack the flexibility to alter the programs.\" As discussed previously, H.R. 300 , the Unfunded Mandates Information and Transparency Act of 2019, would require CBO to assess the prospective costs of changes in conditions of federal financial assistance when requested by the chair or ranking member of a committee; broaden UMRA's coverage to include assessments of indirect as well as direct costs by amending the definition of direct costs to include forgone profits, costs passed onto consumers or other entities, and, to the extent practicable, behavioral changes; expand the scope of reporting requirements to include regulations imposed by most independent regulatory agencies; make private-sector mandates subject to a substantive point of order; establish principles for federal agencies to follow when assessing the effects of regulations on state and local governments and the private sector, including requiring the agency to identify the problem it seeks to address, determining whether existing laws or regulations could be modified to address the problem, identifying alternatives, and designing regulations in the most cost-effective manner available; expand the scope of cost statements accompanying significant regulatory actions to include, among other requirements, a reasonably detailed description of the need for the proposed rulemaking or final rule and an explanation of how the proposed rulemaking or final rule will meet that need; an assessment of the potential costs and benefits of the proposed rulemaking or final rule; estimates of the mandate's future compliance costs and any disproportionate budgetary effects upon any particular regions of the nation or state, local, or tribal governments; a detailed description of the agency's consultation with the private sector or elected representatives of the affected state, local, or tribal governments; and a detailed summary of how the agency complied with each of the regulatory principles included in the bill; no longer allow a federal agency to forgo UMRA analysis because the agency published a rule without first issuing a notice of proposed rulemaking; require federal agencies to meet enhanced levels of consultation with state, local, and tribal governments and the private sector before issuing a notice of proposed rulemaking or a final rule; and require federal agencies to conduct a retrospective analysis of the costs and benefits of an existing regulation when requested by the chair or ranking member of a committee. Advocates argue that these reforms will \"improve the quality of congressional deliberations and ... enhance the ability of Congress, federal agencies, and the public to identify federal mandates that may impose undue harm on state, local, and tribal governments and the private sector.\" Opponents argue that these reforms are \"an assault on the nation's health, safety, and environmental protections, would erect new barriers to unnecessarily slow down the regulatory process, and would give regulated industries an unfair advantage to water down consumer protections.\" Underlying disagreements over UMRA's future are fundamentally different values concerning American federalism. One view emphasizes the importance of freeing state and local government officials from the constraints brought about by the directives and costs associated with federal mandates so they can experiment with innovative ways to achieve results with greater efficiency and cost effectiveness. This view focuses on the positive effect active state and local governments can have in promoting a sense of state and community responsibility and self-reliance, encouraging participation and civic responsibility by allowing more people to become involved in public questions, adapting public programs to state and local needs and conditions, and reducing the political turmoil that sometimes results from single policies that govern the entire nation. Another view emphasizes the federal government's responsibility to ensure that all citizens are afforded minimum levels of essential government services. This view focuses on the propensity of states to restrict governmental services because they compete with one another for businesses and taxpaying residents; the variation in state fiscal capacities that makes it difficult for some states to provide certain governmental services even though they might have the political will to do so; and the propensity of states to have different views concerning what services are essential and what constitutes a sufficient level of essential government services. Given these disagreements over fundamental values, it is perhaps not surprising that there are differences of opinion concerning UMRA's future. Using President Clinton's words, debates over UMRA's future are more than just arguments over who will pay for what; they are also about finding \"the right balance\" for American federalism in the 21 st century. Appendix A. The Rise of Unfunded Mandates as a National Issue and UMRA's Legislative History Unfunded mandates became a national issue during the 1980s as state and local government officials and their affiliated public interest groups, led by the National League of Cities (NLC), U.S. Conference of Mayors (USCM), and National Association of Counties (NACO), began an intensive lobbying effort to limit unfunded intergovernmental mandates. Their efforts were supported by various business organizations, led by the U.S. Chamber of Commerce, which opposed the imposition of unfunded mandates on both state and local governments and the private sector, particularly mandates issued through federal rules. Increased Number and Cost of Unfunded Mandates State and local government officials became involved in the issue of unfunded federal mandates during the 1980s primarily because the number and costs of unfunded intergovernmental mandates were increasing and, by then, nearly every community in the nation had become subject to their effects. For example, ACIR reported that during the 1980s the costs of unfunded intergovernmental mandates were increasing at a rate faster than federal assistance. ACIR also identified 63 federal statutes as of 1990 that, in its view, imposed \"major\" restrictions or costs on state and local governments. Many of the statutes involved civil rights, consumer protection, improved health and safety, and environmental protection. Only 2 of the 63 statutes it identified, the Davis-Bacon Act of 1931 and Hatch Act of 1940, were enacted prior to 1964, 9 were enacted during the 1960s, 25 during the 1970s, 21 during the 1980s, and 6 in 1990. A study completed by the Clinton Administration's National Performance Review identified 172 laws in force that imposed requirements (regardless of the magnitude of their impact) on state and local governments as of December 1992. Some of the major federal statutes adopted during the 1970s that imposed relatively costly federal mandates on state and local governments were the Equal Employment Opportunity Act of 1972, which extended the prohibitions against discrimination in employment contained in the Civil Rights Act of 1964 to state and local government employment; the Fair Labor Standards Act Amendments of 1974, which extended the prohibitions against age discrimination in the Age Discrimination in Employment Act of 1967 to state and local government employment; and the Public Utilities Regulatory Policy Act of 1978, which established federal requirements concerning the pricing of electricity and natural gas. One of the more costly federal mandates enacted during the 1970s was Section 504 of the Rehabilitation Act of 1973. It prohibited discrimination against handicapped persons in federally assisted programs. CBO estimated that it would require states and localities to spend $6.8 billion over 30 years to equip buses with wheelchair lifts, to install elevators in subway systems, and to expand access to public transit systems for the physically disabled. Three of the more costly unfunded federal mandates adopted during the 1980s were the Safe Drinking Water Act Amendments of 1986 (which was estimated to impose an additional cost of between $2 billion and $3 billion on state and local governments to improve public water systems); the Asbestos Hazard Emergency Response Act of 1986 (which required schools to remove hazardous asbestos at an estimated cost of $3.15 billion over 30 years); and the Water Quality Act of 1987 (which was estimated to cost states and localities about $12 billion in capital costs for wastewater treatment). ACIR estimated that new federal mandates adopted between 1983 and 1990 cost state and local governments between $8.9 billion and $12.7 billion, depending on the definition of mandate used; in FY1991, federal mandates imposed estimated costs of between $2.2 billion and $3.6 billion on state and local governments; and additional mandates, not included in these estimates, were scheduled to take effect in the years ahead. ACIR suggested that the expansion of federal intergovernmental mandates during the 1960s, 1970s, and 1980s fundamentally changed the nature of intergovernmental relations in the United States: During the 1960s and 1970s, state and local governments for the first time were brought under extensive federal regulatory controls.... Over this period, national controls have been adopted affecting public functions and services ranging from automobile inspection, animal preservation and college athletics to waste treatment and waste disposal. In field after field the power to set standards and determine methods of compliance has shifted from the states and localities to Washington. State and Local Governments Seek Relief from Unfunded Mandates Edward I. Koch, then mayor of New York City and a former Member of Congress, was one of the first public officials to highlight the mandate issue. In 1980, he authored an article criticizing what he called \"the mandate millstone.\" He noted that as a Member of Congress he voted for many federal mandates \"with every confidence that we were enacting sensible permanent solutions to critical problems\" but now that he was a mayor he had come to realize that \"over the past decade, a maze of complex statutory and administrative directives has come to threaten both the initiative and the financial health of local governments throughout the country.\" The continued growth in the number and cost of federal mandates during the 1980s and early 1990s generated renewed and heightened opposition from state and local government officials and their affiliated public interest groups. This opposition culminated in the National Unfunded Mandates (NUM) Day initiative, sponsored by the NLC, USCM, NACO, and International City/County Management Association. Held on October 27, 1993, local government officials across the nation held press conferences and public forums criticizing unfunded mandates, and released a study of the costs imposed by federal mandates on local governments. Over 300 cities and 128 counties participated in the study, which, when extrapolated nationally, estimated that federal mandates imposed additional costs of $6.5 billion annually for cities and $4.8 billion annually for counties. The NUM Day methodology used to estimate the costs of unfunded federal mandates was later challenged because of the absence of independent validation of local government submissions and the nonrandom nature of the participating jurisdictions. However, politically, NUM Day was considered a success by its organizers for two reasons. First, it attracted unprecedented media attention to the issue of unfunded federal mandates. For example, the number of newspaper articles discussing unfunded federal mandates increased from 22 in 1992, to 179 in 1993, and to 836 in 1994. Second, it increased congressional awareness of state and local government concerns about unfunded mandates. For example, on January 5, 1995, Senator John Glenn mentioned NUM Day as having an impact on congressional awareness of unfunded mandates at a Senate congressional hearing on S. 1 —The Unfunded Mandate Reform Act: On October 27, 1993, State and local elected officials from all over the Nation came to Washington and declared that day—\"National Unfunded Mandates Day.\" These officials conveyed a powerful message to Congress and the Clinton Administration on the need for Federal mandate reform and relief. They raised four major objections to unfunded Federal mandates. First, unfunded Federal mandates impose unreasonable fiscal burdens on their budgets; Second, they limit State and local government flexibility to address more pressing local problems like crime and education; Third, Federal mandates too often come in a \"one-size-fits-all\" box that stifles the development of more innovative local efforts—efforts that ultimately may be more effective in solving the problem the Federal Mandate is meant to address; and Fourth, they allow Congress to get credit for passing some worthy mandate or program, while leaving State and local governments with the difficult tasks of cutting services or raising taxes in order to pay for it. State and local government officials continued to lobby Congress for mandate relief legislation and coordinated their efforts to increase public awareness of their concerns. For example, on March 21, 1994, state and local government officials across the nation held town hall meetings and their affiliated public interest groups sponsored a rally on the Capitol steps to draw media attention to their concerns about unfunded federal mandates. The NLC and state municipal leagues across the country also declared October 24-30, 1994, Unfunded Mandates Week, which also generated considerable media coverage. The Initial Congressional Response The efforts of state and local government officials appeared to have an effect on congressional legislative activity concerning unfunded federal mandates. During the 102 nd Congress (1991-1992), 12 federal mandate relief bills were introduced in the House and 10 were introduced in the Senate. All of these bills failed to be reported out of committee, and only one had a congressional hearing. During the first session of the 103 rd Congress (1993), 32 federal mandate relief bills were introduced and one of them, S. 993 , the Federal Mandate Accountability and Reform Act of 1994 cosponsored by Senators John Glenn and Dirk Kempthorne, was reported by the Senate Governmental Affairs Committee on June 16, 1994. It contained several provisions that were later in UMRA, and included an amendment offered by Senator Byron Dorgan \"to include the private sector under the CBO and Committee mandate cost analysis requirements of Title I of S. 993 , and a Glenn amendment to allow CBO to waive the private-sector cost analysis if CBO cannot make a \"reasonable estimate\" of the bills cost.\" The bill was considered by the Senate on October 6, 1994, without a time agreement. After the introduction of several amendments and some debate, the Senate proceeded to other issues and adjourned without voting on the measure. The House Government Operations Committee also reported a bill, H.R. 5128 , the Federal Mandates Relief for State and Local Government Act of 1994, sponsored by Representative John Conyers Jr., on October 5, 1994. It was similar to S. 993 , but its approval was delayed, reportedly due to concerns raised by several senior Democratic Members worried that mandate legislation might make it more difficult to adopt laws to protect the environment and address social issues. Congress adjourned before the bill could move to the floor for consideration. Core Federalism Principles Debated During UMRA's Consideration The Republican Party gained control of the House of Representatives for the first time in 40 years following the congressional elections held on November 8, 1994. They also achieved a slim majority in the Senate as well. Mandate reform was a key provision in the Republican Party's \"Contract With America.\" Perhaps reflecting its importance to the Republican leadership, the prospective Senate majority leader, Senator Robert Dole, designated a revised unfunded mandate relief bill, cosponsored by Senators Kempthorne and Glenn and introduced on January 4, 1995, the opening day of the new Congress, as S. 1 , the Unfunded Mandates Reform Act of 1995. The Senate Governmental Affairs Committee and Senate Budget Committee held a joint hearing on the bill the following day and it was reported out of the Senate Governmental Affairs Committee with three amendments (9 to 4) on January 9, 1995, and out of the Senate Budget Committee with four amendments (21-0) also on January 9, 1995. To expedite Senate floor consideration, neither committee filed a committee report. Instead, the committee chairs, Senator William Roth Jr. on behalf of the Senate Governmental Affairs Committee and Senator Pete Domenici on behalf of the Senate Budget Committee, each submitted a chairman's statement for insertion into the Congressional Record . When Senate floor consideration commenced on January 12, 1995, Senator Robert Byrd objected to several features of the way the legislation was being handled, including the absence of a committee report and the pace of consideration. In addition, Senators introduced 228 amendments to the bill. Floor debate lasted for more than two weeks. During floor debate, Senator Kempthorne argued that the bill should be adopted out of a sense of fairness to state and local governments and as a commitment to federalism principles: Under this legislation, we are acknowledging for the first time, in a meaningful way, that there must be limits on the Federal Government's propensity to impose costly mandates on other levels of government. As the representatives of those governments have very effectively demonstrated, this is a real problem. Cities, for example, generally are fortunate if they have adequate resources just to meet their own local responsibilities. Unfunded Federal mandates have put a real strain on those resources. This has been the practice of the Federal Government for the past several decades, but in recent years it has mushroomed into an intolerable burden. This has been due, at least in part, to the Federal Government's own budget crisis. In the past, if Congress felt that a particular problem warranted a national solution, it would often fund that solution with Federal dollars. Mandates imposed on State and local governments could frequently be offset with generous Federal grants. But the Federal Government no longer has the money to fund the governmental actions it wishes to see accomplished throughout the country. In fact, it hasn't had the money to do this for many years. Instead, it borrowed for a long time, to cover those costs. But now the Federal deficit is so large, that the only alternative left for imposing so-called national solutions is to impose unfunded mandates.... The State legislators and Governors know this. This is why they feel so strongly that legislation regarding this practice must first be in place, before they are asked to ratify a balanced budget amendment. Otherwise, in the drive to achieve a balance Federal budget, Congress might be tempted to mandate that State and local governments shall pick up many of the costs that were formerly Federal. This is why any effort to add a sunset provision to this bill ought to be opposed. Our commitment to protect federalism ought to be permanent. S. 1 is designed to put in place just such a mechanism. In this regard, it may truly be called balanced legislation. First of all, it helps bring our system of federalism back into balance, by serving as a check against the easy imposition of unfunded mandates. And, second, it does so in a way that strikes a balance between restraining the growth of mandates and recognizing that there may be legitimate exceptions. Senator Frank Lautenberg was among those opposing UMRA. He argued that the bill should be defeated because, among other things, the federal government has an obligation to set national standards to protect the environment and ensure the quality of life for all Americans: Halting interstate pollution is an important responsibility of the Federal Government. And I am concerned that this act may have a chilling effect on future Federal environmental legislation. Another issue that may get loss in this debate is the benefit that States and their citizens derive from Federal mandates—even those not fully funded. States may say, we know how best to care for our citizens; a program that may be good for New Jersey, may not be good for Idaho or Ohio. But, I would argue that there is a broader national interest in some very fundamental issues which transcend that premise. I would argue that historically, not all States have provided a floor of satisfactory minimum decency standards for their citizens and that, as a democratic and fair society, we should worry about that. Further, as a practical matter, I would argue that the policies of one State in a society such as ours will certainly affect citizens and taxpayers of another State just as certainly as unfunded mandates can. Let us look at our welfare system. There has been a lot of discussion about turning welfare over to the States, with few or virtually no Federal guidelines or requirements. What would happen if we do that? Would we see a movement of the disadvantaged between States, putting a heavier burden on the citizens of a State that provides more generous benefits? Let us look at occupational safety, or environmental regulation. With a patchwork of differing standards across the States, would we see a migration of factories and jobs to States with lower standards? I think so. But by mandating floors in environmental and workplace conditions, the Federal Government ensures that States will comply with minimal standards befitting a complex, interrelated, and decent society. Or let us look at gun control. My State of New Jersey generally has strong controls on guns. But New Jerseyans still suffer from an epidemic of gun violence–in no small measure because firearms come into New Jersey from other States. Without strong national controls, this will remain a problem. That is why we passed a ban on all assault weapons and why we passed the Brady bill. Currently the Federal Government discourages a scenario whereby a given State decides not to enforce some worker health and safety laws as a way of lowering costs and attracting industry. A State right next door might feel compelled to lower its standards in order to remain competitive. In the absence of a Federal Standard, we would likely see a bidding war that lowers the quality of life for all Americans. These are some of a host of very fundamental, very basic, and even profound questions raised by the notion that we should never have unfunded mandates. These are questions each Member of the Senate should consider long and hard, before moving to drastically curtail—or make impossible—any unfunded mandates. After voting on 44 amendments and several cloture motions, the Senate approved S. 1 on January 27, 1995, 86-10. One of the amendments approved by the Senate was the \"Byrd look-back amendment,\" which is the only provision in UMRA that allows for the regulation of any mandates based on actual rather than estimated costs. It provided that legislation containing intergovernmental mandates would be considered funded, and hence not subject to a point of order, if it authorized appropriations to cover the estimated direct costs of the intergovernmental mandate and incorporated a prescribed mechanism requiring further review if, in any fiscal year, Congress did not appropriate funds sufficient to cover those costs. Under this mechanism, if the responsible federal agency determines that the appropriation provided was insufficient to cover the estimated direct costs of the mandate it shall notify the appropriate authorizing committees not later than 30 days after the start of the fiscal year and submit recommendations for either implementing a less costly mandate or making the mandate ineffective for the fiscal year. The statutory mechanism must also include expedited procedures for the consideration of legislative recommendations to achieve these outcomes not later than 30 days after the recommendations are submitted to Congress. Finally, the mechanism must provide that the mandate \"shall be ineffective until such time as Congress has completed action on the recommendations of the responsible federal agency.\" After Senator Robert Byrd offered this amendment, the Senate adopted it on January 26, 1995, 100-0. The House companion bill to S. 1 was H.R. 5 , the Unfunded Mandate Reform Act of 1995, which was cosponsored by Representatives William F. Clinger Jr., Rob Portman, Gary A. Condit, and Thomas M. Davis. It was reported by the House Government Reform and Oversight Committee, on January 13, 1995, by voice vote and without hearings. Floor consideration began on January 20, 1995. Numerous amendments were introduced by Democratic Members to add various exemptions to the bill, such as the health of children and the disabled, the disposal of nuclear waste, and child support enforcement. These amendments were rejected on party-line votes. On February 1, 1995, H.R. 5 was adopted, 360-74, inserted into S. 1 as a House substitute, and sent to conference. There were two major differences between the House and Senate versions of S. 1 . The House version did not include the Byrd look-back amendment, and it permitted judicial review of federal agency compliance with the bill's provisions. Initially, House conferees refused to accept the Byrd look-back amendment and Senate conferees; worried that outside parties could delay regulations for years by filing lawsuits, refused to accept judicial review of federal agency compliance with the bill's provisions. Negotiations continued for six weeks. The deadlock over judicial review was ended by allowing judicial review of whether an appropriate analysis of mandate costs was done, but restricting the court's ability to second-guess the quality of the cost estimates. The deadlock over the Byrd look-back amendment ended when House conferees accepted its inclusion after being assured that its intent was to make certain that Congress, rather than an executive agency, retained responsibility for setting policy. The Senate adopted the conference report, which renamed the bill the Unfunded Mandates Reform Act of 1995, on March 15, 1995, 91-9, and the House adopted it the next day, 394-28. President Bill Clinton signed it on March 22, 1995. Appendix B. UMRA Points of Order 1. Representative Bill Archer, \"Contract With America Advancement Act of 1996,\" House debate on motion to recommit H.R. 3136 , Congressional Record , vol. 142, part 5 (March 28, 1996), pp. 6931-6937. 2. Representative Rob Portman, \"The Employee Commuting Act of 1996,\" House debate on H.R. 1227 , Congressional Record , vol. 142, part 9 (May 23, 1996), pp. 12283-12287. 3. Representative Bill Orton, \"The Welfare—Medicaid Reform Act of 1996,\" House debate on H.R. 3734 , Congressional Record , vol. 142, part 13 (July 18, 1996), p. 17668. 4. Representative Melvin Watt, \"The Housing Opportunity and Responsibility Act,\" House debate on H.R. 2 , Congressional Record , vol. 143, part 5 (May 1, 1997), pp. 7006-7012. 5. Representative John Ensign, \"The Nuclear Waste Policy Act of 1997,\" House debate on H.R. 1270 , Congressional Record , vol. 143, no, 148 (October 29, 1997), pp. H9655-H9657. 6. Representative Gerald Soloman, \"The Agricultural Research, Extension, and Education Reform Act of 1998,\" House debate on the conference report for S. 1150 , Congressional Record , vol. 144, part 8 (June 4, 1998), pp. H9655-H9657. 7. Representative Jerrold Nadler, \"The Bankruptcy Reform Act of 1998,\" House debate on H.R. 3150 , Congressional Record , vol. 144, part 8 (June 10, 1998), pp. 11853-11857. 8. Representative Steve Largent, \"The Minimum Wage Increase Act,\" House debate on H.R. 3846 , Congressional Record , vol. 144, part 2 (March 9, 2000), pp. 2623-2624. 9. Representative James Gibbons, \"The Nuclear Waste Policy Amendments Act of 2000,\" House debate on S. 1287 , Congressional Record , vol. 146, part 2 (March 22, 2000), pp. 3234-3236. 10. Representative John Conyers, \"The Internet Nondiscrimination Act of 2000,\" House debate on H.R. 3709 , Congressional Record , vol. 146, part 6 (May 10, 2000), pp. 7483-7485. 11. Representative Charles Stenholm, \"The Medicare RX 2000 Act,\" House debate on H.R. 4680 , Congressional Record , vol. 146, part 9 (June 28, 2000), pp. 12650-12653. 12. Representative Jim Moran, \"The Department of Transportation Appropriations Act, 2002,\" House debate on H.R. 2299 , Congressional Record , vol. 147, part 9 (June 26, 2001), pp. 11906-11910. 13. Representative James Gibbons, \"The Yucca Mountain Repository Site Approval Act,\" House debate on H.J.Res. 87 , Congressional Record , vol. 148, part 5 (May 8, 2002), pp. 7145-7148. 14. Representative Sheila Jackson-Lee, \"The Real ID Act of 2005,\" House debate on H.R. 418 , Congressional Record , vol. 151, no. 13 (February 9, 2005), pp. H437-H442. 15. Representative James McGovern, \"The Energy Policy Act of 2005,\" House debate on H.R. 6 , Congressional Record , vol. 151, no. 48 (April 20, 2005), pp. H2174-H2178. 16. Senator Kit Bond, \"The Transportation, Treasury, HUD and Independent Agencies Appropriations Act, 2006,\" Senate debate on H.R. 3058 , Congressional Record , vol. 151, no. 133 (October 19, 2005), p. S11547. 17. Senator Ted Kennedy, \"The Transportation, Treasury, HUD and Independent Agencies Appropriations Act, 2006,\" Senate debate on H.R. 3058 , Congressional Record , vol. 151, no. 133 (October 19, 2005), p. S11548. 18. Representative Jim McDermott, \"The Deficit Reduction Act of 2005,\" House debate on H.R. 4241 , Congressional Record , vol. 151, no. 152 (November 17, 2005), pp. H10531-H10534. 19. Representative Jim McDermott, \"The Deficit Reduction Act of 2005,\" House debate on H.Res. 653 , Congressional Record , vol. 152, no. 10 (February 1, 2006), pp. H37-H40. 20. Representative Tammy Baldwin, \"The Communications Opportunity, Promotion, and Enhancement Act of 2006,\" House debate on H.R. 5252 , Congressional Record , vol. 152, no. 72 (June 8, 2006), pp. H3506-H3510. 21. Representative Jim McDermott, \"The Federal Election Integrity Act of 2006,\" House debate on H.R. 4844 , Congressional Record , vol. 152, no. 118 (September 20, 2006), pp. H6742-H6745. 22. Representative Pete Sessions, \"The Children's Health and Medicare Protections Act of 2007,\" House debate on H.R. 3162 , Congressional Record , vol. 153, no. 124-125 (August 1, 2007), pp. H9288-H9290. 23. Representative Pete Sessions, \"The Children's Health Insurance Program Reauthorization Act of 2007,\" House debate on H.R. 3963 , Congressional Record , vol. 153, no. 163 (October 25, 2007), pp. H12027-H12029. 24. Representative Jeff Flake, \"Senate Amendments to H.R. 6 , Energy Independence and Security Act of 2007,\" House debate on H.R. 6 , Congressional Record , vol. 153, no. 186 (December 6, 2007), pp. H4255-H4259. 25. Representative Mike Conaway, \"The Renewable Energy and Energy Conservation Tax Act of 2008,\" House debate on H.R. 5351 , Congressional Record , vol. 154, no. 32 (February 27, 2008), pp. H1079-H1082. 26. Representative Paul Broun, \"The Paul Wellstone Mental Health and Addiction Equity Act of 2007,\" House debate on H.R. 1424 , Congressional Record , vol. 154, no. 37 (March 5, 2008), pp. H1259-H1262. 27. Representative Jeff Flake, \"The Food, Conservation, and Energy Act of 2008,\" House debate on H.R. 2419 , Congressional Record , vol. 154, no. 79 (May 14, 2008), pp. H3784-H3789. 28. Representative Eric Cantor, \"The Comprehensive American Energy Security and Consumer Protection Act,\" House debate on H.R. 6899 , Congressional Record , vol. 154, no. 147 (September 16, 2008), pp. H8152-H8157. 29. Representative Jeff Flake, \"The Consolidated Security, Disaster Assistance and Continuing Appropriations Act, 2009,\" House debate on H.R. 2638 , Congressional Record , vol. 154, no. 152 (September 24, 2008), pp. H9218-H9220. 30. Representative David Drier, \"The American Recovery and Reinvestment Act,\" House debate on H.R. 1 , Congressional Record , vol. 155, no. 30 (February 13, 2009), pp. H1524-H1536. 31. Representative Jeff Flake, \"The Omnibus Appropriations Act, 2009,\" House debate on H.R. 1105 , Congressional Record , vol. 155, no. 33 (February 25, 2009), pp. H2643-H2646. 32. Representative Jeff Flake, \"The Agriculture, Rural Development, Food and Drug Administration Appropriations Act, 2010,\" House debate on H.R. 2997 , Congressional Record , vol. 155, no. 101 (July 8, 2009), pp. H7783-H7786. 33. Representative Jeff Flake, \"The Military Construction and Veteran's Affairs Appropriations Act, 2010,\" House debate on H.R. 3082 , Congressional Record , vol. 155, no. 103 (July 10, 2009), pp. H7951-H7953. 34. Representative Jeff Flake, \"The Energy and Water Development Appropriations Act, 2010,\" House debate on H.R. 3183 , Congressional Record , vol. 155, no. 106 (July 15, 2009), pp. H8107-H8109. 35. Representative Jeff Flake, \"The Financial Services and General Government Appropriations Act, 2010,\" House debate on H.R. 3170 , Congressional Record , vol. 155, no. 107 (July 16, 2009), pp. H8191-H8193. 36. Representative Jeff Flake, \"The Transportation, Housing and Urban Development Appropriations Act, 2010,\" House debate on H.R. 3288 , Congressional Record , vol. 155, no. 112 (July 23, 2009), pp. H8593-H8594. 37. Representative Jeff Flake, \"The Departments of Labor, Health, and Human Services, and Education Appropriations Act, 2010,\" House debate on H.R. 3293 , Congressional Record , vol. 155, no. 113 (July 24, 2009), pp. H8593-H8594. 38. Representative Jeff Flake, \"The Department of Defense Appropriations Act, 2010,\" House debate on H.R. 3326 , Congressional Record , vol. 155, no. 116 (July 29, 2009), pp. H8977-H8978. 39. Senator Robert Corker, \" H.R. 3590 , the Service Members Home Ownership Act of 2009,\" remarks in the Senate, Congressional Record , daily edition, vol. 155, no. 199 (December 23, 2009), pp. S13803-S13804. 40. Representative Paul Ryan, \"Providing for Consideration of Senate Amendments to H.R. 3590 , Service Members Home Ownership Tax Act of 2009, and Providing for Consideration of H.R. 4872 , Health Care and Education Reconciliation Act of 2010,\" House debate on H.Res. 1203 , Congressional Record , daily edition, vol. 156, no. 43 (March 21, 2010), pp. H1825-H1828. 41. Representative Jeff Flake, \"Providing For Consideration of H.R. 5822 , Military Construction and Veterans Affairs and Related Agencies Appropriations Act, 2011,\" House debate on H.R. 5822 , Congressional Record , vol. 156, no. 112 (July 28, 2010), pp. H6206-H6209. 42. Representative Jeff Flake, \"Providing For Consideration of H.R. 5850 , Transportation, Housing And Urban Development, and Related Agencies Appropriations Act, 2011,\" House debate on H.R. 5850 , Congressional Record , vol. 156, no. 113 (July 29, 2010), pp. H6298-H6290. 43. Representative Jeff Flake, \"Providing For Consideration of Senate Amendment to House Amendment to Senate Amendment to H.R. 4853 , Tax Relief, Unemployment Insurance Reauthorization, and Job Creation Act of 2010,\" House debate on H.R. 4853 , Congressional Record , vol. 156, no. 157 (December 16, 2010), pp. H8525-H8526. 44. Representative Keith Ellison, \"Providing For Consideration of H.R. 1255 , Government Shutdown Prevention Act of 2011,\" House debate on H.Res. 194 , Congressional Record , vol. 157, no. 46 (April 1, 2011), pp. H2219-H2222. 45. Representative John Garamendi, \"Providing For Further Consideration of H.R. 1540 , National Defense Authorization Act for Fiscal Year 2012,\" House debate on H.R. 276 , Congressional Record , vol. 157, no. 73 (May 25, 2011), pp. H3423-H3424. 46. Representative Keith Ellison, \"Providing For Consideration of H.R. 2017 , Department of Homeland Security Appropriations Act, 2012,\" House debate on H.Res. 287 , Congressional Record , vol. 157, no. 77 (June 1, 2011), pp. H3816-H3818. 47. Representative John Garamendi, \"Providing For Further Consideration of H.R. 2021 , Jobs and Energy Permitting Act of 2011 and Providing for Consideration of H.R. 1249 , America Invents Act,\" House debate on H.Res. 316 , Congressional Record , vol. 157, no. 73 (June 22, 2011), pp. H4379-H.4380. 48. Representative Marcia Fudge, \"Providing For Consideration of H.R. 1315 , Consumer Financial Protection Safety and Soundness Improvement Act of 2011,\" House debate on H.Res. 358 , Congressional Record , vol. 157, no. 110 (July 21, 2011), p. H5302. 49. Representative Gwen Moore, \"Providing For Consideration of H.Res. 358 , Protect Life Act,\" House debate on H.Res. 430 , Congressional Record , vol. 157, no. 153 (October 13, 2011), pp. H6869, H6870. 50. Representative Gwen Moore, \"Providing For Consideration of H.R. 3630 : Middle Class Tax Relief and Job Creation Act of 2011,\" House debate on H.Res. 491 , Congressional Record , vol. 157, no. 191 (December 13, 2011), pp. H8745-H8748. 51. Representative Gwen Moore, \"Providing For Consideration of H.R. 4089 : Sportsmen's Heritage Act of 2012, and for Other Purposes,\" House debate on H.Res. 614 , Congressional Record , vol. 158, no. 55 (April 17, 2012), pp. H1860-H1862. 52. Representative Gwen Moore, \"Providing For Consideration of H.R. 4970 , the Violence Against Women Reauthorization Act of 2012, and Providing For Consideration of H.R. 4310 , the National Defense Authorization Act for Fiscal Year 2013,\" House debate on H.Res. 656 , Congressional Record , vol. 158, no. 70 (May 16, 2012), pp. H2776-H2731. 53. Representative Gwen Moore, \"Providing For Consideration of House Joint Resolution 118, Disapproving Rule Relating To Waiver and Expenditure Authority with Respect to the Temporary Assistance For Needy Families Program. Providing For Consideration of H.R. 3409 , the Stop The War On Coal Act of 2012; and Providing For Proceedings during the Period from September 22, 2012, through November 12, 2012,\" House debate on H.Res. 788 , Congressional Record , vol. 158, no. 128 (September 20, 2012), pp. H6165-H6173. 54. Representative Jared Polis, \"Providing For Consideration of H.R. 273 , Elimination of 2013 Pay Adjustment, and for Other Purposes,\" House debate on H.Res. 66 , Congressional Record , vol. 159, no. 24 (February 14, 2013), pp. H517-H519. 55. Representative Donna Edwards, \"Providing For Consideration of H.R. 1947 , Federal Agriculture Reform and Risk Management Act of 2013; and Providing for Consideration of H.R. 1797 , Pain-Capable Unborn Child Protection Act,\" House debate on H.Res. 266 , Congressional Record , vol. 159, no. 87 (June 18, 2013), pp. H3708-H3710. 56. Representative Jim McGovern, \"Providing For Further Consideration of H.R. 1947 , Federal Agriculture Reform and Risk Management Act of 2013,\" House debate on H.Res. 271 , Congressional Recor d, vol. 159, no. 88 (June 19, 2013), pp. H3770-H3774. 57. Representative Jim McGovern, \"Providing For Consideration of H.R. 7 , No Taxpayer Funding for Abortion and Abortion Insurance Full Disclosure Act of 2014, and Providing for Consideration of Conference Report on H.R. 2642 , Federal Agriculture Reform and Risk Management Act of 2013,\" House debate on H.Res. 465 , Congressional Recor d, vol. 160, no.16 (January 28, 2014), pp. H1443-H1445. 58. Representative Danny Davis, \"Providing For Consideration of H.R. 4438 , American Research and Competitiveness Act of 2014,\" House debate on H.R. 4438 , Congressional Record , vol. 160, no. 68 (May 7, 2014), pp. H3465-H3466. 59. Representative Jim McGovern, \"Providing For Further Consideration of H.R. 4435 , Howard P. \"Buck\" McKeon National Defense Authorization Act for Fiscal Year 2015; and Providing for Consideration of H.R. 3361 , USA FREEDOM Act,\" House debate on H.R. 4435 , Congressional Record , vol. 160, no.77 (May 21, 2014), pp. H4699-H4701. 60. Representative Jared Polis, \"Providing For Further Consideration of H.R. 5 , Student Success Act,\" House debate on H.R. 5 , Congressional Record , vol. 161, no.33 (February 26, 2015), pp. H1180-H1182. 61. Representative Bonnie Watson Coleman, \"Providing For Consideration of H.R. 1732 , Regulatory Integrity Protection Act of 2015; Providing for Consideration of Conference Report on S.Con.Res. 11 , Concurrent Resolution on the Budget, Fiscal Year 2016; and Providing for Consideration of H.J.Res. 43 , Disapproval of District of Columbia Reproductive Health Non-Discrimination Amendment Act of 2014,\" House debate on H.Res. 231 , Congressional Record , vol. 161, no.64 (April 30, 2015), pp. H2672-H2674. 62. Representative Louise Slaughter, \"Providing For Consideration of the Senate Amendment to H.R. 2146 , Defending Public Safety Employees' Retirement Act,\" House debate on H.Res. 321 , Congressional Record , vol. 161, no. 98 (June 18, 2015), pp. H4497-H4507. 63. Representative Elizabeth Esty, \"Providing For Consideration of H.R. 2130 , Red River Private Property Protection Act, and Providing for Consideration of Motions to Suspend the Rule,\" House debate on H.Res. 556 , Congressional Record , vol. 161, no. 178 (December 9, 2015), pp. H9092-H9095. 64. Representative Joaquin Castro, \"Providing For Consideration of H.R. 5325 , Legislative Branch Appropriations Act, 2017,\" House debate on H.Res. 771 , Congressional Record , vol. 162, no. 91 (June 9, 2016), pp. H3586-H3588. 65. Senator Bernie Sanders, \"National Sea Grant College Program Amendments of 2015 (Puerto Rico Oversight, Management, and Economic Stability Act–PROMESA),\" Senate debate on S. 2328 , Congressional Record , vol. 162, no. 105 (June 29, 2016), pp. S4691-S4702. 66. Representative Jim McGovern \"Providing For Consideration of H.R. 5698, Protect and Serve Act of 2018; Providing For Consideration of S. 2372 , Veterans Cemetery Benefit Correction Act; and Providing For Consideration of H.R. 2, Agriculture and Nutrition Act of 2018,\" House debate on H.Res. 891 , Congressional Record , vol. 164, no. 80 (May 16, 2018), pp. H3991-H3993.", "summary": "The Unfunded Mandates Reform Act of 1995 (UMRA) culminated years of effort by state and local government officials and business interests to control, if not eliminate, the imposition of unfunded intergovernmental and private-sector federal mandates. Advocates argued the statute was needed to forestall federal legislation and regulations that imposed obligations on state and local governments or businesses that resulted in higher costs and inefficiencies. Opponents argued that federal mandates may be necessary to achieve national objectives in areas where voluntary action by state and local governments and business failed to achieve desired results. UMRA provides a framework for the Congressional Budget Office (CBO) to estimate the direct costs of mandates in legislative proposals to state and local governments and to the private sector, and for issuing agencies to estimate the direct costs of mandates in proposed regulations to regulated entities. Aside from these informational requirements, UMRA controls the imposition of mandates only through a procedural mechanism allowing Congress to decline to consider unfunded intergovernmental mandates in proposed legislation if they are estimated to cost more than specified threshold amounts. UMRA applies to any provision in legislation, statute, or regulation that would impose an enforceable duty upon state and local governments or the private sector. It does not apply to duties stemming from participation in voluntary federal programs; rules issued by independent regulatory agencies; rules issued without a general notice of proposed rulemaking; and rules and legislative provisions that cover individual constitutional rights, discrimination, emergency assistance, grant accounting and auditing procedures, national security, treaty obligations, and certain elements of Social Security. In most instances, UMRA also does not apply to conditions of federal assistance. State and local government officials argue that UMRA's coverage should be broadened, with special consideration given to including conditions of federal financial assistance. During the 116th Congress, H.R. 300, the Unfunded Mandates Information and Transparency Act of 2019, would broaden UMRA's coverage to include both direct and indirect costs, such as foregone profits and costs passed onto consumers, and, when requested by the chair or ranking member of a committee, the prospective costs of legislation that would change conditions of federal financial assistance. The bill also would make private-sector mandates subject to a substantive point of order and remove UMRA's exemption for rules issued by most independent agencies. The House approved similar legislation during the 112th, 113th, 114th, and 115th Congresses. This report examines debates over what constitutes an unfunded federal mandate and UMRA's implementation. It focuses on UMRA's requirement that CBO issue written cost estimate statements for federal mandates in legislation, its procedures for raising points of order in the House and Senate concerning unfunded federal mandates in legislation, and its requirement that federal agencies prepare written cost estimate statements for federal mandates in rules. It also assesses UMRA's impact on federal mandates and arguments concerning UMRA's future, focusing on UMRA's definitions, exclusions, and exceptions that currently exempt many federal actions with potentially significant financial impacts on nonfederal entities. An examination of the rise of unfunded federal mandates as a national issue and a summary of UMRA's legislative history are provided in Appendix A. Citations to UMRA points of order raised in the House and Senate are provided in Appendix B.", "document_type": "crs"}
{"report": "Critical infrastructure (CI) refers to the machinery, facilities, and information that enable vital functions of governance, public health, and the economy. Adverse events may occur when CI systems and assets are subject to loss or disruption for any cause, whether by natural disasters or deliberate attack. This report highlights four key areas of enduring policy concern for Congress, and outlines the parameters of ongoing debates within them. A section is devoted below to each key area: defining and identifying CI; understanding and assessing CI risk; federal organization to address CI; and the role of the private sector. Presidential Decision Directive 63 (PDD-63) on critical infrastructure protection, released in 1998, was the first high-level policy guidance for critical infrastructure protection in the contemporary era. It framed the critical infrastructure issue in terms of national vulnerability to potentially devastating asymmetric attacks. The directive presented U.S. military economic and military might as \"mutually reinforcing and dependent\" elements of national power dependent upon critical infrastructure to function properly. The directive provided an austere definition of critical infrastructure as \"those physical and cyber-based systems essential to the minimum operations of the economy and government.\" PDD-63 set ambitious national goals for the elimination of any significant national vulnerability to \"non-traditional\" asymmetric cyber or physical attacks on CI. In practice, it has proven extremely difficult even to establish consistent criteria for assessing the criticality of specific assets and systems, in part because criticality relates not only to the physical attributes of infrastructure systems and assets, but also to the perspectives, values, and priorities of those making the assessment. The sheer scale, complexity, and interconnectedness of the U.S. and global economies complicate efforts to identify and inventory critical assets and systems. For example, the United States electricity sub-sector alone has nearly 7,000 operational power plants, which in turn depend upon other infrastructure assets and complex supply chains to support continuing operations. The most commonly cited statutory definition of critical infrastructure was established in the USA PATRIOT Act of 2001 ( P.L. 107-56 ), and echoes PDD-63 in its focus on protecting the industrial and demographic foundations of national mobilization against catastrophic risks. The USA PATRIOT Act defines critical infrastructure as \"systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.\" Over time, critical infrastructure policy has expanded from its earlier emphasis on the physical foundations of national power to a wider concern with provision of essential services and customary conveniences to the public. The universe of threats to CI commonly considered by Congress and executive branch departments and agencies has also expanded since the early post-9/11 period. The intelligence community continues to devote significant attention to asymmetric threats to CI posed by state and non-state adversaries who lack the means to directly confront U.S. military power, or for strategic reasons choose to avoid direct military confrontation. Asymmetric attacks may use a combination of physical or cyber means to damage or disrupt domestic CI systems and assets, or cause mass civilian casualties. However, natural disasters and other causes of damage and disruption not directly linked to terrorism or other intentional acts have become more salient elements of critical infrastructure policy and practice in the years since 9/11. Although the USA PATRIOT Act's definition of critical infrastructure remains law and is still commonly cited as a basis for official policy, CI policymakers have lowered the threshold of criticality to include infrastructure-related events with disruptive, but not necessarily catastrophic, effects at all levels of society and government. Policy increasingly reflects local, society-centric perspectives on infrastructure that place emphasis on it as an enabler of prosperity, public safety, and civic life. For example, National Infrastructure Protection Plan (NIPP), published by DHS in 2013 as official policy guidance for interagency coordination and public-private partnerships, defines critical infrastructure as \"assets, systems, and networks that underpin American society,\" and considers impacts of a wide range of natural and manmade hazard events at the national, regional, and local levels. Successive Administrations since 1998 have gradually expanded the aperture of CI policy beyond protection of sectors regarded as essential to national security, the economy, and public health and safety. This reflects a global trend among developed countries toward CI policies favoring society-centric resilience at the system level over security-oriented protection of specific assets deemed at risk. In January 2017, the Department of Homeland Security (DHS) designated U.S. election systems as a sub-sector of the Government Facilities critical infrastructure sector, which also includes national monuments and icons and education facilities. The components of the elections systems as described by DHS include physical locations (storage facilities, polling places, and locations where votes are tabulated) and technology infrastructure (voter registration databases, voting systems, and other technology used to manage elections and to report and validate results). The criticality of these facilities, systems, and assets derives primarily from their essential role in supporting the nation's civic life. Currently, there are 16 critical infrastructure sectors as set forth in Presidential Policy Directive 21 (PPD-21), \"Critical Infrastructure Security and Resilience,\" and elaborated in the 2013 NIPP. The federal government uses CI sectors as an organizing framework for voluntary public-private partnerships with self-identified CI owner-operators. Public-private partnership activities are non-regulatory in nature. DHS has overall responsibility for coordination of partnership programs and activities, but in several cases other federal agencies are assigned leading roles as Sector-Specific Agencies (SSAs). (The roles and responsibilities of the public and private sectors are discussed in the final section of this report, \" The Role of the Private Sector .\") Together, these sectors represent a broad and diverse array of national economic activity and social life, each with its own distinct characteristics. The expanding multiplicity and breadth of definitions used for critical infrastructure designation has policy implications for Congress. Each officially-designated critical infrastructure sector is represented by formal coordination bodies, which include numerous private sector stakeholder groups and representatives of state, local, tribal, and territorial (SLTT) governments. In addition, industry and non-profit groups may participate in certain sector-wide activities. As sectors mature, new public and private sector communities of interest emerge within the broader critical infrastructure enterprise, each with its own unique perspective on what criticality means as applied to the nation's infrastructure. For this reason, there is no single, consistently applied definition of critical infrastructure. Even though the most commonly cited statutory definition of CI has not changed in nearly two decades, identification and prioritization of critical systems and assets as categories of applied practice reflects diverse interests and perspectives, which continue to evolve. This suggests that definitions of critical infrastructure are not merely a matter of semantics, and the multiplicity of official definitions in common use is not simply a matter of imprecision. Rather, variation reflects diverse constituencies' efforts to negotiate the boundaries of congressional responsibility, the scope of government programs, and the nature and extent of public-private sector relationships at any given point in time. Critical infrastructure policy has taken on two distinct orientations that significantly overlap but nonetheless reflect different organizational perspectives and requirements. Critical infrastructure protection (CIP) emphasizes the identification, prioritization, and protection of infrastructure assets. Criticality from this perspective is generally defined in terms of the consequences of asset loss or system disruption (i.e., an infrastructure asset or system is critical to the degree that loss or disruption of service would have system-level impacts on essential functions of society, the economy, or government). Critical infrastructure resilience (CIR) emphasizes broad investments in hazard mitigation and preparedness during steady-state periods, and adaptation during emergencies, to ensure availability of critical infrastructure functions that enable provision of essential services. Much of the major legislation that serves as the foundation for CI policy was passed in the immediate aftermath of the 9/11 attacks, when concerns with physical protection of critical assets predominated in policy circles. However, policy practice in the United States and other developed countries has increasingly favored a focus on system resilience over asset protection. As such, national CI policy reflects a hybrid approach that contains elements of both CIP and CIR. This can exacerbate already complex issues inherent in defining criticality and identifying what exactly is critical in the context of time and place. Recognizing this inherent tension, this report uses the term \"critical infrastructure security\" to discuss CI policy without favoring CIP or CIR. CIP-focused legislation and government policy directives since 2001 have frequently contained requirements for the creation of asset lists, catalogs, databases, and reports to identify systems and assets that meet a given threshold of criticality, and thus require higher than ordinary levels of protection against plausible threats. The logic is simple on its face: we need to know what we have; what is most important; and what we need to protect. However, application of this logic often introduces many complexities in actual practice, and so national-level issues of asset identification and prioritization persist across all CI sectors. Nonetheless, inventory requirements are typically the first step of the broader risk management strategies applied to critical infrastructure protection, both at the national level and in the private sector at the enterprise level. Definitional criteria of criticality will likely continue to be a subject of considerable debate within the CI policy community, but the forcing mechanism provided by list/no-list decisions serve to define what specific assets are considered critical in actual practice. One of the earliest examples of a CIP-based inventory requirement is the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , released in February 2003 just before the newly created Department of Homeland Security began operations. The strategy directed DHS to develop a \"uniform methodology for identifying facilities, systems, and functions with national-level criticality,\" and use it to \"build a comprehensive database to catalog these critical facilities, systems, and functions.\" It was followed by the December 2003 release of Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection (HSPD-7), which served as the basis of CI policy development and implementation for the next decade until it was superseded by PPD-21 in 2013. HSPD-7 shared the CIP-orientation of other early policy documents, directing federal departments and agencies to \"identify, prioritize, and coordinate the protection of critical infrastructure and key resources in order to prevent, deter, and mitigate the effects of deliberate efforts to destroy, incapacitate, or exploit them.\" DHS claimed in the 2006 NIPPâthe first plan of its typeâthat it had compiled a comprehensive CI database to meet the CI identification requirement. However, a 2006 DHS Inspector General (IG) report found that these early efforts to produce a national database of CI assets suffered from conceptual and methodological shortcomings. The report stated that the Department's National Asset Database had rapidly grown from 160 key assets in 2003 to include 77,069 assets in 2006, and that listed assets included everything from nuclear power plants and dams to local petting zoos and water parks. The IG report concluded that the database contained many entries that listed \"unusual, or out-of-place, assets whose criticality is not readily apparent,\" without providing assurance that truly critical assets were included. Likewise, data collection procedures were not standardized, so that San Francisco listed its entire light rail system as a single asset, while New York City listed its subway stations as multiple individual assets. Congress subsequently included provisions for the National Asset Database as part of the Implementing the Recommendations of the 9-11 Commission Act of 2007 ( P.L. 110-53 , The 9-11 Commission Act). The legislation requires compilation of a national database of vital systems or assets, and creation of a separate classified list of \"prioritized critical infrastructure,\" to be updated annually and submitted to Congress. The classified list is to include assets that the Secretary determined would cause national or regional catastrophic effects if subject to disruption or destruction. Other provisions include definitions of infrastructure-related terms, and a requirement for the Secretary to implement certain quality control procedures to ensure that asset nominations from state governments or other sources meet the threshold of criticality as determined by the Secretary. A 2013 Government Accountability Office (GAO) report found that DHS had improved its processes for critical asset identification, but that significant questions regarding reporting criteria and methodology persisted. The report documented frequent changes in nomination and adjudication criteria and reporting format used by National Critical Infrastructure Prioritization Program (NCIPP), which DHS instituted to fulfil the congressional mandate of the 9-11 Commission Act. After 2009, NCIPP assessed criticality of all nominations according to four types of potential adverse consequences above certain designated thresholds: fatalities, economic loss, mass evacuation length, and national security impacts. Methodological adjustments were subsequently made in some cases to account for unique CI characteristics. For example, collapse of the U.S. financial system would likely not cause immediate mass casualties, but might still have debilitating second-order effects on national security, economic security, and public health and safety. The same might also apply to election infrastructure used in federal elections, which was added as a CI sub-sector in 2017. The report noted that asset nomination vetting methods had not undergone an independent peer review. It recommended to Congress that DHS commission such a review to \"assure that the NCIPP list identifies the nation's highest priority infrastructure.\" Being listed as a prioritized asset in the NCIPP immediately elevates a given asset making it an object of national significance under relevant statutes. This action may affect government prioritization of certain on-site risk assessments, administration of regulatory regimes and grant programs, conduct of certain criminal prosecutions, and emergency preparedness and response coordination, among other activities. Exact numbers of nominated assets are not publicly available due to classification requirements, but they number in the thousands. Despite the often significant ramifications of the NCIPP list, the 2013 GAO report found that some state governments were opting not to participate in DHS data calls, citing compliance burdens, technical limitations, and cost-benefit calculations. For example, some states said they lacked expertise to develop scenarios and model complex infrastructure systems with sufficient fidelity to assess likely consequences of failure or disruption. For this reason alone, the NCIPP list cannot be regarded as a current and complete national inventory of critical systems and assets. Furthermore, GAO found that DHS was unable to provide documentation to show that it had complied with the statutory annual reporting requirement in recent years. The inherent complexities of CI inventory and categorization as described above also suggest the presence of persistent difficulties in assuring the completeness, quality, and currency of centralized inventories of CI assets requiring protected status. CIR prioritizes adaptive use of critical capabilities to enable continuity of service during periods of stress on critical infrastructure systems. This approach to CI inventory expands the scope of data collection to include any and all assets within a given CI sector that might be useful in emergency planning or contingency situationsâregardless of their inclusion on a particular list. The data can then be used as needed to identify alternative means of maintaining critical functions and providing essential services if systems and assets ordinarily used to provide these services are compromised. The major CI interagency database using the capabilities approach is known as Homeland Infrastructure FoundationâLevel Data (HIFLD). Four lead agenciesâDHS, Department of Defense (DOD), the National Geospatial-Intelligence Agency, and the U.S. Geological Surveyâcompile data gleaned from outreach to public and private sector partners, and make it available to eligible law enforcement, emergency management, and other organizations at all levels of government. HIFLD is comprised of hundreds of data \"layers,\" which encompass nearly every conceivable category of asset relevant to homeland security functions and are curated by designated partner agencies, or \"stewards\" as they are known. Layers include assets considered critical under any definition, which are essential to supporting lifeline CI functions of energy, communications, transportation systems, and water and wastewater systems. However, HIFLD also includes many asset categories that are not necessarily critical according to any given statutory or official definition of criticality, but may become critical in the context of specific emergencies or CI policy decisionsâfor example, truck driving schools, express shipping facilities, and cruise ship terminals. The Department of Health and Human Services (HHS) used HIFLD during the 2017 hurricane season to locate day care centers in impacted areas. These specific day care centers would likely not be defined as critical under the common statutory definition of CI, because they were not so vital to the functioning of the national public health system as a whole that physical loss of the facilities would be debilitating at the national level. However, knowledge of where these centers were located was essential in allowing HHS to provide a critical public health serviceâensuring the safety of children in a disaster zone. The HIFLD partnership model is intended to enable relevant agencies at all levels of government and certain private sector entities to leverage a large universe of readily-accessible infrastructure data to address real-world use cases. Unlike the NCIPP list, it does not elevate the status of specific systems and assets in ways that directly support official functions of federal oversight, regulation, and administration. However, it is widely used to inform preparedness and incident management activities of federal and SLTT agencies. The robust development of HIFLD partnerships at all levels of government in recent years contrasts with the declining state participation in NCIPP documented by GAO. Nonetheless, CIP-based approaches to inventory of CI assets remain relevant. For example, provisions of the 2017 National Defense Authorization Act related to national preparedness against electromagnetic threats and hazards required DHS to determine, to the extent practicable, \"the critical utilities and national security assets and infrastructure that are at risk.... \" Likewise, specific chemical manufacturing facilities posing a high risk for malicious exploitation continue to be subject to DHS inspection and regulatory enforcement under Chemical Facility Anti-Terrorism Standards (CFATS) first authorized by Congress in 2007. These regulations require owner-operators to protect their facilities against cyber and physical threats according to specified standards. Congress may consider the implications of the policy shift towards system-level resilience for legacy programs, such as the NCIPP asset list. Continuing policy changes made by DHS may further reduce the profile of NCIPP specifically, and asset-protection approaches to CI risk management in general. Stakeholder participation in NCIPP is not cost-neutral, so Congress may consider the frequency of data calls, elimination of any overlapping efforts or duplication, or additional appropriations to support data gathering and analysis. Congress may also consider updates to National Asset Database requirements contained in the 9/11 Commission Act to ensure their continuing relevance and applicability to emerging CISA programs and priorities, and their alignment with the requirements of other congressionally authorized programs, such as the Homeland Security Grant Program. Efforts to identify and prioritize CI systems and assets are part of a larger national effort to systematically understand and assess homeland security risks. In recent decades, Congress has frequently sought authoritative assessments of national level risk to CI. Risk assessments may be used to inform planning and resource allocation decisions related to congressional appropriations, emergency preparedness, regulatory oversight of certain industries, federal grant funding, and voluntary security measures by CI owner-operators. DHS, which is responsible for coordination and oversight of the national infrastructure security effort, defines risk as the \"potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood and the associated consequences.\" DHS officially considers three factors as components of risk: threat, vulnerability, and consequence. DHS defines threat as \"a natural or man-made occurrence, individual, entity, or action that has or indicates the potential to harm life, information, operations, the environment, and/or property.\" Threat assessments usually include data on human adversaries or natural hazards, such as extreme weather events. In the case of the former, threat estimates are based on available information about the identity of threat actors or groups, and their motivations, capabilities, and observed targets. Information on likely timing, methods, and frequency of attacks may also be incorporated if available. In the case of natural hazards, likelihood and severity of event occurrence is usually estimated using databases of past similar events in conjunction with predictive modeling of weather, tectonic activity, and the like. DHS defines vulnerability as the \"physical feature or operational attribute that renders an entity, asset, system, network, or geographic area open to exploitation or susceptible to a given hazard.\" Vulnerability assessments provide information about characteristics of assets or systems that may leave them open to exploitation or damage from a threat or hazard. This may include, for example, software design characteristics or structural weaknesses in a levy system. Assessments may contain recommendations for adoption of resilience measures to mitigate identified vulnerabilities. DHS defines consequence as the \"effect of an event, incident, or occurrence.\" As discussed in the previous section, criticality assessments focus on potential consequences of adverse events that disrupt or destroy infrastructure systems and assets. These assessments use a range of technical and non-technical methods of assessment. Research centers, universities, and industry groups develop and refine many different modeling methodologies to inform infrastructure security investments and activities of federal agencies and SLTT jurisdictions. In other cases, recognized subject-matter experts and responsible officials make non-technical assessments based upon accumulated knowledge and experience. Consequence-based criticality assessments can be used to inform risk assessments when combined with threat and vulnerability assessments. Since 2007, DHS has applied these elements of risk to its various planning, programs, and budget activities as a function: \"risk is a function of threat, vulnerability, and consequence,\" or R=f(TVC). Critics have challenged the usefulness of this formula on several grounds. They assert DHS has not demonstrated the capability to accurately assign probabilities to rare events like terrorist attacks, or otherwise determine precise values for all the terms in the equation. Likewise, the terms of the equation are not necessarily independent from one another. Complex interactions between threat, vulnerability, and predicted consequences make application of this formula to grant applications and other resource allocation decisions related to risk mitigation problematic. DHS recognized in 2018 the need to provide a \"complete systemic risk picture\" for CI, and has proposed revision or updates to risk assessment approaches described above. Several significant legislative and executive branch initiatives related to CI risk assessment were instituted in 2018-2019 to establish the organizational basis for significant changes. The Cybersecurity and Infrastructure Security Agency Act of 2018 (CISA Act; P.L. 115-278 ) created the eponymous agency (CISA) as an operational component of DHS to take over the functions previously carried out by the National Protection and Programs Directorate (NPPD) as a DHS headquarters organization. The creation of a dedicated agency for infrastructure security elevates CI risk management as an area of policy focus. CISA has established the National Risk Management Center (NRMC) as a \"planning, analysis, and collaboration center\" to manage national CI risk. According to CISA, the NRMC will adopt an \"evolved approach\" to CI risk management, which emphasizes cross-sector analysis, and capabilities-oriented approaches to identification and prioritization of CI. Congress may request information from CISA on its efforts to institutionalize new risk management methods and approaches, and to ensure that these are validated by qualified external reviewers. The National Laboratories, the relevant university-based DHS Centers of Excellence, certain other universities and research centers, industry research groups, and the Homeland Security Advisory Council may provide relevant expertise in infrastructure risk assessment methodology. The Homeland Security Act specifies how the Secretary of Homeland Security may leverage these organizational resources in support of homeland security activities. Congress may choose to exercise its discretion in establishing funding priorities and program guidance for these organizations as appropriate to support national CI security goals. Federal organization to address CI issues has changed significantly in response to evolving threats and the accompanying maturation of the homeland security enterprise. Three distinct periods of development are covered below: the initial policy development and coordination initiatives of the late 1990s; the post-9/11 reorganization of federal government to counter terrorist threats to infrastructure; and the ongoing transition to the all-hazards resilience framework for infrastructure security. Federal attention to CI policy increased in the 1990s as concerns grew about the potential for malicious exploitation of the expanding interface between computing technologies and physical infrastructure. The Clinton Administration established the Commission on Critical Infrastructure Protection in 1996 with a mandate to produce a report on infrastructures \"that constitute the life support systems\" of the nation, with a focus on emerging cyber threats. Two years later the Administration issued PDD-63 based in part on the Commission's report, requiring the government \"to swiftly eliminate any significant vulnerability\" of critical infrastructures to \"non-traditional\" cyber or physical attack within five years. The organizational directives set forth in PDD-63 focused on increasing interagency coordination by leveraging existing federal entities. The National Coordinator for Security, Infrastructure Protection and Counter-Terrorism, the senior executive position created by the directive, did not report directly to the President, and his duties were confined largely to leadership of an interagency coordination group and service as executive director of a stakeholder advisory group. Congress chartered a blue ribbon commission in 1999 to assess both terrorist threats to national security and early efforts to implement PDD-63. The Gilmore Commission, as it was known, submitted a report to Congress and the White House in December of 2000 titled \"Toward a National Strategy for Combating Terrorism.\" The report found that implementation of PDD-63 was incomplete, and that the nascent CIP enterprise had developed only fitfully since it was signed in 1998. Specifically, it found Information Sharing and Analysis Centers (ISACs) created to facilitate broader risk awareness in government and industry about infrastructure vulnerabilities and threats were \"still embryonic.\" The National Coordinator for Security, Infrastructure Protection, and Counterterrorism had broad authorities that left little time for CIP responsibilities, and lacked program and budget authority. No overall national CIP strategy existed to guide government actions. The National Infrastructure Protection Center (NIPC), responsible for CI threat and vulnerability assessments, warning and response coordination, and law enforcement investigation and response activities, had taken few concrete actions to establish its basic functions under Federal Bureau of Investigation (FBI) auspices. The 9/11 attacks had a galvanizing effect on homeland security policy, and, by extension, critical infrastructure protection. Policy initiatives that had previously languished became matters of urgent national concern overnight. Two broad tracks of legislative action emerged. The first favored reestablishing the Office of Homeland Security and the national coordination role under statute, with the addition of certain budget authorities, responsibilities, and oversight requirements, similar in organization and scope to the National Office of Drug Control Policy. This option followed the recommendations of the Gilmore Commission, and would have left much of the existing federal government structure intact, focusing on improved interagency coordination to ensure increased protection against major terrorist attacks. The second legislative track favored comprehensive consolidation of government counterterrorism functions under a single federal agency to be named the National Homeland Security Agency. This track followed the recommendations of a blue ribbon panel chartered by DOD in 1998 to study 21 st century security issues, known as the Hart-Rudman Commission. Key supporters in Congress believed that dispersion of homeland security-related functions across federal departments and agencies whose missions were not primarily security related had left the nation vulnerable to terrorist attacks. They favored consolidation to ensure clearer lines of executive authority, centralization of relevant counterterrorism functions, and better interagency coordination, among other anticipated benefits. The Homeland Security Act of 2002 generally reflected the approach that the Hart-Rudman Commission had advocated for. The Homeland Security Act P.L. 107-296 transferred many infrastructure security functions to DHSâfunctions which previously had been regarded as properly belonging to the various diverse spheres of business, finance, commerce, energy, public health, agriculture, and environmental protection. GAO designated creation of DHS as high risk in 2003 because of the large number of agencies being transferred, and the management challenges this presented to the new department. DHS ultimately incorporated nearly three dozen federal agencies and other entities into four major directorates: Information Analysis and Infrastructure Protection, Science and Technology, Border and Transportation Security, and Emergency Preparedness and Response. Although several long-established agencies such as the Coast Guard retained customary missions not related to homeland security, the new departmental structure prioritized their homeland security related missions, especially counterterrorism. This approach represented a change from what infrastructure policy had previously been. The White House had regarded CIP as only tangentially related to counterterrorism functions of government before 9/11. The Office of Management and Budget (OMB) stated in a report to Congress on federal counterterrorism programs, submitted in August 2001, that \"CIP is a separate but related mission.\" The authors justified this distinction on the grounds that infrastructure risks were diverse, and included many hazards beyond terrorism to include equipment failure, human error, weather and natural disasters, and criminal activity. They wrote, \"This year's report focuses on combating terrorism, mentioning CIP efforts only where they directly impact the combating terrorism mission.\" That direct impact, according to budget estimates in the 2001 report, was negligible. CIP funding that overlapped counterterrorism amounted to less than half of one percent of the total CIP funding of $2.6 billion requested by the White House for the 2002 fiscal year. 9/11 changed the budget picture significantly, as seen in the 2003 OMB report to Congress. Infrastructure programs and activities that had not previously been seen as directly impacting the combating terrorism mission were included in the report, and their relation to counterterrorism efforts highlighted. Requested budget increases for FY2004 reflected the newfound centrality of counterterrorism priorities across federal departments and agencies with infrastructure-related programs. The White House request for FY2004 was $12.1 billion, representing an increase of more than 450% over its final pre-9/11 request, and included 28 federal entities outside the newly-created DHS. The 2003 report did not provide a separate estimate of the proportion of the CIP-related budget that overlapped counterterrorism, as the 2001 report had. This was hardly necessary in any case, because CIP in all its diverse aspects had largely been redefined as a counterterrorism mission. Creation of a new purpose-built department was intended to ensure that CIP and other core homeland security missions were institutionalized as top federal priorities under unified leadership. Under the new consolidation of functions, more than half of the government's pre-9/11 homeland security funding was transferred to a single agency. However, the amalgam of independent agencies transferred to DHS retained significant independence as operational components of the new Department. Likewise, other departments and agencies outside DHS retained many of the infrastructure security functions they had before 9/11. Therefore, despite significant changes, CIP remains a highly distributed enterprise that competes for limited resources with other priorities across the federal government. As long as the threat of terrorism continued to be an overriding national priority, counterterrorism continued to be a focal point for critical infrastructure security policy. However, by the time Hurricane Katrina struck the Gulf Coast in August 2005, nearly four years after the 9/11 attacks, public perception of the terrorist threat had already softened considerably. In the immediate aftermath of the attacks, 46% of Americans surveyed by Gallup named terrorism as the most important problem facing the United States. By the second half of 2005, the percentage hovered between 6%-8%. This broad trend has continued, with periodic upticks caused by high-profile incidents. Gallup surveys in early 2019 did not list terrorism as a category of public concern, because it did not garner sufficient responses to be included in results. After Katrina, the well-publicized failure of the extensive levy system designed to protect New Orleans from catastrophic floods further highlighted the vulnerability of critical systems and assets to diverse hazards besides terrorism. Issues of equipment failure, human error, weather and natural disasters, and criminal activity highlighted in the pre-9/11 OMB report (described above) reemerged as national-level policy concerns. In 2006, the Critical Infrastructure Task Force of the Homeland Security Advisory Council initiated a public policy debate arguing that the government's critical infrastructure policies were focused too much on protecting assets from terrorist attacks and not focused enough on improving the resilience of assets against a variety of threats. According to the Task Force, such a defensive posture was \"brittle.\" Not all possible targets could be protected and adversaries could find ways to defeat defenses, still leaving the nation having to deal with the consequences. In 2008, as part of its oversight function, the House Committee on Homeland Security held a series of hearings addressing resilience. At those hearings, DHS officials argued that government policies and actions did encourage resilience as well as protection. Even so, subsequent policy documents made greater reference to resilience. The 2010 Quadrennial Homeland Security Review (QHSR), the first top-level DHS strategic review submitted to Congress under Title VII of the Homeland Security Act, highlighted the diversity of missions and stakeholders in what had become an expansive enterprise. The QHSR stated that, \"while the importance of preventing another terrorist attack in the United States remains undiminished, much has been learned since September 11, 2001, about the range of challenges we face.\" Examples of threats and hazards included natural disasters (specifically, Hurricane Katrina), widespread international cyberattacks, the expansion of transnational criminal activities, and contagious diseases. The QHSR noted the leadership role of DHS in managing risks to critical infrastructure, as well as other homeland security missions related to immigration, border security, cybersecurity, and disaster response. However, it presented homeland security as a decentralized enterprise shared by diverse stakeholders in the public and private sector. \"[A]s a distributed system,\" the report read, \"no single entity is responsible for or directly manages all aspects of the enterprise.\" In 2013, PPD-21 superseded HSPD-7, which had provided authoritative policy guidance for federal infrastructure protection for a decade. PPD-21, which remains in force, informed development of the 2013 NIPP. It placed less emphasis protection of physical infrastructure assets against terrorist threats than HSPD-7 did. Rather, it emphasized all-hazards CI resilience as part of a broader national disaster preparedness effort. \"Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards,\" it stated. \"Achieving this will require integration with the national preparedness system across prevention, protection, mitigation, response, and recovery.\" The 2014 QHSR further expanded the boundaries of critical infrastructure security beyond terrorism-related threats to include factors such as aging and neglect of critical systems and assetsârecasting once-ordinary issues of investment, maintenance, and utility service provision as homeland security concerns. DHS did not submit a QHSR to Congress in 2017 as required by the Homeland Security Act. This means there is no current departmental-level statement that specifies DHS strategic direction and priorities for infrastructure security or other homeland security goals. The boundaries of responsibility for critical infrastructure securityâas well as the definition of critical infrastructure itselfâcontinue to be negotiated among Congress, executive branch departments and agencies, SLTT jurisdictions, and a diverse array of private-sector stakeholders. For example, in 2002 Congress directed the U.S. Department of Agriculture (USDA) to transfer the Plum Island Animal Disease Center to DHS under the Homeland Security Act ( P.L. 107-296 ), based partly on concerns that terrorists might target the nation's food and agriculture sector with contagious pathogens. However, in 2018 Congress authorized transfer of a replacement facility and its functions back to USDA from the DHS Science and Technology Directorate under the Consolidated Appropriations Act of 2018 ( P.L. 115-141 ), as proposed by the White House in its FY2019 budget request. After a relatively brief period of extensive consolidation in the early 2000s, critical infrastructure security in the federal government has evolved into a distributed enterprise loosely structured by institutionalized partnerships and policy frameworks that increasingly emphasize an all-hazards approach to critical infrastructure security. Congress may consider which aspects of critical infrastructure security properly reside within the homeland security enterprise, and which relate more closely to government responsibilities in areas of commerce, trade, and public utilities regulation. The distributed enterprise model of critical infrastructure security based on an all-hazards approach potentially elides boundaries between homeland security and other dimensions of infrastructure policy. Likewise, the definition of homeland security itself continues to evolve beyond its counterterrorism roots. DHS has not submitted a top-level strategy to Congress since the 2014 QHSR. (As noted above, a quadrennial review was due to Congress no later than December 31, 2017.) A more current strategy or other high-level policy statement might serve to more clearly define current Departmental goals, the parameters of its activities related to critical infrastructure security, and how these relate to activities of interagency partners with infrastructure-related responsibilities. Congressional interest in homeland security strategy was indicated by the Quadrennial Homeland Security Review Technical Corrections Act of 2019 ( H.R. 1892 ), which passed the House of Representatives unanimously and was referred to the Senate Committee on Homeland Security and Governmental Affairs on May 15, 2019. The proposed act would require DHS to consult with relevant advisory committees when developing its capstone strategy, and to more directly link the strategy with budgeting, program management, and prioritization, among other provisions, including new deadlines linked to the budget cycle rather than the end of the calendar year. Congress has periodically acted to define organizational relationships within DHS. The Department was originally formed with four main directorates, each of which corresponded with a primary homeland security mission. The centralized directorate structure under headquarters management has given way to a more federated structure that emphasizes the operational role and organizational identity of its operational components. Most recently, the National Protection and Programs Directorate, which administered many of the Department's infrastructure partnership programs, was made an agency within DHS through the 2018 CISA Act. Congress may consider the nature of intra-Departmental organization and relationships within DHS as appropriate, and what degree of centralization or federation best supports the critical infrastructure security mission. Although much of the nation's CI is privately owned, the public may be put at risk if these privately owned critical systems fail. Management of CI risk within a complex ownership and regulatory environment presents enduring policy challenges. Legislators and other policymakers have generally favored variations of the federated partnership model first elaborated in PDD-63, which relies on voluntary collaboration between the public and private sectors (as opposed to regulatory mandates) to guide investment in critical infrastructure security. Under this model, CI owner-operators, not the government, have ultimate responsibility for assessing and mitigating risk at the enterprise level. At the same time, Congress has directed executive branch agencies to assess and manage risk at the national level. Infrastructure risk management is structured under this framework as a collaborative endeavor between the public and private sectors reliant on incentives, information sharing, and voluntary investments in security. Investments in critical infrastructure security in the private sector are largely the purview of private individuals or entities, but many of the most serious risks are borne collectively by the public and larger business community. Under the current partnership structure, government and private-sector representatives collaboratively ascertain what individual enterprise-level investments in security and resilience are necessary to manage CI risk at the societal level. While there is little question that businesses, government, and society have a \"clear and shared interest\" in CI resilience, it is often difficult at the policy level to work out exactly who should bear responsibility for up-front costs of investment, and what mandatory requirements, regulatory oversight measures, and cost-recovery mechanisms might be necessary in a given case. By and large, the federal government relies upon the private sector to voluntarily develop CI risk management strategies and mitigation investments to support national resilience goals. The 2013 NIPP states that, \"Government can succeed in encouraging industry to go beyond what is in their commercial interest and invest in the national interest through active engagement in partnership efforts.\" In practice, government efforts to encourage voluntary investments in infrastructure resilience through public-private partnerships have varied in extent and effectiveness, particularly when risks in question are diffuse and involve low-probability/high-consequence events such as major terrorist attacks or earthquakes. The main incentives for industry participation are threefold: improved access to risk information from government sources on security threats and hazards; the value of analyses of national-level risks that exceed the capabilities of most private companies to provide for themselves; and the opportunity to engage with government to influence CI policy. Congress acted to reduce barriers to information sharing between the public and private sectors through the Critical Infrastructure Information Act of 2002, which is designed to ensure confidentiality of industry information shared with DHS in good faith under the Protected Critical Infrastructure Information (PCII) program. Likewise, a number of public-private coordination councils established under the authority of Presidential directives provide a forum for policy discussions and deliberation. A 2019 report by the Organization for Economic Cooperation and Development (OECD) found that voluntary information sharing and collaboration partnerships in advanced industrialized economies \"[do not] necessarily guarantee a strong enough incentive structure to ensure that sufficient investments are effectively made to attain expected resilience targets.\" Most developed countries augment voluntary policy instruments with regulatory mandates to spur investments in resilience in certain sectors. Regulatory mandates tend to be favored for CI sectors or sub-sectors where incident impacts are potentially catastrophic and elicit broad public concern, such as nuclear meltdowns, gas pipeline explosions, airliner crashes, or terrorist theft of chemicals for use in explosives. According to an academic survey of public-private partnerships for CI security, collaborative approaches more broadly apply \"as risks become more privatized\" and \"harms are more divisible and isolated with respect to their impacts.\" Policymakers have generally sought to limit the regulatory reach of government within CI security enterprise. For example, PDD-63 stated that \"we should, to the extent feasible, seek to avoid outcomes that increase government regulation or expand unfunded government mandates to the private sector.\" The Homeland Security Act created an organizationâDHSâwith wide-ranging responsibilities, but relatively narrow regulatory mandates. The Transportation Security Administration has (but does not exercise) regulatory oversight over oil and gas pipeline security. The Coast Guard regulates certain aspects of port securityâa mission that long predates the transfer of the service to DHS under the Homeland Security Act. Finally, CISA directly regulates certain chemical facilities under the Chemical Facilities Anti-Terrorism Standards program to prevent terrorist exploitation of the chemical industry. Many other federal, state, and local agencies exercise regulatory authorities that are related to infrastructure security, but are not necessarily specific to homeland security. For instance, the Nuclear Regulatory Commission (NRC) regulates civilian nuclear facilities and enforces extensive safety and reporting requirements. Many of these requirements are traceable to the partial reactor meltdown at Three Mile Island in 1979, and as such are treated as industrial safety and reliability issues in most cases. Many of the aspects of infrastructure security most relevant to homeland security, such as facility protection against deliberate attacks, are overseen by the NRC, not DHS. Agencies with dual responsibilities for regulation and partnership typically separate the two rolesâa lesson learned from early experience with NIPC, which was not clearly separated from the law-enforcement functions of the FBI, and thus had difficulty eliciting participation from private sector entities in its early stages. (See \" From the 1990s to the Homeland Security Act \" section). The preponderance of DHS infrastructure security programs focus on enhancing voluntary collaboration with infrastructure security partners through development of information sharing, analysis, training, and coordination capabilities, as well as voluntary on-site assessments in certain cases. Current CI partnership structures are organized under the authority of PPD-21. The directive is implemented through sector and cross-sector partnership structures described in the 2013 NIPP. The 2013 NIPP outlined an infrastructure protection effort that was less centralized and less focused on critical asset protection than previous iterations of the NIPP, instead emphasizing distributed responsibility among an expansive group of stakeholders committed to common national resilience goals. NIPP partnerships at the federal level are administered by CISA in partnership with other DHS components, and other federal departments and agencies. Each of the 16 CI sectors under the NIPP framework has its own Government Coordinating Council (GCC) and Sector Coordinating Council (SCC). GCCs are made up of federal and SLTT agencies, and, according to the NIPP, enable \"interagency, intergovernmental, and cross-jurisdictional coordination\" on infrastructure issues of common concern. Each GCC is led by a designated federal agency with sector-relevant responsibilities and expertise, known as a Sector-Specific Agency (SSA). DHS leads or co-leads 10 of the 16 GCCs as the SSA. Other SSAs include the Environmental Protection Agency, the Government Services Agency, and the departments of Agriculture, Defense, Energy, Health and Human Services, Transportation, and Treasury. (See Table 1 for description of CI sectors and SSAs, and Appendix C for visualization of CI partnership structure). SSAs leverage various NIPP partnership structures to formulate sector-specific infrastructure protection plans that support the overall goals of the NIPP, taking unique sector characteristics and requirements into account. The sector-specific plans contain broad analyses of sector risks, interdependencies with other CI sectors, and stakeholders and partners, which together are used to develop sector-specific resilience goals and measures of effectiveness. Each SCC is made up of private-sector trade associations and individual CI owner-operators. SCCs are self-organized and self-governed, but must be recognized by the corresponding GCC as \"appropriately representative\" of the sector. They have an advisory relationship with the federal government, and also have coordination and information-sharing functions between government and private-sector stakeholders. SCCs may also support independently organized Information Sharing and Analysis Centers (ISACs) specific to their sector to facilitate information sharing among stakeholders. The National Council of ISACs currently lists 24 member organizations. ISACs maintain operations centers, deploy representatives to the National Cybersecurity and Communications Integration Center (NCCIC) and National Infrastructure Coordinating Center (NICC), conduct preparedness exercises, and prepare a range of informational products for their members. Reliable data on the scale and scope of private-sector participation in SCC activities across CI sectors is not available, but it varies widely depending on sector characteristics. Four cross-sector councils serve to represent key stakeholder groups whose broad interests are not specific to one sector. The State, Local, Territorial, and Tribal Government Coordinating Council (SLTTGCC) is intended to enhance infrastructure resilience partnerships between SLTT jurisdictions, and to represent their common governance-related interests in GCC and SCC deliberations. The Critical Infrastructure Cross-Sector Council consists of the chairs and vice-chairs of the SCCs, and coordinates cross-sector issues among private-sector CI stakeholders. The Regional Consortium Coordinating Council represents regional CI resilience coalitions and encourages sharing of best practices among them. The Federal Senior Leadership Council (FSLC) is composed of senior officials from federal departments and agencies responsible for implementation of the NIPP, and is chaired by the CISA Director or his designee. It exercises leadership over the other cross-sector councils. According to its charter, the FSLC forges policy consensus among federal agencies on CI risk management strategies, coordinates \"issue management resolution\" among the other cross-sector councils, develops coordinated resource requests, and advances collaboration with international partners, among other activities. The various NIPP partnership councils may organize certain deliberations under the auspices of the Critical Infrastructure Partnership Advisory Council (CIPAC), which was first established in 2006. The CIPAC Charter has been renewed several times since then, most recently in 2018. Under certain circumstances, CIPAC provides NIPP coordinating councils and member organizations legal exemption from Federal Advisory Committee Act (FACA) provisions for open meetings, chartering, public involvement, and reporting in order to facilitate discussion between CI stakeholders on sensitive topics relating to infrastructure security. CIPAC engages its government and private-sector stakeholders through the NIPP partnership structure to develop consensus policy advice and recommendations for DHS and other relevant agencies. The Homeland Security Advisory Committee (HSAC) provides advice and recommendations to the Secretary of Homeland Security on matters related to homeland security. Members are appointed by the Secretary, and include leaders from state and local government, first responder communities, the private sector, and academia. The Secretary may also establish subcommittees to focus attention on specific homeland security issues as needed. CI-relevant subcommittees have focused on cybersecurity and emerging technologies. The National Infrastructure Advisory Council is a committee made up of senior industry leaders who advise the President and SSAs on CI policy. It is not formally part of the NIPP partnership structure, but plays an intermediary role between the various coordination councils, the Secretary of Homeland Security, and the President by providing a mechanism for consultation between public and private sector representatives at the highest levels of government. First established by executive order on October 16, 2001, it is tasked with monitoring \"the development and operations of critical infrastructure sector coordinating councils and their information sharing mechanisms\" and encouraging private industry to improve risk management practices, among other activities. This partnership structure is more flat than hierarchical, and is realized in multiple formats to include symposia, research collaborations, working groups, policy deliberations, and emergency preparedness and response activities. By design, participation in these activities often crosses organizational lines and includes governmental and non-governmental stakeholders. Increasingly, partnership activities include representatives from multiple CI sectors, due to recognition of the interdependencies inherent in complex CI systems and the general policy trend favoring system resilience over asset protection. The distributed partnership structure has several operational elements maintained by DHS that provide centralized hubs for various non-regulatory coordination and information sharing functions. The National Infrastructure Coordinating Center (NICC) collects, analyzes, and shares threat or other operational information throughout the critical infrastructure partnership network on a real-time basis. It also conducts training and exercises and provides decision support to private sector partners. It is part of the DHS National Operations Center, which serves as the principal operations center for the Department of Homeland Security. Additionally, the National Cybersecurity and Communications Integration Center (NCCIC) serves as a monitoring and incident response center for incidents affecting cybersecurity and communications networks, and also performs several related analytic functions. CISA administers both the NICC and the NCCIC. The underlying policy premise of the current partnership system is that removing or mitigating disincentives to information sharing and increasing trust between the public and private sector will lead to greater industry willingness to invest in system-level resilience. Three related questions may be considered: To what extent are private sector owner-operators actually embracing collaboration and information-sharing initiatives offered by federal departments and agencies under the current partnership system? Is private-sector participation in these initiatives incentivizing effective investments (beyond those made for business reasons) in programs to reduce overall public risk? What legislative remedies are appropriate in cases where broader and more effective investments in risk reduction are necessary? Given the diversity and breadth of the critical infrastructure enterprise as currently defined, the answers to these questions vary across sectors. Rigorous empirical analyses that might shed light on the extent and effectiveness of collaboration within the voluntary framework are scarce. A 2013 study found that fewer than half of the 16 CI sectors had strong \"communities of interest\" that actively engaged in CIP issues through NIPP partnership structures. CI communities of interest were strongest in those sectors with strong trade or professional associations unified by relatively specific threats posing individual risk to member companies. A 2011 study found that the most important factor in private-sector risk mitigation investment is a company's own cost-benefit analysis; and that many CI owner-operators believed government will (or should) cover externalized social costs incurred by loss or disruption of company facilities due to a terrorist attack. GAO testimony provided to Congress in 2014 asserted that DHS partnership efforts faced challenges, and identified three key factors that impact effectiveness of the partnership approach: recognizing and addressing barriers to sharing information, sharing the results of DHS assessments with industry and other stakeholders, and measuring and evaluating the performance of DHS's partnership efforts. GAO found that DHS did not systematically collect data on reasons for industry participation or non-participation in security surveys and vulnerability surveys, and whether or not security improvements were made as a result. GAO asserted that DHS cannot adequately evaluate program effectiveness absent these measures. Although DHS concurred and agreed to corrective measures, GAO reported that it had not verified DHS's progress in implementing them. Overall, the picture that emerges from this testimony and other sources is one of extensive partnership activity across multiple CI sectors, but relatively few measures to systematically assess effectiveness of this activity in meeting CI resilience goals. Congress may explore the progress DHS has made in implementing GAO recommended data gathering and analysis initiatives. Availability of data and rigorous analyses may enable Congress to better ascertain the effectiveness of the partnership system in incentivizing industry information sharing and investments in risk reduction. CISA and its predecessor organizations have not been able to provide reliable data indicating the reach and effectiveness of public-partnership programs in incentivizing bidirectional information sharing and efficient private investments in national level (as opposed to enterprise level) resilience. (The volume and quality of industry information shared with DHS through the PCII program may be one of several useful indicators of program effectiveness.) Congress may address this gap, such as through introduction of appropriate reporting requirements. Congress may also consider enhancement of regulatory authorities of federal departments and agencies as appropriate to meet national CI resilience goals in cases where voluntary measures do not result in effective industry action to mitigate risk, or emergent threats make immediate action necessary. One recent example is the Foreign Investment Risk Review Modernization Act of 2018 (FIRRMA), which expands the jurisdiction of the Committee on Foreign Investment in the United States (CFIUS) to prevent foreign adversaries from exploiting the legitimate trade system to gain control of CI assets or related information. Likewise, Congress may exercise oversight in cases where regulatory authorities related to infrastructure security exist but are not exercised, as in the case of TSA described above. CISA plans to maintain the current sector specific public-private partnership structures as the preferred vehicle for information sharing and policy coordination. Congress may consider whether adjustment or replacement of these structures is needed to streamline and better align partnership efforts with the emerging federal risk management approach, which emphasizes inter-sectoral analysis and resilience rather than sector-specific asset identification and protection. Appendix A. National Critical Functions Appendix B. Key Terms Appendix C. Sector and Cross-Sector Coordinating Structures", "summary": "Protection of the nation's critical infrastructure (CI) against asymmetric physical or cyber threats emerged in the late 1990s as a policy concern, which was then further amplified by the 9/11 terrorist attacks. Congress created the Department of Homeland Security (DHS) in the wake of the attacks, and directed the new Department to identify, prioritize, and protect systems and assets critical to national security, the economy, and public health or safety. Identification of CI assets was, and remains, a complex and resource-intensive task. Many governmental and non-governmental stakeholders increasingly advocate for a fundamentally different approach to critical infrastructure security, maintaining that criticality is not a fixed characteristic of given infrastructure assets. Rather, they argue, criticality should be understood in the context of ensuring system-wide resilience of American government, society, and economic life against the full range of natural and manmade hazards. Congress further elevated resilience as a priority when it passed the Cybersecurity and Infrastructure Security Agency (CISA) Act into law in late 2018. As the name indicates, CISA was created to lead the national cybersecurity and infrastructure security effort as an operational component of DHS. In April 2019, leadership of the new agency identified a set of 56 National Critical Functions (NCF) (\" Appendix A : National Critical Functions\") which it plans to use as the basis of a resilience-based CI risk management approach. However, implementation will rely to a large degree on repurposed legacy programs. Thus, CI policy is currently at an inflection point that raises several potentially pressing issues for Congress: Scope of federal CI policy: The CI security enterprise has expanded significantly from its early focus on protecting systems and assets \"essential to the minimum operations of the economy and government\" against deliberate attack. Congress may consider narrowing the scope of CI policy. The legacy policy framework: National CI policy retains many legacy mandates and programs designed to support asset protection despite a long-term policy shift towards an all-hazards resilience framework. Congress may consider revising existing asset identification and reporting requirements statutorily linked to federal homeland security grant award processes. Validity of new risk management methods: Congress may assess the potential advantages and drawbacks of the resilience framework, and NCF as the basis for national-level infrastructure risk assessments and investment prioritization. In the past, Congress has called for external validation of DHS risk management methods and may wish to do so in the present case given its comparative novelty. Roles and responsibilities of federal agencies: The Homeland Security Act of 2002 created DHS and consolidated many of the federal government's CI security functions in a large-scale reorganization of government and its mission that is still ongoing. Congress may consider transfer of certain infrastructure security related functions to or from DHS as appropriate. Scope of regulation: Congress may consider legislating compulsory compliance with security standards in cases where voluntary private-sector measures are deemed insufficient to protect national security, the economy, and public health or safety. Appropriateness of existing public-private partnership structures: CISA plans to maintain the current sector specific public-private partnership structures as the preferred vehicle for information sharing and policy coordination. Congress may consider whether adjustment or replacement of these structures is needed to better align partnership efforts with the emerging federal emphasis on system-level resilience. Effectiveness of public-private partnerships: CISA and its predecessor organizations have not been able to provide reliable data indicating the reach and effectiveness of public-partnership programs in incentivizing efficient private investments in national level (as opposed to enterprise level) resilience. Congress may consider whether new or revised reporting requirements are necessary.", "document_type": "crs"}
{"report": "On October 7, 2019, after six months of formal negotiations, the United States and Japan signed two agreements intended to liberalize bilateral trade. One, the U.S.-Japan Trade Agreement (USJTA), provides for limited tariff reductions and quota expansions to improve market access. The other, the U.S.-Japan Digital Trade Agreement, includes commitments pertaining to digital aspects of international commerce, such as on data flows. These agreements constitute what President Donald Trump and Prime Minister Shinzo Abe envision as \"stage one\" of a broader trade liberalization negotiation, which the two leaders first announced in September 2018. The two sides have stated their intent to begin second stage negotiations on a more comprehensive deal after these agreements enter into force. Congress will not have a role in approving the two agreements. The Trump Administration intends to use delegated tariff proclamation authorities in Trade Promotion Authority (TPA) to enact the tariff changes and quota modifications, while the digital trade commitments, which would not require changes to U.S. law, are in the form of an Executive Agreement. Japan's Diet (the national legislature), however, had to ratify the pact, and did so on December 5, 2019, paving the way for entry into force on January 1, 2020. The two Japan deals raise a number of issues for Congress, including their limited coverage and staged approach, as compared to past U.S. free trade agreement (FTA) negotiations, the trade authorities used to bring them into effect in the United States, questions over their compliance with World Trade Organization (WTO) rules, and questions over how they compare with the trade agreement the United States previously negotiated with Japan in the former Trans-Pacific Partnership (TPP) and current TPP-11. Given the narrow scope of the agreements, particularly the USJTA tariff commitments, their commercial and strategic impact is likely to be determined by whether a more comprehensive bilateral agreement can be achieved. Many Members of Congress and other stakeholders support the agreements, but view the prospective second stage of trade talks as critical for U.S. interests. At the same time, some observers have raised questions about the potential coverage of issues in future talks and whether there will be sufficient political support in both countries to make progress, especially during an election year in the United States. In October 2018, in line with TPA requirements under the Bipartisan Congressional Trade Priorities and Accountability Act of 2015 ( P.L. 114-26 ; TPA-2015), the Administration provided Congress 90 days advance notification of its intent to begin negotiations. The Administration released its negotiating objectives, which included a number of issues beyond tariffs and digital trade, in December of the same year. The Trump Administration's interest in a trade agreement with Japan is closely tied to its decision to withdraw the United States from the TPP in 2017, and to pursue bilateral agreements, as opposed to the more regional approach taken under TPP. It also reflects the Administration's strategy of focusing on reaching agreements with major U.S. trade partners, especially those with which the United States runs a trade deficit (the U.S. goods trade deficit with Japan was $67.2 billion in 2018, the fourth-largest bilateral U.S. deficit). Although TPP included 10 countries in addition to the United States and Japan, the U.S.-Japan component of the agreement was the most economically consequential given existing U.S. trade agreements with 6 of the 10 other participants, and the relatively small economies of the remaining four (Brunei, Malaysia, New Zealand, and Vietnam). In these limited, stage one agreements with Japan, the Administration has attempted to address concerns raised by TPP proponents, especially agricultural groups, that the U.S. withdrawal placed U.S. exporters at a disadvantage in the Japanese market, in particular given Japan's recently enacted trade agreements with other trade partners. Following U.S. withdrawal from the TPP, Japan led efforts among the remaining 11 TPP countries to conclude the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP or TPP-11), which took effect in December 2018 for the first six signatories who ratified, including Japan, and for Vietnam in early 2019. The TPP-11 includes the comprehensive tariff liberalization commitments of TPP (near complete elimination among the parties), and the majority of TPP rules and disciplines on numerous trade-related issues, though the parties agreed to suspend a small number of nontariff commitments sought largely by the United States, following the U.S. withdrawal. Japan's FTA with the European Union (EU), which is to eventually remove nearly all tariffs and establish trade rules between the parties, went into effect in February 2019. It provides for elimination of the EU's 10% auto tariff, and elimination or reduction of most Japanese agricultural tariffs. Additional trade agreements involving Japan could take effect in coming years, compounding U.S. exporter concerns, including the possible 2020 conclusion of the Regional Comprehensive Economic Partnership (RCEP), which includes Japan, China, and 13 other Asian countries. Given Japan's commitment to TPP, Prime Minister Abe was initially hesitant to agree to bilateral U.S. trade negotiations, instead urging the Trump Administration to reconsider its withdrawal. Japan's decision to participate in bilateral talks came after President Trump raised the possibility, based on national security concerns, of imposing unilateral motor vehicle tariffs on Japan, an industry of national significance and accounting for one-third of U.S. goods imports from Japan (see \" Motor Vehicles and Threat of U.S. Section 232 Tariffs \"). The importance of the U.S.-Japan security relationship may also have factored into Japan's decisionmaking. Japan relies heavily on the United States for its military defense. The two countries' agreement on how to share the costs of the roughly 50,000 U.S. troops stationed in Japan is due to be renegotiated in 2020 as the current agreement expires at the end of March 2021. President Trump has called for Japan to significantly increase its contributions, perhaps by as much as fourfold. Japan, some analysts suggest, may see a bilateral trade agreement as way to reduce tension in the bilateral relationship, in light of other pressing security issues. Additionally, the Trump Administration may try to use the cost-sharing negotiations to extract concessions from Japan in proposed stage-two trade negotiations, or vice versa. As the United States' fourth-largest trading partner and the world's third-largest economy, Japan routinely features prominently in U.S. trade policy. In 2018, Japan accounted for 5% of total U.S. exports ($121 billion) and 6% of total U.S. imports ($179 billion). The United States is arguably even more important to Japan, representing its second-largest trading partner after China in 2018, and accounting for nearly 20% of Japan's goods exports. The two countries are also major investment partners, with Japanese foreign direct investment (FDI) in the United States valued at $484 billion in 2018 on a historical cost basis, largely in manufacturing, and U.S. FDI in Japan valued at $125 billion, concentrated in finance and insurance. Major areas of U.S. focus in the trade relationship include market access for U.S. agricultural goods, given Japan's relatively high tariffs in this sector, and the elimination of various nontariff barriers, such as in the motor vehicles and services sectors. Japan is an important market for U.S. farmers and ranchers, accounting for about 9% of total U.S. agricultural exports to all destinations since 2014. In 2018, Japan was the third-largest export market for the United States, after Canada and Mexico, with $12.9 billion in U.S. agricultural exportsâout of a total of $140 billionâshipped to Japan. Corn, beef, pork, soybeans, and wheat make up more than 60% of total U.S. agricultural exports to Japan ( Figure 1 ). With TPP-11 and the EU-Japan FTA entering into force in late 2018 and early 2019, exports from EU and TPP-11 member countries became more competitive for Japanese importers. U.S. agricultural exports to Japan meanwhile declined 7% ($8.3 billion) from January through August 2019, compared with the same period in 2018 ($9 billion). According to Japanese Customs data, notable product-specific declines during the first nine months of 2019, compared to the same period in 2018, include non-durum wheat (down 13%), pork (down 7%), and beef (down 4%). Over the same period, Japanese imports of these commodities from several EU and TPP-11 countries have increased. With the stage one U.S.-Japan agreement resulting in lower tariff rates on most U.S. agricultural products in the near term, it could improve the outlook for U.S. agricultural exporters. Motor vehicles and parts are the largest U.S. import category from Japan ($56.0 billion in 2018), while Japan imports few U.S.-made autos ($2.4 billion in 2018), despite having no auto tariffs ( Figure 2 ). U.S. industry argues the latter stems from nontariff barriers, including discriminatory regulatory treatment, while Japan argues that U.S. producers' inability to cater to the Japanese market is to blame. Although Japan buys few U.S. cars, Japanese-owned production facilities in the United States (valued at $51 billion in 2018) employ more than 170,000 workers, according to the Bureau of Economic Analysis (BEA). President Trump has repeatedly flagged the U.S. automotive trade deficit and noted that U.S. goals in broader trade talks include market access outcomes that will increase U.S. auto production and employment, but no provisions on motor vehicles were included in the stage one agreement. In May 2019, one year after the start of an investigation by the U.S. Department of Commerce under Section 232 of the Trade Expansion Act of 1962 (19 U.S.C. Â§1862), President Trump proclaimed motor vehicle and parts imports, particularly from Japan and the EU, a threat to U.S. national security. This determination asserted that the imports affect \"American-owned\" producers' global competitiveness and research and development on which U.S. military superiority depends. Under affirmative Section 232 determinations, the President is granted authority to impose import restrictions, including tariffs. Toyota and other Japanese-owned auto firms took particular issue with the President's emphasis on U.S. ownership in his determination, noting their significant U.S. investments in automotive manufacturing and research facilities. The President directed the U.S. Trade Representative (USTR) to negotiate with Japan (and the EU) to address this threat and report back within 180 days. Speaking immediately after the signing of the USJTA, USTR Lighthizer stated that in light of the new trade agreement, the Administration has no intent, \"at this point,\" to pursue additional Section 232 U.S. auto import restrictions. Japan also remains subject to Section 232 tariffs on U.S. steel and aluminum imports, which the Administration implemented in March 2018. Congress sets objectives for U.S. trade negotiations and establishes certain authorities to enact agreements that make progress toward achieving those objectives in Trade Promotion Authority (TPA) legislation under the Bipartisan Congressional Trade Priorities and Accountability Act of 2015 ( P.L. 114-26 ; TPA-2015). TPA allows for expedited consideration of implementing legislation to enact trade agreements covering tariff and nontariff barriers, provided the Administration meets certain notification and consultation requirements. It also provides the President, under Section 103(a) (19 U.S.C. Â§4202(a)), delegated authority to proclaim limited tariff reductions without further congressional action. The limits on Section 103(a) authority primarily relate to the amount and staging of the reduction in duty rates (see \" U.S. Tariff and Quota Commitments \"). Prior to the Trump Administration, the United States negotiated FTAs that removed virtually all tariffs between the parties and covered a broad range of trade-related rules and disciplines in one comprehensive negotiation. Nontariff issues often require implementing legislation by Congress to take effect, and Congress has typically considered implementing legislation for past U.S. FTAs under TPA's expedited procedures. The Trump Administration, however, plans to put the limited, stage one agreements with Japan into effect without congressional approval. The Administration intends to use delegated authorities pursuant to Section 103(a) of TPA to proclaim the tariff changes included in the USJTA, while the U.S.-Japan Digital Trade Agreement does not appear to require changes to U.S. law and is being treated as an Executive Agreement. Some observers and Members of Congress have questioned whether Section 103(a) authorizes the President to also establish rules of origin and modify import quotas, which are components of the U.S. market access tariff commitments in the USJTA. The language of Section 103(a) proclamation authority originated in the Reciprocal Trade Agreements Act of 1934, when tariff barriers were the primary focus of trade agreement negotiations. Similar language has been included in subsequent iterations of the TPA statue, including the current TPA-2015, which is effective through July 1, 2021. Past U.S. Administrations have invoked Section 103(a) and its past iterations to modify U.S. tariffs and implement agreements addressing tariff barriers. Most recently, in 2015 President Barack Obama invoked this authority to implement an agreement among members of the Asia-Pacific Economic Cooperation (APEC) forum to reduce duties on environmental goods. The two agreements included in the \"stage one\" U.S.-Japan trade deal cover tariff and quota commitments on industrial and agricultural goods and commitments on digital trade. The limited coverage and composition represents a significant departure from recent U.S. trade agreements, which typically are comprehensive and cover additional issues such as customs procedures, government procurement, labor and environment protections, intellectual property rights (IPR), services, and investment. Notably, neither agreement includes a formal dispute settlement mechanism to enforce commitments should either side take fault with the other's implementation. The Trump Administration points to Article 6 of the USJTA, which lays out a 60-day consultation process for resolving issues relating to \"the operation or interpretation\" of the agreement as a means to resolve disputes relating to tariffs and quota commitments. A future comprehensive deal could include a formal dispute settlement mechanism, but it is unclear how this would affect the initial agreements. The USJTA, which covers tariff and quota commitments, is four pages in length and includes eleven articles governing the operation of the agreement. Two separate annexes include the specific tariff reduction schedules for the United States and Japan. The annexes also include staging categories, which lay out the timeline for tariff reductions, and rules of origin, which specify the conditions under which imports are considered to originate from each country and therefore are eligible for the preferential tariff treatment. In total, the agreement is to reduce or eliminate tariffs on approximately $14.4 billion or 5% of bilateral trade ($7.2 billion each of U.S. imports and exports, Figure 3 ). The agreement also includes provisions providing for amendment and termination procedures (Article 8 and Article 10, respectively). While the Trump Administration has stated that the USJTA should \"enable American [agricultural] producers to compete more effectively with countries that currently have preferential tariffs in the Japanese market,\" the U.S.-Japan agreement is narrower in scope than either TPP-11 or the EU-Japan FTA. In particular, because of the legal authority under which the United States negotiated the USJTA, the agricultural provisions address only tariffs and quotas, while TPP-11 and the EU-Japan FTA also address many other policies that may interfere with trade in agricultural products. As a result, U.S. agricultural exporters may continue to be at some disadvantage in the Japanese market against those from the TPP-11 countries or the EU. Lack of legal text on non-market-access provisions, such as agricultural biotechnology, geographical indications, sanitary and phytosanitary measures, and technical barriers to trade (TBT) in the USJTA may limit the United States' ability to challenge potential future trade barriers in Japan (and vice versa) related to these issues, for example, if Japan were to align its requirements for agricultural imports more closely with those of the EU or of TPP-11 countries. The USJTA tariff schedule commits the United States to reduce or eliminate tariffs on 241 tariff lines that accounted for $7.2 billion of U.S. imports from Japan in 2018 (about 5% of total U.S. goods imports from Japan). Per requirements under TPA's tariff proclamation authorities, which as discussed, the Administration intends to use to implement the agreement, U.S. products slated for tariff elimination must have less than a 5% current U.S. most-favored nation (MFN) tariff rate. The authority allows for the Administration to reduce tariffs by 50% for products with current MFN tariff rates above 5%. According to the USJTA tariff schedule, the United States is to eliminate tariffs on 169 of covered U.S. tariff lines, while the remaining 72 are to be reduced to 50% of their current MFN rate. Unlike the former TPP, which committed the United States to eliminate tariffs on 99% of U.S. tariff lines, the USJTA agreement is to affect a relatively small share of U.S. imports from Japan, both because it covers fewer products and does not include autos and auto parts, the largest single U.S. import category. The U.S. tariff schedule of the USJTA states that auto and auto parts \"will be subject to further negotiations with respect to the elimination of customs duties.\" Under TPP, by contrast, the United States committed to eliminate its 2.5% car tariff over 25 years and its 25% light truck tariff over 30 years. Most of the U.S. products covered in the agreement are industrial goods. Select tariff lines from 30 different U.S. Harmonized Schedule (HS) chapters or categories are included. However, roughly half of the covered products, both in terms of the number of tariff lines and U.S. import value, are from three chapters: machinery (U.S. imports of $3.3 billion in 2018), electrical machinery ($771 million), and tools ($683 million). Other product categories include optical/medical equipment ($534 million), iron and steel articles ($305 million), rubber ($302 million), organic chemicals ($182 million), inorganic chemicals ($182 million), musical instruments ($133 million), copper and articles ($125 million), photographic and cinematographic goods ($118 million), railway ($105 million), and toys ($79 million). The top 10 tariff lines covered by the agreement accounted for $3 billion of U.S. imports in 2018 or 42% of all imports covered ( Table 1 ). U.S. tariffs on these 10 products are to be eliminated either upon entry into force (EIF) of the agreement or at the start of year two. The United States also agreed to reduce or eliminate tariffs on 42 agricultural tariff lines on imports from Japan, which include certain perennial plants and cut flowers, persimmons, green tea, chewing gum, certain confectionary products, and soy sauce. In a side letter, the United States agreed to modify its tariff-rate quota (TRQ) for imports of Japanese beef. TRQs involve a two-tiered tariff scheme in which imports within an established quota face lower tariff rates, and imports beyond the quota face higher tariff rates. The United States has agreed to eliminate the 200 metric tons (MT) country-specific beef quota for Japan and increase its quota for \"other countries or areas\" to 65,005 MT. This would enable Japan to ship additional amounts of beef to the United States at low tariff rates under the increased \"other countries or areas\" quota. Under the USJTA, Japan agreed to eliminate or reduce tariffs for certain U.S. agricultural products and to provide preferential quotas for other U.S. agricultural products. Japan's commitments cover approximately 600 tariff lines, accounting for $7.2 billion of U.S. exports in 2018, according to the USTR. Essentially, Japan is providing the same level of market access to the products included in the USJTA as provided to exports from countries that are members of TPP-11. Some products included in TPP-11 such as rice and certain dairy products, however, are not included in the USJTA. According to the USTR, once this agreement is implemented, over 90% of U.S. food and agricultural products exported to Japan will either enter duty-free or receive preferential tariff access. When TPP-11 went into effect in December 2018, Japan implemented its first set of tariff cuts and TRQ expansions for TPP-11 countries, and followed these with a second round of tariff cuts and TRQ expansions on April 1, 2019, the start of its new fiscal year. In the USJTA, Japan agreed to accelerate and adjust its TRQ expansion and tariff reduction schedule so that Japan's imports of affected U.S. agricultural products are to receive the same level of market access as imports from TPP-11 countries. This means that tariff rates under the USJTA are to fall slightly faster than those under the TPP-11. For example, under TPP-11, tariffs on beef imports into Japan, previously 38.5%, were reduced to 27.5% in Year 1, to 26.6% in Year 2, and are to reach 9% in Year 16. Under the USJTA, tariffs on Japanese imports of U.S. beef would be reduced to 26.6% in Year 1 and would reach 9% in Year 15. Japan is to reduce tariffs on meat products that collectively accounted for $2.9 billion of U.S. exports to Japan in 2018. Tariffs on processed beef products, including beef jerky and meat extracts, are to be eliminated in 5 to 15 years. Japan's right to raise tariffs if imports of U.S. beef exceed a specified level are to be restricted, and would be eliminated if the specified level is not exceeded for four consecutive fiscal years after Year 14. Tariffs on pork muscle cuts are to be eliminated over 9 years, and tariffs on processed pork products are to go to zero in Year 5. Certain fresh and frozen pork products would continue to be subject to Japan's variable levies when import prices are low, but the maximum variable rate is to be reduced by almost 90% by Year 9. As with beef, Japan's right to raise tariffs if imports of U.S. pork exceed a specified level is to be restricted. Japan is to gradually increase the amount of U.S. fresh, chilled, and frozen pork that could be imported annually without triggering additional tariffs, and such tariffs are to be terminated at the end of Year 10. Japan is to eliminate tariffs immediately upon entry into force of the agreement on selected products, including almonds, walnuts, blueberries, cranberries, sweet corn, grain sorghum, and broccoli, that collectively accounted for $1.3 billion of U.S. exports to Japan in 2018. Tariffs on corn used for feed, the largest U.S. agricultural export to Japan ($2.8 billion or 22% of total U.S. agricultural exports to Japan in 2018), are also to be eliminated upon entry into force of the agreement. Japan is to phase out tariffs in stages for products accounting for $3 billion of U.S. exports in 2018, such as cheeses, processed pork, poultry, beef offal, ethanol, wine, frozen potatoes, oranges, fresh cherries, egg products, and tomato paste. Japan agreed to provide country-specific quotas (CSQ) for some products, which provide access to a specified quantity of imports from the United States at a preferential tariff rate, generally zero. The CSQs would provide these products the same access into Japan as would have been accorded if the United States had joined the TPP-11. Products covered by CSQs include wheat, wheat products, malt, processed cheese, glucose, fructose, corn starch, potato starch and inulin. Additionally, Japan agreed to create a single whey CSQ for the United States that would begin at 5,400 MT and grow to 9,000 MT in Year 10. This CSQ combines the provisions of three separate CSQs for whey under the TPP provisions: whey used in infant formula (3,000 MT); whey mineral concentrate (4,000 MT); and whey permeate (2,000 MT). Japan agreed to improve access for U.S. skim milk powder by introducing an annual global (WTO) tender for 750 MT of skim milk powder, which would be accessible to the U.S. as well as other WTO-member exporters. This is viewed to represent a minor concession, given that the United States exported 713,000 MT of skim milk powder in 2018. Japan agreed to reduce the government-mandated mark-up on imported U.S. wheat and barley, which are controlled by state trading enterprises. Japan agreed to limit the use of safeguard measures to control surges in imports of U.S. whey, oranges, and race horses. According to the USTR, Japan has stated a commitment to \"match the [agricultural] tariffs\" provided to TPP-11 member countries in USJTA. While Japan's tariff schedule under the USJTA attempts to match the TPP-11 schedule, the TRQ schedule falls short of the TPP-11 schedule, potentially disadvantaging market access for some U.S. agricultural products. Under the TPP provisions, Japan had agreed to provide a rice CSQ for the United States, which was to start at 50,000 MT in Year 1 and reach 70,000 MT in Year 13. The U.S.-Japan Trade Agreement does not make provisions for a CSQ for U.S. rice, but Japan has made provisions for a CSQ for Australian rice under the TPP-11. TPP-11 additionally includes provisions for global TRQs for barley and barley products other than malt; butter; skim and other milk powder; cocoa products; evaporated and condensed milk; edible fats and oils; vegetable preparations; coffee, tea and other preparations; chocolate, candies and confectionary; and sugar. No corresponding TRQs are included in the U.S.-Japan agreement. Japan's simple average MFN tariff on all agricultural imports was 15.7% in 2018, although almost 22% of the Japanese agricultural tariff lines had MFN tariff rates greater than 15%. Many of the agricultural products subject to in-quota tariffs are subject to additional mark-ups through the state trading system, making the products more expensive to Japanese consumers. This may tend to suppress imports. For example, 29% of the amount of whey for infant formula that could have been imported under the TRQ was actually imported into Japan in 2017, and the corresponding fill rates for skim-milk powder ranged between 25% and 34%. Given that many TRQ quotas go unfilled and that over-quota tariff rates are extremely high, there is little trade beyond the set quota levels. Digital trade, a growing part of the U.S. and global economy, is an area in which the United States and Japan have had largely similar goals on addressing the lack of common trade rules and disciplines. Digital trade entails not only digital products and services delivered over the internet, but is also a means to facilitate economic activity and innovation, as companies across sectors increasingly rely on digital technologies to reach new markets, track global supply chains, and analyze big data. The USTR has referred to the U.S.-Japan Digital Trade Agreement, which parallels the proposed U.S.-Mexico-Canada Agreement (USMCA), as the \"most comprehensive and high-standard trade agreement\" negotiated on digital trade barriers. Provisions of the U.S.-Japan Digital Trade Agreement largely reflect the proposed USMCA, as well as related U.S. negotiating objectives that Congress established under TPA, suggesting the agreement is likely to serve as a template for future U.S. FTAs. The agreement has also been cast by the USTR as demonstrating the \"continued leading role\" of both nations in global rulemaking on digital trade. In this view, U.S.-Japan approaches on rules and standards could set precedents for other ongoing talks, including at the WTO on a potential e-commerce agreement, where conflicting approaches to digital and data issues by other participating members (such as China) have been raised as joint concerns. Key Provisions and Selected Comparisons Key commitments of the U.S.-Japan Digital Trade Agreement are highlighted below, with some comparisons to the latest U.S. and Japanese commitments in USMCA and TPP-11, respectively. In USMCA and TPP-11, given the crosscutting nature of digital trade and cross-border data flows, related provisions are covered in multiple FTA chapters beyond digital trade or e-commerce, including financial services, IPR, technical barriers to trade, and telecommunications. Like the USJTA, the U.S.-Japan Digital Trade Agreement includes provisions allowing for potential amendments and possible termination (Article 22). Customs duties and nondiscrimination . Commitments prohibit customs duties on products transmitted electronically and discrimination against digital products, including coverage of tax measures. Cross-border data flows and data localization . Commitments prohibit restrictions on cross-border data flows, except as necessary for \"legitimate public policy objectives.\" It also prohibits requirements for \"localization of computing facilities\" (i.e., data localization) as a condition for conducting business. Financial service providers are covered under the rules on data localization, as long as financial regulators have access to information for regulatory and supervisory purposes. This approach is distinct from Japan's commitments under TPP-11, which excludes financial services, but is similar to U.S. commitments under USMCA. Consumer protection and privacy . Commitments require parties to adopt or maintain online consumer protection laws, as well as a legal framework on privacy to protect personal information of users of digital trade. The content and enforcement of these laws are left to each government's discretion, while encouraging development of mechanisms to promote interoperability between different regimes. Unlike USMCA, there is no explicit reference to take into account guidelines of relevant international bodies' privacy frameworks, such as the Asia-Pacific Economic Cooperation (APEC) forum or the Organization for Economic Co-operation and Development (OECD). However, both the United States and Japan have endorsed and participate in the APEC Cross-Border Privacy Rules (CBPR) system. Source code and technology transfer . Commitments prohibit requiring the transfer or disclosure of software source code or algorithms expressed in source code as a condition for market access, with some exceptions. By comparison, under TPP-11 algorithms are not covered. Liability for interactive computer services . Commitments limit imposing civil liability with respect to third-party content for internet platforms that depend on interaction with users, with some exclusions such as for intellectual property rights infringement. This rule reflects provisions of the U.S. Communications Decency Act, which has raised concerns for some Members of Congress and civil society organizations about inclusion in U.S. FTAs, amid ongoing debate about the provisions' merits and possible revision to the law in the future. Cybersecurity . Commitments promote collaboration on cybersecurity and use of risk-based strategies and consensus-based standards over prescriptive regulation in dealing with cybersecurity risks and events. Open government data . Commitments promote publication of and access to government data in machine-readable and open format for public usage. Cryptography . Commitments prohibit requiring the transfer or access to proprietary information, including a particular technology or production process, by manufacturers or suppliers of information and communication technology (ICT) goods that use cryptography, as a condition for market access, with some exceptions, such as for networks and devices owned, controlled, or used by government. In general, the stage one agreements have been well received by several Members of Congress and U.S. stakeholders for the expected benefits to agriculture and cross-border digital trade. At the same time, many observers also contend the deals should not be a substitute for a comprehensive agreement and view the second stage of talks as critical to U.S. interests. The U.S. Trade Advisory Committee Report to the USTR and Congress reflects a range of views from among the various committees represented. The private sector Advisory Committee for Trade Policy and Negotiations (ACTPN) expressed support for the initial deals and the \"significant boost to the U.S. economy that will result from implementation,\" while urging immediate negotiation of a comprehensive agreement and recommending several priorities for the talks. The Intergovernmental Policy Advisory Committee (IGPAC), which is composed of representatives from state and local governments, however, argued that the agreement did not meet most negotiating objectives under TPA, due to its \"narrow nature.\" In the view of the Labor Advisory Committee, the deal is a \"lopsided agreement designed to address short-term political objectives.\" Various industry committees issued reports outlining priorities for future talks. Some cited what they viewed as the USTR's lack of consultation and the lack of dispute settlement provisions in the agreements as concerns. Overall, many observers agree that the USJTA is important for U.S. agriculture to regain competitiveness in the Japanese market. At the same time, some raise concerns about product exclusions and the lack of provisions on nontariff barriers that were generally covered in past U.S. FTAs. One trade policy expert cautioned against the tariff-only approach as a model for future U.S. agreements. Given this concern, U.S. businesses have strongly advocated for continued progress toward a more comprehensive agreement. Other stakeholders question whether there will be sufficient political support in both countries to make progress in future talks, especially during an election year in the United States. In particular, since the agriculture sectorâamong countries' most sensitive markets and thus typically relegated to final stage negotiationsâhas already secured access, some view the United States as having limited leverage to secure further concessions. Other trade experts view the agreement as failing to maximize the potential of the U.S.-Japan economic relationship, both in terms of the market access gains, which essentially had already been agreed to in TPP, but also in terms of advancing U.S.-Japan leadership on rulemaking. More broadly, some view successful next-stage talks as also being critical to \"engineer an American return to the regional economic architecture.\" Under this outlook, reaching a second-stage comprehensive agreement with Japan could help ease the perception among many East Asian policymakers and scholars that the Trump Administration's Indo-Pacific strategy has an insufficient economic component. While Prime Minister Abe framed the agreement as a \"win-win outcome\" that benefits both countries, some Japanese observers have criticized the agreement as a one-sided deal benefiting the political and economic interests of the United States. In particular, critics cite the lack of U.S. market access commitments in the auto sector in exchange for Japanese agricultural concessions, as well as the lack of concrete commitment by the United States not to impose Section 232 auto tariffs, despite verbal assurances from the Trump Administration. Instead, in a joint statement, both sides indirectly alluded to the issue, committing to \"refrain from taking measures against the spirit of these agreements â¦ and make efforts for an early solution to other tariff-related issues.\" An estimate by the Japanese government of the economic benefits of a bilateral trade deal assumes the removal of U.S. auto tariffsâan approach criticized by some members of the Japanese Diet, who remain skeptical of achieving this future concession. More broadly, some analysts point to Japan conceding to bilateral talks as dimming any prospect for a possible U.S. return to TPP, a long-held Japanese goal. In others' view, the deal was favorable to Japan in achieving the primary goals of avoiding potential auto tariffs and sealing an expeditious conclusion of an agreement limited to goodsâPrime Minister Abe's initial characterization of the deal. Further, while Japan made concessions in agriculture, they remain limited to commitments in past Japanese trade agreements (TPP-minus in some cases). Japanese industry broadly welcomes the agreement, in particular the sectors that gain from reduced U.S. tariffs, but like U.S. industry, urge further progress. Japan ratified the agreements on December 5, 2019, while the Trump Administration previously signed an executive agreement on the digital trade commitments, and is expected to issue a proclamation implementing the agreed tariff changes in December, paving the way for entry into force in January 2020. In its notification to Congress of the U.S. intent to enter into the agreements, the Administration stated that it \"looks forward to continued collaboration with Congress on further negotiations with Japan to achieve a more comprehensive trade agreement.\" The Administration did not specify a timeline, however. The United States and Japan stated their intent to \"conclude consultations within four months after the date of entry into force of the United States-Japan Trade Agreement and enter into negotiations thereafter in the areas of customs duties and other restrictions on trade, barriers to trade in services and investment, and other issues in order to promote mutually beneficial, fair, and reciprocal trade.\" While USTR trade negotiating objectives released at the outset of the talks in December 2018 suggested a broad range of issues beyond tariffs and digital trade are to be covered, it remains unclear what specific issues would be the subject of the next-stage talks. The stage one agreements with Japan on agriculture, industrial goods, and digital trade, as well as the approach the Trump Administration has taken to negotiate them represent a significant shift in U.S. trade agreement policy. Given its constitutional authority to regulate foreign commerce, Congress may reflect on whether this shift aligns with congressional objectives. Congress may also consider the impact of the agreements on the U.S. economy, including the implications of completing (or not completing) a broader second-stage deal with Japan, and how a staged approach affects the countries' ability to achieve additional agreements. The Administration's plan to implement the stage one U.S.-Japan agreements without the approval of Congress, an unprecedented move for U.S. FTA negotiations, has prompted debate among some Members over the appropriate congressional role. In a November 26, 2019, letter to the USTR some Members sought clarification from the Administration regarding its intent to implement the agreements and how Section 103(a) trade authorities under TPA allow the Administration to enter into a tariff agreement with Japan. Some analysts and Members cite uncertainties as to whether the delegated authorities also permit implementation of changes in rules of origin and quota modifications under the agreements. Some Members further suggest that future debate over potential reauthorization of TPA should consider congressional intent behind these delegated tariff authorities. At the same time, other Members have indicated that they would not object to the Administration's plan to implement the agreements with Japan without congressional approval. On procedure, questions have been raised by some as to whether the Administration has fulfilled the consultation requirements of TPA throughout the negotiationsâSection 103(a) includes fewer requirements with respect to tariff-only agreements. The digital trade commitments do not appear to require changes to U.S. law, but the inclusion of certain provisions has prompted some congressional debate. In the case of past U.S. FTAs, such debate would typically play out during congressional debate and formal consideration of legislation to implement the respective agreement under TPA. Key questions for Congress may include What role should Congress play in limited trade agreements, given the authorities and requirements established in TPA? Should Congress consider changes to delegated authorities in future consideration of potential TPA reauthorization? Congress set negotiating objectives for U.S. trade agreements in statute in its 2015 grant of TPA (19 U.S.C. Â§3802). Based on these guidelines and as required by TPA, the Trump Administration laid out 22 specific areas of focus for its bilateral negotiations with Japan. The stage one U.S.-Japan trade agreements, however, include provisions related to two of these areas: a limited reduction of tariffs on trade in goods and digital trade. The Administration has stated its intent to address the remaining issues in future negotiations, but its ability to conclude and implement such negotiations depend on the political landscape and will in both countries, making a second-phase deal an uncertain prospect. While the U.S. trade advisory committees generally support the initial-stage agreements, some, such as the services sector advisory committee, also argue that the two-stage or perhaps a multi-stage approach could make it more challenging for the United States to achieve the strongest possible overall outcomes in certain sectors. The staged approach also raises questions over the potential economic impact of the agreement. Due to the Administration's intended use of Section 103(a) proclamation authorities to enact the agreed tariff changes with Japan, an economic assessment by the U.S. International Trade Commission (USITC) will not be required for this stage one deal. The agreement may have a modest overall effect on the U.S. economy, given that it covers a small share of bilateral trade, but it could be significant for the U.S. agricultural exporters that will enjoy improved access to Japan's highly protected market. Key questions for Congress may include How do these stage one agreements with Japan affect the ability of the United States to negotiate a more comprehensive agreement in the future? Do staged trade negotiations adhere to Congress's negotiating objectives in TPA, and should Congress support this staged approach in future U.S. trade negotiations? Congress delegated authority to the President to enact tariffs under Section 232 specifically to address possible threats to U.S. national security. President Trump, however, has stated that his use of tariff authorities have been a critical tool in getting U.S. trade partners to the negotiating table, and Japan's Foreign Minister, Toshimitsu Motegi, who negotiated the phase-one deal for Japan, highlighted the importance of avoiding Section 232 auto tariffs as a key outcome of the U.S.-Japan negotiations. The Administration has yet to publish the Commerce Department's report outlining the national security threat posed by auto imports, despite direct requests from Congress and legal requirement to do so. Some trade analysts caution that U.S. use or threat of trade barriers as negotiating leverage undermines existing global trade rules and could set a precedent used by other countries against the United States in the future. Many Members of Congress have questioned the security rationale behind the President's proposed and implemented tariff actions, and some support legislation revising Section 232 authorities. Key questions for Congress may include Does the use of Section 232 tariff authorities as leverage in broader trade and tariff negotiations represent an appropriate use of the delegated authorities? What are the potential long-term implications to U.S. and global trade policy of using the threat of tariff increases as leverage in trade liberalization negotiations? The limited scope of the USJTA commitments (in particular, the exclusion of auto trade), has led several analysts and some Members of Congress to question the extent to which the agreement adheres to Article XXIV of the General Agreement on Tariffs and Trade (GATT) under the WTO. This provision requires regional trade agreements outside the WTO to eliminate duties and other restrictive regulations of commerce on \"substantially all trade\" between the parties. As discussed, U.S. market access commitments in the initial deal cover a limited share of U.S. goods imports from Japan. Congress has historically taken issue with other countries' partial scope agreements, advocating for better adherence to Article XXIV, including within TPA and other trade statutes. Some analysts suggest this concern could be mitigated if the stage one U.S.-Japan agreement were to qualify as an \"interim agreement\" under Article XXIV; but these agreements must include a \"plan and schedule\" for the formation of the free trade area within a \"reasonable length of time.\" In practice, however, WTO members have rarely challenged other trading partners' agreements for consistency with these requirements under formal dispute settlement proceedings. Whether or not the agreement ultimately is inconsistent with the letter or spirit of WTO rules likely depends on the timeline and scope of the next-stage U.S.-Japan talks, which both sides have indicated aim to be comprehensive in scope. Key questions for Congress may include Are the stage one agreements consistent with U.S. obligations under the WTO? Does the limited scope of the agreements set precedents for other countries to negotiate other partial trade agreements that liberalize trade on a limited set of products or sectors that could potentially discriminate against the United States, as well as potentially undermine respect and adherence to the letter and spirit of WTO rules? The Trump Administration's bilateral trade agreement negotiations with Japan represent an alternative to the U.S.-Japan trade agreement negotiated as part of TPP. Given the Trump Administration's decision to conclude a limited, stage one agreement, the most significant distinction with TPP (and TPP-11) at this point is that TPP covered a much broader range of commitments. For example, USJTA commits the countries to reduce or eliminate tariffs on small share of each country's overall tariff lines, whereas TPP committed both countries to eliminate tariffs on all but a limited number of agricultural products. In addition, this phase-one agreement with Japan includes one nontariff issue, digital trade, whereas TPP covered issues such as rules on technical barriers to trade, sanitary and phytosanitary measures, state-owned enterprises, labor and environmental standards, investment and intellectual property rights protections, and market access for services, among others. As discussed, whether the Administration will include such commitments in future negotiations with Japanâand in what formâremains to be seen. The Trump Administration's bilateral approach to negotiations with Japan also differs from the Obama Administration's and the George W. Bush Administration's multiparty approach to TPP, which may be tied to differing strategic priorities by the Administrations. For example, the Obama Administration saw the TPP as the economic component of its rebalance to Asia and a vehicle to establish rules that reflect U.S. interests and values as the regional framework for commerce, rather than allowing other countries, such as China, to set regional norms. The broad membership of TPP, arguably, was an important component of this strategy, creating an opportunity to harmonize rules across multiple trading partners, and creating a greater likelihood of attracting additional future participants. The Trump Administration, alternatively, has prioritized achieving fair and reciprocal trade, both in its objectives for the U.S.-Japan trade agreement and its broader Indo-Pacific strategy. The Administration argues that a bilateral approach to negotiations allows the United States to take full advantage of its economic heft to secure the most advantageous terms and allows for better enforceability. Key questions for Congress may include How has the U.S. withdrawal from TPP affected U.S. economic and strategic interests in Japan and the Asia-Pacific region and what is the best approach to advancing those interests moving forward in the next stage of talks with Japan? What are the costs and benefits of bilateral versus regional or multiparty approaches to U.S. trade agreement negotiations? Should the United States consider joining TPP-11?", "summary": "On October 7, 2019, after six months of formal negotiations, the United States and Japan signed two agreements intended to liberalize bilateral trade. One, the U.S.-Japan Trade Agreement (USJTA), provides for limited tariff reductions and quota expansions to improve market access. The other, the U.S.-Japan Digital Trade Agreement, includes commitments pertaining to digital aspects of international commerce, such as cross-border data flows. These agreements constitute what the Trump and Abe Administrations envision as \"stage one\" of a broader trade liberalization negotiation, which the two leaders first announced in September 2018. The two sides have stated their intent to continue negotiations on a more comprehensive deal after these agreements enter into force. Congress has an interest in U.S.-Japan trade agreement negotiations given congressional authority to regulate foreign commerce and the agreements' potential effects on the U.S. economy and constituents. USJTA is to reduce or eliminate tariffs on agriculture and some industrial goods, covering approximately $14.4 billion ($7.2 billion each of U.S. imports and exports) or 5% of bilateral trade. The United States is to reduce or eliminate tariffs on a small number (241) of mostly industrial goods, while Japan is to reduce or eliminate tariffs on roughly 600 agricultural tariff lines and expand preferential tariff-rate quotas for a limited number of U.S. products. The United States framed the digital trade commitments as \"gold standard,\" with commitments on nondiscriminatory treatment of digital products, and prohibition of data localization barriers and restrictions on cross-border data flows, among other provisions. The stage one agreement excludes most other goods from tariff liberalization and does not cover market access for services, rules beyond digital trade, or nontariff barriers. Notably, the agreement does not cover trade in autos, an industry accounting for one-third of U.S. imports from Japan. Japan's decision to participate in bilateral talks came after President Donald Trump threatened to impose additional auto tariffs on Japan, based on national security concerns. Prior to the Trump Administration, the United States negotiated free trade agreements (FTAs) that removed virtually all tariffs between the parties and covered a broad range of trade-related rules and disciplines in one comprehensive negotiation, driven in significant part by congressionally mandated U.S. negotiating objectives. Nontariff issues often require implementing legislation by Congress to take effect, and Congress has typically considered implementing legislation for past U.S. FTAs through expedited procedures under Trade Promotion Authority (TPA). The Trump Administration, however, plans to put the stage one agreements with Japan into effect without action by Congress. The Administration plans to use delegated tariff authorities in TPA to proclaim the USJTA market access provisions, while the U.S.-Japan Digital Trade Agreement does not appear to require changes to U.S. law and is being treated as an Executive Agreement. Japan's Diet (the national legislature) ratified the pact in December 2019. The Administration expects the agreements to take effect in early 2020, with negotiations on the second stage of commitments to begin within four months. The Trump Administration's interest in bilateral trade negotiations is tied to its withdrawal from the Trans-Pacific Partnership (TPP) agreement in 2017, which included the United States and Japan, along with 10 other Asia-Pacific countries. In general, TPP was far more comprehensive than the stage one U.S.-Japan agreements, as it would have eliminated most tariffs among the parties and created rules and disciplines on a number of trade-related issues, such as intellectual property rights and services. Japan's FTAs with other countries, including the TPP-11, which entered into force among the remaining TPP members in 2018, and an FTA with the European Union (EU), which took effect in 2019, have led to growing concerns among U.S. industry and many in Congress that U.S. exporters face certain disadvantages in the Japanese market. The USJTA will largely place U.S. agricultural exporters on par with Japan's other FTA partners with regard to tariffs, but unlike the TPP and its successor, the agreement excludes some agricultural products, such as rice and barley. It also does not include rules, such as on technical barriers to trade (TBT) and sanitary and phytosanitary measures, and therefore will not address various nontariff barriers U.S. agriculture and other industries face in Japan. Thus, U.S. agricultural exporters may continue to be at some disadvantage in the Japanese market compared to those from TPP countries or the EU. In general, Congress and U.S. stakeholders support the agreements due to the expected benefits to U.S. agriculture and cross-border digital trade. At the same time, the overall economic effects of the agreement are likely to be modest due to the limited scope of the agreement. Many observers contend the deal should not be a substitute for a comprehensive trade agreement and view the second stage of talks as critical to U.S. interests. If more comprehensive negotiations begin in 2020, they may become intertwined with other bilateral issues, such as concerns among many Japanese officials that the United States has a waning interest in maintaining its current influence in East Asia, and upcoming negotiations over the renewal of the U.S.-Japan agreement on how to share the costs of basing U.S. military troops in Japan. Some Members of Congress have also raised questions over whether the staged approach to the U.S.-Japan negotiations is in the best interest of the United States, and what it may mean for future U.S. trade agreement negotiations. There are also questions about whether the agreements adhere to multilateral trade rules under the World Trade Organization (WTO), given their limited scope, and whether the Administration has adequately consulted with Congress in its negotiation and implementation of the new agreements.", "document_type": "crs"}
{"report": "In 2018, approximately 38.1 million people, or 11.8% of the population, had incomes below the official definition of poverty in the United States. The poverty rate (the percentage that were in poverty) fell from 12.3% in 2017, while the number of persons in poverty declined from 39.6 million. In this report, the numbers and percentages of those in poverty are based on the Census Bureau's estimates. While this official measure is often regarded as a statistical yardstick rather than a complete description of what people and families need to live, it does offer a measure of economic hardship faced by the low-income population: the poverty measure compares family income against a dollar amount called a poverty threshold , a level below which the family is considered to be poor. The Census Bureau releases these poverty estimates every September for the prior calendar year. Most of the comparisons discussed in this report are year-to-year comparisons. This report only considers a number or percentage to have changed from the previous year, or to be different from another number or percentage, if the difference has been tested to be statistically significant at the 90% confidence level. However, in addition to the most recent year's data, this report presents a historical perspective as well as information on poverty for demographic groups (by family structure, age, race and Hispanic origin, and work status) and by state. Over the past several decades, criticisms of the official poverty measure have led to the development of an alternative research measure called the Supplemental Poverty Measure (SPM), which the Census Bureau also computes and releases. Statistics comparing the official measure with the SPM are provided at the conclusion of this brief. The SPM includes the effects of taxes and in-kind benefits (such as housing, energy, and food assistance) on poverty, while the official measure does not. Because some types of tax credits are used to assist the poor, as are other forms of assistance, the SPM may be of interest to policymakers. However, the official measure provides a comparison of the poor population over a longer time period, including some years before many current antipoverty assistance programs had been developed. In developing poverty-related legislation and conducting oversight on programs that aid the low-income population, policymakers may be interested in these historical trends. The Census Bureau determines a person's poverty status by comparing his or her resources against a measure of need. For the official measure, resources is defined as total family income before taxes, and the measure of \"need\" is a dollar amount called a poverty threshold. There are 48 poverty thresholds that vary by family size and composition. If a person lives with other people to whom he or she is related by birth, marriage, or adoption, the money income from all family members is used to determine his or her poverty status. If a person does not live with any family members, his or her own income is used. Only money income before taxes is used in calculating the official poverty measure, meaning this measure does not treat in-kind benefits such as the Supplemental Nutritional Assistance Program (SNAP, formerly known as food stamps), housing subsidies, or employer-provided benefits as income. The poverty threshold dollar amounts vary by the size of the family (from one person not living in a family, to nine or more family members living together) and the ages of the family members (how many of the members are children under 18 and whether or not the family head is 65 years of age or older). Collectively, these poverty thresholds are often referred to as the poverty line . As a rough guide, the poverty line in 2018 can be thought of as $25,701 for a family of four, $19,985 for a family of three, $16,247 for a family of two, or $12,784 for an individual not living in a family, though the official measure is actually much more detailed. The threshold dollar amounts are updated annually for inflation using the Consumer Price Index. Notably, the same thresholds are applied throughout the country: no adjustment is made for geographic variations in living expenses. The official poverty measure used in this report is the federal government's definition of poverty for statistical purposes, such as comparing the number or percentage of people in poverty over time. A related definition of poverty, the poverty guidelines published by the Department of Health and Human Services (HHS), is used for administrative purposes such as eligibility criteria for assistance programs and will not be discussed in this report. Figure 1 shows a historical perspective of the number and percentage of the population below the poverty line. The number in poverty and the poverty rates are shown from the earliest year available (1959), through the most recent year available (2018). Because the total U.S. population has grown over time, poverty rates are useful for historical comparisons because they control for population growth. Poverty rates fell through the 1960s. Since then, they have generally risen and fallen according to the economic cycle, though during the most recent two expansions poverty rates did not fall measurably until four to six years into the expansion. Historically notable lows occurred in 1973 (11.1%) and 2000 (11.3) . Poverty rate peaks occurred in 1983 (15.2%), 1993 (15.1%), and 2010 (15.1%). Poverty rates tend to rise during and after recessions, as opposed to leading economic indicators such as new housing construction, whose changes often precede changes in the performance of the overall economy. The poverty rate's lag is explainable in part by the way it is measured: it uses income from the entire calendar year. Notably, the poverty rate in 2018 registered a fourth consecutive annual decrease since the most recent recession, though it remained higher than the rate in 2000, the most recent low point. The drop in the U.S. poverty rate (from 12.3% in 2017 to 11.8% in 2018) affected some demographic groups more than others, notably people in female-householder families, children and the population aged 18 to 64, and the non-Hispanic white population. Details for selected demographic groups are described below. Because poverty status is determined at the family level by comparing resources against a measure of need, vulnerability to poverty may differ among families of different compositions. In this section, poverty data by family structure are presented using the official poverty measure, with \"families\" defined as persons related by birth, marriage, or adoption to the householder (the person in whose name the home is owned or rented). In the \" Supplemental Poverty Measure \" section of this report, a different definition will be used. Families with a female householder and no spouse present (female-householder families) have historically had higher poverty rates than both married-couple families and families with a male householder and no spouse present (male-householder families). This remained true in 2018: female-householder families experienced a poverty rate of 24.9%, compared with 4.7% for married-couple families and 12.7% for male-householder families. Unlike the other two family types, however, female-householder families experienced a decline in their poverty rate of 1.3%. Their 2018 rate of 24.9%, down from 26.2% in 2017, appeared to be among the lowest poverty rates for female-householder families on record. Among individuals not living in families, the poverty rate was 20.2% in 2018, not distinguishable from the previous year. When examining poverty by age, three main groups are noteworthy for distinct reasons: under 18, 18 to 64, and 65 and older. People under age 18 are typically dependent on other family members for income, particularly young children below their state's legal working age. People aged 18 to 64 are generally thought of as the working-age population and typically have wages and salaries as their greatest source of income. People age 65 and older, referred to as the aged population, are often eligible for retirement, and those who do retire typically experience a change in their primary source of income. Children and the working-age population experienced decreases in poverty. Among children, 11.9 million, or 16.2%, were poor, down from 12.8 million or 17.4% in 2017. Among the working-age population, 21.1 million, or 10.7%, were in poverty, down from 21.9 million or 11.1% in 2017. The aged population did not register any significant changes in its number in poverty or its poverty rate from 2017 to 2018: 5.1 million, or 9.7%, were poor. From a historical standpoint, the poverty rate for those age 65 and over used to be the highest of the three groups. In 1966, people age 65 and over had a poverty rate of 28.5%, compared with 17.6% for those under 18 and 10.5% for working-age adults. By 1974, the poverty rate for people age 65 and over had fallen to 14.6%, compared with 15.4% for people under 18 and 8.3% for working-age adults. Since then, people under 18 have had the highest poverty rate of the three age groups, as shown in Figure 3 . Poverty rates vary by race and Hispanic origin, as shown in Figure 4 . In surveys, Hispanic origin is asked separately from race; accordingly, people identifying as Hispanic may be of any race. The poverty rate fell for non-Hispanic whites (from 8.5% in 2017 to 8.1% in 2018). Among blacks (20.8%), Asians (10.1%), and Hispanics (17.6%), the poverty rate did not register any statistically significant change from 2017. While having a job reduced the likelihood of being in poverty, it did not guarantee that a person or his or her family would avoid poverty. Among the 18 to 64-year-old population living in poverty, 77.2% had jobs in 2018. Poverty rates among workers in this age group were 5.1% for all workers, 2.3% for full-time year-round workers, and 12.7% for part-time or part-year workers, none of which were measurably changed from the previous year. Similarly, no significant change was detected among those who did not work at least one week in 2018 (29.7% were poor). Because poverty is a family-based measure, the change in one member's work status can affect the poverty status of his or her entire family. Among all 18 to 64-year-olds who did not have jobs in 2018, 58.9% lived in families in which someone else did have a job. Among poor 18 to 64-year-olds without jobs, 18.5% lived in families where someone else worked. Poverty is not equally prevalent in all parts of the country. The map in Figure 5 shows states with relatively high poverty rates across parts of the Appalachians, the Deep South, and the Southwest, with the poverty rate in Mississippi (19.7%) among the highest in the nation, not statistically different from the rate in New Mexico (19.5%). The poverty rate in New Hampshire (7.6%) was lowest. When comparing poverty rates geographically, it is important to remember that the official poverty thresholds are not adjusted for geographic variations in the cost of livingâthe same thresholds are used nationwide. As such, an area with a lower cost of living accompanied by lower wages will appear to have a higher poverty rate than an area with a higher cost of living and higher wages, even if individuals' purchasing power were exactly the same in both areas. Puerto Rico and 14 states experienced poverty rate declines from 2017 to 2018: one in the Midwest (Illinois), three in the Northeast (Massachusetts, New Jersey, and New York); five in the South (Florida, Georgia, Louisiana, North Carolina, and West Virginia); and five in the West (Arizona, California, Colorado, Oregon, and Washington). Connecticut was the only state to experience an increase, and 35 states, as well as the District of Columbia, did not register a statistically significant change. Criticisms of the official measure have led to the development of the Supplemental Poverty Measure (SPM). Described below are the development of the official measure, its limitations, attempts to remedy those limitations, the research efforts that eventually led to the SPM's first release in November 2011, and a comparison of poverty rates in 2018 based on the SPM and the official measure. The poverty thresholds were originally developed in the early 1960s by Mollie Orshansky of the Social Security Administration. Rather than attempt to compute a family budget by using prices for all essential items that low-income families need to live, Orshansky focused on food costs. Unlike other goods and services such as housing or transportation, which did not have a generally agreed-upon level of adequacy, minimum standards for nutrition were known and widely accepted. According to a 1955 U.S. Department of Agriculture (USDA) food consumption survey, the average amount of their income that families spent on food was roughly one-third. Therefore, using the cost of a minimum food budget and multiplying that figure by three yielded a figure for total family income. That computation was possible because USDA had already published recommended food budgets as a way to address the nutritional needs of families experiencing economic stress. Some additional adjustments were made to derive poverty thresholds for two-person families and individuals not living in families to reflect the relatively higher fixed costs of smaller households. While the official poverty measure has been used for over 50 years as the source of official statistics on poverty in the United States, it has received criticism over the years for several reasons. First, it does not take into account benefits from most of the largest programs that aid the low-income population. For instance, it uses money income before taxesâmeaning that it does not necessarily measure the income available for individuals to spend, which for most people is after-tax income. Therefore, any effects of tax credits designed to assist persons with low income are not captured by the official measure. The focus on money income also does not account for in-kind benefit programs designed to help the poor, such as SNAP or housing assistance. The official measure has also been criticized for the way it characterizes families' and individuals' needs in the poverty thresholds. That is, the method used to compute the dollar amounts used in the thresholds, which were originally based on food expenditures in the 1950s and food costs in the 1960s, does not accurately reflect current needs and available goods and services. Moreover, the official measure does not take account of the sharing of expenses and income among household members not related by birth, marriage, or adoption. And, as mentioned earlier, the official thresholds do not take account of geographic variations in the cost of living. In 1995, a panel from the National Academy of Sciences issued a report, Measuring Poverty: A New Approach, which recommended improvements to the poverty measure. Among the suggested improvements were to have the poverty thresholds reflect the costs of food, clothing, shelter, utilities, and a little bit extra to allow for miscellaneous needs; to broaden the definition of \"family;\" to include geographic adjustments as part of the measure's computation; to include the out-of-pocket costs of medical expenses in the measure's computation; and to subtract work-related expenses from income. An overarching goal of the recommendations was to make the poverty measure more closely aligned with the real-life needs and available resources of the low-income population, as well as the changes that have taken place over time in their circumstances, owing to changes in the nation's economy, society, and public policies (see Table 1 ). After over a decade and a half of research to implement and refine the methodology suggested by the panel, conducted both from within the Census Bureau as well as from other federal agencies and the academic community, the Census Bureau issued the first report using the Supplemental Poverty Measure (SPM) in November 2011. Compared with the official measure, the SPM takes into account greater detail of individuals' and families' living arrangements and provides a more up-to-date accounting of the costs and resources available to them. Because the SPM recognizes greater detail in relationships among household members and geographically adjusts housing costs, it provides an updated rendering, compared with the official measure, of the circumstances in which the poor live. In that context, some point out that the SPM's measurement of taxes, transfers, and expenses may offer policymakers a clearer view of how government policies affect the poor population today. However, the SPM was developed as a research measure, and the Office of Management and Budget set the expectation that it would be revised periodically to incorporate improved measurement methods and newer sources of data as they became available; it was not developed for administrative purposes. Conversely, the official measure's consistency over a longer time span makes it easier for policymakers and researchers to make historical comparisons. Under the SPM, the profile of the poverty population is slightly different than under the official measure. The SPM was 1 percentage point higher in 2018 than the official poverty rate (12.8% compared with 11.8%; see Figure 6 ). More people aged 18 to 64 are in poverty under the SPM (12.2% compared with 10.7% under the 2018 official measure), as are people age 65 and over (13.6%, compared with 9.7% under the official measure). The poverty rate for people under age 18 was lower under the SPM (13.7% in 2018) than under the official measure (16.2%, with foster children included). Again, the SPM uses a different definition of resources than the official measure: the SPM includes in-kind benefits which generally help families with children; subtracts out work-related expenses, which are often incurred by the working-age population; and subtracts medical out-of-pocket expenses, which are incurred frequently by people age 65 and older. With the geographically adjusted thresholds, the poverty rate in 2018 was lower under the SPM than under the official measure for the Midwest (9.2% compared with 10.4%), while it was higher than the official measure for the Northeast (12.2% compared with 10.3%), the West (14.4% compared with 11.2%), and the South (13.9% compared with 13.6%).", "summary": "In 2018, approximately 38.1 million people, or 11.8% of the population, had incomes below the official definition of poverty in the United States. Poverty statistics provide a measure of economic hardship. The official definition of poverty for the United States uses dollar amounts called poverty thresholds that vary by family size and the members' ages. Families with incomes below their respective thresholds are considered to be in poverty. The poverty rate (the percentage that was in poverty) fell from 12.3% in 2017. This was the fourth consecutive year since the most recent recession that the poverty rate has fallen. The poverty rate for female-householder families in 2018 (24.9%, down 1.3 percentage points from the previous year) was higher than that for male-householder families (12.7%) or married-couple families (4.7%), neither of which registered a decline from 2017. Of the three age groupsâchildren under 18, the working-age population, and those age 65 and olderâthe 65-and-older population used to have the highest poverty rates, but now has the lowest: 28.5% of the aged population was poor in 1966, but 9.7% was poor in 2018. People under 18, in contrast, had the highest poverty rate of the three age groups: 16.2% of this population was poor in 2018. From 2017 to 2018, poverty rates fell among children (from 17.4% to 16.2%) and the working-age population (from 11.1% to 10.7%), but not among the aged population (9.7% in 2018). Poverty was not equally prevalent in all parts of the country. The poverty rate for Mississippi (19.7%) appeared highest but was in a statistical tie with New Mexico (19.5%). New Hampshire's poverty rate (7.6%) was lowest in 2018. Criticisms of the official poverty measure have inspired poverty measurement research and eventually led to the development of the Supplemental Poverty Measure (SPM). The SPM uses different definitions of needs and resources than the official measure. The SPM includes the effects of taxes and in-kind benefits (such as housing, energy, and food assistance) on poverty, while the official measure does not. Because some types of tax credits are used to assist the poor (as are other forms of assistance), the SPM may be of interest to policymakers. The poverty rate under the SPM (12.8%) was about 1 percentage point higher in 2018 than the official poverty rate (11.8%). Under the SPM, the profile of the poverty population is slightly different than under the official measure. Compared with the official measure, poverty rates under the SPM were lower for children (13.7% compared with 16.2%) and higher for working-age adults (12.2% compared with 10.7%) and the 65-and-older population (13.6% compared with 9.7%). While the SPM reflects more current measurement methods, the official measure provides a comparison of the poor population over a longer time period, including some years before many current antipoverty assistance programs had been developed. In developing poverty-related legislation and conducting oversight on programs that aid the low-income population, policymakers may be interested in these historical trends.", "document_type": "crs"}
{"report": "T he September 11 th Victim Compensation Fund (VCF) provides cash benefits to certain persons whose health may have been affected by the aftermath of the September 11, 2001 terrorist attacks on the Pentagon, the World Trade Center, and the terrorist-related aircraft crash at Shanksville, PA. The VCF was most recently reauthorized on July 29, 2019, with the enactment of the Never Forget the Heroes: James Zadroga, Ray Pfeifer, and Luis Alvarez Permanent Authorization of the September 11 th Victim Compensation Fund Act ( P.L. 116-34 ). All VCF claims must be filed by October 1, 2090. There is no cap on total benefits that may be paid. This report provides an overview of the VCF, including its history, current law, and appropriations. It also provides an Appendix of current VCF program statistics. On September 22, 2001, the Air Transportation Safety and System Stabilization Act (ATSSA; P.L. 107-42 ) was enacted into law. Quickly passed by Congress in the wake of the September 11, 2001 terrorist attacks, this legislation provided various forms of relief to the American airline industry and affirmed Congress's commitment to improving airline safety. Title IV of the ATSSA also established the VCF to compensate persons injured or the representatives of persons killed in the attacks or their immediate aftermath. The VCF originally closed in 2003 but was reopened and expanded in 2011 to provide compensation to the 2001 terrorist attacks' responders and others, such as certain New York City residents, who may have suffered health effects in the aftermath of the attacks. The VCF was reauthorized in December 2015 and July 2019 and is currently authorized through the end of FY2092 with an October 1, 2090 deadline for VCF claims. The original VCF, created by Title IV of the ATSSA, provided cash benefits to two groups of persons who suffered physical injury or death as a result of the terrorist attacks of September 11, 2001: persons who were present at the World Trade Center, Pentagon, or aircraft crash site in Shanksville, PA, at the time of or in the immediate aftermath of the aircraft crashes at those sites on September 11, 2001; and passengers and crew of any aircraft that crashed on September 11, 2001, as a result of terrorist activity. The Attorney General appointed a special master to determine the benefit amount for each claimant. The benefit amount payable to each claimant was based on the individual's economic losses (such as loss of future earnings) and noneconomic losses (such as pain and suffering). The VCF statute specifically prohibited any payments for punitive damages. Benefits were reduced by certain collateral source payments, such as life insurance benefits, available to the claimant. There was no cap on the amount of benefits that any one person could receive or on total benefits paid. By filing a VCF claim, a person waived his or her right to file a civil action or be a party to such an action in any federal or state court for damages related to the September 11, 2001 terrorist-related aircraft crashes. This provision established the VCF as an alternate and expedited route to compensation for victims while providing some protection against lawsuits for damages that may have been brought by victims against the air carriers; airframe manufacturers; the Port Authority of New York and New Jersey, who owned the World Trade Center; or any other entity. Congress provided funding for the VCF through an appropriation of \"such sums as may be necessary\" for benefit payment and administration. The VCF's special master was required to promulgate regulations to govern the program within 90 days of the law's enactment, and all claims had to be filed within two years of the regulations' promulgation, at which time the VCF would close. The original VCF received 7,403 claims and made awards totaling $7.049 billion to 5,560 claimants. The original VCF closed to new claims in December 2003. However, concerns about injuries and illnesses incurred by persons involved in emergency response, recovery, and debris removal operations at the September 11 th aircraft crash sites led Congress to reopen the VCF with the enactment of Title II of the James Zadroga 9/11 Health and Compensation Act of 2010 (Zadroga Act; P.L. 111-347 ). The reopened VCF extended eligibility for cash benefits to persons who suffered physical injuries or illnesses as a result of rescue, recovery, or debris removal work at or near the September 11 th aircraft crash sites during the from September 11, 2001 to May 30, 2002, as well as for certain persons who lived, worked, or were near the World Trade Center on September 11, 2001. The VCF was initially reopened for new claims through October 3, 2016. Total benefits and administrative costs were limited to $2.775 billion, unlike in the original VCF, which had no cap on total funding for benefits, allowing the special master to award benefits without considering the benefits' total cost. Under the reopened VCF, attorney fees were limited to 10% of the VCF award. The VCF was first reauthorized on December 18, 2015, which extended the claim period for five years, with the enactment of Title IV of Division O of the Consolidated Appropriations Act, 2016 (Zadroga Reauthorization Act of 2015; P.L. 114-113 ). Under this reauthorization, claims approved before the reauthorization date were considered Group A claims, which were subject to the same rules as claims under the reopened VCF and to the $2.775 billion cap on total benefit payments. All other claims filed before the December 18, 2020 deadline were considered Group B claims subject to additional rules and funding caps established by the reauthorization legislation including a $4.6 billion cap on benefits. The 2015 reauthorization created a total funding cap of $7.375 billion for Groups A and B benefits. The VCF was reauthorized again in 2019 with the enactment of the Never Forget the Heroes: James Zadroga, Ray Pfeifer, and Luis Alvarez Permanent Authorization of the September 11 th Victim Compensation Fund Act ( P.L. 116-34 ). Under this legislation, the VCF is authorized through the end of FY2092, with an October 1, 2090 deadline for all VCF claim filings. The 2019 reauthorization appropriates \"such sums as may be necessary\" for VCF benefit payments and administrative expenses for each fiscal year through the end of FY2092. To be eligible for VCF benefits, a person must have died as a passenger or crew member on one of the aircraft hijacked on September 11, 2001; died as a direct result of the terrorist-related aircraft crashes or rescue, recovery, or debris removal in the immediate aftermath of the September 11, 2001 terrorist attacks; or been present at a September 11 th crash site in the immediate aftermath of the September 11, 2001 terrorist attacks and suffered physical harm as a direct result of the crashes or the rescue, recovery, and debris removal efforts. To be eligible for the VCF, survivors (individuals who did not die as passengers or crew members of the hijacked aircraft or as a direct result of the September 11 th terrorist attacks, including rescue, recovery, and debris removal), must have suffered physical harm as a result of the attacks. Physical harm is demonstrated by the presence of a World Trade Center (WTC)-related physical health condition as defined for the purposes of the World Trade Center Health Program (WTCHP). A WTC-related physical health condition is a physical health condition covered by the WTCHP. These conditions are those provided in statute at Sections 3312(a) and 3322(b) of the Public Health Service Act (PHSA) and those added through rulemaking by the WTCHP administrator. Per Section 3312(a) of the PHSA, to be covered by the WTCHP and thus compensable under the VCF, a condition must be on the list of WTCHP-covered conditions and it must be determined that exposure in the aftermath of the September 11, 2001 terrorist attacks \"is substantially likely to be a significant factor in aggravating, contributing to, or causing the illness or health condition.\" In most cases, the VCF requires that a person's condition be WTCHP certified for that condition to be compensable. The WTCHP provides standardized guidance to determine whether a person's condition was caused by exposure in the aftermath of the September 11, 2001 terrorist attacks. This determination is based on a combination of the amount of time a person was physically present at a site and the specific activitiesâsuch as search and rescue, sleeping in a home in Lower Manhattan, or just passing through a siteâin which the person engaged. For example, a person who was engaged in search and rescue activities at the WTC site between September 11 and September 14, 2001, must have been present for at least 4 hours for the WTCHP to certify his or her condition and thus compensable by the VCF, whereas a person whose only activity was passing through Lower Manhattan during the same period, and who was not caught in the actual dust cloud resulting from the buildings' collapse, would have to have been in the area for at least 20 hours to be eligible for compensation. The WTCHP evaluates conditions that do not meet the minimum exposure criteria on a case-by-case basis using \"professional judgement\" and \"any relevant medical and/or scientific information.\" WTCHP-covered mental health conditions may not be used to establish VCF eligibility, as the VCF does not include any provisions for benefit payments for mental health conditions. The WTCHP statute does not include any type of cancer in the list of WTC-related health conditions. However, the statute does require the WTCHP administrator to periodically review the available scientific evidence to determine if any type of cancer should be covered by the WTCHP and, by extension, the VCF. If the WTCHP administrator is petitioned to add conditions to the WTC-related health conditions' list, the administrator is required, within 90 days, to either request a recommendation on action from the WTC Scientific/Technical Advisory Committee (STAC) or make a determination on adding the health condition. If the administrator requests a recommendation from the STAC, that recommendation must be made within 90 days of its receipt and the WTCHP administrator must act on that request within an additional 90 days. On September 7, 2011, Representatives Carolyn B. Maloney, Jerrold Nadler, Peter King, Charles B. Rangel, Nydia M. Velazquez, Michael G. Grimm, and Yvette Clarke and Senators Charles E. Schumer and Kirsten E. Gillibrand filed a petition, in the form of a letter to the WTCHP administrator, requesting that the administrator \"conduct an immediate review of new medical evidence showing increased cancer rates among firefighters who served at ground zero\" and that the administrator \"consider adding coverage for cancer under the Zadroga Act.\" In response to this petition, the WTC administrator requested that the STAC \"review the available information on cancer outcomes associated with the exposures resulting from the September 11, 2001 terrorist attacks, and provide advice on whether to add cancer, or a certain type of cancer, to the List specified in the Zadroga Act.\" On September 12, 2012, based on the STAC's recommendations, the WTCHP administrator added more than 60 types of cancer, covering nearly every body system and including any cancers in persons less than 20 years of age and any rare cancers, to the list of WTC-related health conditions, thus making these conditions compensable under the VCF. In a review of the decision to add cancers to the list of WTC-related health conditions, the Government Accountability Office (GAO) found that the WTCHP administrator used a hazards-based approach to evaluate cancers. This approach evaluated whether exposures in the aftermath of the September 11, 2001 terrorist attacks were associated with types of cancer but did not evaluate the probability of developing cancer based on a given exposure. A GAO-convened scientific panel indicated that the hazards-based approach the WTCHP administrator used was reasonable given data constraints and the fact that there is a certification process to determine if a cancer or other condition on the WTC-related health list meets the statutory requirement of being \"substantially likely to be a significant factor in aggravating, contributing to, or causing the illness or health condition.\" The panel also indicated that this approach could have benefited from an independent peer review process. The WTCHP administrator stated that peer review was not possible given the statutory time constraints to act on the petition and the STAC's recommendation. One year later, the WTCHP administrator added prostate cancer to the list of WTC-related health conditions. In addition, the WTCHP administrator established minimum latency periods for certain types of cancer and maximum onset periods for certain types of aerodigestive disorders. The Civil Division of the Department of Justice administers the VCF. The Attorney General appoints the VCF special master and up to two deputies, who serve at the pleasure of the Attorney General. The VCF special master, currently Rupa Bhattacharyya, decides VCF eligibility and benefits. A claimant dissatisfied with the special master's decision on his or her claim may file an appeal and request a hearing before a VCF-appointed hearing officer. There is no further right of appeal or judicial review of VCF decisions. However, a claimant may amend his or her claim after a decision has been made if the claimant has new material relevant to the claim. All claims for VCF benefits must be filed by October 1, 2090. Before filing a claim, a potential claimant must have registered with the VCF by one of the following applicable deadlines: October 3, 2013, if the claimant knew, or reasonably should have known, that he or she suffered a physical harm or died as a result of the September 11 th attacks or rescue, recovery, or debris removal efforts, and that he or she was eligible for the VCF on or before October 3, 2011; or within two years of the date the claimant knew, or reasonably should have known, that he or she has a WTC-related physical health condition or died as a result of the September 11 th attacks and is eligible for the VCF. If a claimant has a condition that is later added to the list of WTCHP-covered conditions, then the two-year period begins on the later of the dates when a government entity, such as the WTCHP or a state workers' compensation agency, determines that the condition is related to the September 11 th attacks, or when a claimant's condition is added to the WTCHP-covered list of conditions. Under current law, there is no cap on the total VCF benefit amount that may be paid, but there are limits on individual benefit amounts. The special master determines VCF benefits based on the claimant's economic and noneconomic losses. For noneconomic losses, there is a cap of $250,000 for cancer claims and $90,000 for all other claims. For cases in which a WTC-related health condition causes death, the presumed award provided in the VCF regulations for noneconomic loss is $250,000 plus an additional $100,000 for the person's spouse and each dependent. In addition, the special master may exceed the noneconomic loss limits if the Special Master determines that the claim presents \"special circumstances.\" When calculating economic losses, the special master is permitted to consider only the first $200,000 in annual income when determining losses to past earnings and future earning capacity, which limits the amount of economic losses that can be paid. The special master is required to periodically adjust this amount to account for inflation. VCF benefits are reduced by certain collateral source payments available to claimants, such as life insurance benefits, workers' compensation payments, and government benefits related to the person's injury or death, including Social Security Disability Insurance and the Public Safety Officers' Benefits program. The 2019 reauthorization provides that any benefit award that the special master had previously reduced due to insufficient funding to pay all VCF awards is to be paid in full. Congress established the VCF to be an \"administrative alternative to litigation for the victims of the [September 11, 2001] terrorist attacks.\" As such, to receive a VCF award, a person must forfeit his or her right to bring any lawsuit in any state or federal court against any entity, such as the airlines, airframe manufacturers, or building owners, for damages related to the attacks or their aftermath and must withdraw any pending legal claims. However, a person may maintain his or her eligibility for the VCF and bring a lawsuit against \"any person who is a knowing participant in any conspiracy to hijack any aircraft or commit any terrorist act,\" or bring a lawsuit to recover collateral source obligations such as life insurance benefits owed to the victim. In addition, the VCF statute grants the United States District Court for the Southern District of New York exclusive jurisdiction over any lawsuits related to the September 11, 2001 terrorist attacks and establishes liability limits for the airlines, airframe manufacturers, airports, City of New York, and any person with property interest in the World Trade Center such as the Port Authority of New York and New Jersey. The VCF statute caps attorney fees for claimant assistance at 10% of the VCF award amount. The special master has the authority to reduce any attorney fees it deems excessive for services rendered. Under provisions of the Justice for United States Victims of State Sponsored Terrorism Act, a person who receives a VCF award is barred from receiving any additional compensation from the United States Victims of State Sponsored Terrorism Fund. The 2019 VCF reauthorization appropriates \"such sums as may be necessary\" for FY2019 and each fiscal year through FY2092 for the payment of VCF awards, with all funds to remain available until expended. Thus, funding for the VCF will not require annual appropriations or be subject to the annual appropriations process. ", "summary": "The September 11 th Victim Compensation Fund (VCF) provides cash benefits to certain persons whose health may have been affected by exposure to debris or toxic substances in the aftermath of the September 11, 2001 terrorist attacks on the Pentagon, the World Trade Center, and the terrorist-related aircraft crash at Shanksville, PA. Congress created the original VCF shortly after the 2001 terrorist attacks to provide compensation to persons injured and the families of persons killed in the attacks and their immediate aftermath. The original VCF closed in 2003. In 2011, Congress reopened the VCF to provide benefits to persons who responded to the terrorist attack sites, were involved in the cleanup of these sites, or lived in lower Manhattan during the attacks. The reopened VCF was authorized through October 3, 2016. However, the VCF was reauthorized in December 2015 ( P.L. 114-113 ) and July 2019 ( P.L. 116-34 ). All VCF claims must be filed by October 1, 2090. Since its reopening, the VCF has awarded more than $5.5 billion to more than 23,000 claimants. There is no cap on the total VCF award amount, but there are limits on the amounts of individual awards for economic and noneconomic losses claimants suffered. The 2019 reauthorization legislation provides all necessary appropriations for VCF awards and administrative expenses through the end of FY2092.", "document_type": "crs"}
{"report": "Congress established the National Wild and Scenic Rivers System (NWSRS) in 1968 through the Wild and Scenic Rivers Act (WSRA). The WSRA established a policy of preserving designated free-flowing rivers for the benefit and enjoyment of present and future generations. It also complemented the then-current national policy of constructing dams and other structures that altered flow along many rivers. Designated rivers usually are referred to as wild and scenic rivers (WSRs). The WSRA established three classes of WSRs, reflecting the characteristics of a river at the time of designation and affecting the type and amount of development that may be allowed afterward: W ild rivers are free from impoundments (dams, diversions, and so forth) and generally inaccessible except by trail. The watersheds are primitive, and the shorelines are essentially undeveloped. Scenic rivers are free from impoundments and in generally undeveloped areas but are accessible in places by roads. Recreational rivers are readily accessible by road, with some shoreline development, and may have been subject to some impoundment or diversion in the past. At the passage of the WSRA in 1968, Congress initially designated 789 miles in eight rivers as part of the NWSRS and began to expand the system in 1972; since then, every Congress has added rivers. Altogether, the system now includes 226 river units comprising over 13,400 miles in 41 states and the Commonwealth of Puerto Rico. Congress plays an ongoing role in shaping the NWSRS through legislation and oversight. Congress establishes new WSRs within the system, directs the Administration to study potential WSRs, and determines the level of agency funding for WSR administration. For individual WSRs, Congress has made specific provisions concerning river management, land acquisition and use in river corridors, and other matters. Ongoing issues for Congress include whether to designate additional WSRs, how to address local and federal roles on nonfederal river segments, and more. Rivers may come into the NWSRS either by congressional designation or by state nomination to the Secretary of the Interior. In some cases, prior to adding a river to the system, Congress first directs in legislation that a study be conducted to determine whether the river area is suitable for wild and scenic designation. Congress also has directed the Secretaries of Agriculture and the Interior to evaluate rivers for inclusion in the NWSRS through agency planning processes. Congress may designate rivers as part of the system without first requiring a study. The Secretary of the Interior or Agriculture, as appropriate, is responsible for conducting authorized studies and reporting to the President on the suitability of a proposed addition. The President in turn submits recommendations to Congress. The act states that the studies are to discuss, among other things, the \"outstandingly remarkable values\" (ORVs) that make the area worthy or unworthy of addition to the system; current land ownership and use; potential future uses of the land and water that could be affected by addition to the system; the federal agency that would administer the area; the cost of acquiring the land, if applicable; and the extent to which management costs would be shared by state and local agencies. The act also directs the administering agency to determine which river classificationâwild, scenic, or recreationalâbest fits the designated river segments. However, Congress may preclude the need for these agency determinations by specifying particular classifications in law. Although Congress designates most rivers, the Secretary of the Interior also may add WSRs to the NWSRS through administrative action. A state-nominated river may be added to the national system if the river is designated for protection under state law, approved by the Secretary of the Interior, and permanently administered by a state agency (see \" State-Administered Wild and Scenic Rivers \" for further information). A minority of wild and scenic river designations have been made in this manner. The WSRA affords rivers designated by Congress for study (known as study rivers ) the same protections as designated rivers (see \" Agency Role After Designation ,\" below). These protections last through the study process and extend to a three-year period following the transmittal of the final study report by the President to Congress. The act does not protect rivers studied through an agency's planning process, although the agency may use other authorities to protect attributes such as free flow or ORVs. After Congress designates a river segment as a WSR, the segment falls under the jurisdiction of one of the four major federal land management agencies. The agency's role depends on the ownership of the land through which the river flows. If the river flows through federal lands (wholly or in part), the agency of jurisdiction manages the river as part of its overall land management activities. The National Park Service (NPS) acts as the federal administrator for rivers entirely on nonfederal lands. For these rivers, NPS may provide technical and financial assistance to relevant jurisdictions; it also ensures compliance with Section 7 of the WSRA, which prohibits certain water resources projects that would adversely affect the values for which the rivers were established (see \" Water Resources Projects: Section 7 ,\" below). The WSRA authorizes or prohibits certain activities for all WSRs. However, management of WSRs differs based on the lands where individual rivers lie and other factors. Various federal agencies administer rivers in the NWSRS designated by Congress. Typically, Congress specifies that either the Secretary of Agriculture or the Secretary of the Interior administer newly designated WSRs. The designated Secretary then administers the river through one of the four federal land management agenciesâthe Bureau of Land Management (BLM), NPS, or U.S. Fish and Wildlife Service (FWS) within the Department of the Interior or the Forest Service (FS) within the Department of Agriculture. Unless otherwise specified by Congress, rivers administered by the Secretary of the Interior and managed by NPS become part of the National Park System, and those managed by FWS become part of the National Wildlife Refuge System. Following designation, the agency prepares a management plan (often called a comprehensive resource management plan , or CRMP) for the designated segment. The CRMP is to \"provide for the protection of the river values\" by addressing issues such as development of lands and facilities, user capacities, and other management practices. By law, CRMPs must address resource protection, development of lands and facilities, user capacities, and other management practices necessary or desirable to achieve the purposes of the WSRA. Agencies sometimes provide more specific direction regarding CRMP components. For example, in addition to the components listed, BLM specifies that CRMPs should describe existing resource conditions, including detailed descriptions of ORVs; define the goals for protecting river values and the desired condition of the river; address water quality and instream flow; identify resources requiring compliance with other authorities; identify regulatory authorities of other agencies that relate to river values; and describe a river monitoring strategy. CRMPs generally are to be completed within three fiscal years after the date of a river's designation. There is no statutory requirement that CRMPs be updated. In some river study authorizations, Congress has required the study agency to develop a CRMP in concert with the study process. In some cases, Congress has adopted these CRMPs in the legislation designating the river. Agencies have sometimes developed elements of the CRMP while studying the river, even if not directed by Congress to do so. The agency determines the boundaries of areas along the designated river. The land area included may not exceed an average of 320 acres per mile of river designated (an average quarter-mile-wide corridor of land on each side of the river) or 640 acres per mile in Alaska (an average half-mile-wide corridor of land on each side of the river). Rivers are administered to protect and enhance the values for which the rivers were included in the NWSRS (usually interpreted as being the rivers' ORVs). Congress directed that the agencies give primary emphasis to protecting aesthetic, scenic, historic, archaeological, and scientific features of designated rivers. Congress also directs that other land uses not be limited unless they \"substantially interfere with public use and enjoyment of these values.\" The WSRA prohibits water resource projects, such as dams, if they would have a \"direct and adverse effect\" on the values for which the river was designated (see \" Water Resources Projects: Section 7 \" below, for further discussion). Management of lands within wild and scenic corridors varies with the class of the designated river, the values for which the river was included in the system, the managing agency, and land ownership in the river corridor. Generally, agencies manage wild rivers with the highest level of restrictions in terms of development and water resource use, scenic rivers with an intermediate level of restrictions, and recreational rivers with the lowest level of restrictions. The WSRA withdraws federal lands within the boundaries of wild WSRs from appropriation under the mining and mineral leasing laws. No new mining claims or leases can be granted on these lands. Existing valid claims or leases within the designated WSR boundary remain in effect, and activities may be allowed subject to regulations designed to protect river values (for example, regulations that minimize sediment, discharge, or visual impacts). NPS and FWS generally prohibit mineral development on their lands; thus, the mineral collection provisions of the WSRA generally only affect activity on FS and BLM lands. The WSRA does not withdraw federal lands within the boundaries of scenic or recreational WSRs from the mining and mineral leasing laws. Filing of new claims and leases is permitted to the extent allowed by other laws and policies governing the land. Existing valid claims or leases within the designated WSR boundary remain in effect, and activities may be allowed, subject to regulations that minimize surface disturbance, water sedimentation, pollution, and visual impairment. Reasonable access to mining claims and mineral leases is permitted. Section 7 of the WSRA prohibits federally licensed or assisted water resources projects, such as dams and reservoirs, that would have a \"direct and adverse\" effect on the values for which the river was established. Outside the designated segments (such as upstream, downstream, or on a tributary), the WSRA prohibits projects that would \"invade â¦ or unreasonably diminish\" the segment's fish, wildlife, scenic, or recreational resources. The WSRA also explicitly prohibits the Federal Energy Regulatory Commission from licensing any new dam, water conduit, reservoir, powerhouse, transmission line, or other project on or directly affecting a designated river segment. These prohibitions often are referred to as Section 7 or Section 7(a ) prohibitions. Each managing agency is responsible for determining the impact of a proposed federal or federally assisted water resources project on rivers it administers. NPS is responsible for the implementation of Section 7 on partnership WSRs (see \" Partnership Wild and Scenic Rivers \"), regardless of the degree to which the agency shares other management functions, and on state-managed WSRs. Â The determination usually focuses on impacts to identified ORVs and free-flowing condition; it may include analysis of impacts to water quality, upland conditions (such as vegetation and soils), or other values. The baseline for evaluating impacts is the resource condition on the date of designation. If conditions have improved since that date, some agencies specify that Section 7 determinations be based upon the improved condition. In addition to the statutory direction discussed above, management of WSRs on federal lands differs based on the statutory management criteria for each agency's lands. FS and BLM manage their lands for a sustained yield of multiple uses. NPS manages the National Park System under a dual mission: to preserve unique resources and to provide for their enjoyment by the public. FWS manages the National Wildlife Refuge System (NWRS) under a dominant mission to conserve plants and animals for the benefit of future and present generations. These varying missions shape the management decisions the federal land management agencies make regarding WSRs on their lands. WSRs managed by FS and BLM are subject to the provisions of the WSRA and any provisions under which the agencies administer the national forests (for FS) or public lands (for BLM). FS and BLM manage their lands for a sustained yield of multiple uses, including (but not limited to) grazing, timber harvesting, energy and mineral development, fish and wildlife habitat, and recreation. Thus, FS and BLM management of WSRs addresses how lands in or surrounding the WSR corridor may be used. As discussed above, management also varies with the class of the designated river and the values for which it was included in the system. In accordance with the WSRA, FS and BLM create CRMPs for each river after designation; these plans establish management objectives for the river. Agency guidance (such as policy manuals and handbooks) may specify that certain activities be governed by the CRMP. For example, FS policy states that activities such as insect, disease, and invasive species treatment; transportation systems (such as roads, trails, and airfields); and recreation (among others) be managed in accordance with the CRMP for each river. In other cases, the agencies have given directions regarding various activities for their WSRs more broadly. Both agencies do not generally allow timber harvesting, road building, and structures and improvements (such as campgrounds, boat launches, and administrative sites) in wild river corridors. Both agencies allow more development in scenic and recreational rivers corridors. FS prohibits motorized travel in wild river corridors. BLM discourages new rights-of-way and utility corridors in all WSR areas. Both agencies allow for continued grazing and wildfire management, including through prescribed fire, in WSR areas. FS and BLM manage wildfire, pests, insects, and disease in ways compatible with adjacent lands outside the river corridor. Rivers managed by the Secretary of the Interior through FWS become part of the NWRS. FWS manages the NWRS under a dominant mission to conserve plants and animals for the benefit of future and present generations. WSRs managed by FWS are subject to the provisions of the WSRA and any provisions under which the NWRS is administered. In the case of any conflict between these authorities, the more restrictive provisions apply. FWS does not otherwise have specific policy or other guidance regarding management of WSRs. Rivers managed by the Secretary of the Interior through NPS become part of the National Park System. NPS manages the National Park System under a dual mission: to preserve unique resources and to provide for their enjoyment by the public. NPS-managed WSRs are subject to the provisions of the WSRA and any provisions under which the National Park System and the specific units are administered. In the case of any conflict between these authorities, the more restrictive provisions apply. WSRs need not flow entirely through federal land. WSRs on nonfederal lands differ based on whether they were designated by Congress or through an administrative process. WSRs designated by Congress may flow wholly through nonfederal land or may have segments on nonfederal land. WSRs on nonfederal land managed at the state, county, or other nonfederal level, and usually congressionally designated, are referred to colloquially as partnership wild and scenic rivers (or partnership WSRs). WSRs also may be designated through an administrative process. States may apply to the Secretary of the Interior for inclusion of a state-protected river in the NWSRS. The relevant state administers WSRs added to the system in this way. These WSRs, as well as those that contain both federal and nonfederal land, generally are not referred to as partnership WSRs. The WSRA does not define the term partnership WSRs ; rather, it is an umbrella term used to refer to WSRs with certain similar features. NPS administers all WSRs with these features. In general terms, common features of partnership WSRs are as follows: Lands are not federally owned, and federal ownership is not authorized in legislation. The river management plan is created at the local level and often locally approved prior to designation. NPS may provide technical assistance. A local organization, often open or broadly participatory in nature (called a council , committee , or other term), oversees implementation of the management plan. These organizations may receive technical assistance from NPS. Overall administration is the responsibility of NPS, but land use and management are governed by authorities at the relevant nonfederal level (e.g., township zoning ordinances). Costs of managing and protecting the WSR are shared but generally include some federal support (see \" Funding ,\" below). Partnership WSRs usually are congressionally designated, although exceptions exist. For example, NPS refers to the Westfield River as a partnership WSR, but its designation occurred through state nomination. The WSRA does not describe these features, aside from local jurisdiction over land use. These features have been codified in individual river study legislation or designating legislation or have developed locally during the study or designation process. Because the WSRA does not define the term partnership WSRs , not all partnership WSRs have all of these characteristics and not all WSRs with some of these characteristics are referred to in this way. As with WSRs generally, Congress typically designates partnership WSRs following a congressionally authorized study. Studies on partnership WSRs often are similar to studies of WSRs generally, including identifying ORVs meriting protection (see \" Designation \"), though Congress sometimes specifies matters studies must address. Partnership WSR studies also may identify existing forms of protection in the river corridor, such as local zoning laws, and additional options to confer protection within local jurisdictions (such as laws regarding vegetative cutting, sand and gravel removal, placement of new structures and septic systems, and others). In some cases, local governments have chosen to strengthen land use requirements during a WSR study (for example, by passing certain zoning ordinances) to demonstrate the adequacy of local protections prior to requesting congressional designation. Congress has prohibited condemnation in WSR corridors in urban areas with adequate zoning ordinances; therefore, strengthened land use requirements may protect against condemnation in certain areas, strengthen the case for designation, or contribute to other goals. During the WSR study, stakeholders may develop a river management plan, sometimes using NPS technical assistance and funding. Congress may identify such plans as satisfying the CRMP requirements of the WSRA in designating legislation. Although not required under the WSRA, NPS administers all partnership WSRs. Congress sometimes has specified which relevant local jurisdictions, such as states and towns, manage designated partnership WSRs through cooperative agreements. To date, locally based river management councils or committees have been formed on each partnership river specifically for this purpose. Congress may specify the role of management councils or similar local organizations in individual river designating legislation, in written agreements authorized by the river's designating legislation, or both. A WSR designation on nonfederal land does not transfer ownership to the federal government; relevant local authorities and jurisdictions continue to govern land use and management of these rivers. After designation, partnership WSRs are managed according to the established CRMP. Local jurisdictions (e.g., the relevant county, township, or city, as appropriate) generally make laws that implement the CRMP, such as land use restrictions and zoning laws, and carry out management actions. The WSRA authorizes federal agencies to enter into cooperative agreements with state and local governments for administering a river area, and NPS may provide technical or financial assistance for managing river resources. NPS remains responsible for implementing Section 7 reviews of proposed water resources projects (see \" Water Resources Projects: Section 7 \"). Although Congress designates most rivers, the Secretary of the Interior also can add WSRs to the NWSRS by administrative action. A state desiring WSR designation for a river on nonfederal lands must establish permanent river protections compatible with the WSRA. The state may then apply to the Secretary of the Interior to approve inclusion of the river in the NWSRS. The Secretary of the Interior typically directs NPS to evaluate whether the provisions of the WSRA have been fulfilledâincluding whether adequate protections are in place, whether the river is in free-flowing condition, and whether it possesses at least one ORV. If the NPS determines that the application meets the requirements and the Secretary of the Interior concurs, the river is added to the NWSRS. Rivers designated administratively have protections identical to rivers designated by Congress. The WSRA precludes federal management of such rivers; thus, state or local agencies manage WSRAs designated this way. (Although these rivers sometimes are called state-administered rivers, they need not necessarily be administered by states.) The federal government may not provide funding for state-administered WSRs and may not condemn or acquire lands in the river corridor. NPS reviews proposed water resource projects (see \" Water Resources Projects: Section 7 \"). Congress may designate WSRs with segments on federal and nonfederal land (for example, Congress could designate a river that begins on FS lands and flows onto private lands). Management of nonfederal segments of these rivers varies, depending on what provisions Congress includes in designating legislation. For example, Congress may specify that nonfederal segments are to be managed by state, county, local, or other nonfederal elements. Some of these rivers are managed through cooperative agreements; in other cases, Congress has specified objectives for nonfederal elements. In still other cases, Congress has not specified how nonfederal areas are to be managed. For rivers administered by the four federal land management agencies, Congress provides funds for operations and maintenance through annual congressional appropriations for the relevant agencies. Each agency approaches river management differently in its budget. Rivers administered exclusively by states typically do not receive federal funding for river administration. The WSRA authorizes federal agencies to assist states and their political subdivisions (such as counties, townships, and others), landowners, organizations, or individuals in planning, protecting, and managing WSRs; this provision includes financial and technical assistance, except in the case of administratively designated WSRs. NPS administers partnership WSRs and provides technical and financial assistance to manage these rivers. Funding for WSRs administered by the NPS depends on the designated river's location. NPS WSRs that are part of another National Park System unit are funded through appropriations for that individual unit. A few WSRs are stand-alone units of the National Park System and receive their own line-item appropriations. The National Park Service budget also contains separate line items for the partnership WSRs. Funding for WSRs listed individually in the NPS budget, as well as for overall program administration over the past five years, appears in Table 1 . BLM lists the total annual amount enacted for WSRs in the \"Cross-Cutting Programs\" section of its budget justification, shown below in Table 2 . FS, in its \"Recreation, Heritage, and Wilderness\" budget activity, includes a combined line item for management of wild and scenic rivers and wilderness areas; it does not report a distinct figure for WSRs. Similarly, FWS does not report a distinct figure for WSRs but incorporates WSR funding into its broader \"National Wildlife Refuge System\" budget activity. WSR designation has been controversial in some cases, especially for WSRs containing nonfederal lands. Initially, Congress primarily designated rivers on federal land and rivers on nonfederal land were primarily added to the NWSRS through the state nomination authority. However, the state nomination authority has not been used since 2004, and Congress has designated all WSRs (on federal and nonfederal land) since that time. Congress also has increasingly authorized river studies on nonfederal lands. With this increase in congressional studies and designations of nonfederal lands, concern has centered on local control of relevant lands, including potential for federal acquisition of newly designated lands. The potential use of condemnation authority to acquire lands on partnership WSRs has been particularly contentious. The WSRA limits the federal government's condemnation powers for some but not all river areas. According to the Interagency Wild and Scenic Rivers Council, the federal government has rarely used condemnation authority in respect to WSRs, and nearly all uses of condemnation occurred in the early years of the WSRA. Congress has sometimes prohibited the use of condemnation in designating legislation for individual river segments. Opinions regarding the balance of federal and local control over partnership WSRs have varied. Some stakeholders contend that the current partnership WSR model is successful. Others have expressed concern that provisions of WSR designation legislationâfor example, that partnership WSRs are to be administered as part of the National Park System unless otherwise specifiedâmay lead to an undesirable loss of local control. Still other observers have expressed concern that local laws may not adequately protect partnership WSRs. As discussed previously, the attributes of each partnership WSR are created separately by individual designating laws or by local and federal agency choices before or after designationâas opposed to stemming from a defined category in the WSRA. Thus, it may be unclear whether these concerns are broadly applicable. Congress and NPS have used varying methods to address concerns about local versus federal control of partnership WSRs and about adequate levels of protection for partnership WSRs, either in individual designating legislation or in agency action prior to or after designation. In contrast to the partnership WSR model, the state-nominated process for designating WSRs consists of a fixed set of provisions. The process affords rivers the same protection as congressionally designated WSRs but precludes federal management or land acquisition (including by condemnation), and the state must demonstrate that adequate legal protections are in place prior to designation. Some have observed that Congress intended the state nomination authority to be the primary means for nonfederal river segments to be included in the system and that Congress envisioned the states taking a prominent role in developing the NWSRS. Prior to the 2000s, most nonfederal river segments were designated under the state nomination authority. However, this designation method has not been used since 2004; costs of designation and management at the state level, and state and local politics, may have contributed to this decline. Congress may consider whether it is preferable to encourage use of the state-nominated process, which includes a set of fixed provisions, or to continue to establish partnership WSRs though individual designating statutes, whose provisions vary.", "summary": "Congress established the National Wild and Scenic Rivers System (NWSRS) in 1968 through the Wild and Scenic Rivers Act (WSRA; P.L. 90-542) to preserve free-flowing rivers for the benefit and enjoyment of present and future generations and to complement the then-current national policy of constructing dams and other river structures that altered flow. Designated rivers usually are referred to as wild and scenic rivers (WSRs). The WSRA established three classes of WSRsâwild, scenic, and recreationalâreflecting the characteristics of the rivers at the time of designation and affecting the type and amount of subsequently allowable development. The system now includes 226 river units comprising over 13,400 miles in 41 states and the Commonwealth of Puerto Rico. WSRs may come into the NWSRS either by congressional designation or by state nomination to the Secretary of the Interior. WSRs may be located on federal lands, nonfederal lands, or a combination of both. Some WSRs on nonfederal land are referred to as partnership wild and scenic rivers (or partnership WSRs). The WSRA does not define this term; it is an umbrella term used to describe WSRs with generally similar characteristics, such as nonfederal management and land ownership, but partnership WSRs can vary. WSRs on nonfederal land also may be added to the NWSRS through an administrative process, wherein states may apply to the Secretary of the Interior for inclusion of a state-protected river. Rivers added to the system through state nomination, or rivers designated by Congress that run through both federal and nonfederal lands, generally are not referred to as partnership WSRs. In the case of congressionally designated rivers, Congress may first direct in legislation that a study be conducted to determine whether the river area is suitable for wild and scenic designation. Congress generally specifies in the designating legislation that either the Secretary of Agriculture or the Secretary of the Interior administer the WSR. If the designated WSR contains federal land, the Secretary then manages the river through the federal land management agency of jurisdictionâthe Bureau of Land Management, the National Park Service (NPS), or the Fish and Wildlife Service within the Department of the Interior or the Forest Service within the U.S. Department of Agriculture. The relevant local jurisdiction manages partnership WSRs and state-nominated WSRs, with certain administrative functions carried out at the federal level. WSRs are administered to protect and enhance the values for which the rivers were included in the system and to preserve the rivers' free-flowing condition. The agency, or the relevant local jurisdiction for WSRs on nonfederal land, prepares a comprehensive resource management plan (CRMP) to guide management. The WSRA prohibits federally licensed or assisted water resources projects that would have a \"direct and adverse\" effect on the values for which a river was established and prohibits the Federal Energy Regulatory Commission from licensing projects on or directly affecting a designated river segment. The agency of jurisdiction enforces this provision; on partnership WSRs and state-nominated WSRs, NPS enforces this provision. In addition to the provisions of the WSRA, management of WSRs on federal lands differs based on the statutory management criteria for each agency's lands. Each federal land management agency specifies policies regarding river management at varying levels of detail. Agencies typically provide the most protection to wild rivers. For congressionally designated rivers on federal lands, Congress provides funds for operations and maintenance through annual appropriations for the relevant agencies. Agencies sometimes provide funding separately for individual rivers or provide funding through broader budget activities, not specific to an individual river. Rivers added to the NWSRS through state nomination typically do not receive federal funding. However, partnership WSRs receive funding through NPS. The WSRA authorizes federal agencies to provide technical assistance to states and their political subdivisions (such as counties, townships, and others), landowners, organizations, or individuals in planning, protecting, and managing WSRs. Designation of wild and scenic rivers has been controversial in some cases, especially for WSRs containing nonfederal lands. Initially following enactment of the WSRA, Congress designated rivers primarily on federal land. Over the past 20 years, Congress has designated or authorized for study an increasing number of partnership WSRs. Opinions regarding the balance of federal and local control over partnership WSRs have varied. Some have observed that Congress intended the state nomination authority to be the primary means for rivers on nonfederal lands to be included in the system, but this designation method has not been used in recent years. Congress may consider whether it is preferable to encourage use of the state-nominated process, which includes a set of fixed provisions, or to continue to establish partnership WSRs through individual designating statutes, whose provisions vary.", "document_type": "crs"}
{"report": "National internet regimes, as defined by individual countries' domestic policies and rules, are growing more divergent, a trend that has significant implications for international trade and the future growth of U.S. and global digital economies. The evolving digital economy increases productivity and drives growth in the overall economy, but may be threatened by differences in national rules and potential fracturing of the global internet. Congress has an interest in ensuring the U.S. digital economy thrives and shapes the global rules and norms for digital trade. As internet technology expanded from its origins in the military and defense sector into the commercial arena in the 1990s, consumers and firms began to conduct transactions in an online environment that lacked clear rules and guidelines. Some U.S. firms took advantage of the open global commons and thrived, quickly expanding their offerings and entering foreign markets. In many foreign markets, U.S.-based Google dominates search and e-mail, Facebook is the number one social network, and Amazon is the first stop for online shopping. However, in certain other markets, some of which are important for the United States, trade barriers limit or block those same websites. While national rules-setting may focus on domestic priorities, policies that affect digitization in any one country's economy can have consequences beyond its borders. The internet is a global \"network of networks,\" and the state of a country's digital economy can have global ramifications, such as affecting the security and efficacy of connected networks. Differences in the internet governance and data policies of the United States and some major trading partners, such as People's Republic of China (PRC or China) and the European Union (EU), are creating a growing set of trade barriers for U.S. firms seeking to do business abroad. Trade barriers include, for example, rules and regulations governing foreign investment, market and network access, e-commerce, and data collection and usage. The United States generally advocates a free and open internet, using standard-setting forums and other means of international cooperation to ensure non-discriminatory market access, advance common emerging technology standards, promote collaborative open-source architecture, and influence the internet regimes of trading partners balanced with other public policy objectives, including national security. Trade agreement negotiations present an opportunity to remove trade barriers and establish common trade rules and disciplines to achieve U.S. negotiating objectives. Across the globe, U.S. and other bilateral and plurilateral agreements have created a plethora of overlapping and often inconsistent rules between various trading partners. The lack of multilateral rules on digital trade is a key focus of U.S. trade policy. Ongoing e-commerce negotiations at the World Trade Organization (WTO) provide a significant opportunity to establish enforceable multilateral rules that align with U.S. policy priorities and help bridge growing differences in national rules and trade treatments. However, such negotiations face inherent challenges, including possibly divergent, and even conflicting, positions. Congress has a strong interest in the rise of the varying internet regimes and their current and potential impact on U.S. digital trade and the economy. Through legislation and oversight, Congress can directly and indirectly shape U.S. internet policy and official positions in trade negotiations and international standard-setting forums. Congress pro-actively established U.S. digital trade negotiating objectives for trade agreements and has supported provisions in free trade agreements (FTAs) to address the lack of multilateral digital trade rules and market opening commitments, most recently in the U.S.-Japan trade agreement and the U.S.-Mexico-Canada Agreement (USMCA). Congress can also influence U.S. positions in the ongoing WTO negotiations. This report will compare some aspects of various national internet regimes and then examine the ongoing WTO e-commerce negotiations and certain international forums that present an opportunity to establish global rules and technology standards and to minimize or prevent potential problems created by diverging systems. While no single definition or measure of the digital economy exists, according to the Bureau of Economic Analysis, the \"digital economy\" accounted for 6.9% of U.S. GDP in 2017, including (1) information and communications technologies (ICT) sector and underlying infrastructure; (2) digital transactions or eâcommerce; and (3) digital content or media. According to the ITC definition, laptop sales are included in digital trade as is the transmission of an email or online purchase, but the t-shirt a consumer may order online is not. From agriculture and manufacturing to healthcare, the collection, exchange, and processing of data is transforming and increasing productivity across the economy. Data is traded as end products (e.g., music file, marketing tools), inputs for producing digital and physical goods and services (e.g., 3D printing file, Uber), or sources of information leading to further action (e.g., real-time supply chain analytics). New data is created every day by individuals sending text messages, sharing photos, or searching online, by automated machine-to-machine transmissions in manufacturing, or by vehicles in connected transportation systems. According to one calculation, 2.5 quintillion bytes (or 2.5 x 10 18 ) of data are produced daily. To put that number into context, 2.5 quintillion bytes of data would fill 10 million blu-ray discs, the height of which stacked would measure the height of four Eiffel Towers on top of one another. At the other extreme, a single short text message could represent 21 bytes and a single high-definition movie could require 4 million bytes. The digital economy depends on data flows to send data between individuals, organizations or devices, often crossing national boundaries. For example, in 2017, approximately 12% of international trade of physical goods was facilitated by e-commerce and almost 20% of China's imports and exports was enabled by digital platforms. A separate study showed that digital products accounted for 70% of the U.S. services trade surplus in 2017. Cross-border data flows grew by a factor of 45 between 2005 and 2016 and continue to expand. The volume of global data flows is growing faster than global trade or financial flows, and its positive GDP contribution offsets the lower growth rates of trade and foreign direct investment (FDI). The global \"datasphere\" is expected to grow from 33 Zettabytes (ZB) in 2018 to 175 ZB by 2025. One study predicts there will be more than 150 billion connected devices across the globe by 2025. Today, China has the fastest-growing regional datasphere, while the U.S. datasphere is relatively mature, with an already high penetration of people online. As China and other regions' dataspheres expand, the United States' and EU's relative shares of the global datasphere will decline (see Figure 1 ). As the volume and importance of data grows, policymakers are increasingly interested in how data is gathered, stored, and used, and how to best balance policy goals and objectives, such as supporting international trade flows and protecting personal privacy. The future growth of the global digital economy and digital trade specifically will be shaped by the policies that govern global data flows and other internet-related rules set at national, regional, and multilateral levels. China's expected digital growth, in particular, may increase its ability to shape the rules of the global datasphere, which may not align with U.S. interests and could create additional trade barriers (see \" The People's Republic of China (PRC) \"). The ICT sector is experiencing a convergence between technical spheres that had previously been separate and independent technologies: telecommunications, media and consumer electronics, and information technology (computers) (see Figure 2 ). The ability to stream videos on multiple devices (e.g., television, tablets, mobile phones) demonstrates the convergence of technologies and previously separate services. Separate policies, technical standards and protocols traditionally governed each sub-sector, but today companies that provide services across all sectors and the governments that traditionally regulated these services separately must wrestle with how best to govern the converged spheres. Although there are common technical protocols governing the flow of traffic, interconnections, and data transfers across networks, there is no single set of international rules or disciplines that govern key digital trade issues such as electronic contracts or cross-border data flows, and the topic is treated inconsistently, if at all, in trade agreements. The lack of multilateral rules governing the digital economy has led, on the one hand, to countries creating diverging national policies and, on the other hand, to efforts to establish common global rules. Countries may seek common rules on some digital issues, such as technical standards, but set different national rules on others (e.g., privacy, data protection) to reflect domestic priorities or cultural norms. Governments may also try to shape international standards and norms to benefit their domestic industries. The emergence of national internet regimes that govern and divide the global datasphere raises a number of issues. First, national regimes allow a government to create rules and policies that advance domestic priorities and reflect local norms. Without shared rules or interoperability between national regimes, differing requirements for internet and data governance can lead to increased trade and investment barriers, which can restrict the willingness and ability of businesses and consumers to enter some markets. U.S. firms offering services that can be traded remotely using the internet or another digital network (so-called \"potential\" ICT-enabled [PICTE] services) can be blocked from markets with discriminatory restrictions in place. For example, many U.S. firms' inability to access the Chinese online market raises growing concerns about discrimination and protectionism, as other countries may emulate China and its internet regime. Second, the existence of globalized supply chains that dominate international trade may be threatened if rules governing national or regional dataspheres do not provide for reciprocity or limit companies' ability to share data with global subsidiaries, partners, or customers. Disrupted trade and global supply chains could not only result in limited growth of individual companies, but could also impede a country's economic competitiveness if participation is limited to those entities within what amounts to a virtual trading bloc. For example, Qualcomm might not be able to sell its chips to some countries if the technical requirements vary nationally, or John Deere might not be able to service customers in certain markets if data flows with its U.S. headquarters are blocked. Similarly, the diffusion of knowledge and potential gains from emerging technologies that depend on global economies of scale could be impeded by diverging standards or regulations that create artificial borders and constrain data aggregation thereby, for example, diminishing effective development of artificial intelligence and machine learning which depends on collecting and processing vast volumes of data. Third, as in other areas of international trade, the party(ies) that ultimately set the global internet rules and technical standards for data and emerging technologies will gain first-mover advantage. Past industry experience suggests that companies who are the first to market new technologies often capture the bulk of the revenues. To that end, some governments have actively promoted their domestic policies in an effort to convince other countries to adopt similar regimes that may not align with U.S. policies and priorities. For example, China promotes its national standards and technologies through international sales of its domestic technologies based on domestic technical standards, particularly in Africa and Latin America. Furthermore, some countries in these regions have begun to import China's internet-sovereignty policies, a form of what some consider to be digital authoritarianism (see discussion below). The EU also aims to set global standards on competition and privacy through its rules and enforcement actions that compel multinational technology firms to change behavior and adjust business models. For example, the EU actively promotes its data privacy regime by requiring that trading partners have \"adequate\" domestic data privacy regimes (as judged by EU authorities) to allow for the bilateral free flow of personal data that many companies depend on to operate. Individual EU countries may impose further requirements for security purposes that could further constrain a business's operations. Varying policy approaches and the lack of global rules and consensus have resulted in a diversity of digital trade rules that will grow in complexity as the digital economy expands. Some analysts predict that the inconsistencies and diversity in rules and regulations may create hard splits between different dataspheres leading to digital trading blocs. Ongoing e-commerce negotiations at the WTO aim to set a common foundation of trade rules and disciplines and could lead to interoperability mechanisms to build bridges between differing internet regimes. While internet policies evolve at national levels and WTO e-commerce negotiations are ongoing, multiple international forums are discussing internet governance issues with active participation from the U.S. public and private sector. These forums often may identify best practices, principles, and frameworks but do not necessarily lead to enforceable rules (see text box International Discussions of Internet Norms ). Maintaining a global network that is open, interoperable, reliable, and secure is a stated policy priority for the U.S. government. Some Members of Congress have introduced bills supporting an open internet and expanded global internet access (see, for example, H.R. 600 and H.R. 739 ). Congress recognized these priorities with respect to trade in its enhanced digital trade policy objectives for U.S. trade negotiations in the Bipartisan Congressional Trade Priorities and Accountability Act of 2015 ( P.L. 114-26 ), or Trade Promotion Authority (TPA), signed into law in June 2015. The proposed USMCA made progress on these objectives, establishing a legal framework for an open North American digital economy that ensures cross-border data flows and protects consumers and data privacy, among its many provisions. Under the proposed USMCA, the United States, Mexico, and Canada agreed to a common set of digital trade rules, which may serve as a template for future U.S. FTAs. According to USTR, the new U.S.-Japan digital trade agreement, signed in October 2019, \"meets the gold standard on digital trade rules set by the USMCA.\" The provisions in the USMCA and U.S.-Japan agreement build on the digital trade rules agreed under the proposed Trans-Pacific Partnership (TPP), now in force under the Comprehensive and Progressive Agreement on Trans-Pacific Partnership (CPTPP or TPP-11) among 11 countries, not including the United States. Mexico, Canada, and Japan are all members of the TPP-11. The TPP-11 rules have some clear differences from those in EU or Chinese FTAs. For example, the TPP-11 agreement provisions ensure open cross-border data flows while EU and Chinese FTAs exclude similar provisions. No single federal entity has primacy on all aspects of the digital economy, and the United States has not taken a holistic domestic approach to regulating the digital economy or governing the internet. As noted for a congressional hearing on internet architecture and the multiple federal agencies involved in safeguarding it domestically, unlike some other countries, \"the [U.S.] government does not manage the internet, nor direct its use, but rather sets the laws, policies, and procedures for the private sector, academia, and individuals to follow in their use of the internet.\" The United States and China are the lead economies setting and attempting to export their rules and are often seen as the two ends of the policy spectrum. Other countries are forming national approaches that reflect their own domestic priorities. China presents a number of significant opportunities and challenges for the United States in digital trade. China aims to be a \"cyber superpower,\" and its trade and internet policies reflect state direction and industrial policy, limiting the free flow of information and individual privacy and discriminating against foreign companies. The Chinese government has sought to advance its views on how the internet should be expanded to promote trade, but also to set guidelines and standards over the rights of governments to regulate and control the internet, a concept it has termed \"Internet Sovereignty.\" The Chinese government appears to have first advanced a policy of \"Internet Sovereignty\" around June 2010, when it issued a white paper titled \"the Internet of China,\" which stated the following: Within Chinese territory the Internet is under the jurisdiction of Chinese sovereignty. The Internet sovereignty of China should be respected and protected. Citizens of the People's Republic of China and foreign citizens, legal persons and other organizations within Chinese territory have the right and freedom to use the Internet; at the same time, they must obey the laws and regulations of China and conscientiously protect Internet security. Analysts characterize \"cyber sovereignty\" or \"internet sovereignty\" as an organizing principle of internet governance that contrasts with the U.S. support for a global, open internet. As one analyst stated, \"the Chinese internet governance model is the first real challenge to a free and open internet.\" China is clear in its position that: the principle of sovereigntyâ¦ also includes cyberspace. Countries should respect each other's right to choose their own path of cyber development, model of cyber regulation and Internet public policies, and participate in international cyberspace governance on an equal footing. A multitude of Chinese rules and initiatives illustrates the government's efforts to achieve cyber sovereignty. China benefits from a tightly controlled domestic system that not only allows the government to maintain strict controls on information dissemination, but also protects its market to the advantage of Chinese domestic economic players. When compared with the United States, China does not clearly separate the state from the economy. In 2016, citing national security justifications, China released its National Cybersecurity Strategy Report, which stated that its authorities would \"firmly defend the cyber sovereignty of China using all means including economic, administrative, scientific, legal, diplomatic and military ways.\" China's state control over the internet and its use of digital technologies to control its domestic population, including through extensive digital surveillance and harvesting of big data for its social credit system, has been termed \"digital authoritarianism\" (see text box U.S. Policy and Chinese Digital Authoritarianism ). The PRC social credit system includes two connected but distinct systems: a system for monitoring individual behavior, still in the pilot stages, and a more robust system for monitoring corporate behavior. Each firm's social credit profile is the aggregate of potentially hundreds of data points compiled into a central database developed by China's National Development and Reform Commission. Data disclosure requirements under the new social credit system may obligate firms to provide the Chinese government with sensitive data, such as personnel information or technological know-how. Multinational firms in China are already subject to the system's data reporting requirements; they have raised concerns that certain provisions and rating criteria could be used to discriminate against multinational firms (including for political purposes) lead to a more opaque market access regime, and increase compliance costs. China's so-called \"Great Firewall\" censors or blocks many foreign websites or mobile apps, as well as content the government considers subversive. According to Freedom House, a U.S.-based non-governmental organization, China was the worst abuser of internet freedom in 2018. Differences between what U.S. and Chinese users can access on the same online platforms furthers the split of the Chinese internet regime from the rest of the world and raises concerns about access to information and freedom of speech. China's national internet governance regime is underscored by its recently-passed Cybersecurity Law, as well as other regulations that raise a variety of concerns for U.S. firms doing business in China. For example, companies are obliged to provide the government with full access to their proprietary data, if requested. The law's rules include requirements for: storing data locally and limiting cross-border data flows; cybersecurity testing and reviews of \"critical network equipment\" and \"critical information infrastructure\" operators by government authorities; and the use of \"secure and controllable\" technology in certain sectors mandating suppliers purchase Chinese products among other limitations. Fearing they could potentially lose control of their intellectual property and proprietary data, many U.S. firms have opted not to enter or faced constraints to remain in the Chinese market. Some foreign firms with customers in China try to address concerns about potential government access to their proprietary data by segregating data transiting to or through China from the rest of their business. This may require U.S. firms to partner with local Chinese firms such as through joint ventures. For example, Apple is unable to offer many of its newer services within China and its iCloud service is available only through a local government-backed provider. China's policies also raise concerns among some U.S., EU, and other government officials and company executives about Chinese companies operating overseas or on a cross-border basis using business models that give Chinese firms access to sensitive data. If Chinese companies need to follow domestic Chinese laws and Chinese government directives, U.S. and other officials fear that sensitive data involving their citizens and corporate entities could be exposed to the Chinese government. China also exports domestically-produced technologies, including security cameras, telecommunications hardware, and internet filtering software, to other countries where governments may seek not only to increase security but also to exert greater control over populations and contain internal dissent. Analysts disagree as to whether China is aggressively exporting digital authoritarianism as an overarching internet governance system, including sales of the enabling technologies and underlying infrastructure to potentially provide Chinese authorities access to data. The alternative is that China is simply promoting domestic industry exports. Regardless of intent, the results in countries that import Chinese goods, services, and policies show how China's technology exports are expanding the country's influence in ICT markets and international standards forums in ways that advance Chinese goals and norms. China also uses its domestic technical standards to separate itself from the broader international community. China, for example, exports its ICT products and services, as well as its technology standards, through projects under its Belt and Road Initiative and, in particular, its Digital Silk Road. China promotes indigenous innovation of technology and investment in domestic research and development projects (R&D) in emerging technologies like artificial intelligence and fifth-generation telecommunications (5G), the future backbone of the internet of things (IoT). Procurement contracts in China require or prefer domestic standards to international ones and/or require domestic production of ICT equipment. In recent years, China has increased its participation in international standards-setting bodies such as the International Organization for Standardization (ISO); its assumption of leadership positions in these organizations illustrates China's efforts to balance its isolationist tendencies and cyber-sovereignty policies with the potential economic gain that comes from international engagement and shaping global standards (see \" Standards Development \"). The EU approach to internet governance, including digital trade, is less state-controlled than China's internet regime, but more regulatory and prescriptive than the current U.S. approach. The EU seeks to establish itself as a technology leader and set its own mark on global internet norms. EU Commission president Ursula von der Leyen outlined her priorities for her new executive vice-president for a digital age and stated, \"[w]e have to work hard on technological sovereignty.\" The EU Council's June 2019 strategic agenda echoed these sentiments: We need to ensure that Europe is digitally sovereign and obtains its fair share of the benefits of this development. Our policy must be shaped in a way that embodies our societal values, promotes inclusiveness, and remains compatible with our way of life. To this end, the EU must work on all aspects of the digital revolution and artificial intelligence: infrastructure, connectivity, services, data, regulation and investment. This has to be accompanied by the development of the service economy and the mainstreaming of digital services. The same document refers to the need for a level playing field in trade and highlights the importance of \"ensuring fair competition, reciprocity and mutual benefits\" in trade policy. The EU will need to balance its goals of achieving technological sovereignty without isolating the region to achieve gains from expanded international trade that require interoperability and open access and data flows. An EU Commission document frames Europe's technological sovereignty, itself an emerging and undefined term, as an initiative within a broader EU industrial strategy. The document specifically tasks the new executive vice president with \"striving for digital leadership\" while preserving the \"European way.\" EU officials characterize the region's internet regime as a third way between those of the United States and China. Some in the EU support a policy of cyber sovereignty and an independent European internet architecture. As one commentator stated, \"If there is an American internet and a Chinese internet, there should also be a European one â a framework in which Europeans can make their own decisions about data and privacy, free expression and state security, and taxation and competition.\" Critics see the EU's desire for internet sovereignty as driven by protectionist and anti-competitive motives to incubate and grow European champions in the digital sphere that can effectively compete against large U.S. and Chinese internet firms. Others view the EU effort less antagonistically, noting German chancellor Angela Merkel's statement that \"we need to commit ourselves to protecting the core of the internet as a global, public good.\" Merkel clarified her vision of European cyber sovereignty stating, \"on the one hand, we want to preserve our digital sovereignty while on the other hand, we don't want to isolate ourselves but act multilaterallyâ¦ In my understanding, digital sovereignty does not mean protectionism or state authorities deciding what kind of information can be disseminated â which is censorship â but it rather describes the capability to shape the digital transformation, both as an individual and as a society.\" In defining the \"European way,\" the EU has set precedents in some areas of the digital economy. Examples of major EU digital initiatives with global implications that may impact U.S. firms doing business in the EU include the following: EU General Data Protection Regulation (GDPR) . The GDPR, which took effect on May 25, 2018, establishes a set of binding and enforceable rules for the protection of personal data throughout the EU. The GDPR seeks to strengthen individual fundamental rights and facilitate business by ensuring more consistent implementation of data protection rules EU-wide. With no multilateral rules on cross-border data flows, some experts contend that the GDPR may effectively set new global data privacy standards, since many U.S. and foreign companies and organizations are striving for GDPR compliance to avoid being shut out of the EU market, fined, or otherwise penalized. In addition, some countries outside of Europe (e.g., Brazil) are imitating all or parts of the GDPR in their own privacy regulatory and legislative efforts whether on their own initiative or at the EU's behest. Cloud-hosting Services . The German Economy Ministry, with support from other EU leaders, is working to develop a cloud-hosting service (Gaia-X) to provide European government agencies and companies a European alternative to U.S. and China-based cloud service providers, such as Amazon Web Services or Microsoft. According to the ministry, the aim is to ensure European users that the data is \"sovereign\" and not subject to potential (mis)use by foreign law enforcement or intelligence services, or being blocked for political reasons such as a trade dispute. In a similar effort to limit its current dependence on U.S. technology companies, France's Interior Ministry is planning to offer an internal government cloud service known as Nextcloud. Digital Single Market (DSM). EU policymakers are attempting to bring more harmonization across the region and break down barriers among EU countries under the DSM initiative. The DSM is an ongoing effort to unify the EU market, facilitate trade, and drive economic growth through technology and digital trade. The EU has rolled out multiple initiatives and rules under the DSM, with which any firm doing business in the EU must comply. It is not clear how the DSM initiatives will align with U.S. policy and norms. For example, a new Digital Services Act will provide for uniform rules for online platforms and digital services, including rules on intermediary liability, updating various sets of existing rules in the EU. Others stakeholders raise concerns that platform regulation may limit competition and favor EU entities. Digital Services T axes (DSTs) . Several countries in Europe, and the European Commission, have proposed or adopted taxes on revenue earned by multinational corporations (MNCs) in certain \"digital economy\" sectors from activities linked to the user-based activity of their residents. These proposals have generally been labeled as DSTs. Proponents of DSTs argue that digital firms are \"undertaxed.\" U.S. critics, in particular, see DSTs as an attempt to target U.S. tech companies, especially as minimum thresholds are high enough that only the largest digital MNCs, which tend to be American, would be subject to the tax. Without a multilateral agreement or an EU-wide rule, DST policies vary across European countries. Countries outside the EU, such as Canada, are also considering implementing a DST. Some countries are implementing domestic DSTs while multilateral negotiations on digital service taxes are occurring under the Organization for Economic Co-operation and Development (OECD). These EU initiatives may add to current heightened tension in the U.S.-EU trade and economic relationship. New U.S.-EU trade negotiations could de-escalate tensions and address internet governance issues, but no agreement exists on the scope of potential bilateral trade negotiations although discussions continue. Despite common rules across the EU, the United Kingdom's (UK's) future internet regime after the country's withdrawal from the EU (\"Brexit\") is unclear. The UK has stated that it will continue to follow GDPR, but would need an adequacy decision by the EU to prevent disruptions to the free flow of personal data between the EU and the UK. Without such a decision, individual organizations would have to use other means specifically approved by the EU to transfer personal data between the UK and EU (e.g., standard contractual clauses). The EU is set to evaluate the UK data protection framework in 2020. UK leaders seek regulatory autonomy from the EU post-Brexit in some areas and alignment with the EU in others, but it is not clear if and how potential UK regulatory changes would affect internet policy or if any changes by the UK would align it more closely with U.S. policy. Differences in U.S. and UK internet policies will likely need to be addressed in any future bilateral trade negotiations. While some countries may use the U.S. or Chinese approach to internet governance as a model, often they seek to balance these influences with their own domestic policies and priorities. Across the spectrum between U.S. and Chinese internet policies lie a variety of national policies neither as open as the former nor as closed as the latter. Other countries often wish to retain trading and investment relationships with both U.S. and Chinese partners. India and Vietnam illustrate two such examples. India is seeking to become a technology leader and has asserted itself on the international stage while protecting its domestic industries. On the one hand, India seeks to aggressively export technology services and prioritizes opening access to foreign markets for specific types of services in trade negotiations so that Indian technology workers can work abroad. On the other hand, India uses protectionist rules and regulations to shield its domestic industry from foreign competition. For example, India's draft e-commerce policy is intended to favor domestic entities through requirements for local data storage and national standards, among other provisions. Additional policies under consideration by the Indian government would restrict international e-commerce platforms operations and would require them to adjust their supply chains. India has cited security as the rationale for its draft Personal Data Protection Bill, which would also establish broad data localization requirements and limit cross-border transfer of some data. At times, India has taken steps to curb internet freedom, such as temporarily shutting down mobile networks or blocking social media apps in certain regions, justifying such as actions as an attempt to halt disinformation. Although India joined the WTO Information Technology Agreement to eliminate tariffs on ICT goods such as multi-component semiconductors, it has since begun imposing tariffs on some ICT imports. The EU filed for consultation with India over the tariffs in 2019, the first step in WTO dispute settlement. The United States and five other WTO members have since joined the request. In addition, India does not support extending the temporary WTO moratorium on tariffs on electronic transmissions that will expire in mid-2020. India's ability to block a consensus decision to continue the moratorium may increase the pressure to address the topic in the ongoing WTO e-commerce negotiations. To date, India has elected not to participate in the plurilateral negotiations (see below). Due to concerns about Indian market access restrictions on U.S. exports, in 2019, President Trump terminated India's eligibility for the U.S. Generalized System of Preferences (GSP), which gives duty-free tariff treatment to certain U.S. imports from eligible developing countries to support their economic development. To address frictions in the trading relationship, the two countries began bilateral trade discussions to address key U.S. concerns regarding access to India's market. Negotiations are ongoing and it is unclear whether they will address nontariff barriers to digital trade, such as data localization requirements and other internet rules. Vietnam is adopting elements of the Chinese internet approach in some policy areas. For example, in June 2018, Vietnam passed its Law on Cybersecurity with requirements for data localization and access to information by Vietnamese authorities on the grounds of national security, among other provisions. At the same time, Vietnam is liberalizing its economy and seeking to gain from the U.S.-China trade war as U.S. companies relocate their supply chains from China to other nearby Asian destinations. To spur economic growth and integration, Vietnam joined TPP-11, which went into effect in January 2019. However, the country has a two-year grace period before being subject to dispute settlement for parts of the e-commerce chapter, including provisions on cross-border data flows and localization prohibitions. U.S. firms and others will be watching to see how Vietnam reconciles its current restrictive internet with its TPP-11 commitments for open data flows. Vietnam could, for example, create carve-outs or relax the requirements of its cybersecurity regulations, or it could maintain the rules and claim national security as a legitimate public policy objective and exemption under TPP-11. Vietnam also appears to be aligning with the United States in the telecommunications sector. For example, Vietnamese providers are refraining from purchasing 5G equipment from Chinese suppliers, noting concerns voiced by U.S. cybersecurity officials (see text box Standards, 5G, and National Security ). The Vietnamese government has not taken a formal position in favor of western or Chinese telecommunications equipment and standards. Trade negotiations are a tool to create binding and enforceable rules and disciplines to promote international trade and bridge differing internet regimes. No comprehensive agreement on digital trade exists in the WTO as the General Agreement on Trade in Services (GATS) entered into force in January 1995, before the explosive growth of global data flows and digital trade. Initially, digital trade was a niche concern, primarily focused on trade in ICT goods and e-commerce. Certain WTO agreements cover some aspects of digital trade, such as the WTO Information Technology Agreement (ITA) on tariffs. As noted, since 1998, WTO members have also agreed to a moratorium on customs duties for electronic transactions. Although the ban is temporary it has been continuously renewed, most recently until the next ministerial conference in June 2020. As the WTO ITA and e-commerce moratorium illustrate, multilateral trade negotiations to date focused mainly on tariffs and non-discrimination, as well as broad statements of cooperation. Non-tariff barriers were broadly left unaddressed and standards development were left to technicians and academia. As internet-connected technologies continue to evolve, many emerging areas still lack common definitions, standards, and metrics. Today, standards conversations attract a wide range of stakeholders and WTO plurilateral negotiations provide an opportunity to set new international rules and disciplines for digital trade. Recent bilateral and plurilateral trade agreements have begun to incorporate commitments on the digital economy, adding to the complex mixture of international trade rules that companies must follow. Although the various FTAs differ in their scope and participants, their provisions can provide ideas and templates for broader WTO negotiations. While not every country participates in an FTA with digital trade rules, all countries are involved in the digital economy and have a stake in shaping its future growth. Over 75 countries, including the United States, are participating in ongoing WTO e-commerce negotiations aiming to establish a global framework and obligations that enable digital trade in a nondiscriminatory and less trade restrictive manner. Participants released the Joint Statement on Electronic Commerce at the 11thÂ WTO Ministerial Conference in December 2017 announcing their intent to \"initiate exploratory work together toward future WTO negotiations on trade-related aspects of electronic commerce.\" Australia, Japan, and Singapore are coordinating the initiative, known as the Joint Statement Initiative or JSI and participants include both developed and developing countries. Negotiations began in January 2019, initially focused on information exchanges, education, and outreach, especially to developing country members who expressed interest but may not yet have developed a clear domestic digital trade agenda or policy. Multiple parties have submitted proposals outlining their positions and desired scope for the negotiations. The proposals reflect the diversity and evolving state of internet regimes globally. Some developing countries have opted not to participate, including India and South Africa, who want to protect their flexibility and policy space. These parties may not want to commit to an agreement that may constrain their efforts to incubate, or protect, domestic industry or to raise potential tariff revenue on digital products. However, it is not clear why some countries, such as Vietnam, that have agreed to digital trade commitments in other FTAs (such as TPP-11) are not taking part, though they may do so later. The United States was one of the first parties to submit an initial discussion paper for the WTO e-commerce talks. The U.S. discussion paper includes \"trade provisions that represent the highest standard in safeguarding and promoting digital trade\" and reflects the U.S. support for a market-driven, open, interoperable internet under a multi-stakeholder system. The paper builds on and enhances many of the commitments contained in TPP/TPP11 that were further refined in USMCA. Key provisions in the U.S. proposal include trade rules to: protect cross-border data flow and prevent data localization mandates; ensure fair treatment of digital products; protect proprietary information, including protecting source code and prohibit forced technology transfer; collaborate on cybersecurity; and facilitate internet services and trade. For financial services, the proposal includes the same compromise included in the USMCA to prohibit data localization, provided that regulators have adequate access. The U.S. proposal also includes the USMCA provisions requiring that parties adopt or maintain a legal framework to protect personal information and encourages the development of interoperability mechanisms, though it does not specifically reference the APEC work on privacy. In line with recent U.S. FTAs, the U.S. proposal includes protecting internet intermediaries from liability for hosting content, a topic of ongoing congressional debate. China's proposal focuses on facilitating e-commerce and global value chains as a means to help WTO members, especially developing countries, benefit from digital trade. It reflects its state-driven model. In contrast to the U.S. desire for an ambitious, high-standard agreement, China believes negotiations should \"set a reasonable level of ambition\" given members' varying levels of industry development, as well as historical and cultural traditions. China advocates respect for parties' differing policies on internet sovereignty, data security and privacy protection, and wants to allow for other regulatory measures to achieve \"reasonable public policy objectives.\" In China's view, data flows, data storage, and treatment of digital products should be subjects for exploratory discussions rather than solid commitments. Development needs like bridging the digital divide and capacity building are highlighted throughout the Chinese proposal. Seemingly in response to U.S. restrictions on trade with Chinese firms such as Huawei, a second proposal from China focuses on preventing members from limiting or blocking trade in ICT equipment and products. China's proposal reflects its visions of a world with separate national internets, in which international agreements allow sovereign states to maintain control and impose additional restrictions on firms within their borders. The limited overlap between the U.S. and Chinese proposals illustrates the difficulties negotiators will need to overcome to achieve a meaningful outcome. The EU proposal falls between the U.S. and Chinese proposals. The EU seeks a \"comprehensive and ambitious set of WTO disciplines and commitments\" including provisions on e-commerce, consumer and personal data protection, and intellectual property protection. The EU advocates revising the outdated WTO Reference Paper on Telecommunications Services to better promote competition, something not mentioned in the U.S. proposal. The proposal also reflects the EU domestic policy emphasis on protecting personal privacy. Though the EU proposes allowing cross-border data flows and prohibiting localization requirements, it also allows members to \"adopt and maintain the safeguards they deem appropriate to ensure the protection of personal data and privacy, including through the adoption and application of rules for the cross-border transfer of personal data.\" Some analysts see the exception as nullifying the commitment to cross-border data flows. Other countries have put forth proposals reflecting their own domestic policies. The majority of proposals seek to extend the moratorium on duties on electronic transmissions and contain provisions on consumer protection and security. In general, the proposals represent an attempt to bridge the limited Chinese and open U.S. proposals. Industry in general supports the ongoing plurilateral negotiations as a means both to attain enforceable rules and provide the certainty needed for business operations and to expand international trade. One international coalition of information technology industry groups, for example, published its priorities for the negotiations including: open cross-border data flows, prohibiting tariffs and taxes on data flows and ICT goods, protection of source code, algorithms, and encryption, among other provisions. The Global Services Coalition similarly endorsed the WTO e-commerce negotiations to promote trade in services and digitally enabled services. In general, the USMCA, U.S.-Japan agreement, and U.S. proposal reflect the provisions sought by industry, with exceptions to achieve legitimate public policy objectives in a least trade-restrictive manner. On the other hand, one coalition of civil society organizations opposes the ongoing WTO negotiations, believing that any agreement would favor large multinational technology companies at the expense of developing country entrepreneurs and workers. Another civil society group stated that negotiations should focus on transparency, consumer protection and consumer rights, promoting competition, ensuring dispute resolution, and securing citizen access to their online data. It also warned, however, that data protection, privacy, net neutrality, artificial intelligence, and cybersecurity should not be part of a trade agreement. Some consumer groups have engaged constructively with WTO representatives to advocate for transparency in the negotiations and multi-stakeholder dialogues. A clear consensus among the consumer groups on how to address the issues of data privacy and data flows has yet to emerge. The parties aim to streamline proposals into a common text ahead of the next WTO ministerial conference in Kazakhstan in June 2020. Given the diversity of the parties' positions and national regimes, the negotiations will need to address controversial issues to achieve a meaningful agreement. Some hope that significant progress and some level of political agreement are possible by then, although the parties will likely require more time to reach an agreement with meaningful and enforceable obligations. Clear commonalities, as well as differences, appear among the proposals, foreshadowing likely controversies and challenges as the negotiations move forward. These include: E-signatures, e-contracts, and related measures to facilitate e-commerce and protect consumers will likely attract wide consensus from all parties. The U.S., Chinese, and EU proposals all include an extension of the WTO temporary moratorium on customs duties on electronic transmissions , but their positions, as well as those of other members, vary as to whether it should be made permanent. Digital services taxes , such as those in place in various EU countries and under consideration in some EU and non-European countries, may be addressed directly or could be excluded from the final trade agreement and left for ongoing OECD negotiations that cover broader international tax issues. The United States and some other parties seek broad protections for cross-border data flows and prohibitions on d ata localization requirements . Other parties support open data flows but under a narrower scope (e.g., for certain sectors or types of data) or with broader exceptions. As noted, China does not want to include any commitments related to data flows. Personal data privacy will be among the most difficult issues. While privacy preferences and rules affect trade, privacy policies and concerns are broader than international trade and trade agreements, for example, affecting medical or financial regulation. The agreement could also address interoperability mechanisms (e.g. certification schemes, contracts, or other data-specific agreements) in addition to or instead of identifying specific privacy protections or obligations. Cybersecurity provisions, if included, could include specific commitments to prohibit or allow certain actions or policies, or may focus on cooperation between the parties. As in every negotiation, the parties must balance creating obligations to facilitate trade with respecting parties' sovereignty. Maintaining sufficient flexibility and policy space may be especially important for those members still determining their domestic digital agenda. Analysts expect that the plurilateral negotiators will have to decide between scope and inclusion. A narrow agreement with limited scope and provisions, such as those focused on e-commerce facilitation, would likely retain the greatest number of negotiating participants but could have less impact. On the other hand, a high-standard broad agreement with deeper commitments, such as that between the United States and Japan, may deter participants who are not yet willing or able to accept all the obligations. Possible approaches include the following. A staggered approach or early harvest could allow the parties to reach an early consensus on some less controversial issues, potentially providing a basis for further rounds of negotiations. Such an agreement would provide an early \"win\" and establish a common framework for future negotiation, but may not have a high level of impact in countering trade barriers or bridging disparate internet regimes. Some experts suggest a tiered agreement that contains provisions that all parties accept with additional voluntary commitments. For example, all parties may be willing to accept binding commitments on the less controversial issues (such as e-signatures). Another tier with more ambitious provisions, such as prohibitions on data localization, could be agreed on a non-most favored nation (MFN) or reciprocity basis so that only the subset of parties that undertake the obligation would receive that benefit. For example, if country A agrees to no data localization requirements, it may still impose such requirements on countries that do not undertake the same commitment. This type of agreement would create a common framework, but would not necessarily prevent the splitting of the internet into different \"dataspheres\" if major economies do not adopt higher-standard provisions. I nteroperability mechanisms could be created under the auspices of the WTO or existing systems could be expanded to allow for open data flows between different cybersecurity or data privacy regimes. S taged implementation and capacity building provisions have been included in other WTO agreements and may provide another way to provide flexibility and achieve both broad scope and inclusion. Such an agreement could allow certain parties, especially developing countries, more time to make domestic changes and implement commitments. Capacity building could also encourage all parties to commit to the more ambitious level of obligations. For example, the WTO Trade Facilitation Agreement (TFA) requires that \"donor members\" who do not require implementation assistance, such as the United States, provide the needed capacity building and support to developing and least-developed members. Members determine their own implementation schedules and progress in implementation is explicitly linked to technical and financial capacity. The TFA was the last concluded WTO multilateral agreement and implementation of members' commitments is ongoing. Standards development and international standards, while not part of trade policy, are often referenced in trade agreements given that standards help shape market access. The growth of international trade in ICT goods and emerging technologies relies on interoperability and international standards. Traditionally, technology companies and telecommunication providers saw value in developing international standards that enable technology companies to build to one standard worldwide, bring products to market faster, sell equipment globally, achieve economies of scale, and reduce the cost of equipment. As technologies develop and converge, standards development becomes more complicated and participation and interest in the process grows. According to the WTO Technical Barriers to Trade Committee, WTO members are mandated to use relevant international standards as the basis for regulation, with some exceptions, and not create unnecessary obstacles to international trade. U.S. FTAs refer to this \"TBT Committee Decision on International Standards\" in defining commitments on international standards. Using international standards encourages transparency, innovation, and flexibility; such standards can evolve as technologies and new best practices develop. Today, SDOs that develop these international standards (e.g., International Organization for Standardization (ISO), 3rd Generation Partnership Project (3GPP)) are drawing attention not only from ICT sector and academic participants, but also from industries that rely on ICT goods and services as well as government organizations. Standards development illustrates the divergence between the U.S. and Chinese approaches to ICT. China has a state-led approach to standardization. Under its Revised Standardization Law, effective in 2018, the Standardization Administration of China sets compulsory standards, but also endorses the adoption of international standards. In an effort to promote its industrial policies, develop domestic standards, and internationalize them, China has increased its participation in international standards development, especially for emerging technologies. While some stakeholders welcome China's participation, others question the benefits and risks of Chinese involvement in some of these forums. Some stakeholders raise concerns that China is pursuing a strategic and nationalist, rather than market-driven and best-of-breed-technology, focus because of the Communist Party of China's interest in protecting and advancing its values on a world stage. Analysts have pointed out that China shows a preference for multilateral institutions such as the U.N. or WTO in which each country has a single vote rather than U.S.-backed multi-stakeholder standards institutions (SDOs) with a wider range of participants and more diverse views that dilute governments' clout. Debate over international versus Chinese standards, for example, has dominated many SDO discussions on emerging 5G networks as competition arises between Chinese and Western technology companies. China directs Chinese industry's participation in global SDOs--including leading technical committees, hosting forums, conducting 5G R&D, contributing to 5G specifications--and in international projects. China's industry and academic participants are state- controlled entities and typically work to institutionalize Chinese national standards at the global level. As a counterweight, some U.S. stakeholders advocate for increased participation by U.S. officials in SDOs and government resources for U.S. business and non-government participants to help maintain U.S. leadership in the development of emerging technologies. The Trump Administration echoed these sentiments in Executive Order (EO) 13859, stressing the importance of U.S. leadership in developing technical standards for AI. In response, the National Institute of Standards and Technology (NIST) issued a plan for federal engagement in AI standards calling for the U.S. government to \"commit to deeper, consistent, long-term engagement in AI standards development activities to help the United States to speed the pace of reliable, robust, and trustworthy AI technology development.\" Given the critical and growing role of the internet to the U.S. economy, Congress has a policy and legislative interest in the current divergence in national internet regimes and its impact on digital trade, future trade negotiations, standards-setting, and other major U.S. policy objectives. Key issues for Congress include: Examining the U.S. position in the ongoing WTO plurilateral e-commerce negotiations. Congress may explore the value of digital trade provisions in potential new bilateral trade negotiations. Exploring China's digital authoritarianism and its impact on the digital economy and global rules. This could include the effect on U.S. firms doing business in China, as well as the effect on other countries' internet regimes, including identifying which countries or sectors are emulating China's digital rules or technical standards. Congress previously held hearings on the threat to free speech and security aspects posed by PRC internet sovereignty. Examining efforts by the United States to counter China's digital policies. For example, investments by the new U.S. International Development Finance Corporation (DFC) could focus on telecommunications and internet infrastructure and policy. Some analysts have suggested that Congress establish a digital development fund dedicated to shaping global norms and developing countries' internet regimes. A bipartisan bill ( H.R. 1359 ) directs executive branch agencies to partner with domestic and foreign partners to \"encourage the efforts of developing countries to improve and secure mobile and fixed access to the Internet in order to catalyze innovation, spur economic growth and job creation, â¦ promote free speech, democracy, and good governanceâ¦ and the multi-stakeholder approach to Internet governance.\" Understanding the potential long-term impact of the splintering internet on the U.S. economy. Without agreement on the underlying rules or convergence on international norms, the risk of a fractured global internet increases. Congressional oversight could examine the value, both economic and political, of U.S. leadership and U.S. norms governing the global internet. Congress could consider asking the U.S. ITC to investigate the economic impact of this fracturing on U.S. businesses and consumers. Congress could analyze the different approaches and commitments related to internet governance contained in EU or Chinese FTAs, and how they differ from U.S. agreements and objectives. More immediately, Congress could examine the economic impact of the recent technology trade restrictions in China and other countries on U.S. companies. Overseeing ongoing efforts to establish global standards and rules through U.S. participation in SDOs, international forums, and recent and ongoing trade negotiations. For example, Congress could hold hearings on U.S. government and private sector involvement in standard-setting and China's increasing role in international standards discussions. Congress could probe executive branch agencies about specific U.S. objectives and engagement in ongoing negotiations related to internet governance and examine if the United States needs a clear strategy for outreach to international partners to build consensus on issues in advance of formal meetings and conferences. Similarly, Congress may consider promoting hosting of some standards meetings and international discussions so that more U.S. stakeholders could participate and provide direct feedback.", "summary": "From retail to agriculture or healthcare, digitization has affected all sectors and allowed more industries to engage with customers and partners around the globe. Many U.S. companies thrived in the initial online environment, which lacked clear rules and guidelines, quickly expanding their offerings and entering foreign markets. As the internet has evolved, however, governments have begun to impose national laws and regulations to pursue data protection, data security, privacy, and other policy objectives. The lack of global rules and norms for data and digital trade is leading to differences in these domestic internet regimes. Competing internet regimes and conflicting data governance rules increase trade barriers and limit investment flows and international commerce, restricting the ability of U.S. businesses and consumers to enter and compete in some markets. For example, foreign internet regimes may use national security regulations to block cross-border data flows, disrupting global supply chains and limiting the potential use of and gains from emerging technologies. The creation of national technology standards can also limit market access by foreign firms. As the digital economy expands, the diversity in digital rules is poised to grow in complexity and create new trade restrictions. The resulting patchwork of technical standards and national systems creates challenges for international trade, and may signal an impending fracturing of the global internet. Without agreement on global norms or common trade rules, some analysts foresee a splitting of the internet into distinct nation-led \"dataspheres\" and virtual trading blocs. The internet is global, governed by common technical protocols; it may also be regulated at the national level, although there is no international consensus on the proper role for governments. The lack of multilateral trade rules governing the digital economy has led to efforts to establish common global rules and norms. Over 75 countries, including the United States, are participating in World Trade Organization e-commerce negotiations, which aim to establish a global framework and obligations to enable nondiscriminatory digital trade. Proposals by the United States, the European Union (EU), and China illustrate the variation in member objectives, highlight potentially controversial issues, and raise questions about the likelihood of meaningful consensus. In general, the United States adopts a market-driven approach that supports an open, interoperable, secure, and reliable internet that facilitates the free flow of online information and supports other policy objectives such as privacy and national security. The EU, while supporting the role of the market and free flow of information also emphasizes the need for data protection, internal regional integration, and \"technological sovereignty,\" a recent and evolving concept in the EU. In contrast to the U.S. and EU approaches, which both emphasize the open global internet, China pursues a state-led approach that maintains a firewall between the Chinese internet and the rest of the world. China's government strictly controls the flow of information on its networks and restricts the companies who can participate in its digital economy. Many aspects of internet service and content in China are prohibited to U.S. firms. China is exporting its system through its direct export of goods and services, including surveillance technologies, and is trying to influence international standards and norms to allow space for China's model of strict state controls. Other countries, such as India and Vietnam, are building their own internet regimes, borrowing from the Chinese, European, and U.S. approaches. Congress has an interest in addressing growing protectionist policies and trade barriers, and in developing U.S. rules and standards for internet governance that promote digital trade and economic growth, balanced among other policy objectives. The divergence in national internet regimes and its impact on digital trade raises numerous complex issues of potential concern to Congress. These include whether to support initiating new bilateral trade negotiations specific to digital trade; how the United States can conclude a successful plurilateral WTO e-commerce negotiation that achieves greater reciprocity and market access for U.S. exporters and removes barriers to trade; how such an outcome can be balanced with other policy objectives; and whether federal engagement in and support for international standards-setting bodies is sufficient.", "document_type": "crs"}
{"report": "Thirty years after the June 1989 Tiananmen Square crackdown, the Chinese Communist Party (CCP) remains firmly in power. People's Republic of China (PRC) leaders have maintained political control through a mix of repression and responsiveness to some public preferences, delivering economic prosperity to many citizens, co-opting the middle and educated classes, and stoking nationalism to bolster CCP legitimacy. The party has rejected reforms that it perceives might undermine its monopoly on power, and continues to respond forcefully to signs of autonomous social organization, independent political activity, or social instability. The party is particularly wary of unsanctioned collective activity among sensitive groups, such as religious congregations, ethnic minorities, industrial workers, political dissidents, and human rights defenders and activists. Technological advances have enhanced the government's ability to monitor the activities of these groups, particularly Tibetan Buddhists and Uyghur Muslims. Some experts refer to the PRC model of governance as \"responsive authoritarianism\" or, in some aspects, \"consultative authoritarianism.\" Despite the government's many repressive policies, some reports indicate that many PRC citizens may appreciate the government's focus on stability, are generally satisfied with the government's performance, and are optimistic about the future, although the depth of their support for the government is unclear. CCP General Secretary and State President Xi Jinping's anti-corruption campaign, in which over 1.5 million party members have been punished and which is viewed by many experts as partly a political purge, appears to have gained widespread popular support. For part of the leadership term of Hu Jintao, who served as CCP General Secretary and State President from 2002 to 2012, the party tolerated limited public criticism of state policies, relatively unfettered dissemination of news and exchange of opinion on social media on many social topics, and some investigative journalism and human rights advocacy around issues not seen as threatening to CCP control. After consolidating power in 2013, Xi Jinping intensified and expanded the reassertion of party control over society that began during the final years of Hu's term, and strengthened his own control over the party. In high-profile speeches, Xi has repeated the maxim, \"The party exercises overall leadership over all areas of endeavor in every part of the country.\" In 2018, Xi backed a constitutional amendment removing the previous limit of two five-year-terms for the presidency, clearing the way for him potentially to stay in power indefinitely. Xi also has cultivated what some observers view as a cult of personality, launching far-reaching campaigns for Chinese citizens, beginning with pre-school, to study his political philosophy. Some analysts argue that Xi's efforts to bolster the party and his leadership reflect a heightened sense of insecurity rather than confidence in the CCP's ability to address internal and external threats, and that he and his supporters among the party elite have responded by choosing to \"clamp down and not loosen up.\" Since Xi's rise to power, the PRC government has introduced laws and policies that enhance the legal authority of the party and state to counteract potential ideological, political, and human rights challenges. In 2013, the CCP issued a directive (Document No. 9) that identified seven \"false ideological trends, positions, and activities,\" largely aimed at reining in the media and liberal academics. In 2015, the government launched a crackdown on over 250 human rights lawyers and activists, detaining many of them and convicting over a dozen of them of \"disturbing social order,\" subversion, and other crimes. PRC authorities targeted, in particular, legal staff of the Fengrui Law Firm in Beijing, which had taken on high profile human rights cases, and revoked the firm's business license in 2018. The government has also placed greater constraints upon environmental activism, which has been a relatively vibrant area of civil society, viewing it as a threat to social stability. Since 2015, the government has enacted new laws that place further restrictions on civil society in the name of national security, authorize greater control over minority and religious groups, particularly Uyghur Muslims, and reduce the autonomy of citizens. A law regulating foreign non-governmental organizations (NGOs), which took effect in 2017, places such NGOs under the jurisdiction of the Ministry of Public Security, tightens their registration requirements, and imposes greater controls on their activities, funding, and staffing. Some international NGOs that specialize in rule of law, rights advocacy, and labor rights have suspended their work in China. A new Cybersecurity Law, which went into effect in 2017, codifies broad governmental powers to control and restrict online traffic, including for the purposes of protecting social order and national security. The law also places a greater legal burden upon private internet service providers to monitor content and assist public security organs. A new National Intelligence Law, also enacted in 2017, obliges individuals, organizations, and institutions to assist and cooperate with state intelligence efforts. In 2016, President Xi launched a policy known as \"Sinicization,\" through which the government has taken measures to further compel China's religious practitioners and ethnic minorities to conform to Chinese culture, the socialist system, and Communist Party policies. Many analysts view this strategy as the CCP's response to what it perceives as excessive feelings of separateness and divided loyalties among some religious and ethnic groups. In April 2016, Xi presided over a conference on national religious affairs, the first Chinese president in over ten years to do so. He emphasized that the \"legitimate rights of religious peoples must be protected,\" but also stated, \"We must resolutely guard against overseas infiltrations via religious means.... \" At the 19 th Party Congress in October 2017, Xi emphasized, \"We will fully implement the Party's basic policy on religious affairs, uphold the principle that religions in China must be Chinese in orientation, and provide active guidance to religions so that they can adapt themselves to socialist society.\" The Revised Regulations on Religious Affairs, which took effect in February 2018, place an emphasis on religious and social harmony and the prevention of religious extremism and terrorism. The PRC Constitution provides for many civil and political rights, including, in Article 35, the freedoms of speech, press, assembly, association, and demonstration, and in Article 36, \"freedom of religious belief.\" Other provisions in China's constitution and laws, however, circumscribe or condition these freedoms, and the state routinely restricts these freedoms in practice. Under Xi's leadership, the government has further closed the space for free speech and silenced independent journalists. Authorities have used criminal prosecution, civil lawsuits, and other forms of harassment and punishment to intimidate and silence journalists and authors. Since 2013, China has dropped three places, from 173 to 177 (out of 180 countries), on Reporters Without Borders' World Press Freedom Index . The recent clampdown includes not only political speech but also \"vulgar, immoral, and unhealthy\" content. More than 60 journalists and bloggers currently are detained in China. In July 2019, a court in Sichuan province sentenced dissident Huang Qi to 12 years in prison for \"providing state secrets to foreign entities.\" In 1998, Huang had created \"64 Tianwang,\" a website that reported on sensitive topics, including government corruption and human rights violations. The PRC government, which operates one of the most extensive and sophisticated internet censorship systems in the world, blocks access to over 20% of the world's most trafficked websites, according to one source. Xi also has attempted to place greater controls on the use of censorship circumvention tools, such as virtual private networks (VPNs). Although the government often tolerates the use of VPNs for some purposes, such as academic research and international business, it sometimes punishes people for providing VPN services without authorization or for using VPNs to disseminate sensitive information. The use of VPNs is not widespread, either due to a lack of interest or to inconveniences such as slower browsing speeds. PRC methods of social and political control are evolving to include the widespread use of sophisticated surveillance and big data technologies. Human rights groups and the U.S. Department of State argue that these methods, which have not yet been fully deployed nationally, violate rights to privacy, \"mental autonomy,\" and the presumption of innocence, and are used to restrict freedoms of movement, association, and religion. Chinese authorities and companies have installed ubiquitous surveillance cameras, as well as facial, voice, iris, and gait recognition equipment, ostensibly to reduce crime, but likely also to track the movements of ethnic Tibetans and Uyghurs (also spelled \"Uighurs\") and critics of the regime. In Xinjiang, police and officials reportedly are collecting massive amounts of data and entering it into an \"Integrated Joint Operations Platform\" (IJOP). The IJOP reportedly flags individuals who exhibit behaviors that authorities view as deviating from the norm or potentially threatening to social stability. Many forms of lawful, peaceful, daily activities may be viewed suspiciously by authorities through the use of this law enforcement tool. The government is developing a \"social credit system\" that would not only rate individuals' credit worthiness but also how well they abide by rules and regulations. It involves aggregating data on individuals and \"creating measures to incentivize 'trustworthy' conduct, and penalize untrustworthy' conduct.\" Citizens deemed untrustworthy may be banned from making purchases for travel, prevented from applying for certain types of jobs, or denied educational opportunities for their children. Examples of untrustworthy behavior include traffic violations, smoking in prohibited areas, making repeated purchases that indicate poor character, and posting untruthful news online. The PRC government, which generally restricts the operations of independent labor groups, has been carrying out a year-long suppression campaign against labor activism in Guangdong province, a center for export-oriented manufacturing, and elsewhere. Authorities have harassed, detained, and arrested labor organizers and activists, labor NGOs, social workers, and journalists who attempted to provide support to workers, and students and recent graduates from around the country who advocated for their rights. Workers have protested low pay, unsafe or unhealthy working conditions, and other violations of the China's Labor Law. Over 50 labor activists are in custody or their whereabouts are unknown. In July 2018, workers at Jasic Technology Corporation in Shenzhen attempted to form their own union and went on strike to protest the dismissal of labor organizers. Other labor unrest during this time related to fair wages and the safety and health of working conditions. Since August 2018, authorities in Beijing have attempted to silence student labor activists at Peking University in Beijing, one of the country's most prestigious institutions of higher learning. At least 21 members of the university's Marxist Society have been placed under house arrest or have disappeared, and many others have been interrogated or surveilled. Although the students are not agitating for Western-style democracy, the CCP appears to fear that the movement could help workers to independently organize and stage protests at a time when labor demonstrations are rising across the country, or ignite other forms of social activism. The government appears particularly sensitive to student movements originating in China's most elite university, a traditional incubator of political activism. In part to defend and promote acceptance of its own principles of human rights, on the global stage, China has rejected notions of universal human rights, supported principles of non-intervention, and emphasized economic development over the protection of individual civil and political rights. A member of the United Nations Human Rights Council (UNHRC) most recently in 2017-2019, China sponsored its first ever UNHRC resolutions in 2017 and 2018, both of which passed, emphasizing national sovereignty, calling for \"quiet dialogue\" and cooperation rather than investigations and international calls for action, and advocating for the Chinese model of state-led development. In July 2019, China sponsored a UNHRC resolution, which was adopted by a vote of 33 to 13, reaffirming the \"contribution of development to the enjoyment of human all rights.\" In a speech given on global Human Rights Day in 2018, President Xi provided his perspective on \"people-centered human rights,\" including a \"path of human rights development with Chinese characteristics in line with its own conditions\" and emphasizing the \"right to subsistence and development as primary basic human rights.\" According to Freedom House, the extent of allowed religious freedom and activity among China's estimated 350 million religious practitioners varies widely by religion, region, and ethnic group, depending on \"the level of perceived threat or benefit to [Communist] party interests, as well as the discretion of local officials.\" The party's Sinicization policy and the 2018 amendments to the government's Regulations on Religious Affairs have affected all religions to varying degrees. New policies further restrict religious travel to foreign countries and contacts with foreign religious organizations and tighten bans on religious practice among party members and state employees and the religious education of minors. Religious venues are required to raise the national flag and teach traditional Chinese culture and \"core socialist values,\" and online religious activities now need approval by the provincial Religious Affairs Bureau. Christianity is the second-largest religion in China after Buddhism, and is growing steadily. Between an estimated 70 million and 90 million Chinese Christians worship in both officially-registered and unregistered churches. China's Siniciz ation campaign has intensified government efforts to pressure churches that are not formally approved by the government, and hundreds reportedly have been shut down in recent years. Since 2014, authorities have ordered crosses removed from nearly 4,000 churches, particularly in Z hejiang and Henan provinces, where there are large and growing Christian populations. The U.S. Commission on International Religious Freedom reported that roughly 1,000 church leaders were detained for brief periods in 2018. In Nanjing, municipal authorities launched a five-year Sinicization campaign that the U.S. Department of State characterized as aiming to incorporate \"Chinese elements into church worship services, hymns and songs, clergy attire, and the architectural style of church buildings.\" (See Figure 1 ) In September 2018 , the PRC government and the Vatican , which have disagreed over the appointment of bishops, religious freedom, and the Vatican's diplomatic ties with Taiwan, reached a breakthrough in negotiations on diplomatic relations. According to a 2018 provisional agreement, Beijing is to recognize the Pope as the head of the Catholic Church in China, the Vatican is to recognize seven excommunicated Chinese bisho ps appointed by PRC authorities, and China is to appoint future bishops, while the Pope has veto power over their nomination. Some observers have criticized the possible arrangement, which they believe would strengthen state control over Catholics in China. In June 2019, the Vatican asked the PRC government to refrain from harassing Catholic clergy who want to remain loyal to the Pope rather than pledge allegiance to the Chinese Patriotic Catholic Association, the official organization that governs Catholics in China. Falun Gong combines traditional Chinese exercise movements with Buddhist and Daoist concepts and precepts formulated by its founder, Li Hongzhi. In the mid-1990s, the spiritual exercise gained tens of millions of adherents across China, including members of the Communist Party. Authorities have harshly suppressed Falun Gong beginning in 1999 after thousands of adherents gathered in Beijing to protest growing restrictions on their activities. Hundreds of thousands of practitioners who refused to renounce Falun Gong were sent to Re-education through Labor (RTL) centers until they were deemed \"transformed.\" Since the formal dismantling of the RTL penal system in 2014, many Falun Gong detainees reportedly have been sent to \"Legal Education Centers\" to undergo indoctrination, or to mental health facilities. Overseas Falun Gong groups reported that in 2018, authorities arrested or harassed approximately 9,000 Falun Gong practitioners for refusing to renounce the spiritual exercise. In November 2018, judiciary officials in Changsha, Hunan province suspended the licenses of two lawyers for six months for arguing that Falun Gong was not an illegal cult and for engaging in speech that \"disrupted courtroom order.\" Falun Gong overseas organizations claim that over 4,300 adherents have died in government custody since 1999. Some reports allege that Falun Gong practitioners held in detention facilities in China were victims of illegal organ harvestingâthe unlawful, large-scale, systematic, and nonconsensual removal of body organs for transplantationâwhile they were still alive, resulting in their deaths. The claims of organ harvesting from Falun Gong detainees are based largely upon circumstantial evidence and interviews. China reportedly has made efforts to reform its organ-transplant system, to outlaw organ trafficking and the use of organs from executed prisoners, create a national organ registry, and encourage voluntary donations. Overseas Falun Gong organizations claim that the practice of organ harvesting continues. The Tibetan Autonomous Region (TAR) is home to about 2.7 million Tibetans out of China's total ethnic Tibetan population of 6 million. Most of China's remaining ethnic Tibetan population lives in Tibetan autonomous prefectures and counties in bordering provinces. Although some Tibetans advocate independence, the Dalai Lama, the Tibetan Buddhist spiritual leader who has lived with other Tibetan exiles in Dharamsala, India since a failed Tibetan uprising against Chinese rule in 1959, has proposed a \"middle way approach,\" or \"genuine autonomy\" without independence in Tibet. China's leaders have referred to the middle way as \"half independence\" or \"independence in disguise\" and to the Dalai Lama as a \"separatist\" and a \"wolf in monk's robes.\" Talks between PRC officials and representatives of the Dalai Lama on issues related to Tibetan autonomy and the return of the Dalai Lama have been stalled since 2010. Following anti-government protests in 2008, TAR authorities imposed increasingly expansive controls on Tibetan religious life and culture. These include a heightened police presence within monasteries; the ideological re-education of Tibetan Buddhist monks and nuns; the arbitrary detention and imprisonment of Tibetans; strengthened media controls; and greater restrictions on the use of the Tibetan language in schools. Authorities in some Tibetan areas, in an effort to prevent \"separatist\" thoughts and activities, have inspected private homes for pictures of the Dalai Lama, examined cell phones for Tibetan religious and cultural content, and monitored online posts for political speech. Since 2016, authorities have destroyed religious structures and homes at the Larung Gar and Yanchen Gar monasteries in Sichuan Province, and evicted roughly 11,500 monks and nuns. The PRC government insists that Chinese laws, and not Tibetan Buddhist religious traditions, govern the process by which lineages of Tibetan lamas are reincarnated, and that the state has the right to choose the successor to the current Dalai Lama. U.S. officials and some Members of Congress have expressed support for the right of Tibetans to choose their own religious leaders without government interference. Since 2009, 155 Tibetans within China are known to have self-immolated, many apparently to protest PRC policies or to call for the return of the Dalai Lama, and 123 are reported to have died. The Uyghurs are a Turkic ethnic group who practice a moderate form of Sunni Islam and live primarily in the Xinjiang Uyghur Autonomous Region (XUAR). In the past decade, PRC authorities have imposed severe restrictions on the religious and cultural activities of Uyghurs. Ethnic unrest in Xinjiang erupted in 2009, featuring Uyghur violence against Han Chinese and government reprisals. Subsequent periodic clashes between Uyghurs and Xinjiang security personnel spiked between 2013 and 2015, and PRC leaders responded with more intensive security measures, including thousands of arrests. Following the 2016 appointment of a new Communist Party Secretary to the XUAR, Chen Quanguo, and the implementation of new national security and counterterrorism laws and regulations on religious practice, Xinjiang officials stepped up security measures aimed at the Uyghur population. They included tighter restrictions on movement, the installation of thousands of neighborhood police kiosks, and ubiquitous surveillance cameras. Authorities reportedly have collected biometric data, including DNA samples, blood types, and fingerprints of Uyghur residents, for identification purposes. XUAR authorities also have implemented systems and installed phone apps to register and monitor Uyghurs' electronic devices and online activity for \"extremist\" content. The PRC government has instituted policies intended to assimilate Uyghurs into Han Chinese society and reduce the influences of Uyghur, Islamic, and Arabic cultures and languages. The XUAR enacted a regulation in 2017 that prohibits \"expressions of extremification,\" including wearing face veils, growing \"irregular\" beards, and expanding halal practices beyond food. Authorities reportedly have banned traditional Uyghur wedding and funeral customs and Islamic names for children. Thousands of mosques in Xinjiang reportedly have been demolished as part of a \"mosque rectification\" or safety campaign. PRC authorities reportedly have conscripted as many as a million citizens to live temporarily in the homes of Uyghurs and other Muslim minorities to assess their hosts' loyalty to the Communist Party. Since 2017, Xinjiang authorities have undertaken the mass internment of Turkic Muslims, some of whom may have engaged in religious and ethnic cultural practices that the government now perceives as extremist or terrorist, or as manifesting \"strongly religious\" views or thoughts that could lead to the spread of religious extremism or terrorism. The government has detained, without formal charges, up to an estimated 1.5 million Uyghurs out of a population of about 10.5 million, and a smaller number of ethnic Kazakhs, in ideological re-education centers. Over 400 prominent Uyghur intellectuals reportedly have been detained or their whereabouts are unknown. Many detainees reportedly are forced to express their love of the Communist Party and Xi Jinping, sing patriotic songs, and renounce or reject many of their religious beliefs and customs. According to former detainees, conditions in the centers are often crowded and unsanitary, and treatment often includes psychological pressure, forced labor, beatings, and food deprivation. PRC officials describe the Xinjiang camps as \"vocational education and training centers\" in which \"trainees\" study Chinese, take courses on PRC law, learn job skills, and undergo \"de-extremization\" or are \"cured of ideological infection.\" The government states that the centers \"have never made any attempts to have the trainees change their religious beliefs.\" In July 2019, some Chinese officials claimed that most detainees had \"returned to society\" and to their families, while in August 2019, other officials stated that the \"only 500,000 Uyghurs\" were held in 68 camps. Some Uyghurs living abroad, however, claim that they still have not heard from missing relatives in Xinjiang. Some reports indicate that many of those released from re-education centers have been placed under house arrest or in state-run factories, and continue to be held under close political supervision. The Hui, another Muslim minority group in China who number around 11 million, largely have practiced their faith with less government interference. The Hui are more geographically dispersed and culturally assimilated than the Uyghurs, are generally physically indistinguishable from Hans, and do not speak a non-Chinese language. China's new religious policies have affected the Hui and other Muslims outside of Xinjiang, but less severely than the Uyghurs. Nonetheless, authorities in the Ningxia Hui Autonomous Region have ordered mosques to be \"Sinicized\"âminarets have been taken down, onion domes have been replaced by traditional Chinese roofs, and Islamic motifs and Arabic writings have been removed. Officials have cancelled Arabic classes in some mosques and private schools, and calls to prayer have been banned in Yinchuan, the capital of Ningxia. In Beijing, authorities have mandated that Arabic signage over Halal food shops be removed. In August 2018, thousands of Hui Muslims gathered in front of a newly-built mosque in Weizhou, Ningxia, in an attempt to block the government's announced demolition of the building due in part to its Middle Eastern architectural style. While the government backed down on its threat to destroy the mosque, PRC anticorruption investigators have begun investigating local Hui officials who they say have \"strayed from the party's leadership and political discipline in religious matters.\" Human rights conditions in the PRC have been a recurring point of friction and source of mutual mistrust in U.S.-China relations, particularly since the Tiananmen Square crackdown in 1989 and the end of the Cold War in 1991. China's persistent human rights violations, as well as its authoritarian political system, often have caused U.S. policymakers and/or the American public to view the PRC government with greater suspicion. Chinese officials may in turn view expressed human rights concerns by U.S. policymakers, and the broader U.S. democracy promotion agenda, as tools meant to undermine CCP rule and slow China's rise. Frictions over human rights may affect other issues in the relationship, including those related to economics and security. In engaging China on human rights issues, the United States has often focused on China's inability or unwillingness to respect universal civil and political rights, while China prefers to tout its progress in delivering economic development and well-being, and advancing social rights for its people, including ethnic minorities. In the period following the 1989 Tiananmen Square crackdown, the United States sought to leverage China's desire for \"most favored nation\" (MFN) trade status by linking its annual renewal to improvements in human rights conditions in China. The Clinton Administration ultimately abandoned this direct linkage, however, in favor of a general policy of engagement with China that it hoped would contribute to improved respect for human rights and greater political freedoms for the Chinese people. President Bill Clinton, in his 1999 State of the Union Address, summed up the long-term aspirations of this approach, stating, \"It's important not to isolate China. The more we bring China into the world, the more the world will bring change and freedom to China.\" In the following more than two decades, U.S. Administrations and Congresses employed broadly similar strategies for promoting human rights in China, combining efforts to deepen trade and other forms of engagement to help create conditions for positive change, on the one hand, with specific human rights promotion efforts, on the other. Presidents Bill Clinton, George W. Bush, and Barack Obama held that U.S. engagement with China and encouraging China to respect international norms, including on human rights, would result in mutual benefits, including China's own success and stability. Policy tools for promoting human rights have included open censure of China; quiet diplomacy, such as closed-door discussions; congressional investigations, hearings, legislation, statements, letters, and visits; funding for human rights and democracy foreign assistance programs in the PRC; congressionally-mandated reports on human rights in China; support for human rights defenders and pro-democracy groups in China, Hong Kong, and the United States; economic sanctions; efforts to promote Internet freedom; support for international broadcasting; and coordination of international pressure, including through multilateral organizations. In addition, some U.S. officials and Members of Congress have regularly met with Chinese dissidents and with the Dalai Lama and exiled Tibetan officials, in both Washington, D.C. and Dharamsala, India, where the headquarters of the Central Tibetan Administration (sometimes referred to as the Tibetan government-in-exile) is located. Beijing opposes such meetings as encouraging Tibetan independence and contravening the U.S. policy that Tibet is part of China. In recent years, policy analysts have increasingly debated the effectiveness of aspects of the U.S. engagement strategy with China, including, in light of China's deepening domestic political repression, its results in securing improvements in Beijing's respect for human rights and political freedoms. Under President Trump, U.S. policy documents have declared that China's international integration has not liberalized its political or economic system, and the United States has begun to place less emphasis on engagement. The Trump Administration has referred to China as a \"revisionist power,\" a strategic competitor, or even an adversary, and curtailed some government-to-government cooperation. Some critics of the Administration's China policy argue that U.S. effectiveness and credibility on human rights is strengthened when the United States works with allies and within international organizations to promote human rights and democracy globally and in China, while maintaining openness to engaging China's government and society, where appropriate. A U.S. policy approach that is less concerned with maintaining broad engagement with China may afford greater space and opportunity to push the PRC on human rights concerns. Trump Administration efforts in this area arguably have been uneven to date, with some commentators criticizing the Administration for inconsistency in its commitment to human rights issues as it pursues other priorities with China, particularly on trade. More broadly, the Administration has placed less emphasis on existing multilateral institutions and on multilateral diplomacy in its foreign policy, including with regard to human rights. The forcefulness of the Administration's public rhetoric on PRC human rights issues has differed between the President and some senior Administration officials. Since 2018, some Administration officials have used increasingly sharp language on China's human rights abuses. Vice President Mike Pence's October 2018 speech on the Administration's China policy, which was critical of China across a broad set of policy areas, cited concern over China's \"control and repression of its own people\" and referenced \"an unparalleled surveillance state.\" At the announcement of the Department of State's 2019 release of its annual report on human rights practices around the world, Secretary of State Michael Pompeo stated that China was in a \"league of its own\" in the area of human rights violations. In July 2019, Pompeo described the situation in Xinjiang in particular as \"one of the worst human rights crises of our time,\" and \"the stain of the century.\" President Trump generally has not publicly raised the issue of human rights in China and reportedly remains focused largely on trade issues. In July 2019, President Trump met with survivors of religious persecution around the world, including four individuals from China: a Uyghur Muslim, a Tibetan Buddhist, a Christian, and a Falun Gong practitioner. In September 2019 at a United Nations event on religious freedom, the President issued a broad statement calling for an end to religious persecution, but did not mention religious freedom issues in China specifically; his later remarks to the U.N. General Assembly, as they related to China, emphasized trade issues. The Trump Administration has not attempted to restart the U.S.-China Human Rights Dialogue, which Beijing suspended in 2016. Many other operative elements of U.S. human rights policy toward China, however, reflect continuity with prior administrations; many are statutorily mandated and/or continue to be funded by Congress (as described below). The State Department's most recent \"integrated country strategy\" for China, released in August 2018, includes an objective to \"advocate for and urge China to adhere to the rule of law, respect the individual rights and dignity of all its citizens, and ease restrictions on the free flow of information and ideas to advance civil society.\" Since 2001, U.S. foreign assistance programs have sought to promote human rights, civil society, democracy, rule of law, and Internet freedom in China. In addition, some programs also have addressed environmental and rule of law issues and focused upon sustainable development, environmental conservation, and preservation of indigenous culture in Tibetan areas of China. U.S.-funded programs do not provide assistance to PRC government entities or directly to Chinese non-governmental organizations (NGOs), and are predominantly awarded in the form of grants to U.S.-based NGOs and academic institutions. The State Department's Bureau of Democracy, Human Rights, and Labor (DRL) has generally administered programs to promote human rights and democracy in China, while the U.S. Agency for International Development (USAID) has administered the aforementioned programs in Tibet and some additional programs in the areas of the environment and rule of law. DRL programs across China have generally supported rule of law development, civil society, labor rights, religious freedom, government transparency, public participation in government, and Internet freedom. Between 2001 and 2018, the U.S. government provided approximately $241 million for DRL programs in China, $99 million for Tibetan programs, and $72 million for environmental and rule of law efforts in the PRC (see Figure 2 above). Since 2015, Congress has appropriated additional funds for Tibetan communities in India and Nepal ($6 million in FY2019). Since 2018, Congress also has provided $3 million annually to strengthen institutions and governance in the Tibetan exile communities. Established in 1983, the National Endowment for Democracy (NED) is a private, nonprofit foundation \"dedicated to the growth and strengthening of democratic institutions around the world.\" Funded primarily by an annual congressional appropriation, NED has played an active role in promoting human rights and democracy in China since the mid-1980s. A grant-making institution, NEDÂ has supported projects in China carried out by grantees that include its four affiliated organizations; Chinese, Tibetan, and Uyghur human rights and democracy groups and media platforms based in the United States and Hong Kong; and a small number of NGOs based in mainland China. Program areas have included efforts related to prisoners of conscience; rights defenders; freedom of expression; civil society; the rule of law; public interest law; Internet freedom; religious freedom; promoting understanding of Tibetan, Uyghur, and other ethnic concerns in China; government accountability and transparency; political participation; labor rights; public policy analysis and debate; and rural land rights, among others. NED currently describes China as a priority country in Asia in light of the \"significant and systemic challenges to democratization\" there. NED grants for China (including Tibet and Hong Kong) totaled approximately $7 million in 2017 and $6.5 million in 2018. This support is provided using NED's regular congressional appropriations. The U.S. Agency for Global Media (USAGM; formerly the Broadcasting Board of Governors) utilizes international broadcasting and media activities to \"advance the broad foreign policy priorities of the United States, including the universal values of freedom and democracy.\" It targets resources to areas \"most impacted by state-sponsored disinformation\" (as well as by violent extremism), and identifies people in China as a key audience. USAGM-supported Voice of America (VOA) and Radio Free Asia (RFA) provide external sources of independent or alternative news and opinion to Chinese audiences. The two media services play small but unique roles in providing U.S.-style broadcasting, journalism, and public debate in China. VOA, which offers mainly U.S. and international news, and RFA, which serves as an uncensored source of domestic Chinese news, often report on important world and local events, including human rights issues. The PRC government regularly jams and blocks VOA and RFA Mandarin, Cantonese, Tibetan, and Uyghur language radio and television broadcasts and Internet sites, while VOA English services generally receive less interference. VOA and RFA have made efforts to enhance their Internet services, develop circumvention or counter-censorship technologies, and provide access to their programs on social media platforms. USAGM increasingly emphasizes digital and social media content in China, arguing that these are \"effective channels for information-seeking people to evade government firewalls.\" The agency describes RFA Uyghur as the \"only Uyghur language news outlet for the Xinjiang Uyghur Autonomous Region,\" and states that the outlet's social media content is popular among the Uyghur exile community, which shares the content with Uyghurs in Xinjiang. China is subject to some U.S. economic sanctions in response to its human rights conditions. The sanctions' effects have been limited, however, and arguably largely symbolic. Many sanctions imposed on China as a response to the 1989 Tiananmen crackdown (including restrictions on foreign aid, military and government exchanges, and export licenses) are no longer in effect. Remaining Tiananmen-related sanctions suspend Overseas Private Investment Corporation programs and restrict export licenses for U.S. Munitions List (USML) items and crime control equipment. The United States also limits its support for international financial institution (IFI) lending to China for human rights reasons. For example, U.S. representatives to IFIs may by law support projects in Tibet only if they do not encourage the migration and settlement of non-Tibetans into Tibet or the transfer of Tibetan-owned properties to non-Tibetans, due in part to the potential for such activities to erode Tibetan culture and identity. Relatedly, China also has been subject to potential nonhumanitarian and nontrade-related foreign assistance restrictions as a result of its State Department designation as a \"Tier 3\" (worst) country for combating human trafficking in recent years. The Global Magnitsky Human Rights Accountability Act, enacted as part of the National Defense Authorization Act for FY2017 ( P.L. 114-328 , Subtitle F, Title XII), authorizes the President to impose both economic sanctions and visa denials or revocations against foreign individuals responsible for \"gross violations of internationally recognized human rights.\" The Trump Administration has thus far sanctioned one Chinese security official, Gao Yan, pursuant to the Global Magnitsky Act. According to the Treasury Department, Gao headed the Public Security Bureau branch in Beijing at which human rights activist Cao Shunli was held and denied medical treatment; Cao died in March 2014. The executive branch may also utilize Section 7031(c) of the Department of State, Foreign Operations, and Related Appropriations Act, 2019 (Division F of P.L. 116-6 ) or the broad authorities under Section 212 of the Immigration and Nationality Act (INA) to impose visa sanctions on individuals responsible for human rights abuses. Numerous human rights advocates and Members of Congress have called on the Trump Administration to sanction Chinese government officials responsible for the human rights abuses occurring in Xinjiang; many have argued for Global Magnitsky sanctions against XUAR Party Secretary Chen Quanguo, in particular. Press reports suggest the Trump Administration has been considering sanctions under the Global Magnitsky Act against Xinjiang officials, but has delayed actions in the midst of the U.S.-China bilateral trade negotiations. In October 2019, the State Department announced visa restrictions against an unspecified number of \"Chinese government and Communist Party officials who are believed to be responsible for, or complicit in, the detention or abuse of Uighurs, Kazakhs, or other members of Muslim minority groups\" in Xinjiang, and stated that the officials' family members may also be subject to visa restrictions. The International Religious Freedom Act of 1998 (IRFA, P.L. 105-292 ) mandates that the President produce an annual report on the status of religious freedom in countries around the world and identify \"countries of particular concern\" (CPCs) for \"particularly severe violations of religious freedom,\" and prescribes punitive actions in response to such violations. The law provides a menu of potential sanctions against CPCs, such as foreign assistance restrictions or loan prohibitions, but provides the executive branch with significant discretion in determining which, if any, actions to take. U.S. reports under IRFA have been consistently critical of China's religious freedom conditions, and the U.S. government has designated China as a CPC in each of its annual designation announcements since IRFA's enactment. Consistent with prior administrations, the Trump Administration has to date chosen not to take new actions against the Chinese government pursuant to IRFA and instead referred to existing, ongoing sanctions to satisfy the law's requirements. These existing sanctions relate to the above-mentioned restrictions on exports of crime control and detection equipment adopted following the Tiananmen crackdown. The Reciprocal Access to Tibet Act (RATA, P.L. 115-330 ), enacted in December 2018, requires that, absent a waiver by the Secretary of State, no individual determined to be \"substantially involved in the formulation or execution of policies related to access for foreigners to Tibetan areas\" may receive a visa or be admitted to the United States while PRC policies restricting foreigners' access to Tibetan areas of China remain in place. The State Department is to report to Congress annually for five years following RATA's enactment, identifying the individuals who had visas denied or revoked pursuant to the law, and, \"to the extent practicable,\" provide a broader list of the \"substantially involved\" individuals. On October 7, 2019, the U.S. Department of Commerce announced that it would add 28 PRC entities to the Bureau of Industry and Security (BIS) \"entity list\" under the Export Administration Regulations (EAR), asserting that the entities \"have been implicated in human rights violations and abuses in the implementation of China's campaign of repression, mass arbitrary detention, and high-technology surveillance against Uighurs, Kazakhs, and other members of Muslim minority groups in the XUAR.\" The entities to be added include eight technology companies, the XUAR Public Security Bureau (PSB) and eighteen subordinate PSBs, and the PSB-affiliated Xinjiang Police College. The action imposes licensing requirements prior to the sale or transfer of U.S. items to these entities. For each entity, the Commerce Department indicated that there would be a presumption of license denial for all items subject to the EAR, with the exception of certain categories to be subject to a case-by-case review. Secretary of Commerce Wilbur Ross stated that adding the entities would \"ensure that our technologies, fostered in an environment of individual liberty and free enterprise, are not used to repress defenseless minority populations.\" Previously, Members of Congress had written to Secretary Ross and other senior Administration officials urging them to expand the entity list \"to ensure that U.S. companies are not assisting, directly or indirectly, in creating the vast civilian surveillance or big-data predictive policing systems being used in [Xinjiang].\" Some observers believe the decision could result in significant adverse business impacts for some of the Chinese technology companies. The United States also has engaged in multilateral diplomacy to advocate for improved human rights conditions in China. For example, in March 2016, the United States joined 11 other countries to deliver a joint statement at the United Nations Human Rights Council criticizing China's human rights record and calling on China to uphold its human rights commitments. The Trump Administration has curtailed U.S. participation in some multilateral human rights organizations, most prominently by announcing the U.S. withdrawal from the UNHRC in June 2018, and arguably has placed less emphasis on multilateral diplomacy. The United States reportedly did not sign a 2018 joint letter by 15 foreign ambassadors in Beijing requesting a meeting with XUAR Party Secretary Chen Quanguo to raise concerns over human rights abuses in Xinjiang. On July 8, 2019, 22 nations issued a joint statement to the UNHRC president and the U.N. High Commissioner on Human Rights calling on China to \"refrain from the arbitrary detention and restrictions on freedom of movement of Uighurs, and other Muslim and minority communities in Xinjiang,\" and to \"allow meaningful access to Xinjiang for independent international observers.\" The statement, which was signed by numerous countries that are not current members of the UNHRC, was not signed by the United States. The Trump Administration has sought some new venues through which to issue multilateral statements on certain PRC human rights issues, particularly on religious freedom. The State Department convened a Ministerial to Advance Religious Freedom in July 2018 and July 2019, with participation from foreign delegations and civil society leaders, and each time released a joint statement expressing concern over religious freedom conditions in China. The United States was joined in the 2019 statement by Canada, Kosovo, the Marshall Islands, and the United Kingdom. More broadly, the Administration is also working to establish an \"International Religious Freedom Alliance\" comprised of governments \"dedicated to confronting religious persecution around the world,\" presumably including in China. Despite its withdrawal from the UNHRC, the United States has also continued to participate in some Council activities in its capacity as a U.N. member state, such as the Universal Periodic Review (UPR) process, including China's most recent UPR. During China's review in November 2018, over one dozen countries, including the United States, raised questions and concerns about China's treatment of Tibetans, Uyghurs, and other minorities, as well as over freedom of religion in China. The United States made four recommendations, including for China to \"abolish all forms of arbitrary detention, including internment camps in Xinjiang, and immediately release the hundreds of thousands, possibly millions, of individuals detained in these camps.\" ", "summary": "This report examines selected human rights issues in the People's Republic of China (PRC) and policy options for Congress. U.S. concern over human rights in China has been a central issue in U.S.-China relations, particularly since the Tiananmen crackdown in 1989. In recent years, human rights conditions in China have deteriorated, while bilateral tensions related to trade and security have increased, possibly creating both constraints and opportunities for U.S. policy on human rights. After consolidating power in 2013, Chinese Communist Party (CCP) General Secretary and State President Xi Jinping intensified and expanded the reassertion of party control over society that began during the final years of his predecessor, Hu Jintao. Since 2015, the government has enacted new laws that place further restrictions on civil society in the name of national security, authorize greater control over minority and religious groups, and reduce the autonomy of citizens. PRC methods of social and political control are evolving to include the widespread use of sophisticated surveillance and big data technologies. Government arrests of human rights advocates and lawyers, which intensified in 2015, were followed by party efforts to instill ideological conformity across various spheres of society. In 2016, President Xi launched a policy known as \"Sinicization,\" through which the government has taken additional measures to compel China's religious practitioners and ethnic minorities to conform to Chinese culture, the socialist system, and Communist Party policies and to eliminate foreign influences. In the past decade, the PRC government has imposed severe restrictions on the religious and cultural activities, and increasingly on all aspects of the daily lives, of Uyghurs, a Turkic ethnic group who practice a moderate form of Sunni Islam and live primarily in the far western Xinjiang Uyghur Autonomous Region. Since 2017, government authorities in Xinjiang have detained, without formal charges, up to an estimated 1.5 million Uyghurs out of a population of about 10.5 million, and a smaller number of ethnic Kazakhs, in ideological re-education centers. Some may have engaged in religious and ethnic cultural practices that the government now perceives as extremist or terrorist, or as manifesting \"strongly religious\" views or thoughts that could lead to the spread of religious extremism or terrorism. Members of the 116 th Congress have introduced several bills and resolutions related to human rights issues in China, particularly regarding Tibetans, Uyghurs, and religious freedom. Successive U.S. Administrations and Congresses have deployed an array of means for promoting human rights and democracy in China, often exercised simultaneously. Policy tools include open censure of China; quiet diplomacy; congressional hearings, legislation, investigations, statements, letters, and visits; funding for rule of law and civil society programs in the PRC; support for human rights defenders and prodemocracy groups; sanctions; bilateral dialogue; internet freedom efforts; international broadcasting; and coordinated international pressure, including through multilateral organizations. Another high-profile practice is the State Department's issuance of congressionally mandated country reports and/or rankings, including on human rights, religious freedom, and trafficking in persons. Broadly, possible approaches for promoting human rights in China may range from those emphasizing bilateral and international engagement to those conditioning the further development of bilateral ties on improvements in human rights conditions in China; in practice, approaches may combine elements of both engagement and conditionality. Some approaches may reflect a perceived need to balance U.S. values and human rights concerns with other U.S. interests in the bilateral relationship. Others may challenge the assumption that promoting human rights values involves trade-offs with other interests, reflecting instead a view that fostering greater respect for human rights is fundamental to other U.S. objectives. (This report does not discuss the distinct human rights and democracy issues in the PRC's Hong Kong Special Administrative Region. For information on developments in Hong Kong, see CRS In Focus IF11295, Hong Kong's Protests of 2019 , by Michael F. Martin.)", "document_type": "crs"}
{"report": "The United States has more nuclear power reactors than any country worldwide. The 98 operable nuclear generating units provide approximately 20% of the electrical generation in the United States. Uranium is the fundamental element used to fuel nuclear power production. The front-end of the nuclear fuel cycle comprises the industrial stages starting with uranium extraction from the earth and ending with power production in a nuclear reactor. Congressional interest in the front-end of the nuclear fuel cycle is associated with many factors, including (1) domestic uranium production and supply, (2) concerns about increasing reliance on uranium imports, and (3) the economic viability of U.S. nuclear power reactors. Historically, the U.S. Atomic Energy Commission (AEC), a predecessor federal agency to the Department of Energy (DOE) and the Nuclear Regulatory Commission (NRC), promoted uranium production in the United States through federal procurement contracts between 1947 and 1971. The majority of domestic uranium concentrate production prior to 1971 supported the development of nuclear weapons and naval propulsion reactors. After 1971, uranium mill operators produced uranium concentrate primarily for use in commercial nuclear power reactors. By the late 1980s, nuclear utilities and reactor operators in the United States purchased more uranium from foreign suppliers than domestic producers. By 2017, 93% of the uranium purchased by U.S. nuclear utilities and reactor operators originated in a foreign country. Nuclear utilities and reactor operators diversify uranium supplies among multiple domestic and foreign sources, intending to minimize fuel costs. For example, a nuclear utility in the United States may purchase uranium concentrate that has been mined and milled in Australia, converted in France, enriched in Germany, and fabricated into fuel in the United States. Examination of the current status of the front-end of the nuclear fuel cycle highlights broad policy questions about the federal government's role in sustaining or promoting nuclear fuel production in the United States. This report describes the front-end of the nuclear fuel cycle and the global uranium marketplace, analyzes domestic sources and imports of various types of uranium materials involved in the fuel cycle, and provides a discussion about the current issues. The back-end of the nuclear fuel cycle comprises the storage of spent nuclear fuel (SNF) after it is discharged from a nuclear reactor; however, issues associated with SNF storage and disposal are not discussed in this report. This report does not discuss potential environmental, public health, and proliferation issues associated with the front-end of the nuclear fuel cycle. The front-end of the nuclear fuel cycle is composed of four stages: Uranium mining and milling is the process of removing uranium ore from the earth and physically and chemically processing the ore to develop \"yellowcake\" uranium concentrate. Uranium conversion produces uranium hexafluoride (UF 6 ), a gaseous form of uranium, from solid uranium concentrate. Uranium enrichment separates and concentrates the fissile isotope U-235 in the gaseous UF 6 form to produce enriched uranium capable of sustaining a nuclear chain reaction in a commercial nuclear power reactor. Uranium fuel f abrication involves producing uranium oxide pellets, which are subsequently loaded into reactor-specific fuel rods and assemblies, which in turn are loaded into a nuclear power reactor. The nuclear fuel produced from processing newly mined uranium ore through fuel fabrication is referred to as primary supply . The stages from uranium mining through uranium fuel fabrication are described in the following sections. The front-end of the nuclear fuel cycle begins with mining uranium ore from the earth, through conventional (surface mining, open pits, underground) or nonconventional, in-situ recovery (ISR) methods. The type of extraction method employed depends on geology, ore body concentration, and economics. The majority of uranium resources in the United States are located in geological deposits in the Colorado plateau, Texas gulf coast region, and Wyoming basins. The United States has a relatively low quality and quantity of uranium reserves compared to the leading uranium-producing countries. For example, the Nuclear Energy Agency and the International Atomic Energy Agency rank the United States' reasonably assured uranium resources as 12 th worldwide. Uranium milling involves physical and chemical processing of uranium ore to generate uranium concentrate (U 3 O 8 ), commonly called \"yellowcake\" uranium. Uranium milling operations crush and grind the mined ore, which is chemically dissolved with acid or alkaline solutions and subsequently concentrated. Milling operations produce a large quantity of waste material, termed tailings , relative to the amount of uranium concentrate produced. NRC estimates 2.4 pounds of yellowcake uranium oxide is produced from 2,000 pounds of uranium ore. The tailings, or waste material, generated by uranium milling operations prior to the 1970s were largely abandoned, exposing radioactive sand-like particles to be dispersed into the air, surface, and groundwater by natural erosion and human disturbances. The enactment of the Uranium Mill Tailings Radiation Control Act (UMTRCA; P.L. 95-604 ) authorized a remedial action program for cleanup of abandoned mill tailings prior to 1978 and authorized a regulatory framework to manage tailings generated at sites operating after 1978. In the United States, ISR methods have replaced conventional mining and milling by pumping acid or alkaline solutions through an underground ore body. After uranium in the ore is dissolved in solution, it is pumped to the surface and processed to produce uranium concentrate. In the first quarter of 2019, five ISR facilities are operating in the United Statesâall in Wyomingâwith approximately 11.2 million pounds of annual production capacity, and one conventional uranium mill, located in Utah, in operation with an annual capacity of 6 million pounds of ore per day. Additionally, there are 13 million pounds of annual production capacity at 11 ISR operations permitted and licensed, partially permitted and licensed, developing, or on standby. Uranium concentrate is shipped to a uranium conversion facility where UF 6 is chemically produced. At room temperature, UF 6 is a solid, and it transforms to a gas at higher temperatures. UF 6 is described as \"natural,\" as the isotopic composition has not been altered relative to the composition that exists in nature. According to the World Nuclear Association, there are six uranium conversion plants worldwide. The Honeywell plant in Metropolis, IL, is the only uranium conversion facility in the United States. It has not produced UF 6 since November 2017. After uranium conversion, the UF 6 is feed material for uranium enrichment . Natural uranium has an isotopic composition of approximately 0.71% U-235, the fissile isotope of uranium. Civilian nuclear power fuel is generally enriched to 3%-5% U-235. Uranium enrichment in the United States was largely performed using a gaseous diffusion technology until 2013. Currently, one uranium enrichment plant, which employs gas centrifuge technology, operates in the United States. The gas centrifuge technology is described below. Inflow UF 6 gasâreferred to as the feed âenters a gas centrifuge. The centrifuge spins at high speeds and centrifugal forces drive the slightly more massive U-238 isotopes outward, while less massive U-235 isotopes concentrate near the center of the centrifuge. The process repeats many times in a cascade of centrifuges, gradually increasing the isotopic composition of U-235 from 0.71% to 3%-5%. During this process, the chemical composition remains as UF 6 , while the isotopic composition of UF 6 has been modified. The product stream is enriched uranium hexafluoride (enUF 6 ) and the waste streamâcalled the tailsâis depleted uranium (DU). The greater the difference in the isotopic composition of U-235 in the product and tails, the greater the energy requirements. Separative work units (SWUs) describe the energy required to enrich a given feed quantity to a given assay. Uranium enrichment yields a relatively higher mass of depleted uranium as the enriched uranium product. The final step in producing usable nuclear fuel involves fuel fabrication . At fabrication plants, enriched uranium is converted to uranium oxide (UO 2 ) powder and subsequently formed into small ceramic pellets. The pellets are loaded into cylindrical fuel rods and then combined to form fuel assemblies specific to a particular reactor. The fuel assemblies are loaded into the nuclear reactor for power production. The precise enrichment level and types of fuel rods and assemblies are specific to each reactor. Secondary supplies describe uranium materials which may not have been directly processed through the front-end of the nuclear fuel cycle. Secondary supply may describe excess uranium from underfeeding during commercial enrichment, uranium materials held in commercial inventories, uranium held in the federal government's excess uranium inventory, and from the downblending of higher enriched uranium. According to DOE, secondary sources of uranium produced from reenrichment of depleted uranium and underfeeding represent the two largest sources of secondary supply in the market. A uranium market analyst estimated that all secondary supplies account for more than a quarter of total annual world uranium supply (48 million pounds U 3 O 8 equivalent) as of December 2018. The relative contribution of secondary uranium supplies may vary from year-to-year. Uranium enrichment inherently involves a trade-off between energy requirements and quantity of product and tails produced. Enrichment operators aim to balance these requirements as the optimal tails assay. Under certain conditions, enrichment operators elect to underfeed , which generates tails with a lower assay relative to the optimal tails assay. Underfeeding allows the enrichment operator to supply the enriched uranium product at the assay desired, produce lower quantities of tails for storage and disposal, and use relatively less feed material. The trade-off is the higher energy requirement per enriched product. The excess feed material not enriched as a result of underfeeding is considered a secondary supply. Uranium traders and brokers buy, sell, and store various types of uranium materials and have no direct operational role in producing or consuming nuclear fuel cycle material. The decision to buy, hold, and sell uranium materials is dependent on market conditions. For example, in 2014 the Senate Committee on Homeland Security and Governmental Affairs examined the activities of banks and bank holding companies in physical markets for commodities, including an examination of Goldman Sachs' involvement with buying and selling physical uranium products. Goldman Sachs described its activities in the uranium market as \"buying uranium from mining companies, storing it, and providing the uranium to utilities when they wanted to process more fuel for their nuclear power plants.\" Goldman's physical uranium inventory valuation peaked in 2013 at $242 million, and the company planned on exiting the market by 2018 when their contracts with utilities had ended. The current status of Goldman's holdings is not publicly known, as uranium sales contracts are privately negotiated. EIA provides a list of uranium sellers to owners and operators of U.S. civilian nuclear power reactors, which may include companies involved with uranium operations at various stages of the front-end of the nuclear fuel cycle. Nuclear utilities and reactor operators stockpile inventories of various types of uranium materials. The primary reasons to maintain stockpiles are economic considerations and to insulate their operations from potential supply chain disruptions. According to the U.S. Energy Information Administration (EIA), total uranium inventories for owners and operators of U.S. civilian nuclear power reactors more than doubled from 2002 to 2016 ( Figure 2 ). EIA tracked inventory quantities of specific uranium materials from 2007 to 2016. During that time, owners and operators of U.S. civilian nuclear power reactors increased inventories of uranium concentrate and enriched UF 6 by the largest relative margin. As of 2016, EIA reported the total uranium inventory for U.S. utilities was 128 million pounds U 3 O 8 (eq). DOE maintains inventories of uranium both essential to, and excess to, national security missions. DOE maintains excess inventories of various types of uranium materials, which are sold on commercial markets to support cleanup services for former federal uranium enrichment facilities. Some have expressed concern that DOE's uranium transfers are depressing uranium prices by introducing federal uranium materials into an already oversupplied market. In 2015, the House Oversight and Government Reform Subcommittee on the Interior examined the impact of the sales of DOE's excess uranium inventory. The Government Accountability Office (GAO) raised concerns about the transparency of methodology used to determine uranium transfer quantities, and expressed legal concerns with some DOE uranium transfers from 2012 through 2013. The Secretary of Energy determines whether transfers of uranium will adversely affect the domestic production uranium industry. In FY2017, Secretary of Energy Rick Perry determined natural uranium hexafluoride transfer of up to 1,200 metric tons of uranium (MTU) per year would not cause adverse material impact on domestic uranium producers. Explanatory language in the conference report accompanying the Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs Appropriations Act, 2019 ( P.L. 115-244 , H.Rept. 115-929 ) directs DOE to end the uranium transfers and explains that $60 million above the budget request is appropriated in lieu of anticipated profits from those transfers. The DOE FY2020 budget request decreased funding requests for the Portsmouth cleanup by approximately $52 million, indicating DOE intends to resume uranium transfers in FY2020. The uranium market operates with multiple industries exchanging uranium products and services through separate, nondirect, and interrelated markets. Producers, suppliers, and utilities buy, sell, store, and transfer uranium materials. For example, a contract may be established between a nuclear utility and a uranium producer for a given amount of uranium concentrate production over a certain number of years. The uranium producer generates uranium concentrate, which is shipped to a conversion facility. The utility contracts with a conversion facility to convert uranium concentrate to UF 6 . Finally, the utility may arrange a contract for uranium enrichment services. Uranium transactions occur through bilateral contractual agreements between buyers, sellers, and traders. Civilian nuclear power utilities purchase uranium through long-term multiyear contracts or through the spot market as a one-time purchase and delivery. For uranium materials delivered in 2018, roughly 84% were purchased through long-term contracts and about 16% through spot market purchases. In the United States, utilities may simultaneously arrange contracts with multiple uranium producers or suppliers for a given number of years. For example, a U.S. nuclear power utility may decide to engage with a uranium producer in Canada, a uranium conversion facility in the United States, a uranium enrichment facility in Germany, and a uranium fuel fabricator in the United States ( Figure 3 ). That same utility may arrange another contract for uranium concentrate from Australia, uranium conversion in France, uranium enrichment in the Netherlands, and uranium fuel fabrication in the United States. At the same time, the utility may also decide to acquire uranium materials from a secondary supply source or through a trader or broker. Traders or brokers may not produce uranium products or services, but they buy, sell, and store materials to utilities and other suppliers. In this way, nuclear utilities and reactor operators may seek to diversify nuclear fuel sources between primary and secondary suppliers to avoid supply disruptions. The U.S. International Trade Commission (ITC) categorizes imports and exports by the Harmonized Tariff Schedule (HTS). ITC reports uranium imports relevant to the nuclear fuel cycle in different HTS categories and subcategories (see Table 1 ). For this report, CRS provides data from only the top five importing or exporting countries from 1992 through January 2019. Other countries may have contributed lesser amounts of uranium imports or exports over that time period, but those data were not included in this report. Since the late 1980s, U.S. nuclear utilities and reactor operators have purchased increasingly more foreign-origin uranium for reactor fuel than domestically produced uranium. Historically, the AEC, a predecessor federal agency to DOE and NRC, promoted uranium production through federal procurement contracts between 1947 and 1971. After 1971, uranium mill operators produced uranium concentrate primarily for the production of civilian nuclear energy. In 1987, about half of uranium used in domestic nuclear reactors was foreign origin; by 2018, EIA reported 93% of uranium used in domestic nuclear reactors was foreign origin. The DOE recognizes the term domestic as physical facilities operating within the United States, regardless of a foreign corporation ownership. Several domestic uranium producers, suppliers, enrichers, and utilities operating in the United States have foreign ownership or are subsidiaries of foreign corporations. On the other hand, DOE does not consider brokers and traders of already milled, converted, or enriched uranium as part of the domestic industry, as they are not associated with physical production of those materials. The term foreign is used to describe any non-U.S. based facility or material origin. The following sections describe domestic uranium sources and foreign imports associated with the front-end of the nuclear fuel cycle by year and country. Uranium materials sourced from various countries may be associated with that country's natural resources, operational fuel cycle facilities, and trade agreements with the United States. For example, Australia, one of the largest exporters of uranium concentrate to the United States, has the largest reasonably assured uranium resources worldwide, but it does not have a commercial nuclear power plant in operation. On the other hand, some overseas producers may not have the geologic resources to mine and mill uranium concentrate, but they may operate conversion or enrichment operations. Uranium extraction worldwide has shifted away from conventional (underground or surface mining) to unconventional (ISR) methods. In 2016, ISR facilities produced about half of the annual global uranium concentrate. ISR methods are less capital-intensive operations relative to conventional mining methods, yet the uranium ore must be hosted within a geological formation suitable for extraction by ISR. Preliminary data for domestic uranium concentrate production in the United States in 2018 totaled approximately 1.5 million pounds, the lowest domestic uranium concentrate production since the early 1950s. Domestic uranium concentrate production outlook remains low for 2019. EIA estimated the first-quarter domestic production of uranium concentrate was 58,000 pounds, approximately four times lower than any reported quarter since 1996. Uranium ore and concentrates are imported into the United States from countries with considerable uranium production programs. According to the World Nuclear Association, the largest uranium-producing countries in the world in 2017 were, in order of uranium concentrate production: Kazakhstan, Canada, Australia, Namibia, Niger, Russia, Uzbekistan, China, the United States, and Ukraine. Uranium concentrate imports are presented in Table 2 and Table 3 . As a practical matter, CRS combines \"uranium ore and concentrates\" ( Table 2 ) and \"natural uranium oxide\" ( Table 3 ) as similar materials produced from uranium mining and milling. In 2018, the United States imported the largest quantities of uranium concentrate from Canada and Australia at 4.2 million kg (11 million pounds U 3 O 8 (eq)) and 1.1 million kg (2.9 million pounds U 3 O 8 (eq)), respectively. The United States does not currently have an operational uranium conversion facility to convert uranium concentrate to UF 6 . Consequently, uranium concentrate imported into the United States must be exported to a foreign country capable of conversion and enrichment services or stored in inventories. The production of UF 6 is the second stage of the front-end of the nuclear fuel cycle. The United States currently has one commercial conversion facility, the Honeywell International, Inc. plant in Metropolis, IL. The facility suspended operations in 2018 due to \"a worldwide oversupply of uranium hexafluoride\" and is currently being maintained at a \"ready-idle\" status. With the Honeywell facility on standby, the United States does not have a domestic uranium conversion facility in operation. The Honeywell facility in Metropolis continues to be operated by ConverDyn Corporation as a warehouse and international trading platform for UF 6 and uranium concentrate. According to ConverDyn, 62 million pounds of UF 6 are stored at the facility as of 2018. According to the World Nuclear Association, the majority of commercial uranium conversion capacity is located in Canada, China, France, Russia, and the United States. Since 1992, the United States' largest import source of UF 6 was from Canada (137 million kg). The next highest country providing UF 6 imports to the United States over that time period was the United Kingdom (5.6 million kg) ( Table 4 ). The export trade data for UF 6 provide additional insight into the international flow of UF 6 , which is feed material for commercial uranium enrichment. The ITC has two types of export classifications, Domestic Exports and Foreign Exports . These definitions are not the same as the definitions for these terms as interpreted by DOE and described previously. Domestic exports are \"goods that are grown, produced, or manufactured in the United States and commodities of foreign origin that have been changed in the United States, including changes made in a U.S. Foreign Trade Zone, from the form in which they were imported, or which have been enhanced in value by further processing or manufacturing in the United States.\" ( Table 5 ) Foreign Exports \"(re-exports) consist of commodities of foreign origin that have previously been admitted to U.S. Foreign Trade Zones or entered the United States for consumption, including entry into a CBP [U.S. Customs and Border Protection] bonded warehouse, and which, at the time of exportation, are in substantially the same condition as when imported.\" ( Table 6 ) The incidence of domestic ex ports may demonstrate domestic uranium concentrate that has undergone uranium conversion in the United States prior to export. Another explanation is that the incidence of domestic ex ports may indicate foreign mined and milled uranium concentrate imported into the United States that was converted and exported. The incidence of foreign ex ports may indicate UF 6 imported into the United States that was reexported for enrichment services in a foreign country. This interpretation is consistent with the comments provided by ConverDyn, which stated that Honeywell operates as a \"global trading warehouse.\" Since 2010, UF 6 foreign exports have totaled roughly 32 million kg to four countries: Russia, Germany, Netherlands, and the United Kingdom. Historically, the federal government operated gaseous diffusion uranium enrichment facilities at Oak Ridge, TN, Paducah, KY, and Portsmouth, OH, which supplied enriched uranium for defense purposes during World War II and the Cold War. The federal government used uranium enrichment services at these sites to produce enriched uranium for private contracts to commercial nuclear power plants after 1967. As of 2019, these enrichment sites have ceased operations and are undergoing decontamination and decommissioning managed by DOE's Office of Environmental Management. DOE's estimated program life-cycle costs for decontamination and decommissioning collectively for the three sites range from $70.8 billion to $78.3 billion. As of 2019, the Urenco gas centrifuge uranium enrichment facility near Eunice, NM, is the only operational uranium enrichment facility in the United States. The Urenco facility has the capacity to supply approximately one-third of the annual requirements for U.S. reactors. Several other domestic uranium enrichment facilities began NRC licensing, though no enrichment facilities are proceeding with construction. According to the World Nuclear Association, the majority of commercial uranium enrichment services are performed in China, France, Germany, the Netherlands, Russia, the United Kingdom, and the United States. Smaller-capacity uranium enrichment plants are located in several other countries. Urenco operates uranium enrichment facilities in the United Kingdom, Germany, and the Netherlands. According to the ITC trade data, the top five countries exporting enriched UF 6 to the United States in 2018 were the Netherlands (785,046 kg), Germany (591,108 kg), Russia (547,768 kg), and the United Kingdom (461,187 kg) ( Table 7 ). Between 1993 and 2013, downblended Russian HEU supplied approximately half of the enriched uranium used in U.S. domestic reactors under the Russian HEU agreement, known as the Megatons to Megawatts program. This U.S.-Russian agreement provides for the purchase of 500 MT of downblended HEU from dismantled Russian nuclear weapons and excess stockpiles for commercial nuclear fuel in the United States. After the Megatons to Megawatts program expired in 2013, imports of enriched uranium from Russia decreased by approximately 50% ( Table 7 ). Today, the enriched uranium from Russia imported into the United States comes from mined and milled uranium concentrate, not from downblended uranium from weapons. The enriched uranium which is imported from Russia, or any other country, may have been mined and processed in various other countries, including material exported from the United States. Three fuel fabrication facilities are located in the United States: (1) Global Nuclear Fuel Americas plant in Wilmington, NC, (2) Westinghouse Columbia Fuel Fabrication Facility in Columbia, SC, and (3) Framatome facility in Richland, WA. Fuel fabrication facilities are located in multiple countries, and may offer various services (conversion, pelletizing, rod/assembly) and capacity of those services. ITC data separates uranium material by the type and quantity that physically entered or exited the United States. ITC data does not estimate the amount of uranium materials purchased by utilities for a given year. ITC data does not infer the quantities of uranium materials used, stored, or processed by a nuclear utility and reactor operator. ITC data differs from the EIA data reporting, which may combine purchases by country for uranium concentrate, uranium hexafluoride, and enriched uranium as equivalents of U 3 O 8 . The EIA data indicates the country of origin of uranium purchased by U.S. nuclear utilities and reactor operators. EIA data does not necessarily indicate that those materials were directly imported into the United States as a given uranium material from that country. Comparing ITC and EIA data for the country of Kazakhstan provides some insight into the flow of uranium materials through the global nuclear fuel cycle. According to the World Nuclear Association, Kazakhstan has been the world's leading producer of uranium concentrate since 2009 and produced 21,700 tons of uranium in 2018. Between 2013 and 2017, uranium concentrate imports from Kazakhstan into the United States were 18% to 54% of the uranium purchases by U.S. nuclear utilities and reactor operators ( Figure 4 ). The difference between the uranium purchased by utilities and the uranium concentrate imported into the United States may represent some portion of the origin material which was converted, enriched, and/or stockpiled in other countries prior to being imported into the United States, in the same form or as a different uranium material. For example, a portion of Kazakhstan uranium purchased by U.S. utilities may have been produced as uranium concentrate in Kazakhstan and subsequently transported to conversion facilities in France for the production of UF 6 . After conversion, the UF 6 may have been then transported to an enrichment facility in the Netherlands for the production of enriched UF 6 . Finally, the enriched UF 6 may have been imported into the United States for fuel fabrication and ultimately used in a U.S. nuclear reactor. This comparison of the reported EIA and ITC data with uranium purchases and imports from Kazakhstan illustrates how enriched UF 6 is imported from countries such as Germany, the United Kingdom, and the Netherlands, whereas U.S. nuclear utilities and reactor operators reportedly purchased no uranium originating from those countries. Uranium purchases and imports may vary from year to year. On January 16, 2018, two U.S. domestic uranium mining companies petitioned the U.S. Department of Commerce (DOC) to investigate whether uranium imports from foreign state-owned enterprises, such as those in Russia, China, and Kazakhstan, pose a threat to national security. The investigation into uranium import restrictions sparked a debate between uranium producers; uranium mine and mill operators; and nuclear utilities, reactor operators, and suppliers. Uranium producers asserted that a heavy reliance on foreign uranium constitutes a national security risk and threatens the viability of domestic uranium production. Conversely, nuclear utilities and reactor operators contended that increased fuel costs from trade restrictions would place additional financial burdens on nuclear utilities, potentially causing the premature shutdown of economically marginal nuclear power plants. Stakeholders on both sides of the debate generally agreed that the proposed quotas would increase fuel costs for nuclear utilities and increase revenues for domestic uranium mining. For example, a report sponsored by the Nuclear Energy Institute (NEI) concluded that a 25% quota could increase fuel costs by $500 million to $800 million annually and potentially higher in the years immediately following implementation. An economic study funded by the petitioners estimated uranium mining revenues from a 25% quota would increase by $551 million to $690 million per year and would increase fuel costs by $0.41 per megawatt-hour (MWh). Another study estimated that the $0.41 per MWh increase in fuel costs for nuclear generators would translate to approximately $317 million per year. The uranium Section 232 investigation also raised policy questions about Congress's role under Section 232. Under current federal law, trade actions imposed by the President under Section 232 do not require congressional approval apart from actions related to petroleum imports. Section 232 of the Trade Expansion Act of 1962 (19 U.S.C. Â§1862) provides the President with the ability to impose restrictions on certain imports based on an affirmative determination by DOC that the product under investigation \"is being imported into the United States in such quantities or under such circumstances as to threaten to impair the national security.\" The industry petition called for the President to enact a quota, pursuant to Section 232, on uranium imports such that \"25% of the average historical consumption will be reserved for newly produced U.S. uranium.\" On July 18, 2018, DOC began an investigation into uranium imports under Section 232. The Department of Commerce's Bureau of Industry and Security (BIS) accepted public comments until September 10, 2018. The statute establishes a process and timelines for a Section 232 investigation, but does not provide a clear definition of \"national security,\" allowing the executive branch to use a broad interpretation, and the potential scope of any investigation can be expansive. DOC submitted a report to the President on April 14, 2019. The report has not been made public. According to a presidential memorandum released by the Trump Administration on July 12, 2019, DOC determined \"uranium is being imported into the United States in such quantities and under such circumstances as to threaten to impair the national security of the United States as defined under section 232 of the Act.\" The President did not concur with DOC findings that \"uranium imports threaten to impair the national security of the United States as defined under section 232 of the Act.\" However, the President expressed significant concerns regarding national security, calling for a \"fuller analysis of national security considerations with respect to the entire nuclear fuel supply chain....\" The memorandum established a Nuclear Fuel Working Group, cochaired by the Assistant to the President for National Security Affairs and the Assistant to the President for Economic Policy, which will also include representatives from other executive branch agencies. The working group will \"examine the current state of domestic nuclear fuel production to reinvigorate the entire nuclear fuel supply chain,\" and provide a report to the President within 90 days of the memorandum. The Department of Commerce conducted a Section 232 investigation for uranium imports in 1988. The investigation was initiated at a time when U.S. utilities imported 37.5% of the actual or projected domestic uranium requirements from foreign sources for two consecutive years. No trade actions were imposed as a result of that investigation. Trade restrictions on uranium imports were generally supported by domestic uranium producers, national and state mining associations, and other companies associated with uranium production. Some elected officials, including the U.S. Senators from Wyoming, one of the largest uranium-producing states, supported trade actions on uranium imports. The Section 232 petition asserts that the long-term viability of the domestic uranium production industry is threatened by unfair market practices by foreign state-owned enterprises. Supporters of the petition anticipate trade quotas would provide domestic uranium producers relief by increasing the price of uranium, and subsequently increasing domestic uranium production. According to advocates of this approach, increased uranium prices and production may offer direct and indirect employment opportunities and economic stimulus to local economies. The Wyoming Mining Association (WMA) offered support to uranium import actions in its comment letter: WMA believes the petition sets forth a compelling case that the current state of the domestic uranium mining industry is not simply a result of foreign competition legitimately underpricing domestic producers. It now is clear that foreign, state-mandated and state-supported uranium production is thwarting our domestic industry's ability to compete in an oversupplied and underpriced market. One of the domestic uranium producers who submitted the Section 232 petition to DOC expressed concern with the President's determination to not take actions on uranium imports. An Energy Fuels statement also suggests that the petition \"has been very successful.\" The company further stated, \"We are very pleased to have gained the attention and action of the Administration to address the energy and national security issues raised in the petition and Department of Commerce investigation.\" Another U.S. uranium producer, Cameco, agreed with the President's determination to not take actions on uranium imports under Section 232. Cameco has uranium assets in the United States, Canada, and Kazakhstan. Cameco operates the largest operational uranium recovery capacity in the United States, the Smith Ranch-Highland ISR operation in Wyoming. Representatives from nuclear utilities and reactor operators, industry trade groups, think tanks, converters, enrichers, and foreign governments opposed the trade actions on uranium imports proposed by the petitioners. Nuclear utilities and reactor operators asserted that quotas on uranium imports may increase fuel costs, causing financially vulnerable nuclear reactors to shut down earlier than currently planned. The Ad Hoc Utilities Group (AHUG), collectively representing U.S. nuclear generators, asserted, \"Imports assure the security of nuclear fuel supply and the reliability of the electric grid. Nuclear generators source from a diverse set of suppliers at all stages of the nuclear fuel cycle with the majority of supply coming from the U.S. and our allies in Canada, Australia, and Western Europe.\" Operators of U.S. conversion and enrichment facilities in the United States publicly expressed concern with uranium import quotas. Malcolm Critchley, the marketing agent for ConverDyn, stated that quotas \"would undoubtedly cause suppliers to divert uranium [from Honeywell].... to other locations outside of the United States if the supplier did not have a known domestic customer at the time of import.\" U.S. uranium enrichers shared these concerns. Melissa Mann, the president of Urenco USAâthe only uranium enrichment operation in the United Statesânoted that with the ceased operations at Honeywell and the Department of Energy termination of its barter program, \"there is currently no source of natural UF 6 in the United States.\" Urenco receives deliveries of UF 6 from Cameco's Port Hope facility in Canada and Orano's Comhurex II in France. She cautioned, \"Should remedies in the uranium Section 232 investigation be imposed that disrupt deliveries of UF 6 to [New Mexico], operation of the facilityâand the $5 billion investment in the plantâcould be jeopardized,\" and \"the lack of feed material to enrich would also jeopardize delivery of low enriched uranium to fuel fabricators, putting at risk utility reactor reload schedules and reactor operations.\" Some utilities have dismissed claims about the dependence on foreign-sourced uranium and vulnerability to supply chain disruptions. For example, Dominion Energy noted that concerns with foreign supply disruptions were exaggerated because \"in the past five years, our only delays or interruptions in nuclear fuel component deliveries have been from U.S. based fuel cycle suppliers.\" In March 2018, the Trump Administration imposed tariffs on foreign imports of steel and aluminum pursuant to Section 232. This was the first implementation of trade actions under Section 232 since 1986. Some Members of Congress have questioned whether the Administration's use of Section 232 on steel and aluminum imports is an appropriate use of the trade statute and relies upon broad interpretations of the definition of national security. Bills have been introduced in both chambers ( H.R. 1008 and S. 365 ) in the 116 th Congress that would amend Section 232 to provide for congressional disapproval of certain trade actions with the enactment of a disapproval resolution. The uranium Section 232 investigation was discussed in a September 6, 2018, hearing by the Senate Appropriations Committee, Subcommittee on Commerce, Justice, Science, and Related Agencies. At that hearing, Richard Ashooh, Commerce Assistant Secretary for Export Administration at BIS, suggested that the uranium investigation had prompted the agency to consider \"creative ideas\" outside of using import restrictions. On February 5, 2019, the House Committee on Natural Resources requested from the uranium producers that had submitted the petition to the Department of Commerce, \"All documents and communications ... relating to the Department of Commerce Section 232 Investigation on uranium.\" As a broad policy matter, Congress may consider the federal role in issues associated with the front-end of the nuclear fuel cycle. The uranium materials and service industry delivers fuel for commercial nuclear power reactors, which is largely traded and purchased under private contracts in a global marketplace. Similar to other energy markets, uranium supply is an issue on which Congress may or may not elect to intervene. As discussed previously, the United States ceased production of HEU for weapons in 1964, due to the determination of sufficient stockpiles. Fuel for nuclear naval propulsion is supplied by government HEU stockpiles, and the production of HEU for naval propulsion ended by 1992. Questions about the sufficiency of the defense uranium stockpile and future uranium requirements for defense and other purposes are beyond the scope of this report. The financial viability in the short term and long term for domestic uranium producersâuranium miners and millersâin the United States remains uncertain. Domestic uranium production experienced a sharp decline during the early 1980s, and has remained at comparatively low levels over the past 25 years. Recently, global demand for uranium has been depressed due to a number of factors, including the continued shutdown of most Japanese nuclear power reactors following the Fukushima Daiichi accident. In 2018, domestic uranium concentrate production was 1.5 million pounds, down approximately 40% from 2017, and at the lowest annual production levels since 1950. U.S. uranium producers have dealt with poor market conditions by decreasing production and imposing employment layoffs. Domestic uranium producers have reportedly engaged in purchasing uranium concentrate on the market at lower spot market prices to fill delivery obligations at relatively higher contract prices. States have proposed legislation intended to provide some financial relief for domestic uranium producers. U.S. nuclear power plants face economic issues and a general uncertainty over their long-term economic viability. Of the 98 operating nuclear reactors, 12 are scheduled to shut down, prior to license expiration, by 2025. The Plant Vogtle nuclear expansion project in Georgia, currently the only new construction of nuclear power reactors in the United States, is reportedly billions of dollars over budget and years behind schedule. A 2018 report by the Union of Concerned Scientists asserts that roughly one-third of nuclear power plants are unprofitable and modest changes in costs may have profound impacts on other nuclear power plants' economic viability. Some Native American tribes and public interest groups in the United States opposed trade actions on uranium imports due to concerns that uranium import restrictions would promote increased domestic uranium mining and milling operations. These groups suggested the health and environmental issues associated with historical uranium mining and milling have not been adequately addressed. Persistent soil, surface and groundwater contamination associated with historical uranium mining and milling remains a concern for some communities. For example, federal, state, and tribal agencies manage environment impacts associated with historical uranium mining and milling operations that occurred on Navajo Nation lands. Given environmental impacts associated with historical domestic uranium mining and milling operations, Congress may consider examining potential long-term environmental or public health consequences of expanding domestic uranium production and the adequacy of bonding and long-term financial assurance requirements for current or future uranium production operations undergoing site reclamation and decommissioning.", "summary": "Nuclear power contributes roughly 20% of the electrical generation in the United States. Uranium is the fundamental element in fuel used for nuclear power production. The nuclear fuel cycle is the cradle-to-grave life cycle from extracting uranium ore from the earth through power production in a nuclear reactor to permanent disposal of the resulting spent nuclear fuel. The front-end of the nuclear fuel cycle considers the portion of the nuclear fuel cycle leading up to electrical power production in a nuclear reactor. The front-end of the nuclear fuel cycle has four stages: mining and milling, conversion, enrichment, and fabrication. Mining and milling is the process of removing uranium ore from the earth, and physically and chemically processing the ore to develop \"yellow-cake\" uranium concentrate. Uranium conversion produces uranium hexafluoride, a gaseous form of uranium, from uranium concentrate. Uranium enrichment physically separates and concentrates the fissile isotope U-235. The enriched uranium used in nuclear power reactors is approximately 3%-5% U-235, while weapons-grade enriched uranium is greater than 90% U-235. Nuclear fuel fabrication involves manufacturing enriched uranium fuel rods and assemblies highly specific to a nuclear power reactor. Historically, the Atomic Energy Commission (AEC), a predecessor federal agency to the Department of Energy (DOE) and the Nuclear Regulatory Commission (NRC), promoted uranium production through federal procurement contracts between 1947 and 1971. Since the late 1980s, U.S. nuclear utilities and reactor operators have purchased increasingly more foreign-origin uranium for reactor fuel than domestically produced uranium. In 1987, about half of uranium used in domestic nuclear reactors was foreign origin. By 2018, however, 93% of uranium used in U.S. nuclear reactors was foreign origin. No uranium conversion facilities currently operate in the United States. There is one operational U.S. commercial uranium enrichment facility, which has the capacity to enrich approximately one-third of the country's annual reactor requirements. In addition to newly mined uranium, U.S. nuclear power reactors also rely on secondary sources of uranium materials. These sources include federal and commercial stockpiles, reenrichment of depleted uranium, excess feed from underfeeding during commercial enrichment, and downblending of higher enriched uranium. The global uranium market operates with multiple industries exchanging uranium products and services through separate, nondirect, and interrelated markets. Producers, suppliers, and utilities buy, sell, store, and transfer uranium materials. Nuclear utilities and reactor operators diversify fuel sources among primary and secondary supply, and may acquire uranium from multiple domestic and foreign suppliers and servicers. For example, a nuclear power utility in the United States may purchase uranium concentrate that has been mined and milled in Australia, converted in France, enriched in Germany, and fabricated into fuel in the United States. On January 16, 2018, two domestic uranium producersârepresentatives from the uranium mining/milling industryâpetitioned the U.S. Department of Commerce to conduct a Section 232 investigation pursuant to the Trade Expansion Act of 1962 (19 U.S.C. Â§1862) to examine whether U.S. uranium imports pose a threat to national security. The department found that uranium imports into the United States posed a threat to national security as defined under Section 232. In a July 12, 2019, memorandum, President Trump announced he did not concur with the Department of Commerce's \"finding that uranium imports threaten to impair the national security of the United States as defined under section 232 of the Act.\" The Section 232 uranium investigation into uranium imports has increased the discussion about the nuclear fuel supply chain and potential future U.S. uranium needs. Included in the July 12, 2019, memorandum, the Trump Administration established a Nuclear Fuel Working Group, to assess the challenges facing the domestic uranium industry and to consider options to \"revive and expand the nuclear energy sector.\" Given uncertainties regarding the long-term viability of the domestic uranium production and commercial nuclear power sectors, continued issues associated with the front-end of the nuclear fuel cycle may persist.", "document_type": "crs"}
{"report": "Amtrakâlegally the National Railroad Passenger Corporationâwas created by the Rail Passenger Service Act of 1970 and began operating in 1971, taking over intercity passenger service from financially distressed private railroad companies. It originally did not own any rail infrastructure, eventually coming to own some assets cast off by bankrupt private railroads. It is operated as a private company and not a government corporation, but the President appoints the members of its Board of Directors and its primary stockholder is the U.S. Department of Transportation (DOT), with a small proportion of common stock held by other railroad companies. Amtrak currently serves over 500 stations in 46 states and the District of Columbia, running over 300 trains per day on a network approximately 22,000 miles long ( Figure 1 ). Since 2008, Amtrak services have been grouped into three business lines: (1) the Washington-New York-Boston Northeast Corridor (NEC), (2) short-distance corridors under 750 miles long with service supported by state governments, and (3) long-distance trains serving destinations over 750 miles apart, usually once per day on an overnight schedule. Under the Fixing America's Surface Transportation (FAST) Act of 2015 ( P.L. 114-94 ), the state-supported short-distance and long-distance routes were grouped together into the National Network. Amtrak's Thruway network of over 150 intercity bus routes serves as a feeder service for passenger trips originating or terminating in cities off the rail system. Over 31 million trips were taken on Amtrak in 2018, a company record. Amtrak system ridership has exceeded 30 million trips every year since 2011, and has increased 26% over the last 15 years, with much of that growth coming on Amtrak's state-supported short-distance corridors ( Figure 2 ). Approximately 48% of all Amtrak trips were taken on state-supported routes in 2018, compared with 38% on the Northeast Corridor and the remaining 14% on long-distance trains. State-supported routes have accounted for the plurality of Amtrak trips among its three business lines every year since 2005. One contributing factor to the growth of state-supported route traffic over that period is that Amtrak and its state partners have added new routes and additional daily trains. Despite record ridership levels, Amtrak trains are roughly as full as they have been at any point in the past decade (see discussion of load factor below), and Amtrak passengers account for a small fraction of intercity passenger travel volume nationwide. In 2017, the most recent year for which such data are available, Amtrak generated 6.5 billion passenger-miles (one passenger-mile is equal to one passenger traveling one mile) of traffic volume; by comparison, domestic air travel generated 694 billion passenger-miles, over 100 times as many as Amtrak. Highway users generated an estimated 5.5 trillion passenger-miles in 2017, including 365 billion on buses, though this includes trips that are not intercity in nature. However, Amtrak passenger-miles have seen a greater cumulative percent increase since 2004 than highway passenger-miles, and saw a greater cumulative percent increase than domestic air passenger-miles from 2008 to 2015 before being overtaken in 2016 ( Figure 3 ). Though Amtrak ridership has been steady or rising in terms of trips taken, Amtrak passenger-miles have declined somewhat since 2013, suggesting an increase in shorter trips. The NEC is the only market in which Amtrak serves a larger proportion of intercity trips than airlines, with both lagging far behind highway travel. Lack of equipment and track capacity have inhibited Amtrak from increasing service on the NEC. Amtrak's expenses exceed its revenues each year. In FY2018, Amtrak's revenues totaled $3.2 billion, against expenses of $4.1 billion, for a net loss of $868 million. That loss was covered by federal grants made to Amtrak by DOT (see the discussion of funding issues later in this report). Revenues covered 79% of the railroad's total expenses in FY2018, the highest ratio over the 15 years for which comparable data are available (see Figure 4 and Table 1 ). Under pressure from Congress and several Administrations, Amtrak has reducedâbut not eliminatedâits reliance on federal subsidies to support its operations. Amtrak had net losses of roughly $900 million in each of FY2017 and FY2018, the first two years in the past 15 in which net losses were less than $1 billion. One important reason for this improvement is a doubling of revenue from commuter railroads using the NEC from pre-2016 to post-2016, due to higher payments required under the cost allocation policy established by Section 212 of the Passenger Rail Investment and Improvement Act of 2008 (PRIIA; Division B of P.L. 110-432 ) and enforceable by the Surface Transportation Board (STB) under Section 11305 of the FAST Act. By Amtrak's preferred metric, which adjusts the net loss by removing depreciation and certain other expenses, annual operating losses have been reduced to a figure smaller than $250 million in each of the past five fiscal years; this figure was over twice as large in nominal terms in the years prior to 2007 ( Figure 5 ). The effect is more dramatic when taking the effects of inflation into account; in constant 2019 dollars, the figure was four times as large in 2007 as it was in 2018. This metric, dubbed the a djusted o perating r esult , is seen by Amtrak as more closely reflecting the need for federal operating support, but it does not take the railroad's capital investment needs into account. By another measure, which allocates costs and revenues to each available seat-mile of passenger capacity offered, Amtrak has recovered at least 96% of operating costs every year since 2014, up from below 80% in the preceding years ( Figure 6 ). One contributing factor to this improved financial performance is likely the requirement, contained in PRIIA, that operating losses on short-distance routes located off the NEC be offset by state funds, effective on the first day of FY2014. One measure of efficiency is the passenger load factor, which measures what percentage of the available seats is being used by passengers. Amtrak's load factor has varied within a fairly narrow band since 2004. Its current load factor, 51%, is near the record load factor Amtrak reported in FY1988. Load factor varies across Amtrak's three business lines, with NEC and Long Distance trains at 58% and 57%, respectively, in FY2018, while state-supported routes lagged at 40%. Improving load factor is one way of boosting revenue without increasing costs, but this can be difficult if passenger traffic is not distributed evenly along a route. Routes on which one station generates a large share of originating and terminating traffic are likely to have relatively low load factors in some segments but higher load factors in the \"peak segment.\" For example, if a train on the NEC is sold out between Philadelphia and New York, Amtrak may not be able to accommodate passengers who wish to travel between Baltimore and New York, resulting in empty seats between Baltimore and Philadelphia. If Amtrak were to accommodate these riders with additional cars, this could reduce load factor even as it increases ridership. As discussed above, Amtrak has never generated sufficient revenue to cover its operating and capital expenses. The Administration requests funding for Amtrak each year as part of its DOT budget request. Amtrak also submits a separate appropriation request to Congress each year; typically, that request is larger than the Administration's request. Table 2 shows the difference in the requests submitted for FY2020. Congress addresses Amtrak's subsidy in the annual Transportation, Housing and Urban Development, and Related Agencies Appropriations Act. For most of Amtrak's existence, Congress has divided Amtrak's grant into two categories, operating and capital grants. The operating grant could be thought of as relating to Amtrak's annual cash loss, and the capital grant as relating to the depreciation of Amtrak's assets, as well as an amount for Amtrak debt repayments. Congress changed the structure of federal grants to Amtrak in Title XI of the FAST Act. Starting in FY2017, Amtrak's appropriation has been divided between funding for the operationally self-sufficient NEC, which has large capital needs, and the National Network, which has modest capital needs (as the tracks are almost entirely owned and maintained by freight railroads) but runs an operating deficit of several hundred million dollars. The change was intended to increase transparency of the costs of Amtrak's two major lines of business and eliminate cross-subsidization between them; operating profits from the NEC and state access payments for use of the NEC will be reinvested in that corridor, and passenger revenue, state payments, and federal grants for the National Network will be used for that account. Amtrak's reliance on annual appropriations has made it difficult to fund long-term capital projects. DOT's Inspector General has noted that the lack of long-term funding \"has significantly affected Amtrak's ability to maintain safe and reliable infrastructure and equipment, and increased its capital program's annual cost.\" Amtrak's FY2020 budget request suggests a multiyear appropriation to provide some additional stability without fundamentally altering the mechanism by which Amtrak receives its federal funding. Most federal funding for highway and transit programs is provided by a special form of budget authority, contract authority, which allows DOT to obligate funds from the Highway Trust Fund in advance of an appropriation. This permits DOT to commit to support highway projects that may take several years to complete. There have been proposals to create a similar trust fund for Amtrak, in order to provide a greater level of financial stability and permit such long-term funding of capital projects. Such efforts have faced objections from some Members of Congress opposed to Amtrak receiving federal funding. There is also a practical challenge to identifying a revenue source for an Amtrak trust fund. The Highway Trust Fund, which receives revenue from taxes on motor fuels and heavy trucks, is not authorized to spend money on intercity rail services; in any event, the revenues flowing into the fund are far below the level required to support the levels of federal highway and transit spending authorized by Congress, necessitating several transfers of money from the general fund since 2008. If a passenger rail trust fund were to be funded solely from a tax on passengers, the cost of Amtrak tickets could rise by several dollars per ticket at current ridership levels, potentially contravening the purpose of the fund by reducing ridership. Amtrak has stated that there is a $28.1 billion backlog of state-of-good-repair projects on the NEC, which Amtrak revenue alone is unable to fund, and which does not include capital projects deemed necessary to increase capacity. It seems unlikely that private investors would be prepared to provide that funding in exchange for a share of the operating profits generated by NEC passenger trains. The obstacles facing such an investor would be largely the same as the ones currently facing Amtrak: operating profits are insufficient to cover capital costs, and the ability to increase revenue by running additional trains into Penn Station in New York City, by far the most popular origin and destination point on the NEC, will be limited until and unless major capital improvements not included within the state-of-good-repair backlog, including a new tunnel under the Hudson River, are completed. The fragmented control of NEC infrastructure, some of which is owned by state governments, would persist even if Amtrak's assets in the corridor were operated by some private entity. A provision of the FAST Act required the Federal Railroad Administration (FRA) to solicit proposals to design, build, operate, and maintain high-speed rail systems on federally designated high-speed rail corridors, including the NEC. No such proposal was submitted for the NEC. Plans to create a separate entity to own and/or operate the NEC, including as part of larger plans to reorganize or privatize the entire passenger rail system, have been proposed but have never been adopted in full. In 2002, the Amtrak Reform Council submitted its recommendations to Congress for a \"restructured and rationalized national intercity rail passenger system\" as required by the Amtrak Reform and Accountability Act of 1997. Among other measures, the council endorsed organizing NEC infrastructure assets under a separate government corporation that would control the assets and manage rail operations and capital improvements. The council admitted in its recommendations that this new infrastructure company would not be able to fund its own capital needs, and endorsed continued federal funding in addition to funds committed by the states. A similar suggestion, which was known as the Competition for Intercity Passenger Rail in America Act, was proposed in 2011 by the leadership of the House Committee on Transportation and Infrastructure but never introduced. Some proposals have called for a dedicated funding source, backed by taxes or fees within the region served by the NEC. The thinking behind this is that restructuring of the NEC would be more attractive politically if it were dependent mainly on revenue raised within the region rather than on federal government resources. As the NEC passes through eight states and the District of Columbia, creation of a dedicated regional funding source is likely to require some form of interstate agreement, with each state concerned that its contribution is commensurate with the benefits it expects to receive. Critics of Amtrak have often questioned the necessity of continuing to operate long-distance trains, which usually require the largest operating subsidies, both in total dollars and in dollars per trip or per passenger-mile. Proponents of passenger rail have contended that these operating losses are distorted by Amtrak accounting practices, pointing to the allocation of fixed costs to individual routes and the differing treatment of state and federal grant funds. Amtrak has responded that its accounting practices, based on a performance tracking system developed by DOT's Volpe Transportation Systems Center in conjunction with the Federal Railroad Administration (FRA) and Amtrak, accurately allocate costs among its various routes. Amtrak points out, for example, that while its California Zephyr between Chicago and Emeryville, CA, has greater revenue per trip than an average Northeast Regional train on the NEC, the long-distance train requires nine times as many employees, twice as much equipment, and more switching operations in rail yards for every trip. Amtrak has proposed shifting its focus from maintaining existing levels of service on all 15 long-distance routes currently in the Amtrak system to shorter corridors that would be supported by the states. Amtrak is under pressure to accomplish two goals that at times seem to work against one another: to serve as the national passenger railroad, including through the operation of long-distance routes, and to reduce or eliminate the need for federal subsidies. Federal law provides that \"Amtrak shall operate a national rail passenger transportation system which ties together existing and emergent regional rail passenger service and other intermodal passenger service.\" The phrase \"national rail passenger transportation system\" is defined to include \"long-distance routes of more than 750 miles between endpoints operated by Amtrak as of the date of enactment of the Passenger Rail Investment and Improvement Act of 2008.\" However, Amtrak also has statutory power to discontinue routes, notwithstanding the above provisions. In its FY2020 budget request, the Trump Administration proposed a reduction in annual appropriations to the National Network, with the expectation that either states would support continued operation of long-distance routes or Amtrak would discontinue them. The Administration proposed to offset this reduction with a $550 million appropriation to a new Restoration and Enhancements discretionary grant program, which would allow states to gradually ramp up to their full contributions, with a federal subsidy decreasing each year over a five-year period. In its own FY2020 budget request, Amtrak requested an appropriation equal to the full $1.8 billion authorization contained in the FAST Act, but stated some support for changing the way the National Network is funded in the future (emphasis added): Amtrak appreciates the Administration's focus on expanding intercity passenger rail service to today's many underserved cities and corridors across the nation. We believe that a modernization of the National Network, with the right level of dedicated and enhanced federal funding , would allow Amtrak to serve more passengers efficiently while preserving our ability to maintain appropriate Long Distance routes. Removing federal support for long-distance service could create a circumstance in which, if one state along the route declined to contribute to its operating costs, Amtrak might be left with little recourse other than to discontinue the route. Proponents of continued long-distance train service point to the large proportion of trips taken on long-distance trains between origins and destinations other than the endpoints, and to the trains' relatively high load factor (57% in FY2018) compared to other Amtrak routes (58% on the NEC, 40% on state-supported routes), an indicator of efficient utilization of passenger space. However, depending on the number of cars in each train, this could conceal an inefficient utilization of engines and engineers, as a short train may require the same crew as a longer one no matter how many passengers are aboard. Existing state-supported routes could also face service cuts due to a lack of state support. The Chicago-Indianapolis Hoosier State route was created in 1980 to provide service on days when the thrice-weekly Cardinal long-distance train did not operate. When PRIIA Section 209 went into effect at the beginning of FY2014, requiring the state of Indiana to cover all operating losses associated with the route, state political support began to wane, and the route was threatened with discontinuance. Under a different section of PRIIA, the state contracted with a private railroad company to operate the route, but that company withdrew from the agreement before the base contract period had expired, returning responsibility to the state government. The Hoosier State was discontinued on June 30, 2019, after Indiana declined to provide further funding. Section 210 of PRIIA required Amtrak to generate performance improvement plans for all 15 of its long-distance routes, starting with the 5 worst-performing routes based on 2008 data. These reports contained a number of recommended actions to improve long-distance train performance according to various metrics: the Customer Satisfaction Index (CSI), on-time performance (OTP), and cost recovery (CR). There has been uneven improvement in long-distance train performance in the intervening years. Two routes have higher CSI scores (now referred to as eCSI scores) than they did in 2008, six routes have better on-time performance, and five have improved cost recovery rates. All other scores for these routes have stayed the same or worsened. The extent to which any actions taken as a result of the Section 210 plans either improved route performance or mitigated its decline is unclear. Freight train interference is one cause of poor on-time performance on Amtrak routes. By law, Amtrak is to be given \"preference\" over other railroad traffic when using tracks it does not own. In practice this preference has been difficult to enforce, as freight railroads have little incentive to be overly accommodating to Amtrak trains, for which they are reimbursed only the incremental cost of Amtrak's use of their tracks. Sections 207 and 213 of PRIIA directed FRA, Amtrak, and STB to develop minimum on-time performance standards, and gave STB enforcement power over railroads that failed to meet these standards. Final metrics and standards went into effect in 2010, before being suspended in 2012 amid court challenges. Following a series of court decisions that ultimately upheld Amtrak's role in developing performance standards but altered the role of the STB, FRA and Amtrak are free to reformulate new on-time performance standards. At a June 2019 Senate hearing, Amtrak CEO Richard Anderson said this could be completed in less than 90 days, though he declined to commit to a specific timeline. Anderson compared these standards to similar metrics in use in the commercial aviation industry. Current law permits the U.S. Department of Justice (DOJ) to enforce Amtrak's statutory track preference. Anderson has noted in communications with lawmakers that DOJ has done so only once in Amtrak's history, against the Southern Pacific railroad in 1979. Amtrak has requested that a similar enforcement power be granted statutorily to Amtrak, going so far as to recommend specific bill language that would allow Amtrak to sue host railroads. Another option is to make funding available to states to assist them in purchasing tracks used by passenger trains from their freight railroad owners. The state of Michigan pursued this strategy, using roughly $150 million in federal grant funds awarded in 2011 to purchase the 135-mile rail corridor from Kalamazoo to Dearborn on the Chicago-Detroit corridor. At the time of the transaction in 2012, previous owner Norfolk Southern Railway had placed several sections of the corridor under slow orders due to poor infrastructure conditions. After several years of repairs and construction funded in part by additional federal grants beyond those used to purchase the line, Amtrak's on-time performance on the Chicago-Detroit Wolverine service rose from 53% in FY2015 to nearly 70% in FY2016, though it has declined slightly since (and 70% is still below the 80% standard initially set under PRIIA 207). Using a slightly different ownership structure, the state of North Carolina supports several passenger trains per day between Raleigh and Charlotte on tracks owned by the North Carolina Railroad, a state-owned entity that leases its tracks to Norfolk Southern. Norfolk Southern agreed to increased passenger service on the line in return for extensive public investment in improving and expanding the infrastructure. The number of daily trains offered by the state-supported Piedmont service has increased, and the service has exceeded the 80% on-time performance standard for state-supported routes in five of the past seven years. Public ownership of rail infrastructure can be beneficial for passenger rail on-time performance because of the lessened incentive to give priority to freight traffic. Where a freight railroad may find it more profitable to delay passenger trains to accommodate freight trains, a public owner might give preference to passenger services instead. However, in situations that involve public-sector purchases of busy freight lines, it is likely that the affected freight railroads would demand protection for their services as a condition in any sale agreements. Freight railroads are less likely to give up control of their busiest main lines than in the case of parallel or secondary lines. One issue that has hindered congressional efforts to encourage competition in passenger rail service is that freight railroads' statutory obligation to carry passenger trains applies only to trains operated by Amtrak. This may be one reason that states that have initiated state-supported routes have uniformly contracted with Amtrak to be the operator. For other operators to be able to compete with Amtrak on equal footing, legislation may be needed to address their rights to make use of freight railroads' infrastructure. Amtrak has served food and beverages since it began operating in 1971, continuing the practice of its predecessor companies. As far back as 1981, Congress prohibited Amtrak from providing food and beverage service at a loss, and this prohibition is still in the statutes governing Amtrak: Amtrak may ... provide food and beverage services on its trains only if revenues from the services each year at least equal the cost of providing the services. The law does not define what is to be included in the \"cost of providing the services.\" Amtrak has stated that providing food and beverage service is essential to meeting the needs of passengers, especially on long-distance trains, and it has interpreted the law as requiring that revenues cover the costs of food and beverage items and commissary operations but not the labor cost of Amtrak employees providing food service aboard trains. When on-board labor costs are excluded, Amtrak says, the service covers its costs. When labor costs are included, however, the service operates at a significant deficit (see Table 4 ). Amtrak has taken measures, at Congress's direction, to reduce costs for food and beverage service. In 1999, it shifted from handling food and beverage supplies internally to contracting out such activities. More recently, Amtrak announced it would be discontinuing its traditional dining car service on several long-distance routes, in part to save money. A House proposal in the 112 th Congress would have required FRA to contract out Amtrak's onboard food and beverage service but acknowledged that the service may operate at a loss. Section 11207 of the FAST Act requires Amtrak to develop a plan to eliminate food and beverage service losses, and prohibits federal funds from being used to cover losses starting five years after enactmentâbut also provides that no Amtrak employee shall lose his or her job as a result of any changes made to eliminate losses. Congress provided that Amtrak could eliminate the losses on food and beverage service through \"ticket revenue allocation.\" Although that phrase is not defined in the law, it implies that Amtrak could declare that a portion of the ticket prices paid by certain passengers is dedicated to food and beverage service, as it already does for passengers traveling in first-class accommodations. Positive train control (PTC) is an interconnected system of signals and communication devices designed to prevent collisions and derailments by automatically slowing or stopping a train if its engineer fails to do so. The Railway Safety Improvement Act of 2008 (RSIA; Division A of P.L. 110-432 ) required all tracks used by passenger trains to be equipped with PTC by the end of 2015, now effectively extended to December 31, 2020, by subsequent laws and regulations. All Amtrak-owned or -controlled track had PTC in operation on January 1, 2019, except approximately one mile of slow-speed track in the complex Chicago and Philadelphia terminal areas, and PTC is installed on 85% of other railroads' route miles that Amtrak uses. However, to fully comply with the PTC mandate, PTC-equipped Amtrak trains must be certified interoperable with all PTC systems installed by host railroads, and Amtrak's PTC system must be interoperable with other railroads' PTC-equipped trains that use its tracks. At the end of 2018, Amtrak had achieved interoperability with 2 railroads out of a total of 13 that use its tracks, though this does not necessarily reflect Amtrak's progress achieving interoperability with its host railroads. The Government Accountability Office has found that of all railroads subject to the statutory mandate, only two commuter railroads have achieved full operation and full interoperability. If Amtrak does not achieve 100% interoperability with its host railroads by the deadline, absent a waiver or subsequent extension (which FRA has stated it will not issue), Amtrak would need to suspend rail service on noncompliant lines or risk enforcement action in the form of financial penalties for each day it operates in violation of the mandate.", "summary": "Amtrakâofficially the National Railroad Passenger Corporationâhas been the national intercity passenger railroad since 1971, and currently serves over 500 stations on a network approximately 22,000 miles long. In some markets, such as the busy Northeast Corridor (NEC) connecting Washington, New York, and Boston, it has captured a greater share of intercity passengers than domestic airlines. In other, more rural markets, some see it as a vital link to the national transportation system despite low levels of ridership. Though Amtrak is legally a private for-profit corporation, the federal government controls the company's operations. A five-year authorization of federal funding for Amtrak was included in the Fixing America's Surface Transportation (FAST) Act of 2015 ( P.L. 114-94 ), which expires at the end of FY2020. Since its inception, Amtrak has depended on annual appropriations from the federal government to cover its capital (infrastructure, vehicles) and operating (train crews, maintenance) costs. Amtrak's financial health has improved in recent years. In 2018, according to the railroad, revenue covered 79% of its expenses, the highest ratio it has ever reported. Amtrak's preferred metric for financial performance, its adjusted operating loss, declined to $168 million, but this figure does not take its capital needs into account. Increased contributions from commuter railroads that use the NEC have played an important role in reducing the need for federal support. Amtrak's ridership continues to increase, as does its relative share of passenger miles traveled, though both remain small on a national scale when compared to road and air traffic. Despite these improvements, a large backlog of capital projects remains unfunded, and Amtrak remains under pressure to further reduce its need for operating subsidies. Capacity constraints will make further ridership increases difficult to achieve without capital expenditures for additional equipment and track improvements. The Amtrak system is divided into two subsets for funding purposes, the NEC and the National Network (everything else), each facing its own set of challenges. Congress may want to explore opportunities to further differentiate these systems in terms of how they are funded and managed. Comparatively high revenues on the NEC compared to operating costs have prompted occasional proposals to either partially or fully privatize the existing service, while its large capital backlog and lack of a long-term dedicated funding source have raised questions about whether a new NEC-only funding mechanism is needed. The National Network, meanwhile, encompasses both short-distance corridors supported by state governments and long-distance routes that require the largest federal subsidies in the Amtrak system. Amtrak is under pressure to accomplish two goals that at times seem to work against one another: to serve as the national passenger railroad, including through the operation of long-distance routes, and to reduce or eliminate the need for federal subsidies. While Congress has repeatedly taken steps to preserve long-distance passenger trains, both the Trump Administration and Amtrak have voiced support for shifting focus away from long-distance trains and toward serving a larger number of shorter corridors. Any such rebalancing, however, would be contingent on state support that is far from certain. Apart from funding, other issues facing Amtrak have been on the congressional agenda for years. On-time performance has seen only sporadic improvement since the enactment of a 2008 law designed to enforce the preferential treatment, codified in statute since the 1970s, of Amtrak trains running on freight tracks. Onboard food and beverage service, long seen by critics as a contributor to financial losses but by supporters as integral to the rail travel experience, has mirrored Amtrak as a whole in improving its financial performance while still falling short of goals set by Congress. Installation of a key safety technology mandated in 2008 is continuing according to federally approved schedules, but Amtrak routes that operate on track owned by freight or commuter railroads face the additional hurdle of demonstrating interoperability with those railroads' safety systems, putting the timeline to full implementation at risk.", "document_type": "crs"}
{"report": "This report provides background information and analysis on two amendments to the Anti-Terrorism Act (ATA, 18 U.S.C. Â§Â§ 2331 et seq. ): the Anti-Terrorism Clarification Act of 2018 (ATCA, P.L. 115-253 ), which became law in October 2018; and the Promoting Security and Justice for Victims of Terrorism Act of 2019 (PSJVTA, Â§ 903 of P.L. 116-94 ), which became law in December 2019. The report focuses on the impact of this legislation on the following key issues: U.S. aid to the Palestinians. Whether federal courts have personal jurisdiction over the Palestinian Authority (PA) and Palestine Liberation Organization (PLO) for terrorism-related offenses. The ATA generally prohibits acts of international terrorism, including the material support of terrorist acts or organizations. It also provides a civil cause of action through which Americans injured by such acts can sue responsible persons or entities for treble damages. Prior to ATCA, the ATA did not dictate personal jurisdiction. Congress passed ATCA in the wake of a U.S. federal lawsuit (known in various incarnations as Waldman v. PLO and Sokolow v. PLO ) that an appeals court dismissed in 2016. The plaintiffs were eleven American families who had members killed or wounded in various attacks against Israeli targets during the second Palestinian intifada (or uprising, which took place between 2000 and 2005). The trial court found that the PA and PLO were liable for the attacks because they provid ed material support to the perpetrators. 6 The jury awarded damages of $218.5 million, an amount trebled automatically under the ATA , bringing the total award to $655.5 million. On appeal, however, the U.S. Court of Appeals for the Second Circuit (Second Circuit) dismissed the suit for lack of personal jurisdiction. Discussed in more detail below, personal jurisdiction is the principle that defendants in U.S. courts must have \"minimum contacts\" to the forum for the court to adjudicate the dispute. In Waldman/ Sokolow , the Second Circuit conclude d that the terrorist attacks, \"as heinous as they were, were not sufficiently connected to the United States\" to create personal jurisdiction in U.S. federal courts. ATCA amended ATA (at 18 U.S.C. Â§ 2334) by, among other things, stating that a defendant consented to personal jurisdiction in U.S. federal court for lawsuits related to international terrorism if the defendant accepted U.S. foreign aid from any of the following three accounts after the law had been in effect for 120 days : Economic Support Fund (ESF); International Narcotics Control and Law Enforcement (INCLE); or Nonproliferation, Anti-terrorism, Demining, and Related Programs (NADR). Although ATCA's terms do not specifically cite the PA/PLO, ATCA's reference to the three accounts from which U.S. bilateral aid to the Palestinians has traditionally flowed (see \" U.S. Aid to Palestinians \" below) suggests that ATCA was responding to the appellate ruling in the Waldman/Sokolow cases on personal jurisdiction. In December 2018, then-PA Prime Minister Rami Hamdallah wrote to Secretary of State Michael Pompeo that the PA would not accept aid that subjected it to U.S. federal court jurisdiction. Consequently, U.S. bilateral aid to the Palestinians ended on January 31, 2019. In December 2019, Congress passed PSJVTA as Â§Â 903 of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 . PSJVTA changes the legal framework by replacing certain provisions in ATCA that triggered consent to personal jurisdiction for terrorism-related offenses. These changes include eliminating ATCA's provision triggering consent when a defendant accepts U.S. foreign aid. In place of that provision, PSJVTA provides that the following three actions trigger consent to personal jurisdiction: Making payments to individuals imprisoned for terrorist acts against Americans or to families of individuals who died while committing terrorist acts against Americans; Maintaining or establishing any PA/PLO office, headquarters, premises, or other facilities or establishments in the United States; or Conducting any activity (other than some specified exceptions) on behalf of the PA or PLO while physically present in the United States. Unlike ATCA, which did not mention specific Palestinian entities by name, PSJVTA expressly applies its new jurisdictional triggers exclusively to the PA and PLO. The prospect of ending PA/PLO payments that could activate the first trigger may encounter strong opposition among Palestinians. Similar payments to Palestinians in connection with alleged terrorist acts continued even after they led to a legal suspension of significant ESF funding for the PA under the Taylor Force Act (Title X of P.L. 115-141 ) when it became effective in March 2018. By partly reversing ATCA with respect to the acceptance of aid, PSJVTA could facilitate the resumption of various types of aid, but would still provide for conditions that are reasonably likely to trigger PA/PLO consent to personal jurisdiction, subject to the question of constitutionality. PSJVTA also directs the State Department to create a claims process for U.S. nationals harmed by terrorist attacks that they attribute to the PA or PLO. Under PSJVTA, the Secretary of State, in consultation with the Attorney General, has 30 days from the date of enactment (December 20, 2019) to \"develop and initiate a comprehensive process for the Department of State to facilitate the resolution and settlement of covered claims.\" Covered claims are defined to mean pending and successfully completed civil actions against the PA or PLO under the ATA, as well as those lawsuits previously dismissed for lack of personal jurisdiction. The Secretary of State has 120 days after enactment to begin meetings with claimants to discuss the state of lawsuits and settlement efforts. The Secretary of State has 180 days after enactment to begin negotiations with the PA and PLO to settle covered claims. There is no provision withdrawing pending cases from court, however, and jurisdictional provisions applicable before PSJVTA continue to apply to such cases if consent to jurisdiction existed under them. The settlement mechanism will apparently operate in tandem with court proceedings. President Trump stated in a signing statement that the claims process provision in PSJVTA could interfere with the exercise of his \"constitutional authorities to articulate the position of the United States in international negotiations or fora.\" He further stated that his Administration would \"treat each of these provisions consistent with the President's constitutional authorities with respect to foreign relations, including the President's role as the sole representative of the Nation in foreign affairs.\" To date, CRS does not have information about whether the executive branch has taken steps to create a claims process under PSJVTA. The end of U.S. security assistance and existing economic assistance projects for Palestinians in January 2019, in light of ATCA, has had implications for U.S. policy. The enactment of PSJVTA in December 2019 to partly reverse ATCA and otherwise amend ATA also has policy and legal implications related to U.S. aid and personal jurisdiction over Palestinian entities (see timeline at Figure 1 ). While the Administration made drastic reductions to aid for the Palestinians during 2018 , the ongoing use of prior-year funding meant that the changes had not affected aid for the PA security forces or existing economic aid projects at the time ATCA took effect. Some sources suggested that the Administration and Congress belatedly realized ATCA's possible impact, and subsequently began considering how to reduce or reverse some of its consequences. The end of bilateral aid has halted U.S.-funded programs that began in 1975 with a focus on economic and humanitarian needs, and expanded starting in 1994 (in the context of the Israeli-Palestinian peace process) to assist the newly formed PA with security and Palestinian self-governance. The following are changes in status to key aid streams. Economic assistance. Although the Trump Administration decided in September 2018 to reprogram all of the FY2017 ESF aid from the West Bank and Gaza to other recipients, some aid projects continued in the West Bank and Gaza using prior-year funding. These projects shut down in January 2019. ESF appropriations for the West Bank and Gaza from FY1975 to FY2016 have totaled some $5.26 billion. Security assistance. After the Administration reprogrammed or discontinued various funding streams for the Palestinians during 2018, the main U.S. aid category remaining was the INCLE account. This security assistance account supported nonlethal train-and-equip programs for PA West Bank security forces (PASF). INCLE assistance, along with $1 million per year in NADR assistance, also ended in January 2019 due to ATCA. INCLE appropriations for the PASF from FY2008 to FY2019 have totaled some $919.6 million. The office of the U.S. Security Coordinator for Israel and the Palestinian Authority (USSC, see textbox below) continues to conduct a \"security cooperation-only mission\" that does not involve funding support, but still facilitates Israel-PA security coordination. After ATCA's enactment, the Administration reportedly favored amending ATCA to allow security assistance to continue because of the priority U.S. officials place on Israel-PA security cooperation, which many in Israel also highly value. In an October 29, 2019, hearing before the House Foreign Affairs Subcommittee on the Middle East, North Africa, and International Terrorism, Assistant Secretary of State for Near Eastern Affairs David Schenker said that the Administration was willing to \"engage with Congress on every level\" to consider ways to revisit or \"fix\" ATCA to allow the resumption of certain types of aid to Palestinians. Israeli officials have strongly supported U.S. security assistance as a way to improve PA security capabilities and encourage the PA to coordinate more closely with Israeli security forces. Before U.S. bilateral aid to the Palestinians had ceased, other sources suggested that Israeli officials had reached out to the Administration and Members of Congress in hopes that some arrangement would be able to ensure that U.S. security assistance could continue while also maintaining recourse in U.S. courts against the PA/PLO for past alleged acts of terror . It is unclear to what extent the stop to U.S. security assistance for the PA has affected Israel-PA security cooperation and could affect it in the future. One analyst wrote in January 2019 that even without U.S. aid, the PA would have a strong interest in coordinating security with its Israeli counterparts. Media reports have routinely suggested that Israel and the PA share a core objective in countering Hamas in the West Bank. However, the same analyst wrote that over the long term, \"termination of [U.S.-funded programs] in areas like training, logistics, human resources, and equipment provision will undoubtedly have a negative impact on the PASF's overall capabilities and professionalism.\" Another analyst said that without U.S. security aid, the PA will have fewer incentives to continue security cooperation with Israel. A spokesman for PA President Mahmoud Abbas responded to the halt in aid by saying it would \"have a negative impact on all, create a negative atmosphere and increase instability.\" Even though PSJVTA removed acceptance of U.S. bilateral aid as a trigger of PA/PLO consent to personal jurisdiction, the actual resumption of U.S. aid may depend on political decisions by Congress and the Administration, as well as cooperation from the PA. The conference report for the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), enacted in December 2019, provided the following earmarks: $75 million in INCLE for security assistance in the West Bank for the PA; $75 million in ESF for the \"humanitarian and development needs of the Palestinian people in the West Bank and Gaza.\" The conference report said that these funds \"shall be made available if the Anti-Terrorism Clarification Act of 2018 is amended to allow for their obligation.\" The inclusion of PSJVTA in P.L. 116-94 may satisfy that condition. It is unclear whether the executive branch will implement the aid provisions. The Trump Administration had previously suggested that restarting U.S. aid for Palestinians could depend on a resumption of PA/PLO diplomatic contacts with the Administration. Such a resumption of diplomacy may be unlikely in the current U.S.-Israel-Palestinian political climate, particularly following the January 2020 release of a U.S. peace plan that the PA/PLO strongly opposes. Additionally, under its terms, the Taylor Force Act would preclude any ESF deemed to directly benefit the PA. The Administration's omission of any bilateral assistanceâsecurity or economicâfor the West Bank and Gaza in its FY2021 budget request, along with its proposal in the request for a $200 million Diplomatic Progress Fund ($25 million in security assistance and $175 million in economic) to support future diplomatic efforts, may potentially convey some intent by the Administration to condition aid to Palestinians on PA/PLO political engagement with the U.S. peace plan. Additionally, it is unclear whether the PA would cooperate with a U.S. effort to provide aid to Palestinians given U.S.-Palestinian political tensions and the way that PSJVTA amended ATA. Even if accepting aid would no longer potentially trigger PA/PLO liability in U.S. courts, it is possible thatâgiven PA concerns about national dignityâthe PA might not accept aid if doing so could be perceived domestically as giving in to U.S. political demands on the peace plan, or as tacitly agreeing to the new triggers of potential PA/PLO liability in PSJVTA (see \" Promoting Security and Justice for Victims of Terrorism Act of 2019 \" above). If the executive branch and the PA agree on the resumption of aid, it is unclear how the economic portion of aid would specifically address humanitarian and development needs in the West Bank and Gaza. In the October 29, 2019, committee hearing mentioned above, U.S. Agency for International Development (USAID) Assistant Administrator for Middle East Affairs Michael Harvey was asked what type of aid should be given priority. Harvey said that, without prejudging, if the political decision were made to resume ESF assistance, water and wastewater projects have historically been key objectives, and thus could be places to start. One of the aims of the amendments to ATA described above is to enhance personal jurisdiction over defendants accused of carrying out terrorist attacks that injure U.S. nationals. To try any civil case, U.S. courts must have both subject matter jurisdiction and personal jurisdiction over the defendant. ATA provides for subject matter jurisdiction by providing a cause of action for U.S. nationals injured by applicable acts of terrorism. However, for a court to exercise personal jurisdiction over the defendant, the Due Process Clause of the Fifth or Fourteenth Amendment must be satisfied. Due process requires that the defendant have sufficient \"minimum contacts\" in the forum adjudicating the lawsuit such that the maintenance of the suit there does not offend \"traditional notions of fair play and substantial justice.\" Foreign entities, including foreign political but non-sovereign entities such as the PA and PLO, are entitled to due process and can challenge a court's jurisdiction based on a lack of personal jurisdiction. Under the doctrine of general personal jurisdiction, a foreign entity can be sued for virtually any matter without regard to the nature of its contacts with the forum state. The Supreme Court has held that, for courts to exercise general personal jurisdiction, a defendant entity must have enough operations in that state to be essentially \"at home\" there. When general jurisdiction is not available, maintenance of a lawsuit against a foreign defendant requires specific personal jurisdiction. Specific jurisdiction exists where there is a significant relationship among the defendant, the forum, and the subject matter of the litigation. Based on this test, ATA lawsuits against the PA and PLO have failed for want of specific personal jurisdiction. Personal jurisdiction can be waived and litigants can consent to personal jurisdiction that might otherwise be lacking. But the extent to which Congress can provide by statute that a foreign entity is deemed to consent to personal jurisdiction by making payments or through the maintenance of facilities in the United States appears to be untested. Plaintiffs' efforts to obtain personal jurisdiction over the PA and PLO based on the criteria provided in ATCA, including acceptance of foreign aid and the maintenance of facilities in the United States, failed because plaintiffs could not prove that any of the criteria had been met, obviating the need for the courts to address ATCA's constitutionality. The new deemed consent provisions in PSJVTA may encounter challenges in court on the basis that they could constitute an unconstitutional condition on permission to operate in the United States. A condition attached to government benefits is unconstitutional if it forces the recipient to relinquish a constitutional right that is not reasonably related to the purpose of the benefit. If this concept applies to personal jurisdiction, a reviewing court may need to determine whether submission to such jurisdiction is either voluntary or has a rational relationship with PA/PLO payments or other PA/PLO activities, including maintenance of facilities in the United States. On the other hand, because ATA is a federal foreign affairs-related statute, Congress may have greater leeway to establish jurisdiction based on deemed consent. Responses to the following questions could have important implications for U.S. policy and law. Given that acceptance of aid no longer triggers consent to personal jurisdiction, will the PA cooperate with the implementation of U.S. security and economic aid that Congress appropriated in December 2019 for FY2020 for the West Bank and Gaza? Will the Trump Administration provide the appropriated FY2020 security and economic aid to Palestinians? If so, when? What are the effects of the cutoffâsince January 2019âof U.S. aid to the West Bank and Gaza? Depending on the timing and other circumstances surrounding a possible resumption of aid, what effects could an aid resumption have? Will the PA/PLO stop payments to prisoners accused of terrorist acts against Americans (or payments to the prisoners' families) in order to avoid being deemed to consent to personal jurisdiction under PSJVTA? If PSJVTA's provisions on PA/PLO consent to personal jurisdiction are challenged in court, will they be upheld as constitutional? Will the Trump Administration comply with the requirement in PSJVTA for the State Department to establish a process for resolving and settling claims against the PA/PLO under ATA? If so, what would the process look like and what outcomes would it produce?", "summary": "Two recent amendments to the Anti-Terrorism Act (ATA, 18 U.S.C. Â§Â§ 2331 et seq. ) have significant implications for U.S. aid to the Palestinians and U.S. courts' ability to exercise jurisdiction over Palestinian entities. They are the Anti-Terrorism Clarification Act of 2018 (ATCA, P.L. 115-253 ) and the Promoting Security and Justice for Victims of Terrorism Act of 2019 (PSJVTA, Â§ 903 of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 ). Congress passed ATCA after a U.S. federal lawsuit (known in various incarnations as Waldman v. PLO and Sokolow v. PLO ) against the Palestinian Authority (PA) and Palestine Liberation Organization (PLO) that an appeals court dismissed in 2016. The trial court had found that the PA and PLO were responsible under ATA (at 18 U.S.C. Â§ 2333) for various terrorist attacks by providing material support to the perpetrators. However, the U.S. Court of Appeals for the Second Circuit ruled that the attacks, \"as heinous as they were, were not sufficiently connected to the United States to provide specific personal jurisdiction\" in U.S. federal courts. Amendments to ATA . ATCA provided that a defendant consents to personal jurisdiction in U.S. federal court for lawsuits related to international terrorism if the defendant accepts U.S. foreign aid from any of the three accounts from which U.S. bilateral aid to the Palestinians has traditionally flowed. In December 2018, the PA informed the United States that it would not accept aid that subjected it to federal court jurisdiction. Consequently, all bilateral aid ended on January 31, 2019. PSJVTA eliminated a defendant's acceptance of U.S. foreign aid as a trigger of consent to personal jurisdictionâthus partly reversing ATCAâand instead provides that PA/PLO payments related to a terrorist act that kills or injures a U.S. national act as a trigger of consent to personal jurisdiction. The PA/PLO may face strong Palestinian domestic opposition to discontinuing such payments. PSJVTA also directs the State Department to establish a mechanism for resolving and settling plaintiff claims against the PA/PLO. President Trump stated in a signing statement that this provision could interfere with the exercise of his \"constitutional authorities to articulate the position of the United States in international negotiations or fora.\" Implications of stopping U.S. aid and prospects for resumption . It is unclear to what extent the stop to U.S. security assistance for the PA has affected Israel-PA security cooperation and could affect it in the future. The U.S. Security Coordinator for Israel and the Palestinian Authority (USSC) said in December 2019 that the suspension of aid had not significantly affected Israel-PA security cooperation, but that the disruption of initiatives aimed at facilitating cooperation and helping reform the PA security sector had some impact on PA acquiescence to USSC requests aimed at reform and greater professionalization. Even though PSJVTA removed acceptance of U.S. bilateral aid as a trigger for personal jurisdiction, the actual resumption of U.S. aid may depend on political decisions by Congress and the Administration, as well as cooperation from the PA. For FY2020, Congress has appropriated $75 million in PA security assistance for the West Bank and $75 million in economic assistance for the \"humanitarian and development needs of the Palestinian people in the West Bank and Gaza.\" However, the Trump Administration had previously suggested that restarting U.S. aid for Palestinians could depend on a resumption of PA/PLO diplomatic contacts with the Administration, which may be unlikely in the current U.S.-Israel-Palestinian political climate. Additionally, it is possible that the PA might not accept aid if doing so could be perceived domestically as giving in to U.S. political demands on the peace plan, or as tacitly agreeing to the new triggers of potential PA/PLO liability in PSJVTA. Implications for p ersonal jurisdiction . The extent to which Congress can provide by statuteâsuch as through ATAâthat a foreign entity (in this case, the PA/PLO) is deemed to consent to personal jurisdiction appears to be untested in court. The deemed consent provision in ATA may encounter legal challenges on the basis that it could constitute an unconstitutional condition. A condition attached to government benefits is unconstitutional if it forces the recipient to relinquish a constitutional right that is not reasonably related to the purpose of the benefit. If this concept applies to personal jurisdiction, a reviewing court may need to determine whether submission to jurisdiction has a rational relationship with PA/PLO payments or other PA/PLO activities, such as maintenance of facilities in the United States.", "document_type": "crs"}
{"report": "This report discusses issues related to providing employment services targeted at noncustodial parents (NCPs) within the context of the Child Support Enforcement (CSE) program. The CSE program is a federal-state partnership that currently operates in all 50 states; the District of Columbia (DC); the territories of Guam, Puerto Rico, and the U.S. Virgin Islands; and 60 tribal nations. The program seeks to promote parental responsibility and ensure children receive support from both parents, notably through financial income transferred from an NCP to a child's primary caretaker (usually a custodial parent). In FY2018, the CSE program provided services on behalf of 14.7 million children, about 20% of children in the United States. One analysis estimated that nearly two-thirds of families receiving CSE services in 2015 had income below 200% of the poverty threshold. The CSE program collected 66% of the current support that was due in FY2018, continuing the program's record of slow but steady improvement in recent years. However, $11.5 billion in current support that was due went uncollected, becoming arrears (i.e., past due support). A number of observers have concluded that some NCPs have a currently limited ability to pay that restricts how much support is collected, and that those NCPs would benefit from employment services being offered in the context of the CSE program. NCP employment and earnings, particularly through stable, formal employment, are positively linked to child support payment compliance. This association is likely because NCPs with higher earnings have a better ability to pay, but also because formal employment facilitates the use of income withholding, a particularly effective CSE tool. Also, many low-income NCPs face one or more significant barriers to having consistent employment and sufficient income to pay child support, including low wages and benefits, irregular and unsteady jobs, limited education or marketable skills, health conditions (e.g., substance use), lack of transportation or housing, discrimination, and history with the criminal justice system. Proponents of CSE employment programs argue that they respond to the concern that NCPs need help securing employment, but might be less likely than other populations to access employment services through the workforce development system or public benefit programs. In addition, they posit that the CSE program is a unique platform for providing employment services in that it already reaches NCPs in practice, has a strong interest in improving NCPs' earnings and child support payments, and can leverage CSE policies so that they act as employment incentives and not barriers for NCPs. Although CSE employment programs are fairly widespread, they are not found everywhere and appear to serve a relatively small proportion of NCPs who struggle to secure adequate employment and regularly pay their obligations in full. To explain why CSE employment programs operate on a limited scale, CSE officials and observers have primarily cited a lack of sufficient and sustainable funding. (The federal government normally reimburses each state for 66% of all allowable expenditures on CSE activities, but employment services are currently not an allowable activity and funding through other mechanisms within the program is limited. ) Many of those same observers have proposed that legislation be enacted to address this issue. This report first reviews how CSE-led employment programs may be designed with regard to NCP eligibility and recruitment, as well as services provided. This is followed by an explanation of the current federal funding options for these programs. The next section reviews the available evidence on the effectiveness of employment programs that have been led by or conducted in cooperation with CSE. The report concludes by highlighting recent proposals to dedicate federal funding for CSE employment programs. CSE employment programs must establish criteria to determine eligibility for services. Unemployed, or underemployed, low-income NCPs who are struggling to meet their obligations are the population that most frequently qualifies for services. Programs may also serve additional types of NCPs, like those who are in the process of paternity or order establishment, to facilitate recruitment or expand their reach. Alternatively, CSE employment programs may narrowly target services to conserve resources and prioritize certain cases (e.g., those owing current support versus those owing arrears only). Eligibility criteria can also help limit duplication with other public programs or risks of supplanting their funding. Another important decision CSE employment programs make is whether to rely on mandatory or voluntary recruitment policies, or both. Courts can issue mandatory orders for NCPs to participate in a work program. When NCPs fail to pay child support, states may issue contempt citations or file criminal nonsupport charges that bring parents before a court. (The required administrative and court processes can be expensive for the CSE program and state. ) At this point, the court may give NCPs the choice to seek work as an alternative to incarceration, or order them to do so. Depending on the jurisdiction and court, NCPs may be left to their own discretion for how to secure employment, or they may be firmly connected to or ordered into an employment program that can provide relevant services and assistance. As a result, among the population presented with the choice of participating in a mandatory work program versus incarceration, enrollment and engagement rates are usually fairly high. Alternatively, or additionally, CSE employment programs can focus on voluntary recruitment. This approach allows programs to serve more NCPs than just those who have been brought into court. Program referrals can be made by staff from CSE agencies, courts, community organizations, and probation or parole offices. Even when programs are voluntary, court referrals and the consequences of nonpayment (e.g., license suspensions, interest charged on debt, the risk of eventually being incarcerated) give NCPs strong incentives to participate. Still, several voluntary programs report that recruitment and retention is challenging in that many NCPs referred to or made aware of the programs decline to participate voluntarily or stay engaged. In response, programs have developed several strategies for boosting recruitment and retention, including expansive program eligibility rules, incentives (e.g., removal of CSE-initiated driver's license suspensions, forgiveness of state-owed arrears), intensive case management, co-locating services, and aggressive and multifaceted outreach. CSE employment programs typically provide a wide range of services, which can require the involvement of many partner organizations. Intensive case management is generally considered critical for engaging NCPs, assessing their needs holistically, coordinating service receipt, and monitoring participant progress. CSE agencies may handle this general case management or make arrangements (e.g., contract) with other organizations to do so. Case managers and other program staff may refer NCPs to external resources for issues such as housing, mental health, substance use, legal aid, and financial education, although services may be limited in many communities. CSE employment programs may also provide NCPs with access to parenting and fatherhood services, including classes and referrals to resources for addressing parenting time (child access and visitation), co-parent mediation, and other legal concerns related to parenthood. Providing employment services is often contracted or delegated to partnering government workforce agencies or community organizations with relevant expertise. These entities typically provide NCPs with traditional services such as employment-focused case management, job search assistance, employment assessments, job readiness, basic or remedial education, short-term job skills training, job development and placement, and job retention. These services may be provided in both individual and group settings. Employment programs may also provide work supports including transportation assistance, small incentives to promote program engagement, and specialized services for those with criminal records such as records expungement or voluntary drug testing. Less commonly, NCPs may participate in subsidized employment, on-the-job training, vocational training and education, and other, more intensive employment services. Under current law, federal funds that can be used by CSE programs to fund employment services are fairly limited. The funding streams that are available may be uncertain from year-to-year, of short duration, or limited in amount relative to the potential demand for these services. The largest source of federal funding for state CSE administration is the previously mentioned 66% reimbursement rate for state and local expenditures on allowable CSE activities, with no ceiling on the total amount of federal reimbursement. Federal matching payments on net totaled more than $3.5 billion in FY2018, and accounted for approximately 90% of federal CSE funding for states in recent years. However, spending on work activities has not been allowed as a federally reimbursable cost. Alternatively, states can apply for a waiver under Section 1115 of the Social Security Act to receive federal matching payments for the purposes of a demonstration project designed to promote program objectives. With respect to waiver projects, states have to invest new funds (not redirect funding), they are time limited (typically two to five years) and must be evaluated, and total federal reimbursement must not exceed $2 million. The second largest CSE funding stream is incentive payments, which are designed to reward states for strong program performance and were estimated to exceed $510 million in FY2018. Incentive payments must be reinvested back into the program on activities that are eligible for reimbursement. However, states can request authorization to use incentive payments for activities that are not eligible for federal reimbursement but may contribute to improving the effectiveness or efficiency of child support, such as employment programs. Incentive spending must supplement and not supplant other state CSE funding, states can determine how much of their incentive payment to allocate toward an approved activity, and the program does not have to be formally evaluated. There are also non-CSE federal funding streams that can support NCP employment activities, although they may not be directly under the control of the program or available on a consistent basis. For example, Temporary Assistance for Needy Families (TANF) funding can support employment programs for NCPs. States can include NCPs as members of TANF-eligible family units and provide assistance and other services funded by TANF or separate state maintenance-of-effort (MOE) programs, even when no other family member is receiving assistance. States can also use TANF or state MOE funding to provide non-assistance services and benefits, such as employment services, to needy individuals such as NCPs when doing so is consistent with TANF goals. The TANF block grant provides states with considerable flexibility in the use of its funds, so NCP employment programs have to compete with many other potential expenditure options. Similarly, funding for the Workforce Innovation and Opportunity Act's adult and dislocated worker programs and the Supplemental Nutrition Assistance Program's Employment & Training programs can be used to provide employment services to NCPs who meet these programs' respective eligibility criteria. In addition, the Wagner-Peyser Act Employment Service (ES) makes labor exchange services (e.g., counseling, job search and placement assistance) universally available to all individuals. States and localities have also used a variety of other public and private funding to support CSE employment pilots, including competitive grants from the Department of Health and Human Services' (HHS') Office of Child Support Enforcement (OCSE) and Office of Family Assistance (OFA). The effectiveness of CSE-led or CSE-supported employment programs has been analyzed by a few rigorous evaluations. While many agencies and partner organizations providing employment services note that NCPs who participate in employment programs show improvement when measured on the basis of comparing pre- and post-participation outcomes such as earnings and child support payments, this kind of analysis cannot address what would have occurred if NCPs had not participated in those particular services. For example, NCPs might have secured employment without assistance, received employment services through another program, or benefited from changes in the economy over time. Rigorous research designs such as random assignment use valid comparison groups to isolate impacts , which are the changes in outcomes causally attributable to a program or policy. This report focuses on statistically significant employment, earnings, and child support payment findings from random assignment experiments and other research designs that can plausibly identify program impacts. In social policy, new or alternative interventions are often compared to a services-as-usual condition developed through many years of trial and error, sometimes including previous rounds of rigorous evaluation. Research in disciplines as varied as social policy, education, medicine, and business has found that the most common pattern of results when interventions undergo rigorous evaluation is \"weak\" or \"no effects.\" A similar pattern of results has been observed for employment and training programs serving low-income populations other than NCPs. Studies that do not find large positive impacts may still identify potentially promising changes for intervention implementation, design, or strategy. Employment programs for NCPs have not shown consistent impacts on employment, earnings, and child support compliance when subjected to rigorous evaluation. Cross-site variation from two rigorous evaluations suggests that robust involvement from CSE in employment programs might be beneficial for generating impacts, relative to less CSE involvement. However, there is no rigorous evidence on the relative effectiveness of spending on employment programs versus alternative CSE program activities. The combination of these points also means there is no rigorous evidence that spending on employment services is less effective than alternative collection strategies, and many CSE practitioners believe from experience that these programs are a more effective tool for NCPs with a limited ability to pay. Rigorous evidence with NCPs is available for two employment program models: traditional employment services and transitional jobs. Alternative employment services that are more common with other low-income populations (e.g., substantive occupational skills training) have typically not been rigorously evaluated with NCPs and therefore are not discussed in this report. Earnings supplements such as the Earned Income Tax Credit, which provide monetary payments to individuals who work in an effort to increase employment and promote other policy objectives, are not regularly included as a service by CSE employment programs and are also not covered here. Evidence on the effectiveness of providing traditional employment services to NCPs is mixed. Commonly provided employment services include job search assistance, job readiness training, employment-related assessments, job development services, job retention services, rapid re-employment, employment planning, and work supports. The National Child Support Noncustodial Parent Employment Demonstration (CSPED) was a large-scale random assignment study that enrolled more than 10,000 NCPs across sites in eight states between October 2013 and September 2016. Participants were randomly assigned to either a group eligible for CSPED services, or a group receiving CSE agencies' regular services. CSPED increased the receipt of a combination of case management, employment, parenting, and enhanced child support services, although the level of additional service receipt has been characterized as a \"fairly light-touch\" for such a hard-to-employ population. More intensive services such as subsidized employment or on-the-job training were rarely accessed. Overall, CSPED did not consistently increase employment, earnings, or child support compliance relative to CSE agencies' usual services. While context, population served, program features, and service receipt varied somewhat in the participating states, there were few differences in impacts by state. Several earlier, single-state evaluations of CSE-employment programs providing similar employment or more comprehensive services reported more promising impacts, although these studies used research designs that make their results subject to greater uncertainty. An older, multi-state random assignment demonstration also found that an employment program (predominantly providing traditional employment services, peer support groups, and enhanced child support services) did not increase NCPs' employment or earnings, although it did increase the likelihood of formal child support payments, and there was some evidence suggesting impacts for earnings and employment among harder-to-employ subgroups. The evaluated demonstrations varied somewhat in their target populations, although all served highly disadvantaged populations. They also varied in whether they evaluated programs using mandatory, voluntary, or mixed-recruitment strategies, and the research designs and pattern of results do not provide clear evidence as to whether any approach is more likely to produce stronger impacts. The programs provided typical or even fairly robust levels of service, relative to the field of CSE-led employment programs. Rigorous evaluations of programs providing analogous services to fatherhood and prisoner reentry populations with large proportions of NCPs have also infrequently reported impacts on employment, earnings, or child support outcomes. Another strategy that has been tested with NCPs, and shown more promising medium and longer-term effects, is transitional jobs, which are short-term subsidized public, nonprofit, or private employment opportunities designed to increase participants' income while helping them to \"learn to work by working.\" The end goal is to increase NCPs' ability to secure and retain unsubsidized employment. A large-scale random assignment study found that a recent collection of programs generated substantial increases in employment, earnings, and the likelihood of child support payment while NCPs were in subsidized employment. These short-term employment impacts demonstrate that such programs can successfully target individuals who want to work but would otherwise struggle to secure consistent employment. The subsidized employment provides these individuals with meaningful work and income. For the period immediately after the transitional jobs ended, participants had modestly higher earnings and employment. However, for most programs the earnings and employment impacts faded away over time, although the increased likelihood of child support payment more often persisted. These findings are similar to those from transitional jobs programs serving other low-income populations (e.g., formerly incarcerated individuals, TANF recipients). Transitional jobs programs are more expensive and challenging to implement than traditional employment services, as programs need to secure work opportunities for participants and pay a portion of their wages for a period of time. Two notable, recent executive branch proposals have recommended increasing federal funding for CSE employment programs, though neither has been adopted. The Obama Administration proposed allowing federal reimbursement of state CSE program expenditures to fund certain job services offered to eligible NCPs (Notice of Proposed Rulemaking, November 17, 2014). The Trump Administration, in its FY2021 budget submission, proposed allowing federal reimbursement of state CSE program expenditures for mandatory work activities, capped at 2% of the total federal reimbursement of that state's CSE expenditures. Legislation related to employment services for NCPs has also been introduced in the 116 th Congress. The Julia Carson Responsible Fatherhood and Healthy Families Act of 2019 ( H.R. 3507 ) proposes allowing federal reimbursement of state CSE program expenditures to fund certain job services (a more expansive set of services than in the Obama Administration proposal) offered to eligible NCPs. Other legislation would try to encourage states to focus more TANF funding on employment services, which might benefit some NCPs (typically, a parent of a child receiving TANF assistance). The Jobs and Opportunity with Benefits and Services for Success Act ( H.R. 1753 / S. 802 ) would require that state TANF plans detail how low-income NCPs will be able to access employment services through TANF. The Accelerating Individuals into the Workforce Act ( H.R. 4571 ) would redirect funding from the TANF contingency fund to support subsidized employment opportunities for eligible individuals, including NCPs of minor children receiving TANF assistance. Policymakers have also proposed funding new programs, separate from CSE and TANF, for providing employment services. The ELEVATE Act of 2019 ( H.R. 556 / S. 136 ) would provide funding for public and private subsidized employment programs that could serve NCPs and other populations. The Pandemic TANF Assistance Act ( S. 3672 ) also would provide funding that could be used for, among other purposes, certain subsidized employment opportunities for low-income populations (which could include NCPs).", "summary": "The Child Support Enforcement (CSE) program is a federal-state partnership that seeks to ensure child support is a regular source of income for families. The program transfers financial support from a noncustodial parent (NCP) to a child's primary caretaker (usually a custodial parent). Nearly two-thirds of participating custodial families report having incomes below 200% of the federal poverty threshold. The CSE program collects about two-thirds of the current support that is due each year, with the remainder that is unpaid becoming arrears (i.e., past-due support). Many NCPs who do not pay their obligations in full struggle with finding consistent and sufficient employment. Employment programs within the context of CSE are designed to increase NCP employment and child support collections. Many states have CSE-led employment programs and a number of practitioners report that, in their experience, these services are a more effective tool for NCPs with limited ability to pay than other enforcement strategies. CSE employment programs only serve a small proportion of NCPs making zero or partial payments; many observers primarily attribute this to a lack of sustainable funding. In response, some policymakers have proposed dedicating federal funding for CSE-led employment services. CSE employment programs use varied eligibility criteria, but they typically focus on low-income NCPs. Programs also vary in their reliance on mandatory or voluntary recruitment policies, or both. Mandatory recruitment involves courts ordering parents who are behind in their payments to participate or risk incarceration. Voluntary recruitment relies on NCP interest and referrals from CSE staff, courts, and partner organizations. CSE employment programs usually provide a wide range of services, including intensive case management, employment, child support, parenting/fatherhood, and other support services. Service provision is often contracted to partner agencies or community organizations. In terms of employment services, programs traditionally provide services such as job readiness, job search, and job development. Participants are less likely to participate in transitional jobs (short-term subsidized employment) or more intensive vocational education and training services. Under current law, federal funds that can be used by CSE programs to support employment services are fairly limited. Although the federal government normally reimburses each state at 66% of all allowable expenditures on CSE activitiesâfinancing that totaled more than $3.5 billion in FY2018âemployment services are currently not a reimbursable activity. Similarly, the second largest CSE funding stream, incentive payments (expected to exceed $510 million for FY2018), cannot be automatically used to support employment services. States can pursue Section 1115 waiver demonstrations as a means to receive federal matching payments or request authorization to spend incentive funds on employment services, but both approaches come with restrictions. States can also tap non-CSE federal funding to support employment services for NCPs, such as the Temporary Assistance for Needy Families (TANF) block grant, but this use must compete with other potential uses for the funding. Several rigorous evaluations have been conducted on two employment service models with NCPs: traditional employment services and transitional jobs. Evidence on the effectiveness of traditional employment services for NCPs is mixed, with the most recent federally funded, large-scale random assignment study on this model finding little or no impacts. Earlier evaluations reported more promising effects. Transitional jobs programs are more expensive and challenging to implement, but a recent federally funded, large-scale random assignment evaluation on this model reported stronger impacts than traditional employment services. The effects were substantial while participants were in subsidized jobs, modest for a period after the transitional jobs ended, but then usually continued to fade over time.", "document_type": "crs"}
{"report": "Space weather refers to the dynamic conditions in Earth's outer space environment. This includes conditions on the Sun, in the solar wind, and in Earth's upper atmosphere. Space weather phenomena include solar flares or periodic intense bursts of radiation from the sun caused by the sudden release of magnetic energy, coronal mass ejections composed of clouds of solar plasma and electromagnetic radiation, ejected into space from the sun, high-speed solar wind streams emitted from low density regions of the sun, and solar energetic particles or highly-charged particles formed at the front of solar flares and coronal mass ejections. Hazardous space weather events are rare, but may cause geomagnetic disturbances (GMDs) that affect broad areas of the globe. Such events may pose hazards to space-borne and ground-based CI systems and assets that are vulnerable to geomagnetically induced current, electromagnetic interference, or radiation exposure (see Figure 1 ). Several notable events illustrate space weather hazards, and how their potential impact has broadened over time with technological advances. The 1859 \"Carrington event,\" named for the British solar astronomer who first observed it, caused auroras as far south as Central America and disrupted telegraph communications. In 1972, a GMD knocked out long-distance telephone service in Illinois. In 1989, another GMD caused a nine-hour blackout in Quebec, and melted some power transformers in New Jersey. In 2005, X-rays from a solar storm disrupted GPS signals for a short time. This report provides an overview of federal government policy developed under the existing legislative framework, and describes the specific roles and responsibilities of select federal departments and agencies responsible for the study and mitigation of space weather hazards. Over the past several decades, the federal government's interest in space weather and its effects has grown. Congress has required individual federal agencies to conduct certain space weather-related activities related to agency missions. However, federal interagency work began in earnest with the establishment of the interagency National Space Weather Program (NSWP) in 1995 by the Department of Commerce's Office of the Federal Coordinator for Meteorology. The program was directed by the NSWP Council that included representatives from interested federal agencies. The NWSP Council coordinated federal space weather strategy development between 1995 and 2015 in partnership with federal agencies, industry, and the academic community. In 2010, Congress directed the White House Office of Science and Technology Policy (OSTP) to improve national preparedness for space weather events and to coordinate federal space weather activities of the NSWP Council. This marked the beginning of a period during which the White House assumed leadership of federal space weather policy. OSTP's National Science and Technology Council established the Space Weather Operations, Research and Mitigation (SWORM) Working Group in 2014 to lead federal strategy and policy development. The NSWP Council was deactivated the following year, when SWORM published a national space weather preparedness strategy, titled the \"National Space Weather Strategy\" (the 2015 Plan). In 2016, President Obama signed Executive Order (E.O.) 13744, \"Coordinating Efforts to Prepare the Nation for Space Weather Events\" directing federal space weather preparedness activities to be carried out \"in conjunction\" with those activities already identified in the 2015 Plan. The SWORM Working Group released an updated national space weather strategy in 2019, titled \"The National Space Weather Strategy and Action Plan\" (the 2019 Plan). The same year, President Trump signed E.O. 13865, \"Coordinating National Resilience to Electromagnetic Pulses,\" directing the federal government to \"foster sustainable, efficient, and cost-effective approaches\" to improve national resilience to the effects of electromagnetic pulses. Taken together, the 2019 Plan and E.O. 13865 prioritize investment in CI resilience initiatives over scientific research and forecasting, and represent a shift in policy from that of the previous Administration set forth in the 2015 Plan and E.O 13744. The 2019 Plan focuses on three objectives related to protection of assets, space weather forecasting, and planning for space weather events, and identifies the agencies and departments with responsibilities under each objective ( Figure 2 ). E.O. 13865 directs relevant federal agencies to identify regulatory and cost-recovery mechanisms that the government may use to compel private-sector investments in resilience. This approach differs from most other federal infrastructure resilience initiatives, which generally rely upon voluntary industry adoption of resilience measures. E.O. 13865 applies both to space weather and manmade electromagnetic hazards (such as a nuclear attack) and refers to both types of hazard as electromagnetic pulse (EMP). This may create ambiguity in cases where a given provision could apply either to manmade or natural electromagnetic hazards. For example, E.O. 13865 directs the Secretary of Homeland Security to \"incorporate events that include EMPs as a factor in preparedness scenarios and exercises,\" without specifying whether a space weather event or nuclear attack scenario should be exercised, or which should be prioritized. The fact that E.O. 13865 does not formally supersede E.O. 13744 (which refers solely to space weather) may create further ambiguity in cases where policies of the previous and current Administrations are not in direct alignment, or else reflect differing priorities. Federal agencies typically regardâand refer toâmanmade EMP and naturally-occurring GMDs as related, but distinct phenomena. This section provides an overview of federal roles and responsibilities for space weather-related research and emergency preparedness. Federal agency roles and responsibilities fall into four major categories: early warning and forecasting; research and development (R&D); basic scientific research; risk assessment and mitigation, including modeling and information sharing; and response and recovery. Some agencies have roles and responsibilities in more than one category. This section only includes entities that relevant executive orders or strategies have designated as the federal lead for a specific objective or requirement. This does not include agencies whose role is confined to participation in working groups, harmonizing internal policies with national strategy or directives, contributing refinements to analytical products or models produced by other agencies, or ensuring their own continuity-of-operations in case of a space weather event. Each sub-section includes a summary of the department or agency mission and the relevant authorities under which it operates. If applicable, the agency-specific provisions of the two executive orders currently in forceâE.O. 13744 and E.O. 13865âare listed in a table, followed by information about implementing programs and activities. Provisions applicable only to manmade EMP threats, such as high-altitude nuclear detonations, are excluded. The 2019 Plan is referenced in cases where the executive orders do not provide specific or complete guidance to given federal entities. Departments and agencies are ordered alphabetically for ease of reference. In 1988, Congress authorized the Secretary of Commerce to \"prepare and issue predictions of electromagnetic wave propagation conditions and warnings of disturbances in such conditions.\" The Secretary of Commerce delegated those responsibilities to the National Oceanic and Atmospheric Administration (NOAA). The Secretary of Commerce also directed NOAA to fulfill the department's space weather responsibilities in 2016 under E.O. 13744 and in 2019 under E.O. 13865 ( Table 1 ). Both executive orders direct the Secretary to improve services and partner with relevant stakeholders. The 2016 order refers to the hazard of concern as space weather, while the 2019 order refers to it as natural EMPs. NOAA's space weather work falls primarily under two line offices: National Weather Service (NWS) and National Environmental Satellite, Data, and Information Service (NESDIS). NWS operates and maintains observing systems to support forecasting of space weather including the National Solar Observatory Global Oscillation Network Group, a series of ground-based observatories. NWS also operates the Space Weather Prediction Center, which provides real-time monitoring and forecasting of solar events and disturbances and develops models to improve understanding and predict future events. NESDIS maintains NOAA's space weather data through the National Centers for Environmental Information. It also develops and manages several satellite programs which collect solar and space weather-related observations, including the Geostationary Operational Environmental Satellites (GOES) and the Space Weather Follow-on program. E.O. 13744 directed DOD to provide space weather forecasts and related products to support military operations of the United States and its partners ( Table 2 ). The FY2018 National Defense Authorization Act (NDAA; P.L. 115-91 ) codified the language in E.O. 13744. According to the FY2018 NDAA It is the sense of Congress that the [Secretary of Defense] should ensure the timely provision of operational space weather observations, analyses, forecasts, and other products to support the mission of the DOD including the provision of alerts and warnings for space weather phenomena that may affect weapons systems, military operations, or the defense of the United States. E.O. 13865 reiterates the E.O. 13744 requirement verbatim, except that it substitutes the phrase \"naturally occurring EMPs\" for \"space weather phenomena.\" E.O. 13865 also directs DOD to take further steps related to EMP characterization, warning systems, effects, and protection of DOD systems and infrastructure and the United States from EMPs. The U.S. Air Force is the lead for all DOD and Intelligence Community (IC) space weather information. Air Force weather personnel provide space environmental information, products, and services required to support DOD operations as required. Air Force space weather operations and capabilities support all elements of the DOD and its decisionmakers. The Congressional Budget Office (CBO) estimates that the Department of Defense, primarily the Air Force, allocated $24 million to space weather activities in FY2019. The 557 th Weather Wing, located at Offutt Air Force Base, Nebraska, conducts most of DOD's space weather-related activities. It uses ground-based and space-based observing systems, including the Solar Electro-optical Observing Network (SEON), a network of ground-based observing sites providing 24-hour coverage of solar phenomena; ground-based ionosondes and other sensors providing data in the ionosphere; and space-based observations from the Defense Meteorological Satellite Program. The Army has two full-time meteorologists to coordinate space weather support within the Army and with other DOD and federal agencies. The Naval Research Laboratory's (NRL's) Remote Sensing and Space Science Divisions and the Naval Center for Space Technology also contribute to the DOD's space weather activities. For example, the Wide-field Imager for Solar Probe Plus (WISPR), launched in August 2018, was designed and developed for NASA by NRL's Space Design Division. WISPR determines the fine-scale electron density and velocity structure of the solar corona and the source of shocks that produce solar energetic particles. DOE is responsible for monitoring and assessing the potential disruptions to energy infrastructure from space weather, and for coordinating electricity restoration under authorities granted to it by the White House and Congress. E.O. 13744 directs DOE to protect and restore the electric power grid in the event of a presidentially declared grid emergency associated with a geomagnetic disturbance. E.O. 13865 assigns additional roles and responsibilities to DOE specific to R&D and coordination with the private sector to better understand electromagnetic threats and hazards, and their possible effects on the electric power grid ( Table 3 ). Relevant programs and activities for energy infrastructure protection and threat mitigation are led by the DOE's Office of Cybersecurity, Energy Security, and Emergency Response (CESER) (under the Office of Electricity), and the Federal Energy Regulatory Commission (FERC), the North American Electric Reliability Corporation (NERC), and DOE's national laboratories. In February 2018, DOE announced the creation of CESER, a new office created from the Office of Electricity Delivery and Energy Reliability (OE). CESER has two main divisions: Infrastructure Security and Energy Response (ISER), and Cybersecurity for Energy Delivery Systems. ISER's mission is \"to secure U.S. energy infrastructure against all hazards, reduce the impact of disruptive events, and respond to and facilitate recovery from energy disruptions, in collaboration with the private sector and state and local governments.\" The DOE has produced a number of reports on GMDs and EMPs. In compliance with the National Space Weather Action plan, ISER produced a 2019 report on geomagnetic disturbances and the impact on the electricity grid. This report was designed to provide a better understanding of GMD events in order to protect the U.S. electricity grid. Prior to the reorganization, DOE's OE collaborated with the Electric Power Research Institute (EPRI), a nonprofit organization that conducts research and develops projects focused on electricity. In 2016, the OE and EPRI together developed the Joint Electromagnetic Pulse Resilience Strategy , and subsequently the DOE Electromagnetic Pulse Resilience Action Plan in January 2017. E.O. 13865 refers to EMPs in two categories: human-made high-altitude (HEMP) and natural EMPsâoften referred to as GMDs by government agencies. These DOE-EPRI documents focus specifically on human-made nuclear threats and categorize GMDs separately from EMPs. However, the 2017 plan notes that \"many of the actions proposed herein ... are also relevant to geomagnetic disturbances (GMD), which are similar in system interaction and effects to the E3 portion of the nuclear EMP waveform.\" FERC is an independent government agency officially organized as part of DOE. The Energy Policy Act of 2005 (EPAct05; P.L. 109-58 ) authorized FERC to oversee the reliability of the bulk-power system. FERC's jurisdiction is limited to the wholesale power market and the transmission of electricity in interstate commerce. EPAct05 authorized the creation of an electric reliability organization (ERO) to establish and enforce reliability standards subject to FERC oversight. The ERO authors the standards for critical infrastructure protection. These standards, which FERC can approve or remand back, are mandatory and enforceable (with fines potentially over $1 million/day for noncompliance). In November 2018, FERC issued a final rule on reliability and transmission system performance standards for GMDs directing NERC to develop \"corrective action plans\" to mitigate GMD vulnerabilities, and to authorize time extensions to implement \"corrective action plans\" on a case-by-case basis. Additionally, the final rule accepts the ERO's submitted research plan on GMDs. In 2006 FERC certified NERC as the ERO for the United States. NERC works closely with the public and private electric utilities to develop and enforce FERC-approved standards. Part of NERC's role includes reducing risks and vulnerabilities to the bulk-power system. In April 2019, NERC created a task force in response to E.O. 13865 to examine potential vulnerabilities associated with EMPs and to develop possible areas for improvement, focusing on nuclear EMP threats. DOE oversees 17 national laboratories that advance science and technology research and development to support DOE's mission. The Los Alamos National Laboratory is currently working on a study of EMP and GMD physical characteristics and effects on critical infrastructure, to be carried out in four phases. Under Presidential Policy Directive 21 (PPD-21), DHS is the lead U.S. agency for critical infrastructure protection and disaster preparedness. E.O. 13744 and E.O. 13865 assign several roles and responsibilities to DHS specific to space weather and EMPs ( Table 4 ). Both executive orders assign responsibility to DHS for early warning, response, and recovery functions related to space weather preparedness. However, E.O. 13865 also requires DHS to incorporate EMP scenarios into preparedness exercises, to conduct extensive R&D initiatives to better model EMP hazards and develop mitigation technologies, and to enhance critical infrastructure resilience against EMP hazards in coordination with other relevant federal agencies. Relevant programs and activities are managed by the Department's Science and Technology Directorate, as well as two DHS operational components: the Cybersecurity and Infrastructure Security Agency, and the Federal Emergency Management Agency. DHS utilizes an all-hazards risk management approach. Therefore, programs are generally not hazard-specific, but rather may be used to support space weather resilience activities as needed. S&T conducts R&D projects in partnership with federal agencies and the national laboratories, providing tools and analyses to help utilities better predict localized effects of space weather and enhance grid resilience. For example, the Geomagnetic Field Calculator Tool, developed for this purpose by S&T in partnership with NASA, is in the online testing phase. CISA administers public-private partnership programs that provide training, technical assistance, and on-site risk assessments to relevant private-sector and federal partners. CISA, the Department of Energy, and interagency partners are producing technical guidance for electric utilities and other industry stakeholders on mitigation of electromagnetic hazards, which may include space weather. CISA provides long-term risk guidance and recommendations on EMP and other hazards to industry stakeholders through the National Risk Management Center. CISA provides real-time space weather advisories to private sector owner-operators of vulnerable infrastructure on an as-needed basis. FEMA develops operations plans and annexes that coordinate use of national resources to address consequences of space weather events. Recent operational documents include the Federal Operating Concept for Impending Space Weather Events (Space Weather Concept of Operations (CONOP)) and the Power Outage Incident Annex and Nuclear/Radiological Incident Annex to the Response and Recovery Federal Interagency Operational Plans. FEMA also periodically incorporates space weather scenarios into all-hazard education, training, and exercise programs. In 2017, FEMA conducted operational and tabletop exercises with federal and state partners. In 2018, FEMA conducted a space weather exercise for senior federal officials. The U.S. Geological Survey (USGS) is DOI's lead scientific agency and \"provides research and integrated assessments of natural resources; supports the stewardship of public lands and waters; and delivers natural hazard science to protect public safety, health, and American economic prosperity.\" The Secretary of the Interior has delegated responsibilities from E.O. 13744 and E.O. 13865 to USGS ( Table 5 ). E.O. 13865 requires USGS to enhance understanding of the variations of the Earth's magnetic field associated with all EMPs, manmade and space weather-related, whereas E.O. 13744 specifies only those resulting from solar-terrestrial interactions. USGS conducts space weather-related activities through the Geomagnetism program under the Natural Hazards Mission Area. The Geomagnetism program collects data about the Earth's dynamic magnetic field at 11 observatories. USGS provides these data and resulting products to federal agencies, oil drilling services companies, geophysical surveying companies, the electric-power industry, and several international agencies, among others. For example, NOAA's Space Weather Prediction Center and the Air Force use USGS observatory data in geomagnetic warnings and forecasts. Congress appropriated $1.9 million to the Geomagnetism program in FY2019. DOS is the lead foreign affairs agency in the executive branch. Among DOS's responsibilities is negotiating and promoting international norms and practices with respect to outer space. DOS maintains that these efforts contribute to its broader objective of promoting American prosperity through advancing bilateral relationships and leveraging international institutions. E.O. 13744 requires the Secretary of State to lead implementation of U.S. diplomatic and public diplomacy efforts to enhance the international community's capacity to respond to space weather events. Similarly, E.O. 13865 directs the Secretary of State to lead U.S. engagement with allies and partners to enhance resilience to the effects of EMPs, which may include space weather (see Table 6 ). DOS's Bureau of Oceans and International Environmental and Scientific Affairs has traditionally been responsible for advancing U.S. diplomatic engagement on these matters. Congress established the Bureau of Oceans and International Environmental and Scientific Affairs in Section 9 of the Department of State Appropriations Authorization Act of 1973 ( P.L. 93-126 ). OES is responsible for building international partnerships in multilateral fora to strengthen both U.S. and international resilience to extreme events, including those pertaining to space weather. For example, OES's Office of Space and Advanced Technology leads U.S. delegations to the United Nations (U.N.) Committee on the Peaceful Uses of Outer Space (COPUOS). In 2017, OES participated in a workshop co-hosted by the United Nations and NASA on the International Space Weather Initiative (ISWI). The ISWI was first launched in 2009 to advance space weather science through deploying instruments to collect relevant space weather data, analyzing and interpreting the data obtained from those instruments, and communicating the results of that analysis to the public. The United States and 43 other U.N. member states that participated in this workshop found that strengthening the international framework for space weather services could be accomplished through several means. These included further improving ground and space-based space weather observation infrastructure, sharing best practices for space weather risk assessment and mitigation, increasing coordination on space weather forecasting services, and developing space weather mitigation plans for integration into broader contingency planning for disaster management. These action items are consistent with DOS's responsibilities to contribute to the realization of the 2019 Plan's three key objectives. Efforts by COPUOS to make progress in these and other focus areas are ongoing. Under 51 U.S.C. Â§20301, NASA is responsible for scientific research on the \"Sun-Earth connection through the development and operation of research satellites and other means.\" While E.O. 13865 does not address NASA, E.O. 13744 further directs NASA to (i) implement and support a national research program to understand the Sun and its interactions with Earth and the solar system to advance space weather modeling and prediction capabilities applicable to space weather forecasting; (ii) develop and operate space-weather-related research missions, instrument capabilities, and models; and (iii) support the transition of space weather models and technology from research to operations and from operations to research. The Heliophysics Division of NASA's Science Mission Directorate supports fundamental research on the sun, some of which is important for space weather prediction, but most of which is less directly applicable. Congress appropriated $720 million to the Heliophysics Division in FY2019. CBO estimates that NASA allocated $264 million to space weather activities in FY2019. The Heliophysics Division funds intramural and extramural research and operates a fleet of research spacecraft in Earth orbit and beyond to study the sun, the solar wind, and their interaction with Earth and the rest of the Solar System (see Figure 3 ). When a space weather event or disturbance is observed, NASA also provides research data and modeling results to NOAA for operational use by the Space Weather Prediction Center. In addition to its research activities, NASA has unique operational concerns regarding space weather. First, while multiple agencies and the private sector operate satellites in Earth orbit, above the protection provided by Earth's atmosphere, NASA also has spacecraft in orbits far beyond Earth for planetary exploration and other missions. Earth's magnetic field provides significant protection against space weather for Earth-orbiting satellites, but spacecraft outside Earth's magnetosphere do not benefit from this protection and so have additional requirements for radiation shielding and other countermeasures. Second, NASA is the only U.S. agency with human astronauts in space, so it has unique human safety concerns. Human safety concerns are particularly significant for planned future missions to the Moon and other destinations that are beyond Earth's protective magnetosphere. Congress established the NSF to \"promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes.\" E.O. 13744 further directs NSF to \"support fundamental research linked to societal needs for space weather information through investments and partnerships, as appropriate.\" NSF supports space weather research in two directorates: (1) the Geosciences Directorate, including through the Atmospheric and Geospace Sciences division (AGS) and the Office of Polar Programs (OPP), and (2) the Mathematical and Physical Sciences (MPS) Directorate, through the Astronomical Sciences division (AST). E.O. 13865 does not address NSF. NSF reports that FY2018 space weather funding totaled approximately $105 million, including about $45 million for AST. CBO estimates that NSF allocated $22 million to space weather activities in FY2019. NSF primarily provides grants to research institutions to conduct scientific studies, including universities and private entities that focus on fundamental research questions related to space weather and its impacts. The AGS division supports both basic sciences research and observational and cyber-infrastructure facilitiesâincluding the National Center for Atmospheric Research's High Altitude Observatoryâto improve understanding of the dynamics of the sun, Earth's atmosphere, and near-space environment, and how the sun interacts with Earth's atmosphere. OPP support includes the Antarctic and Astrophysics Geospace program and the IceCube Neutrino Observatory (jointly funded with the MPS Division of Physics). In the ATS divisionâthe federal steward for ground-based astronomy in the United Statesâobservations focus mainly on the sun, and activities include management of the National Solar Observatory (NSO) Integrated Synoptic Program and the Daniel K. Inouye Solar Telescope (DKIST). According to NSF, DKIST will play an important role in enhancing the fundamental understanding of space weather and its drivers. In addition, NSF supports the development of numerical models of the space weather chain, including the sun, solar wind, and geospace. E.O. 13744 further directs NSF, in collaboration with other federal agencies, to identify mechanisms for advancing space weather observations, models, and predictions, and for sustaining and transitioning appropriate capabilities from research to operations and operations to research. As noted in the agency's March 2018 announcement regarding space weather operations to research proposals, NSF's primary role in space weather readiness efforts is support for basic research that advances fundamental understanding of space weather and related processes, including \"the generation of solar storms, their propagation through the interplanetary medium, and their impact on the near-Earth space environment.\" A comprehensive account of total federal agency spending on space weather-related activities is not available. In a cost estimate for the Space Weather Research and Forecasting Act ( S. 881 in the 116 th Congress), CBO estimated that the federal agencies in the National Space Weather Program and the Space Weather Operations, Research, and Mitigation Working Group \"allocated a combined total of nearly $350 million to activities related to space weather\" in FY2019. CBO estimated that the National Aeronautics and Space Administration (NASA) allocated the majority ($264 million) of the $350 million total. Total federal agency allocations towards space weather activities may differ from year to year. For example, CBO estimated federal agencies that were a part of the National Space Weather Program \"spent a total of $160 million\" in FY2016 on activities related to space weather. The 116 th Congress continues to consider and pass legislation related to space weather research, forecasting, preparedness, response, and recovery. Congress enacted S. 1790 in December 2019 as the National Defense Authorization Act for Fiscal Year 2020 (2020 NDAA). The 2020 NDAA amended Sections 320 and 707 of the Homeland Security Act of 2002 ( P.L. 107-296 ) to enact a series of homeland security-related provisions that parallel the E.O. 13865 framework for critical infrastructure resilience and emergency response. See Table 7 for a summary of the new requirements. The 2020 NDAA also repealed Section 1691 of the National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ) , which authorized a \"Commission to Assess the Threat to the United States from Electromagnetic Pulse Attacks and Similar Events.\" The Congressional EMP Commission was to conduct an EMP threat assessment and make policy recommendations to Congress. Senior commission members have publicly claimed a prominent role in developing E.O. 13865, which \"seeks to implement core recommendations of the Congressional EMP Commission on an accelerated basis.\" House-passed versions of the 2020 NDAA cited the publication of E.O. 13865 when repealing Section 1691. Other provisions in the 2020 NDAA require the National Guard to clarify relevant \"roles and missions, structure, capabilities, and training,\" and report to Congress no later than September 30, 2020, on its readiness to respond to electromagnetic pulse events affecting multiple states. These similar but not identical bills, introduced by Senator Gary Peters and Representative Ed Perlmutter respectively, set forth provisions designed to improve the ability of the United States to forecast space weather events and mitigate the effects of space weather. The bills provide statutory authority for an interagency working group (such as SWORM, which was established administratively by the NSTC in 2014). Other major provisions of the bills concern federal agency roles and responsibilities, the establishment of an advisory group, R&D, data sharing, and certain congressional reporting requirements. S. 881 also includes provisions related to the protection of critical infrastructure. The Senate Committee on Commerce, Science, and Transportation ordered S. 881 to be reported without amendment in April 2019. S. 881 was reported out of the committee and placed on the Senate Legislative Calendar in December 2019. H.R. 5260 was referred to several House committees for consideration in November 2019. Previous versions of these bills were introduced in the 114 th and 115 th Congresses. ", "summary": "Space weather refers to conditions on the sun, in the solar wind, and within the extreme reaches of Earth's upper atmosphere. In certain circumstances, space weather may pose hazards to space-borne and ground-based critical infrastructure systems and assets that are vulnerable to geomagnetically induced current, electromagnetic interference, or radiation exposure. Hazardous space weather events are rare, but may affect broad areas of the globe. Effects may include physical damage to satellites or orbital degradation, accelerated corrosion of gas pipelines, disruption of radio communications, damage to undersea cable systems or interference with data transmission, permanent damage to large power transformers essential to electric grid operations, and radiation hazards to astronauts in orbit. In 2010, Congress directed the White House Office of Science and Technology Policy (OSTP) to improve national preparedness for space weather events and to coordinate related federal space weather efforts ( P.L. 111-267 ). OSTP established the Space Weather Operations, Research, and Mitigation (SWORM) Working Group, which released several strategic and implementation plans, including the 2019 National Space Weather Strategy and Action Plan. The White House provided further guidance through two executive orders (E.O. 13744 and E.O. 13865) regarding space weather and electromagnetic pulses (EMPs), respectively. The National Oceanic and Atmospheric Administration and the National Weather Service are the primary civilian agencies responsible for space weather forecasting. The National Laboratories (administered by the Department of Energy), the National Aeronautics and Space Administration (NASA), and the National Science Foundation support forecasting activities with scientific research. Likewise, the U.S. Geological Survey provides data on the earth's variable magnetic field to inform understanding of the solar-terrestrial interface. The Department of Homeland Security disseminates warnings, forecasts, and long-term risk assessments to government and industry stakeholders as appropriate. The Department of Energy is responsible for coordinating recovery in case of damage or disruption to the electric grid. The Department of State is responsible for engagement with international partners to mitigate hazards of space weather. The Department of Defense supports military operations with its own space weather forecasting capabilities, sharing expertise and data with other federal agencies as appropriate. The Congressional Budget Office estimated that federal agencies participating in the SWORM Working Group \"allocated a combined total of nearly $350 million to activities related to space weather\" in FY2019. NASA allocated the majority ($264 million) of the $350 million total. Congress enacted S. 1790 in December 2019 as the National Defense Authorization Act for Fiscal Year 2020 (2020 NDAA). The 2020 NDAA amended Sections 320 and 707 of the Homeland Security Act of 2002 ( P.L. 107-296 ) to enact a series of homeland security-related provisions that parallel the E.O. 13865 framework for critical infrastructure resilience and emergency response. The 2020 NDAA also repealed Section 1691 of the National Defense Authorization Act for Fiscal Year 2018 ( P.L. 115-91 ), which authorized a \"Commission to Assess the Threat to the United States from Electromagnetic Pulse Attacks and Similar Events.\" Other provisions in the 2020 NDAA require the National Guard to clarify relevant \"roles and missions, structure, capabilities, and training,\" and report to Congress no later than September 30, 2020, on its readiness to respond to electromagnetic pulse events affecting multiple states. Separately, some Members of Congress have introduced the Space Weather Research and Forecasting Act ( S. 881 ), which would define certain federal agency roles and responsibilities, among other provisions.", "document_type": "crs"}
{"report": "Ghana, a country of 28 million people on West Africa's Atlantic coast, faces diverse development challenges, but has built a robust democracy notable for consistent peaceful turnovers of executive power since a transition to multiparty rule in the early 1990s. The country also has made progress toward many of the socioeconomic outcomes that successive U.S. administrations have sought to foster in Africa, and U.S. policymakers have tended to view Ghana as a stable U.S. partner in an often-volatile region. Substantial U.S. bilateral aid has both been premised on and arguably contributed to Ghana's generally positive development trajectory. Amicable relations between the United States and Ghana, a former British colony, have persisted since 1957, when Ghana became the first colonized sub-Saharan African country to gain independence. In 2008, then-President George W. Bush visited Ghana to showcase U.S. aid programs on trade, entrepreneurship, health, education, and Ghana's first Millennium Challenge Corporation (MCC) compact. In 2009, then-President Barack Obama traveled to Ghana to highlight the nation as a democratic model for other African countries. The Trump Administration has signaled support for continued close cooperation, although there has been some recent tension over reported Ghanaian noncooperation with U.S. immigration law enforcement proceedings. The Administration also has proposed sharp cuts in bilateral aid as part of its overall emphasis on reducing foreign assistance, which could affect relations. During the Obama Administration, U.S. aid to Ghana was provided primarily under U.S. Agency for International Development (USAID)-administered global presidential development initiatives. These included Feed the Future (FTF, a global food security effort), the Global Health Initiative (GHI), the Global Climate Change Initiative (GCCI), and several Africa-specific initiatives: Power Africa, Trade Africa, and the Young African Leaders Initiative (YALI). In 2014 Ghana signed a second MCC compact focused on the electrical power sector. Ghana was also selected to join the Obama Administration's African Peacekeeping Rapid Response Partnership (APRRP) and its Security Governance Initiative (SGI), both launched in 2014. Ghana is a key international peacekeeping troop contributor in Africa, and engages in regular joint military training exercises and other security cooperation with the United States. Ghana has also played an active and constructive role in regional affairs. It has been a leader in various regional interventions to address political and security crises in West Africa and has hosted refugees fleeing conflict. The Ghanaian government is currently helping to mediate long-standing government-opposition political tensions in neighboring Togo. It also hosted a regional hub that supported United Nations (U.N.) operations to counter the 2014-2015 Ebola outbreak in nearby countries. Ghanaians have played leadership roles in regional and multilateral organizations. Ghana supports Economic Community of West African States and African Union efforts to foster regional and continental economic integration. At a global level, Ghana seeks to sustain positive donor relations, aid, and investment, and contribute to multilateral policymaking relating to peace, stability, development, and scientific cooperation, while also expanding its foreign export markets. The predecessor of Ghana's incumbent president Nana Addo Dankwa Akufo-Addo was John Dramani Mahama, who came to office in July 2012 as the constitutional successor of President John Atta Mills, who died in office of natural causes earlier that month. Mahama then won election in polls held in late 2012. Ghana's most recent general elections, held on December 7, 2016, were generally regarded as free and fair, despite tensions and isolated incidents of political violence. The presidential race featured a rematch between Mahama, of the National Democratic Congress (NDC), and Akufo-Addo, of the New Patriotic Party (NPP). These two parties dominate national politics to such an extent that Ghana effectively has a two-party system. Akufo-Addo won 53.7% of votesâexceeding the 50-percent-plus-one threshold necessary to preclude a runoff voteâagainst 44.5% for Mahama. Akufo-Addo took office in January 2017. The NPP also won 171 of 275 legislative seats and the NDC 104. The strength of Akufo-Addo's first-round win was noteworthy, as he had lost two prior presidential runoffs by razor-thin margins. Despite moderate economic improvements in 2016, widespread frustration over poor economic performance under Mahama likely clinched his electoral defeat. During Mahama's tenure, multiple downward economic trends converged, spurring repeated protests over unemployment and socioeconomic challenges. For two decades, control of Ghana's executive and legislative branches has alternated between the NDC, which has generally supported a social-democratic vision and a key economic role for the state, and the NPP, which has emphasized a more free-market, private-sector-centered approach. Despite these different ideological outlooks, the parties' election platforms and policy records have been broadly similar. Both have tried to foster private-sector-driven growth and foreign investment, while also supporting state investments in industrialization and infrastructure, and both have emphasized the importance of social services and welfare programs. President Akufo-Addo is the scion of a well-known political family and a former member of parliament who served as Foreign Affairs Minister and Justice Minister under the NPP government of former President John Kufuor. A major goal of the Akufo-Addo administrationâas set out in the NPP's 2016 election platform, presidential speeches, and government policy documentsâis to improve the economy. Notable emphases include efforts to increase access to commercial credit, reduce business costs, and support private-sector-led economic expansion and job growth. Priorities include industrialization, economic diversification, state investment in infrastructure, and tax incentives targeting manufacturing in selected sectors (e.g., light industries, pharmaceuticals, petrochemicals, and garments and textiles). In July 2019, the government launched a $320 million initiative called the Infrastructure for Poverty Eradication Programme, under which each of 275 constituencies are to be given $1 million to invest in infrastructure chosen by local stakeholders. Some funding for preexisting commitments is also included. The Akufo-Addo administration also seeks to strengthen public social service and safety net programs, with a focus on health, education, and housing. In September 2017, it launched the Free Senior High School program, under which universal senior high school (SHS, i.e., post-ninth-grade) education is entirely publicly funded. Previously, there were a limited number of SHS institutions, admission was competitive, and students had to pay fees. The SHS program has reportedly created challenges with respect to accommodating a large influx of students. In May 2019, the government launched a Social and Partnership Council, which is to manage a partnership between the government, organized labor, and employers aimed at increasing economic competitiveness and growth and ensuring constructive labor-business relations. The Akufo-Addo administration also has pledged to create a series of regional development authorities, build public institutional capacities, combat corruption, and enhance governance and accountability. The government seeks to accomplish all of these goals while also reining in public spending, running a balanced budget, and stabilizing the currency. In official remarks, President Akufo-Addo has placed high priority on reducing Ghana's reliance on foreign assistance, noting a need to \"discard a mindset of dependency and living on handouts\" and \"to build an economy that is not dependent on charity and handouts â¦ a Ghana beyond aid.\" In July 2019, Akufo-Addo reiterated his call for self-reliance and African-driven regional development. Public sector corruption in Ghana has been a chronic challenge. In July 2019, Transparency International and Afrobarometer, a survey organization, released data indicating that roughly a third of Ghanaians reported having paid a public service bribe in the last 12 months, believing that corruption had increased during that period, and thinking that the government is doing a bad job of countering corruption. A majority, 60%, also reported believing that ordinary citizens could make a difference in the fight against corruption. In recent years there have been several high-profile bribery scandals involving top officials, including a major one in 2015-2016 that forced many judges from office. Although both NDC- and NPP-led governments have taken steps to combat corruption, new cases have regularly emerged during the administrations of both parties. Akufo-Addo has pledged to tackle the corruption issue, including by strengthening the asset declaration system for officials and ensuring nonpartisan prosecution of public corruption. In early 2018, the government created an Office of the Special Prosecutor to address state corruption. Akufo-Addo's nomination of former Mahama administration Justice Minister and Attorney General (AG) Martin Amidu to fill the post generated some controversy. Amidu had been dismissed as AG under Mahama after accusing multiple colleagues in the then-ruling NDC of fraud, and later pursued corruption cases through private litigation. In May 2017, Akufo-Addo announced the arrest of customs officials implicated in $276 million in revenue losses in an under-invoicing import collusion case. He also ordered an investigation into the president of Ghana Football Association (GFA) for corruption-related offenses, and later dissolved the GFA. The matter drew intense local public attention. Akufo-Addo and the NPP have faced criticism for failing to rein in allegedly criminal acts of intimidation by NPP youth supporters, notably the Delta Force, a pro-NPP political vigilante group. These acts appears linked to unmet demands for patronage or jobs by NPP youth loyalists who helped secure the NPP's 2016 electoral victories. In early 2017, Delta Force members committed acts of assault and rioting, leading to criminal cases against several, and group members later disrupted court proceedings in these cases. Although Akufo-Addo condemned the group, those prosecuted were fined rather than imprisoned. Drug traffickers use Ghana as a hub for the transshipment of cocaine from Latin America and heroin from southwest Asia. These drugs are typically shipped onward to markets in Europe, South Africa, and North America, and Ghanaian drug mules are regularly arrested at airports abroad, although Ghana also is a destination point. There is close U.S.-Ghanaian cooperation to fight drug trafficking. The U.S. Drug Enforcement Administration (DEA) opened an office in Ghana in 2009 and in 2010 helped set up a specially vetted police unit, which the DEA later designated a Sensitive Investigative Unit (SIU), one of a few in Africa. In cooperation with Ghana, the DEA has carried out several extraditions and other law enforcement operations. Since 2012, Ghana also has hosted a State Department International Law Enforcement Academy Regional Training Center. The center trains law enforcement officials from across West Africa. Ghana has not faced Islamist terrorist attacks on its soil, but could, given a rise in violent Islamist extremist attacks and insurgencies in recent years in West Africa, notably including the Sahel, which abuts Ghana's northern border. CÃ´te d'Ivoire and Burkina Faso, which neighbor Ghana, have both faced mass-casualty extremist attacks in urban areas in recent years. Ghana's contribution of troops to the U.N. Multidimensional Integrated Stabilization Mission in Mali (MINUSMA) could also potentially spur extremists to target Ghana. There are few, if any, overt signs of widespread radicalization among Ghana's Muslims, who in 2010 comprised nearly 18% of the population and were concentrated primarily in the Northern and Ashanti regions. Ghanaian Islamic practices primarily draw on Sufi traditions (which emphasize personal human-divine spiritual relations) and the Ahmadiyya movement (a global sect with historical origins in India). There are some indications that radicalization of Ghanaians by foreigners or by Ghanaians drawing on foreign extremist ideologies may be occurring, though likely on a limited basis. A Libyan government report on the Islamic State (IS) in Libya that spurred parliamentary debate in October 2017 reportedly suggested that between 50 and 100 Ghanaians may have joined that group. Some local analysts believe there may be a significantly higher number of radicalized Ghanaians with IS links. In early 2018, several individuals in possession of grenades, one with suspected IS ties, were arrested in Ghana. A separate matter that has caused some local controversy was the Mahama government's 2016 agreement to host two Yemenis who had been imprisoned for 14 years as U.S. enemy combatants in Guantanamo Bay, Cuba. Despite controversy in the caseâincluding a legal suit over the agreement's legality and NPP criticism of the NDC government's original acceptance of the menâthe Akufo-Addo government allowed them to remain in the country as refugees after the agreement expired in early 2018. Ghana has a free and active press and a generally positive record on upholding individual rights and freedoms. Nevertheless, the State Department's 2018 Country Reports on Human Rights Practices documents a range of serious human rights challenges, including arbitrary or unlawful killings by the government or its agents; harsh and life-threatening prison conditions; corruption in all branches of government; lack of accountability in cases of violence against women and children, including female genital mutilation/cutting; infanticide of children with disabilities; criminalization of same-sex sexual conduct, although rarely enforced; and exploitative child labor, including forced child labor. Trafficking in persons (TIP) activities are a notable challenge. In 2015, Ghana signed the first U.S. bilateral Child Protection Compact Partnership, a multi-year plan to address child sex trafficking and forced labor. Notwithstanding this initiative, the State Department rates Ghana's anti-TIP efforts as poor and ranked Ghana on the Tier 2 Watch List in 2015, 2016, and 2017. This ranking placed Ghana at risk of losing certain types of U.S. aid under the Trafficking Victims Protection Act of 2000 (TVPA, P.L. 106-386 , as amended). In 2018, Ghana's TIP ranking improved to Tier 2, a determination indicating that the government does not fully meet minimum anti-TIP standards set out in the TVPA, but is making significant efforts to do so. Ghana remained a Tier 2 country in 2019. As in 2018, the 2019 report states that Ghana is a source, transit, and destination for men, women, and children subjected to forced labor in a range of domestic industries, as well as to sex work. According to the report, child labor in the fisheries sector is particularly widespread. Child labor in the cocoa sector has also been a particular concern of U.S. policy-makers for many years. A range of public-private U.S. Department of Labor-monitored programs to end such child labor are in place, as provided for under the 2001 Harkin-Engel Protocol and several follow-up agreements. Ghana has largely recovered from a period of low growth under former President Mahama. The value of Ghana's GDP reached an estimated $65 billion in 2018, up from an annual average of $55.8 billion from 2013 through 2017, while GDP grew by 5.6% in 2018âan arguably healthy rate, but one lower than the 8.1% rate achieved in 2017. The International Monetary Fund (IMF) projects that the growth rate will rise to 8.8% in 2019 before slowing to an average of 3.7% over the next five years. In the aggregate, however, that growth would be significant; the IMF anticipates that GDP will be worth $97 billion in 2024. Increases in the prices of Ghana's key commodity exports have helped spur the post-Mahama recovery. Historically, Ghana's most important exports have been cocoa and gold. Crude oil has become a third major commodity export since 2010, when production from newly discovered oil fields began. The oil and gas sector is expected to rapidly expand following a period of weak oil prices and a number of technical production challenges. Ghana's domestic economy is more diverse and dynamic than the economies of many of its West African peers. The services sector, which includes a small stock market, a nascent call- and information-processing sector, and a mobile money market worth $35 billion, has grown particularly rapidly since the mid-2000s. Services, which are centered in cities, where about 56% of Ghanaians live, contributed an estimated 42% of GDP in 2017. Agriculture's share of GDP has declined over the past decade, from 36% in 1997 to 20% in 2017, but the sector remains an economic keystone; it employed 34% of the labor force in 2017. Compared with much of West Africa, Ghana has fairly effective public goods and service provision capacities, and relatively high cell phone usage and electricity access rates, which underpin production, digital trade, and financial transactions. Access to reliable power is projected to increase as multiple new power plant projects come onlineâthough in the meantime, power generation and transmission capacities remain unreliable and costly. Ghana is also continuing to expand natural gas production and related transport and storage infrastructure, primarily for use in electricity production, but also for applications in other sectors (e.g., for fertilizer production). A multi-year slide in the exchange value of Ghana's Cedi currency that began under Mahama has continued under Akufo-Addo, hurting the trade balance and hindering economic activity, due to a heavy reliance on imported goods. Despite the NPP's strong criticism of the Mahama government's deficit spending and other aspects of its economic policy record, including its high deficit spending, the Akufo-Addo administration has continued to borrow heavily to fund its policy agenda. It sold $2 billion worth of Eurobonds in May 2018 and another $3 billion in March 2019, after issuing roughly $1.2 billion in state-backed bonds to finance state-owned enterprise energy sector debts earlier in the AkufoÂ­Addo administration. Public debt climbed from 57.1% of GDP in 2016, Mahama's final year in office, to 59.6% of GDP in early 2018 (latest data). Debt payments and efforts to fulfill the NPP's campaign pledges have helped drive such spending. To help Ghana address fiscal imbalances, external account deficits, exchange rate-linked rises in inflation, and power shortages, in 2015 the IMF began a $925 million, policy-conditioned Extended Credit Facility (ECF) loan program. The Akufo-Addo government maintained the program, while requesting and receiving waivers allowing deviations from some ECF targets. The program was extended into early 2019. The IMF has generally praised the government's economic performance, notably regarding revenue collection efforts, public debt audits aimed at identifying invalid claims, and accountability measures (e.g., the creation of a Special Prosecutor post (see above) and a proposed Public Financial Management Act). It has also called new government credit commitments \"justified,\" while also warning that the national debt loads remain \"at high risk of distress.\" Annual foreign direct investment (FDI) has generally grown in recent years, especially in the energy sector. According to the U.N. Conference on Trade and Development, FDI flows into Ghana averaged $3.3 billion annually between 2014 and 2016, while FDI stock averaged $26.5 billion. The World Bank's 2019 Doing Business Report ranks Ghana 114 th out of 190 countries surveyed. This is far below its 2012 ranking of 63 rd among 183 countries, yet still placed Ghana in the top-performing quarter of African countries. Under Mahama, Ghana created an Investment Promotion Center to oversee FDI and streamline investment procedures. While in its 2019 Investment Climate Statement for Ghana the State Department reported that Ghana has \"one of the more open\" investment climates in Africa, it also cited a number of \"troubling\" foreign investment policy in recent years. The Trump Administration has not announced any major changes in U.S. policy toward Ghana, but has proposed a sharp reduction to USAID and State Department-administered aid for Ghana, which could affect bilateral relations. According to the State Department, the United States and Ghana \"share a long history promoting democracy, human rights, and the rule of law,\" and Ghana is a model for its peers throughout Africa \"in promoting resilient democratic institutions, transparent and peaceful transitions of power and regional stability.\" There have also been robust \"people-to-people\" relations since the late 1950s, notably in the form of learning exchange visits and cooperation among educational and scientific institutions, and thousands of Ghanaians have been educated in the United States. There are close cultural ties, notably between Ghanaians and African-Americans; there is a substantial African-American expatriate community in Ghana. Despite generally amicable bilateral relations, the U.S. Department of Homeland Security (DHS) in coordination with the Department of State imposed visa sanctions on Ghana in January 2019, citing a \"lack of cooperation in accepting their nationals ordered removed from the United States\"âan issue of particular salience for the Trump Administration. The restrictions affect tourist and business visitor visas for certain government officials and, in some cases, their families and attendants. The United States had earlier warned that it might take such an action: in June 2018, the United States alleged that Ghana's government was insufficiently cooperating with U.S. deportation orders by not interviewing or providing travel documents to Ghanaians being deported from the United States. In such cases, the United States pays for charter flights to effect removals. Bilateral cooperation is diverse, ranging from security matters to development assistance programs to professional development and learning exchanges. A flagship exchange program is the Young African Leaders Initiative (YALI), for which Ghana hosts a Regional Leadership Center. YALI, launched by the Obama Administration in 2010, fosters the development of emergent young African business, civic, and public management leaders through U.S. exchange -based fellowships and follow-up learning and networking in Africa. Another notable initiative is Power Africa, also begun by the Obama Administration, which supports increased access to electricity. The Trump Administration has maintained both programs, but requested less funding for them than did the Obama Administration. Ghana also hosts a USAID West Africa regional mission and is a beneficiary of its programs, such as the West Africa Trade Hub, which helps build regional trade and investment capacities and seeks to increase AGOA exports. About 139 Peace Corps volunteers, who are part of a program that has been operational since 1961, work in the areas of education, agriculture, and health. Ghana periodically receives additional assistance under State Department and USAID regional programs, periodic short-term programs by other U.S. agencies, and special regional or global initiatives, such as the African Peacekeeping Rapid Response Partnership. Bilateral State Department and USAID-administered assistance totaled $143 million in FY2018, and funded programs related to health ($75 million), agriculture ($35 million) and education ($20 million), among other sectors. Health aid in FY2018 focused on nutrition, family planning, and reproductive, child, and maternal health programs, as well as efforts to combat HIV/AIDS and malaria. The Trump Administration has requested $62.8 million for FY2020âa 56% decrease from actual FY2018 levels. Proposed health sector assistance would comprise $42 million, nearly 67% of the FY2020 request, while agriculture programs would constitute much of the balance. In 2012, Ghana completed a five-year $536 million Millennium Challenge Corporation (MCC) compact focused on improving the agricultural economy, roads and ferry investments, and rural banks, as well as education, water, sanitation, and power service delivery. In 2014, Ghana signed a second five-year MCC compact, a $498 million set of projects, matched by $37.4 million in Ghanaian public funding. Focused entirely on private- and public-sector electrical system capacity building, it is designed to meet current and future power demand, spur growth, and reduce poverty. A key goal is to improve the service quality and reliability of the Electricity Company of Ghana (ECG), the main national power utility, through technical and governance capacity building, and to bring in a private-sector operator, possibly a U.S. firm, to partially privatize ECG and enhance its commercial viability. This element of the compact has spurred labor opposition and is contingent on ECG clearing much of its legacy debt (a factor in the government's previously discussed recent $1.2 billion bond offering). The compact provides technical aid for the northern region's power utility and supports efforts to improve power sector regulatory capacities, reform electricity tariff structures, and attract power sector investment. It also seeks to improve energy supply and demand management and energy use efficiency, and provides limited support for distributed, off-grid, solar-power systems and increased access to power connections by small businesses. Gas sector commercialization, the implementation of a national-gas-to-power plan, and the operationalization of an independent electricity producer framework are other areas of compact activity. In 2018, the MCC Board of Directors selected Ghana as one of five West African countries eligible for a concurrent MCC compact that would focus on promoting \"cross-border economic integration, trade, and collaboration\"âa new authority granted by Congress under the AGOA and MCA Modernization Act of 2018 ( P.L. 115-167 ). Consideration of Ghana's suitability for a concurrent compact is ongoing. U.S. and Ghanaian interests in addressing regional political and security crises have often aligned, and Ghana has won international plaudits for its steady contribution of troops to international peacekeeping operations in Africa and elsewhere. For years, Ghana's military has received U.S. training in support of such activities, and Ghana has periodically provided the U.S. military with access to its military facilities, in support of both military exercises and crisis response actions (e.g., emergency embassy evacuations). It also hosts a U.S. military Exercise Reception Facility used to expedite U.S. and Ghanaian troop deployments in West Africa. U.S.-Ghanaian security cooperation is rooted in bilateral defense agreements dating back to 1972. In early 2018, the two countries signed an updated Status of Forces Agreements (SOFA, a type of agreement governing bilateral defense cooperation and the rights and privileges of U.S. troops stationed in partner countries). The State Department described the agreement as a routine update of the terms governing U.S.-Ghanaian defense cooperation, and as supporting planned joint exercises and the U.S. provision of up to $20 million in military equipment to Ghana. Most of this equipment is being provided primarily under the African Peacekeeping Rapid Response Partnership (APRRP), a U.S. initiative that supports partner military peacekeeping training, with a focus on logistics, troop deployment, and interoperability capacity-building. Ghana has also long participated in the U.S. International Military Education and Training (IMET) program. Ratification of the SOFA by Ghana's parliament, however, proved controversial. It was preceded by press accounts suggesting that the United States wanted to establish one or more military bases in Ghana, an allegation that the State Department refuted. Opposition members of parliament boycotted the vote, citing national sovereignty concerns. While ostensibly a protest against U.S-Ghanaian cooperation, their action appears likely to have been primarily motivated by NPP-NDC partisan rivalry. The Mahama/NDC administration had itself pursued robust security cooperation with the United States. Ghana is a partner of the North Dakota National Guard under the State Partnership Program, which pairs U.S. state National Guard units with foreign partner nations in support of U.S. security cooperation goals. Ghana has also hosted and benefitted from various U.S. Africa Command (AFRICOM) activities centered on regional crisis-response and maritime security. Ghana has also received Department of Defense (DOD) counternarcotics capacity-building assistance in some years, including aid that ranged between $1 million in FY2017 and $3.5 million in FY2015. DOD has also provided ship traffic monitoring equipment and patrol boats, administered training, and pursued maritime cooperation, in part to boost Ghana's capacity to counter maritime piracy. In the first half of the 2010s, Ghana received some bilateral Foreign Military Financing, as well as periodic Nonproliferation, Antiterrorism, Demining and Related Programs-Export Control and Related Border Security assistance (NADR-EXBS, last provided in FY2015 at a level of $200,000). FMF supported Ghana's capacity to deploy trained, equipped international peacekeeping troops. NADR aid supported efforts to increase internal and regional security by targeting small arms trafficking. Other U.S. security sector assistance has been provided under the State Department's West Africa Regional Security Initiative (WARSI). WARSI supports increased access to justice, rule of law capacity-building, security sector reform, and efforts to bolster partner nations' capacity to counter transnational threats, including illicit drug trafficking. Despite periodic challenges, a long history of positive U.S.-Ghanaian relations suggests that bilateral cooperation relating to development, trade, and security is likely to endure. President Akufo-Addo's stated goal of decreasing and ultimately ending Ghana's need for foreign aid, and his embrace of private-sector-led growth models, are likely to be received positively by most U.S. policymakers. His message of economic self-reliance may resonate, in particular, with the Trump Administration, given President Trump's contention that leaders of all countries should prioritize their own nations' economic interests. If Ghana is able to become more self-sufficient and boost its economic production and trade capacity, diversify its economy, and reduce poverty, it could also become a more significant U.S. trade partner.", "summary": "Ghana, a country of 28 million people on West Africa's Atlantic coast, faces diverse development challenges, but has built a robust democracy notable for consistent peaceful turnovers of executive power since a transition to multiparty rule in the early 1990s. The country also has made progress toward many of the socioeconomic outcomes that successive U.S. administrations have sought to foster in Africa, and U.S. policymakers have tended to view Ghana as a stable U.S. partner in an often volatile region. Substantial U.S. bilateral aid has both been premised on and arguably contributed to Ghana's generally positive development trajectory. Amicable relations between the United States and Ghana, a former British colony, have persisted since 1957, when Ghana became the first colonized sub-Saharan African country to gain independence. In 2008, then-President George W. Bush visited Ghana to showcase U.S. aid programs on trade, entrepreneurship, health, education, and Ghana's first Millennium Challenge Corporation (MCC) compact. In 2009, then-President Barack Obama traveled to Ghana to highlight the nation as a democratic model for other African countries. The Trump Administration has not pursued any major policy shifts toward Ghana, but bilateral ties have recently come under strain with imposition, in early 2019, of selected visa sanctions on Ghanaian nationals by the U.S. Department of Homeland Security. In practice, the sanctionsâimposed in response to reported noncooperation with U.S. immigration law enforcement proceedings and deportation ordersâmean that U.S. consular officials are restricting the issuance of certain U.S. visas to Ghanaian citizens. The Administration also has proposed sharp cuts in bilateral aid as part of its emphasis on reducing foreign assistance, which could affect relations. During the Obama Administration, U.S. aid to Ghana was provided primarily under U.S. Agency for International Development (USAID)-administered global presidential development initiatives. These included Feed the Future (FTF, a global food security effort), the Global Health Initiative (GHI), the Global Climate Change Initiative (GCCI), and several Africa-specific initiatives: Power Africa, Trade Africa, and the Young African Leaders Initiative (YALI). In 2014 Ghana signed a second MCC compact focused on the electrical power sector. Ghana was also selected to join the Obama Administration's African Peacekeeping Rapid Response Partnership (APRRP) and its Security Governance Initiative (SGI), both launched in 2014. Ghana is a key international peacekeeping troop contributor in Africa, and engages in regular joint military training exercises and other security cooperation with the United States. According to a March 2019 State Department fact sheet on U.S.-Ghana relations, the United States and Ghana \"share a long history promoting democracy, human rights, and the rule of law,\" and Ghana is a model for other African countries \"in promoting resilient democratic institutions, transparent and peaceful transitions of power and regional stability.\" There have also been robust \"people-to-people\" relations since the late 1950s, notably in the form of learning exchange visits and cooperation among educational and scientific institutions, and thousands of Ghanaians have been educated in the United States. There are close cultural ties, notably between Ghanaians and African-Americans; there is a substantial African-American expatriate community in Ghana.", "document_type": "crs"}
{"report": "The outbreak of coronavirus disease (COVID-19), first in the People's Republic of China (PRC or China), and now globally, including in the United States, is drawing attention to the ways in which the United States and other ec onomies depend on critical manufacturing and global value chains that rely on production based in China. Congress is particularly concerned about these dependencies and has passed legislation to better understand and address them. An area of particular concern to Congress in the current environment is U.S. shortages of medical suppliesâincluding personal protective equipment (PPE) and pharmaceuticalsâas the United States steps up efforts to contain COVID-19 with limited domestic stockpiles and insufficient U.S. industrial capacity. Because of China's role as a global supplier of PPE, medical devices, antibiotics, and active pharmaceutical ingredients (API), reduced exports from China have led to shortages of critical medical supplies in the United States. Starting in early February 2020, U.S. health care experts began warning of a likely global spread of COVID-19, and early reports of U.S. medical supply shortages began to emerge. At the same time, the Chinese government nationalized control of the production and distribution of medical supplies in China, directing all production for domestic use. The Chinese government also directed the national bureaucracy, local governments, and Chinese industry to secure supplies from the global market. This effort likely exacerbated medical supply shortages in the United States and other countries, particularly in the absence of domestic emergency measures that might have locked in domestic contracts, facilitated an earlier start to alternative points of production, and restricted exports of key medical supplies. As China's manufacturing sector recovers while the United States and other countries are grappling with COVID-19, the Chinese government may selectively release some medical supplies for overseas delivery. Those decisions are likely to be driven, at least in part, by political calculations, as it has done recently with many countries around the world. COVID-19 was identified in China in December 2019 and peaked in late January 2020. In response, China shut down a large part of its economy in an effort to contain the outbreak. A key factor in the sharp economic slowdown in China was the dramatic downturn of both demand and supply after Chinese officials imposed restrictions in the third week of January on movement of people and goods in and out of localities across China. Since the COVID-19 outbreak in China has eased, the Chinese government's efforts to restart business activities has been slow and uneven across sectors and locations. Companies have sought to meet new government requirements for virus containment and faced worker and supply shortages as interregional logistics have remained constrained. Resumption of bilateral trade will likely be uneven due to bottlenecks in inputs, locations of containers, and logjams in current shipments. U.S. companies typically maintain anywhere from two to ten weeks of inventory, and transportation time for trans-Pacific container shipments is typically three weeks. With this timeframe in mind, initial shortages that U.S. firms faced of deliveries of microelectronics, auto parts, and health and medical products could intensify over the next few months. There could be additional shortages in a wide range of imports that transit via container ship (e.g., processed raw materials, intermediate industrial goods, and finished consumer products). As China's economic activities resume, other countries around the world are taking an economic hit. As in China, new restrictions around the world on the movement of people and business operations could trigger sharp new slowdowns in demand, transportation, and logistics worldwide, further dragging down prospects for global trade recovery. Suppressed global demand will likely further complicate efforts to orchestrate a rebound in China's (or global) economic activity. In sectors where China has extensive capacity (such as steel), some fear China could overwhelm overseas markets, as it ramps up export-led growth to compensate for the sharp economic downturn in the first quarter of 2020. Congress faces current choices that will influence the longer-range U.S. trade trajectory vis-a-vis China. Since the imposition of Section 301 tariffs on U.S. imports from China and China's retaliatory tariffs beginning in 2018, some Members have raised questions about the dependence of U.S. supply chains on China for critical products. There are also concerns about the potential ramifications of these dependencies, particularly in times of crisis or PRC nationalization of industry. Current demand pressures during the COVID-19 pandemic could increase U.S. reliance on medical supplies from China, at least in the short term (provided that the Chinese government is willing to export these supplies to the United States). At the same time, these pressures are also incentivizing diversification efforts. As the United States' third-largest trading partner in 2019, bilateral trade with China is important to the U.S. economy, and the recent sharp downturn in activity affects a wide range of U.S. industries. Total U.S. trade with the world (the sum of exports and imports of goods and services) was $5.6 trillion in 2019, equivalent to 26% of U.S. gross domestic product (GDP); China accounts for 11% of U.S. trade. Key facts about the relationship include the following: China's, total merchandise trade with the United States in 2019 amounted to $558.9 billion; China is the United States' third largest export market for goods. U.S. goods exports to China in 2019 were valued at $106.6 billion in 2019; China is the top source of U.S. imports. U.S. goods imports from China reached $452.2 billion in 2019; U.S. services exports to China in 2019 were valued at $56.7 billion (mostly travel and transport); U.S. services imports from China in 2019 were valued at $18 billion (about half of this amount was travel and transport); and U.S. foreign direct investment (FDI) stock in China in 2018 reached $116.5 billion while China's FDI stock in the United States reached $60.2 billion in 2018. Top U.S. exports to China include semiconductor chips, devices, parts and manufacturing machines; agriculture; aircraft, turbojets, turbo propellers, and gas turbines; optical and medical equipment; autos; plastics; and pharmaceutical products ( Figure 1 ). Top U.S. imports from China include microelectronics (computers and cell phones) and appliances, furniture, bedding and lighting; toys, games and sports equipment; plastics; knitted and non-knitted apparel, textile fabric, linens, and footwear; auto parts; articles of iron and steel; medical and surgical instruments; and, organic chemicals (including active pharmaceutical ingredients and antibiotics). Since late January, the outbreak of COVID-19 in China has had a direct economic impact on U.S. firms that operate in China, export to or sell goods and services directly in China, or depend on Chinese goods and services for their operations in the United States and abroad. Some analysts estimate that China experienced a sharp drop in economic growth by as much as 9% in Q1 2020 and a 17.2% drop in exports in January-February 2020 compared to the same period in 2019. China's economy is globally connected through trade, investment, and tourism. The economic slowdown and global spread of COVID-19, combined with global travel and transportation restrictions and other effects, are now causing worldwide economic fallout. Indicators in key industries, include: China has recorded a sharp downturn in microelectronics production and sales and the United States could experience a similar drop due to a potential gap in availability. Almost half the value of U .S. imports from China in 2019 was mobile phones, computers and related parts . Foxconn, a Taiwan firm that produces the iPhone for Apple in China, received formal government permission to reopen its facilities in mid-February but has faced challenges because of quarantine and transportation restrictions. Foxconn's plan to offer $1,000 to each returning worker suggests potential lingering concerns about the risk of infection or other labor constraints. The company may also face supply constraints of key microelectronics inputs. Other companies that use Foxconn for contract manufacturing in China include Amazon, Cisco, Dell, Google, Hewlett Packard, Nintendo, and Sony, as well as Chinese firms Huawei and Xiaomi. The U.S. auto industry and manufacturers in South Korea, Japan, and Germany quickly faced manufacturing bottlenecks because of the lack of availability of auto parts supplies from China. The spread of COVID-19 to other major auto manufacturing markets, including the United States, Germany, Japan and South Korea may pose additional constraints. China exported $9.6 billion in auto part s to the United States in 2019 . U.S. manufacturing faces potential shortages of intermediate inputs for steelmaking and heavy manufacturing, such as refined manganese metal, ferrosilicon, and ferrovanadium. Manganese and ferrovanadium are steel strengtheners that depend on China-based processing. While manganese is mined around the world, China controls 97% of manganese processing. Ferrosilicon is used to extract oxygen from liquid steel, and is mostly produced in China. China exported al most $10 billion in iron and steel products to the United States in 2019 . U.S. retailers, tourism, and service providers that rely on the Chinese consumer base have also taken a hit in China. Many closed or significantly curtailed operations. U.S. retailers reduced operating hours or shuttered stores in response to COVID-19. For example, Starbucks closed about half its 4,200 retail outlets in China between late January and late February. Retailers and tourism service providers around the world have seen significantly reduced revenue as fewer Chinese citizens travel abroad China's outbound tourism spending in 2018 was $277 billion, of which an estimated $36 billion was in the United States . Measures to contain the COVID-19 outbreak have significantly curtailed global transportation links. The consequence is the prevention of the transport of many products and manufacturing inputs. Passenger air traffic has slowed significantly, taking offline significant air cargo capacity for microelectronics and other products that ship by air. Container shipments are also constrained by the current backlog and dependence on domestic trucking and rail transportation, as well as on the ability of countries to staff port operations. U.S. airlines started suspending flights to China in late January 2020 and have suspended other routes as COVID-19 has spread globally. United Airlines announced steep flight cuts and said in early March 2020 that ticket bookings were down 70% for Asia-Pacific flights, noting that this downturn was magnified by a surge in flight cancellations. The company noted that revenue in April and May could drop as much as 70%. While Federal Express (FedEx) and United Parcel Service (UPS) announced in early March that they continued to run flights in and out of affected countries, they warned that limitations on travel could delay some shipments, although freight carriers are now starting to repurpose passenger flights for cargo which could help expand capacity. Quarantine of aircrew and restrictions on the ground in China with regard to labor, production, supply and logistics likely significantly curtailed shipments. On March 26, 2020, the Civil Aviation Administration of China (CAAC) restricted all airlines running passenger flights in and out of China to one flight per week, further constraining air freight capacity. Container shipping from China has faced serious constraints because of shortages of workers and trucking constraints. These constraints are affecting both U.S. imports to and exports from China. The Port of Los Angeles has announced that shipments scheduled from China between February and April 2020 have been cut by 25%. Los Angeles and Long Beach ports project a 15% to 17% drop in cargo volumes in Q1 2020. One in nine Southern California jobs is tied to the ports, including people who work on the docks, drive trucks, and move boxes in warehouses, according to the Executive Director of the Port of Los Angeles. The Port Authority of New York and New Jersey has requested $1.9 billion in federal aid to offset a forecasted 30% year-on-year drop in cargo volumes. In the immediate term, shipping and logistical constraints are slowing U.S. exports to Asia. U.S. exporters of meat, poultry, hay, oranges and other produce are reporting that refrigerated containers are in short supply and cold storage facilities are overflowing with inventory. U.S. and global manufacturingâincluding production that recently shifted out of China to other parts of Asia and to Mexicoâis still recovering from disruptions in Chinese supply. Vietnam, Taiwan, Malaysia, South Korea, Japan, Thailand, and Singapore all have strong supply chain links with China and reported Q1 supply shortages. Even as China's production resumes, these Asian countries are now grappling with their own COVID-19 outbreaks, further complicating recovery. The situation is exacerbated by spread of COVID-19 in other important manufacturing markets such as South Korea, Italy, Germany, and Mexico. Disruptions in Chinese supply chains were initially expected to have a limited macroeconomic effect on developed markets in the short term, but as the outbreak has spread globally and Chinese firms and logistics operations have struggled to return to full capacity, a wide range of U.S. imports from China, including raw materials, intermediate industrial inputs, and consumer products, are likely to be in short supply. U.S. firms with operations in China or that depend on production in China may be prompted to diversify away from China and begin establishing new supply chains. The head of the EU Chamber of Commerce in China said in late February that the disruption from COVID-19 had driven home the need for foreign companies to diversify away from China. Within this context, U.S. firms may find some opportunities to increase exports to China, so long as global port operations resume and current logjams are resolved. Increased U.S. exports could be driven in part by recent tariff liberalization. As part of the phase one trade deal that the United States and China signed in mid-January 2020 to resolve some issues the United States raised under Section 301, the United States and China agreed, effective February 14, 2020, to cut by 50% the tariffs they imposed in September 2019. China announced a tariff exemption process for 700 tariff lines, including some agriculture, medical supplies, raw materials, and industrial inputs. With China's recovery, the U.S. government could press China to make up for lost time on U.S. purchases. COVID-19 may make it difficult for both sides to meet these targets, however, given the economic fallout in both countries. As part of the phase one trade deal, China committed to purchase at least $200 billion above a 2017 baseline amount of U.S. agriculture ($32 billion), energy ($52.4 billion), manufacturing goods ($77.7 billion), and services ($37.9 billion) between January 1, 2020 and December 31, 2021. Regarding agriculture, in November 2019, China's National Development and Reform Commission (NDRC) announced detailed rules for the application and allocation of grain and cotton import tariff-rate quotas for 2020 that specify imports for wheat (9.636 million tons, 90% state-owned trade), corn (7.2 million tons, 60% state-owned trade), rice (5.32 million tons, 50% state trade), and cotton (894,000 tons, 33% state-owned trade). NDRC included in these rules a requirement that companies applying for tariff-rate quotas must have a \"positive record\" in China's corporate social credit system. This requirement allows the Chinese government to restrict or impose terms on certain U.S. cotton exporters. China could use this requirement to create counter pressure in response to recent U.S. congressional action to block U.S. imports of textiles and apparel that contain cotton from China's Xinjiang region due to concerns over forced labor there. With falling oil prices, China would arguably have to buy a significant larger volume of goods to reach its purchase obligations that are benchmarked by dollar value. The crisis is also calling into question China's ability to implement the U.S.-China phase one trade deal signed in January 2020. The agreement has a force majeure provisionâwhich allows parties to opt out of contractual obligations without legal penalty because of developments beyond their controlâthat could give China flexibility in implementing its commitments. The deal was finalized in December 2019 and signed in mid-January 2020, when Chinese officials reportedly knew about the severity of the COVID-19 outbreak in Wuhan, which raises questions about the rationale and timing of the decision to include the force majeure provision. A factor further complicating the potential for resumption and expansion of U.S. exports is Chinese companies' invocation of force majeure certifications. For example, China National Petroleum Company (CNPC) used the outbreak of COVID-19 to declare force majeure in cancelling some liquefied natural gas (LNG) imports, a move followed by a downturn in overall oil and gas demand. The Ministry of Commerce has since provided free certifications to Chinese companies that need to declare force majeure . Chinese companies and courts rely on an interpretation of force majeure that is different from the standard legal interpretation in the United States, which allows both parties to cancel contract terms and revert to a pre-contract baseline. In China, force majeure is used to cancel an obligation by the party invoking the provision while the other party may still be obligated to perform and honor contract terms. For example, if a payment is blocked or forgiven by the Chinese government, the other party may still be expected to perform according to the contract terms without the foreign party being reimbursed for any additional costs incurred. Moreover, Chinese courts are unlikely to allow foreign firms to prosecute Chinese firms that do not perform according to their contracts. In the midst of the pandemic, Congress is expressing a strong interest in responding to U.S. shortages of medical suppliesâincluding PPE and pharmaceuticalsâas the United States steps up efforts to contain and counter COVID-19 with limited domestic stockpiles and constraints on U.S. industrial capacity. Because of China's role as a major U.S. and global supplier of medical PPE, medical devices, antibiotics, and active pharmaceutical ingredients ( Appendix B ), reduced exports from China have led to shortages of critical medical supplies in the United States. While some analysts and industry groups have pointed to tariffs as a disincentive to U.S. imports of health and medical products, supply shortages due to the sharp spike in demand, as well as the nationalization and diversion of supply to China, appear to be stronger drivers. According to China Customs data, in 2019 China exported $9.8 billion in medical supplies and $7.4 billion in organic chemicalsâa figure that includes active pharmaceutical ingredients and antibioticsâto the United States. While there are no internationally-agreed guidelines and standards for classifying these products, U.S. imports of pharmaceuticals, medical equipment and products, and related supplies are estimated to have been approximately $20.7 billion (or 9.2% of U.S. imports), according to CRS calculations using official U.S. data ( Figure 2 and Table 1 ). In early February 2020, the Chinese government nationalized control of the production and dissemination of medical supplies in China. Concerned about shortages and its ability to contain the COVID-19, the Chinese government transferred authority over the production and distribution of medical supplies from the Ministry of Information Industry and Technology (MIIT) to the NDRC, China's powerful central economic planning ministry. NDRC commandeered medical manufacturing and logistics down to the factory level and has been directing the production and distribution of all medical-related production, including U.S. companies' production lines in China, for domestic use. In response to government directives, foreign firms with significant production capacity in China, including 3M, Foxconn, and General Motors, shifted significant elements of their operations to manufacturing medical PPE. By late February 2020, China had ramped up face mask productionâboth basic surgical masks and N95 masksâfrom a baseline of 20 million a day to over 100 million a day. China's nationalization efforts, while understandable as part of its efforts to address an internal health crisis, may have denied the United States and other countries that depend on open and free markets for their health care supply chains access to critical medical supplies ( Table 2 and Table 3 ). On February 3, 2020, China's Ministry of Commerce directed its bureaucracy, local governments and industry to secure critical technology medical supplies and medical-related raw material inputs from the global market, a situation that likely further exacerbated supply shortages in the United States and other markets. To ensure sufficient domestic supplies to counter COVID-19, China's Ministry of Commerce also called on its regional offices in China and overseas to work with PRC industry associations to prioritize securing supplies from global sources and importing these products. The Ministry of Commerce provided a list of 51 medical suppliers and distributors in 14 countries and regions to target in quickly assuring supply. The Ministry also prioritized food security and the need to increase meat imports. China's trade data shows that these policies led to steep increases in China's imports of essential PPE and medical supplies, including the raw materials needed to make products such as N95 masks. The policies also contributed to sharp decreases in China's exports of these critical medical products to the world. (See Table 2 .) On March 29, 2020, the Australian government imposed new temporary restrictions on all foreign investment proposals in Australia out of concern that strategic investorsâparticularly those of Chinese originâmight target distressed assets. This comes after authorities discovered two instances of Chinese property developers in Australia purchasing large volumes of medical supplies (and precious metals) for shipment to China. Rislandâa wholly-owned subsidiary of one of China's largest property developers, Country Garden Holdingsâreportedly shipped 82 tons of medical supplies from Australia to China on February 24, 2020. The shipment included 100,000 medical gowns and 900,000 pairs of gloves. Greenland Australiaâa subsidiary of another large Chinese property developer backed by the Chinese government, Greenland Groupâimplemented instructions from the Chinese government to secure bulk supplies of medical items from the global market. Greenland reportedly sourced from Australia and other countries, 3 million protective masks, 700,000 hazmat suits, and 500,000 pairs of gloves for export to China over several weeks in January and February 2020. As the United States ramps up efforts to contain the spread of COVID-19, reduced production and exports of pharmaceuticals and PPE from China are exacerbating shortages of critical medical supplies. Minnesota-based 3M, a large-scale manufacturer of N95 respirators, for example, told The New York Times that all masks manufactured at its Shanghai factory were sold to meet China's domestic demand; other mask manufacturers, such as Canada's Medicom, have stated that the Chinese government has not yet authorized them to export PPE. China's Ministry of Commerce has claimed it is not imposing export restrictions on medical supplies, but this statement may not apply to the current situation as all of China's domestic production is controlled by the government and geared toward domestic consumption. U.S. national and state-level health authorities have been reporting shortages of medical suppliesâincluding PPE such as gowns and face masksâsince February. On March 18, President Trump issued Executive Order 13909, Prioritizing and Allocating Health and Medical Resources to Respond to the Spread of COVIDâ19 , which announced the President's invocation of the Defense Production Act of 1950 (DPA) in response to the COVID-19 pandemic. The DPA confers broad presidential authorities to mobilize domestic industry in service of the national defense, defined in statute as various military activities and \"homeland security, stockpiling, space, and any directly related activity\" (50 U.S.C. Â§4552), including emergency preparedness activities under the Stafford Act, which has been used for public health emergencies. Among other authorities, Title I of the DPA allows the President to require persons (including businesses and corporations) to (1) prioritize and accept government contracts for materials and services, and (2) allocate or control the general distribution of materials, services, and facilities as necessary to promote the national defense. The Administration, however, is only publicly providing limited direction to the private sector under this authority. Any potential use of the DPA to respond to the COVID-19 pandemic may require some amount of time to produce adequate supplies, considering the large volumes of products, particularly PPE and ventilators, which are currently in urgent demand. Many U.S. firms are hesitant to invest in substantial increases in production, including obtaining the capital equipment and other inputs required, until they have a guaranteed buyer and price. Manufacturing firms, such as General Motors, Ford Motor Company, and Tesla are repurposing factory production for ventilators, but defense logistics experts expect this effort to take months. Additionally, in the United States, PPE and ventilators for use in the health care setting are considered medical devices and require marketing permission from the U.S. Food and Drug Administration (FDA). The Trump Administration's relatively late formal invocation and activation of the DPA, which could effectively serve as an export constraint on U.S.-produced medical supplies, arguably left discretion to U.S. companies to decide whether to fill export or domestic orders first. By contrast, governments in Taiwan, Thailand, France, and Germany boosted production but restricted exports, further curtailing U.S. supply options. In January and February 2020, organizers of U.S. private sector relief efforts reportedly purchased large amounts of U.S. PPE products for airlift to China, further depleting U.S. supplies. Some Members of Congress have called for broader tariff relief or at least new exclusions for existing tariffs and a moratorium on any new tariffs. Other Members and U.S. domestic producers argue that such liberalization could open the U.S. market to a flood of imports during an economic downturn. The Office of the United States Trade Representative (USTR) announced on March 6, 2020, that it would lift tariffs imposed under Section 301 authorities on 19 specific products and 8 10-digit subheadings of medical supply and equipment items from China ( Table 4 ). The Administration appears reluctant to liberalize non-health related tariffs, preferring to delay tariff payments instead. In late March 2020, the U.S. Customs and Border Protection sent notices to companies saying that officials will approve some delays in tariff payments to offer economic relief due to the severity of COVID-19; they may also be weighing a broader suspension of collecting duties. Separate from COVID-19, with regard to existing tariff exemptions, on March 20, USTR invited industry to submit public comments beginning on April 20, regarding whether USTR should extend certain tariff exclusions on other products already granted in June 2019 that expire in June 2020. A broader liberalization of U.S. tariffs on Chinese goods during the COVID-19 outbreak, could further expose the U.S. economy to Chinese excess industrial capacity at a point of economic downturn in the United States. Chinese firms also could capture market share and gain a unique foothold in the U.S. market through market softening and if the United States were to relax FDA and other product certifications. In an effort to quickly bring overseas medical supplies into the United States, the Federal Emergency Management Agency (FEMA), announced on March 29, 2020 that it was arranging airlift for 22 flights, most from Asia, over the subsequent two weeks. The airlift is for medical supplies that medical distributors already planned to import into the United States, but it accelerates their delivery arrival time by shipping by air instead of ocean freight. Separate from medical supplies specific to COVID-19, a longer-term disruption of China's pharmaceutical and medical exports could increase the cost of everyday drugs and routine medical procedures in the United States. This could happen as it becomes harder to import APIs for common drugs and components for medical devices. According to FDA officials, in 2018, China ranked second among countries that export drugs and biologics to the United States by import line (accounting for 13.4% of U.S. imports of those products). However, FDA states it is not able to determine the volume of APIs that China is manufacturing given the complexity of the supply chain and gaps in what pharmaceutical companies are required to disclose about their inputs. China is also a leading supplier of APIs in global supply chains for painkillers, diabetes medicines, and antibiotics, meaning a slowdown in API exports from China could increase cost pressures faced by U.S. drug manufacturers. For example, China accounts for 52% of U.S. imports of penicillin, 90% of tetracycline, and 93% of chloramphenicol. On February 27, FDA Commissioner Stephen Hahn announced that a manufacturer of an unspecified human drug informed FDA of a shortage the drug's supply related to a Chinese API manufacturer affected by COVID-19. Because information disclosed to FDA regarding drug shortages is considered proprietary, FDA did not disclose the name of the drug in question, but did note that alternatives exist for patient use. China's role as the primary supplier of APIs to global manufacturers of generic pharmaceuticals, particularly in India, is likely to increase overall costs of generic pharmaceuticals for consumers in the United States in the short-to-medium term. The outbreak of COVID-19 in India could also affect the availability of generic pharmaceuticals in the United States. India, which supplies approximately 40% of generic pharmaceuticals used in the United States, imports nearly 70% of its APIs from China. In March 2020, India imposed export restrictions on several drugs whose supply chains rely on China, leading to fears of potential global shortages of generic drugs that have since escalated after India announced a nationwide 21-day lockdown. Amid concerns about the availability of personal protective equipment (PPE), medical supplies, and pharmaceuticals, a growing number of nations have applied export controls and other restrictions on the overseas sales of these products. While export controls do not necessarily prohibit export activity, they make export licenses a requirement, which could lead to transactions being delayed and potentially denied or cancelled. As medical professionals around the world scramble to find gloves, face shields, protective garments, disinfectants, ventilators, and other equipment needed to fight COVID-19, these measures are highlighting the risksâand exacerbating the challengesâof relying on complex global supply chains and distribution channels. World Trade Organization (WTO) rules prohibit export bans except for rare instances in which a member invokes a measure citing national security concerns. In an effort to promote transparency, the WTO is publishing a list of temporary export bans that countries are enacting during COVID-19 and notifying to the WTO. On March 30, 2020, the G-20 issued a joint statement that emphasized the importance of keeping markets open and ensuring the adequate production and fair and equitable distribution of medical products to where they are most needed. The statement emphasized that any measures a country might adopt to protect health should be targeted, proportionate, transparent, and temporary. So far this year, China and more than 24 other economies, including India and, more recently, the European Union, have imposed either limits or formal or de facto bans on certain exports. Many of the existing and proposed measures could restrict access to markets on which the United States depends for certain imports. These include medical ventilators (for which Singapore and China accounted for 35% and 17%, respectively, of U.S. imports in 2019), breathing and gas masks (France, the United Kingdom, and Italy, 47% combined), CT scanners (Germany, 50%), medical protective equipment of textile materials (China, 72%), digital and infrared thermometers (China, 36%), pharmaceuticals (Ireland, Germany, Switzerland, and Italy, 53% combined), and tetracycline and penicillin (China, 90% and 52%, respectively). China's leaders are focusing on resuming manufacturing production to jumpstart economic growth. At an executive session of China's cabinet, the State Council, on March 17, Chinese officials emphasized the importance of stabilizing employment and announced that the government would streamline business approvals and fast-track approvals for large infrastructure projects. They also offered government support to alleviate shortages of labor, raw materials, funds, and protective gear. To facilitate economic activity, the Chinese government also appears to be liberalizing company health requirements and lifting intra-provincial and intra-city travel and transportation restrictions. NDRC spokesperson Meng Wei said on March 17, 2020 that transportation was operating normally. Zhejiang, Jiangsu, and Shanghai were operating at close to 100% of normal capacity; and over 90% of large-scale industrial companies outside of Hubei had resumed production. Company reports of opening and resumption of operations may not mean that these facilities are fully online or operating at pre-crisis levels, however. Several economic analysts and news outlets, including the Financial Times , have published alternative measures of business resumption rates using proxies for economic activityâsuch as data on traffic congestion, air pollution levels, and container freight movement. Overall, many of these measures suggest that businesses across China are not returning to full capacity at the rates being reported by local and provincial governments. In Wuhan, the center of the original outbreak, the Hubei provincial government issued a notice in Marchâthat applies to Wuhan as Hubei's capitalâallowing certain companies to resume work ahead of other production. This included companies in the medical and health industry, as well as companies producing protective gear, disinfectant, daily necessities, agriculture, and products critical to national and global supply chains. China's economy depends on exports and the foreign exchange it earns through exports as well as on the large productive role that foreign firms play in the domestic market and as exporters. Seeking to stabilize drops in foreign investment and trade, on March 12, Commerce Vice Minister Wang Shouwen held a call with 400 members of the American Chamber of Commerce in China, and on March 13, he held a similar webinar with the European Chamber of Commerce in China's Advisory Council. Vice Minister Wang pressed companies to reopen operations and increase investments in China. Other Chinese agencies represented included NDRC, MIIT, the National Health Commission, the General Administration of Drug Supervision, the State Administration for Market Regulation, the General Administration of Customers, the Civil Aviation Administration of China, the Ministry of Transportation, and the State Taxation Administration. During past crises, such as the global financial crisis of 2008-09, China has pressed firms to idle facilities and keep them production-ready (instead of shuttering them) and retain workers (instead of laying them off) to maintain social stability and facilitate efforts to quickly ramp up production and exports later. These stimulus efforts are sometimes less visible than fiscal policies in other countries. Several market watchers have noted that, while a 17% drop in Chinese exports in January-February 2020 is significant, it is not as dramatic when considering China's economy was shuttered for much of February. This indicates that Chinese industry may have had sufficient stock already at ports for export when the crisis hit. This also signals the potential power of a resumed export push from China. China's economic recovery is important to the United States and the global economy, as it is an important center of demand and supply. At the same time, during this period of global economic downturn, the United States and other countries are now potentially vulnerable to a concerted PRC export push and any effort it makes to take additional market share in strategic sectors. Chinese overcapacity in steel has been highly contentious for its global impacts, and China could potentially see exports as a quick way to reduce inventories and secure needed cash. Similar to what happened during the global financial crisis in 2008-09, China is poised to take additional global market share in 2020 because it did not dial back production during the COVID-19 outbreak. Chinese blast furnaces continued to run during the COVID-19 crisis, and China's steel production for January-February 2020 was up 3% over the same period in 2019. Meanwhile, due to collapsing domestic demand and logistics constraints, China's finished steel inventories rose by 45% in January-February 2020 over the same period in 2019. China's steel production at the end of 2019 was already at an all-time high of almost 1 billion tons, with China producing over 50% of global supply, according to the World Steel Association and China's State Statistical Bureau ( Figure 3 ). On March 17, 2020, China's Ministry of Finance announced it was increasing the export value added tax (VAT) rebate for almost 1,500 Chinese products, effective March 20, 2020. Most of the products (1,084) are receiving a 13% rebate; a small number (380) are receiving a 9% rebate. The export VAT rebate is a focused policy tool with quick effects that China typically employs to boost targeted exports during times of slowdown. It typically reduces the export VAT on products down to or close to zero. (See Table 5 .) The rebates reflect a strong policy push for steel exports, as well as construction and building materials (e.g., insulation, wood products, glass and fiberglass). China is also promoting the export of a range of insecticides and industrial and organic chemicals. The rebates encourage the export of agricultural products in categories for which China promised to increase purchases from the United Statesâsuch as live breeding animals, meat and dairyâsuggesting the government may be incentivizing exports for industries that might face additional U.S. imports. Absent in China's policy push are incentives to encourage the sale of pharmaceuticals, PPE, and other medical products overseas. The export VAT rebates also appear to be incentivizing China's export of wild animals and their byproducts overseas ( Table 5 ). With assessments that COVID-19 could have originated in wild animals and potentially passed to humans in open air markets that sell these animals, China's National People's Congress announced on February 24 a ban on the sale and consumption of wild animals in China. While the export incentive might help the government to eradicate domestic markets by providing an economic incentive to export, this move could spread the risk to global markets. Now apparently past its peak of the COVID-19 outbreak, China is prepared to capitalize on the investments it made during the past few months to push ahead on goals outlined in its Made in China 2025 (MIC 2025) industrial plan, which includes several strategic health sectors ( Figure 4 ). Introduced by China's State Council in May 2015, MIC 2025 is an ambitious state-led program that seeks to create competitive advantages for China in certain strategic industries. The plan aims to move China up the manufacturing value chain, expand its global market competitiveness, and reduce its reliance on foreign firms and their intellectual property (IP) over time. (See Figure 4 ). The program has been a major focus of the Trump Administration's Section 301 actions against China because of the distorting and predatory policies the initiative has set in motion related to technology transfer, intellectual property, and innovation. Biotechnology, pharmaceuticals, and medical devices are key components of MIC 2025 industrial plans that support Chinese firms in efforts to increase their global market share of generic drugs and medical equipment, and develop new innovative drugs. Toward this end, the Chinese government restricts market access for foreign pharmaceutical firms. It requires foreign firms to conduct clinical trials in China, disclose proprietary information for drug trials and sales, and enter into partnerships to secure a spot on reimbursable drug lists. Moreover, medical equipment subsidies require that 60% of a product's components be produced in China by a PRC firm. These policies continue despite amendments to the Drug Administration Act in 2019 which were designed to make it easier for foreign pharmaceutical companies to operate in China. China may have been serving its commercial ambitions in decisions it made during the COVID-19 outbreak in China: China has restricted access to medical information about COVID-19, including access for the U.S. Centers for Disease Control and Prevention (CDC), potentially putting U.S. science, research and development (R&D), and industry at a disadvantage. While some of these controls may be politically motivated, they also may be driven by China's market ambitions. The government's tight controls over biotechnology and pharmaceutical testing, treatment, and analysis in China could advantage its state firms. China ordered that all viral samples from the beginning of the COVID-19 outbreak be destroyed or sent to the Wuhan Institute of Virology, a national lab run by China's military. This move centralizes the government's knowledge about the potential origins of the virus and provides unique insights about its trajectory and treatment. The Wuhan Institute of Virology operates China's only biocontainment level 4 (P4) lab, a specialized facility for studies on highly contagious and fatal diseases. The Lab was developed by the Merieux Foundation under a government agreement between France and China. In another effort by the Chinese government to control access to important health information, the World Health Organization (WHO)'s visit to China came over a month after the outbreak of the virus. Only a subset of the WHO-China Joint Mission on COVID-19 delegation was allowed to visit Wuhan. China appears to have been slow to approve foreign drug patents potentially relevant to COVID-19 until it needed them at the height of the crisis. For example, Gilead Sciencesâa U.S. company based in Californiaâhad several patents for its antiviral drug Remdesivir's use in coronaviruses that have been pending approval since 2016. The Chinese government has been requiring the company to conduct clinical trials in China and did not approve these patents until well into the crisis. The Chinese government may have benefitted from long-standing foreign patent application information that becomes public over time once a patent application is filed in China, even if the approval is still pending. The Chinese government also likely benefits from the insights gained through the clinical trials conducted in China and the viral samples that foreign companies share. Gilead, as well as other U.S. companies, sent the Chinese government samples of its drugs during the COVID-19 outbreak. The Chinese government cracked down on BrightGene BioMedical Technology Co.âa PRC firm based in Suzhou, Chinaâfor the company's premature announcement that it could compound a generic version of Remdesivir. The government's move may be less of an effort to protect foreign firms than to position China's national labs. The Wuhan Institute of Virology, for example, has applied to patent an adaptation of Remdesivir. This could potentially complicate Gilead's and other U.S. firms' way forward in China. China offered significant funding to Chinese biotech, pharmaceutical, and health logistics companies to expand capacity and capabilities to combat COVID-19. For example, Jointownâa top Chinese medical supplierâissued preferential bonds in February 2020, and the State Council's CITIC purchased private placement shares in the company. PRC official media is featuring stories about how the Chinese leadership is using its current control of medical production and supply chains to selectively help other countries, while promoting ties to China. State media is also highlighting China's interest in advancing its global medical leadership role. China's global health leadership was a key element of people-to-people exchanges envisioned in China's initial rollout of its \"One Belt One Road\" initiative in 2015. During a call to Italian Prime Minister Conte on March 17, 2020, Chinese Communist Party Chairman Xi Jinping referenced a new Chinese government initiativeâa Health Silk Roadâthat appears designed to promote Chinese leadership and products in the health sector. Such efforts also aim to deflect criticism of China's alleged corralling and destruction of the initial virus samples and efforts to prevent sharing of information among medical practitioners and the global community. Some experts have highlighted how this suppression of health information violates the obligations of WHO members to immediately share information about outbreaks for the safety of the world. The Chinese government reportedly undertook extraordinary measures during the COVID-19 outbreak to sustain R&D and manufacturing for priority national projects and in strategic sectorsâsuch as telecommunications, microelectronics, and semiconductorsâincluding in Wuhan, the epicenter of China's outbreak. These efforts have potential ramifications for U.S. and foreign firms' relative competitive market position as companies compete in 5G and other emerging sectors. This is particularly the case if their China operations were closed or are now significantly curtailed in the United States and other markets. According to the Nikk ei Asia Review , in February and March 2020, the Chinese government operated special transportation and quarantined dormitories at Yangtze Memory Technology, Co., Ltd. (YMTC), China's national champion to develop memory chips. YMTC is located in eastern Wuhan. The government saw continued operations as an issue of national security and issued special local and central government dispensation to keep the facility operational amidst the outbreak. Separate reports indicate that HiSiliconâthe semiconductor subsidiary of China's leading telecommunications equipment company Huaweiâalso sustained operations during the outbreak. Huawei's chairman and chief executive told T he Wall Street Journal on March 25, 2020 that the company plans to boost its research and development budget in 2020 by $5.8 billion to more than $20 billion. Congress faces choices in the near-term that will affect not only the immediate situation, but also the longer-range U.S. trade and economic trajectory vis-a-vis China, with a potentially significant impact on the global economy as well. The outbreak of COVID-19 has prompted a sharp collapse of transportation, services, and manufacturing productionâincluding supply shortages of essential medical and health care products needed to contain COVID-19. The COVID-19 pandemic has also precipitated a sharp downturn in consumer demand, first in China and now globally. Questions already brewing since the imposition of U.S. Section 301 tariffs are intensifying congressional concerns and debates about potential short-term and long-term steps to address U.S. supply chain dependence on China for critical products, and the potential ramifications of these dependencies. These ramifications could be particularly marked in times of crisis or of PRC nationalization of industry. At the same time, some U.S. companies and Members of Congress are calling for lowering tariffs on goods from China. The urgent need for pharmaceutical and medical supplies is fueling systemic market pressures to increase U.S. reliance on China trade because China is an important source of many of these critical inputs and products. Whether and on what terms the Chinese government might be willing to export medical supplies to the United States remains uncertain. The current shortages of critical medical supplies in the United States has exposed current U.S. health care dependencies on China. As China positions its industries to realize its MIC 2025 goals in biotechnology, pharmaceuticals, and medical equipment, the Chinese government is pursuing industrial polices to advance into higher positions in the global industrial value chain, raising longer-range questions about what this might portend for U.S. reliance on China as an increasingly competitive supplier. As China's manufacturing capacity comes back online while the United States and other major global markets continue to grapple with COVID-19, the Chinese government appears to be selectively releasing some medical supplies for overseas delivery. China appears to be selecting designated countries, at least to some extent (although the precise degree cannot be determined), according to political calculations and has been playing up its role in Chinese state propaganda, as evidenced with China's deliveries to Italy and Serbia. Most foreign governments appear to be paying for these supplies although a small subset of packages may be aid. There are also reports by other countries that some of China's medical supplies and testing kits are faulty. In a sign that China might be using the crisis to push substandard products or gain market share in developed markets over traditional U.S. suppliers based in China that produce for export, PRC state propaganda has blamed shortages on alleged FDA failures to certify Chinese products for import. This raises the question of why products made by U.S. firms in China that are already FDA certified are not first in line for export to the United States given that these firms also expanded capacity during the crisis in China. Several prominent U.S. companies, including 3M, have indicated they do not have PRC government authorization to export. In this environment, Congress faces choices about how best to incentivize production of health supplies in the United States, potentially in collaboration with other countries, to counter COVID-19 and future pandemics, and/or whether to impose any conditions on this production. With an eye to China's industrial policies, Congress may also consider the potential longer-term advantages and disadvantages of diversifying U.S. supply and on-shoring of certain capabilities. Congress may also want to consider potential collaboration with like-minded countries, and ways to counter the effects on lesser-developed economies that could be hit particularly hard by COVID-19. China is likely to seek to retain the medical market share and edge it gains through COVID-19, particularly as these gains help advance China's MIC 2025 industrial policy goals in biotechnology, pharmaceuticals, and medical equipment. At the same time, the United States and other countries may seek to diversify away from China because of vulnerabilities highlighted during the outbreak. Recent legislative action related to these issues includes: P.L. 116-136 , The Coronavirus Aid, Relief, and Economic Security (CARES) Act includes several provisions that expand drug shortage reporting requirements to include APIs and medical devices. The bill also requires certain drug manufacturers to draw up risk management plans and requires the FDA to maintain a public list of medical devices that are determined to be in shortage. Additionally, the bill directs the National Academies of Science, Engineering, and Medicine to conduct a study of pharmaceutical supply chain security. The CARES Act also waives certain congressional oversight and reporting requirements under the Defense Production Act of 1950's (DPA; 50 U.S.C. Â§Â§4501 et seq.) Title III Expansion of Productive Capacity and Supply, which governs purchases and loans made by the federal government to expand productive capacity in promotion of national defense, broadly defined. S. 3538 would require companies to report on the sources of their APIs and would tighten laws encouraging the U.S. Department of Veteran Affairs to buy American pharmaceuticals. The bill calls for federal financing guarantees to U.S. medical supply companies with production in the United States and would increase the tax deduction temporarily for businesses investing in medical equipment and facilities related to COVID-19. S. 3343 , The Medical Supply Chain Security Act, calls for enhanced security of the medical supply chain and enhanced FDA authority to request information about the sources of drugs and medical devices. It would require medical device manufacturers to report expected shortages to the FDA. A companion bill, H.R. 6049 , was introduced in the House of Representatives on March 2, 2020. S. 3537 would require the FDA to establish a registry to track APIs and institute a country-of-origin label for imported drugs. The bill would provide economic incentives for producing pharmaceuticals and medical equipment in the United States. The bill also would prohibit federal agencies and health facilities from purchasing APIs and other pharmaceutical products manufactured in China without an FDA waiver certifying that China is the sole source. H.R. 5982 , The Safe Medicine Act, would direct HHS to assess vulnerabilities in the U.S. pharmaceutical supply chain by issuing a report that examines U.S. dependence on China for critical APIs and gaps in domestic pharmaceutical manufacturing capabilities. H.R. 6386 , The No Chinese Handouts In National Assistance (CHINA) Act, would prohibit any funds made available in Appropriations acts for FY2020 from being used to compensate any individual or business controlled by the Chinese government. The Act adopts the definition of government control established in Section 721(a) of the Defense Production Act of 1950 (U.S.C. 4565(a)). H.R. 4710 , The Pharmaceutical Independence Long-Term Readiness Act, would direct the Department of Defense to include a section in each national defense strategy that outlines steps to address gaps in the U.S. pharmaceutical manufacturing base and strengthen pharmaceutical supply chains with single points of failure. S. 3432 , The Securing America's Medicine Cabinet Act of 2020, would take steps to strengthen U.S. competitiveness in advanced pharmaceutical manufacturing by enhancing the advanced manufacturing programs of the FDA. It also would designate certain research universities as \"National Centers of Excellence in Advanced Pharmaceutical Manufacturing.\" Several Members of Congress have introduced bills to amend certain provisions under the Defense Production Act of 1950 (DPA; 50 U.S.C. Â§Â§4501 et seq.). Some Members have also introduced several resolutions in the House and Senate that call on the President to use DPA authorities to facilitate the production of medical supplies. Bills and resolutions related to DPA are compiled and summarized in Appendix B . In addition to recent legislation introduced by Members of Congress, the Trump Administration reportedly drafted an Executive Order in mid-March 2020 that seeks to increase U.S. production capacity while eliminating loopholes that have allowed the U.S. government to buy pharmaceuticals, PPE, and ventilators from overseas. COVID-19 provides a direct learning experienceâpotentially more compelling than any war game or natural disaster simulationâabout the direct effects and costs of a serious disruption or cutoff of critical supplies from China to the United States. Key broader questions facing the United States that have serious implications for future economic and trade relations include: What are the consequences for U.S. interests when China nationalizes production and distribution and hardens its borders as it did during the COVID-19 crisis? What happens if Chinese government planners corner global supply alternatives? What happens if the United States hardens its own borders? What happens if U.S. allies and partners are in crisis and turn to national tools and approaches? What supply lines are available to the United States? What is current baseline U.S. production capacity and what is U.S. production capacity in the event an Administration invokes the Defense Production Act (DPA)? What control do chief executive officers of U.S. companies or the U.S. government have over U.S. corporate facilities and operations that are nationalized in China? What are U.S. dependencies on China in other critical areas such as microelectronics? Congress faces a series of interrelated questions about whether and how to calibrate trade policy to best position the United States in the current crisis and beyond. In response to a U.S. investigation of China's unfair trading practices under Section 301, since 2018, the United States has imposed a series of tariffs and China has responded with a series of counter tariffs that now affect a majority of trade between the two countries. Temporary tariff relief for medical supplies and pharmaceuticals could incentivize imports for the United States and other markets, but tariff policy cannot address the deeper issues of supply shortages, export constraints imposed by a number of countries including China, and product certification requirements in the United States and other markets. Tariff liberalization has been insufficient to address industrial policies within borders such as regulatory standards, procurement terms, and local content requirements that China and others impose in a range of sectors including pharmaceuticals and medical equipment. Recent actions by countries around the world to impose export barriers highlight potential gaps and limits to the power of WTO rules prohibiting export bans during times of global crisis. These actions also raise questions about what new rules or protocols might be needed in the future. Liberalization of U.S. import requirements also created some of the challenges the United States is facing now, such as loosening requirements for U.S. pharmaceutical firms to report on shortages and how they classify imported content for finished products that qualify as U.S. products. New liberalization could reward Chinese industrial policies in medical equipment and pharmaceuticals that seek to win new ground for Chinese firms in overseas markets. The potential for China to overwhelm global markets as it leans on exports for economic recovery raise questions about whether additional policy measures might be needed. Rather than waiting until market injury has already occurred to seek damages, for example, Congress may want to be watching trade patterns for signs of import surges and oversee the Administration's potential use of safeguard measures. Similar to the Australian government's decision on March 29, 2020 to impose new temporary restrictions on all foreign investment proposals out of concern that strategic investorsâparticularly those of Chinese originâmight target distressed assets, Congress may want to carefully monitor or consider whether to impose requirements about potential predatory commercial activity in the United States. The outbreak of COVID-19 has exposed gaps in U.S. understanding of U.S. domestic competencies and dependencies on China and other sources of global supply. Vulnerabilities regarding raw materials, such as APIs, are not well recorded in trade and industry data. They are particularly complicated to track when materials are shipped from China and processed in a third market such as India. In similar fashion, the United States has relaxed definitions of what qualifies as a U.S. product with imported content, masking the extent to which domestically-produced products may still rely on inputs from overseas. Pharmaceutical company stockpiles are proprietary, and companies do not have to report on reserves. They are only required to report when they have a shortfall, which does not leave enough time, particularly in times of emergency, for national and contingency planning. Under the International Investment Survey Act of 1976 (22 U.S.C. Â§3101 et. seq.), the President has wide authority over the collection of corporate activity abroad for statistical and analytic purposes. The Act also confers on the President the authority to request mandatory surveys of companies under specific deadlines with the ability to invoke civil and criminal penalties for noncompliance. The President has the authority to study the adequacy of current information and recommend improvements, and the Act requires him to report to Congress. To address these issues, Congress could consider whether to request the President to invoke his authority over the U.S. government's collection of data on corporate activity abroad. These corporate surveys could obtain specific supply chain information about the status of PPE and medical supply production, distribution, and export policy situation facing U.S. companies overseas, including in China. The surveys also could cover other sectors of potential congressional concern. This information could inform legislation that Congress has already passed or is considering with regard to overseas supply chains, including sourcing from China. At a time when U.S. health care systems, states, and countries overseas are seeking to secure limited medical supplies, the U.S. federal government has a unique role to play in ensuring adequate domestic and global production, contracting of supply (both domestically and globally), and distribution of these resources. Even as new capacity might be available in China, for example, who are the U.S. actors positioned to try to secure this supply and through what pathways? Lack of coordination at the federal level has led states to scramble and compete against each other for critical medical supplies in the current crisis. Among the key questions related to these issues, Congress may explore answers to such questions as: How does the U.S. federal government position itself vis-a-vis U.S. state and private actors? How does the U.S. federal government position itself vis-a-vis other foreign governments trying to secure similar supplies? What is the U.S. government's posture toward supplies needed in the developing world? How might expanded production capacity created in the United States not only help the U.S. market but also those of other countries, in the near term and over the longer term? The current COVID-19 pandemic provides a unique opportunity to reaffirm U.S. global leadership on trade and health issues and to counter China's nationalization and likely politicization of its domestic medical supply production capacity. China's export restraints and cornering of the global supply of medical products ahead of others in February 2020 have created serious strains on the open trade system, further incentivizing other countries to close borders and restrict any access to supplies they may have. These moves also have given China market power over other countries' procurement decisions as governments around the world grapple with how best to secure critical supplies. Early signs show that China is closely controlling and releasing supplies to other governments through contracts and some aid in ways that seek to improve China's global image and may come with other quid pro quo terms that are not yet visible. China's economic recovery ahead of others could further challenge and undermine key tenets of the open trade system, particularly if China exports pent up domestic capacity with a disregard for what the current state of the global economy is prepared to absorb on market terms. While some European countries have imposed export restraints on their health supplies, some politicians in Europe are concerned about how the Chinese government is manipulating the crisis and China's position in global supply chains for political gain. Some analysts have expressed concern that China is trying to position itself as a responsible global leader in health, while violating the core tenets of WHO membership in failing to share critical information and access in the critical first few weeks as the crisis emerged in Wuhan. Members concerned about maintaining U.S. global economic leadership during the COVID-19 pandemic may consider using hearings, legislation, and statements to communicate key issues to be addressed. Possible questions for Congress in the context of COVID-19 include: whether to prioritize economic openness and free flows of information; whether to prioritize diversifying sources of medical supplies, and if so, how; how best to overcome current and future bottlenecks in health care supply chains in the United States and partner nations; whether to respond to China's attempts to control the global narrative about key COVID-19 events, and if so, how; and whether to look to reform global health and trade governance in light of COVID-19 developments, and if so, how. Some Members are calling for hearings to address the role of the WHO during the COVID-19 outbreak and are raising questions about the need to reform global health governance. Other Members are looking at the chronology of events in the COVID-19 outbreak to maintain an accurate record that is not distorted by Chinese state propaganda. Some Members are also looking at the social media platforms that the Chinese government is using to convey state propagandaâsuch as Twitterâand raising questions about whether this access should be allowed. Several Members have expressed an interest in potential measures to hold China accountable for its slowness to acknowledge, address, and share information regarding the outbreak of COVID-19 as H.R. 6373 required by WHO members. Appendix A. Bills and Resolutions Related to the Defense Production Act of 1950 (DPA) 1. P.L. 116-136 - Coronavirus Aid, Relief, and Economic Security (CARES) Act P.L. 116-136 , Section 4017 waives certain congressional oversight and reporting requirements under the Defense Production Act of 1950's (DPA; 50 U.S.C. Â§Â§4501 et seq.) Title III Expansion of Productive Capacity and Supply. Although the bulk of DPA authorities are made available at the President's discretion, Title III requires an Act of Congress for purchases or loans made to expand productive capacity in promotion of the national defense, broadly defined, for amounts greater than $50 million, and written notifications made to the relevant congressional committees of jurisdictionâthe Committee on Banking, Housing, and Urban Affairs of the Senate, and the Committee on Financial Services of the House of Representativesâat least 30 days in advance. Section 4017 waives these provisions for a period of two years upon enactment. Notably, Title III already included language allowing the President to waive these requirements in a national emergency or at the non-delegable determination of the President. 2. H.R. 6373 - To increase the amount available under theÂ Defense Production ActÂ of 1950 to respond to the coronavirus epidemic, and for other purposes. H.R. 6373 would increase the authorized funding amount for the Defense Production Act Fund (DPA Fund) to $3 billion for FY2020-2021 from the current level of $133 million annually in response to the COVID-19 emergency. The bill also would allow for enhanced public and congressional oversight regarding the use of those funds through mandatory quarterly reporting on the use of DPA funds to congressional committees of jurisdiction, and to be made available to the public. Incorporated as a provision of H.R. 6379 - Take Responsibility for Workers and Families Act (Section 119). 1. H.R. 6399 - To amend theÂ Defense Production ActÂ of 1950 to ensure the supply of certain medical articles essential to national defense, and for other purposes. H.R. 6399 would amend the DPA statute to fortify industry production of medical resources in response to the COVID-19 emergency. 1. S. 3568 - A bill to require the President to use authorities under theÂ Defense Production ActÂ of 1950 to require emergency production of medical equipment to address the COVID-19 outbreak. S. 3568 would seek to compel the President to exercise the Defense Production Act for the development of specific medical equipment, including: N95 respirators, medical ventilators, face shields, medical exam gloves, surgical gowns, and other medical equipment as needed to respond to the COVID-19 emergency. The bill would also compel the President to establish a price on those goods. This bill is the Senate companion bill to H.R. 6390 . 1. S.Res. 547 - A resolution encouraging the President to use authorities provided by theÂ Defense Production ActÂ of 1950 to scale up the national response to the coronavirus crisis. S.Res. 547 calls upon the President to exerciseÂ Defense Production ActÂ authorities to increase production of medical supplies, including personal protective equipment, to respond to the COVID-19 emergency. It supports the use of such authorities to: (1) distribute medical materials, including by directing suppliers to prioritize and accept contracts to restock the Strategic National Stockpile; and (2) establish voluntary agreements and provide financial incentives to manufacturers and suppliers of critical medical equipment. 1. S. 3570 - A bill to provide for the expedited procurement of equipment needed to combat COVID-19 under theÂ Defense Production ActÂ of 1950. 2. S. 3570 would trigger the breadth of authorities under the DPA to effect: a major purchase order for 300 million N95 masks; requires the National Response Coordination Center to conduct a national assessment on current medical supply needs and a follow up major purchase order to fulfill the needs identified in the assessment; waive restrictions on dollar limitations for orders executed under DPA and a 30 day waiting period for orders that exceed $50 million; and authorize increased funding for DPA accounts that are being considered for supplemental COVID-19 spending packages. 3. H.Res. 906 - Calling on the President to invoke theÂ Defense Production ActÂ to respond to COVID-19. H.Res. 906 calls on the President to: (1) use all relevant authorities of theÂ Defense Production ActÂ to direct the domestic production of supplies to address COVID-19; and (2) share specified information regarding the use of such authorities with Congress. The resolution alsoÂ states that Congress stands ready to make additional appropriations available for this effort. 1. H.R. 6398 - To provide for the expedited procurement of equipment needed to combat COVID-19 under theÂ Defense Production ActÂ of 1950. H.R. 6398 is the companion bill to S. 3570 , which would trigger the breadth of authorities under the DPA to effect: a major purchase order for 300 million N95 masks; requires the National Response Coordination Center to conduct a national assessment on current medical supply needs and a follow up major purchase order to fulfill the needs identified in the assessment; waive restrictions on dollar limitations for orders executed under DPA and a 30 day waiting period for orders that exceed $50 million; and authorize increased funding for DPA accounts that are being considered for supplemental COVID-19 spending packages. 1. H.R. 6390 - To require the President to use authorities under theÂ Defense Production ActÂ of 1950 to require emergency production of medical equipment to address the COVID-19 outbreak. H.R. 6390 would seek to compel the President to exercise the Defense Production Act for the development of specific medical equipment, including: N95 respirators, medical ventilators, face shields, medical exam gloves, surgical gowns, and other medical equipment as needed to respond to the COVID-19 emergency. The bill would also compel the President to establish a price on those goods. This bill is the House companion bill to S. 3568 . Appendix B. U.S. Imports of Select Medical Products", "summary": "The outbreak of Coronavirus Disease 2019 (COVID-19), first in China, and then globally, including in the United States, is drawing attention to the ways in which the U.S. economy depends on manufacturing and supply chains based in China. This report aims to assess current developments and identify immediate and longer range China trade issues for Congress. An area of particular concern to Congress is U.S. shortages in medical suppliesâincluding personal protective equipment (PPE) and pharmaceuticalsâas the United States steps up efforts to contain COVID-19 with limited domestic stockpiles and insufficient U.S. industrial capacity. Because of China's role as a global supplier of PPE, medical devices, antibiotics, and active pharmaceutical ingredients, reduced export from China have led to shortages of critical medical supplies in the United States. Exacerbating the situation, in early February 2020, the Chinese government nationalized control of the production and distribution of medical supplies in Chinaâdirecting all production for domestic useâand directed the bureaucracy and Chinese industry to secure supplies from the global market. Now apparently past the peak of its COVID-19 outbreak, the Chinese government may selectively release some medical supplies for overseas delivery, with designated countries selected, according to political calculations. Congress has enacted legislation to better understand and address U.S. medical supply chain dependencies, including P.L. 116-136 , The Coronavirus Aid, Relief, and Economic Security (CARES) Act, that includes several provisions to expand drug shortage reporting requirements; require certain drug manufacturers to draw up risk management plans; require the U.S. Food and Drug Administration (FDA) to maintain a public list of medical devices that are determined to be in shortage; and direct the National Academies of Science, Engineering, and Medicine to conduct a study of pharmaceutical supply chain security. Other potential considerations for Congress include whether and how to incentivize additional production of health supplies, diversify production, address other supply chain dependencies (e.g., microelectronics), fill information and data gaps, and promote U.S. leadership on global health and trade issues. The crisis that has emerged for the U.S. economy is defined, in large part, by a collapse of critical supply, as well as a sharp downturn in demand, first in China and now in the United States and globally. As China's manufacturing sector recovers, while the United States and other major global markets are grappling with COVID-19, some fear China could overwhelm overseas markets, as it ramps up export-led growth to compensate for the sharp downturn of exports in the first quarter of 2020, secure hard currency, and boost economic growth. China may also seek to make gains in strategic sectorsâsuch as telecommunications, microelectronics, and semiconductorsâin which the government undertook extraordinary measures to sustain research and development and manufacturing during the COVID-19 outbreak in China.", "document_type": "crs"}
{"report": "L and management is a principal mission for four federal agencies: the Bureau of Land Management (BLM), the Fish and Wildlife Service (FWS), and the National Park Service (NPS), all in the Department of the Interior (DOI), and the Forest Service (FS) in the Department of Agriculture (USDA). Together, these agencies administer approximately 610 million acres, about 95% of all federal lands. In addition, the agencies have various programs that provide financial and technical assistance to state or local governments, other federal agencies, and/or private landowners. Each year, the four agencies receive billions of dollars in appropriations for managing federal lands and resources and related purposes (e.g., state and local grant programs). Together, the four agencies had total appropriations of $16.36 billion in FY2018. Most of the FY2018 fundsâ$13.19 billion (81%)âcame from discretionary appropriations enacted by Congress through appropriations laws. However, each of the agencies also has mandatory appropriations provided under various authorizing statutes enacted by Congress. Laws authorizing mandatory appropriations allow the agencies to spend money without further action by Congress. In FY2018, the four agencies together had $3.17 billion in mandatory appropriations, which was 19% of the total appropriations for the year. Each of the four agencies had a dozen or more mandatory accounts in FY2018. Many of them were relatively small, with funding of less than $5.0 million each, for instance. However, several mandatory accounts each exceeded $100.0 million. This report focuses on the mandatory appropriations for the four major federal land management agencies. It first discusses issues for Congress in considering whether to establish mandatory appropriations for programs or activities. Next, it briefly compares the FY2018 mandatory appropriations of the four agencies. The report then provides detail on the FY2018 mandatory accounts of each of the four federal agencies, as well as additional context on these appropriations over a five-year period (FY2014-FY2018). The Constitution (Article I, Â§9) prohibits withdrawing funds from the Treasury unless the funds are appropriated by law. A number of issues arise for Congress in deciding the type of appropriations to provide and the terms and conditions of appropriations. One consideration is whether mandatory (rather than discretionary) appropriations best suit the purposes of the program or activity and Congress's role in authorizing, appropriating, and conducting oversight. Another question is how to fund any mandatory appropriationsânamely, whether through general government collections (in the General Fund of the Treasury) or through a specific collection (e.g., from a particular activity or tax). A third issue is how to use the funds in a mandatory account, such as for agency activities, revenue sharing with state and local governments, or grant programs. Congress may consider various factors in deciding whether to provide discretionary or mandatory appropriations for a program or activity. A key consideration is whether authorizing or appropriating laws will control funding. Discretionary spending Â programs generally are established through authorization laws, which might authorize specific levels of funding for one or more fiscal years. However, the annual appropriations process determines the extent to which those programs actually will be funded, if at all.Â  Mandatory spending Â is controlled by authorization laws. For this type of spending, the program usually is created and funded in the same law,Â and the law typically includes language specifying that the program's funding shall be made available \"without further appropriation.\" Many of the mandatory appropriations covered in this report are provided under laws within the purview of the House Committee on Natural Resources and the Senate Committee on Energy and Natural Resources. In contrast, discretionary appropriations are provided through appropriations laws within the purview of the House and Senate Committees on Appropriations. The frequency with which Congress prefers to review program funding can be a factor in deciding whether to establish mandatory or discretionary appropriations. Authorizing laws (providing mandatory appropriations) generally are permanent and are reviewed not on a particular schedule but rather on an as-needed basis, as determined by the authorizing committees. On the one hand, this can foster stability in mandatory funding, in that the funding mechanisms may not be revised frequently. On the other hand, mandatory appropriations may fluctuate if they depend on revenue sources that might vary from year to year, such as on economic conditions. In contrast, Congress generally provides discretionary appropriations on an annual basis. This allows for program funding to be adjusted from year to year in response to changing conditions and priorities, and it provides Congress with opportunities for regular program oversight. However, this approach may provide less certainty of funding from year to year, as each program essentially competes with other congressional priorities within overall budget constraints. Congress has chosen to fund some programs or activities with both mandatory and discretionary appropriations. In these cases, both the authorizing laws and the appropriations laws govern a portion of program funding. This approach may allow annual review and decisionmaking on discretionary appropriations to supplement mandatory funding; it also may allow flexibility in providing each type of funding for a different purpose. However, this dual approach may be less efficient or reliable than one type of funding. Congress determines the funding source(s) that support mandatory appropriations. Although many factors may influence the selection of a funding source, a primary consideration is whether the monies should come from government collections in the General Fund of the Treasury or a specific collection, which often is deposited in a special account. The General Fund is the default for government collections unless otherwise specified in law, and it contains monies under a variety of authorities. Many if not all Americans might contribute to the General Fund, for example through income or other taxes. This source might be favored for some mandatory appropriations because it allows central funds to support federal lands managed on behalf of the general public. In practice, few of the FY2018 mandatory accounts for the four land management agencies received funding from the General Fund. One account that received monies from the General Fund is BLM and FS payments under the Secure Rural Schools and Community Self-Determination Act of 2000 (SRS). SRS authorized an optional, alternative revenue-sharing payment program for FS generally and for BLM for certain counties in Oregon. The payment amount is determined by a formula based in part on historical revenue payments. Funding for the payment derives from agency receipts and transfers from the General Fund of the Treasury. Alternatively, Congress may choose to fund mandatory accounts for the four land management agencies from specific collections. In FY2018, specific collections derived from agency receipts, taxes, license fees, tariff and import duties, and donations, among other sources. This approach might be preferred because the revenues derive from activities related to land management and use, especially if the collections are used to invest in the lands and communities from which they are derived. In FY2018, nearly all mandatory appropriations for the four federal land management agencies were funded by specific collections. Many of these appropriations derived from agency receipts under laws that provide for the collection and retention of money from the sale, lease, rental, or other use of the lands and resources under the agencies' jurisdiction. Agency land uses contributing to receipts included timber harvesting, recreation, and livestock grazing. Under some laws, agencies retain 100% of their receipts (e.g., each agency's Operation and Maintenance of Quarters account). Other laws direct an agency to retain a portion of receipts; for instance, BLM's Southern Nevada Public Land Sales account contains 85% of receipts from certain BLM land sales and exchanges in Nevada. Still other laws allow an agency to decide the amount of receipts to be deposited in a special account. The FS Knutson-Vandenberg Trust Fund, for example, contains revenue generated from timber sales, with the amount of deposits determined by FS on a case-by-case basis. Federal excise taxes and fuel taxes funded (at least in part) other FY2018 mandatory appropriations. For example, excise taxes, charged on specific items or groups of items, funded two major FWS programsâFederal Aid in Wildlife Restoration (sometimes referred to as Pittman-Robertson) and Federal Aid in Sport Fish Restoration (sometimes referred to as Dingell-Johnson). Under both programs, the taxes are paid primarily by the people who might benefit from the subsequent expenditures. For the Wildlife Restoration program, taxed items include certain guns, ammunition, and bows and arrows, with the funds primarily used for wildlife restoration programs. Under the Sport Fish Restoration program, the taxed items include sport fishing equipment; this program also receives taxes on motor boat and small engine fuels. The appropriations are used for sport fish restoration programs. Under licensing fee programs, land users might pay for a particular activity, with the receipts intended to benefit these users or support a related agency program. In FY2018, licensing fees were used for a major FWS programâthe Migratory Bird Conservation Account. Under this program, hunters purchase \"Duck Stamps\" in order to hunt waterfowl and collectors purchase the stamps for collection and conservation purposes. FWS primarily uses the funds derived from these purchases to acquire lands and easements and to protect waterfowl habitat, with the lands and easements added to the National Wildlife Refuge System. Licensing fees also were used in FY2018 to support two relatively small FS programsâSmokey Bear and Woodsy Owlâwith the proceeds shared between the licensing contractor and FS (for wildfire prevention and environmental conservation initiatives, respectively). Tariffs and import duties funded some FY2018 mandatory accounts. For instance, FS's Reforestation Trust Fund receives tariffs collected on imported wood products, up to $30.0 million annually. In addition, import duties on fishing boats and tackle support FWS's Sport Fish Restoration account, and import duties on certain arms and ammunition support FWS's Migratory Bird Conservation account. The federal land management agencies have authority to accept donations from individuals and organizations for agency projects and activities. All but FS have mandatory authority for some or all donations. For instance, in FY2018, FWS and NPS each had a primary mandatory account comprised of the donations. BLM had two relatively small mandatory accounts containing donations for particular purposes (i.e., rangeland improvements and cadastral surveys.) Laws that establish mandatory accounts typically specify how the monies will be used. A general question for Congress is whether the receipts should be retained for use by the collecting agency or shared with state or local governments or other entities or individuals. For accounts retained for agency use, there are additional considerations. These considerations include whether the monies should be available for a broad array of agency activities or restricted to more narrow purposes, such as Administration priorities, purposes related to the activities that generated the receipts, or activities exclusively at the sites that generated the revenues. For shared accounts, additional considerations include how to divide the funds (e.g., among states) and whether and how to provide revenue-sharing payments or establish grant programs. Some of the FY2018 mandatory accounts of the four federal land management agencies were authorized to be used by the agencies. Supporters have viewed this approach as fostering reinvestment in lands from which revenues were derived, which can support continued land uses. Critics contend that agency discretion over use of receipts could incentivize revenue-generating uses over other priorities, such as habitat conversation. Some of the mandatory FY2018 accounts were available to be used for broad purposes. For example, the four agencies' Recreation Fee accounts can be used for maintenance and facility enhancement, visitor services, law enforcement, and habitat restoration, among other purposes. Similarly, the NPS account for Concession Franchise Fees is authorized for visitor services and high-priority resource management programs and operations. Under both of these fee programs, most of the fees are retained at the collecting site. Other FY2018 mandatory accounts funded specific agency activities related to the derivation of the receipts. For example, receipts of salvage timber sales fund the FS Timber Salvage Sale Fund; the appropriations can be used to prepare, sell, and administer other salvage sales. As another example, the NPS Transportation Systems Fund is derived from fees for public transportation services within the National Park System. It is used for costs of transportation services in the collecting park units. Some mandatory spending authorities require revenue sharing with state or local governments, essentially as compensation for the tax-exempt status of federal lands. The accounts commonly provide for compensation based on a specified share of agency receipts. Issues of debate have centered on the level of and basis for compensation and the extent to which consistent and comprehensive compensation should be made across federal lands. In FY2018, some of the compensation programs encompassed a broad land base (e.g., all national forests), whereas others had a much narrower base (e.g., the national forests in three counties in northern Minnesota). In addition, some programs specified the allowed uses of the funds, and others were not restricted. FS payments to states, for example, can be used only on roads and schools, whereas BLM sharing of grazing receipts can be used generally for the benefit of the counties in which the lands are located . For some lands or resources, there is no compensation. Where there is compensation, the proportion granted to state and local governments has varied widely, even among programs of one agency. For BLM, for instance, the proportion of revenues from land sales that is shared with states is generally 4% (of gross proceeds) but is 15% for Nevada for certain land sales in the state. In addition, the state share of grazing fee receipts is 12.5% within grazing districts but 50% outside of grazing districts. Some (but not all) compensation programs reduce payments under the Payments in Lieu of Taxes Program. Still other mandatory accounts provide funding for states (and other entities) through formula or competitive grants. They typically provide federal money to accomplish some shared goal or purpose. The area of the state and the size of the population are common parameters used in calculating payments for formula grants. Further, payments typically are made for less than 100% of project costs. For instance, in two FWS grant programs with formula allocations (Wildlife Restoration and Sport Fish Restoration), states and territories may receive a maximum of 75% of costs of projects related, respectively, to wildlife restoration and sport fish habitat (among other purposes). Some observers have viewed the combination of a formula fixed in law and mandatory spending as giving states substantial predictability of federal funding. Other mandatory accounts are allocated for grants through competition among projects. For example, under the Migratory Bird Conservation account, waterfowl habitat acquisitions must be approved by a federally appointed panel based on nominations of the Secretary of the Interior, among other requirements. This section provides information on the mandatory appropriations for each of the four federal land management agencies. It first presents a brief comparison of the number and dollar amounts of mandatory accounts for the four agencies collectively. It then provides detail on each agency's FY2018 mandatory appropriations. For each agency, the discussion separately describes each account with at least $5.0 million in mandatory appropriations in FY2018, including the enabling legislation and the source and use of the funds. It then collectively summarizes each agency's accounts with less than $5.0 million in FY2018 mandatory appropriations. For each agency, the section provides a table showing the amount of mandatory appropriations for each account and a figure comparing the accounts. Collectively, in FY2018, the four agencies received $3.17 billion in mandatory appropriations, which was 19% of their total mandatory and discretionary appropriations of $16.36 billion. Discretionary appropriations of $13.19 billion accounted for the remaining 81% of total appropriations for the four agencies. The total dollar amount of mandatory appropriations varied widely among the agencies, from $300.4 million for BLM to $1.46 billion for FWS, as did the percentage of each agency's total appropriation that was mandatory (from 10% for FS to 45% for FWS). Figure 2 shows total appropriations for each agency and the portions that were discretionary and mandatory. Specifically, in FY2018, mandatory appropriations were as follows, in order of increasing amounts: $300.4 million for BLM, which was 18% of total agency discretionary and mandatory appropriations ($1.65 billion); $704.9 million for NPS, which was 17% of total agency discretionary and mandatory appropriations ($4.16 billion); $705.1 million for FS, which was 10% of total agency discretionary and mandatory appropriations ($7.29 billion); and $1.46 billion for FWS, which was 45% of total agency discretionary and mandatory appropriations ($3.27 billion). In FY2018, the four agencies operated with a total of 68 mandatory accounts. FWS had the fewest accounts (12), followed by NPS (16), BLM (18), and FS (22). Moreover, the amount of mandatory appropriations ranged widely among accounts, from less than $0.1 million (for several accounts) to $829.1 million (for FWS's Federal Aid in Wildlife Restoration). In general, most of the accounts were relatively small. Specifically, of the 68 accounts, 33 (49%) each had mandatory appropriations of less than $5.0 million, 24 (35%) each had mandatory appropriations of between $5.0 million and $50.0 million, 3 (4%) each had mandatory appropriations of between $50.0 million and $100.0 million, and 8 (12%) each had mandatory appropriations exceeding $100.0 million. BLM currently administers 246 million acres, heavily concentrated in Alaska and other western states. BLM lands, officially designated as the National System of Public Lands, include grasslands, forests, high mountains, arctic tundra, and deserts. BLM had 18 accounts with mandatory spending authority in FY2018. Seven of these accounts had appropriations each exceeding $5.0 million, with the largest account containing $157.8 million. The accounts typically are funded from agency receipts of various sorts. Although several are compensation programs that provide for revenue sharing with state or local governments, most accounts fund BLM activities. Table 1 and Figure 3 show the BLM mandatory appropriations for FY2018. FY2018 mandatory appropriations for BLM for all 18 accounts were $300.4 million. This amount was 18% of total BLM mandatory and discretionary appropriations of $1.65 billion in FY2018. Discretionary appropriations of $1.35 billion accounted for the remaining 82% of total BLM appropriations. Several laws authorize the sale of some public lands in Nevada. The most extensive authority is the Southern Nevada Public Land Management Act (SNPLMA). Under this authority, BLM is authorized to sell or exchange land in Clark County, NV, with a goal of allowing for community expansion and economic development in the Las Vegas area. Of total receipts, 85% are deposited in a special account, which may be used for activities in Nevada, such as federal acquisition of environmentally sensitive lands; capital improvements; and development of parks, trails, and natural areas in Clark County. (The other 15% of receipts are allocated to the state of Nevada, as discussed in \" Payments to Nevada from Receipts on Land Sales ,\" below.) The FY2018 mandatory appropriation for this account was $157.8 million. Appropriations vary depending on the amount and value of lands sold. Over the five years from FY2014 to FY2018, the annual mandatory appropriation increased from $51.6 million in FY2014, although FY2018 was the only year in which the appropriation exceeded $100.0 million. The Oil and Gas Permit Processing Improvement Fund was established by the Energy Policy Act of 2005. The fund supports BLM's oil and gas management program and includes 50% of rents from onshore mineral leases as well as revenue from fees charged by BLM for applications for permits to drill (APDs). BLM uses the receipts from both sources for the coordination and processing of oil and gas use authorizations on onshore federal and Indian trust mineral estate land. The receipts generally are targeted for use in particular areas; receipts from onshore mineral leases are used by BLM \"project offices,\" and not less than 75% of the revenue from APD fees is to be used in the state where collected. The FY2018 mandatory appropriation for the Oil and Gas Permit Processing Improvement Fund was $40.2 million. Appropriations have varied based on factors such as the number of active, nonproducing leases (on which rents are paid) each year, the number of APDs issued each year, and the addition of APD fees to the fund beginning in FY2016. Over the five years from FY2014 to FY2018, the annual mandatory appropriation increased overall from $14.1 million in FY2014, with the highest funding level in FY2018 ($40.2 million). The appropriation averaged $24.1 million annually over the five-year period. The Oregon and California (O&C) and Coos Bay Wagon Road (CBWR) grant lands are lands that were granted to two private firms, then returned to federal ownership for failure to fulfill the terms of the grants. The federal government makes revenue-sharing payments to the western Oregon counties where these lands are located to compensate for the tax-exempt status of federal lands. Under the Act of August 28, 1937, the payments for the O&C lands are 50% of receipts (mostly from timber sales). Under the Act of May 24, 1939, CBWR payments are up to 75% of receipts but cannot exceed the taxes that a private landowner would pay. The funds may be used for any governmental purpose. Because of declining receipts, Congress enacted the Secure Rural Schools and Community Self-Determination Act of 2000 (SRS) to provide alternative paymentsâinitially through FY2006âbased in part on historic rather than current receipts. The law has been amended and payments have been reauthorized several times. Most recently, the 115 th Congress provided SRS payments for FY2017 and FY2018. Under SRS, most of the funds are paid to the O&C and CBWR counties for governmental purposes. BLM retains a small portion of the funds for use on the O&C and CBWR lands. SRS payments are disbursed after the fiscal year ends. The FY2018 mandatory appropriationâto cover the FY2017 SRS paymentâwas $35.2 million. Over the five years from FY2014 to FY2018, the appropriation fluctuated between $35.2 million in FY2018 and $39.6 million in FY2014, except in FY2017. In FY2017, the appropriation for SRS was $0, due to the (temporary) expiration of the SRS program. Because of the expiration, payments to the O&C counties reverted to the revenue-sharing payments authorized under the aforementioned 1937 and 1939 statutes and were $22.9 million in FY2017. The Federal Lands Recreation Enhancement Act (FLREA) authorizes five agencies, including BLM, to charge and collect fees for recreation. The program initially was authorized for 10 years but has been extended, most recently through September 30, 2020. FLREA authorizes different kinds of fees, outlines criteria for establishing fees, and prohibits charging fees for certain activities or services. Under the law, BLM charges standard amenity fees in areas or circumstances where a certain level of services or facilities is available and expanded amenity fees for specialized services. The agency retains the collected fees. In general, at least 80% of the revenue is to be retained and used at the site where it was collected, with the remaining fees used agency-wide. Under law, the Secretary of the Interior can reduce the amount of collections retained at a collecting site to not less than 60% for a fiscal year, if collections are in excess of reasonable needs. The law gives BLM (and other agencies in the program) broad discretion in using revenues for specified purposes, which primarily aim to benefit visitors directly. Purposes include facility maintenance, repair, and enhancement; interpretation and visitor services; signs; certain habitat restoration; and law enforcement. The Secretary of the Interior and the Secretary of Agriculture may use a portion of the revenues to administer the recreation fee program. The FY2018 mandatory appropriation for BLM's Recreation Enhancement Act was $26.8 million. Appropriations vary depending on fee rates, the number of locations charging fees, and the number of visitors to BLM lands. Over the five years from FY2014 to FY2018, the annual mandatory appropriation increased overall from $17.7 million in FY2014 to $26.8 million in FY2018, the highest funding level. The appropriation averaged $22.2 million annually over the five-year period. As noted in \" Southern Nevada Public Land Sales and Earnings on Investments (Federal Funding) ,\" SNPLMA allocates 15% of receipts from land sales near Las Vegas to the state of Nevada. Specifically, it allocates 5% of receipts to the state's general education program and 10% of receipts to the Southern Nevada Water Authority for water treatment and transmission facilities in Clark County. (The other 85% of receipts under SNPLMA are deposited in a special federal account, as discussed above.) The FY2018 mandatory appropriation for payments to Nevada from receipts on land sales was $12.6 million. Over the five years from FY2014 to FY2018, the annual mandatory appropriation fluctuated from a low of $5.1 million in FY2014 to a high of $15.8 million in FY2017 and averaged $10.7 million. The Forest Ecosystem Health and Recovery Fund was created by the Department of the Interior and Related Agencies Appropriations Act, 1993. Its purposes and authority have been amended several times. Under current law, funds are derived from the federal share (i.e., the monies not granted to the states or counties) of receipts from the sale of salvage timber from any BLM lands. Salvage sales involve the timely removal of insect-infested, dead, damaged, or down trees that are commercially usable, to capture some of the economic value of the timber resource before it deteriorates or to remove the associated trees for forest health purposes. In general, the fund is used to respond to forest damage and to reduce the risk of catastrophic damage to forests (e.g., through severe wildfire). More specifically, the money can be used to plan, prepare, administer, and monitor salvage timber sales, as well as to reforest salvage timber sites. It also can be used for actions that address forest health problems that could lead to catastrophic damage, such as tree density control and hazardous fuels reduction. The FY2018 mandatory appropriation for the Forest Ecosystem Health and Recovery Fund was $9.6 million. Appropriations vary from year to year, in part because sales and associated deposits may occur over multiple years. They also vary due to factors that influence tree mortality (e.g., catastrophic wildfires, insect infestations), market fluctuations for the demand and price of the associated harvested wood products, and the expiration or reauthorization of SRS payments. Over the five years from FY2014 to FY2018, the annual mandatory appropriation averaged $7.7 million, ranging from a low of $3.3 million in FY2017 to a high of $12.0 million in FY2015. The Timber Sales Pipeline Restoration Fund was authorized by the Omnibus Consolidated Rescissions and Appropriations Act, 1996, for BLM (and FS; see \" Forest Service \" section below). The fund contains the federal share of receipts (i.e., the monies not granted to the states or counties) from certain canceled-but-reinstituted O&C timber sales. The account operates as a revolving fund, with 75% of the receipts from timber sales used to prepare additional sales (other than salvage). The other 25% of the receipts is to be used for recreation projects on BLM land. Under law, when the Secretary of the Interior finds that the allowable sales level for the O&C lands has been reached, the Secretary may end payments to this fund and transfer any remaining money to the General Fund of the Treasury as miscellaneous receipts. The FY2018 mandatory appropriation for the Timber Sales Pipeline Restoration Fund was $7.5 million. Appropriations vary from year to year, in part because sales and associated deposits may occur over multiple years. They also vary based on market fluctuations for the demand and price of the associated harvested wood products and the expiration or reauthorization of SRS payments. Over the five years from FY2014 to FY2018, the annual mandatory appropriation fluctuated from a low of $0.4 million in FY2017 to a high of $9.8 million in FY2015 and averaged $5.2 million annually. BLM had 11 additional accounts with mandatory appropriations of less than $5.0 million each in FY2018. These accounts collectively received $10.9 million in mandatory appropriations in FY2018 and ranged from less than $0.1 million to $3.3 million, as shown in Table 1 . Three of the accounts are payment programs under which BLM shares proceeds of land sales or land uses (e.g., livestock grazing) with states and counties. Under some authorities, the states and counties may use the payments for general purposes, such as for the benefit of affected counties; other laws specify particular purposes for which the payments can be used, such as for schools and roads. Various sources fund the other eight accounts, with BLM retaining the proceeds for particular purposes, as follows: Two of the accounts are funded by land sales in particular areas and are used for purposes including land acquisition, resource preservation, and the processing of land use authorizations. Two accounts are funded by contributions for cadastral surveys and for administering and improving grazing lands and are used for these purposes. One account is funded from rents paid by BLM employees living in government housing and is used to maintain and repair the housing. One account is funded by revenues from mineral lease sales on a particular site and is used to remove environmental contamination. One account is funded primarily by fees collected from commercial users of roads under BLM jurisdiction and is used to maintain the areas. One account is funded by timber receipts under stewardship contracts and is used for purposes including other stewardship contracts. FWS administers the National Wildlife Refuge System (NWRS), which consists of land and water designations. The system includes wildlife refuges, waterfowl production areas, and coordination areas, as well as mostly territorial lands and submerged lands and waters within mainly marine wildlife refuges and marine national monuments. FWS also manages other lands within and outside of the NWRS. FWS had 12 accounts with mandatory spending authority in FY2018. Seven of these accounts had appropriations each exceeding $5.0 million, and the largest had $829.1 million. Funding mechanisms for these accounts vary, including receipts; excise and fuel taxes; and fines, penalties, and forfeitures. In addition, three of the accounts receive discretionary appropriations in addition to the mandatory appropriations shown in this report. Several accounts, including some of the largest, provide grants to states (and other entities); other accounts fund agency activities or provide compensation to counties. Table 2 and Figure 4 show the FWS mandatory appropriations for FY2018. FY2018 mandatory appropriations for all 12 FWS accounts were $1.46 billion. This amount was 45% of total FWS mandatory and discretionary appropriations of $3.27 billion in FY2018. Discretionary appropriations of $1.81 billion accounted for the remaining 55% of total FWS appropriations. In 1937, the Federal Aid in Wildlife Restoration Act created the Federal Aid in Wildlife Restoration Fund, also known as the Pittman-Robertson Fund, in the Treasury. As amended, the act directs that excise taxes on certain guns, ammunition, and bows and arrows be deposited into the fund each fiscal year for allocation and dispersal in the year following their collection. The Appropriations Act of August 31, 1951, provided for mandatory appropriations for the excise taxes deposited into the Pittman-Robertson Fund in the year after they are collected. Many programs are funded from the Pittman-Robertson Fund. The majority of the annual funding is allocated to states and territories, which can receive funding to cover up to 75% of the cost of FWS-approved wildlife restoration projects, including acquisition and development of land and water areas. Funding also is provided for hunter education programs and multistate conservation grants. FWS is authorized to use a limited amount of the funds to administer the program. In addition, interest on balances in the account is allocated to the North American Wetlands Conservation Fund. Pittman-Robertson received $829.1 million in mandatory appropriations in FY2018. This amount included $17.8 million for projects under the North American Wetlands Conservation Act (see \" North American Wetlands Conservation Fund \"). The mandatory appropriation for Pittman-Robertson varies based on the amount of federal excise taxes collected. Over the five years from FY2014 to FY2018, annual mandatory appropriations varied by more than $100 million, with a low of $725.5 million in FY2016 and a high of $829.1 million in FY2018. The appropriation averaged $790.0 million annually over the five-year period. In 1950, Congress passed the Federal Aid in Sport Fish Restoration Act, now known as the Dingell-Johnson Sport Fish Restoration Act. The act authorized funding equal to the amount of taxes collected on certain sport fishing equipment to be allocated to the states to be used to carry out sport fish restoration activities. The Appropriations Act of August 31, 1951, provided for mandatory appropriations for the amounts used to carry out the act. Since its passage, the Dingell-Johnson Act has been amended several times to add additional programs and to modify the source of funding. In 1984, funding for this act became part of a larger Aquatic Resources Trust Fund established in the Deficit Reduction Act of 1984. In 2005, the account name was changed to the Sport Fish Restoration and Boating Fund. In its current form, the fund receives deposits from five sources: (1) taxes on motorboat fuel (after $1 million is credited to the Land and Water Conservation Fund); (2) taxes on small engine fuel used for outdoor power equipment; (3) excise taxes on sport fishing equipment, such as fishing rods, reels, and lures; (4) import duties on fishing boats and tackle; and (5) interest on unspent funds in the account. Deposits into the fund are available for appropriation in the year after they are collected. As amended, the Dingell-Johnson Act funds many programs through the Dingell-Johnson Fund. The majority of funds are used for formula grants to states and territories for projects to benefit sport fish habitat, research, inventories, education, stocking of sport fish into suitable habitat, and more. The states and territories can receive funding to cover up to 75% of the cost of restoration projects, including acquiring and developing land and water areas. In addition to funds apportioned to states for sport fish restoration projects, funding is allocated to administer various other FWS programs, including Boating Infrastructure Improvement, National Outreach, Multistate Conservation Grants, Coastal Wetlands, Fishery Commissions, and the Sport Fishing and Boating Partnership Council. In addition, FWS uses monies from the fund to carry out projects identified through the North American Wetlands Conservation program. Dingell-Johnson received $439.2 million in mandatory appropriations in FY2018. This amount included $17.2 million for projects under the North American Wetlands Conservation Act (see \" North American Wetlands Conservation Fund \" for more information). The mandatory appropriation for Dingell-Johnson fluctuates from year to year, because the amount of deposits into the fund varies annually. Over the five years from FY2014 to FY2018, annual mandatory appropriations varied by more than $35 million, with a low of $406.8 million in FY2014 and a high of $442.3 million in FY2016. The appropriation averaged $430.9 million annually over the five-year period. The Migratory Bird Conservation Account was created in 1934 as the repository for revenues derived from the sale of Migratory Bird Hunting and Conservation Stamps, commonly known as Duck Stamps. In addition to revenues from Duck Stamps, the fund receives deposits from import duties on certain arms and ammunition, as well as other sources. Funding in the Migratory Bird Conservation Account can be used for the printing and sales costs of Duck Stamps and for the Secretary of the Interior to acquire lands and easements and protect waterfowl habitat, with the lands and easements added to the NWRS. Prior to acquisition of a property for addition to the NWRS, the Migratory Bird Conservation Commission must approve the property from a list of properties that the Secretary of the Interior nominates for acquisition. Also prior to acquisition, the state in which the acquisition is to occur must enact a law consenting to acquisition by the United States, FWS must consult with the state, and the state's governor must approve the acquisition. The Migratory Bird Conservation Account received $81.3 million in mandatory appropriations in FY2018. The mandatory appropriation for the Migratory Bird Conservation Account varies from year to year based on fluctuations in deposits from the sale of Duck Stamps and import duties. Over the five years from FY2014 to FY2018, annual mandatory appropriations varied by nearly $20 million, with a low of $62.6 million in FY2015 and a high of $82.3 million in FY2017. The appropriation averaged $72.7 million annually over the five-year period. Unlike the other mandatory accounts, the mandatory appropriation for the Cooperative Endangered Species Conservation Fund (CESCF) is not directly available for allocation and disbursal. Rather, the mandatory appropriation is paid into a special fund, known as the CESCF, from which funding may be made available in subsequent years through further discretionary action by Congress. As such, the mandatory appropriation for CESCF is different from the mandatory appropriations for other FWS accounts. The mandatory appropriation that is annually deposited into the CESCF consists of an amount equal to 5% of the combined amount covered in the Federal Aid in Sport Fish Restoration and Federal Aid in Wildlife Restoration accounts and an amount equal to the excess balance above $500,000 of the sum of penalties, fines, and forfeitures received under the Endangered Species Act and the Lacey Act. Funding made available from the CESCF through discretionary appropriations supports grant funding programs that assist states with the conservation of threatened and endangered species and the monitoring of candidate species on nonfederal lands. The CESCF received $74.7 million in mandatory appropriations in FY2018. The mandatory appropriation for the CESCF varies from year to year due to fluctuations in Pittman-Robertson and Dingell-Johnson and in the penalties, fines, and forfeitures collected. Over the five years from FY2014 to FY2 018, annual mandatory appropriations varied by more than $8 million, between a low of $67.7 million in FY2016 and a high of $75.9 million in FY2017. The North American Wetlands Conservation Act was enacted in 1989 to provide funding mechanisms to carry out conservation activities in wetlands ecosystems throughout the United States, Canada, and Mexico. The funding supports partnerships among interested parties to protect, enhance, restore, and manage wetland ecosystems, and it requires that the partner stakeholders match the federal funding at a minimum rate of one to one. Mandatory funding for the program comes from court-imposed fines for violations of the Migratory Bird Treaty Act. Additional mandatory funding is derived from interest earned on funds from excise taxes on hunting equipment under Pittman-Robertson and transfers from Dingell-Johnson. (See \" Federal Aid in Wildlife Restoration (Pittman-Robertson) \" and \" Federal Aid in Sport Fish Restoration (Dingell-Johnson) \" for more information.) The North American Wetlands Conservation Fund received $11.5 million in mandatory appropriations in FY2018. The mandatory appropriation for the North American Wetlands Conservation Fund varies from year to year due to fluctuations in fines related to violations of the Migratory Bird Treaty Act. Over the five years from FY2014 to FY2018, mandatory appropriations varied by more than $8 million, with a low of $11.4 million in FY2017 and a high of $19.6 million in FY2015. The appropriation averaged $16.2 million annually over the five-year period. The Refuge Revenue Sharing Act was enacted to compensate counties for the loss of revenue due to the tax-exempt status of NWRS lands administered by FWS. The National Wildlife Refuge Fund, also called the Refuge Revenue Sharing Fund, accumulates net receipts from the sale of certain products, which are used to pay the counties in the year following their collection pursuant to the act. The act also authorizes FWS to deduct funds from the receipts to cover certain costs related to revenue-producing activities. Counties receive payments for FWS-managed lands that were acquired (fee lands) or reserved from the public domain. Counties receive a payment for fee lands based on a formula that pays the greater of (1) $0.75 per acre, (2) three-fourths of 1% of fair market value of the land, or (3) 25% of net receipts. Payments for reserved lands are 25% of the net receipts. In a given year, if receipts are not sufficient to cover the payments, the act authorizes annual discretionary appropriations to make up some or all of the difference. If receipts exceed the amount needed to cover payments, the excess is transferred to the Migratory Bird Conservation Account. From FY2014 to FY2017, mandatory and discretionary spending together provided between 20% and 30% of the full, authorized level in the formula, with mandatory appropriations making up between 28% and 41% of the total. The National Wildlife Refuge Fund received $9.4 million in mandatory appropriations in FY2018. The mandatory appropriation for the National Wildlife Refuge Fund fluctuates from year to year due to changes in revenues collected that determine the available funding. Over the five years from FY2014 to FY2018, annual mandatory appropriations varied by more than $4 million, with a low of $7.0 million in FY2014 and a high of $11.4 million in FY2016. In general, FLREA allows national wildlife refuge managers to retain not less than 80% of entrance and user fees collected at the refuge to improve visitor experiences, protect resources, collect fees, and enforce laws relating to public use, among other purposes. The remaining amount (up to 20%) is to be made available for agency-wide distribution. In practice, some FWS regions have chosen to return 100% of funds to the collecting sites. The Recreation Fee Program received $7.5 million in mandatory appropriations in FY2018. Appropriations vary depending on fee rates, the number of locations charging fees, and the number of visitors to FWS lands. Over the five years from FY2014 to FY2018, the annual mandatory appropriation increased by more than $2 million, with a low of $5.1 million in FY2014 and a high of $7.5 million in FY2018. FWS had five additional accounts with mandatory appropriations of less than $5.0 million each in FY2018. These accounts collectively received $7.8 million in mandatory appropriations in FY2018, and they ranged from $0.2 million to $4.0 million, as shown in Table 2 . These accounts receive funding from donations and receipts collected for certain activities. For some accounts, the activities are restricted to selected refuges or properties. In general, these funds are used for fish and wildlife conservation purposes or for the maintenance or conservation of specific FWS-administered resources. Specific purposes include the following: The Contributed Funds account consists of donations, which are used to support various fish and wildlife conservation projects. The Operations and Maintenance of Quarters Fund receives the rents and charges from employees occupying FWS quarters and is used to maintain the structures. The Lahontan Valley and Pyramid Lake Fish and Wildlife Fund uses the receipts associated with a water rights settlement in Nevada to support restoration and enhancement of wetlands and fisheries in the area. Proceeds from the sale of certain lands in the area also are deposited in the fund. The Proceeds from Sales Fund uses the receipts from sales of resources on U.S. Army Corps of Engineers land managed by FWS to cover the expenses of managing those sales and carrying out development, conservation, and maintenance of these lands. The Community Partnership Enhancement Fund supports collaboration with local groups (e.g., state, local, or academic organizations) whose contributions support local refuges. FS is charged with conducting forestry research, providing assistance to nonfederal forest owners, and managing the 193-million-acre National Forest System (NFS). The NFS consists of national forests, national grasslands, land utilization projects, and several other land designations. FS had 22 accounts with mandatory spending authority in FY2018. Of the 22 accounts, 10 had mandatory appropriations each exceeding $5.0 million in FY2018, with the largest account containing $234.6 million. The remaining 12 accounts had appropriations of less than $5 million each in FY2018 (and half of those had less than $1 million each). Agency receipts fund many of these accounts, although one is supplemented by the General Fund of the Treasury, as needed. Almost all of the accounts support agency activities, but one is for a compensation program. In addition, import tariffs fund one account and license fees fund another. Table 3 and Figure 5 show the FS mandatory appropriations for FY2018. FY2018 mandatory appropriations for FS for all 22 accounts were $705.1 million. This amount was nearly 10% of total FS mandatory and discretionary appropriations of $7.29 billion in FY2018. Discretionary appropriations of $6.58 billion accounted for the remaining 90% of total FS appropriations. Payment to States Funds provide compensation or revenue-sharing payments to specified state and local governments. The payments are required based on different laws with varying (but sometimes related) purposes and disbursement formulas, as summarized below. The funds generally consist of receipts from sales, leases, rentals, or other fees for using NFS lands or resources (e.g., timber sales, certain recreation fees, and communication site leases). 25% R evenue- S haring P ayments . The Act of May 23, 1908, requires states to receive annual payments of 25% of the average gross revenue generated over the previous seven years on the national forests in the state, for use on roads and schools in the counties containing those lands. Funded through receipts, the payment is made to the state after the end of the fiscal year. The state cannot retain any of the funds but allocates the payment to the counties based on the area of national forest land in each county. SRS P ayments . SRS authorized an optional, alternative payment to both the FS 25% revenue-sharing payments and the BLM payments to the counties in Oregon containing the O&C and CBWR lands. The payment amount is determined by a formula that is based in part on historical revenue payments and that declines overall by 5% annually. Similar to the 25% revenue-sharing payments, the payment is made after the end of the fiscal year and the bulk of the payment is to be used for roads and schools in the counties containing the national forests. The agency may retain a portion of the payment for use on specified projects. Funding for the payment first comes from receipts and, if necessary, is supplemented through transfers from the General Fund of the Treasury. The original authorization for SRS payments expired at the end of FY2006, but Congress reauthorized the payments several times (through various laws) and payments were made annually from FY2001 through FY2016. The authorization expired for the FY2016 SRS payment, and counties received the 25% revenue-sharing payment for one year, in FY2017. Congress then reauthorized the SRS payments for two years (FY2017 and FY2018). SRS payments are disbursed after the fiscal year ends, so the FY2017 payment was made in FY2018 and the FY2018 payment was made in FY2019. National Grassland Fund P ayments . These payments are authorized by the Bankhead-Jones Farm Tenant Act, which requires payments of 25% of net (rather than gross) receipts directly to the counties for roads and schools in the counties where the national grasslands are located. These payments are sometimes referred to as Payments to Counties, because the payment is made directly to the counties and the allocation is based on the national grassland acreage in each county. Payments to Minnesota Counties . Enacted in 1948, this program pays three northern Minnesota counties 0.75% of the appraised value of the land, without restrictions on using the funds. The FY2018 mandatory appropriation for the Payment to States Funds was $234.6 million. The funding level in this account varies annually, depending on fluctuations in revenue from the NFS and whether SRS is authorized. For example, over the five years from FY2014 to FY2018, annual mandatory appropriations averaged $269.6 million. The FY2018 appropriation was lower than the annual average, and the FY2017 appropriation ($73.1 million) was much lower than the annual average. These low figures occurred primarily because of the expiration of SRS payments in FY2017. SRS payments are generally higher than 25% payments and often require supplemental funding from the General Fund of the Treasury. The Knutson-Vandenberg (K-V) Trust Fund was established by the Act of June 6, 1930, and is funded through revenue generated by timber sales. The agency determines the amount collected on each sale, which can be up to 100% of receipts from the sale. The fund is used for two purposes. First, the fund is used on the site of the timber sale to reforest and improve timber stands or to mitigate and enhance non-timber resource values. Second, unobligated balances from the fund may be used for specified land management activities within the same FS region in which the timber sale occurred. The K-V Trust Fund received $187.2 million in mandatory appropriations in FY2018. Because the deposits are determined on a sale-by-sale basis, the balance in the fund varies from year to year. Over the five years from FY2014 to FY2018, mandatory appropriations ranged from a low of $61.5 million in FY2015 to a high of $250.0 million in FY2014. The average annual mandatory appropriation was $155.7 million. FS charges and collects recreational fees under several programs and deposits those funds into the Recreation Fees account to be used for specified purposes. Under FLREA, FS is one of five federal agencies authorized to charge, collect, and retain fees for specified recreational activities on federal lands. FLREA directs that at least 80% of the fees collected from FS are to be available without further appropriation for use at the site where they were collected. FS typically uses the money for visitor services, law enforcement, and other purposes authorized under FLREA. In addition to FLREA, FS is authorized to collect and retain fees at two specific sites: Grey Towers National Historic Site and the Shasta-Trinity National Recreation Area (NRA). FS is authorized to use the fees collected at the Grey Towers National Historic Site for program support and administration. The agency may use the fees collected at the Shasta-Trinity NRA for the same purposes as FLREA, as well as for direct operating or capital costs associated with the issuance of a marina permit. FS also administers the multiagency National Recreation Reservation Service program, which collects reservation fees for those recreational facilities on federal lands that allow reservations. FS is responsible for collecting the fees and issuing pass-through payments to other agencies. The FY2018 mandatory appropriation for the Recreation Fee Program was $100.6 million. Appropriations vary depending on fee rates, the number of locations charging fees, and the number of visitors to FS lands. Over the five years from FY2014 to FY2018, mandatory appropriations ranged from a low of $70.7 million in FY2014 to a high of $100.6 million in FY2018. The average annual mandatory appropriation during the period was $87.2 million. The Timber Salvage Sale Fund is funded through receipts from timber sales (or portions of sales) designated as salvage by the agency, and its funds may be used to prepare, sell, and administer other salvage sales. Salvage sales involve the timely removal of insect-infested, dead, damaged, or down trees that are commercially usable to capture some of the economic value of the timber resource before it deteriorates or to remove the associated trees for stand improvement. The fund may be used for timber sales with any salvage component. The FY2018 mandatory appropriation for the FS Timber Salvage Sale Fund was $41.9 million. Appropriations vary from year to year, based on factors that influence tree mortality (e.g., catastrophic wildfires, insect infestations) and market fluctuations for the demand and price of the harvested timber. From FY2014 to FY2018, mandatory appropriations ranged from a low of $33.2 million in FY2014 to a high of $41.9 million in FY2018. The mandatory appropriation averaged $37.5 million annually over the five-year period. This trust fund collects deposits from cooperators and partners for use on NFS lands or for funding research programs. The deposits may be made under an assortment of instruments, including cooperative agreements, permits, or contracts, and with a variety of partners, for services involving any aspect of forestry ranging from timber measurement to fire protection, among others. These services vary widely in scope and duration, and the associated deposits also vary widely, commensurate with the scale of those services. The deposits may be made pursuant to a specific agreement or project, or they may include funds pooled from multiple cooperators for later spending on related projects. The amount of deposits is specified in each instrument. The FY2018 mandatory appropriation for the trust fund was $39.4 million. Because the fund consists of deposits under many individual cooperative agreements or other instruments, the funding level varies considerably from year to year. Over the five years from FY2014 to FY2018, mandatory appropriations ranged from a low of $34.6 million in FY2014 to a high of $84.1 million in FY2016. The mandatory appropriation averaged $48.2 million annually over the five-year period. The Reforestation Trust Fund was created in 1980 to eliminate the backlog of reforestation and timber stand improvement work on NFS lands. Deposits to this account come from tariffs on specified imported wood products, up to $30.0 million annually. Funds may be used for a range of activities related to reforestation (e.g., site preparation for natural regeneration, seeding, or tree planting) and to improve timber stands (e.g., removing vegetation to reduce competition, fertilization). In FY2018, the Reforestation Trust Fund received $27.2 million in mandatory appropriations. Funding generally has been at or around the maximum of $30.0 million annually. Over the five years from FY2014 to FY2018, the mandatory appropriation averaged $29.4 million annually. Congress authorized FS and BLM to combine timber sale contracts and land restoration services contracts into stewardship contracts . This allows the agencies to retain and use the revenue generated from the sale of timber to offset the cost of specified restoration work on their lands. FS and BLM each are authorized to retain any receipts in excess of the cost of the restoration work in their respective Stewardship Contracting Funds and to use those funds on future stewardship contracts. In FY2018, the mandatory appropriation for the Stewardship Contracting Fund was $23.6 million. Funding varies based on the extent that there are receipts in excess of costs. Over the five years from FY2014 to FY2018, mandatory appropriations ranged from a low of $11.2 million in FY2014 to a high of $23.6 million in FY2018 and averaged $15.8 million annually. FS is authorized to collect and retain fees to cover the costs of processing and monitoring certain special-use authorizations for the use and occupancy of NFS lands. The processing and monitoring fees are based on the estimated number of hours it will take FS to process the application (or renew the authorization) and to monitor the activity to ensure compliance with the authorization. The rates are updated annually to adjust for inflation. The FY2018 mandatory appropriation for Cost Recovery (Land Uses) was $11.0 million. Funding varies based on the number and type of special-use authorizations. From FY2014 to FY2018, mandatory appropriations ranged from a low of $5.4 million in FY2014 to a high of $11.0 million in FY2018 and averaged $7.8 million annually. This account allows the agency to collect rent from employees who use government-owned housing and to use the funds to maintain and repair the structures. The FY2018 mandatory appropriation was $10.0 million. Over the five years from FY2014 to FY2018, funding was relatively consistent and mandatory appropriations averaged $9.0 million annually. This account receives money from timber purchasers. The fund is used on timber sale sites to dispose of treetops, limbs, and other debris from timber cutting; reduce fire and insect hazards; assist reforestation; and conduct related activities. FS identifies the amount required to cover the costs of those activities for each timber sale. The FY2018 mandatory appropriation for Brush Disposal was $7.6 million. From FY2014 to FY2018, mandatory appropriations ranged from a low of $7.6 million in FY2018 to a high of $9.7 million in FY2015. The appropriation averaged $8.3 million annually. FS had 12 additional accounts with mandatory appropriations of less than $5.0 million each in FY2018, all of which can be used on specified agency activities. These accounts collectively received $21.8 million in mandatory appropriations in FY2018, and they ranged from less than $0.1 million to $4.7 million, as shown in Table 3 . Nine of these accounts are funded through receipts or fees for use of NFS lands or resources, with FS retaining the proceeds for particular purposes, as follows. Three accounts are associated with the sale of timber or non-timber wood products and may be used for implementation of additional timber sales, payment for road construction associated with timber sales, or program administration. Four accounts are associated with land use fees. Of these, two accounts are funded through land use fees for specific purposes (e.g., commercial filming or photography, organizational camps) and two accounts are funded through land use fees in specific areas; the funds in those accounts generally may be used for program administration and other specified purposes. Two accounts are funded through land sales and are used for purposes such as land acquisition, building maintenance, rehabilitation, and construction. Of the remaining three accounts, one is funded through licensee royalty fees and used to support nationwide initiatives related to wildfire prevention and environmental conservation. Another account is funded through recoveries from judgements, settlements, bond forfeitures, and related actions from permittees or timber purchasers who fail to complete the required work, and the funds are used to complete the work or repair any associated damage. The other account is funded through revenue generated from recycling or other waste reduction or prevention programs; its funds are used to implement other recycling, waste reduction, or prevention programs. NPS administers the National Park System, with 80 million acres of federal land in all 50 states and the District of Columbia. The system contains 419 units with diverse titles, including national park, national preserve, national historic site, national recreation area, and national battlefield, among others. NPS had 16 accounts with mandatory spending authority in FY2018. Of these, 11 accounts had mandatory appropriations each exceeding $5.0 million; the largest had $301.5 million. Funding sources for the accounts vary and include agency receipts, offshore energy development revenues, District of Columbia payments, the General Fund of the Treasury, donations, and an endowment. Almost all of the accounts support agency activities, but one is for recreation assistance grants to states and another is a compensation program. Table 4 and Figure 6 show NPS mandatory appropriations for FY2018. FY2018 mandatory appropriations for all 16 NPS accounts totaled $704.9 million. This amount was 17% of the $4.16 billion total for NPS mandatory and discretionary appropriations combined in FY2018. Discretionary appropriations of $3.46 billion accounted for the remaining 83% of total NPS appropriations. Like other federal land management agencies, NPS charges, retains, and spends recreation fees under FLREA. FLREA authorizes NPS to charge entrance fees at park units and to charge certain recreation and amenity fees for specialized uses of park facilities and services. FLREA directs that, in general, at least 80% of the fees collected at a park unit are to be available without further appropriation for use at the site where they were collected. In practice, NPS's policy is to allow park units that collect less than $0.5 million annually to retain 100% of collections at the site; park units that collect over $0.5 million annually retain up to 80% of collections. Funds not retained at the collecting site are placed in a centralized account for use agency-wide, including at sites where fee collection is infeasible or relatively low. NPS projects compete for funding from this centralized account, and the NPS director ultimately selects projects for funding. NPS generally has discretion in using its collections for purposes specified in FLREA. These purposes include maintaining and improving recreation facilities, providing visitor services, providing law enforcement related to public use and recreation, and restoring certain wildlife habitats. Under an agency policy that took effect in FY2018, parks are to obligate 55% of new allocations to deferred maintenance projects. In FY2018, NPS revenues from the Recreation Fee Program were $301.5 million. Over the five years from FY2014 to FY2018, program revenues increased by approximately 65%, owing to entrance fee increases and growth in the numbers of park visitors, among other factors. The recreation fees averaged $251.8 million annually over the five-year period. NPS typically collects more under FLREA than the other four agencies in the program combined (BLM, FS, FWS, and the Bureau of Reclamation). NPS concessioners contract with the agency to provide visitor services such as lodging and food within the parks. The National Park Service Concessions Management Improvement Act of 1998 directs that all franchise fees and other monetary considerations from NPS concessions contracts be deposited into a special account. NPS is authorized to use most of these funds at the collecting park for visitor services and high-priority resource management programs and operations. This account is gradually replacing an earlier type of concessions fundingâthe concessions improvement accounts (see \" Concessions Improvement Accounts ,\" below)âas concessions contracts are renewed. In FY2018, NPS received $126.3 million in concession franchise fees, a 2% increase over FY2017 receipts ($123.8 million). Over the FY2014-FY2018 period, NPS concession franchise fee receipts averaged $108.3 million annually. Agency revenues from concession franchise fees increased by nearly 50% over five years (FY2014-FY2018), as park visitation increased and as older concessions contracts were replaced by new contracts awarded under the 1998 act. NPS has stated that, under the 1998 act, \"the Service has experienced increased competition for contracts, which has resulted in improved visitor services, higher revenue, and increased returns to the government.\" The Gulf of Mexico Energy Security Act of 2006 (GOMESA) provides mandatory appropriations to the Land and Water Conservation Fund's (LWCF's) state assistance program, which is administered by NPS. The funding consists of a percentage of revenues from qualified offshore oil and gas leases in the Gulf of Mexico. GOMESA revenues for the LWCF are exclusively for the state grant program (rather than for land acquisition by the federal land management agencies). The GOMESA revenues are used for formula grants to states for outdoor recreation purposes, including recreational planning, acquiring recreational lands and waters, and developing outdoor recreation facilities. In FY2018, the LWCF state assistance program received $62.6 million under GOMESA. Historically, mandatory appropriations to the LWCF state assistance program under GOMESA had been relatively small compared to other NPS mandatory accounts. For instance, during the five-year period from FY2014 to FY2018, the funding constituted less than $1.5 million for each year except FY2018 ($62.6 million). GOMESA entered a new revenue-sharing phase in FY2017âoften referred to as Phase II âin which qualified leasing revenues from an expanded geographic area are shared with the LWCF (and with certain states). This has resulted in higher revenue shares than in GOMESA's first decade. Because the law specifies that revenues shall be shared with recipients in the fiscal year immediately following that in which they are received, FY2018 was the first fiscal year that reflected Phase II revenue sharing. The NPS Donations account includes donated funds received by the Secretary of the Interior for the National Park System under the authority of the NPS Organic Act. The account does not represent all donations to NPS; for example, it excludes in-kind contributions of goods and services. Donations are tracked to assure that the funds are used for the purposes for which they were donated. In FY2018, the mandatory appropriation from donations was $47.1 million. Annual donations may fluctuate considerably from year to year. For FY2014-FY2018, donation amounts ranged from a low of $47.1 million in FY2018 to a high of $159.1 million in FY2015. Over the five-year period, donations averaged $84.1 million annually. Changes may be due to variations in the number and size of major gifts NPS receives in a given year. Some donations are tied to federal matching programs whose funding may fluctuate or expire. For instance, the Helium Stewardship Act (discussed in \" ConstructionâHelium Act ,\" below) provided mandatory appropriations to NPS in FY2018 and FY2019 that incentivized matching donations. The Annuity Benefits for U.S. Park Police program reimburses the District of Columbia for benefit payments to U.S. Park Police annuitants that exceed deductions from salaries of active members of the U.S. Park Police. The program applies to Park Police hired before January 1, 1984. Payments are made to retirees, surviving spouses, and dependents. Since FY2002, the program has operated as a permanent appropriation; prior to that, payments were funded through NPS discretionary appropriations. In FY2018, mandatory appropriations for the annuity benefits were $44.3 million. The appropriations stayed relatively steady from FY2014 to FY2018. For example, FY2017 appropriations were $44.6 billion and FY2016 appropriations were $44.8 billion. Over time, payments from the program may be expected to gradually decline, as the program applies only to the annuitants of Park Police hired prior to 1984. NPS is authorized to collect fees for the use of public transportation services within the National Park System. All the fees must be used on costs associated with transportation services in the park unit in which they were collected. Currently, 19 park units have approval to collect transportation fees. In FY2018, NPS had $28.1 million in mandatory appropriations from transportation fees. Annual park visitation levels and other factors affect the collections. In addition, the number of parks approved to charge a transportation fee has grown, from 14 parks in FY2014 to the current 19. Annual collections generally grew over five years from $17.4 million in FY2014 to $28.1 million in FY2018, but the FY2018 amount was lower than FY2017 ($28.6 million). The Land and Water Conservation Fund Act of 1965 gives NPS contract authority for the acquisition of lands and waters, not to exceed $30 million of the money authorized to be appropriated each fiscal year. For FY2018, Congress provided NPS with LWCF contract authority of $28.0 million. In earlier years, including FY2014-FY2017, Congress had rescinded this contract authority in annual appropriations laws. NPS is authorized to provide employees with government-owned or government-leased housing when conditions of employment or availability of housing warrant this arrangement. The NPS also is authorized to provide employees with related facilities, such as furniture, equipment, and utilities. Under law, the NPS charges rental rates for housing and fees for facilities based on their \"reasonable value\" to the employees. The agency may collect the rents and charges through payroll deductions or other arrangements, and the collections are deposited into a special fund. NPS uses the funds to operate and maintain agency housing in units of the National Park System. For FY2018, NPS reported mandatory appropriations of $22.4 million for operation and maintenance of quarters. Over the five-year period from FY2014 to FY2018, the receipts were relatively steady, ranging from a low of $21.2 million in FY2016 to a high of $23.1 million in FY2014. The Helium Stewardship Act of 2013 authorized mandatory appropriations totaling $50 million over two fiscal years (FY2018 and FY2019) to pay the federal funding share of NPS challenge cost-share projects aimed at addressing deferred maintenance and correcting deficiencies in NPS infrastructure. The projects require at least a 50% match from a nonfederal funding source (including in-kind contributions). The act provided $20 million of the funding in FY2018 and $30 million in FY2019. After sequestration, NPS reported $18.7 million as the FY2018 mandatory appropriation. Some older NPS concessions contracts, developed under the Concessions Policy Act of 1965, require the concessioner to deposit a portion of gross receipts or a fixed sum of money in a separate bank account. With NPS approval, a concessioner may spend the funds for facilities that directly support the concession's visitor services. The FY2018 mandatory appropriation for the Concessions Improvement Accounts was $12.1 million. The amounts deposited in the Concessions Improvement Accounts have varied from year to year. Annual collections are affected by multiple factors, such as changes in numbers of park visitors, the gradual replacement of the Concessions Improvement Accounts with contracts using concessions franchise fees (described in \" Concession Franchise Fees ,\" above), and other factors. From FY2014 to FY2018, annual appropriations ranged from a low of $3.5 million in FY2015 to a high of $12.1 million in FY2018. The Park Buildings Lease and Maintenance Fund consists of the rent money derived from leases on NPS buildings and other property under various statutes. The Secretary of the Interior is authorized to enter into a lease with any person or governmental entity for the use of buildings and property throughout the National Park System. Rental payments under these leases are deposited into a special account, which may be used for infrastructure needs of NPS units, including facility refurbishment, repair and replacement, and maintenance of the leased properties. Separately, NPS and other agencies are authorized to lease historic properties to any person or organization provided the lease will ensure the preservation of the property. NPS retains the proceeds of these leases to defray the costs of administration, maintenance, repair, and related expenses on the leased property or other properties on the National Register of Historic Places. In FY2018, NPS received $9.6 million in mandatory appropriations from the leasing of park properties. The amount was similar to FY2017 collections of $9.4 million but represented an increase of about 20% over FY2014 collections of $7.9 million. NPS had five additional accounts with mandatory appropriations of less than $5.0 million each in FY2018. These accounts collectively received $4.1 million in mandatory appropriations in FY2018, and they ranged from less than $0.1 million to $2.3 million, as shown in Table 4 . Two of the accounts expend fees collected from park users to support improvements at a range of parks; these are the Deed Restricted Parks Fee Program, which applies to park units where deed restrictions prohibit entrance fees and allows those parks to use other recreation fees for projects that enhance the visitor experience, and the Filming and Photography Special Use Fee Program, which provides for the collection of commercial filming and photography fees at park units and authorizes their use for purposes similar to those in the Recreational Fee Program. The other three accounts are specific to individual park units. The account for Payment for Tax Losses on Land Acquired for Grand Teton National Park uses certain visitor fees from Grand Teton and Yellowstone National Parks to compensate the state of Wyoming for tax losses due to federal land acquisitions for Grand Teton. The account for Delaware Water Gap, Route 209 Operations consists of fees from commercial vehicles at Delaware Water Gap National Recreation Area, which may be used for the operation and maintenance of U.S. Route 209 within the park boundaries. The account for Preservation, Birthplace of Abraham Lincoln consists of an endowment to preserve the Abraham Lincoln Birthplace National Historic Site in Kentucky. ", "summary": "Management of lands and resources is a principal mission for four federal agenciesâthe Bureau of Land Management (BLM), Fish and Wildlife Service (FWS), Forest Service (FS), and National Park Service (NPS). Most of the appropriations for these agencies come from discretionary appropriations enacted by Congress through annual appropriations laws. However, each of the agencies also receives mandatory appropriations under provisions of authorizing statutes enacted by Congress. Under these laws, the agencies spend money without further action by Congress. A number of issues arise for Congress in deciding the type of appropriations to provide and the terms and conditions of appropriations. One consideration is whether mandatory (rather than discretionary) appropriations best suit the purposes of the program or activity and Congress's role in authorizing, appropriating, and conducting oversight. Another question is how to fund any mandatory appropriationânamely, whether through general government collections (in the General Fund of the Treasury) or through a specific collection (e.g., from a particular activity or tax). A third issue is how to use the funds in a mandatory account, such as for agency activities, revenue sharing with state and local governments, or grant programs. In FY2018, the four agencies together had $3.17 billion in mandatory appropriations, which was 19% of their total discretionary and mandatory appropriations for the year ($16.36 billion). This funding was provided through 68 separate accounts, of which each agency had a dozen or more. The dollar amount of mandatory appropriations varied widely among the agencies (from $300.4 million for BLM to $1.46 billion for FWS), as did the percentage of each agency's total appropriations that was mandatory (from 10% for FS to 45% for FWS). (See the figure below.) BLM had 18 accounts with mandatory spending authority in FY2018. Of these, seven had mandatory appropriations each exceeding $5.0 million, with the largest account containing $157.8 million. The accounts typically are funded from agency receipts of various sorts. Most accounts support BLM activities, although several are compensation programs that share revenue with state or local governments. FY2018 total mandatory appropriations for BLM were $300.4 million, which was 18% of combined BLM mandatory and discretionary appropriations of $1.65 billion. FWS had 12 accounts with mandatory spending authority in FY2018. Of these, seven had mandatory appropriations each exceeding $5.0 million, and the largest had $829.1 million. Funding mechanisms for these accounts vary, including receipts; excise and fuel taxes; and fines, penalties, and forfeitures. Several accounts, including some of the largest, provide grants to states (and other entities); other accounts fund agency activities or provide compensation to counties. FY2018 total mandatory appropriations for FWS were $1.46 billion, which was 45% of combined FWS mandatory and discretionary appropriations of $3.27 billion. FS had 22 accounts with mandatory spending authority in FY2018. Of these, 10 had mandatory appropriations each exceeding $5.0 million, with the largest account containing $234.6 million. Agency receipts fund many accounts, although one is supplemented by the General Fund of the Treasury, as needed. Almost all accounts support agency activities, but one is for a compensation program. FY2018 total mandatory appropriations for FS were $705.1 million, which was nearly 10% of combined FS mandatory and discretionary appropriations of $7.29 billion. NPS had 16 accounts with mandatory spending authority in FY2018. Of these, 11 had mandatory appropriations each exceeding $5.0 million; the largest had $301.5 million. Funding sources for the accounts vary, including agency receipts, offshore energy development revenues, District of Columbia payments, the General Fund of the Treasury, donations, and an endowment. Almost all of the accounts support agency activities, but one is for recreation assistance grants to states and another is a compensation program. FY2018 total mandatory appropriations for NPS were $704.9 million, which was 17% of the combined NPS mandatory and discretionary total of $4.16 billion. Source: CRS, based on sources including FY2020 agency budget justifications, which contain FY2018 actual funding levels, and FY2018 appropriations laws, including Division G of P.L. 115-141 , P.L. 115-72 , and P.L. 115-123 and accompanying explanatory statements .", "document_type": "crs"}
{"report": "The retransmission of television signals to subscribers of cable, telephone company (telco), and satellite services has been governed in part by the Satellite Television Extension and Localism Act Reauthorization Act of 2014 (STELA Reauthorization Act; P.L. 113-200 ). Some provisions of this law, which amended the Copyright Act of 1976 and the Communications Act of 1934, were set to expire at the end of 2019. As described in \" Legislation ,\" with the enactment of the Satellite Television Community Protection and Promotion Act of 2019, and the Television Viewer Protection Act of 2019 (Titles XI and X of Division P, respectively, of the Further Consolidated Appropriations Act, 2020 P.L. 116-94 ), Congress permanently extended certain Copyright Act and Communications Act provisions that affect direct broadcast satellite service to viewers in rural areas; limited the ability of separately owned broadcast stations to jointly negotiate with cable and satellite operators over the retransmission of television signals; and affirmed the role of the Federal Communications Commission (FCC) in resolving disputes that could potentially interrupt television service to subscribers of cable, telephone, and satellite services. In addition, Congress amended the Copyright Act to restrict the number of households eligible to receive non-local broadcast television signals via satellite distributors, and encouraged DIRECTV, a satellite operator, to retransmit local broadcast television signals, where available, in all local television markets. Congress amended the Communications Act to permit small video programming service distributors to negotiate collectively with large broadcast station groups, and increase transparency in bills for new customers of video distribution services. To provide context for the current debate, this report provides background information about how households receive television programming, how the television industry operates, and how the Copyright and Communications Acts determine what programs viewers receive. After describing the now-repealed provisions of the copyright act, the report summarizes the provisions of the Copyright and Communications Act enacted by Congress in 2019. Finally, it addresses the relationship between the new provisions and FCC media ownership rules, which the FCC amended in December 2019. A household may receive broadcast television programming through one or more of three methods: 1. by using an individual antenna that receives broadcast signals directly over the air from television stations; 2. by subscribing to a multichannel video programming distributor (MVPD), such as a cable or satellite provider or a telco, which brings the retransmitted signals of broadcast stations to a home through a copper wire, a fiber-optic cable, or a satellite dish installed on the premises; or 3. by using a high-speed internet (broadband) connection. A household may subscribe to a streaming service either that includes broadcast television programming on an on-demand basis, or as a package of prescheduled programming, that is, a \"virtual MVPD\" (vMVPD). As Figure 1 indicates, the total number of U.S. households subscribing to an MVPD has declined over the past 10 years. In 2010, about 104.2 million households subscribed to an MVPD, compared with about 87.4 million households in 2019. In place of MVPDs, an increasing number of households rely on video provided over broadband connections (including vMVPDs) or via over-the-air broadcast transmission. Currently, two direct broadcast satellite providersâDIRECTV and DISHâoffer video service to most of the land area and population of the United States. As of June 2019, DIRECTV had approximately 17.4 million U.S. subscribers, while DISH had approximately 9.5 million U.S. subscribers. Both have lost subscribers since September 2014, when DIRECTV had approximately 20.2 million U.S. subscribers and DISH had approximately 14.0 million U.S. subscribers. The FCC licenses broadcast television station owners for eight-year terms to use the public airwaves, or spectrum, in exchange for operating stations in \"the public interest, convenience and necessity,\" pursuant to Section 310(d) of the Communications Act. In 1952, the FCC formally allocated television broadcast frequencies among local communities. The basic purpose of the allocation plan was to provide as many communities as possible with sufficient spectrum to permit one or more local television stations \"to serve as media for local self-expression.\" Until the mid-1960s, the television audience research firm the Nielsen Company restricted its measurement of television station viewership to the major metropolitan areas that were the first to have broadcast television stations. Among other factors, the station considers the estimated number of viewers it attracts with programs when determining the prices that it can charge advertisers. Thus, station viewership plays a significant role in a station's ability to generate revenue. After hearings in the House of Representatives produced accusations that stations licensed to large cities were pressuring the rating services not to measure audiences of stations licensed to smaller cities, Nielsen began to assign each U.S. county to a unique geographic television market in which Nielsen could measure viewing habits. Nielsen's construct, known as Designated Market Areas (DMAs), has been widely used to define local television markets since the late 1960s. The definitions of DMAs are important in determining which television broadcast signals an MVPD subscriber may watch. Nielsen generally assigns each county to one of 210 DMAs based on the predominance of viewing of broadcast television stations in that county. In addition, Nielsen assigns each broadcast television station to a DMA. Nielsen bases each station's DMA on the home county of its FCC community of license. Stations seek to have their signals reach as many people as possible living within their DMAs. They generally have little incentive to reach viewers living outside their DMAs, as they are typically unable to charge advertisers for access to those viewers. Broadcast stations' contractual agreements with television networks and other suppliers of programming generally give them the exclusive rights to air that programming within their DMAs. Advertisers use DMAs to measure television audiences and to plan and purchase advertising from stations to target viewers within those geographic regions. Figure 2 illustrates the relationships among viewers; broadcast television stations; cable, telco, and satellite operators; cable and broadcast networks; and owners of television programming content. Generally, subscribers to cable, telco, and satellite services may receive television stations located within their DMAs as part of their video packages. Whether or not subscribers do so, however, depends in part on the decisions of broadcast stations to require these services to retransmit their signals or to opt instead to negotiate for compensation. In addition, satellite operators may choose not to provide any local broadcast service in a particular DMA. The Communications Act gives broadcast stations and satellite operators the rights to make these choices. Every three years, commercial broadcast television stations may choose to require cable, telco, and satellite operators to retransmit their signals. By statute, a cable operator or telco must carry the signals of all television stations seeking \"must carry\" status and assigned to the DMA in which the cable operator is located. Satellite operators are required to carry the signals of all stations assigned to a DMA that seek must carry status to viewers in that DMA, if they choose to carry the signal of at least one local television station in the market. Policymakers often call this provision \"carry one, carry all.\" The applicability of these provisions to telcos is uncertain. Due in part to the carry one, carry all provision, DIRECTV has opted not to retransmit any local broadcast television stations in 12 DMAs. They are Alpena, MI; Bowling Green, KY; Caspar-Riverton, WY; Cheyenne, WY/Scottsbluff, NE; Grand Junction, CO; Glendive, MT; Helena, MT; North Platte, NE; Ottumwa, IA; Presque Isle, ME; San Angelo, TX; and Victoria, TX. In lieu of choosing must carry status, commercial broadcasting stations may opt to seek compensation from cable, telco, and satellite operators for carriage of their signals in exchange for granting retransmission consent. In contrast to the must carry laws, which differ for cable and satellite operators, the retransmission consent laws apply to all MVPDs. If a broadcast station opts for retransmission consent negotiations, MVPDs must negotiate with it for the right to retransmit its signal within the station's DMA. In addition, cable operators may negotiate with the station for consent to retransmit the station's signals outside of the station's DMA. However, the contracts that broadcast stations have with program suppliers, such as television networks, may limit the stations' ability to consent to the retransmission of their signals outside of their markets. Most television broadcast stations are part of a portfolio owned by broadcast station groups. Most cable systems are part of multiple-system operations owned by corporations. Negotiations over retransmission consent generally occur at the corporate level, rather than between an individual station and a local cable system. Greater competition among MVPDs has increased the negotiating advantage of broadcast television stations since 1993, when they first had the right to engage in retransmission consent negotiations. At that time, large MVPDs refused to pay broadcast stations directly for retransmission rights. Instead, several broadcast networks negotiated on behalf of their affiliates for alternative forms of compensation. The networks sought carriage of new cable networks owned by their parent companies, and split the proceeds they received from the cable networks with the affiliates. As satellite operators and telcos entered the market in competition with cable operators, broadcast stations could encourage the cable subscribers to switch, and vice versa. Broadcast stations began to demand cash in exchange for carriage. As Figure 3 indicates, the total amount of retransmission fees paid by MVPDs has increased from $0.21 billion in 2006 to $12.38 billion in 2019. The 2019 totals include fees paid by vMVPDs, which did not exist in 2006. Generally, copyright owners have the exclusive legal right to \"perform\" publicly their works, and, as is the case with online distribution of their programs, to license their works to distributors in marketplace negotiations. The Copyright Act limits these rights for owners of programming contained in retransmitted broadcast television signals. The Copyright Act guarantees MVPDs the right to perform publicly the copyrighted broadcast television programming, as long as they abide by FCC regulations and pay royalties to content owners at rates set and administered by the government. In some instances, MVPDs need not pay content owners at all, because Congress set a rate of $0. The Copyright Act contains three statutory copyright licenses governing the retransmission of local and distant television broadcast station signals. Local signals are broadcast signals retransmitted by MVPDs within the local market of the subscriber (\"local-into-local service\"). Distant signals are broadcast signals imported by MVPDs from outside a subscriber's local area. 1. The cable statutory license, codified in Section 111, permits cable operators to retransmit both local and distant television station signals. This license relies in part on former and current FCC rules and regulations as the basis upon which a cable operator may transmit distant broadcast signals. 2. The local satellite statutory license, codified in Section 122, permits satellite operators to retransmit local signals on a royalty-free basis. To use this license, satellite operators must comply with the rules, regulations, and authorizations established by the FCC governing the carriage of local television signals. 3. The distant satellite statutory license, codified in Section 119, permits satellite operators to retransmit distant broadcast television signals. Congress has renewed this provision in five-year intervals. In 2004, Congress inserted a \"no distant if local\" provision, which prohibits satellite operators from importing distant signals into television markets where viewers can receive the signals of broadcast network affiliates over the air. Under the statutory license, cable, telco, and satellite operators make royalty payments every six months to the U.S. Copyright Office, an agency of the Library of Congress. The head of this office, the Register of Copyrights, places the money in an escrow account and maintains the \"Statement of Account\" that each operator files. Congress has charged the Copyright Royalty Board (CRB), which is composed of three administrative judges appointed by the Librarian of Congress, with distributing the royalties to copyright claimants. It also has the task of adjusting the rates at five-year intervals, and annually in response to inflation. For additional information about these licenses, see CRS Report R44473, What's on Television? The Intersection of Communications and Copyright Policies , by Dana A. Scherer. Through a series of laws ( Table 1 ) enacted over the last 30 years, Congress created new sections or modified existing sections of the Copyright Act and the Communications Act to regulate the satellite retransmission of broadcast television and to encourage competition between satellite and cable operators. Congress began the process with the enactment of the Satellite Home Viewer Act of 1988 (SHVA; P.L. 100-667 ), revised it further in several laws leading to the Satellite Television Extension and Localism Act (STELA) of 2010 ( P.L. 111-175 ), and amended the process again with the enactment of the STELA Reauthorization Act of 2014. Most recently, the enactment the Satellite Television Community Protection and Promotion Act of 2019, and the Television Viewer Protection Act of 2019, (Titles XI and X of Division P, respectively, of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 ) permanently extended some legal provisions governing retransmission of distant network broadcast signals, while repealing others. Certain provisions in the STELA Reauthorization Act were set to expire on December 31, 2019. The copyright provision set to expire was Section 119 of the Copyright Act (17 U.S.C. Â§119). This section enables satellite operators to obtain rights to copyrighted programming carried by distant broadcast network affiliates, superstations, and other independent stations. Under this regime, the satellite operators submit a statement of account and pay a statutorily determined royalty fee to the U.S. Copyright Office on a semiannual basis, avoiding the transactions costs of negotiating with each individual copyright holder. A satellite operator is allowed to retransmit the signals of up to two distant stations affiliated with a network (ABC, CBS, FOX, NBC, or PBS) to a subset of subscribing households that are deemed \"unserved\" with respect to that network. The \"unserved household\" limitation does not apply to the retransmission of superstations (see Table 1 , note a). Pursuant to Section 119, satellite operators may retransmit superstations to commercial establishments as well as households. Section 119 specified five different categories of unserved households: 1. a household located too far from a broadcast station's transmitter to receive signals using an antenna; [Section 119(d)(10)(A)] 2. a household that received written consent from a local network affiliate to receive a distant signal; [Section 119(d)(10)(B)] 3. a household thatâeven if it could receive a local broadcast signal over the airânevertheless received a satellite retransmission of a distant signal on October 31, 1999, or whose satellite provider terminated the distant signal retransmission after July 11, 1998, and before October 31, 1999, pursuant to court injunction; [Section 119(d)(10)(C)] 4. operators of recreational vehicles and commercial trucks who complied with certain documentation requirements; [Section 119(d)(10)(D)] 5. a household that received delivery of distant network signals via C-band before October 31, 1999. [Section 119(d)(10)(E)] In 2010, Congress provided an incentive for DISH to offer local-into-local service in all 210 markets with the enactment of STELA. As Table 2 indicates, between 2014 and 2019 the amount of Section 119 royalties collected by the Copyright Office declined by 89%. According to the Register of Copyrights, the decline is due in part to the drop in the number of distant network stations carried and the conversion of non-network superstations, such as WGN, to cable networks. In addition, as Figure 1 indicates, the total number of households subscribing to satellite television declined from about 34.4 million in 2014 to 27.3 million in 2019. Several provisions of the Communications Act were also set to expire at the end of 2019. Some of those provisions cross-reference Section 119 of the Copyright Act. Section 325(b)(2)(B) and (C) of the Communications Act [47 U.S.C. Â§325(b)(2)(B)-(C)] permit a satellite operator to retransmit distant broadcast signals of stations without first seeking retransmission consent from those stations, if the satellite operator is retransmitting the signals pursuant to Section 119 of the Copyright Act. Section 338(a)(3) of the Communications Act [47 U.S.C. Â§338(a)(3)] states that a low-power station whose signals are retransmitted by a satellite operator pursuant to Section 119 of the Copyright Act [17 U.S.C. Â§119(a)(14)] is not entitled to must carry rights. Section 339(a)(1)(A) of the Communications Act (47 U.S.C. Â§339) permits satellite operators to retransmit the signals of a maximum of two affiliates of the same network in single day to households located outside of those stations' DMAs, subject to Section 119 of the Copyright Act. Section 339(a)(1)(B) states that satellite operators may retransmit local broadcast signals under 17 U.S.C. Â§122 in addition to any distant signals they may retransmit under Section 119 of the Copyright Act. Section 339(a)(2)(A) discusses rules for retransmitting broadcast station signals to satellite subscribers meeting the \"unserved household\" definition under Section 119 of the Copyright Act [17 U.S.C. Â§119(d)(10)(C)]. Section 339(a)(2)(D) and (c)(4)(A), in describing households eligible to receive distant signals, cross-reference the \"unserved household\" definition under 17 U.S.C. Â§119(d)(10)(A). Section 339(a)(2)(G) states that \"this paragraph shall not affect the ability to receive secondary transmissions ... as an unserved household under section 119(a)(12) of title 17, United States Code.\" Section 339(c)(2) describes the process under which a household may seek a local affiliate's permission to receive a distant signal, and therefore qualify as an \"unserved household\" under Section 119 of the Copyright Act [17 U.S.C. Â§119(d)(10)(B)]. Section 340(3)(2) of the Communications Act [47 U.S.C. Â§340] states that a satellite operator that retransmits a distant broadcast signal pursuant to 17 U.S.C. Â§119 need not comply with FCC regulations that would otherwise require the satellite operator to black out certain programs of that station. Section 342 of the Communications Act [47 U.S.C. Â§342] cross-references Section 119 of the Copyright Act [17 U.S.C. Â§119(g)(3)(A)(iii)], and describes the process through which DISH may obtain a certification from that FCC demonstrating that it is providing local-into-local service in all 210 DMAs. Under 17 U.S.C. Â§119(g)(3), upon presenting this certification, among other documents, to the Florida district court that had enjoined DISH from using the Section 119 license, DISH would be eligible to use it. (See \" Expiring Provision of Copyright Act .\") Section 325(b)(3)(C) of the Communications Act (47 U.S.C. Â§325(b)(3)(C)) prohibits broadcast stations from engaging in exclusive contracts for carriage. This section also requires both broadcast stations and MVPDs to negotiate retransmission in \"good faith,\" subject to marketplace conditions. Moreover, according to this section, the coordination of negotiations among separately owned television broadcast stations within the same DMA is a per se violation of the good faith standards. The FCC implements the good faith negotiation statutory provisions through a two-part framework. First, the FCC has a list of nine good faith negotiation standards. The FCC considers a violation of any of these standards to be a per se breach of the good faith negotiation obligation. Second, the FCC may determine that based on the \"totality of circumstances,\" a party has failed to negotiate retransmission consent in good faith. Under this standard, a party may present facts to the FCC that, given the totality of circumstances, reflect an absence of a sincere desire to reach an agreement that is acceptable to both parties and thus constitute a failure to negotiate in good faith. Over the last 13 years, both broadcast television station owners and MVPDs have filed complaints with the FCC that their counterparty has failed to negotiate in good faith. In some instances, the FCC has found that the complaint lacked validity. In 2016, the FCC reached a consent decree with Sinclair Broadcast Group after completing an investigation. In other instances, the FCC has monitored retransmission consent negotiations even when a party has not filed a complaint. In some cases, stations and/or MVPDs withdraw complaints from the FCC after reaching retransmission consent agreements. In November 2019, the FCC found that seven different station group owners had violated the per se good faith negotiation standards with respect to AT&T, and directed the parties to commence good faith negotiation. Section 325(b)(3)(C)(iv) directs the FCC to adopt rules that prohibit the coordination of negotiations among separately owned television broadcast stations within the same DMA. Unlike the good faith provisions of the Communications Act, the prohibition on coordination is permanent. Additionally, the FCC has adopted a rule declaring such behavior a per se violation of its good faith negotiation standards. In a related matter, the FCC's rules regarding both the number of stations one entity may own within a DMA and the attribution of that ownership have been in flux. The FCC's ownership rules generally prohibit one company from owning two of the top four ranked stations (usually, stations affiliated with the ABC, CBS, FOX, and NBC networks) within the same DMA. In 2016, the FCC adopted rules specifying that if one television station sells more than 15% of the weekly advertising time on a competing local broadcast television station, it would consider the stations to be under common ownership or control, for the purposes of enforcing its local media ownership rule. In 2017, however, the FCC eliminated this rule as part of a reconsideration of its 2016 decision. In September 2019, the U.S. Court of Appeals for the Third Circuit vacated and remanded the FCC's 2017 reconsideration. On November 29, 2019, the court vacated, as of that date, the rule changes adopted by the FCC in 2017. The FCC issued an order in December 2019 that amended its rules to reflect the court's mandate and clarify which rules remain in effect. The FCC has not publicly stated whether it will seek review of the Third Circuit's decision by the U.S. Supreme Court. Likewise, the FCC has not publicly stated how it will proceed with media ownership rulemaking it initiated in 2018, in light of the court's ruling. On December 20, 2019, President Donald J. Trump signed the Satellite Television Community Protection and Promotion Act of 2019, and the Television Viewer Protection Act of 2019 (Titles XI and X of Division P, respectively, of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 ). These laws amended both the Copyright and Communications Acts. Title XI of P.L. 116-94 permanently extends Section 119 of the Copyright Act, but limits the scope of \"unserved households\" eligible to receive the distant signals to two categories of households. The first category includes operators of recreational vehicles and commercial trucks who have complied with certain documentation requirements. The second category, added by the act, includes households in \"short markets\" in the definition of \"unserved household.\" The act defines a short market as a local market in which programming of one or more of the four most widely viewed television networks nationwide is not offered on either the primary stream or multicast stream transmitted by any network station in that market, or is temporarily or permanently unavailable as a result of an act of god or other force majeure event beyond the control of the carrier. The act also amends the Copyright Act to condition the eligibility of satellite operators to retransmit distant signals via a compulsory copyright license to unserved households on whether or not they retransmit local television signals in all 210 DMAs. After May 31, 2020, satellite subscribers who fall within the two categories of unserved households described above are no longer eligible to receive distant signals pursuant to the compulsory copyright license unless their satellite operator provides local-into-local service. Likewise, the other four categories of households described in \" Expiring Provision of Copyright Act \" are no longer able to receive distant signals pursuant to the compulsory license after May 31, 2020, or until their satellite operator provides local service in all 210 markets, whichever is earlier. The act also specifies that satellite operators will not lose access to the distant compulsory license if their failure to deliver local signals in all 210 markets is due to a retransmission consent impasse. As described in \" Must Carry; Carry One, Carry All ,\" DISH currently does so, but DIRECTV does not. Title X of the act permanently extends portions of the Communications Act set to expire at the end of 2019, while amending others. The following provisions that had been set to expire at the end of 2019 are now permanent: A satellite operator may retransmit broadcast station signals outside of the station's local markets without retransmission consent from those stations, if the operator is retransmitting the signals pursuant to Section 119 of the Copyright Act. Broadcast stations may not enter into exclusive contracts with MVPDs. Broadcast stations and MVPDs must negotiate retransmission consent in \"good faith.\" In the event any party accuses another of failing to negotiate in good faith, the accusing party may petition the FCC to mediate. Joint retransmission consent negotiations by separately owned broadcast stations within the same market constitutes failure to negotiate in good faith. In addition, Title X amended the Communications Act to state that a qualified \"MVPD buying group\" representing smaller cable, telco, and/or satellite operators may negotiate retransmission consent with large broadcast station group owners without violating the good faith requirement. The buying group may represent only cable, telco, or satellite operators with 500,000 or fewer subscribers nationally. The broadcast station owner with whom the qualified MVPD group negotiates retransmission consent must reach more than 20% of the \"national audience.\" This amendment takes effect no later than March 19, 2020, that is, 90 days after the enactment of P.L. 116-94 . As described in \" Good Faith Provisions and FCC Media Ownership Rules ,\" on December 20, 2019, the FCC reinstated the media and ownership rules it had adopted in 2016. Under the reinstated rules, a single company may not own more than one station in a DMA unless eight independently owned stations remain (eight voices test). In addition, stations that jointly sell 15% or more of one another's advertising time count as \"owned\" for the purposes of the FCC's ownership rules. This means that non-top-four stations may not jointly negotiate with a separately owned top-four affiliate that sells its advertising time, if common ownership would violate the FCC's eight voices test. Likewise, two non-top four stations may not jointly negotiate retransmission consent in the same market if common ownership would violate the FCC's eight voices test. The FCC, in measuring the national reach of a broadcast station owner, discounts the number of television households reached within a DMA by a station operating in the Ultra High Frequency (UHF) band by half. In some instances, a station group may reach 20% or fewer households nationally with the \"UHF discount,\" but more than 20% of U.S. households absent the discount. According to estimates from the research firm BIA Advisory Services, as of May 2019, the two companies falling in this category were NBC Universal and Gray Television. Thus, a qualified MVPD buying group could not negotiate with NBC Universal or Gray Television unless the FCC repeals the UHF discount. In some markets, a television company may effectively operate stations under joint sales agreements or shared services agreements without having them count toward the national ownership limit. Thus, depending on how the FCC interprets the good faith provisions, an MVPD with fewer than 500,000 subscribers nationwide might not be able to use a qualified buying group to negotiate for retransmission of stations operated by a company that reaches 20% or more of U.S. households nationwide. It is far less common for a company to operate third-party stations in a market in which it does not own a station than in a market in which it does own a station. There are 93 DMAs in which a third party operates at least one station and owns at least one station. In contrast, there are five DMAs in which a third party operates at least one station but does not own any stations. Nonetheless, as Congress advises the FCC on the implementation of this good faith provision, the role of third-party owners in retransmission consent negotiations remains an issue that may be considered.", "summary": "On December 20, 2019, President Donald J. Trump signed the Satellite Television Community Protection and Promotion Act of 2019, and the Television Viewer Protection Act of 2019 (Titles XI and X of Division P, respectively, of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 ). The act permanently extends some legal provisions governing the retransmission of distant network broadcast signals, while repealing others. In addition, the act permanently extends and changes rules for retransmission consent negotiations between television station owners and operators of satellite and cable systems. Congress enacted the new laws to prevent the expiration at the end of 2019 of provisions of communications and copyright laws related to the retransmission of broadcast television signals by cable operators, telephone companies (telcos), and satellite operators, pursuant to the STELA Reauthorization Act of 2014 ( P.L. 113-200 ). (STELA stands for the Satellite Television Extension and Localism Act.) Congress had repeatedly reenacted several of these temporary provisions over several decades. Copyright Act Provisions Generally, copyright owners have exclusive legal rights to license their works. The Copyright Act limits these rights for owners of copyrights to programming carried by retransmitted broadcast television signals. The act provides for statutory licenses that allow cable, telco, and satellite operators to retransmit television broadcast station signals under certain circumstances, even if one or more owners of the copyrights to the programs carried by those signals do not agree. Section 119 of the Copyright Act, which was due to expire at the end of 2019, allows satellite operators to avoid negotiating with copyright holders of programming that they transmit from outside a subscriber's local area and instead pay a royalty fee to the U.S. Copyright Office. The Copyright Office in turn pays the rights holders. The Satellite Television Community Protection and Promotion Act of 2019 permanently extends Section 119 of the Copyright Act, but limits the types of \"unserved households\" eligible to receive the distant signals. It also requires DIRECTV, a satellite operator, to retransmit local broadcast signals in all 210 U.S. television markets in order to continue using the compulsory copyright license described in this section. Communications Act Provisions Generally, commercial broadcast television stations may either require cable, telco, and satellite operators to carry their signals within the stations' local markets for no fee or demand that the operators negotiate for the right to retransmit the stations' signals within those markets in exchange for a fee. The Television Viewer Protection Act of 2019 made permanent three provisions of the Communications Act. One of the newly permanent provisions permits a satellite operator to retransmit broadcast station signals outside of the stations' local markets without the consent of those stations, if the satellite operator is retransmitting the signals pursuant to Section 119 of the Copyright Act. A second prohibits broadcast stations from entering into exclusive contracts with cable, satellite, or telco operators. The third newly permanent provision of the Communications Act requires all parties to negotiate retransmission consent in \"good faith\" and assigns the Federal Communications Commission (FCC) a mediation role in the event any party accuses another of failing to negotiate in good faith. However, the act specifies that collective negotiation by smaller cable, telco, and/or satellite operators with large station group owners is not a violation of good faith. On the other hand, the Communications Act specifies that joint retransmission consent negotiations by separately owned (as defined by the FCC) broadcasters within the same market is a violation of good faith. In December 2019, the FCC reinstated rules related to the enforcement of its local ownership limits. If a television company that owns a station in a market sells advertising for another station in the same market under an agreement with that station's owner, the FCC attributes ownership of both stations to that company.", "document_type": "crs"}
{"report": "T he economic effects of the Coronavirus Disease 2019 (COVID-19) pandemic has led Congress to consider general fiscal stimulus in the form of tax cuts. Additional stimulus proposals are under consideration. This report discusses tax cuts proposed or enacted during the Great Recession, current enacted provisions, and potential ones, and their potential effectiveness. Several tax cuts were discussed during consideration of fiscal stimulus in response to the Great Recession, and the specific proposal (the American Recovery and Reinvestment Act of 2009, P.L. 111-5 ). This stimulus as enacted included individual tax cuts directed at lower- and middle-income individuals and also included business tax cuts. An earlier fiscal stimulus ( P.L. 110 - 185 ) adopted in February 2008 included rebates and accelerated depreciation (bonus depreciation) for businesses. Some of these types of provisions were included in stimulus tax cut legislation in 2001-2003 and some of the debate centered on the effectiveness of alternatives. Among the tax cuts discussed in 2001 were tax rebates targeted toward lower-income individuals, a speed-up of tax rate reductions for higher-income individuals, a temporary sales tax holiday, a temporary payroll tax holiday, a temporary investment stimulus, corporate tax cuts (primarily repealing the alternative minimum tax), and dividend reductions. The 2001 tax cut included a rebate and the final version of the 2002 tax cut bill included a temporary investment stimulus. President Bush proposed accelerated rate cuts and dividend relief in his stimulus package for 2003. Proposals such as rebates were made by Democratic leaders. Although the economy recovered from the recession, issues of fiscal stimulus arose again in the 109 th Congress in the wake of Hurricane Katrina. The tax stimulus enacted in response included rebates for both low- and middle-income individuals and temporary bonus depreciation for businesses. In February of 2009, Congress passed a much larger package ( P.L. 111-5 ), which included spending and tax cuts. Among tax cuts the single largest provision was a two-year refundable earnings credit, the making-work-pay credit, with a dollar cap that was provided through a change in withholding rather than a rebate. Other tax components targeted lower-income individuals and businesses. The business provisions included a bonus depreciation extension and a carryback of net operating losses. The legislation also extended the Alternative Minimum Tax, which tends to go to higher-income individuals. In December of 2010, along with extending expiring tax cuts (which tended to benefit middle- and higher-income individuals) and unemployment benefits, P.L. 111-312 adopted a temporary two-percentage-point reduction in the payroll tax. As with the making-work-pay credit, its benefits were received in paychecks over time. Unlike the rebate or making-work-pay credit, the payroll tax reduction was not targeted to lower- and middle-income families. Many, but not all, tax cuts that were expiring after 2012 were extended permanently. The payroll tax reduction was not extended, and bonus depreciation was extended for a year. Congress has enacted four measures relating to the coronavirus. The first was an appropriations bill, the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), which provided $8.3 billion in emergency funding for federal agencies to respond to the coronavirus. This measure was followed by two relief measures that contained tax provisions. The Families First Coronavirus Response Act ( P.L. 116-127 ) provided refundable employer tax credits against payroll taxes to compensate for family and medical leave mandated in the bill. The estimated cost is $95 billion in revenue loss along with $10 billion in outlays because the credit is refundable. The bill also had spending provisions that increased the total cost to $191 billion. The Coronavirus Aid, Relief, and Economic Security (CARES) Act ( P.L. 116-136 ) had much larger revenue effects, including a refundable rebate, phased out at high-income levels, of $393 billion ($142 billion in revenue loss and $151 billion in outlays), $229 billion in business tax provisions (primarily increasing the use of net operating losses but including a tax credit for retaining employees costing $55 billion), and a number of minor individual tax provisions costing $11 billion. The bill also provided a delay in the payment of payroll taxes, increasing cash flow by $352 billion in the first two years, which were subsequently offset by later payments. The CARES Act also included another relief provision, the Paycheck Protection Program (PPP), which was structured as a loan for small business that could be forgiven if the business retained workers. The PPP was estimated to cost $377 billion, and it also contained a provision excluding the forgiven loan from being included in income (which the tax law otherwise would have counted as income). The exclusion may be negated by IRS guidance disallowing the deduction of expenses. Although structured as a loan forgiveness, such a program has a similar effect as the employee retention tax credit. The PPP can also be considered as an alternative to unemployment benefits because loan forgiveness is contingent on retaining and paying employees. The CARES Act also had direct spending, transfers, and other deferrals or loans that increased its overall cost to $1.7 trillion; the largest of these provisions in dollar terms was an expansion in unemployment benefits that cost $268 billion. The final bill, The Paycheck Protection Program and Health Care Enhancement Act ( P.L. 116-139 ) did not include tax provisions. It would add $321 billion to the PPP, $62 billion in additional small business loan authority, and $100 billion in health-related spending ($75 billion for health providers and $25 billion for COVID-19 testing). Additional stimulus legislation may be considered, which might include aid to state and local governments and additional funds for the PPP. Effectiveness of a tax cut for short run stimulus purposes is judged by the extent to which the tax cut increases private demand (either consumption or investment spending). A tax cut that is saved will have no short term stimulative economic effect (or long term one, if the cut is financed by a deficit, since increased private saving would be offset by decreased government saving). Thus, in general, tax cuts received by individuals will not be successful as a short-run stimulus if they lead to additional saving, and tax cuts received by firms will not be successful unless they lead to spending on investment (or lead quickly to spending on consumption by shareholders). Because part of a tax cut is saved, no tax cut will be as stimulative as government spending. The following four propositions can generally be supported by economic theory and empirical evidence: (1) Individual income tax cuts directed at lower-income individuals will likely have a larger effect than cuts directed at higher income individuals, other things equal. This distributional effect suggests that the most effective tax cut would be a rebate which is not only a flat amount but specifically directed at lower-income individuals (who did not have tax liability). While payroll and sales taxes are more concentrated among lower-and moderate-income individuals than the normal income tax, they are largely proportional taxes and the bulk of them will still go to middle- and higher-income individuals. Most income tax cuts actually exclude the bottom 44% of the population who do not pay income tax unless they are refundable (as with the February 2008 cut). Similarly, payroll tax cuts exclude 16% of the population who do not pay payroll taxes. Tax reductions enacted in 2001 were concentrated among the upper part of the income distribution as are dividend and capital gains tax reduction. A flat dollar reduction, if refundable, would be more concentrated on lower and middle incomes than tax cuts that reduce rates or allow deductions. (2) There is weak empirical evidence and even weaker theoretical basis that a lump sum tax cut is less likely to be spent than one received in small increments (e.g. through withholding). This effect could make a rebate less effective than alternative individual tax cuts if it were not for the distributional evidence. However, the distributional effect is more solidly grounded in economic theory, and is based on more concrete and extensive empirical evidence. (3) Certain types of temporary tax cuts are likely to be more effective than permanent ones while, in other cases, they are less effective. The most important illustration of this effect is a temporary investment subsidy, but it could also apply to a temporary sales tax holiday or any design where spending is required to obtain the subsidy and is for a limited duration. Otherwise, temporary cuts are likely to be less effective than permanent ones. (4) Corporate tax cuts that do not make new investments more profitable are unlikely to have much effect on investment or consumer spending, especially when the economy is in a recession, and the effect of corporate rate cuts is likely small. The remainder of this report provides a summary of the evidence and economic reasoning supporting these propositions, followed by a brief discussion of current policies. Before discussing these propositions, however, it is important to note the differences between a model where individuals consume based primarily on current income compared to those where individuals consume primarily out of permanent (lifetime) income, because much of the empirical analysis focuses on this issue. Optimal lifetime consumption models imply that consumption is based on permanent income and suggest very little will be spent out of transitory income (because it has little effect on permanent income). Thus, a temporary tax cut, which is the normal mode of a fiscal stimulus, would be ineffective. Extensive empirical investigation has rejected this permanent income model in its pure form and suggests that consumption responds to permanent and current income. Proposition 1: A tax cut directed at lower - income individuals should have a larger effect on spending than one directed at higher - income individuals. Data show that the fraction of income saved rises as income rises. One study found that the savings rate for the top 1% was at least 300 times the average. Arraying families by wealth, another study found that the top 1% saved 37%, the next 9% saved 15%, and the bottom 90% saved 0%. This pattern is far too pronounced to be accounted for by business cycle reasons and cannot be explained by life-cycle patterns and thus implies a departure from the permanent income model of consumption. A saving rate that rises across incomes could be expected even in a permanent income model if each individual has the same permanent saving rate. At any time, some individuals may be earning lower than average amounts and others higher than average amounts. Thus the transitory income would understate permanent income in some cases and overstate it in others. Since more individuals with unusually low incomes would fall into the lower groups (and more with higher incomes into the high groups), some pattern of rising saving rates is expected. But empirically the effect is far too large to be explained by this phenomenon (which can be examined by looking at variations over time for an individual). A rising saving share with income could also arise from life-cycle reasons. Typically income is low in the early years of life, rises during the working career and falls at retirement. If individuals want consumption to be smoother than income, they will save less when they are young and old and have lower incomes, and save more in the middle when they have higher incomes. However, when examining the data, age does very little to explain saving behavior and the patterns of rising saving rates with income persist within age groups. Aside from these empirical observations, there are theoretical reasons to expect that lower-income individuals are likely to spend more of an additional dollar of income than do higher-income individuals, especially in the case of a temporary tax cut, which is the kind of cut normally associated with fiscal stimulus. They may have a lower-lifetime saving rate because social welfare programs are likely to have a higher wage replacement rate during instances of bad luck (e.g., disability) or old age and because they are less likely to wish to leave bequests. Indeed, for some means-tested programs, assets can disqualify an individual from coverage. They may have less information with which to optimize over time and, if they save at all, simply have a target amount (at least in the short run), so that additional income is spent (including temporary income increases). Finally, they are more likely to be subject to liquidity constraints; that is, to prefer to spend more than their earnings and not be able to because they cannot borrow and have no assets. Indeed, permanent income theories suggest that temporary tax cuts for non-liquidity constrained individuals may have virtually no effect, while tax cuts for liquidity constrained individuals will be largely spent. Proposition 2. A tax cut provided through a lump sum payment may be less likely to be spent than one which shows up in withholding, but the evidence is weak. This differential effect (which would not occur in a permanent income model) was pointed out by the Congressional Budget Office (CBO) in its studies of the effectiveness of alternative tax cuts. CBO referred to a comparison of results from two studies that examined the effect of income tax refunds, and of expected rate cuts from pre-announced tax cuts of the early 1980s. Both studies rejected the permanent income model (suggesting some spending effects from a transitory tax cut), but larger effects were found for the rate reductions. There are, however, two reservations about comparing these two events to gain insight into the effects of lump-sum tax cuts versus tax cuts reflected in paychecks over time. First, to the extent that individuals use over-withholding as a means of forcing themselves to save, one would not expect spending to rise when the refund is received, even though it might rise when an unplanned rebate is received. Thus, finding a smaller amount of spending out of a refund than out of tax cuts reflected in paychecks may not be very meaningful. Secondly, the model assumes that individuals were certain that the later phases of the Reagan tax cuts would be received. If there was some uncertainty, however, the fact that spending did not increase until the tax cut was actually received may partially reflect not the failure of the permanent income model, but the lack of certainty about receipt of the cut. If a differential does indeed exist, this effect could make the payroll tax cut (and sales tax holidays) more effective than a rebate. However, these \"lump sum\" effects would have to be offset by the distributional effects discussed in proposition I and supported by considerable empirical evidence. For that reason, it would be difficult to conclude that a payroll tax holiday would be more effective than a rebate directed at low-income individuals. In addition, some evidence on the 2001 and 2008 tax rebates suggested that a large fraction of that rebate was spent. Evidence on the payroll tax cut in 2011 found a smaller share of that tax cut spent than the rebate, but that difference may reflect methodological and distributional differences or differences in economic conditions. Proposition 3. Certain types of temporary tax cuts may be more effective than permanentÂ ones. In general, the permanent income modeling of consumption, even when it does not hold in a pure form, suggests that temporary tax cuts will be less effective than permanent ones, presenting something of a dilemma because tax cuts motivated for fiscal policy reasons need to be temporary (if they are not to hamper long-term growth). However, temporary tax cuts that depend on spending (rather than receiving income) are likely to be more effective in the short run than permanent ones. During a period of slack employment, a payroll or individual income tax cut is simply a temporary windfall which can be spent at any time without any further consequence for the size of the tax cut. But if the tax benefit is triggered by spending, a temporary tax cut will be more effective (just as a temporary sale tends to induce a large response). The most common example is the investment tax credit or a similar subsidy, such as temporary partial expensing of investment, but the same would be true of a temporary sales tax holiday. Although expensing of equipment is no longer an option (as 100% is currently allowed following the 2017 tax cut), investment credits would still be a possible investment incentive. Note that while this feature may make a temporary tax cut more effective than a permanent one, it does not mean that the stimulus is more effective than other alternatives when all factors are considered. Most evidence suggests that investment subsidies have a small effect on investment and that the temporary investment subsidy enacted in 2006 was not very effective. And, it may be particularly difficult to induce investment (even with a temporary subsidy) when excess capacity exists. While firms benefit from the temporary subsidy, they lose the benefit of delaying cash outlays. If investment is insensitive to these cost effects, a subsidy directed at increasing consumption may be more effective even if the latter is not the type where the temporary nature provides a benefit. In the case of the sales tax holiday versus other individual cuts, there may be a substantial implementation lag in arranging the sales tax holiday since sales taxes are imposed by the states, and fiscal stimulus may be applied at the wrong time. Moreover, the anticipation of the holiday should be contractionary. That is, a pre-announced future temporary spending subsidy is initially contractionary. Proposition 4. Corporate tax cuts that do not make new investments more profitable would not have much effect; corporate rate cuts are less effective than investment subsidies. One proposal considered in the past was a repeal of the corporate alternative minimum tax with a refund of existing credits. Such a change does not necessarily make new investment more profitable; indeed, it is possible that new investment may be subject to higher tax burdens under the regular rates than under the lower rates in the AMT. The corporate AMT was permanently repealed after the 2017 tax cut, but other measures of a similar nature might be considered. An extension of net operating loss (NOL) carrybacks was proposed in the 2009 stimulus package and would likely not make investments more profitable although a temporary restoration of NOL carrybacks (which were eliminated in the 2017 tax cut), as well as additional measures to allow benefits of losses was included in proposals to aid businesses severely affected by COVID-19. Economic theory suggests that the investment decision should be driven by its expected profitability. A tax decrease not associated with that profitability should have no effect on investment. Rather, a tax decrease (which increases a firm's cash flow) is more likely to be spent on reducing debt, or paying out dividends. Both choices would not expand aggregate demand. Similarly, a corporate rate reduction, which largely benefits existing capital, would have modest effect compared to a stimulus directed at new investment. There is a potential constraint, however: if the firm does not have access to outside capital or finds outside capital excessively costly, cash flow might have an effect on investment. This effect would be likely, however, to be focused on small firms. There is some empirical evidence of a positive relationship between firm investment and cash flow. However, interpreting this evidence with respect to the effectiveness of a corporate cash flow as a stimulus to investment spending during an economic contraction is hampered by two important reservations. First, in most cases, cash flow is correlated with the productivity of investment and investment growth, and investment may be responding not to cash flow but to investment outlook. Secondly, even if there is some independent effect of cash flow in normal circumstances, then whether an increase in cash flow would induce a firm to make new investments during periods of excess capacity is doubtful. In any case, a choice that is more focused on investment (such as an investment subsidy) would have a more pronounced effect than one that is not. During the period of tight credit now being experienced a net operating loss carryback may have more effect because distressed firms are finding it more difficult to borrow. General corporate rate cuts are less likely to be effective than investment subsidies because they have a smaller \"bang-for-the-buck\" because much of their cost is a windfall that only affects cash flow and not the return to new investment. Since even temporary investment subsidies do not appear to have worked effectively, a corporate rate cut or other provision that primarily affects cash flow would be expected to have a small effect. This evidence on the effectiveness of alternative stimulus methods is reflected in multipliers. A multiplier indicates how much additional output is produced by a given amount of revenue loss or spending increases. For example, a multiplier of 0.5 estimates that a dollar of revenue loss produces $0.50 of additional output, whereas a multiplier of 1.5 indicates that a dollar of revenue loss will produce $1.50 of additional output. Multipliers differ among policies and also depend on how close the economy is to full employment. During the Great Recession, multipliers for a refundable rebate (constituting most of the individual tax relief in the CARES Act) were estimated in a range of 0.4 to 1.22 by the Congressional Budget Office (CBO) and at 1.22 by a private forecaster (Moody's). Net operating loss benefits (constituting most of the business provisions in the CARES Act) were estimated at 0 to 0.4 by CBO and 0.25 by Moody's. Non-tax options, such as direct transfers to individuals and aid to state and local governments had multipliers similar to, or larger than, refundable rebates. CBO estimated multipliers of between 0.4 and 2.1 for direct transfers (such as unemployment) whereas Moody's estimated multipliers between 1.55 and 1.71. Aid to state and local governments has multipliers estimated at 0.4 to 1.8 by CBO and 1.34 by Moody's. The larger multipliers for these options reflected the greater share of the benefit spent. It is possible that standard multipliers do not apply in this recession when consumers face supply constraints that inhibit spending due to the closure of businesses. By contrast, employment has declined very rapidly since March. Some families receiving tax rebates include workers who have lost their jobs or otherwise seen their incomes diminish due to COVID-19. Although only a subset of the population, their rate of spending may be higher than the standard multiplier would suggest. Penn-Wharton Budget Model researchers estimate that the effects of the CARES Act implies a multiplier of 0.4 for the rebates and 0.2 for business provisions. This study assigned similar multipliers of around 0.4 to the PPP and most other provisions but estimated higher multipliers for spending on health and disaster (0.8) and aid to state and local governments (0.7). Even if the CARES Act and other measures enacted to address the effects of the coronavirus are not very effective as stimulus measures, the measures could also be thought of as relief measures more than stimulus measures. For example, if individuals and businesses use payments to pay debt, these payments do not increase spending, but they may help individuals to avoid credit problems and businesses to survive. They may also make it easier for individual and businesses to comply with social distancing measures to help prevent the spread of the coronavirus. ", "summary": "The economic effects of the Coronavirus Disease 2019 (COVID-19) pandemic has led Congress to enact general fiscal stimulus in the form of tax cuts and spending increases. Further stimulus may be considered. This report discusses tax cuts enacted during the Great Recession, as well as those recently enacted and those under consideration. In response to the Great Recession several types of tax cuts were debated as possible fiscal stimulusâwith fiscal stimulus legislation enacted in February 2008 ( P.L. 110-185 ) and a much larger one in February 2009 ( P.L. 111-5 ). Both bills included individual tax cuts aimed at lower- and middle-income individuals, along with business tax cuts. In December 2010, along with an extension of expiring tax cuts, a temporary payroll tax cut was adopted. Many, but not all, tax cuts that were expiring after 2012 were extended permanently. A tax cut for stimulus is more effective the greater the fraction of it that is spent. Empirical evidence suggests individual tax cuts will be more likely to be spent if they go to lower-income individuals, making the tax rebate for lower-income individuals likely more effective than several other tax cuts. There is some weak evidence that tax cuts received in a lump sum will have a smaller stimulative effect than those reflected in paychecks, but this evidence is uncertain. However, studies of the 2001 rebate found that a significant amount of that rebate was spent. While temporary individual tax cuts likely have smaller effects than permanent ones, temporary cuts contingent on spending (such as temporary investment subsidies or a sales tax holiday) are likely more effective than permanent cuts. (Sales tax holidays may, however, be very difficult to implement.) The effect of business tax cuts is uncertain, but likely small for tax cuts whose main effects are through cash flow. Multiplier estimates reflect these considerations. Multiplier estimates from fiscal stimulus enacted during the Great Recession suggest that the most effective tax stimulus provisions in the recent legislation addressing the COVID-19 pandemic were likely the individual rebates, with business provisions having smaller effects. The Paycheck Protection Program and spending and transfer programs were also likely to have larger effects, although some of these demand-side stimulus programs that transferred incomes to individuals may be less effective due to the unique nature of the supply constraints in the current environment. Even if they do not stimulate spending, these measures could also be viewed as relief measures that may help individuals and businesses deal with debt and be more able to comply with social distancing measures designed to prevent the spread of the coronavirus.", "document_type": "crs"}
{"report": "T his report provides an overview of economic and fiscal conditions in the U.S. Virgin Islands (USVI). The political status of the U.S. Virgin Islands and responses to Hurricanes Irma and Maria are not covered in depth here. Fiscal and economic challenges facing the USVI government raise several issues for Congress. First, Congress may choose to maintain oversight of federal policies that could affect the USVI's long-term fiscal stability. Second, Congress may consider further legislation that would extend or restructure long-range disaster assistance programs to mitigate those challenges and promote greater resiliency of infrastructure and public programs. Federal responses to the USVI's fiscal distress could conceivably affect municipal debt markets more broadly. The U.S. Virgin Islands are located about 45 miles east of Puerto Rico and about 1,000 miles southeast of Miami, Florida. The three larger islandsâSt. Croix, St. Thomas, and St. Johnâare home to nearly all of the roughly 105,000 people living in the U.S. Virgin Islands. The USVI capital, Charlotte Amalie, is located on St. Thomas, which is the primary center for tourism, government, finance, trade, and commerce. The Virgin Islands National Park covers about two-thirds of the island of St. John, which is located to the east of St. Thomas. St. Croixâsituated approximately 40 miles south of St. Thomas and St. Johnâis the agricultural and manufacturing center of the USVI. The U.S. Virgin Islands also includes a fourth smaller islandâWater Islandâas well as many other smaller islands and cays. The British Virgin Islands (BVI) are, by and large, east and slightly north of the U.S. Virgin Islands. The southern shore of Tortola, the largest island in BVI, is less than two miles north of the northern shore of St. John, USVI. On his second voyage to the Caribbean in November 1493, Admiral Christopher Columbus and his crew reached the archipelago of the Lesser Antillesâthe string of islands ranging southeast from Puerto Rico. As his ships sailed northwest toward Puerto Rico, they encountered one larger island, which Columbus named Santa Ursula, and saw to the north what they thought were at least 40-odd other islands, which were called \"las once mil VÃ­rgenes.\" Santa Ursula, now known as St. Croix, was described as \"very high ground, most of which was bare, the likes of which no one had seen before or after.\" Over time those islands became known as the Virgin Islands. In the decades following Columbus's voyages, the Spanish crown had nearly sole control over all trade and navigation in the Caribbean. By the mid-1500s, merchants and privateers from France, England, and Holland moved into the region to trade with colonists who chafed at the high prices and narrow restrictions of Spanish imperial rules. Spanish galleons returning to Spain with goods and gold provided an additional motivation to privateers and pirates. The Spanish shifted much of their settlements and operations to the South American mainland and to the larger Caribbean islands, where resources were easier to exploit and defenses were easier to mount. The smaller islands to the east in the Lesser Antilles were thus largely left to others. Control of many of those islands, including the Virgin Islands, shifted back and forth among European powers, as peace treaties settled in Europe seldom applied in the New World. In 1672, the Royal Danish West Indian Company ( Det Kongelige Octroyerede Danske Vestindiske Compagnie ) took control of St. Thomas and set up plantations. The company expanded to St. John (then St. Jan) in 1718 and then purchased St. Croix from France in 1733. Sugar production and export was the primary economic sector during the period of Danish colonial control, although cotton, tobacco, indigo, and other products were also exported. In 1754, the king of Denmark established a free trading policy, which encouraged commercial activity on St. Thomas, sidestepping restrictions imposed by the main European powers of the time. Economic conditions on those islands, however, slowed in the 1830s, and a slave revolt in 1848 led to the abolition of slavery. After 1848, the Virgin Islands' economy slowed for a combination of reasons. Other Caribbean ports attracted more trade, steam-powered ships traveled more directly between North America and Europe, and the expansion of beet sugar production in Europe, Russia, and North America led to lower prices for the cane sugar industry. In 1867, Secretary of State William Seward reached an agreement with Denmark to buy the islands. The Senate, however, declined to ratify the treaty. After other unsuccessful attempts in the first decade of the 20 th century, the U.S. government purchased the islands from Denmark in 1917, after a set of negotiations prompted by concerns that Germany might use the islands to attack American shipping. The U.S. government assumed control of the islands on March 31, 1917, just a week before the United States entered World War I. While the United States acquired the islands for strategic reasons, the islands have not generally served a strategic purpose beyond keeping them out of the control of potentially hostile powers. Naval officers administered the islands after the United States took possession and made important improvements in public health, water supply, education, and social services. Efforts to advance economic development were less successful. In 1931, governance responsibilities were transferred to the U.S. Department of the Interior. In the 1930s, civilian administrators soughtâlargely unsuccessfullyâto revive sugar production and convert failing plantations into smallholder homesteads. The diversion of labor to military projects during World War II led to further declines in agricultural production. After the end of Prohibition in 1933, however, rum distilling became a growing source of manufacturing employment, and taxes on rum have been an important revenue source. Other types of manufacturing once employed significant numbers, but have declined in recent years. Several watch assembly plants started up in 1959, but the last one closed in 2015. A large bauxite processing plant was built on St. Croix in the early 1960s, but closed in 2000 after several ownership changes. Near that site, Hess Oil partnered with a Venezuelan oil company to build a major oil refinery. That refinery, known as HOVENSA, for a time was one of the largest in the world, but closed in 2012. Early efforts in the 1950s to promote tourism were another success, especially after the closing of Cuba to American tourism after the 1959 Cuban Revolution. Tourism remains the major employer and economic activity in the U.S. Virgin Islands. The Revised Organic Act of 1954 (P.L. 83-517) included a provision to rebate, or \"cover over,\" federal excise taxes on goods produced in the Virgin Islands to the island's government. The cover over of federal taxes on rum has been an especially important revenue source. Typical incomes in the USVI are lower than on the U.S. mainland and poverty rates are higher. Median household income in the USVI in 2009, according to the U.S. Census Bureau, was $37,254, about 75% of the mainland estimate of $50,221. Demographic and economic data for U.S. territories are typically less extensive and reported less frequently than for states. Table 1 compares the distribution of household incomes in 2009 for the USVI with the U.S. total. The distribution of household income levels in the USVI is skewed toward lower income brackets compared to U.S. totals. For example, 13.5% of USVI households had incomes below $10,000 in 2009, as compared to 7.8% for the U.S. total. Gross domestic product (GDP) per capita provides another measure of economy activity. GDP is defined as the value of goods and services produced in a given area during a year. While income produced in an area that is repatriated elsewhere is included in GDP, it is excluded from gross national product (GNP), which reflects incomes of area residents. For areas where flows of repatriated earnings are large, GDP may be a flawed measure of local incomes. Data on such flows of repatriated earnings, which may result from tax avoidance or minimization strategies, are difficult to obtain. The European Union added the USVI to a list of \"non-cooperative tax jurisdictions\" in March 2018. The European Council, a body consisting of EU heads of government and senior EU officials, stated that jurisdictions added to the list \"failed to make commitments at a high political level in response to all of the EU's concerns.\" The USVI government called that decision \"unjustified.\" In October 2019, the European Council declined to remove the USVI from the list of noncooperative tax jurisdictions. With those caveats regarding GDP in mind, Figure 1 presents trends in per capita GDP from 2004 through 2015. Florida and Louisiana, which have both been affected by major hurricanes in that time period, are included for comparison. While USVI per capita GDP did not fall during the 2007-2009 Great Recession, it did drop sharply after the demise of the HOVENSA refinery. In recent years, tourism and related trade has been the predominant component of the economy of the Virgin Islands. In years before Hurricanes Irma and Maria, about 1.2 million cruise passengers and about 400,000 airplane passengers arrived each year. Virgin Islands tourist destinations compete with many other Caribbean destinations. Much of the growth in Caribbean tourism has taken place in all-inclusive resorts that rely on low-wage labor, such as in the Dominican Republic. Many hotels and resorts were seriously damaged or destroyed in the September 2017 hurricanes. Employment and tourist arrival data, discussed below, suggest the tourism sector has started to rebound, although that process could take years to complete. Manufacturing, which had played a major role in the Virgin Islands since the 1960s, now plays a minor economic role aside from two rum distilleries, which enjoy extensive public subsidies. Slightly more than 600 people were employed in manufacturing in 2015, mostly in small firms. The Cruzan distillery, which has a capacity to produce about 9 million proof gallons per year, claims a presence in the Virgin Islands since the mid-18 th century. Cruzan was sold to Fortune Brands in 2008, after several changes in ownership. The Diageo distillery, which can produce some 20 million proof gallons per year, was built as part of a 2008 agreement with the territorial government. Diageo is a British multinational corporation specializing in the marketing of alcoholic beverages, which previously operated a distillery in Puerto Rico. A separate agreement between Cruzan and the USVI government was negotiated in 2009. In 2012, the USVI government agreed to modify the Cruzan agreement to increase subsidies, subject to set sales and marketing expense benchmarks. The agreements with the Virgin Islands Government and Diageo and Fortune Brands included an estimated $3.7 billion in subsidies and tax exemptions over 30 years, provided through proceeds of bonds that securitized \"cover-over\" excise taxes on rum sales rebated from the U.S. government and local tax abatements. The agreements also committed the USVI government to provide ongoing production and marketing subsidies paid from cover-over revenues. The agreement bars the USVI government from seeking reductions in rum subsidies. As noted above, federal excise taxes on rum imported into the United States from the USVI and Puerto Rico (PR), or from anywhere else, are \"covered over\" to the PR and the USVI governments. The HOVENSA oil refinery, mentioned above, had been one of the USVI's largest employers, with about 1,200 workers and nearly 1,000 contractors. Since 1998, the refinery operated as a joint venture between Hess Oil and PetrÃ³leos de Venezuela, a petroleum company owned by the Venezuelan government. The refinery suddenly shut down in 2012 after running large losses. While mainland refineries had shifted to natural gas as an energy source, the HOVENSA facility relied on relatively expensive fuel oil. HOVENSA filed for bankruptcy under chapter 11 of the Bankruptcy Code in September 2015. The USVI government received $220 million as part of the agreement to resolve HOVENSA's assets, which was used to cover the government's budget deficit for 2015. Limetree Bay purchased some HOVENSA facilities to build an oil storage facility that initially employed about 80 people and which later expanded to employ about 650 people. A renovation of the HOVENSA refinery complex was reportedly three-quarters complete in late 2019, potentially allowing fuel deliveries in early 2020. Over many decades, agriculture's role in the economy has dwindled to a marginal activity. Most of the island's food supply and essentially all of the molassesâa syrup extracted from sugar caneâused to produce rum is imported. The high cost of electricity in the U.S. Virgin Islands is one factor that hinders economic development. Residential customers pay 40 cents per kilowatt/hour (kWh) or about three times the average cost on the mainland. Commercial electricity rates are approximately $0.47/kWh. Island power systems do not benefit from gas pipelines or electric grids that extend over large areas, thus face higher costs than mainland systems. U.S. Virgin Islands Water and Power Authority (VIWAPA) supplies electrical power and water. The bulk of power generation is fueled by oil and diesel, although initiatives to enable use of propane and natural gas have been under way. For instance, VIWAPA modified some electric generating units to allow them the option to use natural gas, propane, or fuel oil. Expanding the efficient use of renewable sources of electricity, such as wind and solar, may require upgrades in transmission and generation systems. In 2015, renewable sources made up 8% of VIWAPA's peak demand generating capacity. Fiscal challenges facing the USVI government have intensified in recent years. Several news reports in 2017 posed pointed questions about the sustainability of the islands' public debts, which total about $2 billion. Those debt levels, on a per capita or on a percentage of GDP basis, are extremely high compared to other subnational governments in the United States. In addition, the most recent actuarial analysis of public pensions found a net pension liability of about $4 billion. In 2017, the Government Accountability Office (GAO) found that \"more than a third of USVI's current bonded debt outstanding as of fiscal year 2015 was issued to fund government operating costs.\" A 2019 GAO report noted that the USVI government had been shut out of capital markets since 2017, which could hobble its ability to roll over maturing debt. The report also summarized concerns with the solvency of the public pension system, growth prospects, effects of 2017 changes in the federal tax law, and the uncertain status of federal Medicaid funding. Concerns about debt levels had led each of the three major credit ratings agencies to downgrade at least part of the islands' public debts. Others suggested that USVI's public debts would have to be restructured. In August 2017, then-Governor Mapp said that communications with credit ratings agencies had been suspended, which prompted those agencies to drop USVI's credit ratings. The U.S. Virgin Islands and other U.S. territories are not covered by the provisions of the Puerto Rico Oversight, Management, and Economic Stability Act (PROMESA; P.L. 114-187 ). Nonetheless, some credit ratings agencies saw enactment of PROMESA as a sign that Congress and the President could enact future legislation to enable debt adjustments in other territories. Like many state governments, USVI public revenues were severely affected by the 2007-2009 Great Recession. Tourism, the mainstay of the USVI economy, was affected. In turn, government revenues, typically closely tied to economic activity, also fell. In addition, rum subsidy payments doubled from 2006 to 2007 and 2008. As noted above, the closure of the HOVENSA refinery in 2012 resulted in hundreds of lost jobs and a significant contraction of the USVI tax base. In recent years, the islands' government has run structural deficits and has used bond proceeds to cover shortfalls. Kenneth Mapp, who was inaugurated as governor in January 2015, had proposed various fiscal measures intended to reduce or eliminate those deficits. In August 2016, the islands' government took steps to issue bonds, which were to be used to cover financing shortfalls for its FY2017 budget. That issue was postponed until January 2017 and then cancelled. The loss of access to capital markets at reasonable rates left the islands' government with a narrow set of liquidity resources. In January 2017, then-Governor Mapp proposed a series of measures intended to strengthen public finances, including certain tax increases, enhanced revenue collection measures, and reductions in public spending. A package of tax measures, including higher taxes on beer, liquor, sodas, and timeshare rentals, which were part of the governor's proposals, was enacted on March 22, 2017. GAO, in an analysis of debts of U.S. territories, expressed doubts that those fiscal measures would restore access to capital markets or address shortfalls in the funding of public pensions and other retirement benefits. Then-Governor Mapp also had announced that a $40 million revenue anticipation note would soon be issued through Banco Popular, which he contended would provide the USVI government with liquidity through September 2017. It appears that issuance was also suspended. The form of USVI's public debt service, in which many funds are routed through escrow accounts before reaching government coffers, also limits options for USVI policymakers. Governor Albert Bryan Jr., who succeeded Mapp in January 2019, claimed to have stabilized government operations and finances in his first year in office, including by taking steps to reestablish relations with credit rating agencies and enhance transparency of public finances. The USVI was hit by two powerful hurricanes in September 2017, which caused extensive damage from which island residents are continuing to recover. Hurricane Irmaâshown in Figure 2 âwas \"one of the strongest and costliest hurricanes on record in the Atlantic basin.\" Irma passed directly over St. Thomas and St. John on September 6, 2017, causing \"widespread catastrophic damage.\" Two weeks later, on September 20, Hurricane Maria hit St. Croix, before continuing on to devastate Puerto Rico. Figure 3 shows paths and zones of extreme wind speeds for both hurricanes in the vicinity of USVI. In November 2017, the USVI government estimated that uninsured damage from the hurricanes would exceed $7.5 billion. Disaster declarations following Hurricane Irma and Hurricane Maria enabled the USVI government and its residents to receive federal assistance through various provisions of the Stafford Act ( P.L. 93-288 , as amended). Those declarations authorized the Federal Emergency Management Agency (FEMA) to assist local and territory governments, certain private nonprofit organizations, and individuals through grants, loans, and direct aid. FEMA, the U.S. Corps of Engineers, and the U.S. Coast Guard, among other federal agencies, also directly supported disaster response and recovery efforts. Other forms of federal disaster assistance have included loans and grants to individuals and small businesses, including through the Small Business Administration disaster loan program. The USVI government and two hospital authorities received Community Disaster Loans (CDLs) on January 3, 2018. The USVI government CDL totaled $10 million with a term of 20 years. CDLs were designed to provide liquidity to local governments that have suffered revenue declines due to disasters. Estimates based on USVI fiscal data suggest that public revenues were halved after the two hurricanes. Funding for disaster relief has been augmented by several supplemental appropriations. The extent of federal disaster assistance received by the USVI will depend, in part, on how funds provided in response to needs resulting from hurricanes and fires in 2017 are allocated among affected areas. In the Bipartisan Budget Act of 2018 ( P.L. 115-123 ; Â§20301), enacted on February 9, 2018, Congress provided the USVI and Puerto Rico with additional Medicaid funding for the period January 1, 2018, through September 30, 2019. For the USVI Medicaid program, an additional $107 million was provided. Another $35.6 million would be available to the USVI subject to certain Medicaid program integrity and statistical reporting requirements. The federal medical assistance percentage (FMAP) was also raised from 55% to 100% for both the USVI and Puerto Rico Medicaid programs during that interval. On February 4, 2020, House Appropriations Chairwoman Nita M. Lowey introduced H.R. 5687 , an emergency supplemental appropriations bill. Title B of the measure includes provisions that would provide additional resources to territories, including the USVI, through support for child tax credits (and certain expansions of eligibility) and other tax credits, as well as a relaxation on limits on rum cover-over revenues directed to Puerto Rico and USVI. The House passed the measure on February 7, 2020, on a 237-161 vote. The Administration warned it would veto the measure. Hurricanes Irma and Maria damaged an estimated 80% to 90% of VIWAPA's transmission and distribution lines, although power-generating plants were less affected. The U.S. Department of Energy (DOE) estimated that 93% of total USVI customers had their electric power restored by the end of January 2018. According to the U.S. Virgin Islands action plan submitted to and approved by HUD, the energy sector infrastructure needs as a result of the hurricanes totaled nearly $2.3 billion. The U.S. Department of Housing and Urban Development (HUD) allocated $67.7 million (approximately 3%) to the U.S. Virgin Islands from a $2 billion Community Development Block Grant-Disaster Recovery (CDBG-DR) appropriation included in the Bipartisan Budget Act of 2018 ( P.L. 115-123 ) \"to provide enhanced or improved electrical power systems\" for Puerto Rico and the USVI. Governor Bryan reportedly asked HUD to \"acknowledge that the Virgin Islands needs at least $350 million of these funds to make a meaningful impact in strengthening the grid and lowering the high cost of electricity in the Virgin Islands.\" On September 16, 2019, $774 million in mitigation funds (CDBG-MIT funds) were allocated to the U.S. Virgin Islands; however, HUD announced that [T]he grantee is prohibited from using CDBG-MIT funds for mitigation activities to reduce the risk of disaster related damage to electric power systems until after HUD publishes the Federal Register notice governing the use of the $2 billion for enhanced or improved electrical power systems. This limitation includes a prohibition on the use of CDBG-MIT funds for mitigation activities carried out to meet the matching requirement, share, or contribution for any Federally-funded project that is providing funds for electrical power systems until HUD publishes the Federal Register notice governing the use of CDBG-DR funds to provide enhanced or improved electrical power systems. The prohibition on the use of CDBG-MIT funds combined with VIWAPA's cash flow challenges limits VIWAPA's ability to improve resiliency. Without sufficient available funds, VIWAPA is unable to meet federal funding matching requirements in order to make use of eligible mitigation funding from FEMA to permanently harden the electrical power systems. The government of the U.S. Virgin IslandsâVIWAPA's largest customerâhas been slow in providing payment for services. The UVSI legislature, however, moved to appropriate $22.2 million for hospitals to pay outstanding obligations to VIWAPA, among other provisions. Throughout 2018 and 2019, USVI policymakers expressed concerns over VIWAPA's financial stability. For instance, Delegate Stacey Plaskett called on Governor Bryan and USVI Senate President Francis to declare a state of emergency in response to the territory's \"energy crisis.\" In his FY2019 budget proposals, Governor Mapp set forth plans to extend the solvency of the USVI public pension systems. According to those proposals, the projected insolvency of those plans would be postponed from 2024 to 2025. Additional measures, to be outlined in the future, were claimed to suffice to postpone insolvency for three additional years. The FY2019 budget proposals also called for a lifting of a hiring freeze. Additional revenues were expected from expanded federal reimbursement for health programs, along with recovery-related investment activity, although decreased tourist traffic is expected to keep accommodation tax and related collections well below prehurricane levels in FY2019. The USVI economy has relied heavily on tourism and related business activity, which made it more vulnerable to the effects of hurricanes than jurisdictions with more diverse economies. Figure 4 shows employment trends in the tourism-dependent leisure and hospitality sector, the territorial government, the manufacturing sector, and the construction sector. Employment in the leisure and hospitality sector shows a steep decline after Hurricane Marilyn in 1995 and after Hurricanes Irma and Maria in September 2017, after which employment in that sector was halved. Leisure and hospitality employment took about six years to recover to pre-Marilyn levels. Increases in the construction sector offset about half of those losses in 1996 and 1997, presumably due to recovery and reconstruction work. As of December 2019, tourism sector employment has recovered somewhat, but remains well below pre-2017 levels. Construction employment also rose in 2018 and 2019, but that uptick appears much smaller than in the post-Marilyn time period. Moreover, the posthurricane increases in construction-related activity have been small relative to the loss of tourism employment after 2017. Employment in the USVI territorial government declined over the 2010-2014 period, but has remained relatively stable since then. The severity of damage from Irma and Maria, and the subsequent disruption of the USVI tourism industry, suggest that a full economic recovery could take years. Many hotels have remained closed since the hurricanes, although some reopened in 2019. Cruise ship passenger arrivals fell from 1.8 million in calendar year (CY) 2016 to 1.3 million in 2017, but have rebounded somewhat. Air passenger arrivals fell from nearly 800,000 in 2016 to less than 500,000 in 2018. Air arrivals for the first three quarters of CY2019 ran 44% ahead of the same period in 2018. The economic effects of Hurricanes Irma and Maria can also be seen in initial unemployment claims data, shown in Figure 5 . The post-Irma and Maria uptick in late 2017 is more than twice the size of the 2011-2012 upticks near the time of the closure of the HOVENSA refinery. The New York Federal Reserve Bank compared the economic effects of Hurricanes Irma and Maria on the USVI and Puerto Rico, noting that the estimated percentage job loss following those hurricanes (-7.8%) was far greater than the percentage job losses in New York City (-3.3%) during the Great Recession. Researchers report that many young professionals and health care workers have left the USVI for positions on the mainland, which may complicate recovery efforts in the health care sector. Tracking the progress of USVI economic recovery is complicated as many federal statistical programs report fewer data series for U.S. territories than for states. The Virgin Islands Bureau of Economic Research (VIBER), however, reports regularly on economic, tourism, and population trends. The fiscal and economic challenges facing the USVI government raise several issues for Congress. First, Congress may consider further legislation that would extend or restructure long-range disaster assistance programs to mitigate those challenges and promote greater resiliency of infrastructure and public programs. Second, if fiscal pressures on the USVI intensify, Congress might consider a framework similar to that established by the Puerto Rico Oversight, Management, and Economic Stability Act (PROMESA; P.L. 114-187 ). In the past, however, USVI policymakers opposed making PROMESA provisions available to other territories because of concerns about borrowing costs. At present, the USVI lacks access to the federal Bankruptcy Code or other processes for debt restructuring involving judicial processes. Third, Congress might consider proposals to support initiatives to lower energy costs for the USVI. Mainland electrical power generation, to a large extent, has shifted to using more natural gas as a fuel. Construction of a liquefied natural gas (LNG) import facility and accompanying generation plants could lead to lower energy prices and an enhanced capacity to employ renewable energy sources. Other innovative energy technologies might also be used to that end. While VIWAPA has taken some steps to modernize its generating units, some major investments may be required. For example, construction of a LNG facility and further conversions of generating units could lower electricity rates, but would require financial commitments that would likely challenge the fiscal capacity of the USVI government and VIWAPA. Moreover, LNG supply contracts typically extend over decades due to the scale of required investments, arrangements which could be difficult to negotiate given the USVI's fiscal situation. Fourth, Congress may expand oversight of federal agencies that administer disaster assistance programs, including FEMA and HUD, to ensure the timely receipt of assistance by grantees. Several Members of Congress have expressed concerns that funds for federal disaster recovery efforts have been unduly delayed. Congress could also examine the interplay among federal agencies, federal rules and regulations that apply to disaster responses operations, and local governments and nonprofits in affected areas. Fifth, Congress may revisit the structure of the rum cover-over program to assess whether its current structure is appropriately fitted to public purposes. The contractual bar to USVI advocacy of changes in the cover-over program could require Congress to initiate any such alterations. Sixth, Congress may choose to promote economic and social development through a wide range of tax and social program rules, some of which treat USVI differently than states.", "summary": "Fiscal and economic challenges facing the U.S. Virgin Islands (USVI) government raise several issues for Congress. Congress may choose to maintain oversight of federal policies that could affect the USVI's long-term fiscal stability. Congress also may consider further legislation that would extend or restructure long-range disaster assistance programs to mitigate those challenges and promote greater resiliency of infrastructure and public programs. Federal responses to the USVI's fiscal distress could conceivably affect municipal debt markets more broadly. Greater certainty in federal funding for disaster responses and Medicaid could support the USVI economy. The USVI, like many other Caribbean islands acquired by European powers, were used to produce sugar and other tropical agricultural products and to further strategic interests such as shipping and the extension of naval forces. Once the United States acquired the U.S. Virgin Islands shortly before World War I, they effectively ceased to have major strategic importance. Moreover, at that time the Virgin Islands' sugar-based economy had been in decline for decades. While efforts of mainland and local policymakers eventually created a robust manufacturing sector after World War II, manufacturing in the Virgin Islands has struggled in the 21 st century. In particular, the 2012 closing of the HOVENSA refinery operated by Hess Oil resulted in the loss of some 2,000 jobs and left the local economy highly dependent on tourism and related services. A renovation of the HOVENSA complex is reportedly in progress. The territorial government, facing persistent economic challenges, covered some budget deficits with borrowed funds, which has raised concerns over levels of public debt and unfunded pension liabilities. Local policymakers have proposed tax increases and austerity measures to bolster public finances, which currently operate with restricted liquidity. The Government Accountability Office (GAO) expressed doubts that those fiscal measures would restore access to capital markets or address shortfalls in the funding of public pensions. The previous governor, Kenneth Mapp, set forth measures in his FY2019 budget proposals to delay expected public pension insolvency from 2024 to 2025 and promised to outline other measures that would further delay insolvency until 2028. Governor Albert Bryan Jr. succeeded Mapp in January 2019. Damage caused by two powerful hurricanesâIrma and Mariaâthat hit the USVI in September 2017 created additional economic and social challenges. Public revenues, according to estimates based on USVI fiscal data, were halved after the two hurricanes. The USVI economy has relied heavily on tourism and related business activity, which made it more vulnerable to the effects of hurricanes than jurisdictions with more diverse economies. The severity of damage from Irma and Maria, and the subsequent disruption of the USVI tourism industry, suggest that a full economic recovery could take years. Federal disaster assistance has included aid to public institutions, such as long-term loans to the USVI government and two hospitals; loans and grants to individuals and small businesses; and direct operations of the Federal Emergency Management Administration (FEMA), the U.S. Army Corps of Engineers, the U.S. Coast Guard, and other federal agencies. Funding for disaster relief has been augmented by supplemental appropriations. The extent of federal disaster assistance received by the USVI will depend, in part, on how funds provided in response to needs resulting from hurricanes and fires in 2017 are allocated among affected areas. The Bipartisan Budget Act of 2018 ( P.L. 115-123 ; Â§20301), enacted on February 9, 2018, included additional Medicaid funding for the USVI and Puerto Rico through September 30, 2019. The U.S. Department of Housing and Urban Development (HUD) allocated $774 million in mitigation funds (CDBG-MIT funds) to the U.S. Virgin Islands and put restrictions on their use.", "document_type": "crs"}
{"report": "E ach term, the Supreme Court typically hears arguments in one or more cases concerning the rights and status of Indian tribes and their members. Prominent issues addressed by the Sup reme Court in recent terms have included (1) tribes' civil jurisdiction over nonmembers, (2) the scope of tribal sovereign immunity, and (3) termination of Indian parents' rights in adoption cases. The October 2018 term likewise featured several Indian law issues: the Court heard arguments in three significant cases, each of which implicated the complex relationships among tribal, state, and federal laws. In Washington State Department of Licensing v. Cougar Den , the Court upheld a Washington Supreme Court decision permitting a tribe to import fuel without paying state fuel taxes. The right to travel on public highways guaranteed by an 1855 treaty, the Court ruled, included the right to transport goods for sale on the reservation without paying additional taxes to do so. In Herrera v. Wyoming , the Court determined that neither Wyoming's admission into the Union nor the designation of the Bighorn National Forest abrogated an earlier treaty preserving tribal hunting rights. Thus, a tribe member's conviction for exercising those hunting rights in violation of Wyoming state law could not stand. Finally, in Carpenter v. Murphy , the Court reviewed whether Congress disestablished the Muscogee (Creek) reservation more than a century ago, with potential consequences for Oklahoma's ability to prosecute major crimes in the eastern half of the state. However, the eight Justices considering this case have not yet reached a decision, and the case is scheduled to be reargued in the October 2019 Supreme Court term. This report discusses each of these three cases in turn, focusing on analyses of the Supreme Court's interpretive rubric for treaties and relevant legislation, statements about the scope of legislative authority and discussions of legislative intent, and possibilities for future congressional action. On March 19, 2019, the Supreme Court upheld a 2017 Washington Supreme Court decision defending a right-to-travel provision in an 1855 treaty (1855 Yakama Treaty) between the United States and the Yakama tribe against a state attempt to impose a motor fuels tax on a Yakama member. The treaty guaranteed the Yakamas the \"right, in common with citizens of the United States, to travel upon all public highways.\" Cougar Den, Inc. (Cougar Den)âa business owned by a Yakama memberâpurchased and transported motor fuel into the state and resold it to on-reservation retailers. The Washington Supreme Court ruled that the treaty insulated Cougar Den from having to pay a Washington State motor fuels tax on that gasoline. The Supreme Court agreed, though in such a way that the limits of the right-to-travel provision in the 1855 Yakama Treaty may still not be perfectly clear. Nonetheless, this case could affect the interpretation of similar provisions in other treaties, and potentially impact state taxation of other activities both on- and off-reservation. In general, states may tax off-reservation activities of Indian tribes unless an explicit federal law exempts those activities. In 1973, the Court decided Mescalero Apache Tribe v. Jones , holding that New Mexico could impose a gross receipts tax on a tribal ski resort operated on nonreservation land leased from the federal government. According to the Court in Mescalero , \"[a]bsent express federal law to the contrary, Indians going beyond reservation boundaries have generally been held subject to nondiscriminatory state law otherwise applicable to all citizens of the State.\" Although Cougar Den involved a state tax imposed on off-reservation activity similar to the tax the Court upheld in Mescalero , the case arose against a backdrop of states having difficulty collecting taxes on tribal retailers selling goods to non-Indians on Indian reservations, even where courts had upheld the legality of those taxes. Collecting such taxes without tribal cooperation can be challenging because tribal sovereign immunity may defeat suits against a tribe absent tribal waiver or congressional consent. For example, in Moe v. Confederated Salish and Kootenai Tribes , the Supreme Court held that a state could impose record-keeping requirements on tribal retailers to facilitate collecting state taxes from on-reservation cigarette sales to non-Indians. However, in Washington v . Confederated Tribes of Colville Reservation , the Court later held that tribal sovereign immunity barred a state's enforcement action to compel a tribe to remit such taxes. And when Oklahoma later argued in Oklahoma Tax Commission v. Citizen Band Potawatomi Indian Tribe of Oklahoma that \"decisions such as Moe and Colville give . . . [states] a right [to levy a tax] without a remedy [to collect the tax],\" the Court responded by suggesting that states could tax wholesalers, enter into agreements with tribes for collecting the taxes, or secure congressional legislation to require tribes to remit the taxes. A Washington statute imposes a motor fuels tax upon licensed importers who bring large quantities of fuel into the state by way of ground transportation. As of 2018, all 24 Indian tribes in Washington, other than the Yakamas, had negotiated fuel tax agreements under which they would pay the motor fuels tax to the state. The question before the Supreme Court in Cougar Den , then, was whether the 1855 Yakama Treaty forbade a similar tax from being imposed on fuel importation activities by Yakama members, on account of that treaty's protection of tribal members' right to travel off-reservation. Article III of the 1855 Yakama Treaty contains two clauses. The first clause states that \"if necessary for the public convenience, roads may be run through the said reservation; and on the other hand, the right of way, with free access from the same to the nearest public highway, is secured to them.\" The second clause states that the Tribe also has \"the right, in common with citizens of the United States, to travel upon all public highways.\" Some special canons of construction apply when courts interpret Indian treaties. According to the Supreme Court, courts must \"give effect to the terms [of a treaty] as the Indians themselves would have understood them,\" considering \"the larger context that frames the [t]reaty, including 'the history of the treaty, the negotiations, and the practical construction adopted by the parties.'\" Partly because many such treaties (including the 1855 Yakama Treaty) were negotiated and drafted in a language other than the Indians' native language and often involved unequal bargaining power, the Supreme Court has stated that \"any doubtful expressions in [treaties] should be resolved in the Indians' favor.\" However, courts must still take care not to extend treaty language beyond what it was intended to cover. When considering whether the State of Washington could collect a motor fuels tax against Cougar Den, the Washington Supreme Court had to determine whether the right to travel conferred by the 1855 Yakama Treaty was implicated. Ultimately, a majority of that court held that it was: the State of Washington could not enforce its motor fuels tax against Yakama tribal members because that would infringe on the Tribe's treaty-protected right to travel. Specifically, the majority held that, \"in this case, it was impossible for Cougar Den to import fuel without using the highway.\" Under the majority's view, the motor fuels tax constituted an impermissible burden or condition on tribal members' use of the highways to transport their goods, which violated the treaty. In reaching this decision, the majority relied heavily on a decision rendered by the U.S. Court of Appeals for the Ninth Circuit in United States v. Smiskin , which held that a Washington State law prohibiting the transportation and possession of unstamped cigarettes without prior notice to the state impermissibly restricted the right to travel protected by the 1855 Yakama Treaty. The Washington Supreme Court, reviewing the motor fuels tax, interpreted Ninth Circuit precedent to mean that the 1855 Yakama Treaty provision applied to \"any trade, traveling, and importation that requires the use of public roads.\" By contrast, two dissenting state court justices read Ninth Circuit precedent narrowly. Because the fuel tax was directed against trade in a product, not the travel itself, the dissenting justices would have upheld the tax. Washington appealed the Washington Supreme Court's decision to the U.S. Supreme Court, and the High Court granted review on June 25, 2018. In their arguments before the Court, the parties disagreed over the correct interpretation of the 1855 Yakama Treaty. Specifically, the parties disputed how the Yakama would have originally understood the right-to-travel provision. Citing another Ninth Circuit case, Cougar Den argued that the 1855 Yakama Treaty \"guarantees the Yakama Nation and its members the ' right to transport goods to market without restriction .'\" However, the Washington State taxing authority argued for a more literal and narrow interpretation of the treaty language, emphasizing that the right-to-travel provision contains no mention of taxes. In the state's view, because the fuel tax did not restrict tribe members' ability to travel on public highways, and because the 1855 Yakama Treaty \"says nothing about a tax exemption at all,\" the Treaty did not preempt the tax's applicability to tribe members. The Supreme Court handed down its decision on March 19, 2019. By a 5-to-4 vote, the Court affirmed the Washington Supreme Court's decision, thereby prohibiting Washington from assessing its motor fuels tax against Cougar Den. However, there was no majority opinion; though five Justices voted to affirm, Justices Sotomayor and Kagan joined an opinion by Justice Breyer, while Justice Ginsburg joined a separate opinion by Justice Gorsuch. Justice Breyer's opinion noted that the treaty was not written in the tribe's native language, which Justice Breyer declared \"put the Yakamas at a significant disadvantage.\" Justice Breyer contended that, based on precedent going back more than 100 years, courts interpreting an Indian treaty must \"see that the terms of the treaty are carried out, so far as possible, in accordance with the meaning they were understood to have by the tribal representatives\" at the time. Citing the historical record, Justice Breyer explained that the Yakamas would have understood the right to travel as including \"the right to travel with goods for purposes of trade.\" Accordingly, because \"to impose a tax upon traveling with certain goods burdens that travel,\" the motor fuels tax directly burdened Cougar Den's ability to travel with goods for purposes of trade, and thus impermissibly violated the 1855 Yakama Treaty. Justice Breyer also concluded that the tax at issue specifically burdened the type of travel the Yakamas had negotiated to protect: travel by public highway. (Washington's motor fuels tax was not assessed on distributors who imported fuel by pipeline or boat.) Justices Gorsuch, joined by Justice Ginsburg, took a somewhat shorter route to the same conclusion, noting \"unchallenged factual findings\" from an earlier federal district court case that the Yakamas \"understood the right-to-travel provision to provide them 'with the right to travel on all public highways without being subject to any licensing and permitting fees related to the exercise of that right while engaged in the transportation of tribal goods.'\" That factual finding, confirmed by a \"wealth of historical evidence,\" in their view required a ruling for the Yakamas. While five Justices agreed that applying the fuel tax to Cougar Den would violate the 1855 Yakama Treaty, the Court's failure to render an opinion agreed upon by a majority of the Justices leaves some question as to how federal and state courts will construe and apply Cougar Den . To the extent that Justice Gorsuch's opinion rests on somewhat narrower grounds than Justice Breyer's, that may be deemed to be the controlling opinion of the Court. Because it relied on unchallenged evidence of the tribe's understanding of the right-to-travel provision, Justice Gorsuch's opinion leaves open the possibility that other, identical terms in other treaties could be interpreted differently, if there is different evidence about the relevant tribes' understanding. Chief Justice Roberts wrote an opinion on behalf of the four dissenting Justices, objecting that \"the mere fact that a state law has an effect on the Yakamas while they are exercising a treaty right does not establish that the law impermissibly burdens the right itself.\" The Chief Justice's dissent went on to express concern that the plurality and concurring opinions could, for example, foreclose the applicability of \"law[s] against possession of drugs or illegal firearms\" by tribe members on public highways, because tribe members could invoke the treaty-protected right to travel when traveling with such items. The plurality responded to this concern by emphasizing that it did not \"hold that the treaty deprives the State of the power to regulate to prevent danger to health or safety occasioned by a tribe member's exercise of treaty rights.\" The Court's decision in Cougar Den might prompt Congress to further consider the ability of states to enforce and collect valid state taxes from Indian tribes. Cougar Den involved a considerable amount of tax revenue; in December 2013, Washington assessed $3.6 million in taxes, penalties, and licensing fees against Cougar Den. And there are similar right-to-travel provisions in treaties with other tribes, including the Nez PercÃ© Indians of Idaho and the Flathead, Kootenay, and Upper Pend d'Oreilles Indians of Montana. These similarly worded treaties could give rise to future challenges to state taxing authority over tribe members. Moreover, Congress could choose to act in the event legislators believe that Chief Justice Roberts's fears about health and safety laws are well-founded. Because of Congress's plenary authority over Indian matters, only Congress, not a state, could act to limit or eliminate a right granted by treaty. However, if Congress chooses to do so, its intention must be \"clear and plain.\" Cougar Den also might prompt further reflection on the differences between state and federal tax exemptions for tribes. Relying on Supreme Court precedent upholding a tax exemption based on explicit language in the General Allotment Act, the Ninth Circuit, for example, has generally held that an exemption from a federal tax must be explicit. Accordingly, the Yakama tribe is currently not exempt from federal heavy vehicle and diesel fuel taxes or from the federal excise tax on manufactured tobacco products because the right-to-travel provision in the 1855 Yakama Treaty is not sufficiently explicit to exempt the tribe from federal taxes. Legislation could be drafted either to eliminate or to enshrine that different treatment. In Herrera v. Wyoming , the Supreme Court resolved a disagreement about whether either Wyoming's admission into the Union or the later establishment of the Bighorn National Forest abrogated the Crow Tribe of Indians' treaty rights to hunt on \"unoccupied lands of the United States.\" The Court concluded that neither event categorically affected those treaty rights. This decision was especially notable because the Supreme Court formally repudiated its 1896 ruling in Ward v. Race Horse , which had held that Wyoming's admission into the Union effectively abrogated a similar hunting-rights provision in a treaty between the United States and another Indian tribe. Race Horse had already appeared to be in considerable tension with the Court's decision over a century later in Minnesota v. Mille Lacs Band of Chippewa Indians , when the Court declared that \"[t]reaty rights are not impliedly terminated upon statehood.\" However, it was not until Herrera that the tension was resolved; the Court stated that it was \"formaliz[ing] what is evident in Mille Lacs itself. While Race Horse 'was not expressly overruled' in Mille Lacs , 'it must be regarded as retaining no vitality' after that decision.\" This rejection of Race Horse undermined other cases relying on it, causing a domino effect that ultimately led the Supreme Court to reverse the Wyoming state court decisions that had declined to recognize the Crow Tribe's treaty hunting rights. The Herrera case arose after the petitioner, a Crow Tribe member, tracked several elk beyond the Crow reservation's Montana borders into the Bighorn National Forest in Wyoming. Herrera and his hunting companions eventually killed three elk, and Herrera was criminally charged by Wyoming with violating its state hunting laws. Herrera moved to dismiss the charges, arguing that he was exercising subsistence hunting rights long protected by the 1868 Treaty of Fort Laramie (1868 Treaty) between the Crow Tribe and the United States. In exchange for ceding much of the territory that would eventually become Wyoming to the United States, the Crow Tribe received a guarantee of \"the right to hunt on the unoccupied lands of the United States so long as game may be found thereon . . . .\" According to Herrera, this treaty provision provided him with permission to hunt off-reservation in the Bighorn National Forest and prevented Wyoming from going forward with his prosecution under state law. Wyoming disagreed, contending that the hunting rights conferred to Crow Tribe members under the 1868 Treaty were abrogated following Wyoming's 1890 admittance into the Union or, alternatively, the 1897 establishment of the Bighorn National Forest. Rejecting Herrera's claim of treaty protection, the trial court determined it was bound by a 1995 United States Court of Appeals for the Tenth Circuit (Tenth Circuit) decision in Crow Tribe of Indians v. Repsis . That decision held that the 1868 Treaty's hunting-rights provisions had been abrogated for the same reasons as the similarly worded treaty provisions in Race Horse . Alternatively, the Tenth Circuit concluded that the establishment of the Bighorn National Forest in 1897 rendered those lands \"occupied\" and therefore no longer subject to the access rights given to Crow tribal members by the 1868 Treaty. According to the Wyoming court, principles of collateral estoppel prevented Herrera from \"attempting to relitigate the validity of the off-reservation treaty hunting right that was previously held to be invalid\" by the Tenth Circuit. After Herrera was convicted and denied appeal in a higher Wyoming state court, he sought review in the U.S. Supreme Court, which granted his request. A key issue in Herrera concerned the interplay of the Court's prior decisions considering statehood's effect on the continuing viability of treaties between the United States and Indian tribes located within a newly acceded state's territorial boundaries. In Race Horse , the Court had taken the view that Congress's legislative action in admitting a state to the Union abrogated earlier treaties conferring tribal rights to nonreservation lands within the new state's territory. This decision was partly premised on the equal footing doctrineâthe idea that newly admitted states must enjoy sovereignty equal to that of existing states. In Race Horse itself, the Court held that a hunting right in a Shoshone-Bannock treatyâa provision with language identical to the 1868 Treatyâviolated the equal footing doctrine and had been abrogated by legislation admitting Wyoming to the Union. The Supreme Court reasoned that Wyoming's admission to the Union must have impliedly abrogated the treaty right, because \"all the states\" have the power \"to regulate the killing of game within their borders,\" and the language of the Shoshone-Bannock treaty would impermissibly limit Wyoming's power to do so relative to other states. In other words, the \"two facts\" of the treaty's hunting rights and of Wyoming's statehood were \"irreconcilable, in the sense that the two, under no reasonable hypothesis, [could] be construed as co-existing.\" The fact that Congress made no express statement abrogating the Shoshone-Bannock treaty rights did not change that reasoning. As a potentially alternative basis for its decision, the Court explained that because the treaty had been enacted while the land had territory status, it necessarily made only an \"essentially perishable . . . temporary and precarious\" promise, \"intended to be of a limited duration.\" The equal footing doctrine's primacy in federal Indian law was short-lived, however. In United States v. Winans , less than a decade after Race Horse , the Court upheld tribal fishing rights granted to the Yakama tribe under the 1855 Yakama Treaty. The Court specifically concluded that those treaty rights were not displaced by the State of Washington's admission into the Union. According to the Winans Court, The extinguishment of the Indian title, opening the land for settlement, and preparing the way for future states, were appropriate to the objects for which the United States held the territory. And surely it was within the competency of the [nation] to secure to the Indians such a remnant of the great rights they possessed as \"taking fish at all usual and accustomed places.\" Nor does it restrain the state unreasonably, if at all, in the regulation of the right. In short, just as Congress had the power to extinguish tribal title to the land, it had the power to reserve fishing rights to the tribes on nonreservation landâand respecting that preservation of rights was a reasonable restraint on, rather a dramatic curtailment of, state sovereignty. But Race Horse 's holding was not explicitly overruled by Winans , and roughly a century later, Wyoming charged another Crow Tribe member with illegally hunting elk in the Bighorn National Forest (in a case called Crow Tribe of Indians v. Repsis , which predated Herrera's case, but involved similar factual circumstances). The Crow Tribe sought a declaratory judgment in federal court, hoping to resecure the 1868 Treaty hunting and fishing rights. The Tenth Circuit ruled against the tribe, concluding that because the relevant provision of the 1868 Treaty was virtually identical to the one abrogated by the Supreme Court in Race Horse , the Race Horse decision mandated that the treaty rights be considered abrogated by statehood. In so doing, the Tenth Circuit also emphasized Race Horse 's conclusion that the 1868 Treaty granted only \"temporary and precarious\" rights, such that Congress could not have intended them to be binding on a later-created state. A few years after Repsis , the Supreme Court decided Minnesota v. Mille Lacs Band of Chippewa Indians , which involved fishing rights under an 1837 tribal treaty in Minnesota. There, the Court declined to apply Race Horse and rejected its reasoning, at least in substantial part. The earlier decision's equal-footing holding rested on a \"false premise,\" the Court said, and its language about \"temporary and precarious\" treaty rights was \"too broad to be useful.\" Noting that courts \"interpret Indian treaties to give effect to the terms as the Indians themselves would have understood them,\" the High Court explained that \"Congress may abrogate Indian treaty rights, but it must clearly express its intent to do so.\" Since there was no \"clear evidence\" of Congress's intent to abrogate the tribal fishing rights at issue, those rights simply were not abrogated. In the view of the Court, \"[t]reaty rights are not impliedly terminated upon statehood.\" Although highly critical of Race Horse , the Court majority in Mille Lacs did not expressly overrule the earlier decision (though Chief Justice Rehnquist, writing in dissent, accused the majority of overruling Race Horse \" sub silentio ,\" via \"a feat of jurisprudential legerdemain\"). Thus, when Herrera came before the Supreme Court, the question of whether Race Horse would affect the outcome was a point of disagreement between the parties. Herrera argued that \" Mille Lacs forecloses any suggestion that Wyoming's admission terminated the Tribe's treaty hunting rights.\" Wyoming disagreed, arguing that at least one aspect of Race Horse remained good lawânamely, its recognition that rights conferred to tribal members by treaty may be only of a \"temporary and precarious nature,\" so that the \"the proper inquiry is whether Congress intended . . . [those] rights to be perpetual or to expire upon the happening of a clearly contemplated event, such as statehood.\" According to Wyoming, Mille Lacs did not disturbâand indeed, reaffirmedâthis aspect of Race Horse , which allowed for the conclusion that statehood terminates such temporary rights. Ultimately, the Supreme Court rejected Wyoming's arguments by a 5-4 vote. Writing for the Court majority, Justice Sotomayorâjoined by Justices Ginsburg, Breyer, Kagan, and Gorsuchâacknowledged that Race Horse \"relied on two lines of reasoning\"ânamely the equal footing doctrine and the \"temporary and precarious\" nature of certain treaty rights. The Court determined that Mille Lacs had \"undercut both pillars of Race Horse 's reasoning,\" and \"methodically repudiated that decision's logic.\" \"[T]he crucial inquiry for treaty termination analysis\" established by Mille Lacs \"is whether Congress has expressly abrogated an Indian treaty right or whether a termination point identified in the treaty itself has been satisfied.\" Unless the legislation granting statehood \"demonstrates Congress's clear intent to abrogate a treaty\" or statehood is mentioned in the treaty itself as a termination point, \"[s]tatehood is irrelevant\" to treaty termination analysis. Applying the Mille Lacs test to Herrera's case thus involved two questions: (1) Did the Wyoming Statehood Act \"show that Congress intended to end the 1868 Treaty hunting right\"? and (2) Was there any evidence \"in the treaty itself that Congress intended the hunting right to expire at statehood\"? The Supreme Court concluded that the answer to both questions was \"No\"âthere was \"simply . . . no evidence\" in either the Wyoming Statehood Act or in the treaty itself that Congress intended the Crow Tribe's hunting rights to end at statehood. Herrera faced an additional procedural hurdle at the Supreme Court: the parties disagreed over whether he should even be legally allowed to raise his arguments in the first place. The Wyoming state courts had ruled that the Tenth Circuit's 1995 decision in Repsis barred Herrera from even being able to litigate the question of whether the Crow Tribe retained any off-reservation hunting rights under the 1868 Treaty. In short, they said that question had already been answered. Thus, much of the briefing at the Supreme Court focused on issue preclusion, a doctrine that prevents parties from resurrecting an issue already directly decided in a previous case. Both Herrera and the United States as amicus curiae argued that preclusion should not apply when there had been an intervening change in the law, like the Supreme Court's Mille Lacs decision. Wyoming, however, maintained that Mille Lacs had not overruled Race Horse in its entirety, and that at least one line of its reasoning survived: in Wyoming's view, issue preclusion should at least attach to the Tenth Circuit's finding in Repsis that the 1868 Treaty rights were only temporary . In other words, Wyoming argued that Herrera should not be permitted to relitigate the issue of whether Congress intended the 1868 Treaty's hunting rights to be \"temporary\" rights that expired after statehood because the Tenth Circuit had already definitively answered that question. For the same reasons that the Supreme Court disagreed that statehood had necessarily abrogated Herrera's treaty rights, it likewise rejected Wyoming's claim of issue preclusion. Mille Lacs constituted a \"change in law\" that justified \"an exception to preclusion in this case.\" \"At a minimum,\" the Court said, \"a repudiated decision does not retain preclusive force.\" Having decided that the 1868 Treaty's hunting rights provision remained in effect even after Wyoming statehood, the Court then needed to decide whether the Bighorn National Forest should be considered \"unoccupied\" land under the terms of the treaty. The Tenth Circuit in Repsis had concluded that the establishment of the national forest in 1897 rendered the land \"occupied\" by the federal government because it was \"no longer available for settlement,\" and the resources from the land could not be used \"without federal permission.\" Wyoming similarly argued that \"[c]reation of the Bighorn National Forest was an act of occupation, placing that land outside of the ambit of the Crow Treaty right\"; in the state's view, because the national forest \"is federal property, and the United States decides who may enter and what they may do,\" the national forest should constitute occupied land on which the 1868 Treaty would grant no special privileges. On the other hand, Herrera contended that the text and historical record of the 1868 Treaty demonstrate an understanding by the parties that \"the term 'occupied' entailed actual, physical settlement of the land by non-Indian settlers.\" The United States, writing as amicus curiae, agreed. Herrera and the United States noted that, in other cases, the declaration of a national forest had led courts to declare the designated land \"open and unclaimed.\" The Supreme Court reiterated that provisions of treaties with tribes must be interpreted as they would naturally have been understood by the tribes at the time those treaties were executed. In this case, the Supreme Court concluded \"it is clear that the Crow Tribe would have understood the word 'unoccupied' to denote an area free of residence or settlement by non-Indians.\" That conclusion was based on analysis of the treaty's text, which used variations of the words \"occupy\" and \"settle\" at various points, and supported by both contemporaneous dictionary definitions and historical evidence from the time of the treaty negotiation and signing. Accordingly, \"President Cleveland's proclamation creating Bighorn National Forest did not 'occupy' that area within the treaty's meaning. To the contrary, the President 'reserved' the lands 'from entry or settlement.'\" The majority opinion in Herrera noted that its scope was limited in two distinct ways. First, the majority held only \"that Bighorn National Forest is not categorically occupied, not that all areas within the forest are unoccupied.\" This leaves open the possibility that some parts of the Bighorn National Forest contain enough indicia of settlement to be considered \"occupied,\" even though the rest of the forest is notâwhich would preclude exercise of Crow tribal hunting rights in those areas. Second, the Supreme Court declined to consider arguments that Wyoming could regulate the exercise of hunting rights to promote conservation purposes. Because those arguments were not considered by the state appellate court, the Supreme Court did \"not pass on the viability of those arguments\" in its opinion. That may leave open another avenue by which Wyoming could limit the exercise of tribal hunting rights within its borders. A dissent written by Justice Alito was joined by the remaining three members of the Court. The four dissenting Justices would have determined that the Tenth Circuit's decision in Repsis (\"holding that the hunting right conferred by [the 1868 Treaty] is no longer in force\") was still binding, such that \"no member of the Tribe will be able to assert the hunting right that the Court addresses.\" In other words, the dissent would have started with the parties' issue preclusion arguments, and would have determined that Herrera had no right to relitigate an issue that had already been settled by a court. More specifically, although the dissent expressed some doubt that Mille Lacs represented a sufficient change in the law to foreclose Repsis 's conclusion that Wyoming statehood abrogated the 1868 Treaty rights, it would not have reached that question. Instead, the dissent would have given preclusive effect to Repsis 's alternate legal conclusion, which it says existed independently of Race Horse ânamely, that the Repsis court decided the Bighorn National Forest was not \"unoccupied\" within the treaty's meaning. Congress's plenary authority to govern interactions with Indian tribes remains clear. Congress may at any time expressly disavow any provision of the 1868 Treaty, or may plainly reaffirm its commitment to any Indian treaty that remains in effect. To the latter end, Congress could, if it wished, clarify that the Bighorn National Forest (or other national forests) should be treated as unoccupied lands for the purposes of construing Indian treaty rights. By contrast, Congress could also choose to broadly abrogate hunting and fishing rights in national forests or other areas, but Herrera reaffirms that if Congress does so, it must clearly state that intention. In Carpenter v. Murphy , the Supreme Court is reviewing a decision by the U.S. Court of Appeals for the Tenth Circuit (Tenth Circuit) concerning whether Oklahoma could legally charge and convict Patrick Murphy, a member of the Muscogee (Creek) Nation who was convicted of killing a fellow tribe member. The validity of Murphy's murder conviction may turn on whether his crime was committed within the boundaries of the Muscogee (Creek) reservationâa reservation that Oklahoma says ceased to exist in the early 1900s. Although the Oklahoma state courts rejected Murphy's efforts to overturn his conviction, the Tenth Circuit concluded that the crime did occur on reservation land, and that Oklahoma thus lacked authority to prosecute Murphy. Although the Supreme Court heard oral arguments in Carpenter v. Murphy at the end of 2018, it ordered the case restored to the calendar and set for reargument in the October 2019 term. Whether the Court will ultimately agree with the Tenth Circuit's decision is uncertain, but if it does, the decision could have significant consequences beyond Murphy's case. The land where the crime occurred would then be \"Indian country\" under federal law, which Oklahoma says would significantly limit its criminal jurisdiction over offenses committed by Indians on such land. Such a decision could prompt additional litigation concerning the status of other tribal lands within Oklahoma. The parties have asked the Supreme Court to decide whether the land that was historically designated as belonging to the Muscogee (Creek) Nation constitutes \"Indian country,\" and if so, whether Oklahoma has any criminal jurisdiction over crimes like Murphy's. The federal government (and Congress in particular) has long been recognized as having plenary authority over Indian affairs, so states generally cannot exercise criminal jurisdiction over Indians in \"Indian country\" without federal permission. A federal statute defines \"Indian country\" to mean (1) all land within an Indian reservation, (2) all dependent Indian communities, and (3) all Indian allotments that still have Indian titles. An area qualifies as Indian country if it fits within any of these three categories, meaning a formal designation of Indian lands as a \"reservation\" is not required . Federal law establishes parameters for when states may prosecute certain crimes committed within Indian country. Most relevant to this case, the Major Crimes Act reserves federal jurisdiction over certain serious crimes, like murder and kidnapping, when committed by an Indian within Indian country. Federal jurisdiction under the Major Crimes Act generally forecloses overlapping state (though not tribal) jurisdiction, though legislative exceptions permit some states to exercise jurisdiction over such crimes. The Supreme Court has explained that Congress alone has the power to change or erase reservation boundaries. Once land is designated as a reservation, it generally stays that way until Congress eliminates (\"disestablishes\") or reduces (\"diminishes\") it. Appealing his state murder conviction to the Tenth Circuit, Murphy contended that the Muscogee (Creek) reservation had never been disestablished and therefore constituted \"Indian country,\" precluding state jurisdiction over his offense. The Tenth Circuit agreed. In its decision, the Tenth Circuit briefly described the history of the Muscogee (Creek) reservation. In the 1820s, the federal government forcibly relocated the tribe's members (and members of several other tribes) to what is now present-day Oklahoma. As part of that relocation, the government signed a series of treaties with the Muscogee (Creek) Nation, ultimately giving the tribe a vast area of land roughly equivalent to present-day Oklahoma. That tract of land was later reduced. The final reduction occurred after the Civil War, when the Treaty of 1866 required the Muscogee (Creek) Nation to transfer the western half of its new lands back to the United States. Though the Muscogee (Creek) Nation later experienced many changes in its relationship with the federal governmentâmost notably related to tribal governance and a push for individual ownership of the landâthe boundaries of the Muscogee (Creek) land remained generally unchanged until at least the early 1900s. At that point, the \"unique history\" of Oklahoma began to transition toward statehood, effectively merging eastern Indian lands and western non-Indian lands into a single geographic entity. To determine whether Congress intended to disestablish the Muscogee (Creek) reservation land, the Tenth Circuit applied a three-step analysis employed in the Supreme Court's 1984 decision, Solem v. Bartlett . Under this framework, courts examine (1) the language of the governing federal statute; (2) the historical circumstances of the statute's enactment; and (3) subsequent events such as Congress's later treatment of an affected area. Importantly, the Solem framework instructs courts to resolve any uncertainty in favor of the tribes: if the evidence is not clear, courts \"are bound by our traditional solicitude for the Indian tribes to rule that diminishment did not take place and that the old reservation boundaries survived . . . .\" Using this framework, the Tenth Circuit agreed with Murphy that his criminal conduct occurred in Indian country, and Oklahoma therefore lacked jurisdiction over it. Although Oklahoma referenced eight separate federal acts that it viewed as collectively disestablishing the Muscogee (Creek) reservation, the Tenth Circuit ruled that none of those statutes clearly referred to disestablishment, and in some instances reflected Congress's continued recognition of the reservation's borders. Oklahoma's evidence that Congress intended to change its governance over the Muscogee (Creek) reservation failed to convince the Tenth Circuit that Congress also intended to erase the reservation boundaries. Similarly, the Tenth Circuit concluded that events subsequent to legislation cited by Oklahoma insufficiently supported the argument that Congress intended the Muscogee (Creek) reservation to be disestablished. In sum, the Tenth Circuit did not find that Congress clearly intended to disestablish the Muscogee (Creek) reservation, so it concluded that Oklahoma lacked jurisdiction to convict Murphy for a murder occurring on those lands. Oklahoma petitioned for certiorari review of the Tenth Circuit's decision, which the Supreme Court granted on May 21, 2018. In its brief to the Court, Oklahoma claimed that no one has treated the relevant land like a reservation since Oklahoma became a state in 1906. It also argued that because Congress broke certain promises in the treaties that had established the reservation, Congress must have intended to disestablish it. According to Oklahoma, it \"is inconceivable that Congress created a new State by combining two territories while simultaneously dividing the jurisdiction of that new State straight down the middle by leaving the former Indian Territory as Indian country.\" In other words, in Oklahoma's characterization of the matter, Congress could not have intended the state to lack jurisdiction over major crimes in half its land mass. Finally, Oklahoma contended that the Solem framework should be inapplicable in the unique context of Oklahoma statehood. The federal government made similar arguments in a brief it filed in support of Oklahoma. However, the federal government additionally claimed that Congress had elsewhere granted Oklahoma broad criminal jurisdiction over Indian country, which it said should enable prosecution of cases like Murphy'sâregardless of whether his crime was committed in Indian country. More specifically, the United States argued that Congress had eliminated tribal jurisdiction and evinced an intent to have all crimes prosecuted by the same entity (whether committed by or against a tribal member or not) throughout the territory that became Oklahoma; in the United States' view, that intent should not be \"implicitly\" repealed by later statutes like the Major Crimes Act. Following oral argument, the Supreme Court ordered both Oklahoma and Murphy to address whether or not Oklahoma would have criminal jurisdiction over cases like Murphy's if the crimes were found to have been committed in Indian country. It also asked the parties to address whether a reservation could ever not qualify as Indian country. These questions might be relevant if, for example, the Court sought additional information to clarify whether it would need to find that the Muscogee (Creek) reservation had been disestablished in order to conclude that Oklahoma could exercise jurisdiction over Murphy. In Murphy's supplemental brief, he began by stressing that Oklahoma had disavowed the argument that it could exercise criminal jurisdiction over him if the Muscogee (Creek) reservation endured. Murphy then argued that Congress has never given Oklahoma jurisdiction to prosecute crimes committed by Indians, andâanticipating the assertion that several statutes could be read together to implicitly accomplish that resultâdeclared that \"when Congress transfers jurisdiction to States, its statutes are bell-clear.\" None of the statutes mentioned by the United States in its briefing, Murphy argued, do anything like clearly grant criminal jurisdiction over tribes and tribal members to the State of Oklahoma. Oklahoma adopted the United States' view that it had jurisdiction to prosecute crimes regardless of the Muscogee (Creek) land's status, based on a series of laws passed by Congress between 1897 and 1907. However, the state asked the Court not to \"leave open whether [Muscogee (Creek) and other historical territories] constitute Indian reservations today,\" arguing that such a decision \"risks undermining the convictions of many federal prisoners\" and \"may also undermine federal and tribal authority currently exercised on restricted allotments and trust lands.\" Both Murphy and Oklahoma answered the Court's second question in the negative: they agreed, under current law a federally established reservation always constitutes \"Indian country\" under the governing statute. The Supreme Court heard oral arguments in this case on November 27, 2018. Justice Gorsuch was not present at oral arguments and is not slated to participate in deciding the caseâpresumably because he participated in earlier discussions about this case while he was still a judge on the Tenth Circuit. A decision was expected by the end of the Supreme Court's 2018 term, but on June 27, 2019, the Court ordered this case restored to the calendar for reargument in the next term. If the Supreme Court reverses the Tenth Circuit and finds that the Muscogee (Creek) reservation was disestablished, Murphy's conviction and death sentence would be reinstated, and Oklahoma would presumably continue to prosecute cases like Murphy's. But if the Supreme Court agrees with Murphy and the Tenth Circuit that the Muscogee (Creek) reservation has not been disestablished, the decision's ramifications for federal, state, and tribal jurisdiction in the eastern half of Oklahoma might be significant, and could extend well beyond the Muscogee (Creek) reservation. In addition to the Muscogee (Creek) Nation, several other tribes were forcibly relocated to Oklahoma under similar circumstances and under the same or similar treaties. The parties in Murphy filed a joint appendix containing several historical maps depicting reservation boundaries in Oklahoma in the early 1900s. Oklahoma has argued that, if those statutes did not disestablish the Muscogee (Creek) reservation, similar arguments could be maintained with respect to other lands comprising most of eastern Oklahoma. If the Supreme Court agrees with the Tenth Circuit that Congress never disestablished reservations like the one in this case, Oklahoma argues that its ability to prosecute many crimes in the eastern part of the state would be significantly narrowed. According to Oklahoma and some amici, the Tenth Circuit's decision \"would create the largest Indian reservation in America today . . . . That revolutionary result would shock the 1.8 million residents of eastern Oklahoma who have universally understood that they reside on land regulated by state government, not by tribes.\" If a significant part of Oklahoma is Indian country, then the burden would shift to the federal and tribal governments to prosecute many offenses involving Indian offenders or victims âat least, absent other federal statutory authority allowing the state to prosecute. However, other amici have joined Murphy in arguing that the Tenth Circuit's decision should be upheld. Some, including the Muscogee (Creek) Nation, contend that recognition of the Muscogee (Creek) reservation's continued existence would leave intact most state and local functions on those lands. For example, the Muscogee (Creek) Nation argues that even on reservation land, state and local governments retain most civil jurisdiction, including taxing and zoning authority. The Supreme Court might also seek to avoid the question of whether the Muscogee (Creek) reservation still exists. For example, the Supreme Court could decide either to reassess the approach it endorsed in Solem , orâas suggested by Tenth Circuit Chief Judge Tim Tymkovichâconclude that the Solem framework is ill-suited to the unique circumstances surrounding Oklahoma's statehood. Alternatively, the Court could adopt the federal government's argument that Oklahoma had jurisdiction to prosecute Murphy because earlier statutes granted such jurisdiction, thereby rendering the Major Crimes Act inapplicable. Regardless of the Supreme Court's decision, the choice to disestablish a reservation still lies solely with Congress. If the Supreme Court agrees that the Muscogee (Creek) reservation still exists, a statute clearly disestablishing it would limit this case's applicability in the future. Congress could also pass a law expressly giving Oklahoma jurisdiction to prosecute major crimes in Indian country if the Supreme Court holds that no such law currently exists. If the Supreme Court disagrees with the Tenth Circuit and holds that the Muscogee (Creek) reservation no longer exists, Congress couldâdepending on the exact grounds of the rulingâcountermand that decision by reestablishing or clarifying the continued existence of the Muscogee (Creek) reservation.", "summary": "Each term, the Supreme Court typically hears arguments in one or more cases concerning the rights and status of Indian tribes and their members. Prominent issues addressed by the Supreme Court in recent terms have included (1) tribes' civil jurisdiction over nonmembers, (2) the scope of tribal sovereign immunity, and (3) termination of Indian parents' rights in adoption cases. The October 2018 term likewise featured several Indian law issues: the Court heard arguments in three significant cases, each of which implicated the complex relationships among tribal, state, and federal laws. In Washington State Department of Licensing v. Cougar Den , the Court upheld a Washington Supreme Court decision permitting a tribe to import fuel without paying state fuel taxes. The right to travel on public highways guaranteed by an 1855 treaty, the Court ruled, included the right to transport goods for sale on the reservation without paying additional taxes to do so. In Herrera v. Wyoming , the Court determined that neither Wyoming's admission into the Union nor the designation of the Bighorn National Forest abrogated an earlier treaty preserving tribal hunting rights. Thus, a tribe member's conviction for exercising those hunting rights in violation of Wyoming state law could not stand. Finally, in Carpenter v. Murphy , the Court reviewed whether Congress disestablished the Muscogee (Creek) reservation more than a century ago, with potential consequences for Oklahoma's ability to prosecute major crimes in the eastern half of the state. However, the eight Justices considering this case have not yet reached a decision, and the case is scheduled to be reargued in the October 2019 Supreme Court term.", "document_type": "crs"}
{"report": "The U.S. government's Visa Waiver Program (VWP) allows eligible nationals from 39 countries to enter the United States for stays of fewer than 90 days for tourism or business purposes without applying for a visa from a U.S. embassy or consulate (see Figure 1 ). Originally established in 1986 as a pilot program, the VWP was made permanent in 2000. VWP countries now account for the largest group of visitors to the United States other than travelers from neighboring Canada and Mexico. In FY2018, 22.8 million VWP visitors were admitted to the United States, the largest number of people ever to enter under the program in a single year, up almost 30% from 17.6 million in FY2008. Countries that want to join the VWP must meet strict criteria, including signing on to information-sharing agreements, issuing tamper-proof travel documents, and upholding security standards at their borders. Travelers from VWP countries are not automatically guaranteed admission into the United States. Every VWP traveler must obtain preclearance to board a flight or ship to the United States through the Electronic System for Travel Authorization (ESTA). This web-based application checks the traveler's information against relevant law enforcement and security databases and determines eligibility for travel under the VWP. In addition, as with all international travelers, Customs and Border Protection (CBP) officers may deny entry to a VWP traveler upon arrival. This report offers an overview of the VWP. It discusses the potential effects on national security and considers the likely economic effects on the U.S. travel and tourism industries if more countries were to be added to the program. The report also reviews legislative proposals in the 116 th Congress related to the expansion and implementation of the VWP, and legislation targeting U.S. travel promotionâânamely the Brand USA program, which is partially funded by ESTA. The Department of Homeland Security (DHS), in consultation with the Department of State (DOS), has the authority to designate participants into the VWP. The Secretary of State must formally make the nomination; DHS then conducts a final review and certifies that the aspiring participant meets all the requirements. To be eligible, a country must comply with an extensive list of conditions specified in several different laws. It must offer reciprocal privileges to U.S. citizens; have had a nonimmigrant visitor visa refusal rate of less than 3% for the previous year or a lower average percentage over the previous two fiscal years; issue electronic, machine-readable passports that contain a biometric identifier (known as e-passports ); certify that it issues tamper-resistant, machine-readable visa documents that incorporate biometric identifiers, which are verifiable at the country's port of entry; certify that it has in place mechanisms to validate machine-readable passports and e-passports at each port of entry; enter into an agreement with the United States to report or make available through INTERPOL information about the theft or loss of passports no later than 24 hours after a theft or loss is reported to the VWP country; certify, to the maximum extent allowed under its laws, that it is screening each foreign national who is admitted or departs, using relevant INTERPOL databases and notices, or other means designated by the Secretary of Homeland Security (this requirement only applies to countries that have an international airport); accept the repatriation of any citizen, former citizen, or national against whom a final order of removal from the United States is issued no later than three weeks after the order is issued; enter into and fully implement an agreement with the United States to share information regarding whether a national traveling to the United States represents a threat to U.S. security or welfare; and be determined, by the Secretary of Homeland Security, in consultation with the Secretary of State, not to compromise the law enforcement or security interests of the United States by its inclusion in the program. As of March 2020, 31 European countries, 7 Asia-Pacific countries, and 1 country in South America are in the program (see Figure 1 ). One of the VWP criteriaâthe nonimmigrant, or temporary, visitor visa refusal rateâhas been the subject of scrutiny by Congress. This rate represents the proportion of individuals whose applications for tourist or business visas have been rejected by U.S. consular officials in their home countries. When the VWP was conceived, some legislators argued that the number of nonimmigrants who overstay the terms of their entry under the VWP would be a better standard for future program participation, as the nonimmigrant visitor visa refusal rate is not based on the actual behavior of nonimmigrants. However, DHS is not able to calculate overstay rates accurately; because it relies on information from passenger manifests, persons entering by air or sea but exiting at a land port of entry may be mischaracterized as overstays. Advocates of expanding the VWP contend that the 3% nonimmigrant visitor visa refusal rate criterion, which has been a significant barrier to entry into the VWP, should be replaced with the overstay rate, or the refusal rate threshold should be raised and used in conjunction with the overstay rate. Some advocates have called for the return of the nonimmigrant visitor visa refusal rate waiver, which was available from October 2008 to July 2009. The waiver allowed DHS to admit into the VWP countries that had met all of the security requirements if they had a low overstay rate and a declining nonimmigrant visitor visa refusal rate that was below 10% in the previous fiscal year. Due to this waiver, eight countries that otherwise would not have qualified for the VWP were added in 2008. For current aspiring VWP countries, a complicating factor is that the Secretary of Homeland Security's authority to waive the nonimmigrant visitor visa refusal rate is suspended until the airline passenger exit system is able to match an alien's biometric information with relevant watchlists and manifest information . In FY2018, all the VWP countries had DHS-estimated overstay rates of less than 0.5% (Poland, which had not yet been admitted to the VWP, had a DHS-estimated overstay rate of less than 1%). The worldwide DHS-estimated overstay rate for non-VWP countries in FY2018 was 2%. Figure 2 shows the most recently available nonimmigrant visitor visa refusal rates and the DHS-estimated overstay rates for selected aspiring VWP countries. All of these countries (except Brazil) had a nonimmigrant visitor visa refusal rate of less than 10% in FY2019, and all of them had a DHS-estimated overstay rate of less than 2% in FY2018. Since the establishment of the VWP, the number of participating countries has been increased several times and two countries have been removed. The United Kingdom was the first country to be admitted, in July 1988, followed by Japan in December of the same year (see Figure 3 ). Six countries were added in 1989. An additional 13 countries were admitted in 1991, and another eight countries joined from 1993 to 1999. There was a gap until 2008, when another eight countries were admitted. In the past 10 years, Chile, Greece, Taiwan, and, most recently, Poland have been added. Adding countries to the VWP is done through bilateral negotiations, and membership is often perceived as evidence of close ties with the UnitedÂ States. Argentina and Uruguay are the only two countries that have been removed from the program, in 2002 and 2003, respectively. Since 2010, DHS has admitted four countries into the VWP ( Figure 3 ). Many other countries would like to join the program to make it easier for their nationals to travel to the United States. In 2005, the George W. Bush Administration began providing countries interested in joining the VWP with road maps to aid them in meeting the program's criteria. The original 13 aspiring countries were Bulgaria, Cyprus, Czech Republic, Estonia, Greece, Hungary, South Korea, Latvia, Lithuania, Malta, Poland, Romania, and Slovakia. Of these, 10 have since been admitted. This report examines a selected list of aspiring VWP countries: Argentina, Brazil, Bulgaria, Croatia, Cyprus, Israel, Romania, and Uruguay (see Figure 1 ). Four currently aspiring countriesâBulgaria, Croatia, Cyprus, and Romaniaâare in the European Union (EU). They are the only EU countries not in the VWP. U.S. citizens are permitted to travel to all the EU member states for short-term business or tourism purposes without a visa, whereas citizens of the four EU countries outside the VWP need a visa to travel to the United States. The European Commission has pointed out that the United States is the only country on the EU's visa-free list that does not fully reciprocate, adding that \"visa reciprocity is a fundamental principle of the European Union's common visa policy.\" The European Union considered suspending its visa waiver for U.S. nationals in 2017, but decided not to do so. Israel has also been vocal about wanting to enter the VWP, but it has faced challenges meeting certain criteria. For instance, Israel's Biometric Database Law prohibits sharing fingerprint data with foreign authorities, though reportedly the United States and Israel came to an agreement to share data for those with a criminal background. Another hurdle for Israel is that to become a VWP member, foreign countries must treat all American visa applicants equally; however, Israel has been accused of discriminating against Arab Americans. Moreover, Israel has yet to meet the 3% nonimmigrant visitor visa refusal rate criterion; its rate was 5.33% in FY2019. Brazil is often included in reports about aspiring VWP countries. It has recently made changes to its visa policy for U.S. citizens. In June 2019, Brazil introduced visa-free entry for U.S. citizens and citizens of three other countries, reportedly to stimulate tourism. A country can be terminated from the program if the Secretary of Homeland Security, in consultation with the Secretary of State, determines that a country's participation in the VWP undermines U.S. law enforcement, including immigration enforcement. Argentina and Uruguay are former members of the VWP. Argentina joined in 1996, but the United States removed it in 2002 after poor economic conditions in the country led to an increase in the number of Argentine nationals entering the United States without visas and remaining illegally past the 90-day period of admission. Uruguay joined in 1999, but it was removed in 2003 because a recession led to an increasing number of Uruguayan citizens entering the United States under the VWP to live and work illegally. National security is a key goal of the VWP. Over the years, Congress has continued to add security criteria for VWP participation. One of the VWP's most significant security additions was ESTA, which was put in place in 2009 and is administered by DHS. In addition, several laws require VWP partner countries to share information with the United States and to set standards for travel documentation. Nevertheless, debate remains as to whether the VWP sufficiently vets individual travelers prior to arrival at a U.S. port of entry. Before traveling to the United States, a VWP traveler must submit biographical information through DHS's ESTA. This web-based application checks the traveler's information against relevant law enforcement and security databases and determines eligibility for travel under the VWP. ESTA alerts the foreign national whether he or she has been approved to travel. If not approved, the individual must obtain a visa prior to coming to the United States. This normally involves making an appointment for an interview with a U.S. consular official, a process that could delay the individual's departure for the United States. ESTA became fully operational for all VWP visitors traveling to the United States by airplane or cruise ship on January 12, 2009. Prior to the implementation of ESTA, the first time a foreign national traveling under the VWP to the United States was screened was after checking in for a flight to the United States at a foreign airport. Under the current system, at the time a foreign national submits an ESTA application (at least 72 hours before travel), he or she is screened against a number of security databases, including the Terrorist Screening Database; TECS (not an acronym), a system used by U.S. Customs and Border Protection officers to screen arriving travelers to the United States; the Automated Targeting System; and INTERPOL's Lost and Stolen Passport database. Appendix B offers an explanation of these systems and databases. An ESTA authorization is generally valid for multiple entries over a period of two years. Throughout this period, the ESTA system continually vets approved individuals' information against these databases. DHS can immediately revoke an ESTA approval if new derogatory information is discovered. In addition, the validity period can be shortened at any time for any reason. ESTA only screens against biographical security databases; VWP travelers do not submit biometric information (e.g., fingerprints and photographs) until they reach a U.S. port of entry, at which point their biometrics are run through multiple security databases. Notably, a determination under ESTA that a foreign national is eligible to travel to the United States does not constitute a determination that the individual is admissible. The foreign national may still be deemed inadmissible and denied entry by CBP inspectors upon arrival at a U.S. port of entry. Travelers who use ESTA pay a $14 fee, which was instituted in September 2010. The fee includes $4 to cover the costs of administering ESTA and $10 for the travel promotion fee established by Congress in the Travel Promotion Act of 2009. In December 2019, the Further Consolidated Appropriations Act of 2020 directed that the ESTA fee be raised to $21 (see section on \" The VWP and U.S. Travel Promotion Efforts \"). This fee increase has not been put into effect. Although there tends to be agreement that the VWP benefits the U.S. economy by facilitating tourism ( see section on \" U.S. Travel and Tourism Economy \") , disagreement exists about VWP's effect on national security. The VWP contains provisions that affect national security at two levels: country-to-country security agreements and individual traveler security screening. To participate in the VWP, countries must agree to share extensive information with the United States about lost passports, known and suspected terrorists, and serious criminals. Since 2015, the Secretary of Homeland Security had been authorized to immediately suspend a country's participation in the VWP if the country fails to provide information related to security threats. The VWP also sets standards for participating foreign countries' passports, visas, and border security. As previously mentioned, VWP countries must issue biometric e-passports and tamper-resistant, machine-readable visa documents. Furthermore, since December 2017, DHS requires VWP countries to use U.S. counterterrorism information to screen travelers crossing their borders and to implement certain aviation security measures. Moreover, foreign countries' participation in the VWP allows the United States to monitor their border operations. Since 2002, DHS is statutorily obligated to assess and report on VWP countries' compliance with VWP criteria every two years. Thus, to remain in the program participating countries are subject to regular audits of their security operations, which include \"rigorous and thorough inspection of airports, seaports, land borders, and passport production/issuance facilities as well as continuous monitoring.\" According to DHS, \"no other program enables the U.S. Government to conduct such broad and consequential assessments of foreign partners' border security operations.\" The possibility of joining the VWP is an incentive for aspiring VWP countries to share such information and improve their border security. According to DHS, \"many countries not in the VWP complete program requirements in the hope of joining the program.\" For participating countries that wish to remain in the VWP program, DHS contends that \"VWP requirements provide our allies with the impetus to implement security measures that can sometimes be politically challenging for them, like amending legislation and updating their data privacy frameworks.\" The vetting of VWP travelers contains some features absent from the traditional screening required to receive a nonimmigrant visitor visa for business and tourist travel. As previously mentioned, ESTA screens the data of those authorized for VWP travel on a daily basis throughout ESTA's two-year validity period; new derogatory information could result in a denial of ESTA authorization. In contrast, many nonimmigrant visitor visas are valid for 10 years and are not continuously vetted. Moreover, travelers entering under the VWP must present e-passports, which tend to be more difficult to alter than other types of passports. VWP travelers do not undergo the same screening required of travelers from most countries to receive a nonimmigrant visitor visa, which typically includes a personal interview with a U.S. consular officer. As such, VWP travelers' first face-to-face encounter with U.S. officials could be at a port of entry. Additionally, ESTA is a name-based system and cannot be used to run checks against databases that use biometrics, such as the Automated Biometric Identification System and Next Generation Identification. However, when VWP travelers enter the United States, CBP takes their fingerprints and photographs and checks them against these biometric systems. Finally, visitor visa applicants are required to submit social media identifiers, but this is optional for VWP travelers. Another concern, following a number of high-profile terrorist attacks in Europe in recent years perpetrated mainly by European citizens, has been the possible threat posed by nationals from VWP countries who are aligned with the Islamic State. A focus had been on radicalized citizens of VWP countries who could have fought in the Middle East for the Islamic State or other terrorist groups. Conceivably, these individuals may have been able to travel to the United States under the VWP if there was no derogatory information about them in U.S. biographic databases. In response, Congress passed the Visa Waiver Program Improvement and Terrorist Travel Prevention Act, enacted as part of the FY2016 Consolidated Appropriations Act. This makes citizens of VWP countries ineligible for admission to the United States under the VWP if they are dual nationals of the Democratic People's Republic of Korea, Iran, Iraq, Sudan, or Syria or had been present in any of those countries, or in Libya, Somalia, or Yemen, at any time on or after March 1, 2011 (with limited exceptions). These individuals can still apply for a visa to travel to the United States. Another point of contention is whether the VWP threatens the United States' immigration enforcement interests. As of December 2017, VWP countries that have an overstay rate of over 2% must initiate a public information campaign to educate their citizens about the conditions for admission to the United States. If this does not reduce overstay violations, a country could be removed from the program, as occurred with Argentina and Uruguay in 2002 and 2003, respectively. A principal objective of the VWP is to boost the U.S. travel and tourism sectors by encouraging travel from high-volume and low-risk countries to the United States. The number of international visitors arriving in the United States totaled 79.3 million in 2019, down slightly from a record high of 79.7 million in 2018. Because of the sharp decline in international travel in the wake of the COVID-19 pandemic, many international flights have been cancelled and visitor volume is likely to fall sharply in 2020. In 2018, the travel and tourism sectors accounted for 2.9% of U.S. gross domestic product, a larger share than many other industries, including agriculture, mining, or utilities, and they directly and indirectly employed 9.2 million workers. Every dollar international visitors spend in the United States counts as an export. Collectively, foreign visitors spent about $256 billion in 2018 on domestic passenger fares aboard U.S. airlines and on travel-related goods and services, which makes tourism the United States' single-largest services sector export. Every year since 1989, the U.S. travel and tourism industries have posted a trade surplus, which in 2018 was $69.6 billion. Travel- and tourism-related exports accounted for 31% of all U.S. services exports and 10% of total exports in 2018. Each overseas visitor spends, on average, about $4,200 per trip in the United States on travel activities such as shopping, lodging, dining, and sightseeing. According to the Bureau of Economic Analysis (BEA), international travelers account for a disproportionate amount of all travel and tourism spending in the United States. One reason for this is that international visitors have relatively longer stays than domestic visitors, spending, on average, 18 nights in the United States. Travelers from VWP countries are among the highest in spending and visitor volume (see Table 1 ). However, an increasing number of overseas visitors come from non-VWP countries, notably China, Venezuela, Brazil, and India. Combined, these four non-VWP countries accounted for nearly 6.7 million visitors to the United States in 2019, down 4% from a year earlier. Travelers from these countries spent more than $5,000 on average per trip during their visits to the United States, with visitors from China leading in country-level travel spending. Spending in the United States by visitors from large source markets has risen substantially in recent years, up 45% from China and 78% from India since 2013. Although the number of foreign visitors to the United States has continued to rise, the U.S. share of total global tourism arrivals declined from 6.4% in 2015 to 5.7% in 2017, the most recent year for which statistics are available. One reason for this declining market share is that it is now much easier for travelers to visit many parts of the world, including Asia and Africa, compared to a few years ago. In 2012, the Obama Administration established a Task Force on Travel and Competitiveness, which set a goal of welcoming 100 million international visitors in 2021. Among other things, the task force recommended expediting visa processing for tourists from certain emerging economies, such as China and Brazil, and adding countries to the VWP in order to encourage tourism. Before the advent of the global pandemic (COVID-19) in 2020, the U.S. government had forecasted that the volume of tourist arrivals would not meet the task force's goal, with the number of total international visitors to the United States expected to reach close to 82.9 million in 2021. It is too early to know what the repercussions of shutting down a significant share of overseas travel to the United States may mean for the U.S. travel and tourism industries. Current indications suggest that the stated goal in overseas travelers to the United States is beyond reach by 2021 as potential visitors modify their travel plans. Determining whether the VWP has directly led to increased travel to the United States is not straightforward because many factors affect international travel, including general economic conditions, currency exchange rates, and even the nature of bilateral relations. Nevertheless, the VWP could be a factor that has encouraged more visits to the United State because it arguably reduces uncertainty, inconvenience, and costs associated with a visa application. Of the 37 nations in the VWP as of 2012, all but 10 recorded an increase in the volume of tourists and business visitors to the United States from FY2013 to FY2018. Three-fourths of the top 20 countries by number of VWP visitors recorded double-digit growth rates in VWP admissions over this period, including Taiwan, South Korea, Spain, and New Zealand, although the annual change for VWP countries has been uneven. Germany, Austria, Switzerland, and Japan are among the 20 VWP countries that posted drops in U.S. VWP admissions between FY2013 and FY2018 (see Table 2 ). U.S. Travel, an advocacy group for the travel industry, has produced several analyses of the effects of adding countries to the VWP. All of the organization's reports conclude that adding new countries to the program would yield positive results. For example, in a 2014 report U.S. Travel estimated that if Brazil, Bulgaria, Croatia, Israel, Poland, Romania, and Uruguay were included in the program, annual visitation from those countries would increase by more than 500,000, adding $5.3 billion per year to the U.S. economy and supporting 31,600 additional jobs in the United States. Likewise, an economic analysis of U.S. Department of Commerce data on travel and tourism from 1980 to 2013 found that the VWP had a \"meaningful impact driving increases in U.S. tourist volumes.\" In a 2019 report, U.S. Travel predicted that over the first three years of Poland's participation in the VWP, travel spending by Polish visitors to the United States would increase by $312 million, the number of Polish arrivals would rise by 97,000, and visitors from Poland would support 4,200 American jobs. Visitors from the four non-VWP EU countries (Bulgaria, Croatia, Cyprus, and Romania), who currently enter the United States on nonimmigrant visitor visas, accounted for approximately 1% of total EU visitor spending in the United States in 2018 (approximately $580 million). This seems to suggest that the overall economic effect of adding these four countries to the VWP would likely be relatively small. According to an estimate by U.S. Travel, the number of arrivals in the United States from these countries would increase by nearly 73,000 visitors at the end of the first three years after joining the VWP. In a separate report, U.S. Travel projected that if Romania were to become a VWP country, annual arrivals from the country would increase by 38,000 and bring $128 million in additional travel spending to the United States. Both reports were prepared before the COVID-19 pandemic interrupted international travel in 2020. According to figures from the Department of Commerce spending by Israeli visitors in 2018 in the United States on passenger fares and travel-related goods and services was nearly $1.8 billion. U.S. Travel estimated in 2019 that if Israel were admitted to the VWP, an additional 450,200 Israeli travelers would visit the United States over a three-year period, generating $1.2 billion in travel spending. The U.S. travel and tourism industries support expanding the VWP to other countries, especially populous countries such as Brazil. Brazil was the fifth-largest tourism source market for the United States, with 2.1 million Brazilians visiting in 2018. As shown in Table 1 , average spending per Brazilian visitor to the United States was $5,200 in 2018, among the highest of all source countries. The number of visitors from Brazil is projected to reach 2.6 million by 2024 even if Brazil is not admitted to the VWP. In November 2019, the United States announced that Brazil will soon join the Global Entry program, which will reduce waiting time for approved Brazilian visitors arriving at U.S. airport immigration checkpoints. The VWP is closely related to the promotion of foreign tourism to the United States. The United States no longer has a central agency to promote travel to it; the National Travel and Tourism Office (NTTO), within the International Trade Administration of the U.S. Department of Commerce, mainly provides official tourism statistics. Travel promotion is the responsibility of Brand USA (formally known as the Corporation for Travel Promotion), a nonprofit public-private entity that also is charged with communicating U.S. visa and entry policies to overseas visitors. Brand USA was established under the Travel Promotion Act of 2009 ( P.L. 111-145 ) and began operations in May 2011. In addition to private funding, since 2010 Brand USA has received $10 of the $14 fee paid by each prospective visitor from a VWP country who requests approval to travel to the United States through ESTA. In 2019, Congress approved raising the ESTA fee from $14 to $21, while reducing the amount available to Brand USA to $7 per traveler. Of the remainder, $4 will continue to go to CBP to cover the costs of administering ESTA, and $10 will be directed to the U.S. Treasury for the general fund. The effective date of the new ESTA fee has not yet been announced. Brand USA is not without controversy. The Trump Administration's FY2021 budget called for ending the federal grant that matches the private sector contributions to Brand USA and making the revenue available to the U.S. Treasury to reduce the federal deficit. Brand USA remains controversial among other travel and tourism stakeholders too, with some critics asserting that promotion of tourism should be left to the private sector. For example, Airlines for America, an airline industry group representing U.S. carriers, opposed Brand USA's reauthorization, asserting that ESTA funds would be better spent by CBP on border security, vetting travelers and refugees, and modernizing entry and exit processes. In another effort to promote travel and tourism, the United States has indicated that it is considering rejoining the United Nations' World Tourism Organization (UNWTO), which was established in 1975 to promote tourism worldwide. The United States was one of its founding members, but withdrew in 1996 after Congress stopped funding the United States Travel and Tourism Administration. In June 2019, the Trump Administration announced that the United States may rejoin the UNWTO. The announcement met with some criticism, and the Administration has subsequently taken no action. Other countries with large travel and tourism sectors that are not members of the UNWTO include the United Kingdom, Canada, and Australia. Proposals introduced in the 116 th Congress would give DHS greater flexibility to admit countries into the VWP that do not meet the criteria discussed above. Representative Mike Quigley introduced the Jobs Originated through Launching Travel (JOLT) Act ( H.R. 2187 ) , which would reinstate DHS's authority to grant a waiver for the nonimmigrant visitor visa refusal rate. That bill would also change the name of the VWP to Secure Travel Partnership. H.R. 1996 , also introduced by Representative Quigley, would solely rename the VWP to Secure Travel Partnership. Representative Dan Lipinski introduced the Allied Nations Travel Modernization Act ( H.R. 2946 ), which would allow countries to be designated into the VWP if, instead of a low nonimmigrant visitor visa refusal rate, they have a low visa overstay rate and agree to spend 2% of their gross domestic product on defense; according to the sponsor, the bill was drafted \"to create an alternative pathway into the program for NATO nations like Poland.\" As noted above, Poland was recently designated into the VWP. In previous Congresses, numerous bills have been introduced to designate Israel and Hong Kong into the VWP. Senator John Cornyn introduced the Humanitarian Upgrades to Manage and Assist our Nation's Enforcement (HUMANE) Act of 2019 ( S. 1303 ); among other provisions, it seeks to deter VWP overstays by amending the Immigration and Nationality Act's terms and conditions of admission for VWP travelers, the VWP waiver of rights, and the detention and repatriation of visa waiver violators. The 116 th Congress also addressed the spending of ESTA funds. Senator Mike Enzi introduced the Responsibly Enhancing America's Landscapes Act ( S. 2783 ), which would establish the National Park Service Legacy Restoration Fund to help with the backlog of maintenance projects in national parks. This fund would be paid for by increasing the ESTA fee by $16, along with an increase in nonimmigrant visitor visa fees by $25 and a park fee increase of $5. The Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ), which passed in December 2019, extended the authority for Brand USA to receive fees from the VWP through the end of September 2027 and raised the ESTA fee (as described in \" The VWP and U.S. Travel Promotion Efforts \" section above). The private sector still must provide at least $100 million per year in in-kind contributions and cash to the Brand USA program in order for it to receive these federal funds. Appendix A. Temporary Visitors to the United States for Business or Pleasure from Selected Aspiring VWP Countries Appendix B. Selected Immigration Inspections Databases and Systems", "summary": "The Visa Waiver Program (VWP), which allows citizens of certain countries to visit the United States for up to three months without a visa, has two explicit missions: to enhance national security and to boost the U.S. travel and tourism sectors. On November 8, 2019, the United States designated Poland into the VWP, bringing the number of participating countries to 39. A concern for Congress is whether the VWP exposes the United States to security threats, despite implementation of strict security requirements over recent years. At the same time, because of longstanding congressional interest in promoting the U.S. travel and tourism sectors, many lawmakers support adding more countries to the VWP. A key goal of the VWP is to improve standards for aviation security, travel documents, and law enforcement in countries around the world. To qualify for the VWP, countries must issue electronic passports, report information on all lost and stolen passports to the United States through the International Criminal Police Organization (INTERPOL), and share information on travelers who may pose a terrorist or criminal threat. Every VWP traveler must obtain preclearance to board a flight to the United States through the Electronic System for Travel Authorization (ESTA). Supporters of the VWP see admission into the program as an incentive for foreign countries to increase their security infrastructure and information sharing with the United States. A competing view is that despite security improvements following the 2015 terrorist attacks in Europe, such as screening of passengers entering under the VWP based on past travel to a country known as a terrorist sanctuary, the program remains a national security vulnerability. Another objective of the VWP is to facilitate and encourage foreign business and leisure travel from high-volume and low-risk countries to the United States. In FY2018, 22.8 million nonimmigrant visitorsâconstituting nearly one-third of all visitor admissions to the United Statesâarrived through the VWP. Figures from U.S. Travel, the industry group representing travel and tourism organizations, show that nationals from VWP countries generated an estimated $190 billion in economic activity and supported close to 1 million jobs in the United States in 2017. In addition, the U.S. government's National Travel and Tourism Office (NTTO) reports that a record 80 million international travelers visited the United States in 2018, with the number falling slightly in 2019. The number of foreign visitor arrivals in 2019 indicated that the United States would likely fall short of the goal set by the federal government's travel and tourism strategy of attracting 100 million visitors annually by the end of 2021. The COVID-19 pandemic has sharply reduced foreign tourism in 2020 as countries have discouraged international travel and required arriving passengers to quarantine themselves for extended periods, probably putting the 2021 goal out of reach. Nonetheless, advocates for the U.S. travel and tourism industries argue that adding more countries to the VWP would further promote tourism, trade, and commerce by increasing the number of overseas visitors traveling to the United States. Activity in the 116 th Congress related to the VWP seeks to expand the number of countries by changing the qualification criteria or designating specific countries. Other bills would rename the VWP to \"Secure Travel Partnership\" to reflect one of its main goals of securing U.S. borders. Legislation in the 116 th Congress also addresses the ESTA fee paid by VWP applicants. In December 2019, Congress authorized the continued use of the ESTA fee to partially fund Brand USA, a national tourism promotion program, through September 30, 2027. Congress also raised the ESTA fee from $14 to $21 (Division I, Title 8 of P.L. 116-94 ). The effective date of the new ESTA fee has not yet been announced.", "document_type": "crs"}
{"report": "The U.S. farm sector is vast and varied. It encompasses production activities related to traditional field crops (such as corn, soybeans, wheat, and cotton) and livestock and poultry products (including meat, dairy, and eggs), as well as fruits, tree nuts, and vegetables. In addition, U.S. agricultural output includes greenhouse and nursery products, forest products, custom work, machine hire, and other farm-related activities. The intensity and economic importance of each of these activities, as well as their underlying market structure and production processes, vary regionally based on the agro-climatic setting, market conditions, and other factors. As a result, farm income and rural economic conditions may vary substantially across the United States. Annual U.S. net farm income is the single most watched indicator of farm sector well-being, as it captures and reflects the entirety of economic activity across the range of production processes, input expenses, and marketing conditions that have prevailed during a specific time period. When national net farm income is reported together with a measure of the national farm debt-to-asset ratio, the two summary statistics provide a quick and widely referenced indicator of the economic well-being of the national farm economy. In the second of three official U.S. farm income outlook releases scheduled for 2019 (see shaded box below), ERS projects that U.S. net farm income will rise 4.8% in 2019 to $88.0 billion, up $4.0 billion from last year. Net cash income (calculated on a cash-flow basis) is also projected higher in 2019 (+7.2%) to $112.6 billion. The August 2019 net farm income forecast represents an increase from USDA's preliminary February 2019 forecast of $69.4 billion. An increase in government support in 2019, projected at $19.5 billion and up 42.5% from 2018, is the principal driver behind the rise in net farm income. Support from traditional farm programs is expected to be bolstered by large direct government payments in response to trade retaliation under the escalating trade war with China. At a projected $19.5 billion in calendar 2019, direct government payments would represent 22.2% of net farm incomeâthe largest share since 2006 when federal subsidies represented a 27.6% share. The August forecast of $88 billion is just above (+0.9%) the 10-year average of $87.3 billion and represents continued agriculture-sector economic weakness since 2013's record high of $123.7 billion. Both net cash income and net farm income achieved record highs in 2013 but fell to recent lows in 2016 ( Figure 1 ) before trending higher in each of the last three years 2017, 2018, and 2019. Commodity prices ( Figure A-1 to Figure A-4 ) have echoed the same pattern as farm income over the 2013-2019 period. When adjusted for inflation and represented in 2018 dollars ( Figure 2 ), the net farm income for 2019 is projected to be on par with the average of $86.8 billion for net farm income since 1940. After declining for four consecutive years, total production expenses for 2019 ( Figure 16 ), at $346.1 billion, are projected up slightly from 2018 (+0.4%), driven largely by higher costs for feed, labor, and property taxes. Global demand for U.S. agricultural exports ( Figure 20 ) is projected at $134.5 billion in 2019, down from 2018 (-6.2%), due largely to a decline in sales to China. Farm asset values and debt levels are projected to reach record levels in 2019âasset values at $3.1 trillion (+2.0%) and farm debt at $415.7 billion (+3.4%)âpushing the projected debt-to-asset ratio up to 13.5%, the highest level since 2003 ( Figure 26 ). Abundant domestic and international supplies of grains and oilseeds suggest a fifth straight year of relatively weak commodity prices in 2019 ( Figure A-1 through Figure A-4 , and Table A-4 ). However, considerable uncertainty remains concerning the eventual outcome of the 2019 growing season and the prospects for improved market conditions heading into 2020. As of early September, three major factors loom over U.S. agricultural markets and contribute to current uncertainty over both supply and demand prospects, as well as market prices: 1. First, wet spring conditions led to unusual plantings delays for the corn and soybean crops. This means that crop development is behind normal across much of the major growing regions and that eventual yields will depend on beneficial fall weather to achieve full crop maturity. Also, the late crop development renders crop growth vulnerable to an early freeze in the fall. 2. Second, large domestic supplies of corn, soybeans, wheat, and cotton were carried over into 2019 ( Figure 6 ). Large corn and soybean stocks have kept pressure on commodity prices throughout the grain and feed complex in 2019. 3. Third, international trade disputes have led to declines in U.S. exports to Chinaâa major market for U.S. agricultural productsâand added to market uncertainty. In particular, the United States lost its preeminent market for soybeansâChina. It is unclear how soon, if at all, the United States will achieve a resolution to its trade dispute with China or how international demand will evolve heading into 2020. U.S. agricultural production activity got off to a very late start in 2019 due to prolonged cool, wet conditions throughout the major growing regions, particularly in states across the eastern Corn Belt. This resulted in record large prevented planting acres ( Figure 3 ) and delays in the planting of the corn and soybean crops ( Table 1 ), especially in Illinois, Michigan, Ohio, Wisconsin, and North and South Dakota. As of August 22, 2019, U.S. farmers have reported to USDA that, of the cropland that they intended to plant this past spring, they were unable to plant 19.8 million acres due primarily to prolonged wet conditions that prevented field work. Such acres are referred to as \"prevent plant (PPL)\" acres. The previous record for total PPL acres was set in 2011 at 10.2 million acres. The 19.8 million PPL acres includes 11.4 million acres of corn and 4.5 million acres of soybeansâboth establish new records by substantial margins. The previous record PPL for corn was 2.8 million acres in 2013, and for soybeans it was 2.1 million acres in 2015. In addition, a sizeable portion of the U.S. corn and soybean crops were planted later than usual. Traditionally, 96% of the U.S. corn crop is planted by June 2, but in 2019 by that date only 67% of the crop had been planted ( Table 1 ). Similarly, the U.S. soybean crop was planted with substantial delays. By June 16, only 67% of the U.S. soybean crop was planted, whereas an average of 93% of the crop has been planted by that date during the past five years. These planting delays have important implications for crop development as they push both crops' growing cycle into hotter, drier periods of the summer than usual and increase the risk of plant growth being shut off by an early freeze. But planting delays also increase the complexity of producer decisionmaking by pushing the planting date into the crop insurance \"late planting period,\" when insurance coverage starts to decline with each successive day of delay ( Figure 4 ). When the planting occurs after the crop insurance policy's \"final planting date,\" the \"late planting period\" comes into play. Producers must then decide whether to opt for \"prevented planting\" indemnity payments (valued at 35% of their crop insurance guarantee) or try to plant the crop under reduced insurance coverage with a heightened risk of reduced yields. Producer's choices were further complicated in 2019 by the Secretary of Agriculture's announcement on May 23 that only producers with planted acres would be eligible for \"trade damage\" assistance payments in 2019 under the Market Facilitation Program (MFP). Corn and soybeans are the two largest U.S. commercial crops in terms of both value and acreage. For the past several years, U.S. corn and soybean crops have experienced strong growth in both productivity and output, thus helping to build stockpiles at the end of the marketing year. This has been particularly true for soybean production, which has seen rapid growth in yield, acres planted, and stocks. U.S. soybean production has been expanding rapidly since 1990, largely at the expense of the wheat sector which has been steadily losing acreage over the past several decades ( Figure 5 ). This pattern reached a historic point in 2018 when, for the first time in history, U.S. soybean plantings (at 89.196 million acres) exceeded corn plantings (89.129 million acres). The strong soybean plantings in 2018, coupled with the second-highest yields on record (51.6 bushels/acres), produced a record U.S. soybean harvest of 4.5 billion bushels and record ending stocks (1 billion bushels or a 27.2% stocks-to-use ratio) that year. However, the record soybean harvest in 2018, combined with the sudden loss of the Chinese soybean market (as discussed in the \" Agricultural Trade Outlook \" section of this report) discouraged many producers from planting soybeans in 2019. This contributed to a drop off (-14%) in soybean planted acres. Most market watchers had expected to see a strong switch from soybean to corn acres in 2019 as a result of the record soybean stocks and weak prices related to the U.S.-China trade dispute. However, the wet spring made large corn plantings unlikely as corn yields tend to experience rapid deterioration when planted in June or later. Despite these indications, USDA's National Agricultural Statistics Service (NASS) released the results of its June acreage survey for corn planted acres at 91.7 million acresâwell above market expectations. However, because the wet spring had caused widespread delayed planting, USDA announced that it would re-survey the 14 major corn-producing states. The updated survey results were released on August 12 and, at 90.0 million acres, confirmed higher-than-expected corn plantings. As a result, the outlook for the U.S. corn crop has been pressured by the large planted acreage estimate but filled with uncertainty over the eventual success of the crop considering that it is being grown under unusually delayed conditions. Corn ending stocks are projected to surpass 2 billion bushels for the fourth consecutive year. Strong domestic demand from the livestock sector coupled with a robust export outlook are expected to support the season average farm price for corn at $3.60/bushel in the 2019/20 marketing year, unchanged from the previous year. The outlook for the U.S. soybean crop is more certain: USDA projects a 19% drop in U.S. soybean production to 3.68 billion bushels. Despite the outlook for lower production in 2019, the record carry-over stocks from 2018, and the sudden loss of China as the principal buyer of U.S. soybeans in 2018, USDA projects lower soybean farm prices (-8%) at $8.40/bushel for the 2019/20 marketing yearâthe lowest farm price since 2006 ( Figure 6 ). Both wheat and upland cotton farm prices for 2019 are projected down slightly from 2018âprimarily due to the outlook for continued abundant stocks as indicated by the stocks-to-use ratios. The United States is traditionally one of the world's leading exporters of corn, soybeans, and soybean productsâvegetable oil and meal. During the recent five-year period from 2013/2014 to 2017/2018, the United States exported 49% of its soybean production and 15% of its corn crop. As a result, the export outlook for these two crops is critical to both farm sector profitability and regional economic activity across large swaths of the United States as well as in international markets. However, the tariff-related trade dispute between the United States and China (as well as several major trading partners) has resulted in lower purchases of U.S. agricultural products by China in 2018 and 2019 and has cast uncertainty over the outlook for the U.S. agricultural sector, including the corn and soybean markets. Because the livestock sectors (particularly dairy and cattle, but hogs and poultry to a lesser degree) have longer biological lags and often require large capital investments up front, they are slower to adjust to changing market conditions than is the crop sector. As a result, USDA projects livestock and dairy production and prices an extra year into the future (compared with the crop sector) through 2020, and market participants consider this expanded outlook when deciding their market interactionsâbuy, sell, invest, etc. During the 2007-2014 period, high feed and forage prices plus widespread drought in the Southern Plainsâthe largest U.S. cattle production regionâhad resulted in an 8% contraction of the U.S. cattle inventory. Reduced beef supplies led to higher producer and consumer prices and record profitability among cow-calf producers in 2014. This was coupled with then-improved forage conditions, all of which helped to trigger the slow rebuilding phase in the cattle cycle that started in 2014 ( Figure 7 ). The expansion continued through 2018, despite weakening profitability, primarily due to the lag in the biological response to the strong market price signals of late 2014. The cattle expansion appears to have levelled off in 2019 with the estimated cattle and calf population unchanged from a year earlier at 103 million. Another factor working against continued expansion in cattle numbers is that producers are now producing more beef with fewer cattle. Similar to the cattle sector, U.S. hog and poultry flocks have been growing in recent years and are expected to continue to expand in 2019. For 2019, USDA projects production of beef (+0.6%), pork (+5.0%), broilers (+1.7%), and eggs (+2.3%) to expand modestly heading into 2020. This growth in protein production is expected to be followed by continued positive growth rates in 2020: beef (+1.9%), pork (+2.8%), broilers (+1.1%), and eggs (+0.9%). A key uncertainty for the meat-producing sector is whether demand will expand rapidly enough to absorb the continued growth in output or whether surplus production will begin to pressure prices lower. USDA projects that combined domestic and export demand for 2019 will continue to grow for red meat (+1.7%) and poultry (+1.5%) but at slightly slower rates than projected meat production, thus contributing to 2019's outlook for lower prices and profit margins for livestock. The changing conditions for the U.S. livestock sector may be tracked by the evolution of the ratios of livestock output prices to feed costs ( Figure 8 ). A higher ratio suggests greater profitability for producers. The cattle-, hog-, and broiler-to-feed margins have all exhibited significant volatility during the 2017-2019 period. The hog, milk, and cattle feed ratios have trended downward during 2018 and 2019, suggesting eroding profitability. The broiler-to-feed price ratio has shown more volatility compared with the other livestock sectors but has trended upward from mid-2018 into 2019. While this result varies widely across the United States, many small or marginally profitable cattle, hog, and milk producers face continued financial difficulties. Continued production growth of between 1% and 4% for red meat and poultry suggests that prices are vulnerable to weakness in demand. In addition, both U.S. and global milk production are projected to continue growing in 2019. As a result, milk prices could come under further pressure in 2019, although USDA is currently projecting milk prices up slightly in 2019. The lower price outlook for cattle, hogs, and poultry is expected to persist through 2019 before turning upward in 2020 ( Table A-4 ). Projected farm-sector revenue sources in 2019 include crop revenues (46% of sector revenues), livestock receipts (42%), government payments (5%), and other farm-related income (8%), including crop insurance indemnities, machine hire, and custom work. Total farm sector gross cash income for 2019 is projected to be up (+2.2%) to $425.3 billion, driven by increases in both direct government payments (+42.5%) and other farm-related income (+19.3). Cash receipts from crop receipts (-1.7%) and livestock product (+0.5%) are down (-0.6%) in the aggregate ( Figure 9 ). Total crop sales peaked in 2012 at $231.6 billion when a nationwide drought pushed commodity prices to record or near-record levels. In 2019, crop sales are projected at $193.7 billion, down 1.7% from 2018 ( Figure 10 ). Projections for 2019 and percentage changes from 2018 include Feed cropsâcorn, barley, oats, sorghum, and hay: $56.3 billion (+0.4%); Oil cropsâsoybeans, peanuts, and other oilseeds: $36.3 billion (-14.0%); Fruits and nuts: $29.5 billion (+1.7%); Vegetables and melons: $19.6 billion (+6.0%); Food grainsâwheat and rice: $12.3 billion (+6.5%); Cotton: $7.5 billion (-7.4%); and Other crops including tobacco, sugar, greenhouse, and nursery: $31.2 billion (+2.8%). The livestock sector includes cattle, hogs, sheep, poultry and eggs, dairy, and other minor activities. Cash receipts for the livestock sector grew steadily from 2009 to 2014, when it peaked at a record $212.3 billion. However, the sector turned downward in 2015 (-10.7%) and again in 2016 (-14.1%), driven largely by projected year-over-year price declines across major livestock categories ( Table A-4 and Figure 12 ). In 2017, livestock sector cash receipts recovered with year-to-year growth of 8.1% to $175.6 billion. In 2018, cash receipts increased slightly (+0.6%). In 2019, cash receipts are projected up 0.5% for the sector at $177.4 billion as cattle, hog, and dairy sales offset declines in poultry. Projections for 2019 (and percentage changes from 2018) include Cattle and calf sales: $67.3 billion (+0.3%); Poultry and egg sales: $38.9 billion (-15.8%); Dairy sales: valued at $39.7 billion (+12.7%); Hog sales: $24.5 billion (+16.2%); and Miscellaneous livestock: valued at $7.0 billion (+2.1%). Historically, government payments have included Direct payments (decoupled payments based on historical planted acres), Price-contingent payments (program outlays linked to market conditions), Conservation payments (including the Conservation Reserve Program and other environmental-based outlays), Ad hoc and emergency disaster assistance payments (including emergency supplemental crop and livestock disaster payments and market loss assistance payments for relief of low commodity prices), and Other miscellaneous outlays (including market facilitation payments, cotton ginning cost-share, biomass crop assistance program, peanut quota buyout, milk income loss, tobacco transition, and other miscellaneous payments). Projected government payments of $19.5 billion in 2019 would be up 42.5% from 2018 and would be the largest taxpayer transfer to the agriculture sector (in absolute dollars) since 2005 ( Figure 14 and Table A-4 ). The surge in federal subsidies is driven by large \"trade-damage\" payments made under the MFP initiated by USDA in response to the U.S.-China trade dispute. MFP payments (reported to be $10.7 billion) in 2019 include outlays from the 2018 MFP program that were not received by producers until 2019, as well as expected payments under the first and second tranches of the 2019 MFP program. USDA ad hoc disaster assistance is projected higher year-over-year at $1.7 billion (+87.1%). Payments under the Agricultural Risk Coverage and Price Loss Coverage programs are projected lower (-12.4%) in 2019 at a combined $2.8 billion compared with an estimated $3.2 billion in 2018 (see \"Price Contingent\" in Figure 14 ). Conservation programs include all conservation programs operated by USDA's Farm Service Agency and the Natural Resources Conservation Service that provide direct payments to producers. Estimated conservation payments of $3.7 billion are forecast for 2019, down slightly (-8.4%) from $4.0 billion in 2018. Total government payments of $19.5 billion represents a 5% share of projected gross cash income of $425.3 billion in 2019. In contrast, government payments are expected to represent 22% of the projected net farm income of $88.0 billion. The importance of government payments as a percentage of net farm income varies nationally by crop and livestock sector and by region. The 2018 farm bill ( P.L. 115-334 ) made several changes to the previous Margin Protection Program (MPP), including a new nameâthe Dairy Margin Coverage (DMC) programâand expanded margin coverage choices from the original range of $4.00-$8.00 per hundredweight (cwt.). Under the 2018 farm bill, milk producers have the option of covering the milk-to-feed margin at a $9.50/cwt. threshold on the first 5 million pounds of milk coverage under the program. The DMC margin differs from the USDA-reported milk-to-feed ratio shown in Figure 8 but reflects the same market forces. As of August 2019, the formula-based milk-to-feed margin used to determine government payments was at $9.45/cwt., just below the newly instituted $9.50/cwt. payment threshold ( Figure 15 ), thus increasing the likelihood that DMC payments may be less available in the second half of 2019. In total, the DMC program is expected to make $600 million in payments in 2019, up from $250 million under the previous milk MPP in 2018. Total production expenses for 2019 for the U.S. agricultural sector are projected to be up slightly (+0.4%) from 2018 in nominal dollars at $346.1 billion ( Figure 16 ). Production expenses peaked in both nominal and inflation-adjusted dollars in 2014, then declined for five consecutive years in inflation-adjusted dollars. However, in nominal dollars production expenses are projected to turn upward in 2019âthe first upward turn since 2014. Production expenses affect crop and livestock farms differently. The principal expenses for livestock farms are feed costs, purchases of feeder animals and poultry, and hired labor. Feed costs, labor expenses, and property taxes are all projected up in 2019 ( Figure 17 ). In contrast, fuel, land rent, interest costs, and fertilizer costsâall major crop production expensesâare projected lower. But how have production expenses moved relative to revenues? A comparison of the indexes of prices paid (an indicator of expenses) versus prices received (an indicator of revenues) reveals that the prices received index generally declined from 2014 through 2016, rebounded in 2017, then declined again in 2018 ( Figure 18 ). Farm input prices (as reflected by the prices paid index) showed a similar pattern but with a smaller decline from their 2014 peak and have climbed steadily since mid-2016, suggesting that farm sector profit margins have been squeezed since 2016. Renting or leasing land is a way for young or beginning farmers to enter agriculture without incurring debt associated with land purchases. It is also a means for existing farm operations to adjust production more quickly in response to changing market and production conditions while avoiding risks associated with land ownership. The share of rented farmland varies widely by region and production activity. However, for some farms it constitutes an important component of farm operating expenses. Since 2002, about 39% of agricultural land used in U.S. farming operations has been rented. The majority of rented land in farms is rented from non-operating landlords. Nationally in 2017, 29% of all land in farms was rented from someone other than a farm operator. Some farmland is rented from other farm operationsânationally about 8% of all land in farms in 2017 (the most recent year for which data are available)âand thus constitutes a source of income for some operator landlords. Total net rent to non-operator landlords is projected to be down (-2.1%) to $12.5 billion in 2019. Average cash rental rates for 2019 were up (+1.4%) year-over-year ($140 per acre versus $138 in 2018). National average rental ratesâwhich for 2019 were set the preceding fall of 2018 or in early spring of 2019âdipped in 2016 but still reflect the high crop prices and large net returns of the preceding several years, especially the 2011-2014 period ( Figure 19 ). The national rental rate for cropland peaked at $144 per acre in 2015. U.S. agricultural exports have been a major contributor to farm income, especially since 2005. As a result, the financial success of the U.S. agricultural sector is strongly linked to international demand for U.S. products. Because of this strong linkage, the downturn in U.S. agricultural exports that started in 2015 ( Figure 20 ) deepened the downturn in farm income that ran from 2013 through 2016 ( Figure 1 ). Since 2018, the U.S. agricultural sector's trade outlook has been vulnerable to several international trade disputes, particularly the ongoing dispute between the United States and China. A return to market-based farm income growth for the U.S. agricultural sector will likely necessitate improved international trade prospects. USDA projects U.S. agricultural exports at $134.5 billion in FY2019, down (-6.2%) from $143.4 billion in FY2018. Export data include processed and unprocessed agricultural products. This downturn masks larger country-level changes that have occurred as a result of ongoing trade disputes (as discussed below). In FY2019, U.S. agricultural imports are projected up at $129.3 billion (1.4%), and the resultant agricultural trade surplus of $5.2 billion would be the lowest since 2006. A substantial portion of the surge in U.S. agricultural exports that occurred between 2010 and 2014 was due to higher-priced grain and feed shipments, including record oilseed exports to China and growing animal product exports to East Asia. As commodity prices have leveled off, so too have export values (see the commodity price indexes in Figure A-1 and Figure A-2 ). In FY2017, the top three markets for U.S. agricultural exports were China, Canada, and Mexico, in that order. Together, these three countries accounted for 46% of total U.S. agricultural exports during the five-year period FY2014-FY2018 ( Figure 21 ). However, in FY2019 the combined share of U.S. exports taken by China, Canada, and Mexico is projected down to 38% largely due to lower exports to China. The ordering of the top markets in 2019 is projected to be Canada, Mexico, the European Union (EU), Japan, and China, as China is projected to decline as a destination for U.S. agricultural exports. From FY2014 through FY2017, China imported an average of $26.2 billion of U.S. agricultural products. However, USDA forecasts China's imports of U.S. agricultural products to decline to $20.5 billion in FY2018 and to $10.9 billion in FY2019 as a result of the U.S.-China trade dispute. The fourth- and fifth-largest U.S. export markets have traditionally been the EU and Japan, which accounted for a combined 17% of U.S. agricultural exports during the FY2014-FY2018 period. These two markets have shown limited growth in recent years when compared with the rest of the world. However, their combined share is projected to grow to 19% in FY2019 ( Figure 21 ). The \"Rest of World\" (ROW) component of U.S. agricultural tradeâSouth and Central America, the Middle East, Africa, and Southeast Asiaâhas shown strong import growth in recent years. ROW is expected to account for 43% of U.S. agricultural exports in FY2019. ROW import growth is being driven in part by both population and GDP growth but also from shifting trade patterns as some U.S. products previously targeting China have been diverted to new markets. Over the past four decades, U.S. agricultural exports have experienced fairly steady growth in shipments of high-value productsâincluding horticultural products, livestock, poultry, and dairy. High-valued exports are forecast at $94.0 billion for a 69.9% share of U.S. agricultural exports in FY2019 ( Figure 22 ). In contrast, bulk commodity shipments (primarily wheat, rice, feed grains, soybeans, cotton, and unmanufactured tobacco) are forecast at a record low 30.1% share of total U.S. agricultural exports in FY2019 at $40.5 billion. This compares with an average share of over 60% during the 1970s and into the 1980s. As grain and oilseed prices decline, so will the bulk value share of U.S. exports. The share of agricultural production (based on value) sold outside the country indicates the level of U.S. agriculture's dependence on foreign markets, as well as the overall market for U.S. agricultural products. As a share of total farm and manufactured agricultural production, U.S. exports were estimated to account for 19.8% of the overall market for agricultural products from 2008 through 2016âthe most recent data year for this calculation ( Figure 23 ). The export share of agricultural production varies by product category: At the upper end of the range for export shares, the bulk food grain export share has varied between 50% and 80% since 2008, while the oilseed export share has ranged between 47% and 58%. The mid-spectrum range of export shares includes the export share for fruit and tree nuts, which has ranged from 37% to 45%, while meat products have ranged from 27% to 41%. At the low end of the spectrum, the export share of vegetable and melon sales has ranged from 15% to 18%, the dairy products export share from 9% to 24%, and the agricultural-based beverage export share between 7% and 13%. The U.S. farm income and asset-value situation and outlook suggest a relatively stable financial position heading into 2019 for the agriculture sector as a wholeâbut with considerable uncertainty regarding the downward outlook for prices and market conditions for the sector and an increasing dependency on international markets to absorb domestic surpluses and on federal support to offset lost trade opportunities due to ongoing trade disputes. Farm asset valuesâwhich reflect farm investors' and lenders' expectations about long-term profitability of farm sector investmentsâare projected to be up 2.0% in 2019 to a nominal $3.1 trillion ( Table A-3 ). In inflation-adjusted terms (using 2018 dollars), farm asset values peaked in 2014 ( Figure 24 ). Nominally higher farm asset values are expected in 2019 due to increases in both real estate values (+2.0%) and nonreal-estate values (+2.1%). Real estate is projected to account for 83% of total farm sector asset value. Crop land values are closely linked to commodity prices. The leveling off of crop land values since 2015 reflects stagnant commodity prices ( Figure 25 ). For 2019, USDA forecasts that prices for most major commodities will decline from 2018âwheat, barley, soybeans, cotton, choice steers, broilers, and eggs lower; sorghum, oats, rice, and pork products higher ( Table A-4 ). However, these projections are subject to substantial uncertainty associated with international commodity markets. Total farm debt is forecast to rise to a record $415.7 billion in 2019 (+3.4%) ( Table A-3 ). Farm equityâor net worth, defined as asset value minus debtâis projected to be up slightly (+1.8%) at $2.7 trillion in 2019 ( Table A-3 ). The farm debt-to-asset ratio is forecast up in 2019 at 13.5%, the highest level since 2003 but still relatively low by historical standards ( Figure 26 ). A farm can have both an on-farm and an off-farm component to its income statement and balance sheet of assets and debt. Thus, the well-being of farm operator households is not equivalent to the financial performance of the farm sector or of farm businesses because of the inclusion of nonfarm investments, jobs, and other links to the nonfarm economy. Average farm household income (sum of on- and off-farm income) is projected at $116,060 in 2019 ( Table A-2 ), up 4.7% from 2018 but 13.5% below the record of $134,165 in 2014. About 17% ($20,075) of total farm household income is from farm production activities, and the remaining 83% ($95,985) is earned off the farm (including financial investments). The share of farm income derived from off-farm sources had increased steadily for decades but peaked at about 95% in 2000 ( Figure 27 ). Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. Since the late 1990s, farm household incomes have surged ahead of average U.S. household incomes ( Figure 28 ). In 2017 (the last year for which comparable data were available), the average farm household income of $111,744 was about 30% higher than the average U.S. household income of $86,220 ( Table A-2 ). Figure A-1 to Figure A-4 present USDA data on monthly farm prices received for several major farm commoditiesâcorn, soybeans, wheat, upland cotton, rice, milk, cattle, hogs, and chickens. The data are presented in an indexed format where monthly price data for year 2010 = 100 to facilitate comparisons. USDA Farm Income Data Tables Table A-1 to Table A-3 present aggregate farm income variables that summarize the financial situation of U.S. agriculture. In addition, Table A-4 presents the annual average farm price received for several major commodities, including the USDA forecast for the 2018-2019 marketing year.", "summary": "This report uses the U.S. Department of Agriculture's (USDA) farm income projections (as of August 30, 2019) and agricultural trade outlook update (as of August 29, 2019) to describe the U.S. farm economic outlook. According to USDA's Economic Research Service (ERS), national net farm incomeâa key indicator of U.S. farm well-beingâis forecast at $88 billion in 2019, up $4 billion (+4.8%) from last year. However, the forecast rise in 2019 net farm income is largely the result of a 42.5% increase in government payments to the agricultural sector valued at $19.5Â billion (highest since 2005). USDA's support outlays forecast for 2019 include nearly $11 billion in direct payments made under trade assistance programs intended to help offset foreign trade retaliation against U.S. agricultural products, as well as payments under traditional farm programs. Without this federal support, net farm income would be lower, primarily due to the outlook for continued weak prices for most major crops. Commodity prices are under pressure from large planted acreage estimates of corn and soybeans in 2019, large carry-in stocks from a record soybean and near-record corn harvest in 2018, and diminished export prospects due to the ongoing trade dispute with China. Should these conditions persist into 2020, they would signal the potential for continued dependence on federal programs to sustain the U.S. agricultural sector in 2020. Since 2008, U.S. agricultural exports have accounted for a 20% share of U.S. farm and manufactured or processed agricultural sales. In 2018, total agricultural exports were estimated up 2% at $143.4 billion. However, abundant supplies in international markets, strong competition from major foreign competitors, and the ongoing U.S.-China trade dispute are expected to shift trade patterns and lower U.S. agricultural export prospects significantly (-6%) to a projected $134.5 billion in 2019. Farm asset value in 2019 is projected up from 2018 to $3.1 trillion (+2%). Farm asset values reflect farm investors' and lenders' expectations about long-term profitability of farm sector investments. U.S. farmland values are projected to rise 1.8% in 2019, similar to the increases of 1.9% in 2018 and 2.3% in 2017. Because they comprise such a large portion of the U.S. farm sector's asset base (83%), change in farmland values is a critical barometer of the farm sector's financial performance. However, another critical measure of the farm sector's well-being is aggregate farm debt, which is projected to be at a record $415.7 billion in 2019âup 3.4% from 2018. Both the debt-to-asset and the debt-to-equity ratios have risen for seven consecutive years, suggesting a weakening of the financial situation for the U.S. farm sector. At the farm household level, average farm household incomes have been well above average U.S. household incomes since the late 1990s. However, this advantage derives primarily from off-farm income as a share of farm household total income. Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. Furthermore, the farm household income advantage over the average U.S. household has narrowed in recent years. In 2014, the average farm household income (including off-farm income sources) was about 77% higher than the average U.S. household income. In 2017 (the last year with comparable data), that advantage was expected to decline to 30%.", "document_type": "crs"}
{"report": "Significant recent coastal and riverine flood events, as well as concerns about changing hydrologic conditions, have prompted interest in using a suite of approaches to reduce flood risk and improve flood resilience , which is the ability to adapt to, withstand, and rapidly recover from floods. Traditional options to reduce flood risk include constructing levees and dams. Some stakeholders and Members of Congress support protecting, restoring, and enhancing natural features and processes to reduce flood and storm damages. Examples include floodplains that can store excess water and coastal wetlands that may attenuate storm surge. Congress has directed the U.S. Army Corps of Engineers (USACE)âthe primary federal agency constructing projects to reduce flood risksâto evaluate the use of natural and nature-based features (NNBFs) when conducting its flood risk reduction activities along the nation's rivers and coasts. As part of a USACE authority, Congress defined a nature-based feature as \"a feature that is created by human design, engineering, and construction to provide risk reduction by acting in concert with natural processes.\" It defined a natural feature as a feature \"created through the action of physical, geological, biological, and chemical processes over time.\" Although NNBFs may provide flood risk reduction and resilience benefits in some circumstances, they may be unable to replicate the risk reduction provided by traditional structural and nonstructural measures for some communities. How to effectively incorporate natural features and processes into planning of and investments in reliable flood risk management is an area of evolving policy and research. Part of the challenge is to identify where to use NNBFs and to determine how much flood risk reduction NNBFs can provided either on their own or in combination with structural and nonstructural measures. Whether to adjustâand, if so, howâUSACE's consideration and use of NNBFs for flood risk reduction is an ongoing policy issue. Although Congress has authorized consideration of NNBFs, examples of USACE using NNBFs in its flood risk reduction activities remain limited. In November 2019, the Subcommittee on Water Resources and Environment of the House Transportation and Infrastructure (T&I) Committee held a hearing as part of preparations for developing water resource authorization legislation. At the hearing, multiple witnesses referenced interest in facilitating the use of NNBFs for managing flood risks and improving resilience. Congress has requested various reports related to NNBFs, but the reports have not been delivered to the authorizing committees. When available, these reports may inform congressional deliberations on NNBFs as part of authorization and appropriations legislation. USACE considers NNBFs to include wetlands, such as salt marshes and certain submerged aquatic vegetation; oyster, mussel, and coral reefs; maritime forests/shrubs; and the combination of these natural features with engineered components, such as rock gabions (i.e., a basket or other container filled with rocks or other hard materials), stone toes (i.e., stones placed on the lower portion of an eroding streambank), and concrete reef balls (which are shown in Figure 1 along with other NNBFs). In some contexts, NNBFs that stabilize banks and shores also may be referred to as living shorelines . Efforts to enhance natural management of floodwaters often include attempts to restore disturbed natural features. For example, the ability of coastal mangroves, wetlands, and reefs to function as buffers of erosion or storm surge may be reduced if these features are degraded or improved if they are protected or restored. This report introduces NNBFs in the context of USACE flood risk reduction activities. It first discusses how NNBFs relate to USACE authorities for structural and nonstructural measures. It next discusses the primary flood-related activities for which USACE has NNBF-related authority: (1) federal flood risk reduction projects and (2) a program for the repair of damaged nonfederal flood control works. The report then addresses challenges and opportunities for use and incorporation of NNBFs within USACE's flood risk reduction and resilience efforts. It concludes with questions pertinent to the future of use of NNBFs as part of USACE's flood risk reduction activities. USACE has been involved in efforts to reduce the nation's flood risk for over a century. The agency's early efforts involved building dams and levees along rivers. In the mid-20 th century, Congress began directing USACE involvement in coastal storm risk reduction projects, which have primarily consisted of engineered dunes and beaches, and in some instances, storm surge gates and levees. Congressional direction on USACE flood risk reduction activities has evolved to include authorities to use other means to reduce flood risk. Congress expanded USACE authorities related to nonstructural alternatives; then, starting in the mid-2010s, it directed the consideration of NNBFs. Since 1974, Congress has required that USACE evaluate nonstructural alternatives, such as elevation of structures and acquisition of floodplain lands, during its planning of flood risk reduction projects. Following widespread flooding in the Midwest in 1993, many experts encouraged USACE, other agencies, and policy decisionmakers to support greater use of nonstructural approaches to mitigate flooding. In 1996, Congress amended USACE's authority to repair damage to certain nonfederal flood control works to allow use of nonstructural alternatives in lieu of repairs. In 2016, in the Water Infrastructure Improvements for the Nation Act (WIIN Act; P.L. 114-322 ), Congress defined such nonstructural alternatives to the repair of nonfederal flood control works to include restoring and protecting natural resources (e.g., floodplains, wetlands, and coasts), if those alternatives reduce flood risk. Although nonstructural measures (including natural features as part of nonstructural measures) have been part of the discussion of and authorities for USACE flood risk reduction for decades, the focus on natural processes and use of terms such as NNBF or natural infrastructure are more recent developments. USACE began its Engineering With Nature initiative in 2010 to explore ways to align natural and engineering processes in USACE project planning. In 2015, USACE incorporated NNBF concepts into its North Atlantic Coast Comprehensive Study , which Congress required as part of the agency's response to Hurricane Sandy. In 2016 in the WIIN Act, Congress altered USACE authorities to specifically direct the agency to consider NNBFs in its planning of water resource projects. This was Congress's first use of the terms natural feature and nature-based featu res in USACE authorities. In the WIIN Act, Congress directed USACE to evaluate NNBFs as part of the agency's planning of flood risk reduction and ecosystem restoration projects. Congress required that USACE consider each of the following: natural features; nature-based features; nonstructural measures; and structural measures. In 2018, Congress also required that USACE feasibility reports for flood risk reduction projects \"consider the use of both traditional and natural infrastructure alternatives, alone or in conjunction with each other, if those alternatives are practicable.\" Congress has included references to nonstructural alternatives and measures in USACE authorities since at least 1974. Nonstructural measures generally are those that alter the human exposure or vulnerability to flooding with little effect on the characteristics of the flood (e.g., elevating a structure, floodproofing the lowest floor of a structure, or purchasing a structure for purposes of removing it which is referred to as a buyout ). S tructural measures are those that alter a flood's characteristics and reduce the probability of flooding at the location (e.g., a levee or berm that diverts flood water away from a community). Congress has not identified NNBFs as structural or nonstructural features for purposes of USACE planning of federal water resources projects and federal and nonfederal sharing of project costs. Current USACE practice considers measures that change the character of the flood as structural measures, which may include most NNBFs. However, in the agency's role in repairing nonfederally operated flood control works damaged by floods, Congress has included the following definition: Nonstructural alternatives defined. - In this subsection, the term 'nonstructural alternatives' includes efforts to restore or protect natural resources, including streams, rivers, floodplains, wetlands, or coasts, if those efforts will reduce flood risk. Therefore, some NNBFs may fall within Congress's definition of nonstructural alternatives for the repair program. It is unclear if the classifications of NNBFs as structural or nonstructural are consistent across the two sets of USACE activities that may use NNBFs for flood risk reductionâthe USACE repair program and USACE's planning of projects. For purposes of planning a USACE flood risk reduction project, an NNBF may be structural or nonstructural, depending on whether the NNBF affects the character of the flood. USACE considers most NNBFs to be structural measures because the NNBFs alter the flood hazard and are cost shared as structural measures (see \" Cost Sharing of USACE Flood Risk Reduction Measures \"). Nonstructural NNBFs could include the restoration or expansion of a floodplain through acquisition of structures and lands, especially when combined with an aquatic ecosystem restoration project. Engineered dunes and beaches also have a role in NNBF discussions. USACE considers engineered dunes and beaches as NNBFs. However, traditional engineered dunes and beaches and other types of NNBFs may not face the same challenges when it comes to being incorporated into USACE planning and construction as more novel NNBFs, such as living shorelines. USACE has more than half a century of involvement in constructing engineered dunes and beaches (sometimes referred to as dune-and-berm beach nourishment systems ) as components of coastal storm risk reduction projects. The agency has long-standing approaches for calculating the flood risk reduction benefits of engineered dunes and beaches, which is not the case for other NNBFs (see section entitled \" Evaluation of NNBFs' Benefits \"). In addition, unlike other NNBFs, engineered dunes and beaches often are not designed to rely primarily on natural processes (e.g., engineered dunes and beaches often require regular renourishment of sand to maintain storm damage reduction benefits). Additionally, while engineered dunes and beaches may support habitat for certain species, some researchers and stakeholders have raised concerns about the potential for environmental harm associated with some engineered dune and beach projects (see \" Incorporating More Natural Processes in Engineered Dunes and Beaches \" for further discussion). Where appropriate, this report differentiates between the more novel applications of NNBFs and the more traditional engineered dunes and beaches. Levee setbacks are an example of combining a structural elementâthe leveeâwith natural featuresâa wider floodplainâto reduce flood risk. USACE considers levee setbacks as structural alternatives for purposes of its projects and its repairs to certain damaged nonfederal levees because levees alter the extent of the flood hazard. The extent to which USACE would classify some levee setbacks as NNBFs (e.g., levee setbacks that augment natural storage and reduce peak flows) is unclear. Where appropriate, this report discusses levee setbacks activities that would include natural features and processes to reduce flood risks. Through the Engineering With Nature initiative and comprehensive studies such as the post-Hurricane Sandy North Atlantic Coast Comprehensive Study , USACE has identified ways in which NNBFs could be incorporated into flood risk reduction and resilience efforts. Incorporating NNBFs into USACE feasibility reports and their recommended plans for flood risk reduction is a step that would move NNBFs from concepts into potential USACE project features. Statutory direction in 2016 and 2018 requires that NNBFs be considered as part of feasibility studies and their reports. The discussion below provides examples of how USACE has incorporated NNBFs into completed feasibility reports and how NNBFs are evaluated and cost shared as part of USACE flood risk reduction projects. USACE has an extensive planning process for its flood risk reduction projects; part of the process consists of an evaluation of whether the project is economically justified as a federal investment. Generally, federal involvement in flood risk reduction projects is limited to projects that are determined to have national economic benefits exceeding their costs or to projects that address a public safety concern. As previously noted, Congress has required the evaluation of NNBFs as part of USACE flood risk reduction project planning. Under current Administration guidance, USACE's evaluation of NNBFs as part of a feasibility study is tailored to each project (i.e., it is not standardized but case-by-case). The Principles and Guidelines (P&G) broadly guide the planning process and the decision criteria for identifying the recommended plan in a USACE feasibility report. The P&G indicate that USACE is to select the plan with the greatest net economic benefit consistent with protecting the environment (referred to as the national economic development plan , or NED plan), unless the Assistant Secretary of the Army for Civil Works (ASACW) grants an exception. The P&G have been in effect for USACE since 1983. For a discussion of the status of the P&G and a set of guidelines developed to replace the P&G, see the box titled \"Planning Guidance for Federal Water Resource Studies and Investments.\" According to the U.S. Government Accountability Office (GAO), the flood damage reduction of structures continues to dominate the evaluation of economics and the NED plan remains the main means for identifying the recommended plan for flood risk reduction alternatives. The effect is that most flood risk reduction projects are subject to a benefit-cost analysis. This means that for an NNBF to be found economically justified as a stand-alone flood risk reduction feature, the NNBF's effect on economic benefits (which for flood risk reduction projects is principally quantified as reduced flood damages to structures) would have to be quantified and found to exceed the cost of the NNBF. Part of the attraction of NNBFs is that they may provide some risk reduction benefits without some of the costs of traditional structures. NNBFs, compared with structures such as storm surge gates, levees, or dams, may not require as much investment in long-term maintenance in order to continue their flood risk reduction functions. In addition, NNBFs generally would not require replacement or removal at the end of their use. The consistency with which USACE is incorporating these reduced costs into the comparison of NNBFs with other alternatives in feasibility reports is unclear. Another attraction of NNBFs is that they may support species habitat, water quality, or recreation, among other environmental and social benefits. Statute requires and the P&G and USACE planning guidance allow the agency's feasibility reports for flood risk reduction projects to include information on the environmental and other social benefits of NNBFs. Nonetheless, under the P&G, unless an exception is granted by the ASACW, USACE is directed to select the plan with the greatest net economic benefit consistent with protecting the environment (the NED plan) in its feasibility reports for flood risk reduction projects. For a discussion of how this approach to identifying recommended plans and evaluating the benefits of alternatives may be shaping the adoption of NNBFs, see the discussion under \" Evaluation of NNBFs' Benefits .\" The P&G have been the primary document guiding USACE planning and plan recommendations since 1983. In April 2020, the Administration described its plans to replace USACE's use of the P&G with new planning guidance. The new guidance is referred to as the Principles, Requirements, and Guidelines (PR&G) for federal water resource investments. Under the PR&G, USACE would strive to maximize public benefits relative to public costs. Public benefits encompass environmental, economic, and social goals, with no hierarchy among the three goals. In the interim, USACE continues to implement the P&G. For more details on the evolution of water resource planning guidance, see the text box titled \"Planning Guidance for Federal Water Resource Studies and Investments.\" USACE is proposing using NNBFs (other than engineered dunes and beaches) often in combination with traditional structural measures. For example, the following USACE projects incorporate NNBFs as elements of broader flood risk reduction projects using structural elements. New York's East Rockaway Inlet to Rockaway Inlet and Jamaica Bay Reformulation Project . The recommended plan includes NNBFs consisting of stones and larger rocks with associated vegetative planting to attenuate wave action and reduce erosion ( Figure 2 ) as part of traditional structural measures. The feasibility report indicates that the NNBF was evaluated based on its cost effectiveness, rather than a benefit-cost analysis. That is, the cost of the NNBF per linear foot was compared to the cost per linear foot of a floodwall. The entire recommended plan, which consists of various components in addition to the NNBFs, was subject to a benefit-cost analysis and was found to be economically justified. Virginia's Norfolk Coastal Storm Risk Management Project . The feasibility report recommends NNBFs in combination with traditional structural measures, such as storm surge barriers and pump stations, and nonstructural features, such as elevation, floodproofing, and buyout of structures ( Figure 3 ). The NNBFs include \"living shorelines to increase resiliency.\" According to the feasibility report, the recommended NNBFs are \"economically justified by their ability to reduce maintenance costs associated with structural features of the [recommended plan],\" as well as other benefits, such as recreation and education identified. A benefit-cost analysis was performed on the combined NNBFs and structural features, and the investment was found to be economically justified. The above projects use NNBFs as support for traditional structural features or in combination with traditional structural features. USACE has proposed several projects where the key components are traditional engineered dunes and beaches, which USACE considers to be NNBFs. The Congressional Research Service (CRS) has not identified a final USACE feasibility report in which NNBFs other than engineered dunes and beaches are the dominant means to reduce flood risk. Congress has established that USACE involvement in a flood risk reduction project generally requires both congressional study authorization and congressional construction authorization. Congress also has established that the planning and construction costs for most USACE projects are shared with a nonfederal sponsor, such as a municipality or levee district for flood risk reduction projects. Table 1 provides information on the nonfederal cost shares for USACE flood risk reduction, coastal storm damage reduction, and ecosystem restoration projects. Information about ecosystem restoration projects is included in Table 1 because some USACE projects may have dual purposes of flood risk reduction and ecosystem restoration. Nonfederal project sponsors are generally required to provide all real estate interests needed for a flood risk reduction project, such as the land, easements, rights-of-way, relocations, and disposal (LERRD). The value of the LERRDs are applied toward the nonfederal cost share. At times, these real estate costs may exceed the standard minimum nonfederal cost share established by Congress for the USACE project type. As shown in Table 1 , Congress has established different means for addressing LERRD costs that exceed the required nonfederal contribution for structural features and for nonstructural features. For some types of projects, Congress also has required that part of the nonfederal cost share must include a cash contribution, as shown in Table 1 . That is, the nonfederal share must consist of more than LERRDs and in-kind contributions. For structural measures, Congress has generally established that the maximum nonfederal construction cost share is 50% if the nonfederal LEERDs exceed the 35% minimum. For nonstructural projects, if the nonfederal costs exceed 35%, the remainder of the costs are federal. Although Congress has established how costs of structural and nonstructural measures are to be shared, Congress has not enacted cost sharing that applies specifically to NNBFs. USACE considers most NNBFs to alter the flood hazard and treats those features as structural measures in its planning processes. Therefore, the cost-sharing requirements for structural measures apply to the use of most NNBFs, like those in the coastal storm risk reduction projects in Norfolk, VA, and East Rockaway Inlet to Rockaway Inlet and Jamaica Bay. Some stakeholders have expressed interest in having NNBFs be eligible for nonstructural cost sharing. Congress has authorized numerous coastal storm damage reduction projects that use engineered dunes and beaches and the periodic renourishment of these features, which consists of multiple cycles of sand placement on beaches, dunes, or both. Statute allows for periodic nourishment over 50 years, with possibilities for extension, to be cost shared as shown in Table 1 . USACE is authorized to fund the repair of certain nonfederal flood control works (e.g., levees, dams) and federally constructed hurricane or shore protection projects that are damaged by factors other than ordinary water, wind, or wave action (e.g., storm surge rather than high tide). To receive this assistance, damaged flood control works must be eligible for and active in the agency's Rehabilitation and Inspection Program (often referred to as the USACE P.L. 84-99 program or RIP) and have been in an acceptable condition at the time of damage, as determined by regular USACE inspections. The P.L. 84-99 program does not fund repairs associated with regular operation, maintenance, repair, and rehabilitation. As of 2018, around 1,200 nonfederal entities operating roughly 2,000 levee systems participate in the P.L. 84-99 program, and the nonfederal levees in the P.L. 84-99 program cumulatively span nearly 10,000 miles. Congress funds the P.L. 84-99 program and USACE's flood-fighting efforts through the agency's Flood Control and Coastal Emergencies (FCCE) account. In 1996, Congress amended the P.L. 84-99 program to authorize USACE to implement nonstructural alternatives for reducing flood riskâpreviously the authority was limited to the repair or restoration of the flood control structures. Congress made the nonstructural alternative authority available only if a nonfederal entity requests the nonstructural alternative. That is, USACE does not include nonstructural alternatives in its evaluation of repair alternatives unless requested to do so by the nonfederal sponsor. In 2014, Congress extended the nonstructural alternative option to authorized coastal storm damage reduction projects. In 2016, Congress defined the nonstructural alternative for the P.L. 84-99 program authority as including \"efforts to restore or protect natural resources, including streams, rivers, floodplains, wetlands, or coasts, if those efforts will reduce flood risk.\" Congress also required USACE to notify and consult with the nonfederal sponsor about \"the opportunity to request implementation of nonstructural alternatives to the repair or restoration of a flood control work\" under P.L. 84-99 program. Table 2 provides information on how USACE shares the costs for the program. Under the P.L. 84-99 program, the costs for all LERRDs are 100% nonfederal. Most repairs would require few or no new LERRDs. Nonstructural alternatives may require significant new LERRD acquisition by the nonfederal sponsor. Also, if a nonstructural alternative is pursued, USACE will provide no further flood-related assistance anywhere within the formerly protected area, except for rescue operations, with some exceptions. For repairs under the P.L. 84-99 program, USACE primarily follows Engineer Regulation (ER) 500-1-1 from 2001, and updated agency policies for how to return coastal storm damage reduction projects to design levels of protection (e.g., how to reconstruct and renourish with sand and engineered dune and beach to the design level of protection). ER 500-1-1 includes nonstructural alternatives to repair, pursuant to the 1996 amendment to the repair authority, but, in practice, the P.L. 84-99 program appears to remain a \"repair-in-place\" program or for minor adjustments in levee alignments to avoid repeated erosive damage to a levee segment often referred to as scour . Repair-in-place planning often is more expeditious for USACE than the planning required for a nonstructural alternative. USACE does not appear to track the use of the nonstructural alternative authority within the P.L. 84-99 program. Selected uses of the nonstructural alternative authority include examples following the 1997 floods in California and the 2008 floods in the upper portion of the Mississippi River. In the P.L. 84-99 program, USACE may setback a damaged levee segment; USACE considers the setback a structural realignment of the levee to restore the damaged levee system. USACE does not consider levee setbacks as nonstructural alternatives. Because levee setbacks are considered as structural realignments for the repair of the damaged levee, the levee setbacks as part of the P.L. 84-99 program are designed for purposes of the levee's functioning and integrity (e.g., to decrease scour) rather than to enhance floodplain capacity or reduce peak flows. If a nonfederal entity pursues a nonstructural alternative, such as the acquisition of floodplain lands, the nonfederal sponsor also may choose to setback the levee. It appears that USACE would consider the setback of the levee not as part of the nonstructural alternative but as a complementary investment by the nonfederal entity. USACE and other federal agencies also may own and operate levees and other flood control projects. USACE is responsible for rebuilding flood-damaged levees that it operates. USACE has no authority to evaluate and implement nonstructural alternatives (or NNBFs) for congressionally authorized USACE-operated infrastructure. Some contend that traditional structural measures are institutionally easier for USACE to implement, which disadvantages use of NNBFs, especially in situations and contexts that favor expediency or are time-constrained. Although USACE has decades of experience planning and constructing structural levees and dams, and the authorities and policies to guide those measures, the agency's guidance and experience with NNBFs are less well-developed. For example, implementing NNBFs may require USACE to work with more federal and nonfederal agencies, landowners, and other stakeholders than the agency would with structural measures. Two factors that may shape the further adoption of NNBFs as part of USACE flood risk reduction activities are (1) the availability of information and evaluation procedures for using NNBFs as flood risk reduction measures and (2) the classification of some NNBFs as structural measures for flood risk management. Identifying whether and, if so, how to incorporate NNBF concepts more fully into USACE's engineered dunes and beaches presents another challenge. USACE's actions pursuant to congressional modifications to its NNBF authorities since the mid-2000s have led to the development of new procedures to evaluate the flood risk reduction benefits of NNBFs and to questions about what USACE is able to count as benefits. An attraction of NNBFs as flood risk reduction measures is that by using natural processes, NNBFs also may support species habitat, water quality, or pubic enjoyment, among other environmental and social benefits. Whetherâand if so, howâto incorporate the environmental and social benefits of NNBFs into USACE decisionmaking remains an ongoing question. The discussion below first reviews the challenges related to evaluating the flood risk reduction benefits and then discusses the role of environmental and other social benefits in evaluating investments in NNBFs as flood risk reduction measures under the P&G. Under the P&G, which USACE has followed since 1983, flood risk reduction projectsâwhether they use traditional structural measures, nonstructural measures, or NNBFsâare to be economically justified based on the NED benefits from the reduced flood risk. The P&G requires the selection of the NED plan for USACE flood risk reduction projects, unless a waiver is provided by the ASACW. The P&G allows for USACE to document the environmental and social benefits; however, these benefits are not explicitly included in the agency's identification of the recommended plan for a project. In April 2020, the Administration indicated that during 2020 it plans to develop documents required for USACE to replace its use of the P&G with the PR&G. Unlike the NED-focused decision criteria of the P&G, the PR&G would direct USACE to strive to maximize public benefits toward environmental, economic, and social goals relative to public costs. In some circumstances, NNBFs may not be effective as flood risk reduction measures or provide the level of protection sought by a community. In circumstances where NNBFs may be able to reduce flood risk, NNBFs may be effective alone or in combination with traditional flood risk reduction measures. They also may assist with adjustments to changing hydrologic conditions (e.g., coastal wetlands adjustment to sea level rise) and provide a suite of environmental and social benefits (e.g., additional species habitat, water quality improvements, and recreation opportunities). Stakeholders and others have noted that knowledge gaps may affect USACE's ability to support federal NNBF investments. For example, in 2019, GAO found The Corps faces challenges in developing cost and benefit information for some types of natural infrastructure and has initiated some steps to address this. For example, a 2015 Corps report identified knowledge gaps in understanding how natural coastal infrastructure, such as wetlands may perform during coastal storms. These knowledge gaps make it challenging for the Corps to develop cost and benefit information for some natural infrastructure alternatives and compare them to other alternatives, such as those that use hard infrastructure. For USACE, the procedures to evaluate the potential benefits, limitations, and economic costs of traditional flood risk reduction structures are developed and standardized through various procedures and models. As GAO identified, this is not the case for NNBFs. GAO's report indicated that USACE was developing a research strategy to address some of the knowledge gaps. Although USACE has not finalized the strategic research plan referenced by GAO, USACE has research activities directed toward improving understanding of NNBF performance, directly or indirectly. Several of these research programs are developing numerical and analytical tools that can estimate performance (e.g., reduced erosion, wave impacts, and flood/storm surge inundation) for NNBF so trade-offs can be estimated in the planning, design, and maintenance process in the future. In addition to USACE, other researchers are attempting to document NNBFs' flood risk reduction benefits, limitations, and costs. Under the Administration's current guidance for the NNBF authority, the identification, evaluation, and justification of NNBF alternatives (other than engineered dunes and beaches) appears to remain a case-by-case process. Part of the challenge is how a feature's location may affect an NNBF's performance, which consequently may influence the NNBF's benefits and costs. Congress may consider how USACE's case-by-case approach to evaluating NNBFs may shape consideration and adoption of the features (e.g., adapting the NNBFs to local conditions) in a planning process that is constrained by time and funding. Another challenge to valuing the flood risk reduction benefits of NNBFs may be NNBFs' dynamic nature as the result of their use of natural processes, as compared to traditional flood control structures. For example, NNBFs consisting of mangroves or other wetlands may shift their extent and location in response to changing conditions. Other NNBFs may change over time as the living componentsâsuch as vegetation or oyster reefsâmature or their area expands or contracts. Floods or storms may temporarily or permanently damage some NNBFs and lessen their role in reducing flood risks. USACE is participating in interagency and international efforts aiming to fill knowledge gaps and develop best practices and concepts for NNBFs and to understand their benefits and limitations. For example, USACE is leading an international effort to develop and publish international guidelines on NNBFs, as discussed in the box titled \"International and Interagency Efforts on Natural and Nature-Based Features.\" The extent to which the agency may be able to incorporate into its own planning some of the international guidance remains to be seen and may depend on the extent to which the guidance helps address questions of performance and economic benefits in various environmental and flood/storm conditions. As previously noted, USACE may document environmental and social benefits of NNBFs, but its decision criteria under the P&G for flood risk reduction project remains the NED plan. The PR&G-based planning process may require greater consideration of environmental and social benefits; the impact of those additional considerations on USACE's development and selection of plans that use NNBFs is unknown. The question of whether to incorporate, in the planning process and related decisions, certain environmental and social benefits and costs of flood risk reduction measures is a recent development in a long-standing debate on federal water resource investments. USACE has adapted its project planning process before to meet changes in the agency's authorities. In the late 1990s, following Congress's enactment of various authorities for USACE ecosystem restoration projects, the agency developed procedures to evaluate ecosystem restoration investments (see box titled \"Evaluation of an Ecosystem Restoration Project\"). Whether and to what extent consideration of environmental and social benefits and costs of NNBFs, or for flood risk reduction projects more broadly, may be considered in the USACE planning and decision process is unclear. In addition to the use of NNBFs as part of USACE flood risk reduction activities, the agency, through its regulatory program, has authorized a general permit for the use of one NNBF typeâcoastal living shorelines. The permitted activities are not performed or funded by USACE; they are performed by the entities that apply for the permit, such as a town or a landowner. As more nonfederal entities use NNBFs such as living shorelines, USACE may draw additional knowledge, data, and experience from these nonfederal and non-USACE projects. For information on the living shoreline general permit, see the box titled \"Facilitating Approval of Natural and Nature-Based Features: Living Shoreline Nationwide Permit.\" As previously noted, current USACE practice in the planning of flood risk reduction projects is to consider measures that change the character of the flood as structural measures, which may include most NNBFs. NNBFs classified as structural measures are cost shared differently than those classified as nonstructural measures. Some stakeholders have proposed that legislation require NNBFs to be cost shared as nonstructural measures regardless of the NNBFs' effect on the flood hazard. This would cap the nonfederal construction costs at 35% rather than up to 50% for structural measures, thereby shifting more of the NNBF costs to the federal government. Levee setbacks, although not generally categorized as NNBFs by USACE, illustrate some of the challenges for NNBFs that are classified as structural measures. Examples of USACE's use of setback levees as part of the agency's flood risk reduction projects remain limited. Many potential levee setback projects do not have a sufficient benefit-cost ratio to be an economically justified investment as a structural measure for flood risk reduction, in part because of the costs associated with the additional land and other real estate interests that would need to be acquired. Nonfederal project sponsors generally would be responsible for 100% of these LERRD costs. The designation of an NNBF as a structural measure could require the nonfederal sponsor to pay a greater share of the cost than if the NNBF were considered nonstructural (as shown in Table 1 ). Classification of an NNBF as a structural measure also results in a difference between the cost sharing for the NNBF and the cost sharing for nonstructural measures (e.g., elevating structure in the floodplain). As discussed above, USACE has long-standing approaches for calculating the flood risk reduction benefits of engineered dunes and beaches. Traditional USACE engineered dunes and beaches may not face the same challenges of being incorporated into USACE planning and construction as other features that USACE classifies as NNBFs. Although traditional engineered dunes and beaches may have social benefits and provide habitats for some species, engineered dunes and beaches have been shown in some circumstances to have some negative effects. For example, the construction and replenishment of these features can disrupt existing biological communities, such as benthic, fish, and shorebird communities, at the project site and where the sand is sourced. The cumulative effect of the projects and resulting environmental changes remains poorly understood. USACE has taken some steps to address these effects (e.g., the agency considers the compatibility of some sand characteristics, and for some projects, it avoids nourishing during ecologically significant periods), but some suggest that engineered dunes and beaches could incorporate natural processes or elements with more environmental benefits. For example, some researchers have suggested leaving gaps in sand placement or nourishing smaller areas at a time to allow species to recolonize from the edges of the nourishment area. Efforts to integrate resilience into approaches to flood risk reduction can raise questions about the role of traditional engineered dunes and beaches that rely heavily on regular renourishment through the engineered placement of sand on the beaches and dunes. NNBFs generally are intended to be developed by or to use natural processes. NNBFs are meant to be as self-sustaining as possible; that is, they are expected to recover, often without or with minimal human intervention, following a flood event. For example, natural dune and beach systems may experience large waves during storm events, which move sediment from the front of the beach (the foreshore) to the back of the beach system, effectively maintaining or raising the elevation behind the dune over time. The foreshore is built up by normal wave activity over time, thereby maintaining through natural processes the dune system, including its potential flood risk reduction benefits. Some dune and beach systems may recover quickly after a damaging storm; however, others may take decades to rebuild to previous heights and widths through natural processes. Conversely, engineered dunes are often built to not be overtopped and moved. Some engineered dunes also have cores or components that provide stability (e.g., synthetic membranes or clay) and may not allow for dune migration. To allow this natural movement to continue, some stakeholders have suggested that USACE consider constructing lower dunes and providing space behind dunes to accommodate sand movement. Other options may include designing dunes to be naturally shaped by the wind while decreasing overall sand loss by using features such as vegetation, screens made of natural materials, and variations in terrain elevation. Furthermore, dunes could be designed to specifically include habitat features, such as those that enable wetland development. Some stakeholders argue that USACE and its nonfederal partners could consider other ways to promote natural processes and their benefits into USACE coastal storm risk reduction projects, such as by allowing dune systems to spread out, limiting the raking or grading of incipient dunes, and restricting driving on the beach. These measures would allow dunes to widen or for additional dunes to form in front or behind the primary dune, providing some environmental and social benefits (e.g., greater protection for structures behind dunes and greater variety in available habitats) but could limit other social benefits (e.g., space for beach recreation). Although USACE has long-standing approaches for calculating the flood risk reduction benefits of engineered dunes and beaches, the agency's procedures for incorporating more natural processes and features (e.g., vegetation) into engineered dunes and beaches are being reconsidered in the context of the additional NNBF considerations. Incorporating more natural processes into engineered dunes and beaches may require additional efforts to secure the LERRDs for a dune that shifts. Statute not only allows for federally cost-shared periodic nourishment of USACE-constructed dunes and beaches over 50 years but also provides for the possibility of extending renourishment for an additional 15 years. It is unclear if USACE's evaluations for extending a project's federally cost-shared renourishment timeframe consider the role of more natural processes and elements (e.g., vegetation) in future renourishments. It also remains unknown whether more natural processes would be considered a reformulation, requiring congressional authorization, rather than an administrative extension. Similarly, the extent to which P.L. 84-99 program-funded repairs of coastal storm protection projects have been used to incorporate more natural processes into the designs of engineered dunes and beaches remains unknown. Congress has directed that the Administration produce two reports that may provide information on NNBFs to decisionmakers and planners. One report relates to how USACE complies with the WIIN Act requirement to evaluate NNBFs as part of USACE flood risk reduction projects. The other report focuses on USACE's authorities related to repair of nonfederal flood control works, including the use of the authority to support a nonstructural alternative in lieu of repairing the damage. In 2016, Congress directed the Secretary of the Army to evaluate NNBFs, nonstructural features, and structural features in its planning of flood risk reduction projects and ecosystem restoration projects. At that time, Congress also required the Secretary of the Army to report on the statute's implementation to the House T&I Committee and Senate Committee on Environment and Public Works (Senate EPW) by February 1, 2020 (and 5 and 10 years thereafter). At a minimum, the report was to include a description of the guidance or instructions issued, and other measures taken, by the Secretary and the Chief of Engineers to implement the requirement to evaluate NNBFs, nonstructural features, and structural features in the planning of flood risk reduction and ecosystem restoration projects; an assessment of the costs, benefits, impacts, and trade-offs associated with measures recommended by the Secretary for coastal risk reduction and the effectiveness of those measures; and a description of any statutory, fiscal, or regulatory barriers to the appropriate consideration and use of a full array of measures for coastal risk reduction. The committees have not received the report as of April 2020; however, USACE indicates that it has initiated development of the report. USACE implementation guidance from 2017 and 2018 indicates that the agency was making efforts at that time to collect data for the report. In June 2014, Congress required that the Secretary of the Army review the use and performance of the emergency authority for repairs of nonfederal flood control works. Congress required that a report on the findings of the review be delivered within 18 months to the House T&I Committee and Senate EPW Committee and for the report to be publicly available. USACE implementation guidance for the provision indicates that the agency would undertake the review when Congress provided funding for it. Congress has not yet funded the review. The Secretary is to, among other actions, review and evaluate the historic and potential uses, and economic feasibility for the life of the project, of nonstructural alternatives, including natural features such as dunes, coastal wetlands, floodplains, marshes, and mangroves, to reduce the damage caused by floods, storm surges, winds, and other aspects of extreme weather events, and to increase the resiliency and long-term cost-effectiveness of water resources development projects. In 2010, USACE ramped up its efforts to identify opportunities to incorporate natural processes into its flood risk reduction activities with its Engineering With Nature initiative. Starting in the mid-2010s, Congress has authorized the consideration of NNBF alternatives in circumstances where NNBFs can reduce flood risk. The reliance on natural processes in NNBFs may provide flood resilience advantages compared with traditional structural measures or when used in combination with traditional structural measures. However, various challenges to the adoption of NNBFs as part of USACE projects remain. Among recently completed feasibility reports, USACE has recommended a few flood risk reduction projects that use NNBFs. Typically, the recommendation is to use the NNBFs in combination with structural measures if the combined alternative can be economically justified. The limited use of NNBFs in USACE flood risk reduction activities to date is shaped by various factors ranging from what is known about NNBF performance to how NNBFs are evaluated. In some circumstances, NNBFs may not be able to provide levels of flood risk reduction similar to traditional structural and nonstructural measures. In other circumstances, NNBFs may be able to reduce flood risks, but the ability to quantify the effectiveness and reliability of NNBFs as flood risk reduction measures in different environmental conditions and for different flood and storm conditions remains limited. In circumstances where NNBFs may be effective alone or in combination with traditional flood risk reduction measures, they can provide a suite of environmental and social benefits. The extent to which USACE considers NNBFs' environmental and social benefits, as well as their flood risk reduction potential, in agency feasibility reports and their recommendations and in decisions on repairing damaged flood control works remains unclear. USACE's evaluations and recent applications of NNBFs have raised questions about how environmental and social benefits are considered in USACE planning and the potential opportunities and limitations for USACE's use of NNBFs. Some questions related to NNBFs relevant to decisions about USACE authorities and policies include the following: What are the remaining knowledge gaps regarding the benefits and limitations of NNBFs in flood risk reduction? What are the options for decisionmakers to direct USACE or other federal agencies to address these gaps or otherwise support research that addresses these gaps? What is the impact of current decisionmaking processes on the accounting of NNBFs' benefits, costs, and performance over time? How do statutes, Administration guidance, and agency practice create disincentives and incentives for NNBF adoption for USACE and nonfederal project sponsors? The congressionally directed reports discussed in the previous section may inform USACE decisionmakers' and planners' understanding of the circumstances in which use of NNBFs may be beneficial. They also may inform congressional deliberations on whetherâand, if so, howâto support use of NNBFs as part of USACE flood risk reduction and resilience efforts. ", "summary": "The U.S. Army Corps of Engineers (USACE) is the primary federal agency involved in federal construction to help reduce community flood risk. Congressional direction on USACE flood risk reduction activities has evolved from primarily supporting levees, dams, and engineered dunes and beaches. Since 1974, Congress has required that USACE evaluate nonstructural alternatives, such as elevation of structures and acquisition of floodplain lands, during its planning of projects. Since the mid-2010s, Congress also has directed the consideration of natural and nature-based features (NNBFs). Examples of potential NNBFs for reducing flood risk include wetlands; oyster, mussel, and coral reefs; and the combination of these natural features with hard components, such as rock and concrete. Various factors are shaping how USACE is incorporating NNBFs into its flood risk reduction projects and post-flood repair activities. NNBFs in Flood Risk Reduction Projects Congress specifically included NNBFs as a planning requirement for USACE flood risk reduction projects in 2016. In 2018, Congress required that USACE feasibility reports for flood risk reduction projects consider using traditional and natural infrastructure, alone or in conjunction with each other. In recent feasibility reports, USACE primarily has proposed using NNBFs (other than engineered dunes and beaches) in combination with traditional structural measures rather than having the NNBFs as the primary means for reducing flood risk. To be recommended for congressional construction authorization, a USACE flood risk reduction project generally must have national flood risk reduction benefits that exceed the project's costs. Under current Administration guidance, USACE's evaluation of NNBFs is tailored to each project (i.e., it is case-by-case rather than standardized). NNBFs in Program to Repair Damaged Nonfederal Flood Control Works In 1996, Congress amended USACE's program to repair damage to certain nonfederal flood control works. Congress allowed for the program to fund nonstructural alternatives in lieu of USACE making repairs if a nonfederal entity requests and assumes responsibility for the nonstructural alternative. In 2016, Congress defined the program's nonstructural alternatives to include restoring and protecting natural resources (e.g., floodplains, wetlands, and coasts), if those alternatives reduce flood risk. In practice, the program continues to predominantly repair the damaged flood control works. That is, there remain a limited number of nonfederal entities pursuing nonstructural alternatives under this program. Identifying Challenges and Opportunities for NNBFs as Flood Risk Reduction Measures Quantifying the effectiveness and reliability of NNBFs as flood risk reduction measures in different environmental conditions and for different floods and storms is an area of ongoing research. In some circumstances, NNBFs may provide flood risk reduction and a suite of environmental and social benefits. In other applications, NNBFs may be unable to replicate the level of flood risk reduction provided by traditional structural and nonstructural measures. Congress may consider the following issues for NNBFs in USACE flood risk reduction activities: knowledge gaps in measuring the benefits and limitations of NNBFs and the research to fill these gaps; how USACE processes account for NNBFs' benefits, costs, and performance; and effects of agency practice, Administration guidance, and statutory authority on the consideration and adoption of NNBFs for flood risk reduction. Congress has requested two reports related to NNBFs from USACE. These reports, when available, may inform congressional deliberations on whetherâand, if so, howâto support the use of NNBFs as part of USACE flood risk reduction efforts.", "document_type": "crs"}
{"report": "This report provides context for Congress about the U.S. teen birth rateâor the number of births per 1,000 females aged 15 to 19 each yearâand its changes since the 1950s. Over this period, the teen birth rate has generally been in decline. This decline has been most significant in recent years, with the rate reaching a record low in 2018. Multiple factors have likely contributed to the decrease, though the influence of any single factor is not fully known. Reduced teen sexual activity, particularly among younger adolescents, could be one explanation. Increases in use of contraceptives, including highly effective and multiple methods, among sexually active teens could be another. Other factors, such as broader social and economic trends, may also be at play. Despite the decline in the teen birth rate, Congress continues to be interested in the issue of teen birth because of its high social and economic costs for both individual families and society more generally. Further, disparities persist in teen birth rates among racial and ethnic subgroups and across states. This report accompanies CRS Report R45183, Teen Pregnancy: Federal Prevention Programs , which discusses Congress's current approach of supporting programs that seek to prevent pregnancy among teens. Data on births are distinct from data on pregnancies. The teen birth rate refers to the number of live births per 1,000 teen girls aged 15 through 19. The teen pregnancy rate includes the number of pregnancies per 1,000 teen girls aged 15 through 19, which encompasses live births, abortions, and fetal losses . Birth data account for nearly every birth in the United States, whereas pregnancy data are based on estimates of miscarriages and abortion numbers that draw on various reporting systems and surveys. The Centers for Disease Control and Prevention (CDC), the federal government's lead public health agency, reports birth data on an annual basis (most recently for 2018). The CDC and the Guttmacher Institute publish teen pregnancy rates. These rates are usually published a year or two after birth data because of the time required to incorporate data from the various data sources. This report focuses on the teen birth rate. The CDC tracks birth rates by age and other characteristics of birth mothers. In 2018, there were approximately 3.8 million births in the United States. About 180,000 of these births (4.7%) were to teenagers aged 15 to 19. Figure 1 shows the U.S. teen birth rate from 1950 through 2018 (the rate excludes the territories). The rate ticked up in the baby boom era of the 1950s, peaking in 1957 at 96.3. It then decreased in most years from the 1960s through the 1980s. From 1991 onward, the teen birth rate declined except in two years, 2006 and 2007. The rate dropped by 72% from 1991 (61.8) to 2018 (17.4). In other words, about 6% of teens aged 15 to 19 gave birth in 1991 compared to less than 2% in 2018. The greatest decline in the teen birth rate occurred in recent years. For example, from 2007 to 2018, the rate declined by about 58%. The 2018 teen birth rate of 17.4 was a historical low since CDC began collecting and reporting birth data in the 1940s. The CDC began tracking subgroup data for teens in 1960, when the teen birth rate was highest for both teens aged 15 to 17 (43.9 per 1,000) and teens aged 18 to 19 (166.7 per 1,000). Figure 1 indicates that the birth rate was higher in each year for the older teens compared to the younger teens. The 2018 birth rates for 15- to 17-year-olds (7.2 per 1,000) and 18- to 19-year-olds (32.3 per 1,000) were the lowest on record. Repeat teen births have also declined over time. CDC found the number of subsequent teen births among youth aged 15 to 19 declined nationally by nearly 54% from 2004 to 2015 (the most recent analysis available). The prevalence of teen births that were repeat births was highest among Hispanic youth, followed by non-Hispanic black and non-Hispanic white youth. Over this same period, the largest declines in the number of repeat births were among black teens (21.8%), followed by Hispanic (16.8%) and white (13.9%) teens. Teen mothers have also been less likely to be married than in previous years. In 2018, the birth rate for unmarried teens aged 15 to 19 was 16.0 per 1,000. This is compared to 31.0 per 1,000 in 2010. Despite the overall decline in the teen birth rate, the rates for certain racial and ethnic groups remain relatively high. Teen birth rates in 2018 varied based on race and ethnicity, with three groupsâHispanic (26.7), non-Hispanic black (26.2), and non-Hispanic American Indian/Alaska Native (29.4) teensâhaving more than double the teen birth rate for non-Hispanic white (12.2) and non-Hispanic Asian or Pacific Islander (4.0) teens. Figure 2 shows the teen birth rate by race and Hispanic origin over three key years: 1991, when the teen birth rate started a long-term decline; 2007, the most recent year when the teen birth rate had ticked back up slightly; and 2018, the most recent year for which CDC compiled historical teen birth rate data by race and ethnicity. In nearly each year from 1991 through the recent period, the teen birth rate decreased for all racial and ethnic groups; however, the rates declined more for certain groups compared to others. From 2007 to 2018, birth rates fell by 55% for non-Hispanic white teens, 40% for non-Hispanic American Indian/Alaska Native teens, 58% for non-Hispanic black teens, 73% for non-Hispanic Asian/Pacific Islander teens, and 65% for Hispanic teens. While the birth rates for two groups (non-Hispanic black and Hispanic) had a greater decline than the rate for white teens, their birth rates remained higher. In 2018, the birth rate for teens aged 15 to 19 varied considerably by state and territory. The state with the lowest reported rate was Massachusetts (7.2); the state with the highest reported rate was Arkansas (30.4). Figure 3 shows a map with 2018 teen births rates in four data categories for the 50 states, the District of Columbia, and three of the territories. Eighteen states had rates of less than 15 per 1,000 teens aged 15 to 19: California, Colorado, Connecticut, Maine, Maryland, Massachusetts, Minnesota, New Hampshire, New Jersey, New York, Oregon, Pennsylvania, Rhode Island, Utah, Vermont, Virginia, Washington, and Wisconsin. Ten states had the highest teen birth rates (25 or higher): Alabama, Arkansas, Kentucky, Louisiana, Mississippi, New Mexico, Oklahoma, Tennessee, Texas, and West Virginia. The rates for the territories ranged from 19.3 in Puerto Rico to 34.4 in Guam. From 2007 (when the birth rate last ticked up) to 2018, the teen birth rate decreased in each state or territory by between 19% and 67%. Teen birth rates have also declined in rural areas over time but remain relatively higher than rates in urban areas. While the U.S. teen birth rate has decreased over time, it has been higher than that of most other industrialized countries. For comparison, the U.S. teen birth rate of 18.8 was about 50% higher than the rate of the United Kingdom, 12.6, in 2017 (based on the most recent international data available). The reasons for the high teen birth rate in the United States relative to other industrial countries have not been fully explored. Economic conditions and income inequality within and between countries may play a role. Further, the research literature, which is somewhat dated and limited, indicates that use of contraceptives among teens appears to be greater in other developed countries compared to the United States. Researchers suggest that multiple trends have driven down U.S. teen pregnancy and teen birth rates. They point to certain factors as the reason for declines over the 1990s through 2007. Research indicates that over this period, the risk of teen pregnancy decreased primarily because of improved contraceptive use, including an increase in the use of certain contraception methods (e.g., condoms), an increase in the use of multiple methods of contraception, and substantial declines in foregoing contraception. In addition, some of the risk of pregnancy decreased among younger teens, those ages 15 to 17, because of decreased sexual activity. A primary factor for more recent declines in the risk of teen pregnancy has also been the increasing use of contraceptives among sexually active teens. From 2007 through 2014, teens increased their contraceptive use, including the use of any method, the use of long-acting reversible contraceptives (LARCs; e.g., intrauterine devices, or IUDs, and birth control implants), and the use of the withdrawal method along with another method. Broad economic and social variables may influence teen behaviors, such as whether they will abstain from sex or use contraceptives. Behavioral changes may have been driven by a confluence of factors, such as expanded educational and labor market opportunities for women and improvements in contraceptive technology. Some observers theorize that the long-term downward trend in teen birth rates is attributable to the recession that began in 2007. They contend that during economic downturns the decrease in teen birthsâlike the decrease in overall birthsâis partly due to teenagers being more careful as they witness the economic difficulties faced by their families. Despite this rationale, the teen birth rate continued to diminish after the recession (as well as during periods of economic expansion in the 1990s). Another possible explanation for the decline is the role of social media and increased use of the internet in teens' knowledge about sex and birth control. One analysis found that there were more rapid declines in rates of teen childbearing in places where the MTV show 16 and Pregnant was more widely viewed. The study extrapolated that teens changed their behavior (e.g., increasing the use of contraceptives) after viewing the show. Still, teen birth rates declined even after ratings for the show peaked. Some observers contend that teen pregnancy prevention programs, such as those supported with federal funding, could potentially play a role in the declining birth rate for teenagers. However, the extent to which these programs have caused a decline in the teen birth rate is not fully known. Teen pregnancy has high costs for the families of teen parents and society more generally. Teenage mothers and fathers tend to have less education and are more likely to live in poverty than their peers who are not teen parents. For example, nearly one-third of teen girls who have dropped out of high school cite pregnancy or parenthood as a reason, about 7 out of 10 teen mothers who have moved out of their family's household live below the poverty level, and more than 60% of teen mothers receive some type of public benefits within the first year after their children are born. Lower levels of education reduce teen parents' potential for economic self-sufficiency. At the same time, being impoverished and having less education can also increase the likelihood of teens becoming pregnant in the first place. These poorer outcomes may be explained in part by underlying differences between those who give birth as teens and those who delay childbearing: teen mothers often come from more disadvantaged backgrounds (e.g., family more likely to receive public welfare benefits, parents have lower levels of education) than their counterparts who have children at a later age. In addition, teen sexual activity even among those who do not become pregnant can increase the risk of sexually transmitted infections (STIs), which can led to long-term health issues. Adolescents aged 15 to 19 have certain STIs at a rate that is among the highest of sexually active individuals. Further, teen childbearing can also affect the offspring of teen parents. Children of teenage mothers have poorer outcomes than children of mothers who give birth in their early 20s or later. They are generally more likely to (1) have chronic medical conditions, (2) use public health care, (3) have lower school readiness scores, (4) do poorly in school, (5) give birth during their teen years (females), and (6) be incarcerated (males). In addition to the consequences for teens and their families, teen childbearing has societal impacts. One study examined these societal impacts, specifically estimating the cost savings to public programs that were associated with avoiding unintended pregnancies during the teen years. The Power to Decide did a simulation analysis to estimate the number of births to teenagers that had been averted due to the decrease in teen fertility rates from 1991 to 2015. The analysis then estimated total savings of $4.4 billion for this period, taking into consideration the cost savings to Medicaid that would have been associated with labor and delivery, postpartum care for the mother, and infant care; and receipt of Temporary Assistance for Needy Families (TANF), Supplemental Nutrition Assistance Program (SNAP), and Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) benefits. Additional research of decreased or delayed teenage pregnancy and childbearing could help to inform the impacts for teen parents, their children, and society more generally.", "summary": "The Centers for Disease Control and Prevention (CDC), the federal government's lead public health agency, has identified teen pregnancy as a major public health issue because of its high cost for families of teenage parents and society more broadly. The CDC highlights that the teen pregnancy rate has decreased steadily, dropping below CDC's target goal of 30.3 per 1,000 females aged 15 to 17 by 2015; however, the CDC also raises the concern that the United States has one of the highest rates of teen births of all industrialized countries. This report discusses trends in teen birth ratesâor the number of births per 1,000 females aged 15 to 19 each yearâsince the 1950s. The rate of teens births peaked in 1957 at 96.3. It then decreased in most years from the 1960s through the 1980s. From 1991 onward, the rate declined except in two years, 2006 and 2007. The greatest decline in teen birth rates has occurred in recent years. For example, from 2007 to 2018, the rate declined by approximately 58%. The 2018 teen birth rate of 17.4 was a historical low since CDC began collecting and reporting birth data in the 1940s. In nearly each year from 1991 through the recent period, the teen birth rate decreased for all racial and ethnic groups; however, the rates declined more for certain groups than others. While the birth rates for two groups (non-Hispanic blacks and Hispanics) declined more than the rate for white teens, their birth rates remained higher overall. In 2018, Hispanic (26.7), non-Hispanic black (26.2), and non-Hispanic American Indian/Alaska Native (29.4) teens had more than double the teen birth rate for non-Hispanic white (12.2) and non-Hispanic Asian or Pacific Islander (4.0) teens. Teen birth rates have varied considerably by state and territory. In 2018, the state with the lowest reported rate was Massachusetts (7.2); the state with the highest reported rate was Arkansas (30.4). Teen birth rates have declined in rural areas over time but remain relatively higher than rates in urban areas. Research suggests that multiple trends have led to lower U.S. teen pregnancy and birth rates. From the 1990s through 2007, the risk of teen pregnancy decreased primarily because of improved contraceptive use, including an increase in the use of certain contraception methods (e.g., condoms), an increase in the use of multiple methods of contraception, and substantial declines in foregoing the use of contraception altogether. Some of the risk of pregnancy decreased among younger teens because of decreased sexual activity. A primary factor for more recent declines in the risk of teen pregnancy has been the increasing use of contraceptives among sexually active teens. Broad economic and social variables may influence teen behaviors, such as whether they will abstain from sex or use contraceptives. Teen pregnancy has high costs for teen parents, their children, and society more generally. Teenage mothers and fathers tend to have less education and are more likely to live in poverty than their peers who are not parents. Moreover, lower levels of education reduce teen parents' potential for economic self-sufficiency. Some analysis has looked at these societal impacts and the benefits of avoiding pregnancy during the teen years. This report accompanies CRS Report R45183, Teen Pregnancy: Federal Prevention Programs , which discusses Congress's current approach of supporting programs that seek to prevent pregnancy among teens; and CRS In Focus IF10877, Federal Teen Pregnancy Prevention Programs , which includes summary information about the programs.", "document_type": "crs"}
{"report": "T he House pay-as-you-go (PAYGO) rule is generally intended to discourage or prevent Congress from taking certain legislative action that would increase the deficit. It prohibits the consideration of direct spending and revenue legislation that is projected to increase the deficit over either a 6-year or an 11-year period. In effect, the rule requires legislation that includes provisions projected to increase direct spending or reduce revenues to also include offsetting provisions over the two specified periods. The House PAYGO rule was first established at the beginning of the 110 th Congress and modified in the 111 th Congress. It was replaced by the cut-as-you-go (CUTGO) rule, which applied only to direct spending legislation, at the beginning of the 112 th Congress. The PAYGO rule was reinstated, with modifications, replacing the CUTGO rule, at the beginning of the 116 th Congress. This report explains the House PAYGO rule's features, describes its legislative history, and discusses how it compares to statutory PAYGO requirements. It updates the previous version (dated November 30, 2010), largely with information about the CUTGO rule and the PAYGO rule, as adopted in the 116 th Congress. The full text of the House PAYGO rule is provided in the Appendix . The House PAYGO rule adopted for the 116 th Congress prohibits the consideration of legislation affecting direct spending and revenues that is projected to increase the deficit, or reduce the surplus, over either of two time periods: (1) the 6-year period consisting of the current fiscal year, the budget year, and the 4 ensuing fiscal years; or (2) the 11-year period consisting of the current year, the budget year, and the ensuing 9 fiscal years. The House PAYGO rule applies to legislation affecting direct spending and revenues . Direct spending, also referred to as mandatory spending, has two distinguishing features: (1) it is provided or controlled in authorizing legislation; and (2) it generally continues without any annual legislative action. Examples of programs funded through direct spending include Medicare, unemployment compensation, and federal retirement. Direct spending is within the jurisdiction of the respective authorizing committees. Revenues are the funds collected from the public primarily as a result of the federal government's exercise of its sovereign taxing power. They consist of receipts from individual income taxes, payroll taxes, corporate income taxes, excise taxes, duties, gifts, and miscellaneous receipts. Revenues are within the jurisdiction of the Committee on Ways and Means in the House. The House PAYGO rule does not apply to discretionary spending , which is provided and controlled through the annual appropriations process. Discretionary spending is not counted for purposes of determining whether legislation increases the deficit under the House PAYGO rule. The rule generally requires that each measure affecting direct spending and revenues not increase the deficit over either of the two time periods specified. That is, to comply with the rule, each measure that includes provisions projected to increase direct spending or reduce revenues must also include offsetting provisions projected to reduce direct spending, increase revenues, or both, by equivalent amounts. A projected deficit reduction resulting from a measure previously passed by the House, or one to be considered subsequently by the House, cannot be used to offset a deficit increase due to provisions in a measure currently under consideration. The rule provides one exception to this measure-by-measure application. Under clause 10(b) of House Rule XXI, savings from a previously passed measure may be included in determining a separate measure's PAYGO compliance if a special rule provides that the two measures are to be combined upon engrossment. The rule specifies that a determination of the effect of direct spending and revenue legislation on the deficit or surplus is to be based on estimates made by the Committee on the Budget relative to the Congressional Budget Office (CBO) baseline estimates. In producing its baseline estimates, CBO projects revenues, spending, and deficit or surplus levels under existing law (i.e., assuming no legislative changes). Under the rule, such baseline estimates are to be consistent with Section 257 of the Balanced Budget and Emergency Deficit Control Act of 1985, as amended. The House PAYGO rule does not apply to direct spending increases or revenue reductions that occur under existing law. That is, if direct spending increases because more individuals qualify for benefits under existing law, for example, any increase in the deficit is not counted for PAYGO purposes and is beyond the rule's control. The House PAYGO rule exempts provisions designated as an emergency from being counted in determining compliance with the rule. Under clause 10(c) of House Rule XXI, a determination as to whether legislation increases the deficit, or reduces the surplus, shall exclude any provision \"expressly designated as an emergency for the purposes of pay-as-you-go principles.\" If legislation contains such a designation, the chair must put the question of consideration to the full House prior to its consideration. That is, the House must vote on whether or not to consider the legislation, even though all or certain budgetary effects would be exempt from the House PAYGO rule. If the question is decided in the affirmative (by simple majority), the legislation may then be considered. Alternatively, if the question is decided in the negative, the legislation may not be considered. The House PAYGO rule is enforced by a point of order to prevent the consideration of legislation that does not meet the requirement. If legislation brought up on the House floor violates the rule (i.e., increases the deficit, or reduces the surplus, in either of the two fiscal-year periods), a Member may raise a point of order against it. If the point of order is sustained, the legislation may not be considered (in the case of an amendment, the amendment falls). The House rule, however, is not self-enforcing: a Member must raise the point of order to enforce it. In addition, the House rule may be waived by a special rule reported by the House Rules Committee and agreed to by the House by majority vote, by considering the legislation under the suspension of the rules procedures, or by unanimous consent. Finally, the House PAYGO rule, as part of the standing rules of the House, is effective for the current Congress for which it is adopted. The House PAYGO rule was first established at the beginning of the 110 th Congress. It was modified at the beginning of the 111 th Congress, as part of the opening-day rules package, and again in the second session of the 111 th Congress, as part of a special rule providing for the consideration of an unrelated measure. In addition, its application to certain legislation was modified during the first session of the 111 th Congress, as part of the FY2010 budget resolution ( S.Con.Res. 13 ). At the beginning of the 112 th Congress, it was replaced with the CUTGO rule, which focused exclusively on the mandatory spending effects of legislation, eliminating any revenue effects from the budgetary evaluation under the rule. Most recently, at the beginning of the 116 th Congress, the PAYGO rule was reinstituted, covering both mandatory spending and revenues, with certain modifications. Even before the 110 th Congress began, the new Democratic leadership in both chambers indicated an intention to \"restore\" PAYGO rules. Accordingly, the House adopted its own PAYGO rule as part of its opening-day rules package. The original House PAYGO rule generally prohibited the consideration of legislation affecting direct spending and revenues that was projected to increase the deficit or reduce the surplus over a 6-year and an 11-year period. In this original form, as it does in its current form, the rule counted on-budget and off-budget entities (such as Social Security) in determining the effect on the deficit (referred to as the unified budget deficit ). The rule also directed the Budget Committee to use the following particular baseline estimates when determining the effect of legislation on the deficit: after the beginning of a new calendar year but before the consideration of a budget resolution, the Budget Committee was to use the most recent baseline estimates supplied by CBO; and after the consideration of the budget resolution, the Budget Committee was to use the most recent baseline estimates supplied by CBO used in considering the budget resolution. Lastly, the original rule provided no explicit exemptions, such as adopted in the 116 th Congress. At the beginning of the 111 th Congress, following the customary practice, the House adopted its rules by adopting the preceding Congress's rules, including the House PAYGO rule, with certain amendments. Three changes were made to the PAYGO rule. First, the rule was modified to require the Budget Committee to use baseline estimates supplied by CBO, replacing the particular baseline estimates specified in the original rule. Second, a provision was added to the rule to allow for an exception to its measure-by-measure application. Under this exception, which is still in the rule in the 116 th Congress, the budgetary effects of a House-passed bill may be used to determine compliance with the PAYGO requirement of a separate measure if a special rule provides that the two measures are to be combined upon engrossment. Lastly, the rule was amended to exempt provisions designated as an emergency and to provide for a question of consideration for legislation containing such a designation. Later in the 111 th Congress, during the second session, the House further amended clause 10 of Rule XXI generally to align the House PAYGO rule with the Statutory Pay-As-You-Go Act of 2010, which was enacted earlier in the year. The changes were included in Section 5 of H.Res. 1500 , a special rule providing for the consideration of an unrelated measure. The changes largely related to scoring issuesâwhat budgetary effects would count and not count for purposes of determining if legislation increased the deficit (or reduced the surplus). First, the rule was amended to focus on the \"on-budget deficit,\" excluding any \"off-budget\" effects, such as those affecting the Social Security trust funds. Second, the rule was amended to require that determinations of the budgetary effects of legislation were consistent with the Statutory PAYGO Act. Specifically, the following scoring requirements were incorporated into the House PAYGO rule. Included in estimates: budgetary effects resulting from \"outyear modifications\" of direct spending laws contained in appropriations acts. Excluded from estimates: budgetary effects due to \"timing shifts\" from inside to outside the 11-year period covered by the PAYGO rule; and budgetary effects resulting from legislation extending current policy (referred to as \"adjustments for current policies\"), which were scheduled by statute to expire at the time, in four areas: (1) Medicare payments to physicians; (2) the estate and gift tax; (3) the alternative minimum tax (AMT); and (4) middle-class tax cuts. At the beginning of the 112 th Congress, in adopting the rules of the House, the new Republican majority replaced the PAYGO rule with a new Cut-As-You-Go (CUTGO) rule. In general, the CUTGO rule focused on the net effect of new legislation on mandatory spending only, excluding any effects on revenues. Specifically, the rule prohibited the consideration of any legislation that would have the net effect of increasing mandatory spending over the same 6-year and 11-year periods as the previous PAYGO rule. Excluding the projected revenue effects had at least two implications: (1) the House could consider legislation reducing revenues, regardless of whether it would increase the projected deficit, without being vulnerable to a point of order under the rule; and (2) legislation projected to increase mandatory spending could not be offset by an increase in revenues, in order to comply with the rule. The CUTGO rule also did not continue the \"adjustments for current policies,\" as provided in the Statutory PAYGO Act. It is worth noting that these statutory adjustments were set to expire at the end of 2011 and were not extended beyond 2011. Other than these changes, the CUTGO rule generally retained the procedures related to the operation of the previous PAYGO rule. For example, the budgetary effects designated as emergency requirements under the Statutory PAYGO Act were excluded and also required a vote on the question of consideration, as provided in the new PAYGO rule, as described above. The CUTGO rule was renewed, without change, in each subsequent Congress, through the 115 th Congress (i.e., through 2018). At the beginning of the 116 th Congress, in adopting the rules of the House, the new Democratic majority reinstituted the PAYGO rule, replacing the previous CUTGO rule. Most significantly, the PAYGO rule reincorporates the projected revenue effects of legislation into the evaluation of determining a violation. The new rule, however, is not exactly the same PAYGO rule that existed at the end of the 111 th Congress. In particular, unlike the previous PAYGO rule, it includes off-budget effects, such as those that affect the receipts and outlays of the Social Security trust funds. In general, other than these changes, the new House PAYGO rule retains the procedures related to the operation of the former CUTGO and PAYGO rules. For example, the new PAYGO rule continues to provide for combining the budgetary effects of two measures, under particular circumstances, and for excluding budgetary effects designated as an emergency, as described in the \" Features of the House PAYGO Rule ,\" section above. The House PAYGO rule exists alongside similar PAYGO requirements in statute. Like the House rule, the Statutory Pay-As-You-Go Act of 2010 (Title I of P.L. 111-139 , 124 Stat. 8-29), enacted on February 12, 2010, is intended to discourage or prevent Congress from taking certain legislative action that would increase the on-budget deficit. It generally requires that legislation affecting direct spending or revenues not increase the deficit over the 6-year and 11-year time periods, as in the House rule. Notably, the Statutory PAYGO Act relates only to the on-budget effects of legislation, excluding any off-budget effects, such as those affecting the Social Security trust funds. While the House PAYGO rule and the statutory requirements are similar, they are different in significant ways relating to when and how they are enforced. The House rule applies during the consideration of legislation on the House floor. That is, the House rule prohibits the consideration of the legislation on the House floor if it does not comply with the requirement. In addition, under the House PAYGO rule, each measure affecting direct spending and revenues must comply with the requirement, with the one exception of two measures combined upon engrossment, as explained above. The Statutory PAYGO Act, in contrast, applies the requirement to legislation after it has been enacted. Moreover, instead of requiring that each enacted bill not increase the deficit, the statutory rule requires that the net effect of all bills affecting direct spending and revenues (referred to as PAYGO legislation or PAYGO acts) enacted during a session of Congress not increase the deficit. That is, under the statutory rule, the net effect of all PAYGO acts enacted during a session of Congress must not increase the deficit over either a 5-year or a 10-year period. In other words, Congress can enact legislation increasing the deficit and still comply with the statutory rule as long as separate legislation offsetting such increases in the deficit is enacted during the same year. Reflecting the difference in when the PAYGO requirement is applied, the congressional and statutory rules also differ in how they are enforced. As noted above, the House PAYGO rule is enforced by a point of order to prevent the consideration of legislation that does not meet the requirement. In contrast, the statutory PAYGO rule is enforced by sequestrationâthe cancellation of budgetary resources provided by laws affecting direct spendingâto eliminate an increase in the deficit resulting from the enactment of legislation. The former is an internal procedure of the House, whereas the latter involves actions taken by the President and the Office of Management and Budget. The statutory PAYGO rule provides that if the net effect of direct spending and revenue legislation enacted during a year increases the deficit (i.e., violates the PAYGO requirement), budgetary resources in certain direct spending programs are cut in order to eliminate the increase in the deficit. Specifically, the average budgetary effects (i.e., any increase or decrease in the deficit) over 5-year and 10-year periods of each PAYGO act are placed on 5-year and 10-year scorecards, respectively. The PAYGO requirement effectively is applied to the balances on each of these scorecards 14 days after Congress adjourns at the end of a session. If either scorecard shows a positive balance (referred to as a debit ) for the budget year, the President is required to issue a sequestration order cancelling budgetary resources in non-exempt direct spending programs sufficient to eliminate the balance (the larger balance if both scorecards show a positive balance). Finally, although the House PAYGO rule must be adopted anew at the beginning of each new Congress, the Statutory PAYGO Act does not include any expiration date. 10. (a)(1) Except as provided in paragraphs (b) and (c), it shall not be in order to consider any bill, joint resolution, amendment, or conference report if the provisions of such measure affecting direct spending and revenues have the net effect of increasing the deficit or reducing the surplus for either the period comprisingâ (A) the current fiscal year, the budget year, and the four fiscal years following that budget year; or (B) the current fiscal year, the budget year, and the nine fiscal years following that budget year. (2) The effect of such measure on the deficit or surplus shall be determined on the basis of estimates made by the Committee on the Budget relative to baseline estimates supplied by the Congressional Budget Office consistent with section 257 of the Balanced Budget and Emergency Deficit Control Act of 1985. (b) If a bill, joint resolution, or amendment is considered pursuant to a special order of the House directing the Clerk to add as new matter at the end of such measure the provisions of a separate measure as passed by the House, the provisions of such separate measure as passed by the House shall be included in the evaluation under paragraph (a) of the bill, joint resolution, or amendment. (c)(1) Except as provided in subparagraph (2), the evaluation under paragraph (a) shall exclude a provision expressly designated as an emergency for purposes of pay-as-you-go principles in the case of a point of order under this clause against consideration ofâ (A) a bill or joint resolution; (B) an amendment made in order as original text by a special order of business; (C) a conference report; or (D) an amendment between the Houses. (2) In the case of an amendment (other than one specified in subparagraph (1)) to a bill or joint resolution, the evaluation under paragraph (a) shall give no cognizance to any designation of emergency. (3) If a bill, joint resolution, an amendment made in order as original text by a special order of business, a conference report, or an amendment between the Houses includes a provision expressly designated as an emergency for purposes of pay-as-you-go principles, the Chair shall put the question of consideration with respect thereto. (d) For the purpose of this clause, the terms \"budget year\" and \"current year\" have the meanings specified in section 250 of the Balanced Budget and Emergency Deficit Control Act of 1985, and the term \"direct spending\" has the meaning specified in such section 250 except that such term shall also include provisions in appropriations Acts that make outyear modifications to substantive law as described in section 3(4)(C) of the Statutory Pay-As-You-Go Act of 2010.", "summary": "The House pay-as-you-go (PAYGO) rule is generally intended to discourage or prevent Congress from taking certain legislative action that would increase the deficit. The rule requires that legislation affecting direct spending or revenues not increase the projected deficit over either a 6-year or an 11-year period. In effect, the rule requires that any legislation projected to increase direct spending or reduce revenues must be offset by equivalent amounts of direct spending cuts, revenue increases, or a combination of the two, over the two specified periods. The House PAYGO rule applies to legislation affecting direct spending and revenues . It does not apply to discretionary spending . This rule exempts provisions designated as an emergency from being counted in determining compliance with the PAYGO rule. First established at the beginning of the 110 th Congress, the House PAYGO rule was modified during the 111 th Congress: at the beginning of the 111 th Congress, as part of the opening-day rules package; and again in the second session of the 111 th Congress, as part of a special rule providing for the consideration of an unrelated measure. At the beginning of the 112 th Congress, it was replaced with the Cut-As-You-Go (CUTGO) rule, which focused exclusively on the mandatory spending effects of legislation, eliminating any revenue effects from the budgetary evaluation under the rule. Most recently, at the beginning of the 116 th Congress, the PAYGO rule was reinstituted, covering both direct spending and revenues, with certain modifications. The House PAYGO rule exists alongside similar PAYGO requirements in statute, but with some significant differences. The House rule (1) applies the PAYGO requirement during the consideration of legislation on the House floor, (2) applies generally to each measure individually, and (3) is enforced by a point of order on the House floor. The Statutory PAYGO Act, in contrast, (1) applies the requirement to legislation after it has been enacted, (2) applies to the net effect of all legislation enacted during a session of Congress, and (3) is enforced by sequestrationâthe cancellation of budgetary resources provided by laws affecting direct spendingâto eliminate an increase in the deficit resulting from the enactment of legislation. This report updates the previous version (dated November 30, 2010) with descriptions of the changes instituted by the CUTGO rule, adopted at the beginning of the 112 th Congress, and the current PAYGO rule, adopted at the beginning of the 116 th Congress.", "document_type": "crs"}
{"report": "Iran is a country of nearly 80 million people, located in the heart of the Persian Gulf region. The United States was an ally of the late Shah of Iran, Mohammad Reza Pahlavi (\"the Shah\"), who ruled from 1941 until his ouster in February 1979. The Shah assumed the throne when Britain and Russia forced his father, Reza Shah Pahlavi (Reza Shah), from power because of his perceived alignment with Germany in World War II. Reza Shah had assumed power in 1921 when, as an officer in Iran's only military force, the Cossack Brigade (reflecting Russian influence in Iran in the early 20 th century), he launched a coup against the government of the Qajar Dynasty, which had ruled since 1794. Reza Shah was proclaimed Shah in 1925, founding the Pahlavi dynasty. The Qajar dynasty had been in decline for many years before Reza Shah's takeover. That dynasty's perceived manipulation by Britain and Russia had been one of the causes of the 1906 constitutionalist movement, which forced the Qajar dynasty to form Iran's first Majles (parliament) in August 1906 and promulgate a constitution in December 1906. Prior to the Qajars, what is now Iran was the center of several Persian empires and dynasties whose reach shrank steadily over time. After the 16 th century, Iranian empires lost control of Bahrain (1521), Baghdad (1638), the Caucasus (1828), western Afghanistan (1857), Baluchistan (1872), and what is now Turkmenistan (1894). Iran adopted Shiite Islam under the Safavid Dynasty (1500-1722), which ended a series of Turkic and Mongol conquests. The Shah was anti-Communist, and the United States viewed his government as a bulwark against the expansion of Soviet influence in the Persian Gulf and a counterweight to pro-Soviet Arab regimes and movements. Israel maintained a representative office in Iran during the Shah's time and the Shah supported a peaceful resolution of the Arab-Israeli dispute. In 1951, under pressure from nationalists in the Majles (parliament) who gained strength in the 1949 Majles elections, he appointed a popular nationalist parliamentarian, Dr. Mohammad Mossadeq, as prime minister. Mossadeq was widely considered left-leaning, and the United States was wary of his drive for nationalization of the oil industry, which had been controlled since 1913 by the Anglo-Persian Oil Company. His followers began an uprising in August 1953 when the Shah tried to dismiss him, and the Shah fled. The Shah was restored to power in a CIA-supported uprising that toppled Mossadeq (\"Operation Ajax\") on August 19, 1953. The Shah tried to modernize Iran and orient it toward the West, but in so doing he alienated the Shiite clergy and religious Iranians. He incurred broader resentment by using his SAVAK intelligence service to repress dissent. The Shah exiled Ayatollah Ruhollah Khomeini in 1964 because of Khomeini's active opposition to what he asserted were the Shah's anticlerical policies and forfeiture of Iran's sovereignty to the United States. Khomeini fled to and taught in Najaf, Iraq, a major Shiite theological center. In 1978, three years after the March 6, 1975, Algiers Accords between the Shah and Iraq's Baathist leaders that temporarily ended mutual hostile actions, Iraq expelled Khomeini to France, where he continued to agitate for revolution that would establish Islamic government in Iran. Mass demonstrations and guerrilla activity by pro-Khomeini forces caused the Shah's government to collapse. Khomeini returned from France on February 1, 1979, and, on February 11, 1979, he declared an Islamic Republic of Iran. Khomeini's concept of velayat-e-faqih (rule by a supreme Islamic jurisprudent, or \"Supreme Leader\") was enshrined in the constitution that was adopted in a public referendum in December 1979 (and amended in 1989). The constitution provided for the post of Supreme Leader of the Revolution. The regime based itself on strong opposition to Western influence, and relations between the United States and the Islamic Republic turned openly hostile after the November 4, 1979, seizure of the U.S. Embassy and its U.S. diplomats by pro-Khomeini radicals, which began the so-called hostage crisis that ended in January 1981 with the release of the hostages. Ayatollah Khomeini died on June 3, 1989, and was succeeded by Ayatollah Ali Khamene'i. The regime faced serious unrest in its first few years, including a June 1981 bombing at the headquarters of the Islamic Republican Party (IRP) and the prime minister's office that killed several senior elected and clerical leaders, including then-Prime Minister Javad Bahonar, elected President Ali Raja'i, and IRP head and top Khomeini disciple Ayatollah Mohammad Hussein Beheshti. The regime used these events, along with the hostage crisis with the United States, to justify purging many of the secular, liberal, and left-wing personalities that had been prominent in the years just after the revolution. Examples included the regime's first Prime Minister Mehdi Bazargan; the pro-Moscow Tudeh Party (Communist); the People's Mojahedin Organization of Iran (PMOI, see below); and the first elected president, Abolhassan Bani Sadr. The regime was under economic and military threat during the 1980-1988 Iran-Iraq War. Some experts attribute the acrimony that has characterized U.S.-Iran relations since the Islamic revolution to the structure of Iran's regime. Although there are some elected leadership posts and diversity of opinion, Iran's constitution—adopted in public referenda in 1980 and again in 1989—reserves paramount decisionmaking authority for a \"Supreme Leader\" (known in Iran as \"Leader of the Revolution\"). The President and the Majles (unicameral parliament) are directly elected, and since 2013, there have been elections for municipal councils that set local development priorities and select mayors. Even within the unelected institutions, factional disputes between those who insist on ideological purity and those considered more pragmatic are evident. In part because of the preponderant political power of the clerics and the security services, the regime has faced repeated periodic unrest from minorities, intellectuals, students, labor groups, the poor, women, and members of Iran's minority groups. (Iran's demographics are depicted in a text box below.) U.S. officials in successive Administrations have accused Iran's regime of widespread corruption, both within the government and among its pillars of support. In a speech on Iran on July 22, 2018, Secretary of State Michael Pompeo characterized Iran's government as \"something that resembles the mafia more than a government.\" He detailed allegations of the abuse of privileges enjoyed by Iran's leaders and supporting elites to enrich themselves and their supporters at the expense of the public good. The State Department's September 2018 \"Outlaw Regime\" report (p. 41) states that \"corruption and mismanagement at the highest levels of the Iranian regime have produced years of environmental exploitation and degradation throughout the country.\" Iran's power structure consists of unelected or indirectly elected persons and institutions. At the apex of the Islamic Republic's power structure is the \"Supreme Leader.\" He is chosen by an elected body—the Assembly of Experts—which also has the constitutional power to remove him, as well as to redraft Iran's constitution and submit it for approval in a national referendum. The Supreme Leader is required to be a senior Shia cleric. Upon Ayatollah Khomeini's death, the Assembly selected one of his disciples, Ayatollah Ali Khamene'i, as Supreme Leader. Although he has never had Khomeini's undisputed political or religious authority, the powers of the office ensure that Khamene'i is Iran's paramount leader. Under the constitution, the Supreme Leader is commander-in-chief of the armed forces, giving him the power to appoint commanders. Khamene'i makes five out of the nine appointments to the country's highest national security body, the Supreme National Security Council (SNSC), including its top official, the secretary of the body. Khamene'i also has a representative of his office as one of the nine members, who typically are members of the regime's top military, foreign policy, and domestic security organizations. The Supreme Leader can remove an elected president, if the judiciary or the Majles (parliament) assert cause for removal. The Supreme Leader appoints half of the 12-member Council of Guardians , all members of the Expediency Council , and the judiciary head. There is no announced successor to Khamene'i. The Assembly of Experts could conceivably use a constitutional provision to set up a three-person leadership council as successor rather than select one new Supreme Leader. Khamene'i reportedly favors as his successor Hojjat ol-Eslam Ibrahim Raisi, whom he appointed in March 2019 as new head of the judiciary, and in 2016 to head the powerful Shrine of Imam Reza (Astan-e Qods Razavi) in Mashhad, which controls vast property and many businesses in the province. Raisi is a hardliner who has served as state prosecutor and was allegedly involved in the 1988 massacre of prisoners and other acts of repression. The 2019 judiciary appointment suggests that Raisi's chances of becoming Supreme Leader were not necessarily diminished by his loss in the May 2017 presidential elections. Still, the person Raisi replaced as judiciary chief, Ayatollah Sadeq Larijani, remains a succession candidate. Another contender is hardline Tehran Friday prayer leader Ayatollah Ahmad Khatemi, and some consider President Rouhani as a significant contender as well. Two appointed councils play a major role on legislation, election candidate vetting, and policy. The 12-member Council of Guardians (COG) consists of six Islamic jurists appointed by the Supreme Leader and six lawyers selected by the judiciary and confirmed by the Majles . Each councilor serves a six-year term, staggered such that half the body turns over every three years. Currently headed by Ayatollah Ahmad Jannati, the conservative-controlled body reviews legislation to ensure it conforms to Islamic law. It also vets election candidates by evaluating their backgrounds according to constitutional requirements that each candidate demonstrate knowledge of Islam, loyalty to the Islamic system of government, and other criteria that are largely subjective. The COG also certifies election results. Municipal council candidates are vetted not by the COG but by local committees established by the Majles . The Expediency Council was established in 1988 to resolve legislative disagreements between the Majles and the COG. It has since evolved into primarily a policy advisory body for the Supreme Leader. Its members serve five-year terms. Longtime regime stalwart Ayatollah Ali Akbar Hashemi-Rafsanjani was reappointed as its chairman in February 2007 and served in that position until his January 2017 death. In August 2017, the Supreme Leader named a new, expanded (from 42 to 45 members) Council, with former judiciary head Ayatollah Mahmoud Hashemi Shahroudi as chairman. Shahroudi passed away in December 2018 and Sadeq Larijani, who was then head of the judiciary, was appointed by the Supreme Leader as his replacement. President Hassan Rouhani and Majles Speaker Ali Larijani were not reappointed as Council members but attend the body's sessions in their official capacities. The council includes former president Ahmadinejad. The leaders and senior officials of a variety of overlapping domestic security organizations form a parallel power structure that is largely under the direct control of the Supreme Leader in his capacity as Commander-in-Chief of the Armed Forces. State Department and other human reports on Iran repeatedly assert that internal security personnel are not held accountable for human rights abuses. The domestic security organs include the following: The Islamic Revolutionary Guard Corps (IRGC). The IRGC's domestic security role is generally implemented through the IRGC-led volunteer militia force called the Basij . The Basij is widely accused of arresting women who violate the regime's public dress codes and raiding Western-style parties in which alcohol, which is illegal in Iran, might be served. However, IRGC bases are often located in urban areas, giving the IRGC a capability to quickly intervene to suppress large antigovernment demonstrations. Law Enforcement Forces. This body is an amalgam of regular police, gendarmerie, and riot police that serve throughout the country. It is the regime's first \"line of defense\" in suppressing antiregime demonstrations or other unrest. Ministry of Interior. The ministry exercises civilian supervision of Iran's police and domestic security forces. The IRGC and Basij are generally outside ministry control. Ministry of Intelligence and Security (MOIS). Headed by Mahmoud Alavi, the MOIS conducts domestic surveillance to identify regime opponents and try to penetrate antiregime cells. The Ministry works closely with the IRGC and Basij . Several of these organizations and their senior leaders or commanders are sanctioned by the United States for human rights abuses and other violations of U.S. Executive Orders. Several major institutional positions are directly elected by the population, but international observers question the credibility of Iran's elections because of the role of the COG in vetting candidates and limiting the number and ideological diversity of the candidate field. Women can vote and run for most offices, and some women serve as mayors, but the COG interprets the Iranian constitution as prohibiting women from running for the office of president. Candidates for all offices must receive more than 50% of the vote, otherwise a runoff is held several weeks later. Another criticism of the political process in Iran is the relative absence of political parties; establishing a party requires the permission of the Interior Ministry under Article 10 of Iran's constitution. The standards to obtain approval are high: to date, numerous parties have filed for permission since the regime was founded, but only those considered loyal to the regime have been granted license to operate. Some have been licensed and then banned after their leaders opposed regime policies, such as the Islamic Iran Participation Front and Organization of Mojahedin of the Islamic Revolution, discussed in the text box below. The main directly elected institution is the presidency, which is formally and in practice subordinate to the Supreme Leader. Virtually every successive president has tried but failed to expand his authority relative to the Supreme Leader. Presidential authority, particularly on matters of national security, is also often circumscribed by key clerics and the generally hardline military and security organization called the Islamic Revolutionary Guard Corps (IRGC). But, the presidency is often the most influential economic policymaking position, as well as a source of patronage. The president appoints and supervises the cabinet, develops the budgets of cabinet departments, and imposes and collects taxes on corporations and other bodies. The presidency also runs oversight bodies such as the Anticorruption Headquarters and the General Inspection Organization, to which government officials are required to submit annual financial disclosures. Prior to 1989, Iran had both an elected president and a prime minister selected by the elected Majles (parliament). However, the holders of the two positions were constantly in institutional conflict and a 1989 constitutional revision eliminated the prime ministership. Because Iran's presidents have sometimes asserted the powers of their institution against the office of the Supreme Leader itself, since October 2011, Khamene'i has periodically raised the possibility of eventually eliminating the post of president and restoring the post of prime minister . Iran's Majles , or parliament, is a 290-seat, all-elected, unicameral body. There are five \"reserved seats\" for \"recognized\" minority communities—Jews, Zoroastrians, and Christians (three seats of the five). The Majles votes on each nominee to a cabinet post, and drafts and acts on legislation. Among its main duties is to consider and enact a proposed national budget (which runs from March 21 to March 20 each year, coinciding with Nowruz). It legislates on domestic economic and social issues, and tends to defer to executive and security institutions on defense and foreign policy issues. It is constitutionally required to ratify major international agreements, and it ratified the JCPOA in October 2015. The ratification was affirmed by the COG. Women regularly run and some generally are elected; there is no \"quota\" for the number of women. Majles elections occur one year prior to the presidential elections; the latest were held on February 26, 2016. A major but little publicized elected institution is the 88-seat Assembly of Experts. Akin to a standing electoral college, it is empowered to choose a new Supreme Leader upon the death of the incumbent, and it formally \"oversees\" the work of the Supreme Leader. The Assembly can replace him if necessary, although invoking that power would, in practice, most likely occur in the event of a severe health crisis. The Assembly is also empowered to amend the constitution. It generally meets two times a year. Elections to the Assembly are held every 8-10 years, conducted on a provincial basis. Assembly candidates must be able to interpret Islamic law. In March 2011, the aging compromise candidate Ayatollah Mohammad Reza Mahdavi-Kani was named chairman, but he died in 2014. His successor, Ayatollah Mohammad Yazdi, lost his seat in the Assembly of Experts election on February 26, 2016 (held concurrently with the Majles elections), and COG Chairman Ayatollah Ahmad Jannati was appointed concurrently as the Assembly chairman in May 2016. Following the presidency regime stalwart Ali Akbar Hashemi-Rafsanjani during 1989-1997, a reformist, Mohammad Khatemi, won landslide victories in 1997 and 2001. However, hardliners marginalized him by the end of his term in 2005. Aided by widespread voiding of reformist candidacies by the COG, conservatives won a slim majority of the 290 Majles seats in the February 20, 2004, elections. In June 2005, the COG allowed eight candidates to compete (out of the 1,014 persons who filed), including Rafsanjani, Ali Larijani, IRGC stalwart Mohammad Baqer Qalibaf, and Tehran mayor Mahmoud Ahmadinejad. With reported tacit backing from Khamene'i, Ahmadinejad advanced to a runoff against Rafsanjani and then won by a 62% to 36% vote. Splits later erupted among hardliners, and pro-Ahmadinejad and pro-Khamene'i candidates competed against each other in the March 2008 Majles elections. Disputed 2009 Election . Reformists sought to unseat Ahmadinejad in the June 12, 2009, presidential election by rallying to Mir Hossein Musavi, who served as prime minister during the 1980-1988 Iran-Iraq War and, to a lesser extent, former Majles speaker Mehdi Karrubi. Musavi's generally young, urban supporters used social media to organize large rallies in Tehran, but pro-Ahmadinejad rallies were large as well. Turnout was about 85%. The Interior Ministry pronounced Ahmadinejad the winner (63% of the vote) only two hours after the polls closed. Supporters of Musavi, who received the second-highest total (about 35% of the vote) immediately protested the results as fraudulent because of the hasty announcement of the results—but some outside analysts said the results tracked preelection polls. Large antigovernment demonstrations occurred June 13-19, 2009. Security forces killed over 100 protesters (opposition figure—Iran government figure was 27), including a 19-year-old woman, Neda Soltani, who became an icon of the uprising. The opposition congealed into the \"Green Movement of Hope and Change.\" Some protests in December 2009 overwhelmed regime security forces in some parts of Tehran, but the movement's activity declined after the regime successfully suppressed its demonstration on the February 11, 2010, anniversary of the founding of the Islamic Republic. As unrest ebbed, Ahmadinejad promoted his loyalists and a nationalist version of Islam that limits clerical authority, bringing him into conflict with Supreme Leader Khamene'i. Amid that rift, in the March 2012 Majles elections, candidates supported by Khamene'i won 75% of the seats, weakening Ahmadinejad. Since leaving office in 2013, and despite being appointed by Khamene'i to the Expediency Council, Ahmadinejad has emerged as a regime critic. His following appears to be limited, and he has faced prosecutions of alleged corruption, meanwhile returning to his prior work as a professor of civil engineering. In the June 14, 2013, presidential elections, held concurrently with municipal elections, the major candidates included the following: Several hardliners that included Qalibaf (see above); Khamene'i foreign policy advisor Velayati; and then-chief nuclear negotiator Seyed Jalilli. Former chief nuclear negotiator Hassan Rouhani, a moderate and Rafsanjani ally. The COG denial of Rafsanjani's candidacy, which shocked many Iranians because of Rafsanjani's prominent place in the regime, as well as the candidacy of an Ahmadinejad ally. Green Movement supporters, who were first expected to boycott the vote, mobilized behind Rouhani after regime officials stressed that they were committed to a fair election. The vote produced a 70% turnout and a first-round victory for Rouhani, garnering about 50.7% of the 36 million votes cast. Hardliners generally garnered control of municipal councils in the major cities. Most prominent in Rouhani's first term cabinet were Foreign Minister: Mohammad Javad Zarif, a former Ambassador to the United Nations in New York, who was assigned to serve concurrently as chief nuclear negotiator (a post traditionally held by the chairman of the Supreme National Security Council). In September 2013, Rouhani appointed senior IRGC leader and former Defense Minister Ali Shamkhani, who generally espouses more moderate views than his IRGC peers, to head that body. Oil Minister: Bijan Zanganeh, who served in the same post during the Khatemi presidency and attracted significant foreign investment to the sector. He replaced Rostam Qasemi, who was associated with the corporate arm of the IRGC. Defense Minister: Hosein Dehgan. An IRGC stalwart, he was an early organizer of the IRGC's Lebanon contingent that evolved into the IRGC-Qods Force. He also was IRGC Air Force commander and deputy Defense Minister. Justice Minister: Mostafa Pour-Mohammadi. As deputy intelligence minister in late 1980s, he was reportedly a decisionmaker in the 1988 mass executions of Iranian prisoners. He was interior minister under Ahmadinejad. In the 115 th Congress, H.Res. 188 would have condemned Iran for the massacre. On February 26, 2016, Iran held concurrent elections for the Majles and for the Assembly of Experts. A runoff round for 68 Majles seats was held on April 29. For the Majles, 6,200 candidates were approved, including 586 female candidates. Oversight bodies invalidated the candidacies of about 6,000, including all but 100 reformists. Still, pro-Rouhani candidates won 140 seats, close to a majority, and the number of hardliners in the body was reduced significantly. Independents, whose alignments vary by issue, hold about 50 seats. Seventeen women were elected—the largest number since the revolution. The body reelected Ali Larijani as Speaker. For the Assembly of Experts election, 161 candidates were approved out of 800 who applied to run. Reformists and pro-Rouhani candidates defeated two prominent hardliners—the incumbent Assembly Chairman Mohammad Yazdi and Ayatollah Mohammad Taqi Mesbah-Yazdi. COG head Ayatollah Jannati retained his seat, but came in last for the 30 seats elected from Tehran Province. He was subsequently named chairman of the body. In the latest presidential election on May 19, 2017, Rouhani won a first-round victory with about 57% of the vote. He defeated a major figure, Hojjat ol-Eslam Ibrahim Raisi—a close ally of Khamene'i. Even though other major hardliners had dropped out of the race to improve Raisi's chances, Raisi received only about 38% of the vote. Municipal elections were held concurrently. After vetting by local committees established by the Majles , about 260,000 candidates competed for about 127,000 seats nationwide. More than 6% of the candidates were women. The alliance of reformists and moderate-conservatives won control of the municipal councils of Iran's largest cities, including all 21 seats on the Tehran municipal council. The term of the existing councils expired in September 2017 and a reformist official, Mohammad Ali Najafi, replaced Qalibaf as Tehran mayor. However, Najafi resigned in March 2018 after criticism from hardliners for his viewing of a dance performance by young girls during a celebration of a national holiday. The current mayor, selected in November 2018, is Pirouz Hanachi. Rouhani was sworn into a second term in early August 2017. His second-term cabinet nominations retained most of the same officials in key posts, including Foreign Minister Zarif. Since the Trump Administration withdrew from the JCPOA in May 2018, hardliners have threatened to try to impeach Zarif for his role in negotiating that accord. In late February 2019, after being excluded from a leadership meeting with visiting President Bashar Al Asad of Syria, Zarif announced his resignation over the social media application Instagram. Rouhani did not accept the resignation and Zarif resumed his duties. Key changes to the second-term cabinet include the following: Minister of Justice Seyed Alireza Avayee replaced Pour-Mohammadi. Formerly a state prosecutor, Avayee oversaw trials of protesters in the 2009 uprising and is subject to EU travel ban and asset freeze. Defense Minister Amir Hatami, a regular military officer, became the first non-IRGC Defense Minister in more than 20 years and the first regular military officer in that position. The cabinet has two women vice presidents, and one other woman as a member of the cabinet (but not heading any ministry). In December 2017, significant unrest erupted in more than 80 cities, mostly over economic conditions, although demonstrations were smaller than the 2009-2010 protests. Protests initially cited economic concerns—the high prices of staple foods—but quickly evolved to expressions of opposition to Iran's leadership and the expenditure of resources on interventions throughout the Middle East. Some protesters were motivated by Rouhani's 2018-2019 budget proposals to increase funds for cleric-run businesses (\" bonyads \") and the IRGC, while cutting subsidies. Rouhani sought to defuse the unrest by acknowledging the right to protest and the legitimacy of some demonstrator grievances. Khamene'i at first attributed the unrest to covert action by Iran's foreign adversaries, particularly the United States, but he later acknowledged unspecified \"problems\" in the administration of justice. Security officers used force against protester violence in some cities, but experts say they generally exercised restraint. The government also temporarily shut down access to the social media site Instagram and a widely used messaging system called \"Telegram.\" Iranian official media reported that 25 were killed and nearly 4,000 were arrested during that period of unrest. Since February 2018, some women have continued protesting the strict public dress code, and some have been detained. Small protests and other acts of defiance have continued since, including significant unrest in the Tehran bazaar in July 2018 in the context of shortages of some goods and shop closures due to the inability to price their goods for profit. Since September 2018, workers in various industries, including trucking and teaching, have conducted strikes to demand higher wages to help cope with rising prices. Rounds of nationwide teachers' strikes began in mid-February 2019. In mid-2018, possibly to try to divert blame for Iran's economic situation, the regime established special \"anticorruption courts\" that have, in some cases, imposed the death penalty on businessmen accused of taking advantage of reimposed sanctions for personal profit. Iran also has used military action against armed factions that are based or have support outside Iran. In early 2019, protests have taken place in southwestern Iran in response to the government's missteps in dealing with the effects of significant flooding in that area. The regime has tasked the leadership of the relief efforts to the IRGC and IRGC-QF, working with Iraqi Shia militias who are powerful on the Iraqi side of the border where the floods have taken place. President Trump and other senior officials have supported protests by warning the regime against using force and vowing to hold officials responsible for harming protestors. The Administration also has requested U.N. Security Council meetings to consider Iran's crackdown on the unrest, although no formal U.N. action was taken. The Administration also imposed U.S. sanctions on identified regime officials and institutions responsible for abuses against protestors, including then-judiciary chief Sadeq Larijani, representing the highest-level Iranian official sanctioned by the United States to date. In the 115 th Congress, several resolutions supported the protestors, including H.Res. 676 (passed House January 9, 2018), S.Res. 367 , H.Res. 675 , and S.Res. 368 . U.S. State Department reports, including the Iran Action Group's September 2018 \"Outlaw Regime\" document, and reports from a U.N. Special Rapporteur, have long cited Iran for a wide range of abuses—aside from its suppression of political opposition—including escalating use of capital punishment, executions of minors, denial of fair public trial, harsh and life-threatening conditions in prison, and unlawful detention and torture. In a speech on Iran on July 22, 2018, Secretary of State Pompeo recited a litany of U.S. accusations of Iranian human rights abuses, and stated \"America is unafraid to expose human rights violations and support those who are being silenced.\" State Department and U.N. Special Rapporteur reports have noted that the 2013 revisions to the Islamic Penal Code a nd the 2015 revisions to the Criminal Procedure Code made some reforms, including eliminating death sentences for children convicted of drug-related offenses and protecting the rights of the accused. A \"Citizen's Rights Charter,\" issued December 19, 2016, at least nominally protects free expression and is intended to raise public awareness of citizen rights. It also purportedly commits the government to implement the Charter's 120 articles. In August 2017, Rouhani appointed a woman, former vice president Shahindokht Molaverdi, to oversee implementation of the Charter. The State Department's human rights report for 2018 says that key Charter protections for individual rights of freedom to communicate and access information have not been implemented. A U.N. Special Rapporteur on Iran human rights was reestablished in March 2011 by the U.N. Human Rights Council (22 to 7 vote), resuming work done by a Special Rapporteur on Iran human rights during 1988-2002. The Rapporteur appointed in 2016, Asma Jahangir, issued two Iran reports, the latest of which was dated August 14, 2017 (A/72/322), before passing away in February 2018. The special rapporteur mandate was extended on March 24, 2018 and British-Pakistani lawyer Javaid Rehman was appointed in July 2018. The U.N. General Assembly has insisted that Iran cooperate by allowing the Special Rapporteur to visit Iran, but Iran has instead only responded to Special Rapporteur inquiries through agreed \"special procedures.\" Despite the criticism of its human rights record, on April 29, 2010, Iran acceded to the U.N. Commission on the Status of Women. It also sits on the boards of the U.N. Development Program (UNDP) and UNICEF. Iran's U.N. dues are about $9 million per year. Iran has an official body, the High Council for Human Rights, headed by former Foreign Minister Mohammad Javad Larijani (brother of the Majles speaker and the judiciary head). It generally defends the government's actions to outside bodies rather than oversees the government's human rights practices, but Larijani, according to the Special Rapporteur, has questioned the effectiveness of drug-related executions and other government policies. As part of its efforts to try to compel Iran to improve its human rights practices, the United States has imposed sanctions on Iranian officials alleged to have committed human rights abuses, and on firms that help Iranian authorities censor or monitor the internet. Human rights-related sanctions are analyzed in significant detail in CRS Report RS20871, Iran Sanctions , by Kenneth Katzman. The February 11, 1979, fall of the Shah of Iran, who was a key U.S. ally, shattered U.S.-Iran relations. The Carter Administration's efforts to build a relationship with the new regime in Iran ended after the November 4, 1979, takeover of the U.S. Embassy in Tehran by radical pro-Khomeini \"Students in the Line of the Imam.\" The 66 U.S. diplomats there were held hostage for 444 days, and released pursuant to the January 20, 1981 \"Algiers Accords.\" Their release was completed minutes after President Reagan's inauguration on January 20, 1981. The United States broke relations with Iran on April 7, 1980, two weeks prior to a failed U.S. military attempt to rescue the hostages. Iran has since then pursued policies that successive Administrations considered inimical to U.S. interests in the Near East region and beyond. Iran's authoritarian political system and human rights abuses have contributed to, but have not necessarily been central to, the U.S.-Iran rift, although some observers assert that Iran's behavior flows directly from the nature of its regime. Iran has an interest section in Washington, DC, under the auspices of the Embassy of Pakistan, and staffed by Iranian Americans. The former Iranian Embassy closed in April 1980 when the two countries broke diplomatic relations, and remains under the control of the State Department. Iran's Mission to the United Nations in New York runs most of Iran's diplomacy inside the United States. The U.S. interests section in Tehran, under the auspices of the Embassy of Switzerland, has no American personnel. The following sections analyze some key hallmarks of past U.S. policies toward Iran. The Reagan Administration designated Iran a \"state sponsor of terrorism\" in January 1984—a designation established by the Export Administration Act of 1979—largely in response to Iran's backing for the October 1983 bombing of the Marine Barracks in Beirut. The Administration also \"tilted\" toward Iraq in the 1980-1988 Iran-Iraq War. During 1987-1988, U.S. naval forces fought several skirmishes with Iranian naval elements while protecting oil shipments transiting the Persian Gulf from Iranian mines and other attacks. On April 18, 1988, Iran lost one-quarter of its larger naval ships in an engagement with the U.S. Navy, including a frigate sunk. However, the Administration contradicted its efforts to favor Iraq's war effort by providing arms to Iran (\"TOW\" antitank weapons and I-Hawk air defense batteries) in exchange for Iran's help in the releasing of U.S. hostages held in Lebanon. On July 3, 1988, U.S. forces in the Gulf mistakenly shot down Iran Air Flight 655 over the Gulf, killing all 290 on board, contributing to Iran's decision to accept a cease-fire in the war with Iraq in August 1988. In his January 1989 inauguration speech, President George H.W. Bush, in stating that \"goodwill begets goodwill\" with respect to Iran, implied that U.S.-Iran relations could improve if Iran helped obtain the release of U.S. hostages held by Hezbollah in Lebanon. Iran's apparent assistance led to the release of all remaining U.S. hostages there by the end of December 1991. However, no U.S.-Iran thaw followed, possibly because Iran continued to back violent groups opposed to the U.S. push for Arab-Israeli peace that followed the 1991 U.S. liberation of Kuwait. The Clinton Administration articulated a strategy of \"dual containment\" of Iran and Iraq—an attempt to keep both countries simultaneously weak rather than alternately tilting to one or the other. In 1995-1996, the Administration and Congress banned U.S. trade and investment with Iran and imposed penalties on foreign investment in Iran's energy sector, in response to Iran's support for terrorist groups seeking to undermine the Israeli-Palestinian peace process. The election of the moderate Mohammad Khatemi as president in May 1997 precipitated a U.S. offer of direct dialogue, but Khatemi did not accept the offer. In June 1998, then-Secretary of State Madeleine Albright called for mutual confidence building measures that could lead to a \"road map\" for normalization. In a March 17, 2000, speech, the Secretary admitted past U.S. interference in Iran. In his January 2002 State of the Union message, President Bush named Iran as part of an \"axis of evil\" including Iraq and North Korea. However, the Administration enlisted Iran's diplomatic help in efforts to try to stabilize post-Taliban Afghanistan and post-Saddam Iraq. The Administration rebuffed a reported May 2003 Iranian overture transmitted by the Swiss Ambassador to Iran for an agreement on all major issues of mutual concern (\"grand bargain\" proposal). State Department officials disputed that the proposal was fully vetted within Iran's leadership. The Administration aided victims of the December 2003 earthquake in Bam, Iran, including through U.S. military deliveries into Iran. As Iran's nuclear program advanced, the Administration worked with several European countries to persuade Iran to agree to limit its nuclear program. President Bush's January 20, 2005, second inaugural address and his January 31, 2006, State of the Union message stated that the United States would be a close ally of a \"free and democratic\" Iran—appearing to support regime change. President Obama asserted that there was an opportunity to persuade Iran to limit its nuclear program through diplomacy and to potentially rebuild a U.S.-Iran relationship after decades of mutual animosity. The approach emerged in President Obama's first message to the Iranian people on the occasion of Nowruz (Persian New Year, March 21, 2009), in which he stated that the United States \"is now committed to diplomacy that addresses the full range of issues before us, and to pursuing constructive ties among the United States, Iran, and the international community.\" He referred to Iran as \"The Islamic Republic of Iran,\" appearing to reject a policy of regime change. The Administration reportedly also loosened restrictions on U.S. diplomats' meeting with their Iranian counterparts at international meetings. In a speech to the \"Muslim World\" in Cairo on June 4, 2009, President Obama acknowledged that the United States had played a role in the overthrow of Mossadeq and said that Iran had a right to peaceful nuclear power. In addition, President Obama exchanged several letters with Supreme Leader Khamene'i, reportedly expressing the Administration's support for engagement with Iran. In 2009, Iran's crackdown on the Green Movement uprising and its refusal to accept compromises to limit its nuclear program caused the Obama Administration to shift to a \"two track\" strategy: stronger economic pressure coupled with offers of negotiations that could produce sanctions relief. The sanctions imposed during 2010-2013 received broad international cooperation and caused economic difficulty in Iran, but the Administration also altered U.S. regulations to help Iranians circumvent their government's restrictions on internet usage. In early 2013, the Administration began direct but unpublicized talks with Iranian officials in the Sultanate of Oman to probe Iran's willingness to reach a comprehensive nuclear accord. The Administration also repeatedly stated that a military option is \"on the table.\" The election of Rouhani in June 2013 contributed to a U.S. shift to emphasizing diplomacy. President Obama, in his September 24, 2013 U.N. General Assembly speech, confirmed an exchange of letters with Rouhani stating U.S. willingness to resolve the nuclear issue peacefully and that the United States \"[is] not seeking regime change.\" The two presidents spoke by phone on September 27, 2013—the first direct U.S.-Iran presidential contact since Iran's revolution. After the JCPOA was finalized in July 2015, the United States and Iran held bilateral meetings at the margins of all nuclear talks and in other settings, covering regional and bilateral issues. President Obama expressed hope that the JCPOA would \"usher[] in a new era in U.S.-Iranian relations,\" while at the same time asserting that the JCPOA would benefit U.S. national security even without a broader rapprochement. President Obama met Foreign Minister Zarif at the September 2015 General Assembly session, but no contact was reported during the September 2016 U.N. General Assembly session. Still, the signs that U.S.-Iran relations could improve as a result of the JCPOA were mixed, including as discussed below. Coinciding with Implementation Day of the JCPOA (January 16, 2016), the dual citizens held by Iran at that time were released and a long-standing Iranian claim for funds paid for undelivered military equipment from the Shah's era was settled—resulting in $1.7 billion in cash payments (euros, Swiss francs, and other non-U.S. hard currencies) to Iran—$400 million for the original DOD monies and $1.3 billion for an arbitrated amount of interest. Administration officials asserted that the nuclear diplomacy provided an opportunity to resolve these outstanding issues, but some Members of Congress criticized the simultaneity of the financial settlement as paying \"ransom\" to Iran. Obama Administration officials asserted that it had long been assumed that the United States would need to return monies to Iran for the undelivered military equipment and that the amount of interest agreed was likely less than what Iran might have been awarded by the U.S.-Iran Claims Tribunal. Iran subsequently jailed several other dual nationals (see box below). Iran continued to provide support to allies and proxies in the region, and it continued \"high speed intercepts\" of U.S. warships in the Persian Gulf. Iran conducted at least four ballistic missile tests from the time the JCPOA was finalized in 2015 until the end of the Obama Administration, which termed the tests \"defiant of\" or \"inconsistent with\" Resolution 2231. The tests prompted additional U.S. designations for sanctions of entities that support Iran's program. Iranian officials argued that new U.S. visa requirements in the FY2016 Consolidated Appropriations Act ( P.L. 114-113 ) would cause European businessmen to hesitate to travel to Iran and thereby limit Iran's economic reintegration. Then-Secretary of State Kerry wrote to Foreign Minister Zarif on December 19, 2015, that the United States would implement the provision so as to avoid interfering with \"legitimate business interests of Iran.\" In January 2016, Kerry worked with Zarif to achieve the rapid release of 10 U.S. Navy personnel who the IRGC took into custody when their two riverine crafts strayed into what Iran considers its territorial waters. There was no expansion of diplomatic representation such as the posting of U.S. nationals to staff the U.S. interests section in Tehran, nor did then-Secretary of State Kerry visit Iran. In 2014, Iran appointed one of those involved in the 1979 seizure of the U.S. embassy in Tehran—Hamid Aboutalebi—as ambassador to the United Nations. But, in April 2014, Congress passed S. 2195 ( P.L. 113-100 ), which gave the Administration authority to deny him a visa to take up his duties. The United States subsequently announced he would not be admitted. Iran replaced him with Gholam Ali Khoshroo, who studied in the United States and served in Khatemi's government. In May 2015, the two governments granted each other permission to move their respective interests sections to more spacious locations. Khoshroo was replaced in April 2019 by Majid Takht Ravanchi. The Trump Administration has shifted policy back to the pre-JCPOA stance, asserting that the JCPOA addressed only nuclear issues and hindered the U.S. ability to roll back Iran's \"malign\" regional activities or reduce its military and missile capabilities. Administration officials assert that Administration policy is to pressure Iran's economy to (1) compel it to renegotiate the JCPOA to address the broad range of U.S. concerns and (2) deny Iran the revenue to continue to develop its strategic capabilities or intervene throughout the region. Administration statements of opposition to how Iran is governed suggest that an element of the policy is to create enough economic difficulties to stoke unrest in Iran, possibly to the point where the regime collapses. The policy, and elements of it, have been articulated as follows: Citing Iran's arming of the Houthis in Yemen, on February 1, 2017, then-National Security Adviser Michael Flynn stated that Iran was \"officially on notice\" about its provocative behavior. In April 2017, the Administration announced a six-month Iran policy review based on the premise that the JCPOA \"only delays [Iran's] goal of becoming a nuclear state\" and had failed to curb Iran's objectionable regional behavior. During his May 20-24, 2017, visit to the region, President Trump told Arab leaders in Saudi Arabia that \"Until the Iranian regime is willing to be a partner for peace, all nations of conscience must work together to isolate Iran, deny it funding for terrorism, and pray for the day when the Iranian people have the just and righteous government they deserve.\" The following month, then-Secretary of State Tillerson testified that the Administration would work to support elements in Iran that would lead to a \"peaceful transition\" of Iran's government. On October 13, 2017, President Trump, citing the results of the policy review, stated that he would not certify Iranian JCPOA compliance (under the Iran Nuclear Agreement Review Act, INARA, P.L. 114-17 ), and that the United States would only stay in the accord if Congress and U.S. allies (1) address the expiration of JCPOA nuclear restrictions, (2) curb Iran's ballistic missile program, and (3) counter Iran's regional activities. The denial of certification under INARA triggered a 60-day period for Congress to take legislative action under expedited procedures to reimpose those sanctions that were lifted. Congress did not take such action. On January 12, 2018, the President announced that he would not continue to waive Iran sanctions at the next expiration deadline (May 12) unless the JCPOA's weaknesses were addressed by Congress and the European countries. On May 8, 2018, following visits to the United States by the leaders of France and Germany imploring the United States to remain in the JCPOA, President Trump announced that the United States would withdraw from the JCPOA and reimpose all U.S. secondary sanctions, with full effect as of November 5, 2018. Statements by President Trump and Secretary of State Pompeo have since articulated U.S. policy as follows: On May 21, 2018, in his first speech as Secretary of State, Michael Pompeo announced a return to a U.S. strategy of pressuring Iran through sanctions and by working with allies against Iran's regional activities and proxies, as well as against its ballistic missile program, cyberattacks, and human rights abuses. He also expressed U.S. \"solidarity\" with the Iranian people. On July 22, 2018, in a speech to Iranian Americans at the Reagan Library in California, Secretary Pompeo recited a litany of Iranian human rights abuses, official corruption, and efforts to destabilize the region. The Secretary stated that \"I have a message for the people of Iran. The United States hears you; the United States supports you; the United States is with you.\" On July 23, 2018, following threats by Rouhani and other Iranian leaders to cut off the flow of oil through the Persian Gulf if Iran's oil exports are prevented by sanctions, President Trump posted the following on Twitter: \"To Iranian President Rouhani: NEVER, EVER THREATEN THE UNITED STATES AGAIN OR YOU WILL SUFFER CONSEQUENCES THE LIKES OF WHICH FEW THROUGHOUT HISTORY HAVE EVER SUFFERED BEFORE. WE ARE NO LONGER A COUNTRY THAT WILL STAND FOR YOUR DEMENTED WORDS OF VIOLENCE & DEATH. BE CAUTIOUS!\" The tweet suggested to some that the United States might be intent on military action against Iran. On August 16, 2018, Secretary Pompeo announced the creation of an \"Iran Action Group\" at the State Department responsible for coordinating the department's Iran-related activities. The group is headed by Brian Hook, who holds the title of \"Special Representative for Iran.\" In late September 2018, the group issued its \"Outlaw Regime\" report on Iran, in which Secretary of State Pompeo wrote in a preface that \"The policy President Trump has laid out comes to terms fully with fact that the Islamic Republic of Iran is not a normal state ... \" On October 3, 2018, the Administration abrogated the 1955 U.S.-Iran \"Treaty of Amity, Economic Relations, and Consular Rights.\" Iran's legal representatives had cited the treaty to earn a favorable October 2 judgment from the International Court of Justice demanding that the United States reverse some humanitarian-related sanctions on Iran. The treaty, which provides for freedom of commerce between the two countries and unfettered diplomatic exchange, has long been mooted by post-1979 developments in U.S.-Iran relations. The abrogation of the treaty did not affect the status of the interests sections in each others' countries. Illustrating the extent to which the Administration wants U.S. partners to adopt U.S. policy toward Iran, the Administration organized a ministerial meeting in Warsaw, Poland, during February 13-14, 2019, focused on Middle East issues and with particular focus on countering the threat posed by Iran. For further information, see CRS In Focus IF11132, Coalition-Building Against Iran , by Kenneth Katzman On April 8, 2019, the Administration designated the IRGC as a foreign terrorist organization (FTO), blaming it for involvement in multiple past acts of Iran-backed terrorism and anti-U.S. actions. For further information, see CRS Insight IN11093, Iran's Revolutionary Guard Named a Terrorist Organization , by Kenneth Katzman. On April 22, 2019, the Administration announced it would no longer provide exceptions to countries that pledged to reduce their purchases of Iranian oil under the FY2012 National Defense Authorization Act ( P.L. 112-81 ). For further information, see CRS Insight IN11108, Iran Oil Sanctions Exceptions Ended , by Kenneth Katzman. As of May 3, 2019, U.S.-Iran tensions escalated following intelligence reports that Iran and/or its allies and proxies might be preparing to attack U.S. forces or personnel in the region, and the United States deployed additional forces to the Gulf to deter such action. As tensions escalated, U.S. officials issued a variety of statements. For example, on May 20, 2019, President Trump posted the following on Twitter: \"If Iran wants to fight, that will be the official end of Iran. Never threaten the United States again!\" Yet, as May ended, President Trump and his senior aides and Cabinet officers all indicated that the United States did not seek war with Iran, did not seek to change Iran's regime, and welcomed talks to ease tensions and renegotiate a JCPOA. As have its predecessors, the Trump Administration has not publicly taken any policy option \"off the table.\" Some options, such as sanctions, are being emphasized, while others are being considered or threatened to varying degrees. Successive Administrations have debated the degree to which to pursue engagement with Iran, and U.S. efforts to engage Iran sometimes have not coincided with Iranian leadership willingness to engage the United States. President Trump has publicly welcomed engagement with Iran's President Rouhani, but Administration officials have set strict conditions for any significant improvement in U.S.-Iran relations. Secretary of State Pompeo, in his May 21, 2018, speech referenced above, stipulated a list of 12 behavior changes by Iran that would be required for a normalization of U.S.-Iran relations and to be included in a revised JCPOA. Many of the demands—such as ending support for Lebanese Hezbollah—would strike at the core of Iran's revolution and are unlikely to be met by Iran under any circumstances. At a July 30, 2018, press conference, President Trump stated he would be willing to meet President Rouhani without conditions, presumably during the September 2018 General Assembly meetings in New York. Rouhani indicated that the U.S-Iran relationship was not conducive to such a meeting, and President Trump later stated he would not meet with Rouhani during the General Assembly meetings, even though President Rouhani is probably \"an absolutely lovely man.\" In December 2018, President Rouhani stated that the United States directly requested negotiations with Iran on eight occasions in 2017, and \"indirectly\" requested negotiations on three occasions in 2018. He said that Iran rebuffed these overtures. Following the U.S. designation of the IRGC as an FTO and the denial of further sanctions exceptions for the purchases of Iranian oil, Foreign Minister Zarif appeared to raise the possibility for some U.S.-Iran talks on selected issues. At an April 24, 2019 research institute public meeting in New York, Zarif offered to negotiate an exchange of Iranians held in U.S. jails for some or all of the U.S.-Iran nationals held by Iran (see box above). In the context of escalating U.S.-Iran tensions in May 2019, President Trump apparently sought to de-escalate by restating his interest in direct talks, stating the following on May 9, 2019: What they [Iranian leaders] should be doing is calling me up, sitting down; we can make a deal, a fair deal ... but they should call, and if they do, we're open to talk to them. In late May 2019, in the course of an official visit to Japan, President Trump said he would support Japanese Prime Minister Shinzo Abe's efforts to act as a mediator between the United States and Iran. Concurrently, Secretary Pompeo and other U.S. officials were in contact with leaders of Oman, Qatar, and Switzerland, apparently in an effort to explore the potential for talks with Iran. Possibly in connection, foreign ministers and other high-ranking diplomats from Iran and Oman, Qatar, and Kuwait exchanged visits. Successive Administrations have sought to back up other policy options with a capability to use military force against Iran. Prior to the JCPOA, supporters of military action against Iran's nuclear program argued that such action could set back Iran's nuclear program substantially. A U.S. ground invasion to remove Iran's regime apparently has not been considered at any time. The Obama Administration repeatedly stated that \"all options are on the table\" to prevent Iran from acquiring a nuclear weapon. However, the Obama Administration asserted that military action would set back Iran's nuclear advancement with far less certainty or duration than would a nuclear agreement. And Iranian retaliation could potentially escalate and expand throughout the region, reduce Iran's regional isolation, strengthen Iran's regime domestically, and raise oil prices. After the JCPOA was finalized, President Obama reiterated the availability of this option should Iran violate the agreement. Obama Administration officials articulated that U.S. military action against Iran might also be used if Iran attacked or prepared to attack U.S. allies or attempted to interrupt the free flow of oil or shipping in the Gulf or elsewhere. The Trump Administration has similarly stated that \"all options are open,\" referring to military action. The Administration's pullout from the JCPOA was accompanied by threats to take unspecified action if Iran were to leave the accord and restart banned aspects of its nuclear program. In the context of significant U.S.-Iran tensions in May 2019 that resulted in added U.S. military deployments to the Gulf region, the Administration has reiterated threats to use force against Iran's nuclear program or if Iran were to attack U.S. forces or personnel in the region. Yet, as noted, President Trump has sought to de-escalate tensions and has told his top officials that the Administration does not want conflict with Iran. For more information on the potential for U.S. military action in the context of U.S.-Iran tensions, see CRS In Focus IF11212, U.S.-Iran Tensions Escalate , by Kenneth Katzman. Whereas the United States has not initiated military action against Iranian or Iran-backed forces in Syria, the Administration has publicly supported Israel's frequent strikes on Iranian and Hezbollah infrastructure there. And, the U.S. Navy has conducted operations to interdict Iranian weapons shipments to the Houthi rebels in Yemen. For detailed information on U.S. military activity in the region that is, in whole or in part, directed against Iran and Iranian allies, see CRS Report R44017, Iran's Foreign and Defense Policies , by Kenneth Katzman. With regard to presidential authorities, S.J.Res. 41 , which passed the Senate on September 22, 2012, in the 112 th Congress, rejects any U.S. policy that relies on \"containment\" of a potential nuclear Iran. No legislation has been enacted that would limit the President's authority to use military force against Iran, but neither has there been legislation authorizing the use of force against Iran. At a Senate Foreign Relations Committee hearing on April 10, 2019, Secretary of State Pompeo answered questions on whether the Administration considers the use of force against Iran as authorized, indicating that he would defer to Administration legal experts on that question. However, he indicated, in response to questions whether the 2001 authorization for force against Al Qaeda could apply to Iran, that Iran has harbored members of Al Qaeda. The U.S. withdrawal from the JCPOA and reimposition of all U.S. sanctions has major implications. The table below summarizes sanctions that have been used against Iran. One recurring U.S. policy question has been whether the United States should support efforts within Iran to overthrow Iran's leadership. During the 2009 Green Movement uprising, the Obama Administration asserted that extensive U.S. support for the uprising would undermine the opposition's position in Iran. President Obama did, however, give some public support to the demonstrators, and his 2011 Nowruz (Persian New Year) address mentioned specific dissidents and said \"young people of Iran ... I want you to know that I am with you.\" However, in a September 24, 2013, General Assembly speech, President Obama explicitly stated that the United States does not seek to change Iran's regime. The Trump Administration—in cited statements by Secretary Pompeo and other U.S. officials—asserts that its policy is to change Iran's behavior, not to change its regime. However, the content of these and other statements by Administration officials, in particular Secretary Pompeo's speech to Iranian Americans at the Reagan Library on July 22, 2018, suggests support for a regime change outcome. In his speech on May 21, 2017, in Saudi Arabia, President Trump stated that his Administration is hoping that Iran's government will change to one that the Administration considers \"just and righteous.\" In testimony before two congressional committees in June 2017, then-Secretary of State Rex Tillerson said the Administration supports a \"philosophy of regime change\" for Iran (Senate Appropriations Committee) and that the Administration would \"work toward support of those elements inside of Iran that would lead to a peaceful transition of that government\" (House Foreign Affairs Committee). In his October 13, 2017, policy announcement on Iran, President Trump stated that we stand in total solidarity with the Iranian regime's longest-suffering victims: its own people. The citizens of Iran have paid a heavy price for the violence and extremism of their leaders. The Iranian people long to—and they just are longing, to reclaim their country's proud history, its culture, its civilization, its cooperation with its neighbors. Subsequently, President Trump issued statements of support for the December 2017-January 2018 protests in Iran on Twitter and in other formats. In his May 8, 2018, announcement of a U.S. withdrawal from the JCPOA, President Trump stated Finally, I want to deliver a message to the long-suffering people of Iran. The people of America stand with you.... But the future of Iran belongs to its people. They are the rightful heirs to a rich culture and an ancient land, and they deserve a nation that does justice to their dreams, honor to their history and glory to God. In his speech to the Heritage Foundation on May 21, 2018, Secretary of State Pompeo added that the United States expresses total solidarity with the Iranian people. In his Reagan Library speech on July 22, 2018, Pompeo recited a litany of Iranian regime human rights abuses and governmental corruption that called into question its legitimacy and, in several passages and answers to questions, clearly expressed the hope that the Iranian people will oust the current regime. The apparent support for a regime change policy was furthered by Secretary Pompeo's announcement during that speech that the Broadcasting Board of Governors is launching a new full-time Persian-language service for television, radio, digital, and social media to help \"ordinary Iranians inside of Iran and around the globe can know that America stands with them.\" Yet, there were signs of a possible modification or shift, at least in tone, in the context of escalating U.S.-Iran tensions in May 2019 that some assessed as potentially leading to conflict. During his visit to Japan in late May, President Trump specifically ruled out a policy of regime change, stating the following on May 27: These are great people—has a chance to be a great country with the same leadership. We are not looking for regime change. I just want to make that clear. We're looking for no nuclear weapons. At times, some in Congress have advocated that the United States adopt a formal policy of overthrow of the regime. In the 111 th Congress, one bill said that it should be U.S. policy to promote the overthrow of the regime (the Iran Democratic Transition Act, S. 3008 ). Many of Iran's leaders, particularly Supreme Leader Khamene'i, continue to articulate a perception that the United States has never accepted the 1979 Islamic revolution. Khamene'i and other Iranian figures note that the United States provided funding to antiregime groups, mainly promonarchists, during the 1980s. Successive Administrations and Congresses have sought to at least lay the groundwork for eventual regime change through \"democracy promotion\" programs and sanctions on Iranian human rights abuses. Legislation authorizing democracy promotion in Iran was enacted in the 109 th Congress. The Iran Freedom Support Act ( P.L. 109-293 , signed September 30, 2006) authorized funds (no specific dollar amount) for Iran democracy promotion. Several laws and Executive Orders issued since 2010 are intended to promote internet freedom, and the Administration has amended U.S.-Iran trade regulations to allow for the sale to Iranians of consumer electronics and software that help them communicate. Then-Under Secretary of State Wendy Sherman testified on October 14, 2011, that some of the democracy promotion funding for Iran was used to train Iranians to use technologies that circumvent regime internet censorship. Many have argued that U.S. funding for such programs is counterproductive because the support has caused Iran to use the support as a justification to accuse the civil society activists of disloyalty. Some civil society activists have refused to participate in U.S.-funded programs, fearing arrest. The Obama Administration altered Iran democracy promotion programs somewhat toward working with Iranians inside Iran who are organized around apolitical issues such as health, education, science, and the environment. The State Department, which often uses appropriated funds to support prodemocracy programs run by organizations based in the United States and in Europe, refuses to name grantees for security reasons. The funds shown below have been obligated through DRL and the Bureau of Near Eastern Affairs in partnership with USAID. Some of the funds have also been used for cultural exchanges, public diplomacy, and broadcasting to Iran. A further indication of the sensitivity of specifying the use of the funds is that, since FY2010, funds have been provided for Iran civil society/democracy promotion as part of a broader \"Near East Regional Democracy programs\" (NERD). Iran asserts that funding democracy promotion represents a violation of the 1981 \"Algiers Accords\" that settled the Iran hostage crisis and provide for noninterference in each other's internal affairs. The George W. Bush Administration asserted that open funding of Iranian prodemocracy activists (see below) was a stated effort to change regime behavior, not to overthrow the regime, although some saw the Bush Administration's efforts as a cover to achieve a regime change objective. Another part of the democracy promotion effort has been the development of Iran-specific U.S. broadcasting services to Iran. Radio Farda (\"tomorrow,\" in Farsi) began under Radio Free Europe/Radio Liberty (RFE/RL), in partnership with the Voice of America (VOA), in 2002. The service was established as a successor to a smaller Iran broadcasting effort begun with an initial $4 million from the FY1998 Commerce/State/Justice appropriation ( P.L. 105-119 ). It was to be called Radio Free Iran but was never formally given that name by RFE/RL. Based in Prague, Radio Farda broadcasts 24 hours/day, and its budget is over $11 million per year. No U.S. assistance has been provided to Iranian exile-run stations. As noted above, Secretary Pompeo has announced a new Persian-language channel for Iranians through various media, but it is not clear whether this new service will augment existing programs or form an entirely new program. VOA Persian Service. The VOA established a Persian-language service to Iran in July 2003. It consists of radio broadcasting (one hour a day of original programming); television (six hours a day of primetime programming, rebroadcast throughout a 24-hour period); and internet. The service has come been criticized by observers for losing much of its audience among young, educated, antiregime Iranians who are looking for signs of U.S. official support. The costs for the service are about $20 million per year. The State Department has sought outreach to the Iranian population. In May 2003, the State Department added a Persian-language website to its list of foreign-language websites, under the authority of the Bureau of International Information Programs. The website was announced as a source of information about the United States and its policy toward Iran. In February 14, 2011, the State Department began Persian-language Twitter feeds in an effort to connect better with internet users in Iran. Since 2006, the State Department has been increasing the presence of Persian-speaking U.S. diplomats in U.S. diplomatic missions around Iran, in part to help identify and facilitate Iranian participation in U.S. democracy-promotion programs. The Iran unit at the U.S. Consulate in Dubai has been enlarged significantly into a \"regional presence\" office, and \"Iran-watcher\" positions have been added to U.S. diplomatic facilities in Baku, Azerbaijan; Istanbul, Turkey; Frankfurt, Germany; London; and Ashkabad, Turkmenistan, all of which have large expatriate Iranian populations and/or proximity to Iran. ", "summary": "U.S.-Iran relations have been mostly adversarial—but with varying degrees of intensity—since the 1979 Islamic Revolution in Iran. Since then, U.S. officials have consistently identified Iran's support for militant Middle East groups as a significant threat to U.S. interests and allies, and Iran's nuclear program took precedence in U.S. policy after 2002 as that program advanced. In 2010, the Obama Administration led a campaign of broad international economic pressure on Iran to persuade it to agree to strict limits on the program—an effort that contributed to the June 2013 election of the relatively moderate Hassan Rouhani as president of Iran and the July 2015 multilateral nuclear agreement—the Joint Comprehensive Plan of Action (JCPOA). That agreement exchanged sanctions relief for limits on Iran's nuclear program, but did not contain binding limits on Iran's missile program or on its regional influence or human rights abuses. The Trump Administration cited the JCPOA's deficiencies in its May 8, 2018, announcement that the United States would exit the JCPOA and reimpose all U.S. secondary sanctions. The stated intent of that step, as well as subsequent actions such as the April 2019 designation of the Islamic Revolutionary Guard Corps (IRGC) as a foreign terrorist organization (FTO) and the May 2019 ending of sanctions exceptions for buyers of Iranian oil, is to apply \"maximum pressure\" on Iran to compel it to change its behavior, including negotiating a new JCPOA that takes into account the broad range of U.S. concerns. Included in these concerns is Iran's support for pro-Iranian regimes and armed factions. Iran has responded by abrogating some of its JCPOA commitments. Before and particularly during an escalation of U.S.-Iran tensions in May 2019, President Trump has indicated a willingness to meet with Iranian leaders. However, Administration statements and reports detail a long litany of objectionable behaviors that Iran must change for there to be any dramatic change in U.S.-Iran relations. Iranian leaders say they will not talk with the Administration unless and until it reenters the 2015 JCPOA. Some experts assert that the threat posed by Iran stems from the nature and ideology of Iran's regime, and that the underlying, if unstated, goal of Trump Administration policy is to bring about regime collapse. In the context of escalating U.S.-Iran tensions in May 2019, President Trump has specifically denied that this is his Administration's goal. Any U.S. regime change strategy presumably would take advantage of divisions and fissures within Iran, as well as evident popular unrest. In part as a response to repression as well as economic conditions, unrest erupts periodically, most recently during December 2017-January 2018, and sporadically since then, including in response to the regime's apparent mishandling of relief efforts for vast flooding in southwestern Iran. But the unrest evident to date is not at a level where it threatens the leadership's grip on power. U.S. pressure has widened leadership differences in Iran. Hassan Rouhani, who seeks to improve Iran's relations with the West, including the United States, won successive presidential elections in 2013 and 2017, and reformist and moderate candidates won overwhelmingly in concurrent municipal council elections in all the major cities. But hardliners continue to control the state institutions that maintain internal security in large part through suppression. And Iran's Supreme Leader, Grand Ayatollah Ali Khamene'i, is increasingly critical of Rouhani's commitment to the JCPOA in public statements. See also CRS Report R43333, Iran Nuclear Agreement and U.S. Exit, by Paul K. Kerr and Kenneth Katzman; CRS Report RS20871, Iran Sanctions, by Kenneth Katzman; CRS Report R44017, Iran's Foreign and Defense Policies, by Kenneth Katzman; and CRS In Focus IF11212, U.S.-Iran Tensions Escalate, by Kenneth Katzman.", "document_type": "crs"}
{"report": "Economic growth (the percentage change in real gross domestic product [GDP]) is a core measure of economic progress and well-being. Over time, the rates of job growth and average income growth closely track economic growth. A notable feature of the current economic expansion, which started in June 2009 and is now the longest expansion on record, has been its relatively modest economic growth rate. Whereas growth has averaged 4.3% in the previous 10 economic expansions, it has averaged 2.3% in this expansion. Some analysts thought a turning point had been achieved when growth accelerated to 3.1% from the third quarter of 2017 through the third quarter of 2018. This was the second-fastest period of sustained growth achieved in this expansion, second only to the 3.8% growth achieved from the second quarter of 2014 through the second quarter of 2015. However, in both of those cases, growth slowed in the following quarters. It has averaged 2.1% over the next four quarters, from the fourth quarter of 2018 to the presentânearly identical to the growth rate in this expansion before the third quarter of 2017. Growth is volatile, difficult to measure, and revised several times after it is initially released. Nevertheless, the pace of activity appears to have noticeably slowed. Growth in three of the past four quarters was 2.1% or lower, and private forecasters expect this slower pace to continue in the fourth quarter of 2019 and through 2020. The slower growth has been widespread throughout the country. The only regions not affected by the slowdown were the Southwest, Rocky Mountains, and New England. Although economic growth has slowed recently, it has not been negative or close to zero in any quarter since the fourth quarter of 2015. (The lowest growth rate since then was 1.1% in the fourth quarter of 2018.) Thus, the recent story so far is one of a transition to a soft landing (a more moderate rate of growth), not a recession or cessation of growth. In fact, for reasons discussed in this report, it is more likely that the fast-growth period was the aberration. Economic growth is only one measure of economic performance, and not all measures move in lockstep over short periods of time. The recent slowdown in economic growth was much more pronounced than the slowdown in employment growthâmonthly job growth was only slightly lower (191,000) from October 2018 to November 2019 than from July 2017 to September 2018 (203,000). The average monthly job growth rate from October 2010 to the present has been 199,000. In other words, to date, the economic growth slowdown has not made employers significantly less willing to take on additional workers. Although it is not unusual for economic growth to rise and fall within an expansion, it is nevertheless potentially useful for Congress to consider the reasons why growth rose from the third quarter of 2017 through the third quarter of 2018 (hereinafter, the faster-growth period ) and declined since the fourth quarter of 2018 (hereinafter, the slower-growth period ) when considering policy options to address growth going forward. These periods are chosen because quarterly growth rates are closely clustered together within those two periods. This report analyzes the most commonly discussed reasons. Table 1 breaks GDP down into its component parts to highlight where the growth slowdown has been concentrated. Comparing the faster-growth period from the third quarter of 2017 to the third quarter of 2018 with the slower-growth period from the fourth quarter of 2018 to the third quarter of 2019, the slowdown has been concentrated in fixed business investment spending (specifically, private structures and equipment) and exports. Investment spending on structures, which include office buildings, factories, and power and communication infrastructure, fell from a growth rate of 3.7% in the former period to a 6.5% contraction in the latter period. The decline in structures has been widespread, but has been particularly notable in the category of mining exploration, shafts, and wellsâa category of spending that is highly sensitive to commodity prices. The slowdown in equipment spending has been most notable in transportation equipment. Other components of GDP have not grown rapidly recently, but nevertheless do not explain the slowdown. Growth in personal consumption spending (specifically, services) has slowed, but by less than overall growth has slowed. Residential investment (new house construction) shrank by about 1% in both periods, having no effect on the overall difference between the two. Growth in government purchases was a little higherâthereby boosting growthâin the latter period. Import growth was lower in the latter period, which, in national accounting, increased growth. Although growth fluctuates considerably from quarter to quarter, economists believe that the economy can grow no faster than its internal speed limitâcalled the potential or trend growth rate âover longer periods of time. Over shorter periods of time, the primary determinant of growth is the business cycle. The business cycle refers to the repeated pattern of recessions (contractions in economic activity) followed by (longer) expansions, which are then followed by another recession, and so on. Average growth over an entire business cycle of normal length would be expected to be close to the potential growth rate. After recessions, in which output has fallen considerably, there is scope for a period of rapid catch-up growth that brings unused labor and capital resources back into use. The current economic expansion is already the longest recorded expansion in U.S. history, so at this point it would not be expected that the economy could grow faster than its potential growth rate for a sustained period because there is no scope for catch-up growthâthe economy's labor and capital inputs are close to fully employed. In these conditions, growth may temporarily exceed trend growth, but it would be expected to return to trend growth fairly quickly. At this point, the main debates are what the trend growth rate is and whether it can be raised through structural policy changes. Growth can rise or fall over a period of time for cyclical or structural reasons. Cyclical contributions to growth are mainly demand drivenâthey are a function of how fast spending in the economy is growing. The government can temporarily influence spending through fiscal and monetary policy. Cyclical effects can have a large influence on growth over a few quarters, but are, by their nature, temporary. Structural contributions to trend growth are mainly supply drivenâthey are a function of how quickly the labor force (both its quantity and quality), the capital stock, and productivity (i.e., how much output can be generated with a given set of inputs) are growing. The reason average growth has been low over the course of the expansion is because all three have grown at a slower pace compared to the 1950 to 2007 average, according to the Congressional Budget Office (CBO), as seen in Figure 1 . The labor force has grown more slowly because of the decline in labor force participation and the aging of the workforce, as the baby boomers have begun to transition to retirement. After stripping out cyclical factors, CBO projects that the labor force grew by 1.4% annually from 1950 to 2018, but will grow by 0.4% annually over the next 10 yearsâclose to the 0.6% growth rate recorded from 2008 to 2018. Average productivity growth declined by more than one-half and investment growth fell by more than one-third in the 2008-2018 period compared to 1950-2007. The reasons for the slowdown in the growth of investment and productivity are less clear and more debated. The recent faster-growth period was comparable to CBO's estimate of the trend growth rate from 1974 to 2001. If the faster-growth period was driven by an increase in trend growth, it could potentially continue indefinitely. CBO and other economic forecasters do not view this growth acceleration as having been driven by a structural acceleration in trend growth, however. CBO expects some improvement in productivity growth over the next 10 years, but projects that overall trend growth will continue to be held back by low growth in the labor force and capital stock. If CBO is correct, the current growth slowdown was inevitable at some point, as it represented growth reverting to trend. The next section describes some of the major economic developments since 2017 that might have boosted growth temporarily above trend, and some subsequent developments that may have contributed to the slowdown. Several explanations have been offered as to why growth accelerated beginning in 2017, including fiscal stimulus, regulatory relief, favorable financial conditions, and higher consumer and business confidence. Although these explanations seem to match the growth acceleration well, they have more trouble explaining why growth subsequently slowed, and they do not always match the exact timing of the acceleration. Several explanations have been offered for why growth decelerated beginning in 2018. The factors discussed below in more detail are a fading of fiscal stimulus, monetary policy tightening, trade policy uncertainty, and a slowdown in global growth. The timing of these factors does not match the timing of the slowdown precisely, which points to the possibility that a return to the trend growth rate was inevitable. The factors discussed below are not comprehensive; other factors that have likely contributed to slower growth in at least one quarter since the fourth quarter of 2018 include the FY2018 government shutdown, the rise in oil prices in 2018 (they have since declined), problems that slowed Boeing's production of the 737 MAX airplane, and the GM-United Auto Workers strike. However, these factors are not discussed at length because they were one-off occurrences that were temporary in nature and may have limited implications for policy going forward. Fiscal stimulus can boost aggregate demand (i.e., total spending) in the short run through higher government spending or lower taxes that are deficit financed. Increases in deficit-financed government spending on goods and services boost total spending in the economy directly because government spending is a component of GDP. Deficit-financed tax cuts increase total spending to the extent that they are spent by their recipients. The effect of fiscal stimulus on growth is temporary because, by nature, total spending cannot exceed total potential output for longâespecially when the economy is already close to full employment, as it is today. In addition, certain types of tax cuts alter incentives to work, save, and invest. These changes could affect potential output ( supply-side effects ) in addition to total spending ( demand-side effects ). Policy changes on both the tax and spending sides of the budget enlarged the deficit in FY2018 relative to the current-law baseline for that year. Notably, the tax cuts in the 2017 act, P.L. 115-97 , began in calendar year 2018, with the budgetary effects peaking in FY2019. The Bipartisan Budget Act of 2018 ( P.L. 115-123 ) increased the Budget Control Act's ( P.L. 112-25 's) discretionary spending caps, and those increasesâcombined with increases in discretionary spending not subject to the capsâincreased discretionary spending relative to the CBO baseline by $94 billion in FY2018. These discretionary spending changes provided fiscal stimulus compared to current law but not compared to recent policyâdiscretionary spending was a steady 6.2% of GDP in both FY2017 and FY2018. In other words, compared to the previous year, the legislative changes to boost discretionary spending prevented contractionary fiscal policy from occurring. Mandatory spending fell because spending on health programs and automatic stabilizers (benefits where spending levels are sensitive to economic conditions) grew more slowly in dollar terms than GDP. Statutory changes to mandatory spending levels in FY2018 were minimal, and thus were not responsible for the decline. CBO projected that the tax cuts would boost GDP growth relative to the baseline by 0.3 percentage points in both FY2018 and FY2019. This estimate included demand-side and supply-side effects. Thus, based on CBO's projections, the tax cuts can help explain why growth accelerated in the faster-growth period, but cannot explain why growth subsequently slowed, because fiscal stimulus from the tax cuts left growth unchanged in FY2019 from the previous year. Relative to the baseline, the boost to growth from the tax cuts is projected to gradually fade beginning in FY2020 and eventually reduce growth beginning in FY2025. The federal budget deficit rose from 3.5% of GDP in FY2017 to 3.9% of GDP in FY2018. The increase was caused by the decline in revenues from 17.2% of GDP in FY2017 to 16.5% of GDP in FY2018. By contrast, spending fell as a percentage of GDP between FY2017 and FY2018, which would reduce the deficit as a share of GDP, all else equal. The federal budget deficit as a percentage of GDP rose in FY2019 from 3.9% to 4.5%, which would seem to indicate additional fiscal stimulus to the economy. However, a closer look at the data reveals that the stimulus is more limited than the increase in the deficit would indicate. Part of the increase in the deficit is attributable to a rise in mandatory spending and net interest payments as a share of GDP, but the increase is not caused by policy changes in either of these cases. Instead, spending in these categories increased as economic conditions and programs' take-up rates changed. Part of the increase in the deficit is attributable to a further decrease in revenues as a percentage of GDP, but this is also not due to additional policy changes. Instead, it is primarily because this was the first full fiscal year in which P.L. 115-97 's tax cuts were in place. The main fiscal stimulus was a small boost to discretionary spending, from 6.2% of GDP in FY2018 to 6.3% in FY2019. Fiscal stimulus works by changing policy to increase spending or reduce revenue from year to year. With policy changes having a modest effect on spending and revenue as a share of GDP, additional stimulus compared to the previous year was modest in FY2019. In other words, fiscal policy was not projected to cause growth to slow, but neither was it projected to provide a further boost to growth from what had been provided the previous year. The Federal Reserve (Fed) can temporarily influence growth through its control of short-term interest rates. The Fed tightened monetary policy from December 2016 to December 2018, with short-term interest rates gradually increased from a range of 0.25%-0.5% to a range of 2.25%-2.5%. This reduced the amount of monetary stimulus that the Federal Reserve was providing to the economy in response to higher growth by decreasing demand for interest-sensitive goods and services, such as business investment and consumer durables. This tightening mostly occurred during the higher-growth period, but because monetary policy affects the economy with a lag, the full economic effects of this tightening were not felt until after the last rate increase in December 2018. In 2019, the Fed changed course, reducing interest rates three times between August and October in response to slower growth and fears of a potential recession. After the last rate cut in October, interest rates were lower than the inflation rate again, marking a more stimulative (expansionary) course. Because of the lags in effectiveness, these reductions should provide a stimulative boost to the economy in the coming quarters. Throughout the Trump Administration, agencies have emphasized regulatory relief for businesses through legislation and the rulemaking process. On January 30, 2017, the Administration issued an executive order that required all agencies to identify at least two existing regulations to be repealed for each new regulation they proposed. To support this executive order, the Office of Information and Regulatory Affairs (OIRA) has published regulatory reform reports each year. Although not all of the regulatory changes reported provide relief for business, these reports provide a comprehensive list of regulatory actions that increase costs (which they classify as regulatory actions ) or reduce costs (which they classify as deregulatory actions ) on net and an estimate of net cost savings since FY2017. The reports do not include agencies defined as independent in 44 U.S.C. Â§3502, however, so deregulatory actions by independent agencies that promulgate economic rules, such as financial regulators, are omitted. For this reason, the table undercounts total regulatory and deregulatory actions. As shown in Table 2 , agencies have undertaken 393 deregulatory actions and 52 significant regulatory actions since FY2017, at a net benefit totaling $50.9 billion, based on agency estimates. Quantitative estimates of how regulations affect economic growth vary widely, and a comprehensive tally is difficult because of differences in methodology between estimates and the possibility that separate regulations may have interactive effects when considered jointly. The $50.9 billion estimate in Table 2 is not an estimate of the effect on GDP. Regulatory changes can have a broad array of costs and benefits that can be assigned monetary values (subject to a high degree of uncertainty), but not all of those costs and benefits affect the production of goods and services. Examples include effects on health, safety, and the environment. The fact that deregulatory actions have continued at a similar pace in the slower-growth period suggests the limits that these actions may have on overall growth. Deregulatory actions that affect single industries (or a subset of firms within an industry) can be important for output growth within that industry, but any given industry individually makes up a small share of the overall economy. Moreover, regulatory changes are likely to have one-off effects on GDP growth (i.e., they raise the level of output once), as opposed to permanently increasing growth rates (which would require output to continually grow more rapidly each year in the future). In other words, companies may respond to a regulatory change that lowers their costs by boosting output, but once that transition is complete, output will likely stay at the higher level and growth will likely revert to its previous pace. The stock market's performance may have contributed to faster growth. The S&P 500 index (an index of large stock prices) rose by 38% between November 4, 2016, and January 26, 2018, with relatively little volatility by historical standards. Higher equity prices can temporarily boost economic growth through their effects on companies and stockholders. When a stock rises in value, it improves the stock-issuing company's financial condition, which may induce more physical investment spending. As shown in Table 1 , business investment spending was noticeably higher in the faster-growth period than in the slower-growth period. For holders of stocks and other assets, a rise in their assets' value may also induce a wealth effect , whereby their consumption spending increases in response to their improved net worth. In terms of overall wealth, the ratio of household net worth to income is now higher than it was before the 2007-2009 financial crisis or the dotcom bubble, which burst in 2000. The exact size of the wealth effect is uncertain, however, because the direction of causation is unclearâusing stock prices as an example, more consumption could raise the value of firms producing the goods and services being consumed or higher stock prices could induce stockholders to consume more. The period of faster economic growth outlasted the period of the stock market's best performance, but the stock market did not perform poorly after January 2018. The S&P 500's value in August 2019 was about the same as in January 2018, with significant volatility over that period, featuring several steep and sudden declines followed by rebounds. Since October 2019, the stock market has steadily risen again. Surveys on consumer sentiment showed an increase in confidence in December 2016âbefore growth accelerated. Confidence remained high through 2018, but was more volatile in 2019 (although it remained high compared to levels registered in the past two recessions). All else equal, higher consumer confidence may help explain why consumption growth was strong. Business confidence was high in 2018, but volatile in 2017 and the first half of 2019 and lower in the second half of 2019, according to surveys. All else equal, greater business confidence may lead firms to hire more workers and undertake more physical investment spending. As shown in Table 1 , physical investment spending grew much more quickly in the faster-growth period than the slower-growth period. In interpreting these developments, it is important to note that the direction of causation is unclearâgreater consumer and business confidence may be a reaction to higher economic growth, rather than a driver of economic growth. Since 2017, the Administration has proposed a series of escalating tariffs and other import restrictions on major trading partners, such as China and the European Union. In response, affected countries have often proposed retaliatory trade restrictions on U.S. exports. Collectively, these proposed and implemented trade restrictions have popularly been referred to as a trade war to denote the broader scope of trade restrictions undertaken compared to the past. This section considers the joint economic impact of restrictions on U.S. imports and retaliatory foreign restrictions on U.S. exports. In the short term, changes in trade policy disrupt the production of goods and services that are exported or imported, or that rely on exports and imports as intermediate goods. In national accounting, exports are part of GDP and imports are subtracted from GDP (because they are not goods and services produced in the United States). Thus, trade restrictions negatively affect GDP through their effects on U.S. exports and U.S. goods reliant on imports, but positively affect GDP through their effects on U.S. imports and U.S. import-competing goods in the short run. The data bear this out: although many factors affect trade, export and import growth have both declined to close to zero since overall growth has slowed. Export growth fell from an average of 3.0% from the third quarter of 2017 to the third quarter of 2018 to 0.2% from the fourth quarter of 2018 to the third quarter of 2019, and import growth fell from an average of 5.0% to 0.9% over the same periods. Besides the direct mixed effect that trade restrictions have had on growth through their effect on exports and imports, they are viewed as having a negative indirect effect on growth through their effect on real income (because U.S. consumers face higher prices on imports, their overall purchasing power falls), financial conditions (if trade restrictions cause asset prices to fall or interest rates to rise), and business investment (because firms might hesitate to undertake large capital purchases if their business outlook is uncertain due to trade policy uncertainty). Although uncertainty is an inherently subjective measure, the International Monetary Fund (IMF) has attempted to quantify trade policy uncertainty, and finds that it was far higher in 2019 than at any point since the start of its index (1995). Finally, to the extent that trade uncertainty explains the appreciation of the dollar (discussed in the next section), this could partly or wholly offset any increase in net exports (exports less imports) that would be caused by U.S. tariffs. The trade dispute's precise effects on growth are uncertain because they mostly depend on second-order effects that are hard to measure, but they are generally thought to have been negative on net thus far. Goldman Sachs economists estimate that the trade dispute with China has reduced quarterly growth by between 0.2 and 0.4 percentage points each quarter from the second quarter of 2018 through the fourth quarter of 2019 (and could continue to reduce growth in future quarters, depending on what happens to trade policy in the future). They estimate that the trade restrictions' direct effects have positively affected growth, but that this has been more than offset by the negative indirect effects outlined above. CBO estimates that the direct effects of tariffs implemented to date will reduce the level of real GDP by 0.3% by 2020 (assuming the tariffs remain in place until then)âa somewhat smaller effect than Goldman Sachs estimated, partly because Goldman Sachs's estimate includes more recent trade policy developments. CBO projects the effect on GDP will wane over time, assuming the tariffs remain in place until 2029. The Organisation for Economic Co-operation and Development (OECD) estimates that trade restrictions, if unchanged, will reduce GDP growth by 0.5% by 2021. The timing of trade policy uncertainty's effects on business confidence and investment is hard to pinpoint, but the effects have likely increased over time. Announcements of trade policy changes began in the higher-growth period, but were phased in and ratcheted up over time. Further, confidence depends partly on how individuals believe the trade disputes will ultimately be resolved. Perceptions of whether trade disputes would be resolved or escalate are likely to have varied over time as U.S. and foreign policymakers' rhetoric on intentions and progress has fluctuated. One source of trade policy uncertainty was removed when the new U.S.-Mexico-Canada Agreement ( H.R. 5430 ) was signed into law, assuming all parties to the agreement ratify it. Other sources of uncertainty, such as trade relations with China, remain outstanding, albeit arguably diminished by the signing of the Phase 1 bilateral agreement on January 15, 2020. When the myriad of trade disputes are eventually resolved, uncertainty will no longer weigh on growth. However, if trade becomes radically more open or closed, that could affect long-term productivity, as it would affect the efficient use of economic resources through, respectively, more or less scope for comparative advantage. According to the IMF, global growth fell from 3.8% in 2017 to 3.6% in 2018 to a projected 3.0% in 2019, which would be its slowest growth rate since the 2007-2009 financial crisis. It attributes half of the slowdown to the economic crises in Argentina, Iran, Turkey, and Venezuela, but the slowdown was widespread and included important U.S. trading partners such as the eurozone and China. For countries where exports are an important source of growth, such as China, trade policy uncertainty (discussed above) likely contributed to the slowdown. Slower global growth reduces demand for U.S. exports, which reduces U.S. growth, all else equal. As shown in Table 1 , U.S. export growth fell from an average of 3.0% from the third quarter of 2017 to the third quarter of 2018 to 0.2% from the fourth quarter of 2018 to the third quarter of 2019. U.S. interest rates have been higher than those of major trading partners for several years, and this difference widened during the period when the Fed was raising rates. Relatively higher economic growth and interest rates in the United States compared to the rest of the world contributed to a strengthening of the dollar exchange rate, as capital flowed into the United States to take advantage of relatively higher rates of return. When foreigners invest in U.S. assets, they must first buy U.S. dollars, which increases the value of the dollar, all else equal. In the flexible exchange rate era (beginning in the 1970s), the dollar's real value against a broad trade-weighted index reached its highest level since 2003 in December 2016, and it has remained relatively high since then. The mid-1980s and late 1990s were the only other periods when the dollar's value was comparably high. Trade policy uncertainty may also help explain why the dollar has appreciated, although the direction of the exchange rate effect is uncertain, theoretically. Trade restrictions on U.S. imports reduce the relative demand for foreign currency, boosting the value of the dollar. However, retaliatory tariffs on U.S. exports reduce the relative demand for the U.S. dollar, potentially offsetting some or all of the upward pressure on the dollar. If tariffs reduce growth in importing countries relative to U.S. growth, this could further reduce the demand for their currency relative to the dollar. Finally, the dollar is traditionally a safe haven currency that investors flock to when uncertainty risesâeven in cases where the uncertainty has emanated from the United States. When the dollar's value rises, U.S. exports are relatively more expensive in the rest of the world and U.S. imports are less expensive, all else equal. The fact that the dollar's value was high during the higher-growth period was largely a reflection of the strength of the U.S. economy, and one of the natural equilibration mechanisms that prevents economic overheating. A weaker dollar could potentially have supported growth through higher exports and lower imports during the slower-growth period, but this did not occur because growth in many major trading partners was relatively weaker than in the United States. The consensus forecast is for the economy to continue growing at its recent moderate pace in the coming quarters. However, the current economic expansion is already the longest recorded expansion in U.S. history, so it is natural to wonder if the recent slowdown will turn into a recession in the near term. As noted above, the slowdown has returned the growth rate to the average for the overall expansion. A return to trend means growth has less room to decline in the future before it turns negative, which has been a feature of all previous recessions. Some recessions are caused by external shocks to the economyâidiosyncratic changes that reduce output, such as a spike in energy prices. Any given shock is less likely to result in negative growth if the economy is growing rapidly when the shock occurs than if it is growing slowly. However, a return to trend growth could counterintuitively make it less likely that the economy enters a recession because there is less of a risk that the economy will overheat. Some recessions are caused by the economy growing unsustainably quickly when it is already at full employment, which leads to higher inflation and, ultimately, a corrective crash in economic activity. By contrast, absent external shocks, growth at the trend rate could theoretically continue indefinitely. For this reason, fiscal and monetary stimulus may have helped prevent growth from slowing further in 2018, but additional stimulus to attempt to increase growth above trend could potentially be counterproductive. It is unusual for fiscal and monetary policy to still be easy (i.e., for the budget deficit to be high and interest rates to be low), as they are now, when the economy has already returned to full employment. Furthermore, growth during this expansion has been strong only during periods in which fiscal policy has been more stimulative. This raises questions about whether growth could remain sufficiently strong if fiscal and monetary stimulus were withdrawnâa problem that has not arisen in previous expansions since after the Great Depression, but one that many advanced economies have grappled with in this expansion. If growth were to slow further, the stimulus available to counteract it may be limited. As a result of fiscal and monetary policy remaining stimulative throughout the long economic expansion, policymakers have less headroom to respond to a future downturn. In the case of monetary policy, short-term interest rates are already relatively close to zero, limiting how much additional stimulus the Fed can provide through its conventional tool of cutting short-term rates. The Fed may find that this tool is quickly exhausted in the next recession, in which case it could be required to turn to unconventional tools such as large-scale asset purchases (popularly known as quantitative easing ) or negative interest rates to fight the recession. In the case of fiscal policy, the publicly held federal debt is the highest it has been as a share of GDP since World War II and is projected to continue to increase under current policy. The budget deficit is already larger than its historical average as a share of GDP and will automatically increase in a recession with no change in policy because of the budget's automatic stabilizers. Unprecedentedly high debt may make policymakers feel constrained to provide enough additional fiscal stimulus to counteract the recession. Or high debt may cause debt holders to refuse to finance enough stimulus, particularly because of the reliance on foreigners to finance the federal debt. Foreigners have held 40%-50% of the publicly held debt in recent decades. There are competing schools of thought on the best way to address this limited fiscal and monetary headroom. One school of thought argues for fiscal and monetary policy to be tightened now (by reducing deficits and raising interest rates, respectively) to gain additional headroom to be used in the next recession, and make it less likely that the economy will overheat at full employment. This strategy would be successful as long as the economy could withstand the withdrawal of stimulus and continue growing at a moderate pace. The other school of thought believes that fiscal and monetary stimulus should be used aggressively in response to any slowdown to avert a recession since the limited headroom would make a recession more likely to be deep and prolonged. This school of thought has been cited by Fed Chairman Jerome Powell as a justification for the Fed's decision to reduce interest rates three times in 2019. But this strategy could backfire if the economy nevertheless enters a recession at some point when headroom is still highly limited. Monetary and fiscal policy primarily influence short-term growth. Other policies can influence the long-term trend growth rate, but more indirectly, slowly, and imprecisely. Long-term growth is determined by growth in the labor force, changes in the quality of the labor force, growth in the capital stock, and productivity growth. Multiple policy areas influence each of those factors. For example, education and training influence the quality of the labor force; infrastructure spending contributes directly to the capital stock; health policy influences hours worked; and trade and technology policies influence productivity growth.", "summary": "The current economic expansion is the longest in recorded U.S. history, but it has not been characterized by rapid economic growth. From the beginning of the current economic expansion in the third quarter of 2009 to the second quarter of 2017, this expansion had the lowest economic growth rate of any expansion since World War II, averaging 2.2%. For the next five quarters, growth accelerated to 3.1%. However, growth has slowed since, averaging 2.1% over the next four quarters beginning in the fourth quarter of 2018. The slower growth rate has been widespread, but has been particularly concentrated in business investment and exports. Private forecasters expect this slower pace to continue in 2020. A similar growth pattern has not been observed in labor markets, as monthly employment growth was only slightly lower in the slower-growth period than in the faster-growth period. A number of developments have influenced growth since 2017: Fiscal policy . The federal budget deficit rose from 3.5% of gross domestic product (GDP) in FY2017 to 3.9% in FY2018. Deficit-financed tax or spending policy changes stimulate overall economic activity in the short run, but stimulus fades over time. The deficit increased partly as a result of P.L. 115-97 , which cut taxes beginning in calendar year 2018, with the budgetary effects peaking in FY2019. Monetary policy. The Federal Reserve raised short-term interest rates gradually from a range of 0.25%-0.5% in December 2016 to a range of 2.25%-2.5% in December 2018. Higher interest rates reduce interest-sensitive spending, such as business investment and consumer durables. Rates were then cut in 2019 to a range of 1.5%-1.75%. Regulatory policy . The Administration reported that agencies have undertaken 393 deregulatory actions and 52 significant regulatory actions since FY2017, at a net benefit totaling $50.9 billion, based on agency estimates. Deregulatory actions that reduced costs for businesses could boost their output levels. Trade policy . Since 2017, the Administration has proposed a series of escalating tariffs and other import restrictions on major trading partners, such as China. In response, affected countries have often proposed retaliatory trade restrictions on U.S. exports. Trade restrictions have a mixed direct effect on growth through their impact on U.S. exports and imports. However, they are generally thought to have a negative indirect effect on growth through their impact on real income, financial conditions, and business investment. Stock market . Stock prices (as measured by the S&P 500 index) rose by 38% between November 4, 2016, and January 26, 2018, with little volatility by historical standards. Since then, volatility has risen. Favorable financial conditions make it easier for firms to finance investment and may lead asset holders to consume more through a wealth effect . Global growth . Global growth fell from 3.8% in 2017 to 3.6% in 2018 to a projected 3.0% in 2019. This reduces foreign demand for U.S. exports, all else equal. Over time, economists believe that the economy cannot grow faster than its trend or potential growth rate, which is determined by how quickly labor, the capital stock, and productivity grow. It appears that the growth rate has reverted to its trend growth rate since the fourth quarter of 20s18. Regulatory policy changes and fiscal stimulus may have contributed to the temporary increase in growth, but do not appear to have led to a permanent acceleration in trend growth. This slower rate of growth would be problematic if growth continued to decelerate toward zero, but most forecasters do not expect this to happen. On the contrary, this slower rate of growth could make a recession less likely because it reduces the probability that the economy will overheat, which has been the cause of some past recessions. It is unusual for fiscal and monetary policy to remain stimulative when the economy has fully recovered from a recession. As a result, there is less remaining headroom than usual for the Federal Reserve to reduce interest rates (monetary stimulus) or Congress to increase the deficit (fiscal stimulus) going forward. Policymakers face a choice between maintaining existing fiscal and monetary stimulus to maintain growth and removing stimulus so that there is more scope to employ stimulus in the next recession.", "document_type": "crs"}
{"report": "Election security is one of the most prominent policy challenges facing Congress. A November 2019 warning from the heads of several federal agencies illustrates the interdisciplinary and ongoing nature of the threat to American elections. According to the joint statement, in the 2020 election cycle, \"Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions. Adversaries may try to accomplish their goals through a variety of means, including social media campaigns, directing disinformation operations or conducting disruptive or destructive cyber-attacks on state and local infrastructure.\" These are just the latest challenges in securing American elections. Traditionally, election administration emphasizes policy goals such as ensuring that all eligible voters, and only eligible voters, may register and cast ballots; that those ballots are counted properly; and that the voting public views that process as legitimate and transparent. Preserving election continuity is a chief concern. Election officials therefore have long prepared contingency plans that address various risks, such as equipment malfunctions, power outages, and natural disasters. These traditional concerns remain, but have taken on new complexity amid foreign interference in U.S. elections. In addition to managing traditional security concerns about infrastructure and administrative processes (e.g., counting ballots), mitigating external threats to the accuracy of information voters receive, particularly from foreign sources, is a potential challenge for political campaigns, election administrators, and the public. Addressing any one of these topics might involve multiple areas of public policy or law. Doing so also can involve complex practical challenges about which levels of government, or agencies, are best equipped or most appropriate to respond. How those entities can or should interact with political campaigns, the private sector, and voters, are also ongoing questions. Technical complexity in some areas, such as cybersecurity, and the federal structure of shared national, state or territorial, and local responsibility for administering federal elections make election security even more challenging. Election security in general appears to be a shared policy goal, but debate exists in Congress about which policy issues and options to pursue. Debate over the scope of the federal government's role in election security shapes much of that debate. State, territorial, and local governments are responsible for most aspects of election administration, including security. This report provides congressional readers with an overview that includes how campaign and election security has developed as a policy field; recent legislative activity, especially bills that have advanced beyond introduction; federal statutes and agencies that appear to be most relevant for campaign and election security; state, territorial, or local roles in administering elections, and federal support for those functions; and highlights of recent policy debates, and potential future questions for congressional consideration. There is no single definition of \"election security,\" nor is there necessarily agreement on which topics should or should not be included in the policy debate. Broadly speaking, election security involves efforts to ensure fair, accurate, and safe elections. This can include a variety of activities that happen before, during, and after voters cast their ballots. A narrow definition of election security might address only efforts to protect traditional election infrastructure, such as voter registration databases, voting machines, polling places, and election result tabulations. More expansive definitions might also address issues affecting candidates and campaigns. This includes, for example, regulating political advertising or fundraising; providing physical or cybersecurity assistance for campaigns; or combating disinformation or misinformation in the political debate. The policy debates discussed herein can affect different kinds of entities uniquely. Perhaps most notably, security concerns affecting campaigns can differ from those for safeguarding elections and voting. Campaigns in the United States are about persuading voters in an effort to win elections. They are private, not governmental, operations and are subject to relatively little regulation beyond campaign finance policy. Elections are more highly regulated, although specific practices can vary, as their administration is primarily a state- or local-level responsibility. Provisions in state or local law, and, to a lesser degree, federal law, regulate how voters cast ballots and who may do so. Some security discussions include issues related to voter access, while others view access as a separate elections policy matter. This report briefly notes that access can be a component of campaign and election security policy debates, but the report does not otherwise address access issues. This report does not attempt definitively to resolve ongoing policy debates about what campaign and election security entails or should entail, nor does it fully address all aspects of the policy issues discussed. Instead, it provides congressional readers with background information to consider that debate and decide whether or how to pursue legislation (including appropriations) or oversight. Because all the topics noted aboveâand others discussed throughout the reportâhave been components of the recent congressional debate over how to safeguard American campaigns, elections, and voting, this report uses the general term campaign and election security . This report discusses federal agencies, statutes, and policies designed to prevent or respond to deliberate domestic or foreign security threats to campaigns, elections, or voting. Concepts discussed in the report also have implications for some unintentional threats, such as natural disasters or other emergencies that could affect campaigns, elections, or voting. Legislation cited in the report contains specific references to campaign and election security. This includes bill text that uses variations of terms such as campaign , election , or vote near variations of the terms interference or security . Some readers might view areas addressed herein as more or less directly related to campaign or election security, and alternative methodologies could yield other bills or policy topics for consideration. The report does not include detailed attention to more traditional aspects of campaign finance, election administration, or voting, particularly voter mobilization. For example, the report discusses Help America Vote Act provisions that authorize funding states may use to help secure elections, but not provisions that authorize funding for the Election Assistance Commission generally. Similarly, the report briefly discusses Voting Rights Act provisions that prohibit voter intimidation, but it does not discuss other federal statutes enacted to make registration and voting easier. In addition, the report briefly notes lobbying statutes that might be relevant for regulating certain corporate or foreign activity related to U.S. election interference, but it does not substantially address lobbying as a policy area. The report emphasizes domestic implications of campaign and election security. This includes attention to protections for U.S. campaigns and elections from the effects of foreign disinformation and misinformation efforts. The Appendix at the end of this report includes sanctions or immigration legislation that specifically references interference in U.S. elections, and which has advanced beyond introduction during the 116 th Congress. However, foreign policy implications of such interference, or a discussion of offensive operations and tactics that the United States might or might not use against foreign adversaries, are otherwise beyond the scope of this report. Because of the still-developing and complex policy challenges surrounding campaign and election security, other areas of law, policy, or practice might also be relevant but are not addressed here. The report references other CRS products that contain additional discussion of several such topics. The report does not provide legal or constitutional analysis. It also does not attempt to catalog all alleged or established instances of campaign and election interference or security concerns, or to independently evaluate allegations. Highlights of recent legislative activity include the following. Additional discussion appears throughout the report. The 115 th Congress (2017-2019) appropriated $380 million for FY2018 for improvements to the administration of federal elections, including upgrades to election technology and security. The 116 th Congress (2019-2021) appropriated $425 million for FY2020 in the consolidated appropriations bill ( H.R. 1158 ; P.L. 116-93 ) enacted in December 2019. The \" Funding for States After the 2016 Election Cycle \" section of this report contains additional detail. The 116 th Congress enacted S. 1790 ( P.L. 116-92 ), the FY2020 National Defense Authorization Act (NDAA), in December 2019. The legislation contains several provisions related to campaign and election security. Table 1 below lists bills that have passed at least one chamber. The Appendix in this report briefly summarizes 116 th Congress legislation containing campaign and election security provisions that has advanced beyond introduction. In addition, during the 116 th Congress, committees in both chambers have held hearings on these and related campaign and election security topics. The Committee on House Administration and Senate Committee on Rules and Administration exercise primary jurisdiction over federal elections. Several other committees oversee related areas, such as intelligence or voting rights issues. Another CRS product contains additional discussion of committee roles in federal campaigns and elections generally. Foreign interference is only the highest-profile and latest campaign and election security policy challenge. Physical security, to protect voters, ballots, and vote counts, has been an ongoing concern. Specifically, in modern history, the federal government's first role in securing elections was primarily about access and voting rights. In 1965, Congress enacted the Voting Rights Act (VRA), which protects voters against race- or color-based discrimination in registration, redistricting, and voting. More explicitly related to security, the VRA prohibits intimidation, threats, or coercion in voting. Congress primarily tasked the U.S. Department of Justice (DOJ) with enforcing the statute and related criminal provisions. Federal law enforcement agencies, especially the Federal Bureau of Investigation (FBI), also support states and localitiesâwhich retain primary responsibility for election administration in the United Statesâin investigating election crimes and providing physical security at the polls. The federal role in election administration expanded after the disputed 2000 presidential election. In response, Congress authorized federal funding for the states, the District of Columbia, and territories to make improvements to the administration of federal elections. It also created the Election Assistance Commission (EAC) to administer those funds. Congress charged the agency with overseeing a voluntary voting system testing and certification program, and providing states and localities with voluntary election administration guidance, research, and best practices. These developments notwithstanding, securing campaigns and elections historically was not a major policy topic at the federal level, as most security matters were reserved for state- or local-level policy. The policy environment changed dramatically during the 2016 election cycle, when media reports and subsequent congressional and federal-agency investigations documented Russian government interference with that year's U.S. presidential election. According to Special Counsel Robert Mueller's report, these interference efforts targeted private technology firms that provide election-related software and hardware; state and local government entities; and a major political party and nominee. The investigations did not find that this activity was a determinative factor in the election outcome. However, the possibility of such activity, and of additional efforts to affect political attitudes or participation, remains. In July 2018 remarks at the Hudson Institute, then-Director of National Intelligence (DNI) Dan Coats, a former Senator, said that the Intelligence Community (IC) reported \"aggressive attempts to manipulate social media and to spread propaganda focused on hot-button issues that are intended to exacerbate socio-political divisions\" in elections. To the extent that those efforts affect campaignsâincluding campaign security, or the information voters receive from campaignsâcampaign finance policy and law could be relevant. The Federal Election Campaign Act (FECA) originated in the 1970s amid concerns about limiting domestic political corruption. The act also contains a wide-ranging prohibition on foreign-national involvement in federal, state, or local U.S. elections. These provisions, and disclosure and disclaimer requirements for all \"persons\" who raise or spend funds to influence federal elections, are key elements of regulating both domestic and foreign efforts to affect political fundraising, spending, and advertising. Political committees (campaigns, parties, and political action committees [PACs]) are responsible for their own security measures, although, as noted elsewhere in this report, federal agencies (or private-sector entities) provide assistance in some cases. Today, election security is one of the most rapidly evolving policy issues facing Congress and the federal government. Both chambers have passed legislation on the topic during the 116 th Congress. Multiple House and Senate committees have held investigative and oversight hearings. Congress and the Obama and Trump Administrations have tasked federal agencies with new responsibilities for supporting states and thwarting future possible interference. The Intelligence Community has warned that countering foreign interference in U.S. elections \"will require a whole-of-society approach, including support from the private sector and the active engagement of an informed public.\" The U.S. Constitution and federal statutes regulate the division of governmental responsibility for elections. No existing statute is devoted specifically to election security, although, as discussed below, some statutes address aspects of the topic. Most broadly, the Constitution's Elections Clause assigns states with setting the \"Times, Places and Manner\" for House and Senate elections, and also permits Congress to \"at any time â¦ make or alter such Regulations.\" As discussed in the \" State and Local Role in Election Security \" section of this report, the federal government thus plays a largely supporting role in election administration generally, and in election security specifically. Two election-specific statutes can be particularly important for campaign and election security. Relevant legislation typically proposes amending one or both. First, the Help America Vote Act (HAVA, 2002) is the only federal statute devoted to assisting states with election administration. Congress relied on HAVA to establish the Election Assistance Commission, provide for a voluntary federal voting system testing and certification program, and authorize federal funding states could use to help secure their elections. Second, FECA's disclaimer and disclosure provisions, and the prohibition on foreign national fundraising or spending in U.S. elections, can be particularly relevant for concerns about foreign interference in U.S. elections. Several other statutes could be relevant in specific cases. Table 2 below provides a brief summary. No single federal agency has responsibility for providing election or campaign security. Only two federal agenciesâthe Election Assistance Commission (EAC) and the Federal Election Commission (FEC)âare devoted entirely to campaigns and elections. The EAC administers congressionally appropriated federal funding, oversees a voluntary voting system testing and certification program, and provides voluntary election administration guidance, research, and best practices. The FEC is responsible for administration and civil enforcement of FECA. Other departments and agencies, primarily with responsibilities for other areas of public policy, support campaign and election security in specific cases. Some agency roles developed from a January 2017 \"critical infrastructure\" designation. Additional detail appears below. Additional information about agency roles appears below, and in the \" Coordination By and Among Selected Federal Agencies \" section of this report. The EAC is the only federal agency focused specifically on assisting states with election administration. Congress has charged the EAC with administering funding states may use to help secure their elections. The EAC also provides states and localities with election administration assistance, adopting voluntary voting system guidelines (VVSG, discussed below), providing for systems to be tested to the VVSG, and certifying systems as meeting the guidelines. It also conducts research about state election administration and voting, and shares information about best practices. Although not mandated by Congress, the EAC also participates in activities related to the designation of election systems as critical infrastructure, such as serving on the Election Infrastructure Subsector Government Coordinating Council (EIS-GCC) and on the EIS-GCC executive committee. The FEC enforces civil compliance with FECA provisions and commission regulations regarding campaign finance. This includes activities related to fundraising, spending, advertising disclaimers, and financial disclosure reports. These provisions are relevant for some aspects of security affecting political candidates or campaigns, parties, political action committees (PACs), or other entities (e.g., independent spenders that are not political committees) that raise or spend funds to affect federal campaigns. The FEC does not regulate election administration or voting matters. DHS provides states and localities with assistance mitigating risks to their election systems, especially concerning cybersecurity. DHS is the sector-specific agency (SSA) responsible for securing the election infrastructure subsector. Additional information appears later in this report. DHS's Cybersecurity and Infrastructure Security Agency (CISA) is responsible for most of the department's election security activities, including the Election Security Initiative (ESI). DHS protects major presidential candidates through the U.S. Secret Service (USSS). The Secret Service is also the lead security agency for \"national special security events\" (NSSEs), such as presidential nominating conventions. The Department of Justice enforces several federal statutes, discussed above, that could be relevant for campaign and election security. Within DOJ, the FBI is the lead federal law enforcement agency supporting state and local election administration, and is the lead federal agency in investigating and prosecuting foreign influence campaigns. Several agencies contribute to or produce intelligence about election security threats. For example, a declassified version of a January 2017 Intelligence Community Assessment (ICA) documenting Russian attempts to influence 2016-cycle U.S. elections contained information and analysis from the CIA, FBI, and NSA. The \" Coordination By and Among Selected Federal Agencies \" section below provides additional discussion of the IC campaign and election security roles. The State Department's Global Engagement Center (GEC) is charged with coordinating federal efforts to counter foreign propaganda and disinformation efforts aimed at undermining U.S. national security interests. The GEC partners with other U.S. government agencies, including those within the State Department, at the Defense Department, and elsewhere. The Departments of Justice, State, and the Treasury all can be involved in administering sanctions for election interference. As noted previously, sanctions policy generally is beyond the scope of this report. Via the FY2020 NDAA bill ( S. 1790 ; P.L. 116-92 ), Congress assigned various agencies, especially DHS and the DNI, additional campaign and election security responsibilities. Most provisions involve providing Congress or federal or state agencies with information about election interference. The Appendix of this report provides additional detail. Table 3 provides a brief overview of selected agency roles in campaign and election security. Because no single federal agency is solely responsible for campaign and election securityâand because state and local governments have most practical responsibility for election securityâcoordination among agencies and governments is an ongoing congressional concern. Adding to the complexity of the election security challenge, government agencies, in some cases, both support and regulate private actorsâsuch as political campaignsâand sometimes rely on those private entities to provide threat information. Highlights of federal coordination issues appear below. Because some of these relationships appear to be in development, some information about agency coordination, or the lack thereof, remains unclear in the public record. Similarly, some information about coordination among intelligence-gathering agencies is publicly unavailable, beyond the scope of this report, or both. As such, other formal or information coordination among or by agencies likely occurs but is not reflected here. DHS takes a lead role in coordinating the federal support for campaign and election security. Most of the DHS coordination role stems from a January 2017 \"critical infrastructure\" designation that treats election infrastructure as an essential service requiring federal support and protection. The designation established the Elections Infrastructure Subsector (EIS) within the Government Facilities Sector, which includes various government buildings and equipment. As a result of the critical infrastructure designation, DHS prioritizes support for the subsector, including to those state and local election jurisdictions that choose to accept such assistance. This includes sharing information about threats; and conducting cyber hygiene and risk and vulnerability assessments. The critical infrastructure designation applies to physical and technical resources related to elections, such as communications technology, voting equipment, and polling places. It does not apply to political campaigns. The designation does not give DHS regulatory authority over federal elections. DHS serves as the Sector-Specific Agency (SSA) for the EIS. As SSA, the agency plays various coordinating roles among public and private entities, as highlighted below. As SSA, DHS coordinates information sharing among various governmental and nongovernmental entities (e.g., vendors) responsible for election administration. In this role, DHS also coordinates activities for the EIS Government Coordinating Council (GCC). The EIS-GCC includes representatives from DHS, EAC, and state and local governments. DHS also works with a Sector Coordinating Council (SCC), which consists of industry representatives (e.g., voting-machine manufacturers). DHS also funds the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), a voluntary membership organization of state and local election jurisdictions run by the private Center for Internet Security. The EI-ISAC coordinates security information sharing among these entities. As the only federal agency devoted specifically to election administration, the EAC helps facilitate communication between state or local election administrators and other federal agencies, and vice versa. EAC commissioners serve on the EIS Government Coordinating Council (EIS-GCC), coordinated by DHS, and on the EIS-GCC executive committee. As noted previously, the IC includes more than a dozen agencies from throughout the federal government. Highlights of the IC role in coordination surrounding campaign and election security appear below. In July 2019, then-DNI Coats created an IC Election Threats Executive (ETE) position to serve as the DNI's principal elections adviser and to coordinate IC election security work. Coats also directed IC agencies to assign a senior executive to serve as the point-of-contact for that agency's election security work and to serve on a new IC Election Executive and Leadership Board. U.S. Cyber Command and the NSA monitors foreign threats to U.S. elections. This reportedly includes a recently established Election Security Group. In addition, the FY2020 NDAA bill requires the DNI to appoint a national counterintelligence officer within the National Counterintelligence and Security Center to coordinate election security counterintelligence, particularly regarding foreign interference and equipment issues. In addition to coordination on IC threat assessments noted above, multiple federal agencies have collaborated on campaign and election security educational resources for political committees, election administrators, or voters. Agencies also have issued joint warnings. The State Department's Global Engagement Center (GEC) is charged with coordinating federal efforts to counter foreign propaganda and disinformation. The State Department also works with the Treasury Department and Justice Department to administer sanctions for election interference. The FY2020 NDAA bill ( S. 1790 ; P.L. 116-92 ), enacted in December 2019, requires the DNI to \"develop a whole-of-government strategy for countering the threat of Russian cyberattacks and attempted cyberattacks against election systems and processes in the United States.\" Congress specified that the strategy should include protecting federal, state, and local election systems, voter registration databases, voting tabulation equipment, and systems for transmitting election results. Congress also required the DNI to develop the strategy \"in coordination\" with the Secretaries of Defense, Homeland Security, State, and the Treasury, and with the Directors of the CIA and FBI. Perhaps because the 2017 critical infrastructure designation does not apply to political campaigns or other political committees, it appears that no federal agency has specific responsibility for coordinating security preparations for these entities. However, federal law enforcement agencies, particularly the FBI, can and do receive reports of, and investigate, suspected criminal activity. In preparation for the 2020 elections, the FBI also established a \"Protected Voices\" program that provides political campaigns, private companies, and individuals with information about how to guard against and respond to cyberattacks and foreign influence campaigns. In addition, DHS (CISA), the FBI, and ODNI have jointly briefed some 2020 federal political campaigns on security threats and best practices. Federal election law takes a mostly voluntary approach to election security. Congress has set some security requirements for federal elections, such as directing election officials to provide a certain level of technological security for their HAVA-mandated computerized voter registration lists. Most election security standards are set at the state or local levels. Some examples of the voluntary election security guidance the federal government provides are the research, best practices, and technical assistance described in the \" Selected Federal Agencies \" section of this report. HAVA also charges the EACâwith assistance from the agency's advisory bodies and NISTâwith developing voluntary voting system guidelines (VVSG), accrediting laboratories to test voting systems to the VVSG, and certifying systems as meeting the VVSG. The proposed update to the VVSG that was in development as of this writing (VVSG 2.0) includes some security-related principles and guidelines, such as ensuring that voting systems are auditable, limiting and logging access to voting systems, and preventing or detecting unauthorized physical access to voting system hardware. Participation in the federal voting system testing and certification program is voluntary under federal law. The testing and certification program covers the \"voting system\" as defined by HAVA, which does not include some components of the election system, such as voter registration databases and election night reporting systems. Changes to one part of a voting system, such as updating software to patch security vulnerabilities, might require recertification of the system under the policies in effect as of this writing, and updates to the VVSG require approval by a three-vote majority of the EAC's commissioners. Congress has responded to the threats that emerged during the 2016 election cycle, discussed above, in part with funding. Since the 2016 elections, it has provided funding for helping secure election systems both to states, territories, and the District of Columbia (DC), and to federal agencies. The Consolidated Appropriations Act, 2020 ( H.R. 1158 ; P.L. 116-93 ), and the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), included $425 million and $380 million, respectively, for payments under provisions of HAVA that authorize funding for general improvements to the administration of federal elections. The explanatory statements accompanying the bills listed the following election security-specific purposes as potential uses of the funds: replacing voting equipment that only records a voter's intent electronically with equipment that utilizes a voter-verified paper record; implementing a post-election audit system that provides a high level of confidence in the accuracy of the final vote tally; upgrading election-related computer systems to address cyber vulnerabilities identified through DHS or similar scans or assessments of existing election systems; facilitating cybersecurity training for the state chief election official's office and local election officials; implementing established cybersecurity best practices for election systems; and funding other activities that will improve the security of elections for federal office. The 50 states, DC, American Samoa, Guam, Puerto Rico, and the U.S. Virgin Islands were eligible for both FY2018 and FY2020 payments. The Commonwealth of the Northern Mariana Islands (CNMI) was eligible for FY2020 funding. Each recipient was guaranteed a minimum payment amount each year it was eligibleâ$3 million for each of the 50 states and DC and $600,000 per eligible territoryâwith the remainder of the appropriated funding distributed according to a formula based on voting-age population. Recipients are required to provide a 5% match for the FY2018 funds within two years of receiving a federal payment and a 20% match for the FY2020 funding. The EAC, which was charged with administering the payments, reported that all of the FY2018 funds were requested by July 16, 2018, and disbursed to the states by September 20, 2018. Each state has five years to spend the funds, according to the EAC, and must report on its spending each fiscal year. The EAC posts links to the states' reportsâand spending plansâon its website and issues its own overview reports of state spending. As noted in the \" Selected Federal Agencies \" section of this report, multiple federal agencies are involved in helping secure election systems. Congress has designated some of the funding it has appropriated to such agencies specifically for election system security. For example, following the designation of election systems as critical infrastructure in January 2017, the report language for DHS appropriations measures has specified funding for the department's election security initiative. The explanatory statement for the FY2018 spending bill also directed the FBI to use some of its funding to help counter threats to democratic institutions and processes. Agencies may also spend some of the funding they receive for more general purposes on activities related to election system security. The U.S. Department of Defense's (DOD's) Defense Advanced Research Projects Agency (DARPA) has provided funding under its System Security Integrated Through Hardware and Firmware (SSITH) program to advance development of a secure, open-source voting system, for example, and the EAC applies some of its operational funding to the federal voting system testing and certification program described in the \" Federal Election Security Guidance \" section of this report. Some threats to U.S. electionsâincluding both intentional interference efforts and the unintended threats posed by errors and natural disastersâinvolve the state and local systems used to administer elections. Other election security threats involve efforts to spread disinformation about elections or the integrity of the electoral process. States and localities may play a role in countering both types of threat. First, states and localities take the lead on defending their election systems. As noted previously, states and localities have primary responsibility for administering elections in the United States. The federal government has provided some funding and technical support to help them secure the systems they use to run elections, but states and localities have primary responsibility for ensuring that their systems are physically and technologically secure. That includes primary responsibility for funding election system security measures. Securing election systems may involve capital expenditures, such as replacing voting machines, that exceed funding provided by Congress. It may also involve ongoing costsâfrom identifying and addressing emerging security threats to renewing software licenses, paying election security staff, and conducting post-election auditsâthat extend beyond the period for which federal funding is available. Such expenses are covered, if they are covered, by states and localities. State and local responsibility for election system security also includes primary responsibility for making and implementing most decisions about how to secure election systems. Federal law sets some general standards for the administration of elections, such as the voter registration list digitization requirement noted in the \" Federal Election Security Guidance \" section of this report. States and localities decideâwithin the broad parameters set by such general standardsâwhich election equipment and procedures to use and how to mitigate risks to them. They choose, for example, whether to use electronic devices to capture or count votes; whether, when, and how to conduct post-election audits; whether and how to set security standards for election equipment vendors; whether to have in-house security staff in local jurisdictions or rely on state or vendor IT support; which cybersecurity tools and procedures to use; whether and how to train election officials and poll workers on election security; how to secure election materials between elections and ensure a secure physical chain of custody on Election Day; and what cyber and physical security standards to set for election equipment. Second, states and localities can help combat disinformation or misinformation about elections or the integrity of the electoral process. They can, for example, use official websites and social media accounts to share accurate information about elections or counter false information; and help educate the public about the steps they take to safeguard the electoral process. States also can work through their professional associationsâusing initiatives such as a public education campaign launched by the National Association of Secretaries of State (NASS) in November 2019âto help direct voters to trustworthy sources of election information. These efforts might occur as part of or in parallel with responses to disinformation or misinformation by the federal government or private entities like social media companies. States might partner with social media companies to remove posts containing election disinformation, for example, or adopt disclosure requirements that supplement or override the companies' policies on digital political advertising. Table 4 below briefly summarizes selected policy issues and options that have shaped recent policy debates in Congress. In addition, the Appendix at the end of this report briefly summarizes legislation primarily devoted to campaign and election security that has advanced beyond introduction during the 116 th Congress. The table reflects recent policy debates, but is not intended to be exhaustive. Some observers might consider other issues not reflected here to be relevant for campaign and election security. Campaign and election security are developing fields that cross policy and disciplinary boundaries. This complexity is reflected in the various statutes, agencies, and congressional committees that share responsibility for policymaking and administrative matters relevant for security U.S. campaigns and elections. Questions such as those that follow reflect themes discussed throughout this report. These and other questions could help congressional readers decide whether they want to maintain the status quo, appropriate funds, or pursue oversight or legislation. Federal R ole. A key question for Congress is whether, where, and how it chooses to be involved in campaign and election security. Most broadly, this potentially includes how to define this rapidly developing policy area, and in so doing, considering which issues are most appropriately addressed at the federal level versus at the state or local levels. This report has emphasized the federal role because those topics are most relevant for Congress. As the report also explains, states, localities, and territories are responsible for making many of their own election security decisionsâjust as political campaigns, parties, and PACs are responsible for their own security. Therefore, there are important debates about what campaign and election security includes that the federal government can influence, but that are primarily addressed below the federal level, in the private sector, or both. Examples include, but are not limited to, how election security might affect voter access, and vice versa; whether states require voter identification at the polls and whether or to what extent alleged vote fraud exists; how much and on what jurisdictions choose to spend available funds; and whether states, localities, or political campaigns and parties have sufficient resources to secure their elections or organizations. Communication. Does Congress want to encourage or require additional information sharing about campaign and election security matters between the federal government and nonfederal elections agencies? Similarly, do state, territorial, and local elections officials feel that they have or need clear points of contact within federal agencies, and do they know which agencies to contact in various circumstances? If it determines that the status quo is inadequate, does Congress want to encourage or require different reporting protocols, agency outreach, etc.? Coordination. Various agencies have reported to Congress that they have improved coordination among themselves, particularly through working groups or task forces. Less clear, at least from publicly available information, is specifically how such coordination works and whether current coordinating mechanisms are sufficient or whether agencies need additional resources or mechanisms to improve coordination. If it determines that the status quo is inadequate, does Congress want to exercise oversight in this area, provide additional information-sharing authorities, funding, etc., or does it consider current coordination authorities and mechanisms sufficient? Sectors. Much of the federal government's attention to campaign and election security appears to emphasize outreach to election administrators in states, territories, and localities. With respect to the private sector (such as political campaigns and equipment manufacturers), is federal agency support sufficient? To what extent are information-sharing practices among federal agencies and the private sector (or voters) similar to or different from those that shape communication between federal agencies and state, territorial, or local governments? If it determines that the status quo is inadequate, does Congress want to encourage or require additional federal agency support for nongovernmental entities in campaign and election security, or reporting requirements for those entities to the federal government? Voters. Some federal public education campaigns, such as those to counter disinformation in elections, are aimed at individual voters. Overall, however, much of the federal role in campaign and election security emphasizes communication among government agencies or, in some cases, the private sector. If it determines that the status quo is inadequate, does Congress want to task federal agenciesâand if so, which onesâwith additional responsibility for educating voters about campaign and election security; to provide funding for nongovernmental organizations to do so, etc.? The scope of potential campaign and election security threats, and the federal government's role in responding to those threats, has changed substantially in less than five years. The foreign interference revealed during the 2016 cycleâand widely reported to be an ongoing threatâhas renewed congressional attention to campaign and election security and raised new questions. Whatever Congress determines about whether these or other questions are relevant for its consideration of campaign and election security policy, the issue is likely to remain prominent for the foreseeable future. ", "summary": "In the United States, state, territorial, and local governments are responsible for most aspects of selecting and securing election systems and equipment. Foreign interference during the 2016 election cycleâand widely reported to be an ongoing threatâhas renewed congressional attention to campaign and election security and raised new questions about the nature and extent of the federal government's role in this policy area. This report provides congressional readers with a resource for understanding campaign and election security policy. This includes discussion of the federal government's roles; state or territorial responsibilities for election administration and election security; an overview of potentially relevant federal statutes and agencies; and highlights of recent congressional policy debates. The report summarizes related legislation that has advanced beyond introduction during the 116 th Congress. It also poses questions for consideration as the House and Senate examine whether or how to pursue legislation, oversight, or appropriations. In the 116 th Congress, the FY2020 National Defense Authorization Act (NDAA; S. 1790 ; P.L. 116-92 ), enacted in December 2019, contains several provisions related to campaign and election security. Most provisions involve providing Congress or federal or state agencies with information about election interference. It also requires the Director of National Intelligence, in coordination with several other agencies, to develop a strategy for countering Russian cyberattacks against U.S. elections. In addition, the Consolidated Appropriations Act, 2020 ( P.L. 116-93 ; H.R. 1158 ), also enacted in December 2019, includes $425 million for payments to states, territories, and the District of Columbia to make general improvements to the administration of federal elections, including upgrades to election technology and security. As of this writing, 116 th Congress legislation that has advanced beyond introduction in at least one chamber includes H.R. 1 ; H.R. 753 ; H.R. 1158 ; H.R. 2500 ; H.R. 2722 ; H.R. 3351 ; H.R. 3494 ; H.R. 3501 ; H.R. 4617 ; H.R. 4782 ; H.R. 4990 ; S. 482 ; S. 1060 ; S. 1321 ; S. 1328 ; S. 1589 ; S. 1790 ; S. 1846 ; S. 2065 ; and S. 2524 . Other bills also could have implications for campaign and election security even though they do not specifically reference the topic (e.g., those addressing cybersecurity generally or voter access). Several congressional committees also have held legislative or oversight hearings on the topic. Federal statutesâsuch as the Help America Vote Act (HAVA); Federal Election Campaign Act (FECA); and the Voting Rights Act (VRA)âall contain provisions designed to make campaign finance, elections, or voting more secure. Several federal agencies are directly or indirectly involved in campaign and election security. These include, but are not limited to, the Department of Defense (DOD); Department of Homeland Security (DHS); Department of Justice (DOJ); Election Assistance Commission (EAC); and Federal Election Commission (FEC). Securing federal elections is a complex policy challenge that crosses disciplinary lines. Some of the factors shaping that complexity include divisions of authority between the federal and state (or territorial or local) governments; coordination among federal agencies, and communication with state agencies; funding; changing elections technology; and the different needs of different sectors, such as campaigns, administrators, and vendors. This report does not attempt to resolve ongoing policy debates about what campaign and election security should entail. The report cites other CRS products that contain additional discussion of some of the topics discussed herein. The report does not address constitutional or legal issues.", "document_type": "crs"}
{"report": "A majority of the population of the United States has private health insurance coverage (i.e., coverage not available through a public program, such as Medicare or Medicaid). In 2017, about 55% of the U.S. population had private group coverage (e.g., a health plan offered by an employer) and 13.5% had private individual coverage (e.g., a health plan offered through a health insurance exchange). In general, health plans sold in the private health insurance market must comply with state and federal health insurance requirements. The federal requirements relate to how coverage is offered and issued, the benefits it must cover, and how it is priced, among other issues. An example of a federal health insurance requirement is the prohibition of preexisting condition exclusions. Although federal health insurance requirements generally apply to health plans sold in the private health insurance market, not all private health coverage arrangements comply with such requirements. This includes exempted health coverage arrangements and nonco mpliant health coverage arrangements , as termed for purposes of this report. This report identifies and describes arrangements within these two categories. The report is intended to help congressional policymakers better understand the scope of these health coverage arrangements that are available to individuals in the United States private health insurance markets and to provide information about the limitations of the application of federal health insurance requirements. The private health insurance market has different segments. Understanding these different segments is relevant to the application of state and federal health insurance requirements. The individual health insurance market segment is where individuals and families buying insurance on their own (i.e., not through a plan sponsor) may purchase health plans. In the group health insurance market, a plan sponsor, typically an employer, offers coverage to a group (e.g., the employer's employees). The group market is divided into small- and large-group market segments. It is also categorized according to how the plan is insured. Group plans that are purchased by employers and other plan sponsors from state-licensed health insurance issuers and are offered to employees or other groups are referred to as fully insured plans. Employers or other plan sponsors that offer self - insur e d plans set aside funds to pay for health benefits directly, and they bear the risk of covering medical expenses generated by the individuals covered under the self-insured plan. States are the primary regulators of the business of health insurance, as codified by the 1945 McCarran-Ferguson Act, and each state requires health insurance issuers to be licensed to sell plans in the state. Each state has a unique set of requirements that apply to state-licensed issuers and the plans they offer; these requirements are broad in scope and address a variety of issues, and often the requirements apply differently to the various market segments. In general, state oversight of health plans applies only to plans offered by state-licensed issuers. Because self-insured plans are financed directly by a plan sponsor, as opposed to a state-licensed insurer, such plans generally are not subject to state law. The federal government also regulates state-licensed issuers and the plans they offer, as well as self-insured plans and their sponsors . Federal requirements can, but do not necessarily, apply uniformly to health plans offered in the aforementioned market segmentsâindividual, small-group, and large-group marketsâand to self-insured plans. For example, the requirement that plans cover preexisting health conditions applies uniformly; health plans offered in the individual, small-group, and large-group markets and self-insured plans must comply with the prohibition on excluding benefits based on health conditions for any individual. The requirement to cover a core package of 10 \"essential health benefits\" does not apply uniformly; it applies only to health plans offered in the individual and small-group markets. Federal health insurance requirements are codified in three statutesâTitle XXVII of the Public Health Service Act (PHSA), Part 7 of the Employee Retirement Income Security Act of 1974 (ERISA), and Chapter 100 of the Internal Revenue Code (IRC). In general, federal standards establish a minimum level of requirements ( federal floor ) and states may impose additional requirements on issuers and the health plans they offer, provided the state requirements neither conflict with federal law nor prevent the implementation of federal health insurance requirements. Enforcement of the federal health insurance requirements generally involves both the federal and the state governments. States are the primary enforcers of private health insurance requirements, but the federal government assumes this responsibility if it is determined that a state has failed to \"substantially enforce\" the federal provisions, including if a state indicates that it lacks authority to enforce or is otherwise not taking enforcement actions. Some health coverage arrangements that consumers may purchase to help them pay for health care services do not comply with some or all of the federal health insurance requirements codified in Title XXVII of the PHSA, Part 7 of ERISA, and Chapter 100 of the IRC. This report focuses on such arrangements ( Table 1 ). The health coverage arrangements listed in Table 1 can be divided into two categories: 1. Exempted Health Coverage A rrangements : Those that meet a federal definition of health insurance but that are exempt from compliance with some or all applicable federal health insurance requirements. 2. Noncompliant Health Coverage A rrangements : Those that the federal government has not explicitly exempted from compliance with federal health insurance requirements and that do not necessarily comply with those requirements. The arrangements listed in Table 1 are summarized in the remainder of this report. Each summary includes a brief description of the arrangement, its status with respect to complying with federal health insurance requirements, and the history of its status. The summaries also include information about whether and how the arrangements are subject to state regulatory authority. Where available, estimates of enrollment in an arrangement are provided. The arrangements discussed in this section have the following in common: they meet a federal definition of health insurance (i.e., they meet the federal definition of health insurance coverage or group health plan), but they are exempt from compliance with some or all applicable federal health insurance requirements. For most of the arrangements discussed in this section, the exemption is explicit in federal statute, regulations, or guidance (see Table 1 ). Both fully insured and self-insured group health plans covering fewer than two current employees are exempt from all federal health insurance requirements. This includes retiree-only plans , provided they cover fewer than two current employees. If retiree benefits are offered through the same plan offered to current employees (and there are two or more current employees enrolled in such plan), then the retiree benefits are not exempt from federal health insurance requirements. The exemption was established in the Health Insurance Portability and Accountability Act (HIPAA; P.L. 104-191 ). HIPAA set forth parallel exemptions from federal health insurance requirements for group plans covering fewer than two current employees in Title XXVII of the PHSA, Part 7 of ERISA, and Chapter 100 of the IRC. After the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 , as amended) amended, reorganized, and renumbered Title XXVII of the PHSA, the exemption that had been in the PHSA ceased to exist. However, in the preamble to an interim final rule implementing ACA provisions related to grandfathered plans (see \" Grandfathered Plans \" in this report), the Department of Health and Human Services (HHS) stated that it would not enforce HIPAA or ACA requirements with respect to group health plans covering fewer than two current employees, including retiree-only plans. HHS encouraged states not to enforce the requirements, either, and said the federal government would not cite states for failing to enforce in this situation. Given an Administration's authority to promulgate regulations and issue administrative guidance relating to federal health insurance standards, it is possible that an Administration may reconsider its position on enforcement, but no Administration has done so to date. States may impose their own requirements on group health plans covering fewer than two current employees (including retiree-only plans), provided the plans are fully insured. States do not have the authority to regulate self-insured plans. CRS did not find estimates of enrollment in group health plans covering fewer than two current employees. In general, health plans in their provision of excepted benefits are exempt from all federal health insurance requirements. A diverse collection of insurance benefits can be considered excepted benefits, including auto liability insurance, limited-scope dental and vision benefits, benefits for long-term care, specific disease coverage, and supplemental Medicare plans (i.e., Medigap plans). Per federal statute, there are four categories of excepted benefits. One category is exempt from complying with all federal health insurance requirements in all circumstances; the other three categories are exempt from complying with all of the requirements only when specified conditions are met. (See Table 2 for details.) The exemption for excepted benefits and the conditions for exemption were established under HIPAA. HIPAA set forth parallel exemptions and conditions in Title XXVII of the PHSA, Part 7 of ERISA, and Chapter 100 of the IRC. Enactment of the ACA modified the PHSA exemption in such a way that some federal requirements would apply to excepted benefits under the PHSA. However, given that the ERISA and IRC exemptions for excepted benefits remained unchanged, HHS stated it would not enforce HIPAA or ACA requirements on excepted benefits and encouraged states not to enforce the requirements, either. States may impose requirements on excepted benefits, provided the benefits are not self-insured. CRS did not find estimates of enrollment in the various types of excepted benefit plans. Short-term, limited-duration insurance (STLDI) is defined as health insurance coverage provided pursuant to a contract with a health insurance issuer that meets the following standards: the contract for the coverage must have a specified expiration date that is less than 12 months after the original effective date of the contract and cannot last longer than 36 months, taking into account renewals or extensions, and the contract and application materials must display a notice as specified in federal regulations indicating that the coverage does not have to comply with federal requirements. Additionally, the 36-month maximum duration is severable from the rest of the definition, meaning the definition would be operative even if the 36-month maximum duration were challenged in court and found invalid or unenforceable. The federal definition of STLDI has changed twice since it was established. STLDI was first defined in regulations issued in 1997. The term was redefined in regulations issued in 2016, and again in regulations issued in 2018. (See Table 3 for details.) Although the definition of STLDI has changed, the applicability of federal health insurance requirements to STLDI has remained the same. STLDI historically has not and currently does not have to comply with federal health insurance requirements. Although STLDI is health insurance coverage generally sold in the individual market, it is excluded from the federal definition of individual health insurance coverage. Per the preamble to the final rule on STLDI, this exclusion from the definition of individual health insurance coverage provides the basis of STLDI's exemption from federal health insurance requirements. State regulation of STLDI varies. Some states impose restrictions on STLDI that are more prohibitive than what is allowed under the federal definition. For example, 22 states (including the District of Columbia [DC]) impose expiration dates shorter than the 12 months allowed under federal law. States may opt to place additional restrictions on STLDI that are not addressed under federal law. For example, 34 states (including DC) require that individuals enrolled in STLDI have access to external appeals processes and 3 states restrict how issuers can vary rates for STLDI (e.g., Minnesota prohibits gender rating for STLDI policies). States also may ban the sale of STLDI in the state, as four states have done. The most recent change to the definition of STLDI has been in effect for less than a year, and enrollment data for the new policies are not yet available. For a discussion of projected estimates of enrollment in STLDI under the latest definition, see the final rule on STLDI. Student health insurance coverage is a type of individual health insurance coverage that may be provided only to students enrolled in an institution of higher education and their dependents. The coverage has to meet the following conditions: it cannot be available to anyone other than a student in an institution of higher education and a student's dependent(s), it cannot condition eligibility for the coverage on any health status-related factor of a student or a student's dependent(s), and it must meet requirements imposed under state law. As a type of individual health insurance coverage, fully insured student health insurance coverage would be required to comply with federal health insurance requirements that apply to individual coverage. However, regulations provide that it is exempt from complying with specified requirements that otherwise apply to individual health insurance coverage. (See Table 4 for details.) Student health insurance coverage was defined and its exemption status was established through the rulemaking process in response to ACA Section 1560(c), which states, \"Nothing in this title (or an amendment made by this title) shall be construed to prohibit an institution of higher education (as such term is defined for purposes of the Higher Education Act of 1965) from offering a student health insurance plan, to the extent that such requirement is otherwise permitted under applicable Federal, State, or local law.\" In the preamble to the proposed rule on student health insurance coverage, HHS noted that it proposed to exempt student health insurance coverage from guaranteed issue and renewal, minimum actuarial value requirements, and the single risk pool requirement because it believed that having to comply with the requirements \"would effectively prohibit institutions of higher education from being able to offer these [student health insurance coverage] plans\" and doing so would not be in keeping with ACA Section 1560(c). These regulatory exemptions went into effect for student health insurance coverage beginning on or after July 1, 2012. The exemption from rate review requirements was established later and went into effect for student health insurance plans beginning on or after July 1, 2018. HHS acknowledges that it does not have the authority to regulate self-insured student health plans, which means the federal health insurance requirements and the exemptions listed in Table 4 apply only to fully insured student plans. States, however, can regulate fully insured and self-insured student health plans. According to data from the National Association of Insurance Commissioners, in 2017, there were about 1.1 million student health insurance policies written and nearly 1.3 million covered lives. A nonfederal governmental plan is a governmental group health plan that is not sponsored by the federal government. Examples of entities that may sponsor nonfederal governmental plans are states, counties, school districts, and municipalities. Like private employers, sponsors of nonfederal governmental plans can choose to offer self-insured or fully insured plans. If a sponsor of a nonfederal governmental plan offers a self-insured plan, the sponsor may elect to exempt the plan from the specified federal requirements listed in Table 5 . The sponsor may choose to exempt the plan from some or all of the listed requirements. For example, a sponsor may elect to exempt its plan only from complying with the mental health parity requirement. The exemption for self-insured, nonfederal governmental plans was established in the PHSA under HIPAA as an exemption from seven federal requirements. Because of how the ACA amended and reorganized the PHSA, the exemption was modified and, as of September 2010, self-insured, nonfederal governmental plans may opt out of only the four requirements listed in Table 5 . Because these plans are self-insured group health plans, states do not have the authority to regulate these plans. According to an analysis of data published by the Center for Consumer Information & Insurance Oversight, as of June 21, 2019, at least 174 nonfederal governmental entities across 35 states have elected to exempt at least one self-insured plan they offer from one or more of the four requirements. Nearly all of the 174 entities offer at least one plan that is exempt from the mental health parity requirement; significantly fewer entities offer plans that are exempt from each of the other three requirements. About 11% of the 174 entities offer at least one plan that is exempt from all four requirements. CRS did not find estimates of enrollment in self-insured, nonfederal governmental plans. The ACA provided that group health plans and health insurance coverage in which at least one individual was enrolled as of enactment of the ACA (March 23, 2010) could be grandfathered . For as long as a plan maintains its grandfathered status, the plan is exempt from specified federal health insurance requirements established under the ACA. Since grandfathered plans existed as of March 23, 2010, they must comply with applicable federal health insurance requirements that were established prior to enactment of the ACA, as long as the prior requirements do not conflict with the ACA's grandfathered rules. For example, both grandfathered and non-grandfathered plans offered in the individual market must comply with federal health insurance requirements that applied to the individual market prior to enactment of the ACA. However, a grandfathered plan is required to comply with only some ACA requirements that apply to the individual market, whereas a non-grandfathered plan must comply with all such requirements. Table A-1 in the Appendix identifies which federal health insurance requirements apply to grandfathered plans. A plan can lose its grandfathered status. To maintain grandfathered status, a plan must continue to meet specified conditions and avoid making specified changes regarding employer contributions (where applicable), access to coverage, benefits, and cost sharing (e.g., changes in coinsurance requirements). A health plan offered in any market segmentâindividual, small group, large group, or self-insuredâcould be grandfathered. There is no time limitation on grandfathered status; as long as a plan avoids making the specified changes, it can remain a grandfathered plan. Once a plan has lost its grandfathered status, it cannot regain that status. Grandfathered plans generally are not available to new enrollees. Only individuals who have been continually covered and any new dependents can be covered under grandfathered plans in the individual market, and only individuals who have been continually covered, new dependents, and new employees can be covered under self-insured grandfathered plans and grandfathered plans offered in the group market. As of the date of this report, no repository for enrollment data for grandfathered plans was found, but the federal government has commented on enrollment. In October 2018, the Departments of HHS, Labor, and the Treasury commented that \"only a small number of individuals are currently enrolled in grandfathered individual health insurance coverage\" and \"the number of individuals with grandfathered individual health insurance coverage has declined each year since ... [the ACA] was enacted, and the already small number of individuals who have retained grandfathered coverage will continue to decline each year.\" In February 2019, the Departments issued a request for information on grandfathered group health plans and grandfathered group health insurance coverage. In the request, they noted the following: \"It is the Departments' understanding that the number of group health plans and group health insurance policies that are considered to be grandfathered has declined each year since the enactment of ... [the ACA], but many employers continue to maintain group health plans and coverage that have retained grandfathered status.\" Data from the Kaiser Family Foundation's annual surveys on employer-sponsored health benefits underscore the decline among grandfathered group plans. According to the surveys, the percentage of employers that offer at least one grandfathered plan declined from 72% in 2011 to 22% in 2019. The percentage of covered workers covered under a grandfathered plan declined from 56% in 2011 to 13% in 2019. States may regulate grandfathered plans in the same way they regulate non-grandfathered plansâthey may impose requirements on issuers of grandfathered plans and the plans themselves, provided the state requirements neither conflict with federal law nor prevent the implementation of federal health insurance requirements. States do not have the authority to regulate self-insured grandfathered plans. The ACA included many new federal requirements that applied to health insurance coverage and the entities that offer such coverage. Some of the requirements were effective shortly after the ACA was enacted, but most became effective for plan years beginning on or after January 1, 2014. Many of the 2014 requirements applied to plans offered in the individual and small-group markets. In the fall of 2013, issuers offering non-grandfathered individual and small-group plans began notifying their enrollees that their coverage would soon be canceled because the plans did not comply with the 2014 ACA requirements. If the individuals and employers enrolled wanted to continue to be covered in the individual or small-group market, they would have to find plans (offered by their current issuer or a different issuer) that complied with the 2014 ACA requirements. In response to the announced plan terminations, CMS issued guidance in November 2013 that established what are often referred to as transitional plans (or grandmothered plans). In the guidance, CMS stated it would not find individual and small-group market plans out of compliance with specified 2014 ACA requirements if the plans did not satisfy such requirements, provided the plans were renewed for plan years starting between January 1, 2014, and October 1, 2014. Pursuant to the guidance, state insurance commissioners could choose whether to enforce compliance with the specified 2014 ACA requirements in their individual and small-group markets. If state insurance commissioners chose not to enforce compliance in one or both of the markets, then issuers selling plans in the market(s) could choose to (but would not be required to) renew coverage for enrollees who otherwise would receive cancellation notices. Table A-1 in the Appendix identifies the ACA requirements with which transitional plans do and do not have to comply. Transitional plans must comply with federal health insurance requirements that went into effect prior to enactment of the ACA and all ACA requirements that went into effect prior to 2014. Initially, the transitional plan guidance applied to plans that were renewed for plan years starting between January 1, 2014, and October 1, 2014. The transitional plan guidance has been extended multiple times (most recently on March 25, 2019); currently, states may allow issuers that have continually renewed transitional plans since 2014 to continue to cover individuals under transitional plans through 2020. In states that allow transitional plans, issuers can choose to continue their transitional plans or not. Discontinued transitional plans cannot be revived. Transitional plans generally are not available to new enrollees. Only individuals who have been continually covered and any new dependents can be covered under transitional plans in the individual market, and only individuals who have been continually covered, new dependents, and new employees can be covered under transitional plans in the small-group market. Most states opted to allow transitional plans in both their individual and small-group markets when the policy was first established. Some states have changed their policies since then. In 2019, transitional plans are available in both the individual and small-group markets in 32 states; most of these states have indicated they will allow transitional plans to continue in their markets through 2020 under the recent federal extension. In four states, transitional plans are allowed in both markets, but issuers have stopped offering transitional plans in each state's individual market. Fifteen states (including DC) either never allowed or no longer allow transitional plans in the state. As of the date of this report, no repository of enrollment data for transitional plans could be found. Given that transitional plans, for the most part, may only be renewed by those currently involved and may not be sold to new consumers, enrollment in transitional plans likely has declined since the plans were established. The two health coverage arrangements discussed in this section have the following in common: the federal government has not explicitly exempted them from compliance with federal health insurance requirements, and they do not necessarily comply with those requirements. The arrangements summarized in this section are just two examples that share the aforementioned characteristics. There may be other health coverage arrangements that share the same characteristics, but it is difficult to make a comprehensive list of such arrangements, given that one of their defining characteristics is that the federal government does not appear to have discussed their status with respect to the application of the federal health insurance requirements. A health care sharing ministry (HCSM) is a faith-based organization that shares resources for medical needs among its members. The idea of pooling financial resources for medical needs among a religious community has a long history in the United States. The idea originated with the Amish and Mennonites over a century ago, and other religious groups began offering HCSMs in the 1990s. In general, members of an HCSM are expected to follow a set of religious or ethical beliefs and regularly contribute a payment (e.g., monthly) to cover the medical expenses of other members. The contributions are distributed, either through the HCSM or via a member-to-member match, to members who need funds for health care costs. Members are often responsible for a portion of their health care costs prior to receiving funds from the HCSM, and most HCSMs exclude coverage of specified illnesses, care, or treatments. HCSMs maintain that they are not providing insurance and do not guarantee payment for members' health care costs. However, the federal government does not appear to have defined HCSMs for regulatory or exemption purposes. HCSMs do not necessarily currently comply, and have not historically complied, with federal health insurance requirements. States may choose whether and how to regulate HCSMs operating in their state. As of August 2018, 30 states had opted to explicitly exempt HCSMs from state insurance law (i.e., the HCSM does not have to comply with the state's body of insurance laws), provided the HCSM meets specified requirements. State HCSM requirements vary; examples of requirements include providing to consumers written disclaimers stating the HCSM is not an insurance company and having an annual audit. In the remaining 21 states (including DC), HCSMs have not been explicitly exempted from state insurance law; however, the lack of an explicit exemption does not necessarily mean that such states regulate HCSMs. Regardless of whether a state has exempted an HCSM from its body of insurance laws, a state's role in regulating HCSMs is complex and varied. In states that exempt HCSMs from their insurance laws, state regulators are responsible for ensuring that HCSMs meet the requirements necessary to maintain their exemption and for taking action if they do not. In states that do not exempt HCSMs from their insurance laws, state regulators \"can investigate and, if sufficient evidence exists, regulate these plans as unauthorized insurers.\" In all states, regulators may have roles to play in \"investigating fraud, referring cases to the Attorney General's office, and assisting consumers who may have been harmed [by an HCSM].\" The Alliance of Health Care Sharing Ministries reports that there are 104 HCSMs in 29 states, and 7 of the 104 are open to new members. As of the date of this report, the alliance estimates enrollment in HCSMs at just under 970,000. The American Farm Bureau Federation is a national organization established in 1919 to advocate for the financial and political interests of farmers, ranchers, and others associated with agriculture. There are local farm bureau offices in all 50 states and in Puerto Rico (but not in DC). Membership in a local farm bureau is open to anyone who pays the membership fee, but typically membership is tiered, with members associated with agriculture having a status different from other members (e.g., agriculture-associated members may have voting rights in the organization, whereas other members may not). Each state farm bureau provides member benefits. The benefits include discounts on a variety of products and services, such as hotel stays, farm equipment, and membership in air ambulance networks. Additionally, many state farm bureaus assist their members with obtaining insurance, including health insurance. The assistance with health insurance takes different forms. Many state farm bureaus have agents available to assist their members with finding and enrolling in a health plan; some state farm bureaus sponsor coverage that is available to their members; and at least one state farm bureau is divided in two parts, with one part being an insurance company that serves the farm bureau's members. As of the date of this report, three statesâIowa, Kansas, and Tennesseeâhave enacted laws that allow the farm bureaus in each state to offer a different type of health coverage arrangement. Each state allows the state's farm bureau to sponsor health benefits coverage that is not defined by the state as insurance and is not subject to the state's insurance laws, provided the coverage and the farm bureau comply with specified requirements. (See Table 6 for details.) Iowa and Kansas passed their laws recentlyâin 2018 and 2019, respectivelyâand Tennessee passed its law in 1993. The farm bureaus in Iowa and Tennessee currently offer such coverage; the Kansas Farm Bureau's coverage became available for purchase beginning October 1, 2019, with coverage starting as early as January 1, 2020. As explained above, the arrangements sponsored by farm bureaus in Iowa, Kansas, and Tennessee are not considered insurance in their respective states and do not have to comply with state requirements that apply to insurance. Additionally, farm bureau coverage in these three states does not necessarily comply with any federal health insurance requirements. However, the federal government does not appear to have defined such coverage for regulatory or exemption purposes. In 2017, about 23,000 individuals had Tennessee Farm Bureau coverage. Estimates for the Iowa Farm Bureau were not found. Kansas Farm Bureau estimates that 11,000-42,000 residents of Kansas will be covered by its health benefits coverage. Table A-1 shows the applicability of selected federal health insurance requirements to grandfathered and transitional plans. Both types of plans are described in detail in this report; as a reminder, any type of plan could be grandfathered, but only fully insured small-group plans and individual-market plans could become transitional plans. The check marks in the table indicate that the grandfathered or transitional plan must comply with the requirement. The term N.A. indicates that the requirement does not apply to the specified market segment, regardless of whether the plan is a grandfathered or transitional plan. The use of Exempt in the table indicates that the grandfathered or transitional plan is exempt from complying with the requirement. For example, the ACA's rate review requirement applies only to fully insured small-group plans and individual market plans. Grandfathered plans do not have to comply with the requirement, which is why the table indicates that grandfathered fully insured small-group plans and grandfathered individual plans are \"Exempt\" from the requirement. Transitional plans do have to comply with the requirement, which is why the table has check marks for these plans. The rate review requirement does not apply to fully insured large-group plans or self-insured plans; as such, the table indicates that the requirement is not applicable (N.A.) to grandfathered versions of these plans.", "summary": "Federal health insurance requirements generally apply to health plans sold in the private health insurance market in the United States (i.e., individual coverage, small- and large-group coverage, and self-insured plans). However, not all private health coverage arrangements comply with these requirements. This includes exempted health coverage arrangements and noncompliant health coverage arrangements , as termed for purposes of this report. This report identifies and describes arrangements in these two categories. It is intended to help congressional policymakers better understand the scope of such arrangements available to individuals in the United States and to provide information about the limits of the application of federal health insurance requirements. The arrangements described in this report can be divided into two categories: Exempted Health Coverage Arrangements : Those that meet a federal definition of health insurance but are exempt from compliance with some or all applicable federal health insurance requirements. Such arrangements include the following: G roup health plans covering fewer than two current employees , including retiree-only plans , are exempt from all federal health insurance requirements. Health plans in their provision of excepted benefits (e.g., auto liability insurance, limited-scope dental and vision benefits, and specific disease coverage) are exempt from all federal health insurance requirements. S hort-term, limited-duration insurance (i.e., coverage generally sold in the individual market that must have a specified expiration date that is less than 12 months after the original effective date of the contract and that cannot be renewed or extended for longer than 36 months) is exempt from complying with all federal health insurance requirements. S tudent health insurance coverage (i.e., individual health insurance coverage that meets specified conditions and that may be provided only to students enrolled in an institution of higher education and their dependents) is exempt from complying with some federal health insurance requirements if such coverage is fully insured and is exempt from all federal health insurance requirements if the student health plan is self-insured. S elf-insured, nonfederal governmental plans (e.g., group health plans sponsored by states, counties, school districts, and municipalities) may elect to exempt the plan from some federal requirements. G randfathered plans (i.e., group health plans or health insurance coverage in which at least one individual was enrolled as of enactment of the Patient Protection and Affordable Care Act [ACA; P.L. 111-148 , as amended] and which have continued to meet specified conditions) are exempt from some federal requirements. T ransitional plans (i.e., individual and small-group market plans that meet certain requirements and are in states that have continuously opted to exempt them, per federal guidance) are exempt from some federal requirements. Noncompliant Health Coverage Arrangements : Those that the federal government has not explicitly exempted from compliance with federal health insurance requirements and that do not necessarily comply with those requirements. Such arrangements include the following: H ealth care sharing ministries (i.e., faith-based organizations that share resources for medical needs among their members) do not currently and have not historically complied with federal health insurance requirements. Certain types of f arm bureau coverage (i.e., health coverage offered by a farm bureau in the three states with a law that specifies that such coverage is not considered insurance and is not subject to the state's insurance laws) do not comply with federal health insurance requirements. The report includes a brief description of each arrangement, its status with respect to complying with federal health insurance requirements, and the history of its status. The report also includes information about whether and how the arrangements are subject to state regulatory authority. Where available, estimates of enrollment in an arrangement are provided.", "document_type": "crs"}
{"report": "Sanctions have been a significant component of U.S. Iran policy since Iran's 1979 Islamic Revolution that toppled the Shah of Iran, a U.S. ally. In the 1980s and 1990s, U.S. sanctions were intended to try to compel Iran to cease supporting acts of terrorism and to limit Iran's strategic power in the Middle East more generally. After the mid-2000s, U.S. and international sanctions focused largely on ensuring that Iran's nuclear program is for purely civilian uses. During 2010-2015, the international community cooperated closely with a U.S.-led and U.N.-authorized sanctions regime in pursuit of the goal of persuading Iran to agree to limits to its nuclear program. Still, sanctions against Iran have multiple objectives and address multiple perceived threats from Iran simultaneously. This report analyzes U.S. and international sanctions against Iran. CRS has no way to independently corroborate whether any individual or other entity might be in violation of U.S. or international sanctions against Iran. The report tracks \"implementation\" of the various U.S. laws and executive orders as designations and imposition of sanctions. Some sanctions require the blocking of U.S.-based property of sanctioned entities. CRS has not obtained information from the executive branch indicating that such property has been blocked, and it is possible that sanctioned entities do not have any U.S. assets that could be blocked. The sections below are grouped by function, in the chronological order in which these themes have emerged. U.S. sanctions on Iran were first imposed during the U.S.-Iran hostage crisis of 1979-1981, in the form of executive orders issued by President Jimmy Carter blocking nearly all Iranian assets held in the United States. These included E.O. 12170 of November 14, 1979, blocking all Iranian government property in the United States, and E.O 12205 (April 7, 1980) and E.O. 12211 (April 17, 1980) banning virtually all U.S. trade with Iran. The latter two Orders were issued just prior to the failed April 24-25, 1980, U.S. effort to rescue the U.S. Embassy hostages held by Iran. President Jimmy Carter also broke diplomatic relations with Iran on April 7, 1980. The trade-related Orders (12205 and 12211) were revoked by Executive Order 12282 of January 19, 1981, following the \"Algiers Accords\" that resolved the U.S.-Iran hostage crisis. Iranian assets still frozen are analyzed below. The Accords established a \"U.S.-Iran Claims Tribunal\" at the Hague that continues to arbitrate cases resulting from the 1980 break in relations and freezing of some of Iran's assets. All of the 4,700 private U.S. claims against Iran were resolved in the first 20 years of the Tribunal, resulting in $2.5 billion in awards to U.S. nationals and firms. The major government-to-government cases involved Iranian claims for compensation for hundreds of foreign military sales (FMS) cases that were halted in concert with the rift in U.S.-Iran relations when the Shah's government fell in 1979. In 1991, the George H. W. Bush Administration paid $278 million from the Treasury Department Judgment Fund to settle FMS cases involving weapons Iran had received but which were in the United States undergoing repair and impounded when the Shah fell. On January 17, 2016, (the day after the JCPOA took effect), the United States announced it had settled with Iran for FMS cases involving weaponry the Shah was paying for but that was not completed and delivered to Iran when the Shah fell. The Shah's government had deposited its payments into a DOD-managed \"Iran FMS Trust Fund,\" and, after 1990, the Fund had a balance of about $400 million. In 1990, $200 million was paid from the Fund to Iran to settle some FMS cases. Under the 2016 settlement, the United States sent Iran the $400 million balance in the Fund, plus $1.3 billion in accrued interest, paid from the Department of the Treasury's \"Judgment Fund.\" In order not to violate U.S. regulations barring direct U.S. dollar transfers to Iranian banks, the funds were remitted to Iran in late January and early February 2016 in foreign hard currency from the central banks of the Netherlands and of Switzerland. Some remaining claims involving the FMS program with Iran remain under arbitration at the Tribunal. Iranian assets in the United States are blocked under several provisions, including Executive Order 13599 of February 2010. The United States did not unblock any of these assets as a consequence of the JCPOA. About $1.9 billion in blocked Iranian assets are bonds belonging to Iran's Central Bank, frozen in a Citibank account in New York belonging to Clearstream, a Luxembourg-based securities firm, in 2008. The funds were blocked on the grounds that Clearstream had improperly allowed those funds to access the U.S. financial system. Another $1.67 billion in principal and interest payments on that account were moved to Luxembourg and are not blocked. About $50 million of Iran's assets frozen in the United States consists of Iranian diplomatic property and accounts, including the former Iranian embassy in Washington, DC, and 10 other properties in several states, and related accounts. Among other frozen Iranian assets are real estate holdings of the Assa Company, a UK-chartered entity, which allegedly was maintaining the interests of Iran's Bank Melli in a 36-story office building in New York City and several other properties around the United States (in Texas, California, Virginia, Maryland, and other parts of New York City). An Iranian foundation, the Alavi Foundation, allegedly is an investor in the properties. The U.S. Attorney for the Southern District of New York blocked these properties in 2009. The Department of the Treasury report avoids valuing real estate holdings, but public sources assess these blocked real estate assets at nearly $1 billion. In June 2017, litigation won the U.S. government control over the New York City office building. There are a total of about $46 billion in court awards that have been made to victims of Iranian terrorism. These include the families of the 241 U.S. soldiers killed in the October 23, 1983, bombing of the U.S. Marine barracks in Beirut. U.S. funds equivalent to the $400 million balance in the DOD account (see above) have been used to pay a small portion of these judgments. The Algiers Accords apparently precluded compensation for the 52 U.S. diplomats held hostage by Iran from November 1979 until January 1981. The FY2016 Consolidated Appropriation (Section 404 of P.L. 114-113 ) set up a mechanism for paying damages to the U.S. embassy hostages and other victims of state-sponsored terrorism using settlement payments paid by various banks for concealing Iran-related transactions, and proceeds from other Iranian frozen assets. In April 2016, the U.S. Supreme Court determined the Central Bank assets, discussed above, could be used to pay the terrorism judgments, and the proceeds from the sale of the frozen real estate assets mentioned above will likely be distributed to victims of Iranian terrorism as well. On the other hand, in March 2018, the U.S. Supreme Court ruled that U.S. victims of an Iran-sponsored terrorist attack could not seize a collection of Persian antiquities on loan to a University of Chicago museum to satisfy a court judgment against Iran. Other past financial disputes include the mistaken U.S. shoot-down on July 3, 1988, of an Iranian Airbus passenger jet (Iran Air flight 655), for which the United States paid Iran $61.8 million in compensation ($300,000 per wage-earning victim, $150,000 per non-wage earner) for the 248 Iranians killed. The United States did not compensate Iran for the airplane itself, although officials involved in the negotiations told CRS in November 2012 that the United States later arranged to provide a substitute used aircraft to Iran. For more detail on how Iranian and other assets are used to compensate victims of Iranian terrorism, see CRS Report RL31258, Suits Against Terrorist States by Victims of Terrorism , by Jennifer K. Elsea and CRS Legal Sidebar LSB10104, It Belongs in a Museum: Sovereign Immunity Shields Iranian Antiquities Even When It Does Not Protect Iran , by Stephen P. Mulligan. Executive Order 13599, issued February 5, 2012, directs the blocking of U.S.-based assets of entities determined to be \"owned or controlled by the Iranian government.\" The order was issued to implement Section 1245 of the FY2012 National Defense Authorization Act ( P.L. 112-81 ) that imposed secondary U.S. sanctions on Iran's Central Bank. The Order requires that any U.S.-based assets of the Central Bank of Iran, or of any Iranian government-controlled entity, be blocked by U.S. banks. The order goes beyond the regulations issued pursuant to the 1995 imposition of the U.S. trade ban with Iran, in which U.S. banks are required to refuse such transactions but to return funds to Iran. Even before the issuance of the Order, and in order to implement the ban on U.S. trade with Iran (see below) successive Administrations had designated many entities as \"owned or controlled by the Government of Iran.\" Numerous designations have been made under Executive Order 13599, including the June 4, 2013, naming of 38 entities (mostly oil, petrochemical, and investment companies) that are components of an Iranian entity called the \"Execution of Imam Khomeini's Order\" (EIKO). EIKO was characterized by the Department of the Treasury as an Iranian leadership entity that controls \"massive off-the-books investments.\" Implementation of the U.S. JCPOA Withdrawa l. To implement the JCPOA, many 13599-designated entities specified in the JCPOA (Attachment 3) were \"delisted\" from U.S. secondary sanctions (no longer considered \"Specially Designated Nationals,\" SDNs), and referred to as \"designees blocked solely pursuant to E.O 13599.\" That characterization permitted foreign entities to conduct transactions with the listed entities without U.S. sanctions penalty but continued to bar U.S. persons (or foreign entities owned or controlled by a U.S. person) from conducting transactions with these entities. Treasury Department announced on May 8, 2018, in concert with the U.S. withdrawal from the JCPOA, that almost all of the 13599-designated entities that were delisted as SDNs will be relisted as SDNs on November 5, 2018. That day, the Treasury Department updated the list of SDNs to reflect the redesignations. Civilian Nuclear Entity Exception . One notable exception to the relisting policy implemented in 2018 is the Atomic Energy Organization of Iran (AEOI). The entity, along with 23 of its subsidiaries, were redesignated under E.O. 13599 but not as entities subject to secondary sanctions under E.O. 13382. This U.S. listing decision was made in order to facilitate continued IAEA and EU and other country engagement with Iran's civilian nuclear program under the JCPOA. The May 2019 ending of some waivers for nuclear technical assistance to Iran modifies this stance somewhat (see subhead on waivers and exceptions under the JCPOA, below). Most of the hostage crisis-related sanctions were lifted upon resolution of the crisis in 1981. The United States began imposing sanctions against Iran again in the mid-1980s for its support for regional groups committing acts of terrorism. The Secretary of State designated Iran a \"state sponsor of terrorism\" on January 23, 1984, following the October 23, 1983, bombing of the U.S. Marine barracks in Lebanon by elements that established Lebanese Hezbollah. This designation triggers substantial sanctions on any nation so designated. None of the laws or Executive Orders in this section were waived or revoked to implement the JCPOA. No entities discussed in this section were \"delisted\" from sanctions under t he JCPOA. The U.S. naming of Iran as a \"state sponsor of terrorism\"—commonly referred to as Iran's inclusion on the U.S. \"terrorism list\"—triggers several sanctions. The designation is made under the authority of Section 6(j) of the Export Administration Act of 1979 ( P.L. 96-72 , as amended), sanctioning countries determined to have provided repeated support for acts of international terrorism. The sanctions triggered by Iran's state sponsor of terrorism designation are as follows: Restrictions on sales of U.S. dual use items . The restriction—a presumption of denial of any license applications to sell dual use items to Iran—is required by the Export Administration Act, as continued by executive orders under the authority of the International Emergency Economic Powers Act, IEEPA. The restrictions are enforced through Export Administration Regulations (EARs) administered by the Bureau of Industry and Security (BIS) of the Commerce Department. Ban on direct U.S. financial assistance and arms sales to Iran . Section 620A of the Foreign Assistance Act, FAA (P.L. 87-95) and Section 40 of the Arms Export Control Act ( P.L. 95-92 , as amended), respectively, bar any U.S. foreign assistance to terrorism list countries. Included in the definition of foreign assistance are U.S. government loans, credits, credit insurance, and Ex-Im Bank loan guarantees. Successive foreign aid appropriations laws since the late 1980s have banned direct assistance to Iran, and with no waiver provisions. The FY2012 foreign operations appropriation (Section 7041(c)(2) of P.L. 112-74) banned the Ex-Im Bank from using funds appropriated in that Act to finance any entity sanctioned under the Iran Sanctions Act. The foreign aid provisions of the FY2019 Consolidated Appropriation (Section 7041) made that provision effective for FY2019. Requirement to oppose multilateral lending . U.S. officials are required to vote against multilateral lending to any terrorism list country by Section 1621 of the International Financial Institutions Act ( P.L. 95-118 , as amended [added by Section 327 of the Anti-Terrorism and Effective Death Penalty Act of 1996 ( P.L. 104-132 )]). Waiver authority is provided. Withholding of U.S. foreign assistance to countries that assist or sell arms to t errorism l ist c ountries . Under Sections 620G and 620H of the Foreign Assistance Act, as added by the Anti-Terrorism and Effective Death Penalty Act (Sections 325 and 326 of P.L. 104-132 ), the President is required to withhold foreign aid from any country that aids or sells arms to a terrorism list country. Waiver authority is provided. Section 321 of that act makes it a crime for a U.S. person to conduct financial transactions with terrorism list governments. Withholding of U.S. Aid to Organizations T hat Assist Iran . Section 307 of the FAA (added in 1985) names Iran as unable to benefit from U.S. contributions to international organizations, and require proportionate cuts if these institutions work in Iran. For example, if an international organization spends 3% of its budget for programs in Iran, then the United States is required to withhold 3% of its contribution to that international organization. No waiver is provided for. The terrorism list designation, and other U.S. sanctions laws barring assistance to Iran, do not bar U.S. disaster aid. The United States donated $125,000, through relief agencies, to help victims of two earthquakes in Iran (February and May 1997); $350,000 worth of aid to the victims of a June 22, 2002, earthquake; and $5.7 million in assistance for victims of the December 2003 earthquake in Bam, Iran, which killed 40,000. The U.S. military flew 68,000 kilograms of supplies to Bam. Section 330 of the Anti-Terrorism and Effective Death Penalty Act ( P.L. 104-132 ) added a Section 40A to the Arms Export Control Act that prohibits the sale or licensing of U.S. defense articles and services to any country designated (by each May 15) as \"not cooperating fully with U.S. anti-terrorism efforts.\" The President can waive the provision upon determination that a defense sale to a designated country is \"important to the national interests\" of the United States. Every May since the enactment of this law, Iran has been designated as a country that is \"not fully cooperating\" with U.S. antiterrorism efforts. However, the effect of the designation is largely mooted by the many other authorities that prohibit U.S. defense sales to Iran. Executive Order 13324 (September 23, 2001) mandates the freezing of the U.S.-based assets of and a ban on U.S. transactions with entities determined by the Administration to be supporting international terrorism. This order was issued two weeks after the September 11, 2001, attacks on the United States, under the authority of the IEEPA, the National Emergencies Act, the U.N. Participation Act of 1945, and Section 301 of the U.S. Code, initially targeting Al Qaeda. E.O. 13224 is not specific to Iran and does not explicitly target Iranian arms exports to movements, governments, or groups in the Middle East region. However, successive Administrations have used the Order—and the orders discussed immediately below—to sanction such Iranian activity by designating persons or entities that are involved in the delivery or receipt of such weapons shipments. Some persons and entities that have been sanctioned for such activity have been cited for supporting groups such as the Afghan Taliban organization and the Houthi rebels in Yemen, which are not named as terrorist groups by the United States. Section 105 of the Countering America's Adversaries through Sanctions Act (CAATSA, P.L. 115-44 , signed on August 2, 2017), mandates the imposition of E.O. 13324 penalties on the Islamic Revolutionary Guard Corps (IRGC) and its officials, agents, and affiliates by October 30, 2017 (90 days after enactment). The IRGC was named as a terrorism-supporting entity under E.O 13224 within that deadline. The Treasury Department made the designation of the IRGC as a terrorism-supporting entity under that E.O. on October 13, 2017. No entities designated under E.O. 13224 were delisted to implement the JCPOA. Additional Iran-related entities have been designated under the Order since JCPOA implementation, as shown in the tables at the end of this report. Sanctions similar to those of E.O. 13224 are imposed on Iranian and Iran-linked entities through the State Department authority under Section 219 of the Immigration and Nationality Act (8.U.S.C. 1189) to designate an entity as a Foreign Terrorist Organization (FTO). In addition to the sanctions of E.O. 13224, any U.S. person (or person under U.S. jurisdiction) who \"knowingly provides material support or resources to an FTO, or attempts or conspires to do so\" is subject to fine or up to 20 years in prison. A bank that commits such a violation is subject to fines. Implementation: The following organizations have been designated as FTOs for acts of terrorism on behalf of Iran or are organizations assessed as funded and supported by Iran: Islamic Revolutionary Guard Corps (IRGC). Designated April 8, 2019. See CRS Insight IN11093, Iran's Revolutionary Guard Named a Terrorist Organization , by Kenneth Katzman. On April 22, 2019, the State Department issued guidelines for implementing the IRGC FTO designation, indicating that it would not penalize routine diplomatic or humanitarian-related dealings with the IRGC by U.S. partner countries or nongovernmental entities. Lebanese HezbollahKata'ib Hezbollah . Iran-backed Iraqi Shi'a militia. Hamas . Sunni, Islamist Palestinian organization that essentially controls the Gaza Strip. Palestine Islamic Jihad . Small Sunni Islamist Palestinian militant group Al Aqsa Martyr's Brigade . Secular Palestinian militant group. Popular Front for the Liberation of Palestine-General Command (PFLP-GC). Leftwing secular Palestinian group based mainly in Syria. Al Ashtar Brigades . Bahrain militant opposition group Some sanctions have been imposed to try to curtail Iran's destabilizing influence in the region. Issued on July 7, 2007, the order blocks U.S.-based property of persons who are determined by the Administration to \"have committed, or pose a significant risk of committing\" acts of violence that threaten the peace and stability of Iraq, or undermine efforts to promote economic reconstruction or political reform in Iraq. The Order extends to persons designated as materially assisting such designees. The Order was clearly directed at Iran for its provision of arms or funds to Shiite militias there. Persons sanctioned under the Order include IRGC-Qods Force officers, Iraqi Shiite militia-linked figures, and other entities. Some of these sanctioned entities worked to defeat the Islamic State in Iraq and are in prominent roles in Iraq's parliament and political structure. Issued on April 29, 2011, the order blocks the U.S.-based property of persons determined to be responsible for human rights abuses and repression of the Syrian people. The IRGC-Qods Force (IRGC-QF), IRGC-QF commanders, and others are sanctioned under this order. The latter Act was signed by President Trump on October 23, 2018the 25 th anniversary of the Marine barracks bombing in Beirut. The original law, modeled on the 2010 Comprehensive Iran Sanctions, Accountability, and Divestment Act (\"CISADA,\" see below), excludes from the U.S. financial system any bank that conducts transactions with Hezbollah or its affiliates or partners. The more recent law expands the authority of the original law by authorizing the blocking of U.S.-based property of and U.S. transactions with any \"agency or instrumentality of a foreign state\" that conducts joint operations with or provides financing or arms to Lebanese Hezbollah. These latter provisions clearly refer to Iran, but are largely redundant with other sanctions on Iran. In 1995, the Clinton Administration expanded U.S. sanctions against Iran by issuing Executive Order 12959 (May 6, 1995) banning U.S. trade with and investment in Iran. The order was issued under the authority primarily of the International Emergency Economic Powers Act (IEEPA, 50 U.S.C. 1701 et seq.), which gives the President wide powers to regulate commerce with a foreign country when a \"state of emergency\" is declared in relations with that country. E.O. 12959 superseded Executive Order 12957 (March 15, 1995) barring U.S. investment in Iran's energy sector, which accompanied President Clinton's declaration of a \"state of emergency\" with respect to Iran. Subsequently, E.O 13059 (August 19, 1997) added a prohibition on U.S. companies' knowingly exporting goods to a third country for incorporation into products destined for Iran. Each March since 1995, the U.S. Administration has renewed the \"state of emergency\" with respect to Iran. IEEPA gives the President the authority to alter regulations to license transactions with Iran—regulations enumerated in Section 560 of the Code of Federal Regulations (Iranian Transactions Regulations, ITRs). Section 103 of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (CISADA, P.L. 111-195 ) codified the trade ban and reinstated the full ban on imports that had earlier been relaxed by April 2000 regulations. That relaxation allowed importation into the United States of Iranian nuts, fruit products (such as pomegranate juice), carpets, and caviar. U.S. imports from Iran after that time were negligible. Section 101 of the Iran Freedom Support Act ( P.L. 109-293 ) separately codified the ban on U.S. investment in Iran, but gives the President the authority to terminate this sanction with presidential notification to Congress of such decision 15 days in advance (or 3 days in advance if there are \"exigent circumstances\"). In accordance with the JCPOA, the ITRs were relaxed to allow U.S. importation of the Iranian luxury goods discussed above (carpets, caviar, nuts, etc.), but not to permit general U.S.-Iran trade. U.S. regulations were also altered to permit the sale of commercial aircraft to Iranian airlines that are not designated for sanctions. The modifications were made in the Departments of State and of the Treasury guidance issued on Implementation Day and since. In concert with the May 8, 2018, U.S. withdrawal from the JCPOA, the easing of the regulations to allow for importation of Iranian carpets and other luxury goods was reversed on August 6, 2018. The following provisions apply to the U.S. trade ban on Iran as specified in regulations (Iran Transaction Regulations, ITRs) written pursuant to the executive orders and laws discussed above and enumerated in regulations administered by the Office of Foreign Assets Control (OFAC) of the Department of the Treasury. Oil Transactions . All U.S. transactions with Iran in energy products are banned. The 1995 trade ban (E.O. 12959) expanded a 1987 ban on imports from Iran that was imposed by Executive Order 12613 of October 29, 1987. The earlier import ban, authorized by Section 505 of the International Security and Development Cooperation Act of 1985 (22 U.S.C. 2349aa-9), barred the importation of Iranian oil into the United States but did not ban the trading of Iranian oil overseas. The 1995 ban prohibits that activity explicitly, but provides for U.S. companies to apply for licenses to conduct \"swaps\" of Caspian Sea oil with Iran. These swaps have been prohibited in practice; a Mobil Corporation application to do so was denied in April 1999, and no applications have been submitted since. The ITRs do not ban the importation, from foreign refiners, of gasoline or other energy products in which Iranian oil is mixed with oil from other producers . The product of a refinery in any country is considered to be a product of the country where that refinery is located, even if some Iran-origin crude oil is present. Transshipment and Brokering . The ITRs prohibit U.S. transshipment of prohibited goods across Iran, and ban any activities by U.S. persons to broker commercial transactions involving Iran. Iranian Luxury Goods . Pursuant to the JCPOA, Iranian luxury goods, such as carpets and caviar, could be imported into the United States after January 2016. This prohibition went back into effect on August 6, 2018 (90-day wind-down). Shipping Insurance . Obtaining shipping insurance is crucial to Iran's expansion of its oil and other exports. A pool of 13 major insurance organizations, called the International Group of P & I Clubs, dominates the shipping insurance industry and is based in New York. The U.S. presence of this pool renders it subject to the U.S. trade ban, which complicated Iran's ability to obtain reinsurance for Iran's shipping after Implementation Day. On January 16, 2017, the Obama Administration issued waivers of Sections 212 and 213 of the ITRSHRA to allow numerous such insurers to give Iranian ships insurance. However, this waiver ended on August 6, 2018 (90-day wind-down). Civilian Airline Sales . The ITRs have always permitted the licensing of goods related to the safe operation of civilian aircraft for sale to Iran (§560.528 of Title 31, C.F.R.), and spare parts sales have been licensed periodically. However, from June 2011 until Implementation Day, Iran's largest state-owned airline, Iran Air, was sanctioned under Executive Order 13382 (see below), rendering licensing of parts or repairs for that airline impermissible. Several other Iranian airlines were sanctioned under that Order and Executive Order 13224. In accordance with the JCPOA, the United States relaxed restrictions on to allow for the sale to Iran of finished commercial aircraft, including to Iran Air, which was \"delisted\" from sanctions. A March 2016 general license allowed for U.S. aircraft and parts suppliers to negotiate sales with Iranian airlines that are not sanctioned, and Boeing and Airbus subsequently concluded major sales to Iran Air. In keeping with the May 8, 2018, U.S. withdrawal from the JCPOA, preexisting licensing restrictions went back into effect on August 6, 2018, and the Boeing and Airbus licenses to sell aircraft to Iran were revoked. Sales of some aircraft spare parts (\"dual use items\") to Iran also require a waiver of the relevant provision of the Iran-Iraq Arms Non-Proliferation Act, discussed below. Personal Communications , Remittances , and Publishing . The ITRs permit personal communications (phone calls, emails) between the United States and Iran, personal remittances to Iran, and Americans to engage in publishing activities with entities in Iran (and Cuba and Sudan). Information Technology Equipment. CISADA exempts from the U.S. ban on exports to Iran information technology to support personal communications among the Iranian people and goods for supporting democracy in Iran. In May 2013, OFAC issued a general license for the exportation to Iran of goods (such as cell phones) and services, on a fee basis, that enhance the ability of the Iranian people to access communication technology. Food and Medical Exports. Since April 1999, sales to Iran by U.S. firms of food and medical products have been permitted, subject to OFAC stipulations. In October 2012, OFAC permitted the sale to Iran of specified medical products, such as scalpels, prosthetics, canes, burn dressings, and other products, that could be sold to Iran under \"general license\" (no specific license application required). This list of general license items list was expanded in 2013 and 2016 to include more sophisticated medical diagnostic machines and other medical equipment. Licenses for exports of medical products not on the general license list are routinely expedited for sale to Iran, according to OFAC. The regulations have a specific definition of \"food\" that can be licensed for sale to Iran, and that definition excludes alcohol, cigarettes, gum, or fertilizer. The definition addresses information in a 2010 article that OFAC had approved exports to Iran of condiments such as food additives and body-building supplements that have uses other than purely nutritive. Humanitarian and Related Services . Donations by U.S. residents directly to Iranians (such as packages of food, toys, clothes, etc.) are not prohibited, but donations through relief organizations broadly require those organizations' obtaining a specific OFAC license. On September 10, 2013, the Department of the Treasury eliminated licensing requirements for relief organizations to (1) provide to Iran services for health projects, disaster relief, wildlife conservation; (2) to conduct human rights projects there; or (3) undertake activities related to sports matches and events. The amendment also allowed importation from Iran of services related to sporting activities, including sponsorship of players, coaching, referees, and training. In some cases, such as the earthquake in Bam in 2003 and the earthquake in northwestern Iran in August 2012, OFAC has issued blanket temporary general licensing for relief organizations to work in Iran. Payment Methods, Trade Financing , and Financing Guarantees . U.S. importers are allowed to pay Iranian exporters, including with U.S. dollars. However, U.S. funds cannot go directly to Iranian banks, but must instead pass through third-country banks. In accordance with the ITRs' provisions that transactions that are incidental to an approved transaction are allowed, financing for approved transactions are normally approved, presumably in the form of a letter of credit from a non-Iranian bank. Title IX of the Trade Sanctions Reform and Export Enhancement Act of 2000 ( P.L. 106-387 ) bans the use of official credit guarantees (such as the Ex-Im Bank) for food and medical sales to Iran and other countries on the U.S. terrorism list, except Cuba, although allowing for a presidential waiver to permit such credit guarantees. The Ex-Im Bank is prohibited from guaranteeing any loans to Iran because of Iran's continued inclusion on the terrorism list, and the JCPOA did not commit the United States to provide credit guarantees for Iran. The ITRs do not ban subsidiaries of U.S. firms from dealing with Iran, as long as the subsidiary is not \"controlled\" by the parent company. Most foreign subsidiaries are legally considered foreign persons subject to the laws of the country in which the subsidiaries are incorporated. Section 218 of the Iran Threat Reduction and Syrian Human Rights Act (ITRSHRA, P.L. 112-158 ) holds \"controlled\" foreign subsidiaries of U.S. companies to the same standards as U.S. parent firms, defining a controlled subsidiary as (1) one that is more than 50% owned by the U.S. parent; (2) one in which the parent firm holds a majority on the Board of Directors of the subsidiary; or (3) one in which the parent firm directs the operations of the subsidiary. There is no waiver provision. JCPOA Regulations and Reversal. To implement the JCPOA, the United States licensed \"controlled\" foreign subsidiaries to conduct transactions with Iran that are permissible under JCPOA (almost all forms of civilian trade). The Obama Administration asserted that the President has authority under IEEPA to license transactions with Iran, the ITRSHRA notwithstanding. This was implemented with the Treasury Department's issuance of \"General License H: Authorizing Certain Transactions Relating to Foreign Entities Owned or Controlled by a United States Person.\" With the Trump Administration reimposition of sanctions, the licensing policy (\"Statement of Licensing Policy,\" SLP) returned to pre-JCPOA status on November 5, 2018. In 1996, Congress and the executive branch began a long process of pressuring Iran's vital energy sector in order to deny Iran the financial resources to support terrorist organizations and other armed factions or to further its nuclear and WMD programs. Iran's oil sector is as old as the petroleum industry itself (early 20 th century), and Iran's onshore oil fields are in need of substantial investment. Iran has 136.3 billion barrels of proven oil reserves, the third largest after Saudi Arabia and Canada. Iran has large natural gas resources (940 trillion cubic feet), exceeded only by Russia. However, Iran's gas export sector is still emerging—most of Iran's gas is injected into its oil fields to boost their production. The energy sector still generates about 20% of Iran's GDP and as much as 30% of government revenue. The Iran Sanctions Act (ISA) has been a pivotal component of U.S. sanctions against Iran's energy sector. Since its enactment in 1996, ISA's provisions have been expanded and extended to other Iranian industries. ISA sought to thwart Iran's 1995 opening of the sector to foreign investment in late 1995 through a \"buy-back\" program in which foreign firms gradually recoup their investments as oil and gas is produced. It was first enacted as the Iran and Libya Sanctions Act (ILSA, P.L. 104-172 , signed on August 5, 1996) but was later retitled the Iran Sanctions Act after it terminated with respect to Libya in 2006. ISA was the first major \"extra-territorial sanction\" on Iran—a sanction that authorizes U.S. penalties against third country firms. ISA consists of a number of \"triggers\"—transactions with Iran that would be considered violations of ISA and could cause a firm or entity to be sanctioned under ISA's provisions. The triggers, as added by amendments over time, are detailed below: The core trigger of ISA when first enacted was a requirement that the President sanction companies (entities, persons) that make an \"investment\" of more than $20 million in one year in Iran's energy sector. The definition of \"investment\" in ISA (§14 [9]) includes not only equity and royalty arrangements but any contract that includes \"responsibility for the development of petroleum resources\" of Iran. The definition includes additions to existing investment (added by P.L. 107-24 ) and pipelines to or through Iran and contracts to lead the construction, upgrading, or expansions of energy projects (added by CISADA). This provision of ISA was not waived under the JCPOA. The Iran Freedom Support Act ( P.L. 109-293 , signed September 30, 2006) added Section 5(b)(1) of ISA, subjecting to ISA sanctions firms or persons determined to have sold to Iran (1) \"chemical, biological, or nuclear weapons or related technologies\" or (2) \"destabilizing numbers and types\" of advanced conventional weapons. Sanctions can be applied if the exporter knew (or had cause to know) that the end-user of the item was Iran. The definitions do not specifically include ballistic or cruise missiles, but those weapons could be considered \"related technologies\" or, potentially, a \"destabilizing number and type\" of advanced conventional weapon. The Iran Threat Reduction and Syria Human Rights Act (ITRSHRA, P.L. 112-158 , signed August 10, 2012) created Section 5(b)(2) of ISA subjecting to sanctions entities determined by the Administration to participate in a joint venture with Iran relating to the mining, production, or transportation of uranium. Implementation: No ISA sanctions have been imposed on any entities under these provisions. Section 102(a) of the Comprehensive Iran Sanctions, Accountability, and Divestment Act of 2010 (CISADA, P.L. 111-195 , signed July 1, 2010) amended Section 5 of ISA to exploit Iran's dependency on imported gasoline (40% dependency at that time). It followed legislation such as P.L. 111-85 that prohibited the use of U.S. funds to fill the Strategic Petroleum Reserve with products from firms that sell gasoline to Iran; and P.L. 111-117 that denied Ex-Im Bank credits to any firm that sold gasoline or related equipment to Iran. The section subjects the following to sanctions: Sales to Iran of over $1 million worth (or $5 million in a one year period) of gasoline and related aviation and other fuels. (Fuel oil, a petroleum by-product, is not included in the definition of refined petroleum.) Sales to Iran of equipment or services (same dollar threshold as above) which would help Iran make or import gasoline. Examples include equipment and services for Iran's oil refineries or port operations. Section 201 of the Iran Threat Reduction and Syria Human Rights Act of 2012 (ITRSHA, P.L. 112-158 , signed August 10, 2012) codified an Executive Order, 13590 (November 21, 2011), by adding Section 5(a)(5 and 6) to ISA sanctioning firms that provide to Iran $1 million or more (or $5 million in a one-year period) worth of goods or services that Iran could use to maintain or enhance its oil and gas sector. This subjects to sanctions, for example, transactions with Iran by global oil services firms and the sale to Iran of energy industry equipment such as drills, pumps, vacuums, oil rigs, and like equipment. provide to Iran $250,000 (or $1 million in a one year period) worth of goods or services that Iran could use to maintain or expand its production of petrochemical products. This provision was not altered by the JPA. Section 201 of the ITRSHRA amends ISA by sanctioning entities the Administration determines owned a vessel that was used to transport Iranian crude oil. The section also authorizes but does not require the President, subject to regulations, to prohibit a ship from putting to port in the United States for two years, if it is owned by a person sanctioned under this provision (adds Section 5[ a ][ 7 ] to ISA) . This sanction does not apply in cases of transporting oil to countries that have received exemptions under P.L. 112-81 (discussed below). participated in a joint oil and gas development venture with Iran, outside Iran, if that venture was established after January 1, 2002. The effective date exempts energy ventures in the Caspian Sea, such as the Shah Deniz oil field there (adds Section 5[ a ][ 4 ] to ISA ) . Separate provisions of the ITRSHR Act— which do not amend ISA — require the application of ISA sanctions (the same 5 out of 12 sanctions as required in ISA itself) on any entity that provides insurance or reinsurance for the National Iranian Oil Company (NIOC) or the National Iranian Tanker Company (NITC) (Section 212). purchases or facilitates the issuance of sovereign debt of the government of Iran, including Iranian government bonds (Section 213). This sanction went back into effect on August 6, 2018 (90-day wind-down period). assists or engages in a significant transaction with the IRGC or any of its sanctioned entities or affiliates. (Section 302). This section of ITRSHRA was not waived to implement the JCPOA. Implementation . Section 312 of ITRSHRA required an Administration determination, within 45 days of enactment (by September 24, 2012) whether NIOC and NITC are IRGC agents or affiliates. Such a determination would subject financial transactions with NIOC and NITC to sanctions under CISADA (prohibition on opening U.S.-based accounts). On September 24, 2012, the Department of the Treasury determined that NIOC and NITC are affiliates of the IRGC. On November 8, 2012, the Department of the Treasury named NIOC as a proliferation entity under Executive Order 13382—a designation that, in accordance with Section 104 of CISADA, bars any foreign bank determined to have dealt directly with NIOC (including with a NIOC bank account in a foreign country) from opening or maintaining a U.S.-based account. Sanctions on dealings with NIOC and NITC were waived in accordance with the interim nuclear deal and the JCPOA, and designations of these entities under Executive Order 13382 were rescinded in accordance with the JCPOA. These entities were \"relisted\" again on November 5, 2018. Some NIOC have partners and independent Iranian energy firms have not been designated, including: Iranian Offshore Oil Company; National Iranian Gas Export Co.; Petroleum Engineering and Development Co.; Pasargad Oil Co., Zagros Petrochem Co.; Sazeh Consultants; Qeshm Energy; and Sadid Industrial Group. Status: Revoked (by E.O. 13716) but will back into effect as stipulated below Executive Order 13622 (July 30, 2012) imposes specified sanctions on the ISA sanctions menu, and bars banks from the U.S. financial system, for the following activities ( E .O. 13622 d id not amend ISA itself ): the purchase of oil, other petroleum, or petrochemical products from Iran. Th e part of th is order pertaining to petrochemical purchases was suspended under the JPA. The wind-down period was 180 days (ending November 4, 2018). transactions with the National Iranian Oil Company (NIOC) or Naftiran Intertrade Company (NICO) (180-day wind-down period). E.O. 13622 also blocks U.S.-based property of entities determined to have assisted or provided goods or services to NIOC, NICO, the Central Bank of Iran (180-day wind-down period). assisted the government of Iran in the purchase of U.S. bank notes or precious metals, precious stones, or jewels. (The provision for precious stones or jewels was added to this Order by E.O. 16345 below.) (90-day wind-down period.) E.O. 13622 sanctions do not apply if the parent country of the entity has received an oil importation exception under Section 1245 of P.L. 112-81 , discussed below. An exception also is provided for projects that bring gas from Azerbaijan to Europe and Turkey, if such project was initiated prior to the issuance of the Order. In the original version of ISA, there was no firm requirement, and no time limit, for the Administration to investigate potential violations and determine that a firm has violated ISA's provisions. The Iran Freedom Support Act ( P.L. 109-293 , signed September 30, 2006) added a provision calling for, but not requiring , a 180-day time limit for a violation determination. CISADA (Section 102[g][5]) mandated that the Administration begin an investigation of potential ISA violations when there is \"credible information\" about a potential violation, and made mandatory the 180-day time limit for a determination of violation. The Iran Threat Reduction and Syria Human Rights Act ( P.L. 112-158 ) defines the \"credible information\" needed to begin an investigation of a violation to include a corporate announcement or corporate filing to its shareholders that it has undertaken transactions with Iran that are potentially sanctionable under ISA. It also says the President may (not mandatory) use as credible information reports from the Government Accountability Office and the Congressional Research Service. In addition, Section 219 of ITRSHRA requires that an investigation of an ISA violation begin if a company reports in its filings to the Securities and Exchange Commission (SEC) that it has knowingly engaged in activities that would violate ISA (or Section 104 of CISADA or transactions with entities designated under E.O 13224 or 13382, see below). Several mechanisms for Congress to oversee whether the Administration is investigating ISA violations were added by ITRSHRA. Section 223 of that law required a Government Accountability Office report, within 120 days of enactment, and another such report a year later, on companies that have undertaken specified activities with Iran that might constitute violations of ISA. Section 224 amended a reporting requirement in Section 110(b) of CISADA by requiring an Administration report to Congress every 180 days on investment in Iran's energy sector, joint ventures with Iran, and estimates of Iran's imports and exports of petroleum products. The GAO reports have been issued; there is no information available on whether the required Administration reports have been issued as well. The sections below provide information on how some key ISA provisions have been interpreted and implemented. ISA's definition of \"investment\" that is subject to sanctions has been consistently interpreted by successive Administrations to include construction of energy pipelines to or through Iran. Such pipelines are deemed to help Iran develop its petroleum (oil and natural gas) sector. This interpretation was reinforced by amendments to ISA in CISADA, which specifically included in the definition of petroleum resources \"products used to construct or maintain pipelines used to transport oil or liquefied natural gas.\" In March 2012, then-Secretary of State Clinton made clear that the Obama Administration interprets the provision to be applicable from the beginning of pipeline construction. The original version of ISA did not provide for sanctioning purchases of crude oil from Iran. However, subsequent laws and executive orders took that step. The Iran Freedom and Counterproliferation Act (IFCA, discussed below) authorized sanctions on transactions with Iran's energy sector, but s pecifically exclude d from sanctions purchases of natural gas from Iran . But construction of gas pipelines involving Iran is subject to sanctions. The effective dates of U.S. sanctions laws and Orders exclude long-standing joint natural gas projects that involve some Iranian firms—particularly the Shah Deniz natural gas field and related pipelines in the Caspian Sea. These projects involve a consortium in which Iran's Naftiran Intertrade Company (NICO) holds a passive 10% share, and includes BP, Azerbaijan's natural gas firm SOCAR, Russia's Lukoil, and other firms. NICO was sanctioned under ISA and other provisions (until JCPOA Implementation Day), but an OFAC factsheet of November 28, 2012, stated that the Shah Deniz consortium, as a whole, is not determined to be \"a person owned or controlled by\" the government of Iran and transactions with the consortium are permissible. The original version of ISA did not apply to the development by Iran of a liquefied natural gas (LNG) export capability. Iran has no LNG export terminals, in part because the technology for such terminals is patented by U.S. firms and unavailable for sale to Iran. CISADA specifically included LNG in the ISA definition of petroleum resources and therefore made subject to sanctions LNG investment in Iran or supply of LNG tankers or pipelines to Iran. The definitions of investment and other activity that can be sanctioned under ISA include financing for investment in Iran's energy sector, or for sales of gasoline and refinery-related equipment and services. Therefore, banks and other financial institutions that assist energy investment and refining and gasoline procurement activities could be sanctioned under ISA. However, the definitions of financial institutions are interpreted not to apply to official credit guarantee agencies—such as France's COFACE and Germany's Hermes. These credit guarantee agencies are arms of their parent governments, and ISA does not provide for sanctioning governments or their agencies. Entities sanctioned under the executive orders or laws cited in this section are listed in the tables at the end of this report. As noted, some of the Orders cited provide for blocking U.S.-based assets of the entities designated for sanctions. OFAC has not announced the blocking of any U.S.-based property of the sanctioned entities, likely indicating that those entities sanctioned do not have a presence in the United States. In 2011, Congress sought to reduce Iran's exportation of oil by imposing sanctions on the mechanisms that importers use to pay Iran for oil. The Obama Administration asserted that such legislation could lead to a rise in oil prices and harm U.S. relations with Iran's oil customers, and President Obama, in his signing statement on the bill, indicated he would implement the provision so as not to damage U.S. relations with partner countries. The law imposed penalties on transactions with Iran's Central Bank. Section 1245 of the FY2012 National Defense Authorization Act (NDAA, P.L. 112-81 , signed on December 31, 2011): Requires the President to prevent a foreign bank from opening an account in the United States—or impose strict limitations on existing U.S. accounts—if that bank is determined to have conducted a \"significant financial transaction\" with Iran's Central Bank or with any sanctioned Iranian bank . The provision applies to a foreign central bank only if the transaction with Iran's Central Bank is for oil purchases. The provision went into effect after 180 days (June 28, 2012). Significant Reduction Ex c eption (SRE): The law provides incentive for Iran's oil buyers to cut purchases of Iranian oil by providing for an exception (exemption) for the banks of any country determined to have \" significantly reduced \" its purchases of oil from Iran. The banks of countries granted the SRE may continue to conduct all transactions with the Central Bank (not just for oil) or with any sanctioned Iranian bank. The SRE exception is reviewed every 180 days and, to maintain the exception, countries are required to reduce their oil buys from Iran, relative to the previous 180-day period. ITRSHRA amended Section 1245 such that any country that completely ceased purchasing oil from Iran entirely would retain an exception. The law lacks a precise definition of \"significant reduction\" of oil purchases, but the Obama Administration adopted a standard set in a January 2012 letter by several Senators to then-Treasury Secretary Geithner setting that definition at an 18% purchase reduction based on total paid for the Iranian oil (not just volume reduction). Sanctions on transactions for oil apply only if the President certifies to Congress every 90 days, based on a report by the Energy Information Administration, that the oil market is adequately supplied, and, an Administration determination every 180 days that there is a sufficient supply of oil worldwide to permit countries to reduce purchases from Iran. The required EIA reports and Administration determinations have been issued at the prescribed intervals, even during the period when the law was in a state of waiver. Hum anitarian Exception . Paragraph (2) of Section 1245 exempts transactions with Iran's Central Bank that are for \"the sale of agricultural commodities, food, medicine, or medical devices to Iran\" from sanctions. The Obama and Trump Administration have implemented the FY2012 NDAA with an eye toward balancing the global oil market with the intended effects on Iran's economy and behavior. The table below on major Iranian oil customers indicates cuts made by major customers compared to 2011. In March 20, 2012, Japan received an SRE. In September 2012, following a July 2012 EU Iran oil embargo, 10 EU countries (Belgium, Czech Republic, France, Germany, Greece, Italy, the Netherlands, Poland, Spain, and Britain) received the SRE because they ended purchases pursuant to the EU Iran oil purchase embargo of July 1, 2012. Seventeen EU countries were not granted the SRE because they were not buying Iran's oil and could not \"significantly reduce\" buys from Iran. In December 2012, the following countries/jurisdictions received the SRE: China, India, Malaysia, South Africa, South Korea, Singapore, Sri Lanka, Turkey, and Taiwan. The January 2016 waivers issued to implement the JCPOA suspended the requirement for a country to cut oil purchases from Iran in order to maintain their exceptions, and Iran's historic oil customers quickly resumed buying Iranian oil. The provision went back into effect on November 5, 2018. On June 26, 2018, a senior State Department official, in a background briefing, stated that department officials, in meetings with officials of countries that import Iranian oil, were urging these countries to cease buying Iranian oil entirely, but Administration officials later indicated that requests for exceptions would be evaluated based on the ease of substituting for Iranian oil, country-specific needs, and the need for global oil market stability. On November 5, 2018, in the first SRE grants available under reimposed U.S. sanctions, the following eight countries received the SRE: China, India, Italy, Greece, Japan, South Korea, Taiwan, and Turkey. The SREs expired on May 2, 2019. On April 22, 2019, the State Department announced that no more SREs would be granted after their expiration at 12:00 AM on May 2, 2019. The Administration indicated that the global oil market is well supplied enough to permit the decision, which is intended to \"apply maximum pressure on the Iranian regime until its leaders change their destructive behavior, respect the rights of the Iranian people, and return to the negotiating table.\" The announcement indicated that U.S. officials have had discussions with Saudi Arabia and the UAE to ensure that the global oil market remains well supplied. Left unclear is the extent to which, if at all, Iran's oil customers seek to continue importing Iranian oil and whether the Administration will penalize foreign banks for continuing transactions with Iran's Central Bank. The ability of Iran to repatriate hard currency—U.S. dollars are the primary form of payment for oil—to its Central Bank was impeded by a provision of the ITRSHRA which went into effect on February 6, 2013 (180 days after enactment). Section 504 of the ITRSHRA amended Section 1245 of the FY2012 NDAA (adding \"clause ii\" to Paragraph D[1]) by requiring that any funds paid to Iran as a result of exempted transactions (oil purchases, for example) be credited to an account located in the country with primary jurisdiction over the foreign bank making the transaction. This provision essentially prevents Iran from repatriating to its Central Bank any hard currency Iran held in foreign banks around the world. Most of Iran's funds held abroad are in banks located in Iran's main oil customers. The provision largely compels Iran to buy the products of the oil customer countries. Some press reports refer to this arrangement as an \"escrow account,\" but State Department officials describe the arrangement as \"restricted\" accounts. Successive Administrations have expanded sanctions, primarily by executive order, on several significant nonoil industries and sectors of Iran's economy. The targeted sectors include Iran's automotive production sector, which is Iran's second-largest industry (after energy), and its mineral exports, which account for about 10% of Iran's export earnings. JCPOA Status: Revoked (by E.O 13716) but most provisions below went back into effect as of August 6, 2018 (90-day wind-down period). Executive Order 13645 of June 3, 2013 (effective July 1, 2013), contains the provisions below. (E.O. 13645 did not amend ISA itself.) Imposes specified ISA-related sanctions on firms that supply goods or services to Iran's automotive (cars, trucks, buses, motorcycles, and related parts) sector, and blocks foreign banks from the U.S. market if they finance transactions with Iran's automotive sector. (An executive order cannot amend a law, so the order does not amend ISA.) Blocks U.S.-based property and prohibits U.S. bank accounts for foreign banks that conduct transactions in Iran's currency, the rial , or hold rial accounts. This provision mostly affected banks in countries bordering or near Iran. The order applies also to \"a derivative, swap, future, forward, or other similar contract whose value is based on the exchange rate of the Iranian rial .\"  If Iran implements plans to develop a digital currency, or cryptocurrency, backed by or tied to rials, it would appear that the Order also applies to that digital currency. Expands the application of Executive Order 13622 (above) to helping Iran acquire precious stones or jewels (see above). Blocks U.S.-based property of a person that conducts transactions with an Iranian entity listed as a Specially Designated National (SDN) or Blocked Person. SDNs to be \"relisted\" on November 5, 2018. On May 8, 2019, President Trump issued Executive Order 13871 sanctioning transactions with Iran's key minerals and industrial commodities. The White House announcement stated that Iran earns 10% of its total export revenues from sales of the minerals and metals sanctioned under the order. The order does the following: blocks U.S.-based property of any entity that conducts a significant transaction for the \"sale, supply, or transfer to Iran\" of goods or services, or the transport or marketing, of the iron, steel, aluminum, and copper sectors of Iran; authorizes the Secretary of the Treasury to bar from the U.S. financial system any foreign bank that conducts or facilitates a financial transaction for steel, steel products, copper, or copper products from Iran; bars the entry into the United States of any person sanctioned under the order. Several laws and executive orders seek to bar Iran from obtaining U.S. or other technology that can be used for weapons of mass destruction (WMD) programs. Sanctions on Iran's exportation of arms are discussed in the sections above on sanctions for Iran's support for terrorist groups. The Iran-Iraq Arms Nonproliferation Act (Title XIV of the FY1993 National Defense Authorization Act, P.L. 102-484 , signed in October 1992) imposes a number of sanctions on foreign entities that supply Iran with WMD technology or \"destabilizing numbers and types of advanced conventional weapons.\" Advanced conventional weapons are defined as follows: (1) such long-range precision-guided munitions, fuel air explosives, cruise missiles, low observability aircraft, other radar evading aircraft, advanced military aircraft, military satellites, electromagnetic weapons, and laser weapons as the President determines destabilize the military balance or enhance the offensive capabilities in destabilizing ways; (2) such advanced command, control, and communications systems, electronic warfare systems, or intelligence collections systems as the President determines destabilize the military balance or enhance offensive capabilities in destabilizing ways; and (3) such other items or systems as the President may, by regulation, determine necessary for the purposes of this title. The definition is generally understood to include technology used to develop ballistic missiles. Sanctions to be i mposed : Sanctions imposed on violating entities include a ban, for two years, on U.S. government procurement from the entity; a ban, for two years, on licensing U.S. exports to that entity; authority (but not a requirement) to ban U.S. imports from the entity. If the violator is determined to be a foreign country, sanctions to be imposed are a one-year ban on U.S. assistance to that country; a one-year requirement that the United States vote against international lending to it; a one-year suspension of U.S. coproduction agreements with the country; a one-year suspension of technical exchanges with the country in military or dual use technology; a one-year ban on sales of U.S. arms to the country; an authorization to deny the country most-favored-nation trade status; and to ban U.S. trade with the country. Section 1603 of the act amended an earlier law, the Iraq Sanctions Act of 1990 (Section 586G(a) of P.L. 101-513 ), to provide for a \"presumption of denial\" for all dual use exports to Iran (including computer software). A number of entities were sanctioned under the act in the 1990s, as shown in the tables at the end of this paper. None of the designations remain active, because the sanctions have limited duration. Another law reinforces the authority of the President to sanction governments that provide aid or sell arms to Iran (and other terrorism list countries). Under Sections 620G and 620H of the Foreign Assistance Act, as added by the Anti-Terrorism and Effective Death Penalty Act of 1996 (Sections 325 and 326 of P.L. 104-132 ), the President is required to withhold foreign aid from any country that provides to a terrorism list country financial assistance or arms. Waiver authority is provided. Section 321 of that act also makes it a criminal offense for U.S. persons to conduct financial transactions with terrorism list governments. No foreign assistance cuts or other penalties under this law have been announced. As noted above, Section 5(b)(1) of ISA subjects to ISA sanctions firms or persons determined to have sold to Iran (1) technology useful for weapons of mass destruction (WMD) or (2) \"destabilizing numbers and types\" of advanced conventional weapons. This, and Section 5(b)(2) pertaining to joint ventures to mine uranium, are the only provisions of ISA that were not waived to implement the JCPOA. As noted, no sanctions under this section have been imposed. The Iran Nonproliferation Act ( P.L. 106-178 , signed in March 2000) is now called the Iran-North Korea-Syria Nonproliferation Act (INKSNA) after amendments applying its provisions to North Korea and to Syria. It authorizes sanctions—for two years unless renewed—on foreign persons (individuals or corporations, not governments) that are determined in a report by the Administration to have assisted Iran's WMD programs. Sanctions imposed include (1) a prohibition on U.S. exportation of arms and dual use items to the sanctioned entity; and (2) a ban on U.S. government procurement and of imports to the United States from the sanctioned entity under Executive Order 12938 (of November 14, 1994). INKSNA also banned U.S. extraordinary payments to the Russian Aviation and Space Agency in connection with the international space station unless the President certified that the agency had not transferred any WMD or missile technology to Iran within the year prior. Entities that have been sanctioned under this law are listed in the tables at the end of the report. Designations more than two years old are no longer active. The JCPOA required the United States to suspend INKSNA sanctions against \"the acquisition of nuclear-related commodities and services for nuclear activities contemplated in the JCPOA,\" but no entities were \"delisted\" to implement the JCPOA. Executive Order 13382 (June 28, 2005) allows the President to block the assets of proliferators of weapons of mass destruction (WMD) and their supporters under the authority granted by the International Emergency Economic Powers Act (IEEPA; 50 U.S.C. 1701 et seq.), the National Emergencies Act (50 U.S.C. 1601 et seq.), and Section 301 of Title 3, United States Code . Implementation. The numerous entities sanctioned under the order for dealings with Iran are listed in the tables at the end of this report. Entities delisted and which were to be delisted in accordance with the JCPOA (in October 2023) are in italics and boldface type, respectively. All entities delisted to implement the JCPOA are to be relisted on November 5, 2018, according to the Treasury Department. The CAATSA law, signed on August 2, 2017, mandates sanctions on arms sales to Iran and on entities that \"materially contribute\" to Iran's ballistic missile program. Section 104 references implementation of E.O. 13382, which sanctions entities determined by the Administration to be assisting Iran's ballistic missile program. The section mandates that the Administration impose the same sanctions as in E.O. 13382 on any activity that materially contributes to Iran's ballistic missile program or any system capable of delivering WMD. The section also requires an Administration report every 180 days on persons (beginning on January 29, 2018) contributing to Iran's ballistic missile program in the preceding 180 days. Section 107 mandates imposition of sanctions (the same sanctions as those contained in E.O. 13382) on any person that the President determines has sold or transferred to or from Iran, or for the use in or benefit of Iran: the weapons systems specified as banned for transfer to or from Iran in U.N. Security Council Resolution 2231. These include most major combat systems such as tanks, armored vehicles, warships, missiles, combat aircraft, and attack helicopters. The provision goes somewhat beyond prior law that mandates sanctions mainly on sales to Iran of \"destabilizing numbers and types of advanced conventional weapons.\" The imposition of sanctions is not required if the President certifies that a weapons transfer is in the national security of the United States; that Iran no longer poses a significant threat to the United States or U.S. allies; and that the Iranian government no longer satisfies the requirements for designation as a state sponsor of terrorism. Some past foreign aid appropriations have withheld U.S. assistance to the Russian Federation unless it terminates technical assistance to Iran's nuclear and ballistic missiles programs. The provision applied to the fiscal year for which foreign aid is appropriated. Because U.S. aid to Russia generally has not gone to the Russian government, little or no funding was withheld as a result of the provision. The JCPOA makes no reference to any U.S. commitments to waive this sanction or to request that Congress not enact such a provision. Title III of CISADA established authorities to sanction countries that allow U.S. technology that Iran could use in its nuclear and WMD programs to be re-exported or diverted to Iran. Section 303 of CISADA authorizes the President to designate a country as a \"Destination of Diversion Concern\" if that country allows substantial diversion of goods, services, or technologies characterized in Section 302 of that law to Iranian end-users or Iranian intermediaries. The technologies specified include any goods that could contribute to Iran's nuclear or WMD programs, as well as goods listed on various U.S. controlled-technology lists such as the Commerce Control List or Munitions List. For any country designated as a country of diversion concern, there would be prohibition of denial for licenses of U.S. exports to that country of the goods that were being re-exported or diverted to Iran. Implementation : To date, no country has been designated a \"Country of Diversion Concern.\" Some countries adopted or enforced anti-proliferation laws apparently to avoid designation. U.S. efforts to shut Iran out of the international banking system were a key component of the 2010-2016 international sanctions regime. During 2006-2016, the Department of the Treasury used long-standing authorities to persuade foreign banks to cease dealing with Iran, in part by briefing them on Iran's use of the international financial system to fund terrorist groups and acquire weapons-related technology. According to a GAO report of February 2013, the Department of the Treasury made overtures to 145 banks in 60 countries, including several visits to banks and officials in the UAE, and convinced at least 80 foreign banks to cease handling financial transactions with Iranian banks. Upon implementation of the JCPOA, the Treasury Department largely dropped this initiative, and instead largely sought to encourage foreign banks to conduct normal transactions with Iran. There is no blanket ban on foreign banks or persons paying Iran for goods using U.S. dollars. But, U.S. regulations (ITRs, C.F.R. Section 560.516) ban Iran from direct access to the U.S. financial system. The regulations allow U.S. banks to send funds (including U.S. dollars) to Iran for allowed (licensed) transactions. However, the U.S. dollars cannot be directly transferred to an Iranian bank, but must instead be channeled through an intermediary financial institution, such as a European bank. Section 560.510 specifically allows for U.S. payments to Iran to settle or pay judgments to Iran, such as those reached in connection with the U.S.-Iran Claims Tribunal, discussed above. However, the prohibition on dealing directly with Iranian banks still applies. On November 6, 2008, the Department of the Treasury broadened restrictions on Iran's access to the U.S. financial system by barring U.S. banks from handling any transactions with foreign banks that are handling transactions on behalf of an Iranian bank (\"U-turn transactions\"). This means a foreign bank or person that pays Iran for goods in U.S. dollars cannot access the U.S. financial system (through a U.S. correspondent account, which most foreign banks have) to acquire dollars for any transaction involving Iran. This ban remained in effect under the JCPOA implementation, and Iran argued that these U.S. restrictions deter European and other banks from reentering the Iran market, as discussed later in this report. Then-Treasury Secretary Lew in March and April 2016 suggested the Obama Administration was considering licensing transactions by foreign (non-Iranian) clearinghouses to acquire dollars that might facilitate transactions with Iran, without providing Iran with dollars directly. However, doing so was not required by the JCPOA and the Administration declined to take that step. Instead, the Obama Administration encouraged bankers to reenter the Iran market without fear of being sanctioned. The Trump Administration has not, at any time, expressed support for allowing Iran greater access to dollars. The reimposition of U.S. sanctions has further reduced the willingness and ability of foreign firms to use dollars in transactions with Iran. The Department of the Treasury and other U.S. authorities has announced financial settlements (forfeiture of assets and imposition of fines) with various banks that have helped Iran (and other countries such as Sudan, Syria, and Cuba) access the U.S. financial system. The amounts were reportedly determined, at least in part, by the value, number, and duration of illicit transactions conducted, and the strength of the evidence collected by U.S. regulators. (As noted above, the FY2016 Consolidated Appropriation, P.L. 114-113 , provides for use of the proceeds of the settlements above to pay compensation to victims of Iranian terrorism.) Section 104 of CISADA requires the Secretary of the Treasury to forbid U.S. banks from opening new \"correspondent accounts\" or \"payable-through accounts\" (or force the cancellation of existing such accounts) for any foreign bank that transactions business with an entity that is sanctioned by Executive Order 13224 or 13382 (terrorism and proliferation activities, respectively). These orders are discussed above. A full list of such entities is at the end of this report, and entities \"delisted\" are in italics. any foreign bank determined to have facilitated Iran's efforts to acquire WMD or delivery systems or provide support to groups named as Foreign Terrorist Organizations (FTOs) by the United States. any foreign bank that facilitates \"the activities of\" an entity designated under by U.N. Security Council resolutions that sanction Iran. any foreign bank that transacts business with the IRGC or any of its affiliates designated under any U.S. Iran-related executive order. any foreign bank that does business with Iran's energy, shipping, and shipbuilding sectors, including with NIOC, NITC, and IRISL. (This provision was contained in Section 1244(d) of the Iran Freedom and Counterproliferation Act, IFCA, discussed below, but d id not specifically amend CISADA . The provision was waived to implement the JCPOA. One additional intent of the provision was to reduce the ability of Iran's pivotal import-export community (referred to in Iran as the \"bazaar merchants\" or \" bazaaris \") from obtaining \"letters of credit\" (trade financing) to buy or sell goods. The Department of the Treasury has authority to determine what constitutes a \"significant\" financial transaction. On July 31, 2012, the United States sanctioned the Bank of Kunlun in China and the Elaf Islamic Bank in Iraq under Section 104 of CISADA. On May 17, 2013, the Department of the Treasury lifted sanctions on Elaf Islamic Bank in Iraq, asserting that the bank had reduced its exposure to the Iranian financial sector and stopped providing services to the Export Development Bank of Iran. On November 21, 2011, the Obama Administration identified Iran as a \"jurisdiction of primary money laundering concern\" under Section 311 of the USA Patriot Act (31 U.S.C. 5318A), based on a determination that Iran's financial system, including the Central Bank, constitutes a threat to governments or financial institutions that do business with Iran's banks. The designation imposed additional requirements on U.S. banks to ensure against improper Iranian access to the U.S. financial system. The Administration justified the designation as implementation of recommendations of the Financial Action Task Force (FATF)—a multilateral standard-setting body for anti-money laundering and combating the financing of terrorism (AML/CFT). In 2016, the FATF characterized Iran as a \"high-risk and non-cooperative jurisdiction\" with respect to AMF/CFT issues. On June 24, 2016, the FATF welcomed an \"Action Plan\" filed by Iran to address its strategic AML/CFT deficiencies and decided to suspend, for one year, \"countermeasures\"—mostly voluntary recommendations of increased due diligence with respect to Iran transactions—pending an assessment of Iran's implementation of its Action Plan. The FATF continued the suspension of countermeasures in June and November 2017, and February 2018. On October 19, 2018, the FATF stated that Iran had only acted on 9 out of 10 of its guidelines, and that Iran's Majles had not completed legislation to adopt international standards. The FATF continued to suspend countermeasures and gave Iran until February 2019 to fully accede to all FATF guidelines. On February 22, 2019, the FATF stated that countermeasures remained suspended but that \"If by June 2019, Iran does not enact the remaining legislation in line with FATF Standards, then the FATF will require increased supervisory examination for branches and subsidiaries of financial institutions based in Iran. The FATF also expects Iran to continue to progress with enabling regulations and other amendments.\" On October 12, 2018, the Treasury Department Financial Crimes Enforcement Network (FINCEN) issued a warning to U.S. banks to guard against likely Iranian efforts to evade U.S. financial sanctions. Earlier, in January 1, 2013, OFAC issued an Advisory to highlight Iran's use of hawalas (traditional informal banking and money exchanges) in the Middle East and South Asia region to circumvent U.S. financial sanctions. Because the involvement of an Iranian client is often opaque, banks have sometimes inadvertently processed hawala transactions involving Iranians. Section 220 of the ITRSHRA required reports on electronic payments systems, such as the Brussels-based SWIFT (Society of Worldwide Interbank Financial Telecommunications), that do business with Iran. That law also authorizes—but neither it nor any other U.S. law or executive order mandates—sanctions against SWIFT or against electronic payments systems. Still, many transactions with Iran are subject to U.S. sanctions, no matter the payment mechanism. The National Defense Authorization Act for FY2013 ( H.R. 4310 , P.L. 112-239 , signed January 2, 2013)—Subtitle D, The Iran Freedom and Counter-Proliferation Act (IFCA), sanctions a wide swath of Iran's economy, touching several sectors. Its provisions on Iran's human rights record are discussed in the section on \" Measures to Sanction Human Rights Abuses and Promote the Opposition .\" Section 1244 of IFCA mandates the blocking of U.S.-based property of any entity (Iranian or non-Iranian) that provides goods, services, or other support to any Iranian entity designated by the Treasury Department as a \"specially designated national\" (SDN). The tables at the end of this report show that hundreds of Iranian entities are designated as SDNs under various executive orders. The Iranian entities designated for civilian economic activity were \"delisted\" to implement the JCPOA, but will be relisted on November 5, 2018. Section 1247 of IFCA prohibits from operating in the United States any bank that knowingly facilitates a financial transaction on behalf of an Iranian SDN. The section also specifically sanctions foreign banks that facilitate payment to Iran for natural gas unless the funds owed to Iran for the gas are placed in a local account. The section provides for a waiver for a period of 180 days. Several sections of IFCA impose ISA sanctions on entities determined to have engaged in specified transactions below. ( The provision s apply ISA sanctions but do not amend ISA .) Energy, Shipbuilding, and Shipping Sector . Section 1244 mandates 5 out of 12 ISA sanctions on entities that provide goods or services to Iran's energy, shipbuilding, and shipping sectors, or to port operations there—or which provide insurance for such transactions. The sanctions d o not apply when such transactions involve d purchases of Iranian oil by countries that have exemptions under P.L. 112-81 , or to the purchase of natural gas from Iran . This section goes back into effect after a 180-day wind-down period (by November 4, 2018). Dealings in Precious Metals . Section 1245 imposes 5 out of 12 ISA sanctions on entities that provide precious metals to Iran (including gold) or semifinished metals or software for integrating industrial processes. The section affected foreign firms that transferred these items or other precious metals to Iran in exchange for oil or any other product. There is no exception to this sanction for countries exempted under P.L. 112-81 . This section went back into effect after a 90-day wind-down period (August 6, 2018). Insurance for Related Activities . Section 1246 imposes 5 out of 12 ISA sanctions on entities that provide underwriting services, insurance, or reinsurance for any transactions sanctioned under any executive order on Iran, ISA, CISADA, the Iran Threat Reduction Act, INKSNA, other IFCA provisions, or any other Iran sanction, as well as to any Iranian SDN. ( There is no exception for countries exempted under P.L. 112-81 .) This provision goes back into effect after a 180-day wind-down period (by November 4, 2018). Exception for Afghanistan Reconstruction . Section 1244(f) of IFCA provides a sanctions exemption for transactions that provide reconstruction assistance for or further the economic development of Afghanistan. See JCPOA waivers below. On August 29, 2014, the State Department sanctioned UAE-based Goldentex FZE in accordance with IFCA for providing support to Iran's shipping sector. It was \"delisted\" from sanctions on Implementation Day of the JCPOA. On October 16, 2018, OFAC designated as terrorism-related entities several Iranian industrial companies on the grounds that they provide the Basij s ecurity force with revenue to support its operations in the Middle East. The designations, pursuant to E.O. 13224, mean that foreign firms that transact business with these Iranian industrial firms could be subject to U.S. sanctions under IFCA. The industrial firms—which were not previously designated and were therefore not \"relisted\" as SDNs on November 5, 2018, were Technotar Engineering Company; Iran Tractor Manufacturing Company; Iran's Zinc Mines Development Company and several related zinc producers; and Esfahan Mobarakeh Steel Company, the largest steel producer in the Middle East. Executive Order 13608 of May 1, 2012, gives the Department of the Treasury the ability to identify and sanction (cutting them off from the U.S. market) foreign persons who help Iran (or Syria) evade U.S. and multilateral sanctions. Several persons and entities have been designated for sanctions, as shown in the tables at the end of the report. The Trump Administration appears to be making increasing use of executive orders issued during the Obama Administration to sanction Iranian entities determined to be engaged in malicious cyberactivities or in transnational crime. Iranian entities have attacked, or attempted to attack, using cyberactivity, infrastructure in the United States, Saudi Arabia, and elsewhere. Iran's ability to conduct cyberattacks appears to be growing. Separately, the Justice Department has prosecuted Iranian entities for such activity. The section below discusses Executive Order 13694 on malicious cyberactivities and Executive Order 13581 on transnational crime. Executive Order 13694 blocks U.S.-based property of foreign entities determined to have engaged in cyber-enabled activities that (1) harm or compromise the provision of services by computers or computer networks supporting in the critical infrastructure sector; (2) compromise critical infrastructure; (3) disrupt computers or computer networks; or (4) cause misappropriation of funds, trade secrets, personal identifiers, or financial information for financial advantage or gain. Executive Order 13581 blocks the U.S.-based property of entities determined (1) to be a foreign person that constitutes a significant transnational criminal organization; (2) to have materially assisted any person sanctioned under this order; or (3) to be owned or controlled by or to have acted on behalf of a person sanctioned under the order. Iran-related entities sanctioned under the Orders are listed in the tables at the end of this report. Some U.S. laws require or call for divestment of shares of firms that conduct certain transactions with Iran. A divestment-promotion provision was contained in CISADA, providing a \"safe harbor\" for investment managers who sell shares of firms that invest in Iran's energy sector at levels that would trigger U.S. sanctions under the Iran Sanctions Act. As noted above, Section 219 of the ITRSHRA of 2012 requires companies to reports to the Securities and Exchange Commission whether they or any corporate affiliate has engaged in any transactions with Iran that could trigger sanctions under ISA, CISADA, and E.O 13382 and 13224. Implementation : Numerous states have adopted laws, regulations, and policies to divest from—or avoid state government business with—foreign companies that conduct certain transactions with Iran. The JCPOA requires the United States to work with state and local governments to ensure that state-level sanctions do not conflict with the sanctions relief provided by the federal government under the JCPOA. Most states that have adopted Iran sanctions continue to enforce those measures. A trend in U.S. policy and legislation since the June 12, 2009, election-related uprising in Iran has been to support the ability of the domestic opposition in Iran to communicate and to sanction Iranian officials that commit human rights abuses. Sanctions on the IRGC represent one facet of that trend because the IRGC is a key suppressive instrument. Individuals and entities designated under the executive orders and provisions discussed below are listed in the tables at the end of this report. For those provisions that ban visas to enter the United States, the State Department interprets the provisions to apply to all members of the designated entity. Some laws and Administration action focus on expanding internet freedom in Iran or preventing the Iranian government from using the internet to identify opponents. Subtitle D of the FY2010 Defense Authorization Act ( P.L. 111-84 ), called the \"VOICE\" (Victims of Iranian Censorship) Act, contained several provisions to increase U.S. broadcasting to Iran and to identify (in a report to be submitted 180 days after enactment) companies that are selling Iran technology equipment that it can use to suppress or monitor the internet usage of Iranians. The act authorized funds to document Iranian human rights abuses since the June 2009 Iranian presidential election. Section 1241 required an Administration report by January 31, 2010, on U.S. enforcement of sanctions against Iran and the effect of those sanctions on Iran. Section 106 of CISADA prohibits U.S. government contracts with foreign companies that sell technology that Iran could use to monitor or control Iranian usage of the internet. The provisions were directed, in part, against Nokia (Finland) and Siemens (Germany) for reportedly selling internet monitoring and censorship technology to Iran in 2008. The provision was derived from the Reduce Iranian Cyber-Suppression Act (111 th Congress, S. 1475 and H.R. 3284 ). On April 23, 2012, President Obama issued an executive order (13606) sanctioning persons who commit \"Grave Human Rights Abuses by the Governments of Iran and Syria via Information Technology (GHRAVITY).\" The order blocks the U.S.-based property and essentially bars U.S. entry and bans any U.S. trade with persons and entities listed in an Annex and persons or entities subsequently determined to be (1) operating any technology that allows the Iranian (or Syrian) government to disrupt, monitor, or track computer usage by citizens of those countries or assisting the two governments in such disruptions or monitoring; or (2) selling to Iran (or Syria) any technology that enables those governments to carry out such actions. Section 403 of the ITRSHRA sanctions (visa ban, U.S.-based property blocked) persons/firms determined to have engaged in censorship in Iran, limited access to media, or—for example, a foreign satellite service provider—supported Iranian government jamming or frequency manipulation. On October 9, 2012, the President issued Executive Order 13628 implementing Section 403 by blocking the property of persons/firms determined to have committed the censorship, limited free expression, or assisted in jamming communications. The order also specifies the sanctions authorities of the Department of State and of the Treasury. On March 8, 2010, OFAC amended the Iran Transactions Regulations to allow for a general license for providing free mass market software to Iranians. The ruling incorporated major features of the Iran Digital Empowerment Act ( H.R. 4301 in the 111 th Congress). The OFAC determination required a waiver of the provision of the Iran-Iraq Arms Nonproliferation Act (Section 1606 waiver provision) discussed above. Section 103(b)(2) of CISADA exempts from the U.S. export ban on Iran equipment to help Iranians communicate and use the internet. On March 20, 2012, the Department of the Treasury amended U.S.-Iran trade regulations to permit several additional types of software and information technology products to be exported to Iran under general license, provided the products were available at no cost to the user . The items included personal communications, personal data storage, browsers, plug-ins, document readers, and free mobile applications related to personal communications. On May 30, 2013, the Department of the Treasury amended the trade regulations further to allow for the sale, on a cash basis (no financing), to Iran of equipment that Iranians can use to communicate (e.g., cellphones, laptops, satellite internet, website hosting, and related products and services). Some legislation has sought to sanction regime officials involved in suppressing the domestic opposition in Iran or in human rights abuses more generally. Much of this legislation centers on amendments to Section 105 of CISADA. Sanctions against Iranian Human Rights Abusers. Section 105 of CISADA bans travel and freezes the U.S.-based assets of those Iranians determined to be human rights abusers. On September 29, 2010, pursuant to Section 105, President Obama issued Executive Order 13553 providing for CISADA sanctions against Iranians determined to be responsible for or complicit in post-2009 Iran election human rights abuses. Those sanctioned under the provisions are listed in the tables at the end of this report. Section 105 terminates if the President certifies to Congress that Iran has (1) unconditionally released all political prisoners detained in the aftermath of the June 2009 uprising; (2) ceased its practices of violence, unlawful detention, torture, and abuse of citizens who were engaged in peaceful protest; (3) fully investigated abuses of political activists that occurred after the uprising; and (4) committed to and is making progress toward establishing an independent judiciary and respecting human rights. Sanctions on Sales of Anti-Riot Equipment. Section 402 of the ITRSHRA amended Section 105 by adding provisions that sanction (visa ban, U.S. property blocked) any person or company that sells the Iranian government goods or technologies that it can use to commit human rights abuses against its people. Such goods include firearms, rubber bullets, police batons, chemical or pepper sprays, stun grenades, tear gas, water cannons, and like goods. In addition, ISA sanctions are to be imposed on any person determined to be selling such equipment to the IRGC. Sanctions a gainst Iranian Government Broadcasters /IRIB . Section 1248 of IFCA (Subtitle D of P.L. 112-239 ) mandates inclusion of the Islamic Republic of Iran Broadcasting (IRIB), the state broadcasting umbrella group, as a human rights abuser. IRIB was designated as an SDN on February 6, 2013, under E.O. 13628 for limiting free expression in Iran. On February 14, 2014, the State Department waived IFCA sanctions under Sections 1244, 1246, or 1247, on any entity that provides satellite connectivity services to IRIB. The waiver has been renewed each year since. Sanctions a gainst Iranian Profiteers . Section 1249 of IFCA amends Section 105 by imposing sanctions on any person determined to have engaged in corruption or to have diverted or misappropriated humanitarian goods or funds for such goods for the Iranian people. The measure is intended to sanction Iranian profiteers who are, for example, using official connections to corner the market for vital medicines. This provision, which remains in forces, essentially codifies a similar provision of Executive Order 13645. The Countering America's Adversaries through Sanctions Act (CAATSA, P.L. 115-44 ). Section 106 authorizes, but does not require, the imposition of the same sanctions as those prescribed in E.O. 13553 on persons responsible for extrajudicial killings, torture, or other gross violations of internationally recognized human rights against Iranians who seek to expose illegal activity by officials or to defend or promote human rights and freedoms in Iran. The persons to be sanctioned are those named in a report provided 90 days after CAATSA enactment (by October 31, 2017) and annually thereafter. The provision is similar to E.O. 13553 but, in contrast, applies broadly to Iranian human rights abuses and is not limited to abuses connected to suppressing the June 2009 uprising in Iran. Additional designations of Iranian human rights abusers under E.O. 13533 were made subsequent to the enactment of CAATSA and the October 31, 2017, CAATSA report deadline. Separate Visa Bans. On July 8, 2011, the State Department imposed visa restrictions on 50 Iranian officials for participating in political repression in Iran, but it did not name those banned on the grounds that visa records are confidential. The action was taken under the authorities of Section 212(a)(3)(C) of the Immigration and Nationality Act, which renders inadmissible to the United States a foreign person whose activities could have serious consequences for the United States. On May 30, 2013, the State Department announced it had imposed visa restrictions on an additional 60 Iranian officials on similar grounds. High Level Iranian Visits . There are certain exemptions in the case of high level Iranian visits to attend U.N. meetings in New York. The U.N. Participation Act (P.L. 79-264) provides for U.S. participation in the United Nations and as host nation of U.N. headquarters in New York, and visas are routinely issued to heads of state and their aides attending these meetings. In September 2012, the State Department refused visas for 20 members of Iranian President Ahmadinejad's traveling party on the grounds of past involvement in terrorism or human rights abuses. Still, in line with U.S. obligations under the act, then-President Ahmadinejad was allowed to fly to the United States on Iran Air, even though Iran Air was at the time a U.S.-sanctioned entity, and his plane reportedly was allowed to park at Andrews Air Force base. U.N. sanctions on Iran, enacted by the Security Council under Article 41 of Chapter VII of the U.N. Charter, applied to all U.N. member states. During 2006-2008, three U.N. Security Council resolutions—1737, 1747, and 1803—imposed sanctions on Iran's nuclear program and weapons of mass destruction (WMD) infrastructure. Resolution 1929, adopted on June 9, 2010, was key for its assertion that major sectors of the Iranian economy support Iran's nuclear program—giving U.N. member states authorization to sanction civilian sectors of Iran's economy. It also imposed strict limitations on Iran's development of ballistic missiles and imports and exports of arms. U.N. Security Council Resolution 2231 of July 20, 2015 endorsed the JCPOA and superseded all prior Iran-related resolutions as of Implementation Day (January 16, 2016). lifted all U.N. sanctions discussed above. The Resolution did not continue the mandate of the \"the panel of experts\" and the panel ended its operations. \"calls on\" Iran not to develop ballistic missiles \"designed to be capable\" of delivering a nuclear weapon for a maximum of eight years from Adoption Day (October 18, 2015). The restriction expires on October 18, 2023. And, 2231 is far less restrictive on Iran's missile program than is Resolution 1929. No specific sanctions are mandated in the Resolution if Iran conducted missile tests inconsistent with the Resolution. The JCPOA did not impose any specific missile-related requirements. requires Security Council approval for Iran to export arms or to purchase any arms (major combat systems named in the Resolution) for a maximum of five years from Adoption Day (until October 18, 2020). The JCPOA does not impose arms requirements. The U.S. withdrawal from the JCPOA did not change the status of Resolution 2231. U.N. and International Atomic Energy Agency reports since the JCPOA began implementation have stated that Iran is complying with its nuclear obligations under the JCPOA. That assessment was corroborated by U.S. intelligence leaders in January 29, 2019, testimony before the Senate Select Committee on Intelligence. U.N. reports on Iranian compliance with Resolution 2231 have noted assertions by several U.N. Security Council members, including the United States, that Iranian missile tests have been inconsistent with the Resolution. U.S. officials have called some of Iran's launches of its Khorramshahr missile as violations of the Resolution. The reports required by Resolution 2231, as well as those required by other Resolutions pertaining to various regional crises, such as that in Yemen, also note apparent violations of the Resolution 2231 restrictions on Iran's exportation of arms. The Security Council is responsible for prescribing penalties on Iran for violations, and no U.N. Security Council actions have been taken against Iran for these violations to date. Under Paragraph 6(c) of Annex B of Resolution 2231, entities sanctioned by the previous Iran-related Resolutions would continue to be sanctioned for up to eight years from Adoption Day (until October 2023). An attachment to the Annex listed 36 entities for which this restriction would no longer apply (entities \"delisted\") as of Implementation Day. Most of the entities immediately delisted were persons and entities connected to permitted aspects of Iran's nuclear program and its civilian economy. According to press reports, two entities not on the attachment list, Bank Sepah and Bank Sepah International PLC, also were delisted on Implementation Day by separate Security Council action. Paragraph 6(c) provides for the Security Council to be able to delist a listed entity at any time, as well as to add new entities to the sanctions list. Delisted entities are in italics in the table of U.N.-listed sanctioned entities at the end of the report. The following sections discuss sanctions relief provided under the November 2013 interim nuclear agreement (JPA) and, particularly, the JCPOA. Later sections discuss the degree to which Iran is receiving the expected benefits of sanctions relief. U.S. officials said that the JPA provided \"limited, temporary, targeted, and reversible\" easing of international sanctions. Under the JPA (in effect January 20, 2014-January 16, 2016) Iran's oil customers were not required reduce their oil purchases from Iran because waivers were issued for Section 1245(d)(1) of the National Defense Authorization Act for FY2012 ( P.L. 112-81 ) and Section 1244c(1) of IFCA. The Waivers of ITRSHRA and ISA provisions were issued to permit transactions with NIOC. The European Union amended its regulations to allow shipping insurers to provide insurance for ships carrying oil from Iran. A waiver of Section 1245(d)(1) of IFCA allowed Iran to receive directly $700 million per month in hard currency from oil sales and $65 million per month to make tuition payments for Iranian students abroad (paid directly to the schools). Executive Orders 13622 and 13645 and several provisions of U.S.-Iran trade regulations were suspended. Several sections of IFCA were waived to enable Iran to sell petrochemicals and trade in gold and other precious metals, and to conduct transactions with foreign firms involved in Iran's automotive manufacturing. Executive Order 13382 provisions and certain provisions of U.S.-Iran trade regulations were suspended for equipment sales to Iran Air. The United States licensed some safety-related repairs and inspections for certain Iranian airlines and issued a new \"Statement of Licensing Policy\" to enable U.S. aircraft manufacturers to sell equipment to Iranian airlines. The JPA required that the P5+1 \"not impose new nuclear-related sanctions ... to the extent permissible within their political systems.\" Under the JCPOA, sanctions relief occurred at Implementation Day (January 16, 2016), following IAEA certification that Iran had completed stipulated core nuclear tasks. U.S. secondary sanctions were waived or terminated, but most sanctions on direct U.S.-Iran trade. The secondary sanctions eased included (1) sanctions that limited Iran's exportation of oil and sanction foreign sales to Iran of gasoline and energy sector equipment, and which limit foreign investment in Iran's energy sector; (2) financial sector sanctions; and (3) sanctions on Iran's auto sector and trading in the rial . The EU lifted its ban on purchases of oil and gas from Iran; and Iranian banks were readmitted to the SWIFT electronic payments system. All U.N. sanctions were lifted. All of the U.S. sanctions that were eased will go back into effect on November 4, 2018, in accordance with the May 8, 2018, announcement that the United States will cease participating in the JCPOA. The Administration has stated that the purpose of reimposing the sanctions is to deny Iran the revenue with which to conduct regional malign activities and advance its missile, nuclear, and conventional weapons programs. The sanctions that went back into effect on August 7, 2018 (90-day wind-down period), are on the purchase or acquisition of U.S. bank notes by Iran; Iran's trade in gold and other precious metals; transactions in the Iranian rial ; activities relating to Iran's issuing of sovereign debt; transactions with Iran in graphite, aluminum, steel, coal, and industrial software; importation of Iranian luxury goods to the United States; and the sale to Iran of passenger aircraft (and aircraft with substantial U.S. content). The sanctions that went back into effect on November 5, 2018, are on petroleum-related transactions with Iran. port operators and energy, shipping, and shipbuilding sectors; and transactions by foreign banks with Iran's Central Banks (including the provision that restricts Iran's access to hard currency held in banks abroad). The laws below required waivers to implement U.S. commitments under the JCPOA, and all waivers were revoked in concert with the Trump Administration exit from the accord. All the provisions discussed below went back into effect on November 5, 2018. Iran Sanctions Act . The blanket energy/economic-related provisions of the ISA of P.L. 104-172 , as amended. (Section 4(c)(1)(A) waiver provision.) The WMD-related provision of ISA was not waived. FY2012 NDAA . Section 1245(d) of the National Defense Authorization Act for FY2012 ( P.L. 112-81 ) imposes sanctions on foreign banks of countries that do not reduce Iran oil imports. Iran Threat Reduction and Syria Human Rights Act ( P.L. 112-158 ) . Sections 212 and 213—the economy-related provisions of the act—were waived. The human rights-related provisions of the law were not waived. Iran Freedom and Counter-proliferation Act . Sections 1244, 1245, 1246, and 1247 of the Iran Freedom and Counter-Proliferation Act (Subtitle D of P.L. 112-239 ). The core provision of CISADA ( P.L. 111-195 ) that sanctions foreign banks was not waived, but most listed Iranian banks were \"delisted\" to implement the JCPOA, thereby making this CISADA provision largely moot. The Administration relisted all delisted Iranian banks on November 5, 2018. Executive Orders: 13574, 13590, 13622, 13645, and Sections 5-7 and 15 of Executive Order 13628 were revoked outright by Executive Order 13716. The orders were reinstated on August 6, 2018, by Executive Order 13846. The United States \"delisted\" for sanctions the specified Iranian economic entities and personalities listed in Attachment III of the JCPOA, including the National Iranian Oil Company (NIOC), various Iranian banks, and many energy and shipping-related institutions. That step enabled foreign companies/banks to resume transactions with those entities without risking being penalized by the United States. The tables at the end of the report depict in italics those entities delisted. Entities that were to be delisted on \"Transition Day\" (October 2023) are in bold type. The Administration relisted these entities for secondary sanctions, with selected exceptions (such as the AEOI and 23 subsidiaries), on November 5, 2018. The continued de-listing of the nuclear entities was in order to allow European and other U.S. partners to continue providing civilian nuclear assistance to Iran as permitted under the JCPOA. The JCPOA required the U.S. Administration, by \"Transition Day,\" to request that Congress lift virtually all of the sanctions that were suspended under the JCPOA. No outcome of such a request is mandated. The JCPOA requires all U.N. sanctions to terminate after 10 years of adoption (\"Termination Day\"). The U.S.-related provisions are rendered moot by the U.S. exit from the JCPOA. Even though it has reimposed all U.S. sanctions on Iran, the Trump Administration has issued some exceptions that are provided for under the various U.S. sanctions laws, including the following: As noted above, on November 5, 2018, eight countries were given the SRE to enable them to continue transactions with Iran's Central Bank and to purchase Iranian oil. At an April 10 hearing of the Senate Foreign Relations Committee, Secretary Pompeo appeared to indicate that the SREs would be renewed. However, on April 22 the Administration announced termination of the SREs as of their expiration on May 2, 2019. On May 3, the Administration ended some waivers under IFCA and various antiproliferation laws (discussed above) that allow international technical assistance to Iran's three nuclear sites permitted to operate under the JCPOA—the Fordow facility, the Bushehr nuclear power reactor, and the Arak heavy water plant. The Administration ended the waiver that enabled Rosatom (Russia) to remove Iran's LEU that exceeds the 300kg allowed stockpile, and that allowed Iran to export heavy water that exceeded the limits on that product to Oman. The waiver limitations also will prohibit the expansion of the Bushehr reactor by any supplier. In response, President Rouhani announced that Iran would no longer abide by the JCPOA stockpile limits. The Administration waived Section 1247(e) of IFCA to enable Iraq to continue paying for purchases of natural gas from Iran. The waiver term for that section is up to 180 days, but the Administration has been providing the waiver for 90-day increments. The Administration has issued the permitted IFCA exception for Afghan reconstruction to enable India to continue work at Iran's Chahbahar Port. A U.S. State Department official told Afghan leaders in mid-May 2019 that the exception would continue. The Administration has renewed the licenses of certain firms to enable them to continue developing the Rhum gas field in the North Sea that Iran partly owns. The JCPOA did not commit the United States to suspend U.S. sanctions on Iran for terrorism or human rights abuses, on foreign arms sales to Iran or sales of proliferation-sensitive technology such as ballistic missile technology, or on U.S.-Iran direct trade (with the selected exceptions of the latter discussed above). The sanctions below remained in place during JCPOA implementation and remain in effect now: E.O. 12959, the ban on U.S. trade with and investment in Iran; E.O. 13224 sanctioning terrorism entities, any sanctions related to Iran's designation as a state sponsor or terrorism, and any other terrorism-related sanctions. The JCPOA does not commit the United States to revoke Iran's placement on the terrorism list; E.O. 13382 sanctioning entities for proliferation; the Iran-Iraq Arms Non-Proliferation Act; the Iran-North Korea-Syria Non-Proliferation Act (INKSNA); the section of ISA that sanctions WMD- and arms-related transactions with Iran; E.O. 13438 on Iran's interference in Iraq and E.O. 13572 on repression in Syria; Executive Orders (E.O. 13606 and E.O. 13628) and the provisions of CISADA, ITRSHRA, and IFCA that pertain to human rights or democratic change in Iran; all sanctions on the IRGC, military, proliferation-related, and human rights- and terrorism-related entities, which were not \"delisted\" from sanctions; Treasury Department regulations barring Iran from access to the U.S. financial system. Foreign banks can pay Iran in dollars out of their existing dollar supply, and the Treasury Department revised its guidance in October 2016 to stress that such transactions are permitted. Sanctions might have been reimposed by congressional action in accordance with President Trump's withholding of certification of Iranian compliance with the JCPOA. Such certification under the Iran Nuclear Agreement Review Act (INARA, P.L. 114-17 ), was withheld in October 2017 and January and April of 2018. Congress had the opportunity to act on legislation, under expedited procedures, to reimpose sanctions that were suspended. Congress did not take such action. Additionally, the JCPOA (paragraph 36 and 37) contains a mechanism for the \"snap back\" of U.N. sanctions if Iran does not satisfactorily resolve a compliance dispute. According to the JCPOA (and Resolution 2231), the United States (or any veto-wielding member of the U.N. Security Council) would be able to block a U.N. Security Council resolution that would continue the lifting of U.N. sanctions despite Iran's refusal to resolve the dispute. In that case \"... the provisions of the old U.N. Security Council resolutions would be reimposed, unless the U.N. Security Council decides otherwise.\" There are no indications that the Administration plans to try to snap back U.N. sanctions under this process. However, some observers maintain that the Administration assertions in 2019 that Iran was not forthcoming with the IAEA about its past nuclear weapons research could potentially indicate that the Administration will trigger the snap-back mechanism. During 2010-2016, converging international views on Iran produced global consensus to pressure Iran through sanctions. In addition to asserting that the international community needed to ensure that Iran did not develop a nuclear weapon, some countries joined the sanctions regime to head off unwanted U.S. or other military action against Iran. Some countries cooperated in order to preserve their close relationships with the United States. This section assesses international cooperation and compliance with U.S. sanctions, and cooperation with U.S. sanctions reimposed as a consequence of the May 8, 2018, U.S. exit from the JCPOA. All the JCPOA parties publicly opposed the U.S. decision to exit the JCPOA and have sought to stay engaged in the Iran market in order to continue to provide the JCPOA's economic benefits to Iran. A comparison between U.S., U.N., and EU sanctions against Iran is contained in Table A-1 below. Broader issues of Iran's relations with the countries discussed in this section can be found in CRS Report R44017, Iran's Foreign and Defense Policies , by Kenneth Katzman. After the passage of Resolution 1929 in June 2010, European Union (EU) sanctions on Iran became nearly as extensive as those of the United States—a contrast from most of the 1990s, when the EU countries refused to join the 1995 U.S. trade and investment ban on Iran and (along with Japanese creditors) rescheduled $16 billion in Iranian debt bilaterally. In July 2002, Iran tapped international capital markets for the first time since the Islamic revolution, selling $500 million in bonds to European banks and, during 2002-2005, there were negotiations between the EU and Iran on a \"Trade and Cooperation Agreement\" (TCA) that would have lowered the tariffs or increased quotas for Iranian exports to the EU countries. Under the JCPOA, EU sanctions, most of which were imposed in 2012, were lifted, including the following: the ban on oil and gas imports from Iran. a ban on insurance for shipping oil or petrochemicals from Iran and a freeze on the assets of several Iranian firms involved in shipping. a ban on trade with Iran in gold, precious metals, diamonds, and petrochemicals. a freeze of the assets of Iran's Central Bank (except for approved civilian trade). a ban on transactions between European and all Iranian banks and on short-term export credits, guarantees, and insurance. a ban on exports to Iran of graphite, semi-finished metals such as aluminum and steel, industrial software, shipbuilding technology, oil storage capabilities, and flagging or classification services for Iranian tankers and cargo vessels. The cutoff of 14 EU-sanctioned Iranian banks from the Brussels-based SWIFT electronic payments system was lifted, and the Iranian banks resumed accessing the system in February 2016. A large number of entities that had been sanctioned by EU Council decisions and regulations over the years were \"delisted\" by the EU on Implementation Day. The following EU sanctions have remained in place: an embargo on sales to Iran of arms, missile technology, other proliferation-sensitive items, and gear for internal repression. a ban on 84 Iranian persons and one entity—all designated for human rights abuses or supporting terrorism—from visiting EU countries, and a freeze on their EU-based assets (see Table C-1 below). The EU countries have not reimposed sanctions on Iran and instead have sought to preserve the JCPOA by maintaining economic relations with Iran. However, to avoid risk to their positions in the large U.S. market, more than 100 companies—mostly in Europe—have left Iran since May 2018. In some cases, European companies have stopped doing business with Iran after being threatened with U.S. sanctions by U.S. diplomats. Some of the 100+ European companies that have ended investments in or transactions with Iran to avoid reimposed U.S. sanctions include the following: Oil Importation. No EU state has bought Iranian oil since U.S. energy sanctions went back into effect in November 2018, even though Italy and Greece were given SRE sanctions exemptions from November 5, 2018, until May 2, 2019. Cars. Renault and Citroen of France suspended their post-JCPOA $1 billion investments in a joint venture with two Iranian firms to boost Renault's car production capacity in Iran to 350,000 cars per year. On August 6, 2018, Daimler (manufacturer of Mercedes Benz autos) announced it was suspending its activities in Iran. Volkswagen followed suit one month later. Buses. Scania of Sweden established a factory in Iran to supply the country with 1,350 buses, but it is not clear whether this venture is still operating. Other Industry . German industrial giant Siemens signed an agreement in March 2016 with Iranian firm Mapna to transfer technology to produce gas turbines in Iran, and other contracts to upgrade Iran's railways. Siemens said in late 2018 that it would pursue no new Iranian business. Italy's Danieli industrial conglomerates and Gruppo Ventura have exited the Iranian market. Banking . Several banks have announced since the U.S. JCPOA exit a cessation of transactions with Iran: DZ Bank and Allianz of Germany; Oberbank of Austria; and Banque Wormser Freres of France. In July 2018, at U.S. request, Germany's central bank (Deutsche Bundesbank) introduced a rule change that blocked Iran's withdrawal of $400 million in cash from the Europaische-Iranische Handlesbank (EIH). EIH is reportedly at least partly owned by Iran and has often partnered on transactions with the Bundesbank. (EIH was \"de-listed\" from sanctions by the United States to implement the JCPOA, but was relisted on November 5, 2018.) Energy. On energy issues: Total SA has exited a nearly $5 billion energy investment in South Pars gas field, and it is transferring its stake to its joint venture partner, China National Petroleum Corporation. As noted above, European countries have reduced their purchases of Iranian oil. OMV of Austria has announced it would halt energy development work. Norway's Saga Energy (Norway is not in the EU) signed a $3 billion deal to build solar power plants in Iran, and Italy's FS signed a $1.4 billion agreement to build a high speed railway between Qom and Arak. These deals are still active. Shipping. Hapag-Lloyd of Germany and Denmark's AP Moller-Maersk have ceased shipping services to Iran. Telecommunications. Germany telecommunications firm Deutsche Telekom announced in September 2018 that it would end its business in Iran. Flights. Although air service is not subject to U.S. sanctions per se, Air France and British Air announced in September 2018 that they would cease service to Iran due to lack of demand. Rhum Gas Field . One project, the Rhum gas field in the North Sea that is partly owned by Iranian Oil Company (a subsidiary of NIOC), has been able to continue operating. In part because the field supplies about 5% of Britain's demand for natural gas, in October 2018, the Trump Administration renewed the license of BP and Serica Energy to continue providing goods and services to the field, despite the Iranian involvement in the project. The EU countries, in an attempt to persuade Iran to continue to adhere to the JCPOA, have undertaken several steps that run counter to Trump Administration policy. On August 6, 2018, a 1996 EU \"blocking statute\" that seeks to protect EU firms from reimposed U.S. sanctions took effect. In September 2018, EU countries announced small amounts of development assistance to Iran, apparently in order to demonstrate that the EU is making good faith efforts to provide Iran the economic benefits of the JCPOA. The EU subsequently designed a mechanism under which EU countries could continue to trade with Iran with relative immunity from U.S. sanctions. On September 25, 2018, Germany, France, and Britain, joined by Russia and China, as well as Iran, endorsed the creation of a \"special purpose vehicle\" (SPV)—an entity that would facilitate trade without utilizing dollar-denominated transactions with Iran, and without exposure to the U.S. market. In a January 31, 2019, joint statement, France, Britain, and Germany announced the formal registration of the SPV, formally termed the Instrument for Supporting Trade Exchanges (INSTEX). It is based in France, with German governance, and financial support from the three governments. It will initially focus on the sectors most essential to Iran, including medicines, medical devices, and food, and perhaps eventually provide a platform for non-European countries to trade with Iran in oil and other products. The operation of INSTEX depended on Iran setting up a counterparty vehicle in Europe and, in April 2019, Iran set up that counterparty as the \"Special Trade and Finance Instrument\" (STFI). Secretary of State Michael Pompeo denounced the plan as counterproductive, and Vice President Mike Pence, in mid-February 2019, criticized INSTEX as an outright attempt to undermine U.S. sanctions against Iran. Amid reported agitation among Iranian regime hardliners to exit the JCPOA because of the EU's failure to prevent harm to the Iranian economy, Iranian officials indicated the announcement represented a positive first step. Indicative of U.S. pressure on the EU not to begin INSTEX operations, on May 7, 2019, Treasury Department Under Secretary for Terrorism and Financial Intelligence Sigal Mandelker said that INSTEX is unlikely to fulfill EU pledges to prevent INSTEX from being used by Iran to launder money or fund terrorism. Mandelker's statement included an implicit threat to potentially sanction INSTEX or its counterparties. The U.S. concerns about INSTEX might be a product, at least in part, of the alleged involvement of sanctioned Iranian banks in Iran's STFI counterparty. While attempting to preserve civilian economic engagement with Iran, the European countries have sought to support U.S. efforts to counter Iran's terrorism and proliferation activities. In December 2018, Albania expelled Iran's ambassador and one other Iranian diplomat for involvement in a terrorism plot that was thwarted. In January 2019, the EU added Iran's intelligence service (MOIS) and two intelligence operatives to its terrorism-related sanctions list in response to allegations of Iranian terrorism plotting in Europe. Germany followed that move by denying landing rights to Iran's Mahan Air, which the United States has designated as a terrorism supporting entity. The management of the Brussels-based Swift electronic payments system has sought to balance financial risks with the policies of the EU governments. In March 2012, SWIFT acceded to an EU request to expel sanctioned Iranian banks. Some Iranian banks were still able to conduct electronic transactions with the European Central Bank via the \"Target II\" system. EU diplomats indicated they would not comply with U.S. requests to ask SWIFT to expel Iranian banks again, and no EU request to SWIFT to again expel sanctioned Iranian banks was made. However, SWIFT is run by an independent board and seeks to avoid risk of U.S. penalties. In late 2018, the system again disconnected the Iranian banks that were \"relisted\" for U.S. sanctions as of November 5, 2018. Russia and China, two permanent members of the U.N. Security Council and parties to the JCPOA, historically have imposed only those sanctions required by Security Council resolutions. Both governments opposed the U.S. withdrawal from the JCPOA. Many observers expect that, because companies in both countries have limited U.S. exposure and are strongly influenced by their governments, much of Iran's trade and economic engagement will shift to China and Russia from EU countries, Japan, and South Korea. Increasingly close politically primarily on the issue of the conflict in Syria, Iran and Russia have discussed expanding energy and trade cooperation. The two countries reportedly agreed on broad energy development deals during President Putin's visit to Tehran in late October 2017, with an estimated investment value of up to $30 billion, although implementation remains uncertain. In December 2018, Iran signed a free trade deal with the Russia-led \"Eurasian Economic Union,\" suggesting Russian intent not to abide by reimposed U.S. sanctions on Iran. The revenues of Russia's Rosatam conglomerate are likely to be reduced as a consequence of the Trump Administration's May 2019 ending of waivers for some assistance to Iran's nuclear program. In April 2015, Russia lifted its own restriction on delivering the S-300 air defense system that it sold Iran in 2007 but refused to deliver after Resolution 1929 was adopted—even though that Resolution technically did not bar supply of that defensive system. In April 2016, Russia began delivering the five S-300 batteries. Iran's Defense Minister visited Russia in February 2016 to discuss possible future purchases of major combat systems. No sales have been announced. China is a major factor in the effectiveness of any sanctions regime on Iran because China is Iran's largest oil customer. During 2012-2016, China was instrumental in reducing Iran's total oil exports because it cut its buys from Iran to about 435,000 barrels per day from its 2011 average of 600,000 barrels per day. The State Department asserted that, because China was the largest buyer of Iranian oil, percentage cuts by China had a large impact in reducing Iran's oil sales by volume and China merited an SRE. After sanctions were lifted in early 2016, China increased its purchases of Iranian oil to levels that sometimes exceeded those of 2011. Several Chinese energy firms that invested in Iran's energy sector put those projects on hold in 2012, but resumed or considered resuming work after sanctions were eased in 2016. Chinese firms also took over some EU country energy investments that have been divested after the reimposition of U.S. sanctions. Since the reimposition of U.S. sanctions, China appears to have reduced its oil imports from Iran somewhat (see Table 1 . The Administration gave China a SRE sanctions exception on November 5, 2018, in part to recognize import reductions but also possibly to avoid further complicating U.S. relations with China. However, China reportedly is continuing to import at least some Iranian oil despite the ending of the SRE as of May 2, 2019, in large part on the expectation that the Trump Administration will be hesitant to impose actual sanctions on Chinese banks for continuing to engage with Iran on oil payments. Prior to the expiration of the SREs, China had stockpiled 20 million barrels of Iranian oil at its Dalian port. Sanctions have complicated Iran-China banking and trade relations. During 2012-2016, China settled much of its trade balance with Iran with goods rather than hard currency, which was highly favorable to China financially. Iran's automotive sector obtains a significant proportion of its parts from China, including from China-based Geelran and Chery companies, and Iran's auto parts imports from China often fluctuate depending on the availability of trade financing. Iran and China also have a separate escrow account to pay for China's infrastructure projects in Iran, such as the long Niayesh Tunnel, funded by about $20 billion of Iran's hard currency reserves. However, suggesting that reimposed U.S. sanctions have again complicated Iran-China banking relations, China's Kunlun Bank—an affiliate of China's energy company CNPC and which was sanctioned under CISADA in 2012 as the main channel for money flows between the two countries—reportedly stopped accepting Euro and then China currency-denominated payments from Iran in November 2018. Existing Iranian accounts at the bank presumably can still be used to pay for Iranian imports from China. China's President Xi Jinping visited Iran and other Middle East countries in the immediate aftermath of the JCPOA, and he has stated that Iran is a vital link in an effort to extend its economic influence westward through its \"One Belt, One Road\" initiative. Chinese firms and entrepreneurs are integrating Iran into this vision by modernizing Iran's rail and other infrastructure, particularly where that infrastructure links to that of neighboring countries, including the Sultanate of Oman, funded by loans from China. Iran's place in this initiative offers China's government and firms incentive to avoid cooperating with U.S. sanctions. In April 2018, the Commerce Department (Bureau of Industry and Security, BIS, which administers Export Administration Regulations) issued a denial of export privileges action against China-based ZTE Corporation and its affiliates. The action was taken on the grounds that ZTE did not uphold the terms of March 2017 settlement agreement with BIS over ZTE's shipment of prohibited U.S. telecommunications technology to Iran (and North Korea). On March 27, 2019, OFAC announced a $1.9 million settlement with a Chinese subsidiary of the U.S. Black and Decker tool company for unauthorized exports of tools and parts to Iran. During 2010-2016, Japan and South Korea enforced sanctions on Iran similar to those imposed by the United States and the EU. Both countries cut imports of Iranian oil sharply after 2011, and banks in the two countries restricted Iran's access to the foreign exchange assets Iran held in their banks. From 2016-2018, both countries increased importation of Iranian oil, and Iran has been able to access funds in banks in both countries. Japan exports to Iran significant amounts of chemical and rubber products, as well as consumer electronics. South Korean firms have been active in energy infrastructure construction in Iran, and its exports to Iran are mainly iron, steel, consumer electronics, and appliances—meaning that South Korea could be affected significantly by the May 2019 executive order sanctioning transactions with Iran's minerals and metals sector. Both countries—and their companies—have historically been unwilling to undertake transactions with Iran that could violate U.S. sanctions, and firms in both countries have said they will comply with reimposed U.S. sanctions. South Korea, in particular, sought Administration concurrence to continue to import Iranian condensates (a petroleum product sometimes considered as crude oil), on which South Korea depends. Both countries reduced their Iranian oil purchases to zero in October 2018 and both countries received SRE sanctions exceptions on November 5. Japan resumed some Iranian oil importation in early 2019, and South Korea has been purchasing about 200,000 barrels per day of Iranian condensates. Both countries are widely assessed as likely to cease energy transactions with Iran entirely as a result of the Administration's decision to end SREs as of May 2, 2019, and South Korea reportedly is seeking to replace Iranian condensates supplies with those of Qatar and Australia. The following firms have announced their postures following the U.S. exit from the JCPOA: Daelim of South Korea terminated a $2 billion contract to expand an Iranian oil refinery. In late October, Hyundai cancelled a $500 million contract to build a petrochemical plant in Iran, citing \"financing difficulties.\" Car companies Mazda and Toyota of Japan and Hyundai of South Korea have suspended joint ventures to produce cars in Iran. Among banks, South Korea's Woori Bank and Industrial Bank of Korea have partly suspended transactions with Iran. Woori Bank reportedly is only using an Iran Central Bank account held there to process payments for South Korean humanitarian goods sold to Iran. Nomura Holdings of Japan has taken a similar position. The South Korean conglomerate POSCO withdrew from a 2016 deal to build a steel plant in Iran's free trade zone at the port of Chahbahar. North Korea, like Iran, has been subject to significant international sanctions. North Korea has never pledged to abide by international sanctions against Iran, and it reportedly cooperates with Iran on a wide range of WMD-related ventures, particularly the development of ballistic missiles. A portion of the oil that China buys from Iran (and from other suppliers) is reportedly sent to North Korea, but it is not known if North Korea buys any Iranian oil directly. The potential for North Korea to try to buy Iranian oil illicitly increased in the wake of the adoption in September 2017 of U.N. Security Council sanctions that limit North Korea's importation of oil, but there are no publicly known indications that it is doing so. While serving as Iran's president in 1989, the current Supreme Leader, Ayatollah Ali Khamene'i, visited North Korea. North Korea's titular head of state Kim Yong Nam attended President Rouhani's second inauguration in August 2017, and during his visit signed various technical cooperation agreements of unspecified scope. Taiwan has generally been a small buyer of Iranian oil. It resumed imports of Iranian oil after sanctions were eased in 2016. Taiwan received an SRE as of November 5, 2018, but has bought no Iranian oil since late 2018. It is unlikely to resume any Iranian oil imports now that the SREs have ended as of May 2, 2019. India cites U.N. Security Council resolutions on Iran as justification for its stances on trade with Iran. During 2011-2016, with U.N. sanctions in force, India's private sector assessed Iran as a \"controversial market\"—a term describing markets that entail reputational and financial risks. India's central bank ceased using a Tehran-based regional body, the Asian Clearing Union, to handle transactions with Iran, and the two countries agreed to settle half of India's oil buys from Iran in India's currency, the rupee. Iran used the rupee accounts to buy India's wheat, pharmaceuticals, rice, sugar, soybeans, auto parts, and other products. India reduced its imports of Iranian oil substantially after 2011, in the process incurring significant costs to retrofit refineries that were handling Iranian crude. However, after sanctions were eased in 2016, India's oil imports from Iran increased to as much as 800,000 bpd in July 2018—well above 2011 levels. Indian firms resumed work that had been ended or slowed during 2012-2016. India also paid Iran the $6.5 billion it owed for oil purchased during 2012-2016. India's cooperation with reimposed U.S. sanctions is mixed because no U.N. sanctions have been reimposed. In June 2018, the two countries again agreed to use rupee accounts for their bilateral trade. Nonetheless, India's purchases of Iranian oil appear to have fallen from levels of most of 2018, but volumes remain substantial. India received the SRE exception on November 5, 2018. Because some Indian banks do not have or seek a presence in the United States, it was widely expected that India and Iran will work out alternative payment arrangements under which India will continue importing at least some Iranian oil despite the end of the SRE as of May 2, 2019. However, Indian officials said in early May 2019 that India would comply with U.S. sanctions and find alternative suppliers, although some industry sources indicate that Indian refiners might still be buying some Iranian oil as of mid-May 2019. In 2015, India and Iran agreed that India would help develop Iran's Chahbahar port that would enable India to trade with Afghanistan unimpeded by Pakistan. With sanctions lifted, the project no longer entails risk to Indian firms involved. In May 2016, Indian Prime Minister Narendra Modi visited Iran and signed an agreement to invest $500 million to develop the port and related infrastructure. Construction at the port is proceeding. As noted above, the Administration has utilized the \"Afghanistan reconstruction\" exception under Section 1244(f) of IFCA to allow for firms to continue developing it. One test of Pakistan's compliance with sanctions was a pipeline project that would carry Iranian gas to Pakistan—a project that U.S. officials on several occasions stated would be subject to ISA sanctions. Despite that threat, agreement on the $7 billion project was finalized on June 12, 2010, and construction was formally inaugurated in a ceremony attended by the Presidents of both countries on March 11, 2013. In line with an agreed completion date of mid-2014, Iran reportedly completed the pipeline on its side of the border. China's announcement in April 2015 of a $3 billion investment in the project seemed to remove financial hurdles to the line's completion, and the JCPOA removed sanctions impediments to the project. However, during President Hassan Rouhani's visit to Pakistan in March 2016, Pakistan still did not commit to complete the line, and observers note that there are few indications of progress on the project. In 2009, India dissociated itself from the project over concerns about the security of the pipeline, the location at which the gas would be transferred to India, pricing of the gas, and tariffs. Iran has substantial economic relations with Turkey and the countries of the South Caucasus. Turkey buys about 40% of its oil from Iran, and bought about 6% of its total gas imports from Iran in 2017. Turkey reduced purchases of Iranian oil during 2012-2016, but its buys returned to 2011 levels after sanctions on Iran were eased in 2016. Turkey's leaders have said that the country will not cooperate with reimposed U.S. sanctions, but its oil import volumes from Iran have fallen since late 2018. Turkey received an SRE sanctions exemption on November 5, 2018, and its officials strongly indicated in late April 2019 that Turkey expected to receive another SRE as of the May 2, 2019, expiration. Turkey's insistence on being allowed to buy Iranian oil without fear of U.S. penalty—as well as its overall dependence on Iranian oil—might underpin a reported decision by Turkey to continue buying at least some Iranian oil despite the expiration of the SRE exception. Turkey also is Iran's main gas customer via a pipeline built in 1997, which at first was used for a swap arrangement under which gas from Turkmenistan was exported to Turkey. Direct Iranian gas exports to Turkey through the line began in 2001 (with additional such exports through a second pipeline built in 2013), but no ISA sanctions were imposed on the grounds that the gas supplies were crucial to Turkey's energy security. Prior to the October 2012 EU ban on gas purchases from Iran, this pipeline was a conduit for Iranian gas exports to Europe (primarily Bulgaria and Greece). Pre-JCPOA, in response to press reports that Turkey's Halkbank was settling Turkey's payments to Iran for energy with gold, U.S. officials testified on May 15, 2013, that the gold going from Turkey to Iran consists mainly of Iranian private citizens' purchases of Turkish gold to hedge against the value of the rial . A U.S. criminal case involved a dual Turkish-Iranian gold dealer, Reza Zarrab, arrested in the United States in 2016 for allegedly violating U.S. sanctions prohibiting helping Iran deal in precious metals. Among past cases of possible Turkish violations of Iran sanctions, on November 7, 2016, the U.S. Attorney for New York's Southern District indicted several individuals for using money services businesses in Turkey and in the UAE for conspiring to conceal from U.S. banks transactions on behalf of and for the benefit of sanctioned Iranian entities, including Mahan Air. On January 6, 2014, the Commerce Department blocked a Turkey-based firm (3K Aviation Consulting and Logistics) from re-exporting two U.S.-made jet engines to Iran's Pouya Airline. The rich energy reserves of the Caspian Sea create challenges for U.S. efforts to deny Iran financial resources. The Clinton and George W. Bush Administrations cited potential ISA sanctions to deter oil pipeline routes involving Iran—thereby successfully promoting an the alternate route from Azerbaijan (Baku) to Turkey (Ceyhan), which became operational in 2005. Section 6 of Executive Order 13622 exempts from sanctions any pipelines that bring gas from Azerbaijan to Europe and Turkey. Agreements reached in 2018 between Russia and the Caspian Sea states on the legal division of the sea could spawn new energy development in the Caspian. Iran's energy firms will undoubtedly become partners in joint ventures to develop the Caspian's resources, and Iran's involvement in such projects will require the Administration to determine whether to impose sanctions. Iran's relations with Azerbaijan—even though that country is inhabited mostly by Shiite Muslims—are hindered by substantial political and ideological differences. Iran and Azerbaijan have in recent years tried to downplay these differences for joint economic benefit, and they have been discussing joint energy and infrastructure projects among themselves and with other powers, including Russia. Iran and Armenia—Azerbaijan's adversary—have long enjoyed extensive economic relations: Armenia is Iran's largest direct gas customer, after Turkey. In May 2009, Iran and Armenia inaugurated a natural gas pipeline between the two, built by Gazprom of Russia. No determination of ISA sanctions was issued. Armenia has said its banking controls are strong and that Iran is unable to process transactions illicitly through Armenia's banks. However, observers in the South Caucasus assert that Iran is using Armenian banks operating in the Armenia-occupied Nagorno-Karabakh territory to circumvent international financial sanctions. The Gulf Cooperation Council states (GCC: Saudi Arabia, UAE, Qatar, Kuwait, Bahrain, and Oman) are oil exporters and close allies of the United States. As Iranian oil exports decreased after 2012, the Gulf states supplied the global oil market with additional oil. Since the U.S. exit from the JCPOA, U.S. officials have worked with Gulf oil exporters to ensure that the global oil market is well supplied even as Iranian oil exports fall. And the State Department's SRE announcement on April 22, 2019, indicated that the Administration is looking to Saudi Arabia and the UAE, in particular, to keep the global oil market well supplied after SREs end on May 2, 2019. Still, in order not to antagonize Iran, the Gulf countries maintain relatively normal trade with Iran. Some Gulf-based shipping companies, such as United Arab Shipping Company reportedly continued to pay port loading fees to such sanctioned IRGC-controlled port operators as Tidewater. The UAE has attracted U.S. scrutiny because of the large presence of Iranian firms there, and several UAE-based firms have been sanctioned, as noted in the tables at the end of the report. U.S. officials praised the UAE's March 1, 2012, ban on transactions with Iran by Dubai-based Noor Islamic Bank, which Iran reportedly used to process oil payments. Some Iranian gas condensates (120,000 barrels per day) were imported by Emirates National Oil Company (ENOC) and refined mostly into jet fuel. Subsequent to the May 8, 2018, U.S. exit from the JCPOA, ENOC officials said they were trying to find alternative supplies of the hydrocarbon products it buys from Iran. Iran and several of the Gulf states have had discussions on various energy and related projects, but few have materialized because of broad regional disputes between Iran and the Gulf states. Kuwait and Iran have held talks on the construction of a 350-mile pipeline that would bring Iranian gas to Kuwait, but the project does not appear to be materializing. Bahrain's discussions of purchasing Iranian gas have floundered over sharp political differences. Qatar and Iran share the large gas field in the Gulf waters between them, and their economic relations have become closer in light of the isolation of Qatar by three of its GCC neighbors, Saudi Arabia, UAE, and Bahrain. The only GCC state that has moved forward with economic joint ventures with Iran is Oman, particularly in the development of Oman's priority project to expand its port at Al Duqm port, which Oman and Iran envision as a major hub for regional trade. In September 2015, the two countries also recommitted to a gas pipeline joint venture. Omani banks, some of which operate in Iran, were used to implement some of the financial arrangements of the JPA and JCPOA. As a consequence, a total of $5.7 billion in Iranian funds had built up in Oman's Bank Muscat by the time of implementation of the JCPOA in January 2016. In its efforts to easily access these funds, Iran obtained from the Office of Foreign Assets Control (OFAC) of the Treasury Department a February 2016 special license to convert the funds (held as Omani rials) to dollars as a means of easily converting the funds into Euros. Iran ultimately used a different mechanism to access the funds as hard currency, but the special license issuance resulted in a May 2018 review by the majority of the Senate Permanent Subcommittee on Investigation to assess whether that license was consistent with U.S. regulations barring Iran access to the U.S. financial system. Iraq's attempts to remain close to its influential neighbor, Iran, have complicated Iraq's efforts to rebuild its economy yet avoid running afoul of the United States and U.S. sanctions on Iran. As noted above, in 2012, the United States sanctioned an Iraqi bank that was a key channel for Iraqi payments to Iran, but lifted those sanctions when the bank reduced that business. Iraq presented the United States with a sanctions-related dilemma in July 2013, when it signed an agreement with Iran to buy 850 million cubic feet per day of natural gas through a joint pipeline that enters Iraq at Diyala province and would supply several power plants. No sanctions were imposed on the arrangement, which was agreed while applicable sanctions were in effect. In May 2015, the Treasury Department sanctioned Iraq's Al Naser Airlines for helping Mahan Air (sanctioned entity) acquire nine aircraft. The Trump Administration reportedly is seeking to accommodate Iraq's need for Iranian electricity supplies and other economic interactions. As of October 2018, Iraq reportedly has discontinued crude oil swaps with Iran—about 50,000 barrels per day—in which Iranian oil flowed to the Kirkuk refinery and Iran supplied oil to Iraq's terminals in the Persian Gulf. The Administration reportedly has given Iraq waiver permission—apparently under Section 1247 of IFCA—to buy the Iranian natural gas that runs Iraq's power plants. That section provides for waivers of up to 180 days, but press reports indicate that the Administration has limited the waiver period to 90-day increments to give Iraq time to line up alternative supplies and equipment to generate electricity. The latest waiver rollover was in March 2019 and extends until June 2019. Iranian arms exports to Shia militias in Iraq remain prohibited by Resolution 2231, but no U.N. sanctions on that activity have been imposed to date. Iran has extensive economic relations with both Syria and Lebanon, countries where Iran asserts that core interests are at stake. The compliance of Syrian or Lebanese banks and other institutions with international sanctions against Iran was limited even during 2012-2015. Iran reportedly uses banks in Lebanon to skirt financial sanctions, according to a wide range of observers, and these banks are among the conduits for Iran to provide financial assistance to Hezbollah as well as to the regime of Syrian President Bashar Al Assad. However, some reports indicate that sanctions on Iran are adversely affecting Hezbollah's finances to the point where the party has had to cut expenses, request donations, and delay or reduce payments to its fighters. In January 2017, Iran and Syria signed a series of economic agreements giving Iranian firms increased access to Syria's mining, agriculture, and telecommunications sectors, as well as management of a Syrian port. During the presidency of Ahmadinejad, Iran looked to several Latin American and African countries to try to circumvent international sanctions. For the most part, however, Iran's trade and other business dealings with these regions are apparently too modest to weaken the effect of international sanctions significantly. The united approach to sanctions on Iran during 2010-2016 carried over to international lending to Iran. The United States representative to international financial institutions is required to vote against international lending, but that vote, although weighted, is not sufficient to block international lending. No new loans have been approved to Iran since 2005, including several environmental projects under the Bank's \"Global Environmental Facility\" (GEF). The initiative slated more than $7.5 million in loans for Iran to dispose of harmful chemicals. The 2016 lifting of sanctions increased international support for new international lending to Iran, but the U.S. exit from the JCPOA will likely lead to differences between the United States and other lenders over extending any new loans to Iran. Earlier, in 1993, the United States voted its 16.5% share of the World Bank against loans to Iran of $460 million for electricity, health, and irrigation projects, but the loans were approved. To block that lending, the FY1994-FY1996 foreign aid appropriations ( P.L. 103-87 , P.L. 103-306 , and P.L. 104-107 ) cut the amount appropriated for the U.S. contribution to the bank by the amount of those loans, contributing to a temporary halt in new bank lending to Iran. But, in May 2000, the United States' allies outvoted the United States to approve $232 million in loans for health and sewage projects. During April 2003-May 2005, a total of $725 million in loans were approved for environmental management, housing reform, water and sanitation projects, and land management projects, in addition to $400 million in loans for earthquake relief. An issue related to sanctions is Iran's request to join the World Trade Organization (WTO). Iran began accession talks in 2006 after the George W. Bush Administration dropped its objection to Iran's application as part of an effort to incentivize Iran to reach an interim nuclear agreement. The lifting of sanctions presumably paves the way for talks to accelerate, but the accession process generally takes many years. Accession generally takes place by consensus of existing WTO members. Iran's accession might be complicated by the requirement that existing members trade with other members; as noted above, the U.S. ban on trade with Iran remains in force. The Trump Administration does not advocate Iran's admission to that convention. It can be argued that the question \"are sanctions on Iran 'working'?\" should be assessed based on an analysis of the goals of the sanctions. The following sections try to assess the effectiveness of Iran sanctions according to a number of criteria. The international sanctions regime of 2011-2016 is widely credited with increasing Iran's willingness to accept restraints on its nuclear program, as stipulated in the JCPOA. Hassan Rouhani was elected president of Iran in June 2013 in part because of his stated commitment to achieving an easing of sanctions and ending Iran's international isolation. Still, as to the long-term effects of sanctions, the intelligence community assesses that it \"does not know\" whether Iran plans to eventually develop a nuclear weapon, and the JCPOA restrictions begin to expire in 2025. Iran remained in the JCPOA despite the U.S. exit from it, but Rouhani has announced that, in response to the ending of U.S. nuclear waivers and other steps such as the FTO designation of the IRGC, Iran will cease abiding by JCPOA restrictions on stockpiles of low-enriched uranium and heavy water. Still, Iran has not withdrawn from the JCPOA outright. Yet, Iranian leaders have not, to date, taken up the Trump Administration's stated offer for negotiations on a new agreement that would cover not only Iran's nuclear program but also its missile program and its regional malign activities. Both President Trump and President Rouhani have publicly said they would accept bilateral talks without conditions, but both leaders generally indicate that the other's demands are too extensive to make such a meeting productive. There is little evidence that even the strict sanctions of 2011-2016 slowed Iran's nuclear program or its missile program. And, even though U.S. and EU sanctions remain on Iran's missile programs, U.S. intelligence officials have testified that Iran continues to expand the scale, reach, and sophistication of its ballistic missile arsenal. Still, some U.S. officials have asserted that Iran's nuclear and missile programs might have advanced faster were sanctions not imposed. Sanctions have apparently prevented Iran from buying significant amounts of major combat systems since the early 1990s. Iran's indigenous arms industry has grown over the past two decades. U.S. intelligence directors testified in January 2019 that Iran continues to field increasingly lethal weapons systems, including more advanced naval mines and ballistic missiles, small submarines, armed UAVs (unmanned aerial vehicles), coastal defense cruise missile batteries, attack craft, and anti-ship ballistic missiles. Iran has been able to acquire some defensive systems that were not specifically banned by Resolution 2231; Russia delivered the S-300 air defense system in April 2016. Neither the imposition, lifting, nor reimposition of strict sanctions has appeared to affect Iran's regional behavior. Iran intervened extensively in Syria, Iraq, and Yemen during the 2012-2016 period when sanctions had a significant adverse effect on Iran's economy. Iran apparently is able to manufacture domestically much of the weaponry it supplies to its regional allies. Iran has remained engaged in these regional conflicts since sanctions were eased in early 2016. On the other hand, press reports since March 2019 note that Iran has scaled back payments to Hezbollah and to various pro-Iranian fighters in Syria, perhaps as a reflection of Iranian financial difficulties. An alternate explanation is that Iran is adjusting its expenditures in the Syria conflict to the reduced activity on the battlefield there. The Administration points to reports of the reduced payments as evidence that its \"maximum pressure\" campaign on Iran is working. The Administration has asserted that the easing of sanctions during the period of U.S. implementation of the JCPOA (2016-2018) caused Iran to expand its regional activities. President Trump stated that Iran's defense budget had increased 40% during that time. He stated on August 6, 2018, that \"Since the deal [JCPOA] was reached, Iran's aggression has only increased. The regime has used the windfall of newly accessible funds it received under the JCPOA to build nuclear-capable missiles, fund terrorism, and fuel conflict across the Middle East and beyond.... The reimposition of nuclear-related sanctions through today's actions further intensifies pressure on Tehran to change its conduct.\" However, most outside Iran experts who assess Iran's regional activities asserted that Iran's regional activities were not facilitated by the easing of sanctions during that period, but instead increased because of the opportunities to expand its influence that were provided by Iran by the region's several conflicts. In terms of congressional oversight, a provision of the FY2016 Consolidated Appropriation ( P.L. 114-113 ) required an Administration report to Congress on how Iran has used the financial benefits of sanctions relief. And, a provision of the Iran Nuclear Agreement Review Act ( P.L. 114-17 ) requires that a semiannual report on Iran's compliance with the JCPOA include information on any Iranian use of funds to support acts of terrorism. No U.S. Administration, including the Trump Administration, has asserted that sanctions on Iran are intended to bring about the change of Iran's regime, although some experts assert that this might be a desired Trump Administration goal. Iranians seeking reintegration with the international community and sanctions relief helped propel the relatively moderate Rouhani to election victories in both 2013 and 2017. Many Iranians cheered the finalization of the JCPOA on July 15, 2015, undoubtedly contributing to Supreme Leader Khamene'i's acceptance of the deal. Despite the Trump Administration's withdrawal from the JCPOA and its additional steps to pressure Iran in 2019, there does not appear to be an imminent political threat to Rouhani's grip on his office. Still, the IRGC and other hardliners control domestic security and the judiciary, and these factions have criticized Rouhani for remaining in the JCPOA despite the U.S. exit. In July 2018, the IRGC and Iran's parliament ( Majles ) called for cabinet changes to address economic mismanagement and, in September 2018, the Majles compelled Rouhani to be questioned about the economic situation. In July 2018, Rouhani replaced Iran's Central Bank governor as an apparent gesture to indicate responsiveness to economic concerns. In February 2019, apparently under pressure from hardliners, Foreign Minister Mohammad Javad Zarif announced his resignation, but Rouhani—apparently as a challenge to the hardliners—did not accept the resignation and reinstated him. Some assert that the sanctions are sustaining the periodic unrest that has erupted in Iran since late 2017. In 2018 and thus far in 2019, labor strikes and unrest among women protesting the strict public dress code have continued, although not at a level that appears to threaten the regime. Other protests occurred over flooding in the southwest in March-April 2019, but again not to the level where the regime was threatened. Still, some protesters complain that the country's money is being spent on regional interventions rather than on the domestic economy. The U.S. sanctions enacted since 2011, when fully implemented, take a substantial toll on Iran's economy. GDP and Employment Trends . At the height of the sanctions regime in April 2015, then-Treasury Secretary Jacob Lew said that Iran's gross domestic product (GDP) was 15%-20% smaller than it would have been had global sanctions not been imposed in 2011. The unemployment rate rose to about 20% by 2014, and many Iranians worked unpaid or partially paid. In 2015, Iran's GDP was about $400 billion at the official exchange rate ($1.4 trillion if assessed on a purchasing power parity [PPP] basis). The 2016 lifting of sanctions enabled Iran to achieve 7% annual growth during 2016-2018. The reimposition of U.S. sanctions in mid-2018 caused Iran's GDP to decline 2% from March 2018 to March 2019, and it is projected to decline by more than 5% during March 2019-March 2020. Oil Exports . Global Iran sanctions (2011-2016) reduced Iran's crude oil sales about 60% from the 2.5 mbd level of 2011, causing Iran to lose over $160 billion in oil revenues during that time. The JCPOA sanctions relief enabled Iran to increase its oil exports to 2011 levels, but the reimposition of U.S. sanctions has driven Iran's oil exports to under 1 mbd as of the end of April 2019. The Trump Administration said in an April 2019 factsheet that the reimposition of sanctions since May 2018 has cost Iran $10 billion in lost oil revenues. The May 2019 end to SREs was an effort to cause Iran's oil exports to fall to zero, although results will depend on whether China, India, and Turkey continue buying Iran oil. Bankin g. Global banks mostly left the Iranian market after 2011 because of the international sanctions in force. Banks were hesitant to reenter the Iran market after the 2016 easing of sanctions because of (1) reported concerns that the United States might still sanction their transactions with Iran; (2) a lack of transparency in Iran's financial sector; (3) lingering concerns over past financial penalties for processing Iran-related transactions in the U.S. financial system; and (4) extra costs and procedures caused by the inability to process Iran-related transactions through the U.S. financial system and/or easily use dollars in Iran-related transactions. Those banks that did reenter the Iran market have, as a consequence of the U.S. exit from the JCPOA, stopped or limited their transactions with Iran. Shipping Insurance . Iran was able after 2016 to obtain shipping insurance as a result of U.S. waivers given to numerous insurers, as discussed above. However, as of August 7, 2018, U.S.-based shipping reinsurers no longer have active U.S. waivers, and Iran has been compelled to self-insure most of its shipments. Hard Currency A ccessib ility . The 2011-2016 sanctions regime prevented Iran from accessing the hard currency it was being paid for its oil. By January 2016, Iran's hard currency reserves held in foreign banks stood at about $115 billion. Iranian officials stated in February 2016 that sanctions relief had allowed them to access the funds, and it could move the funds via renewed access to the SWIFT electronic payments system. Of this amount, about $60 billion was due to creditors such as China ($20 billion) or to repay nonperforming loans extended to Iranian energy companies working in the Caspian and other areas in Iran's immediate neighborhood. After 2016, Iran kept most of its reserves abroad for cash management and to pay for imports, but Iran's foreign reserves are again restricted by reimposed U.S. sanctions. Currency Decline . Sanctions caused the value of the rial on unofficial markets to decline about 60% from January 2012 until the 2013, when the election of Rouhani stabilized the rial at about 35,000 to the dollar. The reimposition of U.S. sanctions in 2018 caused the rial 's value to plummet to 150,000 to the dollar by the November 5, 2018. The value later recovered somewhat to about 100,000 to one at the beginning of 2019. The downturn has made it difficult for Iranian merchants to import goods or properly price merchandise, and the government has banned the importation of 1,400 goods to preserve hard currency. Inflation . The drop in value of the currency caused inflation to accelerate during 2011-2013 to a rate of about 60%—a higher figure than that acknowledged by Iran's Central Bank. As sanctions were eased, inflation slowed to the single digits by June 2016, meeting the Central Bank's stated goal. However, in 2017, the inflation rate reportedly increased back to double digits, and turmoil surrounding the possible U.S. exit from the JCPOA caused inflation to increase to about 15% by late June 2018. It increased significantly, to nearly 40%, by the end of 2018. Industrial/Auto Production and Sales . Iran's light-medium manufacturing sector was expanding prior to 2011, but its dependence on imported parts left the sector vulnerable to sanctions that reduced the availability of import financing. Iran's vehicle production fell by about 60% from 2011 to 2013. Press reports say that the auto sector, and manufacturing overall, rebounded since sanctions were lifted, but is declining again in light of the announced divestments by auto makers following the U.S. exit from the JCPOA. Researchers at Iran's parliament estimated in September 2018 that auto production would decline 45% by March 2019, and other industrial production would drop by 5%. U.S.-Iran Trade. U.S.-Iran trade remains negligible. In 2015, the last full year before JCPOA implementation, the United States sold $281 million in goods to Iran and imported $10 million worth of Iranian products. The slight relaxation of the U.S. import ban stemming from the JCPOA likely accounts for the significant increase in imports from Iran in 2016 to $86 million. U.S. imports from Iran were about $63 million in 2017 and about that same amount in 2018. U.S. exports to Iran remained low for all of 2016 and 2017 ($172 million and $137 million, respectively) but spiked to $440 million for 2018. Iran had some success mitigating the economic effect of sanctions. These strategies will likely be used to try to cope with reimposed U.S. sanctions. Export Diversification . Over the past 10 years, Iran has promoted sales of nonoil products such as minerals, cement, urea fertilizer, and other agricultural and basic industrial goods. Such \"nonoil\" exports now generate much of the revenue that funds Iran's imports. This diversification might have been a factor in the Trump Administration decision in May 2019 to sanction Iran's mineral and metals sector (see above). Even in the energy sector, Iran has promoted the sale of oil products such as petrochemicals and condensates, earning about $4.7 billion in revenue from that source by 2016. Reallocation of Investment Funds and Import Substitution . Sanctions compelled some Iranian manufacturers to increase domestic production of some goods as substitutes for imports. This trend has been hailed by Iranian economists and Supreme Leader Khamene'i, who supports building a \"resistance economy\" that is less dependent on imports and foreign investment. Partial Privatization/IRGC in the Economy . Over the past few years, portions of Iran's state-owned enterprises have been transferred to the control of quasi-governmental or partially private entities. Some of them are incorporated as holding companies, foundations, or investment groups. Based on data from the Iranian Privatization Organization, there are about 120 such entities that account for a significant proportion of Iran's GDP. Rouhani has sought to push the IRGC out of Iran's economy through divestment, to the extent possible. However, a substantial part of the economy remains controlled by government-linked conglomerates, including the IRGC. Although estimates vary widely, the IRGC's corporate affiliates are commonly assessed as controlling at least 20% of Iran's economy, although there is little available information on the degree of IRGC-affiliated ownership stakes. Subsidy Reductions . In 2007, the Ahmadinejad government began trying to wean the population off of generous subsidies by compensating families with cash payments of about $40 per month. Gasoline prices were raised to levels similar to those in other regional countries, and far above the subsidized price of 40 cents per gallon. Rouhani has continued to reduce subsidies, including by raising gasoline and staple food prices further and limiting the cash payments to only those families who could claim financial hardship. Rouhani also has improved collections of taxes and of price increases for electricity and natural gas utilities. Import Restrictions /Currency Controls . To conserve hard currency, Iran has at times reduced the supply of hard currency to importers of luxury goods, such as cars or cellphones, in order to maintain hard currency supplies to importers of essential goods. These restrictions eased after sanctions were lifted in 2016 but were reimposed in 2018 to deal with economic unrest and the falling value of the rial . The Iran Sanctions Act (ISA) was enacted in large part to reduce Iran's oil and gas production capacity over the longer term by denying Iran the outside technology and investment to maintain or increase production. U.S. officials estimated in 2011 that Iran had lost $60 billion in investment in the sector as numerous major firms pulled out of Iran. Iran says it needs $130 billion-$145 billion in new investment by 2020 to keep oil production capacity from falling. Further development of the large South Pars gas field alone requires $100 billion. Table B-1 at the end of this report discusses various Iranian oil and gas fields and the fate of post-1999 investments in them. During 2012-2016, there was little development activity at Iran's various oil and gas development sites, as energy firms sought to avoid sanctions. Some foreign investors resold their equity stakes to Iranian companies. However, the Iranian firms are not as technically capable as the international firms that have withdrawn. The lifting of sanctions in 2016 lured at least some foreign investors back into the sector, encouraged by Iran's more generous investment terms under a concept called the \"Iran Petroleum Contract.\" That contract gives investing companies the rights to a set percentage of Iran's oil reserves for 20-25 years. Iran signed a number of new agreements with international energy firms since mid-2016 but, as noted in the tables and other information above, major energy firms have begun to divest in response to the U.S. exit from the JCPOA. Sanctions relief also opened opportunities for Iran to resume developing its gas sector. Iran has used its gas development primarily to reinject into its oil fields rather than to export. Iran exports about 3.6 trillion cubic feet of gas, primarily to Turkey and Armenia. Sanctions have rendered Iran unable to develop a liquefied natural gas (LNG) export business. However, it was reported in March 2017 that the Philippine National Oil Company is seeking to build a 2-million-ton LNG plant in Iran, suggesting that patent issues do not necessarily preclude Iran from pursuing LNG. With respect to gasoline, the enactment of the CISADA law targeting sales of gasoline to Iran had a measurable effect. Several suppliers stopped selling gasoline to Iran once enactment appeared likely, and others ceased supplying Iran after enactment. Gasoline deliveries to Iran fell from about 120,000 barrels per day before CISADA to about 30,000 barrels per day immediately thereafter, although importation later increased to about 50,000 barrels per day. As a result, Iran expanded several of its refineries and, in 2017, Iranian officials said Iran had become largely self-sufficient in gasoline production. It is difficult to draw any direct relationship between sanctions and Iran's human rights practices. Recent human rights reports by the State Department and the U.N. Special Rapporteur on Iran's human rights practices assess that there was only modest improvement in some of Iran's practices in recent years, particularly relaxation of enforcement of the public dress code for women. The altered policies cannot necessarily be attributed to sanctions pressure or sanctions relief, although some might argue that sanctions-induced economic dissatisfaction emboldened Iranians to protest and to compel the government to relax some restrictions. Since at least 2012, foreign firms have generally refrained from selling the Iranian government equipment to monitor or censor social media use. Such firms include German telecommunications firm Siemens, Chinese internet infrastructure firm Huawei, and South African firm MTN Group. In October 2012, Eutelsat, a significant provider of satellite service to Iran's state broadcasting establishment, ended that relationship after the EU sanctioned the then head of the Islamic Republic of Iran Broadcasting (IRIB), Ezzatollah Zarghami. However, the regime retains the ability to monitor and censor social media use. During 2012-2016, sanctions produced significant humanitarian-related effects, particularly in limiting the population's ability to obtain expensive Western-made medicines, such as chemotherapy drugs. Some of the scarcity was caused by banks' refusal to finance such sales, even though doing so was not subject to any sanctions. Some observers say the Iranian government exaggerated reports of medicine shortages to generate opposition to the sanctions. Other accounts say that Iranians, particularly those with connections to the government, took advantage of medicine shortages by cornering the import market for key medicines. These shortages resurfaced in 2018 following the reimposition of sanctions by the Trump Administration. For example, reports indicate that the reimposition of U.S. sanctions may be inhibiting the flow of humanitarian goods to the Iranian people and reportedly contributing to shortages in medicine to treat ailments such as multiple sclerosis and cancer. Other reports indicate that Cargill, Bunge, and other global food traders have halted supplying Iran because of the absence of trade financing. And, Iranian officials and some international relief groups have complained that U.S. sanctions inhibited the ability to provide relief to flooding victims in southwestern Iran in March-April 2019. EU officials have called on the United States to produce a \"white list\" that would \"give clear guidelines about what channels European banks and companies should follow to conduct legitimate [humanitarian] transactions with Iran without fear of future penalties.\" Iranian officials have also accused U.S. sanctions of hampering international relief efforts for victims of vast areas of flooding in southwestern Iran in the spring of 2019. Other reports say that pollution in Tehran and other big cities is made worse by sanctions because Iran produces gasoline itself with methods that cause more impurities than imported gasoline. As noted above, Iran's efforts to deal with environmental hazards and problems might be hindered by denial of World Bank lending for that purpose. In the aviation sector, some Iranian pilots complained publicly that U.S. sanctions caused Iran's passenger airline fleet to deteriorate to the point of jeopardizing safety. Since the U.S. trade ban was imposed in 1995, 1,700 passengers and crew of Iranian aircraft have been killed in air accidents, although it is not clear how many of the crashes, if any, were due to difficultly in acquiring U.S. spare parts. Sanctions relief ameliorated at least some of the humanitarian difficulties discussed above. In the aviation sector, several sales of passenger aircraft have been announced, and licensed by the Department of the Treasury, since Implementation Day. However, as noted, the licenses are being revoked and deliveries will not proceed beyond November 2018. In February 2016, Iran Air—which was delisted from U.S. sanctions as of Implementation Day—announced it would purchase 118 Airbus commercial aircraft at an estimated value of $27 billion. Airbus received an OFAC license and three of the aircraft have been delivered. Airbus has said it will not deliver any more aircraft to Iran because its U.S. Treasury Department license is revoked. In December 2016, Boeing and Iran Air finalized an agreement for Boeing to sell the airline 80 passenger aircraft and lease 29 others. Boeing received a specific license for the transaction. The deal has a total estimated value of about $17 billion, with deliveries scheduled to start later in 2018. The Boeing sale is to include 30 of the 777 model. None were delivered, and Boeing cancelled planned deliveries to Iran after its export licenses were revoked. In April 2017, Iran's Aseman Airlines signed a tentative agreement to buy at least 30 Boeing MAX passenger aircraft. No U.S. license for this sale was announced prior to the U.S. exit from the JCPOA. The airline is owned by Iran's civil service pension fund but managed as a private company. In June 2017, Airbus agreed to tentative sales of 45 A320 aircraft to Iran's Airtour Airline, and of 28 A320 and A330 aircraft to Iran's Zagros Airlines. No U.S. license for the sale was announced prior to the U.S. exit from the JCPOA. ATR, owned by Airbus and Italy's Leonardo, sold 20 aircraft to Iran Air. It delivered eight aircraft by the time of the U.S. JCPOA exit. It reportedly has been given temporary U.S. Treasury Department licenses to deliver another five after the August 6, 2018, initial sanctions reimposition in which its U.S. export licenses were to be revoked. JCPOA oversight and implications, and broader issues of Iran's behavior have been the subject of legislation. The JCPOA states that as long as Iran fully complies with the JCPOA, the sanctions that were suspended or lifted shall not be reimposed on other bases (such as terrorism or human rights). The Obama Administration stated that it would adhere to that provision but that some new sanctions that seek to limit Iran's military power, its human rights abuses, or its support for militant groups might not necessarily violate the JCPOA. The Iran Nuclear Agreement Review Act of 2015 (INARA, P.L. 114-17 ) provided for a 30- or 60-day congressional review period after which Congress could pass legislation to approve or to disapprove of the JCPOA, or do nothing. No such legislation of disapproval was enacted. There are several certification and reporting requirements under INARA, although most of them clearly no longer apply as a result of the Trump Administration withdrawal: Material Breach Report . The President must report a potentially significant Iranian breach of the agreement within 10 days of acquiring credible information of such. Within another 30 days, the President must determine whether this is a material breach and whether Iran has cured the breach. Certification Report . The President is required to certify, every 90 days, that Iran is \"transparently, verifiably, and fully implementing\" the agreement, and that Iran has not taken any action to advance a nuclear weapons program. The latest certification was submitted on July 17, 2017, and another one was due on October 15, 2017. On October 13, 2017, the Administration declined to make that certification, on the grounds that continued sanctions relief is not appropriate and proportionate to Iran's measures to terminate its illicit nuclear program (Section (d)(6)(iv)(I) of INARA). If a breach is reported, or if the President does not certify compliance, Congress may initiate within 60 days \"expedited consideration\" of legislation that would reimpose any Iran sanctions that the President had suspended through use of waiver or other authority. That 60-day period is to expire on December 12, 2017. Semiannual Report. INARA also requires an Administration report every 180 days on Iran's nuclear program, including not only Iran's compliance with its nuclear commitments but also whether Iranian banks are involved in terrorism financing; Iran's ballistic missile advances; and whether Iran continues to support terrorism. The FY2016 Consolidated Appropriation ( P.L. 114-113 ) contained a provision amending the Visa Waiver Program to require a visa to visit the United States for any person who has visited Iraq, Syria, or any terrorism list country (Iran and Sudan are the two aside from Syria still listed) in the previous five years. Iran argued that the provision represented a violation of at least the spirit of the JCPOA by potentially deterring European businessmen from visiting Iran. The Obama Administration issued a letter to Iran stating it would implement the provision in such a way as not to not impinge on sanctions relief, and allowances for Iranian students studying in the United States were made in the implementing regulations. Another provision of that law requires an Administration report to Congress on how Iran has used the benefits of sanctions relief. President Trump has issued and amended executive orders that, in general, prohibit Iranian citizens (as well as citizens from several other countries) from entering the United States. This marked a significant additional restriction beyond the FY2016 Consolidated Appropriation. The 114 th Congress acted to prevent ISA from expiring in its entirety on December 31, 2016. The Iran Sanctions Extension Act ( H.R. 6297 ), which extended ISA until December 31, 2026, without any other changes, passed the House on November 15 by a vote of 419-1 and then passed the Senate by 99-0. President Obama allowed the bill to become law without signing it ( P.L. 114-277 ), even though the Administration considered it unnecessary because the President retains ample authority to reimpose sanctions on Iran. Iranian leaders called the extension a breach of the JCPOA, but the JCPOA's \"Joint Commission\" did not determine it breached the JCPOA. The conference report on the FY2017 National Defense Authorization Act ( P.L. 114-328 ) contained a provision (Section 1226) requiring a quarterly report to Congress on Iran's missile launches the imposition of U.S. sanctions with respect to Iran's ballistic missile launches until December 31, 2019. The conference report on the FY2018 NDAA ( P.L. 115-91 ) extended that reporting requirement until December 31, 2022. The report is to include efforts to sanction entities or individuals that assist those missile launches. The Iran Policy Oversight Act ( S. 2119 ) and the Iran Terror Finance Transparency Act ( H.R. 3662 ) contained a provision that would have added certification requirements for the Administration to remove designations of Iranian entities sanctioned. The House passed the latter bill but then vacated its vote. The IRGC Terrorist Designation Act ( H.R. 3646 / S. 2094 ) would have required a report on whether the IRGC meets the criteria for designation as a Foreign Terrorist Organization (FTO). The Obama Administration argued that the law that set up the FTO designations (Section 219 of the Immigration and Nationality Act [8 U.S.C. 1189]) applies such designations only to groups, rather than armed forces of a nation-state (which the IRGC is). The Prohibiting Assistance to Nuclear Iran Act ( H.R. 3273 ) would have prohibited the use of U.S. funds to provide technical assistance to Iran's nuclear program. The provision appeared to conflict with the provision of the JCPOA that calls on the P5+1 to engage in peaceful nuclear cooperation with Iran (Paragraph 32). The Justice for Victims of Iranian Terrorism Act ( H.R. 3457 / S. 2086 ) would have prohibited the President from waiving U.S. sanctions until Iran completed paying judgments issued for victims of Iranian or Iran-backed acts of terrorism. The House passed it on October 1, 2015, by a vote of 251-173, despite Obama Administration assertions that the bill would contradict the JCPOA. H.R. 3728 would have amended ITRSHRA to make mandatory (rather than voluntary) sanctions against electronic payments systems such as SWIFT if they were allowed to be used by Iran. The IRGC Sanctions Act ( H.R. 4257 ) would have required congressional action to approve an Administration request to remove a country from the terrorism list and would have required certification that any entity to be \"delisted\" from sanctions is not a member, agent, affiliate, or owned by the IRGC. The Iran Ballistic Missile Sanctions Act of 2016 ( S. 2725 ) would have required that specified sectors of Iran's economy (automotive, chemical, computer science, construction, electronic, energy metallurgy, mining, petrochemical, research, and telecommunications) be subject to U.S. sanctions, if those sectors were determined to provide support for Iran's ballistic missile program. A similar bill, H.R. 5631 , the Iran Accountability Act, which passed the House on July 14, 2016, by a vote of 246-179, would have removed some waiver authority for certain provisions of several Iran sanctions laws and required sanctions on sectors of Iran's civilian economy determined to have supported Iran's ballistic missile program. The latter provision, as did S.2725, appeared to contradict the JCPOA. In the 115 th Congress, S. 15 and key sections of S. 227 and H.R. 808 (Iran Nonnuclear Sanctions Act of 2017) mirror S. 2725 . H.R. 4992 , which passed the House on July 14, 2016, by a vote of 246-181, and the related Countering Iranian Threats Act of 2016 ( S. 3267 ), would have, among their central provisions, required foreign banks and dollar clearinghouses to receive a U.S. license for any dollar transactions involving Iran. The Obama Administration opposed the bill as a violation of the JCPOA. H.R. 5119 , which passed the House by a vote of 249-176, would have prohibited the U.S. government from buying additional heavy water from Iran and appeared intended to block additional U.S. purchases similar to one in April 2016 in which the United States bought 32 metric tons from Iran at a cost of about $8.6 million. Several bills and amendments in the 114 th Congress sought to block or impede the sale of the Boeing aircraft to Iran by preventing the licensing, financing, or Ex-Im Bank loan guarantees for the sale. These included H.R. 5715 , H.R. 5711 , and several amendments to the House version of the FY2017 Financial Services and General Government Appropriations Act ( H.R. 5485 ). That act passed the House on July 7, 2016, by a vote of 239-185, and H.R. 5711 passed by the House on November 17, 2016, by a vote of 243-174. The Obama Administration opposed the measures as JCPOA violations. Even before the Trump Administration pulled the United States out of the JCPOA, Congress acted on or considered additional Iran sanctions legislation. The following Iran sanctions legislation was enacted or considered in the 115 th Congress. A bill, S. 722 , which initially contained only Iran-related sanctions, was reported out by the Senate Foreign Relations Committee on May 25, 2017. After incorporating an amendment adding sanctions on Russia, the bill was passed by the Senate on June 15, 2017, by a vote of 98-2. A companion measure, H.R. 3203 , was introduced in the House subsequent to the Senate passage of S. 722 , and contained Iran-related provisions virtually identical to the engrossed Senate version of S. 722 . Following a reported agreement among House and Senate leaders, H.R. 3364 , with additional sanctions provisions related to North Korea (and provisions on Iran remaining virtually unchanged from those of the engrossed S. 722 ), was introduced and passed both chambers by overwhelming margins. President Trump signed it into law on August 2, 2017 ( P.L. 115-44 ), accompanied by a signing statement expressing reservations about the degree to which provisions pertaining to Russia might conflict with the President's constitutional authority. CAATSA's Iran-related provisions are analyzed above. Overall, CAATSA does not appear to conflict with the JCPOA insofar as it does not reimpose U.S. secondary sanctions on Iran's civilian economic sectors. The JCPOA did not require the United States to refrain from imposing additional sanctions—as CAATSA does—on Iranian proliferation, human rights abuses, terrorism, or the IRGC. Section 108 of CAATSA requires an Administration review of all designated entities to assess whether such entities are contributing to Iran's ballistic missile program or contributing to Iranian support for international terrorism. H.R. 1698 . The Iran Ballistic Missiles and International Sanctions Enforcement Act, passed the House on October 26, 2017, by a vote of 423-2. It would have amended the remaining active (not waived) section of ISA (Section 5b) to clarify that assistance to Iran's ballistic missile program is included as subject to sanctions. The provision would have applied the sanctions to foreign governments determined to be assisting Iran's missile programs, and would have applied several ISA sanctions to foreign entities, including foreign governments, that sell to or import from Iran the major combat systems banned for sale to Iran in Security Council Resolution 2231. This represents a more specific list of banned items than the \"destabilizing numbers and types\" of weaponry the sale to Iran of which can be sanctioned under ISA and several other U.S. laws discussed above. H.R. 1638 . On November 14, 2017, the House Financial Services Committee ordered reported H.R. 1638 , the Iranian Leadership Asset Transparency Act, which would have required the Treasury Secretary to report to Congress on the assets and equity interests held by named Iranian persons, including the Supreme Leader, the President, various IRGC and other security commanders, and members of various leadership bodies. H.R. 4324 . The House Financial Services Committee also ordered reported on November 14, 2017, the Strengthening Oversight of Iran's Access to Finance Act. The bill would have required Administration reports on whether financing of Iranian commercial passenger aircraft purchases posed money-laundering or terrorism risks or benefited Iranian persons involved in Iranian proliferation or terrorism. Some argued that the bill might affect the willingness of the Treasury Department to license aircraft sales to Iran, and in so doing potentially breach the U.S. JCPOA commitment to sell such aircraft to Iran. Following President Trump's October 13, 2017, statement on Iran, then-Senate Foreign Relations Committee Chairman Bob Corker and Senator Tom Cotton released an outline of legislation that would reimpose waived U.S. sanctions if, at any time—including after JCPOA restrictions expire—Iran breaches JCPOA-stipulated restrictions. The bill draft, which was not introduced, included sanctions triggers based on Iranian missile developments. H.R. 5132 . The Iranian Revolutionary Guard Corps Economic Exclusion Act. This bill mandated Administration reports on whether specified categories of entities are owned or controlled by the IRGC, or conduct significant transactions with the IRGC. The bill defined an entity as owned or controlled by the IRGC even if the IRGC's ownership interest is less than 50%—a lower standard than the usual practice in which ownership is defined as at least 50%. The bill would have required Administration investigation of several specified entities as potentially owned or controlled by the IRGC, including several telecommunications, mining, and machinery companies, and required a report on whether the Iran Airports Company violates E.O. 13224 by facilitating flight operations by Mahan Air, which is a designated SDN under E.O. 13224. Whereas the bill's provisions did not mandate any sanctions on entities characterized within, the bill appeared to establish a process under which the Administration could name as SDNs entities in Iran's civilian economic sectors, including civil aviation. H.R. 6751 . The Banking Transparency for Sanctioned Persons Act of 2018, would have required reporting to Congress on any license given to a bank to provide financial services to a state sponsor of terrorism. H.R. 4591 , S. 3431 , and H.R. 4238 . Several bills would have essentially codified Executive Order 13438 by requiring the blocking of U.S.-based property and preventing U.S. visas for persons determined to be threatening the stability of Iraq—legislation apparently directed at Iran's Shiite militia allies in Iraq. The latter two bills specifically mentioned the Iraqi groups As'aib Ahl Al Haq and Harakat Hizballah Al Nujabi as entities that the Administration should so sanction. H.R. 4591 passed the House on November 27, 2018. Because the Trump Administration has exited the JCPOA, there is increased potential for the 116 th Congress to consider legislation that sanctions those Iranian economic sectors that could not be sanctioned under the JCPOA. As the 116 th Congress began work in 2019, press reports indicated that several Senators and at least one House Member planned to introduce legislation to greatly expand U.S. secondary sanctions on Iran's financial sector. Among the reported provisions were (1) mandatory imposition of sanctions on the SWIFT electronic payments system if it does not expel sanctioned Iranian banks from its network; (2) amending IFCA to sanction any significant transactions with Iran's financial sector (in addition to energy, shipping, and shipbuilding sectors in the current law); (3) requiring the Treasury Department to issue a final rule that would sanction any international transaction with Iran's Central Bank; and (4) sanctioning foreign persons that supply or provide other help to Iran's efforts to establish a digital currency. The following have been introduced: Several bills similar or virtually identical to those introduced previously have been introduced, imposing sanctions on Iranian proxies in Iraq and elsewhere. These bills include H.R. 361 , the Iranian Proxies Terrorist Sanctions Act of 2019, and H.R. 571 , the Preventing Destabilization of Iraq Act of 2019. The Iranian Revolutionary Guard Corps Exclusion Act ( S. 925 ), similar to H.R. 5132 in the 115 th Congress, has been introduced in the Senate. The Iran Ballistic Missiles and International Sanctions Enforcement Act ( H.R. 2118 ). The bill includes provisions similar to H.R. 1698 in the 115 th Congress (see above). There are a number of other possible sanctions that might receive consideration—either in a global or multilateral framework. These possibilities are analyzed in CRS In Focus IF10801, Possible Additional Sanctions on Iran , by Kenneth Katzman. Appendix A. Comparison Between U.S., U.N., and EU and Allied Country Sanctions (Prior to Implementation Day) Appendix B. Post-1999 Major Investments in Iran's Energy Sector Appendix C. Entities Sanctioned Under U.N. Resolutions and EU Decisions Appendix D. Entities Sanctions Under U.S. Laws and Executive Orders", "summary": "Successive Administrations have used sanctions extensively to try to change Iran's behavior. Sanctions have had a substantial effect on Iran's economy but little, if any, observable effect on Iran's conventional defense programs or regional malign activities. During 2012-2015, when the global community was relatively united in pressuring Iran, Iran's economy shrank as its crude oil exports fell by more than 50%, and Iran had limited ability to utilize its $120 billion in assets held abroad. The 2015 multilateral nuclear accord (Joint Comprehensive Plan of Action, JCPOA) provided Iran broad relief through the waiving of relevant sanctions, revocation of relevant executive orders (E.O.s), and the lifting of U.N. and EU sanctions. Remaining in place were a general ban on U.S. trade with Iran and U.S. sanctions on Iran's support for regional governments and armed factions, its human rights abuses, its efforts to acquire missile and advanced conventional weapons capabilities, and the Islamic Revolutionary Guard Corps (IRGC). Under U.N. Security Council Resolution 2231, which enshrined the JCPOA, nonbinding U.N. restrictions on Iran's development of nuclear-capable ballistic missiles and a binding ban on its importation or exportation of arms remain in place for several years. JCPOA sanctions relief enabled Iran to increase its oil exports to nearly pre-sanctions levels, regain access to foreign exchange reserve funds and reintegrate into the international financial system, achieve about 7% yearly economic growth (2016-17), attract foreign investment, and buy new passenger aircraft. The sanctions relief contributed to Iranian President Hassan Rouhani's reelection in the May 19, 2017, vote. However, the economic rebound did not prevent sporadic unrest from erupting in December 2017. And, Iran has provided support for regional armed factions, developed ballistic missiles, and expanded its conventional weapons development programs during periods when international sanctions were in force, when they were suspended, and after U.S. sanctions were reimposed in late 2018. The Trump Administration has made sanctions central to efforts to apply \"maximum pressure\" on Iran's regime. On May 8, 2018, President Trump announced that the United States would no longer participate in the JCPOA and that all U.S. secondary sanctions would be reimposed by early November 2018. The reinstatement of U.S. sanctions has driven Iran's economy into mild recession as major companies exit the Iranian economy rather than risk being penalized by the United States. Iran's oil exports have decreased significantly, the value of Iran's currency has declined sharply, and unrest has continued, although not to the point where the regime is threatened. But, the European Union and other countries are trying to keep the economic benefits of the JCPOA flowing to Iran in order to persuade Iran to remain in the accord. To that end, in January 2019 the European countries created a trading mechanism (Special Purpose Vehicle) that presumably can increase trade with Iran by circumventing U.S. secondary sanctions. On November 5, 2018, the Administration granted 180-day \"Significant Reduction Exceptions\" (SREs) to eight countries—enabling them to import Iranian oil without penalty as long as they continue to reduce purchases of Iranian oil. On April 22, 2019, the Administration announced it would not renew any SREs when they expire on May 2, 2019, instead seeking to drive Iran's oil exports as close to zero as possible. On May 3, 2019, the Administration ended some waivers for foreign governments to provide technical assistance to some JCPOA-permitted aspects of Iran's nuclear program. The economic difficulties and other U.S. pressure measures have prompted Iran to cease performing some of the nuclear commitments of the JCPOA. See also CRS Report R43333, Iran Nuclear Agreement and U.S. Exit, by Paul K. Kerr and Kenneth Katzman; and CRS Report R43311, Iran: U.S. Economic Sanctions and the Authority to Lift Restrictions, by Dianne E. Rennack.", "document_type": "crs"}
{"report": "Offshore aquaculture is generally defined as the rearing of marine organisms in ocean waters beyond significant coastal influence, primarily in the federal waters of the exclusive economic zone (EEZ). Currently, marine aquaculture facilities are located in nearshore state waters, but no commercial facilities operate in U.S. federal waters. Some aquaculture advocates contend that developing such offshore aquaculture facilities could increase U.S. seafood production and provide economic opportunities for coastal communities; opponents counter that doing so could harm the environment and have negative impacts on other coastal activities, such as fishing. Offshore aquaculture development will likely depend on several interrelated legal and institutional requisites, such as establishing a regulatory framework, minimizing environmental harm, and developing the capacity to manage and support the industry. Regulatory uncertainty has been identified as one of the main barriers to developing offshore aquaculture in federal waters of the United States. According to the U.S. Commission on Ocean Policy, \"aquaculture operations in offshore waters lack a clear regulatory regime, and questions about exclusive access have created an environment of uncertainty that is detrimental to investment in the industry.\" Some observers have concluded that \"offshore aquaculture will not fully develop unless governments create a supportive political climate and resulting regulatory conditions.\" A framework also may be needed to assure environmentalists, fishermen, and other stakeholders that coastal and fisheries managers would have the authority to address potential threats to the environment and other impacts. According to most observers, congressional action may be necessary to develop a comprehensive regulatory framework for offshore aquaculture. Comprehensive legislation has been introduced a number of times since the 109 th Congress, but none of the bills have been enacted. Controversy has stemmed from different perspectives of aquaculturalists, environmentalists, fishermen, and others. Some environmental organizations and fishermen have asserted that poorly regulated aquaculture development has degraded the environment and harmed wild fish populations and ecosystems. Some segments of the commercial fishing industry are opposed to marine aquaculture because of potential development on fishing grounds, environmental effects on fish populations, and competition of cultured products with wild products in domestic markets. Offshore aquaculture advocates counter that a combination of farming experiences, technological advances, proper siting, and industry regulation has decreased environmental impacts and improved the efficiency of marine aquaculture. It appears that renewed efforts have emerged in the 116 th Congress to meet current challenges by attempting to improve regulatory efficiency, minimize environmental degradation, and avoid impacts on existing ocean uses. Additional related factors, such as technical advances, economic feasibility, and the level of government support, also are likely to affect future growth of the U.S. aquaculture industry. Although a regulatory framework appears to be necessary for establishing offshore aquaculture in federal waters, it may not be sufficient for significant development of the industry. Sometimes overlooked are the services that may be needed to establish a new industry, such as program administration, research, and other services (e.g., disaster assistance, insurance). Technical uncertainties related to harsher offshore environmental conditions and higher costs of operating farther from shore may slow extensive offshore development, especially in the immediate future. This report examines issues and challenges related to the development of offshore aquaculture in federal waters. It introduces the topic with background information that covers aquaculture production and methods, federal agencies involved in aquaculture, and potential congressional interest in the topic. It then focuses on three of the main challenges faced by the industry, including the current regulatory framework, environmental concerns, and economic viability. The report concludes with issues related to regulatory and institutional development that have been identified by researchers and stakeholders, potential issues for Congress, and a summary of legislation that has been introduced in recent Congresses. Global aquaculture production is nearly equal to the volume of seafood produced for human consumption by wild fisheries. From 1997 to 2016, world seafood production from wild sources (capture fisheries) leveled off at a range of 89 million metric tons (mmt) to 96 mmt. According to the United Nations Food and Agriculture Organization, further growth of global wild fisheries production is unlikely, because approximately 93% of marine stocks are now either fished unsustainably or fished at maximum sustainable levels. During the same period, world aquaculture production increased from 28.3 mmt to 80.0 mmt; it now makes up 47% of global fish production. It is likely that aquaculture production will continue to expand with advances in aquaculture technologies and the need to satisfy the demand of the world's growing population. Figure 1 illustrates the growth in global aquaculture production and relatively constant wild fisheries production. Nearly all of global marine aquaculture production is from inshore areas, such as estuaries and coastal areas, not from offshore areas. Wild fisheries in the United States are limited by the productive capacity of U.S. waters. Most U.S. stocks are now fished at their maximum sustainable levels. However, unlike worldwide trends, U.S. aquaculture production has generally stagnated and makes up a relatively small portion of total U.S. seafood production. In 2016, the United States ranked fifth in global seafood production at 5.36 mmt; 0.44 mmt (8.2%) of this total was produced by aquaculture. Figure 2 illustrates the relatively constant domestic production of aquaculture and wild fisheries. Most U.S. aquaculture production consists of freshwater species, such as catfish, trout, and crawfish. Growth in U.S. seafood consumption has depended on imports, which provide approximately 80% to 90% of the seafood consumed in the United States. Approximately 50% of seafood imports, such as shrimp from Southeast Asia and salmon from Norway or Chile, are produced by aquaculture in ponds and nearshore areas. According to some observers, U.S. reliance on seafood imports will continue to increase without changes to current policies and regulatory obstacles that currently impede expansion of aquaculture. Aquaculture is broadly defined as the propagation and rearing of aquatic species in controlled or selected environments. Aquaculture is difficult to characterize because of the diverse nature of facilities, methods, technologies, and species that are cultured. Organisms are cultured in freshwater environments, land-based closed systems, coastal and estuarine areas, and offshore areas. Often, hatcheries are used to spawn fish and shellfish to produce eggs that are hatched and grown to specific stages; these organisms are then transferred to facilities where they are grown to marketable size. Aquaculture operations range from systems where there is only minimal control over the organism's environment to intensive operations where there is complete control at each stage of the organism's life history. For example, an intensive system would include freshwater species such as catfish that are often raised in shallow earthen ponds; production relies on control of inputs. Water, feed, and disease treatment are controlled to maximize growth while minimizing costs. Farming of finfish, such as salmon, also requires stocking at high densities and relies on extensive feeding. Commercial salmon aquaculture facilities often employ net pens ( Figure 3 ), which are moored to the bottom and located in protected inshore marine areas, such as bays and fjords. Bivalves such as oysters and clams are grown in estuaries and inshore areas, feeding on a diet of plankton and detritus that they filter from seawater. Bivalve aquaculture may employ varying degrees of control. In some cases, they are suspended on lines, in wire cages, and on rafts. Oyster larvae are grown in hatcheries and transferred to these structures as oyster spat or seed and grown to market size. Some oyster production is less intensive and depends on enhancement of the benthic (ocean bottom) environment by placing oyster shells on the bottom to facilitate attachment of wild oyster larvae. In Alaska, hatcheries are used to enhance the production of salmon fry, which are released to the wild to feed and grow until they are caught by fishermen as adults. These programs are run as nonprofit cooperatives overseen by Alaska fishermen. Most states and the U.S. Fish and Wildlife Service run public stocking programs, which often address a variety of objectives such as enhancing recreational fisheries and restoring depleted populations. Each strategy requires different inputs and interacts with the environment to differing degrees. Nevertheless, a common factor is to control some aspect(s) of the organism's life to enhance survival and growth. Over the last decade, catfish aquaculture has accounted for most food fish production by volume and revenue in the United States ( Table 1 ). However, catfish production has declined by nearly 44% over this period due to a variety of factors, including competition from Asian imports. For freshwater species, only crawfish production (78.0%) and revenue (66.2%) increased significantly. During the same period, production of salmon and oysters increased in both volume and revenue. Cultured oysters exhibited the largest increases in production (66.0%) and revenue (86.5%), which is likely related to greater demand for high quality raw oysters. However, except for cultured oysters, production of most domestic marine seafood products is from wild marine fisheries. As stated above, offshore aquaculture is the rearing of marine organisms in ocean waters beyond significant coastal influence, primarily in the federal waters of the EEZ. Aquaculturalists, the Department of Commerce, several task force and commission reports, and some academics have identified offshore aquaculture as a potential alternative to some land-based and nearshore aquaculture. Supporters of aquaculture have asserted that development of the industry, especially in offshore areas, has significant potential to increase U.S. seafood production and provide economic opportunities for coastal communities. The potential of offshore aquaculture in the United States is likely to differ by species, region, and technology. Despite plans for several offshore operations, no commercial offshore aquaculture facilities are currently operating in the U.S. EEZ. Some marine aquaculture facilities are located in nearshore state waters, however. In the future, inshore marine production is likely to be constrained by the availability of suitable sites, poor water quality, high coastal land values, and competition with other ocean uses. Potential aquaculture development in offshore areas has received increasing attention because of these limitations. The cost of working offshore may be greater than the costs of working in inshore and land-based areas, in part because offshore aquaculture in the EEZ would be subject to relatively high-energy offshore environments caused by high and variable winds and storms. However, research and technical advances have demonstrated that operating in these environments is feasible. Expansion of offshore aquaculture into clean, well-flushed waters appears to have nearly unlimited potential, although major technological and operational challenges remain. For example, further development will require structures and materials that will contain stocks under harsh oceanic conditions and keep costs low enough to remain profitable. It is likely that offshore aquaculture, at least initially, would employ species with established markets and production systems that are similar to those used in inshore areas. Examples of marine species that are candidates for offshore areas may include Atlantic salmon ( Salmo salar ), white sea bass ( Atractoscion nobils ), cobia ( Rachycentron canadum ), and blue mussel ( Mytilus edulis ). Currently, salmon net pen facilities operate in protected inshore waters of Maine and Washington. Several other net pen aquaculture facilities have operated in exposed state waters of Hawaii and Puerto Rico that have characteristics similar to those of offshore areas. Over the last two decades, permits have been issued to conduct research and limited commercial aquaculture in the EEZ. Recently, three mussel farms received permits from the U.S. Army Corps of Engineers (USACE) to operate in offshore waters. Several other ventures have been proposed; including proposals to operate commercial facilities in several regions. Researchers are developing systems to adapt facilities used in inshore areas to the unique needs of offshore aquaculture. Offshore systems (e.g., submersible cages, net pens, longline arrays) may be free-floating, secured to a structure, moored to the ocean bottom, or towed by a vessel. Systems have been developed to overcome problems associated with harsh open ocean conditions, including submersible cage designs that do not deform under strong currents and waves, and single-point moorings. Cage-mounted autonomous feeding systems have been developed that can operate both at the surface and submerged. Other components under development include mechanized and remote systems that can be controlled from land-based facilities; for example, universities and private-sector research interests are developing automated buoys that can monitor the condition of stock and feed fish on a regular basis for weeks at a time. Federal aquaculture, regulation, research, and support are conducted by a number of federal agencies. Their roles vary widely depending on the agency's statutory responsibilities, which may be related directly or indirectly to aquaculture. Congress enacted the National Aquaculture Act of 1980 to encourage development of the aquaculture industry and coordinate federal activities. The act established the Subcommittee on Aquaculture (SCA) to provide opportunities to exchange information and enhance cooperation among federal agencies. SCA's main functions include the following: reviewing national needs for aquaculture research, technology transfer, and technology assistance programs; supporting coordination and communication among federal agencies engaged in the science, engineering, and technology of aquaculture; collecting and disseminating information on aquaculture; encouraging joint programs among federal agencies in areas of mutual interest relating to aquaculture; and recommending specific actions on issues, problems, plans, and programs in aquaculture. SCA operates under the Committee on Environment of the National Science and Technology Council in the Executive Office of the President. SCA is chaired by the Secretary of Agriculture, in consultation with the Secretaries of Commerce and the Interior. In addition to the three main departments, SCA includes nine additional departments and agencies with an interest in aquaculture. SCA meets quarterly and has provided information on topics such as fish disease, aquaculture regulation, and other areas of interest. Most federal aquaculture activities and programs that are specific to aquaculture are carried out by the Department of the Interior (DOI), Department of Commerce (DOC), and the Department of Agriculture (USDA). Other federal agencies have roles that are indirectly related to aquaculture, such as regulatory programs that apply to a variety of aquatic or marine activities, including aquaculture. Examples include USACE for activities in navigable waters, the Environmental Protection Agency (EPA) for protection of environmental quality, and the Food and Drug Administration for regulation of drugs used to treat fish diseases. USDA plays a lead role in support of freshwater aquaculture for species such as catfish that are raised on private property in fishponds. USDA is authorized to conduct cooperative research and extension: it funds five aquaculture regional research centers. Work at aquaculture centers complements other USDA research and education programs undertaken at state land-grant universities. The USDA National Agricultural Statistics Service periodically conducts the national aquaculture census and collects and publishes other related statistical information. The Animal and Plant Inspection Service provides animal health certifications for exports of live species and products; assistance for producers experiencing losses from predators; and veterinary biologics for preventing and treating animal diseases, including those affecting aquatic species. The Farm Service Agency administers farm lending programs, including ownership, operating, and emergency disaster loans. Under certain circumstances, aquaculture operations may be eligible for disaster assistance under the Noninsured Crop Disaster Assistance Program and the Emergency Assistance for Livestock, Honeybees, and Farm-Raised Fish Program. It appears that some of USDA's programs and experiences that focus on land-based agriculture, such as finance, research, disaster assistance, marketing, and extension, may be adapted and applied to marine aquaculture development. DOI's U.S. Fish and Wildlife Service (FWS) focuses on support of public efforts, such as stocking programs, that benefit recreational fishing of freshwater and anadromous species. FWS operates the National Fish Hatchery System, which consists of more than 60 facilities used to enhance fish stocks, restore fish populations, and mitigate fish losses. The system includes fish production and distribution facilities, fish health centers, fish passage facilities, and technology centers. FWS research programs indirectly benefit the private sector through research and applications that control fish disease and regulation of potentially invasive species. FWS and NMFS are responsible for regulating potential interactions between aquaculture activities and endangered species and marine mammals under the Endangered Species Act (ESA) and the Marine Mammal Protection Act (MMPA). The NMFS Office of Aquaculture in DOC focuses on regulatory, technical, and scientific services related to marine aquaculture. NOAA headquarters provides general direction for the program and coordinates with other NOAA offices, federal agencies, and the general public. The program includes five regional aquaculture coordinators, who coordinate regulatory and permitting activities, serve as liaisons with the state and local government and stockholders, and assist with grant management. Aquaculture in federal waters is regulated as a regional fishery under the Magnuson Stevens Fishery Conservation and Management Act (MSA). NOAA's efforts to regulate offshore aquaculture are discussed in the following section concerning federal agency regulatory responsibilities (see Current Regulatory Framework). In October 2015, NOAA released its five-year strategic plan (2016-2020) for marine aquaculture. NOAA's vision is a \"robust U.S. marine aquaculture sector that creates jobs, provides sustainable seafood, and supports a healthy ocean.\" The plan provides a blueprint of NOAA's involvement in marine aquaculture, including program impact, goals and strategies, deliverables, and crosscutting strategies. To increase aquaculture production, the program's four main goals are to develop coordinated, consistent, and efficient regulatory processes for the marine aquaculture sector; encourage environmentally responsible marine aquaculture using the best available science; develop technologies and provide extension services for the aquaculture sector; and improve public understanding of marine aquaculture. The plan also includes four crosscutting strategies to achieve these goals and objectives: strengthen government, academic, industry, and other partnerships; improve communications within NOAA; build agency infrastructure within NOAA; and develop sound and consistent management within NOAA. Various NOAA programs may support aquaculture both directly and indirectly. The National Sea Grant Marine Aquaculture Grant Program is the only U.S. government grant program that funds marine aquaculture exclusively. These grants focus on industry challenges, such as improving aquaculture feeds, enhancing seafood safety and quality, refining culture methods, and diversifying aquaculture species. Other NOAA offices or programs that may contribute to or become involved in aquaculture development include inspections provided by the NOAA Seafood Inspection Program, research conducted at NOA A regional fisheries science centers, and awards funded by the Saltonstall-Kennedy Grant Program. A broad array of challenges is associated with offshore aquaculture development and expansion. These challenges pertain to evolving production technology, uncertain economic costs and benefits, and potential environmental and social impacts. Generalizations about how to address these challenges are difficult to make because of the variety of candidate species, different technologies, and potential scales of operation. Major categories of concerns related to offshore aquaculture development include (1) the legal and regulatory environment; (2) potential environmental harm; (3) economic, trade, and stakeholder concerns related to development of a new industry; and (4) business and institutional support. One of the main issues associated with marine offshore aquaculture is the concept of ownership and individuals' rights to use the marine environment for economic gain (in contrast to, for example, the catfish industry, where fishponds are constructed and operated on private land). Some envision development and management as a partnership, where the government's role is one of both enabler and steward. This partnership could provide for property rights and regulatory clarity, certainty, and stability. For example, the government already provides specific rights to businesses that extract or use resources of the continental shelf, such as oil and gas and wind energy development. Aquaculture regulation depends primarily on the geographic location and characteristics of aquaculture facilities. In state waters, in accordance with the federal Submerged Lands Act of 1953, coastal states exercise jurisdiction over an area extending 3 nautical miles (nm) from their officially recognized coast (or baseline ). States also have jurisdiction over internal waters, areas inside the baseline in bays and estuaries, such as the Chesapeake Bay or Puget Sound. States may impose restrictions or requirements as they see fit, subject to any applicable federal laws. If located in federal waters, in waters from 3 nm to 200 nm from the baseline, aquaculture facilities are regulated primarily by federal agencies under a number of federal statutes and regulatory requirements ( Figure 4 ). Some federal laws apply to marine aquaculture and waters of the United States generally and include facilities located in both state and federal marine waters. Currently, no single federal agency is authorized to approve or permit offshore aquaculture facilities in federal waters, generally the EEZ. USACE, NMFS (NOAA Fisheries), and EPA are separately authorized to regulate certain activities that are required to establish and operate aquaculture facilities. Federal agencies that issue permits are required to consult with other regulatory agencies concerning the potential effects of each application. The permitting process also involves consultation and other requirements that are incorporated into the review of these applications. The following sections summarize the required federal permits, consultation, and review requirements. Section 10 of the Rivers and Harbors Act of 1899 (hereinafter referred to as Section 10) prohibits the unauthorized obstruction or alteration of any navigable water of the United States. Authorization by the Secretary of the Army, through USACE, must be provided before construction is initiated. Construction may include any structure or work in or affecting the course, condition, or capacity of navigable waters, excavation or fill, including aquaculture facilities, in or over any navigable waters of the United States within 3 nm from shore. Because aquaculture facilities may be located in and may affect navigable waters, the developer of the facility may be required to obtain authorization from USACE under Section 10. USACE's role is to regulate the use of the navigable water (not to regulate aquaculture per se). The Outer Continental Shelf Lands Act extends USACE authority over all artificial islands and all installations and other devices permanently or temporarily attached to the seabed, which may be erected for the purpose of exploring for, developing, or producing resources. Therefore, a Section 10 permit is also required prior to construction or placement of installationsâsuch as aquaculture facilitiesâin federal waters from the seaward limit of state waters to the seaward limit of the outer continental shelf. The decision to issue a permit is based on the effects on navigation and the proposed activity's probable impacts on the public interest. The public interest is assessed by comparing the benefits that may be expected to accrue from the proposed activity and the reasonably foreseeable harm that reflects the national concern for the protection and use of important resources. Offshore aquaculture permits would be required for structures such as cages, net pens, or lines that are anchored or attached to the sea floor. Section 10 permit requirements for aquaculture development beyond 3 nm may differ from those within 3 nm, because installations or other devices that are not temporarily or permanently attached to the seabed do not appear to be included. Examples of facilities beyond 3 nm that may not require Section 10 permits include bottom shellfish culture or unmoored floating aquaculture facilities if they do not impede navigation. EPA protects water quality by regulating the discharges of pollutants into U.S. waters under the Clean Water Act (CWA). Under the CWA, a National Pollutant Discharge Elimination System (NPDES) permit is required to discharge pollutants from point sources into federal ocean waters. A point source is defined as \"any discernable, confined and discrete conveyance, including but not limited to any pipe, ditch, channel, tunnel, conduit, well, discrete fissure, container, rolling stock, concentrated animal feeding operation, or vessel or other floating craft, from which pollutants are or may be discharged.\" Aquaculture facilities may discharge materials such as fecal matter; excess feed; antifoulants; and therapeutic agents, such as antibiotics. EPA currently regulates aquaculture facilities as a point source if the activity qualifies as a Concentrated Aquatic Animal Production (CAAP) facility; CAAPs are defined according to discharge frequency and production level or as designated by EPA on a case-by-case basis if they are significant contributors of pollution. Commercial scale aquaculture operations in federal waters would be likely to trigger the CAAPs threshold and require a NPDES permit. NMFS is the only federal agency that claims explicit management authority over offshore aquaculture. Currently, NMFS manages federal fisheries under authority of the MSA. The MSA regulates fishing in the EEZ through development and implementation of federal fishery management plans (FMPs). The MSA \"does not expressly address whether aquaculture falls within the purview of the act.\" The MSA defines a fishery as \"one or more stocks of fish ... and any fishing for such stocks\" and fishing as the \"catching, taking, or harvesting of fish.\" The Magnuson-Stevens Act does not expressly address whether aquaculture falls within the purview of the Act. However, the Magnuson-Stevens Act's assertion of exclusive fishery management authority over all fish within the EEZ, its direction to fishery management councils to prepare fishery management plans for any \"fishery\" needing conservation and management, together with the statutory definitions of \"fishery\" and \"fishing,\" provide a sound basis for interpreting the Act as providing authority to regulate aquaculture in the EEZ. Under the MSA's authority, several regional fishery management councils and NMFS have exercised regulatory oversight over offshore aquaculture. In some cases, NMFS authorized offshore aquaculture in federal waters for research and experimental purposes under an exempted fishing permit. These permits are of limited duration and not intended to apply to development of permanent commercial operations. The Gulf of Mexico Fishery Management Council (GMFMC) has been particularly active on aquaculture issues. In 2009, an aquaculture FMP was approved by the GMFMC; NMFS issued its final rule to implement that FMP in 2016. The aquaculture plan establishes a regional permitting process for regulating aquaculture in the Gulf of Mexico EEZ. The regulations authorize permits for up to 20 facilities that are limited to combined total production of 64 million pounds annually of species that are native to the Gulf of Mexico. Applicants are required to acquire other federal permits before NMFS can issue a Gulf aquaculture permit. NMFS also has developed a memorandum of understanding to coordinate federal agency actions and outline the permitting responsibilities of each agency in the Gulf. However, a recent legal decision has cast doubt on NMFS's authority to regulate aquaculture under the MSA. In Gulf Fisherman ' s Association v . National Marine Fisheries Service , the U.S. District Court for the Eastern District of Louisiana held that NMFS exceeded its authority under the MSA when it adopted a regulatory scheme for aquaculture operations in the Gulf of Mexico. The court found that the MSA's grant of authority to regulate \"fishing\" and \"harvesting\" did not include aquaculture, noting that \"[h]ad Congress intended to give [NMFS] the authority to create an entirely new regulatory permitting scheme for aquaculture operations, it would have said more than 'harvesting.' The MSA is a conservation statute, aimed at the conservation and management of natural resources. Fish farmed in aquaculture are neither 'found' off the coasts of the United States nor are they 'natural resources.'\" Some are concerned that regional management of offshore aquaculture under the MSA may add another additional administrative requirements, especially if several regional fishery management councils develop their own, possibly contradictory, open ocean aquaculture management policies. Currently, commercial aquaculture is less likely to occur in federal waters under the jurisdiction of other regional fishery management councils because they have not prepared aquaculture FMPs or generic aquaculture amendments to the appropriate FMPs for species that could be cultured. In addition, it is unclear what regulatory authority NMFS and the regional councils might have over species, such as mussels, that are not managed under a federal FMP. Consultation and review requirements are often triggered by federal permitting programs. Some crosscutting environmental requirements are entirely procedural, because they require that the federal agency implement certain procedures to ensure the agency identifies and analyzes potential impacts the proposal would have on certain resources before deciding whether to issue the permit. Other environmental requirements may prohibit the agency from permitting the action, as proposed, unless the level of adverse impacts can be minimized or mitigated. Under Section 306 of the Coastal Zone Management Act (CZMA), states may develop and implement a coastal management program (CMP) pursuant to federal guidance. State CMPs \"describe the uses subject to the management program, the authorities and enforceable policies of the management program, the boundaries of the state's coastal zone, the organization of the management program, and related state coastal management concerns.\" Arguably the main feature of the CZMA is federal consistency. Federal agency activities that have reasonably foreseeable effects on a state's coastal zone resources and uses should be consistent with the enforceable policies of the state's coastal management plan. Section 307 of the CZMA requires any applicant for a required Federal license or permit to conduct an activity, in or outside of the coastal zone, affecting any land or water use or natural resource of the coastal zone of that state\" to \"provide in the application to the licensing or permitting agency a certification that the proposed activity complies with the enforceable policies of the state's approved program and that such activity will be conducted in a manner consistent with the program. Enforceable policies are legally binding state policies, such as constitutional provisions, laws, regulations, land use plans, or judicial or administrative decisions. Federal licensing and permitting (such as aquaculture permit requirements) is one of four general categories of federal activities that may be reviewed for consistency. The state lists federal licenses and permits that affect coastal uses and resources in its federally approved CMP. For listed activities, the applicant submits related data and information and a consistency certification that the proposed activity will be conducted in a manner consistent with the state's approved management program. For a listed activity outside the coastal zone (such as in federal waters), the state also must describe the geographic location or area in its CMP. If a license, permit, or geographic location in federal waters is not listed in the state's CMP, the activity is treated as unlisted. To review an unlisted activity, the state notifies the applicant, federal agency, and NOAA Office of Coastal Management (OCM) that it intends to review the activity. OCM decides whether to approve the request, generally based on whether the activity will have reasonably foreseeable effects on the state's coastal zone. If approved, the consistency review proceeds as in the case of a listed activity. The state may object to the applicant's consistency certification and stop the federal agency from authorizing the activity or issue a conditional concurrence to the applicant. The permit is issued for the activity if (1) the state concurs with the consistency determination; (2) the state fails to act, resulting in a presumption of consistency; or (3) the Secretary of Commerce overrules the state on appeal and concludes that the activity is consistent with CZMA objectives or is otherwise necessary for national security. In the vast majority of federal actions, states concur with the applicant's self-certification, often resolving any disputes collaboratively. The National Environmental Policy Act (NEPA) requires federal agencies to consider the potential environmental consequences of proposed federal actions but does not compel agencies to choose a particular course of action. If an agency anticipates that an action would significantly affect the quality of the human environment, the agency must document its consideration of those impacts in an environmental impact statement (EIS). If the impacts are uncertain, an agency may prepare an environmental assessment (EA) to determine whether a finding of no significant impact could be made or whether an EIS is necessary. NEPA creates procedural requirements but does not mandate specific outcomes. NMFS and FWS have responsibilities under the ESA and the MMPA to review project proposals that may affect marine mammals or threatened and endangered species. If issuance of a federal permit may adversely affect a species listed under the ESA, consultation may be required under Section 7 of the ESA. Through consultation with either FWS or NMFS, federal agencies must ensure that their actions are not likely to jeopardize the continued existence of any endangered or threatened species or adversely modify critical habitat. If the appropriate Secretary judges that the proposed activity jeopardizes the listed species or adversely modifies critical habitat, then the Secretary must suggest reasonable and prudent alternatives that would avoid harm to the species. If reasonable and prudent measures are adopted, the federal action is allowed to go forward. The MMPA prohibits the harassment, hunting, capturing, killing (or taking ) of marine mammals without a permit from the Secretary of the Interior or the Secretary of Commerce. If marine mammals are likely to interact with aquaculture facilities and this interaction is likely to result in the taking of marine mammals, a marine mammal exemption would be required. To be eligible for an exemption, the aquaculture facility would need to obtain a Marine Mammal Authorization Program certificate from NMFS. The MSA also requires the federal permitting agency (e.g., USACE) for any aquaculture facility to consult with NMFS if the activity has the potential to harm essential fish habitat (EFH). EFH is designated for all marine species for which there is an FMP and may include habitat in both state and federal waters. NOAA manages national marine sanctuaries established under the National Marine Sanctuary Act (NMSA). Federal agencies are required to consult with the Secretary of Commerce when federal actions within or outside a national marine sanctuary, including activities that are authorized by licenses, leases, and permits, are likely to harm sanctuary resources. If the Secretary finds that the activity is likely to injure a sanctuary resource, the Secretary recommends reasonable and prudent measures that the federal agency can take to avoid harm to the sanctuary resource. If the measures are not followed and sanctuary resources are destroyed or injured, the NMSA requires the federal agency that issued the permit to restore or replace the damaged resources. The National Historic Preservation Act (NHPA) is another procedural statute. Under Section 106 of NHPA, federal agencies must determine whether actions they may permit or license will have adverse effects on properties listed or eligible for listing in the National Register of Historic Places. Such sites could include shipwrecks, prehistoric sites, or other cultural resources. Federal agencies must determine whether such resources may be affected in consultation with state and/or tribal historic preservation officers. . The Fish and Wildlife Coordination Act requires federal agencies to consult with FWS, NMFS, and state wildlife agencies when activities that are authorized, permitted, or funded by the federal government affect, control, or modify waters of any stream or bodies of water. Consultation generally is incorporated into the process of complying with other federal permit requirements, such as the NEPA and CWA. The Coast Guard has authority to control private aids to navigation in U.S. waters. Regulations require structures such as aquaculture facilities be marked with lights and signals for protection of maritime navigation. To establish a private aid to navigation, the applicant would need formal authorization from the appropriate U.S. Coast Guard district. The Bureau of Safety and Environmental Enforcement (BSEE) has regulatory responsibility for the offshore energy industry on the outer continental shelf. BSEE would review aquaculture applications and provide comments regarding potential conflicts, interactions, or effects on mineral exploration, development, and production operations. The Bureau of Ocean Energy Management (BOEM) manages development of the outer continental shelf energy and mineral resources. BOEM would require a right-of-use easement for any offshore aquaculture operations that uses or tethers to an existing oil and gas facility. One of the main features of many previous aquaculture bills has been consideration of environmental protection and monitoring of offshore aquaculture facilities. Critics of offshore aquaculture have expressed concern with potential environmental degradation and conflicts with existing uses of marine areas. They cite historic problems in inshore areasâsuch as escapes of cultured organisms, the introduction of disease and invasive species, pollution in areas adjacent to net pens, and habitat lossâwhich have created a negative perception of aquaculture. Aquaculture supporters assert that those who oppose marine aquaculture lack an understanding of aquaculture's benefits and risks and that \"these perceptions persist despite significant scientific literature that contradicts the extent or existence of risk to the values that these groups want to protect.\" Supporters contend that, in many parts of the world, a combination of farming experiences, technological advances, proper siting, and industry regulation has decreased environmental impacts and improved efficiency of marine aquaculture. Some researchers suggest that by moving operations offshore and selecting appropriate sites, the remaining impacts can be further reduced. Others add that offshore waters would be less prone to environmental impacts than inshore waters because fish wastes and other pollutants would dissipate more rapidly in the deeper and better-flushed offshore areas. A present lack of knowledgeâowing to limited experience and few studies focusing specifically on offshore aquacultureâlimits understanding of potential harm to the environment from offshore aquaculture. Most information has been collected from inshore areas, where salmon net pens and other types of aquaculture farms have been established. Some characteristics of inshore operations are similar to those that would be established offshore (e.g., both are open to the surrounding environment); however, other characteristics of offshore operations, such as offshore currents, wind and waves, water quality, and depth, are likely to differ from inshore areas. Generally, the outcomes associated with offshore aquaculture development depend on characteristics of aquaculture sites and how technology is employed and managed. Over the years, researchers have identified several issues related to marine aquaculture and the use of net pens in inshore areas. These issues include water pollution from uneaten feed and waste products (including drugs, chemicals, and other inputs); habitat degradation, such as alteration of benthic habitat from settling wastes; sustainability of fish used in aquaculture feeds; use of antibiotics and other animal drugs; introduction of invasive species; escape of cultured organisms; and the spread of waterborne disease from cultured to wild fish. During the last two decades, technical advances and farming practices have reduced these impacts in nearshore areas. Existing laws and regulations also have established performance standards and addressed many of the potential adverse environmental effects of net pen aquaculture. Fish feed is the main source of waste from aquaculture and contributes to most environmental impacts associated with aquaculture. The discharge of wastes, such as unused feed, and metabolic fish wastes, such as nitrogen (ammonia and urea), has been an ongoing concern because of potential effects on water quality and degradation of the seafloor environment under net pens. Treatment of effluent is not feasible because wastes are discharged directly into the ocean through net enclosures. Impacts on the environment depend on a variety of factors, such as feed quality, digestion and metabolism, feeding rate, biomass of fish, and species. Site characteristics such as cage design, depth, currents, existing water quality or nutrient levels, and benthic features also influence nutrient dispersion and impacts. Impacts on water quality in the water column adjacent to net pens are often related to a combination of increases in nitrogen, phosphorus, lipids, and turbidity and depletion of oxygen. Eutrophication may occur when net pens are placed at high densities and flushing of semi-enclosed water bodies is poor. According to studies, aquaculture's contribution to nitrogen in areas adjacent to net pens ranged broadly from none to significant levels depending on a variety of factors, including environmental characteristics and species. In some cases, it appears that nutrients are flushed away from the immediate cage area to the surrounding water body. Management practices such as choosing sites with adequate current and depth are likely to improve circulation and dissipation of waste products. Solid feed and fish waste descend through the water column and may accumulate on the bottom below and around aquaculture facilities. In some cases, wastes accumulate at rates greater than the assimilative capacity of the environment, and the increase of respiration from microbial decomposition decreases oxygen levels (hypoxia) and changes sediment chemistry. This may cause hypoxia in sediments and the water overlying the bottom, which may in turn affect the abundance and diversity of marine organisms in the area. Reviews have identified changes to sediment chemistry as one of the primary impacts of marine aquaculture in the United States. Over the last several decades, harmful environmental impacts have been reduced because of advances in technology, improved facility siting, better feed management, and stricter regulatory requirements. Feed formulations have been modified to improve digestibility without losses in growth. When feed is more fully digested, the amount of waste (nutrient) outputs per unit of fish produced is reduced and fewer solid wastes and nutrients are released to the environment. Modifying feeding practices also has reduced the loss of uneaten food. Some facilities now use underwater devices to monitor feeding to avoid overfeeding and waste. Environmental monitoring also informs farmers and regulators of the need to leave a site fallow or to adjust feeding. Some researchers and aquaculturalists have proposed the use of multi-tropic aquaculture by adding other organisms such as invertebrates and seaweeds to the aquaculture system. The system would mimic natural tropic relationships, where wastes from cultured organisms are food for other organisms, such as shellfish, and supply nutrients for seaweed. These additions could lessen environmental impacts from nutrients and increase the efficiency of feed utilization. Proponents suggest that offshore aquaculture may produce fewer and less severe environmental impacts than those caused in nearshore areas. They hold that open ocean waters are normally nutrient deficient, and nutrients released from offshore aquaculture operations would likely dissipate. Critics question whether experiences with experimental facilities are relevant to future commercial operations, which may need to operate at larger scales to be profitable. Generally, environmental impacts are likely to vary depending on management and culture techniques, location, size and scale, and species. Fish diseases are caused by bacteria, viruses, and parasites that commonly occur in wild populations. Aquaculture production is vulnerable to mortality associated with fish diseases, and serious losses have occurred. Disease outbreaks cost the global aquaculture industry an estimated $6 billion per year. Starting in 2007, the Chilean aquaculture industry suffered the worst disease outbreak ever observed in salmon aquaculture. The outbreak of infectious salmon anemia virus cost the industry 350,000-400,000 mt of production and $2 billion. Net pens are open to the marine environment, so pathogens may pass freely as water moves through net pen enclosures. Cultured organisms are often more susceptible to diseases because fish are kept at higher densities, which increases the rate of contact among fish and may induce stress. Research suggests that fish pathogens may be transferred from farmed to wild fish and that non-native pathogens may be introduced when fish are moved from different areas. Some fish farmers counter that more disease problems originate in wild populations, where reservoirs of disease naturally exist and are subsequently transferred to cultured organisms. For example, some researchers have identified sea lice as a serious problem for Atlantic salmon farming because of lost production and the costs of disease management. Studies demonstrate that high host densities in net pens promote transmission and growth of the parasite. It has been hypothesized that sea lice may be spread from salmon in net pens to wild counterparts that are passing in adjacent waters. Some assert that sea lice have harmed wild salmon populations migrating near infested salmon farms. Studies have shown that transmission is initiated from wild to cultured fish, and then the lice are transmitted back to wild salmon hosts. The extent of the impact on wild salmon is a matter of debate, because many different factors affect salmon population abundance. However, a recent study concluded that \"Atlantic salmon populations are already under pressure from reductions in marine survival and the addition of significant lice-related mortality during the coastal stage of smolt out-migration could be critical.\" Sea lice control and prevention strategies have included the use of approved therapeutants (aquaculture drugs) and fallowing of sites between production cycles. Various drugs have been used to treat and prevent the occurrence of disease, including disinfectants, such as hydrogen peroxide and malachite green; antibiotics, such as sulfonamides and tetracyclines; and anthelmintic agents, such as pyrethroid insecticides and avermectins. Antibiotics are used to control bacterial diseases and are sometimes introduced to cultured fish in their feed. Drugs also are used to aid in spawning, to treat infections, to remove parasites, and to sedate fish for transport or handling. Viral diseases are managed by monitoring and focusing on management practices, such as lowering stress, selecting organisms with greater resistance, and providing feed with proper nutrients. However, in some cases it is necessary to depopulate farms to stop the spread of the disease. The Food and Drug Administration (FDA) is responsible for approving drugs used in aquaculture. The drug must be shown to be safe and effective for a specific use in a specific species. Only drugs approved by the FDA Center for Veterinary Medicine may be administered to aquatic animals. Drug withdrawal periods and testing are required to prevent the sale of fish that contain drug residues. The USDA Animal and Plant Health Inspection Service is responsible for controlling the spread of infectious diseases and requires an import permit and health certificate for certain fish species. Many states also have animal health regulations to prevent disease introductions and manage disease outbreaks. Aquaculture drugs such as antibiotics that are used to treat marine finfish may be transferred to open water environments when unconsumed feed or fish wastes pass through net pen enclosures. Extensive use of these agents may result in the development and spread of bacteria that are resistant to antibiotics. The use of many of these drugs reportedly is declining, as vaccines eliminate the need to treat bacterial diseases with antibiotics and other drugs. Examples include salmon farming in Norway, where antibiotic use has decreased by 95%, and in Maine, where antibiotics are now rarely used. Proponents of offshore aquaculture suggest that, because of the more pristine and better oxygenated water conditions offshore as compared to many inshore areas, the occurrence of fish diseases could be lower for offshore aquaculture. The escape of organisms from aquaculture facilities, especially non-native species, is another environmental concern related to aquaculture. This issue might arise if genetically selected or non-native fish escape and persist in the wild. Historically, non-native species have been used in aquaculture, sometimes resulting in long-term environmental harm. For example, Asian carp such as silver, bighead, and grass carp were introduced to the United States from Asia to improve water quality of freshwater aquaculture ponds and waste treatment ponds. These species are now found in most of the Mississippi drainage area, and they have affected the basin's aquatic ecology and harmed species such as freshwater mussels and native fish. Genetic diversity could be affected if hatchery-raised fish spawn with wild conspecifics (wild fish of the same species). Interbreeding could result in the loss of fitness in the population due in part to the loss of genetic diversity. Genetic risks would depend on the number of escapes relative to the number of wild fish, the genetic differences between wild and escaped fish, and the ability of escaped fish to successfully spawn in the wild. There are also concerns that non-native fish could become established in the wild and compete with wild fish for food, habitat, mates, and other resources. Experiences with farmed Atlantic salmon may provide some insight regarding escape of farmed fish both within and outside their native ranges. Atlantic salmon have escaped from farms in the Pacific Northwest (outside their native range) and have been recaptured in Alaskan commercial fisheries. In 2017, over 100,000 Atlantic salmon escaped from facilities owned by Cook Aquaculture off Cypress Island, WA. Many of the escaped fish were recovered, and fishery managers assumed the remaining fish were unable to make the transition to a natural diet. In British Columbia, escaped Atlantic salmon have spawned and produced wild-spawned juvenile Atlantic salmon, but it is uncertain whether they have established self-reproducing breeding populations. Within the range of Atlantic salmon, farmed salmon have been found on spawning grounds during the period when wild Atlantic salmon spawning occurs. Domestication of farmed salmon has changed their genetic composition and reduced genetic variation. These changes have occurred because limited numbers of brood fish are used for spawning farmed fish and farmers select for specific traits. Much present-day farm production of Atlantic salmon is based on five Norwegian strains. Farmed and wild hybrids and backcrossing of hybrids in subsequent generations may change genetic variability and the frequency and type of alleles present in wild populations. The extent and nature of these changes to genetic variability may affect survival (fitness) of these populations. Changes in the genetic profiles of wild populations have been found in several rivers in Norway and Ireland, where interbreeding of wild and farmed fish is common. Large-scale experiments in Norway and Ireland show highly reduced survival and lifetime success rates of farmed and hybrid salmon compared to wild salmon. Some researchers have concluded that further measures are needed to reduce the escape of salmon from aquaculture farms and their spawning with wild populations. Researchers and managers have made several recommendations to decrease the risk of invasive species introductions and the loss of genetic diversity. There appears to be common agreement, as in the case of the Gulf of Mexico FMP, that only native species should be farmed. To decrease genetic risks associated with escapes, farmers might be required to use wild broodstock with a genetic makeup that is similar to local wild populations. However, by using this approach, farmers may forgo benefits of selective breeding. Another approach might involve the use of sterile fish created through techniques such as hybridization, chemical sterilization, polyploidy, and others. However, these methods are not always 100% effective and the approach may increase costs of production. Interactions between aquaculture operations and marine wildlife may occur when predators in search of food are attracted to aquaculture facilities or if aquaculture sites overlap with the ranges or migration of marine species. These interactions are common in Chile, British Columbia, and Norway, where marine mammals and birds often are attracted to salmon farms. Most interactions are seasonal and involve sea lions, seals, and otters, as well as seabirds such as sea gulls and cormorants. Predation can result in loss of fish, damage to equipment, and stress to fish. Deterrence measures seek to address these concerns; for example, predator nets may be placed outside the main net to stop marine mammals directly accessing the net pen. Some farms also install bird nets over net pens to protect fish from bird predation. When nonlethal measures fail, sea mammals are sometime culled. Offshore facilities could affect some endangered species as they migrate or alter essential habitat for feeding, breeding, and nursing. Information on incidental entanglement and mortality is limited, because of the small number of facilities working in offshore areas. NOAA recently investigated longline aquaculture gear that might be used for mussel culture and found that interactions are rare. However, researchers questioned whether the small number of interactions indicates that this type of aquaculture is benign or is due to the failure to detect and report interactions. Minimizing impacts on protected species may require monitoring and research into natural interactions between predators and prey. Management strategies might involve preventive measures, such as spatial planning and aquaculture gear modifications. Wild fish also are sometimes attracted to net pens to consume feed that has fallen through net pen enclosures. The attraction of wild fish may provide a benefit, because their consumption of feed may lessen environmental impacts such as the release of nutrients or deposits of feed near net pens. At the same time, it could have negative impacts, such as the transfer of diseases from farmed to wild fish or from wild to farmed fish. Impacts related to changes in wild fish physiology from the ingestion of feed and changes in the distribution of wild fish are unknown. Fish feed is a critical input, because it must provide all of the essential nutrients and energy needed to meet the cultured organism's physiological requirements. The supply and use of aquaculture feed are directly related to the economic viability of aquaculture operations, fish growth and health, environmental quality, ecological concerns, and human nutritional benefits from aquaculture products. Fish meal and oil are used to produce feed for carnivorous species such as salmon, because these ingredients provide nutritional requirements that are similar to those found in the wild. Aquaculture feeds must have a composition that maintains growth and fish health while balancing the costs of feed components against the value of outputs associated with fish growth. Researchers note that future aquaculture production is likely to be constrained if feeds are limited to sources of fish meal and oil, which require wild fish production and fish processing wastes. Research efforts have focused on the use of fish meal and oil substitutes that are derived from terrestrial plants. Plant meal and oils now supply the bulk of feed ingredients, but they are not a perfect substitute and, in many cases, fish meal and oil are still an important component of most fish feeds. Nutritional requirements and feed composition vary according to species, the life stage of the organism (e.g., larvae, fry, fingerlings, adults), and management objectives. Fish feeds are formulated to provide a mixture of ingredients, such as proteins, lipids, carbohydrates, vitamins, and minerals, which provide the greatest growth at the lowest cost. Historically, fish meal and oil have been principal ingredients of many aquaculture feeds, because these ingredients have been a cost-effective means of providing the nutritional requirements of many cultured species. Fish meal and oil are obtained from reduction fisheries that target small pelagic species such as anchovies, capelin, herring, and menhaden and from fish processing wastes of wild and aquaculture products. Reduction fisheries target species that are generally less valuable than those used for human consumption. The fish are heated and pressed to obtain fish oil and milled and dried to produce fish meal. Since 2006, the annual world supply of fish meal has ranged from 4.49 mmt to 5.86 mmt and the supply of fish oil has ranged from 0.86 mmt to 1.08 mmt. In 2016, the United States produced 253,600 metric tons (mt) of fish meal and 80,500 mt of fish oil, approximately 5% and 8% of global production, respectively. Reduction fisheries supply approximately 70% of fish meal and fish oil, with the remainder obtained from fish processing wastes. In the last 20 years, global production of fish meal and oil has declined in part because of increasing use of fish from reduction fisheries for direct human consumption and tighter quotas and controls on unregulated fishing. The global decrease in total fish meal production has occurred despite increasing production of meal and oil from fish processing wastes. Researchers have found that fish meal (protein) and fish oil (lipids) are important ingredients for fish growth. Most feeds are formulated to increase efficiency by using high-energy lipid to allow for greater conversion of dietary protein into fish muscle. In addition to fish protein and oil, fish feeds may include plant proteins, terrestrial animal protein, carbohydrates, moisture, ash, vitamins, and minerals. In comparison to other animals, fish are relatively efficient in converting fish feed to flesh. For example, feed conversion ratios for Atlantic salmon are approximately 1.15 (approximately 1.15 kilograms [kg] of dry feed are used to produce 1.0 kg of salmon flesh [wet]). In 2013, salmon fish feed used on Norwegian farms consisted of approximately 18% fish meal and 11% fish oil. The amount of marine fish protein and oil needed to produce a unit measure of seafood such as salmon has been decreasing with the use of plant-based substitutes. The \"fish in fish out\" ratio is the amount of wild fish needed to produce the fish meal and fish oil required to produce one kilogram of farmed fish. The ratio of \"fish in to fish out\" varies according to the nutritional requirements of different species, with higher ratios for carnivorous fish such as eels (1.75) that are fed higher fish protein and fish oil diets and lower ratios for omnivorous fish such as tilapia (0.18). When aggregated across species, worldwide aquaculture is a net producer of fish protein, with estimates ranging from 0.22 kg to 0.5 kg of wild marine fish used to produce a kilogram of farmed seafood. Over the last two decades, research on fish dietary requirements has contributed to progress in developing substitutes for fish meal and oil from terrestrial plant ingredients and other potential sources, such as marine algae. This has led to reductions in the use of fish meal and oil as ingredients in fish food. Terrestrial plant meal and oils now supply the bulk of feed ingredients for most fish species. The focus of research has been on plant protein and oil sources such as soy, canola, sunflower, cottonseed, and others. For example, the Norwegian salmon industry has reduced the content of fish meal and oil in fish feed from over 60% to less than 25% by using plant proteins and oils. In spite of decreasing global production of fish oil and meal, use of plant-based substitutes has allowed production of feeds for all aquaculture to expand at 6% to 8% per year. Increasing demand and a limited supply of fish meal and oil have caused prices to triple for these ingredients in recent years. These price increases are likely to continue, because production is generally limited to supplies from wild sources. The cost of aquaculture feeds accounts for approximately 50% of net pen aquaculture operating costs. Limited wild supplies and rising feed costs have encouraged researchers and aquaculturalists to improve feeding techniques to reduce waste, modify feed formulations, use alternatives such as waste from fish-processing plants, and investigate new sources. Substitution has become more attractive, as the prices of fish meal and oil have risen faster than the prices of plant proteins and oils. Fish can be cultured with substitutes for fish meal and oil, but the commercial use of substitutes depend on whether the lower costs of the substitute can offset losses associated with lower growth rates, less disease resistance, and inferior nutritional value of aquaculture products. Although significant progress has been made in using plant protein and oil substitutes for fish feeds, there are still limitations to their use. In the near future, some fish meal and oil will still be needed in feed formulations. Plant meals are deficient in certain essential amino acids and contain fiber, carbohydrates, and certain antinutritional factors, which can adversely affect absorption, digestion, and growth. Nutritional quality of plant proteins can be improved through chemical and mechanical processing, which can reduce certain antinutrients and concentrate protein. Plant oils are an excellent source of energy, but they do not contain omega-3 fatty acids (eicosapentaenoic acid [EPA] and docosahexaenoic acid [DHA]). These fish oils have been found to improve immune responses and fish health generally. Fish species have differing tolerances to diets without certain fatty acids, which appear to be related to their natural diet. The use and substitution of plant protein and oils is likely to increase with further research into alternatives and as prices of fish meal and oil increase. Proper feed formulations also are essential to promote fish health and prevent disease outbreaks. When fish are farmed at high densities, good nutrition tends to reduce stress, decrease the incidence of disease, and boost immune systems. A deficiency in any required nutrient may impair health by affecting the organism's metabolism and increasing susceptibility to disease. Research has shown that the use of plant oils and the ratio of different fatty acids can affect the immune response in fish. Dietary additives of immunostimulants, probiotics, and prebiotics have been found to increase immunity, feed efficiency, and growth. An ongoing challenge is to improve knowledge and commercial application of feed formulations, especially for nutrimental requirements of newly domesticated species. The human health benefits of seafood are widely recognized because fish species contain high-quality protein, oils, minerals, and vitamins. Some research has found that diets that include omega-3 fatty acids enhance early brain and eye development and reduce heart disease and cognitive decline later in life. Feeds with plant-based substitutes can affect the quality of seafood products because these alternatives lack the fatty acids that are beneficial to human health. Farmed fish products that have been fed plant substitutes for fish oil may have lower concentrations of beneficial fish oils in their flesh. Two potential ways to reduce the use of fish oils in feed while maintaining high levels of omega-3 fatty acids in fish are (1) to develop genetically modified plants, fungi, or microbes to produce DHA and EPA for use in fish feeds or (2) to grow fish on low fish oil diets in the beginning of the production cycle and boost the omega-3 fatty acids in fish diets to raise their levels at the end of the production cycle. There also are growing public health concerns about persistent organic pollutants, such as polychlorinated biphenyls (PCBs), and inorganic contaminants, such as heavy metals, in farmed fish. The accumulation of contaminants varies by location and associated sources of pollutants. It can occur in both wild and farmed fish. Fish fed with fish meal and oils may accumulate contaminants from marine sources. Several studies have reported elevated levels of contaminants in feeds and farmed Atlantic salmon flesh. An advantage of using plant protein and oil is the potentially lower contaminant levels than those found in some wild seafood products. Several studies have found that replacing fish protein and oil with plant-derived material lowered the level of contaminants significantly. Consumer perceptions of changes in the quality of fish raised with substitute feeds also may affect acceptance of aquaculture products. There are widely held beliefs regarding the composition and health benefits of farmed and wild fish. Studies have shown that there are differences in taste and texture of fish farmed with alternative proteins and oils, but consumer preference studies have yielded mixed results. Public perceptions of aquaculture products also include concerns with the use of therapeutants such as antibiotics and the crowding and industrial nature of fish farming. Some stakeholders have described the use of fish meal and oils for aquaculture feeds as an issue related to the sustainability of forage species and marine ecosystems. More than 30% of global fish production and a large portion of fish meal and oil used for aquaculture feeds (75%) is derived from the harvest of forage species, such as herring, anchovies, capelin, and menhaden. Fatty acids are produced by marine algae (phytoplankton), consumed and concentrated in fish that consume algae, and transferred to organisms higher in the food chain that consume forage species. As stated earlier, forage species have a relatively low economic value, and most are not marketed for direct human consumption. However, their biomass is relatively large because they feed at somewhat low tropic levels, and they can be caught fairly easily in large volumes because they are schooling species. Forage species serve as prey for higher tropic level fish species such as tuna, cod, and striped bass, marine mammals, and marine birds. Aquatic ecologists question whether aquaculture demand and increasing prices may encourage higher levels of fishing pressure and cause or continue overfishing of forage fish populations. Management of wild fish stocks is improving in many parts of the world, and many stocks are now considered to be well managed. However, some researchers have concluded that fishing for forage species should be limited to relatively low levels, because forage species are needed to support production of other marine species. Research using ecosystem models suggests that forage fish should be fished at lower rates to benefit the ecosystem rather than at rates that would provide long-term maximum yield. One report recommended that catch rates should be reduced by half and biomass of forage fish should be doubled. However, other researchers have questioned whether there is a strong connection between forage fish abundance and the abundance of their predators; they conclude that harvest policies for forage species need to be guided by a variety of factors that recognize the complexities of fisheries and ecosystems. Increasing demand for seafood, advances in aquaculture methods, and increases in global aquaculture production have led many observers to take an optimistic view of potential offshore aquaculture development in the United States. Nevertheless, the future of offshore development is uncertain because of the paucity of experiences in establishing and managing U.S. offshore aquaculture facilities. Greater regulatory certainty may encourage U.S. offshore development, but economic viability will determine whether the industry expands and produces significant quantities of seafood. The viability of offshore aquaculture in the United States is likely to depend on future developments, such as further technical advances, economic conditions, and social and political acceptance. Another economic consideration for policymakers is how to integrate policies that recognize the potential costs (externalities) of environmental harm that may be caused by offshore aquaculture and are not captured by markets. In addition to economics, user conflicts and related political factors are likely to play a role in the potential development of an offshore industry. The economic potential of offshore aquaculture will depend on the prices of seafood products and the cost to produce them. The following discussion identifies some of the factors that will determine whether offshore aquaculture may be profitable. The quantity demanded for an aquaculture product is a function of priceâeach point along the demand curve is the quantity that consumers are willing to buy at a specific price. Consumers are generally willing to buy less product at higher prices and more product for lower prices. A change in demand, a shift of the demand curve, depends on a variety of factors, such as changes in income, prices of substitutes (domestic wild fish) and complements, and consumer tastes and preferences. Offshore aquaculture production will compete with a variety of other protein products, such as imported seafood; domestically produced wild fish; and agriculture sources such as chicken, pork, and beef. Generally, demand for seafood products is rising both globally and domestically because of increasing population levels and incomes. The health benefits of seafood are also influencing changes in consumer preferences, with general movement away from traditional protein sources such as beef. Other types of domestic marine aquaculture production, such as land-based and inshore aquaculture, may compete with offshore aquaculture, but currently these activities provide a relatively small portion of the seafood consumed in the United States. Domestic sources of seafood may increase marginally as some overfished stocks recover, but most domestic fisheries are already at or near their natural limits. Some have reported that offshore aquaculture could produce a higher-quality product because of the constant flow of clean water through net pens. If it can be shown that offshore products contain fewer toxin residues or if offshore products can be raised without aquaculture drugs, these products may become more attractive to health-conscious consumers. The FDA Seafood Safety Program and the NOAA Seafood Inspection Program also may reassure U.S. consumers of the safety and quality of domestic seafood, including seafood produced by offshore aquaculture. These factors may allow offshore producers to differentiate their products and receive higher prices relative to imports or other domestic seafood, especially in niche markets. The amount of seafood that aquaculturalists will be willing to produce at a given price depends on production costs. Economic conditions determine the costs of labor, hatchery supplies for stocking, feed, maintenance, and other inputs. For most aquaculture operations, the bulk of costs are for feed and stocking of early life stages, such as finfish fingerlings or oyster seed. Fixed costs include equipment depreciation, insurance, taxes, and lease payments. Shifts in supply result from changes in input prices, which also may be affected by technology, weather conditions, and other influences. At the level of individual farms or facilities, most costs are not set and often depend on short-run and long-run choices of the aquaculturalist. For example, in the short run, the producer may change feed quality and quantity, harvest intervals, or stocking rates, while in the longer term she may change species, location, technology, and scale. Costs to produce seafood in offshore aquaculture facilities are likely to be higher than costs in inshore areas, because of the need for more resilient cage materials and construction, shore-side infrastructure, specialized vessels, and automation of facility systems. The location of offshore aquaculture facilities also is likely to increase costs for fuel, monitoring, harvest, and security. According to the Food and Agriculture Organization, offshore facilities operating at distances of greater than 25 nm from shore are unlikely to be profitable, because costs increase with distance from shore. Some have speculated that offshore facilities will need to take advantage of economies of scale because of the relatively high costs of transporting materials between inshore and offshore facilities. Operating large-scale operations will require new coastal facilities and networks to supply and transport feed, construction materials, fingerlings, and harvested fish. Logistics networks to supply these inputs would need to be developed in coastal areas, where \"working waterfronts\" are already threatened due to competing uses and the relatively high cost of coastal real estate. These startup costs may exclude smaller producers who may not have access to the capital and resources needed to establish large-scale operations. Financial risk, generally the probability of losing money, is another factor that is related to potential viability of offshore aquaculture and may affect the availability of capital and insurance. Risk is defined as uncertain consequences, usually unfavorable outcomes, due to imperfect knowledge. Assessing risk for offshore aquaculture is complicated by different species, technologies, site characteristics, and the lack of experience working in offshore areas. Risks may be greater in offshore than inshore areas because of the threat of severe weather conditions and exposed offshore environments. Attracting investment may be difficult because offshore aquaculture is a new industry with limited experiences for investors to evaluate. As risk and uncertainty increase, generally, a greater revenue stream is required to justify the same level of investment. Known risks can be reduced by decreasing the probability of adverse outcomes, such as by using stronger materials to build more resilient structures. The cost of reducing risks must be weighed against the probability and magnitude of potential losses. Another approach to reducing risk is through insurance. Insurance transfers risk from the producer to the insurance underwriter through payments of insurance premiums. The cost of insurance premiums may be higher for offshore than inshore areas because of greater uncertainty and potentially higher risks of losses for offshore facilities. The previous discussion of supply and demand considers private costs of production that are borne by the producer. Policymakers are concerned with a broader definition of costs that may affect individuals who are not involved in the aquaculture businessâoften referred to as externalities . Externalities are defined as spillover costs or benefits, which are unintended consequences or side effects associated with an economic activity. For example, commercial fishermen may be harmed by habitat degradation caused by pollution from aquaculture because of associated declines of wild populations. When externalities are not considered, markets become inefficient because more of a good or service is produced than when the externality is fully considered. The recognition of externalities is another way in which policymakers can examine the tradeoffs related to the private benefits from aquaculture production and the environmental harm caused by the activity. In the case of offshore aquaculture, external costs may be associated with environmental harm from pollution, escaped organisms, disease transmission, and other effects. The existence of externalities means that policymakers may need to consider whether and to what degree the government should intervene to account for these costs. Intervention may involve regulatory measures that minimize externalities while maximizing benefits associated with the industry (e.g., fish production). Decisions related to site selection, technology, and facility operations are likely to be some of the main factors that determine the level of offshore aquaculture externalities. DOC has expressed concern with increasing U.S. imports of seafood products. According to NMFS, 80%-90% of the seafood consumed in the United States is imported. International trade in seafood has grown over the last several decades. The value of seafood trade is now more than twice the trade of meat and poultry combined. Relatively high-value seafood from wild fisheries and aquaculture dominates imports. In 2017, the United States imported approximately 2.7 mmt of edible seafood valued at $21.5 billion. After accounting for exports valued at $5.7 billion, the value of imports was $15.8 billion greater than exports of edible seafood products. Approximately half of seafood imports are cultured. The two main imported products are farmed shrimp and salmon. In 2017, shrimp accounted for $6.5 billion and salmon accounted for $3.5 billion of U.S. seafood imports. Supporters of offshore aquaculture assert that development of offshore areas and associated increases in seafood production could reduce the U.S. deficit in seafood trade. The Department of Commerce Strategic Plan states that, \"a strong U.S. marine aquaculture industry will serve a key role in U.S. food security and improve our trade balance with other nations.\" Some may counter that the seafood trade deficit is not a good reason to support development of the aquaculture industry. Cultured salmon and shrimp imports have lowered prices and, therefore, the profits of domestic wild fisheries and aquaculture producers, but U.S. consumers have benefited from lower salmon and shrimp prices. According to economic theory, countries gain from trade when they specialize in products that they are best at producing. If other countries have an absolute or comparative advantage in aquaculture, the United States would likely benefit from supporting other industries. Advocates of aquaculture note that the United States has advantages compared to other countries because of its extensive coastline and EEZ, skilled labor, technology, domestic feed production, stable government and economy, and large seafood market. Others counter that U.S. federal waters are exposed to high winds and wave action for large parts of the year, whereas other parts of the world have readily available inshore areas and calmer offshore waters that could be developed, as well as lower labor costs. Overall operating costs and environmental standards for aquaculture in other countries are often lower than in the United States. Some have speculated that costs of inputs such as labor and less strict regulations provide producers outside the United States with an insurmountable competitive advantage. Other observers stress that costs may be lower in other countries, but if prices are high enough, U.S. producers may still be able to operate profitably. Domestic producers also have some advantages, such as a large and relatively wealthy market and lower shipping costs than those for imports. The government sometimes provides government-sponsored trade protections such as tariffs or import quotas to new industries. Protection may be rationalized by an infant industry that claims it requires time to overcome short-term cost disadvantages. Cost disadvantages may be related to the need to become more efficient by constructing new facilities, training workers, and installing new equipment. In these cases, tariffs would act as a subsidy that increases the domestic price of the good. When the industry becomes more efficient, the tariff would expire. However, as the industry becomes larger and more politically powerful, it may become difficult to remove the tariff. U.S. aquaculture production from inshore marine areas and freshwater ponds and raceways is small relative to global production levels. The bulk of U.S. aquaculture production is from freshwater catfish, crayfish, and trout. Catfish production increased from 62,256 mt in 1983 to its peak of 300,056 mt in 2003. Factors that have supported the industry's development include research and development, marketing efforts, industry leadership, and vertical integration. However, production decreased from 215,888 mt in 2009 to 145,230 mt in 2016. An increase of pangasius (an Asian catfish) and tilapia imports has contributed to lower prices, which have contributed to decisions by less profitable catfish farms to take acreage out of production. Salmon is the only marine finfish with significant U.S. marine aquaculture production, but it has struggled to compete with relatively inexpensive imports from Norway, Chile, and Canada. These countries are endowed with protected coastal areas such as fjords or bays where net pens may be deployed. Although environmental regulations and limitations on inshore leases may have affected U.S. salmon aquaculture production, stagnant prices and competitive imports also appear to have played a role. There is room for expansion of inshore net pen salmon aquaculture in areas of Maine, Washington, and Alaska. However, many residents in these areas do not support establishing or expanding net pen aquaculture because of environmental concerns and potential impacts on existing fishing industries. The ban on finfish aquaculture in Alaska and regulatory constraints in other states reflect these concerns. Currently, nearly all worldwide marine aquaculture production is from relatively well-protected inshore waters. Countries in the forefront of efforts to move offshore have experience with inshore aquaculture and with aquaculture industries that are characterized by relatively large investments in vertically integrated firms. Norway and China are the two largest investors in offshore aquaculture development, but neither country has facilities that are operating commercially. Their efforts have focused on developing structures that can withstand harsh offshore conditions and operate at scales that may offset the higher costs of offshore areas as compared to inshore areas. Norway's industry already has extensive experience with inshore salmon aquaculture industry and is a leader in developing technology needed to move farther offshore. Norway has granted development licenses in offshore waters, and Norwegian companies are experimenting with different offshore concepts. Although there has been significant investment in offshore aquaculture in Norway, it is unclear whether these concepts will be profitable. It appears that long-term business strategies are still focused on inshore waters. Offshore aquaculture facilities are also under development in other countries, including Mexico, Panama, and Turkey. The characteristics of specific regions also may offer advantages, as some believe future development will occur in the calm water tropical belt between 10Â°N and 10Â°S. One former offshore aquaculture farmer believes future investment will focus on new species in tropical and subtropical regions. It appears that growth of marine aquaculture may take different approaches in different parts of the world, with further increases in production from proven nearshore areas and research and development of potential land-based and offshore areas. Generally, movement offshore is likely to occur if seafood demand continues to increase and suitable nearshore areas are occupied or constrained by other factors. Some stakeholders have expressed concerns about offshore aquaculture that include environmental degradation, competition for ocean space, and market interactions between wild fishery and aquaculture products. Historically, user conflicts associated with aquaculture have occurred in inshore areas where oceans activity and use are more intensive. For example, some fishermen oppose aquaculture and perceive it as competition that lowers prices and fishing revenues. Most interactions are characterized as conflicts, but in some cases synergistic relationships may emerge. Environmental concerns have been among the most controversial elements of the aquaculture debate, including expansion of aquaculture into offshore waters. Generally, environmental and commercial fishing interests have been opposed to plans for offshore aquaculture development because of potential harm to marine resources. They have asserted that poorly regulated inshore aquaculture development has degraded the environment and harmed wild fish populations and ecosystems. Concerns identified by these stakeholders include pollution, the use of wild species for fishmeal, fish escapement, threat of disease and parasites, harm to marine wildlife, and general impacts on marine ecosystems. Most commercial fishing and environmental interests advocate a precautionary approach. Industry supporters and aquaculturalists respond that research, innovation, and management practices have reduced or eliminated environmental risks. Generally, aquaculturalists assert that many previous environmental concerns have been addressed and that long-term aquaculture production relies on maintaining a clean and productive environment, an objective that environmental and fishing industry advocates also hold. Some also view offshore aquaculture as an additional means to support the domestic seafood industry, which has decreasing levels of employment in many regions. Some have noted that synergistic effects might support infrastructure and services such as docks, cold storage, and processing facilities that benefit both wild fishing and aquaculture. Seafood imports from aquaculture production have affected seafood markets and coastal communities, such as salmon fishermen in Alaska and shrimp fishermen in the Gulf of Mexico. Prices fell during the 1990s, as global salmon and shrimp aquaculture production and associated imports increased. This shift caused significant economic difficulties for Alaska salmon fishermen, processors, and communities. Wild salmon prices have recovered to some extent, likely due to growing consumer differentiation between wild and cultured products. Some have responded that competition will occur with or without domestic growth in aquaculture because imports of farmed products are likely to continue and grow. Other changes that have been attributed to aquaculture include accelerated globalization of the seafood industry, increased industry concentration and vertical integration, and introduction of new product forms. Marine aquaculture, especially the offshore aquaculture industry, is a small and new industry with few committed supporters and relatively little money and political influence. One observer noted that, \"marine aquaculture will become politically stronger as it growsâbut it is difficult to grow without becoming politically stronger.\" The industry also faces opposition from environmental and commercial fishing interests. Several developments will need to take place if offshore aquaculture can be expected to become established and grow into a viable commercial industry; these developments are discussed in the next section. Most stakeholders agree that a regulatory framework likely needs to be developed before establishing offshore aquaculture in U.S. federal waters. A potential framework would need to fulfill the government's public trust responsibilities while remaining flexible enough to take advantage of evolving technology and markets. Many of the basic elements of the framework would depend on legislation providing statutory authority and requirements for leasing offshore areas, agency leadership and interagency coordination, and environmental protection. A regulatory framework could provide the industry with clear and understandable requirements for aquaculture facilities while minimizing potential environmental harm. Supporters of offshore aquaculture have advocated for a permitting and consultation process that is more timely, efficient, and orderly than the existing process. Most also agree that the regulatory process should be transparent and support public involvement. NMFS has been the lead federal agency for marine aquaculture in inshore areas and for the potential development of offshore aquaculture. According to a 2008 U.S. Government Accountability Office (GAO) study, \"there is no lead federal agency for regulating offshore aquaculture, and no comprehensive law that directly addresses how it should be administered, regulated, and monitored.\" Stakeholders also have supported NOAA's role in managing federal aquaculture research, including research and development of offshore aquaculture technologies. Since publication of the GAO report, NMFS has attempted to regulate offshore aquaculture under the MSA. A recent court decision, however, cast doubt on whether NOAA has the authority under MSA to regulate offshore aquaculture. Several studies have recommended that NOAA should be granted clear authority to regulate offshore aquaculture. They point out that NOAA already has authority to evaluate proposed marine activities and projects to ensure the protection of marine mammals, endangered species, and marine sanctuaries. Furthermore, NOAA is responsible for federal management of marine fisheries and essential fish habitat. One of the needs for offshore aquaculture development is permitting or leasing of discrete ocean areas. Within the EEZ, the United States has sovereign rights for the purpose of exploring, exploiting, conserving, and managing natural resources, whether living and nonliving, of the seabed and subsoil and superjacent waters. The federal government grants rights to develop specific areas for specific activities in the EEZ are granted. Currently, no permitting or leasing program is specific to offshore aquaculture and leases depend on permits and consultation requirements under different laws and agencies that apply to marine activities generally. Observers generally agree that aquaculture developers will need assurances that they will have exclusive rights via leases or permits to use specific ocean areas for agreed-upon periods. A leasing system could provide aquaculturalists with clearly defined rights to ocean space including the water surface, water column, and ocean bottom. Other characteristics of a leasing system might include transferability of the lease or permit, which would allow the aquaculturalist to transfer the permit or lease and benefit from its sale or use. Stakeholders told GAO that clear rights to use specific ocean areas would be needed to obtain loans. Proponents of offshore aquaculture development stress that, without some form of long-term (at least 25 years) permitting or leasing, offshore aquaculture will have problems securing capital from traditional funding sources and obtaining suitable insurance on the capital investment and stock. The Gulf of Mexico Aquaculture Fishery Management Plan (Gulf FMP) provides a 10-year site permit and 5-year permit renewals. Aquaculture industry representatives have expressed concern that these intervals are too short because of the time it will take their businesses to become profitable. Environmentalists would prefer \"shorter timeframes to ensure more frequent reviews and closer scrutiny of environmental impacts during the lease or permit renewal process.\" In state waters, Maine grants 10-year leases for salmon net pen aquaculture. Hawaii grants 20-year leases for permits in its waters. The public's primary concerns are likely to include minimizing harmful effects on environmental quality and conflicts among ocean uses. Most recognize that a leasing framework will require review of potential environmental impacts of offshore aquaculture. This review likely would require the preparation of a programmatic environmental impact statement (PEIS) with a follow-up site-specific environmental review before a facility might be established. A PEIS could review potential environmental impacts of offshore aquaculture over broad areas of the ocean. Aquaculturalists generally agree that this approach would be useful if it reduced the need for facility-specific reviews. Some have suggested that permits should be issued on a case-by-case basis by determining whether a specific site is appropriate for the proposed aquaculture facility. Others oppose this approach, because it could lead to an approval process that is less consistent and it could make it more difficult for regulators to assess cumulative impacts of different facilities within a region. Still others have suggested that ocean planning should identify both appropriate and prohibited areas for aquaculture. Regulators could assess potential sites for permitting aquaculture before and independently of individual permit applications. Some believe that this would make permitting more predictable and consistent. For example, the likelihood of harm to marine mammals might be decreased by limiting permits for aquaculture facilities to areas with a low risk of interactions. However, some aquaculturalists question whether regulators will choose the most viable sites for aquaculture. A regulatory framework is likely to require specific conditions on the use of a site. These requirements likely will vary depending on the species and technology employed. Nevertheless, some basic requirements related to environmental quality, inspections, and other public concerns are likely to be common to many offshore aquaculture operations. The Gulf FMP includes specific requirements that could be applicable to managing offshore aquaculture in other regions. A partial list of operational requirements under the Gulf FMP includes the following: placing at least 25% of the facility in the water at the site within two years of issuance of the permit; marking each system placed in the water with an electronic locating device; obtaining juveniles for stocking from certified hatcheries within the United States; providing a health certificate prior to stocking fish at the aquaculture facility; complying with all FDA requirements when using drugs or other chemicals; monitoring and reporting environmental survey parameters consistent with NMFS guidelines, inspecting for interactions or entanglements of protected species; and allowing access to facilities to conduct inspections. Some have recommended requirements for aquaculture facility plans to address potential contingencies, such as fish escapes from aquaculture facilities. Some representatives of fishery management councils supported marking or tagging hatchery fish as a potential means of tracking escaped organisms. However, some have questioned whether the added costs of marking fish are warranted and contend that tagging requirements should depend on the level of associated risk to natural resources. Monitoring could also be required to track interactions with marine life and other changes to the environment. State regulators in Maine and Washington have developed monitoring requirements for net pen salmon aquaculture, such as monitoring the benthic community under net pens. Both states also require notification of disease outbreaks and can require specific mitigation measures depending on the severity of the outbreak. Federal monitoring requirements could be informed by state experiences and modified as better information becomes available. The Gulf FMP includes reporting requirements for stocking, major escapement, pathogen episodes (disease), harvest, change of hatchery, marine mammal and sea bird entanglement, and other activities or events. Aquaculture facilities in offshore areas would occupy areas that may be used for other ocean uses, such as oil and gas development, wind and tidal energy, maritime transportation, and commercial and recreational fisheries. Some have recommended that \"development of a national aquaculture management framework must be considered within the context of overall ocean policy development, taking into account other traditional, existing, and proposed uses of the nation's ocean resources.\" If conflicts develop over access to particular areas, a process would need to be developed to identify suitable areas in federal waters for aquaculture development and/or to mediate disputes. For example, commercial and recreational fishermen may have concerns regarding access to areas they have fished historically and potential interactions of cultured and wild fish. Some ocean managers have suggested that overlaying maps of different jurisdictions, ocean uses, and conditions favorable to aquaculture would be useful in avoiding user conflicts. As a regulatory framework for offshore aquaculture is developed, it could be enhanced by improving coordination and cooperation among federal, state, territorial, and tribal entities. Existing groups, such as the Subcommittee on Aquaculture, have provided a means for communication among federal agencies that might be used to enhance federal coordination of offshore aquaculture development and management. The fishery management councils established under the MSA likely would have a role in offshore aquaculture development. Each of the eight regional councils develops FMPs for wild marine fisheries within its particular region. These plans are then sent to NMFS for approval and implementation. Historically, fishery management councils have had a role in considering whether to support offshore aquaculture in federal waters. In addition to the Gulf of Mexico FMP for aquaculture, several exempted fishing permits were issued for limited periods to investigate potential aquaculture development in federal waters off New England. Potential interactions with wild fisheries and harm to essential fish habitat and wild fish populations are likely to be fishery management councils' main concerns. In addition to consultation requirements under the Coastal Zone Management Act, the state role in developing a regulatory framework for offshore aquaculture may deserve additional consideration. Some stakeholders support an opt-out provision allowing states to refuse development in federal waters adjacent to state waters. Others suggest that the opt-out provision should apply only within a certain distance of shore (such as 12 nm). In response to earlier proposed legislation, NOAA supported a 12 nm distance to provide states with a buffer zone and simplify the difficulties of projecting state boundaries out to 200 nm. Harmonizing aquaculture regulations with adjacent states could provide an advantage to future development, because states would be in a position to limit or promote offshore aquaculture development. Some assert that federal government assistance would be needed to promote the initial development of a U.S. offshore aquaculture industry. Assistance could range from general support of research to direct support of industry needs, such as finance. One argument in support of government assistance is that, in comparison to relatively well-known agriculture sectors such as animal husbandry, there are more uncertainties associated with offshore aquaculture. With the exception of Atlantic salmon, culture of most marine finfish is still at a relatively early stage of development. Development of offshore aquaculture is likely to require new culture techniques for rearing species not presently cultured. For this reason, the U.S. Oceans Commission recommended more assistance for aquaculture generally and an active government role to foster industry development. Stakeholders identified federal research needs in four areas: developing fish feeds that do not rely on harvesting wild fish; developing best management practices; exploring how escaped offshore aquaculture-raised fish might impact wild fish populations; and developing strategies to breed and raise fish while effectively managing disease. In addition to improving culture techniques, further research of interactions between aquaculture and the environment and potential harm to specific species and ecosystems could inform decisions related to site selection and monitoring needs. A remaining question is which agency or agencies will provide the support needed for offshore aquaculture development. Some may question whether NOAA has adequate institutional experience with aquaculture or whether additional resources are needed to provide adequate program management and services. Some NOAA programs support the fishing industry, but none focus specifically on offshore aquaculture. Similarly, USDA administers a number of programs that support agriculture in areas such as finance, research, extension, market development, and disaster assistance, but none are specifically focused on offshore aquaculture. Legislation in the 116 th Congress to support offshore aquaculture may address whether and how NOAA and/or USDA programs could be adapted to the needs of offshore aquaculture, which is the appropriate agency to manage specific programs, and what level of federal support is appropriate. Currently, development of offshore aquaculture appears unlikely because of regulatory, technical, and economic uncertainties. One of the main issues for Congress is whether legislation can be developed that could provide the industry with greater regulatory certainty while assuring other stakeholders that environmental quality can be maintained and other potential conflicts minimized. Research and development of inshore facilities have shown that offshore aquaculture is technically feasible but have not shown whether moving facilities to offshore areas would be profitable. It is likely that the investment required for commercial development of offshore aquaculture facilities will depend to some degree on greater regulatory certainty. For example, one business that was developing offshore aquaculture in Puerto Rico has moved its operations to Panama; according to the owner, U.S. regulations made expansion impossible. Aquaculturalists and investors are likely to require secure property or leasing rights and clear regulatory requirements before investing in large-scale operations. Stakeholders with concerns that aquaculture will degrade the environment also may need assurances that adequate regulation, inspections, and enforcement will be required features of a regulatory program. These concerns have been reflected in several aquaculture bills that would prohibit offshore development until comprehensive legislation is enacted. Previous congressional actions, such as hearings and bills, have concentrated on several areas, which include providing institutional support for aquaculture, such as planning, research, and technology transfer; identifying a lead agency to administer and coordinate aquaculture development and regulation; establishing and streamlining permit and consultation requirements to improve the efficiency of the permitting process; developing processes to consult and communicate with other stakeholders to reduce user conflicts; and minimizing environmental harm and addressing environmental concerns through planning and monitoring. If aquaculture is developed in the EEZ, most stakeholders likely would agree that there is a need for better coordination, clear regulation, and focused agency leadership. Some assert that congressional action will be necessary to support both commercial development and environmental protection. Congress has made several attempts to pass offshore aquaculture legislation, including bills in the 109 th , 110 th , 111 th , 112 th , and 115 th Congresses, but none of these bills were enacted. Bills also were introduced that would have prevented aquaculture development in federal waters until statutory authority for offshore aquaculture development is enacted. While many stakeholders continue to call for federal legislation, it has been difficult to find a common vision among them for future development of an offshore aquaculture industry. In the 116 th Congress, no comprehensive offshore aquaculture legislation has been introduced, but several bills have been introduced that are related to offshore aquaculture and aquaculture generally. The Keep Finfish Free Act of 2019 ( H.R. 2467 ) would prohibit the issuance of permits to conduct finfish aquaculture in the EEZ until a law is enacted that allows such action. The Commercial Fishing and Aquaculture Protection Act of 2019 ( S. 2209 ) would amend the MSA to provide assistance to eligible commercial fishermen and aquaculture producers. Assistance could be provided when an eligible loss occurs due to an algal bloom, freshwater intrusion, adverse weather, bird depredation, disease, or another condition determined by the Secretary of Commerce. Other bills include the Prevention of Escapement of Genetically Altered Salmon to the United States Act ( H.R. 1105 ) and the Shellfish Aquaculture Improvement Act of 2019 ( H.R. 2425 ). In the 115 th Congress, the Advancing the Quality and Understanding of American Aquaculture Act (AQUAA Act; S. 3138 and H.R. 6966 ) would have established a regulatory framework for aquaculture development in federal waters. The bills would have provided NMFS with the authority to issue aquaculture permits and to coordinate with other federal agencies that have permitting and consultative responsibilities. They also would have identified NOAA as the lead federal agency for providing information on federal permitting requirements in federal waters. S. 3138 and H.R. 6966 would have required the Secretary of Commerce to develop programmatic environmental impact statements for areas determined to be favorable for marine aquaculture and compatible with other ocean uses. Section 9 of the bills stated that it would not supersede the requirements of the National Environmental Policy Act of 1969 (NEPA) and that individual projects may require additional review pursuant to NEPA. The bills would have required the Secretary of Commerce to consult with other federal agencies, coastal states, and fishery management councils to identify the environmental and management requirements and standards that apply to offshore aquaculture under existing federal and state laws. The bills also identified 10 standards that should be considered for offshore aquaculture and applied when issuing permits conducting programmatic environmental impact statements. These standards included other ocean uses, conservation and management of fisheries under the MSA, and minimizing adverse impacts on the marine environment, among others. S. 3138 and H.R. 6966 would have provided institutional support of offshore aquaculture by establishing the Office of Marine Aquaculture within NOAA. The Office of Marine Aquaculture would have been responsible for coordinating NOAA activities related to regulation, scientific research, outreach, and international issues. The Office of Marine Aquaculture would have replaced the current Office of Aquaculture, which conducts activities that are similar to those proposed by the bills. The bills also would have made NOAA the lead agency for establishing and coordinating a research and development aquaculture grant program A bill was also introduced ( H.R. 223 ) that would have prohibited the issuance of permits to conduct finfish aquaculture in the EEZ except in accordance with a law authorizing such action. Similar bills also were introduced in earlier Congresses to stop offshore aquaculture development in the EEZ. Offshore aquaculture bills also were introduced in the 109 th , 110 th , 111 th , and 112 th Congresses. Generally, these bills focused on establishing a regulatory framework to develop offshore aquaculture in federal waters of the EEZ. The bills varied to some degree on the balance between the potential rights and responsibilities of aquaculturalists, especially between aquaculture development and environmental protection. For example, S. 1195 (109 th Congress), and H.R. 2010 and S. 1609 (110 th Congress) would have supported production of food, encouraged development, established a permitting process, and promoted research and development of offshore aquaculture. In contrast, H.R. 4363 (111 th Congress) and H.R. 2373 (112 th Congress) would have focused to a greater degree on potential impacts of offshore aquaculture. These bills stressed elements such as determining appropriate locations, issuing regulations to prevent impacts on marine ecosystems and fisheries, and supporting research to guide precautionary development of offshore aquaculture. Other bills that would have constrained offshore aquaculture development were introduced in the 108 th , 109 th , 110 th , 112 th , 113 th , and 114 th Congresses. Most of these bills would have prohibited the issuance of permits for marine aquaculture facilities in the EEZ until requirements for issuing aquaculture permits are enacted into law. The United States is the largest importer of seafood products in the world, and nearly half of domestic seafood imports are produced by aquaculture. Aquaculture development and production in the United States have lagged behind other countries due to a variety of factors, such as relatively inexpensive imports, regulatory policies, user conflicts, and higher costs of production. Some have speculated that marine aquaculture facilities could be developed farther offshore in federal waters, where they would be subject to fewer user conflicts and have space to operate in relatively clean ocean waters. However, movement to offshore areas also would involve several significant challenges, such as establishing a regulatory framework, developing new technologies, and competing with other existing sources of seafood. According to many stakeholders and researchers, the lack of a governance system for regulating offshore aquaculture hinders the industry's development in the United States. Development of marine offshore aquaculture would likely require a new regulatory framework for establishing offshore aquaculture in federal waters. A regulatory framework potentially could provide the industry with clear requirements for its development while minimizing potential environmental harm. It remains an open question whether legislation could be crafted to achieve a balance between providing the certainty sought by potential commercial developers of aquaculture and satisfying environmental and other concerns of stakeholders such as environmentalists and fishermen. While a new regulatory framework potentially could provide greater certainty to offshore aquaculture developers, other challenges would remain. For example, offshore aquaculture may involve higher costs and greater risk of losses associated as compared to inshore operations. Lack of experience operating in offshore areas and limited knowledge of culture techniques for many candidate marine species contribute to the financial risk of offshore aquaculture. Some observers expect that offshore aquaculture may occur incrementally as inshore areas are developed and culture techniques are refined. Federal support may be needed for finance, research, extension, market development, and disaster assistance, similar to USDA support of agriculture.", "summary": "Regulatory uncertainty has been identified as one of the main barriers to offshore aquaculture development in the United States. Many industry observers have emphasized that congressional action may be necessary to provide statutory authority to develop aquaculture in offshore areas. Offshore aquaculture is generally defined as the rearing of marine organisms in ocean waters beyond significant coastal influence, primarily in the federal waters of the exclusive economic zone (EEZ). Establishing an offshore aquaculture operation is contingent on obtaining several federal permits and fulfilling a number of additional consultation and review requirements from different federal agencies responsible for various general authorities that apply to aquaculture. However, there is no explicit statutory authority for permitting and developing aquaculture in federal waters. The aquaculture permit and consultation process in federal waters has been described as complex, time consuming, and difficult to navigate. Supporters of aquaculture have asserted that development of the industry, especially in offshore areas, has significant potential to increase U.S. seafood production and provide economic opportunities for coastal communities. Currently, marine aquaculture facilities are located in nearshore state waters. Although there are some research-focused and proposed commercial offshore facilities, no commercial facilities are currently operating in U.S. federal waters. Aquaculture supporters note that the extensive U.S. coastline and adjacent U.S. ocean waters provide potential sites for offshore aquaculture development. They reason that by moving offshore, aquaculturalists can avoid many user conflicts they have encountered in inshore areas. Offshore areas also are considered to be less prone to pollution and fish diseases. Environmental organizations and fishermen generally have opposed development of offshore aquaculture. They assert that poorly regulated aquaculture development in inshore areas has degraded the environment and harmed wild fish populations and ecosystems. Those who oppose aquaculture development generally advocate for new authorities to regulate offshore aquaculture and to safeguard the environment and other uses of offshore waters. Some segments of the commercial fishing industry also have expressed concerns with potential development of aquaculture on fishing grounds and competition between cultured and wild products in domestic markets. Proponents of aquaculture counter that in many parts of the world a combination of farming experiences, technological advances, proper siting, and industry regulation has decreased environmental impacts and improved efficiency of marine aquaculture. They argue that many who oppose marine aquaculture lack an understanding of the benefits and risks of aquaculture and that opposition persists despite research that contradicts the extent or existence of these risks. Generally, the outcomes associated with aquaculture development depend on a variety of factors, such as the characteristics of aquaculture sites, species, technology, and facility management. Regardless of potential environmental harm, it remains to be seen whether moving to offshore areas would be profitable and if offshore aquaculture could compete with inshore aquaculture development and lower costs in other countries. Comprehensive offshore aquaculture bills were introduced in the 109 th , 110 th , 111 th , 112 th , and 115 th Congresses, but none were enacted. In the 115 th Congress, the Advancing the Quality and Understanding of American Aquaculture Act (AQUAA; S. 3138 and H.R. 6966 ) was introduced; AQUAA would have established a regulatory framework for aquaculture development in federal waters. It also would have provided National Oceanic and Atmospheric Administration (NOAA) Fisheries with the authority to issue aquaculture permits and coordinate with other federal agencies that have permitting and consultative responsibilities. Conversely, since the 109 th Congress, bills have been introduced that would constrain or prohibit the permitting of aquaculture in the EEZ. The Keep Finfish Free Act of 2019 ( H.R. 2467 ), introduced in the 116 th Congress, would prohibit the issuance of permits to conduct finfish aquaculture in the EEZ until a law is enacted that allows such action. It remains an open question whether legislation could be crafted that would provide the regulatory framework desired by potential commercial developers of offshore aquaculture and avoid or minimize risks of environmental harm to the satisfaction of those currently opposed to offshore aquaculture development.", "document_type": "crs"}
{"report": "Taxpayers who elect to itemize their deductions may reduce their federal income tax liability by claiming a deduction for certain state and local taxes paid, often called the \"SALT deduction.\" The 2017 tax revision (commonly referred to as the Tax Cuts and Jobs Act, TCJA; P.L. 115-97 ) established a temporary $10,000 limit, or \"SALT cap,\" on annual SALT deduction claims. By limiting the amount of the SALT deduction, the SALT cap increases the tax liability of certain taxpayers, which increases federal tax revenues relative to what otherwise would have been collected without a limitation in place. The SALT cap's effect on tax liability varies significantly with taxpayer income and with state and local tax rates. A number of bills introduced in the 116 th Congress would modify the SALT cap, and federal regulatory efforts responding to related state and local government activity are ongoing. This report discusses the SALT cap's features, analyzes its potential impact, and summarizes recent legislation and regulatory action to modify the cap. Under current law, taxpayers itemizing deductions (in lieu of claiming the standard deduction) may reduce their taxable income by claiming the SALT deduction for certain state and local taxes paid during the tax year. The state and local taxes eligible for the SALT deduction are income taxes, sales taxes (claimed in lieu of income taxes), personal property taxes, and certain real property taxes not paid in the carrying on of a trade or business. For taxpayers who would have itemized deductions without access to the SALT deduction, it generates tax savings equal to the amount deducted multiplied by the taxpayer's marginal income tax rate. For example, a taxpayer with $20,000 of eligible state and local taxes and a top marginal tax rate of 35% would save $7,000 from the SALT deduction (i.e., $20,000*0.35). For taxpayers who would have claimed the standard deduction without access to the SALT deduction, it generates tax savings equal to the difference between their tax liability if they had claimed the standard deduction and their total tax liability with itemized deductions (inclusive of the SALT deduction). (Throughout this report, the tax savings attributable to the SALT deduction is also referred to as the benefit from the deduction.) The TCJA established a temporary SALT cap for tax years 2018 through 2025. The SALT cap is set at $10,000 for single taxpayers or married couples filing jointly and $5,000 for married taxpayers filing separately. By limiting the SALT deduction available to certain taxpayers, the SALT cap decreases the tax savings associated with the deduction relative to prior law, thereby increasing federal revenues. The TCJA also changed a number of tax code features (e.g., standard deduction amounts, marginal tax rates) that indirectly affect SALT deduction eligibility and the value of the tax savings it generates. The TCJA roughly doubled the standard deduction and limited other itemized deductions. The TCJA also prohibited SALT deduction claims on taxes paid on foreign real property for tax years 2018 through 2025. The SALT cap, the increased value of the standard deduction, and other tax changes enacted by the TCJA have reduced the number of taxpayers claiming the SALT deduction and the total tax savings from those claims. Table 1 shows the most recent estimates of reductions in federal revenues attributable to the SALT deduction for FY2017, the last full year before enactment of P.L. 115-97 , and FY2019 through FY2023. Revenue losses from the SALT deduction in FY2017 ($100.9 billion) nearly equaled the total losses projected from FY2019 through FY2023 ($117.2 billion). The Joint Committee on Taxation (JCT) projects that 16.4 million taxpayers will claim a SALT deduction for tax year 2019, compared to 46.6 million taxpayers who the Internal Revenue Service (IRS) reported claiming the deduction in 2017. Recent research has estimated the SALT cap's effect on SALT deduction claims independent of other tax changes enacted through the TCJA. A 2019 Treasury Inspector General report examined the SALT cap's hypothetical effect had it been imposed in tax year 2017, prior to the other TCJA changes taking effect. The report found that the cap would have reduced SALT deduction benefits for 10.9 million taxpayers (about 25% of all households claiming the deduction) and reduced deduction amounts by $323 billion, or just over half of the actual amounts deducted in that year. In June 2019, JCT estimated that holding all other portions of the tax code constant, repealing the SALT cap for tax year 2018 would decrease FY2019 federal revenues by $77.4 billion. The SALT deduction provides state and local governments with an increased ability to levy taxes by reducing the after-tax cost of state and local taxes to taxpayers. By limiting the deduction's benefits, the SALT cap increases the cost (or \"price\") of state and local taxes for affected taxpayers. For example, consider a taxpayer with itemized deductions, a 35% marginal tax rate, and $20,000 in eligible SALT payments. Without a SALT cap in place, the net price of those taxes for the taxpayer would be $13,000 (or $20,000*[1-0.35]), as the taxpayer can use all $20,000 of those tax payments to reduce federal tax liability. When a $10,000 SALT cap is imposed, the final price of those taxes rises to $16,500 (or $10,000 + [$10,000*(1-0.35)]). The basic economic law of demandâthere is an inverse relationship between the price of a good and the quantity demandedâsuggests that by increasing the price of state and local taxes, a SALT cap would lead to a decline in demand for state and local government activity. The size of the decrease would be a function of the sensitivity of public desire for state and local services, paid for by taxes, to changes in the price of those services (i.e., the elasticity of demand). Research has found indications that state and local governments respond to federal tax changes with shifts in their own tax and spending practices. Response to the SALT cap could be a function of its salience , that is, the public awareness of its effect on tax liability. SALT cap salience may depend on awareness of the state and local taxes themselves, which can vary significantly across tax system features. Salience for taxpayers who take the standard deduction, but who would be better off itemizing deductions if not for the SALT cap, may be particularly low, as the SALT cap's effects may not be apparent in tax filing software. Taxpayers could also have difficulty differentiating SALT cap-related liability changes from other changes enacted through the TCJA. State and local governments are generally limited in their ability to respond to shifts in demand for government services with changes in fiscal outcomes (i.e., increased deficits or reduced surpluses). Unlike the federal government, which has no enforceable balanced-budget requirement, most state and local governments are statutorily required to balance operating revenues and operating expenses over a one-year or two-year period. Governments with a binding balanced-budget requirement would therefore need to match any reduction in SALT revenue resulting from the cap with a reduction in spending on services provided or increases in other revenue sources. This section explores features of localities and households that are likely to influence the distribution and intensity of SALT cap effects on tax liability. The recent enactment and implementation of the SALT cap means that tax return data on its impact by state, locality, and income level are currently unavailable. However, analyzing the SALT deduction's distribution prior to the cap's imposition can provide insight into its likely impact. The data indicate that the SALT cap's effects will vary significantly across state and local jurisdictions and household income. The SALT cap's effect is in part a function of state and local tax policies. For example, greater effective rates levied on taxes that qualify for the deduction (income taxes, general sales taxes, real and personal property taxes) would increase the amount of SALT-eligible tax payments and therefore increase the probability that a taxpayer will have SALT deductions that exceed the cap. State and local tax rates could thus affect both the number of taxpayers with higher tax liability from the SALT cap (sometimes referred to as SALT cap exposure) and the amount of those increases (sometimes referred to as the SALT cap burden). Differences in local incomes and price levels are another determinant of the SALT cap's effect. Wages and prices are the bases against which state and local governments levy SALT-eligible income, sales, and property taxes. Consider two households that are in separate localities and have different incomes but the same tax rates and the same purchasing power. In other words, adjusting for their local price levels, each household is able to purchase the same sets of goods and services. Although each household faces the same set of purchasing options on the public and private markets, the household facing higher price levels is more likely to have SALT payments in excess of the SALT cap. State and local governments raised a combined $1.30 trillion in individual income taxes, general sales taxes, and property taxes in 2017, an average of about $8,500 per federal income taxpayer. Those revenues are divided almost evenly between state governments ($667 billion in revenues), which collected the majority of the income and sales taxes, and local governments ($632 billion), which collected the majority of property taxes. There is considerable geographic variation in the rates at which taxes are levied and in the incomes and prices to which those taxes apply. Figure 1 shows effective state and local tax rates for all SALT-eligible taxes in each state, calculated as the percentage of total adjusted gross income paid in-state and local general sales taxes, individual income taxes, and property taxes. In 2017, New York (17.2% effective tax rate), Washington, DC (16.9%), Hawaii (16.1%), Maine (15.0%), and Nebraska (14.2%) had the highest combined effective state and local tax rates. Delaware (6.8%), Alaska (7.6%), Florida (7.7%), New Hampshire (8.3%) and Tennessee (8.4%) had the lowest combined tax rates. All else equal, states with higher SALT-eligible effective tax rates are likely to experience greater SALT cap effects on tax liability than states with lower rates. Figure 2 plots the average SALT deduction amount for each 2017 congressional district (districts are from the 115 th Congress). The districts with the 20 highest average SALT deductions are located in states with above-average effective tax rates in Figure 1 , including New York, California, Connecticut, and New Jersey. Nineteen of the districts with the 20 lowest average SALT deductions are located in Florida, Texas, Tennessee, Alabama, Nevada, Arizona, and Alaska, all states with below-average effective state and local tax rates. Figure 2 shows the potential significance of local tax and economic activity on the SALT cap's effects. Figure 3 adds a layer of analysis by plotting two variables on each congressional district: (1) average adjusted gross income (AGI) of taxpayers and (2) average effective SALT rates. Each district categorized as having low effective SALT rates in Figure 3 had an average AGI below $75,000, and 13 of these districts had average AGI below $50,000. Nineteen of the 20 districts with the highest effective SALT rates had an average AGI above $100,000, and four of the top five districts had an average AGI above $200,000. The distribution of SALT deductions across household income is discussed further in the next section. Figure 3 demonstrates the importance of considering both tax rates and the tax base when examining potential SALT cap effects. As with other tax deductions, SALT deduction benefits accrue more for higher-income taxpayers than lower-income taxpayers. Two factors explain this pattern: (1) higher incomes directly lead to more state and local income taxes and are correlated with higher sales and property tax payments stemming from greater consumption; and (2) taxpayers with higher incomes are subject to higher marginal tax rates, so each dollar deducted from tax liability results in greater tax savings. Table 2 shows the JCT projections of SALT benefits by income class in tax years 2017 (the last year before the TCJA took effect) and 2019. Taxpayers with more than $100,000 of AGI received the vast majority of SALT benefits in both 2017 (93%) and 2019 (89%). Taxpayers with income between $50,000 and $200,000 received a larger share of total benefits in 2019 (44%) than 2017 (29%), whereas the opposite trend occurs for taxpayers with more than $200,000 (declining from 71% to 56%). Taxpayers with less than $50,000 received relatively little benefit from the SALT deduction in both years. Data from Table 2 suggest that the SALT cap increased the federal tax burden of high-income taxpayers. This occurs because the SALT cap (1) reduced the number of taxpayers claiming the SALT deduction, who disproportionately fell in higher income classes; and (2) reduced SALT benefit levels of taxpayers with more than $10,000 in SALT payments, who were particularly likely to have high levels of income. JCT estimated that were the SALT cap eliminated in tax year 2019, more than half of the additional tax benefits would have been claimed by taxpayers with incomes exceeding $1 million. The SALT cap's total effect on the combined federal, state, and local tax burden across income levels will depend on the state and local government response to the SALT cap, which is uncertain. Figure 4 plots the percentage of all tax returns, the percentage of returns claiming SALT deductions, and the percentage of SALT deduction amounts claimed across income levels in tax year 2017, the latest year for which data are available. (The amount of SALT deduction claimed reflects the dollars deducted and not the tax savings associated with the deduction.) Tax returns with AGI exceeding $1 million represented less than 1% of all tax returns, but claimed over 25% of all SALT deduction amounts. Tax returns with over $100,000 in AGI claimed more than 78% of the SALT deduction amounts claimed, while returns with AGI below $50,000 claimed less than 10% of that total. The composition of state and local taxes also affects the SALT cap's ultimate effect on taxpayers within a local jurisdiction. Table 3 illustrates how SALT cap burden distribution can differ when the composition of state and local taxes changes while holding total tax revenue constant. In both jurisdictions, total tax revenues are $44,000. In Jurisdiction I, relatively high income tax rates generate higher income tax payments, and the SALT cap burden falls on Tax Units A and B, the taxpayers with higher incomes. In Jurisdiction II, property tax rates are higher than income tax rates, and the SALT cap burden instead falls on Tax Units A and C, the taxpayers with high property values. More of the state and local tax revenue in Jurisdiction II is above the SALT cap, meaning that taxpayers in Jurisdiction II are able to deduct less in SALT deductions on their federal income tax returns. This analysis highlights the importance of state and local tax structure in determining the SALT cap's effect on taxpayer liability even when holding the average level of taxes constant. The state and local response to the SALT cap's effect has varied across municipalities. Certain governments in states with relatively high mean SALT deduction values (see Figure 1 ) have either enacted legislation that would appear to make tax changes to reduce the SALT cap's effect on their taxpayers or taken legal action against the federal government. Recent federal and legal responses to some of these actions suggest these efforts will likely be unsuccessful. State and local governments with relatively lower levels of SALT cap exposure have taken little to no action. Following enactment of the TCJA, several state governments made changes to their tax codes with the potential to lower their residents' SALT cap exposure. Certain states enacted laws that provided taxpayers a credit against state taxes for charitable donations to state entities, which would then be eligible for the federal charitable deduction under Section 170 of the Internal Revenue Code. The IRS has since issued a final ruling limiting the availability of Section 170 charitable deductions in such a way that would render the new charitable activity ineligible. A legislative proposal that would overturn IRS regulations, S.J.Res. 50 , was rejected by the Senate in October 2019. Some states have tried to use a \"pass-through work around\" to reduce the SALT cap's impact on some of their taxpayers with pass-through business income. Many types of businesses that do not pay corporate income taxes (including S corporations and partnerships) pass through income to their owners, who pay taxes on that income at the individual level. The SALT cap does not limit SALT deductions associated with the carrying on of a trade or business. Hence, taxpayers whose SALT tax payments are associated with pass-through business income may not be subject to the SALT cap in the same manner as other individual income tax payments. Certain state governments have adjusted for this activity by enacting laws that levy or raise taxes on the pass-through business entity itself that are offset (holding total tax rates constant) by tax reductions or tax credits applied to individual income liability for pass-through business members subject to the tax increase . The IRS has not issued guidance on the viability of such legislation or its effect on SALT cap exposure. Several states also took legal action related to the SALT cap following enactment of the TCJA, filing suit against the U.S. government in July 2018 and challenging the cap's constitutionality. A September 2019 federal district court ruling upheld the SALT cap's constitutionality, asserting that it did not unconstitutionally penalize certain jurisdictions. Legislation introduced in the 116 th Congress would modify the SALT cap, including proposals that would (1) repeal the SALT cap entirely; (2) increase the SALT cap's value for all taxpayers; (3) increase the SALT cap's value for some taxpayers; (4) make the SALT cap permanent; and (5) repeal IRS regulations affecting SALT cap liability. Table 4 displays legislation in the 116 th Congress that would directly modify the SALT cap.", "summary": "Taxpayers who elect to itemize their deductions may reduce their federal income tax liability by claiming a deduction for certain state and local taxes paid, often called the \"SALT deduction.\" The 2017 tax revision (commonly referred to as the Tax Cuts and Jobs Act, TCJA; P.L. 115-97 ) made a number of changes to the SALT deduction. Most notably, the TCJA established a limit, or \"SALT cap,\" on the amounts claimed as SALT deductions for tax years 2018 through 2025. The SALT cap is $10,000 for single taxpayers and married couples filing jointly and $5,000 for married taxpayers filing separately. The changes enacted in the TCJA will considerably affect SALT deduction activity in the next several years. The increased value of the standard deduction (roughly doubling from its pre-TCJA value for tax years 2018 through 2025), along with the reduced availability of SALT and other itemized deductions, are projected to significantly reduce the number of SALT deduction claims made in those years. The Joint Committee on Taxation (JCT) projected that repealing that SALT cap for tax year 2019 would increase federal revenues by $77.4 billion. The SALT deduction reduces the cost of state and local government taxes to taxpayers because a portion of the taxes deducted is effectively paid for by the federal government. By reducing the deduction's value, the SALT cap therefore increases the cost to the taxpayer of state and local taxes. That may affect state and local tax and spending behavior, as any reduction in state and local revenues from increased sensitivity to SALT-eligible tax rates must be offset by reductions in outlays or increases in other revenue to maintain budget outcomes. The SALT cap's effect on the SALT deduction's value is in part a function of state and local tax policies. Nationwide, there is considerable variation in both the combined level of income and sales taxes levied by states and the property taxes and other charges levied by local governments. Differences in incomes and price levels that serve as the base for those taxes are another source of disparity in SALT cap exposure. Internal Revenue Service (IRS) data showed that in 2017, the average SALT deduction claimed in New York ($23,804) was more than four times the average in Alaska ($5,451). The SALT cap predominantly affects taxpayers with higher incomes. State and local tax payments tend to increase with income, both as a direct function of the income tax structure and because higher incomes lead to increased consumption and thus sales and property tax payments. Increased income, therefore, makes higher-income taxpayers more likely to make SALT-eligible tax payments in amounts exceeding the SALT cap value. The benefit of SALT deductions in terms of tax savings is also larger for taxpayers with higher incomes because a federal tax deduction's value is proportional to the taxpayer's marginal income tax rate. JCT projected that more than half of 2019 benefits for the SALT deduction will accrue to taxpayers with incomes exceeding $200,000. Several pieces of legislation introduced in the 116 th Congress would modify the SALT cap, including legislation that would (1) repeal the SALT cap entirely; (2) increase the SALT cap's value for all taxpayers; (3) increase the SALT cap's value for some taxpayers; (4) make the SALT cap permanent; and (5) repeal IRS regulations affecting SALT cap liability. Following enactment of the TCJA, several states proposed or passed legislation that provided possible avenues to reduce the SALT cap's effect on taxpayers without reducing their relevant state or local tax burdens. Subsequent guidance by the IRS, however, makes it unclear or unlikely that those laws will prevent taxpayers from experiencing the SALT cap's effects.", "document_type": "crs"}
{"report": "The Constitution grants Congress authority to impeach and remove the President, Vice President, and other federal \"civil Officers\" for treason, bribery, or \"other high Crimes and Misdemeanors.\" Impeachment is one of the various checks and balances created by the Constitution, serving as a crucial tool for holding government officers accountable for abuse of power, corruption, and conduct considered incompatible with the nature of an individual's office. Although the term impeachment is commonly used to refer to the removal of a government official from office, the impeachment process, as described in the Constitution, entails two distinct proceedings carried out by the separate houses of Congress. First, a simple majority of the House impeaches âor formally approves allegations of wrongdoing amounting to an impeachable offense. The second proceeding is an impeachment trial in the Senate. If the Senate votes to convict with a two-thirds majority, the official is removed from office. Following a conviction, the Senate also may vote to disqualify that official from holding a federal office in the future. The House has impeached nineteen individuals: fifteen federal judges, one Senator, one Cabinet member, and two Presidents. Of these, eight individualsâall federal judgesâwere convicted by the Senate. The Constitution imposes several requirements on the impeachment process. When conducting an impeachment trial, Senators must be \"on Oath or Affirmation,\" and the right to a jury trial does not extend to impeachment proceedings. If the President is impeached and tried in the Senate, the Chief Justice of the United States presides at the trial. Finally, the Constitution bars the President from using the pardon power to shield individuals from impeachment or removal from office. Understanding the historical practices of Congress on impeachment is central to fleshing out the meaning of the Constitution's impeachment clauses. While much of constitutional law is developed through jurisprudence analyzing the text of the Constitution and applying prior judicial precedents, the Constitution's meaning is also shaped by institutional practices and political norms. James Madison, for instance, argued that the meaning of certain provisions in the Constitution would be \"liquidated\" over time, or determined through a \"regular course of practice.\" Justice Joseph Story thought this principle applied to impeachment, noting that the Framers understood that the meaning of \"high Crimes and Misdemeanors\" constituting impeachable offenses would develop over time, much like the common law. Indeed, Justice Story believed it would be impossible to define precisely the full scope of political offenses that may constitute impeachable behavior in the future. Moreover, the power of impeachment is largely immune from judicial review, meaning that Congress's choices in this arena are unlikely to be overturned by the courts. For that reason, examining the history of actual impeachments is crucial to determining the meaning of the Constitution's impeachment provisions. Consistent with this backdrop, this report begins with an examination of the historical background on impeachment, including the perspective of the Framers as informed by English and colonial practice. It then turns to the unique constitutional roles of the House and Senate in the process, followed by a discussion of impeachment practices throughout the country's history. The report concludes by noting and exploring several recurring questions about impeachment, including legal considerations relevant to a Senate impeachment trial. The concept of impeachment and the standard of \"high Crimes and Misdemeanors\" in the federal Constitution originate from English, colonial, and early state practice. During the struggle in England by Parliament to impose restraints on the Crown's powers, the House of Commons impeached and tried before the House of Lords ministers of the Crown and influential individualsâbut not the Crown itself âwho were often considered beyond the reach of the criminal courts. The tool was used by Parliament to police political offenses committed against the \"system of government.\" Parliament used impeachment as a tool to punish political offenses that damaged the state or subverted the government, although impeachment was not limited to government ministers. At least by the second half of the seventeenth century, impeachment in England represented a remedy for \"misconduct in high places.\" The standard of high crimes and misdemeanors appeared to apply to, among other things, significant abuses of a government office, misapplication of funds, neglect of duty, corruption, abridgement of parliamentary rights, and betrayals of the public trust. Punishment for impeachment was not limited to removal from office, but could include a range of penalties upon conviction by the House of Lords, including imprisonment, fines, or even death. In the English experience, the standard of high crimes and misdemeanors appears to have addressed conduct involving an individual's abuse of power or office that damaged the state. Inheriting the English practice, the American colonies adopted their own distinctive impeachment practices. These traditions extended into state constitutions established during the early years of the Republic. The colonies largely limited impeachment to officeholders based on misconduct committed in office, and the available punishment for impeachment was limited to removal from office. Likewise, many state constitutions adopted after the Declaration of Independence in 1776, but before the federal Constitution was ratified, incorporated impeachment provisions limiting impeachment to government officials and restricting the punishment for impeachment to removal from office with the possibility of future disqualification from office. At the state level, the body charged with trying an impeachment varied. The English and colonial history thus informed the Framers' consideration and adoption of impeachment procedures at the Constitutional Convention. In some ways, the Framers adopted the general framework of impeachment inherited from English practice. The English Parliamentary structure of a bicameral legislatureâdividing the power of impeachment between the \"lower\" house, which impeached individuals, and an \"upper\" house, which tried themâwas replicated in the federal system with the power to impeach given to the House of Representatives and the power to try impeachments assigned to the Senate. Nonetheless, influenced by the impeachment experiences in the colonies, the Framers ultimately adopted an \"Americanized\" impeachment practice with a republican character distinct from English practice. The Framers' choices narrowed the scope of impeachable offenses and persons subject to impeachment as compared to English practice. For example, the Constitution established an impeachment mechanism exclusively geared toward holding public officials, including the President, accountable. This contrasted with the English practice of impeachment, which could extend to any individual save the Crown and was not limited to removal from office, but could lead to a variety of punishments. Likewise, the Framers adopted a requirement of a two-thirds majority vote for conviction on impeachment charges, shielding the process somewhat from naked partisan control. This too differed from the English practice, which allowed conviction on a simple majority vote. And in England, the Crown could pardon individuals following an impeachment conviction. In contrast, the Framers restricted the pardon power from being applied to impeachments, rendering the impeachment process essentially unchecked by the executive branch. Ultimately, the Framers' choices in crafting the Constitution's impeachment provisions provide Congress with a crucial check on the other branches of the federal government and inform the Constitution's separation of powers. The Framers also applied the lessons of English history and colonial practice in determini ng the structure and location of impeachment trials. As mentioned above, most of the American colonies and early state constitutions adopted their own impeachment procedures before the establishment of the federal Constitution, placing the power to try impeachments in various bodies. At the Constitutional Convention, the proper body to try impeachments posed a difficult question. Several proposals were considered that would have assigned responsibility for trying impeachments to different bodies, including the Supreme Court, a panel of state court judges, or a combination of these bodies. One objection to granting the Supreme Court authority to try impeachments was that Justices were to be appointed by the President, casting doubt on their ability to be independent in an impeachment trial of the President or another executive official. Further, a crucial legislative check in the Constitution's structure against the judicial branch is impeachment, as Article III judges cannot be removed by other means. To permit the judiciary to have the ultimate say in one of the most significant checks on its power would subvert the purpose of that important constitutional limitation. Rather than allowing a coordinate branch to play a role in the impeachment process, the Framers decided that Congress alone would determine who is subject to impeachment. This framework guards against, in the words of Alexander Hamilton, \"a series of deliberate usurpations on the authority of the legislature\" by the judiciary. Likewise, the Framers' choice to place both the accusatory and adjudicatory aspects of impeachment in the legislature renders impeachment \"a bridle in the hands of the legislative body upon the executive\" branch. That said, the Framers' choice also imposed institutional constraints on the process. Dividing the power to impeach from the authority to try and convict guards against \"the danger of persecution from the prevalency of a fractious spirit in either\" body. Finally, the Framers made one exception to the legislature's exclusive role in the impeachment process that promotes integrity in the proceedings. The Chief Justice of the United States presides at impeachment trials of the President of the United States. This provision ensures that a Vice President, in his usual capacity as Presiding Officer of the Senate, shall not preside over proceedings that could lead to his own elevation to the presidency, a particularly important concern at the time of the founding, when a President and Vice President could belong to rival parties. The Framers narrowed the standard for impeachable conduct as compared to the English experience. While the English Parliament never formally defined the parameters of what counted as impeachable conduct, the Framers restricted impeachment to treason, bribery, and \"other high Crimes and Misdemeanors,\" the latter phrase a standard inherited from English practice. This standard applied to behavior found damaging to the state, including significant abuses of a government office or power, misapplication of funds, neglect of duty, corruption, abridgement of parliamentary rights, and betrayals of the public trust. The debates at the Constitutional Convention over what behavior should be subject to impeachment focused mainly on the President. In discussing whether the President should be removable by impeachment, Gouverneur Morris argued that the President should be removable through the impeachment process, noting concern that the President might \"be bribed by a greater interest to betray his trust,\" and pointed to the example of Charles II receiving a bribe from Louis XIV. The adoption of the high crimes and misdemeanors standard during the Constitutional Convention reveals that the Framers did not envision impeachment as the proper remedy for simple policy disagreements with the President. During the debate, the Framers rejected a proposal to includeâin addition to treason and briberyâ\"maladministration\" as an impeachable offense, which would have presumably incorporated a broad range of common-law offenses. Although \"maladministration\" was a ground for impeachment in many state constitutions at the time of the Constitution's drafting, the Framers instead adopted the term \"high Crimes and Misdemeanors\" from English practice. James Madison objected to including \"maladministration\" as grounds for impeachment because such a vague standard would \"be equivalent to a tenure during pleasure of the Senate.\" The Convention voted to include \"high crimes and misdemeanors\" instead. Arguably, the Framers' rejection of such a broad term supports the view that congressional disagreement with a President's policy goals is not sufficient grounds for impeachment. Of particular importance to the understanding of high crimes and misdemeanors to the Framers was the roughly contemporaneous British impeachment proceedings of Warren Hastings, the governor general of India, which were transpiring at the time of the Constitution's formulation and ratification. Hastings was charged with high crimes and misdemeanors, which included corruption and abuse of power. At the Constitutional Convention, George Mason positively referenced the impeachment of Hastings. At that point in the Convention, a proposal to define impeachment as appropriate for treason and bribery was under consideration. George Mason objected, noting that treason would not cover the misconduct of Hastings. He also thought impeachment should extend to \"attempts to subvert the Constitution.\" Mason thus proposed that maladministration be included as an impeachable offense, although, as noted above, this was eventually rejected in favor of \"high Crimes and Misdemeanors.\" While evidence of precisely what conduct the Framers and ratifiers of the Constitution considered to constitute high crimes and misdemeanors is relatively sparse, the evidence available indicates that they considered impeachment to be an essential tool to hold government officers accountable for political crimes, or offenses against the state. James Madison considered it \"indispensable that some provision be made for defending the community against incapacity, negligence, or perfidy of the chief executive,\" as the President might \"pervert his administration into a scheme of peculation or oppression,\" or \"betray his trust to foreign powers.\" Alexander Hamilton, in explaining the Constitution's impeachment provisions, described impeachable offenses as arising from \"the misconduct of public men, or in other words, from the abuse or violation of some public trust.\" Such offenses were \" Political , as they relate chiefly to injuries done immediately to the society itself.\" These political offenses could take innumerable forms and simply could not be neatly delineated. At the North Carolina ratifying convention, James Iredell, later to serve as an Associate Justice of the Supreme Court, noted the difficulty in defining what constitutes an impeachable offense, beyond causing injury to the government. For him, impeachment was \"calculated to bring [offenders] to punishment for crime which is not easy to describe, but which every one must be convinced is a high crime and misdemeanor against government. . . . [T]he occasion for its exercise will arise from acts of great injury to the community.\" He thought the President would be impeachable for receiving a bribe or \"act[ing] from some corrupt motive or other,\" but not merely for \"want of judgment.\" Similarly, Samuel Johnston, then the governor of North Carolina and later the state's first Senator, thought impeachment was reserved for \"great misdemeanors against the public.\" At the Virginia ratifying convention, a number of individuals claimed that impeachable offenses were not limited to indictable crimes. For example, James Madison argued that were the President to assemble a minority of states in order to ratify a treaty at the expense of the other states, this would constitute an impeachable \"misdemeanor.\" And Virginia Governor Edmund Randolph, who would become the nation's first Attorney General, noted that impeachment was appropriate for a \"willful mistake of the heart,\" but not for incorrect opinions. Randolph also argued that impeachment was appropriate for a President's violation of the Foreign Emoluments Clause, which, he noted, guards against corruption. James Wilson, delegate to the Constitutional Convention and later a Supreme Court Justice, delivered talks at the College of Philadelphia on impeachment following the adoption of the federal Constitution. He claimed that impeachment was reserved to \"political crimes and misdemeanors, and to political punishments.\" He argued that, in the eyes of the Framers, impeachments did not come \"within the sphere of ordinary jurisprudence. They are founded on different principles; are governed by different maxims; and are directed to different objects.\" Thus, for Wilson, the impeachment and removal of an individual did not preclude a later trial and punishment for a criminal offense based on the same behavior. Justice Joseph Story's writings on the Constitution echo the understanding that impeachment applied to political offenses. He noted that impeachment applied to those \"offences â¦ committed by public men in violation of their public trust and duties,\" duties that are often \"political.\" And like Hamilton, Story considered the range of impeachable offenses \"so various in their character, and so indefinable in their actual involutions, that it is almost impossible to provide systematically for them by positive law.\" At the time of ratification of the Constitution, the phrase \"high crimes and misdemeanors\" thus appears understood to have applied to uniquely \"political\" offenses, or misdeeds committed by public officials against the state. Such offenses simply resist a full delineation, as the possible range of potential misdeeds in office cannot be determined in advance. Instead, the type of misconduct that merits impeachment is worked out over time through the political process. In the years following the Constitution's ratification, precisely what behavior constitutes a high crime or misdemeanor has thus been the subject of much debate. The Constitution grants the sole power of impeachment to the House of Representatives. Generally speaking, the impeachment process has often been initiated in the House by a Member by resolution or declaration of a charge, although anyoneâincluding House Members, a grand jury, or a state legislatureâmay request that the House investigate an individual for impeachment purposes. Indeed, in modern practice, many impeachments have been sparked by referrals from an external investigatory body. Beginning in the 1980s, the Judicial Conference has referred its findings to the House recommending an impeachment investigation into a number of federal judges who were eventually impeached. Similarly, in the impeachment of President Bill Clinton, an independent counselâa temporary prosecutor given statutory independence and charged with investigating certain misconduct when approved by a judicial body âfirst conducted an investigation into a variety of alleged activities on the part of the President and his associates, and then delivered a report to the House detailing conduct that the independent counsel considered potentially impeachable. Regardless of the source requesting an impeachment investigation, the House has sole discretion under the Constitution to begin any impeachment proceedings against an individual. In practice, impeachment investigations are often handled by an already existing or specially created subcommittee of the House Judiciary Committee. The scope of the investigation can vary. In some instances, an entirely independent investigation may be initiated by the House. In other cases, an impeachment investigation might rely on records delivered by outside entities, such as those delivered by the Judicial Conference or an independent counsel. Following this investigation, the full House may vote on the relevant impeachment articles. If articles of impeachment are approved, the House chooses managers to present the matter to the Senate. The Chairman of the House Managers then presents the articles of impeachment to the Senate and requests that the body order the appearance of the accused. The House Managers typically act as prosecutors in the Senate trial. The House has impeached nineteen individuals: fifteen federal judges, one Senator, one Cabinet member, and two Presidents. The consensus reflected in these proceedings is that impeachment may serve as a means to address misconduct that does not necessarily give rise to criminal sanction. According to congressional sources, the types of conduct that constitute grounds for impeachment in the House appear to fall into three general categories: (1) improperly exceeding or abusing the powers of the office; (2) behavior incompatible with the function and purpose of the office; and (3) misusing the office for an improper purpose or for personal gain. Consistent with scholarship on the scope of impeachable offenses, congressional materials have cautioned that the grounds for impeachment \"do not all fit neatly and logically into categories\" because the remedy of impeachment is intended to \"reach a broad variety of conduct by officers that is both serious and incompatible with the duties of the office.\" While successful impeachments and convictions of federal officials represent some clear guideposts for what constitutes impeachable conduct, impeachment processes that do not result in a final vote for impeachment and removal also may influence the understanding of Congress, executive and judicial branch officials, and the public over what constitutes an impeachable offense. A prominent example involves the first noteworthy attempt at a presidential impeachment, aimed at John Tyler in 1842. At the time, the presidential practice had generally been to reserve vetoes for constitutional, rather than policy, disagreements with Congress. Following President Tyler's veto of a tariff bill on policy grounds, the House endorsed a select committee report condemning President Tyler and suggesting that he might be an appropriate subject for impeachment proceedings. The possibility apparently ended when the Whigs, who had led the movement to impeach, lost their House majority in the midterm elections. In the years following the aborted effort to impeach President Tyler, Presidents have routinely used their veto power for policy reasons. This practice is generally seen as an important separation of powers limitation on Congress's ability to pass laws rather than a potential ground for impeachment. Likewise, although President Richard Nixon resigned before impeachment proceedings were completed in the House, the approval of three articles of impeachment by the House Judiciary Committee against him may inform lawmakers' understanding of conduct that constitutes an impeachable offense. The approved impeachment articles included allegations that President Nixon obstructed justice by using the office of the presidency to impede the investigation into the break-in of the Democratic National Committee headquarters at the Watergate Hotel and Office Building and authorized a cover-up of the activities that were being investigated. President Nixon was alleged to have abused the power of his office by using federal agencies to punish political enemies and refusing to cooperate with the Judiciary Committee's investigation. While no impeachment vote was taken by the House, the Nixon experience nevertheless established what some would call the quintessential case for impeachmentâa serious abuse of the office of the presidency that undermined the office's integrity. That said, one must be cautious in extrapolating wide-ranging lessons from the lack of impeachment proceedings in the House. Specific behavior not believed to constitute an impeachable offense in prior contexts might be considered impeachable in a different set of circumstances. Moreover, given the varied contextual permutations, the full scope of impeachable behavior resists specification, and historical precedent may not always serve as a useful guide to whether conduct is grounds for impeachment. For instance, no President has been impeached for abandoning the office and refusing to govern. That this event has not occurred, however, hardly proves that this behavior would not constitute an impeachable offense meriting removal from office. The Constitution grants the Senate sole authority \"to try all impeachments.\" The Senate thus enjoys broad discretion in establishing procedures to be undertaken in an impeachment trial. For instance, in a lawsuit challenging the Senate's use of a trial committee to take and report evidence, the Supreme Court in Nixon v. United States unanimously ruled that the suit posed a nonjusticiable political question and was not subject to judicial resolution. The Court explained that the term \"try\" in the Constitution's provisions on impeachment was textually committed to the Senate for interpretation and lacked sufficient precision to enable a judicially manageable standard of review. In reaching this conclusion, the Court noted that the Constitution imposes three precise requirements for impeachment trials in the Senate: (1) Members must be under oath during the proceedings; (2) conviction requires a two-thirds vote; and (3) the Chief Justice must preside if the President is tried. Given these three clear requirements, the Court reasoned that the Framers \"did not intend to impose additional limitations on the form of the Senate proceedings by the use of the word 'try.'\" Thus, subject to these three clear requirements of the Constitution, the Senate enjoys substantial discretion in establishing its own procedures during impeachment trials. While the Senate determines for itself how to conduct impeachment proceedings, the nature and frequency of Senate impeachment trials largely hinge on the impeachment charges brought by the House. The House has impeached thirteen federal district judges, a judge on the Commerce Court, a Senator, a Supreme Court Justice, the secretary of an executive department, and two Presidents. But the Senate ultimately has only convicted and removed from office seven federal district judges and a Commerce Court judge. While this pattern obviously does not mean that Presidents or other civil officers are immune from removal based on impeachment, the Senate's acquittals may be considered to have precedential value when assessing whether particular conduct constitutes a removable offense. For instance, the first subject of an impeachment by the House involved a sitting U.S. Senator for allegedly conspiring to aid Great Britain's attempt to seize Spanish-controlled territory. The Senate voted to dismiss the charges in 1799, and no Member of Congress has been impeached since. The House also impeached Supreme Court Justice Samuel Chase, who was widely viewed by Jeffersonian Republicans as openly partisan for, among other things, misapplying the law. The Senate acquitted Justice Chase, establishing, at least for many, a general principle that impeachment is not an appropriate remedy for disagreement with a judge's judicial philosophy or decisions. The Constitution requires Senators sitting as an impeachment tribunal to take a special oath distinct from the oath of office that all Members of Congress must take. This requirement underscores the unique nature of the role the Senate plays in impeachment trials, at least in comparison to its normal deliberative functions. The Senate practice has been to require each Senator to swear or affirm that he will \"do impartial justice according to the Constitution and laws.\" The oath was originally adopted by the Senate before proceedings in the impeachment of Senator Blount in 1798 and has remained largely unchanged since. While the Constitution authorizes the Senate, following an individual's conviction in an impeachment trial, to bar an individual from holding office in the future, the text of the Constitution does not make clear that a vote for disqualification from future office must be taken separately from the initial vote for conviction. Instead, the potential for a separate vote for disqualification has arisen through the historical practice of the Senate. The Senate did not choose to disqualify an impeached individual from holding future office until the Civil War era. Federal district judge West H. Humphreys took a position as a judge in the Confederate government but did not resign his seat in the U.S. government. The House impeached Humphreys in 1862. The Senate then voted unanimously to convict Judge Humphreys and separately voted to disqualify him from holding office in the future. Senate practice since the Humphreys case has been to require a simple majority vote to disqualify an individual from holding future office, rather than the supermajority required by the Constitution's text for removal, but it is unclear what justifies this result beyond historical practice. The Constitution also distinguishes the impeachment remedy from the criminal process, providing that an individual removed from office following impeachment \"shall nevertheless be liable and subject to indictment.\" The Senate's power to convict and remove individuals from office, as well as to bar them from holding office in the future, thus does not overlap with criminal remedies for misconduct. Indeed, the unique nature of impeachment as a political remedy distinct from criminal proceedings ensures that \"the most powerful magistrates should be amenable to the law.\" Rather than helping police violations of strictly criminal activity, impeachment is a \"method of national inquest into the conduct of public men\" for \"the abuse or violation of some public trust.\" Impeachable offenses are those that \"relate chiefly to injuries done immediately to the society itself.\" Put another way, the purpose of impeachment is to protect the public interest, rather than impose a punitive measure on an individual. This distinction was highlighted in the impeachment trial of federal district judge Alcee Hastings. Judge Hastings had been indicted for a criminal offense, but was acquitted. In 1988, the House impeached Hastings for much of the same conduct for which he had been indicted. Judge Hastings argued that the impeachment proceedings constituted \"double jeopardy\" because of his previous acquittal in a criminal proceeding. The Senate rejected his motion to dismiss the articles against him. The Senate voted to convict and remove Judge Hastings on eight articles, but it did not disqualify him from holding office in the future. Judge Hastings was later elected to the House of Representatives. The Constitution provides that the President, Vice President, and all civil officers are subject to impeachment for \"treason, bribery, or other high Crimes and Misdemeanors.\" The meaning of high crimes and misdemeanors, like the other provisions in the Constitution relevant to impeachment, is not primarily determined through the development of jurisprudence in the courts. Instead, the meaning of the Constitution's impeachment clauses is \"liquidated\" over time, or determined through historical practice. The Framers did not delineate with specificity the complete range of behavior that would merit impeachment, as the scope of possible \"offenses committed by federal officers are myriad and unpredictable.\" According to one scholar, impeachments are sometimes \"aimed at articulating, establishing, preserving, and protecting constitutional norms,\" or \"'constructing' constitutional meaning and practices.\" At times, impeachment might be used to reinforce an existing norm, indicating that certain behavior continues to constitute grounds for removal; in others, it may be used to establish a new norm, setting a marker that signifies what practices are impeachable for the future. Examining the history of impeachment in Congress can thus illuminate the constitutional meaning of impeachment, including when Congress has established or reaffirmed a particular norm. Congressional understanding of the scope of activities subject to impeachment and the potential persons who may be impeached was first put to the test during the Adams Administration. In 1797, letters sent to President Adams revealed a conspiracy by Senator William Blountâin violation of the U.S. government's policy of neutrality on the matter and the Neutrality Act âto organize a military expedition with the British to invade land in the American Southwest under Spanish control. The House voted to impeach Senator Blount on July 7, 1797, while the Senate voted to expel Senator William Blount the next day. Before impeaching Senator Blount, several House Members questioned whether Senators were \"civil officers\" subject to impeachment. But Samuel W. Dana of Connecticut argued that Members of Congress must be civil officers, because other provisions of the Constitution that mention offices appear to include holding legislative office. Despite already having voted to impeach Senator Blount, it was not until early in the next year that the House actually adopted specific articles of impeachment against him. At the Senate impeachment trial in 1799, Blount's attorneys argued that impeachment was improper because Blount had already been expelled from his Senate seat and had not been charged with a crime. But the primary issue of debate was whether Members of Congress qualified as civil officers subject to impeachment. The House prosecutors argued that under the American system, as in England, virtually anyone was subject to impeachment. The defense responded that this broad interpretation of the impeachment power would enable Congress to impeach state officials as well as federal, upending the proper division of federal and state authorities in the young Republic. The Senate voted to defeat a resolution that declared Blount was a \"civil officer\" and therefore subject to impeachment. The Senate ultimately voted to dismiss the impeachment articles brought against Blount because it lacked jurisdiction over the matter, although the impeachment record does not reveal the precise basis for this conclusion. In any event, the House has not impeached a Member of Congress since. The first federal official to be impeached and removed from office was John Pickering, a federal district judge. The election of President Thomas Jefferson in 1800, along with Jeffersonian Republican majorities in both Houses of Congress, signaled a shift from Federalist party control of government. Much of the federal judiciary at this early stage of the Republic were members of the Federalist party, and the new Jeffersonian Republican majority strongly opposed the Federalist-controlled courts. John Pickering was impeached by the House of Representatives in 1803 and convicted by the Senate on March 12, 1804. The circumstances of Judge Pickering's impeachment are somewhat unique as it appears that the judge had been mentally ill for some time, although the articles of impeachment did not address Pickering's mental faculties but instead accused him of drunkenness, blasphemy on the bench, and refusing to follow legal precedent. Judge Pickering did not appear at his trial, and Senator John Quincy Adams apparently served as a defense counsel. Following debate in a closed session, the Senate voted to permit evidence of Judge Pickering's insanity, drunkenness, and behavior on the bench. The Senate also rejected a resolution to disqualify three Senators, who were previously in the House and had voted to impeach Judge Pickering, from participating in the impeachment trial. The Senate voted to convict Judge Pickering guilty as charged, but the articles did not explicitly specify that any of Pickering's behavior constituted a high crime or misdemeanor. Objections to the framing of the question at issue caused several Senators to withdraw from the trial. On the same day the Senate convicted Judge Pickering, the House of Representatives impeached Supreme Court Justice Samuel Chase. Like the impeachment trial of Judge Pickering, the proceedings occurred following the election of President Thomas Jefferson and amid intense conflict between the Federalists and Jeffersonian Republicans. Justice Chase was viewed by Jeffersonian Republicans as openly partisan, and in fact the Justice openly campaigned for Federalist John Adams in the presidential election of 1800. Republicans also took issue with Justice Chase's aggressive approach to jury instructions in Sedition Act prosecutions. The eight articles of impeachment accused him of acting in an \"arbitrary, oppressive, and unjust\" manner at trial, misapplying the law, and expressing partisan political views to a grand jury. The Senate trial began on February 4, 1805. Both the House Managers and defense counsel for Justice Chase presented witnesses detailing the Justice's behavior. While some aspects of the dispute focused on whether Justice Chase took certain actions, the primary conflict centered on whether his behavior was impeachable. Before reaching a verdict, the Senate approved a motion from Senator James Bayard, a Federalist from Delaware, that the underlying question be whether Justice Chase was guilty of high crimes and misdemeanors, rather than guilty as charged. Of the eight articles, a majority of Senators voted to convict on three, while the remaining five did not muster a majority for conviction. But the Senate vote ultimately fell short of the necessary two-thirds majority to secure a conviction on any of the articles. The trial raised several questions that have recurred throughout the history of impeachments. For example, is impeachment limited to criminal acts, or does it extend to noncriminal behavior? The opposing sides in the Chase case took differing views on this matter, as they would in later impeachments to come. Due in part to the charged political atmosphere of the historical context, the attempted impeachment of Justice Chase has also come to represent an important limit on the scope of the impeachment remedy. Commentators have interpreted the acquittal of Justice Chase as establishing that impeachment does not extend to congressional disagreement with a judge's opinions or judicial philosophy. At least some Senators who voted to acquit did not consider the alleged offenses as rising to the level of impeachable behavior. By the time of the next impeachment in 1830, both houses of Congress were controlled by Jacksonian Democrats, and the federal courts were unpopular with Congress and the public. The House of Representatives impeached James Peck, a federal district judge, for abusing his judicial authority. The sole article accused the judge of holding an attorney in contempt for publishing an article critical of Peck and barring the attorney from practicing law for eighteen months. The context surrounding Judge Peck's actions involved disputes over French and Spanish land grant titles following the transfer of land in the Louisiana territory from French to U.S. control. Shortly after Missouri was admitted to the United States as part of the Missouri Compromise in 1821, Judge Peck decided a land rights case against the claimants in favor of the United States. The attorney for the plaintiffs wrote an article critical of the decision in a local paper. Judge Peck held the attorney in contempt, sentenced him to jail for twenty-four hours, and barred him from practicing law for eighteen months. The House impeached Judge Peck by a wide margin. Of central concern during the Senate trial were the limits of a judge's common law contempt power, a matter that appeared to be in dispute. The Senate ultimately acquitted Judge Peck, with roughly half of the Jacksonian Democrats voting against conviction. Shortly thereafter, Congress passed a law reforming and defining the scope of the judicial contempt power. Finally, in the midst of the Civil War, federal district judge West H. Humphreys was appointed to a position as a judge in the Confederate government, but he did not resign as a U.S. federal judge. In 1862, the House impeached and the Senate convicted Judge Humphreys for joining the Confederate government and abandoning his position. As in the trial of Judge Pickering previously, Judge Humphreys did not attend the proceedings. Unlike in the case of Judge Pickering, however, no defense was offered in the impeachment trial of Judge Humphreys. The impeachment and trial of President Andrew Johnson took place in the shadow of the Civil War and the assassination of President Abraham Lincoln. President Johnson was a Democrat and former slave owner who was the only southern Senator to remain in his seat when the South seceded from the Union. President Lincoln, a Republican, appointed Johnson military governor of Tennessee in 1862, and Johnson was later selected as Lincoln's second-term running mate on a \"Union\" ticket. Given these unique circumstances, President Johnson lacked both a party and geographic power base when in office, which likely isolated him when he assumed the presidency following the assassination of President Lincoln. The majority Republican Congress and President Johnson clashed over, among other things, Reconstruction policies implemented in the former slave states and control over officials in the executive branch. President Johnson vetoed twenty-one bills while in office, compared to thirty-six vetoes by all prior Presidents. Congress overrode fifteen of Johnson's vetoes, compared to just six with prior Presidents. On March 2, 1867, Congress reauthorized, over President Johnson's veto, the Tenure of Office Act, extending its protections for all officeholders. In essence, the Act provided that all federal officeholders subject to Senate confirmation could not be removed by the President except with Senate approval, although the reach of this requirement to officials appointed by a prior administration was unclear. Congressional Republicans apparently anticipated the possible impeachment of President Johnson when drafting the legislation; Republicans already knew of President Johnson's plans to fire Secretary of War Edwin Stanton, and the Act provided that a violation of its terms constituted a \"high misdemeanor.\" President Johnson then fired Secretary Stanton without the approval of the Senate. Importantly, his Cabinet unanimously agreed that the new restrictions on the President's removal power imposed by the Tenure of Office Act were unconstitutional. Shortly thereafter, on February 24, 1868, the House voted to impeach President Johnson. The impeachment articles adopted by the House against President Johnson included defying the Tenure of Office Act by removing Stanton from office and violating (and encouraging others to violate) the Army Appropriations Act. One article of impeachment also accused the President of making \"utterances, declarations, threats, and harangues\" against Congress. The Senate appointed a committee to recommend rules of procedure for the impeachment trial which then were adopted by the Senate, including a one-hour time limit for each side to debate questions of law that would arise during the trial. Chief Justice Salmon P. Chase presided over the trial and was sworn in by Associate Justice Samuel Nelson. During the swearing-in of the individual Senators, the body paused to debate whether Senator Benjamin Wade of Indiana, the president pro tempore of the Senate, was eligible to participate in the trial. Because the office of the Vice President was empty, under the laws of succession at that time Senator Wade would assume the presidency upon a conviction of President Johnson. Ultimately, the Senator who raised this point, Thomas Hendricks of Indiana, withdrew the issue and Senator Wade was sworn in. An important point of contention at the trial was whether the Tenure of Office Act protected Stanton at all because of his appointment by President Lincoln, rather than President Johnson. Counsel for President Johnson argued that impeachment for violating a statute whose meaning was unclear was inappropriate, and the statute barring removal of the Secretary of War was an unconstitutional intrusion into the President's authority under Article II. The Senate failed to convict President Johnson with a two-thirds majority by one vote on three articles, and it failed to vote on the remaining eight. But reports suggest that several Senators were prepared to acquit if their votes were needed. Seven Republicans voted to acquit; of those Senators, some thought it questionable whether the Tenure of Office Act applied to Stanton and believe it was improper to impeach a President for incorrectly interpreting an arguably ambiguous law. The implications of the acquittal of President Johnson are difficult to encapsulate neatly. Some commentators have concluded that the failure to convict President Johnson coincides with a general understanding that while impeachment is appropriate for abuses of power or violations of the public trust, it does not pertain to political or policy disagreements with the President, no matter how weighty. Of course, it bears mention that by the time of the Senate trial Johnson was in the last year of his Presidency, was not going to receive a nomination for President by either major political party for the next term, and appears to have promised in private to appoint a replacement for Stanton that could be confirmable. More broadly, the Johnson impeachment also represented a larger struggle between Congress and the President over the scope of executive power, one that arguably reconstituted their respective roles following the Civil War presidency of Abraham Lincoln. The postbellum experience in American history saw a variety of government officials impeached on several different grounds. These examples provide important principles that guide the practice of impeachment through the present day. For example, the Senate has not always conducted a trial following an impeachment by the House. In 1873, the House impeached federal district judge Mark. H. Delahay for, among other things, drunkenness on and off the bench. The impeachment followed an investigation by a subcommittee of the House Judiciary Committee into his conduct. Following the House vote on impeachment, Judge Delahay resigned before written impeachment articles were drawn up, and the Senate did not hold a trial. The impeachment of Judge Delahay shows that the scope of impeachable behavior is not limited to strictly criminal behavior; Congress has been willing to impeach individuals for behavior that is not indictable, but still constitutes an abuse of an individual's power and duties. This period of American history was fraught with partisan conflict over Reconstruction. Besides President Johnson, a number of other individuals were investigated by Congress during this time for purposes of impeachment. For example, in 1873, the House voted to authorize the House Judiciary Committee to investigate the behavior of Edward H. Durrell, federal district judge for Louisiana. A majority of the House Judiciary Committee reported in favor of impeaching Judge Durell for corruption and usurpation of power, including interfering with the state's election. Judge Durrell resigned on December 1, 1874, and the House discontinued impeachment proceedings. The first and only time a Cabinet-level official was impeached occurred during the presidential administration of Ulysses S. Grant. Grant's Secretary of War, William W. Belknap, was impeached in 1876 for allegedly receiving payments in return for appointing an individual to maintain a trading post in Indian territory. Belknap resigned two hours before the House unanimously impeached him, but the Senate still conducted a trial in which Belknap was acquitted. During the trial, upon objection by Belknap's counsel that the Senate lacked jurisdiction because Belknap was now a private citizen, the Senate voted 37-29 in favor of jurisdiction. A majority of Senators voted to convict Belknap, but no article mustered a two-thirds majority, resulting in acquittal. A number of Senators voting to acquit indicated that they did so because the Senate lacked jurisdiction over an individual no longer in office. Notably, although bribery is explicitly included as an impeachable offense in the Constitution, the impeachment articles brought against Belknap instead charged his behavior as constituting high crimes and misdemeanors. Bribery was mentioned at the Senate trial, but it was not specifically referenced in the impeachment articles themselves. The twentieth century saw further development of the scope of conduct considered by Congress to be impeachable, including the extent to which noncriminal conduct can constitute impeachable behavior and the proper role of a federal judge. The question of judicial review of impeachments also received its first treatment in the federal courts. The question of whether Congress can designate particular behavior as a \"high crime or misdemeanor\" by statute arose in the impeachment of Charles Swayne, a federal district judge for the Northern District of Florida, during the first decade of the twentieth century. A federal statute provided that federal district judges live in their districts and that anyone violating this requirement was \"guilty of a high misdemeanor.\" Judge Swayne's impeachment originated from a resolution passed by the Florida legislature requesting the state's congressional delegation to recommend an investigation into his behavior. The procedures followed by the House in impeaching Judge Swayne were somewhat unique. First, the House referred the impeachment request to the Judiciary Committee for investigation. Following this investigation, the House voted to impeach Judge Swayne based on the report prepared by the committee. The committee was then tasked with preparing articles of impeachment to present to the Senate. The House then voted again on these individual articles, each of which received less support than the single prior impeachment vote had received. The impeachment articles accused Judge Swayne of a variety of offenses, including misusing the office, abusing the contempt power, and living outside his judicial district. At the trial in the Senate, Judge Swayne essentially admitted to certain accused behavior, although his attorneys did dispute the residency charge, and Swayne instead argued that his actions were not impeachable. The Senate vote failed to convict Judge Swayne on any of the charges brought by the House. The impeachability of certain noncriminal behavior for federal judges was firmly established by the impeachment of Judge Robert W. Archbald in 1912. Judge Archbald served as a federal district judge before being appointed to the short-lived U.S. Commerce Court, which was created to review decisions of the Interstate Commerce Commission. He was impeached by the House for behavior occurring both as a federal district judge and as a judge on the Commerce Court. The impeachment articles accused Judge Archbald of, among other things, using his position as a judge to generate profitable business deals with potential future litigants in his court. This behavior did not violate any criminal statute and did not appear to violate any laws regulating judges. Judge Archbald argued at trial that noncriminal conduct was not impeachable. The Senate voted to convict him on five articles and also voted to disqualify him from holding office in the future. Four of those articles centered on behavior that occurred while Judge Archbald sat on the Commerce Court, whereas the fifth described his conduct over the course of his career. In the 1920s, a series of corruption scandals swirled around the administration of President Warren G. Harding. Most prominently, the Teapot Dome Scandal, which involved the noncompetitive lease of government land to oil companies, implicated many government officials and led to resignations and the criminal conviction and incarceration of a Cabinet-level official. The Secretary of the Navy, at the time Edwin Denby, was entrusted with overseeing the development of oil reserves that had recently been located. The Secretary of the Interior, Albert Fall, convinced Denby that the Interior Department should assume responsibility for two of the reserve locations, including in Teapot Dome, Wyoming. Secretary Fall then leased the reserves to two of his friends, Harry F. Sinclair and Edward L. Doheny. Revelations of the lease without competitive bidding launched a lengthy congressional investigation that sparked the eventual criminal conviction of Fall for bribery and conspiracy and Sinclair for jury tampering. President Harding, however, died in 1923, before congressional hearings began. The affair also generated significant judicial decisions examining the scope of Congress's investigatory powers. One aspect of the controversy included an impeachment investigation into the decisions of then-Attorney General Harry M. Daugherty. In 1922, the House of Representatives referred a resolution to impeach Daugherty for a variety of activities, including his failure to prosecute those involved in the Teapot Dome Scandal, to the House Judiciary Committee. The House Judiciary Committee eventually found there was not sufficient evidence to impeach Daugherty. But in 1924, a Senate special committee was formed to investigate similar matters. That investigation spawned allegations of many improper activities in the Justice Department. Daugherty resigned on March 28, 1924. In 1926, federal district judge George W. English was impeached for a variety of alleged offenses, including (1) directing a U.S. marshal to gather a number of state and local officials into court in an imaginary case in which Judge English proceeded to denounce them; (2) threatening two members of the press with imprisonment without sufficient cause; and (3) showing favoritism to certain litigants before his court. Judge English resigned before a trial in the Senate occurred; and the Senate dismissed the charges without conducting a trial in his absence. Federal district judge Harold Louderback was impeached in 1933 for showing favoritism in the appointment of bankruptcy receivers, which were coveted positions following the stock market crash of 1929 and the ensuing Depression. The House authorized a subcommittee to investigate, which held hearings and recommended to the Judiciary Committee that Judge Louderback be impeached. The Judiciary Committee actually voted against recommending impeachment, urging censure of Judge Louderback instead, but permitted the minority report that favored impeachment to be reported to the House together with the majority report. The full House voted to impeach anyway, but the Senate failed to convict him. Shortly thereafter, the House impeached federal district judge Halsted L. Ritter for showing favoritism in and profiting from appointing receivers in bankruptcy proceedings; practicing law while a judge; and failing to fully report his income on his tax returns. The Senate acquitted Judge Ritter on each individual count alleging specific behavior, but convicted him on the final count which referenced the previous articles, and charged him with bringing his court into disrepute and undermining the public's confidence in the judiciary. Congress's impeachment of Judge Ritter was the first to be challenged in court. Judge Ritter sued in the Federal Court of Claims seeking back pay, arguing that the charges brought against him were not impeachable under the Constitution and that the Senate improperly voted to acquit on six specific articles but to convict on a single omnibus article. In rejecting Judge Ritter's suit, the court held that the Senate has exclusive jurisdiction over impeachments and courts lack authority to review the Senate's verdict. The impeachment investigation and ensuing resignation of President Richard Nixon stands out as a profoundly important experience informing the standard for the impeachment of Presidents. Although President Nixon was never impeached by the House or subjected to a trial in the Senate, his conduct exemplifies for many authorities, scholars, and members of the public the quintessential case of impeachable behavior in a President. Less than two years after a landslide reelection as President, Richard Nixon resigned following the House Judiciary Committee's adoption of three articles of impeachment against him. The circumstances surrounding the impeachment of President Nixon were sparked by the arrest of five men for breaking into the Democratic National Committee Headquarters at the Watergate Hotel and Office Building. The arrested men were employed by the committee to Re-Elect the President (CRP), a campaign organization formed to support President Nixon's reelection. In the early summer of 1973, Attorney General Elliot Richardson appointed Archibald Cox as a special prosecutor to investigate the connection between the five burglars and CRP. Likewise, the Senate Select Committee on Presidential Campaign Activities began its own investigation. After President Nixon fired various staffers allegedly involved in covering up the incident, he spoke on national television disclaiming knowledge of the cover-up. But the investigations uncovered evidence that President Nixon was involved, that he illegally harassed his enemies through, among other things, the use of tax audits, and that the men arrested for the Watergate break-inâthe \"plumbers unit,\" because they were used to \"plug leaks\" considered damaging to the Nixon Administrationâhad committed burglaries before. Eventually a White House aide revealed that the President had a tape recording system in his office, raising the possibility that many of Nixon's conversations about the Watergate incident were recorded. The President refused to hand over such tapes to the special prosecutor or Congress. In his capacity as special prosecutor, Cox then subpoenaed tapes of conversations in the Oval Office on Saturday, October 20, 1973. This sparked the sequence of events commonly known as the Saturday Night Massacre. In response to the subpoena, President Nixon ordered Attorney General Elliot Richardson to fire Special Prosecutor Cox. Richardson refused and resigned. Nixon ordered Deputy Attorney General William D. Ruckelshaus to fire the special prosecutor, but Ruckelshaus also refused to do so and resigned. Solicitor General Robert Bork, in his capacity as Acting Attorney General, then fired the special prosecutor. Nixon eventually agreed to deliver some of the subpoenaed tapes to the judge supervising the grand jury. The Justice Department appointed Leon Jaworski to replace Cox as special prosecutor. The House Judiciary Committee began an official investigation of the Watergate issue and commenced impeachment hearings in April 1974. On March 1, 1974, a grand jury indicted seven individuals connected to the larger Watergate investigation and named the President as an unindicted coconspirator. On April 18, a subpoena was issued, upon the motion of the special prosecutor, by the United States District Court for the District of Columbia requiring the production of tapes and various items relating to meetings between the President and other individuals. Following a challenge to the subpoena in district court, the Supreme Court reviewed the case. On July 24, 1974, the Supreme Court affirmed the district court's order. In late July, following its investigation and hearings, the House Judiciary Committee voted to adopt three articles of impeachment against President Nixon. The first impeachment article alleged that the President obstructed justice by attempting to impede the investigation into the Watergate break-in. The second charged the President with abuse of power for using federal agencies to harass his political enemies and authorizing burglaries of private citizens who opposed the President. The third article accused the President of refusing to cooperate with the Judiciary Committee's investigation. The committee considered but rejected two proposed articles of impeachment. The first rejected article accused the President of concealing from Congress the bombing operations in Cambodia during the Vietnam conflict. This article was rejected for two primary reasons: some Members thought (1) the President was performing his constitutional duty as Commander-in-Chief and (2) Congress was given sufficient notice of these operations. The second rejected article concerned receiving compensation in the form of government expenditures at President Nixon's private properties in California and Floridaâwhich allegedly constituted an emolument from the United States in violation of Article II, Section 1, Clause 7 of the Constitutionâand tax evasion. Those Members opposed to the portion of the charge alleging receipt of federal funds argued that most of the President's expenditures were made pursuant to a request from the Secret Service; that there was no direct evidence the President knew at the time that the source of these funds was public, rather than private; and that this conduct failed to rise to the level of an impeachable offense. Some Members opposed to the tax evasion charge argued that the evidence was insufficient to impeach; others that tax fraud is not the type of behavior \"at which the remedy of impeachment is directed.\" President Nixon resigned on August 9, 1974, before the full House voted on the articles. The lessons and standards established by the Nixon impeachment investigation and resignation are disputed. On the one hand, the behavior alleged in the approved articles against President Nixon is arguably a \"paradigmatic\" case of impeachment, constituting actions that are almost certainly impeachable conduct for the President. On the other hand, the significance of the House Judiciary Committee's rejection of certain impeachment articles is unclear. In particular, whether conduct considered unrelated to the performance of official duties, such as the rejected article alleging tax evasion, can constitute an impeachable offense for the President is disputed. During the later impeachment of President Bill Clinton, for example, the majority and minority reports of the House Judiciary Committee on the committee's impeachment recommendation took different views on when conduct that might traditionally be viewed as private or unrelated to the functions of the presidency constitutes an impeachable offense. The House Judiciary Committee report that recommended articles of impeachment argued that perjury by the President was an impeachable offense, even if committed with regard to matters outside his official duties. In contrast, the minority views in the report argued that impeachment was reserved for \"conduct that constitutes an egregious abuse or subversion of the powers of the executive office.\" The minority noted that the Judiciary Committee had rejected an article of impeachment against President Nixon alleging that he committed tax fraud, mainly because that \"related to the President's private conduct, not to an abuse of his authority as President.\" The impeachment of President Bill Clinton stemmed from an investigation that originally centered on financial transactions occurring years before President Clinton took federal office. Attorney General Janet Reno appointed Robert Fiske Jr. as a special prosecutor in January 1994 to investigate the dealings of President Clinton and his wife with the \"Whitewater\" real estate development during the President's tenure as attorney general and then governor of Arkansas. Following the reauthorization of the Independent Counsel Act in June, the Special Division of the United States Court of Appeals for the District of Columbia Circuit replaced Fiske in August with Independent Counsel Kenneth W. Starr, a former Solicitor General in the George H.W. Bush Administration and federal appellate judge. During the Whitewater investigation, Paula Jones, an Arkansas state employee, filed a civil suit against President Clinton in May 1994 alleging that he sexually harassed her in 1991 while governor of Arkansas. Lawyers for Jones deposed President Clinton at the White House and asked questions about the President's relationship with staffers, including an intern named Monica Lewinsky. Independent Counsel Starr received information alleging that Lewinsky had tried to influence the testimony of a witness in the Jones litigation, along with tapes of recordings between Monica Lewinsky and former White House employee Linda Tripp. Tripp had recorded conversations between herself and Lewinsky about Lewinsky's relationship with the President and hope of obtaining a job outside the White House. Starr presented this information to Attorney General Reno. Reno petitioned the Special Division of the United States Court of Appeals for the District of Columbia Circuit to expand the independent counsel's jurisdiction, and the Special Division issued an order on January 16, 1998, permitting the expansion of Starr's investigation into President Clinton's response to the Paula Jones case. Over the course of the spring and summer a grand jury investigated whether President Clinton committed perjury in his response to the Jones suit and whether he obstructed justice by encouraging others to lie about his relationship with Lewinsky. President Clinton appeared by video before the grand jury and testified about the Lewinsky relationship. Independent Counsel Starr referred his report to the House of Representatives on September 9, 1998, noting that under the independent counsel statute, his office was required to do so because President Clinton engaged in behavior that might constitute grounds for impeachment. The House then voted to open an impeachment investigation into President Clinton's behavior, released the Starr report publicly, and the House Judiciary Committee voted to release the tape of the President's grand jury testimony. Although the House Judiciary Committee had already conducted several hearings on the possibility of impeachment, the committee did not engage in an independent fact-finding investigation or call any live witnesses to testify about the President's conduct. Instead, the Judiciary Committee largely relied on the Starr report to inform the committee's own report recommending impeachment, released December 16, 1998. The committee report recommended impeachment of President Clinton on four counts. The first article alleged that President Clinton perjured himself when testifying to a criminal grand jury about his response to the Jones lawsuit and his relationship with Lewinsky. The second alleged that the President committed perjury during a deposition in the civil suit brought against him by Paula Jones. The third alleged that President Clinton obstructed justice in the suit brought against him by Jones and in the investigation by Independent Counsel Starr. The fourth alleged that the President abused his office by refusing to respond to certain requests for admission from Congress and making untruthful responses to Congress during the investigation into his behavior. On December 19, 1998, in a lame-duck session, the House voted to approve the first and third articles. After trial in the Senate, the President was acquitted on February 12, 1999. Statements of the Senators entered into the record on the impeachment reflect disagreement about what constitutes an impeachable offense for the President and whether Clinton's behavior rose to this level. For instance, Republican Senator Richard G. Lugar voted to convict on both articles, noting in his statement the gravity of the \"presidential misconduct at issue\" and arguing that the case was \"not about adultery.\" Instead, it centered on the obstruction of justice that occurred when the President \"lied to a federal grand jury and worked to induce others to give false testimony.\" For Senator Lugar, the President ultimately \"betrayed [the] trust\" of the nation through his actions and should be removed from office. In contrast, Republican Senator Olympia Snowe voted to acquit on both articles. In her statement, she admonished the President's \"lowly conduct,\" but concluded there was \"insufficient evidence of the requisite untruth and the requisite intent\" to establish perjury with regard to the concealment of his relationship with a subordinate; and the perjury charges regarding his relationship with a subordinate concerned statements that were largely \"ruled irrelevant and inadmissible in the underlying civil case\" which \"undermine[d] [their] materiality.\" She also stated that she thought one of the allegations in the second impeachment article had been provenâthe President's attempt to influence the testimony of his personal assistantâbut that the proper remedy for this was a criminal prosecution. Indeed, a number of Senators indicated that they did not consider the President's behavior to constitute an impeachable offense because the President's conduct was not of a distinctly public nature. For instance, Democratic Senator Byron L. Dorgan voted to acquit on both articles. He described Clinton's behavior as \"reprehensible,\" but concluded that it did not constitute \"a grave danger to the nation.\" The significance of the Clinton impeachment experience to informing the understanding of what constitutes an impeachable offense is thus open to debate. One might point to the impeachment articles recommended by the House Judiciary Committee, but not adopted by the full House, as concerning conduct insufficient to establish an impeachable offense. Specifically, the House declined to impeach President Clinton for his alleged perjury in a civil suit against him as well as for alleged untruthful statements made in response to congressional requests. Likewise, some scholars have pointed to the acquittal in the Senate of both impeachment articles brought by the House as evidence that the Clinton impeachment articles lacked merit or were adopted on purely partisan grounds. The statements of some Senators mentioned above, reasoning that Clinton's conduct did not qualify as an impeachable offense, may support arguments that impeachment is not an appropriate tool to address at least some sphere of conduct by a President not directly tied to his official duties. Even so, the failure to convict President Clinton might instead simply reflect the failure of the House Managers to prove their case, or simply bare political calculation by some Senators. Ultimately, the lessons of the Clinton impeachment experience will be revealed in the future practice of Congress when assessing whether similar conduct is impeachable if committed by future Presidents. Congress has impeached federal judges with comparatively greater frequency in recent decades, and some of these impeachments appear to augur important consequences for the practice in the future. In particular, within three years in the 1980s the House voted to impeach three federal judges, each occurring after a criminal prosecution of the judge. One impeached federal judge was not barred from future office and later was elected to serve in the House of Representatives, the body that had earlier impeached him. Another judge challenged the adequacy of his impeachment trial in a case that ultimately reached the Supreme Court, which ruled that the case was nonjusticiable. The House of Representatives impeached federal district judge Harry E. Claiborne in 1986, following his criminal conviction and imprisonment for providing false statements on his tax returns. Despite his incarceration, Judge Claiborne did not resign his seat and continued to collect his judicial salary. The House unanimously voted in favor of four articles of impeachment against him. The first two articles against Judge Claiborne simply laid out the underlying behavior that had led to his criminal prosecution. The third article \"rest[ed] entirely on the conviction itself\" and stood for the principle that \"by conviction alone he is guilty of . . . 'high crimes' in office.\" The fourth alleged that Judge Claiborne's actions brought the \"judiciary into disrepute, thereby undermining public confidence in the integrity and impartiality of the administration of justice\" which amounted to a \"misdemeanor.\" The Senate impeachment trial of Judge Claiborne was the first in which that body used a committee to take evidence. Rather than conducting a full trial with the entire Senate, the committee took testimony, received evidence, and voted on pretrial motions regarding evidence and discovery. The committee then reported a transcript of the proceedings to the full Senate, without recommending whether impeachment was warranted. The Senate voted to convict Judge Claiborne on the first, second, and fourth articles. In 1988, the House impeached a federal district judge who had been indicted for a criminal offense but was acquitted. Judge Alcee L. Hastings was acquitted in a criminal trial where he was accused of conspiracy and obstruction of justice for soliciting a bribe in return for reducing the sentences of two felons. After his acquittal, a judicial committee investigated the case and concluded that Judge Hastings's behavior might merit impeachment. The Judicial Conference (a national entity composed of federal judges that reviews investigations of judges and may refer recommendations to Congress) eventually referred the matter to the House of Representatives, noting that impeachment might be warranted. The House of Representatives approved seventeen impeachment articles against Judge Hastings, including for perjury, bribery, and conspiracy. Judge Hastings objected to the impeachment proceedings as \"double jeopardy\" because he had already been acquitted in a previous criminal proceeding. The Senate, however, rejected his motion to dismiss the articles against him. The Senate again used a trial committee to receive evidence. That body voted to convict and remove Judge Hastings on eight articles, but did not vote to disqualify him from holding future office. Judge Hastings was later elected to the House of Representatives. Before the trial of Judge Hastings even began in the Senate, the House impeached Judge Walter L. Nixon. Judge Nixon was convicted in a criminal trial of perjury to a grand jury and imprisoned. Following an investigation by the House Judiciary Committee's Subcommittee on Civil and Constitutional Rights, the Judiciary Committee reported a resolution to the full House recommending impeachment on three articles. The full House approved three articles of impeachment, the first two involving lying to a grand jury and the last for undermining the integrity of and bringing disrepute on the federal judicial system. The Senate convicted Judge Nixon on the first two articles but acquitted him on the third. Judge Nixon challenged the Senate's use of a committee to receive evidence and conduct hearings. He sued in federal court arguing that the use of a committee, rather than the full Senate, to take evidence violated the Constitution's provision that the Senate \"try\" all impeachments. The Supreme Court ultimately rejected his challenge in Nixon v. United States , ruling that the issue was a nonjusticiable political question because the Constitution grants the power to try impeachments \"in the Senate and nowhere else\"; and the word \"try\" \"lacks sufficient precision to afford any judicially manageable standard of review of the Senate's actions. \" As a result of this decision, impeachment proceedings appear largely immune from judicial review. Two judges have been impeached in the twenty-first century. As with the three impeachments of judges in the 1980s, the first followed a criminal indictment. District Judge Samuel B. Kent pleaded guilty to obstruction of justice for lying to a judicial investigation into alleged sexual misconduct and was sentenced to thirty-three months in prison. The House impeached Judge Kent for sexually assaulting two court employees, obstructing the judicial investigation of his behavior, and making false and misleading statements to agents of the Federal Bureau of Investigation about the activity. Judge Kent resigned his office before a Senate trial. The Senate declined to conduct a trial following his resignation. Although the four previous impeachments of federal judges followed criminal proceedings, the most recent impeachment did not. In 2010, Judge G. Thomas Porteous Jr. was impeached for participating in a corrupt financial relationship with attorneys in a case before him, and engaging in a corrupt relationship with bail bondsmen whereby he received things of value in return for helping the bondsman develop corrupt relationships with state court judges. Judge Porteous was the first individual impeached by the House and convicted by the Senate based in part on conduct occurring before he began his tenure in federal office. The first and second articles of impeachment each alleged misconduct by Judge Porteous during both his state and federal judgeships. The fourth alleged that Judge Porteous made false statements to the Senate and FBI in connection with his nomination and confirmation to the U.S. District Court for the Eastern District of Louisiana. Judge Porteous's filings in answer to the articles of impeachment argued that conduct occurring before he was appointed to the federal bench cannot constitute impeachable behavior. The House Managers' replication, or reply to this argument, argued that Porteous's contention had no basis in the Constitution. On December 8, 2010, he was convicted on all four articles, removed from office, and disqualified from holding future federal offices. The first article, which included conduct occurring before he was a federal judge, was affirmed 96-0. The second article, approved 90-6, alleged that he lied to the Senate in his confirmation hearing to be a federal judge. A number of Senators explicitly adopted the reasoning supplied by expert witness testimony before the House that the crucial issue over the appropriateness of impeachment was not the timing of the misconduct, but \"whether Judge Porteous committed such misconduct and whether such misconduct demonstrates the lack of integrity and judgment that are required in order for him to continue to function\" in office. Senator Claire McCaskill explained in her statement entered in the Congressional Record that Judge Porteous's argument for an \"absolute, categorical rule that would preclude impeachment and removal for any pre-federal conduct\" should be rejected. \"That should not be the rule,\" she noted, \"any more than allowing impeachment for any pre-federal conduct that is entirely unrelated to the federal office.\" Senator Patrick Leahy agreed, noting that he \"reject[ed] any notion of impeachment immunity [for pre-federal behavior] if misconduct was hidden, or otherwise went undiscovered during the confirmation process, and it is relevant to a judge's ability to serve as an impartial arbiter.\" The Constitution explicitly makes \"[t]he President, Vice President and all civil Officers of the United States\" subject to impeachment and removal. Which officials are considered \"civil Officers of the United States\" for purposes of impeachment is a significant constitutional question that remains partly unresolved. Based on both the constitutional text and historical precedent, federal judges and Cabinet-level officials are \"civil Officers\" subject to impeachment, while military officers, state and local officials, purely private individuals, and Members of Congress likely are not. A question that neither the Constitution nor historical practice has answered is whether Congress may impeach and remove lower-level, non-Cabinet executive branch officials. The Constitution does not define \"civil Officers of the United States.\" Nor do the debates at the Constitutional Convention provide significant evidence of which individuals (beyond the President and Vice President) the Framers intended to be impeachable. Impeachment precedents in both the House and Senate are of equally limited utility with respect to subordinate executive officials (i.e., executive branch officials other than the President and Vice President). In all of American history, only one such official has been impeached: Secretary of War William Belknap. Thus, while it seems that executive officials of the highest levels have been viewed as \"civil Officers,\" historical precedent provides no examples of the impeachment power being used against lower-level executive officials. One must therefore look to other sources for aid in determining precisely how far down the federal bureaucracy the impeachment power might reach. The general purposes of impeachment may assist in interpreting the proper scope of \"civil Officers of the United States.\" The congressional power of impeachment constitutes an important aspect of the various checks and balances built into the Constitution to preserve the separation of powers. It is a tool, entrusted to the House and Senate alone, to remove government officials in the other branches of government, who either abuse their power or engage in conduct that warrants their dismissal from an office of public trust. At least one commentator has suggested that the Framers recognized, particularly for executive branch officials, that there would be times when it may not be in the President's interest to remove a \"favorite\" from office, even when that individual has violated the public trust. As such, the Framers \"dwelt repeatedly on the need of power to oust corrupt or oppressive ministers whom the President might seek to shelter.\" If the impeachment power were meant to ensure that Congress has the ability to impeach and remove corrupt officials that the President was unwilling to dismiss, it would seem arguable that the power should extend to officers exercising a degree of authority, the abuse of which would harm the separation of powers and good government. The writings of early constitutional commentators also arguably suggest a broad interpretation of \"civil Officers of the United States.\" Joseph Story addressed the reach of the impeachment power in his influential Commentaries on the Constitution , asserting that \" all officers of the United states [] who hold their appointments under the national government, whether their duties are executive or judicial, in the highest or in the lowest departments of the government , with the exception of officers in the army and navy, are properly civil officers within the meaning of the constitution, and liable to impeachment.\" Similarly, William Rawle reasoned that \"civil Officers\" included \"[ a ] ll executive and judicial officers, from the President downwards , from the judges of the Supreme Court to those of the most inferior tribunals. . . .\" Consistent with the text of the Constitution, these early interpretations suggest the impeachment power was arguably intended to extend to \"all\" executive officers, and not just Cabinet-level officials and other executive officials at the highest levels. The meaning of \"officer of the United States\" under the impeachment provisions may be informed by other provisions of the Constitution that use the same phrase. Applying this contextual approach, the most thorough, and perhaps most helpful, judicial elucidation of the definition of \"Officers of the United States\" comes in the Constitution's Appointments Clause. Indeed, that provision, which establishes the methods by which \"Officers of the United States\" may be appointed, has generally been viewed as a useful guidepost in establishing the definition of \"civil Officers\" for purposes of impeachment. The Appointments Clause provides that the President shall nominate, and by and with the Advice and Consent of the Senate, shall appoint Ambassadors, other public Ministers and Consuls, Judges of the supreme Court, and all other Officers of the United States, whose Appointments are not herein otherwise provided for, and which shall be established by Law: but the Congress may by Law vest the Appointment of such inferior Officers, as they think proper, in the President alone, in the Courts of Law, or in the Heads of Departments. In interpreting the Appointments Clause, the Court has distinguished \"Officers of the United States,\" whose appointment is subject to the requirements of the Clause, and non-officers, also known as employees, whose appointment is not. The amount of authority that an individual exercises will generally determine his classification as either an officer or employee. As established in Buckley v. Valeo , an officer is \"any appointee exercising significant authority pursuant to the laws of the United States,\" while employees are viewed as \"lesser functionaries subordinate to the officers of the United States,\" who do not exercise \"significant authority.\" The Supreme Court has further subdivided \"officers\" into two categories: principal officers, who may be appointed only by the President with the advice and consent of the Senate; and inferior officers, whose appointment Congress may vest \"in the President alone, in the Courts of Law, or in the Heads of Departments.\" The Court has acknowledged that its \"cases have not set forth an exclusive criterion for distinguishing between principal and inferior officers for Appointments Clause purposes.\" The clearest statement of the proper standard to be applied in differentiating between the two types of officers appears to have been made in Edmond v. United States when the Court noted that \"[g]enerally speaking, the term 'inferior officer' connotes a relationship with some higher ranking officer or officers below the President . . . [and] whose work is directed and supervised at some level by others who were appointed by presidential nomination with the advice and consent of the Senate. \" Thus, in analyzing whether one may be properly characterized as either an inferior or a principal officer, the Court's decisions appear to focus on the extent of the officer's discretion to make autonomous policy choices and the authority of other officials to supervise and to remove the officer. Using the principles established in the Court's Appointments Clause jurisprudence to interpret the scope of \"civil Officers\" for purposes of impeachment, it would appear that employees, as non-officers, would not be subject to impeachment. Thus, lesser functionariesâsuch as federal employees who belong to the civil service, do not exercise \"significant authority,\" and are not appointed by the President or an agency headâwould not be subject to impeachment. At the opposite end of the spectrum, it would seem that any official who qualifies as a principal officer, including a head of an agency such as a Secretary, Administrator, or Commissioner, would be impeachable. The remaining question is whether inferior officers, or those officers who exercise significant authority under the supervision of a principal officer, are subject to impeachment and removal. As noted above, an argument can be made from the text and purpose of the impeachment clauses, as well as early constitutional interpretations, that the impeachment power was intended to extend to \" all \" officers of the United States, and not just those in the highest levels of government. Any official exercising \"significant authority,\" including both principal and inferior officers, would therefore qualify as a \"civil Officer\" subject to impeachment. This view would permit Congress to impeach and remove any executive branch \"officer,\" including many deputy political appointees and certain administrative judges. There is some historical evidence, however, to suggest that inferior officers were not meant to be subject to impeachment. For example, a delegate at the North Carolina ratifying convention asserted that \"[i]t appears to me . . . the most horrid ignorance to suppose that every officer, however trifling his office, is to be impeached for every petty offense . . . I hope every gentleman . . . must see plainly that impeachments cannot extend to inferior officers of the United States.\" Additionally, Governeur Morris, member of the Pennsylvania delegation to the Constitutional Convention, arguably implied that inferior officers would not be subject to impeachment in stating that \"certain great officers of State; a minister of finance, of war, of foreign affairs, etc. . . . will be amenable by impeachment to the public justice.\" Despite this ongoing debate, the authority to resolve any ambiguity in the scope of \"civil Officers\" for purposes of impeachment lays initially with the House, in adopting articles of impeachment, and then with the Senate, in trying the officer. The Constitution describes the grounds of impeachment as \"Treason, Bribery, or other high Crimes and Misdemeanors.\" As discussed above, the meaning of \"high Crimes and Misdemeanors\" is not defined in the Constitution or in statute. Some have argued that only criminal acts are impeachable offenses under the U.S. Constitution; impeachment is therefore inappropriate for noncriminal activity. In support of this assertion, one might note that the debate on impeachable offenses during the Constitutional Convention in 1787 shows that criminal conduct was encompassed in the \"high crimes and misdemeanors\" standard. As noted above, the notion that only criminal conduct can constitute sufficient grounds for impeachment does not, however, track historical practice. A variety of congressional materials support the notion that impeachment applies to certain noncriminal misconduct. For example, House committee reports on potential grounds for impeachment have described the history of English impeachment as including noncriminal conduct and noted that this tradition was adopted by the Framers. In accordance with the understanding of \"high\" offenses in the English tradition, impeachable offenses under this view are \"constitutional wrongs that subvert the structure of government, or undermine the integrity of office and even the Constitution itself.\" \"[O]ther high crimes and misdemeanor[s]\" are not limited to indictable offenses, but apply to \"serious violations of the public trust.\" Congressional materials take the view that \"'Misdemeanor' . . . does not mean a minor criminal offense as the term is generally employed in the criminal law,\" but refers instead to the behavior of public officials. \"[H]igh Crimes and Misdemeanors\" may thus be characterized as \"misconduct that damages the state and the operations of governmental institutions.\" According to congressional materials, the purposes underlying the impeachment process also reflect that noncriminal activity may constitute sufficient grounds for impeachment. The purpose of impeachment is not to inflict personal punishment for criminal activity. In fact, the Constitution explicitly makes clear that impeached individuals are not immunized from criminal liability once they are impeached for particular activity. Instead, impeachment is a \"remedial\" tool; it serves to effectively \"maintain constitutional government\" by removing individuals unfit for office. Grounds for impeachment include abuse of the particular powers of government office or a violation of the \"public trust\" âconduct that is unlikely to be barred by statute. Congressional practice also supports this position. Many impeachments approved by the House of Representatives have included conduct that did not involve criminal activity. For example, in 1803, Judge John Pickering was impeached and convicted for, among other things, appearing on the bench \"in a state of total intoxication.\" In 1912, Judge Robert W. Archbald was impeached and convicted for abusing his position as a judge by inducing parties before him to enter financial transactions with him. In 1936, Judge Halstead Ritter was impeached and convicted for conduct that \"br[ought] his court into scandal and disrepute, to the prejudice of said court and public confidence in the administration of justice . . . and to the prejudice of public respect for and confidence in the Federal judiciary.\" And a number of judges were impeached for misusing their position for personal profit. Some have suggested that the standard for impeaching a federal judge differs from an executive branch official. While Article II, Section 1, of the Constitution specifies the grounds for the impeachment of civil officers as \"Treason, Bribery, or other high Crimes and Misdemeanors,\" Article III, Section 1, provides that federal judges \"hold their Offices during good Behaviour.\" One argument posits that these clauses should be read in conjunction, meaning that judges can be impeached and removed from office if they fail to exhibit good behavior or if they are guilty of \"treason, bribery, or other high Crimes and Misdemeanors.\" But while one might find some support for the notion that the \"good behavior\" clause constitutes an additional ground for impeachment in early twentieth century practice, the \"modern view\" of Congress appears to be that the phrase \"good behavior\" simply designates judicial tenure. Under this reasoning, rather than functioning as a ground for impeachment, the \"good behavior\" phrase simply makes clear that federal judges retain their office for life unless they are removed through a proper constitutional mechanism. For example, a 1973 discussion of impeachment grounds released by the House Judiciary Committee reviewed the history of the phrase and concluded that the \"Constitutional Convention . . . quite clearly rejected\" a \"dual standard\" for judges and civil officers. The next year, the House Judiciary Committee's Impeachment Inquiry asked whether the \"good behavior\" clause provides another ground for impeachment of judges and concluded that \"[i]t does not.\" It emphasized that the House's impeachment of judges was \"consistent\" with impeachment of \"non-judicial officers.\" Finally, the House Report on the Impeachment of President Clinton affirmed this reading of the Constitution, stating that impeachable conduct for judges mirrored impeachable conduct for other civil officers in the government. The \"treason, bribery, and high Crimes and Misdemeanors\" clause thus serves as the sole standard for impeachable conduct for both executive branch officials and federal judges. Still, even if the \"good behavior\" clause does not delineate a standard for impeachment and removal for federal judges, as a practical matter, one might argue that the range of impeachable conduct differs between judges and executive branch officials because of the differing nature of each office. For example, one might argue that a federal judge could be impeached for perjury or fraud because of the importance of trustworthiness and impartiality to the judiciary, while the same behavior might not always constitute impeachable conduct for an executive branch official. But given the varied factors at issueâincluding political calculations, the relative paucity of impeachments of nonjudicial officers compared to judges, and the fact that a nonjudicial officer has never been convicted by the Senateâit is uncertain if conduct meriting impeachment and conviction for a judge would fail to qualify for a nonjudicial officer. The impeachment and acquittal of President Clinton highlights this difficulty. The House of Representatives impeached President Clinton for (1) providing perjurious and misleading testimony to a federal grand jury and (2) obstruction of justice in regards to a civil rights action against him. The House Judiciary Committee report that recommended articles of impeachment argued that perjury by the President was an impeachable offense, even if committed with regard to matters outside his official duties. The report rejected the notion that conduct such as perjury was \"more detrimental when committed by judges and therefore only impeachable when committed by judges.\" The report pointed to the impeachment of Judge Claiborne, who was impeached and convicted for falsifying his income tax returnsâan act which \"betrayed the trust of the people of the United States and reduced confidence in the integrity and impartiality of the judiciary.\" While it is \"devastating\" for the judiciary when judges are perceived as dishonest, the report argued, perjury by the President is \"just as devastating to our system of government.\" And, the report continued, both Judge Claiborne and Judge Nixon were impeached and convicted for perjury and false statements in matters distinct from their official duties. Likewise, the report concluded that President Clinton's perjurious conduct, though seemingly falling outside his official duties as President, nonetheless constituted grounds for impeachment. In contrast, the minority views from the report opposing impeachment reasoned that \"not all impeachable offenses are crimes and not all crimes are impeachable offenses.\" The minority argued that the President is not impeachable for all potential crimes, no matter how minor; impeachment is reserved for \"conduct that constitutes an egregious abuse or subversion of the powers of the executive office.\" Examining the impeachment of President Andrew Johnson and the articles of impeachment drawn up for President Richard Nixon, the minority concluded that both were accused of committing \"public misconduct\" integral to their \"official duties.\" The minority noted that the Judiciary Committee had rejected an article of impeachment against President Nixon alleging that he committed tax fraud, primarily because that \"related to the President's private conduct, not to an abuse of his authority as President.\" The minority did not explicitly claim that the grounds for impeachment might be different between federal judges and executive branch officials, but its reasoning at least hints in that direction. Its rejection of nonpublic behavior as sufficient grounds for impeachment of the Presidentâincluding its example of tax fraud as nonpublic behavior that does not qualifyâappears to conflict with the past impeachment and conviction of federal judges on just this basis. One reading of the minority's position is that certain behavior might be impeachable conduct for a federal judge, but not for the President. While two articles of impeachment were approved by the House, the Senate acquitted President Clinton on both charges. Even so, generating firm conclusions from this result is difficult, as there may have been varying motivations for these votes. One possibility is that the acquittal occurred because some Senatorsâthough agreeing that the conduct merited impeachmentâthought the House Managers failed to prove their case. Another is that certain Senators disagreed that the behavior was impeachable at all. Yet another possibility is that neither ideological stance was considered and voting was conducted solely according to political calculations. Civil officers are subject to impeachment for treason, bribery, or \"other high Crimes and Misdemeanors.\" Treason is defined in the constitutional text, but bribery is not. As this report has discussed, Congress has substantial discretion in determining what misconduct constitutes \"high Crimes and Misdemeanors\" meriting impeachment and removal for government officials. Likewise, Congress could presumably look to several different sources to inform its understanding of what behavior qualifies as bribery under the Constitution. One source might be the current federal criminal code. Under federal statute, it is a criminal offense for a public official to corruptly seek or receive bribes in return for official acts. Another might be the understanding of the crime of bribery at the nation's Founding. At the time of the Constitutional Convention, bribery was a common law crime, although its precise scope is somewhat difficult to determine. According to Blackstone, it included situations where a judge, or other person involved in the administration of justice, took \"any undue reward to influence his behavior in office.\" Though the scope of the crime of bribery was initially narrow, it appears to have expanded to include giving as well as receiving bribes, as well as attempted bribery in certain situations. Some commentators assert that, at the time of the Founding, the English and American common law definition of bribery had developed to apply not just to judges, but also to executive officers . No matter the precise scope of bribery in the common law courts, in Parliamentary practice it was understood to constitute an impeachable offense in England at the time of the nation's Founding. In 1624, the House of Commons impeached the Lord Treasurer (one of the King's ministers) for bribery. Actual debate on the meaning of bribery at the Constitutional Convention was limited. As mentioned above, while discussing presidential impeachment, Gouverneur Morris asserted that the President should be subject to the impeachment process because he might \"be bribed by a greater interest to betray his trust,\" noting the example of Charles II receiving a bribe from Louis XIV. The First Congress enacted a federal bribery statute for customs officers, which provided that those officers convicted of taking or receiving a bribe be fined and barred from holding office in the future, while the payer of a bribe would be fined as well . The same Congress passed another bribery statute that applied to anyone who \"directly or indirectly, give[s] any sum or sums of money, or any other bribe, present or reward, or any promise, contract, obligation or security, for the payment or delivery of any money, present or reward, or any other thing to obtain or procure the opinion, judgment or decree of any judge or judges of the United States\" as well as the judge who accepted the bribe. Other officers of the United States were added to the federal statute's provisions in 1853. And the states passed their own laws about the time of the Constitution's drafting that prohibited bribery and the closely related crime of extortion by state officers and judges. A number of impeachments in the United States have charged individuals with misconduct that was viewed as bribery. In most of those instances, however, the specific articles of impeachment were framed as \"high crimes and misdemeanors\" or an \"impeachable offense.\" For instance, the House of Representatives approved articles of impeachment against then-Judge Hastings, including one for the \"impeachable offense\" of participating in a \"corrupt conspiracy to obtain $150,000 from defendants [in a case before him] in return for the imposition of [lighter] sentences.\" Although the article did not mention bribery, the Judiciary Committee report analyzing the article described Judge Hastings as participating in a \"bribery conspiracy\" or a \"bribery scheme.\" The Senate convicted Hastings on this article. Likewise, the first article of impeachment against Judge Porteous charged him with \"solicit[ing] and accept[ing] things of value\" from attorneys without disclosure and ruling in those clients favor. The second charged him with \"solicit[ing] and accept[ing] things of value . . . for his personal use and benefit, while at the same time taking official actions that benefitted\" a bail bondman and his sister. Neither article explicitly referenced bribery, but much like the Hastings impeachment, the Judiciary Committee report analyzing the articles alleged that Judge Porteous had participated in a \"bribery scheme.\" In sum, the Framers provided that bribery was an impeachable offense for the President, Vice President, and other civil officers. At the time of the Constitution's drafting, bribery was a common law crime whose scope had expanded from its earlier roots. And Parliament had impeached ministers of the Crown for bribery. But the Framers did not adopt a formal definition of bribery in the Constitution, and the debates at the Constitutional Convention and during ratification do not clearly indicate the intended meaning of bribery for impeachment purposes. In any case, the practice of impeachment in the United States has tended to envelop charges of bribery within the broader standard of \"other high Crimes and Misdemeanors.\" Most impeachments have concerned behavior occurring while an individual is in a federal office. But some have addressed, at least in part, conduct before individuals assumed their positions. For example, in 1912, a resolution impeaching Judge Robert W. Archbald and setting forth thirteen articles of impeachment was reported out of the House Judiciary Committee and agreed to by the House. The Senate convicted Judge Archbald in January the next year. At the time that Judge Archbald was impeached by the House and tried by the Senate in the 62nd Congress, he was U.S. Circuit Judge for the Third Circuit and a designated judge of the U.S. Commerce Court. The articles of impeachment brought against him alleged misconduct in those positions as well as in his previous position as U.S. District Court Judge of the Middle District of Pennsylvania. Judge Archbald was convicted on four articles alleging misconduct in his then-current positions as a circuit judge and Commerce Court judge, and on a fifth article that alleged misuse of his office both in his then-current positions and in his previous position as U.S. District Judge. While Judge Archbald was impeached and convicted in part for behavior occurring before he assumed his then-current position, that behavior occurred while he held a prior federal office. Judge G. Thomas Porteous, in contrast, is the first individual to be impeached by the House and convicted by the Senate based in part on conduct occurring before he began his tenure in federal office. Article II alleged misconduct beginning while Judge Porteous was a state court judge as well as misconduct while he was a federal judge. Article IV alleged that Judge Porteous made false statements to the Senate and FBI in connection with his nomination and confirmation to the U.S. District Court for the Eastern District of Louisiana. He was convicted on all four articles, removed from office, and disqualified from holding future federal offices. On the other hand, it does not appear that any President, Vice President, or other civil officer of the United States has been impeached by the House solely based on conduct occurring before he began his tenure in the office held at the time of the impeachment investigation, although the House has, on occasion, investigated such allegations. It appears that federal officials who have resigned have still been thought to be susceptible to impeachment and a ban on holding future office. Secretary of War William W. Belknap resigned hours before the House impeached him, but the Senate still conducted a trial in which Belknap was acquitted. During the trial, upon objection by Belknap's counsel that the Senate lacked jurisdiction because Belknap was now a private citizen, the Senate voted in favor of jurisdiction. That said, the resignation of an official under investigation for impeachment often ends impeachment proceedings. For example, no impeachment vote was taken following President Richard Nixon's resignation after the House Judiciary Committee decided to report articles of impeachment to the House. And proceedings were ended following the resignation of Judges English, Delahay, and Kent. In the judicial system, the degree of certainty with which parties must prove their allegations through the production of evidenceâwhat is known as the burden of persuasion or the standard of proof âvaries depending on the type of proceeding. In a criminal trial, in which a defendant risks deprivation of life and liberty, the prosecutor's burden of proof is high. Each element of the offense must be proved \"beyond a reasonable doubt.\" In civil litigation between private parties, in which the potential harm to a defendant is less severe, the plaintiff's burden of proof is reduced. The allegations generally need only be proved by a \"preponderance of the evidence.\" An even more generous standard is used by federal grand juries, who may issue an indictment on a finding that there is \"probable cause\" to believe that a crime has occurred. In yet other settings, an intermediate standard of \"clear and convincing evidence\" is used. This burden is somewhere below \"reasonable doubt\" but higher than \"preponderance.\" The Constitution establishes no clear standard of proof to be applied in the impeachment process. Neither has the House in its decision to impeach, nor the Senate in its decision to convict, chosen to establish (either by rule or precedent) a particular governing standard. The question has been repeatedly debated in both chambers, but ultimately individual Members have been free to use any standard they wish in deciding how to cast their respective votes. In short, when deciding questions of impeachment and removal, historical practice seems to indicate that Members need be convinced only to their own satisfaction. Moreover, even if the House or Senate chose to establish a governing standard of proof, it may be hard for such a rule to be enforced. In the House, the debate over the standard of proof that should be applied in determining whether the evidence supports approval of articles of impeachment has generally focused on the lower end of the standards-of-proof spectrum. Those who have argued for the most easily satisfied probable cause standard have often analogized the House's decision to impeach to that of a grand jury's decision to indict. Like a grand jury, the House's role is to ascertain whether sufficient evidence exists to charge an official with an impeachable offense, not to determine guilt. That role is reserved to the Senate, which may apply a different, potentially higher standard of proof. As such, it is argued that the House should apply a similar standard to what is applied by an investigating grand juryâa standard such as preponderance of the evidence or \"probable cause.\" This position was perhaps most clearly articulated during the Judiciary Committee's consideration of the impeachment of Judge Charles Swayne in 1904 by Representative Powers, who argued the following: This House has no constitutional power to pass upon the question of the guilt or the innocent of the respondent. He is not on trial before us. We have no right to take from him the presumption of innocence which he enjoys under the law. All we have the right to do is to say whether there has been made out such probable cause of guilt as to entitle the American people to the right to have the case tried before the Senate of the United States. Those who have argued for the more demanding clear and convincing standard have often focused on the gravity of the impeachment process and its impact not only on the impeached official, but in the case of a presidential impeachment, on the entire executive branch. For example, during the House's consideration of articles of impeachment against President Clinton, the President's counsel asserted that the clear and convincing standard was \"commensurate with the gravity of impeachment.\" \"Lower standards,\" it was argued, \"are simply not demanding enough to justify the fateful step of an impeachment trial.\" The House Judiciary Committee's report issued in connection with its approval of articles of impeachment against President Nixon displays the House's historical reluctance to impose any formalized burden of proof on Members. In describing the articles, the report noted that the committee had found \"clear and convincing evidence\" of the individual impeachable offenses, but did not explicitly contend that such a finding was required, or that \"clear and convincing\" should represent the governing standard of proof in House impeachments. The dissenting Members took a different approach, arguing that they were persuaded that the applicable standard for proof in House impeachments \"must be no less rigorous than proof by 'clear and convincing evidence.'\" Even so, the minority not only acknowledged that the House has never sought to \"fix by rule\" an applicable standard of proof, but also explicitly stated that they would not \"advocate such a rule.\" \"The question,\" the minority concluded, \"is properly left to the discretion of individual Members.\" Much like Members of the House, Senators are not bound by any specific burden of proof in the trial of an impeached official. Counsel for the impeached official have generally argued that individual Senators should adopt the most demanding standard of \"beyond a reasonable doubt,\" while the House Managers have generally urged a lower standard. The Constitution's use of words like \"try\" and \"convicted\" could be read to suggest an intent that the Senate adopt a criminal-like standard in impeachment trials. Counsel for President Clinton argued this position, at least with respect to presidential impeachments, asserting that the Constitution's phrasing \"strongly suggests that an impeachment trial is akin to a criminal proceeding and that the beyond-a-reasonable-doubt standard of criminal proceedings should be used.\" House Managers, on the other hand, have generally argued that use of the \"beyond reasonable doubt\" standard is inappropriate. They have noted that \"an impeachment trial is not a criminal trial,\" nor are the consequences of a convictionâwhich are limited to removal from office and possible disqualification from holding future federal officeâcriminal in nature. The Senate's approach of ensuring that its Members retain the ability to make individualized decisions on the standard of proof necessary for conviction was perhaps best exhibited during the impeachment trial of Judge Claiborne. There, counsel for Judge Claiborne submitted a motion to establish \"beyond a reasonable doubt\" as the applicable standard of proof in the trial. The House Managers disagreed, arguing that standard was inappropriate, and that setting any standards would prevent individual members from exercising their own personal judgment. Judge Claiborne's motion was ultimately rejected by the Presiding Officer, who held that the standard of proof to be applied was left to the discretion of each individual Senator. This approach was affirmed in the Senate's most recent statement on the standard of proof in a Senate trial. During Judge Porteous's trial, the Senate trial committee referenced the resolution of the Claiborne motion, noting that the Senate had \"declin[ed] to establish an obligatory standard.\" Accordingly, the committee report concluded that \"Each Senator may, therefore, use the standard of proof that he or she feels is appropriate.\" As such, rather than impose a specific standard of proof on its members, both the House and Senate have sought to ensure that individual Members remain free to make their own determinations, guided by their individual conscience and judgment, and their oath to do \"impartial justice.\" Like most aspects of the Senate impeachment trial, the body's approach to evidentiary questions is unique. The Senate has not bound itself to any specific controlling set of evidentiary rules. Instead, the admissibility of evidence is primarily based on Senate precedent, with objections first ruled on by the Presiding Officer, but ultimately settled by a majority vote of the Senate. The present Senate Impeachment Rules provide a basic procedural framework for how evidentiary questions are to be handled. Under the Rules, objections to the admissibility of evidence \"may be made by the parties or their counsel.\" Those objections are directed to the Presiding Officer who \"may rule on all questions of evidence.\" That ruling is given effect unless challenged by an individual Senator. At that point, the Rules provide that the question be \"submitted to the Senate for decision without debate.\" The Rules set the process by which evidentiary questions are to be decided, but provide only the most basic guidance on the substantive standards to be applied by either the Presiding Officer or individual Senators in making such decisions. The Rules state only that the Presiding Officer's authority to rule on questions of evidence includes, but is not limited to, \"questions of relevancy, materiality, and redundancy of evidence and incidental questions.\" Similarly, the Senate reserves the right to \"determine competency, relevancy, and materiality.\" The Rules therefore suggest only that evidence should meet basic relevancy requirements. To the extent there are additional substantive standards for either the Presiding Officer or individual Senators to apply in making evidentiary determinations, they appear to derive primarily from Senate precedent. Evaluating and understanding those precedents, however, is difficult because evidentiary questions submitted to the Senate are generally made with no debate. As such, the historical record of Senate deliberations on evidentiary questions typically includes the final disposition of the question and perhaps only limited evidence of the particular reasoning that led to the Senate's decision. Given the quasi-judicial aspects of the Senate trial, the parties have often used judicial evidentiary standards, including the Federal Rules of Evidence, to support their motions to either allow or exclude evidence. The Senate has generally been receptive to this approach and in fact arguably supported some adherence to judicial rules of evidence. But more recent trials have made clear that the Senate is \"not bound by the Federal Rules of Evidence, although those rules may provide some guidance. . . .\" Indeed, it has been argued that the Federal Rules of Evidence, which were designed to protect jurors from prejudicial evidence and to help them judge evidence, have little if any place in a Senate impeachment trial, where each individual Senator must weigh all relevant evidence as he or she deems fit. This approach is consistent with Chief Justice Rehnquist's ruling during the Clinton impeachment trial that the Senators should not be referred to as \"jurors\" because in an impeachment trial \"the Senate is not simply a jury. It is a court. . . .\" Accordingly, while judicial principles may guide the Senate, the body primarily \"determine[s] the admissibility of evidence by looking to Senate precedents rather than court decisions. A Senate vote is the ultimate authority for determining the admissibility of evidence.\" In the end, viewing House and Senate impeachment proceedings through the lens of established judicial constructsâincluding rules of procedure, evidence, and standards of proofâshould be undertaken with caution. The impeachment process does not fit into existing judicial molds of either a criminal or civil proceeding. Indeed, it is not necessarily a judicial proceeding at all. It is instead an exceptional proceeding defined by its distinctive combination of judicial and legislative characteristics that has historically required a unique approach to procedural and evidentiary questions. Impeachment proceedings have been challenged in federal court on a number of occasions. Perhaps most significantly, the Supreme Court has ruled that a challenge to the Senate's use of a trial committee to take evidence posed a nonjusticiable political question. In Nixon v. United States , Judge Walter L. Nixon had been convicted in a criminal trial on two counts of making false statements before a grand jury and was sent to prison. He refused, however, to resign and continued to receive his salary as a judge while in prison. The House of Representatives adopted articles of impeachment against the judge and presented the Senate with the articles. The Senate invoked Impeachment Rule XI, a Senate procedural rule which permits a committee to take evidence and testimony. After the committee completed its proceedings, it presented the full Senate with a transcript and report. Both sides presented briefs to the full Senate and delivered arguments, and the Senate then voted to convict and remove him from office. The judge then brought a suit arguing that the use of a committee to take evidence violated the Constitution's provision that the Senate \"try\" all impeachments. The Supreme Court noted that the Constitution grants \"the sole Power\" to try impeachments \"in the Senate and nowhere else\"; and the word \"try\" \"lacks sufficient precision to afford any judicially manageable standard of review of the Senate's actions.\" This constitutional grant of sole authority, the Court reasoned, meant that the \"Senate alone shall have authority to determine whether an individual should be acquitted or convicted.\" In addition, because impeachment functions as the \" only check on the Judicial Branch by the Legislature,\" the Court noted the important separation of powers concerns that would be implicated if the \"final reviewing authority with respect to impeachments [was placed] in the hands of the same body that the impeachment process is meant to regulate.\" Further, the Court explained that certain prudential considerationsâ\"the lack of finality and the difficulty of fashioning relief\"âweighed against adjudication of the case. Judicial review of impeachments could create considerable political uncertainty, if, for example, an impeached President sued for judicial review. The Court in Nixon was careful to distinguish the situation from Powell v. McC ormack , a case also involving congressional procedure where the Court declined to apply the political question doctrine. That case involved a challenge brought by a Member-elect of the House of Representatives, who had been excluded from his seat pursuant to a House Resolution. The precise issue in Powell was whether the judiciary could review a congressional decision that the plaintiff was \"unqualified\" to take his seat. That determination had turned, the Court explained, \"on whether the Constitution committed authority to the House to judge its Members' qualifications, and if so, the extent of that commitment.\" The Court noted that while Article I, Section 5, does provide that Congress shall determine the qualifications of its Members, Article I, Section 2, delineates the three requirements for House membershipâRepresentatives must be at least twenty-five years old, have been U.S. citizens for at least seven years, and inhabit the states they represent. Therefore, the Powell Court concluded, the House's claim that it possessed unreviewable authority to determine the qualifications of its Members \"was defeated by . . . this separate provision specifying the only qualifications which might be imposed for House membership.\" In other words, finding that the House had unreviewable authority to decide its Members' qualifications would violate another provision of the Constitution. The Court therefore concluded in Powell that whether the three requirements in the Constitution were satisfied was textually committed to the House, \"but the decision as to what these qualifications consisted of was not.\" Applying the logic of Powell to the case at hand, the Nixon Court noted that here, in contrast, leaving the interpretation of the word \"try\" with the Senate did not violate any \"separate provision\" of the Constitution. In addition, several other aspects of the impeachment process have been challenged. Judge G. Thomas Porteous sued seeking to bar counsel for the Impeachment Task Force of the House Judiciary Committee from using sworn testimony the judge had provided under a grant of immunity. The impeachment proceedings were started after a judicial investigation of Judge Porteous for alleged corruption on the bench. During that investigation, Judge Porteous testified under oath to the Special Investigatory Committee under an order granting him immunity from that information being used against him in a criminal case. Before the U.S. District Court for the District of Columbia, Judge Porteous argued that the use of his immunized testimony during an impeachment proceeding violated his Fifth Amendment right not to be compelled to serve as a witness against himself. The court rejected his challenge, reasoning that because the use of the testimony for an impeachment proceeding fell within the legislative sphere, the Speech or Debate Clause prevented the court from ordering the committee staff members to refrain from using the testimony. Similarly, Judge Alcee L. Hastings sought to prevent the House Judiciary Committee from obtaining the records of a grand jury inquiry during the committee's impeachment investigation. Prior to the impeachment proceedings, although ultimately acquitted, Judge Hastings had been indicted by a federal grand jury for a conspiracy to commit bribery. Judge Hastings's argument was grounded in the separation of powers: he claimed that permitting disclosure of grand jury records for an impeachment investigation risked improperly allowing the executive and judicial branches to participate in the impeachment processâa tool reserved for the legislature. The U.S. Court of Appeals for the Eleventh Circuit, however, rejected this \"absolutist\" concept of the separation of powers and held that \"a merely generalized assertion of secrecy in grand jury materials must yield to a demonstrated, specific need for evidence in a pending impeachment investigation.\" The U.S. District Court for the District of Columbia initially threw out Judge Hastings's Senate impeachment conviction, because the Senate had tried his impeachment before a committee rather than the full Senate. The decision was vacated on appeal and remanded for reconsideration under Nixon v. United States . The district court then dismissed the suit because it presented a nonjusticiable political question. Influenced by both English and colonial practice, the Framers of the Constitution crafted an Americanized impeachment remedy that ultimately holds government officers accountable for political offenses, or misdeeds committed by public officials against the state. The meaning of the Constitution's impeachment provisions has been worked out over time, informed by the historical practices of the House and Senate in pursuing impeachment for the misconduct of government officers. Impeachment is also generally immune from judicial review, meaning that Congress has substantial discretion in how it structures impeachment proceedings. The Constitution does not delineate the range of misconduct that qualifies as \"high Crimes and Misdemeanors,\" perhaps because the scope of possible offenses by government officers is impossible to delineate in advance. The history of impeachment in the United States shows that the remedy has generally applied against government officers for abuses of power, corruption, and conduct determined incompatible with an individual's office, but does not extend to strictly political or policy disagreements.", "summary": "The Constitution grants Congress authority to impeach and remove the President, Vice President, and other federal \"civil officers\" for \"Treason, Bribery, or other high Crimes and Misdemeanors.\" Impeachment is one of the various checks and balances created by the Constitution, a crucial tool for holding government officers accountable for violations of the law and abuse of power. Responsibility and authority to determine whether to impeach an individual rests in the hands of the House of Representatives. Should a simple majority of the House approve articles of impeachment, the matter is then presented to the Senate, to which the Constitution provides the sole power to try an impeachment. A conviction on any one of the articles of impeachment requires the support of a two-thirds majority of the Senators present and results in that individual's removal from office. The Senate also has discretion to vote to disqualify that official from holding a federal office in the future. The Constitution imposes several additional requirements on the impeachment process. When conducting an impeachment trial, Senators must be \"on oath or affirmation,\" and the right to a jury trial does not extend to impeachment proceedings. If the President is impeached and tried in the Senate, the Chief Justice of the United States presides at the trial. The Constitution bars the President from using the pardon power to shield individuals from impeachment or removal from office. Understanding the historical practices of Congress with regard to impeachment is central to fleshing out the meaning of the Constitution's impeachment clauses. While much of constitutional law is developed through jurisprudence analyzing the text of the Constitution and applying prior judicial precedents, the Constitution's meaning is also shaped by institutional practices and political norms. In fact, the power of impeachment is largely immune from judicial review, meaning that Congress's choices in this arena are unlikely to be overturned by the courts. For that reason, examining the history of actual impeachments is crucial to understanding the meaning of the Constitution's impeachment provisions. One major recurring question about the impeachment remedy is the definition of \"high Crimes and Misdemeanors.\" At least at the time of ratification of the Constitution, the phrase appears understood to have applied to uniquely \"political\" offenses, or misdeeds committed by public officials against the state. Such misconduct simply resists a full delineation, however, as the possible range of potential misdeeds in office cannot be determined in advance. Instead, the type of behavior that merits impeachment is worked out over time through the political process. While this report focuses on the constitutional considerations relevant to impeachment, there are various other important questions that arise in any impeachment proceeding. For a consideration of the legal issues surrounding access to information from the executive branch in an impeachment investigation, see CRS Report R45983, Congressional Access to Information in an Impeachment Investigation , by Todd Garvey. For discussion of the House procedures used in impeachment investigations, see CRS Report R45769, The Impeachment Process in the House of Representatives , by Elizabeth Rybicki and Michael Greene.", "document_type": "crs"}
{"report": "The long-term objective of the World Trade Organization's (WTO's) Agreement on Agriculture (AoA) is to establish a fair and market-oriented agricultural trading system. The principal approach for achieving this goal is, first, to achieve specific binding commitments by all WTO members in each of the three pillars of agricultural trade policy reformâmarket access, domestic support, and export subsidiesâand second, to provide for substantial progressive reductions in domestic agricultural support and border protection from foreign products. As a signatory member of the WTO agreements, the United States has committed to abide by WTO rules and disciplines, including those that govern domestic farm policy as spelled out in the AoA. Since the WTO was established on January 1, 1995, the United States has generally met its WTO commitments, including spending limits on market-distorting types of farm program outlays. Direct payments to producers under U.S. farm support programs are cumulative, and compliance with WTO commitments is based on annual spending levels. The addition of large, ad hoc trade assistance payments to producers in 2018 and 2019, on top of existing farm program support, has raised concerns by some U.S. trading partners, as well as market watchers and policymakers, that U.S. domestic farm subsidy outlays in those two years might exceed the annual spending limit of $19.1 billion agreed to as part of U.S. commitments to the WTO. This report examines whether the United States might exceed its WTO spending limit. As background, this report briefly reviews the WTO rules and disciplines on farm program spending. Then, it reviews the types of U.S. farm programs that are subject to WTO disciplinesâin particular, it focuses on programs that make direct payments to producers based on agricultural production activities. The review of farm programs includes a discussion of how U.S. compliance may be affected by changes made to U.S. farm programs under the 2018 farm bill (the Agricultural Improvement Act of 2018, P.L. 115-334 ), as well as by the two rounds of ad hoc direct payments made under the Market Facilitation Program initiated by the Secretary of Agriculture in 2018 and 2019 under other statutory authorities. The nature and timing of U.S. farm support program outlays are discussed in the context of relevant WTO commitmentsâin particular, how different types of program outlays are notified to the WTO and how they might count against the aggregate U.S. spending limit. Finally, this report examines current projections about farm program outlays for 2018-2019 and assesses the possibility of whether U.S. farm program spending might exceed the $19.1 billion spending limit in those years. Farm support programs can violate WTO commitments in two principal ways: first, by exceeding spending limits on certain market-distorting programs, or second, by generating market distortions that spill over into the international marketplace and cause significant adverse effects for other market participants. In general, U.S. farm support outlays should be evaluated against both of these criteria for a potential violation of WTO commitments. However, this report focuses on the first potential pathway for a violation: excessive spending. WTO member nations have agreed to limit spending on their most market-distorting farm policies. The WTO's AoA spells out the rules for countries to determine whether their policies are potentially trade-distorting, how to calculate the costs of any distortion, and how to report those costs to the WTO in a public and transparent manner. (See the text box \"WTO Classification of Domestic Support\" below. More detail on WTO classifications of domestic support is provided in two appendices to this report: Appendix A , \"WTO Domestic Support Commitments,\" and Appendix B , \"U.S. Domestic Support Notifications.\") Domestic farm subsidies under the AoA are measured using a specially defined indicator, the \"Aggregate Measure of Support\" (AMS). AMS encompasses two types of support provided as a benefit to agricultural producers: product-specific support (that is, benefits linked to a specific commodity) and non-product-specific support (general benefits not linked to a specific commodity). This distinction is important for evaluating compliance, as discussed below. In addition, some types of programs are not subject to spending limits under WTO commitments. The United States, along with 27 other original members of the WTO, agreed to establish ceilings for their non-exempt AMS, referred to as the amber box. The U.S. ceiling for amber box spending has been fixed at $19.1 billion since 2000. If the United States were to exceed its WTO annual spending limit, then U.S. farm support programs could be vulnerable to challenge by another WTO member under the WTO's dispute settlement rules. Not all farm support program outlays count against amber box spending limits. Certain domestic support outlays may be exempt from counting against the amber box spending limit if they meet one of four possible conditions ( Appendix A ). First, if a program's outlays are considered to be minimally or non-trade distorting (in accordance with specific criteria listed in Annex 2 of the AoA), then they may qualify as green box programs and not be included in the AMS. Second, if program spending is market-distorting but has offsetting features that limit the production associated with support payments, then they may qualify as blue box programs and not be included in the AMS. Finally, if AMS outlays are sufficiently small relative to the value of the outputâmeasured as a share of either product-specific or non-product-specific outputâthen they are not included in the amber box. In addition to these exemptions, the timing of outlays across crop, calendar, or marketing years may also influence the calculation of total AMS spending for any given year and help avoid exceeding the amber box spending limit during a particular time period. The U.S. Department of Agriculture (USDA) implements four general types of farm programs that provide payments (classified as AMS) directly to individual producers: Traditional farm p rograms authorized under Title I of the 2018 farm bill ( P.L. 115-334 ). These include the Market Assistance Loan (MAL), Agricultural Risk Coverage (ARC), Price Loss Coverage (PLC), Dairy Margin Coverage (DMC), and sugar programs. Payments under these programs during crop years 2014-2018 were authorized by the 2014 farm bill ( P.L. 113-79 ). These programs were modified by the 2018 farm bill and include payments made for crop years 2019-2023. Because of the way their payments are triggered, outlays under the MAL, DMC, and sugar programs are notified as product-specific AMS, whereas ARC and PLC payments are notified as non-product-specific AMS. Permanent disaster assistance programs include the Livestock Forage Disaster Program (LFP), Livestock Indemnity Program (LIP), Tree Assistance Program (TAP), and Emergency Assistance for Livestock, Honeybees, and Farm-Raised Fish Program (ELAP). Payments under all of these permanent disaster assistance programs are coupled to producer choices and notified as product-specific AMS. The federal crop insurance program provides premium subsidies to producers. Premium subsidies are statutorily defined as a percentage of a policy's total premium, and premiums vary with insured units, coverage levels, and crop values. Since 2012, USDA has notified crop insurance premium subsidies to the WTO as product-specific AMS, since they are coupled to producer crop choices. A d hoc programs may be authorized by the Secretary of Agriculture, outside of Congress, using authority under the Commodity Credit Corporation (CCC) Charter Act to make payments in support of U.S. agriculture. Two such programs are the trade assistance programs of 2018 and 2019. USDA has not yet notified any trade assistance payments to the WTO, nor has USDA announced the WTO classification it intends to use for such payments. Payments under U.S. conservation programs are generally deemed non-market-distorting and are notified as green box, where they are not subject to any spending limit. The traditional revenue support programs, as well as the disaster assistance and ad hoc payment programs, are implemented by USDA's Farm Service Agency (FSA) using mandatory CCC funding. The federal crop insurance program is implemented by USDA's Risk Management Agency (RMA) using mandatory funding from the Federal Crop Insurance Corporation. The United States has instituted several farm program changes since early 2018 that could bring increased scrutiny from other WTO members. With respect to the current incarnation of traditional farm support programs, most were established under previous farm bills. They were reauthorized by the 2018 farm bill but with some modifications that might alter their treatment under WTO disciplines. In general, the 2018 farm bill incrementally shifts farm safety net outlays away from decoupled programs and toward coupled (and more market-distorting) programs. This was done by raising support levels for certain existing coupled programs, removing several of the coupled programs from individual farm payment limit requirements, and expanding the potential pool of family-farm payment recipients, thus weakening payment limit restrictions. Similarly, federal crop insurance coverage was expanded under the 2018 farm bill, thus increasing the potential for greater premium subsidy outlays. The 2018 farm bill increased statutory, product-specific MAL rates for several program crops. MAL payments are coupled directly to actual harvested production (subject to a producer's participation choice). MAL payments may be triggered when the local market price for a MAL commodity falls below its statutory MAL rate. Raising the MAL loan rate has two effects: It increases the probability of triggering a coupled MAL payment when market prices are declining, but it decreases the maximum potential payment under the decoupled PLC program associated with that commodity. The potential for increased MAL payments has become more relevant under the 2018 farm bill, because all MAL benefits were removed from counting against annual USDA producer payment limits. Furthermore, the 2018 farm bill raised support levels for participating dairy producers under the DMC program. DMC payments are triggered when the monthly average of a formula-determined margin, between milk prices and feed costs per unit, falls below a producer-selected margin coverage level. DMC payments are made on a farm-level historical milk production base. Milk producers must participate in the DMC to be eligible for payments. Thus, DMC payments are treated as coupled. DMC, like its predecessorâthe Margin Protection Programâoperates without any limit on payments received. Coupled payments can influence producer production choices in favor of those farm activities expected to receive larger support payments. If such payments represent a significant share of a commodity's farm value and result in surplus production that moves into international markets, then they could attract the attention of competitor nations. Such spillovers, if measurably harmful to foreign export competitors or producers, could lead to challenges under the WTO's dispute settlement process. Of the direct payment programs, the ARC and PLC programs are partially decoupled from producer behavior: Payments are made to a portion (85%) of historical base acres irrespective of current-year plantings. However, ARC and PLC payment calculations use current market-year prices to determine if a payment has been triggered, thus partially coupling them to market conditions. The partial decoupling of both ARC and PLC is in deference to WTO rules that view decoupled payments as less distorting of markets than coupled payments. Furthermore, ARC's use of a moving average formula based on historical prices and yields is also in response to a WTO panel finding (under dispute settlement) to consider market conditions in setting program support levels. In contrast, PLC's use of a statutorily fixed reference price ignores market conditions. Similarly, ARC's revenue formula uses the PLC reference price as a floor price. Thus, ARC only reflects market conditions when prices are above PLC reference prices. As a result, both ARC and PLC could be market distorting when market prices are below the statutory reference prices for prolonged periods. By basing ARC and PLC payments on historical acres rather than current planted acres (i.e., current crop choices), the payments are partially decoupled, and USDA notified them as non-product-specific. As a result, ARC and PLC payments have been excluded from counting against amber box spending limits in the WTO since their origin in 2014 under the non-product-specific de minimis exclusion. Two changes to the PLC program under the 2018 farm bill include the option for producers to update their program yields (used in the PLC payment formula) and an escalator provision that could potentially raise a covered commodity's effective reference price (used in both the PLC and ARC payment rate) by as much as 115% of the statutory PLC reference price based on 85% of the five-year Olympic average of farm prices. Both of these options would likely be used by producers only when they offer the potential to expand program payments. The 2018 farm bill also specifies several changes to the ARC program. Among the changes, ARC will use a trend-adjusted yield to calculate its revenue guarantee. In addition, the five-year Olympic average county yield calculations will increase the yield floor (substituted into the formula for each year where the actual county yield is lower) to 80%, up from 70%, of the transitional county yield. This yield calculation is used to calculate the ARC benchmark county revenue guarantee. Both of these yield modifications have the potential to raise ARC revenue guarantees for producers, thus increasing the potential for payments when actual current-year yields or prices turn downward. The 2018 farm bill offers producers the option in 2019 of switching between ARC and PLC coverage, on a commodity-by-commodity basis, effective for both 2019 and 2020. Beginning in 2021, producers again have the option to switch between ARC and PLC but on an annual basis for each of 2021, 2022, and 2023. This flexibility could allow producers to benefit from current market information to select the program, ARC or PLC, that offers the greatest potential to make payments. Both ARC and PLC payments are subject to annual USDA farm payment limits under the 2018 farm bill (unchanged from the 2014 farm bill). In a change from previous farm policy, the 2018 farm bill removed several coupled, direct payment programs from annual farm payment limit requirements. These include benefits under MAL and the three permanent disaster assistance programs: LIP, TAP, and ELAP. DMC, like its predecessorâthe Margin Protection Programâoperates without any farm payment limit. All of these programs make product-specific amber box payments. The absence of a limit on benefits received by an individual farmer under these programs represents the potential for unlimited, fully coupled outlays that count against the U.S. amber box limit unless exempted under the PS de minimis exemption. Higher DMC and MAL support levels increase the potential for higher program payments during a market downturn when prices are lower. Weak market conditions and relatively low commodity prices (below MAL loan rates) would be needed to trigger payments under MAL. DMC payments are triggered by weak farm milk prices relative to feed costs. In contrast, disaster payments are triggered by natural disasters or other qualifying perils occurring at the farm level. The 2018 farm bill made no changes to the \"actively engaged in farming\" criteria used to determine whether an individual is eligible for farm program payments. However, it modified the criteria for farm program eligibility. The definition of family farm is expanded to include first cousins, nieces, and nephews, thus increasing the potential pool of individuals eligible for individual payment limits on family farming operations. With respect to payment limits and the adjusted gross income (AGI) criteria, the 2018 farm bill left both the payment limit of $125,000 per individual ($250,000 per married couple) and the AGI threshold of $900,000 unchanged. The U.S. sugar program does not rely on direct payments from USDA, and no changes were made to this status under the 2018 farm bill. Instead, USDA provides indirect price support via MAL loans to processors at statutorily fixed prices (which were raised 5% by the 2018 farm bill), while limiting both the amount of sugar supplied for food use in the U.S. market and the amount of sugar that may enter the United States under a series of tariff rate quotas. In its 2016 notification of domestic support to the WTO (the most recent notification year), USDA notified the implicit cost of the sugar program at $1.5 billion in market price support. The change in the sugar MAL rate is not expected to influence the United States' implicit sugar cost notification. Federally subsidized crop insurance is available for over 100 agricultural commoditiesâincluding both program commodities and others. Federal crop insurance is permanently authorized by the Federal Crop Insurance Act (7 U.S.C. 1501 et seq. ) but is periodically modified by new farm legislation. The principal subsidy component of federal crop insurance is a premium subsidy that has paid for an average of 63% of the cost of buying crop insurance since 2014. Premiums (and premium subsidies) vary with the type of policy, insured unit, and coverage level selected. Thus, both the premium and its subsidy component are coupled to producer behavior. In its annual notifications to the WTO of domestic support outlays, USDA has declared the premium subsidies as product-specific direct payments to producers (i.e., product-specific AMS). The 2018 farm bill expanded the federally subsidized crop insurance program. In addition, the 2018 farm bill extended the authority for catastrophic policies to forage and grazing crops and grasses. It allows producers to purchase separate crop insurance policies for crops that can be both grazed and mechanically harvested on the same acres and to receive independent indemnities for each intended use. Annual USDA premium subsidiesâwhich have averaged $6.2 billion per year since 2014âcount against the U.S. amber box spending limit of $19.1 billion but are subject to potential exclusion at the commodity level under the product-specific de minimis exemption. During 2018 and 2019, the Secretary of Agriculture has used his authority under the CCC Charter Act to initiate two ad hoc trade assistance programs. USDA initiated the trade aid packages as part of the Administration's effort to provide short-term assistance to farmers in response to foreign trade retaliation targeting U.S. agricultural products. The first trade aid package was announced on July 24, 2018. It targeted production for selected agricultural commodities in 2018 and was valued at up to $12 billion. The second trade aid package was announced on May 23, 2019. It targeted production for an expanded list of commodities and was valued at up to an additional $16 billion. According to USDA, the two trade aid packages are structured in a similar manner and include three principal components ( Table 1 ): The Market F acilitation P rogram (MFP) provides direct payments to producers of certain USDA-specified commodities. MFP payments are administered by FSA. The Food P urchase and D istribution P rogram (FPDP) is intended to purchase unexpected surpluses of affected commodities such as fruits, nuts, rice, legumes, beef, pork, milk, and other specified products for redistribution through federal nutrition assistance programs. It is administered by USDA's Agricultural Marketing Service. The Agricultural Trade P romotion (ATP) program provides funding to assist in developing new export markets for affected U.S. farm products. It is administered by the USDA's Foreign Agriculture Service in conjunction with the private sector. The two years of trade assistance are valued at a combined $28 billion ( Table 1 ). The largest part of the aid is two years of MFP payments valued at a combined $24.5 billion. The United States has yet to notify spending to the WTO under any of the trade assistance programs, so the exact WTO spending classification is currently unknown. However, past practice can serve as a useful guide for the likely notification. The FPDP and ATP programs for 2018 and 2019 are expected to be implemented in a similar manner during both years. USDA outlays under food purchase and distribution programs have historically been notified to the WTO as green box compliant and thus not subject to any spending limit. Trade promotion programs, such as ATP, are not notified under domestic support, because they do not involve direct payments to producers. Thus, the FPDP and ATP programs are not expected to affect the United States' ability to meet its WTO commitments. However, the anticipated large outlays under the MFP programs have raised questions. Payments under the two MFP programs are structured differently during 2018 and 2019. As a result, they are likely to be notified under different WTO classifications. The specific manner of determining how payments are made to individual producers is likely to determine their WTO status. USDA's MFP payments for 2018 are based on each farm's harvested production of eligible crops during 2018 times a fixed per-unit payment rate. Payments to dairy are based on historical production, while hog payments use midyear inventory data. Under this specification, 2018 MFP payments are likely to be notified as coupled, product-specific AMS and count against the U.S. annual spending limit of $19.1 billion (unless they are exempted under the product-specific de minimis exemption). USDA initially announced potential 2018 MFP payments of up to $10 billion. As of August 22, 2019, USDA reported that $8.59 billion in MFP payments had already been distributed to producers, including $7.07 billion to soybean producers, $483 million to cotton, $245 million to sorghum, $241 million to wheat, $182 million to dairy, $156 million to hogs, $133 million to corn, $42 million to fresh sweet cherries, and $20 million to shelled almonds. These MFP payments have to be added to all other non-exempt, product-specific payments for each of these commodities and then be evaluated against their individual product-specific de minimis exemptions. Both MFP payment caps and AGI criteria are relevant. However, the FY2019 Supplemental Appropriations for Disaster Relief Act ( P.L. 116-20 ) altered the AGI requirement as it applies to MFP payments such that it may be waived if at least 75% of AGI is from farming, ranching, or forestry-related activities. To the extent that producers expect similar MFP payments to occur in future years, product-specific payments can become market distorting in favor of those commodities with higher per-unit payments and subject to potential WTO challenge. USDA is making MFP payments for the 2019 trade assistance program under a different formulation that avoids identifying payments with a specific crop. Instead, the underlying product-specific MFP payment rates are weighted at the county level by historical planted acres and yields to produce a single per-acre MFP payment rate for the entire county. This county-specific rate is then applied to each producer's total planted acres for all eligible commodities within that county, irrespective of the share of planted acres for any particular crop. Thus, payments are coupled to a producer's having planted at least one eligible commodity within the county, but they are independent of which commodity or commodities were planted. Under this specification, the 2019 MFP payments would appear to be coupled to planted acresâa producer has to plant an eligible crop to get a paymentâbut non-product-specific, thus possibly notifiable as non-product-specific AMS. The United States has notified its farm program support outlays through the crop year 2016. Under a normal timeline, USDA would notify spending for the crop year 2017 in the fall of 2019. Notification of domestic support for crop year 2018 would not be expected before 2020. Similarly, notification of domestic support outlays for crop year 2019 is not expected before 2021. U.S. compliance with WTO spending limits for 2018 and 2019 cannot be definitively known until notifications for those crop years have been released. As a result, the delay in notification may inhibit or deter another WTO member from bringing a case, assuming that MFP payments are not extended beyond 2019. This section analyzes available data on U.S. farm program payments for crop years 2017, 2018, and 2019 to evaluate the potential for the United States to remain in compliance with its amber box spending limit of $19.1 billion, particularly with the addition of large MFP payments in 2018 and 2019. There are several questions that will largely determine whether the United States remains in compliance with its amber box spending limit. 1. How will USDA classify the MFP payments for 2018 and 2019 in its notifications to the WTO? 2. How will market conditions and commodity prices evolve in 2019 with respect to final crop values and product-specific de minimis exemptions? 3. What will be the final value of total U.S. farm output in 2019 for evaluating the 5% non-product-specific de minimis exemption threshold against total non-product-specific AMS outlays? 4. How will market conditions affect decoupled ARC and PLC payments and total non-product-specific outlays in 2019? 5. Will the U.S.-China trade dispute continue into 2020, and if so, will a third year of trade assistance be in the offing? In response to the first question, the 2018 MFP payments appear to be coupled, product-specific AMS, whereas 2019 MFP payments appear to be non-product-specific AMS. Thus, different de minimis exemptions will be important for these two programs when evaluating compliance in 2018 and 2019. To conduct an analysis of the potential WTO compliance of U.S. farm program spending for 2017, 2018, and 2019, data are drawn from several sources. Whenever available, actual USDA program outlays are used. For example, FSA estimates DMC outlays for 2019 at approximately $300 million. Federal crop insurance premium subsidy outlays are available for the 2018 and 2019 crop years from USDA's RMA. When actual data are unavailable for any major farm program (most notably under ARC and PLC), then the projected spending data from the Congressional Budget Office (CBO) baseline for farm programs are used. Wherever values are not available from either USDA or CBO, then the 2017 value is repeated for 2018 and 2019. With respect to MFP program outlays, USDA has not released any official payment data on outlays under the 2018 or 2019 MFP programs, although some information has been released episodically to various news media (for example, see footnote 42 ). CRS relies on those media reports for information on 2018 MFP payments. Final MFP payments for 2018 are projected by CRS at $8.7 billion. The full $14.5 billion for 2019 MFP payments is incorporated into the WTO notification projection for 2019. According to this analysis, U.S. amber box spending for 2018, projected at over $14 billion, fits within the U.S. spending limit of $19.1 billion ( Table 2 ). However, if realized, this would be the largest U.S. amber box notification since 2001 ( Figure 1 ). Large product-specific outlays to soybeans (projected at $8.275 billion), wheat ($1.153 billion), cotton ($990 million), and peanuts ($231 million) in particular exceed their product-specific de minimis exemptions and contribute to the large amber box projection for 2018. A more uncertain result is found for 2019. The expansion of MFP payments to $14.5 billion in 2019, and their shift to a non-product-specific WTO classification, suggests that the United States may potentially approach or exceed its $19.1 billion amber box spending limit. In this analysis, U.S. compliance with WTO spending limits in 2019 depends on how eventual aggregate non-product-specific outlays compare with the final 5% non-product-specific de minimis threshold as evidenced by the two scenarios presented in Table 2 and discussed below. Under scenario 1, the value of total U.S. farm output for 2019 is projected at $378 billion ( Figure 1 ). This is roughly equivalent to a three-year average of $377.954 billion for crop years 2014-2016. If realized, the $378 billion in total farm output would yield a 5% non-product-specific de minimis threshold of $18.9 billion. Total non-product-specific outlays for 2019 are projected at $18.92 billionâjust in excess of the non-product-specific de minimis exemption threshold. As a result, the full $18.92 billion of non-product-specific AMS would count against the amber box spending limit. When combined with the projected $5.119 billion in product-specific, non-exempt AMS outlays, total U.S. amber box outlays in 2019 would be a projected $24.039 billionâin excess of the $19.1 billion spending limit. Under scenario 2, an entirely different result is produced with only a minor increase in the projected value of total U.S. farm output at $380 billion ( Figure 2 ), up $2 billion from scenarioÂ 1. The choice of $380 billion in the total output value in scenario 2 highlights the sensitivity between compliance and noncompliance based on a small (0.53%) change in total output value between the two scenarios. In this scenario, the 5% non-product-specific de minimis threshold is $19 billion, and the entire projected non-product-specific AMS total of $18.92 billion would be exempted from counting against the amber box spending limit. As a result, total U.S. amber box outlays under scenario 2 would be equal to the projected product-specific, non-exempt AMS total of $5.119 billionâwithin the amber box spending limit. Other factors that could alter this analysis are the final realized 2019 market year average farm prices and county revenue values used to determine outlays for major program crops under the MAL, PLC, and ARC programs. Also, crop yields for corn and soybeans in 2019 are still uncertain due to the delayed planting and late crop progress in several important growing regions. Better-than-expected yields or higher-than-expected harvests could push market prices lower, whereas lower yield or harvest estimates could help to raise farm prices. Also, a continuation or possibly a deepening of the U.S.-China trade dispute could keep downward pressure on commodity markets. If the final price and revenue values are lower than currently projected, then program payments under ARC and PLC could be larger than those used in this analysis. This could increase aggregate non-product-specific outlays and increase the possibility of exceeding the 2019 amber box spending limit. At the same time, lower market values, if realized, would contribute to a lower total valuation for U.S. farm output and a subsequent lower 5% non-product-specific de minimis threshold for aggregate non-product-specific outlays to surpass, thus affecting the potential non-product-specific de minimis exemption status. In contrast, resolution of the U.S.-China trade dispute and an improved demand outlook could have the opposite effect of raising prices and commodity output values while lowering payments under countercyclical farm programs such as MAL, PLC, and ARC. According to the scenarios developed in this analysis, including a projected set of market conditions, the United States may potentially exceed its cumulative amber box spending limit of $19.1 billion in 2019. Excessive amber box payments in 2019 could result from the addition of large MFP payments to the traditional decoupled revenue support programs ARC and PLC. However, this analysis found that U.S. compliance with WTO amber box spending limits was very sensitive to a change in market conditions and market valuations. Noncompliance hinges on many key market factors that are currently unknown but would have to occur in such a manner as to broadly depress commodity prices through the 2019 marketing year (which extends through August 31, 2020, for corn and soybeans). Another crucial uncertainty is how the U.S.-China trade disputeâwith its deleterious effects on U.S. agricultural marketsâwill evolve. Resolution of the U.S.-China trade dispute and an improved demand outlook could lead to higher commodity prices and output values while lowering payments under countercyclical farm programs such as MAL, PLC, and ARC. Such a turn of events could help facilitate U.S. compliance with its WTO spending limits. Appendix A. WTO Domestic Support Commitments WTO member nations have agreed to limit spending on their market-distorting farm policies. With respect to farm program outlays, the AoA spells out the rules for countries to determine whether their policies are potentially trade-distorting, how to calculate the costs of any distortion, and how to report those costs to the WTO in a public and transparent manner. Aggregate Measure of Support (AMS) Domestic support is measured in monetary terms and expressed as the AMS. Domestic support includes both direct and indirect support in favor of agricultural producersâin other words, it includes any government measure that benefits producers, including revenue support, input subsidies, and marketing-cost reductions. Domestic subsidies include both budgetary outlays and revenue forgone by governments. Such support is measured at both the national and subnational level (i.e., state, county, or other local level). Producer-paid fees are deducted from the AMS. Domestic support should be calculated as closely as practical to the point of first sale of the basic agricultural product concernedâpreferably at the farm gate. Support measures directed at processors should be included to the extent that such measures benefit producers. AMS encompasses two types of support provided as a benefit to agricultural producers: product-specific support (that is, benefits linked to a specific commodity) and non-product-specific support (a general benefit not linked to a specific commodity). Certain AMS outlays may be exempt from counting against any WTO spending limit if they comply with criteria defined under either the green or blue box or if their sum is sufficiently small as to be deemed benign under the de minimis exemption. (Exemptions are described below.) Amber Box Outlays Non-exempt AMS outlays are referred to (or classified) as \"amber box\" spending and subject to a strict spending limit. Under WTO commitments, cumulative U.S. amber box outlays are limited to $19.1 billion annually. Goal of AMS Exemptions By leaving no constraint on green or blue box compliant spending, while imposing limits on amber box spending, the WTO's AoA classification structure encourages countries to design their domestic farm support programs to be more green and blue box compliant and less market-distorting. Green Box Exemptions Green box programs are minimally or non-trade-distorting and are not included in the AMSâthus they are not subject to any spending limits. Examples of green box programs include domestic food assistance programs, conservation and environmental programs, and general services such as research, inspection services, and extension activities. In its most recent notification to the WTO, the United States declared $119.5 billion in outlays for programs that met green box criteria during the 2016 crop year. A key to evaluating whether a program's annual outlays qualify for the green box exemption is to assess how payments are triggered. If payments are fully decoupled from producer behavior and market conditions and instead are based on some other independent criteria such as historical planted acres, then they could potentially be excluded from the AMS under the green box criteria. For example, Direct Payment outlays under the 1996, 2002, and 2008 farm bills were fully decoupled and thus exempted from the AMS under green box criteria. If, instead, payments are coupled to current producer behavior (such as planted acres or harvested output) or to market conditions (such as price movements or trade levels), then they likely are not eligible for exemption from the AMS under green box criteria. Blue Box Exemptions Blue box programs are described as market-distorting but production-limiting. Blue box programs generally have a supply-control feature that partially offsets their trade-distorting effects. For example, payments may be based on either a fixed area or yield or a fixed number of livestock or are made on less than 85% of base production. As such, blue box programs are not included in the AMSâthus they are not subject to any spending limits. The United States has not notified any program spending under the blue box criteria since 1995. De Minimis Exemptions from AMS Programs outlays that fail to meet green or blue box criteria are part of the AMS. However, there are two additional exemptions that may prevent AMS outlays for certain programs from counting against the amber box spending limit. If AMS spending is sufficiently small (as described below), then it is deemed to be benign and excluded from counting under the AMS's amber box. There are two types of de minimis exemptions: product-specific and non-product-specific. Product-specific outlays include all coupled outlays that are linked to the current planting or production of a specific commodity. Under the product-specific de minimis exemption, if total product-specific program outlays for a commodity are less than 5% of the value of production for that commodity, then such spending may be excluded from the country's AMS. Product-specific outlays are evaluated on a commodity-by-commodity basis against the 5% de minimis threshold. N on- product -specific outlays include all AMS outlays that are decoupled from the specific commodities that are actually produced but are coupled to a non-commodity-specific measure such as market conditions or national average prices. All non-commodity-specific AMS outlays are aggregated and evaluated against 5% of the total value of U.S. agricultural output. Coupled, Product-Specific Payments If the payment is based on the planted or harvested area or output of a specific commodity during the crop year, then program payments would be coupled directly to farmer behavior. Such payments would likely be notified as product-specific AMS spending and would count against the amber box ceiling. However, product-specific payments could potentially be excluded from counting against the AMS total by the product-specific de minimis exclusionâif they are less than 5% of the value of that specific commodity's output during that crop year. Coupled or Partially Coupled, Non-Product-Specific Payments If the payment is based on a formula that pools the planted or harvested area or output of several commoditiesâfor example, as a single county-level paymentâbut where the farmer need only have produced at least one of the pooled commodities to be eligible for the full county payment, then the payment could potentially be notified as coupled, non-product-specific AMS. Both ARC and PLC outlays on base acres are notified this way. However, ARC and PLC payments made on generic base under the 2014 farm bill were notified as commodity-specific payments, since the farmer had to plant the specific crop to receive a payment. If the payment is based on a historical measure such as planted or harvested acres or output for some past period of time, but where some production of an eligible crop must occur during the current crop year to be eligible for a payment, then the payments would likely be notified as partially decoupled, non-product-specific payments. Annual Notification of Compliance To provide for monitoring and compliance of WTO policy commitments, each WTO member is expected to submit annual notification reports of domestic support program spending within the context of the agreed-to WTO commitments. However, there is no enforcement mechanism or penalty for late notifications. The annual period used by each WTO memberâcalendar, fiscal, or marketing yearâis specified in the \"schedule of concessions\" (also referred to as the country schedule). The WTO's Committee on Agriculture reviews the annual notifications. However, the notification reports are public documentsâthey are posted online by the WTO where they are available for review (and possible challenge) by any other member or third party. Appendix B. U.S. Domestic Support Notifications The most recent U.S. notification to the WTO of domestic support outlays (made on October 31, 2018) is for the 2016 crop year. The majority of U.S. domestic agricultural program outlays have been categorized as indirect support that adhere to green box criteria ($119.5 billion) and thus have not been subject to any payment limit. In addition, the United States has traditionally relied on the de minimis exemptions to exempt substantial program outlays from counting against the amber box spending limit. In 2016, the United States notified $16 billion in AMS outlays (prior to applying eligible exemptions), including $8.6 billion of product-specific spending and $7.4 billion of non-product-specific spending. However, the United States notified $12.2 billion in de minimis exemptions, thus reducing the original $16 billion AMS to just $3.8 billion in amber box spending to count against the $19.1 billion spending limit. With respect to the non-product-specific de minimis exemption, the total value of U.S. national agricultural output in 2016 was $355.5 billion. As a result, the 5% de minimis non-product-specific threshold was $17.8 billion. Since non-product-specific outlays of $7.4 billion were well below this threshold, they were exempted in total from counting against the amber box spending limit. In addition, the United States notified $4.8 billion in product-specific de minimis exemptions. An example of a product-specific de minimis exemption is corn. In 2016, U.S. corn production was valued at $51.3 billion. Thus the product-specific 5% value threshold for corn was $2.565 billion. The United States notified $2.345 billion in AMS for corn in 2016, but since it was less than the 5% threshold, the entire amount was exempted from counting against the amber box limit. Similarly, product-specific exemptions for other crops made up the difference for the $4.8 billion in total product-specific exemptions. The De Minimis Exemption Aids U.S. Compliance Since 1995, the United States has stayed within its amber box spending limits ( Figure B-1 ), but this compliance has hinged on use of the de minimis exemptions in a number of years (e.g., 1999-2001 and 2005) to exclude substantial AMS spending from counting against the amber box limit. Since the 2002 farm bill ( P.L. 107-171 ), the United States has designed several of its major farm revenue support programs to meet non-product-specific criteria. Since the non-product-specific de minimis exemption threshold is measured as a share of the total value of U.S. agricultural output, it is associated with a very large exemption threshold. From 2010 to 2016, the value of total U.S. agricultural output has averaged $376.8 billion, which implies an average non-product-specific 5% de minimis threshold of $18.8 billion. The manner by which the United States has notified its amber box outlaysâthat is, non-product-specific versus product-specificâhas changed over the years (particularly for federal crop insurance subsidies) in such a way as to facilitate compliance with the amber box spending limit. Generally, non-product-specific de minimis exemptions are much larger than product-specific de minimis exemptions ( Figure B-1 ). Since 201 0, non-product-specific de minimis exclusions have averaged $4.8 billion annually, compared with average product-specific exclusions of $3.8 billion. The largest non-product-specific exemption was reached in 2011, when $7.5 billion in net crop insurance indemnities was exempted. In 2011, U.S. agricultural output value was $380.8 billion, which, in turn, yielded a non-product-specific 5% value threshold of $19.0 billion. Starting in 2012, USDA switched to notifying crop insurance premium subsidies for each individual insured commodity as product-specific. Since then, crop insurance premiums are evaluated at the individual crop level and eligible to be exempted under the product-specific de minimis exemption if they do not exceed 5% of the value of that commodity's output when combined with other PS outlays for that commodity. Since 2012, over $5 billion in product-specific crop insurance premium subsidies have been exempted each year. As a result of this crop insurance notification switch, coupled with relatively high farm prices during 2012 and 2013 that reduced payments on the non-product-specific revenue support programs, product-specific de minimis exemptions surpassed non-product-specific exemptions during those two years. Then, starting in 2014, under program changes authorized by the 2014 farm bill ( P.L. 113-79 ), the value of non-product-specific exemptions again surpassed product-specific exemptions. This was driven by large non-product-specific outlays under the new, decoupled revenue support programs ARC (which incorporated high farm prices into its payment formula) and PLC. Annual ARC and PLC outlays averaged a combined $6.7 billion during 2014-2016, including $4.7 billion for ARC and $2.0 billion for PLC.", "summary": "As a member of the World Trade Organization (WTO) agreements, the United States has committed to abide by WTO rules and disciplines, including those that govern domestic farm policy as spelled out in the Agreement on Agriculture (AoA). Since establishment of the WTO on January 1, 1995, the United States has complied with its WTO spending limits on market-distorting types of farm program outlays (referred to as amber box spending). However, the addition of large, new trade assistance payments to producers in 2018 and 2019, on top of existing farm program support, has raised concerns by some U.S. trading partners, as well as market watchers and policymakers, that U.S. domestic farm subsidy outlays might exceed the annual spending limit of $19.1 billion agreed to as part of U.S. commitments to WTO member countries. CRS analysis indicates that the United States probably did not violate its WTO spending limit in 2018 but could potentially exceed it in 2019. A farm support program can violate WTO commitments in two principal ways: first, by exceeding spending limits on certain market-distorting programs, and second, by generating distortions that spill over into the international marketplace and cause significant adverse effects. Program outlays are cumulative, and compliance with WTO commitments is based on annual aggregate spending levels. Under the WTO's AoA, total U.S. amber box outlays (that is, those outlays deemed market distorting) are limited to $19.1 billion annually, subject to de minimis exemptions. De minimis exemptions are spending that is sufficiently small (less than 5% of the value of production)ârelative to either the value of a specific product or total productionâto be deemed benign. Since 1995, the United States has apparently stayed within its amber box limits. However, U.S. compliance has hinged on judicious use of the de minimis exemptions in a number of years to exclude certain amber box spending from counting against the amber box limit. These exemptions have never been challenged by another WTO member. According to CRS analysis, projected U.S. amber box spending for 2018 (inclusive of $8.7 billion in product-specific outlays under the 2018 trade assistance package) could exceed $14 billion. This would be the largest U.S. amber box notification since 2001. However, despite its magnitude, it still would fit within the U.S. spending limit of $19.1 billion. A more ambiguous result is projected for 2019. The expansion of direct payments under a second trade assistance package to $14.5 billion in 2019 and their shift to a non-product-specific WTO classificationâwhen combined with currently projected spending under other non-product-specific programs such as the Price Loss Coverage (PLC) and Agricultural Risk Coverage (ARC) programsâcould push U.S. amber box outlays above $24 billion. This would be in excess of the U.S. amber box spending limit of $19.1 billion. However, this projection hinges on several as-yet-unknown factors, including market prices, output values, and program outlays under traditional countercyclical ARC and PLC programs. If the final price and revenue values are higher than currently projected, then program payments under ARC and PLC could be smaller than those used in this analysis. This could decrease both aggregate non-product-specific outlays and the possibility of exceeding the amber box spending limit. If cumulative payments in any year were to exceed the agreed-upon spending limit, then the United States would be in violation of its commitments and could be vulnerable to a challenge under the WTO's dispute settlement mechanism. Furthermore, to the extent that such program outlays might induce surplus production and depress market prices, they could also result in potential challenges under the WTO.", "document_type": "crs"}
{"report": "The Saltonstall-Kennedy (S-K) Act of 1954 (15 U.S.C. Â§713c-3) established a fund (known as the S-K fund) to support U.S. fisheries development and research. Funding originates from a transfer by the Secretary of Agriculture into the Promote and Develop American Fisheries Products and Research Pertaining to American Fisheries Fund (P&D account). The P&D account is administered by the National Marine Fisheries Service (NMFS) of the National Oceanic and Atmospheric Administration (NOAA) in the Department of Commerce. Transfers of revenue into the P&D account have grown steadily from $26.7 million in 1980 to $182.8 million in 2020. Currently, the bulk of P&D account revenue is transferred into the Operations, Research, and Faculties (ORF) account, which supports fisheries science and management administered by NMFS. The remaining funds support the Saltonstall-Kennedy Grant Program (S-K Grant Program) and sometimes the National Program, which focus on fishing industry research and development projects. Historically, the use of the S-K fund has evolved with changing fisheries management institutions and changing needs of U.S. fisheries. Congress is continuing to consider whether current funding from the P&D account meets the needs of U.S. fisheries and the U.S. fishing industry. Some have questioned whether the U.S. commercial fishing industry receives sufficient opportunities to provide input into the S-K competitive grant process. Due in part to what they perceive as a lack of industry input, some critics assert that NMFS has not distributed funding in accordance with the primary purposes of the S-K Act, such as supporting projects related to the marketing of fish. Another concern is the allocation of funds, and specifically whether there is a need for more financial support of S-K competitive grants than for funding NMFS fisheries science and management activities in the ORF account. However, if funding were reallocated to provide greater support of the S-K Grant Program, Congress may need to consider implications of the likely decrease in funds that would be transferred to ORF from the P&D account to support NMFS fishery research and management activities. Figure 1 summarizes the flow of funding from the P&D account into NOAA and the S-K program. The S-K Act requires the Secretary of Agriculture to transfer 30% of duties on marine products collected under the so-called Section 32 Program to the Secretary of Commerce. These funds are transferred into the P&D account and made available to NMFS. Currently, the uses of S-K funds as specified in 15 U.S.C. 713c-3 include the following: providing grants in support of fisheries research and development projects under subsection (c), implementing a national fisheries research and development program under subsection (d), implementing the Northwest Atlantic Ocean Fisheries Reinvestment Program, and funding the federal share of a fisheries capacity reduction fund. The S-K Act requires the Secretary of Commerce to use no less than 60% of funds to make direct industry-assistance grants pursuant to subsection (c). Subsection (c) refers to topics that may be addressed by research and development grants, including but not limited to harvesting, processing, marketing, and associated infrastructures. Subsection (c) also identifies the terms and conditions of grant awards. The S-K Act requires the balance of S-K funds to be allocated to finance NMFS activities that support development of U.S. fisheries pursuant to subsection (d). Subsection (d) refers to a national fisheries research and development program (including but not limited to harvesting, processing, marketing, and associated infrastructures), if not adequately covered by projects assisted under subsection (c) of this section or as the Secretary deems appropriate. In 1935, Congress passed legislation to provide financial support for domestic agricultural commodity markets. Section 32 of the Act of August 24, 1935, provided a permanent appropriation equal to 30% of gross receipts from all duties collected under customs laws. The act authorized the Secretary of Agriculture to use these funds to support exports and domestic consumption of agricultural commodities. The Act of August 11, 1939, authorized the Secretary of Agriculture to transfer up to $1.5 million from funds collected under Section 32 to support the fishing industry. Funds were transferred to the Federal Surplus Commodities Corporation to purchase and distribute surplus fishery products and to the Secretary of the Interior to promote markets for fishery products of domestic origin. Table 1 provides a history of legislative changes to the S-K Act. In 1954, the S-K Act amended the Act of August 11, 1939, to provide additional funding from Section 32 funds to support the U.S. fishing industry. The S-K Act authorized the transfer from the Secretary of Agriculture to the Secretary of the Interior, from the larger Section 32 account's funding, an amount equal to 30% of gross receipts from duties collected on fishery products. These funds were maintained in a separate account for use by the Secretary of the Interior to support the flow of fishery products in commerce, develop and increase markets for fishery products, and conduct research. Annual expenditures from the fund were limited to $3 million, and the balance of the fund was not allowed to exceed $5 million at the end of any year. In 1956, the S-K Act was amended to remove the limit on annual expenditures from the fund. The S-K Act also authorized the Secretary of the Interior to appoint a fishing industry advisory committee to provide guidance on the formulation of policy, rules, and regulations pertaining to requests for assistance, and other matters. In 1976, the Fishery Conservation and Management Act (FCMA; P.L. 94-265 ) established a 200-nautical mile fishery conservation zone (FCZ) and brought marine fisheries within the FCZ under domestic control. Foreign fishing was allowed to continue in the FCZ, but the domestic fishing industry was granted priority fishing rights under the FCMA. In the following years, U.S. policy emphasized development of domestic fisheries and replacement of foreign fishing with domestic fishing in the FCZ. According to the Government Accountability Office, until 1979, NMFS used nearly all S-K funds to support fisheries management and development activities; it granted only small amounts to the fishing industry for development projects. In 1979, likely because of growing industry support of domestic fisheries development, NMFS made available approximately $5.3 million of S-K funds to regional fisheries development foundations, universities, private industry, and state and local governments. In 1980, Congress formally authorized the current competitive S-K Grant Program in Section 210 of the American Fisheries Promotion Act (AFPA; P.L. 96-561 ). The AFPA directed the Secretary of Commerce to use at least 50% of S-K funds for the S-K Grant Program and the balance of funds for a National Program. Both programs supported research and development efforts to address areas such as harvesting, processing, marketing, and related infrastructures. By 1980, the transfer from the U.S. Department of Agriculture (USDA) had grown to $26.7 million ( Table A-1 ). The AFPA also formally transferred responsibility for administering the fund from the Secretary of the Interior to the Secretary of Commerce. The House committee report accompanying the AFPA noted that the definition of fishery includes recreational fishing and that recreational projects would be eligible for grants. The AFPA also removed a section that established the S-K fishing industry advisory committee; the advisory committee had been previously terminated pursuant to the Federal Advisory Committee Act (P.L. 92-463). In subsequent years, Congress made additional changes to the allocation and use of the S-K fund ( Table 1 ). The Highway Improvement Act of 1982 ( P.L. 97-424 ) increased the share of funds used for the competitive grant program from 50% to 60%. In the following years, potential uses of the fund were broadened to include the Fisheries Promotion Fund ( P.L. 99-659 ), the Northwest Atlantic Ocean Fisheries Reinvestment Fund ( P.L. 102-567 ), and the federal share of a fishing capacity reduction program ( P.L. 104-297 ). Congress established the Fisheries Promotion Fund to support domestic and international markets for domestically produced seafood. A portion of S-K funds was transferred to the fund from FY1987 to FY1991 for this purpose ( Table A-1 ). The revenues that are transferred into the P&D account from USDA are derived from duties on fishery products, \"including fish, shellfish, mollusks, crustaceans, aquatic plants and animals, and any products thereof, including processed and manufactured products.\" The P&D account is a mandatory fund that requires no periodic reauthorization or appropriation. Transfers from USDA to NOAA's P&D account have steadily increased from $26.7 million in 1980 to $182.8 million in 2020 ( Figure 2 ). In CY2017, approximately 77% of revenues were from duties collected on imports of nonedible marine products, including jewelry, ink, various chemicals, and skins. The remaining 23% of revenues were from duties on imports of edible seafood products. Tariffs on edible fish products have been reduced or eliminated for many seafood products, and most remaining duties are collected on canned products such as tuna or processed products such as fish sticks. In CY2017, most duties were collected on imports from India ($89.9 million), China ($86.2 million), Thailand ($79.8 million), Italy ($53.2 million), and France ($36.2 million). Congress has allocated a growing portion of revenue in the P&D account to the ORF account rather than funding the S-K Grant Program as prescribed by the S-K Act. The transfer to the ORF account has ranged from $5 million, or 29% of the P&D account in 1979, to over $130 million in the five most recent years (FY2016-FY2020), which is more than 90% of the annual transfer into the P&D account ( Table 2 ). ORF funds are used \"to support fisheries research and management activities including the analysis and decision-making that supports ecosystem approaches to management.\" Often the allocation of most funds to the OFR account limits the funding that is available for the specified purposes of the S-K Act. In the last three fiscal years (FY2018-FY2020), the NOAA budget request proposed that all P&D account funding be transferred to the ORF account in support of NMFS activities. However, the Consolidated and Further Continuing Appropriations Act, 2013 ( P.L. 113-6 ), restricted the use of P&D funds that are transferred into the ORF account. It limited this funding to fisheries activities related to cooperative research, annual stock assessments, survey and monitoring projects, interjurisdictional fisheries grants, and fish information networks. In subsequent years, agency budget requests have reflected this intent by identifying similar areas, and Congress has continued to include similar language in appropriations laws and accompanying Senate committee reports. In most years, the majority of the funds that remain in the P&D account after the transfer into the ORF account have been used for the competitive S-K Grant Program as described in subsection (c) of the S-K Act and the National Program as described in subsection (d) ( Table 2 ). The amount of remaining funding for the S-K Grant Program has varied considerably from year to year, ranging from no funding in FY2011 and FY2012, when Congress did not leave any remaining funding for S-K program, to its highest level of $29.5 million in FY2009 ( Table 2 ). The S-K Act directs the Secretary of Commerce to use no less than 60% of funds for fisheries research and development grants pursuant to subsection (c). The Secretary also is required to use the remaining funds to finance NMFS activities directly related to U.S. fisheries development, as outlined in subsection (d). Since 1982, S-K grant funding has been less than 30% of total transfers from USDA, and it has been significantly lower in most years. In many years, Congress did not fund the National Program or provided a small portion of the remaining funds for that purpose. Historically, financial support also was provided for the Fisheries Promotion Fund, which was funded between $750,000 and $3 million from FY1987 to FY1990. ( Table A-1 ). No funding has been provided for the Fisheries Promotion Fund since 1991. From FY2003 to FY2006, most funding remaining after the ORF transfer was used for congressionally directed projects that supported several regional seafood marketing initiatives ( Table A-1 ). Annual S-K reports and other sources indicate that S-K funds have not been used for either the Northwest Atlantic Ocean Fisheries Reinvestment fund or the fishing capacity reduction program. According to NMFS, the S-K program's general goals are to fund projects that address the needs of fishing communities, optimize economic benefits by building and maintaining sustainable fisheries, and increase other opportunities to keep working waterfronts viable. Historically, examples of areas funded by the S-K Grant Program have included enhancing markets for fishery products, examining fishery management options, and developing more efficient and selective fishing gear. Projects often have focused on both state and federal marine commercial fisheries, but other sectorsâsuch as aquaculture and recreational fishingâalso have been eligible for and received support. NMFS solicits proposals as a federal funding opportunity on the federal grants website, which includes funding priorities, application requirements, and proposal evaluation criteria. Funding priorities are developed in coordination with regional fishery management councils, interstate fishery commissions, NMFS science centers, and NMFS regional offices. For example in 2020, S-K program priorities are seafood promotion, development, and marketing, and science or technology that promotes sustainable U.S. seafood production and harvesting. The review process includes (1) pre-proposal review, (2) technical review and ranking, (3) panel review and ranking, and (4) grant selection. Pre-proposals undergo an administrative review by NOAA staff, a review by subject matter experts, and S-K program evaluation. Full review includes administrative screening; technical review by federal, public, and private sector experts; and funding recommendations by program and NMFS leadership. NMFS also may solicit comments and evaluation from a constituent review panel composed of three or more representatives chosen by the NMFS assistant administrator of fisheries. Funding of proposals is recommended by the S-K program manager; constituent panel ranking (if applicable); and input from NMFS regional directors, science center directors, and office directors. The agency selecting official, the NMFS assistant administrator, determines which proposals will be funded. The decision is based on the order of the proposals' ranking and other considerations, such as availability of funding, balance and distribution of funds, and duplication. Recently, NMFS has been considering whether the program and fishing industry would benefit from placing greater emphasis on monitoring approved projects and disseminating results. During 2019, feedback sessions were arranged with regional fishery management councils to solicit constituents' views on how to improve the dissemination and use of results from funded projects. Some fishing industry representatives have questioned whether the U.S. commercial fishing industry and fishing communities could benefit from greater direct support from S-K funding. Two of the main concerns have been whether the competitive grant process should include greater fishing industry input and whether a greater portion of P&D funds should be allocated to the annual S-K Grant Program. Some assert that NMFS decides by its own criteria which programs receive grants and that in some cases the fishing industry's priorities do not match those of NMFS. They contend that broader, more direct fishing industry participation is needed to inform the process of identifying the needs and priorities of grant funding. Another concern has been whether a greater portion of P&D funding should be allocated to the S-K Grant Program. Some contend that Congress, as reflected in statute, intended to provide at least 60% of funds to the S-K Grant Program and remaining funding to the National Program for fishing industry research and development. However, shifting significant funding from current NMFS activities may prompt questions about whether additional discretionary funding would be forthcoming to support other NMFS functions, such as data collection and fish population assessments. Several bills were introduced during the 112 th , 113 th , and 114 th Congresses that would have significantly changed the allocation of P&D funding. Similar versions of the Fisheries Investment and Regulatory Relief Act in each of these Congresses would have allocated funding to fisheries management regions and would have established a regional fisheries grant program. Under these bills, each regional fishery management council would have established a fishery investment committee, which would focus resources on strengthening regional fisheries management. Each fishery investment committee would have developed a regional fishery investment plan; reviewed grant applications and projects to implement regional fishery investment plans; and made recommendations on grant applications. The regional fishery investment plans would have identified research, conservation, and management needs, as well as corresponding actions to rebuild and maintain fish populations and associated fisheries. Each regional investment plan would have been required to include topics related to supporting stock surveys, stock assessments, and cooperative fishery research; improving the collection and accuracy of recreational and commercial data; analyzing social and economic impacts of fishery management decisions; providing financial assistance and investment for fishermen and fishing communities; developing methods or technologies to improve the quality and value of landings; researching and developing conservation engineering technologies; and restoring and protecting fish habitat. Investment plans would have been reviewed by the Secretary of Commerce to ensure consistency with the Magnuson-Stevens Fishery Conservation and Management Act (16 U.S.C. Â§Â§1801 et seq.). Limited funding also would have been provided for administrative costs of the grant program and for the development and implementation of investment plans. Under these versions of the Fisheries Investment and Regulatory Relief Act, the Secretary of Commerce also would have established a regional fisheries grant program to provide funds to advance the regional priorities identified in the regional fishery investment plans. The Secretary would have awarded grants only to projects that would implement regional fishery investment plans and to projects recommended by respective regional fishery investment committees and approved by each regional fishery management council. The Secretary would have been required to allocate 70% of funds from the P&D account to the eight council regions. Half of this funding would have been allocated equally among the councils, and half would have been distributed according to the combined economic impact of recreational and commercial fisheries in each region. The Secretary also would have been required to allocate 20% of funds for a national fisheries investment program that would support rebuilding and maintaining fish populations and promote sustainable fisheries. Funding would have been divided equally among five general areas: (1) regional fisheries commissions; (2) seafood promotion; (3) fisheries management; (4) fisheries disasters; and (5) other needs, including highly migratory species and international fisheries. Each of the bills would have limited the transfer of ORF funding from the P&D account to 10% of receipts. The legislation also included a provision to provide funding to review regulations and procedures used to implement management under the Magnuson-Stevens Fishery Conservation and Management Act and to make recommendations to streamline regulations and incorporate new information into the management process. In the 114 th Congress, a section of the Magnuson-Stevens Fishery Conservation and Management Reauthorization Act of 2014 ( S. 2991 ) would have attempted to stop the transfer of P&D funds to the ORF account. According to Section 205 of S. 2991 , it would not be in order in the Senate or in the House of Representatives to consider any bill, resolution, amendment, or conference report that would reduce any amount in the fund (P&D account). This change in the Senate and House rules would have allowed any Senator or Representative to stop the transfer of P&D funds to the ORF discretionary account by making a point of order that a rule is being violated. No further action was taken following the introduction of S. 2991 . In the 116 th Congress, identical versions of the American Fisheries Advisory Committee Act ( S. 494 and H.R. 1218 ) were reported or ordered reported from the committees of jurisdiction in the Senate and the House. The bills would establish an American fisheries advisory committee and would change the process for awarding S-K competitive grants. The committee would identify the needs of the seafood industry; develop requests for proposals; review grant applications; and select grant applications for approval. Currently, NMFS is responsible for these functions, and NMFS considers industry input during the selection process. Both bills also would expand the specified purposes of fisheries research and development projects by explicitly including projects that focus on fisheries science and recreational fishing. The committee would be composed of representatives from six geographic regions of the United States. The Secretary of Commerce would appoint three members from each region, including (1) an individual with experience as a seafood harvester or processor, (2) an individual with experience in recreational or commercial fishing or growing seafood, and (3) an individual who represents the fisheries science community or the relevant regional fishery management council. The Secretary also would appoint four at-large members, including (1) an individual who has experience in food distribution, marketing, retail, or service; (2) an individual with experience in the recreational fishing industry supply chain; (3) an individual with experience in the commercial fishing industry supply chain; and (4) an individual who is an employee of NMFS with expertise in fisheries research. The committee members would meet twice annually, and meetings would rotate among the six regions. The Secretary of Commerce would identify three or more experts to undertake technical review of grant applications, which would occur prior to committee review. The Secretary also would be required to develop guidance related to technical review, including criteria for elimination of applications that fail to meet a minimum level of technical merit. A grant would not be approved unless the Secretary was satisfied with the applicant's technical and financial capability. Based on the committee's recommendations, the Secretary would evaluate the proposed project according to listed criteria and other criteria the Secretary may require. If the Secretary fails to provide funds to a grant selected by the committee, the Secretary would be required to send a written document to the committee justifying the decision. ", "summary": "The Saltonstall-Kennedy (S-K) Act of 1954 (15 U.S.C. Â§713c-3) established a program to provide financial support for research and development of commercial fisheries. The S-K Act created a fund (known as the S-K fund) that is financed by a permanent appropriation of a portion of import duties on marine products. S-K funds are distributed by the Secretary of Commerce as grants and cooperative agreements to address needs of the U.S. fishing industry, including but not limited to harvesting, processing, marketing, and associated infrastructure. However, Congress allocates most funding to the National Marine Fisheries Service (NMFS) to fund agency activities related to marine fisheries research and management. Some have questioned whether the allocation of S-K funds reflects the original intent of the S-K Act and whether the S-K Grant Program addresses the needs and priorities of the fishing industry. Since its creation, the S-K fund's authorizing language and priorities have evolved with changes to the fishing industry, new or amended federal laws governing fisheries management, and changing federal agency responsibilities. In 1980, the American Fisheries Promotion Act (AFPA) amended the S-K Act to authorize a competitive grant program, known as the Saltonstall-Kennedy Grant Program (S-K Grant Program) and the National Program to support fishing industry research and development projects. Both programs are administered by NMFS, part of the National Oceanic and Atmospheric Administration (NOAA). In the 1980s, the S-K Grant Program focused on fisheries development, but in subsequent years, as U.S. fisheries became fully or overexploited, priorities generally shifted to resource conservation and management. The S-K Grant Program has supported a variety of different projects, such as gear technology research, seafood marketing, aquaculture, and others. The S-K Grant Program is funded by a permanent appropriation of 30% of the previous calendar year's customs receipts from imports of fish and fish products. These funds are transferred into NOAA's Promote and Develop American Fisheries Products and Research Pertaining to American Fisheries Fund (P&D account). Transfers of revenue into the P&D account have grown steadily from $26.7 million in 1980 to $182.8 million in 2020. Congress subsequently transfers most funds into the Operations, Research, and Facilities (ORF) account within NOAA. Congress has directed NMFS to use funds allocated to the ORF account for specific activities including stock assessments, fishing information networks, survey and monitoring projects, cooperative research, and interjurisdictional fisheries. The remaining funds are available for supporting the annual competitive S-K Grant Program and in some cases the National Program. Since the early 1980s, Congress has transferred most P&D account funds into the ORF discretionary account, sometimes leaving little or no funding for the specified purposes of the S-K Act. Some critics have questioned whether funds from the P&D account could be used more effectively by targeting fishing industry needs, as Congress originally intended. For example, in the 112 th , 113 th , and 114 th Congresses, bills were introduced that would have used most S-K funds to establish a regional fisheries grant program. By contrast, some have expressed concerns that if significant funding is shifted away from NMFS fisheries management programs, additional funds would need to be appropriated or activities such as data collection and fish population assessments could be compromised. These NMFS activities provide information and analyses used to manage and conserve fish populations. Some also have questioned whether the S-K Grant Program could be modified to provide the fishing industry with more direct input into the S-K grant process. Currently, NMFS, in consultation with the fishing industry, identifies S-K Grant Program priorities and selects the recipients of S-K grants. Over the last several Congresses, bills have been introduced that would change the procedure for screening, evaluating, and awarding S-K grants. In the 116 th Congress, the American Fisheries Advisory Committee Act ( H.R. 1218 and S. 494 ) would establish an industry advisory committee to identify the needs of the fishing industry, develop requests for proposals, review grant applications, and select grant applications for approval. S. 494 was reported on August 16, 2019, by the Senate Committee on Commerce, Science, and Transportation; on September 18, 2019, H.R. 1218 was ordered to be reported by the House Committee on Natural Resources.", "document_type": "crs"}
{"report": "Since the 1960s, Congress has passed measures to authorize and fund international family planning related activities that give partici pants access to a broad range of contraceptive methods and services. Such assistance is intended to support broader U.S. international development priorities, as stated in Section 104 of the Foreign Assistance Act of 1961, as amended (P.L. 87-195): The Congress recognizes that poor health conditions and uncontrolled population growth can vitiate otherwise successful development efforts. Large families in developing countries are the result of complex social and economic factors which change relatively slowly among the poor majority least affected by economic progress, as well as the result of a lack of effective birth control. Therefore, effective family planning depends upon economic and social change as well as the delivery of services and is often a matter of political and religious sensitivity. While every country has the right to determine its own policies with respect to population growth, voluntary population planning programs can make a substantial contribution to economic development, higher living standards, and improved health and nutrition. Section 104 goes on to authorize U.S. assistance to address the impact of population growth on development through family planning activities: In order to increase the opportunities and motivation for family planning and to reduce the rate of population growth, the President is authorized to furnish assistance, on such terms and conditions as he may determine, for voluntary population planning. In addition to the provision of family planning information and services, including also information and services which relate to and support natural family planning methods, and the conduct of directly relevant demographic research, population planning programs shall emphasize motivation for small families. According to the U.S. Agency for International Development (USAID), the primary federal agency charged with administering development assistance, family planning refers to \"services, policies, information, attitudes, practices, and commodities, including contraceptives, that give women, men, couples, and adolescents the ability to avoid unintended pregnancy and choose whether and/or when to have a child.\" Over time, family planning programs evolved beyond a strict focus on contraception to provide information and services on a wide range of issues that adversely affect sexual and reproductive health (e.g., female genital mutilation and cutting (FGM/C), obstetric fistula, and gender based violence (GBV)). This broader scope is reflected in the common categorization of these activities as reproductive health/family planning (RH/FP) assistance. Reproductive health refers to \"all matters relating to the reproductive processes, functions, and system at all stages of life.\" The United States is the largest country donor to international FP/RH programs, providing $575 million dollars annually in recent years. Although U.S. funding for FP/RH activities has been consistent for years, the programs remain a subject of intense congressional debate. While the law explicitly prohibits the use of funds to provide abortion or involuntary sterilization, some Members of Congress continue to express concern that FP/RH may indirectly support such activities as a result of funding fungibility. Other concerns relate to the cultural appropriateness of family planning activities and the relationship between FP/RH and broader global health and development assistance. This report focuses on the scope and intended impact of U.S. bilateral international family planning programs administered by USAID. It does not comprehensively address related legislative restrictions (although a table listing such restrictions is provided in the Appendix), or discuss aid channeled through multilateral organizations, such as the U.N. Population Fund (UNFPA). International FP/RH programs aim to provide women with the information and services needed to make informed decisions regarding their contraceptive options and to ensure healthy reproductive systems and safe pregnancies. According to USAID, a key aspect of these programs is family planning, as some 885 million women worldwide would like to avoid or delay pregnancy. Of those women, 212.4 million (24%) lack access to FP/RH services. Supporters of FP/RH programs assert that access to such services is necessary for safe motherhood. They cite evidence that bearing children too close together, too early, or too late in life can threaten the health of the mother and her baby. In addition, lack of access to family planning services can have negative social and economic impacts that undermine broader global development goals. For example, some experts note that improving access to family planning services has been shown to have benefits for children's health, women's empowerment, and sustainable growth and development. Critics of international family planning programming have expressed concern that despite existing restrictions, U.S. dollars could be used indirectly to support abortion or involuntary sterilization if implementing partners use U.S. funds for approved services, freeing up funding from other sources to support abortion or involuntary sterilization. Other detractors argue that U.S. foreign assistance for contraceptive provision is an inappropriate imposition on local cultural or religious norms, further asserting that abstinence education is a more effective form of family planning. Critics have also questioned the practice of allocating specific resources for FP/RH programs rather than allocating aid to broader women's health programs or for other development priorities that they argue would be a more effective use of U.S. funds. Since U.S. bilateral FP/RH programs and policies were launched in 1965, they have evolved to reflect changes in global health priorities and emphasize the link between development and gender. The Foreign Assistance Act of 1961 (P.L. 87-195; as amended) first authorized research on family planning issues, among many other things, and in 1965 Congress authorized USAID to create contraceptive distribution programs through the Office of Population. Initial programs focused on procuring contraceptive supplies for distribution in developing countries. At the time, the rationale for these programs was that high birth rates \"significantly increase the cost and difficulty of achieving basic development objectives by imposing burdens on economies presently unable to provide sufficient goods and services for the growing population.\" From the 1970s through the 1990s, USAID expanded international family planning assistance to include programs on fertility, reproductive and women's health, and maternal and child health, ultimately reorganizing the program into an Office of Population and Reproductive Health (PRH). The expansion of activities reflected changing attitudes and development strategies. Concerns about managing population growth were largely supplanted by a focus on advancing women's status and enhancing their individual health and empowerment. USAID family planning activities continued to utilize a multipronged approach, entailing the provision of contraception while also addressing broader reproductive health concerns. USAID's FP/RH programs are administered through the Office of Population and Reproductive Health (PRH) within the agency's Global Health Bureau. PRH is responsible for setting technical and programmatic direction, providing technical leadership, and supporting field programming. USAID distributes FP/RH commodities (such as contraceptives) and related services primarily through contracts and grant agreements with nongovernmental organizations. The agency's technical and administrative staff oversee and monitor the work of implementing partners. USAID FP/RH programming is organized around six priorities: 1. Supporting healthy timing and spacing of pregnancy. 2. Advancing community-based delivery of FP/RH services, such as deploying front-line community health workers to disseminate commodities and information, and to arrange referrals. 3. Ensuring adequate supplies of contraceptives. 4. Providing non-coerced access to surgical sterilization and long-acting reversible contraceptives (LARCS), such as intrauterine devices and contraceptive implants. 5. Integrating FP/RH and HIV/AIDS programs to ensure that HIV-positive men and women have access to family planning information and services, for disease prevention and to prevent mother-to-child transmission of the virus. 6. Integrating FP/RH and maternal and child health (MCH) programs, specifically during the postpartum period, when there is considerable demand from new mothers for contraception to ensure pregnancy spacing. In addition to these priorities, USAID FP/RH programs may also focus on related policy areas, such as efforts to end child marriage, female genital mutilation and cutting, and gender-based violence; and related health goals, including the prevention of fistula. USAID works with implementing partners to fund programs and provide technical assistance for the following family planning and reproductive health programs and activities: D elivery of FP/RH services . Examples include providing women with counseling to promote awareness of available contraceptives or other methods of birth control, or procedures at health facilities to insert Intrauterine Devices (IUDs) or other forms of Long Acting Reversible Contraceptives (LARCs). Contraceptive supply and logistics âimplementation and management of supply chains for contraceptives, including condoms. In FY2018, for example, USAID donated 28 million male condoms to developing countries through the agency's implementing partners. Biomedical and social science research âthe study of biomedical and social science evidence to identify best practices in programming and implementing family planning services. For example, USAID created Demographic and Health Surveys (DHS) and partnered with national governments and implementing partners to use the tool for conducting household- and facility-based surveys on health attitudes and behaviors in Africa, Asia, Latin America, the Caribbean, and Eastern Europe. In addition, USAID provides direct technical assistance to foreign ministries of health and other partners, focusing on the following areas: Performance and quality improvement âthe use of data to improve both access to FP/RH services and their quality. For example, data from USAID-supported surveys are used to analyze women's use of family planning methods (e.g., effectiveness of contraceptive method, provider attitudes towards patients, or provider-patient interactions). Health communication âthe use of mass media, community-level, and interpersonal communication strategies to expand knowledge of contraception, healthy approaches to birth spacing, and sex education, as well as awareness and prevention of GBV, forced early and child marriage (FECM), and FGM/C. For example, USAID supports community health promoters and behavior change campaigns, to educate women and their families on a variety of issues such as access to reproductive health services, the importance of maternal and neonatal health provider check-ups, and the health and psychosocial risks of FGM/C to women and girls. Policy analysis and planning âsupport for the development, implementation, and monitoring of policies and laws that affect FP/RH policies and programs, and women's health outcomes. For example, USAID supported a research project in Kenya which analyzed the country's evolving health policies (e.g., the National Population Policy for National Development and the Adolescent Reproductive Health and Development Policy) and contraceptive distribution programs, to evaluate impact on Kenya's total fertility rate and contraceptive prevalence rate. Monitoring and evaluation (M&E) âthe evaluation of programs to understand the content, quantity, and potential effects of services being provided with U.S. government assistance. Integration of FP/RH and MCH activities â According to USAID, access to family planning services can prevent 30% of maternal deaths (or approximately 90,000 deaths annually). USAID implementing partners often provide integrated FP/RH and MCH services, where appropriate. Many experts recognize MCH programs as a natural entry point for promoting awareness of and access to family planning services, as in the post-natal period evidence suggests that women have an increased desire to plan or prevent future pregnancies. For example, a mother bringing her child to a routine vaccination appointment might also be able to receive maternal health services and counseling on contraceptive options. Fourteen USAID-supported countries highlight integration of FP/RH and MCH as an approach to community health service delivery in their national government policies. However, USAID MCH programs are funded separately from FP/RH programs, as there are also FP/RH programs that focus on issues outside the realm of MCH (e.g., programs addressing adolescent sexual and reproductive health, prevention of FECM, GBV, FGM/C and obstetric fistula). In India, for example, USAID FP/RH funds supported programs to provide counseling and referral of GBV survivors to service providers, such as psychosocial counselors. In 2018, USAID supported bilateral family planning and reproductive health aid programs in more than 40 countries, including 24 \"priority\" countries, which are the focus of FP/RH programs and technical assistance and receive the majority of FP/RH funding. Most of these priority countries (23 of 24) are also categorized as MCH priority countries by USAID. To determine priority status, USAID evaluates which countries have the highest need, based on the magnitude and severity of their neonatal and maternal death rates; demonstrated national commitment to achieving sustainable and efficient program outcomes; and the greatest potential to leverage U.S. government support. USAID FP/RH priority countries are largely in Africa ( Figure 1 ). Compared with other developing nations and regions, Africa has the highest concentration of countries with low rates of modern contraceptive use and highest maternal mortality rates ( Table B-1 ). In 2018, the top three recipients of U.S. FP/RH assistance were Nigeria ($37 million), Uganda ($29 million), and Tanzania ($28 million). In 2018, USAID provided $2 million or less (per country) annually to support FP/RH programs in an additional 18 countries that were assessed to have a need for family planning services (e.g., Benin), and/or a strategic foreign policy interest to the United States (see Table B-2 ). For example, despite relatively low fertility and maternal death rates, Ukraine receives USAID FP/RH funds as part of a multifaceted approach to supporting Ukraine as a free and democratic state \"in the face of continued Russian aggression.\" USAID formalized a country graduation process for FP/RH assistance in 2006, to transition countries off of U.S. foreign assistance for FP/RH programs and prioritize countries when allocating funding. The graduation strategy also aligns with the agency's \"Journey to Self-Reliance,\" a policy framework established in 2018 to strengthen the ability of partner countries to support their own development agendas. Countries receiving family planning assistance may \"graduate\" once they have met certain criteria and a country program has achieved its stated goals. According to USAID, a country is eligible for graduation once it reaches a modern contraceptive prevalence rate of at least 51%; and reaches a level of fertility at or below 3.1 children per woman. USAID also considers additional issues when evaluating a country's readiness for graduation. Countries who reach both criteria but lack the capacity to implement family planning programs or face other constraints may continue to receive assistance (e.g., India). USAID may also evaluate whether governments are allocating sufficient public funds for contraception procurement and whether their Ministries of Health demonstrate adequate capacity to manage the associated logistics and supply chain processes. Additional indicators considered for graduation include at least 80% of the population can access at least three methods of FP; no more than 20% of FP products, services and programs offered in the public and private sectors are subsidized by USAID; and major service providers in all sectors (public, non-governmental, commercial) can meet and maintain standards of informed choice and quality of care. To date, USAID 25 countries have graduated, half of which are in Latin America and the Caribbean ( Table B-4 ). For example, Brazil graduated in 2000, after the government, non-governmental organizations, and the private sector invested substantially in family planning assistance, and as the country's Gross Domestic Product (GDP) increased. USAID partners worked to build capacity in Brazil's civil sector and Ministry of Health programs, by focusing on outreach, education, and improved access to care. According to USAID, \"the program worked with the government to reduce Brazil's legal obstacles and tariff barriers to the importation of medical equipment, foam, jellies, and oral contraceptives, as well as quality intrauterine devices and condoms not manufactured in Brazil.\" Perhaps reflecting these efforts, Brazil's contraceptive prevalence rate increased from 34% in 1970, to 72% in 2000. Other countries who were graduated (e.g., Mexico), demonstrated similar characteristics. Once a country graduates, PRH evaluates where U.S. resources can best be reallocated based on need. In 2011, for example, USAID formed the Ouagadougou Partnership (named for the capital of Burkina Faso) with funding reallocated from graduated Latin American countries. This partnershipâwhich also involves the government of France, the Bill and Melinda Gates Foundation, and the Hewlett Foundationâseeks to improve access to family planning services in francophone West Africa. ( Table B-3 ). Bilateral FP/RH assistance is funded through a variety of accounts in annual Department of State, Foreign Operations, and Related Programs (SFOPS) appropriations measures. The Global Health Programs (GHP) account is the funding channel for more than 90% of bilateral FP/RH aid while smaller amounts of bilateral FP/RH assistance are generally made available through other accounts. Department of State Economic Support Fund (ESF) monies are provided to select countries considered by the State Department to be politically and strategically important. In recent years, Pakistan, Afghanistan, and Jordan have received ESF funds for FP/RH activities. In FY2017, for example, Afghanistan, which is a USAID FP/RH priority country, received $20 million in bilateral family planning assistance, all of which was provided through the ESF. Over the past decade, enacted funding levels for bilateral international FP/RH aid have remained fairly consistent ( Figure 2 ). Although congressionally enacted funding has been constant since 2011, the absence of foreign assistance authorization legislation in recent decades has made annual consideration of foreign aid appropriations the primary venue for debating international family planning and reproductive health policy. Controversies that are frequently debated as part of the appropriations process include codification of the Mexico City Policy/Protecting Life in Global Health Assistance (MCP/PLGLHA), which is currently imposed through Executive Order (see \"Selected Issues for Congress\"); the effect that withholding U.S. dollars as a result of such restrictions could have on access to voluntary family planning and other health services in developing countries; and whether or not designating funding for contraceptive provision and family planning is the best approach to allocating global health funds. Members of Congress hold varied perspectives on these issues. Some Members have supported expanding access to FP/RH services, while others aim to increase restrictions on such services or reduce funding levels. in addition to these perennial concerns, debate in the 116 th Congress regarding FP/RH programs has addressed issues such as the role of faith-based contractors in USAID FP/RH programs, bias and discrimination against potential aid recipients, and language around sexual and reproductive health. In recent years, controversy has also arisen over how FP/RH services are described in government documents, though it remains unclear whether language changes have had any impact on actual service provision. When considering U.S. support for international family planning and reproductive health efforts, the 116 th Congress may focus on three key areas: restrictions under the MCP/PLGHA, funding levels in appropriations bills, and program reforms proposed in pending legislation. The Mexico City Policy requires foreign nongovernmental organizations receiving USAID family planning assistance to certify that they will not perform or actively promote abortion as a method of family planning, even if such activities are conducted with non-U.S. funds. Since first applied in the Reagan Administration in 1984, the policy has been repeatedly lifted and reinstated through Executive Order. The policy was maintained by President George H.W. Bush and rescinded by President Clinton in 1993. It was then reinstated by President George W. Bush in 2001, who expanded the policy in 2003. President Obama rescinded the policy upon taking office in January 2009. The Trump Administration reinstated the policy, expanded it to include all U.S. global health assistance, and renamed it Protecting Life in Global Health Assistance (PLGHA). The Trump Administration uses the two policy names interchangeably, though the Mexico City Policy until now only applied to international family planning and reproductive health programs. When discussing the policy under the Trump Administration, this report uses MCP/PLGHA. MCP/PLGHA has never been enacted through legislation, and advocates have long encouraged Congress to codify the policy, making it harder for future Administrations to revoke. Simultaneously, detractors of the policy have called for enactment of legislation that would prevent the current practice of Administrations imposing the policy through Executive Order. Some international FP/RH program advocates suggest there are issues and confusion regarding compliance with the expansion of MCP to include all global health assistance. They assert that the policy has rendered programs cumbersome and ineffective due to administrative and operational burdens associated with ensuring compliance, which divert resources from the health workforce, health information systems, and service delivery. Some field reports indicate that individual providers may not be aware of the restrictions because MCP/PLGHA is \"embedded\" in funding agreements, similar to \"fine print,\" which can create barriers to care during a provider-patient interaction. Advocates of the expanded policy argue that it closes loopholes in the prior policy and does not cause an undue burden, asserting that the government must focus on compliance. In February 2018, the State Department released the findings of a six-month review of MCP/PLGHA. The State Department acknowledged the confusion the policy created, stated that the policy's impact on program effectiveness was minimal, and committed to conduct another review at the end of 2018. As of February 2020, the State Department had not announced plans for a second review. Congress could choose to mandate completion of the second review through legislation or examine the situation through oversight activities. In recent years, congressional debates regarding international FP/RH assistance have centered on where and how such funding should be spent. For FY2020, Congress appropriated $575 million to international family planning programs. Some advocates have argued that global FP/RH funding levels would need to be doubled in order to make family planning and reproductive services accessible to all women who currently want and lack access to them. Proponents say that consistently flat funding is equivalent to FP/RH spending cuts, and this undermines U.S. global development goals on maternal and child health. Advocates note that the U.S. government would need to invest $1.5 billion to meet its appropriate share of the burden for foreign assistance for FP/RH funding, and other donor countries cannot fill the gap. Opponents of the aid have questioned the extent of international demand for family planning services and have suggested that international family planning resources could be better used on other development activities. Further, opponents argue that international family planning services are controversial in some countries due to religious and moral beliefs, which, in their views, raises questions about whether increased donor funding would lead to increased use of contraceptives and reproductive health care services or to better maternal health outcomes. Some observers also question whether the programs have been efficient and cost-effective, given the scale of U.S. spending on bilateral family planning programs, compared to other types of U.S. assistance. While data appears to show positive program impact in some countries, the attribution of results specifically to U.S. programming can be debated given the many factors that influence contraceptive use, including social and economic change and the activities of other international donors. In this context, Congress may consider whether funding levels for bilateral international family planning assistance align with need and potential impact, as well as with U.S. strategic goals and foreign policy objectives. Currently, though some U.S. international FP/RH and MCH programs may be integrated (e.g., both types of health services are provided together), most are not, due in part to separate line item funding in the annual Department of State, Foreign Operations, and Related Programs appropriations measures, separate funding entails separate program administration. Proponents of further program integration want to combine FP/RH and MCH services; they note that integration of these services has been shown to increase women's use of contraception, improve maternal health outcomes, and build health systems capacity. Integration of these funding streams may also provide more flexibility to implementing agencies to prioritize funding across a broader range of programs. On the other hand, eliminating funding directives specific to FP/RH and MCH may also reduce congressional control over how funds are used. Furthermore, opponents note that respect for local cultural norms must be considered; in some contexts, service integration could be detrimental to MCH activities if they are associated with less socially acceptable family planning programs. Aid-recipient countries may also resist integration of these programs when separate government health units administer international FP/RH and MCH services and may fear losing prioritization and resources. Others have also raised concerns that embedding FP/RH programs in MCH services would limit USAID programs to address adolescent sexual and reproductive health, and prevent CEFM, GBV, and obstetric fistula - that are distinct from family planning. Congress may consider whether formally integrating FP/RH and MCH funding streams would be beneficial to program efficacy, or if existing appropriations and implementation mechanisms best further the stated objectives of U.S. international FP/RH and MCH programs. In addition to appropriations legislation, a few proposals specific to international FP/RH are pending in the 116 th Congress: H.R. 661 , the Protecting Life in Global Health Assistance Act of 2019, which would amend the Foreign Assistance Act of 1961 (22 U.S.C. 2351). This legislation was introduced to codify the Trump Administration's expansion of the Mexico City Policy to include all global health assistance. It would \"prohibit U.S. assistance to foreign nonprofits, nongovernmental organizations, or quasi-autonomous organizations that promote or perform abortions, except in cases of rape or incest or where the mother's life is endangered.\" H.R. 1581 , the Reproductive Rights are Human Rights Act of 2019, and S. 707 , the corresponding Senate bill, would amend the Foreign Assistance Act of 1961 (22 U.S.C. 2351) to \"include in its annual reports on human rights in countries receiving U.S. development and security assistance a discussion of the status of reproductive rights in each country, including whether a country has adopted and enforced policies to: (1) promote access to contraception and accurate family planning information, (2) provide services to ensure safe and healthy pregnancy and childbirth, (3) expand or restrict access to safe abortion services, (4) prevent maternal deaths, and (5) prevent and treat sexually transmitted diseases.\" The bills would also require the reports to include data on maternal deaths and discrimination and violence against women and girls in health care settings, including the government's response to these actions. Appendix A. Restrictions on U.S. Funding for Voluntary FP/RH Programs Appendix B. USAID FP/RH Priority Countries: KeyÂ Statistics, 2017", "summary": "U.S. international family planning activities stem from a provision of the Foreign Assistance Act of 1961 (Section 104, P.L. 87-195; as amended), which authorized research on family planning issues, among many other things. In 1965, Congress authorized the U.S. Agency for International Development (USAID) to create contraceptive distribution programs. Originally, international family planning programs focused on distributing contraceptives and related commodities. Over time, such programs evolved to also address reproductive health issues, such as female genital mutilation (FGM) and obstetric fistula prevention and care. The United States is the largest donor of international family planning and reproductive health (FP/RH) assistance, supporting programs in 40 countries and providing, in recent years, $575 million annually in bilateral aid for this purpose. USAID administers the majority of this funding, which Congress appropriates primarily through the Global Health Programs account in the annual State, Foreign Operations and Related Programs appropriation. Policy debates about U.S. bilateral foreign assistance for FP/RH activities have focused primarily on whether recipient organizations could repurpose those funds to indirectly support abortion, despite legislation barring the use of U.S. funds for such purposes. Other aspects of FP/RH programs, particularly those related to curbing child marriage and gender-based violence, have generally received broad based support. This report describes the background and history of U.S. bilateral international family planning and reproductive health programs, funding trends, and related policy debates, including the effects of the Mexico City Policy/Protecting Life in Global Health Assistance restrictions and other abortion, and involuntary sterilization related restrictions on voluntary family planning and reproductive health services supported by U.S. bilateral foreign assistance; appropriate funding levels for international family planning and reproductive health programs; the utility of more or less integration of family planning/reproductive health programs and maternal and child health funding and programs; and pending legislation focused on international family planning assistance. This report does not cover family planning assistance channeled through multilateral organizations, such as the U.N. Population Fund (UNFPA). It provides only limited discussion of legislative restrictions and executive branch policies related to international abortion, which are detailed in other CRS products. For information on legislative restrictions, U.S. domestic abortion laws, and U.S. global health assistance, including international family planning, see the following CRS products: CRS In Focus IF11013, Protecting Life in Global Health Assistance Policy , by Tiaji Salaam-Blyther and Sara M. Tharakan. CRS Report R41360, Abortion and Family Planning-Related Provisions in U.S. Foreign Assistance Law and Policy , by Luisa Blanchfield. CRS Report RL33467, Abortion: Judicial History and Legislative Response , by Jon O. Shimabukuro. CRS In Focus IF10131, U.S. Global Health Assistance: FY2017-FY2020 Request , by Tiaji Salaam-Blyther.", "document_type": "crs"}
{"report": "Funding for new border barrier construction became the focal point of a partial government shutdown that began on December 22, 2018, and lasted 34 days, the longest on record. Congress ultimately did not accept President Donald Trump's demand for $5.7 billion in new funding for the construction of a proposed border wall, providing instead $1.375 billion for additional pedestrian fencing as part of the Consolidated Appropriations Act of 2019 (CAA). Unsatisfied with the negotiated agreement, the Trump Administration issued a Presidential Proclamation on February 15, 2019, declaring a national emergency at the southern border of the United States, a move that, among other things, allowed the President to invoke special authorities for redirecting military construction appropriations. Concurrently, the White House released a plan for reprogramming or transferring $6.7 billion to southwest border barrier projects, of which $6.1 billion would come from unobligated Department of Defense (DOD or Department) appropriations. Congress, noting the President's attempt to secure more funding than provided in the CAA, and concerned over a potential violation of its constitutional prerogatives to manage appropriations, acted quickly in an attempt to terminate the national emergency declaration. A joint resolution, H.J.Res. 46 , Relating to a national emergency declared by the President on February 15, 2019 , was passed by both houses on March 14, 2019, but was subsequently vetoed by the President one day later. On March 26, 2019, an attempt to override the veto fell short of the required two-thirds majority in the House by a vote of 248-181. In September 2019, Congress again attempted to terminate the state of national emergency with a joint resolution ( S.J.Res. 54 ) passed by both chambers. The legislation has yet to be considered by the President. The national emergency remains in effect. This report outlines the Administration's FY2020 border barrier funding plans using defense funds, describes the various authorities involved, details the process for each budgetary action, indicates the status of appropriated funds, identifies recent congressional actions, and identifies potential issues for Congress. The report does not include a comprehensive overview of DHS funding for border barriers, or describe that agency's FY2020 request for related projects. It also does not address the deployment and concomitant expense of mobilizing active and reserve military personnel for service on the border. On February 15, 2019, President Trump issued a proclamation declaring a national emergency at the southern border that required use of the Armed Forces. Concurrent with the announcement, the White House released a Fact Sheet entitled, President Donald J. Trump's Border Security Victory (hereafter referred to as the border security factsheet ) that described steps the Administration intended to take in order to provide $6.7 billion in appropriations outside of the regular legislative process for new border barrier projects. Drawing on both emergency and nonemergency authorities, the Administration outlined a number of steps it stated would be \"used sequentially and as needed.\" In March 2019, the Administration delivered its annual budget to Congress. The FY2020 proposal included an additional $7.2 billion in Army Overseas Contingency Operations (OCO) military construction funding, half of which ($3.6 billion) would replenish accounts affected by the Administration's b order security factsheet plan. The remainder, $3.6 billion, would fund future border barrier projects. According to Deputy Under Secretary of Defense (Comptroller) Elaine McCusker: We have $3.6 billion -- up to $3.6 billion to backfill any MILCON projects that we end up having to fund in '20 instead of '19. And then we also have $3.6 billion for potential new construction for the border, and the reason we've done this is to reflect the fact that we have a presidential priority that has a macro funding level and we want to help get to that funding level. Overall, funding actions the Administration described between February and March 2019 included a complex mixture of realigned DOD program savings and unobligated military construction funds from past years ($6.1 billion), as well as a request for new defense appropriations in FY2020 ($7.2 billion). In its b order security factsheet plan, the Administration cited an additional $2 billion in non-DOD appropriations; $1.375 billion in previously enacted FY2019 Department of Homeland Security (DHS) appropriations (included in the CAA), and $601 million in contributions from a Treasury Forfeiture Fund (TFF) that manages seized assets. Altogether, these defense and non-defense funds would total $15.3 billion, of which 87% would be DOD funds. The Table 1 indicates all such actions. Of the $601 million in FY2019 Treasury Forfeiture Funds described in the Administration's plan, at least $242 million has been transferred for use by the U.S. Army Corps of Engineers (USACE). The Treasury Department has stated that it will transfer the remaining $359 million when additional funds become available. Of the $2.5 billion the Administration has designated for transfer through the defense Drug Interdiction and Counterdrug Activities account (hereafter referred to as the defense Drug Interdiction account), $1.9 billion has been obligated. A substantial portion of the total amount, previously frozen by court injunctions, became available on July 26, 2019 when the U.S. Supreme Court struck down lower court injunctions. Since then, DOD border barrier construction has been allowed to proceed, though the courts have made no final ruling. After an extended review process, on September 3, 2019, the Secretary of Defense invoked the emergency construction statute 10 U.S.C. 2808 and directed the Department to transfer appropriations from 127 previously authorized military construction projects to eleven barrier projects identified by DHS. The figure below illustrates the status of the Administration's border security factsheet plan as of September 2019. Of the $6.7 billion in newly introduced funds, approximately $2.1 billion has been obligated (or otherwise made available for obligation). For completeness, the figure also includes $1.375 billion in FY2019 DHS appropriations that were included in the President's Border security factsheet announcement, though these funds were previously enacted and do not represent a plan for future actions. Although the Secretary of the DHS is charged with preventing the entry of terrorists, securing the borders, and carrying out immigration enforcement functions, funding to carry out those missions may be supplemented in part by resources from other agencies. Within DHS, U.S. Customs and Border Protection (CBP), is chiefly responsible for securing the borders of the United States, preventing terrorists and their weapons from entering the country, and enforcing hundreds of U.S. trade and immigration laws. Because border security lies primarily within the jurisdiction of DHS, Congress has not generally provided DOD with significant funds to address that mission. Congress has instead authorized the military to support DHS (or local authorities) in certain situations, such as to assist with drug interdiction or with terrorist incidents involving weapons of mass destruction. According to DOD officials: Active-duty and National Guard personnel have supported Federal and State counterdrug activities (e.g., detection and monitoring of cross-border trafficking, aerial reconnaissance, transportation and communications support, and construction of fences and roads) beginning in the early 1990s. Most recently, U.S. Northern Command's Joint Task Force-North executed 53 counterdrug support missions in fiscal year (FY) 2017 and 23 missions in FY2018. When the Secretary of Defense approved the four border States' plans for drug interdiction and counterdrug activities, DoD committed $21 million in funds in FY2017 and $53 million in FY2018. Congress has also permitted DOD special flexibility for undertaking military construction projects during periods of national crisis, such as when the President declares a national emergency. (The National Emergencies Act, or NEA, establishes procedures for how a President may declare a national emergency but does not explicitly define that term. ) Historically, emergency military construction has been used to support troops engaged in contingency operations overseas at locations that include Iraq and Afghanistan. The Administration's plan would tap funds for border barriers using both statutory military construction authorities and non-statutory general transfer authorities. This section provides an overview of those available to the Administration (both invoked and not invoked). Later sections examine the Administration's use of specific authorities in depth. Statutes that would authorize DOD to undertake military construction activities along the border but that would not require a Presidential declaration of a national emergency include the items below. The Administration has invoked: 10 U . S . C . 284 Support for counterdrug activities and activities to counter transnational organized crime . Upon request by qualifying entities, this statute authorizes DOD to reprogram funds to construct roads, fences, and lighting along international drug smuggling corridors in order to support law domestic (and foreign) law enforcement. The Department's activities are funded from a central transfer account called the Drug Interdiction and Counter-D rug Activities , which also receives direct annual appropriations. The Administration has not invoked: 10 U . S . C . 2803 Emergency construction . This statute authorizes the Secretary of Defense, under conditions the Secretary determines to be vital to the national security or the protection of health, safety, or environmental quality, to obligate $50 million for military construction projects not otherwise authorized by law. This authority was not included in the Administration's Border security factsheet plan for wall funding. The Administration's use of the statute 10 U.S.C. 284 is predicated on accessing DOD funds made available by General Transfer Authority (GTA) transfers. GTA (sometimes colloquially referred to as Section 8005 , though the provision number may change ) , refers to the recurring provision in annual defense appropriations acts that set the maximum amount permitted for DOD's base reprogramming actions (usually around $4 billion). Section 9002 is the equivalent designation for war-related, Title IX Overseas Contingency Operations , funds (usually around $2 billion). Congress typically requires that reprogramming be undertaken within a specified timeframe (less than year) and meet the following additional criteria: That such authority to transfer may not be used unless for higher priority items, based on unforeseen military requirements, than those for which originally appropriated and in no case where the item for which funds are requested has been denied by the Congress. Congress has generally considered reprogramming authority provided to Executive branch departments and agencies to be a privilege. Though the constitution invests Congress with the \"powers of the purse,\" legislators typically provide executive branch agencies some limited flexibility to shift funds among various accounts in recognition of a complex budget execution process wherein estimated costs often vary based on unforeseen events. Such flexibility allows agencies to accommodate changing circumstances, while continuing to carry out the essential functions for the programs and activities for which funds have been provided. Congress can grant reprogramming and transfer authorities in a variety of forms. They may be statutory or non-statutory. Congress may establish a central transfer account for a special purpose, or alternately, apply a broader criteria that describe which funds may be exchanged, and in what specific circumstances. Historically, Congress has consistently provided some limit to the total amount of funds that may be used. With the declaration of a national emergency, the President may invoke statutory authorities that allow DOD to fund military construction projects that support the national response. These authorities generally last only as long as the emergency is in effect (expiring immediately or within 180 days of termination). They include DOD military and civil works funds. In his February 2019 proclamation, the President invoked: 10 U.S.C. 2808 Construction authority in the event of a declaration of war or national emergency . This broad authority permits the Secretary of Defense to undertake military construction projects not otherwise authorized by law that may be necessary to support the use of the Armed Forces after the declaration of a national emergency . New projects are funded from the unobligated balances of existing ones, with no other upper limit on the overall total. In his February 2019 proclamation, the President did not invoke: 33 U.S.C . 2293 Reprogramming during national emergencies . This statute permits the Secretary of the Army in the event of a declaration of war or a declaration of a national emergency that requires or may require use of the Armed Forces to terminate or defer Army civil works projects that the Secretary deems are nonessential to national defense, and apply the resources of the Department's civil works program to, \"authorized civil works, military construction, and civil defense projects that are essential to the national defense.\" Figure 2 summarizes the main points of each of the statutes listed above as they pertain to the use of military construction. The following two subsections contain a detailed examination of DOD's proposed use of statutory and non-statutory authorities espoused in the Trump Administration border security factsheet . These include: 10 U.S.C. 2808, which would make $3.6 billion available, and; 10 U.S.C. 284, which would transfer $2.5 billion of defense program savings in concert with the non-statutory authority Section 8005 (General Transfer Authority). The final subsection addresses the use of Treasury Forfeiture Funds, which would provide $601 million for the Administration's border funding plan. When the President declares a national emergency requiring the use of the Armed Forces and invokes the emergency statute 10 U.S.C. 2808, the Secretary of Defense is permitted to undertake military construction projects \"not otherwise authorized by law that are necessary to support such use of the armed forces.\" Such projects are funded using the unobligated appropriations of construction projects currently underwayâ effectively deferring them until Congress provides replenishing appropriations. On February 15, 2019, President Trump issued Proclamation 9844, Declaring a National Emergency Concerning the Southern Border of the United States , to address what he described as a long-standing and worsening problem of large-scale, unlawful migration through the southern border. The Proclamation asserted that the severity of the crisis justified use of the Armed Forces, and invoked 10 U.S.C. 2808, thus unlocking emergency construction authority. On September 3, 2019, the Secretary of Defense determined that 11 construction projects requested by DHS were necessary to support the use of the Armed Forces along the southern border, pursuant to 10 U.S.C. 2808. In a memorandum to the Department, the Secretary directed the DOD Comptroller to transfer $3.6 billion in unobligated military construction appropriations for the new construction, and urged the Secretary of Army to begin work expeditiously. The transfers indefinitely deferred 127 previously authorized military construction projects, roughly half of which were at overseas locations ($1.8 billion for 64 non-U.S. projects). Of the deferred military construction projects outside the United States, approximately 42% ($772 million; 21 projects) would have supported the European Deterrence Initiative (EDI), a program intended to increase the capability of U.S. forces in Europe against non-NATO regional adversaries. In public remarks to the media on September 5, 2019, Secretary of Defense Mark Esper suggested allies reimburse the United States for the funding shortfalls. Of deferred military construction projects within the United States (and associated territories), the largest share of funds would come from Puerto Rico ($403 million, or 23% of total) and, to a lesser extent, Guam ($257 million, or 15% of the total). The Table 2 summarizes the total amount of deferred funds, grouped by U.S. State or affiliated territory. DOD has stated that it would make funds available to the Department of the Army for border barrier projects by prioritizing the deferral of $1.8 billion in non-U.S. projects . Funds associated with projects in the United States ($1.8 billion) would be made available at some later date. DOD's action has attracted warnings from Members of Congress concerned over military construction projects that may be affected in their states and districts. Critics have also expressed concerns that the President's use of emergency powers could circumvent (or be perceived as circumventing) the congressional appropriations process. DOD developed internal criteria not required by 10 U.S.C. 2808 that narrowed the pool of military construction projects eligible for deferment under the Administration's use of that statute. In testimony before the Subcommittee on Military Construction, Veterans Affairs, and Related Agencies in February 2019, Assistant Secretary of Defense for Sustainment Robert McMahon explained the Department's reasoning for the additional guidelines: In order to protect military readiness, the projects that are most likely to be temporarily delayed include those that pose no or minimal operational or readiness risks if deferred, projects that were already scheduled to be awarded in the last six months of the fiscal year, and recapitalization projects of existing facilities that can be temporarily deferred for a period of months. The Department's internal criteria narrowed the scope of the project funding pool by applying the following selection criteria: No military construction projects would be considered that have already received a contract award; No military construction projects with FY2019 award dates would be considered; and No military housing, barracks, or dormitory projects would be considered. In official statements, DOD has said that if its FY2020 budget request for military construction is approved by Congress, it will use the funds provided to replenish funding for projects deferred in favor of newly funded border barrier construction. If the Department's FY2020 budget is enacted on time as requested, no military construction project used to source section 2808 projects would be delayed or cancelled. Nevertheless, projects deferred by use of the statute effectively remain underfunded (or unfunded) unless Congress enacts additional amounts to replenish the original appropriations. DOD has requested $3.6 billion in additional Army military construction funds as part of its FY2020 budget submission for this purpose. Congressional opponents have argued against replenishment and asserted that DOD transfers would be tantamount to cancellingânot deferringâ affected projects. The current DOD decisionmaking process for construction in the event of a declaration national emergency appears to differ from the one described in the Department's Financial Management Regulation (FMR) and associated internal directives. The current process appears to have been driven by DHS requests, not generated internally by Military Departments in conjunction with Combatant Commanders (COCOMs). Though DOD has not fully disclosed internal deliberations related to its 10 U.S.C. 2808 funding decisions, an approximate chronology of events has emerged from court records, media reporting and official briefings. (See Appendix A for detailed chronology.) On February 18, 2019, then-Acting Secretary of Defense Patrick Shanahan requested DHS provide a prioritized list of construction projects that, according to its assessment, would improve the operational effectiveness of troops deployed to the border. DHS responded on March 20, 2019 with a prioritized list that included $5 billion in projects along 220 miles of both public and private U.S.-Mexico borderland. On April 11, 2019, then-Acting Secretary of Defense Shanahan directed the Chairman of the Joint Chiefs of Staff to provide a detailed evaluation of the DHS proposal by May 10th, 2019 and assess how the DHS-requested projects might support the mobilization of the Armed Forces to the southern border. Concurrently, the Acting Secretary instructed the DOD Comptroller and others to identify $3.6 billion in unobligated balances from existing military construction projects that might serve as a source of funding for border barriers. On May 6, 2019, the Chairman of the Joint Chiefs of Staff submitted his final report, Assessment of Whether the Construction of Barriers at the Southern Border is Necessary to Support the Use of Armed Forces in Securing the Border , which concluded that all DHS-identified construction projects were necessary to support the use of the Armed Forces. The report's methodology was based, in part, on the assumption that any construction along the border would provide necessary support, wherever troops may (or may not) be deployed: In general, construction projects in one sector of the border have ripple effects across all other sectors. This recognition drives our conclusion that any border barrier construction supports the use of the armed forces on the border to some extent, regardless of where the construction occurs relative to the current location of DoD operations. On August 21, 2019, Kenneth Rapuano, Assistant Secretary of Defense, Homeland Defense & Global Security (ASD/HDGS), recommended the Secretary of Defense adopt an action plan that would execute 11 DHS identified projects and defer $3.6 billion in existing military construction. The Secretary of Defense approved all these recommendations on September 3, 2019. Historically, DOD has used 10 U.S.C. 2808 to fund projects at overseas locations for war related infrastructure. Requests for emergency construction projects originate with the Secretaries of the Military Departments and COCOMs, who together make a preliminary assessment on whether use of 10 U.S.C. 2808 authorities is warranted. For each emergency project, officials must provide detailed justification materials that analyze possible alternatives to use of the emergency authority, give a history of the request and rationale for why the project may not be deferred, and submit a cost estimate and timeline for completion. The Chairman of the Joint Chiefs of Staff (CJCS) is then required to certify any proposed projects are consistent with current theater basing plans and do not conflict with other operational priorities. Having made these determinations, the Secretaries then forward their list of proposed emergency projects and detailed justification materials to the Under Secretary of Defense for Acquisition and Sustainment, or ASD (Sustainment). That office, in turn, provides the Secretary of Defense with its recommendations. The Secretary makes a final decision on projects to be undertaken and notifies all appropriate defense committees of the pending action, as required by statute. Following this notification, the Office of the Under Secretary of Defense (Comptroller) (OUSD(C)) is permitted to issue funds for execution. To execute the plan described by the Administration's border security factsheet, DOD reprogrammed $2.5 billion from a variety of nondrug defense programs, through the Department's Drug Interdiction and Counterdrug Activities, and on to the U.S. Army Corps of Engineers, the federal agency that both DHS and DOD have asked to manage border barrier construction activities. This two-stage processâtransferring funds into and out of the defense Drug Interdiction accountâwas permitted by multiple authorities: first by Section 8005 General Transfer Authority and Section 9002 Special Transfer Authority, and in the final stage by the statute 10 U.S.C. 284. By transferring funds from nondrug programs into the defense Drug Interdiction account, DOD was able to tap a larger pool of appropriations than might otherwise have been available by using the account's own funds. At the same time, the Drug Interdiction account's ongoing programs were safeguarded from diminishing transfers. DOD officials have stated they would not tap the account's own appropriations for wall-related projects: DOD will not use any DoD counter-narcotics funding for the drug-demand-reduction program, the National Guard counter-drug program, or the National Guard counter-drug schools program to provided support to DHS under 10 U.S.C. 284(b)(7). To accomplish the first stage of the $2.5 billion transfer processâtransferring savings from nondrug programs to the defense Drug Interdiction accountâDOD did not comply with internal regulations that require the Department to first seek congressional prior approval for general transfer authority (Section 8005) actions. DOD's process for submitting prior-approval requests to congressional defense committees is a non-statutory requirement intended to preserve comity with legislators who set the Department's reprogramming thresholds each year. Disapproval by any one of the four committees terminates further action, according to DOD regulations, though the Department may request reconsideration or submit a modified request. On March 25, 2019, the Department notified the four congressional defense committees of its plan to transfer $1 billion, the first of several reprogramming actions. The House Armed Services and House Committee on Appropriations immediately denied the request. DOD nevertheless completed its transfer on March 26, 2019, for the first time overriding congressional disapprovals. The Department followed up with an additional reprogramming action of $1.5 billion, which it completed on May 9, 2019. How DOD Transferred $2.5 billion in Two Reprogramming Actions DOD's first reprogramming action occurred on March 25, 2019, and included $1 billion for construction of high priority projects in Yuma Sector Arizona (Projects 1 and 2) and El Paso Sector Texas (Project 1). All projects were to be managed by the U.S. Army Corps of Engineers. The transfer of funds took place in two stages. In the first stage, the Department used General Transfer Authority (also known as Section 8005 authority) to shift $1 billion in Army military personnel program savings into the defense Drug Interdiction account. The funds consisted of: $812 million (81%) in excess appropriations due to a shortfall of 9,500 personnel from the Army's targeted end strength, and $188 million (19%) in program savings from several military benefits programs. In the second stage of the transfer action, the Department invoked 10 U.S.C. 284 to authorize moving the $1 billion into an Army Operation and Maintenance appropriation for use by the Army Corps of Engineers, which is responsible for managing all DOD approved border barrier projects. On May 9, 2019, DOD notified congressional defense committees of a second reprogramming action of $1.5 billion for four additional border barrier projects (El Centro California Project 1 and Tucson Sector Arizona Projects 1-3; see Appendix Table B-2 for complete list). Unlike the first action, the Department transferred both base and OCO funds: Base: $818.5 million (55%) drawn from a variety of accounts, including research and development technologies to reduce the U.S. chemical stockpile ($252 million), recovered savings related to lower than expected contributions to the Thrift Savings Plan retirement ($224 million), and the cancellation of a National Security Space Launch mission ($210 million). Overseas Contingency Operations: $681.5 million (approximately 45%) drawn from funding for training of Afghan security forces and reimbursement to Pakistan for logistics support. Base and OCO reprogramming authorities are derived from separate provisions with nearly identical legislative language; for base Section 8005 of P.L. 115-245 and Section 1001 of P.L. 115-232 ; and for OCO Section 9002 of PL. 115-245 and Section 1512 of P.L. 115-232. On February 25, 2019, DHS requested that DOD undertake 11 construction projects on the U.S.-Mexico southwest border in California, Arizona, and New Mexico. The projects involved construction or replacement of roads, lighting, and vehicle and pedestrian fencing along drug smuggling corridors that were also areas of high illegal entry. DHS stated the purpose: To support DHS's action under Section 102 of IIRIRA, DHS is requesting that DoD, pursuant to its authority under 10 U.S.C. Â§ 284(b)(7), assist with the construction of fences roads, and lighting within the Project Areas to block drug-smuggling corridors across the international boundary between the United States and Mexico. DOD initially agreed to fund seven of the 11 projects in multiple funding tranches (described above). The Defense Department subsequently cancelled one of these projects (Yuma Sector Project 2), which was later funded using the emergency authority 10 U.S.C. 2808. All the projects were to be managed by the U.S. Army Corps of Engineers (USACE). DOD's first reprogramming funding tranche of $1 billion supported: Yuma Sector Arizona Projects 1 and 2, and El Paso Sector Texas Project 1. DOD's second funding tranche of $1.5 billion supported: El Centro California Project 1 and Tucson Sector Arizona Projects 1-3. As of September 2019, DOD has obligated $1.9 billion of the $2.5 billion it reprogrammed for wall related construction under 10 U.S.C. 284. Until recently, operations were suspended due to multiple court injunctions in a legal case challenging DOD's reprogramming actions, Sierra Club v. Trump . The delays incurred additional costs as contractors that had received contract awards were compelled to idle their equipment and put laborers on standby. On July 26, 2019, the U.S. Supreme Court lifted all injunctions in the case, allowing construction to once again proceed. Nevertheless, the litigation remains unresolved. In the case of an unfavorable ruling, the government has suggested that it may be required to take down the new construction. DOD is under some pressure to complete the obligation of reprogrammed appropriations before funds are no longer available. Due to legislative language regarding the period of availability of transferred appropriations, all unobligated amounts expire at the end of the current fiscal year, on September 30, 2019, thus incentivizing quick action. Additionally, due to the complex funding structure of contracts under consideration, USACE requires some actions be taken within 100 days of the award date, according to Army officials: â¦contracts require definitization not later than 100 days from the date of contract awardâ¦If the Corps does not have sufficient time available prior to September 30, 2019, to definitize these contracts and thereby obligate the balance of the contract price, the remaining unobligated funds will become unavailable for obligationâ¦As a consequence, the Corps will be unable to complete the projects as planned, and the contracts will have to be significantly de-scoped or terminated. Established in 1992 for the purpose of managing cash and other resources seized as the result of civil or criminal asset forfeiture, the Treasury Forfeiture Funds (TFF) functions as a multi-Departmental source of funding for law enforcement interests of the Departments of the Treasury and Homeland Security. With executive authority to define what fits within this broadly defined purpose, the Administration determined that it could be a source of wall funding. The TFF is managed by the Treasury Executive Office of Asset Forfeiture (TEOAF), which makes budget authority available to other federal agencies or bureaus via interagency agreements, reimbursing them upon the receipt of spending invoices. Payments are limited by the total value of seized property. TEOAF's mission statement is: To affirmatively influence the consistent and strategic use of asset forfeiture by law enforcement bureaus that participate in the Treasury Forfeiture Fund (the Fund) to disrupt and dismantle criminal enterprises. On February 15, 2019, the Treasury Department notified congressional appropriators that it had approved a DHS request (submitted in December 2018) to provide a total of $601 million in TFF to the CBP for border security purposes. The first tranche of $242 million was made available to CBP for obligation on March 14, 2019. The second tranche of $359 million is expected to be made available at a later date, upon Treasury's receipt of additional anticipated forfeitures. All funds the TFF provides to U.S. Customs and Border Protection (CBP) may be used for various aspects of border security ânot only the construction of a physical wall. Congressional response to the Administration's b order security factsheet plan has generally split by chamber, with the House Armed Services and Appropriations committees moving swiftly to pass legislative language that would block the President's actions and the Senate Armed Services and Appropriations committees expressing some support. In late July 2019, news outlets reported congressional leadership had come to an informal understanding as part of a settlement of the annual budget caps for FY2020 and FY2021 that might exclude legislative language restricting the use of federal funds for border barriers from annual appropriations measures. The deal would specifically prohibit legislative provisions limiting the use of transfer authorityâa key part of the President's Border security factsheet planâunless such language was adopted on a bipartisan basis. The effect of such language is still unclear as is how it may otherwise be used to modify ongoing legislative activity. The House-passed version of the FY2020 National Defense Authorization Act ( H.R. 2500 ) contains a number of provisions that if enacted would limit or prohibit the use of DOD funds for construction of border barriers. Furthermore, it provides no funding for the Administration's request for replenishment of defunded projects or for related future projects. The bill targets each stage of the Administration's funding plan: Transfer Authority . Section 1001 would sharply curtail the total amount of base funds that may be used for reprogrammed, reducing the limit to $1 billion (from $4.5 billion in FY2019). Section 151 2, the equivalent transfer authority used for war-related funds, would be reduced to $500 million (from $3.5 billion in FY2019). 10 U.S.C. 284 . Section 1011 would remove fence construction as a permitted type of support authorized under 10 U.S.C. 284 and would impose additional congressional notification requirements associated with use of the statutory authority. 10 U.S.C. 2808 . Section 2802 would limit the total amount of funds that could be used under 10 U.S.C. 2808 emergency authorities to $500 million if used for construction \"outside the United States,\" or $100 million if used for domestic construction projects. (Currently, transfers are only limited to the total amount of all unobligated military construction appropriations.) These changes would apply only to projects pursuant to a declared emergency and would not impact projects that support a declared war. General Prohibition . Section 1046 would prohibit the use of national defense funds appropriated between FY2015-FY2020 for the construction of any type of physical border barrier along the southern border. Section 2801 contains identical language that applies to military construction funds. On May 15, 2019, a group of legislators led by House Armed Services Committee members introduced H.R. 2762 , a bill that would modify 10 U.S.C. 2808 by imposing a $250 million cap on the total amount that could be used for emergency military construction projects in the event of a national emergency. Additionally, \"The bill would only allow money that cannot be spent for its intended purpose to be used for an emergency, would require additional information in a congressional notification, and delay the start of construction until after a waiting period following the notification going to Congress.\" The Senate passed version of the FY2020 National Defense Authorization Act ( S. 1790 ) would support the actions described in the President's Border security factsheet plan by providing $3.6 billion in military construction funds to replenish projects deferred by the Administration's use of 10 U.S.C. 2808 and avoiding large cuts to DOD reprogramming thresholds. However, the Senate bill would not authorize the additional $3.6 billion requested by the Administration for future border barrier projects. Transfer Authority . Section 1001 and Section 1522 provide $4 billion in general transfer authorityâ a decrease of $0.5 billion from FY2019 authorized amountsâ and $2.5 billion in special transfer authorityâ a decrease of $1 billion from FY2019 authorized amounts, respectively. 10 U.S.C. 2808 Replenishment funding. Section 2906 would provide $3.6 billion to replenish military construction projects affected by the use of 10 U.S.C. 2808 transfers, fulfilling the Administration's entire request for that purpose. Authorization for the transfer of these funds into the depleted accounts would terminate at the end of FY2020 (September 30, 2020). The House has generally sought to limit the Administration's funding actions across multiple appropriations bills. In the first of two FY2020 appropriations minibus measures, the Labor, Health and Human Services, Education, Defense, State, Foreign Operations, and Energy and Water Development Appropriations Act, 2020 ( H.R. 2740 ), Division C (Department of Defense Appropriations, H.R. 2968 ) and Division E (Energy And Water Development And Related Agencies Appropriations Act, 2020, H.R. 2960 ) contained the following provisions that would affect the Administration's plan for funding border barrier construction: Transfer Authority. Section 8005 would limit general transfer authority of base funds to $1 billion (a reduction from $4 billion in FY2019 ) and require the Secretary of Defense and others to certify the transferred funds will be used for higher priority items. The Section 9002 special transfer authority for war funds would provide authority to transfer up to $500 million (a reduction from $2 billion in FY2019). 10 U.S.C. 284 . Though the legislation would provide $816.8 million for Drug Interdiction and Counterdrug Activities transfer account (for use under 10 U.S.C. 284), the bill prohibits use of any of those funds for construction of border barrier fencing, and further prohibits any transfer of these funds. General Prohibition. Section 8127 would broadly prohibit defense appropriations from being used for construction of a wall, fence, border barrier, or border security infrastructure along the southern border. U.S. Army Corps of Engineers. Section 108 of Division E would broadly prohibit USACE from using any civil works funds for border barrier construction: Notwithstanding any other provision of law, none of the funds made available by this Act or any other prior appropriations Acts for the Civil Works Program of the United States Corps of Engineers may be committed, obligated, expended, or otherwise used to design or construct a wall, fence, border barriers, or border security infrastructure along the southern border of the United States. The House passed the second of two FY2019 appropriations mini-buses, H.R. 3055 on June 25, 2019. It contains a number of limiting restrictions in Division D (Military Construction, Veterans Affairs, and Related Agencies Appropriations Act, 2020) that would interrupt the Administration's plans for funding border barriers. Reprogramming Guidelines. Section 122 would require DOD to follow its own guidelines when reprogramming military construction funds, a directive that would make significant transfers contingent on congressional prior-approval. In committee language, the House cautioned DOD that \"reprogramming is a courtesy provided to DOD and can be taken away if the authority is abused\" and urged the Department to adhere to its own directives when seeking to reprogram funds. General Prohibition on Transfers. In committee language, the House underscored the absence of wall funding in the current appropriations language and its efforts to preserve previously appropriated projects from becoming a pool of funds for the Administration's efforts to construct border barriers. The Committee recommendation does not provide these requested funds. Also, the accompanying bill includes language that protects previously appropriated projects, as well as fiscal year 2020 projects included in this bill from being used as a source for wall funding. Prohibition on Design and Construction. Section 612 would prohibit the use of military construction appropriations provided in any act from FY2015-FY2020 to be used for the purpose of designing or constructing border barriers or access roads along the southern border. The provision uses the strongest possible legislative language by stating it would apply, \"notwithstanding any other provision of law.\" The House-passed Financial Services and General Government Appropriations Act, 2020 ( H.R. 3351 ) contains a provision (Section 126) that would bar the Administration's use of Treasury Forfeiture Funds for planning, designing, or executing any kind of barrier or road along the southwest border. If enacted, this language would likely prevent the use of $601 million funds approved by the Treasury Department for these purposes. On September 12, 2019, the Senate Committee on Appropriations reported the Defense Appropriations Act, 2020 ( S. 2474 , S.Rept. 116-103 ), which would retain transfer authorities at FY2019 levels ($4 billion for General Transfer Authority, or Section 8005; $2 billion for OCO related transfers) and contained no additional wall-related provisions. At the highest level, the President's statements regarding the use of emergency powers to supplement the congressional appropriations process have raised questions for some about the reach of the executive branch's lawful authority. \"I could do the wall over a longer period of time. I didn't need to do this [national emergency]. But I would rather do it much faster.\" â President Trump, February 15, 2019 Critics also assert the President's actions risk violating the constitutional separation of powers. Article I, Section 9 of the U.S. Constitution states, \"No Money shall be drawn from the Treasury, but in Consequence of Appropriations made by law.\" Supporters have argued the President has lawfully reallocated funds to address a national crisis. On June 3, 2019, in a lawsuit brought by the House of Representatives that argued the Administration's actions to fund a border wall represented a breach of the Appropriations Clause of the Constitution, a federal judge ruled the legislature had no standing to sue. In the 116 th Congress, House authorizers and appropriators have inserted provisions into annual legislation that would broadly prohibit the use of defense funds for construction of a wall, fence, border barrier, or other security infrastructure along the southern border. Some of these prohibitions would appear to apply retroactively to all appropriations since FY2015. DOD's recent decision to undertake general and special reprogramming transfers (in conjunction with 10 U.S.C. 284), \"without regard to comity-based DOD policies that prescribe prior approval from congressional committees\" has introduced uncertainty into a historically uncontroversial process. For some, DOD's disregard for long-standing reprogramming agreements with congressional defense committees has signaled a challenge to the legislative branch's ability to conduct oversight of approximately $6 billion in annual defense appropriations. Consequently, the Department's actions have generated new congressional interest and actions (particularly in the House) that would sharply limit the annual budget flexibility provided to the Department in authorizations and appropriations acts. Others view DOD's recent reprogramming notifications in support of border wall construction as a justifiable anomaly in an otherwise unbroken agreement supported by the Department's own internal directives. In cases where DOD reprogramming actions do not reflect congressional intent (or adhere to DOD directives), Congress may consider what legislative recourse might be available to prohibit future violations. In some cases, decreasing the Department's budgetary flexibility may potentially undermine DOD's ability to effectively execute congressionally directed policies and programs. The emergency Military Construction statute (10 U.S.C. 2808) does not limit the types of military construction projects that may be deferred based on a set of criteria, including, for example, whether such delays will affect military readiness. Nevertheless, DOD has stated it will apply its own criteria to the 10 U.S.C. 2808 pool of eligible projects in order to preserve readiness. Congress may evaluate whether DOD's guidelines are sufficient and whether they serve as a sound basis for governing future decisions. Appendix A. Selected Communications and Documents The tables below contains a chronology of selected communications, correspondence, and documents relevant to the use of 10 U.S.C. Section 2808 and Section 284, drawn primarily from court records. This section is intended to identify milestones in the decision-making process. Appendix B. 10 U.S.C. 284 Reprogramming Requests DOD has submitted two reprogramming notifications to defense committees transferring a total of $2.5 billion to the Drug Interdiction and Counterdrug Activities account. The Department's first action, on March 25, 2019, used general transfer authority to reallocate $1 billion. Approximately 82% of this total was taken from the active duty army pay and allowances (for officers and enlisted personnel), savings realized from service recruiting shortfalls. DOD's second action, on May 9, 2019, used a mix of $818.465 million in general transfer authority (base) and $881.535 in special transfer authority (OCO); a total of $2.5 billion. In the table below, reprogramming actions that use special transfer authority are indicated parenthetically with the (OCO) designation. Together, both reprograming actions reallocated $1.8 billion from base and $.7 billion from OCO defense funds. The majority of these funds were derived from Army personnel accounts and programs supporting the Afghanistan Security Forces. The Department's two actions were sourced exclusively from appropriations that began in FY2019 and had a one- to three-year lifespan, or period of availability . When these program savings were transferred to the Drug Interdiction and Counter-drug activities FY2019 appropriations, they became one-year appropriations. Following additional transfer actions, all appropriations were merged with an FY2019 Army Operations and Maintenance appropriations account, another one-year account. Appendix C. Wall Projects Requested by DHS Pursuant to 10 U.S.C. 284 On February 25, 2019, DHS formally requested DOD support its ability to impede and deny illegal entry and drug smuggling activities along the southwest U.S.-Mexico border by assisting with the construction (or replacement) of fences, roads, and lighting. DHS summarized the work required: The new pedestrian fencing includes a Linear Ground Detection System, which is intended to, among other functions, alert Border Patrol agents when individuals attempt to damage, destroy or otherwise harm the barrier. The road construction includes the construction of new roads and the improvement of existing roads. The lighting that is requested has an imbedded camera that works in conjunction with the pedestrian fence. The lighting must be supported by grid powerâ¦. DHS will provide DoD with more precise technical specifications as contract and project planning moves forward. DHS requested DOD undertake a total of 11 projects on federal lands, which the agency identified by geographic location and unique numeric id. The Border Patrol divides responsibility for its operations along the Southwest border into nine geographic sectors. Four of these were included as part of the DHS request: Yuma Sector Arizona. Composed primarily of desert terrain with vast deserts, mountain ranges, and sand dunes, the area encompasses 126 miles of U.S.-Mexico borderland (181,670 square miles) between California and Arizona. DHS requested DOD undertake 36 miles of vehicle barrier replacement, 6 miles of pedestrian fencing, and lighting in this sector. El Paso Sector Texas. This sector covers the entire state of New Mexico and two counties in western Texas; 268 miles of U.S.-Mexico borderland (125,500 square miles). DHS requested 70 miles of vehicle barrier (with pedestrian fencing) and lighting in this sector. El Centro California . Located in Southern California, the sector is characterized primarily by agricultural lands, eastern desert areas (where summer temperatures can exceed 120 degrees), and western mountain ranges. The sector stretches for 71 miles along the U.S.-Mexico border. DHS requested DOD undertake a mix of projects along 15 miles in this sector (vehicle, pedestrian, and lighting). Tucson Sector Arizona. Encompassing nearly all of Arizona, this areaâa particularly active one for illegal alien apprehension and marijuana seizuresâcovers 262 miles. DHS requested road construction, 86 miles of vehicle barrier (with pedestrian fencing), and lighting in this sector. Between March and April 2019, DOD approved seven of the eleven requested projects, funding them in two tranches. One of the approved projects, Yuma 2, was subsequently terminated due to contract complications. In August 2019, DHS notified DOD of anticipated contract savings and requested surplus 10 U.S.C. 284 funds be applied to the execution of three additional projects (Yuma 3-5). After evaluating the request, DOD agreed to undertake a modified set of projects (Yuma 4-5, Tucson 4). In September, the Department terminated the new projects after new estimates revealed the anticipated contract savings would be insufficient to undertake additional construction. The list below shows projects initially requested by DHS and those added by DOD in subsequent modified requests. The geographic sector is indicated in the \"Project Name\" column, along with the project's numeric designation. Several projects not funded by the use of 10 U.S.C. 284 funds were later funded by 10 U.S.C. 2808. For those approved for action by DOD, the funding tranche is also indicated. In a letter to Acting DHS Secretary Kirstjen Nielsen, Acting Secretary of Defense Shanahan stated the U.S. Army Corps of Engineers would undertake the planning and construction of approved projects and, upon completion, would hand over custody of all new infrastructure to DHS. Court Injunctions Temporarily Suspended Construction On May 24, 2019, the U.S. District Court for the Northern District of California issued a temporary injunction in Sierra Club v. Trump , barring use of DOD's first funding tranche of $1 billion. In compliance with the court's order, USACE immediately suspended ongoing operations for the two active border barrier projects. At the time of the suspension, $423,999,999 remained unobligated (of the original $1 billion): El Paso 1: An undefinitzed contract was awarded on April 9, 2019. At the time of the court's injunction, $389,999,999 remained unobligated. Yuma 1: An undefinitized contract was awarded on awarded May 15. At the time of the court's injunction, $35,000,000 remained unobligated. On May 25, 2019, DOD executed a second reprogramming action of $1.5 billion. On June 28, 2019, the California district court issued a second injunction that prohibited DOD from using either of the two funding tranches ($2.5 billion total). Again, USACE project managers suspended ongoing operations. At the time of the new suspension, approximately $752,750,000 remained unobligated from the second funding tranche ($1.5 billion): Tucson Sector Projects 1-3: An undefinitzed contract was awarded on May 15, 2019. At the time of the court's injunction, $646,000,000 remained unobligated. El Centro Sector Project 1: An undefinitzed contract was awarded on May 15, 2019. At the time of the court's injunction, $106,750,000 remained unobligated. Project delays have resulted in some additional costs to the government. DOD financial regulations recognize contractors are entitled to compensation for unreasonable contract suspensions, since costs continue to be incurred by idling equipment, site security, contract labor, material storage, or market fluctuations. The government is charged additional penalties for late payment (3.625% per annum). In the event an active contract is terminated, DOD would be held responsible for compensating contractors for sunk costs. On July 26, 2019, the U.S. Supreme Court lifted the lower court injunctions, allowing construction to proceed. Appendix D. Wall Projects Requested by DHS Pursuant to 10 U.S.C. 2808 On September 3, 2019, the Secretary of Defense, having determined that border barrier construction would serve as a \"force multiplier\" for reducing DHS's demand for DOD personnel and assets, directed the Acting Secretary of the Army to proceed with the construction of 11 border barrier projects. In a memorandum to the Department, the Secretary stated: Based on analysis and advice from the Chairman of the Joint Chiefs of Staff and input from the Commander. U.S. Army Corps of Engineers, the Department of Homeland Security (DHS), and the Department of the Interior and pursuant to the authority granted to me in Section 2808, I have determined that 11 military construction projects along the international border with Mexico with an estimated total cost of $3.6 billion, are necessary to support the use of the armed forces in connection with the national emergency. These projects will deter illegal entry, increase the vanishing time of those illegally crossing the border, and channel migrants to ports of entry. They will reduce the demand for DoD personnel and assets at the locations where the barriers are constructed and allow the redeployment of DoD personnel and assets to other high-traffic areas on the border without barriers. In short, these barriers will allow DoD to provide support to DHS more efficiently and effectively. In this respect, the contemplated construction projects are force multipliers. Of the eleven projects DOD selected for execution, seven were located (in whole or in part) on land under the jurisdiction of the Department of the Interior (DOI) that required an administrative transfer to the Department of Defense before construction could proceed. On September 18, 2019, DOI issued Public Land Orders that temporarily transferred jurisdiction of land required for five of these projects for a period of three years. In the table below, DOI-transferred lands have been indicated with an asterisk (see column marked \"Jurisdiction\"). Two of the eleven projects selected by DOD (El Centro 5 and Laredo 7) were located on non-public lands that will require either purchase or condemnation before construction may proceed. USACE representatives have stated that such a process would not be completed before April 2020. The remaining two projects (Yuma 2 and Yuma 10/27), are located exclusively on the Barry M. Goldwater Range (BMGR), a military installation under the jurisdiction of the U.S. Navy where construction may begin immediately. The table below indicates the eleven projects DOD has agreed to fund using 10 U.S.C. 2808 funds, and describes the estimated cost of construction, the jurisdiction of associated lands, and a description of the parcel. Appendix E. Military Construction Projects Deferred Pursuant to 10 U.S.C. 2808 On September 3, 2019, DOD delivered to congressional defense committees a list of ongoing military construction projects the Department had selected for deferral pursuant to 10 U.S.C. 2808. The list had been preceded by two additional notifications that identified potential military construction projects that might be affected by use of the statute. The first of these three lists of military construction projects, delivered to defense committees in March 2019, identified all military construction projects that had not yet received contract awardsâmaking them vulnerable for selection under 10 U.S.C. and the Department's independent internal criteria. A second list, which DOD delivered to defense committees in late May 2019, selectively updated the contract award dates of some military construction projects. The final list, comprised of approximately 127 projects ($3.6 billion), updated the contract award dates for six projects ($209 million) located outside of the United States, making them newly eligible for selection. Additionally, the Department's final list included one planning and design project ($13.6 million) not included in previous notifications. The table below summarizes this final list. ", "summary": "The Department of Defense (DOD, or the Department) has played a prominent role in the Trump Administration's border security strategy because of controversies related to $13.3 billion in defense funding it has sought to use for border barrier construction projects not otherwise authorized by Congress. These defense funds would comprise a complex mix of DOD program savings and unobligated military construction funds from past years ($6.1 billion), as well as a request for new appropriations in FY2020 ($7.2 billion). An additional $2 billion in non-DOD appropriations are often cited as part of the Administration's overall border funding plan. These include $1.375 billion in previously enacted FY2019 Department of Homeland Security (DHS) appropriations, and $601 million in contributions from a Treasury Forfeiture Fund (TFF) that manages seized assets. Altogether, these defense and non-defense funds would total $15.3 billion, of which 87% would be DOD funds. President Donald Trump has consistently declared the deployment of fencing, walls, and other barriers along the U.S.-Mexico border a high priority, however, he has been unable to fully secure from Congress the total amount of funding he deems necessary for that purpose. On February 15, 2019, in part to gain access to such funding, the President declared a national emergency at the southern border that required use of the Armed Forces, an act that triggered statutes allowing the President to redirect national resourcesâincluding unobligated military construction fundsâfor purposes for which they were not originally appropriated by Congress. Concurrent with the declaration, the Administration released a fact sheet entitled, President Donald J. Trump's Border Security Victory ( hereafter referred to as the border security factsheet ) that described a plan for redirecting $6.1 billion in DOD funds to border barrier construction projects not authorized by Congress. An additional $601 million was included using TFFs. The plan invoked a mixture of emergency and nonemergency authorities that included: $2.5 billion in defense funds authorized by the (nonemergency) statute 10 U.S.C. 284 Support for counterdrug activities and activities to counter transnational organized crime; $3.6 billion in defense funds authorized by the emergency statute Title 10 U.S.C. 2808 Construction authority in the event of a declaration of war or national emergency; and $601 million in nondefense, nonemergency TFFs. Shortly after the release of the border security fact sheet , the DHS requested that DOD undertake 11 construction projects along the Southwest U.S.-Mexico border for execution under 10 U.S.C. 284 authority. Typically, such construction would be funded using congressionally provided appropriations from DHS's own budget. Nevertheless, citing the ongoing state of emergency, DOD agreed to undertake seven of the projects and, between March and May 2019, reprogrammed $2.5 billion in defense program savings over the objections of House congressional defense committees, a deviation from the Department's own regulations. Subsequent court injunctions temporarily prevented approximately half ($1.2 billion) of these appropriations from being fully obligated, and resulted in the suspension of contracts that had been quickly awarded following DOD's reprogramming actions. The U.S. Supreme Court lifted these injunctions on July 26, 2019, but there has been no final ruling in the case ( Sierra Club v. Tru mp) . It remains unclear how a potentially unfavorable ruling might affect construction completed during the ongoing litigation. In September, DOD officials stated that $1.9 billion of the 10 U.S.C. 284 funds have been obligated, with the remainder to be obligated by the end of the month. On September 3, 2019, the Secretary of Defense exercised his authority under the emergency statute 10 U.S.C. 2808 to defer approximately 127 authorized military construction projects ($3.6 billion) and redirect the funds to 11 border barrier projects identified by the DHS. Deferred military construction projects would be halted indefinitely (or terminated) unless Congress were to provide replenishing appropriations. Congressional critics of the Administration's border barrier funding plans have hesitated to reimburse DOD for transfer actions they opposed or expressly prohibited. Furthermore, in March 2019, as part of its annual budget submission to Congress, the Administration also requested an additional $7.2 billion in defense appropriations (not described by the February 2019 border security factsheet plan). DOD officials stated that half this amount ($3.6 billion) would be used to support new DHS border barrier projects which the Administration has not yet described. The other half ($3.6 billion) would replenish military construction projects deferred by DOD's earlier 10 U.S.C. 2808 transfer actions. There has been considerable congressional concern over the Administration's efforts to fund the construction of border barriers outside of the regular budgetary process. In broad terms, these concerns are related to the novel and unorthodox use of emergency authorities, and the possibility that the Administration's actions jeopardize congressional control of appropriations, thereby potentially violating the Constitution's separation of powers. At the interagency level, DOD's break from comity-based agreements with congressional defense committees on reprogramming actions has generated new legislative interest in limiting the Department's budgetary flexibility and applying sharper oversight. More narrowly, individual Members have voiced apprehensions that military construction projects in their states and districts have been jeopardized by DOD's emergency transfers. FY2020 defense authorization and appropriation bills currently under consideration (as of September 2019) include provisions that would constrain the Administration from fully executing its plan, though final versions have not yet been passed. In late July 2019, news outlets reported congressional leadership had come to an informal understanding as part of a settlement of the annual budget caps for FY2020 and FY2021 that would specifically prohibit legislative provisions limiting the use of transfer authorityâa key part of the President's Border security factsheet planâunless such language was adopted on a bipartisan basis. Ongoing litigation has generally slowed the execution of border barrier construction and imperiled large portions of the President's plan. Of the $6.7 billion in future DOD and Treasury Funds included in the border security factsheet , $2.1 billion (32%) has been obligated as of September 13, 2019. This includes $242 million in TFFs and $1.9 billion transferred from the defense Drug Interdiction and Counter-Drug Activities account.", "document_type": "crs"}
{"report": "Domestic violence is a term often used to describe abuse of a spouse or child in the home. I ntimate partner violence (IPV) is a subset of domestic violence that is committed against a spouse, or current or former dating partner. IPV is treated as a public health issue and is monitored by the Centers for Disease Control and Prevention (CDC) at the national level. According to the CDC, approximately one in five women and one in seven men report having experienced severe physical violence from an intimate partner in their lifetime. In addition, crime statistics suggest that 16% of all U.S. homicide victims are killed by an intimate partner. Nearly half of female homicide victims are killed by a current or former male intimate partner. IPV criminal offenses are typically defined and prosecuted at the state level; however, federal law imposes penalties on some domestic violence offenders. Military IPV offenders may be prosecuted in civilian courts, but are also subject to punitive measures within the military justice system under Uniform Code of Military Justice (UCMJ) provisions. From a military effectiveness perspective, IPV may lead to productivity losses, degraded servicemember or unit readiness, and subsequent costs to the Department of Defense (DOD). When servicemembers are victims, associated mental and physical trauma may affect their ability to deploy or serve in worldwide assignments and can lead to capability gaps in units. In addition, qualified veterans who were victims of IPV may require additional care for co-morbid conditions through the Veterans' Health Administration (VHA). Congress has constitutional authority to fund, regulate, and oversee the Armed Forces, including the military justice system. Congress has used this authority in recent years to mandate domestic violence prevention and victim response policies, programs, and services. As such, there is enduring congressional interest on domestic violence prevention and response, victim well-being, and perpetrator accountability. This report starts with an overview of IPV in the Armed Forces, including risk factors, prevalence, and concerns specific to military families and certain subgroups. The next section focuses on DOD prevention activities, including efforts to screen out high-risk individuals, increase awareness, and address relationship stresses before they escalate. This section is followed by a discussion of intervention activities implemented by clinical service providers, military commanders, and other stakeholders. The next section describes actions taken by DOD and the Congress to provide victim support, resources, and advocacy. Following that, the report touches on how military law enforcement organizations respond to and investigate allegations of domestic abuse and how offenders are held accountable under the military justice system. Finally, the report touches on some continuing issues for congressional oversight and action. Intimate partner violence (IPV) is a crime characterized by recidivism and escalation, meaning offenders are likely to be repeat abusers, and the intensity of the abuse or violence is likely to grow over time. IPV can harm victims in various ways, resulting in physical injury, mental health problems, and adverse pregnancy outcomes (e.g., low birth weight, preterm birth, and neonatal death). Many victims of IPV continue to struggle with stress and anxiety long after incidents occur. For example, national surveys have found that among victims of IPV, 41% of women and 10% of men have experienced symptoms of post-traumatic stress disorder (PTSD). In addition, alleged perpetrators can face decreased productivity at work, loss of income, and incarceration. Domestic violence can also affect the behavior and well-being of subsequent generations. Research has shown that children who grow up in a home where IPV occurs are at higher risk for behavioral, cognitive, and emotional disorders. Relatedly, studies have indicated that perpetrators often have a history of experiencing abuse or witnessing abusive relationships within their families as a children or young adults. Factors unique to military service may exacerbate risks for both perpetrators and victims of IPV. First, servicemembers and their families frequently move for various assignments. This separates individuals from natural support networks, which can heighten stress on intimate partnerships, including those involving caretakers, and lead to social isolation. Whereas a victim of domestic abuse might normally escape a situation by temporarily moving in with a local family member or trusted friend, this option may not be readily available, particularly for those located at overseas or remote installations. Similarly, difficulties in coping with frequent moves and other pressures associated with military service (e.g., a spouse's long hours, shift work, or unpredictable deployments) may contribute to marital conflict and instability (e.g., reunification cycles, separation, or divorce). In addition, frequent household moves may complicate the capacity of nonmilitary spouses to achieve full employment. Lack of financial independence and the threat of lost or reduced military benefits may serve as a disincentive for military spouse victims to seek help in cases of abuse. Finally, prior interpersonal trauma is also indicated as a risk factor for both perpetrators and victims. Some data suggest that women who have experienced abuse in childhood may be more likely to join the military to escape a violent or unstable home environment. At the same time, some factors unique to military service may mitigate IPV incidence. For example, access to health care (TRICARE), stable pay and benefits, and the availability of installation-based family support services may help with financial stability and early intervention for at-risk couples. In addition, military servicemembers who are perpetrators of abuse may face more immediate or severe sanctions for IPV than their civilian counterparts (e.g., reductions in pay, loss of employment, and/or benefits). Military commanders have broad discretion to impose administrative remedies, penalties, or referrals for judicial action for abusers under their command (see section on \" Commander's Authority \"). In this way, military commanders can play an important role in IPV intervention, and in establishing a climate where victims feel safe to report and perpetrators are held accountable. Prior to 1980, the military services (Army, Navy, Air Force, and Marine Corps) conducted their own family advocacy programs, primarily under their respective military medical service programs. In response to a 1979 U.S. General Accounting Office (now called the U.S. Government Accountability Office) report that characterized military service family violence prevention programs as inconsistent and understaffed, DOD established the Military Family Resource Center (MFRC) as a three-year demonstration project through a DOD-subsidized grant from the Department of Health and Human Services (HHS). In 1981, Congress first appropriated funds for DOD family violence prevention and between 1981 and 1983, responsibility for total funding of the program transitioned to DOD's sole responsibility. During that time, DOD also published Directive 6400.1, establishing the Family Advocacy Program and an Advocacy Committee with representatives from the services and DOD. Given the success of the MFRC demonstration and DOD's interest in consolidating programs under a single secretariat, DOD transferred MFRC activities to the Office of the Deputy Assistant Secretary of Defense for Force Management and Personnel in August of 1985. The Military Family Act of 1985 formally established an Office of Family Policy under the Office of the Secretary of Defense to \"coordinate programs and activities of the military departments to the extent that they relate to military families.\" Congress later amended and codified the act under Chapter 88 of Title 10, U.S. Code , in 1995 as part of the National Defense Authorization Act (NDAA) for Fiscal Year 1996 and renamed the Office of Family Policy as the Office of Military Family Readiness Policy. Currently, this office falls under the purview of the Office of the Under Secretary of Defense (USD) for Personnel and Readiness (P&R). Within USD (P&R), the Deputy Assistant Secretary of Defense for Military Community and Family Policy has oversight responsibility for military family programs, including domestic violence prevention and response. The military services implement domestic violence prevention and response through the Family Advocacy Program (FAP). Military law enforcement activities fall under the purview of USD (P&R) and the Defense Human Resource Activity (DHRA), while central incident databases are housed in the Defense Manpower Data Center (DMDC), also under DHRA. Currently, the Family Advocacy Program (FAP) is the designated program within DOD and the services to address \"domestic abuse, child abuse and neglect, andÂ  problematic sexual behavior Â in children and youth\" through prevention, awareness, treatment, and rehabilitation services. The military services implement the FAP. FAP managers also work in coordination with civilian agencies involved in domestic violence response. In 2016, Congress required the FAP to provide an annual report to Congress on child abuse and neglect and domestic abuse in military families. Family advocacy and family assistance programs are funded through annual appropriations as part of the Defense-wide Operation and Maintenance budget for DOD dependents education. DOD-requested FAP funds are directed to each of the military services to implement clinical intervention programs, \"in the areas of domestic abuse, intimate partner violence, child abuse and neglect, and problematic sexual behavior in children and youth.\" FAP funding also supports a DOD hotline for reporting allegations of child abuse, training for domestic violence responders and members of the chain of command, public awareness activities, support for obtaining civilian protection orders, and research on domestic violence prevention. According to DOD budget documents, defense-wide funding for family assistance supports programs and outreach services to include, but not limited to: the 1-800 Military OneSource call center; the Military and Family Life Counseling Program; financial outreach and non-medical counseling; Spouse Education and Career Opportunities; child care services; youth programs; morale, welfare and recreation programs and, support to the Guard and Reserve service members, their families, and survivors. Funding supports DoD-wide service delivery contracts to support all Active Duty, Guard, and Reserve Components. The total defense-wide funding request for family assistance and family advocacy for FY2020 was $877 million, an increase of 5.5% from the previous year (see Table 1 ). DOD policy requires specific credentialing for those assigned as FAP managers, including a master's or doctoral level degree in the behavioral sciences from an accredited U.S. university or college, state licensure, and certain experience. Service Secretaries are also responsible for establishing criteria for other FAP personnel, and for annual accreditation and certification of installation FAPs. According to DOD, the FAP is supported by over 2,000 government and contracted personnel. The CDC uses the term intimate partner violence (IPV) to describe \"physical violence, sexual violence, stalking and psychological aggression (including coercive acts)\" by a current or former spouse or dating partner. DOD often refers to IPV as domestic violence or domestic abuse. Domestic violence is defined as an offense with legal consequences under the U.S. Code , the UCMJ, and state laws, while domestic abuse refers to a pattern of abusive behavior. DOD defines four types of abusive behavior: (1) physical abuse, (2) emotional abuse, (3) sexual abuse, and (4) neglect of spouse (see text box below on \"DOD Definitions of Domestic Abuse and Domestic Violence\"). Under the DOD definition, a victim of domestic violence may be a current or former spouse, an intimate partner sharing a common domicile, or a person with whom the abuser shares a child. Under the CDC's definition, an intimate partner does not need to share a common domicile or child. DOD's narrower definition of what constitutes IPV correlates to victim and dependents' eligibility for certain benefits or services following an incident of reported abuse (see section below on \" Victim Support and Services \"). Sexual violence involving military personnel in which the offender and victim do not share a domicile, child, or other legal relationship (i.e., spouse or former spouse), is typically handled by DOD's Sexual Assault Prevention and Response (SAPR) program. DOD collects data on domestic abuse incidents through the FAP Central Registry, created by in 1994. In 1999, as part of the FY2000 NDAA, Congress explicitly mandated that DOD maintain a centralized database and collect annual reports from the Services on (1) Each domestic violence incident reported to a commander, a law enforcement authority of the armed forces, or a family advocacy program of the Department of Defense. (2) The number of those incidents that involve evidence determined sufficient for supporting disciplinary action and for each such incident, a description of the substantiated allegation and the action taken by command authorities in the incident. (3) The number of those incidents that involve evidence determined insufficient for supporting disciplinary action and for each such case, a description of the allegation. The military services collect data at the installation level. Each installation's FAP enters data into its respective service registry and then submits reports to the DMDC, which maintains the registry for all of DOD. Data elements include demographic information, individual identifiers (i.e., name and social security number), relationship indicators, incident details (e.g., location and date), and the type and severity of abuse. When an FAP office receives a report of domestic abuse, an incident determination committee (IDC) determines whether the incident \"met criteria\" to be submitted and tracked within the database. Incidents that do not meet the criteria for domestic abuse are also included in the database, but identifiable individual information is not tracked. DOD uses the aggregate data in this registry to produce annual reports to Congress, analyze the scope of abuse and trends, and support budget requests for domestic violence prevention resources. The FAP Central Registry is not the only database that includes domestic violence information involving military servicemembers. DOD also maintains the Defense Incident-Based Reporting System (DIBRS) as a central repository at DMDC for criminal incident-based statistical data. DIBRS includes criminal activity related to domestic abuse, but would typically not capture cases without law enforcement involvement. (See section on \" Crime Reporting to National Databases \" for more detail.) While GAO has highlighted concerns about gaps and overlaps in these two databases (see text box below on \"GAO Reviews of DOD Domestic Violence Data Collection Efforts\"), DOD has resisted consolidating them, stating that DIBRS and the Services' FAP Central Registries, from which the DoD Central Registry contains limited data elements, serve fundamentally different purposes: law enforcement and clinical treatment, respectively. [â¦] Using the FAP database for law enforcement data collection purposes will significantly degrade the perception of the FAP as a program that provides clinical assistance to troubled families. In some cases, the DOD's database for military sexual assault, the defense sexual assault incident database (DSAID) may also capture data on incidents of sexual abuse involving spouses or intimate partners. The prevalence of intimate partner sexual assault or stalking of servicemember victims may also be captured in DOD's annual workforce and gender relations (WGR) surveys. These surveys would not generally capture all types of domestic abuse, and surveys do not include military spouses. Therefore, while incidents of domestic abuse that are reported to FAP or other military officials are generally captured in the data, it is possible that the actual prevalence (including unreported incidents) within the military is higher than reported. The total active duty population is over 1.3 million, approximately 16% of whom are women. In addition, the total number of active duty military spouses is about 600,000, about 25% of which are age 25 or younger. Based on data collected by the services, there were 16,912 reported incidents of spouse and intimate partner abuse in FY2018. Of these, roughly half (8,039) of the reports met the criteria for abuse under DOD definitions, affecting 6,372 victims (see Figure 1 below). Physical abuse accounted for 73.7% of all met criteria incidents, followed by emotional abuse (22.6%). Sexual abuse and neglect accounted for a smaller proportion of domestic abuse incidents â 3.6% and 0.06% respectively. There has been little change in the rate or number of reported incidents that met criteria for domestic abuse since FY2009. While the total number of incidents in FY2018 is 19% lower than the number of incidents at the most recent peak in FY2011, the total force size also shrank during that time. In fact, the rate of incidents that met criteria for spouse abuse has not varied significantly since FY2008. While there are no clear trends in the number of incident reports, there are some indications that the categories of abuse being reported may have changed over the past eight years. The number of reported domestic abuse incidents involving sexual abuse has generally increased incrementally since FY2009, when DOD added this as a category for reporting (there was a slight drop in reported incidents in FY2018). This change in reporting may be due to a number of factors, including an actual increase in these types of IPV; cultural shifts in the perception of sexual abuse within existing relationships; and greater general awareness of sexual violence, reporting avenues, and available resources among military servicemembers, military-connected intimate partners, and first responders. Victims of reported abuse are predominately (two-thirds) female. About half of the victims who report ed spouse abuse to DOD and two-thirds who report ed intimate partner abuse were members of the military at the time the abuse took place ( see Table 2 below ). In FY201 8 , DOD reported 15 domestic abuse fatalities ( 13 spouses and 2 intimate partners) . Of the fatalities, three victims had previously reported abuse to DOD's FAP and four of the perpetrators had been reported previously for at least one prior abuse offense. Nine of the offenders were civilians with military victims. Servicemembers account for a majority of reported offenders. In FY2018, 57% of the reported spouse-abuse offenders were servicemembers. DOD-reported female offenders were more likely to be civilians, and were the perpetrators in 40% of physical spouse abuse incidents (see Table 3 ). This percent of female physical abuse offenders reported by DOD is higher than the literature would predict for the general population. Multiple studies suggest that women are less likely to be the primary perpetrator of physical violence in a relationship and that when they use violence it is nearly always in response to physical violence by their partner. However, it is unclear from the data if physical abuse perpetrated by women is retaliatory. Sexual abuse cases were almost entirely perpetrated by men (96%) which is consistent with the research. Perpetration of IPV in military partnerships may be underrepresented in DOD incident data, particularly if the victims are civilians, unmarried to the perpetrator, or not residing on a military installation. Incidents that occur outside of a military installation are less likely to be witnessed by military first responders and unmarried civilian intimate partners of a servicemembers are typically ineligible to be treated at military treatment facilities (MTFs). Coordination between civilian and military officials for domestic violence reporting is discussed in later sections (see \" Confidentiality: Restricted and Unrestricted Reporting \" and \" Community Coordination \"). National-level data suggest that intimate partner violence primarily begins at a young age: an estimated 71% of females and 58% of males reported having first experienced sexual violence, intimate partner physical violence, or stalking before the age of 25. In addition, approximately 23% of female victims reported having first experienced intimate partner violence before the age of 18. Similarly, rates of reported domestic abuse in the military are highest among junior enlisted (E-3 and below) families who are typically between the ages of 18 and 24. In FY2018, the rate of offenders in the grades of E-1 to E-3 was 15.1 per 1,000 married couples; in contrast to the overall rate of 5 per 1,000 married couples (see Figure 2 ). A number of factors complicate comparisons of military and nonmilitary IPV datasets, particularly the infrequent reporting of national civilian data and differences between how DOD and federal nonmilitary data are reported, collected, and aggregated. For example, each state may have different laws and processes for recording IPV, whereas all military branches use a common IPV definition and process. In addition, military members and their spouses and partners are, on average, younger than the general population. Therefore, direct (unweighted) comparisons of incident rates at the national or local level should be interpreted with some caution. Some studies, nonetheless, have compared IPV prevalence data across military and civilian populations. Since 2010, the CDC has conducted the National Intimate Partner and Sexual Violence Survey (NISVS), which collects data from adult men and women on past-year and lifetime experiences of sexual violence, stalking, and intimate partner violence at the state and national levels. In 2010, CDC randomly sampled military women and wives of active duty members to compare IPV prevalence rates among civilians, military women and military spouses and generally found similar prevalence rates across the populations. Where there were differences, active duty women were generally found to have a decreased risk of IPV relative to the civilian population. Nevertheless, active duty women who were deployed in the previous three years were significantly more likely to have experienced physical and sexual IPV compared with those who had not deployed. DOD has focused on a number of activities to prevent IPV and mitigate the escalation and repetition of violence or abuse following an initial offense. The CDC has identified several individual, relationship, community, and societal risk factors for domestic violence (see Appendix B ) . Some of these risk factors are inherent in the military environment. For example, youth is considered a risk factor, and the bulk of servicemembers are recruited and enlisted or appointed between the ages of 17-26. On the other hand, military protocols for entry screening, education and training, and support structures may provide protective factors and deterrence. DOD and the services use medical, cognitive, and other qualification standards to screen those seeking entry into the Armed Forces for IPV risk factors. For example, DOD medical standards generally prohibit enlistment or appointment of individuals with a history of personality or behavioral disorders. In addition, a history of drug or alcohol abuse can be a disqualifying factor. Past misconduct and criminal convictions can also disqualify individuals. Those disqualified from service may request a conduct waiver, which typically requires specific information about the offense(s) and \"letters of recommendation from responsible community leaders, such as school officials, clergy, and law enforcement officials, attesting to the applicant's character or suitability.\" Convicted domestic violence offenders, on the other hand, are typically ineligible for conduct waivers, pursuant to the Lautenberg Amendment Gun Control Act of 1968. Domestic battery or other violent offenses committed without conviction may also be disqualifying. In recent years, as recruiting quantity targets have increased to force end-strength numbers, the Services, and particularly the Army, have increased the use of conduct, and other waivers. Some have questioned whether those with waivers for any kind of misconduct (e.g., drug, alcohol, or traffic violations) are at higher risk for misconduct offenses while serving in the military. One study of Army enlistments between 2003 and 2008 found that while those with conduct waivers for any reason did have higher rates of alcohol and drug-related offenses, the waivers were not significantly associated with substantiated incidents of domestic abuse. Prevention programs for domestic violence include education and training components, some of which are required in both law and policy. The FY2000 NDAA required DOD to establish a standard training curriculum for commanding officers on handling domestic violence cases. In a 2004 memorandum, the USD (P&R) also required specialized training for military chaplains on confronting a potential domestic violence situation. The Family Advocacy Program (FAP) is charged with promoting awareness of domestic abuse through education, training, and information dissemination. Training for commanders, troops, counselors, and health care personnel typically focuses on increasing awareness of IPV warning signs and appropriate responses. Training for troops might include workshops or briefings on healthy relationships and family resiliency. Generally, domestic violence prevention training is not mandatory and is not applied uniformly across and within the services. The military services have experimented with tailored education programs for higher-risk demographics. The Navy, for example, has initiated a series of workshops on relationship abuse awareness and prevention that targets junior enlisted members. DOD's Military Onesource website also offers a range of self-serve resources and tools to learn more about domestic violence. Relationship stressors are indicated as risk factors for IPV. Part of DOD's prevention activities include no-cost, nonmedical, confidential counseling services for members and their families through the Military and Family Life Counseling (MFLC) program. These services are part of DOD's prevention activities and include relationship counseling, anger/conflict management, and deployment adjustment (i.e., separation and reintegration). DOD provides these services through a contractor to active and reserve personnel and their immediate families at over 200 military installations or in nearby civilian community centers worldwide. Family life counselors do not handle domestic abuse casesâthese are typically referred to the FAP and medical providers, as required. Members and their spouses may also participate in other service-level programs, like chaplain-led marriage retreats or family resiliency workshops under their installation's family readiness program. While commanders or others may refer couples to these programs, participation in them is generally optional. While prevention activities generally target the entire population, interventions are targeted at high-risk couples or individuals, or provided after a first alleged offense. Interventions include removing individuals and family members from any immediate risk of harm, initiating an investigation, ensuring ongoing safety, and preventing future escalation or offender recidivism. Response to domestic abuse often involves coordination among military commanders, law enforcement officials, health care personnel, social workers, and legal representatives. DOD policies outline specific roles and responsibilities for each of these responders. The FY2019 NDAA required the establishment of multidisciplinary teams on military installations to enhance collaboration in response and management of domestic abuse cases. The law requires each team to include (1) one or more judge advocates, (2) personnel from military criminal investigation organizations (MCIOs), (3) mental health professionals, (4) family advocacy caseworkers, and (5) other personnel as appropriate. When an incident is reported to the FAP, a team assesses the situation and coordinates clinical case management, including treatment, rehabilitation, and ongoing monitoring and risk management. FAP employees are typically professional social workers. According to DOD, there are over 2,000 funded positions across the military departments for delivery of FAP services, including \"credentialed/licensed clinical providers, Domestic Abuse Victim Advocates, New Parent Support Home Visitors, and prevention staff.\" Once a servicemember has allegedly committed an act of domestic violence, and it is reported to the member's commander, the commander is responsible for holding the perpetrator accountable and taking actions to protect the victim. The commander may, for example, issue a military protective order (MPO) to help ensure the victim's safety. An MPO generally prohibits contact between the alleged offender and the domestic violence victim. A servicemember must obey an MPO at all times, whether inside or outside a military installation; violations may be subject to court martial or other punitive measures. The commanding officer may also restrict an accused servicemember to a ship or to his or her barracks to keep the parties separate. There may be some cases when the victim is a servicemember and the alleged abuser is a civilian. Commanders cannot issue an MPO for civilians, but may arrange for temporary housing on the installation for the servicemember victim and bar the accused civilian from installation access. While military commanders have a high degree of control over the activities on an installation, they typically lack jurisdiction over events in civilian communities. Approximately 63% of military personnel live in private housing located outside of a military installation. Because of this, coordination between military and civilian law enforcement authorities is often required to provide for victim safety. The FY2000 NDAA included a provision to create incentives for collaboration between military installations and civilian community organizations working to prevent and respond to domestic violence. In 2002, Congress required that civilian protection orders (CPOs) have full force and effect on military installations. This means that if a servicemember violates the terms of a CPO, he or she may be subject to disciplinary actions under the UCMJ, in the same way as if violating an MPO. Military commanders, by regulation, are also encouraged to issue an MPO to support an existing CPO, or to provide some protection to a victim while the victim pursues a CPO. MPOs are unenforceable by civilian law enforcement. In 2008, however, Congress required the commander of a military installation to notify civilian authorities when an MPO is issued, changed, or terminated with respect to individuals who live outside of the installation. Procedures for coordination and information-sharing between military and local officials are established through formal memoranda of understanding (MOUs). In an effort to protect servicemembers reporting sex-related offenses from retaliation, Congress required in 2011 that DOD develop policies and procedures for consideration of station changes or unit transfers of active duty member victims who report sex-related offenses under the UCMJ. Per statute, an individual's commanding officer must approve or disapprove an application for transfer within 72 hours of submission. If the commander disapproves the transfer, the applicant may request review from the first general officer in the chain of command. The law requires a decision from the general officer within 72 hours of the submission of the request. Congress expanded the application of such transfer policies and procedures to cover military servicemembers who are victims of physical or sexual IPV through the FY2018 NDAA. The act specified that transfer policies and procedures are to be implemented once abuse has occurred, irrespective of whether the offender is a member of the Armed Forces. In the FY2014 NDAA, Congress also added a provision that allows commanders and others with authority to reassign or remove from a position of authority individuals who are alleged to have committed or attempted sex-related offenses. The law is specific that reassignment action is \"not as a punitive measure, but solely for the purpose of maintaining good order and discipline within the member's unit.\" Advocates for this provision had argued that reassignment of the victim could be seen as penalizing the victim instead of the perpetrator. Covered offenses under the expedited transfer (10 U.S.C. Â§673) and administrative reassignment (10 U.S.C. Â§674) authorities currently do not include the UCMJ offense for domestic violence, which was added in 2018 as part of the FY2019 NDAA (See section below on \" Domestic Violence Punitive Article \"). In the past decade, DOD has developed methods for incident reporting, data collection, and analysis of IPV trends. There is some evidence to suggest, however, that the actual prevalence of domestic abuse in the military could be underreported. While DOD conducts annual surveys of servicemembers to determine the prevalence of sexual assault and harassment in the military, it does not conduct or report on similar surveys with the military spouse population or on the prevalence of non-sex-related abuse by intimate partners. Indeed, IPV prevalence can be difficult to measure, and within the academic literature there is a broad range of prevalence estimates for victimization and perpetration involving military servicemembers. One meta-analysis undertaken by the VA suggests that among active duty servicemembers, the 12-month prevalence of IPV perpetration was 22%, and victimization was 30%ârates higher than those of actual incident reports within DOD. Another (nonscientific) survey conducted by a military family advocacy group in 2017 found that 15% of the military and veteran family respondents did not feel physically safe in their relationship. Among those experiencing abuse, the survey found that \"87% of military spouse respondents did not report their physical abuse, citing their top two reasons for not reporting the abuse was that they felt it was not a big deal and they did not want to hurt their spouse or partner's career.\" Intimate partner abuse for the perpetrator is often connected with coercive control and monitoring of the victim's activities (e.g., controlling phone or email passwords, and restricting bank account access), and thus some victims may be fearful of seeking help. Confidentiality concerns, financial dependency, and lack of support structures can all create barriers to reporting IPV. Congress and DOD have taken some actions to try to reduce these barriers, to encourage victims to report, and to increase access to victim support services. Responding to concerns from military family members about confidentiality in reporting incidents of domestic abuse, Congress required in 1999 that DOD establish policies and procedures, which provide \"maximum protection for the confidentiality of dependent communications\" with service providers, such as therapists, counselors, and advocates. DOD has since developed distinct reporting streams that can accommodate varying levels of confidentiality. In an unrestricted reporting scenario, domestic abuse is reported to law enforcement, FAP, or the chain of command. Such a report would typically set off a sequence of actions to include a criminal investigation of the alleged offender. In some cases, a victim may be hesitant to trigger these events but may want to access support services in a confidential manner. In recognition that some victims may be deterred from reporting based on confidentiality concern, DOD has established a restricted reporting option. With some exceptions, this reporting option allows victims to disclose information to a victim advocate, victim advocate supervisor, or healthcare provider without that information being disclosed to other authorities. The restricted reporting options allows the victim time to access medical care, counseling, and victim advocacy services while providing some time to consider relationship choices and next steps. In 2003, as part of the FY2004 NDAA, Congress called for the development of a Victim Advocate Protocol for victims of Domestic Violence. Among other things, the Protocol requires victims of domestic abuse be notified of victim advocacy services and be provided access to those services 24 hours a day (either in person or by phone). Victim advocates play a substantial role in supporting the victim following a domestic violence incident. They help victims and other at-risk family members by developing a safety plan, referring them to ongoing care through military or civilian providers, and providing information on other resources (e.g., chaplain or legal services, transitional compensation). Victim advocates can be DOD employees, military contractors, or other civilian providers. A Special Victims' Counsel (SVC) or Victims' Legal Counsel (VLC) is a judge advocate or civilian attorney who satisfies special training requirements and is authorized to provide legal assistance to victims of sexual assault throughout the military justice process. Currently SVC/VLC services are not authorized for victims of domestic violence; however, recent legislative proposals have sought to expand such services to this population. A provision in the FY2019 NDAA required DOD to submit a report on feasibility and advisability of expanding SVC/VLC eligibility to victims of domestic violence and asked for an analysis of personnel authorizations with respect to the current case workload. DOD found that expanding this eligibility to domestic violence victims would \"significantly increase the caseload of SVC/VLC programs across the board.\" If SVC/VLC support were made available to victims of domestic violence, each of the military services \"would require additional SVC/VLC authorizations and sufficient time to train personnel to implement new mission requirements.\" Some spouses are wholly or highly financially dependent on their military intimate partner, possibly discouraging some victims from reporting IPV. Therefore, the prospect of the member being incarcerated or discharged from the military can provide a disincentive for an abused spouse to seek help. In a 1993 House Armed Services hearing on Victims' Rights, the Ranking Member noted that \"with few exceptions, when a military member is incarcerated because of violence or abuse, the family is cut loose by DOD and left without medical coverage, without counseling, without housing, without the support of the military community.\" Congress sought to redress this disincentive to reporting through the FY1994 NDAA, which authorized the temporary provision of monetary benefits, called transitional compensation , to dependents of servicemembers or former servicemembers who were separated from the military due to IPV. One of the motivating arguments for establishing the transitional compensation benefit was that it could provide a measure of financial security to spouses or former spouses. The provision was codified in 10 U.S.C. Â§1059 and applies to cases involving members who, on or after November 30, 1993 are separated from active duty under a court-martial sentence resulting from a dependent-abuse offense, separated from active duty for administrative reasons if the basis for separation includes a dependent-abuse offense, or sentenced to forfeiture of all pay and allowances by a court-martial that has convicted the member of a dependent-abuse offense. Transitional compensation payments are exempt from federal taxation, provided at the dependency and indemnity compensation (DIC) rate, and authorized for at least 12 months but no more than 36 months . For individuals to be eligible, they must be current or former dependents of servicemembers, including spouses, former spouses, or dependent children. Intimate partners who are not or were never married to servicemembers are generally ineligible to receive compensation from DOD. While in receipt of transitional compensation, dependents are also entitled to military commissary and exchange benefits, and may receive dental and medical care, including mental health services, through military facilities as TRICARE beneficiaries. Recipients of transitional compensation benefits must certify eligibility on an annual basis to retain payments. In addition, payments will cease if the eligible spouse or former spouse remarries, on the date of remarriage, cohabitates with the servicemember after punitive or other adverse action has been executed, or is found to have been an active participant in the conduct constituting the criminal offense, or actively aided or abetted the member in such conduct against a dependent child. Payments may also cease if a court-martial sentence is remitted, set aside, or mitigated to a lesser punishment. Spouses or former spouses may not receive both transitional compensation and court-ordered payments of retired pay and must elect to receive one or the other of those benefits, if applicable. A military servicemember typically becomes eligible for a pension from the federal government after 20 years of service. Under the Uniformed Services Former Spouses Protection Act (USFSPA), up to 50% of the member's disposable military retired pay may be awarded by court order to a former spouse in a divorce settlement. In some cases, a member may be eligible for retired pay by virtue of longevity in service; however, punitive actions in response to member misconduct may terminate eligibility for retired pay. In 1992, Congress authorized the military departments to make court-ordered payments of an amount of disposable retired pay to abused spouses or former spouses in cases where the member has eligibility to receive retired pay terminated due to misconduct related to the abuse. So, for example, if a retired member, through court martial sentencing as a result of a domestic violence offense, becomes ineligible to receive retired pay, the Defense Finance and Accounting Service (DFAS) may still pay a court-ordered portion of what the member might otherwise be eligible for, to the member's spouse or former spouse. A spouse or former spouse, while receiving payments under this chapter, is also eligible to receive any other benefits a spouse or former spouse of a retired member may be entitled, including medical and dental care, commissary and exchange privileges, and the Survivor Benefit Plan. In situations where a servicemember is the perpetrator of violence, the commanding officer may restrict that individual to the barracks, ship, or other installation housing and issue MPOs (as discussed in section \" Military Protective Orders \". The primary objective is typically to remove the offender from the home, to protect the victim. On the other hand, there may be scenarios where commanders have less control over housing of the perpetrator (e.g., in the case where the offender is a civilian living outside an installation). In such cases, DOD policies also require that victim advocates facilitate provision of shelter and safe housing resources for victims. According to the services, commanders typically draw on a number of housing options on the installation (e.g., temporary lodging) or in the local civilian community (e.g., shelters, hotels, etc.). Military families move frequently to different assignments worldwide, often far away from family and support networks. Moving expenses for the family under a member's orders are paid by the Department of Defense. Generally, civilian spouses are only eligible for these benefits when the family moves together under the military sponsor's orders. For some abused spouses, it may be prohibitively expensive to independently execute a household move following a domestic abuse incident, particularly for those accompanying servicemembers stationed overseas. In 2003, as part of the FY2004 NDAA, Congress added a provision that allows for certain travel and transportation benefits for dependents who are victims of domestic abuse in the absence of military orders for a permanent change of station move. When relocation is advisable to ensure the safety of the victim, the Secretary of the military department concerned may authorize movement of household effects and baggage at the government's expense, plus travel per diem paid to the dependent. The authorization for these benefits allows for a move to an appropriate location in the United States or its possessions, or if the abused dependent is a foreign national, to their country of national origin. In 1984, the Crime Victims Fund (CVF, or the Fund) was established by the Victims of Crime Act (VOCA, P.L. 98-473 ) to provide funding for state victim compensation and assistance programs. The CVF does not receive appropriated funding. Rather, deposits to the CVF come from a number of sources including criminal fines, forfeited bail bonds, penalties, and special assessments collected by the U.S. Attorneys' Offices, federal courts, and the Federal Bureau of Prisons from offenders convicted of federal crimes. The largest source of deposits into the CVF is criminal fines. U.S. military servicemembers and their families are eligible for these victim assistance and compensation programs. The Office for Victims of Crime (OVC) within the Department of Justice (DOJ) administers the CVF. As authorized by VOCA, the OVC awards CVF money through formula and discretionary grants to states, local units of government, individuals, and other entities. Grants are allocated according to VOCA statute, and most of the annual funding goes toward the two VOCA formula grants: the victim compensation formula grant and victim assistance programs. The grants are distributed to states and territories according to guidelines established by VOCA. Victim compensation formula grants may be used to reimburse crime victims for out-of-pocket expenses such as medical and mental health counseling expenses, lost wages, funeral and burial costs, and other costs (except property loss) authorized in a state's compensation statute. Victims are reimbursed for crime-related expenses that are not covered by other resources, such as private insurance. Since FY1999, medical and dental services have accounted for close to half of the total payout in annual compensation expenses. In FY2017, \"the vast majority of applications related to a victimization (52,461 or 96%) were related to domestic and family violence.\" Victim assistance formula grants support a number of services for crime victims, including the provision of information and referral services, crisis counseling, temporary housing, and criminal justice advocacy support. States are required to prioritize the following groups: (1) underserved populations of victims of violent crime, (2) victims of child abuse, (3) victims of sexual assault, and (4) victims of spouse abuse. States may not use federal funds to supplant state and local funds otherwise available for crime victim assistance. According to the OVC, victims of domestic violence make up the largest number of victims receiving services under the victim assistance formula grant program. In FY2017, over five million crime victims were served by these grants, 43% of whom were victims of domestic and/or family violence. DOD and the Services have a general framework under the UCMJ, and other laws, for responding to violent offenses. DOD domestic abuse policies superimpose specific requirements onto this framework. Among other things, DOD policy states commanders are required to respond to reports of domestic abuse in the same manner as they would to credible reports of any other crime and must ensure that military service offenders are held accountable for acts of domestic violence through appropriate disposition under the UCMJ. Similarly, law enforcement and military criminal investigation personnel are required to investigate reports of domestic violence and respond to them as they would to credible reports of any other crime. In 1993, as part of the FY1994 NDAA, Congress specified certain responsibilities for military law enforcement officials in response to domestic violence. In particular, the law requires that in cases where there is evidence of physical injury, or where a deadly weapon or dangerous instrument has been used, officials must report the incident within 24 hours to the appropriate commander and to a local FAP representative. Military law enforcement includes both installation law enforcement (ILE), MCIOs, and the Defense Criminal Investigative Service (DCIS), which is an arm of the DOD Inspector General. The term defense criminal investigative organization (DCIO) is used to describe the military criminal investigative organizations and DCIS. Current DOD policy requires that either a MCIO or another appropriate law enforcement organization investigate domestic violence and specifies that MCIOs are to investigate all unrestricted reports of domestic violence involving sexual assault or aggravated assault with grievous bodily harm. A 2019 report by the Department of Defense Inspector General (DODIG) found that law enforcement response actions were generally consistent with DOD policies; however, the DODIG noted DCIOs did not consistently comply with DOD policies when responding to nonsexual domestic violence incidents involving adult victims (see Table 5 ). In particular, the audit revealed that responders often did not have necessary equipment for collecting and preserving evidence and that incident reports did not get proper supervisory review. In 22% of the reviewed cases law enforcement failed to report the incident to the FAP and in 82% of those cases failed to submit criminal history data to the Defense Central Index of Investigations (DCII), the Federal Bureau of Investigation (FBI) Criminal Justice Information Services Division (CJIS), and the Defense Forensics Science Center. (See discussion below under \" Crime Reporting to National Databases .\") In general, actions by the Navy Criminal Investigative Service (NCIS)âthe only MCIO included in the IG reportâwere more likely to be in compliance than those by military law enforcement. In the report, the Army and the Air Force do not distinguish between ILEs and MCIOs, and relevant criminal investigation jurisdiction policies for these military services show that their MCIOs do not have responsibility for investigating domestic violence. Presumably, with the exception of the NCIS data, all other data in the table are based on ILE responses to domestic violence incidents. Among other things, the DOD IG found that military service law enforcement organizations, largely ILE, did not consistently comply with DOD policies when responding to nonsexual domestic violence incidents involving adult victims. The IG findings and the data in the table appear to suggest that ILE are less proficient at domestic violence responses and investigations, whereas an MCIO, using NCIS as the sole example, is more proficient at responding to them. Law and policy require military law enforcement to provide certain crime reports to DOD and national crime databases throughout a criminal investigation of a servicemember. The Services are required to maintain automated information systems that comply with the Defense Incident-Based Reporting System (DIBRS), which complies with the FBI National Law Enforcement Data Exchange (N-DEx) System. The FBI's N-DEx system is a repository of criminal justice records and data from law enforcement agencies in the United States and it is managed by the FBI's Criminal Justice Information Service (CJIS). DIBRS captures criminal incidents of domestic violence that are reported to law enforcement in compliance with the following laws ; The Uniform Federal Crime Reporting Act of 1988, The Victims' Rights and Restitution Act of 1990, The Lautenberg Amendment to the Gun Control Act, and The Jacob Wetterling, Megan Nicole Kanka, and Pam Lychner Sex Offender Registration and Notification Program. DIBRS data is subsequently reported to the Federal Bureau of Investigation's National Incident-Based Reporting System (NIBRS). As repository for federal and state crime activity, NIBRS data is used for analyzing crime trends and developing policy approaches to reduce criminal activity. Specific records of investigations are located in the Defense Central Index of Investigations (DCII), an automated central index that identifies investigations conducted by DOD investigative agencies. DCII is typically used by DOD security and investigative agencies and other federal agencies to determine security clearance status and the physical location of criminal and personnel security investigative files. Per DOD policy for collating investigation data, MCIOs are responsible for Titling and indexing subjects of criminal investigations in the DCII when there is credible information that a subject of an investigation committed a criminal offense (under the UCMJ or any other federal criminal statute). Reporting disposition information within 15 days of final disposition of military judicial or nonjudicial proceedings; approval of a request for discharge, retirement, or resignation in lieu of court-martial; or, discharge resulting from anything other than honorable characterization of service based on investigations UCMJ violations. Submitting fingerprint cards and final disposition of investigations to the FBI CJIS regarding servicemembers investigated for violating an offense under the UCMJ, based on probable cause. While some domestic violence offenders in the military may be subject to local or host nation jurisdiction, active duty servicemembers worldwide may be held accountable for domestic violence offenses under the military justice system. The military justice system is established in Title 10 of the United States Code and is separate from and independent of the federal criminal justice system established in Title 28. Congress enacts this authority through the articles (statutes) that make up the UCMJ, under Chapter 47, of Title 10, U.S. Code . The President implements the UCMJ by executive order through the Manual for Courts-Martial (MCM). The MCM establishes detailed rules for administering justice. Among other things, The MCM contains the major components of military justice: Ju risdiction âCourt-Martial Convening Authority for the three levels of courts-martial and the jurisdiction of each one (chapter II, part II, MCM). Criminal Procedure Code âRules for Courts-martial provide for the administration of military justice (chapters III â XIII, part II, MCM). Rules of Evidence âMilitary Rules or Evidence established the evidential procedure for judicial proceedings at a court-martial (part III, MCM). Criminal Code âPunitive Articles in the UCMJ criminalize specific conduct (part IV, MCM). The MCM also includes the procedure for nonjudicial punishment (NJP) and maximum punishment information for each punitive article. The authority to prosecute or refer charges to court martial falls within the jurisdiction of a command and its commander. Commanders at every level are responsible for deciding whether to take action regarding misconduct occurring in a command over which they have authority. When addressing misconduct, a commander acts as an adjudicator of first instance to determine whether misconduct warrants disposition in a judicial, nonjudicial, or administrative process. A commander can also determine to take no action against an offender. These determinations are known as disposition decisions. They are made at the lowest level of command with direct authority over an offender, unless disposition authority is withheld by a higher-level commander. DOD requires all commanders to refer allegations of domestic violence by a victim, or credible reports of domestic violence by a third party, to an appropriate law enforcement organization. Law enforcement personnel must promptly complete a detailed written report of the investigation and forward it to the alleged offender's commander. The commander must then review the report and obtain advice from an appropriate legal officer before determining disposition. Upon review of the investigative report, the commander may refer the case to court-martial for trial. There are three courts-martial levels with jurisdiction over UCMJ offences. The first two levelsâsummary and special courts-martialâare courts of limited jurisdiction (minor and misdemeanor offenses). The third and highest levelâgeneral court-martialâis a court of general jurisdiction (felony offenses). A general court-marital can impose the maximum punishment prescribed for a crime in the UCMJ. A trial by general court-martial typically consists of a military judge, prosecutor, defense counsel, and members. The members are a panel of servicemembers who can render guilty or not guilty verdicts, like a civilian jury, and make sentencing decisions, unlike a civilian jury. The punitive articles in the UCMJ are the offenses that fall within the jurisdiction of a court-martial. Prior to 2019, domestic violence offenses were typically prosecuted under the general offense of assault under Article 128 (Assault). Congress amended the UCMJ in the National Defense Authorization Act for Fiscal Year 2019 by adding a specific punitive article for domestic violenceâArticle 128bâeffective on January 1, 2019. This punitive article prescribes punishment, as a court-martial may direct, for any person subject to UCMJ jurisdiction who: (1) commits a violent offense against a spouse, an intimate partner, or an immediate family member of that person; (2) with intent to threaten or intimidate a spouse, an intimate partner, or an immediate family member of that person- (A) commits an offense under [the UCMJ] against any person; or (B) commits an offense under [the UCMJ] against any property, including an animal; (3) with intent to threaten or intimidate a spouse, an intimate partner, or an immediate family member of that person, violates a protection order; (4) with intent to commit a violent offense against a spouse, an intimate partner, or an immediate family member of that person, violates a protection order; or (5) assaults a spouse, an intimate partner, or an immediate family member of that person by strangling or suffocating; Article 128b generally requires a threat or violent offense or the specific act of strangulation or suffocation to trigger the UCMJ. Research has found that strangulation is an associated risk factor for intimate partner homicide of female victims. After a guilty verdict or plea, and without delay, a court-martial imposes a sentence that is within its authority and discretion. Specific punishments for UCMJ offenses tried by a court-martial are reprimand; forfeiture of pay and allowances; fine; reduction in pay grade; restriction to specified limits; hard labor without confinement; confinement; punitive separation; and death. A single punitive article can include a range of offenses from minor to serious; the maximum punishment increases as the severity of the offense increases. As noted above, domestic violence was previously included in the general assault article (Article 128) before it became a nominative offense under Article 128b. Punishment under Article 128 includes a maximum punishment as low as three months for simple assault and a maximum punishment as high as dishonorable or bad conduct discharge, total forfeitures, and 20 years' confinement, for assault with intent to commit specified offenses, such as murder, rape, and rape of a child. Domestic violence was distinguishable from other types of assault under Article 128 (Assault) by the greater severity of its punishment. DOD has not yet amended the most recent MCM issued in 2019 to include a maximum punishment for Article 128b (Domestic Violence), which became law around the time DOD issued the 2019 MCM. The Military Rules of Evidence (MRE) are established by executive order as part of the Manual for Courts-Martial. They are analogous to civilian rules of evidence, particularly the Federal Rules of Evidence. There are two rules within the MRE that specifically apply to domestic violence (i.e., privileged conversations with victim advocates, and testimony of children who witness an event). A victim who has suffered direct physical or emotional harm as the result of a sexual or violent offense has a privilege to refuse to disclose, and to prevent any other person from disclosing, a confidential communication made between the alleged victim and a victim advocate, or between the alleged victim and DOD Safe Helpline staff. The communication must have been made for the purpose of facilitating advice or assistance to the victim. A victim advocate is a person, other than a trial counsel, any victims' counsel, law enforcement officer, or military criminal investigator in the case, who is appropriately designated as such. If a child is a victim or witness of domestic violence, a military judge must allow remote live testimony if the judge finds on the record that It is necessary to protect the welfare of the particular child witness; The child witness would be traumatized, not by the courtroom generally, but by the presence of the accused; and, The emotional distress suffered by the child witness in the presence of the accused is more than slight. To make these findings a \"military judge may question the child in chambers, or at some comfortable place other than the courtroom, on the record for a reasonable period of time, in the presence of the child, a representative of the prosecution, a representative of the defense, and the child's attorney or guardian ad litem.\" Remote live testimony is not required if the accused voluntarily excludes himself or herself from the courtroom. The consequences of intimate partner and domestic violence to servicemembers and families can be severe and even fatal. Congress has taken a number of actions over the past three decades to expand the provision of prevention and support responses, improve data collection and monitoring of IPV prevalence, deepen civilian and military collaboration on addressing and monitoring IPV, among other things. In the 116 th Congress, there have been several proposals to augment services for military-connected IPV victims. Nevertheless, recent reports and testimony have identified several ongoing issues for oversight. These include Community coordination, Coverage and access to victim services, Law enforcement response, Data collection federal reporting requirements , and Mitigating risk factors. In many IPV cases involving the military, the abused or the abuser is a civilian, and incidents happen both on and off military installations. The UCMJ applies worldwide to active duty servicemembers; however, local, state, and foreign governments (for members serving in foreign countries) may have overlapping jurisdiction for domestic violence response, investigation, and prosecution. Local law enforcement authorities may have different protocols for domestic violence response depending on the location. Domestic violence victim advocates have often asserted that insufficient coordination between military and state/local authorities threatens the safety of victims when they move between installations and the civilian community. DOD regulations require certain information to be shared between installation commanders and local authorities, but it is unclear if processes for information sharing are consistent across bases and if gaps are sufficiently addressed. For example, at a September 2019 House hearing, a representative of a victims' advocacy group noted that while CPOs are given full force and effect on military installations, victims may not know whom to notify on the installation that they have a CPO and that everyone involved needs clear registration procedures. While there have been a number of efforts to improve and expand victim services, there may still be some barriers to coverage and access. A 2019 study based on interviews of FAP personnel found that there was variation in the services offered across services and installations with smaller installations sometimes lacking a full range of programs. The study also found that, on average, FAP offices are open five days a week for approximately 41 hours per week, with a small portion (3%) offering weekend hours. Some FAP personnel noted that these hours may make it difficult for working civilian spouses, or those in need of childcare, to be able to attend counseling appointments. In addition, some servicemembers and spouses may not be aware of their eligibility for services. In 2019 testimony to the House Armed Services Military Personnel Subcommittee, an IPV survivor noted that during the period of her abuse, she was not aware of the FAP or other services available to her. The 2019 FAP study also found that public awareness and outreach activities, \"are not a strong emphasis of [FAP] programming.\" In terms of coverage, some military-connected IPV victims may not be eligible for services under existing law and policy. For example, unmarried civilian intimate partners of a servicemember would not typically have access to military relationship counseling services, military health care, transitional monetary benefits, or other resources on the installation. In addition, due to the part-time nature of their work, members of the Reserve Component and intimate partners of members, may not have consistent access to installation resources and mental/behavioral health coverage. For example, the National Guard has reported that it does not offer a curriculum on Domestic Abuse Response and Intervention Training; rather, it relies on FAP services of its parent services (Army and Air Force) for members called to duty on federal orders. Finally, another aspect to consider is the period of transition during discharge or separation from the military. Military veterans, including retirees and their civilian spouses are generally not eligible for FAP services but may be eligible for some services through the VA. For example, he VA does offer some social work programs including the Veteran Health Administration's Intimate Partner Violence Assistance Program. DODIG's 2019 findings of deficiencies in military law enforcement response to domestic violence incidents (as discussed in \" DODIG Review of Law Enforcement Actions \") suggest that further congressional oversight of DOD actions in this area could be warrented. DOD domestic violence policy requires the DODIG to develop relevant policy for MCIOs and to oversee their investigations of domestic violence, similar to DODIG responsibility for sexual assault investigations. Current DODIG policy assigns MCIOs responsibility for initiating a criminal investigation in response to all allegations of adult sexual assault, a serious offense under the UCMJ. That is, these investigations are not within the jurisdiction of installation law enforcement. There was no similar mandate for all allegations of domestic violence under Article 128 (Assault), with the exception of unrestricted reports of domestic violence involving sexual assault or aggravated assault with grievous bodily harm. If the maximum punishment of Article 128b were to be established at one year or moreâa serious offense âsuch a move may preclude investigations by installation law enforcement investigators whose investigative jurisdiction is limited to minor offenses with punishment for a year or less. Several DODIG and GAO reports have raised concerns with DOD data collection, management, and reporting to internal DOD and federal databases. The reliability of data can have implications for congressional oversight and funding, in terms of accurate estimates of the size and scope of IPV issues and identifying high-risk military populations for targeted programs. While DOD and the services have undertaken efforts to improve the quality and reliability of data, this is a potential area for continued oversight and audit. Questions also remain as to whether those responsible for entering data into the various systems (i.e., law enforcement, FAP personnel) are adequately trained on their statutory and regulatory obligations. Consideration may be given as to whether incident data accurately captures IPV that goes unreported to the FAP, or if further surveys or studies of the military spouse population are needed. In addition, proper entry of criminal data is necessary for adequate enforcement of other laws, for example, those prohibiting convicted IPV offenders from purchasing firearms. Another way to address IPV prevention is to address risk factors. One method is through DOD programs and policies that help to improve family stability and resiliency and promote a positive and supportive command climate. From a broad perspective, any actions to reduce personnel tempo (PERSTEMPO), whether through fewer deployments, more time at home station between deployments, or through fewer unaccompanied assignments can help to reduce family stresses associated with departure and reintegration. Another option for reducing stress on military families is to manage permanent change of station (PCS) moves to extend time on station. Frequent moves can impair social support networks and have been found to have a negative impact on spousal employment and earnings. While personnel management efforts could be made to reduce deployments and PCS moves, national security concerns may sometimes necessitate high PERSTEMPO. DOD and the services have several other programs to support families, for example, child and youth programs (e.g., subsidized child-care services), spouse employment assistance, and other family readiness services. In Congress's oversight and appropriations roles, one area of consideration is whether these programs are funded at appropriate levels given current or anticipated demands on military servicemembers. Finally, given the military commander's unique authority, the command climate he or she establishes within a unit is an important aspect of IPV prevention. DOD policies specify that military commanders have a duty for care not only of their troops, but also of the troop's families. Commanders may address issues among the troops through positive reinforcement of healthy relationships and attitudes or through punitive administrative actions. The CDC has identified problematic gender norms as a potential risk factor for IPV. Some reporting has identified prevailing negative stereotypes, attitudes, and memes directed at the military spouse community. Commanders can have significant influence on acceptable and unacceptable behavior in the workplace. In addition, several abused spouses have testified that they felt their partner's commander did not provide adequate support, follow established procedures, or take complaints of abuse seriously. In cases where victims of IPV are servicemembers, there may also be concerns about retaliation from a commander or military peers for reporting or seeking helpâparticularly if the offending spouse is also a military servicemember. One response to this might be a survey of IPV victims to better understand their perceptions of command response and their experiences with other responders such as victim advocates and law enforcement or military justice personnel. Similar surveys have been done with victims of sexual assault. Options to remedy concerns about commander response may be to require higher-level review of IPV complaints, or to enhance protections from retaliation against those who report IPV. Appendix A. Selected Legislation Appendix B. CDC Risk Factors for Intimate Partner Violence Individual Risk Factors Low self-esteem Low income Low academic achievement Young age Aggressive or delinquent behavior as a youth Heavy alcohol and drug use Depression Anger and hostility Antisocial personality traits Borderline personality traits Prior history of being physically abusive Having few friends and being isolated from other people Unemployment Emotional dependence and insecurity Belief in strict gender roles (e.g., male dominance and aggression in relationships) Desire for power and control in relationships Perpetrating psychological aggression Being a victim of physical or psychological abuse (consistently one of the strongest predictors of perpetration) History of experiencing poor parenting as a child History of experiencing physical discipline as a child Relationship Factors Marital conflict: fights, tension, and other struggles Marital instability: divorces or separations Dominance and control of the relationship by one partner over the other Economic stress Unhealthy family relationships and interactions Community Factors Poverty and associated factors (e.g., overcrowding) Low social capital: lack of institutions, relationships, and norms that shape a community's social interactions Weak community sanctions against IPV (e.g., unwillingness of neighbors to intervene in situations where they witness violence) Societal Factors Traditional gender norms (e.g., women should stay at home, not enter workforce, and be submissive; men support the family and make the decisions) Appendix C. Acronyms", "summary": "Intimate partner violence (IPV) is a national public health issue. IPV is also a crime characterized by recidivism and escalation, meaning offenders are likely to be repeat abusers, and the intensity of the abuse or violence is likely to grow over time. Like the broader phenomenon of domestic violence and abuse, a subset of which includes IPV, associated physical and mental trauma for those who are victims of abuse, as well as for those minor children who witness the abuse, can have both immediate and long-term health effects and significant costs to society. When military servicemembers are involved as either victims or perpetrators of IPV, the consequences of IPV can also harm unit readiness. Congress has constitutional authority to fund, regulate, and oversee the Armed Forces, including the military justice system. Congress has used this authority in recent years to mandate domestic violence prevention and victim response policies, programs, and services. In addition, Congress has acted to improve accountability measures for military perpetrators through statutory changes to the Uniform Code of Military Justice (UCMJ). Within the Department of Defense (DOD), IPV may include domestic violence and domestic abuse. Domestic violence is defined as an offense with legal consequences under the U.S. Code , UCMJ, and State laws, while domestic abuse refers to a pattern of abusive behavior. Within DOD, the Family Advocacy Program (FAP) is responsible for clinical assessment, supportive services, and treatment in response to domestic abuse, child abuse, and neglect in military families. Military responses to incidents of IPV may involve military law enforcement, unit or installation commanders, and military health personnel. In some cases, military and civilian officials may coordinate additional responses to IPV. In FY2018, DOD reported 16,912 incidents of spouse and intimate partner abuse (the active servicemember population totals over 1.3 million). Roughly half (8,039) of these incident reports met the criteria for abuse under the DOD definition. Some of these incidents have severe consequences. In FY2018, there were 15 confirmed domestic abuse fatalities involving military personnel as perpetrators or victims; in three of the cases, the victims had reported prior incidents of abuse to FAP personnel. Congress has taken numerous actions over the past few decades to address risk factors for IPV among the servicemember population, to raise awareness, to protect victims, and to hold perpetrators accountable. More recently, in the 116 th Congress, lawmakers added a punitive article to the UCMJ specifically for domestic violence offenses (prior offenses had been prosecuted under the punitive article for assault). As Congress continues to consider policy issues related to IPV, areas for continued oversight include community coordination in prevention and response, coverage and access to military-sponsored victim services, the appropriateness of law enforcement response, data collection and federal reporting requirements, and other programs that can help mitigate risk factors for IPV.", "document_type": "crs"}
{"report": "The Senate's procedures are not based solely on its standing rules. Rather, the foundations of Senate procedure also include the body's standing orders, published precedents, rulemaking statutes, constitutional mandates, committee rules, party conference rules, and informal practices. Various reference sources provide information about how and when these procedural authorities of the Senate govern specific parliamentary situations, and together, they establish the framework by which the Senate conducts its business. This report discusses the contents, format, and availability of reference sources that provide information about contemporary procedures in the Senate. The report covers official documents that set forth the Senate rules, precedents, or other sources of parliamentary authority, such as the Senate Manual , Riddick's Senate Procedure , and the rules adopted by Senate committees. The report also discusses publications on procedure from committees and offices of the Senate and the rules of the Senate's party conferences. Prior to describing the individual parliamentary reference sources, this report reviews some principles of Senate parliamentary procedure that are applicable when using and evaluating information from these sources. The report then covers the Senate's official parliamentary reference sources. These are documents that set forth authoritative statements of Senate rules, procedures, and precedents. Senators often cite these official sources when raising a point of order or defending against one. Finally, the report reviews the rules of the party conferences, as well as a number of additional publications of committees and other offices of the Senate. Although these resources do not themselves constitute official parliamentary authorities of the Senate, they nevertheless provide background information on official parliamentary authorities. Text boxes throughout the report provide information on how to consult a source, or group of sources, with an emphasis on online access. This report aims to present access points to these reference sources that are relevant for Senators and congressional staff and does not present an exhaustive list of websites and other locations where these references can be found. Two appendixes supplement the information on parliamentary reference sources provided throughout the report. Appendix A provides a selected list of CRS products on Senate procedure. An overview of the two primary websites through which many of the resources included in this report can be accessed is provided in Appendix B . This report assumes a basic familiarity with Senate procedures. Official guidance on Senate procedure is available from the Office of the Senate Parliamentarian. CRS staff can also assist with clarifying Senate rules and procedures. The Senate applies the regulations set forth in its various parliamentary authorities in accordance with several principles that remain generally applicable across the entire range of parliamentary situations. Among these principles may be listed the following: (1) Senate procedures derive from multiple sources; (2) the Senate has the constitutional power to make its own rules of procedure; (3) Senators must often initiate enforcement of their rules; (4) the Senate conducts much of its business by unanimous consent; (5) the Senate usually follows its precedents; and (6) the Senate adheres to many informal practices. Each of these principles is discussed below. The standing rules of the Senate may be the most obvious source of Senate parliamentary procedure, but they are by no means the only one. Other sources of Senate procedures include: requirements imposed by the Constitution, standing orders of the Senate, precedents of the Senate, statutory provisions that establish procedural requirements, rules of procedure adopted by each committee, rules of the Senate's party conferences, procedural agreements entered into by unanimous consent, and informal practices that the Senate adheres to by custom. In order to answer a question about Senate procedure, it is often necessary to take account of several of these sources. For example, Rule XIX of the Senate's standing rules provides that \"the presiding officer shall recognize the Senator who shall first address him.\" When several Senators seek recognition at the same time, however, there is precedent that \"priority of recognition shall be accorded to the majority leader and minority leader, the majority manager and minority manager, in that order.\" This precedential principle can have consequences on the Senate floor. For example, it allows the majority leader the opportunity to be recognized to offer the debate-ending motion to table or to propose amendments. Familiarity with this Senate practice, and not the standing rule alone, is key to an understanding of how the Senate conducts its business. Article I of the Constitution gives the Senate the authority to determine its rules of procedure. There are two dimensions to the Senate's constitutional rulemaking authority. First, the Senate can decide what rules should govern its procedures. The Senate exercises this rulemaking power when it adopts an amendment to the standing rules, or creates a new standing rule, by majority vote. The Senate also uses its rulemaking power when it creates standing orders and when it enacts rulemaking provisions of statutes such as those included in the Congressional Budget and Impoundment Control Act of 1974. Standing orders and rulemaking provisions of law have the same standing and effect as the Senate's standing rules, because all are created through an exercise of the Senate's constitutional rulemaking authority. The second dimension to the Senate's rulemaking authority is that the chamber can decide when its rules of procedure should not govern. In practical terms, this means the Senate can waive its rules by unanimous consent. Under a provision of Senate Rule V, the body can also suspend its rules by a two-thirds vote, although this course is procedurally difficult and rare. The Senate has no established means to supersede its rules by majority vote, an option that is available to the House through the adoption of a \"special rule.\" The Senate can achieve the effect of waiving a rule if a majority votes either to overrule a decision of the presiding officer to sustain a point of order or, instead, votes not to sustain a point of order that has been submitted to the Senate for decision. Action of this kind not only sets the rule aside for the immediate situation but also thereby establishes a precedent to govern subsequent rulings of the presiding officer regarding the meaning and applicability of that rule. The Senate's presiding officer (whether it is the Vice President or a Senator of the majority party) does not always call a violation of Senate rules to the chamber's attention. The Senate can violate its procedures unless a Senator, at the right moment, makes a point of order that the proposed action violates the standing rules, a constitutional provision, or another authoritative source of procedure (i.e., standing order, rulemaking statute, or unanimous consent agreement). When a point of order is raised, the presiding officer usually makes a ruling without debate. Under Rule XX, the presiding officer has the option of submitting \"any question of order for the decision of the Senate.\" This is rare but may occur if the existing rules and precedents do not speak clearly on the parliamentary question at hand. Any Senator can appeal the ruling of the presiding officer on a point of order. The Senate might then decide, usually by majority vote, to uphold or overturn the presiding officer's decision. This vote establishes a precedent that guides the presiding officer in deciding future questions of order unless this precedent is overturned by another decision of the Senate or by a rules change. Some rulemaking statutes require a supermajority vote to overturn on appeal the presiding officer's ruling on a point of order. Parliamentary actions taken on the basis of an informal practice, or pursuant to a rule of one of the Senate's party conferences, are not enforceable on the Senate floor. While informal practices and party conference rules can affect actions taken in Senate committee and the Senate floor, they are not invoked through an exercise of the Senate's constitutional rulemaking authority. Hence, they do not have the authority of Senate rules and procedures. Informal practices evolve over the years as custom and party conference rules are adopted and enforced by each party. The Senate's standing rules emphasize the rights of individual Senators, in particular by affording each Senator the right to debate at length and the right to offer amendments that are not relevant to the bill under consideration. It would be difficult for the Senate to act on legislation in a timely fashion if Senators always exercised these two powerful rights. For this and other reasons, the Senate often agrees, by unanimous consent, to operate outside its standing rules. In practice, Senate business is frequently conducted under unanimous consent (UC) agreements. UC agreements may be used to bring up a measure, establish how the measure will be considered on the floor, and control how the Senate will consider amendments. Given the fact that it takes only one Senator to object to a UC agreement, each agreement is carefully crafted by the majority leader in consultation with the minority leader, leaders of the committee with jurisdiction over the bill in question, and other Senators who express an interest in the legislation. The agreement is then orally propounded on the floor, usually by the majority leader, and takes effect if no Senator objects. Once entered into, a UC agreement has the same authority as the Senate's standing rules and is enforceable on the Senate floor. Consent agreements have the effect of changing \"all Senate rules and precedents that are contrary to the terms of the agreement.\" Once entered into, UC agreements can be altered only by unanimous consent. The published precedents of the Senate detail the ways in which the Senate has interpreted and applied its rules. The precedents both complement and supplement the rules of the Senate. As illustrated by the example of according priority recognition to the majority leader, it may be necessary to refer to the precedents for guidance on how the Senate's rules are to be understood. The brevity of the Senate's standing rules often makes the body's precedents particularly important as a determinant of proceedings. Precedents are analogous to case law in their effect. Just as attorneys in court will cite previous judicial decisions to support their arguments, Senators will cite precedents of the Senate to support a point of order, defend against one, or argue for or against an appeal of the presiding officer's ruling on a point of order. Similarly, the presiding officer will often support his or her ruling by citing the precedents. In this way, precedents influence the manner in which current Senate rules are applied by relating past decisions to the specific case before the chamber. Most precedents are established when the Senate votes on questions of order (i.e., on whether to uphold or overturn a ruling of the presiding officer or on a point of order that the presiding officer has submitted to the body) or when the presiding officer decides a question of order and the ruling is not appealed. Historically, the Senate follows such precedents until \"the Senate in its wisdom should reverse or modify that decision.\" Precedents can also be created when the presiding officer responds to a parliamentary inquiry. Precedents do not carry equal weight. Inasmuch as the Senate itself has the ultimate constitutional authority over its own rules, precedents reflecting the judgment of the full Senate are considered the most authoritative. Accordingly, precedents based on a vote of the Senate have more weight than those based on rulings of the presiding officer. Responses of the presiding officer to parliamentary inquiries have even less weight, because they are not subject to a process of appeal through which the full Senate could confirm or contest them. In addition, more recent precedents generally have greater weight than earlier ones, and a precedent that reflects an established pattern of rulings will have more weight than a precedent that is isolated in its effect. All precedents must also be evaluated in the historical context of the Senate's rules and practices at the time the precedents were established. Senators seeking precedents to support or rebut an argument may consult the Senate Parliamentarian's Office. Some Senate procedural actions are based on unofficial practices that have evolved over the years and become accepted custom. These practices do not have the same standing as the chamber's rules, nor are they compiled in any written source of authority. Although these unofficial practices cannot be enforced on the Senate floor, many of them are well established and customarily followed. Some contemporary examples of unofficial practices include respecting \"holds\" that individual Senators sometimes place on consideration of specific measures and giving the majority leader or a designee the prerogative to offer motions to proceed to the consideration of a bill, recess, or adjourn. The Senate Manual compiles in a single document many of the chief official parliamentary authorities of the Senate. The publication, prepared under the auspices of the Senate Committee on Rules and Administration, appears periodically in a new edition as a Senate document. The current edition, which was issued in the 113 th Congress, contains the text of the following parliamentary authorities (the titles given are those found in the Manual ): Standing Rules of the Senate; Nonstatutory Standing Orders Not Embraced in the Rules, and Resolutions Affecting the Business of the Senate; Rules for Regulation of the Senate Wing of the U.S. Capitol and Senate Office Buildings; Rules of Procedure and Practice in the Senate When Sitting on Impeachment Trials; Cleaves' Manual of the Law and Practice in Regard to Conferences and Conference Reports ; General and Permanent Laws Relating to the U.S. Senate; and Constitution of the United States of America. The following sections of this part of the report discuss each of these authorities in more detail. The Manual contains a general table of contents and an index. Some of the respective components in the Manual have their own tables of contents and indices that provide additional details about that source. Individual provisions of each procedural authority are assigned section numbers that run throughout the Manual in a single sequence and always appear in bold type. The section numbers assigned to the standing rules correspond to the numbers of the rules themselves. For example, paragraph 2 of Senate Rule XXII, which sets forth the cloture rule, is found at section 22.2 of the Manual . The indices to the Manual direct readers to these section numbers. The indices indicate, for example, that the motion to adjourn is covered in Manual sections 6.4, 9, and 22.1. For this reason, the document is cited by section number rather than page number. The Senate does not re-adopt its standing rules at the beginning of each new Congress but instead regards its rules as continuing in effect without need for re-adoption. The Senate follows this practice on grounds that it is a continuing body; only one-third of its membership enters on new terms of office after every biennial election, so a quorum is continuous. Changes to the standing rules are proposed in the form of Senate resolutions, which can be adopted by majority vote. At the start of the 116 th Congress, there were 44 standing rules of the Senate. The standing rules of the Senate are set forth at the beginning of the Manual . The standing rules appear with footnotes indicating amendments adopted since their last general revision in 1979. The footnotes cite the resolution adopted by the Senate to make the rules change. The Manual presents the standing rules with an itemized table of contents and a detailed, separate index. From time to time, the Senate adopts a resolution or agrees to a unanimous consent request to create a standing order of the Senate. A standing order, while not embraced in the standing rules, operates with the same authority as a standing rule and is enforceable on the Senate floor in the same way. A standing order remains in effect until repealed by the Senate unless otherwise specified in the order itself. The standing orders the Senate has created by adopting resolutions and that remain in effect are compiled in the Manual in sections 60-139. This is the only readily available compilation of permanent standing orders currently in effect. In addition to setting forth the text of these standing orders, the Manual provides (1) a heading stating the subject matter of each and (2) a citation to the Senate resolution(s) that created and amended it. Footnotes provide supplementary information, such as noting when references in the standing order (e.g., the name of a committee) were changed. The most voluminous component of the Manual presents a compilation of \"General and Permanent Laws Relating to the U.S. Senate.\" The statutory excerpts appear in their codified version (i.e., organized under the relevant title, chapter, and section of the United States Code ). The Manual provides a separate table of contents to the provisions included, but it sets forth the provisions themselves without citation or commentary. Although most of the selected provisions address the administration and operations of the Senate, some of them bear on questions related to Senate procedure, such as those concerning Senators' oaths of office, officers of the Senate, and investigative procedure in Senate committees. The compilation also includes \"rulemaking statutes,\" or statutory provisions that establish procedures for Senate action on specified measures. Rulemaking provisions of statute are discussed further in the section below on \" Rulemaking Statutes and Budget Resolutions .\" The U.S. Constitution imposes several procedural requirements on the Senate. For example, Article I, Section 5, requires the Senate to keep and publish an official Journal of its proceedings, requires a majority quorum to conduct business on the Senate floor, and mandates that a yea and nay vote take place upon the request of one-fifth of the Senators present. The Constitution also bestows certain exclusive powers on the Senate: Article II, Section 2, grants the Senate sole authority to provide advice and consent to treaties and executive nominations, and Article I, Section 3, gives the Senate the sole power to try all impeachments. The Manual presents the text of the Constitution and its amendments. The Manual places bold brackets around text that has been amended, and a citation directs readers to the Manual section containing the amendment. The Manual also provides historical footnotes about the ratification of the Constitution and each amendment, as well as a special index to the text. Senate Rule XXXIII authorizes the Senate Committee on Rules and Administration to make \"rules and regulations respecting such parts of the Capitol ... as are or may be set apart for the use of the Senate.\" The rule is framed to extend this authority to the entire Senate side of the Capitol complex and explicitly includes reference to the press galleries and their operation. Several of the regulations adopted by the Committee on Rules and Administration under this authority have a bearing on floor activity, including ones addressing (1) the floor duties of the secretaries for the majority and for the minority, (2) the system of \"legislative buzzers and signal lights,\" and (3) the \"use of display materials in the Senate chamber.\" The Senate has adopted a special body of rules to govern its proceedings when sitting as a Court of Impeachment to try impeachments referred to it by the House of Representatives. The Senate treats these rules, like its standing rules, as remaining permanently in effect unless altered by action of the Senate. On occasion, the Senate has adopted amendments to these rules. Cleaves' Manual presents a digest of the rules, precedents, and other provisions of parliamentary authorities governing Senate practice in relation to the functioning of conference committees and conference reports as they stood at the end of the 19 th century. Although rules and practices governing conferences to resolve legislative differences between the House and the Senate have since altered in many respects, and many of the precedents now applicable to conferences were established after Cleaves' Manual was prepared, many of the principles set forth in Cleaves' Manual still apply to current practice. As presented in the Senate Manual , Cleaves' Manual includes excerpts from the Manual of Parliamentary Practice prepared by Thomas Jefferson as Vice President at the turn of the 19 th century, as well as statements by other Vice Presidents and by Speakers, excerpts from Senate rules, statements of principles established by precedent, and explanatory notes. In addition, a section at the end sets forth forms for conference reports and joint explanatory statements. The page below displays an excerpt from the section of the Manual that presents the Constitution. The excerpt shows the format of the Manual , and the annotations explain some of the key features for using the reference, such as distinguishing between the Manual section numbers in bold text and the Manual page numbers at the bottom of the page. Riddick's Senate Procedure , often referred to simply as Riddick's , is the most comprehensive reference source covering Senate rules, precedents, and practices. Its principal purpose is to present a digest of precedents established in the Senate. The current edition, published in 1992, covers significant Senate precedents established from 1883 to 1992. It was written by Floyd M. Riddick, Parliamentarian of the Senate from 1964 to 1974, and Alan S. Frumin, Parliamentarian of the Senate from 1987 to 1995 and 2001 to 2012 and Parliamentarian Emeritus since 1997. As implied by its full title, Riddick's Senate Procedure: Precedents and Practices presents Senate precedents as well as discussions of the customary practice of the Senate. It is organized around procedural topics, which are presented in alphabetical order. For each procedural topic, the volume first presents a summary of the general principles governing that topic followed by the text of relevant standing rules, constitutional provisions, or rulemaking provisions of statute. Summaries of the principles established by individual precedents are then presented under subject headings and subtopics organized in alphabetical order. For example, the topic \"Cloture Procedure\" has a subject heading \"Amendments After Cloture,\" which is further divided into 18 topics, such as \"Drafted Improperly\" and \"Filing of Amendments.\" Footnotes provide citations to the date, the Congress, and the session when each precedent was established and to the Congressional Record or Senate Journal pages where readers can locate the pertinent proceedings (e.g., \"July 28, 1916, 64-1, Record , pp. 11748-50\"). Footnote citations beginning with the word see indicate proceedings based on presiding officers' responses to parliamentary inquiries. Citations without see indicate precedents created by ruling of the presiding officers or by votes of the Senate. An appendix to Riddick's Senate Procedure contains sample floor dialogues showing the terminology that Senators and the presiding officer use in different parliamentary situations. Examples of established forms used in the Senate (e.g., for various types of conference reports, the motion to invoke cloture) are also provided. Useful supplementary information appears in brackets throughout the appendix. The appendix also has a separate index. The publication's main index is useful for locating information on specific topics of Senate procedure. The table of contents lists only the main procedural topics covered in the book. In addition to the standing orders created by resolution, the Senate also establishes standing orders by agreeing to unanimous consent requests. These agreements usually make these standing orders effective only for the duration of a Congress or some other limited period. The current Senate practice is to adopt an established package of these standing orders at the beginning of each successive Congress. Standing orders of this kind are not included in the Senate Manual but appear only in the Congressional Record on the day they are adopted. For example, on the first day of the 116 th Congress in 2019, the Senate adopted 11 unanimous consent agreements re-establishing standing orders from the previous Congress on topics such as the procedures for allowing Members' staff access to the Senate floor during the consideration of matters and when the Senate Ethics Committee is permitted to meet. UC agreements also include orders that function as parliamentary authorities in the Senate. These consent agreements establish conditions for floor consideration of specified measures, which, in relation to those measures, override the regulations established by the standing rules and other Senate parliamentary authorities. Commonly, agreements of this kind may set the time for taking up or for voting on the measure, limit the time available for debate, or specify what amendments and other motions are in order. UC agreements constitute parliamentary authorities of the Senate because, once propounded and accepted on the Senate floor, they are enforced just as are the Senate's standing rules and other procedural authorities. UC agreements are propounded orally, and therefore, they are printed in the Congressional Record . Those that are accepted are printed at the front of the Senate's daily Calendar of Business and Executive Calendar until they are no longer in effect. Rule XXVI, paragraph 2, of the Senate's standing rules requires that each standing committee adopt written rules of procedure and publish these rules in the Congressional Record not later than March 1 of the first session of each Congress. Committee rules cover important aspects of the committee stage of the legislative process, such as the procedures for preparing committee reports and issuing subpoenas, and committees are responsible for enforcing their own rules. Subcommittees may also have their own supplemental rules of procedure. Committee rules of procedure do not supersede those established by the standing rules of the Senate. Each committee's rules appear in the Congressional Record on the day they are submitted for publication. Some committees also publish their rules in a committee print, or in the committee's interim or final \"Legislative Calendar,\" and many post them on their websites. In addition, the Senate Committee on Rules and Administration issues a document each Congress that compiles the rules of procedure adopted by all Senate committees. This document, Authority and Rules of Senate Committees , also presents the jurisdiction statement for each committee from Rule XXV of the Senate's standing rules as well as related information, such as provisions of public law affecting committee procedures. The constitutional grant to each chamber of Congress of authority over its own rules permits the Senate to establish procedural regulations through simple resolutions, which are adopted by the Senate alone. In certain cases, the Senate institutes procedures through provisions included in statutory measures (bills and joint resolutions), which can become effective only through agreement between both houses and presentation to the President (or through concurrent resolutions, which require agreement between both houses). Given that these procedures are created through an exercise of each chamber's constitutional rulemaking authority, they have the same standing as Senate and House rules. A statute or concurrent resolution that contains \"rulemaking provisions,\" in this sense, often incorporates a section titled \"Exercise of Rulemaking Power.\" This section asserts the rulemaking authority of each chamber by declaring that the pertinent provisions \"shall be considered as part of the rules of each House\" and are subject to being changed \"in the same manner ... as in the case of any other rule of such House\"—that is, for example, by adoption of a simple resolution of the Senate. In the Senate, statutory rulemaking provisions are principally of three kinds: (1) those derived from Legislative Reorganization Acts, (2) those establishing expedited procedures for consideration of specific classes of measures, and (3) those derived from the Congressional Budget Act and related statutes governing the budget process. In addition, provisions regulating action in the Senate (or House of Representatives, or both) in the congressional budget process may be contained in congressional budget resolutions, which are concurrent resolutions adopted pursuant to the Congressional Budget Act. The Legislative Reorganization Act of 1946 (P.L. 79-601, 60 Stat. 812) and the Legislative Reorganization Act of 1970 (P.L. 91-510, 84 Stat. 1140) are important rulemaking statutes that affected legislative procedures. Many rulemaking provisions in these statutes were later incorporated into the Senate's standing rules, and some others appear in the compilation of Laws Relating to the Senate presented in the Senate Manual , as discussed earlier. The term rulemaking statute is most often used in connection with laws that include provisions specifying legislative procedures to be followed in the Senate or the House, or both, in connection with the consideration of a class of measure also specified by the statute. This type of rulemaking statute, commonly referred to as \"expedited procedures\" or \"fast track\" provisions, defines special procedures for congressional approval or disapproval of specified actions proposed to be taken by the executive branch or independent agencies. A well-known example includes the Congressional Review Act, which provides for special procedures Congress can use to overturn a rule issued by a federal agency. Some of these expedited procedures are listed in the Senate Manual section titled \"General and Permanent Laws Relating to the U.S. Senate.\" Four of the most important rulemaking statutes define specific procedures for considering budgetary legislation: the Congressional Budget and Impoundment Control Act of 1974 (commonly known as the Congressional Budget Act), the Balanced Budget and Emergency Deficit Control Act (the \"Gramm-Rudman-Hollings Act\"), the Budget Enforcement Act of 1990, and the Budget Control Act of 2011. For example, Section 305(b) of the Congressional Budget Act defines Senate floor procedures for considering the congressional budget resolution. When adopted, the chief purpose of the concurrent resolution on the budget (provided for in the Congressional Budget Act) is to establish, between the House and the Senate, a budget plan for the fiscal year. The Senate has often included in this congressional budget resolution supplementary procedural regulations to govern subsequent action on spending bills or other budget-related measures. Many of these procedural provisions institute new points of order that, similar to those established by the Congressional Budget Act itself, are available against budgetary measures or provisions contained in these measures. For example, beginning in 1993, some budget resolutions have established \"pay-as-you-go\" (PAYGO) procedures for Senate consideration of legislation affecting direct spending and revenues. The procedures established by these provisions may be made applicable only to budgetary action for the coming year or an established time period, but they may also be established as permanent procedures that are altered or abolished only by further action in a subsequent budget resolution. Procedures set forth in congressional budget resolutions are not comprehensively compiled in a single source and may best be identified by examining the texts of adopted congressional budget resolutions for successive years. The rules of the conferences of the two parties in the Senate are not adopted by the Senate itself, and accordingly, they cannot be enforced on the Senate floor. Conference rules may nevertheless affect proceedings of the Senate, for they may cover topics such as the selection of party leaders, meetings of the conference, and limitations on committee assignments for conference members. The Senate Republican Conference adopted rules for the 116 th Congress that are available online. Some publications prepared by committees and offices of the Senate provide valuable information about Senate parliamentary procedure and practices. While these publications are not official parliamentary reference sources, they often make reference to official sources such as the Senate's standing rules and published precedents. Senators and their staff may access, via Webster (which is not available to the public), the Electronic Senate Precedents , a catalog of recent precedents compiled by the Office of the Parliamentarian. These unofficial documents, provided by the Office of the Secretary of the Senate, are updated periodically to reflect precedents on topics such as cloture and germaneness of amendments that were established after the publication of Riddick's Senate Procedure (1992). A Compendium of Laws and Rules of the Congressional Budget Process , a print of the House Committee on the Budget, presents the text of the Congressional Budget and Impoundment Control Act of 1974, the Gramm-Rudman-Hollings Act, and additional information related to the budget making process, such as House and Senate rules affecting the budget process. Although this document was printed by the House Budget Committee, it presents valuable information related to the budgetary process in the Senate. Senate Cloture Rule , a print prepared for the Senate Committee on Rules and Administration by CRS, was last issued during the 112 th Congress (2011-12). The print covers the rule's history and application through its publication and may be useful to those wanting a more detailed knowledge of the cloture rule. Significantly, however, this print does not capture precedents established during the 113 th (2013-14) and 115 th (2017-18) Congresses that changed the vote thresholds for invoking cloture on various presidential nominations or the change to the post-cloture debate time established during the 116 th Congress. Treaties and Other International Agreements: The Role of the United States Senate , was prepared as a print for the Senate Committee on Foreign Relations by CRS. The print provides detailed information about the Senate's advice and consent role, covers the procedures that govern all stages of Senate consideration of treaties and international agreements, and discusses congressional oversight of treaties and other international agreements. The latest edition (S.Prt. 106-71) appeared in the 106 th Congress. Enactment of a Law presents a concise summary of the legislative process. This document, prepared by Robert B. Dove, former Parliamentarian of the Senate, explains Senate floor procedures and the functions of the various Senate officials, such as the Secretary of the Senate, the Sergeant at Arms, and the Senate Parliamentarian. How Our Laws Are Made , first published in 1953 by the House Committee on the Judiciary, provides a summary of the legislative process from the drafting of legislation to final approval and presidential action. While this document focuses on House procedures, it includes a review of Senate committee and floor procedures prepared by the Office of the Parliamentarian of the Senate. Although the document is intended for nonspecialists, its summary descriptions of House procedures serve as a useful reference source. Appendix A. Selected CRS Products on Senate Procedure Most of these reports are available to congressional staff through the CRS home page at http://www.crs.gov . These reports may also be accessed through the Congressional Process, Administration, and Elections section of the CRS website at https://www.crs.gov/iap/congressional-process-administration-and-elections . CRS Report 98-853, The Amending Process in the Senate , by Christopher M. Davis. CRS Report R41003, Amendments Between the Houses: Procedural Options and Effects , by Elizabeth Rybicki. CRS Report RL30862, The Budget Reconciliation Process: The Senate's \"Byrd Rule , \" by Bill Heniff Jr. CRS Report 96-708, Conference Committee and Related Procedures: An Introduction , by Elizabeth Rybicki. CRS Report RL30360, Filibusters and Cloture in the Senate , by Valerie Heitshusen and Richard S. Beth. CRS Report 98-865, Flow of Business: A Typical Day on the Senate Floor , by Christopher M. Davis. CRS Report R43563, \"Holds\" in the Senate , by Mark J. Oleszek. CRS Report RS20668, How Measures Are Brought to the Senate Floor: A Brief Introduction , by Christopher M. Davis. CRS Report 98-425, Invoking Cloture in the Senate , by Christopher M. Davis. CRS Report 96-548, The Legislative Process on the Senate Floor: An Introduction , by Valerie Heitshusen. CRS Report 98-306, Points of Order, Rulings, and Appeals in the Senate , by Valerie Heitshusen. CRS Report R42929, Procedures for Considering Changes in Senate Rules , by Richard S. Beth. CRS Report 98-696, Resolving Legislative Differences in Congress: Conference Committees and Amendments Between the Houses , by Elizabeth Rybicki. CRS Report RL33939, The Rise of Senate Unanimous Consent Agreements , by Walter J. Oleszek. CRS Report RL31980, Senate Consideration of Presidential Nominations: Committee and Floor Procedure , by Elizabeth Rybicki. CRS Report 98-308, Senate Legislative Procedures: Published Sources of Information , by Christopher M. Davis. CRS Report 98-311, Senate Rules Affecting Committees , by Valerie Heitshusen. CRS Report 96-452, Voting and Quorum Procedures in the Senate , coordinated by Elizabeth Rybicki. Appendix B. Senate Parliamentary Reference Information Available Online The vast majority of the referenced links found throughout this report can be accessed through one of two \"gateway\" websites maintained by legislative branch organizations: Congress.gov (a website of the Library of Congress) and govinfo.gov (a website of GPO). Each of these sites provides an entry point for research into Senate procedures. The websites provided for the documents discussed in this report are current as of the report's publication date. Congress.gov http://www.congress.gov Congress.gov is the official website for U.S. federal legislative information. The site is designed to provide access to accurate, timely, and complete legislative information for Members of Congress, legislative agencies, and the public. Congress.gov also contains information on topics such as nominations, public laws, communications, and treaties. It is presented by the Library of Congress using data from the Office of the Clerk of the U.S. House of Representatives, the Office of the Secretary of the Senate, GPO, Congressional Budget Office, and CRS. govinfo.gov https://www.govinfo.gov/ Govinfo.gov is a service of the GPO. The website provides public access to official publications of the Congress.", "summary": "The Senate's procedures are determined not only by its standing rules but also by standing orders, published precedents, committee rules, party conference rules, and informal practices. The Constitution and rulemaking statutes also impose procedural requirements on the Senate. Official parliamentary reference documents and other publications set forth the text of the various authorities or provide information about how and when they govern different procedural situations. Together, these sources establish the parameters by which the Senate conducts its business. They provide insight into the Senate's daily proceedings, which can be unpredictable. In order to understand Senate procedure, it is often necessary to consider more than one source of authority. For example, the Senate's standing rules provide for the presiding officer to recognize the first Senator who seeks recognition on the floor. By precedent, however, when several Senators seek recognition at the same time, the majority leader is recognized first, followed by the minority leader. This precedent may have consequences for action on the floor. This report reviews the coverage of Senate parliamentary reference sources and provides information about their availability to Senators and their staff. Among the resources presented in this report, four may prove especially useful to understand the Senate's daily order of business: the Senate Manual, Riddick's Senate Procedure, the rules of the Senate standing committees, and the publication of unanimous consent agreements. The Senate sets forth its chief procedural authorities in a Senate document called the Senate Manual (S.Doc. 113-1), a new edition of which appears periodically. The Manual contains the text of the Senate's standing rules, permanent standing orders, laws relating to the Senate, and the Constitution, all of which establish key Senate procedures. The most recent version of the Manual can be accessed online at govinfo.gov, a website of the Government Publishing Office (GPO) at https://www.govinfo.gov/content/pkg/SMAN-113/pdf/SMAN-113.pdf. It is also accessible via the Senate resources page of Congress.gov (a website of the Library of Congress) at https://www.congress.gov/resources/display/content/Senate. Riddick's Senate Procedure (S.Doc. 101-28) presents a catalog of Senate precedents arranged alphabetically on topics ranging from adjournment to recognition to voting. Summaries of the precedents are accompanied by citations to the page and date in the Congressional Record or the Senate Journal on which the precedent was established. Individual chapters of Riddick's Senate Procedure are available for download through govinfo.gov at https://www.govinfo.gov/app/details/GPO-RIDDICK-1992. A searchable version is also accessible via the Senate resources page of Congress.gov at https://www.congress.gov/resources/display/content/Senate. The Senate's standing rules require each standing committee to adopt its own rules of procedure. These rules may cover topics such as how subpoenas are issued. Each Congress, the Senate Committee on Rules and Administration prepares a compilation of these rules and other relevant committee materials, such as jurisdiction information, in a document titled Authority and Rules of Senate Committees. The most recent version (S.Doc. 115-4) is available via govinfo.gov at https://www.govinfo.gov/content/pkg/CDOC-115sdoc4/pdf/CDOC-115sdoc4.pdf. To facilitate the legislative process, the Senate often conducts its business through unanimous consent agreements that may schedule the time for taking up a measure or specify what motions are in order during its consideration. These can be found, via Congress.gov, in the Congressional Record (https://www.congress.gov/) and the Senate Calendar of Business or the Executive Calendar (https://www.congress.gov/resources/display/content/Calendars+and+Schedules).", "document_type": "crs"}
{"report": "Honduras, a Central American nation of 9.1 million people, faces significant domestic challenges. Democratic institutions are fragile, current economic growth rates and social policies are insufficient to reduce widespread poverty, and the country continues to experience some of the highest violent crime rates in the world. These interrelated challenges have produced periodic instability in Honduras and have contributed to relatively high levels of displacement and emigration in recent years. Although the Honduran government has taken some steps intended to address these deep-seated issues, many analysts maintain that Honduras lacks the institutions and resources necessary to do so on its own. U.S. policymakers have devoted more attention to Honduras and its Central American neighbors since 2014, when large flows of migrants and asylum-seekers from the region began arriving at the U.S. border. In the aftermath of the crisis, the Obama Administration determined that it was \"in the national security interests of the United States\" to work with Central American governments to improve security, strengthen governance, and promote economic prosperity in the region. Accordingly, the Obama Administration launched a new, whole-of-government U.S. Strategy for Engagement in Central America and requested significant increases in foreign assistance to support its implementation. The Trump Administration initially maintained the Central America strategy while seeking to scale back the amount of foreign assistance provided to Honduras and its neighbors. Although assistance to the region has declined each year since FY2016, Congress has rejected many of the Administration's proposed cuts. It has appropriated more than $2.6 billion for Central America over the past four years, including at least $431 million for Honduras (see Table 1 ). In March 2019, however, the Trump Administration announced its intention to end U.S. foreign assistance to the \"Northern Triangle\" nations of Honduras, El Salvador, and Guatemala due to the continued northward flow of migrants and asylum-seekers from the region. It remains unclear how the Administration intends to implement this shift in policy or if it intends to amend its FY2020 budget request, which includes at least $65.8 million for Honduras. Some Members of Congress have objected to the Administration's abrupt decision to end foreign aid for Honduras and its neighbors. The 116 th Congress could play a crucial role in determining the direction of U.S. policy in the region as it considers FY2020 appropriations, foreign assistance authorizations, and other legislative initiatives. This report analyzes political, economic, and security conditions in Honduras. It also examines issues in U.S.-Honduran relations that have been of particular interest to many in Congress, including foreign assistance, migration, security cooperation, human rights, and trade and investment. Honduras has struggled with political instability and authoritarian governance for much of its history. The military traditionally has played an influential role in politics, most recently governing Honduras for most of the period between 1963 and 1982. The country's current constitution—its 16 th since declaring independence from Spain in 1821—was adopted as Honduras transitioned back to civilian rule. It establishes a representative democracy with a separation of powers among an executive branch led by the president, a legislative branch consisting of a 128-seat unicameral national congress, and a judicial branch headed by the supreme court. In practice, however, the legislative process tends to be executive-driven and the judiciary is often subject to intimidation, corruption, and politicization. Honduras's traditional two-party political system, dominated by the Liberal ( Partido Liberal , PL) and National ( Partido Nacional , PN) Parties, has fractured over the past decade. Both traditional parties are considered to be ideologically center-right, and political competition between them has generally been focused more on using the public sector for patronage than on implementing programmatic agendas. The leadership of both parties supported a 2009 coup, in which the military, backed by the supreme court and congress, detained then-President Manuel Zelaya and flew him into forced exile. Zelaya had been elected as a moderate member of the PL but alienated many within the political and economic elite by governing in a populist manner and calling for a constituent assembly to draft a new constitution. Many rank-and-file members of the PL abandoned the party in the aftermath of the coup and joined Zelaya upon his return from exile to launch a new left-of-center Liberty and Re-foundation ( Libertad y Refundación , LIBRE) party. The post-coup split among traditional supporters of the PL has benefitted the PN, which now has the largest political base in Honduras and has controlled the presidency and congress since 2010. Many analysts maintain that the PN has gradually eroded checks and balances to consolidate its influence over other government institutions and entrench itself in power. For example, in 2012, the PN-controlled congress, led by Juan Orlando Hernández, replaced four supreme court justices who had struck down a pair of high-profile government initiatives. Although the Honduran minister of justice and human rights asserted that the move was illegal and violated the independence of the judiciary, it was never overturned. The justices who were installed in 2012 issued a ruling in 2015 that struck down the constitution's explicit ban on presidential reelection, allowing Hernández, who had been elected president in 2013, to seek a second term. The PN has also manipulated appointments to other nominally independent institutions, such as the country's electoral oversight body. Given that Honduras continues to hold multiparty elections but falls short of democratic standards in several areas, Freedom House classifies the country as \"partly free,\" and the Varieties of Democracy Project classifies the country as an \"electoral autocracy.\" President Juan Orlando Hernández of the PN was inaugurated to a second four-year term in January 2018. He lacks legitimacy among many Hondurans, however, due to his controversial reelection. As noted above, the Honduran constitution explicitly prohibits presidential reelection, but Hernández was able to run for a second term as a result of a 2015 supreme court ruling issued by justices whose appointments Hernández had orchestrated as the head of congress in 2012. The 2017 election was also plagued by an \"abundance of irregularities and deficiencies\" that led some international observers to question whether the official results, which gave Hernández a narrow 42.9%-41.4% victory over Salvador Nasralla of the LIBRE-led \"Opposition Alliance against the Dictatorship,\" accurately reflected the will of the Honduran people. Both major opposition parties contested the results, and many Hondurans took to the streets to protest the alleged election fraud. At least 23 Hondurans were killed in post-election violence, at least 16 of whom were shot by Honduran security forces. The United Nations sought to facilitate a national dialogue to promote societal reconciliation in the aftermath of the election. Individuals affiliated with the top three presidential candidates reportedly arrived at 169 areas of consensus related to human rights, electoral reforms, constitutional reforms, and the rule of law, but they were unable to conclude formal political agreements on most of those issues. Nevertheless, in January 2019, the Honduran congress approved a package of constitutional changes to partially reform the electoral process. The changes will restructure the national registry office, dissolve the country's existing electoral authority, and create two new institutions—a national electoral council to organize and supervise electoral processes and an electoral justice court to settle electoral disputes. Although many analysts have recommended that Honduras depoliticize its electoral institutions, each of the agencies will consist of three primary officials, effectively allowing the PN, PL, and LIBRE to divide the positions among themselves as the PN and the PL have done historically. Over the past year and a half, Hernández has largely maintained the business-friendly economic policies and hardline approach to security policy that he implemented during his first term (see \" Economic and Social Conditions \" and \" Security Conditions \" below). His PN, which holds 61 of the 128 seats in congress, has been able to control the legislative agenda with the ad-hoc support of several small parties. Most Hondurans are dissatisfied with status quo, however, as 86% of those surveyed in May 2019 asserted that the country is moving in the wrong direction. Unemployment is considered the top problem in the country, cited by 30% of those surveyed, followed by corruption (19%), poor health care (15%), insecurity (11%), drugs (9%), and the cost of living (8%). Hondurans have repeatedly taken to the streets to protest the Hernández Administration's actions, and lack thereof, on those issues. Corruption is widespread in Honduras, but the country has made some progress in combatting it since 2016 with the support of the OAS-backed Mission to Support the Fight against Corruption and Impunity in Honduras ( Misión de Apoyo Contra la Corrupción y la Impunidad en Honduras , MACCIH). Honduran civil society had carried out a series of mass demonstrations demanding the establishment of an international anti-corruption organization after Honduran authorities discovered that at least $300 million was embezzled from the Honduran social security institute during the PN administration of President Porfirio Lobo (2010-2014) and some of the stolen funds were used to fund Hernández's 2013 election campaign. Hernández was reluctant to create an independent organization with far-reaching authorities like the International Commission against Impunity in Guatemala (CICIG), which had helped bring down the Guatemalan president in 2015. Facing significant domestic and international pressure, however, he negotiated a more limited arrangement with the OAS. According to the agreement, signed in January 2016, the MACCIH is intended to support, strengthen, and collaborate with Honduran institutions to prevent, investigate, and punish acts of corruption. The MACCIH initially focused on strengthening Honduras's anti-corruption legal framework. It secured congressional approval for new laws to create anti-corruption courts with nationwide jurisdiction and to regulate the financing of political campaigns. The Honduran congress repeatedly delayed and weakened the MACCIH's proposed reforms, however, hindering the mission's anti-corruption efforts. For example, prior to enactment of the law to establish anti-corruption courts with nationwide jurisdiction, the Honduran congress modified the measure by stripping the new judges of the authority to order asset forfeitures, stipulating that the new judges can hear only cases involving three or more people, and removing certain crimes—including the embezzlement of public funds—from the jurisdiction of the new courts. Other measures the MACCIH has proposed, such as an \"effective collaboration\" bill to encourage members of criminal networks to cooperate with officials in exchange for reduced sentences, have stalled in congress. Such plea-bargaining laws have proven crucial to anti-corruption investigations in other countries, such as the ongoing \"Car Wash\" ( Lava Jato ) probe in Brazil. MACCIH officials are also working alongside Honduras's Special Prosecution Unit to Fight Corruption-related Impunity ( Unidad Fiscal Especial Contra la Impunidad de la Corrupción , UFECIC) to jointly investigate and prosecute high-level corruption cases. To date, these integrated teams have presented 12 cases, uncovering corruption networks involved in activities ranging from using social assistance funds for personal expenses to awarding government contracts to narcotics traffickers in exchange for campaign contributions. Nearly 120 people are facing prosecution, including more than 70 cabinet ministers, legislators, and other government officials. However, the cases have been slow to move through the Honduran justice system: The first oral trial—involving former First Lady Rosa Elena Bonilla de Lobo (2010-2014)—began in March 2019. Honduran political and economic elites threatened by this tentative progress have sought to obstruct the MACCIH's efforts. In January 2018, for example, the Honduran congress passed a law that effectively blocked an investigation into legislators' mismanagement of public funds. Although the constitutional chamber of the supreme court overturned the law, the Honduran congress has continued to push forward similar measures. A new criminal code, which is to go into effect in November 2019, will reportedly reduce criminal penalties for narcotics trafficking, embezzlement, fraud, illicit enrichment, and abuse of authority, potentially allowing some corrupt officials to avoid serving any time in prison. Some analysts have also questioned the impartiality of judges presiding over the MACCIH-backed cases, several of whom have issued decisions in favor of those accused of corruption. The MACCIH's four-year mandate is scheduled to expire in January 2020. More than 61% of Hondurans would like the MACCIH to remain in Honduras, but the Hernández Administration has expressed little interest in renewing the agreement. The U.S. government, which has provided crucial diplomatic and financial support for the MACCIH over the past three and a half years, has called for an extension of the mission's mandate. Many analysts assert that Honduran public prosecutors would struggle to continue their anti-corruption efforts without the MACCIH or another source of international assistance and political support. The Honduran economy is one of the least developed in Latin America. Historically, the country's economic performance closely tracked the prices of agricultural commodities, such as bananas and coffee. While agriculture remains important, accounting for 14% of gross domestic product (GDP) and nearly a third of total employment, the Honduran economy has diversified since the late 1980s. Successive Honduran administrations privatized state-owned enterprises, lowered taxes and tariffs, and offered incentives to attract foreign investment, spurring growth in the maquila (offshore assembly for reexport) sector—particularly in the apparel, garment, and textile industries. Those policy changes also fostered the development of nontraditional agricultural exports, such as seafood and palm oil. President Hernández's top economic policy priority upon taking office in 2014 was to put the government's finances on a more sustainable path. The nonfinancial public sector deficit had grown to 7.5% of GDP in 2013 as a result of weak tax collection, increased expenditures, and losses at state-owned enterprises. As the Honduran government struggled to obtain financing for its obligations, public employees and contractors occasionally went unpaid and basic government services were interrupted. In 2014, Hernández negotiated a three-year agreement with the International Monetary Fund (IMF), under which the Honduran government agreed to reduce the deficit to 2% of GDP by 2017 and carry out structural reforms related to the electricity and telecommunications sectors, pension funds, public-private partnerships, and tax administration in exchange for access to $189 million in financing. The Hernández Administration ultimately reduced the deficit to less than 1% of GDP in 2017 and adhered to most of its other commitments. In May 2019, the IMF and the Honduran government reached a staff-level agreement on a new two-year economic program that will give Honduras access to $311 million of financing. Hernández has also sought to make Honduras more attractive to foreign investment. He contracted a global consulting firm to develop the five-year \"Honduras 20/20\" plan, which seeks to attract $13 billion of investment and generate 600,000 jobs in four priority sectors: tourism, textiles, intermediate manufacturing, and business services. To achieve the plan's objectives, the Honduran government has adopted a new business-friendly tax code, increased investments in infrastructure, and entered into a customs union with Guatemala and El Salvador. The Hernández Administration is also moving forward with a controversial plan to establish \"Employment and Economic Development Zones\"—specially designated areas where foreign investors are granted administrative autonomy to enact their own laws, set up their own judicial systems, and carry out other duties usually reserved for governments. Nevertheless, annual foreign direct investment inflows to Honduras fell from $1.4 billion in 2014 to $1.2 billion in 2018. The Honduran economy has expanded by an average of 3.9% annually over the past five years, but it is not generating sufficient employment to absorb the country's growing labor supply. In 2017, for example, the Honduran labor force increased by nearly 110,000 people, but only 8,500 jobs were created in the formal sector. The vast majority of new workers were left to work in the unregulated informal sector, without job protections or benefits, or seek opportunity elsewhere. Since nearly 40% of Hondurans are under the age of 19, the country's prime age working population is projected to continue growing for the next two decades. Without stronger job creation, Honduras may miss a key window of opportunity to boost economic growth. In 2018, nearly 20% of Hondurans were unemployed or underemployed, and another 49% of Hondurans worked full time for less than the minimum wage. Honduras's recent economic growth has also proven insufficient to reduce the country's high poverty rate. Some economic analysts argue that the Hernández Administration's fiscal austerity policies have exacerbated the situation by increasing the government's dependence on regressive, indirect taxes while limiting public investment and social welfare expenditures. More than 67% of Hondurans live below the national poverty line. Conditions are particularly difficult in rural Honduras, where nearly 63% of the population lives in extreme poverty—unable to satisfy their basic nutritional needs. In recent years, many rural communities have struggled to contend with a coffee fungus outbreak and a series of droughts that have destroyed crops and reduced agricultural production and employment. Households have reportedly been forced to engage in extreme coping strategies, such as taking on debt, selling off land, and migrating. Honduras's medium-term economic performance is expected to mirror the U.S. business cycle, as the United States remains Honduras's top export market and primary source of investment, tourism, and remittances. To boost the country's long-term growth potential, analysts maintain that Honduras will have to improve education and infrastructure and address entrenched social ills, such as widespread crime and corruption and high levels of poverty. Honduras struggles with high levels of crime and violence. A number of interrelated factors appear to contribute to the poor security situation. Widespread poverty, fragmented families, and a lack of education and employment opportunities leave many Honduran youth susceptible to recruitment by gangs such as the Mara Salvatrucha (MS-13) and Barrio 18 . These organizations engage in drug dealing and extortion, among other criminal activities, and appear to be responsible for a substantial portion of homicides and much of the crime that affects citizens on a day-to-day basis. Honduras also serves as a significant drug-trafficking corridor as a result of its location between cocaine-producing countries in South America and the major consumer market in the United States. Heavily armed and well-financed transnational criminal organizations have sought to secure control of Honduran territory by battling one another and local affiliates and seeking to intimidate and infiltrate Honduran institutions. Many of these groups have close ties to political and economic elites who rely upon illicit finances to fund their election campaigns and maintain or increase the market share of their businesses. In November 2018, for example, the U.S. Department of Justice charged Antonio \"Tony\" Hernández—a former member of congress and President Hernández's brother, for allegedly engaging in large-scale drug trafficking (see \" Counternarcotics \" below). Honduran security forces and justice-sector institutions have historically lacked the personnel, equipment, and training necessary to respond to criminal threats. They have also struggled with systemic corruption, with some sectors working on behalf of criminal organizations or private interests. President Hernández campaigned on a hard-line security platform, repeatedly pledging to do whatever it takes to reduce crime and violence in Honduras. Upon taking office in 2014, he immediately ordered the security forces into the streets to conduct intensive patrols of high-crime neighborhoods. Among the units involved in the ongoing operation are two hybrid forces that Hernández helped to establish while he was serving as the president of the Honduran congress: the military police force ( Policía Militar de Orden Público , PMOP), which is under the control of the ministry of defense, and a military-trained police unit known as the \"Tigers\" ( Tropa de Inteligencia y Grupos de Respuesta Especial de Seguri dad , TIGRES ). The PMOP has been implicated in numerous human rights abuses, including 13 of the 16 killings documented by the U.N. Office of the High Commissioner for Human Rights in the aftermath of the 2017 election. Human rights advocates have repeatedly called on the Hernández Administration to withdraw the military from domestic law enforcement activities. Hernández has also taken some steps to strengthen security and justice-sector institutions. He created a special police reform commission in April 2016 after press reports indicated that high-ranking police commanders had conspired with drug traffickers to assassinate two top Honduran antidrug officials in 2009 and 2011 and the head of the anti-money-laundering unit of the public prosecutor's office in 2013; other officials in the Honduran national police and security ministry reportedly covered up internal investigations of the crimes. Although previous attempts to reform the police force produced few results, the special commission dismissed more than 5,600 personnel, including half of the highest-ranked officers. It also proposed and won congressional approval for measures to restructure the national police force, increase police salaries, and implement new training and evaluation protocols. Public perceptions of the national police have yet to improve substantially, however, as fewer than 34% of Hondurans expressed confidence in the force in 2018. Honduras's investigative and prosecutorial capacity has improved in recent years, although impunity remains widespread. In 2015, the Honduran national police launched a new investigative division and the public prosecutor's office established a new criminal investigative agency. Both institutions have set up forensic laboratories and have begun to conduct more scientific investigations. The budget of the public prosecutor's office grew by more than 94% in nominal terms from 2014 to 2018, allowing Attorney General Óscar Chinchilla to hire additional detectives, prosecutors, and other specialized personnel. Nevertheless, the public prosecutor's office accounted for less than 1.5% of the Honduran central government's expenditures in 2018 and remains overburdened. These policies appear to have contributed to considerable improvements in security conditions over the past five years. Although the homicide rate remains high by global standards, it peaked at 86.5 murders per 100,000 residents in 2011 and fell to 41.3 murders per 100,000 residents in 2018 (see Figure 2 , below). Common crime also appears to have declined, with the percentage of Hondurans reporting they had been the victim of a crime in the past year falling from 20.5% in 2014 to 12.8% in 2018. Nevertheless, there continues to be a pervasive sense of insecurity in the country: 52% of Hondurans consider their cities unsafe, and nearly 88% consider the country unsafe. The United States has had close relations with Honduras over many years. The bilateral relationship was especially close in the 1980s, when Honduras returned to civilian rule and became the lynchpin for U.S. policy in Central America. The country served as a staging area for U.S.-supported raids into Nicaragua by the Contra forces attempting to overthrow the leftist Sandinista government and an outpost for U.S. military forces supporting the Salvadoran government's efforts to combat the Farabundo Martí National Liberation Front insurgency. A U.S. military presence known as Joint Task Force Bravo has been stationed in Honduras since 1983. Economic linkages also intensified in the 1980s after Honduras became a beneficiary of the Caribbean Basin Initiative, which allowed for duty-free importation of Honduran goods into the United States. Economic ties have deepened since the entrance into force of the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR) in 2006. Relations between the United States and Honduras were strained during the country's 2009 political crisis. The Obama Administration condemned the coup and, over the course of the following months, leveled a series of diplomatic and economic sanctions designed to pressure Honduran officials to restore Zelaya to power. The Administration limited contact with the Honduran government, suspended some foreign assistance, minimized cooperation with the Honduran military, and revoked the visas of members and supporters of the interim government headed by Roberto Micheletti. In November 2009, the Administration shifted the emphasis of U.S. policy from reversing Zelaya's removal to ensuring the legitimacy of previously scheduled elections. Although some analysts argued that the policy shift allowed those behind the coup to consolidate their hold on power, Administration officials maintained that elections had become the only realistic way to bring an end to the political crisis. Current U.S. policy in Honduras is focused on strengthening democratic governance, including the promotion of human rights and the rule of law, enhancing economic prosperity, and improving the long-term security situation in the country, thereby mitigating potential challenges for the United States such as irregular migration and organized crime. To advance these objectives, the United States provides Honduras with substantial foreign assistance, maintains significant security and commercial ties, and engages on issues such as migration and human rights. Bilateral cooperation could be constrained, however, if the United States ends foreign assistance programs in the region, as announced by the Trump Administration (see \" Potential Termination of Assistance \" below). The U.S. government has provided significant amounts of foreign assistance to Honduras over the years as a result of the country's long-standing development challenges and close relations with the United States. Aid levels were particularly high during the 1980s and early 1990s, as Honduras served as a base for U.S. operations in Central America. U.S. assistance to Honduras began to wane as the regional conflicts subsided, however, and has generally remained at lower levels since then, with a few exceptions, such as a spike following Hurricane Mitch in 1998 and again after the Millennium Challenge Corporation awarded Honduras a $215 million economic growth compact in 2005. Current assistance to Honduras is guided by the U.S. Strategy for Engagement in Central America, which is designed to promote economic prosperity, strengthen governance, and improve security in the region. The Obama Administration introduced the new strategy and sought to significantly increase assistance for Honduras and its neighbors following a 2014 surge in migration from Central America. Congress has appropriated more than $2.6 billion for the strategy through the State Department and the U.S. Agency for International Development (USAID) since FY2016. At least $431 million has been allocated to Honduras, either as bilateral assistance or through the Central America Regional Security Initiative (CARSI) (see Table 1 ). U.S. assistance funds a wide range of development activities in Honduras. These include good governance programs intended to strengthen institutions and encourage civil society engagement and oversight, agriculture programs intended to increase food security and rural income generation, education programs intended to improve the quality of the education system and increase access to formal schooling for at-risk youth, and economic reform programs intended to foster employment and income growth through competitive and inclusive markets. U.S. bilateral aid to Honduras also provides training and equipment for the Honduran military, while CARSI assistance supports law enforcement operations, justice-sector reform, and crime and violence prevention programs. In the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), Congress appropriated $527.6 million to continue implementing the U.S. Strategy for Engagement in Central America. The act gives the State Department significant flexibility in allocating assistance among the seven nations of the isthmus. The conference report ( H.Rept. 116-9 ) accompanying the act asserts that the Secretary of State should take into account the political will of Central American governments, including their commitment \"to reduce illegal migration and reduce corruption and impunity,\" when deciding where to allocate the funds. The only assistance specifically designated for Honduras is $5 million to support the MACCIH and $20 million that is to be split among the attorneys general offices of Honduras, El Salvador, and Guatemala. Like prior appropriations measures, the act places strict conditions on assistance to the Honduran government. It requires 50% of assistance for the central government of Honduras to be withheld until the Secretary of State certifies that the Honduran government is meeting 16 conditions. These include improving border security, combating corruption, countering gangs and organized crime, supporting programs to reduce poverty and promote equitable economic growth, protecting the right of political opposition parties and other members of civil society to operate without interference, and resolving commercial disputes. The future of U.S. foreign aid programs in Honduras is uncertain. The Trump Administration announced in March 2019 that it intends to end all foreign assistance to the country (as well as El Salvador and Guatemala). The announcement came after more than a year of threats from President Trump to cut off assistance to the \"Northern Triangle\" nations of Central America due to the continued northward flow of migrants and asylum-seekers from the region (see \" Recent Flows of Migrants and Asylum-Seekers \" below). Although the Administration has yet to provide details of its plans, the decision appears to affect nearly all U.S. assistance appropriated for Honduras in FY2018. It remains unclear how the President's decision may affect assistance appropriated in other fiscal years or the Administration's FY2020 budget request, which includes $65.8 million for Honduras. The Honduran government reacted to the announcement by expressing irritation with the \"contradictory policies\" of the U.S. government, noting that President Hernández had just hosted then-Secretary of Homeland Security Kirstjen Nielsen in Tegucigalpa, where they signed a new security cooperation agreement. Recent appropriations measures provide the President with significant discretion to cut some foreign assistance to the Northern Triangle. For example, Section 7045(a) of the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ) requires the State Department to withhold 75% of assistance for the central governments of El Salvador, Guatemala, and Honduras until the Secretary of State certifies that those governments are addressing 16 congressional concerns. It also empowers the Secretary of State to suspend those funds and reprogram them elsewhere in Latin America and the Caribbean if he/she determines the governments have made \"insufficient progress.\" It appears as though the Administration could make additional cuts using the transfer and reprogramming authorities granted in annual appropriations legislation and the Foreign Assistance Act of 1961, as amended (22 U.S.C. §2151 et seq. ). Administrations typically consult with the Appropriations Committees and provide detailed justifications prior to taking such actions. The 116 th Congress is considering authorization and appropriations measures that could increase congressional oversight over foreign assistance programs and direct additional aid to Honduras and its Central American neighbors. The United States-Northern Triangle Enhanced Engagement Act, H.R. 2615 (Engel), would authorize $577 million for the U.S. Strategy for Engagement in Central America in FY2020, including \"not less than\" $490 million for the Northern Triangle. The bill, which was passed unanimously by the House Foreign Affairs Committee on May 22, 2019, would direct U.S. agencies to carry out a variety of programs in the region, impose annual reporting requirements, and prohibit the Administration from reprogramming or transferring the funds for other purposes. The Central America Reform and Enforcement Act, S. 144 5 (Schumer), would authorize $1.5 million for the Central America strategy in FY2020 and prohibit the reprogramming of any assistance appropriated for the Northern Triangle nations since FY2016. The Department of State, Foreign Operations, and Related Programs Appropriations Act, 2020, H.R. 2839 (Lowey), would appropriate $540.9 million for the Central America strategy in FY2020, including at least $75 million for Honduras. The bill would also modify FY2017 ( P.L. 115-31 ), FY2018 ( P.L. 115-141 ), and FY2019 ( P.L. 116-6 ) appropriations legislation to strengthen the funding directives for aid to Central America. The United States and Honduras have strong migration ties. As of 2017, approximately 603,000 individuals born in Honduras resided in the United States, and an estimated 425,000 (70%) of them were in the country without authorization. Migration from Honduras to the United States has traditionally been driven by high levels of poverty and unemployment; however, the poor security situation in Honduras has increasingly played a role as well. According to a February 2019 poll, more than 40% of Hondurans have a family member who has emigrated in the past year. This could contribute to additional migration in the coming years, as those who leave Honduras may share their experiences and provide financial and logistical assistance to those who remain behind. In recent years, there has been a significant increase in the number of Honduran migrants and asylum-seekers arriving at the U.S. border. U.S. apprehensions of Honduran nationals at the southwest border nearly tripled from about 30,350 in FY2012 to nearly 91,000 in FY2014. Although annual flows declined for a few years, more than 133,000 Hondurans were apprehended at the border through the first seven months of FY2019. The demographics of the Hondurans attempting to reach the United States have also changed significantly, with unaccompanied children and families—many of whom have requested humanitarian protection—accounting for 66% of those apprehended at the border over the past five and a half years (see Figure 3 below). Since 2014, the U.S. and Honduran governments have sought to deter migration in various ways. Both governments have run public-awareness campaigns to inform Hondurans about the potential dangers of unauthorized migration and to correct possible misperceptions about U.S. immigration policies. The Trump Administration has also sought to discourage migration with changes in asylum and immigration enforcement policies, such as the \"zero tolerance\" policy that reportedly resulted in more than 1,000 Honduran children being separated from their parents. Some analysts have questioned the effectiveness of such deterrence campaigns, with one recent study finding that Hondurans' \"views of the dangers of migration to the United states, or the likelihood of deportation, do not seem to influence their emigration plans in any meaningful way.\" The U.S. and Honduran governments are also working together to combat human smuggling. The U.S. Department of Homeland Security (DHS) has worked with the Honduran national police to establish two Transnational Criminal Investigative Units. In the first seven months of 2018, the units initiated 32 human trafficking and smuggling investigations, made 20 arrests, and conducted biometric vetting of nearly 2,700 Honduran and third-country migrants. DHS has provided additional support to the Honduran national police's Special Tactical Operations Group, which conducts checkpoints along the Guatemalan border and specializes in detecting and interdicting human smuggling operations. Moreover, both countries are implementing initiatives intended to address the root causes of emigration. President Hernández joined with his counterparts in El Salvador and Guatemala to establish the Alliance for Prosperity in the Northern Triangle, which aims to foster economic growth, improve security conditions, strengthen government institutions, and increase opportunities for the region's citizens. The Honduran government has reportedly allocated nearly $2.9 billion to advance those objectives over the past three years. As noted above (see \" Foreign Assistance \"), the U.S. government has been supporting complementary efforts through the U.S. Strategy for Engagement in Central America, but the future of that initiative is uncertain. These programs may take several years to bear fruit, as research suggests the relationship between development and migration is complex. Numerous studies have found that economic development may increase outward migration initially by removing the financial barriers faced by households in poverty. Consequently, assistance programs that provide financial support or skills training without simultaneously ensuring the existence of local opportunities may end up intensifying rather than alleviating migration flows. There is some evidence that violence prevention programs may have a more immediate impact on migration trends by mitigating forced displacement. U.S. Immigration and Customs Enforcement (ICE) removed ( deported ) nearly 29,000 Hondurans from the United States in FY2018, making Honduras the third-largest recipient of deportees in the world behind Mexico and Guatemala. In addition to deportations from the United States, Honduras receives large numbers of deportees from Mexico, a transit country for Central American migrants bound for the United States. Honduran policymakers have expressed concerns about their country's ability to absorb the large volume of deportees, as it is often difficult for those returning to the country to find gainful employment, and deported criminals may exacerbate gang activity and crime. Since FY2014, the United States has provided at least $5.4 million to the International Organization for Migration to assist the Honduran government in improving its reception centers and services for repatriated migrants. Honduran leaders are also concerned about the potential economic impact of deportations because the Honduran economy is heavily dependent on the remittances of migrant workers abroad. In 2018, Honduras received nearly $4.8 billion (equivalent to 19.8% of GDP) in remittances. Given that remittances are the primary source of income for more than one-third of the Honduran households that receive them, a sharp reduction in remittances could have a dramatic effect on socioeconomic conditions in the country. According to the Honduran Central Bank, however, remittance levels have traditionally been more associated with the performance of the U.S. economy than the number of deportations from the United States. Nearly 81,000 Hondurans benefit from temporary protected status (TPS)—a form of humanitarian relief that allows individuals who could otherwise be deported to stay in the United States. The United States first provided TPS to Hondurans in the aftermath of Hurricane Mitch, which killed nearly 5,700 people, displaced 1.1 million others, and produced more than $5 billion in damages in 1998. TPS for Honduras was extended 14 times before the Trump Administration announced the program's termination in May 2018. The Administration has given current beneficiaries, who have an estimated 53,500 U.S.-born children, until January 5, 2020 to seek an alternative lawful immigration status or depart from the United States. The termination decision is currently on hold, however, due to a court order. Then-Secretary of Homeland Security Kirstjen Nielsen asserted that the termination was required since \"the disruption of living conditions in Honduras from Hurricane Mitch that served as the basis for its TPS designation has ceased to a degree that it should no longer be regarded as substantial.\" Some analysts disagree; they argue that the Secretary's decision ignored ongoing economic, security, and governance challenges in Honduras and could undermine U.S. and Honduran efforts to address the root causes of irregular migration. In 2017, TPS beneficiaries sent an estimated $176 million in cash remittances to Honduras, which is roughly the same amount that the U.S. government provided to Honduras in foreign aid. Some Members of Congress have expressed concerns about the termination of TPS for Hondurans, and the 116 th Congress may consider measures such as the American Dream and Promise Act of 2019, H.R. 6 (Roybal-Allard), which would provide a path toward permanent resident status for some TPS holders. The United States and Honduras have cooperated closely on security issues for many years. Honduras served as a base for U.S. operations designed to counter Soviet influence in Central America during the 1980s and has hosted a U.S. troop presence—Joint Task Force Bravo—ever since (see text box \"Joint Task Force Bravo\"). Current bilateral security efforts primarily focus on citizen safety and drug trafficking. As noted previously, Honduras faces significant security challenges (see \" Security Conditions \"). Many citizens contend with criminal threats on a daily basis, ranging from petty theft to extortion and forced gang recruitment. The U.S. government has sought to assist Honduras in addressing these challenges, often using funds appropriated through CARSI. USAID has used CARSI funds to implement a variety of crime- and violence-prevention programs. USAID interventions include primary prevention programs that work with communities to create safe spaces for families and young people, secondary prevention programs that identify the youth most at risk of engaging in violent behavior and provide them and their families with behavior-change counseling, and tertiary prevention programs that seek to reintegrate juvenile offenders into society. According to a 2014 impact evaluation, Honduran communities where USAID implemented crime- and violence-prevention programs reported 35% fewer robberies, 43% fewer murders, and 57% fewer extortion attempts than would have been expected based on trends in similar communities without a USAID presence. Other CARSI-funded efforts in Honduras are designed to support law enforcement and strengthen rule-of-law institutions. The State Department's Bureau of International Narcotics and Law Enforcement Affairs (INL) has established \"model police precincts,\" which are designed to build local confidence in law enforcement by converting police forces into more community-based, service-oriented organizations. INL has also supported efforts to purge the Honduran national police of corrupt officers, helped establish a criminal investigative school, and helped stand up the criminal investigation and forensic medicine directorates within the public prosecutor's office. The Federal Bureau of Investigation (FBI) leads a Transnational Anti-Gang Unit designed to interrupt criminal gang activity, including kidnappings and extortion. Over the past few years, USAID and INL have integrated their respective prevention and law enforcement interventions as part of a \"place-based strategy\" that seeks to concentrate U.S. efforts within the most dangerous communities in Honduras. Honduras is a major transshipment point for illicit narcotics as a result of its location between cocaine producers in South America and consumers in the United States. The Caribbean coastal region of the country is a primary landing point for both maritime and aerial traffickers due to its remote location, limited infrastructure, and lack of government presence. In 2017, the State Department estimated that three to four metric tons of cocaine transit through Honduras every month. The U.S. government has sought to strengthen counternarcotics cooperation with Honduras to reduce illicit flows through the country. Although the United States has not provided the Honduran government with any assistance that would support aerial interdiction since Honduras enacted an aerial intercept law in 2014, close bilateral cooperation has continued in several other areas. U.S. agencies, including the Drug Enforcement Administration (DEA), have used CARSI funds to establish and support specially vetted units and task forces designed to combat transnational criminal organizations. These units, which include U.S. advisers and selected members of the Honduran security forces, carry out complex investigations into drug trafficking, money laundering, and other transnational crime. The U.S. Department of Defense (DOD) provides additional counternarcotics assistance to Honduras. This support includes equipment intended to extend the reach of Honduran security forces and enable them to better control their national territories. It also includes specialized training. For example, U.S. Special Operations Forces have helped finance and train the TIGRES unit of the Honduran national police, which has been employed as a counterdrug SWAT (Special Weapons and Tactics) team. DOD counternarcotics assistance to Honduras totaled nearly $12 million in FY2016 and $12.4 million in FY2017. DOD planned to provide Honduras with at least $5.7 million of assistance to support ground and maritime interdiction efforts in FY2018. As a result of this cooperation, U.S. and Honduran authorities have apprehended numerous high-level drug traffickers. At least 24 Hondurans have been extradited to the United States, and at least a dozen others have turned themselves in to U.S. authorities since 2014. Many of those now in U.S. custody had previously been designated by the U.S. Treasury Department's Office of Foreign Asset Control as Specially Designated Narcotics Traffickers pursuant to the Foreign Narcotics Kingpin Designation Act (codified at 21 U.S.C. § 1901 et seq. ), freezing their assets and prohibiting U.S. citizens from conducting financial or commercial transactions with them. Nevertheless, the State Department asserts that U.S. and Honduran counternarcotics efforts have \"not yet translated into significant increases in drug seizures or notable disruptions to drug trafficking organizations\" and that \"there is no concrete information to suggest the overall volume of illicit drugs being trafficked through Honduras has decreased.\" This lack of progress may be due to organized crime infiltrating Honduran government institutions. In September 2017, Fabio Lobo, the son of former President Porfirio Lobo (2010-2014), was sentenced to 24 years in prison for conspiring to import cocaine into the United States. According to the U.S. Department of Justice (DOJ), Fabio Lobo connected Honduran drug traffickers to corrupt politicians and security forces who provided protection and government contracts in exchange for bribes. DOJ has charged several current and former members of the Honduran congress, including Juan Antonio \"Tony\" Hernández—President Hernández's brother, with similar offenses. Some observers have raised questions about the effectiveness of U.S. counternarcotics efforts and whether they contribute to human rights abuses. In April 2012, for example, the DEA and its vetted unit within the Honduran national police, with operational support from the State Department, initiated Operation Anvil, a 90-day pilot program intended to disrupt drug trafficking through Honduras. Three joint interdiction missions carried out as part of the operation ended with suspects being killed, including a May 2012 incident in which the vetted unit opened fire on a river taxi, killing four people and injuring four others. In May 2017, the State Department and DOJ Offices of Inspectors General released a joint report on the three deadly force incidents. They found that the DEA had not adequately planned for the operation, conducted a flawed review of the May 2012 incident, inappropriately withheld information from the U.S. ambassador, and provided inaccurate information to DOJ leadership and Congress. The report also noted that Honduran officers filed inaccurate reports about the three deadly force incidents and planted a gun at one of the crime scenes. Although DEA officials were aware of the inaccurate reports and planted weapon, they took no action. In recent years, human rights organizations have alleged a wide range of abuses by Honduran security forces acting in their official capacities or on behalf of private interests or criminal organizations. In perhaps the most high-profile case, Berta Cáceres, an indigenous and environmental activist, was killed in March 2016, apparently as a result of her efforts to prevent the construction of a hydroelectric project. Seven men were convicted for their roles in the murder in November 2018, including a retired Honduran army lieutenant and an active-duty army major. Honduran authorities have also arrested the general manager of the firm responsible for the hydroelectric project, but Cáceres's family and other human rights advocates maintain that those who ordered and financed the murder remain at large. Numerous similar attacks have been carried out against journalists and other human rights defenders, including leaders of Afro-descendent, indigenous, land rights, LGBT (lesbian, gay, bisexual, and transgender), and workers' organizations. The extent to which Honduran security forces have been involved is unclear, since \"the vast majority of murders and attacks targeting rights defenders go unpunished; if investigations are launched at all, they are inconclusive.\" The Honduran government has often attributed attacks against journalists, human rights defenders, and political and social activists to the country's high level of generalized violence and downplayed the possibility that the attacks may be related to the victims' work. Such attacks have persisted, however, even as annual homicides have fallen 48% from a peak of 7,172 in 2012 to 3,726 in 2017. According to the Honduran government's national commissioner for human rights, 33 journalists and social communicators were killed from 2014 to 2018, while 37 were killed from 2009 to 2013. Similarly, a coalition of domestic election observers documented 62 political killings during the 2017 electoral process, up from 48 in 2013. Human rights advocates have also criticized the Honduran government's \"practice of criminalizing journalists' professional activities and the activities of rights defenders.\" President Hernández and high-ranking members of his administration have repeatedly dismissed protests and sought to justify repressive actions by the Honduran security forces by characterizing members of the political opposition and social movements as criminals, drug traffickers, and gang members. The Honduran government has also brought criminal charges, such as defamation and unlawful occupation of a premises, against journalists and human rights defenders \"as a deterrent that is intended to stop people from investigating abuses, irregularities or human rights violations.\" Human rights promotion has long been an objective of U.S. policy in Honduras, though some analysts argue that it has been subordinated to other U.S. interests, such as maintaining bilateral security cooperation. The U.S. Strategy for Engagement in Central America has 13 sub-objectives, one of which is ensuring that Central American governments uphold democratic values and practices, including respect for human rights. The Trump Administration, like the Obama Administration before it, has generally refrained from publically criticizing the Honduran government over human rights abuses but has sought to support Honduran efforts to improve the situation. For example, the U.S. and Honduran governments maintain a high-level bilateral human rights working group, which has met six times since it was launched in 2012. The most recent meeting, held in April 2018, focused on efforts to strengthen the Honduran government's human rights institutions, improve cooperation with international partners and civil society, foster citizen security, combat corruption and impunity, and address migration issues. The U.S. government has also allocated foreign assistance to promote human rights in Honduras, including about $9 million in FY2017 (the most recent year for which data is available). For example, USAID is working with Honduran government institutions and human rights organizations on the implementation of a 2015 law that created a protection mechanism for journalists, human rights defenders, and justice sector officials. Among other activities, U.S. assistance is supporting efforts to develop early warning systems, conduct risk analyses, and improve the processes for providing protective measures. As of November 2018, the protection mechanism was implementing protection measures for 124 human rights defenders, 31 journalists, 24 media workers, and 20 justice sector officials. The protective measures include self-protection trainings, psychosocial support, technological and infrastructure measures, police escorts, and temporary relocations and evacuations. Many human rights defenders do not trust the protection mechanism, however, due to its heavy reliance on the country's security forces, which continue to be viewed as the main perpetrators of human rights violations in Honduras. The U.S. government also supports efforts to strengthen the rule-of-law and reduce impunity in Honduras. USAID is providing assistance to the Honduran government and civil society organizations to support the development of more effective, transparent, and accountable judicial institutions, with a particular focus on guaranteeing equal access to justice for women, youth, LGBT individuals, and other victims of human rights abuses. INL also supports a variety rule-of-law initiatives, including a Violent Crimes Task Force that investigates attacks against journalists and activists. The task force, which includes vetted members of the Honduran national police, the public prosecutor's office, and U.S. advisers, reportedly arrested at least 42 people and obtained at least six convictions in 2018. The U.S. government has placed restrictions on some foreign assistance due to human rights concerns. Like all countries, Honduras is subject to legal provisions (codified at 22 U.S.C. § 2378d and 10 U.S.C. § 362 ) that require the State Department and the Department of Defense to vet foreign security forces and prohibit funding for any military or other security unit if there is credible evidence that it has committed \"a gross violation of human rights.\" In other cases, the U.S. government has chosen not to work with certain Honduran security forces as a matter of policy. For example, the United States has never provided assistance to the military police force, Some members of the Honduran military who have received U.S. training, however, have subsequently been assigned to the military police. Congress has placed additional restrictions on U.S. security assistance to Honduras over the past eight years. From FY2012 to FY2015, annual foreign aid appropriations measures required the State Department to withhold between 20% and 35% of aid for Honduran security forces until the Secretary of State could certify that certain human rights conditions were met. Since FY2016, annual appropriations measures have required the State Department to withhold 50% of aid for the central government of Honduras until the Secretary of State can certify that the Honduran government is addressing a variety of congressional concerns, including investigating and prosecuting in the civilian justice system government personnel who are credibly alleged to have violated human rights; cooperating with commissions against corruption and impunity and with regional human rights entities; and protecting the right of political opposition parties and other members of civil society to operate without interference. The State Department certified that Honduras met the conditions necessary to release assistance every year from FY2012 through FY2017. It has yet to issue certifications for FY2018 or FY2019. The 116 th Congress could consider legislative initiatives to place additional human rights restrictions on assistance to Honduras. The Berta Cáceres Human Rights in Honduras Act, H.R. 1945 (H. Johnson), would suspend all U.S. security assistance to Honduras and direct U.S. representatives at multilateral development banks to oppose all loans for Honduran security forces until the State Department certifies that Honduras has effectively investigated and prosecuted a series of human rights abuses, including the killing of Berta Cáceres, and satisfied several other conditions. The United States and Honduras have maintained close commercial ties for many years. In 1984, Honduras became one of the first beneficiaries of the Caribbean Basin Initiative, a unilateral U.S. preferential trade arrangement providing duty-free importation for many goods from the region. In the late 1980s, Honduras benefitted from production-sharing arrangements with U.S. apparel companies for duty-free entry into the United States of certain apparel products assembled in Honduras. As a result, maquiladoras , or export-assembly companies, flourished. The passage of the Caribbean Basin Trade Partnership Act ( P.L. 106-200 ) in 2000, which provided Caribbean Basin nations with North America Free Trade Agreement (NAFTA)-like preferential tariff treatment, further boosted the maquila sector. Commercial relations have expanded most recently as a result of the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR), which significantly liberalized trade in goods and services after entering into force in 2006. CAFTA-DR has eliminated tariffs on all consumer and industrial goods and is scheduled to phase out tariffs on nearly all agricultural products by 2020. Although U.S. Trade Representative Robert Lighthizer has asserted that CAFTA-DR and other trade arrangements throughout Latin America \"need to be modernized,\" the Trump Administration has not yet sought to renegotiate the agreement. Despite a significant decline in bilateral trade in the aftermath of the global financial crisis, total merchandise trade between the United States and Honduras has increased 47% since 2005; U.S. exports to Honduras have grown by 72%, and U.S. imports from Honduras have grown by 25% (see Figure 4 below). Analysts had predicted that CAFTA-DR would lead to a relatively larger increase in U.S. exports because a large portion of imports from Honduras already entered the United States duty free prior to implementation of the agreement. The United States has run a trade surplus with Honduras since 2007. Total two-way trade amounted to $10.3 billion in 2018: $5.6 billion in U.S. exports to Honduras and $4.7 billion in U.S. imports from Honduras. Top U.S. exports to Honduras included textile and apparel inputs (such as yarns and fabrics), refined oil products, machinery, and cereals. Top U.S. imports from Honduras included apparel, insulated wire, bananas and other fruit, and coffee. The United States was Honduras's largest trading partner. U.S. foreign direct investment in Honduras has grown significantly since the implementation of CAFTA-DR. The total stock of U.S. foreign direct investment in the country amounted to $1.4 billion in 2017, an increase of 71% since 2005. More than 75% is invested in the manufacturing sector. According to the State Department, approximately 200 U.S. companies operate in Honduras. While relatively low labor costs, proximity to the U.S. market, and the large Caribbean port of Puerto Cortés make Honduras attractive to investors, the country's investment climate is reportedly hampered by high levels of crime, weak institutions, corruption, low educational levels, and poor infrastructure. Some observers in the United States and Honduras have expressed concerns about the enforcement of the labor rights provisions of CAFTA-DR. In 2012, the American Federation of Labor and Congress of Industrial Organizations (AFL-CIO) joined with 26 Honduran trade unions and civil society organizations to file a petition with the U.S. Department of Labor asserting that the Honduran government had failed to meet its obligations to effectively enforce its laws relating to freedom of association, the right to organize and bargain collectively, child labor, and the right to acceptable working conditions. It identified specific violations in the port, apparel, agriculture, and auto manufacturing sectors. After a nearly three-year investigation, the Department of Labor issued a public report in 2015 stating that it had found evidence of labor law violations in nearly all of the cases included in the petition. The report stated that the department \"has serious concerns regarding the protection of internationally recognized labor rights in Honduras, including concerns regarding the Government of Honduras's enforcement of its labor laws.\" It also noted that \"there has not yet been measurable systematic improvement in Honduras to address the concerns raised.\" In December 2015, U.S. and Honduran officials signed a monitoring and action plan designed to address the legal, institutional, and practical challenges to labor law enforcement in Honduras. Although Honduras passed a comprehensive labor inspection law in 2017, enforcement reportedly remains inconsistent and ineffective. Anti-union discrimination also continues to be a \"serious problem,\" according to the U.S. State Department, with some employers harassing and threatening union leaders to undermine union operations. The Network against Anti-Union Violence in Honduras has documented at least 109 incidents of violence against labor activists since 2015, including seven murders and a forced disappearance. USAID is supporting a labor rights program that seeks to strengthen the Honduran government's ability to uphold labor rights and enhance Honduran civil society's capacity to advocate for labor rights and monitor compliance with labor legislation. Honduras has made uneven progress in addressing the country's considerable domestic challenges over the past five years. Public prosecutors have begun to combat high-level corruption with the support of the MACCIH, but their efforts have generated fierce backlash from political leaders and other sectors of the Honduran elite. The country's finances have improved, but living standards for most Hondurans remain poor. The homicide rate has been nearly cut in half, but human rights abuses persist and impunity remains widespread. Since launching the U.S. Strategy for Engagement in Central America, the United States has significantly increased foreign assistance to Honduras to strengthen government institutions, foster economic prosperity, and improve security in the country. It is too early to assess the impact of those efforts since much of the assistance only began to be delivered in 2017. Moreover, these are difficult and long-term endeavors, and significant improvements in living conditions in Honduras will likely require concerted efforts by the Honduran government and the international community over many years. U.S. policy is now uncertain as Congress has continued to appropriate funding to implement the U.S. Strategy for Engagement in Central America, but the Trump Administration has announced its intention to end some foreign assistance programs. In the absence of sustained support and engagement from the United States and other international partners, Honduras is likely to continue struggling with political and social instability, which, given the country's geographic proximity, is likely to affect the United States. ", "summary": "Honduras, a Central American nation of 9.1 million people, has had close ties with the United States for many years. The country served as a base for U.S. operations designed to counter Soviet influence in Central America during the 1980s, and it continues to host a U.S. military presence and cooperate on antidrug efforts today. Trade and investment linkages are also long-standing and have grown stronger since the implementation of the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR) in 2006. In recent years, instability in Honduras—including a 2009 coup and significant outflows of migrants and asylum-seekers since 2014—has led U.S. policymakers to focus greater attention on conditions in the country and their implications for the United States. Domestic Situation President Juan Orlando Hernández of the conservative National Party was inaugurated to a second four-year term in January 2018. He lacks legitimacy among many Hondurans, however, due to allegations that his 2017 reelection was unconstitutional and marred by fraud. Over the past five years, Honduras has made some progress in reducing violence and putting public finances on a more sustainable path. Anti-corruption efforts have also made some headway, largely as a result of cooperation between the Honduran public prosecutor's office and the Organization of American States-backed Mission to Support the Fight Against Corruption and Impunity in Honduras. Nevertheless, considerable challenges remain. Honduras continues to be one of the poorest countries in Latin America, with more than 67% of Hondurans living below the poverty line. It also remains one of the most violent countries in the world and continues to suffer from persistent human rights abuses and widespread impunity. Moreover, the country's tentative progress in combating corruption has generated a fierce backlash, calling into question the sustainability of those efforts. U.S. Policy In recent years, U.S. policy in Honduras has been guided by the U.S. Strategy for Engagement in Central America, a whole-of-government effort designed to promote economic prosperity, strengthen governance, and improve security in Honduras and the rest of the region. Congress has appropriated more than $2.6 billion for the strategy since FY2016, at least $431 million of which has been allocated to Honduras. Continued U.S. engagement in the region is uncertain, however, as the Trump Administration announced in March 2019 that it intends to end foreign assistance programs in Honduras, El Salvador, and Guatemala due to the continued northward flow of migrants and asylum-seekers to the United States. The 116th Congress could play an important role in shaping U.S. policy toward Honduras and the broader region. Several legislative initiatives that have been introduced—including H.R. 2615, S. 1445, and H.R. 2836—would authorize foreign assistance for certain activities in Central America. Congress will also consider FY2020 foreign aid appropriations. H.R. 2839 would appropriate $540.9 million for the Central America strategy, including at least $75 million for Honduras. That would be $96 million more than the Administration requested for Central America and about $9 million more than the Administration requested for Honduras. Other bills Congress may consider would tie U.S. security assistance to human rights conditions in Honduras (H.R. 1945), tie U.S. assistance to the number of unaccompanied Honduran children that arrive at the U.S. border (H.R. 2049), and expand in-country refugee processing in Honduras (H.R. 2347).", "document_type": "crs"}
{"report": "The K-12 teacher workforce is relatively largeâeach year, nearly 4 million teachers are employed in U.S. elementary and secondary schools. Turnover in these schools is high relative to earlier periodsâabout 1 in 10 teachers left his or her job in 2018. This figure follows federal statistical trends that show a steady growth in teacher attrition since the 1980s. The problem of teacher turnover raises a number of recruitment and retention issues of interest to policymakers. The Higher Education Act (HEA) is the main federal law containing policies designed to address these issues. Title II of the HEA authorizes grant support for schools that prepare new teachers. Title IV of the HEA authorizes financial support to encourage people to stay in the teaching profession in the form of loan forgiveness and other benefits. The HEA was last comprehensively amended in 2008 by the Higher Education Opportunity Act (HEOA, P.L. 110-315 ). Although the authorities have expired, the associated programs continue to receive appropriations. Congressional consideration of potentially reauthorizing the HEA is ongoing, with the introduction of numerous bills to amend current law and address teacher recruitment and retention. This report describes (1) the history of federal teacher recruitment and retention policy, (2) current policies in this area, and (3) related issues that may arise as Congress considers reauthorizing the HEA. Teacher recruitment and retention have been the focus of federal policy since the HEA was first enacted in 1965. This section briefly describes the history of federal policy in this area. The HEA was originally enacted by the 89 th Congress and signed into law on November 8, 1965 (P.L. 89-329). Title V authorized the Teacher Corps program, which recruited interns for teaching in high-poverty areas of the country. These interns, directed by experienced teachers, taught in participating K-12 schools while also taking higher education courses to secure teaching certificates. The program was initially funded in FY1966 and phased out in FY1981 under the Omnibus Budget Reconciliation Act of 1981 ( P.L. 97-35 ). In 1967, Title V became the Education Professions Development Act (EPDA, P.L. 90-35), which reauthorized the Teacher Corps program and authorized a number of new teacher development programs. Among these programs were efforts to attract low-income persons to teaching and a fellowship program for enhancing the skills of higher education faculty training elementary and secondary school teachers. In general, EPDA programs were funded beginning for FY1969 or FY1970. The Education Amendments of 1976 ( P.L. 94-482 ) repealed all of the EPDA with the exception of the Teacher Corps program. The Education Amendments of 1976 ( P.L. 94-482 ) renamed Title V as Teacher Corps and Teacher Training Programs, extended the Teacher Corps program authorization, and authorized a new Teacher Centers program. Teacher Centers, first funded for FY1978, were operated by local educational agencies (LEAs) or institutions of higher education (IHEs), and provided in-service training to the elementary and secondary school teaching force. The Omnibus Budget Reconciliation Act phased out the program in FY1981. Initially enacted in 1984 under the Human Services Reauthorization Act ( P.L. 98-558 ), the Paul Douglas Teacher Scholarships provided annual $5,000 postsecondary education scholarships, for up to four years, to outstanding high school graduates (candidates in the top 10% of their high school graduating class, among other criteria). Recipients were required to teach for two years at the K-12 level for each year of scholarship assistance they received, an obligation that could be reduced by half for those teaching in geographic or subject areas that were experiencing shortages. Federal funds were allocated by formula to states. The Paul Douglas Teacher Scholarships were first funded for FY1986 and last funded for FY1995 (when the program authority was terminated). Also initially authorized under the Human Services Reauthorization Act, the National Talented Teacher Fellowships, later-renamed the Christa McAuliffe Fellowships, provided one-year awards to outstanding, experienced public and private elementary and secondary school teachers for sabbaticals. Following sabbaticals to develop innovative teaching projects, recipients had to return to their prior place of employment for two years. The federal appropriation was allocated by formula among the states. The Christa McAuliffe Fellowships were first funded for FY1987 and last funded for FY1995. The Higher Education Amendments of 1986 ( P.L. 99-498 ) rewrote Title V as Educator Recruitment, Retention, and Development. These amendments not only extended and renamed the scholarship and fellowship programs enacted in 1984, but also added two new programs intended to recruit new teachers to the profession: Mid-Career Teacher Training and Minority Teacher Recruitment. Mid-Career Teacher Training provided grants to IHEs for the establishment of programs to prepare individuals leaving their current careers in order to teach. Eligibility was limited to individuals with a baccalaureate or advanced degree who had job experience in education-related fields. Two fields are specifically cited in the authorizing statute: preschool and early childhood education. IHEs were initially to receive a planning grant of not more than $100,000 to be used in the two fiscal years following selection; however, the program was funded for two years (FY1990 and FY1991). Minority Teacher Recruitment awarded grants to partnerships between an IHE and either a State Education Agency (SEA) or an LEA to recruit and train minority students, beginning with students in 7 th grade, to become teachers. The program also awarded grants to IHEs to improve teacher preparation programs and to support teacher placement in schools with high minority student enrollment. It was initially funded for FY1993 and received its last appropriation for FY1997. The Higher Education Amendments of 1998 established a new federal teacher program in Title II, the Teacher Quality Enhancement Grant program. Part A of Title II authorized three types of competitively awarded grants: State Grants, Partnership Grants, and Recruitment Grants. State Grants and Partnership Grants were each authorized to receive 45% of the appropriation for Title II-A and Recruitment Grants were allocated the remaining 10%. Funds for these grants were first appropriated for FY1999 and have been continued to the present day under new authority described below. State Grants and Partnership Grants funds were to be used for activities including the improvement of teacher pre-service preparation, accountability for teacher preparation programs, the reform of teacher certification requirements (including alternative routes to certification), and in-service professional development. Recruitment Grants funds were to be used for the recruitment of highly qualified teachers (Partnership Grants could also be used for this purpose). Specific recruitment activities described in Title II include teacher education scholarships, support services to help recipients complete postsecondary education, follow-up services during the first three years of teaching, and activities enabling high-need LEAs and schools to recruit highly qualified teachers. In 2008, HEA Title II-A was renamed the Teacher Quality Partnership program under amendments made by the HEOA, which remains current law. The HEA, as amended by the HEOA, addresses current K-12 teacher issues through programs supporting the improvement of teacher preparation and recruitment. Title II of the HEA authorizes grants for improving teacher education programs, strengthening teacher recruitment efforts, and providing training for prospective teachers. This title also includes reporting requirements for states and IHEs regarding the quality of teacher education programs. Title IV of the HEA authorizes Teacher Education Assistance for College and Higher Education (TEACH) Grants to encourage more students to prepare for a career in teaching and student loan forgiveness for individuals teaching in certain high-need subjects. Teachers may also be eligible for loan relief through the Title IV Public Service Loan Forgiveness program. Title II, Part A of the HEA authorizes Teacher Quality Partnership (TQP) grants to improve the quality of teachers working in high-need schools and early childhood education programs by improving the preparation of teachers and enhancing professional development activities for them, holding teacher preparation programs accountable for preparing effective teachers, and recruiting highly qualified individuals into the teaching force. To be eligible, partnerships must include a high-need LEA; a high-need school or high-need early childhood education program (or a consortium of high-need schools or early childhood education programs served by the partner high-need LEA); a partner IHE; a school, department, or program of education within the partner IHE; and a school or department of arts and sciences within the partner IHE. The TQP statute requires that a high-need LEA must have either a high rate of out-of-field teachers or a high rate of teacher turnover and meet one of the following three criteria: 1. have at least 20% of its children served be from low-income families; 2. serve at least 10,000 children from low-income families; or 3. be eligible for one of the two Rural Education Achievement Programs. Partnership grant funds are authorized to be used for a Pre-Baccalaureate Preparation program, a Teacher Residency program, or both. Funds may also be used for a Leadership Development program, but only in addition to one of the other two programs. Activities authorized by the HEOA amendments are described below. Grants are provided to implement a wide range of reforms in teacher preparation programs and, as applicable, preparation programs for early childhood educators. These reforms may include, among other things, implementing curriculum changes that improve, evaluate, and assess how well prospective teachers develop teaching skills; using teaching and learning research so that teachers implement research-based instructional practices and use data to improve classroom instruction; developing a high-quality and sustained pre-service clinical education program that includes high-quality mentoring or coaching; creating a high-quality induction program for new teachers; implementing initiatives that increase compensation for qualified early childhood educators who attain two-year and four-year degrees; developing and implementing high-quality professional development for teachers in the partner high-need LEAs; developing effective mechanisms, which may include alternative routes to state certification, to recruit qualified individuals into the teaching profession; and strengthening literacy teaching skills of prospective and new elementary and secondary school teachers. Grants are provided to develop and implement teacher residency programs that are based on models of successful teaching residencies and that serve as a mechanism to prepare teachers for success in high-need schools and academic subjects. Grant funds must be used to support programs that provide, among other things, rigorous graduate-level course work to earn a master's degree while undertaking a guided teaching apprenticeship, learning opportunities alongside a trained and experienced mentor teacher, and clear criteria for selecting mentor teachers based on measures of teacher effectiveness. Programs must place graduates in targeted schools as a cohort in order to facilitate professional collaboration and provide to members of the cohort a one-year living stipend or salary, which must be repaid by any recipient who does not teach full-time for at least three years in a high-need school or subject area. Grants are provided to develop and implement effective school leadership programs to prepare individuals for careers as superintendents, principals, early childhood education program directors, or other school leaders. Such programs must promote strong leadership skills and techniques so that school leaders are able to create a school climate conducive to professional development for teachers, understand the teaching and assessment skills needed to support successful classroom instruction, use data to evaluate teacher instruction and drive teacher and student learning, manage resources and time to improve academic achievement, engage and involve parents and other community stakeholders, and understand how students learn and develop in order to increase academic achievement. Grant funds must also be used to develop a yearlong clinical education program, a mentoring and induction program, and programs to recruit qualified individuals to become school leaders. The HEOA amendments established five new programs in HEA, Title II, Part B, Enhancing Teacher Education: Subpart 1, Preparing Teachers for Digital Age Learners; Subpart 2, Hawkins Centers of Excellence; Subpart 3, Teach to Reach Grants; Subpart 4, Adjunct Teacher Corps; and Subpart 5, Graduate Fellowships to Prepare Faculty in High-Need Areas. None of these programs has received funding. The College Cost Reduction and Access Act ( P.L. 110-84 ) established the TEACH Grants under Subpart 9 of HEA, Title VI-A to provide aid directly to postsecondary students who are training to become teachers. The program provides grants to cover the cost of attendance of up to $4,000 per year ($16,000 total) for bachelor's studies or $8,000 total for master's studies to students who commit to teaching high-need subjects in low-income schools after completing their postsecondary education. Both undergraduate and graduate students are eligible for the grants and must agree to serve as full-time mathematics, science, foreign language, bilingual education, special education, or reading teachers in low-income schools for at least four years within eight years of graduating. Current teachers, retirees from other occupations, and those who became teachers through alternative certification routes are also eligible for TEACH Grants to help pay for the costs of obtaining graduate degrees. An individual who fails to complete the agreed-upon service in low-income schools and high-need subjects is required to pay back his or her TEACH Grant as an Unsubsidized Direct Loan, including interest from the day the grant was made. Relief from repayment obligations under federal student loan programs has been available to teachers since before enactment of the HEA. The National Defense Education Act of 1958 (NDEA, P.L. 85-864) included a loan forgiveness component of the National Defense Student Loan (NDSL) program that was intended to increase the number and quality of teachers in U.S. schools. The NDSL program was incorporated into the HEA through the Education Amendments of 1972 (P.L. 92-318) and was later renamed the Federal Perkins Loan Program by amendments made through the Higher Education Amendments of 1986 ( P.L. 99-498 ). Under current HEA provisions, qualified teachers may receive relief from up to 100% of their Perkins Loan balance, depending on years of service; although new Perkins Loans are no longer being made. Loan forgiveness for teachers was expanded to include loans made under the Federal Family Education Loan and Direct Loan programs by the Higher Education Amendments of 1998 ( P.L. 105-244 ). For individuals who teach for five years on a full-time basis in eligible low-income schools, up to $5,000 may be canceled. Forbearance is available to borrowers during their five years of qualified teaching. Only individuals who are new borrowers on or after October 1, 1998, are eligible for this loan forgiveness benefit. The Taxpayer-Teacher Protection Act of 2004 ( P.L. 108-409 ) increased the maximum amount of loan forgiveness to $17,500 for special education teachers and those teaching mathematics or science in secondary schools. Teachers may also qualify for student debt relief under the Public Service Loan Forgiveness (PSLF) program, enacted by the College Cost Reduction and Access Act of 2007 ( P.L. 110-84 ). Under the PSLF program, individuals may qualify to have the balance (principal and interest) of their Direct Loans forgiven if they have made 120 full, scheduled, monthly payments on those loans, according to certain repayment plans, while concurrently employed full-time in public service (which can include teaching). The 116 th Congress is expected to consider reauthorizing the HEA. Thus far, numerous bills have been introduced to amend current law and address teacher recruitment and retention. This section discusses issues that may arise as the potential reauthorization process unfolds. The policy issues discussed here are based on existing and prior legislative proposals and are intended to provide some context for their consideration. These issues include modifying the Title II grant partnership structure, targeting support to specific teacher shortage areas or non-instructional staff, expanding teacher preparation program accountability requirements, reforming administration of the TEACH Grant program, and expanding or consolidating teacher loan forgiveness programs. Currently, IHEs are a required partner in the TQP program and often serve as the sponsor of a partnership. With the rise of alternatives to traditional routes into the teaching profession, some proposals would eliminate the requirement that IHEs be a partner by allowing non-IHE-based teacher preparation providers to serve as TQP grantee sponsors as well. Current law defines a \"partner institution\" as a four-year IHE. Policymakers may consider amending this definition to allow two-year IHEs or other nonprofit teacher preparation programs to serve as a TQP partner institution or partnership sponsor. To be a partner in a TQP grant, LEAs and schools must be designated as \"high-need\" according to definitions in Title II of the HEA. Those definitions attempt to direct support, in part, toward low-income LEAs and schools. Some feel the thresholds set by the HEA are too low and that funds should be reserved for very low-income LEAs and schools. Current federal teacher recruitment and retention programs often direct support to certain instructional areas that are considered hard-to-staff, such as mathematics, science, and special education. Some feel these provisions should be broadened to include additional subject areas (e.g., English language learner instruction) or certain hard-to-staff schools (e.g., rural and/or Native American schools). Others have proposed that the targeted position types should be broadened to include non-instructional staff such as school counselors, librarians, literacy specialists, and coaches. There are also proposals focused on staff who serve in leadership roles (e.g., establishing principal residency programs similar to the current teacher residencies). Some have pushed for Title II amendments that would support teacher advancement into leadership through the creation of career ladders and incentives for master teachers. Still others would like to allow the Secretary to set aside Title II funds for a state grant for leadership training activities. Under current HEA provisions, IHEs that operate teacher preparation programs are required to report information on their performance including pass rates and scaled scores on teacher certification exams. States are required to report these data in aggregate as well as the results of program evaluations and any programs designated as \"low-performing.\" Thirty states have never identified a program as low-performing and fewer than 3% of all programs nationwide have ever been identified as low-performing or at-risk of such designation. Some policymakers have argued that current accountability provisions are inadequate. Some have asserted that non-IHE-based programs in particular are not sufficiently scrutinized. Others think that all teacher preparation programs should be subject to outcome measures beyond passage of certification exams and that programs should be judged by their graduates' professional readiness, ability to find employment, and retention in teaching, as well as the performance of their students. The TEACH Grant program has reportedly encountered significant administrative challenges and has been the subject of increasing congressional scrutiny. Changes that have been suggested to alleviate these issues include providing grant recipients additional time to complete the service requirement, the option to pay back part of their grant if they are unable to complete the service requirement in full, and a better process by which to appeal the conversion of their grant to a loan. Some observers are concerned that students in the first year or two of college are not fully aware of what profession they want to go into, and they have advocated that TEACH Grants be made available to student in their junior and senior years of college and/or to master's degree candidates. Others have sought to limit TEACH Grants to programs with a proven ability to prepare individuals effectively for the teaching profession. Teachers may access several separate loan relief options under current federal law. In many cases, these options serve similar purposes, but benefit requirements may conflict with or not complement one another (i.e., exercising eligibility for one program may nullify or forestall eligibility for another). The existence of multiple programs may lead to borrower confusion as well as administrative complexity. Policymakers might consider consolidating programs or targeting them to a narrower set of borrowers. Some argue that the requirements teachers must meet to qualify for loan relief are too difficult to understand and/or fulfill. These requirements caused the loan forgiveness programs to encounter administrative problems similar to those in the TEACH Grant program. Policymakers may consider whether to simplify these requirements to improve the effectiveness of loan forgiveness as a teacher retention tool.", "summary": "The K-12 teacher workforce is relatively largeâeach year, about 4 million teachers are employed in U.S. elementary and secondary schools. Turnover in these schools is high relative to earlier periodsâabout 1 in 10 teachers left his or her job in 2018. This figure follows federal statistical trends that show a sizable growth in teacher attrition since the 1980s. Teacher shortages and high turnover raise a number of recruitment and retention issues that may be of interest to policymakers. One of the more difficult issues involves a debate between observers who are concerned about an overall teacher shortage, and others who see it largely as a distributional problem where some schools have a relative surplus of teachers while other schools struggle with a persistent, unmet demand for qualified teachers. Those in the former camp focus on policies that aim to improve the recruitment and retention in the teaching profession in general, while those in the latter camp focus on policies that target education funding to fill positions for certain hard-to- staff schools and/or subject areas. Current federal policy addresses recruitment and retention. The Higher Education Act (HEA) authorizes grant support to institutions that prepare K-12 teachers as well as financial aid to students interested in the teaching profession. Title II of the HEA authorizes grants for improving teacher education programs, strengthening teacher recruitment efforts, and providing training for prospective teachers. Title IV of the HEA authorizes Teacher Education Assistance for College and Higher Education (TEACH) Grants to encourage students to prepare for a career in teaching and student loan forgiveness for teachers that remain in the classroom over a number of years. The HEA was last comprehensively amended in 2008 by the Higher Education Opportunity Act (HEOA, P.L. 110-315 ). Congressional consideration of potentially reauthorizing the HEA is ongoing, including the introduction of numerous bills to amend the portions of current law that address teacher recruitment and retention. Issues that may arise as the reauthorization process unfolds include modifying the Title II grant partnership structure, targeting support to specific teacher shortage areas or non-instructional staff, expanding teacher preparation program accountability, reforming administration of the TEACH Grant program, and expanding or consolidating teacher loan forgiveness programs.", "document_type": "crs"}
{"report": "A pension is a voluntary benefit offered by employers to assist employees in preparing for retirement. Pension plans may be classified according to whether they are (1) defined benefit (DB) or defined contribution (DC) plans and (2) sponsored by one or more than one employer. In DB plans, participants typically receive regular monthly benefit payments in retirement (which some refer to as a \"traditional\" pension). In DC plans, of which the 401(k) plan is the most common, participants have individual accounts that can provide a source of income in retirement. This report focuses on DB plans. Pension plans are also classified by whether they are sponsored by one employer (single-employer plans) or by more than one employer (multiemployer and multiple-employer plans). Multiemployer pension plans are sponsored by more than one employer (often, though not required to be, in the same industry) and maintained as part of a collective bargaining agreement. Multiple-employer plans are sponsored by more than one employer but are not maintained as part of collective bargaining agreements. Multiple-employer plans follow the same funding rules as single-employer plans and are generally not reported separately. This report focuses on single-employer plans. Except where noted, references to single-employer plans in this report include multiple-employer plans. To protect the interests of pension plan participants and beneficiaries, Congress enacted the Employee Retirement Income Security Act of 1974 (ERISA; P.L. 93-406 ). The law is codified in the Internal Revenue Code (26 U.S.C.) and Labor Code (29 U.S.C.). ERISA sets standards that private-sector pension plans must follow with regard to plan participation (who must be covered); minimum vesting requirements (how long a person must work for an employer to be covered); fiduciary duties (how individuals who oversee the plan must behave); and plan funding (how much employers must set aside to pay for future benefits). In addition, ERISA established the Pension Benefit Guaranty Corporation (PBGC), which is a government corporation that insures DB pension plans covered by ERISA in the case of plan termination. ERISA covers only private-sector pension plans and plans established by nonprofit organizations. It exempts pension plans established by the federal, state, and local governments and by churches. The funding relief provisions discussed in this report generally apply only to plans covered by ERISA. Pension funding consists of several elements. These include the value of plan benefits that participants will receive in the current and in future years; the amount a plan has set aside to pay for these benefits; and the employer contributions required each year to ensure the plan has sufficient funds to pay benefits when participants retire. The amount of a participant's benefit in a single-employer DB plan is based on a formula that typically uses a combination of length of service, accrual rate, and average of final years' salary. For example, a plan might specify that retirees receive an amount equal to 1.5% of their pay for each year of service, where the pay is the average of a worker's salary during his or her highest-paid five years. In general, ERISA requires DB plans to have enough assets set aside to pay the benefits owed to participants. For various reasons, plans may have less or more than this amount. Employers that sponsor DB plans are required to make annual contributions to their plans to ensure they ultimately reach that 100% funding goal. Figure 1 depicts a typical DB pension plan's balance sheet. It consists of (1) plan assets, which are the value of the investments made with accrued employer (and employee, if any) contributions to the plan, and (2) plan liabilities, which are the value of participants' benefits earned under the terms of the plan. Plan assets are invested in equities (such as publicly-traded stock), debt (such as the U.S. Treasury and corporate bonds), private equity, hedge funds, and real estate. Pension plans are required to report the value of plan assets using two methods: (1) market values (the value at which assets can be sold on a particular date) and (2) smoothed, or actuarial , values (the average of the past, and sometimes expected future, market values of each asset). Actuarial values are used to determine the 100% funding goal and any additional employer contributions necessary to achieve that goal. The smoothing of asset values prevents large swings in asset values and creates a more predictable funding environment for plan sponsors. Some advocates of reporting market values note that smoothed values are often higher than market values (particularly during periods of market declines), which could overstate the financial health of some pension plans. Some advocates of smoothing argue that market values are useful only if a plan needs to know its liquidated value (e.g., if the plan had to pay all of its benefit obligations at one point in time), which is unlikely to be the case as most employers sponsoring pension plans are unlikely to enter bankruptcy. A pension plan's benefits are a plan liability spread out over many years in the future. These future benefits are calculated and reported as present values (also called current values). Using a formula, benefits that are expected to be paid in a particular year in the future are calculated so they can be expressed as a present value. This process is called discounting , and it is the reverse of the process of compounding , which projects how much a current dollar amount will be worth at a point in the future. The formula by which future values are calculated as present values is shown in Figure 2 . Figure 3 shows a simplified example of a DB pension benefit calculation. In this example, it is assumed that at the beginning of year 1, the worker has already earned a benefit of $100 per year in retirement, which is expected to begin in year 5. Retirement is expected to last four years. Each of the payments is made at the beginning of the year and is discounted using the present value formula in Figure 2 and assuming an interest rate of 10%. In this example, the first benefit is received at the beginning of year 5, so that benefit payment is discounted over four years. The benefits for the following three years are also discounted to beginning of year 1 dollar amounts and are then summed, resulting in a benefit value of $238.16 at the beginning of year 1. The calculated present value of the benefit payments depends on the year in which the benefit is calculated. For example, as a worker moves closer to the expected date of retirement and recalculates the present value of the benefit, the calculated value of the obligation increases. For example, when calculated at the beginning of year 2, the simplified pension benefit has a present value of $261.97 in year 2 dollars . When calculated at the beginning of year 3, the benefit has a present value of $288.17 in year 3 dollars . The DB plan funding ratio compares the value of a plan's assets with the present value of a plan's liabilities and is often used as an indicator of the financial health of a plan. The DB plan funding ratio is calculated as A funding ratio of 100% indicates that the DB plan has set aside enough funds to pay the present value of the plan's future benefit obligations. Funding ratios that are less than 100% indicate that the DB plan has not set aside enough to meet the calculated value of its future benefit obligations. Because benefit obligations are typically paid out over a period of 20 to 30 years, participants in even an underfunded plan will likely receive their promised benefits in the near term. However, if the underfunding persists without additional contributions or higher investment returns, plan participants in an underfunded plan might not receive 100% of their promised benefits in the future. Returning to the example above, setting aside $238.16 at the beginning of year 1 would fund the year 1 value of the benefit. At the beginning of year 2, the benefit has a recalculated value of $261.97 in year 2 dollars. Because $238.16 was set aside at the beginning of year 1â and assuming no investment gains or losses and no additional pension benefits âan additional contribution of $23.81 ($261.97 - $238.16) is needed to fund the value of the benefit as calculated at the beginning of year 2. Likewise, at the beginning of year 3, the benefit has a recalculated value of $288.17 in year 3 dollars. Because $238.16 was set aside at the beginning of year 1, and $23.81 more was contributed at the beginning of year 2â and assuming no investment gains or losses and no additional pension benefits âan additional contribution of $26.20 ($288.17 - $261.97) is needed to fund the value of the benefit as calculated at the beginning of year 3. This discussion of the example in Figure 3 has reviewed the funding ratio and required payments for only the first three years displayed. In practice, the DB plan funding ratio would continue to be recalculated and payments necessary to satisfy any DB plan funding ratio shortfalls would continue to be required each year to ensure the DB plan funding obligation is fully satisfied. The present value of a dollar amount is inversely related to the assumed interest rate. As the interest rate increases, present value decreases; as the interest rate decreases, present value increases. In the above example, if the interest rate is 15%, then the pension benefit has a value of $187.72 calculated at the beginning of year 1, $215.88 calculated at the beginning of year 2, and $248.26 calculated at the beginning of year 3. In this modification of the simplified example, with the only difference being a 15% interest rate, the pension benefit would be fundedâ and assuming no investment gains or losses and no additional pension benefits âwith contributions of $187.72 at the beginning of year 1; $215.88 - $187.72 = $28.16 at the beginning of year 2; and $248.26 - $215.88 = $32.38 at the beginning of year 3. This example shows payments for the first three years; in practice, contributions would continue until the obligation is fully satisfied. Note that the amounts of the yearly payments differ depending on the interest rate used. Compared with the payments in the 10% interest rate example, the initial payment in the 15% example is lower ($187.72 versus $238.16) but subsequent payments are higher (e.g., year 2 payments are $28.16 using the 15% interest rate and $23.81 using the 10% interest rate). Over time, the required payments in both casesâ assuming no investment gains or losses and no additional pension benefits âsum to the total benefits received in retirement. The interest rate used by single-employer DB plans is discussed later in this report. ERISA sets out requirements for the minimum required contribution , which is amount of money that must be contributed each year to a DB pension plan. In general, the minimum required contribution is the sum of (1) the value of benefits earned by participants in the plan year (the target normal cost ), (2) installment payments resulting from plan underfunding in previous years (the shortfall amortization charge ), and (3) installment payments resulting from Internal Revenue Service- (IRS-) approved waived required contributions in previous years (the waiver amortization charge ). The target normal cost represents the value of pension benefits that are earned or accrued by employees in a plan year and the cost to administer these benefits (minus any mandatory employee contributions). A DB plan's funding can change in a given year as a result of changes to participants' benefits, employer contributions, and circumstances or events outside the plan's control. Plan underfunding could increase from events such as a decrease in plan assets due to declines in the stock market or an increase in plan liabilities due to decreases in interest rates. In order for a plan to remain fully funded, employers must increase their plan contributions to make up for losses that are outside the plan's control. Employers are not required to make up for the losses all at once. Rather, they may make installment payments to make up for plan losses over a number of years. Plan underfunding is paid off in installment payments via amortization . The amortization period is the length of time over which a plan can spread the installment payments. A plan's funding target is the present value of all benefits earned by participants as of the beginning of the year. A plan's funding shortfall is the amount by which the funding target is greater than the value of plan assets. Various factors can cause funding shortfalls, such as investment losses and decrease in interest rates. In general, PPA required plan underfunding resulting from funding shortfalls to be amortized over a period of seven years. Employers that face a temporary substantial business hardship can apply to the IRS for a funding waiver. Missed minimum required contributions as a result of receiving an IRS funding waiver must be amortized over five years. The waiver amortization charge is the amount of a plan's installment payment that amortizes the missed contributions. Table 1 provides data on single-employer DB pension plans. In 2018, there were over 23,000 of such plans with 26.2 million participants. According to PBGC, 81.4% of plans (containing 95.2% of plan participants) were underfunded in 2016. The total amount of underfunding in these plans was $625.4 billion. In addition, 18.6% of plans (containing 4.8% of participants) were overfunded in 2016. The total amount of overfunding in these plans was $15.3 billion. Figure 4 shows the funding percentage of the 100 largest corporate DB pension plans from 2015 to 2020. The most recent data show that in February 2020, these plans had $1.6 trillion in assets and $1.9 trillion in projected benefit obligations. The funding percentage (assets as a percentage of benefit obligations) was 82.2%, and total underfunding was $0.3 trillion. The Pension Protection Act of 2006 (PPA; P.L. 109-280 ) was the most recent major legislation to affect pension plan funding. Among other provisions, PPA established new funding rules for single- and multiple-employer plans and required that plans become 100% funded over a certain time period. PPA specified interest rates and other actuarial assumptions that plans must use to calculate their funding targets and target normal costs. PPA gave plans three years to transition to the new funding requirements. PPA also created special rules for certain types of plans, including those sponsored by certain government contractors, commercial airlines, and rural cooperatives. PPA specified that pension plans discount their future benefit obligations using three different interest rates. The rates, called segment rates, used in the calculation depend on the date on which benefit obligations are expected to be paid and the corresponding rates on the corporate bond yield curve. The segment rates are calculated as the average of the corporate bond yields within the segment for the preceding 24 months. The IRS publishes the segment rates on a monthly basis. The first segment is for benefits payable within five years. The first segment rate is calculated as the average of short-term bond yields (with a maturity less than five years) for the preceding 24 months. Likewise, the second and third segments are for benefits payable after 5 years to 20 years and after 20 years, respectively. The second and third segment rates are calculated similarly to the first segment rates, using bonds of appropriate maturities. PPA required that shortfall amortization charges (funding shortfalls as a result of, for example, investment losses) be amortized over seven years and waiver amortization charges (from missed required minimum contributions) be amortized over five years. Amortization payments include interest. PPA outlined special rules for certain pension plans. Some of the rules have expired; others have been extended or expanded by subsequent legislation. PPA provided special funding rules for certain eligible plans maintained by (1) a commercial passenger airline or (2) an employer whose principal business is providing catering services to a commercial passenger airline. Eligible plans that met certain benefit accrual and benefit increase restrictions could (1) use a 17-year amortization period, instead of the seven years required by PPA, beginning in 2006 or 2007 and (2) use an 8.85% interest rate, instead of the required segment rates, for the purposes of valuing benefit obligations. Eligible plans that did not meet certain benefit accrual and benefit increase restrictions could choose to use a 10-year amortization period for the first taxable year, beginning in 2008. PPA delayed the date for certain government contractor plans to adopt the new funding rules to the 2011 plan year. Eligible plans were defense industry contractors whose primary source of revenue was derived from business performed under government contracts that exceeded $5 billion in the prior fiscal year. PPA delayed the date for certain PBGC settlement plans to adopt the new funding rules to the 2014 plan year. Eligible plans were those in existence as of July 26, 2005, and (1) sponsored by an employer in bankruptcy proceedings giving rise to a claim of $150 million or less, and the sponsorship of which was assumed by another employer, or (2) that, by agreement with PBGC, were spun off from plans that were subsequently terminated by PBGC in involuntary terminations. Since PPA's enactment in 2006, Congress has modified funding rules for pension plans several times. Funding relief provisions have delayed the implementation dates of some PPA provisions, extended amortization periods, or changed interest rates. Some funding relief has been directed toward all single-employer DB plans; other modifications of funding rules have been targeted to specific types of pension plans, such as plans for certain cooperative and charitable organizations and for community newspapers. An extension of amortization periods allows plans a greater amount of time to pay off unfunded liabilities, meaning that plans can contribute less money per year over a greater number of years. Changes in interest rates modify the timing of required employer contributions. As previously mentioned, a higher interest rate decreases the present value of plan liabilities, which means employers can contribute less today to fund a future benefit. The dollar amount of the benefit that a participant will receive in the future remains unchanged. Relative to a lower interest rate, a higher interest rate allows plans to contribute relatively smaller amounts in the near term but will have to be made up with higher contributions in the longer term. A lower interest rate does the oppositeâit increases the present value of plan liabilities, requiring more employer contributions in the near term (and fewer in the long term). The following sections describe funding relief provisions and other funding rule modifications in chronological order, where feasible, since PPA. The U.S. Troop Readiness, Veterans' Care, Katrina Recovery, and Iraq Accountability Appropriations Act, 2007 ( P.L. 110-28 ) provided funding relief for plans operated by certain commercial airlines and airline catering companies. As described above, PPA had extended the amortization period to either 10 or 17 years for these plans. P.L. 110-28 specified that eligible plans that had chosen the 10-year amortization period could use an interest rate of 8.25% for purposes of calculating the funding target for each of those 10 years. The Worker, Retiree, and Employer Recovery Act of 2008 (WRERA; P.L. 110-458 ) delayed the implementation of the PPA transition rules, giving plans additional time to become fully funded (given the decline in asset values due to the 2007-2009 economic downturn). The Preservation of Access to Care for Medicare Beneficiaries and Pension Relief Act of 2010 ( P.L. 111-192 ) allowed plans to amortize underfunding resulting from the 2007-2009 market downturn using one of two alternative amortization schedules. Pension plan sponsors could amortize their funding shortfalls over either (1) 9 years, with the first 2 years of payments consisting of interest only on the amortization charge and the next 7 years consisting of interest and principal, or (2) 15 years. Plan sponsors that chose one of these amortization schedules were required to make additional contributions to the plan if the plan sponsors paid excess compensation or declared extraordinary dividends, as defined in P.L. 111-192 . The Moving Ahead for Progress in the 21 st Century Act (MAP-21; P.L. 112-141 ) established a funding corridor to provide minimum and maximum interest rates used in calculating plan liabilities. The minimum and maximum rates were initially calculated as 90% and 110%, respectively, of the average of corporate bond yields for the segment over the prior 25-year period. If the 24-month segment interest rate as calculated under PPA is below the minimum percentage of the funding corridor, the interest rate is adjusted upward to the minimum. If the 24-month segment interest rate is higher than the maximum, it is adjusted downward to the maximum. MAP-21 adjusted the minimum and maximum percentages surrounding the baseline rate over time to become 70% and 130%, respectively, by 2016 (essentially widening the corridor). When interest rates increase (which occurs when the 24-month rate is adjusted upward to the minimum rate), the present value of future benefit obligations decreases, and required plan contributions decrease. When companies contribute less to their pension plan, lower plan contributions increase companies' taxable income, which results in increased Treasury revenue. Since MAP-21, provisions in enacted legislation twice delayed the beginning of the widening of the funding corridor. First, the Highway and Transportation Funding Act of 2014 (HTF; P.L. 113-159 ) delayed the beginning of widening of the funding corridor until 2018. Later, the Bipartisan Budget Act of 2015 (BBA; P.L. 114-74 ) delayed it until 2021. Table 2 shows the applicable minimum and maximum percentages under MAP-21, HTF, and BBA. Figure 5 shows a hypothetical example of how segment rates are determined using the funding corridors. The red line shows the average of a segment's interest rates for the prior 25 years. The yellow and gold lines indicate the minimum and maximum rates around the 25-year average under the MAP-21 provisions. The light green and dark green lines indicate the widening of the corridors around the 25-year average under the HTF provisions (starting in 2018). The light blue and dark blue lines are the minimum and maximum rates around the 25-year averages in current law, as passed in the BBA (starting in 2021). Because of the HTF and BBA extensions, the minimum and maximum corridors have remained at 90% and 110%, respectively, since 2012. The following example demonstrates how segment rates are adjusted. If Treasury determines that the segment rate is above the maximum segment rateâpoint (1) in Figure 5 âthen Treasury adjusts the segment rate downward until it equals the proposed maximum segment rate. If Treasury determines that the segment rate is at or below the maximum segment rate and at or above the minimum segment rateâpoint (2) in Figure 5 âTreasury does not adjust the segment rates. If Treasury determines that the segment rate is below the minimum segment rateâpoint (3) in Figure 5 âthen Treasury adjusts the interest rate upward until it equals the proposed minimum segment rate. For example, in April 2020, the first segment rate before adjustment was 2.68%. Adjusted for the 25-year average bond yields, the first segment rate was 3.64%. Congress has authorized special funding rules for plans sponsored by specific types of employers, such as rural cooperatives and certain charities. PPA delayed the implementation of funding rules for certain cooperatives. Subsequent legislation expanded this delayed effective date to certain charities. Later legislation modified funding rules for these plans, referred to as Cooperative and Small Employer Charity (CSEC) pension plans. With two exceptions, CSEC plans are multiple-employer pension plans established by eligible cooperatives and certain charitable organizations to provide retirement benefits for their employees. PPA provided a delayed effective date of January 1, 2017, for certain multiple-employer cooperative plansâsuch as pension plans for agriculture, electric, and telephone cooperativesâto adopt the new funding rules. The Preservation of Access to Care for Medicare Beneficiaries and Pension Relief Act of 2010 ( P.L. 111-192 ) extended PPA's delayed effective date to apply to certain charitable organizations' pension plansâmultiple-employer plans whose employers are charitable organizations described in 26 USC Â§501(c)(3). The Cooperative and Small Employer Charity Pension Flexibility Act of 2013 ( P.L. 113-97 ) established funding rules for and provided a definition of CSEC pension plans. Among other provisions, this act permanently exempted these plans from PPA's funding rules and outlined minimum funding standards for CSEC plans. Plans must indicate if they use the CSEC-specific funding rules in their required annual reporting to the Department of Labor (DOL). Table A-1 provides a list of CSEC plans and funded status in the 2017 plan year. Section 3 of Division P of the Consolidated and Further Continuing Appropriations Act, 2015 ( P.L. 113-235 ) expanded the definition of CSEC plans to include plans maintained by an employer that meet several criteria. It appears that the Boy Scouts of America Master Pension Trust is the only plan that meets these expanded criteria. Section 3609 of the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) applies CSEC funding rules to plans sponsored by certain charitable employers \"whose primary exempt purpose is providing services with respect to mothers and children,\" among other criteria. It appears that the pension plan sponsored by March of Dimes is the only plan that meets these expanded criteria. Section 115 of the Setting Every Community up for Retirement Enhancement Act of 2019 (SECURE Act, enacted as Division O of the Further Consolidated Appropriations Act of 2020; P.L. 116-94 ) provided special funding rules for pension plans operated by certain community newspapers that had no benefit increases for participants after December 31, 2017. Community newspaper plans are those maintained by certain private community newspaper organizations that are family-controlled and have been in existence for 30 or more years. For these plans, the SECURE Act increased the interest rate to 8%, and extended the amortization period from 7 to 30 years. Section 3608 of the CARES Act ( P.L. 116-136 ) allows contributions that are due in calendar year 2020 to be made, with interest, on January 1, 2021. Section 3608 also allows plans to use the funding percentage for the 2019 plan year, rather than the 2020 plan year (which would likely be lower), in determining whether plans must impose benefit restrictions. Policymakers and stakeholders might consider some of the policy implications of single-employer DB pension plan funding relief. The considerations include the rationale for providing relief, the effects of lower levels of plan assets on participant benefits and PBGC, and the effect on the federal budget. Funding relief results in lower employer contributions to DB plans in the near term. Among the rationales for funding relief is that it allows employers the flexibility to use funds for other priorities (such as retaining or hiring employees). For example, 74 trade associations said in a 2009 letter to policymakers that, \"[P]roviding defined benefit funding relief is directly related to improving the economy and employment.\" On the other hand, some policymakers oppose funding relief to specific industries or companies because they provide \"a special-interest bailout\" and set both \"bad policy and bad precedent.\" Some stakeholders have expressed concern that employers adopting funding relief measures might use the funds saved via reduced contributions for non-core business activities. For example, the Preservation of Access to Care for Medicare Beneficiaries and Pension Relief Act of 2010 ( P.L. 111-192 ) limited the ability of employers that adopted funding relief measures to provide excess employee compensation or extraordinary dividends. Although employer contributions and plan assets are lower following funding relief, participants' benefits are not necessarily at riskâalthough they may be under certain circumstances. Participants in DB plans that receive funding relief remain entitled to their benefits; funding relief does not reduce these benefits. For employers that do not become bankrupt, modifying the timing of contributions generally would not be problematicâover time, the employer would need to make all required contributions for participants to receive their full benefits. However, in the case of employer bankruptcy, the timing of contributions may negatively affect both participants' benefits and PBGC. Participants with benefits greater than the PBGC maximum guarantee or with non-guaranteed benefits might see reduced benefits when PBGC becomes trustee of their plan. Following funding relief, there are fewer plan assets available from which to pay non-guaranteed benefits because funding relief lowers employer contributions to DB plans in the short term. In addition, PBGC receives fewer assets from the plans that it trustees, which harms its financial position. ERISA requires PBGC to be self-supporting and receives no appropriations from general revenue. ERISA states that the \"United States is not liable for any obligation or liability incurred by the corporation.\" Increasingly large amounts of unfunded liabilities in terminated plans may burden PBGC's single-employer insurance program. Although PBGC ended FY2019 with a surplus of $8.6 billion, the effects of (1) the Coronavirus Disease 2019 (COVID-19) pandemic on the financial health of employers and (2) the market downturn in early 2020 on the value of DB plan assets will likely worsen the funding position of single-employer pension plans and PBGC's financial position. Funding relief can result in short-term revenue for Treasury and PBGC. Because employer contributions to pension plans are generally tax deductible, decreasing a plan's required contributions for a year (either through increasing the interest rate or extending the amortization period) increases the plan's taxable income. Some stakeholders point out that because funding relief provides revenue to Treasury, it has been used for budgetary offsets without regard to the policy justifications. Funding relief can positively affect PBGC finances because greater DB plan underfunding results in higher variable-rate premiums (premiums based on the amount of plan underfunding) paid by employers to PBGC. Table A-1 provides data on Cooperative and Small Employer Charity (CSEC) plans in the 2017 plan year (the most recent year for which complete data are available). In total, CSEC plans had about 239,000 participants, $19.6 billion in assets, and a total funding target of $20.7 billion in 2017. The largest plan by number of participants in 2017 was the Retirement Security Plan, which had assets of $8.6 billion and a total funding target of $9.2 billion in that year. To determine which plans use CSEC funding rules, the Congressional Research Service (CRS) analyzed public-use Form 5500 data from the Department of Labor (DOL) for the 2014 to 2017 plan years. 2014 is the first year that Form 5500 includes an option to indicate the use of CSEC funding rules (following P.L. 113-97 ), and 2017 is the most recent year for which complete data are available. Most private-sector pension plans are required to submit annual forms to the Internal Revenue Service (IRS), DOL, and the Pension Benefit Guaranty Corporation (PBGC). These forms generally include information about the plan, such as the number of participants, financial information, and the companies that provide services to the plan. In addition to Form 5500, pension plans are generally required to file information in specific schedules. For example, most single-employer and multiple-employer plans are required to file Schedule SB, which contains information specific to these plans. Each pension plan's Form 5500 and required schedules are available by search on DOL's website. Because data are self-reported, Table A-1 may not capture all plans that used CSEC funding rules or may include non-CSEC plans that erroneously identified as CSEC plans. Table A-1 provides data on private-sector defined benefit (DB) pension plans that indicated using CSEC funding rules on their 2014, 2015, 2016, or 2017 Schedule SB filings. Twenty-eight plans indicated using CSEC funding rules in multiple years. One plan, the Johns Hopkins Health System Corporation Plan, appeared to start using CSEC funding rules in 2017. Table A-1 provides the total number of participants, actuarial value of assets, total funding target, and funding target attainment percentage for the 29 plans (including the Johns Hopkins plan). In addition to the Johns Hopkins plan, 10 plans indicated using CSEC funding rules in a single year but not in other years. An examination of individual plan filings from the Employee Benefits Security Administration (EBSA) showed that these plans did not use CSEC funding rules in the year they indicated having done so and are not included in this analysis. The Employee Benefit Plan of Jewish Community of Louisville, Inc., indicated using CSEC funding rules in 2014, 2015, and 2016, but a Form 5500 for the 2017 plan year is not available and is not included in Table A-1 . In 2016, this plan had 110 participants. ", "summary": "To protect the interests of participants and beneficiaries in pension plans, Congress enacted the Employee Retirement Income Security Act of 1974 (ERISA; P.L. 93-406 ). ERISA specified funding rules for single-employer defined benefit (DB) pension plans, among other provisions. Single-employer DB pension plans are sponsored by one employer for the benefit of its employees. In DB pension plans, participants typically receive regular monthly benefit payments in retirement (which some refer to as a \"traditional\" pension). ERISA also authorized the creation of the Pension Benefit Guaranty Corporation (PBGC), which is a government corporation that insures private-sector pension benefits up to a specified maximum in the case of plan termination. Single-employer DB funding rules generally require several steps: calculating the value of benefits that a plan will pay in the future; determining how much a plan has set aside to pay those benefits; and determining how much, and the time period over which, an employer must contribute to the plan each year. Since ERISA, Congress has periodically modified funding rules for pension plans. The Pension Protection Act of 2006 (PPA; P.L. 109-280 ) outlined new pension funding standards for single-employer DB plans, among other requirements. PPA required that plans become 100% funded over time and outlined assumptions that pension plans must use to become fully funded. PPA also provided special rules for DB plans sponsored by certain employers, such as some airlines and defense contractors. Since PPA was enacted, legislation has further modified funding rules for single-employer DB plans for various reasons. At times, legislation has applied broadly to most private-sector DB plans; at other times, changes to funding rules have targeted plans sponsored by specific industries or types of employers. At times, legislation has provided funding relief , which are measures that lower employer contributions. In general, funding relief measures allow plans more time to make required payments by (1) modifying assumptions that affect the calculated value of pension benefits or (2) extending the time period to make up for plan losses. The adoption of a funding corridor for interest rates in the Moving Ahead for Progress in the 21 st Century Act (MAP-21; P.L. 112-141 ) marked a significant change to single-employer DB funding rules. DB plans calculate the present value of future benefits that will be owed using certain specified interest rates for discounting. In response to a period of low interest rates, MAP-21 established a process for determining minimum and maximum interest rates for discounting based on 25-year averages of historical corporate bond yields. As originally established, the funding corridor was scheduled to widen eventually, which, when applied to the specified interest rates, would have resulted in the use of lower interest rates to calculate DB pension obligations. Subsequent legislation delayed the date when the funding corridor is to begin widening. Under current law, the widening is scheduled to begin in 2021. Funding relief measures do not directly affect participants' benefits. However, they can result in pension plans having lower funding levels than they otherwise would at a point in time. Thus, funding relief can negatively affect PBGC's finances because it could take over a plan that has fewer assets than the plan otherwise would in the absence of funding relief. Funding relief can also affect PBGC's ability to pay non-guaranteed benefits, such as benefit increases implemented within five years prior to plan termination. On the other hand, funding relief can positively affect PBGC finances because greater DB plan underfunding results in higher variable-rate premiums (premiums based on the amount of plan underfunding) paid to PBGC by employers. This report provides (1) background on single-employer DB pension funding, (2) a discussion of funding rules under PPA, and (3) provisions since PPA that have provided funding relief or otherwise modified single-employer DB pension funding rules.", "document_type": "crs"}
{"report": "The Bureau of Reclamation (Reclamation), an agency within the Department of the Interior (DOI), is responsible for the management and development of many of the large federal dams and water diversion structures in the 17 conterminous U.S. states west of the Mississippi River. Reclamation and the U.S. Army Corps of Engineers (USACE) are the two principal federal agencies that own and operate water resources facilities. Reclamation is the country's largest wholesaler of water and the country's second-largest producer of hydropower (behind USACE). In addition to water supplies, Reclamation facilities provide flood control, recreation, and fish and wildlife benefits in many parts of the West. Congress has authorized more than 180 individual R eclamation projects . The goal of these projects was generally to \"reclaim\" arid western lands for irrigated agriculture and other types of development. Reclamation projects are unique in a number of ways. Among other things, these projects operate according to a beneficiary pays principle in which project beneficiaries must reimburse the government for their allocated share of project costs (some costs are considered federal in their nature, therefore no reimbursement is required). Most Reclamation projects also must obtain state water rights and operate in accordance with state law. Reclamation has evolved over time, and it remains an agency in transition. Its earliest projects were single-purpose irrigation projects; later projects were more complex and served multiple authorized purposes. The bureau has constructed few new projects since the 1970s, but it has been increasingly involved in other project types (e.g., water reuse and recycling, water conservation, Indian water rights settlements, and rural water, among others). The primary purpose of most of these projects is not reclaiming land for agricultural purposes. How to balance these priorities with the upkeep of existing Reclamation projects, and whether to facilitate new project development (and, if so, how), has been of interest to Congress. This report provides background on the Bureau of Reclamation, including its history and authorities. It also discusses selected issues before Congress, in particular those related to the bureau's most prominent areas of responsibility. The Bureau of Reclamation has been an important entity in shaping federal development efforts in the western states and territories. Along with the USACE (whose founding dates to the Revolutionary War), it was one of two principal federal agencies involved in the majority of federally-sponsored water resources development in the 20 th century. The below sections discuss Reclamation's history and evolution as a federal agency. The legislative history of the Bureau of Reclamation dates to the mid-19 th century enactments of the Homestead Act (1862) and the Desert Land Act (1877). In the Homestead Act, Congress allowed settlers in western states and territories to receive up to 160 acres of land free if they lived on the land for five years and made improvements to it. In an effort to further encourage settlement in the West, Congress amended the Homestead Act in the Desert Land Act to offer more acreage than was previously offered, at a reduced price, to individuals that agreed to reclaim a tract of desert land with irrigated agriculture. These efforts initially took the form of direct diversion from streams and other water bodies, but it soon became clear to planners that widespread settlement could be facilitated only through the development of large-scale irrigation infrastructure (e.g., water storage, conveyance, and pumping infrastructure). This realization led to a number of private and state-sponsored ventures throughout the West. The Carey Act of 1894 put official responsibility for overseeing irrigation development on the states and territories. However, many of these efforts failed due to lack of funds, inadequate engineering skill, or other factors. Thus, supporters of irrigated agriculture in the West turned to the federal government for financing and technical support. In the Reclamation Act of 1902 (the Reclamation Act), Congress for the first time approved federal efforts in the large-scale planning and construction of irrigation works for the storage, diversion, and development of waters in arid and semiarid western states. Under the act, federal Reclamation projects were funded by a newly established Reclamation Fund in the United States Treasury. Initially, the fund received receipts from the sale of federal land in the western United States, along with repayments by beneficiaries for Reclamation's construction costs for water projects. Authorized activities under the Reclamation Act were limited to 16 designated Reclamation s tates on lands west of the Mississippi River: Arizona, California, Colorado, Idaho, Kansas, Montana, Nebraska, Nevada, New Mexico, North Dakota, Oklahoma, Oregon, South Dakota, Utah, Washington, and Wyoming. A seventeenth Reclamation state, Texas, was added in 1906. Under the Reclamation Act, Congress allotted settlers up to 160 acres of lands to be irrigated by a Reclamation project, provided the lands were reclaimed for agricultural purposes and water users repaid the federal government for project const ruction expenses and associated operations and maintenance (O&M) costs. Congress established a 10-year repayment period for Reclamation projects in the Reclamation Act and directed the payments into the Reclamation Fund for new and ongoing project investments by the bureau. Pursuant to r eclamation law (i.e., the body of federal law that informs the development and management of projects by the Bureau of Reclamation), interest payments were not required for the repayment of construction costs by agricultural beneficiaries. Another formative aspect of reclamation law under the 1902 act was a directive by Congress to defer to state law. Under Section 8 of the Reclamation Act, Congress stipulated: Nothing in this Act shall be construed as affecting or intended to affect or to in any way interfere with the laws of any State or Territory relating to the control, appropriation, use, or distribution of water used in irrigation, or any vested right acquired thereunder. This requirement means that most Reclamation project water rights must be appropriated under state law and are subject to state adjudication and administration. As a practical matter, project-specific requirements may differ from state to state, and state water laws and regulations play a significant role in the operations and management of many Reclamation projects. The United States Reclamation Service (the precursor to the Bureau of Reclamation) was established within the U.S. Geological Survey (USGS) in July 1902. Initially, the Secretary of the Interior had the ability to expend funds on Reclamation projects as the Secretary saw fit based on the relevant investigations. From 1902 to 1907, Reclamation built about 30 projects in western states. In 1907, the Secretary separated the Reclamation Service from the USGS to create an independent bureau within the Department of the Interior. The Reclamation Service was formally renamed the Bureau of Reclamation in 1923. The earliest Reclamation projects were single purpose and focused primarily on irrigation development. Many projects encountered problems ; as a result, Congress eventually made a number of changes to Reclamation, including infusion of additional federal funds and revenue sources to the Reclamation Fund. Congress provided additional funds from the Treasury on multiple occasions, including $20 million in 1910 and $5 million in 1938. In the Reclamation Extension Act, enacted in 1914, Congress sought to prevent overspending on future projects by making expenditures from the Reclamation Fund subject to annual discretionary appropriations. Later, in 1924, a Fact Finders Report detailed a number of problems with early Reclamation projects; Congress enacted legislation later that year (popularly known as the \"Fact Finders Act\") that added additional requirements of both the bureau and potential contractors and made major changes to the Reclamation project development process. Congress also authorized new incidental purposes and other revenue sources for Reclamation projects ( Table 1 ). To shore up Reclamation Fund balances, Congress authorized revenues from the sales of Reclamation project water to land owners outside of project boundaries (authorized under the Warren Act of 1911), 40% of onshore royalties from mineral and natural resource leasing on public lands (authorized in 1920), and the full amount of Reclamation project hydropower revenues (authorized in 1938). Over time, Congress also altered repayment terms and other associated requirements for Reclamation projects. The Reclamation Extension Act of 1914 extended the repayment period for Reclamation projects from 10 years to 20 years. Legislation enacted by Congress in 1926 further extended the repayment period to 40 years. Pursuant to the Reclamation Project Act of 1939, Congress authorized Reclamation to provide for relief of costs in excess of an irrigator's ability to pay (also known as irrigation assistance or aid to irrigation ) and provided that this assistance could be covered by a project's excess hydropower and/or M&I water sales revenues. That same act authorized water service contracts âa second type of short- or long-term water contract in addition to repayment contractsâfor periods up to 40 years. Legislation enacted in 1946 and 1958 provided authorities for new projects to receive nonreimbursable federal credit for activities related to the preservation of fish and wildlife. In addition to these and other changes, in many cases Congress also has authorized unique project repayment terms or extensions applicable to specific Reclamation projects. Congress also passed legislation to support Reclamation project repairs and improvements. In 1949, Congress authorized rehabilitation and betterment improvements to be repaid in accordance with existing construction repayment schedules and authorized ability-to-pay adjustments for those improvements. Authorities enacted in 1955 and 1956 provided up to 50-year loans to irrigation districts for the construction of distribution systems on authorized Reclamation projects and projects similar to those of the reclamation program, respectively. Most individual Reclamation projects were authorized in specific acts of Congress. Reclamation constructed many of its largest projects beginning in the Great Depression, with Congress directing that project financing be provided through the General Fund of the Treasury in lieu of the Reclamation Fund. The 1928 Boulder Canyon Act authorized the construction of Hoover Dam and the All-American Canal, and the Rivers and Harbors Act of 1937 authorized construction of the Central Valley Project (CVP) in California. Congress authorized other large Reclamation projects during and after World War II, such as the Columbia Basin Project (1943), the Pick-Sloan Missouri Basin Program (1944), and the Colorado River Storage Project (1956). The last major new Reclamation project construction authorization was the Colorado River Basin Project Act of 1968; among other things, this act authorized the Animas-La Plata Project and the Central Arizona Project (CAP). Numerous events precipitated a gradual slowdown of Reclamation's construction program in the 1970s and 1980s. Prior to this time, most Reclamation projects had been constructed with little or no environmental mitigation measures. New federal environmental requirements pursuant to the National Environmental Policy Act of 1969 and the Endangered Species Act of 1973 provided increased protections for the environment, while also increasing certain costs and administrative conditions associated with development of new Reclamation projects. At the same time, many of the prime project sites (in terms of development and storage capacity) throughout the West had been developed or designated for protection by that time. Where Reclamation pursued projects during this period, the projects were often rejected or significantly scaled back on economic and/or environmental grounds. The 1976 failure of Reclamation's Teton Dam in Idaho (which failed upon initial filling of the reservoir behind the dam) resulted in 11 fatalities and raised doubts among some as to the viability of large new federal dams and water storage projects. It also led to congressional enactment of the Reclamation Safety of Dams Act of 1978 ( P.L. 95-578 ), which authorized Reclamation to make dam safety modifications at its dams. The Carter and Reagan Administrations both critically assessed USACE and Reclamation water resources projects. In 1977, the Carter Administration transmitted to Congress a \"Hit List\" of 19 water resource construction projects to be defunded, several of which were Reclamation projects. Congress eventually agreed to eliminate funding for only a few of these projects, but the Administration's initiation of such a proposal was at the time viewed as significant. The Reagan Administration continued the trend of scaled-back construction requests. In 1988, it published a report, entitled Reclamation Faces the Future , which formally acknowledged a shift in the bureau's mission: The arid West essentially has been reclaimed. The major rivers have been harnessed and facilities are in place or are being completed to meet the most pressing current water demands and those of the immediate future. The Administration noted that no major project authorization legislation had been enacted since 1968 and that, \"Reclamation's future role will entail a shift in emphasisâan acknowledgment that past goals have been met even as new challenges are emerging.\" Reclamation stated that the focus of its program going forward would be operations and maintenance of existing projects, as well as other goals such as environmental enhancement and dam safety. Congress framed its directions for Reclamation in the 1980s and 1990s in two pieces of legislation. First, in Title II of P.L. 97-293 , Congress enacted the Reclamation Reform Act of 1982 (RRA), which made major changes to reclamation law. It altered the ownership limitation of 160 acres under the 1902 Reclamation Act, as amended, expanding it to 960 acres. At the same time, it expanded the applicability of the acreage limitation to all operator-owned lands (i.e., the acreage limitation was applied to leased lands, which previously were not subject to the limitation) and introduced the concept of full-cost pricing for water delivered to any lands owned in excess of the new limits. The RRA had the general effect of making major changes to most Reclamation contracts. In some cases, the RRA changes increased costs to reclamation contractors by making it more difficult to irrigate more than 960 acres with federally subsidized project water. In the Reclamation Projects Authorization and Adjustment Act of 1992 ( P.L. 102-575 ), Congress set a new course for Reclamation that realigned some of the bureau's priorities and attempted to further mitigate some projects' effects on the environment. Title XXXIV of that act, the Central Valley Project Improvement Act (CVPIA), made major changes to the management of Reclamation's largest project, the CVP in California. These changes generally benefited fish and wildlife, but they also resulted in less water delivered and higher water and power rates for CVP contractors; the changes were thus contentious. Congress included other significant changes in P.L. 102-575 , such as direction to operate Glen Canyon Dam (one of Reclamation's largest dams on the Colorado River) to protect and mitigate for adverse impacts to Grand Canyon National Park. In addition, Congress authorized a presidential review and report on federal activities in western states that directly or indirectly affect the use of surface or subsurface water resources. Although construction of new traditional Reclamation projects generally has not occurred in recent years, Congress has approved other new Reclamation construction efforts since the 1970s. For instance, Congress approved Reclamation involvement in rural water projects and the construction of some new water infrastructure pursuant to congressionally approved water rights settlements with Indian tribes. Congress also authorized Reclamation to provide financial assistance to nonfederal entities for water conservation-related activities, including assistance for site-specific nonfederal water reuse and recycling project study and construction under P.L. 102-575 , as amended, and grant assistance for water and energy conservation projects under P.L. 111-11 . Several of these authorities were consolidated via Secretarial Order in 2010 into Reclamation's WaterSMART (Sustain and Manage America's Resources for Tomorrow) Program. Most recently, in the Water Infrastructure Improvements for the Nation Act (WIIN Act; P.L. 114-322 ), Congress provided Reclamation with its first significant new authorization for water storage project construction in more than three decades. That act authorized an alternative financing structure and process for building new or augmented federal and nonfederal water storage projects. Reclamation projects are spread out over six regions in the 17 western states ( Figure 1 ). The bureau is headed by the Commissioner of Reclamation, a Senate-confirmed presidential appointee that reports to the Assistant Secretary of the Interior for Water and Science. Reclamation's primary congressional authorizing committees are the House Natural Resources Committee and the Senate Energy and Natural Resources Committee. Congress typically funds Reclamation activities through discretionary appropriations to Reclamation in annual Energy and Water Development and Related Agencies appropriations bills. Reclamation estimated that the total replacement value of its water resource facilities was $99 billion as of 2015. These infrastructure assets include 491 dams (including 363 high and significant hazard dams), 338 reservoirs, and more than 8,000 miles of canals and other conveyance infrastructure, as well as 53 hydroelectric power plants. Reclamation's facilities have a collective storage capacity of 140 million acre-feet and serve one in every five farmers in the West. Several of Reclamation's dams and reservoirs are among the largest in the world. Grand Coulee Dam, on the Columbia River ( Figure 2 ), is the second largest concrete dam in the world (in terms of volume), and the largest hydropower producing dam in the United States; on the Colorado River, Hoover Dam and Glen Canyon Dam (the second and fourth tallest dams in the United States, respectively) impound Lake Mead and Lake Powell, the country's two largest reservoirs (in terms of storage capacity). In addition to the infrastructure it owns, Reclamation supports many nonfederally-owned and developed facilities, and it awards financial assistance for projects that provide benefits throughout the West. According to the Department of the Interior, in FY2017, Reclamation generated $63 billion in economic impacts, $45 billion of which was attributed to its role in irrigation production. In addition to the bureau's annual budget ($1.66 billion in enacted budget authority in FY2020), more than $800 million in activities is typically funded by water and power contractors for project operations, maintenance, and other related work. The remainder of this report discusses Reclamation's major project types and related issues for Congress. Reclamation's primary project types generally can be divided into the following areas: \"traditional\" single purpose or multipurpose water supply projects; federal or nonfederal water storage projects under Section 4007 of the WIIN Act; dam safety modification projects; rural water projects; Indian water rights settlements; and grants for nonfederal projects that encourage investment in alternative water supplies (e.g., water reuse and recycling [Title XVI Program], water and energy efficiency [WaterSMART grants], and desalination). Reclamation also possesses multiple other programmatic authorities that are beyond the scope of this report. Cost-share structures and authorities for some of these projects are summarized in Table 2 . Reclamation owns about 180 \"traditional\" Reclamation projects in the 17 western states. As discussed above, the congressional authorization of individual Reclamation projects generally has occurred pursuant to the Reclamation Act of 1902 and amendatory laws. Development of these Reclamation projects has been limited to geographically specific congressional authorizations for projects. Reclamation projects generally share several characteristics: Geographically Specific Congressional Authorization . Most Reclamation projects are first authorized for study by Congress. Subsequently, Reclamation completes its studies and recommends project designs for congressional construction authorization. Typically, these authorizations are approved by the authorizing committees (i.e., the House Natural Resources Committee and the Senate Energy and Natural Resources Committee), which reference study documents and recommendations that were transmitted to Congress. Beneficiaries Pay. The federal government initially funds 100% of construction costs, to be repaid by beneficiaries (e.g., irrigation contractors, municipal governments) for their estimated share of a project's costs, generally over a 40 to 50 year term (but, in some cases, other repayment periods). In most cases, the federal government is not repaid for its full investment in these projects. Beneficiaries also are responsible for paying their share of project-level O&M expenses. Projects A re Federally Owned , B ut Non-Fed eral Entities O ften P lay a R ole in O&M . Reclamation projects are initially owned and operated by the federal government (these projects are generally referred to as reserved works ). Once construction costs have been repaid in full, responsibility for O&M of the project may be transferred to project beneficiaries (these projects are commonly known as transferred works ), but projects remain federally owned (and subject to federal oversight and regulation) unless Congress explicitly authorizes transfer of ownership. The process of divesting (i.e., transferring ownership) of qualifying assets to nonfederal users is known as title transfer . Despite the overall drop-off in major construction project authorizations since the early 1970s, the approach of obtaining new or amended geographically specific congressional authorizations for Reclamation projects remained the norm as recently as 2010, when the Omnibus Lands Act of 2009 ( P.L. 111-11 ) was enacted. In part due to congressional earmark moratoriums dating to 2012, Congress has refrained from enacting site-specific authorization and appropriations for Reclamation projects since that time. However, Congress enacted a new process for approving and financing Reclamation water storage projects in Section 4007 of the WIIN Act. Title II, Subtitle J of the WIIN Act included new authority under Section 4007 that authorizes federal support for new or expanded water storage projects, including projects constructed by nonfederal entities. In contrast to the traditional approach of 100% of costs funded up-front by the federal government (with beneficiaries responsible for repaying their share of project benefits), the WIIN Act authorized maximum federal support of 50% of total costs for certain approved federal water storage projects, as well as a maximum of 25% federal support for approved nonfederal surface and groundwater storage projects. Additionally, the act required the nonfederal shares for both types of financing to be provided up-front in order for federal support to be made available. Federal construction funding for these projects is contingent on a number of determinations, including that in return for the federal cost share, at least a proportionate share of the project benefits are found to be federal benefits. Thus, unlike traditional Reclamation projects, there is no expectation of repayment of the initial federal investment in these projects. The authorization process for Section 4007 projects also differs from that traditionally used for other Reclamation projects. For a project to qualify for funding under the WIIN Act, Reclamation must find that project feasible, and the project must have a cost-sharing partner. In addition, Reclamation must recommend that project to Congress, and Congress must mention the project by name in enacted appropriations legislation. As a result, the process of funding Section 4007 is typically carried out in three steps: 1. Congress appropriates funding for Section 4007 projects to Reclamation. 2. Reclamation recommends specific projects to receive this funding. 3. Congress decides whether to refer to these projects by name in subsequent appropriations legislation, thereby providing formal approval for allocations and enabling project-level expenditures. Following initial appropriations for this authority in FY2017, Reclamation recommended seven projects to receive $33 million in FY2017 funding for WIIN Act Section 4007 projects in early 2018. Congress agreed to these recommendations in the FY2018 Energy and Water Development appropriations bill ( P.L. 115-141 ). In February 2019, Reclamation recommended another round of project-level allocations to receive $75 million in FY2017 and FY2018 appropriated funds. In enacted appropriations for FY2020, Congress agreed with all of the Administration's recommendations, with the exception of $57 million proposed for the Shasta Dam and Reservoir Enhancement Project. Thus, as of early 2020, Congress had appropriated $469 million for Section 4007 projects, but only $51 million of this funding had been released to specific projects. The remainder was awaiting further action by Reclamation and/or Congress. Reclamation's dam safety program, authorized by Reclamation Safety of Dams Act of 1978, as amended, provides for inspection and repairs to qualifying projects at Reclamation dams. Projects authorized under this authority have a different cost-share structure than that used for traditional Reclamation construction and rehabilitation projects (including initial construction of some dams). Reclamation first conducts dam safety inspections through the Safety Evaluation of Existing Dams program. Corrective actions, if necessary, are carried out through the Initiate Safety of Dams Corrective Action (ISCA) program. With ISCA appropriations, Reclamation funds modifications on priority structures based on an evolving identification of risks and needs. Based on amendments enacted in 1984 ( P.L. 98-404 ), Reclamation requires a 15% cost share from sponsors for dam safety modifications when modifications are based on new hydrologic or seismic data or changes in state-of-the-art design or construction criteria that are deemed necessary for safety purposes. In 2014, P.L. 114-113 amended the Reclamation Safety of Dams Act to increase Reclamation's authority, before needing congressional authorization to approve a modification project, from $1.25 million to $20 million. It also authorized the Secretary of the Interior to develop additional project benefits, through the construction of new or supplementary works on a project in conjunction with dam safety modifications, if such additional benefits are deemed necessary and in the interests of the United States and the project. Nonfederal and federal funding participants must agree to a cost share related to the additional project benefits. In addition to traditional Reclamation projects, Congress has authorized Reclamation to carry out other projects and programs. Some of these authorities are discussed below. Congress has authorized Reclamation to incorporate M&I water resource benefits into larger projects that serve various purposes (e.g., irrigation, power). Separate from these projects, Congress has expressly authorized Reclamation to undertake the design and construction of rural water supply projects intended to deliver potable water supplies to geographically specific rural areas and communities. From 1980 through 2009, Congress specifically authorized Reclamation to undertake the design and construction, and sometimes the O&M, of specific projects intended to deliver potable water supplies to rural communities located in Reclamation states. Primarily, these projects were in North Dakota, South Dakota, Montana, and New Mexico. The rural communities include tribal reservations and nontribal rural communities with nonexistent, substandard, or declining water supply or water quality. Many rural water projects are large in geographic scopeâtaking water from one location, where it is available in quantity and quality, and moving it across large distances to tie to existing rural systems. Although M&I portions of Reclamation water supply facilities typically require 100% repayment with interest, Congress has authorized providing some or all federal funding for rural water projects on a nonreimbursable basis (i.e., a de facto grant). For example, the federal government pays up to 100% of the cost of tribal rural water supply projects, including O&M. For nontribal rural water supply projects, the federal cost share has averaged 75% to 80%. The Rural Water Supply Act of 2006 ( P.L. 109-451 ) created a structured program for developing and recommending rural water supply projects. This program was to replace the previous process of authorizing projects individuallyâoften without the level of analysis and review (e.g., feasibility studies) consistent with Reclamation's other projects. Under the Rural Water Supply Program, Congress authorized Reclamation to work with rural communities and tribes to identify M&I water needs and options to address such needs through appraisal investigations and feasibility studies. Congress would then consider feasibility studies recommended by the Administration before authorizing specific project construction in legislation. Ultimately, Reclamation did not recommend and Congress did not authorize any project through this process, and the authority for the program expired in 2016. Reclamation continues to construct rural water projects (and provide O&M assistance for some tribal components) that were initiated outside of the Rural Water Supply Program. In 2012, Reclamation developed prioritization criteria for budgeting these projects: inclusion of tribal components; amount of financial resources committed; urgency and severity of need; financial need and potential economic impact; regional and watershed approach; and meeting water, energy, and other priority objectives. Reclamation stated that the criteria are intended to reflect both the priorities identified in the statutes that authorized individual projects and the goals of the Rural Water Supply Act of 2006. As of early 2020, Reclamation reported that $1.3 billion was needed to complete construction of authorized, ongoing rural water projects. Enacted funding for rural water supply projects in FY2019 provided $132.7 million for six authorized rural water projects, which was $98.7 million above the FY2019 budget request. For FY2020, the Administration requested $27.8 million and Congress appropriated an additional $117.4 million above the request for Reclamation to allocate to ongoing rural water projects in a work plan for the enacted bill. Indian water rights are vested property rights and resources for which the United States has a trust responsibility. The Supreme Court first recognized Indian water rights in Winters v. United States in 1908. Under the Winters doctrine, when Congress reserves land (i.e., for an Indian reservation), Congress implicitly reserves water sufficient to fulfill the purpose of the reservation. Since the Winters decision, disputes have arisen between Indians asserting their water rights and non-Indian water users, particularly in the western United States. In that region, the establishment of Indian reservations (and, therefore, of Indian water rights) generally predated settlement by non-Indians and the related large-scale development by the federal government of water resources for non-Indian users. In most western states, water allocation takes place under a system of prior appropriation in which water is allocated to users based on the order water rights were acquired. Under the Winters doctrine and the western system of prior appropriation, the water rights of tribes often are senior to those of non-Indian water rights holders because Indian water rights generally date to the creation of the reservation. However, despite the priority of Indian reserved water rights, non-Indian populations frequently have greater access to and allocations of water through infrastructure. This discrepancy leads to disputes that typically have been litigated or, since the late 1970s, resolved by negotiated settlements (commonly referred to as Indian w ater r ights s ettlements ). Negotiated settlements often involve tradeoffs for tribes, water users, and governmental entities. In several cases, Congress authorized Reclamation to construct infrastructure to help provide tribes with wet water (i.e., access to actual water, rather than just water rights) that was finalized by parties in the negotiation and settlement process. Since the first settlement was enacted in 1978 (the Ak-Chin Water Rights Settlement, enacted in P.L. 95-328 ), Congress has enacted 32 settlements into law. Overall, 36 settlements have been federally approved (including those which were administratively approved), with total estimated federal costs in excess of $5.8 billion. Individual settlements have varied widely in their costs to the federal government, from no federal funding required to hundreds of millions of dollars in federal support. In 2010, Congress also authorized a new fund for Reclamation, the Reclamation Water Settlements Fund, under Title X of P.L. 111-11 . The fund may provide up to $120 million per year for authorized Indian water rights settlements, without further appropriations (i.e., mandatory funding), from FY2020 to FY2029. Reclamation combines funding for multiple agency-wide programs promoting water conservation into a single programâthe WaterSMART (Sustain and Manage American Resources for Tomorrow) program. The program is part of the Department of the Interior's focus on water conservation, reuse, and planning, and it is notable for its departure from Reclamation's traditional model of project-based funding. Within Reclamation, WaterSMART includes funding for the following six sub-programs: WaterSMART Grants, which provide funding for water and energy efficiency projects, as well as water marketing strategy development; The Title XVI Water Reclamation and Reuse Program, which funds study and construction of authorized water recycling and reuse projects; The Drought Response Program, which provides assistance to water managers in developing and updating comprehensive drought plans, implementing drought resiliency projects, and undertaking emergency response actions; The Basin Studies Program, which evaluates water supply and demand in individual basins and identifies and implements strategies to address water supply and demand imbalances; The Cooperative Watershed Management Program, which funds projects by watershed groups that provide local solutions to address water management needs; and Water Conservation Field Services, which provides technical and financial assistance for the development of water conservation plans and design of water management improvements. Of these programs, the largest are WaterSMART Grants and the Title XVI Water Reclamation and Reuse Program, which received a total of $401 million and $579 million, respectively, in appropriations from FY2009 through FY2020. Congress authorized several of WaterSMART's sub-programs, including WaterSMART Grants, parts of the Drought Response Program, the Basin Studies Program, and the Cooperative Watershed Management Program, in Subtitle F of Title IX of the Omnibus Public Land Management Act of 2009 ( P.L. 111-11 ). Other WaterSMART sub-programs, such as Title XVI and the Water Conservation Field Services Program, were authorized prior to the 2010 establishment of WaterSMART. Most WaterSMART efforts require cost sharing of at least 50% to leverage nonfederal resources in addition to federal funding. Recent funding levels for the WaterSMART Program are shown below ( Figure 3 ). Section 4009 of the WIIN Act added new authorities for Reclamation to assist in the construction of desalination projects and made major changes to Reclamation's Title XVI Program. In Section 4009(a), Congress expanded Reclamation's role in desalination facilities (which had previously been limited to support for research and development) by authorizing the Secretary of the Interior to provide federal funding of up to 25% of the total cost of an eligible desalination project. The authority included public facilities for the desalination of seawater and/or brackish water. Prior to receiving this support, nonfederal parties must submit feasibility studies of individual projects to Reclamation for approval. For Title XVI projects, Congress authorized a similar process in Section 4009(c), whereby nonfederal studies of previously unauthorized Title XVI projects are submitted to Reclamation for review and potential approval for future federal funds (i.e., without project-specific authorization by Congress). Similar to the authorization and funding process for Section 4007 projects, Reclamation must recommend project-specific funding allocations for both categories of Section 4009 projects, and Congress provides final approval for these allocations by mentioning projects by name in enacted appropriations legislation. From FY2017 through FY2020, Congress appropriated a total of $42 million and $70 million for Section 4009(a) desalination and Section 4009(c) Title XVI projects, respectively. Congress regularly considers matters related to Reclamation. Persistent drought in parts of the West and the enactment of the WIIN Act's Sections 4007 and 4009 authorities, as well as other recent developments, such as the increasing surplus balances in the Reclamation Fund, have spurred broader congressional discussions of Reclamation's missions and its future role. In the 116 th Congress, two bills propose broad Reclamation policy changes: S. 1932 , the Drought Resiliency and Water Supply Infrastructure Act, and draft legislation (currently unnumbered) circulated for public comment by Representative Huffman. Numerous other bills target specific Reclamation programs, projects, or authorities for change. Some of the issues and legislation in this debate are discussed below. One overarching question for Reclamation is how (or if) the bureau should support the construction of new water supply infrastructure, in particular new surface water storage infrastructure. The last major Reclamation water storage project constructed was the Animas La Plata Project on the Colorado/New Mexico border; it was originally authorized under the Colorado River Basin Project Act of 1968 (P.L. 84-485) and constructed from 2002 to 2009. Outside of Indian water rights settlements and rural water projects, Congress generally has not authorized Reclamation to construct major new water storage projects in the last 30-40 years. The status of the Section 4007 water storage authorities enacted in the WIIN Act could be important in determining the bureau's future direction. When enacted, Section 4007 was the first new major water storage project construction authority in years. It was notable for its deference to nonfederal project sponsors to lead or contribute to activities traditionally led by the federal government. The process set up under Section 4007 was also notable for its departure from the traditional congressional approval process for Reclamation projects, in which Congress enacts project-specific authorizations. Although the financing structure for WIIN Act projects requires less of an overall federal investment than was necessary for many past Reclamation projects, the lower relative up-front federal subsidy also appears likely to shrink the pool of projects using these authorities compared with those that benefited from traditional Reclamation projects. Six of the nine water storage projects that were funded through early 2020 were located in California; two were located in Washington, and one was located in Idaho. That is, 3 of the 17 reclamation states appear likely to benefit from Section 4007 funding in the near term. Some members of Congress have proposed extending and/or amending the Section 4007 authority in the 116 th Congress. For instance, S. 1932 would extend that part of the WIIN Act for five years (through FY2025) and authorize $670 million for new ground and surface water storage projects under this section. Separately, a draft bill introduced by Representative Huffman would set up a new annual reporting process to inform congressional authorization deliberations for \"major\" federal projects, as well as nonfederal water storage projects. Under this legislation, certain nonfederal water storage projects (specifically, nonfederally sponsored projects costing less than $250 million) would not be subject to this reporting process and would not require explicit authorization by Congress. The legislation would increase the authorization of appropriations for Section 4007 storage projects to $750 million and extend this authority through FY2025. Supporters have advocated for continuing Section 4007 authority for several reasons. They argue that new construction will increase water availability in the West and help to address the water resource effects of climate change, and thus it warrants federal prioritization. They also note that significantly more funding is required to complete the projects that have initially received WIIN Act funds. Some oppose the extension of the Section 4007 authority and believe there should be little or no federal role in projects that otherwise would be the responsibility of nonfederal entities. Some opponents would prefer that Congress focus on promoting alternatives that are more environmentally friendly, such as water conservation and water reuse. If Congress chooses to extend the WIIN Act Section 4007 authority, it would signal to some that Reclamation will continue to have an active role in new water development projects. At the same time, it might suggest that this role is likely to be more of a supporting capacity than has traditionally been the case. If Congress opts not to extend the authority, it may choose to focus on other Reclamation mission areas to reduce Reclamation involvement and continue to transition Reclamation projects and responsibilities to nonfederal users. Congress also might decide to complete some projects that have been initially funded through the WIIN Act on an ad hoc basis or to use other financing authorities to support new projects (see below section, \" Financing Infrastructure \"). Title XVI has been a popular option for funding water reuse and recycling projects in the West since the first projects were authorized under that authority in 1992. In Section 4009 of the WIIN Act, Congress set up a process that allowed for the approval of the first large set of new Title XVI construction projects since 2010. In that same section, Congress also authorized federal support for nonfederal desalination projects at a similar level to that provided to Title XVI Projects (i.e., a 25% federal cost share), with projects to be approved through a similar reporting process. Reclamation published the first report under the Section 4009 authority in 2017, and Congress approved additional new projects via the WIIN Act reporting by Reclamation in 2018 and 2019. Similar to the authority for water storage projects under Section 4007, Section 4009 was notable for its deference to nonfederal interests; Section 4009 allows nonfederal entities to carry out studies and receive approval for federal support by Reclamation based on a limited set of criteria. Congress in turn may appropriate and approve the release of funding for individual projects after they have been recommended by Reclamation. In the 116 th Congress, several bills propose to extend Section 4009 of the WIIN Act. S. 1932 , for example, would authorize $160 million and $80 million in new funding for WIIN Act Title XVI and Desalination projects, respectively. Draft legislation introduced by Representative Huffman would authorize $500 million and $260 million for these projects, respectively. Both pieces of legislation would extend the Section 4009 authorities through 2024 and increase the per-project federal cap for newly funded Title XVI projects from $20 million to $30 million. Although some support Title XVI and/or desalination projects, others question whether they should be a priority of the bureau. Opponents sometimes point out that these projects largely benefit urban areas, in particular those in California. For their part, supporters note that by avoiding new consumptive uses of freshwater supplies, these projects have the potential to be more environmentally friendly than traditional water storage projects. They also add more relatively drought-resilient water supplies to many fast-growing areas of the West that also depend on water from traditional Reclamation projects. Although the cost-effectiveness of most water reuse and some desalination projects compares favorably with similarly located traditional water storage projects in terms of project yield per acre-foot, some projects may not be cost competitive. Aging infrastructure represents a significant challenge for Reclamation. Most of the bureau's facilities are 60-100 years old, and the total replacement value of these facilities as of 2015 was estimated to be $99 billion. As these facilities age, the beneficiary-pays model poses a notable challenge for upkeep of Reclamation facilities. Most Reclamation contractors do not own the facilities from which they benefit and therefore may have difficulty financing their share of project repairs. Reclamation faces challenges not only in obtaining the requisite funding from Congress for aging infrastructure projects but also in structuring repayment requirements in a way that will not be overly burdensome for its contractors. Congress has expressed interest both in how Reclamation estimates and accounts for its infrastructure needs and in how it plans to address aging infrastructure in the future. Reclamation generally groups aging infrastructure and related needs into the overarching project category of m ajor r epair and r ehabilitation (MR&R). This category includes both dam safety needs and federal- and contractor-funded needs for upgrades to water and power infrastructure. In early 2020, Reclamation estimated that its five-year extraordinary maintenance and rehabilitation needs were $3.8 billion. This estimate includes dam safety appropriations and reserved works (both of which are funded via discretionary appropriations) and needs expected to be funded by water and power users and not by federal appropriations. Reclamation is also working on a broader strategy to estimate and account for its aging infrastructure needs, as required under the Reclamation Transparency Act, enacted in Subtitle G, Title VIII of P.L. 116-9 . It impossible to predict what portion of Reclamation's short- and long-term MR&R needs will go unmet. However, recent experience indicates that Reclamation will continue to request funding for a significant share of its MR&R needs, that unforeseen expenses are likely to arise, and that some contractors will have difficulty repaying their shares of some of these large rehabilitation expenses without federal aid. Some may question the prospect of additional federal spending for these projects and contractors. At the same time, infrastructure failures could pose a significant threat to the public in the form of physical and/or economic damages. Recent Congresses have introduced proposals that would attempt to address Reclamation's aging infrastructure. In the 116 th Congress, both S. 2044 and H.R. 4659 would create a new account in the Treasury, to be known as the Aging Infrastructure Account, to receive appropriations for non-dam safety related extraordinary operations and maintenance work on reserved or transferred Reclamation projects, as well as repayment by users for these costs. Congress first authorized federal assistance for these costs under Sections 9603-9605 of P.L. 111-11 , but to date the bureau has not provided such assistance, in part due to lack of requests from users. Earlier in the 116 th Congress, Title VIII, Subtitle A of P.L. 116-9 authorized a new programmatic title transfer process, whereby Reclamation is able to transfer ownership for certain facilities that have been repaid, without additional approvals from Congress. By facilitating transfer of ownership to nonfederal users, some hope this authority will aid these same users in obtaining financing for infrastructure upgrades. Indian water rights settlements have made up some of the largest new Reclamation project authorizations in recent years. Congress authorized nine new settlements from 2010 to 2016, and five of these settlements each authorized federal costs in excess of $100 million. The Reclamation Water Settlement Fund, a fund containing mandatory appropriations authorized by Congress in 2010, is expected to make available $120 million per year from FY2020 to FY2029 (to fund some of these costs). The remainder of funds needed to complete new and ongoing settlements is assumed to come from discretionary appropriations. In the 116 th Congress, H.R. 1904 and S. 886 both would extend the aforementioned $120 million per year in mandatory funds for the Reclamation Water Rights Settlement Fund. H.R. 1904 would make these amounts available in perpetuity, whereas S. 886 would extend deposits to the fund through FY2039 (i.e., a 10-year extension) and would provide that the Secretary of the Interior may not expend more than $90 million per year on a single settlement. Congress may weigh whether mandatory funding is the preferred long-term approach for funding these settlements and, if so, which settlements should be prioritized for funding. Although some might view this funding as a responsibility of the federal government that will continue in perpetuity, others may prefer that congressional oversight for these settlements be maintained through the annual discretionary appropriations process. In addition to the status of the Reclamation Water Settlements Fund, Congress continues to consider major new and amended Indian water rights settlements that the Administration has negotiated. S. 3019 , the Montana Water Rights Protection Action, would authorize one of the largest Indian water rights settlements to date, the Confederated Salish and Kootenai Water Compact in Montana. Other legislation under consideration in the 116 th Congress would authorize new settlements with the Navajo Utah ( S. 644 , S. 1207 ) and the Hualapai Tribe of Arizona ( H.R. 2459 , S. 1277 ), as well as amendments to the 2010 Aamodt Settlement Litigation Act ( H.R. 3292 , S. 1875 ). Congress may debate the merits of each of these individual settlements, as well as the overall approach to authorizing new settlements. Some in Congress have expressed interest in proposals to finance various priority Reclamation activities. In addition to regular funding through the annual discretionary appropriations process, some have proposed using additional Reclamation Fund revenues and \"alternative finance\" loan programs that would promote public-private-partnerships at Reclamation projects. A number of Members have introduced proposals to use additional funding from the Reclamation Fund to fund priority Reclamation activities. The Reclamation Fund typically has had less than half of its incoming receipts appropriated as spending in recent years ( Figure 4 ), largely due to an increase in receipts from energy and natural resource royalties on western lands. Proposals for dedicated funding from the Reclamation Fund have taken the form of both mandatory and discretionary funding in several areas, including new water storage, aging infrastructure, and construction of new rural water and Indian water rights settlements. In the 116 th Congress, H.R. 2473 , the Securing Access for the Central Valley and Enhancing Water Resources Act (SAVE Act), proposes to annually redirect $300 million that otherwise would be credited to the Reclamation Fund, without further appropriation, from FY2030 to FY2060. This funding is to be made available for (1) authorized surface and groundwater storage projects, (2) authorized water reclamation and reuse projects, and (3) WaterSMART program water efficiency/conservation grants. Additionally, as noted, H.R. 1904 and S. 886 , both titled the Indian Water Rights Settlement Extension Act, would extend the $120 million per year in mandatory funding that was appropriated through FY2029 in P.L. 111-11 . Without this change, these funds accrue to the Reclamation Fund. Members have put forward other proposals for financing water supply projects that do not involve the Reclamation Fund in recent years. Dating to the 113 th Congress, a number of bills have been proposed that would authorize Reclamation to provide financing and encourage public-private partnerships (sometimes referred to as alternative financing ) for western water resource infrastructure. These proposalsâwhich typically are referred to as Reclamation Infrastructure Finance and Innovation Act (RIFIA) proposalsâgenerally have been modeled after the Environmental Protection Agency's Water Infrastructure Finance and Innovation Act (WIFIA) authority, enacted in Section 5025 of the Water Resources Reform and Development Act of 2014 ( P.L. 113-121 ). They typically propose a cap on competitively awarded federal project financing (e.g., up to 49% of project costs may be financed) that must be repaid over time by project sponsors. The arrangement is seen as particularly advantageous in a federal legislative context, because WIFIA loans provide a large amount of credit assistance relative to the amount of budget authority required in annual discretionary appropriations. The current WIFIA authority authorizes a wide range of eligible projects, potentially including many of the water supply projects that would be most likely to pursue RIFIA financing. However, a separate RIFIA program would focus more exclusively on western water supply projects and thus potentially would avoid competition for financing with municipal water supply projects that have more established creditworthiness. In the 116 th Congress, both S. 1932 and H.R. 2473 would authorize pilot RIFIA programs for Reclamation. The bills would authorize $150 million for RIFIA expenses from FY2021 to FY2025. Depending on the credit subsidy cost assumed and assuming full appropriation and interest by borrowers, these funds could be leveraged into more than $1 billion in federal funding for projects.", "summary": "The Bureau of Reclamation (Reclamation), an agency within the Department of the Interior (DOI), is responsible for the management and development of many of the large federal dams and water diversion structures in the 17 conterminous states west of the Mississippi River. Reclamation is the country's largest wholesaler of water and the country's second-largest producer of hydropower (behind the U.S. Army Corps of Engineers). Reclamation facilities store up to 140 million acre-feet of water, which serves more than 10 million acres of farmland and 31 million municipal and industrial customers. In addition to water supplies, Reclamation facilities provide flood control, recreation, and fish and wildlife benefits in many parts of the West. Congress created Reclamation in the Reclamation Act of 1902. The act authorized the Secretary of the Interior to construct irrigation works in western states to \"reclaim\" arid lands for agricultural purposes. Subsequent laws have built on and in some cases altered Reclamation's authorities, and Congress has authorized more than 180 individual R eclamation projects . Reclamation projects are unique in a number of ways. Among other things, these projects operate according to a beneficiary pays principle in which project beneficiaries must reimburse the government for their allocated share of project costs (some costs are considered federal in nature, with no reimbursement required). Reclamation projects also must obtain state water rights and operate according to state water law. As a result, state law and related considerations play a relatively large role in Reclamation project operations and management. The earliest Reclamation projects were single purpose and focused primarily on irrigation development. Later projects were larger and more complex, and they operated for multiple authorized purposes. Reclamation constructed its largest and most well-known projects (such as the California Central Valley Project, Hoover Dam, and Glen Canyon Dam on the Colorado River and Grand Coulee Dam and the Columbia River Basin Project in Washington) after the beginning of the Great Depression. Congress chose to fund most of these large projects through the General Fund of the Treasury rather than the Reclamation Fund, which Congress had established under the 1902 act to finance most Reclamation projects. A number of events precipitated the gradual slowdown of Reclamation's construction program beginning in the 1970s, and the bureau has constructed few new Reclamation projects (most of them smaller in scale) since that time. Reclamation has evolved considerably since its creation, and it remains an agency in transition. At Congress's direction, Reclamation has increasingly been involved in projects whose primary purpose is not reclaiming land for agricultural irrigation purposes. Some of Reclamation's new authorities include financial support for water reuse and recycling projects (i.e., the Title XVI Program), grants for water and energy conservation efforts (i.e., the WaterSMART Grants Program), and funding for rural water projects and water infrastructure associated with congressionally authorized Indian water rights settlements. How to balance new priorities with the upkeep of existing federal projects, and whether to facilitate new project development (and, if so, how), is a major consideration in discussions related to the bureau's future. These questions are particularly significant given Reclamation's nexus with state and local water resources development. Congress regularly considers legislation related to individual Reclamation projects, as well as broader questions related to Reclamation and its mission. Persistent and recurring drought in the West, along with the 2016 enactment of Reclamation's first significant new authority in decades for water storage project construction (Section 4007 of the Water Infrastructure Improvements for the Nation Act [WIIN Act; P.L. 114-322 ]), has increased attention on the bureau's future direction. Congress may consider a number of issues related to Reclamation, such as how (or if) the bureau should be involved in new water resource project construction, how to address aging federal water facilities, and the status of proposed and ongoing Indian water rights settlements, among other things.", "document_type": "crs"}
{"report": "The Small Business Administration's (SBA's) Women-Owned Small Business (WOSB) Federal Contracting Program is one of several contracting programs Congress has approved to provide greater opportunities for small businesses to win federal contracts. Congress's interest in promoting small business contracting dates back to World War II and the outbreak of fighting in Korea. At that time, Congress found that thousands of small business concerns were being threatened by war-induced shortages of materials coupled with an inability to obtain defense contracts or financial assistance. In 1953, concerned that many small businesses might fail without government assistance, Congress passed, and President Dwight Eisenhower signed into law, the Small Business Act (P.L. 83-163). The act authorized the SBA. The Small Business Act specifies that it is Congress's declared policy to promote the interests of small businesses to \"preserve free competitive enterprise.\" Congress indicated that one of the ways to preserve free competitive enterprise was to increase market competition by insuring that small businesses received a \"fair proportion\" of federal contracts and subcontracts. Since 1953, Congress has used its broad authority to impose requirements on the federal procurement process to help small businesses receive a fair proportion of federal contracts and subcontracts, primarily through the establishment of federal procurement goals and various contracting preferencesâincluding restricted competitions (set-asides), sole source awards, and price evaluation adjustment/preference in unrestricted competitionsâfor small businesses. Congress has also authorized the following: government-wide and agency-specific goals for the percentage of federal contract and subcontract dollars awarded to small businesses generally and to specific types of small businesses, including at least 5% to WOSBs; an annual Small Business Goaling Report to measure progress in meeting these goals; a general requirement for federal agencies to reserve (set aside) contracts that have an anticipated value greater than the micro-purchase threshold (currently $10,000) but not greater than the simplified acquisition threshold (currently $250,000); and, under specified conditions, contracts that have an anticipated value greater than the simplified acquisition threshold exclusively for small businesses. A set-aside is a commonly used term to refer to a contract competition in which only small businesses, or specific types of small businesses, may compete; federal agencies to make sole source awards to small businesses when the award could not otherwise be made (e.g., only a single source is available, under urgent and compelling circumstances); federal agencies to set aside contracts for, or grant other contracting preference to, specific types of small businesses (e.g., Minority Small Business and Capital Ownership Development Program (known as the 8(a) program) small businesses, Historically Underutilized Business Zone (HUBZone) small businesses, WOSBs, and service-disabled veteran-owned small businesses (SDVOSBs)); and the SBA and other federal procurement officers to review and restructure proposed procurements to maximize opportunities for small business participation. Additional requirements are in place to maximize small business participation as prime contractors, subcontractors, and suppliers. For example, prior to issuing a solicitation, federal contracting officers must do the following, among other requirements: divide proposed acquisitions of supplies and services (except construction) into reasonably small lots to permit offers on quantities less than the total requirement; plan acquisitions such that, if practicable, more than one small business concern may perform the work, if the work exceeds the amount for which a surety may be guaranteed by the SBA against loss under 15 U.S.C. Â§694b [generally $6.5 million, or $10 million if the contracting officer certifies that the higher amount is necessary]; encourage prime contractors to subcontract with small business concerns, primarily through the agency's role in negotiating an acceptable small business subcontracting plan with prime contractors on contracts anticipated to exceed $700,000 or $1.5 million for construction contracts; and under specified circumstances, provide a copy of the proposed acquisition package to an SBA procurement center representative (PCR) for his or her review, comment, and recommendation at least 30 days prior to the issuance of the solicitation. If the contracting officer rejects the PCR's recommendation, he or she must document the basis for the rejection and notify the PCR, who may appeal the rejection to the chief of the contracting office and, ultimately, to the agency head. This report focuses on the SBA's WOSB Federal Contracting Program, authorized by H.R. 5654 , the Small Business Reauthorization Act of 2000, and incorporated by reference in P.L. 106-554 , the Consolidated Appropriations Act, 2001. The WOSB program is designed to help federal agencies achieve their statutory goal of awarding at least 5% of their federal contracting dollars to WOSBs (established by P.L. 103-355 , the Federal Acquisition Streamlining Act of 1994 (FASA)) by allowing federal contracting officers to set aside acquisitions exceeding the micro-purchase threshold (currently $10,000) for bidding by WOSBs (including economically disadvantaged WOSBs (EDWOSBs)) exclusively in industries in which WOSBs are substantially underrepresented, and set aside contracts for bidding by EDWOSBs exclusively in industries in which WOSBs are underrepresented. Congressional interest in the WOSB program has increased in recent years because the federal government has met the 5% procurement goal for WOSBs only onceâin FY2015âsince the goal was authorized in 1994, and implemented in FY1996 (see Table 1 ). The data on WOSB federal contract awards suggest that federal procurement officers are using the WOSB program more often than in the past, but the amount of WOSB awarded contracts account for a relatively small portion of the total amount of contracts awarded to WOSBs. Most of the federal contracts awarded to WOSBs are awarded in full and open competition with other firms or with another small business preference, such as an 8(a) or HUBZone program preference. Relatively few federal contracts are awarded through the WOSB program (see Table 1 ). In addition, the Government Accountability Office (GAO) and the SBA's Office of Inspector General (OIG) have noted deficiencies in the SBA's implementation and oversight of the program. For example, the WOSB program was authorized on December 21, 2000. The SBA took nearly 10 years to issue a final rule for the program (on October 7, 2010) and another four months before the program actually went into effect (on February 4, 2011). The SBA attributed the delay primarily to its difficulty in identifying an appropriate methodology to determine \"the industries in which WOSBs are underrepresented with respect to federal procurement contracting.\" P.L. 113-291 , the Carl Levin and Howard P. \"Buck\" McKeon National Defense Authorization Act for Fiscal Year 2015 (NDAA 2015), enacted on December 19, 2014, removed the ability of small businesses to self-certify their eligibility for the WOSB program as a means to ensure that the program's contracts are awarded only to intended recipients. NDAA 2015 also required the SBA to implement its own WOSB certification process. The SBA issued an Advance Notice of Proposed Rulemaking in the Federal Register on December 18, 2015, to solicit public comments on drafting a proposed rule to meet these requirements. The SBA did not issue the proposed rule until May 14, 2019. Comments on the proposed rule were to be submitted by July 15, 2019. The final rule implementing the certification program and removing the self-certification option was issued on May 11, 2020. The effective date for the new WOSB certification process is October 15, 2020, nearly six years after these requirements were enacted on December 19, 2014. The following sections provide an overview of the history of small business contracting preferences, focusing on executive, legislative, and judicial actions that led to the creation of the WOSB program and influenced its structure. Since 1978, federal agency heads have been required to establish federal procurement goals, in consultation with the SBA, \"that realistically reflect the potential of small business concerns and small business concerns owned and controlled by socially and economically disadvantaged individuals\" to participate in federal procurement. These reports are submitted to Congress and are presently made available to the public on the General Services Administration's (GSA's) website. Initially, WOSB goals were not included. On May 18, 1979, President Jimmy Carter issued Executive Order 12138, which established a national policy to promote women-owned business enterprises. Among other provisions, the executive order required federal agencies \"to take appropriate affirmative action in support of women's business enterprise,\" including promoting procurement opportunities and providing financial assistance and business-related management and training assistance. Under authority provided by Executive Order 12138, the SBA added WOSB procurement goals to the list of small business contracting goals it negotiated with federal agencies. At that time, WOSBs received about 0.2% of all federal contracts. By 1988, this percentage had grown, but to only 1% of all federal contracts. WOSB advocates argued that additional action was needed to help WOSBs win federal contracts because women-owned businesses are subject to \"age-old prejudice, discrimination, and exploitation,\" the \"promotion of women's business enterprise is simply not a high priority\" for federal agencies, and federal \"agency efforts in support of women's business enterprise have been weak and have produced little, if any measurable results.\" Their efforts led to P.L. 100-533 , the Women's Business Ownership Act of 1988. P.L. 100-533 provided the SBA statutory authorization to establish WOSB annual procurement goals with federal agencies. The act also extended the goaling requirement to include subcontracts, as well as prime contracts, and added WOSBs to the list of small business concerns to be identified in required small business subcontracting plans (at that time, small business subcontracting plans were required for prime contracts exceeding $500,000, or $1 million for the construction of any public facility). In a related development, P.L. 100-656 , the Business Opportunity Development Reform Act of 1988, authorized the President to annually establish government-wide minimum procurement goals for small businesses and small businesses owned and controlled by socially and economically disadvantaged individuals (SDBs). Congress required the government-wide minimum goal for small businesses to be \"not less than 20% [increased to 23% in 1997] of the total value of all prime contract awards for each fiscal year\" and \"not less than 5% of the total value of all prime contract and subcontract awards for each fiscal year\" for SDBs. Advocates for a WOSB government-wide procurement goal argued that women owned approximately one third of the nation's businesses but received \"a mere 1.3% of federal contracting dollars ... in FY1990.\" Their efforts led to P.L. 103-355 , FASA. FASA created a 5% procurement goal for WOSBs each fiscal year. The 5% goal was implemented by regulations effective in FY1996. The conferees indicated in FASA's conference agreement that they did \"not intend to create a new set aside or program of restricted competition for a specific designated group, but rather to establish a target that will result in greater opportunities for women to compete for federal contracts.\" The conferees added that \"given the slow progress to date in reaching the current award levels, the conferees recognize that this goal may take some time to be reached.\" Subsequently, 3% procurement goals were created for HUBZone small businesses ( P.L. 105-135 , the HUBZone Act of 1997; Title VI of the Small Business Reauthorization Act of 1997) and SDVOSBs ( P.L. 106-50 , the Veterans Entrepreneurship and Small Business Development Act of 1999). Figure 1 shows the percentage of small business-eligible federal contracts awarded to small businesses, SDBs, WOSBs, SDVOSBs, and HUBZone small businesses from FY2005 through FY2018. As detailed in the figure's notes, the small business-eligible baseline excludes certain contracts that the SBA has determined do not realistically reflect the potential for small business participation in federal procurement. About 15% to 18% of all federal contracts are excluded in any given fiscal year. The federal government has had difficulty meeting the WOSB and HUBZone small business procurement goals. As mentioned in Figure 1 's notes, the 5% procurement goal for WOSBs was achieved in only 1 of the 14 fiscal years (FY2015) reported in the figure. The 3% procurement goal for HUBZone small businesses was not achieved in any of the 14 fiscal years. In contrast, the 23% procurement goal for all types of small businesses was achieved in 8 of the 14 fiscal years reported in the figure (FY2005, FY2008, and FY2013-FY2018), including the past 6 fiscal years. The 5% procurement goal for SDBs was achieved in each of the 14 fiscal years. The 3% procurement goal for SDVOSBs was achieved in 7 of the 14 fiscal years (FY2012-FY2018), including the last 7 fiscal years. As shown in Table 1 , FASA conferees' prediction that it may take some time to reach the 5% goal was confirmed. The amount and percentage of federal contracts awarded to WOSBs increased slowly following the establishment of the 5% goal (implemented in FY1996). Frustrated by the relatively slow progress toward meeting the 5% goal, WOSB advocates began to lobby for additional actions, including the establishment of a federal contracting set-aside program for WOSBs. As mentioned, a set-aside is a commonly used term to refer to a contract competition in which only small businesses, or specific types of small businesses, may compete. WOSB advocates noted that other small businesses were provided contracting preferences. For example, at that time, SDBs were eligible for contract set-asides and a price evaluation adjustment of up to 10% in full and open competition in specified federal agencies, including the Department of Defense (DOD); participants in the SBA's 8(a) program were (and still are) eligible for both contract set-asides and sole source awards; and HUBZone small businesses were (and still are) eligible for contract set-asides, sole source awards, and a price evaluation adjustment of up to 10% in full and open competition above the simplified acquisition threshold. As a first step toward the enactment of a WOSB set-aside contracting program, P.L. 106-165 , the Women's Business Centers Sustainability Act of 1999, required GAO to review the federal government's efforts to meet the 5% goal for WOSBs and to identify any measures that could improve the federal government's performance in increasing WOSB contracting opportunities. GAO issued its report on February 16, 2001: Among the government contracting officials with whom we spoke, there was general agreement on several suggestions for improving the environment for contracting with WOSBs and increasing federal contracting with WOSBs. They suggested creating a contract program targeting WOSBs, focusing and coordinating federal agencies' WOSB outreach activities, promoting contracting with WOSBs through agency incentive and recognition programs, including WOSBs in agency mentor-protÃ©gÃ© programs, providing more information to WOSBs about participation in teaming arrangements, and providing expanded contract financing. By the time the GAO report was published, legislation had been enacted ( H.R. 5654 , the Small Business Reauthorization Act of 2000, incorporated by reference in P.L. 106-554 , the Consolidated Appropriations Act, 2001) to authorize the WOSB program. As mentioned, the WOSB program provides greater access to federal contracting opportunities for WOSBs by providing federal contracting officers authority to set aside contracts for WOSBs (including EDWOSBs) exclusively in industries in which WOSBs are substantially underrepresented, and to set aside contracts for EDWOSBs exclusively in industries in which WOSBs are underrepresented. Congressional efforts to promote WOSB set-asides were complicated by Supreme Court decisions on legal challenges of contracting preferences for minority contractors, including City of Richmond v. J.A. Croson Co . (1989) (finding unconstitutional a municipal ordinance that required the city's prime contractors to award at least 30% of the value of each contract to minority subcontractors) and Adarand Constructors, Inc. v. Pena (1995) (finding that all racial classifications, whether imposed by federal, state, or local authorities, must pass strict scrutiny review). The Adarand Constructors, Inc. v. Pena case involved a challenge to federal subcontracting preferences for SDBs. The plaintiff claimed that contracting preferences based on race violate the equal protection component of the Fifth Amendment's Due Process Clause. The Supreme Court ruled that all racial classifications, whether imposed by federal, state, or local authorities, must pass strict scrutiny review (i.e., they must serve a compelling government interest and must be narrowly tailored to further that interest). Following the Adarand decision, the federal government reexamined how it implemented \"affirmative action\" programs, including certain procurement preference programs. When developing the WOSB set-aside program, its advocates were aware that the WOSB program would be subject to a heightened standard of judicial review given the Supreme Court's ruling that all racial classifications must serve a compelling government interest and be narrowly tailored. In the House report accompanying H.R. 4897 , the Equity in Contracting for Women Act of 2000 (which was incorporated into H.R. 5654 , the Small Business Reauthorization Act of 2000), advocates argued that a set aside program was needed (compelling interest) because of the slow progress in meeting the 5% procurement goal for WOSBs. The report noted that \"the drive for efficiency in procurement often places Congressionally-mandated contracting goals for small businesses in general, and women-owned small businesses in particular, in jeopardy.\" The report also noted that contract bundling (the consolidation of smaller contract requirements into larger contracts) and the increased use of the Federal Supply Schedules increase \"the efficiency of government procurements ... [but] also may perpetuate the use of well-known firms that are not women-owned businesses.\" As a result, the Committee believes that the goals expressed in FASA and reaffirmed in the Executive Order [Executive Order 13,157, issued on May 23, 2000 by President Clinton, reaffirming the Administration's support for increasing contracting opportunities for WOSBs] will not be achieved without the use of some mandatory tool which enables contracting officers to identify WOSBs and establish competition among those businesses for the provision of goods and services. The House report also argued that the bill was narrowly tailored because it did not establish sole source authority for WOSBs and limited WOSB set-asides to industries in which WOSBs are underrepresented in obtaining federal contracts. The Consolidated Appropriations Act, 2001 ( P.L. 106-554 ) specified that federal contracting officers could not set aside contracts for WOSBs or EDWOSBs unless (1) they had a reasonable expectation that two or more eligible business concerns would submit offers for the contract, (2) the anticipated award price of the contract (including options) does not exceed $5 million for manufacturing contracts and $3 million for all other contracts, and (3) the contract award can be made at a fair and reasonable price. In 2011, the set-aside award caps were increased to $6.5 million for manufacturing contracts and $4 million for all other contracts to account for inflation. In 2013, P.L. 112-239 , the National Defense Authorization Act for Fiscal Year 2013, removed the caps. The Consolidated Appropriations Act, 2001 ( P.L. 106-554 ) also specified recipient eligibility requirements (see below) and required the SBA to conduct a study to identify industries in which WOSBs are underrepresented (and, by inference, substantially underrepresented) with respect to federal procurement contracting. In addition, the SBA had to develop criteria to define an EDWOSB because the act did not define economic disadvantage. The WOSB program could not begin until those determinations were made. To participate in the program, the act specified that WOSBs must be a small business (as defined by the SBA); be at least 51% unconditionally and directly owned and controlled by one or more women who are U.S. citizens; have women manage day-to-day operations and make long-term decisions; and be certified by a federal agency, a state government, the SBA, or a national certifying entity approved by the SBA or self-certify their eligibility to the federal contracting officer with adequate documentation according to standards established by the SBA. As mentioned, P.L. 113-291 (NDAA 2015), among other provisions, removed the ability of small businesses to self-certify their eligibility for the WOSB program as a means to ensure that the program's contracts are awarded only to intended recipients. The act also required the SBA to implement its own certification process for WOSBs. The SBA announced in the Federal Register that it will implement its own certification process for the WOSB program and remove the ability of small businesses to self-certify their eligibility for the WOSB program on October 15, 2020. In the meantime, WOSBs and EDWOSBs must be either self-certified or third-party certified to participate in the WOSB program. Self-certification requires the business to provide certification information annually through the SBA's certification web page (certify.SBA.gov) and have an up-to-date profile on the System for Award Management (SAM) website (sam.gov) indicating that the business is small and is interested in participating in the WOSB program. Self-certification is free. In addition, in 2011, the SBA approved four organizations to provide third-party certification (typically involving a fee): El Paso Hispanic Chamber of Commerce, National Women Business Owners Corporation, U.S. Women's Chamber of Commerce, and Women's Business Enterprise National Council. Third-party certification will continue to be an option. Effective October 15, 2020, WOSBs and EDWOSBS that are not certified will not be eligible to participate in the WOSB program. Other women-owned small businesses may continue to self-certify their status as a WOSB, receive contract awards outside of the WOSB program, and count toward an agency's 5% procurement goal. EDWOSBs must meet all WOSB contracting program requirements and be economically disadvantaged, which, as presently defined by the SBA, means that they must be owned and controlled by one or more women, each with a personal net worth less than $750,000; owned and controlled by one or more women, each with $350,000 or less in adjusted gross income averaged over the previous three years; and owned and controlled by one or more women, eachÂ with $6 million or less in personal assets. The SBA defined economic disadvantage using its experience with the 8(a) program as a guide (i.e., reviewing the owner's income, personal net worth, and the fair market value of her total assets). As of May 11, 2020, there were 65,903 WOSBs and 24,370 EDWOSBs registered in the SBA's online database. As mentioned, the WOSB program's implementation was delayed for over 10 years, primarily due to the SBA's difficulty in identifying an appropriate methodology to determine \"the industries in which WOSBs are underrepresented (and, by inference, substantially underrepresented) with respect to federal procurement contracting.\" The SBA completed a draft of the legislatively mandated study of underrepresented (and, by inference, substantially underrepresented) NAICS industrial codes in September 2001, using internal resources. The SBA then submitted proposed regulations to implement the WOSB program to the Office of Management and Budget (OMB), which is required by law to review all draft regulations before publication within 90 days of their submission to OMB. However, the SBA withdrew the regulations on April 24, 2002, before the review was complete \"because the SBA Administrator had concerns about the content and constitutionality of its draft industry study and believed that it needed to contract with the National Academy of Science (NAS) to review the draft industry study and recommend any changes the NAS believed were necessary.\" The SBA awarded a contract to NAS in late 2003 to conduct the study. NAS completed its analysis and issued a report on the SBA's study on March 11, 2005. The report indicated that the SBA asked NAS to conduct the review \"because of the history of legal challenges to race- and gender-conscious contracting programs at the federal and local levels.\" NAS concluded that the SBA's study was \"problematic in several respects, including that the documentation of data sources and estimation methods is inadequate for evaluation purposes.\" NAS made several recommendations for a new study, including that the SBA use more current data, different industry classifications, and consistent monetary and numeric utilization measures to provide more complete documentation of data and methods. The SBA later characterized NAS's analysis as indicating that the SBA study was \"fatally flawed.\" In response to that finding, the SBA issued a solicitation in October 2005, seeking a private contractor to perform a revised study. In February 2006, a contract was awarded to the Kaufman-RAND Institute for Entrepreneurship Public Policy (RAND). The RAND study was published in April 2007. The RAND report noted that underrepresentation is typically referred to as a disparity ratio, a measure comparing the use of firms of a particular type (in this case, WOSBs) in a particular NAICS code to their availability for such contracts in that NAICS code. A disparity of 1.0 suggests that firms of a particular type are awarded contracts in the same proportion as their representation in that industry (there is no disparity). A disparity ratio less than 1.0 suggests that the firms are underrepresented in federal contracting in that NAICS code. A ratio greater than 1.0 suggests that the firms are overrepresented. RAND identified 28 different approaches to determine underrepresentation and substantial underrepresentation of WOSBs in federal procurement, each of which yielded a different result. After examining each approach's benefits and deficiencies, the SBA defined underrepresentation as industries having a disparity ratio between 0.5 and 0.8, where the ratio represents the WOSB share of federal prime contract dollars divided by the WOSB share of total business receipts within a given NAICS code. Substantial underrepresentation was defined as industries with a disparity ratio between 0.0 and 0.5. Using that methodology, the SBA identified 83 four-digit NAICS industry groups in its final rule implementing the WOSB program (October 7, 2010, effective February 4, 2011): 45 four-digit NAICS industry groups in which WOSBs are underrepresented (225 out of the 1,057 six-digit NAICS industry codes at that time were made eligible for EDWOSB set-asides only), and 38 four-digit NAICS industry groups in which WOSBs are substantially underrepresented (171 out of the 1,057 six-digit NAICS industry codes at that time were made eligible for WOSB (including EDWOSB) set-asides). In 2014, Congress passed legislation ( P.L. 113-291 ) requiring the SBA to update the list of underrepresented and substantially underrepresented NAICS codes by January 2, 2016, and then conduct a new study and update the NAICS codes every five years thereafter. The SBA asked the Department of Commerce's Office of the Chief Economist (OCE) for assistance in conducting a new study. The OCE examined the odds of women-owned businesses winning a federal prime contract relative to otherwise similar firms in FY2013 and FY2014 in each of the four-digit NAICS code industry groups, controlling for the firm's size and age, legal form of organization, level of government security clearance, past federal prime contracting performance ratings, and membership in various categories of firms having federal government-wide procurement goals. OCE found that women-owned businesses were less likely to win federal contracts in 254 of the 304 industry groups in the study, and women-owned businesses in 109 of the 304 industry groups had statistically significant lower odds of winning federal contracts than otherwise similar businesses not owned by women at the 95% confidence level. Based on the OCE study, the SBA increased the number of underrepresented and substantially underrepresented four-digit NAICS codes from 83 to 113, effective March 3, 2016 (21 in which WOSBs are underrepresented (EDWOSB set-asides only) and 92 in which WOSBs are substantially underrepresented (WOSB and EDWOSB set-asides). OMB updates the NAICS every five years. In response to OMB's release of NAICS 2017, which replaced NAICS 2012, the SBA reduced the number of underrepresented and substantially underrepresented four-digit NAICS codes from 113 to 112, effective October 1, 2017. The reduction took place because NAICS 2017 merged two four-digit NAICS industry groups that affected the WOSB program. The merger also resulted in the number of four-digit NAICS industry groups in which WOSBs are substantially underrepresented (WOSB and EDWOSB set-asides) to fall from 92 to 91. Overall, WOSB set-asides may be provided to WOSBs (including EDWOSBs) in 364 (out of 1,023) six-digit NAICS industry codes and to EDWOSBs exclusively in 80 (out of 1,023) six-digit NAICS industry codes. P.L. 113-291 (NDAA 2015), enacted in 2014, provides federal agencies authority to award sole source contracts to WOSBs (including EDWOSBs) eligible under the WOSB program if the contract is assigned a NAICS code in which the SBA has determined that WOSBs are substantially underrepresented in federal procurement; the contracting officer does not have a reasonable expectation that offers would be received from two or more WOSBs (including EDWOSBs); and the anticipated total value of the contract, including any options, is below $4 million ($6.5 million for manufacturing contracts). NDAA 2015 also provides federal agencies authority to award sole source contracts exclusively to EDWOSBs eligible under the WOSB program if the contract is assigned a NAICS code in which SBA has determined that WOSB concerns are underrepresented in federal procurement; the contracting officer does not have a reasonable expectation that offers would be received from two or more EDWOSB concerns; and the anticipated total value of the contract, including any options, is below $4 million ($6.5 million for manufacturing contracts). Expanding the WOSB program to include sole source contracts was designed, along with WOSB set-asides, to help federal agencies achieve their statutory goal of awarding at least 5% of their federal contracting dollars to WOSBs. The SBA published a final rule expanding the WOSB program to include sole source awards on September 14, 2015 (effective October 14, 2015). Both GAO and the SBA's OIG have issued reports and audits of the WOSB program that have been critical of the SBA's implementation and oversight of the program. For example, GAO has criticized the SBA for delays in implementing the WOSB program and, in 2019, reported that the SBA had not fully addressed WOSB program oversight deficiencies, first identified by GAO in 2014, related to third-party certifiers, the procedures used to conduct annual eligibility examinations of WOSBs, and \"reviews of individual businesses found to be ineligible to better understand the cause of the high rate of ineligibility in annual reviews and determine what actions are needed to address the causes.\" GAO argued that the deficiencies in SBA's oversight of the WOSB program limit SBA's ability to identify potential fraud risks and develop any additional control activities to address these risks. As a result, the program continues to be exposed to the risks of ineligible businesses receiving set-aside contracts. In addition, GAO noted that, from April 2011 through June 2018, about 3.5% of WOSB set-aside contracts were awarded for ineligible goods or services [NAICS codes]. In 2015, the SBA's OIG analyzed 34 WOSB program awards made between October 1, 2013, and June 30, 2014, (17 WOSB set-aside awards totaling $6.6 million and 17 EDWOSB set-aside awards totaling $7.9 million) and found \"15 of the 34 set-aside awards were made without meeting the WOSB program's requirements,\" and these awards totaled approximately $7.1 million. Specifically, 10 of the 34 WOSB program set-aside awards were made \"for work that was not eligible to be set aside for the program\" and 9 of the 34 awards went to firms that did not have any documentation in the WOSB program's repository, including 7 of the 17 WOSB set-aside awards, or 41%, and 2 of the 17 EDWOSB set-aside awards, or 12%.\" The SBA OIG found that \"this occurred because agencies' contracting officers did not comply with the regulations prior to awarding these awards and SBA did not provide enough outreach or training to adequately inform them of their responsibilities and the program's requirements.\" In a related development, in 2018, the SBA's OIG analyzed 56 WOSB sole source contracts awarded between January 1, 2016, and April 30, 2017, and found that 50 of the 56 contracts, totaling approximately $52.2 million, were made \"without having the necessary documentation to determine eligibility\" of the award recipients. Examples of missing documentation included WOSB and EDWOSB self-certifications, articles of incorporation, birth certificates, and financial information. The SBA's WOSB program is likely to be of continued interest to Congress during the remainder of the 116 th Congress. Issues of particular interest to Congress may include congressional oversight of the SBA's implementation of the WOSB program's certification procedures; congressional oversight of the SBA's training of federal procurement officers to ensure that WOSB awards are made only to eligible firms in eligible industries; the performance of federal agencies in achieving the 5% procurement goal for WOSBs; and the WOSB program's efficacy in helping to meet the 5% goal. As shown in Table 1 , federal procurement officers' use of the WOSB program has increased from about $21 million in FY2011 to $893 million in FY2018, with most of that increase resulting from rising use of WOSB set-asides (from $15 million in FY2011 to $742 million in FY2018). Although WOSB program usage is increasing, WOSB set-asides and sole source awards continue to account for a relatively small portion of the federal contracts awarded to WOSBs. Although the WOSB program has been operational since 2011, many federal agencies have little experience with the program. For example, in FY2018, about 63% of the federal contracts awarded to WOSBs were awarded in full and open competition with other firms, about 33% were awarded with another small business preference (such as the 8(a) and HUBZone programs), and about 4% were awarded with a WOSB preference. Also, GAO found that from the third quarter of FY2011 through the third quarter of FY2018, six federal agencies accounted for nearly 83% of the contract amount awarded under the WOSB program: DOD (48.6%), Department of Homeland Security (DHS) (12.4%), Department of Commerce (8.0%), Department of Agriculture (6.3%), Department of Health and Human Services (4.0%), and GSA (4.0%). All other federal agencies accounted for 16.8%. GAO conducted an audit of the WOSB program from October 2017 to March 2019. As part of the audit, GAO interviewed 14 stakeholder groups (staff from DHS, DOD, and GSA, eight contracting officers within these agencies, and three WOSB third-party certifiers) to obtain their views on WOSB program usage. The stakeholder groups identified several positive aspects about the WOSB program, including that it provided WOSBs greater opportunities to win federal contracts, and that the SBA had several initiatives underway to help improve collaboration between federal agencies and the small business community. The stakeholders also identified several impediments that limited the WOSB program's use by federal contracting officers, including the following: Sole S ource A uthority R ules . Executing sole source authority under the WOSB program is difficult for contracting officers because rules for sole source authority under the WOSB program are different from those under SBA programs.... For example, the FAR's [Federal Acquisition Regulation] requirement that contracting officers must justify, in writing, why they do not expect other WOSBs or EDWOSBs to submit offers on a contract is stricter under the WOSB program that it is for the 8(a) program. Industry Restrict i ons . 13 of the 14 stakeholder groups ... commented on the requirement that WOSB program set-asides be awarded within certain industries, represented by NAICS codes. For example, two third-party certifiers ... recommended that the NAICS codes be expanded or eliminated to provide greater opportunities for WOSBs to win contracts under the program. Eligibility Documentation Requirements . 7 of the 14 stakeholder groups discussed the requirement for the contracting officer to review program eligibility documentation and how this requirement affects their decision to use the program. For example, staff from one contracting office said that using the 8(a) or HUBZone programs is easier because 8(a) and HUBZone applicants are already certified by the SBA; therefore, the additional step to verify documentation for eligibility is not needed.... GSA officials noted that eliminating the need for contracting officers to take additional steps to review eligibility documentation for WOSB-program set-asides could create more opportunities for WOSBs by reducing burdens on contracting officers. Need for A dditional G uidance . 13 of the 14 stakeholder groups discussed guidance available to federal contracting officers under the WOSB program. For example, two third-party certifiers identified the need for additional training and guidance for federal contracting officers, and staff from two federal contracting offices said that the last time that they had received training on the WOSB program was in 2011, when the program was first implemented. In a related development, the House passed legislation ( H.R. 190 , the Expanding Contracting Opportunities for Small Businesses Act of 2019) which would, among other provisions, eliminate the inclusion of option periods in the award price for sole source contracts awarded to qualified HUBZone small businesses, SDBs, SDVOSBs, and WOSBs (including EDWOSBs). This provision would increase the number of contracts available for sole source awards to these recipients because the option years would not count toward the statutory caps on sole source awards (the WOSB caps are currently $6.5 million for manufacturing contracts and $4 million for other contracts). The bill would also increase the WOSB sole source cap to $7 million for manufacturing contracts to align them with the $7 million cap for the HUBZone and 8(a) program small businesses. Also, some WOSB advocates have suggested that the WOSB program should be amended to (1) eliminate the distinction and disparate treatment of WOSBs and EDWOSBs when awarding contracts, and/or (2) allow set-asides and sole source awards to WOSBs (including EDWOSBs) in all NAICS industry codes regardless of WOSB representation, as is the case for other small business preference programs. Both legislative options could lead to an increase in the amount of contracts awarded to WOSBs. In the first instance, WOSBs would be eligible for set-asides and sole source awards in both underrepresented and substantially underrepresented NAICS codes, instead of just substantially underrepresented NAICS codes. In the latter instance, WOSBs and EDWOSBs would be eligible for set-asides and sole source awards in all NAICS industry codes, not just underrepresented or substantially underrepresented NAICS industry codes. As mentioned in the \"A Targeted Approach to Avoid Legal Challenges\" section, one of the reasons the WOSB program provides disparate treatment to WOSBs and EDWOSBs, and makes distinctions among underrepresented, substantially underrepresented, and other NAICS industry codes was to address the heightened level of legal scrutiny related to contracting preferences following the Supreme Court's decision in Adarand Constructors, Inc. v. Pena . The Supreme Court ruled that all racial classifications, whether imposed by federal, state, or local authorities, must pass strict scrutiny review (i.e., they must serve a compelling government interest and must be narrowly tailored to further that interest). Although the WOSB program is not based on racial classifications, it was expected to receive a heightened level of judicial scrutiny. As such, it lead the WOSB program's advocates to create these distinctions in an effort to shield it from legal challenges. As mentioned in the \" Introduction ,\" the WOSB program is one of several contracting programs that Congress has approved to provide greater opportunities for small businesses to win federal contracts. Its legislative history is a bit more complicated than others, primarily due to the distinctions between WOSBs and EDWOSBs and among underrepresented, substantially underrepresented, and other NAICS codes. These distinctions, and the SBA's difficulty in defining them, led to the 10-year delay in the program's implementation and may also help to explain why the SBA's implementation of the SBA's certification program was delayed nearly six years. The SBA's implementation of the WOSB program is likely to remain a priority for congressional oversight during the 116 th Congress, as is federal agency use of the program. As mentioned, the federal government has met the 5% procurement goal for WOSBs only once (in FY2015) since the goal was authorized in 1994, and implemented in FY1996. Also, the data on WOSB federal contract awards suggest that federal procurement officers are using the WOSB program more often than in the past, but the program accounts for a relatively small portion of WOSB contracts. Most of the federal contracts awarded to WOSBs are awarded in full and open competition with other firms or with another small business preference program (such as the 8(a) and HUBZone programs). Relatively few federal contracts are awarded through the WOSB program. Determining why this is the case, and if anything can, or should be done to address this, is likely to be of continuing congressional interest. ", "summary": "The Small Business Administration's (SBA's) Women-Owned Small Business (WOSB) Federal Contracting Program is designed to provide greater access to federal contracting opportunities for WOSBs and economically disadvantaged women-owned small businesses (EDWOSBs). By doing so, the program aims to help federal agencies achieve their statutory goal of awarding 5% of their federal contracting dollars to WOSBs. Under this program, federal contracting officers may set aside federal contracts (or orders) for WOSBs (including EDWOSBs) in industries in which the SBA determines WOSBs are substantially underrepresented in federal procurement and for EDWOSBs exclusively in industries in which the SBA determines WOSBs are underrepresented in federal procurement. The SBA has identified 364 six-digit North American Industry Classification System (NAICS) industry codes (out of 1,023) in which federal agencies may set aside federal contracts exclusively for WOSBs (including EDWOSBs) and 80 six-digit NAICS industry codes (out of 1,023) that may be set aside exclusively for EDWOSBs. Federal agencies may also award sole source contracts to WOSBs and EDWOSBs in eligible industries under the following conditions: the contracting officer does not have a reasonable expectation that offers would be received by two or more eligible WOSBs and EDWOSBs; the award can be made at a fair and reasonable price; and the anticipated total value of the contract, including any options, is below $4 million ($6.5 million for manufacturing contracts). To participate in the program, WOSBs must be a small business (as defined by the SBA); be at least 51% unconditionally and directly owned and controlled by one or more women who are U.S. citizens; have women manage day-to-day operations and make long-term decisions; and be certified by a federal agency, a state government, the SBA, or a national certifying entity approved by the SBA. EDWOSBs must meet all the requirements of the WOSB contracting program; be owned and controlled by one or more women, each with a personal net worth less than $750,000; be owned and controlled by one or more women, each with $350,000 or less in adjusted gross income averaged over the previous three years; and be owned and controlled by one or more women, eachÂ having $6 million or less in personal assets (including business value and primary residence). The WOSB program's legislative history is a bit more complicated than other small business contracting programs, primarily due to the distinctions between WOSBs and EDWOSBs and among underrepresented, substantially underrepresented, and other NAICS codes. These distinctions were designed to shield the WOSB program from legal challenges related to the heightened level of legal scrutiny applied to contracting preferences after the Supreme Court's decision in Adarand Constructors, Inc. v. Pena (1995), which involved contracting preferences for small disadvantaged businesses. The Court found in that case that all racial classifications, whether imposed by federal, state, or local authorities, must pass strict scrutiny review. An unintended consequence of these distinctions has been the SBA's difficulty in defining these terms, which contributed to a 10-year delay in the program's implementation and may help to explain why it has taken the SBA nearly six years to implement its own WOSB certification process as required by P.L. 113-291 , the Carl Levin and Howard P. \"Buck\" McKeon National Defense Authorization Act for Fiscal Year 2015. That act also prohibited small businesses from self-certifying their eligibility for the WOSB program to ensure the program's contracts are awarded only to intended recipients. The SBA issued an Advance Notice of Proposed Rulemaking in the Federal Register on December 18, 2015, to solicit public comments on drafting a proposed rule to meet these requirements. The proposed rule was issued on May 14, 2019, and the final rule implementing the certification program and removing the self-certification option was issued on May 11, 2020. The final rule's effective date for the new WOSB certification process is October 15, 2020, nearly six years after these requirements were enacted on December 19, 2014.", "document_type": "crs"}
{"report": "T he United States has created vast federal loan programs offering to millions of students alternatives to private educational loans . According to the U.S. Department of Education's (ED's) Office of Federal Student Aid (FSA), nearly 43 million borrowers owed money on federal student loans as of the second quarter of 2019, and the total amount of outstanding federal student loan debt currently exceeds $1.4 trillionâa figure that has nearly tripled since 2007. In recent years, a significant number of these borrowers have experienced difficulty repaying their student loans. Moreover, borrowers who lack financial experience may need guidance to navigate the student loan repayment process, which some borrowers find daunting or confusing. Student loan servicers âwith whom the United States has contracted to assist with the administration of its sizable student loan portfolio âare a key source of guidance and assistance for borrowers struggling to understand and repay their federal student loans. Under its contract with the federal government, a servicer may be responsible for (among other things) communicating with borrowers regarding repayment; disclosing information about student loan terms to borrowers; applying payments to outstanding loan balances; processing applications for enrollment in repayment plans; processing applications for loan forgiveness or discharge; and processing requests for loan forbearance or deferment. Some maintain that at least some of these federal student loan servicers have engaged in various forms of undesirable conduct, such as steering borrowers away from beneficial repayment options or providing inaccurate or incomplete information. Representatives from the servicing industry deny these accusations. These allegations of servicer misconduct have drawn the attention of both federal and state policymakers. At least two congressional subcommittees have conducted hearings on student loan servicing within the past few months , and the House Committee on Financial Services conducted another hearing on the topic on September 10, 2019. Additionally, several state legislatures have enacted new laws to regulate student loan servicers within the past few years. A number of state attorneys general and individual borrowers have also tried to pursue civil litigation against servicers of federal student loans based on alleged violations of state statutory and common law. The states' involvement has raised questions involving the appropriate interaction between federal and state law, as well as the respective roles of the federal and state governments with respect to regulating student loan servicers. Significantly, ED has taken the position that the existing regime of federal regulation of student loan servicers leaves no room for state regulation on the topic. While some courts have agreed with this position, others have concluded that current federal law permits the state to regulate servicers with whom the federal government contracts. This report analyzes the regulation of servicers of federal student loans. After providing necessary background information regarding the federal student loan programs, the report describes federal law governing student loan servicers. The report then discusses how some states and borrowers have tried to enact or enforce state laws to regulate servicers of federal student loans. Then, the report analyzes the legal issues implicated by the interaction of federal and state servicing laws, including whether (and, if so, to what extent) federal servicing regulation preempts the states from creating or enforcing servicing laws of their own. The report concludes by identifying relevant legal considerations for Congress. The federal government's roles with respect to the operation, supervision, and administration of federal student loan programs have evolved over time. Around the turn of the millennium, for instance, most (though not all) federal student loans were issued under the now-discontinued Federal Family Education Loan Program (FFELP), under which private lenders extended loans to borrowers that the federal government guaranteed against the risk of loss. Although the federal government set the terms and conditions of FFELP loans and subsidized the FFELP program, various entities other than the federal government also helped operate the FFELP. For example, private lenders (or third parties with which those lenders contracted) bore the responsibility of servicing FFELP loans. Several recent developments, however, have shifted the federal government's role in the student loan system. In 2008, for instance, Congress enacted the Ensuring Continued Access to Student Loan Act (ECASLA), which authorized ED to purchase outstanding FFELP loans from private lenders. Thus, for the nearly 4 million loans that ED purchased from private lenders under ECASLA, \"the federal government is now the 'lender.'\" Then, in 2010, Congress enacted the Student Aid and Fiscal Responsibility Act (SAFRA), which, among other things, terminated the authority to make new FFELP loans. As a result of SAFRA, the United States now issues most new federal student loans through the Federal Direct Loan Program (FDLP), under which the government itselfârather than a private lenderâextends loans directly to students. These developments have thereby expanded the federal government's direct involvement in the student loan industry, which in turn has prompted the United States to rely increasingly on servicers to administer aspects of the federal student loan programs. A variety of federal statutes and regulationsâas well as contractual provisionsâbear on the servicing of federal student loans. One such statute is Title IV of the Higher Education Act of 1965 (HEA), which (among other things) establishes programs to provide financial assistance to postsecondary students, including the FDLP. Title IV also governs loans issued under the now-discontinued FFELP that remain outstanding. Title IV contains several provisions that pertain to student loan servicing. The first such provision is 20 U.S.C. Â§ 1082, which applies to FFELP loans. 20 U.S.C. Â§ 1082(a)(1), for instance, empowers the Secretary of Education (Secretary) to \"prescribe . . . regulations applicable to third party servicers,\" \"including regulations concerning financial responsibility standards for, and the assessment of liabilities for program violations against, such servicers.\" Section 1082(a)(1) explicitly specifies, however, that \"in no case shall damages be assessed against the United States for the actions or inactions of such servicers.\" Section 1082( l )(1) in turn requires the Secretary to promulgate regulations \"prescrib[ing] standardized forms and procedures regarding .Â .Â . [student loan] servicing.\" In addition, Section 1082(p) requires certain officers, directors, employees, and consultants of student loan servicing agencies to submit reports to the Secretary disclosing potential financial conflicts of interest. Another provision, 20 U.S.C. Â§ 1087f, applies to FDLP loans. Section 1087f(a)(1) directs the Secretary to award federal loan servicing contracts to eligible servicers \"to the extent practicable.\" The Secretary may enter into servicing contracts only with \"entities which the Secretary determines are qualified to provide such services\" that possess \"extensive and relevant experience and demonstrated effectiveness.\" Additionally, \"[i]n awarding such contracts, the Secretary\" must \"ensure that such services . . . are provided at competitive prices.\" Yet another provision that has been particularly critical to the current legal debate over student loan servicing regulations is 20 U.S.C. Â§ 1098g's express preemption provision, which states that \"[l]oans made, insured, or guaranteed pursuant to a program authorized by Title IV of the [HEA] shall not be subject to any disclosure requirements of any State law.\" As explained below, courts have reached divergent conclusions regarding the significance of this statutory provision. ED has promulgated several servicing-related regulations under its rulemaking authority under Title IV of the HEA. Nearly all of these regulations are codified in Part 682 of Title 34 of the Code of Federal Regulations, which governs FFELP loans rather than FDLP loans. 34 C.F.R. Â§Â 682.203(a), for instance, contemplates that an FFELP lender \"may contract or otherwise delegate the performance of its functions under\" governing federal law \"to a servicing agency,\" but emphasizes that doing so \"does not relieve the . . . lender . . . of its duty to comply with\" all applicable statutes and regulations. 34 C.F.R. Â§ 682.208 in turn prescribes actions that a servicer must take when servicing an FFELP loan, including \"responding to borrower inquiries, establishing the terms of repayment, and reporting a borrower's enrollment and loan status information.\" Similarly, 34 C.F.R. Â§ 682.416 establishes administrative responsibility and financial responsibility standards that third-party servicers of FFELP loans must satisfy. In addition, 34 C.F.R. Â§ 682.416(e) imposes auditing requirements on servicers of FFELP loans. Should a servicer violate any of the federal requirements that apply to it, Subpart G of Part 682 establishes a variety of procedures for addressing those violations, including administrative proceedings to limit, suspend, or terminate the servicer's eligibility to enter into servicing contracts. It is unclear whetherâand, if so, to what extentâthese FFELP loan servicing regulations apply to servicers of FDLP loans. Section 1087e(a)(1) of the HEA provides that, with certain exceptions, FDLP loans \"shall have the same terms, conditions, and benefits\" as FFELP loans. At least one court has therefore concluded that Section 1087e(a)(1) embodies a general congressional preference that FDLP and FFELP loans be governed by the same legal standards. The few judicial opinions interpreting Section 1087e(a)(1) do not conclusively resolve, however, whether FFELP regulations governing third-party servicers qualify as \"terms, conditions, and benefits\" of FFELP loans that would apply equally to FDLP servicers. Furthermore, courts considering whether FFELP regulations apply to FDLP loans outside the loan-servicing context have reached divergent conclusions. Nor do the portions of the servicing contracts that FSA has posted on its website specify whether servicers of FDLP loans must follow the FFELP servicing regulations. It is possible, however, that ED may nonetheless demand or expect its FDLP servicers to comply with some or all of the FFELP servicing standards. Moreover, some servicers have implicitly suggested in litigation briefs that at least some of the FFELP servicing regulations apply to FDLP servicers. In addition to regulations that directly concern loan servicing, ED has also promulgated regulations establishing various responsibilities that the Secretary must fulfill, which the Secretary has in turn delegated to servicers. 34 C.F.R. Â§ 685.221(e)(3), for instance, requires the Secretary to \"notif[y] the borrower in writing of\" the requirement to regularly submit income recertification information to remain eligible to participate in an income-driven repayment (IDR) plan, which this report details below. ED has delegated that notification responsibility to servicers with which it contracts. Pursuant its authority to enter into servicing contracts, ED has contracted with multiple entities to service federal student loans. These contracts govern many details of those servicers' operations, including financial reporting, transaction management, internal controls, accounting, and security. The servicing contracts also contain several mechanisms that ED may invoke against servicers that violate applicable federal requirements, including (1) ordering the noncompliant servicer \"to return any fees that [it] billed to [ED] from the time of noncompliance\" or (2) \"reallocating new loan volume to other servicers or transferring all or part of the noncompliant servicer's current loan volume to another servicer until the noncompliant servicer comes back into compliance.\" Interested parties disagree, however, whether ED uses these contractual provisions with sufficient frequency and diligence to effectively punish and deter servicer misconduct. In addition to ED's own oversight of its servicing relationships, the Consumer Financial Protection Bureau (CFPB) is another federal agency that possesses certain authorities as to federal student loan servicers. Pursuant to the Dodd-Frank Wall Street Reform and Consumer Protection Act, the CFPB may exercise supervisory authority over certain nonbank \"larger participants\" in consumer financial product or service markets that it chooses to define by rule. In 2013, the CFPB exercised this authority to define larger participants in the student loan servicing market. Pursuant to the rule, the CFPB has supervisory authority over student loan servicers servicing more than 1 million accounts. The purposes of CFPB supervision include assessing compliance with consumer financial protection laws and detecting risks to consumers and consumer financial markets. By statute, the CFPB may conduct examinations as well as request information from supervised entities. In addition to its supervisory authority, the CFPB may bring enforcement actions against student loan servicers. In January 2017, for instance, the CFPB sued one of the largest federal student loan servicers, Navient Corporation. As of the date of this report, the case currently remains pending. Notably, questions have arisen regarding the relationship between the CFPB and ED. In the early 2010s, the two agencies entered into Memoranda of Understanding (MOUs) (1) providing for interagency sharing of information pertaining to, among other things, complaints about student loan servicers and (2) coordinating supervisory and oversight activities pertaining to student loans. However, ED terminated these MOUs in 2017. Among its reasons for terminating the MOUs, ED asserted that the CFPB had \"unilaterally expand[ed] its oversight role to include the Department's contracted federal loan servicers\" in derogation of ED's claimed \"full oversight responsibility for federal student loans.\" The CFPB further represented to Congress in April 2019 that \"student loan servicers have declined to produce information requested by the [CFPB] for supervisory examinations related to\" FDLP and FFELP loans since 2017. As described below, some claim that the aforementioned federal requirements and oversight mechanisms have not deterred federal student loan servicers from engaging in misconduct. Some, for instance, have accused federal student loan servicers of steering borrowers toward forbearance when participating in an IDR plan would be more beneficial for the borrower. Forbearance is a way for a borrower who encounters short-term financial hardship to obtain temporary relief from his obligation to repay a federal student loan. Forbearance allows the borrower to either temporarily cease making student loan payments; temporarily make smaller student loan payments; or extend the deadline by which the borrower must make payments. Interest, however, typically continues to accrue on the loan during the forbearance period, which is then capitalizedâthat is, added to the loan principal âwhen the forbearance period concludes. Thus, for borrowers experiencing long -term financial hardship, this interest accrual and capitalization may render forbearance less advantageous than participation in an IDR plan, the latter of which allows borrowers to make reduced monthly payments based on their income and offers them the prospect of obtaining loan forgiveness after making such payments over a specified period of years. Some allege that certain servicers have systematically encouraged borrowers to enter into forbearance rather than participate in IDR plans that would be more advantageous for the borrower. According to critics, servicers have a financial incentive to steer borrowers into forbearance because enrolling a borrower in an IDR plan requires the servicer to expend more resources than steering the borrower toward forbearance. Representatives from the servicing industry, however, deny that servicers engage in forbearance steering and assert that servicers in fact earn less money when borrowers enter forbearance. Some have also accused servicers of failing to provide critical information to student loan borrowers regarding the income recertification process a borrower must complete to remain in an IDR plan. Because, as noted above, a borrower's monthly payments under an IDR plan depend on the borrower's income, borrowers enrolled in IDR plans must recertify their income and family size each year. A borrower who does not comply with this annual recertification requirement may experience an increase in both his monthly loan payments and his total loan balance. Critics have accused some servicers of failing to \"advise borrowers of the negative consequences of failing to submit timely, complete, and correct recertifications to renew borrowers' IDR plans.\" Some borrowers also allege that federal student loan servicers misinformed them about their eligibility for loan forgiveness under federal law. Subject to various conditions, the Public Service Loan Forgiveness (PSLF) program affords loan forgiveness to borrowers who make 10 years of monthly loan payments while employed in a public service job. Critically, however, only loans issued under the FDLP qualify for the PSLF program. Some borrowers claim that they relied to their detriment on their servicers' representations that they qualified for forgiveness under the PSLF program, only to later learn that they were in fact ineligible because their student loans were non-FDLP loans, such as FFELP loans. Significantly, the HEA does not provide litigants with a private right of actionâthat is, the HEA does not authorize borrowers to directly pursue civil litigation against servicers of federal student loans. Instead, only the Secretary may enforce the HEA. States, however, have developed their own laws empowering entities other than the federal governmentâsuch as state officials or individual borrowersâto pursue legal action against servicers. These state laws fall into two broad categories: (1) statutes that specifically target servicers for regulation and (2) statutes and common law causes of action that apply more generally to a broad range of entities, including servicers of federal student loans. First, several states have recently enacted legislation that specifically imposes legal requirements on federal student loan servicers beyond what federal law requires. Because the specifics of each statute vary from state to state, the following subsections of this report survey the most significant similarities and differences between the various state servicing laws. Some state servicing statutes, for instance, prohibit student loan servicers from operating within the state's boundaries unless they maintain an active servicing license issued by the state. A servicer that operates in one of these states without a license is subject to monetary penalties. These statutes also typically provide that the state may revoke a servicer's licenseâand thereby preclude the servicer from servicing loans within the stateâif the servicer engages in specified acts of misconduct. For example, the District of Columbia's servicer licensing statute states that the Commissioner of the District of Columbia Department of Insurance, Securities, and Banking \"may revoke\" a student loan servicing license \"if, after notice and a hearing, the Commissioner finds that the licensee has\" \"[d]emonstrated incompetency or untrustworthiness to act as a licensee\" or \"[c]ommitted any fraudulent acts, engaged in any dishonest activities, or made any misrepresentation in any business transaction.\" Notably, some of these state licensing statutes contain provisions that appear intended to mitigate potential interference with the federal government and the servicers with which it contracts. For example, New York's servicing statute, which becomes effective on October 9, 2019, will provide that entities hired by ED to service federal student loans will automatically be deemed licensed to service those loans, without the need to submit a license application and otherwise meet the prerequisites for licensure. However, the New York statute will still require federal student loan servicers to comply with many of the statute's other requirements. Several other states, including Colorado and Maine, have likewise enacted similar laws allowing for automatic licensure for federal student loan servicers. Some state statutes designate a student loan ombudsperson to conduct oversight of servicers' operations, review and attempt to resolve borrowers' complaints about student loan servicers, and otherwise assist and educate borrowers with the loan servicing process. Some of these statutes contemplate that if the ombudsperson discovers that a servicer is engaging in unlawful conduct, he may refer that servicer to the responsible state agency for civil enforcement proceedings or even criminal prosecution. In response to allegations that some federal student loan servicers have steered borrowers toward forbearance instead of an IDR program, some states have also enacted laws requiring servicers to evaluate the borrower's eligibility for IDR plans before placing the borrower in forbearance. Relatedly, at least one state prohibits servicers \"from implementing any compensation plan that has the intended or actual effect of incentivizing a repayment specialist to violate\" applicable servicing regulations \"or any other measure that encourages undue haste or lack of quality.\" Similarly, in response to allegations that servicers have failed to provide borrowers with key information about income recertification, at least one state requires servicers to \"disclose the date that a borrower's [IDR] plan certification will expire and the consequences to the borrower for failing to recertify by the date, including the new repayment amount.\" A few state statutes also attempt to address concerns that some servicers have misinformed borrowers regarding their eligibility for loan forgiveness programs, such as the PSLF. The State of Washington, for instance, makes it unlawful to \"[m]isrepresent or omit any material information\" about \"the availability of loan discharge or forgiveness options.\" A number of states have also enacted statutory provisions to regulate various other aspects of servicers' operations. For instance, some state statutes purport to require servicers to acknowledge and respond to borrower complaints and requests within a specified time frame. Several statutes also impose recordkeeping or annual reporting requirements upon servicers. Additionally, some laws require servicers to inform the borrower if the identity or address of the party to whom the borrower must send payments or communications changes. There are a host of different remedies for violating state servicing laws. Some states, for instance, have authorized borrowers to pursue a private cause of action against a servicer who violates the state's servicing laws. A Maine statute that becomes effective January 1, 2020, for example, will authorize borrowers to recover compensatory, treble, and punitive damagesâas well as costs and attorney's feesâfrom servicers who violate the statute's prohibitions. As an alternative to enforcement by private litigants, some state statutes authorize the government to (1) levy fines or penalties against servicers who commit specified acts or omissions or (2) sue servicers who violate the state's servicing laws. Some state servicing statutes explicitly contemplate enforcement by both individual borrowers and the state government alike. Whereas the aforementioned provisions impose servicing requirements that go beyond federal law, some state statutes also incorporate existing federal servicing standards by reference and thereby provide state law remedies for alleged violations of federal requirements. A Connecticut statute, for instance, provides that in addition to complying with all requirements imposed by Connecticut law, a student loan servicer must also \"comply with all applicable federal laws and regulations relating to student loan servicing.\" \"[A] violation of any such federal law or regulation shall be deemed a violation of\" Connecticut law \"and a basis upon which the [Connecticut Banking Commissioner] may take enforcement action\" against a noncompliant servicer. In addition to these statutes that specifically purport to regulate student loan servicers, servicers may also be bound by a state's laws of general applicability. For example, many states have enacted consumer protection statutes that purport to apply to various entities and prohibit an array of activities that state legislatures have deemed deceptive or unfair to consumers. As explained below, some borrowers and states have invoked these consumer protection statutes in civil lawsuits against servicers challenging various forms of alleged misconduct. Additionally, state courts typically recognize common law causes of action for acts like fraud, negligent or fraudulent misrepresentation, breach of fiduciary duty, negligence, unjust enrichment, tortious interference, and breach of contract. Some borrowers have likewise invoked (or tried to invoke) these common law doctrines against servicers allegedly engaged in misconduct. With both federal and state laws coexisting in the realm of federal student loan servicing regulations, questions of federal preemptionâthat is, questions regarding whether federal law in a given area displaces or overrides state laws in that areaâhave arisen. Under case law interpreting the Constitution's Supremacy Clause, federal law can preempt conflicting state law in two central ways. First, statutory language that express ly addresses the scope of a law's preemptive effect, such as the express preemption clause in 20 U.S.C. Â§Â 1098g, may be the basis to conclude that Congress intended federal law to supersede certain state laws. Second, even if a statute is silent as to Congress's preemptive intent, implied preemption principles can also displace state law. A statute can implicitly preempt state law where (1) the scheme of federal regulation is so pervasive, or the federal interest is so dominant, that it can be presumed that Congress intended to supplant all state laws in a particular area (also known as \"field preemption\"); or (2) the state law conflicts with federal law by either making it impossible to simultaneously comply with both laws or by frustrating the purposes and objectives of the federal law (also known as \"conflict preemption\"). For each type of preemption, congressional intent is the touchstone of courts' analyses. Influencing the preemption analysis, courts have, at times, employed a \"presumption against preemption,\" meaning that they begin with an assumption that Congress did not intend to displace state law, particularly in areas falling within the traditional police powers of the states. Invoking several of these principles of federal preemption, in March 2018 ED announced its own position on the issueâthat is, that federal law preempts a wide range of state laws that regulate federal student loan servicers. Significantly, ED did not promulgate this interpretation through notice-and-comment rulemaking; it instead published its interpretation in the Federal Register as an informal guidance document. Among other things, the ED interpretation claims that federal law displaces state laws that \"impose regulatory requirements on servicing,\" such as laws that \"impose deadlines on servicers for responding to borrower inquiries\" or \"require specific procedures to resolve borrower disputes\"; state regulations \"requiring licensure of servicers\" of certain federal student loans; and state requirements concerning what servicers must disclose to borrowers. ED appears to ground its interpretation in several preemption theories, including conflict preemption (i.e., that state servicing laws allegedly impede Congress's objective of establishing uniform federal loan servicing standards) and field preemption (i.e., that existing federal regulation is comprehensive and adequate, leaving no role for additional state regulation). ED also relies on express preemption principles, arguing that 20 U.S.C. Â§ 1098g's preemption provisionâstating that \"[l]oans made, insured, or guaranteed pursuant to a program authorized by Title IV of the [HEA] shall not be subject to any disclosure requirements of any State law\"âbroadly bars states from imposing disclosure requirements. ED \"interprets the term 'disclosure requirements' under section 1098g . . . to encompass\" not only written disclosures, but also \"informal or non-written communications to borrowers.\" In addition to issuing this interpretation, ED has also submitted filings in several cases , asking courts to dismiss lawsuits against student loan servicers on preemption grounds or otherwise narrow or invalidate state regulations. ED's interpretation and its litigation position have fueled the debate between states and plaintiff borrowers on one sideâwho claim that state servicing statutes may harmoniously exist alongside federal laws and policiesâand ED and federal student loan servicers on the other, who claim that those state regulations irreconcilably conflict with supreme federal law. Federal courts addressing these disputes, as discussed below, have analyzed the applicability of field preemption, conflict preemption, and express preemption to state student loan servicing laws and state law claims against federal student loan servicers. In doing so, the courts have afforded varying levels of weight to ED's interpretation in conducting their preemption analyses. Courts have somewhat readily concluded that the HEA does not occupy the field of federal student loan servicing regulation. As an initial matter, several federal appellate courts over the past 25 yearsâin analyzing different legal contexts in the realm of higher educationâhave held that the HEA does not have field preemptive effect more generally. For example, in one such case involving state law negligence claims against national school accrediting agencies (which ED approves pursuant to the HEA), the Ninth Circuit concluded that Congress, in enacting the HEA, \"expected state law to operate in much of the field in which it was legislating.\" Although courts have recognized that the HEA is comprehensive, they have also noted that a regulatory regime's comprehensiveness on its own does not necessarily result in field preemption. Moreover, courts have observed that scattered throughout the HEA are several express preemption provisions, which explicitly foreclose certain state lawsâsuch as state usury, garnishment, and, with respect to Section 1098g, disclosure laws. Such explicit preemption provisions, courts have reasoned, would not be necessary if Congress had intended to simply supplant all state laws. When it comes to student loan servicing specifically, courts have uniformly rejected the argument that in the HEA Congress intended for federal regulation of federal student loan servicers to be an exclusive field. The HEA provides ED with the authority to contract with student loan servicers and to \"establish minimum standards\" governing those servicers' management and accountability. The district court in Student Loan Servicing Alliance v. District of Columbia , for example, concluded that this language merely sets a federal regulatory \"floor,\" without foreclosing supplemental regulation from the states. The servicers in Student Loan Servicing Alliance further raised the argument that the federal government has a dominant interest in regulating federal student loan servicing that would merit field preemptionâparticularly because, with the discontinuation of the FFELP, the federal government now makes over 90% of new student loans through the FDLP. The servicers argued, accordingly, that the federal government has a unique interest in protecting its rights under its servicing contracts for these loans. However, in weighing the federal interests against the \"compelling\" interest of states in protecting their consumers, the Student Loan Servicing Alliance court concluded that the federal interest was not dominant enough to preclude state regulation. Although field preemption arguments have not thus far posed a hurdle to state student loan servicing regulation, the federal district court in Student Loan Servicing Alliance recently invalidated significant portions of the District of Columbia's student loan servicing law under conflict preemption principles. In its student loan servicing law passed in 2016, the District of Columbia (DC) required student loan servicers to obtain a license from DC and adhere to other substantive regulations and standards of conduct. While one of the primary points raised in ED's Interpretation, as discussed above, was that this type of state licensing scheme conflicted with federal law, the court determined that it did not have to give ED's Interpretation any deference. Rather, the court concluded that the ED Interpretation consisted of informal agency guidance that was insufficiently \"thorough, consistent, and persuasive.\" Yet, in performing its own independent analysis, the district court still held that DC's licensing scheme posed an obstacle to the federal law's underlying purpose by undermining ED's authorityâprovided for in the HEAâto select servicers for federal student loans. The court relied on a line of prior federal cases arising in different legal contexts that preempted state laws' impeding the federal government's ability to contract. The court reasoned that the DC law did so by effectively \"second-guess ing \" the federal government's decisions to contract with a given loan servicer. The court's reasoning applied to FDLP loans and government-owned FFELP loans (e.g., those that ED purchased under ECASLA) , for which ED makes servicer contracting decisions under the HEA. The court held, however, that federal law did not preempt state regulations of servicers of outstanding commercial FFELP loans, where private lenders own and decide whether to contract with student loan servicers and the federal government acts merely as a reinsurer or a guarantor. Beyond the Student Loan Servicing Alliance case and its preemption of DC's licensing requirement for federal student loan servicers, however, courts have generally declined to find conflict preemption in suits brought against servicers for misrepresentations under state laws of general applicability. The main argument that federal student loan servicers have raised in this context is that plaintiffs' ability to sue under state law poses an obstacle to the HEA's objective of providing uniformity in federal student loan servicing regulation, subjecting servicers instead to actions under the laws of 50 different states and DC. However, uniformity is not a stated goal of the HEA. While certain cases have concluded that uniformity is one of the statute's purposes (albeit in arguably distinguishable contexts), other courts have declined to reach that result. Courts have also reasoned that even if uniformity were an objective of the HEA, it does not follow that enforcing state laws prohibiting deceptive conduct would serve as an obstacle to uniformity in the HEA's standards because \"uniformity in setting . . . standard parameters for the federal student loan programs is not harmed by prohibiting unfair or deceptive conduct in operating those programs. Moreover, as several courts have noted, a broad reading of servicers' uniformity argument would in effect be akin to a finding of HEA field preemption, which courts have consistently declined to recognize. Courts have also considered whether the Supreme Court's holding in Boyle v. United Technologies Corp . prevents the states from regulating activities that servicers perform under contracts with the federal government. Boyle held that plaintiffs could not pursue state law claims against federal contractors when allowing such claims to proceed would either create \"a 'significant conflict'\" with \"an identifiable 'federal policy or interest'\" or \"'frustrate specific objectives' of federal legislation.\" In the 2019 case of Nelson v. Great Lakes Educational Loan Services, Inc. , for example, the Seventh Circuit determinedâalbeit with little elaborationâthat allowing a borrower to pursue state law misrepresentation claims against a servicer would not impermissibly conflict with federal interests or objectives. Express preemption arguments in recent federal student loan servicing cases have centered on the preemption clause in Section 1098g of the HEA. Specifically, courts have grappled with whether the preemptive language in Section 1098gâwhich prohibits states from imposing \"disclosure requirements\" regarding federal student loansâprecludes suits against servicers brought under state law for misrepresentations or misleading communications made to federal student loan borrowers. Allegations in this category of lawsuits primarily include forbearance steering and misstatements regarding loan forgiveness eligibility, with the allegedly false or misleading statements in many cases being made over the telephone by the servicers' call center representatives. Specifically, some plaintiffs claim that they were \"steered\" toward placing their loans into forbearance rather than being informed of other options or enrolled in an IDR plan that may have been more beneficial in the long termâalleging that forbearance was simply a faster and less burdensome process for the servicer. Other plaintiffs recount, for example, being assured that they were on track to benefit from the PSLF program when that was not the case, thereby preventing them from taking remedial measures. Plaintiffs in these lawsuitsâwhich have included both federal student loan borrowers and state attorneys generalâhave brought state law tort claims or claims under state consumer protection statutes of general applicability. The main question at issue has been whether enforcing the state's law would require the servicers in these cases to make additional or different \"disclosures\" under Section 1098g. Most federal courts considering this question in cases based on these types of allegations have held that Section 1098g does not preempt state law. These courts have allowed the students' lawsuits to proceed, viewing their claims as involving affirmative misrepresentations or otherwise deceptive conduct, which the courts distinguished from the mere failure to provide \"disclosures\" under Section 1098g. For example, in Pennsylvania v. Navient Corp. , a federal district court in Pennsylvania ruled that the HEA did not preempt the plaintiff's state law claims regarding forbearance steering. The court reasoned that the defendant's argument went \"too far\" by framing the plaintiff's claim as one for lack of disclosure, rather than a claim concerning unfair and deceptive conduct subject to the state consumer protection statute. A federal district court in Florida in Lawson-Ross v. Great Lakes Higher Education Corp. , however, reached a different conclusion as to express preemption in 2018. The Lawson-Ross plaintiffs alleged that the defendant servicer falsely assured them that they were on track to benefit from PSLF (when they were not in fact eligible for the program), in violation of a Florida consumer protection statute and several state common law duties. The court concluded, however, that federal regulations already prescribe the information that must be provided to federal student loan borrowers, so that the plaintiffs' state law claims would essentially impose additional disclosure requirements on the servicer. Even though the plaintiffs argued that they alleged that the servicer had made an affirmative misrepresentation , the court construed the plaintiffs' claim as one for the servicer's failure to disclose accurate information regarding plaintiffs' eligibility, which it held to be impermissible under Section 1098g. In reaching its conclusion, the Lawson-Ross court afforded Skidmore deference to ED's interpretation after concluding that ED's views on the preemptive effect of federal law were \"well-reasoned and sensible.\" The Lawson-Ross court, and servicers arguing for preemption in similar cases, also relied for support on a 2010 case from the Ninth Circuit called Chae v. SLM Corp oration . In Chae , students sued a federal student loan servicer challenging certain methods it used to calculate interest, late fees, and repayment dates, claiming that these servicing practices rendered their billing statements, coupon books, and loan applications misleading in violation of a state consumer protection law. The court reasoned that Section 1098g preempted the action, stating that \"[a]t bottom, the plaintiffs' misrepresentation claims are improper-disclosure claims\" and that \"[i]n this context, the state-law prohibition on misrepresenting a business practice 'is merely the converse' of a state-law requirement that alternative disclosures be made.\" While the Lawson-Ross court extended Chae 's logic to servicers' oral misrepresentations about PSLF eligibility, other courts have distinguished Chae , noting, for example, that Chae involved allegations concerning the misleading nature of written account statements and coupon books (i.e., \"highly prescribed standardized forms\"), rather than the \"affirmative misconduct\" and types of misleading communications involved in forbearance steering or PSLF allegations. The landscape of decisions concerning Section 1098g's preemptive scope is subject to change as further appellate courts begin to address the issue. Notably, appeals in t he Pennsylvania and Lawson-Ross cases are pending. Moreover, the Nelson case, decided by the Seventh Circuit, may be appealed to the U.S. Supreme Court. Legal debates over the preemptive effect of federal lawâboth within the student loan servicing context and withoutâimplicate a variety of considerations. On the one hand, replacing state law with a single uniform national standard can sometimes be advantageous. When each state remains free to enact its own laws on a given topic, the requirements of those laws may differâperhaps irreconcilablyâfrom jurisdiction to jurisdiction. Preempting those state laws can thereby release regulated parties from the \"administrative and financial burden[s]\" of learning and complying with the \"laws of 50 States.\" Moreover, freeing federal contractors from the burden of complying with state laws could mitigate the risk of state intrusions upon federal prerogatives. On the other hand, however, when federal law does not go far enough in policing a particular industry, preemption can prevent the states from filling those regulatory gaps with their own laws. Preempting state law may also deprive the states of opportunities to experiment with novel methods of regulating particular industries and behaviors, which might ultimately prove more effective than methods devised by the federal government. Depending on how Congress weighs these competing considerations, it may enact legislation clarifying or modifying the preemptive effect of federal law in the student loan servicing context. For example, a section of the PROSPER Act introduced in the 115th Congress, if enacted, would have provided that the servicing of student loans under Title IV of the HEA would \"not be subject to any law or other requirement of any State or political subdivision of a State with respect to\" \"disclosure requirements\"; \"requirements or restrictions on the content, time, quantity, or frequency of communications with borrowers, endorsers, or references with respect to such loans\"; or \"any other requirement relating to the servicing . . . of a loan made\" under Title IV of the HEA. Alternatively, if Congress instead intends to limit the preemptive scope of federal law, it could enact a savings clause specifying that federal law does not preempt any state law that imposes more restrictive requirements on federal student loan servicers than federal statutes and regulations. For instance, one section of the Student Loan Borrower Bill of Rights (S. 1354, 116th Cong.)âwhich, among other things, proposes to subject servicers to more expansive federal regulationâexplicitly would not \"preempt any provision of State law regarding postsecondary education loans where the State law provides stronger consumer protections.\" If Congress ultimately decides to displace state servicing laws, it may consider preempting state law either narrowly or broadly. For instance, a federal statute that displaces state servicing regulations could expressly preempt all state laws that implicate the servicing of federal student loans in any fashion, or it could preempt only specified categories of state statutes (such as servicer licensing requirements) and thereby preserve some regulatory role for the states. Instead of expressly specifying the preemptive effect and scope of federal laws pertaining to federal student loan servicing, Congress could implicitly preempt state laws by changing the substantive standards governing servicers. Several Members of the 116th Congress have introduced legislation that, if enacted, would clarify or broaden servicers' duties and responsibilities under federal law or subject servicers to increased levels of federal oversight. Depending on their content and scope, new federal laws governing the conduct, obligations, and oversight of federal loan servicers could raise legal questions regarding (1) how those federal standards interact with state servicing laws and (2) the respective roles of federal and state law in regulating federal student loan servicers. The preemptive effect that courts will provide to a given federal law largely depends on the specific statutory text that Congress enacts. One other substantive change that could affect the preemptive scope of federal law is altering how the HEA is enforced. As discussed, the HEA does not presently create a private right of action; instead, the HEA contemplates that ED alone will enforce the statute's mandates. As noted above, however, some observers claim that ED has not diligently policed the servicers with whom it contracts. If Congress agrees with that assessment, it could expressly empower other entitiesâsuch as states, individual borrowers, or other federal agencies like the CFPBâto wield a greater level of enforcement authority over federal student loan servicers. For instance, granting borrowers or states a private right of action under federal law against contractors that violate federal servicing standards could provide an additional means to deter, correct, and punish alleged servicer misconduct. That said, subjecting servicers to litigation and regulation by multiple entities could increase federal contractors' costs. Rendering servicers answerable to multiple stakeholdersâbe they federal agencies, states, or individual borrowersâmight also undermine the uniformity that some have argued is a central goal of federal student loan servicer regulation, which could in turn undercut arguments that preemption is necessary to preserve the federal government's predominant role in regulating its contractors. Several bills pending in the 116th Congress propose to subject servicers to increased litigation or regulation by entities other than ED. Section 3 o f the Student Loan Borrower Bill of Rights, for example, would allow individuals to sue federal student loan servicers under the Truth in Lending Act's private right of action provision. By contrast, the CFPB Student Loan Integrity and Transparency Act of 2019 (H.R. 2833, 116th Cong.) would (among other things) (1) require federal student loan servicers to provide the CFPB with any information requested by specified CFPB officials and (2) reinstate the aforementioned MOUs between ED and the CFPB that ED terminated in 2017. Unless and until Congress specifies the intended preemptive effect of federal servicing laws, however, legal questions regarding preemption in the loan servicing context will be left to the courts to resolve. Depending on their content, the courts' rulings may affect the uniformity of servicing regulations across jurisdictions and the degree and type of oversight to which federal student loan servicers are subject.", "summary": "As the federal government's role in the student loan industry has expanded over time, the United States has contracted with student loan servicers to help it administer its growing student loan portfolio. These servicers perform a variety of functions, including (1) communicating with borrowers regarding repayment; (2) disclosing information about student loan terms to borrowers; (3) applying payments to outstanding loan balances; (4) processing applications for enrollment in repayment plans; and (5) processing requests for loan forbearance and deferment. Several federal statutes and regulationsâalong with an array of contractual provisionsâmay affect how these servicers conduct these various functions on the government's behalf with respect to federal student loans. Some allege that the existing scheme of federal regulation has not deterred servicers from engaging in various forms of alleged misconduct. According to critics, servicers of federal student loans have engaged in several undesirable behaviors, such as (1) steering borrowers experiencing financial hardship toward forbearance instead of repayment plans that would be more beneficial; (2) neglecting to inform borrowers of the consequences of failing to promptly submit certain required information; (3) misinforming borrowers on their eligibility for loan forgiveness; and (4) misallocating or misapplying loan payments. The servicers deny these allegations. Federal laws governing higher education do not authorize borrowers who have allegedly been harmed by servicer misconduct to directly pursue litigation against servicers. Instead, existing law places the primary burden of policing federal student loan servicers upon the federal government. Some commentators disagree, however, over whether the U.S. Department of Education (ED) has exercised sufficient oversight over the servicers with which it contracts. Observers have also disagreed over the extent to which other federal agencies, such as the Consumer Financial Protection Bureau (CFPB), should participate in the regulation of federal student loan servicers. At the same time, more and more states have enacted legislation specifically targeted at student loan servicers. While the specifics of these laws vary from state to state, many purport to impose legal requirements upon servicers of federal student loans that go beyond those imposed by federal law, such as supervision by a state ombudsperson or mandatory licensing. Furthermore, in addition to new laws specifically aimed at servicers, state attorneys general and borrowers alike have invoked existing state consumer protection statutes and common law causes of action against servicers in civil litigation. These burgeoning disputes between servicers on the one hand and states and borrowers on the other have raised legal questions regarding how existing federal law interacts with the growing body of state servicing regulations. ED has taken the position that federal law \"preempts\"âthat is, displacesâstate laws purporting to regulate servicers of federal student loans. While some courts have agreed with ED's conclusions on preemption, the bulk of courts have reached the opposite conclusion that states retain a role in regulating student loan servicing. This ongoing legal debate has significant legal consequences. On the one hand, if federal law preempts state servicing regulations, servicers will be subject to a single uniform national standard and will not need to expend resources to comply with each jurisdiction's state-specific regulatory regime. On the other hand, allowing states to enact and enforce their own servicing laws could fill regulatory gaps whereâat least in the view of some criticsâexisting federal regulation has not ensured that servicers perform their duties with sufficient regard for borrowers' interests. Preserving a regulatory role for the states could also enable each state to experiment with novel regulatory schemes. Given these legal consequences, several Members and committees of the 116th Congress have expressed interest both in the federal regulation of servicers generally and the preemptive scope of that regulation.", "document_type": "crs"}
{"report": "The Department of Homeland Security (DHS) is the third largest agency in the federal government in terms of personnel. The appropriations bill that funds itâproviding $70 billion in FY2020âis the seventh largest of the 12 annual funding measures developed by the appropriations committees, and is the only appropriations bill that funds a single agency in its entirety and nothing else. This report provides an overview of the FY2021 budget request for the Department of Homeland Security. It provides a component-level overview of the appropriations sought in the FY2021 budget request, putting the requested appropriations in the context of the FY2020 requested and enacted level of appropriations, and noting some of the larger changes in this proposal from those baselines. To ensure consistency of methodology, the analysis in this report is based on Office of Management and Budget (OMB) data as presented in the FY2020 and FY2021 Budget in Brief for DHS, with supporting information from the DHS congressional budget justifications for FY2021, except where noted. Most other CRS reports rely on Congressional Budget Office (CBO) data, which was not available at the time of publication at a similar level of granularity. Numbers expressed in billions are rounded to the nearest hundredth ($10 million), while numbers expressed in millions are rounded to the nearest million. None of the FY2020 requested or enacted levels in this bill include supplemental appropriations requested and provided in the wake of the COVID-19 pandemic, as the intent is to analyze the FY2021 annual appropriations request in comparison to the preceding request and ensuing annual appropriation. The FY2021 budget request represents the fourth detailed budget proposed by the administration of President Donald J. Trump. It is the earliest release of a budget request by the Trump Administration, and comes 52 days after the enactment of the FY2020 consolidated appropriations measuresâthe longest such gap since the release of the FY2017 request (53 days), and the first since then to include prior-year enacted funding levels as a comparative baseline. This allows for easier analysis of the request compared to current funding. The budget for DHS includes a variety of discretionary and mandatory budget authority. Aside from standard discretionary spending, some of the discretionary spending in the bill is offset by collections of fees, reducing the net effect on the general fund of the Treasury. Some discretionary budget authority is specially designated under the Budget Control Act (BCA), adjusting the statutory limits on discretionary spending to accommodate it. DHS also draws resources from fee revenues and other collections included in the mandatory budget, which are not usually referenced in annual appropriations legislation. However, some mandatory spending items still require an appropriation because there is no dedicated source of funding to meet the government's obligations established in lawâe.g., U.S. Coast Guard (USCG) retirement accounts. Figure 1 shows a breakdown of these different categories from the FY2021 budget request. Congress and the Administration may differ on how funding for the department is structured; frequently, administrations of both parties have suggested paying for certain activities with fee increases that would require legislative approval. If fees are not increased, additional discretionary appropriations must be provided to fund the planned activities. Figure 2 compares the structure of the FY2021 budget request to its enacted FY2020 equivalent, as well as the FY2020 request. Significant differences include In budget authority from discretionary appropriations, a $3 billion reduction in border barrier funding through U.S. Customs and Border Protection (CBP) compared to the FY2020 request; and a $2.4 billion reduction from the enacted level of funding due to the proposed move of the U.S. Secret Service to the Department of the Treasury. In fee-funded discretionary budget authority, a $709 million increase in requested Transportation Security Administration (TSA) fee revenues; and In discretionary budget authority covered by adjustments under the BCA, a $9 billion reduction in disaster relief funding through the Federal Emergency Management Agency (FEMA) compared to the FY2020 request. Table 1 presents for comparison the requested gross budget authority controlled in appropriations legislation for FY2021 for each DHS component, as well as the level requested and enacted for FY2020. This is essentially composed of the first four elements in Figure 1 and Figure 2 . Four analytical columns on the right side of the table provide comparisons of the FY2021 requested funding levels with the FY2020 requested and enacted levels, indicating dollar and percentage change. Components are listed in order of their total FY2020 enacted gross budget authority. Indented and italicized lines beneath the Coast Guard and Federal Emergency Management Agency entries show the portion of the above amount covered by adjustments for disaster relief and overseas contingency operations, provided for under the BCA. The funding levels in Table 1 include the effects of all elements of the budget tracked in the detail tables accompanying annual appropriations for DHS, except rescissions of prior-year appropriations. While this table compares data developed with the Congressional Budget Office (CBO) scoring methodology and the Office of Management and Budget (OMB) scoring methodology, most of the data compared is identical. Most of the $40 million in scoring differences identified by OMB is the result of $34 million differences in the treatment of fees, transfers and rounding within the CBP budget, with the remainder being the result of differences in rounding across the DHS funding structure. Table 1 illuminates several shifts within the FY2021 DHS budget request that are not apparent in top-line analysis: a $986 million increase from the FY2020 requested level for the U.S. Coast Guard; a $1.1 billion increase from the FY2020 requested level for Immigration and Customs Enforcementâ$2 billion (24%) more than enacted in FY2020; a $456 million increase for the Transportation Security Administration's budget from the FY2020 requested level; and a proposed transfer of the Federal Protective Service from the Cybersecurity and Infrastructure Security Agency to the Management Directorate during the FY2020 process, shifting almost $1.6 billion between the components. Table 1 also illuminates budgetary pressure on DHS's smaller headquarters and support components. With one exceptionâAnalysis and Operationsâthe seven smallest components by gross budget authority saw their budget requests reduced by at least 5% from the enacted level, and four of those components saw reductions of more than 10%. Under the Common Appropriations Structure (CAS) first implemented with the FY2017 DHS annual appropriation, most DHS discretionary appropriations were rearranged into four uniform categories: Operations and Supportâgenerally personnel and operational costs (all components have this); Procurement, Construction, and Improvementsâgenerally acquisition and construction (many components have this); Research and Development (TSA, USCG, USSS, CISA, S&T, and CWMD have this in the FY2021 budget request); and Federal Assistance (only FEMA and CWMD have this in the FY2021 budget request). FEMA's Disaster Relief Fund is a unique discretionary appropriation which was preserved separately, in part due to the history of the high level of public and congressional interest in that particular structure. The use of the CAS structure allows a quick survey of the level of departmental investment in these broad categories of spending through the appropriations process. A visual representation of this new structure follows in Figure 3 . On the left are the five appropriations categories of the CAS with a black bar representing the requested FY2021 funding levels requested for DHS for each. A sixth catch-all category is included for budget authority associated with the legislation that does not fit the CAS categories. Colored lines flow to the DHS components listed on the right, showing the amount of funding provided through each category to each component. The Operations and Support appropriation for each component pays for most DHS staffing. Table 2 analyzes changes to DHS staffing, as illuminated by the request's information on positions and full-time equivalents (FTEs) for each component. Appropriations legislation does not explicitly set these levels, so the information is drawn from budget request documents alone. The first data column indicates the number of positions requested for each component in the FY2021 budget request. The next four columns show the difference between the FY2021 request and the Administration's previous requestâexpressed numerically, then as a percentageâand then shows the same comparison with the FY2020 enacted number of positions as interpreted by the Administration. Another data column shows the number of FTEs, followed by four more analytical columns showing the same comparisons as were run for positions. The following summaries of the budget requests for DHS components are drawn from a survey of the DHS FY2021 B udget in Brief and the budget justifications for each component. Each begins with a graphic outlining the appropriations requested and enacted for the components in FY2020 and FY2021, followed by some observations on the factors that contribute to the illustrated structure. The appropriations request includes all funding provided through the appropriations measure, regardless of how it is scored: it does not include most mandatory spending, such as programs paid for directly by collected fees that have appropriations in permanent law. Each component has an Operations and Support appropriation, which includes discretionary funding for pay. A 3.1% civilian pay increase was adopted for 2020, and a 1.0% civilian pay increase has been proposed by the Administration for 2021. Descriptions of each Operations and Support appropriation note the impact of these pay increases and associated increases to component retirement contributions to better illuminate the changes in the level of other operational funding. The Administration's $15.60 billion appropriations request for CBP was $724 million (4.9%) above the FY2020 enacted level, and $2.55 billion (14.1%) below the level of appropriations originally requested for FY2020. The request includes $252 million more than enacted for Operations and Support, largely driven by $414 million for pay and retirement cost increases. $161 million was requested for 750 additional border patrol agents and 126 support staff. No additional appropriations were requested for new CBP Officers, who staff ports of entry. $21 million was requested for 300 Border Patrol Processing Coordinators, who are intended to take over non-law enforcement duties currently performed by Border Patrol Agents. The request for Operations and Support includes a new $7 million item for the Southwest Border Wall System Program, intended to maintain newly constructed barriers. $377 million more than enacted for Procurement, Construction, and Improvements. The $2.06 billion request for Border Security Assets and Infrastructure is $552 million more than enacted in annual appropriations for FY2020, and $3.12 billion less than requested in FY2020. The primary driver of this change from the FY2020 request is a reduction of $3.04 billion in construction funding for the border wall system. While the FY2020 Budget-in-Brief cites $182 million for facilities improvements and various investments for technology, aircraft, and vehicles, appropriations not for border barriers were reduced from the FY2020 enacted level of $529 million to $281 million in the request. The Administration's $9.93 billion appropriations request for ICE was $1.85 billion (22.9%) above the FY2020 enacted level, and $1.15 billion (13.0%) above the level of appropriations originally requested for FY2020. The request includes $1.79 billion more than enacted for Operations and Support, largely driven by a 4,636 position (22%) increase requested in personnel funded through appropriations. This increase would include 2,844 law enforcement officers and 1,792 support staff. While all of the primary programs under ICE would receive additional staff, Enforcement and Removal Operations (ERO) would receive 2,792 positions, a 34% increase above the current enacted level (8,201). Homeland Security Investigations (HSI) would receive 1,053 additional personnel, a 12% increase above the current enacted level (8,784). $220 million (12.3%) of the requested increase in Operations and Support appropriations is for pay and retirement increases. $58 million more than enacted for Procurement, Construction, and Improvements. This is $26 million more than the request for FY2020, growth largely driven by a nearly $14 million increase above the FY2020 requested level for Operational Communications and Information Technology. Also included in the Administration's request was $112 million in fee funding from the Immigration Examinations Fee Accountâsimilar to a proposal not approved by Congress for FY2020âwhich would fund 936 current personnel. The Administration's $4.09 billion net appropriations request for TSA was $890 million (17.9%) below the FY2020 enacted level, and $175 million (4.5%) above the level of appropriations originally requested for FY2020. With the resources from offsetting fees included, the gross discretionary total is for a request of $7.63 billion, $181 million (2.3%) below the FY2020 enacted level, and $334 million (4.6%) above the FY2020 requested level. The request includes $820 million (16.9%) less than enacted in FY2020 for Operations and Support appropriations, compensated for in large part by $709 million in proposed increases to offsetting collections. Operations and Support cost increases within this amount include $251 million for paying increased pay and retirement costs. $77 million (69.7%) less in discretionary appropriations than enacted in FY2020 for Procurement, Construction, and Improvements; $129 million less in discretionary appropriations than was requested for FY2020. $250 million continues to be provided in mandatory appropriations from the Aviation Security Capital Fund as it has since FY2004. $7 million (28.9%) more than enacted in FY2020 for Research and Development appropriations, on the basis of $8 million for two new projects to improve threat detection at TSA checkpoints. The Administration's $12.11 billion appropriations request for USCG was $139 million (1.2%) above the FY2020 enacted level, and $986 million (8.9%) above the level of appropriations originally requested for FY2020. The request included $196 million (2.4%) more than enacted in FY2020 for Operations and Support, $164 million of which is for pay and retirement increases, and increases to allowances for military personnel. For the first time in many years, the costs of Overseas Contingency Operations (OCO) were proposed for inclusion in the base discretionary appropriation for Operations and Support, without designation to adjust the discretionary budget limits to accommodate it. The OCO proposal was for $215 million in FY2021, up $25 million from the FY2020 enacted level. The budget request also included more than $30 million in increases for cyber operations. $135 million (7.6%) less than enacted for Procurement, Construction, and Improvements. Reductions of $130 million (80.7%) for the National Security Cutter program and $240 million (92.3%) for the Fast Response Cutter program were offset by increases of $234 million (75%) for the Offshore Patrol Cutter program and $420 million (311%) for the Polar Security Cutter program, as part of a net increase of $286 million (28.8%) for USCG vessels procurement. $351 million (69.6%) less than enacted was requested for USCG aircraft procurement. $13 million (18.6%) less than enacted was requested for other acquisition programs, and $58 million (28.3%) less than enacted for Shore Facilities and Aids to Navigation. Less than $1 million (6.6%) more than enacted was requested for Research and Development. The Administration's budget request envisions moving the USSS to the Department of the Treasury. However, the budget is still structured as it would be in DHS, and the numbers are provided here for analytical purposes. The $2.36 billion appropriations request for USSS was $55 million (2.3%) below the FY2020 enacted level, and $52 million (2.2%) above the level of appropriations originally requested for FY2020. The request included $26 million (1.1%) less than enacted for Operations and Support, despite $71 million being added for the costs of pay and retirement increases. The primary driver of the decrease was the anticipated reduction of $86 million in costs from the conclusion of the 2020 presidential election cycle. $20 million for 119 additional personnel and $20 million in transition costs for the proposed transition of the USSS back to Treasury also are included in the request. $29 million (42.8%) less than enacted in FY2020 for Procurement, Construction, and Improvements, and less than $1 million (4.2%) less than enacted for Research and Development. The Administration's $1.76 billion appropriations request for CISA was $258 million (12.8%) below the FY2020 enacted level, and $150 million (9.3%) above the level of net appropriations originally requested for FY2020. The request included $128 million (8.2%) less than enacted in FY2020 for Operations and Support, despite $28 million being added for the costs of pay and retirement increases. The reduction is largely driven by the proposal to convert the Chemical Facility Anti-Terrorism and Safety program to a voluntary initiative, reducing program costs by $68 million, and a $34 million reduction in Threat Analysis and Response. $121 million (27.9%) less than enacted in FY2020 for Procurement, Construction, and Improvements, largely driven by a $114 million reduction in Cybersecurity Assets and Infrastructure, $75 million of which is to the National Cybersecurity Protection System. $8 million (55.4%) less than enacted in FY2020 for Research and Development, due to reductions in funding for the Technology Development and Deployment Program and National Infrastructure Simulation and Analysis Center. The Administration's $9.36 billion appropriations request for FEMA was $12.92 billion (58.0%) below the FY2020 enacted level, and $8.65 billion (48.0%) below the level of appropriations originally requested for FY2020. The primary driver of this change is a $12.29 billion reduction from the enacted level for the costs of major disasters (a large portion of the resources in the Disaster Relief Fund). If this reduction is set aside, the request is a $628 million reduction from the FY2020 enacted level, and a $364 million increase from the FY2020 request. The request includes $32 million (2.9%) more than enacted for Operations and Support, $32 million of which is for pay and retirement increases (the combination of other increases and decreases in the account has a net zero effect); $47 million (35.1%) less than enacted for Procurement, Construction, and Improvements, largely due to lower requests for grants management modernization, Mount Weather facilities, and the Center for Domestic Preparedness; $696 million (21.9%) less than enacted for Federal Assistance, largely due to reduction in preparedness grants, the Flood Hazard Mapping and Risk Analysis Program, and elimination of the Emergency Food and Shelter Program; and $12.21 billion (68.4%) less than enacted for the Disaster Relief Fund (DRF). The request for the portion of the DRF that covers major disasters dropped from an enacted level of $17.35 billion to $5.06 billion, a request that is based on the average of the last 10 years obligations for major disasters costing less than $500 million (termed \"non-catastrophic disasters\"), and spending plans for past disasters costing FEMA more than $500 million (termed \"catastrophic disasters\"). The portion of the DRF that covers emergencies and other activities increased $82 million (16.1%) to $521 million, largely on the basis of an increase in the 10-year average of those costs, and $15 million for real estate needs associated with FEMA's Recovery Service Centers. The Administration's $119 million appropriations request for USCIS was $14 million (10.4%) below the FY2020 enacted level, and $3 million (2.4%) below the level of appropriations originally requested for FY2020. The request includes $4 million (3.0%) less for Operations and Support than enacted in FY2020, and $3 million (2.4%) less than requestedâ$2 million in increased pay raise and retirement costs were offset by reduced costs for rent and efficiencies through modernization efforts. The request does not include an appropriations request for Federal Assistance, which received $10 million in the FY2020 enacted DHS appropriations bill for Citizenship and Integration Grants, which the Administration proposes funding through Immigration Examinations Fee revenues. Less than 3% of the USCIS budget is appropriated. The budget request projects more than $4.9 billion in mandatory spending for USCISâ97% of its total budgetâwill be supported by fees in FY2021, up $213 million (4.5%) from FY2020 levels. This overall structure is similar to last year's request. The Administration's $331 million appropriations request for FLETC was $20 million (5.6%) below the FY2020 enacted level, and $19 million (5.5%) below the level of appropriations originally requested for FY2020. FLETC also anticipates receiving $211 million (up $25 million, or 13.4%) in reimbursements for training and facilities use from those it serves. The request includes $12 million (4.3%) more than was enacted in FY2020 for Operations and Support, $7 million of which is for increased pay and retirement costs; $32 million (55.3%) less than was enacted in FY2020 for Procurement, Construction, and Improvements, due to completion of funding for projects in the FY2020 enacted appropriation. The FY2021 budget includes $26 million for the purchase of two dorms it currently leases. The Administration's $644 million appropriations request for the S&T Directorate was $94 million (12.7%) below the FY2020 enacted level, and $62 million (10.6%) above the level of appropriations originally requested for FY2020. The request includes $30 million (9.6%) less than the enacted level for the Operations and Support appropriation, largely due to a $35 million (24.6%) reduction in mission support activities; Only $3 million of the Operations and Support request is for pay and retirement cost increases. $19 million in the Procurement, Construction, and Improvements appropriation (which had no funding requested or provided in FY2020) for costs associated with the closure and sale of the Plum Island Animal Disease Center; and $82 million (19.5%) less than enacted for the Research and Development appropriation, due to a $64 million (16.6%) reduction in in-house research activities and a $19 million (46.3%) reduction in university-based research. The Administration's $377 million appropriations request for CWMD was $55 million (12.8%) below the FY2020 enacted level, and $46 million (10.9%) below the level of appropriations originally requested for FY2020. The request includes $7 million (3.7%) less than the enacted level for the Operations and Support appropriation, $40 million (18.7%) less than was requested for FY2020; This reduction is driven by a $5 million (40.7%) reduction in funding for the National Biosurveillance Integration Center's biosurveillance and early warning support on biological attacks and emerging pandemics, and an almost $3 million reduction in technical forensics operational readiness, which the request says is being funded by the National Nuclear Security Administration. $1 million (0.4%) was requested for covering the increased pay and retirement costs. $32 million (26.5%) less than the enacted level for the Procurement, Construction, and Improvements appropriation, largely driven by reductions to the Radiation Portal Monitor Replacement Program ($46 million, 68.1%) and Common Viewer program ($8 million, zeroed out); $11 million (15.9%) less than the enacted level for the Research and Development appropriation, largely driven by a $7 million reduction in Technical Forensics and a $9 million (27.3%) reduction in detection capability activity; and $6 million (9.3%) less than the enacted level for the Federal Assistance appropriation, largely due to an $11 million (44.6%) reduction in funding for the Securing the Cities program. The Administration's $150 million appropriations request for OSEM was $28 million (15.9%) below the FY2020 enacted level, and $9 million (6.4%) above the level of appropriations originally requested for FY2020. The request includes $18 million (10.9%) less than enacted level for the Operations and Support appropriation, largely driven by a $15 million (25.9%) reduction in operations and engagement activities. The request included $5 million to pay for increased salary and retirement costs. $10 million less than the enacted level for the Federal Assistance program, as the targeted violence grants funded in this component in FY2020 are funded in the FEMA request for FY2021. The Administration's $1.76 billion appropriations request for MD was $198 million (12.7%) above the FY2020 enacted level, and $204 million (13.1%) above the level of appropriations originally requested for FY2020. The request includes $220 million (18.6%) more than was enacted in FY2020 for the Operations and Support appropriation, $186 million of which is net transfers as a result of DHS transitioning away from using a working capital fund; Also included in this appropriations request is a $13 million increase to cover increased pay and retirement costs. Of the remaining changes, most of the net increase is due to investments in information technology and cybersecurity. $22 million (5.7%) less than was enacted in FY2020 for the Procurement, Construction, and Improvement appropriation. Of the $359 million requested, over $200 million was for investments in DHS headquarters facilities, including St. Elizabeths; Mount Weather; and consolidation of headquarters leases. The Administration's $313 million appropriations request for A&O was $28 million (10.0%) above the FY2020 enacted level, and $36 million (13.0%) above the level of appropriations originally requested for FY2020. Most of the details of the A&O budget request are classified. However, the request included a $6 million increase to cover increases in pay and retirement costs. The Administration's $178 million appropriations request for the OIG was $12 million (6.5%) below the FY2020 enacted level, and $8 million (4.5%) above the level of appropriations originally requested for FY2020. $5 million in additional funding is requested to cover increased pay and retirement costs. The budget request includes a reduction of more than $15 million (16.5%) in OIG audits and investigations. The budget justification notes that the OIG submitted a funding request of $196 million, which the OIG states \"is essential to sustain FY 2020 operations into FY 2021 at the FY 2020 appropriated level and maintain oversight capacity commensurate with the Department's growth in several high-risk areas, including frontline security and infrastructure along the southern border, cybersecurity defenses, major acquisitions and investments, and accelerated hiring of law enforcement personnel.\" Administrative provisions are included at the end of each title of the DHS appropriations bill and generally provide direction to a single component within that title. In the FY2021 budget request, the Administration proposed a number of changes from the FY2020 enacted DHS appropriations measure, including Deleting Â§106, which established the Ombudsman for Immigration Detention. Adding a new section related to the proposed transfer of the Secret Service to the Department of the Treasury, which would allow for funds from the DHS OIG to be transferred to the Treasury OIG. Deleting Â§207-Â§212, which barred any new land border crossing fees; required an expenditure plan be submitted to Congress for the CBP Procurement, Construction, and Improvements appropriation before any of that appropriation could be obligated; constrained the use of the CBP Procurement, Construction, and Improvements appropriation, including limiting the types and locations of border barriers that could be constructed and requiring reporting to the appropriations committees on (1) the plans for barrier construction, (2) changes in barrier construction priorities, and (3) consultation with affected local communities, as well as an annual update to risk-based plan for improving border security; barred construction of barriers in certain locations; required statutory authorization for reducing vetting operations at the CBP's National Targeting Center; and directed certain CBP Operations and Support appropriations to humanitarian needs at the border and addressing health, life, and safety issues at Border Patrol facilities. Deleting Â§216, which barred DHS from detaining or removing a sponsor, potential sponsor or the family member of sponsor or potential sponsor of an unaccompanied alien child on the basis of information from the Department of Health and Human Services, unless a background check reveals certain felony convictions or association with prostitution or child labor violators; Deleting Â§227, which provided flexibility in allocating Coast Guard Overseas Contingency Operations funding; Deleting Â§229, which bars the use of funds to conduct or implement an A-76 competition for privatizing activities at the National Vessel Documentation Center; Deleting Â§231-Â§232, which were changes to permanent law (and thus no longer required inclusion in the bill) that allowed for continued death gratuity payments for the USCG if appropriated funding was unavailable for obligation; and categorized amounts credited to the Coast Guard Housing Fund as offsetting receipts. Deleting Â§233-Â§236, which allowed the Secret Service to obligate funds in advance of reimbursement by other federal agencies for training expenses; barred the Secret Service from protecting agency heads other than the secretary of DHS, unless an agreement is reached with DHS to do so on a reimbursable basis; allowed the Secret Service to reprogram up to $15 million in its Operation and Support appropriation; and allowed flexibility for Secret Service employees on protective missions to pay for travel without regard to limitations on costs, with prior notification to the appropriations committees. Adding Â§308, which requires a 25% nonfederal contribution for projects funded under the State Homeland Security Grant Program, Urban Area Security Initiative, Public Transportation Security Assistance, Railroad Security Assistance, and Over-the-Road Bus Security Assistance programsâcurrently there is no such cost share; and Adding Â§309, which would allow a transfer 1% of funding provided for the State Homeland Security Grant Program and Urban Area Security Initiative to FEMA Operations and Support for evaluations of the effectiveness of those programs. General provisions are included in the last title of the DHS appropriations bill and generally provide direction to the entire department. They include rescissions or additional budget authority in some cases. In the FY2021 budget request, the Administration proposed relatively few substantive changes to the general provisions enacted in the FY2020 bill. They sought to: Remove Â§530, which provided $41 million for reimbursement of extraordinary law enforcement costs for protecting the residence of the President; Remove Â§532, which required that DHS allow Members of Congress and their designated staff access to DHS facilities housing aliens for oversight purposes; and Remove Â§537-Â§540, which rescinded prior year appropriations from various accounts.", "summary": "On February 10, 2020, the Donald J. Trump Administration released their budget request for FY2021, including a $75.84 billion budget request for the Department of Homeland Security (DHS). DHS is the third largest agency in the federal government in terms of personnel. The appropriations bill that funds itâproviding $70 billion in FY2020âis the seventh largest of the twelve annual funding measures developed by the appropriations committees, and is the only appropriations bill that funds a single agency in its entirety and nothing else. This report provides an overview of the FY2021 budget request for the Department of Homeland Security. It provides a component-level overview of the appropriations sought in the FY2021 budget request, putting the requested appropriations in the context of the FY2020 requested and enacted level of appropriations, and noting the primary drivers of changes from the FY2020 enacted level. The FY2021 budget request represents the fourth detailed budget proposed by the Trump Administration. It is the earliest release of a budget request by the Trump Administration, and comes 52 days after the enactment of the FY2020 consolidated appropriations measuresâthe longest such gap since the release of the FY2017 request (53 days), and the first since then to include prior-year enacted funding levels as a comparative baseline. Some of the major drivers of change in the FY2021 request include A $3 billion reduction in border barrier funding through U.S. Customs and Border Protection (CBP) compared to the FY2020 request; A $2.4 billion reduction from the enacted level of funding due to the proposed move of the U.S. Secret Service to the Department of the Treasury; A $709 million increase in requested Transportation Security Administration (TSA) fee revenues; A $9 billion reduction in disaster relief funding through the Federal Emergency Management Agency (FEMA) compared to the FY2020 request; A $986 million increase from the FY2020 requested level for the U.S. Coast Guardâproposing funding $129 million above the enacted level; A $1.1 billion increase from the FY2020 requested level for Immigration and Customs Enforcementâ$2 billion (24%) more than enacted in FY2020; and A $456 million increase for the Transportation Security Administration's budget from the FY2020 requested levelâproposing funding $59 million below the enacted level. Six of the seven smallest components by gross budget authority saw their budget requests reduced by at least 5% from the enacted level, and four of those components saw reductions of more than 10%. This report will not be updated.", "document_type": "crs"}
{"report": "The Columbia River Treaty (CRT, or Treaty), signed in 1961, is an international agreement between the United States and Canada for the cooperative development and operation of the water resources of the Columbia River Basin for the benefit of flood control and power. Precipitated by several flooding events in the basin (including a major flood in the Northwest in 1948), the CRT was the result of more than 20 years of negotiations seeking a joint resolution to address flooding and plan for development of the basin's water resources. The Treaty provided for 15.5 million acre-feet of additional storage in Canada through the construction of four dams (three in Canada, one in the United States). This storage, along with agreed-upon operating plans, provides flood control, hydropower, and other downstream benefits. In exchange for these benefits, the United States agreed to provide Canada with lump-sum cash payments and a portion of hydropower benefits, known as the \"Canadian Entitlement.\" Implementation of the CRT began in 1964. The Treaty has no specific end date, and most of its provisions would continue indefinitely without action by the U.S. or Canadian Entities. However, beginning in September 2024, either nation can terminate most provisions of the Treaty with a minimum of 10 years' written notice (i.e., notice could have been provided as early as 2014). The U.S. Army Corps of Engineers (Corps) and the Bonneville Power Administration (BPA), in their designated role as the \"U.S. Entity,\" undertook a review of the Treaty beginning in 2011. Based on studies and additional stakeholder input, the U.S. Entity made its recommendation to the U.S. Department of State in December 2013. If the Treaty is not terminated or modified, most of its current provisions would continue, with the notable exception of flood control operations, which are scheduled to end in 2024 and transition to \"called-upon\" operations. Perspectives on the CRT and its review vary. Some believe that the Treaty should continue but be altered to include, for example, guarantees related to tribal resources and fisheries flows that were not included in the original Treaty. Others believe that the Canadian Entitlement should be adjusted to more equitably share actual hydropower benefits, or even be eliminated entirely. For its part, Canada has stated that without the Canadian Entitlement (or with alterations that would decrease its share of these revenues), it sees no reason for the Treaty to continue. The final Regional Recommendation to the Department of State, coordinated by the U.S. Entity, was to continue the Treaty post-2024, but with modifications. The State Department has since finalized its proposed negotiating parameters, although they are not available to the public. The Canadian recommendation, finalized in March 2013, also favored continuing the treaty, but with modifications \"within the Treaty framework,\" some of which were considerably different than those recommended by the United States. The executive branch, through the State Department, is responsible for negotiations related to the CRT. However, the Senate, through its constitutional role to provide advice and consent, has the power to approve, by a two-thirds vote, treaties negotiated by the executive branch. Changes to the CRT may or may not trigger such a vote; in any case, the Senate may choose to review any changes to the CRT. In addition, both houses of Congress may choose to weigh in on Treaty review activities by the U.S. Entity through their respective oversight powers. This report provides a brief overview of the Columbia River Treaty review. It includes background on the history of the basin and consideration of the treaty, as well as a brief summary of studies and analyses of the Columbia River Treaty review process to date. The Columbia River is the predominant river in the Pacific Northwest and is one of the largest in the United States in terms of volume flowing to the ocean. The Columbia River Basin receives water that drains from approximately 259,500 square miles in the northwestern United States and southwestern Canada, including parts of British Columbia in Canada, and four U.S. states: Montana, Idaho, Oregon, and Washington. The basin is unique among large river basins in the United States because of its high annual runoff, limited amount of storage (in the U.S. portion of the basin), and extreme variation in flow levels. The basin has the second-largest runoff in the United States in terms of average flows (275,000 cubic feet per second), and approximately 60% of this runoff occurs in May, June, and July. While only about 15% of the river basin's surface area is in Canada, the Canadian portion of the basin accounts for a considerably larger share of the basin's average annual runoff volume. The Columbia River is the largest hydropower-producing river system in the United States. Federal development of the river's hydropower capacity dates to 1932, when the federal government initiated construction of dams of the Columbia River and its tributaries. In total, 31 federal dams within the Columbia River Basin are owned and operated by the U.S. Army Corps of Engineers (Corps) and the U.S. Bureau of Reclamation (part of the Department of the Interior), and additional dams are owned by nonfederal entities. Power from federal dams on the Columbia River and its tributaries (collectively known as the Federal Columbia River Power System, FCRPS) is marketed by the Bonneville Power Administration (BPA), part of the Department of Energy. Other than the largest of these facilities, Grand Coulee (which has some storage capacity), most of these facilities on the main stem of the river in the United States have limited reservoir storage and are managed as \"run of the river\" for hydropower, flood control, and navigation. Figure 1 , below, provides an overview of the basin, including dam ownership. Figure 2 shows the relative storage capacity of these dams. The basin is also important habitat for a number of fish species. Economically important species in the region include steelhead trout; chinook, coho, chum, and sockeye salmon; and other species. These fish are important to commercial and sport anglers as well as Native American tribes in the region. The basin also provides habitat for several threatened and endangered species listed under the Endangered Species Act (ESA, 16 U.S.C. §§1531-1543); requirements under this law are an important factor in the operation of the FCRPS. Other major uses of the basin's waters include navigation, irrigation, recreation, and water supply. Four federal dams on the river's mainstem have navigation locks which allow for barge traffic to transport bulk commodities that are important to regional and national economies. Due to this infrastructure, the Columbia River is navigable up to 465 miles upstream from the Pacific Ocean. Six percent of the basin's water is diverted for irrigated agriculture, and is particularly important in eastern Washington, northeastern Oregon, and southern Idaho. Basin waters are also diverted for other water supply purposes, and the rivers and reservoirs of the basin are important for recreational users. All of these users have an interest in management of basin water supplies. The negotiation and ratification of the CRT were precipitated by several events in the basin. Most notably, a major flood event in the Northwest in 1948, the Vanport flood, caused significant damage throughout the basin and served as the impetus for negotiations between the United States and Canada, including studies by the International Joint Commission (IJC). Initially, following the flood, the United States had proposed in 1951 to build Libby Dam in Montana (which would flood 42 miles into Canada). Canada was opposed to this solution, and as a response proposed to divert as much as 15.5 million acre feet from the Columbia River for its own purposes. Based on a number of technical studies, the IJC recommended a compromise, which included development of upriver storage in Canada to help regulate flows on the Columbia River, including those for flood control and hydropower generation. The CRT was signed in 1961 but was not fully ratified by both countries (and therefore did not go into effect) until 1964. Implementation of the Treaty occurs through the U.S. Entity (BPA and the Northwestern Division of the Corps, jointly) and the Canadian Entity (the British Columbia Hydro and Power Authority, or BC Hydro). The Treaty provided for the construction of 15.5 million acre-feet (Maf) of additional storage in Canada through the construction of three dams: Duncan (completed in 1968), Hugh Keenleyside, or Arrow (completed in 1969), and Mica (completed in 1973). Construction of Libby Dam in Montana, whose reservoir backs 42 miles into Canada, was completed in 1973. Together, the four dams more than doubled the amount of reservoir storage available in the basin before construction began, providing for significant new flood protection and power benefits throughout the basin (see Figure 2 ). The CRT also required that the United States and Canada prepare an \"Assured Operating Plan\" (to meet flood control and power objectives) for the operation of Canadian storage six years in advance of each operating year. Along with \"Detailed Operating Plans,\" which may also be developed to produce more advantageous results for both U.S. and Canadian operating entities, these plans govern project operations under the Treaty. Under the CRT, the United States gained operational benefits in the form of flexible storage and reliable operations in Canada that provide for flood control and hydropower generation. In exchange, Canada (through the Canadian Entity) receives lump-sum payments from the United States for flood control benefits through 2024, as well as a portion of annual hydropower benefits from the operation of Canadian Treaty storage. In exchange for the assured use of 8.45 Maf annually of Canadian storage, the United States paid $64.4 million to Canada for flood control benefits as the three Canadian dams became operational. Under the CRT, Canada is also entitled to half of the estimated increase in downstream hydropower generated at U.S. dams. Canada initially sold this electricity (known as the \"Canadian Entitlement\") to a consortium of U.S. utilities for $254 million over a 30-year term (1973-2003). Currently, the United States delivers the Canadian Entitlement directly to Canada through BPA's Northern Intertie. The value of the Canadian Entitlement has been estimated by the U.S. Entity to be worth between $229 million and $335 million annually, depending on a number of assumptions. Several notable changes to Columbia River operations, since ratification of the CRT, factor into current negotiations. Most notably, declining populations of salmon and steelhead in the Columbia and Snake Rivers led to listings under the Endangered Species Act (ESA, 16 U.S.C. §§1531-1543) beginning in 1991. These listings have resulted in steps to improve salmon and steelhead habitat in the United States, including operational changes (e.g., augmented spring and summer flows) and mitigation actions (e.g., construction of fish passage facilities). For more information on these listings and related federal actions, see CRS Report R40169, Endangered Species Act Litigation Regarding Columbia Basin Salmon and Steelhead , by Stephen P. Mulligan and Harold F. Upton. The CRT has no specific end date, and most of its provisions, except those related to flood control operations, would continue indefinitely without action by the United States or Canada. However, beginning in September 2024, either nation can terminate most provisions of the Treaty with a minimum of 10 years' written notice (i.e., notice could have been given as early as 2014). The Corps and the BPA, in their role as the U.S. Entity, undertook a review of the Treaty and delivered a final recommendation to the Department of State in December 2013. If the Treaty is not terminated or modified, most of its provisions would continue, with the notable exception of flood control operations. Assured annual flood control operations under the Treaty are scheduled to end in 2024, independent of a decision on Treaty termination. Flood control provided by the Canadian projects is expected to transition to \"called-upon\" operations at this time. Under called-upon operations, the United States would be allowed to request alterations to Canadian operations as necessary for flood control, and Canada would be responsible for making these changes. In exchange, the United States would pay for operating costs and economic losses in Canada due to the changed operation. As noted above, the U.S. Entity undertook a series of studies and reports to inform the parties who are reviewing the CRT (this process is also known as \"Treaty review\"). The U.S. Entity undertook its studies with significant input from a sovereign review team (SRT), a group of regional representatives with whom the U.S. Entity has worked to develop its recommendation on the future of the Treaty. The SRT is made up of representatives of the 4 Northwest states, 15 tribal governments, and 11 federal agencies. In collaboration with the SRT, the U.S. Entity has also conducted stakeholder outreach so as to provide for additional input from other interests in developing a recommendation. The U.S. Entity conducted its technical studies in three iterations. Iteration 1 focused on physical effects of system operations (i.e., effects on hydropower production, etc., not the effects on ecology), and modeled both current and future scenarios. Iterations 2 and 3 included additional analysis of various scenarios, such as modeling effects on fish and wildlife habitat and species. Since Treaty review began, the U.S. Entity has also produced a number of summary reports and fact sheets on Treaty review and potential future scenarios. On June 27, 2013, the U.S. Entity shared an initial working draft of its recommendation with the Department of State for comments. On September 20, 2013, the Entity released its Draft Regional Recommendation for additional review and comment through October 25, 2013. The final Regional Recommendation was delivered to the Department of State in December 13, 2013. The recommendation, which reflects U.S. Entity study results as well as stakeholder comments, is to modify the Treaty post-2024. The executive branch, through the State Department, will make the final determination on those changes to the Treaty that are in the national interest and will conduct any negotiations with Canada related to the future of the CRT. This process may involve additional coordination with the U.S. Entity and regional stakeholders. In its Regional Recommendation, the U.S. Entity notes that the Treaty provides benefits to both countries, but recommends that it be modernized so as to \"[ensure] a more resilient and healthy ecosystem-based function throughout the Columbia River Basin while maintaining an acceptable level of flood risk and preserving reliable and economic hydropower benefits.\" The recommendation included nine \"general principles\" for future negotiations, as well as several specific recommendations related to alterations of the existing Treaty. Some of the notable recommendations for modifications to the Treaty include providing stream flows to promote populations of anadromous and resident fish, including expansion of present CRT agreements to further augment flows for spring and summer (with these flows coming from reduced fall and winter drafts—also known as drawdowns—in Canadian reservoirs) and development of a joint program for fish passage. Other recommendations include minimizing adverse effects on tribal resources (and addressing them under the FCRPS Cultural Resources Program); incorporating a dry-year strategy; rebalancing the power benefits between the two countries; and implementing post-2024 CRT flood risk management, including effective use and called-upon flood storage, through a coordinated operation plan and definition of \"reasonable compensation\" for Canada. Finally, the recommendation also suggests that, following negotiations with Canada over the CRT, the Administration should review membership of the U.S. Entity. On October 7, 2016, the State Department finalized U.S. negotiating parameters for the CRT and formally authorized talks with Canada through the State Department Circular 175 Procedure. The document, which is not available to the public, was the culmination of a two-year interagency review process, which itself built on the Regional Recommendation for Treaty modification. After finalizing its negotiating parameters, the United States requested engagement with the Canadian Foreign Ministry. Negotiations between the U.S. and Canadian negotiating teams formally began on May 29-30, 2018. Through May 2019, six \"rounds\" of negotiations had been held, with the next round scheduled for June 19-20, 2019, in Washington, DC. According to the State Department, the U.S. negotiating position is being guided by the U.S. Entity's Regional Recommendation and includes participation on the negotiating team by the Department of State, BPA, the Corps, the Department of the Interior, and the National Oceanic and Atmospheric Administration. The State Department and the Province of British Columbia have also convened town halls and community meetings to discuss the status of negotiations with the public. Various perspectives on the Columbia River Treaty and the review process have been represented in studies, meetings, and other public forums that have been conducted since Treaty review began. The Regional Recommendation represents the views of the U.S. Entity and the SRT, as well as many of the stakeholders who have weighed in through meetings and the public comment process. However, the Regional Recommendation does not represent the final U.S. approach to Treaty review. The executive branch, through the State Department, will handle those negotiations. To date, the primary Canadian perspectives provided on Treaty review have been centrally coordinated by the British Columbia (BC) provincial government, and BC announced its own decision on March 13, 2014. BC recommends continuing the Treaty, but seeking modifications within the existing framework. A summary of the perspectives of the U.S. Entity, U.S. stakeholders, and BC is provided below. To date, studies by the U.S. Entity have generally concluded that although the CRT has been mutually beneficial to the United States and Canada, not all benefits have been shared equitably, and the Treaty should be \"modernized.\" Studies by the U.S. Entity concluded that under a scenario where the Treaty continues, both governments would continue to benefit from assured operating plans that provide for predictable power and flood control benefits, among other things. These same studies generally found that without the CRT, Canada would be able to operate its dams for its own benefit (except for called-upon flood storage, which would still be an obligation regardless of termination). This could make U.S. hydropower generation more difficult to control and predict, and could also result in species impacts if advantageous flows are not agreed upon ahead of time. Despite this unpredictability, the United States would gain some advantages from Treaty termination. Studies by the U.S. Entity have concluded that a relatively large financial benefit for the United States would likely result from terminating the Treaty (and eliminating the Canadian Entitlement), while Canada would likely see reduced financial benefits from hydropower generation under a scenario that abolishes the Canadian Entitlement. However, rather than recommend termination, the U.S. Entity has recommended modification of the Treaty, including a \"rebalanced\" Canadian Entitlement and assurances for flows to improve ecosystems, among other things. While most stakeholders acknowledge benefits of the CRT, several groups and individuals submitted comments criticizing the Regional Recommendation and/or its earlier drafts. Based on these comments, major areas of debate can generally be divided into three categories: how to handle the Canadian Entitlement, how (or whether) to incorporate flows to benefit fisheries into the current coequal Treaty goals of hydropower and flood control, and specifics related to future called-upon flood management operations. The status of the Canadian Entitlement to one-half of the hydropower contributed by its dam operations has been a matter of contention, especially among power interests. The final Regional Recommendation calls for \"rebalancing\" of the Canadian Entitlement, without specifics as to what extent it should be rebalanced. While power interests have generally stopped short of calling for termination of the CRT, they criticized the lack of specifics in earlier drafts of the recommendation, and emphasized their view that the single biggest shortcoming of the CRT is that hydropower benefits have not been shared equally. In their public comments, many power interests noted that the Canadian Entitlement should be revised to provide a more equitable methodology for dividing hydropower generation benefits between the countries. Some of these groups believe that because more than half of the actual generation under Treaty-related operations is being returned to British Columbia, the current Canadian Entitlement deprives U.S. power customers of low-cost power, effectively increasing electricity rates in the Northwest. Some suggest that the status of the Canadian Entitlement, rather than ecosystem flows (discussed below), should be the focus of Treaty modernization. Perhaps the most controversial aspect of the Treaty review stems from the fact that the 1964 Treaty did not include fisheries or ecosystem flows along with the Treaty's other primary purposes of flood control and hydropower. Subsequent to the Treaty's ratification, Canada and the United States agreed under the Treaty's Detailed Operating Plans to maintain an additional 1 million acre-feet of storage at Canadian dams for flows to improve fisheries. As noted above, the U.S. Entity has recommended that a new Treaty take into account ecosystem flows and include as part of the U.S. Entity a federal fisheries representative. While tribal and environmental groups have generally agreed that provisions for ecosystem-based functions should be incorporated into the agreement, some also have argued that the proposed recommendations for Treaty modifications did not go far enough in providing for these purposes. They have called for the ecosystem function to be explicitly added as a third purpose of the Treaty, to be treated coequally with hydropower production and flood risk management. Interests have argued that the Regional Recommendation's approach (which mentions the ecosystem function but does not call for it to be treated as a coequal purpose) would effectively subordinate these changes to the other two purposes. They acknowledge that adding the ecosystem function as a coequal purpose would likely entail operational changes on the Columbia River in both countries beyond those currently provided for under the ESA, for example. One of the primary goals of these changes would be augmented flows for fisheries in spring and summer months and during water shortages. Conversely, some power interests (including some BPA customers) are concerned with the approach in the Regional Recommendation for the opposite reason: they think that the recommendation embodies more accommodations for ecosystem flows than should be provided. Thus, they oppose efforts to add ecosystem purposes as a stated coequal purpose of the Treaty. In the comment process, some stakeholders noted that ecosystem flows are already prioritized in both countries through major operational changes that have been required since the Treaty was ratified. In addition to recent increases in storage for fisheries flows, they point to the listings of salmon and steelhead on the Columbia and Snake Rivers under the ESA, along with related operational changes and mitigation, as having benefited fisheries. They also note that BPA's power customers already make significant contributions to mitigation through power rates, which have been estimated by some to provide more than $250 million per year to improve fish and wildlife flows. Finally, some have expressed concern with potentially inherent contradictions between the maintenance of existing hydropower operations under the Treaty and expanded spring and summer flows to benefit fisheries. They believe that further operational changes of this type will be damaging to the Northwest economy and to ratepayers. A final area of concern in the Treaty review process has been the future approach to \"called-upon\" flood control operations. The Regional Recommendation suggests that modifications to the CRT should include a coordinated operation plan and definition of \"reasonable compensation\" for Canada for called-upon flood control. Details related to these operations, in particular who will pay Canada for U.S. benefits and under what circumstances these operations would be required, are noted to be necessary by both sides. These details will need to be defined as part of the ongoing negotiations (either in modifications to the Treaty or in future operating plans). During the Treaty review process, many regional entities (including states, power ratepayers, and other regional stakeholders) have focused on the recommendation's uncertainty regarding payments for these benefits. They have argued that the federal government (rather than ratepayers or other regional beneficiaries) should be responsible for paying these costs. For its part, the U.S. Entity has not taken a formal position on who should pay for these benefits, and has instead focused on estimating flood risk and potential operational needs. These estimates have been a matter of disagreement with Canada (see below section, \" Canadian Perspectives on CRT Review \"). Canada, represented by the Canadian Department of Foreign Affairs, Trade, and Development, has the constitutional authority to negotiate international treaties. However the Canadian Entity, the Province of British Columbia (BC), has been the primary entity engaged in Treaty review to date. BC initiated studies to synthesize its perspective on the Treaty beginning in 2011. These studies resulted in a decision, finalized in March 2013, to continue the Treaty while \"seeking improvements within the existing Treaty framework.\" The principles outlined by BC include, among other things, specific requirements and expectations for called-upon flood control operations and a formal statement of the province's belief that the Canadian Entitlement does not account for the full \"range\" of benefits accruing to the United States and the impacts on British Columbia. The principles also acknowledge that the potential for ecosystem-based improvements \"inside and outside the treaty\" is an important consideration for the Treaty, but contend that management of salmon populations (including restoration of habitat) is not a Treaty issue per se. Some of the primary differences between the two countries are explained further below. Over the course of its review, British Columbia documented its disagreement with several of the review findings by the U.S. Entity. It argued that, in contrast to the claims of many U.S. interests, the United States actually benefits from the CRT more than Canada. In particular, Canada disagreed with some of the U.S. Entity findings and recommendations pertaining to flood control, hydropower, and ecosystem flows. For instance, Canada noted its disagreement with the U.S. Entity's previous findings related to flood control benefits and expected operations. It argued that the United States has saved billions of dollars as a result of Canadian storage over the life of the Treaty, and that an agreed-upon operational plan for flood control storage similar to the current approach would be preferable to both entities in lieu of the scheduled transition to called-upon flood control operations in 2024. In particular, Canada has disagreed with the U.S. Entity's projections of the need and cost for called-upon flood control after 2024, including the expected runoff \"trigger\" for called-upon Canadian flood storage. In essence, Canada has argued that smaller U.S. reservoirs which are not currently used for flood control are actually able to provide flood storage, and would be responsible for doing so under the Treaty's requirement that \"effective use\" be made of U.S. storage before called-upon storage is required (generally the United States has not assumed this would be the case). Canada argues that these new operations would result in forgone benefits to the United States associated with hydropower generation and fisheries, among other things, and thus called-upon operations may not be as cost-effective as some in the United States have projected. The Canadian Entity estimates that, for power production alone, called-upon operations would result in $40 million to $150 million per year in lost benefits to the United States. In contrast, using its own assumptions, the U.S. Entity has previously estimated costs of between $4 million and $34 million per request for called-upon flood control, but has not projected the same level of losses to U.S. generating capacity. Canada has also argued that the Canadian Entitlement is more equitable than previous analysis by the U.S. Entity suggested, and thus that it should remain in place. In its report on U.S. benefits, the Canadian Entity noted that it would see no reason for the Treaty to continue or be renegotiated without the Canadian Entitlement. Among other things, Canada has argued that the reliability of operations provided for under the Treaty allows for generation that is worth more to the United States than the Canadian Entitlement. The Canadian Entity also noted that if the Treaty were terminated, the lack of reliable expectations for Canadian flow would constrain U.S. hydropower benefits. As previously noted, the U.S. Entity has projected that under a Treaty termination scenario, the United States would gain significant revenue while Canadian net revenues would be expected to decrease, largely due to the termination of the Canadian Entitlement. The President, through the National Security Council, determines the negotiating position on the CRT, and the State Department is responsible for conducting negotiations related to the Treaty. However, Congress is also involved in this process. The Constitution gives the Senate the power to approve, by a two-thirds vote, treaties negotiated by the executive branch. The Senate does not ratify treaties; instead it takes up a resolution of ratification, by which the Senate may formally provide its advice and consent on the ratification process. The Senate is not required to provide an up or down vote on a resolution of ratification, nor are treaties required to be resubmitted after each Congress. In the case of the CRT, as the Treaty has been previously negotiated and ratified, the Senate would take up a resolution of ratification if the United States and Canada agree to Treaty modifications and the executive branch submits the modification to the Senate for review (if the Treaty is continued without modification or terminated, there would be no advice and consent role unless there was a new Treaty that needs to be ratified). Both the House and the Senate have also weighed in on Treaty review in their oversight capacities. Additionally, the Northwest delegation (including all 26 lawmakers representing Idaho, Montana, Oregon, and Washington) sent letters to President Obama in 2014 and 2015 expressing concerns with the perceived slow pace of the Interagency Policy Committee review process. In April 2015, lawmakers expressed a collective desire to finalize an Administration position and begin negotiations with Canada in 2015. On June 21, 2017, a bipartisan group of seven House Members from Washington and Oregon wrote to President Trump requesting prompt commencement of CRT negotiations.", "summary": "The Columbia River Treaty (CRT, or Treaty) is an international agreement between the United States and Canada for the cooperative development and operation of the water resources of the Columbia River Basin to provide for flood control and power. The Treaty was the result of more than 20 years of negotiations between the two countries and was ratified in 1961. Implementation began in 1964. The Treaty provided for the construction and operation of three dams in Canada and one dam in the United States whose reservoir extends into Canada. Together, these dams more than doubled the amount of reservoir storage available in the basin and provided significant flood protection benefits. In exchange for these benefits, the United States agreed to provide Canada with lump-sum cash payments and a portion of downstream hydropower benefits that are attributable to Canadian operations under the CRT, known as the \"Canadian Entitlement.\" Some have estimated the Canadian Entitlement to be worth as much as $335 million annually. The CRT has no specific end date, and most of its provisions would continue indefinitely without action by the United States or Canada. Beginning in September 2024, either nation can terminate most provisions of the Treaty with at least 10 years' written notice (i.e., starting as early as 2014). To date, neither country has given notice of termination, but both countries have indicated a preliminary interest in modification of the treaty. If the CRT is not terminated or modified, most of its provisions would continue, with the exception of its flood control provisions (which are scheduled to transition automatically to \"called-upon\" operations at that time, meaning the United States would request and compensate Canada for flood control operations as necessary). Perspectives on the CRT and its review vary. Some believe the Treaty should include stronger provisions related to tribal resources and flows for fisheries that are not in the Treaty; others disagree and focus on the perceived need to adjust the Canadian Entitlement to reflect actual hydropower benefits. The U.S. Army Corps of Engineers and the Bonneville Power Administration, in their joint role as the U.S. Entity overseeing the Treaty, undertook a review of the CRT from 2009 to 2013. Based on studies and stakeholder input, they provided a Regional Recommendation to the State Department in December 2013. They recommended continuing the Treaty with certain modifications, including rebalancing the CRT's hydropower provisions, further delineating called-upon flood control operations after 2024, and incorporating into the Treaty flows to benefit Columbia River fisheries. For its part, the Canadian Entity (the Province of British Columbia) released in March 2013 a recommendation to continue the CRT with modifications \"within the Treaty framework.\" It disputed several assumptions in the U.S. Entity's review process. Following a two-year federal interagency review of the U.S. Regional Recommendation, the U.S. State Department finalized its negotiating parameters and authorized talks with Canada in October 2016. Between May 2018 and May 2019, U.S. and Canadian negotiating teams held six rounds of negotiations. Additional negotiations are expected in 2019. If the executive branch comes to an agreement regarding modification of the CRT, the Senate may be asked to weigh in on future versions of the Treaty pursuant to its constitutional role to provide advice and consent. Both houses have also weighed in on CRT-related activities through their oversight roles.", "document_type": "crs"}
{"report": "Since the end of the Second World War, successive U.S. Administrations and many Members of Congress have supported a close U.S. partnership with Europe. Often termed the transatlantic relationship , this partnership encompasses the North Atlantic Treaty Organization (NATO), of which the United States is a founding member, and extensive political and economic ties with the European Union (EU) and most countries in Western and Central Europe. The United States has been instrumental in building and leading the transatlantic relationship, viewing it as a key pillar of U.S. national security and economic policy for the past 70 years. The United States spearheaded the formation of NATO in 1949 to foster transatlantic security and collective defense in Europe. Since the early1950s, U.S. policymakers also supported the European integration project that would evolve into the modern-day EU as a way to promote political reconciliation (especially between France and Germany), encourage economic recovery, and entrench democratic systems and free markets. During the Cold War, U.S. officials regarded both NATO and the European integration project as central to deterring the Soviet threat. After the Cold War, U.S. support was crucial to NATO and EU enlargement. Today, European membership in the two organizations largely overlaps; 22 countries currently belong to both (see Figure 1 ). The United States and Europe also have cooperated in establishing and sustaining an open, rules-based international trading system that underpins the global economic order and contributes to U.S. and European wealth and prosperity. Congress has been actively engaged in oversight of U.S. policy toward Europe and has played a key role in shaping the transatlantic partnership. After the end of the Cold War, many Members of Congress encouraged NATO's evolution—arguing that to remain relevant, NATO must be prepared to confront security threats outside of alliance territory—and were strong advocates for both NATO and EU enlargement to the former communist countries of Central and Eastern Europe. The U.S. and European economies are deeply intertwined through trade and investment linkages that support jobs on both sides of the Atlantic. Many Members of Congress thus have a keen interest in monitoring efforts to deepen transatlantic economic ties, such as through potential further trade liberalization, regulatory cooperation, and addressing trade frictions. At the same time, various Members have expressed concern for years about European allies' military dependence on the United States and some Members may oppose European policies on certain foreign policy or economic issues. Over the decades, U.S-European relations have experienced numerous ups and downs and have been tested by periods of political tension, various trade disputes, and changes in the security landscape. However, no U.S. president has questioned the fundamental tenets of the transatlantic security and economic architecture to the same extent as President Trump. Many European policymakers and analysts are critical of President Trump's reported transactional view of the NATO alliance, what some view as his singular focus on European defense spending as the measure of the alliance's worth, and his seeming hostility toward the EU, whose trade practices he has argued are unfair and detrimental to U.S. economic interests. Many in Europe also are concerned by what they view as protectionist U.S. trade policies, including the imposition of steel and aluminum tariffs and potential auto tariffs. U.S.-European policy divisions have emerged on a range of other issues as well, including arms control and nonproliferation, China, Iran, Syria, the Middle East peace process, climate change, and the role of international organizations such as the United Nations and the World Trade Organization (WTO). The Trump Administration contends that its policies toward Europe seek to shore up and preserve a strong transatlantic partnership to better address common challenges in what it views as an increasingly competitive world. The Administration asserts that it is committed to NATO and its collective defense clause (Article 5), has backed NATO efforts to deter Russia, and is seeking to address barriers to trade with the EU through proposed new trade negotiations. Supporters argue that President Trump's approach has led to increased European defense spending and greater European willingness to address inequities in U.S-European trade relations. Nevertheless, U.S.-European relations face significant strain. European policymakers continue to struggle with what they view as a lack of consistency in U.S. policies, especially given conflicting Administration statements about NATO and the EU. Some in Europe appear increasingly anxious about whether the United States will remain a credible and reliable partner. European concerns about potential shifts in U.S. foreign, security, and trade policies come amid a range of other difficult issues confronting Europe. These include the United Kingdom's pending departure from the EU (known as \"Brexit\"), increased support for populist, anti-establishment political parties, rule of law concerns in several countries (including Poland, Hungary, and Romania), sluggish growth and persistently high unemployment in key European economies (such as France, Italy, and Spain), ongoing pressures related to migration, a continued terrorism threat, a resurgent Russia, and a competitive China. The EU in particular is struggling with questions about its future shape and role on the world stage. In light of Europe's various internal preoccupations, some in the United States harbor concerns about the ability of European allies in NATO, or the EU as a whole, to serve as robust and effective partners for the United States in managing common international and regional challenges. Meanwhile, the United States faces deep divisions on numerous political, social, and economic issues, as well as anti-establishment sentiments and concerns about globalization and immigration among some segments of the U.S. public. A number of analysts suggest that President Trump's \"America First\" foreign policy signals a U.S. shift away from international cooperation and toward a more isolationist United States. Experts point out that until the 20 th century, U.S. foreign policy was based largely on the imperative of staying out of foreign entanglements. Some contend that \"the trend toward an America First approach has been growing since the end of the Cold War\" and that the post-World War II \"consensus about America's role as upholder of global security has collapsed\" among both Democrats and Republicans. Such possible shifts could have lasting implications for transatlantic relations and the post-World War II U.S.-led global order. In addition, both the United States and Europe face generational and demographic changes. For younger Americans and Europeans, World War II and the Cold War are far in the past. Some observers posit that younger policymakers and publics may not share the same conviction as previous generations about the need for a close and stable transatlantic relationship. Despite periodic difficulties over the years in the transatlantic relationship, U.S. and European policymakers alike have valued a close transatlantic partnership as serving their respective geostrategic and economic interests. U.S. policymakers, including past presidents and many Members of Congress, have articulated a range of benefits to the United States of strong U.S.-European ties, including the following: U.S. leadership of NATO and U.S. support for the European integration project have been crucial to maintaining peace and stability on the European continent and stymieing big-power competition that cost over 500,000 American lives in two world wars. NATO and the EU are cornerstones of the broader U.S.-led international order created in the aftermath of World War II. U.S. engagement in Europe has helped to foster democratic and prosperous European allies and friends that frequently support U.S. foreign and economic policy preferences and bolster the credibility of U.S. global leadership, including in multilateral institutions such as the United Nations and the WTO. U.S. engagement in Europe helps limit Russian, Chinese, or other potentially malign influences in the region. The two sides of the Atlantic face a range of common international challenges—from countering terrorism and cybercrime to managing instability in the Middle East—and share similar values and policy outlooks. Neither side can adequately address such diverse global concerns alone, and the United States and Europe have a demonstrated track record of cooperation. U.S. and European policymakers have developed trust and well-honed habits of political, military, and intelligence cooperation over decades. These dynamics are unique in international relations and cannot be easily or quickly replicated elsewhere (particularly with countries that do not share the same U.S. commitment to democracy, human rights, and the rule of law). The United States and Europe share a substantial and mutually beneficial economic relationship that is highly integrated and interdependent. This economic relationship substantially contributes to economic growth and employment on both sides of the Atlantic. The EU accounts for about one-fifth of U.S. total trade in goods and services, and the United States and the EU are each other's largest source and destination for foreign direct investment (FDI). The transatlantic economy generates over $5 trillion per year in foreign affiliate sales and directly employs about 9 million workers on both sides of the Atlantic (and possibly up to 16 million people when indirect employment is included). Together, the United States and Europe have created and maintained the current rules-based international trading system that has contributed to U.S. (and European) wealth and prosperity. The combined U.S. and EU economies account for 46% of global gross domestic product (GDP) and over half of global FDI. Together, this provides the United States and Europe with significant economic clout that has enabled the two sides of the Atlantic to take the lead in setting global rules and standards. At times, U.S. officials and analysts have expressed frustration with certain aspects of the transatlantic relationship. Previous U.S. administrations and many Members of Congress have criticized what they viewed as insufficient European defense spending and have questioned the costs of the U.S. military presence in Europe (especially after the Cold War). U.S. policymakers have long-standing concerns about some EU regulatory barriers to trade. In addition, observers point out that the EU lacks a single voice on many foreign policy issues, which may complicate or prevent U.S.-EU cooperation. Some in the United States have argued that maintaining a close U.S.-European partnership necessitates compromise and may slow U.S. decisionmaking. Meanwhile, some European officials periodically complain about U.S. dominance of the relationship and a frequent U.S. expectation of automatic European support, especially in international or multilateral forums. Those with this view contend that although the United States has long urged Europe to \"do more\" in addressing challenges both within and outside of Europe, the United States often fails to grant European allies in NATO, or the EU as an institution, an equal say in transatlantic policymaking. In the past, some European leaders—particularly in France—have aspired to build up the EU as a global power in part to check U.S. influence. Most European governments, however, have not supported developing the EU as a counterweight to the United States. Regardless of these occasional U.S. and European irritations with each other, the transatlantic partnership has remained grounded broadly in the premise that its benefits outweigh the negatives for both sides of the Atlantic. The United States was the driving proponent of NATO's creation in 1949 and has been the alliance's undisputed leader as it has evolved from a regionally focused collective defense organization of 12 members to a globally engaged security organization of 29 members. Successive U.S. Administrations have viewed U.S. leadership of NATO as a cornerstone of U.S. national security strategy, bringing benefits ranging from peace and stability in Europe to the political and military support of 28 allies, including many of the world's most advanced militaries. NATO proponents in the United States point out that U.S. leadership of NATO has allowed the United States to station U.S. forces, including nuclear weapons, in Europe at bases that enable quicker air, sea, and land access to other locations of strategic importance, including the Middle East and Africa. They underscore that NATO also provides an unrivaled platform for constructing and operating international military coalitions with an integrated command structure that is unprecedented in terms of size, scale, and complexity. For almost as long as NATO has been in existence, it has faced criticism. One long-standing concern of U.S. critics, including President Trump and some Members of Congress, is that the comparatively low levels of defense spending by some European allies and their reliance on U.S. security guarantees have fostered an imbalanced \"burdensharing\" arrangement by which the United States carries an outsize share of the responsibility for European security. President Trump has repeatedly expressed these sentiments in suggesting that NATO is a \"bad deal\" for the United States. Although U.S. leaders have long called for increased allied defense spending, none are seen to have done so as stridently as President Trump or to link these calls so openly to the U.S. commitment to NATO and a broader questioning of the alliance's value and utility (see text box below). Administration supporters, including some Members of Congress, argue that President Trump's forceful statements have succeeded in securing defense spending increases across the alliance that were not forthcoming under his predecessors. Trump Administration officials stress that U.S. policy toward NATO continues to be driven by a steadfast commitment to European security and stability. The Administration's 2017 National Security Strategy and 2018 National Defense Strategy articulate that the United States remains committed to NATO's foundational Article 5 collective defense clause. (President Trump has proclaimed his support for Article 5 as well.) U.S. strategy documents also underscore that the Administration continues to view NATO as crucial to deterring Russia. The Administration has requested significant increases in funding for U.S. military deployments in Europe under the European Deterrence Initiative (EDI) . The United States currently leads a battalion of about 1,100 NATO troops deployed to Poland and deploys a U.S. Army Brigade Combat Team of about 3,300 troops on continuous rotation in NATO's eastern member states. Despite stated U.S. policy, some European allies express unease about President Trump's commitment to NATO, especially amid reports that the President has considered withdrawing the United States from the alliance. European allies refute past statements by President Trump that NATO is obsolete and take issue with the President's claims that European countries have taken advantage of the United States by not spending enough on their own defense. Since the end of the Cold War, NATO allies and partner countries have contributed to a range of NATO-led military operations across the globe, including in the Western Balkans, Afghanistan, the Mediterranean Sea, the Middle East, and Eastern Europe. European allies also stress that the first and only time NATO invoked Article 5 was in solidarity with the United States after the September 11, 2001, terrorist attacks. Subsequently, Canada and the European allies joined the United States to lead military operations in Afghanistan, the longest and most expansive operation in NATO's history. Many in Europe and Canada view their contributions in Afghanistan as an unparalleled demonstration of solidarity with the United States and a testament to the value they can provide in achieving shared security objectives. As of early 2019, almost one-third of the fatalities suffered by coalition forces in Afghanistan have been from NATO members and partner countries other than the United States. In 2011, the high point of the NATO mission in Afghanistan, about 40,000 of the 130,000 troops deployed to the mission were from non-U.S. NATO countries and partners. NATO also continues to face a number of political and military challenges. Key among these is managing a resurgent Russia. Allied discussions over NATO's strategic posture have exposed divergent views over the threat posed by Russia (see \" Key Foreign Policy and Security Challenges \" for more information). Differences also exist among the allies over the appropriate role for NATO in addressing the wide-ranging security challenges emanating from the Middle East and North Africa. NATO continues to grapple with significant disparities in allied military capabilities, especially between the United States and the other allies. In most, if not all, NATO military interventions, European allies and Canada have depended on the United States to provide key capabilities such as air- and sea-lift, refueling, and intelligence, surveillance, and reconnaissance (ISR). In addition, a number of European policymakers and outside analysts contend that President Trump's negative rhetoric about NATO is damaging alliance cohesion and raising questions about future U.S. leadership of the alliance (see \" U.S. Policy Considerations and Future Prospects \" below). Since May 1950—when President Harry Truman first offered U.S. support for the European Coal and Steel Community, regarded as the initial step on the decades-long path toward building the EU—the United States has championed the European integration project. Supporters of the EU integration project contend that it largely succeeded in fulfilling core U.S. post-World War II-goals in Europe of promoting peace and prosperity and deterring the Soviet Union. After the Cold War, the United States strongly backed EU enlargement to the former communist countries of Central and Eastern Europe, viewing it as essential to extending stability, democracy, and the rule of law throughout the region, preventing a strategic vacuum, and firmly entrenching these countries in Euro-Atlantic institutions and the U.S.-led liberal international order. The United States and many Members of Congress traditionally have supported the EU membership aspirations of Turkey and the Western Balkan states for similar reasons. Over the past 25 years, as the EU has expanded and evolved, U.S.-EU political and economic relations have deepened. Despite some acute differences (including the 2003 war in Iraq), the United States has looked to the EU for partnership on foreign policy and security concerns worldwide. Although EU decisionmaking is sometimes slower than many U.S. policymakers would prefer and agreement among EU member states proves elusive at times, U.S. officials generally have regarded cooperation with the EU—where possible—as serving to bolster U.S. positions and enhance the prospects of achieving U.S. objectives. The United States and the EU have promoted peace and stability in various regions and countries (including the Balkans, Afghanistan, and Africa), jointly imposed sanctions on Russia for its aggression in Ukraine, enhanced law enforcement and counterterrorism cooperation, worked together to contain Iran's nuclear ambitions, and sought to tackle cross-border challenges such as cybersecurity and climate change. Historically, U.S.-EU cooperation has been a driving force behind efforts to liberalize world trade and ensure the stability of international financial markets. EU officials have been surprised by what they regard as President Trump's largely negative opinion of the bloc and key member states such as Germany. President Trump has supported the UK's decision to leave the EU and has expressed doubts about the EU's future viability. President Trump has called the EU a \"foe\" for \"what they do to us in trade,\" although he also noted, \"that doesn't mean they are bad … it means that they are competitive.\" At the same time, the EU is concerned by the Administration's trade policies, especially the imposition of steel and aluminum tariffs and potential auto tariffs. Many in the EU question whether the United States will continue to be a reliable partner for the EU in setting global trade rules and standards and sustaining the multilateral trading system. (See \" Trade and Economic Issues \" for more information.) Some commentators suggest that the Trump Administration largely views the EU through an economic prism and is less inclined to regard the EU as an important political and security partner. Various observers speculate that unlike past Administrations, the Trump Administration might be indifferent to the EU's collapse if it allowed the United States to negotiate bilateral trade deals with individual member states that it believes would better serve U.S. interests. President Trump (and some Members of Congress) have expressed keen interest in concluding a free trade agreement (FTA) with the United Kingdom following its expected withdrawal from the EU (see \" Possible Implications of Brexit \"). Many analysts suggest that President Trump's critical views of the EU are shaped by a preference for working bilaterally with nation-states rather than in international or multilateral forums. In a December 2018 speech in Brussels, Belgium, U.S. Secretary of State Mike Pompeo asserted that \"the European Union and its predecessors have delivered a great deal of prosperity to the entire continent\" and that \"we [the United States] benefit enormously from your success,\" but he also criticized multilateralism and asked, \"Is the EU ensuring that the interests of countries and their citizens are placed before those of bureaucrats here in Brussels?\". Secretary Pompeo's comments were widely interpreted as an implicit rebuke of the EU. Others point out that the Trump Administration is not the first U.S. Administration to be skeptical of multilateral institutions or to be charged with preferring unilateral action. This was a key European criticism of the George W. Bush Administration as well. In addition, many in the EU are uneasy with elements of the Trump Administration's \"America First\" foreign policy. Several Administration decisions have put the United States into direct conflict with the EU and experts suggest they could endanger U.S.-EU political cooperation. These include, in particular, the Trump Administration's decisions to withdraw from the 2015 multilateral nuclear deal with Iran and the Paris Agreement on climate change (see \" Key Foreign Policy and Security Challenges \" for more information). EU officials also view the Administration's recognition of Jerusalem as Israel's capital as undermining prospects for resolving the Israeli-Palestinian conflict. At the same time, Administration officials contend that certain EU policies are damaging relations with the United States. Among other issues, such officials express frustration with the EU's refusal to discuss agricultural products in planned U.S.-EU trade negotiations, and they argue that that the EU does not sufficiently understand the extent of the threat posed by Iran. Some U.S. policymakers voice concern that renewed EU defense initiatives could compete with NATO. In 2017, 25 EU members launched a new EU defense pact (known as Permanent Structured Cooperation, or PESCO) aimed at enhancing European military capabilities and bolstering the EU's Common Security and Defense Policy (CSDP). Previous U.S. Administrations have been anxious about CSDP's potential implications for NATO. The EU has bristled at the Trump Administration's criticisms, however, given its strident calls for greater European defense spending and burdensharing in NATO, as well as Administration suggestions that PESCO could become a \"protectionist vehicle for the EU\" that impedes U.S.-European defense industrial cooperation and U.S. defense sales to Europe. U.S. officials note that there have always been disagreements between the United States and the EU, and they argue that fears of a demise in relations are largely overblown. At the same time, some U.S. policymakers and analysts suggest that the multiple challenges currently facing the EU could have negative implications for the EU's ability to be a robust, effective U.S. partner. Those with this view note that internal preoccupations (ranging from Brexit to migration to voter disenchantment with traditionally pro-EU establishment parties) could prevent the EU from focusing on key U.S. priorities, such as Russian aggression in Ukraine, a more assertive China, instability in the Middle East and North Africa, the ongoing conflict in Syria, and the continued terrorism threat. Others point out that despite the string of recent EU crises over the past few years, the EU has survived and the bloc has continued to work with the United States on numerous regional and international issues. In a 2016 referendum, UK voters favored leaving the EU by 52% to 48%. In March 2017, the UK government officially notified the EU of its intention to withdraw, triggering a two-year period for the UK and the EU to conclude complex withdrawal negotiations. Since the 2016 referendum, the UK has remained divided on what type of Brexit it wants. UK Prime Minister Theresa May's government largely pursued a \"hard\" Brexit that would keep the UK outside the EU's single market and customs union, thus allowing the UK to negotiate its own trade deals with other countries. Since January 2019, the UK Parliament has rejected the withdrawal agreement negotiated with the EU three times; a key sticking point has been the \"backstop\" to resolve the Irish border question and protect the Northern Ireland peace process. As the result of a six-month extension offered by EU leaders on April 10 (at an emergency European Council summit), the UK is scheduled to exit the EU by October 31, 2019, at the latest. Since deciding to leave the EU, the UK has sought to reinforce its close ties with the United States and to reaffirm its position as a leading country in NATO. The UK is likely to remain a strong U.S. partner, and Brexit is unlikely to cause a dramatic makeover in most aspects of the U.S.-UK relationship. Analysts believe that close U.S.-UK cooperation will continue for the foreseeable future in areas such as counterterrorism, intelligence, economic issues, and the future of NATO, as well as on numerous global and regional security challenges. UK officials have emphasized that Brexit does not entail a turn toward isolationism and that the UK intends to remain a global leader in international diplomacy, security issues, trade and finance, and development aid. President Trump has expressed repeated support for Brexit. In October 2018, the Trump Administration notified Congress of its intent to launch U.S.-UK trade negotiations once the UK ceases to be a member of the EU, and many Members of Congress appear receptive to a U.S.-UK FTA in the future. At the same time, some in Congress are concerned that Brexit might negatively affect the Northern Ireland peace process. In London in April 2019, House Speaker Nancy Pelosi asserted that there would be \"no chance whatsoever\" for a U.S.-UK FTA should Brexit weaken the 1998 peace accord that ended Northern Ireland's 30-year sectarian conflict. Beyond the U.S.-UK bilateral relationship, Brexit could have a substantial impact on certain U.S. strategic interests, especially in relation to Europe more broadly and future developments in the EU. The UK is the EU's second-largest economy and a key diplomatic and military power within the EU. Moreover, the UK is often regarded as the closest U.S. partner in the EU, a partner that commonly shares U.S. views on foreign policy, trade, and regulatory issues. Some observers suggest that the United States is losing its best advocate within the EU for policies that bolster U.S. goals and protect U.S. interests. Others contend that the United States has close bilateral ties with most EU countries, shares common political and economic preferences with many of them, and as such, the UK's departure will not significantly alter U.S.-EU relations. Some U.S. officials have conveyed concerns that the UK's withdrawal could make the EU a less capable and less reliable partner for the United States given the UK's diplomatic, military, and economic clout. The UK has served as a key driver of certain EU initiatives, especially EU enlargement (including to Turkey) and efforts to develop stronger EU foreign and defense policies. In addition, as the UK is a leading voice for robust EU sanctions against Russia in response to Russia's annexation of Ukraine's Crimea and aggression in eastern Ukraine, some observers suggest that the departure of the UK could shift the debate in the EU about the duration and severity of EU sanctions. More broadly, U.S. officials have long urged the EU to move beyond what is often perceived as a predominantly inward focus on treaties and institutions, in order to concentrate more effort and resources toward addressing a wide range of shared external challenges (such as terrorism and instability to Europe's south and east). Some observers note that Brexit has produced another prolonged bout of internal preoccupation within the EU and has consumed a considerable degree of UK and EU time and personnel resources in the process. At the working level, EU officials are losing British personnel with significant technical expertise and negotiating prowess on issues such as sanctions or dealing with countries like Russia and Iran. On the other hand, some analysts have suggested that Brexit could ultimately lead to a more like-minded EU, able to pursue deeper integration without UK opposition (the UK traditionally served as a brake on certain EU integration efforts). For example, Brexit could allow the EU to move ahead more easily with undertaking military integration projects under the EU Common Security and Defense Policy. However, as discussed above, Trump Administration officials express a degree of concern about PESCO, the EU's new defense pact, and some worry that without UK leadership, CSDP and PESCO could evolve in ways that may infringe upon NATO's primary role in European security in the longer term. The United States and Europe face numerous common foreign policy and security challenges. The Trump Administration maintains that its policy choices display strong U.S. leadership and seek to bolster both U.S. and European security. Administration officials also argue that they remain ready to work with Europe on many of these common challenges. U.S.-European cooperation has been viewed as crucial to managing a more assertive Russia and preventing Russia from driving a wedge between the two sides of the Atlantic. The imposition of sanctions on Russia in response to its aggression in Ukraine is cited as a key example of a policy that has benefited from U.S.-EU coordination given the EU's more extensive economic ties with Russia. The EU has welcomed congressional efforts since the start of the Trump Administration to maintain U.S. sanctions on Russia, despite concerns that certain provisions in the Countering Russian Influence in Europe and Eurasia Act (CRIEEA) of 2017 ( P.L. 115-44 , Countering America's Adversaries Through Sanctions Act [CAATSA], Title II) could negatively affect EU business and energy interests. Although some Europeans remain wary about President Trump's expressed interest in improving U.S.-Russian relations, U.S. and European policies toward Russia remain broadly aligned. As noted above, the Trump Administration has endorsed new NATO initiatives to deter Russian aggression and increased the U.S. military footprint in Europe. The United States has continued to support and impose sanctions on Russia for its actions in Ukraine and other malign activities (including Russia's March 2018 chemical weapons attack in the United Kingdom on former Russian intelligence officer and UK citizen Sergei Skripal and his daughter). The United States and many European countries share similar concerns about Russian cyber activities and influence operations and have sought to work together in various forums to share best practices on countermeasures. At the same time, some policymakers and analysts express concern about the effectiveness and sustainability of NATO efforts to deter Russia and the use of sanctions as a long-term policy option. Some allies, including Poland and the Baltic States, have urged a more robust allied military presence in Central and Eastern Europe and strongly support maintaining pressure on Russia through sanctions. Others, including leaders in Germany and Italy, have stressed the importance of a dual-track approach to Russia that complements deterrence with dialogue. A key U.S.-European friction point is the Nord Stream 2 gas pipeline project that would increase the amount of Russian gas delivered to Germany and other parts of Europe via the Baltic Sea. The Trump Administration and many Members of Congress object to Nord Stream 2 because they believe it will increase European energy dependence on Russia and undercut Ukraine (the pipeline would bypass the country, thereby denying Ukraine transit fees and possibly loosening constraints on Russian policy toward Ukraine). Many in the EU share these concerns, including Poland and other Central European countries, as well as the European Commission (the EU's executive body). Germany, Austria, and other supporters view Nord Stream 2 primarily as a commercial project and argue that it will help increase the supply of gas to Europe. Most European NATO allies, as well as the EU, have long regarded the Intermediate-Range Nuclear Forces (INF) Treaty as a key pillar of the European security architecture. On February 1, 2019, the Trump Administration announced it was suspending U.S. participation in the INF Treaty and would withdraw the United States in six months (in accordance with the terms of the treaty). European leaders largely agree with the U.S. assessment that Russia is violating the INF Treaty, and NATO leaders have announced that they \"fully support\" the U.S. decision. At the same time, European officials remain deeply concerned that the U.S. suspension and expected withdrawal from the INF Treaty could spark a new arms race and harm European security. Subsequent to the U.S. decision, Russian President Vladimir Putin announced that Russia also would suspend participation in the INF Treaty. Moreover, Putin indicated that Russia would begin work on developing new nuclear-capable missiles in light of the treaty's collapse. Many European officials appear troubled by the U.S. decision because they contend that the United States has not presented a clear way forward. Some worry that should the United States seek to field U.S. missiles in Europe in the future, this could create divisions within NATO and be detrimental to alliance cohesion. They add that tensions linked to the planned U.S. withdrawal from the INF Treaty could negatively affect possible efforts to renew the 2010 New Strategic Arms Reduction Treaty (known as New START) with Russia, which is set to expire in 2021. As expressed in the December 2017 U.S. National Security Strategy , U.S. officials have grown increasingly concerned that \"China is gaining a strategic foothold in Europe by expanding its unfair trade practices and investing in key industries, sensitive technologies, and infrastructure.\" Chinese investment in the EU reportedly has increased from approximately $700 million annually prior to 2008 to $30 billion in 2017. Such investment spans sectors including energy, transport, communications, media, insurance, financial services, and industrial technology. The Trump Administration and many Members of Congress have been alarmed in particular by some European governments' interest in contracting with Chinese telecommunications company Huawei to build out at least parts of their fifth generation (or 5G) wireless networks. U.S. officials have warned European allies and partners that using Huawei or other Chinese 5G equipment could impede intelligence-sharing with the United States due to fears of compromised network security. Although some allies, such as the UK and Germany, have said they would not prevent Chinese companies from bidding on 5G contracts, they have stressed that they would not contract with any companies that do not meet their stringent national security requirements. In addition to concerns about intellectual property theft and illicit data collection or spying, some analysts worry that Chinese economic influence could translate into leverage over European countries. Such leverage could push some European governments to align their foreign policy positions with China or otherwise validate policies of the Chinese government, and possibly prevent the EU from speaking with one voice on China. Some experts suggest that smaller EU countries, as well as less prosperous non-EU Balkan countries, are relatively vulnerable to this type of leverage, although large EU countries also could be susceptible. As evidence, many note Italy's decision to join China's Belt and Road Initiative (BRI), China's state-run initiative to deepen Chinese investment and infrastructure links across Asia, Africa, Latin America, and Europe. The Trump Administration reportedly lobbied Italy against joining the BRI. Despite U.S. concerns about China's growing footprint in Europe, Administration officials appear hopeful that the United States and Europe can work together to meet the various security and economic issues posed by a rising China. Over the past year, EU members France and Germany have backed efforts by the European Commission to develop more stringent requirements to regulate Chinese investment in Europe. In a March 2019 joint position paper on China, the European Commission and the EU's High Representative for Foreign Affairs and Security Policy characterized China in part as an \"economic competitor in the pursuit of technological leadership, and a systemic rival promoting alternative models of governance.\" In a February 2019 interview, U.S. Ambassador to the EU Gordon Sondland called on the United States and the EU to \"combine our mutual energies … to meet China and check China in multiple respects: economically, from an intelligence standpoint, militarily.\" Some analysts, however, are skeptical about the extent to which U.S.-European cooperation toward China is possible. Those with this view note the disparities in U.S. and European security interests vis-à-vis China and apparent U.S. inclinations to view China as an economic rival to a greater extent than many European governments. Many European governments and the EU are alarmed by rising tensions between the United States and Iran, which they fear could lead to military confrontation. Differences over Iran have strained U.S.-European relations considerably during the Trump Administration. The EU opposes the Administration's decision to withdraw from the 2015 nuclear deal with Iran (the Joint Comprehensive Plan of Action, or JCPOA). The EU worked closely with the Obama Administration to negotiate the JCPOA and considers it to be a major foreign policy achievement that has prevented Iran from developing nuclear weapons. Many analysts assert that the EU's adoption of strict sanctions against Iran between 2010 and 2012, including a full embargo on oil purchases, brought U.S. and European approaches on Iran into alignment. They credit this combined U.S.-EU economic pressure as key to forcing Iran into the negotiations that produced the JCPOA. The Trump Administration contends that the JCPOA has only served to embolden Iran and has urged the EU to join the United States in abandoning the JCPOA and reimposing sanctions on Iran. The EU shares other U.S. concerns about Iran, including those related to Iran's ongoing ballistic missile program and support for terrorism, but the EU asserts that such issues should be addressed separately from the JCPOA. The EU also contends that the U.S. decision to unilaterally withdraw from the JCPOA could destabilize the region and worries that the reimposition of U.S. sanctions on Iran could threaten EU business interests. The EU remains committed to the JCPOA and has sought to work with Iran and other signatories to prevent its collapse. In January 2019, France, Germany, and the UK launched the Instrument in Support of Trade Exchanges (INSTEX), a special-purpose vehicle (SPV) designed to enable trade in humanitarian items (including food, medicine, and medical devices) that are generally exempt from sanctions (although INSTEX might eventually provide a platform to trade with Iran in oil and other products). Some in the EU, however, fear that Iran's commitment to the JCPOA may be weakening amid Iran's announcement in early May 2019 that it would no longer abide by JCPOA restrictions on stockpiles of low-enriched uranium and heavy water. The EU continues to urge Iran not to withdraw from the JCPOA completely. Many European governments were alarmed by President Trump's announcement in December 2018 that the United States would withdraw its entire 2,000-strong force in Syria fighting the Islamic State terrorist organization (also known as ISIS or ISIL). Most European countries have supported the U.S.-led international coalition to defeat the Islamic State since 2014. Although President Trump's decision to withdraw U.S. forces was based on his view that the Islamic State was largely defeated, the United States reportedly did not consult with its European partners on its military plans. The apparent lack of consultations has raised concerns about a breakdown in U.S.-European cooperation and potential negative consequences for transatlantic cohesion. News reports suggest that U.S. officials urged the UK and France to keep their ground forces in Syria following the expected U.S. departure and called for European countries to deploy an \"observer\" force to patrol a \"safe zone\" on the Syrian side of the border with Turkey. The UK and France reportedly declined these requests, and other European governments did not appear eager to assume the risks of a Syria operation in the absence of U.S. forces. The United States has since announced that it will keep a residual force of around 400 troops in Syria in an apparent effort to encourage a continued European presence, but it remains uncertain whether European governments will agree to this approach. In December 2018, news outlets reported that the Trump Administration was considering substantially reducing the U.S. troop presence in Afghanistan. European allies, who have served with the United States and NATO in Afghanistan since 2001, reacted to these reports with surprise and concern. Although the Administration has begun negotiations with the Taliban on ending the conflict in Afghanistan, U.S. officials denied a possible drawdown in U.S. forces. European officials asserted that any future reduction in U.S. troops in Afghanistan must be carried out in close coordination with the allies. Some experts have questioned the viability of NATO's Afghanistan mission without continued U.S. participation at current levels. Subsequent press reports indicate that the U.S. Defense Department has begun discussions with European allies on future military plans for Afghanistan. European military involvement in Afghanistan has faced relatively consistent public opposition in many European countries. As such, observers suggest that allies could be receptive to winding down NATO's mission in Afghanistan in tandem with the United States. At the same time, some European officials reportedly object to being left out of peace talks with the Taliban, given allied military contributions as well as considerable European development assistance to Afghanistan. Since 2001, the United States has enhanced counterterrorism and homeland security cooperation with European governments and the EU. The United States and the EU have concluded several agreements in this area, including accords to improve shipping container security, share airline passenger data, and track terrorist financing. U.S. and European officials alike regard such cooperation as crucial to fighting terrorism on both sides of the Atlantic. In recent years, the United States and Europe have focused on combating the Islamic State and the foreign fighter phenomenon. Like its predecessors, the Trump Administration appears to value such cooperation. Recently, some European governments and the EU have bristled at President Trump's call for European countries to repatriate European fighters and sympathizers captured by U.S.-backed forces in Syria and Iraq or risk their release as the United States prepares to withdraw its forces from Syria. Many European governments have been grappling with how to deal with returning Islamic State fighters and their families, but some are hesitant to assume the associated security risks of bringing such citizens home. Amid broader tensions, some analysts worry about fissures developing between the United States and Europe on counterterrorism strategies and tactics. The EU reacted with dismay to President Trump's announcement in June 2017 that the United States would withdraw from the 2015 multilateral Paris Agreement aimed at reducing greenhouse gas emissions and combating climate change (the U.S. withdrawal is due to take effect in November 2020). The EU had worked closely with the former Obama Administration to negotiate the 2015 accord. In announcing his decision, President Trump asserted that the Paris Agreement disadvantages U.S. businesses and workers, but he also indicated that he would be open to negotiating a \"better\" deal. The EU rejects any renegotiation of the Paris Agreement, and EU officials have vowed to work with U.S. business leaders and state governments that remain committed to implementing the accord's provisions. Analysts suggest that the Trump Administration's decision to withdraw from the Paris Agreement has spurred the EU to assume even greater stewardship of the accord. In February 2018, the EU asserted that it would not conclude FTAs with countries that do not ratify the Paris Agreement, creating another potential friction point in U.S.-EU trade discussions. The EU continues to voice support for other international partners—especially developing countries—in meeting their commitments to the Paris Agreement and has intensified cooperation with China in particular. At the same time, observers point out that some EU countries are facing challenges in meeting their existing targets to reduce greenhouse gas emissions and efforts to formalize more ambitious EU emissions reduction goals have encountered a degree of resistance within the EU. The United States and the EU are each other's largest trade and investment partners. Total U.S.-EU trade in merchandise and services reached $1.3 trillion in 2018 ( Figure 2 ). Investment ties, including affiliate presence and intra-company trade, are even more significant given their size and interdependent nature. In 2017, the stock of transatlantic foreign direct investment (FDI) totaled over $5 trillion ( Figure 3 ); the EU accounts for over half of both FDI in the United States and U.S. direct investment abroad. While the transatlantic economy is highly integrated, it still faces tariffs and nontariff barriers to trade and investment. U.S. and EU tariffs are low on average, though tariffs are high on some sensitive products. Regulatory differences and other nontariff barriers also may raise the costs of U.S.-EU trade and investment. Over the years, the United States and the EU have sought to further liberalize trade ties, enhance regulatory cooperation, and work together on international economic issues of joint interest and concern, for instance, regarding China's trading practices. Although U.S.-EU trade and economic frictions emerge periodically, tensions are currently heightened under the Trump Administration's trade policy, which has given priority to reducing U.S. bilateral trade deficits, utilizing unilateral tariff measures under U.S. trade laws, and applying a critical view of the U.S. role in international economic cooperation. EU officials are troubled in particular by the Trump Administration's skepticism of the WTO, and they are concerned that it reflects a broader U.S. shift away from international cooperation. At the same time, many WTO members, including the United States and EU, are engaged in active discussions on aspects of potential reform to the WTO, including changes to its dispute settlement system. Meanwhile, the United States continues to monitor developments on a wide range of EU trade and other policies, such as on data protection, digital trade, and penalties for corporate tax avoidance, some of which the United States sees as trade barriers. The Trump Administration blames \"unfair\" trade practices by the EU, and particularly Germany, for the U.S. merchandise trade deficit with the EU. In 2018, the United States had an overall $110 billion deficit in merchandise and services trade with the EU, as the deficit in merchandise trade ($170 billion) outweighed the surplus for trade in services ($60 billion). President Trump has criticized in particular the U.S.-EU imbalance on auto trade, flagging the EU 10% tariff and U.S. 2.5% tariff on cars—though the U.S. tariff rate for trucks is higher (25% versus 22% in the EU). The role of \"unfair\" trade practices as a driver of trade deficits is contested. EU leaders maintain that the U.S.-EU trade relationship is fair and mutually beneficial given the U.S. services surplus and the higher profits earned by U.S. companies doing business in Europe. In 2016, affiliates of U.S. multinational enterprises (MNEs) in Europe had $2.8 trillion in sales, while affiliates of European MNEs in the United States had $2.2 trillion in sales. On June 1, 2018, President Trump imposed tariffs of 25% and 10% on certain steel and aluminum imports, respectively, under Section 232 of the Trade Expansion Act of 1962, after Department of Commerce investigations found that current imports threaten to impair U.S. national security. The EU, which represented 22% of U.S. steel imports and 9% of U.S. aluminum imports in 2018, received an initial temporary exemption from the tariffs, but unlike some other trading partners, it was unable to negotiate a permanent tariff exemption in exchange for an alternative quota arrangement. Most European leaders view the imposition of the steel and aluminum tariffs on the EU as baseless given close U.S.-EU political and security ties. The EU response to the U.S. tariffs has been multifaceted. Among other measures, the EU has imposed retaliatory tariffs against selected U.S. products, including, for example, Kentucky bourbon and Harley-Davidson motorcycles. Both sides are now pursuing cases in the WTO on the measures. The Section 232 investigation of automobiles and parts has further strained relations, and its outcome could be highly significant to proposed new U.S.-EU trade negotiations (see below). Motor vehicles are a leading U.S. import from the EU, and some EU auto companies have manufacturing facilities in the United States. On May 17, 2019, President Trump announced that the Section 232 auto investigation found that U.S. imports of motor vehicles and parts threaten to impair U.S. national security. Although this finding allows the President to impose unilateral import restrictions such as tariffs, the President decided initially to seek a negotiated solution and directed the U.S. Trade Representative (USTR) to resolve this threatened impairment through negotiating agreements with the EU, Japan, and any other country that the USTR deems appropriate. The USTR must update the President on the progress of the negotiations within 180 days. Frictions also may rise with new developments in the protracted U.S.-EU \"Boeing-Airbus\" cases in WTO dispute settlement; each side has long complained about subsidies imposed by the other to its domestic civil aircraft industry. In April 2019, the United States and EU announced preliminary lists of their traded goods on which they propose to impose countermeasure tariffs of $11.2 billion and $12 billion, respectively, to compensate for harm they claim that the other's subsidies have caused. A final WTO assessment is expected this summer on the countermeasure value amounts that each side is entitled to impose. Although the Boeing-Airbus cases have been in WTO litigation for 14 years, the current environment raises questions about potential tit-for-tat retaliation. On October 16, 2018, the Trump Administration notified Congress under Trade Promotion Authority (TPA) of new U.S. trade agreement negotiations with the EU to seek a \"fairer, more balanced\" relationship. Prior U.S.-EU negotiations on a Transatlantic Trade and Investment Partnership (T-TIP) stalled after 15 rounds under the Obama Administration. The proposed new talks follow the July 2018 U.S.-EU Joint Statement that aimed to de-escalate current trade tensions (agreed between President Trump and European Commission President Jean-Claude Juncker). The new talks have not started formally yet. U.S.-EU disagreement over the scope of the new talks has cast uncertainty over their outlook. U.S. negotiating objectives aim to address tariffs and nontariff barriers for goods, services, agriculture, government procurement, intellectual property rights, investment, and other areas, including new issues such as digital trade. The United States may seek to negotiate in stages. The EU, which insists on not negotiating \"with a gun to our head,\" seeks limited negotiations to defuse tensions and avoid the pitfalls of the wide-ranging T-TIP negotiations. EU negotiating directives authorize the European Commission to eliminate tariffs on industrial products (but specifically exclude agriculture) and address regulatory nontariff barriers in a conformity assessment agreement to make it easier for companies to prove their products meet EU and U.S. technical requirements while maintain a high level of protection in the EU. The EU claims it is adhering to commitments made in the Joint Statement, in which the two sides announced plans to launch negotiations to eliminate tariffs, nontariff barriers, and subsidies on \"non-auto industrial goods,\" as well as to boost trade specifically in services, chemicals, pharmaceuticals, medical products, and U.S. soybeans. In the Joint Statement, the United States and EU also committed to: enhancing their strategic cooperation on energy to boost the EU's purchase of U.S. liquefied natural gas (LNG) to diversify its energy supply, launching a dialogue on standards and regulations to reduce exporting barriers and costs, and working with \"like-minded partners\" to address unfair trade practices and WTO reform. Although the two sides have not started the new trade negotiations formally, the EU notes progress in advancing some of the other commitments from the Joint Statement—for instance, the rise in EU imports of soybeans and LNG from the United States. U.S.-EU regulatory cooperation also is ongoing for such sectors as pharmaceuticals, medical products, and chemicals. A key feature of the proposed negotiations is their potential role in defusing current U.S.-EU trade tensions. Although the two sides agreed in the Joint Statement not to escalate tariffs while negotiations are active and to examine the Section 232 steel and aluminum tariffs, President Trump has threatened the EU repeatedly with tariffs, including over its exclusion of agriculture. The EU asserts it will stop negotiating if the United States applies new Section 232 tariffs, and it may stop negotiating if subject to new trade restrictions under other U.S. trade laws. A path forward on the negotiations appears unclear due to a number of factors. Differences on the scope, especially on agriculture, could thwart the negotiations before they even start formally. Many in Congress and in the U.S. agricultural sector oppose excluding agriculture from the negotiations, viewing the negotiations as an opportunity to address key U.S. concerns about barriers to accessing European agricultural markets. For the EU, agriculture is a sensitive issue, stemming in part from commercial and cultural practices often enshrined in EU laws and regulations, which also often differ from those of the United States. If formal negotiations start, a narrow agreement could lead to some \"wins\" and facilitate further negotiations, but such an agreement may be limited to trade liberalization across a few sectors. Yet, T-TIP shows the challenges of negotiating a more comprehensive FTA. Potential Section 232 auto tariffs, while possibly preserving U.S. negotiating leverage, loom large over the negotiations in how they could affect EU willingness to engage. The priority that each side gives to the negotiations also is an open question, given ongoing EU-UK negotiations over Brexit and the proposed U.S.-UK FTA negotiations—contingent upon the UK regaining a national trade policy after it withdraws from the EU. Concluding even limited U.S.-EU trade negotiations likely will take time, and the EU approval process may be lengthy, given the role of the European Parliament and member states. If a U.S.-EU trade agreement is concluded, it is unclear if, on the U.S. side, it would meet congressional expectations or TPA requirements. On the EU side, complexities include Brexit, which would remove the UK's leading voice on trade liberalization from the EU. France opposes the U.S.-EU talks due to the U.S. position on global efforts to address climate change. Successful negotiations, however defined, could help resolve the current standoff over tariffs; moreover, they could rebuild trust and reinforce trade ties amid shifts in U.S. trade policy approaches under the Trump Administration and transformations to the EU post-Brexit. In addition, while an FTA could be commercially significant in improving the competitiveness of U.S. and EU businesses in each other's market, it also could be strategically significant for the United States and EU in jointly shaping global \"rules of the road\" on new trade issues and in addressing issues of mutual concern (e.g., regarding China's trade practices). However, if the talks fail, trade tensions could escalate. Some transatlantic observers fear a continuation of tit-for-tat tariff escalation. Alternatively, the two sides may explore other avenues for engagement, such as enhanced regulatory cooperation and sectoral agreements. For the past 70 years, the transatlantic relationship has been grounded in a commitment to the post-World War II order based on alliances with like-minded democratic partners. U.S. support for a strong partnership with Europe has been premised largely on the belief that U.S. leadership of NATO and close U.S.-EU ties promote U.S. security and stability and magnify U.S. global influence and financial clout. Despite periodic U.S.-European tensions over the decades and changes in the security environment since the end of the Cold War, most experts judge that the transatlantic partnership continues to advance U.S. strategic and economic interests. The Trump Administration's 2017 National Security Strategy reiterates the long-standing view that \"the United States is safer when Europe is prosperous and stable, and can help defend our shared interests and ideals.\" The Administration argues, however, that Europe is not prepared to address what it sees as growing great power competition. President Trump's calls for NATO allies to spend more on defense and shoulder more of the security burden reflect this worldview, as well as his commitment to ensure that U.S allies do not \"take advantage of their friendship with the United States, both in military protection and trade.\" Some commentators maintain that President Trump has asked legitimate questions about whether there is sufficient burdensharing within NATO given current threats and Europe's relatively weak military capabilities. Some analysts suggest that President Trump has succeeded more than past U.S. presidents in demanding that European allies increase defense budgets. Administration supporters also credit President Trump with compelling the EU to address U.S. trade concerns, and they welcomed provisions in the July 2018 U.S.-EU Joint Statement aimed at boosting EU purchases of soybeans and LNG. Many U.S. officials and some outside experts downplay concerns about a dwindling U.S. commitment to the transatlantic partnership. They point out that there has been continuity in many U.S. policies toward Europe. The Trump Administration has sought to bolster NATO efforts to deter Russia and supported Montenegro's accession to NATO (in 2017), as well as the signing of North Macedonia's NATO accession protocol in February 2019 following the resolution of its name dispute with Greece. As noted previously, the United States has sought to work with the EU on de-escalating tensions over trade and tariffs. Furthermore, U.S. officials contend that the United States hopes to cooperate with European allies and partners in tackling global foreign policy and security issues. Secretary of State Pompeo has urged European governments to work with the United States to confront common challenges posed by Russia, China, and Iran (among others) and to reform international institutions such as United Nations and the WTO. Critics contend, however, that the Trump Administration's policies and rhetoric toward NATO, the EU, and some key allies are damaging the transatlantic partnership, undermining the trust and confidence upon which it ultimately rests, and creating significant uncertainty about the U.S. commitment to European security and U.S.-EU cooperation. European officials and analysts have been relieved that President Trump has voiced support for NATO and Article 5, but some suggest that by tying the U.S. commitment to NATO to increases in allied defense spending, President Trump is harming the credibility of the U.S. security guarantee. This, in turn, could weaken U.S. leadership of the alliance and embolden Russia. Many observers assert that President Trump's seemingly transactional view of NATO and the broader U.S.-European relationship is detrimental to transatlantic cohesion. Following the September 11, 2001, terrorist attacks on the United States, NATO invoked Article 5 and European allies fought and died with U.S. forces in Afghanistan. Some analysts suggest that European support for the U.S. and NATO missions in Afghanistan is driven more by the desire to stand as allies with the United States, and less by the view that instability in Afghanistan poses a significant threat to their own security. Experts increasingly question whether the allies will follow where the United States leads in the future. As a prime example of diminished cohesion, many point to current European reluctance to keep forces in Syria to guard against an Islamic State resurgence after the expected U.S. troop withdrawal. Such U.S.-European divisions are widely considered a win for Russia, both in terms of undermining the transatlantic partnership and consolidating Russia's influence in Syria. Some European leaders worry about potential U.S. global disengagement and argue that Europe must be better prepared to address both regional and international challenges on its own. Many observers view EU efforts over the past few years to conclude trade agreements with other countries and regions (including Canada, Japan, and Latin America) and to enhance defense cooperation as aimed, in part, at reducing European dependence on the United States. Some analysts suggest that recent calls by French President Emmanuel Macron for a \"European army\" seek to underscore the need to boost European military capabilities in the face of growing uncertainty about the future U.S. role in the world. German Chancellor Angela Merkel subsequently supported Macron's position on developing a European army, although she noted that it should seek to complement, not compete with, NATO. Others contend that the transatlantic partnership will endure. Europe remains largely dependent on the U.S. security guarantee, and the magnitude of U.S.-EU trade and investment ties will continue to bind together the two sides of the Atlantic. Those with this view also point out that the United States and Europe continue to share broadly similar values and policy outlooks and have few other partners of comparable size and influence elsewhere in the world. Some observers note that European allies have sought to respond constructively to President Trump's criticisms of NATO. Many experts believe that despite U.S.-EU tensions on certain policy issues, the EU will seek to work with the Trump Administration where possible and will aim to preserve political, security, and economic relations with the United States for the long term. The EU continues to cooperate with the United States on issues of common interest and concern, such as countering terrorism, promoting cybersecurity, and reforming the WTO, and plans to negotiate a new trade agreement with the United States (although formal negotiations have yet to begin). Many Members of Congress regard a strong, close transatlantic partnership as crucial to U.S. national security and economic interests. In February 2019, Speaker Pelosi led a congressional delegation to Europe and asserted that the visit sought to reaffirm \"our commitment to the transatlantic alliance, our commitment to NATO and respect for the European Union.\" In the 115 th Congress, hearings addressed a wide range of current European issues—from Brexit to EU policy toward Russia to European migration issues. In the 116 th Congress, several hearings focused on NATO ahead of its 70 th anniversary in April 2019, and on the broader transatlantic relationship under the Trump Administration. Broad bipartisan support exists in Congress for NATO. While many Members of Congress have criticized specific developments within NATO—regarding burdensharing, for example—Congress as a whole has long backed NATO and U.S. leadership of the alliance. During the Trump Administration, expressions of congressional support have been viewed at times as an effort to reassure allies troubled by President Trump's criticisms of the alliance. During the Trump Administration, both chambers of Congress have passed legislation expressly reaffirming U.S. support for NATO, including legislation passed by the House in January 2019 ( H.R. 676 ) seeking to limit the president's ability to withdraw from NATO unilaterally. Legislation similar to H.R. 676 has been introduced in the Senate ( S.J.Res. 4 and S. 482 ). Some analysts viewed the bipartisan House-Senate invitation to NATO Secretary General Jens Stoltenberg to address a joint session of Congress in April 2019 as an additional demonstration of NATO's importance to Congress. Many Members of Congress also have considered the EU to be vital to European peace and prosperity, and thus serving U.S. interests. In the 115 th and 116 th Congresses, some House and Senate Members have sought to reassure EU officials and member state governments of continued U.S. support for the EU, in part through visits to Brussels and key European capitals, the reestablishment of the EU Caucus in the House, and continued House participation in the Transatlantic Legislators' Dialogue (TLD) with the European Parliament. In early 2019, some Members of Congress urged the Trump Administration to reinstate the status of the EU's diplomatic mission to the United States as equivalent to that of a national mission after the State Department downgraded it in late 2018 to that of an international organization (which has protocol implications). Congress traditionally has viewed U.S.-European trade and investment relations as being largely mutually beneficial. H.Res. 810, introduced in April 2018 by Representative William Keating, would have reaffirmed the importance of U.S.-EU trade and investment ties to the economic and national security interests of the United States. Some Members have expressed varying degrees of concern about the Trump Administration's imposition of tariffs on steel and aluminum imports from the EU and other U.S. trading partners. This concern could prompt legislative debate over modifying the President's delegated authority under Section 232 (see, for example, S. 3013 ). At the same time, some Members of Congress share the Administration's critical views on certain European foreign and economic policies. Like the Administration, many Members are concerned about European defense spending levels and have long objected to any EU initiatives to build European defense capabilities that could ultimately compete with NATO. Some Members are wary about what they view as growing Chinese influence in Europe, and troubled by potential European efforts to protect business interests from potential U.S. secondary sanctions on Iran or Russia. Considerable congressional opposition exists to projects such as the Nord Stream 2 natural gas pipeline, which many Members believe would increase European dependence on Russian gas. Some Members agree with the Administration that any new U.S.-EU trade talks must include agriculture. Members of Congress may wish to assess the extent to which the transatlantic relationship contributes to promoting U.S. strategic and economic interests, and the implications of the Administration's policies on the U.S.-European partnership in the short and long term. Deliberation may include the following potential issues: NATO. Congress may wish to examine the future of the alliance further. This could entail evaluating the current state of alliance cohesion, the extent of burdensharing within the alliance and how best to measure allied contributions, possible future threats facing NATO and whether NATO is equipped to manage such challenges, and NATO's costs and benefits for the United States. U.S.-EU Economic Relations. Based on its constitutional role over tariffs and foreign commerce, Congress has a direct interest in monitoring and shaping the proposed new U.S.-EU trade agreement negotiations, and it could consider implementing legislation for a potential final trade agreement under Trade Promotion Authority. Congress may be interested in the implications of Administration trade and tariff policies and the extent to which EU retaliatory tariffs and potential U.S. auto tariffs could affect U.S.-EU trade and investment ties. Members of Congress also may wish to consider the extent to which U.S.-EU cooperation on trade issues could help address issues of mutual concern, such as with respect to China's trading practices or the development of globally-relevant rules on trade. Future o f the EU . The EU is contending with numerous internal and external challenges. The EU also faces leadership changes, with a new European Parliament elected in May 2019 and a new European Commission and President of the European Council due to take office in late 2019. Congress may wish to examine whether and how such issues could affect the EU's future development and U.S.-EU cooperation. Brexit. Congress may wish to consider Brexit's implications for U.S.-UK and U.S.-EU relations, as well as for NATO and the Northern Ireland peace process. Congress may also examine possible options and prospects for a future U.S.-UK trade agreement following Brexit. Russia. Prospects for further U.S.-European cooperation on Russia, especially in the context of deliberations on imposing additional sanctions or employing other foreign policy tools to address concerns about Russia's activities, may be of interest to Congress. European vulnerabilities to hostile Russian measures and the degree to which Russia could benefit from transatlantic divisions may be issues for congressional oversight. China . Amid concerns on both sides of the Atlantic about China's growing global influence, Congress may wish to assess where U.S. and European policies converge and diverge with respect to China and possibilities for future U.S.-European cooperation in managing the rise of China.", "summary": "For the past 70 years, the United States has been instrumental in leading and promoting a strong U.S.-European partnership. Often termed the transatlantic relationship, this partnership has been grounded in the U.S.-led post-World War II order based on alliances with like-minded democratic countries and a shared U.S.-European commitment to free markets and an open international trading system. Transatlantic relations encompass the North Atlantic Treaty Organization (NATO), the European Union (EU), close U.S. bilateral ties with most countries in Western and Central Europe, and a massive, interdependent trade and investment partnership. Despite periodic U.S.-European tensions, successive U.S. Administrations and many Members of Congress have supported the broad transatlantic relationship, viewing it as enhancing U.S. security and stability and magnifying U.S. global influence and financial clout. Transatlantic Relations and the Trump Administration The transatlantic relationship currently faces significant challenges. President Trump and some members of his Administration have questioned the strategic value and utility of NATO to the United States, and they have expressed considerable skepticism about the fundamental worth of the EU and the multilateral trading system. President Trump repeatedly has voiced concern that the United States bears an undue share of the transatlantic security burden and that EU trade policies are unfair to U.S. workers and businesses. U.S.-European policy divisions have emerged on a wide range of regional and global issues, from certain aspects of relations with Russia and China, to policies on Iran, Syria, arms control, and climate change, among others. The United Kingdom's pending departure from the EU (\"Brexit\") also could have implications for U.S. security and economic interests in Europe. The Trump Administration asserts that its policies toward Europe seek to bolster the transatlantic relationship by ensuring that European allies and friends are equipped to work with the United States in confronting the challenges posed by an increasingly competitive world. Administration officials maintain that the U.S. commitment to NATO and European security remains steadfast; President Trump has backed new NATO initiatives to deter Russian aggression and increased U.S. troop deployments in Europe. The Administration also contends that it is committed to working with the EU to resolve trade and tariff disputes, as signaled by its intention to launch new U.S.-EU trade negotiations. Supporters credit President Trump's approach toward Europe with strengthening NATO and compelling the EU to address U.S. trade concerns. Critics argue that the Administration's policies are endangering decades of U.S.-European cooperation that have advanced key U.S. geostrategic and economic interests. Some analysts suggest that current U.S.-European divisions are detrimental to transatlantic cohesion and represent a win for potential adversaries such as Russia and China. Many European leaders worry about potential U.S. global disengagement, and some argue that Europe must be better prepared to address both regional and international challenges on its own. Congressional Interests The implications of Trump Administration policies toward Europe and the extent to which the transatlantic relationship contributes to promoting U.S. security and prosperity may be of interest to the 116th Congress. Broad bipartisan support exists in Congress for NATO, and many Members of Congress view the EU as an important U.S. partner, especially given extensive U.S.-EU trade and investment ties. At the same time, some Members have long advocated for greater European burdensharing in NATO, or may oppose European or EU policies on certain foreign policy or trade issues. Areas for potential congressional oversight include the future U.S. role in NATO, as well as prospects for U.S.-European cooperation on common challenges such as managing a resurgent Russia and an increasingly competitive China. Based on its constitutional role over tariffs and foreign commerce, Congress has a direct interest in monitoring proposed new U.S.-EU trade agreement negotiations. In addition, Congress may consider how the Administration's trade and tariff policies could affect the U.S.-EU economic relationship. Also see CRS Report R45652, Assessing NATO's Value, by Paul Belkin; CRS Report R44249, The European Union: Ongoing Challenges and Future Prospects, by Kristin Archick; and CRS In Focus IF11209, Proposed U.S.-EU Trade Agreement Negotiations, by Shayerah Ilias Akhtar, Andres B. Schwarzenberg, and Renée Johnson.", "document_type": "crs"}
{"report": "Since November 1986, the Commemorative Works Act (CWA) has provided the legal framework for the placement of commemorative works in the District of Columbia. The CWA was enacted to establish a statutory process for ensuring \"that future commemorative works in areas administered by the National Park Service (NPS) and the General Services Administration (GSA) in the District of Columbia and its environs (1) are appropriately designed, constructed, and located and (2) reflect a consensus of the lasting significance of the subjects involved.\" Areas administered by other agencies are not subject to the CWA. Responsibility for overseeing the design, construction, and maintenance of such works was delegated to the Secretary of the Interior or the Administrator of the GSA, the National Capital Planning Commission (NCPC), and the U.S. Commission of Fine Arts (CFA). Additionally, the CWA restricts placement of commemorative works to certain areas of the District of Columbia based on the subject's historic importance. Pursuant to the CWA, locating a commemorative work on federally owned and administered land in the District of Columbia requires the federal government to maintain the memorial unless otherwise stipulated in the enabling legislation. In some cases, however, authorized memorials are ultimately sited on land that falls outside of CWA jurisdiction and outside the boundaries of the District of Columbia and its environs. For example, the Air Force Memorial was authorized by Congress for placement on land owned and administered by either NPS or GSA in the District of Columbia. Memorial organizers, however, chose a site near the Pentagon in Arlington, VA, that is owned and administered by the Department of Defense. Consequently, the Department of Defense, not the NPS or GSA, is responsible for maintenance. This report highlights in-progress works and memorials with lapsed authorizations since the passage of the CWA in 1986. The report provides information—located within text boxes for easy reference—on the statute(s) authorizing the work; the sponsor organization; statutory legislative extensions, if any; and the memorial's location or proposed location, if known. A picture or rendering of each work is also included, when available. The CWA divides areas administered by the NPS and the GSA in the District of Columbia and its environs into three sections for the placement of memorials: the Reserve, Area I, and Area II. For each area, the standards for memorial placement are specified in law, and congressional approval of monument location is required. The Reserve was created in November 2003, by P.L. 108-126 , to prohibit the addition of future memorials in an area defined as \"the great cross-axis of the Mall, which generally extends from the United States Capitol to the Lincoln Memorial, and from the White House to the Jefferson Memorial .\" Under the act, this area is considered \"a substantially completed work of civic art. \" Within this area, \"to preserve the integrity of the Mall … the siting of new commemorative works is prohibited. \" Created as part of the original CWA in 1986, Area I is reserved for commemorative works of \"preeminent historical and lasting significance to the United States. \" Area I is roughly bounded by the West Front of the Capitol; Pennsylvania Avenue NW (between 1 st and 15 th Streets NW); Lafayette Square; 17 th Street NW (between H Street and Constitution Avenue); Constitution Avenue NW (between 17 th and 23 rd Streets); the John F. Kennedy Center for the Performing Arts waterfront area; Theodore Roosevelt Island; National Park Service land in Virginia surrounding the George Washington Memorial Parkway; the 14 th Street Bridge area; and Maryland Avenue SW, from Maine Avenue SW, to Independence Avenue SW, at the U.S. Botanic Garden. Also created as part of the original CWA statute, Area II is reserved for \"subjects of lasting historical significance to the American people. \" Area II encompasses all sections of the District of Columbia and its environs not part of the Reserve or Area I. Of the 37 commemorative works authorized for placement in the District of Columbia since 1986, 19 (51%) have been completed and dedicated, 12 (32%) are in progress, and 6 (16%) have lapsed authorizations. Several factors may affect a memorial foundation's ability to complete a memorial. These include settling on a desired site location, getting design approval, and raising the funds necessary to design and build a commemorative work. Choosing a memorial site location is one of the biggest tasks for all authorized sponsor groups. Many groups want locations on or near the National Mall. The creation of the Reserve in 2003, however, makes placement of a future memorial on the National Mall difficult. Subsequently, many sponsor groups attempt to locate sites as close to the National Mall as possible in order to ensure that visitors have easy access to the memorial. For example, the Dwight D. Eisenhower Memorial is to be located on land directly south of the Smithsonian National Air and Space Museum, thus providing a prominent—just off the Mall—location. Likewise, the foundation previously authorized to construct a memorial to honor John Adams and his family's legacy evaluated site locations as close to the National Mall as possible. In 1986, as part of the CWA, Congress authorized the NCPC and the CFA to approve memorial designs. The NCPC and the CFA were tasked with carrying out the goals of the CWA, which are (1) to preserve the integrity of the comprehensive design of the L'Enfant and McMillan plans for the Nation's Capital; (2) to ensure the continued public use and enjoyment of open space in the District of Columbia and its environs, and to encourage the location of commemorative works within the urban fabric of the District of Columbia; (3) to preserve, protect, and maintain the limited amount of open space available to residents of, and visitors to, the Nation's Capital; and (4) to ensure that future commemorative works in areas administered by the National Park Service and the Administrator of General Services in the District of Columbia and its environs are … appropriately designed, constructed, and located; and … reflect a consensus of lasting national significance of the subjects involved. In some instances, sponsor groups have difficulty creating a memorial vision that meets the specifications of the NCPC, CFA, and the National Capital Memorial Advisory Commission (NCMAC). In these cases, groups will often have to present multiple designs to these bodies before getting final design approval. For example, the Eisenhower Memorial Commission has presented variations on the design for the Eisenhower Memorial to the NCPC multiple times. In all instances, the NCPC gave feedback to the memorial design team and asked them to continue work to comply with NCPC guidelines for memorial construction. Perhaps the most challenging step in the commemorative works process for many sponsor groups is raising the necessary funds to design and build a commemorative work. Although most sponsor groups do not anticipate fundraising difficulties, some groups have experienced challenges. Failure to raise the necessary funds can be used as a reason not to extend a memorial's authorization beyond the initial seven-year period. In some cases, even though the CWA generally prohibits the use of federal funds for memorial design and construction, Congress has authorized appropriations to aid sponsor groups in their fundraising efforts. For example, in 2005, Congress appropriated $10 million to the Secretary of the Interior \"for necessary expenses for the Memorial to Martin Luther King, Jr.\" The appropriation was designated as matching funds, making them available only after being matched by nonfederal contributions. Since the enactment of the Commemorative Works Act in 1986, 37 memorials and monuments have been authorized by statute. On a yearly basis, however, legislation is pending before Congress to consider a wide range of additional commemorative works. Pursuant to the CWA, future commemorative works will continue to be considered according to congressional guidelines. If new commemorative works are authorized or currently authorized commemorative works are completed, this report will be updated accordingly. Since the passage of the Commemorative Works Act (CWA) in 1986, Congress has authorized 37 commemorative works to be placed in the District of Columbia or its environs; 32 of these have been sited on land governed by the CWA. Of these works, 12 are in progress and 6 have lapsed authorizations. Table 1 lists commemorative works authorized by Congress since 1986 that are in progress or whose authorization has lapsed. Currently, 12 commemorative works are in various stages of development. These include the following: In-Progress Memorials Dwight D. Eisenhower Memorial; Memorials Being Designed Slaves and Free Black Persons Who Served in the Revolutionary War Memorial; Memorials Being Planned with a Site Location World War II Prayer plaque, World War I Memorial, Korean War Memorial Wall of Remembrance, Second Division Memorial modifications, Desert Storm and Desert Shield Memorial, and Peace Corps Memorial; Memorials Being Planned and Evaluating Site Locations Gold Star Mothers Memorial, John Adams and his Family's Legacy Memorial, Global War on Terrorism Memorial, and Emergency Medical Services Memorial. Currently, one memorial authorized pursuant to the CWA is under construction—the Dwight D. Eisenhower Memorial, which broke ground on November 2, 2017. The most recently dedicated memorial was the Victims of the Ukrainian Manmade Famine of 1932-1933 Memorial. In October 1999, Congress created a federal commission to \"consider and formulate plans for ... a permanent memorial to Dwight D. Eisenhower, including its nature, design, construction, and location.\" In January 2002, Congress amended the initial statute to formally authorize the commission to create a memorial. In remarks during debate on additional amendments to the commission's statute in 2007, Representative Dennis Moore summarized Eisenhower's life and contributions to the United States: I am particularly proud to claim one of the greatest 20 th -century Americans as a fellow Kansan. He ranks as one of the preeminent figures in the global history of the 20 th century. Dwight Eisenhower spent his entire life in public service. His most well-known contributions include serving as Supreme Commander of the Allied Expeditionary Forces in World War II and as 34 th President of the United States, but Eisenhower also served as the first commander of NATO and as President of Columbia University. Dramatic changes occurred in America during his lifetime, many of which he participated in and influenced through his extraordinary leadership as President. Although Ike grew up before automobiles existed, he created the Interstate Highway System and took America into space. He created NASA, the Department of Health, Education, and Welfare, and the Federal Aviation Administration. He added Hawaii and Alaska to the United States and ended the Korean War. President Eisenhower desegregated the District of Columbia and sent federal troops into Little Rock, Arkansas, to enforce school integration. He defused international crises and inaugurated the national security policies that guided the nation for the next three decades, leading to the peaceful end of the Cold War. A career soldier, Eisenhower championed peace, freedom, justice and security, and as President he stressed the interdependence of those goals. He spent a lifetime fulfilling his duty to his country, always remembering to ask what's best for America. The memorial is to be located at Maryland Avenue and Independence Avenue, SW, between the National Air and Space Museum and the Lyndon B. Johnson Department of Education building. It is designed by architect Frank Gehry. On September 20, 2017, the CFA reviewed and approved the final design for the Eisenhower Memorial. On October 5, 2017, NCPC also approved the final memorial design. On November 2, 2017, a groundbreaking ceremony was held for the memorial. Figure 1 shows the final design for the Dwight D. Eisenhower Memorial as approved by NCPC and CFA. The Eisenhower Memorial is currently under construction. In June 2014, Congress authorized the placement of a plaque containing President Franklin D. Roosevelt's D-Day prayer at the \"area of the World War II Memorial in the District of Columbia.... \" During debate on the bill in the 112 th Congress ( H.R. 2070 ), Representative Bill Johnson summarized why he believed the prayer should be added to the World War II Memorial. This legislation directs the Secretary of the Interior to install at the World War II Memorial a suitable plaque or an inscription with the words that President Franklin Roosevelt prayed with the Nation on the morning of the D-day invasion. This prayer, which has been entitled \"Let Our Hearts Be Stout,'' gave solace, comfort and strength to our Nation and our brave warriors as we fought against tyranny and oppression. The memorial was built to honor the 16 million who served in the Armed Forces of the United States during World War II and the more than 400,000 who died during the war ... I have no doubt that the prayer should be included among the tributes to the Greatest Generation memorialized on the National Mall, and I strongly urge all of my colleagues to support this legislation. The prayer plaque is to be located at the \"Circle of Remembrance\" on the northwest side of the World War II Memorial. The NCPC and the CFA both favor an \"asymmetrical\" design for the prayer plaque. Figure 2 shows the proposed location of the plaque at the Circle of Remembrance. In December 2012, as part of the National Defense Authorization Act for Fiscal Year 2013, Congress authorized the National Mall Liberty Fund DC to establish a commemorative work \"to honor the more than 5,000 courageous slaves and free Black persons who served as soldiers and sailors or provided civilian assistance during the American Revolution.\" Additionally, P.L. 112-239 repealed a 1986 authorization to the Black Revolutionary War Patriots Foundation to establish a commemorative work for black Revolutionary War veterans. In remarks introducing the 1986 legislation, Representative Mary Rose Oakar summarized the need, from her perspective, for a memorial to black Revolutionary War veterans: Mr. Speaker, as early as 1652 blacks were fighting as members of the Militia in Colonial America, thus beginning their history of achievement and heroism for our country. Yet, history books in American schools have for the most part omitted the contributions of black soldiers since the Revolutionary War, to our most recent conflict in Vietnam. This memorial to these black Americans is a small tribute to their bravery and valor, an important part of the founding of our country. Following its initial authorization in 1986, Congress approved the memorial's location in Area I on land that became part of the Reserve in 2003. Following the site designation, the memorial was reauthorized three times. Pursuant to P.L. 106-442 , the Black Revolutionary War Patriots Foundation's authorization for the memorial expired in 2005. In the Senate report accompanying the 2012 authorization ( S. 883 , 112 th Congress), the Senate Committee on Energy and Natural Resources summarized the importance of reauthorizing the memorial with a new sponsor. In 1986, Congress authorized the Black Revolutionary War Patriots Memorial Foundation to establish the Black Revolutionary War Patriots Memorial to honor the 5,000 courageous slaves and free Black persons who served as soldiers or provided civilian assistance during the American Revolution ( P.L. 99-558 ). In 1987 Congress enacted a second law, P.L. 100-265 , authorizing placement of that memorial within the monumental core area as it was then defined by the Commemorative Works Act. In 1988, the National Park Service, the Commission of Fine Arts, and the National Capital Planning Commission approved a site in Constitution Gardens for the Black Revolutionary War Patriots Memorial and, in 1996, approved the final design. Despite four extensions of the memorial's legislative authorization over 21 years, the Foundation was unable to raise sufficient funds for construction, the authority (and associated site and design approvals) finally lapsed in October 2005, and the Foundation disbanded with numerous outstanding debts and unpaid creditors. S. 883 would authorize another nonprofit organization, the National Mall Liberty Fund D.C., to construct a commemorative work honoring the same individuals as proposed by the Black Revolutionary War Patriots Memorial Foundation, subject to the requirements of the Commemorative Works Act. On September 26, 2014, President Obama signed H.J.Res. 120 to provide the memorial with a location in Area I. The sponsor group publicly expressed interest in three sites: the National Mall at 14 th Street and Independence Avenue, NW; Freedom Plaza; and Virginia Avenue and 19 th Streets, NW, with a strong preference for the National Mall site, which is currently under the jurisdiction of the U.S. Department of Agriculture. In the 114 th Congress (2015-2016), legislation was introduced to designate the Secretary of Agriculture as the officer \"responsible for the consideration of the site and design proposals and the submission of such proposals on behalf of the sponsor to the Commission of Fine Arts and the National Capital Planning Commission\" in order to apply the CWA to the memorial. No further action was taken on the measure. Figure 3 shows a memorial concept design. In December 2014, as part of the FY2015 National Defense Authorization Act, Congress re-designated Pershing Park in the District of Columbia as \"a World War I Memorial,\" and authorized the World War I Centennial Commission to \"enhance the General Pershing Commemorative Work by constructing ... appropriate sculptural and other commemorative elements, including landscaping, to further honor the service of members of the United States Armed Forces in World War I.\" Pershing Park is located between E Street and Pennsylvania Avenue and 14 th and 15 th Streets, NW. Currently, the park contains a statue of General John J. Pershing. On January 26, 2016, the World War I Centennial Commission announced the winner of its design competition. Titled \"The Weight of Sacrifice,\" the winning design envisions an \"allegorical idea that public space and public freedom are hard won through the great sacrifices of countless individuals in the pursuit of liberty.\" On February 7, 2019, the commission presented the latest version of its design to the NCPC, and on May 16, 2019, to the CFA. Previously, a ceremonial groundbreaking for the memorial was held on November 9, 2017. Figure 4 shows a revised concept design for the World War I Memorial. In October 2016, Congress authorized a wall of remembrance, which \"shall include a list of names of members of the Armed Forces of the United States who died in the Korean War\" to be added to the Korean War Memorial in the District of Columbia. The wall of remembrance is to be located \"at the site of the Korean War Veterans Memorial.\" During debate on the bill ( H.R. 1475 , 114 th Congress) in the House, Representative Sam Johnson summarized why he believed it was important to add a wall of remembrance to the Korean War Veterans Memorial. My fellow Korean war veterans and I believe that the magnitude of this enormous sacrifice is not yet fully conveyed by the memorial in Washington, DC.... Similar to the Vietnam Veterans Memorial Wall, the Korean War Veterans Memorial Wall of Remembrance would eternally honor the brave Americans who gave their lives in defense of freedom during the Korean War. It would list their names as a visual record of their sacrifice. Figure 5 shows the concept design for the Korean War Memorial Wall of Remembrance. On March 23, 2018, as part of the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ), modifications to the Second Division Memorial were authorized. The Second Division Memorial was initially dedicated on July 18, 1936, to commemorate the division's World War I casualties, and \"two wings were dedicated on June 20, 1962, with significant battles of World War II inscribed on the west and of the Korean War on the east.\" P.L. 115-141 authorizes the placement of \"additional commemorative elements or engravings on the raised platform or stone work of the existing Second Division Memorial ... to further honor the members of the Second Infantry Division who have given their lives in service to the United States.\" Figure 6 shows the current design of the Second Division Memorial. In December 2014, as part of the FY2015 National Defense Authorization Act, Congress authorized the National Desert Storm Memorial Association to establish a National Desert Storm and Desert Shield Memorial in the District of Columbia to \"commemorate and honor those who, as a member of the Armed forces, served on active duty in support of Operation Desert Storm or Operation Desert Shield.\" During debate on the House version of the bill ( H.R. 503 ), Representative Doc Hastings, chair of the House Natural Resources Committee, summarized the need for a memorial: Over 600,000 American servicemen deployed for Operations Desert Storm and Desert Shield and successfully led a coalition of over 30 countries to evict an invading army to secure the independence of Kuwait. This memorial will recognize their success, but it will also serve as a commemoration of those nearly 300 Americans who made the ultimate sacrifice on our behalf. On March 31, 2017, President Trump signed S.J.Res. 1 to provide the memorial with a location in Area I. The memorial will be located at the southwest corner of Constitution Avenue, NW, and 23 rd Street, NW. Figure 7 shows a rendering for the National Desert Storm Veteran's War Memorial. In January 2014, Congress authorized the Peace Corps Memorial Foundation to establish a commemorative work in the District of Columbia to \"commemorate the mission of the Peace Corps and the ideals on which the Peace Corps was founded.\" During House debate on the bill ( S. 230 ), Representative Raúl Grijalva, ranking member of the House Natural Resources Committee, Subcommittee on Public Lands and Environmental Regulations, summarized his understanding of the aims of the Peace Corps Memorial: Last November, we marked the 50 th anniversary of President Kennedy's tragic assassination. Losing President Kennedy left a lasting scar on the American psyche, but his legacy lives on through his words and ideas, including the establishment of the Peace Corps, an institution that has sent over 200,000 Americans to 139 countries in its 52-year history. S. 230 authorizes construction of a memorial to commemorate the mission of the Peace Corps and the values on which it was founded. I cannot think of a better way to celebrate President Kennedy's legacy and the tremendous accomplishments of the Peace Corps. With the passage of S. 230 , we will be sending a worthwhile bill to the President's desk. I am glad we have been able to put our differences aside and pass such a meaningful bill in the first few weeks of the new year. To be located between 1 st Street, NW, Louisiana Avenue, NW, and C Street, NW, in the District of Columbia, the Peace Corps Memorial Foundation presented its design concept to the CFA and NCPC in early 2019. In March 2019, the CFA approved the memorial's concept design with comments to be addressed as the design moves forward toward a final design. In May 2019, the NCPC stated \"that the proposed concept design does not adequately embrace the site's strengths or adequately respond to these challenges, particularly as they relate to visual resources, visitor use and experience, or natural resources.\" Figure 8 shows the concept design for the Peace Corps Memorial as presented to CFA and NCPC. In November 2001, Congress authorized the Adams Memorial Foundation to \"establish a commemorative work on Federal land in the District of Columbia and its environs to honor former President John Adams, along with his wife Abigail Adams and former President John Quincy Adams, and the family's legacy of public service.\" In remarks during debate on the bill ( H.R. 1668 , 107 th Congress), Representative Joel Hefley summarized the importance of the Adams family to American history: Perhaps no American family has contributed as profoundly to public service as the family that gave the Nation its second President, John Adams; his wife, Abigail Adams; and their son, our sixth President, John Quincy Adams, who was also, by the way, a member of this body. The family's legacy was far reaching, continuing with John Quincy Adams's son, Charles Francis Adams, who was also a member of this body and an ambassador to England during the Civil War; and his son, Henry Adams, an eminent writer and scholar, and it goes on and on. In March 2019, as part of the enactment of the John D. Dingell, Jr. Conservation, Management, and Recreation Act, Congress created the Adams Memorial Commission. The Adams Memorial Commission replaces the Adams Memorial Foundation as the memorial's sponsor. Moving forward, the commission will be responsible for all aspects of the memorial's siting, design, and construction. Previously, in December 2013, the Adams Memorial Foundation's authorization expired. Prior to its lapse of authorization, the Adams Memorial Foundation was working with the NCMAC on the potential recommendation of Area I. While the commission had not endorsed any particular site location, it had recommended that the foundation continue its examination of numerous sites in the District of Columbia in order to find a suitable location. In December 2012, as part of the National Defense Authorization Act for Fiscal Year 2013, Congress authorized the Gold Star Mothers National Monument Foundation to establish a commemorative work to \"commemorate the sacrifices made by mothers, and made by their sons and daughters who as members of the Armed Forces make the ultimate sacrifice, in defense of the United States.\" In testimony before the House Committee on Natural Resources Subcommittee on National Parks, Forests, and Public Lands, the legislation's ( H.R. 1980 ) sponsor, Representative Jon Runyan, explained why he thought a memorial to Gold Star Mothers was needed: During World War I, mothers of sons and daughters who served in the Armed Forces displayed flags bearing a blue star to represent pride in their sons or daughters and their hope that they would return home safely. For more than 650,000 of these brave mothers, that hope was shattered, and their children never returned home. Afterwards many of them began displaying flags bearing gold stars to represent the sacrifice that their sons and daughters made in heroic service to our country. Over the years the gold star has come to represent a child who was killed while serving in the Armed Forces, during either war or peacetime. In December 2013, the Gold Star Mothers National Monument Foundation presented its site analysis to the National Capital Memorial Advisory Commission. In that informational presentation, they expressed a preference for a site location adjacent to Arlington National Cemetery. In January 2015, the NCPC expressed support for a site next to the Arlington National Cemetery Visitor's Center on Memorial Drive, and the CFA approved that site location. Figure 9 shows the Gold Star Mothers National Monument Foundation's concept design. In August 2017, Congress authorized the Global War on Terrorism Memorial Foundation to establish a commemorative work in the District of Columbia to \"commemorative and honor the members of the Armed Forces that served on active duty in support of the Global War on Terrorism.\" During debate on the bill ( H.R. 873 ) in the House, Representative Tom McClintock, chair of the Federal Lands Subcommittee of the House Committee on Natural Resources, stated why a memorial to the Global War on Terrorism is important, despite a statutory prohibition against war memorials for ongoing conflicts. The Commemorative Works Act requires that a war be ended for at least 10 years before planning can commence on a national memorial. There is good reason for this requirement: it gives history the insight to place the war in an historic context and to begin to fully appreciate its full significance to our country and future generations. But the war on terrorism has been fought in a decidedly different way than our past wars. We are now approaching the 16 th anniversary of the attack on New York and Washington. The veterans who sacrificed so much to keep that war away from our shores deserve some tangible and lasting tribute to their patriotism and altruism while they, their families, and their fellow countrymen can know it. The Gold Star families of our fallen heroes for whom the war will never end deserve some assurance that their sons and daughters will never be forgotten by a grateful Nation. We should remember that many of our Nation's heroes from World War II never lived to see the completion of the World War II Memorial, which was completed 59 years after the end of that conflict. For these reasons, this measure suspends the 10-year period in current law. It doesn't repeal it. It merely sets it aside for the unique circumstances of the current war on terrorism. In October 2018, Congress authorized the National Emergency Medical Services Memorial Foundation to establish a commemorative work in the District of Columbia to \"commemorate the commitment and service represented by emergency medical services.\" During House debate on the bill ( H.R. 1037 ), Representative Tom McClintock, chair of the Federal Lands Subcommittee of the House Committee on Natural Resources, stated why he considered a memorial to the emergency medical services providers to be important: Mr. Speaker, each year 850,000 EMS providers answer more than 30 million calls to serve 22 million patients in need at a moment's notice and without reservation. For these heroes who serve on the front lines of medicine, sacrifice is a part of their calling. EMTs and paramedics have a rate of injury that is about three times the national average for all occupations, and some pay the ultimate price in the service of helping others. The men and women of the emergency medical services profession face danger every day to save lives and help their neighbors in crisis. They respond to incidents ranging from a single person's medical emergency to natural and manmade disasters, including terrorist attacks. But while their first responder peers in law enforcement and firefighting have been honored with national memorials, EMS providers have not. Since 1986, six commemorative works authorized by Congress were not completed in the time allowed by the Commemorative Works Act and were not granted subsequent extensions by Congress. These memorials were to be constructed to honor Thomas Paine, Benjamin Banneker, Frederick Douglass, Brigadier General Francis Marion, to create a National Peace Garden, and to build a Vietnam Veterans Visitor Center. The following section describes the initial authorization for each of these memorials and congressional extensions of memorial authorization, if appropriate. In June 1987, Congress authorized the Director of the National Park Service to enter into an agreement with the Peace Garden Project to \"construct a garden to be known as the 'Peace Garden' on a site on Federal land in the District of Columbia to honor the commitment of the people of the United States to world peace.\" In remarks during debate on the bill ( H.R. 191 , 100 th Congress), Representative Steny Hoyer summarized the need for a memorial to peace: No one or nation can ever doubt the commitment of the American people to protecting our freedoms when threatened by foreign aggressors. Our Nation's Capital rightfully honors our heroic defenders of freedom—Americans who served their country courageously, gallantly, and at great risk to their lives. Our citizens have also exhibited an equal commitment for world peace and international law and justice. The creation of a Peace Garden is an appropriate symbol of our efforts to continuing to seek peaceful resolution of world conflict and the institution of the rule of law. Certainly, this century has been one of bloodiest and most violent in man's history. We have seen countless battles, wars, rebellions, massacres, and civil and international strife of all kinds—continuing examples of man's inhumanity toward his fellow man. At the same time, against this terrible backdrop, there have been encouraging strides toward world peace. As we honor those who have made sacrifices in war, through monuments, so, too, should we honor them by striving to ensure that the world they have left us will be a peaceful one. A garden would be a living monument to our efforts. In 1988, a site was approved for the Peace Garden at Hains Point in Southwest Washington, DC. Since its initial authorization in 1987, the National Peace Garden was reauthorized twice. The authorization expired on June 30, 2002. In October 1992, Congress authorized the Thomas Paine National Historical Association to establish a memorial to honor Revolutionary War patriot Thomas Paine. In remarks summarizing the need for a memorial to Thomas Paine, Representative William Lacy Clay stated: Thomas Paine's writings were a catalyst of the American Revolution. His insistence upon the right to resist arbitrary rule has inspired oppressed peoples worldwide, just as it continues to inspire us. It is time that a grateful nation gives him a permanent place of honor in the capital of the country he helped build. Since its initial authorization in 1992, the authorization for the Thomas Paine memorial was extended once. Authorization for the memorial expired on December 31, 2003. In November 1998, Congress authorized the Washington Interdependence Council of the District of Columbia to establish a memorial to \"honor and commemorate the accomplishments of Mr. Benjamin Banneker.\" Adopted as part of a larger bill to create a national heritage area in Michigan, the authorization for the Benjamin Banneker Memorial passed the House and Senate without debate and by voice vote in October. In 2001, the National Park Service reported that the memorial was to be sited on the L'Enfant Promenade in Southwest Washington and be under the jurisdiction of the District of Columbia. Since its initial authorization, the Washington Interdependence Council has not been granted an extension to its original authorization, which expired in 2005. A bill ( S. 3886 ) was introduced in the 111 th Congress (2009-2010) to reauthorize a Benjamin Banneker Memorial. S. 3886 was referred to the Senate Committee on Energy and Natural Resources, but no further action was taken. In November 2000, Congress authorized the Frederick Douglass Gardens, Inc., \"to establish a memorial and gardens on lands under the administrative jurisdiction of the Secretary of the Interior in the District of Columbia or its environs in honor and commemoration of Frederick Douglass.\" During debate, Representative James Hansen provided a summary of why a memorial to Frederick Douglass was important: Mr. Speaker, Frederick Douglass was one of the most prominent leaders of the 19 th century abolitionist movement. Born into slavery in eastern Maryland in 1818, Douglass escaped to the North as a young man where he became a world-renowned defender of human rights and eloquent orator, and later a Federal ambassador and advisor to several Presidents. Frederick Douglass was a powerful voice for human rights during the important period of American history, and is still revered today for his contributions against racial injustice. Early in 2001, the Frederick Douglass Memorial Gardens, Inc., expressed its preference for a site location near the Douglass Memorial Bridge in Southeast Washington, but no further action was taken by Congress to approve the site location. The Frederick Douglass Memorial's authorization expired in 2008. One attempt was made to reauthorize a Frederick Douglass Memorial during the 110 th Congress (2007-2008), but the bill was not reported by the House Committee on Natural Resources. In May 2008, Congress authorized the Marion Park Project to establish a commemorative work to honor Brigadier General Francis Marion. In testimony before the Senate Committee on Energy and Natural Resources, Subcommittee on National Parks, Daniel N. Wenk, deputy director for operations, National Park Service, supported the enactment of legislation authorizing a Brigadier General Francis Marion Memorial and explained why such a memorial meets criteria for commemoration in the District of Columbia. Brigadier General Francis Marion commanded the Williamsburg Militia Revolutionary force in South Carolina and was instrumental in delaying the advance of British forces by leading his troops in disrupting supply lines. He is credited for inventing and applying innovative battle tactics in this effort, keys to an ultimate victory for the American Colonies in the Revolutionary War. Additionally Brigadier General Marion's troops are believed to have been the first racially integrated force fighting for the United States. The Marion Park Project identified its preferred site location for the memorial at Marion Park in southeast Washington, DC. In December 2014, the National Capital Planning Commission expressed its support for the Marion Park site. Since its initial authorization, the Marion Memorial was reauthorized once. Authorization for the memorial expired on May 8, 2018. In November 2003, Congress authorized the Vietnam Veterans Memorial Fund to create a visitor center at the Vietnam Veterans Memorial to \"better inform and educate the public about the Vietnam Veterans Memorial and the Vietnam War.\" In the House report accompanying the legislation ( H.R. 1442 , 108 th Congress), the Committee on Resources summarized the need for a visitor center at the Vietnam Veterans Memorial: Since its dedication in 1982, the Vietnam Veterans Memorial, known to many as simply \"The Wall,\" has done much to heal the nation's wounds after the bitterly divisive experience of the Vietnam War. For those who served, that year marked a sea change in the country's view of the Vietnam veteran. Americans began to understand and respect the Vietnam veterans' service and sacrifice. Today, over 4.4 million people visit The Wall every year—making it the most visited Memorial in the Nation's Capital. Today, most visitors to The Wall were not alive during the \"Vietnam Era.\" Many veterans' organizations and many others believe today's visitor is shortchanged in his/her experience. Many leave The Wall not fully understanding its message. To that end, a visitor center would provide an educational experience for visitors by facilitating self-guided tours, collecting and displaying remembrances of those whose names are inscribed on the Memorial, and displaying exhibits discussing the history of the Memorial and the Vietnam War. The visitor's center would eventually replace a 168-foot National Park Service kiosk currently at the site. The visitor center was to be constructed underground and located across the street from the Vietnam Veterans Memorial and the Lincoln Memorial. In 2015, the NCPC and CFA approved the visitor center's design. On September 21, 2018, the Vietnam Veterans Memorial Fund announced their intenti on not to seek an extension to its authorization to build the visitor center, which expired on November 17, 2018. At that time, legislation had been introduced, but not considered, to extend the fund's authorization into 2022. Previously, the fund had received two statutory extensions. ", "summary": "Under the Commemorative Works Act (CWA) of 1986, Congress may authorize commemorative works to be placed in the District of Columbia or its environs. Once a commemorative work has been authorized, Congress continues to be responsible for statutorily designating a memorial site location. This report provides a status update on 12 in-progress memorials and 6 memorials with lapsed authorizations. For each monument or memorial, the report provides a rationale for the work as expressed in the Congressional Record or a House or Senate committee report; its statutory authority; the group or groups sponsoring the commemoration; and the memorial's location (or proposed location), if known. A picture or rendering of each work is also included, when available. For more information on the Commemorative Works Act, see CRS Report R41658, Commemorative Works in the District of Columbia: Background and Practice, by Jacob R. Straus; CRS Report R43241, Monuments and Memorials in the District of Columbia: Analysis and Options for Proposed Exemptions to the Commemorative Works Act, by Jacob R. Straus; and CRS Report R43743, Monuments and Memorials Authorized and Completed Under the Commemorative Works Act in the District of Columbia, by Jacob R. Straus.", "document_type": "crs"}
{"report": "S ince the U.S. Small Business Administration's (SBA's) creation in 1953, the SBA Disaster Loan Program has provided low-interest disaster loans to businesses to help them repair, rebuild, and recover from federally declared disasters. SBA business disaster loans fall into two categories: (1) Economic Injury Disaster Loans (EIDL), and (2) business physical disaster loans. EIDLs provide up to $2 million for working capital to help small businesses meet financial obligations and operating expenses that could have been met had the disaster not occurred. Loan amounts for EIDLs are based on actual economic injury and financial needs, regardless of whether the business suffered any property damage. Business physical disaster loans provide up to $2 million to businesses of all sizes to repair or replace damaged physical property, including machinery, equipment, fixtures, inventory, and leasehold improvements that are not covered by insurance. In addition to repairing and replacing damaged physical property, a portion of the loans can also be applied toward mitigation measures, including grading or contouring land, installing sewer backflow valves, relocating or elevating utilities or mechanical equipment, building retaining walls, and building safe rooms or similar structures designed to protect occupants from natural disasters. The limits on post-disaster mitigation loans are the lesser of either the measure or 20% of the verified loss. An important aspect of the SBA Disaster Loan Program is that a business must already be damaged and be located in a federally declared disaster area to apply a portion of its disaster loan toward mitigation measures. As will be discussed in this report, Congress experimented with business pre-disaster mitigation (PDM) through a pilot program operated by the SBA from FY2000 to FY2006. Providing mitigation assistance to businesses after a disaster is arguably consistent with the mitigation policies of other federal programs. For example, the Federal Emergency Management Agency (FEMA) provides both pre-disaster and post-disaster mitigation grants to states and localities, but post-disaster mitigation grants are substantially larger than pre-disaster grants. For example, from FY2014 to FY2018, $3.35 billion was spent on post-disaster mitigation grants through FEMA's Hazard Mitigation Grant Program (HMGP) and Fire Management Assistance Grants (FMAGs). In contrast, during the same period, $430 million was spent on FEMA's Pre-Disaster Mitigation (PDM) program (see Figure 1 ). Figure 1. FEMA Pre-Disaster Mitigation Funding and Post-Disaster MitigationÂ FundingFY2014-FY2018Source: Data obtained from FEMA, Data Feeds, https://www.fema.gov/data-feeds. Notes: PDM denotes FEMA's Pre-Disaster Mitigation Program. HMGP denotes FEMA's Hazard Mitigation Grant Program. FMA denotes fire management assistance provided by FEMA's Fire Management Assistance Grants. Funding for pre-disaster mitigation, however, may increase with the enactment of the Disaster Recovery Reform Act of 2018 (DRRA, Division D of P.L. 115-254 ). Section 1234 of DRRA authorized the National Public Infrastructure Pre-Disaster Mitigation Fund (NPIPDM), which allows the President to set aside 6% from the Disaster Relief F und (DRF) with respect to each declared major disaster under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act, P.L. 93-288 , as amended; 42 U.S.C. Â§Â§5121 et seq.). This 6% \"set aside\" is the aggregate amount funded by the following sections of the Stafford Act: 403 (essential assistance); 406 (repair, restoration, and replacement of damaged facilities); 407 (debris removal); 408 (federal assistance to individuals and households); 410 (unemployment assistance); 416 (crisis counseling assistance and training); and 428 (public assistance program alternative procedures). Although post-disaster and pre-disaster mitigation are not mutually exclusive, there are reasons why one may be favored over the other. The following section provides the underlying rationale for the two approaches to mitigation. Over the years, scholars, researchers, and policymakers have debated whether mitigation is more effective before or after an incident. The following sections list the rationales for each approach. The underlying rationales for providing post-disaster mitigation include incidents such as floods and hurricanes are known to recur in the same areas. Post-disaster mitigation targets those areas to protect them from future disasters; post-disaster mitigation helps ensure that the opportunity to take mitigation measures to reduce the loss of life and property from disasters is not lost during the reconstruction process following a disaster; the recovery phase of an incident may be the most ideal time to introduce new structural changes because damaged structures are already in the process of being replaced and rebuilt; post-disaster mitigation can be used to support a \"build back better\" approach to avoid or reduce future disaster damages; providing mitigation funding after an incident is programmatically easier to administer because the grants are concomitant with a federally declared incident. In contrast, pre-disaster projects have generally been awarded on a competitive basisâeach application must be scrutinized and prioritized over other applications; and policymakers may find it difficult to justify or defend expenditures for incidents that may not occur for long periods of time (or never occur). This may be particularly true during periods of heightened concern over the federal budget. Others may argue that mitigation is more effective when implemented before rather than after an incident. The rationales for pre-disaster mitigation include post-disaster mitigation may fail to address vulnerable areas that have not had a major disaster declaration; and studies indicate that mitigation can significantly reduce recovery costs. For example, a study published by the National Institute of Building Sciences found that for every $1 that FEMA spent on mitigation grants, there is a $6 dollar return of avoided losses in the future. Those savings, however, cannot be calculated until there are subsequent disasters. Based on findings similar to the one issued by the National Institute of Building Sciences, Congress in 1999 passed P.L. 106-24 which amended the Small Business Act to include a Pre-Disaster Mitigation (PDM) pilot program. The program authorized SBA to make low-interest (4% or less) fixed-rate loans of no more than $50,000 per year to small businesses to implement mitigation measures designed to protect small businesses from future disaster-related damage. Section 1(a) of P.L. 106-24 authorized the SBA during fiscal years 2000 through 2004, to establish a predisaster mitigation program to make such loans (either directly or in cooperation with banks or other lending institutions through agreements to participate on an immediate or deferred (guaranteed) basis), as the Administrator may determine to be necessary or appropriate, to enable small businesses to use mitigation techniques in support of a formal mitigation program established by the Federal Emergency Management Agency, except that no loan or guarantee may be extended to a small business under this subparagraph unless the Administration finds that the small business is otherwise unable to obtain credit for the purposes described in this subparagraph. The SBA PDM pilot program was developed in support of \"Project Impact,\" a new FEMA mitigation program that emphasized disaster prevention rather than solely relying on response and recovery activities. Similarly, SBA PDM loans were intended to lessen or prevent future damages to businesses. According to the House report on H.R. 818 (the companion bill to S. 388 , which became P.L. 106-24 ) The cost of disaster assistance has risen over the past several years due to increases in construction and other costs. By implementing a program to help small businesses use techniques that would lessen damage in the event of natural disasters the possibility exists to save millions of dollars in potential losses. The report also stated that the Administrator of the Small Business Administration, testified concerning the SBA's request for $934 million dollars in disaster loans for anticipated damage in the coming year. She also discussed FEMA and SBA's current efforts at mitigation and stated that FEMA estimates a $2 saving for every $1 spent on mitigation. The Administrator expressed strong support for H.R. 818 . Section 1(c) of P.L. 106-24 required the SBA Administrator to submit a report to Congress on the effectiveness of the pilot program. The report required information and analysis on the areas served under the pilot program; the number and dollar value of loans made under the pilot program; the estimated savings to the federal government resulting from the pilot program; and other relevant information as the Administrator determines to be appropriate for evaluating the pilot program. Congress initially authorized appropriations of $15 million each fiscal year to carry out the PDM pilot program for FY2000 through FY2004. Congress later extended the program until the end of FY2006 and authorized an additional $15 million for the program in FY2005 and $15 million in FY2006. Since its expiration at the end of FY2006, many Members have discussed the possibility of reauthorizing the PDM pilot program. According to SBA, four loans were approved during the SBA PDM pilot program, with a total gross approval amount of $101,400 (a small fraction compared to the $105 million Congress authorized to be appropriated to the program over the seven-year period of its existence). Two of the loans defaulted and the other two loans (amounting to $52,400) were repaid in full. As mentioned previously, Section 1(c) of P.L. 106-24 required the SBA Administrator to submit a report to Congress on the effectiveness of the pilot program, including the areas served and dollar amounts provided under the program, estimated savings resulting from the SBA PDM pilot program, and other relevant information. A CRS search of databases could not locate the required report on the effectiveness of the pilot program and the SBA could not verify whether the report was ever submitted. The following sections describe the possible reasons for the lack of participation in the SBA PDM pilot program. The limited number of businesses that participated in the SBA PDM pilot program may be attributable to its alignment with FEMA programs . Aligning the two programs m ay have (1) limited the time frame to obtain a PDM loan, and (2) limited the number of businesses eligible for PDM loans . Additionally, businesses may not have been aware that pre-disaster loans were being made available through the SBA PDM pilot program. The SBA PDM pilot loan program was created in conjunction with FEMA's pre-disaster mitigation program, dubbed Project Impact. Because the two programs were aligned, the time frame in which businesses could apply for PDM loans was limited by a series of delays in the implementation of the FEMA program. That may help explain, in part, why so few businesses obtained SBA PDM loans. According to SBA, the PDM program rules were effective as of October 1, 1999. However, communities could not apply to be accepted as a pre-disaster mitigation eligible community because FEMA had not yet implemented Project Impact. Project Impact's implementation was further delayed \"pending appropriations in the FY2002 Departments of Veterans Affairs, Housing and Urban Development and Independent Agencies Appropriations Act.\" On November 26, 2001, the appropriations act provided $25 million to FEMA for its pre-disaster mitigation grant program. Upon receiving the appropriation, FEMA decided to reevaluate and revamp Project Impact before its full implementationâfurther delaying the program. Once Project Impact was implemented, SBA revised rules (some in response to FEMA comments) concerning the SBA PDM pilot program before it was put into effect (see Appendix for additional information on both Project Impact and the SBA PDM pilot program). The sequence of events described above shortened the timeframe for applying for PDM loans. A CRS search of the Federal Register indicates that PDM loans first became available July 16, 2003. The Project Impact requirement significantly reduced the number of businesses eligible for the SBA PDM pilot program. The SBA PDM pilot program was intended to complement Project Impact by participating in the \"whole of community approach\" to disaster mitigation; SBA PDM loan eligibility was contingent on whether the business was located in a Project Impact community. The Project Impact requirement may have unintentionally limited the number of businesses eligible for PDM disaster loans. As demonstrated in Figure 2 , few communities participated in the Project Impact program. There may have been businesses in \"non-Project Impact\" areas that wanted SBA PDM loans but were ineligible because of the Project Impact requirement. Further limiting participation, businesses that were in Project Impact communities but not in a Special Flood Hazard Area (SFHA) were not eligible for an SBA PDM loan if it was for flood prevention measures. Finally, though the SBA PDM loan pilot program continued until FY2006, Project Impact was replaced by the Pre-Disaster Mitigation (PDM) program in FY2002. According to then-FEMA Director Joe M. Allbaugh: I want to take the \"concept\" of Project Impact and fold it in to the program of mitigation. Project Impact is not mitigation. It is an initiative to get \"consumer buy-in.\" In many communities it became the catch-phrase to get local leaders together to look at ways to do mitigation. The PDM program does not designate participating communities. Rather, state and local governments submit mitigation planning and project applications to FEMA. Once FEMA reviews the application for eligibility and completeness, FEMA makes funding decisions \"based on the agency's priorities for the most effective use of grant funds and the availability of funds posted in the Notice of Funds Opportunity announcement.\" Eligibility requirements for the SBA PDM loan pilot program were not changed to reflect the new FEMA PDM program. It is unclear what effect this may have had on the SBA PDM loan pilot program. As mentioned previously, SBA published notices in the Federal Register announcing the availability of pre-disaster mitigation loans. The notice designated a 30-day application filing period with a specific opening date and filing deadline, as well as the locations for obtaining and filling applications. In addition to the Federal Register notification, SBA coordinated with FEMA to issue press releases to inform potential applicants of the loan program. It is unclear, however, how effective these efforts were at letting businesses know PDM loans were available. The following considerations may help increase business participation should Congress decide to reauthorize the SBA PDM pilot program. First, implementation delays and eligibility restrictions, such as the ones described above, may not be an issue if Congress reauthorized the SBA PDM pilot program, because the pilot would no longer need to be tied to Project Impact. If Congress should desire that the program align with or support FEMA mitigation efforts, Congress may consider tying a reauthorized SBA PDM loan program to FEMA's Pre-Disaster Mitigation program, or, instead, making them available to all small U.S. domestic businesses. Second, if the SBA PDM pilot program were to be reauthorized, one option available to address outreach would be to require SBA to spend a portion of the PDM loan appropriation money on outreach, including advertising to educate businesses on the importance of mitigation to protect their investment from being damaged or destroyed by a disaster, and to help businesses become aware that PDM loans are available. Additionally, SBA could be required to provide information to Congress concerning its efforts to make businesses aware of the program, including where they could apply for a PDM loan. Further, as mentioned previously, Section 1(c) of P.L. 106-24 required the SBA Administrator to submit a report to Congress on the effectiveness of the pilot program. The report required information and analysis on: the areas served under the pilot program; the number and dollar value of loans made under the pilot program; the estimated savings to the federal government resulting from the pilot program; and other relevant information as the Administrator determines to be appropriate for evaluating the pilot program. If Congress reauthorized the SBA PDM pilot program, it could consider requiring SBA to provide similar information. Additionally, Congress could tie the report to appropriations to communicate legislative intent to carry out the reporting measure once it becomes law. Although report language itself is not law and thus not binding in the same manner as language in statute, agencies usually seek to comply with the directives contained therein. According to one congressional scholar, \"the criticisms and suggestions carried in the reports accompanying each bill are expected to influence the subsequent behavior of the agency. Committee reports are not the law, but it is expected that they be regarded almost as seriously.\" As mentioned previously, the limits on post-disaster mitigation loans are the lesser of either the measure or 20% of the verified loss. If Congress wanted to encourage mitigation, one option would be to consider increasing this percentage to a higher amount in addition to, or instead of, reauthorizing the SBA PDM loan program. Congress could also consider doing the same for home physical disaster loans. Research indicates that many businesses do not have contingency or disaster recovery plans. For example, a survey of Certified Public Accounting (CPA) firms located on Staten Island, NY, indicated that 7% of the respondents had a formal continuity or disaster recovery plan in place prior to Hurricane Sandy. The survey found that nearly 42% of those firms that had a formal continuity or disaster recovery plan admitted that they never tested their plan. Approximately 40% had an informal plan that had been discussed but not documented. More than half of the responding firms did not have a contingency or disaster recovery plan. Of those that did not have any type of a plan, 60% thought the plans were unnecessary and 20% said that establishing a plan was too time-consuming. Congress could investigate methods that would incentivize businesses to develop contingency and disaster recovery plans. This could be done through new programs or through existing ones, such as FEMA's Ready Business Program or through SBA's emergency preparedness efforts. The Ready Business Program is designed to help businesses plan and prepare for disasters by providing businesses various online toolkits that can help them identify their risks and develop a plan to address those risks. The SBA provides a range of resources to help businesses develop plans to protect employees, reduce the financial impact of a disaster, and reopen the business more quickly. In addition to disaster loans for businesses, SBA also provides disaster loans to homeowners. In fact, roughly 80% of SBA disaster assistance goes to individuals and households rather than businesses. Homeowners located in a declared disaster area (and in contiguous counties) may apply to SBA for loans up to $200,000 to help repair and rebuild their primary residence. Similar to businesses, only damaged homes in declared disaster areas are eligible for disaster loans. According to regulations 20% \"of the verified loss (not including refinancing or malfeasance), before deduction of compensation from other sources, up to a maximum of $200,000 for post-disaster mitigation.\" Homeowners seeking mitigation assistance before a disaster strikes, however, must look to other sources for the assistance. In addition to mitigation measures, such as retrofitting structures, contouring land, and relocating utilities, Section 4 of the Recovery Improvements for Small Entities After Disaster Act of 2015 (RISE Act, P.L. 115-88 ) allows homeowners to use a portion of their physical damage disaster loans for the construction of safe rooms or similar storm shelters designed to protect property and occupants from tornadoes or other natural disasters. Some homeowners may wish to build a safe room or storm shelter before a disaster. If that is the case, they may be interested in a pre-disaster mitigation loan to fund its construction. Homeowners may also be interested in other pre-disaster mitigation measures. The SBA PDM pilot program, however, only provided pre-disaster loans to businesses. If reauthorized, Congress could consider expanding the program by making pre-disaster loans available to homeowners. In addition to making the program available to homeowners, Congress could consider making home pre-disaster mitigation loans contingent on homeowners insurance. This could help protect the home from future disasters and have the additional benefit of making sure that the homeowner has adequate insurance to repair and rebuild their home without additional federal assistance. For nearly a century, Congress has contemplated how to help businesses repair and rebuild after a disaster and protect their investments from future incidents. Though businesses can use a portion of their SBA disaster loans for mitigation measures, critics might question why only damaged businesses are eligible for disaster loans. The SBA's PDM pilot program addressed this criticism, but the program had few participants. As described in this report, the lack of participation could have been a result of its alignment with FEMA programs related to delays in the implementation of FEMA's Project Impact, eligibility limitations, and the number of businesses that were aware that the program was available. If Congress were to reauthorize the SBA PDM pilot program, among the policy options available are decoupling the PDM loan program from FEMA programs and requiring enhanced advertising and outreach efforts. Another option would be to restructure business physical disaster loans so that a greater portion of the loan can be used for mitigation. Finally, Congress could examine methods that would help businesses develop business continuity and disaster response plans. Businesses may be more receptive to pre-disaster mitigation loans as a result of the large-scale disasters that have occurred since 2005. Prior to Hurricane Katrina, the salience of disaster issues generally, and mitigation specifically, may have been on the periphery of business concerns. While there were some large-scale disasters, the scope of those disasters tended to be regional rather than national. Furthermore, the focus of emergency management during that time was arguably more oriented toward terrorism concerns resulting from the 9/11 attacks. Consequently, the need to mitigate against future disasters may have been just one concern coequal with other, competing concerns. The policy environment may have changed as a result of hurricanes Katrina, Harvey, Irma, Maria, and Michael. These disasters, in addition to increasing concerns about the impact of climate change on the frequency and severity of disasters, may make businesses more amenable to the idea of pre-disaster mitigation loans to protect their investment from future disasters. Project Impact P.L. 104-204 established a mitigation program (which FEMA named Project Impact) to help communities make mitigation investments prior to disasters to reduce their vulnerability to future disasters. The program was based on a \"whole of community\" approach involving all sectors of the nation. According to the House report on the bill: The conferees agree that up to $5,000,000 of the amount provided for pre-disaster mitigation is available immediately to fund up to seven pilot projects approved by the Director of FEMA. Prior to the expenditure of the remaining funds for any specific pre-disaster mitigation program or project, the conferees direct that the appropriate level of funding be used by the Agency to conduct a formal needs-based analysis and cost/benefit study of all of the various mitigation alternatives. The results of these analyses and studies, along with any relevant information learned from the aforementioned seven pilot projects, shall be incorporated into a comprehensive, long-term National Pre-disaster Mitigation Plan. The plan should be developed, independently peer-reviewed, and submitted to the Committees on Appropriations not later than March 31, 1998. FEMA is directed to involve in this planning effort participants which shall include, but are not limited to, representatives of FEMA and other federal agencies, state and local governments, industry, universities, professional societies, the National Academy of Sciences, The Partnership for Natural Disaster Reduction, and [Centers for Protection Against Natural Disasters] CPAND. The conferees intend that none of the remaining funds provided herein be obligated until the plan has been completed and submitted as outlined above. The conferees note that this approach is intended to be the foundation for providing the best and most cost-effective solution to reduce the tremendous human and financial costs associated with natural disasters. Project Impact was designed to serve as a model for promoting mainstream emergency management and mitigation practices into every community in America. The program asked communities to identify risks and establish plans to reduce those risks. It also asked communities to establish partnerships with community stakeholders, including the business sector. Primary Tenets of Project Impact mitigation is a local issue that is best addressed through local partnerships involving the government, business, and citizens; the participation of the private sector is essential because disasters threaten the economic and commercial growth of communities; and mitigation consists of long-term efforts and requires long-investments. Methodology members of the community, including elected officials, local, state, and federal disaster personnel, business representatives, environmental groups, and citizens, joined together to form a Disaster Resistant Community Planning Committee that (1) examined risks hazards and identified vulnerabilities to them; (2) prioritized risk reduction actions based on the hazard identification and vulnerability assessment; and (3) communicated its findings and mitigation plan to other community leaders and residents. Project Impact Grants Project Impact grants were largely used to fund planning and outreach activities. The Project Impact grants could be used to fund costs associated with logistics and meetings, staff support, and travel to meetings with the community or to FEMA Project Impact meetings; training including costs to train state officials supporting Project Impact and to develop training packages for state and local officials; travel of local community officials to other communities, state meetings, or national conferences at state request to share Project Impact information; state costs in information development and dissemination to support Project Impact; and expert, short-term technical assistance support to Project Impact communities. According to a Government Accountability Office (GAO) report, state and local officials said that Project Impact has been successful in increasing awareness of and community support for mitigation efforts due to its funding of these types of activities. The same GAO report stated During fiscal years 1997 through 2001, Project Impact provided a total of $77 million to communities within every state and certain U.S. territories. Unlike the HMGP, the amount of Project Impact funding available to communities within a state was not predicated upon the occurrence of a disaster; in fact, the program was structured so that under its funding formula, communities in every state participated in the program. By 2001, there were nearly 250 communities participating in the program, with Project Impact communities receiving grants between $60,000 and $1,000,000. Appendix III lists Project Impact grants by year and community. While states selected which communities received Project Impact grants, communities were responsible for selecting the mitigation measures to fund with these grants. Similar to the HMGP, however, communities were required to provide 25 percent of the costs for the mitigation measures. The George W. Bush Administration eliminated Project Impact from the FY2002 budget and FEMA rebranded Project Impact as the Pre-Disaster Mitigation (PDM) program. The PDM program retained some of Project Impact's themes, but placed the responsibility on the governor of each state to suggest up to five communities to be considered for pre-disaster mitigation assistance. While the governor nominated potential grantees, FEMA made the final selections. In addition, under the statute, FEMA had the discretion under \"extraordinary circumstances\" to award a grant to a local government that had not been recommended by a governor. SBA PDM Pilot Loan Program Loan Application SBA published notices in the Federal Register announcing the availability of pre-disaster mitigation loans in 2003. The notice designated a 30-day application filing period with specific opening dates and filing deadlines, as well as the locations for obtaining and filing applications. In additional to the Federal Register notification, SBA coordinated with FEMA to issue press releases to inform potential applicants of the loan program. Businesses were required to submit a Pre-Disaster Mitigation Small Business Loan Application to SBA during the filing period. Applications had to include a written statement from the state or local coordinator confirming that the mitigation project was (1) located in a Project Impact community, and (2) in accordance with the specific priorities and goals of the community participating in the pre-disaster mitigation community. The completed application served as the loan request. Loans were provided on a first-come, first-served basis until SBA allocated all program funds. If SBA declined a loan request, SBA notified the business in writing with the rationale for the denial. SBA also advised the business of the procedures to request reconsideration of the decision. Loan Terms The SBA PDM pilot program provided businesses up to $50,000 per fiscal year to finance mitigation measures to protect commercial property, leasehold improvements, or contents from disaster-related damages that could occur in the future. Mitigation loans could also be used to relocate the business. Interest rates for the loans had a statutory ceiling set at 4% per annum. Loan Eligibility Businesses applying for SBA PDM loans had to meet certain criteria to be eligible for mitigation loans. Two, in particular, were designed to tie the SBA PDM pilot program to FEMA programs. First, as already noted, the business had to be located in a participating Project Impact community; and, second, if the mitigation measures were designed specifically to protect against flooding, the business had to be located in a Special Flood Hazard Area (SFHA). Additional criteria for loan eligibility required that the business and its affiliates lack the financial resources to fund the mitigation measures without undue hardship; the business be a small business as defined by SBA regulations; the business be in operation in the same location for at least one year; and the mitigation loan had to be used for the protection of a building leased primarily for commercial rather than residential purposes, if the business leased out real property. Businesses were not eligible for the SBA PDM Loan Program if the business: was primarily engaged in political or lobbying activities; derived more than one-third of its revenues from legal gambling activities; or owners were incarcerated, on parole, or on probation.", "summary": "For nearly a century, Congress has contemplated how to help businesses repair and rebuild after a disaster. Congress has also expressed interest in helping businesses use mitigation measures to protect their investments from future incidents. Mitigation activities entail identifying risks and hazards and taking measures to either substantially reduce or eliminate the impact of an incident. As described in this report, mitigation measures primarily take place during the recovery phase of a disaster. Currently, only damaged businesses in declared disaster areas are eligible for disaster loans. Businesses seeking mitigation assistance before a disaster strikes, however, must look to other sources for the assistance. Congress experimented with business pre-disaster mitigation (PDM) through a pilot program operated by the Small Business Administration (SBA) from FY2000 to FY2006. Though Congress authorized appropriations of $15 million each fiscal year to carry out the SBA PDM pilot program, four businesses obtained pre-disaster mitigation loans, totaling just over $100,000. Although the federal government has traditionally favored a post-disaster approach to mitigation, there are indications suggesting congressional interest in pre-disaster mitigation has increased in recent years, partly as a result of recent and recurring large-scale disasters, including hurricanes Katrina, Harvey, Irma, Maria, and Michael. This is evidenced by enactment of the Disaster Recovery Reform Act of 2018 (DRRA, Division D of P.L. 115-254 ), which made substantial reforms to pre-disaster mitigation. The renewed focus on pre-disaster mitigation has also led to discussions about reauthorizing the SBA PDM pilot program. This report describes the underlying rationale for post-disaster and pre-disaster mitigation and provides an overview of the SBA PDM loan pilot program, including its past performance and potential reasons why so few businesses participated in the pilot program. These potential reasons include (1) the fact that the pilot program was tied to FEMA programs, which delayed the program's implementation; (2) limitations on business eligibility for SBA PDM loans; and (3) the fact that businesses may not have been aware that the SBA was offering pre-disaster mitigation loans. This report also provides an overview of various policy options should Congress decide to reauthorize the SBA PDM pilot program, including considerations that may help increase business participation. These policy options include decoupling the SBA PDM disaster loan pilot program from FEMA programs and examining the most effective forms of outreach and advertising. Congress could also consider restructuring the current SBA Disaster Loan Program to allow businesses to apply a greater percentage of their disaster loan towards mitigation, and may consider investigating ways to help businesses develop continuity and disaster response plans. Congress could also consider providing PDM loans to homeowners so they can protect their homes before a disaster strikes.", "document_type": "crs"}
{"report": "In December 2019, a new disease, later called COVID-19, emerged in China and quickly spread around the world. The disease presents major consequences for global health, foreign relations, the global economy, and global security. International institutions and country governments are taking a variety of responses to address these challenges. In the 116 th Congress, Members have introduced legislation to respond to COVID-19 in particular and to address global pandemic preparedness in general that are now occurring on a global scale. This report focuses on global implications of and responses to the COVID-19 pandemic, and is organized into four broad parts that answer common questions regarding: (1) the disease and its global prevalence, (2) country and regional responses, (3) global economic and trade implications, and (4) issues that Congress might consider. For information on domestic COVID-19 cases and related responses, see CRS Insight IN11253, Domestic Public Health Response to COVID-19: Current Status and Resources Guide , by Kavya Sekar and Ada S. Cornell. Coronaviruses that typically infect humans are common pathogens, which can cause mild illnesses with symptoms similar to the common cold, or severe illness, potentially resulting in death of the victim. Prior to COVID-19, two \"novel\" coronaviruses (i.e., coronaviruses newly recognized to infect humans) have caused serious illness and death in large populations, namely severe acute respiratory syndrome (SARS) in 2002-2003 and Middle East Respiratory Syndrome (MERS), which was first identified in 2012 and continues to have sporadic transmission from animals to people with limited human-to-human spread. The origin of COVID-19 is unknown, although genetic analysis suggests an animal source. The World Health Organization (WHO) first learned of pneumonia cases from unknown causes in Wuhan, China, on December 31, 2019. In the first days of January 2020, Chinese scientists isolated a previously unknown coronavirus in the patients, and on January 11, Chinese scientists shared its genetic sequence with the international community. (See CRS Report R46354, COVID-19 and China: A Chronology of Events (December 2019-January 2020) , by Susan V. Lawrence.) The virus is now present in most countries ( Figure 1 ). For the purposes of this report, CRS refers to COVID-19 as the virus and the syndrome people often develop when infected. Health officials and researchers are still learning about COVID-19. According to the U.S. Centers for Disease Control and Prevention (CDC), the virus is thought to spread mainly from person-to-person between individuals who are in close contact with each other (less than six feet), through respiratory droplets produced when an infected person coughs or sneezes. Health officials and researchers are still determining the virus's incubation period, or time between infection and onset of symptoms. CDC is using 14 days as the outer bound for the incubation period, meaning that the agency expects someone who has been infected to show symptoms within that period. The CDC has confirmed that asymptomatic cases (infected individuals who do not have symptoms) can transmit the virus, though \"their role in transmission is not yet known.\" A study of the 3,711 passengers on the Diamond Princess cruise ship found that 712 people (19.2% of the cruise ship passengers) tested positive for COVID-19. Almost half (331) of the positive cases were asymptomatic at the time of testing. The COVID-19 case fatality rate is difficult to determine; milder cases are not being diagnosed, death is delayed, and wide disparities exist in case detection worldwide. In addition, the case fatality rate in any given context may depend on a number of factors including the demographics of the population, density of the area, and the quality and availability of health care services. Scientists are using different methods to estimate case fatality and estimates range. One study of those diagnosed with COVID-19 estimated case fatality rates for Wuhan, China and other parts of China at 1.4% and 0.85%, respectively. Another estimated 3.6% within China and 1.5% outside the country, with a third recommending using a range of 0.2%-3.0%. Current data suggest the elderly and those with preexisting medical conditions (including asthma, high blood pressure, heart disease, cancer, and diabetes) are more likely to become severely sickened by COVID-19. One study in China showed that 80% of those killed by the virus were older than 60 years and 81% of surveyed COVID-19 cases were mild. Another study showed that 87% of all hospitalized COVID-19 patients in China were aged between 30 and 79 years, though the study did not further disaggregate the data by age. Whereas the CDC found that the elderly had higher death rates, more than half (55%) of reported COVID-19 hospitalizations between February 12 and March 16, 2020, were of individuals younger than 65 years ( Figure 2 ). As of May 13, 2020, national governments reported to the WHO more than 4 million cases of COVID-19 and almost 300,000 related deaths worldwide. Ten countries accounted for over 70% of all reported cases and almost 80% of all reported deaths ( Table 1 ). The pandemic epicenter has shifted from China and Asia to the United States and Europe. China and Belgium are no longer among the 10 countries with the highest number of deaths, and Russia and Brazil joined the ranks. Almost 90% of all reported cases were identified in the WHO Americas and Europe regions ( Table 2 ). Cases are continuing to rise in the Americas, where 88% of all cases were found in the United States (74%), Brazil (9%), and Canada (4%). In Europe, the cases are more widely distributed, and seven countries comprise 77% of all cases: Russia (14%), Spain (13%), United Kingdom (13%), Italy (12%), Germany (10%), Turkey (8%) and France (8%). Individual countries carry out both domestic and international efforts to control the COVID-19 pandemic, with the WHO issuing guidance, coordinating some international research and related findings, and coordinating health aid in low-resource settings. Countries follow (to varying degrees) WHO policy guidance on COVID-19 response and leverage information shared by WHO to refine national COVID-19 plans. The United Nations (U.N.) Office for the Coordination of Humanitarian Affairs (UNOCHA) is requesting $6.7 billion to support COVID-19 efforts by several U.N. entities (see \" Multilateral Technical Assistance \" section). WHO is the U.N. agency responsible for setting norms and rules on global health matters, including on pandemic response. The organization also develops and provides tools, guidance and training protocols. In 1969, the World Health Assembly (WHA)âthe governing body of WHOâadopted the International Health Regulations (IHR) to stop the spread of six diseases through quarantine and other infectious disease control measures. The WHA has amended the IHR several times, most recently in 2005. The 2005 edition, known as IHR (2005), provided expanded means for controlling infectious disease outbreaks beyond quarantine. The regulations include a code of conduct for notification of and responses to disease outbreaks with pandemic potential, and carry the expectation that countries (and their territories) will build the capacity, where lacking, to comply with IHR (2005). The regulations mandate that WHO Member States build and maintain public health capacities for disease surveillance and response; provide or facilitate technical assistance to help low-resource countries develop and maintain public health capacities; notify WHO of any event that may constitute a Public Health Emergency of International Concern (PHEIC) and respond to requests for verification of information regarding such event; and follow WHO recommendations concerning public health responses to the relevant PHEIC. Per reporting requirements of the IHR (2005), China and other countries are monitoring and reporting COVID-19 cases to WHO. Observers are debating the extent to which China is fully complying with IHR (2005) reporting rules (see \" Asia \" and the Appendix ). IHR (2005) does not have an enforcement mechanism. WHO asserts that \"peer pressure and public knowledge\" are the \"best incentives for compliance.\" Consequences that WHO purports non-compliant countries might face include a tarnished international image, increased morbidity and mortality of affected populations, travel and trade restrictions imposed by other countries, economic and social disruption, and public outrage. China's response to the COVID-19 outbreak may deepen debates about the need for an IHR enforcement mechanism. On one hand, questions about the timeliness of China's reporting of the COVID-19 outbreak and questions about China's transparency thereafter might bolster arguments in favor of an enforcement mechanism. On the other hand, some have questioned whether the WHA would vote to abdicate some of its sovereignty to provide WHO enforcement authority. IHR (2005) came into force in 2007, with signatory countries committing to comply by 2012. In 2012, only 20% of countries reported to the WHO that they had developed IHR (2005) core capacities, and many observers asserted the regulations needed a funding mechanism to help resource-constrained countries with compliance. In 2014, the WHO launched the Global Health Security Agenda (GHSA) as a five-year (2014-2018) multilateral effort to accelerate IHR (2005) implementation, particularly in resource-poor countries lacking the capacity to adhere to the regulations. The GHSA appeared to advance global pandemic preparedness capacity; more than 70% of surveyed countries reported in 2017 being prepared to address a global pandemic. Regional disparities persisted, however; about 55% of surveyed countries in the WHO Africa region reported being prepared for a pandemic, compared to almost 90% of countries surveyed in the WHO Western Pacific region. In 2017, participating countries agreed to extend the GHSA through 2024. For more information on the GHSA, see CRS In Focus IF11461, The Global Health Security Agenda (GHSA): 2020-2024 , by Tiaji Salaam-Blyther. In February 2020, WHO released a $675 million Strategic Preparedness and Response Plan for February through April 2020. WHO aims to provide international coordination and operational support, bolster country readiness and response capacityâparticularly in low-resource countriesâand accelerate research and innovation. As of May 8, private donors and 26 countries have contributed $536.5 million towards the plan, including $30.3 million from the United States. Countries have pledged an additional $198.5 million towards the plan. As of April 22, WHO has used the funds to purchase and ship personal protective equipment (PPE) to 133 countries, including 2,566,880 surgical masks and masks, 1,641,900 boxes of gloves, 184,478 gowns, 29,873 goggles, and 79,426 face shields; supply 1,500,000 diagnostic kits to 126 countries; develop online COVID-19 training courses in 13 languages; and enroll more than 100 countries in WHO-coordinated trials to accelerate identification of an effective vaccine and treatment, which include 1,200 patients, 144 studies, and 6 candidate vaccines in clinical evaluation and 77 in preclinical evaluation. In April 2020, the WHO issued an updated plan that provided guidance for countries preparing for a phased transition from widespread transmission to a steady state of low-level or no transmission, among other things. The update did not include a request for additional funds. Also in April 2020, the WHO hosted a virtual event with the President of France, the President of the European Commission, and the Bill & Melinda Gates Foundation where heads of state, the G20 President, the African Union Commission Chairperson, the U.N. Secretary General and leaders from a variety of nongovernmental organizations, including Gavi, the Vaccine Alliance, and the Coalition for Epidemic Preparedness and Innovation (CEPI), pledged their commitment to the Access to COVID-19 Tools (ACT Accelerator). The participants, and other partners who have since joined the effort, committed to \"work towards equitable global access\" to COVID-19 countermeasures (including vaccines and therapies). A pledging conference, hosted by the European Union (EU), took place on May 4 to support the effort. As of May 6, donors have pledged $7.4 billion for the ACT Accelerator and other global COVID-19 responses. The United States neither participated in the launch nor provided funding for the ACT Accelerator. Debates about whether health commodities are a public good are long-standing and have intensified in recent years. For decades, countries have willingly donated virus samples to the WHO for international research. During a 2005-2007 H5N1 avian flu outbreak, however, Indonesia refused to share samples of the virus, asserting that companies were selling patented vaccines created from the donated samples at a price Indonesians could not afford. The WHO and its Member States, through the WHA, have not yet developed an agreement that satisfies poor countries concerned about affordability and wealthier countries (where most global pharmaceutical companies are based) concerned about recapturing research and development costs. The WHO has sought to negotiate prepurchasing agreement during each major outbreak since the H5N1 debacle. French officials, for example, have characterized any COVID-19 commodity that might be developed as a \"public good,\" and they have criticized statements by a French pharmaceutical company on committing to provide the U.S. government first access to a COVID-19 vaccine that the company produces. The WHO has established the Solidarity Trial to coordinate international COVID-19-related research and development. Participating parties, including countries, pharmaceutical companies, and nongovernmental organizations, agree to openly share virus information and commodities developed with donated specimens. The EU and its Member States, and nine other countries, have drafted a resolution to be considered at the upcoming World Health Assembly on a unified international COVID-19 response, including on \"the need for all countries to have unhindered timely access to quality, safe, efficacious and affordable diagnostics, therapeutics, medicines and vaccines ... for the COVID-19 response.\" The international financial institutions (IFIs), including the International Monetary Fund (IMF), the World Bank, and specialized multilateral development banks (MDBs), are mobilizing unprecedented levels of financial resources to support countries grappling with the health and economic effects of the COVID-19 pandemic. About 100 countriesâmore than half of the IMF's membershipâhave requested IMF loans, and the IMF has announced it is ready to tap its total lending capacity, about $1 trillion, to support governments responding to COVID-19. In April 2020, the World Bank pledged to mobilize about $160 billion through 2021, and other multilateral development banks committed about $80 billion over the same time period. MDB support is expected to cover a wide range of activities, including strengthening health services and primary health care, bolstering disease monitoring and reporting, training front-line health workers, encouraging community engagement to maintain public trust, and improving access to treatment for the poorest patients. In addition, at the urging of the IMF and the World Bank, the G-20 countries in coordination with private creditors have agreed to suspend debt payments for low-income countries through the end of 2020. Policymakers are discussing a number of policy actions to further bolster the IFI response to the COVID-19 pandemic. Examples include changing IFI policies to allow more flexibility in providing financial assistance, pursuing policies at the IMF to increase member states' foreign reserves, and providing debt relief to low-income countries. Some of these policy proposals would require congressional legislation. Through the stimulus legislation ( P.L. 116-136 ), Congress accelerated authorizations requested by the Administration in the FY2021 budget for the IMF, two lending facilities at the World Bank, and two lending facilities at the African Development Bank. Outside of the WHO, other U.N. entities and their implementing partners are considering how to maintain ongoing humanitarian operations while preparing for COVID-19 cases should they arise. On March 17, 2020, the International Organization for Migration (IOM) and the U.N. High Commissioner for Refugees (UNHCR) announced they were suspending global resettlement travel for refugees due to the COVID-19 travel bans. Cessation of resettlement may reinforce population density in refugee camps and other settlements, which might further complicate efforts to address COVID-19 outbreaks in such settings. Many experts agree that even prior to the COVID-19 pandemic, the scope of current global humanitarian crises was unprecedented. The U.N. Office for the Coordination of Humanitarian Affairs (UNOCHA) estimated that in 2020, nearly 168 million people in 53 countries would require humanitarian assistance and protection due to armed conflict, widespread or indiscriminate violence, and/or human rights violations. The 2020 U.N. global humanitarian annual appeal totaled an all-time high of more than $28.8 billion, excluding COVID-19 responses. The appeal also focused on the needs of displaced populations, which numbered more than 70 million people, including 25.9 million refugees, 41.3 million internally displaced persons (IDPs) and 3.5 million asylum seekers. In addition, natural disasters are also key drivers of displacement each year. Humanitarian experts agree that the conditions in which vulnerable, displaced populations live make them particularly susceptible to COVID-19 spread and present significant challenges to response and containment. Overcrowded living spaces and insufficient hygiene and sanitation facilities make conditions conducive to contagion. In many situations, disease control recommendations are not practical. Space is not available to create isolation and \"social-distancing,\" for example, and limited access to clean water and sanitation make regular and sustained handwashing difficult. In addition, low or middle-income countries that are likely to struggle to respond effectively to the pandemic host 85% of refugees worldwide. So far, relatively few COVID-19 cases have been reported among the displaced and those affected by conflict or natural disasters, although there is a widespread lack of testing. On March 25, 2020, the United Nations launched a $2.01 billion global appeal for the COVID-19 pandemic response to \"fight the virus in the world's poorest countries, and address the needs of the most vulnerable people\" through the end of the year. According to the United Nations, as of early May, donors had so far provided $923 million toward the initial appeal and contributed $608 million outside the plan. On May 7, 2020, the United Nations announced it had tripled the appeal to $6.7 million and expanded its coverage to 63 countries as it became clear that COVID-19's \"most devastating and destabilizing effects will be felt in the world's poorest countries.\" While the United Nations does not expect the pandemic to peak in the world's poorest countries for another three to six months, already there are reports of \"incomes plummeting and jobs disappearing, food supplies falling and prices soaring, and children missing vaccinations and meals.\" The updated plan brings together humanitarian appeals from other U.N. agencies in an effort to coordinate emergency health and humanitarian responses (see Table 3 ). UNOCHA will coordinate the U.N.-wide response, but most of the activities will be carried out by specific U.N. entities, non-governmental organizations, and other implementing partners. U.N. guidance for scaling up responses in refugee and IDP settings includes addressing mental health and psychological aspects, adjusting food distribution, and developing prevention and control mechanisms in schools. Some experts recommend incorporating COVID-19 responses within existing humanitarian programs to ensure continuity of operations and to protect aid personnel while facilitating their access in areas where travel has been restricted. On January 29, 2020, President Donald Trump announced the formation of the President's Coronavirus Task Force, led by the Department of Health and Human Services (HHS) and coordinated by the White House National Security Council (NSC). On February 27, the President appointed Vice President Michael Pence as the Administration's COVID-19 task force leader, and the Vice President subsequently appointed the head of the President's Emergency Plan for AIDS Relief (PEPFAR), Ambassador Deborah Birx, as the White House Coronavirus Response Coordinator. International COVID-19 response efforts carried out by U.S. federal government departments and agencies, including those in the Task Force, are described below. On March 6, 2020, the President signed into law P.L. 116-123 , Coronavirus Preparedness and Response Supplemental Appropriations Act of 2020 , which provides $8.3 billion for domestic and international COVID-19 response. The Act includes $300 million to continue the CDC's global health security programs and a total of $1.25 billion for the U.S. Agency for International Development (USAID) and Department of State. USAID- and Department of State-administered aid includes the following: Global Health Programs (GHP). $435 million for global health responses (see \" U.S. Agency for International Development (USAID) \"), including $200 million for USAID's Emergency Reserve Fund (ERF). International Disaster Assistance (IDA). $300 million for relief and recovery efforts in the wake of the COVID-19 pandemic. Economic Support Fund (ESF). $250 million to address COVID-19-related \"economic, security, and stabilization requirements.\" The Act also provides $1 million to the USAID Office of Inspector General to support oversight of COVID-19-related aid programming. On March 27, 2020, President Trump signed P.L. 116-136 , Coronavirus Aid, Relief, and Economic Security Act , which contains emergency funding for U.S. international COVID-19 responses, including the following: International Disaster Assistance (IDA). $258 million to \"prevent, prepare for, and respond\" to COVID-19. Migration and Refugee Assistance (MRA). $350 million to the State Department-administered MRA account to \"prevent, prepare for, and respond\" to COVID-19. Section 43 of the State Department Basic Authorities Act of 1956 (P.L. 84-885; hereinafter, the Basic Authorities Act) requires the State Department to serve as a clearinghouse of information on any major disaster or incident that affects the health and safety of U.S. citizens abroad. The department implements this statutory responsibility through its Consular Information Program (CIP), which provides a range of products, including but not limited to country-specific information web pages, Travel Advisories, Alerts, and Worldwide Cautions. Travel Advisories range from Level 1 (Exercise Normal Precautions) to Level 4 (Do Not Travel). On March 31, 2020, the State Department issued an updated Level 4 Global Health Advisory advising U.S. citizens to avoid all international travel due to the global impact of COVID-19. Level 4 Travel Advisories do not constitute a travel ban. Instead, they advise U.S. citizens not to travel because of life threatening risks and, in some cases, limited U.S. government capability to provide assistance to U.S. citizens. The State Department's Level 4 Global Health Advisory notes that because the State Department has authorized the departure of U.S. personnel abroad who are \"at higher risk of a poor outcome if exposed to COVID-19,\" U.S. embassies and consulates may have more limited capacity to provide services to U.S. citizens abroad. CIP products are posted online and disseminated to U.S. citizens who have registered to receive such communications through the Smart Traveler Enrollment Program (STEP). The Assistant Secretary for Consular Affairs is responsible for supervising and managing the CIP. State Department regulations provide that when health concerns rise to the level of posing a significant threat to U.S. citizens, the State Department will publish a web page describing the health-related threat and resources. The Bureau of Consular Affairs has developed such a web page for the COVID-19 pandemic. Additionally, the State Department has created a website providing COVID-19-related information and resources for every country in the world. Furthermore, on March 24, 2020, the State Department began publishing a daily COVID-19 newsletter, developed for Members of Congress and congressional staff, intended to \"dispel rumor, combat misinformation, and answer any outstanding questions regarding the Department's overseas crisis response efforts.\" The Omnibus Diplomatic Security and Antiterrorism Act of 1986 ( P.L. 99-399 ) authorizes the Secretary of State to carry out overseas evacuations. Section 103 of this law requires the Secretary to \"develop and implement policies and programs to provide for the safe and efficient evacuation of United States Government personnel, dependents, and private United States citizens when their lives are endangered.\" In addition, the Basic Authorities Act authorizes the Secretary to make expenditures for overseas evacuations. Section 4 of this law authorizes both expenditures for the evacuation of \"United States Government employees and their dependents\" and \"private United States citizens or third-country nationals, on a reimbursable basis to the maximum extent practicable,\" leaving American citizens or third-country nationals generally responsible for the cost of evacuation, although emergency financial assistance may be available for destitute evacuees. Furthermore, the Basic Authorities Act limits the scope of repayment to \"a reasonable commercial air fare immediately prior to the events giving rise to the evacuation.\" In practice, even when the State Department advises private U.S. citizens to leave a country, it will advise them to evacuate using existing commercial transportation options whenever possible. This is reflected in the State Department's current Level 4 Global Health Advisory, which states that \"[i]n countries where commercial departure options remain available, U.S. citizens who live in the United States should arrange for immediate return.\" In more rare circumstances, when the local transportation infrastructure is compromised, the State Department will arrange chartered or non-commercial transportation for U.S. citizens to evacuate to a safe location determined by the department. Following the outbreak of COVID-19, the State Department has made such arrangements for thousands of U.S. citizens throughout the world, initially those in Wuhan, China and, shortly thereafter, U.S. citizen passengers who were quarantined on the Diamond Princess cruise ship in Yokohama, Japan. As demand for repatriation surged, the State Department leveraged new options to evacuate U.S. citizens, including \"commercial rescue flights.\" To facilitate these flights, the department worked with the airline industry to help them secure the needed clearances to carry out evacuation flights in high-demand countries. The State Department said that these flights enabled it to focus its own resources to send chartered flights where \"airspace, border closures, and internal curfews have been the most severe.\" While evacuations are still ongoing, the department estimated in late April that around 40% of U.S. citizens who were evacuated for reasons related to COVID-19 returned to the United States on commercial rescue flights. Congress authorizes funding for the evacuation-related activities through the Emergencies in the Diplomatic and Consular Service (EDCS) account, which is part of the annual Department of State, Foreign Operations, and Related Programs (SFOPS) appropriation. For FY2020, Congress appropriated $7.9 million for this account. Congress typically funds this account through no-year appropriations, thereby authorizing the State Department to indefinitely retain funds. The State Department is able to further fund emergency evacuations using transfer authorities provided by Congress. In recent SFOPS appropriations, for example, Congress has authorized the State Department to transfer and merge funds appropriated to the Diplomatic Programs, Embassy Security, Construction, and Maintenance, and EDCS accounts for emergency P.L. 116-123 , evacuations. Â  In addition to the funds and transfer authorities provided in annual appropriations legislation, Congress appropriated an additional $588 million for State Department operations (including $264 million appropriated through P.L. 116-123 and $324 million appropriated through P.L. 116-136 ) to \"prevent, prepare for, and respond to coronavirus,\" including by carrying out evacuations. P.L. 116-123 also increased the amount of funding the State Department is authorized to transfer from the Diplomatic Programs account to the EDCS account for emergency evacuations during FY2020 from $10 million to $100 million. The State Department began arranging evacuations of U.S. government personnel and private U.S. citizens in response to the COVID-19 pandemic on January 28, 2020, when the department started evacuating over 800 American citizens from Wuhan, China. An additional 300 American citizens who were passengers aboard the Diamond Princess cruise ship were subsequently evacuated in February. When COVID-19 continued to spread and was declared a global pandemic by WHO, the State Department accelerated its efforts to evacuate Americans amid actions by countries to close their borders and implement mandatory travel restrictions. On March 19, 2020, the State Department established a repatriation task force to coordinate and support these efforts. As of May 11, 2020, the State Department had coordinated the repatriation of more than 85,000 Americans on 886 flights. The State Department's current Level 4 Global Health Advisory warns that while the department is \"making every effort to assist U.S. citizens overseas who wish to return to the United States, funds \"may become more limited or even unavailable.\" Some Members of Congress have applauded the State Department's efforts to scale up consular assistance to U.S. citizens abroad during the COVID-19 pandemic. Other Members have expressed concern that as COVID-19 spread worldwide, the State Department was slow to communicate with and provide options to Americans abroad seeking repatriation. USAID is providing assistance to more than 100 affected and at-risk developing countries facing the threat of COVID-19. USAID identified these countries through a combination of the following criteria: trend of increasing confirmed cases of COVID-19, especially with evidence of local transmission; imported cases with high risk for local transmission due to connectivity to a hotspot; low scores on the Global Health Security Index classification of health systems and on the Global Health Security Agenda Joint External Evaluation, which measures compliance with IHR (2005); other vulnerabilities (unstable political situation, displaced populations); and the existence of other U.S. global health programs that could be leveraged. USAID is also providing funding to multilateral organizations, including the WHO, UNICEF, and the International Federation of the Red Cross and Red Crescent Societies for COVID-19 assistance, and to facilitate coordination with other donors. On February 7, 2020, USAID committed $99 million from the Emergency Reserve Fund (ERF) for Contagious Infectious Diseases. USAID received $986 million from the first emergency supplemental appropriation and an additional $353 million from the second. Examples of activities to which USAID resources will be programed include assisting target countries to prepare their laboratories for COVID-19 testing, implementing a public-health emergency plan for points of entry, activating case-finding and event-based surveillance for influenza-like illnesses, training and equipping rapid-response teams, investigating cases and tracing the contacts of infected persons, and adapting health worker training materials for COVID-19. As of May 1, 2020, USAID pledged to provide $653 million for international COVID-19 response, $215 million of which has been obligated. The pledged amounts include $99 million from the ERF, $100 million from the Global Health Programs (GHP) account, $300 million in humanitarian assistance from the International Disease Assistance (IDA) account, and $153 million from the Economic Support Fund (ESF). Congress appropriates funds for USAID global health security and pandemic preparedness activities through annual State, Foreign Operations, and Related Programs appropriations ( Table 4 ). From FY2009 through FY2019, the bulk of USAID's pandemic preparedness activities have been implemented through the Emerging Pandemic Threats (EPT) program. Those efforts comprised USAID's contribution towards advancing the Global Health Security Agenda (see \" International Health Regulations \") and are being leveraged for COVID-19 responses worldwide. Key related activities include strengthening surveillance systems to detect and report disease transmission; upgrading veterinary and other national laboratories; strengthening programs to combat antimicrobial resistance (AMR) in the public health and animal-health sectors; training community health volunteers in epidemic control and designing community-preparedness plans; conducting simulation exercises to prepare for future outbreaks; and establishing or strengthening emergency supply-chain programs specially designed to deliver critically needed commodities (e.g., personal protective equipment) to affected communities during outbreaks. The PREDICT project was a key part of the EPT program. According to USAID, the second phase of the project, PREDICT-2 (2015-2019), helped nearly 30 countries detect and discover viruses with pandemic potential. The project has detected more than 1,100 unique viruses, 931 of which were novel viruses (such as Ebola and coronaviruses); sampled over 163,000 animals and people; and provided $207 million from 2009 through 2019. USAID has responded to 42 outbreaks through PREDICT-2, which ended in March 2020 (following a three-month extension). In May 2020, USAID announced that it will use the lessons learned through PREDICT to inform its new STOP Spillover project. The STOP Spillover project is aimed at building capacity in partner countries to stop the spillover of zoonotic diseases into humans. USAID aims to \"award the STOP Spillover project by the end of September 2020, through a competitive process, as PREDICT sunsets as scheduled.\" CDC has staff stationed in more than 60 countries who have been providing technical support, where relevant, and is receptive to bilateral requests for assistance or requestsÂ for assistance through the Global Outbreak Alert and Response Network (GOARN). CDC is working with WHO and other partners, including USAID and the Department of State, to assess needs and accelerate COVID-19 control, particularly by helping countries to implement WHO recommendations related to the diagnosis and care of patients, tracking the epidemic, and identifying people who might have COVID-19. Through supplemental appropriations ( P.L. 116-123 ), Congress provided CDC $300 million for global disease detection and emergency response. CDC plans to obligate $150 million of the funds by the end of FY2020. Related efforts will focus on disease surveillance, laboratory diagnostics, infection prevention and control, border health and community mitigation, and vaccine preparedness and disease prevention. CDC is reportedly working closely with USAID and Department of State to ensure a coordinated U.S. government approach to the COVID-19 pandemic. CDC is prioritizing countries based on the current status of COVID-19 in country and future trajectory of its spread; the ability to effectively implement activities given CDC presence, capacity and partnerships in the country; and the capacity to provide support to other countries in the region. CDC staff are working with colleagues in partner countries to conduct investigations that will help inform COVID-19 response efforts. Through the Global Health Protection line item of annual Labor-HHS appropriations, CDC works to enhance public health capacity abroad and improve global health security, particularly through GHSA ( Table 5 ). CDC works to bolster global health security and pandemic preparedness in 19 countries by focusing on enhancing the core foundations of what CDC views as strong public health systemsâcomprehensive disease surveillance and integrated laboratory systems, a strong public health workforce, and capable emergency management structures. Programs within CDC's global health security portfolio include the following: The Field Epidemiology Training Program (FETP) trains a global workforce of field epidemiologists to increase countries' ability to detect and respond to disease threats, address the global shortage of skilled epidemiologists, and deepen relationships between CDC and other countries. Over 70 countries have participated in FETP with more than 10,000 graduates. National Public Health Institutes (NPHI) help more than 26 partner countries carry out essential public health functions and ensure accountability for public health resources. The program focuses on improving the collection and use of public health data, as well as the development, implementation, and monitoring of public health programs. Global Rapid Response Team (GRRT) is a team of public health experts who remain ready to deploy for supporting emergency response and helping partner countries achieve core global health capabilities. The GRRT focuses on field-based logistics, communications, and management operations. Since the GRRT's inception, more than 500 CDC staff have provided over 30,000 person-days of response support. From January through March 2020, CDC staff has completed more than 100 deployments for COVID-19 response. Core and surge members support domestic deployments to quarantine stations and repatriation sites, international deployments, WHO and country office operations, and the Emergency Operations Center in Atlanta. The Public Health Emergency Management (PHEM) program trains public health professionals affiliated with international ministries of health on emergency management and exposes them to the CDC Public Health Emergency Operations Center. To date, the program has graduated 142 fellows from 37 countries (plus the African Union). DOD is conducting medical surveillance for COVID-19 worldwide. Related activities entail daily monitoring of reported cases, including persons under investigation (PUI), confirmed cases, and locations of such individuals, as well as surveillance for COVID-19 at China's southern border. DOD is supporting the U.S. CDC with additional laboratory capabilities. The DOD Laboratory Network, which includes military facilities in the United States and in certain overseas locations, has made available to interagency network laboratories its \"detection and characterization capabilities â¦ to support COVID-19-related activities across the globe.\" The Secretary of Defense also has directed geographic combatant commanders to \"execute their pandemic plans in response to the [COVID-19] outbreak.\" The Families First Coronavirus Response Act ( P.L. 116-127 ) became law on March 18, 2020. Title II of Division A of the act included $82 million for the Defense Health Program to waive all TRICARE cost-sharing requirements related to COVID-19. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) became law on March 27, 2020. Title III of Division B of the act included $10.5 billion in emergency funding for DOD. Of the $10.5 billion, $4.9 billion (47%) is for the Defense Health Program (DHP), according to the bill text . The DHP funding included $1.8 billion for patient care and procurement of medical and protective equipment; $1.6 billion to increase capacity in military treatment facilities; $1.1 billion for private-sector care; and $415 million to develop vaccines and to procure diagnostic tests, according to a summary released by the Senate Appropriations Committee. H.R. 748 also provided $2.5 billion for the defense industrial base, including $1.5 billion in defense working capital funds and $1 billion in Defense Production Act purchases; $1.9 billion in operations and maintenance (O&M) funding for the Services, in part to support deployment of the hospital ships USNS COMFORT and USNS MERCY to ease civilian hospital demand by caring for non-COVID patients; and $1.2 billion in military personnel (MILPERS) funding for Army and Air National Guard personnel deployments. DOD has not detailed how much of the emergency funding may be used to support international activities related to COVID-19, though DOD has stated it is working with the Department of Health and Human Services and the Department of State to provide support in dealing with the pandemic. As part of missions that began in March, Air National Guard C-17 cargo aircraft have transported hundreds of thousands of coronavirus testing swabs from Italy to the United States. The swabs have been distributed to medical facilities around the country at the direction of the Department of Health and Human Services. The degree to which U.S. security operations around the world may be affected due to personnel becoming infected has yet to be determined. Numerous media reports suggest that various parts of the U.S. military have seen a significant number of servicemembers contract or die from COVID-19 related symptoms. Citing operational security concerns, on March 30, 2020 the Department of Defense (DOD) directed military service commanders not to share the number of personnel affected by the COVID-19. In justifying this policy the DOD stated, \"We will not report the aggregate number of individual service member cases at individual unit, base or Combatant Commands.Â We will continue to do our best to balance transparency in this crisis with operational security.\" Also, as of April 1, 2020, reportedly the Department of Homeland Security had nearly 9,000 employees whose exposure to COVID-19 that has taken them out of the workforce, and deployed U.S. Naval vessels, such as the USS Theodore Roosevelt, have had their operational effectiveness called into question. U.S.-China relations were fraught well before the outbreak of COVID-19, with the two governments engaging in a bitter trade war, competing for influence around the globe, and clashing over such issues as their activities in the South China Sea, China's human rights record, and China's Belt and Road Initiative. The pandemic appears to have increased the acrimony. On February 3, when the COVID-19 outbreak was at its peak in China, a spokesperson for China's Foreign Ministry blasted the United States for its response to the crisis there. \"The U.S. government hasn't provided any substantive assistance to us, but it was the first to evacuate personnel from its consulate in Wuhan, the first to suggest partial withdrawal of its embassy staff, and the first to impose a travel ban on Chinese travelers,\" the spokesperson charged. \"What it has done could only create and spread fear.\" Days later, Secretary of State Michael R. Pompeo announced the United States would make available up to $100 million in existing funds \"to assist China and other impacted countries,\" and that the State Department had facilitated the delivery to China of 17.8 tons of personal protection equipment and medical supplies donated by the private sector. As COVID-19 transmission has accelerated in the United States, the Trump Administration has stepped up criticism of China's early response to the outbreak. Secretary Pompeo told an interviewer on March 24, \"unfortunately, the Chinese Communist Party covered this up and delayed its response in a way that has truly put thousands of lives at risk.\" Spokespeople for the State Department and China's Foreign Ministry have traded COVID-19-related accusations on Twitter. On March 12, a Chinese spokesperson tweeted, \"It might be US army who brought the epidemic to Wuhan.\" Secretary Pompeo accused China of waging a disinformation campaign \"designed to shift responsibility,\" and President Trump for several days referred to COVID-19 as \"the Chinese virus.\" On April 17, in announcing his decision to withhold U.S. funding from the World Health Organization, President Trump accused the multilateral institution of having \"pushed China's misinformation about the virus, saying it was not communicable and there was no need for travel bans.\" Administration officials have also repeatedly suggested that a Chinese research institution may have been the source of the virus. On April 30, 2020, when asked if he had seen anything \"that gives you a high degree of confidence that the Wuhan Institute of Virology was the origin of the virus,\" the President replied, \"Yes, I have.\" The same day, the Office of the Director of National Intelligence stated that the intelligence community would continue efforts \"to determine whether the outbreak began through contact with infected animals or if it was the result of an accident at a laboratory in Wuhan,\" indicating continuing uncertainties about the virus's origin. China has pushed back against U.S. allegations, including in a \"Reality Check\" document tweeted by a Chinese Foreign Ministry spokesperson responding to 24 U.S. allegations, which the spokesperson calls \"lies.\" (The document argues, for example, that the Wuhan Institute of Virology \"does not have the capability to design and synthesize a new coronavirus, and there is no evidence of pathogen leaks or staff infections in the Institute.\") Chinese spokespeople have gone on the offensive in criticizing the U.S. response to COVID-19 and have doubled down on spreading a conspiracy theory that the virus could have originated in the United States. On May 8, a Chinese Foreign Ministry spokesperson tweeted, \"The #US keeps calling for transparency & investigation. Why not open up Fort Detrick & other bio-labs for international review? Why not invite #WHO & int'l experts to the U.S. to look into #COVID19 source & response?\" Some U.S.-based analysts have expressed alarm about the downward spiral in bilateral relations. Some see neither the United States nor China helping to coordinate a global response to the pandemic, and argue, \"U.S.-China strategic competition is giving way to a kind of 'managed enmity' that is disrupting the world and forestalling the prospect of transnational responses to transnational threats.\" Others suggest, \"There will be time later to assess the early mistakes of China and others in greater detail, but the virus is out there now and we should be tackling it together.\" Some have called for cooperation in vaccine development and distribution, and in addressing the economic crisis the virus is causing in the developing world.\" Writing in The Washington Post , China's Ambassador to the United States suggested on May 5 that China would still be open to cooperation. \"Blaming China will not end this pandemic,\" he wrote. \"On the contrary, the mind-set risks decoupling China and the United States and hurting our efforts to fight the disease, our coordination to reignite the global economy, our ability to conquer other challenges and our prospects of a better future.\" In a May 14, 2020, Fox News interview, President Trump said, however, that he had no desire to speak to China's leader Xi Jinping. He suggested that to punish China, \"we could cut off the whole relationship.\" Apparently referring to the U.S. trade deficit with China, which was $378.6 billion in 2019, the President added, \"You'd save $500 billion if you cut off the whole relationship.\" Several Members of Congress have introduced legislation criticizing China's response to the COVID-19 pandemic (see Appendix ). Southeast Asia was one of the first regions to experience COVID-19 infections and the outbreak could have broad social, political, and economic implications in the months ahead and possibly years ahead. The region's countries are deeply tied together through trade and the movement of labor, links that could be reshaped if the outbreak leads to broad policy changes. Their economies have already been affected by disruptions to these links, and broad economic networks and supply chains could be reshaped if the outbreak leads to broad policy changes. As an example, Malaysia banned overseas travel on March 18, affecting approximately 300,000 Malaysians who work in neighboring Singapore. Malaysia, however, changed tack on April 14 and allowed Malaysians in Singapore to return if they agreed to be tested and placed in quarantine. In Singapore, widespread outbreaks among migrant laborers, mostly from South Asia, who live in crowded dormitories, have led to the region's largest number of COVID-19 infections. Other regional issues include the following: Indonesia and the Philippines, the region's two most populous nations, appear to be experiencing widening outbreaks and may have a significantly larger COVID-19 case count than their public health systems are able to detect and address. Malaysia and Thailand, which have undergone substantial political turmoil in recent years, have relatively new governments that could face legitimacy questions based on their responses to the pandemic and as their economies begin the process of opening. Some nations, including the Philippines and Cambodia, have taken actions that raise concerns about human rights and freedoms. Philippine President Rodrigo Duterte has imposed strict lockdown measures that one U.N. official criticized as \"highly militarized,\" and these measures have resulted in more than 120,000 arrests, disproportionally affecting poor urban residents. Human rights groups have criticized a draft emergency order by Cambodia's government that would give it greater control over traditional and social media. Some of the region's poorest countries, including Burma and Laos, have reported relatively few COVID-19 cases, highlighting questions about transparency in nations that may be particularly vulnerable given their underdeveloped health systems. Much of the Southeast Asian diplomatic calendar, which drives regional cooperation on a wide range of issues including trade and public health, has been cancelled or has moved to virtual meetings. The International Institute for Strategic Studies (IISS) has cancelled this year's iteration of its annual Shangri-la Dialogue, slated for June 5-7, after consultations with the government of Singapore. In Central Asia, the economic impacts of the pandemic may affect the roles of Russia and China in the region. Given disruptions to trade and cross-border movement, the pandemic could reverse recent progress on regional connectivity, a U.S. policy priority in Central Asia. The COVID-19 pandemic is placing significant economic pressure on Central Asian countries due to declines in domestic economic activity, economic disruptions in China and Russia, and the fall in hydrocarbon prices. China has cut the volume of natural gas imports from Central Asia due to falling demand, and analysts speculate that Chinese investment in the region may also shrink. Turkmenistan sends almost all of its gas exports to China and is particularly vulnerable, as the Turkmen government uses gas exports to service billions of dollars of Chinese loans. The economic impact of the pandemic will likely interrupt the flow of remittances from Russia, where millions of Kyrgyz, Tajik, and Uzbek citizens work as labor migrants, accounting for significant percentages of their countries' GDPs. Some measures implemented to combat the spread of COVID-19 could provide governments in the region with the means to suppress political and media freedoms. Human Rights Watch has stated that Central Asian governments are failing to uphold their human rights obligations by limiting access to information and arbitrarily enforcing pandemic-related restrictions. In Kazakhstan, authorities have detained government critics and journalists on suspicion of \"disseminating knowingly false information during a state of emergency,\" a charge that can be punished by up to seven years in prison. Kyrgyz authorities restricted the ability of independent media outlets to report for over a month using provisions in the country's state of emergency. The government of Tajikistan has been suppressing information on the pandemic, refusing to answer media questions and blocking a website that crowdsources information on COVID-19 fatalities in the country. The seven countries of South Asia are home to about 1.8 billion people, nearly one-quarter of the world's population. In most South Asian countries, per capita spending on health care is relatively low and medical resources and capacities are limited. Dense populations and lack of hygiene are facilitating factors for pandemics, and with medical equipment needed to address the crisis in short supply, South Asia nations are likely to face serious risk. As of May 1, 2020, the United States had provided nearly $6 million in health assistance to help India slow the spread of COVID-19 and nearly $15 million to assist Pakistan's response. The COVID-19 crisis has put a broad hold on activities related to U.S.-India and regional multilateral security cooperation, as well as delayed sensitive negotiations on U.S.-India trade disputes. The postponement of a planned March visit to New Delhi by Secretary of Defense Mark Esper had led to worries by some of inertia in bilateral defense relations. With India and Pakistan still engaged in a deep-rooted militarized rivalry, any generalized South Asian crisis, especially in the disputed region of Kashmir, could lead to societal breakdowns and/or open interstate conflict between these two nuclear-armed countries. India. Several U.S. and Indian firms are cooperating on research for a coronavirus vaccine. India is home to several major vaccine manufacturers and is the world's leading producer of hydrocholoquine, an anti-malarial drug President Trump has touted as a potential treatment for COVID-19. In April, the U.S. President suggested that the United States might retaliate against India if New Delhi bans export of the drug and fails to fulfill an existing large-scale U.S. purchase order. India has agreed to allow limited exports. The COVID-19 crisis has led to more acute questioning of the political leadership in India, where since last year Prime Minister Narendra Modi has faced mass protests over new citizenship laws and persecution of Muslims. Reports indicate that the health pandemic is fueling greater oppression and persecution of Indian Muslims, with that community coming under blame for the pandemic from some quarters. Accusations also have arisen that the New Delhi government is using the pandemic as a cover for increased efforts to limit press freedoms. India's Jammu and Kashmir territoryâwhich came under a strict security lockdown in August 2019 and lost statehood in Novemberâreportedly faces a \"double lockdown\" with the pandemic and resulting severe physical and psychological hardships. The New Delhi government may be using the pandemic as cover to further consolidate its grip on the disputed Kashmir Valley. In Pakistan , Prime Minister Imran Khan was already dealing with widespread disaffection related to his government's performance and legitimacy. In late March, the powerful military \"stepped in and sidelined\" the civilian leadership after the Khan government's national pandemic response was criticized for perceived indecisiveness. By some accounts, the Pakistan government has also \"caved in to the demands of clerics\" regarding lockdown regulations. In Bangladesh , social distancing is difficult for many living in densely populated areas. In addition, over 1 million displaced Rohingya reside in overcrowded and unsanitary camps along Bangladesh's border with Burma. Of these Rohingya, approximately 630,000 live in the Kutupalong camp, which may be the world's largest refugee camp. The population density in the campsâ104,000 people per square mile in Kutupalongâposes challenges for social distancing, quarantine, and isolation. Any COVID-19 transmission in the camps would likely quickly overwhelm medical facilities and services, and because of the camps' porous perimeters, risk spreading into neighboring Bangladeshi towns and villages. Bangladesh reportedly quarantined a number of Rohingya on Bhansan Char island to prevent the spread of COVID-19. In both Australia and New Zealand, relations with China have been further strained by the COVID-19 pandemic. In April 2020, Australia expressed its support for an international investigation into the origins and spread of the pandemic, a call that raised sensitivities in the PRC. China's Ambassador Cheng Jingye in an Australian newspaper interview warned \"that pursuing an inquiry could spark a Chinese consumer boycott.\" Opposition Foreign Affairs spokesperson Penny Wong has signaled Labor's support of the government on the issue. In the view of one commentator, such attempts at \"intimidation\" and \"economic coercion\" make it \"now plain for all to see that the CCP is waging political war on Australia, using trade as a weapon. This is Australia's moment of clarity.\" In May, China berated New Zealand for supporting Taiwan's participation at the World Health Organization. New Zealand Foreign Minister Winston Peters stated, \"[w] e have to stand up for ourselves\" when asked about China's response to New Zealand's position on Taiwan. The presence and spread of COVID-19 in Afghanistan is adding new confusion to the Afghan peace process, already complicated by an extended political crisis in Kabul. The February 29, 2020 agreement signed by U.S. and Taliban negotiators commits the United States to withdraw about 3,500 of the 12,000 troops it has in Afghanistan by mid-June 2020 (with commensurate drawdowns of international forces). There have since been conflicting reports about how the COVID-19 pandemic is impacting that timeline. Most notably, the United States announced on March 18 that it is pausing the movement of personnel into and out of theater due to concerns about COVID-19. More recent reports indicate that the withdrawal is proceeding apace, if not ahead of schedule, and NBC News reported in April 2020 that President Trump has called for further accelerating the withdrawal of U.S. troops out of Afghanistan because of the pandemic. The U.S.-Taliban agreement also called for negotiations between the Taliban and Afghan government representatives to begin by March 10, but thus far no formal negotiations have taken place or been scheduled. Some limited engagements were held over Skype, due to the pandemic, but talks are chiefly held up by a disputed prisoner exchange. Further spread of COVID-19 in Afghanistan could present opportunities for compromise and intra-Afghan cooperation. For example, Afghan government representatives have expressed support for Taliban efforts to combat the virus in areas they control. In addition, while the Taliban have reportedly targeted health workers in the past, a Taliban spokesman announced that the group \"assures all international health organizations and WHO of its readiness to cooperate and coordinate with them in combatting\" COVID-19, a commitment they appear to have upheld. At the same time, some observers dismiss the Taliban's response as a propagandistic attempt to undermine the legitimacy of the Afghan government, and charge that the Taliban's dramatic escalation of violence since February 2019 is the main factor impeding the country's response to the pandemic. Afghanistan may be at particularly high risk of a widespread COVID-19 outbreak, due in part to its weak public health infrastructure and its porous border with Iran, a regional epicenter of the pandemic where up to three million Afghan refugees live. More than 277,000 Afghans have returned to Afghanistan from Iran since January 1, 2020. Asian governments outside mainland China were the first to deal with COVID-19. Five jurisdictions, in particular, have received wide praise for their COVID-19 control approaches: Taiwan, Hong Kong, South Korea, Australia, and New Zealand. Singapore was also praised for its initial actions to control the virus, although a large \"second wave\" of infections has pointed to vulnerabilities that even jurisdictions perceived as well-run still face. All of these jurisdictions have drawn on their experiences in addressing previous public health emergencies, including outbreaks caused by SARS, swine and avian flu, and MERS. Those experiences fostered bureaucratic and public attentiveness to public health challenges and prompted governments to develop active protocols for screening, testing, isolating infected individuals, and tracing their contacts. Prior experience may also have conditioned people in those places to follow standard infection control measures (frequent hand-washing, mask-wearing, and social distancing) and to more readily accept quarantines and movement restrictions. Some of these jurisdictions have begun the process of loosening restrictions related to COVID-19, which may provide lessons for the United States and others. Taiwan. Taiwan (which officially calls itself the Republic of China, or ROC), is located just 81 miles off the coast of mainland China. On December 31, 2019, the same day China notified the WHO China Office of pneumonia cases of unknown origin, Taiwan officials had begun to board planes arriving from Wuhan to evaluate passengers who had fever or pneumonia symptoms. Travel alerts, routine passenger screenings, and directives to self-quarantine soon followed, and by early February, Taiwan barred residents of mainland China from entry. Taiwan also extended indefinitely a suspension of cross-Strait flights from all but five airports in mainland China, previously set to expire at the end of April. On January 20, Taiwan both confirmed its first COVID-19 case and activated a Central Epidemic Command Center (CECC) to lead and coordinate the government's response to the COVID-19 crisis. The CECC is part of the National Health Command Center, a 24/7 central command headquarters created in 2004 following the SARS outbreak. The government also integrated its national health insurance, customs, and immigration databases to facilitate case identification and tracking. The concentration of public health expertise among Taiwan's top leaders likely contributed to the government's attentive response. Taiwan's vice president, vice president-elect, vice premier, and minister of health are all public health experts. The government has also issued strict and transparent guidance to contain the spread of the virus, which its citizens largely appear to have followed. Taiwan has tested widely for the virus, including mandatory tests for certain groups and tests for patients with respiratory illnesses that tested negative for the flu. Directives to conduct \"self-health management\" or self-quarantine have been enforced by harnessing cellphone location data and punishing violators with steep fines. The government's daily press conferences and frequent broadcasts of public service announcements have heightened public awareness and facilitated compliance with best practices. Taiwan also created informational apps, to help citizens track the spread of the virus and locate supplies of masks. In February and March, the government announced economic relief and stabilization measures, including approximately USD$2 billion to assist Taiwan industries affected by the outbreak, and payments totaling $465 to individuals who were quarantined or providing care for the quarantined. Hong Kong. Initially, the government of Hong Kong, a Special Administrative Region (HKSAR) of the People's Republic of China, resisted taking aggressive measures to prevent a COVID-19 outbreak. Public criticism of what many considered an insufficient and inconsistent initial response appears to have contributed to the government's subsequent decision to act. A newly formed union of doctors and nurses working for the Hong Kong Hospital Authority held a strike on February 3, 2020, demanding the HKSAR government close the city's border with mainland China, for example. The HKSAR government closed all but two of the land crossings with mainland China the next day. The government implemented a mandatory 14-day quarantine for all arrivals to Hong Kong on March 17, 2020, which remains in effect. The HKSAR government has also indefinitely closed Hong Kong's borders to all non-resident arrivals (except people from Mainland China, Macau and Taiwan who have not been to another country in the previous 14 days). The government has also developed an extensive range of public service announcements, web pages, and other modes of informing the public about COVID-19. Although the HKSAR government may have hesitated, Hong Kong's public quickly adopted social distancing and anti-contamination behaviors developed during previous viral outbreaks. Similarly, medical professionals quickly implemented anti-viral protocols. After 14 days without a confirmed local case of contagion and only a few \"imported cases,\" on May 5, 2020, the HKSAR government began to selectively relax its restrictions, reopening government offices and selective businesses while maintaining the requirement to wear masks in public and prohibiting gatherings of more than eight people. The same day, it also announced that it would provide every Hong Kong resident with a free reusable face mask that complies with the American Society for Testing & Materials F2100 Level 1 Standard in terms of particle and bacterial filtration efficiency. The HKSAR government, however, also noted that restrictions may be reinstated if there is an increase in local cases. Singapore. Singapore, a Southeast Asian city-state of 5.7 million people, has offered lessons perceived as both positive and cautionary in its handling of the pandemic. Singapore was one of the first nations outside China to report COVID-19 cases, with its first infection reported on January 23. Public health experts have praised Singapore's rapid early actions, including extensive monitoring of cases and their contacts, temperature checks at building entrances, and clear public messaging. Singapore health officials conducted detailed interviews of affected individuals, requiring those who had come into contact with them to quarantine themselves. The Health Ministry developed the capacity to test more than 2,000 individuals a day. Individuals who come within two meters of an infected individual or spend 30 minutes with one are required to undergo testing and to quarantine or be placed under observation. Individuals found to have misled health officials are subject to criminal penalties including fines and the threat of imprisonment. The Health Ministry issues daily updates on individual cases and the numbers of people under care or protective quarantine, including details of where each individual who has tested positive lives. Despite its early successes curbing the spread, Singapore has experienced a significant \"second wave\" of cases, leading authorities to close schools and most businesses, steps that they had avoided earlier. Many of the new cases have come from crowded quarters where migrant workers live, and the expansion has left Singapore with Southeast Asia's largest number of COVID-19 infections, as of May 11. South Korea. After cases were confirmed in South Korea in late January, authorities pursued an aggressive testing regimen and public communication strategy. South Korea describes its strategy as the three \"T\"s: tracking, testing, and treatment. By early May, the number of new cases per day had fallen to 6.4. As of early May, nearly 660,000 citizens had been tested for the virus âthe highest rate of testing per capita in the worldâat over 600 sites, including pop-up facilities and drive-through sites. Results are generally provided within 24 hours. The case fatality ratio (1.64% as of March 30) has also been low, which health officials attribute to early detection and treatment, as well as universal health care. As of early May, South Korea has been able to stabilize the outbreak without lockdowns or wholesale travel bans, in part, experts argue, by being transparent and disseminating information about the virus' spread, including possible infections at the neighborhood level. President Moon Jae-in has stepped aside to allow national health officials to take the lead in delivering twice-daily messages to the public. After MERS killed 38 people in 2015, South Korea reformed its health policy by granting the government greater powers to monitor and track individual patients and to allow private companies to rapidly produce tests. Shortly after the COVID-19 outbreak hit, authorities were able to test 10,000 patients daily. Authorities can now test over 20,000 patients per day. Australia . Observers believe that Australia's mitigation efforts (including self-isolation, movement restrictions, a two-week quarantine for those entering the country), the public's general adherence to rules, and widespread testing and tracing of contacts may be responsible for a relatively successful effort to contain the pandemic in Australia. Australia reportedly has one of the highest per capita testing rates in the world. In April 2020, the Australian government launched \"Covidsafe,\" an application that traces every person running it with other application users that have tested positive for COVID-19. Using Bluetooth, the app records others that have been within 1.5 meters for 15 minutes or more who also have the app. Within three days of its release, 3 million Australian had reportedly signed up for the app. New Zealand . New Zealand confirmed its first case of coronavirus on February 28, 2020. The late date of the first outbreak, New Zealand's relative isolation, swift early response, and widespread testing all appear to have helped New Zealand to effectively deal with the virus. On March 14, with only six confirmed COVID-19 cases in the country, Prime Minister Jacinda Ardern announced that all entering New Zealand would have to self-isolate for two weeks and that the existing travel ban for those coming from China and Iran would remain in place. From March 19, the New Zealand border has been closed to almost all travelers, with only New Zealand citizens, residents, and their immediate families allowed to enter the country. This was a significant move for the country, which has an estimated 4 million international visitors a year, and where tourism accounted for approximately 5.8% of GDP for the year ending March 2019. Since April 9, arrivals have been placed in \"managed isolation facilities,\" and those deemed to be high risk have been placed in quarantine facilities. New Zealand has moved from lockdown to an easing of restrictions in a relatively short period of time. Prime Minister Ardern announced on March 23 that New Zealand would enter a level 4 lockdown on March 25, when it had less than 150 cases. New Zealand then moved to alert level 3 on April 27. It subsequently moved to alert level 2 on May 13, under which most businesses will be open, tertiary education will open, travel between regions of the country, and gatherings up to 10 people will be allowed. Border controls and physical distancing requirements will remain, wide scale testing will continue, and those unwell or who have been in contact with the sick will be isolated. New Zealand and Australia have reached an agreement to lift travel restrictions between their two countries and establish a Trans-Tasman COVID Safe Zone, or travel bubble, as soon as it is safe to do so. On March 13, 2020, WHO officials characterized Europe as the new global epicenter of the COVID-19 pandemic, noting that more cases were being reported each day in Europe than were reported in China at the height of its epidemic. As of May 15, about 1.2 million infections and nearly 155,000 deaths had been reported across the 27-member European Union (EU) and United Kingdom (UK). Italy, Spain, and the UK have been particularly hard hit, but infection rates grew across Europe throughout the month of March. Ukraine, Russia, and other parts of the former Soviet Union also reported a growing number of new COVID-19 cases. Since mid-April, a growing number of European governments have expressed cautious optimism that their countries have passed the peak of the crisis. Many European countries, including France, Germany, Italy, and Spain, have announced and begun to implement staged \"re-opening\" plans, slowly rolling back some of the \"lockdown\" measures implemented in March. Government officials caution, however, that reopening measures are strictly conditions-based and could be halted if infection rates grow. European leaders have characterized the pandemic as Europe's biggest challenge since the Second World War, with potentially severe economic consequences and far-reaching social and political implications beyond the public health impact. European governments and the EU are enacting an array of policy responses. Authorities in most European countries initially imposed strict limitations on the movement of people and are undertaking significant fiscal and monetary measures. Key measures taken in Europe to combat the pandemic include the following: Initial \" l ock downs\" t ransitioning to c autious r eopening . On March 9, Italy became the first country to impose a nationwide quarantine, prohibiting \"non-essential\" movement within the country and closing all non-essential businesses; France, Germany, the United Kingdom, and others followed with similar restrictions. Almost all European countries closed schools and some types of businesses and have restricted public gatherings to varying degrees. Numerous European governments mobilized their military forces to assist response efforts, including constructing makeshift hospitals. In some countries, government authorities scaled back public transportation and introduced curfews. In mid-April, some European countries began announcing plans for a gradual reopening of their societies and economies in the coming months, but the pace of reopening measures vary across Europe, and leaders caution that such measures would be contingent on a clear reduction in infection rates. European governments have generally stressed the importance of a staged approach to reopening, allowing for regional differences depending on regional infection rates and hospital and testing capacity. They also have sought to implement widespread testing and contact tracing capacity. Economic stimulus . Many analysts predict that the COVID-19 pandemic could cause a financial crisis in Europe that might be several times worse than the 2008 global recession. European governments and the EU have announced an array of measures to mitigate a severe economic downturn. Measures include loan programs and credit guarantees for companies, income subsidies for affected workers, tax deferrals, and debt repayment deferments. On May 14, the Italian government announced a â¬55 billion (about $60 billion) stimulus plan. In France, President Emmanuel Macron has pledged to provide unlimited budgetary support to companies and workers, which the government says could cost upward of â¬45 billion ($48 billion). Germany has announced direct fiscal support of â¬236 billion (about $256 billion) and a â¬500 billion ($536 billion) loan program. Other countries have announced similar relief measures. On March 18, the European Central Bank, which manages the EU's common currency (the euro), announced a Pandemic Emergency Purchase Program (PEPP) of about â¬750 billion ($803 billion) aimed at calming markets and stemming a debt crisis in the Eurozone (the 19 EU member states that use the euro as their currency). On April 9, Eurozone leaders agreed to a new financial assistance package of at least â¬540 billion (roughly $590 billion). This package includes access to credit lines through the European Stability Mechanism (ESM, the Eurozone's \"bail-out\" fund) worth approximately â¬240 billion ($261 billion) for health-related costs, establishment of a European Investment Bank fund to back up to â¬200 billion ($219 billion) in loans for businesses, and a â¬100 billion ($110 billion) unemployment benefit support plan. Reaching consensus on this financial package was contentious and exposed divisions among EU member states. The package does not include establishing common EU debt instruments (or \"corona bonds\")âone of the most controversial proposals supported by hardest-hit countries such as Italy, Spain, and Franceâbut EU leaders will likely continue to discuss this option and other potential economic measures. Border closures . Numerous European governments have enacted national border controls and some have restricted entry only to national citizens. These measures have complicated efforts to maintain the free movement of goods, services, and people (key elements of the EU's single market) on which the EU's highly integrated economy depends. National border controls and closures within the EU's internal border-free Schengen Area âin which individuals may travel without passport checks among 22 EU member states and four non-EU countriesâresulted in long delays at several borders. On March 16, 2020, EU leaders agreed to implement a temporary ban on \"non-essential travel\" into the EU and the Schengen Area for most foreign nationals from outside countries (including the United States), partly in an effort to preserve freedom of movement within the EU. This ban on nonessential travel into the EU and the Schengen Area is expected to remain in place until at least June 15. Many analysts contend that the disparate national reactions to the COVID-19 pandemic are endangering the EU's single market and Schengen system, with possible long-term implications for the EU's future. Managing the spread of COVID-19 has added new tensions to already strained U.S.-European relations. The EUâa frequent target of criticism from President Trumpâexpressed dismay with the announcement from the Trump Administration on March 11, 2020 of a travel ban on foreign nationals arriving in the United States from the Schengen Area. In a joint statement on March 12, EU leaders noted that COVID-19 was a global crisis that \"requires cooperation rather than unilateral action\" and expressed disapproval that the U.S. travel ban was imposed \"without consultation.\" U.S. officials countered that the travel ban decision had to be taken quickly and was based on the WHO's assessment of sustained transmission in the Schengen Area. The Trump Administration subsequently extended the travel ban beyond the Schengen Area to the UK and Ireland. Nevertheless, some analysts on both sides of the Atlantic asserted that the U.S. travel ban was scapegoating the EU, threatened future U.S.-EU relations, and imperiled broader U.S.-European political and security alliances. Some European leaders and EU officials also object to certain elements of the U.S. international response to the COVID-19 pandemic. Many European policymakers have criticized President Trump's decision to halt U.S. funding to the WHO pending a review of its role in allegedly mismanaging the pandemic response. EU officials have expressed concern that U.S. economic sanctions are blocking humanitarian supplies for hard-hit countries such as Iran and Venezuela. Some European officials, including in Germany and France, have complained about U.S. efforts to outbid them in the global marketplace for facemasks and other critical medical equipment. Some critics have also bemoaned the lack of coordinated U.S.-European leadership in mobilizing a global response to control the pandemic and address its wider societal and economic consequences. As of May 12, 2020, all countries in sub-Saharan Africa (\"Africa\") except Lesotho had confirmed COVID-19-cases. South Africa had 11,000-plus cases, 25% of Africa's total. Most early cases were imported, notably from Europe, or linked to such cases. Africa's known COVID-19 caseloads have lagged those of more developed countries, and Africa's per capita incidence of COVID-19 remains very low in global comparison. Most countries in Africa, however, now have confirmed local COVID-19 transmission chains, and in some countries cases are surging. Prevention and mitigation strategies vary considerably in the region. Many governments have sought to increase COVID-19 testing capacity (though some have inadequate access to testing supplies), and to isolate confirmed and presumptive infected persons and trace their contacts. Many have improved their capacities in these areas since the start of the pandemic (see next section), in some cases building on lessons from past Ebola virus outbreak responses. Many African health systems, however, have limited capacities. Per capita ratios of doctors and health workers, rates of health spending, and hospital beds are some of the lowest globally, and supplies of healthcare goods (e.g., drugs, ventilators, and oxygen supplies) are low. Socioeconomic challenges also hinder prevention measures centering on hygiene (e.g., handwashing) and social distancing. Many Africans lack access to clean water or sanitation facilities, and live in high-density areas (e.g., informal urban settlements or displaced person camps). COVID-19 co-morbidity with other diseases widespread in the region (e.g., HIV and malaria) and/or chronic health problems (e.g., diabetes and malnutrition ) may increase the risk from COVID-19 in Africa. Most countries have launched public outreach campaigns centered on personal hygiene promotion, the use of facial masks, and social or physical distancing. Residential lockdowns, business restrictions, prohibitions on large gatherings, and school and university closures have been common. Some countries, however, have implemented only some of these various responses, or implemented them in limited geographic areas. Governments in multiple countries have authorized restrictive measures under pandemic national states of disaster or emergency. In several countries, security forces enforcing lockdowns and other restrictions have violated human rights, at times in the face of social unrest over the effects of these restrictive measures. In some countries, observers fear that incumbent regimes may use their emergency authorities to extend their powers or time in office, or, as some have, to restrict press freedoms or opposition activity. Given that many Africans make a precarious hand-to-mouth living in the informal sector, lockdowns have caused intense economic pain in the region, and governments have been eager to permit normal commercial activity to resume. A number of African governments began easing restrictive measures in late April, though in some countries, a spike in COVID-19 cases has accompanied or followed such actions. Experts are concerned that the pandemic's broader economic impacts could be particularly devastating in Africa, where many countries rely on tourism and/or commodity exports, notably to China. Both tourism and exports have declined sharply due to COVID-19-linked interruptions and declines in world economic activity, trade, and travel. In food import-dependent countries, food insecurity may also increase, due to these factors as well as lock-down linked restrictions. Remittances from abroad also have dropped. Africa's heavy reliance on imports of consumer and industrial goods from China may also suffer, alongside business sectors tied to these imports (e.g., digital technology and local retail sectors). Exports of mined and energy commodities, which comprise roughly 75% of African exports by value, may be particularly hard-hit. Africa's oil export-dependent countries may face a double threat: a global oil price collapse initially driven by a now-ended price war among selected producers and an ongoing collapse in global oil demand. African airlines also are suffering steep losses. Multiple central banks have acted to increase economy-wide liquidity and many governments are making resource reallocations or are slated to receive international assistance to finance COVID-19 responses. The African Union (AU) Africa Centres for Disease Control and Prevention (Africa CDC), at times in partnership with the WHO and other international actors, is helping African governments to enhance the capacity of their public health systems to detect and respond to COVID-19. Africa CDC support has centered on training personnel on disease detection and surveillance at national laboratories and ports of entry, providing COVID-19 test kits and other health commodities (e.g., personal protection equipment or PPE), and other health response capacity-building. The Africa CDC has provided COVID-19 detection training to at least 40 country labs, almost all of which are now able to independently test for the disease. These labs are supported by a regional COVID-19 specimen referral and verification system comprising expert labs in Senegal and South Africa, with ten more planned region-wide. The Africa CDC also has created a regional COVID-19 task force under a regional response plan, has activated its Emergency Operations Center and Incident Management System, and is aiding information sharing among AU member states. The Africa CDC also has trained epidemiologists in disease event tracking and risk analysis, including through its Regional Collaborating Centres (RCCs), and is providing COVID-19 medical and technical advice and pandemic briefings to AU member states. As of May 2020, all 17 countries in the Middle East and North Africa region, in addition to the Palestinian territories, had confirmed local transmission of COVID-19. Iran was an early epicenter of the pandemic; as of May, Iranian cases represent roughly 40% of all confirmed cases in the region. The six Arab Gulf states also have emerged as a focal point; as of May these states (combined) also represent nearly 40% of the region's confirmed cases. Observers and U.S. government officials have expressed concern that some states have sought to downplay the extent of the spread of the virus in their countries. Many countries in the region also lack the capability to conduct comprehensive testing. Starting in March, many countries suspended international and domestic passenger flights, closed land and sea crossings with neighboring states, imposed curfews, and closed commercial, educational, and religious sites. Some governments also passed emergency legislation and expanded surveillance as part of their response to the pandemic. In some cases, observers argued that these measures may have been designed in part to suppress political opposition. In Egypt, parliament expanded the country's emergency law; Human Rights Watch warned that most of the new authorities granted to the government are unrelated to public health issues. In Algeria, the government of recently elected President Abdelmadjid Tebboune banned all public gatherings of more than two people, including protest rallies, which had been held weekly for political reforms since February 2019. In Israel, the government approved temporary emergency regulations for security officials to monitor COVID-19 patients and potential victims via their mobile phones. Economies in the region have been hard hit by the collapse in global energy prices and tourism. As in other regions, government efforts to contain the spread of the virus have also involved the suspension of most public commerce and trade, resulting in a severe blow to economic activity that is expected to generate increased unemployment. In April, the IMF projected that the region comprising the Middle East, North Africa, Afghanistan, and Pakistan would contract by 3.1% in 2020, with oil exporters in the region contracting by 4.2%. Rising unemployment, particularly concentrated among the youth, could have implications for political stability in the region. A prolonged global economic slowdown associated with COVID-19 also could dampen global demand for oil and natural gas resources exported from countries in the Middle East and North Africa for a prolonged period, with corresponding diminishing effects on export revenues and the fiscal health of some regional governments. Starting in late April, some countries began lifting some internal restrictions on movement and commercial activityâincluding Tunisia, where nationwide lockdown measures appeared to contribute to a drop in new confirmed casesâand Lebanon, where cases appeared to spike following the easing of restrictions. The WHO Eastern Mediterranean Regional (EMR) office warned, \"Without careful planning, and in the absence of scaled up public health and clinical care capacities, [a] premature lifting of physical distancing measures is likely to lead to an uncontrolled resurgence in COVIDâ19 transmission and an amplified second wave of cases.\" The WHO has highlighted the particular risks posed by the spread of the virus to states such as Syria, Libya, and Yemen, noting that years of conflict, natural disasters, and previous outbreaks have left these countries with weakened health systems, shortages in health workers, and limited access to even the most basic medical care services. Millions of already vulnerable people in these countries are also more prone to infectious diseases due to overcrowded living conditions, weakened immunity due to years of food insecurity, and insufficient treatment for other underlying medical conditions. Many of these countries are also politically fragmented, resulting in limited humanitarian access to populations in some areas, and challenges in the sharing of information between controlling parties and WHO in a timely and transparent manner. In addition, other areas of elevated risk in the region include the following: The Gaza Strip . The Hamas-controlled Gaza Strip has reported 20 COVID-19 cases as of May 11, and officials from international organizations have voiced concerns about a possible outbreak given the acute humanitarian challenges in Gaza. The densely populated territory of nearly 2 million Palestinians has a weak health infrastructure and many other challenges related to sanitation and hygiene. On May 8, the U.N. Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) updated an emergency flash appeal from $14 million to $93.4 million to prepare and respond to COVID-19-related needs for Palestinian refugees in Gaza, the West Bank, Jordan, Lebanon, and Syria through July 2020. The Trump Administration stopped U.S. contributions to UNRWA in 2018 and all bilateral aid to the West Bank and Gaza in 2019. For FY2020, Congress appropriated $75 million from the Economic Support Fund for humanitarian and development purposes in the West Bank and Gaza, and some Members of Congress have called for the Administration to obligate some of this assistance for Gaza. The Hajj (Saudi Arabia) . Each year, millions of Muslims travel to Saudi Arabia for a religious pilgrimage to Mecca. This journey, known as the Hajj , is a pillar of the Islamic faith. Saudi authorities have invested considerable attention and resources to averting infectious disease outbreaks during the Hajj , having faced 2009 H1N1 Pandemic, SARS, and MERS. In February 2020, Saudi leaders suspended umrah pilgrimage visits to the kingdom (which can be done at any time of year in contrast to the Hajj ) and limited access to holy sites in Mecca and Medina. In late March, Saudi officials asked Muslims to delay making Hajj travel plans until the effects of the pandemic were clearer. It remains to be seen whether the Hajj pilgrimage will go forward as scheduled in July and August 2020. U.S. Military Facilities . The United States maintains a significant military presence in the region, and has partnered closely with local forces. U.S. forces remain in Iraq and are consolidating base locations. U.S. training of Iraqi military personnel has been suspended due to COVID-19 risks, and U.S. officials stated in late March that future training would use \"fewer bases with fewer people.\" The spread of COVID-19 in Iran has raised questions about the possible effects of U.S. sanctions on Iran's response capacity. The Trump Administration's policy of \"maximum pressure\" on Iran imposes economic sanctions on every sector of Iran's economy. Iranian officials and some global health officials assert that the U.S. sanctions are weakening Iran's ability to contain the virus by reducing the availability of medical equipment. Sales to Iran of humanitarian items, including medicine and medical equipment, are generally exempt from U.S. sanctions. The reluctance of banks worldwide, however, to finance any transactions involving Iran, fearing penalties by the United States for sanctions violations, has reportedly affected Iran's ability to import all types of goods, including those that are exempt from sanctions. As the disease spread in Iran in February 2020, the United States has offered Iran an unspecified amount of assistance to help it deal with the outbreak, but Iran's government has refused the aid. In early March 2020, U.S. officials issued guidance indicating that transactions involving Iran's foreign exchange assets held abroad, when used to buy humanitarian items, would not face U.S. sanctions. However, the Administration opposes Iran's request for a $5 billion loan from the International Monetary Fund (IMF) that Iran says it needs to cope with the COVID-19 crisis; the Administration asserts that Iran has ample amounts of funds for medical imports and would use the loan proceeds to support pro-Iranian armed factions in various countries. Under the IMF's voting rules, the U.S. voting power is not sufficient to unilaterally veto specific IMF program requests, even though the United States has the largest share at the IMF and can veto major policy decisions at the IMF. Although over the past two decades Congress has supported increased sanctions on Iran, some Members of Congress have called on the Administration to relax sanctions on Iran, at least temporarily, to help Iran deal with the COVID-19 pandemic and thereby help curb the disease's broader spread. Canada's federal, provincial, and territorial governments have worked closely together to manage the country's response to the COVID-19 pandemic. While the federal government has provided broad public health guidelines intended to slow the spread of the virus, provincial and territorial governments have implemented varying measures in accordance with local conditions. As of early May 2020, all of the provinces had developed phased reopening plans, and some had begun loosening restrictions on certain business, education, and recreational activities while maintaining physical distancing guidelines. The federal, provincial, and territorial governments also have cooperated on efforts to secure personal protective equipment, testing materials, and other medical supplies. Nevertheless, provincial health services, which administer the Canadian health system, reportedly have experienced some shortages. Prime Minister Justin Trudeau has acknowledged that Canada's National Emergency Strategic Stockpile did not have sufficient supplies prior to the pandemic, but federal officials maintain that they have been able to fulfill every request for personal protective equipment received from the provinces. Prime Minister Trudeau has worked with the Canadian Parliament to enact a series of measures intended to mitigate the economic impact of the pandemic. As of late April 2020, their announced assistance measures amounted to an estimated C$146 billion ($104 billion)âequivalent to about 7% of Canada's projected gross domestic product (GDP) for 2020. These include a new Canada Emergency Response Benefit that provides C$2,000 ($1,424) every 4 weeks for up to 16 weeks for workers who have lost their incomes due to COVID-19, and a new Canada Emergency Wage Subsidy that covers 75% of employees' wages, up to C$847 ($603) per week, for up to 12 weeks. Prime Minister Trudeau has signaled his intention to extend such programs as necessary. To provide additional support to the economy and financial system, the Bank of Canada cut its benchmark interest rate from 1.75% to 0.25%, and launched its first-ever quantitative easing program to purchase government and commercial debt. Canada's Parliamentary Budget Officer forecasts that the country's real GDP will contract by 12% in 2020, but expects an economic recovery to begin in the second half of the year. The Canadian and U.S. governments have coordinated decisions concerning their shared border. On March 21, they closed the border to all nonessential travel. Although the closure initially was to last 30 days, both governments agreed to extend it until May 21. The Canadian government reportedly has requested that the closure remain in place until June 21; several provincial governments are opposed to a quick reopening of the border given the scope of the COVID-19 outbreak in the United States. The Canadian and U.S. governments generally have prioritized keeping the border open to trade. In April 2020, however, the Trump Administration invoked the Defense Production Act of 1950 (50 U.S.C. Â§Â§4501 et seq.) to restrict certain medical exports. Prime Minister Trudeau urged the United States not to interrupt the flow of essential goods and services, and the Administration ultimately exempted Canada from the export restrictions. The ability of countries in Latin America and the Caribbean to mitigate a COVID-19 outbreak varies across the region, and responses have been diverse. The pandemic appears to have arrived in Latin American and the Caribbean later than many other regions and has yet to peak. A 2019 Global Health Security Index included Brazil, Argentina, Chile, and Mexico among countries most prepared for a pandemic, and considered Venezuela, Honduras, Jamaica, the Bahamas, Haiti, Guyana, Belize, and Guatemala to be among the least prepared. Although all countries in the region aspire to universal health coverage, many lack sufficient doctors, hospitals, medical supplies and other critical infrastructure, and face challenges of inequality and economic fragility as they grapple with the pandemic. The patchwork of response efforts across 33 countries, including a cautious lifting of control measures in some countries in May 2020, has relied on incomplete data to guide policy since most countries have not conducted widespread testing. In Mexico, Brazil, and Nicaragua, where presidents have downplayed the threat of the pandemic, many analysts suggest the actual level of infection is essentially unknown, with some independent estimates suggesting it is a magnitude higher than what health authorities have reported. The information available suggests some countries are suffering severe outbreaks, while others, such as Paraguay, appear to have relatively few cases. According to several observers, the region's vulnerability is heightened by diminished health spending and low government capacity, following several years of economic stagnation. Venezuela is of particular concern since protracted political and economic crises had already weakened its health system. An estimated 4.8 million Venezuelans have fled the country, and new immigration controls by neighboring countries are unlikely to stop Venezuelans from crossing the region's porous borders. As the most urbanized region in the world, Latin American and the Caribbean nations face challenges enforcing social distancing by quarantine and curfew. In some cities, such as Guayaquil, Ecuador, outbreaks have already overwhelmed medical systems. In rural areas, and urban slums, there is limited access to clean water and sewage treatment and minimal health infrastructure. Indigenous communities, Afro-descendants, migrants, refugees, and internally displaced persons often face formidable barriers to health care. Quarantine restrictions in some cases have created a dangerous rise in hunger and desperation since a large proportion of the population depends on daily earnings, often through informal employment, to make ends meet. Many governments have taken extraordinary measures to respond to the pandemic. Some have been accused of abuses of power and violations of human rights for arresting and imprisoning quarantine violators, harshly treating prison uprisings and jailed gang members (notably in El Salvador), and delaying elections. Many governments also have begun to implement far-reaching economic support measures, although their fiscal capacities to support businesses and bolster social safety nets varies considerably. The IMF estimates the region's economic growth will contract this year by 5.2%. COVID-19 emerged amidst an economic downturn in China with officials navigating U.S.-China bilateral tariffs, working to curb consumer inflation (due in part to domestic pork shortages resulting from African swine fever), and moving to rein in government spending and shadow lending. COVID-19 containment measures significantly slowed economic activity in China, and halted production almost entirely in some areas of the country, particularly Hubei province. In early February, China's central bank pumped $57 billion into the banking system, capped banks' interest rates on loans for major firms, and extended deadlines for banks to curb shadow lending. China's central bank is seeking to stabilize China's currency and shore up liquidity in China's banking system, which remains the primary channel through which the government is providing business relief. Despite these measures, China experienced a 6.8% contraction in GDP growth in the first quarter of 2020, the first GDP contraction recorded in China since China's National Bureau of Statistics began releasing quarterly GDP figures in 1992. Many firms in China are still struggling to return to full capacity as some restrictions on travel and distribution of goods and workers remain and additional reported pockets of outbreaks continue in different parts of China. In addition, COVID-19's global spread has led to a sharp global economic downturn and reduced global demand for Chinese exports. China's recovery is also constrained by a contraction in global transportation and logistics and tourism and services trade. The economic impact of COVID-19 has also raised questions about the capacity of the United States and China to implement the Phase One Trade Agreement signed in January 2020, which commits China to purchasing $200 billion in additional exports over the next two years. Recent analysis of both U.S. and Chinese first quarter trade data indicates that China is not on track to meet its purchase commitmentsâaccording to U.S. trade data, China's imports of agricultural products, a major component of the purchase agreements, grew by a modest 3.2%, while China's imports of U.S. manufactured goods and energy shrank. Reports in China's state media have suggested that some elements of China's leadership might be considering invalidating and renegotiating the phase one agreement. A growing list of economic indicators makes it clear that the viral outbreak is negatively affecting global economic growth on a scale that has not been experienced since at least the global financial crisis of 2008-2009. Global trade and GDP are forecast to decline sharply through at least the first half of 2020. The global pandemic is affecting a broad swath of international economic and trade activities, from services generally to tourism and medical supplies, global value chains, financial markets, and a range of social activities, to name a few. The health and economic crises could have a particularly negative impact on developing economies that are constrained by limited financial resources and where health systems could quickly become overloaded. The economic situation remains highly fluid. Labeling the projected decline in global economic activity as the Great Lockdown, the IMF forecasted on April 14, 2020 that the global economy could decline by 3.0% in 2020, before growing by 5.8% in 2021, constituting the \"worst recession since the Great Depression, surpassing that seen during the global financial crisis a decade ago.\" Estimates by the Organization for Economic Cooperation and Development (OECD) indicate the virus could trim global economic growth by as much as 2.0% per month if current conditions persist, or 24% on an annual basis. Global trade could also fall by 13% to 32%, depending on the depth and extent of the global economic downturn. Increasing rates of unemployment are raising the prospects of wide-spread social unrest and demonstrations in developed economies where lost incomes and health insurance are threatening living standards and in developing economies where populations reportedly are growing concerned over access to basic necessities and the prospects of rising levels of poverty. Over the seven-week period from mid-March to early May 2020, more than 33 million Americans filed for unemployment insurance. On May 8, 2020, the Bureau of Labor Statistics (BLS) reported that 20 million Americans lost their jobs in April 2020, pushing the total number of unemployed Americans to 23 million and raising the unemployment rate to 14.7%, the highest since the Great Depression of the 1930s. The report indicated that all major industry sectors experienced job losses, with the heaviest losses in the leisure and hospitality industries. Preliminary data indicate that U.S. GDP in the first quarter 2020 fell by 4.8% at an annual rate, the largest quarterly decline in GDP since the fourth quarter of 2008 during the global financial crisis. The U.S. economy is projected to contract by 5.9%, about twice the rate of decline experienced in 2009 during the financial crisis. The forecast assumes that the pandemic fades in the second half of 2020 and that the containment measures can be reversed. The IMF also argues that recovery of the global economy could be weaker than projected as a result of lingering uncertainty about possible contagion, lack of investor and consumer confidence, and permanent closure of businesses and shifts in the behavior of firms and households. Global trade, measured by trade volumes, slowed in the last quarter of 2019 and was expected to decline further in 2020, as a result of weaker global economic activity associated with the pandemic. Uncertainty about the length and depth of pandemic-related economic effects and the effectiveness of pandemic control measures are shaping perceptions of risk and volatility in financial markets and corporations. Financial markets worldwide, particularly in the United States, Asia, and Europe, are volatile as investors are concerned that the virus is creating a global crisis that could be prolonged and expansive. Similar to the 2008-2009 global financial crisis, central banks are rapidly becoming the lender of last resort and are attempting to address financial market volatility. Developments continue to evolve rapidly and the market dynamics have led some observers to question if these events mark the beginning of a full-scale global financial crisis. Financial market dislocation can potentially increase liquidity constraints and credit market tightening, as firms hoard cash, with negative effects on economic growth. In some financial markets, fund managers have started selling government securities to increase their cash reserves, pushing down government bond prices. Financial markets are also responding to increased government bond issuances in the United States and Europe to fund COVID-19-related spending, further increasing government debt. COVID-19 has revealed U.S. and global supply chain vulnerabilities across a range of sectors, particularly PPE, which relies directly on China-based manufacturing. During the 2002-2003 SARS outbreak, China accounted for 8% of global manufacturing exports; in 2018, China was the source of approximately 19% of global manufacturing exports, including intermediate goods vital to global manufacturing supply chains. An area of particular concern to Congress in the current environment is U.S. shortages of medical suppliesâincluding personal protective equipment (PPE) and pharmaceuticalsâas the United States steps up efforts to contain COVID-19 with limited domestic stockpiles and insufficient U.S. industrial capacity. Because of China's role as a global supplier of PPE, medical devices, antibiotics, and active pharmaceutical ingredients (API), reduced exports from China have led to shortages of critical medical supplies in the United States. According to China Customs data, in 2019 China exported $9.8 billion in medical supplies and $7.4 billion in organic chemicalsâa figure that includes active pharmaceutical ingredients and antibioticsâto the United States. While there are no internationally agreed guidelines and standards for classifying these products, U.S. imports of pharmaceuticals, medical equipment and products, and related supplies are estimated to have been approximately $20.7 billion (or 9.2% of U.S. imports), according to CRS calculations using official U.S. data. In early February 2020, the Chinese government nationalized control of the production and distribution of medical supplies in China, directing all production for domestic use. The Chinese government also directed the national bureaucracy, local governments, and Chinese industry to secure supplies from the global market. This effort likely exacerbated medical supply shortages in the United States and other countries, particularly in the absence of domestic emergency measures that might have locked in domestic contracts, facilitated an earlier start to alternative points of production, and restricted exports of key medical supplies. In addition to formal and informal PPE export restrictions that China reportedly has placed on domestic producers of PPE, several prominent U.S. companies with PPE production capacity located in China, including 3M, have indicated they do not have PRC government authorization to export. As China's manufacturing sector recovers while the United States and other countries are grappling with COVID-19, the Chinese government may selectively release some medical supplies for overseas delivery. Those decisions are likely to be driven, at least in part, by political calculations, as has been the case with many countries around the world. The COVID-19 pandemic has raised questions about domestic and international preparedness and the appropriate responses to pandemic control. Although the United States has long-supported the delivery of PPE through its international pandemic preparedness programs, this practice has come into question while the numbers of COVID-19 cases and deaths climb in the United States. As of April 15, 2020, the United States had the highest number of COVID-19 cases and deaths worldwide, accounting for roughly 30% of all COVID-19 cases globally. In March, some Members of Congress began questioning the delivery of PPE by USAID to foreign countries while some governors and mayors reported shortages of the commodities. The United States provides annual funding for foreign assistance, approximately $20 billion of which is administered by USAID each year. USAID programs operate in more than 120 countries worldwide and are intended to meet specific development objectives. In many of these countries, widespread poverty, weak public institutions, and diverse pre-existing governance challenges are likely to be exacerbated by the pandemic. To preserve these investments and past policy progress, protect U.S. foreign policy interests in the region, save lives, and help combat the negative socioeconomic effects of the pandemic in the region, Congress may seek to address additional help aid recipients might request to control the pandemic and its effects. Congress might also consider how the pandemic may affect partner governments' absorption capacities, and the manner and degree to which U.S. assistance may complement or coincide with nationally-determined pandemic responses. Congress may also wish to consider how responding to the challenges created by the pandemic may reshape pre-existing U.S. aid prioritiesâand how it may affect the ability of U.S. personnel to implement and oversee programs in the field. Relatedly, Congress may wish to ensure that U.S. responses are robustly coordinated with those of other donor governments and multilateral functional agenciesâand to ensure that such efforts are transparent and cost-effective, and that donor assistance is complementary and non-duplicative. The pandemic is also having other effects on foreign affairs that Congress might consider. Some have questioned, for example, how U.S. immigration policy might impact COVID-pandemic control efforts. Some Members of Congress and officials representing Latin American and Caribbean governments have expressed concern that COVID-19-related screening procedures for deportations are not sufficient to prevent the importation of COVID-19 cases from the United States and have asked the U.S. Immigration and Customs Enforcement (ICE) to suspend deportations. A number of people deported from the United States to Latin America have reportedly tested positive with COVID-19 or have reportedly been exposed to someone with COVID-19. Other Members of Congress continue to support the Administration's border policies, which the Administration maintains are conducted in a manner that accounts for the dangers of COVID-19. Congress continues to debate the extent to which the United States should contribute to multilateral organizations for COVID-19 control. Some Members, for example, are arguing for withholding contributions to the WHO, while others are urging the Administration to pay outstanding assessments to the organization and support ongoing WHO COVID-19 efforts. Selected Legislation Introduced or Enacted in the 116 th Congress Related to International COVID-19 Incidence or International Pandemic Preparedness H.Res. 962 , Expressing support for assisting East African countries afflicted by the plague of desert locusts . Referred to the House Committee on Foreign Affairs on May 8, 2020. S. 3669 , A bill to respond to the global COVID-19 pandemic, and for other purposes . Referred to the Senate Committee on Foreign Relations on May 7, 2020. S.Res. 567 , A resolution commending career professionals at the Department of State for their extensive efforts to repatriate United States citizens and legal permanent residents during the COVID-19 pandemic . Referred to the Senate Committee on Foreign Relations on May 7, 2020. S. 3600 , Li Wenliang Global Public Health Accountability Act of 2020 . Referred to the Senate Committee on Foreign Relations on May 5, 2020. S. 3598 , Repatriation Reimbursement Act . Referred to the Senate Committee on Commerce, Science, and Transportation on May 4, 2020. S. 3592 , Stop COVID Act of 2020 . Referred to the Senate Committee on the Judiciary on May 4, 2020. S. 3588 , Justice for Victims of Coronavirus Act . Referred to the Senate Committee on Foreign Relations on May 4, 2020. S.Res. 556 , A resolution designating May 1, 2020, as the \"United States Foreign Service Day\" in recognition of the men and women who have served, or are presently serving, in the Foreign Service of the United States, and honoring the members of the Foreign Service who have given their lives in the line of duty . Referred to the Senate Committee on the Judiciary on May 4, 2020. H.R. 6657 , WUHAN Rescissions Act . Referred to the House Committee on Appropriations on May 1, 2020. H.R. 6665 , To direct the Secretary of State, in consultation with the Secretary of Health and Human Services, to submit a report on the actions of the World Health Organization to address the spread of the virus responsible for COVID-19, and for other purposes . Referred to the House Committee on Foreign Affairs on May 1, 2020. H.Res. 944 , Expressing the sense of the House of Representatives that the People ' s Republic of China should be held accountable for its handling of COVID-19 . Referred to the House Committee on Foreign Affairs on April 28, 2020. H.R. 6610 , Director of Pandemic and Biodefense Preparedness and Response Act . Referred to the House Committee on Energy and Commerce, and in addition to the House Committees on Transportation and Infrastructure, Armed Services, Foreign Affairs, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned on April 23, 2020. Referred to the Subcommittee on Economic Development, Public Buildings, and Emergency Management by the Committee on Transportation and Infrastructure on April 24, 2020. H.R. 6599 , COVID Research Act of 2020 . Referred to the Committee on Energy and Commerce, and in addition to the Committee on Science, Space, and Technology, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned on April 23, 2020. H.R. 6598 , SOS ACT Act . Referred to the Committee on Financial Services, and in addition to the Committee on Foreign Affairs, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned on April 23, 2020. H.Res. 940 , Recognizing the commencement of Ramadan, the Muslim holy month of fasting and spiritual renewal, and commending Muslims in the United States and throughout the world for their faith . Referred to the House Committee on Foreign Affairs on April 23, 2020. H.Res. 939 , Supporting the World Bank Group to lead a worldwide COVID-19 economic recovery effort . Referred to the House Committee on Financial Service on April 23, 2020. H.R. 6595 , Expanding Vital American Citizen Services Overseas (EVACS) Act of 2020 . Referred to the House Committee on Foreign Affairs on April 22, 2020. H.R. 6541 , PPE Act of 2020 . Referred to the Committee on Energy and Commerce, and in addition to the Committee on Financial Services, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned on April 17, 2020. H.R. 6531 , Medical Supplies for Pandemics Act of 2020 . Referred to the House Committee on Energy and Commerce on April 17, 2020. H.R. 6524 , Compensation for the Victims of State Misrepresentations to the World Health Organization Act of 2020 . Referred to the House Committee on the Judiciary on April 17, 2020. H.R. 6522 , PPP Expansion Act of 2020 . Referred to the House Committee on Small Business on April 17, 2020. H.R. 6519 , Holding the Chinese Communist Party Accountable for Infecting Americans Act of 2020 . Referred to the House Committee on the Judiciary on April 17, 2020. H.Con.Res. 97 , Establishing the Joint Select Committee on the Events and Activities Surrounding China ' s Handling of the 2019 Novel Coronavirus . Referred to the House Committee on Rules on April 17, 2020. H.R. 6504 , To direct the Secretary of Health and Human Services, acting through the Director of the Centers for Disease Control and Prevention, to develop a plan to improve surveillance with respect to diseases that are viral pandemic threats, and for other purposes . Referred to the House Committee on Energy and Commerce on April 14, 2020. H.Res. 922 , Expressing the sense of the House of Representatives that all nations should permanently close live wildlife markets and that the People ' s Republic of China should cease spreading disinformation regarding the origins of coronavirus . Referred to the House Committee on Foreign Affairs, and in addition to the House Committees on Natural Resources, Agriculture, and Energy and Commerce on April 14, 2020. H.R. 6500 , To reduce Federal spending and fund the acquisition of unexpired personal protective equipment (including face masks) for the strategic national stockpile by terminating taxpayer financing of Presidential election campaigns . Referred to the House Committee on Ways and Means, and in addition to the Committee on House Administration, on April 14, 2020. H.R. 6481 , To rescind the appropriation made for migration and refugee assistance in the Coronavirus Aid, Relief, and Economic Security Act and redirect the funds to U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement . Referred to the House Committee on Appropriations on April 10, 2020. H.R. 6480 , To require the President, after the World Health Organization declares a global pandemic, to report to the Congress on the status of Federal planning to respond to the pandemic . Referred to the House Committee on Energy and Commerce, and in addition to the Committee on Financial Services on April 10, 2020. H.Res. 919 , Condemning the United Nations ' decision to appoint China a seat on its Human Rights Council . Referred to the House Committee on Foreign Affairs on April 10, 2020. H.R. 2166 , Global Health Security Act of 2019 . Directs the President to create the Global Health Security Agenda Interagency Review Council to implement the Global Health Security Agenda, an initiative launched by nearly 30 nations to address global infectious disease threats. Ordered to be reported on March 4, 2020, and introduced in the House on April 9, 2020. H.Res. 917 , Expressing the sense of the House of Representatives that the United States should withhold the contribution of Federal funds to the World Health Organization until Director-General Tedros Ghebreyesus resigns and an international commission to investigate the World Health Organization is established . Referred to the House Committee on Foreign Affairs on April 7, 2020. H.R. 6471 , To posthumously award a Congressional Gold Medal to Dr. Li Wenliang, in recognition of his efforts to save lives by drawing awareness to COVID-19 and his call for transparency in China . Referred to the House Committee on Financial Services, and in addition to the Committee on House Administration on April 7, 2020. H.R. 6429 , To establish in the Legislative Branch a National Commission on the Coronavirus Disease 201 9 Pandemic in the United States . Referred to the House Subcommittee on Economic Development, Public Buildings, and Emergency Management on April 6, 2020. H.R. 6440 , To establish the National Commission on the COVID-19 Pandemic . Referred to the House Committee on Energy and Commerce on April 3, 2020. P.L. 116-136 , Coronavirus Aid, Relief, and Economic Security Act or the CARES Act . Enacted H.R. 748 on March 27, 2020. H.R. 6410 , To direct the President to use authority under the Defense Production Act of 1950 to ensure an adequate supply of equipment necessary for limiting the spread of COVID-19 . Referred to the House Committee on Financial Services on March 27, 2020. H.R. 6398 , To provide for the expedited procurement of equipment needed to combat COVID-19 under the Defense Production Act of 1950 . Referred to the House Subcommittee on Economic Development, Public Buildings, and Emergency Management on March 27, 2020. H.R. 6406 , To require personal protective equipment to be included in the strategic national stockpile, and to require the Federal Government to procure such equipment from United States sources, and for other purposes . Referred to the Subcommittee on Economic Development, Public Buildings, and Emergency Management on March 27, 2020. H.R. 6405 , To direct the President, in consultation with the Secretary of the Treasury, to develop and carry out a strategy to seek reimbursement from the People's Republic of China of funds made available by the United States Government to address the Coronavirus Disease 2019 (COVID-19) . Referred to the House Committee on Foreign Affairs on March 26, 2020. S. 3586 , Eliminating Leftover Expenses for Campaigns from Taxpayers (ELECT) Act of 2020 . Referred to the Senate Committee on Finance on March 25, 2020. H.R. 6390 , To require the President to use authorities under the Defense Production Act of 1950 to require emergency production of medical equipment to address the COVID-19 outbreak . Referred to the House Committee on Financial Services on March 25, 2020. H.R. 6393 , To require the Secretary of Defense to submit to Congress a report on the reliance by the Department of Defense on imports of certain pharmaceutical products made in part or in whole in certain countries, to establish postmarket reporting requirements for pharmaceuticals, and for other purposes . Referred to the House Committee on Ways and Means, and in addition to the House Committees on Armed Services, Oversight and Reform, and Energy and Commerce on March 25, 2020. As of April 15, 2020, no text of the bill was available. S.Res. 552 , A resolution supporting an international investigation into the handling by the Government of the People's Republic of China of COVID-19 and the impact of handling COVID-19 in that manner on the people of the United States and other nations . Referred to the Senate Committee on Foreign Relations on March 24, 2020. H.Res. 907 and S.Res. 553 , Expressing the sense of the House of Representatives that the Government of the People's Republic of China made multiple, serious mistakes in the early stages of the COVID-19 outbreak that heightened the severity and spread of the ongoing COVID-19 pandemic, which include the Chinese Government's intentional spread of misinformation to downplay the risks of the virus, a refusal to cooperate with international health authorities, internal censorship of doctors and journalists, and malicious disregard for the health of ethnic minorities . Referred to the House Committee on Foreign Affairs on March 24, 2020. S. 3573 , American-Made Protection for Healthcare Workers and First Responders Act . Referred to the Senate Committee on Health, Education, Labor, and Pensions on March 24, 2020. S. 3570 , A bill to provide for the expedited procurement of equipment needed to combat COVID-19 under the Defense Production Act of 1950 . Referred to the Senate Committee on Banking, Housing, and Urban Affairs on March 23, 2020. S. 3568 , Medical Supply Chain Emergency Act of 2020 . Referred to the Senate Committee on Banking, Housing, and Urban Affairs on March 23, 2020. H.R. 6379 , Take Responsibility for Workers and Families Act, Referred to the House Committee on Appropriations , and in addition to the House Committees on the Budget, and Ways and Means on March 23, 2020. H.R. 6373 , To increase the amount available under the Defense Production Act of 1950 to respond to the coronavirus epidemic, and for other purposes . Referred to the House Committee on Financial Services on March 23, 2020. H.R. 6371 , To amend the Securities Exchange Act of 1934 to require issuers to disclose risks related to global pandemics, and for other purposes . Referred to the House Committee on Financial Services on March 23, 2020. H.R. 6319 , To establish a Congressional COVID-19 Aid Oversight Panel, to authorize the Special Inspector General for the Troubled Asset Relief Program to coordinate audits and investigations in connection with the receipt of Federal aid related to COVID-19, and for other purposes . Referred to the House Committee on Financial Services on March 23, 2020. H.Res. 906 , Calling on the President to invoke the Defense Production Act to respond to COVID-19 . Referred to the House Committee on Financial Services on March 23, 2020. S. 3548 , Coronavirus Aid, Relief, and Economic Security Act or the CARES Act . Referred to the Senate Committee on Finance on March 21, 2020. H.R. 6310 , To require the Secretary of Defense to make testing for the coronavirus disease 19 available to all members of the Armed Forces deployed to an area in which the United States Central Command has responsibility . Referred to the House Committee on Armed Services, March 19, 2020. H.R. 6482 , A bill to require the Secretary of Health and Human Services to maintain a list of the country of origin of all drugs marketed in the United States, to ban the use of Federal funds for the purchase of drugs manufactured in China, and for other purposes . Referred to the Senate Committee on Finance on March 19, 2020. S. 3538 , Strengthening America ' s Supply Chain and National Security Act . Referred to the Senate Committee on Finance, March 19, 2020. S. 3537 , Protecting Our Pharmaceutical Supply Chain from China Act of 2020 . Referred to the Senate Committee on Finance, March 19, 2020. S.Res. 547 , A resolution encouraging the President to use authorities provided by the Defense Production Act of 1950 to scale up the national response to the coronavirus crisis . Referred to the Senate Committee on Banking, Housing, and Urban Affairs, March 18, 2020. S. 3530 , A bill to amend the National Security Act of 1947 to require the President to designate an employee of the National Security Council to be responsible for pandemic prevention and response, and for other purposes. Referred to the Senate Committee on Homeland Security and Governmental Affairs on March 18, 2020. S. 3507 , A bill to require the Secretary of Defense to make testing for the coronavirus disease 19 available to all members of the Armed Forces deployed to an area in which the United States Central Command has responsibility. Referred to the Senate Committee on Armed Services on March 17, 2020. S. 3510 , A bill to transfer all border wall funding to the Department of Health and Human Services and USAID to combat coronavirus. Referred to the Committee on Homeland Security and Government Affairs on March 17, 2020. H.R. 6288 , Responsibly Responding to Pandemics Act . Referred to the House Subcommittee on Economic Development, Public Buildings, and Emergency Management, March 16, 2016. H.R. 6205 , Assistance for Workers Harmed by COVID-19 Act . Amends the Trade Act of 1974 to provide adjustment assistance to certain workers adversely affected by disruptions in global supply chains from COVIDâ19, and for other purposes. Referred to the House Committee on Ways and Means on March 11, 2020. P.L. 116-123 , Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020. Provides $7.8 billion in supplemental appropriations to aid in domestic and global COVID-19 preparedness and response activities, including $6.5 billion for the Department of Health and Human Services (HHS), $0.02 billion for the Small Business Administration and $1.3 billion for foreign operations activities provided across several agencies and funding mechanisms. Parts of the HHS amounts are to be made available for international activities. Enacted H.R. 6074 on March 6, 2020. S.Amdt. 1506 , To rescind unobligated balances for certain international programs to offset the amounts appropriated in this bill to respond to the coronavirus outbreak. Motion to table the amendment was agreed to in the Senate on March 5, 2020. S.Res. 497 , A resolution commemorating the life of Dr. Li Wenliang and calling for transparency and cooperation from the Government of the People's Republic of China and the Communist Party . Agreed to in the Senate on March 3, 2020 without amendment and an amended preamble by unanimous consent. H.R. 6070 , Border Health Security Act of 2020 . To establish grant programs to improve the health of border area residents and for all hazards preparedness in the border area including bioterrorism, infectious disease, and noncommunicable emerging threats, and for other purposes. Referred to the House Committee on Energy and Commerce and Committee on Foreign Affairs on March 3, 2020. S.Res. 511 , A resolution supporting the role of the United States in helping save the lives of children and protecting the health of people in developing countries with vaccines and immunization through GAVI, the Vaccine Alliance . Referred to the Senate Committee on Foreign Relations, February 27, 2020. S.Res. 505 , A resolution expressing the sense of the Senate that the United States will continue to provide support to international partners to help prevent and stop the spread of coronavirus. Referred to the Senate Committee on Foreign Relations on February 13, 2020. H.R. 2166 and S. 3302 , Global Health Security Act of 2020 . Establishes a Special Advisor for Global Health Security within the Executive Office of the President to coordinate U.S. government global health security activities, convene and chair a Global Health Security Interagency Review Council, and submit a biannual report to Congress on related activities, among other things. Referred to the Senate Committee on Foreign Relations on February 13, 2020. H.R. 5730 , National Strategy for Pandemic Influenza Update Act . To direct the Homeland Security Council and the National Security Council, in consultation with Federal departments and agencies responsible for biodefense, to update the National Strategy for Pandemic Influenza, and for other purposes. Referred to the House Committees on Energy and Commerce, Armed Services, Foreign Affairs, Intelligence, and Agriculture on January 30, 2020. P.L. 116-22 , Pandemic and All-Hazards Preparedness and Advancing Innovation Act of 2019 . To advance research and development of innovative tools to improve pandemic preparedness, including directing the Secretary of Health and Human Services to submit a report to the Senate Committee on Health, Education, Labor, and Pensions and the House Committee on Energy and Commerce on U.S. efforts to coordinate with other countries and international partners during recent public health emergencies with respect to the research and advanced research on, and development of, qualified pandemic or epidemic products. Enacted S. 1379 on June 24, 2019. H.R. 269 , Pandemic and All-Hazards Preparedness and Advancing Innovation Act of 2019 . Related to S. 1379, which became P.L. 116-22 . Placed on Senate Legislative Calendar under General Orders, January 10, 2019. ", "summary": "In December 2019, hospitals in the city of Wuhan in China's Hubei Province began seeing cases of pneumonia of unknown origin. Chinese health authorities ultimately connected the condition, later named coronavirus disease 2019 (COVID-19), to a previously unidentified strain of coronavirus. The disease has spread to almost every country in the world, including the United States. WHO declared the outbreak a Public Health Emergency of International Concern on January 30, 2020; raised its global risk assessment to \"Very High\" on February 28; and labeled the outbreak a \"pandemic\" on March 11. In using the term pandemic, WHO Director-General Tedros Adhanom Ghebreyesus cited COVID-19's \"alarming levels of spread and severity\" and governments' \"alarming levels of inaction.\" As of May 14, 2020, WHO had reported more than 4.2 million COVID-19 cases, including almost 300,000 deaths, of which more than 40% of all cases and 55% of all deaths were identified in Europe, and more than 30% of all cases and nearly 30% of all deaths were identified in the United States. Members of Congress have demonstrated strong interest in ending the pandemic domestically and globally. To date, Members have introduced dozens of pieces of legislation on international aspects of the pandemic (see the Appendix ). Individual countries are carrying out not only domestic but also international efforts to control the COVID-19 pandemic, with the WHO issuing guidance, coordinating some international research and related findings, and coordinating health aid in low-resource settings. Countries are following (to varying degrees) WHO policy guidance on COVID-19 response and are leveraging information shared by WHO to refine national COVID-19 plans. The United Nations (U.N.) Office for the Coordination of Humanitarian Affairs (UNOCHA) is requesting almost $7 billion to support COVID-19 efforts by several U.N. entities. International financial institutions (IFIs), including the International Monetary Fund (IMF), the World Bank, and the regional development banks, are mobilizing their financial resources to support countries grappling with the COVID-19 pandemic. The IMF has announced it is ready to tap its total lending capacity, about $1 trillion, to support governments responding to COVID-19. The World Bank can mobilize about $150 billion over the next 15 months, and the regional development banks are also preparing new programs and redirecting existing programs to help countries respond to the economic ramifications of COVID-19. On January 29, 2020, President Donald Trump announced the formation of the President's Coronavirus Task Force, led by the Department of Health and Human Services (HHS) and coordinated by the White House National Security Council (NSC). On February 27, the President appointed Vice President Michael Pence as the Administration's COVID-19 task force leader, and the Vice President subsequently appointed the President's Emergency Plan for AIDS Relief (PEPFAR) Ambassador Deborah Birx as the \"White House Coronavirus Response Coordinator.\" On March 6, 2020, the President signed into law the Coronavirus Preparedness and Response Supplemental Appropriations Act of 2020, P.L. 116-123 , which provides $8.3 billion for domestic and international COVID-19 response. The Act includes $300 million to continue the U.S. Centers for Disease Control and Prevention's (CDC) global health security programs and a total of $1.25 billion for the U.S. Agency for International Development (USAID) and Department of State. Of those funds, $985 million is designated for foreign assistance accounts, including $435 million specifically for Global Health Programs. On March 27, 2020, President Trump signed the Coronavirus Aid, Relief, and Economic Security Act (CARES Act), P.L. 116-136 , which contains emergency funding for U.S. international COVID-19 responses, including $258 million to USAID through the International Disaster Assistance (IDA) account and $350 million to the State Department through the Migration and Refugee Assistance (MRA) account ( P.L. 116-127 ). The pandemic presents major consequences for foreign aid, global health, diplomatic relations, the global economy, and global security. Regarding foreign aid, Congress may wish to consider how the pandemic might reshape pre-existing U.S. aid prioritiesâand how it may affect the ability of U.S. personnel to implement and oversee programs in the field. The pandemic is also raising questions about deportation and sanction policies, particularly regarding Latin America and the Caribbean and Iran. In the 116 th Congress, Members have introduced legislation to respond to the COVID-19 pandemic in particular and to address global pandemic preparedness in general. This report focuses on global implications of and responses to the COVID-19 pandemic, and is organized into four broad parts that answer common questions regarding: (1) the disease and its global prevalence, (2) country and regional responses, (3) global economic and trade implications, and (4) issues that Congress might consider. For information on domestic COVID-19 cases and related responses, see CRS Insight IN11253, Domestic Public Health Response to COVID-19: Current Status and Resources Guide , by Kavya Sekar and Ada S. Cornell.", "document_type": "crs"}
{"report": "Congress establishes advisory commissions for a variety of purposes. These include informing Congress, providing expert advice on complex or controversial issues, and generating policy recommendations. To aid Congress, commissions are generally authorized to hold hearings, conduct research, analyze data, and/or make field visits as they carry out their duties. Most complete their work by delivering their findings, recommendations, or advice in the form of a written report to Congress. For example, the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission) was created to \"examine and report upon the facts and causes relating to the terrorist attacks of September 11, 2001,\" and to \"investigate and report to the President and Congress on its findings, conclusions, and recommendations for corrective measures that can be taken to prevent acts of terrorism.\" The commission ultimately submitted a final report to Congress and the President containing its findings and conclusions, along with 48 policy recommendations. Commissions also may be established to help commemorate an individual, group, or event. Commissions generally require funding to help meet their statutory goals. When designing a commission, therefore, policymakers may wish to consider both how the commission will be funded, as well as how much funding the commission will be authorized to receive. How commissions are funded and the amounts that they receive vary considerably. Several factors can contribute to overall commission costs. These factors might include hiring staff, contracting with outside consultants, and engaging administrative support, among others. Additionally, most commissions reimburse the travel expenditures of commissioners and staff, and some compensate their members. The duration of a commission can also significantly affect its cost; past congressional commissions have been designed to last anywhere from several months to several years. This report analyzes methods used to fund past congressional commissions; amounts provided for commissions in appropriations acts; and how selected commissions have utilized provided funds. While no formal definition exists, for the purposes of this report a congressional commission is defined as a multimember independent entity that is established by Congress; exists temporarily; serves in an advisory capacity; is appointed in part or whole by Members of Congress; and reports to Congress. This definition differentiates a congressional commission from a presidential commission, an executive branch commission, or other bodies with \"commission\" in their names, while including most entities that fulfill the role commonly associated with commissions: studying policy problems or organizing commemorative activities, and reporting findings to Congress. To identify congressional commissions, CRS searched Congress.gov for terms and phrases related to commissions within the text of laws enacted between the 101 st (1989-1990) and 115 th (2017-2018) Congresses. Each piece of legislation returned was examined to determine if (1) the legislation established a commission, and (2) the commission met the five criteria outlined above. If the commission met the criteria, its name, public law number, Statutes-at-Large citation, date of enactment, and other information were recorded. This approach identified 153 congressional commissions established by statute between 1989 and 2018. For each commission identified, CRS analyzed the commission's statute to assess whether the law authorized the appropriation of funds. This approach captures only the funding method provided in the commission's original legislation. If a commission's statute was amended by subsequent legislation, that amendment is not reflected in this report. Congressional commissions may be established for a variety of purposes. In general, commissions generally fall into one of two broad categories: commemorative and noncommemorative commissions. Noncommemorative commissions typically conduct studies, perform investigations, and/or provide expert advice on public policy issues. Such commissions have been created to investigate the September 11 attacks, examine the causes of the financial crisis, develop recommendations to prevent the proliferation of weapons of mass destruction, and to review advances in artificial intelligence, among many other issues. The majority of commissions identified (134 of 153, or approximately 88%) are noncommemorative in nature. A smaller number of congressional commissions identified (19 of 153, or approximately 12%) have been created to oversee the commemoration of a person, group, or event. Commemorative commissions often \"coordinate celebrations, scholarly events, public gatherings, and other activities, often to coincide with a milestone or event.\" Although commemorative and noncommemorative commissions generally share many of the same structural features, the scope and nature of the duties assigned often differ considerably in ways that may affect the amount of funding that Congress may wish to provide. For example, a commission created to investigate a national emergency may require a different length of time, or different levels of staff and other resources to satisfactorily accomplish its duties than a commission designed to commemorate an event. Accordingly, figures contained in this report on commission funding mechanisms and authorized or appropriated levels are broken out separately for commemorative and noncommemorative commissions. Congressional commissions have been funded in a variety of ways. Commissions generally receive specific authorizations of appropriations, receive funding from a federal agency, or rely on private donations. Some commissions are funded in multiple ways. For example, certain commissions are authorized to receive both appropriations and private donations. Of the 153 commissions identified, the majority of commission statutes (118, or approximately 77%) state how the commission shall be funded. When establishing how a commission is to be funded, such statutes generally either authorize appropriations to be provided in separate legislation for commission expenses; provide that commission expenses shall be paid from appropriations otherwise available to a department or agency official; or direct that the commission should be funded solely by private donations. Table 1 shows the number and percentage of commissions falling into each category, broken down by commission type. Each category is discussed in more detail below, along with examples of statutory language. Commission statutes that prescribe a funding mechanism may vary substantially in the level of detail provided. For example, some statutes specify a dollar amount that is authorized to be appropriated in separate legislation or otherwise made available to the commission; others may identify a source of funding without specifying a dollar value. Similarly, some statutes limit the time period during which funds may be made available to a commission, while others do not. Sixty-four of 153 commission statutes identified (approximately 42%) authorized appropriations for commission expenses. Of these, a majority authorized a specific dollar amount, while a smaller number authorized \"such sums\" as may be necessary. Provisions authorizing appropriations were included for a slightly larger percentage of noncommemorative commissions (approximately 43%) than for commemorative commissions (approximately 37%). Authorizations of appropriations do not themselves provide funds for commissions; funding may be provided in appropriations acts. Some statutes identify specific fiscal years in which appropriations were authorized, and others do not. For example, the statute creating the Antitrust Modernization Commission stated that \"[t]here is authorized to be appropriated $4,000,000 to carry out this subtitle.\" By contrast, the statute creating the Census Monitoring Board provided that \"[t]here is authorized to be appropriated $4,000,000 for each of fiscal years 1998 through 2001 to carry out this section.\" Some commission statutes authorize the use of otherwise appropriated funds for commission expenses. Most often, such statutes either authorize the use of funds appropriated for a particular agency, or instruct a specified agency official to make funds available for commission expenses. A smaller number explicitly authorize a transfer to the commission of funds from a particular account. As shown in Table 1 , this approach is relatively common among noncommemorative commissions, but less common among commemorative commissions. As with commission statutes that authorize appropriations, these statutes may or may not identify a specific dollar amount that will be provided for the commission. Statutes that do specify a dollar amount for commission expenses may further specify that \"up to\" or \"not more than\" a particular amount be made available. For example, the John S. McCain National Defense Authorization Act for Fiscal Year 2019 created the National Security Commission on Artificial Intelligence, and specified that up to $10 million be provided to the commission from amounts authorized to be appropriated for the Department of Defense: (d) FUNDING.âOf the amounts authorized to be appropriated by this Act for fiscal year 2019 for the Department of Defense, not more than $10,000,000 shall be made available to the Commission to carry out its duties under this subtitle. Funds made available to the Commission under the preceding sentence shall remain available until expended. By contrast, the legislation creating the Veterans' Disability Benefits Commission directed the Secretary of Veterans Affairs to make funds available for commission expenses, but did not identify a dollar figure. The statute read: (a) IN GENERAL.âThe Secretary of Veterans Affairs shall, upon the request of the chairman of the commission, make available to the commission such amounts as the commission may require to carry out its duties under this title. Some commissions are expected to operate using nonappropriated funds and so are authorized to receive private donations. This approach is more common among commemorative commissions. For example, the act establishing the 400 Years of African-American History Commission authorized the commission to \"solicit, accept, use, and dispose of gifts, bequests, or devises of money or other property,\" to accept and use voluntary and uncompensated services, and provided that \"[a]ll expenditures of the Commission shall be made solely from donated funds.\" Similarly, the act creating the Ronald Reagan Centennial Commission provided the commission with the authority to accept and use gifts of money, services, and property, and further stated that \"[n]o Federal funds may be obligated to carry out this Act.\" Commissions are often authorized to accept and use donations, including donations of money, property, volunteer service, and other items, even when private monetary donations are not the sole source of a commission's funding. P.L. 102-343 , for example, provided the Thomas Jefferson Commemoration Commission the authority to accept and use donated funds to carry out the commission's duties; it also authorized the appropriation of $312,500 over two fiscal years for commission expenses. The authority to receive donations may also be provided to commissions to facilitate their commemorative functions. For example, the Benjamin Franklin Tercentenary Commission was authorized to accept and use donations of \"money, personal services, and real or personal property related to Benjamin Franklin on the occasion of the tercentenary of his birth.\" Although statutes establishing commissions typically specify a method by which the commission is to be funded, most do not themselves provide funds for the commission. A statute that authorizes appropriations for a commission, for example, might be followed by an appropriations act that provides funding for the commission. For other commissions, there may be an authorization of appropriations, but an appropriation may not subsequently be made. Actual funding levels provided for congressional commissions have ranged from several hundred thousand dollars to several million dollars. A commission's need for funds may depend on such factors as the commission's scope and duties, staff compensation, payments to consultants, administrative support, travel expenses, and commissioner compensation, among others. The availability of funding and other resources may affect a commission's ability to satisfactorily accomplish its duties. Accordingly, funding levels for previous commissions may be of interest to policymakers and staff. As commissions have been funded in a variety of ways, no single data source comprehensively documents the amounts made available to commissions. To better understand the range of funding levels provided to past congressional commissions, this section provides data on amounts specified in appropriations acts for commission expenses. As discussed previously, many commission statutes authorize appropriations for commission expenses. To identify any actual appropriations made for congressional commissions, CRS searched for the name of each of the 153 identified commissions within the text of appropriations acts enacted since the 101 st Congress. Each identified appropriations act was analyzed to determine whether the bill provided some specified dollar amount for an identified commission. When identified, each dollar amount associated with the commission was recorded, in addition to the public law number and fiscal year of the relevant appropriations act. Although CRS was able to identify a number of appropriations made for commissions, there are several limitations to the data and subsequent interpretations. As a result, the amounts listed may in some cases be an approximation of the amount received by the commission, rather than a precise amount. These limitations include the following: Amounts identified for commissions in appropriations acts do not necessarily reflect the total amount available for any particular commission. Some commissions may be funded through a combination of appropriations and other sources. For example, the Thomas Jefferson Commemoration Commission was provided the authority to receive donations of money and volunteer services to carry out its functions, and was also provided funds in two subsequent appropriations acts. As discussed previously, commissions have been funded in a variety of ways, including appropriations, private donations, authorization of the use of funds within a lump-sum provided for an account, and the transfer or reprogramming of appropriated funds. The data presented below on amounts contained in appropriations acts should not be considered exhaustive of all funding received by congressional commissions over time, as commissions that did not receive a specific appropriation will necessarily be excluded. Committee reports that accompany appropriations bills may provide details regarding committee expectations about how certain appropriated funds are to be spent. Because this search was conducted within the text of appropriations acts, directions for commission appropriations within committee reports are not included. When making amounts available to commissions, appropriations acts may cite the statute creating the commission rather than the name of the commission. For example, P.L. 105-78 directed that \"$900,000 shall be for carrying out section 4021 of Public Law 105-33.\" Section 4021 of P.L. 105-33 established the National Bipartisan Commission on the Future of Medicare. Because CRS's search was conducted using the name of the commission, similar results may be excluded. Along similar lines, continuing resolutions generally provide funding to continue governmental activities without explicitly referencing specific activities by name. Because CRS's search was conducted using the name of the commission, any amounts made available to commissions by continuing resolutions may be omitted. In some cases, an appropriations act may place a maximum on the level of funding available. For example, the Departments of Labor, Health and Human Services, and Education, and Related Agencies Appropriations Act for FY1994 provided that, of funds appropriated for a particular account, \"not more than $1,800,000\" be made available for expenses of the Commission on the Social Security \"Notch\" Issue. In such cases, the amount of funding ultimately received by the commission may be less than the specified amount. Table 2 and Table 3 display data on amounts specified in appropriations acts for noncommemorative and commemorative commissions, respectively. For commissions where amounts in appropriations bills were identified, each table contains the name of the commission and a citation to the public law that created it, as well as the dollar amount identified. For every dollar amount, the fiscal year and public law number of the relevant appropriations act are included. Amounts are provided in both nominal as well as constant 2019 dollars. Any identifiable rescissions of commission funding contained in appropriations acts are shown in parentheses. As shown in Table 2 and Table 3 below, amounts made available to commissions vary widely. Some commissions receive a single appropriation; others receive multiple appropriations over several fiscal years. Amounts provided range from several hundred thousand dollars to several million dollars, and may or may not be equal to any amounts explicitly authorized to be appropriated for commission expenses in the commission's original authorizing statute. Generally, a commission may utilize its funds to pay commissioners and staff, hire consultants, and reimburse travel expenses, in addition to other administrative costs. Understanding how commissions utilize funds may be of interest to policymakers wishing to design new commissions or oversee existing commissions. As with commission funding, no single data source contains comprehensive information on commission expenditures. Congress has required some commissions to periodically submit financial reports that detail commission expenditures, but for most identified congressional commissions, expenditure data are not publicly available. To better understand how commissions have used funds provided to them, this report analyzes data for the subset of congressional commissions that reported their expenditures in the Federal Advisory Committee Act (FACA) database. FACA requires formal reporting, administration, and oversight procedures for committees or commissions advising the executive branch. Whether FACA requirements apply to a particular advisory commission may depend on a number of factors, including whether most appointments to the commission are made by members of the legislative or the executive branch, and to which branch of government the commission must issue its report, findings, or recommendations. Although many congressional commissions are exempt from FACA, some are subject to FACA and report their expenditures to the General Services Administration (GSA). GSA collects and reports advisory commission operational data, including information on commission expenditures, in the FACA database. Within the FACA database, CRS searched for the name of the 153 congressional commissions identified to locate commissions that reported expenditures. Twenty of 153 identified commissions appeared in the database and reported expenditures during one or more fiscal years. FACA committees report their expenditures across several categories, including personnel costs, travel and per diem costs, and \"other\" costs. Personnel and travel costs are both further disaggregated by whether those costs were attributable to federal commission members, nonfederal commission members, federal staff, or consultants. CRS calculated the total reported expenditures of each commission, as well as the percentage of commission expenditures attributable to commissioner pay; staff pay; consultant pay; total travel and per diem expenses of all members, staff, and consultants; and \"other\" expenses. Congressional commissions that are subject to FACA and appear in the FACA database may differ from commissions that are not subject to FACA in ways that might affect their overall costs and expenditure patterns. Consequently, figures on cost and expenditures presented below may not be representative of costs and expenditures of all congressional commissions. The accuracy and completeness of expenditure data contained in the FACA database have not been independently verified by CRS. Table 4 contains data on the reported expenditures of 20 congressional commissions that appeared in the FACA database. Specifically, Table 4 contains the commission name and statute establishing the commission; fiscal years during which the commission reported expenditures; the total amount spent, in both nominal and constant 2019 dollars; and the percentage of reported expenditures attributable to commissioner pay, federal staff pay, consultant pay, travel and per diem expenditures, and other expenditures. The total amount spent by the selected commissions varied from a low of $286,851 to a high of $13,855,998 (between $388,480 and $17,117,361 in constant 2019 dollars). Among the commissions analyzed, expenditures on federal staff and consultant pay often constituted a significant portion of reported spending; expenditures attributable to federal staff and consultant pay constituted a majority of spending for more than half of the commissions identified. Total travel and per diem expenditures ranged from a low of approximately 2% to a high of approximately 34% of commission spending. Many congressional commissions do not compensate their members. Consistent with this finding, many commissions listed in Table 4 report zero expenditures on the pay of federal and nonfederal commission members. Among commissions that report payments to members, these payments constituted as much as approximately 29% of commission spending, though most constituted less than 10%. Congressional commissions have been established for a variety of purposes, and can help serve a critical role by informing Congress, providing expert advice on complex or controversial issues, generating policy recommendations, or organizing commemorative activities. These commissions have been funded in a variety of ways, and their total cost has varied considerably. The cost of any particular commission may depend on its scope, duties, and duration, among other factors, and the degree to which it can satisfactorily accomplish its duties may depend in part on the resources made available to it. No single data source comprehensively documents either the funds made available for congressional commissions, or how commissions have utilized the funds available to them. More complete and reliable data on commission funding and expenditure patterns may benefit policymakers who wish to use such data to guide the creation of future commissions, or to facilitate the oversight of such entities. If Congress wished to systematize the collection of information on commission funding or expenditures, a number of options are available. Congress has on several occasions required commissions to submit periodic financial reports that detail any income and expenditures. Similar approaches that require commissions to submit periodic financial reports, to include funding and expenditure data within the commission's final report, or otherwise make financial data publicly available, may assist Congress in keeping informed of commission operations and ensure that a commission is utilizing its resources in a desired manner. On the other hand, such reporting requirements may place additional burdens on limited commission time and resources.", "summary": "Congressional commissions have been established for a variety of purposes, and can help serve a critical role by informing Congress, providing expert advice on complex or controversial issues, and generating policy recommendations. In general, commissions hold hearings, conduct research, analyze data, and/or make field visits as they carry out their duties. Most complete their work by delivering their findings, recommendations, or advice in the form of a written report to Congress. For example, the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission) was created to \"examine and report upon the facts and causes relating to the terrorist attacks of September 11, 2001,\" and to \"investigate and report to the President and Congress on its findings, conclusions, and recommendations for corrective measures that can be taken to prevent acts of terrorism,\" among other duties. The commission ultimately submitted a final report to Congress and the President containing its findings and conclusions, along with 48 policy recommendations. A variety of factors c an contribute to the overall cost of a commission. For instance, many commissions hire paid staff, and are often able to request detailees from federal agencies, hire consultants, and obtain administrative support from one or more federal agencies on a reimbursable basis. Additionally, most commissions reimburse the travel expenditures of commissioners and staff, and some compensate commission members. The duration of a commission may also significantly affect its cost; past congressional commissions have been designed to last anywhere from several months to several years. Using a dataset of congressional commissions that were established from the 101 st Congress (1989-1990) through the 115 th Congress (2017-2018), this report analyzes methods used to fund 153 congressional commissions. Additionally, this report analyzes actual amounts provided for commissions in appropriations acts, and expenditure patterns of congressional commissions for which data are readily available because they appear in the Federal Advisory Committee Act (FACA) database. When specifying how a commission is funded, most commission statutes either authorize appropriations for commission expenses, authorize the use of funds from other appropriations or accounts, or direct that private donations be the sole source of funding for the commission. Most statutes establishing noncommemorative commissionsâcommissions that are generally designed to conduct a study, investigate an event, and/or make policy recommendationsâeither authorize appropriations for commission expenses, or authorize the use of funds from other appropriations or accounts. By contrast, statutes establishing commemorative commissionsâcommissions designed to celebrate an individual, group, or eventâtypically authorize appropriations, and/or provide the commission the authority to receive donations, including donations of money, property, and volunteer services. Although commission statutes typically specify a method by which the commission will be funded, most do not actually provide funds for the commission; funds may be provided in annual appropriations acts, or by other means. Actual funding levels appropriated for past congressional commissions vary from several hundred thousand dollars to several million dollars. No single data source comprehensively documents commission funding or expenditures. Among those congressional commissions whose expenditures are reported in the FACA database, the total amount reportedly spent by any individual commission ranges from several hundred thousand dollars to over $13 million. Payments to federal staff and consultants frequently comprise a significant portion of commission expenditures. Many commissions also incur travel expenses, payments to commission members, and other expenses. For an overview of congressional commissions, see CRS Report R40076, Congressional Commissions: Overview, Structure, and Legislative Considerations , by Jacob R. Straus. For additional information on the design of congressional commissions, see CRS Report R45328, Designing Congressional Commissions: Background and Considerations for Congress , by William T. Egar. For additional information on commemorative commissions, see CRS Report R41425, Commemorative Commissions: Overview, Structure, and Funding , by Jacob R. Straus. For additional information on commission membership structures, see CRS Report RL33313, Congressional Membership and Appointment Authority to Advisory Commissions, Boards, and Groups , by Jacob R. Straus and William T. Egar.", "document_type": "crs"}
{"report": "The Bureau of Reclamation (Reclamation), part of the Department of the Interior (DOI), operates the multipurpose federal Central Valley Project (CVP) in California, one of the world's largest water storage and conveyance systems. The CVP runs approximately 400 miles in California, from Redding to Bakersfield ( Figure 1 ). It supplies water to hundreds of thousands of acres of irrigated agriculture throughout the state, including some of the most valuable cropland in the country. It also provides water to selected state and federal wildlife refuges, as well as to some municipal and industrial (M&I) water users. This report provides information on hydrologic conditions in California and their impact on state and federal water management, with a focus on deliveries related to the federal CVP. It also summarizes selected issues for Congress related to the CVP. The drought of 2012-2016, widely considered to be among California's most severe droughts in recent history, resulted in major reductions to CVP contractor allocations and economic and environmental impacts throughout the state. These impacts were of interest to Congress, which oversees federal operation of the CVP. Although the drought ended with the wet winter of 2017, many of the water supply controversies associated with the CVP predated those water shortages and remain unresolved. Absent major changes to existing hydrologic, legislative, and regulatory baselines, most agree that at least some water users are likely to face ongoing constraints to their water supplies. Due to the limited water supplies available, proposed changes to the current operations and allocation system are controversial. As a result of the scarcity of water in the West and the importance of federal water infrastructure to the region, western water issues are regularly of interest to many lawmakers. Legislation enacted in the 114 th Congress (Title II of the Water Infrastructure Improvements for the Nation [WIIN] Act; P.L. 114-322 ) included several CVP-related sections. These provisions directed pumping to \"maximize\" water supplies for the CVP (including pumping or \"exports\" to CVP water users south of the Sacramento and San Joaquin Rivers' confluence with the San Francisco Bay, known as the Bay-Delta or Delta ) in accordance with applicable biological opinions (BiOps) for project operations. They also allowed for increased pumping during certain storm events generating high flows, authorized actions to facilitate water transfers, and established a new standard for measuring the effects of water operations on species. In addition to operational provisions, the WIIN Act authorized funding for construction of new federal and nonfederal water storage projects. CVP projects are among the most likely recipients of this funding. Due to increased precipitation and disagreements with the state, among other factors, the WIIN Act's CVP operational authorities did not yield significant new water exports south of the Delta in 2017 and 2018. However, the authorities may be more significant in years of limited precipitation and thus may yield increased supplies in the future. Although use of the new operational authorities was limited, Reclamation received funding for WIIN Act-authorized water storage project design and construction in FY2017-FY2019; a significant amount of this funding has gone to CVP-related projects. Several state and federal proposals are also currently under consideration and have generated controversy for their potential to significantly alter CVP operations. In mid-2018, the State of California proposed revisions to its Bay-Delta Water Quality Control Plan. These changes would require that more flows from the San Joaquin and Sacramento Rivers reach the California Bay-Delta for water quality and fish and wildlife enhancement (and would thus further restrict water supplies for other users). At the same time, the Trump Administration is exploring options to increase CVP water supplies for users. California's Central Valley encompasses almost 20,000 square miles in the center of the state ( Figure 1 ). It is bound by the Cascade Range to the north, the Sierra Nevada to the east, the Tehachapi Mountains to the south, and the Coast Ranges and San Francisco Bay to the west. The northern third of the valley is drained by the Sacramento River, and the southern two-thirds of the valley are drained by the San Joaquin River. Historically, this area was home to significant fish and wildlife populations. The CVP originally was conceived as a state project; the state studied the project as early as 1921, and the California state legislature formally authorized it for construction in 1933. After it became clear that the state was unable to finance the project, the federal government (through the U.S. Army Corps of Engineers, or USACE) assumed control of the CVP as a public works construction project authority provided under the Rivers and Harbors Act of 1935. The Franklin D. Roosevelt Administration subsequently transferred the project to Reclamation. Construction on the first unit of the CVP (Contra Costa Canal) began in October 1937, with water first delivered in 1940. Additional CVP units were completed and came online over time, and some USACE-constructed units also have been incorporated into the project. The New Melones Unit was the last unit of the CVP to come online; it was completed in 1978 and began operations in 1979. The CVP made significant changes to California's natural hydrology to develop water supplies for irrigated agriculture, municipalities, and hydropower, among other things. Most of the CVP's major units, however, predated major federal natural resources and environmental protection laws such as the Endangered Species Act (ESA; 87 Stat. 884. 16 U.S.C. §§1531-1544) and the National Environmental Policy Act (NEPA; 42 U.S.C. §§4321 et seq), among others. Thus, much of the current debate surrounding the project revolves around how to address the project's changes to California's hydrologic system that were not major considerations when it was constructed. Today, CVP water serves a variety of different purposes for both human uses and fish and wildlife needs. The CVP provides a major source of support for California agriculture, which is first in the nation in terms of farm receipts. CVP water supplies irrigate more than 3 million acres of land in central California and support 7 of California's top 10 agricultural counties. In addition, CVP M&I water provides supplies for approximately 2.5 million people per year. CVP operations also are critical for hydropower, recreation, and fish and wildlife protection. In addition to fisheries habitat, CVP flows support wetlands, which provide habitat for migrating birds. The CVP ( Figure 1 ) is made up of 20 dams and reservoirs, 11 power plants, and 500 miles of canals, as well as numerous other conduits, tunnels, and storage and distribution facilities. In an average year, it delivers approximately 5 million acre-feet (AF) of water to farms (including some of the nation's most valuable farmland); 600,000 AF to M&I users; 410,000 AF to wildlife refuges; and 800,000 AF for other fish and wildlife needs, among other purposes. A separate major project owned and operated by the State of California, the State Water Project (SWP), draws water from many of the same sources as the CVP and coordinates its operations with the CVP under several agreements. In contrast to the CVP, the SWP delivers about 70% of its water to urban users (including water for approximately 25 million users in the San Francisco Bay, Central Valley, and Southern California); the remaining 30% is used for irrigation. At their confluence, the Sacramento and San Joaquin Rivers flow into the San Francisco Bay (the Bay-Delta, or Delta). Operation of the CVP and SWP occurs through the storage, pumping, and conveyance of significant volumes of water from both river basins (as well as trans-basin diversions from the Trinity River Basin in Northern California) for delivery to users. Federal and state pumping facilities in the Delta near Tracy, CA, export water from Northern California to Central and Southern California and are a hub for CVP operations and related debates. In the context of these controversies, north of Delta (NOD) and south of Delta (SOD) are important categorical distinctions for water users. CVP storage is spread throughout Northern and Central California. The largest CVP storage facility is Shasta Dam and Reservoir in Northern California ( Figure 2 ), which has a capacity of 4.5 million AF. Other major storage facilities, from north to south, include Trinity Dam and Reservoir (2.4 million AF), Folsom Dam and Reservoir (977,000 AF), New Melones Dam and Reservoir (2.4 million AF), Friant Dam and Reservoir (520,000 AF), and San Luis Dam and Reservoir (1.8 million AF of storage, of which half is federal and half is nonfederal). The CVP also includes numerous water conveyance facilities, the longest of which are the Delta-Mendota Canal (which runs for 117 miles from the federally operated Bill Jones pumping plant in the Bay-Delta to the San Joaquin River near Madera) and the Friant-Kern Canal (which runs 152 miles from Friant Dam to the Kern River near Bakersfield). Non-CVP water storage and infrastructure also is spread throughout the Central Valley and in some cases is integrated with CVP operations. Major non-CVP storage infrastructure in the Central Valley includes multiple storage projects that are part of the SWP (the largest of which is Oroville Dam and Reservoir in Northern California), as well as private storage facilities (e.g., Don Pedro and Exchequer Dams and Reservoirs) and local government-owned dams and infrastructure (e.g., O'Shaughnessy Dam and Hetch-Hetchy Reservoir and Aqueduct, which are owned by the San Francisco Public Utilities Commission). In addition to its importance for agricultural water supplies, California's Central Valley also provides valuable wetland habitat for migratory birds and other species. As such, it is home to multiple state, federal, and private wildlife refuges north and south of the Delta. Nineteen of these refuges (including 12 refuges within the National Wildlife Refuge system, 6 State Wildlife Areas/Units, and 1 privately managed complex) provide managed wetland habitat that receives water from the CVP and other sources. Five of these units are located in the Sacramento River Basin (i.e., North of the Delta), 12 are in the San Joaquin River Basin, and the remaining 2 are in the Tulare Lake Basin. In normal years, snowpack accounts for approximately 30% of California's water supplies and is an important factor in determining CVP and SWP allocations. Water from snowpack typically melts in the spring and early summer, and it is stored and made available to meet water needs throughout the state in the summer and fall. By late winter, the state's water supply outlook typically is sufficient for Reclamation to issue the amount of water it expects to deliver to its contractors. At that time, Reclamation announces estimated deliveries for its 250 CVP water contractors in the upcoming water year. More than 9.5 million AF of water per year is potentially available from the CVP for delivery based on contracts between Reclamation and CVP contractors. However, most CVP water contracts provide exceptions for Reclamation to reduce water deliveries due to hydrologic conditions and other conditions outside Reclamation's control. As a result of these stipulations, Reclamation regularly makes cutbacks to actual CVP water deliveries to contractors due to drought and other factors. Even under normal hydrological circumstances, the CVP often delivers much less than the maximum contracted amount of water; since the early 1980s, an average of about 7 million AF of water has been made available to CVP contractors annually (including 5 million AF to agricultural contractors). However, during drought years deliveries may be significantly less. In the extremely dry water years of 2012-2015, CVP annual deliveries averaged approximately 3.45 million AF. CVP contractors receive varying levels of priority for water deliveries based on their water rights and other related factors, and some of the largest and most prominent water contractors have a relatively low allocation priority. Major groups of CVP contractors include water rights contractors (i.e., senior water rights holders such as the Sacramento River Settlement and San Joaquin River Exchange Contractors, see box below), North and South of Delta water service contractors, and Central Valley refuge water contractors. The relative locations for these groups are shown in Figure 1 . The largest contract holders of CVP water by percentage of total contracted amounts are Sacramento River Settlement Contractors, located on the Sacramento River. The second-largest group are SOD water service contractors (including Westlands Water District, the CVP's largest contractor), located in the area south of the Delta. Other major contractors include San Joaquin River Exchange Contractors, located west of the San Joaquin River and Friant Division contractors, located on the east side of the San Joaquin Valley. Central Valley refuges and several smaller contractor groups (e.g., Eastside Contracts, In-Delta-Contra Costa Contracts, and SOD Settlement Contracts) also factor into CVP water allocation discussions. Figure 3 depicts an approximate division of maximum available CVP water deliveries pursuant to contracts with Reclamation. The largest contractor groups and their relative delivery priority are discussed in more detail in the Appendix to this report. Reclamation provided its allocations for the 2019 water year in a series of announcements in early 2019. As was the case in 2018, over the course of the spring Reclamation increased its allocations for some contractors from initially announced levels. Most CVP contractor groups were allocated 100% of their maximum contracted amounts in 2019. One major exception is SOD agricultural water service contractors, who were allocated 70% of their contracted supplies. Prior to receiving a full allocation in 2017, the last time these contractors received a 100% allocation was 2006. They have received their full contract allocations only four times since 1990. The other major water project serving California, the SWP, is operated by California's Department of Water Resources (DWR). The SWP primarily provides water to M&I users and some agricultural users, and it integrates its operations with the CVP. Similar to the CVP, the SWP has considerably more contracted supplies than it typically makes available in its deliveries. SWP contracted entitlements are 4.17 million AF, but average annual deliveries are typically considerably less than that amount. SWP water deliveries were at their lowest point in 2014 and 2015, and they were significantly higher in the wet year of 2017. SWP water supply allocations for water years 2012-2019 are shown in Table 2 . The CVP and SWP are operated in conjunction under the 1986 Coordinated Operations Agreement (COA), which was executed pursuant to P.L. 99-546 . COA defines the rights and responsibilities of the CVP and SWP with respect to in-basin water needs and provides a mechanism to account for those rights and responsibilities. Despite several prior efforts to review and update the agreement to reflect major changes over time (e.g., water delivery reductions pursuant to the Central Valley Project Improvement Act, the Endangered Species Act requirements, and new Delta Water Quality Standards, among other things), the 1986 agreement remains in place. Combined CVP and SWP exports (i.e., water transferred from north to south of the Delta) is of interest to many observers because it reflects trends over time in the transfer of water from north to south (i.e., exports ) by the two projects, in particular through pumping. Exports of the CVP and SWP, as well as total combined exports since 1978, have varied over time ( Figure 4 ). Most recently, combined exports dropped significantly during the 2012-2016 drought but have rebounded since 2016. Prior to the drought, overall export levels had increased over time, having averaged more from 2001 to 2011 than over any previous 10-year period. The 6.42 million AF of combined exports in 2017 was the second most on record, behind 6.59 million AF in 2011. Over time, CVP exports have decreased on average, whereas SWP exports have increased. Additionally, exports for agricultural purposes have declined as a subset of total exports, in part due to those exports being made available for other purposes (e.g., fish and wildlife). Previously, some observers argued that CVP obligations under COA were no longer proportional to water supplies that the CVP receives from the Delta, thus the agreement should be renegotiated. Dating to 2015, Reclamation and DWR conducted a mutual review of COA but reportedly were unable to agree on revisions. On August 17, 2018, Reclamation provided a Notice of Negotiations to DWR. Following negotiations in the fall of 2018, Reclamation and DWR agreed to an addendum to COA in December 2018. Whereas the original 1986 agreement included a fixed ratio of 75% CVP/25% SWP for the sharing of regulatory requirements associated with storage withdrawals for Sacramento Valley in-basin uses (e.g., curtailments for water quality and species uses), the revised addendum adjusted the ratio of sharing percentages based on water year types ( Table 3 ). The 2018 addendum also adjusted the sharing of export capacity under constrained conditions. Whereas under the 1986 COA, export capacity was shared 50/50 between the CVP and the SWP, under the revised COA the split is to be 60% CVP/40% SWP during excess conditions, and 65% CVP/35% SWP during balanced conditions. Finally, the state also agreed in the 2018 revisions to transport up to 195,000 AF of CVP water through the California Aqueduct, during certain conditions. Concerns over CVP water supply deliveries persist in part because even in years with high levels of precipitation and runoff, some contractors (in particular SOD water service contractors) have regularly received allocations of less than 100% of their contract supplies. Allocations for some users have declined over time; additional environmental requirements in recent decades have reduced water deliveries for human uses. Coupled with reduced water supplies available in drought years, some have increasingly focused on what can be done to increase water supplies for users. At the same time, others that depend on or advocate for the health of the San Francisco Bay and its tributaries, including fishing and environmental groups and water users throughout Northern California, have argued for maintaining or increasing existing environmental protections (the latter of which likely would further constrain CVP exports). Hydrology and state water rights are the two primary drivers of CVP allocations. However, at least three other regulatory factors affect the timing and amount of water available for delivery to CVP contractors and are regularly the subject of controversy: State water quality requirements pursuant to state and the federal water quality laws (including the Clean Water Act [CWA, 33 U.S.C. §§1251-138]); Regulations and court orders pertaining to implementation of the federal Endangered Species Act (ESA, 87 Stat. 884. 16 U.S.C. §§1531-1544); and Implementation of the Central Valley Project Improvement Act (CVPIA; P.L. 102-575 ). Each of these factors is discussed in more detail below. California sets water quality standards and issues permits for the discharge of pollutants in compliance with the federal CWA, enacted in 1972. Through the Porter-Cologne Act (a state law), California implements federal CWA requirements and authorizes the State Water Resources Control Board (State Water Board) to adopt water quality control plans, or basin plans. The CVP and the SWP affect water quality in the Bay-Delta depending on how much freshwater the projects release into the area as \"unimpaired flows\" (thereby affecting area salinity levels). The first Water Quality Control Plan for the Bay-Delta (Bay-Delta Plan) was issued by the State Water Board in 1978. Since then, there have been three substantive updates to the plan—in 1991, 1995, and 2006. The plans generally have required the SWP and CVP to meet certain water quality and flow objectives in the Delta to maintain desired salinity levels for in-Delta diversions (e.g., water quality levels for in-Delta water supplies) and fish and wildlife, among other things. These objectives often affect the amount and timing of water available to be pumped, or exported, from the Delta and thus at times result in reduced Delta exports to CVP and SWP water users south of the Delta. The Bay-Delta Plan is currently implemented through the State Water Board's Decision 1641 (or D-1641), which was issued in 1999 and placed responsibility for plan implementation on the state's largest two water rights holders, Reclamation and the California DWR. Pumping restrictions to meet state-set water quality levels—particularly increases in salinity levels—can sometimes be significant. However, the relative magnitude of these effects varies depending on hydrology. For instance, Reclamation estimated that in 2014, water quality restrictions accounted for 176,300 AF of the reduction in pumping from the long-term average for CVP exports. In 2016, Reclamation estimated that D-1641 requirements accounted for 114,500 AF in reductions from the long-term export average. In mid-2018, the State Water Board released the final draft of the update to the 2006 Bay Delta Plan (i.e., the Bay-Delta Plan Update) for the Lower San Joaquin River and Southern Delta. It also announced further progress on related efforts under the update for flow requirements on the Sacramento River and its tributaries. The Bay-Delta Plan Update requires additional flows to the ocean (generally referred to in these documents as \"unimpaired flows\") from the San Joaquin River and its tributaries (i.e., the Stanislaus, Tuolumne, and Merced Rivers). Under the proposal, the unimpaired flow requirement for the San Joaquin River would be 40% (within a range of 30%-50%); average unimpaired flows currently range from 21% to 40%. The state estimates that the updated version of the plan would reduce water available for human use from the San Joaquin River and its tributaries by between 7% and 23%, on average (depending on the water year type), but it could reduce these water supplies by as much as 38% during critically dry years. A more detailed plan for the Sacramento River and its tributaries also is expected in the future. A preliminary framework released by the state in July 2018 proposed a potential requirement of 55% unimpaired flows from the Sacramento River (within a range of 45% to 65%). According to the State Water Board, if the plan updates for the San Joaquin and Sacramento Rivers are finalized and water users do not enter into voluntary agreements to implement them, the board could take actions to require their implementation, such as promulgation of regulations and conditioning of water rights. Reclamation and its contractors likely would play key roles in implementing any update to the Bay-Delta Plan, as they do in implementing the current plan under D-1641. Pursuant to Section 8 of the Reclamation Act of 1902, Reclamation generally defers to state water law in carrying out its authorities, but the proposed Bay Delta Plan Update has generated controversy. In a July 2018 letter to the State Water Board, the Commissioner of Reclamation opposed the proposed standards for the San Joaquin River, arguing that meeting them would necessitate decreased water in storage at New Melones Reservoir of approximately 315,000 AF per year (a higher amount than estimated by the State Water Board). Reclamation argued that such a change would be contrary to the CVP prioritization scheme as established by Congress. On December 12, 2018, the State Water Board approved the Bay Delta Plan Update in Resolution 1018-0059. According to the state, the plan establishes a \"starting point\" for increased river flows but also makes allowances for reduced river flows on tributaries where stakeholders have reached voluntary agreements to pursue both flow and \"non-flow\" measures. The conditions in the Bay-Delta Plan Update would be implemented through water rights conditions imposed by the State Water Board; these conditions are to be implemented no later than 2022. On March 28, 2019, the Department of Justice and DOI filed civil actions in federal and state court against the State Water Board for failing to comply with the California Environmental Quality Act. Several species that have been listed under the federal ESA are affected by the operations of the CVP and the SWP. One species, the Delta smelt, is a small pelagic fish that is susceptible to entrainment in CVP and SWP pumps in the Delta; it was listed as threatened under ESA in 1993. Surveys of Delta smelt in 2017 found two adult smelt, the lowest catch in the history of the survey. These results were despite the relatively wet winter of 2017, which is a concern for many stakeholders because low population sizes of Delta smelt could result in greater restrictions on water flowing to users. It also raises larger concerns about the overall health and resilience of the Bay-Delta ecosystem. In addition to Delta smelt, multiple anadromous salmonid species are listed under ESA, including the endangered Sacramento River winter-run Chinook salmon, the threatened Central Valley spring-run Chinook salmon, the threatened Central Valley steelhead, threatened Southern Oregon/Northern California Coast coho salmon, and the threatened Central California Coast steelhead. Federal agencies consult with the U.S. Fish and Wildlife Service (FWS) in DOI or the Department of Commerce's (DOC's) National Marine Fisheries Service (NMFS) to determine if a federal project or action might jeopardize the continued existence of a species listed under ESA or adversely modify its habitat. If an effect is possible, formal consultation is started and usually concludes with the appropriate service issuing a BiOp on the potential harm the project poses and, if necessary, issuing reasonable and prudent measures to reduce the harm. FWS and NMFS each have issued federal BiOps on the coordinated operation of the CVP and the SWP. In addition, both agencies have undertaken formal consultation on proposed changes in the operations and have concluded that the changes, including increased pumping from the Delta, would jeopardize the continued existence of several species protected under ESA. To avoid such jeopardy, the FWS and NMFS BiOps have included Reasonable and Prudent Alternatives (RPAs) for project operations. CVP and SWP BiOps have been challenged and revised over time. Until 2004, a 1993 winter-run Chinook salmon BiOp and a 1995 Delta smelt BiOp (as amended) governed Delta exports for federal ESA purposes. In 2004, a proposed change in coordinated operation of the SWP and CVP (including increased Delta exports), known as OCAP (Operations Criteria and Plan) resulted in the development of new BiOps. Environmental groups challenged the agencies' 2004 BiOps; this challenge resulted in the development of new BiOps by the FWS and NMFS in 2008 and 2009, respectively. These BiOps placed additional restrictions on the amount of water exported via SWP and CVP Delta pumps and other limitations on pumping and release of stored water. The CVP and SWP currently are operated in accordance with these BiOps, both of which concluded that the coordinated long-term operation of the CVP and SWP, as proposed in Reclamation's 2008 Biological Assessment, was likely to jeopardize the continued existence of listed species and destroy or adversely modify designated critical habitat. Both BiOps included RPAs designed to allow the CVP and SWP to continue operating without causing jeopardy to listed species or destruction or adverse modification to designated critical habitat. Reclamation accepted and then began project operations consistent with the FWS and NMFS RPAs, which continue to govern operations. The exact magnitude of reductions in pumping due to ESA restrictions compared to the aforementioned water quality restrictions has varied considerably over time. In absolute terms, ESA-driven reductions typically are greater in wet years than in dry years, but the proportion of ESA reductions relative to deliveries is not necessarily constant and depends on numerous factors. For instance, Reclamation estimated that ESA restrictions accounted for a reduction in deliveries of 62,000 AF from the long-term average for CVP deliveries in 2014 and 144,800 AF of CVP delivery reductions in 2015 (both years were extremely dry). In 2016, ESA reductions accounted for a much larger amount (528,000 AF) in a wet year, when more water is delivered. Some scientists estimate that flows used to protect all species listed under ESA accounted for approximately 6.5% of the total Delta outflow from 2011 to 2016. During the 2012-2016 drought, implementation of the RPAs (which generally limit pumping under specific circumstances and call for water releases from key reservoirs to support listed species) was modified due to temporary urgency change orders (TUCs). These TUCs, issued by the State Water Resources Control Board in 2014 and again in 2015, were deemed consistent with the existing BiOps by NMFS and FWS. Such changes allowed more water to be pumped during certain periods based on real-time monitoring of species and water conditions. DWR estimates that approximately 400,000 AF of water was made available in 2014 for export due to these orders. In August 2016, Reclamation and DWR requested reinitiation of consultation on long-term, system-wide operations of the CVP and the SWP based on new information related to multiple years of drought, species decline, and related data. In December 2017, the Trump Administration gave formal notice of its intent to prepare an environmental impact statement analyzing potential long-term modifications to the coordinated operations of the CVP and the SWP. According to the notice, the actions under consideration will include those with the potential to \"maximize\" water and power supplies for users and that modify existing regulatory requirements, among other things. The effort is widely viewed as an initial step toward potential long-term changes to CVP operations and existing BiOp requirements. The Biological Assessment (BA) proposing changes for the operation of the CVP and SWP was sent to FWS and NMFS by Reclamation on January 31, 2019. The BA discusses the operational changes proposed by Reclamation and mitigation factors to address listed species. The changes reflect provisions in the WIIN Act and efforts to maximize water supplies for users. The BA also states that nonoperational activities will be implemented to augment and bolster listed fish populations. These activities include habitat restoration and introducing hatchery-bred Delta smelt. Operational changes include increasing flows to take into account additional water from winter storms and increasing base flows when storage levels are higher. The Trump Administration also has indicated its intent to expedite other regulatory changes under ESA. On October 19, 2018, President Trump issued a memorandum that directed DOI and DOC to identify water infrastructure projects in California for which they have responsibilities under ESA. Per the memorandum, the agencies are to identify regulations and procedures that burden the projects and develop a plan to \"suspend, revise, or rescind\" those regulations. The White House memorandum also directed that the aforementioned joint BiOps be completed by June 15, 2019. In an effort to mitigate many of the environmental effects of the CVP, Congress in 1992 passed the CVPIA as Title 34 of P.L. 102-575 . The act made major changes to the management of the CVP. Among other things, it formally established fish and wildlife purposes as an official project purpose of the CVP and called for a number of actions to protect, restore, and enhance these resources. Overall, the CVPIA's provisions resulted in a combination of decreased water availability and increased costs for agricultural and M&I contractors, along with new water and funding sources to restore fish and wildlife. Thus, the law remains a source of tension, and some would prefer to see it repealed in part or in full. Some of the CVPIA's most prominent changes to the CVP included directives to double certain anadromous fish populations by 2002 (which did occur); allocate 800,000 AF of \"(b)(2)\" CVP yield (600,000 AF in drought years) to fish and wildlife purposes; provide water supplies (in the form of \"Level 2\" and \"Level 4\" supplies) for 19 designated Central Valley wildlife refuges; establish a fund, the Central Valley Project Restoration Fund (CVPRF), to be financed by water and power users for habitat restoration and land and water acquisitions. Pursuant to prior court rulings since enactment of the legislation, CVPIA (b)(2) allocations may be used to meet other state and federal requirements that reduce exports or require an increase from baseline reservoir releases. Thus, in a given year, the aforementioned export reductions due to state water quality and federal ESA restrictions are counted and reported on annually as (b)(2) water, and in some cases overlap with other stated purposes of CVPIA (e.g., anadromous fish restoration). The exact makeup of (b)(2) water in a given year typically varies. For example, in 2014 (a critically dry year), out of a total of 402,000 AF of (b)(2) water, 176,300 AF (44%) was attributed to export reductions for Bay-Delta Plan water quality requirements. Remaining (b)(2) water was comprised of a combination of reservoir releases classified as CVPIA anadromous fish restoration and NMFS BiOp compliance purposes (163,500 AF) and export reductions under the 2009 salmonid BiOp (62,200 AF). In 2016 (a wet year), 793,000 AF of (b)(2) water included 528,000 AF (66%) of export pumping reductions under FWS and NMFS BiOps and 114,500 AF (14%) for Bay-Delta Plan requirements. The remaining water was accounted for as reservoir releases for the anadromous fish restoration programs, the NMFS BiOp, and the Bay-Delta Plan. Development of the CVP made significant changes to California's natural hydrology. In addition to the aforementioned CVPIA efforts to address some of these impacts, three ongoing, congressionally authorized restoration initiatives also factor into federal activities associated with the CVP: The Trinity River Restoration Program (TRRP), administered by Reclamation, attempts to mitigate impacts and restore fisheries impacted by construction of the Trinity River Division of the CVP. The San Joaquin River Restoration Program (SJRRP) is an ongoing effort to implement a congressionally enacted settlement to restore fisheries in the San Joaquin River. The California Bay-Delta Restoration Program aims to restore and protect areas within the Bay-Delta that are affected by the CVP and other activities. In addition to their habitat restoration activities, both the TRRP and the SJRRP involve the maintenance of instream flow levels that use water that was at one time diverted for other uses. Each effort is discussed briefly below. TRRP—administered by DOI—aims to mitigate impacts of the Trinity Division of the CVP and restore fisheries to their levels prior to the Bureau of Reclamation's construction of this division in 1955. The Trinity Division primarily consists of two dams (Trinity and Lewiston Dams), related power facilities, and a series of tunnels (including the 10.7-mile tunnel Clear Creek Tunnel) that divert water from the Trinity River Basin to the Sacramento River Basin and Whiskeytown Reservoir. Diversion of Trinity River water (which originally required that a minimum of 120,000 AF be reserved for Trinity River flows) resulted in the near drying of the Trinity River in some years, thereby damaging spawning habitat and severely depleting salmon stocks. Efforts to mitigate the effects of the Trinity Division date back to the early 1980s, when DOI initiated efforts to study the issue and increase Trinity River flows for fisheries. Congress authorized legislation in 1984 ( P.L. 98-541 ) and in 1992 ( P.L. 102-575 ) providing for restoration activities and construction of a fish hatchery, and directed that 340,000 AF per year be reserved for Trinity River flows (a significant increase from the original amount). Congress also mandated completion of a flow evaluation study, which was formalized in a 2000 record of decision (ROD) that called for additional water for instream flows, river channel restoration, and watershed rehabilitation. The 2000 ROD forms the basis for TRRP. The flow releases outlined in that document have in some years been supplemented to protect fish health in the river, and these increases have been controversial among some water users. From FY2013 to FY2018, TRRP was funded at approximately $12 million per year in discretionary appropriations from Reclamation's Fish and Wildlife Management and Development activity. Historically, the San Joaquin River supported large Chinook salmon populations. After the Bureau of Reclamation completed Friant Dam on the San Joaquin River in the late 1940s, much of the river's water was diverted for agricultural uses and approximately 60 miles of the river became dry in most years. These conditions made it impossible to support Chinook salmon populations upstream of the Merced River confluence. In 1988, a coalition of environmental, conservation, and fishing groups advocating for river restoration to support Chinook salmon recovery sued the Bureau of Reclamation. A U.S. District Court judge eventually ruled that operation of Friant Dam was violating state law because of its destruction of downstream fisheries. Faced with mounting legal fees, considerable uncertainty, and the possibility of dramatic cuts to water diversions, the parties agreed to negotiate a settlement instead of proceeding to trial on a remedy regarding the court's ruling. This settlement was agreed to in 2006 and enacted by Congress in 2010 (Title X of P.L. 111-11 ). The settlement agreement and its implementing legislation form the basis for the SJRRP, which requires new releases of CVP water from Friant Dam to restore fisheries (including salmon fisheries) in the San Joaquin River below Friant Dam (which forms Millerton Lake) to the confluence with the Merced River (i.e., 60 miles). The SJRRP also requires efforts to mitigate water supply delivery losses due to these releases, among other things. In combination with the new releases, the settlement's goals are to be achieved through a combination of channel and structural modifications along the San Joaquin River and the reintroduction of Chinook salmon ( Figure 5 ). These activities are funded in part by federal discretionary appropriations and in part by repayment and surcharges paid by CVP Friant water users that are redirected toward the SJRRP in P.L. 111-11 . Because increased water flows for restoring fisheries (known as restoration flows ) would reduce CVP diversions of water for off-stream purposes, such as irrigation, hydropower, and M&I uses, the settlement and its implementation have been controversial. The quantity of water used for restoration flows and the quantity by which water deliveries would be reduced are related, but the relationship is not necessarily one-for-one, due to flood flows in some years and other mitigating factors. Under the settlement agreement, no water would be released for restoration purposes in the driest of years; thus, the agreement would not reduce deliveries to Friant contractors in those years. Additionally, in some years, the restoration flows released in late winter and early spring may free up space for additional runoff storage in Millerton Lake, potentially minimizing reductions in deliveries later in the year—assuming Millerton Lake storage is replenished. Consequently, how deliveries to Friant water contractors may be reduced in any given year is likely to depend on many factors. Regardless of the specifics of how much water may be released for fisheries restoration vis-à-vis diverted for off-stream purposes, the SJRRP will impact existing surface and groundwater supplies in and around the Friant Division service area and affect local economies. SJRRP construction activities are in the early stages, but planning efforts have targeted a completion date of 2024 for the first stage of construction efforts. The Bay-Delta Restoration Program is a cooperative effort among the federal government, the State of California, local governments, and water users to proactively address the water management and aquatic ecosystem needs of California's Central Valley. The CALFED Bay-Delta Restoration Act ( P.L. 108-361 ), enacted in 2004, provided new and expanded federal authorities for six agencies related to the 2000 ROD for the CALFED Bay-Delta Program's Programmatic Environmental Impact Statement. These authorities were extended through FY2019 under the WIIN Act. The interim action plan for CALFED has four objectives: a renewed federal-state partnership, smarter water supply and use, habitat restoration, and drought and floodplain management. From FY2013 to FY2018, Reclamation funded its Bay-Delta restoration activities at approximately $37 million per year; the majority of this funding has gone for projects to address the degraded Bay-Delta ecosystem and includes federal activities under California WaterFix (see below section, \" California WaterFix \"). Other agencies receiving funding to carry out authorities under CALFED include DOI's U.S. Fish and Wildlife Service and U.S. Geological Survey; the Department of Agriculture's Natural Resources Conservation Service; the Department of Defense's Army Corps of Engineers; the Department of Commerce's National Oceanic and Atmospheric Administration; and the Environmental Protection Agency. Similar to Reclamation, these agencies report on CALFED expenditures that involve a combination of activities under \"base\" authorities and new authorities that were provided under the CALFED authorizing legislation. The annual CALFED crosscut budget records the funding for CALFED across all federal agencies. The budget generally is included in the Administration's budget request and contains CALFED programs, their authority, and requested funding. For FY2019, the Administration requested $474 million for CALFED activities. This figure is an increase from the FY2018 enacted level of $415 million. Reductions in available water deliveries due to hydrological and regulatory factors have caused some stakeholders, legislators, and state and federal government officials to look at other methods of augmenting water supplies. In particular, proposals to build new or augmented CVP and/or SWP water storage projects have been of interest to some policymakers. Additionally, the State of California is pursuing a major water conveyance project, the California WaterFix, with a nexus to CVP operations. The aforementioned CALFED legislation ( P.L. 108-361 ) also authorized the study of several new or augmented CVP storage projects throughout the Central Valley that have been ongoing for a number of years. These studies include Shasta Lake Water Resources Investigation, North of the Delta Offstream Storage Investigation (also known as Sites Reservoir), In-Delta Storage, Los Vaqueros Reservoir Expansion, and Upper San Joaquin River/Temperance Flat Storage Investigation ( Figure 6 ). Although the recommendations of these studies normally would be subject to congressional approval, Section 4007 of the WIIN Act authorized $335 million in Reclamation financial support for new or expanded federal and nonfederal water storage projects and provided that these projects could be deemed authorized, subject to a finding by the Administration that individual projects met certain criteria. In 2018 reporting to Congress, Reclamation recommended an initial list of seven projects that it concluded met the WIIN Act criteria. The projects were allocated $33.3 million in FY2017 funding that was previously appropriated for WIIN Act Section 4007 projects. Congress approved the funding allocations for these projects in enacted appropriations for FY2018 ( P.L. 115-141 ). Four of the projects receiving FY2017 funds ($28.05 million) were CALFED studies that would address water availability in the CVP: Shasta Dam and Reservoir Enlargement Project ($20 million for design and preconstruction); North-of-Delta Off-Stream Storage Investigation/Sites Reservoir Storage Project ($4.35 million for feasibility study); Upper San Joaquin River Basin Storage Investigation ($1.5 million for feasibility study); and Friant-Kern Canal Subsidence Challenges Project ($2.2 million for feasibility study). The enacted FY2018 Energy and Water appropriations bill further stipulated that $134 million of the amount set aside for additional water conservation and delivery projects be provided for Section 4007 WIIN Act storage projects (i.e., similar direction as FY2017). The enacted FY2019 bill set aside another $134 million for these purposes. Future reporting and appropriations legislation is expected to propose allocation of this and any other applicable funding. Congress also may consider additional directives for these and other efforts to address water supplies in the CVP, including approval of physical construction for one or more of these projects. Funding by the State of California also may influence the viability and timing of construction for some of the proposed projects. For example, in June 2018, the state announced significant bond funding for Sites Reservoir ($1.008 billion), as well as other projects. In addition to water storage, some have advocated for a more flexible water conveyance system for CVP and SWP water. An alternative was the California WaterFix, a project initiated by the State of California in 2015 to address some of the water conveyance and ecosystem issues in the Bay-Delta. The objective of this project was to divert water from the Sacramento River, north of the Bay-Delta, into twin tunnels running south along the eastern portion of the Bay-Delta and emptying into existing pumps that feed water into the CVP and SWP. In the spring of 2019, Governor Newsom of California canceled the plans for this project and introduced an alternative plan for conveying water through the Delta. DWR is creating plans to construct a single tunnel to convey water from the Sacramento River to the existing pumps in the Bay-Delta. DWR's stated reasons for supporting this approach are to protect water supplies from sea-level rise, saltwater intrusion, and earthquakes. The new plan is expected to take a \"portfolio\" approach that focuses on a number of interrelated efforts to make water supplies climate resilient. This approach includ es actions such as strengthening levees, protecting Delta water quality, and recharging groundwater, according to DWR. This project will require a new environmental review process for federal and state permits. It is being led by the Delta Conveyance Design and Construction Authority, a joint powers authority created by public water agencies to oversee the design and construction of the new conveyance system. DWR is expected to oversee the planning effort. The cost of the project is anticipated to be largely paid by public water agencies. The federal government's role in this project beyond evaluating permit applications and maintaining related CVP operations has not been defined. Congress plays a role in CVP water management and previously has attempted to make available additional water supplies in the region by facilitating efforts such as water banking, water transfers, and construction of new and augmented storage. In 2016, Congress enacted provisions aiming to benefit the CVP and the SWP, including major operational changes in the WIIN Act and additional appropriations for western drought response and new water storage that have benefited (or are expected to benefit) the CVP. Congress also continues to consider legislation that would further alter CVP operational authorities and responsibilities related to individual units of the project. The below section discusses some of the main issues related to the CVP that may receive attention by Congress. Title II, Subtitle J of the WIIN Act (enacted in December 2016) included multiple provisions related to the Bureau of Reclamation's operations of the CVP. Most of the WIIN Act's operational provisions are set to expire in 2021 (five years after the bill's enactment). In addition to overseeing the implementation of these operational provisions, Congress may also consider their amendment, extension, or repeal. The WIIN Act directed Reclamation to \"maximize\" CVP pumping (in accordance with applicable BiOps), allowed for increased pumping during certain temporary storm events, and authorized expedited reviews of water transfers, among other things. The WIIN Act also established a new standard for measuring the effects of water operations on species listed as endangered or threatened under the ESA, allowing most of the bill's actions to go forward unless they are determined to cause additional adverse effects on listed species beyond the range of the effects anticipated to occur for the duration of the species BiOp. Although the WIIN Act included some provisions from legislation that had been proposed dating back to the 112 th Congress, many of the controversial provisions from prior bills were not included in the act. Supporters of WIIN Act operational changes contended that these changes had the potential to make additional water available to users facing curtailed deliveries, while also improving the flexibility and responsiveness of the management and operations of the CVP and SWP. Opponents worried that the changes may have detrimental effects on species' survival in both the short and long terms and may limit agency efforts to manage water supplies for the benefit of species. Some of the notable CVP operational provisions in the WIIN Act aimed to provide the Administration with authority to make available more water supplies during periods in which pumping otherwise would have been limited. According to Reclamation, some changes authorized under the WIIN Act were implemented during the winter of 2017-2018. In particular, communication and transparency were reportedly increased for some operational decisions, allowing for reduced or rescheduled pumping restrictions. Additionally, as of spring 2018, WIIN Act allowances relaxed restrictions on inflow-to-export ratios related to the voluntary sale, transfer, or exchange of water that were used to affect a transfer resulting in additional exports of 50,000-60,000 AF. Reclamation has noted that hydrology has affected its ability to implement some of the act's provisions. Many of the WIIN Act changes have the potential to make their greatest impact during drought years. At the same time, some federal operational changes pursuant to the WIIN Act reportedly were proposed but were deemed incompatible with state requirements. Despite these limitations, WIIN Act authorities are likely to continue as a topic of congressional interest. Previous Congresses have considered legislation that proposed additional changes to CVP operations. For instance, in the 115 th Congress, H.R. 23 , the Gaining Responsibility on Water Act (GROW Act), incorporated a number of provisions that were included in previous California drought legislation in the 112 th , 113 th , and 114 th Congresses but were not enacted in the WIIN Act. Generally speaking, the GROW Act included provisions that would have loosened some environmental protections and restrictions that are imposed under the CVPIA, ESA, CWA, and SJRRP, and had the potential to increase exports under some scenarios. This legislation was not enacted. In addition to legislation proposing operational changes, the Administration has indicated its intent to propose administrative changes to CVP operations, including through reinitiation of consultation on long-term, system-wide operations of the CVP and SWP (see earlier section, \" Endangered Species Act \"). A 2018 White House memorandum directed DOC and DOI to finalize their new BiOps for the coordinated operation of the CVP and SWP by June 15, 2019, and to \"suspend, revise, or rescind\" regulations that unduly burden the project. It is unclear how the latter process might unfold or what particular regulations will be addressed. As previously noted, Reclamation and the State of California have funded the study of new water storage projects in recent years, and future appropriations legislation and reporting may provide additional direction for these and other efforts to develop new water supplies for the CVP. As such, Congress may consider oversight, authorization, and/or funding for these projects. Some projects, such as the Shasta Dam and Reservoir Enlargement Project, have the potential to augment CVP water supplies but also have generated controversy for their potential to conflict with the intent of certain state laws. Although Reclamation has indicated its interest in pursuing the Shasta Dam raise project, the state has opposed the project under Governor Jerry Brown's Administration, and it is unclear how such a project might proceed absent state regulatory approvals and financial support. As previously noted, in early 2018, Reclamation proposed and Congress agreed to $20 million in design and preconstruction funding for the project. An additional $75 million was recommended by the Trump Administration in February 2019. In addition to the Shasta Dam and Reservoir Enlargement Project, Congress approved Reclamation-recommended study funding for Sites Reservoir/North of Delta Offstream Storage (NODOS), Upper San Joaquin River Basin Storage Investigation, and the Friant-Kern Canal Subsidence Challenges Project. Overall, from FY2017 to FY2019 Congress provided Reclamation with $335 million for new water storage projects authorized under Section 4007 of the WIIN Act. A significant share of this total is expected to be used on CVP and related water storage projects in California. Once the appropriations ceiling for these projects has been reached, funding for storage projects under Section 4007 would need to be extended by Congress before projects could proceed further. Legislation in the 116 th Congress has proposed to expedite certain water storage studies in the Central Valley, and could also provide mandatory funding for their eventual construction. For instance, Section 5 of H.R. 2473 would direct the Secretary to complete, as soon as practicable, the ongoing feasibility studies associated with Sites Reservoir, Del Puerto Canyon Reservoir, Los Vaqueros Reservoir, and San Luis Reservoir. Section 2 of the same legislation would authorize $100 million per year for fiscal years 2030 to 2060, without further appropriation (i.e., mandatory funding) for new Reclamation surface or groundwater storage projects. The CVP is one of the largest and most complex water storage and conveyance projects in the world. Congress has regularly expressed interest in CVP operations and allocations, in particular pumping in the Bay-Delta. In addition to ongoing oversight of project operations and previously enacted authorities, a number of developing issues and proposals related to the CVP have been of interest to congressional decisionmakers. These include study and approval of new water storage and conveyance projects, updates to the state's Bay-Delta Water Quality Plan, and a multipronged effort by the Trump Administration to make available more water for CVP water contractors, in particular those south of the Delta. Future drought or other stressors on California water supplies are likely to further magnify these issues. The below sections provide a brief discussion some of the major contractor groups and individual contractors served by the CVP. Sacramento River Settlement Contractors and San Joaquin River Exchange Contractors (Water Rights Contractors) CVP water generally is made available for delivery first to those contractors north and south of the Delta with water rights that predate construction of the CVP: the Sacramento River Settlement Contractors and the San Joaquin River Exchange Contractors. (These contractors are sometimes referred to collectively as water rights contractors .) Water rights contractors typically receive 100% of their contracted amounts in most water year types. During water shortages, their annual maximum entitlement may be reduced, but not by more than 25%. Sacramento River Settlement Contractors include the 145 contractors (both individuals and districts) that diverted natural flows from the Sacramento River prior to the CVP's construction and executed a settlement agreement with Reclamation that provided for negotiated allocation of water rights. Reclamation entered into this agreement in exchange for these contractors withdrawing their protests related to Reclamation's application for water rights for the CVP. The San Joaquin River Exchange Contractors are four irrigation districts that agreed to \"exchange\" exercising their water rights to divert water on the San Joaquin and Kings Rivers for guaranteed water deliveries from the CVP (typically in the form of deliveries from the Delta-Mendota Canal and waters north of the Delta). During all years except for when critical conditions are declared, Reclamation is responsible for delivering 840,000 AF of \"substitute\" water to these users (i.e., water from north of the Delta as a substitute for San Joaquin River water). In the event that Reclamation is unable to make its contracted deliveries, these Exchange Contractors have the right to divert water directly from the San Joaquin River, which may reduce water available for other San Joaquin River water service contactors. Friant Division Contractors CVP's Friant Division contractors receive water stored behind Friant Dam (completed in 1944) in Millerton Lake. This water is delivered through the Friant-Kern and Madera Canals. The 32 Friant Division contractors, who irrigate roughly 1 million acres on the San Joaquin River, are contracted to receive two \"classes\" of water: Class 1 water is the first 800,000 AF available for delivery; Class 2 water is the next 1.4 million AF available for delivery. Some districts receive water from both classes. Generally, Class 2 waters are released as \"uncontrolled flows\" (i.e., for flood control concerns), and may not necessarily be scheduled at a contractor's convenience. Deliveries to the Friant Division are affected by a 2009 congressionally enacted settlement stemming from Friant Dam's effects on the San Joaquin River. The settlement requires reductions in deliveries to Friant users for protection of fish and wildlife purposes. In some years, some of these \"restorations flows\" have been made available to contractors for delivery as Class 2 water. Unlike most other CVP contractors, Friant Division contractors have converted their water service contracts to repayment contracts and have repaid their capital obligation to the federal government for the development of their facilities. In years in which Reclamation is unable to make contracted deliveries to Exchange Contractors, these contractors can make a \"call\" on water in the San Joaquin River, thereby requiring releases from Friant Dam that otherwise would go to Friant contractors. South-of-Delta (SOD) Water Service Contractors: Westlands Water District As shown in Figure 3 , SOD water service contractors account for a large amount (2.09 million AF, or 22.1%) of the CVP's contracted water. The largest of these contractors is Westlands Water District, which consists of 700 farms covering more than 600,000 acres in Fresno and Kings Counties. In geographic terms, Westlands is the largest agricultural water district in the United States; its lands are valuable and productive, producing more than $1 billion of food and fiber annually. Westlands' maximum contracted CVP water is in excess of 1.2 million AF, an amount that makes up more than half of the total amount of SOD CVP water service contracts and significantly exceeds any other individual CVP contactor. However, due to a number of factors, Westlands often receives considerably less water on average than it did historically. Westlands has been prominently involved in a number of policy debates, including proposals to alter environmental requirements to increase pumping south of the Delta. Westlands also is involved in a major proposed settlement with Reclamation, the San Luis Drainage Settlement. The settlement would, among other things, forgive Westlands' share of federal CVP repayment responsibilities in exchange for relieving the federal government of its responsibility to construct drainage facilities to deal with toxic runoff associated with naturally occurring metals in area soils. Central Valley Wildlife Refuges The 20,000 square mile California Central Valley provides valuable wetland habitat for migratory birds and other species. As such, it is the home to multiple state and federally-designated wildlife refuges north and south of the Delta. These refuges provide managed wetland habitat that receives water from the CVP and other sources. The Central Valley Project Improvement Act (CVPIA; P.L. 102-575 ), enacted in 1992, sought to improve conditions for fish and wildlife in these areas by providing them coequal priority with other project purposes. CVPIA also authorized a Refuge Water Supply Program to acquire approximately 555,000 AF annually in water supplies for 19 Central Valley refuges administered by three managing agencies: California Department of Fish and Wildlife, U.S. Fish and Wildlife Service, and Grassland Water District (a private landowner). Pursuant to CVPIA, Reclamation entered into long-term water supply contracts with the managing agencies to provide these supplies. Authorized refuge water supply under CVPIA is divided into two categories: Level 2 and Level 4 supplies. Level 2 supplies (approximately 422,251 AF, except in critically dry years, when the allocation is reduced to 75%) are the historical average of water deliveries to the refuges prior to enactment of CVPIA. Reclamation is obligated to acquire and deliver this water under CVPIA, and costs are 100% reimbursable by CVP contractors through a fund established by the act, the Central Valley Project Restoration Fund (CVPRF; see previous section, \" Central Valley Project Improvement Act \"). Level 4 supplies (approximately 133,264 AF) are the additional increment of water beyond Level 2 supplies for optimal wetland habitat development. This water must be acquired by Reclamation through voluntary measures and is funded as a 75% federal cost (through the CVPRF) and 25% state cost. In most cases, the Level 2 requirement is met; however, Level 4 supplies have not always been provided in full for a number of reasons, including a dearth of supplies due to costs in excess of available CVPRF funding and a lack of willing sellers. In recent years, costs for the Refuge Water Supply Program (i.e., the costs for both Level 2 and Level 4 water) have ranged from $11 million to $20 million.", "summary": "The Central Valley Project (CVP), a federal water project owned and operated by the U.S. Bureau of Reclamation (Reclamation), is one of the world's largest water supply projects. The CVP covers approximately 400 miles in California, from Redding to Bakersfield, and draws from two large river basins: the Sacramento and the San Joaquin. It is composed of 20 dams and reservoirs and numerous pieces of water storage and conveyance infrastructure. In an average year, the CVP delivers more than 7 million acre-feet of water to support irrigated agriculture, municipalities, and fish and wildlife needs, among other purposes. About 75% of CVP water is used for agricultural irrigation, including 7 of California's top 10 agricultural counties. The CVP is operated jointly with the State Water Project (SWP), which provides much of its water to municipal users in Southern California. CVP water is delivered to users that have contracts with Reclamation. These contractors receive varying levels of priority for water deliveries based on several factors, including hydrology, water rights, prior agreements with Reclamation, and regulatory requirements. The Sacramento and San Joaquin Rivers' confluence with the San Francisco Bay (Bay-Delta or Delta) is a hub for CVP water deliveries; many CVP contractors south of the Delta receive water that is \"exported\" from north of the Delta. Development of the CVP resulted in significant changes to the area's natural hydrology. However, construction of most CVP facilities predated major federal natural resources and environmental protection laws. Much of the current debate related to the CVP revolves around how to deal with changes to the hydrologic system that were not significantly mitigated for when the project was constructed. Thus, multiple ongoing efforts to protect species and restore habitat have been authorized and are incorporated into project operations. Congress has engaged in CVP issues through oversight and at times legislation, including provisions in the 2016 Water Infrastructure Improvements for the Nation (WIIN Act; P.L. 114-322) that, among other things, authorized changes to operations in an attempt to provide for delivery of more water under certain circumstances. Although some stakeholders are interested in further operational changes to enhance CVP water deliveries, others are focused on the environmental impacts of operations. Various state and federal proposals are currently under consideration and have generated controversy for their potential to affect CVP operations and allocations. In late 2018, the State of California finalized revisions to its Bay-Delta Water Quality Control Plan. These changes would require that more flows from the San Joaquin and Sacramento Rivers reach the Bay-Delta for water quality and fish and wildlife enhancement (and thus would further restrict water supplies for other users). The changes have generally been opposed by the Trump Administration. At the same time, the Trump Administration is pursuing efforts to increase CVP water supplies for users, including changes to CVP operations under an October 2018 White House memorandum on western water supplies. Efforts to add or supplement CVP storage and conveyance also are being considered: The state is proposing a new water conveyance project (known as the California WaterFix) that would bypass the Bay-Delta and, under certain conditions, increase exports from north to south for some users. Additionally, new storage projects are under study by federal and state entities; these projects would aim to increase CVP and/or SWP water supplies. In the 116th Congress, legislators may consider bills and conduct oversight on efforts to increase CVP water exports compared to current baselines. Congress is considering whether to approve funding for new water storage projects, and also may consider legislation to extend or amend previously enacted CVP authorities (e.g., WIIN Act authorities that are expiring or have exceeded their appropriations ceiling).", "document_type": "crs"}
{"report": "O ne of the basic rationales underlying the grant of patent rights is that such rights provide an incentive for inventors to innovate. Part of the bargain, however, is that those rights will expire after a defined time period. This principle appears in the U.S. Constitution, which empowers Congress \"[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.\" Congress has also enacted this principle into law: a patent on a new invention will generally expire twenty years after the corresponding patent application was filed. Intellectual property (IP) rights, including patent rights, are generally considered to play an essential role in encouraging the research and development (R&D) necessary to create new pharmaceutical products. Because these periods of exclusivity can allow the patent holder, such as a drug manufacturer, to charge higher-than-competitive prices, the patent holder has an incentive to prolong the period of exclusivity, such as by filing for additional patents to cover a product. In the pharmaceutical context, critics argue that some brand-name drug and biological product manufacturers (the brands) use patenting strategies to \"game[] the patent system\" to maximize profits and forestall competition from generic drug or biosimilar manufacturers (the generics). Others reject this charge, contending that these practices are a legitimate use of the patent system and are necessary to incentivize the billions of dollars in R&D that lead to new, life-saving drugs. This report discusses four pharmaceutical patenting practices commentators have criticized: \"Evergreening\" : Commentators allege that some pharmaceutical companies obtain new patents to cover a product as older patents expire to extend the period of exclusivity without significant benefits for consumers. \"Product Hopping\" : Commentators also contend that as patents on a product expire, pharmaceutical companies will attempt to switch the market to a slightly different product covered by a later-expiring patent, \"hopping\" from one product to the next. \"Patent Thickets\" : Commentators further argue that pharmaceutical companies have allegedly surrounded their products with many overlapping patents on a single product. Critics allege that these patent \"thickets\" may deter potential competitors even if the patents are weak or invalid, due to the time, expense, and uncertainty of challenging a significant number of patents. \"Pay-for-Delay\" Settlements : Brand and generic pharmaceutical companies will often settle litigation that results when a generic seeks to enter the market to compete with the patented branded product. Certain settlement agreements involve the transfer of value from the brand to the generic in return for the generic delaying its market entry. Such \"pay-for-delay\" or \"reverse payment\" settlements are characterized as anticompetitive because they may delay the entry of cheaper generic drugs into the market, thereby allowing the brand to maintain its exclusivity period on a patent that otherwise may have been invalidated, to the benefit of the settling companies but at the expense of consumers. These practices take place against a backdrop of a broader public policy debate over drug pricing. The Department of Health and Human Services (HHS) has found that national spending on pharmaceutical products has risen in recent years and predicted that these expenditures will continue to rise faster than overall healthcare spending. Commentators acknowledge that factors other than IP rights contribute to the price consumers pay for prescription drugs and biological products (biologics), including consumer demand, manufacturing costs, R&D costs, the terms and structure of private health insurance, and the involvement of government insurance programs such as Medicaid . Nevertheless, pharmaceutical products are often protected by IP rights . Some studies have shown that IP rights are among the most important factors driving high drug prices. As these pharmaceutical patenting practices may affect drug prices, they have attracted congressional interest. Several legislative proposals seek to curtail these patenting practices by reducing their effectiveness or outlawing them entirely. Proponents see such legislation as a potential way to lower pharmaceutical prices. This report explains these allegedly anticompetitive patenting practices and reviews a number of proposals to reform them. First, this report provides a brief legal background, including the basics of Food and Drug Administration (FDA) law, patent law, antitrust law, and the interaction between patent rights and FDA approval of pharmaceutical products. This report next overviews the patenting practices that some pharmaceutical companies have allegedly used to extend their effective periods of patent protection. Finally, this report details a number of proposals aimed at reforming or limiting such practices. FDA must approve new drugs and biologics prior to their marketing in interstate commerce. The FDA regulatory processes for drugs and biologics are similar, broadly speaking, but also distinct in certain aspects. FDA approves new drugs through the new drug application (NDA) process. To obtain approval, the manufacturer must submit an NDA that demonstrates, among other things, that the drug is safe and effective for its intended use. The manufacturer must provide to FDA clinical data establishing the new drug's safety and effectiveness. The studies necessary to establish safety and efficacy are often expensive and lengthy; in 2015 to 2016, the median cost of a single clinical trial was $19 million, and in one instance was $347 million. The average cost to develop a new drug has been generally estimated to be between $1 billion to $3 billion, and the average time for FDA approval is over twelve years. To encourage competition and lower drug prices through generic drug entry, the Hatch-Waxman Act of 1984 (Hatch-Waxman) created a streamlined approval process for generic drugs. Rather than file an NDA, Hatch-Waxman allows generics to file an abbreviated new drug application (ANDA) that relies on FDA's prior approval of another drug with the same active ingredient (the \"reference listed drug\" or RLD) to establish that the generic drug is safe and effective. The generic may thus forgo conducting lengthy and expensive clinical trials by instead demonstrating that the generic drug is pharmaceutically equivalent and bioequivalent to the RLD. Like drugs, biologics are products intended for use in the prevention and treatment of human disease. Biologics are distinct from drugs, however, in that they are derived from biological material, such as a virus or blood component. Biological products \"are generally large, complex molecules\" that \"may be produced through biotechnology in a living system, such as a microorganism, plant cell, or animal cell.\" A biologic may only be marketed in the United States after its manufacturer submits and FDA approves a biologics license application (BLA). To approve a BLA, FDA must determine that the biologic is \"safe, pure, and potent,\" and that the production and distribution process \"meets standards designed to assure that the biological product continues to be safe, pure, and potent.\" Like Hatch-Waxman, the Biologics Price Competition and Innovation Act of 2009 (BPCIA) sets out an abbreviated approval process to encourage early market entry of biologics that are sufficiently similar to an already approved biological product (the \"reference product\"). A biological product is sufficiently similar to an approved biologic if it is \"biosimilar\" to (or interchangeable with) the reference product. To show biosimilarity, the manufacturer must submit, among other things, data demonstrating that its product is \"highly similar to the reference product notwithstanding minor differences in clinically inactive components\" with no \"clinically meaningful differences\" between the two products \"in terms of the safety, purity, and potency of the product.\" To balance the interest in competitionâwhich the abbreviated approval pathways aim to encourageâwith the countervailing interest in encouraging innovation, federal law also establishes periods of regulatory exclusivity that limit FDA's ability to approve generic drugs and biosimilars under certain circumstances. These exclusivities generally aim to encourage new drug or biologic applicants to undertake the expense of generating clinical data and other information needed to support an NDA or BLA. Other exclusivities are designed to encourage generic or biosimilar (follow-on product) manufacturers to submit abbreviated applications as soon as permissible. Patents, which are available for a wide variety of technologies beyond pharmaceuticals, grant the patent holder the right to exclude others from making, using, selling, or importing a patented invention within the United States for a defined term of years. A person who makes, uses, sells, or imports a patented invention without permission from the patent holder during this period infringes the patent and is potentially liable for monetary damages and subject to other legal remedies. Patents are generally justified on the basis that temporary exclusive rights are necessary to provide incentives for inventors to create new and useful technological innovations. This rationale maintains that absent legal protections, competitors could freely copy inventions once marketed, denying the original creators the ability to recoup their investments in time and effort, and reducing the incentive to create in the first place. Patent incentives are said to be particularly necessary for products like pharmaceuticals, which are costly to develop, but easily copied once marketed. Because patents grant a temporary and limited \"monopoly\" to the patent holder, they may lead to increased prices for goods or services that the patent covers. The existence of a patent on a particular manufacturing process, for example, generally means that only the patent holder (and persons licensed by the patent holder) can use that patented process until the patent expires. In some circumstances, this legal exclusivity may allow the patent holder (or her licensees) to charge higher-than-competitive prices for goods made with the patented process, as a monopolist would, because the patent effectively shields the patentee from competition. Patents are obtained by formally filing a patent application with the U.S. Patent and Trademark Office (PTO), initiating a process called patent prosecution. A PTO patent examiner will evaluate the patent application to ensure it meets all the applicable legal requirements to merit the grant of a patent. In addition to requirements regarding the technical disclosure of the invention, the claimed invention must be (1)Â new, (2)Â useful, (3)Â nonobvious, and (4)Â directed to patentable subject matter. If the PTO issues (i.e., grants) a patent, its term typically expires twenty years from the patent application's filing date. This twenty-year term may be extended in certain circumstances. For example, the patent term may be adjusted to account for excessive delays in patent examination at the PTO. In the pharmaceutical context, patents claiming a drug product or medical device (or a method of using or manufacturing the same) may be extended for up to five years to account for delays in obtaining regulatory approval from FDA, if certain statutory conditions are met. Patent rights are generally independent and distinct from the regulatory exclusivities administered by FDA. Patent rights granted by the PTO are based primarily on the technological novelty of the claimed invention, while regulatory exclusivities granted by FDA result from the completion of FDA's regulatory process for particular pharmaceutical products meeting certain criteria. Patents are not self-enforcing. That is, to obtain relief from infringement, the patent holder generally must sue the alleged infringer in court. If such a lawsuit succeeds, the patent holder may obtain monetary damages and, in certain cases, an injunction, which is a court order that prohibits the defendant from infringing the patent in the future. Patents thus provide a negative right to prevent another person from practicing (i.e., making, using, selling, or importing) the claimed invention. Patents do not themselves, however, provide the patent holder any affirmative right to practice the invention. In the pharmaceutical context, this principle means that even if a drug or biologic manufacturer has a patent on a particular product (or inventions related to making or using that product), it still cannot market that product without FDA approval. If a person is the first to synthesize a particular chemical believed to be useful for the treatment of human disease, she may file for a patent on that chemical itself, andâpresuming that the application meets all requirements for patentabilityâthe PTO will grant the patent. Patents on a pharmaceutical product's active ingredient (sometimes called \"primary patents\" ) may be of particular value to the manufacturer because these patents are usually difficult to \"invent around\" (i.e., develop a competing product that does not infringe the patent). However, primary patents are hardly the only patents that cover pharmaceuticals, and are not necessarily the most important to manufacturers as a practical matter. Indeed, for biologics, if the active ingredient is naturally occurring, it may not be legally possible to patent an unaltered form of the biologic itself because it constitutes patent-ineligible subject matter. Pharmaceutical patents may cover many different features of a drug or biologic beyond a claim on the active ingredient itself. Such \"secondary patents\" may claim, among other things 1. formulations of the drug or biologic (e.g., an administrable form or dosage); 2. methods of using the pharmaceutical (e.g., an indication or use for treating a particular disease); 3. methods of manufacturing the pharmaceutical product or manufacturing technologies used to make the pharmaceutical; 4. methods of administrating the pharmaceutical or technologies used to administer the pharmaceutical; or 5. other chemicals related to the active ingredient, such as crystalline forms, polymorphs, intermediaries, salts, and metabolites. Like other inventions, for an inventor to receive a patent on any of these innovations, it must be new, useful, nonobvious, and sufficiently described in the patent application. In addition, if a person invents an improvement on any of these technologiesâfor example, a new formulation of the drug, a new use, a different manufacturing process, etc.âthen the inventor can file for a patent on that improvement, which receives its own patent term. Although the term \"improvement patent\" is traditionally used, it is a somewhat misleading phrase, as the new version need not be \"better\" to be patentable. Rather, the improvement must simply be new and nonobvious âthat is, \"more than the predictable use of prior art elements according to their established functions.\" Any person wishing to practice the improved form of the invention will need permission from both the holder of the patent on the original technology and the holder of the improvement patent (who need not be the same entity), if neither patent has yet expired. If the original patent has expired but the improvement patent has not, patent law does not impede any person from making and using the original, unimproved version. Federal law contains specialized procedures for certain pharmaceutical patent disputes, with the general goal of encouraging early resolution of disputes relating to generic and biosimilar market entry. The act of applying with FDA for approval of a generic drug or biosimilar triggers these procedures. Under certain circumstances, patent law treats the filing of such FDA applications as an \"artificial\" act of patent infringement, allowing for the resolution of patent disputes before the generic or biosimilar product is marketed to the public. These procedures can affect whether and when a generic drug or biosimilar can be marketed and, as a result, determine when a brand-name product becomes subject to direct competition. The procedures differ depending on whether the pharmaceutical is regulated as a drug or as a biologic. The Hatch-Waxman Act governs the approval process for small-molecule drugs. Under Hatch-Waxman, a drug manufacturer must list in its NDA any patent claiming the drug that is the subject of the application or a method of using that drug. FDA includes these patents in its list of approved products known as the Orange Book . When a generic manufacturer files an ANDA, it must provide a certification for each patent listed in the Orange Book with respect to the referenced drug. In particular, with some exceptions, the generic applicant must provide one of four certifications under the following paragraphs: (I)Â there is no patent information listed; (II)Â the patent has expired; (III)Â the date the patent will expire; or (IV)Â the patent is invalid and/or not infringed by the generic applicant. Paragraph (I) and (II) certifications do not affect FDA's ability to approve the ANDA. If the generic applicant makes a Paragraph (III) certification, however, FDA may not approve the ANDA until the patent at issue has expired. A Paragraph (IV) certification triggers Hatch-Waxman's specialized patent dispute procedures, often resulting in litigation. First, the generic applicant must give notice of the ANDA and the Paragraph (IV) certification to the patentee and NDA holder. The patent holder then has forty-five days to sue the generic applicant. If she does file suit, FDA generally cannot approve the ANDA for thirty months while the parties litigate the patent disputeâa period often referred to as the \"thirty-month stay.\" As an incentive for a generic to enter the market, Hatch-Waxman also provides 180 days of marketing exclusivity to the first generic to make a Paragraph (IV) certification. A different patent dispute resolution scheme, governed by the BPCIA, applies to biologics and biosimilars. Under the BPCIA, regulatory approval of biologics is not directly contingent on resolution of patent disputes. Moreover, in contrast to the Hatch-Waxman approach, patent information need not be listed as part of the original BLA. As a result, no patent information is currently listed in the Purple Book , FDA's lis t of approved biological products (i.e., the biologics analogue of the Orange Book ). Accordingly, patent disputes involving biosimilars may be resolved through the BPCIA's \"patent dance,\" \"a carefully calibrated scheme for preparing to adjudicate, and then adjudicating, claims of infringement.\" The first step in the patent dance process is triggered when, not later than twenty days after FDA accepts a biosimilar application, the applicant provides the application to the reference product sponsor, along with information on how the biosimilar is manufactured. \"These disclosures enable the [reference product] sponsor to evaluate the biosimilar for possible infringement of patents it holds on the reference product (i.e., the corresponding biologic).\" The biosimilar applicant and reference product sponsor then engage in a series of information exchanges regarding the patents that each party believes are relevant, as well as the parties' positions as to the validity and infringement of the patents. Depending on the extent of their participation in this information exchange, each party may have the opportunity to litigate the patents at the conclusion of the patent dance, or later on, when the biosimilar is marketed. Injunctive relief to compel the biosimilar applicant to engage in the patent dance is unavailable under federal law. Some of the patenting practices described below have been challenged under the federal antitrust laws; thus, background on this area is helpful in understanding those challenges. The Supreme Court has stated that the \"primary purpose of the antitrust laws\" is to protect and promote competition \"from which lower prices can later result.\" To this end, antitrust law generally aims to \"prohibit .Â .Â . anticompetitive conduct and mergers that enable firms to exercise market power.\" The Sherman Antitrust Act of 1890 (the Sherman Act) \"contains two main substantive provisions that prohibit agreements in restraint of trade and monopolization, respectively.\" Certain pharmaceutical patenting practices have been challenged under each of these two sections. Section 1 of the Sherman Act bars \"[e]very contract, combination .Â .Â .Â , or conspiracy, in restraint of trade or commerce.\" Although that language appears to sweep broadly, the Supreme Court has interpreted Section 1 to only bar unreasonable restraints on trade. In evaluating the reasonableness of contractual restraints on trade under Section 1, courts have found that \"some agreements and practices are invalid per se, while others are illegal only as applied to particular situations.\" Unless the agreement falls within a per se illegal category, courts generally apply a \"rule-of-reason\" analysis to determine whether a restraint on trade is reasonable. Per Se Illegal. Certain agreements are considered per se illegal \"without regard to a consideration of their reasonableness\" \"because the probability that these practices are anticompetitive is so high.\" Only restraints that \"have manifestly anticompetitive effects\" and lack \"any redeeming virtue\" are held to be per se illegal. Examples of per se illegal restraints include agreements for horizontal price fixing, market allocations, and output limitations. To prevail on a claim of a per se illegal agreement, the plaintiff need only demonstrate that the agreement in question falls in one of the per se categories; in other words, \"liability attaches without need for proof of power, intent or impact.\" The Rule - of - Reason Analysis. Challenged restraints that are not in the per se illegal category are generally analyzed under the rule-of-reason approach. While the Supreme Court has not developed a canonical framework to guide this totality-of-the-circumstances reasonableness inquiry, most courts take a similar approach in resolving rule-of-reason cases. Under this burden-shifting approach, a Section 1 plaintiff has the initial burden of demonstrating that a challenged restraint has anticompetitive effects in a \"properly defined product\" and geographic marketâthat is, that the restraint causes higher prices, reduced output, or diminished quality in the relevant market. If the plaintiff succeeds in making this showing, the burden then shifts to the defendant to rebut the plaintiff's evidence with a procompetitive justification for the challenged practice. For example, if a Section 1 plaintiff alleges that the challenged restraint produces higher prices, the defendant might attempt to contest that allegation or show that any price increases are offset by improvements in its products or services. If the defendant cannot produce such a justification, the plaintiff may prevail. However, if the defendant adequately demonstrates a procompetitive justification, the burden then shifts back to the plaintiff to show either (1) that the restraint's anticompetitive effects outweigh its procompetitive effects or (2) that the restraint's procompetitive effects could be achieved in a manner that is less restrictive of competition. Quick Look Analysis. In certain instances, courts may use \"something of a sliding scale in appraising reasonableness,\" applying a more abbreviated rule-of-reason analysis to an agreement, referred to as a \"quick look.\" In identifying this intermediate standard of review, the Supreme Court explained that, because \"[t]here is always something of a sliding scale in appraising reasonableness,\" the \"quality of proof required\" to establish a Section 1 violation \"should vary with the circumstances.\" As a result, the Court has concluded that in certain casesâspecifically, those in which \"no elaborate industry analysis is required to demonstrate the anticompetitive character\" of a challenged agreementâplaintiffs can establish a prima facie case that an agreement is anticompetitive without presenting the sort of market power evidence traditionally required at the first step of the rule-of-reason analysis. While there is no universally accepted \"quick look\" framework, several courts of appeals have endorsed a modified burden-shifting approach in \"quick look\" cases. Under this approach, if a Section 1 plaintiff can establish that a challenged restraint is obviously likely to harm consumers, the restraint is deemed \"inherently suspect,\" and therefore presumptively anticompetitive. A defendant can rebut this presumption by presenting \"plausible reasons\" why the challenged practice \"may not be expected to have adverse consequences in the context of the particular market in question,\" or why the practice is \"likely to have beneficial effects for consumers.\" If the defendant fails to offer such reasons, the plaintiff prevails. However, if the defendant offers such an explanation, the plaintiff must address the justification by eitherÂ explaining \"why it can confidently conclude, without adducing evidence, that the restraint very likely harmed consumers\" or providing \"sufficient evidence to show that anticompetitive effects are in fact likely.\" If the plaintiff succeeds in making either showing, \"the evidentiary burden shifts to the defendant to show the restraint in fact does not harm consumers or has 'procompetitive virtues' that outweigh its burden upon consumers.\" However, if the plaintiff fails to rebut the defendant's initial justification, its challenge is assessed under a full rule-of-reason framework. Section 2 of the Sherman Act makes it unlawful to monopolize, attempt to monopolize, or conspire to monopolize \"any part of the trade or commerce among the several States, or with foreign nations.\" Despite the facially broad language of Section 2, the Supreme Court has clarified that monopolization is only illegal if \"it is accompanied by an element of anticompetitive conduct .\" It is not illegal to possess monopoly power that is the result of, for example, \"a superior product, business acumen, or historic accident.\" Thus, establishing a Section 2 violation requires proving that the defendant \"possessed monopoly power in the relevant market\" andÂ acquired or maintained that power using anticompetitive conduct. Courts generally analyze whether conduct is anticompetitive (i.e., step two of the analysis) using a rule-of-reason approach. Federal antitrust laws are primarily enforced through three mechanisms: (1)Â enforcement actions brought by the U.S. Department of Justice's Antitrust Division, (2)Â enforcement actions brought by the Federal Trade Commission (FTC), or (3)Â lawsuits brought by a private party or by a state attorney general on behalf of a private party. In particular, Section 5 of the FTC Act gives the FTC authority to combat \"[u]nfair methods of competition\" generally, which includes violations of the Sherman Act. FTC enforcement typically begins with a confidential investigation into the relevant conduct. A company may resolve the investigation by entering into a consent order agreeing to stop or to address the potentially anticompetitive practices. If the FTC and the company do not reach a consent order, the FTC may begin an administrative proceeding or may seek relief in the federal courts. The administrative proceeding is similar to a court proceeding, but is overseen by an administrative law judge (ALJ). If the ALJ finds that there has been a violation, the FTC may issue a cease-and-desist order. The ALJ's decision is appealable to the full FTC, then to a U.S. Court of Appeals and, finally, to the Supreme Court. Patent holders generally seek to use their rights to the fullest extent permitted by law, regardless of their patent's technological field. From the patent holders' perspective, the practices described below are appropriate uses of the legal rights granted by their patents, which were obtained only after a rigorous examination process that demonstrated compliance with the patentability requirements. Critics, however, view these practices as harmful strategies that exploit the patent system in ways that Congress did not intend. Evergreening, also known as patent \"layering\" or \"life-cycle management,\" is a practice by which drug innovators allegedly seek \"to prolong their effective periods of patent protection [through] strategies that add new patents to their quivers as old ones expire.\" As discussed above, because different aspects of pharmaceutical products (and improvements thereon) are patentable, dozens of different patents can protect a single pharmaceutical product. The average number of patents per drug has been steadily rising since Hatch-Waxman was enacted in 1984. On average, there are 2.7 patents listed for each product listed in the Orange Book . Particularly profitable products, however, are usually protected by many more patents. One recent study of the top twelve drugs by gross U.S. revenue found that pharmaceutical manufacturers obtained an average of seventy-one patents on each of these drugs. For example, this study found that Celgene, the maker of the top-selling plasma cell myeloma drug Revlimid, filed 106 U.S. patent applications covering that product, resulting in ninety-six issued patents. The study also found that the price of Revlimid increased by 79% since 2012. Because later-filed patents often claim aspects of the drug other than its active ingredient, these patents are sometimes called \"secondary\" patents. Critics of evergreening maintain that, by obtaining secondary patents on improvements or ancillary aspects of a pharmaceutical product, manufacturers effectively extend patent protection beyond the term set by Congress. In doing so, according to these critics, secondary patents unfairly shield a pharmaceutical product from generic or biosimilar competition, thereby resulting in higher drug prices. In the view of evergreening critics, moreover, many of these secondary patents are of questionable validity. While secondary patents tend to be challenged more frequently and more successfully than patents covering a pharmaceutical's active ingredient, the combination of secondary patents and a strong primary patent creates a barrier to generic entry because a generic manufacturer may delay or simply decline entry when faced with the prospect of defeating both patents. According to Bloomberg Law , in 2017 the cost of litigating a Hatch-Waxman lawsuit was $1.8 million in cases involving over $25 million in risk. Commentators have suggested that these costs can be compounded when there are several patents at issue, even if those patents are comparably weaker. Thus, even when a product is protected by comparably weak patents, critics of evergreening argue that the costs of invalidating those patents strengthen the branded products's position in the market and can lengthen its effective period of exclusivity. Defenders of evergreening respond that the term is \"inherently pejorative\" because it creates the impression that pharmaceutical companies are exploiting the patent system. Defenders contend that there is nothing inherently suspect about secondary patents, which must meet the same requirements for patentability and pass through the same examination procedures as any other patent. Indeed, those requirements bar a secondary patent on an obvious variation of the primary patent or on another product or invention already available to the public. \"[I]t is often the case,\" defenders contend, \"that the value of a follow-on patent is comparable to, or even might exceed, that of a primary patent.\" One example arguably supporting this view is the drug Evista (raloxifine). Evista was \"initially studied as a potential treatment for breast cancer\" but, in 1997, FDA approved the drug for the prevention of osteoporosis. At that time, there were only a few years left on Evista's initial patent, which was filed in 1983. If the brand could not patent the new use (i.e., for prevention of osteoporosis), one commentator has argued that insufficient incentives would have existed to make the investment in R&D necessary to bring the drug to market. Defenders also argue that the ability to receive a patent on a later-developed formulation provides a significant incentive to address problems with the original formulation. For example, the original formulation of Lumigan, which is used to treat glaucoma, resulted, at times, in sufficiently severe red eye that patients would discontinue its use. Researchers subsequently developed an improved formulation with significantly decreased risk of this side effect. Defenders of secondary patents contend that without the possibility of patent protection, there would have been little incentive to perform this sort of research due to the significant costs involved. Secondary patents are also defended on the grounds of being necessary to recoup development costs. A recent study found that even though the patent term is generally twenty years, delays in PTO and FDA approval can decrease the nominal Orange Book patent term to 15.9 years, and generic competition can result in an effective market exclusivity of only 12.2 years. This effective market exclusivity is less than the sixteen years that one commentator suggests is necessary to recoup the brand's fixed costs for research, development, and clinical testing. Moreover, as secondary patents tend to be improvements to primary patents, brands argue that they are necessarily narrower than those primary patents. Thus, brands argue that when the primary patent expires, any other companyâincluding a genericâmay enter the market and produce the invention covered by that primary patent, assuming that the generic can design around any unexpired secondary patents. Doctors and patients can then decide whether the benefit conferred by a product covered by a secondary patent is worth the increased cost over the generic version of the product formerly covered by the primary patent. Finally, defenders also note that recent congressional action has decreased the cost of challenging patents, decreasing the impact of these later-filed \"evergreening\" patents. In 2011, Congress enacted the America Invents Act (AIA), which created a number of proceedings for reviewing a patent's validity after it is granted. One such proceeding is inter partes review (IPR), a PTO procedure that was implemented to \"improv[e] patent quality and provide a more efficient system for challenging patents that should not have issued; and reducing unwarranted litigation costs.\" Generally, any person who is not a patent's owner may file a petition for IPR beginning nine months after the patent issues. The PTO then decides whether to initiate review of the patent. If review is initiated, then the patent challenger must prove that the patent is invalid by a preponderance of the evidence âa lower requirement than the clear-and-convincing-evidence standard used when challenging the patent in court. The statute requires that the PTO's final decision be issued not more than one year after the decision to institute review. The median cost for litigating an IPR to that final decision is $324,000. Thus, IPR provides a relatively fast and relatively inexpensive method to challenge issued patents, particularly when compared to litigating in the courts. No statute currently specifically forbids evergreening. Instead, substantive patent law, particularly the law of obviousness, provides limits on whether the PTO may grant later-filed patents. Specifically, a patent may not be granted if \"the differences between the claimed invention and the prior art are such that the claimed invention as a whole would have been obvious\" before the patent application was filed. The Supreme Court has not articulated a specific test for whether an invention would have been obvious, instead preferring a flexible approach that takes the facts and circumstances of the state of the art into account. The Court has identified, however, some situations in which an invention likely would have been obvious. For example, if the invention involves \"the simple substitution of one known element for another or the mere application of a known technique to a piece of prior art ready for the improvement,\" the invention likely would have been obvious. At bottom, if the invention is \"a predictable variation\" of what came before, then the law of obviousness \"likely bars its patentability.\" Other doctrines also affect the viability of later-filed patents. Because the patent statute limits a person to \" a patent\" for a new invention, a single patentee may not obtain a later patent that covers the exact same invention as an earlier patent. This doctrine is referred to as \"statutory double patenting\" because it derives from the patent statute and prevents patenting of the same invention twice by the same inventor. The courts have extended double patenting to bar an inventor from patenting obvious variations of his earlier patents as well. This second form of double patenting, referred to as \"obviousness-type double patenting,\" prohibits a later patent that is not \"patentability distinct\" from an earlier commonly owned patent. In other words, the doctrine bars a patent owner from receiving a patent on an obvious variation of one of its earlier-filed patents. A patentee may overcome the obviousness-type double patenting issue, however, by using a \"terminal disclaimer\"âthat is, by disclaiming any portion of the later patent's term after the expiration of the earlier patent. Critics of current pharmaceutical patent practices have observed that patent evergreening can be used in conjunction with a practice they call \"product hopping.\" Product hopping is the process by which a brand, as the patents on an older branded drug are expiring, uses its current dominant market position to switch doctors, pharmacists, and consumers to a newer version of the same (or similar) drug with later-expiring patents. In other words, the brand forces a \"hop\" from one product to another. The new version of the product may be, for example, an extended release form or new dosage (e.g., moving from twice-a-day to once-a-day), a different route of administration (e.g., moving from capsules to tablets, or tablets to film strips), or a chemical change (e.g., moving to a different enantiomer). The switch to the new version may be accompanied by a marketing campaign or discounts and rebates to encourage doctors, insurers, and patients to switch to the new version; in some cases, production of the older version may even be discontinued. Product hopping tends to take one of two forms: a \"hard switch,\" where the brand removes the original product from the market, and a \"soft switch,\" where the brand leaves the original product on the market. The case of Abbott Laboratories v. Teva Pharmaceuticals USA, Inc. provides an example of a hard switch. That case involved Abbott's changes to its drug TriCor, which was used to treat cholesterol and triglycerides. Abbott allegedly lowered the strength of the drug, switched it from a capsule to a tablet, stopped selling capsules, bought back supplies of capsules from pharmacies, and marked capsules as \"obsolete\" in the national drug database. Once generics developed equivalents for the reformulation, Abbott allegedly again lowered the strength of the drug, stopped selling the original tablets, and again changed the code for the old tablets to \"obsolete.\" A soft switch allegedly occurred in Schneiderman v. Actavis PLC . There, Actavis produced Namenda IR (IR), a twice-daily drug designed to treat Alzheimer's disease. As the patents on IR neared expiration and generics prepared to enter the market, Actavis introduced a once-daily version of the drug, Namenda XR (XR), and allegedly attempted to induce doctors and patients to switch from IR to XR. Although the generic versions would have been substitutable for IR, the differences is dosing (10 mg in IR and 28 mg in XR) meant that the generic versions would not be substitutable for the new XR product. Initially, both IR and XR were on the market together. During that time, Actavis allegedly stopped marketing IR and \"spent substantial sums of money promoting XR to doctors, caregivers, patients, and pharmacists.\" Actavis also sold XR at a discount, making it much less expensive than IR, and issued rebates to ensure that patients did not have to pay higher copayments for XR than IR. When it appeared that the soft switch would only convert 30% of IR users to XR, Actavis allegedly implemented a hard switch by announcing that it would discontinue IR and attempting to stop Medicare health plans from covering IR. Critics of product hopping deride it as an anticompetitive practice that inhibits the entry of generic and biosimilar competitors, allowing the brand to maintain its dominant market position (and higher prices) without substantial benefits for consumers. In particular, critics contend that by shifting product demand from the previous product to a new product, the market for a generic form of the previous version dissipates by the time the generic can enter the market. All fifty states have enacted drug product selection (DPS) laws, which aim to lower consumer prices by allowing, and sometimes even requiring, pharmacists to fill a prescription written for a brand-name drug with a generic version of that drug. Typically, however, pharmacists may only substitute a generic drug for a branded drug if the generic version is \"AB-rated\" by FDA. To receive an AB rating, the generic must be therapeutically equivalent to the branded drug, which means it must have the same active ingredient, form, dosage, strength, and safety and efficacy profile. The generic must also be bioequivalentâin other words, the rate and extent of absorption of the generic cannot significantly differ from that of the brand drug. Thus, if the brand's new version of a drug, for example, changes the form of the drug (e.g., capsule to tablet) or the dosage of the active ingredient (e.g., 10 mg to 12 mg) from the older version, the generic product may not receive the AB rating required to be substitutable by pharmacists. Even if the generic is eventually able to obtain an AB rating to allow substitution, that process may take years to achieve. Thus, the \"hop\" to a new product can prevent automatic substitution with a generic product, thereby giving the brand an additional period during which it is substantially unaffected by generic competition. Defenders of product hopping respond that manufacturers have legitimate reasons to create new patented products and encourage doctors to prescribe the new product instead of an old product for which there is generic competition. One commentator has argued that patent law encourages brands to create new drugs or switch to new versions of drugs because they receive an exclusive period during which they may charge higher prices. That period is critical, it is argued, to recoup the estimated $2.6 billion average cost of bringing a new drug to marketâcompared to the $1 million to $2 million to bring a new generic product to market. Once a branded drug's patents expire, however, the brand will lose 80% to 90% of its sales to generic drugs. Thus, according to one commentator, brands have little incentive to keep marketing a product that is subject to generic competition; doing so would arguably transfer approximately 80% of the sales to their generic competitors. That is, even if the brand succeeds in convincing a doctor to prescribe the old product, DPS laws would allow a pharmacist to substitute a generic product instead. Given these economic realities, defenders argue that the brand would be effectively paying to market its competitors' products. Accordingly, it is argued that product hopping aims at maximizing profits for the brand (which can be used for additional R&D) and preventing free-riding by generics, not at preventing competition. Commentators also respond that generic manufacturers could reduce the impact of product hopping by marketing their own products. In that view, generic manufacturers choose to rely on DPS laws for sales. Instead, one commentator argues, the generic companies could promote their own products in the same way that brand manufacturers do. In any event, patients and doctors can arguably choose to use the generic version of the old product if the brand's new product is not worth the cost. There is no existing statute specifically prohibiting product hopping. Those practices, however, have been challenged under the antitrust laws as anticompetitive attempts to maintain a monopoly in violation of Section 2 of the Sherman Act. Schneiderman provides one example. In that case, the U.S. Court of Appeals for the Second Circuit (Second Circuit) held that the soft switch, described above, was not sufficiently anticompetitive to violate Section 2. Specifically, the court determined that as long as Actavis continued to sell both XR and IR, with generic IR drugs on the market, \"patients and doctors could evaluate the products and their generics on the merits in furtherance of competitive objectives.\" The Second Circuit further held that once Actavis implemented a hard switch by withdrawing IR, it \"crosse[d] the line from persuasion to coercion\" and therefore violated Section 2. The court next determined that Actavis's purported procompetitive justifications for the hard switch were pretextual because the hard switch was an attempt to impede generic competition and, in any event, the procompetitive benefits were outweighed by anticompetitive harms. Accordingly, the court affirmed the district court's grant of an injunction requiring Actavis to make IR \"available on the same terms and conditions\" as before the hard switch. Critics have argued that pharmaceutical manufacturers develop \"patent thickets\" to protect their products. This term is used in two slightly different ways, both relating to products covered by a high number of patents. First, a patent thicket may describe the situation in which multiple parties have overlapping patent rights on one product, such that a \"potential manufacturer must negotiate licenses with each patent owner in order to bring a product to market without infringing.\" Patent thickets, in this sense, raise concerns about inefficient exploitation of a technology because the multiplicity of patent owners increases transaction costs and creates coordination challenges. Second, the term may be used in a different sense to describe an incumbent manufacturer's practice of amassing a large number of patents relating to a single product, with the intent of intimidating competitors from entering the market, or to make it too costly and risky to do so. Commentators have observed that it is generally not unusual for a single product to be protected by multiple patents. For example, it has been estimated that a single smartphone may be protected by as many as 250,000 patents. Even the individual technologies in the phone may be covered by many patents. For example, Bluetooth 3.0 incorporates \"contributions of more than 30,000 patent holders,\" and more than 800 patent holders contributed to the micro SD removable memory storage card. Unlike pharmaceuticals, however, the patents on products like semiconductors or smartphones are typically not all owned by the same entity, and thus are examples of the first type of patent thicket (i.e., one in which multiple parties have overlapping patent rights on one product). Commentators contend that patent thickets on such technologies generally do not confer the same market power as a patent portfolio on a new pharmaceutical owned by a single drug manufacturer. In the pharmaceutical context, concerns about patent thickets have mainly been raised with regard to the second type of patent thicket and, in particular, with regard to biologics. This may be, at least in part, because those pharmaceuticals are derived from living cells or other biological material. Naturally occurring source material is generally not eligible for patenting under Section 101 of the Patent Act, but methods for transforming that source material into a biological product generally are patentable. Manufacturing a pharmaceutical using living cells is often complicated, offering more opportunities for patenting relative to chemically synthesizing small-molecule drugs. As changes are implemented to either the biologic product or its manufacturing process throughout the original patent term, those changes can be claimed as inventions and used to extend the effective patent protection. For example, a company producing a biologic could attempt to patent the use of a different medium for cell growth or an adjustment to the dosing. The patent portfolio that covers Humira, pharmaceutical manufacturer AbbVie's flagship biologic, has been characterized as an example of the second type of patent thicket. Critics contend that this patent portfolio has helped keep Humira competitors off the market for an extended time period. One study found that AbbVie filed 247 patent applications on various aspects of Humira, resulting in 132 issued patents. The Biosimiliars Council alleges that AbbVie filed seventy-five patents relating to Humira in the three years before biosimilar competition was set to begin, extending nominal patent protection through 2034. The council alleges that it will cost \"roughly $3 million per patent\" to challenge the Humira patents. In August 2017, just before biosimilar manufacturer Boehringer received FDA approval to launch its Humira biosimilar in the United States, AbbVie filed a lawsuit alleging that the biosimilar would infringe 1,600 claims across 74 of AbbVie's patents. Boehringer settled the lawsuit earlier this year, citing \"the inherent unpredictability of litigation, [and] the substantial costs of what would have been a long and complicated legal process and ongoing distraction to our business.\" AbbVie has similarly settled litigation with the other potential manufacturers of Humira biosimilars. Although the primary patent on Humira expired in 2016, no biosimilars will enter the U.S. market until January 31, 2023, at the earliest. The alleged patent thicket surrounding Humira has been the subject of litigation on other bases, including under the antitrust laws. In March 2019, a welfare fund filed an antitrust suit against AbbVie alleging that its patent thicket approach unreasonably restrained competition in violation of Sections 1 and 2 of the Sherman Act, and seeking billions of dollars in damages when AbbVie doubled the cost of Humira. Also in March, the mayor and city council of Baltimore, MD, brought a class action lawsuit alleging that, absent AbbVie's conduct, biosimilars of Humira could have been available in the United States as early as 2016. Other similar lawsuits have been filed, although none is aimed at invalidating AbbVie's patents. The lawsuits currently remain pending. Critics have voiced concerns that other drug manufacturers may attempt to amass similar patent portfolios on their biologics as those covering Humira, thereby postponing biosimilar competition from entering the market. Johnson & Johnson, for example, protects its Remicade product with more than one hundred patents. Biogen/Genentech similarly protects its cancer treatment Rituxin with what some could characterize as a patent thicket. Rituxin was the subject of 204 patent applications and ninety-four issued patents, potentially resulting in forty-seven years blocking competition. Indeed, the success of the patent thicketing strategy has led to speculation that other companies will follow suit. Defenders of this patenting practice raise similar arguments as those in support of evergreening: that the patents on these products represent innovation that the patent laws were designed to incentivize, and that each patent has passed through the rigorous examination process and been determined to be novel and nonobvious. For example, AbbVie has stated that Humira \"represents true innovation in the field of biologics,\" warranting protection through various patents. Other experts note that \"[t]here's nothing unusual about the multilayered way AbbVie has sought to patent and protect Humira,\" and that patent thickets simply \"tak[e] advantage of existing law.\" Accordingly, companies with patents relating to numerous aspects of their products likely view each patent as protecting significant patentable innovations of the sort that the patent system is designed to incentivize. Indeed, experts note that creating a biologic like Humira \"isn't easy work.\" Scientists must genetically engineer a cell line to secrete large amounts of the biologic, purify the results, and modify dosages for different diseases, among other \"incremental tweaks.\" Each of those steps in the process brings challenges that may require innovative solutions, and those solutions may be the subject of patents. As AbbVie's CEO noted, the Humira \"patent portfolio evolved as [AbbVie] discovered and learned new things about Humira.\" Thus, defenders view this practice as a legitimate method of protecting the different aspects of their innovations. No statute specifically forbids patent thickets. As with evergreening, substantive patent law (including the nonobviousness requirement and prohibition on double patenting) provides some of the primary restrictions on patent thickets. In other words, the ability to receive secondary patents is limited by the rule that new patents cannot be an obvious variation on the prior art or on the patentee's own prior patents. On the other hand, obviousness-type double patenting restrictions may have less impact on patent thickets than on evergreening due to the availability of terminal disclaimers. As explained supra , a patentee may overcome obviousness-type double patenting issues by disclaiming any portion of the later patent's term after the expiration of the earlier patent. Because the alleged goal of evergreening is to extend the exclusivity period for as long as possible, there is little incentive to file a terminal disclaimer. By contrast, the purported goal of a patent thicket is to accumulate a large number of patents protecting a single product, a goal that would be unaffected by terminal disclaimers. Thus, restrictions on obviousness-type double patenting have a lesser impact on preventing patent thickets, as compared to preventing evergreening. As described above, patent litigation can result when generic drug and biosimilar manufacturers seek to market a drug or biologic before patent rights on the branded version expire by challenging the validity of the brand-name companies' patents and/or their applicability to the follow-on product. Some brand-name companies resolve or settle such litigation through settlement agreements with the generic manufacturer whereby the brand-name company pays the generic manufacturer a sum of money (or other compensation) in return for the generic manufacturer agreeing to delay market entry. This practice, referred to as \"reverse payment settlements\" or \"pay-for-delay settlements,\" allows the brand-name company to (1)Â avoid the risk that its patents will be invalidated, (2)Â delay the market entry of generic competition, and (3)Â effectively extend its exclusive right to market the listed drug. Because these agreements terminate the litigation, the questions of patent validity and infringement remain open. Pay-for-delay settlements are not limited to cash payments from the brand to the generic. The U.S. Court of Appeals for the Third Circuit (Third Circuit) recently addressed such a settlement involving Wyeth, Inc.'s branded depression treatment drug, Effexor XR. In that case, the plaintiffs alleged that Wyeth and generic manufacturer Teva Pharmaceutical Industries Ltd. (Teva) reached an anticompetitive pay-for-delay settlement. This agreement is an example of the varied facts that result in such settlements. Teva filed an ANDA for a generic version of Effexor XR, and Wyeth sued for patent infringement. According to the plaintiffs (a class of direct purchasers of Effexor XR), an unfavorable preliminary ruling caused Wyeth to fear that it would lose the litigation, allowing generic manufacturers to enter the Effexor XR market. Accordingly, Wyeth and Teva entered into a settlement in which the parties agreed to vacate the unfavorable preliminary ruling; Teva agreed not to enter the market with its Effexor XR generic until approximately five years after the agreement (nearly seven years before Wyeth's patents expired); Wyeth agreed not to market a competing \"authorized generic\" during Teva's 180-day exclusivity period; Wyeth agreed to permit Teva to sell a generic version of another product, Effexor IR, before the original patent on Effexor expired and without a Wyeth-authorized generic; and Teva agreed to pay royalties to Wyeth on its sales of both generic versions of Effexor. Pursuant to a consent decree, Wyeth and Teva submitted the agreement to the FTC. The FTC did not object to the agreement. Notably, unlike Actavis , in this case Wyeth did not pay money directly to Teva. Instead, Wyeth's agreement not to market an authorized generic during Teva's 180-day exclusivity period would cause Teva to reap increased sales during that period. In other words, although Wyeth did not directly pay Teva to stay off of the market, the agreement ensured that Teva would receive compensation in other ways. The FTC and others have alleged that pay-for-delay settlements \"have significant adverse effects on competition\" in violation of antitrust laws, including Section 1 of the Sherman Act and Section 5 of the FTC Act. When evaluating agreements for potential antitrust violations, the court focuses its inquiry on \"form[ing] a judgment about the competitive significance of the [settlement] .Â .Â . 'based either (1) on the nature or character of the contracts, or (2) on surrounding circumstances giving rise to the inference or presumption that they were intended to restrain trade and enhance prices.'\" The Supreme Court has recognized that \"reverse payment settlements .Â .Â . can sometimes violate the antitrust laws,\" and courts have allowed antitrust litigation challenging certain reverse payment settlements to proceed under existing law. Defenders of such agreements contend there are significant benefits from pay-for-delay settlements. For example, AbbVie has settled suits with each of the companies that sought to introduce biosimilars to Humira. Even while accusing AbbVie of \"patent abuses\" relating to Humira, the Biosimilars Council has touted using settlements between brands and biosimilars to resolve patent thickets. The council contends that the Humira settlements are \"pro-consumer\" because, although biosimilar market entry will be delayed until seven years after the primary patent on Humira has expired, entry will still occur before several of the secondary patents covering Humira will expire. As the Supreme Court has recognized, pay-for-delay settlements may provide significant procompetitive benefits, and whether a particular settlement is procompetitive or anticompetitive will depend on a number of factors that vary from case to case. In Actavis v. FTC , the Supreme Court held that the rule of reason is the appropriate level of analysis in challenges to pay-for-delay agreements. Although the Court recognized the potential for such agreements to have anticompetitive effects, it acknowledged that \"offsetting or redeeming virtues are sometimes present.\" Such justifications might include \"traditional settlement considerations, such as avoided litigation costs or fair value for services.\" Accordingly, the FTC (or other plaintiffs) has to prove fully the anticompetitive effects of a particular agreement before the burden shifts to the defendant. The Third Circuit case involving Wyeth provides an example of the current analysis. Although the FTC did not object to the agreement, purchasers of Effexor XR filed a class action lawsuit against Wyeth and Teva alleging, inter alia, that the settlement agreement was an unlawful restraint of trade under Section 1 of the Sherman Act. The Third Circuit concluded that the plaintiffs had plausibly alleged an anticompetitive pay-for-delay settlement. The court determined that Wyeth's agreement not to manufacture a competing generic product during Teva's 180-day exclusivity period was an adequate allegation of a sufficiently large payment because it ensured that Teva would be the only generic product on the market, and thus Teva would receive all generic Effexor XR sales during that period. Moreover, the court concluded that the payment could not be justified as a simple effort to avoid the costs of litigation. Accordingly, the court determined that the plaintiffs had adequately alleged that the agreement between Wyeth and Teva was the kind of pay-for-delay agreement forbade by the Supreme Court in Actavis . Although this report has described the various patenting practices in isolation, they can be used concurrently. For example, product hopping can be combined with pay-for-delay settlements to delay generic entry while the brand switches the market to a new product. A manufacturer considering product hopping will often be more successful in preventing competition from the generic if it can convert the market to the new product before the generic enters the market. In one case, the brand estimated that it would sell ten times more tablets if it could switch doctors to the new product before the generic entered the market. One example of a drug manufacturer allegedly combining product hopping and pay-for-delay settlements to prevent competition for its product involves Cephalon, maker of the branded sleep disorder medication Provigil. Between its secondary patent and a period of regulatory exclusivity, protection of Provigil expired in April 2015. Due to the narrowness of the secondary patent, however, the generic companies planned to enter the market with noninfringing products in 2006. Cephalon estimated that, once the generic versions entered the market, there would be a 75% to 90% price reduction in Provigil, reducing revenues by more than $400 million in the first year alone. In 2006, Cephalon attempted to move the market to a new product, Nuvigil, which was patent-protected until 2023. But because FDA had not yet approved Nuvigil in late 2005, Cephalon settled its patent lawsuits with the generics, paying them more than $200 million to delay market entry until 2012. Although Cephalon argued its settlement would allow generic versions of Provigil to enter the market three years before the expiration of the Provigil secondary patent in 2015, following the settlement, Cephalon increased the price of Provigil and stopped marketing it. At the same time, Cephalon promoted Nuvigil both through its sales force and by discounting its price. Because of the pay-for-delay settlement, Cephalon had three years to switch the market to Nuvigil before generic entry in 2012, rather than have Provigil compete with the generics in 2006. Thus, Cephalon combined product hopping with pay-for-delay settlements to prolong its period of exclusivity. Pharmaceutical patenting practices have attracted significant interest from both commentators and Congress. This section of the report reviews several proposals, from both legislation and the academic literature, that seek to reduce or eliminate these patenting practices. This review is not intended to be comprehensive, nor does it evaluate the merits of these proposals. Instead, the proposals are reviewed as representative examples of the various types of legal changes under consideration. As discussed above, patenting practices are only one factor that may contribute to consumer prices in the highly complex pharmaceutical market. Thus, the discussed proposals relating to patenting practices are one potential method to reduce drug prices. Numerous legislative proposals intended to reduce drug prices exist, but because these proposals relate only indirectly to pharmaceutical patenting practices, they are outside the scope of this report. Proposals targeting evergreening primarily aim to make it harder for companies to receive later-filed or secondary patents, reduce the impact of later-filed patents, or incentivize challenges to patents. Several commentators have proposed that increasing patent examination resources could reduce the number of arguably weaker later-filed patents. These commentators contend that patent examiners \"often do not have enough time or resources to investigate whether a patent application is truly inventive.\" In these commentators' view, allocating more resources to the PTO would potentially prevent low-quality patents from issuing in the first place, thus preventing the need for accused infringers to spend time and resources defending against infringement or attempting to invalidate such patents. Although one commentator notes that \"most patents are not economically significant,\" he also recognizes that the PTO \"is not well positioned to identify which patents are important and which are worthless.\" Some proposals aim to reduce evergreening by making it more difficult for later-filed applications to meet the requirements for patentability. For example, one commentator has suggested raising the substantive patentability requirements for later-filed or secondary patents. Specifically, the commentator suggests amending the patent statute to require that an application for a patent on a secondary invention \"demonstrate through clear and convincing evidence in the written description that such invention has increased efficacy as compared to the original.\" The proposal defines \"increased efficacy\" as \"a proven improvement in the mechanism of action, as disclosed in the patent claims,\" and \"mechanism of action\" as \"the process by which a drug functions to produce a therapeutic effect, as disclosed in the patent claims.\" In the commentator's view, this would reduce evergreening by requiring that the secondary patent actually improve the manner in which the pharmaceutical product operates, and thus incentivize pharmaceutical companies to create new drugs, \"rather than creating minor changes that prolong the time they can profit off monopolies at the expense of patients.\" At least one other country has adopted a similar standard: Under Indian law a patent may not issue on \"a new form of a known substance which does not result in enhancement of the known efficacy of that substance.\" The Terminating the Extension of Rights Misappropriated (TERM) Act of 2019 is one example of a legislative proposal to curtail patent evergreening by reducing the impact of later-filed patents. If enacted, it would establish a presumption that, in patent challenges under Hatch-Waxman or BPCIA procedures, the patentee \"disclaimed the patent term for each of the listed patents after the date on which the term of the first patent expires.\" In effect, this presumption would mean that later-expiring patents listed in the Orange Book (or provided during the BPCIA's \"patent dance\") would, as a default, be treated as expiring on the date when the earliest-expiring patent on the drug or biologic expires. However, the patentee would be able to overcome this presumption by affirmatively demonstrating with a preponderance of the evidence that the later-expiring patents on the drug or biologic claim \"patentably distinct inventions.\" Because the law of double patenting already requires later-expiring patents to cover patentably distinct inventions to be valid, the TERM Act's legal effect would be to place the burden of proving patent validity on the patentee for certain later-expiring pharmaceutical patents. Under current law, patents are presumed valid in a judicial proceeding unless the challenger proves patent invalidity by clear and convincing evidence. The TERM Act would also require the PTO to determine if changes to patent examination practice may be necessary. Specifically, the Act would require the PTO to review the agency's patent examination procedures to determine whether the PTO is using the best practices to avoid the issuance of duplicative patents relating to the same drug or biologic. The bill would also require the PTO to determine the need for new practices or procedures to (1)Â improve examination of patents relating to the same drug or biological product and (2)Â reduce the issuance of patents that \"improperly extend the term of exclusivity.\" Finally, the Act would require the PTO to submit a report to the House Committee on the Judiciary containing its findings and recommendations. The Reforming Evergreening and Manipulation that Extends Drug Years Act (REMEDY) Act, like the TERM Act, seeks to curb evergreening by reducing the benefit of later-filed patents. Under the REMEDY Act, a generic's filing of a Paragraph (IV) certification in an ANDA would only trigger Hatch-Waxman's thirty-month stay if the patent claims a \"drug substance\"âthat is, the drug's active ingredient. The stay would not be available for a patent that claims only a \"drug product or method of use for a drug,\" unless the patent also claims the drug substance itself. In that case, the bill would allow FDA to approve the generic product immediately, without waiting for the litigation to determine the validity of the nondrug substance patents. This approach is aimed at allowing the generic to enter the market more quickly by limiting the grounds under which a brand can receive a thirty-month stay of FDA approval. The Act would also require that patents canceled by the PTO be removed from the Orange Book . The bill would also clarify that challenging a patent that is later struck from the Orange Book would not affect the first-generic-filer 180-day exclusivity period. Other anti-evergreening proposals aim to incentivize challenges to pharmaceutical patents after those patents issue. For example, the Second Look at Drugs Patents Act of 2019 (SLDPA) would encourage administrative challenges to patents added to the Orange Book . Under the SLDPA, unlike current law, a brand would be required to notify the PTO that it was adding patents to the Orange Book . After receiving that notification, the PTO would need to publish a notice regarding each patent and request that any eligible person file an IPR challenging that patent. Such patents would be \"provisionally\" included in the Orange Book until either the PTO confirmed the relevant patents' patentability or until certain time has passed without any challenge to the patents (300 days if the patent had issued when FDA approved the relevant drug, or fifteen months if the patent issued after approval). If any patent claims are canceled as a result of an IPR, the bill would require the brand to submit a request that the patent be removed from the Orange Book (if all claims are canceled) or that the canceled claims be removed from the Orange Book . Taken together, the SLDPA would provide notice regarding particular patents that generics may want to challenge and would encourage such challenges. As another method of encouraging patent challenges, one commentator has proposed that Congress require the PTO to implement an \"Invalidity Challenge Reimbursement Program\" (ICR program) that would require the PTO to reimburse \"petition fees, reasonable attorney fees, and related expenses incurred by accused infringers who have prevailed in a post-issuance proceeding\" at the PTO \"by invalidating at least one patent claim.\" The proposal envisions that such a program could be paid for by the PTO charging an \"ICR fee\" on each patent in force. As their costs would be reimbursed if they are successful, the commentator contends that this system would provide greater incentives to encourage an accused infringer to challenge a weak patent. Moreover, the commentator notes that the PTO is currently generally unaffected when it issues a low-quality patent. In the commentator's view, requiring the PTO to reimburse successful challenges to patents may create an incentive for the PTO to examine applications more carefully before issuing patents. Some bills aim to curtail certain pharmaceutical patenting practices directly. One such proposal is the Affordable Prescriptions for Patients Act of 2019 (APPA), which would make product hopping an antitrust violation and would set a limit on the number of certain patents that could be asserted in biologics litigation. The first portion of the bill addresses product hopping. It would amend the FTC Act to define when product hopping constitutes a violation of the federal antitrust laws. The bill would allow the FTC to prove a prima facie case of product hopping by showing that a manufacturer had engaged in either a \"hard switch\" or a \"soft switch\" during a certain period. Specifically, the manufacturer would have to engage in a switch between when the manufacturer first received notice that an applicant submitted an ANDA or biosimilar license for a particular product and 180 days after the generic drug or biosimilar product is first marketed. The APPA defines a \"hard switch\" in two ways. The first definition would prevent a manufacturer from requesting that FDA withdraw approval for a listed product and then marketing a \"follow-on product\" (i.e., a new version of the drug). Accordingly, the bill would alter current law, under which a brand manufacturer can freely ask FDA to withdraw approval for one of its products, possibly preventing a generic from marketing a competing product due to the lack of a reference product. The APPA's second definition of a hard switch would prevent a manufacturer from marketing or selling a follow-on product after withdrawing, intending to withdraw, discontinuing the manufacture of, or destroying a product to impede competition from a generic. The bill would therefore change current law, which generally allows manufacturers to take those actions to reduce the supply or desirability of an older product. Commentators have argued that such practices encourage patients to use the new follow-on product, reducing demand for the original product and the opportunity for competition from any potential generic for the original product. The bill's definition of a soft switch aims to capture other forms of product hopping that impede competition. Under the proposed language, a soft switch occurs when a manufacturer markets or sells a follow-on product and takes actions to impede competition for a generic product or a biosimilar version of the manufacturer's product. The bill would also allow the manufacturer to rebut a prima facie case of product hopping. First, a manufacturer would be able to justify its conduct by first establishing that it would have taken the same actions even if a generic had already entered the market. For a hard switch, the manufacturer must also establish either (1) the actions that it took related to safety risks to patients of the original product; or (2) if it withdrew, intended to withdraw, discontinued the manufacture of, or destroyed a product, that there was a supply disruption that was outside the control of the manufacturer. For a soft switch, the manufacturer must establish that it had \"legitimate pro-competitive reasons, apart from the financial effects of reduced competition, to take the action.\" The APPA would also make two changes aimed at reducing the impact of patent thickets for biological products. First, the bill would broaden the types of patents that a brand biologic manufacturer could assert in premarketing litigation by extending the list of \"artificial\" acts of infringement under 35 U.S.C. Â§Â 271(e) to include patents claiming methods or products used to manufacture a biological product. Second, the APPA would limit the number of certain patents that the brand could assert in litigation. Specifically, the brand would be limited to asserting at most twenty patents that (1)Â claim the biologic or method or product used in the manufacture of a biologic, (2)Â were listed during the patent dance, and (3)Â were filed more than four years after approval of the reference product or include a claim to a manufacturing process not used by the brand. Certain later-issued patents (i.e., those that issued after the brand provided its initial list to the biosimilar manufacturer during the patent dance) would be even further limited. The APPA would nonetheless authorize a court to increase how many patents the brand can assert if done so promptly and if such an increase is in the interest of justice or for good cause. A number of bills, such as the Orange Book Transparency Act of 2019 (OBTA), would change the patent listing requirements for the Orange Book . Under current law, the brand must include any patent that claims the drug or a method of using the drug. FDA regulations specify that \"drug substance (active ingredient) patents, drug product (formulation and composition) patents, and method-of-use patents\" must be listed in the Orange Book , whereas \"[p]rocess patents, patents claiming packaging, patents claiming metabolites, and patents claiming intermediates\" shall not be submitted to FDA. The OBTA would clarify the types of patents that may be listed in the Orange Book , only allowing listing of patents that (1)Â claim methods of using a drug or (2)Â claim the drug and are a drug substance (active ingredient) or drug product (formulation) patent. Limiting the types of patents that may be listed would limit the availability of the thirty-month stay of FDA approval of a generic because the stay is available only if the brand sues on one of the patents for which the generic made a Paragraph (IV) certification. Moreover, the OBTA would require FDA to list in the Orange Book each applicable regulatory exclusivity period for each drug. Finally, the bill would require the Government Accountability Office to submit a report to Congress detailing the types of patents included in the Orange Book , to include data on certain drug patents. Other bills would focus on increasing transparency to combat patent thickets and facilitate generic or biosimilar entry. The Purple Book Continuity Act of 2019 (PBCA) would require a BLA holder to provide to FDA, and FDA to publish in the Purple Book , any patents the brand provides to the biosimilar company during the patent dance. Further, the bill would require FDA to revise the Purple Book every thirty days to include (1) any new biologics that FDA licensed during that period and (2) information on patents that BLA holders provided to FDA during that period. The PBCA would also require FDA to list any exclusivity period that applies to each listed biologic, information that is not always currently included in the Purple Book . Moreover, the brand must notify FDA if any biologic license was withdrawn or suspended for safety reasons, and FDA would, in turn, have to remove that product from the Purple Book for the relevant period. By including the patents associated with a particular biologic, supporters of this approach argue that biosimilar manufacturers will be better able to evaluate the relevant patents before market entry. PBCA further directs the Secretary of HHS to conduct a study regarding the type of information that should be included in the Purple Book , and transmit the results to Congress. The Biologic Patent Transparency Act (BPTA) similarly would require patent information to be listed in the Purple Book , and would require the Purple Book more generally to be published in \"a single, easily searchable, list.\" However, the BPTA's listing requirement is somewhat broader than the PBCA, including any patent that the brand \"believes a claim of patent infringement could reasonably be asserted by the holder\" (and not just patents provided during the patent dance) to be listed in the Purple Book . Much like the PBCA, the BPTA would also require FDA to update the Purple Book every thirty days. The bill would further bar the brand from bringing an action for infringement of a patent that should have been, but was not, included in the Purple Book . The Preserve Access to Affordable Generics and Biosimilars Act (PAAGBA) seeks to limit the ability of brands to pay generic or biosimilar manufacturers to delay their market entry. To this end, PAAGBA creates a presumption of illegality for certain patent settlement agreements, moving away from a rule-of-reason analysis. The proposed legislation would amend the FTC Act to specifically authorize the FTC to initiate enforcement proceedings against parties to \"any agreement resolving or settling, on a final or interim basis, a patent infringement claim, in connection with the sale of a drug product or biological product.\" Such agreements would be presumed to have anticompetitive effects if the brand agrees to provide the generic with \"anything of value,\" including monetary payments or distribution licenses, in exchange for the generic agreeing \"to limit or forego research, development, manufacturing, marketing, or sales\" of the generic product \"for any period of time.\" The presumption would not attach, however, to agreements where the only compensation given to the generic is the right to market the product before relevant patents or exclusivities expire, reasonable litigation expenses, or a covenant not to sue for infringement. PAAGBA would not make agreements that fit its definitions per se illegal. The parties to the agreement could overcome the presumption of anticompetitive effect with \"clear and convincing evidence\" that (1) the agreement provides compensation \"solely for other goods or services\" from the generic company or (2) the agreement's \"procompetitive benefits .Â .Â . outweigh the anticompetitive effects.\" In evaluating this evidence, the fact finder cannot presume that entry would only have occurred after the expiration of the patent or statutory exclusivity. It also cannot presume that allowing entry into the market before the patent or statutory exclusivity period expires is necessarily procompetitive. If the FTC proves that parties to an agreement violated these provisions, PAAGBA would provide for assessment of a civil monetary penalty against each violating party. The civil penalty must be \"sufficient to deter violations,\" but no more than three times the value that the respective violating party gained from the agreement. If the brand did not gain demonstrable value from the agreement, the value the generic received would be used to calculate the penalty. In calculating the penalty for a particular party, an FTC ALJ would consider \"the nature, circumstances, extent, and gravity of violation\"; the agreement's impact on commerce; and the culpability, history of violations, ability to pay, ability to continue doing business, and profits or compensation gained by all parties. Any penalties assessed would be in addition to, rather than in lieu of, any penalties imposed by other federal law. The FTC would also be able to seek injunctions and other equitable relief, including cease-and-desist orders. In addition, an ANDA filer that was party to such an agreement would forfeit its 180-day exclusivity awarded for challenging a patent using a Paragraph (IV) certification.", "summary": "Intellectual property (IP) rights in pharmaceuticals are typically justified as necessary to allow manufacturers to recoup their substantial investments in research, development, and regulatory approval. IP law provides exclusive rights in a particular invention or product for a certain time period, potentially enabling the rights holder (e.g., a brand-name drug manufacturer) to charge higher-than-competitive prices. If rights holders are able to charge such prices, they have an incentive to lengthen the period of exclusive rights as much as possible. Indeed, some commentators allege that pharmaceutical manufacturers have engaged in patenting practices that unduly extend the period of exclusivity. These critics argue that these patenting practices are used to keep drug prices high, without any benefit for consumers or innovation. Criticisms center on four such practices: \" E vergreening \" : So-called patent \"evergreening\" is the practice of filing for new patents on secondary features of a particular product as earlier patents expire, thereby extending patent exclusivity past the original twenty-year term. Later-filed patents may delay or prevent entry by competitors, thereby allowing the brand-name drug manufacturer (the brand) to continue charging high prices. \" Product Hopping \" : Generic drug manufacturers allege that as patents on a particular product expire, brand manufacturers may attempt to introduce and switch the market to a new, similar product covered by a later-expiring patentâa process known as \"product hopping\" or \"product switching.\" This practice takes two forms: a \"hard switch,\" where the older product is removed from the market, and a \"soft switch,\" where the older product is kept on the market with the new product. In either case, the brand will focus its marketing on the new product in order to limit the market for any generic versions of the old product. \" Patent Thickets \" : Generic and biosimilar companies also allege that the brands create \"patent thickets\" by filing numerous patents on the same product. These thickets allegedly prevent generics from entering the market due to the risk of infringement and the high cost of patent litigation. \" Pay-for-D elay \" Settlements : Litigation often results when a generic or biosimilar manufacturer attempts to enter the market with a less expensive version of a branded pharmaceutical. Core issues usually include whether the brand's patents are valid, and whether the generic or biosimilar product infringes those patents. Rather than litigate these issues to judgment, however, the parties will often settle. Such settlements may involve the brand paying the generic or biosimilar to stay out of the marketâreferred to as \"reverse payment\" or \"pay-for-delay\" settlements. These settlements are allegedly anticompetitive because they allow the brand to continue to charge high prices without risking invalidation of its patent, thus unjustifiably benefiting the settling companies at the expense of the consumer. Drug manufacturers respond that their patenting practices protect new, innovative inventions, as Congress intended when it created the patent system. In their view, the terms for these practices are unfairly pejorative, or, at most, describe outlier behavior by a few companies. Defenders of these patenting practices reject their characterization as anticompetitive and emphasize that strong patent rights are needed to encourage innovation and life-saving research and development efforts. In recent years, some commentators and Members of Congress have proposed patent reforms that seek to limit or curtail these patenting practices, which some perceive as contributing to high prices for pharmaceutical products. Such proposals aim, for example, to reduce the impact of later-filed patents (e.g., TERM Act of 2019, H.R. 3199 , and REMEDY Act, S. 1209 / H.R. 3812 ); to encourage challenges to pharmaceutical patents (e.g., Second Look at Drugs Patents Act of 2019, S. 1617 ); to make product hopping an antitrust violation in certain circumstances (e.g., Affordable Prescriptions for Patients Act of 2019, S. 1416 ); to facilitate generic market entry (e.g., Orange Book Transparency Act of 2019, H.R. 1503 ); to increase transparency as to the patents that cover biological products (e.g., Purple Book Continuity Act of 2019, H.R. 1520 , and Biologic Patent Transparency Act, S. 659 ); and to reform pay-for-delay settlements (e.g., Preserve Access to Affordable Generics and Biosimilars Act, S. 64 / H.R. 2375 ).", "document_type": "crs"}
{"report": "The global pandemic of Coronavirus Disease 2019 (COVID-19) is affecting communities around the world and throughout the United States, with case counts growing daily. Containment and mitigation efforts by federal, state, and local governments have been undertaken to \"flatten the curve\"âthat is, to slow widespread transmission that could overwhelm the nation's health care system. The Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ) is the second of three comprehensive laws enacted specifically to support the response to the pandemic. The first law, the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), enacted on March 6, 2020, provides roughly $7.8 billion in discretionary supplemental appropriations to the Department of Health and Human Services (HHS), the Department of State, and the Small Business Administration. The law also authorizes the HHS Secretary to temporarily waive certain telehealth restrictions to make telehealth services more available during the emergency. The third law, the Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ), was enacted on March 27, 2020. In addition to a number of economic stimulus and other provisions, the CARES Act provides payment for or requires coverage of a COVID-19 vaccine, when available, for federal health care payment and services programs and most private health insurance plans; it also provides appropriations to continue support for federal, state, and local public health efforts, and for federal purchase of COVID-19 vaccines. The act also appropriates a $100 billion \"Provider Relief Fund\" to assist health care facilities and providers facing revenue losses and uncompensated care as a result of the pandemic. This CRS report describes the health provisions included in FFCRA as of the date of enactment, including relevant background information. Other divisions in the law contain provisions regarding HHS social services programs, federal nutrition programs, and other matters that are not within the scope of this CRS report. Other CRS reports summarize the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020, and the CARES Act, and will link to this report as they become available. Some provisions described in this report have been amended by the CARES Act, and in such cases, footnotes reference the relevant CRS expert who can answer questions about the amendments. This report will not otherwise be updated or changed to reflect subsequent congressional or administrative action related to the FFCRA health provisions. The Appendix contains a list of CRS experts for follow-up on further developments. On March 14, 2020, the House amended and passed H.R. 6201 , the Families First Coronavirus Response Act, by a vote of 363-40. The House considered the measure under the suspension of the rules procedure, a process that allows for expedited consideration of measures that enjoy overwhelming support. The measure had been introduced on March 11, 2020, and referred to the Committee on Appropriations as the primary committee, as well as to the Committee on the Budget and the Committee on Ways and Means. The committees took no formal action on the legislation; the suspension of the rules procedure allows the House to take up a measure (even one in committee), amend it, and pass it, all with a single vote. To suspend the rules and pass the bill requires the support of two-thirds of those voting. On March 16, 2020, the House (by unanimous consent) considered and agreed to a resolution (H.Res. 904) that directed the Clerk to make changes to the legislation when preparing the final, official version of the House-passed bill. The process of preparing this version is called \"engrossment.\" The engrossed version was sent to the Senate. The Senate considered the bill under the terms of a unanimous consent agreement that allowed for the consideration of three amendments and required the support of 60 Senators to approve any amendment and for final passage of the bill. The Senate did not agree to any of the amendments but passed the bill, 90-8, on March 18, 2020. The President signed the bill into law the same day. It became P.L. 116-127 . The Families First Coronavirus Response Act, among other things, increases appropriations to the Department of Defense, Indian Health Service (IHS), HHS, and Veterans Health Administration for testing and ancillary services associated with the SARS-CoV-2 virus, or COVID-19. Through several provisions in FFCRA Divisions A and F, the act provides payment for or requires coverage of testing for the COVID-19 virus, along with items and services associated with such testing, such as supplies and office visits, without any cost sharing, for individuals who are covered under Medicare, including Medicare Advantage, traditional Medicaid, the State Children's Health Insurance Program (CHIP), TRICARE, Veterans health care, the Federal Employees Health Benefits (FEHB) Program, most types of private health insurance plans, the IHS, and for individuals who are uninsured (as defined under FFCRA). These coverage provisions are effective beginning on the date of enactment through any portion of the COVID-19 public health emergency (declared pursuant to Section 319 of the Public Health Service Act). The FFCRA prohibits private health insurance plans and Medicare Advantage plans from employing utilization management tools, such as prior authorization, for the COVID-19 test, or the visit to furnish it. FFCRA provides for an increase to all states, the District of Columbia, and territories in the share of Medicaid expenditures financed by the federal government, subject to specific requirements. It provides additional Medicaid funding to territories. FFCRA modifies requirements related to waiving certain Medicare telehealth restrictions during the emergency. Finally, it waives liability, with a narrow exception, for manufacturers, distributors, or providers of specified respiratory protective devices used for COVID-19 response. The Congressional Budget Office and the Joint Committee on Taxation provided a preliminary estimate of the budget effects of the Families First Coronavirus Response Act. Overall, the act is estimated to increase discretionary spending by $2.4 billion from emergency supplemental appropriations, to increase mandatory outlays by $95 billion, and to decrease revenues by $94 billion. These estimates are based on assumptions about the severity and duration of the pandemic, and they may vary substantially from final estimates to be provided later this year. Discretionary spending totals and CBO's estimates of mandatory outlays for health care programs in Division F are provided in the \" Summaries of Provisions \" section. Several key terms are referred to repeatedly throughout this report: emergency period, COVID-19 testing and testing-related items and services, and uninsured individuals. This section provides the technical definitions for those terms. Several provisions in Division F define the effective period of the authorized activity as \"the emergency period defined in paragraph (1)(B) of section 1135(g),\" or comparable construction, referring to a paragraph in Section 1135 of the Social Security Act (SSA). Section 1135 allows the Secretary of Health and Human Services (HHS Secretary) to waive specified requirements and regulations to ensure that health care items and services are available to enrollees in the Medicare, Medicaid, and CHIP programs during emergencies. Paragraph (1)(B) of SSA Section 1135(g) refers to \"the public health emergency declared with respect to the COVID-19 outbreak by the Secretary on January 31, 2020, pursuant to section 319 of the Public Health Service Act [PHSA].\" Hence, the referenced emergency period in provisions in Division F is the period during which this particular Section 319 public health emergency declaration âwhether initial or renewedâis in effect. However, while most Division F provisions are effective during any portion of the emergency period described above, those provisions bec a me effective as of the date of enactment of FFCRA , March 18, 2020, even though the emergency period began earlier. Division F provisions with different effective dates are so noted in the descriptions of the sections below. Through several provisions in FFCRA Divisions A and F, the act provides payment for or requires coverage of testing for the COVID-19 virus, and items and services associated with such testing, such as supplies and office visits, without cost sharing. These coverage requirements apply to individuals who are covered under Medicare, traditional Medicaid, CHIP, TRICARE, Veterans health care, FEHB, the IHS, most types of private health insurance plans, and individuals who are uninsured (as defined below). Provisions in Division F refer to COVID-19 testing in several ways: \"In vitro diagnostic products (as defined in section 809.3(a) of title 21, Code of Federal Regulations) for the detection of SARS-CoV-2 or the diagnosis of the virus that causes COVID-19 that are approved, cleared, or authorized under section 510(k), 513, 515 or 564 of the Federal Food, Drug, and Cosmetic Act [FFDCA]\"; \"COVID-19 related items and services\"; \"in vitro diagnostic products\"; \"clinical diagnostic lab tests\"; and \"any COVID-19 related items and services.\" COVID- 19 stands for Coronavirus Disease 2019, the name of the pandemic disease. SARS-CoV- 2 is the scientific name of the virus that causes COVID-19. Diagnostic testing identifies the presence of the virus, which, in conjunction with clinical signs and symptoms, informs the diagnosis of COVID-19. In Vitro Diagnostics (IVDs) are medical devices used in the laboratory analysis of human samples, including commercial test products and instruments used in testing. IVDs may be used in a variety of settings, including a clinical laboratory, a physician's office, or in the home. IVDs are defined in FDA regulation as a specific subset of devices that include \"reagents, instruments, and systems intended for use in the diagnosis of disease or other conditions ... in order to cure, mitigate, treat, or prevent disease ... [s]uch products are intended for use in the collection, preparation, and examination of specimens taken from the human body.\" As indicated by this definition, an IVD may be either a complete test or a component of a test, and in either case, the IVD comes under FDA's regulatory purview. FDA premarket review of IVDs may include Premarket Approval (PMA); notification and clearance (510(k)); authorization pursuant to de novo classification; or authorization for use in an emergency pursuant to an Emergency Use Authorization (EUA) based on circumstances (e.g., a public health emergency determination) and the risk the device poses. Although the terms and definitions used to refer to COVID-19 testing vary throughout FFCRA, they do not necessarily reflect actual differences in the types of tests and ancillary services that are or must be covered. Some of these definitions and terms were amended in the CARES Act. In summarizing FFCRA provisions in this CRS Report, mention of any of these definitions of a COVID-19 test, as described above, is referred to as \" COVID-19 testing .\" Sections in FFCRA Divisions A and F that refer to COVID-19 testing generally also refer to health care items and services furnished in relation to testing, such as supplies and office visits, although definitions vary. FFCRA Section 6001(a)(2) defines these ancillary services, in the context of private health insurance coverage, as [i]tems and services furnished to an individual during health care provider office visits (which term in this paragraph includes in-person visits and telehealth visits), urgent care center visits, and emergency room visits that result in an order for or administration of an in vitro diagnostic product described in paragraph (1), but only to the extent such items and services relate to the furnishing or administration of such product or to the evaluation of such individual for purposes of determining the need of such individual for such product. This definition could encompass additional diagnostic testing associated with the visit, which may include additional laboratory tests and imaging studies. However, it would not encompass treatment for COVID-19 illnesses . See the \" Section 6001. Coverage of Testing for COVID-19 \" section below regarding enforcement and implementation of this section's provisions. Provisions in Division F that use language discussed above, comparable construction, or cross-reference, are as follows: Section 6001(a)(1)-(2), regarding specified types of private health insurance coverage. Section 6004(a)(1)(C), which amends SSA Section 1905(a)(3) regarding Medicaid medical assistance, and Section 6004(a)(2), which amends SSA Sections 1916 and 1916A regarding Medicaid cost-sharing. Both provisions refer to SSA Section 1905(a)(3), as amended. Section 6004(b)(1), which amends SSA Section 2103(c), regarding CHIP child coverage, and Section 6004(b)(2), which amends SSA Section 2112(b)(4), regarding CHIP pregnant women coverage. Both provisions reference SSA Section 1905(a)(3), as amended. Section 6006, regarding TRICARE, veterans health care, and federal civilian employee health coverage (FEHB), each referencing FFCRA Section 6001(a)(1)-(2). Section 6007, regarding IHS referencing FFCRA Section 6001(a)(1)-(2). In addition, appropriations provided in FFCRA Division A to the Defense Health Program, Veterans Health Administration, IHS, and the HHS Public Health and Social Services Emergency Fund are to be used, in whole or in part, to pay for COVID-19 testing and related services, with reference to Section 6001(a) of the act. However, Division F sections pertaining to Medicare, Medicare Advantage, and the Medicaid and CHIP programs do not reference FFCRA Section 6001(a)(1)-(2) with respect to the definition of COVID-19 tests, administration of the tests, or related items and services, but rather amend the Social Security Act directly to require coverage of these things. Two provisions in FFCRA facilitate access to COVID-19 testing for \"uninsured individuals\": Division A, Title V, and Division F, Section 6004. Title V provides funding to the National Medical Disaster System (NDMS) that can be used to reimburse health care providers for costs related to COVID-19 testing for uninsured individuals, as defined in that section (and as explained below). Section 6004 provides states an option to use Medicaid as a vehicle to provide COVID-19 testing without cost to uninsured individuals, as defined in that section. The respective definitions of uninsured individuals are similar but not identical. In Title V, \"uninsured individual\" means an individual who is not enrolled in coverage in any of the following three categories: A federal health care program, as defined: This includes but is not limited to Medicare, Medicaid, CHIP, TRICARE, and the VA health care system. Most types of private health insurance plans: This includes individual health insurance coverage and group plans, whether fully insured or self-insured. The explanation of these coverage types and the applicability of Section 6001 to them also apply to this provision. The Federal Employees Health Benefits ( FEHB ) Program: See the \" Section 6006. Application with Respect to TRICARE, Coverage for Veterans, and Coverage for Federal Civilians \" section below for background on FEHB. In other words, individuals enrolled in coverage in one of these three categories are considered insured and are not eligible for the testing assistance described in Title V. Note that individuals with certain types of private coverage may be considered uninsured, due to the coverage definitions cited. The definition of individual health insurance coverage does not include a type of coverage called short-term, limited duration insurance (STLDI) (see \" Section 6001. Coverage of Testing for COVID-19 \"). Thus, individuals with STLDI appear to be considered uninsured for the purpose of eligibility for assistance under Title V. Section 6004 includes additional groups in the definition of \"uninsured individual\" that applies under such sections. Specifically, for the purposes of Section 6004, uninsured individuals are defined as those who are not enrolled in (1) a federal health care program, as defined; (2) a specified type of private health insurance plan; or (3) FEHB. Such individuals are also not Medicaid-eligible under one of Medicaid's mandatory eligibility pathways (e.g., the poverty-related pregnant women and child pathways, or the Medicaid expansion pathway under the Patient Protection and Affordable Care Act [ACA; P.L. 111-148 , as amended]). The first three categories are defined and referenced the same way in Section 6004 as they are in Title V, although wording and punctuation differ slightly. See the discussion of Section 6004 in this report for more information about the additional criteria related to COVID-19 testing without cost-sharing under Medicaid. This section describes the health care-related supplemental appropriations in FFCRA Division A for the Defense Health Program, the Veterans Health Administration, and HHS accounts, and applicable general provisions. All such appropriations are designated as an emergency requirement and, as a result, are not constrained by the statutory discretionary spending limits (often referred to as budget caps). The Defense Health Program (DHP) is an account in the Department of Defense budget that funds various functions of the Military Health System. These functions include the provision of health care services, certain medical readiness activities, expeditionary medical capabilities, education and training programs, medical research, management and headquarters activities, facilities sustainment, procurement, and civilian personnel. For FY2020, Congress appropriated $34.4 billion to the DHP. FFCRA appropriates an additional $82 million to the DHP for COVID-19 testing, administration of the test, and related items and services outlined in FFCRA Section 6006(a). (For a summary of this section, see \" Definitions of COVID-19 Testing and Related Services \" and \" Section 6006. Application with Respect to TRICARE, Coverage for Veterans, and Coverage for Federal Civilians .\") The additional funds are designated as emergency spending and are to remain available until September 30, 2022. The IHS within HHS is the lead federal agency charged with improving the health of American Indians and Alaska Natives. In FY2019, IHS provided health care to approximately 2.6 million eligible American Indians/Alaska Natives. IHS's FY2020 appropriation was $6.1 billion, with $4.3 billion appropriated to the Indian Health Services account, which supports the provision of clinical services and public health activities. The services provided at IHS facilities vary, with some facilities providing inpatient services, laboratory testing services, and emergency care, while others focus on outpatient primary care services. IHS does not offer a standard benefit package, nor is it required to cover certain services within its facilities or when it authorizes payment for services to its beneficiaries outside of the IHS system (see \" Section 6007. Coverage of Testing for COVID-19 at No Cost Sharing for Indians Receiving Purchased/Referred Care \"). FFCRA appropriates an additional $64 million for COVID-19 testing, administration of the test, and related items and services as specified in FFCRA Section 6007. (See \" Definitions of COVID-19 Testing and Related Services \" and \" Section 6007. Coverage of Testing for COVID-19 at No Cost Sharing for Indians Receiving Purchased/Referred Care .\") The section also specifies that the additional funds are to be allocated at the discretion of the IHS director. The additional funds are designated as emergency spending and are to remain available until September 30, 2022. There is no federal assistance program designed purposefully to pay the uncompensated costs of health care for the uninsured and underinsured necessitated by a public health emergency or disaster. In general, there has been no consensus that doing so should be a federal responsibility. Nonetheless, Congress has provided appropriations for several limited mechanisms to address uncompensated health care costs in response to previous incidents. The health care needs of uninsured and underinsured individuals and the financial pressures many individuals and their health care providers are facing during the COVID-19 outbreak have spurred congressional interest in these approaches. Among other forms of assistance, the CARES Act ( P.L. 116-136 ) appropriates a $100 billion \"Provider Relief Fund\" to assist health care facilities and providers facing revenue losses and uncompensated care as a result of the pandemic. FFCRA uses the National Disaster Medical System (NDMS) Definitive Care Reimbursement Program as the mechanism for federal payment for COVID-19 testing and related services for uninsured individuals. Historically, NDMS has paid for health care items and services at between 100% and 110% of the applicable Medicare rate, and the Centers for Medicare & Medicaid Services (CMS) has processed payments. To fund this approach, FFCRA provides $1 billion to the Public Health and Social Services Emergency Fund (PHSSEF), an account used in appropriations acts to provide the HHS Secretary with one-time or emergency funding, as well as annual funding for the office of the HHS Assistance Secretary for Preparedness and Response (ASPR). Covered COVID-19 testing, administration of the test, and related services are as defined in Subsection 6001(a) of the act. (See \" Definitions of COVID-19 Testing and Related Services .\") An uninsured individual is defined, for purposes of this section, as someone who is not enrolled in (1) a federal health care program, as defined; (2) a specified type of private health insurance plan; or (3) FEHB. (See \" Definition of the Uninsured \" for more information.) The additional funds are designated as emergency spending and are to remain available until expended. The Veterans Health Administration (VHA) of the Department of Veterans' Affairs (VA) provides health care to eligible veterans and their dependents who meet certain criteria as authorized by law. The VHA is funded through five appropriations accounts: (1) medical services, (2) medical community care, (3) medical support and compliance, (4) medical facilities, and (5) medical and prosthetic research. The first four accounts provide funding for medical care for veterans. FFCRA provides $60 million in supplemental appropriations for FY2020 to the VHAâ$30 million for medical services and $30 million for medical community careâfor COVID-19 testing, administration of the test, and related items and services for visits for veterans. (See \" Definitions of COVID-19 Testing and Related Services \" and \" Veterans .\") The additional funds are designated as emergency spending and are to remain available until September 30, 2022. This title provides a reporting requirement (Section 1701) which states that each amount appropriated or made available by Division A is in addition to amounts otherwise appropriated for the fiscal year involved (Section 1703), and that unless otherwise provided, appropriations in Division A are not available for obligation beyond FY2020 (Section 1704). Title VII also includes Section 1702. This section was repealed in its entirety by Section 18115 of the CARES Act ( P.L. 116-136 ), which replaced it with a requirement for all laboratories carrying out COVID-19 testing to report testing data to HHS, as specified. An explanation of the repealed provision is provided here, for completeness. Generally, laboratories report testing results for specified diseases and conditions (called notifiable conditions ) directly to state or territorial (jurisdictional) health departments, pursuant to requirements in jurisdictional law. Through its National Notifiable Diseases Surveillance System (NNDSS), the HHS Centers for Disease Control and Prevention (CDC) works with jurisdictions and the Council of State and Territorial Epidemiologists (CSTE) to track national notifiable conditions, mostly infectious diseases and some noninfectious conditions (e.g., lead poisoning). Usually, such data are provided to CDC voluntarily. COVID-19 is a reportable disease in all reporting jurisdictions, and CDC receives data on COVID-19 cases and laboratory test results through NNDSS from all jurisdictions, as well as directly from some commercial laboratories. In addition, the FDA often includes, as a condition of an Emergency Use Authorization (EUA), the requirement that laboratories carrying out the EUA test comply with all relevant state and local reporting requirements. FFCRA Section 1702 would have required all states and local governments receiving funding under Division A to report real-time and aggregated data on both testing (tests performed) and test results to the respective State Emergency Operations Center. These data would then have been transmitted to the CDC. This section describes all of the provisions included in FFCRA Division F. Some provisions described below have been amended by the CARES Act ; in such cases, foot n otes reference the relevant CRS expert who can answer questions about the amendment s . In some cases, the amendments made by the CARES Act are substantial, in which case, the footnote may also provide a brief description of the amendment . Private health insurance is the predominant source of health insurance coverage in the United States. In general, consumers may obtain individual health insurance coverage directly from an insurer, or they may enroll in a group health plan through their employer or another sponsor . Group health plan sponsors may finance coverage themselves (self-insure) or purchase (fully insured) coverage from an insurer. Covered benefits and consumer costs may vary by plan, subject to applicable federal and state requirements. The federal government may regulate all the coverage types noted above, and states may regulate all but self-insured group plans. Federal and state requirements may vary by coverage type. Some federal requirements apply to all coverage types noted above, while other federal requirements only apply to certain coverage types. Prior to the enactment of FFCRA, there were no federal requirements specifically mandating private health insurance coverage of items or services related to COVID-19 testing. In recent weeks, some states have announced relevant coverage requirements, and some insurers have clarified or expanded their policies to include relevant coverage. FFCRA newly requires most private health insurance plans to cover COVID-19 testing, administration of the test, and related items and services (see \" Definitions of COVID-19 Testing and Related Services \"). The coverage must be provided without consumer cost-sharing, including deductibles, copayments, or coinsurance. Prior authorization or other utilization management requirements are prohibited. These requirements apply to individual health insurance coverage and to group plans, whether fully insured or self-insured. This includes plans sold on and off the individual and small group exchanges. Per the definition of individual health insurance coverage cited in the act, the requirements do not apply to short-term, limited-duration plans. The requirements do apply to grandfathered plans , which are individual or group plans in which at least one individual was enrolled as of enactment of the ACA (March 23, 2010), and that continue to meet certain criteria. Plans that maintain their grandfathered status are exempt from some federal requirements, but FFCRA specifies that Section 6001 applies to them. The coverage requirements in this act apply only to the specified items and services that are furnished during the emergency period described in the act (see \" Duration of Emergency Period \"), as of the date of enactment (March 18, 2020). Subsection (b) states that the Secretaries of HHS, Labor, and the Treasury are required to enforce this section's provisions as if the provisions were incorporated into the PHSA, Employee Retirement Income Security Act (ERISA), and Internal Revenue Code (IRC), respectively. Subsection (c) states that those Secretaries also have authority to implement the provisions of this section \"through sub-regulatory guidance, program instruction, or otherwise.\" CBO preliminarily estimates that Section 6001 will decrease federal revenues by $4 million and increase federal outlays by $7 million over the FY2020âFY2022 period. Medicare Part B covers physicians' services, outpatient hospital services, durable medical equipment, and other medical services. Most physicians, providers, and practitioners are subject to limits on amounts they can bill beneficiaries for covered services, and they can bill the beneficiary for only the 20% coinsurance of the Medicare payment rate plus any unmet deductible. Part B also covers outpatient clinical laboratory tests provided by Medicare-participating laboratories, such as certain blood tests, urinalysis, and some screening tests, including the test for the coronavirus that causes COVID-19. These services may be furnished by labs located in hospitals and physician offices, as well as by independent labs. Beneficiaries have no coinsurance, co-payments, or deductibles for covered clinical lab services. FFCRA eliminates the Medicare Part B beneficiary cost-sharing for provider visits during which a coronavirus diagnostic test is administered or ordered during the emergency period (see \" Duration of Emergency Period \"). Beneficiaries are not responsible for any coinsurance payments or deductibles for any specified COVID-19 testing-related service, defined as a medical visit that falls within the evaluation and management service codes for the following categories: office and other outpatient services; hospital observation services; emergency department services; nursing facility services; domiciliary, rest home, or custodial care services; home services; or online digital evaluation and management services. The elimination of beneficiary cost-sharing for COVID-19 testing-related services applies to Medicare payment under the hospital outpatient prospective payment system, the physician fee schedule, the prospective payment system for federally qualified health centers, the outpatient hospital system payment system, and the rural health clinic services payment system. The HHS Secretary is to provide appropriate claims coding modifiers to identify the services for which beneficiary cost-sharing is waived. The HHS Secretary is allowed to implement this section by program instruction or otherwise. CBO preliminarily estimates that enacting Sections 6002 and 6003 will increase direct spending by $6.7 billion over the FY2020-FY2022 period. Medicare Advantage (MA) is an alternative way for Medicare beneficiaries to receive covered benefits. Under MA, private health plans are paid a per-person monthly amount to provide all Medicare-covered benefits (except hospice) to beneficiaries who enroll in their plan. In general, cost sharing (copayments and coinsurance) under an MA plan must be actuarially equivalent to cost sharing under original Medicare, but cost sharing for a specific item or service may vary from amounts required under original Medicare. Private plans may use different techniques to influence the medical care used by enrollees, such as requiring enrollees to receive a referral to see specialists, or requiring prior approval or authorization from the plan before a service will be paid for. FFCRA requires MA plans to cover COVID-19 testing, the administration of the test, and related items and services during the emergency period (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). Plans are prohibited from charging cost sharing for those items and services, and are prohibited from using prior authorization or other utilization management techniques, with respect to the coverage of the test or ancillary services. The HHS Secretary is allowed to implement this section by program instruction or otherwise. CBO preliminarily estimates that enacting Sections 6002 and 6003 will increase direct federal spending by $6.7 billion over the FY2020-FY2022 period. Medicaid is a federal-state program that finances the delivery of primary and acute medical services, as well as long-term services and supports, to a diverse low-income population. Medicaid is financed jointly by the federal government and the states. States must follow broad federal rules to receive federal matching funds, but they have flexibility to design their own versions of Medicaid within the federal statute's basic framework. This flexibility results in variability across state Medicaid programs. Medicaid coverage includes a variety of primary and acute-care services, as well as long-term services and supports (LTSS). Not all Medicaid enrollees have access to the same set of services. An enrollee's eligibility pathway determines the available services within a benefit package. Most Medicaid beneficiaries receive services in the form of what is called traditional Medicaid. In general, under traditional Medicaid coverage, state Medicaid programs must cover specific required services listed in statute (e.g., inpatient and outpatient hospital services, physician's services, or laboratory and x-ray services) and may elect to cover certain optional services (e.g., prescription drugs, case management, or physical therapy services). Under alternative benefit plans (ABPs), by contrast, states must provide comprehensive benefit coverage that is based on a coverage benchmark rather than a list of discrete items and services, as under traditional Medicaid. Coverage under an ABP must include at least the essential health benefits (EHBs) that most plans in the private health insurance market are required to furnish. States that choose to implement the ACA Medicaid expansion are required to provide ABP coverage to the individuals eligible for Medicaid through the expansion (with exceptions for selected special-needs subgroups), and are permitted to extend such coverage to other groups. Beneficiary cost sharing (e.g., premiums and co-payments) is limited under the Medicaid program. States can require certain beneficiaries to share in the cost of Medicaid services, but there are limits on (1) the amounts that states can impose, (2) the beneficiary groups that can be required to pay, and (3) the services for which cost sharing can be charged. The State Children's Health Insurance Program (CHIP) is a federal-state program that provides health coverage to uninsured children and certain pregnant women with annual family income too high to qualify for Medicaid. CHIP is jointly financed by the federal government and states, and is administered by the states. Like Medicaid, the federal government sets basic requirements for CHIP, but states have the flexibility to design their own version of CHIP within the federal government's framework. As a result, CHIP programs vary significantly from state to state. States may design their CHIP programs as (1) a CHIP Medicaid expansion, (2) a separate CHIP program, or (3) a combination approach, where the state operates a CHIP Medicaid expansion and one or more separate CHIP programs concurrently. CHIP benefit coverage and cost-sharing rules depend on program design. CHIP Medicaid expansions must follow the federal Medicaid rules for benefits and cost sharing. For separate CHIP programs, the benefits are permitted to look more like private health insurance, and states may impose cost sharing, such as premiums or enrollment fees, with a maximum allowable amount that is tied to annual family income. Regardless of the choice of program design, all states must cover emergency services, well-baby and well-child care including age-appropriate immunizations, and dental services. FFCRA adds COVID-19 testing and related services the list of Medicaid mandatory services under traditional Medicaid benefits for the period beginning March 18, 2020, through the duration of the public health emergency as declared by the HHS Secretary pursuant to Section 319 of the PHSA (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). States and territories are prohibited from charging beneficiary cost sharing for such testing, or for testing-related state plan services furnished during this period. FFCRA also permits states to extend COVID-19 testing, testing-related state plan services, testing-related visit and the administration of the testing without cost sharing (as referenced earlier in this provision) to uninsured individuals during the specified public health emergency period. For the purposes of this provision, uninsured individuals are defined as those who are not Medicaid-eligible under one of Medicaid's mandatory eligibility pathways (e.g., the poverty-related pregnant women and child pathways, or the ACA Medicaid expansion pathway), and who are not enrolled in (1) a federal health care program (e.g., Medicare, Medicaid, CHIP, or TRICARE); (2) a specified type of private health insurance plan (e.g., individual health insurance coverage and group plans, whether fully insured or self-insured); or (3) FEHB (see \" Definition of the Uninsured \"). The law provides 100% federal medical assistance percentage (FMAP or federal matching rate) for medical assistance and administrative costs associated with uninsured individuals who are eligible for Medicaid under this provision. The law also requires CHIP programs (regardless of program design) to cover COVID-19 testing for CHIP enrollees for the period beginning March 18, 2020, through the duration of the public health emergency period as specified (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). States are prohibited from charging beneficiary cost sharing for such testing, or for testing-related visits furnished to CHIP enrollees during this period. CBO preliminarily estimates that Section 6004 will increase direct federal spending by a total of $1.9 billion in FY2020 and FY2021. In 2005 Congress passed the Public Readiness and Emergency Preparedness Act (PREP Act), which authorizes the federal government to waive liability (except for willful misconduct) for manufacturers, distributors, and providers of medical countermeasures, such as drugs and medical supplies, that are needed to respond to a public health emergency. The act also authorizes the federal government to establish a program to compensate eligible individuals who suffer injuries from administration or use of products covered by the PREP Act's immunity provisions. FFCRA explicitly adds to the list of PREP Act-covered countermeasures any personal respiratory protective device that is (1) approved by the National Institute for Occupational Safety and Health (NIOSH); (2) subject to an emergency use authorization (EUA); and (3) used for the COVID-19 response, retroactive from January 27, 2020, and through October 1, 2024. The CARES Act, Section 3103, amends this provision to define a covered personal respiratory protective device as one that \"is approved by [NIOSH], and that the Secretary determines to be a priority for use during a public health emergency declared under section 319.\" This amendment removes the requirement for an FDA authorization and extends PREP Act authority to these devices during both the COVID-19 emergency period and any future public health emergencies declared pursuant to PHSA Section 319. CBO did not provide an estimate of this provision. Under Chapter 55 of Title 10, U.S. Code , the Department of Defense administers a statutory health entitlement to approximately 9.5 million beneficiaries (i.e., servicemembers, military retirees, and family members). These entitlements are delivered through the Military Health System (MHS), which offers health care services in military hospitals and clinicsâknown as military treatment facilitiesâand through civilian health care providers participating in TRICARE. With the exception of active duty servicemembers, MHS beneficiaries may have a choice of TRICARE plan options depending on their status and geographic location. Each plan option has different beneficiary cost-sharing features, including annual enrollment fees, deductibles, copayments, and an annual catastrophic cap. FFCRA requires the Secretary of Defense to waive any TRICARE cost-sharing requirements related to COVID-19 testing, administration of the test, and related items and services provided during an associated health care office, urgent care, or emergency department visits during the emergency period (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). All veterans enrolled in the VA health care system are eligible for a standard medical package that includes laboratory services. Currently, some veterans are required to pay copayments for medical services and outpatient medications related to the treatment of a nonservice-connected condition. Any health service or medication provided in connection to the treatment of a service-connected condition or disability is always furnished without cost sharing. In addition, the VA does not charge copayments for preventive screenings, such as those for infectious diseases; cancers; heart and vascular diseases; mental health conditions and substance abuse; metabolic, obstetric, and gynecological conditions; and vision disorders, as well as regular recommended immunizations. Generally, laboratory services are also expressly exempt from copayment requirements. FFCRA requires the VA Secretary to waive any copayment or other cost-sharing requirements related to COVID-19 testing, administration of the test, and related items and services for visits during the emergency period (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). The FEHB Program provides health insurance to federal employees, retirees, and their dependents. Cost-sharing requirements (e.g., deductibles, co-payments, and coinsurance amounts) vary by plans participating in the FEHB Program. For some services, such as the preventive care services outlined in the ACA, plans are not allowed to impose cost sharing. FFCRA requires that no federal civil servants enrolled in a health benefits plan or FEHB enrollees may be required to pay a copayment or other cost sharing related to COVID-19 testing, administration of the test, related items and services for visits during the emergency period (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). IHS provides health care to eligible American Indians/Alaska Natives either directly or through facilities and programs operated by Indian tribes or tribal organizations through self-determination contracts and self-governance compacts authorized in the Indian Self-Determination and Education Assistance Act (ISDEAA). IHS also provides services to urban Indians through grants or contracts to Urban Indian Organizations (UIOs). The services provided vary by facility, and IHS does not offer a standard benefit package, nor is it required to cover certain services that its beneficiaries may receive at facilities outside of IHS. When services are not available at an IHS facility, the IHS facilities may authorize payment through the Purchased Referred Care Program (PRC). Generally, PRC requires prior approval except in cases of emergency. PRC funds are limited, and as such, not all PRC claims are authorized and PRC is not available to UIOs. To be authorized, claims must meet medical priority levels, individuals must not be eligible for another source of coverage (e.g., Medicaid or private health insurance), and individuals must live in certain geographic areas. FFCRA requires IHS to pay for the cost of COVID-19 testing and related items and services, as described in Section 6001(a), without any cost-sharing requirements, from the date of enactment (i.e., March 18, 2020) throughout the emergency period (see the sections \" Definitions of COVID-19 Testing and Related Services \" and \" Duration of Emergency Period \"). This requirement applies to any Indian receiving services through the IHS including through UIOs. It also specifies that the requirement to waive cost-sharing requirements applies regardless of whether the testing and related services were authorized through PRC. Medicaid is jointly financed by the federal government and the states. The federal government's share of a state's expenditures for most Medicaid services is called the federal medical assistance percentage (FMAP) rate, which varies by state and is designed so that the federal government pays a larger portion of Medicaid costs in states with lower per capita incomes relative to the national average (and vice versa for states with higher per capita incomes). Exceptions to the regular FMAP rate have been made for certain states, situations, populations, providers, and services. In the past, there were two temporary FMAP exceptions to provide states with fiscal relief due to recessions. They were provided through the Jobs and Growth Tax Relief Reconciliation Act of 2003 (JRTRRA, P.L. 108-27 ) and the American Recovery and Reinvestment Act of 2009 (ARRA, P.L. 111-5 ). To be eligible for both of these temporary FMAP increases, states had to abide by some requirements. These requirements varied in the two FMAP increases, but for both increases, states were required to maintain Medicaid \"eligibility standards, methodologies, and procedures\" and ensure that local governments did not pay a larger percentage of the state's nonfederal Medicaid expenditures than otherwise would have been required. FFCRA provides an increase to the FMAP rate for all states, the District of Columbia, and the territories of 6.2 percentage points for each calendar quarter occurring during the period beginning on the first day of the emergency period (i.e., January 1, 2020) and ending on the last day of the calendar quarter in which the last day of the public health emergency period ends (see \" Duration of Emergency Period \"). States, the District of Columbia, and the territories will not receive this FMAP rate increase if (1) the state's Medicaid \"eligibility standards, methodologies, or procedures\" are more restrictive than what was in effect on January 1, 2020; (2) the amount of premiums imposed by the state exceeds the amount as of January 1, 2020; (3) the state does not maintain eligibility for individuals enrolled in Medicaid on the date of enactment (i.e., March 18, 2020) or for individuals who enroll during the emergency period through the end of the month in which the emergency period ends (unless the individual requests a voluntary termination of eligibility or the individual ceases to be a resident of the state); or (4) the state does not provide coverage (without the imposition of cost sharing) for any testing services and treatments for COVID-19 (including vaccines, specialized equipment, and therapies). FFCRA adds another condition for the FMAP rate increase. Specifically, states, the District of Columbia, and the territories cannot require local governments to fund a larger percentage of the state's nonfederal Medicaid expenditures for the Medicaid state plan or Medicaid disproportionate share hospital (DSH) payments than what was required on March 11, 2020. CBO preliminarily estimates that Section 6008 will increase direct spending by about $50.0 billion over the FY2020-FY2022 period. Medicaid financing for the territories (i.e., America Samoa, Commonwealth of the Northern Mariana Islands, Guam, Puerto Rico, and the U.S. Virgin Islands) is different than the financing for the 50 states and the District of Columbia. Federal Medicaid funding to the states and the District of Columbia is open-ended, but the Medicaid programs in the territories are subject to annual federal capped funding. Federal Medicaid funding for the territories comes from different sources. The permanent source of federal Medicaid funding for the territories is the annual capped funding. Currently, the Medicaid annual capped funding for the territories is supplemented by additional funding for FY2020 and FY2021 that was provided through the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). FFCRA increases the additional funding available for each territory for FY2020 and FY2021. The aggregate additional funding for the territories increases from $3.0 billion to $3.1 billion for FY2020 and $3.1 billion to $3.2 billion for FY2021. CBO preliminarily estimates that Section 6009 increases the allotment amount, and thus direct spending, by $204 million over the FY2020-FY2021 period. Medicare coverage under Part B (fee-for-service) for telehealth services is defined under SSA Sec. 1834(m), which places certain conditions on such care including who can furnish and be paid for the service, where the patient is located (the originating site), where the physician is located (the distant site), and the types of services that are covered. Recent legislation has modified some of the conditions under which telehealth services may be furnished under Medicare. The Coronavirus Preparedness and Response Supplemental Appropriations Act ( P.L. 116-123 ), Division B, Sec. 102, added certain Medicare telehealth restrictions to the list of applicable conditions for which the Secretary could temporarily waive or modify program requirements or regulations during the COVID-19 emergency period. (See \" Duration of Emergency Period \".) The provision also defined a qualified telehealth provider, requiring a prior relationship within the past three years between the patient and the provider under Medicare. FFCRA expands the definition of a qualified provider to include those who had provider-patient relationships within the past three years outside of Medicare. Below is a list of the health care provisions in FFCRA with the name and contact information for the CRS expert on that provision. In some cases, more than one expert contributed to a section, in which case their topics of expertise are also included. ", "summary": "The global pandemic of Coronavirus Disease 2019 (COVID-19) is affecting communities around the world and throughout the United States, with case counts growing daily. Containment and mitigation efforts by federal, state, and local governments have been undertaken to \"flatten the curve\"âthat is, to slow widespread transmission that could overwhelm the nation's health care system. The Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ) was enacted on March 18, 2020. It is the second of three comprehensive laws enacted in March specifically to support the response to the pandemic. The FFCRA, among other things, increases appropriations to the Department of Defense, the Indian Health Service, the Department of Health and Human Services Public Health and Social Services Emergency Fund, and the Veterans Health Administration for testing and ancillary services associated with the SARS-Co V-2 virus, that virus that causes COVID-19 disease. Beginning on the date of enactment through any portion of the COVID-19 public health emergency (declared pursuant to Section 319 of the Public Health Service Act), the FFCRA provides payment for or requires coverage of testing for the COVID-19 virus, and items and services associated with such testing, such as supplies and office visits, without any cost sharing, for individuals who are covered under Medicare, including Medicare Advantage, traditional Medicaid, CHIP, TRICARE, Veterans healthcare, the Federal Employees Health Benefits (FEHB) Program, most types of private health insurance plans, the Indian Health Service, and individuals who are uninsured (as defined under FFCRA). It prohibits private health insurance plans and Medicare Advantage plans from employing utilization management tools, such as prior authorization, for the COVID-19 test, or the visit to furnish it. In addition, FFCRA provides for an increase to all states, the District of Columbia, and territories in the share of Medicaid expenditures financed by the federal government, subject to specific requirements. It provides additional Medicaid funding to territories. FFCRA modifies requirements related to waiving certain Medicare telehealth restrictions during the emergency. Finally, FFCRA waives liability, with a narrow exception, for manufacturers, distributors, or providers of specified respiratory protective devices used for COVID-19 response.", "document_type": "crs"}
{"report": "The site of the ancient Bronze Age civilization of Dilmun, Bahrain was a trade hub linking Mesopotamia and the Indus valley until a drop in trade from India caused the Dilmun civilization to decline around 2,000 B.C. The inhabitants of Bahrain converted to Islam in the 7 th century. Bahrain subsequently fell under the control of Islamic caliphates based in Damascus, then Baghdad, and later Persian, Omani, and Portuguese forces. The Al Khalifa family, which is Sunni Muslim and generally not as religiously conservative as the leaders of neighboring Saudi Arabia, has ruled Bahrain since 1783. That year, the family, a branch of the Bani Utbah tribe, left the Saudi peninsula and captured a Persian garrison controlling the island. In 1830, the ruling family signed a treaty establishing Bahrain as a protectorate of Britain, which was then the dominant power in the Persian Gulf. In the 1930s, Reza Shah Pahlavi of Iran unsuccessfully sought to deny Bahrain the right to grant oil concessions to the United States and Britain. As Britain reduced its military presence in the Gulf in 1968, Bahrain and the other smaller Persian Gulf emirates (principalities) sought a permanent status. A 1970 U.N. survey (some refer to it as a \"referendum\") determined that Bahrain's inhabitants did not want to join with Iran, a finding that was endorsed by U.N. Security Council Resolution 278 and recognized formally by Iran's parliament. Bahrain negotiated with eight other Persian Gulf emirates during 1970-1971 on federating with them, but Bahrain and Qatar each decided to become independent, and Bahrain became independent on August 15, 1971. The seven other emirates formed the United Arab Emirates (UAE). Bahrain is led by King Hamad bin Isa Al Khalifa (69 years old, born January 1950), who succeeded his father, Shaykh Isa bin Salman Al Khalifa, upon his death in 1999. Educated at Sandhurst Military Academy in Britain, King Hamad was previously commander of the Bahraini Defense Forces (BDF). The king is considered to be a proponent of accommodation with Bahrain's Shias, who constitute a majority of the citizenry but many of whom have long asserted they are treated as \"second class citizens,\" deprived of political power and of a fair share of the nation's economic wealth. About 25% of the citizen population is age 14 or younger. Within the upper echelons of the ruling family, the most active proponent of accommodation with the Shia opposition is the king's son and designated successor, the U.S.- and U.K.-educated Crown Prince Shaykh Salman bin Hamad, who is about 50 years old. He and his allies, including Deputy Prime Minister Muhammad bin Mubarak Al Khalifa and Foreign Minister Khalid bin Ahmad bin Muhammad Al Khalifa, assert that further reforms could calm Bahrain's internal strife. The Crown Prince and his faction were strengthened by his appointment in 2013 to a newly created position of First Deputy Prime Minister, staffed with young, well-educated reformists. A younger son of the king, Shaykh Nasser bin Hamad Al Khalifa, who is about 35 years old, could potentially succeed King Hamad should Salman step aside. The Crown Prince's wife, Shaykha Hala, passed away in June 2018. The \"anti-reform\" faction—who assert that concessions to the Shia majority cause it to increase its political demands—is led by the King's uncle (the brother of the late Amir Isa), Prime Minister Khalifa bin Salman Al Khalifa, who has been in position since Bahrain's independence in 1971. He is about 82 years old but still active, and the King is likely unwilling to risk unrest within the ruling family by removing him. The Prime Minister's allies include Minister of the Royal Court Khalid bin Ahmad bin Salman Al Khalifa and his brother, BDF Commander Khalifa bin Ahmad Al Khalifa. These brothers are known as \"Khawalids,\" hailing from a branch of the ruling family traced to a Khalid bin Ali Al Khalifa, with like-minded allies throughout the security and intelligence services and the judiciary. In September 2013, Bahrain appointed BDF Lieutenant Colonel Abdullah bin Muhammad bin Rashid Al Khalifa as Ambassador to the United States. The king, working through the Prime Minister and the cabinet, has broad powers, including appointing all ministers and judges and amending the constitution. Al Khalifa family members hold 12 out of 26 cabinet posts, including the ministries of defense, interior (internal security), and foreign affairs. Typical Bahrain cabinets include five or six Shia ministers. Upon taking office in 1999, Hamad assumed the title of king—a title that implies more accountability than the former title \"Amir.\" A public referendum on February 14, 2001 adopted a \"National Action Charter,\" provisions of which were incorporated into a new constitution issued by the King in 2002. However, many Shias and reform-minded Sunnis criticized the government for not putting the new constitution to a public ratification vote and for deviating from the 1973 constitution by establishing an all-appointed Shura (consultative) Council of equal size (40 seats each) of the elected Council of Representatives (COR). Together, these bodies constitute the National Assembly. The government has tended to appoint generally more educated, pro-Western, and progovernment members to the Shura Council. There is no quota for women in the body. The Assembly only partially checks government power, despite constitutional amendments of May 2012 that gave the body greater authority. The amendments declared the elected COR as the presiding chamber of the Assembly, enhancing its authority on issues on which the two chambers disagree. The National Assembly does not have the power to confirm individual cabinet appointments, but as of 2012, it has had the power to reject the government's four-year work plan—and therefore the whole cabinet. The COR has always had the power to remove individual ministers through a vote of no-confidence (by two-thirds majority). The COR can also, by a two-thirds majority, declare \"non-cooperation\" with the Prime Minister, but the king rules on whether to dismiss the Prime Minister or disband the COR. Either chamber of the National Assembly can originate legislation but enactment into law requires concurrence by the King. Prior to the May 2012 constitutional amendments, only the COR could originate legislation. The king's \"veto\" can be overridden by a two-thirds majority vote of both chambers. A 2012 decree gives the National Assembly the ability to recommend constitutional amendments, which are vetted by a \"Legislation and Legal Opinion Commission\" before consideration by the king. The adoption of the National Charter and other early reforms instituted by King Hamad, although still short of the Shia majority's expectations, were more extensive than those made by his father, Amir Isa. Amir Isa's most significant reform was his establishment in late 1992 of a 30-member all-appointed Consultative Council, whose mandate was limited to commenting on government-proposed laws. In June 1996, he expanded it to 40 members. However, that body did not satisfy broad demands for the restoration of the elected national assembly that was established under the 1973 constitution but abolished in August 1975 because of Sunni-Shia tensions. Amir Isa's refusal to restore an elected Assembly was at least partly responsible for sparking daily Shia-led antigovernment violence during 1994-1998. COR elections have been held every four years since 2002, each time generating substantial tension over perceived government efforts to deny Shias a majority in the COR. The Shia opposition has sought, unsuccessfully to date, to establish election processes and district boundaries that would allow them to translate their numbers into political strength. If no candidate in a district wins more than 50% in the first round, a runoff is held one week later. Political parties are banned, but factions organize as functionally equivalent \"political societies\": Wifaq (Accord National Islamic Society) is the most prominent Shia political society. Its officials have, at times, engaged with the government in and outside of formal \"national dialogues\" since the 2011 uprising began. Wifaq' s leaders are Secretary-General and Shia cleric Shaykh Ali al-Salman and his deputy Khalil al-Marzuq. Shaykh Salman remains jailed. Another top figure in the faction is the 79-year-old Shia cleric Isa Qasim, whose citizenship was revoked on June 20, 2016. In 2016, Bahraini courts approved government requests to dissolve Wifaq entirely and to seize and auction off its assets. W if aq allies include the National Democratic Action Society, the National Democratic Assembly, the Democratic Progressive Tribune, and Al Ekhaa. Al Haq (Movement of Freedom and Democracy), a small Shia faction, is outlawed because of its calls for outright change of regime and has boycotted all the COR elections. Its key leaders, Dr. Abduljalil Alsingace and Hassan Mushaima, have been imprisoned since the uprising. The Bahrain Islamic Action Society and Amal. Two other small Shia factions linked to the the Islamic Front for the Liberation of Bahrain (IFLB) - a party linked to alleged Iran-backed plots to overthrow Bahrain's government in the 1980s and 1990s – are outlawed. Amal's leader, Shaykh Muhammad Ali al-Mafoodh, has been in prison since 2011. Waad (\"promise\") is a secular opposition group that includes both Sunnis and Shias. Its former leader, Ibrahim Sharif, has been repeatedly arrested, released, and rearrested. Its current leader is Sami Fuad Sayedi. On May 31, 2017, the High Civil Court approved a government request to dissolve it. Sunni Islamist s . Among the prominent Sunni factions are Minbar (Arabic for \"platform\"), an offshoot of the Muslim Brotherhood, and Al Asala , which is a harder-line \"Salafist\" political society. Smaller Sunni Islamist factions include Al Saff , the Islamic Shura Society , and the Al Wasat Al Arabi Islamic Society . In June 2011, a non-Islamist, generally progovernment Sunni political coalition—the National Unity Assembly (NUA) — was formed as a response to the uprising. In several elections held during 2002-2010, which are generally held in the fall of the year they are held, tensions between the Shia majority and the regime escalated. October 2002 . In the first elections under the 2002 constitution, Wifaq and other Shia political groups boycotted on the grounds that establishing an elected COR and an appointed Shura Council of the same size diluted popular will. There were 170 candidates, including 8 women. Sunnis won two-thirds of the 40 COR seats, and none of the women was elected. November 2006. Sunni-Shia tensions escalated in advance of the COR and municipal elections amid a government adviser's revelations that the government had adjusted election districts to favor Sunni candidates and had issued passports to Sunnis to increase the Sunni vote. Wifaq participated, helping lift turnout to 72%, and the faction won 17 seats (virtually all it contested) to become the largest COR bloc. Sunnis won the remaining 23 seats, of which eight were secular and 15 were Islamists. One woman, who ran unopposed, was elected (out of 18 women candidates). The King appointed a Shura Council with 20 Shias, 19 Sunnis, one Christian, and nine women. A Wifaq supporter was subsequently appointed minister of state for foreign affairs. October 2010 . Even though oppositionists again accused the government of gerrymandering to favor Sunnis, and despite the arrest of 23 Shia leaders a month before the election, Wifaq participated. Of the 200 candidates, six were women. Turnout was about 67%. The election increased Wifaq's representation to 18 seats, reduced Sunni Islamists to five seats from 15; and greatly increased the number of Sunni independents to 17 seats (from nine). The one female incumbent was reelected. The king reappointed 30 of the 40 Shura Council incumbents. Of the total membership, 19 were Shias, including the speaker. Four were women, of which one was Jewish and one was Christian. The aspirations of Bahraini Shias were demonstrated as unsatisfied when a major uprising began on February 14, 2011, following the toppling of Egypt's President Hosni Mubarak. After a few days of confrontations with security forces, mostly Shia demonstrators converged on the interior of a major traffic circle (\"Pearl Roundabout\"). The unrest escalated on February 17-18, 2011, when security forces using rubber bullets and tear gas killed four demonstrators. All 18 Wifaq deputies in the COR resigned. Following large demonstrations in late February, the Crown Prince invited protester representatives to formal dialogue, many demonstrators were released, and two Al Khalifa family members were dropped from the cabinet. In March 2011, the Crown Prince advanced a \"seven principles\" proposal for a national dialogue that would agree on a \"parliament with full authority\"; a \"government that meets the will of the people\"; fair voting districts; and several other measures. Protest leaders welcomed dialogue but asserted that the seven principles fell short of their demands for a constitutional monarchy in which the Prime Minister and cabinet are selected by the fully elected parliament. They also demanded ending gerrymandering of election districts to favor Sunnis, and more jobs and economic opportunities—demands encapsulated in the October 2011 \"Manama Document\" unveiled by W ifaq and Waad . On March 13, 2011, protesters blockaded the financial district of Manama, triggering the Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, Bahrain, UAE, Qatar, and Oman) to send forces into Bahrain on March 14, 2011. The GCC's joint Peninsula Shield force, including 1,200 Saudi armored forces and 600 UAE police, took up positions at key locations and Kuwait sent naval forces to help secure Bahrain's maritime borders. On March 15, the King declared a three-month state of emergency. GCC-backed security forces cleared demonstrators from Pearl Roundabout and demolished the Pearl Monument on March 18. The king ended the state of emergency as of June 1, and the vast bulk of the GCC force departed in June 2011, with some UAE police and other GCC forces remaining. On June 29, 2011, as a gesture toward the opposition and international critics, the king named a five-person \"Bahrain Independent Commission of Inquiry\" (BICI), headed by international legal expert Dr. Cherif Bassiouni, to investigate the government response to the unrest—and not the broader sources of the unrest. The 500+ page BICI report, released on November 23, 2011, provided support for the narratives of both sides as well as recommendations. It stated that there was \"systematic\" and \"deliberate\" use of excessive force, including torture and forced confessions, against protesters; the opposition increased its demands as the uprising progressed; and the government did not provide evidence to link Iran to the unrest. The report contained 26 recommendations to hold accountable those government personnel responsible for abuses during the uprising. King Hamad promised full implementation of all recommendations. On November 26, 2011, the king established a 19-member National Commission to oversee implementation of the recommendations, chaired by the Shura Council Chairman (a Shia). A \"Follow-Up Unit\" was established by the Ministry of Justice. Bahrain Government . Bahrain officials assert that the government has fully implemented the vast majority of the 26 BICI recommendations. However, other assessments broadly agree that Bahrain has only partially implemented those recommendations that address prevention of torture, provision of legal counsel, allowing free access to media, holding security officials accountable, or integrating Shias into the security services. There appears to be consensus that the government has rebuilt almost all of the 53 Shia religious sites demolished in 2011. State Department . The FY2013 defense authorization act ( P.L. 112-239 ) directed the Secretary of State to report to Congress on Bahrain's implementation of the BICI recommendations, as did the FY2016 Consolidated Appropriation ( P.L. 114-113 ). The latest such report, dated June 21, 2016, indicated that Bahrain's government had: made the office of the inspector general of the Ministry of Interior independent of the ministry's hierarchy; stripped the Bahrain National Security Agency (BNSA) of arrest powers through an amendment to the 2002 decree establishing that agency; provided compensation and other remedies for families of the deceased victims of the government's response to the unrest. About $26 million was budgeted by the government to provide the compensation; ensured that dismissed employees were not dismissed because of the exercise of their right to freedom of expression, association, or assembly. This assessment was based on data that almost all of 2,700+ workers who had been fired for participating in the unrest had been rehired; and developed programs to promote religious, political, and other forms of tolerance and promotion of human rights and the rule of law. The report recommended that the government needs to allow oversight agencies greater independence, and implement recommendations on freedom of expression. Outside Assessments . Reports and testimony by the staff of the Project on Middle East Democracy (POMED) have asserted that the government has fully implemented only three BICI recommendations, partially implemented about half of them, and not implemented at all at least six. The group characterized the June 2016 State Department report referenced above as \"a real effort to pull punches and avoid clear evaluations of progress, in order to avoid antagonizing the Bahraini government.\" A November 2015 report by Americans for Democracy and Human Rights in Bahrain asserted that the government had only fully implemented two of the BICI recommendations, and that that the issues that caused the uprising had not been addressed. BICI-Related U.S. Legislation . In the 114 th Congress, S. 2009 and H.R. 3445 would have prohibited specific U.S. weapons and crowd control equipment sales to Bahrain (tear gas, small arms, light weapons and ammunitions for same, Humvees, and \"other\" crowd control items) until the State Department certified that Bahrain has fully implemented all BICI recommendations. A Senate-passed State Department authorization bill, S. 1635 , would have required another State Department assessment of implementation of the BICI recommendations, and the effect of such findings on the U.S. defense posture in the Gulf. The provision was not included in P.L. 114-323 . The BICI process created conditions for a government-opposition \"National Dialogue\" process, which was inaugurated on July 2, 2011. Chaired by the COR speaker, about 300 delegates participated, of which 40-50 were members of the Shia opposition (including five W ifaq members). The weeks-long dialogue addressed political, economic, social, and human rights issues, but the detention of senior oppositionists caused Wifaq to exit the talks on July 18, 2011. The dialogue concluded with the following consensus recommendations, which were endorsed by the government on July 29, 2011: an elected parliament (lower house) with expanded powers, including to confirm a nominated cabinet. In addition, the overall chairmanship of the National Assembly should be exercised by the elected COR, not the Shura Council; a government \"reflecting the will of the people\"; \"fairly\" demarcated electoral boundaries; reworking of laws on naturalization and citizenship; combating financial and administrative corruption; and efforts to reduce sectarian divisions. Despite the opposition's assertions that the consensus dialogue recommendations did not resolve core issues, the National Assembly adopted significant elements of them in January 2012 and the King signed them into law on May 3, 2012, as constitutional amendments that imposed limitations on the power of the king to appoint the members of the Shura Council, and a requirement that he consult the heads of the two chambers of the National Assembly before dissolving the COR; gave either chamber of the National Assembly the ability to draft legislation or constitutional amendments; changed the overall chair of the National Assembly to the speaker of the elected COR instead of the chairman of the Shura Council; and gave the COR the ability to veto the government's four-year work plan—essentially an ability to veto the nomination of the entire cabinet. This was an expansion of previous powers to vote no confidence against individual ministers. Second National Dialogue . In January 2013, Wifaq and five allied parties accepted the King's call to restart political dialogue. The second dialogue began on February 10, 2013, consisting of twice per week meetings attended by the Minister of Justice (an Al Khalifa family member) and two other ministers, eight opposition representatives ( Wifaq and allied parties), eight representatives of progovernment organizations, and five members of the National Assembly. The talks quickly stalled over opposition insistence that consensus recommendations be put to a public referendum, while the government insisted that agreements be enacted by the National Assembly. The opposition also demanded that the dialogue include representatives of the King rather than ministers. In September 2013, the opposition began boycotting the talks, citing the arrest of Wifaq 's deputy chief, and the dialogue was suspended on January 8, 2014. The Crown Prince sought to revive negotiations by meeting with Wifaq leaders in January 2014, despite the fact that the two top leaders were charged for their roles in the uprising. The meeting addressed Wifaq 's demand that political dialogue be conducted with senior Al Khalifa members. In September 2014, the Crown Prince issued a five-point \"framework\" for a new dialogue including (1) redefining electoral districts; (2) revising the process for appointing the Shura Council; (3) giving the elected COR new powers to approve or reject the formation of a new cabinet; (4) having international organizations work Bahrain's judiciary; and (5) introducing new codes of conduct for security forces. Opposition political societies rejected the proposals as not satisfying a core demand for the selection of a prime minister by an elected COR, and no further national dialogue has convened to date. Unrest continues, although at far less intensity than in 2011, and observers have accused the government of backsliding in its implementation of the BICI recommendations and other human rights reforms. In 2017, the King signed a National Assembly bill amending the constitution to allow military courts the right to try civilians accused of terrorism, and the government returned arrest powers to the BNSA (see above). As noted below, the government also has stepped up citizenship revocations and expulsions and continues to incarcerate opposition leaders. Each February 14 anniversary of the uprising has been marked by demonstrations. The government and the opposition have, at times, discussed confidence-building measures such as appointments of oppositionists to the cabinet. The King appears to have ruled out replacing the Prime Minister even though some oppositionists have suggested they would accept a more moderate ruling family member or a Sunni non-royal in that role. Hardline Sunnis within and outside the government, reportedly with the support of Saudi officials, continue to urge the ruling family to refuse compromise. In an effort to present an image of \"normalization\" of the domestic political situation, the government urged the opposition to participate in the November 22, 2014, COR election. However, the government reduced the number of electoral districts to four, from five, further reducing the chances that Shias would win a majority of COR seats. Wifaq and its allies boycotted, reducing the turnout to about 50% (Bahrain official figures). There was little violence. The seats were mostly won by independent candidates, suggesting that voters sought to reduce polarization. Only three candidates of the Sunni Islamist political societies won, and none of the 10 pro-government Al Fatih coalition candidates was elected. The 14 Shias elected were independents, and Shias were the deputy COR speaker and the chairman of the Shura Council. Observers sought to gauge the state of Bahrain's politics from the 2018 COR elections, held on November 24, 2018, with a runoff on December 1, 2018, Municipal council elections were held concurrently. The elections produced significant tensions, and the outcome was widely derided by Bahraini oppositionists and regional and international observers as neither free nor fair. In May 2018, the National Assembly enacted legislation banning dissolved political societies ( Wifaq and Waad ) from participating, and the government decreed that no members of banned parties could run. Yet, in part to try to instill legitimacy to the elections, the government reportedly encouraged Shias to compete as independents. Wifaq members boycotted the vote, but a small Wifaq ally, the Democratic Progressive Tribute, participated. Several Sunni groupings, including the National Unity Assembly (NUA, see above), Minbar, and Asala, competed in order not to cede representation to independent Sunnis. One liberal political society composed of both Shias and Sunnis, the National Action Charter Society ( Mithaq) , competed as well. The final list of candidates included 293 persons, of whom 41 were women—the highest number of women candidates in any Bahrain COR elections. There were 137 candidates for the 30 seats on Bahrain's three municipal councils, of which eight candidates were women. Only nine COR seats were decided on November 24, including victories by two women. Also undecided were 23 municipal council seats. Final results awaited a runoff for the 31 undecided seats (no candidate received a majority) on December 1. The government claimed turnout was very high at 67%, but oppositionists—who widely derided the election as a sham and urged a broad boycott—claimed turnout was only about 30%. Following the December 1 runoff, the government noted that five political societies participated but that 85% of the seats were won by independents. Government officials noted that only five incumbents retained their seats, and that the victories by six women was the highest ever. No breakdown by sect was announced, but the Wi faq boycott virtually ensured that Sunnis constitute a CoR majority. The new COR voted its first female speaker, Fawzia Zainal. Bahrain observers report that the Shia deputy speaker, Abdunabi Salman, is serving as an unofficial envoy to the Shia community, aggregating its grievances and attempting to redress them. A Shura Council was appointed in early December, with roughly the same sect and gender composition as recent Shuras, but the King excluded members of political societies from membership. Aggravating government-opposition tensions is the activity of apparently small but violent underground groups that have periodically attacked security forces with bombs and improvised explosive devices (IEDs). These groups have not targeted civilians, although on at least one occasion civilians have been killed or injured. In April 2015, the government arrested 29 persons for a December 2014 bombing that wounded several police officers. On December 25, 2017, six Bahraini Shias were sentenced to death for allegedly forming a terrorist cell and plotting to assassinate a senior Bahrain military official. On January 1, 2017, 10 detainees who had been convicted of militant activities such as those discussed above broke out of Bahrain's Jaw prison with the help of attackers outside the jail. According to the State Department international terrorism report for 2017, \"Terrorist activity in Bahrain increased in 2017,\" citing Shia militant attacks that the report says killed four police officers in 2017. Mainstream opposition factions deny any connection to underground violent groups, the most active include the following: Al Ashtar Brigades (AAB) . This group, the most well-known of the underground groups, issued its first public statement in April 2013. It has claimed responsibility for about 20 bombings against security personnel, including a March 2014 attack that killed three police officers, including a UAE officer. In January 2017, the government executed three Shias for that attack—the first executions since the 2011 uprising began. On March 17, 2017, the Trump Administration designated two Ashtar Brigades members, one of which is Iran-based, as Specially Designated Global Terrorists (SDGTs) under Executive Order 13224, which blocks U.S.-based property of entities that conduct terrorism. On July 10, 2018, the State Department named the Al Ashtar Brigades as a Foreign Terrorist Organization (FTO) under Section 219 of the Immigration and Nationality Act. The group was also named as an SDGT under E.O. 13224. On August 13, 2018, the Trump Administration designated Qassim Abdullah Ali Ahmad, a purported Al Ashtar leader, as an SDGT. The \"14 February Coalition\" (named for the anniversary of the Bahrain uprising) claims inspiration from antiregime protesters in Egypt in the uprising there in 2011. The group claimed responsibility for an April 14, 2013, explosion in the Financial Harbour district. In September 2013, 50 Shias were sentenced to up to 15 years in prison for alleged involvement in the group. On November 10, 2017, militants allegedly from the group attacked a key pipeline that supplies Saudi oil to the Bahrain Petroleum Company refinery in Sitra, Bahrain. Others: Other groups, using the names Bahrain Liberation Movement, al-Wafaa , the Resistance Brigades, the Mukhtar Brigades, the Basta organization, and the Imam Army, are offshoots of the Al Ashtar Brigades, or separate small cells. In March 2018, authorities arrested 116 persons allegedly part of an armed network supported by the IRGC-QF. In late September 2018, the government charged 169 persons with forming a \"Bahrain Hezbollah\"—a Bahrain version of Lebanese Hezbollah—with Iranian backing. On May 6, 2019, Bahrain's Court of Cassation sentenced 19 al-Wafaa activists varying jail terms for maintaining links to Iran's Islamic Revolutionary Guard Corps (IRGC) and Lebanese Hezbollah. Oppositionists accuse the government of exaggerating Iran's support for these violent groups, but the State Department reports that some Bahraini groups are working with the Islamic Revolutionary Guard Corps-Qods Force (IRGC-QF), which reportedly supplies the militants with weapons. In late 2016, Bahraini authorities uncovered a large warehouse containing equipment, apparently supplied by Iran, suitable to constructing \"explosively-forced projectiles\" (EFPs) such as those Iran-backed Shia militias used against U.S. armor in Iraq during 2004-2011. No EFPs have actually been used in Bahrain, to date. The United States has repeatedly urged Bahraini authorities not to use force against protesters and to release jailed opposition leaders, but has not at any time called for the Al Khalifa regime to step down, asserting that the government has tried to address many opposition grievances. High-level U.S. engagement with Bahraini leaders has continued and no sanctions have been imposed on any Bahraini officials. The Obama Administration withheld or conditioned some arms sales to Bahrain, but U.S. military cooperation with Bahrain continued without interruption. In a September 21, 2011, speech to the U.N. General Assembly, President Obama said the following: In Bahrain, steps have been taken toward reform and accountability. We're pleased with that, but more is required. America is a close friend of Bahrain, and we will continue to call on the government and the main opposition bloc—the Wifaq —to pursue a meaningful dialogue that brings peaceful change that is responsive to the people. We believe the patriotism that binds Bahrainis together must be more powerful than the sectarian forces that would tear them apart. It will be hard, but it is possible. Then-Secretary of State Kerry stated upon the July 17, 2016, dissolution of Wifaq that This ruling is the latest in a series of disconcerting steps in Bahrain.... These actions are inconsistent with U.S. interests and strain our partnership with Bahrain.... We call on the Government of Bahrain to reverse these and other recent measures, return urgently to the path of reconciliation, and work collectively to address the aspirations of all Bahrainis. Critics said that the Obama Administration was insufficiently critical of Bahrain's leaders, citing then-Secretary of State Clinton's comments in Bahrain on December 3, 2010, referring to the October 2010 elections, saying \"I am impressed by the commitment that the government has to the democratic path that Bahrain is walking on.... \" On July 7, 2014, the government ordered then-Assistant Secretary of State for Democracy, Human Rights, and Labor (DRL) Tom Malinowski out of Bahrain for meeting with Wifaq leader Shaykh Salman. Then-Secretary Kerry, in a phone call to Bahrain's Foreign Minister, called that expulsion \"unacceptable.\" A July 18, 2014, letter to King Hamad, signed by 18 Members of the House of Representatives, called on the king to invite Assistant Secretary Malinowski back. Bahrain reversed its position, and he and Assistant Secretary of State for the Near East Anne Patterson visited Bahrain in December 2014. As part of its stated goal of pressuring Iran, the Trump Administration has downplayed U.S. concerns about Bahrain's human rights record, dropped conditions on the approval of new sales to Bahrain's military, and imposed new U.S. sanctions on Bahrain militant groups (discussed above). In May 2017, during his visit to the region, President Trump assured King Hamad that U.S.-Bahrain relations would be free of the \"strain\" that characterized U.S.-Bahrain relations on human rights issues during the Obama Administration. Crown Prince Salman visited Washington, DC, in November 2017 and discussed with President Trump a wide range of regional and bilateral issues, including defense and economic relations. In 2017, the State Department criticized the dissolution of Waad as unhelpful to political reconciliation. Yet, Secretary of State Michael Pompeo was criticized by some U.S. human rights organizations for not publicly raising human rights issues during his January 2019 visit to Bahrain and meeting with King Hamad; the trip was part of a visit to the GCC states to promote unity among them and their cooperation with the United States against Iran. Bahrain opposition figures have expressed concerns that the policy could cause the opposition to draw closer to Iran. The United States has funded programs to accelerate political reform in Bahrain and empower its political societies since long before the uprising. The \"Middle East Partnership Initiative (MEPI)\" began funding prodemocracy programs in Bahrain in 2003, including for an American Bar Association (ABA) program to support the Ministry of Justice's Judicial and Legal Studies Institute (JLSI) specialized training for judges, lawyers, law schools, and Bahrain's bar association. The ABA also provided technical assistance to help Bahrain implement the BICI recommendations, including legislation on fair trial standards. MEPI funds are also used to train Bahraini journalists. The National Democratic Institute (NDI) had received some U.S. funds for its programs to enhance the capabilities of Bahrain's National Assembly. For example, in FY2016, the United States provided about $350,000 for democracy and human rights promotion programs in Bahrain, of which about $250,000 was provided through NDI. The bulk of worldwide criticism of Bahrain's human rights practices focuses on the government response to the unrest, including relative lack of accountability of security forces, suppression of free expression, and treatment of prisoners. The government, as have several of the other Gulf states, has increasingly used laws allowing jail sentences for \"insulting the king\" to silence opponents. However, State Department human rights reports and outside assessments note additional problems that might be unrelated to the unrest. Several organizations are chartered as human rights groups, although the government characterizes most of them and their leaders as advocates for or members of the opposition. The most prominent are the Bahrain Human Rights Society (the primary licensed human rights organization), the Bahrain Transparency Society, and the Bahrain Center for Human Rights (BCHR, a U.S. grantee in FY2016) and the Bahrain Youth Society for Human Rights (BYSHR), which was officially dissolved but remains active informally. Some of the leaders of these organizations have been repeatedly arrested. In 2013, in line with the BICI report, the king issued a decree reestablishing the \"National Institution for Human Rights\" (NIHR) to investigate human rights violations. It issues annual reports. In October 2016, King Hamad issued a decree enhancing the NIHR's powers, including the ability to make unannounced visits to detention centers and to request formal responses by the various ministries to NIHR recommendations. There is also a quasigovernmental Commission on Prisoner and Detainee Rights (PDRC). Bahrain has drawn increasing attention from U.N. human rights bodies and other governments. Each March since the uprising began, the U.N. Human Rights Council has issued statements condemning the government's human rights abuses. The United States, Britain, and eight other EU countries have sometimes opposed these statements on the grounds that the government has sought to address international concerns on this issue. Opposition activists reportedly have requested the appointment of a U.N. Special Rapporteur on human rights in Bahrain and the establishment of a formal U.N. office in Bahrain that would monitor human rights practices there. These steps have not been taken. Bahrain has often denied entry to international human rights researchers and activists, including from U.S. organizations such as Human Rights Watch. Experts and other observers have long perceived Bahrain as advancing women's rights. The Council of Ministers (cabinet) regularly has at least one, and often several, female ministers. The number of women in the National Assembly is provided in Table 1 and, as noted, the CoR elected its first female CoR speaker after the 2018 elections. Still, traditional customs and some laws tend to limit women's rights in practice. Women can drive, own and inherit property, and initiate divorce cases, but religious courts may refuse a woman's divorce request. A woman cannot transmit nationality to her spouse or children. Some prominent Bahraini women, backed by the wife of the King and the \"Supreme Council for Women,\" have campaigned for a codified family law. Other women's rights organizations in Bahrain include the Bahrain Women's Union, the Bahrain Women's Association, and the Young Ladies Association. The State Department's recent reports on international religious freedom focus extensively on abuses related to the unrest, asserting that the government discriminates against the Shia majority and Shia clergy. In 2014, the Ministry of Justice and Islamic Affairs, which regulates Islamic affairs, dissolved the Islamic Ulema Council, the main assembly of Shia clerics in Bahrain, for allegedly engaging in illegal political activity. A Court of Cassation upheld that dissolution in April 2015. In June 2016, the king signed an amendment to a 2005 law regulating political societies, banning persons who are active in religious positions from engaging in political activities—an amendment that appeared to be an effort to further weaken Wifaq . On the other hand, the government does offer some financing for Shia seminaries ( hawzas ). In July 2017, Bahrain became the first country in the region to enact a unified personal status law, covering both Shias and Sunnis, and thereby weakening the power of religious courts to regulate matters such as marriage and divorce. The law was enacted despite opposition from Shia legislators who argue that only senior Shia clerics, such as Iraq-based Grand Ayatollah Ali al-Sistani, have the authority to legislate on such matters. According to the recent State Department reports, the government allows freedom of worship for Christians, Jews, and Hindus although the constitution declares Islam the official religion. Non-Muslim groups must register with the Ministry of Social Development to operate and Muslim groups must register with the Ministry of Justice and Islamic Affairs. There are 19 registered non-Muslim religious groups and institutions, including Christian churches of a wide variety of denominations, and Hindu and Sikh groups. The government donated land for the Roman Catholic Vicariate of Northern Arabia to relocate from Kuwait to Bahrain. A small Jewish community of about 36-40 persons—mostly from families of Iraqi Jews who settled in Bahrain in the 19 th century—remains in Bahrain, and apparently does not face any harassment or other difficulty. Some of Bahrain's Jews came from southern Iran. Members of the Baha'i faith, which is declared blasphemous in Iran and Afghanistan, have been discriminated against in Bahrain. However, members of that community can worship openly. Bahrain remains a destination country for migrant workers from South and East Asia, as well as some countries in Africa. Domestic workers are highly vulnerable to forced labor and sexual exploitation because they are largely unprotected under the labor law. The State Department's \"Trafficking in Persons Report\" for 2018 upgraded Bahrain to \"Tier 1,\" from the \"Tier 2\" rating it had for the three previous years. The upgrade was based on an assessment that the government had made \"key achievements\" on this issue in the reporting period, including the first ever conviction of a national for forced labor and the first ever conviction of a complicit government official. In 2014, the Obama Administration waived a mandatory downgrade for Bahrain to Tier 3 after it was assessed for three consecutive years as \"Tier 2: Watch List.\" Bahrain subsequently was assessed as making notable progress on the issue. Regarding the related issue of labor rights, U.S. government reports credit Bahrain with significant labor reforms, particularly a 2002 law granting workers, including noncitizens, the right to form and join unions. The law holds that the right to strike is a legitimate means for workers to defend their rights and interests, but that right is restricted for workers in the oil and gas, education, and health sectors. There are about 50 trade unions in Bahrain, but all unions must join the General Federation of Bahrain Trade Unions (GFBTU). The GFBTU has many Shia members, and during the height of the unrest in 2011, the federation called at least two general strikes to protest use of force against demonstrators. During March-May 2011, employers dismissed almost 5,500 workers from both the private and public sectors, including 25% of the country's union leadership. The government claims that virtually all were subsequently rehired. The State Department has asserted that the government made efforts in 2015 to reinstate workers dismissed or suspended during the period of high unrest. Some U.S. MEPI funds (see above) have been used for AFL-CIO projects with Bahraini labor organizations. The architect of some recent labor reforms is the Labor Market Regulatory Authority (LMRA), which is separate from and considered more forward looking than the Ministry of Labor and Social Development. The LMRA has made strides to dismantle the \"sponsorship system\" that prohibited workers from changing jobs, and has helped institute requirements that every expatriate worker must be provided with health insurance. The LMRA has also instituted public awareness campaigns against trafficking in persons and has established a publicly funded \"labor fund\" to upgrade worker skill levels. Still, the slow payment of wages led hundreds of expatriate workers to protest on several occasions during the year. After mediation by the Ministry of Labor, all back wages were paid by the end of 2018, according to the State Department. Well before the 2011 uprising, Human Rights Watch and other groups asserted that Bahraini authorities were practicing torture, allegations that continue today, including in the State Department human rights report for 2017. A May 13, 2011, hearing of the Tom Lantos Human Rights Commission asserted that torture was being used regularly on those (mostly Shias) arrested in the unrest. The State Department human rights report for 2011 said there were numerous reports of torture during the state of emergency (March-June 2011). Since 2013, the government has not facilitated visits by the U.N. Special Rapporteur on Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment. U.S.-Bahrain ties are long-standing and have deepened over the past several decades. The American Mission Hospital was established in 1903 as the first hospital in what is now Bahrain. A U.S. Embassy opened in Manama, Bahrain's capital, immediately after Bahrain became independent. Hundreds of Bahraini students come to the United States each year to study. The bilateral security relationship dates to the end of World War II, well before Bahrain's independence, and remains central to the U.S. ability to address regional threats such as those posed by Iran and by terrorist movements. There are about 7,000 U.S. military personnel deployed in Bahrain, mostly Navy, implementing various missions discussed below, including against the Islamic State. Bahrain signed a formal Defense Cooperation Agreement (DCA) with the United States in 1991. In March 2018, then-Secretary of Defense James Mattis met with King Hamad and Crown Prince Salman in Bahrain and expressed \"appreciation for Bahrain's continued support of the U.S. military presence in the Kingdom since shortly after World War II.\" Secretary of State Pompeo made similar comments after his January 11, 2019 meeting with King Hamad. As a GCC member, Bahrain also engages in substantial defense cooperation with other GCC states. Bahrain also has formal relations with NATO under a 2004 NATO-GCC \"Istanbul Cooperation Initiative\"(ICI). As do the other GCC members in that forum (Kuwait, UAE, and Qatar), Bahrain has opened a diplomatic mission at NATO headquarters in Brussels. The U.S. Ambassador to Bahrain is Justin Siberell, a career diplomat. The cornerstone of U.S.-Bahrain defense relations is U.S. access to Bahrain's naval facilities. The the United States has had a U.S. naval command presence in Bahrain since 1948: MIDEASTFOR (U.S. Middle East Force); its successor, NAVCENT (naval component of U.S. Central Command); and the U.S. Fifth Fleet (reconstituted in June 1995), have been headquartered at a sprawling facility called \"Naval Support Activity (NSA)-Bahrain.\" It is also home to U.S. Marine Forces Central Command, Destroyer Squadron Fifty, and three Combined Maritime Forces. The \"on-shore\" U.S. command presence in Bahrain was established after the 1991 U.S.-led war against Iraq; prior to that, the U.S. naval headquarters in Bahrain was on a command ship docked and technically \"off shore.\" Some smaller U.S. ships, such as minesweepers, are home-ported there, but the Fifth Fleet consists mostly of ships that are sent to the region on six or seven-month deployments. In 2012-13, the U.S. Navy added to the force homeported there by doubling the number of minesweepers homeported there to eight, sending additional mine-hunting helicopters, and adding five coastal patrol ships. NSA-Bahrain coordinates the operations of over 20 U.S. and allied warships in Combined Task Force (CTF) 151 and 152 that seek to interdict the movement of terrorists, pirates, arms, or weapons of mass destruction (WMD)-related technology and narcotics across the Arabian Sea. Bahrain has taken several turns commanding CTF-152, and it has led an antipiracy task force in Gulf/Arabian Sea waters—operations that are offshoots of Operation Enduring Freedom (OEF) that ousted the Taliban from power in Afghanistan in 2001. The coalition conducts periodic naval exercises, such as mine-sweeping drills, intended at least in part to signal resolve to Iran – and U.S.-GCC naval patrols are being increased as U.S.-Iran tensions increased in May 2019. To further develop the NSA-Bahrain, the U.S. military implemented a $580 million military construction program that ran from 2010 until the end of 2017. The latest construction doubled the size of the facility (to over 150 acres) by integrating the decommissioned Mina (port) Al Salman Pier, leased by the Navy under a 2008 agreement, and added buildings for administration, maintenance, housing, warehousing, and dining. The expansion supports the deployment of additional U.S. coastal patrol ships and the Navy's new littoral combat ship, and the docking of larger U.S. ships. The expansion has also allowed for infrastructure for families of U.S. military personnel, including schools for young children. The United States has spent over $2 billion to improve the facility. Alternatives? Some urge the United States to examine alternatives to NSA-Bahrain on the grounds that the unrest in Bahrain poses threats to U.S. personnel deployed there, or that the Al Khalifa government could fall. The U.S. military has, through social media and other directives, instructed its personnel in Bahrain to avoid any areas where demonstrations are taking place. The enacted FY2016 National Defense Authorization Act did not contain a provision of an earlier version ( H.R. 1735 ) to mandate a Defense Department report on alternative locations for the NSA-Bahrain. But, the Defense Department reportedly has done such contingency planning; that assessment has not been released. Still, continued U.SW. military construction to enhance the NSA would indicate that the Administration has no plans to relocate the facility in the near future. Should there be a decision to relocate the NSA, potential alternatives could include Qatar's New Doha Port, Kuwait's Shuaiba port, and the UAE's Jebel Ali. All three are close U.S. allies, but none has stated a position on whether it would be willing to host such a facility. The alternatives do not provide large U.S. ships with the ease of docking access that Bahrain does, and many of the alternatives share facilities with commercial operations. A separate deep water port in Bahrain, Khalifa bin Salman Port, is one of the few facilities in the Gulf that can accommodate U.S. aircraft carriers and amphibious ships. An aircraft carrier group and surface combatants generally operating in and around the Persian Gulf. In December 2014, Bahrain agreed to allow Britain to establish a naval base in part of the Mina Al Salman pier, and facilities there have been improved to allow Britain's Royal Navy to plan, store equipment, and house military personnel at the location. Also in December 2014, the GCC announced it would establish a joint naval force based in Bahrain to cooperate with the United States and other navies. Shaykh Isa Air Base, improved with about $45 million in U.S. funds, hosts a variety of U.S. aircraft, including F-16s, F-18s, and P-3 surveillance aircraft. About $19 million was spent to construct a U.S. Special Operations Forces facility there. Bahrain was part of the U.S.-led allied coalition that ousted Iraq from Kuwait in 1991, hosting 17,500 U.S. troops and 250 U.S. combat aircraft that participated in the 1991 \"Desert Storm\" offensive against Iraqi forces. Bahraini pilots flew strikes during the war, and Iraq fired nine Scud missiles at Bahrain, of which three hit facilities there. After that war, Bahrain and the United States institutionalized the defense relationship by signing a Defense Cooperation Agreement (DCA) on October 28, 1991, for an initial period of 10 years. It remains in effect. The pact reportedly gives the United States access to Bahrain's air bases, enables the United States to preposition strategic materiel (mostly U.S. Air Force munitions), requires consultations with Bahrain if its security is threatened, and provides for joint exercises and U.S. training of Bahraini forces. It reportedly includes a \"Status of Forces Agreement\" (SOFA) under which U.S. military personnel serving in Bahrain operate under U.S. law. The DCA was the framework for Bahrain's participation in efforts to contain Iraq during the 1990s. Bahrain hosted the U.S.-led Multinational Interdiction Force (MIF) that enforced a U.N. embargo on Iraq during 1991-2003. Bahrain also hosted the U.N. Special Commission (UNSCOM) inspection mission that worked to dismantle Iraq's weapons of mass destruction. U.S. pilots flew combat missions from Bahrain in both Operation Enduring Freedom (OEF) in Afghanistan (after the September 11, 2001, attacks) and Operation Iraqi Freedom (OIF) to oust Saddam Hussein (March 2003). During both operations, Bahrain also deployed its U.S.-supplied frigate warship (the Subha ) to help protect U.S. ships, and it sent ground and air assets to Kuwait in support of OIF. Bahrain and UAE have been the only GCC states to deploy forces to Afghanistan; Bahrain deployed 100 police officers to Afghanistan during 2009-2014. In March 2002, President George W. Bush designated Bahrain a \"major non-NATO ally\" (MNNA) in Presidential Determination 2002-10. The designation qualifies Bahrain to purchase certain U.S. arms, receive excess defense articles (EDA), and engage in defense research cooperation with the United States for which it would not otherwise be eligible. Bahrain's small annual government budget allows for only modest amounts of national funds to be used for purchases of major combat systems. The United States provides a small amount of military assistance that goes toward Bahrain's arms buys from the United States, in order to enhance Bahrain's ability to participate in regional security missions. The government's response to the political unrest caused the Obama Administration to put on hold sales to Bahrain of arms that could easily be used against protesters, primarily those used by the Interior Ministry, as well as to hold up or condition the sale of combat systems such as combat aircraft. The Trump Administration has maintained restrictions on sales of equipment that could be used against protesters, while dropping conditions or holds on sales of most major combat systems. The main recipient of U.S. military assistance is the Bahrain Defense Force (BDF)—Bahrain's regular military force—which totals about 8,000 active duty personnel, of which 2,000 are Bahraini Air Force and Navy personnel. There are another 2,000 personnel in Bahrain's National Guard—a unit that is separate from both the BDF and the Ministry of Interior. The BDF, as well as Bahrain's police forces, are run by Sunni Bahrainis, but supplement their ranks with unknown percentages of paid recruits from Sunni Muslim neighboring countries, including Pakistan, Yemen, Jordan, and elsewhere. Some human rights groups say that BDF equipment, such as Cobra helicopters, has been used against protesters. Most U.S. military assistance to Bahrain is in the form of Foreign Military Financing (FMF), used to help Bahrain buy and maintain U.S.-origin weapons, to enhance interoperability with U.S. forces as well as with other GCC forces, to augment Bahrain's air defenses, and to improve counterterrorism capabilities. In recent years, some FMF funds have been used to build up Bahrain's Special Operations forces and to help the BDF use its U.S.-made Blackhawk helicopters. The Defense Department estimates that about 50% of Bahrain's forces are fully capable of integrating into a U.S.-led coalition. The United States has reduced FMF to Bahrain since the unrest began, in part to try to compel the government to undertake political reforms. The Obama Administration's FY2012 aid request, made at the start of the unrest, included $25 million in FMF for Bahrain, but only $10 million was provided. FMF amounts provided or requested since are depicted in the table below. FY2017 funds were used to support Bahrain's maritime security capacity by assisting the Bahrain Coast Guard and upgrading the Coast Surveillance System that reportedly provides Bahrain and the U.S. Navy a 360-degree field of vision. Some funds are provided under \"Section 1206\" of the National Defense Authorization Act of 2006, P.L. 109-163 . Five Section 1206 programs spanning 2006-2015—totaling almost $65 million—were used to provide coast patrol boats, equip and train Bahrain's special forces and coastal surveillance sites, and fund biometric equipment to help Bahrain detect movement of international terrorists through its territory. The BDF is eligible to receive grant \"excess defense articles\" (EDA), and it has received over $400 million worth of EDA since the program began for Bahrain in 1993. In June 1995, the United States provided 50 M-60A3 tanks to Bahrain as a \"no cost\" five-year lease. Bahrain later received title to the equipment. In July 1997, the United States transferred the FFG-7 \"Perry class\" frigate Subha (see above) as EDA. The Obama Administration supported providing another frigate (an \"extended deck frigate\") as EDA because the Subha is approaching the end of its service life, but Bahrain decided instead to devote U.S. military aid to maintaining the Subha . The transfer of frigate-sized ships as EDA requires legislative enactment. As noted in Table 4 , small amounts of International Military Education and Training funds (IMET) are provided to Bahrain to inculcate principles of civilian control of the military, democracy, and interoperability with U.S. forces. Approximately 100 BDF students attend U.S. military schools each year through the IMET program. A roughly equal number train in the United States under the U.S. Foreign Military Sales program (using FMF). Amounts provided are shown in the table below. About 85% of Bahrain's defense equipment is of U.S.-origin, as discussed below. F-16s and other U.S.-made Aircraft . Since 1998, Bahrain has purchased 22 U.S.-made F-16 Block 40 aircraft. In 2016, Bahrain requested up to 19 new production F-16Vs, with an estimated value of nearly $4 billion. The Obama Administration notified the sale to Congress with the condition that it would not finalize approval until Bahrain improves its human rights record. The Trump Administration dropped that condition, asserting that maintaining the conditionality is not the optimum way to influence Bahrain's policy on its domestic unrest. On September 8, 2017, the Administration notified Congress of a potential sale of 19 F-16Vs at an estimated value of $2.785 billion, and of an upgrade of Bahrain's existing F-16 Block 40s to the F-16V configuration, at an estimated cost of $1.082 billion. The sale process was far along enough to avoid then-Senate Foreign Relations Committee Chairman Bob Corker's July 2017 restriction on providing informal concurrence to arms sales to the GCC states—a restriction dropped by then-Chairman Corker on February 8, 2018. Air-to-Air Missiles. In 1999 and 2009, the United States sold Bahrain Advanced Medium-Range Air-to-Air Missiles (AMRAAMs) to arm the F-16s. In 2012, the Obama Administration approved a sale of additional AMRAAMs. On May 3, 2019, the State Department approved a possible sale of a large variety of munitions, including AMRAAMs and large bombs (GBUs), for its F-16 fleet, at an estimate dvalue of $750 million. A resolution of disapproval for the sale, S.J.Res. 20, was introduced on May 13. Anti-Armor Missiles/Rockets . An August 2000 sale of 30 Army Tactical Missile Systems (ATACMs, a system of short-range ballistic missiles fired from a multiple rocket launcher), valued at about $70 million, included an agreement for joint U.S.-Bahraini control of the weapon. That arrangement sought to allay U.S. congressional concerns about possible U.S. promotion of regional missile proliferation. On September 28, 2018, the State Department approved a potential sales to Bahrain of 110 ATACM missiles and 720 Guided Multiple Launch Rocket System rockets, with a total estimated value of $300 million. A joint resolution, S.J.Res. 65 , was introduced to block the proposed sale, on the grounds that arms sales contributes to Bahrain's participation in the Arab coalition in Yemen (see below). The Senate voted on November 15, 2018 not to advance the resolution (by a vote of 77-21). Stingers. Section 581 of the FY1990 foreign operations appropriation act ( P.L. 101-167 ) made Bahrain the only Gulf state eligible to receive the Stinger shoulder-fired anti-aircraft missile, and the United States has sold Bahrain about 70 Stingers since 1990. (This authorization has been repeated subsequently.) Humvees and TOWs. In September 2011, the Obama Administration announced a sale to the BDF and National Guard of 44 \"Humvee\" (M115A1B2) armored vehicles and several hundred TOW missiles of various models, including 50 \"bunker busters,\" with an estimated total value of $53 million. State Department officials said the sale would not violate the intent of the \"Leahy amendment,\" a provision of U.S. law that forbids U.S. sales of equipment to security units that have committed human rights abuses. Two joint resolutions introduced in the 112 th Congress ( S.J.Res. 28 and H.J.Res. 80 ) would have prohibited the sale unless the Administration certified that Bahrain is rectifying alleged abuses. In January 2012, the Obama Administration put the sale on hold, but in June 2015, the State Department announced that the sale would proceed because the government had \"made some meaningful progress on human rights reforms and reconciliation.\" Separately, on September 8, 2017, the Trump Administration notified Congress of a potential sale of 221 TOW missiles of various types, with an estimated valued of $27 million. Maritime Defense Equipment and Spare Parts . In May 2012, in conjunction with a visit to Washington, DC, by Bahrain's Crown Prince, the Administration announced the release of additional U.S. arms for the BDF, Bahrain's Coast Guard (a Ministry of Interior-controlled force), and the National Guard, stating that the weaponry was not suited for use against protesters and supported Bahrain's maritime defense. The Administration gave examples of weapons approved for sale to Bahrain: (1) the Perry-class frigate, as EDA, discussed above, but later mooted; and (2) harbor security boats for the Bahrain Coast Guard, as EDA. No legislation to block the sale was enacted. Separately, on September 8, 2017, the Trump Administration notified Congress of a potential sale of two 35-Meter Fast Patrol Boats, at an estimated cost of $60 million. Bahrain is also upgrading six naval vessels under a $70 million contract with Italy's Leonardo firm. Attack Helicopters . On April 27, 2018, the Defense Department notified Congress that the State Department had approved a potential sale to Bahrain of up to 12 AH-1Z (\"Cobra\") attack helicopters and associated munitions to the Royal Bahrain Air Force. The estimated value of the sale is $911 million. Missile Defense . U.S.-made Patriot missile defense batteries are deployed in Bahrain. However, Bahrain's limited budget largely precludes it from any major role in the U.S. effort to forge a coordinated missile defense for the Gulf. Still, on May 3, 2019, the State Dept. approved a potential sale to Bahrain of the Patriot Advanced Capability-3 (PAC-3) missile defense system with an estimated value of $2.5 billion. S.J.Res. 20, referenced above, would also disapprove that sale. Bahrain has sought to diversify its arms supplies somewhat, particularly from Russia, probably in recognition of Russia's role in Syria and the broader region. In 2016, Bahrain took delivery of about 250 Kornet anti-tank systems. In 2017, Bahrain military officials stated they were in discussions to possibly purchase the Russian S-400 missile defense system. Purchases from Russia, particularly the S-400, could trigger U.S. consideration of sanctioning Bahrain's cooperation with Russia's defense sector under authorities in the Countering America's Adversaries through Terrorism Act (CAATSA, P.L. 115-44 ). Bahrain is assessed by U.S. reports and officials as facing a terrorist threat from Iran-backed groups, discussed above, as well as Sunni jihadist groups such as the Islamic State. Bahrain has convicted and stripped the citizenship of some Bahrainis accused of supporting the Islamic State. On June 23, 2016, Bahraini courts sentenced 24 supporters of the Islamic State for plots in Bahrain, including attacks on Shias. No Islamic State terrorist attacks have been reported in Bahrain. Critics assert that the security services use antiterrorism laws and operations to suppress Shia dissidents, even those who do not use violence. The United States cooperates with Bahrain's Interior Ministry on counterterrorism issues, although U.S. cooperation with the ministry has been limited since 2011 because of the ministry's role in internal security. The ministry has retained a reputation among the Shia population for brutality, despite the departure in the late 1990s of security services chief Ian Henderson, a former British colonial-era commander known for favoring brutal tactics. The February 2014 expulsion of Malinowski led the Obama Administration to suspend most cooperation with the Ministry, but some U.S. cooperation with it resumed later in 2014 after Bahrain joined the anti-Islamic State coalition. The Trump Administration has retained restrictions on working with the Ministry and on selling it arms, according to September 12, 2017, testimony by Ambassador Justin Siberell during his confirmation hearing. Sales of U.S.-made small arms such as those sold to the Interior Ministry are generally commercial sales, licensed by State Department, with Defense Department concurrence. In May 2012, the State Department put \"on hold\" license requests for sales to Bahrain of small arms, light weapons, and ammunition —all of which could potentially be used against protesters. Apparently referencing Bahrain, the FY2014 Consolidated Appropriation Act ( P.L. 113-76 ) prohibited use of U.S. funds for \"tear gas, small arms, light weapons, ammunition, or other items for crowd control purposes for foreign security forces that use excessive force to repress peaceful expression, association, or assembly in countries undergoing democratic transition.\" The Trump Administration has maintained the hold on new sales of U.S. arms and equipment to MOI forces. Bahrain's Coast Guard. This force, which is under the Ministry of Interior, polices Bahrain's waterways and contributes to the multilateral mission to monitor and interdict the seaborne movement of terrorists and weapons. U.S. restrictions on support for the Ministry of Interior forces have generally not applied to the Bahrain Coast Guard. The United States provides assistance to the MOI primarily through programs funded by Nonproliferation, Antiterrorism, Demining and Related Programs (NADR) funds, to help the MOI confront violent extremists and terrorist groups. U.S. officials assert that a general lack of training and antiquated investigative methods had slowed the MOI Police Force's progress on counterterrorism and criminal investigations. The ministry's role in putting down unrest prompted an Obama Administration \"review\" of the use of NADR-ATA (Antiterrorism Assistance) funding for the ministry to ensure that none of the funding was used against protestors. The State Department report on international terrorism for 2014 stated that the \"Leahy Law\" requirement to vet Bahrain personnel participating in ATA programs prompted the cancellation of planned ATA courses for Bahrain in 2015. However, that report for 2015 stated that one ATA-related course took place that year; the report for 2016 and 2017 did not mention any courses in those years. The Trump Administration provided about $400,000 in NADR funds for FY2018 and requested an equivalent amount for FY2019 to train MOI personnel in investigative techniques, with a human rights focus, and to help MOI personnel respond to terrorist's use of explosives. Some NADR-ATA funds have previously been used to augment Bahrain's ability to protect U.S. diplomatic and military facilities in Bahrain. Bahrain has been a regional leader in countering terrorism financing since well before the Islamic State organization emerged as a threat. Bahrain has hosted the Middle East and North Africa Financial Action Task Force (MENA/FATF) secretariat. Bahrain's financial intelligence unit is a member of the Egmont Group. Bahrain's banks cooperate with U.S. efforts against terrorism financing and money laundering. In 2013, the government amended the Charity Fundraising Law of 1956 to increase terrorism financing monitoring and penalties. In October 2017, King Hamad issued a series of decreases mandating extensive prison sentences and financial penalties on persons found guilty of raising funds for groups engaged in terrorist activities in Bahrain or internationally. In April 2015, Bahrain hosted the 8 th European Union-GCC Workshop on Combating Terrorist Financing, and Bahrain is a member of the U.S.-led anti-Islamic State coalition's Counter-ISIS Finance Group. In 2015, Bahrain hosted a workshop focused on preventing the abuse of the charitable sector to fund terrorism, and a U.S.-GCC anti-Hezbollah workshop in 2016. In 2017, Bahrain jointed the U.S.-GCC Terrorist Financial Targeting Center, which coordinates GCC counterterrorism financing efforts. In October 2017, in concert with that Center, Bahrain imposed sanctions on persons and entities linked to the Islamic State and Al Qaeda in the Arabian Peninsula (AQAO). However, in part due to the intra-GCC dispute discussed below, Bahrain did not allow a Qatari representative to participate in a MENA/FATF meeting in Manama. Countering Violent Extremism . Bahrain's Ministry of Justice and Islamic Affairs heads the country's efforts to counter radicalization. It has organized regular workshops for clerics and speakers from both the Sunni and Shia sects. The ministry also reviews schools' Islamic studies curricula to evaluate interpretations of religious texts. In 2016, the country drafted a National Countering Violent Extremism strategy. Bahrain's foreign policy is similar to several other GCC states, particularly on Iran. Bahrain is politically closest to Saudi Arabia, as demonstrated by the Saudi-led GCC intervention to help the government suppress the uprising in 2011, and Bahrain's joining of the June 2017 Saudi-led move to isolate Qatar. That dispute remains unresolved, and it threatens to undermine the Trump Administration's reported plan to forge a \"Middle East Strategic Alliance\" (MESA) consisting of the GCC and other Sunni Arab states against Iran. Secretary of State Pompeo's January 2019 visit to the GCC states, including Bahrain, was intended in part to forge GCC unity against Iran, as well as reassure the Gulf states of the U.S. commitment to Gulf security. The MESA reportedly is to be formally launched at a planned U.S.-GCC summit, but that meeting has been repeatedly postponed due to the lack of resolution of the intra-GCC rift. On May 6, 2019, Bahrain's Prime Minister spoke with Qatar's Amir to convey Ramadan greetings, while denying that the call was intended as a gesture suggesting imminent resolution of the intra-GCC dispute. Many Saudis visit Bahrain to enjoy the relatively more liberal social atmosphere there, using a causeway constructed in 1986 that links Bahrain to the eastern provinces of Saudi Arabia, where most of the kingdom's Shias (about 10% of the population) live. King Hamad's fifth son, Khalid bin Hamad, married a daughter of the late Saudi King Abdullah in 2011. In May 2012, Saudi Arabia and Bahrain announced a proposal to form a political and military union among the GCC states (\"Riyadh Declaration\"), but opposition by the other four GCC states caused it to languish. Bahrain is also politically close to Kuwait, in part because of historic ties between their two royal families. Both royal families hail from the Anizah tribe that settled in Bahrain and Kuwait. Kuwait has sometimes sought to mediate the Bahrain political crisis, but Shias in Kuwait have expressed resentment at what they say is the Kuwait ruling family's alignment with the Al Khalifa regime. Kuwait, as noted, joined the GCC intervention in Bahrain in 2011 and has financially aided Bahrain. In October 2018, Kuwait, Saudi Arabia, and UAE announced a $10 billion aid package to stabilize Bahrain's budget and finances. Perhaps in part explaining why Bahrain joined the June 2017 Saudi-led move against Qatar, Bahrain's relations with Qatar have frequently been fraught with disputes. The two had a long-standing territorial dispute over the Hawar Islands and other lands, which had roots in the 18 th century, when the ruling families of both countries controlled parts of the Arabian peninsula. In 1991, five years after clashes in which Qatar landed military personnel on a Bahrain-constructed man-made reef (Fasht al-Dibal) and took some Bahrainis prisoner, Bahrain and Qatar agreed to abandon fruitless Saudi mediation efforts and refer the issue to the International Court of Justice (ICJ). The ICJ ruled on March 16, 2001, in favor of Bahrain on the central dispute over the Hawar Islands but awarded to Qatar the Fasht al-Dibal reef and the town of Zubara on the Qatari mainland, where some members of the Al Khalifa family were long buried. Two smaller islands, Janan and Hadd Janan, were ruled not part of the Hawar Islands group and were also awarded to Qatar. Qatar expressed disappointment over the ruling but accepted it as binding. Not only has Bahrain backed the 2017 Saudi-led isolation of Qatar, but Bahrain joined the earlier Saudi Arabia and UAE withdrawal of their ambassadors from Qatar in 2014. That disagreement centered on Qatar's support for Muslim Brotherhood-affiliated opposition movements in several Middle Eastern countries, which Qatar views as a constructive Islamist movement but which Saudi Arabia and the UAE consider a terrorist organization. The earlier dispute eased in November 2014 with the return of GCC ambassadors to Doha. Bahrain has long blamed Iran for encouraging Bahrain's Shia opposition to rebel and for supplying the violent Shia opposition with arms and explosives. In December 1981, and then again in June 1996, Bahrain publicly accused Iran of trying to organize a coup by pro-Iranian Bahraini Shias. In September 2018, Bahrain's government came close to reviving such accusations against Iran with the charging of 169 persons for allegedly forming \"Bahrain Hezbollah\" with the backing of the IRGC-QF. Bahrain's leaders cite Iranian statements as evidence that Iran seeks to promote the overthrow of the government. In June 2016, Supreme Leader Ayatollah Ali Khamene'i called the revocation \"blatant foolishness and insanity\" that would mean \"removing a barrier between fiery Bahrain youths and the state.\" As noted above, the Trump Administration has firmly backed the government view that Iran is arming Shia militants in Bahrain. Bahrain backed Saudi Arabia in its January 2016 dispute with Iran in which Iranian protesters attacked two Saudi diplomatic facilities in Iran in response to the Saudi execution of dissident Shia cleric Nimr al-Baqr Al Nimr. As did Saudi Arabia, Bahrain broke diplomatic relations with Iran, going beyond a 2011-2012 cycle of tensions in which Iran and Bahrain withdrew their ambassadors. In March 2016, the GCC states declared Lebanese Hezbollah, a key Iran ally, a terrorist organization and discouraged or banned their citizens from visiting Lebanon. Bahrain simultaneously closed Future Bank, a Bahrain bank formed and owned by two major Iranian banks (Bank Saderat and Bank Melli). Earlier, in 2013, Bahrain declared Hezbollah a terrorist organization, accusing it of helping a Shia-led \"insurgency\" in Bahrain. Bahrain's arrests of Shias it accuses of linkages to the IRGC-QF and Hezbollah are noted above. On Iran nuclear issues, Bahrain has expressed support for Iran's right to civilian nuclear power, but it said that \"when it comes to taking that [nuclear] power, to developing it into a cycle for weapon grade, that is something that we can never accept, and we can never live with in this region.\" It publicly supported the 2010-2016 global economic pressure on Iran to compel it to limit its nuclear program. Bahrain abandoned a 2007 agreement - reached after a visit to Bahrain by then-President of Iran Mahmoud Ahmadinejaded - to buy, for 25 years, 1.2 billion cubic feet per day of Iranian gas via a planned undersea pipeline and for Bahrain to invest $4 billion to develop the source of the gas - Phases 15 and 16 of Iran's South Pars gas field. At the same time, Bahrain maintains relatively normal trade with Iran. Bahrain did not take immediate action to close Iran-linked Future Bank or the Iran Insurance Company until 2016, long after Future Bank was sanctioned by the United States in 2008 under Executive Order 13382 (anti-proliferation). By the time Bahrain closed that Bank in February 2016, the United States had already lifted sanctions on it in accordance with the nuclear agreement (Joint Comprehensive Plan of Action, JCPOA). As did the other GCC states, Bahrain expressed initial concern that the JCPOA represented a U.S. acceptance of an enhanced regional role for Iran. King Hamad scuttled plans to attend the U.S.-GCC summit at Camp David during May 13-14, 2015—a meeting intended to soothe GCC concerns about an Iran nuclear deal—and sent the Crown Prince instead. Bahrain joined the GCC in eventually supporting the JCPOA while calling for increased vigilance against Iran's \"destabilizing regional activities.\" Yet, Bahrain's leaders publicly supported the May 2018 Trump Administration withdrawal from the JCPOA. Bahrain's animosity toward Iran also stems from issues that predate the formation of the Islamic Republic in 1979. In 2009, an advisor to Iran's Supreme Leader, referred to Bahrain as Iran's 14 th province, reviving Bahrain's long-standing concerns that Iran would again challenge its sovereignty. Persian officials contested Bahrain's sovereignty repeatedly during the 19 th and 20 th centuries, including in 1957, when a bill was submitted to the Iranian Majlis (legislature) to make Bahrain a province of Iran. Bahrain considers the independence issue closed: when Iran reasserted its claim to Bahrain in 1970, prior to the end of British rule in Bahrain, the U.N. Secretary-General dispatched a representative to determine the views of Bahrainis, who found that the island's residents overwhelmingly favored independence from all outside powers, including Iran. The findings were endorsed by U.N. Security Council Resolution 278 and Iran's Majlis ratified them. Bahrain backed the U.S.-led 2003 overthrow of Iraq's Saddam Hussein, but Bahrain's relations with the post-Saddam Iraq deteriorated after 2005 as the Shia-dominated Iraqi government marginalized Sunni leaders. Some Shia Iraqi leaders expressed support for the 2011 Bahrain uprising. Bahrain did not contribute financially to Iraq reconstruction, but it participated in the \"Expanded Neighbors of Iraq\" regional dialogue on Iraq that ended in 2008, and it posted its first post-Saddam ambassador to Iraq in October 2008. Bahrain sent a low-level delegation to the March 27-29, 2012, Arab League summit in Baghdad. Similarly, Bahrain and the other GCC states blamed Syrian President Bashar Al Assad for authoritarian policies that alienated Syria's Sunni Arab majority and fueled support for the Islamic State. In 2011, Bahrain and most of the other GCC states (except Oman) closed their embassies in Damascus and voted to suspend Syria's membership in the Arab League. Bahrain's government did not, by any account, provide funding or weaponry to any Syrian rebel groups. Apparently recognizing that Assad is prevailing in the civil war, in late December 2018, Bahrain re-opened its embassy in Damascus, as did the UAE. Asserting that the Islamic State poses a regional threat, on September 22, 2014, Bahrain and the other GCC states joined the U.S.-led anti-Islamic State coalition. Bahrain conducted air strikes against Islamic State positions in Syria, as did several other GCC states, but the State Department's report on terrorism for 2016 stated that Bahrain \"has not contributed substantively to coalition [anti-ISIS] military efforts since 2014.\" None of the GCC states engaged in anti-Islamic State air operations in Iraq, on the grounds that the Shia-dominated Iraqi government is aligned with Iran. Bahrain joined the GCC diplomatic efforts to persuade Yemen's President Ali Abdullah Saleh to cede power to a transition process in 2012. In 2015, Zaidi Shia \"Houthi\" militia rebels, backed to some degree by Iran, took control of the capital, Sanaa, and forced President Abdu Rabbu Mansur Al Hadi into exile. In March 2015, Saudi Arabia assembled a coalition of Arab states, including Bahrain and all the other GCC countries except Oman, to combat the Houthis in an effort to achieve a restoration of the Hadi government. Bahrain has conducted air strikes and contributed some ground forces to the effort. At least eight members of the BDF have been killed in the engagement, to date, and a Bahraini Air Force F-16 crashed in Yemen-related operations on December 30, 2015. The pilot survived. Air Vice Marshall Hamad bin Abdullah al Khalifah, head of the Royal Bahrain Air Force (RBAF), stated in February 2019 that RBAF F-16s had conducted over 3,500 sorties since the beginning of the campaign in March 2015. On the Israeli-Palestinian dispute, Bahraini leaders have long tended toward engagement with Israel while also supporting Palestinian aspirations. In a July 2009 op-ed, Crown Prince Salman called on the Arab states to do more to communicate to the Israeli people ideas for peaceful resolution of the dispute. In October 2009, Bahrain's then-foreign minister called for direct talks with Israel and in September 2017, King Hamad called for the Arab states to forge direct ties to Israel and an end to the Arab boycott of Israel. Following the October 2018 visit of Israeli Prime Minister Benjamin Netanyahu to Oman, Israel's Minister of Economy, Eli Cohen, received an invitation to visit Bahrain. Subsequently, in December 2017 a cross-sectarian Bahraini group visited Israel, and low profile Israeli delegations have attended conferences in Manama. Still, many Bahrainis, including in the National Assembly, oppose engaging Israel and it was this public pressure that caused the cancellation of a large Israeli delegation to a business conference in April 2019. The commitment of the Bahrain government to engagement undoubtedly contributed to a Trump Administration to promote the economic component of its Israeli-Palestinian peace plan in Bahrain in June 2019. Still, Bahrain supports the efforts of Palestinian Authority President Mahmoud Abbas to obtain U.N. recognition for a State of Palestine. Bahraini leaders publicly criticized the announcement by President Trump on December 6, 2017, recognizing Jerusalem as Israel's capital as an obstacle to forging an Israeli-Palestinian peace. Earlier, Bahrain participated in the 1990-1996 multilateral Arab-Israeli talks, and it hosted a session on the environment (October 1994). In September 1994, all GCC states ceased enforcing secondary and tertiary boycotts of Israel, but Bahrain did not join Oman and Qatar in exchanging trade offices with Israel. In conjunction with the U.S.-Bahrain FTA, Bahrain dropped the primary boycott and closed boycott-related offices in Bahrain. Bahrain's economy has been affected by the domestic unrest and by the decline in oil prices during 2014-2018. Hydrocarbons still account for about 80% of government revenues, mostly from oil exports from a field that Saudi Arabia shares equally with Bahrain, the Abu Safa field, which produces 300,000 barrels per day. Bahrain's oil and gas reserves are the lowest of the GCC states, estimated respectively at 210 million barrels of oil and 5.3 trillion cubic feet of gas. However, Bahrain's energy export potential might be revived if Bahrain's 2018 discovery of a shale oil field containing an estimated 80 billion barrels of shale oil proves commercially viable. The decline in oil prices from 2014 levels has caused Bahrain to cut subsidies of some fuels and some foodstuffs. The financial difficulties have also contributed to a lack of implementation of government promises to provide more low-income housing (presumably for Shias, who tend to be among the poorer Bahrainis). To try to diversify, Bahrain is investing in its banking and financial services sectors (about 25.5% of GDP combined). To help Bahrain cope with its budgetary difficulties, Saudi Arabia, Kuwait, and the UAE announced in early October 2018 a $10 billion aid package. A comprehensive assessment of Bahrain's economy is provided in Economist Intelligence Unit country reports. U.S.-Bahrain economic relations have expanded, even though the United States buys virtually no oil from Bahrain. The major U.S. import from the country is aluminum: that product and other manufacturing account for the existence in Bahrain of a vibrant middle and working class, which consists mostly of Shia Bahrainis. About 180 U.S. companies do business in Bahrain. In concert with Crown Prince Salman's visit to Washington, DC, in November 2017, Bahrain-based companies in several sectors signed trade deals with U.S. based firms, including a memorandum of understanding between Aluminum Bahrain (Alba) and General Electric. More than 200 American companies operate in Bahrain, and Amazon Web Services is slated to open its first regional headquarters in Bahrain. To encourage reform and signal U.S. appreciation, the United States and Bahrain signed an FTA on September 14, 2004. Implementing legislation was signed January 11, 2006 ( P.L. 109-169 ). However, in light of the unrest, the AFL-CIO has urged the United States to void the FTA on the grounds that Bahrain is preventing free association of workers and abridging their rights. In 2005, total bilateral trade was about $780 million, and, as depicted in the table below, U.S.-Bahrain trade has more than doubled since the U.S.-Bahrain FTA to about $2 billion in 2017. Some U.S. funds have been used to provide assistance to Bahrain for purposes that are not purely security related. In 2010, MEPI supported the signing of a Memorandum of Understanding between the Small Business Administration and Bahrain's Ministry of Industry and Commerce to support small and medium enterprises in Bahrain. MEPI funds have also been used to fund U.S. Department of Commerce programs (\"Commercial Law Development Program\") to provide Bahrain with technical assistance in support of trade liberalization and economic diversification, including modernization of the country's commercial laws and regulations. ", "summary": "An uprising against Bahrain's Al Khalifa ruling family that began on February 14, 2011, has subsided, but punishments of oppositionists and periodic demonstrations continue. The mostly Shia opposition to the Sunni-minority-led regime has not achieved its goal of establishing a constitutional monarchy, but the unrest has compelled the ruling family to undertake some modest reforms. Elections for a legislative body, held most recently in 2018, were marred by the banning of opposition political societies and allegations of gerrymandering to prevent opposition victories, but observers praised the newly elected lower house of the Assembly for naming a woman as its speaker. The mainstream opposition uses peaceful forms of dissent, but small factions, reportedly backed by Iran, have conducted some attacks on security officials. The Bahrain government's repression has presented a policy dilemma for the United States because Bahrain is a longtime ally that is pivotal to maintaining Persian Gulf security. The country has hosted a U.S. naval command headquarters for the Gulf region since 1948; the United States and Bahrain have had a formal Defense Cooperation Agreement (DCA) since 1991; and Bahrain was designated by the United States as a \"major non-NATO ally\" in 2002. There are over 7,000 U.S. forces, mostly Navy, in Bahrain. Bahrain relies on U.S.-made arms, but, because of the government's use of force against protesters, the Obama Administration held up some new weapons sales to Bahrain and curtailed U.S. assistance to Bahrain's internal security organizations. In 2014, Bahrain joined the U.S.-led coalition against the Islamic State and flew strikes against the group's fighters in Syria that year. Bahrain supports a U.S.-backed concept for a broad Arab coalition to counter Iran, the \"Middle East Strategic Alliance.\" The Trump Administration has prioritized countering Iran and addressing other regional security issues, aligning the Administration closely with Bahrain's leadership on that issue. In keeping with that approach, the Administration lifted the previous administration's conditionality on major arms sales to Bahrain's military and has corroborated Bahrain leadership assertions that Iran is providing material support to violent opposition factions in Bahrain. Critics of the policy assert that the Administration is downplaying human rights concerns in the interests of countering Iran. Within the Gulf Cooperation Council alliance (GCC: Saudi Arabia, Kuwait, UAE, Bahrain, Qatar, and Oman), Bahrain generally supports Saudi policies. In March 2015, it joined Saudi Arabia-led military action to try to restore the government of Yemen that was ousted by Iran-backed Houthi rebels. In June 2017, it joined a Saudi and UAE move to isolate Qatar for its purported support for Muslim Brotherhood-linked Islamist movements, accusing Qatar of hosting Bahraini dissidents and of allying with Iran. Bahrain has fewer financial resources than do most of the other GCC states and has not succeeded in significantly improving the living standards of the Shia majority. The unrest has, in turn, strained Bahrain's economy by driving away foreign investment. In October 2018, three GCC states assembled an aid package of $10 billion to reduce the strain on Bahrain's budget. Bahrain's small oil exports emanate primarily from an oil field in Saudi Arabia that the Saudi government has set aside for Bahrain's use, although a major new oil and gas discovery off Bahrain's coast was reported in early 2018. In 2004, the United States and Bahrain signed a free trade agreement (FTA); legislation implementing it was signed January 11, 2006 (P.L. 109-169). Some U.S. labor organizations assert that Bahrain's arrests of dissenting workers should void the FTA.", "document_type": "crs"}
{"report": "U nder long-standing Supreme Court precedent, Congress has \"plenary power\" to regulate immigration. This power, according to the Court, is the most complete that Congress possesses. It allows Congress to make laws concerning non-U.S. nationals (aliens) that would be unconstitutional if applied to citizens. And while the immigration power has proven less than absolute when directed at aliens already physically present within the United States, the Supreme Court has interpreted the power to apply with most force to the admission and exclusion of nonresident aliens. The Court has upheld or shown approval of laws excluding aliens on the basis of ethnicity, gender and legitimacy, and political belief. It has also upheld an executive exclusion policy that was premised on a broad statutory delegation of authority, even though some evidence considered by the Court tended to show that religious hostility may have prompted the policy. Outside of the immigration context, in contrast, laws and policies that discriminate on such bases are almost always struck down as unconstitutional. To date, the only judicially recognized limit on Congress's power to exclude aliens concerns lawful permanent residents (LPRs): they, unlike nonresident aliens, generally cannot be denied entry without a fair hearing as to their admissibility. The plenary power doctrine has roots in the Chinese Exclusion Case of 1889, which upheld a federal statute that provided for the exclusion of Chinese laborers. Some jurists and commentators have criticized the Chinese Exclusion Case for indulging antiquated notions of race. More generally, many legal scholars contend that the plenary power doctrine lacks a coherent rationale and that it is an anachronism that predates modern individual rights jurisprudence. Yet the Supreme Court continues to employ the doctrine. Some commentators have argued that the Court is in the process of narrowing the parameters of the doctrine's applicability, but they find support for this argument mainly in cases outside the exclusion context. In the exclusion context, the Court's 2018 decision in Trump v. Hawaii reaffirms the exceptional scope of the plenary power doctrine. Congress's plenary power to regulate the entry of aliens rests at least in part on implied constitutional authority. The Constitution itself does not mention immigration. It does not expressly confer upon any of the three branches of government the power to control the flow of foreign nationals into the United States or to regulate their presence once here. To be sure, parts of the Constitution address related subjects. The Supreme Court has sometimes relied upon Congress's enumerated powers over naturalization and foreign commerce, and to a lesser extent upon the Executive's implied Article II foreign affairs power, as sources of federal immigration power. Significantly, however, the Court has also consistently attributed the immigration power to the federal government's inherent sovereign authority to control its borders and its relations with foreign nations. It is this inherent sovereign power, according to the Court, that gives Congress essentially unfettered authority to restrict the entry of nonresident aliens. The Court has determined that the executive branch, by extension, possesses unusually broad authority to enforce laws pertaining to alien entry, and to do so under a level of judicial review much more limited than that which would apply outside of the exclusion context. Recent events have generated congressional interest in the constitutional division of responsibilities between Congress and the Executive in establishing and enforcing policies for the exclusion of aliens. Through three iterative executive actions in 2017, commonly known as the \"Travel Ban,\" the President provided for the exclusion of broad categories of nationals of specified countries, most of which were predominantly Muslim. These executive actions relied primarily upon a delegation of authority in the Immigration and Nationality Act (INA) allowing the President, by way of proclamation, to exclude \"any aliens\" or \"any class of aliens\" whose entry he determines would be \"detrimental to the interests of the United States.\" In June 2018, the Supreme Court upheld the third iteration of the Travel Ban as likely lawful, rejecting claims that it was motivated by unconstitutional religious discrimination and that it exceeded the President's authority under the INA. Since that decision, some Members of Congress have proposed curtailing executive authority to craft exclusion policy or subjecting executive exclusion decisions and policies to more stringent judicial review. This report provides an overview of the legislative and executive powers to exclude aliens. First, the report discusses a gatekeeping legal principle that frames those powers: nonresident aliens outside the United States cannot challenge their exclusion from the country in federal court because Congress has not expressly authorized such challenges. But aliens at the threshold of entry have more access to judicial review of exclusion decisions, compared to aliens abroad, because of statutory provisions and other considerations. Next, the report analyzes the extent to which the constitutional and statutory rights of U.S. citizens limit the exclusion power. Specifically, the report examines a line of Supreme Court precedent, starting with Kleindienst v. Mandel and ending with Trump v. Hawaii , that makes a highly curtailed form of judicial review available to U.S. citizens who claim that the exclusion of one or more aliens abroad violates the U.S. citizens' constitutional rights. The report concludes by analyzing the implications of these cases for the scope of the congressional power to legislate for the exclusion of aliens and, separately, for the scope of the executive power to take action to exclude aliens. As discussed later, Supreme Court case law on the exclusion of aliens has come to focus upon whether the rights of U.S. citizens limit the government's power to exclude. The case law arrived at this issue, however, only after the Supreme Court developed an underlying principle: nonresident aliens outside the United States do not have constitutional rights with respect to entry. Further, any statutory provisions that govern the admission of nonresident aliens do not permit judicial review unless Congress \"expressly authorize[s]\" such review, something that federal courts generally conclude Congress has not done. Put differently, Congress's plenary power over immigration includes not merely the power to set rules as to which aliens may enter the country and under what conditions, but also the power to have such rules \"enforced exclusively through executive officers, without judicial intervention\" unless Congress provides otherwise. Because Congress has not provided otherwise, judicial review of decisions to exclude aliens abroad is generally unavailable. The Supreme Court developed these general principles against judicial review of exclusion decisions in a series of cases between the late 19th and mid-20th centuries about aliens denied admission after arriving by sea. In one illustrative early case, the 1895 decision Lem Moon Sing v. United States , a Chinese national contended that immigration officers improperly denied him admission under the Chinese exclusion laws. Those laws barred the entry of Chinese laborers, but the Chinese national described himself as a merchant and argued that the laws therefore did not apply to him. As a consequence of his exclusion, he was detained by the steamship company. The Supreme Court recognized that the professed merchant could challenge the legality of his detention through a petition for habeas corpus. This procedural right ultimately proved hollow, however, because the Court held that it could not review the immigration officials' determination that the petitioner fell within the scope of the provision excluding Chinese laborers. The Court explained that Congress had precluded such review by providing in statute that the decisions of immigration officers to deny admission to aliens under the Chinese exclusion acts \"shall be final, unless reversed on appeal to the secretary of the treasury.\" In other words, the statute allowed only the Secretary of the Treasury to review exclusion decisions under the acts. Accordingly, the Court limited its consideration of the habeas petition to the narrow question of whether the immigration officers who excluded the professed merchant had authority to make exclusion and admission decisions under the statutes (in other words, whether the officers had jurisdiction). Determining that the immigration officers did have such statutory authority, the Court rejected the habeas petition without reviewing the petitioner's contention that he was in fact a merchant, not a laborer. To review that contention, the Court reasoned, would \"defeat the manifest purpose of congress in committing to subordinate immigration officers . . . exclusive authority to determine whether a particular alien seeking admission into this country belongs to the class entitled by some law or treaty to come into the country.\" The Court saw no constitutional problem in Congress's assignment of final authority over exclusion decisions to executive officials. The Court considered it a settled proposition that, because aliens lack constitutional rights with respect to entry, exclusion decisions \"could be constitutionally committed for final determination to subordinate immigration or other executive officers . . . thereby excluding judicial interference so long as such officers acted within the authority conferred upon them by congress.\" Two major Supreme Court decisions from the 1950s appeared to transform the principle from Lem Moon Sing and earlier casesâthat Congress may bar judicial review of exclusion decisions affirmativelyâinto a presumption that judicial review of exclusion decisions is barred unless Congress expressly provides otherwise. First, in the 1950 case United States ex rel. Knauff v. Shaughnessy , the Court declared itself powerless to review an executive branch decision to exclude the German bride of a U.S. World War II veteran, even though executive officials failed to explain the exclusion beyond stating that the woman's entry would have been \"prejudicial.\" The Court reiterated that aliens do not have constitutional rights with respect to entry and reasoned that, as a consequence, \"[w]hatever the procedure authorized by Congress is, it is due process as far as an alien denied entry is concerned.\" In what would become an oft-cited sentence, the Court also announced the presumption against judicial review of exclusion decisions: \"it is not within the province of any court, unless expressly authorized by law , to review the determination of the political branch of the Government to exclude a given alien.\" Next, in the 1953 case Shaughnessy v. Mezei , the Court refused to question the Executive's undisclosed reasons for denying entry to an essentially stateless alien returning to the United States after a prior period of residence, even though the exclusion relegated the stateless alien to potentially indefinite detention on Ellis Island. The Mezei Court cited Knauff for the proposition that federal courts may not review exclusion decisions \"unless expressly authorized by law,\" and the Court held that the Attorney General's decision to exclude Mezei and detain him as a consequence of that exclusion was \"final and conclusive.\" The issue of detention complicated the Knauff and Mezei cases. Because the aliens in both cases suffered detention as a result of their exclusion, they filed petitions for habeas corpus challenging the legality of their detention. And in both cases, in accord with Lem Moon Sing and other early precedents, and notwithstanding the Court's declaration in Knauff and Mezei that judicial review of the exclusion decisions was unavailable, the Court conducted a limited inquiry into whether the governing statutes empowered the Attorney General to exclude the aliens without a hearing. As explained further below, in the immigration context, the Supreme Court does not construe a general bar on judicial review to preclude habeas corpus review, although the proper scope of habeas review in cases concerning the exclusion of arriving aliens remains unclear. In any event, even though the Knauff and Mezei Courts conducted a limited habeas inquiry into the Attorney General's statutory authority to exclude aliens without a hearing, federal courts often cite the cases (and especially Knauff ) for the proposition that courts may not review exclusion decisions unless Congress expressly provides otherwise. Many scholars criticize Knauff and Mezei as incorrectly decided. The aspect of Mezei that upholds as constitutional the indefinite detention of an arriving alien, in particular, is controversial and has been limited by some lower federal courts to apply only in cases that implicate national security. The Supreme Court, however, has cited Knauff and earlier exclusion cases for the proposition that excluded nonresident aliens do not have grounds to challenge their exclusion in federal court. Under current law, this proposition forms the basis for the doctrine of consular nonreviewability, which bars judicial review in almost all circumstances of the denial of visas to aliens abroad. The general principle against judicial review of exclusion decisions applies with less force to executive decisions to exclude aliens arriving in the United States, even though the rule arose from cases about such aliens. The general principles that govern reviewability of both of these two categories of exclusion decisionsâ(1) visa denials and other exclusion decisions concerning aliens located abroad; and (2) decisions to deny entry to aliens arriving at U.S. borders or ports of entryâare discussed below. The doctrine of consular nonreviewability precludes judicial review of challenges brought by nonresident aliens located abroad against visa denials and also possibly against other actions by executive branch officials to deny them admission. Under the doctrine, the millions of nonresident aliens denied visas each year at U.S. consulates abroad cannot themselves challenge their visa denials in federal court on statutory or constitutional grounds. The doctrine may also bar U.S. citizens, LPRs, and U.S. entities from challenging the exclusion of a nonresident alien abroad on statutory grounds (as opposed to constitutional grounds), although the Supreme Court has not decided this issue. The general unavailability of judicial review of visa denials under the doctrine means that U.S. consular officers (the officials who adjudicate visas abroad) have considerable power to make final decisions about visa applications. Table 1 provides an overview of the types of claims to which the doctrine of consular nonreviewability applies. Much controversy surrounds the doctrine of consular nonreviewability. Some scholars argue that it lacks a compelling foundation in law. No statute speaks expressly to the issue of whether visa decisions should be subject to judicial review. Even so, lower federal courts recognize the doctrine with apparent uniformity (although some have recognized exceptions to it, as discussed in the next subsection). As authority for the doctrine, courts often cite Knauff and the other Supreme Court cases referenced above concerning the denial of admission to aliens arriving by sea. In particular, the consular nonreviewability cases cite these Supreme Court precedents for the proposition that Congress's plenary immigration power includes the power to have statutes governing the admission of aliens \"enforced exclusively through executive officers, without judicial intervention\" and that \"it is not within the province of any court, unless expressly authorized by law, to review the determination of the political branch of the Government to exclude a given alien.\" Thus, the reasoning that supports lower court applications of the doctrine appears to be that Congress has not expressly authorized judicial review of visa denials. Because the doctrine has its basis in Knauff and the presumption against judicial review of exclusion decisions, it does not apply to the decisions of domestic immigration authorities to deny immigration benefits, unless perhaps those decisions underlie eventual visa denials or otherwise work to exclude aliens located abroad. Some federal courts have sought to reconcile the doctrine of consular nonreviewability with the provisions governing judicial review of final agency action set forth in the Administrative Procedure Act (APA). The APA establishes a \"strong presumption\" that the actions of federal agenciesâincluding the Department of Stateâare subject to judicial review. Yet, according to these courts, Congress enacted the APA against the backdrop of already-existing consular nonreviewability jurisprudence and without expressly overruling that jurisprudence by providing for review of consular decisions. On this basis, these courts have concluded that the doctrine of consular nonreviewability constitutes a preexisting limitation on judicial review that the APA preserves through its stipulation, in 5 U.S.C. Â§â¯702(1), that nothing in the statute \"affects other limitations on judicial review.\" In other words, the APA preserves consular nonreviewability as an exception to the general rule that judicial review is available for agency action. Although the doctrine of consular nonreviewability is well established, it remains true that no statute expressly bars judicial review of visa denials abroad. For this reason, courts generally hold that the doctrine \"supplies a rule of decision, not a constraint on the subject matter jurisdiction of the federal courts.\" The legislative history of the original Immigration and Nationality Act of 1952 indicates that Congress considered and rejected the idea of creating within the Department of State a system of administrative appeals for visa denials, and the current version of the INA bars the Secretary of State from overturning visa decisions. But Congress has not legislated affirmatively to shield visa decisions from judicial review. The doctrine of consular nonreviewability is therefore premised upon the absence of any specific statutory authorization for the review of visa denials, not upon an explicit statutory prohibition on such review. Supreme Court case law qualifies the doctrine of consular nonreviewability in one important respect discussed at length later in this report: if a U.S. citizen challenges the exclusion of a nonresident alien abroad on the ground that the exclusion violates the citizen's constitutional rights, then, under the rule of Kleindienst v. Mandel and later cases, courts \"engage[] in a circumscribed judicial inquiry\" of the constitutional claim. Mandel recognized that U.S. citizens may have constitutional rights that bear upon the entry of nonresident aliens, even though nonresident aliens themselves do not have such rights. As such, the case law of multiple federal circuit courts of appeals establishes that \"a U.S. citizen raising a constitutional challenge to the denial of a visa is entitled to a limited judicial inquiry regarding the reason for the decision.\" This is the only exception to consular nonreviewability that federal courts have recognized uniformly. As explained later in the section on the Mandel line of cases, it allows challengers only exceedingly slim prospects of obtaining relief from a visa denial. Lower federal courts have split over whether U.S. citizens may also challenge visa denials on statutory grounds. Some lower federal courts have recognized other exceptions to consular nonreviewability's bar on judicial review of decisions to exclude aliens abroad. For instance, at least one federal circuit court decision extends the Mandel principle to allow a limited level of judicial review of a constitutional challenge brought directly by an excluded nonresident alien (rather than a U.S. citizen) against the denial of a visa. This extension, however, seems at odds with Mandel itself, which concluded that a nonresident alien who was denied the statutory waivers needed to secure a visa \"had no constitutional right of entry,\" and that limited judicial review was therefore available only because of constitutional claims brought by U.S. citizens against the alien's exclusion. Other federal appellate court decisions make clear that review of visa denials under Mandel is available only for claims brought by U.S. citizens. In another non-uniformly recognized exception, a line of decisions by the U.S. Court of Appeals for the Ninth Circuit allows nonresident aliens to challenge a consular officer's failure to act upon a visa application (as opposed to the denial of an application). The supporting rationale is that the Mandamus Act supplies a basis for judicial review where an official fails to take a legally required action, such as the adjudication of a visa application, even if the APA does not. This exception to the rule of consular nonreviewability is not as well established as the exception allowing for limited review of constitutional claims brought against visa denials by U.S. citizens. Federal district courts outside the Ninth Circuit have split over whether to recognize the exception. However, as discussed in the next section, in cases not specifically concerning the adjudication of visas, other courts have recognized that the Mandamus Act creates an exception to the presumption against judicial review of decisions to exclude aliens abroad. Other federal district court opinions may suggest further exceptions to consular nonreviewability that have yet to gain uniform recognition, such as an exception allowing visa applicants to challenge the validity of generally applicable statutes, regulations, or policies that govern their applications. Nonetheless, the review available under Mandel for constitutional challenges brought by U.S. citizens remains the only exception to consular nonreviewability grounded in Supreme Court case law and universally recognized by lower federal courts. Other cases concerning aliens abroad that implicate the presumption against judicial review of exclusion decisions and the doctrine of consular nonreviewability address the following question: may a federal court order the executive branch to grant entry to a nonresident alien located abroad in order to remedy violations of constitutional or statutory rights that the alien suffered while in the United States or while detained by the United States? The Seventh and Ninth Circuits have both answered in the affirmative. The D.C. Circuit, however, has held that Knauff bars courts from ordering the executive branch to grant entry to an alien unless a statutory provision authorizes courts to do so. The Ninth Circuit held that a federal district court has authority to order the executive branch to parole aliens whom it removed in violation of due process back into the country to attend fair removal proceedings. \"Without a provision requiring the government to admit individual [aliens] into the United States so that they may attend the hearings to which they are entitled,\" the court reasoned, the determination that their removal proceedings violated due process \"would be virtually meaningless.\" In other words, the only way to remedy the constitutional violation was to order the government to grant the aliens reentry. In a recent district court case that relied on the Ninth Circuit decision, the district court reasoned that ordering the government to grant reentry to aliens who were removed in violation of law did not contravene the political branches' broad authority over exclusion decisions because the remedy formed part of the review that Congress authorized courts to conduct of removal orders under the INA. The Seventh Circuit reached a broader holding in a different context. The case, Samirah v. Holder , concerned an alien who had overstayed his nonimmigrant visa but who had applied for LPR status (through a process called \"adjustment of status\"). When his mother fell ill in Jordan, the alien received a grant of advance parole from the Department of Homeland Security (DHS) so that he could visit her without abandoning his application for adjustment and with some assurance that he would be able to return to the United States to pursue the application. But while the alien was abroad, DHS revoked his advance parole and did not allow him to board a connecting flight back to the United States. Reviewing the alien's application for a writ of mandamus ordering executive branch officials to grant him reentry, the Seventh Circuit reasoned that DHS had used the advance parole as \"a trapâa device for luring a nonlawful resident out of the United States so that he can be permanently excluded from this country.\" The circuit court held that DHS's parole regulation unambiguously granted the plaintiff a right to reenter the country to continue pursuing his pending application for adjustment of status and that the court could enforce that right through mandamus. Further, the circuit court reasoned that the Supreme Court's holding in Knauff âthat \"it is not within the province of any court,Â unless expressly authorized by law , Â to review the determination of the political branch of the Government to exclude a given alien\"âdoes not apply in instances where a statute or regulation grants an excluded alien a right to physical presence in the United States. Put differently, where a nonresident alien abroad \"has a right, conferred by a regulation the validity of which is conceded all around, to be in this country,\" Knauff and the doctrine of consular nonreviewability do not bar a court from ordering executive branch officials to grant the alien entry. The Court did not clarify, however, whether the alien's right to be in the United States under the parole regulation also constituted an \"express[] authoriz[ation]\" of judicial review , within the meaning of Knauff , of the alien's exclusion. The Supreme Court, for its part, has held at least once that the potential existence of a right to entry does not give rise to judicial review of an alien's exclusion. A D.C. Circuit decision stands in tension with the Seventh and Ninth Circuit cases. In Kiyemba v. Obama , the D.C. Circuit held that it did not possess authority to order executive branch officials to grant entry into the United States to seventeen Chinese nationals detained without sufficient evidence as enemy combatants in Guantanamo Bay. The aliens feared that they would face persecution in China and requested entry and release into the United States, at least until authorities could locate an appropriate third country to accept them, but executive branch officials denied their request and continued to hold the aliens at Guantanamo Bay while pursuing resettlement options through diplomacy. Although the illegality of the aliens' detention was undisputed, the D.C. Circuit held that it could not order the government to release the aliens into the United States. The circuit court cited Knauff , Mezei , and other exclusion cases for the principle that the political branches have \"exclusive power . . . to decide which aliens may, and which aliens may not, enter the United States,\" and reasoned that this principle barred it from granting the requested relief. The \"critical question\" under Knauff , the circuit court reasoned, was whether any law \"expressly authorized\" courts \"to set aside the decision of the Executive Branch and to order the[] aliens brought to the United States.\" The Court concluded that the aliens did not have due process rights and that no other \"statute or treaty\" authorized it to override the executive branch's decision not to grant the aliens entry to the United States. As such, the rule that \"in the United States, who can come in and on what terms is the exclusive province of the political branches\" foreclosed the aliens' claims for relief. In conclusion, the Seventh and Ninth Circuit cases suggest that the doctrine of consular nonreviewability does not bar federal courts from ordering executive branch officials to grant entry to nonresident aliens abroad for the purpose of remedying constitutional, statutory, or regulatory violations that the aliens suffered in the United States. However, the cases may not fully explain how such judicial authority to order a nonresident alien's entry comports with Knauff and the principles underlying the doctrine of consular nonreviewability. The D.C. Circuit opinion, in contrast, appears to stand for the proposition that Knauff allows federal courts no authority to order the entry of a nonresident alien located outside the United States, unless a statute expressly authorizes such relief. Under current law, the general rule against challenges to denials of entry appears less relevant in the context of arriving aliens at the threshold of entry, notwithstanding the rule's provenance in Knauff and other cases about such aliens. Unlike in the visa context, it is not rare for federal courts to review and even strike down executive exclusion decisions and policies concerning aliens arriving at the border. At least three interrelated considerations contribute to the diminished relevance of the rule against challenges to exclusion decisions in arriving alien cases. First, decisions to exclude arriving aliens, unlike decisions to exclude aliens abroad, typically result in detention. Although nonresident aliens do not have constitutional rights with respect to entry , they may enjoy some protection from burdensome enforcement measures, such as prolonged detention, that sometimes flow from denial of entry. Recall, for example, the 1953 Mezei case mentioned above, where the Supreme Court denied relief to a stateless alien whose exclusion left him detained on Ellis Island without prospects for release. Unlike cases about aliens denied visas abroad, Mezei raised not only the question of whether the alien had grounds to challenge his exclusion from the United States, but also whether the government could keep him in detention on Ellis Island as a consequence of the exclusion decision. The majority answered this second question in the affirmative, reasoning that Mezei's lack of constitutional rights with respect to entry, and Congress's decision not to provide him with any judicially enforceable statutory rights to entry, foreclosed his challenge to the detention that resulted from his exclusion. In dissent, Justice Jackson made a famous retort: Because the respondent has no right of entry, does it follow that he has no rights at all? Does the power to exclude mean that exclusion may be continued or effectuated by any means which happen to seem appropriate to the authorities? It would effectuate [an alien's] exclusion to eject him bodily into the sea or set him adrift in a rowboat. In more recent cases, the Supreme Court has hesitated to rely on Mezei for the proposition that the federal government has the constitutional power to subject arriving aliens to prolonged detention in order to carry out their exclusion. Some lower courts have gone further and held that arriving aliens have due process rights that offer some protection against unreasonably prolonged detention, reasoning that Mezei applies only in cases that implicate specific national security concerns. The Supreme Court has yet to resolve the issue. As such, the extent to which aliens arriving at the border enjoy constitutional protections against prolonged detention or other enforcement measures connected to the denial of entry is a disputed issue. And while the law remains clear on the point that arriving nonresident aliens do not have constitutional rights with respect to entry itself, the proposition that they may have constitutional rights against detention or other enforcement measures that implicate fundamental rights often leads to judicial review of issues arising from their exclusion. Second, also because of the detention issue, arriving alien cases may trigger some level of habeas corpus review. Knauff and Mezei establish that no judicial review is available for exclusion decisions unless a statute expressly authorizes such review. But at the same time, the cases confirm an arguably countervailing proposition: that arriving aliens who suffer detention as a consequence of exclusion may challenge their exclusion in habeas corpus proceedings. Thus, in Knauff , the Court disavowed judicial review but still considered and rejected the excluded alien's argument that the applicable statutes required the Attorney General to conduct a hearing on her admissibility and that an executive branch regulation providing to the contrary was \"unreasonable.\" Similarly, in Mezei , the Court's habeas review included an assessment that the exclusion of the stateless alien in that case without a hearing conformed to the procedural requirements of the immigration statutes. As the Court has noted elsewhere, \"[i]n the immigration context, 'judicial review' and 'habeas corpus' have historically distinct meanings.\" The Court has held in the deportation context that the preclusion of judicial review does not bar habeas corpus proceedings. Knauff , Mezei , and earlier exclusion cases suggest that the same principle applies in the exclusion context: the cases declare that judicial review is unavailable for challenges to exclusion decisions, but they nonetheless engage in some review of executive jurisdiction and procedure under the rubric of habeas corpus. The scope of federal court review in habeas corpus proceedings of a decision to exclude an alien appears extremely limited, although its exact contours remain unclear (as does the question whether such proceedings are constitutionally required). The habeas review that the Court conducted in Knauff and Mezei did not reach the merits of the exclusion decisions. In Knauff , the Court declined to review the Attorney General's determination that the German war bride's entry would be \"prejudicial.\" Similarly, in Mezei , the Court held that it could not review the Attorney General's undisclosed reasons for excluding the stateless alien. As such, one might read Knauff and Mezei to mean that courts reviewing exclusion decisions in habeas proceedings (1) may review pure questions of law, such as whether immigration officials had jurisdiction to enforce the relevant exclusion statutes and whether the statute authorized them to forgo a hearing, but (2) may not review the basis for the officials' determination that the statutes require the aliens' exclusion. Other cases complicate this picture, however. In at least one early habeas case that the Supreme Court has not overruled, the Court reviewed and reversed the determination of immigration officers that a group of arriving aliens was subject to exclusion under the immigration statutes. One federal circuit court has interpreted Supreme Court case law to suggest that \"the Suspension Clause requires review of legal and mixed questions of law and fact related to removal orders, including expedited removal orders.\" The proper reach of a habeas court's review of the exclusion of an arriving alien thus remains unsettled, although the Supreme Court is scheduled to consider this issue in 2020. Regardless, the availability of any level of habeas review in arriving alien cases means that, in practice, the general rule against judicial review of exclusion decisions applies with less force in this context than in the context of visa denials or other decisions to exclude aliens located abroad , where the lack of detention makes habeas unavailable. Third and finally, Congress has established a limited framework in the INA for the review of orders of removal against arriving nonresident aliens. The INA sets forth two primary procedures by which DHS officials may remove aliens arriving in the United States. These procedures are expedited removal, a streamlined process that contemplates removal without a hearing before an immigration judge, and formal removal, a more traditional proceeding in which an immigration judge determines whether to order the alien's removal. The INA specifies the limited circumstances in which an alien ordered removed under these procedures may obtain judicial review. The INA also expressly bars or limits judicial review of a range of executive branch actions and determinations connected to the removal process. This INA scheme of limitations on judicial review purports to bar review of expedited removal orders in most circumstances, but it may not bar review of some executive branch exclusion policies that bear upon the expedited removal process (such as, for example, executive policies that restrict asylum eligibility for some aliens arriving at the border who are subject to expedited removal procedures). These INA provisions concerning the reviewability of removal orders appear to have replaced the Knauff presumptionâthat judicial review of exclusion decisions is unavailable \"unless expressly authorized by law\"âas the touchstone for whether executive decisions or policies for the exclusion of arriving nonresident aliens are subject to judicial review. When the INA expressly authorizes judicial review of orders or policies for the removal of arriving aliens, federal courts engage in such review. More broadly, however, federal courts have also shown a willingness to review statutory challenges to exclusion decisions or policies concerning aliens at the threshold of entry so long as the INA does not expressly bar such review (even if it does not expressly authorize review). This situation typically arises in cases where arriving aliens or their advocates challenge an executive branch exclusion policy under the APA. How judicial review in such exclusion casesâwhere the INA neither expressly authorizes nor bars reviewâcomports with the Knauff presumption remains largely unexplained in the case law. Yet the Supreme Court has on at least one occasion allowed for judicial review of inadmissibility determinations of arriving aliens on the ground that Congress had not expressly barred such review: in the 1956 case Brownwell v. We Shung , the Court held that arriving aliens could challenge inadmissibility determinations through declaratory judgment actions because the relevant statuteâa prior version of the INA that Congress later amended in disapproval of the Supreme Court decisionâdid not bar such actions. This decision appeared to disregard the presumption against judicial review of exclusion determinations established in Knauff and earlier exclusion cases, although the We Shung Court did not address this point. The underlying implication of We Shung , and of the more recent lower court decisions reviewing statutory challenges to executive branch policies concerning the exclusion of arriving aliens, may be that the INA's judicial review framework for orders of removal occupies the territory that the Knauff presumption against judicial review once occupied and therefore replaces the Knauff presumption as the law governing the availability of judicial review in arriving alien exclusion cases. To recap: the current case law generally provides that statutory challenges to the exclusion of arriving aliens are reviewable unless a statute expressly bars such judicial review. However, the case law does not thoroughly reconcile this approach with the Knauff presumption that there should be no review of an exclusion determination unless the review is expressly authorized in statute. The line of Supreme Court exclusion jurisprudence culminating in Knauff and Mezei establishes that courts may not review challenges to the exclusion of nonresident aliens unless Congress expressly provides for such review. In the context of aliens located abroad, this jurisprudence has developed into the rule of consular nonreviewability, which bars judicial review in most circumstances of visa refusals and other decisions to exclude nonresident aliens abroad. In the context of arriving aliens, however, the Knauff presumption against judicial review of exclusion decisions appears to have been mostly overshadowed by constitutional issues concerning enforcement measures related to the denial of entry, the potential availability of some level of habeas review, and the framework of INA provisions governing judicial review of removal orders. Even as applied to aliens abroad, the rule against nonresident alien challenges to denials of entry has a major limitation: the rule only clearly forecloses challenges brought by nonresident aliens themselves. Thus, if a U.S. citizen claims that the exclusion of an alien violated the U.S. citizen's constitutional rights, the rule against alien challenges does not apply with its full force. Cases that invoke this limitation account for the entirety of the Supreme Court's modern exclusion jurisprudence. The Court has not considered a nonresident alien's own challenge to a denial of entry in decades. The question about the extent to which U.S. citizens can challenge an alien's exclusion, on the other hand, has occupied the Court in four important cases since 1972: Kleindienst v. Mandel , Fiallo v. Bell , the splintered Kerry v. Din , and Trump v. Hawaii . Under the rule that these cases establish, the government need satisfy only a \"highly constrained\" judicial inquiry into whether the exclusion \"had a justification independent of unconstitutional grounds\" in order to prevail against an American citizen's claim that the exclusion violated his or her constitutional rights. This is an extremely limited level of judicial review under which the government has always prevailed before the Supreme Court. In 1972, the Court confronted a case in which a group of American professors claimed that the exclusion of a Belgian intellectual, Ernest Mandel, violated the American professors'âand not Mandel'sâFirst Amendment rights. The professors had invited Mandel to speak at their universities. A provision of the INA rendered him ineligible for a visa because of his communist political beliefs. A separate provision authorized the Attorney General to waive Mandel's ineligibility upon a recommendation from the Department of State, but the Attorney General declined to do so. The case produced a standard of review for claims that the exclusion of an alien violates an American citizen's constitutional rights: [P]lenary congressional power to make policies and rules for exclusion of aliens has long been firmly established . . . . We hold that when the Executive exercises [a delegation of this power] negatively on the basis of a facially legitimate and bona fide reason , the courts will neither look behind the exercise of that discretion, nor test it by balancing its justification against the First Amendment interests of those who seek personal communication with the applicant. Applying this \"facially legitimate and bona fide\" test, the Court upheld Mandel's exclusion on the basis of the government's explanation that it denied the waiver because Mandel had abused visas in the past. The American professors and two dissenting Justices pointed to indications of pretext and argued that Mandel had actually been excluded because of his communist ideas. Nonetheless, the majority refused to \"look behind\" the government's justification to determine whether any evidence supported it. In other words, the Court accepted at face value the government's explanation for why it denied Mandel permission to enter. The \"facially legitimate and bona fide\" standard resolved what the Court saw as the major dilemma that the dispute over Mandel's visa posed for the bedrock principles of its immigration jurisprudence. Unlike Mandel himself and the unadmitted aliens from prior exclusion cases, the American professors stated a compelling First Amendment claim based on their \"right to receive information\" from the Belgian intellectual. But for the Court to grant relief on that claim, or even to grant full consideration of the claim, would have undermined Congress's plenary power to exclude aliens by interjecting the courts into the exclusion process. After all, many other exclusions of aliens for communist ideology could also have implicated the rights of U.S. citizens who sought to \"meet and speak with\" the excluded aliens. The \"facially legitimate\" standard protected the plenary power against dilution by limiting the reach of the American professors' claim. Under the standard, the professors were not entitled to balance their First Amendment rights against the government's exclusion power; they were entitled only to a constitutionally valid statement as to why the government exercised the exclusion power. Significantly, the Court left open the question whether the American professors' rights entitled them to even that much. Although the government proffered a \"facially legitimate and bona fide\" justification for Mandel's exclusion, the Court declined to say whether the government would have prevailed even if it had offered \"no justification whatsoever.\" The Court has followed Mandel in three subsequent exclusion cases. The first of these cases, Fiallo v. Bell , concerned the constitutionality of a statute; the second, Kerry v. Din , concerned the Executive's application of a statute in an individual visa case; and the third, Trump v. Hawaii , concerned the Executive's invocation of statutory authority to exclude a broad class of aliens by presidential proclamation. All three cases reinforce the notion of the government's plenary power to exclude aliens even in the face of constitutional challenges brought by U.S. citizens. The second and third cases, however, indicate that a different standard of review than Mandel 's \"facially legitimate and bona fide\" test may apply when challengers present extrinsic evidence of an unconstitutional justification for an executive exclusion decision or policy. The Supreme Court has assumed without definitively holding that, in such cases, reviewing courts may consider the extrinsic evidence to determine whether the exclusion decision or policy \"can reasonably be understood to result from a justification independent of unconstitutional grounds.\" In Fiallo v. Bell , the Court upheld a provision of the INA that classified people by gender and legitimacy. The statute granted special immigration preferences to the children and parents of U.S. citizens and LPRs, unless the parent-child relationship at issue was that of a father and his illegitimate child. Two U.S. citizens and two LPRs claimed that the restriction violated their equal protection rights by disqualifying their children or fathers from the preferences. Despite the \"double-barreled discrimination\" on the face of the statute, the Court upheld it as a valid exercise of Congress's \"exceptionally broad power to determine which classes of aliens may lawfully enter the country.\" Although it relied on Mandel , the Fiallo Court did not identify a concrete \"facially legitimate or bona fide\" justification for the statute. Instead, the Court surmised that a desire to combat visa fraud or to emphasize close family ties may have motivated Congress to impose the gender and legitimacy restrictions. Similar to the analysis in Mandel , the Fiallo Court justified its limited review of the facially discriminatory statute as a way to prevent the assertion of U.S. citizen rights from undermining the sovereign prerogative to exclude aliens. In Kerry v. Din , the Court considered a U.S. citizen's claim that the Department of State violated her due process rights by denying her husband's visa application without sufficient explanation. The Department indicated that it denied the visa under a terrorism-related ineligibility but did not disclose the factual basis of its decision. The Court rejected the claim by a vote of 5 to 4 and without a majority opinion. Justice Scalia, writing for a plurality of three Justices, did not reach the Mandel analysis because he concluded that Din did not have a protected liberty interest under the Due Process Clause in her husband's ability to immigrate. But Justice Kennedy, in a concurring opinion for himself and Justice Alito, which some lower courts view as the controlling opinion in the case, assumed without deciding that the visa denial implicated due process rights but rejected the claim under the \"facially legitimate and bona fide reason\" test. Justice Kennedy's concurring opinion made two significant statements about how Mandel works in application. First, the government may satisfy the \"facially legitimate and bona fide reason\" standard by citing the statutory provision under which it has excluded the alien. Such a citation fulfills the \"facially legitimate\" prong by grounding the exclusion decision in legislative criteria enacted under Congress's \"plenary power\" to restrict the entry of aliens, and the citation also, by itself, suffices to \"indicate[] [that the government] relied upon a bona fide factual basis\" for the exclusion. Thus, because the government stated that it denied Din's husband's visa application under the terrorism-related ineligibility, it provided an adequate justification under Mandel even though it did not disclose the factual findings that triggered the ineligibility. Pointing to the statute suffices. Second, however, Justice Kennedy indicated that his interpretation of the \"bona fide\" prong might be susceptible to a caveat in some cases: Absent an affirmative showing of bad faith on the part of the consular officer who denied Berashk [Din's husband] a visaâwhich Din has not plausibly alleged with sufficient particularityâ Mandel instructs us not to \"look behind\" the Government's exclusion of Berashk for additional factual details beyond what its express reliance on [the terrorism-related ineligibility] encompassed. In other words, under Justice Kennedy's reading of the Mandel standard, courts will assume that the government has a valid basis for excluding an alien under a given statuteâ unless an affirmative showing suggests otherwise. In Din , the facts did not suggest bad faith, because Din's own complaint revealed a connection between the statutory ineligibility and her husband's case. Justice Kennedy therefore had no occasion to apply the caveat, and the opinion did not clarify what kind of \"affirmative showing\" would trigger it. Nonetheless, Justice Kennedy's concept of a bad faith exception to Mandel 's rule against judicial scrutiny of the government's underlying factual basis for an exclusion decision became a prominent issue in the Supreme Court's most recent exclusion case, Trump v. Hawaii . Most recently, in Trump v. Hawaii , the Court rejected a challenge brought by U.S. citizens, the state of Hawaii, and other U.S.-based plaintiffs against a presidential proclamation that provided for the indefinite exclusion of broad categories of nonresident aliens from seven countries, subject to some waivers and exemptions. Five of the seven countries covered by the proclamation were Muslim-majority countries. The proclamation, like two earlier executive orders that imposed entry restrictions of a similar nature, became known colloquially as the \"Travel Ban\" or \"Muslim Ban.\" As statutory authority for the proclamation, the President relied primarily upon INA Â§ 212(f). That statute grants the President power \"to suspend the entry of all aliens or any class of aliens\" whose entry he \"finds . . . would be detrimental to the interests of the United States.\" In the proclamation, the President concluded that the entry of the specified categories of nationals from the seven countries would have been \"detrimental\" to the United States because, based on the results of a multiagency review, the countries did not adequately facilitate the vetting of their nationals for security threats or because conditions in the countries posed particular risks to national security. Thus, the stated purpose of the proclamation was to protect national security by excluding aliens who could not be properly vetted due to the practices of their governments or the conditions in their countries. The challengers contended, however, that the actual purpose of the proclamation was to exclude Muslims from the United States. They based this argument primarily upon extrinsic evidenceâthat is, evidence outside of the four corners of the proclamationâincluding statements that the President had made as a candidate calling for a \"total and complete shutdown of Muslims entering the United States.\" The challengers argued that the proclamation was illegal on statutory and constitutional grounds. With respect to statute, the challengers contended that INA Â§ 212(f) conferred upon the President only a \"residual power to temporarily halt the entry of a discrete group of aliens engaged in harmful conduct\" and therefore did not authorize the proclamation's indefinite exclusion of nationals of seven countries. The challengers also made other statutory arguments, including that the proclamation did not make sufficient findings that the entry of the excluded aliens would be \"detrimental to the interests of the United States,\" as the language of Â§ 212(f) requires. With respect to the constitutional ground, the challengers argued that the proclamation violated the Establishment Clause because, based on the extrinsic evidence, the President issued the proclamation for the actual purpose of excluding Muslims from the United States. As such, according to plaintiffs, the proclamation ran afoul of the \"clearest command\" of the Establishment Clause: \"that one religious denomination cannot be officially preferred over another.\" A five-Justice majority of the Supreme Court rejected all of these challenges in an opinion by Chief Justice Roberts that generally reaffirmed the unique breadth of the political branches' power to admit or exclude aliens. On the statutory claims, the Court declined to decide whether the doctrine of consular nonreviewability barred judicial review of the U.S. plaintiffs' arguments that the proclamation violated Â§ 212(f) and other provisions of the INA. The Court instead held that the proclamation did not violate the INA because Â§ 212(f) \"exudes deference to the President\" and grants him \"'ample power' to impose entry restrictions in addition to those elsewhere enumerated in the INA,\" even restrictions as broad as those in the proclamation. The Court also reasoned that the \"deference traditionally accorded the President\" in national security and immigration matters means that courts must not conduct a \"searching inquiry\" into the basis of the President's determination under Â§ 212(f) that the entry of certain aliens would be \"detrimental to the interests of the United States.\" The Court suggested that such a presidential determination might not be subject to judicial review at allâcalling the premise for such review \"questionable\"âbut ultimately held that, \"even assuming some form of review [was] appropriate,\" the findings in the proclamation about the results of the multiagency review of vetting practices satisfied Â§ 212(f)'s requirements. In short, although the Court reviewed the statutory claims against the proclamation, it rejected those claims by holding that Congress has delegated extraordinary power to the President to exclude aliens and that the President's decisions to employ this power warrant deference. On the constitutional issue, the Court reiterated the holdings in Mandel and Fiallo that matters concerning the admission or exclusion of aliens are \"'largely immune from judicial control'\" and are subject only to \"highly constrained\" judicial inquiry when exclusion \"allegedly burdens the constitutional rights of a U.S. citizen.\" Interestingly, however, the Court did not decide whether the limitations on the scope of this inquiry barred consideration of extrinsic evidence of the proclamation's purpose. Much of the litigation in the lower courts had turned on this issue. A majority of judges on the U.S. Court of Appeals for the Fourth Circuit, citing Justice Kennedy's concurrence in Din , had relied on the campaign statements and other extrinsic evidence of anti-Muslim animus to hold that the proclamation likely violated the First Amendment. Dissenting Fourth Circuit judges had reasoned that Mandel and the other exclusion cases prohibited consideration of the extrinsic evidence. The Supreme Court, instead of resolving this disagreement, assumed without deciding that consideration of the extrinsic evidence was appropriate in connection with a rational basis inquiry: AÂ conventional application ofÂ . . . [the] facially legitimate and bona fide [test] would put an end to our review. But the Government has suggested that it may be appropriate here for the inquiry to extend beyond the facial neutrality of the order. For our purposes today, we assume that we may look behind the face of the Proclamation to the extent of applying rational basis review. That standard of review considers whether the entry policy is plausibly related to the Government's stated objective to protect the country and improveÂ vetting processes. As a result, we may consider plaintiffs' extrinsic evidence, but will uphold the policy so long as it can reasonably be understood to result from a justification independent of unconstitutional grounds. In other words, the Court concluded that, even if plaintiffs' evidence of anti-Muslim animus warranted expansion of the scope of judicial review beyond the four corners of the proclamation itself, the appropriate inquiry remained extremely limited: whether the proclamation was rationally related to the national security concerns it articulated. And that rational basis inquiry, the Court explained, is one that the government \"hardly ever\" loses unless the laws at issue lack any purpose other than a \"'bare . . . desire to harm a politically unpopular group.'\" Applying this forgiving standard, the Court held that the proclamation satisfied it mainly because agency findings about deficient information-sharing by the governments of the seven covered countries established a \"legitimate grounding in national security concerns, quite apart from any religious hostility.\" In the principal dissent, Justice Sotomayor argued that the majority failed to provide \"explanation or precedential support\" for limiting its analysis to rational basis review after deciding to go beyond the \"facially legitimate and bona fide reason\" inquiry. In Justice Sotomayor's view, the Court's Establishment Clause jurisprudence required the Court to strike down the proclamation because a \"reasonable observer\" familiar with the evidence would have concluded that the proclamation sought to exclude Muslims. She also reasoned that, even if rational basis review were the correct standard, the proclamation failed to satisfy it because the President's statements were \"overwhelming . . . evidence of anti-Muslim animus\" that made it impossible to conclude that the proclamation had a legitimate basis in national security concerns. Finally, Justice Sotomayor criticized the majority for, in her view, tolerating invidious religious discrimination \"in the name of a superficial claim of national security.\" She compared the majority decision to Korematsu v. United States , a case that upheld as constitutional the compulsory internment of all persons of Japanese ancestry in the United States (including U.S. citizens) in concentration camps during World War II. (The majority responded that unlike the exclusion order in Korematsu the proclamation did not engage in express, invidious discrimination against U.S. citizens and that, as such, \" Korematsu has nothing to do with this case.\" The majority also took the occasion to overrule Korematsu âwhich had long been considered bad law but which the Supreme Court had never expressly overruledâcalling it \"gravely wrong the day it was decided.\" ) In conclusion, Trump v. Hawaii leaves some questions unresolved about how the Mandel test works in practice, but Trump v. Hawaii leaves no uncertainty on one point: Mandel and its progeny permit courts to conduct only a vanishingly limited review of executive decisions to exclude aliens abroad. The Court did not decide whether U.S. citizens may challenge exclusion decisions on statutory grounds or whether, and in what circumstances, courts may consider extrinsic evidence of the government's purpose for an exclusion decision or policy. Yet the majority opinion reaffirms that the standard of review that applies to constitutional claims brought by U.S. citizens against the exclusion of aliens abroad is a \"highly constrained\" one that favors the government heavily, even when extrinsic evidence suggests that the Executive may have acted for an unconstitutional purpose. The Mandel line of cases embraces the broad view of congressional power over the admission and exclusion of aliens that the Supreme Court established in Knauff and earlier precedent, although the cases do leave some uncertainty about the outer edges of the congressional power. Mandel and Din appeared to take the absoluteness of Congress's exclusion power as a given. In Din , Justice Kennedy grounded his conclusionâthat a visa denial withstands constitutional attack so long as the government ties the exclusion to a statutory provisionâon the premise that Congress can impose whatever limitations it sees fit on alien entry. In other words, because Congress's limitations are valid per se , executive enforcement of those limitations is also valid. Mandel makes the same point, albeit mainly through omission. Recall that the case concerned application of an INA provision that rendered the Belgian academic ineligible for a visa because he held communist political beliefs. The Court acknowledged that the statute triggered First Amendment concerns by limiting, based on political belief, U.S. citizens' audience with foreign nationals. But the Court did not assess whether the statute violated the First Amendment. Rather, the Court accepted without significant analysis that Congress had the power to impose such an idea-based entry limitation. As a result, the Mandel decision considered only the First Amendment implications of the Attorney General's refusal to waive Mandel's communism-based ineligibility, not the statutory premise of the ineligibility. The untested assumption underlying Mandel and Din âthat Congress's immigration power encompasses the power to exclude based on any criteria whatsoever, including political beliefâraises a fundamental question about the nature of the plenary power. Often, the Supreme Court has described the power as one that triggers judicial deference , meaning that courts may conduct only a limited inquiry when considering the constitutionality of an exercise of the immigration power. But the plenary power doctrine, as some scholars have noted, can be understood another way, one that perhaps makes more sense of Mandel : the \"plenary\" refers to the scope of the power itself, in substance, and not to its immunity from judicial review. The congressional power to admit or exclude aliens is so complete, this theory goes, as to override the constitutional limitations that typically constrain legislative action. For example, the power overrides the First Amendment principles that would invalidate legislation that expressly provides for unfavorable treatment based on political belief in almost any other context. Aspects of Fiallo , however, arguably do not support this concept of a substantively limitless congressional power to regulate alien entry. Unlike Mandel and Din , which examined the Executive's application and implementation of authority delegated by statute, Fiallo squarely considered the constitutionality of a statute itself. And while Fiallo 's outcome (upholding an immigration law that discriminated by gender and legitimacy) aligns with the concept of an unbridled legislative power, the Court's reasoning wavered between statements suggesting that the legislative power might have limits and statements describing the power as absolute. The lack of clarity in the opinion seemed to stem from the awkwardness of applying Mandel âwhich fashioned a rule for review of executive action (the \"facially legitimate and bona fide\" test)âin a case reviewing legislative action. Ultimately, the Fiallo Court cited the Mandel test as an analogue but did not actually apply the test. Rather, the Court upheld the statute at issue under something that looked like a version of rational basis review, one in which a hypothetical justification suffices to sustain the statute. While extremely deferential, this version of rational basis review implies an underlying constitutional limitation against legislative unreasonableness, at least in theory. In other words, an even-handed reading of Fiallo suggests that statutes regulating the admission of aliens must at least be reasonable. Some scholars have argued that Fiallo was incorrectly decided and that stricter constitutional scrutiny should apply to admission and exclusion laws that classify aliens by factors such as race, religion, and gender. To date, this argument does not find support in Supreme Court precedent, particularly not after the Court relied on Fiallo in Trump v. Hawaii to describe the breadth of the political branches' exclusion power. To be sure, the Supreme Court has made clear that Congress cannot deny certain rights to aliens subject to criminal or deportation proceedings within the United States, and that the federal government cannot deny some procedural protections to LPRs returning from brief trips from abroad. But the Court has never suggested that laws regulating the admission of non-LPR aliens trigger anything more than the deferential rational basis review that it applied to the gender-based immigration preferences statute at issue in Fiallo . In other words, the Court has never called Fiallo into question. In one recent case, Sessions v. Morales-Santana , the Supreme Court applied heightened constitutional scrutiny to strike down a derivative citizenship statute that, much like the statute in Fiallo , used gender classifications. However, the Morales-Santana Court distinguished Fiallo and the plenary power doctrine by noting that the statute before it concerned citizenship, not immigration. Accordingly, Morales-Santana does not appear to portend imminent reconsideration of Fiallo . The term after Morales-Santana , the Court applied rational basis review in Trump v. Hawaii to an executive exclusion policy that was based on a statutory delegation of authority, suggesting that nothing more than rational basis review could apply to an exclusion statute itself. To summarize, dicta in two of the exclusion cases that decided challenges to executive action, Mandel and Din , give the impression of a substantively absolute congressional power to control the entry of aliens. But courts have generally interpreted Fiallo , which concerned a direct challenge to a law regulating alien admission and exclusion, to mean that such laws must at least survive a review for reasonableness. To date, the Supreme Court has not heeded calls by some scholars and litigants for more exacting review of laws regulating alien entry. Mandel , Din , and Trump v. Hawaii trace the contours of the Executive's exclusion power. As described above, Mandel 's \"facially legitimate and bona fide reason\" test governs claims that an exclusion decision or policy violates a U.S. citizen's constitutional rights. The Executive satisfies the test by identifying the statutory basis for the exclusion. Where the U.S. citizen challenger proffers extrinsic evidence that the Executive acted with an unconstitutional purpose, it might be proper for a reviewing court to consider that evidence, but only as part of a rational basis inquiry under which the exclusion decision or policy must be upheld if \"it can reasonably be understood to result from a justification independent of unconstitutional grounds.\" However, the cases do not resolve definitively at least three issues about the executive power. These issues, discussed below, are (1) whether the Executive possesses inherent exclusion power, as opposed to solely statutory-based power; (2) the extent to which U.S. persons or entities may challenge an alien's exclusion on statutory grounds; and (3) the extent to which the Constitution limits the Executive's application of broad delegations of congressional power to make exclusion determinations. The Supreme Court's exclusion cases generally indicate that the authority to exclude aliens reaches the Executive through congressional delegation. The cases generally assign the constitutional power to regulate immigration to Congress and imply that an executive exclusion decision or policy must have a basis in statute. Mandel , Din , and Trump v. Hawaii illustrate this implied point: even though all three cases considered the constitutionality of executive action, the Court focused its analysis in each case on a statutory source of authority for the executive action. For instance, in Trump v. Hawaii , the Court analyzed whether the \"Travel Ban\" order fit within the President's authority under INA Â§ 212(f) to \"suspend the entry of all aliens or any class of aliens.\" Trump v. Hawaii and the Court's other exclusion cases proceed on the assumption that executive action to exclude aliens requires statutory authorization. An opposing view held by at least one current Supreme Court Justice posits that the Executive has \" inherent authority to exclude aliens from the country.\" Under this view, Congress does not have authority to constrain executive exclusion decisions. This view arguably finds some support in Supreme Court immigration jurisprudence. Many of the cases, for example, do not distinguish between Congress and the Executive when discussing the constitutional power to regulate immigration, suggesting that the two branches could share the power. Furthermore, at least one pre- Mandel Supreme Court decision states expressly that the Executive possesses inherent authority to exclude aliens. The case makes this statement, however, only to rebuff a challenge to the constitutionality of congressional delegations of immigration authority to executive agencies. In other words, the case states that the Executive has inherent exclusion authority only to explain why Congress may delegate exclusion authority to the Executive, not to establish that the Executive may exclude aliens absent statutory authority. The case goes on to acknowledge that, notwithstanding any inherent executive authority, in immigration matters the Executive typically acts upon congressional direction. The text of the Constitution itself does not resolve whether the Executive has a constitutional power to exclude aliens that is independent of statutory authorization. Because the federal government's immigration power rests at least in part upon an \"inherent power as a sovereign\" not enumerated in the Constitution, courts cannot determine who owns the power by reading Article I or Article II. Neither does Supreme Court precedent resolve the issue definitively. In one 1915 case, Gegiow v. Uhl , the Court held that an executive exclusion decision violated the governing statute. That holding implies that legislative restrictions on such decisions are constitutionally valid. But that brief decision did not discuss the concept of inherent executive authority over immigration, and more recent exclusion cases have not decided the issue because they have resolved statutory challenges by holding that the executive action at issue complied with the relevant statutes. On balance, the weight of authority favors the view that the power to exclude aliens belongs primarily to Congress, at least in the first instance. The idea that the Executive could exclude aliens in contravention of a statuteâor, to a lesser extent, without statutory authorizationâwould challenge separation of powers principles and does not find support even in the one Supreme Court opinion that expressly endorses the concept of an inherent executive immigration power. The idea of an extra-statutory executive exclusion power would also undermine basic features of the Court's exclusion jurisprudence, such as the long-standing rule that a court reviewing the exclusion of an arriving alien in habeas corpus proceedings must ascertain whether immigration officers had statutory authorization to make the exclusion determination. The point remains, however, that the Court has not established clearly that the Executive may not exclude aliens in contravention of a statute or without statutory authorization. This lack of definitive precedent on the issue may result from Congress's extremely broad delegation of exclusion authority to the Executive, most notably in INA Â§ 212(f), and from the limited judicial review available for executive enforcement of exclusion statutes. Finally, a specific aside about the field of diplomacy: because the Reception Clause of the Constitution grants the President the exclusive power to \"receive Ambassadors and other public Ministers,\" it seems more than plausible that a President could override a statute at least when making decisions about the admission or exclusion of foreign diplomats. Because executive exclusion power appears to derive primarily from statute, executive exclusion decisions or policies are susceptible in theory to attack on the ground that they violate the governing statutes. In Trump v. Hawaii , for instance, the Supreme Court analyzed and rejected arguments that the \"Travel Ban\" exclusion policy violated provisions of the INA. But the Court declined to resolve a threshold question about such challenges: whether they are barred by the doctrine of consular nonreviewability, which, as discussed above, forms part of the general rule against judicial review of exclusion decisions. Specifically, consular nonreviewability prohibits judicial review of a visa denial unless the denial burdens the constitutional rights of a U.S. citizen, in which case the deferential standard of review under the Mandel line of cases applies to the constitutional claim. The Mandel Court, in recognizing for the first time that U.S. citizens could challenge exclusion decisions despite the bar against such suits when brought by aliens, spoke narrowly of constitutional claims by U.S. citizens. Trump v. Hawaii reasoned that the statutory claims at issue there failed on the merits even if they were subject to judicial review, and the Court therefore declined to answer whether the Mandel exception also encompasses statutory claims brought by U.S. citizens against the exclusion of aliens abroad. At least two federal circuit courts have held that the doctrine of consular nonreviewability bars U.S. citizen challenges to visa denials on statutory grounds, at least when the citizen does not also state constitutional claims. These courts reasoned that permitting review of purely statutory claims would \"convert[] consular nonreviewability into consular reviewability\" and \"eclipse the Mandel exception\" by subjecting statutory claims to a more exacting level of review under the APA than constitutional claims receive under the \"highly constrained\" review that applies under the Mandel line of cases. On the other hand, in two other cases involving a combination of statutory and constitutional claims brought by U.S. citizens against visa denials, courts in the First Circuit and D.C. Circuit reviewed the statutory claims and rejected or called into question the visa denials on statutory grounds. One of these decisions concluded that the statutory claims were reviewable because, among other rationales, the canon of constitutional avoidance required the court to construe the relevant statutes before considering whether the Executive's application of the statutes violated the Constitution. In both cases, the courts analyzed the statutory claims without deferring to the government's determination that the INA required the denial of the visa applications at issue. As a result, the cases scrutinized the government's justifications for excluding aliens much more closely than the Supreme Court analyzed the constitutional claims in Trump v. Hawaii , Mandel , and Din . It was the Ninth Circuit's disagreement with this framework endorsed by the First and D.C. Circuitsâthat statutory challenges to visa denials should draw stricter review than constitutional challengesâthat led it, among other reasons, to hold in a pure statutory case that consular nonreviewability bars statutory claims. The Supreme Court has on at least two occasions rejected statutory challenges brought by U.S. citizens or organizations against the exclusion of aliens abroad without deciding whether such challenges are subject to judicial review. As already mentioned, in Trump v. Hawaii , the Court acknowledged but did not decide the reviewability question in a case that involved a combination of statutory and constitutional claims brought by U.S. citizens and other U.S. parties. In the 1993 case Sale v. Haitian Centers Council , the Court considered and ultimately rejected statutory challenges to the U.S. Coast Guard's interdiction and forced return of Haitian migrants trying to reach the United States by sea. Specifically, the Court analyzed and rejected the argument that the interdictions violated an INA provision requiring immigration authorities to determine whether aliens would suffer persecution in a particular country before returning them to that country. The Sale Court did not address the consular nonreviewability issue, even though the government argued it, but instead seemed to assume without discussion that the statutory challenges to the interdictions and forced returns were reviewable. The only clear holding about consular nonreviewability that arises from Hawaii and Sale is that the doctrine does not deprive federal courts of subject matter jurisdiction over statutory challenges brought by U.S. citizens against the exclusion of aliens abroad, even though the doctrine might supply a rule of decision requiring courts to reject such statutory challenges without reviewing their merits. In summary, federal appellate courts have held that the doctrine of consular nonreviewability bars exclusively statutory challenges brought by U.S. citizens against the executive branch decisions to exclude aliens abroad, but not where the citizens also press constitutional challenges. The Supreme Court has not resolved the issue, but the Court reviewed statutory challenges that were combined with constitutional challenges in Trump v. Hawaii and reviewed exclusively statutory challenges in Sale . Justice Kennedy concluded in Din that the plenary nature of Congress's power to exclude aliens means that an executive exclusion decision for a statutory reason is facially legitimate and bona fide. But what about where Congress transfers its exclusion power to the Executive with few limiting criteria? What constitutional restrictions does the Executive face in that scenario? Trump v. Hawaii indicates that the Executive, at least in theory, must comply with constitutional guarantees when exercising power delegated from Congress to create exclusion policies. Even though the Court in that case engaged in only a \"highly constrained\" level of judicial review, it stated that the purpose of the review was to determine whether the challenged exclusion policy could \"reasonably be understood to result from a justification independent of unconstitutional grounds.\" Presumably, if the Court had concluded that the \"Travel Ban\" proclamation was \"'inexplicable by anything other than [anti-Muslim] animus,'\" it would have struck down the proclamation for violating the Establishment Clause. Although the proposition that constitutional guarantees restrict executive exercises of exclusion authority may seem unremarkable, the Court actually avoided deciding this issue in Mandel . The relevant statute in that case gave the Attorney General broad discretion to waive the communism-based ground for exclusion. The parties and the Court assumed that Congress had the authority to exclude communists based on their political ideas. The executive branch argued that it, too, could exercise congressionally delegated exclusion authority to deny entry based on political belief or for \"any reason or no reason.\" The Mandel Court, in adopting the \"facially legitimate and bona fide\" standard, avoided addressing this contention. The Court reasoned that it did not have to decide whether the government could deny an inadmissibility waiver for \"any reason or no reason\" because the government had in fact supplied a reason for denying Mandel's waiverâhis alleged prior visa abuseâ\"and that reason was facially legitimate and bona fide.\" Thus, Mandel left open the possibility that the First Amendment could limit the executive branch's, but not Congress's, power to exclude based on political belief, but the Court did not decide the issue. After Trump v. Hawaii , however, it seems relatively clear that executive exclusion policies must find support in justifications that are \"independent of unconstitutional grounds,\" even though courts will apply only a \"narrow standard of review\" to assess those justifications. In other words, constitutional guarantees might not restrict Congress's exercise of the exclusion power, but they apparently do restrict the Executive's exercise of exclusion power delegated to it by Congress. The Supreme Court has consistently reaffirmed that legislative and executive decisions to exclude aliens abroad are \"'largely immune from judicial control.'\" The doctrine of consular nonreviewability bars judicial review of decisions to exclude aliens abroad in most circumstances. And even where such decisions burden the constitutional rights of U.S. citizens, the Mandel line of cases stands for the proposition that federal courts must grant the decisions a level of deference so substantial that it mostly assures government victory over any challenges. Notably, however, Supreme Court precedent mainly describes the deference due to executive exclusion decisions as an issue within Congress's control. The doctrine of consular nonreviewability and the Mandel line of cases take their cue from legislative inaction: because Congress has not said that courts may review executive decisions to exclude aliens abroad, courts mostly do not conduct such review or (where constitutional claims of U.S. citizens are at stake) conduct only an extremely limited form of review. Ultimately, the cases indicate that Congress has authority to expand review through affirmative legislation. ", "summary": "Supreme Court precedent establishes that inherent principles of sovereignty give Congress \"plenary power\" to regulate immigration. The core of this powerâthe part that has proven most impervious to judicial reviewâis the authority to determine which non-U.S. nationals (aliens) may enter the United States and under what conditions. The Court has also established that the executive branch, when enforcing the laws concerning alien entry, has broad authority to do so mostly free from judicial oversight. Two principles frame the scope of the political branches' power to exclude aliens. First, nonresident aliens abroad generally cannot challenge exclusion decisions because they do not have constitutional rights with respect to entry and cannot obtain judicial review of the statutory basis for their exclusion unless Congress provides otherwise. Second, even when the exclusion of a nonresident alien burdens the constitutional rights of a U.S. citizen, the government need only satisfy a \"highly constrained\" judicial inquiry to prevail against the citizen's constitutional challenge. The Supreme Court developed the first principleâthat nonresident aliens generally cannot challenge exclusion decisionsâin a line of late 19th to mid-20th century exclusion cases. These cases culminated in the 1950 decision United States ex rel. Knauff v. Shaughnessy , in which the Court declared that \"it is not within the province of any court, unless expressly authorized by law, to review the determination of the political branch of the Government to exclude a given alien.\" This rule forms the basis of the doctrine of consular nonreviewability, which in almost all circumstances bars nonresident aliens abroad from challenging visa denials by U.S. consular officers. But the rule set forth in Knauff applies with less force to decisions to exclude aliens arriving at the border. Aliens at the cusp of entry into the United States may be detained by immigration authorities pending their removal. Their cases can trigger habeas corpus proceedings for that reason and may also implicate complex statutory frameworks on judicial review. The second principle, concerning exclusion decisions that burden the rights of U.S. citizens, has been the primary subject of the Supreme Court's modern exclusion jurisprudence. In four cases since 1972â Kleindienst v. Mandel , Fiallo v. Bell , the splintered Kerry v. Din , and Trump v. Hawaii âthe Court has recognized that U.S. citizens who claim that the exclusion of aliens violated the citizens' constitutional rights may obtain judicial review of the exclusion decisions. Yet the standard of review that the Court applies to such claims is so deferential to the government as to all but foreclose U.S. citizens' constitutional challenges. In the most recent case, Trump v. Hawaii , the Court applied a \"highly constrained\" level of review to uphold a broad executive exclusion policy notwithstanding some evidence that the purpose of the policy was to exclude Muslims. The Mandel line of cases reaffirms the unique scope of Congress's power to legislate for the exclusion of aliens. Exclusion statutes draw minimal judicial scrutiny even when they classify people by disfavored criteria, such as gender or legitimacy. With respect to the executive power, the cases reaffirm generally that, in the absence of statutory provisions to the contrary, courts play almost no role in overseeing the application of admission and exclusion laws to nonresident aliens abroad. However, the cases leave some questions about executive exclusion power unresolved, including whether the Executive has inherent, constitutional power to exclude aliens and whether U.S. citizens may bring statutory challenges against executive decisions to exclude aliens abroad.", "document_type": "crs"}
{"report": "The United States has been a global leader in developing advanced genetic technologies and applying them to crops and livestock. Federal regulators first approved a genetically engineered (GE) food, the Flavr Savr tomato, for sale in 1994. As additional GE crops gained federal approval, farmers rapidly adopted them. Today, about 90% of canola, corn, cotton, soybean, and sugarbeet acres in the United States are planted with GE varieties. GE foods predominantly enter commerce as processed foods and food ingredients (e.g., soybean oil, corn syrup, and sugar). Some members of the public seek to avoid consuming GE foods, as advances in biotechnology have outpaced their acceptance. In July 2016, Congress enacted P.L. 114-216 (the 2016 Act), requiring the U.S. Department of Agriculture (USDA) to establish a National Bioengineered Food Disclosure Standard (the Standard) within two years. The 2016 Act followed decades of societal debate about genetic engineering, and it marked the first time that the federal government would require the disclosure of GE foods to consumers. (The 2016 Act defined these as bioengineered foods .) With the 2016 Act, the United States joined more than 60 countries that require some form of GE labeling , or on-package disclosure of GE foods or food ingredients. The Standard provides a mandatory national standard for disclosure of the presence of bioengineered foods and food ingredients to consumers. It details who is responsible for making disclosures, what they must look like, and when they are and are not required. The Standard provides U.S. food manufacturers, importers, and retailers with a voluntary compliance period and a mandatory compliance deadline. The more than 126,000 comments that USDA received during the rulemaking process demonstrate significant public interest in its formulation. USDA released the final rule in December 2018, and phased implementation began in January 2020. Stakeholder reactions to the final Standard have been mixed. Several organizations immediately criticized the final rule, while others supported it. The Organic Trade Association (OTA), the Center for Food Safety (CFS), the Non-GMO Project, and the Institute for Agriculture and Trade Policy (IATP) each released statements with critical comments. OTA remarked that it is \"deeply disappointed in the U.S. Department of Agriculture's final GMO labeling rule and calls on companies to voluntarily act on their own to provide full disclosures on their food products about GMO content.\" CFS stated that \"the USDA has betrayed the public trust by denying Americans the right to know how their food is produce[d].\" The Non-GMO Project commented that it \"is disappointed by the content of the final rule, which jeopardizes GMO transparency for Americans.\" IATP stated that \"unfortunately, the final rule fails to fix the most egregious provisions of the draft rule and is practically useless in conveying accurate information about food ingredients to consumers while they are shopping.\" In contrast, the National Corn Growers Association (NCGA), the American Soybean Association (ASA), and the Food Marketing Institute (FMI) provided supportive comments. NCGA commented that \"America's corn farmers need a consistent, transparent system to provide consumers with information without stigmatizing important, safe technology. Thus, we are pleased with the issuance of these rules and look forward to reviewing the details in the coming days.\" ASA stated, \"we believe that it allows transparency for consumers while following the intent of Congress that only food that contains modified genetic material be required to be labeled bioengineered under the law, with food companies having the option of providing additional information if they choose.\" FMI stated, \"the rule provides a consistent way to provide transparency regarding the foods we sell and allow[s] our customers across the country the means to learn more about grocery products containing bioengineered ingredients.\" This report provides background information on agricultural biotechnology; reviews major provisions of the Standard (related to applicability, disclosure options, and administrative provisions); and concludes with potential considerations for Congress. The Appendix provides definitions of select scientific and related terms used in this report. People have been changing plants, animals, and other edible organisms since before agriculture began more than 10,000 years ago. Before people planted crops and raised farm animals, hunting and gathering changed the genetic composition of species. The pace of these changes accelerated with the onset of agriculture. Selective breeding helped create and improve agricultural varieties to meet farmer and consumer needs. Conventional (traditional) breeding created hybrid varieties with enhanced size, growth rate, and other valuable characteristics. Since the mid-20 th century, laboratory-based breeding techniques have further strengthened the ability to modify agricultural varieties. In recent decades, genetic engineering has allowed for increasingly specific genetic manipulation. These techniques can change plants and animals in ways that, with conventional breeding, would not be possible or could take decades to achieve. The public has come to recognize plants and animals altered through modern biotechnology and genetic engineering as genetically modified organisms (GMOs) . Scientific and federal government experts identify the term g enetically modified as more general than genetically engineered , and as such genetically modified may include conventional breeding. In this report, genetic engineering refers to genetic modification techniques other than conventional breeding. The Standard addresses food labeling, and it does not change how foods derived from biotechnology are regulated for safety and approval for human or animal consumption. The federal government's 1986 Coordinated Framework for Regulation of Biotechnology (the Coordinated Framework) governs how USDA, the U.S. Food and Drug Administration (FDA), and the U.S. Environmental Protection Agency (EPA) apply existing statutes to evaluate biotechnology products. USDA regulates plants under the Plant Protection Act (7 U.S.C. Â§7701 et seq.). FDA regulates food, animal feed additives, and human and animal drugs, primarily under the Federal Food, Drug, and Cosmetic Act (21 U.S.C. Â§301 et seq.) and the Public Health Service Act (42 U.S.C. Â§201 et seq.). EPA registers and approves the use of pesticides, including those incorporated into plants through biotechnology, under the Federal Insecticide, Fungicide and Rodenticide Act (7 U.S.C. Â§136 et seq.). A key principle of the Coordinated Framework is to regulate products according to their characteristics and unique features rather than the processes used to develop them. More generally, FDA and the USDA Animal and Plant Health Inspection Service (APHIS) have responsibilities for assuring that foods sold in the United States are safe, with respect to human and agricultural health, and properly labeled. FDA released a policy statement on GE foods in 1992, indicating that in most cases they are \"substantially similar\" to non-GE foods and do not require additional regulation or labeling beyond what is required for comparable non-GE foods. A legal decision in 2000 upheld this policy. FDA requires labeling of GE foods that (1) have nutritional characteristics that differ from comparable non-GE foods, (2) contain GE material from known allergenic sources, or (3) have elevated levels of toxic compounds. This labeling is not required to indicate the GE status of the food. APHIS reviews GE organisms on the basis of whether they pose plant pest risks to agriculture. In 2019, the agency issued a proposed rule to exempt several categories of GE plants from review, citing 30 years of evidence indicating that \"genetically engineering a plant with a plant pest as a vector, vector agent, or donor does not in and of itself result in a GE plant that presents a plant pest risk.\" The proposed rule further stated that new GE technologies, such as gene editing, do not engage with plant pests in any way. The Standard provides a mandatory national standard for disclosure of the presence of bioengineered foods and food ingredients to consumers. It provides U.S. food manufacturers, importers, and retailers with a voluntary compliance period and a mandatory compliance deadline. Following enactment of the 2016 Act, USDA delegated development and implementation of the Standard to the USDA Agricultural Marketing Service (AMS), which oversees many other USDA food-labeling programs, including mandatory Country of Origin Labeling (COOL), the voluntary National Organic Program (NOP), and the voluntary Process Verified Program (PVP). AMS developed the Standard through federal rulemaking, and issued the final rule in December 2018. The final rule defines key terms and interprets issues arising from the 2016 Act. The text box below includes terms defined in the Standard. The Standard identifies regulated entities as the food manufacturers, importers, and retailers responsible for making disclosures under the Standard. All regulated entities must comply with the Standard by January 1, 2022, although disclosures may begin during the voluntary compliance period, which started on January 1, 2020. As required for economically significant regulations, AMS prepared and published a regulatory impact analysis (RIA) of the Standard. The RIA estimates that implementation will cost between $570 million and $3.9 billion in the first year, and between $52 million and $118 million in each following year. It attributes most first year costs to those incurred by manufacturers analyzing the applicability of the rule and their compliance with the rule ($401 million to $3.1 billion). After the first year, the RIA attributes most ongoing costs to regulated entities avoiding mandatory disclosures by verifying that foods are not subject to the Standard ($0 to $59 million) and replacing bioengineered ingredients with non-bioengineered ingredients ($41 million to $44 million). The RIA estimates annual financial benefits of $190 million to $565 million, mostly attributed to costs avoided: the costs of complying with a patchwork of state laws, which are avoided and by implementation of the federal Standard. The RIA does not anticipate that the new Standard will provide any benefits to human health or the environment. Key provisions of the Standard, along with associated issues raised by stakeholders, are identified below within three categories: (1) applicability, (2) disclosure options, and (3) administrative provisions. Many components of the Standard remain controversial. Public reactions are discussed after each category. The Standard addresses its applicability to specific types of foods and types of entities involved in the manufacture, sale, and distribution of food. These issues were debated in policy discussions about GE food labeling, and they range from how the Standard defines a bioengineered food to which entities must comply with the Standard and which are exempt. The 2016 Act defined bioengineering , with respect to food, as a food \"(A) that contains genetic material that has been modified through in vitro recombinant deoxyribonucleic acid (DNA) techniques; and (B) for which the modification could not otherwise be obtained through conventional breeding or found in nature.\" It did not identify any specific technologies that would meet the definition of bioengineering . The 2016 Act specified that bioengineering referred to foods \"intended for human consumption,\" and the act left open the possibility that USDA could use additional similar terms in the Standard. When issuing the Standard, USDA added detail to some statutory definitions and did not provide explicit definition of some other terms. While the Standard builds on the definition of bioengineering by describing the applicability of term, it does not define component parts of the definition, including conventional breeding or found in nature . Nor does it specify whether foods developed through specific technologies, such as gene editing, require disclosure to consumers. The Standard requires use of the term bioengineering rather than similar terms, such as genetic engineering , genetically modified , or GMO . The final rule sets boundaries for the foods that require disclosure. Based on the definition of bioengineering in the 2016 Act, AMS determined that certain products that derive from GE sources do not require labeling. The Standard identifies these exclusions in its definition of bioengineered food . They include animal feed, which is not considered food because it is not intended for human consumption; foods in which modified DNA is not detectable (e.g., refined oils and sugars); and incidental additives, as described in 21 C.F.R. 101.100(a)(3). The Standard expressly exempts other foods and substances described below. The text box at the end of this section summarizes exclusions and exemptions from the Standard. The Standard identifies five exemptions from disclosure. The 2016 Act explicitly identified two of these: food served at restaurants or similar retail food establishments, and food produced by very small food manufacturers. The act called for the Standard to set a third exemption: foods containing an amount of a bioengineered substance below a certain threshold. The final two exemptions are for foods derived from animals solely because they consumed bioengineered feed, and food certified under the USDA National Organic Program (NOP). The 2016 Act exempts from disclosure food served in a restaurant or similar retail food establishment . The Standard defines this term as follows: A cafeteria, lunch room, food stand, food truck, transportation carrier (such as a train or airplane), saloon, tavern, bar, lounge, other similar establishment operated as an enterprise engaged in the business of selling prepared food to the public, or salad bars, delicatessens, and other food enterprises located within retail establishments that provide ready-to-eat foods that are consumed either on or outside of the retailer's premises. The 2016 Act exempts from disclosure food produced by a very small food manufacturer . The Standard defines this term as \"any food manufacturer with annual receipts of less than $2,500,000.\" The 2016 Act called for USDA to \"determine the amounts of a bioengineered substance that may be present in food, as appropriate, in order for the food to be a bioengineered food.\" The Standard exempts \"food in which no ingredient intentionally contains a bioengineered (BE) substance, with an allowance for inadvertent or technically unavoidable BE presence of up to five percent (5%) for each ingredient.\" The 2016 Act specified that the Standard should not consider food derived from animals to be bioengineered food solely because those animals consumed bioengineered feed. The Standard exempts such foods. Food products such as meat, eggs, or milk derived from animals that consumed bioengineered feed do not require disclosure solely because the animals consumed bioengineered feed. The 2016 Act specified that NOP certification \"shall be considered sufficient to make a claim regarding the absence of bioengineering in the food, such as 'not bioengineered,' 'non-GMO,' or another similar claim.\" The Standard explicitly exempts foods certified under NOP. NOP is a voluntary food labeling program managed by AMS and operated as a public-private partnership. NOP certifies that agricultural products have been produced using approved organic methods listed in statute. Among NOP's diverse criteria, genetic engineering is an excluded method: NOP-certified products may not be produced or handled with genetic engineering. Thus, such products are not bioengineered and are exempted from the Standard. The 2016 Act directed USDA to establish \"such requirements and procedures as the Secretary [of Agriculture] determines necessary to carry out the standard.\" During rulemaking, AMS requested public comment on the utility of maintaining a list of potentially regulated foods, for entities to consult when determining whether a food is subject to disclosure. The final Standard includes a List of Bioengineered Foods (the List), that identifies foods that are available in a bioengineered form. While there are bioengineered and non-bioengineered versions of all foods on the List, only the bioengineered versions may require disclosure. The final rule details how AMS considered including on the List, but ultimately did not include, enzymes, yeasts, and other microorganisms produced in controlled environments. The rule states that regulated entities would need to make determinations on whether these substances require recordkeeping or disclosure on a case-by-case basis. AMS also publishes the List and associated details on its website. Beginning in early 2020, AMS plans to update the List annually, with associated opportunities for public comment. AMS plans to notify the public of the review via the Federal Register and the AMS website. If needed, AMS plans to update the List through the federal rulemaking process. See the text box below for foods on the List as of January 2020. The Standard's definition of bioengineered food , and what it applies to, remains controversial. Some areas of disagreement among stakeholders include the use of bioengineered rather than alternative terms, the definition's treatment of gene editing and new genetic technologies, the definition's treatment of refined food products, and the disclosure threshold for inadvertent or technically unavoidable presence of GE ingredients. Some farmer and industry groups have praised the Standard, contending that it provides consumers and regulated entities with needed consistency and transparency. Some advocates of stricter GE labeling argue that it is too permissive because many foods they consider genetically engineered do not require disclosure. These issues are addressed below. Alternative terms. The terminology used in the Standard has been a point of contention. While USDA had statutory authority to use alternative terms to bioengineered , it did not do so . Some stakeholder groups argue that most consumers are unfamiliar with the term bioengineered . They assert that using other terms, such as GMO , genetically modifi ed organism , or genetically engineered , would be less confusing for consumers. Other groups contend that the Standard's language is precise. Gene editing and n ew genetic technologies. The Standard's definition of bioengineered food does not identify specific technologies used to create such foods. AMS states that the Standard's definition \"focuses primarily on the products of technology, not the technology itself.\" During rulemaking, some stakeholders had called for the Standard to explicitly address the status of foods derived from new genetic technologies that may not meet the statutory definition of bioengineering . For example, foods derived from gene editing may not meet the statutory definition of bioengineering if (a) they do not contain recombinant DNA or (b) AMS considers that that their modifications could be achieved through conventional breeding or found in nature. Other new genetic technologies may arise that do not meet the Standard's definition of bioengineering for these or other reasons. Because the Standard does not address specific technologies, consumers and regulated entities may lack clarity about whether or not foods derived from new genetic technologies must be disclosed under the Standard. In the absence of this information, many have interpreted the bioengineering definition as broadly excluding foods derived from gene editing. Under this interpretation, gene-edited foods would not require disclosure. Other interpretations of the Standard simply note that the final rule does not explicitly address gene editing or other new genetic technologies. Advocates of stricter GE labeling requirements contend that even though gene-edited foods seem to be excluded from the Standard's definition of bio engineering , such foods meet the common understanding of genetic engineering and therefore should be required to bear disclosures. R efined foods exclusion. The Standard excludes refined food products that do not contain detectable amounts of modified DNA from required disclosure. Food without detectable modified genetic material does not meet the statutory definition of bioengineered . Examples include soybean oil, canola oil, and refined sugar. The Standard does not require regulated entities to test every product for the presence of detectable modified genetic material. Rather, manufacturers, importers, and retailers can demonstrate the absence of modified genetic material with records of a validated refining process. Some groups that favor a more expansive definition of bioengineered foods argue that consumers want to know whether the foods they eat derive from GE plants and animals, and thus the Standard should have required disclosures for these refined foods. In contrast, some industry groups, including the Consumer Brands Association (formerly the Grocery Manufacturers Association), commended the Standard for providing regulated entities with the option to voluntarily disclose such foods if desired. Disclosure threshold. The Standard does not require disclosures for foods with up to 5% presence, per ingredient, of unintentional or technically unavoidable bioengineered substances. In comparison, the European Union applies a threshold of 0.9% per ingredient, and Australia and New Zealand use a threshold of 1% per ingredient. Foods in Japan must be labeled if a GE ingredient is among the top three ingredients and accounts for more 5% of the total product by weight. AMS selected the 5% threshold for the Standard to \"appropriately balance providing disclosure to consumers with the realities of the food supply chain.\" Some advocates of stricter GE labeling, such as OTA, argue that the threshold in the Standard is too high and is \"inconsistent with accepted private standards, most of our major global trading partners and unacceptable to consumers.\" The Standard identifies permissible options for on-package disclosure of bioengineered foods. All disclosures must be \"of sufficient size and clarity to appear prominently and conspicuously on the label, making it likely to be read and understood by the consumer under ordinary shopping conditions.\" Regulated entities must place the disclosure in one of three places: within the information panel close to details about the manufacturer, on the principle display panel, or on another panel the consumer is likely to see. In most cases, only one form of disclosure is required per package. Some disclosure options are available to all regulated entities for required disclosures (text, symbol, electronic or digital link, and/or text message), while others are available only to small food manufacturers (telephone number or website address) or in cases of voluntary disclosure (voluntary version of the BE disclosure symbol). Each option is described below. The 2016 Act specified that the Standard should provide several types of disclosure options. The final rule gives additional detail to their implementation. Text. \"Bioengineered food\" is the required text to disclose foods for which all ingredients either meet the definition of bioengineered food or lack records that indicate whether or not they are bioengineered. \"Contains a bioengineered food ingredient\" is the text required to disclose multi-ingredient foods for which some ingredients are not bioengineered while others are bioengineered or are of undetermined status. For foods distributed solely within a U.S. territory where the predominant language is not English, the appropriate text disclosure may be displayed in the territory's predominant language. Symbol. Regulated entities may use color or black-and-white versions of the disclosure symbols shown in Figure 1 . The symbol that incorporates the word bioengineered is for products that require disclosure. The symbol that incorporates the phrase derived from bioengineering may be placed voluntarily on packages of food that do not meet the bioengineered food definition but contain food that is derived from bioengineered food (such as refined foods without detectable modified DNA). Disclosures must not be false or misleading. Entities that are exempt from mandatory disclosure (e.g., very small food manufacturers and restaurants) may make voluntary disclosures using the appropriate symbol. Electronic or digital link . Entities may disclose bioengineered food via electronic or digital links, which are codes that consumers can scan to access more information. Current examples include Quick Response (QR) codes and digital watermarks that consumers may scan with a smart phone or in-store scanner. The code may embed product information or a link to a website with this information presented on the first webpage. The 2016 Act and the Standard require that any electronic or digital link disclosure on a package must be accompanied by the text \"Scan here for more food information\" or equivalent language consistent with technological changes. They also require that such disclosures be accompanied by a telephone number that consumers may call to receive additional information. Providing disclosure via these technologies was among the most controversial aspects of the 2016 Act. In the 2016 Act, Congress required USDA to solicit public comment and conduct a study to determine if electronic or digital links would provide consumers with sufficient access to information while shopping. If USDA were to determine that these disclosure methods were insufficient in this regard, then the Standard would need to provide additional disclosure options. AMS contracted with Deloitte Consulting to conduct the study. The resulting report identified several challenges that would need to be overcome for consumers to access information through digital or electronic link disclosures. AMS determined that the Deloitte study indicated that electronic and digital links would not provide consumers with sufficient access to this information. Text message . In response to public comments and the results of the Deloitte study, the Standard adopts disclosure by text message as an option in addition to those identified in the 2016 Act. Regulated entities choosing this option must include a clear statement on the food package describing how to receive a text message. The Standard defines a small food manufacturer as one with annual receipts of between $2.5 million and $10 million. As directed in the 2016 Act, the Standard allows small food manufacturers to select from additional disclosure options. These consist of providing a telephone number or an internet website address to allow consumers to access more information. Such disclosures must be accompanied by the text \"Call [number] for more food information\" or \"Visit [Uniform Resource Locator of the website] for more food information.\" The Standard specifies additional considerations for small and very small packages as well as food sold in bulk containers. The additional disclosure options for small packages mirror the standard options but allow for abbreviated on-package text: \"Scan for info,\" \"Text [number] for info,\" and \"Call [number] for info.\" For very small packages, regulated entities may use a label's preexisting telephone number or website address in lieu of other disclosures. Retailers are responsible for disclosures for food sold in bulk containers (e.g., display case, bin, carton, and barrel), and they must use the primary disclosure options. The Standard allows for voluntary disclosure in some cases. Exempt entities (very small food manufacturers and restaurants and similar retail food establishments) may voluntarily disclose bioengineered foods and food ingredients using any of the options provided. Additionally, the Standard permits both regulated and exempt entities to voluntarily disclose foods that do not require mandatory disclosure. Such foods include refined foods that derive from bioengineered foods but do not have detectable modified DNA. Voluntary disclosures should indicate that ingredients are \"derived from bioengineering\" rather than \"bioengineered.\" The Standard does not permit voluntary disclosure in most other circumstances. During the rulemaking process for the Standard, some advocates for strict GE labeling provisions were seeking a single, easily identifiable, on-package disclosure. These respondents have criticized the disclosure options in the Standard as confusing and uninformative. In contrast, some other groups sought flexible disclosure options that regulated entities could adapt easily to different circumstances. Such industry groups have supported the disclosure options in the Standard as informative and flexible enough for manufacturers to meet. Among critics, the Organic Trade Association (OTA) argued that the Standard does not provide for meaningful disclosure. It stated that the Standard \"allows for the option of digital/electronic disclosures rather than requiring on-pack plain English text disclosure\" and that the \"stylized GMO symbol with a four-pointed starburst does not reflect a neutral symbol as Congress intended and is misleading.\" The Center for Food Safety (CFS) found that \"both disclosure methods [electronic and digital disclosure], as well as 800 numbers, are unwieldy, time-consuming, and clearly designed to inhibit rather than facilitate access to GE content information.\" The International Dairy Foods Association (IDFA) provided a mixed reaction, approving of some aspects of the Standard while further stating, \"the rule does not provide the level of transparency IDFA and consumers were hoping for.\" Among other perceived limitations, IDFA added that the Standard does not require disclosure of highly refined ingredients deriving from GE foods, although it allows for voluntary disclosure of these products. Among supporters of the Standard, the Food Marketing Institute and the National Corn Growers Association welcomed the disclosure consistency that the Standard provides. The Standard's inclusion of a voluntary disclosure option elicited mixed responses. While the Consumer Brands Association praised this option, the Center for Science in the Public Interest (CSPI) commented that voluntary disclosure could introduce confusion. CSPI identified the potential for consumers to encounter a single type of product, derived from bioengineering, that one company chose to voluntarily disclose and another company did not. OTA called on food companies to voluntarily disclose all foods produced with genetic engineering. Stakeholders have also focused on the administrative provisions of the Standard. Key administrative issues include the speed at which regulated entities must comply with the Standard, recordkeeping requirements and burdens, and the enforceability of the Standard. These topics are addressed below. The 2016 Act did not specify compliance dates for the Standard. The final rule allows for phased implementation before requiring all regulated entities to comply with the Standard (see Table 1 ). It sets January 1, 2020, as the date on which most regulated entities may begin implementation. Small food manufacturers have an additional year to begin implementation, with a start date of January 1, 2021. All regulated entities must fully comply with the Standard by January 1, 2022. In the RIA, AMS commented that it provides the List of Bioengineered Foods to \"simplify and minimize analysis and recordkeeping burden on regulated entities.\" The Standard requires regulated entities that sell foods on the List, including both bioengineered and non-bioengineered versions, to maintain records documenting whether or not those foods or their ingredients are bioengineered. The Standard does not require potentially regulated entities to maintain records for foods that are not on the List unless they know that a food is bioengineered. This situation could occur if AMS has not yet identified the food as commercially available and has not yet added the food to the List. In such cases, the entity must disclose the food and must maintain records. Regulated entities may determine what records to keep and how to manage them, as long as they contain sufficient detail for AMS to understand and audit them under the Standard. Entities must maintain these records for two years after sale or distribution of the food. Failure to make a required disclosure is prohibited under the 2016 Act. However, the act limited the scope of potential enforcement mechanisms and remained silent on others. The 2016 Act explicitly prohibited USDA from recalling food for known or suspected violations of the Standard. It did not address or authorize potential civil penalties for violations. The act allowed USDA to enforce compliance through records audits, examinations, hearings, and public disclosure of findings. The Standard identifies procedures for carrying out these enforcement mechanisms. AMS does not continuously and proactively verify compliance with the Standard. Rather, the Standard creates a mechanism for the public to file statements or complaints to the AMS Administrator about possible violations of the Standard, and it outlines how AMS may respond to these written statements or complaints. If AMS determines that a complaint warrants further investigation, AMS may audit or examine the records of the entity responsible for disclosure and make its findings available to the entity. The entity may then request a hearing if it objects to the findings. The Standard allows for AMS to revise the findings if warranted and provides that AMS will make the final results of the investigation publicly available. While most stakeholder responses to the final Standard have focused on applicability and disclosure options, some interested groups have commented on its administrative provisions. Before release of the Standard, advocates of strict GE labeling had called for an early start to the mandatory compliance period. However, some industry groups supported the delay of mandatory compliance, citing the need to allow sufficient time for regulated entities to adjust labels and recordkeeping procedures. Echoing comments that AMS received during the federal rulemaking process, some critics of the Standard have continued to assert that its enforcement mechanisms are weak. The National Bioengineered Food Disclosure Standard was developed within a broader societal context. State-level approaches to GE labeling predated the federal 2016 Act. These were driven by public interest in knowing the GE status of their foods. In addition, some private and federal voluntary labeling programs that provide information on the GE status of foods are expected to continue after implementation of the Standard. When foods containing GE ingredients were first introduced in the 1990s, some members of the public called for banning them based on concerns about potential harm to human health. Research has repeatedly found no difference between foods developed with and without genetic engineering, in terms of the health and safety of the people consuming them. Even so, some consumers remain concerned about genetic engineering, citing health, personal preference, religious, economic system, and other objections. Moving on from calls to ban GE foods for human health reasons, many consumers began to demand a government role in making GE foods easily identifiable via GE labeling. Before establishment of the Standard, some surveys reported that the majority of consumers wanted GE foods to be labeled. Various proposed GE labeling laws and initiatives at the state and federal levels provided for mandatory or voluntary labeling. Mandatory labeling requires companies to disclose the presence of GE ingredients. Voluntary labeling can allow companies to certify the absence of GE ingredients (as discussed in \" Continuing Voluntary Labeling Programs and GE-Absence Claims \") or to disclose the presence of GE ingredients. The 2016 Act preempted state laws and initiatives and instituted mandatory labeling of the presence of GE ingredients in foods. In the years preceding the introduction and passage of the 2016 Act, state laws and ballot initiatives on GE labeling began to proliferate. In 2014, Vermont became the first state to enact a mandatory GE labeling law, with an effective date of July 1, 2016. Other states enacted similar laws, while others still considered similar legislation or voted on state ballot initiatives. Michigan and North Dakota enacted legislation urging the U.S. Congress to pass a uniform GE labeling standard. Most GE labeling proponents strongly supported mandatory labeling standards, citing consumers' right to know, even if safety were not an issue. Some GE labeling opponents argued that no scientific basis existed for requiring mandatory GE labeling, and that such labeling may unnecessarily introduce doubt about the quality or safety of labeled foods and could cause costly and unnecessary market disruption. Before the 2016 Act, some GE labeling proponents and opponents called for a federal law to preempt development of an uncertain and confusing patchwork of state laws with different GE labeling requirements. In the absence of federal legislation in 2015, USDA experimented with adapting an existing voluntary USDA labeling program to meet consumer and producer interests in GE labeling. That year, AMS used its Process Verified Program (PVP) to certify the absence of GE ingredients in food products from a single company, which had requested this service. Some anticipated that this would lead to a voluntary USDA program to certify the absence of GE ingredients in foods. GE-labeling proponents responded that, although this would be a step in the right direction, a voluntary program would fail to meet consumer demands, and only mandatory labeling would do so. This application of PVP to certify the absence of GE ingredients in foods did not expand beyond a single company. Voluntary labeling programs that identify the absence of GE ingredients predate legislation to require mandatory labels on foods that contain GE ingredients. On-package symbols from these private and public-private programs indicate to consumers that foods do not contain GE ingredients. They may either make a direct GE-absence claim (certifying that the food does not contain GE ingredients) or indicate that the food was produced with processes that do not include genetic engineering (e.g., certified organic production methods). Food producers and manufacturers may choose to opt into these programs and to bear associated costs. One example is the Non-GMO Project, which a non-profit organization manages to provide third-party verification for processed foods that do not contain GE ingredients. Companies sign agreements with the Non-GMO Project to have their processes reviewed and to have any high-risk products tested by third-party laboratories. Once the Non-GMO Project verifies a company's processes and products, the company can display the Non-GMO Project Verified symbol on its food packaging. This symbol on food packaging makes a GE-absence claim. Another example is the USDA National Organic Program (NOP), a public-private program for voluntary labeling that, among other things, indicates the absence of GE ingredients. NOP, which is administered by AMS, certifies that agricultural products have been produced using approved organic methods listed in statute. Genetic engineering is an excluded method: NOP-certified products may not be produced or handled with genetic engineering. The NOP symbol indicates that a food meets diverse criteria, including production methods that exclude genetic engineering. These voluntary labeling programs are expected to continue after implementation of the Standard. They differ from the Standard's voluntary disclosure option , which permits voluntary disclosure of foods that derive from bioengineering yet no longer have the characteristics of bioengineered foods, and is discussed in this report's section on \" Voluntary Disclosure .\" The voluntary labeling programs provide opportunities to identify foods that affirmatively do not derive from bioengineering. The Standard does not address GE-absence claims, and the final rule states that FDA (and the USDA Food Safety and Inspection Service, depending on the food at issue) \"retain authority over absence claims.\" Implementation of the Standard over the next two years and beyond will affect consumers, regulated entities, and AMS. Many potential issues arising from the Standard will become clear only as implementation continues. The below text summarizes potential and stated concerns related to applicability, disclosure options, administrative provisions, and other issues. Congress may choose to monitor the new Standard's implementation in accordance with its oversight responsibilities. A key question for Congress is whether AMS's implementation of the 2016 Act meets congressional intent regarding the scope of applicability and the degree of disclosure required. In the final rule, AMS asserted that it balanced flexibility for regulated entities and information to consumers regarding the bioengineered status of their foods. Stakeholders who question AMS's decisions in the rulemaking process, as described above, may question the extent to which AMS's implementation aligns with congressional intent. Applicability. Groups that have criticized the definition of bioengineered in the 2016 Act may call on Congress to amend the definition to include highly refined products derived from GE organisms and/or include products that do not meet the current definition, such as those derived from gene editing and other new technologies. Other interested groups may continue to advocate for a definition that restricts the number and types of foods to which the definition applies. AMS has committed to maintaining and updating the List through annual public reviews, and on an interim basis as needed. Such reviews can provide opportunities to add to the List any bioengineered food products that have entered commerce. Additionally, during these reviews, stakeholders with differing views may encourage the agency to adopt either a more expansive or a more restrictive listing of bioengineered foods. Disclosure. Another issue in the context of disclosure is the degree of familiarity with the required labels that consumers may have. Consumers unfamiliar with the term bioengineered may have questions about what this means on foods bearing disclosure. Public reaction to implementation of the various types of disclosure may generate calls for these options to be revised based on their success or failure to provide consumers with easily accessible and useful information. Administrative provisions. An issue for potential consideration is the extent to which additional federal resources will be required to implement the Standard in both the voluntary and mandatory compliance periods. In its regulatory impact analysis (RIA), AMS broadly estimated that it may need $2 million annually to implement the Standard, without differentiating potential expenses during the voluntary and mandatory compliance periods. AMS proposed that it would use such funds to update the List; conduct audits and hearings; manage complaints and inquiries; and provide training, education, outreach and programmatic support. AMS may need to assign staff and develop new processes to implement the Standard's provisions related to audits, examinations, hearings, and publications of findings. Congress may be asked to consider allocating new resources to support continued implementation of the new Standard. In addition, Congress may assess the cost and administrative overhead that regulated entities expend to identify and maintain records on foods subject to disclosure and to adjust labels on food packaging. Estimates for administrative costs to regulated entities, which AMS presents in its RIA, range from a lower bound of $459 million to an upper bound of nearly $3.6 billion for the first year. AMS anticipates that these costs will greatly reduce in subsequent years as potentially regulated entities replace bioengineered ingredients with non-bioengineered ingredients. Regarding enforcement, the rule largely relies on a public notification mechanism to influence the compliance of regulated entities and correct violations of the Standard. Stakeholders may or may not view this mechanism as successful, depending on the extent and frequency of any such violations. Interested parties may petition Congress to strengthen existing enforcement mechanisms or identify new ones to enhance compliance with the new Standard. Market demand for bioengineered versus non-bioengineered products . In the RIA, AMS indicates that it cannot accurately predict how consumers will react to bioengineered disclosures on food labels. Consumers may avoid foods labeled as bioengineered, they may prefer them, or such labels may make no difference to consumer purchasing behaviors. In the RIA, AMS assumes that manufacturers will avoid labeling 20% of their products as bioengineered, by replacing bioengineered with non-bioengineered ingredients, due to potential consumer reactions. AMS selected 20% for purposes of estimating costs and benefits in the RIA following consideration of existing studies and surveys of consumer behavior and consideration of the requirements of the Standard. Depending on how consumers respond, implementation of the Standard may influence manufacturer and retailer demand for bioengineered and non-bioengineered foods. Congress may respond to stakeholder concerns about any market shifts resulting from the Standard. Interactions with international trade. Unexpected issues may arise as implementation begins. For example, AMS states that it does not expect the Standard to impact foreign trade. However, it also notes that the USDA Foreign Agriculture Service is prepared to work closely with foreign countries that export food and agricultural products to the United States, to facilitate their understanding of the Standard. If trade issues arise, Congress may choose to address harmonization of labeling requirements with foreign trading partners by amending applicability, disclosure, or administrative requirements in the 2016 Act, or by other means. Many terms are used when describing human alterations of plants and animals over time. Unless otherwise noted, the definitions in this glossary derive from USDA's online Agricultural Biotechnology Glossary and are used for the purposes of this report. Agricultural b iotechnology. A range of tools, including traditional breeding techniques, that alter living organisms, or parts of organisms, to make or modify products; improve plants or animals; or develop microorganisms for specific agricultural uses. Modern biotechnology today includes the tools of genetic engineering. Conventional breeding. Undefined in USDA's Agricultural Biotechnology Glossar y. USDA defines the similar term, traditional breeding , as \"modification of plants and animals through selective breeding. Practices used in traditional plant breeding may include aspects of biotechnology such as tissue culture and mutational breeding.\" Gene editing. A technique that allows researchers to alter the DNA of organisms to insert, delete, or modify a gene or gene sequences to silence, enhance, or otherwise change an organism's specific genetic characteristics. GE labeling. On-package disclosure of genetically engineered foods or food ingredients. Genetically engineered (GE) . Produced through genetic engineering. Genetic engineering. Manipulation of an organism's genes by introducing, eliminating or rearranging specific genes using the methods of modern molecular biology, particularly those techniques referred to as recombinant DNA techniques. Genetic modification. The production of heritable improvements in plants or animals for specific uses, via either genetic engineering or other more traditional methods. Some countries other than the United States use this term to refer specifically to genetic engineering. Genetically modified organism ( GMO). An organism produced through genetic modification. Recombinant DNA. A molecule of DNA formed by joining different DNA segments using recombinant DNA technology. Recombinant DNA technology. Procedures used to join together DNA segments in a cell-free system (e.g., in a test tube outside living cells or organisms). Under appropriate conditions, a recombinant DNA molecule can be introduced into a cell and copy itself (replicate), either as an independent entity (autonomously) or as an integral part of a cellular chromosome. Selective breeding . Making deliberate crosses or matings of organisms so the offspring will have particular desired characteristics derived from one or both of the parents. Transgenic organism. An organism resulting from the insertion of genetic material from another organism using recombinant DNA techniques. Variety. A subdivision of a species for taxonomic classification also referred to as a \"cultivar.\" A variety is a group of individual plants that is uniform, stable, and distinct genetically from other groups of individuals in the same species.", "summary": "In July 2016, Congress enacted P.L. 114-216 (2016 Act), comprehensive legislation to govern the labeling of bioengineered foods. The 2016 Act required the U.S. Department of Agriculture (USDA) to establish the National Bioengineered Food Disclosure Standard ( the Standard ) . The Standard regulates labeling of bioengineered foods, a term defined in the 2016 Act. The act does not address or define other terms that some members of the public might associate with bioengineered foods, such as genetically engineered (GE), genetically modified , and genetically modified organism (GMO). The Standard guides the mandatory labeling of foods to indicate the presence of GE ingredients. As such, foods meeting requirements identified in the Standard must bear a bioengineered disclosure. Implementation began on January 1, 2020, and mandatory compliance begins on January 1, 2022. The Standard provides details under the three key issues of applicability, disclosure options, and administrative provisions: Applicability discusses the definition of bioengineered food and the USDA-maintained List of Bioengineered Foods (List). The Standard applies to foods that are or may be derived from bioengineered ingredients, with some exclusions and exemptions. It does not apply to refined products, such as oils or sugars, that derive from GE plants but no longer contain detectable modified deoxyribonucleic acid (DNA). Many groups interpret the Standard as not applying to foods derived from gene editing and other new technologies that do not use recombinant DNA. The Standard exempts from disclosure foods served in restaurants. Some have endorsed such exclusions and exemptions, and others have criticized them. Disclosure Options outlines acceptable disclosure options for regulated entities, as well as additional options available for specific entities and types of food packages. Most regulated entities may disclose by text, symbol (pictured above), electronic or digital link, or text message. In some cases, a telephone number or website address may be acceptable. Some groups have praised the flexibility that this range of options provides regulated entities, while others have criticized these options as confusing. Administrative Provisions reviews compliance dates, recordkeeping requirements, and enforcement mechanisms, which include audits, examinations, hearings, and release of public findings. The 2016 Act provided few enforcement mechanisms to promote compliance. The Standard establishes how USDA may investigate accusations of non-compliance and how it may publicly release its findings. The Standard does not affect how foods derived from biotechnology are regulated for safety and approval for human consumption. The Coordinated Framework for Regulation of Biotechnology , a policy the White House issued in 1986, continues to govern how federal agencies, including USDA, evaluate and approve products developed using modern biotechnology. More generally, USDA and the U.S. Food and Drug Administration (FDA) continue to ensure that foods sold in the United States are safe and properly labeled. USDA's Agricultural Marketing Service (AMS) developed the Standard within a broader societal context. Before the 2016 Act, some members of the public had demanded mandatory labeling of the presence of GE ingredients in foods, based on the consumer's right to know. Other members of the public had opposed any GE labeling because of the scientific consensus that GE foods are safe to eat and concern that labeling may introduce unwarranted doubts about food safety. Before the 2016 Act, several states had enacted GE labeling laws, creating concerns among industry and consumer groups. In response, Congress debated this and other federal GE labeling legislation. GE labeling programs may be voluntary or mandatory and may indicate the presence or absence of GE ingredients. Several voluntary labeling programs predate the Standard's mandatory labeling requirements. Public and private programs for the voluntary labeling of foods continue to indicate the absence of GE ingredients in foods. These include the Non-GMO Project and the USDA National Organic Program. Future considerations for Congress may include ongoing questions consumers may have concerning what it means for a food to be labeled as bioengineered , how regulated entities will respond to the Standard's new requirements, how USDA will implement its responsibilities under the Standard, potential market impacts as demand for GE versus non-GE foods may change, and how the Standard aligns with international labeling requirements. Congress may choose to monitor implementation of the new Standard in accordance with its oversight responsibilities.", "document_type": "crs"}
{"report": "Section 6 of the Occupational Safety and Health Act of 1970 (OSH Act) grants the Occupational Safety and Health Administration (OSHA) of the Department of Labor (DOL) the authority to promulgate, modify, or revoke occupational safety and health standards that apply to private sector employers, the United States Postal Service, and the federal government as an employer. In addition, Section 5(a)(1) of the OSH Act, commonly referred to as the General Duty Clause, requires that all employers under OSHA's jurisdiction provide workplaces free of \"recognized hazards that are causing or are likely to cause death or serious physical harm\" to their employees. OSHA has the authority to enforce employer compliance with its standards and with the General Duty Clause through the issuance of abatement orders, citations, and civil monetary penalties. The OSH Act does not cover state or local government agencies or units. Thus, certain entities that may be affected by Coronavirus Disease 2019 (COVID-19), such as state and local government hospitals, local fire departments and emergency medical services, state prisons and county jails, and public schools, are not covered by the OSH Act or subject to OSHA regulation or enforcement. Section 18 of the OSH Act authorizes states to establish their own occupational safety and health plans and preempt standards established and enforced by OSHA. OSHA must approve state plans if they are \"at least as effective\" as OSHA's standards and enforcement. If a state adopts a state plan, it also must cover state and local government entities not covered by OSHA. Currently, 21 states and Puerto Rico have state plans that cover all employers, and 5 states and the U.S. Virgin Islands have state plans that cover only state and local government employers not covered by the OSH Act. In the remaining states, state and local government employers are not covered by OSHA standards or enforcement. State plans may incorporate OSHA standards by reference, or states may adopt their own standards that are at least as effective as OSHA's standards. OSHA may promulgate occupational safety and health standards on its own initiative or in response to petitions submitted to the agency by various government agencies, the public, or employer and employee groups. OSHA is not required, however, to respond to a petition for a standard or to promulgate a standard in response to a petition. OSHA may also consult with one of the two statutory standing advisory committeesâthe National Advisory Committee on Occupational Safety and Health (NACOSH) or the Advisory Committee on Construction Safety and Health (ACCSH)âor an ad-hoc advisory committee for assistance in developing a standard. OSHA's rulemaking process for the promulgation of standards is largely governed by the provisions of the Administrative Procedure Act (APA) and Section 6(b) of the OSH Act. Under the APA informal rulemaking process, federal agencies, including OSHA, are required to provide notice of proposed rules through the publication of a Notice of Proposed Rulemaking in the Federal Register and provide the public a period of time to provide comments on the proposed rules. Section 7(b) of the OSH Act mirrors the APA in that it requires notice and comment in the rulemaking process. After publishing a proposed standard, the public must be given a period of at least 30 days to provide comments. In addition, any person may submit written objections to the proposed standard and may request a public hearing on the standard. Section 6(e) of the OSH Act requires OSHA to publish in the Federal Register a statement of the reasons the agency is taking action whenever it promulgates a standard, conducts other rulemaking, or takes certain additional actions, including issuing an order, compromising on a penalty amount, or settling an issued penalty. In addition to the APA and OSH Act, other federal laws that generally apply to OSHA rulemaking include the Paperwork Reduction Act, Regulatory Flexibility Act, Congressional Review Act, Information Quality Act, and Small Business Regulatory Enforcement Fairness Act (SBREFA). Also, Executive Order 12866, issued by President Clinton in 1993, requires agencies to submit certain regulatory actions to the Office of Management and Budget (OMB) and Office of Information and Regulatory Affairs (OIRA) for review before promulgation. OSHA rulemaking for new standards has historically been a relatively time-consuming process. In 2012, at the request of Congress, the Government Accountability Office (GAO) reviewed 59 significant OSHA standards promulgated between 1981 (after the enactments of the Paperwork Reduction Act and Regulatory Flexibility Act) and 2010. For these standards, OSHA's average time between beginning formal consideration of the standardâeither through publishing a Request for Information or Advanced Notice of Proposed Rulemaking in the Federal Register or placing the rulemaking on its semiannual regulatory agendaâand promulgation of the standard was 93 months (7 years, 9 months). Once the Notice of Proposed Rulemaking was published for these 59 standards, the average time until promulgation of the standard was 39 months (3 years, 3 months). In 2012, OSHA's Directorate of Standards and Guidance published a flowchart of the OSHA rulemaking process on the agency's website. This flowchart includes estimated duration ranges for a variety of rulemaking actions, beginning with pre-rule activitiesâsuch as developing the idea for the standard and meeting with stakeholdersâand ending with promulgation of the standard. The flowchart also includes an estimated duration range for post-promulgation activities, such as judicial review. The estimated time from the start of preliminary rulemaking to the promulgation of a standard ranges from 52 months (4 years, 4 months) to 138 months (11 years, 6 months). After a Notice of Proposed Rulemaking is published in the Federal Register, the estimated length of time until the standard is promulgated ranges from 26 months (2 years, 2 months) to 63 months (5 years, 3 months). Table 1 provides OSHA's estimated timelines for six major pre-rulemaking and rulemaking activities leading to the promulgation of a standard. Both the APA and the OSH Act provide for judicial review of OSHA standards. Section 7(f) of the OSH Act provides that any person who is \"adversely affected\" by a standard may file, within 60 days of its promulgation, a petition challenging the standard with the U.S. Court of Appeals for the circuit in which the person lives or maintains his or her principal place of business. A petition for judicial review does not automatically stay the implementation or enforcement of the standard. However, the court may order such a stay. OSHA estimates that post-promulgation activities, including judicial review, can take between 4 and 12 months after the standard is promulgated. Section 6(c) of the OSH Act provides the authority for OSHA to issue an Emergency Temporary Standard (ETS) without having to go through the normal rulemaking process. OSHA may promulgate an ETS without supplying any notice or opportunity for public comment or public hearings. An ETS is immediately effective upon publication in the Federal Register . Upon promulgation of an ETS, OSHA is required to begin the full rulemaking process for a permanent standard with the ETS serving as the proposed standard for this rulemaking. An ETS is valid until superseded by a permanent standard, which OSHA must promulgate within six months of publishing the ETS in the Federal Register . An ETS must include a statement of reasons for the action in the same manner as required for a permanent standard. State plans are required to adopt or adhere to an ETS, although the OSH Act is not clear on how quickly a state plan must come into compliance with an ETS. Section 6(c)(1) of the OSH Act requires that both of the following determinations be made in order for OSHA to promulgate an ETS: that employees are exposed to grave danger from exposure to substances or agents determined to be toxic or physically harmful or from new hazards, and that such emergency standard is necessary to protect employees from such danger. The term grave danger , used in the first mandatory determination for an ETS, is not defined in statute or regulation. The legislative history demonstrates the intent of Congress that the ETS process \"not be utilized to circumvent the regular standard-setting process,\" but the history is unclear as to how Congress intended the term grave danger to be defined. In addition, although the federal courts have ruled on challenges to previous ETS promulgations, the courts have provided no clear guidance as to what constitutes a grave danger. In 1984, the U.S. Court of Appeals for the Fifth Circuit in Asbestos Info. Ass'n v. OSHA issued a stay and invalidated OSHA's November 1983 ETS lowering the permissible exposure limit for asbestos in the workplace. In its decision, the court stated that \"gravity of danger is a policy decision committed to OSHA, not to the courts.\" The court, however, ultimately rejected the ETS, in part on the grounds that OSHA did not provide sufficient support for its claim that 80 workers would ultimately die because of exposures to asbestos during the six-month life of the ETS. In addition to addressing a grave danger to employees, an ETS must also be necessary to protect employees from that danger. In Asbestos Info. Ass'n , the court invalidated the asbestos ETS for the additional reason that OSHA had not demonstrated the necessity of the ETS. The court cited, among other factors, the duplication between the respirator requirements of the ETS and OSHA's existing standards requiring respirator use. The court dismissed OSHA's argument that the ETS was necessary because the agency felt that the existing respiratory standards were \"unenforceable absent actual monitoring to show that ambient asbestos particles are so far above the permissible limit that respirators are necessary to bring employees' exposure within the PEL of 2.0 f/cc.\" The court determined that \"fear of a successful judicial challenge to enforcement of OSHA's permanent standard regarding respirator use hardly justifies resort to the most dramatic weapon in OSHA's enforcement arsenal.\" Although OSHA has not promulgated an ETS since the 1983 asbestos standard, it has since determined the necessity of an ETS. In 2006, the agency considered a petition from the United Food and Commercial Workers (UFCW) and International Brotherhood of Teamsters (IBT) for an ETS on diacetyl. The UFCW and IBT petitioned OSHA for the ETS after the National Institute for Occupational Safety and Health (NIOSH) and other researchers found that airborne exposure to diacetyl, then commonly used as an artificial butter flavoring in microwave popcorn and a flavoring in other food and beverage products, was linked to the lung disease bronchiolitis obliterans , now commonly referred to as \"popcorn lung.\" According to GAO's 2012 report on OSHA's standard-setting processes, OSHA informed GAO that although the agency may have been able to issue an ETS based on the grave danger posed by diacetyl, the actions taken by the food and beverage industries, including reducing or removing diacetyl from products, made it less likely that the necessity requirement could be met. Section 6(c)(2) of the OSH Act provides that an ETS is effective until superseded by a permanent standard promulgated pursuant to the normal rulemaking provisions of the OSH Act. Section 6(c)(3) of the OSH Act requires OSHA to promulgate a permanent standard within six months of promulgating the ETS. As shown earlier in this report, six months is well outside of historical and currently expected time frames for developing and promulgating a standard under the notice and comment provisions of the APA and OSH Act, as well as under other relevant federal laws and executive orders. This dichotomy between the statutory mandate to promulgate a standard and the timelines that, based on historical precedent, other provisions in the OSH Act might realistically require for such promulgation raises the question of whether or not OSHA could extend an ETS's duration without going through the normal rulemaking process. The statute and legislative history do not clearly address this question. OSHA has used its ETS authority sparingly in its history and not since the asbestos ETS promulgated in 1983. As shown in Table A-1 in the Appendix, of the nine times OSHA has issued an ETS, the courts have fully vacated or stayed the ETS in four cases and partially vacated the ETS in one case. Of the five cases that were not challenged or that were fully or partially upheld by the courts, OSHA issued a permanent standard either within the six months required by the statute or within several months of the six-month period and always within one year of the promulgation of the ETS. Each of these cases, however, occurred before 1980, when a combination of additional federal laws and court decisions added additional procedural requirements to the OSHA rulemaking process. OSHA did not attempt to extend the ETS's expiration date in any of these cases. Although the courts have not ruled directly on an attempt by OSHA to solely extend the life of an ETS, in 1974, the U.S. Court Appeals for the Fifth Circuit held in Florida Peach Growers Ass ' n v. United States Department of Labor that OSHA was within its authority to amend an ETS without going through the normal rulemaking process. The court stated that \"it is inconceivable that Congress, having granted the Secretary the authority to react quickly in fast-breaking emergency situations, intended to limit his ability to react to developments subsequent to his initial response.\" The court also recognized the difficulty OSHA may have in promulgating a standard within six months due to the notice and comment requirements of the OSH Act, stating that in the case of OSHA seeking to amend an ETS to expand its focus, \"adherence to subsection (b) procedures would not be in the best interest of employees, whom the Act is designed to protect. Such lengthy procedures could all too easily consume all of the temporary standard's six months life\" Currently, no OSHA standard directly covers exposure to airborne or aerosol diseases in the workplace. As a result, OSHA is limited in its ability to enforce protections for healthcare and other workers who may be exposed to SARS-Cov-2, the virus that causes COVID-19. OSHA may enforce the General Duty Clause in the absence of a standard, if it can be determined that an employer has failed to provide a worksite free of \"recognized hazards\" that are \"causing or are likely to cause death or serious physical harm\" to workers. In addition, OSHA's standards for the use of personal protective equipment (PPE) may apply in cases in which workers require eye, face, hand, or respiratory protection against COVID-19 exposure. The OSHA respiratory protection standard requires the use of respirators certified by NIOSH in cases in which engineering controls, such as ventilation or enclosure of hazards, are insufficient to protect workers from breathing contaminated air. Surgical masks, procedure masks, and dust masks are not considered respirators. NIOSH certifies respirators pursuant to federal regulations. For nonpowered respirators, such as filtering face piece respirators commonly used in healthcare and construction, NIOSH classifies respirators based on their efficiency at filtering airborne particles and their ability to protect against oil particles. Under the NIOSH classification system, the letter (N, R, or P) indicates the level of oil protection as follows: Nâno oil protection; Râoil resistant; and Pâoil proof. The number following the letter indicates the efficiency rating of the respirator as follows: 95âfilters 95% of airborne particles; 97âfilters 97% of airborne particles; and 100âfilters 99.7% of airborne particles. Thus an N95 respirator, the most common type, is one that does not protect against oil particles and filters out 95% of airborne particles. An R or P respirator can be used in place of an N respirator. A respirator that is past its manufacturer-designated shelf life is no longer considered to be certified by NIOSH. However, in response to potential shortages in respirators, NIOSH has tested and approved certain models of respirators for certified use beyond their manufacturer-designated shelf lives. Respirators designed for certain medical and surgical uses are subject to both certification by NIOSH (for oil protection and efficiency) and regulation by the Food and Drug Administration (FDA) as medical devices. In general, respirators with exhalation valves cannot be used in surgical and certain medical settings because, although the presence of an exhalation valve does not affect the respirator's protection afforded the user, it may allow unfiltered air from the user into a sterile field. On March 2, 2020, FDA issued an Emergency Use Authorization (EUA) to approve for use in medical settings certain NIOSH-certified respirators not previously regulated by FDA. On March 10, 2020, the Centers for Disease Control and Prevention (CDC) updated its interim guidance for the protection of healthcare workers against exposure to COVID-19 to permit healthcare workers caring for known or suspected COVID-19 cases to use \"facemasks\" when respirators are not available or are in limited supply. This differs from the CDC's 2007 guidelines for control of infectious agents in healthcare settings, which required the use of respirators for treatment of known or suspected cases. CDC states that respirators should be prioritized for use in medical procedures likely to generate respiratory aerosols. Before this interim guidance was released, Representative Bobby Scott, Chairman of the House Committee on Education and Labor, and Representative Alma Adams, Chair of the Subcommittee on Workforce Protections, sent a letter to Secretary of Health and Human Services (HHS) Alex M. Azar II expressing their opposition to this change in the interim standard. The OSHA respiratory protection standard requires that the employer provide a medical evaluation to the employee to determine if the employee is physiologically able to use a respirator. This medical evaluation must be completed before any fit testing. For respirators designed to fit tightly against the face, the specific type and model of respirator that an employee is to use must be fit tested in accordance with the procedures provided in Appendix A of the OSHA respiratory protection standard to ensure there is a complete seal around the respirator when worn. Once an employee has been fit tested for a respirator, he or she is required to be fit tested annually or whenever the model of respirator, but not the actual respirator itself, is changed. Each time an individual uses a respirator, he or she is required to perform a check of the seal of the respirator to his or her face in accordance with the procedures provided in Appendix B of the standard. On March 14, 2020, OSHA issued guidance permitting employers to suspend annual fit testing of respirators for employees that have already been fit tested on the same model respirator. In response to shortages of respirators and other PPE during the national response to the COVID-19 pandemic, OSHA has issued three sets of temporary enforcement guidance to permit the following exceptions to the respiratory protection standard: 1. Employers may suspend annual fit testing of respirators for employees that have already been fit tested on the same model respirator; 2. Employers may permit the use of expired respirators and the extended use or reuse of respirators, provided the respirator maintains its structural integrity and is not damaged, soiled, or contaminated (e.g., with blood, oil, or paint); and 3. Employers may permit the use of respirators not certified by NIOSH, but approved under standards used by the following countries or jurisdictions, in accordance with the protection equivalency tables provided in Appendices A and B of the enforcement guidance document: Australia, Brazil, European Union, Japan, Mexico, People's Republic of China, and Republic of Korea. Although no OSHA standard specifically covers aerosol or airborne disease transmission, the California Division of Occupational Safety and Health (Cal/OSHA), under its state plan, promulgated its aerosol transmissible disease (ATD) standard in 2009. The ATD standard covers most healthcare workers, laboratory workers, as well as workers in correctional facilities, homeless shelters, and drug treatment programs. Under the ATD standard, SARS-Cov-2, the virus that causes COVID-19, is classified as a disease or pathogen requiring airborne isolation. This classification subjects the virus to stricter control standards than diseases requiring only droplet precautions, such as seasonal influenza. The key requirements of the ATD standard include written ATD exposure control plan and procedures, training of all employees on COVID-19 exposure, use of PPE, and procedures if exposed to COVID-19, engineering and work practice controls to control COVID-19 exposure, including the use of airborne isolation rooms, provision of medical services to employees, including removal of exposed employees, specific requirements for laboratory workers, and PPE requirements. The Cal/OSHA ATD standard requires that employers provide employees PPE, including gloves, gowns or coveralls, eye protection, and respirators certified by NIOSH at least at the N95 level whenever workers enter or work in an airborne isolation room or area with a case or suspected case; are present during procedures or services on a case or suspected case; repair, replace, or maintain air systems or equipment that may contain pathogens; decontaminate an area that is or was occupied by a case or suspected case; are present during aerosol generating procedures on cadavers of cases or suspected cases; transport a case or suspected case within a facility or within a vehicle when the patient is not masked; and are working with a viable virus in the laboratory. In addition, a powered air purifying respirator (PAPR) with a high-efficiency particulate air (HEPA) filter must be used whenever a worker performs a high- hazard procedure on a known or suspected COVID-19 case. High-hazard procedures are those in which \"the potential for being exposed to aerosol transmissible pathogens is increased due to the reasonably anticipated generation of aerosolized pathogens\"âthey include intubation, airway suction, and caring for patients on positive pressure ventilation. Emergency medical services (EMS) workers may use N100, R100, or P100 respirators in place of PAPRs. Cal/OSHA has issued interim guidance in response to shortages of respirators in the state due to the COVID-19 pandemic response. Under this interim guidance, if the supply of N95 respirators or PAPRs are insufficient to meet current or anticipated needs, surgical masks may be used for low-hazard patient contacts that would otherwise require the use of respirators, and respirators may be used for high-hazard procedures that would otherwise require the use of PAPRs. In 2010, OSHA published a Request for Information in the Federal Register seeking public comments on strategies to control exposure to infectious diseases in healthcare workplaces. After collecting public comments and holding public meetings, OSHA completed the SBREFA process in 2014. Since then, however, no public actions have occurred on this rulemaking; since spring 2017, this rulemaking has been listed as a \"long-term action\" in DOL's semiannual regulatory agenda. On March 5, 2020, Representative Scott, chairman of the House Committee on Education and Labor, and Representative Adams, chair of the Subcommittee on Workforce Protections, sent a letter to Secretary of Labor Eugene Scalia calling on OSHA to promulgate an ETS to address COVID-19 exposure among healthcare workers. This letter followed a January 2020 letter requesting that OSHA reopen its rulemaking on the infectious disease standard and begin to formulate for possible future promulgation an ETS to address COVID-19 exposure. Senator Patty Murray, ranking member of the Senate Committee on Health, Education, Labor, and Pensions and a group of Democratic Senators sent a similar letter to the Secretary of Labor calling for an OSHA ETS. In addition, in March 2020, David Michaels, who served as the Assistant Secretary of Labor for Occupational Safety and Health during the Obama Administration, wrote an op-ed in The Atlantic calling on OSHA to promulgate a COVID-19 ETS. On March 6, 2020, the AFL-CIO and 22 other unions petitioned OSHA for an ETS on COVID-19 that would cover all workers with potential exposures. National Nurses United submitted a similar petition requesting that OSHA promulgate an ETS based largely on the Cal/OSHA ATD standard. On May 4, 2020, the Center for Food Safety and Food Chain Workers Alliance submitted a petition requesting that OSHA promulgate an ETS to protect meat and poultry processing workers from COVID-19 exposure in the workplace. On May 18, 2020, the AFL-CIO petitioned the U.S. Court of Appeals for the D.C. Circuit for a writ of mandamus to compel OSHA to promulgate a COVID-19 ETS. On March 9, 2020, Representative Scott introduced H.R. 6139 , the COVID-19 Health Care Worker Protection Act of 2020. This bill would require OSHA to promulgate a COVID-19 ETS within one month of enactment. The ETS would be required to cover healthcare workers and any workers in sectors determined by the CDC or OSHA to be at an elevated risk of COVID-19 exposure. The ETS would be required to include an exposure control plan provision and be, at a minimum, based on CDC's 2007 guidance and any updates to this guidance. The ETS would also be required to provide no less protection than any state standard on novel pathogens, thus requiring OSHA to include the elements of the Cal/OSHA ATD standard in this ETS. Title II of the bill would provide that hospitals and skilled nursing facilities that receive Medicare funding and that are owned by state or local government units and not subject to state plans would be required to comply with the ETS. The provisions of H.R. 6139 were included as Division C of H.R. 6201 , the Families First Coronavirus Response Act, as introduced in the House. The American Hospital Association (AHA) issued an alert to its members expressing its opposition to the OSHA ETS provisions in the bill. Specifically, the AHA opposed the requirement that the ETS be based on the CDC's 2007 guidance. The AHA stated that unlike severe acute respiratory syndrome (SARS), which was transmitted through the air, COVID-19 transmission is through droplets and surface contacts. Thus, the requirement of the 2007 CDC guidance that N95 respirators, rather than surgical masks, be used for patient contact is not necessary to protect healthcare workers from COVID-19, and the use of surgical masks is consistent with World Health Organization guidance. The AHA also claimed that shortages of available respirators could reduce the capacity of hospitals to treat COVID-19 patients, due to a lack of respirators for staff. The OSHA ETS provisions were not included in the version of the legislation that was passed by the House and the Senate and signed into law as P.L. 116-127 . Division D of H.R. 6379 , the Take Responsibility for Workers and Families Act, as introduced in the House on March 23, 2020, includes the requirement that OSHA promulgate an ETS on COVID-19 within seven days of enactment and a permanent COVID-19 standard within 24 months of enactment to cover healthcare workers, firefighters and emergency response workers, and workers in other occupations that CDC or OSHA determines to have an elevated risk of COVID-19 exposure. Division D of H.R. 6379 would amend the OSH Act, for the purposes of the ETS only, such that state and local government employers in states without state plans would be covered by the ETS. The provisions of Division D of H.R. 6379 were also included in S. 3584 , the COVIDâ19 Workers First Protection Act of 2020, as introduced in the Senate. This legislation would specifically provide that the ETS would remain in force until the permanent standard is promulgated and explicitly exempts the ETS from the Regulatory Flexibility Act, Paperwork Reduction Act, and Executive Order 12866. OSHA would be granted enforcement discretion in cases in which it is not feasible for an employer to fully comply with the ETS (such as a case in which PPE is unavailable) if the employer is exercising due diligence to comply and implementing alternative means to protect employees. Like the provisions in H.R. 6139 and the version of H.R. 6201 introduced in the House, this ETS and permanent standard would be required to include an exposure control plan and provide no less protection than any state standard on novel pathogens, thus requiring OSHA to include the elements of the Cal/OSHA ATD standard in this ETS and permanent standard. Although the ETS provisions in H.R. 6139 and H.R. 6201 required that the ETS be based on the 2007 CDC guidance, specific reference to the 2007 guidance is not included in this legislation. Rather, the ETS and permanent standard would have to incorporate, as appropriate, \"guidelines issued by the Centers for Disease Control and Prevention, and the National Institute for Occupational Safety and Health, which are designed to prevent the transmission of infectious agents in healthcare settings\" and scientific research on novel pathogens. States with occupational safety and health plans would be required to adopt the ETS, or their own ETSs at least as effective as the ETS, within 14 days of the legislation's enactment. H.R. 6559 , the COVID-19 Every Worker Protection Act of 2020, was introduced in the House by Representative Scott on April 21, 2020. This legislation includes the ETS and permanent standard provisions of Division D of H.R. 6379 and S. 3584 and would require that these standards cover healthcare workers, emergency medical responders, and \"other employees at occupational risk\" of COVID-19 exposure. This legislation also adds two provisions that clarify the requirements for employers to record work-related COVID-19 infections and strengthen the protections against retaliation and discrimination offered to whistleblowers. Sections 8(c) and 24(a) of the OSH Act require employers to maintain records of occupational injuries and illnesses in accordance with OSHA regulations. OSHA's reporting and recordkeeping regulations require that employers with 10 or more employees must keep records of work-related injuries and illnesses that result in lost work time for employees or that require medical care beyond first aid. Employers must also report to OSHA, within 8 hours, any workplace fatality, and within 24 hours, any injury or illness that results in in-patient hospitalization, amputation, or loss of an eye. Employers in certain industries determined by OSHA to have lower occupational safety and health hazards are listed in the regulations as being exempt from the recordkeeping requirements but not the requirement to report serious injuries, illnesses, and deaths to OSHA. Offices of physicians, dentists, other health practitioners, and outpatient medical clinics are included in the industries that are exempt from the recordkeeping requirements. OSHA regulations require the employer to determine if an employee's injury or illness is related to his or her work and thus subject to the recordkeeping requirements. The regulations provide a presumption that an injury or illness that occurs in the workplace is work-related and recordable, unless one of the exemptions provided in the regulations applies. One of the listed exemptions is as follows: The illness is the common cold or flu (Note: contagious diseases such as tuberculosis, brucellosis, hepatitis A, or plague are considered work-related if the employee is infected at work). Because of the nature of COVID-19 transmission, which can occur in the community as well as the workplace, it can be difficult to determine the exact source of any person's COVID-19 transmission. This may make it difficult for employers to determine if an employee's COVID-19 is subject to the recordkeeping requirements. On April 10, 2020, OSHA issued enforcement guidance on how cases of COVID-19 should be treated under the recordkeeping requirements. This guidance states that COVID-19 cases are recordable if they are work-related. Under this guidance, employers in the following industry groups must fully comply with the recordkeeping regulations, including the requirement to determine if COVID-19 cases are work-related: healthcare; emergency response, including firefighting, emergency medical services, and law enforcement; and correctional institutions. For all other employers, however, OSHA will only require employers to determine if COVID-19 cases are work-related and subject to the recordkeeping requirements if the following two conditions are met: 1. There is objective evidence that a COVID-19 case may be work-related. This could include, for example, a number of cases developing among workers who work closely together without an alternative explanation; and 2. The evidence of work-relatedness was reasonably available to the employer. For purposes of this guidance, examples of reasonably available evidence include information given to the employer by employees, as well as information that an employer learns regarding its employees' health and safety in the ordinary course of managing its business and employees. H.R. 6559 would require that the ETS and permanent standard established pursuant to the legislation include the requirement for the recording and reporting of all COVID-19 cases in accordance with OSHA regulations in place at the time of enactment. By referencing the regulations in place rather than the guidance, this provision would serve to supersede OSHA's guidance and apply the requirement to determine the work-relatedness of COVID-19 cases to all employers covered by the recordkeeping regulations. Section 11(c) of the OSH Act prohibits any person from retaliating or discriminating against any employee who exercises certain rights provided by the OSH Act. Commonly referred to as the whistleblower protection provision, this provision protects any employee who takes any of the following actions: files a complaint with OSHA related to a violation of the OSH Act; causes an OSHA proceeding, such as an investigation, to be instituted; testifies or is about to testify in any OSHA proceeding; and exercises on his or her own behalf, or on behalf of others, any other rights afforded by the OSH Act. Other rights afforded by the OSH Act that are covered by the whistleblower protection provision include the right to inform the employer about unsafe work conditions; the right to access material safety data sheets or other information required to be made available by the employer; and the right to report a work-related injury, illness, or death to OSHA. In limited cases, the employee has the right to refuse to work if conditions reasonably present a risk of serious injury or death and there is not sufficient time to eliminate the danger through other means. H.R. 6559 would require that the ETS and permanent standard promulgated pursuant to the legislation expand the protections for whistleblowers. The following additional activities taken by employees would grant them protection from retaliation and discrimination from employers and agents of employers: reporting to the employer; a local, state, or federal agency; or the media; or on a social media platform; the following: a violation of the ETS or permanent standard promulgated pursuant to the legislation; a violation of the infectious disease control plan required by the ETS or permanent standard; or a good-faith concern about an infectious disease hazard in the workplace; seeking assistance from the employer or a local, state, or federal agency with such a report; and using personally supplied PPE with a higher level of protection than offered by the employer. The provisions of H.R. 6559 , including the provisions relating to recordkeeping and whistleblower protections, were included as Title III of Division L of H.R. 6800 , the Health and Economic Recovery Omnibus Emergency Solutions Act (HEROES Act). H.R. 6800 was passed by the House on May 1 5, 2020. ", "summary": "The Occupational Safety and Health Administration (OSHA) does not currently have a specific standard that protects healthcare or other workers from airborne or aerosol transmission of disease or diseases transmitted by airborne droplets. Some in Congress, and some groups representing healthcare, meat and poultry processing, and other workers, are calling on OSHA to promulgate an emergency temporary standard (ETS) to protect workers from exposure to SARS-Cov-2, the virus that causes Coronavirus Disease 2019 (COVID-19). The Occupational Safety and Health Act of 1970 (OSH Act) gives OSHA the ability to promulgate an ETS that would remain in effect for up to six months without going through the normal review and comment process of rulemaking. OSHA, however, has rarely used this authority in the pastânot since the courts struck down its ETS on asbestos in 1983. The California Division of Occupational Safety and Health (Cal/OSHA), which operates California's state occupational safety and health plan, has had an aerosol transmissible disease (ATD) standard since 2009. This standard includes, among other provisions, the requirement that employers provide covered employees with respirators, rather than surgical masks, when these workers interact with ATDs, such as known or suspected COVID-19 cases. Also, according to the Cal/OSHA ATD standard, certain procedures require the use of powered air purifying respirators (PAPR). Both OSHA and Cal/OSHA have issued enforcement guidance to address situations when the shortage of respirators may impede an employer's ability to comply with existing standards. H.R. 6139 , the COVID-19 Health Care Worker Protection Act of 2020, would require OSHA to promulgate an ETS on COVID-19 that incorporates both the Cal/OSHA ATD standard and the Centers for Disease Control and Prevention's (CDC's) 2007 guidelines on occupational exposure to infectious agents in healthcare settings. The CDC's 2007 guidelines generally require stricter controls than its interim guidance on COVID-19 exposure. The provisions of H.R. 6139 were incorporated into the version of H.R. 6201 , the Families First Coronavirus Response Act, as introduced in the House. However, the OSHA ETS provisions were not included in the version of legislation that passed the House and the Senate and was signed into law as P.L. 116-127 . H.R. 6379 , as introduced in the House, also includes a requirement for an OSHA ETS and permanent standard to address COVID-19 exposure, with similar provisions in S. 3584 . H.R. 6559 includes the requirements for an ETS and permanent standard, clarifies the requirement that employers must report work-related COVID-19 cases, and expands protections for whistleblowers. The provisions of H.R. 6559 were included in H.R. 6800 , the Health and Economic Recovery Omnibus Emergency Solutions Act (HEROES Act) passed by the House on May 15, 2020. A group representing hospitals claims that because SARS-Cov-2 is primarily transmitted by airborne droplets and surface contacts, surgical masks are sufficient protection for workers coming into routine contact with COVID-19 cases, and that the shortage of respirators may adversely impact some hospitals' patient capacities if stricter requirements to provide personal protective equipment (PPE) to employees were to be enacted.", "document_type": "crs"}
{"report": "T his report describes actions taken to provide FY2021 appropriations for Commerce, Justice, Science, and Related Agencies (CJS) accounts. The dollar amounts in this report reflect only new appropriations made available at the start of the fiscal year. Therefore, the amounts do not include any rescissions of unobligated or deobligated balances that may be counted as offsets to newly enacted appropriations, nor do they include any scorekeeping adjustments (e.g., the budgetary effects of provisions limiting the availability of the balance in the Crime Victims Fund). In the text of the report, appropriations are rounded to the nearest million. However, percentage changes are calculated using whole, not rounded, numbers, meaning that in some instances there may be small differences between the actual percentage change and the percentage change that would be calculated by using the rounded amounts discussed in the report. The annual CJS appropriations act provides funding for the Departments of Commerce and Justice, select science agencies, and several related agencies. Appropriations for the Department of Commerce include funding for bureaus and offices such as the Census Bureau, the U.S. Patent and Trademark Office, the National Oceanic and Atmospheric Administration, and the National Institute of Standards and Technology. Appropriations for the Department of Justice (DOJ) provide funding for agencies such as the Federal Bureau of Investigation; the Bureau of Prisons; the U.S. Marshals; the Drug Enforcement Administration; and the Bureau of Alcohol, Tobacco, Firearms, and Explosives, along with funding for a variety of public safety-related grant programs for state, local, and tribal governments. The vast majority of funding for the science agencies goes to the National Aeronautics and Space Administration and the National Science Foundation. The annual appropriation for the related agencies includes funding for agencies such as the Legal Services Corporation and the Equal Employment Opportunity Commission. The mission of the Department of Commerce is to \"create the conditions for economic growth and opportunity.\" The department promotes \"job creation and economic growth by ensuring fair and reciprocal trade, providing the data necessary to support commerce and constitutional democracy, and fostering innovation by setting standards and conducting foundational research and development.\" It has wide-ranging responsibilities including trade, economic development, technology, entrepreneurship and business development, monitoring the environment, forecasting weather, managing marine resources, and statistical research and analysis. The department pursues and implements policies that affect trade and economic development by working to open new markets for U.S. goods and services and promoting pro-growth business policies. It also invests in research and development to foster innovation. The agencies within the Department of Commerce, and their responsibilities, include the following: International Trade Administration (ITA) seeks to strengthen the international competitiveness of U.S. industry, promote trade and investment, and ensure fair trade and compliance with trade laws and agreements; Bureau of Industry and Security (BIS) works to ensure an effective export control and treaty compliance system and promote continued U.S. leadership in strategic technologies by maintaining and strengthening adaptable, efficient, and effective export controls and treaty compliance systems, along with active leadership and involvement in international export control regimes; Economic Development Administration (EDA) promotes innovation and competitiveness, preparing American regions for growth and success in the worldwide economy; Minority Business Development Agency (MBDA) promotes the growth of minority owned businesses through the mobilization and advancement of public and private sector programs, policy, and research; Bureau of Economic Analysis (BEA) is a federal statistical agency that promotes a better understanding of the U.S. economy by providing timely, relevant, and accurate economic accounts data in an objective and cost-effective manner; Census Bureau is a federal statistical agency that measures and disseminates information about the U.S. economy, society, and institutions, which fosters economic growth, advances scientific understanding, and facilitates informed decisions; National Telecommunications and Information Administration (NTIA) advises the President on communications and information policy; United States Patent and Trademark Office (USPTO) fosters innovation, competitiveness, and economic growth domestically and abroad by providing high-quality and timely examination of patent and trademark applications, guiding domestic and international intellectual property (IP) policy, and delivering IP information and education worldwide; National Institute of Standards and Technology (NIST) promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life ; and National Oceanic and Atmospheric Administration (NOAA) provides daily weather forecasts, severe storm warnings, climate monitoring, fisheries management, coastal restoration, and support of marine commerce. DOJ's mission is to \"enforce the law and defend the interests of the United States according to the law; to ensure public safety against threats foreign and domestic; to provide federal leadership in preventing and controlling crime; to seek just punishment for those guilty of unlawful behavior; and to ensure fair and impartial administration of justice for all Americans.\" DOJ also provides legal advice and opinions, upon request, to the President and executive branch department heads. The major DOJ offices and agencies, and their functions, are described below: Office of the United States Attorneys prosecutes violations of federal criminal laws, represents the federal government in civil actions, and initiates proceedings for the collection of fines, penalties, and forfeitures owed to the United States; United States Marshals Service (USMS) provides security for the federal judiciary, protects witnesses, executes warrants and court orders, manages seized assets, detains and transports alleged and convicted offenders, and apprehends fugitives; Federal Bureau of Investigation (FBI) investigates violations of federal criminal law; helps protect the United States against terrorism and hostile intelligence efforts; provides assistance to other federal, state, and local law enforcement agencies; and shares jurisdiction with the Drug Enforcement Administration for the investigation of federal drug violations; Drug Enforcement Administration (DEA) investigates federal drug law violations; coordinates its efforts with other federal, state, and local law enforcement agencies; develops and maintains drug intelligence systems; regulates the manufacture, distribution, and dispensing of legitimate controlled substances; and conducts joint intelligence-gathering activities with foreign governments; Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF) enforces federal law related to the manufacture, importation, and distribution of alcohol, tobacco, firearms, and explosives; Federal Prison System ( Bureau of Prisons; BOP ) houses offenders sentenced to a term of incarceration for a federal crime and provides for the operation and maintenance of the federal prison system; Office on Violence Against Women (OVW) provides federal leadership in developing the nation's capacity to reduce violence against women and administer justice for and strengthen services to victims of domestic violence, dating violence, sexual assault, and stalking; Office of Justice Programs (OJP) manages and coordinates the activities of the Bureau of Justice Assistance; Bureau of Justice Statistics; National Institute of Justice; Office of Juvenile Justice and Delinquency Prevention; Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking; and Office of Victims of Crime; and Community Oriented Policing Services (COPS) advances the practice of community policing by the nation's state, local, territorial, and tribal law enforcement agencies through information and grant resources. The science offices and agencies support research and development and related activities across a wide variety of federal missions, including national competitiveness, space exploration, and fundamental discovery. The primary function of the Office of Science and Technology Policy (OSTP) is to provide the President and others within the Executive Office of the President with advice on the scientific, engineering, and technological aspects of issues that require the attention of the federal government. The OSTP director also manages the National Science and Technology Council, which coordinates science and technology policy across the executive branch of the federal government, and cochairs the President's Council of Advisors on Science and Technology, a council of external advisors that provides advice to the President on matters related to science and technology policy. The National Space Council, in the Executive Office of the President, is a coordinating body for U.S. space policy. Chaired by the Vice President, it consists of the Secretaries of State, Defense, Commerce, Transportation, and Homeland Security; the Administrator of NASA; and other senior officials. The council was first established in 1988 through P.L. 100-685 . The council ceased operations in 1993, and was reestablished by the Trump Administration in June 2017. The National Science Foundation (NSF) supports basic research and education in the nonmedical sciences and engineering. The foundation was established as an independent federal agency \"to promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes.\" The NSF is a primary source of federal support for U.S. university research in the nonmedical sciences and engineering. It is also responsible for significant shares of the federal science, technology, engineering, and mathematics (STEM) education program portfolio and federal STEM student aid and support. The National Aeronautics and Space Administration (NASA) was created to conduct civilian space and aeronautics activities. It has four mission directorates. The Human Exploration and Operations Mission Directorate is responsible for human spaceflight activities, including the International Space Station and development efforts for future crewed spacecraft. The Science Mission Directorate manages robotic science missions, such as the Hubble Space Telescope, the Mars rover Curiosity, and satellites for Earth science research. The Space Technology Mission Directorate develops new technologies for use in future space missions, such as advanced propulsion and laser communications. The Aeronautics Research Mission Directorate conducts research and development on aircraft and aviation systems. In addition, NASA's Office of STEM Engagement (formerly the Office of Education) manages education programs for schoolchildren, college and university students, and the general public. The annual CJS appropriations act includes funding for several related agencies: U.S. Commission on Civil Rights informs the development of national civil rights policy and enhances enforcement of federal civil rights laws; Equal Employment Opportunity Commission is responsible for enforcing federal laws that make it illegal to discriminate against a job applicant or an employee because of the person's race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), national origin, age (40 or older), disability, or genetic information; International Trade Commission investigates the effects of dumped and subsidized imports on domestic industries and conducts global safeguard investigations, adjudicates cases involving imports that allegedly infringe intellectual property rights, and serves as a resource for trade data and other trade policy-related information; Legal Services Corporation (LSC) is a federally funded nonprofit corporation that provides financial support for civil legal aid to low-income Americans; Marine Mammal Commission works for the conservation of marine mammals by providing science-based oversight of domestic and international policies and actions of federal agencies with a mandate to address human effects on marine mammals and their ecosystems; Office of the U.S. Trade Representative is responsible for developing and coordinating U.S. international trade, commodity, and direct investment policy, and overseeing negotiations with other countries; and State Justice Institute is a federally funded nonprofit corporation that awards grants to improve the quality of justice in state courts and foster innovative, efficient solutions to common issues faced by all courts. The Administration's FY2021 budget request for CJS is $74.849 billion, which is $4.910 billion (-6.2%) less than the $79.759 billion appropriated for CJS for FY2020 (see Table 1 ). The Administration's FY2021 request includes the following: $8.318 billion for the Department of Commerce, which is $6.903 billion (-45.4%) less than the $15.221 billion provided for FY2020; $32.964 billion for the Department of Justice, which is $358 million (1.1%) more than the $32.605 billion provided for FY2020; $32.994 billion for the science agencies, which is $2.080 billion (6.7%) more than the $30.915 billion provided for FY2020; and $574 million for the related agencies, which is $445 million (-43.7%) less than the $1.019 billion provided for FY2020. The decrease in funding for the Department of Commerce is largely the result of a proposed $5.886 billion (-77.9%) decrease in funding for the Census Bureau. For the past several fiscal years, Congress has increased funding for the Census Bureau to help build capacity for conducting the decennial 2020 Census. In keeping with past precedent, funding for the Census Bureau peaks in the year in which the decennial census is conducted and it decreases sharply in the following year (see the discussion on historical funding for CJS, below). However, the proposed reduction in funding for the Department of Commerce is not only the result of reduced funding for the Census Bureau. The Administration also proposes shuttering the EDA (though the Administration requests some funding to help provide for an orderly closeout of the EDA's operations) and eliminating NIST's Manufacturing Extension Partnership and NOAA's Pacific Coastal Salmon Recovery Fund. In addition, the Administration proposes reducing funding for several other Department of Commerce accounts, including the following: the International Trade Administration (-$36 million, -7.0%); NIST's Scientific and Technical Research and Services account (-$102 million, -13.5%); NIST's Industrial Technology Services account (-$137 million, -84.4%); NOAA's Operations, Research, and Facilities account (-$599 million, -15.9%); and NOAA's Procurement, Acquisition, and Facilities account (-$64 million, -4.2%). The Administration also proposes a $32 million (-75.5%) reduction for the Minority Business Development Administration. It proposes changing the agency's focus to being a policy office that concentrates on advocating for the minority business community as a whole rather than supporting individual minority business enterprises. The Administration's FY2021 budget includes a proposal to establish a Federal Capital Revolving Fund, which would be administered by the General Services Administration (GSA). The Administration proposes to transfer $294 million from the proposed fund to NIST's Construction of Research Facilities account for renovating NIST's Building 1 in Boulder, CO, which would be repaid by NIST from future appropriations at $20 million per year for 15 years. While the Administration proposes increased funding for most DOJ offices and agencies, the budget request would reduce funding for the FBI (-$152 million, -1.5%) and BOP (-$67 million, -0.9%), though these reductions are the result of proposals for reduced funding for construction-related accounts. The Administration proposes reducing funding for two grant-related DOJ accounts, State and Local Law Enforcement Assistance (-$381 million, -20.1%) and Juvenile Justice Programs (-$93 million, -28.9%). The Administration also proposes to eliminate the COPS program as a separate account in DOJ and requests funding for COPS-related programs under the State and Local Law Enforcement Assistance account. The Administration proposes eliminating the Community Relations Service and moving its functions to DOJ's Civil Rights Division. The Administration's FY2021 budget request would add two new accounts to DOJ. First, the Administration proposes moving funding for the High Intensity Drug Trafficking Areas (HIDTA) program to the DEA. Currently, HIDTA funding is administered by the Office of National Drug Control Policy. In addition, the Administration proposes adding a Construction account for ATF. The Administration requested this funding so the ATF can consolidate its laboratory facilities in Walnut Creek, CA and Atlanta, GA. The annual CJS appropriations act traditionally includes an obligation cap of funds expended from the Crime Victims Fund (CVF). The Administration's FY2021 budget does not include a proposed obligation cap for the CVF. Rather, the Administration proposes a new $2.300 billion annual mandatory appropriation for crime victims programs. Within this amount, $499 million would be for the OVW, $10 million would be for oversight of Office for Victims of Crime (OVC) programs by the Office of the Inspector General, $12 million would be for developing innovative crime victims services initiatives, and a set-aside of up to $115 million would be for tribal victims assistance grants. From the remaining amount, OVC would provide formula and nonformula grants to the states to support crime victim compensation and victims services programs. Under the Administration's proposal, the amount of the mandatory appropriation would decrease if the balance on the CVF falls below $5.000 billion in future fiscal years. Also, the Administration's budget includes a proposal to transfer primary jurisdiction over federal tobacco and alcohol anti-smuggling laws from the ATF to the Department of the Treasury's Tax and Trade Bureau. The Administration's budget request includes increased funding for NASA, but the Administration does propose reduced funding for the Science account (-$832 million, -11.7%) and eliminating the Office of STEM Engagement (formerly the Office of Education). The Administration also proposes renaming three of NASA's accounts: the Space Technology account would be changed to the Exploration Technology account, the Exploration account would be changed to the Deep Space Exploration Systems account, and the Space Operations account would be changed to the Low Earth Orbit and Spaceflight Operations account. Like the Administration's FY2020 budget, the FY2021 budget proposal does not appear to include a realignment of items that would be funded from these accounts, which is what the Administration proposed in its FY2019 budget request. The FY2021 budget request includes reduced funding for NSF (-$537 million, -6.5%), which includes proposed reductions for the Research and Related Activities (-$524 million, -7.8%), Major Research Equipment and Facilities Construction (-$13 million, -5.5%), and Education and Human Resources (-$9 million, -1.0%) accounts. The proposed reductions are partially offset by proposed increases for the Agency Operations and Award Management (+$9 million, +2.6%) and Office of the Inspector General (+$1 million, +8.2%) accounts. The Administration requests reduced funding for most of the related agencies, which includes a proposal to close the LSC, though it requests some funding to help provide for an orderly closeout of the LSC's operations. Table 1 outlines the FY2020 funding and the Administration's FY2021 request for the Department of Commerce, the Department of Justice, the science agencies, and the related agencies. Figure 1 shows the total CJS funding for FY2010-FY2020, in both nominal and inflation-adjusted dollars (more-detailed historical appropriations data can be found in Table 2 ). The data show that in FY2020 nominal funding for CJS reached its highest level since FY2010, though in inflation-adjusted terms, funding for FY2020 was lower than it was in FY2010. There is a cyclical nature to total nominal funding for CJS because of appropriations for the Census Bureau to administer decennial censuses. Overall funding for CJS traditionally starts to increase a few years before the decennial census, peaks in the fiscal year in which the census is conducted, and then declines immediately thereafter. Figure 1 shows how total funding for CJS decreased after the 2010 Census and started to ramp up again as the Census Bureau prepared to conduct the 2020 Census. Increased funding for CJS also coincides with increases to the discretionary budget caps under the Budget Control Act of 2011 (BCA, P.L. 112-25 ). The BCA put into effect statutory limits on discretionary spending for FY2012-FY2021. Under the act, discretionary spending limits were scheduled to be adjusted downward each fiscal year until FY2021. However, legislation was enacted that increased discretionary spending caps for FY2014 to FY2021. A sequestration of discretionary funding, ordered pursuant to the BCA, cut $2.973 billion out of the total amount Congress and the President provided for CJS for FY2013. Since then, funding for CJS has increased as more discretionary funding has been allowed under the BCA. Figure 2 shows total CJS funding for FY2010-FY2020 by major component (i.e., the Department of Commerce, DOJ, NASA, and the NSF). Although decreased appropriations for the Department of Commerce (-47.4%) from FY2010 to FY2013, during years immediately following the 2010 Census, mostly explain the overall decrease in CJS appropriations during this time, cuts in funding for DOJ (-8.7%) and NASA (-9.8%) also contributed. Funding for NSF held relatively steady from FY2010 to FY2013. Overall CJS funding has increased since FY2014, and this is partially explained by more funding for the Department of Commerce to help the Census Bureau prepare for the 2020 Census. While funding for the Department of Commerce decreased from FY2018 to FY2019, it was partly a function of the department receiving $1.000 billion in emergency supplemental funding for FY2018. If supplemental funding is excluded, appropriations for the Department of Commerce increased 2.5% from FY2018 to FY2019. While increased funding for the Department of Commerce partially explains the overall increase in funding for CJS since FY2014, there have also been steady increases in funding for DOJ (+17.6%), NASA (+28.2%), and NSF (+12.6%), as higher discretionary spending caps have been used to provide additional funding to these agencies. ", "summary": "This report describes actions taken to provide FY2021 appropriations for Commerce, Justice, Science, and Related Agencies (CJS) accounts. The annual CJS appropriations act provides funding for the Department of Commerce, which includes bureaus and offices such as the Census Bureau, the U.S. Patent and Trademark Office, the National Oceanic and Atmospheric Administration, and the National Institute of Standards and Technology; the Department of Justice (DOJ), which includes agencies such as the Federal Bureau of Investigation, the Bureau of Prisons, the U.S. Marshals, the Drug Enforcement Administration, and the U.S. Attorneys; the National Aeronautics and Space Administration (NASA); the National Science Foundation (NSF); and several related agencies such as the Legal Services Corporation (LSC) and the Equal Employment Opportunity Commission. The Administration requests $74.849 billion for CJS for FY2021, which is $4.910 billion (-6.2%) less than the $79.759 billion appropriated for CJS for FY2020. The Administration's request includes $8.318 billion for the Department of Commerce, $32.964 billion for the Department of Justice, $32.994 billion for specified science agencies, and $574 million for the related agencies. The Administration's FY2021 budget proposes reduced funding for the Department of Commerce, NSF, and most of the related agencies, and increased funding for DOJ and NASA. The proposed reduction in overall funding for CJS is partially the result of a proposed $5.886 billion (-77.9%) decrease in funding for the Census Bureau, which, in keeping with past precedent, receives less funding in the fiscal year after conducting the decennial census. The FY2021 budget request for CJS also includes reductions to several other CJS accounts along with proposals to eliminate several CJS agencies and programs, including the Economic Development Administration, the Community Oriented Policing Services Office, NASA's STEM Engagement Office (formerly the Office of Education), and the LSC.", "document_type": "crs"}
{"report": "The Department of Defense (DOD) operates a Military Health System (MHS) that delivers certain health entitlements under Chapter 55 of Title 10, U.S. Code. The Defense Health Agency (DHA)âa component of the MHSâadministers the TRICARE program, which offers health care services to approximately 9.5 million beneficiaries, composed of military personnel, retirees, and their families. Beneficiaries may receive health care services in DOD-operated hospitals and clinicsâknown as military treatment facilities (MTFs)âor through participating civilian health care providers. DOD operates 723 MTFs in the United States and in overseas locations. Each MTF provides a range of clinical services depending on its size, mission, and level of capabilities. Only active duty servicemembers are entitled to care in any MTF. Dependents and retirees may receive care on a space-available basis that takes into account patient capacity, beneficiary category (e.g., servicemember, family member, retiree), and enrollment status. When care is not available at an MTF, beneficiaries may receive care from a civilian health care provider who participates in TRICARE. The three main health plan options offered to eligible beneficiaries include TRICARE Prime, TRICARE Select, and TRICARE for Life. TRICARE also offers premium-based health plan options for certain beneficiaries, such as qualified members of the Selected Reserve, retired reservists, young adults, and transitioning servicemembers. Other TRICARE benefits include a pharmacy program, optional dental plans, and a vision plan for certain beneficiaries. This report answers frequently asked questions about TRICARE health plan options tailored for certain reservists, retired reservists, and their families (i.e., TRICARE Reserve Select and TRICARE Retired Reserve) and certain statutory prohibitions that limit their participation in the plans. TRICARE Reserve Select (TRS) is a premium-based health plan available worldwide for some members of the Selected Reserve and their families. TRS was established by Section 701 of the Ronald W. Reagan National Defense Authorization Act (NDAA) of Fiscal Year 2005 ( P.L. 108-375 ). TRICARE Retired Reserve (TRR) is a premium-based health plan available worldwide for qualified retired members of the reserve components. TRR was established by Section 705 of the NDAA for FY2010 ( P.L. 111-84 ) as a TRICARE coverage option for so-called gray area reservists, defined as those who have retired but are too young to draw retired pay. The plans are similar to TRICARE Select (i.e., preferred provider option), which feature monthly premiums, annual deductibles, and fixed co-pays when receiving care from a network provider or paying a percentage of the allowable charge when receiving care from a TRICARE-authorized, nonnetwork provider. Eligible beneficiaries residing outside of the United States are also eligible for TRS and TRR; however, the availability of network providers may be limited based on geographic location. By law, the Department of Defense (DOD) is required to subsidize the cost of TRS. Servicemembers pay 28% of the cost of the program in the form of premiums. For TRR, enrollees pay the full cost of the calculated premium as determined by the Secretary of Defense. DOD does not subsidize the program costs for TRR. DOD annually updates the premiums for each program on an \"appropriate actuarial basis.\" Monthly TRS and TRR premiums for calendar years 2019 and 2020 are listed in Table 1 . DOD reports that at the end of FY2018, 383,683 beneficiaries were covered by TRS and 9,019 beneficiaries were covered by TRR. Members of the Selected Reserve (i.e., drilling reservists) and their families qualify for TRS if the following criteria are met: the reservist is not on active duty orders; the reservist or their family members are not covered under the Transitional Assistance Management Program; and the reservist or their family members are not eligible for the Federal Employee Health Benefits (FEHB) program. Prior to 2006, TRS availability was limited to members of the Selected Reserve (including family members) after serving on continuous active duty in support of a contingency operation for 90 or more days and signing an agreement to continue serving in the Selected Reserve for one or more years. TRS coverage was also limited to the lesser of: one year (in cases where an activated reservist does not continuously serve on active duty for at least 90 days due to an \"injury, illness, or disease incurred or aggravated while deployed\"); one year for each consecutive period of 90 days of continuous active duty service; or the number of years agreed upon in the military service obligation agreement. Section 706 of the John Warner NDAA for FY2007 ( P.L. 109-364 ) amended 10 U.S.C. Â§1076d to expand TRS eligibility, including removal of the military service obligation agreement, active duty service length, and period of coverage requirements. In revising TRS, the law also added a prohibition on members of the Selected Reserve and their family members from being eligible for TRS if they are also eligible for, or enrolled in, \"a health benefits plan under Chapter 89 of Title 5,\" U.S. Code. This health benefit plan is known as the FEHB program. Retired members of the reserve components and their family members qualify for TRR if the following criteria are met: the retiree is qualified for non-regular retirement under chapter 1223 of Title 10, U.S. Code; the retiree is under age 60; and the retiree or their family members are not eligible for the FEHB program. P.L. 111-84 , which established TRR, incorporated a similar prohibition on qualified retired members of the reserve components and their family members from being eligible for TRR if they are eligible for the FEHB program. For example, a reservist or qualified retired reservist who is also a civil service or U.S. Postal Service (USPS) employee, annuitant, or family member that is eligible for the FEHB program is barred from enrolling in TRS or TRR. This restriction does not apply to other TRICARE programs for which reservists or retired reservists may also be eligible under other criteria (e.g., TRICARE Prime, TRICARE Select, TRICARE for Life, TRICARE Dental Program, or the Transition Assistance Management Program). In 2019, the Congressional Budget Office (CBO) estimated approximately 110,000 members of the Selected Reserve are prohibited from enrolling in TRS because they are eligible for FEHB. This represents approximately 13.7% of the total Selected Reserve force. CBO also estimated that about \"one third would enroll in TRS if given the opportunity.\" Neither DOD nor CBO has published any similar estimates for TRR. The congressional record, the committee and conference reports accompanying the enacting and amending legislation for TRS and TRR, do not articulate why the prohibitions are in place. Nevertheless, observers have speculated that the prohibition may be related to potential increases in mandatory or discretionary costs associated with certain risk-pool adjustments to FEHB and expansion of the TRICARE program. As the House of Representatives considered the FY2007 NDAA, as reported by the House Armed Services Committee, the Office of Management and Budget issued a Statement of Administration Policy (SAP) that expressed cost concerns with the proposal to expand to TRS. The SAP noted: â¦ the Administration strongly opposes Section 709, which expands TRICARE eligibility to all Selected Reserve members and their families and dramatically worsens the fiscal situation by increasing the government subsidy for non-mobilized reservists and their families at an estimated cost of $400 million in FY 2007 and $3.6 billion from FY 2007 through FY 2011. By FY 2011, it is estimated that the annual cost for this expanded benefit will reach $1.2 billion. It is critical for Congress to eliminate these unfunded expansions and work with the Administration to place the system on a sound fiscal foundation. Reservists, qualified retired reservists, or their family members subject to the statutory prohibitions may obtain health insurance coverage, if eligible, through any of the following health insurance options: FEHB; Medicaid; private individual health insurance; or employer-sponsored insurance (e.g., personally or as offered through a spouse's employer). Reservists serving in a federal active duty status for greater than 30 days are eligible to participate in TRICARE programs for active duty servicemembers, including TRICARE Prime. The FEHB program establishes several premium rates based on geographic location, coverage option, and federal employee category. The monthly average premium rates (non-USPS employee and annuitant) for calendar year 2019 are listed in Table 2 . Reservists who are eligible for FEHB, for any reason, are disqualified from participation in TRS or TRR. Reservists not employed by the federal government (and not eligible for FEHB) may participate in TRS or TRR. Certain military service organizations (MSOs) perceive and advocate that the removal of the statutory prohibition for TRS or TRR would create equality among all members of the Selected Reserves or qualified retired reservists. These advocacy groups also note that in doing so, all members of the Selected Reserves would be able to access TRS as a \"more affordable option\" than FEHB, which has higher premiums and cost shares. In a 2018 report to Congress on reserve component health care, DOD states that reservists have \"expressed strong feelings of discontent with the law that disqualifies Selected Reserve members from purchasing TRICARE Reserve Select (TRS) for themselves or for family members if they are eligible for, or enrolled in, the FEHB program.\" DOD also noted in its report that reservists \"would like Congress to repeal the FEHB exclusion and DOD fully supports its repeal;\" however, DOD made no recommendation concerning this issue at the time it produced the report nor has it any time since. While expanding TRS or TRR eligibility would have certain cost implications for DOD, there are also cost considerations for other federal agencies that fund FEHB benefits for their respective federal employees. In June 2019, CBO published a cost estimate of a proposal to remove the TRS prohibition starting in 2030âSection 703 of the FY2020 NDAA ( H.R. 2500 ; as reported by the House Armed Services Committee). Overall, there would be an estimated savings to the federal government. However, given certain statutory or House pay-as-you-go (PAYGO) rules, increases in mandatory spending must be offset by \"direct spending cuts, revenue increases, or a combination of the two,\" rather than by savings in discretionary spending. CBO estimates that expanding TRS eligibility would produce an increase in mandatory costs, noting that: Because members of the Selected Reserve are younger and healthier than the average federal employee, reservists and their family members who discontinue FEHB coverage would cause an increase in premiums for all remaining FEHB beneficiaries, including federal retirees and active postal employees, whose premiums are paid from mandatory accounts. When implemented, CBO estimates this section would increase direct spending by about $40 million each year beginning in 2030. Concurrently, CBO also estimates there would also be savings in discretionary spending, greater than the increase in mandatory costs: On net, CBO estimates section 703 would eventually reduce discretionary costs to the government by about $250 million per year beginning in 2030 because the cost of TRS is less than the government's share of the premium for FEHB. Section 703 would also affect spending for other FEHB beneficiaries. DOD asserts that reservists and their spouses \"show satisfaction with the TRICARE program in general, and TRS in particular.\" Beneficiaries enrolled in TRS are reportedly satisfied with their TRICARE plan and the quality of health care provided. For example, DOD observed in the 2014 Survey of Reserve Component Spouse s that 48% found \"no difference\" between TRS and civilian health insurance plans. DOD also observed that 32% of survey participants believed that TRS provides \"better\" or \"much better\" health care than civilian health plans. Similar results can be found in certain MSO-conducted surveys of beneficiaries. While many TRS enrollees express a general satisfaction with their TRICARE plan, some beneficiaries have described certain challenges, such as: difficulty in finding health care providers and facilities that accept TRICARE; maintaining continuity of care for a family member when a reservist is activated and ordered to active duty; and having to reenroll in TRS after a reservist transitions from active duty to the Selected Reserve. Since the creation of TRS and TRR, Congress has considered a number of proposals to eliminate the statutory prohibitions described above (see Table 3 ). To date, none of the proposals have been enacted.", "summary": "Between 2001 and 2007, more than 575,000 members of the reserve components were ordered to active duty in support of ongoing military operations, including major combat operations in Afghanistan (Operation Enduring Freedom), Iraq (Operation Iraqi Freedom). While on active duty, reservists and their family members have access to a wide range of health care services administered by the Department of Defense's (DOD) Military Health System (MHS). However, prior to 2005, chapter 55 of Title 10, U.S. Code, authorized little to no DOD health care services to nonactivated reservists or their family members. In 2005, Congress began examining initial impacts of frequent mobilizations on reservists, their families, and their employers. Soon after, Congress enacted a series of new or expanded health care, transitional, and other personnel benefits to mitigate certain effects associated with reserve mobilizations. Two health care programs tailored for reservists were established: TRICARE Reserve Select (TRS)âa premium-based health plan option available to qualified members of the Selected Reserve and their family members; and TRICARE Retired Reserve (TRR)âa premium-based health plan option available to so-called gray area reservistsâthose who have retired but are too young to draw retired payâand their family members. Section 701 of the Ronald W. Reagan National Defense Authorization (NDAA) Act of Fiscal Year 2005 ( P.L. 108-375 ) established TRS. Initially, TRS eligibility was limited to certain reservists who had served on continuous active duty in support of a contingency operation and signed a military service obligation agreement. Section 706 of the John Warner NDAA for FY2007 ( P.L. 109-364 ) revised TRS by removing certain restrictions and expanding eligibility. The law also added a prohibition on members of the Selected Reserve and their family members from being eligible for TRS if they are also eligible for the Federal Employee Health Benefits (FEHB) program. Section 705 of the NDAA for FY2010 ( P.L. 111-84 ) established TRR, which also prohibits retired reservists and their families from participating, if they are also eligible for the FEHB program. Both reserve plans mirror the benefits and cost sharing requirements established for TRICARE Select, a health plan option available to family members of active duty servicemembers and certain military retirees. Congress has not explicitly addressed why the prohibition on TRS or TRR for FEHB-eligible reservists and their family members was established. Nevertheless, observers have noted several considerations in removing the statutory prohibition, including: potential impacts to the FEHB health insurance risk-pools; potential cost implications to federal mandatory and discretionary spending; and continuity of care for reservists transitioning between active and reserve status. While Congress has considered various proposals to remove the statutory prohibitions on TRS or TRR eligibility, none have been enacted.", "document_type": "crs"}
{"report": "The global pandemic of Coronavirus Disease 2019 (COVID-19) is affecting communities around the world and throughout the United States, with the number of confirmed cases and fatalities growing daily. Containment and mitigation efforts by U.S. federal, state, and local governments have been undertaken to \"flatten the curve\"âthat is, to slow the widespread transmission that could overwhelm the nation's health care system. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ) was enacted on March 27, 2020. It is the third comprehensive law to address the pandemic. In addition to its health provisions, the CARES Act provides additional supplemental appropriations to support federal response efforts and authorizes a number of economic stimulus measures, among other things. The CARES Act follows two other laws that made supplemental appropriations and amended health care financing and public health authorities to respond to the pandemic. The first, the Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ), enacted on March 6, 2020, provides roughly $7.8 billion in discretionary supplemental appropriations to the Department of Health and Human Services (HHS), the Department of State, and the Small Business Administration. This act also waives certain telehealth restrictions to make telehealth services more available during the emergency. The second, the Families First Coronavirus Response Act (FFCRA, P.L. 116-127 ), enacted on March 18, 2020, provides authority, funding, and/or requirements to cover COVID-19 testing and related services under federal programs, many private health insurance plans, and for the uninsured (as defined in the act). Among other provisions, it temporarily increases the federal share of Medicaid assistance to states, provides additional Medicaid assistance to territories, and waives liability and establishes injury compensation for certain respiratory protection devices. Medical supply shortages. The COVID-19 pandemic has affected the medical product supply chain both globally and domestically, resulting in widespread shortages of medical countermeasures (MCMs) and other critical medical supplies. MCMs are medical products that may be used to treat, prevent, or diagnose conditions associated with emerging infectious diseases or chemical, biological, radiological, or nuclear threats. Examples of MCMs include biologics (e.g., vaccines), drugs (e.g., antivirals), and devices (e.g., diagnostic tests and personal protective equipment, or PPE). The CARES Act includes several provisions to address such shortages, including expanding reporting requirements for firms that experience interruptions in drug and device manufacturing; explicitly requiring that the Strategic National Stockpile (SNS) contain PPE, ancillary medical supplies, and other applicable supplies; and extending liability protections for certain respiratory protective devices used during emergencies. The CARES Act also requires a study of U.S. dependence on critical drugs and medical devices imported from or manufactured in other countries. Vaccine access and cost. A vaccine(s) for the COVID-19 virus, if and when it becomes available, will be provided or required to be covered without cost-sharing to patients and beneficiaries of federal health programs and most private health insurance enrollees, pursuant to numerous provisions in Division A, Title III, of the CARES Act. The CARES Act does not explicitly address vaccine access for the uninsured. However, with available appropriations and preexisting authorities, the HHS Secretary could assist safety net providers (e.g., health centers), health departments, and other entities in furnishing vaccines to this population. The medical workforce. The CARES Act makes a number of changes to health workforce programs. Some changes aim to extend the services available during the COVID-19 period and beyond, particularly for rural or otherwise underserved populations. For example, the CARES Act confers medical malpractice liability on health professionals who choose to volunteer during the emergency period and amends the program rules for the National Health Service Corps (NHSC) program to permit individuals to volunteer during the emergency period. The CARES Act also reauthorizes a number of health workforce programs that had been considered for reauthorization during the 116 th Congress, but prior to the CARES Act no reauthorization of these programs was enacted. Marketing of over-the-counter drugs. The CARES Act establishes a new process for the marketing of certain over-the-counter (OTC) drugs, including hand sanitizer and sunscreen. Specifically, Title III replaces the current OTC drug monograph rulemaking process with an administrative order processâa less burdensome alternative. It also provides an expedited process for removing from the market certain OTC drugs that pose a public health hazard and for requiring certain safety labeling changes. The CARES Act provides an incentiveâ18 months of marketing exclusivityâto firms that make certain changes to previously marketed OTC drugs and creates a new user fee program to fund FDA's OTC monograph drug activities. This report describes the majority of health-related sections in Division A, Title III of the CARES Act, \"Supporting America's Health Care System in the Fight Against the Coronavirus.\" Relevant background is provided for context. Specifically, this report describes provisions regarding, among other things the following: The medical countermeasures (MCMs)âdrugs, tests, treatments, medical devices, and supplies such as PPEâincluding research and development; product regulation by the Food and Drug Administration (FDA); the strategic national stockpile (SNS); and other supply chain matters. The health workforce, including telehealth programs, the rural health care system, and the Commissioned Corps of the U.S. Public Health Service (USPHS). Additional workforce provisions described in this report include reauthorization and extension of appropriations for existing Health and Human Services (HHS) health workforce programs, and liability limitation. Provisions addressed at the Medicare and Medicaid programs and on private health insurance plans to temporarily require, or increase payment for, telehealth services and specified services related to COVID-19 testing, diagnosis, or treatment. A newly established FDA authority for OTC drug review. This report does not address education or labor provisions in Subtitle B or C in Part IV of Title III, or provisions in Subtitle E of Part IV of Title III, \"Health and Human Services Extenders,\" which are described in another CRS report. The report also does not include Division B of the act, which provides emergency supplemental appropriations for the COVID-19 response. Division B includes additional funding for numerous HHS public health and social services activities, and a $100 billion fund to reimburse eligible health care providers for health care-related expenses or lost revenues attributable to COVID-19. This report concludes with an Appendix that catalogues deadlines, effective dates, and reporting requirements for provisions described in the report. The report does not discuss cost estimates for specific provisions; however, the Congressional Budget Office (CBO) and the Joint Committee on Taxation (JCT) provided a preliminary estimate of the budget effects of the CARES Act. Overall, the act is estimated to increase federal deficits by $1.8 trillion over the 2020-2030 period. This estimate breaks down these budgetary effects into three categories: a $988 billion increase in mandatory outlays; a $446 billion decrease in revenues; and a $326 billion increase in discretionary outlays from supplemental appropriations. The estimates that CBO generated for health programs in Title III include programs in Subtitle E of Part IV of Title III, \"Health and Human Services Extenders,\" which are not discussed in this report. Among the provisions discussed in this report, JCT estimates that Section 3702, which expands the products that are eligible for tax-advantaged distributions from health savings accounts (HSAs), health flexible spending arrangements (FSAs), and other similar tax-advantaged savings arrangements, will reduce revenues by $9 billion over a ten-year period from 2020-2030. CBO also estimated the costs of a number of Medicare payment changes included in CARES Sections 3701-3715. These provisions generally increase the amount that Medicare will reimburse for services; as such, CBO estimates that they will increase Medicare spending from 2020-2030. CBO also noted that some provisionsâe.g., the requirement for Medicare to cover the costs of vaccines for COVID-19âcannot be estimated because no such vaccine has been developed at this time. In general, these CBO estimates are based on assumptions about the severity and duration of the pandemic, and they may vary substantially from final estimates to be provided later this year. This report is intended to reflect the CARES Act at enactment (i.e., March 27, 2020). It does not track the law's implementation or funding and will not be updated. This report is one of a number of CRS reports related to COVID-19; additional CRS products on COVID-19 are available at https://www.crs.gov/resources/coronavirus-disease-2019 . Numerous provisions in the CARES Act refer to the Public Health Emergency declaration made pursuant to Section 319 of the Public Health Service Act (PHSA). The \"Section 319\" authority allows the HHS Secretary to carry out a specified set of actions to address public health emergencies, such as expediting or waiving certain administrative requirements that would otherwise apply to federal activities or federally administered grants. Some provisions refer to \"the emergency period declared under section 319\" or similar construction, meaning the time during which a Section 319 declaration is in effect. The declaration for COVID-19 was made on January 31, 2020, retroactive to January 27, 2020. It is in effect for 90 days and is expected to be renewed and remain in effect for the duration of the response. Several provisions in Title III, Subtitle D, regarding health care financing and amending the Social Security Act (SSA), refer to \"the emergency period described in section 1135(g)(1)(B)\" or comparable construction. Section 1135 allows the HHS Secretary, under certain conditions, to waive specified requirements and regulations to ensure that health care items and services are available to enrollees in the Medicare, Medicaid, and State Children's Health Insurance Program (CHIP) programs during emergencies. Paragraph (1)(B) of SSA Section 1135(g) refers specifically to \"the public health emergency declared with respect to the COVID-19 outbreak by the Secretary on January 31, 2020, pursuant to section 319 of the [PHSA],\" and any renewal of such declaration. Hence, these references to SSA Section 1135(g)(1)(B) simply mean the period during which the Section 319 public health emergency declaration for COVID-19âwhether initial or renewedâis in effect. Throughout this report, unless otherwise stated, the \"Secretary\" means the HHS Secretary. Mentions of \"this section\" refer to matters addressed under that specific section of the CARES Act. This report uses a number of acronyms, listed in the table below. The COVID-19 pandemic has affected the medical product supply chain both globally and domestically. Domestically, the pandemic has highlighted existing limitations in the U.S. medical product supply chain, including lack of transparency regarding where specific medical products and their components are manufactured and heavy reliance on foreign countries for drugs and medical devices. Perhaps most salient has been the impact of COVID-19 on the availability of PPE, such as respirators for health care personnel, and other respiratory devices, such as ventilators for patients. Although the federal government and states generally have stockpiles of PPE and ventilators to distribute during public health emergencies, stockpiled quantities have been insufficient to meet current needs. FDA, with other agencies, has taken various steps to prevent and mitigate shortages of critical PPE and respiratory devices, for example, by waiving certain regulatory requirements and by enabling access to respirators and other medical devices that have not received agency clearance prior to marketing. Background The extent to which the United States relies on other countries for medical products is not completely known, but available data suggest a heavy reliance. According to FDA, as of August 2019, 72% of facilities that manufacture active pharmaceutical ingredients (APIs) and 53% of facilities manufacturing finished drugs for the U.S. market are located outside of the United States. FDA is unable to determine the volume of APIs that a specific country manufactures for the domestic or global market. The 2019 annual report from the U.S.-China Economic and Security Review Commission states that the United States sources 80% of its APIs from foreign countries and has identified China as the world's largest producer of APIs. Recent reports have identified limitations in FDA's ability to oversee foreign drug manufacturing facilities and have indicated that FDA inspections of these facilities have decreased since 2016. The COVID-19 pandemic has further restricted FDA's ability to oversee the increasingly globalized medical product supply chain, causing FDA to postpone most foreign facility inspections until at least May 2020. Provision Section 3101 requires the Secretary, within 60 days of enactment, to enter into an agreement with the National Academies of Science, Engineering, and Medicine (NASEM) to examine and report, \"in a manner that does not compromise national security,\" on the security of the U.S. medical product supply chain. The report must assess and evaluate U.S. dependence on critical drugs and devices from other countries; provide recommendations (e.g., a plan to improve resiliency of the supply chain); and address any supply vulnerabilities or potential disruptions that would significantly affect or pose a threat to public health or national security, as appropriate. In conducting the study and developing the report, NASEM must consider input from federal departments and agencies and consult with stakeholders through public meetings and other forms of engagement. Background The federal government maintains a supply of medicine and medical supplies to respond to a public health emergency severe enough to deplete local supplies (e.g., hurricane, infectious disease outbreak, or terrorist attack). This supply, known as the Strategic National Stockpile (SNS), includes antibiotics, intravenous fluids, and other medical supplies such as PPE and ventilators. In addition, the SNS contains certain medicines, such as anthrax and smallpox vaccines and treatments that may not be otherwise available for public use. In 2019, HHS stated the SNS contained approximately $8 billion worth of supplies. In FY2018, management of the SNS transferred from the Centers for Disease Control and Prevention (CDC) to the Assistant Secretary for Preparedness and Response (ASPR). Provision This section amends PHSA Section 319F-2(a)(1) to require the Secretary to maintain a stockpile of \"drugs, vaccines and other biological products, medical devices, and other supplies.\" This act further defines \"other supplies\" as \"including PPE, ancillary medical supplies, and other applicable supplies required for the administration of drugs, vaccines and other biological products, medical devices, and diagnostic tests in the stockpile.\" Some of these types of supplies, such as PPE, were included in the stockpile even before enactment of this clarifying language. Background In 2005 Congress passed the Public Readiness and Emergency Preparedness Act (PREP Act, P.L. 109-417 ), which authorizes the federal government to waive liability (except for willful misconduct) for manufacturers, distributors, and providers of MCMs, such as drugs and medical supplies, needed to respond to a public health emergency. The act also authorizes the federal government to establish a program to compensate eligible individuals who suffer injuries from administration or use of products covered by the PREP Act's immunity provisions. Section 6005 of FFCRA ( P.L. 116-127 ) explicitly added personal respiratory protective devices used for the COVID-19 response to the list of countermeasures covered by the PREP Act. Provision Section 3103 amends PHSA Section 317F-3 to change the definition of such covered devices to apply more broadly, to \"a respiratory protective device that is approved by the National Institute for Occupational Safety and Health (NIOSH) under part 84 of title 42, Code of Federal Regulations (or any successor regulations), and that the Secretary determines to be a priority for use during a public health emergency declared under [PHSA] section 319.\" Background Drug shortages have remained a serious and persistent public health concern, despite the prevention and mitigation efforts of Congress, FDA, and the private sector. Causes of drug shortages include manufacturing and quality issues, lack of transparency in the supply chain, and business decisions made by individual firms (e.g., low profit margins leading to market exit). The Federal Food Drug and Cosmetic Act (FFDCA) and FDA regulations require manufacturers of certain drugs to submit to FDA specified information related to product shortages. In addition, the FFDCA and FDA regulations allow FDA to take action to mitigate or prevent shortages and require FDA to make public certain information about drug shortages. More specifically, FFDCA Section 506C(a) requires that the manufacturer of a drug that is life-supporting, life-sustaining, or intended for use in the prevention or treatment of a debilitating disease or condition notify the Secretary (FDA by delegation of authority) of any permanent discontinuance or interruption in the manufacture of the drug that is likely to disrupt its U.S. supply. The notification must include the reasons for the interruption or discontinuance. FFDCA Section 506C(g) allows FDA, based on notifications received pursuant to Section 506C(a), to expedite facility inspections and review of supplements to new drug applications (NDAs), abbreviated NDAs (ANDAs), and supplements to ANDAs that could help mitigate or prevent a drug shortage. FFDCA Section 506E requires FDA to maintain a public, up-to-date list of drugs that are in shortage. The list must include the name of the drug in shortage, the name of the manufacturer, and, as determined by FDA, the estimated duration of and reason for the shortage. Persons that engage in the \"manufacture, preparation, propagation, compounding or processing\" of a drug must register their facility with FDA. FFDCA Section 510(j) requires that at the time of registration, such persons must file a list of all drugs being \"manufactured, prepared, propagated, compounded or processed\" for commercial distribution. Facilities registered with FDA are subject to inspection by the agency. FFDCA Section 704(b) requires that after a facility has been inspected, the inspector must provide a report, in writing, to the person in charge of that facility detailing the observations that led the inspector to determine that a product made in that facility may be adulterated. A copy of this report also must be sent to FDA. Section 3111 amends FFDCA Section 506C(g) to require ârather than allow as was the case prior to the CARES ActâFDA to prioritize and expediteârather than expedite as prior to CARESâfacility inspections and review of ANDAs and supplements to NDAs and ANDAs that could help mitigate or prevent a drug shortage. Section 3112(a) amends FFDCA Section 506C(a) to extend notification requirements to the manufacturer of any drug \"that is critical to the public health during a public health emergency declared by the Secretary\" under PHSA Section 319. It also requires a manufacturer to notify FDA of any permanent discontinuance or interruption in the manufacture of an APIânot just the finished drugâthat is likely to lead to a meaningful disruption in the supply of the API of such drug. The notification must include, in addition to the reasons for the drug's discontinuance or interruption, as applicable, information about the source of the API and alternative sources, as well as whether any associated device used in the preparation or administration of the drug has contributed to the shortage, among other information. Section 3112(b) amends FFDCA Section 506C to add a new subsection (j). New FFDCA Section 506C(j) requires the manufacturer of a drug, API, or associated medical device subject to the notification requirements under FFDCA Section 506C(a), as amended, to develop, maintain, and implement a redundancy risk management plan, as appropriate. Such plan should identify and evaluate risks to the supply of the drug, as applicable, for each facility in which the drug or API is manufactured. The plan is subject to inspection and copying by the Secretary. Section 3112 (c) amends FFDCA Section 506E to require the Secretary, not later than 180 days after enactment and every 90 days thereafter, to transmit to the Centers for Medicare & Medicaid Services (CMS) a report regarding the drugs on the current drug shortage list. Section 3112 (d) amends FFDCA Section 704(b) to require that following the inspection of a facility manufacturing a drug at risk of shortage or with limited competition, a copy of the inspection report be sent \"promptly\" to all appropriate FDA offices with expertise in drug shortages. Specifically, this requirement applies to the inspection of a facility manufacturing a drugâapproved under an NDA or ANDAâfor which a notification has been submitted under FFDCA Section 506C(a) (regarding an interruption in manufacturing or discontinuance), a drug that has been on the shortage list under FFDCA Section 506E in the past five years, or a drug with no blocking patents or exclusivities for which there are not more than three approved drugs listed in the Orange Book. Section 3112(e) amends FFDCA Section 510(j) to require each drug manufacturer that registers with FDA to report annually to the Secretary for each listed drug \"the amount that was manufactured, prepared, propagated, compounded, or processed by such person for commercial distribution.\" The Secretary may require this information to be submitted in electronic format, may require that this information be submitted at the time a public health emergency is declared under PHSA Section 319, and may exempt certain biologics from these reporting requirements if the Secretary determines it is not necessary to protect the public health. Background FDA regulates the safety and effectiveness of medical devices in the United States. All medical device manufacturers are required to register their establishments with FDA, and such establishments are subject to inspections by FDA personnel or representatives. In addition, most medical devices are required to be reviewed by the agency prior to marketing; such premarket review mechanisms include premarket notification (510(k)), premarket approval, de novo classification request, and humanitarian device exemption, among others. Prior to the COVID-19 outbreak, concerns arose about potential medical device shortages due to the closure of ethylene oxide sterilization facilities that were not in compliance with U.S. Environmental Protection Agency (EPA) standards. In contrast to the agency's authority to compel manufacturers of certain drugs to report discontinuances or interruptions in production, FDA did not have such authority for medical devices prior to the CARES Act. Rather, FDA relied on manufacturers to voluntarily report such information to the agency. In its FY2021 Congressional Justification, FDA requested additional authority to \"require firms to notify FDA of an anticipated significant interruption in the supply of an essential device; require all manufacturers of devices determined to be essential to periodically provide FDA with information about the manufacturing capacity of the essential device(s) they manufacture; and authorize the temporary importation of devices whose risks presented when patients and healthcare providers lack access to critically important medical devices outweigh compliance with U.S. regulatory standards.\" Legislation introduced in the 116 th Congress would provide FDA with additional authority to mitigate potential device shortages, generally through adding required reporting requirements on device manufacturers and allowing for expedited premarket review and inspections in certain cases of shortage. However, some bills propose providing FDA with more authority than others, such as those allowing for importation of unapproved devices in the case of a device shortage. Provision Section 3121 creates a new FFDCA Section 506J, which requires medical device manufacturers to report to FDA during or prior to a public health emergency any permanent discontinuance of production, or interruption in production, likely to lead to a meaningful disruption in supply of a medical device, including the reasons for the discontinuance or interruption. Medical device manufacturers are required to report this information to FDA at least six months prior to occurrence, or as soon as is practical. In turn, FDA is required to make such information public to appropriate organizations (e.g., physicians, supply chain partners) unless such a disclosure would adversely affect the public's health. If a manufacturer fails to submit information about discontinuances or interruptions, FDA is required to submit a letter to the manufacturer documenting this failure. The manufacturer is required to respond with reasons for noncompliance, as well as with information on interruptions or discontinuances as originally required, within 30 days. FDA would make such information public within 45 days of receipt but is not able to disclose to the public any information considered confidential or a trade secret. New FFDCA Section 506J also requires FDA to establish and maintain a device shortage list that includes, among other things, the category or name of the device in shortage and, as determined by FDA, the reason(s) for the shortage (e.g., demand increase for the device) and the expected duration of the shortage. Such information must be made public, except if such information is considered confidential, a trade secret, or determined by FDA to be harmful to the public's health (e.g., increases the possibility of hoarding). Finally, new FFDCA Section 506J requires FDA to expedite premarket review and facility inspections of medical devices considered to be, or likely to be, in shortage and defines the terms \"meaningful disruption\" and \"shortage.\" This subpart includes three provisions related to coverage of COVID-19 tests and subsequent vaccines that may be developed to prevent COVID-19. They primarily address private health insurance coverage, including insurer payments to providers who furnish the test. One provision expands the FFCRA definition of testing that must be covered without cost-sharing by most private health insurance plans, and by other public and private health coverage programs and plans that reference the FFCRA definition. Background Through multiple provisions in Divisions A and F, FFCRA provides payment for or requires coverage of testing for the COVID-19 virus, and items and services associated with such testing, without any cost-sharing. Several of these provisions refer to a definition for COVID-19 testing established in FFCRA Section 6001(a)(1), which defines such tests to include in vitro diagnostics (IVDs), as defined in FDA regulation, that detect the SARS-CoV-2 virus or diagnose COVID-19 and that have received either 510(k) clearance, premarket approval, authorization pursuant to de novo classification, or emergency use authorization (EUA) for marketing. This definition is used or cross-referenced in the following provisions providing payment for or requiring coverage of testing for the COVID-19 virus: (1) Section 6001(a)(1)-(2), with respect to specified types of private health insurance coverage; (2) Section 6006, with respect to TRICARE, veterans' health care, and federal civilian employee health coverage (Federal Employees Health Benefits Program or FEHBP); and (3) Section 6007, with respect to the Indian Health Service (IHS). In addition, appropriations provided in FFCRA Division A to the Defense Health Program, Veterans Health Administrations, IHS, and Public Health and Social Services Emergency Fund are to be used, in whole or in part, to pay for COVID-19 testing and related services, with reference to FFRCA Section 6001(a)(1). On March 16, 2020, FDA updated guidance relating to COVID-19 diagnostic tests during the public health emergency. In this guidance, the agency detailed four policies, whereby manufacturers or laboratories could develop, use, or market laboratory-developed tests or test kits for COVID-19. Two of these policies allowed for laboratories and test kit manufacturers to begin using or distributing their tests prior to receiving an EUA from the agency, as long as they submitted an EUA application within 15 business days of beginning clinical testing or distribution of the test kit and notified the agency that the test was in use. Therefore, tests and test kits would be in clinical use without having been granted an EUA (or 510(k) clearance, de novo authorization, or premarket approval). In addition, the agency outlined a policy allowing states to authorize laboratories within their state to carry out testing without FDA involvement; therefore, these tests would also be in clinical use without authorization from the FDA (or 510(k) clearance, de novo authorization, or premarket approval). Therefore, pursuant to the FDA's updated March 16 guidance, some tests in clinical use would fall outside the definition at FFCRA Section 6001(a)(1) and may not be included in the above-referenced provisions' requirements providing payment for or requiring coverage of testing for the COVID-19 virus. Provision Section 3201 amended FFCRA Section 6001(a)(1) to include those IVDs (1) that have received either 510(k) clearance, premarket approval, authorization pursuant to de novo classification, or an EUA; (2) where the developer has requested, or intends to request, an EUA; (3) that are developed in and authorized by a state that has notified the Secretary of its intention to review tests intended to diagnose COVIDâ19; and (4) that are determined appropriate through guidance by the Secretary. Background FFCRA Section 6001 created a requirement for most private health insurance plans to cover specified COVID-19 testing and testing-related items and services. The coverage must be provided without consumer cost-sharing, including deductibles, copayments, or coinsurance. This coverage requirement applies to the specified items and services that are furnished during the COVID-19 public health emergency described in FFCRA. The provision did not address the reimbursement amount that a provider must receive from a health plan for furnishing COVID-19 testing. In private health insurance, the amount paid for covered items and services is generally contingent upon whether a consumer's health plan has negotiated with a provider to enter into a contract. The contract between the health plan and the provider generally specifies the total amount that a provider may receive for furnishing particular items or services to that health plan's enrollees. A provider that enters into a contract with a health plan is considered to be part of the health plan's network, otherwise referred to as being in-network. A provider that does not enter into a contract with a health plan is considered out-of-network and as such there is no negotiated rate between the provider and the health plan. In situations involving services provided by an out-of-network provider, the amount that a provider will receive from a health plan depends on whether the health plan covers out-of-network services. In situations where health plans do not cover out-of-network services, the health plan will not pay any amount to a provider for services provided to an enrollee of the health plan. In situations where plans do cover out-of-network services, as there is no negotiated rate between health plans and out-of-network providers, health plans will use their own methodologies for calculating how much they will pay out-of-network providers for services. Provision Section 3202 establishes a methodology for determining the amount that a health plan must reimburse a provider for the COVID-19 testing, and testing-related items and services that are required to be covered under FFCRA Section 6001(as amended). If a health plan had a negotiated rate with a provider prior to the declaration of the COVID-19 public health emergency declared under PHSA Section 319, then the health plan must apply that negotiated rate throughout the period of the COVID-19 public health emergency. If a health plan did not have a negotiated rate with a provider prior to the emergency declaration, then the health plan must either reimburse the provider an amount that equals the cash price for the COVID-19 testing, as listed on the provider's public website, or the health plan and provider may negotiate a rate that is less than the cash price. During the period of the COVID-19 public health emergency, providers of COVID-19 diagnostic testing must make public the cash price for the COVID-19 test on the provider's public website. The Secretary may impose a civil monetary penalty on a provider of COVID-19 diagnostic testing that is not in compliance with the requirement to post the cash price for the COVID-19 testing and has not completed a corrective action plan to comply with the requirement. The amount of the civil monetary penalty may not exceed $300 per day that the violation is ongoing. Background PHSA Section 2713 and accompanying regulations require most private health insurance plans to cover, without cost-sharing, specified types of clinical preventive services. These include any preventive service recommended with an A or B rating by the United States Preventive Services Task Force (USPSTF), or any immunization with a recommendation by the Advisory Committee on Immunization Practices (ACIP), adopted by CDC, for routine use for a given individual. These coverage requirements apply no sooner than one year after a recommendation is published. Requirements of Section 2713 apply to individual health insurance coverage and to small- and large-group plans, whether fully insured or self-insured. The requirements do not apply to grandfathered individual or group plans, or to short-term, limited duration insurance (STLDI). By regulation, plans are generally not required to cover preventive services furnished out-of-network. Cost-sharing for office visits associated with a furnished preventive service may or may not be allowed, as specified in regulation. Provision Section 3203 requires specified plans â the same types of plans as those subject to PHSA Section 2713âto cover a COVID-19 vaccine and potentially other COVID-19 preventive services, as recommended by ACIP or USPSTF, respectively. This coverage must be provided without cost-sharing. Section 3203 also applies an expedited effective date for coverage of 15 business days after an applicable ACIP or USPSTF recommendation is published. Otherwise, requirements of Section 3203 mirror existing requirements under PHSA Section 2713. This subpart includes provisions that aim to extend the services available during the COVID-19 period and beyond, particularly for rural or otherwise underserved populations. The subpart includes additional appropriations for health centers that provide care to populations that are underserved or are located in underserved areas. Other provisions relate directly to health care providers; for example, by conferring medical malpractice liability on health professionals who choose to volunteer during the emergency period, by amending program rules for the NHSC program to permit individuals to volunteer during the emergency period, and by clarifying aspects of the USPHS Ready Reserve Corps program. The Ready Reserve Corps is composed of reserve officers serving in other roles who would be subject to intermittent involuntary deployment (\"call up\") to bolster the available workforce for public health emergency missions. Finally, the subpart reauthorizes and amends existing programs related to supporting rural health care providers and encouraging the use of telehealth to expand access to care. Background The federal health center program, authorized by PHSA Section 330 and administered by the Health Resources and Services Administration (HRSA), provides grants to not-for-profit organizations or state and local government entities to operate outpatient health centers. Participation in the program requires grantees to provide care regardless of a patient's ability to pay, and grant funding is provided to support this care. These centers are also required to be located in medically underserved areas (MUAs) or to provide care to a population that is designated as underserved. Health centers are part of the health care safety net, and they have been used as a way to fund safety net providers during prior disasters, when additional funds were appropriated to make awards to existing grantees to respond to an emerging need. In FY2020, health centers received a combination of discretionary and mandatory funding, which together provided more than $5.6 billion to support the program. Health centers also received additional funds in P.L. 116-123 , Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020, the first law to respond to COVID-19. That law provided the program with an additional $100 million. These funds were awarded via formula to supplement existing health center funding. Provision This section appropriates $1.32 billion in supplemental funding for health centers for FY2020 for the detection of the COVID-19 virus, or prevention, diagnosis, and treatment of COVID-19 illnesses. The section also applies the limits on using these funds for abortion that were included in Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), which provided FY2020 appropriations for HHS, among other agencies. Background PHSA Section 333(I) authorizes two telehealth programs that were authorized at \"such sums as may be necessary\" through FY2006. Both programs have been funded since that time, despite the lapsed authorization of appropriation. The programs are administered by HRSA. The first program, authorized in PHSA Section 333I(d)(1), is the Telehealth Network Grant Program (TNGP). This program aims to demonstrate how telehealth technologies can be used through telehealth networks for medically underserved populations who live in rural areas, frontier communities, and MUAs. Prior to passage of the CARES Act, only nonprofit entities were eligible to apply for TNGP grants; however, prior law permitted both nonprofit and for-profit organizations to participate in the grantees' telehealth networks. The second program is the Telehealth Resource Centers (TRC) Program. This program aims to coordinate telehealth organizations that serve rural and underserved communities throughout the country, by providing technical assistance to those organizations through national and regional TRCs. FY2020 appropriations report language provides $28.5 million to HRSA's overarching Telehealth Program, which includes both of these programs. Provision This section amends PHSA Section 330I to make changes to both the TNGP and the TRC programs. It makes the following changes: (1) The Telehealth Network Grant Program (TNGP) Grants. Section 3212 amends PHSA Section 330I by replacing the HRSA Administrator's Director's authority to award grants to eligible grantees to demonstrate how telehealth technologies can be used through telehealth networks, with the authority to award grants to evidence-based projects that utilize telehealth technologies through telehealth networks. The purpose of the TNGP now includes improving access to and quality of health care services for the TNGP patient population. Grantees may no longer use TNGP funds to expand health care provider training or for decision-making purposes. Grant period. Section 3212 allows the HRSA Administrator to extend the period of performance for the TNGP from four years to five years. This section also makes administrative changes to the statutory requirements on telehealth networks, including the nature of entities and composition of telehealth networks. This section removes the statutory requirements that grantees of TNGP be nonprofit entities and that telehealth networks be composed in a certain manner. Applications. Grant applicants are now required to describe within their applications how the applicants' proposed TNGP projects will, among other things, improve access and quality of the health care services that patients will receive. Prior to passage of the CARES Act, this provision was optional. Terms , conditions , maximum amount of assistance. Section 3212 removes the statutory requirements that the Secretary has to establish the terms and conditions of the TNGP, as well as the maximum amounts awarded to each TNGP recipient for each fiscal year. This section removes the federal mandate that required the Secretary to publish, through HRSA, a notice of application requirements for the TNGP program for each fiscal year. Preferences. The Secretary is required to also give preference to eligible entities that develop plans for or establish telehealth networks that provide mental health care services, public health care services, long-term care, home care, preventive care, case management services, or prenatal care for high-risk pregnancies. This section also expands preference to eligible entities that propose projects that promote local and regional connectivity within areas, communities, and populations served. The Secretary, however, may no longer give preference to applicants that demonstrate integration of health care information into TNGP projects. Distribution of funds. The HRSA Administrator no longer has to ensure that the total amount of funds awarded in a given fiscal year is not less than the total amount awarded for projects in FY2001. The HRSA Administrator must continue to ensure that no less than 50% of funds are awarded to TNGP projects in rural areas. Use of funds. Grantees no longer have the authority to use TNGP funds to purchase certain equipment. Grantees are prohibited from purchasing computer hardware and software, audio and video equipment, computer network equipment, interactive equipment, and data terminal equipment. However, grantees may continue to purchase equipment that furthers the objectives of the TNGP, such as to expand access to health care services. Prohibited uses of funds. TNGP grantees are prohibited from using more than 20% of total grant funds to purchase or lease equipment. Under prior law, grantees were allowed to use no more than 40% of total grant funds. Section 3212 also removes the examples of transmission equipment from the list of items that TNGP funds cannot be used to purchase. Report and regulations . The section requires the Secretary to submit a report, to specified congressional committees, that describes the activities and outcomes of the TNGP, no later than March 27, 2024, and every five years thereafter. The Secretary is no longer required to issue regulations specifying the definition of frontier area. (2) The Telehealth Resource Centers (TRC) Program Grants and eligibility . Section 3212 amends PHSA Section 330I by replacing the HRSA Administrator's authority to award grants for projects to demonstrate how telehealth technologies can be used in certain areas and communities, with the authority to award grants to support initiatives that utilize telehealth technologies. The CARES Act removes the program's authority to establish new TRCs, which essentially makes the current TRCs permanent recipients of federal funds under the program and does not allow for other entities to participate as TRCs. The section also permits the HRSA Administrator to extend the period of performance for the TRC program from four years to five years. Section 3212 removes the statutory requirement that grantees of the TRC program be nonprofit entities. Terms , conditions , maximum amount of assistance. Section 3212 removes the statutory requirement that the Secretary has to establish the terms and conditions of the TRC program, as well as the maximum amount awarded to each TRC program recipient for each fiscal year. This section no longer requires the Secretary to publish, through HRSA, a notice of application requirements for the TRC program for each fiscal year. Preferences. The section requires the Secretary to also give preference to eligible entities with successful records in delivering health care services to rural areas, MUAs, and medically underserved populations. Use of funds. The section specifies that grantees no longer have the authority to use TRC program funds to foster certain telehealth activities. It also prohibits grantees from using funds to foster the use of telehealth technologies to provide health care information. However, grantees may continue to foster the use of telehealth technologies to educate health care providers and consumers in an effective manner. Report and regulations . The section requires the Secretary to submit a report, to specified congressional committees, on the activities and outcomes of the TRC program, no later than March 27, 2024, and every five years thereafter. (This report need not to be a separate report from that required of the TNGP.) The Secretary is no longer required to issue regulations specifying the definition of frontier area. Authorization of appropriations. The section authorizes an appropriation of $29 million for each of FY2021 through FY2025. Background PHSA Section 330A authorizes three grant programs supporting rural health care providers: the rural health care services outreach grants, the rural health network development grants, and the small health care provider quality improvement grants. These programs are administered by HRSA's Federal Office of Rural Health Policy (FORHP). In each case, grants are available to nonprofit or governmental health entities for a period of three years. The Rural Health Network Development program also permits additional one-year planning grants. Funds for the program had been authorized at $45 million annually through FY2012, and required a one-time report to Congress that was required at the end of FY2005. Despite the lapsed authorizations of appropriations, these programs have continued to be funded in recent years. Most recently, the programs received an appropriation of $79.5 million in FY2020. Provision This section makes a number of technical corrections to PHSA Section 330A. It also replaces language related to essential health services to make reference to basic health services, extends the duration of Rural Health Care Service Outreach grants and Rural Health Network Development grants from three to five years, and expands eligibility for the programs to any rural health entity (prior eligibility was limited to rural public or nonprofit health entities). The section also eliminates the one-year planning grants from the Rural Health Network Development program and extends the grant period of the Small Health Care Quality Improvement grants from three to five years. Finally, the section requires a report, to be delivered to specified congressional committees, on these grant programs, not later than four years after enactment and every five years thereafter, and authorizes an appropriation of $79.5 million for each of FY2020 through FY2025. No additional funding for FY2020 is appropriated in this provision. Background The USPHS Commissioned Corps is a branch of the U.S. uniformed services, but it is not one of the armed services. The Corps is based in HHS under the authority of the U.S. Surgeon General (SG). USPHS-commissioned officers are physicians, nurses, pharmacists, engineers, and other public health professionals who serve in federal agencies, or as detailees to state or international agencies, to support a variety of public health activities. ACA (the Patient Protection and Affordable Care Act, P.L. 111-148 , as amended), Section 5210, authorized a USPHS Ready Reserve Corpsâreserve officers serving in other roles who would be subject to intermittent involuntary deployment (\"call up\") to bolster the available workforce public health emergency missions. HHS had not received an appropriation for this purpose and had not established a Ready Reserve Corps. It has been reported that the ACA authority did not fully authorize this action, and legislation ( S. 2629 , the United States Public Health Service Modernization Act of 2019) was introduced to address this. Provision Section 3214 enacts the language of S. 2629 , making several technical and substantive amendments to PHSA Title II to clarify provisions regarding deployment readiness, retirement, compensation, and other matters as they would affect the Ready Reserve Corps. Background In 1997, Congress enacted the Volunteer Protection Act of 1997 (VPA; P.L. 105-19 ). This act provides that a volunteer at a nonprofit organization or governmental entity is not liable for the harm he or she causes by an act (or an act of omission) on behalf of the organization, provided the following: (1) the volunteer was, among other things, properly licensed, certified, or authorized for the activities in a state, if applicable; (2) the volunteer was acting within the scope of his or her responsibilities in the organization at the time of the act (or act of omission); and (3) the harm was not caused by \"willful or criminal misconduct, gross negligence, reckless misconduct, or a conscious, flagrant indifference to the rights or safety of the individual harmed by the volunteer.\" The law does not convey liability protections in certain instances (e.g., when misconduct is a criminal act or when the defendant acted under the influence of drugs or alcohol), and the law specifies how it interacts with relevant state law. This law was not specific to health professionals in a volunteer capacity but, rather, covered all types of volunteers. Provision This section limits the medical malpractice liability of health professionals who volunteer during the COVID-19 emergency. Specifically, it limits the liability under federal and state law for any harm caused by an act or omission while providing health services during the emergency, provided that the health services are within the scope of the health professional's license registration, or certification, and that the health professional acted in good faith. The section specifies that health professionals do not have liability protections in situations where harm was caused by \"willful or criminal misconduct, gross negligence, reckless misconduct, or a conscious flagrant indifference to the rights or safety of the individual harmed by the health care professional,\" or when services were provided by a health professional who was under the influence of drugs or alcohol. The section specifies that it preempts state or local laws that are inconsistent with this section, unless those laws provide great liability protections, and specifies that the liability protections are in addition to those provided under the VPA. Finally, the section defines relevant terms and specifies that this provision is effective at enactment and will remain in effect for the length of the public health emergency declared by the Secretary under PHSA Section 319, declared by the Secretary on January 30, 2020. Background The federal government supports a number of health workforce programs administered by HRSA. Among the largest of these programs is the NHSC, which provides scholarships and loan repayment to health care providers in exchange for a two-year or more service commitment in a health professional shortage area (HPSA). The program is authorized in PHSA Sections 332-338I. PHSA Section 333 specifies the types of health care facilities and the conditions they must meet to receive NHSC personnel. Generally, these are outpatient health facilities in HPSAs. Provision This section specifies that for the duration of the public health emergency declared under PHSA Section 319 for the COVID-19 response, the Secretary may waive the requirements in PHSA Section 333 in order to assign NHSC members to voluntarily provide health services to respond to the emergency. The provision allows NHSC members to volunteer services for the number of hours that the Secretary determines appropriate. The provision further specifies that NHSC members must be assigned voluntarily, that the assignment site must be in reasonable proximity to the NHSC corps member's original practice site, and that these hours are to count toward fulfilling their NHSC service commitment. Background Generally, the privacy of health information is governed by the HIPAA (Health Insurance Portability and Accountability Act of 1996, P.L. 104-191 , as amended) Privacy Rule, which establishes requirements for covered entities' (health care plans, providers, and clearinghouses) and their business associates' use and disclosure of protected health information (PHI). All health information is generally treated similarly under the HIPAA Privacy Rule, with certain exceptions in place relating to the use and disclosure of psychotherapy notes. In contrast, stricter federal privacy requirements at PHSA Section 543ârequirements promulgated in and commonly known as the \"Part 2\" ruleâapply to individually identifiable patient information received or acquired by federally assisted substance use disorder programs. Specifically, the Part 2 rule governs any information that would identify a patient as having or having had a substance use disorder, and that is obtained or maintained by a federally assisted substance use disorder program for the purpose of treating a substance use disorder, making a diagnosis for that treatment, or making a referral for that treatment. Part 2 requirements apply to an individual or entity (other than a general medical facility) that is federally assisted and providesâand holds itself out as providingâdiagnosis, treatment, or referral for treatment of substance use disorders. \"Federally assisted programs\" include programs that are carried out in whole or in part by the federal government or supported by federal funds. The Part 2 rule strictly regulates the disclosure and redisclosure of patient identifying information held by Part 2 programs. The rule allows disclosure of this information only either (1) with written patient consent or (2) pursuant to exceptions in statute or regulation (e.g., for a medical emergency, for research). A general authorization for the release of medical information does not satisfy the rule's requirement for written consent, although a general designation in consent is allowed in cases where a class of participants may receive and redisclose amongst themselves Part 2 information if there exists a treatment relationship. Further, the rule strictly prohibits the subsequent redisclosure of information received from a Part 2 program without consent from the patient, and a notification clearly prohibiting this redisclosure by the receiving entity travels with any disclosed Part 2 information. Under PHSA Section 543(f), any person who violates any provision of the section or any regulation issued pursuant to the section shall be fined in accordance with Title 18 of the U.S. Code . Provision Section 3221 amends PHSA Section 543 to allow for, pursuant to written consent, the use or disclosure of covered records by a covered entity, business associate, or a Part 2 program for purposes of treatment, payment, and health care operations as permitted by the HIPAA Privacy Rule. In addition, the section allows information disclosed pursuant to this exception to be subsequently redisclosed in accordance with the HIPAA Privacy Rule. It further allows the disclosure of deidentified records to public health authorities, without written consent, if the information meets the deidentification standards in the HIPAA Privacy Rule. Section 3221 applies the penalties under SSA Sections 1176 and 1177 for violations of PHSA Section 543, as specified. It also prohibits discrimination against an individual on the basis of information received pursuant to an inadvertent or intentional disclosure of covered records, or information contained in covered records, in multiple instances (e.g., employment, access to courts). The section applies the HIPAA breach notification requirements to a program or activity under PHSA Section 543 in case of a breach of records. Section 3221 requires the Secretary to revise regulations as necessary such that changes in the section apply with respect to uses and disclosures of covered records occurring on or after the date that is 12 months after enactment. It also requires the Secretary, not later than one year after enactment and in consultation with appropriate legal, clinical, privacy, and civil rights experts, to update the notice of privacy practices requirement in the HIPAA Privacy Rule to require covered entities and entities creating or maintaining covered records to provide notice, in plain language, of privacy practices regarding those records. The section also establishes that nothing in the act shall be construed to limit (1) the right of an individual to request a restriction on the use or disclosure of a record under PHSA Section 543 for purposes of treatment, payment, or health care operations, and (2) the choice of a covered entity to obtain consent to use or disclose a covered record for purposes of treatment, health care operations, or payment. Background The OAA (Older Americans Act, P.L. 89-73, as amended; 42 U.S.C. Â§Â§ 3001 et seq.) Nutrition Services Program provides grants to states and U.S. territories under Title III of the act to support congregate nutrition services (i.e., meals served at group sites such as senior centers, community centers, schools, churches, and senior housing complexes) and home-delivered nutrition programs for individuals aged 60 and older. The Nutrition Services Program is designed to address problems of food insecurity, promote socialization, and promote the health and well-being of older persons through nutrition and nutrition-related services. The program is administered by the Administration for Community Living (ACL) under HHS. States and territories receive separate funding allotments for each program based on a statutory funding formula. Under OAA, states and U.S. territories have authority to transfer up to 40% of their allotments between congregate and home-delivered nutrition services and can request waivers to transfer up to 10% of additional funding between these programs. In addition, OAA provides states authority to transfer up to 30% of program funding from the Supportive Services Program to the Nutrition Services Program. Nutrition services providers are required to offer at least one meal per day, five or more days per week (except in rural areas, where the provision of meals may be less frequent). The meals must comply with the Dietary Guidelines for Americans published by the Secretary of HHS and the Secretary of Agriculture. Providers must serve meals that meet specified minimum amounts for the daily recommended dietary reference intakes (DRIs) established by the Food and Nutrition Board of the National Academies of Sciences, Engineering, and Medicine based on the number of meals served by the project each day. With respect to home-delivered nutrition programs, individuals aged 60 or older and their spouses (regardless of age) may participate in the home-delivered nutrition program. Persons aged 60 or over who are frail, homebound by reason of illness or disability, or otherwise isolated, are also prioritized for OAA Title III services. Services may be available to individuals under age 60 with disabilities if they reside at home with the older individual. Service eligibility is determined by the states and local Area Agencies on Aging (AAA); however, according to the ACL, entities may waive any eligibility requirements they have established for home-delivered meals in response to the COVID-19 pandemic. Provision During any portion of the COVID-19 public health emergency declared under PHSA Section 319, the section sets forth additional transfer authority between OAA nutrition programs, clarifies participant requirements for home-delivered meals, and authorizes the Assistant Secretary for Aging to waive certain dietary requirements for nutrition services. Specifically, the HHS Secretary is required to allow a state agency or an AAA to transfer up to 100% of the funds appropriated and received for congregate and home-delivered nutrition between these two programs, for such use as the state or area considers appropriate to meet service needs without prior approval. For purposes of state agencies' determining the delivery of nutrition services, the provision requires the same meaning to be given to individuals who are unable to obtain nutrition because they are practicing social distancing due to the emergency as is given to an individual who is homebound because of illness. And, to facilitate implementation of nutrition services programs, the Assistant Secretary is authorized to waive compliance with the Dietary Guidelines for Americans and the specified minimum amounts for the daily recommended DRI requirements. The provision defines the terms ''Assistant Secretary,'' ''Secretary,'' ''State agency,'' and ''area agency on aging'' to have the same meanings as under OAA Section 102. Background OAA Title V establishes the Community Service Employment for Older Americans program (CSEOA), sometimes referred to as the Senior Community Service Employment Program (SCSEP). CSEOA promotes part-time employment opportunities in community service activities for unemployed low-income persons aged 55 and older and who have poor employment prospects. The Title V program is administered by the Department of Labor's (DOL's) Employment and Training Administration. DOL allocates Title V funds for grants based on a statutory funding formula to state agencies in all 50 states, the District of Columbia, Puerto Rico, and the U.S. territories, and to national organizations. Program participants work part-time in community service jobs, including employment at schools, libraries, social service organizations, and senior-serving organizations. Program participants earn the higher of minimum wage or the typical wage for the job in which they are employed. An individual may typically participate in the program for a cumulative total of no more than 48 months. Provision Due to the effects of the COVID-19 public health emergency declared under PHSA Section 319, this section specifies additional flexibility for the Secretary of Labor with respect to administration and implementation of the CSEOA program. Specifically, it authorizes the Secretary to allow individuals participating in OAA Title V projects as of March 1, 2020, to extend their participation for a period that exceeds 48 months in the aggregate, as determined by the Secretary. It authorizes the Secretary to increase the average participation cap for grantees of 27 months for eligible individuals to a cap the Secretary determines is appropriate. And it authorizes the Secretary to increase the amount available to pay the authorized administrative costs for a project, which is currently 13.5% of the grant amount, to not exceed 20% of the grant amount, if the Secretary determines that such increase is necessary to adequately respond to additional administrative needs. Background The HIPAA Privacy Rule governs covered entities' (health care plans, providers, and clearinghouses) and their business associates' use and disclosure of PHI. In addition, it establishes strong individual rights of access to an individual's own PHI. PHI is defined as individually identifiable health information created or received by a covered entity that is transmitted by electronic media, maintained in electronic media, or transmitted or maintained in any other form or medium. The rule sets forth multiple situations in which covered entities may permissibly use or disclose PHI without written authorization, while generally all other uses and disclosures of PHI (i.e., those that are not expressly permitted under the rule) require an individual's prior written authorization. Broadly, covered entities may share PHI between and among themselves for the purposes of treatment, payment, or health care operations, with few restrictions and, specifically, without the individual's authorization. The Privacy Rule also recognizes that PHI may be useful or necessary in circumstances besides health care treatment and payment for a given individual or general health care operations, or entirely unrelated to health care or the health care system. For this reason, the rule lists a number of \"national priority purposes\" for which covered entities may disclose PHI without an individual's authorization or opportunity to agree or object. Examples of these include disclosures for public health activities, health oversight, and pursuant to a requirement in law (e.g., state law). In response to the COVID-19 pandemic, the Office of Civil Rights (OCR)/HHS has issued guidance relating to the disclosure of PHI to first responders and law enforcement, as well as on telemedicine and the HIPAA Privacy Rule. OCR has also released several notifications of exercise of enforcement discretion during the COVID-19 public health emergency, specifically with respect to use and disclosure of PHI by business associates (BAs); the operation of Community-Based Testing Sites during the COVID-19 public health emergency; and the provision of care using telehealth. In addition, under authorities in SSA Section 1135 and the Project Bioshield Act ( P.L. 108-276 ), the Secretary has the authority to waive sanctions and penalties for certain HIPAA Privacy Rule violations during certain emergency periods. These have been waived. The specific HIPAA Privacy Rule requirements for which penalties may be waived are as follows: (1) the requirement to distribute a notice of privacy practices (45 C.F.R. Â§164.520); (2) the patient's right to request certain privacy restrictions (45 C.F.R. Â§164.522(a)); (3) the patient's right to request confidential communications (45 C.F.R. Â§164.522(b)); (4) the requirement to honor a request to opt out of a facility directory (45 C.F.R. Â§164.510(a)); and (5) the requirement to obtain agreement to share information with family and friends involved in a patient's care (45 C.F.R. Â§164.510(b)). These waivers apply only (1) in the emergency area identified in the public health emergency declaration and for the duration of the emergency, (2) to those hospitals that have a disaster plan; and (3) for the first 72 hours after the hospital's plan has been initiated. Provision Section 3224 requires the Secretary, not later than 180 days after enactment, to issue guidance on the sharing of patients' PHI (as defined at 45 C.F.R. Â§106.103) during emergency declarations and determinations, with respect to COVID-19, pursuant to PHSA Section 319, Section 501(b) of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act), and the National Emergencies Act. The section requires the guidance to address compliance with the HIPAA Privacy Rule and applicable policies, including any policies that may come into effect during these emergencies. Background The Healthy Start Program (Healthy Start), which is authorized in PHSA Section 330H and administered by HRSA, is a competitive grant program. The program enables eligible public or private entities, community-based organizations, faith-based organizations, and Indian or tribal organizations to propose and administer innovative, community-based ways to decrease U.S. infant mortality rates (IMRs), improve perinatal and maternal health outcomes, and reduce ethnic and racial health disparities in perinatal health. ( I nfant mortality refers to the death of an infant before his or her first birthday. An infant mortality rate refers to the comparison of the number of infant deaths against 1,000 live births in a given year.) Healthy Start participants consist of women, men, infants, children, and involved parties such as family members. The program requires participants to reside in communities with IMRs that are at least 1.5 times greater than the U.S. IMR and/or have high rates of adverse perinatal outcomes such as preterm births and maternal deaths. The program's authorization of appropriations, which expired in 2013, was \"the amount authorized for the preceding fiscal year increased by the percentage increase in the Consumer Price Index (CPI) for all urban consumers for such year.\" Provision Purpose and considerations in making grants. Section 3225 amends PHSA Section 330H by expanding the Healthy Start project areas to those with increasing IMRs that are above the U.S. IMR. Section 3225 removes the mandate that required applicants to include consumers of project services as participants in community-based consortiums. The Secretary instead must require applicants to include state substance abuse agencies, participants, and former participants of project areas as participants in community-based consortiums. The Secretary, when considering grant awards, is required to consider factors that contribute to infant mortality, including poor birth outcomes (e.g., low birthweight and preterm birth) and social determinants of health. In addition, the Secretary must consider factors such as applicants' collaboration with the local community in developing Healthy Start projects and applicants' use and collection of data demonstrating the program's effectiveness in decreasing IMRs and improving perinatal outcomes. Coordination. Section 3225 makes conforming changes and moves the current language in subsection (c) to a new paragraph (1) and adds a new paragraph (2), under subsection (c). The new paragraph (2) requires the Secretary to ensure the Healthy Start program coordinates with similar programs and activities administered by HHS that aim to reduce IMRs and improve infant and perinatal health outcomes. Funding. The section authorizes an appropriation of $125.5 million for each of FY2021-FY2025, eliminates the CPI requirement, and authorizes the Secretary to reserve 1% of appropriated funds to evaluate Healthy Start projects. Section 3225 expands the Secretary's use of the reserved funds to evaluate information related to, among other things, progress made toward meeting program metrics or health outcomes on reducing IMRs, improving perinatal outcomes, and diminishing health disparities. GAO report. Section 3225 makes conforming changes and adds a new subsection (f). The new subsection requires the Government Accountability Office (GAO) to conduct an independent evaluation of Healthy Start and to submit a report to appropriate congressional committees, no later than March 27, 2024. The section specifies that the evaluation must include a determination of whether Healthy Start projects have been effective in reducing the health disparity in health care outcomes between the general population group and racial and minority population groups, where applicable and appropriate. The report must also contain a review, an assessment, and recommendations on, among other topics, HRSA's allocation of funding to urban and rural areas and progress towards meeting the evaluation criteria for programs that increase and decrease IMRs, improve and adversely affect perinatal outcomes, and affect disparities in infant mortality and perinatal health outcomes. Background The nation's blood supply is largely managed by a network of independent blood centers and the American Red Cross, with some oversight from HHS. These organizations collect blood product donations (e.g., whole blood, platelets) from individuals through scheduled appointments, walk-in appointments, and blood drives. The COVID-19 pandemic poses significant challenges for the United States' blood supply. Mitigation strategies to prevent the spread of COVID-19, such as closures of schools and workplaces, have led to blood drive cancellations, resulting in a critical blood supply shortage. In addition, individuals are reluctant to schedule blood donations while advised to social distance from others. Provision This section requires the Secretary to carry out a national campaign to improve awareness of, and support outreach to the public and health care providers about, the importance and safety of blood donation and the need for donations for the blood supply. The section requires the Secretary to consult with heads of relevant federal agencies (including FDA, CDC, and National Institutes of Health [NIH]), accrediting bodies, and representative organizations to carry out the campaign. In addition, the Secretary is authorized to enter into contracts with public or private nonprofit entities to carry out the campaign. The section requires the Secretary to submit a report to specified congressional committees, not later than two years from enactment that (1) describes the activities carried out, (2) describes trends in blood supply donations, and (3) evaluates the impact of the public awareness campaign. This part adds two new authorities to the broad body of law that provides incentives for medical product research and development. Background The Biomedical Advanced Research and Development Authority (BARDA) supports the clinical research and development, regulatory approval, and procurement of new MCMs (e.g., vaccines, treatments, and diagnostics) planned for use in public health emergencies. In addition to grants, contracts, and cooperative agreements, the PHSA permits BARDA to enter into \"other transactions,\" which are exempt from many statutory provisions and procurement regulations. In February 2020, BARDA announced it was using its other transaction authority (OTA) to expand existing relationships with private partners to speed the development of COVID-19 countermeasures. In general, such transactions above $100 million require a written determination \"by the Assistant Secretary for Financial Resources, that the use of such authority is essential to promoting the success of the project.\" Provision Section 3301 amends PHSA Section 319L in a number of ways that appear to be somewhat ambiguous, but the intent seems to be to waive the requirement for a written determination for transactions above $100 million during a public health emergency declared under PHSA Section 319. Transactions made under this provision would not be terminated solely due to the expiration of the public health emergency. The Secretary is required to report the use of this provision to specified congressional committees after the public health emergency ends. Background A zoonotic disease is an infectious disease that is transmissible between humans and nonhuman animals. Many emerging infections that have caused significant outbreaks among humans, are believed to have arisen from animal-to-human transmission. Drugs to treat animals are evaluated for approval by FDA. An animal origin for the COVID-19 virus is considered likely but unproven. Provision Section 3302 adds a new Section 512A to the FFDCA regarding Priority Zoonotic Animal Drugs. It requires the Secretary, upon an applying drug sponsor's request, to expedite the development and review of a new animal drug \"if preliminary clinical evidence indicates that the new animal drug, alone or in combination with 1 or more other animal drugs, has the potential to prevent or treat a zoonotic disease in animals, including a vector borne-disease, that has the potential to cause serious adverse health consequences for, or serious or life-threatening diseases in, humans.\" The request may be made upon, or any time after, the opening of an investigational new animal drug file or filing of an application for approval, and the Secretary shall act on such request within 60 days. Actions that may be used to expedite review include expanded consultations and guidance regarding novel designs or drug development tools to make clinical trials more efficient. PHSA Title VII authorizes a number of programs to support the health workforce. These include scholarships, loans, and academic programs that seek to diversify the workforce, train primary care providers, and increase the number of geriatric health care providers, among other things. PHSA Title VIII authorizes similar programs to support the nursing workforce. Many of Title VII and Title VIII programs were most recently reauthorized in Title V of the ACA, which made program changes, added new programs, and generally provided authorizations of appropriations through either FY2013 or FY2014. Although authorizations of appropriations for most Title VII and Title VIII have lapsed, a number of these programs have continued to receive appropriations through HRSA's Bureau of the Health Care Workforce. These programs have also been considered for reauthorization in the 116 th Congress, where bills would typically provide a five-year authorization of appropriations at the amounts provided in the most recent fiscal year. For example, S. 2997 , Title VII Health Care Workforce Reauthorization Act of 2019, would have reauthorized a number of Title VII programs for five years, and would have authorized funding at FY2019 funding levels. Much of S. 2997 was included in Sections 3401-3403 of the CARES Act, generally with funding amounts reflective of FY2020 appropriations and with a five-year authorization that begins in FY2021. Similarly, S. 1399 , Title VIII Nursing Workforce Reauthorization Act of 2019, would have reauthorized a number of Title VIII programs for five years, and would have authorized funding at FY2019 funding levels. Much of what was included in S. 1399 was enacted in Section 3404 of the CARES Act, with funding amounts reflective of FY2020 appropriations and with a five-year authorization that begins in FY2021. Background PHSA Title VII authorizes a number of programs to support the health workforce. Though authorizations of appropriations for most Title VII programs have lapsed, several programs have received appropriations in recent years. The relevant Title VII programs (with their FY2020 appropriation level, if appropriate) are summarized below. The summary also notes other relevant PHSA Title VII advisory groups amended by this section. Centers of Excellence (Section 736) supports centers that seek to recruit, retain, and train underrepresented minorities in the health professions. The program received an appropriation of $23.711 million in FY2020. Health Professions Training for Diversity (Section 740) authorizes appropriations for a number of diversity-related training programs. Subsection (a) authorizes appropriations for scholarships for disadvantaged students (PHSA Â§737), which received an appropriation of $51.47 million in FY2020; subsection (b) authorizes appropriations for loan repayment and fellowships for minority health professional faculty (PHSA Â§738), which received an appropriation of $1.19 million in FY2020; subsection (c) authorizes appropriations for the Health Careers Opportunity Program (PHSA Â§739), which provides grants for programs that provide health career training to individuals from disadvantaged backgrounds. This program received an appropriation of $15 million in FY2020, and subsection (d) required a report on diversity in the health professions that was due not later than six months after enactment. Primary Care Training and Enhancement (Section 747) authorizes grant programs to support primary care medicine and physician assistant training. The program received an appropriation of $48.925 million in FY2020. Training in General, Pediatric, and Public Health Dentistry (PHSA Section 748) authorizes grants to support dentists and dental hygienist training. The program received an appropriation of $28 million in FY2020. Advisory Committee on Training in Primary Care Medicine and Dentistry (Section 749) authorizes the advisory committee that provides oversight over PHSA Section 747 and Section 748 programs. Authorizations of appropriations for those programs are contained in their respective authorizing provisions. Section 749 was renumbered in the ACA, but its language was not amended at that time. Area Health Education Centers (Section 751) authorizes grants for centers at medical or nursing schools that provide training for students from underserved backgrounds or in underserved (often rural) areas. This program received $41.25 million in FY2020. Quentin N. Burdick Program for Rural Interdisciplinary Training (Section 754) provided grants for interdisciplinary rural-focused health workforce training projects. This program has not been funded in the past decade and does not have a current authorization of appropriations. Allied Health and Other Disciplines (Section 755) authorizes grants to support allied health professionals. This program has not been funded in recent years. Health Workforce Information and Analysis (Section 761) established HRSA's National Center for Health Workforce Analysis and authorizes grant programs to support state, local, and longitudinal workforce analyses. This program received an appropriation of $5.663 million in FY2020. The C ouncil on Graduate Medical Education (COGME; Section 762) analyzes and reports to relevant congressional committees on issues related to the physician workforce, training, and the financing of training. The committee is authorized in Section 762, which lays out the committee membership and its reporting requirements. The section also specifies that the committee was to sunset in 2003; however, language in appropriations laws have waived this sunset date. Public Health Training Centers (Section 766) authorizes grants at public health schools to train public health professionals in health promotion and preventive medicine, among other things. This program receives its authorizations of appropriation in PHSA Section 770(a). Authorization of Appropriations (Section 770) authorizes appropriations for the group of public health workforce programs authorized in PHSA Sections 765-770. Public health workforce programs received an appropriation of $17 million in FY2020. Pediatric Subspecialty Loan Repayment Program (Section 775) authorizes loan repayment to specific pediatric subspecialists (including behavioral health specialists) in exchange for a service requirement in underserved areas. This program was created in the ACA but has never been funded or implemented. Provision This section extends authorizations of appropriations for a number of sections in PHSA Title VII. In each case, appropriations are authorized for each of FY2021-FY2025. The section reauthorizes the health workforce diversity programs as follows: $23.711 million for PHSA Section 736, $51.470 million PHSA Section 740(a), $1.19 million for PHSA Section 740(b), and $15 million for PHSA Section 740(c). The section also amends the date of a report on diversity in the health professions required in PHSA Section 740(d) to require that the report is due to the appropriate congressional committees not later than September 30, 2025, and every five years thereafter. The section also amends and extends the authorizations of appropriations for a number of programs related to primary care medical and dental training, as specified below. The section amends PHSA Section 747, which authorizes training programs for primary care physicians and physician assistants. The section makes the following changes: (1) removes reference to demonstration projects in grants related to innovative care models; (2) amends granting priorities to permit the Secretary to give preference to qualified applicants that train residents in rural areas, including for Tribes or Tribal Organizations that are located in rural areas; (3) changes references from \"substance-related disorders\" to \"substance use disorders;\" and (4) authorizes an appropriation of $48.294 million annually for each of FY2021-FY2025. The section amends PHSA Section 748, which authorizes training programs for general, pediatric, and public health dentists and dental hygienists; it changes references from \"substance-related disorders\" to \"substance use disorders\" and authorizes an appropriation of $28.531 million for each of FY2021-FY2025. The section amends PHSA Section 749(d), which authorizes the Advisory Committee on Training in Primary Care Medicine and Dentistry, to update references to congressional committees to reflect the current committee names. The section amends PHSA Section 751, which authorizes the Area Health Education Center program, to authorize an appropriation of $41.25 million for each of FY2021-FY2025. The section amends PHSA Section 754, which authorizes the Quentin N. Burdick Program for Rural Interdisciplinary Training, to revise language related to using grant funds by replacing \"new and innovate\" with \"innovative or evidence-based.\" The section amends in PHSA Section 755, which authorizes grants for training in Allied Health and Other Disciplines to replace language related to the elderly with reference to \"geriatric populations or for maternal and child health.\" The section amends PHSA Section 761, which authorized Health Workforce Information and Analysis, to authorize to be appropriated $5.663 million annually for each of FY2021-FY2025. The section amends PHSA Section 762 (COGME) to update references to congressional committees to reflect the current committee names; change language from the Health Care Financing Administration to CMS; make conforming changes; add the HRSA Administrator to the council; delete language related to reports required at COGME's outset and the council's termination; and add new reporting requirement dates. Specifically, it requires a report to be delivered to specified congressional committees not later than September 30, 2023, and not less than every five years thereafter. The section amends PHSA Section 766 (Public Health Training Centers) to delete language related to Healthy People 2000 and to add language related to rural areas. The section amends PHSA Section 770 (Authorization of Appropriations), which authorizes appropriations for Public Health Workforce Programs, to authorize $17 million to be appropriated for each of FY2021-FY2025. The section amends PHSA Section 775 (Loan Repayment for Pediatric Subspecialists) to authorize such sums as may be necessary for each of FY2021-FY2025. Background HRSA administers a number of health workforce programs through its Bureau of Health Workforce. A number of these programs also have advisory committees that advise HRSA and Congress about specific programs (e.g., the Advisory Committee on Training in Primary Care Medicine and Dentistry provides oversight of programs authorized in Sections 747 and 748 related to primary care medicine and dental training). Each of these advisory groups has a specific charge or scope, and their work is generally not coordinated. For example, although COGME evaluates graduate medical education (GME) policy, the bulk of GME funding is from CMS, while the relevant advisory group is administered through HRSA. Experts have recommended the need for more coordinated GME and overall health workforce policy as a way to better focus federal health workforce investments across the federal government. Provision This section requires the Secretary, in consultation with the Advisory Committee on Training in Primary Care Medicine and Dentistry and the COGME, to develop a comprehensive plan that coordinates HHS's health care workforce development programs. The plan must include certain specified elements such as performance measures, as specified; gap analyses and plans to rectify these gaps; and barriers to implementing strategies to rectify the identified gaps. It also requires the Secretary to coordinate with other federal agencies and departments that administer relevant education and training programs. The purpose of such coordination is to evaluate whether these programs are meeting U.S. health workforce needs and identify opportunities to improve information collected to better inform program improvements. Finally, the section requires the Secretary to submit a report describing the comprehensive health workforce plan and its implementation to specified congressional committees no later than two years after enactment. Background PHSA Section 753 authorizes a number of geriatric workforce programs. Separately, PHSA Section 865 authorizes similar geriatric workforce programs focused on nurses, because nurses are generally not eligible for programs in Title VII. Beginning in FY2015, HRSA opted to consolidate and administer these geriatric workforce programs together and has since supported two training programs: the Geriatrics Workforce Enhancement Program (GWEP) and the Geriatrics Academic Career Awards (GACA). GWEP provides grants to create training programs that focus on training inter-professional teams to increase geriatric competence among primary care and other types of health care providers. GACA makes awards to institutions on behalf of junior (non-tenured) faculty to support the career development of academic geriatricians in medicine, pharmacy, nursing, social work, and other health professions. The expectation is that GACA award recipients will provide inter-professional clinical training and become leaders in academic geriatrics. PHSA Section 753 was most recently reauthorized in the ACA, which added a number of new subsections within the section that authorized new geriatric training programs. These new programs were never implemented. Appropriations were authorized through FY2014, with the exception of the Geriatric Career Incentive Award program, which had been authorized through FY2013. Despite the lapsed authorization of appropriations, these programs have been funded in recent years; most recently they received $40.737 million in FY2020. Provision This section replaces PHSA Section 753 with a new PHSA Section 753, \"Education and Training Related to Geriatrics.\" The new section codifies two existing geriatric workforce training programs: (1) GWEP and (2) GACA. It deletes existing unfunded geriatric training programs. The section, in new subsection (a) requires the Secretary to award grants, contracts, or cooperative agreements to specified health professional schools, including schools of allied health, nursing schools, and programs that focus on geriatric education, to establish GWEPs. It specifies the GWEP requirements that include health trainee support, and an emphasis on patient and family engagement and primary care integration. The section also specifies the activities that GWEP programs are authorized to provide, including specific types of training and Alzheimer's disease education. The section specifies that GWEP grants may not be awarded for more than five years; that applicants must submit an application, as specified; and that the Secretary is required to use certain awarding priorities but may also take into account specified awarding considerations. Finally, with regard to the GWEP program, the section specifies grantee reporting requirements, requires the Secretary to report to specified congressional committees not later than four years after the enactment of Title VII Health Care Workforce Reauthorization Act of 2019 and every five years thereafter, and requires that the report be made publicly available. New PHSA Section 753(b) establishes the GACA grant program where grants are awarded to eligible entities to support their geriatric careers. The section defines the entities eligible for GACA awards, including nursing schools and the health professionals who are eligible to receive support. The section also specifies that academics must be junior non-tenured faculty at the time the award is made, but that they remain eligible for the award if they receive tenure during the award period. The section specifies the application requirements and the assurances regarding service requirements that the application must contain. It specifies that, when making awards, the Secretary is required to ensure a geographical distribution among award recipients, including among rural MUAs. The section also specifies that grants must be a minimum of $75,000 in FY2021, to increase annually by the CPI thereafter; that award periods may not exceed five years; and the service requirement that awardees must fulfill as a condition of receiving an award. Finally, for both GWEP and GACA, the section waives certain awarding preferences that otherwise apply to Title VII grants, and it authorizes to be appropriated $40.737 million for each of FY2021-FY2025. Background PHSA Title VIII authorizes a number of nursing workforce programs. Part A provides general provisions of the title, including definitions and entities eligible for the grants made available under the title. Part B authorizes grant programs to support advance practice nurses, including nurse practitioners, nurse anesthetists, and nurse midwives. Part C authorizes grant programs that seek to increase nursing workforce diversity, and Part D authorizes grant programs that aim to strengthen the nursing workforce and improve nursing practice. This effort includes programs that seek to expand the nursing career ladder whereby individuals in lower skilled health professions receive training and education to advance in the nursing field (e.g., from a nursing assistant to a registered nurse). Finally, Part E establishes the nursing student loan program. These programs were most recently reauthorized in the ACA, with authorizations of appropriations through FY2013 or FY2014. Despite the lapsed authorization, these programs have been funded in recent years. Specifically, in FY2020, they received an appropriation of $260 million. Provision This section reauthorizes programs in PHSA Title VIII in subsection (a), while subsection (b) requires a GAO report on nursing loan programs. General Provision s . Subsection (a) makes the following changes to Title VIII. It adds nurse-managed health clinics to the definition of entities eligible for grants authorized in Title VIII; adds new language to applications (in Section 802), to use of funds (in Section 803), and to provisions that are generally applicable to Title VIII (Section 806). Specifically, the subsection adds new language that grants should be awarded to address national nursing needs, as specified; to require new information from grantees; and to add new language requiring a biennial report that includes certain specified elements to be delivered not later than September 30, 2020, to specified congressional committees. The subsection also makes a number of changes to Section 811 (grants for advance education nursing grants) to replace language that references master's level nurses to graduate level nurses, to change language referencing clinical nurse leaders to nurse administrators, and to add that clinical nurse specialist programs, as specified, are eligible for grants under this section. Nurse Education, Quality, and Retention Grants . The subsection amends Section 831 to rename the section \"Nurse Education, Quality, and Retention Grants.\" It also amends the description of practice priority groups and retention priority areas within the nursing career ladder by adding language, that among other things, specifies that grants help individuals, including health aides or community health practitioners certified under the IHS Community Health Aide Program, enter the nursing career ladder. It adds language to Section 831 specifying that grants may be used to develop and implement fellowship and residency programs and to encourage the mentoring and development of nursing specialties. It also deletes subsection (e), referring to grant awards preferences in prior years, and (h), which had authorized appropriations from FY2010-FY2014, and renumbers the subsection accordingly. The subsection also amends the reporting requirements in Section 831 to require the Secretary to submit a report on the grants in this section as part of a larger report required under Section 806, and expands the entities eligible for grants under this section to add, in addition to nursing schools, health care facilities, Federally Qualified Health Centers (FQHCs), nurse-managed health clinics, and a partnership of such a school and facility. Deletions . The subsection deletes PHSA Section 831A (Nurse Retention Grants), because grants for this purpose are now included in the amended PHSA Section 831. It then amends PHSA Section 846 (Loan Repayment and Scholarship Program) to permit individuals to fulfill their service commitment and for-profit health facilities, to make language gender neutral, and to remove the sections authorization of appropriation and make reference to an amount allocated under PHSA Section 871(b). The section also deletes the separate authorization of appropriations from PHSA Section 846A (Nurse Faculty Loans) and Section 847 (Eligible Individual Student Loan Repayment); adds language referencing clinical nurse specialists to PHSA Section 851 (National Advisory Council on Nurse Education and Practice); amends the committees that the council is required to report to update to current committee names; and amends language related to amounts available to fund the council's activities. The section also deletes PHSA Section 861 (Public Service Announcements) and PHSA Section 862 (State and Local Public Service Announcements). Appropriation Changes . Finally, the subsection amends Section 871, which authorizes appropriations for the title to authorize $137.837 million for each of FY2021-FY2025 to carry out Parts B, C, and D of Title VIII and to authorize $117.135 million for each of FY2021-FY2025 to carry out Part E (Student Loan Funds). Subsection (b) of the provision requires a GAO report that evaluates nurse loan repayment programs, as specified, to be delivered to specified congressional committees, no later than 18 months after enactment. Subtitle D makes a series of changes in the Medicare and Medicaid programs in response to the COVID-19 public health emergency declared by the Secretary. The Medicare provisions increase certain payments to providers, including hospitals; expand the use of allowable telehealth services; make any potential COVID-19 vaccine available under Medicare Part B without cost-sharing; and relax certain program requirements to make it easier for Medicare patients to obtain certain services. The provisions also address cost-sharing to states for Medicaid services. Background A health savings account (HSA) is a tax-advantaged account that individuals can use to pay for unreimbursed medical expenses (e.g., deductibles, co-payments, coinsurance, and services not covered by insurance). Individuals are eligible to establish and contribute to an HSA if they have coverage under an HSA-qualified high-deductible health plan (HDHP), do not have disqualifying coverage, and cannot be claimed as a dependent on another person's tax return. To be considered an HSA-qualified HDHP, a health plan must meet several criteria: (1) it must have a deductible above a certain minimum level, (2) it must limit out-of-pocket expenditures for covered benefits to no more than a certain maximum level, and (3) it can cover only preventive care services before the deductible is met. For example, if a health plan satisfies the first two of the aforementioned criteria and provides coverage for preventive care services and prescription drugs before the deductible is met, that health plan would not be considered an HSA-qualified HDHP because it provides prescription drug benefits before the deductible is met. Disqualifying coverage is generally considered any other health coverage that is not an HSA-qualified HDHP or that provides coverage for any benefit that is covered under their HSA-qualified HDHP. Provision Section 3701 amends Internal Revenue Code (IRC) Section 223(c) for plan years beginning on or before December 31, 2021, to allow HSA-qualified HDHPs to provide \"telehealth and other remote care services\" before the deductible is met and still be considered an HSA-qualified HDHP. For plan years beginning on or before December 31, 2021, Section 3701 provides that telehealth and other remote care would not be considered disqualifying coverage that would prevent an otherwise eligible individual from being considered HSA-eligible. These provisions were effective upon the date of enactment (i.e., March 27, 2020). Background There are four categories of health-related tax-advantaged accounts/arrangements: HSAs, Archer medical savings accounts (Archer MSAs), flexible spending arrangements (FSAs), and health reimbursement arrangements (HRAs). Distributions from HSAs and Archer MSAs and reimbursements from FSAs and HRAs that are used to pay for qualified medical expenses are not taxed. Each account/arrangement category has a different set of medical expenses that would be considered a qualified medical expense, but all accounts/arrangements generally consider, at a minimum, the following as qualified medical expenses: the costs of diagnosis, cure, mitigation, treatment, or prevention of disease and the costs for treatments affecting any part of the body; the amounts paid for transportation to receive medical care; and qualified long-term care services. Most recently, OTC medicines and drugs (other than insulin) were not considered a qualified medical expense for any account/arrangement category unless an individual received a corresponding prescription for each non-prescribed expense. Provision Section 3702 amends Sections 106, 220(d)(2)(A), and 223(d)(2) of the IRC to allow OTC medicines and drugs (without a prescription) and menstrual care products to be considered qualified medical expenses for HSAs, Archer MSAs, FSAs, and HRAs. This change in the definition of qualified medical expenses applies to amounts paid or expenses incurred after December 31, 2019. Background Medicare coverage under Part B (fee-for-service) for telehealth services is defined under SSA Section 1834(m), which places certain conditions on such care, including who can furnish and be paid for the service, where the patient is located (the originating site), where the physician is located (the distant site), and the types of services that are covered. Recent legislation has modified some of the conditions under which telehealth services may be furnished under Medicare. The Coronavirus Preparedness and Response Supplemental Appropriations Act ( P.L. 116-123 ) Division B, Section 102, added certain Medicare telehealth restrictions to the list of applicable conditions for which the Secretary could temporarily waive or modify program requirements or regulations during the COVID-19 emergency. The provision also defined a qualified telehealth provider, requiring a prior relationship within the past three years between the patient and the provider under Medicare. Subsequently, FFCRA Division F, Section 6010, expanded the definition of a qualified provider to include those who had provider-patient relationships within the past three years outside of Medicare. Provision Section 3703 removes the list of telehealth restrictions the Secretary was allowed to waive under P.L. 116-123 and broadens the Secretary's authority to temporarily waive any of the SSA Section 1834(m) telehealth requirements. The provision also removes the definition of a \"qualified provider\" for telehealth services during the COVID-19 emergency period pursuant to SSA Section 1135. The provision strikes the specific subsection added under P.L. 116-123 related to telephone use, such that the waiver authority applies more broadly to include \"a telehealth service [â¦] furnished in any emergency area (or portion of such an area) during any portion of any emergency period to an individual.\" In addition, removing the \"qualified provider\" definition eliminates the requirement of a prior relationship between the patient and the provider for telehealth services to be delivered and covered under the COVID-19 emergency declaration. Background Under current law, FQHCs and rural health clinics (RHCs) are allowed to be originating sites for covered telehealth services (sites where a patient is located) but are not allowed to be distant sites, where physicians may provide telehealth services to eligible patients at other locations (originating sites). Generally, both FQHC and RHCs are not paid under the Medicare physician fee schedule (MPFS). Rather, FQHCs are paid through an FQHC-specific prospective payment system (PPS), while RHCs are reimbursed as an all-inclusive rate for the services they provide. Provision Section 3704 allows FQHCs and RHCs to serve as distant sites for the furnishing of telehealth services to telehealth-eligible individuals during the emergency period. The Secretary is required to develop and implement, through program instruction or otherwise, payment methods for this purpose that apply to FQHCs and RHCs serving as a distant sites that furnish telehealth services to eligible telehealth individuals during such an emergency period. Such services are to be paid similar to the national average amount for comparable telehealth services under the MPFS. The costs associated with this care are not to be included when calculating the payments for the FQHC PPS or the RHC all-inclusive rates, under current law. Background Medicare is the main source of health care coverage for Americans with end-stage renal disease (ESRD). Individuals with ESRD have substantial and permanent loss of kidney function and require either a regular course of dialysis (a process that removes harmful waste products from an individual's bloodstream) or a kidney transplant to survive. Medicare covers beneficiaries aged 65 and older who have ESRD, as well as qualified individuals with ESRD who are under the age of 65. Medicare ESRD benefits include thrice-weekly dialysis treatment and coverage for kidney transplants. CMS pays physicians, typically nephrologists, and other practitioners a monthly per-patient rate for most dialysis-related services. Physicians and practitioners managing ESRD patients who perform home-based dialysis are paid a single monthly rate based on the ESRD beneficiary's age. A physician or practitioner is required to have at least one face-to-face visit with a home dialysis patient each month. As part of the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ), Congress expanded the use of telehealth services for ESRD patients undergoing home dialysis. Starting in 2019, ESRD beneficiaries who use home dialysis have been allowed to receive monthly face-to-face clinical assessments via telehealth services, so long as the beneficiaries receive a face-to-face assessment without the use of telehealth (1) at least monthly for the initial three months of home dialysis, and (2) after the initial three months, at least once every three consecutive months. Provision Section 3705 amends SSA Section 1881(b)(3)(B) to allow the Secretary to waive the requirement that to receive telehealth services, a Medicare ESRD beneficiary undergoing home dialysis receive a face-to-face clinical assessment from a practitioner monthly during the initial three months of home dialysis and once every three months thereafter. The requirement may be waived for the period that the COVID-19 emergency is in effect. Background The Medicare hospice benefit provides coverage for certain services provided to Medicare beneficiaries with a life expectancy of six months or less. Such services must be rendered by Medicare-certified hospices, which are either public agencies or private organizations primarily engaged in providing hospice services. Although beneficiaries who elect hospice care may disenroll from the hospice benefit at any time, the benefit is administratively structured by \"periods\": specifically, two 90-day periods and an unlimited number of subsequent 60-day periods. For hospice care to be covered under Medicare, an initial certification of a terminal illness must be obtained by the hospice at the beginning of the first 90-day period of care. The initial certification requires signed declarative statements attesting to the presence of a terminal illness by the hospice physician and the beneficiary's attending physician, if the individual has designated one. For each subsequent period of hospice care, recertification of the beneficiary's terminal illness is required only by the hospice physician. Since the beginning of 2011, part of the recertification process to determine continued eligibility has included a mandatory face-to-face encounter with the beneficiary by the hospice physician or nurse practitioner. Provision Section 3706 amends SSA Section 1814(a)(7)(D)(i) to provide that, as determined appropriate by the Secretary, a hospice physician or nurse practitioner may conduct a face-to-face encounter for continued eligibility purposes via telehealth during a period that the COVID-19 emergency is in effect. Background Medicare covers visits by participating home health agencies for beneficiaries who (1) are confined to home and (2) need either skilled nursing care on an intermittent basis, physical therapy, or speech language therapy. As required by SSA Section 1895, home health agencies are paid for services under a home health PPS based on 30-day episodes of care. Generally, the home health PPS consists of a nationwide payment amount that is subject to adjustments for the expected care needs of a beneficiary (i.e., case-mix) and differences in local wages. Further payment adjustments are made in certain situations, including a low-utilization payment adjustment (LUPA) for episodes of care with few home visits. Under SSA Section 1895, home health agencies are not precluded from adopting telemedicine or other technologies, but such services are not permitted to serve as a substitute for visits paid under the home health PPS. Accordingly, federal regulations define a home health visit as an episode of personal contact. As such, telemedicine services are not accounted for in the home health PPS, nor do providers receive direct payment for telemedicine services generally. Although there is no direct payment for home health services provided through remote technologies, regulations in 42 C.F.R. Part 409.46 designate remote patient monitoring as a service with costs that may be reported as administrative if remote patient monitoring is used to augment the care planning process. Remote patient monitoring is defined in regulations as the collection of patient health information that is digitally stored or transmitted by the patient and/or caregiver to the home health agency. CMS allows home health agencies to include the costs of remote patient monitoring as an allowable administrative cost. Provision Section 3707 requires the Secretary to consider how HHS can encourage the use of telemedicine by home health agencies with respect to home health services provided to Medicare beneficiaries during the period that the COVID-19 emergency is in effect. Specifically, the Secretary is required to consider ways to encourage the use of telecommunications systems, including for remote patient monitoring, and other communications or monitoring services. Use of new technologies must be consistent with the plan of care for beneficiaries. As part of this consideration, the Secretary may clarify guidance and conduct outreach, as appropriate. Background Medicare covers certain home health services under both Parts A and B. Special eligibility requirements and benefit limits exist for home health services furnished under Part A to beneficiaries who are enrolled in both Parts A and B. For such beneficiaries, Part A pays for only \"postinstitutional\" home health services, provided for up to 100 visits during a \"spell of illness,\" which is a period that extends 14 days after a discharge from a skilled nursing facility or a hospital following a minimum stay of three consecutive days. Part B covers any medically necessary home health services that exceed the 100-visit limit, as well as medically necessary home health services that do not qualify as \"postinstitutional.\" For beneficiaries enrolled in only Part A or Part B, the requirements described above do not apply. Part A or Part B, as applicable, covers all medically necessary episodes of home health care without a visit limit, regardless of whether the episode of care follows a hospitalization. Whether a beneficiary is enrolled in Part A only, Part B only, or in both, the scope of the Medicare home health benefit is the same. Medicare's payments to home health agencies are calculated using the same methods, and beneficiaries have no cost-sharing. As required under SSA Sections 1814 and 1835 (for Parts A and Part B, respectively), for a beneficiary to receive home health services under Medicare, certain eligibility requirements must be certified by a physician, including a face-to-face encounter performed by a physician or a specified medical professional working in collaboration with, or under the supervision of, the physician, as applicable. For a beneficiary to be eligible for coverage, the physician certifies that home health services are required because the beneficiary, under the care of the physician, is (1) confined to the home and (2) in need of either skilled nursing care on an intermittent basis, physical therapy, or speech language therapy. After this eligibility is established, the eligibility period may be continued for homebound beneficiaries with a certified continuing need for occupational therapy services. A physician is prohibited from certifying home health eligibility if he or she has a significant ownership interest in, or a significant financial or contractual relationship with, the home health agency in which the services are to be provided. These conditions are delineated in federal regulations and include an authorized exception for instances in which there is a solitary community home health agency. BBA 2018, Section 51002, amended SSA Sections 1814 and 1835 to expand the scope of supporting documentation the Secretary may use to document Medicare eligibility for home health services. Under the BBA changes, in addition to using a physician's medical record or a record compiled by an acute/post-acute facility, the Secretary may also use a home health agency's medical record as appropriate to the case involved. Provision Section 3708 amends SSA Section 1814(a)(2)(C) and Section 1835(a)(2)(A) to allow, no later than six months after enactment, a nurse practitioner, clinical nurse specialist, or physician assistant to certify the eligibility requirements for Medicare home health services under Parts A and B, respectively. Section 3708 further allows a nurse practitioner, clinical nurse specialist, or physician assistant to conduct the required face-to-face encounter that is part of the certification process. Section 3708 also amends SSA Sections 1814 and 1835 to prohibit such professionals with a significant financial stake in a home health agency from certifying beneficiary eligibility when that agency is the entity providing the necessary services. However, the same exemption exists as the one pertaining to certifying physicians: the prohibition is waived if the servicing entity is the sole community home health agency. Further, Section 3708 conforms to language in the BBA 2018 to allow the Secretary to use a home health agency's medical record, in addition to a medical record compiled by medical professionals with certification authority, to document eligibility as appropriate to a specific case. Section 3708 also amends SSA Sections 1861 and 1895 to ensure that the general definitions of home health services, coverage, and payment system encompass and conform with current statutory language referencing the medical professionals to whom certification authority is extended. In addition, amendments made under Section 3708 are applied under SSA Title XIX (Medicaid) in the same manner and to the same extent such requirements apply to Medicare under SSA Title XVIII or regulations promulgated thereunder. No later than six months after enactment, the Secretary is required to implement regulations relevant to application of the amendments. If necessary, the Secretary must produce an interim final rule to comply with the required six-month effective date. Background The Budget Control Act of 2011 (BCA; P.L. 112-25 ) provided for increases in the debt limit and established procedures designed to reduce the federal budget deficit, including the creation of the Joint Select Committee on Deficit Reduction. The failure of the Joint Committee to propose deficit reduction legislation that was subsequently enacted into law by its mandated deadline triggered automatic spending reductions, including the \"sequestration\" (i.e., across-the-board reductions) of mandatory spending in FY2013 through FY2021. Subsequent legislation extended the sequestration of mandatory spending through FY2029. Medicare benefits are funded through mandatory spending and are subject to reductions under such sequestration. Section 256(d) of the Balanced Budget and Emergency Deficit Control Act of 1985 (BBEDCA; P.L. 99-177 ) contains special rules for the Medicare program in the event of a sequestration. Among other things, it specifies that for Medicare, sequestration is to begin the month after the annual sequestration order has been issued and to continue for one calendar year. Subsequent sequestration orders begin the first month after the previous order ends. Therefore, as the initial sequestration order was issued March 1, 2013, Medicare sequestration began April 1, 2013, and was (most recently) scheduled to continue through March 31, 2030. Under a BCA mandatory sequestration order, Medicare benefit payments cannot be reduced by more than 2%. Since April 1, 2013, Medicare benefit-related payments, which include payments to health care providers, Medicare Advantage (MA), and Part D plans, have been subject to 2% reductions. Provision This provision waives the application of sequestration to the Medicare program for the period May 1, 2020, through December 31, 2020. This provision also extends the sequestration of mandatory spending for an additional year, through FY2030. (For Medicare, this means that sequestration will continue through March 31, 2031.) Background Medicare pays most acute care hospitals under the inpatient prospective payment system (IPPS). The IPPS payment is a predetermined, fixed amount for most services provided to a Medicare beneficiary during an inpatient hospital stay. The bundled, fixed, per-discharge portion of the IPPS is referred to as the IPPS base amount. The total IPPS payment is the base amount, adjusted by a number of factors. These adjustments generally include such things as the geographic location of the hospital, the complexity of the patient's condition, and a hospital's teaching status, among others. One of the adjustments is a payment weight associated with the Medicare severity-diagnosis related group (MS-DRG) to which a patient is assigned. This weight reflects the average cost of patients in a specific MS-DRG relative to the average cost across all MS-DRGs due to differences in the severity of patients' conditions. In FY2020, there are 759 MS-DRGs (i.e., codes). The MS-DRG weights are recalibrated annually, generally effective October 1 of each year. The recalibrations are done in a budget-neutral manner. Provision Section 3710 amends SSA Section 1886(d)(4)(C) to require the Secretary to increase the MS-DRG weight that would otherwise apply for a COVID-19-related Medicare discharge by 20% during the COVID-19 emergency period. IPPS payment increases associated with this provision are not to be included in applying budget neutrality. The Secretary is not required to use notice and comment to implement this provision; it may be done through program instruction or otherwise. A state that has a Section 1115A waiver of all or part of SSA Section 1886 to test alternative payment and delivery models through the Center for Medicare & Medicaid Innovation is not precluded from implementing a similar payment adjustment. Background Medicare pays for intensive inpatient rehabilitation servicesâphysical, occupational, or speech therapy that is generally required after illness, injury or surgeryâunder the Inpatient Rehabilitation Facility (IRF) prospective payment system (IRF PPS). The IRF PPS payment is a predetermined, fixed amount per discharge. To receive the IRF PPS payment, the rehabilitation hospital, or a rehabilitation unit within another provider type, must meet IRF requirements specified in regulation. Medicare covers IRF services for patients who, among other requirements, can reasonably be expected to actively participate in, and benefit from, intensive rehabilitation therapy. Intensive rehabilitation therapy is specified in regulation as occurring either 3 hours a day at least five days per week, or 15 hours within a consecutive seven-day period. Medicare also pays for extended periods of inpatient hospital care for chronic critical illness under the long-term care hospital inpatient prospective payment system (LTCH PPS). The LTCH PPS payment is a predetermined, fixed amount per discharge, and it is generally greater than the IPPS amount. Specifically, LTCHs are paid under the LTCH PPS if a Medicare beneficiary either (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay, or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours, and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. LTCH discharges occurring in FY2020, and subsequent fiscal years that do not meet the aforementioned criteria are paid a site-neutral payment rate similar to the IPPS amount. Also, an LTCH must have no more than 50% of its Medicare discharges paid at the site-neutral rate to continue to receive the LTCH PPS payment amount for LTCH-eligible cases. Provision Section 3711(a) waives the Medicare IRF rule that patients must reasonably be expected to participate in, and benefit from, at least 15 hours of therapy per week, during the COVID-19 emergency period. Section 3711(b) waives the site-neutral payment requirement for COVID-19-related LTCH discharges so that all these discharges will be paid under the LTCH PPS, and it waives the 50% requirement during the during the COVID-19 emergency period. Background Medicare Part B covers a wide variety of medical equipment and devices under the heading of durable medical equipment (DME), or prosthetics and orthotics (PO) if the products are medically necessary and prescribed by a physician. Examples of DME include hospital beds, blood glucose monitors, and ventilators. Prosthetics and orthotics include artificial limbs and back and knee braces. The DMEPOS benefit also includes related supplies (S), such as drugs and biologics that are necessary for the effective use of a product. Except in competitive bidding areas, Medicare pays for most DMEPOS based on fee schedules, which are statutory formulas for determining prices of items. Medicare pays 80% of the lower of a supplier's charge for an item or a fee schedule amount. A beneficiary is responsible for the remaining 20%. In general, fee schedule amounts are updated each year, by inflation and a measure of economy-wide productivity. In addition, since 2016, Medicare fee schedule rates that apply outside of competitive bidding areas for certain DMEPOS have been reduced based on price information collected from the competitive bidding program. (Prices for DMEPOS under competitive bidding are generally lower than the fee schedule rates.) The fee schedule reductions were phased in during 2016, meaning that during that year, 50% of the Medicare payment rate was based on the unadjusted (higher) fee schedule amount, and 50% was based on the (lower) rate fully adjusted with information from competitive bidding. The phase-in was complete by January 2017, at which time fee schedules were based entirely on the adjustment with information from competitive bidding. In response to concerns that the adjusted rates were too low, the Secretary, in June 2018, again applied a phase-in methodology for rural and noncontiguous areas , meaning that in these areas the fee schedule was no longer fully adjusted by competitive bidding data, but instead went back to a 50/50 blend of rates based on both (higher) unadjusted fee schedule rates and (lower) rates fully adjusted by competitive bidding information. As such, two different fee schedules apply to DMEPOS products outside of competitive bidding areas, depending on an area's rural/urban designation and whether an area is part of the contiguous United States. First, in rural or noncontiguous areas, the fee schedule is a 50/50 blend: 50% from the unadjusted fee schedule and 50% from the fee schedule adjusted to account for lower price information from competitive bidding (i.e., the phase-in methodology). Second, in areas that are not rural or noncontiguous (i.e., nonrural and contiguous), the fee schedules are fully adjusted by information from the competitive bidding program. In both cases, CMS regulations specify that this methodology applies from June 1, 2018, through December 31, 2020. Provision Section 3712 of the CARES Act extends the 50/50 blended DMEPOS payment rate provided in rural or noncontiguous areas through the duration of the COVID-19 emergency period, if the emergency period lasts longer than December 31, 2020. Section 3712 also increases the DMEPOS payment rate for items provided in areas other than rural areas and noncontiguous areas for the duration of the COVID-19 emergency period. Items and services furnished in these areas on or after the date that is 30 days after the enactment of the CARES Act (i.e., April 26, 2020) would be reimbursed under a fee schedule that is equal to a 75/25 blend, where 75% of the fee schedule is fully adjusted by competitive bidding rates, and 25% is based on unadjusted (higher) fee schedule amounts. Background Medicare Part B specifically covers the following vaccines: influenza virus (flu), pneumococcal pneumonia (pneumonia), hepatitis B virus (HBV) for beneficiaries at high or intermediate risk, and other vaccines directly related to treatment of an injury or direct exposure to a disease or condition. Otherwise, Medicare Part B does not cover preventive vaccines. If a vaccine is provided by a Medicare-participating practitioner, there is no cost-sharing for Medicare beneficiaries for the flu, HBV, or pneumonia vaccine ingredient or the vaccine administration. However, Medicare Part B cost-sharing applies (20% of the Medicare approved amount plus an annual deductible) for vaccines administered to treat an injury or direct exposure to a disease or condition. Medicare Part C (MA) plans generally are required to cover the same services as original Medicare, Parts A and B. As a result, MA plans are required to cover, without beneficiary cost-sharing, the flu, HBV, and pneumonia vaccines. MA plans may cover without beneficiary cost-sharing vaccines directly related to treatment of an injury or direct exposure to a disease or condition and other vaccines. MA enrollee cost-sharing for vaccines not covered by Medicare Part B may vary depending on the plan and the vaccine, because they may be covered as supplemental benefits. Provision Section 3713 amended SSA Section 1861(s)(10)(A) and SSA Section 1852(a)(1)(B) to require Medicare Part B and MA plans to cover a COVID-19 vaccine and its administration without beneficiary cost-sharing, including waiving applicable annual deductibles. This section was effective upon enactment (i.e., March 27, 2020) and is applicable to a COVID-19 vaccine on the date it is licensed by FDA. The Secretary is authorized to implement Section 3713 through program instructions or otherwise. Background Medicare Part D is a voluntary outpatient prescription drug benefit. Enrollees purchase Part D prescription drug plans from private insurers, known as plan sponsors. To participate in the Part D program, plan sponsors must meet a series of requirements, including (1) providing an adequate formulary, or list of covered drugs, and (2) providing a sufficient network of contracted pharmacies that dispense prescriptions for set reimbursement. Federal law also requires that Part D sponsors provide enrollees with \"adequate emergency access\" to needed drugs. Under longstanding CMS guidance, plan sponsors have some latitude in deciding how to comply with the emergency access provisions. In general, however, CMS expects plan sponsors to limit pharmacy edits (i.e., dispensing restrictions) that prevent enrollees from seeking early prescription refills in the case of a federally declared disaster or a public health emergency that is reasonably expected to disrupt access. In a March 10, 2020, memo to Part D sponsors, CMS reiterated its emergency access guidelines and outlined options for responding to the COVID-19 emergency. In the memo, CMS specified actions that Part D sponsors may or must take: Sponsors may relax \"refill-too-soon\" edits on prescriptions if circumstances are reasonably expected to result in a disruption in access. Sponsors have discretion regarding how to relax the edits, so long as enrollees have access to Part D drugs at the point-of-sale (i.e., a retail pharmacy). Sponsors may allow an enrollee to obtain the maximum extended-day supply available under his or her plan, if the prescription is requested and available. Sponsors must ensure that an enrollee has adequate access to covered drugs at a pharmacy located out of the enrollee's regular pharmacy network. The requirement would apply in cases where an enrollee could not reasonably be expected to obtain the drugs at a network pharmacy. Enrollees would still be responsible for required cost-sharing and possible additional charges (i.e., the out-of-network pharmacy's usual and customary charge for the drugs). Sponsors may relax plan-imposed policies that could discourage certain types of prescription delivery, such as mail or home delivery, if a disaster or emergency makes it difficult for enrollees to get to a retail pharmacy, or when enrollees are prohibited from going to a retail pharmacy (such as in a quarantine situation). Sponsors may waive requirements that enrollees receive prior authorization before filling a prescription for drugs used to treat or prevent COVID-19, if or when such drugs are identified. Any plan waivers would be provided to enrollees uniformly. Part D plan sponsors also operate drug management programs for beneficiaries deemed to be at risk of misusing or abusing frequently abused drugs. Sponsors may place additional controls on pharmacy dispensing to such individuals, including placing limits on the number of providers allowed to write prescriptions for at-risk enrollees and limiting the number of pharmacies allowed to dispense drugs to such enrollees. Under CMS regulations, at-risk enrollees must have reasonable access to prescriptions in case of natural disasters or similar situations. Provision Section 3714 amends SSA 1860Dâ4(b) to require Part D sponsors to provide extended dispensing to enrollees during the COVID-19 emergency period. Under the provision, Part D sponsors must allow an enrollee to have access to up to a 90-day fill or refill of a prescription. Plan sponsors cannot deny such prescriptions based on existing plan cost and utilization management requirements that limit dispensing of particular drugs, except for restrictions based on drug safety. The Secretary may implement the provision by program instruction or otherwise. Background Medicaid home and community-based services (HCBS) include coverage of specific benefits such as case management, personal care, homemaker, respite care, and adult day health care, among other services. Medicaid HCBS are authorized under the Medicaid state plan, which is the contract a state makes with the federal government to administer its Medicaid program, subject to CMS approval. These HCBS state plan authorities include optional services that states may choose to provide under the SSA Section 1915(i) HCBS State Plan Option, the SSA Section 1915(k) Community First Choice State Plan Option, and SSA Section 1915(j) Self-Directed Personal Care Assistance Services. Medicaid HCBS are also authorized through waiver programs that permit states to disregard certain Medicaid requirements under the state plan in the provision of waiver services, also subject to CMS approval. Medicaid HCBS waiver authorities include SSA Section 1915(c) HCBS waivers, SSA Section 1915(d) HCBS waivers for the elderly, and SSA Section 1115 research and demonstration waivers. SSA Section 1902(h) states that nothing in Title XIX (Medicaid) should be construed as authorizing the Secretary to limit the amount of payment that may be made under a Medicaid state plan for home and community care. Provision Section 3715 amends SSA Section 1902(h) by adding a new paragraph (1) to specify that the limit on the amount of payment under a Medicaid state plan for home and community care applies to certain statutory authorities for providing Medicaid HCBS under state plan services authorized under SSA Section 1915(i), Section 1915(j), and Section 1915(k), as well as waiver authorities under Section 1915(c), Section 1915(d), and Section 1115. The provision adds a new paragraph (2), which states that nothing in SSA Titles XI (General Provisions), XVIII (Medicare), or XIX (Medicaid) shall be construed as prohibiting receipt of any care or services specified in paragraph (1) in an acute care hospital that are identified in an individual's person-centered service plan (or comparable plan of care); provided to meet needs of the individual that are not met through the provision of hospital services; not a substitute for services that the hospital is obligated to provide through its conditions of participation or under federal or state law, or under another applicable requirement; and designed to ensure smooth transitions between acute care settings and home and community-based settings, and to preserve the individual's functional abilities. Background FFCRA Section 6004 permits state Medicaid programs to extend time-limited COVID-19 testing (as specified under that law's new Medicaid mandatory service category) without cost-sharing to uninsured individuals. For the purposes of this provision, FFCRA Section 6004 defines uninsured individuals as those who are not Medicaid eligible under one of Medicaid's mandatory eligibility pathways (e.g., the poverty-related pregnant women and child pathways, or the ACA Medicaid expansion pathway), and are not enrolled in (1) a federal health program (e.g., Medicare, Medicaid, CHIP, or TRICARE); (2) a specified type of private health insurance plan (e.g., individual health insurance coverage, group health insurance coverage, or a group health plan); or (3) an FEHBP. FFCRA provides a 100% federal medical assistance percentage (FMAP or federal matching rate) for medical assistance and administrative costs associated with uninsured individuals who are eligible for Medicaid under this provision. Provision Section 3716 of the CARES Act amends the definition of uninsured individuals under FFCRA Section 6004 for the purposes of determining Medicaid eligibility for the state plan option to allow for time-limited COVID-19 testing (as specified under the new Medicaid mandatory service category) without cost-sharing. Under the CARES Act, uninsured individuals will also include those (1) who would be eligible for Medicaid via the ACA Medicaid expansion pathway in states that have not adopted this eligibility pathway (i.e., non-ACA Medicaid expansion states), and (2) certain specified Medicaid enrollees who, by virtue of their Medicaid eligibility pathway, are entitled to limited Medicaid benefits, including low-income tuberculosis-infected individuals who are entitled to services related to the tuberculosis infection, women needing treatment for breast or cervical cancer, individuals eligible only for family planning services and supplies, individuals eligible through the Medically Needy pathway whose coverage does not meet minimum essential health coverage, and certain low-income pregnant woman who are entitled to limited pregnancy-related services. Background FFCRA Section 6004 added FDA-approved tests and testing-related state plan services for the COVID-19 virus without cost-sharing, as defined in Section 6004 to the list of Medicaid mandatory services under traditional Medicaid benefits. States and territories are required to offer services under this new mandatory benefit for the period beginning March 18, 2020, through the duration of the public health emergency, as declared by the Secretary pursuant to PHSA Section 319. During the specified public health emergency period, Section 6004 of FFCRA also permits state Medicaid programs to extend FDA-approved COVID-19 testing (and testing-related state plan services) to uninsured individuals without cost-sharing, as defined in Section 6004 and requires CHIP programs to cover FDA-approved COVID-19 testing and the administration of such testing without cost-sharing for CHIP enrollees. Section 6004 also amended SSA Section 1905(a)(3) to define applicable tests to include IVDs, as defined in FDA regulation, that detect SARS-CoV-2 or diagnose COVID-19 and that had received either 510(k) clearance, premarket approval, authorization pursuant to de novo classification, or emergency use authorization (EUA) for marketing. Provision The CARES Act modifies the definition of COVID-19 tests covered under Medicaid and CHIP for the specified public health emergency period. Specifically, Section 3717 amends SSA Section 1905(a)(3)(B), as added by FFCRA Section 6004, to remove language requiring FDA approval, clearance, or authorization for covered tests. Under this modified definition, tests are defined simply as IVDs, as defined in FDA regulation, that detect SARS-CoV-2 or diagnose COVID-19. IVDs are defined in FDA regulation as a specific subset of devices that include \"reagents, instruments, and systems intended for use in the diagnosis of disease or other conditions ... in order to cure, mitigate, treat, or prevent disease ... [s]uch products are intended for use in the collection, preparation, and examination of specimens taken from the human body.\" Background Outpatient clinical laboratory services are paid under the Medicare Clinical Laboratory Fee Schedule (CLFS). Previously, CLFS payment rates were based on historical laboratory charges. The Protecting Access to Medicare Act (PAMA, P.L. 113-93 ) established a new method for determining clinical laboratory payments beginning in 2018, with Medicare CLFS payment rates based on reported private insurance payment amounts. Per PAMA, CMS was to collect data from clinical laboratories (aside from advanced diagnostic laboratory tests, for which PAMA also altered payment, coding, and coverage) about private payer payment rates beginning in 2016. The new payment system was to be phased in from 2017 through 2022; during the phase-in period, payment could not be reduced, compared with the amount of the payment in the preceding year, by more than a statutorily specified limit. For each year 2017-2019, the CLFS payment reduction limit was to be 10%, and for each year 2020-2022, the payment reduction limit was to be 15%. Beginning in 2018, CMS set CLFS rates based on the weighted median of private payer rates for each laboratory service, collected from applicable laboratories. These CLFS payment rates are national and do not vary based on geography. Section 105 of the Further Consolidated Appropriations Act of 2020 ( P.L. 116-94 ) modified the schedule for implementing the new CLFS payment system and reporting requirements. A period during which there would be no reporting required from diagnostic laboratories was established, from January 1, 2020, through December 31, 2020. The first required reporting period would begin January 1, 2021, and end March 31, 2021, with subsequent reporting periods required every three years thereafter. The phase-in schedule was modified so that the payment reduction limit was to be 10% for each year from 2017 through 2020, with the limit to be 15% from 2021 through 2023. Provision Section 3718 further delays the reporting requirements under the new CLFS payment methodology and makes additional revisions to the payment reduction limits during the phase-in schedule. The provision would extend the initial period during which no reporting is required from the period beginning January 1, 2021, through December 31, 2021, with the first required reporting period to begin on January 1, 2022, and end March 31, 2022. Subsequent required reporting periods would occur every three years thereafter. For 2021, there would be no payment reduction (i.e., 0% limit) during the phase-in of the private payer rate implementation schedule; the payment reduction limit would be 15% for 2022 through 2024, when the private payer rate is to be fully implemented. Background SSA Section 1815 permits the Secretary to make accelerated payments to an IPPS hospital and to a Puerto Rico IPPS hospital that experiences significant cash flow problems. Cash flow problems must arise out of one or more of the following: (1) a delay in Medicare payments, (2) exceptional situations beyond a hospital's control that result in delayed billing, or (3) highly exceptional situations where the Secretary deems an accelerated payment is appropriate. The amount of the accelerated payment may not exceed 70% of the estimated unbilled charges or unpaid bills (less deductibles and coinsurance). An accelerated payment must be paid-in-full within 90 days after such payment is made. If an accelerated payment is not paid in full within 90 days, CMS is authorized to withhold Medicare payments until the accelerated payment is repaid. Accelerated payments must be requested by a hospital, and those requests are reviewed and approved by the appropriate CMS regional office. Provision Section 3719 amends SSA Section 1815 to expand eligibility for accelerated payments to Critical Access Hospitals (CAHs), pediatric hospitals, and IPPS-exempt cancer hospitals located in one of the 50 states or the District of Columbia, during the COVID-19 emergency period. The expansion of accelerated payments made under this provision is subject to appropriate safeguards against fraud, waste, and abuse. In addition, upon the request of a hospital that is eligible for accelerated payment under this provision, the Secretary may implement the following amendments during the designated public health emergency period: make accelerated payments on a periodic or lump sum basis; increase payments by an amount up to 100% of the estimated unbilled charges or unpaid bills or 125% for CAHs; and specify that the accelerated payments can cover up to a six-month period of unbilled charges or unpaid bills. The Secretary is required to extend the recoupment period up to 120 days upon request of the hospital. Also upon request, a hospital is allowed no less than 12 months from the date of the first accelerated payment to pay in full any outstanding balance. The Secretary may implement this provision through program instruction or otherwise. Background Medicaid is jointly financed by the federal government and the states. The federal government's share of a state's expenditures for most Medicaid services is called the FMAP rate, which varies by state and is designed so that the federal government pays a larger portion of Medicaid costs in states with lower per capita incomes relative to the national average (and vice versa for states with higher per capita incomes). Exceptions to the regular FMAP rate have been made for certain states, situations, populations, providers, and services. In the past, two temporary FMAP exceptions were available to provide states with fiscal relief due to recessions. They were provided through the Jobs and Growth Tax Relief Reconciliation Act of 2003 ( P.L. 108-27 ) and the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ). To be eligible for both of these temporary FMAP increases, states had to abide by some requirements. These requirements varied in the two FMAP increases, but for both increases, states were required to maintain Medicaid \"eligibility standards, methodologies, and procedures\" and to ensure that local governments did not pay a larger percentage of the state's nonfederal Medicaid expenditures than would have been required otherwise. Section 6008 of FFCRA provides an increase to the FMAP rate for all states, the District of Columbia, and the territories of 6.2 percentage points for each calendar quarter occurring during the period beginning on the first day of the public health emergency period (i.e., January 1, 2020) and ending on the last day of the calendar quarter in which the last day of the public health emergency period ends. States, the District of Columbia, and the territories will not receive this FMAP rate increase if (1) the Medicaid \"eligibility standards, methodologies, or procedures\" are more restrictive than what was in effect on January 1, 2020; (2) the amount of premiums imposed by the state exceeds the amount as of January 1, 2020; (3) eligibility is not maintained for individuals enrolled in Medicaid on the date of FFCRA enactment (i.e., March 18, 2020) or for individuals who enroll during the public health emergency period through the end of the month in which the public health emergency period ends (unless the individual requests a voluntary termination of eligibility or the individual ceases to be a resident of the state); or (4) the state does not provide coverage (without the imposition of cost-sharing) for any testing services and treatments for COVID-19 (including vaccines, specialized equipment, and therapies). Section 6008 of FFCRA also modifies SSA Section 1905(cc) to add another condition for the FMAP rate increase. Specifically, states, the District of Columbia, and the territories cannot require local governments to fund a larger percentage of the state's nonfederal Medicaid expenditures for the Medicaid state plan or Medicaid disproportionate share hospital payments than what was required on March 11, 2020. Provision Section 3720 of the CARES Act amends Section 6008 of FFCRA to delay the application of the requirement that a state cannot receive the increased FMAP rate if the amount of premiums imposed by the state is higher than the amount imposed as of January 1, 2020. Specifically, the application of the premium requirement is delayed for 30 days after March 18, 2020 (i.e., the date of enactment for FFCRA). Effectively, a state will be eligible for the FFCRA FMAP increase through April 17, 2020, if the amount of premiums imposed by the state exceeds the amount imposed as of January 1, 2020, as long as the premiums were in effect on the date of enactment for FFCRA. In order to receive the FMAP increase, a state still needs to be in compliance with all of the other requirements listed in FFCRA. Background FDA regulates the safety and effectiveness of nonprescription or OTC drugs sold in the United States. Examples of OTC drugs include hand sanitizer, sunscreen, and certain analgesics. To market an OTC drug, a company may follow one of two pathways. First, a company may submit an NDA to FDA for approval. Second, a company may use the OTC drug monograph process. A monograph establishes conditionsâactive ingredient(s) and related conditions (e.g., dosage level, combination of active ingredients, labeled indications, warnings and adequate directions for use)âunder which an OTC drug in a given therapeutic category (e.g., sunscreen, antacid) is considered generally recognized as safe and effective (GRASE) for use. If an OTC drug product complies with a monograph, it does not need FDA approval of its NDA prior to marketing. Prior to enactment of the CARES Act, monographs were established and amended through rulemaking. FDA assesses monograph compliance as part of its inspection process. The OTC drug monograph programâestablished in 1972âwas intended to provide an efficient mechanism through which OTC drugs could be marketed without individual FDA evaluation and approval. However, the program has been met with several challenges. For example, some monographs remain unfinalized, so there are OTC drugs on the market without final safety and effectiveness determinations. There are also perceived limitations to the industry's ability to propose innovations to currently marketed OTC drugs without submitting an NDA, and FDA has stated that it has limited resources to support OTC monograph activities. Provision Section 3851 establishes a new FFDCA Section 505G, which replaces the current OTC drug monograph rulemaking process with the administrative order processâa less burdensome alternative. This new process allows FDA, on its own initiative or upon request, to issue an administrative order (rather than a rule) determining that a drug, or class or combination of drugs, is GRASE or not GRASE. Certain monograph changes (e.g., new active ingredient, new indication) that are industry-requested and subject to a final administrative order are eligible for 18 months of marketing exclusivity. New FFDCA Section 505G, among other things, also (1) requires that certain OTC drugs be marketed only pursuant to FDA approval via an NDA; (2) creates an expedited process for the issuance of administrative orders in certain circumstances (i.e., public health hazard, safety labeling changes); (3) provides for circumstances under which minor changes in dosage form can be made without a new administrative order; (4) requires FDA to publish on its website information related to final interim and administrative orders, develop guidance, and establish meeting procedures; and (5) requires GAO to conduct a study on the impact of the 18-month marketing exclusivity period for certain eligible OTC drugs. Section 3852 amends FFDCA Section 502 to deem a drug misbranded if it is an OTC monograph drug that is subject to new FFDCA Section 505G, is not the subject of an approved NDA or ANDA, and does not comply with the requirements in FFDCA Section 505G. This provision also deems a drug misbranded if it is \"manufactured, prepared, propagated, compounded, or processed\" in a facility for which OTC monograph user fees have not been paid. Section 3853 states that nothing in this act (or the amendments made by it) applies to any OTC drug excluded by FDA from the OTC Drug Review in accordance with the statement set out at 37 FR 9466 published on May 11, 1972. Background Some industry stakeholders and members of Congress perceived FDA to be delaying consumer access to new sunscreens that were not originally included in the OTC Drug Review, and in November 2014, the Sunscreen Innovation Act (SIA; P.L. 113-195 ) was enacted. The SIAâcodified in FFDCA Chapter V Subchapter Iâcreated a new pathway for establishing whether certain OTC sunscreen active ingredients (i.e., those marketed in the United States after 1972 or those without any U.S. marketing experience) are GRASE. The SIA requires FDA to make GRASE determinations in the form of administrative orders (first proposed orders and then final orders) rather than through rulemaking, among other things. FDA has not yet approved any submissions for new sunscreen through the SIA process, requesting that sponsors submit additional safety and effectiveness data. Provision Section 3854 allows the sponsor of an OTC sunscreen active ingredient that is subject to a proposed sunscreen order under the SIA to elect to transition into the review process under new FFDCA Section 505G. The sponsor must notify FDA of such decision within 180 days of enactment, as specified. Otherwise, the order must continue to be reviewed under the SIA. Final sunscreen orders issued under the SIA are deemed final administrative orders under FFDCA Section 505G. Certain final sunscreen orders issued under new FFDCA Section 505G are eligible for 18 months of marketing exclusivity. Section 3854(b)(4) adds new FFDCA Section 586H, which sunsets FFDCA Chapter V Subchapter I (added by the SIA) at the end of FY2022. Background Between 2004 and 2005, more than 1,500 children under two years of age were treated in U.S. emergency departments for adverse events associated with cough and cold medications. Concerns also arose regarding the use of these products in children under six years of age. In October 2007, FDA convened the Joint Meeting of the Nonprescription Drugs Advisory Committee and the Pediatric Advisory Committee \"to discuss the safety and efficacy of [OTC] cough and cold products marketed for pediatric use.\" The committees determined that the available published studies did not demonstrate that OTC monograph cough and cold products marketed for pediatric use were effective in children and recommended additional studies and labeling changes. To date, FDA has not amended the monograph for these products in 21 C.F.R. Part 341 to reflect the committee recommendations. Absent rulemaking, FDA has issued several consumer updates warning of potential harms associated with the use of certain cough and cold drug products in children. Manufacturers voluntarily removed OTC infant cough and cold products intended for children under two years of age and voluntarily updated product labeling to include the warning \"do not use in children under 4 years of age.\" However, such labeling changes are not required by FDA under the cough and cold monograph, and in order for FDA to require such labeling for these products, the agency would have to amend the monograph. Provision Section 3855 requires that, not later than one year after enactment and annually thereafter until FDA completes its evaluation, the Secretary submits to the Senate HELP and House Energy and Commerce committees a letter describing FDA's progress in (1) evaluating the cough and cold monograph under 21 C.F.R. Part 341 with respect to children under age six and (2) as appropriate, revising the monograph to address children under age six, through the administrative order process under new FFDCA Section 505G(b). Background Historically, OTC drug monograph activities have been funded solely by discretionary appropriations from the General Fund of the Treasury. This funding method is in contrast to FDA's prescription drug activities, which are funded by a combination of discretionary appropriations and industry-paid user fees. This is because in 1992, the Prescription Drug User Fee Act (PDUFA) gave FDA the authority to collect fees from the pharmaceutical industry and use the revenue to support \"the process for the review of human drug applications.\" PDUFA connected the user fees to performance goals that were negotiated between FDA and industry. The five-year PDUFA authority has been renewed on five subsequent occasions, and user fee authorities have been added for medical devices, animal drugs, tobacco products, and other FDA-regulated products and activities. These fee authoritiesâcodified in FFDCA Chapter VII, Subchapter Câallow the Secretary, acting through the FDA Commissioner, to assess, collect, and spend user fees paid from regulated entities for specified FDA activities. Provision Section 3862 creates in FFDCA Chapter VII, a new Part 10â\"Fees Relating to Over-The-Counter Drugs\"âand the following new FFDCA sections: Section 744L (\"Definitions\"), Section 744M (\"Authority to Assess and Use OTC Monograph Fees\"), and Section 744N (\"Reauthorization; Reporting Requirements\"). New FFDCA Section 744M establishes a legal framework for the Secretary, beginning with FY2021, to assess and collect facility fees and monograph order request fees to support FDA's OTC monograph drug activities (e.g., review of order requests, inspections). Fees may be collected and spent only to the extent and in the amount provided in advance in appropriations acts (with an exception for the first year of the program), may remain available until expended, and may be transferred as specified for monograph drug activities only. This user fee program is authorized through FY2025. New FFDCA Section 744N requires the Secretary to submit annual performance and fiscal reports on user fee collection and spending to the Senate HELP and House Energy and Commerce committees. The performance and fiscal reports must be made publicly available on FDA's website. New FFDCA Section 744N also specifies the process for reauthorization of the user fee program, requiring the Secretary to consult with stakeholders on recommendations for future monograph activities and to transmit the recommendations to Congress no later than January 15, 2025. The table below includes relevant provisions (listed in order number) that include an effective date, a required report, or an explicit sunset date. The table does not include every provision described in this report, nor does it include required internal reports (i.e., reports required by grantees); it includes only reports that must be made public or be delivered to Congress. This CRS report reflects the CARES Act at enactment and will not be track actions pursuant to these deadlines, nor will this report be updated.", "summary": "The global pandemic of Coronavirus Disease 2019 (COVID-19) is affecting communities around the world and throughout the United States, with the number of confirmed cases and fatalities growing daily. Containment and mitigation efforts by U.S. federal, state, and local governments have been undertaken to \"flatten the curve\"âthat is, to slow the widespread transmission that could overwhelm the nation's health care system. The Coronavirus Aid, Relief, and Economic Security Act (CARES Act, P.L. 116-136 ) was enacted on March 27, 2020. It is the third comprehensive law enacted in 2020 to address the pandemic. In addition to a number of broad health care provisions, the CARES Act provides additional supplemental appropriations to support federal response efforts and authorizes a number of economic stimulus measures, among other things. This report describes the majority of health-related sections in Division A, Title III, of the CARES Act, \"Supporting America's Health Care System in the Fight Against the Coronavirus.\" Relevant background is provided for context. Specifically, this report describes provisions regarding, among other things, the following: The availability of medical countermeasures (MCMs)âdrugs, tests, treatments, medical devices, and supplies such as personal protective equipment (PPE)âincluding research and development; product regulation by the Food and Drug Administration (FDA); the Strategic National Stockpile (SNS); and other supply chain matters. The health workforce, including telehealth programs, the rural health care system, and the Commissioned Corps of the U.S. Public Health Service (USPHS). Additional workforce provisions described in this report include reauthorization and extension of appropriations for existing HHS health workforce programs, and liability limitation. Provisions addressed at the Medicare and Medicaid programs and on private health insurance plans that temporarily require, or increase payment for, telehealth services and specified services related to COVID-19 testing, diagnosis, or treatment. A newly established FDA authority for over-the-counter (OTC) drug review. This report does not address education or labor provisions in Subtitle B or C in Part IV of Title III, or provisions in Subtitle E of Part IV of Title III, \"Health and Human Services Extenders,\" which are described in other CRS reports. The report also does not include Division B of the act, which provides emergency supplemental appropriations for the COVID-19 response. The Appendix catalogues deadlines, effective dates, and reporting requirements for provisions described in the report. This report is intended to reflect the CARES Act at enactment (i.e., March 27, 2020). It does not track the law's implementation or funding and will not be updated.", "document_type": "crs"}
{"report": "This report describes and analyzes annual appropriations for the Department of Homeland Security (DHS) for FY2020. It compares the enacted FY2019 appropriations for DHS, the Donald J. Trump Administration's FY2020 budget request, and the appropriations measures developed and ultimately enacted in response to it. This report identifies additional informational resources, reports, and products on DHS appropriations that provide context for the discussion. A list of Congressional Research Service (CRS) policy experts with whom congressional clients may consult on specific topics may be found in CRS Report R42638, Appropriations: CRS Experts . The suite of CRS reports on homeland security appropriations tracks legislative action and congressional issues related to DHS appropriations, with particular attention paid to discretionary funding amounts. These reports do not provide in-depth analysis of specific issues related to mandatory fundingâsuch as retirement payânor do they systematically follow other legislation related to the authorizing or amending of DHS programs, activities, or fee revenues. Discussion of appropriations legislation involves a variety of specialized budgetary concepts. The Appendix to this report explains several of these concepts, including budget authority, obligations, outlays, discretionary and mandatory spending, offsetting collections, allocations, and adjustments to the discretionary spending caps under the Budget Control Act (BCA; P.L. 112-25 ). A more complete discussion of those terms and the appropriations process in general can be found in CRS Report R42388, The Congressional Appropriations Process: An Introduction , coordinated by James V. Saturno, and the Government Accountability Office's A Glossary of Terms Used in the Federal Budget Process . All amounts contained in CRS reports on homeland security appropriations represent budget authority. For precision in percentages and totals, all calculations in these reports use unrounded data, which are presented in each report's tables. Amounts in narrative discussions may be rounded to the nearest million (or 10 million, in the case of numbers larger than 1 billion), unless noted otherwise. Data used in this report for FY2019 annual appropriations are derived from the conference report accompanying P.L. 116-6 , the Consolidated Appropriations Act, 2019. Division A of P.L. 116-6 is the Department of Homeland Security Appropriations Act, 2019. FY2019 supplemental appropriations data are drawn directly from two enacted measures: P.L. 116-20 , the Additional Supplemental Appropriations Act, 2019, which included funding for response and recovery from a range of natural disasters; and P.L. 116-26 , the Emergency Supplemental Appropriations for Humanitarian Assistance and Security at the Southern Border Act, 2019, which included funding for security and humanitarian needs at the U.S.-Mexico border. Data for the FY2020 requested levels and House Appropriations Committee-recommended levels of annual appropriations are drawn from H.Rept. 116-180 , which accompanied H.R. 3931 . Data for the Senate Appropriations Committee-recommended levels of annual appropriations are drawn from S.Rept. 116-125 , which accompanied S. 2582 . Data for the FY2020 enacted levels are drawn from the explanatory statement accompanying P.L. 116-93 , Division D of which is the FY2020 Department of Homeland Security Appropriations Act. Scoring methodology is consistent across this report, relying on data provided by the Appropriations Committees that has been developed with Congressional Budget Office (CBO) methodology. CRS does not attempt to compare this data with Office of Management and Budget (OMB) data because technical scoring differences at times do not allow precise comparisons. Note: Previous CRS reports on DHS appropriations at times used OMB data on mandatory spending for the Federal Emergency Management Agency and the U.S. Secret Service that was not listed in appropriations committee documentationâfor consistency, OMB data on mandatory spending is no longer included in this report. This section provides an overview of the legislative process thus far for appropriations for the Department of Homeland Security for FY2020, from the Administration's initial request, through enactment of annual appropriations in Division D of P.L. 116-93 . On March 18, 2019, the Trump Administration released its detailed budget request for FY2020. A lapse in FY2019 annual appropriations from December 22, 2018, until January 25, 2019, delayed the full budget proposal's release past the first Monday in February, the deadline outlined in the Budget Act of 1974. The Trump Administration requested $51.68 billion in adjusted net discretionary budget authority for DHS for FY2020, as part of an overall budget that the Office of Management and Budget estimated to be $92.08 billion (including fees, trust funds, and other funding that is not annually appropriated or does not score against discretionary budget limits). The request amounted to a $2.27 billion (4.6%) increase from the $49.41 billion in annual net discretionary budget authority in appropriations enacted for FY2019 through the Department of Homeland Security Appropriations Act, 2019 ( P.L. 116-6 , Division A). The Trump Administration also requested discretionary funding that does not count against discretionary spending limits set by the Budget Control Act (BCA; P.L. 112-25 ) for two DHS components and is not reflected in the above totals. The Administration requested an additional $14.08 billion for the Federal Emergency Management Agency (FEMA) in disaster relief funding, as defined by the BCA, and in the budget request for the Department of Defense, $190 million in Overseas Contingency Operations/Global War on Terror designated funding (OCO), to be transferred to the Coast Guard from the Navy. On June 11, 2019, the House Appropriations Committee marked up H.R. 3931 , the Department of Homeland Security Appropriations Act, 2020. H.Rept. 116-180 was filed on July 24, 2019. As reported by the committee, H.R. 3931 included $52.80 billion in adjusted net discretionary budget authority. This was $1.12 billion (2.2%) above the level requested by the Administration, and $3.39 billion (6.9%) above the enacted level of annual appropriations for FY2019. The House committee bill included $14.08 billion in disaster relief-designated funding, reflecting the level in the Administration's modified request, and the House Appropriations Committee-reported Defense Appropriations bill included OCO funding to be transferred to the Coast Guard. As a result of amendments adopted in full committee markup, the initial CBO scoring of the bill exceeded the subcommittee allocation by more than $3 billion. (CBO later revised the scoring of those provisions to $1.9 billion.) On September 26, 2019, the Senate Appropriations Committee marked up S. 2582 , its version of the Department of Homeland Security Appropriations Act, 2020. S.Rept. 116-125 was filed the same day. As reported by the committee, S. 2582 included $53.18 billion in adjusted net discretionary budget authority. This was $1.50 billion (2.9%) above the level requested by the Administration, and $3.77 billion (7.6%) above the enacted annual level for FY2019. Much of this latter increase was due to the inclusion of $5 billion in funding for border barrier construction as opposed to $1.38 billion in the FY2019 act. Both the House and Senate committees included more discretionary funding for the Coast Guard, Transportation Security Administration, and FEMA than had been requested by the Administration. The Senate committee bill also included $17.35 billion of disaster relief-designated fundingâ$3.28 billion (23.3%) more than the Administration's modified requestâand $190 million in OCO-designated funding for the Coast Guard. No annual appropriations for FY2020 had been enacted by late September as FY2019 was drawing to a close, so on September 27, 2019, Congress passed a continuing resolution (CR) ( P.L. 116-59 ), temporarily extending funding at the FY2019 rate for operations through November 21. This CR was subsequently extended through December 20. P.L. 116-59 included four provisions specifically addressing needs of DHS under a CR: Section 132 provides a special apportionment of CR funds to cover Secret Service expenses related to the FY2020 presidential campaign; Section 133 allows for an accelerated rate of apportionment for the Disaster Relief Fund (DRF) to ensure that the programs it funds can be carried out; Section 134 extends the authorization for the National Flood Insurance Program to issue new policies; and Section 135 allows funds to be allocated in accordance with a planned restructuring of some DHS management activities. In addition, Section 101(6) extends by reference some immigration provisions that have been linked to the appropriations cycle. For further information on the FY2020 continuing resolutions, see CRS Report R45982, Overview of Continuing Appropriations for FY2020 (P.L. 116-59) . On December 16, 2019, the text and explanatory statements for two consolidated appropriations bills were released on the House Rules Committee website. One, which used H.R. 1158 as a legislative shell, included four appropriations measures, including the FY2020 DHS annual appropriations measure as Division D. Division D included $50.47 billion in adjusted net discretionary budget authority. This was $1.22 billion (2.4%) below the level requested by the Administration, and $1.06 billion (2.1%) above the enacted annual level for FY2019. The act included $17.35 billion for the Federal Emergency Management Agency (FEMA) in disaster relief funding, as defined by the Budget Control Act ( P.L. 112-25 ; BCA), and $190 million in Overseas Contingency Operations designated funding (OCO) in an appropriation to the Coast Guard. The House passed the measure by a vote of 280-138 on December 17, and the Senate did so by a vote of 81-11 on December 19. The bill was signed into law of December 20, 2019, and enacted as P.L. 116-93 . Generally, the homeland security appropriations bill includes all annual appropriations provided for DHS, allocating resources to every departmental component. Discretionary appropriations provide roughly two-thirds to three-fourths of the annual funding for DHS operations, depending how one accounts for disaster relief spending and funding for OCO. The remainder of the budget is a mix of fee revenues, trust funds, and mandatory spending. Annual appropriations measures for DHS typically have been organized into five titles. The first four are thematic groupings of components, while the fifth provides general direction to the department, and sometimes includes provisions providing additional budget authority. When DHS was established in 2003, components of other agencies were brought together over a matter of months, in the midst of ongoing budget cycles. Rather than developing a new structure of appropriations for the entire department, Congress and the Administration continued to provide resources through existing account structures when possible. At the direction of Congress, in 2014 DHS began to work on a new Common Appropriations Structure (CAS), which would standardize the format of DHS appropriations across components. In an interim report in 2015, DHS noted that operating with \"over 70 different appropriations and over 100 Programs, Projects, and Activities ... has contributed to a lack of transparency, inhibited comparisons between programs, and complicated spending decisions and other managerial decision-making.\" After several years of work and negotiations with Congress, DHS made its first budget request in the CAS for FY2017, and implemented it while operating under a CR in October 2016. Under the CAS, legacy appropriations structures were largely converted to a four-category structure: 1. Operations and Support , which covers operating salaries and expenses; 2. Procurement , Construction, and Improvements , which funds planning, operational development, engineering, purchase, and deployment of assets to support component missions; 3. Research and Development , which provides resources needed to identify, explore, and demonstrate new technologies and capabilities to support component missions; and 4. Federal Assistance , which supports grant funding managed by DHS components. All components have an Operations and Support (O&S) appropriation. All operational components and some support and headquarters components have a Procurement, Construction, and Improvements (PC&I) appropriation. Research and Development (R&D) appropriations are even less common, and only FEMA, the Countering Weapons of Mass Destruction Office (CWMD), and U.S. Citizenship and Immigration Services (USCIS) have federal assistance appropriations. Even with the implementation of the CAS structure, some appropriations are not included in those four categories: Federal Protective Service: The Federal Protective Service, which has been a part of several different components of DHS, does not have an appropriation of an explicit amount. Rather, the appropriations measure has language directing that funds credited to the FPS account may be spent by FPS to carry out its mission. It therefore has a net-zero impact on the total net discretionary spending in the bill. USCG's Retired Pay: The Coast Guard's Retired Pay appropriation supports the costs of the USCG retired personnel entitlements, including pensions, Survivor Benefits Plans, and medical care of retired USCG personnel and their dependents. This appropriation is categorized as appropriated mandatory spending: while the U.S. government has a legal obligation to make these payments, there is no permanent statutory mechanism in place to provide the funds. Because the government is required to make these payments, the Retired Pay appropriation does not count against the discretionary allocation of the bill. FEMA's Disaster Relief Fund: The Federal Emergency Management Agency (FEMA) receives a separate appropriation for its activities authorized under the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. Â§5121 et seq.). This allows for more consistent tracking of FEMA's disaster assistance spending over time, and ensures more transparency into the availability of funds for disaster assistance versus FEMA's other grant activities, which are funded through the Federal Assistance appropriation. FEMA's National Flood Insurance Fund: The National Flood Insurance Program is largely mandatory spending. However, some program functions, including mission support, floodplain management, and flood mapping, are paid for through discretionary appropriations. Certain other program costs are paid for by fees collected by the government, which requires appropriations language to allow those resources to be spent. These include: Operating expenses and salaries and expenses associated with flood insurance operations; Commissions and taxes of agents; Interest on borrowings from the Treasury; and Flood mitigation actions and flood mitigation assistance. Prior to the FY2017 act, the provisos accompanying many appropriations included directions to components or specific conditions on how the budget authority it provided could be used. Similarly, general provisions provided directions or conditions to one or more components. In the FY2017 act, a number of these provisions within appropriations and component-specific general provisions were grouped at the ends of the titles where their targeted components are funded, and identified as \"administrative provisions.\" This practice has continued in subsequent years. This report tracks changes in administrative and general provisions compared to the baseline of the prior year's enacted measure, noting provisions dropped, added, and modified. These changes from the baseline may take place for a variety of reasons. Due to the passage of time or enactment of permanent legislation, a provision may require adjustment or lose its relevance. Other provisions are the priority of members in one chamber or another, and as the enacted bill represents a compromise between those positions, the bills developed by a one chamber may not necessarily reflect the other chamber's priorities. The following sections of the report discuss the appropriations provided for the department by type of component. It groups the 15 components of DHS into the following structure: Law Enforcement Operational Components (funded in Title II) U.S. Customs and Border Protection Immigration and Customs Enforcement Transportation Security Administration U.S. Coast Guard U.S. Secret Service Incident Response and Recovery Operational Components (Title III) Cybersecurity and Infrastructure Security Agency Federal Emergency Management Agency Support Components (Title IV) U.S. Citizenship and Immigration Services Federal Law Enforcement Training Center Science and Technology Directorate Countering Weapons of Mass Destruction Office Headquarters Components (Title I) Office of the Secretary and Executive Management Departmental Management Directorate Analysis and Operations Office of Inspector General Each group's and component's role is briefly described below, and their FY2019 enacted and FY2020 requested, recommended, and enacted appropriations are presented in tables arranged by grouped components. After each funding table, a brief analysis of selected administrative provisions for that group is provided. Funding for law enforcement operational components is generally provided in Title II of the annual DHS appropriations act. This is the largest title of the bill, although not all of DHS's largest components are included in it. U.S. Customs and Border Protection (CBP) : CBP is responsible for securing America's borders, coastlines, and ports of entry, preventing the illegal entry of persons and goods while facilitating lawful travel, trade, and immigration. Immigration and Customs Enforcement (ICE): ICE is the principal criminal investigative agency within DHS, and is charged with preventing terrorism and combating the illegal movement of people and goods. Transportation Security Administration (TSA): TSA provides security for the U.S. transportation system while ensuring the free and secure movement of people and goods. U.S. Coast Guard (USCG): The USCG is the principal federal agency responsible for maritime safety, security, and environmental stewardship in U.S. ports and inland waterways. The USCG is a hybrid of a law enforcement agency, regulatory agency, and first responder, as well as being a component of DHS, the intelligence community, and of the U.S. Armed Forces. U.S. Secret Service (USSS): The USSS is responsible for protecting the President, the Vice-President, their families and residences, past Presidents and their spouses, national and world leaders visiting the United States, designated buildings (including the White House and Vice President's Residence), and special events of national significance. The USSS also investigates and enforces laws related to counterfeiting and certain financial crimes. Table 1 includes a breakdown of budgetary resources provided to these components controlled through appropriations legislation. H.R. 3931 as reported by the House Appropriations Committee had 31 administrative provisions for Title II, 21 of which were unchanged from FY2019. The House committee bill dropped eight provisions which were in the FY2019 act, including Section 208 , which allowed ICE to reprogram funding to maintain detention of aliens that were prioritized for removal; Section 214 , which mandated TSA continue to monitor airport exit lanes; Section 223 , which allowed USCG to allocate its OCO funding within the Operations and Support appropriation; Section 225 , which authorized a TSA pilot program for screening services at locations other than primary passenger terminals; Section 227 , which requires the USCG maintain the mission and staffing of its Operations Systems Center; Section 228 , which prohibited competitions to privatize activities of the USCG National Vessel Documentation Center; Section 229 , which allowed funds in the bill to alter activities of the USCG Civil Engineering program, but not reduce them; and Section 232 , which required DHS collaboration with local governments on siting border barriers within their jurisdictions. Three previously carried administrative provisions were modified, and seven new provisions were added. S. 2582 as reported by the Senate Appropriations Committee, had 33 administrative provisions in Title II. Only one provision was dropped from the FY2019 actâSection 225, described above. One previously carried provision was modified and three new provisions were added. P.L. 116-93 , Div. D, includes 36 administrative provisions in Title II. Sections 225 and 232 from the FY2019 act were dropped, four provisions were modified, and six new administrative provisions were included. Modified administrative provisions are outlined in Table 2 , while new administrative provisions proposed or included by the appropriations committees are outlined in Table 3 . Funding for operational components which are focused on incident response and recovery is generally found in Title III of the annual DHS appropriations act. It includes funding for FEMA, which has the largest budget of any DHS componentâan appropriated budget largely driven by disaster programs authorized under the Stafford Act, and an overall budget which also includes non-appropriated funding for the National Flood Insurance Program. Title III also includes funding for the newly restructured Cybersecurity and Infrastructure Security Agency (CISA), formerly the National Protection and Programs Directorate. The reorganization included a shift of the Federal Protective Service from CISA to the Management Directorate, reducing the gross budgetary resources in this title. Cybersecurity and Infrastructure Security Agency (CISA): Formerly known as the National Protection and Programs Directorate (NPPD), CISA promotes information sharing to build resilience and mitigate risk from cyber and physical threats to infrastructure, and leads cross-government cybersecurity initiatives. Federal Emergency Management Agency (FEMA): FEMA leads the federal government's efforts to reduce the loss of life and property and protect the United States from all hazards, including natural disasters, acts of terrorism, and other disasters through a risk-based, comprehensive emergency management system of preparedness, protection, response, recovery, and mitigation. Table 4 includes a breakdown of budgetary resources for these components controlled through appropriations legislation. As some annually appropriated resources were provided for FEMA from outside Title III in FY2019, by transfer and by appropriation, a separate line is included for FEMA showing a total for what is provided solely within Title III, then the non-Title III funding, followed by the total annual appropriation for FEMA. The table only reflects the impact of transfers in the discretionary funding and budgetary resource totals. H.R. 3931 as reported by the House Appropriations Committee had eight administrative provisions in Title III, five of which were unchanged from FY2019. Two provisions were dropped from the FY2019 act: Section 301, which required a report on revised methods to assess and allocate costs for countermeasures used by the Federal Protective Service; and Section 309, which raised the federal share of costs for essential assistance and debris removal for wildfire major disasters declared in calendar year 2018 from 75% to 90%. Two previously carried administrative provisions were modified, and one new provision was added, which would allow governors to resubmit and FEMA to reconsider requests for Stafford Act individual assistance for certain disasters. S. 2582 as reported by the Senate Appropriations Committee had six administrative provisions in Title III. The Senate Appropriations Committee chose to drop three administrative provisions from this title that were included in the FY2019 actâthe two described above, and Section 307, which provided certain waivers for SAFER Act grants. No previously carried provisions were substantively modified and no new provisions were added. P.L. 116-93, Div. D, includes seven administrative provisions in Title III. Sections 301 and 309 from the FY2019 act as described above were dropped, two provisions were modified, and the new provision proposed in the House Appropriations Committee bill was not included. Modified administrative provisions are tracked in Table 5 . Funding for support components is generally found in Title IV of the annual DHS appropriations bill. The relatively small size of some of these appropriations makes changes in their funding appear more significant if expressed on a percentage basis. U.S. Citizenship and Immigration Services (USCIS): USCIS administers U.S. immigration laws that govern temporary admission and permanent immigration to the United States. Federal Law Enforcement Training Center (FLETC): FLETC is a technical training school for law enforcement professionals, meeting the basic and specialized training needs of approximately 100 federal agencies, as well as state and local organizations. Science and Technology Directorate (S&T): S&T leads and coordinates research, development, testing, and evaluation work for DHS, and supports departmental acquisitions. Countering Weapons of Mass Destruction Office (CWMD): CWMD leads DHS's efforts to develop and enhance programs and capabilities that defend against weapons of mass destruction, and includes the Department's Chief Medical Officer, who serves as the principal advisor to DHS leadership on medical and public health issues. Table 6 includes a breakdown of budgetary resources provided to these components controlled through appropriations legislation. H.R. 3931 as reported by the House Appropriations Committee included eight administrative provisions in Title IV, six of which were unchanged from FY2019. It dropped two: Section 402, which barred USCIS from providing immigration benefits unless it had received a background check that did not preclude providing such a benefit; and Section 408, which provided budgetary flexibility to support the transfer of the National Bio- and Agrodefense Facility to the U.S. Department of Agriculture. H.R. 3931 included two new provisions. S. 2582 as reported by the Senate Appropriations Committee had nine administrative provisions in Title IV. The Senate Appropriations Committee chose to drop one provision from this title that was included in the FY2019 actâSection 408, described above. No previously carried provisions were substantively modified and two new provisions were added. P.L. 116-93 , Div. D, includes seven administrative provisions in Title IV. Sections 402 and 408 from the FY2019 act as described above were dropped. One new provision was added. New administrative provisions proposed or included by the appropriations committees are outlined in Table 7 . Funding for headquarters components is traditionally found in Title I of the annual DHS appropriations act, although some initiatives have been funded in the past through general provisions. Office of the Secretary and Executive Management (OSEM): OSEM provides central leadership, management, direction and oversight for all DHS components. Departmental Management Directorate (DM): DM provides DHS-wide mission support services. Analysis and Operations (A&O): A&O covers two separate offices: The Office of Intelligence and Analysis (I&A), which integrates and shares intelligence with DHS components and stakeholders to allow them to identify, mitigate, and respond to threats; and the Office of Operations Coordination (OPS), which provides operations coordination, information sharing, and the common operating picture for DHS, and helps ensure DHS continuity and resilience. Office of Inspector General (OIG): The OIG is an independent, objective audit, inspection, and investigative body that reports to the Secretary and to Congress on DHS efficiency and effectiveness, and works to prevent waste, fraud, and abuse. Table 8 provides a breakdown of the budgetary resources provided to these components controlled through appropriations legislation. As resources were requested or provided for the Management Directorate from outside Title I, separate lines are included for each of those components showing a total for what is provided solely within Title I, then the individual items funded outside the title, followed by the total annual appropriation for the components. The table only reflects the impact of transfers in the discretionary funding and budgetary resource totals. The title funding DHS headquarters components in H.R. 3931 (Title I) had five administrative provisions, three of which are unchanged from FY2019. Two administrative provisions were dropped: Section 101, a requirement for a monthly budget and staffing report; and Section 106, a reporting requirement on visa overstay data. One previously carried administrative provision was modified to bar the use of Treasury Forfeiture Fund resources to build border security infrastructure. One new provision was added in the House bill, to create an Immigration Detention Ombudsman. Senate Appropriations Committee-reported S. 2582 had six administrative provisions in Title I. The Senate Appropriations Committee retained all six previously enacted provisions without substantive modifications, and no new provisions were added. P.L. 116-93 , Div. D, includes seven administrative provisions in Title I. No provisions were dropped. The new provision proposed in the House Appropriations Committee bill creating the Immigration Detention Ombudsman was included with minor modifications. As noted earlier, the fifth title of the annual DHS appropriations act contains general provisions, the impact of which may reach across the government, apply to the entire department, affect multiple components, or focus on a single activity. Most general provisions remain functionally unchanged from year to year, providing guidance to DHS or structure to DHS appropriations with little more than updates to effective dates or amounts. The FY2019 DHS appropriations act included 40 such general provisions. H.R. 3931 , as reported by the House Appropriations Committee, carried 36 such provisions, including four added to the committee's initial draft in full committee markup. Four of the 36 were modified versions of FY2019 general provisions providing policy direction, while four were new. Six provisions carried in the FY2019 act were not retained in House committee version of H.R. 3931 : Section 516 , which restricted transfer or release of detainees from Guantanamo Bay; Section 518 , which restricted the use of funds in the bill to hire unauthorized workers; Section 521 , which provided funding for financial systems modernization activities; Section 522 , which required reductions in administrative spending from certain accounts; Section 536 , which barred the use of funds to implement the Arms Trade Treaty prior to its ratification; and Section 537 , which required the Administration to provide a list of spending cuts as alternatives to proposed fee increases that had not been authorized before the beginning of the budget year. S. 2582 , as reported by the Senate Appropriations Committee, had 36 general provisions in Title V, 32 of which were unchanged from FY2019. One provision was added, and one was modified. Three provisions carried in the FY2019 act that reduced budget authority available to DHS were modified in the Senate committee's bill: the DHS-wide reduction in total Operations and Support appropriations (originally Section 522, now Section 521), and rescissions of prior-year appropriations (originally Section 538 and 539, now Section 536). Three other provisions carried in the FY2019 act were dropped: Section 521 , which provided $51 million for DHS financial systems modernization; Section 531 , which provided $41 million in grants for local law enforcement costs for Presidential protection; and Section 535 , which prohibited using funds for a Principal Federal Official during a declared Stafford Act major disaster or emergency, with certain exceptions. P.L. 116-93 , Div. D, included 40 general provisions in Title V. Two provisions were dropped from the FY2019 DHS Appropriations ActâSections 521 and 522 described above. No new policy-related general provisions were added, although the last four general provisions provided rescissions of various types: Section 537 rescinds $233 million in emergency designated supplemental appropriations for CBP from P.L. 116-26 , which are reappropriated in Title II of this act; Section 538 rescinds $202 million in unobligated balances from across DHS; Section 539 rescinds almost $19 million in lapsed balances; Section 540 rescinds $300 million in unobligated balances from the Disaster Relief Fund. Modified and new policy-related general provisions are outlined in Table 9 and Table 10 , respectively. Some general provisions have a direct impact on the amount of funding in the bill. In FY2019, funding was included in Title V for the Financial Systems Modernization initiative and a grant program for Presidential Residence Protection costs. In this report, Financial Systems Modernization is listed with headquarters components, and it is managed by the DHS Office of the Chief Information Officer. Presidential Residence Protection Cost grants are listed with FEMA, as they manage the distribution of those funds. While H.R. 3931 included funding for Presidential Residence Protection Cost Grants, it did not include separate funding for Financial Systems Modernization. S. 2582 included no additional appropriations for any DHS activities in Title V. P.L. 116-93 , Div. D, included $41 million for Presidential Residence Protection Cost Grants in Title V. In addition to provisions appropriating additional resources, rescissions of prior-year appropriationsâcancellations of budget authorityâthat reduce the net funding level in the bill are found in this title. For FY2019, Division A of P.L. 116-6 included $303 million in rescissions and a provision directing that $300 million of DRF unobligated balances be used to offset new DRF appropriations. For FY2020, the Administration proposed rescinding $250 million in prior-year funding from the portion of the DRF not dedicated to the costs of major disasters. Section 536 of H.R. 3931 included $657 million in rescissions from other appropriations. The largest of these comes from CBP's PC&I appropriation for FY2019, reducing it by $601 millionâthe amount transferred to it from the Treasury's Asset Forfeiture Fund by the Trump Administration for construction of border security infrastructure. S. 2582 included $62 million of provisions that reduced the score of the bill, the largest being a $33 million reduction in administrative costs to be made by DHS from certain operations and support appropriations. P.L. 116-93 , Div. D, included $754 million in rescissions, including $300 million in rescissions from unobligated balances in the DRF, and $233 million in emergency-designated rescissions from CBP appropriations as part of redirecting funds provided in P.L. 116-26 for humanitarian care, critical life and safety improvements to CBP facilities, and electronic health records. For additional perspectives on FY2020 DHS appropriations, see the following: CRS Report R45972, Comparing DHS Component Funding, FY2020: In Brief ; CRS Report R44604, Trends in the Timing and Size of DHS Appropriations: In Brief ; and CRS Report R44052, DHS Budget v. DHS Appropriations: Fact Sheet . Congressional clients also may wish to consult CRS's experts directly. Table 11 lists CRS analysts and specialists who have expertise in policy areas linked to DHS appropriations. Budget Authority, Obligations, and Outlays Federal government spending involves a multistep process that begins with the enactment of budget authority by Congress. Federal agencies then obligate funds from enacted budget authority to pay for their activities. Finally, payments are made to liquidate those obligations; the actual payment amounts are reflected in the budget as outlays. Budget authority is established through appropriations acts or direct spending legislation and determines the amounts that are available for federal agencies to spend. The Antideficiency Act prohibits federal agencies from obligating more funds than the budget authority enacted by Congress. Budget authority also may be indefinite in amount, as when Congress enacts appropriations providing \"such sums as may be necessary\" to complete a project or purpose. Budget authority may be available on a one-year, multiyear, or no-year basis. One-year budget authority is available for obligation only during a specific fiscal year; any unobligated funds at the end of that year are no longer available for spending. Multiyear budget authority specifies a range of time during which funds may be obligated for spending, and no-year budget authority is available for obligation for an indefinite period of time. Obligations are incurred when federal agencies employ personnel, enter into contracts, receive services, and engage in similar transactions in a given fiscal yearâwhich create a legal requirement for the government to pay. Outlays are the funds that are actually spent during the fiscal year. Because multiyear and no-year budget authorities may be obligated over a number of years, outlays do not always match the budget authority enacted in a given year. Additionally, budget authority may be obligated in one fiscal year but spent in a future fiscal year, especially with certain contracts. In sum, budget authority allows federal agencies to incur obligations and authorizes payments, or outlays, to be made from the Treasury. Discretionary funded agencies and programs, and appropriated entitlement programs, are funded each year in appropriations acts. Discretionary and Mandatory Spending Gross budget authority , or the total funds available for spending by a federal agency, may be composed of discretionary and mandatory spending. Discretionary spending is not mandated by existing law and is thus appropriated yearly by Congress through appropriations acts. The Budget Enforcement Act of 1990 defines discretionary appropriations as budget authority provided in annual appropriations acts and the outlays derived from that authority, but it excludes appropriations for entitlements. Mandatory spending , also known as direct spending , consists of budget authority and resulting outlays provided in laws other than appropriations acts and is typically not appropriated each year. Some mandatory entitlement programs, however, must be appropriated each year and are included in appropriations acts. Within DHS, Coast Guard retirement pay is an example of appropriated mandatory spending. Offsetting Collections Offsetting funds are collected by the federal government, either from government accounts or the public, as part of a business-type transaction such as collection of a fee. These funds are not considered federal revenue. Instead, they are counted as negative outlays. DHS net discretionary budget authority , or the total funds appropriated by Congress each year, is composed of discretionary spending minus any fee or fund collections that offset discretionary spending. Some collections offset a portion of an agency's discretionary budget authority. Other collections offset an agency's mandatory spending. These mandatory spending elements are typically entitlement programs under which individuals, businesses, or units of government that meet the requirements or qualifications established by law are entitled to receive certain payments if they establish eligibility. The DHS budget features two mandatory entitlement programs: the Secret Service and the Coast Guard retired pay accounts (pensions). Some entitlements are funded by permanent appropriations, and others are funded by annual appropriations. Secret Service retirement pay is a permanent appropriation and, as such, is not annually appropriated. In contrast, Coast Guard retirement pay is annually appropriated. In addition to these entitlements, the DHS budget contains offsetting Trust and Public Enterprise Funds. These funds are not appropriated by Congress. They are available for obligation and included in the President's budget to calculate the gross budget authority. 302(a) and 302(b) Allocations In general practice, the maximum budget authority for annual appropriations (including DHS) is determined through a two-stage congressional budget process. In the first stage, Congress sets overall spending totals in the annual concurrent resolution on the budget. Subsequently, these totals are allocated among the congressional committees, usually through the statement of managers for the conference report on the budget resolution. These amounts are known as the 302(a) allocations . They include discretionary totals available to the Committees on Appropriations for enactment in annual appropriations bills through the subcommittees responsible for the development of the bills. In the second stage of the process, the appropriations committees allocate the 302(a) discretionary funds among their subcommittees for each of the appropriations bills. These amounts are known as the 302(b) allocations . These allocations must add up to no more than the 302(a) discretionary allocation and form the basis for enforcing budget discipline, since any bill reported with a total above the ceiling is subject to a point of order. The 302(b) allocations may be adjusted during the year by the respective appropriations committee issuing a report delineating the revised suballocations as the various appropriations bills progress toward final enactment. Table A-1 shows comparable figures for the 302(b) allocation for FY2020, based on the adjusted net discretionary budget authority included in Division A of P.L. 116-6 , the President's request for FY2020, and the House and Senate subcommittee allocations for the Homeland Security appropriations bill for FY2020. A series of amendments were offered and adopted in the House full committee markup of the FY2020 DHS appropriations bill that, according to CBO, put the bill $3.066 billion over its 302(b) discretionary allocation. This scoring was later revised to $1.9 billion. These provisions were not included in the final FY2020 DHS annual appropriations act. The Budget Control Act, Discretionary Spending Caps, and Adjustments The Budget Control Act established enforceable discretionary limits, or caps, for defense and nondefense spending for each fiscal year from FY2012 through FY2021. Subsequent legislation, including the Bipartisan Budget Acts of 2013, 2015, 2018, and 2019, amended those caps. Most of the budget for DHS is considered nondefense spending. In addition, the Budget Control Act allows for adjustments that would raise the statutory caps to cover funding for overseas contingency operations/Global War on Terror, emergency spending, and, to a limited extent, disaster relief and appropriations for continuing disability reviews and control of health care fraud and abuse. Three of the four justifications outlined in the Budget Control Act for adjusting the caps on discretionary budget authority have played a role in DHS's appropriations process. Two of theseâemergency spending and overseas contingency operations/Global War on Terrorâare not limited. The third justificationâdisaster reliefâis limited. Under the Budget Control Act, the allowable adjustment for disaster relief was determined by the Office of Management and Budget (OMB), using the following formula until FY2019: Limit on disaster relief cap adjustment for the fiscal year = Rolling average of the disaster relief spending over the last ten fiscal years (throwing out the high and low years) + the unused amount of the potential adjustment for disaster relief from the previous fiscal year. The Bipartisan Budget Act of 2018 amended the above formula, increasing the allowable size of the adjustment by adding 5% of the amount of emergency-designated funding for major disasters under the Stafford Act, calculated by OMB as $6.296 billion. The act also extended the availability of unused adjustment capacity indefinitely, rather than having it only carry over for one year. In August 2019, OMB released a sequestration preview report for FY2020 that provided a preview estimate of the allowable adjustment for FY2020 of $17.5 billion âthe second-largest allowable adjustment for disaster relief in the history of the mechanism. That estimate is the sum of: the 10-year average, dropping the high and low years ($7.9 billion); 5% of the emergency-designated Stafford Act spending since 2012 ($6.6 billion); and carryover from the previous year ($3.0 billion). The final allowable adjustment for FY2020 may still differ from this estimate.", "summary": "This report provides an overview and analysis of FY2020 appropriations for the Department of Homeland Security (DHS). The primary focus of this report is on the funding provided to DHS through the appropriations process. It includes an Appendix with definitions of key budget terms used throughout the suite of Congressional Research Service reports on DHS appropriations. It also directs the reader to other reports providing context for specific component appropriations. As part of an overall DHS budget that the Office of Management and Budget (OMB) estimated to be $92.08 billion, the Trump Administration requested $51.68 billion in adjusted net discretionary budget authority through the appropriations process for DHS for FY2020. The request amounted to a $2.27 billion (4.6%) increase from the $49.41 billion in annual appropriations enacted for FY2019 through the Department of Homeland Security Appropriations Act, 2019 ( P.L. 116-6 , Division A). The Administration also requested discretionary funding that does not count against discretionary spending limits and is not reflected in the adjusted net discretionary budget authority total. The Administration requested an additional $14.08 billion for the Federal Emergency Management Agency (FEMA) in disaster relief funding, as defined by the Budget Control Act ( P.L. 112-25 ; BCA), and in the budget request for the Department of Defense (DOD), $190 million in Overseas Contingency Operations designated funding (OCO) for the Coast Guard to be transferred from the Operations and Maintenance budget of the U.S. Navy. On June 11, 2019, the House Appropriations Committee marked up H.R. 3931 , its version of the Department of Homeland Security Appropriations Act, 2020. H.Rept. 116-180 was filed July 24, 2019. Committee-reported H.R. 3931 included $52.80 billion in adjusted net discretionary budget authority, according to the Congressional Budget Office's initial score of the bill. This was $1.12 billion (2.2%) above the level requested by the Administration, and $3.39 billion (6.9%) above the enacted annual level for FY2019. Much of this increase was due to the addition of several immigration-related policy provisions in the full committee markup, which added more than $3.0 billion to the score of the bill, putting the bill over its subcommittee allocation (CBO later revised the scoring of those provisions to $1.9 billion in a separate letter on September 10, 2019). On September 26, 2019, the Senate Appropriations Committee marked up S. 2582 , its version of the Department of Homeland Security Appropriations Act, 2020. S.Rept. 116-125 was filed the same day. Committee-reported S. 2582 included $53.18 billion in adjusted net discretionary budget authority. This was $1.50 billion (2.9%) above the level requested by the Administration, and $3.77 billion (7.6%) above the enacted annual level for FY2019. Much of this latter increase was due to the inclusion of $5 billion in funding for border barrier construction as opposed to $1.38 billion in the FY2019 act. Both the House and Senate appropriations committees recommended more discretionary funding for the Coast Guard, Transportation Security Administration, and FEMA than had been requested by the Administration. No annual appropriations for FY2020 had been enacted as FY2019 was drawing to a close, so a continuing resolution was enacted ( P.L. 116-59 ) on September 27, 2019. It temporarily extended funding at the FY2019 rate for operations through November 21 for most DHS programs (see limited exceptions in the Department of Homeland Security section of CRS Report R45982, Overview of Continuing Appropriations for FY2020 (P.L. 116-59) ). This CR was subsequently extended through December 20. Annual appropriations for DHS were enacted on December 20, 2019, in P.L. 116-93 , Division D. The act included $50.47 billion in adjusted net discretionary budget authority. This was $1.22 billion (2.4%) below the level requested by the Administration, and $1.06 billion (2.1%) above the enacted annual level for FY2019. The FY2020 DHS Appropriations Act included $17.35 billion for the Federal Emergency Management Agency (FEMA) in disaster relief funding, as defined by the BCA, and $190 million in OCO funding for the Coast Guard rather than as a transfer from the Navy. This report will be updated as events warrant.", "document_type": "crs"}
{"report": "In the past, Congress has regularly acted to extend expired or expiring temporary tax provisions. Collectively, these temporary tax provisions are often referred to as \"tax extenders.\" There are 33 temporary tax provisions scheduled to expire at the end of 2020. This report discusses six provisions related to the individual income tax: (1) the tax exclusion for canceled mortgage debt, (2) mortgage insurance premium deductibility, (3) the above-the-line deduction for qualified tuition and related expenses, (4) the credit for health insurance costs of eligible individuals, (5) the medical expense deduction adjusted gross income (AGI) floor of 7.5%, and (6) the exclusion for income of certain state and local tax rebates and reimbursement for volunteer firefighters and emergency medical responders. These six provisions were extended through 2020 in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The first three provisions had expired at the end of 2017 and have been included in recent tax extenders legislation. Two provisions are housing related. The provision allowing homeowners to deduct mortgage insurance premiums was first enacted in 2006 (effective for 2007). The provision allowing qualified canceled mortgage debt income associated with a primary residence to be excluded from income was first enacted in 2007. Both provisions were temporary when first enacted, but in recent years have been extended as part of tax extenders legislation. The above-the-line deduction for qualified tuition and related expenses was first added as a temporary provision in the Economic Growth and Tax Relief Reconciliation Act of 2001 (EGTRRA; P.L. 107-16 ), and has regularly been extended since. The Further Consolidated Appropriations Act, 2020, also extended through 2020 individual provisions that expired in 2019 and 2018. The credit for health insurance costs of eligible individuals (also known as the health coverage tax credit [HCTC]) was scheduled to expire after 2019, whereas the medical expense deduction adjusted gross income (AGI) floor of 7.5% had expired at the end of 2018. The act also reinstated for one year, and expanded, a provision allowing for the exclusion from income of certain state and local tax rebates and reimbursement for volunteer firefighters and emergency medical responders that had expired in 2010. The three provisions that expired in 2018, 2019, or 2010 were not in the previous tax extenders legislation. The health coverage tax credit, which applied to recipients of trade adjustment assistance, among others, was last extended through 2019 by the Trade Preferences Extension Act of 2015 ( P.L. 114-27 ). The 7.5% floor for itemized deductions for medical expenses was provided through 2018 by the 2017 tax revision ( P.L. 115-97 , commonly known as the Tax Cuts and Jobs Act). The exclusion of reimbursements for volunteer firefighters and emergency medical respondents was originally enacted in the Mortgage Forgiveness Debt Relief Act of 2007 ( P.L. 110-142 ). In recent years, Congress has chosen to extend most, if not all, recently expired or expiring provisions as part of tax extenders legislation. The most recent tax extenders package is in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The temporary reinstatement of the exclusion for volunteer firefighters and emergency medical responders was in a different part of the act, Division O, the Setting Every Community Up for Retirement Enhancement (\"SECURE\") Act of 2019. The estimated cost of the extensions of temporary individual tax provisions enacted in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) is provided in Table 1 . As described above, the first three provisions had expired at the end of 2017. Thus, they were extended for three years (with two years of the three-year extension being retroactive). The 7.5% medical expense deduction floor had expired at the end of 2018, meaning that one year of the two-year extension was retroactive. The health care tax credit was scheduled to expire at the end of 2019, and was extended for one year. The provision for volunteer firefighters and emergency medical responders is scheduled to be effective for one year (2020). Historically, when all or part of a taxpayer's mortgage debt has been forgiven, the amount canceled has been included in the taxpayer's gross income. This income is typically referred to as canceled mortgage debt income. Canceled (or forgiven) mortgage debt is common with a short sale, in which a homeowner agrees to sell a house and transfer the proceeds to the lender in exchange for the lender relieving the homeowner from repaying any debt in excess of the sale proceeds. For example, in a short sale, a homeowner with a $300,000 mortgage may be able to sell the house for $250,000. The lender would receive the $250,000 from the home sale and forgive the remaining $50,000 in mortgage debt. Lenders report the canceled debt to the Internal Revenue Service (IRS) using Form 1099-C. A copy of the 1099-C is also sent to the borrower, who in general must include the amount listed in his or her gross income in the year of discharge. To understand why forgiven debt has historically been taxable, it may be helpful to explain why it is viewed as income from an economic perspective. Income is a measure of the increase in an individual's purchasing power over a designated period of time. When individuals experience a reduction in their debts, their purchasing power has increased (because they no longer have to make payments). Effectively, their disposable income has increased. From an economic standpoint, it is irrelevant whether a person's debt was reduced via a direct transfer of money to the borrower (e.g., wage income) that was then used to pay down the debt, or whether it was reduced because the lender forgave a portion of the outstanding balance. Both have the same effect, and thus both are subject to taxation. The Mortgage Forgiveness Debt Relief Act of 2007 ( P.L. 110-142 ), signed into law on December 20, 2007, temporarily excluded qualified canceled mortgage debt income that is associated with a primary residence from taxation. Thus, the act allowed taxpayers who did not qualify for one of several existing exceptions to exclude canceled mortgage debt from gross income. The provision was originally effective for debt discharged before January 1, 2010. Since then, the provision has regularly been extended as part of the tax extenders. The exclusion was most recently extended through December 31, 2020, in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). The rationales for extending the exclusion are to minimize hardship for households in distress and lessen the risk that nontax homeowner retention efforts are thwarted by tax policy. The exclusion's supporters may also argue that extending the exclusion would continue to assist the recoveries of the housing market and overall economy. The exclusion's opponents may argue that extending the provision would make debt forgiveness more attractive for homeowners, which could encourage homeowners to be less responsible about fulfilling debt obligations. Some may also view the exclusion as unfair because its benefits depend on whether a homeowner is able to negotiate a debt cancelation, the taxpayer's income tax bracket, and whether the taxpayer retains ownership of the house following the debt cancellation. Traditionally, homeowners who itemize their tax deductions have been able to deduct the interest paid on their mortgages, as well as any property taxes they pay. Beginning in 2007, homeowners could also deduct qualifying mortgage insurance premiums as a result of the Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ). Specifically, homeowners could effectively treat qualifying mortgage insurance premiums as mortgage interest, thus making the premiums deductible if the homeowner itemized, and if the homeowner's adjusted gross income was below a certain threshold ($55,000 for single, and $110,000 for married filing jointly). Originally, the deduction was only to be available for 2007, but it was extended several times. The deduction was extended through December 31, 2020, in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). Taxpayers of all ages may be less likely to claim the mortgage insurance premium deduction compared to prior periods because other provisions of the 2017 tax revision, including a higher standard deduction (in part as a trade-off for elimination of personal exemptions) and a cap on the deduction of state and local taxes, reduced the expected number of itemizers (projected to fall from about one-third of individual income tax returns to 11%). A justification for allowing the deduction of mortgage insurance premiums is that it helps to promote homeownership and, relatedly, the recovery of the housing market following the December 2007-June 2009 Great Recession. Homeownership is often argued to bestow certain benefits to society, such as higher property values, lower crime, and higher civic participation. Homeownership may also promote a more even distribution of income and wealth, as well as establish greater individual financial security. Furthermore, homeownership may have a positive effect on living conditions, which can lead to a healthier population. With regard to the first justification, it is not clear that the deduction for mortgage insurance premiums affects the homeownership rate. Economists have identified the high transaction costs associated with a home purchaseâmostly resulting from the down payment requirement, but also from closing costsâas the primary barrier to homeownership. The ability to deduct insurance premiums does not lower this barrierâmost lenders will require mortgage insurance if the borrower's down payment is less than 20% regardless of whether the premiums are deductible. The deduction may allow buyers to borrow more, however, because they can deduct the higher associated premiums and therefore afford a higher housing payment. Concerning the second justification, it is also not clear that the deduction for mortgage insurance premiums is still needed to assist in the housing market's recovery. Based on the S&P CoreLogic Case-Shiller U.S. National Composite Index, home prices have generally increased since the bottom of the market following the Great Recession. In addition, the available housing inventory is now slightly below its historical level. Both of these indicators suggest that the market is stronger than when the provision was enacted. Economists have noted that owner-occupied housing is already heavily subsidized via tax and nontax programs. To the degree that owner-occupied housing is oversubsidized, it could be argued that extending the deduction for mortgage insurance premiums would lead to a greater misallocation of resources that are directed toward the housing industry. This provision allows taxpayers to deduct up to $4,000 of qualified tuition and related expenses for postsecondary education (both undergraduate and graduate) from their gross income. Expenses that qualify for this deduction include tuition payments and any fees required for enrollment at an eligible education institution. Other expenses, including room and board expenses, are generally not qualifying expenses for this deduction. The deduction is \"above-the-line,\" that is, it is not restricted to itemizers. Individuals who could be claimed as dependents, married persons filing separately, and nonresident aliens who do not elect to be treated as resident aliens do not qualify for the deduction, in part to avoid multiple claims on a single set of expenses. The amount that can be claimed for the deduction is generally reduced by any tax-free assistance, if that assistance can be used to pay for expenses that qualify for the deduction. Tax-free assistance includes tax-free grants and scholarships (including Pell Grants), employer-provided educational assistance, and veterans' educational assistance. The maximum deduction taxpayers can claim depends on their income level. Taxpayers can deduct up to $4,000 if their income is $65,000 or less ($130,000 or less if married filing jointly); or $2,000 if their income is between $65,000 and $80,000 ($130,000 and $160,000 if married filing jointly). Taxpayers with income above $80,000 ($160,000 for married joint filers) are ineligible for the deduction. These income limits are not adjusted for inflation. The above-the-line deduction for qualified tuition and related expenses was enacted temporarily by the Economic Growth and Tax Relief Reconciliation Act of 2001 ( P.L. 107-16 ). It has been extended a number of times. Most recently, the deduction was extended through December 31, 2020, in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). One criticism of education tax benefits is that the taxpayer is faced with a confusing choice of deductions and credits and tax-favored education savings plans, and that these benefits should be consolidated. Some tax reform proposals have consolidated these benefits into a single education credit. Taxpayers may claim the tuition and fees deduction instead of education tax credits for the same student. These credits include permanent tax credits: the American Opportunity Tax Credit (AOTC) and Lifetime Learning Credit. The AOTC is directed at undergraduate education and is limited to the first four years of postsecondary education. The Lifetime Learning Credit (20% of up to $10,000) is not limited in years of coverage. These credits are generally more advantageous than the deduction, except for higher-income taxpayers, in part because the credits are phased out at lower levels of income than the deduction. For example, for single taxpayers, the Lifetime Learning Credit begins phasing out at $59,000 for 2020. The deduction benefits taxpayers according to their marginal tax rate. Students usually have relatively low incomes, but they may be part of families in higher tax brackets. The maximum amount of deductible expenses limits the tax benefit's impact on individuals attending schools with comparatively high tuitions and fees. Because the income limits are not adjusted for inflation, the deduction might be available to fewer taxpayers over time if extended in its current form. The distribution of the deduction in Table 2 indicates that some of the benefit is concentrated in the income range where the Lifetime Learning Credit has phased out, but also that significant deductions are claimed at lower income levels. Because the Lifetime Learning Credit is preferable to the deduction at lower income levels, it seems likely that confusion about the education benefits may have caused taxpayers not to choose the optimal education benefit. The credit for health insurance costs of eligible individuals, commonly known as the health coverage tax credit (HCTC), reduces the cost of qualified health insurance for eligible individuals. To be eligible to claim the HCTC, taxpayers must be (1) an eligible trade adjustment assistance (TAA) recipient; (2) an eligible alternative TAA recipient or reemployment TAA recipient; or (3) an eligible Pension Benefit Guaranty Corporation (PBGC) pension recipient. Additionally, an individual is not eligible for the HCTC if they have access to \"other specified coverage,\" which includes coverage for which an employer (or former employer) incurs 50% of the cost as well as Medicare, Medicaid, the Children's Health Insurance Programs, and other federal and military health or medical benefit plans. Under this provision, eligible taxpayers are allowed a refundable tax credit for 72.5% of the premiums they pay for qualified health insurance for themselves and their family members. Eligible taxpayers with qualified health insurance may claim the tax credit (1) when tax returns are filed or (2) as advance payments, on a monthly basis, throughout the year. This latter option helps taxpayers pay for health plan premiums as they become due. The credit is not available for months beginning on or after January 1, 2021. The HCTC was originally authorized by the Trade Act of 2002 ( P.L. 107-210 ). The credit has been extended and modified several times. Extensions or modifications have been made in trade adjustment assistance legislation as well as tax extenders legislation. The Trade Preferences Extension Act of 2015 ( P.L. 114-27 ) extended the HCTC through December 31, 2019, and also made changes to address the interaction between the HCTC and the premium tax credit established under the Patient Protection and Affordable Care Act ( P.L. 111-148 , as amended). The credit was extended through December 31, 2020, in the Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). Individuals are allowed to deduct unreimbursed medical expenses above a specific income threshold if they itemize their deductions. Prior to 2013, these deductions were allowed only for amounts in excess of 7.5% of income. Expenses reimbursed by an employer or insurance company are not eligible for deduction. The Patient Protection and Affordable Care Act ( P.L. 111-148 , as amended) increased the floor for individuals claiming the itemized deduction for medical expenses from 7.5% to 10% of adjusted gross income (AGI). The higher floor went into effect for taxpayers under age 65 beginning for the 2013 tax year. Individuals 65 or older, however, were still able to claim the deduction under the lower, 7.5% floor for tax years 2013 through 2016. The 2017 tax revision ( P.L. 115-97 ) temporarily allowed all taxpayers (not just those aged 65 or older) to claim the deduction subject to the 7.5% floor for the 2017-2018 tax years. The Taxpayer Certainty and Disaster Tax Relief Act of 2019, enacted as Division Q of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), extends the 7.5% floor for all taxpayers through 2020. After 2020, under current law, the floor is scheduled to increase to 10% of AGI for all taxpayers. A complicated set of rules governs the expenses eligible for the deduction. Generally speaking, these expenses include amounts paid by the taxpayer on behalf of himself or herself, his or her spouse, and eligible dependents for the following purposes: (1) health insurance premiums (including employee payments for employer-sponsored health plans, Medicare Part B premiums, and other self-paid premiums); (2) diagnosis, treatment, mitigation, or prevention of disease, or for the purpose of affecting any structure or function of the body, including dental care; (3) prescription drugs and insulin (but not over-the-counter medicines); (4) transportation primarily for and essential to medical care; and (5) lodging away from home primarily for and essential to medical care, up to $50 per night for each individual. The current lower floor is for all taxpayers, and future extensions, if any, could make the lower floor general, or limit it to taxpayers 65 and over. Based on a 2011 special study of deductions by age, 58% of dollars deducted were by those 65 and over, who made up 39% of taxpayers claiming the deduction. Taxpayers of all ages may be less likely to claim the medical expense deduction compared to prior periods because, as mentioned previously, other provisions of the 2017 tax revision, including a higher standard deduction (in part as a trade-off for elimination of personal exemptions) and a cap on the deduction of state and local taxes, reduced the expected number of itemizers (projected to fall from about one-third of taxpayers to 11%). These provisions are slated to expire after 2025, but are in place for the next few years. The likelihood of itemizing generally increases with income. However, the AGI floor for the medical expenses deduction reduces the likelihood that very high-income individuals would claim the deduction. For all taxpayers, medical expenses alone might not make it worthwhile to itemize unless they can also claim other itemized deductions (e.g., home mortgage interest or state and local taxes). The Mortgage Forgiveness Debt Relief Act of 2007 ( P.L. 110-142 ) provided an exclusion from gross income of certain benefits for members of qualified voluntary emergency response organizations. These payments include the forgiveness or rebate of state and local income and property taxes or payments by states or their political subdivisions to reimburse for expenses. The exclusion was limited to $30 a month. The provision disallowed any itemized deductions for the state and local taxes otherwise excluded. This provision was enacted after a 2002 IRS decision that a reduction in property taxes for volunteers who are emergency responders was includible in gross income. The provision was temporary, effective from the date of enactment (December 20, 2007) through 2010. The provision was allowed to expire as scheduled. The SECURE Act of 2019, enacted as Division O of the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), reinstated the provision for 2020 and increased the amount to $50 a month. The reinstated provision is likely to have a wider scope than it previously did because of the reduction in the number of itemizers due to provisions of the 2017 tax act ( P.L. 115-97 ), which is expected to reduce the share of itemizers, previously about one-third of taxpayers, to an estimated 11%.", "summary": "Six temporary individual income tax provisions were extended or reinstated by the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). In the past, Congress has regularly acted to extend expired or expiring temporary tax provisions. These provisions are often referred to as \"tax extenders.\" Of the six provisions that were extended through 2020, three had expired in 2017 and were extended retroactively. They are the tax exclusion for canceled mortgage debt, the mortgage insurance premium deduction, and the above-the-line deduction for qualified tuition and related expenses. Two of the tax provisions extended through 2020 are health related. The first of these provisions was scheduled to expire at the end of 2019. The second had expired at the end of 2018, and thus was extended retroactively. They are the health coverage tax credit, and the 7.5% floor for the medical expense deduction. A sixth provision, the exclusion from gross income for volunteer firefighters and emergency responders, which had expired in 2010, was reinstated and expanded for one year, through 2020. This report provides background information on individual income tax provisions that will expire in 2020. For other reports related to extenders, see CRS Report R45347, Tax Provisions That Expired in 2017 (\"Tax Extenders\") , by Molly F. Sherlock; CRS Report R44990, Energy Tax Provisions That Expired in 2017 (\"Tax Extenders\") , by Molly F. Sherlock, Donald J. Marples, and Margot L. Crandall-Hollick; and CRS Report R46271, Business Tax Provisions Expiring in 2020, 2021, and 2022 (\"Tax Extenders\") , coordinated by Molly F. Sherlock.", "document_type": "crs"}
{"report": "W hen Congress enacted the Patient Protection and Affordable Care Act (ACA) in 2010, it required employment-based health plans and health insurance issuers to cover certain preventive health services without cost sharing. Those services, because of agency guidelines and rules, would soon include contraception for women. The federal contraceptive coverage requirementâsometimes called the \"contraceptive mandate\" âhas generated significant public policy and legal debates. Proponents of the requirement have stressed a need to make contraception more widely accessible and affordable to promote women's health and equality. Opponents have centrally raised religious freedomâbased objections to paying for or otherwise having a role in the provision of coverage for some or all forms of contraception. The Supreme Court first took up a challenge to the contraceptive coverage requirement in 2014 in Burwell v. Hobby Lobby Stores, Inc. In Hobby Lobby , the Court held that the requirement did not properly accommodate the religious objections of closely held corporations. After Hobby Lobby , legal challenges to the contraceptive coverage requirement continued. The lower federal courts divided over the legality of an accommodation process instituted in 2013 that shifted the responsibility to provide coverage from an objecting employer to its insurer once the employer certified its religious objections. In 2017, citing the uncertain legal footing of that accommodation, the Trump Administration decided to automatically exempt most nongovernmental entities from the coverage requirement based on their religious or moral objections. However, more than 15 states filed or joined lawsuits challenging the expanded exemptions. Federal courts, including the U.S. Court of Appeals for the Third Circuit, have preliminarily enjoined the government from implementing the expanded exemptions while those challenges proceed. The Supreme Court has agreed to review the Third Circuit's decision. The case, Little Sisters of the Poor v. Pennsylvania , is scheduled for argument in May, paving the way for a decision in summer 2020. Meanwhile, the government is largely precluded from relying on the prior accommodation process as a result of a federal district court's injunction. This report begins by explaining the statutory and regulatory framework for the federal contraceptive coverage requirement. It then recaps the Supreme Court's decision in Hobby Lobby before discussing the agency actions taken in response to that decision and subsequent Supreme Court rulings and executive action. Next, the report discusses significant pending legal challenges to the coverage exemptions and accommodations, including the Supreme Court case, Little Sisters of the Poor . The report concludes with some considerations for Congress, including the broader legal questions that could be answered in Little Sisters of the Poor and options that federal lawmakers have proposed related to the contraceptive coverage requirement. The federal contraceptive coverage requirement stems from the Patient Protection and Affordable Care Act but was developed and modified by subsequent agency guidelines and rules. Before the ACA, various federal and state requirements dictated whether a health plan needed to cover contraceptive services. Although more than half of the states required plans covering prescription drugs to include contraception, access was typically subject to cost-sharing requirements. The scope of religious exemptions from these state requirements varied. Moreover, each state's law extended \"only to insurance plans that [were] sold to employers and individuals in [that] state.\" It did not apply to self-insured employer-sponsored health plans (also known as self-funded plans) in which nearly 60% of covered workers were enrolled. Self-insured plans are governed by the Employee Retirement Income Security Act of 1974 (ERISA), a federal law that generally did not require coverage for specific preventive services before the ACA. Nevertheless, whether as a matter of law or industry practice, \"most private insurance and federally funded insurance programs\" offered some form of insurance coverage for contraception before the federal contraceptive coverage requirement. With the enactment of the ACA, Congress required certain employment-based health plans and health insurance issuers (insurers) to cover various preventive health services without cost sharing. One ACA provision specifically requires coverage \"with respect to women\" for \"preventive care and screenings . . . as provided for in comprehensive guidelines supported by the Health Resources and Services Administration [(HRSA)]\" within the U.S. Department of Health and Human Services (HHS). To implement this requirement, HHS commissioned a study by the Institute of Medicine (IOM) \"to review what preventive services are necessary for women's health and well-being.\" In its final report, the IOM recommended that HRSA consider including the \"full range of Food and Drug Administration [(FDA)]-approved contraceptive methods, sterilization procedures, and patient education and counseling for women with reproductive capacity.\" Among other reasons, IOM concluded that \"[s]ystematic evidence reviews and other peer-reviewed studies provide evidence that contraception and contraceptive counseling are effective at reducing unintended pregnancies,\" which HHS had identified as a specific national health goal. HRSA adopted the IOM's recommendation, including in HRSA's 2011 Women's Preventive Services Guidelines (HRSA guidelines) \"all\" FDA-approved contraception \"as prescribed.\" The HRSA guidelines applied to plan years beginning on or after AugustÂ 1, 2012. However, they exempted certain \"religious employers\"âhouses of worship and certain related entities that primarily employed and served persons who shared their religious tenets. In 2012, HHS announced a temporary \"safe harbor\" from government enforcement of the coverage requirement for certain nonexempt, nonprofit organizations with religious objections to covering some or all forms of contraception. Subsequent rules called such nonprofits \"eligible organizations.\" On July 2, 2013, following a notice and comment period, HHS, the Department of Labor (DOL), and the Department of the Treasury (the Departments) jointly issued a final rule (2013 Rule) to \"simplify and clarify the religious employer exemption\" and \"establish accommodations\" for eligible organizations. The rule continued to authorize HRSA to provide an automatic exemption to the coverage requirement for houses of worship. However, it no longer required those employers to have \"the inculcation of religious values\" as their purpose or to \"primarily\" employ and serve \"persons who share [their] religious tenets\" to qualify for the exemption. The 2013 Rule also established an accommodation process for \"eligible organizations\" âessentially, nonprofit, religious organizations with religious objections to some or all forms of contraception. The accommodation also extended to student health plans arranged by eligible institutions of higher education. Eligible organizations could comply with the contraceptive coverage requirement by completing a self-certification form provided by HHS and DOL and sending copies of this form to their insurers or third-party administrators (TPAs), as applicable. For insured plans, the rule required the issuers, upon receipt of a certification, to \"[e]xpressly exclude contraceptive coverage\" (or the subset of objected-to methods) from the applicable plans but separately pay for any required, excluded contraceptive services for the enrolled individuals and their beneficiaries. For self-insured plans, the rule stated that the TPA, upon receipt of a certification, would become the \"plan administrator\" for contraceptive benefits under ERISA and responsible for providing contraceptive coverage. In addition, the certification provided to the TPA would become \"an instrument under which the plan is operated.\" The rule required the insurer or TPA, rather than the objecting organization, to notify plan participants that separate payments would be made for contraception and that the organization would not be administering or funding such coverage. Numerous organizations filed lawsuits challenging the contraceptive coverage requirement and the accommodation process. Among other claims, these plaintiffs argued that the requirement violated the Religious Freedom Restoration Act of 1993 (RFRA). RFRA is a federal statute enacted in response to Employment Division v. Smith , a 1990 Supreme Court decision holding that the Free Exercise Clause of the First Amendment does not require the government to exempt religious objectors from generally applicable laws. Except under narrow circumstances, RFRA prohibits the federal government from \"substantially burden[ing] a person's exercise of religion even if the burden results from a rule of general applicability.\" RFRA allows such a burden only if the government shows that applying the burden to the person (1) furthers \"a compelling governmental interest\"; and (2) \"is the least restrictive means\" of furthering that interest. This \"strict scrutiny\" standard, particularly the \"least restrictive means\" requirement, is \"exceptionally demanding.\" Thus, in challenges by religious objectors to the application of generally applicable laws, RFRA extends \"far beyond\" what the \"Court has held is constitutionally required.\" The initial challenges to the contraceptive coverage requirement centered on two emerging issues: (1)Â whether for-profit corporations were \"persons\" protected by RFRA; and (2)Â whether requiring employers to cover contraception to which they objected on religious grounds violated RFRA. The Supreme Court took up both issues as they related to closely held corporations in Burwell v. Hobby Lobby Stores, Inc . , issuing a decision on June 30, 2014. The challengers in Hobby Lobby , which included the owners of the \"nationwide chain\" of arts-and-crafts stores of the same name, objected to providing health insurance coverage for four of the 20 FDA-approved methods of contraception included in the coverage requirement. In their view, \"life begins at conception\" and \"facilitat[ing] access\" to methods of contraception that \"may operate after the fertilization of an egg\" would violate their religious beliefs. The challengers argued that requiring them to provide insurance coverage for such contraception violated RFRA. The Supreme Court held that Hobby Lobby, though a corporation, was a \"person\" covered by RFRA. Although RFRA itself did not define \"person,\" the first section of the U.S. Code , commonly known as the Dictionary Act, defined the term to include \"corporations\" for the purpose of \"determining the meaning of any Act of Congress, unless the context indicates otherwise.\" The Court reasoned that \"nothing in RFRA\" suggested a meaning other than the Dictionary Act definition. Specifically, the majority rejected HHS's argument that for-profit corporations could not \"exercise\" religion, reasoning that they could do so through \"[b]usiness practices that are compelled or limited by the tenets of a religious doctrine.\" The Court then proceeded to analyze whether the contraceptive coverage requirement \"substantially burden[ed]\" the challengers' exercise of religion. The Court accepted their argument that providing coverage for certain forms of contraception would violate their sincerely held religious beliefs because it might enable or facilitate the \"destruction of an embryo.\" According to the majority, \"federal courts have no business addressing\" whether \"the religious belief asserted in a RFRA case is reasonable.\" The more limited judicial role, the Court said, is to determine whether the \"line drawn\" by the religious objectors \"reflects 'an honest conviction.'\" Because no party disputed the sincerity of the employers' convictions, the Court focused its inquiry on whether the burden imposed by the coverage requirement was substantial. The Court concluded that it was, because the requirement would force the challengers to either violate their religious beliefs or face \"severe\" economic consequences. The Court next considered whether the contraceptive coverage requirement nonetheless satisfied RFRA's strict scrutiny standard. The Court assumed, for purposes of its analysis, that applying the coverage requirement to petitioners served a \"compelling governmental interest\" in \"guaranteeing cost-free access to the four challenged contraceptive methods.\" However, the Court concluded that the least restrictive means standard was not satisfied because HHS had \"at its disposal\" the accommodation process it provided to nonprofit organizations with religious objections which, in the Court's view, did not \"impinge on\" the challengers' religious beliefs and \"serve[d] HHS's stated interests equally well.\" Accordingly, the Court held that applying the contraceptive coverage requirement to closely held corporations violated RFRA. On July 14, 2015, the Departments finalized a rule in response to the Hobby Lobby decision that extended the accommodation previously reserved for religious nonprofits to for-profit entities that are \"not publicly traded, [are] majority-owned by a relatively small number of individuals, and object[] to providing contraceptive coverage based on [their] owners' religious beliefs.\" When the Court handed down its decision in Hobby Lobby , a separate line of legal challenges to the contraceptive coverage requirement involving the accommodation process remained unresolved by the High Court. In one such case, a Christian college argued that the process, which required objecting entities to submit a certification form called EBSA Form 700 to their insurers or TPAs, itself burdened its exercise of religion in violation of RFRA and the First Amendment. The college believed that submitting the required form would \"make it morally complicit in the wrongful destruction of human life.\" As shown in Figure 1 , EBSA Form 700 had two pages: the first required the organization to certify compliance with the criteria for obtaining the accommodation and the second contained a notice to TPAs. After a federal district court denied the college's motion to preliminarily enjoin the enforcement of the contraceptive coverage requirement, the college sought emergency relief from the Supreme Court. On July 3, 2014, three days after deciding Hobby Lobby , the Supreme Court ruled that while the college's case was on appeal to the Seventh Circuit, the college did not need to comply with the contraceptive coverage requirement or complete EBSA Form 700 so long as it \"inform[ed] the Secretary of Health and Human Services in writing that it is a non-profit organization that holds itself out as religious and has religious objections to providing coverage for contraceptive services.\" On August 27, 2014, \"consistent with the Wheaton order,\" HHS issued an interim rule that provided eligible organizations an alternative to EBSA Form 700. Pursuant to this rule, organizations could opt to notify HHS, rather than their insurers or TPAs, of their eligibility for the exemption and their objections to providing coverage for some or all forms of FDA-approved contraception. This option (the \"alternative notice process\") required organizations to provide HHS with their insurers' or TPAs' names and contact information. After receiving the notice, those Departments would send a \"separate notification\" to each issuer or TPA, which, for self-insured plans, would designate the TPA as the plan administrator and constitute \"an instrument under which the plan is operated.\" The model notice that HHS issued with the interim rule appears in Figure 2 . After these changes in the law, the Seventh Circuit affirmed the district court's decision to deny the college a preliminary injunction. The appellate court reasoned that the college did not have to provide certain forms of contraception in its student benefit plans so long as it notified either its TPA or the government of its objection to providing that coverage. Although the government would designate the college's preexisting TPA to provide the required coverage, the court reasoned that the plan instrument became the \"government's plan\" rather than the college's plan. The court also rejected the college's argument that complying with the accommodation process would render it \"complicit\" in providing the contraception to which it objected. Writing for the court, Judge Richard Posner reasoned that \"it is the law , not any action on the part of the college,\" that requires the TPA to provide coverage once the college has registered its objection. Accordingly, the court concluded that the college was unlikely to prevail on its RFRA claim. The Seventh Circuit was not the only appellate court to uphold the accommodation process amid requests for injunctive relief. Appellate courts in eight circuits in total concluded (at least as a preliminary matter while litigation proceeded on the merits) that the process did not impose a substantial burden on the challengers' exercise of religion. They rejected the view that providing notice to insurers or TPAs, or to HHS, \"triggered\" the provision of contraception, making the plaintiffs partially responsible for an act that violated their beliefs. Like the Seventh Circuit, they reasoned that the ACA, not the transmission of EBSA Form 700 or the notice to HHS, was the reason the applicable plans provided coverage for contraception without cost sharing. Some appellate judges dissented from their panel's decision or a denial of rehearing by the full circuit court, including nowâSupreme Court Justices Neil Gorsuch and Brett Kavanaugh. The Eighth Circuit was the first appellate court to hold that the accommodation process violated RFRA. In that case, the district court had preliminarily enjoined the government from enforcing the contraceptive coverage requirement against two nonprofit employers that offered self-insured plans. The Eighth Circuit read Hobby Lobby to require it to \"accept [the plaintiffs'] assertion that self-certification under the accommodation processâusing either [EBSA] Form 700 or HHS Noticeâwould violate their sincerely held religious beliefs.\" And it reasoned that providing the notice resulted in the provision of contraceptive coverage even if the plaintiffs did not have to arrange for or subsidize that coverage. The court then concluded that the process was not the least-restrictive means of serving the government's interest in providing women with access to cost-free contraception. In particular, it observed that the government could require objecting organizations to notify HHS of their objections without providing \"the detailed information and updates\" required under the alternative notice process. The court also found that the government failed to demonstrate why it could not reimburse employees for their purchase of contraceptives directly or pursue other ways to make contraception more widely available. After the Eighth Circuit rendered its decision but before the government sought the Supreme Court's review, the Supreme Court consolidated and granted certiorari in seven other cases involving RFRA challenges to the accommodation process under the caption Zubik v. Burwell . However, on MayÂ 16, 2016, the Supreme Court vacated the Zubik decisions and remanded the cases to the circuit courts in light of the \"significantly clarified view of the parties.\" The Court explained that in response to its request for additional briefing after oral argument, the government confirmed that \"contraceptive coverage could be provided to petitioners' employees, through petitioners' insurance companies\" without requiring the petitioners to notify their insurers or HHS in the manner previously required. The petitioners, in turn, confirmed that an insurer's independent provision of contraceptive coverage to the petitioners' employees would not burden the petitioners' religious exercise. The Court instructed the appellate courts on remand to afford the parties \"an opportunity to arrive at an approach going forward that accommodates petitioners' religious exercise while at the same time ensuring that women covered by petitioners' health plans 'receive full and equal health coverage, including contraceptive coverage.'\" It also enjoined the government from taxing or penalizing the petitioners based on a failure to provide notice, reasoning that the petitioners apprised the government of their religious objections through the litigation itself. The Court expressly declined to opine on whether the existing accommodation process substantially burdened the petitioners' religious exercise or nonetheless complied with RFRA's strict scrutiny standard. Following the Supreme Court's remand, the executive branch took additional actions on the contraceptive coverage requirement. The Departments solicited and reviewed public comments on options to further revise the process. However, as of January 9, 2017, the Departments had not identified a \"feasible approach . . . [to] resolve the concerns of religious objectors, while still ensuring that the affected women receive full and equal health coverage, including contraceptive coverage.\" At that time, the Departments maintained that the existing accommodation process was \"consistent with RFRA.\" Following a change in presidential administrations, on May 4, 2017, President Donald J. Trump issued an executive order directing the Departments to \"consider issuing amended regulations, consistent with applicable law, to address conscience-based objections to the preventive-care mandate promulgated under [42 U.S.C. Â§] 300gg-13(a)(4)\"âthe ACA provision that refers specifically to preventive care for women and pursuant to which HRSA included contraceptive coverage. On October 6, 2017, the Departments reversed their position on the legality of the accommodation process and issued two interim final rules (IFRs) that made that process \"optional.\" The first rule (the Religious Exemption IFR) expanded the automatic exemption formerly available only to houses of worship and related entities to include any nongovernmental organization that objected to providing or arranging coverage for some or all contraceptives based on \"sincerely held religious beliefs.\" The second rule (the Moral Exemption IFR) extended the same exemption to certain nongovernmental organizations whose objections were based on \"sincerely held moral convictions,\" rather than religious beliefs. Pursuant to these rules, \"an eligible organization [that] pursue[d] the optional accommodation process through the EBSA Form 700 or other specified notice to HHS\" would \"voluntarily shift[] an obligation to provide separate but seamless contraceptive coverage to its issuer or [TPA].\" However, if an employer or institution chose to rely on the automatic exemption rather than the accommodation process, neither the objecting entity nor its insurer or TPA would need to provide coverage for the objected-to contraceptive methods. The Departments also added an \"individual exemption\" that allowed willing employers and issuers, both governmental and nongovernmental, to provide alternative policies or contracts that did not offer contraceptive coverage to individual enrollees who objected to such coverage based on sincerely held religious beliefs or moral convictions. The Departments estimated that the Religious Exemption IFR \"would affect the contraceptive costs of approximately 31,700 women\" based on information derived from the litigating positions of various objecting entities and notices the agency received pursuant to the previous accommodation process. They further estimated that the total costs potentially transferred to those affected women would amount to \"approximately $18.5 million.\" However, to \"account for uncertainty\" in its estimate, the agencies also examined the \"possible upper bound economic impact\" of the Religious Exemption IFR. Applying a different methodology, the Departments arrived at a figure of approximately 120,000 women, with potential transfer costs totaling $63.8 million. The Departments projected a smaller effect with respect to the Moral Exemption IFR, estimating that it could affect the contraceptive costs of 15 women, an aggregate effect of approximately $8,760. The Departments finalized the Religious and Moral Exemption IFRs on November 15, 2018, with effective dates of January 14, 2019 (collectively, the 2019 Final Rules). The 2019 Final Rules amended the regulatory text \"to clarify the intended scope of the language\" but retained the substance of the IFRs. The Departments increased their upper-bound estimate of the number of women that the expanded Religious Exemption could affect from 120,000 women to 126,400 women, yielding potential transfer costs of $67.3 million. The expanded exemptions generated a new set of legal challenges from states concerned with the fiscal burdens of the revised rules and the Departments' authority to promulgate them. In addition, some private parties (including a nationwide class of employers) successfully obtained injunctions against enforcement of the prior accommodation process after the government stopped defending the process on RFRA grounds. This section discusses some of the key pending legal challenges, beginning with a summary of the procedural history and arguments before the Supreme Court in Little Sisters of the Poor v. Pennsylvania . In late 2018, Pennsylvania and New Jersey asked a federal court to block the 2019 Final Rules, alleging, among other claims, that the rules (1)Â \"failed to comply with the notice-and-comment procedures\" required by the Administrative Procedure Act (APA) and (2) were \"'arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law' in violation of the [APA's] substantive provisions.\" The U.S. District Court for the Eastern District of Pennsylvania ruled that the states were \"likely to succeed\" on both of their APA claims and preliminarily enjoined the rules on a nationwide basis. On appeal, the Third Circuit affirmed the district court's decision. The appellate court ruled that the Departments committed a procedural APA violation in issuing the IFRs by \"dispensing with\" the statute's notice and comment requirement without \"good cause.\" In the court's view, the Departments' solicitation of comments before issuing the Final Rules did not remedy this defect because the agency's action did not give the public a \"meaningful opportunity\" to comment on the rules during their formulation, or demonstrate that the agency showed \"any real open-mindedness\" to amending the IFRs. The court next considered whether the 2019 Final Rules were \"arbitrary, capricious, an abuse of discretion, or otherwise not in accordance with law\"âgrounds for a reviewing court to \"set aside\" the rules under the APA. The Third Circuit concluded that the ACA did not authorize the Departments to \"exempt actors\" from the preventive services requirement. Reciting the statutory language, the court observed that group health plans and insurers \"shall\" cover \"such additional preventive care . . . as provided for in comprehensive guidelines supported by [HRSA].\" The appellate court reasoned that the \"authority to issue 'comprehensive guidelines' concerns the type of services that are to be provided and does not provide authority to undermine Congress's directive\"âexpressed with the command shall â\"concerning who must provide coverage for these services.\" The Third Circuit also disagreed with the Departments' argument that the expanded Religious Exemption in the 2019 Final Rules was necessary to bring the contraceptive coverage requirement into compliance with RFRA. Recognizing that RFRA authorized courts to determine, through \"individualized adjudication,\" whether a particular law burdens a person's religious exercise, the court concluded that it need not defer to the Departments' assessment of the necessity of a broader religious exemption. Additionally, the court concluded that RFRA could not have required the expanded exemption because the prior accommodation process itself complied with RFRA. And the Third Circuit reasoned that making compliance with the accommodation process optional for religious objectors \"would impose an undue burden on nonbeneficiariesâthe female employees who will lose coverage for contraceptive care.\" Finally, the circuit court upheld the district court's decision to issue a nationwide preliminary injunction. The court reasoned that the injunction would ensure that the \"likely\" unlawful 2019 Final Rules would not take effect in some states only to be invalidated in full after further judicial proceedings. The court also concluded that a nationwide remedy was \"necessary to provide the States complete relief,\" because individuals may reside or attend college in Pennsylvania or New Jersey but obtain their health insurance from an employer-sponsored or a parent's plan in a state that was not part of the lawsuit. If those individuals lost contraceptive coverage on an out-of-state plan, they might turn to state-sponsored services in Pennsylvania or New Jersey, placing fiscal burdens on those states. Two parties filed petitions for certiorari with the Supreme Court seeking to appeal the Third Circuit's ruling: the federal government and the Little Sisters of the Poor Saints Peter and Paul Home (Little Sisters), a religious nonprofit organization that was permitted to intervene in the litigation in defense of the interim final rules, but later denied standing to challenge the 2019 Final Rules on appeal. On JanuaryÂ 17, 2020, the Supreme Court granted both petitions and consolidated the appeals. Over 50 amicus briefs have been filed by organizations, individuals, states, and localities. Some Members of Congress have also filed briefs in opposition to or support of the Third Circuit's ruling. While the case raises a number of legal issues, the central question presented in Little Sisters of the Poor is whether the Departments \"had statutory authority under the ACA and [RFRA] to expand the conscience exemption\" to the contraceptive coverage requirement through the 2019 Final Rules. The federal government advances three main arguments in defense of its substantive authority to issue the rules. First, the government argues that HRSA has \"ample authority to develop guidelines\" for women's preventive services \"that account for sincere conscience-based objections\" because, among other reasons, ACA's \"plain text\" requires coverage \"' as provided for in comprehensive guidelines supported by [HRSA].'\" Second, the government contends that RFRA required it to extend automatic exemptions to \"certain employers with conscientious objections\" because the prior accommodation process, which may have sufficed for Hobby Lobby, did \"not eliminate the substantial burden\" that the coverage requirement placed on those employers. Third, the government argues that RFRA authorizes, even if it does not require, the expanded Religious Exemption because it applies to \"the implementation\" of \"all Federal law.\" In support of its interests, Little Sisters argues that in light of the \"substantial burden\" mandatory contraceptive coverage places on religious exercise recognized in Hobby Lobby , the government was \"duty-bound to change its rules and stop forcing religious objectors to comply via the accommodation.\" Little Sisters described the certification process as \"the stingiest of accommodations\" that amounted to \"merely another means of complying with the contraceptive mandate.\" The state-respondents ask the Supreme Court to affirm the Third Circuit's ruling. They frame the case as more than a dispute over \"the appropriate balance between the health and autonomy of women and the religious and moral views of their employers,\" because it concerns \"the power of federal agencies to resolve such questions by relying on power never explicitly granted by Congress nor recognized by the courts.\" The states argue, inter alia , that Congress, through the ACA, \"delegated HRSA authority to oversee guidelines defining what preventive services for women must be covered, not who must cover them.\" In the states' view, \"RFRA does not grant federal agencies broad rulemaking authority to create exemptions from mandatory laws absent a violation,\" which was not present under the prior regulatory framework because \"the accommodation 'effectively exempt[s]' an employer.\" And they remind the Court that \"[n]o party claims that RFRA authorizes the moral rule\" and its exemption. Pennsylvania and New Jersey were not the only states to challenge the expanded exemptions. A lawsuit by the Commonwealth of Massachusetts to block the enforcement of the interim rulesâand later the final rulesâwas initially barred on standing grounds. But on May 2, 2019, the First Circuit reversed the district court's ruling, holding that Massachusetts had shown an \"imminent\" fiscal harm \"fairly traceable\" to the expanded exemptions, sufficient to confer standing. The appellate court remanded the case to the district court to consider the Commonwealth's substantive arguments that the 2019 Final Rules violated the APA, the First Amendment's Establishment Clause, and the \"equal protection guarantee\" of the Fifth Amendment's Due Process Clause. The parties' motions for summary judgmentâasking the court for a ruling on the legal issues prior to (and ultimately instead of) a trialâwere pending before the district court when the parties and the court agreed to stay the proceedings in light of a potential Supreme Court ruling in Little Sisters of the Poor . An action in the U.S. District Court for the Northern District of California proceeded alongside the Pennsylvania and Massachusetts cases. In 2018, 14 states moved to enjoin enforcement preliminarily of the 2019 Final Rules. A subset of these states had already obtained a nationwide injunction against enforcement of the IFRs, which the Ninth Circuit then modified to apply only in the states that were plaintiffs in the action. In renewing their challenge to the 2019 Final Rules, the states advanced APA, Establishment Clause, and Equal Protection Clause claims similar to the Massachusetts action. As with its first ruling on the IFRs, the district court decided the motion for injunctive relief on statutory grounds. The court concluded that the final rules likely violated the APA because they were \"not in accordance with\" the ACA and were not required, and potentially not even authorized, by RFRA. Rather than issue a nationwide injunction, this time the court issued a preliminary injunction against enforcement in the plaintiff states alone. On appeal, the Ninth Circuit ruled that \"the district court did not err in concluding that the agencies likely lacked statutory authority under the ACA to issue the final rules,\" engaging in a textual analysis similar to the Third Circuit's in the Pennsylvania action. The appellate court also shared the district court's reservations that RFRA did not permit, let alone require, the Religious Exemption, citing three reasons. First, RFRA does not explicitly \"delegate[] to any government agency the authority to determine violations and to issue rules addressing alleged violations.\" Second, the Religious Exemption \"contradicts congressional intent that all women have access to appropriate preventative care.\" And third, a \"blanket exemption for self-certifying religious objectors\" was \"at odds with the careful, individualized, and searching review mandate[d] by RFRA.\" While the Ninth Circuit affirmed the district court's decision, it emphasized that its \"disposition [was] only preliminary,\" preserving \"the status quo until the district court renders judgment on the merits based on a fully developed record.\" While the Pennsylvania and California actions resulted in preliminary injunctions against the 2019 Final Rules, the Departments are also enjoined from enforcing the prior accommodation process in key respects as a result of a nationwide injunction issued by the U.S. District Court for the Northern District of Texas. In DeOtte v. Azar , the court certified two classes of objectors to the contraceptive coverage requirements. The \"Employer Class\" consisted of the following: Every current and future employer in the United States that objects, based on its sincerely held religious beliefs, to establishing, maintaining, providing, offering, or arranging for: (i)Â coverage or payments for some or all contraceptive services; or (ii) a plan, issuer, or third-party administrator that provides or arranges for such coverage or payments. The \"Individual Class\" consisted of the following: All current and future individuals in the United States who: (1) object to coverage or payments for some or all contraceptive services based on sincerely held religious beliefs; and (2) would be willing to purchase or obtain health insurance that excludes coverage or payments for some or all contraceptive services from a health insurance issuer, or from a plan sponsor of a group plan, who is willing to offer a separate benefit package option, or a separate policy, certificate, or contract of insurance that excludes coverage or payments for some or all contraceptive services. The court granted these classes summary judgment on their RFRA claims. Similar to the Eighth Circuit's pre- Zubik reasoning, the district court concluded with respect to the Employer Class that the court could not question the lead plaintiff's position \"that the act of executing the accommodation forms is itself immoral.\" As for the Individual Class, the court accepted the plaintiffs' argument that purchasing plans that cover certain forms of contraception substantially burdens their religious exercise because it makes them \"complicit\" in the provision of contraception to which they object. Having found that the requirement imposed a substantial burden on these groups, the court then concluded that the requirement was insufficiently tailored. It reasoned that \"[i]f the Government has a compelling interest in ensuring access to free contraception, it has ample options at its disposal that do not involve conscripting religious employers\" or requiring the participation of objecting employees. The district court permanently enjoined the government from enforcing the contraceptive coverage requirement against any member of the Employer Class to the extent of its objection. It further enjoined the government from preventing a \"willing\" employer or insurer from offering Individual Class members plans that do not include contraceptive coverage. In its final order specifying the terms of its nationwide, permanent injunction, the court included a \"safe harbor\" allowing the Departments to (1)Â ask employers or individuals whether they are sincere religious objectors; (2)Â enforce the contraceptive coverage requirement with respect to employers or individuals who \"admit\" they are not sincere religious objectors; and (3)Â seek a declaration from the court that an employer or individual falls outside the certified classes if the government \"reasonably and in good faith doubt[s] the sincerity of that employer or individual's asserted religious objections.\" Before entering final judgment, the district court denied the State of Nevada's motion to intervene (supported by 22 additional states) in the litigation. Nevada appealed that denial and the court's injunction to the Fifth Circuit, which has stayed the appeal pending a decision in Little Sisters of the Poor . Although the contraceptive coverage requirement remains in effect, the injunctions discussed above leave its implementation and enforcement in an uncertain posture. In combination, these rulings affect the regulatory frameworks that existed both before and after the promulgation of the expanded exemptions. The injunctions entered in the Pennsylvania and California actions do not bar entities that qualified for an exemption or an accommodation before the Religious or Moral Exemption IFRs from availing themselves of those options. Accordingly, it appears that (1)Â qualifying institutions (e.g., houses of worship) can still invoke the exemption for religious employers; and (2)Â \"eligible organizations\"âincluding closely held corporations as defined in the 2015 ruleâcan still use the accommodation process. However, as a result of the injunctions entered in DeOtte and other cases concerning the accommodation, the government is more limited in its ability to enforce the requirement against entities that choose not to notify their insurers or HHS of their objections. For example, regardless of an entity's compliance with the accommodation process, the government may not enforce the requirement against employers that object to providing or arranging for contraceptive coverage based on sincerely held religious beliefs, at least to the extent of those employers' objections. And the government may not prevent employers or insurers from offering plans without contraceptive coverage to individuals who oppose that coverage based on sincere religious beliefs. A Supreme Court decision in Little Sisters of the Poor could clarify the validity of the 2019 Final Rules and the scope of the exemptions going forward. A ruling affirming the nationwide injunction or remanding with instructions to issue a narrower preliminary injunction would likely result in invalidation of the 2019 Final Rules in at least some states, which could prompt the Department to issue new regulations or guidance. In contrast, a ruling reversing the Third Circuit's decision and holding that the 2019 Final Rules do not violate the APA could pave the way for the expanded exemptions to take effect, leaving the question of further amendments to the federal contraceptive coverage requirement to the Departments and to Congress. The litigation from Hobby Lobby to Little Sisters of the Poor reflects an ongoing public policy debate over the extent to which the government should accommodate entities with religious or moral objections to contraception, particularly when those accommodations may compromise their employees' or students' access to the full range of contraceptive services covered for other women. As a legal matter, a Little Sisters of the Poor decision could help to clarify whether RFRA allows or requires federal agencies to exempt entities from generally applicable laws that the agencies conclude will burden the religious exercise of those groups. The decision could also clarify whether, in making this determination, agencies may or must account for the interests of third parties, such as the women who otherwise would receive contraceptive coverage under the ACA. Other issues, such as the Departments' authority to exempt objecting universities or employers fromâin the words of one courtâ\"existing and future \" contraceptive coverage requirements through private settlement agreements, allegedly without the involvement of students or employees, may be the next phase of litigation. Amicus briefs filed by some Members of Congress in Little Sisters of the Poor highlight differing views of what RFRA requires of federal agencies. In a brief filed by 161 Members of Congress, the amici argue that RFRA \"is far more than a backward-facing statute enacted to address prior wrongs,\" setting \"forth an affirmative mandate that, when carrying out official duties, each member of the federal government (including federal administrative agencies) ' shall not substantially burden a person's exercise of religion,' absent a compelling interest and use of the least restrictive means.\" In contrast, a group of 186 Members of Congress argue that \"RFRA did not, and was not intended to, grant authority to federal agencies to craft exemptions to laws enacted by Congressâand thereby to negate Congress's own legislative intent.\" That brief further maintains that RFRA was not \"intended to allow some individuals' religious liberties (or agencies' own perceptions about those religious liberties) to be used as a sword to limit the rights of others.\" Because Little Sisters of the Poor involves a statutory rather than a constitutional challenge to the 2019 Final Rules, the Court's ruling is unlikely to preclude Congress from amending the coverage requirement, its exemptions, or RFRA itself, if Congress disagrees with the Court's decision. Individual Members of Congress have proposed a number of approaches over the years that would recalibrate the legal framework for contraceptive coverage, including those that would have the government take a more active role in facilitating access to contraception and others that would attempt to clarify the responsibilities of the government in accommodating those with genuine religious objections to a coverage requirement. Some lawmakers have proposed amendments to the ACA's preventive services coverage requirements \"with respect to women\" to explicitly require coverage of contraception. For example, a bill introduced in the last Congress would have amended the preventive services requirement in subsection (a)(4) to include \"contraceptive care,\" including \"the full range of [FDA-approved] female-controlled contraceptive methods\" and \"instruction in fertility awareness-based methods . . . for women desiring an alternative method.\" Other proposals, including a bill introduced in the 116th Congress, would direct the Departments to include certain forms of contraception at the regulatory level. In general, legislation specifying that contraception is among the required preventive health services may help tip the scales on the government interest prong of the RFRA analysis toward a compelling interest in providing cost-free coverage for contraception through employer-sponsored health plans. In Hobby Lobby , the Supreme Court assumed that the government had a compelling interest in \"guaranteeing cost-free access\" to the objected-to contraceptive methods. However, the majority noted that \"there are features of ACA that support\" the opposing view, in particular, the inapplicability of the requirement to grandfathered plans. The Departments went a step further in the 2019 Final Rules, suggesting that the government did not have a compelling interest in contraceptive coverage because Congress left the decision of whether to include it to the agencies. Codifying the requirement may respond to arguments of this nature. However, proposals to expand contraceptive coverage, standing alone, could still be susceptible to challenge by religious objectors who might still assert that laws mandating coverageâeven if they include some exemptionsâimpose a substantial burden on their religious exercise and are not narrowly tailored under RFRA. RFRA applies by default to all federal statutes adopted after its enactment (November 16, 1993) \"unless such law explicitly excludes such application by reference to this Act.\" Some legislation concerning contraception includes language excepting those provisions from RFRA or excluding RFRA claims. A pair of bills introduced in the wake of Hobby Lobby would have prohibited an \"employer that establishes or maintains a group health plan for its employees\" from \"deny[ing] coverage of a specific health care item or service . . . where the coverage of such item or service is required under any provision of Federal law or the regulations promulgated thereunder,\" notwithstanding RFRA. Lawmakers have also proposed amendments to RFRA itself. Similar bills introduced in both chambers this Congress would provide that RFRA's strict scrutiny standard does not apply to certain types of laws, including \"any provision of law or its implementation that provides for or requires . . . access to, . . . referrals for, provision of, or coverage for, any health care item or service.\" Laws that make RFRA inapplicable to the contraceptive coverage requirement would not foreclose challenges based on the Free Exercise Clause. However, as previously noted, Free Exercise claims are potentially subject to a less stringent standard of review than RFRA-based objections because of the Supreme Court's holding in Employment Division v. Smith that the Free Exercise Clause typically does not require the government to provide religious-based exemptions to generally applicable laws. Other approaches to contraceptive coverage have focused on accommodating the interests of religious objectors. Some courts and objecting employers have suggested that Congress could avoid or minimize burdens on religious objectors by funding separate contraceptive coverage or expanding access to programs that provide free contraception instead of requiring employers to provide this coverage. Along these lines, the Departments separately issued a rule authorizing the directors of federally funded family planning projects to extend contraceptive services to some women whose employers do not provide coverage for such services because of a religious or moral exemption. While the efficacy of such proposals in maintaining or increasing access to contraception is beyond the scope of this report, alternatives that do not involve requiring private parties to provide contraceptive coverage or otherwise take an action that results in the provision of coverage by a third party could reduce the potential for both RFRA and Free Exercise challenges. Other proposals seek to codify exemptions to the contraceptive coverage requirement for entities with religious or moral objections. For example, the Religious Liberty Protection Act of 2014 would have prohibited HHS from \"implement[ing] or enforc[ing]\" any rule that \"relates to requiring any individual or entity to provide coverage of sterilization or contraceptive services to which the individual or entity is opposed on the basis of religious belief.\" That bill also would have included a \"special rule\" in the ACA stating that a \"health plan shall not be considered to have failed to provide\" the required preventive health services \"on the basis that the plan does not provide (or pay for) coverage of sterilization or contraceptive services becauseâ(A) providing (or paying for) such coverage is contrary to the religious or moral beliefs of the sponsor, issuer, or other entity offering the plan; or (B) such coverage, in the case of individual coverage, is contrary to the religious or moral beliefs of the purchaser or beneficiary of the coverage.\" Enacting statutory exemptions to the contraceptive coverage requirement might avoid future litigation over the Departments' authority under the ACA to create categorical exemptions. In addition, broader exemptions could reduce the potential for RFRA or Free Exercise challenges. At the same time, they could increase the prospect of Establishment Clause challenges like those brought in response to the expanded exemptions in the 2019 Final Rules. While the Supreme Court has said that \"there is room for play in the joints\" between the Free Exercise Clause and the Establishment Clause, it remains to be seen whether broad accommodations like the Religious Exemption and the Moral Exemption fit comfortably in that space. Little Sisters of the Poor marks the fourth Supreme Court term in six years in which the Court has granted certiorari in a dispute about the federal contraceptive coverage requirement. During that time period, the Departments promulgated six different rules concerning the requirement, a change in presidential administration marked a turning point in the Departments' RFRA calculus, and the Supreme Court underwent its own changes with the appointment of two new Justices. While the Court has the next opportunity to weigh in on the coverage requirement in Little Sisters of the Poor , Congress and the executive branch continue to have a role in defining the interests at stake and the balance to be achieved in the years ahead.", "summary": "When Congress enacted the Patient Protection and Affordable Care Act (ACA) in 2010, it required employment-based health plans and health insurance issuers to cover certain preventive health services without cost sharing. Those services, because of agency guidelines and rules, would soon include contraception for women. The \"contraceptive coverage requirement,\" or \"contraceptive mandate\" as it came to be known, was heavily litigated in the years to follow, and exemptions from the requirement are currently the subject of a pending Supreme Court case. The various legal challenges to the contraceptive coverage requirement primarily concerned (1)Â what types of employers and institutions should be exempt from the requirement based on their religious or moral objections to contraception; (2)Â what procedures the government can require for an entity to invoke a religious-based accommodation; and (3) how much authority federal agencies have to create exceptions to the coverage requirement. As originally formulated, only houses of worship and similar entities were exempt from the requirement, but the government later added an accommodation process for certain religious nonprofit organizations. On June 30, 2014, the Supreme Court held in Burwell v. Hobby Lobby Stores, Inc. that the contraceptive coverage requirement violated federal law insofar as it did not also accommodate the religious objections of closely held, for-profit corporations. The law at issue in that caseâthe Religious Freedom Restoration Act of 1993 (RFRA)âprohibits the federal government from \"substantially burden[ing] a person's exercise of religion\" except under narrow circumstances. Since Hobby Lobby , the agencies tasked with implementing the ACA have faced numerous hurdles in their attempts to accommodate the interests of sincere objectors while minimizing disruptions to the provision of cost-free contraceptive coverage to women. The lower courts split on whether the accommodation processâwhich required eligible objecting entities to notify their insurers or the government that they qualified for an exemptionâsubstantially burdened the objectors' exercise of religion. Initially, most circuit courts rejected the view that such an accommodation triggered, facilitated, or otherwise made objectors complicit in the provision of coverage, denying their RFRA claims. After consolidating some of these cases for review, the Supreme Court ultimately vacated and remanded the decisions when the government and the objecting parties suggested that a solution might be reached so that the objectors' insurers could provide the required coverage without notice from the objecting parties. Following a change in presidential administration, the implementing agencies reevaluated and reversed their position on the legality of the then-existing accommodation process, concluding that it violated RFRA when applied to certain entities. The agencies opted to automatically exempt most nongovernmental entities that objected to providing coverage for some or all forms of contraception on religious or moral grounds. These expanded exemptions sparked a new round of litigation based on claims that the agencies exceeded their authority under the ACA or violated federal requirements for promulgating new rules. Federal courts, including the U.S. Court of Appeals for the Third Circuit, preliminarily enjoined the government from implementing the expanded exemptions. The Supreme Court is slated to hear arguments on the Third Circuit's decision in May in Little Sisters of the Poor v. Pennsylvania . Meanwhile, the government is largely precluded from relying on the prior accommodation process as a result of a nationwide injunction issued by a federal district court. Little Sisters of the Poor marks the fourth Supreme Court term in six years in which the Court has granted certiorari in a dispute about the federal contraceptive coverage requirement. During that time period, the Executive Departments promulgated six different rules concerning the requirement, a change in presidential administration marked a turning point in the Departments' RFRA calculus, and the Supreme Court underwent its own changes with the appointment of two new Justices. A Supreme Court decision in Little Sisters of the Poor could inform Congress's next steps with regard to the contraceptive coverage requirement. From a legal perspective, Congress has several options for clarifying the requirement's scope, including through amendments to the ACA and RFRA. An opinion in Little Sisters may also provide additional direction to lawmakers and federal agencies asked to accommodate the religious and moral beliefs of regulated entities when enacting or implementing laws of broader applicability.", "document_type": "crs"}
{"report": "Cannabidiol (CBD) , a compound in the Cannabis sativa plant , has been promoted as a treatment for a range of conditions, including epileptic seizures, post-traumatic stress disorder, anxiety, inflammation, and sleeplessness . However, limited scientific evidence exists to substantiate or disprove the efficacy of CBD in treating these conditions . In the United States, CBD is being marketed in food and beverages, dietary supplements, cosmetics , and tobacco products such as electronic nicotine delivery systems (ENDS , the overarching term encompassing electronic cigarettes) âproducts that are primarily regulated by the Food and Drug Administration (FDA) under the Federal Food, Drug, and Cosmetic Act (FFDCA). CBD is also the active ingredient in Epidiolex , an FDA-approved pharmaceutical drug used to treat seizures associated with two rare and severe forms of epilepsy . CBD is derived from the Cannabis sativa plant (commonly referred to as cannabis), which includes both hemp and marijuana (defined further below). CBD and tetrahydrocannabinol (THC) are thought to be the most abundant cannabinoids in the cannabis plant and are among the most researched cannabinoids for their potential medical value. THCâa psychoactive compoundâis found at high levels in m arijuana and low levels in hemp (see Figure 1 ). CBD, on the other hand, is generally considered to be nonpsychoactive and may be derived from either hemp or marijuana. As described below, this distinction is relevant for purposes of oversight by the Drug Enforcement Administration (DEA), but generally not for FDA oversight. FDA has stated that it \"treats products containing cannabis or cannabis-derived compounds as it does any other FDA-regulated productsâmeaning they're subject to the same authorities and requirements as FDA-regulated products containing any other [non-cannabis] substance. This is true regardless of whether the cannabis or cannabis-derived compounds are classified as hemp under [7 U.S.C. Section 1639o] as amended by the 2018 [f]arm [b]ill.\" In contrast, the DEA does not regulate cannabis or cannabis-derived compounds that meet the statutory definition of hemp. Botanically, marijuana and hemp are from the same species of plant, Cannabis sativa , but from different varieties or cultivars. Marijuana and hemp have separate definitions in U.S. law and are subject to different statutory and regulatory requirements. M arijuana (as defined in statute) generally refers to the cultivated plant used as a psychotropic drug, either for medicinal or recreational purposes. Marijuana is a Schedule I controlled substance under the Controlled Substances Act (CSA) and is regulated by DEA. Schedule I substances are subject to the most severe CSA restrictions and penalties; with exceptions for federally approved research, it is a federal crime to grow, sell, or possess the drug. Thus, under the CSA, the unauthorized manufacture, distribution, dispensation, and possession of marijuana and its derivatives (including marijuana-derived CBD) are prohibited. Hemp (as defined in statute separately from marijuana), on the other hand, may be legally cultivated under federal law, subject to oversight by the U.S. Department of Agriculture (USDA). Hemp is generally grown for use in the production of a wide range of products, including foods and beverages, personal care products, dietary supplements, fabrics and textiles, paper, construction materials, and other manufactured and industrial goods (see Figure 2 ). Until December 2018, hemp was included in the CSA definition of marijuana and was thus subject to the same restrictions as marijuana. The Agriculture Improvement Act of 2018 (2018 farm bill; P.L. 115-334 ) removed hemp and its derivatives (including hemp-derived CBD) from the CSA definition of marijuana. As a result, hemp is no longer subject to regulation and oversight as a controlled substance by DEA. Instead, hemp production is now subject to regulation and oversight as an agricultural commodity by USDA. CBD and CBD-related products that do not meet the statutory definition of hemp (in 7 U.S.C. Â§1639o) continue to be prohibited (aside from lawful use for research purposes) under the CSA and remain regulated by DEA. Changes enacted in the 2018 farm bill related to hemp were expected by many to generate additional market opportunities for hemp-derived consumer products such as hemp-derived CBD. However, the farm bill also explicitly preserved FDA's authorities under the FFDCA and Section 351 of the Public Health Service Act, including for hemp-derived products. As mentioned above, cannabis and cannabis-derived FDA-regulated products are subject to the same authorities and requirements as FDA-regulated productsâincluding pharmaceutical drugs, food, dietary supplements, and cosmeticsâcontaining any other substance (whether cannabis-derived or otherwise). As described below, FDA has determined that it is unlawful to introduce food containing added CBD into interstate commerce, or to market CBD as or in dietary supplements. FDA has not made similar determinations for other FDA-regulated product categories (pharmaceutical drugs, cosmetics, and tobacco products). In the United States, CBD is the active ingredient in the prescription drug Epidiolex. CBD is also being marketed in food and beverages, dietary supplements, cosmetics, and tobacco products such as ENDS. Each of these product types is governed by different statutory and regulatory requirements, primarily administered by FDA. The agency also shares regulatory authority with other entities; for example, the Alcohol and Tobacco Tax and Trade Bureau (TTB), with regard to alcoholic beverages, and the Federal Trade Commission (FTC), with regard to the advertising and promotion of certain CBD products. This section provides an overview of how FDA regulates drugs, food, dietary supplements, cosmetics, and tobacco products, and the applicability of those requirements to products that contain CBD. Table 1 summarizes selected regulatory requirements by CBD product type. FDA, under the FFDCA, regulates the safety and effectiveness of prescription and nonprescription (over-the-counter, or OTC) drugs sold in the United States. Prescription drugs require health practitioner supervision to be considered safe for useâdue to drug toxicity, potential harmful effect, or method of useâand may be dispensed only pursuant to a prescription. In contrast, OTC drugs may be used without a prescriber's authorization, provided they have an acceptable safety margin, low potential for misuse or abuse, and are adequately labeled so that consumers can self-diagnose the condition, self-select the medication, and self-manage the condition. The statutory definition of the term drug includes \"articles (other than food) intended to affect the structure or any function of the body of man or other animals\" and \"articles intended for use in the diagnosis, cure, mitigation, treatment, or prevention of disease in man or other animals.\" In general, a new drug may not be introduced into interstate commerce without FDA approval. For purposes of new drug approval, except under very limited circumstances, FDA requires data from clinical trials to provide evidence of a drug's safety and effectiveness. Before testing in humansâcalled clinical testingâthe drug's sponsor (usually its manufacturer) must file an investigational new drug (IND) application with FDA. Once a manufacturer completes clinical trials, it submits the results of those investigations, along with other information, to FDA in a new drug application (NDA). In reviewing an NDA, FDA considers whether the drug is safe and effective for its intended use; whether the proposed labeling is appropriate; and whether the methods used to manufacture the drug and the controls used to maintain the drug's quality are adequate to preserve the drug's identity, strength, quality, and purity. The NDA process can be used to obtain approval of both prescription and OTC drugs. If a sponsor wants to transfer an approved drug from prescription to OTC status (called an Rx-to-OTC switch), the sponsor must submit to FDA an NDA (or a supplement to an NDA) providing data to support the switch. As part of an NDA for an OTC drug, FDA may require the sponsor to conduct label comprehension studies assessing the extent to which consumers understand the information in the proposed labeling. FDA also may recommend that the sponsor conduct self-selection studies to assess whether consumers can appropriately self-select a drug based on the information on the labeling. In June 2018, FDA approved an NDA for the prescription drug Epidiolex, submitted by GW Pharmaceuticals, for the treatment of seizures associated with Lennox-Gastaut syndrome and Dravet syndrome in patients two years old and older. The active ingredient in Epidiolex is CBD, although its mechanism of actionâthat is, the mechanism by which it exerts its anticonvulsant effectsâis not known. FDA approved Epidiolex in June 2018; at that time, the drug contained a chemical constituent of marijuana (CBD) that was considered a Schedule I controlled substance. Therefore, it could not be marketed unless rescheduled by the DEA. Upon FDA approval, Epidiolex no longer met the criteria for placement in Schedule I, as it now had an accepted medical use in the United States. On September 28, 2018, based on a recommendation from FDA, DEA issued an order placing FDA-approved drugs that contain cannabis-derived CBD and no more than 0.1% THC in Schedule V. Epidiolex is available by prescription and only at specialty pharmacies. It is the first (and only) pharmaceutical formulation of highly purified, plant-derived CBD available in the United States. Because Epidiolex is designated as an orphan drug (i.e., a drug that treats a rare disease or condition), it was awarded seven years of marketing exclusivity upon approval. This means that FDA cannot approve an NDA for the same drugâin this case, one that has CBD as its active ingredientâfor the same disease or condition (i.e., for the treatment of seizures associated with Lennox-Gastaut syndrome or Dravet syndrome in patients two years old and older) for seven years, with limited exceptions. The FFDCA defines food to mean \"(1) articles used for food or drink for man or other animals, (2) chewing gum, and (3) articles used for components of any such article.\" FDA's Center for Food Safety and Applied Nutrition (CFSAN) is responsible for oversight of human food, while FDA's Center for Veterinary Medicine (CVM) is responsible for oversight of animal food (feed). The FFDCA requires that all human and animal foods are safe to eat, produced in compliance with current good manufacturing practices (CGMPS), contain no harmful substances, and are truthfully labeled, among other things. Generally, food intended for human or animal consumption is not approved by FDA prior to marketing. However, any substance added to food is a food additive, subject to premarket review and approval by FDA. An exception to this is if a substance is generally recognized as safe (i.e., GRAS) under the conditions of its intended use, among qualified experts, or unless the use of the substance is otherwise excepted from the definition of a food additive. To obtain approval of a substance as a food additive, a person may submit to FDA a food additive petition, which proposes the issuance of a regulation prescribing the conditions under which the additive may be safely used. Food additives are approved for specific uses (e.g., to improve taste, texture, or appearance; to improve or maintain nutritional value; or to maintain or improve safety and freshness). If FDA determines, after reviewing the data submitted in a petition, that a proposed use of a food additive is safe, the agency issues a regulation authorizing that specific use of the substance. The use of a food substance may be determined to be GRAS either through scientific procedures or, for a substance used in food before 1958, through scientific procedures or experience based on common use in food. FDA established a voluntary GRAS notification process that permits any person to notify the agency of a conclusion that a substance is GRAS under the conditions of its intended use in human food. A substance is considered GRAS on the basis of common knowledge about its safety for its intended use, and the data and information relied upon for the GRAS substance must be generally available . This is in contrast to the data and information used to support a food additive petition, which are generally privately held and submitted to FDA for evaluation. Additional information about the food additive petition process and submission of GRAS notifications is available in Appendix A . Under the FFDCA, it is unlawful to introduce into interstate commerce a food (human or animal) to which a drug has been addedâeither an approved drug or a drug for which substantial clinical investigations have been instituted and made public. There are several exceptions to this: (1) if the drug was marketed in food before it was approved as a drug or before clinical drug investigations were instituted; (2) if the Secretary has issued a regulation, after notice and comment, approving the use of such drug in the food; (3) if the use of the drug in the food is to enhance the safety of the food and not to have independent biological or therapeutic effects on humans, and the use is in conformity with specified requirements; or (4) if the drug is a new animal drug whose use is not unsafe under FFDCA Section 512. FDA has concluded, based on available evidence, that none of these are the case for CBD, and because CBD is an active ingredient in an approved drug, FDA has taken the position that it is unlawful to introduce into interstate commerce food containing added CBD (i.e., to use CBD as a food additive). However, according to FDA, cannabis-derived ingredients that do not contain CBD (or THC) may fall outside the scope of this prohibition. Foods containing parts of the hemp plant that include only trace amounts of CBD (e.g., hemp seed and ingredients derived from hemp seed) may be lawfully marketed under certain circumstancesâpursuant to FDA approval as a food additive or a GRAS determination. In December 2018, FDA announced that it had completed its evaluation of three GRAS notices related to hemp seed-derived ingredients (i.e., hulled hemp seeds, hemp seed protein, and hemp seed oil). FDA had no questions regarding the company's conclusion that the use of such products as described in the notices is safe. Thus, FDA allowed them to be marketed in human foodsâwithout food additive approvalâfor the uses specified in the GRAS notices, provided they comply with all other applicable requirements. Intended uses of the hemp seed-derived ingredients include adding them as a source of protein, carbohydrates, oil, and other nutrients to beverages (e.g., smoothies, protein drinks, and plant-based alternatives to dairy products), as well as to soups, dressings, baked goods, snacks, and nutrition bars. While FDA has determined that it is unlawful to introduce into interstate commerce food to which CBD has been added, independent of CBD's status as a drug ingredient, CBD has not been approved as a food additive. FDA also has determined that \"[b]ased on a lack of scientific information supporting the safety of CBD in food â¦ it cannot conclude that CBD is [GRAS] among qualified experts for its use in human or animal food.\" As previously noted, the FFDCA definition of food includes animal food. Similar to food intended for human consumption, animal food is not subject to premarket approval by FDA unless it meets the definition of a food additive. In that case, it would be subject to the premarket requirements for food additives (or GRAS exemption). Depending on the claims made, certain animal feed/food may meet the FFDCA definition of a drug . Like human drugs, animal drugs require FDA approval prior to marketing. In some cases, animal food may be considered both a food and a drug simultaneously. Although premarket approval by FDA is not required for most animal food (excluding animal drugs), other federal and state rules govern their manufacture and sale. These include, for example, labeling requirements and ingredient definitions. As previously noted, it is a prohibited act, with certain exceptions, under the FFDCA to introduce into interstate commerce animal food to which a drug has been addedâeither an approved drug or a drug for which substantial clinical investigations have been instituted and made public. Some cannabis-derived ingredients that do not contain CBD or contain only trace amounts of CBD (e.g., hemp seed and ingredients derived from hemp seed) may fall outside the scope of this prohibition and may be lawfully marketed pursuant to FDA approval as a food additive or a GRAS determination. However, to date, FDA has not approved any food additive petitions or evaluated any GRAS notices related to use of hemp seed and hemp-seed derived ingredients in animal food. In addition, as previously mentioned, FDA has stated that \"[b]ased on a lack of scientific information supporting the safety of CBD in food â¦ it cannot conclude that CBD is [GRAS] among qualified experts for its use in human or animal food.\" While FDA is the primary federal agency responsible for regulating the safety of food, the agency works with states and the Association of American Feed Control Officials (AAFCO) in the implementation of uniform policies for regulating the use of animal food products. For example, FDA provides scientific and technical assistance to the AAFCO ingredient Definition Request Process, the purpose of which is to \"identify the safety, utility, and identity of ingredients used in animal feed.\" CVM recognizes ingredients listed in the Official Publication of the AAFCO as being acceptable for use in animal food. According to FDA, \"there are no approved food additive petitions or ingredient definitions listed in the AAFCO OP for any substances derived from hemp, and we are unaware of any GRAS conclusions regarding the use of any substances derived from hemp in animal food.\" AAFCO has issued guidelines on hemp in animal food, which are generally consistent with FDA's policy. The guidelines also note that, based on discussions with FDA and the hemp industry, materials and products that are CBD-infused need to be treated as drugs because the intended uses are largely associated with drug claims. This means that parts of the hemp plant will not be appropriate for approval as an animal feed ingredient. As such, products that contain CBD as a feed ingredient could be labeled adulterated or misbranded and be subject to regulatory actions by state agencies. A dietary supplement is defined as a product (other than tobacco) that is intended to supplement the diet; is intended to be taken by mouth as a pill, capsule, powder, tablet, or liquid; and contains one or more of the following dietary ingredients: vitamins, minerals, herbs or other botanicals, amino acids, and other substances or their constituents. Dietary supplements are generally regulated as food under the FFDCA and, as such, are not subject to premarket approval. Dietary supplements must comply with FDA's regulations prescribing CGMPs related to manufacturing, packaging, labeling, or holding dietary supplements to ensure their quality. A dietary supplement may not claim to diagnose, cure, mitigate, treat, or prevent a specific disease or class of diseases. FDA does not evaluate the safety and effectiveness of dietary supplements prior to marketing; however, supplements are subject to various statutory and regulatory requirements. Among other things, a firm that seeks to market a dietary supplement containing a new dietary ingredient (NDI) must notify FDA at least 75 days prior to marketing. The manufacturer or distributor of the dietary supplement that contains an NDI subject to the notification requirements may not market the supplement until 75 days after the filing date. An NDI is defined as a dietary ingredient that was not marketed as a dietary supplement in the United States before October 15, 1994. An exception to the NDI notification requirement is if the dietary ingredient was \"present in the food supply as an article used for food in a form in which the food has not been chemically altered.\" In this case, the dietary ingredient would still be considered an NDI because it was not marketed prior to October 15, 1994, but it would be exempt from the notification requirement. An NDI notification must include a \"history of use or other evidence of safety establishing that the dietary ingredient, when used under the conditions recommended or suggested in the labeling of the dietary supplement, will reasonably be expected to be safe,\" along with other information. FDA acknowledges receipt of the NDI notification and notifies the submitter of the date of receipt, which is also the NDI notification filing date. FDA must keep the information in the NDI notification confidential for the first 90 days after receiving it. If the manufacturer or distributor submits additional information in support of the NDI notification, FDA may reset the 75-day period and assign a new filing date. FDA does not approve NDI notifications. Instead, the agency generally issues one of four response letters: (1) a letter of acknowledgment without objection; (2) a letter listing deficiencies that make the notification incomplete; (3) an objection letter raising safety concerns based on information in the notification or identifying gaps in the history of use or other evidence of safety; or (4) a letter raising other regulatory issues with the NDI or dietary supplement (e.g., the NDI or supplement is excluded from the definition of a dietary supplement). Under the FFDCA, an article that is an active ingredient in an approved drug, or that has been authorized for investigation as a new drug and for which the existence of such clinical investigations has been made public, is excluded from the definition of a dietary supplement and may not be marketed as such. An exception to this is if FDA issues a regulation finding that the use of such substance in a dietary supplement is lawful. An article that is approved as a drug or being investigated as a drug may be marketed in or as a dietary supplement if it was marketed as a dietary supplement or as a food prior to approval or clinical investigation (before the IND became effective). According to FDA, CBD is an active ingredient in an FDA-approved drug (i.e., Epidiolex), and it was authorized for investigation as a new drug for which substantial clinical investigations had been instituted and made public before its marketing as a dietary supplement. As such, FDA has determined that CBD may not be sold as a dietary supplement unless FDA promulgates regulations concluding otherwise, regardless of whether the CBD is hemp-derived or marijuana-derived. FDA has issued several public statements maintaining that it is unlawful to market CBD as, or in, dietary supplements. FDA may issue a regulation, after notice and comment, creating an exception that allows CBD to be marketed as a dietary supplement. Such a regulation may be requested by an interested person through the filing of a citizen petition. If an interested party has evidence challenging FDA's conclusion excluding CBD from the dietary supplement definition, the party may submit to FDA a citizen petition asking the agency to issue a regulation, subject to notice and comment, finding that the ingredient, when used as or in a dietary supplement, would be lawful. To date, FDA has not issued such a regulation for any substance (whether cannabis-derived or not) that is an active ingredient in an approved drug or is authorized for investigation as a new drug. If FDA were to issue a regulation allowing CBD to be marketed as a dietary supplement, that product likely would be expected to comply with the various requirements governing lawful marketing of supplements, including compliance with CGMPs and NDI notification. Despite FDA's determination that marketing CBD as a dietary supplement is unlawful, these products remain on the market. On November 14, 2019, the Consumer Healthcare Products Association (CHPA) submitted a citizen petition to FDA, asking the agency to \"exercise its statutory authority and discretion to engage in rulemaking that establishes a regulatory pathway to legally market dietary supplements containing [CBD] derived from hemp (as defined in 7 U.S.C. Â§1639o(1))\" and to require that manufacturers of CBD-containing dietary supplements submit NDI notifications. It is unclear whether other citizen petitions have been submitted to FDA requesting that it issue a regulation allowing CBD to be marketed as a dietary supplement. The FFDCA defines cosmetics as \"(1) articles intended to be rubbed, poured, sprinkled, or sprayed on, introduced into, or otherwise applied to the human body or any part thereof for cleansing, beautifying, promoting attractiveness, or altering the appearance and (2) articles intended for use as a component of any such articles; except that such term shall not include soap.\" FDA has the authority to take certain enforcement action against adulterated or misbranded cosmetics. A cosmetic is deemed adulterated if, among other things, it contains a poisonous or deleterious substance, or if it has been made or held in unsanitary conditions. A cosmetic is deemed misbranded if, among other things, \"its labeling is false or misleading in any particular,\" or if the label lacks required information. In addition, if a product makes therapeutic claims (i.e., that its intended use is the cure, mitigation, treatment, or prevention of a disease), FDA generally considers that product to be a drug (or a drug-cosmetic) and subject to the FFDCA drug requirements. If a company has not obtained approval of a new drug prior to marketing, it is in violation of the FFDCA. For example, in October 2019, FDA sent a warning letter to a manufacturer marketing a CBD body butter with therapeutic claims. However, FDA's authority over cosmetic products is generally more limited than for the other products that the agency regulates. FDA does not have the authority to conduct premarket review of cosmetic ingredients, nor can FDA require cosmetics manufacturers to submit data substantiating the safety of their cosmetics. While FDA regulations prohibit or restrict the use of certain ingredients in cosmetics, the regulations do not apply to any cannabis or cannabis-derived ingredients (e.g., CBD). Legislation has been introduced in the 116 th Congress that would expand FDA's authority to regulate cosmetic products and would require a safety review of certain ingredients, among other things. If CBD were included in such a review and found to be unsafe for use in cosmetics, that finding would likely affect whether CBD could be marketed in cosmetics. FDA regulates the manufacture, marketing, and distribution of tobacco products, per its authorities in the FFDCA, as amended by the Family Smoking Prevention and Tobacco Control Act of 2009 (TCA; P.L. 111-31 ). A tobacco product is defined as \"any product made or derived from tobacco that is intended for human consumption, including any component, part, or accessory of a tobacco product (except for raw materials other than tobacco used in manufacturing a component, part, or accessory of a tobacco product)\" that is not a drug, device, or drug-device combination product. Nicotine is an addictive chemical compound present in the tobacco plant. Tobacco productsâincluding cigarettes, cigars, smokeless tobacco, hookah tobacco, and most ENDSâcontain nicotine. Tobacco-derived nicotine (as well as any other tobacco-derived compound) meets the statutory definition of a tobacco product. In 2016, FDA promulgated regulations (known as the deeming rule ) that extend authority over all products meeting the definition of a tobacco product that were not already subject to the FFDCA, including ENDS. In the deeming rule, FDA clarified its authority to regulate all components and parts associated with ENDS, including e-liquids. E-liquids, which can include nicotine, flavorings, and other ingredients, are heated in ENDS to create a vapor that a user inhales. If an e-liquid contains CBD and makes therapeutic claims, it may be considered an unapproved drug and may be in violation of the FFDCA. In addition, if an e-liquid contains any tobacco-derived compound (e.g., nicotine) and CBD, but does not make therapeutic claims for CBD, the product may still meet the statutory definition of a tobacco product because it includes tobacco-derived compounds. In such case, the product may be subject to FDA's tobacco regulatory authorities, although the product might not receive marketing authorization if it is determined that allowing the product to be marketed would not be appropriate for the protection of public health. However, if the e-liquid contains CBD only, with no tobacco-derived compounds, and does not make therapeutic claims, FDA's enforcement options might be limited. In this case, it would be unclear whether the product meets the statutory definition of a tobacco product and is therefore subject to FDA's tobacco regulatory authorities. FDA has stated that it intends to make a determination about regulating such products as tobacco products on a case-by-case basis. While TTB is the primary federal regulator of alcoholic beverages, FDA plays a role in determining what ingredients may be used in the production of alcoholic beverages. In general, before a hemp ingredient may be used in the production of an alcohol beverage productâwhether it be a distilled spirit, wine, or beerâthe producer may be required to request formula approval from TTB. Requirements are outlined in the Federal Alcohol Administration Act (27 U.S.C. Â§201 et seq.) and in regulation. For distilled spirits, for example, an approved formula is required to \"blend, mix, purify, refine, compound, or treat spirits in a manner which results in a change of character, composition, class or type of the spirits;\" any change in an approved formula requires a new filing. For wine, formula approval is required for \"special natural wine, agricultural wine, and other than standard wine (except distilling material or vinegar stock).\" For beer, formula approval is required for any fermented product that \"is not generally recognized as a traditional process in the production of a fermented beverage designated as 'beer,' 'ale,' 'porter,' 'stout,' 'lager,' or 'malt liquor'\" or to which certain ingredients are added. Specific labeling requirements also apply, and generally require prior approval. In addition, regarding interstate and foreign commerce in spirits, wine, and beer, it is unlawful for businesses to operate without a permit. Certain states and local jurisdictions might also have their own alcohol product prohibitions and production requirements, as well as restrictions on interstate commerce. TTB's current policy is that the agency \"will not approve any formulas for alcohol beverages that contain ingredients that are controlled substances under the CSA\" (e.g., marijuana or marijuana-derived CBD). With regard to CBD derived from hemp, TTB is in the process of updating its guidance on the use of hemp ingredients to reflect changes in the 2018 farm bill. TTB also states that it consults with FDA on ingredient safety issues and, in some cases, may \"require formula applicants to obtain documentation from FDA indicating that the proposed use of an ingredient in an alcohol beverage would not violate [FFDCA].\" Thus, in general, TTB treats hemp-derived ingredients for alcohol beverage products as any other product ingredient. As such, any ingredients added to alcohol beverage products must be either an FDA-approved food additive or determined to be GRAS. As aforementioned, to date, FDA has evaluated GRAS determinations for three different hemp seed-derived ingredients that do not contain CBD, although allowed uses do not include addition to alcoholic beverages. With regard to CBD, FDA has determined that it is unlawful to introduce into interstate commerce food to which certain drug ingredients (e.g., CBD) have been added. Additionally, independent of CBD's status as a drug ingredient, CBD has not been approved as a food additive, and FDA has determined that \"[b]ased on a lack of scientific information supporting the safety of CBD in food â¦ it cannot conclude that CBD is [GRAS] among qualified experts for its use in human or animal food.\" Formulations seeking approval to use other types of hemp extracts as an ingredientâincluding but not limited to CBDâwould likely not be approved by TTB, since these extracts have not been authorized for use in food by FDA. Cannabinoids such THC and CBD interact with specific cell receptors in the brain and throughout the body to produce their intended effects. Although THC activates certain receptors that then produce euphoric or intoxicating effects, CBD has low affinity for those same receptors and therefore does not produce intoxicating effects. This property may make CBD an attractive compound for drug developers. In addition, preclinical (e.g., animal model) research suggests that CBD may interact with other brain-signaling systems that can produce therapeutic effects, such as the reduction of seizures, pain, and anxiety. The therapeutic benefits, or underlying mechanism of action for therapeutic benefits, of CBD remain uncertain, even in CBD-containing drugs that have been approved by regulatory agencies. For example, in the United States, GW Pharmaceuticals' Epidiolex (CBD) is approved for the treatment of seizures associated with two rare and severe forms of epilepsy. However, according to the drug's labeling, the mechanism by which the drug exerts its anticonvulsant effects is not known. In addition, while not yet approved in the United States, GW Pharmaceuticals' drug Sativex (nabiximols)âa cannabis extract spray containing a 1:1 ratio of CBD and delta-9 THCâhas regulatory approval in more than 25 countries for the treatment of spasticity (muscle stiffness/spasm) due to multiple sclerosis (MS). In Canada, Sativex has conditional marketing authorization as an adjunctive treatment for neuropathic pain in adult patients with MS and \"as adjunctive analgesic [pain relieving] treatment in adult patients with advanced cancer who experience moderate to severe pain during the highest tolerated dose of strong opioid therapy for persistent background pain.\" However, Phase III clinical trials previously conducted by GW Pharmaceuticals found that Sativex failed to show superiority over placebo in treating the pain of patients with advanced cancer who experience inadequate analgesia during optimized chronic opioid therapy. Furthermore, while CBD is predicted to have anti-inflammatory properties, which may play a role in its analgesic effects, preliminary evidence suggests that the analgesia is mediated by THC, and the extent to which CBD contributes to those therapeutic effects is unclear. CBD is the subject of numerous ongoing randomized controlled trials (RCTs). As of December 2019, a database maintained by the National Library of Medicine (NLM) at the National Institutes of Health (NIH) lists numerous domestic and international ongoing RCTs involving cannabinoidsâincluding CBDâas a treatment for a variety of conditions, including chronic pain, tremors associated with Parkinson's disease, and anxiety. GW Pharmaceuticals is also studying CBD and CBD variants in clinical trials for autism and schizophrenia. Other pharmaceutical manufacturers are conducting clinical trials with CBD and its variants for other indications, including severe acne and graft-versus-host disease (GVHD). However, until such studies are completed, conclusive evidence supporting the use of CBD to treat various health conditions is limited. In February 2017, the National Academies of Sciences, Engineering, and Medicine (NASEM) published a comprehensive review of fair- and good-quality systematic reviews of literature and high-quality primary research on cannabis and cannabinoids. NASEM did not make specific comparisons between cannabinoids derived from hemp versus marijuana, or between cannabinoids from low versus high THC strains of marijuana. However, for CBD or CBD-enriched cannabis specifically, the report noted research gaps among existing literature in treating numerous conditions, including cancer in general, chemotherapy-induced nausea, epilepsy, and post-traumatic stress disorder (PTSD), among other conditions. Nonetheless, CBD is promoted as treatment for a range of conditions, including PTSD, anxiety, inflammation, and sleeplessnessâdespite limited scientific evidence substantiating or disproving these claims. These research gaps can be attributed, in part, to the status of marijuana as a Schedule I controlled substance under the CSA. Individuals who seek to conduct research on any controlled substance must do so in accordance with the CSA and other federal laws. DEA research requirements are more stringent for Schedule I and Schedule II substances than for substances in Schedules III-V. For example, for Schedule I substances such as marijuana, even if practitioners have a DEA registration for a substance in Schedules II-V, they must obtain a separate DEA registration for researching a Schedule I substance. In addition, due to its Schedule I status, the DEA strictly limits the quantity of marijuana manufactured each year. These requirements can prolong the process of acquiring marijuana (including marijuana-derived CBD) for research. As mentioned previously, the 2018 farm bill removed hemp and hemp derivatives (including hemp-derived CBD) from the CSA definition of marijuana, making them no longer subject to regulation and oversight as a controlled substance by DEA. DEA has confirmed that a DEA registration is no longer required to grow or research hemp plants and CBD preparations that meet the statutory definition of hemp . However, CBD preparations containing above the 0.3% delta-9 THC level (i.e., meeting the statutory definition of marijuana) continue to be subject to Schedule I CSA requirements. As a result, conducting research on these substances may continue to be a challenge. As mentioned previously, FDA has determined that at this time, CBD cannot be added to any food that is sold in interstate commerce and that CBD cannot be marketed as a dietary supplement. Although FDA could issue a regulation allowing CBD to be added to food or allowing its use in dietary supplements, the agency has never issued such a regulation for any substance (whether cannabis-derived or not) that is an approved drug or authorized for investigation as a new drug. Although FDA has determined that CBD (and THC) may not be added to food or marketed as a dietary supplement, the agency has not made this same determination for other compounds derived from cannabis, although those compounds may be subject to DEA restrictions; FDA's determination is specific to CBD and THC because both are active ingredients in FDA-approved drugs. FDA also has not determined that CBD may not be added to cosmetics; however, if a CBD-containing cosmetic product makes therapeutic claims (e.g., that it is intended to diagnose, treat, cure, mitigate, or prevent a disease), FDA would likely consider the product to be a drug subject to the new drug approval requirements. CBD may be lawfully marketed as a drug, pursuant to FDA approval, and in compliance with applicable statutory and regulatory requirements. If a firm seeks to market CBD as a treatment or an otherwise therapeutic product, the firm generally would need to obtain premarket approval from FDA via the new drug approval pathway. To date, FDA has approved one CBD-containing drug, Epidiolex, which is available by prescription for the treatment of seizures associated with Lennox-Gastaut syndrome or Dravet syndrome in patients two years old and older. Epidiolex is marketed by GW Pharmaceuticals. On May 31, 2019, FDA held a public hearing \"to obtain scientific data and information about the safety, manufacturing, product quality, marketing, labeling, and sale of products containing cannabis or cannabis-derived compounds.\" Prior to the hearing, FDA had opened a docket to which interested stakeholders could submit a request for FDA to review scientific data and information about products containing cannabis or cannabis-derived compounds. Although FDA has maintained that it is unlawful to add CBD to food or to market CBD as a dietary supplement, CBD continues to be marketed in violation of this determination. The agency has generally prioritized enforcement against companies and products that pose the greatest risk to consumersâfor example, products making claims that CBD can treat Alzheimer's or stop cancer cell growth. FDA has said that it \"does not have a policy of enforcement discretion with respect to any CBD products,\" although this is expected to change in light of language included in the explanatory statement accompanying the FY2020 enacted appropriation (see \" What Could Congress Do to Allow CBD to Be Marketed as a Food Additive or Dietary Supplement? \"). Some industry stakeholders are recommending that, absent an FDA regulatory framework for CBD products, manufacturers and marketers of dietary supplements or foods that contain hemp or CBD comply with federal regulations for supplements and food in the interim to help ensure the quality of these CBD products. Such compliance would include facility registration, adherence to CGMPs, and meeting labeling requirements. In an effort to establish industry-wide standards, one organization has established its own third-party certification program designed for hemp food, dietary supplements, and cosmetic companies. This certification program is independent of federal requirements, and FDA has not validated or verified any third-party certification program for hemp. At the retail level, consumer products labeled as containing CBD are being marketed and sold in food and beverages, cosmetics and personal care products, certain tobacco products, and dietary supplementsâdespite FDA's position that CBD may not be sold in food and beverages or dietary supplements. CBD-containing products that claim to meet the definition of hemp are sold through specialty retailers, such as natural/organic grocery stores, tobacco (or smoke) shops, yoga studios, and farmers' markets; through direct-to-consumer and online sales; from herbal practitioners; and by large retailers such as CVS and Walgreens. Although some industry analysts foresee a strong market for marijuana-derived CBD, it remains prohibited (aside for lawful research purposes) under the CSA if the product does not meet the statutory definition of hemp in 7 U.S.C. Â§1639o. The DEA has confirmed that a DEA registration is not required to grow or research hemp plants and CBD preparations that meet the statutory definition of hemp. Despite the federal prohibition on growing, selling, or possessing marijuana, marijuana-derived CBD products that have not been approved by FDA have been made available in states where medical and/or recreational cannabis is legal under state law, in violation of federal law. Depending on where a CBD product is manufactured and sold, it may primarily be produced using only drug-grade cannabis and marketed as a medicinal or therapeutic product, in violation of FDA requirements. To date, most of the CBD products sold in states where medical and/or recreational cannabis is legal do not meet the statutory definition of hemp. Typically, these products contain 0.45% to 1.5% THC, with some products containing up to 9% THCâlevels that could result in psychoactive effects by the user. In 2018, CBD sales in the United States were estimated at $534 million, according to the Hemp Business Journal . This amount includes sales from hemp-derived CBD products, marijuana-derived CBD products (currently a Schedule I controlled substance), and the FDA-approved drug Epidiolex. In 2018, more than 1,000 companies were producing and marketing CBD products for the U.S. market. Since 2014, when total CBD sales were a reported $108 million, U.S. sales of CBD have risen fivefold ( Figure 3 ). In 2018, hemp- and marijuana-derived CBD sales were $240 million and $264 million, respectively, while sales of Epidiolex were estimated at $30 million ( Figure 3 ). Current projections of U.S. sales of CBD indicate expected growth over the next few years. Such sales are expected to exceed $1 billion in 2020 and reach nearly $2 billion in 2022, roughly split between the three markets (hemp-derived, marijuana-derived, and pharmaceutical CBD; see Figure 3 ). Others forecast sales well beyond these levels, with some predicting that sales of hemp-derived CBD will eventually dominate the cannabis market, since hemp-derived CBD does not tend to carry the stigma associated with marijuana. An ATKearney survey shows that U.S. consumers, regardless of age, strongly believe that cannabis can \"offer wellness and therapeutic benefits,\" ranging from 74% to 83% of those surveyed across all age demographics. Some global markets where cannabis is legal are already reporting product shortages of CBD medicinal cannabis products. In the United States, growth in CBD sales is expected despite continued regulatory and legal uncertainty, given continued FDA, DEA, and state and local restrictions. Despite FDA's current determination that CBD cannot be marketed as a food additive or a dietary supplement, these products continue to be sold. In response, some members of Congress have expressed support for a regulatory framework for hemp-derived CBD in certain FDA-regulated consumer products. In absence of a regulatory framework for hemp-derived CBD products, Congress has directed FDA to issue a policy of enforcement discretion with respect to CBD products that meet the statutory definition of hemp that also come under FDA jurisdiction. More specifically, the explanatory statement accompanying the enacted FY2020 appropriation states that [t]he agreement includes $2,000,000 for research, policy evaluation, market surveillance, issuance of an enforcement discretion policy, and appropriate regulatory activities with respect to products under the jurisdiction of the FDA which contain CBD and meet the definition of hemp, as set forth in section 297A of the Agricultural Marketing Act of 1946 (7 U.S.C. 16390). Within 60 days of enactment of this Act, the FDA shall provide the Committees with a report regarding the agency's progress toward obtaining and analyzing data to help determine a policy of enforcement discretion and the process in which CBD meeting the definition of hemp will be evaluated for use in products. The FDA is further directed to perform a sampling study of the current CBD marketplace to determine the extent to which products are mislabeled or adulterated and report to the Committees within 180 days of enactment of this Act. The statement does not explicitly require FDA to set a safe level or threshold for CBD in consumer products. However, the activities conducted pursuant to this directive may inform the establishment of such a level in the future. In addition to the activities directed in the explanatory statement, Congress also could take further legislative action, such as requiring FDA to issue a regulation, under its FFDCA authorities, expressly permitting CBD that meets the definition of hemp to be used as a food additive or dietary supplement. For example, such a regulation could prescribe the conditions under which CBD may be safely used as a food additive (e.g., to add flavor or nutritional value to food, in specified quantities, subject to specified labeling requirements). However, because FDA has never before issued such a regulation allowing an approved drug or a substance authorized for investigation as a new drug to be a food additive or added to a dietary supplement, it is not clear what such a regulation would look like. Congress also could consider amending the FFDCA provisions that FDA has identified as restricting marketing of CBD in food and dietary supplements. For example, Congress could exclude from these provisions CBD that meets the statutory definition of hemp. However, even if the marketing of CBD-containing products were no longer restricted by these provisions, CBD-containing products may still be subject to other FFDCA requirements. For example, to lawfully market a CBD product as a dietary supplement, a firm may need to submit an NDI notification to FDA, in addition to meeting other statutory and regulatory requirements for supplements. To lawfully market CBD as a food additive, a firm would be expected to either obtain approval via a food additive petition or pursuant to a GRAS determination. As FDA has said that the agency \"is not aware of any basis to conclude that CBD is GRAS among qualified experts for its use in human or animal food,\" a food additive petition may be necessary. As mentioned above, food and dietary supplements are not evaluated by FDA for safety and effectiveness prior to marketing. Given this fact, in determining whether a legislative approach is appropriate, Congress may consider the potential for adverse health effects and other unintended consequences. For example, clinical trials to support the approval of Epidiolex demonstrated the potential for liver injury at certain doses, and CBD may interact with other drugs or dietary supplements. Other concerns include the potential dosing and cumulative effects of exposure to CBD from multiple sources (e.g., food, supplements, and cosmetics); whether there are populations for whom CBD is not appropriate (e.g., pregnant or lactating women); and whether allowing CBD to be marketed as a supplement or food additive could undermine incentives for conducting clinical trials and obtaining evidence of safety and effectiveness to support drug approval. FDA's position with respect to the status of CBD impacts other agencies' and regulatory bodies' policies and guidance. For example, TTB consults with FDA on alcohol ingredient safety issues and generally requires that any ingredient added to alcohol beverages must be either an FDA-approved food additive or determined to be GRAS. CBD is not an approved food additive nor has it been found to be GRAS for use in alcohol or otherwise. It remains to be seen whether TTB would allow CBD that meets the definition of hemp to be added to alcoholic beverages if FDA issues a policy of enforcement discretion as directed by the explanatory statement accompanying the FY2020 enacted appropriation. Similarly, the AAFCO has issued guidelines on hemp in animal food, which are generally consistent with FDA's policy. A new policy of enforcement discretion issued pursuant to the language in the explanatory statement may affect AAFCO's guidelines. Additionally, in May 2019, the U.S. Patent and Trademark Office (USPTO) issued guidance that limits trademark registrations for CBD products. USPTO's guidance describes how it would review marks for cannabis and cannabis-related goods and services, and clarifies that compliance with federal law is a condition of federal trademark registration, regardless of the legality of the activities under state law. It further states that a \"determination of whether commerce involving cannabis and cannabis-related goods and services is lawful requires consultation of several different federal laws,\" including the CSA, FFDCA, and the 2018 farm bill ( P.L. 115-334 ). Therefore, \"registration of marks for foods, beverages, dietary supplements, or pet treats containing CBD will still be refused as unlawful under the FDCA, even if derived from hemp, as such goods may not be introduced lawfully into interstate commerce.\" Some claim that because the guidance does not specifically address cosmetic products, this could suggest that federal USPTO registration could be possible for such products; however, they also assert that USPTO is looking to FDA to further clarify conditions under which CBD foods, beverages, dietary supplements or pet treats may be lawfully marketed. Appendix A. Food Additive Petition Process and GRAS Notification Submission Food Additive Petition Process FDA has determined that CBD cannot be added to any food that is sold in interstate commerce. FDA is authorized to issue a regulation, after notice and comment, approving the use of a drug (e.g., CBD) as a food additive, although the agency has never done so for any substance. The FFDCA does not specify a process for FDA to issue such a regulation, other than that it must be after notice and comment. In regard to the process for food additive approval, FDA is authorized to \"by order establish a regulation\" that prescribes the conditions under which a food additive may be safely used. The issuance of such regulation may be proposed by FDA on its own initiative or by an interested person via submission of a food additive petition. A food additive petition must include, in addition to any explanatory or supporting data, the following information: the name and all pertinent information relating to the food additive, including its chemical identity and composition (if possible); a statement of the conditions of its proposed use, including directions, recommendations, and suggestions, and the proposed labeling; \"all relevant data bearing on the physical or other technical effect such additive is intended to produce, and the quantity of such additive required to produce such effect\"; a description of methods for determining the quantity of such additive in or on food, and any substance formed in or on food, because of its use; and full reports of safety investigations, including the methods and controls used in conducting such investigations. FDA may request that the petitioner also provide information about the manufacturing methods, facilities, and controls, as well as samples of the food additive (or articles used as its components) and samples \"of the food in or on which the additive is proposed to be used.\" Additional requirements are specified in FDA regulations. Within 30 days of the petition filing date, FDA must publish notice in the Federal Register of the regulation proposed by the petitioner. Within 90 days of petition filing, FDA must issue either an order denying the petition or an order establishing a regulation prescribing the conditions under which the food additive may be used safely (e.g., particular foods in which it may be used, maximum quantity, labeling and directions). This 90-day period may be extended by FDA, as specified. FDA may not issue such a regulation if a fair evaluation of the data \"fails to establish that the proposed use of the food additive, under the conditions of use to be specified in the regulation, will be safe,\" subject to specified limitations, or if a fair evaluation of the data \"shows that the proposed use of the additive would promote deception of the consumer in violation of [the FFDCA] or would otherwise result in adulteration or in misbranding of food.\" FDA is authorized to fix a \"tolerance limitation\" if necessary to ensure safe use of the additive. In considering whether the use of a food additive is safe, FDA must consider, among other relevant factors, the probable consumption of the additive and cumulative effect in the diet. Any person adversely affected by such order may file objections with FDA and request a public hearing and may file for judicial review, as specified. Food additive regulations may be amended or repealed. An interested person may, for example, submit a food additive petition requesting issuance of a regulation allowing a new use of a previously approved additive. If a food additive is already subject to an FDA regulation for the proposed intended use, it does not require premarket approval via a petition. Instead, that food additive may be marketed by complying with the applicable food additive regulation. GRAS Notice Submission Any person may submit a notice to FDA expressing the view that a substance is GRAS and not subject to the premarket review requirements for food additives under FFDCA Section 409. A GRAS notice has seven parts, each of which must be included in a submission to FDA. If one of the seven parts of a GRAS notice is omitted, the submission must explain why that part does not apply. The seven parts of a GRAS notice are as follows: 1. signed statements and certification; 2. identity, method of manufacture, specifications, and physical or technical effect; 3. dietary exposure; 4. self-limiting levels of use; 5. experience based on common use in food before 1958; 6. narrative; and 7. a list of supporting data and information in the GRAS notice. FDA evaluates the submission to determine whether to file it and then informs the submitter of the agency's decision. If FDA decides to file the GRAS notice, the agency sends a letter to the submitter with the filing date. The regulations do not specify a filing deadline for FDA. The regulations do state that FDA is required to respond to a GRAS notice within 180 days of filing. FDA may extend that timeframe by 90 days as needed. Filed GRAS notices are made public by FDA. Appendix B. Abbreviations Used in this Report", "summary": "Cannabidiol (CBD), a compound in the Cannabis sativa plant, has been promoted as a treatment for a range of conditions, including epileptic seizures, post-traumatic stress disorder, anxiety, inflammation, and sleeplessness. However, limited scientific evidence is available to substantiate or disprove the efficacy of CBD in treating these conditions. In the United States, CBD is marketed in food and beverages, dietary supplements, cosmetics, and tobacco products such as electronic nicotine delivery systems (ENDS)âproducts that are primarily regulated by the Food and Drug Administration (FDA) under the Federal Food, Drug, and Cosmetic Act (FFDCA, 21 U.S.C. Â§Â§301 et seq.). CBD is also the active ingredient in Epidiolex, an FDA-approved pharmaceutical drug. The Regulation of Marijuana and Hemp CBD is derived from the Cannabis sativa plant (commonly referred to as cannabis), which includes both hemp and marijuana. Marijuana is a Schedule I controlled substance under the Controlled Substances Act (CSA, 21 U.S.C. Â§Â§802 et seq.) and is regulated by the Drug Enforcement Administration (DEA). Schedule I substances are subject to the most severe CSA restrictions and penalties. Except for purposes of federally approved research, it is a federal crime to grow, sell, or possess marijuana. Until December 2018, hemp was included in the CSA definition of marijuana and was thus subject to the same restrictions. Legislative changes enacted as part of the 2018 farm bill (Agriculture Improvement Act of 2018, P.L. 115-334 ) removed longstanding federal restrictions on the cultivation of hemp. No longer subject to regulation and oversight as a controlled substance by DEA, hemp production is now subject to regulation and oversight as an agricultural commodity by the U.S. Department of Agriculture (USDA). The 2018 farm bill expanded the statutory definition of what constitutes hemp to include \"all derivatives, extracts, cannabinoids, isomers, acids, salts, and salts of isomers,\" as long as it contains no more than a 0.3% concentration of delta-9 tetrahydrocannabinol (THC; 7 U.S.C. Â§1639o). All non-hemp cannabis and cannabis derivativesâincluding marijuana-derived CBDâare considered to be marijuana under the CSA and remain regulated by DEA. Production and Marketing of Hemp Products Legislative changes related to hemp enacted as part of the 2018 farm bill were widely expected to generate additional market opportunities for the U.S. hemp market. However, the farm bill explicitly preserved FDA's authority under the FFDCA and Section 351 of the Public Health Service Act (PHSA, 42 U.S.C. Â§262), including for hemp-derived products. Following enactment of the farm bill, in a December 2018 statement, FDA stated that it is \"unlawful under the [FFDCA] to introduce food containing added CBD or THC into interstate commerce, or to market CBD or THC products as, or in, dietary supplements, regardless of whether the substances are hemp-derived.\" The agency has maintained this view in subsequent communications. Despite FDA's determination, CBD continues to be widely marketed and sold in both food and dietary supplements in the United States. To date, FDA has generally prioritized enforcement against companies and products that pose the greatest risk to consumersâfor example, CBD products claiming to treat Alzheimer's or stop cancer cell growth. In 2014, total U.S. CBD sales were a reported $108 million. In 2018, more than 1,000 companies produced and marketed CBD for the U.S. market, and U.S. CBD sales were estimated at $534 million, according to the Hemp Business Journal . That dollar amount is projected to exceed $1 billion in 2020 and to reach nearly $2 billion in 2022. This amount includes sales from hemp-derived CBD, marijuana-derived CBD (currently a Schedule I controlled substance), and pharmaceutical CBD (currently only Epidiolex). Congressional Interest Congress has expressed concern about the proliferation of CBD products marketed in violation of federal law and has called on FDA to provide guidance on lawful pathways for marketing hemp-derived CBD in food and dietary supplements. In absence of a regulatory framework for hemp-derived CBD, in the explanatory statement accompanying the FY2020 enacted appropriation, Congress directed FDA to issue a policy of enforcement discretion with respect to CBD products that meet the statutory definition of hemp. In addition to the activities directed in the explanatory statement, Congress could also take further legislative action in the future, such as requiring FDA to issue a regulation, under its FFDCA authorities, expressly permitting CBD that meets the definition of hemp to be used as a food additive or dietary supplement. Congress also could amend the FFDCA provisions that FDA has identified as restricting marketing of CBD in food and dietary supplements. In determining whether a legislative approach is appropriate, Congress may consider the potential for adverse health effects and other unintended consequences.", "document_type": "crs"}
{"report": "Whether many provisions of the Federal Food, Drug, and Cosmetic Act (FD&C Act) apply to a particular drug product turns in part on the novelty of the \"active ingredient\" of the drug in question. In particular, the Food and Drug Administration (FDA) must assess the novelty of the active ingredient in a new drug, comparing it to a previously approved drug's active ingredient to determine whether the new drug qualifies for the five-year \"new chemical entity\" (NCE) exclusivity. FDA generally cannot accept new drug applications or abbreviated new drug applications that refer to a drug with NCE exclusivity (i.e., rely on its clinical data and FDA's approval of the drug) for five years. Companies that receive approval for drugs with new active ingredients generally enjoy a competitive advantage in the market while the exclusivity is in effect until generic drugs enter the market. Given how expensive it can be to bring a new drug to market, when Congress passed the Hatch-Waxman Amendments in 1984 to allow an abbreviated pathway for approval of generic drugs, it also created NCE exclusivity to reward innovators of new pharmaceutical products with an opportunity to recoup their investment. To determine whether FD&C Act provisions that depend in part on the drug's \"active ingredient\" apply, FDA must evaluate the \"active ingredient(s)\" of both the drug under review and any previously approved drug that may contain the same active ingredient. This process can be technically quite complicated. For instance, compounds in a final drug product may convert to other compounds through chemical reactions inside the body before arriving at the site of the therapeutic effect, and related but distinct drug molecules may be clinically indistinguishable or convert into the same pharmacologically or physiologically active component inside the body. This phenomenon raises the question of which moleculeâthe one existing before or after ingestionâshould be the relevant molecule for purposes of determining active ingredient. Alternatively, two drug molecules with the same core compound may have different compounds appended to them by either covalent (i.e., shared electrons) or noncovalent (i.e., no shared electrons) bonds. For example, replacing a hydrogen atom in an acid molecule with \"a metal or its equivalent\" forms a salt, whereas replacing the hydrogen atom with \"an organic radical\" forms an ester. These derivatives may or may not vary from each other in clinically significant ways, raising the question of which derivative(s), if any, should be considered as the same active ingredient as the core or base molecule. Generally, a more expansive interpretation of the phrase \"active ingredient,\" that is, one that considers more types of derivatives to be the same active ingredient, reduces the number of drugs eligible for NCE regulatory exclusivity by expanding the drug ingredients considered previously approved, which, in turn, allows for earlier introduction of generic versions of those drugs. As discussed in more detail below, historically, for purposes of the exclusivity provisions, FDA has interpreted \"active ingredient,\" as the term appears in statute, to mean \"active moiety,\" as defined by FDA regulations. FDA generally defines active moiety as the core molecule or ion of a drug (i.e., the drug molecule without certain appendages) that is \"responsible for the physiological or pharmacological action of a drug substance.\" FDA's interpretation has generated disputes between FDA and pharmaceutical companies, as FDA's approach tends to exclude some drugs from being afforded five-year NCE exclusivity under the FD&C Act. In 2015, a federal district court rejected FDA's interpretation as inconsistent with the statutory language, though it did not explicitly invalidate FDA's regulations. This report discusses FDA's interpretation of the FD&C Act as referring to active moieties, judicial review of FDA's interpretation, and how FDA's rationale has changed over time. In the 116th Congress, legislation has been introduced that would generally codify FDA's current approach to evaluating NCE exclusivity and extend that approach to other provisions under the FD&C Act that include the phrase \"active ingredient (including any ester or salt of the active ingredient).\" Multiple provisions of the FD&C Act use the phrase \"active ingredient (including any ester or salt of the active ingredient).\" Among them are a provision for five-year exclusivity to drugs approved under a new drug application (NDA) with active ingredients that FDA has not previously approved, a provision for three-year exclusivity for drugs with the same active ingredient as previously approved drugs that required additional clinical studies for approval due to other changes, and provisions authorizing priority review vouchers for certain types of drugs. In the context of the five-year-exclusivity, which FDA has coined \"new chemical entity\" or NCE exclusivity, FDA interprets the term \"active ingredient\" to mean \"active moiety.\" FDA reasons that this definition, which allows a wider range of molecules to be considered previously approved, is warranted in the new drug context to encourage innovation by ensuring that a new drug is truly innovative. This interpretation of \"active ingredient\" in the NCE exclusivity context has been the subject of a decades-long debate. The statutory provision on NCE exclusivity states, in relevant part, If an application submitted under subsection (b) of this section for a drug, no active ingredient (including any ester or salt of the active ingredient) of which has been approved in any other application under subsection (b) of this section, is approved . . . no application may be submitted under this subsection which refers to the drug for which the subsection (b) application was submitted before the expiration of five years from the date of approval of the application under subsection (b) of this section . . . . Disputes over how FDA should interpret this provision have centered on the meaning of the phrase \"active ingredient (including any ester or salt of the active ingredient).\" The FD&C Act does not define the term \"active ingredient.\" Rather than define \"active ingredient\" for purposes of the exclusivity provisions, FDA examines the relevant drugs' active moieties. Specifically, FDA defines NCE exclusivity in its regulations as \"a drug that contains no active moiety that has been approved by FDA in any other application submitted under section 505(b) of the act.\" The various other exclusivity regulations also refer to active moieties. FDA defines \"active moiety\" in its regulations as follows: Active moiety is the molecule or ion, excluding those appended portions of the molecule that cause the drug to be an ester, salt (including a salt with hydrogen or coordination bonds), or other noncovalent derivative (such as a complex, chelate, or clathrate) of the molecule, responsible for the physiological or pharmacological action of the drug substance. As one court put it, \"[f]or salts, esters, and noncovalent derivatives, a molecule's 'active moiety' can be thought of as its core; salt, ester and noncovalent derivative versions of the same basic molecule have different appendages, but they share the same active moiety.\" Put another way, because these specified derivatives would be considered to have the same \"active moiety,\" if FDA approves a drug containing any one of the specified derivatives as the active ingredient, a later approved drug containing another form of a specified derivative or even the core molecule would not be entitled to NCE exclusivity. For instance, if Drug A contains as its active ingredient a salt , ester , or other noncovalent derivative of a molecule that FDA previously approved as part of Drug B, Drug A would not be entitled to NCE exclusivity because FDA had previously approved that active moiety. Similarly, if Drug B contains as its active ingredient a salt derivative of a molecule, and Drug A contains that same molecule or an ester derivative of that molecule and is approved after Drug B, Drug A would not be entitled to NCE exclusivity. In contrast, if Drug A contained as its active ingredient a non-ester covalent derivative of a molecule that FDA previously approved in Drug B, Drug A could be considered to have a new active moiety and be eligible for NCE exclusivity if other relevant conditions are met. If a drug molecule is converted to a different but related compound after ingestion, the relevant molecule for determining active moiety is the compound in the final drug product before the drug is ingested. In the NCE exclusivity context, FDA's interpretation of \"active ingredient\" as \"active moiety,\" as well as its definition of \"active moiety,\" have both been subject to dispute. Challenges to FDA's approach to NCE exclusivity have generally addressed two questions: 1. Whether FDA may permissibly interpret the phrase \"no active ingredient (including any ester or salt of the active ingredient) of which has been approved\" as \"a drug that contains no active moiety that has been approved.\" 2. Whether FDA has correctly defined \"active moiety,\" including whether FDA may permissibly deny exclusivity forâin addition to \"salts and esters,\" which appear in the statuteâother noncovalent derivatives of the underlying drug molecule. Proposed Rule. In 1989, in its implementing regulations for the Hatch-Waxman Amendments, FDA first interpreted the FD&C Act's exclusivity provisions to distinguish between NCEs, which are entitled to a five-year term of regulatory exclusivity, and previously approved active ingredients, which are entitled to three years of regulatory exclusivity, based on active moieties. To support its interpretation in the proposed rule, the agency relied on the statutory text, FDA's preexisting classification scheme for drugs that included a \"new molecular entity\" class based on active moieties, and the legislative history of the Hatch-Waxman Amendments. FDA reasoned that \"Congress was aware of FDA's classification scheme\" when it passed the Hatch-Waxman Amendments, including FDA's \"longstanding interpretation of the term 'new molecular entity' [as] a compound containing an entirely new active moiety.\" In support of its definition of active moiety, which includes other noncovalent derivatives of a drug molecule in addition to the drug molecule itself and its salt and esters, FDA reasoned that Congress \"did not intend to confer significant periods of exclusivity on minor variations of previously approved chemical compounds.\" FDA did not specifically identify which part of the statutory phrase \"an active ingredient (including any ester or salt of the active ingredient)\" it had determined to be ambiguous when adopting the interpretation of \"active moiety.\" Initial Litigation Rejecting FDA Approach . Between FDA's proposed rule in 1989 and its final rule in 1994 implementing the exclusivity regulations, two cases addressed the agency's interpretation of the phrase \"active ingredient (including any ester or salt of the active ingredient)\" to mean active moiety. In Abbott Laboratories v. Young , the U.S. Court of Appeals for the D.C. Circuit (D.C. Circuit) considered FDA's denial of 10-year exclusivity for Depakote, an anticonvulsant seizure medication that used divalproex sodium as its active ingredient. FDA based its decision on findings that (1)Â divalproex sodium is a salt of valproic acid that converts into valproic acid in the body, and (2)Â the agency previously approved valproic acid as the active ingredient in Depakene. The court determined that the FD&C Act's use of the phrase \" the active ingredient\" is ambiguous, as it could refer to the active ingredient in the original approved drug or in the later approved drug. However, the D.C. Circuit rejected FDA's reliance on the term \"including\" to justify using its definition of active moiety, which extends beyond salts and esters of the active ingredient to other noncovalent derivative molecules, as \" linguistically infeasible.\" Specially, the court concluded that Congress used the term \"including\" in the provision at issue not to provide examples of molecular derivatives undeserving of regulatory exclusivity but to extend the covered active ingredients to the two particular derivativesâesters and salts. Upon concluding that the statute is ambiguous and that FDA failed to provide a reasonable construction, the D.C. Circuit remanded the case to FDA for further actions. Around the same time, the U.S. Court of Appeals for the Federal Circuit (Federal Circuit) considered the U.S. Patent and Trademark Office's (USPTO's) denial of Glaxo's request for a patent-term extension for its patent claiming cefuroxime axetil, the active ingredient in Ceftin tablets. The Hatch-Waxman Amendments require the USPTO to extend the terms of a patent claiming a product or a method of using or manufacturing a product when (1) the product is \"subject to a regulatory review period\" (e.g., the FDA drug approval process) and (2) the permission to market the product following the regulatory review (e.g., FDA approval of the drug) is the \"first permitted commercial marketing or use of the product .\" In turn, the statute defines \"product\" to mean \"the active ingredient of a new drug . . . including any ester or salt of the active ingredient.\" Interpreting the product as the active moiety, the USPTO found that cefuroxime (an acid) rather than cefuroxime axetil (an ester of cefuroxime) was the active moiety in Ceftin. Because FDA had previously approved two drugs with cefuroxime salts as active ingredients, the USPTO determined that FDA's approval of Ceftin was not the \"first permitted commercial marketing or use of the product\" and denied the patent-term extension. The Federal Circuit held that the USPTO's denial of the patent term extension was contrary to law, affirming the district court's judgment. In contrast to the D.C. Circuit, which viewed the relevant statutory language as ambiguous, the Federal Circuit held that the terms in the phrase \"active ingredient of a new drug . . . including any ester or salt of the active ingredient\" all have a plain meaning. The court determinedâwithout discussing its reasoning in any detailâthat the USPTO's interpretation was inconsistent with the plain meaning of these terms. While acknowledging that legislative history can reveal \"a clearly expressed legislative intention contrary to the statutory language,\" it identified no such support for the USPTO's interpretation here. Because the court found there was no clear legislative intent that the phrase be interpreted to refer to variations on the approved active ingredients beyond that product's ester or salt, an extension of the term for the patent claiming cefuroxime axetil was warranted because FDA had not approved that drug product or an ester or salt of it. While the appellate court did not elaborate on how it arrived at its interpretation, the district court had included more detail on the plain meaning of the operative statutory phrase, concluding that cefuroximeâthe acid from which cefuroxime axetil is derivedâcould not be an \"active ingredient\" of Ceftin because it was not an ingredient , as that term is commonly understood because it did not appear in the Ceftin tablets in that form. Final Rule. In the wake of these rulings, public comments to FDA's proposed rule contended that Abbott Laboratories and Glaxo Operations rejected the agency's proposed interpretation of the NCE exclusivity provision, particularly its reliance on the phrase active moieties. Nonetheless, when FDA finalized its NCE exclusivity regulations in 1994, the agency included its proposed definition of \"active moiety,\" but modified its justification. Rather than interpreting the parenthetical phrase (i.e., \"(including any ester or salt of the active ingredient)\") \"broadly to include all active ingredients that are different but contain the same active moiety,\" which the D.C. Circuit in Abbott Laboratories had rejected as \"linguistically impermissible,\" the agency concluded that the term \" active ingredient,\" as used in the relevant provision, means active moiety. FDA did not, however, directly address the Federal Circuit's opinion. FDA also disagreed with comments objecting to its inclusion of other noncovalent derivatives in the definition of \"active moiety,\" meaning that such derivatives would not receive NCE exclusivity. The agency reaffirmed that it \"does not believe that providing exclusivity for . . . noncovalent derivatives of a previously approved active moiety would be consistent with the statutory intent\" because such derivatives \"generally do[] not affect the active moiety of a drug product.\" FDA accordingly enacted the definition of active moiety as proposed. D.C. Circuit Upholds FDA Use of Pre-Ingestion Rather than Post-Ingestion to Interpret Active Ingredient . In 2010, in Actavis Elizabeth LLC v. FDA , the D.C. Circuit revisited FDA's interpretation of \"active ingredient,\" nearly two decades after the agency finalized its regulations in 1994. That opinion focused specifically on the term \"active ingredient\" in the context of whether the relevant molecule should be considered prior to its ingestion in the human body (i.e., the compound in the final drug product pre-ingestion) or after ingestion where the compound may convert to another related compound (e.g., from an ester to an acid) that is responsible for the drug's therapeutic effects (i.e., post-ingestion). A generic manufacturer challenged FDA's award of NCE exclusivity for Vyvanse, a drug that treats attention deficit hyperactivity disorder. Vyvanse's active ingredient is lisdexamfetamine dimesylate, a salt of lisdexamfetamine, meaning that lisdexamfetamine is the active moiety under FDA regulations. Lisdexamfetamine uses an amide bond (a type of covalent bond involving nitrogen) to connect a portion of lysine, a common amino acid, with dextroamphetamine. Once in the body, a chemical reaction converts lisdexamfetamine to dextroamphetamine. FDA had approved drugs with dextroamphetamine but had not yet approved drugs with lisdexamfetamine. Actavis, a generic manufacturer seeking to market a generic version of Vyvanse, alleged that because dextroamphetamine is responsible for the therapeutic effect inside the body and FDA had previously approved drugs with dextroamphetamine, Vyvanse had no right to NCE exclusivity. Focusing on the term \"active,\" Actavis contended that \"active ingredient\" necessarily must refer to \"the drug molecule that reaches the 'site' of the drug's action\" because that is the part of the drug responsible for its \"activity,\" which Activis argued meant the therapeutic effect. The court rejected Actavis's arguments. First, the court observed that the FD&C Act does not define the term \"active ingredient\" and that the statute's legislative history \"is silent on what determines novelty\" for NCE exclusivity. The court also concluded that the statute's structure and purpose did not preclude FDA's interpretation. Accordingly, the court held that (1) \"active ingredient\" is ambiguous as to whether it referred to the pre-ingestion or post-ingestion molecule, and (2) FDA's interpretation of \"active ingredient\" to refer to the pre-ingestion molecule is reasonable. The court further affirmed FDA's choice of a bright-line distinction between noncovalent derivatives (which do not receive NCE exclusivity) and non-ester covalent derivatives (which can receive NCE exclusivity and was at issue for Vyvance). While the D.C. Circuit acknowledged that some noncovalent bonds might alter a drug's properties and some covalent bonds might not, the court deferred to FDA's explanation that \"its policy is based in part on the 'difficulty in determining precisely which molecule, or portion of a molecule, is responsible for a drug's effects.'\" The court did not, however, directly address FDA's use of the term \"active moiety,\" its inclusion of the other noncovalent derivatives in the definition, or the interaction between FDA's definition of active moiety and the statutory parenthetical. District Court Rejects FDA Interpretation of Active Ingredient as Active Moiety. Five years later, in Amarin Pharmaceuticals Ireland Ltd. v. FDA , a federal district court in the District of Columbia expressly considered FDA's interpretation of \"active ingredient\" to mean \"active moiety,\" as defined in its regulations. Amarin had obtained FDA approval for Vascepa , whose active ingredient is icosapent ethyl, the ethyl ester of eicosapentaenoic acid (EPA), a type of omega-3 fatty acid. But FDA denied Amarin's request for NCE exclusivity for Vascepa because it had previously approved Lovaza, a drug whose active ingredient is \"a mixture that is primarily composed of seven kinds of omega-3 fatty acid ethyl esters\" including the ester of EPA. When FDA approved Lovaza, it considered the mixture as a whole the \"active ingredient,\" and it later denied a petition from Lovaza's sponsor requesting FDA to recharacterize Lovaza as having multiple active ingredients on the grounds that \"the Lovaza mixture has not been 'fully characterized.'\" In other words, in approving Lovaza, FDA did not specifically approve an ester of EPA (or any other component omega-3 fatty acid ethyl esters) as an active ingredient. But when evaluating Vascepa's eligibility for NCE exclusivity, FDA relied on new studies to find that EPA was an active moiety of Lovaza and that, accordingly, FDA had previously approved Vascepa's active moiety. Rather than recognize multiple active ingredients in Vascepa, FDA provided a new interpretation framework for certain mixtures to treat them as having one active ingredient but multiple active moieties . In its decision letter to Amarin, FDA acknowledged that the agency had previously taken an inconsistent approach to identifying the active ingredients and active moieties for naturally derived mixtures, such as Lovaza, when evaluating NCE exclusivity. FDA \"explained that, although they are often conflated, it is important to distinguish between the meaning of the terms active ingredient and active moiety.\" And that while \"the distinction between active moiety and active ingredient[] generally is negligible\" for \"drugs that are composed of a single, well-characterized molecule,\" \"the distinction between active ingredient and active moiety . . . becomes crucial\" \"[f]or naturally derived mixtures comprising multiple molecules.\" Critically, the agency distinguished between (1) \"poorly characterized\" and (2) \"well-characterized mixtures\" based on how difficult it is \"'to determine with any certainty . . . which molecules in the mixture are consistently present or potentially are responsible for the physiological or pharmacological activity of the drug.'\" For poorly characterized mixtures, FDA stated that it had \"of necessity\" treated the whole mixture as both the active ingredient and the active moiety. However, for well-characterized mixtures, FDA outlined \"a three-part 'framework' 'for identifying the active moiety or moieties of such mixtures.'\" FDA would consider component parts of well-characterized mixtures to be previously approved active moieties if 1. specific molecules in the mixture have been identified; 2. those specific molecules are \"consistently present in the mixture\"; and 3. those molecules are \"responsible at least in part for the physiological or pharmacological action of the mixture, based on a finding that they make a meaningful contribution to the activity of the mixture.\" In effect, for single-molecule and poorly characterized drugs, FDA would apply a one-to-one approach between the active ingredient and active moiety, but for well-characterized mixtures, it would apply a one-to-many approach: one active ingredient with multiple active moieties. The district court set aside FDA's decision denying NCE exclusivity for Vascepa based on its interpretation of \"active ingredient\" to mean \"active moiety\". The court first relied on the canon against surplusage, finding that FDA's interpretation of the term \"active ingredient\" \"would render the parenthetical clause in the exclusivity provisions either redundant or incomprehensible.\" By defining active moiety to exclude \"those appended portions of the molecule that cause the drug to be an ester, salt . . . or other noncovalent derivative,\" the court concluded that FDA rendered the statutory parenthetical \"(including any ester or salt of the active ingredient)\" either unnecessary or incomprehensible. The court reasoned that FDA in effect read the parenthetical out of the statute by inserting \"active moiety\" in place of \"active ingredient,\" violating the canon against surplusage that assumes Congress does not include unnecessary language in a statute. The court then used the presumption of consistent usage to reject FDA's view of active ingredient as synonymous with active moiety. Significantly, FDA only interpreted active ingredient to mean active moiety with respect to the FD&C Act's exclusivity provisions , relying on alternative interpretations of \"active ingredient\" elsewhere in the statute, such as, perhaps most notably, the provision allowing sponsors to submit abbreviated NDAs for generic drugs with the same active ingredient as an approved drug. FDA argued that it was justified in adopting different interpretations of the same phrase in different parts of the statute because the provisions had different statutory purposes. The agency contended that because the abbreviated NDA process focuses on safety and efficacy, a narrower range of molecules should be considered identical to previously approved drugs to ensure that FDA conducts a full review for safety and efficacy of any drugs that may clinically differ from previously approved drugs. In contrast, FDA argued that the exclusivity provisions aim to encourage innovation, requiring a wider range of molecules to be considered previously approved to ensure the new drug is truly innovative. While acknowledging that \"the presumption of consistent usage is not unrebuttable,\" the court considered FDA's justifications for the differing interpretations of active ingredient unpersuasive. The court observed that Congress passed both provisions at the same time in the same part of the same statute, that the abbreviated NDA provisions and exclusivity provisions were two sides of the same coin intended to balance competition and innovation, and that Congress included the parenthetical \"including any ester or salt of the active ingredient\" in the exclusivity provision but not the abbreviated NDA provision, thus already distinguishing between the two provisions. Finally, the court determined that FDA's use of active moiety was inconsistent with the statutory requirement that the active ingredient \"has been approved.\" It noted that FDA approves active ingredients, not active moieties, and that under FDA's proposed framework it would not even determine the relevant active moiety under another drug applied for exclusivity. Accordingly, an active moiety would never have previously been approved. Rejecting each of FDA's arguments and concluding FDA's interpretation invalid on multiple grounds, the court set aside the specific administrative decision being challenged in that caseâthat is, FDA's exclusivity determination for Vascepaâand remanded to FDA. The court did not, however, explicitly invalidate or set aside FDA's implementing regulations. FDA regulations therefore remain in place, but with questions looming as to their validity and defensibility. Beyond whether FDA can interpret the phrase \"active ingredient\" in the FD&C Act's exclusivity provisions to mean active moiety, how FDA has defined \"active moiety\" has also been the subject of legal challenges. The statutory parenthetical includes esters and salts of an active ingredient as the same active ingredient for determining exclusivity, meaning that an ester and salt of an active ingredient is ineligible for exclusivity. FDA's definition of active moiety extends beyond those two derivatives, however, to also include molecules with other noncovalent appendages . At the same time, the agency excludes from its definition of active moiety molecules with appendages attached through non-ester covalent bonds, meaning that drug molecules that differ from previously approved drugs based on such appendages would be eligible for NCE exclusivity. Brand name manufacturers have challenged including other noncovalent derivatives, which limits the availability of NCE exclusivity, while generic manufacturers have challenged excluding non-ester covalent derivatives, which expands the availability of NCE exclusivity. Other Derivatives with Noncovalent Bonds. As discussed above, Abbott Laboratories v. Young also addressed FDA's inclusion of other noncovalent derivative forms of the molecule in addition to salts and esters, which the statute explicitly includes. At the time, FDA relied on a broad interpretation of the word \"including\" to justify examining the base molecule without salts, esters, or any other component connected by noncovalent bonds. The agency viewed the term \"including\" as providing examples of molecules that would be considered minor modifications that do not merit five-year NCE exclusivity, rather than an exhaustive list. While the Abbott Laboratories court considered FDA's approach defensible on policy grounds, it considered the agency's approach \"linguistically infeasible.\" It stated that it \"cannot agree with [FDA's] unconvincing attempts to employ the 'including' clause to cover all possible permutations of active ingredient,\" distinguishing the NCE exclusivity \"including\" clause \"from instances where an 'including' clause is designed to merely illustrate a few examples of the general category.\" Rather than provide its own interpretation, however, the court remanded the decision to FDA. FDA subsequently modified its interpretation of the statutory language in its 1994 final regulations. Rather than interpret the parenthetical phrase, the agency concluded that the term \"active ingredient\" means \"active moiety,\" as defined in its regulations. In so doing, FDA reaffirmed its view that allowing NCE exclusivity for other noncovalent derivatives would be inconsistent with statutory intent. In 2015, as explained above, Amarin Pharmaceuticals Ireland Ltd. v. FDA rejected FDA's revised interpretation. However, because the court only set aside the challenged agency action at issue in that case without invalidating FDA regulations, FDA regulations remain in force with its original definition of \"active moiety.\" Derivatives with Non-Ester Covalent Bonds. As discussed above, in Actavis Elizabeth LLC v. FDA , the D.C. Circuit upheld FDA's decision to exclude derivatives with different covalent bonds from its definition of active moiety. Unlike noncovalent bonds, covalent bonds entail the sharing of electrons between molecules, which tends to create a stronger bond. The court held that FDA's policy was reasonably \"based on its view that drug derivatives containing non-ester covalent bonds are, on the whole, distinct from other types of derivative drugs such that the former are uniquely deserving of 'new chemical entity' status and the resulting five-year exclusivity.\" In particular, the court pointed to a 1989 response letter from FDA to a citizen petition. In that letter, the agency explained that \"even minor covalent structure changes are capable of producing not only major changes in the activity of the drug but changes that are not readily predicted.\" Nonetheless, FDA observed that \"the formation of a salt . . . or of an ester, is not intended to, and generally cannot, alter the basic pharmacologic or toxicologic properties of the molecule.\" Accordingly, without holding directly on whether FDA reasonably included other noncovalent derivatives in its active moiety definition, the court held that FDA's exclusion of non-ester covalent derivatives was reasonable. Against this backdrop of decades of complex litigation over FDA's interpretation of active ingredient, three bills have been introduced in the 116th Congress that address this issue. Each proposed legislation would generally (1) codify FDA's interpretation that eligibility for NCE exclusivity should be based on the drug's active moiety and (2) incorporate FDA's definition of active moiety by reference. Specifically, the proposed legislation would do so by replacing the entire phrase \"active ingredient (including any ester or salt of the active ingredient)\" with \"active moiety (as defined by the Secretary in section 314.3 of title 21, Code of Federal Regulations (or any successor regulations))\" wherever it is found, except for a few provisions that expired in 1984. This change would be made to several FD&C Act provisions, including the NCE exclusivity provision, three-year exclusivity for other changes, and provisions providing priority review vouchers for tropical disease treatments, rare pediatric disease treatments, and countermeasures for agents that threaten national security. Adopting this interpretation would resolve certain legal uncertainties under current case law. In Amarin Pharmaceuticals v. FDA , the court rejected FDA's interpretation but did not explicitly invalidate FDA's regulations. Though it left FDA's interpretation in place, the court's decision left uncertain FDA's ability to defend its interpretation going forward. The proposed legislation would address those questions by adopting FDA's interpretation. The proposed legislation would also resolve the questions that have been raised as to whether FDA's decision to include other noncovalent derivative forms of the molecule in its definition of active moiety, but not other covalent derivatives, accords with congressional intent and a justifiable distinction. The proposed legislation would both adopt FDA's current approach, by incorporating FDA's current definition, and allow FDA to modify its approach going forward as its understanding changed, by including any successor regulations. In effect, the proposed legislation would commit the decision as to which molecules should be deemed effectively the same and therefore not innovative enough to merit NCE exclusivity to FDA's judgment.", "summary": "Whether many provisions of the Federal Food, Drug, and Cosmetic Act (FD&C Act) apply to a particular drug product turns in part on the novelty of the \"active ingredient\" of the drug in question. In particular, the Food and Drug Administration (FDA) must assess the novelty of the active ingredient in a new drug, comparing it to a previously approved drug's active ingredient to determine whether the new drug qualifies for the five-year \"new chemical entity\" (NCE) exclusivity. FDA generally cannot accept new drug applications that refer to a drug with NCE exclusivity (i.e., rely on its clinical data and FDA's approval of the drug) for five years. Companies that receive approval for drugs with new active ingredients generally enjoy a competitive advantage in the market while the exclusivity is in effectâand after, depending how long it takes for generic versions to receive approval once applications can be submitted. Comparing active ingredients can be technically quite complicated. For instance, compounds in a final drug product may convert to other compounds through chemical reactions inside the body before arriving at the site of the therapeutic effect. In addition, related but distinct drug molecules may be clinically indistinguishable or convert into the same pharmacologically or physiologically active component inside the body. Alternatively, two drug molecules with the same core compound may have different compounds appended to them by either covalent or noncovalent bonds. For example, replacing a hydrogen atom in an acid molecule with \"a metal or its equivalent\" forms a salt, while replacing the hydrogen atom with \"an organic radical\" forms an ester. These derivatives may or may not vary from each other in clinically significant ways. This raises the question of which derivative(s), if any, should be considered to be the same active ingredient as the core or base molecule. Generally, a more expansive interpretation of phrase \"active ingredient,\" that is, one that considers more types of derivatives to be the same active ingredient, reduces the number of drugs eligible for NCE regulatory exclusivity by expanding the drug ingredients considered previously approved, which allows for earlier introduction of generic versions of those drugs. Historically, for the exclusivity provisions, FDA has interpreted \"active ingredient\" to mean \"active moiety,\" as defined by FDA regulations. FDA generally defines active moiety as the core molecule or ion of a drug (i.e., the drug molecule without certain appendages) that is \"responsible for the physiological or pharmacological action of a drug substance.\" FDA's interpretation has generated disputes between FDA and pharmaceutical companies, as FDA's approach tends to exclude some drugs from being afforded five-year NCE exclusivity under the FD&C Act. In 2015, a federal district court rejected FDA's interpretation as inconsistent with the statutory language, though it did not explicitly invalidate FDA's regulations. In the 116th Congress, legislation has been introduced that would generally codify FDA's current approach to evaluating NCE exclusivity and extend that approach to certain other provisions under the FD&C Act. This proposed legislation would moot questions about the validity of FDA's interpretation and clarify when chemical entities are sufficiently similar to be considered identical for purposes of drug approval and exclusivity.", "document_type": "crs"}
{"report": "As the term is currently being discussed, surprise billing typically refers to situations where a consumer is unknowingly, and potentially unavoidably, treated by a provider outside of the consumer's health insurance plan network and, as a result, unexpectedly receives a larger bill than he or she would have received if the provider had been in the plan network. Most recently, in federal policy discussions, surprise billing has commonly been discussed in the context of two situations: (1) where an individual receives emergency services from an out-of-network provider and (2) where a consumer receives nonemergency services from an out-of-network provider who is working in an in-network facility. However, surprise billing may occur in other situations (e.g., ground ambulance and air ambulance services) where consumers are unknowingly and unavoidably treated by an out-of-network provider. As these situations imply, surprise billing is rooted in most private insurers' use of provider networks. Therefore, this report begins with a discussion of the relationship between provider network status and private health insurance billing before discussing existing federal and state requirements around surprise billing. This report then discusses various policy issues that Congress may want to consider when assessing surprise billing proposals. Such policy topics include what plan types should be addressed; what types of services or provider types should be addressed; what types of consumer protections should be established; what requirements (including financial requirements) should be placed on insurers, providers, or both; how these policies will be enforced; and what is the role of the state. The list of topics discussed in this report is not exhaustive but should touch on many aspects of the surprise billing proposals currently under consideration. The report also briefly discusses potential impacts of the various surprise billing approaches. It then concludes with an Appendix table comparing two federal proposals that have gone through committee markup procedures. Specifically, the proposals included in the appendix are Title I of S. 1895 (Alexander), which went through a Senate Committee Health, Education, Labor, and Pensions (HELP) markup session on June 26, 2019, and Title IV of the amendment in the nature of a substitute (ANS) to H.R. 2328 , which went through a markup session held by the House Committee on Energy and Commerce on July 17, 2019. As of the date of this report, no other proposals have been approved through committee markup or gone further in the legislative-making process. The charges and payments for health care items or services under private health insurance are often the result of the contractual relationships between consumers, insurers, and providers for a given health plan. Health care providers establish dollar amounts for the services they furnish; such amounts are referred to as charges and reflect what providers think they should be paid. However, the actual amounts that a provider is paid for furnishing services vary and may not be equal to the provider-established charges. The amounts a provider receives for furnished services, and how the payment is divided between the insurer and the consumer, can vary due to a number of factors, including (but not limited to) whether a given provider has negotiated a payment amount with a given insurer, whether an insurer pays for services provided by out-of-network providers, enrollee cost-sharing requirements, whether a provider can bill the consumer for an additional amount above the amounts paid by the consumer (in the form of cost sharing), and the insurer. Figure 1 highlights the effects of the aforementioned distinctions. The following sections discuss them in the context of in-network and out-of-network billing. Under private insurance, the amount paid for a covered item or service is often contingent upon whether a consumer's insurer has contracted with the provider. Insurers typically negotiate and establish separate contracts with hospitals, physicians, physician organizations (such as group practices and physician management firms), and other types of providers. For each provider where such a contract exists with a particular insurer, that provider is then generally considered to be a part of that insurer's provider network (i.e., that provider is considered in network ). The contents of contracts between insurers and providers vary and typically are the result of negotiations between providers and insurers; however, these contracts generally specify the amounts that providers are to receive for providing in-network services to consumers (i.e., negotiated amounts ). Negotiated amounts typically are lower than what providers would otherwise charge, had they not contracted with an insurer. When an in-network provider furnishes a service to a consumer, the insurer and consumer typically will share the responsibility of paying the provider the negotiated amount established in the contract. The consumer's portion of the negotiated amount is determined in accordance with the cost-sharing requirements of the consumer's health plan (e.g., deductibles, co-payments, coinsurance, and out-of-pocket limits; see Figure 1 ). Consumers who receive covered services from in-network providers generally have lower cost-sharing requirements than consumers who receive the same services out of network. Generally, in-network providers are contractually prohibited from billing consumers for any additional amounts above the negotiated amount (i.e., balance bill). In instances where a contract between an insurer and provider does not exist, the provider is considered out of network. The total costs for services furnished by an out-of-network provider, and who pays for such services, depend on a number of factors; one key factor is whether the plan covers out-of-network services in the first place. Generally, point of service plans and preferred provider organization (PPO) plans cover out-of-network services, whereas exclusive provider organization plans and health maintenance organization (HMO) plans generally only cover services by providers within the plan's network (except in an emergency). In instances where an insurer pays some amount toward out-of-network services, both the consumer and the insurer contribute some amount to the provider, with the consumer's amount determined in accordance with the plan's cost-sharing requirements. Consumer cost-sharing requirements for services provided by an out-of-network provider may be separate from (and are typically larger than) cost-sharing requirements for the same services provided by an in-network provider. For example, a plan may have different deductibles for in-network and out-of-network services. Table 1 provides an example of how cost-sharing requirements may differ for in-network and out-of-network services. Although cost-sharing requirements will indicate how the cost for the service is shared between an insurer and a consumer, the insurer needs to determine the total amount that cost-sharing requirements will be based on (since there are no negotiated amounts established in contracts between out-of-network providers and insurers). The amount ultimately determined by the insurer is often referred to as the total allowed amount and does not necessarily match the negotiated amount insurers may have contracted with other providers or the provider charge amount for that service. If a total allowed amount is larger than a negotiated rate, then the consumer's payment for out-of-network services could be larger than a corresponding payment for in-network services because of increased cost sharing, as per the terms of the plan and the fact that the total cost of services on which consumer cost sharing is based is larger. Insurers have their own methodologies for calculating the total allowed amount. They may do so by incorporating the usual, customary, and reasonable rate (UCR), which is the amount paid for services in a geographic area based on what providers in the area usually charge for the same or similar medical services. If an out-of-network provider's total charge for a service exceeds the total allowed amount (and if allowed under state law), the provider may directly bill (i.e., balance bill ) a consumer for the amount of that difference (sometimes referred to as the excess charge ; see Figure 1 ). The consumer would therefore be responsible for paying amounts associated with any cost-sharing requirements and the balance bill. The provider is responsible for collecting any balance bill amounts; from an administrative standpoint, it is considered more difficult to collect these balance bill amounts than to collect payments from insurers. In some instances, providers may ultimately settle with balance-billed consumers for amounts that are less than the total balance bill. There are no federal restrictions on providers balance billing consumers with private health coverage. If the insurer pays only for in-network services, the consumer is responsible for paying the entire bill for out-of-network services (represented in Figure 1 as \"Out-of-Network Services Not Covered Under Plan\"). Although the consumer pays the provider in this instance, the consumer costs are not technically cost sharing (since the insurer is not sharing costs with the consumer), nor are they the balance remaining after the provider receives certain payments. Therefore, this report refers to these costs as other c onsumer c osts . Similar to balance bills, providers are responsible for collecting these other consumer costs and ultimately may decide to settle with the consumer for amounts that are less than the initial provider charges. Currently, no federal private health insurance requirements address surprise billing; however, federal requirements do address related issues. The Affordable Care Act (ACA; P.L. 111-148 , as amended) established requirements regarding consumer cost sharing for, and plan coverage of, out-of-network emergency services and consumer cost-sharing requirements for ancillary provider services furnished at in-network facilities. As a result of the ACA, if a self-insured plan or a fully insured large-group plan, small-group plan, or individual-market plan covers services in a hospital emergency department, the plan is required to cover emergency services irrespective of the provider's contractual status with the plan. In other words, insurers of plans that cover in-network emergency services are effectively required under the ACA to contribute some amount to a provider that furnishes out-of-network emergency services to an enrolled consumer, even if the insurer otherwise would not contribute any amount for services furnished by other types of out-of-network providers. More specifically, insurers are required to recognize the greatest of the following three payment standards as the total allowed amount for emergency services: (1) the median amount the insurer has negotiated with in-network providers for the furnished service; (2) the usual, customary, and reasonable amount the insurer pays out-of-network providers for the furnished service; or (3) the amount that would be paid under Medicare for the furnished service. (Insurers may recognize another amount as the total allowed amount provided such amount is larger than all three of the aforementioned amounts.) After determining the appropriate total allowed amount, the insurer and the consumer each will pay the provider a portion of the total allowed amount, according to the cost-sharing requirements of the consumer's plan. The ACA requirement also addressed a consumer's payment responsibility vis-Ã -vis her health plan for out-of-network emergency care. Specifically, when a consumer receives emergency services from an out-of-network provider, the ACA limits a consumer's cost sharing, expressed as co-payment amount or coinsurance rate, to the in-network amount or rate of the consumer's health plan. In other words, if a consumer receives out-of-network emergency services and is enrolled in a plan that has a 15% coinsurance rate for in-network services and a 30% coinsurance rate for out-of-network services, the consumer will be responsible for 15% of the total allowed amount for the out-of-network care. The requirement does not address the plan deductible or out-of-pocket limits. Therefore, if a plan has separate deductibles and out-of-pocket limits for in-network and out-of-network services, then the plan may require that consumer payments for out-of-network emergency services be applied to these out-of-network amounts. As a result, although a consumer would be subject to in-network co-payment amounts or coinsurance rates, the consumer may still be responsible for greater cost sharing than if the payments for the services were applied to the in-network deductible and out-of-pocket limit. The requirement does not limit a provider from balance billing the consumer after receiving consumer cost-sharing and insurer payment amounts. Individual-market and small-group plans must adhere to network adequacy standards in order to be sold on an exchange. As part of these standards, plans with provider networks must count consumer cost sharing for an essential health benefit furnished by an out-of-network ancillary provider at an in-network facility toward the consumer's in-network out-of-pocket maximum, unless the plan provides a notice to the consumer prior to the furnishing of such services. Although there are no federal requirements that directly address surprise billing, at least half of states have implemented policies to address some form of surprise billing. As of July 2019, 26 states had addressed surprise billing for emergency department services and 19 states had addressed surprise billing for nonemergency care at in-network hospitals. State policies to address surprise bill vary and, as a result, have created different sets of requirements on insurers and providers to establish different sets of protections for consumers. However, state surprise billing laws are consistent in that they do not apply requirements to self-insured plans (see text box below). Multiple research organizations have highlighted the differences among state policies. They have shown whether state surprise billing policies (1) determine the amounts or methodologies by which providers are paid by insurers and consumers for specified out-of-network services; (2) include transparency standards for providers and insurers (e.g., notification requirements on providers or requirements on insurers with respect to provider directory maintenance), (3) address different types of provider settings and services, and (4) address different types of plans (i.e., HMO or PPO). The National Academy of State Health Policy (NASHP) examined the differences between the eight states with surprise billing laws. As an example of the variance between states, NASHP indicated that the eight states varied in terms of how the total allowable amount is set under the laws. Further, two states set payment standards based on a greater of multiple benchmark rates, one state sets payment standards based on a lesser of multiple benchmark rates, one state sets payment standards based on the commercially reasonable value , one state sets payment standards based on the rates set under a regulatory authority within the state, and four states create a dispute-resolution process to resolve surprise balance bills. In addition to the often-discussed out-of-network emergency services provided in facilities and services provided by out-of-network providers at in-network facilities, some states have attempted to regulate ground and air ambulance surprise billing, albeit to a lesser extent. Although states have attempted to regulate air ambulances, they have been limited in their ability to do so as a result of the Airline Deregulation Act of 1978 ( P.L. 95-504 ), which preempts state regulation of payment rates for certain air transportation carriers (including air ambulances). Federal surprise billing proposals, like state laws, typically seek to address the current financial relationships between insurers, providers, and consumers for certain services. In doing so, the proposals generally would establish new requirements on insurers, providers, or both in specified billing situations to create a degree of consumer protection. As an example, requirements on insurers may address how the insurer pays for specified services or what consumer cost-sharing requirements would be under specified plans. Requirements on providers may address the extent to which providers may balance bill consumers. Requirements on both entities may establish the terms under which insurers and providers participate in alternative dispute resolution processes (e.g., arbitration) to determine the amount providers are paid by insurers and consumers for surprise bills. Surprise billing can be addressed in a variety of ways, and the following sections discuss questions policymakers may want to consider when evaluating these different approaches. The following policy discussions are examples of the types of questions policymakers may want to consider when evaluating surprise billing proposals and should not be treated as an exhaustive list. Furthermore, due to the development, introduction, and modification of numerous federal proposals on this topic during the 116 th Congress, the policy discussions in this section of the report generally do not include specific references to any current or historical federal proposals. The report references state surprise billing laws to provide examples and context, but such references should not be considered comprehensive references of all applicable state laws. Although specific federal policies are not explicitly discussed in this section of the report, the report concludes with an Appendix that provides side-by-side summaries of the two surprise billing proposals from the 116 th Congress that have passed through committee markups, both as part of larger bills. Specifically, the proposals included in the appendix are Title I of S. 1895 (Alexander), which went through a Senate Committee on Health, Education, Labor, and Pensions (HELP) markup session on June 26, 2019, and Title IV of the amendment in the nature of a substitute (ANS) to H.R. 2328 , which went through a markup session held by the House Committee on Energy and Commerce on July 17, 2019. Federal private health insurance requirements generally vary based on the segment of the private health insurance market in which the plan is sold (individual, small group, large group, and self-insured). Some requirements apply to all market segments, whereas others apply only to selected market segments. For example, plans offered in the individual and small-group markets must comply with the federal requirement to cover the essential health benefits; however, plans offered in the large-group market and self-insured plans do not have to comply with this requirement. States, in their capacity as the primary regulators of health insurance plans, can regulate fully insured plans in the individual, small-group, and large-group markets. States are not able to directly apply surprise billing requirements to self-insured plans, but certain state requirements may affect state residents enrolled in a self-insured plan. For example, at least one state (New Jersey) has allowed self-insuring entities to opt in to surprise billing requirements. Relatedly, state requirements on providers may affect consumers with self-insured coverage. For example, New York established an arbitration process for certain surprise billing situations, which applied to providers and fully insured plans. This arbitration process did not apply to self-insured plans. However, results from a National Bureau of Economic Research working paper suggest the policy affected consumers with both fully insured and self-insured plans. The authors hypothesized that because most providers were unaware of whether the consumer's plan was fully insured or self-insured, providers billed amounts that were \"likely chosen to reflect the possibility of arbitration.\" In light of this example, to the extent that a federal proposal would establish requirements on providers for consumers enrolled in plans in a specific market segment (e.g., only self-insured plans), providers may need to develop processes to determine whether a consumer has such a plan, as this information is not necessarily available to the provider when services are furnished. Broadly applying a provider requirement so that it addresses consumers enrolled in all types of health plans would minimize the potential that consumers inadvertently receive a surprise bill. Many federal proposals would be broadly applicable to self-insured and fully insured individual, small-group, and large-group private health insurance plans, though there has been some variance with respect to certain types of plans (e.g., Federal Employees Health Benefits [FEHB] Program plans). Federal surprise billing proposals from the 116 th Congress have commonly focused on variants of two different types of services: (1) where an individual receives emergency services from an out-of-network provider and (2) where an individual receives services from an out-of-network provider that is working at an in-network facility. For context on the prevalence of surprise billing, a recent study estimated that 20% of hospital inpatient admissions from an emergency department, 14% of outpatient visits to an emergency department, and 9% of elective inpatient admissions in 2014 were likely to produce surprise medical bills (i.e., were \"cases in which one or more providers were out of network and the patient was likely to be unaware of the provider's status or unable to choose an in-network provider for care instead\"). Another study found that the prevalence of similarly defined \"surprise\" out-of-network billing increased for emergency department visits and inpatient admissions between 2010 and 2016. Researchers have suggested that surprise billing tends to occur around these particular types of services due to a unique set of market forces that differentiate these services from how other services function within the provider-insurer-consumer relationship. Many providers decide to join an insurer's network (thereby accepting a lower negotiated rate for services) knowing that by doing so, the insurer will steer their enrollees toward in-network providers. Insurers steer their enrollees toward in-network providers by limiting plan coverage to in-network providers only or providing more generous coverage for in-network providers as compared with other out-of-network providers (i.e., reduced cost sharing). This approach effectively disincentives consumers from seeking out-of-network care in most situations. However, in the aforementioned billing situations, consumers are not necessarily able to choose an in-network provider. For example, a consumer may be unconscious due to a medical emergency and unable to decide whether he or she wants to be seen by an in-network or out-of-network emergency provider. In this instance, the consumer may be taken to the nearest hospital emergency department (without consideration of network status of the hospital and/or the emergency department providers within the hospital). As another example, consumers may be able to select or seek out a particular in-network hospital or in-network surgeon for a specific procedure, but the consumers are unlikely to be able to select every provider participating in that specific procedure. This is especially true if the consumer is unaware of the need for additional assistance when he or she arranges the procedure. Considering this, certain emergency and ancillary providers may have fewer incentives to join the network of a health insurer, since they are more likely to receive constant demand for their services regardless of network status and consumer choice. Instead, these provider types may find it more beneficial to stay out of network in order to be able to charge more for their services than the negotiated rate they would accept had they been considered in network. However, surprise billing is not limited to the aforementioned situations. It can occur in other situations (e.g., ambulance services or in situations where an in-network physician sends a consumer's lab test to an out-of-network lab). Some federal surprise billing proposals address air ambulance services, albeit fewer than address emergency services and services provided by out-of-network providers at in-network facilities. Air ambulances are similar to the previously discussed situations in that consumers often are not able to choose an in-network air ambulance due to the urgency associated with the request for services. In addition, the \"relative rarity and high prices charged [by air ambulance providers] reduces the incentives of both air ambulance providers and insurers to enter into contracts with agreed-upon payment rates.\" For context, the Government Accountability Office found, as a result of its analysis of FAIR Health claims data, that 69% of air ambulance transports for privately insured consumers were out of network. In conclusion, surprise billing proposals may address one or multiple different types of situations. To the extent that the proposals address multiple situations, they may treat such situations similarly or may apply different types of requirements to each situation. In surprise billing situations, the consumer is typically the one being surprised. Correspondingly, proposals seeking to address surprise billing situations generally include provisions that would establish consumer protections. Most federal surprise billing proposals from the 116 th Congress generally address consumer financial liabilities in these situations. Generally, they do so by tying consumer cost sharing (in some capacity) to what cost sharing would be had specified services been provided in network and by limiting the extent to which consumers can be balance billed for specified services. In addition, some federal proposals incorporate various requirements designed to inform consumers so they can make more informed choices about seeing in-network or out-of-network providers. In current federal proposals, this has most commonly taken the form of consumer notification requirements, which are designed to inform the consumer, prior to receiving out-of-network services, that he or she might be seen by an out-of-network provider (among other pieces of information). Some federal proposals link such notification requirements with consumer financial protections, so that the consumer financial protections would not apply in instances where notification requirements were satisfied (e.g., a consumer may be balanced billed only if the provider satisfied consumer notification requirements). The aforementioned financial protections and notification requirements typically are established by creating requirements on insurers, providers, or both. They may take a variety of forms, as discussed in the subsequent sections. As stated in the \" Private Health Insurance Billing Overview \" section, privately insured consumers may be liable for three types of consumer financial responsibilities when receiving services: cost sharing, balance bills, and other consumer costs. In out-of-network situations, consumers with plans that cover out-of-network benefits would potentially be responsible for consumer cost sharing and balance bills, whereas consumers with plans that do not cover out-of-network benefits would be responsible for other consumer costs. Surprise billing requirements may address any combination of these three consumer financial responsibilities (cost sharing, balance billing, and other consumer costs), which would have direct implications on the total amount that consumers pay, and the total amount that providers receive as payment, for these services. Cost-sharing and balance billing requirements would affect those consumers with plans that cover services provided by out-of-network providers, whereas other consumer cost requirements would affect insured consumers with plans that do not cover services provided by out-of-network providers. The following sections discuss how surprise billing requirements associated with each of these financial responsibilities may be structured. Consumer cost sharing for specified out-of-network services could be limited by defining, through requirements on plans, consumer cost-sharing rates for out-of-network services. Most federal proposals generally include cost-sharing requirements that tie cost sharing (in some capacity) to corresponding in-network requirements. One study of state-level surprise billing laws indicated that state-level laws generally included similar cost-sharing requirements. Although it has been common to tie out-of-network cost sharing to in-network requirements (e.g., the same co-payment amount or the same coinsurance percentage) for certain services, cost sharing could be tied to any rate or amount. Cost-sharing requirements do not need to apply to deductibles, coinsurance rates, co-payment amounts, and out-of-pocket limits. For example, under current federal law, when a consumer receives emergency care from an out-of-network provider, the cost-sharing requirement, expressed as a co-payment or coinsurance rate, is limited to the in-network amount or rate of the consumer's health plan. Cost sharing does not address the plan deductible or out-of-pocket maximum. Therefore, under this requirement, insurers may apply out-of-network deductibles and out-of-pocket maximums for emergency services if such cost-sharing requirements generally apply to out-of-network benefits, which could increase the amount owed by the consumer as compared with a requirement that aligned the deductible, co-payment amount, coinsurance rate, and out-of-pocket limit. Cost-sharing requirements do not necessarily specify the total dollar amount that a consumer pays for out-of-network services. For example, coinsurance is based on a percentage of the amount recognized by the insurer as the total cost of care. Therefore, the total cost-sharing dollar amount a consumer ultimately pays for care also may be influenced by any provisions that establish methodologies for determining the total cost of care for specified surprise billing situations. Establishing limitations on cost-sharing requirements alone does not prohibit or limit the extent to which a consumer may be balance billed (in instances where the plan covers out-of-network services). Therefore, if policymakers were interested in defining the extent to which a provider may balance bill a consumer (if at all), such language also would need to be included. Requirements that insulate consumers from balance billing may be placed on providers or insurers. For example, language may explicitly prohibit, fine, or limit the extent to which a provider can directly balance bill a consumer. By contrast, language may require insurers to \"hold the consumer harmless\" and pay the provider \"their billed charges or some lower amount that is acceptable to the provider.\" From the consumer's perspective, both types of requirements would have similar effects, in that both requirements would result in the consumer only being responsible for paying the cost sharing associated with the service. According to one study of state-level surprise billing laws, 28 states had incorporated provisions (as of July 31, 2019) that insulated consumers from certain balance bills through requirements on insurers, providers, or both. Surprise billing proposals may be structured so that consumers with a plan that does not cover out-of-network services (e.g., HMO) are treated differently in surprise billing situations than consumers with plans that do cover out-of-network services (e.g., PPO). For example, a surprise billing proposal may be structured so it applies only to consumers with plans that cover out-of-network benefits (i.e., it would not address other consumer cost situations). In other words, this type of policy could reduce a consumer's financial liabilities in surprise billing situations if the consumer were enrolled in a plan with out-of-network benefits, but it would not address the consumer's financial liabilities if the consumer were enrolled in a plan that does not cover out-of-network benefits. Alternatively, proposals may define the financial liability individuals face for receiving out-of-network care while enrolled in a plan that does not cover out-of-network benefits. Such requirements would effectively define the other consumer cost (i.e., the total cost of care) and could incorporate similar methodologies used in other surprise billing laws (e.g., benchmark). Without any additional requirements, the consumer would still be responsible for the entire other consumer cost. Proposals also could include provisions that require insurers to cover a portion of the other consumer cost, effectively requiring the consumer's plan to cover that particular benefit. This could occur because of language that explicitly requires plans to cover a particular benefit or defines the amount that a plan must contribute for specified services. To date, many federal surprise billing proposals have addressed other consumer costs by requiring insurers to cover a portion of such costs. Many federal proposals have done this by making surprise billing provisions that limit consumer costs in surprise billing situations to a specified amount (e.g., in-network cost sharing) and require insurers to contribute some amount to providers applicable to all plans, irrespective of whether a plan would cover such out-of-network service. Because surprise billing may occur when a consumer is unknowingly treated by a provider outside of the consumer's health insurance plan's network, surprise billing proposals may include a variety of requirements that would seek to provide consumers with more information about the providers in their network and/or the care they are to receive in order to make an informed decision about their medical care providers. Such requirements alone would not eliminate surprise billing but could reduce the prevalence of unexpected out-of-network use, which in turn would decrease the prevalence of surprise billing. The effectiveness of such provisions in reducing surprise billing is tied to the extent to which consumers can use the new information to decide whether to receive services from an out-of-network provider (e.g., consider information utilization in emergency situations). In the surprise billing context, consumer notifications typically are discussed as a way to provide various pieces of information (e.g., about provider network status and estimates of related financial responsibilities) to consumers prior to the receipt of services so consumers can make informed decisions about their medical care providers. This type of requirement can apply to insurers, providers, or both. If considering a notification requirement, policymakers may want to identify what information should be included within a notification requirement. For example, the notification may be structured to include the provider's and/or facility's network status, the estimated costs of the services, the provider's ability to bill the consumer for amounts other than plan cost-sharing amounts, or any other piece of information that policymakers feel needs to be provided to consumers. In addition, policymakers may want to address who is responsible for providing the notice to the consumer (i.e., insurer or provider), when the notice must be provided to the consumer, and if and when the consumer must provide consent to the notice. Notice requirements should account for any limitations on the types of services and settings that would be subject to such requirement and the consumer's ability to use (and, where applicable, consent to) such information (e.g., emergency situations or complications mid-procedure). Furthermore, any notification requirement should account for whether the insurer or provider subject to the notification requirement has access to the information that is required to be included in the notice. A notification requirement may be coupled with consumer financial liability protections. For example, some federal proposals apply consumer financial liability protections in some surprise billing situations (e.g., non-emergent care) only when a provider does not adhere to a corresponding notification requirement. Provider directories contain information for consumers regarding the providers and facilities that are in a plan network. Provider directory requirements may fall on insurers and providers. Insurers typically are responsible for developing and maintaining the directory; however, the information used to populate the provider directory typically comes from the providers. If considering provider directory requirements, policymakers may want to identify what information is included in the directory, how the information is made available to the consumer (e.g., posted on a website), and how often the directory needs to be updated or verified. A provider directory requirement may be coupled with consumer financial liability protections. In these instances, policymakers may consider how financial liability protections would interact with provider directory requirements. For example, financial liability protections could be limited to situations where a consumer receives services from a provider based on incorrect provider directory information. In considering surprise billing proposals, there has been debate around how to shield consumers from receiving unexpected and likely large bills from out-of-network providers that the consumer did not have the opportunity to choose while balancing the impact of establishing a method for ensuring payment for those services. Proposals to address surprise billing situations have generally sought to address the lack of a contractual relationship between insurers and out-of-network providers by establishing standards for determining the total provider payment and the insurer payment net of specified consumer cost sharing. Other methods have sought to create network requirements that would reduce the probability that a consumer would be treated by an out-of-network provider at an in-network facility. The following sections will discuss these different types of requirements. As discussed in the \" Private Health Insurance Billing Overview \" section, in general, payment for out-of-network services depends on whether the plan covers out-of-network benefits. Regardless of whether or not a plan provides out-of-network benefits, there is no contract establishing a set payment rate between an insurer and an out-of-network provider. If an insurer provides out-of-network benefits, the insurer determines the amount it will pay and the provider can balance bill consumers. If an insurer provides no out-of-network benefits, the insurer will not pay anything toward the out-of-network service. Both scenarios are subject to state and federal law that may define the amount insurers pay out-of-network providers in certain situations (e.g., federal requirements related to emergency services, state surprise billing laws).Â  Most federal proposals in the 116 th Congress to address surprise billing situations include provisions establishing methodologies for determining how much insurers must pay out-of-network providers in specified surprise billing situations. To date, proposals have focused on two main methods for determining the financial responsibility of insurers. One approach has been to select a benchmark payment rate that would serve as the basis for determining a final payment amount that a provider must be paid for a service. The other approach has been to establish an alternative dispute resolution process, such as arbitration, with provider payment determined by a neutral third party. The final payment amount determined by either approach may affect consumer cost sharing to varying degrees based on a consumer's plan. For example, under a plan that has a coinsurance to determine a consumer's cost sharing for a service, rather than a co-payment, the amount that the consumer would be responsible for would depend on the final payment rate for a service. In addition to discussing the benchmark and arbitration approaches, this section includes a discussion on using a bundled payment approach . In this approach, an insurer makes one payment (net of cost sharing) to a facility, and that facility then is responsible for paying providers practicing within the facility. Following that discussion will be a section on the possibility of establishing network requirements to address surprise billing situations, including network matching. When considering a proposal that establishes a method for determining payment rates, policymakers may want to consider a number of factors; these factors include, but are not limited to, the potential effects on the financial viability of providers and the financial impact on health insurers, which in turn may affect health insurance premiums. This may include consideration of the cost and burden associated with establishing payment rates and the predictability of each method for determining payment rates. In addition, policymakers may want to consider the extent to which these payment models would apply uniformly to all types of plans, services, and/or providers. The various options all have trade-offs, and the relative effect of a given proposal on providers and insurers might vary depending on the local health care market structure. A full assessment of the different choices is beyond the scope of the report. Policy solutions for surprise billing situations that involve setting out-of-network payment rates may have secondary effects that result from potential changes in relative leverage between insurers and providers. For example, a proposal that would establish higher out-of-network rates than in-network rates previously agreed upon between providers and insurers for certain services may encourage some providers to go out of network or remain out of network to obtain the higher rate. This may lead insurers to raise in-network rates for these services to incentivize providers to join networks. If this response subsequently leads to higher average in-network rates as well as out-of-network rates (along with increased out-of-network coverage), then it may result in higher premiums in the market. Conversely, if the proposal lowers out-of-network payment rates below in-network rates previously agreed upon between providers and insurers, the proposal may increase the amount of leverage insurers have when negotiating with providers for network inclusion, creating downward pressure on in-network payment rates. Federal surprise billing proposals that use a benchmark approach involve tying payment to a reference price, such as Medicare rates or market-based private health insurer rates. A benchmark-based surprise billing proposal would be structured to specify one or more benchmarks and a methodology for calculating a final payment rate. Some recent federal proposals would require insurers to pay an out-of-network provider a rate tied to the payment for that service under Medicare. Studies have shown that Medicare rates for physician services provided by specialists most often involved in surprise billing situations (e.g., pathology, anesthesiology, radiology) generally are lower than commercial rates paid by insurers in the private health insurance markets. Policymakers seeking to adjust for the differences between Medicare and commercial rates may structure payment as a percentage of Medicare rates. For example, some surprise billing state laws establish private health insurance rates for certain services at Medicare plus an added percentage. As compared with a Medicare benchmark approach, a market-based benchmark approach may raise different questions that need to be considered in order to determine the most appropriate reference price on which to base payment. Determining the market data that will provide the foundation for a benchmark for out-of-network payment rates is critical, as the effect may go beyond setting out-of-network payment rates. The distribution of data, which can vary, may have an anchoring effect on the negotiation of in-network payment rates. For example, a proposal that relies on a benchmark that would result in out-of-network payment rates below current in-network payment rates for some providers may shift the negotiating leverage in favor of insurers, which may then use the threat of the lower out-of-network rate to negotiate lower in-network rates. If a proposal results in higher out-of-network payment rates than in-network payment rates for some providers, the leverage to negotiate will shift toward providers, who may demand higher in-network payment rates. Policymakers may need to decide whether to base the benchmark on provider charges or insurer payment rates. Provider charges are the amounts that providers charge a consumer and/or insurer for a furnished service. These amounts generally will be higher than the negotiated amounts, because they do not include any discount negotiated between insurers and providers. There are no federal proposals that rely on provider charges as a benchmark for setting payment for services provided by out-of-network providers. There are federal proposals using a benchmark approach that rely on private insurer in-network payment rates. Insurer payment rates could be specified as an insurer's usual, customary, and reasonable (UCR) rates or as an insurer's in-network contracted rates. UCR rates are a method that insurers use to determine payment to providers for out-of-network services if a plan provides out-of-network benefits. Insurers have discretion over how UCR rates are calculated, and such determinations vary from insurer to insurer. In-network contracted rates are the payment rates determined either through negotiation between insurers and providers for in-network services or based on a fee schedule developed by an insurer; a provider must agree to this fee schedule for inclusion in the insurer's network. Once policymakers establish whether a proposal uses provider charges or insurer payment rates, they may specify a methodology for determining the final payment rate. For example, a policy proposal may specify a mean, a median, a percentage, or a percentile of the benchmark rate. The most appropriate metric will depend on the underlying distribution of the benchmark data being used and how the resulting payment rate compares with current in-network and out-of-network rates. To the extent that a benchmark is based on market-based rates, policymakers may want to consider whether to limit the rates included in the benchmark to a specific geographic area to account for the variations in the underlying cost of health care services in different communities. However, a geographic region that is too large may not account for the discrepancies between markets within the regionâfor example, rural and urban health care costsâand a geographic region that is too small may result in situations where only one particular provider or insurer is included. Policymakers also may want to consider whether to set a benchmark based on current payment data or on historical payment rates combined with an inflation factor. Using historical rates may mitigate potential fluctuations in in-network rates in response to implementing a surprise billing approach, including changes in network strategies by insurers or providers looking to influence future payments. However, using historical rates may not, depending on the data used, account for material changes in a local health care market (e.g., changes in technology, market consolidation, etc.). Finally, there may be situations in which an insurer does not have the appropriate data to determine payment rates under a market-based benchmark. For example, an insurer that is a new entrant to a market will not have established in-network payment rates for past years. In such a case, the new entrant may have to rely on public or privately run databases that aggregate payment rate data of other insurers in a market to determine an average in-network rate for a particular provider type in a particular geographic area. Given such a situation, policymakers may want to consider whether to specify a source of data, whether public or private, for reference prices an insurer may use to calculate payment rates or a set of standards for databases that an insurer may use to establish payment rates. The quality and breadth of the data may affect the degree to which reference prices accurately represent the market and population. Currently, there is no universal source of data for all market types and insurers. Some states operate all-payer claims databases (APCDs); of the states that have APCDs, a subset of the APCDs are voluntary initiatives that may not collect data from all insurers in the state. However, state APCDs cannot require the collection of data from self-insured group health plans. Proposals may specify multiple benchmarks. In these types of proposals, multiple benchmarks may be used to establish guardrails (i.e., a floor or a ceiling) to counterbalance the potential anchoring effects of a single benchmark discussed earlier. There are different methodologies for determining which benchmark would apply in a surprise billing situation. The methodology may involve choosing whether the payment should be based on the greatest or least among the various benchmarks. If using a greatest of approach, then the insurer would be responsible for paying a rate to a provider based on the benchmark that results in the highest payment rate among the various specified benchmarks. A least of approach would make an insurer responsible for paying a provider a payment rate that is based on the benchmark that results in the lowest payment rate among the various specified benchmarks. For example, an insurer may be required to pay a provider a percentile of UCR or, at a minimum, a percentage of Medicare. Some federal surprise billing proposals from the 116 th Congress have considered an alternative dispute resolution process, such as arbitration. In an arbitration model, the provider and the insurer would submit proposals for payment amounts to a neutral third party. The third party would then determine, on a case-by-case basis, the total amount to be paid to the provider, which would include the insurer payment and the consumer cost sharing. The cost-sharing parameters would be determined under the proposal, not by the arbitrator, and would depend on the cost-sharing structure of the consumer's health plan. However, the rate set by the arbitrator can affect the amount paid by the consumer. The arbitration model might provide more flexibility than the benchmark in that payment would not be fixed based on a reference price. However, it might involve more administrative costs to determine payment rates on a case-by-case basis and would provide less predictability regarding payment rates for out-of-network services. As arbitration relies on a third party to decide payment, proposals typically establish criteria for determining who may act as an arbitrator. Criteria may include a conflict-of-interest standard to ensure the third party does not have an interest in the process's outcome. Policymakers also may want to consider whether to establish standards for when insurers or providers may elect arbitration. Standards may be structured to require a minimum amount of time after a provider has billed for a service before either the provider or the insurer may seek arbitration to settle a payment dispute. This approach would afford providers and insurers an opportunity to negotiate a payment rate. In addition to a time requirement, policymakers seeking to limit resources expended on arbitration may consider establishing a threshold requirement to prohibit providers and insurers from seeking arbitration for charges under a certain dollar amount. If a proposal does not include a threshold requirement, then providers and insurers would be able to seek arbitration for any surprise billing payment dispute. The requirement may be structured to provide a specific amount, which may include a method for adjusting the amount year to year to account for inflation. Alternatively, policymakers could choose to provide authority to agencies to establish a method for determining the threshold amount. If a threshold requirement is set in a way that prohibits parties from seeking arbitration below a certain dollar amount, then policymakers may want to consider how to address payment for amounts under the threshold. A proposal could be structured to require insurers to pay any charges under the threshold amount, or a benchmark, as described earlier, could be used on a limited basis for any charged amounts under the threshold. Once it is determined who may seek arbitration for a surprise billing dispute, policymakers may want to consider how to structure the arbitration process, including how an arbitrator decides payment. One possible approach, taken by the state of New York, would be to institute a baseball-style arbitration process in which each party submits its best and final offer to the arbitrator, who then decides which offer to accept as the final payment rate. Another possibility would be to provide the arbitrator with the flexibility to decide a final payment rate that may differ from the proposals submitted by the parties to the arbitration. Regardless of the flexibility given to the arbitrator, policymakers may want to consider specifying factors that the arbitrator should take into account when making a final decision. It is possible to combine the benchmark and arbitration approaches. For example, in response to stakeholder concerns regarding the use of particular methods for determining final payment amounts, some states and one federal proposal pair the use of a benchmark with the option of arbitration if either party is not satisfied with the payment rate established by the benchmark. Another hybrid approach could involve establishing an arbitration process in which the arbitrator picks one amount from a list of benchmarks to establish a final payment rate. Some researchers have proposed a bundled payment approach as an alternative to establishing how much an insurer must pay directly to an out-of-network provider. Instead of regulating the relationship between an insurer and the out-of-network provider, a bundled payment approach would focus on the insurer and the facility in which the service was provided. An insurer would make one payment to the facility, after which the facility would be responsible for paying providers for services provided in the facility. Instituting a bundled payment would shift the onus from the out-of-network provider to the facility to negotiate with the insurer for a bundled rate. It would then be the facility's responsibility to negotiate with the providers for payment of services provided within the facility. Currently, no federal proposals or state laws use a bundled payment approach to address surprise billing. An alternative to focusing on payment for out-of-network services would be to reduce the probability that consumers would inadvertently receive care from out-of-network providers. An alternative to setting a benchmark or establishing an arbitration process would be to set network requirements. Network adequacy is a measure of a plan's ability to provide access to a sufficient number of in-network providers, including primary care and specialists. In the individual and small-group markets, states have been the primary regulator of plan networks and have network adequacy standards for most health insurance plans. The ACA created a federal network adequacy standard. However, the federal government defers to states to enforce network adequacy standards. Self-insured plans are not subject to network adequacy standards. Instituting stricter network adequacy standards (i.e., requiring plan networks to include a larger number of providers of varying types) may not address all surprise billing situations. Unless network adequacy standards require all providers to be in network, they do not guarantee that insurers will contract with every provider that a consumer may see, especially in situations where a consumer travels outside the plan's service area. Some researchers have proposed another network-based approach, referred to as network matching , which would involve the creation of an in-network guarantee to address surprise billing situations in which consumers receive care from out-of-network providers in in-network facilities. An in-network guarantee would ensure that a facility and the providers practicing in that facility contract with the same insurers to be included in the same networks. However, surprise bills might still occur in the case of emergency services, when consumers may not have the option to choose an in-network facility, especially when a consumer travels outside the service area of his or her health plan. No current federal proposals or state laws use a network matching approach to address surprise billing. An in-network guarantee could be structured in a few ways. Policymakers could create an in-network guarantee that applies to insurers and would prohibit insurers from contracting with a facility unless the facility guaranteed that all providers practicing in the facility would contract to be in the same networks as the facility. Another way to structure an in-network guarantee would be to prohibit the insurer from paying out-of-network providers for any services provided to the consumer in an in-network facility. When paired with a prohibition on balance billing, a provider that was previously not incentivized to be in network because of the possibility of higher out-of-network payments might be incentivized to negotiate with an insurer to be included in plan networks to obtain payment beyond consumer cost sharing. To the extent a surprise billing proposal imposes any prohibitions or affirmative obligations on the insurer, the provider, or both, a question remains as to how to enforce any such limits or requirements. The current legal framework for enforcing discrete requirements for insurers and providers may be a template for Congress to consider when drafting surprise billing legislation. Potential enforcement mechanisms include authorizing the Secretary of Health and Human Services (HHS) and/or the Secretary of Laborâdepending on the plan type âto bring enforcement actions or allowing private entities to seek a right of action in a court against a regulated entity. An enforcement scheme also may attach specified statutory penalties to a violation of the statute. Depending on whether a surprise billing proposal amends an existing statute, these options may be included as the principal enforcement mechanism or could be added to supplement any existing enforcement schemes. A number of federal surprise billing proposals would amend provisions (including the emergency services provision) under Part A of Title XXVII of the Public Health Service Act (PHSA). This part of the PHSA, as amended by the ACA, was incorporated by reference into Part 7 of the Employee Retirement Income Security Act (ERISA) and Chapter 100 of the Internal Revenue Code (IRC). As a result, these three statutes' existing enforcement mechanisms may be relevant to any additional prohibitions or requirements added to Part A of Title XXVIII of the PHSA by a surprise billing proposal. Existing enforcement provisions under these statutes currently apply only to insurers and not to providers. In general, the existing enforcement provisions for Title XXVII of the PHSA's requirements apply to health insurance issuers in the group and individual markets and to self-funded nonfederal governmental group plans. With respect to health insurance issuers, states are the primary enforcers of the PHSA's requirements. If the HHS Secretary determines that a state has failed to substantially enforce a provision of Title XXVII of the PHSA with respect to health insurance issuers in the state, or if a state informs the Secretary that it lacks the authority or ability to enforce certain PHSA requirements, the Secretary is responsible for enforcing these provisions. In the event that federal enforcement is needed, the HHS Secretary may impose a civil monetary penalty on insurance issuers that fail to comply with the PHSA requirements. The maximum penalty imposed under PHSA is $100 per day for each individual with respect to which such a failure occurs, but the Secretary has the discretion to waive part or all of the penalty if the failure is due to \"reasonable cause\" and the penalty would be excessive. Part 7 of ERISA currently includes various requirements for (1)Â group health plans, which generally consist of both insured and self-insured plans providing medical care that an employer establishes or maintains, and (2) health insurance issuers offering group health insurance coverage. ERISA provides two general enforcement mechanisms for these requirements. First, the Secretary of Labor may initiate a civil action against group health plans of employers that violate ERISA, but the Secretary may not enforce ERISA's requirements against health insurance issuers. Second, Section 502(a) of ERISA authorizes a participant or beneficiary of a plan to initiate certain civil actions against group health plans and health insurance issuers. Plan beneficiaries may, for instance, bring actions against the plans to recover or clarify their benefits under the terms of the plans. In general, the group health provisions in Chapter 100 of the IRC apply to all group health plans (including church plans), but they do not apply to governmental plans and health insurance issuers. Under the IRC, the group health plan requirements are enforced through the imposition of an excise tax. Failure to comply with an IRC requirement generally would subject a group health plan to a tax of $100 for each day in the noncompliance period with respect to each individual to whom such failure relates. Limitations on a tax may be applicable under certain circumstances (e.g., if the person otherwise liable for such tax did not know, and exercising reasonable diligence would not have known, that such violation existed). Failure to pay the applicable excise tax may result in further penalties, and a dispute regarding any penalty liabilities may be resolved by a proceeding before a U.S. district court or the Court of Federal Claims. As noted above, the PHSA, ERISA, and IRC currently do not include enforcement provisions that apply to providers; instead, the applicable statutes impose requirements on only the relevant group health plans and health insurance issuers. Indeed, because the regulation of medical providers is traditionally within the province of the states, federal law has generally limited its role in regulating providers to specified circumstances. To the extent any federal requirements are imposed on providers, the requirements generally are enforced through provisions specific to the applicable regulatory framework. The enforcement provisions applicable to federal health care programs (including Medicare and Medicaid), for instance, authorize the HHS Secretary to initiate enforcement proceedings against any person (including a health care provider) for certain specified violations, including the submission of improperly filed claims and the improper offer or acceptance of payments to reduce the provision of health services. Violators may be subject to civil penalties, be excluded from further participation in federal health programs, or both. Thus, to the extent a surprise billing proposal would impose specific limits or requirements directly on providers, policymakers may want to consider enforcement provisions specific to those regulatory requirements. Consistent with this approach, many federal surprise billing proposals to dateâparticularly if they would amend Part A of Title XXVII of the PHSAâinclude enforcement provisions that would apply specifically to providers in this context. The proposals generally would limit the application of these enforcement provisions to providers who have not been subject to an enforcement action under applicable state law. As discussed in the \" State Requirements \" section of this report, many states have enacted laws that address surprise billing in various situations and incorporate different policies discussed throughout this report. Given the likely overlap between state laws and any potential federal laws, policymakers may want to consider how federal surprise billing policies should interact with related state laws. In other words, policymakers may want to determine which laws are applicable in situations addressed by both federal and state laws. They may opt to have federal law defer to state law, have federal law preempt state law, or some combination thereof. To date, many federal proposals have included language that would maintain state surprise billing laws and would apply federal law only in instances where states do not have such laws. In the event that a federal surprise billing law would provide deference to state surprise billing laws, it may be worth considering how such deference would be provided. For example, a federal proposal that addresses ambulances may be drafted so that federal law does not apply in any state with any type of surprise billing law, regardless of whether such state law addresses ambulances. As mentioned earlier in this report, state surprise billing laws have varied in their application to different situations and/or providers, and some states have only applied surprise billing laws and regulations to a narrow set of situations. For example, surprise billing protections in Arizona, Massachusetts, Missouri, New Hampshire, and Oregon apply only for emergency services provided by an out-of-network provider at in an in-network hospital. Therefore, this type of federal ambulance surprise billing law would not apply in those states. It is also possible that a federal surprise billing law would apply only to services, situations, and plans that have not been addressed by state surprise billing laws (or have been addressed in a manner that does not satisfy criteria included within such proposal). This type of policy would likely result in multiple different ways to handle surprise billing situations within a state. For example, fully insured plans could be subject to state laws and self-insured plans could be subject to federal laws. As a result, enrollees of different types of plans may have different protections in surprise billing situations. The extent of the aforementioned discrepancy would correspond to the extent to which state residents are enrolled in a self-insured plan. For reference, in 2017, Hawaii had the lowest percentage of private sector employees enrolled in a self-insured plan at an employer offering health insurance coverage (31.2%) and Wyoming had the highest percentage (72.4%). The national average was 59.4% in 2017. This difference can also be highlighted in the context of the interactions between surprise billing protections in Arizona, Massachusetts, Missouri, New Hampshire, and Oregon, which apply only for emergency services provided by an out-of-network provider at in an in-network hospital, and a hypothetical federal policy that applies to emergency services generally and provides deference to state laws. In this example, state law would apply to emergency services provided by an out-of-network provider at an in-network hospital and federal law would apply to emergency services provided by an out-of-network provider at an out-of-network hospital. Considering that a surprise billing federal policy would affect insurers, providers, or both and could alter these parties' incentives to enter into network agreements together (see \" Potential Policy Impacts \"), the combination of a federal policy with varying state policies would likely result in a unique set of incentives for insurers and providers within each state. By contrast, a federal surprise billing law may be structured so that state deference is not provided. Under this type of proposal, a federal surprise billing law would be uniformly applicable to all states, regardless of previous state surprise billing legislative action. In addition to considering the relationship between state and federal surprise billing laws, policymakers may want to incorporate policies that provide states with opportunities to tailor a federal proposal. For example, a federal policy could allow states to select the benchmark parameter used for plan payments out of a list included in the federal policy, or a federal policy could allow states to further determine the information included in a notification requirement. Such provisions would provide states with the ability to determine how best to incorporate federal policies given the relationship structure between insurers, providers, and consumers within that state. Since policy decisions rarely occur in a vacuum, many of the aforementioned policy considerations directly affect one (or multiple) aspects of the billing process. These impacts can be considered narrowly, by looking at how specific actors (i.e., insurers, providers, and consumers) may respond to such policy considerations. For example, consider the effects of a federal policy that (1) establishes a benchmark reimbursement rate that is lower than what insurers currently typically pay out-of-network providers for a specific service provided to consumers and (2) prohibits balance billing. From the insurer's perspective, an insurer may decide to lower premiums for plans that cover out-of-network benefits if its net payments to providers decrease after adjusting for any changes in consumer cost sharing under the policy. Relatedly, to the extent that such policy requires insurers to cover a portion of other consumer costs for specific services, insurers may choose to increase premiums on plans that do not cover out-of-network benefits to cover these additional costs. From the provider perspective, impacted out-of-network providers may see a reduction in revenue from the lower payment rate and the prohibition on balance billing consumers for those services. The provider also may see a reduction in the administrative costs associated with being an out-of-network provider (e.g., costs associated with communicating with and collecting payments from numerous consumers and/or insurers, costs associated with failure to collect payments from consumers). Depending on the extent to which the provider is affected, the provider may respond to this example federal policy by adjusting the prices of other services not affected by the policy or adjusting what services are offered. A different surprise billing policy that would establish an arbitration process could create greater administrative costs for insurers and providers. These costs could subsequently be incorporated into premium prices or provider charges for services. Policy impacts also can be considered more generally by identifying how these policies could alter the relationships between insurers, providers, and consumers. For example, policies that require insurers to pay providers specified amounts for out-of-network services might affect contract negotiations between insurers and providers. If a proposal required insurers to pay out-of-network providers their median in-network rate for services, insurers might be incentivized to reduce rates for those providers earning above the median amount or be less likely to contract with such providers during subsequent contract negotiations. If insurers did not contract with such providers, the provider would be considered out of network and the plan would pay providers the plan's median rate for services included in the surprise billing proposal. Inversely, providers earning below the median rate might be likely to demand increased payment rates or to consider dropping out of the network, the latter of which would result in those providers also being paid at a plan's median rate. Together, if insurers and providers responded accordingly, a plan's payment rates for the specified services included in a surprise billing proposal would move to the median rates for both in-network and out-of-network providers. If a proposal required insurers to pay out-of-network providers based on an arbitration model (i.e., dispute resolution process), then some providers that furnish specialized services or work on complex cases might be more likely to demand increased payment rates. This could occur because these providers would otherwise be more likely to receive results that are more favorable as an out-of-network provider participating in an arbitration process that considers the extent of the provider's expertise and the complexity of each case. The Congressional Budget Office (CBO) estimated the net effects of these types of policies on insurance premiums and the related effects on the federal budget in its scoring of two surprise billing bills from the 116 th Congress ( S. 1895 and H.R. 2328 , which are compared in the Appendix ). As implied by the policy impacts of these types of proposals on premiums, different policies also could have varying effects on national health expenditures. For example, the surprise billing proposal that required insurers to pay out-of-network providers their median in-network rate for services likely would reduce the aggregate dollar amount of private health insurance spending on out-of-network care relative to current law. This shift likely would occur even if consumers utilized the same amount of services, because \"median rates are generally lower than the current overall average rates.\" Future health expenditures also could grow slower than what is expected under current law if such a benchmark were indexed to an inflationary rate that is generally smaller than the rate of growth for provider rates. Relative to a benchmark-type policy that is tied to median in-network rates, an arbitration model policy likely would result in greater heath expenditures because arbitration would likely affect the negotiation of in-network rates. The potential threat of arbitration may afford certain providers increased leverage during the negotiation of in-network rates. However, the total effect of such policies on national health expenditures would be contingent upon the percentage of expenditures affected by the federal policies. The discussion of the aforementioned policies should not be interpreted as likely effects of all benchmark or all arbitration type policies. For example, a benchmark rate set at median rates would have different effects than a benchmark rate set at billed charges. Although comprehensive studies of state surprise billing laws are limited, there is anecdotal evidence of the impacts of such laws. For example, the effects of implementing a payment methodology were anecdotally evident in California, where a law required insurers to pay certain out-of-network providers the greater of the average contracted rate or an amount equal to 125% of the Medicare fee-for-service (FFS) rate. As a result, at least some insurers took the position that \"providers should either accept a lower contract rate or not contract and, potentially, receive only 125% of Medicare FFS rates.\" A related example involves insurer responses to a Colorado surprise billing law that required insurers to pay the in-network payment rates for services furnished to enrollees of managed care plans by out-of-network providers at in-network facilities. A subsequent state survey of insurers regarding the implementation of the surprise billing law highlighted that certain insurers felt that \"out-of-network providers [were] encouraged not to join networks because they will receive in-network payment regardless\" and \"hospital-based physicians had greater leverage when negotiating contracts with managed care plans.\" The Colorado law did not affect all insurers equally. Of the 52 insurers that issued managed care plans in the private health insurance market during the evaluation period and provided responses to the survey, 7 carriers reported that the law had a positive effect on network adequacy, 20 carriers indicated no change, 21 carriers indicated a negative effect, and 4 carriers indicated insufficient experience and time to evaluate the change. Relatedly, New York implemented an arbitration-type surprise billing law (independent dispute resolution, or IDR) for emergency physician services and other specified non-emergency services. From 2015 to 2018, different provider types participated in the IDR process differently. For example, plastic surgery providers submitted 40% of emergency service IDR disputes and neurosurgery providers submitted 31% of the specified non-emergency service IDR disputes. The Colorado and New York examples highlight the likelihood that a federal surprise billing policy will affect individual actors within a market differently, which is the result of existing dynamics between insurers and providers within each specific market (e.g., market concentration and network participation). CBO accounted for this effect in its scoring of the two bills from the 116 th Congress. This idea is further compounded by the fact that each state has its own set of regulations (potentially including surprise billing laws). Therefore, the effects of federal surprise billing proposals also will have varying impacts on insurers and providers across states. This appendix provides a side-by-side comparison of surprise billing provisions included within two federal bills that have gone through markup procedures. Specifically, the sections of the bills included in the appendix are Title I of S. 1895 (Alexander), which went through a Senate Committee on Health, Education, Labor, and Pensions markup session on June 26, 2019, and Title IV of the amendment in the nature of a substitute (ANS) to H.R. 2328 , which went through a markup session held by the House Committee on Energy and Commerce on July 17, 2019. The language from each bill summarized in this appendix addresses multiple medical billing situations, such as services furnished at an in-network facility by out-of-network providers, services related to an emergency medical condition, and/or air ambulance services. As each bill addresses more than one type of situation, this appendix refers to different situations as scenarios . For each proposal, different scenarios are identified numerically in the \"Applicable Health Services and Providers\" row. Where applicable, each subsequent cell under a given proposal refers back to the terminology used in the \"Applicable Health Services and Providers\" row to indicate how a given requirement in the proposal applies to each scenario addressed within that specific proposal. In some instances, the requirement may apply solely to one scenario, apply differently across multiple scenarios, or apply similarly to all scenarios. As an example, Title I of S. 1895 (Alexander) includes provisions regarding six scenarios, including (1) emergency services provided by an out-of-network provider at an emergency department of a hospital or freestanding emergency room and (2) ancillary services performed by an out-of-network provider at an in-network facility if such services would have been covered had they been provided in network. In the \"Applicable Health Services and Providers\" row for the Title I of S. 1895 (Alexander) column, these scenarios are identified as Scenario 1 and Scenario 2 , respectively (with additional scenarios listed accordingly). Subsequently throughout the Title I of S. 1895 (Alexander) column, each reference to Scenario 1 discusses how that particular requirement would apply to emergency services provided by an out-of-network provider at an emergency department of a hospital or freestanding emergency room. Consumer costs for the services addressed within each of the proposals are discussed in the \"Consumer Cost-Sharing\" and \"Other Consumer Costs\" rows; a distinction that incorporates (1) the aforementioned discussion (highlighted in Figure 1 ) around whether a plan does or does not cover services provided by an out-of-network provider that would have been covered if provided by an in-network provider and (2) whether a particular service is a covered benefit under the plan irrespective of the network status of the provider (i.e., whether the service is considered an excluded service). When reading the appendix table, if the same language is used across the bills for a given feature, it means the bills have language that is identical or substantively similar. However, there may be underlying differences between the bills. For example, both bills create limits on consumer cost-sharing requirements, but the actual requirements that would be affected (e.g., deductible, co-payment) may vary between the bills, depending on how cost sharing is defined in either that bill itself or the amending statute (for bill language that does not include a definition of the term). This appendix table focuses on, and incorporates, language as included and defined in the aforementioned bills. It does not compare or analyze differences between the bill languages as a result of underlying statutory differences. Each bill summary is based on a review of the provisions as drafted. If a given proposal lacks specificity or includes inconsistencies, no assumptions were made to fill in gaps or resolve any discrepancies. Finally, the table does not address drafting errors or other technical issues within the proposals (unless such errors required an interpretation to incorporate bill text into the table). The table also does not address policy implications or identify potential unintended consequences.", "summary": "In response to individuals receiving large, unexpected medical bills for out-of-network care, Congress has recently been considering legislation to address surprise billing. As the term is currently being discussed, s urprise billing typically refers to situations where consumers are unknowingly, and potentially unavoidably, treated by providers outside of the consumers' health insurance plan networks and, as a result, unexpectedly receive larger bills than they would have received if the providers had been in the plan networks. In the 116 th Congress, federal proposals have sought to address surprise billing in the context of two types of situations: (1) where an individual receives emergency services from an out-of-network provider and (2) where an individual receives services from an out-of-network provider that is working at an in-network facility. Although no federal requirements directly address surprise billing, at least half of the states have implemented policies to address surprise billing in some capacity. However, the state laws are limited in application, as certain types of plans, such as self-funded plans offered by employers, are exempt from state insurance regulation. State policies to address surprise billing vary in terms of the types of consumer financial protections provided (e.g., consumer balance billing limitations) and the related requirements on insurers and providers to establish such protections. Among states that offer similar types of consumer protections, policies may vary in their application and may differ according to the types of situations addressed (e.g., emergency services, out-of-network care at an in-network facility), the types of plans addressed (e.g., HMO, PPO), and the methods used to determine insurer payments to providers for such services (e.g., benchmark, arbitration). Similar to many state laws, recent federal legislative proposals related to surprise billing typically seek to address the financial relationships between insurers, providers, and consumers. They do so by establishing new requirements on insurers, providers, or both to create a degree of consumer protection related to reducing patient financial responsibilities with respect to some types of out-of-network care. In addition to including language that limits consumer cost sharing in surprise billing situations, the federal proposals typically include language that specifies the methods by which insurers determine payment to providers for the services being addressed in the bill (since solely reducing consumer financial liability in such situations would reduce the total amount providers receive for their services). When combined with balance billing prohibitions, this type of requirement effectively results in what the insurer and provider recognize as the total payment for out-of-network care. To date, federal proposals are largely aligned in how they would address consumer protections in surprise billing situations. However, the proposals differ in how they would address total payment for specified services furnished by out-of-network providers. Federal proposals generally have focused on at least one of two methods to determine insurers' financial responsibility: (1) selecting a benchmark provider payment rate that serves as the basis for determining specific amounts that insurers must pay providers, net of consumer cost sharing or (2) establishing an alternative dispute resolution process, such as arbitration, with provider payment determined by a neutral third party. This report discusses selected policy issues that Congress may want to consider as it assesses surprise billing proposals. The report concludes by providing an overview of how surprise billing proposals may affect some combination of insurers, providers, and consumers. An Appendix table compares two federal proposals that have gone through committee markup procedures: Title I of S. 1895 (Alexander), which went through a Senate Committee on Health, Education, Labor, and Pensions (HELP) markup session on June 26, 2019, and Title IV of the amendment in the nature of a substitute (ANS) to H.R. 2328 , which went through a markup session held by the House Committee on Energy and Commerce on July 17, 2019.", "document_type": "crs"}
{"report": "Historic preservation is the practice of protecting and preserving sites, structures, objects, landscapes, and other cultural resources of historical significance. Various federal, state, and local government programs, as well as privately funded activities, support historic preservation in the United States. This report provides an overview of the federal role in historic preservation, including background and funding information for some of the major preservation programs authorized by Congress. In addition to establishing national policies governing historic preservation, Congress considers the federal government's role in financing many of these programs through the annual appropriations process. Some programs also periodically come before Congress for reauthorization. As a result, issues related to historic preservation are of perennial interest to Congress. Some Members of Congress support proposals to eliminate the federal role in historic preservation, leaving such programs to be sustained by other levels of government or by private support. Other Members feel federal support for historic preservation should be maintained or increased. The heavy toll of recent natural disasters such as Hurricanes Harvey and Irma on historic resources has contributed to increased support for incorporating preservation needs in federal disaster relief planning and aid. This report includes a summary of the federal government's role in historic preservation activities, from its early efforts in the late 1890s to today. The report contains a list of many of the federal grant programs funded through the annual appropriations process (see Appendix ). It also includes overviews of historic preservation grants for tribal historic preservation, African American civil rights, historically black colleges and universities (HBCUs), Japanese American confinement sites (JACS), Native American Graves Protection and Repatriation Act (NAGPRA) programs, the Save America's Treasures grant program, and the American Battlefield Protection Program (ABPP). The appendix includes eligibility requirements, matching fund guidelines, and statutory authorization for each program. It also includes an overview of federal funding for historic preservation activities from FY2016 to FY2020, along with requested totals for FY2021. Finally, the report outlines some potential issues facing the 116 th Congress in determining whether and how to address historic preservation needs at the federal level. The federal role in historic preservation was limited for much of the country's early history, with no formal federal policy in place. The two most significant early efforts at federal historic preservation came in the 1890s. First, Congress passed laws intended to protect ancient Puebloan sites in the American Southwest. Soon thereafter, Congress acquired thousands of acres of private land to establish five Civil War national battlefield parks to be administered by the Department of War. These two distinct federal effortsâcommemorating very different moments in American historyâare often marked as the genesis of the United States' federal preservation program. In the 20 th century, a legislative campaign for a comprehensive historic preservation policy bolstered these efforts. The Antiquities Act of 1906 provided the executive branch with authority to identify and protect cultural resources on federal lands in an expeditious manner. Prior to its passage, federal law provided no means to preserve national cultural and historic resources that had not received specific legislative authorization from Congress. The Antiquities Act authorized the President to proclaim national monuments on federal lands that contain \"historic landmarks, historic and prehistoric structures, and other objects of historic or scientific interest.\" The law also established guidelines around the future excavation of objects of antiquity found on land owned or controlled by the federal government. Since its passage in 1906, the Antiquities Act has been used to create more than 150 national monuments. With the passage of the Historic Sites Act of 1935, Congress established a national policy on historic preservation. The act outlined a policy to \"preserve for public use historic sites, buildings, and objects of national significance for the inspiration and benefit of the people of the United States\" while also providing the Secretary of the Interior the authority to develop a program aimed at identifying and evaluating cultural resources. It placed the primary responsibility for administering federal historic preservation activities with the National Park Service (NPS). Efforts to survey and evaluate cultural resources of national historical significance eventually led to the designation of national historic landmarks (NHLs)âa federal recognition for historic properties that exists today. (See \" National Historic Landmarks Program \" section for more information on NHL designation.) In the aftermath of World War II, the United States saw an unprecedented transformation of the natural and built environment, thanks in part to a rapid growth in federal infrastructure projects. The construction of interstate highways, urban renewal projects, and large-scale development led to the destruction of numerous historic buildings, archaeological sites, and cultural resources not previously protected under the Historic Sites Act of 1935. In response, President Lyndon B. Johnson convened a special committee on historic preservation in 1965. The following year, the committee released its report, With Heritage So Rich , which called for a comprehensive national historic preservation program. The same year, Congress passed the National Historic Preservation Act of 1966 (NHPA), which incorporated nearly every major recommendation included in the report. Broader than its two predecessors, NHPA is the most comprehensive piece of legislation addressing federal historic preservation. Among its many provisions, the law established the National Register of Historic Places and the procedures by which historic properties are placed on the register, funded the National Trust for Historic Preservation, created a grant program for state and tribal historic preservation, required federal agencies to manage and preserve their historic properties, and created a process for federal agencies to follow when their projects may affect a historic property. Congress has amended and expanded NHPA multiple times since its passage, most recently in 2016. Various federal programs and federally established entities support historic preservation across the United States. Many of these programs and entities were established in NHPA and its subsequent amendments; however, Congress has authorized through separate legislation several other programs that also support activities related to historic preservation. Although it is beyond the scope of this report to discuss all federal programs and entities that support historic preservation, selected major programs and entities are highlighted. Created by NHPA, the Advisory Council on Historic Preservation (ACHP) is an independent agency consisting of federal, state, and tribal government members, as well as experts in historic preservation and members of the public. ACHP oversees the Section 106 review process, a process federal agencies must follow when their projects may affect a historic property. Federal agencies are required to review the potential impacts of their actions on historic sites, a process that is to be concluded before federal funding is provided or a federal license is issued. Section 106 applies only to federal or \"federally assisted\" undertakings, such as those receiving federal funding or a federal permit. As an independent agency, ACHP receives funding as part of the \"Related Agencies\" portion of the annual Department of the Interior, Environment, and Related Agencies appropriations bill. The Historic Preservation Fund (HPF) is the primary source of funding for federal preservation awards to states, tribes, local governments, and nonprofit organizations. Although federal funding for historic preservation was available under the 1966 NHPA and subsequent amendments in 1970 and 1973, Congress did not officially establish the HPF to carry out the activities specified in NHPA until 1976. The HPF is funded through revenue generated by outer continental shelf mineral receipts, and it has been periodically reauthorized by Congress. Most recently, in 2016, Congress authorized the HPF to receive deposits of $150 million annually through FY2023. The funding is available only to the extent appropriated by Congress in discretionary appropriations laws. Since the HPF's establishment, Congress has never appropriated the full $150 million for the fund in a single fiscal year. The HPF funds historic preservation activities in two ways: (1) formula-based apportionment grants and (2) competitive grant programs. Most HPF appropriated funds are used to provide formula-based matching grants-in-aid to state historic preservation offices (SHPOs) and tribal historic preservation offices (THPOs) and sub-grants to certified local governments (CLGs). Congress also has provided appropriations for additional competitive grant programs that fund specific historic preservation activities. The Appendix to this report provides an overview of the various grant programs that have been funded through the HPF, eligibility requirements, and program goals. HPF grants are awarded annually to SHPOs of the 50 states plus the District of Columbia and the territories. SHPOs are appointed officials responsible for administering and managing federal funds to conduct historic preservation activities. These activities may include surveys and inventories, nominations to the National Register of Historic Places, preservation education, architectural planning, historic structure reports, community preservation planning, and physical preservation of historic buildings, among others. States conducting these activities are statutorily required to provide a 40% match to the funds provided by the HPF. Guidelines allow each state the flexibility to design and shape its historic preservation program as long as the program meets the overall responsibilities outlined by NHPA. Typically, SHPOs do not use these funds to issue sub-grants to other entities for individual historic preservation projects; rather, SHPOs generally use these funds for their own operational and administrative costs, as well as programmatic activities (listed above) carried out directly by the SHPO. Under federal regulations, at least 10% of the allocations to SHPOs are sub-granted to assist CLGs with local preservation needs (see \" Certified Local Government Program \" below). Congress appropriated $49.7 million in FY2019 and $52.7 million in FY2020 for SHPO grants-in-aid. Since 1996, NPS has awarded annual formula-based grants to Tribal Historic Preservation Offices (THPOs). Eligibility for grants under the THPO grant program is limited to federally recognized tribes that have signed agreements with NPS designating them as having an approved THPO. To become an approved THPO, a tribe submits a request to assume responsibilities from the SHPO and provides a program plan demonstrating how SHPO duties will be conducted. Once a program plan is completed and approved, an agreement between the tribe and the Secretary of the Interior is executed and the THPO becomes eligible for HPF grant support. Similar to SHPO grants, the THPO grant program requires at least a 40% nonfederal match. Activities funded through the program include staff salaries, archeological and architectural surveys, review and compliance activities, comprehensive preservation studies, National Register nominations, educational programs, and other preservation-related activities. Grants are not awarded competitively but instead are determined according to a formula in consultation with tribes. Congress appropriated $11.7 million in FY2019 and $13.7 million in FY2020 for THPO grants-in-aid. NHPA requires that at least 10% of the annual HPF funding provided to each SHPO be sub-granted to local government entities known as certified local governments (CLGs). A CLG is a unit of local (town, city, or county) government that has undergone a certification process administered by NPS and the respective state SHPO, involving demonstration of a commitment to historic preservation. Under this certification process, local governments must meet NPS guidelines that include the establishment of a \"qualified\" historic preservation commission, inventory maintenance and surveys of local historic resources, and enforcement of state or local historic preservation laws, as well as additional requirements that may be established at the state level. Although CLGs receive at least 10% of the total annual apportionment from their respective SHPOs, states may provide more than the required minimum 10% pass-through should they choose to do so. States typically award grants to individual CLGs through a competitive application process established by the SHPO. The National Register of Historic Places (or National Register) stands as the United States' \"official list\" of properties significant in \"American history, architecture, archeology, engineering and culture.\" The National Register is maintained by the Department of the Interior (DOI) and in particular by NPS under the authority of NHPA, as amended. NHPA requires the Secretary of the Interior to maintain the register, develop guidelines and regulations for nominations, consider appeals, make determinations of eligibility of properties, and make the National Register accessible to the public. NPS has developed standards and guidelines to help federal, state, and local governments prepare nominations for the register. SHPOs, THPOs, or federal historic preservation offices typically coordinate nominations for the National Register. Property owners, historical societies, preservation organizations, government agencies, and other interested parties work through these offices to determine whether a given property meets the requisite criteria for listing, at which point a completed nomination and recommendation are submitted to NPS for review. NPS is to decide whether a property should be listed within 45 days after receiving a completed nomination. Benefits of listing on the National Register include honorary designation, access to federal preservation grant funds for planning and rehabilitation activities, possible tax benefits, and required application of Section 106 review should a federal or federally assisted action affect the property. Listing of a property places no restrictions on what nonfederal owners may do with their property, up to and including destruction of the property. Under federal regulations, should a property no longer meet the criteria for listing, the property shall be removed from the National Register. Currently, more than 94,000 properties are listed on the National Register. The National Historic Landmarks (NHL) programâlike the National Registerâis a federal recognition program administered by NPS. The agency is responsible for overseeing the nomination process for new NHLs and providing technical assistance to existing landmarks. NHLs are places of national significance to the history of the United States (as opposed to National Register properties, which, according to NPS, \"are primarily of state and local significance\"). The Historic Sites Act of 1935 created the NHL program, and the National Historic Preservation Act Amendments of 1980 clarified the role of NPS as the entity responsible for overseeing the designation of NHLs. All NHLs are also listed in the National Register. Funding for the NHL program falls under the National Register program, and NHLs are eligible for federal investment tax credits, technical assistance, and consideration in federal undertakings, similar to other properties on the National Register. With regard to federal undertakings, however, NHLs have a higher standard for protection than properties listed on the National Register. Whereas Section 106 of NHPA, applicable to properties on the National Register, requires only that agencies \"take into account\" the effects of an undertaking on historic properties, Section 110(f) of the law, applicable to NHLs, requires that agencies \"to the maximum extent possible undertake such planning and actions as may be necessary to minimize harm to the landmark.\" Congress chartered the National Trust for Historic Preservation (or National Trust) in 1949. It is a private nonprofit corporation, responsible for encouraging the protection and preservation of historic American sites, buildings, and objects that are significant to the cultural heritage of the United States. The trust provides technical and educational services, promotes historic preservation activities, and administers several historic preservation grant programs. Congress authorized federal funding for the National Trust in the NHPA of 1966. Federal funding for the trust largely continued until FY1996, at which point the Interior Appropriations bill conference report stated that the managers agreed \"to a 3-year period of transition for the National Trust for Historic Preservation to replace federal funds with private funding.\" From FY1998 through FY2001, there was no federal funding for the National Trust. In FY2002, Congress appropriated from the HPF $2.5 million to use as an endowment to maintain and preserve National Trust historic properties. In FY2003, Congress appropriated an additional $2.0 million from the HPF for the endowment, and added $0.5 million more in FY2004. In FY2005, Congress stopped funding the National Trust, and currently the organization's funding comes largely from private donations. In 1976, Congress passed the Tax Reform Act, which provided tax incentives for owners of historic structures to consider rehabilitation and preservation over demolition. Some argued that the law prior to 1976 encouraged the demolition and redevelopment of historic properties over their preservation. Since then, tax law has continued to evolve into what is now the Federal Historic Preservation Tax Incentives program, which includes historic tax credits (HTCs) administered by the Internal Revenue Service (IRS) and NPS in partnership with SHPOs. The HTC program encourages private investment in historic preservation and rehabilitation initiatives by providing a 20% federal tax credit to property owners who undertake substantial rehabilitation of a certified historic structure, while maintaining its historic character. Eligible buildings include those listed on the National Register of Historic Places, or architecturally contributing to a National Register district, that are rehabilitated for income-producing purposes. The program previously included a separate 10% rehabilitation credit for the rehabilitation of nonhistoric, nonresidential buildings built before 1936; however, the 2017 tax revision repealed this credit. Since 1976, over 44,000 projects have been completed under the program, with more than $96 billion leveraged in private investment for the rehabilitation of historic properties. Since 1984, Congress has designated 55 national heritage areas (NHAs) to recognize and assist efforts to protect, commemorate, and promote natural, cultural, historic, and recreational resources that form distinctive landscapes. NHAs are partnerships among NPS, states, and local communities, in which NPS supports state and local conservation through federal recognition, seed money, and technical assistance. Congress has established heritage areas for lands that are regarded as distinctive because of their resources, their built environment, and the culture and history associated with the land and its residents. In a majority of cases, NHAs have had a fundamental economic activity as their foundation, such as agriculture, water transportation, or industrial development. No comprehensive statute establishes criteria for designating NHAs or provides standards for their funding and management. Rather, particulars for each area are provided in the area's enabling legislation. Congress designates a management entity, usually nonfederal, to coordinate the work of the partners.Â NHAs are not part of the National Park System, in which lands are primarily federally owned and managed. Real property disposal is the process by which federal agencies identify and then transfer, donate, or sell real property they no longer need. The federal government has several programs that enable state, county, and local governments, as well as nonprofit organizations, to acquire at no cost properties deemed excess to the needs of a federal agency. Two programs in particular address the disposal of historic properties under federal ownership: the Historic Surplus Property Program and the National Historic Lighthouse Preservation Act Program. The NPS Historic Surplus Property Program is administered in partnership with the General Services Administration (GSA) and was authorized under the Federal Property and Administrative Services Act of 1949, as amended. When federally owned historic buildings are no longer needed by their respective agencies, the GSA declares the buildings to be surplus. Applicants interested in obtaining these propertiesâwhich must be listed, or eligible for listing, in the National Registerâsubmit an application to the GSA. Eligible applicants include state and public agencies, tribal entities, and nonprofit organizations. NPS then makes a formal recommendation to the GSA (or the Department of Defense, in the case of military properties) to effect the transfer of property. Once conveyed, a property must be managed and maintained in accordance with the terms of the transfer and the Secretary of the Interior's Standards for Rehabilitation. The NPS also administers a program to oversee the transfer of surplus historic lighthouses under federal ownership. Federal lighthouses and light stations were previously transferred to eligible entities through the Historic Surplus Property Program. In 2000, however, Congress passed the National Historic Lighthouse Preservation Act (NHLPA), an amendment to NHPA. The NHLPA provides a mechanism for the U.S. Coast Guard (USCG) to dispose of historic lighthouses that are listed, or determined eligible for listing, in the National Register. Similarly to other historic federal properties deemed to be excess, the NHLPA directs the USCG to issue a R eport of E xcess for historic light stations to the GSA, which then releases a notice of availability. At this point, interested parties looking to acquire the light station in questionâat no costâwork with NPS to submit a formal application, which is then reviewed by an internal NPS review committee that makes a recommendation to the Secretary of the Interior and the GSA Administrator. If there are no interested partiesâor if no applicant meets the requirements set forth by the review committeeâthe property is offered for sale by competitive bid or auction. Congress occasionally has passed legislation authorizing NPS to establish national networks aimed at coordinating the preservation and education efforts of various places, museums, and interpretive programs associated with specific historical moments or movements in U.S. history. To date, Congress has authorized the establishment of three such networks: the National Underground Railroad Network to Freedom ( P.L. 105-203 ), the African American Civil Rights Network ( P.L. 115-104 ), and the Reconstruction Era National Historic Network ( P.L. 116-9 ). Legislation in the 116 th Congress ( H.R. 1179 and S. 2827 ) would establish a fourth network, the African-American Burial Grounds Network. These laws have provided that network sites can include federal, state, local, and privately owned properties, although inclusion in the network requires consent from property owners. Congress has authorized the Secretary of the Interior to produce and disseminate educational materials and provide technical assistance to network sites, and to develop an official symbol or logo for use across the network. The federal government currently supports historic preservation through a variety of grant programs. The largest source of funding for federal historic preservation programs is the HPF, which currently funds state, tribal, and local historic preservation, African American civil rights grant programs, grants to underrepresented communities, tribal heritage grants, the Save America's Treasures program, disaster recovery grants, historic revitalization grants, and grants to historically black colleges and universities (HBCUs). Several other historic preservation grant programs are funded through annual appropriations under other NPS and non-NPS accounts rather than through the HPF. These programs include grants for Japanese American confinement sites, Native American grave protection and repatriation, and preservation and acquisition grants for American battlefields. For a complete list of these programs and their guidelines, refer to the Appendix . Table 1 , below, compares selected designations used by Congress and the executive branch for historic properties and sites. The table provides information on the entity that confers each designation (e.g., Congress, the President, the Interior or Agriculture Secretary); statutory authorities for the designation; the agency or agencies that administer each type of area (also noting designations for which the area typically is under nonfederal management); selected characteristics of the areas; and examples of each type of area. Designations for nonfederally owned and managed sites are listed according to the agency with administrative responsibility for the designation (e.g., responsibility for evaluating site qualifications and providing technical and/or financial assistance to designated sites). The federal government supports historic preservation through direct appropriations for federally protected sites and grants to nonfederal entities. Grant funding is typically provided to NPS-administered accounts within the annual Interior, Environment, and Related Agencies Appropriations bill. These accounts provide technical and financial assistance to state, local, and tribal governments, educational institutions, and nonprofit organizations with the goal of protecting cultural resources and promoting historic preservation activities across the United States. The majority of the funding is split between two NPS accounts: the HPF account, the primary source of funding for federal historic preservation programs, and the National Recreation and Preservation (NR&P) account, which provides funding for a variety of other congressionally authorized grant programs. Funding for historic preservation programs is not limited to these two accounts, however, nor does Congress exclusively fund grant programs as part of the Interior appropriations bill. Table 2 and Table 3 provide FY2016-FY2020 appropriations figures and the FY2021 budget request for programs funded as part of the HPF and NR&P accounts. In 2016, Congress reauthorized deposits of $150 million annually into the HPF for FY2017 through FY2023. Congress has never appropriated the full $150 million for the HPF since its establishment; however, regular appropriations to NPS's HPF account increased each year from FY2016 to FY2020. The FY2021 budget justification for NPS requests $40.7 million for HPFâa roughly 66% reduction in funding from FY2020 enacted amounts. This request would provide funding only for the core grant-in-aid programs to SHPOs ($26.9 million) and THPOs ($5.7 million), as well as $8 million for grants to HBCUs. It would not provide funding for additional competitive or non-formula-based grant programs. In addition to grant funds through the HPF account, Congress provides funding to other NPS-administered historic preservation grant programs under the National Recreation and Preservation (NR&P) account. This account provides for a broad range of activities related to historic and cultural preservation, as well as programs for recreational activities, natural resource conservation, environmental compliance, operations of the Office of International Affairs, and national heritage areas. Administration of grants funded through the NR&P account and HPF grant administration are included within the NR&P account under the \"Cultural Programs\" line item and the sub-activity \"Grants Administration.\" Congress appropriates direct funding for NPS-administered grant programs under the Cultural Programs line item. The Administration requested $33.9 million for NR&P in FY2021âa roughly 52% reduction from FY2020 enacted amounts. Historic preservation programs are of perennial interest to Congress and have been the subject of congressional oversight and legislation in the 116 th Congress. Some Members of Congress support proposals to eliminate a federal government role in both administering and financing historic preservation programs, leaving such programs to be sustained by other levels of government or by private support. Others feel that a federal role in supporting historic preservation should be maintained or expanded. Similarly, some advocates believe there may be an inherent or increased tension between preservationist goals and federally controlled or licensed infrastructure projects. The majority of federal grant programs for historic preservation receive funding through the annual appropriations process. Members of Congress as well as both current and past Administrations have expressed various opinions as to how federal funding for these programs should be allocated and at what levels. Both the FY2020 and the FY2021 budget requests from NPS would have significantly reduced funding for the HPF and would provide no funding for African American civil rights grant programs, grants to underrepresented communities, the Save America's Treasures program, or historic revitalization grants. In response to the FY2020 budget proposal, the House Subcommittee on National Parks, Forests, and Public Lands of the Committee on Natural Resources held oversight hearings in April 2019 on the spending priorities and mission of NPS. During these hearings, some Members expressed concern that the proposed reduction in grant funding would impact the ability of communities to protect and maintain culturally and historically important resources. Othersâincluding witnesses from NPSâexpressed the position that \"core\" NPS priorities such as infrastructure and the NPS maintenance backlog should take priority over historic preservation when considering the appropriation of federal funds. Other issues Congress may consider are specific to NHPA and current historic preservation laws and regulations. For instance, some have argued that the \"stop, look, and listen\" approach under Section 106 of NHPA does not provide adequate protection for historic resources, since the law only establishes a procedural requirement for federal agencies. According to a study commissioned by the National Trust for Historic Preservation in 2010, NPS reported to Congress that only 2% of all SHPO reviews for Section 106 compliance included findings of adverse effects to historic properties. For those undertakings that are deemed to have an adverse effect on a given historic property, the agency in question is only required to consider these effectsâwith no explicit legal mandate requiring them to address these potential impacts. In other words, although agencies are compelled to consult with the SHPO/THPO to develop solutions to mitigate effects, agency officials are not required to pursue the solutions, regardless of any adverse effects. As a result, some preservation advocates have charged that NHPA fails in its purported mission to protect cultural and historic sites. Others suggest that Section 106 compliance results in unnecessary and costly delays and have suggested that in some cases, opponents of specific federal projects may invoke Section 106 procedural steps in the hopes of delaying approval for a projectâsometimes to the point of impacting a project's feasibility. Although federal regulations provide certain ways for agencies to tailor the Section 106 process to their needs, some stakeholders have asserted that these options are time-consuming to implement and not flexible enough for undertakings that involve new or emerging technologies. Multiple bills have been introduced to exempt or limit NHPA reviews for certain projects, such as rail and transit infrastructure projects and Federal Communications Commission construction projects for communications facilities following a major disaster. Many of the programs that directly or indirectly support historic preservation also have received attention in recent years. For example, in 2013, the Federal Railroad Administration published a study that concluded \"there is no consistent approach on how to address the National Register eligibility of railroad corridors.\" Although federal regulations outline the criteria for inclusion of a property on the National Register, the report states that inconsistent standards still abound, due to the multitude of entities conducting National Register evaluations. Another program of congressional interest has been the National Heritage Areas program. Legislation has been introduced in recent Congresses to establish a National Heritage Areas System governing the designation, management, and funding of NHAs, to replace the stand-alone approach currently in place. Additionally, some Membersâas well as past and current Administrationsâhave expressed interest in ensuring that NHAs eventually become financially self-sufficient and in limiting the federal funding for long-standing areas. In addition, Congress often considers bills to designate specific properties or areas as historically important, under various designations. For example, in the 116 th Congress, P.L. 116-9 included provisions that designated three new historical sites as units of the National Park System and six new national heritage areas, as well as stand-alone provisions that recognized the historical importance of sites across the United States. Although many of the programs described in this report provide for properties to receive historical designation administratively, Congress has at times conferred individual designations in law. Certain programs or designations require congressional action to establish new areas or to designate properties as historically significant. Table A-1 is an overview of selected federal historic preservation grant programs. This overview focuses on programs with the primary mission of historic preservation and is not a complete representation of all federal grant programs that support historic preservation activities. Most of the programs listed here are subject to annual appropriations and therefore may not be currently funded, despite some programs having congressional authorization to administer grants. Programs authorized or funded in FY2020 for the first time may not be listed below. For example, as part of the FY2020 funding bill ( P.L. 116-94 ), Congress provided funding for a new civil rights grant program that would preserve and highlight the sites and stories associated with women, American Latino, Native American, Alaska Native, Native Hawaiian, and LGBTQ Americans. NPS has not yet published eligibility requirements or program guidelines. P.L. 116-94 also authorized two new grant programs as part of the American Battlefield Protection Program (ABPP): a battlefield interpretation modernization grant program and a battlefield restoration grant program. As these new programs have yet to receive appropriations from Congress, they are not listed below.", "summary": "During the 20 th century, Congress passed several laws that established a framework for federal historic preservation activities. The most comprehensive of these statutes is the National Historic Preservation Act of 1966 (NHPA; P.L. 89-665). NHPA created a grant program for state historic preservation, established the federal National Register of Historic Places (NRHP) and the procedures by which historic properties are placed on the Register, funded the National Trust for Historic Preservation (NTHP), established the Advisory Council on Historic Preservation (ACHP), and designated a process for federal agencies to follow when their projects may affect a historic property (known as the Section 106 process). Congress also has amended and expanded NHPA multiple times since its passage, most recently in 2016. In addition, Congress often considers bills to designate specific properties or areas as historically important, under various designations. These designations include national monuments, national historical parks, national historic sites, national historic landmarks, and properties listed on the NRHP, to name a few. Such historic designations may bring few management changes to a site or may involve significant changes, depending on the individual designating laws and/or general authorities that may apply to a type of designation. Some historic designations are applied to federally owned lands (including lands already under federal administration and those that the designating law may authorize for federal acquisition), but many federal designations are conferred on lands that remain nonfederally owned and managed. Because of these various legislative and oversight activities, historic preservation is of perennial interest to Congress. For example, some Members of Congress support proposals to eliminate a federal government role in financing historic preservation programs, leaving such programs to be sustained by other levels of government or by private support. Others state that a federal role in supporting historic preservation should be maintained or expanded. In particular, lawmakers and administrations pay significant attention to funding levels for various historic preservation programs that are subject to the annual appropriations process. The Historic Preservation Fund (HPF) is the primary source of funding for federal preservation. Appropriations for the HPF totaled $118.7 million in FY2020 ( P.L. 116-94 ), a nearly 16% increase from the FY2019 appropriation (excluding emergency supplemental funding) and a roughly $86 million increase over the FY2020 Administration request. For FY2021, the Trump Administration requests a roughly 66% reduction in funding for the HPF compared with FY2020 levels. This request includes no fiscal support for many of the federal grant programs available to states, tribes, local governments, and nonprofit organizations for historic preservation.", "document_type": "crs"}
{"report": "Congress has a long-standing interest in ensuring access to broadband internet service in rural areas. Federal subsidies underwritten by taxes and long-distance telephone subscriber fees have injected billions of dollars into rural broadband markets over a period of decadesâmostly on the supply sideâin the form of grants, loans, and direct support to broadband providers. As of 2019, more than 20 million Americans still lacked broadband access. According to many stakeholders and policy experts, federal spending on broadband expansion has not adequately accounted for local conditions in rural areas that depress effective demand for broadband. Lower demand in rural areas may discourage private-sector investment and reduce the effectiveness of federal efforts to expand and improve broadband service. According to the authors of a 2015 study on rural broadband expansion, \"While the vast majority of federal programs dealing with broadband have focused on the provision of infrastructure, many economists and others involved in the debate have argued that the emphasis should instead be on increasing demand in the areas that are lagging behind.\" The study found that rural households' broadband adoption rate lagged that of urban households by 12-13 percentage points and that while 38% of the rural-urban \"broadband gap\" in 2011 was attributable to lack of necessary infrastructure, 52% was attributable to lower adoption rates. \"Implicit in many supply-side arguments is an assumption that demand-side issues will resolve themselves once there is ample supply of cheap and ultra-fast broadband,\" wrote the directors of the Advanced Communications Law & Policy Institute (ACLP) in a public comment to the Commerce Department's Broadband Opportunity Council in 2015. \"Though appealing, this reductive causeâandâeffect has been questioned by social scientists, researchers, practitioners, and others who have worked to identify and better understand the complex mechanics associated with broadband adoption across key demographics and in key sectors.\" The geographic and demographic distribution of rural broadband demand is uneven. There is unmet demand in some rural areas. In others, even where there is access, that may not translate into widespread adoption. Observers cite a range of factors. On average, rural areas are less wealthy than urbanized areas, and have older populations with lower educational attainmentâfactors which negatively correlate with demand for broadband service. Related barriers to adoption, such as lower perceived value, affordability, computer ownership, and computer literacy, have persisted over many years. Rural areas with relatively favorable geography and demographics may attract significant investment in broadband service, but even subsidies may fail to spur buildout in less-attractive rural markets. This report complements separate CRS analyses of major federal subsidy programs on the supply side of the market by providing an analysis of demand-side issues at the nexus of infrastructure buildout and adoption. It focuses exclusively on demand for fixed broadband among rural households and small businesses. It does not address the role of schools, healthcare facilities, public libraries, and other \"community anchor institutions\" as end users of broadband. However, it does include discussion of the role schools and libraries play as providers of broadband service and training to rural residents who may lack home access to the internet, and how this may affect overall household adoption behavior. It also includes discussion of broadband-enabled services, such as telemedicine and precision agriculture, which may incentivize more rural households and small businesses to adopt broadband service. The report begins with a discussion of the rural broadband marketâspecifically, the characteristics of demand in rural households and small businesses, and how these affect private-sector infrastructure investments. It then provides a survey of federal broadband programs and policies designed to spur broadband buildout and adoption, with a discussion of how demand-side issues may impede achievement of these goals. It concludes with a discussion of selected options for Congress. According to the U.S. Census Bureau, 60 million Americans, or 19.3% of the total population, live in rural areas, defined as \"all population, housing, and territory not included within an urbanized area or urban cluster.\" As of 2010, urbanized areas and urban clusters occupied about 3% of the U.S. land mass, yet contained more than 80% of the U.S. population. As a result, fixed broadband network infrastructure, which largely relies on wireline connections to the physical addresses of subscribers, is geographically concentrated. Urban areas have benefited from this concentration, especially areas with favorable geographic locations and economic conditions. For example, the City of Huntington Beach, CA, charges broadband providers rent for access to its utility polesâ$2,000 per pole per yearâand leases access to city-owned fiber-optic cable (fiber) infrastructure. \"We continue to have a lot of carriers wanting to site on our poles in our downtown area which is next to the beach,\" a city official said during a 2019 webinar, noting that other, less favorably located cities had not been able to duplicate Huntington Beach's development model. \"[An] inland city is not going to get what we get here on the coast.\" In contrast, in many rural areas, the cost of providing broadband service may approachâor even exceedâthe predicted return on investment. Broadband providers may not be willing to serve these areas without support from direct government subsidies, grants, or loans. Local conditions in rural areas vary widely, though. Some rural markets may be relatively attractive on commercial terms, because of unique characteristics such as the presence of post-secondary educational institutions or tourism attractions, relatively high levels of economic development and educational attainment, favorable demographics, or proximity to urban areas. Other rural markets that lack these characteristics are likely to be less commercially attractive. Long-term demographic trends suggest a growing bifurcation of the rural broadband market. According to a 2018 U.S. Department of Agriculture (USDA) analysis, rural areas have witnessed \"declining unemployment, rising incomes, and declining poverty,\" as well as more favorable net migration rates since 2013. However, the analysis also found that \"people moving to rural areas tend to persistently favor more densely settled rural areas with attractive scenic qualities, or those near large cities. Fewer are moving to sparsely settled, less scenic, and more remote locations, which compounds economic development challenges in those areas.\" For reasons that will be explained in more detail below, household and small business demand for broadband service is likely to be impacted in rural areas by demographic trends, geography, and economic context. As a result, these factors affect the infrastructure investment behavior of broadband providers, raising policy questions about the appropriate level of federal assistance and how it can be distributed most effectively and efficiently. The next three sections of this report discuss the adoption of broadband service by rural households and rural small businesses and the implications of market demand for private-sector investment in rural broadband infrastructure. Adoption rates for broadband service are highly dependent on the valuation that households and small businesses place on internet access. Studies suggest that on average, valuation of internet accessâmeasured as willingness to pay for broadband serviceâis lower for rural households than for urban households. Knowledge of computers, computer ownership, and perceived relevance of the internetâall of which affect consumer valuationâtend to be lower among older, less educated, and less wealthy households. Because rural households tend to be older, less educated, and less wealthy than their urban counterparts, their willingness to pay for broadband also tends to be lower. Not all households are the same, of course. A substantial number of low-income households do not subscribe to broadband service even when it is offered to them at no cost, indicating a valuation of zero. At the same time, many reports indicate that some rural residents are willing go to extensive lengths to access the internet for tasks they view as essential, even if broadband service is not available at their home or business. The relatively lower proportion of potential subscribers in rural areas who are both highly motivated to adopt broadband and are able to pay for it complicates the business case. A 2010 study, based on a report commissioned by the Federal Communications Commission (FCC), found that survey respondents were, on average, willing to pay an extra $45 per month for \"fast\" speeds adequate for music, photo sharing, and videos. However, on average, respondents were only willing to pay an extra $48âa difference of $3âfor \"very fast\" speeds adequate for gaming, large file transfers, and high-definition movies. Households that already had relatively high speed broadband were generally willing to pay more than average for very fast service. While consumer expectations have certainly evolved over the past decade, the 2010 study's findings are broadly consistent with those of subsequent studies: most consumers, regardless of where they reside, value basic internet access at speeds adequate for everyday use, but only a relative few are willing to pay substantially more for very high speeds. Members of the latter group generally have higher levels of broadband connectivity than others, and belong to relatively wealthier, better-educated demographic groups. The FCC sponsored a series of field experiments, beginning in 2012, to gain better understanding of broadband demand among low-income households. The goal of these experiments was to inform administration of the federal Lifeline program, which subsidizes voice and broadband service charges for qualifying low-income consumers. A 2015 report on a field experiment conducted in West Virginia and eastern Ohio found that Lifeline-eligible non-subscribers in that region were overwhelmingly willing to pay $3 more per month to move from bottom-tier speeds (1 megabits-per-second (Mbps), offered at $31.99 per month) to moderate broadband speeds (6 Mbps, offered at $34.99 per month). However, only one out of 118 participants was willing to pay $44.99 per monthâan extra $10âto double their maximum download speed from 6 to 12 Mbps. The Lifeline program itself has long been undersubscribed, despite the fact that it frequently reduces consumer out-of-pocket costs to zero (see text box above, \"Why Is the Lifeline Program Undersubscribed?\"). A 2014 study, based on a survey funded by the Department of Commerce of 15,000 non-adopting households at all income levels, found that approximately two-thirds of respondents would not consider adopting broadband at any price, and that non-adopters were disproportionately rural (36% of non-adopters lived in rural areas, as compared to 19.3% of all Americans). The remaining one-third of respondents voiced interest in broadband adoption. Rural respondents were more likely to belong to this group than their urban counterparts, despite making up a disproportionately large share of non-adopters overall. These respondents most commonly identified price and availability as the main barriers to adoption. The study authors estimated that achieving a 10% increase in subscribership among members of the group who reported price as a factor in their decision would require an average price decrease of 15%. A 2012 study of broadband usage among Kentucky farmers broadly tracks with other studies that show a higher propensity for broadband adoption among younger, better educated, higher earning, business-oriented households with experience using the internet, regardless of location. The study found that a representative 45-year-old producer earning more than $50,000 on a 750 acre farm, who had experience using the internet but did not have broadband access, was willing to pay $171.42 as a hypothetical one-time property tax payment to support buildout of the necessary local infrastructure to provide broadband access to area farms. On the other end of the spectrum, a representative 63-year-old producer with a 250 acre farm earning less than $50,000, who had not subscribed to broadband service even when it was available, was willing to pay a one-time payment of just 20 cents to support broadband infrastructure improvements. The average age of survey respondents was 59.2 years. The Kentucky Department of Agriculture reported in 2019 that the demographic profile of Kentucky farmers is shifting, including a larger number of younger producers. This demographic shift may lead to increased demand for broadband service expansion and improvements in the rural areas of Kentucky where it is most pronounced. Given that demographic trends vary at the local level, though, they will likely not affect broadband market development equally in all parts of the state. Small businesses are generally more likely than residential households to regard broadband internet access as essential. However, within the small business sector there are significant differences in willingness to pay for any given level of service. Businesses with relatively modest data requirements may elect not to upgrade to a higher tier of service if the expected productivity benefits are less than the expected subscription and equipment upgrade costs. A 2010 study sponsored by the Small Business Administration (SBA), in fulfilment of requirements of the Broadband Data Improvement Act ( P.L. 110-385 ), found that \"broadband is central to U.S. small businesses in ways that it is not to individuals. The small business broadband adoption rate has increased to 90% as of the date of this survey (April 2010), compared to 74% of adults with broadband access in their homes.... \" Surveys conducted for the SBA study showed that both rural and urban respondents viewed high-speed internet \"as an essential service\" that enabled them to \"achieve strategic goals, improve competitiveness and efficiency, reach customers, and interact with vendors.\" However, the study found that non-agricultural rural businesses were significantly less likely to have their own website than their urban counterparts were. Likewise, they were less likely to be willing to pay substantially more for improved service, even though the study found that they rated the quality of service in rural areas lower than respondents in urban areas did. Most rural businesses surveyed indicated that they were not willing to pay 10% more for significantly improved service. Studies that are more recent have made similar findings. Although basic access to the internet in rural areas is much more widespread than it was a decade ago, usage practices of many small businesses do not appear to have changed significantly. Most appear to value basic internet access to support a few essential low-bandwidth functions, such as making the name and location of the business available on internet searches, but proportionately fewer appear to demand high-bandwidth advanced business applications. For example, a 2017 study comparing selected rural and urban areas of North Carolina found that many small rural businesses have no web presence beyond a listing in Google search results, and that more than half of those businesses that did have a web page used it solely to provide basic information about the business. \"Overall, small rural businesses are not using internet-based technology to support their businesses. While they may have broadband access, their use of websites, e-commerce and social media is limited, and it is significantly lower than small urban businesses,\" the study authors wrote. Apparently, small businesses find internet access useful, but many do not use applications requiring high bandwidth. It is not clear from these results what immediate benefits would be provided to non-intensive business users in remote rural areas by improvements in broadband service speed and quality. However, broadband advocacy groups have suggested that emerging new applications and encouraging small businesses to adopt more sophisticated web development strategies may increase demand for improved service over time. Other studies indicate that the type and location of business activity may have a significant influence on demand for higher-speed broadband. The businesses covered in the North Carolina study were, by and large, small retail establishments in isolated rural areas. Businesses in \"intermediate\" exurban locales that work in healthcare or knowledge-intensive sectors are more likely to use high-bandwidth applications, according to one study. For example, a survey of local businesses by the Central Coast Broadband Consortium, a nonprofit representing independent broadband providers serving the greater Monterey Bay area, found that business respondents had significant data and file transfer needs. The area surveyed includes many sparsely populated rural areas with difficult terrain, but it is also home to significant tourist destinations, large agriculture enterprises, and a University of California campus, and its northern boundary extends to the exurbs of San Jose, one of the most highly developed technology hubs in the nation. Observers often comment that rural broadband markets are hyper-localâthat is, that conditions affecting broadband deployment and adoption vary widely from one area to the next. Historically, investments in broadband infrastructure have tended to cluster in areas with lower risk and potentially higher returns. Broadband providers may view investment in rural markets with little history of internet usage as a high-risk endeavor. Subsidies may lower financial risk to broadband providers, but do not change their basic preference for low-risk, high-return projects, which guides private sector investment in expansion of broadband service. In a 2019 report, Merit Network, Inc., a nonprofit corporation owned and governed by Michigan's public universities, highlighted the business challenges faced by broadband providers in nascent rural broadband markets. According to the report, \"Despite the significant qualitative benefits that a broadband project may bring, depending on the method of financing, it is critical to accurately estimate adoption rates and build a solid financial model to ensure that adequate revenue will be achieved to repay any loan obligations, maintain ongoing operations and fund depreciation of capital equipment.\" \"Even if rural areas are profitable for telecommunications companies, urban areas offer still higher returns on investment. This makes rural areas less attractive markets and perpetuates the urban focus of market decisions,\" according to the authors of one academic study. \"The market for telecommunications shows that a free-market rationale can ensure an efficient use of limited resources, i.e. using the resources for profitable markets in high-density areas, but it cannot ensure an equal delivery of services in all areas, leaving the rural underserved.\" A 2019 report from the Arkansas governor's office stated that low broadband adoption rates \"have consistently been a primary barrier to investment by the provider community.\" Noting that age affects adoption rates, the report concluded that \"increased adoption within [the older] demographic has the potential to strengthen the business case for broadband deployment.\" The Arkansas report also highlighted low statewide enrollment in the Lifeline program as a barrier to investment. The FCC estimates that the Lifeline enrollment rate was 18% for Arkansas in 2018. The Arkansas report found that \"raising adoption rates [of the Lifeline program] could also strengthen the business case for private companies to invest in broadband infrastructure, resulting in better internet access for both poor and non-poor Arkansans.... \" Studies elsewhere have found a similar relationship between demand and investment. For example, in a 2015 report on its broadband expansion projects, the Appalachian Regional Commission, which serves 13 Appalachian states, found that \"broadband internet service providers [are] less likely to provide services in sparsely populated areas because it initially has a lower return on investment and is less cost-effective.\" Federal programs and policies play a significant role in the development of rural broadband markets, given their often-challenging economics. In 2018, USDA and the FCC spent a combined $9.1 billion on broadband programs, largely in rural areas (see Figure 1 ). The following four sections discuss the major USDA and FCC broadband programs, rural considerations for the FCC's broadband speed benchmarks, demand factors in awarding federal funds for broadband infrastructure buildout, and selected federal broadband adoption programs that may influence rural demand. There are two major sources of federal funding for broadband in rural areas: the broadband and telecommunications programs of the USDA's Rural Utilities Service (RUS) and the Universal Service Fund (USF) programs of the FCC. Most of these programs focus on the supply side, targeting infrastructure deployment, but they also include some affordability initiatives that offer limited discounts on broadband subscription costs to low-income households, certain rural healthcare providers, and schools. The RUS houses three ongoing assistance programs exclusively dedicated to financing broadband deployment: the Rural Broadband Access Loan and Loan Guarantee Program, the Community Connect Grant Program, and the ReConnect Program. The primary legislative authority for the Rural Broadband Access Loan and Loan Guarantee Program, and the Community Connect Grant Program, derives from the Rural Electrification Act of 1936, which Congress subsequently amended in various farm bills to support broadband buildout in rural areas. Section 6103 of the Farm Security and Rural Investment Act of 2002 ( P.L. 107-171 ) amended the Rural Electrification Act of 1936 to authorize the Rural Broadband Access Loan and Loan Guarantee Program to provide funds for the costs of the construction, improvement, and acquisition of facilities and equipment for broadband service in eligible rural communities. The 2018 farm bill ( P.L. 115-334 , Agriculture Improvement Act of 2018) authorized a grant componentâthe Community Connect programâin combination with the broadband loan program. This provision increased the annual authorization level from $25 million to $350 million, raising the proposed service area eligibility threshold of unserved households from 15% to 50% for broadband loans; authorizing grants, loans, and loan guarantees for middle mile infrastructure; directing improved federal agency broadband program coordination; and providing eligible applicants with technical assistance and training to prepare applications. Congress authorized the ReConnect Program separately through the annual appropriations process, funding it at $600 million through the Consolidated Appropriations Act of 2018 ( P.L. 115-141 ). The ReConnect Program includes both loans and grants to promote broadband deployment in rural areas where 90% of households do not have sufficient access to broadband at 10 Mbps/1 Mbps. Two additional programs also support broadband deployment in rural areas. The Telecommunications Infrastructure Loan and Loan Guarantee Program (previously the Telephone Loan Program) is similar in purpose to the Rural Broadband Access Loan and Loan Guarantee Program, but eligibility requirements are tailored to support deployment in areas with extremely low population densities. Distance Learning and Telemedicine (DLT) grantsâwhile not principally supporting connectivityâfund equipment and software that operate via telecommunications to rural end-users of telemedicine and distance learning applications. Congress funds RUS programs through annual appropriations. For FY2019, the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) provided $5.83 million to subsidize a Rural Broadband Access loan level of $29.851 million; $30 million for Community Connect broadband grants; $550 million for the ReConnect Program (in addition to $600 million provided for that program in FY2018); $1.725 million to subsidize a total loan level of $690 million for the Telecommunications Infrastructure Loan and Loan Guarantee Program; and $47 million for DLT grants. The FCC established the USF in 1997 to meet objectives and principles established by the Telecommunications Act of 1996 ( P.L. 104-104 ). The Universal Service Administrative Company (USAC), an independent not-for-profit organization, administers the USF under FCC direction. USF programs are not funded via annual appropriations, but rather from fees the FCC receives from telecommunications carriers that provide interstate service. The FCC has discretion to spend these fees without congressional appropriations. FCC supply-side support for broadband infrastructure, primarily through the USF High Cost program, totaled nearly $14 billion from FY2016 through FY2018. The High Cost program includes several funds that support broadband infrastructure deployment and provide ongoing subsidies to keep the operation of telecommunications and broadband networks in high cost areas economically viable for broadband providers. These providers must meet deployment benchmarks and offer service at rates reasonably comparable with those offered in urban areas. The subsidy indirectly benefits households and businesses in cases where there is a significant urban-rural price differential by making below-market subscription rates available. The other USF programs are the Lifeline program, which directly supports low-income households by subsidizing affordable or no-cost monthly broadband plans, and the Schools and Libraries program and Rural Health Care program, which pay for local network equipment purchases and some broadband subscription costs for eligible schools, libraries, and health care facilities. Broadband providers have wide discretion in howâand whetherâthey choose to participate in these programs. Although the federal government imposes certain conditions on its subsidies, grants, and loans to broadband providers, it does not make participation compulsory. Even in subsidized markets, broadband provider investment behavior is conditioned to a greater or lesser degree by demand, predicted adoption rates, and anticipated return on investment. The federal government mayâwithin the existing legislative frameworkâadjust the structure and funding levels of its major funding programs to encourage private-sector investment in rural areas that supports its policy goals. The FCC changes its definition of broadband service as technologies, user expectations, and markets evolve. It reviews its data speed benchmarks on an annual basis, and its decisions have regulatory implications that may affect private-sector investment decisions in rural areas. The degree to which these benchmarks should be aspirational or reflect current market demand is a topic of frequent debate in policy circles. Assessment of demand and its likely development over time informs many of these debates. Section 706 of the Telecommunications Act of 1996 ( P.L. 104-104 ; the Telecommunications Act) requires the FCC to report yearly on whether \"advanced telecommunications capability is being deployed to all Americans in a reasonable and timely fashion.\" The act does not specifically define advanced telecommunications capability, delegating this determination to the FCC. It directs the FCC to \"take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market\" if its determination is negative. Since 1999, there have been 11 Section 706 reports, each providing a snapshot and assessment of broadband deployment. As part of this assessment, and to help determine whether broadband is being deployed in \"a reasonable and timely fashion,\" the FCC has established minimum data speeds that qualify as broadband service for the purposes of the Section 706 determination. In 2015, citing changing broadband usage patterns and multiple devices using broadband within single households, the FCC raised its minimum fixed broadband benchmark speed from 4 megabits-per-second (Mbps) (download)/1 Mbps (upload) to 25 Mbps/3 Mbps. The 25/3 Mbps threshold is meaningful in both technical and policy terms, because the legacy copper-based connections utilized by some broadband providers would likely require significant upgrades in order to meet higher thresholds. While fiber-based \"middle-mile\" cable has been broadly deployed over the last two decades, \"fiber-to-the-home\" installations that enable faster speeds are much less widespread, especially in remote rural areas. Increases in minimum speed thresholds have frequently engendered policy debates about the regulatory role of the FCC and how best to allocate limited resources for broadband expansion. Stakeholders in both the public and private sectors have frequently raised the issue of market demand for improved service when justifying their positions on the FCC's annual Section 706 determinations. During the Obama Administration, FCC leadership justified increases in service speed thresholds as necessary to ensure that broadband infrastructure kept pace with changes in consumer behavior and the increasing number of bandwidth-hungry electronic devices and applications. \"Application and service providers, consumers, and the broadband providers are all pointing to 25/3 as the new standard,\" wrote then-Chairman Tom Wheeler when commenting on the agency's 2015 progress report. \"Content providers are increasingly offering high-quality video online, which uses a lot of bandwidth and could use a lot more as 4K video emerges.\" Opponents argued that demand does not justify investments in faster service that requires costly fiber-optic installations. Two FCC commissioners then serving released dissenting statements, citing tepid demand for faster broadband service as a reason to refrain from mandating higher speeds. Some criticized the FCC for subsidizing infrastructure buildout under one standard, which was then superseded by a new higher standardâin effect designating newly built-out areas as unserved. Commissioner Ajit Pai wrote, \"The driving factor in defining broadband should be consumer preference.... 71% of consumers who can purchase fixed 25 Mbps serviceâover 70 million householdsâchoose not to.\" As FCC Chairman since 2017, Pai has retained the 25/3 Mbps standard as sufficient to meet the Telecommunications Act requirement for the FCC to ensure availability of advanced telecommunications capabilities. In public comments submitted for the 2019 FCC progress report, some large broadband providers and associated trade and public policy groups expressed concerns that any increase of speed requirements beyond the existing 25/3 Mbps standard would impose unnecessary burdens on providers based on predicted cost and market demand. \"The Commission should not change benchmarks based on aspirations that do not reflect widespread consumer demand and that are not grounded in the text of Section 706,\" wrote the Free State Foundation. \"Instead, Section 706 implies a realistic analysis that takes stock of actual market data regarding deployment of infrastructure and the availability of advanced capabilities that a substantial majority or at least an early majority of consumers subscribe to.\" By contrast, rural co-ops and other independent broadband providers have tended to argue (directly or through trade associations) for a higher speed benchmark, which would lead to federal subsidization of higher-speed service. In a 2018 letter to a Member of Congress, the manager of an Iowa electric co-op wrote, \"Broadband systems funded with limited federal funds should meet the growing speed and data consumption needs of today and into the future.... [Congress] should recognize that in today's 21 st century economy, broadband systems built to 10/1 or slower speeds cannot support a modern household much less attract and retain new businesses.\" Trade organizations with memberships that include a cross-section of companies by size, corporate structure, and technology type have generally avoided discussing speed benchmarks in their submitted comments, focusing instead on other issues, such as substitutability of mobile broadband for fixed broadband. FCC data released as part of the 2019 progress report indicated that 25.3% of households in the nation's least rural counties where service was available had adopted 100/10 Mbps broadbandâmore than double the 9.9% adoption rate in the nation's most rural counties (see Figure 2 ). The same data indicated higher overall adoption of the current standard of 25/3 Mbps, with a 57.7% adoption in the least rural counties and 23.1% in the most rural. Some recent state and regional reports have questioned whether market demand justifies government-subsidized investment in higher speed broadband in all cases. \"There is an ongoing, multifaceted debate about whether, where, and when the performance advantages of fiber justify the investment in upgrading communications networks,\" according to the Arkansas Development Finance Authority. \"Most uses of the internet today do not require the capacity and speed that fiber internet offers, and internet service providers who deploy fiber don't necessarily experience strong demand for the upgraded service.\" According to an April 2019 report from the Southeastern Indiana Regional Planning Commission, \"Some providers argue that even when broadband is available, customers do not subscribe as expected.\" The authors argued for energetic measures to promote broadband affordability and adoption as a remedy. The primary purpose of the RUS and USF High Cost programs is to support expansion of broadband availability in unserved or underserved areas, rather than to promote broadband adoption. Funding under these programs has typically been awarded based on ISP commitments to making a certain level of service available to a certain number of eligible households and businesses within a certain period of time. However, there are some important differences. The RUS programs include loans, which recipients must repay. Applicants for funding under the Rural Broadband Access Loan program are required to complete and submit a financial forecast to demonstrate that they can repay the loan, and that the proposed project \"is financially feasible and sustainable.\" The forecast must includeâwith few exceptionsâa market survey that describes service packages and rates, and provides the number of existing and proposed subscribers. This requirement may incentivize recipients to encourage adoption in their service areas in order to increase revenues that they can then use for loan repayment. At the same time, it may also deter providers from accepting loans to serve areas where the business case for deployment is particularly difficult. Perhaps because of disincentives for investment in unattractive markets, RUS selection criteria and loan terms prioritize buildout to unserved or underserved areas over subscription rates or other business performance metrics. According to the application guide, \"Priority must be given to applicants that propose to offer broadband service to the greatest proportion of households that, prior to the provision of the broadband service, had no incumbent service provider.\" Program administrators prioritize projects according to four tiers, which range from 25% to 100% of households unserved. The standard loan term is 3 years, but applicants can request up to a 35-year repayment term and a principal deferral period of up to 4 years if at least 50% of the households in the proposed service area are unserved. The RUS ReConnect program has similar goals, but also includes grants and loan-grant combinations. Applicants can likewise request more generous loan terms if they plan to serve a Substantially Underserved Trust Area (typically tribal lands), and their application may be granted priority status. Reviewers score applications against evaluation criteria using a points-based system. They award points for population density (less dense areas receiving preference), number of farms served, number of businesses served, number of educational facilities served, performance of the offered services, and other criteria. Neither projected business performance metrics nor adoption rates are included in the evaluation criteria. Under the High Cost program, federal subsidies are premised on the absence of a business case for broadband expansion. In announcing the latest proposed round of support, known as the Rural Digital Opportunity Fund (RDOF), the FCC stated that it would prioritize buildout in areas where \"there is currently no private sector business case to deploy broadband without assistance.\" USF programs only require that participating broadband providers advertise the availability of broadband service within their service areas, and that the broadband provider be able to provide service at rates \"reasonably comparable to rates offered in urban areas\" to any area household within 10 business days if requested to do so. Census blocksâthe administrative-territorial unit used by the FCC to measure broadband coverageâare considered served if a local broadband provider meets these conditions. As with the RUS programs, the High Cost program has prioritized buildout and higher broadband performance over adoption. Phase I of the proposed RDOF program would prioritize support to broadband providers that serve \"completely unserved areas\" at higher data speeds, higher usage allowances, and lower latency, but sets no specific adoption benchmarks. The FCC expressed concerns in its RDOF proposal that recipients of support might lack any incentive to aggressively market their services or otherwise stimulate demand beyond relatively low-cost high-return areas, and might even take measures to limit subscription in order to protect profits. Since [RDOF] support may require certain providers to offer much higher data caps than they do to [non-RDOF] subscribers and price the services similarly, such providers may have an incentive to limit [RDOF] subscribers to sell their capacity to more profitable [non-RDOF] subscribers. Spectrum-based providers that do not have a network sufficient to serve most locations in a geographic area would also have an incentive to limit subscription if expanding capacity would be less profitable than limiting subscription and collecting [RDOF] subsidies based purely on deployment. Even wireline bidders may lack the proper incentives to serve additional customers in some areas, given that it may not be profitable without a per-subscriber payment to run wires from the street to the customer location and install customer premises equipment. Having expressed these concerns, the FCC put forward a proposal to introduce subscribership milestones for RDOF recipients. It requested comment on several different implementation options. One proposal would offer a baseline level of support to broadband providers and then add per-subscriber payments. Another would withhold a certain percentage of support if broadband providers failed to meet subscription milestones, although it raised the question of what milestones were appropriate given \"the unique challenges of serving rural areas.\" Eliciting private sector participation in rural broadband programs appears to be a concern for the FCC, just as it is for USDA. In its last round of USF funding support, FCC increased the term of support to broadband providers from 5 years to 10 years in order to gain \"robust participation\" in the program. A number of federal programs may stimulate demand for broadband in underserved areas, though this is not always their primary purpose. Such programs include end-user subsidies to reduce out-of-pocket costs for subscribers; education and outreach activities to promote digital awareness and skills; infrastructure-oriented programs that support community anchor institutions such as schools and libraries; and infrastructure-oriented programs supporting specific applications, such as telemedicine and precision agriculture. This section presents a non-exhaustive summary of these programs. The FCC's Lifeline program is the only major federal broadband program that directly targets broadband adoption by residential subscribers. It targets households earning less than 135% of the federal poverty level. Program enrollment rates vary widely by state, with a nationwide average of 28% of eligible beneficiaries. The program subsidizes enrollees to cover the recurring monthly service charges associated with broadband subscribership. Support is not given directly to the subscriber but to the subscriber-selected service provider. Although stimulating broadband demand is not an explicit purpose of the Lifeline program, expansion of Lifeline enrollment may improve the business case for broadband deployment in rural areas, which on average have a disproportionately high number of low-income residents. In many cases, facilities-based telecommunications providers sell excess capacity in areas they already serve to resellers, who then rebrand the service and market low-cost plans to eligible Lifeline beneficiaries. In 2017, the FCC proposed changes to the Lifeline program that would bar resellers from participation. Some in Congress claimed that these changes would reduce enrollment by 70% from current levels. In a further action, the proposed FCC update to Lifeline minimum service standards for 2019 raised concerns in some quarters that low-income subscribers would be priced out of the market by required upgrades. In a letter to the FCC, NTCAâThe Rural Broadband Association wrote that unless the FCC requirement is waived, \"current Lifeline subscribers to fixed broadband service will be forced to upgrade to a higher speed tier than they may need, want, or have the ability to affordâresulting in either stretched consumer budgets or the potential for price-sensitive customers to cease buying broadband altogether.\" The FCC stated that the increase was required under provisions of the 2016 Lifeline Order. In its November 2019 decision, the FCC retained the existing subsidy level for broadband service and increased the monthly data minimums from 2 gigabytes to 3 gigabytesâa reduction from the 8.75 gigabyte minimum originally proposed. The federal government has supported numerous broadband-related outreach and education activities over the years, typically as part of broad-ranging development grant programs focused primarily on housing and education. Agencies providing grant support of this type include the Departments of Education, Housing and Urban Development, and Commerce, as well as the National Science Foundation and several regional development commissions. The Broadband Technology Opportunities Program (BTOP) is an exception to this pattern, as it includes dedicated funding for broadband adoption programs. The American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ) provided approximately $4 billion for BTOP, to be administered by the National Telecommunications and Information Agency (NTIA, an agency of the Department of Commerce) as a program including broadband infrastructure grants, grants for expanding public computer capacity, and grants to encourage sustainable adoption of broadband service. As of August 2015, BTOP had awarded $3.48 billion for infrastructure buildout, $201 million for public computer centers, and $250.7 million for sustainable broadband adoption. Most BTOP funds have been expended, but NTIA continues to monitor existing grants. A 2015 Government Accountability Office (GAO) report found that affordability, lack of perceived relevance, and lack of computer skills are the \"principal barriers\" to broadband adoption. It identified outreach and training, along with discounts, as \"key approaches\" to addressing those barriers. Regarding BTOP, it noted, \"NTIA compiled and published self-reported information from its BTOP grantees about best practices, but has not assessed the effectiveness of these approaches in addressing adoption barriers.\" In a response to the GAO, the Deputy Secretary of Commerce wrote that grant recipients were individually responsible for program design and assessments of program effectiveness. The FCC's E-Rate (Schools and Libraries) Program under the USF provides discounts of up to 90% for broadband to and within public and private elementary and secondary schools and public libraries in both rural and nonrural areas. Some have suggested that broadband non-adopters may be more likely to subscribe to at-home service if they gain experience using the internet and become more aware of the benefits it can provide in finding employment, accessing educational resources, and interacting with government agencies, among other uses. However, a 2015 study found that \"counties with libraries that aggressively increased their number of Internet-accessible computers between 2008 and 2012 did not see measurably higher increases in their rates of residential broadband adoption.\" The USDA's Distance Learning and Telemedicine (DLT) grants fund end-user equipment and broadband facilities to help rural communities use telecommunications to \"link teachers and medical service providers in one area to students and patients in another.\" DLT grants serve as initial capital for purchasing equipment and software that operate via telecommunications to rural end-users of telemedicine and distance learning. Eligible applicants include most entities in rural areas that provide education or health care through telecommunications, including most state and local governmental entities, federally recognized tribes, nonprofits, for-profit businesses, and consortia of eligible entities. The FCC Rural Health Care Program provides similar benefits to eligible public and nonprofit health care providers in rural areas. Additionally, providers may receive a 65% discount on the costs of broadband service (if available) or a discount equal to the urban-rural broadband service price differential. This program does not address the issue of household connectivity with providers. The effect that support for the emerging telehealth sector has on rural demand for broadband service is unclear. Rural counties with the least access to medical care typically also have the least access to broadband internet. The demographic profiles typical of these locations are associated with both lower broadband adoption and lower rates of health insurance coverage, so broadband buildout there might or might not lead to substantially greater telehealth use. A 2018 USDA study on rural telehealth, conducted by the agency's Economic Research Service, found that rural residents were significantly less likely to use telehealth services than urban residents were, even when broadband availability was not a factor. The study measured usage across three categories: online health research; online health maintenance; and online health monitoring. According to the study, a usage gap between rural and urban patients existed across all three categories. Usage rates appeared to track closely with cost. The highest usage rates were for online health research that costs little and can be conducted anywhere that has basic internet access. According to the study, \"Lack of Internet service in the home, whether by choice or due to lack of availability, did not deter everyone from conducting online health research.\" The study also found that existing rural connectivity was sufficient for most health maintenance activities, but \"the issue of acceptance and/or remuneration levels by the health insurance industry and government health support programsâand not technologyâ[was] cited as an impediment to implementation.\" Online health monitoringâthe most expensive telehealth service categoryâwas also the least used. \"As online monitoring was costly, the results largely reflect who had or did not have health insurance.\" Some industry groups have argued that subsidized buildout of higher speed broadband will enable the use of new applications, which may promote telehealth use. NTCA, which represents rural broadband providers, commented in 2019, \"The capabilities and promise of telemedicine are as unlimited as other applications and technology that are evolving to take full advantage of broadband capabilities.\" These may include use of virtual and augmented reality applications, embedded devices, and wearables, technologies that depend on high-speed fiber-based broadband networks, according to NTCA. Likewise, some advocacy groups and researchers highlight regulatory issues, such as varying state regulations for Medicaid reimbursement, which they claim may hinder development of the market for telehealth services. Section 12511 of the Agriculture Improvement Act of 2018, commonly known as the 2018 farm bill ( P.L. 115-334 ), established the Task Force for Reviewing the Connectivity and Technology Needs of Precision Agriculture in the United States. The FCC announced the creation of this congressionally mandated task force on June 17, 2019. The task force plans to \"develop policy recommendations to promote the rapid, expanded deployment of broadband Internet access service on unserved agricultural land,\" in consultation with the Secretary of Agriculture. However, the USDA has noted that adoption of precision agriculture methods by the farm community \"has been hesitant and weak,\" especially among smaller producers, because of concerns over upfront costs, uncertain economic returns, and technological complexity. In addition to the interagency task force, the 2018 farm bill authorizes several initiatives to fund research and development on precision agriculture. It also modifies prioritization criteria for USDA broadband loans and grants to include precision agriculture activities. However, these provisions do not directly address end-user affordability issues. Promoting universal access to broadband has generally enjoyed wide bipartisan support in Congress. Despite federal support for broadband infrastructure buildout, however, adoption continues to lag in rural areas, even where the infrastructure exists and service is available. In turn, low adoption rates may lower the private sector's incentive to invest in nascent rural broadband markets, despite federal subsidies for high-cost service. This section highlights selected options Congress could consider as it addresses rural broadband demand issues. In the Lifeline program, intended to address broadband affordability for low-income households, FCC changes to provider eligibility rules and minimum service requirements have prompted considerable debate (see \" End-User Subsidies \"). The FCC has wide latitude to set program rules, subject to the established rulemaking process. Congress might continue its oversight of that rulemaking process or might choose in some cases to direct FCC actions through legislation. Issues of potential interest include beneficiary eligibility requirements, beneficiary eligibility verification procedures, the level of the benefit (currently $9.25 per household, with additional benefits for beneficiaries who reside on tribal lands), ISP eligibility requirements, ISP minimum service requirements, and how oversight authorities are shared between the federal government and the states. In addition to the direct cost of broadband connectivity, cost barriers may reduce the attractiveness of broadband-related services that might otherwise stimulate rural broadband demand. For example, access to affordable health insurance may be one factor affecting the affordability, and hence adoption, of telehealth services (see \" Telemedicine and Telehealth \"). Similarly, the upfront costs of sensors and other technology may be slowing the adoption of precision agriculture practices (see \" Precision Agriculture \"). Congress might consider mandating further research on the extent to which these factors influence broadband demand, and how such barriers could be overcome. With the exception of BTOP, most federal support for broadband-related education and outreach activities has been through housing and education grant programs that include internet and computer skills among numerous other eligible funding categories (see \" Outreach and Education Programs \"). Grant recipients typically expend the majority of funds on the non-broadband-related categories, which may be considered more central to housing development and education goals. Congress might consider whether a focused grant program or programs specifically designated for support of broadband-enabled applications would be more effective, and if so, how lessons from BTOP might be applied to program design and implementation. In addition to general internet and computer skills, Congress might consider including broadband-enabled applications in such an education and outreach program. Rural adoption of precision agriculture practices may be stymied if the benefits are not fully understood or if familiarity with the technology is lacking. Rural small businesses often do not make full use of broadband technology, even when adequate connectivity is available (see \" Valuation of Broadband Service \"). Even farmers and small rural business owners who can afford broadband service might benefit from education on the use of web-based applications to improve their operations or on how to calculate long-term benefits more accurately. Rural use of telehealth services might increase if potential users were more aware of the health and convenience benefits offered by emerging applications. The RUS and USF programs that support broadband infrastructure buildout (see \" Major USDA and FCC Broadband Programs \") rely on private-sector broadband providers for on-the-ground deployment. Therefore, the conditions of federal support need to be sufficiently attractive in business terms to elicit participation from the private sector. At the same time, taxpayer or ratepayer value-for-money is also a policy concern that becomes especially salient if wide scale broadband adoption does not follow subsidized buildout. Under current RUS program rules, award recipients must demonstrate the economic viability of proposed projects. However, scoring criteria heavily favor applicants proposing to build out infrastructure in the most remote, underserved areas, which are least likely to present a strong business case. Some in Congress have expressed concern about RUS loan subscription rates (see \" Federal Programs' Consideration of Market Demand When Awarding Funds for Broadband Infrastructure Buildout \"). Through legislation or enhanced oversight of RUS program rules, Congress might seek to change end-user subsidy programs to improve the business case for buildout projects, or to adjust program rules in other ways to mitigate disincentives for investment. Under current USF program rules, participating broadband providers have limited responsibility to develop the demand side of local broadband markets. They are only responsible for ensuring availability of service at a given speed and latency benchmark, and advertising it within a designated service area. There is no other requirement for broadband providers to develop their subscriber base or otherwise promote adoption. The FCC included requests for comments on this issue in its 2019 proposal for the RDOF program. Congress might consider legislation or oversight to effect changes in program rules that would incentivize ISP investments in broadband adoption. For example, under current FCC rules, the term of support for High Cost program subsidies is 10 years; Congress might consider directing the FCC to lengthen or shorten this term to adjust ISP business incentives. Finally, broadband speed benchmarks and other service quality metrics are frequently debated as part of the congressionally mandated requirement for the FCC to assess deployment of communications technology under Section 706 of the Telecommunications Act (see \" FCC Service Benchmarks and Market Demand for Higher Speeds \"). Higher service quality requirements may boost American technological leadership and ensure that citizens can use high-bandwidth internet applications, but they may also impose costs on broadband providers and lead to higher costs for customersâpricing some of them out of the market. Congress may consider the costs and benefits of proposed service requirements, and how such requirements might affect rural broadband adoption, when exercising oversight of the FCC's Section 706 responsibilities. ", "summary": "As of 2019, over 20 million Americansâpredominantly those living in rural areasâlacked access to high speed broadband service according to the Federal Communications Commission (FCC). Federal subsidies underwritten by taxpayer funds and long-distance telephone subscriber fees have injected billions of dollars into rural broadband markets over the past decadeâmostly on the supply side in the form of grants, loans, and direct support to broadband providers. Yet, adoption rates have leveled off after more than a decade of rapid growth, even as broadband providers have extended service to remote and hard-to-serve areas. The overall share of U.S. adults using the internet has not grown significantly since 2013, according to the Pew Research Centerâa trend reflected in rural broadband subscription rates, which continue to lag significantly behind rates in urban areas. Observers note that weak demand in nascent broadband markets makes it more difficult for federal agencies to elicit private-sector program participation and investment in high-cost, high-risk rural areas. Even in subsidized markets, broadband infrastructure buildout ultimately rests on business decisions made in the private sector. On average, rural areas are less wealthy than urbanized areas, and have older populations with lower educational attainmentâfactors which negatively correlate with demand for broadband service. Related barriers to adoption, such as lower perceived value, affordability, computer ownership, and computer literacy, have persisted over many years. Markets tend to be highly localized. Those with favorable geography and demographic profiles often have higher demand, and thus present relatively attractive investment opportunities, for broadband providers. However, the federal government has found it difficult to incentivize sustained private-sector investment in more isolated and sparsely populated locales where it is clear that new or upgraded service will be costly to provide, and may fail to attract a large number of new paying subscribers. Overall, current federal spending on affordability and adoption programs amounts to less than one-quarter of total spending for rural broadband expansion. The FCC's Lifeline program reduces monthly subscription costs for qualifying low-income households, but enrollment rates are comparatively low. No major federal programs currently support consumer outreach and education, although certain federal grants may use funds for related activities. Other programs to support broadband buildout to schools, clinics, and other community institutions have improved access for residents of rural areas, but it is not clear that these programs have affected overall market demand. Broadband advocates frequently identify broadband enabled services like telemedicine and precision agriculture as potential demand drivers. However, lower rates of health insurance coverage in rural areas and certain state regulations limiting Medicaid reimbursement for telemedicine services may depress demand growth and private sector investment in broadband. Likewise, high up-front costs and unfamiliarity have hindered adoption of precision agriculture technology by small producers in isolated rural areas. Federal broadband programs have generally been agnostic to the demand side of rural broadband markets, based on the implicit assumption that demand for broadband service will quickly emerge as broadband providers extend new or upgraded service to these locales. Program rules typically require broadband providers to extend service availability to a certain area within a certain timeframe, but they generally do not require them to achieve specific market development goals for adoption and usage. The FCC has expressed concern that some subsidized providers may lack incentive to develop markets in their service areas. Options for congressional consideration include measures to address obstacles to adoption and additional incentives for private sector investment in the rural broadband sector. These may include expansion of end-user subsidies, both within the broadband sector and other sectors that utilize broadband-enabled technologies. Congress may also consider measures to encourage broadband providers to increase investment in persistently underserved rural areas and more aggressively develop nascent broadband markets. These may include adjustment to subsidy rates and program rules, including introduction of adoption milestones for subsidy recipients. Additionally, Congress may consider measures to increase education and outreach.", "document_type": "crs"}
{"report": "In recent years, policymakers, industry stakeholders, and educational institutions have shown an interest in the federal government increasing financial support to individuals who pursue training and postsecondary education in non-degree instructional and work-based learning programs. These are instructional or work-based programs designed primarily for individuals beyond high school age and for which a degree is not conferred upon completion. Such programs include, but are not limited to, apprenticeships (e.g., masonry), college certificate programs (e.g., medical billing), and courses that lead to professional certificates or licensure (e.g., Microsoft certifications). By some accounts, there already is, and will continue to be, demand for workers to fill jobs that do not require a college degree but do require training or postsecondary education (e.g., skilled electrical work, health care support services). In addition, there is some evidence that the percentage of jobs requiring more than a high school diploma but not a degree is increasing. Although the federal government annually makes available over $100 billion in direct financial aid to individuals pursuing postsecondary education, the overwhelming majority of those funds are not available to a significant proportion of the individuals pursuing training and education through postsecondary non-degree programs. As some traditional colleges experience declining enrollment, some schools have shown an interest in creative approaches to increasing enrollment and maintaining revenues, including reaching out to adults who want to pursue completion of short programs that allow quick reentry into the workforce and/or increase earnings. Given the purported demand for workers with certain postsecondary non-degree credentials, Congress may consider viable options for providing direct federal support to students pursuing the completion of non-degree programs. Several proposals have surfaced recently that would increase direct federal support to students pursuing training and education in non-degree (short-term) programs. From 2011 to 2017, the Department of Education (ED) experimented with allowing Pell Grants to be received for short-term non-degree postsecondary education programs. In October 2019, the House Committee on Education and Labor ordered reported the College Affordability Act ( H.R. 4674 ), which would comprehensively reauthorize the Higher Education Act (HEA) and would expand the types of non-degree programs eligible for Pell Grants. In 2018, the President's Council of Economic Advisers presented options for bringing 25- to 64-year-olds back into the workforce with the skills required in the changing economy in an effort to increase the rate of economic growth. These included providing unemployment insurance benefits for individuals while training, providing Pell Grants for some short-term training programs, and developing a new comprehensive program for retraining displaced workers. The President's FY2021 budget request for ED proposed expanding Pell Grants to short-term programs that are not currently Pell-eligible. Several education and business organizations have supported extending Pell Grants, and occasionally Direct Loans, to programs that are shorter in duration than those that are currently eligible. Some stakeholders, however, express concerns about promoting non-degree programs and increasing financial support for students pursuing them. There is concern that some non-degree programs do not increase the employment or earnings of completers compared to individuals whose highest level of education is high school completion. Some concerns focus on how the federal government would ensure the quality of the programs. Other concerns focus on potentially high federal costs associated with supporting the programs, the potential need for student supports and business coordination, and the possibility of perpetuating income inequalities by fostering lower income students to pursue non-degree programs that lead to lower income professions. Some have raised questions about the demonstrated diminishing labor market returns over time for some technical non-degree programs, including apprenticeships. Additionally, some non-degree educational programs intended to prepare individuals for a specific occupation are neither required by nor necessarily preferred by employers, although the programs may be of a high quality. In light of evidence of employers increasingly relying on degrees when establishing hiring requirements, non-degree credential holders may have more difficulties in securing employment over the long term. In addition, adults with degrees currently employed in positions that do not require a degree may be crowding non-degree holders out of some occupations. In 2018, for instance, 28% of employment was in occupations that typically require a degree for entry-level positions, while 42% of the population aged 18 and over had a degree. This report provides an overview of existing federal programs and benefits that support individuals engaged in the pursuit of training and education in non-degree instructional and work-based learning programs. It informs consideration of additional or revised policy approaches aiming to support pursuit of training and education through non-degree programs. The report begins with a brief description of employer demand for individuals who have completed non-degree programs. This is followed by a discussion of the landscape and key characteristics of non-degree programs, from those offered through work-based learning to those offered through more formal instructional means. The report concludes with a detailed description of six federal programs and three tax benefits that currently provide direct financial support to students pursuing training and postsecondary education in non-degree instructional and work-based learning programs. Each program and benefit description highlights potential gaps and limitations in the scope and extent to which the program or benefit supports individuals pursuing non-degree programs, as well as student eligibility requirements and federal administration and oversight. Key stimuli for promoting financial support for individuals pursuing training and postsecondary education in non-degree programs include that the unfulfilled employer/business need for individuals with non-degree credentials is impeding, and/or will impede, economic growth; and that an individual's attainment of a non-degree postsecondary credential provides a worthwhile payoff. This section of the report provides data on the proportion of total employment and mean wages earned in occupations by typical entry-level education requirements. This discussion provides a sense of the market for non-degree credentials. It does not offer a comprehensive exposition of labor market returns and social impacts of increased non-degree program completion. In May 2018, approximately 6.2% of jobs in the national economy were in occupations for which the typical entry-level education requirement was a non-degree postsecondary credential ( Table 1 ). The Department of Labor's (DOL's) Bureau of Labor Statistics (BLS) assigns a typical entry-level education requirementâthe typical education level most workers need to enter an occupationâfor occupations that it tracks. Table 1 also presents the mean annual wages for occupations by typical entry-level education required. Mean annual wages for occupations that, at entry, require a high school diploma or its equivalent, some college but no degree, or a non-degree credential are all similar. While Table 1 shows differences in mean annual wages across education categories, these wages do not capture differences within the categories, which in many cases may include sizeable earnings differentials. For example, some research has found earnings premiums for individuals attaining long-term certificates, certificates in technical (e.g., electronics) and health fields, certificates in the field in which the individual works, and certificates from community colleges. Postsecondary non-degree programs provide training and education primarily to individuals who are beyond the typical age for secondary education. Most, but not all, non-degree programs are intended to prepare individuals for a particular occupation. Non-degree programs may be described by various classifications. One commonly used classification scheme delineates programs primarily provided by educational institutions (non-degree instructional) and by employers (work-based learning), although some programs include both instructional training and work-based learning. In general, postsecondary non-degree instructional programs are a combination of postsecondary courses or a postsecondary curriculum that fulfills an educational or professional objective, but for which a student does not earn a degree upon completion. Non-degree instructional programs prepare individuals for a wide variety of specialized jobs and more general employment. Upon completion of a non-degree instructional program, individuals receive a postsecondary educational certificate, which is a credential awarded by an educational institution based on the completion of a postsecondary instructional program, including coursework, assessment, or other performance evaluations. Individuals pursue non-degree programs for various reasons, including to expand knowledge and skills, to prepare for further education, to prepare for employment, to sustain employment, and when seeking promotion. For purposes of this report, non-degree instructional programs exclude those that lead to postbaccalaureate certificates and exclude transfer programs . Typically, transfer programs do not award a certificate or degree, but provide education for at least two academic years and are acceptable for full credit toward a bachelor's degree. Non-degree instructional programs should not be confused with certifications and licenses, which are occupational credentials awarded by entities that assess whether individuals have met established occupational standards or requirements. Licenses are required to practice in some occupations. Certifications show that an individual has attained competency in an occupation. Some certifications and licenses require the completion of a non-degree instructional (or degree) program. A diverse set of entities offer non-degree instructional programs. Traditional postsecondary educational institutionsâcolleges and universitiesâoffer non-degree instructional programs, as do trade, vocational, and technical schools. In fall 2018, almost 3,000 institutions of higher education enrolled nearly1.9 million non-degree seeking undergraduate students. Other entities also offer such programs, including businesses; professional organizations; trade unions; nonprofit organizations; federal, state, and local governments; museums; bootcamps; hospitals; and the military. One study estimated that there were over 4,500 for-profit non-traditional postsecondary educational institutions enrolling almost 670,000 students in academic year (AY) 2009-2010. Non-degree instructional programs vary considerably in length and duration. Programs may require a few days or more than two years to complete. Generally, the length is related to curriculum requirements, industry expectations, and the breadth and complexity of skills that the program is intended to instill. The length of the program may also be affected by federal, state, and private entities that require a minimum number of educational hours to be eligible for employment, or for certification or licensing. The overall program duration may be broken up if it is designed in stackable units. A single educational program aligned to a career path may be redesigned into a sequence of independent programs (stackable units). Programs are offered in classrooms, online, by correspondence, with cooperative elements, or through a combination of methods. Generally, students must fund or find funding for the cost of a program, and, if applicable, for related living expenses and lost wages for foregone employment. Program cost varies by length, program resource requirements, and provider. For example, for the most heavily enrolled programs in AY2018-2019, the average published cost for tuition and fees was over $9,000 at public less-than-two-year colleges and approximately $15,000 at private less-than-two-year colleges. In non-degree instructional programs, a dichotomy exists between programs made up of credit course(s) and those structured as a series of noncredit courses. However, courses in the same field of study with the same vocational objective and industry recognition may be offered for credit at one institution and noncredit at another, or even within the same institution. Generally speaking, individuals who successfully complete credit courses and programs earn credits that may be transferred or used as currency toward the completion of other credit programs (either at the conferring school or at another school). All degree programs are credit programs. Credit programs are most often approved by an accrediting entity and may have more stringent student entrance or prerequisite requirements. Credit programs may lead to a variety of vocations. Although noncredit programs may offer continuing education units (CEUs) or vocational certificates to program completers, the programs do not proffer these students currency toward the pursuit of credit programs or noncredit programs in other fields. The advantage of noncredit programs is that they often are less expensive for students and educational institutions, cover a broader range of topics, and can be modified more quickly to be attentive to industry and student needs. Noncredit programs may satisfy career entry requirements; may include adult basic education (ABE) and English as a second language (ESL) instruction; may provide personal enrichment; and may be customized training. Based on 2007-2013 enrollment information from nine colleges in one state community college system, approximately 38% of enrollments were in noncredit courses: vocational (18%), ABE (9%), ESL (7%), and general educational development (GED) (4%). National level data on the universe of non-degree instructional programs, enrollment, and completions are incomplete. Some states and the federal government do not collect data on noncredit programs. A 2016 nationwide survey found that 8% of adults aged 16-65 and not enrolled in high school had a postsecondary certificate, although some of these certificates may be postgraduate. The subset of educational institutions participating in the HEA Title IV federal student aid programs (see the \" HEA Title IV Federal Student Aid \" section below) awarded almost 1 million for-credit non-degree undergraduate credentials and approximately 3 million undergraduate degrees in AY2017-2018. The term work-based learning refers to a range of training and educational activities that are intended to impart general or specific workplace skills to individuals through time spent at an employer's worksite or a simulated work location. The terms defined in Table 2 are examples of common types of work-based learning in the federal context. Work-based learning is a broad term and may occur at multiple points in a career path and in multiple forms, ranging from career exploration for youth to highly specialized technical training for incumbent workers. Activities considered to be work-based learning include, but are not limited to, on-the-job training (OJT), apprenticeships, summer job experiences, internships, externships, residencies, cooperative programs (co-ops), and paid or unpaid work experiences. Programs that provide wages or remuneration are often referred to as earn and learn programs . RA programs are a distinctive form of work-based learning because of their DOL oversight. RA programs are registered with DOL or a DOL-approved state agency if they meet standards delineated in federal regulations. Among the requirements, a registration application must include a work process schedule, which outlines the major competencies of the occupation and how a combination of OJT and/or related instruction will lead to the worker demonstrating proficiency in those competencies. Once a program is registered, the registration agency must review the program no less than once every five years to ensure that it remains in compliance with the required standards. If the program demonstrates a \"persistent and significant failure to perform successfully,\" the program may be deregistered. Because work-based learning encompasses such a broad range of training activities, it is possible for multiple types of entities or individuals to offer such learning experiences. Work-based learning experiences may be provided by employers (either formally or informally), labor unions, external training providers, educational institutions providing work-relevant instruction, or partnerships of these entities. Work-based learning is generally structured to meet the needs of the employer, potential employer, or trainee. For example, summer internships may offer three to four months of informal training opportunities. Conversely, a summer internship may offer a formal curriculum covering specified procedures or tasks through iterative task-based coaching/instruction. RA programs require at least 2,000 hours of supervised OJT and range in duration from one to six years, but most RA programs are four years in duration. Some RA programs take a time-based approach through which an apprentice learns and obtains skills by completing a specified number of hours of OJT. Other programs take a competency-based approach in which skill attainment is verified by the apprentice demonstrating proficiency in the skill learned. Programs may also be constructed as hybrid programs that combine aspects of the time-based and competency-based approaches. All RA program designs must include related instruction to supplement OJT. The costs of work-based learning programs are primarily borne by the provider, but the trainee may be required to cover his/her living costs. Program costs may include the lost work time of experienced employees, fees for contracted trainers, and trainee wages. As the work-based learning progresses, some portion of the program costs may be offset by the trainee's increased productivity. In some cases, trainees may be required to pay for related instruction or other costs. Work-based learners who do not receive remuneration or receive nominal remuneration must provide for their own transportation, room, and board while also potentially forgoing the opportunity to earn wages from other paid employment. The data on work-based or employer provided training are not extensive. The data sets that do exist often differ in methodology, timeframe, and purpose. For example, some surveys look only at firms with 50 or more employees, while others are part of larger household surveys not designed around employer provided training questions. A summary of four different government surveys related to employer provided training in the 1990s concluded that while most establishments offer some training (formal or informal), the percentage of workers receiving training ranged from 16% to 70%. A 2016 nationwide survey found that 21% of adults aged 16-65 had completed a work-based learning program, although not all of these programs were intended to prepare individuals for a particular occupation or field of work. Among adults aged 16-65, the most common work-based learning programs completed were in healthcare and teaching. With respect to RA, DOL reported approximately 633,000 active apprentices in about 25,000 active programs in FY2019. In the same year, about 81,000 apprentices completed a program. The construction industry currently accounts for the largest share of apprenticeships, though they are available in other industries such as manufacturing and transportation. The federal government provides direct financial support to individuals pursuing training and education that might better prepare them for entry into the workforce and that might help them realize their potential. None of the federal programs or benefits that provide such support focus exclusively on promoting training or education through the pursuit of non-degree programs. With that caveat in mind, federal programs are described below in an order that generally attempts to correspond to their relevance to supporting the pursuit of training or education through non-degree programs. The design and implementation of the federal programs and benefits are notably different in several aspects including, but not limited to, the choice and monitoring of non-degree programs. The primary benefit programs are the Workforce Innovation and Opportunity Act (WIOA) Title I program, the federal student aid programs, federal tax benefits, and veterans educational assistance. WIOA Title I, administered by the Department of Labor (DOL), is intended to encourage general workforce development and may be used to directly subsidize training costs of individuals who pursue training and education. The federal student aid programs, authorized under Title IV of the Higher Education Act (HEA) and administered by the Department of Education, provide grants and loans to students to aid them in accessing and completing postsecondary education programs. The Internal Revenue Service (IRS) administers the Internal Revenue Code, which, among other things, provides certain tax benefits as a strategy for post-education financial support. Educational assistance administered by the Department of Veterans Affairs (VA), specifically the Post-9/11 GI Bill and Veteran Employment Through Technology Education Courses (VET TEC), are programs designed to provide direct financial support to students that allows them to pursue a wide variety of educational and training programs. Two programs that augment the basic living supports for needy families with some training and education assistance are also discussed in this report. Supplemental Nutrition Assistance Program (SNAP) Employment & Training (E&T), administered by the Department of Agriculture (USDA), provides training and education opportunities to individuals with a high risk for educational failure. Temporary Assistance for Needy Families (TANF), administered by the Department of Health and Human Services (HHS), provides flexibility to states to use TANF funds for activities that would develop a more highly skilled workforce through training and education. The subsequent sections of this report describe these prominent federal programs that can be used to support students in non-degree programs. The sections are organized to focus on key program design elements and highlight differences among the programs. Table 3 highlights a few program characteristics that help to delineate key differences. Title I of the Workforce Innovation and Opportunity Act (WIOA; P.L. 113-128 ) is the primary federal workforce development legislation and is intended to bring about increased coordination among federal workforce development and related programs. WIOA Title I is administered by DOL and funded through discretionary appropriations. Services authorized under WIOA are intended to: increase the employment, retention, and earnings of participants, and increase attainment of recognized postsecondary credentials by participants, and as a result, improve the quality of the workforce, reduce welfare dependency, increase economic self-sufficiency, meet the skill requirements of employers, and enhance the productivity and competitiveness of the Nation. The Adult and Dislocated Worker Employment and Training Activities program under WIOA Title I provides formula grants to states, which in turn allocate the majority of those funds to local Workforce Development Boards (WDBs). At the local level, funds are required to be used for five main purposes: establishing a One-Stop delivery system, providing career services, providing training services, establishing relationships with employers, and developing industry or sector partnerships. As part of its service delivery model, WIOA provides consumer choice to participants. The program for adult and dislocated worker participants in WIOA is structured around two main levels of services: career services and training. On an operational level, career services are categorized as basic and individualized . Basic services include assistance such as labor market information and job postings, while individualized services include assistance such as skills assessment and case management. Eligible WIOA participants may pursue training and education at the eligible training provider (ETP) of their choice. A state Eligible Training Provider List (ETPL) identifies choices to customers who are accessing WIOA services. Generally, ETPs include the following: institutions of higher education that are eligible to participate in the HEA Title IV federal student aid programs and offer programs leading to a recognized postsecondary credential, entities that provide RA, or other public or private training providers. Allowable training activities that may be supported with WIOA Title I funds are non-degree and degree instructional programs and certain types of work-based learning, including OJT, RA, customized training, and incumbent worker training. Training must be for occupations that are in demand in the local area or region, are in demand in an area to which the trainee is willing to relocate, or are deemed (by the local WDB) to have \"high potential for sustained demand or growth in the local area.\" In addition, the implementing regulations for WIOA specify that a program of training services provided by an ETP is one or more courses or classes or a structured regimen that leads to the following: an industry-recognized certificate or a certificate of completion of an RA, a license recognized by the state or federal government, an associate or baccalaureate degree, a secondary school diploma or equivalent, employment, or measurable skill gains toward a credential. Local areas under WIOA may reserve up to 20% of combined adult and dislocated worker funds for incumbent worker training. The workforce development system designed by WIOA is premised on universal access, such that an adult age 18 or older who is a citizen or noncitizen authorized to work in the United States does not need to meet any qualifying characteristics in order to receive career services. While basic career services are available to all adults, individualized career services are to be provided as appropriate to help individuals obtain and retain employment. Under WIOA, service at one level is not a prerequisite for service at the next level. To be eligible to receive training, an individual must be unlikely or unable to obtain or retain employment that leads to economic self-sufficiency, be in need of training services to obtain or retain employment that leads to economic self-sufficiency, have the skills and qualifications to participate successfully in training, select a training service linked to an occupation in the local area (or be willing to relocate to another area where the occupation is in demand), and be unable to obtain other grant assistance (e.g., Pell Grants) for the training services. These determinations are made by a One-Stop operator through an interview, evaluation, or assessment, which can include a recent evaluation or assessment conducted pursuant to another education or training program. Local WDBs designate colleges and universities, private organizations, and government agencies as One-Stop operators that assess and evaluate individuals and decide which individuals to provide with access to training services. Of funds allocated to a local area for adult employment and training activities, priority for career and training services is to be given to recipients of public assistance, other low-income individuals, and individuals who are basic skills deficient. It is left to the discretion of the local WDB, in consultation with the state's governor, to determine how to allocate funds among these priority groups. Under WIOA, training is allowed through ITAs or through contracts for services. While ITAs are the primary vehicle, contracts may be used in certain circumstances. WIOA also permits funds to be used for supportive services (e.g., child care and transportation) and \"needs-related payments\" necessary to enable an individual to participate in training. When an individual is determined by a One-Stop operator to be eligible to receive training services, that individual, in consultation with the One-Stop operator, may choose training services from the ETPL. At that point, an ITA is established, from which payment is made to the ETP, not to the individual, for training services. Local WDBs have the authority to set limits on the type and duration of training and may choose to set limits on the amount of an ITA, based on individual circumstances or on an across-the-board level. WIOA participants who are in receipt of an ITA may use ITA funds to support non-degree instructional and degree programs and the related instruction portion of an RA. In addition, local WDBs are also authorized to provide supportive services, including transportation, child care, dependent care, housing, and needs-related payments necessary to enable an individual to participate in training. While training is typically carried out through the ITA model, local WDBs may provide training through a contract for services, which may include various forms of work-based learning. The contract is an agreement between a local WDB and an employer or RA sponsor for occupational training for a WIOA participant in exchange for reimbursement from the WDB. A contract for services may be used if the consumer choice requirements of WIOA are met; the services are OJT, RA, customized training, incumbent worker training, or transitional employment; the local WDB determines there is an insufficient number of training providers in a local area to meet the ITA requirements; the local WDB determines there is a local training program of demonstrated effectiveness to serve individuals with barriers to employment; the local WDB determines that it is most appropriate to contract training services to train multiple individuals in in-demand occupations or industry sectors; or the training service is a pay-for-performance contract. For example, through a contract, a local WDB may reimburse an OJT provider (employer) for up to 50% of the wage rate of a participant (reimbursement rates may be 75% in limited circumstances). State and local WDBs may also enter into contracts with RA sponsors to reimburse the sponsors for up to 75% of an apprentice's wages. Notably, reimbursement for wages is supported by a contract, not an ITA. As noted, states are responsible for developing the ETPL. Local WDBs and One-Stop operators administer the training programs and payments to training providers. Thus, administrative structures and procedures vary by state. Quality assurance of training providers is established through both initial and continued provider eligibility processes. The governor and the state WDB in each state are responsible for establishing criteria and procedures for eligible providers of training services to receive funding in the local workforce investment areas. RA programs are automatically eligible to be included on the state ETPL. Non-RA training providers not previously eligible under WIOA or its predecessor law must apply to the governor and the local WDB (according to a procedure established by the governor) for initial eligibility of one fiscal year. To maintain continued eligibility, existing training providers must follow procedures established by the governor and implemented by the local WDB and submit WIOA-specified information. WIOA provides general requirements while allowing local WDBs discretion on specific factors. For example, while WIOA indicates that OJT contracts should be limited in duration, as appropriate to the occupation, the training content, and the participant's prior work experience and service strategy, the exact length of the OJT contract is determined by the local WDB. Similarly, WIOA requires that in determining employer eligibility to receive WIOA incumbent worker training funding, a local WDB must consider the characteristics of individuals in the program and the relationship of the training to the competitiveness of the individual and the employer without establishing quantifiable targets. WIOA requires ETPs and states to report measures of program participation and outcomes. Notably, RA programs are not required to submit ETP performance report information. To be considered for continued eligibility, providers must submit to the governor every two years the following performance and cost information for participants receiving training under WIOA Title I: the percentage of program participants in unsubsidized employment in the second and fourth quarters after program exit; median earnings of program participants who are in unsubsidized employment during the second quarter after program exit; the percentage of program participants who obtain a recognized postsecondary credential, or secondary school diploma or equivalent, during participation or within one year of program exit; information on the type of recognized postsecondary credentials received by program participants; information on the cost of attendance, including tuition and fees, for program participants; and information on program completion rates for program participants. In addition, the governor may require additional, specific performance information deemed necessary to determine continued eligibility. States are required to publish and disseminate annual ETP performance reports. The reports must include the following information with respect to each program of study eligible to receive WIOA funds, disaggregated by the type of entity that provided the training, during the most recent program year and the three preceding program years: the total number of participants who received training services through a WIOA Title I program, the total number of participants who exited from training services, and the average cost per participant for the participants who received training services. In addition, the ETP performance reports must include the number of participants with barriers to employment served by the WIOA Title I programs, disaggregated by each program of study eligible to receive WIOA funds and each subpopulation of such individuals, and by race, ethnicity, sex, and age. The first WIOA ETP performance report is not yet available, but some participation data are available. Within the WIOA-authorized forms of work-based learning, the most recent data available (2017) indicate 955,094 adult participants and 469,572 dislocated worker participants. The majority of participants are age 30 and over (67% of adults and 82% of dislocated workers) and unemployed or have received a layoff notice (82% of adults and 92% of dislocated workers). While many participants had no postsecondary education experience (59% of adults and 47% of dislocated workers), a notable 22% of adults and 34% of dislocated workers had a degree. Table 4 shows usage of training services among program exiters in program year 2018. Fewer than 20% of WIOA Title I participants engage in work-based learning provided under contract. The majority, over 66%, of trainees pursue skills training or upgrading through non-degree instructional and degree programs with ITAs. The most popular occupations pursued by adults through training were healthcare, transportation and material moving, and production. The most popular occupations pursued by dislocated workers were transportation and material moving, computer and mathematical, office and administrative support, and management. WIOA Title I currently supports adult entry or reentry into the workforce primarily by providing career services, but short-term training and education are also provided. The program assumes that many participants only need career services. Support for non-degree training and education pursuits could be bolstered by the following: increasing focus of One-Stop operators to increase access to non-degree training; additional funding could be dedicated to wage reimbursement and/or ITAs to ensure the availability of career services; the 20% limit on incumbent training could be relaxed to ensure current workers remain employed despite changing skill requirements, and the restriction on recipients of training services being able to obtain other grant assistance (e.g., Pell Grants) could be eliminated to allow programs to supplement one another. Non-degree program quality may vary given state and local flexibility in developing the ETPL. Title IV of the Higher Education Act (HEA; P.L. 89-329, as amended), authorizes programs that provide financial assistance to students to promote access to, affordability, and completion of higher education at certain institutions of higher education (IHEs). The programs are administered by the Department of Education. Grants are available to qualified, financially needy students, and loans are available to qualified borrowers (both students and parents of dependent students). The primary types of Title IV aid are Federal Pell Grants and federal student loans made through the William D. Ford Federal Direct Loan (Direct Loan) program. The Pell Grant and Direct Loan programs are designed to provide portable aid (i.e., the availability of aid follows students to the eligible postsecondary education institutions in which they choose to enroll). Title IV also authorizes other aid programs that are relatively smaller in scale and thus are not discussed in this report. Pell Grants and Direct Loan program loans are available to all eligible individuals regardless of congressional appropriations. The Direct Loan program is a mandatory entitlement program for budgetary purposes. As a mandatory entitlement, all eligible individuals have access to borrow in accordance with program rules, and the requisite budget authority is available. The Pell Grant program is often referred to as a quasi-entitlement because eligible students receive the Pell Grant award to which they are entitled regardless of discretionary appropriations levels. Pell Grants and Direct Loans may be used to pursue Title IV-eligible programs of study, which include non-degree instructional and degree programs and some work-based learning. Title IV-eligible programs must be offered by Title IV-participating IHEs. To be eligible, programs and Title IV-participating IHEs must meet a variety of criteria, including quality assurance (see the \" Quality Assurance Mechanisms \" section). Title IV-participating IHEs are classified as public IHEs, private nonprofit IHEs, proprietary (private for-profit) IHEs, and public and private nonprofit postsecondary vocational institutions. Non-degree programs must meet several eligibility requirements. For example, in general, the Title IV-eligible non-degree instructional program and the Title IV-eligible portion of work-based learning must lead to a certificate or other recognized non-degree credential (e.g., diploma or license). Also, Title IV aid is generally not available for noncredit programs or portions of programs for which a defined number of credit or clock hours is not associated. For instructional and work-based learning programs measured in clock hours, the OJT portion of work-based learning must be offered under the supervision of an IHE. If a portion of the OJT is offered by an entity under contract with an IHE, such portion must be less than 50% of the program. In general, non-degree programs are subject to specific durational requirements, including weeks of instructional time and number of credit or clock hours. For Pell Grants, the non-degree programs offered by public and private nonprofit postsecondary vocational institutions and proprietary institutions must either be at least 15 weeks of instructional time and at least one of the following: 600 clock hours, 16 semester hours, or 24 quarter hours; or at least 10 weeks of instructional time and at least one of the following: 300 clock hours, 8 semester hours, or 12 quarter hours. For the Direct Loan program, non-degree programs offered by public and private nonprofit postsecondary vocational institutions and proprietary institutions must be at least 10 weeks of instructional time and 300-599 clock hours. In addition, students must be enrolled in an eligible program of study on at least a half-time basis to borrow through the Direct Loan program. See the text box below for information on an ED experiment with shorter duration programs. Non-degree programs at public and private nonprofit IHEs that are at least one academic year in length and lead to a certificate or other recognized non-degree credential are eligible for both the Pell Grant and Direct Loan programs, without regard to any of the above-specified durational requirements. For a student to be eligible to receive Title IV funds for his or her higher education, he or she must be enrolled (or accepted for enrollment) in a Title IV-eligible program. In addition, among other criteria, a student must be a U.S. citizen, national, legal permanent resident, or other specified eligible noncitizen; and have a high school diploma (or equivalent, such as a general educational development [GED] certificate) or meet other relevant criteria. Individuals must also meet program-specific eligibility criteria to receive Pell Grants or Direct Loan program loans. To receive Pell Grants, students must meet program-specific criteria that include the following: being enrolled in an undergraduate program, not having completed the curriculum requirements of a bachelor's degree, and demonstrating financial need (primarily individuals from families in the two lowest income quintiles as determined under the program's award rules). All recipients are subject to a cumulative lifetime eligibility cap on Pell Grant aid of 12 full-time semesters (or the equivalent). To receive Direct Loan program loans, students must meet program-specific criteria that include being enrolled on at least a half-time basis. Students (or their parents in the case of PLUS Loans to parents borrowing on behalf of a dependent child) may need to meet additional eligibility criteria to qualify for specific Direct Loan program loan types. The primary loans are the following: Direct Subsidized 83 Loans for undergraduate students with demonstrated financial need, Direct Unsubsidized Loans for any student regardless of financial need, and PLUS Loans for parents of dependent undergraduate students and graduate and professional students regardless of financial need. Individuals who are new borrowers on or after July 1, 2013, may only borrow Direct Subsidized Loans for a period of time not to exceed 150% of the published length of their academic program. In general, the amount of Title IV aid for which a student is eligible is guided by statutory award rules. Aggregate Title IV aid and other aid (e.g., institutional aid) typically cannot exceed a student's cost of attendance (COA). The COA is an institutionally determined measure of a student's educational expenses for the period of enrollment and generally includes items such as tuition and fees; an allowance for books and supplies; and, as applicable, an allowance for room and board. The COA may also include transportation costs and dependent care expenses. An important feature of the Pell Grant award rules is that the grant is determined without consideration of any other financial assistance a student may be eligible to receive or may be receiving. Annual appropriations acts and the HEA establish the total maximum Pell Grant award amount that a student may receive in an academic year. For award year (AY) 2020-2021, the maximum Pell Grant award that an eligible individual enrolled full-time for a 26-30 week academic year may receive will be $6,345. The amount may be reduced based on the student's COA, financial need, enrollment rate, or program duration. Pell Grant awards used to pursue non-degree programs are generally subject to income taxation; whereas Pell Grant awards used to pursue degree programs are only subject to income taxation if used for purposes other than tuition and fees. Direct Loan program award rules vary by type of loan borrowed. In addition, numerous other factors could affect the type and amount of aid awarded. However, some generally applicable rules apply to the Direct Loan program. Other types of financial assistance awarded to the student must be taken into account when awarding Direct Loan program loans. Also, an individual cannot be awarded a Direct Subsidized Loan or Direct Unsubsidized Loan in an amount that exceeds statutory annual and aggregate award limits, which are determined based on an individual's dependency status and class level. For example, a dependent undergraduate student may borrow up to $5,500 in Direct Subsidized Loans and Direct Unsubsidized Loans for his or her first year, while an independent undergraduate student may borrow up to $9,500 in such loans in his or her first year. The annual maximum loan amount an undergraduate student may receive is prorated when the borrower is enrolled in a program that is shorter than a full academic year. ED's Office of Federal Student Aid (FSA) is the primary entity responsible for administering the Title IV aid programs. The administrative tasks associated with the programs are completed by a number of actors (e.g., FSA, IHEs), depending on the function. FSA undertakes many high-level functions in Title IV program administration. These include, but are not limited to, contracting for the operation and maintenance of systems to process aid; providing customer service, training, and user support for the administration of the programs; and ensuring integrity of the programs. IHEs complete many of the day-to-day functions associated with awarding and disbursing Title IV aid to students. ED makes funds available to IHEs so that they can disburse awards to students. IHE functions include verifying a student's eligibility to receive the aid, calculating aid amounts, disbursing aid funds, and managing program funds at the institutional level. In addition, under the Pell Grant program ED pays participating IHEs an administrative cost allowance. Several HEA provisions intended to ensure the quality of Title IV-eligible programs and Title IV-participating IHEs have been enacted to protect students and taxpayers. The program integrity triadâstate authorization, accreditation, and ED certificationâis the foundation of these provisions and is intended to provide a balance in the Title IV eligibility requirements. State authorization is intended to provide consumer protection, accreditation is intended to provide quality assurance, and ED certification is intended to provide direct oversight of compliance in the Title IV programs. In addition to the requirements of the program integrity triad, non-degree programs may be required to meet gainful employment requirements. The following subsections briefly describe each piece of the triad and the gainful employment requirements as they relate to Title IV-eligible programs. An IHE must be authorized to provide a postsecondary education within the state in which it is located to participate in the Title IV programs, which includes complying with any applicable state approval or licensure requirements. State approval and licensure requirements vary appreciably among the states. For instance, some states approve IHEs and their individual educational programs, while other states only require approval of an IHE as a whole. The degree to which a state evaluates an individual educational program may also vary by state. For example, states variously evaluate program curricula, program objectives, projected enrollment, student outcome measurements (e.g., completion and placement rates), and justification of program need (e.g., industry demand or consumer interest). In addition, some states require programmatic accreditation (discussed below) or separate approval by another state agency (e.g., a professional licensing agency). To participate in Title IV programs, an IHE must be accredited by an accrediting agency recognized by ED as a reliable authority of the quality of the education being offered. Accrediting agencies are private associations of member educational institutions or industry associations that undertake quality review of educational institutions and/or programs. In general, an IHE need only be accredited by a regional or national accreditor to participate in Title IV programs. The regional or national accreditor must evaluate whether the IHE meets accrediting agency-prescribed criteria. Although these criteria vary among the agencies, ED-recognized accrediting agencies must regularly evaluate statutorily specified areas, including an IHE's faculty, curricula, facilities, student support services, and success with respect to student achievement in relation to the institution's mission. Within these broadly outlined criteria, accrediting agencies have discretion as to the precise evaluation measures. Regional and national accreditors evaluate an IHE's performance on the whole, but may choose to evaluate a sample of programs. An educational program does not need to be accredited by a programmatic accrediting agency for Title IV purposes. However, an IHE may seek programmatic accreditation to satisfy employer and some occupational licensure requirements. To gain programmatic accreditation, an educational program offered by an IHE is evaluated on established standards for the particular field of study, such as whether the curriculum meets professional guidelines. When an IHE seeks to participate in Title IV programs, it must apply for certification from ED. During this process, ED evaluates whether the IHE meets Title IV participation requirements. ED reviews each educational program to determine whether it satisfies eligibility requirements. For example, the eligibility requirements include the aforementioned durational requirements; and 300-599 clock-hour programs that may be eligible to participate in the Direct Loan program must, among other requirements, have verifiable completion and placement rates of at least 70%. If an IHE wants to add a new educational program to its Title IV eligibility, it generally may self-certify to ED that the new program is Title IV eligible or, for new 300-599 clock-hour programs, submit an application to ED for approval. The HEA specifies that most non-degree programs must prepare students for \"gainful employment in a recognized occupation.\" Regulations promulgated in 2014 (2014 GE regulations) defined the term gainful employment in a recognized occupation , but they were rescinded in 2019. The 2014 GE regulations were intended to serve as a proxy measure for programmatic quality by establishing debt-to-earnings (D/E) rates that programs were required to meet. The rationale behind the rule was that if an educational program is of sufficient quality, then it will lead to earnings that will enable students to repay the student loans they borrowed for enrollment in the program. Under the GE framework, each program subject to the GE rules must meet two D/E rates. Programs that fail to meet minimum standards in multiple years will be ineligible for Title IV participation for three years. No program has yet been subject to loss of Title IV eligibility under the requirements. In addition, the education programs subject to GE rules must meet third-party standards such as being approved by an ED-recognized accrediting agency, being recognized by the relevant state agency, being programmatically accredited (if required by a federal entity or state agency in the state in which the IHE is located or otherwise seeks state approval), and meeting any applicable educational prerequisites for professional licensure or certification in the state in which the IHE is located. The HEA does not define measures of performance for the Title IV programs. The HEA does require that Title IV participating IHEs and ED report information on enrollment, certificates and degrees conferred, student charges, and other information that may be of interest to prospective and current students and policymakers. ED collects data annually on Title IV non-degree instructional for-credit programs. Table 5 shows the total number of non-degree instructional for-credit programs and credentials and the percentage of non-degree instructional for-credit programs and awards by institutional sector in AY2017-2018. Of the 6,418 Title IV-participating IHEs, 4,618 offered non-degree for-credit programs. Approximately half of Title IV-eligible non-degree for-credit programs are offered by private for-profit IHEs, while more than two-thirds of non-degree for-credit credentials from Title IV-eligible programs are awarded by public IHEs. In AY2015-2016, approximately 765,000 Pell Grant recipients pursued non-degree credit programs and received about $2.7 billion in Pell Grant awardsâroughly 10% of the total number of recipients and dollar amount of awards. Also in AY2015-2016, approximately 10% of undergraduates who borrowed a Direct Loan were pursuing certificate programs. Support for non-degree programs is limited in several ways: Title IV aid is only available to support individuals pursuing credit programs of a statutorily specified duration at Title IV-participating IHEs. Support for work-based learning is limited to programs or portions of programs that lead to a certificate or degree and that are offered by Title IV-participating IHEs. Some students who may choose to pursue training or education via non-degree programs will not be eligible. These include students who do not have a high school diploma (or equivalent) or who are not enrolled in a career pathway program; with respect to Pell Grants, students who have a bachelor's degree; and with respect to the Direct Loan program, students enrolled less than half-time. Non-degree program quality may vary. It is primarily assessed through the program integrity triad, since the 2014 GE rules have been rescinded. State authorizers and accreditors have some flexibility in determining and applying criteria to assess quality. Few reports have examined state authorization requirements in general, or as they relate to program quality in particular. However, those that have done so identify the variation among state authorization requirements as an impediment and a complicating factor in assessing institutional experiences with state authorization. They note that an individual state's history, resources, and priorities may affect the extent to which the state chooses to take a more active or passive role in some areas, such as evaluating non-degree programs. Despite difficulties in assessing state authorization requirements, researchers have pointed to the following as potential weaknesses in at least some states' authorization requirements: concerns that the oversight of some state boards may be impaired by potential conflicts of interest, overrepresentation of special interests, or a sense of being beholden to IHEs; input requirements (e.g., faculty members' qualifications, facilities and equipment used in the instructional process) may impede innovative education models; elongated timeframes to receive state authorization, which may be a result of a complex regulatory state process or a lack of state resources; conflicts across state laws in instances where an institution offers educational programming in multiple states; and despite the fact that many states require institutions to report on student outcomes, few states may actually make authorization renewal decisions based on those outcomes. A 2014 GAO report identified some of the strengths and weaknesses of the accreditation system as it relates to program quality. One strength is that institutional accreditors tailor their expert peer reviews depending on the school type and mission. In addition, programmatic accreditation is specifically aligned to the particular field or type of program. Potential weaknesses identified by GAO include conflicting interests between IHEs and the IHE-funded accreditors, the insufficiency of accreditor capacity and resources, the inability of experts to assess innovative modes of education (e.g., competency-based education), and the difficulty in defining and measuring academic quality. Education tax benefits, administered by the Internal Revenue Service, partially offset some of the costs of higher education for eligible taxpayers. They differ from other benefits in several ways. First, unlike many benefits programs, education tax benefits tend to provide the greatest advantage to upper middle income taxpayers. Second, unlike traditional financial aid, which is used to pay for education expenses around the time the education is received, taxpayers claim education tax benefits when they file their federal income tax return. Hence, taxpayers receive a tax benefit only after they have already paid for their education expenses, sometimes many months after the expense is incurred. Many education tax benefits are only available to individuals enrolled in a degree program. However, some education tax benefits do have eligibility rules that are broad enough to include individuals enrolled in non-degree programs. In contrast to most other federal education programs, the education tax benefits discussed in this report reduce federal revenues rather than increase outlays. Hence, education tax benefits are considered a type of \"spending through the tax code\" that is not subject to annual appropriations. Any persons that meet the requirements for these benefits can receive them (generally when they file their federal income tax return). Education tax benefits may encourage overconsumption of education or subsidize education that would have taken place without these tax incentives. Taxpayers in non-degree programs may currently be eligible for the following: The Lifetime Learning Credit, which reduces a taxpayer's income tax liability and provides financial assistance to taxpayers (or their family members) who are pursuing education. The Lifetime Learning Credit is a nonrefundable tax credit for 20% of the first $10,000 in qualifying expenses. The credit phases out for taxpayers above certain income thresholds. Employer Provided Educational Assistance, which excludes eligible employer provided educational costs from the taxpayer's taxable income. 529 accounts, which are intended to help families save for future educational expenses. The Lifetime Learning Credit and 529 accounts may be used for eligible education expenses associated with pursuing non-degree programs at Title IV-eligible IHEs. A broader range of non-degree programs may be eligible for employer provided educational assistance. Qualified education expenses used to calculate the amount of the credit are defined as tuition and related expenses required for enrollment in a course at a Title IV-eligible IHE. Related expenses are amounts that are required for enrollment, including books, supplies, and equipment, but do not include living expenses or other expenses that are not required for enrollment. These expenses must be reduced by any amount of tax-free educational assistance used to pay for qualified educational assistance (including employer provided educational assistance and tax-free distributions from 529 accounts). For the purposes of the LLC, a course can either be part of a post-secondary degree program or be a course to help the student acquire or improve job skills (e.g., part of a non-degree program). Employer provided educational assistance can be used for tuition, fees, books, supplies, and equipment associated with any form of instruction or training that improves or develops the recipient's skills. According to IRS Publication 970, \"the payments don't have to be for work-related courses or courses that are part of a degree program.\" For example, an employer could pay up to $5,250 of the tuition costs of an employee's course to improve his or her skills. This amount would not be included in the employee's wage income. In addition, the statute does not state that the institution providing the program must be a Title IV-eligible IHE. Tax-free withdrawals from 529 accounts are allowed for qualified expenses, which include tuition and required fees, room and board, books, supplies, equipment, and, for special needs beneficiaries, additional expenses at a Title IV-eligible IHE. Those expenses do not need to be associated with a degree program. Eligibility for training depends on factors outside of the tax code. Whether the training qualifies for tax incentives is a different question. To qualify for tax benefits, participants must either file a federal income tax return or be claimed as a dependent or spouse on one. Taxpayers can claim the credit for qualified education expenses paid for themselves, their spouses, or their dependent children. Taxpayers cannot claim the credit if they file as married filing separately, if they (or their spouses if filing jointly) are nonresident aliens, or if their income is $68,000 or more ($136,000 or more if married filing jointly). Participants can only use this tax benefit if their employer offers an educational assistance program. Beneficiaries of a 529 account are designated at the time of its establishment. Amounts in a 529 account may also be transferred to another 529 account established for certain relatives of designated beneficiaries. Individuals apply for the LLC when they file their federal income tax return after incurring qualified educational expenses. Qualified educational expenses paid from a 529 account or through an employer are tax-free. The LLC is calculated as 20% of the first $10,000 of qualified education expenses, yielding a maximum credit of $2,000 per taxpayer. The maximum credit amount phases out for taxpayers with income between $58,000 and $68,000 ($116,000 and $136,000 for married joint filers) in 2019. Because the credit is nonrefundable, the amount of the credit that the taxpayer receives cannot by definition exceed the taxpayer's federal income tax liability. Hence, if a taxpayer has little to no federal income tax liability (e.g., they are low-income), they will generally receive little if any benefit from a non-refundable tax credit like the LLC. Employers may choose to provide their employees with up to $5,250 in tax-free tuition assistance per year under an employer sponsored educational assistance program. The assistance is not included in the employees' wages and is not subject to federal income taxes, nor is it subject to payroll taxes. Taxpayers can withdraw funds from their 529 accounts tax-free and use the distribution to pay for qualifying education expenses associated with non-degree programs, subject to restrictions of the individual plans. (In practice, many taxpayers establish 529 plans for children. However, these taxpayers are allowed under the statute to transfer some or all of the child's 529 account balance into the 529 account of certain relatives of the child tax-free. ) The IRS primarily relies on taxpayers, employers, and states to ensure proper administration of the benefits, although the IRS may audit taxpayers to ensure compliance. Taxpayers effectively apply for the LLC by filing their federal income tax return (Form 1040) and IRS Form 8863 (related to claiming education tax credits). These forms, and their associated instructions, describe eligibility rules and help taxpayers calculate the amount of the credit. Taxpayers do not explicitly need to list the course or program of study they are enrolled in when applying for the LLC on their federal income tax return, although they are asked to provide information about the educational institution on Form 8863. To qualify as an educational assistance program, an employer's plan must be in written form and must meet certain other requirements. According to regulation, \"it is not required that a program be funded or that the employer apply to the IRS for a determination that the plan is a qualified program. However, under IRC Section 601.201 (relating to rulings and determination letters), an employer may request that the IRS determine whether a plan is a qualified program.\" In addition, a program cannot discriminate in favor of employees who are officers, shareholders, self-employed, or highly compensated (although such employees can be eligible for these benefits along with other employees). Employees eligible to participate in the program must be given reasonable notice of its terms and availability. Generally, states sponsor 529 plans, and individuals can establish accounts in a given plan for a designated beneficiary. When a taxpayer withdraws an amount from a 529 plan, the 529 program is to provide the taxpayer with a Form 1099-Q, which will show the total amount withdrawn and the breakdown between investment growth (\"earnings\") and the original investment (\"basis\"). If taxpayers apply any of this withdrawal to a non-eligible expense, they are required to include a portion of the withdrawal on their federal income tax returns, and hence, it may be subject to taxation. Unless audited, a taxpayer does not have to document how they have spent their withdrawals (e.g., the kind of program). In 2018, approximately 0.5% of taxpayers were audited. Outside of the eligibility rules discussed above, the Internal Revenue Code (IRC) does not have rules regarding the quality of training and education programs for which a tax benefit is claimed. The IRS does not publish, nor is it required to collect or publish, any measures of a non-degree program's performance. IRS data on these education tax benefits are limited. IRS data indicate that in 2015, approximately 2.5 million taxpayers claimed approximately $2.1 billion of the LLC, for an average credit of $830 per taxpayer. These data indicate that approximately half of all LLC dollars were claimed by taxpayers with adjusted gross income (AGI) between $50,000 and $200,000. Taxpayers with AGI below $15,000 or more than $200,000 generally did not claim the LLC, due to its nonrefundability and phase-out, respectively. To date, no studies have evaluated the impact of the LLC on enrollment in non-degree programs or its effectiveness in helping non-degree candidates improve their job skills. Administrative data from the IRS on the exclusion of employer provided educational assistance are unavailable. To date, no studies have evaluated the impact of employer provided educational assistance on enrollment in non-degree programs or its effectiveness in helping non-degree candidates improve their job skills. Administrative data from the IRS on 529 plans are unavailable. Survey data analyzed by GAO indicate that relatively few families have established these accounts, and that those who do tend to have greater assets and income than those who do not establish the accounts. CRS has not identified any studies that have evaluated the impact of 529 plans on enrollment in non-degree programs or their effectiveness in helping non-degree candidates improve their job skills. Most research regarding education tax benefits broadly have found little effect on increasing enrollment. This research highlights some limitations with education tax benefits that may be applicable to non-degree programs. First, education tax benefits, when received many months after expenses are incurred, may provide limited assistance to students who cannot afford upfront education costs. Second, as GAO has highlighted, there are a variety of different education benefits and it may be confusing for taxpayers to determine what benefit they are eligible for, and which benefits provide the largest tax savings. Finally, the education tax benefits discussed in this report only benefit taxpayers with income tax liabilities, which excludes many low-income taxpayers who have little to no income tax liabilities. Veterans education programs (GI Bills) were originally intended to help former servicemembers adjust to civilian life by providing for the \"reintegration of the discharged soldier, sailor, and marine into the civilian economy in the most prompt and adequate manner.\" Over the years, the benefits have been renewed and revised to also compensate for compulsory service, encourage voluntary service, avoid veteran unemployment, provide equitable benefits to all who served, and promote military retention. The pilot Veteran Employment Through Technology Education Courses (VET TEC) and its predecessor are an alternative approach that incentivizes training providers for program completion and employment. VET TEC is not a GI Bill. The GI Bills and VET TEC provide financial assistance to students whose eligibility is based on a qualifying individual's service in the uniformed services while such students are enrolled in approved programs of education, which include training programs. The GI Bills and VET TEC are administered primarily by the Department of Veterans Affairs. The GI Bills are appropriated entitlements funded with mandatory spending. Appropriated entitlement spending is funded, but not controlled, in annual appropriations acts. VET TEC is funded by a limited allocation from GI Bill appropriations. The remainder of this section describes the Post-9/11 GI Bill and VET TEC. The Post-9/11 GI Bill has represented approximately 80% or more of total GI Bill participation and spending in each year since FY2013. While the majority of Post-9/11 GI Bill benefits are used to support education through degree pursuit, they are also used to support students pursuing training and education through approved work-based learning and non-degree instructional programs at a variety of training establishments and educational institutions. Non-degree programs include credit and noncredit instructional programs, courses that prepare individuals for assessments to further their education or career (e.g., Advanced Placement [AP] exams or real estate licensing exams), OJT, apprenticeships, and courses that lead to a predetermined educational, vocational, or professional objective ( Table 6 ). The variety of eligible programs was intended to provide eligible individuals with the maximum choice in training and education options. VET TEC benefits are only available for the pursuit of non-degree high-technology programs of education at contracted training providers that enter into a Program Participation Agreement (PPA) with the VA. A high-technology program of education provides instruction in computer programming, computer software, media application, data processing, or information science. The training providers must meet several criteria including, but not limited to, not offering degrees and not charging tuition and fees that exceed annual VA caps. Post-9/11 GI Bill benefits are available to eligible servicemembers and veterans and their family members. The program is not open to the general public and is not based on family income levels. A servicemember or veteran must meet qualifying active duty service requirements in the uniformed services and either continue on active duty or meet specified discharge/release requirements. An eligible servicemember may transfer benefits to family members. The spouse and children of a servicemember who dies in the line of duty while serving on active duty as a member of the Armed Forces are also eligible. To be eligible for VET TEC, an individual must be a GI Bill-eligible veteran enrolled full-time in a VET TEC-eligible program. VET TEC participants may or may not be recipients of GI Bill benefits. Both the Post-9/11 GI Bill and VET TEC provide living stipend payments directly to participants and payments to providers for direct program costs. Program costs are paid by the Post-9/11 GI Bill concurrent with program pursuit, while VET TEC pays costs during and after pursuit. In addition to payments, eligible individuals may apply for personalized counseling to help guide their career paths, ensure the most effective use of their VA benefits, and help them achieve their goals. The Post-9/11 GI Bill provides eligible persons an entitlement to educational assistance payments over a period of 36 months (or its equivalent in part-time educational assistance). In cases where a veteran transfers all or a portion of the benefits, transferors and transferees must share the 36 months of entitlement. Under the Post-9/11 GI Bill, several types of benefit payments are available. The amount of each payment and eligibility for the payments depends on an individual's benefit level; the type of training or education program pursued; the rate of enrollment or pursuit; actual charges, and when relevant, in-state tuition charges; the location of the training or education; and the mode of education delivery. An individual's benefit level is based on their aggregate length of qualifying active duty service or other eligibility characteristics. While an individual is enrolled in a program of education or pursuing training, an educational institution may receive payments for tuition and fee charges, and the individual may receive a monthly housing allowance, a books and supplies stipend, tutorial assistance, and additional monthly payments. Individuals are reimbursed for fees charged for taking approved tests. As an illustration in AY2019-2020, a veteran enrolled in an educational program at a hypothetical private educational institution may receive up to $24,476.79 in tuition and fees, but no more than the actual tuition and fee charges; between approximately $800 and $4,300 monthly for housing, depending on location; and up to $1,000 for books and supplies. Veterans pursuing OJT or apprenticeship receive a progressively decreasing housing allowance that is intended to partially offset scheduled wage increases associated with the OJT or apprenticeship, and may not receive a tuition benefit if no tuition is charged by the sponsoring employer or instructional provider. Under VET TEC, payments are provided to veterans and training providers. While enrolled full-time, veterans receive a monthly housing allowance that is similar to the Post-9/11 GI Bill housing allowance. The VA reimburses the qualified training provider for the cost of tuition and other fees for the program. The VA pays 25% of the cost upon initial enrollment of an eligible veteran, 25% upon program completion, and 50% upon employment of the completer in a suitable field. Training providers cannot charge tuition and fees to the VET TEC participant directly. Potential participants apply to the VA to ensure eligibility for either the Post-9/11 GI Bill or VET TEC. Eligible individuals may then enroll in or enter into a training agreement for approved programs. Educational institutions and training establishments certify the expected and actual enrollment and pursuit of eligible individuals to the VA. Certifications of individual enrollment and pursuit are made at regular intervals and when there are changes to what was previously certified. The VA verifies eligibility, calculates payment amounts, and distributes payments to eligible individuals and educational institutions. Program quality for GI Bill-approved programs is primarily determined by semi-independent state approving agencies (SAAs), but the VA also has oversight obligations. Program quality for VET TEC programs relies heavily on participant employment outcomes. While the VA primarily relies on SAAs for initial approval of programs of education, the VA and SAAs share responsibility for ongoing oversight. The VA contracts (or enters into agreement) with each SAA to provide approval, oversight, and other related activities to ensure the quality of programs of education and proper administration of GI Bill benefits. Statutory and regulatory provisions and policy have established standards for the programs of education, educational institutions, and training establishments. The quality standards apply to each program of education. Many standards were established in response to reports of poor quality or incidences of abuse. Four prominent standards apply to the quality of most programs: program objective, independent study (e.g., online) restrictions, the 85-15 rule, and contractual arrangement restrictions. The program objective may not be avocational, recreational, or personal development. Independent study programs must be accredited by an ED-recognized accrediting agency and must lead to a degree or certificate that meets additional statutorily specified criteria. Under the 85-15 rule, no more than 85% of students enrolled in a program of education may have tuition, fees, or other charges covered by institutional aid or by a GI Bill. For programs offered in part or exclusively through contractual agreements, the contracted courses must be independently approved for GI Bill purposes. Besides the standards that apply to most programs of education, there are additional requirements depending on the type of program. For example, non-degree programs must be offered in facilities with adequate space and equipment, taught by instructors with adequate education and qualifications, and follow curricula with recognized accepted standards. Programs designed to prepare individuals for state licensure or certification or for an occupation requiring state board approval must meet the relevant instructional requirements. Programs of education that have not been approved or certified as meeting quality educational criteria by another government agency are required to meet various standards and criteria in addition to the aforementioned standards. Non-degree programs that have been approved by other government agencies are Federal Aviation Administration (FAA) approved flight training programs, DOL Registered Apprenticeships, and state-approved apprenticeships. The standards include, but are not limited to, having faculty with adequate qualifications and having a curriculum that is similar to other institutions, or meeting licensure, certification, or board standards. The VA is the sole arbiter in determining if a facility is eligible for VET TEC. The payment structure and several key elements of the PPA are designed to ensure program quality and value. The payment structure, as described earlier, reimburses training providers when veterans complete the program and when they find meaningful employment . Meaningful employment means employment occurring within 180 days of program completion and using the skills of the completed program for self-employment, promotion, or new employment. Key quality-related requirements within the VET TEC PPA require that training providers be licensed or approved by the required federal, state, or municipal agencies and meet the 85-15 rule. The PPA further requires that the VET TEC-eligible programs not be self-paced. As of 2013, the VA is required to report annually on the number of credit hours, certificates, degrees, and other qualifications earned by Post-9/11 GI Bill participants. The requirement was initiated to determine whether the program effectively prepares eligible individuals for the future. The VET TEC program performance measures are the program admittance rate, job placement and retention rates for program completers, the percentage of program completers employed less than six months in the field of study, the percentage of program completers employed at least six months in the field of study, median annual salary for employed program completers, and transfer rates to other academic or vocational programs. Although GI Bill participant pursuit of training and education through non-degree programs is low, many educational institutions and training providers that do not offer degrees are approved for GI Bill purposes. Approximately 9% of GI Bill participants pursued an educational certificate in 2013, compared to 81% who pursued a degree. In FY2018, approximately 0.4% of Post-9/11 GI Bill participants were pursuing OJT or an apprenticeship. Of the educational institution and training establishment locations that offered programs approved for GI Bill purposes, almost 500 flight school locations, over 18,000 school locations, and over 9,000 OJT/apprenticeship locations did not award any degrees, based on data from December 2019. Of the over 18,000 school locations, 37% were private for-profit, 37% were public, and 27% were private nonprofit schools. The most popular certificates completed by Post-9/11 GI Bill participants in AY2018-2019 were in welding; information technology; heating, ventilation, and air conditioning; health care; and gunsmithing. Based on July 1, 2019, data following the February 2019 VET TEC launch, there were five approved training providers and eight participants. Program eligibility is limited to individuals who have served in the uniformed services and their family members. Some recent examinations of the program have found that program quality oversight may be compromised by the oversight process described above. A 2018 GAO report indicated that SAA funding, the scope and focus of oversight actions, and the process for choosing institutions to audit may limit the ability to adequately conduct thorough oversight. A 2018 VA OIG report found that SAAs lacked adequate controls to review all statutory approval standards, including, in particular, potentially deceptive advertising or program modifications. SNAP (formerly known as the Food Stamp Program), is administered by the Department of Agriculture and provides eligible low-income households with benefits redeemable for eligible foods at authorized retailers. The vast majority of federal funding for SNAP is for the food benefits themselves, but the federal government provides other SNAP funding as well. For example, states receive SNAP Employment & Training (E&T) funding to provide employment and education services for SNAP participants; this education is sometimes provided through non-degree programs. First established by Congress in 1987 (then called Food Stamp Employment & Training (FSET)), the statutory purpose of SNAP E&T is to assist members of households participating in SNAP in \"gaining skills, training, work, or experience that will increase their ability to obtain regular employment and meet state or local workforce needs.\" Congress also established SNAP E&T as a way to meet the SNAP's work-related requirements; generally, nondisabled adults ages 18 to 59 are subject to these requirements. Each state agency responsible for administering SNAP is required to implement a SNAP E&T program. States have the option to make their SNAP E&T programs mandatory or voluntary. That is, the state may choose to (1) make participation in E&T a condition of receiving SNAP benefits (mandatory) or (2) offer E&T but not require participation (voluntary). According to FY2017 USDA Food and Nutrition Service (USDA-FNS) data, the majority (35 of 53) state agencies operate voluntary E&T programs. A state's E&T program must include one or more of the following components: job search programs, job search training, workfare (work-for-benefits), work experience (may include OJT or apprenticeships), education, self-employment training, WIOA (i.e., job training services that are managed by agencies under WIOA), and programs to improve job retention. SNAP E&T funding includes several streams of mandatory funding: nearly $124 million is available without a state match, and then an open-ended federal match is available for states' administrative expenses and states' reimbursements for dependent care and transportation. Total E&T funding each year varies, depending on states' use of open-ended matching funding. Since October 2015, USDA-FNS, in partnership with Seattle Jobs Initiative (SJI), has been operating SNAP to Skills , a SNAP E&T capacity-building project USDA describes as addressing the need for education beyond high school. The project is \"designed to provide states the technical assistance, tools, and resources they need to build more effective and job-driven SNAP E&T programs.\" SNAP to Skills provides enhanced technical assistance to 10 states, but reaches additional states with tools, resources, and a SNAP E&T learning academy. Statutory provisions require some integration between the WIOA Title I program and SNAP E&T. The SNAP E&T program must be delivered through the statewide workforce development system, unless the component is not available locally through such a system. While SNAP E&T recipients can receive services through WIOA One-Stop centers, SNAP staff have experience addressing the unique challenges of E&T recipients, such as low basic skills, housing instability, and mental health issues. A state's available services and programs vary. SNAP E&T programs can provide certain education activities, as specified in federal regulations: Educational programs or activities to improve basic skills or otherwise improve employability including educational programs determined by the State agency to expand the job search abilities or employability of those subject to the program. Allowable educational activities may include, but are not limited to, high school or equivalent educational programs, remedial education programs to achieve a basic literacy level, and instructional programs in English as a second language. Only educational components that directly enhance the employability of the participants are allowable. A direct link between the education and job-readiness must be established for a component to be approved. SNAP E&T education activities must have a direct link to employment and help SNAP participants move promptly into employment. Some states do offer and fund SNAP participants' pursuit of education and training via non-degree programs. According to FY2017 data, the most common education activities offered are vocational training and basic education. SNAP E&T may also provide actual work experience or training. Apprenticeships and subsidized employment are allowable, as are unpaid internships. SNAP E&T serves those SNAP participants who are subject to the program's general work requirements, but some states may target their services to a subset of this population. To participate in SNAP, households must be income-eligible and meet certain other nonfinancial rules such as citizenship and work requirements. To be financially eligible, household gross monthly income (all income as defined by SNAP law) must be at or below 130% of the federal poverty level, and household net monthly income (SNAP-specified deductions are subtracted) must be at or below 100% of the federal poverty level. Under certain state options, the threshold may be as high as 200% of the federal poverty line. Under current law for SNAP participation, general work requirements or work registration requirements are in place. That is, non-disabled adults who are not working are required to register for work, accept a job if offered one, and not reduce their work below 30 hours per week. This work registrant population is the eligible population for SNAP E&T programs, but states may design their E&T programs to focus on a subset of this population. States may also choose to make E&T mandatory for this population or a subset of it. The process by which SNAP agencies or third-party partners assign or refer an individual for particular E&T programs or services varies. USDA guidance requires state agencies to assess participants to determine the most effective E&T component(s) for that participant; guidance suggests a range of assessment tools. The 2018 farm bill ( P.L. 115-334 , enacted December 2018) now requires all states to include \"case management services such as comprehensive intake assessments, individualized service plans, progress monitoring, or coordination with services providers.\" In general, E&T funds cannot be used to serve Temporary Assistance for Needy Families cash assistance recipients (see the \" Temporary Assistance for Needy Families (TANF) (HHS) \" section for more information). Some individuals enrolled half-time or more in an IHE are ineligible for SNAP. Such individuals may be eligible if assigned or placed in the IHE through a specified program, including a WIOA Title I program or SNAP E&T. SNAP provides food assistance, while SNAP E&T provides educational programs and funds some associated costs. SNAP E&T funds may be used to cover the costs of education, develop a program component, or pay for the costs associated with an education program. Associated costs may include dependent care and transportation. Most E&T funding does not go directly to program participants but rather is administered by state agencies and contracted programs. It is common for states to contract for specific education programs or to work through partnerships. USDA-FNS presents third-party partnerships as a model for developing, implementing, and growing a SNAP E&T program. Through such partnerships, states work with a third party such as a community college. The third party provides a financial or in-kind contribution to the program. Upon invoicing, the state draws down federal funds to reimburse the partners. The federal funds may be 100% funding or a 50% match depending on the funding stream. For Pell Grant-eligible students, the Pell Grant must be the first payer of college expenses. The first payer indicates that the Pell Grant amount would be based on full college expenses, whereas the E&T benefit would be based on the college expenses not covered by the Pell Grant. Associated expenses supported by E&T must be reasonable and necessary. Before using E&T funds for tuition, the state must first explore other funding sources, such as education grants (but not loans). W orkforce partnerships were added to the E&T program by the 2018 farm bill. Workforce partners may include private employers, nonprofit organizations providing services relating to workforce development, and training providers identified on WIOA ETPLs. The workforce partners provide training, work, or experience. As mentioned above, work components may include OJT and apprenticeships. Each SNAP E&T program is designed by the state within a federal framework of rules and is subject to USDA-FNS approval. Statute and regulation set out requirements for states' E&T plans. State programs can and do vary greatly in their capacity and services offered. Per changes made by the 2018 farm bill, the programs must be implemented in consultation with the state workforce development board (WDB) or private employers or employer organizations (See the \" WIOA Contracts and Individual Training Accounts (ITAs) (DOL) \" section for state WDBs' responsibilities under WIOA Title I). SNAP E&T participants generally learn of the available programs and services through the SNAP state agency or referrals to partner agencies. States typically monitor and assess provider and program quality, though USDA-FNS has increasingly provided technical assistance and resources to help them do so. The 2014 farm bill (Agricultural Act of 2014; P.L. 113-79 ) required USDA to establish a performance indicators reporting process. USDA has finalized the regulation implementing this reporting, and the first annual report was due in January 2018. As of the date of this report, USDA has not published a compilation or information based on the reports. The national reporting measures are unsubsidized employment in the second quarter after completion of participation in SNAP E&T; median quarterly wages in the second quarter after completion of participation in SNAP E&T; unsubsidized employment in the fourth quarter after completion of participation in SNAP E&T; and completion of an educational, training, work experience, or OJT component. The majority of SNAP E&T participants were provided services other than education. According to USDA-FNS FY2016 data, the most recent available, 38 of 53 SNAP state agencies provided an education component in their E&T program, and the states served almost 70,000 SNAP participants in the education components of their programs. FY2016 SNAP E&T participation data on all participants (not necessarily education component participants) by state show that some states served fewer than 100 participants, while other states served nearly 100,000. There are a few limitations to SNAP E&T. First, it is more common for SNAP E&T participants to participate in job search or other non-education components; fewer than 10% of participants receive education. Second, information is not available on the quality of educational programs or work experience. A forthcoming evaluation on the 2014 farm bill pilot projects may inform future guidance and policymaking. In addition, subsequent employment outcomes are not available. Finally, wages earned through SNAP E&T may increase household income, and thus may reduce eligibility for SNAP and SNAP E&T. The Temporary Assistance for Needy Families block grant has the statutory purpose of increasing state flexibility to (1) provide assistance to needy families with children so that children can live in their own homes or in the homes of relatives; (2) end the dependence of needy parents on government benefits by promoting work, job preparation, and marriage; (3) reduce out-of-wedlock pregnancies; and (4) promote the formation and maintenance of two-parent families. States may expend their TANF block grants (and associated state funds) in any manner \"reasonably calculated\" to achieve TANF's statutory purpose. TANF is administered HHS. Under federal budget rules, TANF is a mandatory spending program. TANF is not a dedicated education and/or training program, but a broad-purpose block grant that gives states permission to spend funds on a wide range of benefits, services, and activities. TANF is best known for providing monthly assistance to needy families with children, primarily headed by single mothers, to help meet their basic needs. This assistance is usually in the form of cash, but may also be paid as a voucher or to a third party to meet a basic need. TANF funds may also be used to support subsidized employment, OJT, and training and education programs; however, this is a subset of the types of activities that TANF may fund. Several states have used TANF funds to support career pathways . According to HHS, \"a career pathway provides access to interconnected education programs and support services for students and workers to help them advance in their chosen career paths to jobs with family-sustaining wages.\" One state program includes coordinators who are paid with TANF funds but are employed at a community college and serve as case managers, recruiting students and ensuring they have access to support services. The program also makes use of college work-study jobs. TANF has no rules limiting the types of training and education programs that are eligible, though there are limits on how much training and education may be counted toward meeting its performance measure (see the \" Measures of Program Performance \" section). Therefore, the state may decide what kinds of vocational educational training are eligible. TANF funds must be used for low-income families with children; thus, parents or other caretakers of children would be eligible for training and education. Financial eligibility rules are set by the state in which the family resides, and there is a significant amount of variation among them. According to HHS data, \"in 2015, over one-third of adult TANF assistance recipients (38.6%) had less than a high school education, and more than half (53.9%) had no further education beyond high school completion (or its equivalent).\" TANF helps fund state assistance programs for needy families with children. Funds are provided to the states, which then provide assistance to families. The Personal Responsibility and Work Opportunity Reconciliation Act of 1996 ( P.L. 104-193 ), which created TANF, requires that funds be spent as determined by state legislatures. States determine eligibility rules and benefit amounts for these programs. They also determine what activities to require of adult recipients of assistance. There is no federal requirement to provide different benefit amounts depending upon whether adult recipients are in training and education, but benefits must be reduced or ended if recipients refuse to participate in required activities that may include training and education. (States may create \"good cause\" and other exceptions for which the sanction for failure to participate in required activities may be waived.) TANF also provides funding for a wide range of benefits and support services other than cash assistance, and some low-income parents who do not receive cash assistance are served by TANF funds. Support services may include, but are not limited to, advising, career planning, and employment services. Benefits and services are delivered at the state and local level. States decide which participants get which services. State TANF programs sometimes refer assistance recipients to a WIOA One Stop Center for education or employment. Other states choose to operate employment and training services for TANF recipients separately from the WIOA system. There are no federal rules regarding the quality of training and education programs, though states might establish such rules. The minimum work participation rate (WPR) is TANF's sole performance measure. TANF requires each state to meet a performance standard that requires a minimum percentage of its assistance caseload to either be working or engaged in activities. The rules for what counts as engagement limits training and education: \"vocational educational training\" is limited to 12 months in a lifetime; obtaining a GED is either not countable toward the standard or counted only if an individual is in another activity more closely related to work for a minimum number of hours per week. States may also meet their minimum work participation rate in whole or in part through reducing the cash assistance caseload. Little program-wide data exists on TANF participation in training and education and the subsequent outcomes. Child care and educational preparation may limit a large proportion of TANF recipients from taking advantage of and succeeding in non-degree programs. Most TANF assistance adults are single mothers with young children. States may use TANF funds to assist parents with child care. The TANF cash assistance caseload is significantly disadvantaged in terms of education. The choice of non-degree programs may be limited: The 12-month lifetime limit on vocational educational training limits the types of training that TANF recipients can pursue. An individual in an apprenticeship program may exceed the income eligibility threshold for receiving assistance. In addition, the quality of training and education programs is unknown.", "summary": "Recent Administrations and Congress have demonstrated bipartisan support for increasing federal assistance to individuals pursuing training and education in postsecondary non-degree programs, sometimes referred to as short -term programs . Non-degree programs are postsecondary training and education programs that are most often shorter in duration than a bachelor's or associate's degree program. They generally provide work-based learning or educational instruction to individuals who are beyond the typical age for secondary education to prepare them for a particular occupation. Examples of support have included proposals to expand existing federal programs, create new programs, and improve coordination between existing programs. This report provides an overview of existing federal programs and benefits that support individuals pursuing training and education in non-degree programs. A prominent argument for supporting individuals pursuing training and education in non-degree programs is that there is a substantial employer need for individuals with some postsecondary credentials but no degree. In 2018, approximately 72% of jobs in the national economy were in occupations for which the typical entry-level education is less than an associate's degree. Just over 6% explicitly required a non-degree credential, but these credentials could prepare individuals for many jobs that do not require a bachelor's or higher level degree. Mean annual wages for individuals whose highest educational attainment is high school completion are similar to those for individuals with a non-degree credential. Earnings for individuals with only non-degree credentials vary based on differences in occupational field, program duration, and type of educational institution attended. Several federal programs provide direct financial support to or on behalf of students to enable them to pursue training and postsecondary education in non-degree instructional and work-based learning programs. None of these federal programs or benefits that provide such support focus exclusively on promoting non-degree program pursuits. The federal programs include the following: Title I of the Workforce Innovation and Opportunity Act (WIOA; P.L. 113-128 ) is the primary federal workforce development statute. The program relies on state and local workforce development boards to enter into contracts with training and education program providers and oversee the quality of the providers. Title IV of the Higher Education Act of 1965 (HEA; P.L. 89-329), as amended, authorizes grant and loan programs that provide financial assistance to higher education students. Non-degree program quality assessment is handled by state authorizers, accrediting agencies, and in some instances through Department of Education certification. Education tax benefits, administered by the Internal Revenue Service (IRS), partially offset some of the costs of higher education for eligible taxpayers. Many education tax benefits are only available to individuals enrolled in a degree program, but three education tax benefits can also be claimed for postsecondary non-degree programs: the Lifetime Learning Credit, the Exclusion for Employer Provided Educational Assistance, and tax-advantaged 529 plan education savings accounts. The Post-9/11 GI Bill and Veteran Employment Through Technology Education Courses (VET TEC) were originally intended to help veterans enter the civilian workforce. Post-9/11 GI Bill program quality is primarily overseen by state agencies under contract with the Department of Veterans Affairs. VET TEC program quality is assured by withholding 50% of tuition and fees from providers until participants are employed. Supplemental Nutrition Assistance Program (SNAP) Employment & Training (E&T) provides eligible low-income households with employment and education services. E&T funding is administered by state agencies through contracted providers, which receive funds to cover education and other program costs. The Temporary Assistance for Needy Families (TANF) block grant is best known for providing monthly cash assistance to needy families with children but may be used to support subsidized employment, on-the-job training, and training and education programs.", "document_type": "crs"}
{"report": "The funding of public elementary and secondary schools in the United States involves a combination of local, state, and federal government revenues. State and local governments generally provide over 90% of the revenue available for public elementary and secondary education on an annual basis, with the federal government providing the remainder. As such, there is consistent congressional interest in understanding how the majority of available funds are provided to local educational agencies (LEAs) and, ultimately, to public schools. This report intends to provide context for consideration of the comparatively small but important role of the federal assistance programs in financing public education, discuss some of the ways that state and local finance policies and practices intersect with federal involvement, and explain selected key concepts in this field. The report provides a basic overview of the mechanisms used by states and LEAs to fund public education and an introduction to core school finance concepts. It begins with an examination of the sources of funding for public elementary and secondary education and how these funding sources vary by state and over time. It then considers how states and LEAs raise revenue for public education through different types of taxes, including property taxes. The report then focuses on state school finance programs, the varieties of policies under which states provide funds to LEAs, and the local units of government that administer public K-12 education. This includes an examination of the key concept of \"equalization\" in state school finance programs. School finance programs often incorporate state-level weighted student funding programs, under which additional funds are provided to LEAs for the education of students with certain high-cost needs (e.g., associated with low family income or student disabilities) or who are in high-cost educational programs (such as technical education). The next section of the report considers LEA programs to finance individual public schools. This is followed by a discussion of aspects of the largest federal K-12 education aid program, Title I-A of the Elementary and Secondary Education Act (ESEA), that incorporate a state school finance equity factor or weighted student funding components. In addition, a new ESEA Title I-E, as most recently comprehensively amended by the Every Student Succeeds Act (ESSA; P.L. 114-95 ), authorizes the Secretary of Education to provide participating LEAs with flexibility to consolidate eligible federal funds with state and local funding for individual public schools to create a \"single school funding system based on weighted per-pupil allocations for low-income and otherwise disadvantaged students.\" The report concludes with a review of recent efforts to collect and report data on the level of expenditures per pupil at individual public schools within LEAs, a topic that has garnered increasing interest among policymakers in recent years. The funding of public elementary and secondary schools in the United States involves a combination of local, state, and federal government revenues, in proportions that vary substantially both across and within states. Overall, a total of $678.4 billion in revenues was devoted to public elementary and secondary education in the 2015-16 school year (the latest year for which detailed data on revenues by source are available). State governments provided $318.6 billion (47.0%) of these revenues, local governments provided $303.8 billion (44.8%), and the federal government provided $56.0 billion (8.3%). Over the last several decades, the share of public elementary and secondary education revenues provided by state governments has increased, the share provided by local governments has decreased, and the federal share has varied within a range of 6.0% to 12.7%. The federal share peaked in the recessionary period of 2009-2011, and has declined thereafter. Table 1 provides the local, state, and federal shares for selected years over the 50-year period from 1965-1966 to 2015-2016. There is substantial variation among the states with respect to the shares of public elementary and secondary education revenues provided by state, local, and federal governments ( Table 2 ). For example, Hawaii, with a statewide system of public elementary and secondary education and no LEAs, provides virtually no local government revenues; almost 90% of funding comes from the state government. At the other end of this spectrum, the District of Columbia, which has no state government, provides approximately 90% of revenues from local sources. The other states fall between these two extremes of providing all or almost all of the nonfederal revenue from either state or local sources. Illinois has the lowest state share of revenues (24.1%) and the highest local share (67.4%) of the 50 states. Revenues are raised at the state and local levels to support public elementary and secondary education. Local revenues may be raised directly by an LEA itself (fiscally independent LEAs), or be raised and provided to an LEA by a general purpose unit of local government, such as a county or city (fiscally dependent LEAs). The primary source of local revenues for public elementary and secondary education is the property tax. This tax is primarily applied to real property (residences, commercial buildings, etc.), and in some cases to vehicles or boats. According to data from the U.S. Census Bureau for 2016, 72.0% of all local government tax revenues were from property taxes, 17.4% were from sales taxes, 6.0% were from individual and corporate income taxes, and the remaining 4.6% came from motor vehicle and other miscellaneous taxes. The property tax is an annual percentage of the assessed value of residential and commercial \"real\" property (i.e., buildings and land) and, in some localities, \"personal\" property (i.e., automobiles, other vehicles, and occasionally other items such as livestock). The property tax rate unit is often referred to as a \"mill\" or one-thousandth of the assessed value of the property. Because almost three-quarters of all local government revenues come from property taxes, variations in the value of such real or personal property relative to the number of school-age children in a locality is usually the primary cause of local variations in capacity to raise revenues per pupil for public elementary and secondary education. Beyond differences in taxable property per pupil, localities in many states are able to select their local property tax rate, at least within a limited range, and may choose to tax themselves at higher rates than other localities in the same state. State revenues for public elementary and secondary education are raised from a variety of sources, primarily personal and corporate income and retail sales taxes, \"excise\" taxes such as those on tobacco products and alcoholic beverages, plus lotteries in several states. According to data from the U.S. Census Bureau for 2016, 47.8% of all state government tax revenues were derived from sales taxes, 42.2% were from individual and corporate income taxes, 1.7% were from property taxes, and the remaining 8.3% came from motor vehicle and other miscellaneous taxes. As depicted in Table 2 , all states (but not the District of Columbia) provide a share of the total revenues available for public elementary and secondary education. This state share varies widely, from approximately 25% in Illinois to almost 90% in Hawaii and Vermont. Starting in the early 20 th century, all states began to establish public elementary and secondary finance programs in order to diminish somewhat the high degree of inequality in revenues per pupil that would result if funding were based only on local taxable resources and the willingness of local citizens to tax themselves. The primary policies under which states allocate these revenues among their LEAs have been catalogued and categorized by school finance analysts on several occasions in recent decades. For several years, the U.S. Department of Education's National Center for Education Statistics (NCES) financed and supported a joint effort with the American Education Finance Association and the National Education Association to compile detailed information on the characteristics of state school finance programs. However, the most recent of these publications was released in 2001, was based on the 1998-1999 school year, and has not been updated. Since the publication of the last NCES catalog of state school finance programs, individual education policy analysts have coordinated efforts to update at least some of the information. For example, annual updates of key school finance policies for each state have recently been published by Professor Deborah Verstegen of the University of Nevada at Reno. Note that while those organizing and compiling the surveys of state school finance programs provide guidance intended to elicit consistent responses from the states, responses are generally prepared by different individuals in each state who may not describe various policies using the same terminology or focus. The programs through which state funds are provided to LEAs for public elementary and secondary education have traditionally been categorized by those involved in the compilations discussed above and other education finance analysts into five types of programs: (1) Foundation Programs, (2) Full State Funding Programs, (3) Flat Grants, (4) District Power Equalizing, and (5) Categorical Grants. In many cases, states often have elements of two or more of these types of programs in their school finance policies. Precise counts of how many states have finance programs in each of these categories varyâdue to differences in the time at which analyses are conducted combined with the evolution of state policies over time, as well as variations of interpretation by individuals in each state responding to state policy surveys, among other factors. Nevertheless, there is general agreement that the first of these types of state school finance programs, typically referred to as Foundation Programs, is much more common than the other four types, and may be found to some degree in as many as 80% of the states. Foundation Programs began to come into existence in the 1930s. A typical Foundation Program includes required local tax effort, state equalization aid, and local leeway funds. Under a Foundation Program, the state establishes an annual target level of funding per pupil applicable to all of the state's LEAs. As is discussed further below, the pupil count may be undifferentiated, or may be weighted to take into consideration a variety of pupil characteristics (such as grade level, type of educational program, special educational needs such as disabilities, low family income, or English Learner (EL) status) and sometimes estimated differences in the costs of providing education services in different localities. The funding target is most often (and historically) conceptualized as a \"minimum\" level of funding per pupil, or in some cases more recently as a level of funding necessary to provide an \"adequate\" educational program. In any case, Foundation Programs are designed to guarantee a \"base\" level of funding, not to achieve absolute fiscal equality among the LEAs of a state. The state target level of funding per pupil is likely to be influenced by budgetary and other political considerations. The state pays each LEA a percentage of this assumed total that varies inversely with local taxable property wealth per pupil, or some other measure of local capacity to raise revenues. The state percentage is higher for LEAs with low fiscal capacity per pupil, and lower for those with high fiscal capacity per pupil. Foundation Programs vary in their provisions regarding local tax rates. In most states with Foundation Programs, the state specifies at least a minimum rate at which localities must tax themselves. In other states, a local tax rate is assumed in the calculation of the Foundation Program's state share, based on the difference between the assumed total expenditure level and the state percentage of this, but localities are not actually required to tax themselves at this rate. In addition, LEAs might be allowed to raise local tax rates beyond the level required under state law, at least to a limited extent, but will not receive any state supplementation of the additional funds raised. These are commonly referred to as \"leeway funds,\" as LEAs have the leeway to choose a local tax rate higher than the standard level established under state law. Thus, a Foundation Program equalizes funding per pupil (however \"pupil\" may be defined) but only up to a target level, with LEAs often free to raise additional funds (not matched by the state) if they wish. Many states also combine Foundation Programs with one or more of the additional types of programs discussed below (except for Full State Funding) in a tiered or layered funding system. Full State Funding is only found in Hawaii. Under such a policy there are virtually no local revenues. States such as Vermont and New Mexico come close to this category through programs that involve very limited local funding sources. Flat Grants are historically important, having been a dominant form of state aid in the early part of the 20 th century. While the role of Flat Grants as the primary form of state aid for public elementary and secondary education has almost disappeared, they are included as a supplement to Foundation Programs or other programs in a number of states. As the name implies, this type of program provides grants of an equal amount per pupil to all LEAs in a state, regardless of the level of taxable property wealth in those localities or specific pupil characteristics. Usually called District Power Equalizing , this program type focuses specifically on equalizing the ability of different LEAs in a state to raise revenues from their available taxable property. These policies establish a minimum level of revenue that may be raised for each unit of local tax rate. For example, a state policy might set a standard that at least $1,000 per enrolled student be generated for each 5 mills of local property tax rate. If a locality cannot raise the standard level of funding per unit of tax rate, due to insufficient taxable property in the LEA, then state funds would be provided to make up the difference (often limited to a specified maximum local tax rate). In other words, this program type provides for a minimum guaranteed tax base for public elementary and secondary education in the state. It is often said that District Power Equalizing focuses on equity for taxpayers, while frequently allowing substantial variation in local tax rates and thereby in total state and local funding per pupil, depending on local preferences. Reportedly, fewer states than in the past currently rely primarily on this type of program, though several still incorporate it as part of a multifaceted state school finance system (i.e., in conjunction with Foundation Programs, etc.). While apparently no state relies totally on Categorical Grants, many states use them in combination with the program types discussed above. Categorical Grants provide funding based on the number of students with specific needs (students with disabilities or limited English proficiency, from low-income families, etc.) or in particular educational programs (career and technical programs, etc.). States may allow such funding to be treated as general aid by LEAs, or they may require that funds be used to serve the specific students upon whom the grants are based. At the federal level, the largest federal programs of aid to public elementary and secondary education are Categorical Grants. These include ESEA Title I, Part A, under which funds for the education of disadvantaged children are allocated primarily on the basis of estimates of the number of school-age children in low-income families. As mentioned above, it is difficult to place all states neatly into one of the five aforementioned categories based on current and consistent data and terminology. Nevertheless, one relatively recent effort to do so categorized 37 states as relying primarily on Foundation Programs, 1 state as using Full State Funding, 1 state as relying primarily on Flat Grants, 2 states as relying primarily on District Power Equalizing, and the remaining 9 states as employing combinations of these types of state school finance programs. Another effort to place states in school finance program groups was published in 2003, and was based on the NCES compilation of state programs for 1998-1999. This analysis placed 35 states in the Foundation Program category, 1 state in the Full State Funding category, 2 states in the Flat Grants category, and 6 states in the District Power Equalizing category, with the remaining 6 states using combinations of these types of programs. A more recent effort to categorize state school finance programs found that \"approximately 80%\" of all states use Foundation Programs, 1 provides Full State Funding (though a few others approach this), 1 relies primarily on Flat Grants, and 2 rely primarily on District Power Equalizing, but that increasingly many states combine two or more of these program types in a tiered funding system. Finally, in August 2019, the Education Commission of the States (ECS) published data indicating that 36 states rely primarily on a Foundation model of K-12 education finance, while 8 states rely primarily on a \"Resource Allocation\" model, 3 states rely on a hybrid of Foundation and Resource Allocation models, 1 state relies on a hybrid of a Foundation Model and a Hold Harmless policy, and the final 2 states rely on \"Other\" models of school finance. A goal of all of the various types of state school finance programs is to provide at least some limited degree of \"equalization\" of spending and resources and/or local ability to raise funds for public elementary and secondary education across all of the LEAs in the state. School finance equalization would seem to imply \"equal spending per pupil\" among a state's LEAs. However, the meanings of both \"equal\" and \"per pupil\" may vary widely. Relatively few observers advocate absolute equality of dollars spent on behalf of every pupil in the state. Almost all state school finance programs allow for some level of spending differences based on local willingness to pay for public elementary and secondary education, differences in the costs of educating various categories of high-need pupils, or differences in the costs of providing education services in different geographic areas. State school finance programs frequently account for certain types of pupils whose education imposes higher than average costs on LEAs, which might include pupils with disabilities, from low-income families and/or living in areas with high concentrations of poverty, with limited proficiency in the English language, or living in sparsely populated areas. Analysts of school finance programs sometimes use the term \"horizontal equity\" to refer to equal funding on behalf of similar pupils in different LEAs across a state, and \"vertical equity\" to refer to different levels of funding on behalf of pupils with different levels of need. If a state school finance program provides more funds on behalf of high-cost pupils than other pupils in an effort to provide vertical equity, and if the distribution of these pupils is uneven across the state's LEAs, then the state's school finance system might be considered by many analysts to be equalized yet have significant differences in spending per enrolled pupil overall. Regardless of how one adjusts for the distribution of different types of pupils, there are two basic ways in which school finance equalization has been defined. By far the most common method is based on equalization of the level of revenues or expenditures per pupil, however \"pupil\" might be defined. The other, somewhat less common, method focuses on equalizing the amount of funds per pupil that each LEA could raise per unit of local tax rate. The first method would equalize actual amounts of funds available, while the second would equalize local ability to raise revenues. These two basic concepts of equalization are reflected in many of the state school finance programs discussed above. Foundation Programs often incorporate provisions to provide higher amounts per pupil on behalf of one or more categories of high-need pupils, and Categorical Grants often provide increased funds to serve specific high-need pupil groups. In contrast, District Power Equalizing programs focus on equalizing the funds that could be raised per unit of local tax rate. Beginning in the early 1970s, equalization of resources for public elementary and secondary education across the LEAs in each state has been the topic of a variety of state and, to a much lesser extent, federal court cases. In 1971, in the case of Serrano v. Priest , the California State Supreme Court ruled that the quality of a child's education should not depend on the taxable property wealth of the locality in which her or his family resides. This was the first of an ongoing series of cases brought in state courts, based on state statutory law and state constitutions. At the federal level, the U.S. Supreme Court decided in 1973, in the case of San Antonio Independent School District v. Rodriguez, that differences in local expenditures per pupil within a state did not violate the U.S. Constitution, as long as these differences were the result of state actions intended to meet a public purpose, such as increased local control of education that might accompany substantial reliance on local revenue sources. Following this decision, the issue of school finance equalization has been addressed primarily in state courts, based on state constitutional provisions, rather than federal courts. In the discussion of state school finance programs above, it was stated that such programs often establish target levels of funding \"per pupil.\" The \"pupil\" counts involved in these programs may simply be based on total student enrollment as of some point in time, or they may be a \"weighted\" count of students, taking into account variations in a number of categoriesâspecial pupil needs (e.g., disabilities, low family income, limited proficiency in English), grade levels, specific educational programs (e.g., career and technical education), or geographic considerations (e.g., student population sparsity or local variation in costs of providing education). As noted earlier, existing surveys of state school finance programs, which rely on different respondents in each state, vary in the level of detail and use of terminology in describing the programs in each state. Nevertheless, a review of the individual state entries in a recent survey is an instructive indication of the extent to which weighted student counts are used to determine funding levels under current state programs. It shows that at least 32 states used some degree of weighting of the pupil counts used to calculate state aid to LEAs. Most of these states have policies that assign numeric weights to different categories of pupils, while in other states the school finance program specifies different target dollar amounts for specific categories of pupils, which is mathematically equivalent to assigning weights. Another study of the extent to which states use pupil weighting in their school finance programs was published in August 2019 by ECS. These data include fewer categories of pupil weights in state school finance programs than the aforementioned study. Overall, based on this study, 42 states, the District of Columbia, and Puerto Rico used weights for at least one pupil category. The number of states reported in these two recent studies as applying weights to different pupil categories in their school finance programs is summarized in Table 3 . Pupil weighting categories for which no data are provided in the third column of this table were not included in the ECS study. It should be noted that the Verstegen study was based on survey data collected from state departments of education on state school finance policies that were in effect during the 2017-2018 school year. The study did not include the District of Columbia or Puerto Rico. The ECS study relied on relevant state statutory language, regulations, and guidance that was in effect as of July 1, 2019, in the 50 states, the District of Columbia, and Puerto Rico. As detailed in Table 3 , according to both studies states most often add funding weights for pupils who are English learners, have low family income, or have disabilities. States often employ multiple weights for pupils with specific types of disabilities (i.e., higher weights are assigned as the level of disability increases), and sometimes increase low family income weights for pupils in LEAs or schools with high concentrations of low-income pupils (i.e., higher weights are assigned as the concentration of children from low-income families increases). States that do not employ pupil weights in their primary funding formulas sometimes provide extra funding for high-need pupils through separate Categorical Grants. Many states also adjust pupil weights for those in selected grade levels, geographic areas, or programs. Weights are often higher for pupils in the earliest grades or in grades 9-12, though policies vary widely, and a few states prioritize other grade levels such as 7-9. The population sparsity weights recognize the diseconomies of scale in areas with especially small LEAs or schools. The career and technical education weights recognize the extra costs of these types of programs. For example, the state of Oregon bases allocations under its primary school finance formula on a weighted count of students in average daily membership (enrollment) in each of the state's LEAs, which is referred to as the average daily membership weighted (ADMw) count. This policy applies additional weights to counts of students who are English learners; students who are pregnant or are in parenting programs; students with disabilities; students in low-income families; foster, neglected, or delinquent students; and students in remote or small schools. Another source of information on the extent to which weighted student funding and related concepts are employed in state school finance programs is the Edunomics Lab at Georgetown University. This organization compiles information on the share of state elementary and secondary education funds that various states allocate via primary state aid formulas incorporating weighted student funding, which it also refers to as the \"student based allocation.\" The Edunomics Lab has reported that 20 states allocated 33% or more of their state aid funds through a weighted student funding formula during at least some part of the period from FY2014 to FY2019. As seen above, the concept of pupil weighting is often applied in determining funding levels for LEAs under state school finance programs. After state funds reach LEAs, they are combined with locally raised funds to provide educational resources to students in individual schools. LEAs may also use weighted student funding formulas to allocate funds to individual public schools, but more often they use other funding strategies. This section of the report provides an overview of conventional intra-LEA budgeting policies and the use of weighted student funding policies by LEAs. Under the traditional, and still most common, method of allocating resources within LEAs, there are no specific budgets for individual schools. Available state and local funds are managed centrally, by LEA staff, and various resourcesâfacilities, teachers, support staff, school administrators, instructional equipment, etc.âare assigned to individual schools. In this process, LEA staff typically apply LEA-wide standards such as pupil-teacher ratios or numbers of various categories of administrative and support staff to schools of specific enrollment sizes and grade levels. While levels of expenditures per pupil may be determined for individual schools under these budgetary systems, they are calculated \"after the fact,\" based on whatever staff and other resources have been assigned to the school. And while standard ratios of pupils per teacher or other resource measures may be applied LEA-wide in these situations, substantial variations in the amounts actually spent on teachers and other resources in each school can result from systematic variations in teacher seniority and other factors. These variations might be masked by local policies to apply average salaries, rather than specific actual salaries, in school accounting systems. Further, under traditional school budgeting policies there is little or no immediate or direct adjustment of resources or spending when students transfer from one school to another. In contrast to traditional, fully centralized budgeting and accounting policies for public schools within LEAs, a number of LEAs have in recent years applied the weighted student funding concept to developing and implementing individual school budgets. These policies are not currently applied to any federal program funds and are applied only to a portion of the state and local revenues received by these LEAs, as they continue to centrally administer and budget for various activities such as school facility construction, operations and maintenance, employee benefits, transportation, food services, and many administrative functions . The LEAs develop school budgets for teachers, support staff, and at least some other resources on the basis of weighted counts of the students currently enrolled in each school, and adjust these budgets when students transfer from one school to another. CRS is not aware of any comprehensive listing of all the LEAs that are currently implementing weighted student funding policies for intra-LEA allocations to schools. However, the Edunomics Lab compiles data on such LEAs, and it has identified several relatively large urban LEAs that allocated between 21% and 89% of their funds to schools through weighted student funding formulas in FY2017 and/or FY2018. These are Baltimore City, Boston, Chicago, Cleveland, Denver, Douglas County (Colorado), Houston, Indianapolis, Jefferson County (Colorado), Metro Nashville, Milwaukee, New York City, Newark, Norwalk (Connecticut), Orleans Parish, Prince George's County (Maryland), and San Francisco. This is not an exhaustive list of LEAs employing weighted student funding for schools, especially with respect to smaller LEAs, but it may be considered to be illustrative of the current extent of the practice. For example, the Boston public school system allocates funds to individual public schools on the basis of weighted student counts that vary by grade level, pupils with disabilities (multiple categories), ELs, pupils with low family income, and pupils in career and technical education programs. According to Boston Public Schools, the use of weighted student funding promotes the school system's goals of equity, empowerment for school-level staff, innovation by individual schools, accountability, and transparency regarding the level of funding available to each school. Advocates for weighted student funding policies within LEAs argue that they promote equity by explicitly connecting funding levels with the distribution of high-need pupils, as defined by the LEA, resulting in higher state and local funding in schools with higher proportions of these pupils. Advocates also argue that transparency is enhanced when school budgets reflect funds actually spent at each individual school. They further argue that weighted student funding of schools enhances school choice and school-based management practices, where applicable, and promotes flexibility in resource use by schools. However, the use of weighted student funding within LEAs is a relatively new practice in most cases, and comprehensive research on its effects is not yet available. The ESEA includes one program and one secretarial authority that incorporate elements of the equalization and weighted student funding strategies used by states and LEAs. The Title I-A program authorizes federal aid to LEAs for the education of disadvantaged children. Title I-A grants provide supplementary educational and related services to low-achieving and other students attending elementary and secondary schools with relatively high concentrations of students from low-income families. It is also the largest ESEA program ($15.9 billion), accounting for over 60% of all ESEA funds in FY2019 ($25.2 billion). The formulas used to determine grants to LEAs under Title I-A include both an equity component and weighted student funding elements. Title I-E provides the Secretary of Education (the Secretary) with authority to provide LEAs with flexibility to consolidate eligible federal funds with state and local funding to create a \"single school funding system based on weighted per-pupil allocations for low-income and otherwise disadvantaged students.\" Both ESEA Title I-A and Title I-E are discussed below. Under the ESEA Title I-A program, different portions of each year's appropriation for grants to LEAs are allocated under one of four different formulasâBasic Grant, Concentration Grant, Targeted Grant, and Education Finance Incentive Grant (EFIG). For each formula, a maximum grant is calculated by multiplying a \"formula child count,\" consisting primarily of estimated numbers of school-age children in low-income families, by an \"expenditure factor\" based on state average per pupil expenditures for public K-12 education. For some formulas, additional factors are multiplied by the formula child count and expenditure factor. These maximum grants are then reduced to equal the level of available appropriations for each formula, taking into account a variety of state and LEA minimum grant and \"hold harmless\" provisions. The formula child population used to determine Title I-A grants for the 50 states, the District of Columbia, and Puerto Rico consists of children ages 5 to 17 (1) in low-income families, according to estimates for LEAs from the Census Bureau's Small Area Income and Poverty Estimates (SAIPE) program; (2) in institutions for neglected or delinquent children or in foster homes; and (3) in families receiving Temporary Assistance for Needy Families (TANF) payments in excess of the poverty income level for a family of four persons. Children in low-income families account for about 97% of the total formula child count, so the other formula population categories are of limited significance overall. Each element of the formula child count is updated annually. In general, LEAs must have a minimum number of formula children and/or a minimum formula child rate to be eligible to receive a grant under a specific Title I-A formula. Among the four Title I-A formulas, the EFIG formula contains an equity factor as well as a weighted student funding component. The Targeted Grant formula also contains a weighted student funding component. Both types of funding factors are discussed below. Under the EFIG formula, a measure of the equity of state school finance programs plays a role in the determination of the level of funds each state receives. More specifically, Title I-A grants under the EFIG formula are made to states on the basis of their formula children, an expenditure factor based on state average per pupil expenditures for public elementary and secondary education, an effort factor based on average per pupil expenditure for public elementary and secondary education relative to personal income per capita for each state compared to the nation as a whole, and an equity factor based on variations in average per pupil expenditure among the LEAs in each state. Thus, state total grants under the EFIG formula are based on each state's share, compared to the national total, of a population factor multiplied by an expenditure factor, an effort factor, and an equity factor, adjusted by a state minimum grant provision. The equity factor is based on a measure of the average disparity in expenditures per pupil among the LEAs of a state called the coefficient of variation (CV). The CV is expressed as a decimal proportion of the state average per pupil expenditure. In the CV calculations for this formula, an extra weight (1.4 vs. 1.0) is applied to estimated counts of children from low-income families. The effect is that grants would be maximized for a state where LEA-level expenditures per pupil from a low-income family are 40% higher than expenditures per pupil from a non-low-income family. Typical state equity factors range from 0.00 (for the single-LEA jurisdictions of Hawaii, Puerto Rico, and the District of Columbia, where by definition there is no variation among LEAs), to approximately 0.30 for a state with high levels of variation in expenditures per pupil among its LEAs. The equity factors for most states fall into the 0.10-0.20 range. In calculating grants, the equity factor is subtracted from 1.30 to determine a multiplier to be used in calculating state grants. As a result, the lower a state's expenditure disparities among its LEAs are, the lower its CV and equity factor will be, and the higher its multiplier and its grant under the EFIG formula will be. Conversely, the greater a state's expenditure disparities among its LEAs are, the higher its CV and equity factor will be, and the lower its multiplier and its grant under the EFIG formula will be. Of the $15.9 billion appropriated for Title I-A for FY2019, EFIG received $4.0 billion (25.3% of total Title I-A funding) for the 2019-2020 school year. The EFIG formula also employs a weighted student funding concept in the allocation of grants to states. In the calculation of the formula's equity factor, state and local funds per pupil are calculated using a greater weight for students from low-income families (1.4) than for other students (1.0). As a result, a state where greater state and local funds are available for the education of students from low-income families than for other pupils would have a numerically low equity factor and ultimately higher grants under the EFIG formula. The weighted student concept is also employed in the Title I-A Targeted Grant formula and in an additional way in the intrastate allocation of EFIG formula funds to LEAs within states. As with the EFIG formula, the Targeted Grant formula received $4.0 billion (25.3% of total Title I-A funding) for the 2019-20 school year. Under the Targeted Grant formula, as well as the intrastate allocation of funds under the EFIG formula, formula child counts and formula child rates are assigned weights, with higher weights applied as the formula child count or rate increases in an LEA. The higher the formula child count or rate is, the higher the grants per formula child an LEA would receive will be. Under the Targeted Grant formula, one set of weighting factors is applied to all LEAs based on formula child counts and one set is applied to all LEAs based on formula child rates. In contrast, under the EFIG formula three sets of weights are used for weighting formula child counts and three sets are used for the weighting of formula child rates. The set of weights used under the EFIG formula depends on the value of each state's equity factor (described above), with lower weights applied to LEA grant calculations in states that have a lower equity factor (i.e., relatively low disparities in expenditures per pupil among the state's LEAs) and higher weights applied to LEA grant calculations in states that have a higher equity factor (i.e., relatively high disparities in expenditures per pupil among the state's LEAs). In determining LEA grants under both the Targeted and EFIG formulas, the higher of the two weighted student counts (one calculated based on formula child counts and one calculated based on formula child weights) is used in calculating grants for each LEA. The Title I-E authority allows the Secretary to enter into a demonstration agreement with LEAs that are using or agree to implement weighted student funding systems to establish budgets for, and allocate funds to, individual public schools. In order to enter into a local flexibility demonstration agreement under the Title I-E authority, each LEA must have a weighted student funding system that meets specific requirements. The LEA's system must use weights or allocation amounts that provide \"substantially more funding\" than is allocated to other students to English learners (ELs), students from low-income families, and students with any other characteristic related to educational disadvantage that is selected by the LEA. The system must also ensure that each high-poverty school receives in the first year of the demonstration agreement more per-pupil funding for low-income students than was received for low-income students from federal, state, and local sources in the year prior to entering into the agreement, and at least as much per-pupil funding for ELs as was received for ELs from federal, state, and local sources in the year prior to entering into the agreement. The weighted student funding system must include all school-level actual personnel expenditures for instructional staff, including staff salary differentials for years of employment, and actual nonpersonnel expenditures in the LEA's calculation of eligible federal funds and state and local funds to be allocated to the school level. It must also allocate a \"significant portion of funds,\" including state and local funds and eligible federal funds, to the school level based on the number of students in a school and an LEA-developed formula that determines per-pupil weighted amounts. In addition, the percentage of state and local funds and eligible federal funds allocated through the LEA's weighted student funding system must be sufficient to carry out the purposes and requirements of the demonstration agreement. Eligible federal funds that may be consolidated in an LEA's weighted student funding system include, for example, those available under ESEA Title I-A (Education for the Disadvantaged), Supporting Effective Instruction (Title II-A), English Language Acquisition (Title III-A), and Student Support and Academic Enrichment (Title IV-A). No non-ESEA funds (e.g., funds available under the Individuals with Disabilities Education Act or the Perkins Career and Technical Education Act) are considered eligible funds for purposes of consolidation. Once eligible federal funds are consolidated in a participating LEA's weighted student funding system, these funds are treated the same way as the state and local funds. There are no required uses associated with the eligible federal funds provided that the expenditures are \"reasonable and necessary\" and the purposes of the eligible federal programs for which funds have been consolidated are met. A separate development relevant to the adoption of weighted student funding by some LEAs has been increasing interest in the collection and reporting of school-level finance data for public schools. While historically there have not been comprehensive state or federal efforts to calculate or report on specific budgets or expenditure levels for individual public schools, federal efforts to require and support the reporting of such information have expanded rapidly in recent years. The availability of school-level financial data, based on standard concepts applied consistently nationwide, could be especially helpful in the administration of a key fiscal accountability requirement of the ESEA Title I-A program, as discussed below. Such data could also inform state and local level consideration of equity among schools and groups of students, and increase transparency regarding budgeting and financial decisions by LEAs. One factor that may help explain this increasing attention is the \"comparability\" requirement associated with the ESEA Title I-A program. This is a requirement that services provided with state and local funds in schools participating in Title I-A must be comparable to those in non-Title I-A schools within the same LEA. If all of an LEA's schools participate in Title I-A, then services funded from state and local revenues must be \"substantially comparable\" in each school within the LEA. The Title I-A comparability requirement is intended to ensure that state and local funds are used to provide a comparable level of services in Title I-A schools compared with non-Title I-A schools prior to the receipt of Title I-A funds. Comparability is measured only with respect to the public schools within the same LEA, not statewide. It is designed to ensure that federal Title I-A funds provide a net increase in funding for Title I-A schools compared to non-Title I-A schools, and do not simply replace state and local funds that would, in the absence of Title I-A, be provided to the Title I-A schools. In demonstrating comparability, LEAs are prohibited from using staff salary differentials for years of employment in determining expenditures per pupil from state and local funds or instructional salaries per pupil from state and local funds. That is, actual staff salaries are not used in comparability determinations. In recent years, there has been renewed attention to the extent to which the comparability requirement is being enforced, and to the nature and quality of school-level expenditure data used to determine compliance. More broadly, a number of other federal requirements and research efforts have reflected this increased interest in school-level finance data collection and reporting. The American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 , Title VIII) included a one-time requirement for states to compile and report expenditures for all public schools for the 2008-2009 school year. States were required to report total personnel salaries for all school-level instructional and support staff; salaries specifically for instructional staff; salaries specifically for teachers; and nonpersonnel expenditures, if available. ED provided guidelines on the specific types of expenditures that states and LEAs should include in their reports. States and LEAs were asked to report school-level expenditures from state and local funds only, and to exclude expenditures for special education, adult education, school nutrition programs, summer school, preschool, and employee benefits. All expenditure data was to be reported based on actual expenditures, including those for staff salaries. A study of the implementation of the Title I-A comparability requirement that was based on the data collection required by the ARRA determined that within LEAs that had both Title I-A and non-Title I-A schools, \"more than 40 percent of Title I schools had lower personnel expenditures per pupil than did non-Title I schools at the same grade level.\" For example, at the elementary school level 46% of Title I-A schools had state and local personnel expenditures per pupil that were below the average for non-Title I-A schools in the same LEA, while 54% exceeded the average for non-Title I-A schools in the same district. Title I-A middle schools and high schools were marginally less likely to have below-average per-pupil personnel expenditures (42% and 45%, respectively) compared to non-Title I-A schools in the same LEA. Across all levels of elementary and secondary education, 48% of Title I-A schools were not receiving the same level of per-pupil state and local personnel expenditures as non-Title I-A schools in the same LEA. While this does not represent a violation of the Title I-A comparability requirements, which are not based on actual personnel expenditures, it is an indication that a sizable group of Title I-A schools may not actually be as equally resourced as non-Title I-A schools prior to the receipt of Title I-A funds. In discussing this study, ED stated that, \"[t]raditional district allocation methods have been shown to create significant funding disparities between Title I and non-Title I schools.\" Separately, ED's Office for Civil Rights began to collect selected school-level expenditure data starting with the 2009-2010 school year. These data are captured every second year as part of the ongoing Civil Rights Data Collection, and include total personnel salaries; salaries specifically for teachers, instructional aides, support services staff, and school administrators; and nonpersonnel expenditures. All expenditure data must be based on actual expenditures. Unlike data collected under the ARRA (discussed above) and ESEA (discussed below) requirements, these data are collected directly from schools and LEAs, not states. In spring 2014, the Office of Management and Budget (OMB) and ED's Office of Planning, Evaluation, and Policy Development (OPEPD) requested that ED's National Center for Education Statistics (NCES) develop a school-level finance data collection, as such a collection had not been developed on a comprehensive, annual basis. In response, NCES launched pilot efforts to expand ongoing surveys of state and LEA finances to include school-level financial data as well. Beginning with the 2013-2014 school year, NCES conducted a pilot School-Level Finance Survey (SLFS) to evaluate the feasibility of collecting school-level finance data in conjunction with the School District Finance Survey and National Public Education Financial Survey for states and LEAs, jointly conducted by NCES and the Census Bureau. Twelve states participated in this pilot survey for the 2013-2014 school year, and 17 states for 2014-2015 (although only 15 states provided data deemed to be usable by NCES). Based on pilot survey results for the 2014-15 school year, NCES determined that (1) approximately one-half of the participating states were able to report complete personnel and/or nonpersonnel data for at least 95% of their public schools, (2) SLFS data are generally consistent with data reported in other school finance surveys, (3) the development of standardized protocols \"enhances the efficiency of reporting school-level finance data, (4) there remain \"numerous inherent challenges in collecting school-level finance data,\" (5) and, nevertheless, \"the feasibility of collecting and reporting school-level finance data of reasonable quality is relatively high.\" A major concern regarding school-level expenditure surveys is achieving consistency among the states on what kinds on expenditures to include or exclude. The SLFS currently includes 15 unique expenditure items covering a wide variety of personnel expenditures (6 items), including salaries, as well as nonpersonnel expenditures (9 items), such as educational technology. Excluded from these items are employee benefits and services provided centrally by LEAs such as transportation, capital spending, food services, central administration, and building operations and maintenance. Data for each of the 15 expenditure items were collected two ways: (1) without additional exclusions (other than the aforementioned exclusions), and (2) with additional exclusions for expenditures paid from most federal funds, expenditures for prekindergarten, and expenditures for special education. Beginning with the 2015-2016 school year, the SLFS was opened to all states on a voluntary basis. Beginning with the 2017-2018 school year data collection, NCES began collecting complete operational expenditure data. NCES noted that \"[c]omplete, accurate, and comparable school-level finance data across states will take time and effort to achieve.\" However, NCES also noted that recent ESEA school-level finance reporting requirements (discussed below), further development of standardized internal protocols for school-level finance accounting, and continued SEA collaboration with NCES and the Census Bureau on the SLFS data collection should result in improved school-level finance data. Further, as mentioned above, the ESSA amended ESEA Title I-A to require participating states to include in school report cards data on expenditures at each public school. These report cards are to include \"the per-pupil expenditures of Federal, State, and local funds, including actual personnel expenditures and actual nonpersonnel expenditures of Federal, State, and local funds, disaggregated by source of funds, for each local educational agency and each school in the State for the preceding fiscal year\" (Section 1111(h)(1)(C)(x)). States are currently beginning to report expenditure data in response to this requirement. ARRA: American Recovery and Reinvestment Act ( P.L. 111-5 ) CV: Coefficient of variation ED: U.S. Department of Education EFIG: Education Finance Incentive Grant EL: English Learner ESEA: Elementary and Secondary Education Act ESSA: Every Student Succeeds Act ( P.L. 114-95 ) LEA: Local educational agency NCES: National Center for Education Statistics (ED) OMB: Office of Management and Budget OPEPD: Office of Planning, Evaluation, and Policy Development (ED) SAIPE: Small Area Income and Poverty Estimates SEA: State educational agency SLFS: School-Level Finance Survey TANF: Temporary Assistance for Needy Families", "summary": "The funding of public elementary and secondary schools in the United States involves a combination of local, state, and federal government revenues, in proportions that vary substantially both across and within states. According to the most recent data, state governments provide 47.0% of these revenues, local governments provide 44.8%, and the federal government provides 8.3%. Over the last several decades, the share of public elementary and secondary education revenues provided by state governments has increased, the share provided by local governments has decreased, and the federal share has varied within a range of 6.0% to 12.7%. The primary source of local revenues for public elementary and secondary education is the property tax, while state revenues are raised from a variety of sources, primarily personal and corporate income and retail sales taxes, a variety of \"excise\" taxes such as those on tobacco products and alcoholic beverages, and lotteries in several states. All states (but not the District of Columbia) provide a share of the total revenues available for public elementary and secondary education. This state share varies widely, from approximately 25% in Illinois to almost 90% in Hawaii and Vermont. The programs through which state funds are provided to local educational agencies (LEAs) for public elementary and secondary education have traditionally been categorized into five types: (1) Foundation Programs, (2) Full State Funding Programs, (3) Flat Grants, (4) District Power Equalizing, and (5) Categorical Grants. Of these, Foundation Programs are most common, although many states use a combination of program types. A goal of all of the various types of state school finance programs is to provide at least some limited degree of \"equalization\" of spending and resources, and/or local ability to raise funds, for public elementary and secondary education across all of the LEAs in the state. Such programs often establish target levels of funding \"per pupil.\" The \"pupil\" counts involved in these programs may simply be based on total student enrollment as of some point in time, or they may be a \"weighted\" count of students, taking into account variations in a number of categoriesâspecial pupil needs (e.g., disabilities, low family income, limited proficiency in English), grade levels, specific educational programs (e.g., career and technical education), or geographic considerations (e.g., student population sparsity or local variation in costs of providing education). After state funds reach LEAs, they are combined with locally raised funds to provide educational resources to students in individual schools. Under the traditional, and still most common, method of allocating resources within LEAs, there are no specific budgets for individual schools. Available state and local funds are managed centrally, by LEA staff, and various resourcesâfacilities, teachers, support staff, school administrators, instructional equipment, etc.âare assigned to individual schools. In contrast, a number of LEAs have in recent years applied the weighted student funding concept to developing and implementing individual school budgets. The federal Elementary and Secondary Education Act (ESEA) includes one program (Title I-A) and one secretarial authority (Title I-E) that incorporate elements of the equalization and weighted student funding strategies used by states and LEAs. Two of the four ESEA Title I-A allocation formulas employ pupil weighting concepts in the allocation of funds to states and LEAs, and one of those formulas also takes into consideration disparities in expenditures per pupil among each state's LEAs in calculating grants. The ESEA Title I-E authority allows the Secretary of Education to enter into a demonstration agreement with LEAs that are using or agree to implement weighted student funding systems to establish budgets for, and allocate funds to, individual schools. A separate development relevant to many aspects of public elementary and secondary education finance has been increasing interest in the collection and reporting of school-level finance data for public schools. While historically there have not been comprehensive state or federal efforts to calculate or report on specific budgets or expenditure levels for individual public schools, federal efforts to require and support the reporting of such information have expanded rapidly in recent years.", "document_type": "crs"}
{"report": "The Office of Federal Student Aid (FSA) within the U.S. Department of Education (ED) is the primary entity responsible for the administration and oversight of the federal student aid programs authorized under Title IV of the Higher Education Act of 1965, as amended (HEA; P.L. 89-329, as amended). As such, FSA is the largest provider of postsecondary student financial aid in the nation, performing functions that are akin to those of large banks, to which it has sometimes been compared. In FY2019, FSA oversaw the provision of $130.4 billion in Title IV aid to 11.0 million students attending approximately 6,000 participating institutions of higher education (IHEs). In addition, in FY2019, FSA managed a student loan portfolio encompassing 45 million borrowers with outstanding federal student loans totaling about $1.5 trillion. FSA is a performance-based organization (PBO) pursuant to Section 141 of the HEA. Conceptually, PBOs are intended to be results-driven organizations that have clear objectives and measurable goals designed to improve an agency's performance and transparency. PBOs are led by chief executives who are personally accountable for meeting measurable goals within the organization. In exchange, PBOs are granted greater discretion than other government agencies to operate more like private-sector companies, with more control over the budget, personnel decisions, and procurement. FSA was established under the Higher Education Amendments of 1998 ( P.L. 105-244 ) as the federal government's first PBO. This was done in response to the belief that ED needed restructuring to improve federal student aid delivery. In recent years, FSA has come under scrutiny for its oversight of IHEs participating in the student aid programs and contracted student loan servicers, its perceived lack of transparency to stakeholders, and its accountability to and engagement with stakeholders. This report provides information about the structure and organization of FSA, the nature of the work it performs, and its characteristics as a PBO. Additionally, the report attempts to synthesize some challenges experienced by FSA that have received considerable attention in recent years. There has been considerable interest in this set of issues from the 116 th Congress. As Congress contemplates the reauthorization of the HEA, it might examine some of the issues raised by these critiques and the way FSA's organization as a PBO may affect congressional goals and policies. This report begins by discussing the HEA provisions that distinguish FSA from other types of federal agencies. This is followed by a discussion of the legislative history of the creation of FSA as a PBO and of HEA Title IV programmatic changes that may affect its operations. Next, the report describes the current operations and structure of FSA. Finally, it discusses several issues related to FSA's operations and how they may relate to its structure as a PBO. The issues presented have received recent congressional and stakeholder attention and have been identified in reviews of FSA's operations. There have been numerous recent reports that have examined aspects of FSA's operations. Appendix A provides a bibliography of recent Government Accountability Office (GAO) and ED Office of Inspector General (IG) reports relating to FSA's operations. Appendix B provides a list of selected acronyms used in this report. Federal programs are usually carried out by or through agencies that are established in statute, with structural refinements established through directives issued by the agency head. Over time, Congress has created governmental and quasi-governmental entities with varying characteristics to address diverse needs in different contexts. Most federal agencies in the executive branch, however, are designed to be directly or indirectly accountable to the President. Furthermore, most federal agencies must comply with general management laws regarding financial management, procurement, information management, personnel, and other administrative practices. As a PBO, FSA has organizational features that are distinct from most other departmental subunits in the executive branch of the federal government. As the name suggests, PBOs are designed to have a greater focus on resultsâoutcomes rather than outputs. To this end, they are required to have clear objectives and measurable goals. PBO leaders are to be held professionally accountable for meeting measurable goals within the organization, with continued tenure and a portion of compensation linked to these measures of success. In exchange, these organizations and leaders are granted greater discretion to deviate from certain government-wide management processes and to operate more like private-sector companies. Key statutorily established features of FSA include, among others, the appointment and compensation arrangements for its chief operating officer (COO) and other senior managers, exemptions from certain government-wide personnel and procurement requirements, and greater independence from political pressure in the exercise of its functions. Most high-level subunits within departments are led by political appointees who are appointed by the President or the Secretary and serve at their pleasure for an indefinite term. Political appointments are not subject to the same requirements as career appointments to the Senior Executive Service (SES) or appointments to the competitive service. Depending on the authority used to make a political appointment, compensation will usually be determined by the Executive Schedule, the SES pay system, or the General Schedule. Consistent with the PBO framework, the HEA contains provisions aimed to enable FSA to attract leadership with demonstrated ability and expertise, incentivize leadership to meet performance goals, and shield FSA leadership from political pressures. FSA is led by a COO, whom the Secretary of Education appoints for a term of three to five years. The appointment is to be made based on \"demonstrated management ability and expertise in information technology (IT), including experience with financial systems, and without regard to political affiliation or activity.\" The COO's work and priorities are governed by a performance agreement with the Secretary that includes measurable organizational and individual goals. The COO may be reappointed to additional terms of three to five years if her or his performance is satisfactory. The HEA also specifies the manner in which a COO may be removed: REMOVAL.âThe Chief Operating Officer may be removed byâ (A) the President; or (B) the Secretary, for misconduct or failure to meet performance goals set forth in the performance agreement in paragraph (4). The President or Secretary shall communicate the reasons for any such removal to the authorizing committees. The law appears to authorize the President to remove the COO at will. In addition, the Secretary may remove the COO \"for misconduct or failure to meet performance goals set forth in the performance agreement.\" Either the President or the Secretary must provide their reasons for removal to the authorizing congressional committees. The COO's compensation includes basic pay, which is tied to the pay levels of the SES, and an annual bonus not to exceed 50% of the basic pay. The senior managers of FSA are appointed by the COO without regard for the competitive service appointment provisions of Title 5 of the U.S. Code . The work and priorities of these senior officials are governed by annual performance agreements with the COO that include measurable organizational and individual goals. Senior managers serve at the pleasure of the COO or, in the event that the COO position is vacant, the Secretary. As is the case for the COO, the compensation of senior managers includes basic pay, which is tied to the pay levels of the SES, and an annual bonus. The total annual compensation of a manager may not exceed 125% of the maximum basic pay for the SES pay system. Unless otherwise specified in law, executive branch employment is governed by the civil service laws of Title 5 of the U.S. Code . Consistent with the PBO framework, HEA includes provisions that give FSA more flexibility in the staffing, classification, and pay of its employees. The statute stipulates that FSA shall not be subject to any cap on the number or grade of its employees. FSA and the Office of Personnel Management (OPM) are directed to jointly develop and implement personnel flexibilities that are consistent with Title 5 of the U.S. Code . In addition, the COO is authorized to establish technical and professional positions that are not subject to the provisions of Title 5 pertaining to competitive service appointments. The HEA provision places covered positions in the excepted service, under which FSA could use alternative hiring procedures that relax the traditional competitive hiring procedures in Title 5 (such as application of veterans' preference, public notice, and/or modified qualification standards). FSA is directed to develop a performance management system consistent with Title 5 that establishes goals or objectives for employees. When executive branch agencies need to acquire goods or services to carry out their functions, they are required to comply with the Federal Acquisition Regulation (FAR) and applicable procurement statutes. The PBO procurement provisions of HEA are consistent with this overarching requirement while also permitting certain flexibilities. They state, \"Except as provided in this section, the PBO shall abide by all applicable Federal procurement laws and regulations when procuring property and services.\" The procurement flexibilities provided to the PBO include, for example, those related to the use of experts and consultants. Whereas agencies are generally constrained in obtaining such services by limitations and conditions of Title 5 of the U.S. Code âsuch as requirements for a specific appropriation or other statutory authorization and for reporting to OPM on such actionsâthe PBO may obtain such services without regard to this provision. In another example of procurement flexibility, HEA provides the PBO with authority to \"use a two-phase process for selecting a source for a procurement of property or services.\" In such a process, an agency first issues a general solicitation and then issues a second solicitation with more specific requirements to a limited group of vendors from among respondents to the first solicitation. In contrast, the FAR provides for the use of this authority under limited circumstances. In a final example, the circumstances and criteria under which the PBO may pursue a procurement with only one company differ from those followed by most agencies. Whereas in most instances the FAR allows \"sole-source\" procurement only where the needed services or supplies are available from only one responsible source and no other substitute will meet the agency's needs, FSA may use \"single source\" procurement to obtain certain systems where multiple vendors could supply the product but one vendor is \"the most advantageous source for purposes of the award.\" As noted above, most high-level subunits within departments are led by political appointees who serve at the pleasure of, and under the direction of, the Secretary. In some cases, however, subunits are statutorily structured to have some independence from political leadership. A variety of structural mechanisms in different combinations have been used over time to establish such independence. Consequently, agencies vary in their level of structural independence from political leadership. In addition, notwithstanding these structural features, a specific leader of such a departmental subunit might elect to adhere to the Secretary's agenda for other political or policy reasons. Although HEA explicitly states that FSA is subject to the direction of the Secretary, the agency is afforded a greater level of independence from political leadership than most departmental subunits in the executive branch. This is due to HEA provisions that pertain to the appointment and removal of the FSA COO, as well as those that stipulate FSA's independence in carrying out certain functions. As noted above, the COO's appointment is to be made for a three- to five-year term on the basis of specified abilities, expertise, and experience \"without regard to political affiliation or activity.\" Although the COO may be removed from office before the end of a term, the statute includes atypical specifications of the circumstances and manner in which this may occur. The statute also specifies that FSA \"shall exercise independent control of its budget allocations and expenditures, personnel decisions and processes, procurements, and other administrative and management functions.\" Although this authority is subject to the direction of the Secretary, it is not a common specification for a departmental subunit. FSA was established as the federal government's first PBO in 1998. When Congress established this structure, it departed from conventional organizational arrangements that were then in use within the federal government. The PBO model was drawn from government innovations in Great Britain in the 1980s and 1990s. It was then developed and promoted for American governmental use by the National Partnership for Reinventing Government (NPR), a major Clinton Administration governmental reform initiative. The Administration's rollout of the PBO touted the model's potential benefits and portrayed it as a commonsense development in the effort to streamline the federal government and make it more responsive to its \"customers.\" The NPR initiative, led by Vice President Al Gore, aimed to improve federal government performance by reorganizing agencies and processes to be guided by market principles and incentives. NPR's first report put forth hundreds of recommendations. These recommendations were intended to lead to better government service delivery and greater \"customer\" satisfaction. In general, this would be accomplished through the streamlining of personnel practices, procurement, and other government operations; improvement of management tools and incentives; and promotion of efficiency and economy in administration. Administration-endorsed PBO-related legislation was introduced in late 1995, but it was not until early 1996 that the Vice President introduced the PBO concept as a major new focus of the ongoing NPR. The aim was to improve government service delivery by implementing certain functions through the use of business-like practices and incentive structures. Agencies reorganized as PBOs would be freed from adherence to certain procurement and civil service laws and would, at the same time, develop systems of performance incentives and accountability for results. In advocating for the creation of federal PBOs, Vice President Gore stated: Government agencies need to change their incentives and internal cultures to shift from a focus on process to a focus on customers and achieving results. They need to become more responsive to citizens, yet account for program costs and safeguard broader public interests. This can be done by creating performance-based organizations (PBOs) that set forth clear measures of performance, hold the head of the organization clearly accountable for achieving results, and grant the head of the organization authority to deviate from governmentwide rules if this is needed to achieve agreed-upon results. PBOs involve structural changes as well as changes in incentives affecting federal employees. The NPR identified seven candidates for conversion, but none has been formally converted into a PBO. However, one of the entities targeted for conversion, the Patent and Trademark Office, was statutorily reorganized and given many PBO-like structural characteristics. Because it has these features, some observers have referred to it as a PBO. Though not contemplated as a potential PBO within the scope of the initial NPR list, FSA represented the first organization aligned with the PBO framework outlined in the NPR. In addition to FSA, one other entityâthe Air Traffic Organization of the Federal Aviation Administrationâhas been explicitly established as a PBO in statute. Prior to the establishment of FSA, federal student loan programs were administered by the Office of Student Financial Assistance Programs (SFAP), a unit within ED's Office of Postsecondary Education (OPE). As discussed below, in the mid-1990s, leadership of these programs had temporarily become divided between SFAP and a unit in the Secretary's office that had been established for the purpose of accelerating the implementation of the Direct Loan program. Although the Higher Education Amendments of 1998 ( P.L. 105-244 ) established FSA's PBO structure, interest in converting SFAP into a PBO seems to have arisen as early as 1996 amid growing concerns within Congress and ED that the student financial aid programs were \"severe[ly]\" mismanaged. The model was attractive to some congressional advocates of SFAP reform, as it appeared that its design features might address some of the agency's perceived problems while maintaining the financial assistance function within ED. Moreover, it appears that the possibility of establishing a PBO within ED to implement these programs was under consideration by the Secretary prior to Vice President Gore's introduction of the new organizational model in 1996, which, as described earlier, did not include SFAP as a candidate for conversion into a PBO. As the Clinton Administration was introducing the PBO model, congressional committees were monitoring and expressing concern about difficulties in the management of the student financial aid programs at ED. At a July 1996 hearing, ED's IG reported on a number of difficulties at ED, including program leadership being divided between OPE and the Senior Advisor to the Secretary for Direct Lending, poor coordination and communication between these offices, poor OPE staff morale, and a shortage of employees qualified in IT and financial analysis. Related problems included an interruption in efforts to improve the existing Federal Family Education Loan program, growth in the backlog of institutional cohort default rate appeals, confusion in the student loan community about where to find help for technical questions, concerns about the monitoring of financial statements and the procurement of needed IT, and difficulties with the processing the Free Application for Federal Student Aid (FAFSA). In a February 12, 1996, memorandum, the Secretary reportedly expressed an interest in establishing SFAP as a PBO. ED's IG testified in July of that year that such a transition appeared to be premature but that certain changesâsuch as leadership from a highly qualified chief executive officer to provide a stable, long-term leadership and consistency of purpose and a significant, focused reengineering effortâcould be made to SFAP to prepare it for such a transition. In May 1997, the Advisory Committee on Student Financial Assistance (ACSFA) reported that implementation of financial aid programs was plagued by staff without the necessary experience, outdated computer systems and \"a web of large, uncoordinated, uncompetitive contracts which fail to deliver on time and produce unacceptable cost overruns.\" ACSFA recommended restructuring the delivery of federal student aid under a PBO and reengineering Title IV systems and contracts, two processes the committee asserted were closely linked. During a July 1997 hearing, the Assistant Secretary heading OPE testified that the Administration was reviewing the PBO model among several different organizational modifications that might improve management of federal student assistance programs. By March 1998, the Secretary was voicing his support specifically for the PBO approach, stating that such a conversion would enhance ED's flexibility with regard to potential management and procurement reforms and allow it to more efficiently deliver student aid yet also hold it accountable for results and allow the Secretary to maintain control of policy. In September 1997, the chair and ranking member of the House Committee on Education and the Workforce subcommittee with jurisdiction over higher education policy introduced a standalone bill to establish a PBO within ED to manage the information systems associated with Title IV programs. In his introductory remarks, the chair noted problems with federal student aid information systems and financial statements before asserting, \"A customer-focused, performance-based organization within the Department, run by an experienced Chief Operating Officer, can take the steps necessary to properly reengineer the current systems and contracts.\" Provisions from this bill were included in the HEA reauthorization bill as reported by the committee in April 1998. The Senate Committee on Labor and Human Resources reported out its main bill for HEA reauthorization in May 1998. This bill included provisions that were \"developed in cooperation with the administration\" to establish a federal student aid-related PBO in ED. The role of the PBO that would have been established by this legislation was arguably broader than that in the House committee-reported measure. The PBO established in the House bill would have been \"a discrete management unit responsible for managing the information systems supporting\" Title IV programs, whereas the Senate bill would have empowered the PBO \"to administer various functions relating to student financial assistance programs authorized under\" Title IV. Text from the committee reports concerning the PBO sections of the reauthorization legislation provides a snapshot of the committees' perceptions about the management of financial aid distribution programs by ED at the time. Report language also laid out the committees' intentions for and expectations of this change in organizational structure and management paradigm. Both the House and Senate committees of jurisdiction appeared to be concerned with perceived management problems at ED. The House Committee on Education and the Workforce discussed the prevalence and persistence of IT problems and their apparent impact on the ability of ED to deliver student aid economically, effectively, and efficiently. Specifically, the committee noted ED's limited progress in integrating numerous data systems despite legislative mandates; the tripling over five years of ED's budget for student aid information systems; and the fact that even with significant expenditures, student aid systems required dozens of paper forms and experienced \"needless\" process delays and breakdowns. The Senate Committee on Labor and Human Resources described a more general and overlapping set of issues related to the need to improve the administration of Title IV aid and problems regarding the Direct Loan Consolidation program, the printing of the FAFSA, and reports that ED was falling significantly behind in its efforts to become Year 2000 compliant. Both the House and Senate committees intended for the establishment of a PBO organizational structure to address the management problems they had identified. For example, the House Committee on Education and the Workforce noted that the purposes of the proposed change were to increase effectiveness, economy, and efficiency by giving administrators greater management flexibility while requiring greater accountability for results. The committee also expected that a PBO structure would accomplish the following aims that were specifically delineated in the HEA: Improve service to program participants, Reduce the costs of administering the programs, Increase accountability, Provide greater flexibility in management and administration of the programs, and Integrate the information systems that support the federal student aid programs. In doing so, the committee stated: The Committee firmly believes that a customer-based, Performance-Based Organization within the Department, operated by an experienced Chief Operating Officer can take the necessary steps to properly reengineer the current systems and contractsâ¦. The Committee also believes the creation of a PBO will result in a more efficient, effective, less expensive and less bureaucratic financial aid delivery system. The end result should be a system that is easy for students and parents to use and one that ensures that students have the information they need to select the education that is best for themâall while ensuring that taxpayer funds are being used efficiently and effectively. The Senate Committee on Labor and Human Resources also identified its goal for the change, although it did so more generally. The committee also noted its effort to divide policy functions, which were to be retained by OPE, from operational functions, which were to be carried out by the new PBO: The goal of the performance-based organization has been, and remains, to improve the delivery of student financial aid to students and their families. In order to accomplish this, the committee has attempted to identify the functions performed by the Office of Postsecondary Education and segregate those that are essentially policy functions that must be retained by OPE from those that are administrative and that may appropriately be handled by the performance-based organization. The PBO will be responsible for administration of the information and financial systems that support student financial assistance programs as well as any additional functions that the Secretary determines are necessary or appropriate to improve the delivery of student aid. Both the Senate- and House-passed bills would have established a new PBO vested with responsibilities related to federal student aid delivery. Specific differences between the competing versions regarding the new entity's authority, purposes, functions, relationship with ED, and other organizational features were ironed out through a conference process that yielded a consensus measure. Resolution of the PBO-related differences does not appear to have been a sticking point in the conference process. The conference report was agreed to by the two chambers and President Clinton signed the Higher Education Amendments of 1998 into law on October 7, 1998. In 2008, the Higher Education Opportunity Act (HEOA; P.L. 110-315 ) amended the HEA PBO provisions. The report of the Senate Committee on Health, Education, Labor and Pensions noted its general approval, at that time, of the PBO as implemented: The committee applauds the efforts since the last reauthorization to implement the PBO. Schools and individuals have benefited from improved efficiency in originating, servicing and processing grant and loan aid. The ombudsman has provided needed guidance to students struggling to navigate the complex system. There is strong support for continuation of these efforts to make further progress in the delivery of student financial aid. In line with this assessment, the 2008 amendments appear to have clarified and expanded FSA's role in the administration of Title IV programs. They changed the characterization of the PBO's functions from \"operational\" to \"administrative and oversight,\" seemingly broadening the mandate of the agency. In addition, whereas the previous provisions vested the PBO with responsibility for administration of the information and financial systems supporting Title IV programs, the 2008 amendments enlarged the scope of responsibilities beyond this specified support function to administration of \"the Federal student financial assistance programs authorized under title IV.\" The HEOA also amended FSA's personnel and procurement flexibility provisions, as discussed below. Since FSA's inception, both statutory and regulatory changes have been made to the Title IV student aid programs. These changes may have had an effect on FSA's operations. At the time of FSA's formation in 1998, HEA Title IV authorized and ED administered two primary federal student loan programs: the Federal Family Education Loan (FFEL) program and the Direct Loan program. These two programs provided borrowers with loans for postsecondary education with substantially similar terms and conditions as one another, but each program had significantly different administrative structures. Private lenders originated FFEL program loans, and either they or secondary market loan purchasers (who bought loans from originating lenders) were responsible for completing many loan servicing tasks, including working with postsecondary institutions to track students' enrollment and loan eligibility status, billing borrowers, and conducting initial collection services if a loan became delinquent. Additionally, under the FFEL program, state and nonprofit guaranty agencies received federal funds to administer many aspects of the program, such as providing technical assistance to IHEs and lenders, providing credit and loan rehabilitation counseling to borrowers, and performing collections work. Under the Direct Loan program, the federal government essentially serves as the \"banker\" by providing loans to students and their families using federal capital. ED assumes the primary role in administering the Direct Loan program (described below), including providing technical assistance to IHEs, contracting with loan servicers to perform day-to-day administrative tasks, providing loan counseling to borrowers, and initiating collections work. In May 2008, in response to concerns about the continued availability of FFEL program loans due to several FFEL program lenders curtailing or ceasing their participation in the program, the Ensuring Continued Access to Student Loans Act of 2008 ( P.L. 110-227 ) granted ED the temporary authority to purchase student loans made under the FFEL program. In October 2008, P.L. 110-350 extended this authority through July 1, 2010. After purchasing loans made under the FFEL program, control of loan servicing was transferred to ED. In 2009, the SAFRA Act ( P.L. 111-152 , Title II) terminated the authority to make new loans under the FFEL program after June 30, 2010. Since July 1, 2010, the Direct Loan program has been the primary federal student loan program, although many FFEL program loans remain outstanding, and FFEL program lenders and guaranty agencies remain responsible for administering several aspects of those programs. These changes have vested FSA with a larger scope of responsibility than Congress might have originally contemplated when it authorized FSA's PBO structure, as FSA became responsible for administering a larger share of the federal student loan programs (in terms of loan volume and individual borrowers associated with these changes) than for which it had previously been responsible under the FFEL program. Moreover, the switch to almost 100% direct lending in 2010 had the effect of fundamentally altering the federal student loan marketplace. During the roughly 15-year period that the two programs operated concurrently, IHEs and borrowers were provided the opportunity to \"shop around.\" That is, IHEs chose whether to apply to participate in the FFEL program or Direct Loan program, and the caliber of administrative and servicing work available within the respective loan programs may have been a factor in those decisions. Additionally, schools opting to participate in the FFEL program usually compiled preferred lender lists that they shared with students. Again, assessments of the caliber of administrative and servicing work provided through differing lenders likely factored into the selection of lenders for such lists. Borrowers attending FFEL program participating IHEs were free to select among an array of lenders, including but not limited to those on the preferred lender lists. There were opportunities available for IHEs and for borrowers who were dissatisfied with customer service to pursue other options. The competition that existed within the FFEL program and across the loan programs provided incentives for those involved in administrative and servicing work to provide enhanced customer service. By transitioning to a single model of federal student lending (the Direct Loan program) under which a single entity (the federal government) both makes and is responsible for administering loans, the federal student loan marketplace transitioned from one with some built-in incentives to provide enhanced customer service to one in which there may be less incentive to do so. Several other changes in the Title IV aid programs since FSA's creation as a PBO may have also had the effect of increasing the scope and complexity of FSA's administrative functions. These include but are not limited to the following: increases in the amount and type of aid benefits available to students, including extension of PLUS Loan availability to graduate and professional students under the Deficit Reduction Act of 2005 ( P.L. 109-171 ) and the authorization of the TEACH Grant program under the College Costs Reduction and Access Act of 2007 ( P.L. 110-84 ); authorization and implementation of myriad income-driven loan repayment plans that allow borrowers to make monthly payments in amounts indexed to their adjusted gross income; increased complexity of aid benefits, including establishment of a 6% interest rate cap on federal student loans during military service under the Servicemembers Civil Relief Act ( P.L. 108-189 ), the Public Service Loan Forgiveness (PSLF) program under the College Costs Reduction and Access Act, cumulative lifetime maximums on certain students' eligibility to receive Pell Grants established under the HEOA and amended under the Consolidated Appropriations Act, 2012 ( P.L. 112-74 ), and limitations placed on certain borrower's eligibility to borrow Direct Subsidized Loans established under the Moving Ahead for Progress in the 21 st Century Act ( P.L. 112-141 ); and changes made to aid administration, including the process to receive a discharge of federal student loans after a determination that a borrower is totally and permanently disabled as established under the HEOA and implemented via subsequent regulatory changes, the requirement that ED (via FSA) contract with not-for-profit loan servicers under the SAFRA Act, and regulatory changes to borrower defense to repayment discharge procedures. Section 141 of the HEA tasks FSA with managing administration and oversight of the Title IV federal student aid programs. Among other functions, FSA develops and maintains the FAFSA; obtains student aid funds from the Treasury and makes them available for disbursement to students; contracts with third parties that perform myriad administrative tasks associated with the Title IV programs (e.g., loan servicing); provides information on the Title IV programs to students, Title IV participants (e.g., IHEs), Congress, and other stakeholders; and provides oversight of Title IV program participants, including IHEs and the third-party loan servicers with which it contracts. The HEA specifically establishes two roles within FSAâthe COO and the Student Loan Ombudsmanâto carry out FSA's functions, but much of FSA's organizational structure has been established through administrative action by the COO. In addition, many outside entities may have an interest in or have asserted a role over aspects of the federal student aid programs. Thus, in coordination with ED, FSA maintains relationships with outside stakeholders, executive branch entities, and Congress. FSA also maintains relationships with offices within ED at large. HEA Section 141 specifies several high-level aspects of aid administration for which FSA is responsible. These include the following: The administrative, accounting, and financial management functions for the Title IV aid programs, including collection, processing, and transmission of data to students, IHEs, and other authorized stakeholders; development of specifications for software and procurement of systems to support Title IV aid administration; acquisitions of all hardware and software and procurement and management of all IT contracts to support Title IV aid administration; contracting for information and financial systems to support Title IV aid administration; providing customer service, training, and user support related to Title IV aid administration; and ensuring the integrity of the Title IV aid programs. Development, in consultation with the Secretary, of FSA's annual budget. The Secretary may delegate additional functions to FSA as necessary or appropriate to achieve FSA's purposes. FSA is given control of its budget allocations and expenditures, procurements, personnel decisions and processes, and other administrative and management functions but remains subject to the direction of the Secretary. The HEA specifies that the Secretary \"shall maintain responsibility for the development and promulgation of policy and regulations\" related to Title IV aid. In doing so, the HEA requires the Secretary to \"request the advice of, and work in cooperation with\" FSA. To fulfill its statutory responsibilities, FSA undertakes many discrete tasks (discussed below). Students wishing to receive Title IV student aid must annually apply for assistance using the FAFSA, which is developed and maintained by FSA in accordance with specifications set forth in the HEA. After a student submits the FAFSA, an automated system contracted by FSA processes the FAFSA, and then IHEs (or the third-party servicers with which they contract) use information from it to calculate the amount of aid for which a student is eligible. FSA obtains funds from the Treasury and makes them available to IHEs, which in turn disburse those funds to students. Once a grant is disbursed, in many cases administrative functions are significantly decreased. However, FSA may be required to implement and/or oversee administrative functions after a grant has been disbursed. For instance, if an individual receives a Pell Grant in excess of the amount for which he or she is eligible, he or she may be required to return a portion to FSA. Once a Direct Loan program loan is disbursed, FSA assigns it to a contracted loan servicer. Loan servicers perform a variety of administrative functions such as collecting payments and performing delinquency prevention activities. FSA may, if necessary, assign a defaulted loan to a contracted private collection agency (PCA), which attempts to recover payment on defaulted loans from borrowers. FSA may also use other options to collect on defaulted Direct Loans, including referring a borrower's account to the Treasury Offset Program. In FY2018, FSA maintained major contracts with approximately 20 vendors, totaling about $1.1 billion. (These contracts constituted approximately 63% of appropriations provided for student aid administration in general in FY2018. ) Services for which FSA maintains contracts include servicing of Direct Loans and ED-held FFEL program loans and Perkins Loans, collection of defaulted Direct Loans and ED-held FFEL program loans and Perkins Loans, and IT infrastructure to support myriad tasks such as the processing of submitted FAFSAs. FSA also has a contract for the National Student Loan Data System (NSLDS), which is a central database for student aid. NSLDS maintains detailed administrative data to track Title IV grants and loans throughout their lifecycle and support Title IV administrative functions such as verifying a student's Title IV eligibility. Numerous individuals and entities have a stake in the Title IV federal student aid programs and rely on FSA to provide timely and accurate information regarding the programs. Students, their families, and borrowers rely on FSA to provide information and assistance throughout the entire financial aid process. IHEs and FSA's third-party contractors rely on communications and assistance from FSA to administer various aspects of the aid programs. Members of Congress and the general public rely on FSA for information about the performance of the Title IV aid programs. FSA operates several websites that enable stakeholders to access relevant information about program operations. FSA maintains the website www.studentaid.gov , which is FSA's \"primary online portal for customers\" and the 'Information for Financial Aid Professionals' website, which consolidates guidance and resources related to Title IV administration for use by the entire financial aid community. FSA also operates several repositories of Title IV program data to enable it and stakeholders to access information about the programs and their performance. HEA Section 485B tasks ED with development of the NSLDS. FSA has primary responsibility for administration of the NSLDS and has contracted with a third party to operate it. FSA also maintains the Data Centerâa centralized, publicly available source for selected administrative data and other information related to the Title IV programs. The Title IV program data on FSA's Data Center are often derived from NSLDS. In addition, FSA operates the Enterprise Data Warehouse Analytics, which contains data from multiple FSA data sources, such as NSLDS. It provides FSA with analytic tools to provide \"quick and accurate access to inform internal and external data requests\" and is often used to provide Title IV program data and analysis to internal stakeholders such as ED's Budget Office and to external stakeholders such as congressional requesters, other federal agencies, and the public. FSA also makes its statutorily required annual report to Congress publically available. Finally, the Ombudsman Group âa subunit within FSAâprovides students and aid recipients with a single point of entry (the Feedback and Dispute Management System) to provide feedback or to file complaints and disputes about the Title IV programs. FSA has a large oversight role in ensuring that various Title IV program participants comply with Title IV program requirements. Both statute and regulations prescribe many aspects of the Title IV programs, including student aid program terms and conditions and requirements IHEs must meet to participate in the programs. IHEs and third-party contractors play a significant role in ensuring that the Title IV programs are administered properly. In addition, some Title IV programs (e.g., the campus-based aid programs ) vest a larger share of administrative functions with IHEs, while others (e.g., the FFEL program) vest additional administrative functions with outside entities such as guaranty agencies. FSA's oversight of IHEs relates largely to ensuring that they meet eligibility requirements to participate in the Title IV programs and that they (and any third-party servicers with which they may contract) properly administer the Title IV programs. FSA certifies an IHE's eligibility to participate in the Title IV programs and recertifies its eligibility thereafter. FSA verifies each IHE's accreditation status and whether the IHE is legally authorized to operate within a state. FSA also evaluates an IHE's financial responsibility and administrative capability to administer the Title IV programs. After an IHE is certified to participate in the Title IV programs, FSA ensures that it is conforming to eligibility and administrative requirements. FSA does this by performing program reviews and by reviewing required IHE compliance audits and financial statement audits conducted by third-party auditors. FSA reviews the IHE's required third-party compliance and financial statement audits and attempts to resolve issues with them. During a program review, FSA evaluates an IHE's compliance with Title IV requirements. Review priority is given to certain IHEs specified in statute (e.g., those IHEs with high cohort default rates). FSA has the authority to impose sanctions and corrective actions on IHEs and their third-party servicers. Examples include imposing fines, imposing specific conditions or restrictions related to administration of Title IV funds, and terminating Title IV participation. FSA's oversight of its third-party contractors generally consists of ensuring that they fulfill the terms and conditions of their contracts with FSA. In general, federal agencies, including FSA, have a number of tools to help ensure a contractor adequately performs a contract. Examples include requiring corrective action, using performance-based incentives, and terminating the contract. FSA contracts with numerous third-parties for a variety of goods and services related to administration of the Title IV programs, including student loan servicers and PCAs. In FY2019, FSA contracted with 12 student loan servicers to perform a variety of tasks largely related to the Direct Loan program. FSA uses performance-based incentives to encourage loan servicers to meet desired results (e.g., ensuring borrowers are in current repayment status and meeting customer service satisfaction goals). It does so by basing the number of borrower loan accounts allocated and compensation levels on servicers' ability to meet stated goals. In addition, FSA issues guidance to loan servicers to assist them in day-to-day operations and conducts monitoring activities, such as completing annual compliance audits and assessing borrower-servicer interactions. FSA also contracts with numerous PCAs to attempt to collect the $140.3 billion in defaulted loans of 7.2 million borrowers. Similar to its oversight of loan servicers, FSA uses performance-based incentives to meet desired goals. PCA compensation is based on a PCA's overall performance. Previously awarded contracts have based borrower account allocation on PCA performance. However, current PCA contracts with FSA are not readily available for review, and it is unknown how future PCA contracts might be structured. In addition, FSA issues guidance to PCAs to assist them in day-to-day operations and conducts monitoring activities, such as assessing PCAs' interactions with borrowers. For FFEL program loans not held by ED, guaranty agencies administer many aspects of the program, such as providing default aversion assistance to FFEL program lenders and services related to the federal loan guarantee. In the campus-based programs, IHEs perform many of the administrative functions described earlier in this section (e.g., award disbursement and loan servicing) and are also afforded some discretion in determining the mix and amount of campus-based aid funds awarded to students. FSA oversees these entities in their fulfillment of these functions. As described above, the scope of FSA's operations covers many activities and responsibilities. Selected statistics and additional information provide insight into the scale of FSA's operations. Table 1 presents information on funds obligated for student aid administration. Table 2 presents data on full-time equivalent (FTE) employment for federal student aid administration. Table 3 presents selected trends relevant to student aid administration. To provide context and a sense of scale, in relation to ED as a whole, nearly every year since ED's creation as a Cabinet-level department (October 1979), functions currently under FSA have accounted for the majority of ED spending (including both Title IV aid disbursements and aid administration expenses). Moreover, while the number of FTE staff at ED has declined since FY1981, the number of FTEs at FSA has generally increased over time. In FY2016, FSA accounted for about one-third of ED's FTEs. It is estimated that the largest share of staff being supported through student aid administration funding are staff supported through loan servicing contracts (discussed below). There are two broad categories of funding obligations for federal student aid administration: (1) salaries and expenses and (2) student loan servicing. Table 1 presents annual funding obligated for federal student aid for FY2009-FY2019. Over this period of time, obligations for federal student aid administration increased from $754 million in FY2009 to $1.7 billion in FY2019. Obligations for student aid administration have increased by 47% since FY2011 (the first full fiscal year in which no new FFEL program loans were made). Beginning with FY2016, obligations for loan servicing have constituted the majority of student aid administration costs. Figures on FTE employment for FY2009-FY2019 for federal student aid administration are presented in Table 2 . The number of FTE employees working on federal student aid administration has risen from 1,058 in FY2009 to 1,480 in FY2019, a 40% increase. Other offices within ED besides FSA also perform student-aid related administrative activities. In addition, a number of contractor staff (e.g., loan servicing staff) provide outsourced business operations for student aid administration. For example, FSA reported that approximately 12,000 contracted staff augmented its FTE employees in FY2016. Over the past several years, the workload of FSA has increased considerably. Table 3 provides information related to FSA's workload, including the number of FAFSAs processed, the number of students receiving aid, the total dollar amount of federal student aid provided through the Title IV federal student aid programs, the total number of federal student loan recipients who have outstanding balances, and the total dollar amount of principal and interest outstanding. As shown in Table 3 , the number of individuals receiving Title IV aid and the number of FAFSAs processed peaked in FY2011 and FY2012, respectively. However, the total number of federal student loan recipients with outstanding loan balances and the total dollar amount of principal and interest outstanding increased substantially over the period examined and increased year-over-year for each complete fiscal year under review. Section 141 of the HEA establishes FSA's PBO structure as a discrete management unit within ED and subject to the direction of the Secretary in the exercise of its functions. FSA operates under the coordination of the Office of the Under Secretary, which is the office within ED that coordinates policies and programs related to postsecondary education, as well as vocational and adult education. Although the HEA specifically establishes two roles within FSA (the COO and the student loan ombudsman), much of FSA's organizational structure and leadership arrangements have been established through administrative action by the COO, subject to the direction of the Secretary. In addition, FSA interacts with various other offices within ED to facilitate the implementation of ED policies in aid administration. FSA is composed of numerous offices, each responsible for varying aspects of Title IV student aid administration. Two FSA roles are specifically mandated by the HEA: the chief operating officer and the student loan ombudsman. These offices have been charged with carrying out both statutory and administratively delegated functions, as discussed below. The HEA assigns several responsibilities to FSA's COO. The Secretary has delegated additional responsibilities to the COO. In practice, while responsibilities are assigned or delegated to the COO, individual employees or offices within FSA may perform the day-to-day tasks associated with fulfilling those responsibilities. HEA Section 141(d) vests management of FSA in a COO and mandates several of the COO's activities and responsibilities. Annually, the COO and the Secretary must publically make available a five-year performance plan for FSA that establishes measurable goals and objectives for FSA. In developing the plan, the Secretary and the COO are to consult with stakeholders such as students, IHEs, and Congress. The COO is required annually to submit to Congress a report on FSA's performance that is to include, among other items, (1) an independent financial audit, (2) the results achieved during the year relative to the performance plan goals, (3) the evaluation of the COO and senior managers, and (4) recommendations for legislative and regulatory changes to improve administration of the Title IV student aid programs. In preparing the report, the COO is to establish appropriate ways to consult with stakeholders, including students and IHEs. FSA states that the Annual Report satisfies these responsibilities. HEA Section 142 authorizes the COO, subject to the authority of the Secretary, to procure property and services to perform its functions. In practice, while the Secretary is considered ED's senior procurement official, it appears that FSA typically has significant autonomy in its contracting functions. The HEA specifies that the Secretary maintains responsibility for the development and promulgation of policy and regulations related to Title IV aid. However, in developing and promulgating Title IV student aid policies and regulations, the Secretary is required to request the advice of and work in cooperation with the COO. FSA's Policy Liaison and Implementation Staff (PLIS) is the office within FSA that consults with the Secretary on Title IV student aid policies and regulations. Among other functions, PLIS implements policy (and supports FSA staff in implementing policy) developed by ED through the Office of the Secretary, the Office of the Under Secretary, and OPE. PLIS also works with the Office of the Under Secretary to formulate policy recommendations and identify policy issues affecting the Title IV student aid programs; provide advice on regulations, policies, administrative policy guidance, and procedures; prepare preliminary drafts of subregulatory guidance for consideration by ED and draft policy electronic announcements for review by FSA staff; and design, manage, and monitor the Experimental Sites Initiative. Finally, the HEA specifies that the COO is to disseminate information to stakeholders on the student loan ombudsman (described below). The Secretary may delegate additional functions to the COO (and FSA in general) to achieve FSA's purposes. Authorities that the Secretary has delegated to the COO include, but are not limited to, authority to take certain personnel actions, such as carrying out reductions-in-force for FSA in coordination with ED, approving telework agreements, and handling FSA employee grievances; programmatic authorities related to Title IV programs, such as awarding certain formula grants (e.g., awarding campus-based funds to IHEs) and entering into agreements with entities outside of ED (e.g., IHEs or other federal agencies); authority to compromise, waive, and write-off certain claims against individuals under Title IV programs, such as waiving or writing off the collection of current or defaulted federal student loans; authority to develop, implement, and manage an Employee Personnel Security Program and a Contractor Personnel Security Program in accordance with established ED directives and guidance. HEA Section 141(f) specifies that the COO, in consultation with the Secretary, shall appoint an ombudsman \"to provide timely assistance to borrowers of loans made, insured, or guaranteed under Title IV.\" Specifically, the ombudsman is to (1) review and attempt to informally resolve borrower disputes with Title IV loan program participants and (2) compile and analyze data on borrower complaints and make recommendations. Each year, the ombudsman is to submit to the COO (for inclusion in the COO's annual report) a report describing the ombudsman's activities and effectiveness during the preceding year. FSA's Ombudsman Group is the specific office tasked with fulfilling the HEA Section 141 requirements for a student loan ombudsman. The Ombudsman Group also administers FSA's comprehensive informal complaint resolution and customer inquiry/case resolution processes related to all Title IV student aid programs, not just those related to student loans, although the most frequent types of cases received by the Ombudsman Group relate to student loans. Addressing customer cases regarding non-loan Title IV student aid programs is not part of the ombudsman's specific statutory mandate. Many tasks related to student aid are vested (either through statute or secretarial authority) with other ED offices, and other executive branch entities may have an interest in or jurisdiction over aspects of federal student aid. In addition, FSA is subject to congressional direction (e.g., via amendments to the HEA or appropriations laws) and oversight. As such, FSA may have occasion to interact and maintain relationships with numerous outside stakeholders. The Secretary \"is responsible for the overall direction, supervision, and coordination of all activities of [ED] and is the principal adviser to the President on Federal policies, programs, and activities related to education in the United States.\" The Office of the Secretary directly oversees the Office of the Under Secretary (which, in turn, oversees FSA). In addition, the Office of the Secretary oversees several other entities that interact with FSA on a regular basis: The Office of the Inspector General is responsible for \"identifying waste, fraud, abuse, and criminal activity involving ED funds, programs, and operations.\" To this end, it conducts independent audits and reviews of ED programs, including the Title IV student aid programs and FSA's operations. The Office of General Counsel (OGC) is responsible for providing \"legal assistance to the Secretary concerning the programs and policies of the Department.\" OGC also provides legal assistance to other ED offices, including FSA. Among other services, OGC provides legal advice, litigation services, legislative services (e.g., drafts legislative proposals), and assistance in drafting subregulatory guidance. The Office of Budget Service has the lead responsibility for, among other functions, ED's budget, budget and related legislative policies for ED programs, and the review and analysis of ED program operations, including budget and policy implementation. It develops cost estimates for the Title IV student aid programs and maintains computer models to estimate such costs, coordinates methodology and data with FSA and OPE, and liaises with FSA other ED offices to analyze data sources and assumptions for the student aid cost estimation models. The Office of the Under Secretary oversees policies, programs, and activities related to vocational and adult education, postsecondary education, college grant aid, and federal student loans. The Under Secretary directs and coordinates policies, programs, and activities related to postsecondary education and federal student aid. The Under Secretary also supervises FSA, which administers federal student aid, and OPE, which provides overall direction, coordination, and leadership on matters related to postsecondary education. The Under Secretary serves as the principal advisor to the Secretary on postsecondary education. As previously described, HEA Section 141 specifies that the Secretary maintains responsibility for the development and promulgation of policy and regulations related to Title IV aid but must coordinate with FSA. With Under Secretary oversight, OPE fulfills the policy development and promulgation role for the Secretary. OPE develops both regulations and subregulatory guidance for the Title IV student aid programs (e.g., Dear Colleague letters to financial aid professionals). In doing so, OPE liaises with FSA's PLIS (and other offices such as OGC) in the development, implementation, and dissemination of Title IV student aid policy. Other executive branch entities may have some level of authority over or interest in aspects of federal student aid programs. As such, ED and FSA may maintain relationships with these entities to help ensure proper functioning of the aid programs. Based on its functions, FSA likely, at least in part, has played a role in these partnerships even when ED may be officially responsible. Executive branch entities with which ED and FSA may maintain relationships to help ensure proper functioning of the aid programs include the following: Department of the Treasury . FSA obtains funds from Treasury to make available to students in the form of federal student aid. FSA may refer a borrower's defaulted loan to the Treasury Offset Program for offset of certain benefits such as federal income tax refunds and Social Security benefits. Moreover, while the Debt Collections Improvement Act generally requires federal agencies to transfer nontax debts that are 180 days or more delinquent to Treasury's Fiscal Service for centralized debt collection (referred to as cross-servicing), since 2001, the Secretary of the Treasury has granted FSA a permanent exemption from this requirement. Thus, FSA is responsible for collecting delinquent and defaulted federal student loan debt assigned to or held by ED. The act also authorizes the Secretary of the Treasury to exempt certain classes of debt from cross-servicing. Since 2005, debts that are being collected through administrative wage garnishment and meet certain conditions have been exempted from cross-servicing. Consumer Financial Protection Bureau (CFPB) : The CFPB has asserted a role in ensuring compliance with consumer protection laws that may apply to federal student loans. For example, the CFPB has brought lawsuits against some FSA-contracted federal student loan servicers for consumer compliance violations relating to federal student loan servicing. CFPB also maintains resources for both federal student loan and private education loan borrowers and fields complaints from student loan borrowers. The CFBP and ED participated in an interagency task force to help ensure sufficient oversight of proprietary IHEs. However, it appears that the CFPB and ED may no longer be working together as closely as they previously had been. For example, in 2017, ED terminated its memoranda of understanding with the CFPB to share data and information relating to the student loan servicing market, stating that the CFPB violated the terms of the memoranda. Department of Justic e (DOJ) : DOJ may play a role in law enforcement related to federal student loans, including, through U.S. Attorneys' offices, prosecuting violations of federal criminal laws and representing the federal government in civil proceedings. For instance, FSA may refer a defaulted federal student loan borrower's account to DOJ for civil litigation against the borrower. In addition, DOJ may file lawsuits against federal student loan program participants, such as contracted student loan servicers, for failure to comply with federal statutes related to student loans and individuals for acts of fraud. Other executive branch entities with which ED and FSA may interact include the Federal Trade Commission, the Internal Revenue Service (IRS), the Department of Veterans Affairs, and the Social Security Administration. In processing the FAFSA, FSA's Central Processing System matches student provided information against other federal entities' databases to confirm elements of each student's aid eligibility. In total, the Central Processing System performs matches against databases maintained by the Department of Defense, DOJ, the Social Security Administration, the Department of Veterans Affairs, the Department of Homeland Security, and the Selective Service System. In addition, FSA's systems interface with the IRS Data Retrieval Tool, which links students', students' spouses, and parents' IRS tax information to the FAFSA and/or the income verification component of applying for and recertifying information for the various income-driven repayment plans. To initiate and/or maintain these relationships, ED and FSA may enter into formal agreements (e.g., memoranda of understanding) with the relevant federal entity or maintain a less formal interagency relationship. Congress may guide and affect the way FSA operationalizes and manages the day-to-day functions of the federal student aid programs. First, Congress and the President may enact laws that impact or amend federal student aid programs or FSA itself. For example, Congress could amend the HEA Sections 141-143, which relate specifically to FSA as a PBO, or the Title IV student aid programs in general. In addition, during the appropriations process, Congress determines discretionary funding levels for FSA activities. In some instances, Congress may include stipulations or directives regarding the use of these funds. Second, Congress exercises oversight of FSA. This oversight may include requiring FSA or ED representatives to testify before Congress, requiring or requesting FSA to report additional information regarding its operations, and requesting that GAO or the IG conduct an in-depth investigation of FSA. Congress has exercised its oversight authority regarding Title IV aid administration numerous times in recent years. The COO is required to annually report to Congress on FSA's progress in achieving its goals and objectives described in its five-year performance plan (also known as the strategic plan). Among other items, the performance plan is to address FSA's responsibilities in improving service to stakeholders, reducing costs of administering the Title IV student aid programs, improving and integrating the systems that support the student aid programs, and other areas identified by the Secretary. The Secretary and FSA, in consultation with stakeholders, develop the strategic objectives described in FSA's five-year performance plan. As part of the plan, FSA develops the metrics by which its performance under these strategic objectives are measured. FSA also sets its specific annual goals for meeting each metric. In doing so, most of its annual goals are based on FSA's performance under the metric in the prior year. Table 4 presents information on FSA's performance for each metric under its strategic objectives as set forth in its Strategic Plan: FY2015-19 for FY2016-FY2019. For each metric, FSA's goal and actual performance are presented. The text for FSA's actual performance under each measurement indicates whether FSA met its goal in the given year. Bolded text indicates that FSA did not achieve its goal, while regular text indicates that FSA did achieve its goal. In general, over the four fiscal years examined, FSA met most of its goals. FSA consistently met its goals relating to usership of its online resources (customer visits to studentaid.gov and social media channel subscribership), persistence among first-time filing aid recipients, percentage of contract dollars competed by FSA, and collection rate. In addition, it consistently met both of its goals under Strategic Goal Câimproving operational efficiency and flexibilityâwhich included goals on aid delivery cost per application and percentage of outstanding Direct Loans in current repayment status. For many instances in which FSA did not meet its goals, in the following year, FSA downwardly adjusted its goal under the relevant metric. For those instances in which FSA met its goal, whether it subsequently adjusted the goals in the following year varied. Close observers assessed FSA's progress in addressing the congressionally identified issues that prompted FSA's establishment as a PBO in 1998. Immediately following the enactment of the HEA provisions establishing a PBO, ACSFA acknowledged the difficulty of simultaneously undertaking a major reorganization and system modernization. ACSFA noted the commitment and energy of the first permanent COO and praised \"his willingness to communicate with the higher education community\" as well as his early senior personnel choices. ACSFA also criticized the priorities of the new unit as well as its adherence to the congressional intent behind, and the requirements of, the new statute. Among other concerns, it noted that ED appeared to be transplanting the organizational arrangements of SFAP (FSA's predecessor), as an office of OPE, into a new PBO that reported directly to the Secretary without making more fundamental changes to its management and organizational structure; ED was failing to \"adequately separate policy making and regulatory responsibilities of OPE and operations responsibilities of the PBO as intended by Congress;\" and rather than \"directing its attention and scarce resources toward solving its basic systems, data, and contract problems, the PBO appear[ed] to be â¦ concentrating on the twin objectives of improving day-to-day customer service and providing students web access to their data through 'a single federal point of contact' for all financial aid transactions.\" In 2002, ACSFA reported, among other findings, that some progress had been made on transferring policymaking functions to OPE but that \"functions related to institutional eligibility and guarantor and lender oversight\" remained within the purview of FSA. ASFCA called for the transfer of these functions to OPE, with OPE consulting with FSA to ensure that proposed federal aid policies supported FSA operations. ACSFA also reported that FSA was strengthening the capacity of its management, systems, and operations staff while reducing its reliance on contractors and recommended FSA continue to do so. In addition, it expressed concern that minimal progress had been made on systems integration. ACSFA called for ED to \"incorporate specific integration goals and schedules into its strategic and tactical plans and quicken the overall pace of data and systems integration as a means of reducing cost and increasing efficiency.\" By 2001, FSA had developed an organizational performance plan identifying three strategic goals: increase customer satisfaction, increase employee satisfaction, and reduce unit costs. However, ED's IG and GAO noted that it did not clearly address some of the new office's statutory purposes that had been identified during the HEA reauthorization process. For example, both entities found that the performance plan did not sufficiently address the means by which systems integration would be accomplished, nor did it include any objective measures of forward movement in that area. Both ED's IG and GAO recommended that FSA establish clear goals, strategies, and performance measures related to systems integration. FSA disagreed with the IG's recommendation, reasoning that the agency could not achieve its three stated goals without systems integration. In a response to the GAO recommendation, which came later, however, ED's Deputy Secretary agreed with the recommendation, committing to directing that FSA's performance plan \"be revised to establish measurable goals and milestones for systems integration efforts to provide both direction to FSA and enhance its accountability.\" The GAO report also assessed the progress FSA had made in measuring and achieving its three strategic goals. It noted that FSA had made measurable progress in the general improvement of customer and employee satisfactionâtwo of its three strategic goals. With regard to its third goal (reduce unit costs), GAO found that the indicator FSA used to measure unit cost was deficient. GAO also noted that the relationship between FSA and ED was still evolving: Education continues to take steps to clarify FSA's level of independence and its relationship with other Education officesâ¦. With the arrival of the current administration â¦ Education established special interim operating procedures for all department units, including FSA, that were intended to ensure that personnel and financial resources are managed effectively and efficiently throughout the department.â¦ Education now provides greater direction and oversight of FSA than was provided previously. Education is currently reviewing FSA's role and responsibilities as part of the departmentwide management planning effort. The results â¦ will be used to guide future decisions concerning FSA's level of independence and its relationship to other department offices. In 2005, GAO removed the Title IV federal student aid programs from its High Risk List. The student aid programs had been on GAO's High Risk List since the list's inception in 1990. In removing the Title IV student aid programs from the list, GAO found that while FSA still needed to take additional steps to fully address some of its recommendations, overall, management of the programs had improved enough to warrant removal from the High Risk List. In removing the student aid programs from its High Risk List, GAO cited many factors, including FSA's \"sustained improvements to address financial mismanagement and internal control weaknesses,\" receipt of an unqualified or \"clean\" opinion on its financial statements for FY2002-FY2004, actions to ensure that aid was not being awarded to ineligible students, actions to \"integrat[e] its many disparate information systems,\" steps to reduce student loan default rates, and steps to address its \"human capital challenges.\" In more recent years, FSA has been praised for its handling of the transition to 100% direct lending under the Direct Loan program and for other improvements to the administration of the Title IV aid programs, such as implementation of the IRS Data Retrieval Tool to allow students and their parents to import their federal income tax data directly into their FAFSA. Some more recent GAO and IG reports have noted cases in which FSA met its objectives. Some sizable issues have also been identified in GAO and IG reports, by some Members of Congress, and by other stakeholders. For example, FSA's oversight of its contracted loan servicers has come under scrutiny from Congress, ED's IG, GAO, and the CFPB. Seemingly large deficiencies in ED's implementation of and communication with borrowers about of the PSLF program have been identified by GAO and have garnered congressional interest as well. Concerns have also been raised over FSA's ability to identify and address poorly performing IHEs or those that may be at risk of closure. These more recent issues are discussed in more detail below. ED's federal student aid operations were statutorily reorganized into a PBO with the hope of addressing significant management problems, including limited progress in integrating numerous data systems, student aid delivery delays and breakdowns, and infighting over student aid delivery turf among ED's senior managers. In this context, the then-untried PBO model seemed promising: It was built on the idea that business-like performance incentives and management flexibility would motivate and permit the organization and its leaders to provide economical, efficient, and effective service to student aid recipients. The organization would be given a higher-than-typical level of independence from political leadership and direction on operational processes in return for accountability for results, as measured by performance agreements and assessments. Potential concerns about independent policymaking by a PBO's leaders could be allayed by separating the policymaking functions from the operational functions. The former would remain accountable to Administration leadership, and the latter would be vested in the semi-independent PBO. While the establishment of FSA as a PBO seems to have addressed at least some of the congressional concerns prompting its establishment, new issues have arisen in recent years, and some of the previously cited issues that led to the adoption of a PBO approach may yet remain unresolved. Federal oversight entities and other outside observers have raised issues pertaining to FSA, including those relating to oversight, transparency, and accountability. As these issues receive continued attention, and as Congress contemplates the reauthorization of the HEA, this final section of the report highlights some of the issues relating to FSA's operations that have garnered attention over the past several years. Issues highlighted and options for addressing them have, for the most part, been gathered from reports from GAO, ED's IG, and outside organizations. CRS has identified some of the options available to address these issues. In some instances, documents referenced here refer to ED and/or the Secretary of Education and not specifically to FSA and/or its COO. However, based on its functions, FSA is likely pertinent to the topics being addressed. Where possible, CRS has indicated in footnotes where a cited source refers to ED more generally and CRS has inferred that FSA has some responsibility for a function or activity being discussed. HEA Section 141 specifies that one of FSA's functions as a PBO is to ensure the integrity of the federal student aid programs. Thus, FSA is tasked with overseeing a variety of entities that play a role in administration of the Title IV student aid programs. FSA's oversight of IHEs and contracted loan servicers has been criticized in recent years. Some criticisms have focused on perceived deficiencies in FSA's assessment of IHEs, its ability to proactively mitigate risk in the Title IV programs, and its ability to resolve issues at IHEs in a timely manner. Similarly, FSA has experienced difficulties in its monitoring of loan servicers. Some of these difficulties seem to have stemmed from FSA providing incomplete or fragmented guidance to loan servicers, which have impeded their efforts to comply with requirements for servicing federally held loans and to assist borrowers in navigating the aid programs. The oversight issues introduced here are explored in greater depth below. Should any congressional action be taken to address these issues, Congress might consider whether or how it should specify desired outcomes and actions taken by FSA. There may be tradeoffs between meeting congressional goals and shoring up current perceived oversight deficiencies and enabling FSA to operate independently and with flexibility to address difficult or novel issues. Consideration might also be given to the apparent difficulties in separating operational functions delegated to FSA from policymaking retained by ED. FSA oversees, through enforcement activities, IHE compliance in meeting requirements to participate in the Title IV aid programs. These requirements are intended to ensure that IHEs provide sufficient educational quality, provide a level of consumer protection, and ensure administrative and fiscal integrity of Title IV programs at IHEs. Through oversight of the IHEs participating in the Title IV student aid programs, FSA is able to identify instances of noncompliance and take appropriate action, such as sanctioning IHEs or providing assistance to IHEs to come into complianceâboth tools that can help mitigate student and taxpayer risk. Interest in the issue of FSA's oversight of IHEs has arisen, at least in part, due to the prominent closures of several large multi-campus IHEs in recent years, affecting thousands of students. In response to these closures, GAO and ED's IG have launched several investigations and have found that FSA staff do not always follow internal procedures for institutional review and that some internal procedures did not have controls in place to prevent IHEs from manipulating Title IV participation requirements. These frailties could result in failure to identify IHEs that are not complying with Title IV requirements or that are at risk of abruptly closing. For example, one IG report found that FSA did not conduct IHE program reviews in accordance with its own internal procedures, which could lead to \"limited assurance that program reviews are appropriately identifying and reporting all instance of noncompliance.\" The IG noted that FSA staff did not consistently complete and maintain required program review forms, adequately document institutional fiscal testing requirements relating to Title IV aid disbursement at IHEs, or obtain all required information for review of an IHE's distance education programs. Perhaps relatedly, some FSA staff reported feeling \"overwhelmed\" with the amount of work they were required to perform in the time allotted, and some of their managers believed that allotted time may be inadequate to complete some more complex program reviews, which could have been contributing factors to FSA not consistently conducting program reviews according to procedures. In another report, the IG found that FSA needed to improve internal processes to help it identify IHEs that may be at risk of an abrupt closure. Specifically, the IG found that FSA did not act in a timely manner to resolve Corinthian College's (a large IHE that abruptly closed in 2015) failing composite score appeal, nor did it promptly require Corinthian College to post a letter of credit upon finding that the school's composite score was failing. The IG asserted that such weaknesses may enable some IHEs to avoid FSA sanctions or additional oversight, which in turn may result in a greater risk of harm to students (e.g., enrollment in an IHE that may be at risk of a precipitous closure) and loss of taxpayer funds (e.g., the cost of student loan discharges due to the IHE's closure). The IG also found that FSA had taken some steps to implement new tools and processes to help identify IHEs at risk of closure, such as participating in OPE efforts to enhance information sharing between ED and an IHE's accreditor and creating an enforcement office responsible for investigating complaints made against IHEs. It appears that the enforcement office has since been largely disbanded. However, it is possible that subsequent steps may have been taken to strengthen monitoring and response practices. Ensuring IHEs compliance with Title IV requirements arguably addresses one of the HEA-specified functions of FSA as a PBO: ensuring integrity of the Title IV aid programs. It also arguably addresses FSA's strategic goal to \" proactively manage the student aid portfolio and mitigate risk ,\" which FSA describes as aimed to \"strengthen FSA's role in working to ensure protection of customers and holding stakeholders accountable for their actions.\" Under the two metrics FSA has identified as measures of its performance under this goal, FSA has had mixed success (see Table 4 ). However, neither metric seems to directly address IHE oversight and accountability in the Title IV aid programs. FSA-contracted loan servicers are tasked with various day-to-day administrative tasks associated with federal student loans and some other forms of student aid. FSA's oversight of loan servicers generally consists of ensuring that the loan servicers are meeting federal requirements for student loans (e.g., ensuring that borrowers' interest rates are correctly calculated) and fulfilling the terms and conditions of their contracts with FSA and providing guidance to loan servicers to enable them to meet such standards. Oversight of contracted loan servicers can help FSA mitigate risks in the Title IV program and enable it to help ensure the provision of effective customer service to students and their families. In recent years, issues associated with federal student loan servicing have received considerable attention. For instance, some have alleged that some loan servicers have engaged in undesirable conduct, such as steering borrowers away from more beneficial loan repayment options or providing inaccurate or incomplete information to borrowers. Still others have detailed borrowers' experiencing problems when seeking to have loan servicers resolve servicing errors, identified issues with loan payment processing that may cause problems for borrowers seeking to repay their loans, and identified issues with respect to the implementation of specific loan terms and conditions such as the PSLF program. Concerns raised about loan servicing have focused in particular on whether FSA is sufficiently reviewing, monitoring, and holding loan servicers accountable. GAO has reported that FSA's monitoring of loan servicers' interaction with borrowers may be insufficient to ensure that servicers are providing accurate information and quality customer service to borrowers. For instance, GAO found that FSA primarily monitored inbound calls from borrowers to loan servicers, which constitute a small percentage of the calls loan servicers participate in. Thus, GAO opined that \"FSA may not be focusing its call monitoring on the most frequent and critical types of calls.\" GAO also found that FSA's call monitoring was poorly documented and its tracking of borrower complaints was disjointed, with complaints being tracked across multiple systems. While some of these issues have seemingly been resolved, it is unclear whether others have been resolved. Without a systematic approach to reviewing loan servicer interactions with borrowers, it may be difficult for FSA to target oversight of its loan servicers and improve its services to student loan borrowers. More recently, ED's IG found that while FSA regularly identifies instances of servicer noncompliance with federal servicing requirements, FSA neither tracked instances of noncompliance that were remedied by loan servicers nor analyzed information relating to the noncompliance. Moreover, the IG found that FSA rarely used available tools to hold loan servicers accountable, nor did FSA incorporate a performance metric relating to servicer compliance into the otherwise performance-driven terms of its contracts with loan servicers. Finally, the IG found that FSA employees did not always follow internal policy when evaluating interactions between servicers' representatives and borrowers. These issues may make it difficult for FSA to identify recurring issues in loan servicing, mitigate the risk of potential harm to borrowers for loan servicer noncompliance, and hold loan servicers accountable for poor servicing. A difficulty loan servicers may face in complying with requirements for servicing federally held students loans is the fragmented and incomplete guidance for a complex student loan system provided to them from FSA. GAO has found that FSA may provide insufficient guidance to servicers regarding certain aspects of loan administration, such as how to apply borrower over- or under-payments to an account balance. Moreover, when FSA does provide guidance, it may not consistently share that information with all loan servicers or all relevant individuals. Such gaps in authoritative guidance to loan servicers may create a risk of inconsistent interpretations of law and procedures, which could lead to inefficiencies in federal student loan administration and could negatively affect borrowers' abilities to use the features of their loan terms and conditions. To help address these concerns, Treasury has recommended, and Congress has previously directed, FSA to publish a common loan servicing policies and procedures manual. However, it appears that FSA has not published such a manual. Another difficulty loan servicers face is that federal student loan terms and conditions have become increasingly more complex over the years. This may contribute to some of the problems loan servicers have in administering them. For example, FSA recently stated that it, along with its loan servicers, is working to enhance communications with borrowers regarding the PSLF program's requirements but acknowledged that the program is fundamentally complex and that FSA does not have the authority to change congressionally mandated PSLF eligibility requirements. Thus, while there are likely instances in which FSA oversight of loan servicers could be strengthened to ensure that borrowers receive the loan benefits to which they are entitled, there may also be inherent difficulties in administering the loan programs themselves, which might be addressed with policy changes to the programs. Ensuring loan servicer compliance with Title IV and contract requirements arguably addresses one of the HEA-specified functions of FSA as a PBOâensuring integrity of the Title IV aid programsâand FSA's strategic goal to \" proactively manage the student aid portfolio and mitigate risk .\" Under the two metrics FSA has identified as measures of its performance under this goal, FSA has had mixed results (see Table 4 ). While some of the metrics FSA has identified under this performance goal seem intended to address loan servicing practices, the extent to which they may do so is unclear. For instance, it is unclear whether the metrics used to assess the efficacy of FSA directly gauge the accuracy and completeness of information provided by their contracted loan services. In determining the desired level of oversight of IHEs and loan servicers, Congress might consider whether to specify desired outcomes and actions to be taken by FSA. While FSA is tasked with the day-to-day functions of administering the Title IV programs, Congress can guide and affect these efforts in a variety of ways, including amending the portions of the HEA that relate to FSA's functions, providing stipulations regarding the use of annual appropriations, exercising oversight of FSA through mechanisms such as congressional hearings, further emphasizing the importance of stakeholder input (discussed below in the section entitled \"Stakeholder Accountability\"), or statutorily specifying more goals and performance metrics for FSA. Some of these changes might involve tradeoffs between improving perceived oversight deficiencies and enabling FSA to operate independently and with flexibility to address difficult or novel issues. To the degree that additional statutorily specified direction might stipulate the way in which FSA is to conduct day-to-day operations, there may be potential for it to be in tension with the goal of accountability for results, as opposed to processes, that is key to the PBO model. Arguably, such action might also impair the agency's ability to make business-like operational decisions based on nonpolitical considerations rather than responsiveness to political leaders. The choice of the PBO model was predicated on the idea that ED's political leadership would retain policymaking functions and that the PBO's role would be limited to operational functions. Seemingly, ED and FSA have made organizational adjustmentsâsuch as FSA's Office of Policy Liaison and Implementation Staff, which consults with the Secretary on the development and promulgation of Title IV student aid policies and regulationsâthat allow for FSA input into the formal policymaking process that is at least nominally under the authority of ED. A different kind of policymakingâthat which occurs as a byproduct of implementationâis a long noted facet of public administration that might prove more difficult to address. Issues around loan servicing illustrate how it may be difficult to completely remove policymaking from the operational functions delegated to FSA. For example, Congress sets the terms and conditions of federal student loans in general, and ED may add precision to them, while FSA designs and enforces contracts for loan servicers to administer the loan programs. However, a program's administration may shape how policies work in real life. For instance, some have observed that the payment structure of loan servicing contracts established by FSA may incentivize loan servicers to encourage borrowers to pursue one loan benefit (e.g., forbearance ) over another (e.g., income-based repayment), which may contradict ED's policy preferences. Although such policymaking through implementation probably can be reduced by limiting the scope of discretion in a delegated authority or by increasing oversight of the agency's activities, these steps might reduce agency efficiency and hinder the effectiveness of the PBO model. Numerous outside parties have a stake in the aid programs and rely on FSA to provide timely and accurate information about them. Criticisms have been raised that FSA may lack sufficient transparency regarding Title IV program operations. Congress and other entities with oversight responsibilities (e.g., the CFPB) sometimes seem to have incomplete or imperfect information on Title IV program performance and operations, which may make it difficult to make informed, well-honed policy or enforcement decisions. Many consumers are also seemingly have incomplete or imperfect consumer information on the Title IV programs and Title IV participation, which may make it difficult for them to make informed college-going and financial decisions. Some have called on FSA to publicly release a variety of data and to enhance communications regarding such information. It does not appear that FSA's PBO model would necessarily hinder transparency, nor would increasing transparency appear to be directly at odds with the model's design. However, there may be some tradeoffs between increasing transparency and maintaining the effectiveness of the PBO's business-like design, which was specifically intended to shield Title IV aid administration, at least in part, from political pressures and increase efficiency within the aid programs. Additionally, FSA must grapple with privacy requirements when contemplating the potential release of, and how to appropriately make available, many types of data in its possession. Congress and other policymakers have an interest in understanding how the Title IV federal student aid programs operate and the outcomes associated with those programs, as the dollar amount of federal student aid awarded and number of aid recipients represents a large federal investment. In FY2019, FSA provided approximately $130.4 billion in Title IV aid to approximately 11.0 million students, and FSA managed a student loan portfolio encompassing approximately 45 million borrowers with outstanding federal student loans totaling about $1.5 trillion. Concerns have been raised that FSA may not provide access to information that may enable stakeholders to make informed policy recommendations and decisions. Some have noted that while FSA possesses large quantities of student-level records that measure grant and loan receipt, postsecondary education completion status, and loan repayment, FSA has \"often been less than responsive to requests for data and research that would benefit the rest of the nation.\" Even when information on Title IV program performance is made available, some have found it to be insufficient. For example, ED's IG recently found that while FSA has provided, through its Data Center, information on the loan portfolio that was formerly unavailable, it does not include other potentially relevant information, such as more detailed information on costs to the federal government associated with the income-driven repayment plans and loan forgiveness programsâtwo loan features that are increasingly being used by borrowers and garnering attentionâthat could assist policymakers and the public understand the future impact of those loan terms. At least one federal entity has seemingly been unable to carry out some of its duties due to a perceived lack of transparency from FSA. The CFPB has indicated that recent FSA guidance to its contracted loan servicers regarding the release of certain student loan records may be hampering CFPB's ability to conduct supervisory examinations of them to ensure that they are in compliance with federal consumer protection law. The guidance prohibits loan servicers from responding directly to information requests by third parties, including regulators such as the CFPB, and specifies that, pursuant to the Privacy Act of 1974, third-party requests should be made directly to ED. Providing requested information to stakeholders arguably aligns with at least one of FSA's strategic goals: \" Foster trust and collaboration among stakeholders .\" Based on the three performance metrics FSA has identified as measures of its performance under this goal, FSA has seemingly generally succeeded in fulfilling this goal in recent years (see Table 4 ). However, generally speaking, the performance metrics do not appear to encompass the provision of timely and useful information to stakeholders. Moreover, it is unclear how some of the three performance metrics (e.g., collection rate) address the strategic goal in general. The metric \" Ease of doing business with FSA \" seems most relevant to the quality and timeliness of its efforts to meet the information needs of the stakeholders discussed here. However, it is not clear that this metric is constructed in a manner that would capture the extent to which FSA's efforts are successful in meeting the information needs of policymaking and oversight entities who presumably constitute high-priority stakeholders. Members of the general publicâparticularly those who need or may need student aidâmay have an interest in understanding how the Title IV programs operate and the outcomes associated with those programs. Their interests may relate to having access to information that allows them to make informed college-going and financial decisions and understanding potential financial risks associated with those decisions. Concerns have been raised that FSA may not be releasing some information relating to IHEs' performance in meeting Title IV institutional eligibility requirements that may be indicators of an IHE's educational quality or financial stability and may be of use to consumers when deciding in which IHEs to enroll. In one report, GAO found that while FSA publicly discloses information on some IHEs' financial composite scores (an indicator of an IHE's financial stability), it did not publicly disclose all IHEs' composite scores. Since the report's publication, FSA has taken some steps to enhance the availability and usefulness of publicly available composite score information. However, \"without complete and transparent data on schools' financial conditions,\" which may include aspects other than an IHE's composite scores, \"it may be difficult for students to make informed decisions as to whether a school is a safe investment of their time and money.\" Concerns have also been raised that FSA may not consistently provide information on federal student aid terms and conditions that may enable recipients to make sound financial decisions. GAO has found that while FSA makes available detailed information about loan terms and conditions, borrowers must often actively seek out the information. Moreover, FSA often relies on its loan servicers to communicate loan terms and conditions to borrowers, but there may be inconsistencies among loan servicers in the information they provide to borrowers. Communications about program requirements among borrowers, FSA, and loan servicers may also be imperfect. Inconsistent and/or imperfect information about program terms may lead to borrowers' being unaware of or confused about program requirements, which may put them at risk of making suboptimal financial decisions, some of which may lead to financial distress such as loan delinquency or default. FSA has taken steps to increase borrower awareness of some loan terms and conditions. However, all communication issues may not be fully resolved. In response to some of these concerns, Congress has on occasion directed FSA to perform customer outreach. Providing complete and accurate information to customers arguably addresses some of the HEA-specified purposes of FSA as a PBO: \"to improve service to students and other participants in the student financial assistance programs authorized under title IV, including making those programs more understandable to students and their parents.\" It also arguably aligns with FSA's strategic goal of \" i mprov[ing] quality of service for customers across the entire student aid life cycle .\" Under the five metrics FSA has identified as measures of its performance under this goal, FSA has seemingly generally succeeded in fulfilling this goal in recent years (see Table 4 ). However, concerns over communications with customers remain. Some have suggested that FSA's independence and leadership by non-political appointees enable it to be unresponsive to requests for information from Congress, political and career staff within ED, and outside stakeholders. They point out that the COO is accountable to the Secretary on the basis of measurable organizational and individual performance goals, arguably rendering removal by the Secretary or the President more difficult politically. With better access to information, it is argued, researchers and policymakers could more readily judge policies and federal investments. However, other factors, such as compliance with other federal statutes (e.g., ED's interpretation of its responsibilities under the Privacy Act of 1974), may hinder FSA's responsiveness to information requests. Increasing access to Title IV program performance and operations information might detract from or improve the effectiveness of the PBO's business-like design features. Sharing such information generally entails the ongoing development of information-sharing policies and procedures. Staff hours would be needed to carry out functions associated with the dissemination process, which could result in reduced economy and efficiency in addressing the PBO's statutory purposesâwhich do not explicitly include data sharing. Furthermore, it could increase scrutiny and evaluation of the agency's operational processes rather than the results by which PBO performance is to be measured. On the other hand, the sharing of such information could improve the ability of stakeholders to assess the results of FSA's work, perhaps using different measures of performance, and hence address accountability for results beyond the specific targets identified by FSA. Section 141 of the HEA mandates that FSA develop five-year performance plans and annual reports. In doing so, FSA is to engage with relevant stakeholders, which may enable it to glean new information about program performance, leverage that information to create efficiencies, and provide a level of accountability to stakeholders in its operations. In addition, the COO and senior managers are to enter into annual performance agreements that set forth measurable organizational and individual goals. The awarding of annual performance bonuses is tied to meeting these goals. Each of these provisions is intended to provide a layer of accountability to stakeholders, including students, borrowers, IHEs, FFEL program lenders and guaranty agencies, contracted student loan servicers, Congress, and other parties that may have an interest in federal student aid. Concerns about accountability relate to whether FSA is fulfilling its statutory mandate to consult with such stakeholders in developing performance plans and annual reports and whether FSA is leveraging information garnered from stakeholder interactions to make improvements. They also relate to whether FSA is sufficiently responsive to customer needs. Consideration might be given to whether improvement of performance agreements and measures and more meaningful use of stakeholder feedback may streamline operations at FSA and/or improve customer service to students and other aid participantsâtwo statutorily specified purposes of establishing FSA as a PBO. Criticisms in this area raise questions about the effectiveness of the PBO's statutory performance planning and measurement mechanisms. Consideration might be given to amending these provisions. At least one stakeholder organization, representing student aid administrators, has reported that while FSA may reach out to stakeholders for input in developing its performance plans and annual reports, the engagement may be only perfunctory in nature and may not provide stakeholders a meaningful opportunity to provide potentially useful feedback to FSA to enable it to fulfill its functions. The same stakeholder organization has also asserted that performance metrics developed by FSA and ED are vague or inappropriate. GAO has raised concerns regarding how FSA communicates with aid recipients and whether it leverages information from customer interactions to make program improvements. Assertions of a lack of engagement with stakeholders and meaningful assessment of FSA's performance raise concerns about whether statutory mandates are being adhered to and whether FSA is sufficiently attuned to outside views to effectively and efficiently administer a program in which many actors are engaged. They also raise concerns about whether FSA is sufficiently accountable to those stakeholders. The extent to which FSA engages with and leverages information from student aid recipients and organizations who represent them may affect students and their families. They may be limited in their ability to shop around for postsecondary financial assistance, as Title IV student aid makes up approximately half of the financial assistance available to postsecondary students. Moreover, student loan borrowers often have even fewer options regarding choosing loan products to finance their postsecondary education, as private lenders are often unwilling to provide loans to individuals who may have limited creditworthiness, whereas Title IV student loans are generally made without regard to creditworthiness. In those instances where private education loans are made, they often do not contain the same favorable terms and conditions (e.g., availability of loan forgiveness programs) as Title IV student loans. It might be argued that because FSA has no comparable competitors, it may have less motivation to seek or respond to customer feedback to improve services. Arguably, the criticisms of FSA discussed above expose a potential flaw in the PBO model as implemented under the HEA. The ED Secretary and the FSA COO have a joint responsibility to set (in consultation with stakeholders) and measure organizational performance. They each have an incentive (as leaders of ED and FSA, respectively) to show continuous improvement in FSA performance. This incentive might affect the degree to which stakeholder input is incorporated into the process as well as the specificity and nature of the goals and measures adopted. Vague goals and measures with seemingly perfunctory stakeholder feedback processes could mask performance problems that might exist. Some potential changes in this area could maintain FSA as a PBO but also modify statutory provisions related to accountability and stakeholder input. Improvement of performance agreements and measures would seemingly be in line with the PBO model's results orientation. For example, Congress might more specifically identify in statute the domains and metrics to be used in establishing annual performance plans and evaluating agency performance. Such provisions have been enacted in other contexts, such as the performance accountability system that was established by the Workforce Innovation and Opportunity Act. Similarly, more meaningful incorporation of certain types of stakeholder feedback into the performance plan and evaluation process would seemingly be consistent with the PBO model. Potential approaches to emphasizing the importance of stakeholder input during this planning and assessment might include specifying in statute a more formal input process. For example, Congress has directed state agencies to solicit written comments from the public and to respond to such comments in writing when establishing career and technical education performance standards. Appendix A. Selected Bibliography The following appendix provides a bibliography of selected reports authored by ED's OIG and GAO that address FSA and its operations and that have been published since January 1, 2014. Sources listed in the bibliography largely relate to FSA but may also include information and findings relating to other ED offices, such as OPE. In some instances, sources refer to ED and/or the Secretary of Education and not specifically to FSA and/or its COO. CRS is including these documents in this bibliography as, given FSA's functions, some of the information in these reports likely relate to FSA. For each category, reports are presented in reverse chronological order. U.S. Department of Education, Office of Inspector General Federal Student Aid's Oversight of Schools' Compliance with Satisfactory Academic Progress Regulations , July 17, 2019. Federal Student Aid's Process to Select Free Application for Federal Student Aid Data Elements and Students for Verification , April 26, 2019. Federal Student Aid: Additional Actions Needed to Mitigate the Risk of Servicer Noncompliance with Requirements for Servicing Federally Held Student Loans , February 12, 2019. Federal Student Aid: Efforts to Implement Enterprise Risk Management Have Not Included All Elements of Effective Risk Management , July 24, 2018. Federal Student Aid's Contractor Personnel Security Clearance Process , April 17, 2018. The Department's Communication Regarding the Costs of Income-Driven Repayment Plans and Loan Forgiveness Programs , January 31, 2018. Federal Student Aid's Borrower Defense to Repayment Loan Discharge Process , December 8, 2017. Federal Student Aid's Processes for Identifying At-Risk Title IV Schools and Mitigating Potential Harm to Students and Taxpayers , February 24, 2017. Misuse of FSA ID and the Personal Authentication Service , September 26, 2016. FSA Oversight of the Development and Enhancement of Information Technology Products, June 30, 2016. Kathleen Tighe, ED Inspector General, \"Servicemembers Civil Relief Act,\" letter to Senators Patty Murray, Elizabeth Warren, and Richard Blumenthal, February 29, 2016. Functionality of the Debt Management Collection System 2 , November 5, 2015. Federal Student Aid's Oversight of Schools Participating in the Title IV Programs , September 29, 2015. Review of Debt Management Collection System 2 (DMCS2) Implementation , August 24, 2015. Audit of the Followup Process for External Audits in Federal Student Aid , June 17, 2015. Pell Grant Lifetime Eligibility Limit , March 31, 2015. Federal Student Aid's Oversight of Schools' Compliance with the Incentive Compensation Ban , March 24, 2015. The U.S. Department of Education's Administration of Student Loan Debt and Repayment , December 11, 2014. Oversight of Guaranty Agencies During the Phase-Out of the Federal Family Education Loan Program , September 29, 2014. Review of Federal Student Aid's Oversight and Monitoring of Private Collection Agency and Guaranty Agency Security Controls , September 22, 2014. Handling of Borrower Complaints Against Private Collection Agencies , July 11, 2014. Third-Party Servicer Use of Debit Cards to Deliver Title IV Funds , March 10, 2014. Review of Federal Student Aid's Plans for Schools Closures by a For-Profit Entity , February 28, 2014. Title IV of the Higher Education Act Programs: Additional Safeguards Are Needed to Help Mitigate the Risks That Are Unique to the Distance Education Environment , February 21, 2014. U.S. Government Accountability Office Public Service Loan Forgiveness: Improving the Temporary Expanded Process Could Help Reduce Borrower Confusion , GAO-19-595, September 5, 2019. Federal Student Loans: Education Needs to Verify Borrowers' Information for Income-Driven Repayment Plans , GAO-19-347, June 25, 2019. Priority Open Recommendations: Department of Education , April 9, 2019. Cybersecurity: Office of Federal Student Aid Should Take Additional Steps to Oversee Non-School Partners' Protection of Borrower Information , GAO-18-518, September 17, 2018. Public Service Loan Forgiveness: Education Needs to Provide Better Information for the Loan Servicer and Borrowers , GAO-18-547, September 5, 2018. Federal Student Loans: Further Action Needed to Implement Recommendations on Oversight of Loan Servicers , GAO-18-587R, July 27, 2018. Federal Student Aid: Education's Postsecondary School Certification Process , GAO-18-481, July 17, 2018. Federal Student Loans: Actions Needed to Improve Oversight of Schools' Default Rates , GAO-18-163, April 26, 2018. Federal Student Aid: Better Program Management and Oversight of Postsecondary Schools Needed to Protect Student Information , GAO-18-121, November 27, 2017 (reissued December 4, 2017). Higher Education: Education Should Address Oversight and Communication Gaps in Its Monitoring of the Financial Condition of Schools , GAO-17-555, August 21, 2017. Student Loans: Oversight of Servicemembers' Interest Rate Cap Could be Strengthened , GAO-17-4, November 15, 2016. Federal Student Loans: Education could Improve Direct Loan Program Customer Service and Oversight , GAO-16-523, May 16, 2016. Federal Student Loans: Key Weaknesses Limit Education's Management of Contractors , GAO-16-196T, November 18, 2015. Federal Student Loans: Education Could Do More to Help Ensure Borrowers Are Aware of Repayment and Forgiveness Options , GAO-15-663, August 25, 2015. Higher Education: Better Management of Federal Grant and Loan Forgiveness Programs for Teachers Needed to Improve Participant Outcomes , GAO-15-314, February 24, 2015. Higher Education: Education Should Strengthen Oversight of Schools and Accreditors , GAO-15-59, December 22, 2014 (reissued January 22, 2015). Federal Student Loans: Better Oversight Could Improve Defaulted Loan Rehabilitation , GAO-14-256, March 6, 2014. Appendix B. Selected Acronyms Used in This Report", "summary": "The Office of Federal Student Aid (FSA), within the U.S. Department of Education (ED), is established as a performance-based organization (PBO) pursuant to Section 141 of the Higher Education Act (HEA). FSA is a discrete management unit \"responsible for managing the administrative and oversight functions supporting\" the HEA Title IV federal student aid programs, including the Pell Grant and the Direct Loan programs. As such, it is the largest provider of postsecondary student financial aid in the nation. In FY2019, FSA oversaw the provision of approximately $130.4 billion in Title IV aid to approximately 11.0 million students attending approximately 6,000 participating institutions of higher education (IHEs). In addition, in FY2019, FSA managed a student loan portfolio encompassing approximately 45 million borrowers with outstanding federal student loans totaling about $1.5 trillion. Among other functions, FSA develops and maintains the Free Application for Federal Student Aid (FAFSA); obtains funds from the Department of the Treasury to make aid available to students; contracts with numerous third parties to provide goods and services related to Title IV administration, such as student loan servicing; provides oversight of the numerous third parties (e.g., contracted student loan servicers and IHEs) that play a role in administering the Title IV programs; and provides information to third-party stakeholdersâsuch as students, the public, and Congressâregarding Title IV program operations and performance. Responsibility for developing and promulgating policy and regulations relating to the Title IV programs, however, remains with the Secretary of Education. Congress established FSA's PBO structure under the Higher Education Amendments of 1998 ( P.L. 105-244 ) in response to a belief in Congress and ED that the Title IV student aid programs were \"severe[ly]\" mismanaged and that ED was in need of restructuring to improve federal student aid delivery. In general, PBOs are intended to be business-like, results-driven organizations that have clear objectives and measureable goals designed to improve an agency's performance and transparency. PBO leaders are to be held professionally accountable for meeting organization goals, with continued tenure and a portion of compensation linked to these measures of success. In exchange, PBOs and their leaders are granted greater discretion to deviate from certain government-wide management processes and to operate more like private-sector companies. Specific to FSA's structure as a PBO, the HEA vests management of FSA in a chief operating officer (COO) who is appointed based on demonstrated ability and without regard to political affiliation. Each year, the COO and the Secretary must agree on and publicly make available a five-year performance plan for FSA that establishes measurable goals and objectives addressing a variety of statutory specifications, such as FSA's responsibilities in improving customer service to stakeholders and reducing costs of administering the Title IV student aid programs. The COO is required to annually submit to Congress a report on FSA's performance. In addition, each year the COO and the Secretary, and the COO and FSA senior managers, enter into performance agreements that set forth measurable organizational and individual goals. The COO and senior managers are eligible to receive bonus compensation based on an evaluation of work performed relative to the annual goals specified in their annual performance agreements. The HEA provides FSA with some flexibilities with regard to traditional federal rules around hiring, compensation, and procurement. Since FSA's creation as a PBO, it has experienced some notable successes, including the Title IV aid programs' removal from the Government Accountability Office's High Risk List in 2005, the transition to 100% direct lending under the Direct Loan program, and implementation of the Internal Revenue Service (IRS) Data Retrieval Tool. Since FSA's establishment, the programs it administers have grown substantially larger, and the federal student aid programs and benefits have become substantially more complex to administer (e.g., with the addition of numerous loan forgiveness and income-driven repayment plans). In recent years, particularly over the last decade, several issues have arisen related to FSA's Title IV program administration. In broad terms, they pertain to oversight of entities participating in and helping with administration of Title IV programs, transparency, and accountability to certain stakeholders and consumers (i.e., aid recipients). Oversight issues relate to FSA's oversight of IHEs participating in the Title IV loan programs. Criticisms have focused on FSA's assessment of the well-being of IHEs and ability to proactively mitigate risk in the Title IV programs. Other concerns relate to FSA's oversight of its contracted student loan services, including its monitoring of such entities and the accountability of servicers to FSA in certain areas of their performance. Concerns have also been raised about the shortage of operational guidance FSA has provided to loan servicers to enable them to ensure they are meeting Title IV statutory and regulatory requirements and to assist borrowers in navigating the aid programs. Transparency issues relate to the extent to which FSA makes available information about the Title IV programs' performance and operations to relevant parties. Congress, other entities with oversight responsibilities, and other federal agencies sometimes have imperfect information on Title IV program performance and operations, which can make it difficult to make informed, well-honed policy or enforcement decisions. In addition, consumers may be faced with incomplete information on the Title IV programs and the IHEs that participate in such programs, which may make it difficult to make informed college-going and financial decisions. Stakeholder and borrower accountability issues include the extent to which FSA is fulfilling its statutory mandate to consult with relevant stakeholders in developing performance plans and annual reports and whether FSA is leveraging information garnered from stakeholder interactions to make program administration improvements. They also relate to whether FSA is sufficiently responsive to customer needs, especially given that FSA administers programs for which, arguably, there are no comparable competitors. As Congress contemplates the reauthorizations of the HEA, it might consider whether any adjustments should be made to address any of these issues and, if so, the extent to which any efforts to address issues might involve or affect FSA's PBO function and structure.", "document_type": "crs"}
{"report": "Congress chartered Fannie Mae and Freddie Mac, also known collectively as the government-sponsored enterprises (GSEs), to promote homeownership by providing liquidity to the secondary markets for single-family residential mortgages and multifamily (apartment and condominium) construction. Guaranteeing single-family residential mortgages is their core business activity, but it comes with risks. The GSEs retain the credit (default) risks from the mortgages they purchase from loan originators and subsequently issue mortgage-backed securities (MBSs), which are bond-like securities. Investors who purchase the MBSs are guaranteed to get their initial principal investment returned, but they assume the risk that borrowers may choose to repay their mortgages ahead of schedule, known as prepayment risk. The MBSs are considered more liquid (in comparison to the original mortgages with both attached risks) because they may be traded or sold for cash more quickly. If investors are willing to hold MBSs, then more private-sector funds become available for relatively less liquid mortgagesâparticularly 30-year fixed-rate mortgages. National mortgage rates tend to fall as the supply of funds in this market increases, making homeownership more affordable. The Federal Housing Finance Agency (FHFA), an independent federal government agency created by the Housing and Economic Recovery Act of 2008 (HERA; P.L. 110-289 ), is the GSEs' primary supervisor. FHFA regulates the GSEs for prudential safety and soundness and ensure they meet their affordable housing mission goals. In September 2008, the GSEs experienced losses that exceeded their statutory minimum capital requirement levels due to the high rate of mortgage defaults. The GSEs also experienced losses following spikes in short-term borrowing rates that occurred while they were funding long-term assets held in their portfolios. The GSEs subsequently agreed to be placed under conservatorship. Until the GSEs' financial safety and soundness can be restored, the FHFA has the powers of management, boards, and shareholders. The FHFA established three conservatorship performance goals designed to restore confidence in the GSEs and restore them to a safe and solvent condition: 1. The GSEs must promote a well-functioning national housing finance market while operating in a financially safe and sound manner. 2. Credit or default risk to U.S. taxpayers should be reduced by increasing private capital's role in the mortgage market. 3. The GSEs must construct a contemporary singleâfamily securitization infrastructure for their use and other private mortgage securitizers. In addition, the Senior Preferred Stock Purchase Agreements (PSPAs) stipulate the conditions under which the U.S. Treasury will provide financial support to the GSEs while they are under conservatorship. The PSPAs require the GSEs to pay dividends to Treasury rather than private shareholders while they are under conservatorship. The PSPAs also require the GSEs to reduce the size of their lending portfolios to $250 billion. Since they entered conservatorship, congressional interest in the GSEs has continued due to uncertainty in the housing, mortgage, and financial market. For example, the final amount and duration of financial support that Treasury will eventually provide the GSEs is difficult to predict at present. Furthermore, reforming or replacing the GSEs might affect the availability of single-family 30-year fixed-rate mortgage loan products. This mortgage product is arguably popular with borrowers, but private lenders may be reluctant to retain them in their lending portfolios because they are relatively less liquid mortgagesâwith both credit and prepayment risks attachedâand may last for several decades. Congressional interest has been reflected by various draft proposals, bills, and oversight hearings on housing finance reform. During the 116 th Congress, the U.S. Senate Committee on Banking, Housing, and Urban Affairs released a proposal that would affect the GSEs' role in the housing finance system. President Donald J. Trump also released a memorandum directing federal agencies to develop a plan to reform the housing finance system, which includes ending the conservatorships. This report first describes Fannie Mae's and Freddie Mac's activities and mission. It then summarizes the progress made to date on FHFA's initiatives, focusing primarily on the management of the GSEs' credit and liquidity risks. The FHFA has directed the GSEs to share more of the credit risk linked to their single-family mortgage purchases with the private sector to reduce potential risks that would be borne by U.S. taxpayers. The GSEs must also standardize numerous processes to foster greater liquidity in the market for their MBSs. This report concludes with a discussion of the policy implications of GSE challenges while they are under conservatorship. For example, recent FHFA initiatives require the GSEs to harmonize their business models, including certain borrower risk characteristics that are eligible for securitization. The GSEs' ability to satisfy their affordable housing goals, therefore, might depend upon the extent to which borrowers with risk characteristics deemed eligible for securitization overlap with those who traditionally face greater difficulty accessing mortgage credit. In addition, the GSEs' ability to purchase and securitize mortgages may depend upon certain legal protections that loan originators receive when their mortgages are sold to the GSEs. The regulation, which is known as the GSE patch (or QM patch), expires on January 10, 2021, and it is difficult to predict how secondary-market participantsâloan originators, the GSEs, and investorsâwill respond if it expires as scheduled. Borrowers obtain their mortgages from loan originators in the primary market; loan originations may be bought and sold in the secondary market. By law, the GSEs cannot originate mortgages directly to borrowers in the primary market. Instead, the GSEs operate in the secondary mortgage market, interacting with loan originators (that sell mortgages to the GSEs) and investors (that purchase the GSEs' debt and MBS issuances). The GSEs purchase conforming mortgages , single-family mortgages that meet certain eligibility criteria based on size and creditworthiness, from loan originators. The GSEs use two methods to acquire conforming mortgages. A GSE may pay cash directly from its cash window to a loan originator for delivery of a small number of mortgages. Alternatively, the GSEs may enter into a swap agreement with a loan originator to purchase a large number (pool) of mortgages. In exchange for a pool(s), the purchasing GSE delivers one (or more) MBS that is linked to the MBS trust that will hold the mortgages. An MBS trust is a legal entity established to hold pools of conforming mortgage loans; the streams of principal and interest are deposited as borrowers repay their mortgages. The GSEs issue MBSs to investors. MBSs are essentially derivative products that contain one, rather than both, of the financial risks attached to the original mortgages that the GSE purchased. Investors that purchase an MBS receive a coupon , which is the yield composed of the principal and interest repayments from borrowers whose mortgages are held in MBS trusts. However, various fees are subtracted before the coupons are paid to investors. For example, a designated mortgage servicer retains a fee to collect borrowers' regular payments, resolves borrower delinquency and default problems, and disburses payments to the GSEs (which subsequently disburse payments to MBS investors). Other fees related to the home purchase (e.g., settlement costs) that borrowers may have chosen not to pay upfront may also be subtracted. Simply put, the coupon is the rate of return net of fees that an investor receives for purchasing or investing in an MBS. The GSEs, like banks, are financial intermediaries that match mortgage borrowers with ultimate lenders. Under a traditional banking model, banks borrow funds from their depositors and use the funds to originate longer-term consumer and business loans. Consumers and businesses pay higher interest rates to banks for these longer-term loans than the banks pay to their depositors for successive sequences of relatively lower-rate loans (e.g., recurring deposits) for shorter periods of time. L ending spreads are the difference between lending at higher rates (revenues) and borrowing at successive sequences of shorter rates (costs). A bank can retain all of the profits generated by its lending spreads if the entire lending process and associated financial risks are retained on its balance sheet. Similar to banks, the GSEs create profitable lending spreads to finance assets retained in their lending portfolios (on-balance sheet) and the conforming mortgages held in the MBS trusts (off-balance sheet). The GSEs issue to investors debt securities, referred to as unsecured debentures , with shorter maturities relative to the longer-term assets retained in portfolio. By borrowing via successive sequences of lower-rate debentures, the GSEs create portfolio lending spreads. In addition, the GSEs fund mortgages held in the MBS trusts. Rather than issuing debentures, the GSEs fund the MBS trusts via issuing MBSs in the to-be-announced (TBA) market. When issuing MBSs, however, the GSEs act more like monoline bond insurers, meaning they retain credit risk and transfer prepayment risk to private investors. These concepts, which are key to understanding the GSEs' securitization activities, are described in detail in the sections below. Another important fee, the guarantee fee (g-fee) , is deducted from the streams of principal and interest payments before an MBS investor receives a coupon payment. The g-fee compensates the GSEs for retaining credit risk , the risk that borrowers might default or fail to repay their mortgage loan obligations. Although the g-fee is typically charged to loan originators (and frequently passed onto borrowers), the benefit of the mortgage insurance accrues to MBS investors. Should a delinquency or default occur, the GSEs guarantee timely payment of the coupon (net of fees) to MBS investors. After a borrower defaults, the applicable GSE purchases the defaulted mortgage (for the amount of the remaining balance owed) out of the MBS trust. The purchase effectively reimburses the associated MBS trust and, therefore, prevents MBS investors from losing their initial principal investments. The MBS coupon is subsequently adjusted for the reduced stream of interest payments, thus making it appear to investors that mortgage obligations have been repaid ahead of schedule (rather than defaulted). The other key mortgage risk, prepayment risk , is transferred from the GSEs to MBS investors. Prepayment risk is the risk that borrowers will repay their mortgages ahead of schedule, resulting in lenders earning less interest revenue than initially anticipated. For example, if mortgage rates decline, some borrowers may repay their existing mortgages early by refinancing (replacing) them into new mortgages with lower rates. Borrowers also prepay their mortgages when they move. In this case, the GSEs pass on the principal repayment but reduce the investors' MBS coupons by the amount of interest forgone. In sum, the GSEs' securitization process entails detaching two mortgage risks into separate components. The GSEs retain the default risk component for a g-fee and transfer the prepayment risk component to MBS investors. For this reason, MBSs are considered derivative securities because they contain only one of the risks linked to the original underlying mortgages held in the MBS trusts. Many types of bonds and derivatives trade directly (via broker-dealers) between two parties in what are referred to as over-the-counter (OTC) market transactions. Bonds generally trade infrequently, and the trade sizes vary, which may cause valuation (pricing) challengesâsometimes leading investors and market-makers to perceive that the bonds may be illiquid . Illiquid securities cannot easily be converted into cash or traded within a reasonable time, that is, without affecting their quoted prices. Investors arguably might offer (bid) \"too much\" to buy or sell (ask) for a price \"too low\" when trading illiquid securities. Consequently, investors require additional compensation, referred to as a liquidity premium , to buy or sell illiquid securities. Widening bid-ask spreads might signal the emergence of a liquidity premium being incorporated in securities prices. After being issued in the TBA market, the GSEs' MBSs trade in the OTC market and are considered to be almost as liquid as the U.S. Treasury bond market. Prior to conservatorship, the GSEs could actively trade their own MBSs to facilitate market liquidity. By conducting market trades when the bid-ask spreads for MBS widened, the GSEs could abate rising liquidity premiums and reduce mortgage costs for borrowers. Persistent liquidity premiums could result in higher mortgage rates for borrowers if investors demand greater compensation to account for the risk of selling their MBSs in the future for a price presumed to be too low. Furthermore, the TBA market is a forward market, meaning MBSs are purchased in advance of a specific future date. Investors wanting to hedge against adverse interest rate movements prior to delivery of their MBS purchases would, therefore, pay higher costs to cover the possibility of liquidity premiums emerging before the settlement date. Investors' larger hedging costs could also be passed on to borrowers wanting to lock in interest rates for a period of time prior to closing on their mortgages. Hence, high-volume trading by the GSEs facilitated narrower bid-ask MBS spreads in both the TBA and OTC markets. (The GSEs held their own MBSs to show incentive alignment with investors, meaning the GSEs were willing to hold the same risks that they were selling.) The current $250 billion cap on the GSEs' lending portfolios (resulting from the PSPAs) may limit their ability to buy and sell MBSs at the volumes necessary to influence market pricing. Although the Federal Reserve has purchased large amounts of the GSEs' MBS while carrying out its lender-of-last-resort responsibilities, it has largely retained them in its portfolio rather than actively trading them. Hence, less active trading of MBSs by the GSEs and more holding (rather than actively trading) of MBSs by the Federal Reserve might explain any declines in market liquidity. Since conservatorship, the FHFA has focused primarily on (1) the credit risks retained by the GSEs (posing a direct risk to U.S. taxpayers) and (2) the liquidity of their MBS issuances. The FHFA has released various versions of strategic plans and performance goals to inform the public. This section highlights FHFA initiatives that focus on those specific risks. As previously mentioned, the PSPAs require the GSEs to pay dividends to the U.S. Treasury in exchange for its financial support while they are under conservatorship. The PSPAs also require the GSEs to reduce taxpayers' credit risk. The FHFA has subsequently required the GSEs to increase the private sector's role in credit risk sharing. The various programs to facilitate these objectives are discussed in this section. By statute, additional credit enhancements (discussed in the next paragraph) are required if the GSEs purchase mortgages with a loan-to-value (LTV) above 80% such that the mortgage balance exceeds 20% of the residential property value. If a borrower defaults, the GSE generally recovers losses by foreclosing (repossessing) and then liquidating (selling) the property. The 80% LTV requirement ensures that a property would need to sell for at least 80% of its original value for the GSE to recover enough proceeds to cover the remaining mortgage balance. Borrowers lacking sufficient funds to make a 20% downpayment have alternative options. One option is to purchase private mortgage insurance (PMI), an insurance policy that would assume the first 20% of losses associated with a mortgage default. In this case, the FHFA currently requires the GSEs to pay PMI initially and be reimbursed later by borrowers via interest rate adjustments on their loans. The GSEs currently contract with a limited group of private mortgage insurers that accept the GSEs' underwriting standards, thereby streamlining the process to obtain PMI. Fannie Mae calls its program Enterprise-Paid Mortgage Insurance (EPMI) Option and Freddie Mac calls its program Integrated Mortgage Insurance (IMAGIN). By doing business with a select group of PMI providers, the GSEs (and FHFA) can closely monitor their financial health and ensure their ability to pay any PMI claims after borrower defaults, thus reducing counterparty risk. The GSEs can generate revenues to cover potential credit losses by increasing g-fees, thus mitigating losses to taxpayers. The GSEs have two types of g-fees. First, the upfront g-fee is determined by the borrower's risk characteristics (e.g., credit score, loan-to-value ratio). Second, the ongoing g-fee, which is collected each month over the life of the loan, is determined by the product type (e.g., fixed rate, adjustable). In December 2011, Congress directed the FHFA to increase the ongoing g-fees for all loans by 10 basis points. The increase took effect on December 1, 2012, for loans exchanged for MBSs. (A single basis point is equal to 1/100 of a percent; 100 basis points is 1%.) The FHFA also increased g-fees in 2013. In 2017, FHFA reported that the average guarantee fee of 56 basis points was unchanged from 2016. In July 2013, the GSEs initiated new credit risk transfer (CRT) programs to share a portion of the credit risk linked to their guaranteed single-family mortgages with the private sector. Both GSEs now offer another separate set of CRT financial instruments that are linked only to the credit risk of the mortgages held in the MBS trusts. Investors preferring exposure only to mortgage prepayment risk may continue to purchase MBSs; however, the private sector may now purchase CRT issuances, which function similarly to MBSs, to earn revenue in exchange for assuming exposure to the credit risk. Fannie Mae's CRT instruments are known as Connecticut Avenue Securities (CAS); Freddie Mac's CRT instruments are known as Structural Agency Credit Risk (STACR). The GSEs transfer the credit risk linked to mortgages with LTVs greater than 60% (or borrowers with 40% or less in accumulated home equity, making them more vulnerable to the possibility of owing more than the initial value of their homes if housing market prices were to fall) to investors. After defaults occur, the GSEs write down the coupons paid to CRT investors (similar to writing down the coupons on MBSs after prepayments occur). The GSEs retain the credit risk for mortgages with lower LTVs (or borrowers with 41% or more in accumulated home equity such that their outstanding balances are significantly below the value of their residential properties), which are less likely to default. Sharing risk at both the front end (before the mortgages are purchased) via the PMI programs and the back end (after the mortgages are purchased) via the CRT programs has reduced the federal government's exposure to mortgage credit risk. The CRT programs have grown rapidly, arguably filling the gap left by the private-label mortgage-backed securities market that existed prior to 2008. Nevertheless, the Congressional Budget Office reports that the GSEs' CRT transactions have not necessarily reduced taxpayers' costs. The GSEs pay more to the private sector to assume credit risk relative to what they collect in g-fees from borrowers, and the g-fees have not been raised to cover the additional costs. Although the exact definition of capital for financial firms is determined by law and regulation, it generally refers to common or preferred equity (as a percentage of assets), which can absorb financial losses. The FHFA suspended the GSEs' capital requirements during conservatorship, as required by the PSPAs with Treasury. The GSEs can pay dividends only to the Treasury as opposed to private shareholders while they are under conservatorship. The FHFA has solicited feedback on how to establish a prospective capital framework for the GSEs (see text box below) that would allow them to continue operating after an event similar to the recent financial crisis. The statutory minimum leverage (unweighted) capital requirement, specified in the Federal Housing Enterprises Safety and Soundness Act of 1992, is equal to 2.5% of on-balance sheet (portfolio) assets and 0.45% of off-balance sheet (MBS trust) obligations. HERA, however, gave FHFA the authority to increase capital standards above the statutory minimum as necessary. Given the deteriorated financial conditions that caused the GSEs to be placed in conservatorship, FHFA's proposed capital framework would result in higher capital requirements. The FHFA has introduced initiatives to standardize many aspects of the GSEs' operations, which include their mortgage data collection processes, securitization processes, mortgage servicing policies (e.g., resolving delinquencies), and MBS issuances. Such standardization arguably increases transparency, reduces the length of the single-family mortgage origination and securitization processes, and ultimately increases the liquidity and uniform pricing of the GSEs' MBS and CRT issuances. The FHFA's mortgage data standardization initiative requires the GSEs to support standardizing the single-family mortgage data information used by the industry. Data collected on loan applications, property appraisals, loan closings, and disclosures are the focus of the standardization efforts. In 2012, FHFA determined that both technology platforms the GSEs used to securitize (the process of transferring the underlying mortgage payments into MBSs) were \"antiquated and inflexible.\" Rather than updating two separate systems, the FHFA required the GSEs to jointly develop a new platform to facilitate the various tasks associated with their securitization processes. The GSEs entered into a joint venture, the Common Securitization Solutions (CSS), which operates the Common Securitization Platform (CSP). The GSEs continue to acquire mortgages from originators; establish separate loss-mitigation practices for delinquent and defaulted mortgages for their mortgage servicers to follow; choose the underlying mortgages for placement in each MBS trust; and guarantee the credit risk linked to the MBS trusts they individually create. The CSS, however, acts as a technology service provider for the GSEs. In the TBA market, a loan originator selling mortgages to the GSEs would contract to deliver mortgages in exchange for an MBS at a specified future date. Specifically, the MBS buyer (loan originator) and MBS seller (one of the GSEs) negotiate in advance for future delivery and settlement date. The buyer and seller agree on six general features that the MBS should have: the issuer, maturity, coupon rate, sale price, approximate face value, and settlement date. The exact features of the securities to be delivered are disclosed to the participants two days prior to settlement. MBSs that meet the required criteria can be delivered as long as the underlying MBS pools are fungible , that is, sufficiently interchangeable with other MBSs. Because the MBS issuer is one of the trading features, MBSs have generally been fungible only with other MBSs issued by the same GSE. Fannie Mae-issued MBSs and Freddie Mac-issued MBSs have not previously been interchangeable, and their MBSs do not trade at identical prices despite the fact that the GSEs have essentially the same federal charters and business (securitization) models. Freddie Mac's MBSs have been frequently traded at lower prices than Fannie Mae's. Following declines in mortgage rates that prompt borrowers to refinance, the mortgage pools underlying Freddie Mac's MBSs historically have had faster prepayment rates (relative to Fannie Mae's MBSs). Faster prepayment translates into higher prepayment risk for Freddie Mac MBS investors, which would explain trading at lower prices. The persistent price difference led to an exploitable arbitrage opportunity, particularly for large originators that sell loans via swap agreements. By entering into a swap agreement with Fannie Mae, a large mortgage originator would immediately acquire a higher-priced MBS that could subsequently be sold in the OTC market. Freddie Mac could respond by lowering its g-fees, thereby slightly increasing its MBS coupons relative to Fannie Mae's MBS coupons to remain somewhat competitive. Besides the persistent pricing differential, Freddie Mac's MBS issuances were approximately 70% of Fannie Mae's MBS issuances, and Freddie Mac's MBSs accounted for only 9% of total trading activity in 2014. Hence, the pricing differential between the GSEs' MBSsâespecially while they are under conservatorshipâis arguably transformed into a taxpayer subsidy for the larger loan originators. Under the single security initiative, the FHFA has directed the GSEs to align their key contractual and business practices by acquiring mortgages with similar prepayment speeds along with other features. The GSEs may continue to separately purchase conforming mortgages and guarantee the credit risks linked to the MBS trusts they create. Nevertheless, harmonizing the financial characteristics of their mortgage purchases would allow the GSEs' MBS trusts to generate similar cash-flow predictability and prepayment speeds, thus facilitating the creation of uniform and fungible securities when issued through the CSP. The GSEs would be required to align their prepayment speeds such that they do not constitute a material misalignment, or a divergence by more than 2% over a three-month interval. Rather than separate MBS issuances (i.e., Fannie Mae's mortgage-backed security and Freddie Mac's participation certificates), the FHFA has directed the GSEs (via the CSP) to issue one common security, the uniform mortgage-backed security (UMBSs). (Private-sector guarantors would also be able to use the CSP to issue fungible UMBSs.) The FHFA argues that a combined market for the GSEs' UMBSs would enhance market liquidity and mitigate the rise of market liquidity premiums; the pricing differential would also be eliminated. FHFA will monitor both GSEs to ensure that their underwriting policies remain intact to avoid material misalignment that compromises UMBS fungibility. UMBS issuances began on June 3, 2019. Congress established the GSEs with a public policy mission that includes a variety of ways to support affordable housing. Following the Great Recession, Congress also established a macroprudential economic policy tool in the form of new mortgage market underwriting requirements to mitigate a systemic risk event. Given these broader public policy objectives, this section discusses selected challenges for the GSEs while they are under conservatorship. The GSEs have statutory single- and multi-family goals along with other requirements designed to promote affordable housing. The affordable housing goals, duty to serve goals, and cash contributions make up the three sets of requirements: 1. The GSEs must satisfy specified housing goals that require them to purchase certain percentages of mortgages for families with very low incomes (at or below 50% of area median family income) and extremely low incomes (at or below 30% of area median family income). 2. HERA created a duty to serve for underserved markets, specifically manufactured housing, rural housing, and affordable housing preservation. The FHFA requires the GSEs to develop their own duty to serve plans to encourage lenders to increase their lending in these areas. 3. HERA requires the GSEs to contribute to the Housing Trust Fund (HTF) and the Capital Magnet Fund (CMF). The HTF funds states and state-designated entities for eligible activities that primarily support affordable rental housing for extremely low- and very low-income families, including homeless families. The CMF awards competitive grants to financial institutions designated as Community Development Financial Institutions and qualified nonprofit housing organizations for which the development or management of affordable housing is one of their principal purposes. The GSEs must set aside 4.2 basis points (0.042%) of the unpaid principal balance of mortgages purchased in a year for these funds. Achieving the affordable housing mission has been difficult for the GSEs while they are under conservatorship. For one reason, FHFA suspended the requirement that the GSEs make contributions to the HTF and the CMF between 2008 and 2014. The requirement was reinstated in 2015. Another factor may be that the PSPAs caps of $250 billion on both of the GSEs' portfolios potentially limit the amount of mortgages with nonstandardized characteristics they can purchase. The GSEs retained portfolios consist primarily of (1) mortgages in the pipeline to be securitized, (2) non-performing mortgages that may receive loss-mitigation, and (3) mortgages that support affordable housing mission goals. The PSPA caps and changing mortgage market conditions may prompt the GSEs to be more deliberate when allocating their portfolios for certain purposes. Under the current standardization initiatives, some mortgage purchases made to support the GSEs' affordable mission goals might not be securitized if they lack, for example, the prepayment characteristics required to be securitized into a UMBS. Hence, the standardization initiatives would not adversely affect low- and moderate-income borrowers whose prepayment speeds can be securitized into UMBSs; however, borrowers with prepayments speeds not acceptable for UMBS securitization could pay more for mortgages if the GSEs' portfolios are being used primarily as securitization pipelines for acceptable mortgages and operating closer to their PSPA caps while the GSEs are under conservatorship. On January 10, 2013, the Consumer Financial Protection Bureau (CFPB) released a final rule implementing the ability-to-repay (ATR) requirement of the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act; P.L. 111-203 ); the rule took effect on January 10, 2014. The Dodd-Frank Act requires lenders to verify a borrower's ATR with documentation. The final rule provides multiple ways for a loan originator to comply, one of which is by originating a qualified mortgage (QM). If a loan meets certain underwriting and product-feature requirements, it receives QM status; the lender receives a presumption of ATR compliance for legal purposes. Specifically, QM loans provide safe harbor legal protection, meaning that a borrower would not be able to assert that the originator (and any subsequent secondary-market purchaser) failed to comply with any of the required underwriting criteria. Limiting the borrower's debt-to-income (DTI) ratio to 43% is one of the underwriting requirements for a loan to receive QM status. If, however, a loan's DTI exceeds 43%, it may still receive QM status if another federal agency that insures mortgage credit risk is willing to guarantee it. The QM patch allows the GSEs and other federal agencies to operate under their own QM rules for seven years (until January 10, 2021) or until the GSEs exit conservatorship, whichever is sooner. Consequently, the Federal Housing Administration, U.S. Department of Veterans Affairs, and United States Department of Agriculture did not adopt a 43% DTI requirement for the mortgages they guarantee. Instead, these agencies adopted their own QM definitions, which included the exclusion of product features they considered would impede repayment from borrowers they predominantly serveâbut they did not limit DTIs to 43%. Furthermore, the CFPB's QM rule created an exemption from the 43% DTI cap for mortgages eligible for purchase by the GSEs. Hence, loan originations either acquired by the GSEs while they are under conservatorship (or until January 10, 2021) or guaranteed by other federal agencies receive QM status. Since 2007, the private-label securitizations market has diminished whereas the roles of GSEs and federal agencies that guarantee or issue residential mortgage loans have increased in importance. One reason might be related to the legal protections linked to QM loan originations. Many originators have limited themselves to making only QM loans to avoid exposure to potential liability and litigation risks. Although they may be willing to assume customary lending risks, such as credit and prepayment, financial institutions historically have been less willing to originate mortgage loans with attached compliance or legal risks. For example, since the passage of the 1994 Home Ownership Equity Protection Act (HOEPA), mortgage originations covered by the law make up a small share of the mortgage market and are concentrated among very few lenders. HOEPA lending declined markedly after new regulations were implemented to amend the definition of a high-cost mortgage to cover more types of loans. After the passage of the Georgia Anti-Predatory Lending Act of 2002, the GSEs announced that they would no longer purchase mortgages originated in the state of Georgia to avoid the legal risk of assignee liability. Likewise, many mortgage originators have reportedly limited themselves to making QM safe harbor loans. If the QM patch expires in January 2021 as currently scheduled (or the GSEs are no longer in conservatorship), it is unclear whether the GSEs would purchase non-QM loans in the future. Because the GSEs currently purchase loans that meet the QM standards, questions that pertain to the legal liabilities of the GSEs (and holders of GSE issuances) if they were to purchase non-QM loans are largely unknown at this time. If the GSEs did limit their non-QM purchases, some borrowers could find it more difficult to access mortgage credit and others could experience an increase in the cost of obtaining a mortgage. Furthermore, the MBS and CRT financial market conditions, in terms of demand, supply, and liquidity, could exhibit greater volatility after January 2021 if the patch expires.", "summary": "Congress chartered Fannie Mae and Freddie Mac, also known collectively as the government-sponsored enterprises (GSEs), to promote homeownership for underserved groups and locations by providing liquidity to the secondary mortgage market. The GSEs specifically facilitate financing for single-family residential mortgages and multifamily (apartment and condominium) construction. After purchasing pools of single-family 30-year fixed rate mortgages, the GSEs retain the credit (default) risks from the whole mortgages and subsequently issue mortgage-backed securities (MBSs), which are bond-like securities. Investors who purchase MBSs are guaranteed a return on their initial principal and interest, but they assume prepayment risk, which is the risk that borrowers prepay their mortgages ahead of schedule. In contrast to the original mortgages (with both credit and prepayment risks attached), the MBSs are relatively more liquid, meaning they can be exchanged for cash more quickly with little change in their quoted prices. If institutional investors from around the globe are willing to hold liquid MBSs, then additional funds are channeled to the nation's mortgage market (particularly to support 30-year fixed rate mortgages). National mortgage rates tend to fall as the supply of funds in this market increases, making homeownership more affordable. The Federal Housing Finance Agency (FHFA), an independent federal government agency created by the Housing Economic and Recovery Act of 2008 (HERA; P.L. 110-289 ), is the GSE's primary supervisor. FHFA regulates the GSEs for prudential safety and soundness and to ensure that they meet their affordable housing mission goals. In September 2008, the GSEs experienced losses that exceeded their statutory minimum capital requirement levels as a result of above-normal mortgage defaults. The GSEs also experienced losses following spikes in short-term borrowing rates that occurred while they were funding long-term assets held in their portfolios. The GSEs subsequently were placed under conservatorship, and the FHFA currently has the powers of management, boards, and shareholders until the GSEs' financial safety and soundness can be restored. In addition, the U.S. Treasury is providing financial support through the Senior Preferred Stock Purchase Agreements (PSPAs) program, which requires the GSEs to pay dividends to Treasury rather than private shareholders while they are under conservatorship. Congressional interest in the GSEs has continued since conservatorship. First, the final costs to the U.S. Treasury (and, by proxy, to U.S. taxpayers) of providing financial support to the GSEs are unknown. Furthermore, the GSEs' future viability could affect the availability of single-family 30-year fixed rate mortgage loan products. Although these mortgage products are arguably popular with borrowers, private lenders may be reluctant to retain in portfolio and fund relatively less liquid mortgagesâwith both credit and prepayment risks attachedâfor several decades. Congressional interest has been reflected by various draft proposals, bills, and oversight hearings on housing finance reform. During the 116 th Congress, the Senate Committee on Banking, Housing, and Urban Affairs released a proposal that would likely affect the GSEs' role in the housing finance system. President Donald J. Trump also released a memorandum directing federal agencies to develop a plan to reform the housing finance system, which includes ending the conservatorships. The FHFA's initiatives have focused primarily on managing the GSEs' liquidity, operational, and credit risks. The FHFA has directed the GSEs to standardize numerous processes to foster greater liquidity in the market for their MBSs. The standardization initiatives may also reduce operational risks, particularly risks associated with data breaches and other technology disruptions. The GSEs are also being required to share more of the credit risk linked to their single-family mortgage purchases with the private sector. The GSEs still face future challenges. For example, recent FHFA initiatives require the GSEs to harmonize their business models, including certain borrower risk characteristics that are eligible for securitization. The GSEs' ability to satisfy their affordable housing goals, therefore, might depend upon the extent to which borrowers with risk characteristics deemed eligible for securitization overlap with those who traditionally face greater difficulty accessing credit. In addition, the GSEs' securitization activities may depend upon certain legal protections that loan originators receive when their mortgages are sold to the GSEs. These protections are granted under what is referred to as the GSE patch, which expires on January 10, 2021. It is unclear how the secondary-market participantsâthe loan originators, the GSEs, and investors in the MBSs issued by the GSEsâwill respond if the GSE patch expires.", "document_type": "crs"}
{"report": "T his report describes selected health care-related provisions that are scheduled to expire during the first session of the 116 th Congress (i.e., during calendar year [CY] 2019). For purposes of this report, expiring provisions are defined as portions of law that are time-limited and will lapse once a statutory deadline is reached, absent further legislative action. The expiring provisions included in this report are those related to Medicare, Medicaid, State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. The report also includes health care-related provisions that were enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or last extended under the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). In addition, this report describes health care-related provisions within the same scope that expired during the 115 th Congress (i.e., during CY2017 or CY2018). Although the Congressional Research Service (CRS) has attempted to be comprehensive, it cannot guarantee that every relevant provision is included here. This report generally focuses on two types of health care-related provisions within the scope discussed above. The first type of provision provides or controls mandatory spending, meaning that it provides temporary funding, temporary increases or decreases in funding (e.g., Medicare provider bonus payments), or temporary special protections that may result in changes in funding levels (e.g., Medicare funding provisions that establish a floor). Mandatory spending is controlled by authorization acts; discretionary spending is controlled by appropriations acts. The second type of provision defines the authority of government agencies or other entities to act, usually by authorizing a policy, project, or activity. Such provisions also may temporarily delay the implementation of a regulation, requirement, or deadline, or establish a moratorium on a particular activity. Expiring health care provisions that are predominantly associated with discretionary spending activitiesâsuch as discretionary authorizations of appropriations and authorities for discretionary user feesâare excluded from this report. Certain types of provisions with expiration dates that otherwise would meet the criteria set forth above are excluded from this report. Some of these provisions are excluded because they are transitional or routine in nature or have been superseded by congressional action that otherwise modifies the intent of the expiring provision. For example, statutorily required Medicare payment rate reductions and payment rate re-basings that are implemented over a specified time period are not considered to require legislative attention and are excluded. The report is organized as follows: Table 1 lists the relevant provisions that are scheduled to expire in 2019. Table 2 lists the relevant provisions that expired during 2018 or 2017. The provisions in each table are organized by expiration date and applicable health care-related program. The report then describes each listed provision, including a legislative history. The summaries are grouped by provisions that are scheduled to expire in 2019 followed by those that expired in 2018 or 2017. Appendix A lists demonstration projects and pilot programs that are scheduled to expire in 2019 or that expired in 2018 or 2017 and are related to Medicare, Medicaid, CHIP, and private health insurance programs and activities or other health care-related provisions that were enacted in the ACA or last extended under the BBA 2018. Appendix B lists all laws that created, modified, or extended the health care-related expiring provisions described in this report. Appendix C lists abbreviations used in the report. The Family-to-Family Health Information Centers program funds family-staffed and family-run centers in the 50 states, the District of Columbia, the territories, and through a tribal organization. The Family-to-Family Health Information Centers provide information, education, technical assistance, and peer support to families of children (including youth) with special health care needs and health professionals who serve such families. They also assist in ensuring that families and health professionals are partners in decision-making at all levels of care and service delivery. This program is administered by the Health Resources and Services Administration (HRSA). The Deficit Reduction Act of 2005 (DRA; P.L. 109-171 ), Section 6064, established the Family-to-Family Health Information Centers program in the 50 states and the District of Columbia and provided $3 million for FY2007, $4 million for FY2008, and $5 million for FY2009. ACA , Section 5507, provided $5 million for each of FY2009 through FY2012. The A merican Taxpayer Relief Act of 2012 (ATRA; P.L. 112-240 ), Section 624, provided $5 million for FY2013. The Pathway for SGR (Sustainable Growth Rate) Reform Act of 2013 (PSRA; P.L. 113-67 , Division B), Section 1203, provided $2.5 million for October 1, 2013, through March 31, 2014. The Protecting Access to Medicare Act of 2014 (PAMA; P.L. 113-93 ), Section 207, provided $2.5 million for the remainder of FY2014 (from April 1, 2014, to September 30, 2014) and provided $2.5 million for the first half of FY2015 (October 1, 2014, through March 31, 2015). The Medicare Access and CHIP Reauthorization Act of 2015 (MACRA; P.L. 114-10 ), S ection 216 , struck the partial funding provided in PAMA and provided full-year funding of $5 million for FY2015. It also provided $5 million for each of FY2016 and FY2017. BBA 2018 , Section 50501 , expanded the program to require that centers be developed in all of the territories and for at least one Indian tribe. It also provided $6 million for each of FY2018 and FY2019. Appropriated funds to create or maintain Family-to-Family Health Information Centers have been enacted for FY2019, but under current law no new funding will be available for FY2020 or subsequent fiscal years. The Title V Sexual Risk Avoidance Education (SRAE) program, formerly known as the Abstinence Education Grants program, provides funding for education to adolescents aged 10 to 20 exclusively on abstaining from sexual activity outside of marriage. Funding is provided primarily via formula grants. The 50 states, District of Columbia, and the territories are eligible to apply for funds. Jurisdictions request Title V SRAE funds as part of their request for Maternal and Child Health Block Grant funds authorized in SSA Section 501. Funds are allocated to jurisdictions based on their relative shares of low-income children. Funding is also available for eligible entities (not defined in statute) in jurisdictions that do not apply for funding. The Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA; P.L. 104-193 ), Section 912 , established the Abstinence Education Grants program and provided $50 million for each of FY1998 through FY2002. The Welfare Reform Extension Act of 2003 (WREA 2003; P.L. 108-40 ), Section 6, provided $50 million for FY2003. P.L. 108-89 , Section 101 , provided funding through March 31, 2014 in the manner authorized for FY2002 (i.e., $50 million, but proportionally provided for the first two quarters of FY2004). The Welfare Reform Extension Act of 2004 (WREA 2004, P.L. 108-210 ), Section 2 , provided funding through June 30, 2004 in the manner authorized for FY2002. P.L. 108-262 , Section 2 , provided funding through September 30, 2004 in the manner authorized for FY2002. P.L. 108-308 , Section 2 , provided funding through March 31, 2005 in the manner authorized for FY2004. The Welfare Reform Extension Act of 2005 (WREA 2005, P.L. 109-4 ), Section 2, provided funding through June 30, 2005 in the manner authorized for FY2004. P.L. 109-19 , Section 2 , provided funding through September 30, 2005 in the manner authorized for FY2004. P.L. 109-91 , Section 102 , provided funding through December 31, 2005 in the manner authorized for FY2005. The Tax Relief and Health Care Act of 2006 (TRHCA; P.L. 109-432 ), Section 401 , provided funding through June 30, 2007 in the manner authorized for FY2006. P.L. 110-48 , Section 1 , provided funding through September 30, 2007 in the manner authorized for FY2006. P.L. 110-90 , Section 2 , provided funding through December 31, 2007 in the manner authorized for FY2007. The Medicare, Medicaid, and SCHIP Extension Act of 2007 (MMSEA; P.L. 110-173 ), S ection 202 , provided funding through June 30, 2008 in the manner authorized for FY2007. The Medicare Improvements for Patients and Providers Act of 2008 (MIPPA, P.L. 110-275 ), Section 201 , provided funding through June 30, 2009 in the manner authorized for FY2007. ACA, Section 2954, provided $50 million for each of FY2010 through FY2014. PAMA, Section 205 , provided $50 million for FY2015. MACRA, Section 214 , provided $75 million for each of FY2016 and FY2017. BBA 2018, Section 50502 , renamed the program and provided $75 million for each of FY2018 and FY2019. Appropriated funds for the Title V SRAE program have been enacted for FY2019, but under current law no new funding will be available for FY2020 or subsequent fiscal years. The Personal Responsibility Education Program (PREP) takes a broad approach to teen pregnancy prevention that targets adolescents aged 10 to 20 and pregnant and parenting youth under the age of 21. Education services can address abstinence and/or contraceptives to prevent pregnancy and sexually transmitted infections. PREP includes four types of grants: (1) State PREP grants, (2) Competitive PREP grants, (3) Tribal PREP, and (4) PREPâInnovative Strategies (PREIS). A majority of PREP funding is allocated to states and territories via the State PREP grant. The 50 states, District of Columbia, and the territories are eligible for funding. Funds are allocated by formula based on the proportion of youth aged 10 to 20 in each jurisdiction relative to other jurisdictions. ACA, Section 2953 , established PREP and provided $75 million annually from FY2010 through FY2014. PAMA, Section 206 , provided $75 million for FY2015. MACRA, Section 215 , provided $75 million for each of FY2016 and FY2017. BBA 2018, Section 50503 , provided $75 million for each of FY2018 and FY2019. Appropriated funds for PREP have been enacted for FY2019, but under current law no new funding will be available for FY2020 or subsequent fiscal years. Medicare pays LTCHs for certain inpatient hospital care under the LTCH prospective payment system (LTCH PPS), which is typically higher than payments for inpatient hospital care under the inpatient prospective payment system (IPPS). PSRA amended the law so that the LTCH PPS payment is no longer available for all LTCH discharges but instead is available only for those LTCH discharges that met specific clinical criteria. Specifically, LTCHs are paid under the LTCH PPS if a Medicare beneficiary either (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. Discharges involving patients who have a principal diagnosis relating to a psychiatric diagnosis or rehabilitation do not qualify for the LTCH PPS rate. (Subsequent legislation provided for other criteria to temporarily receive payment under the LTCH PPS. See sections \" Temporary Exception for Certain Spinal Cord Conditions from Application of the Medicare LTCH Site Neutral Payment for Certain LTCHs (SSAÂ Â§1886(m)(6)(F); 42Â U.S.C.Â Â§1395ww(m)(6)(F)) \" and \" Temporary Exception for Certain Severe Wound Discharges from Application of the Medicare Site Neutral Payment for Certain Long Term Care Hospitals (SSAÂ Â§1886(m)(6)(E) and (G); 42Â U.S.C.Â Â§1395ww(m)(6)(E) and (G)) \" below.) For LTCH discharges that did not qualify for the LTCH PPS based on these clinical criteria, a \"site neutral payment rate\" similar to the PPS for inpatient acute care hospitals (IPPS) was to be phased-in. The site neutral rate is defined as the lower of an \"IPPS-comparable\" per diem amount, as defined in regulations, or the estimated cost of the services involved. PSRA, Section 1206(a), established patient criteria for payment under the LTCH PPS and a site-neutral payment rate for LTCH patients who do not meet these criteria. During a phase-in period for discharges in cost-reporting periods beginning in FY2016 and FY2017, LTCHs received a blended payment amount based on 50% of what the LTCH would have been reimbursed under the LTCH PPS rate and 50% of the site neutral payment rate. For cost-reporting periods beginning in FY2018 and subsequent years, the LTCH was to receive the site neutral payment rate. BBA 2018, Section 51005 , extended the transition period to site neutral Medicare payments for LTCH patients who do not meet the patient criteria for an additional two years, to include discharges in cost-reporting periods beginning during FY2018 and FY2019. During this period, LTCHs continue to receive the 50/50 blended payment for discharges that do not meet certain LTCH PPS criteria. The extended transition period to site neutral payments during which LTCHs receive a blended payment for discharges that do not meet the patient criteria expires for discharges occurring in cost-reporting periods beginning during FY2020 and subsequent years. Medicare pays LTCHs for inpatient hospital care under the LTCH PPS, which is typically higher than payments for inpatient hospital care under the IPPS. Effective for cost-reporting periods beginning in FY2016, LTCHS are paid the LTCH PPS rate for patients that meet one of the following two criteria: (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. Discharges involving patients who have a principal diagnosis relating to a psychiatric diagnosis or rehabilitation do not qualify for the LTCH PPS rate. For LTCH discharges that did not qualify for the LTCH PPS based on these criteria, a site neutral payment rate is being phased-in for cost-reporting periods beginning FY2016 through FY2019. Subsequent legislation provided for other criteria to temporarily receive payment under the LTCH PPS. See section \" Temporary Extension of Long-Term Care Hospital (LTCH) Site Neutral Payment Policy Transition Period (SSAÂ Â§1886(m)(6)(B)(i); 42Â U.S.C.Â Â§1395ww(m)(6)(B)(i)) \" for details related to site neutral payment. The 21 st Century Cures Act ( Cures Act ; P.L. 114-255 ) , Division C, Section 15009 established an additional temporary criterion for payment under the LTCH PPS related to certain spinal cord conditions for discharges occurring in cost-reporting periods FY2018 and FY2019. Specifically, the LTCH PPS rate would apply to an LTCH discharge if all of the following are met: (1) the LTCH was a not-for-profit on June 1, 2014; (2) at least 50% of the LTCH's CY2013 LTCH PPS-paid discharges were classified under LTCH diagnosis related groups (DRGs) associated with catastrophic spinal cord injuries, acquired brain injury, or other paralyzing neuromuscular conditions; and (3) the LTCH during FY2014 discharged patients (including Medicare beneficiaries and others) who had been admitted from at least 20 of the 50 states, as determined by the Secretary of Health and Human Services (HHS) based on a patient's state of residency. The authority for the temporary criterion related to certain spinal cord conditions to receive payment under the LTCH PPS expires for discharges occurring in cost reporting periods beginning during FY2020 and subsequent years. Section 101 of MACRA made fundamental changes to the way Medicare payments to physicians are determined and how they are updated. To implement the payment modifications in Section 101 of MACRA, the law authorized the transfer of $80 million from the Supplementary Medical Insurance (SMI) Trust Fund for each fiscal year beginning with FY2015 and ending with FY2019. The amounts transferred are to be available until expended. MACRA , Section 101 , provided for the transfer of $80 million, for each of FY2015 through FY2019, from the Medicare SMI Trust Fund. Appropriated funds to support the activities under this subsection have not been enacted for FY2020 or subsequent fiscal years. SSA Section 1848(s) required the HHS Secretary to develop a plan for the development of quality measures for use in the Merit-based Incentive Payment System program, which is to be updated as needed. The subsection also requires the Secretary to enter into contracts or other arrangements to develop, improve, update, or expand quality measures, in accordance with the plan. In entering into contracts, the Secretary must give priority to developing measures of outcomes, patient experience of care, and care coordination, among other things. The HHS Secretary, through the Center for Medicare & Medicaid Services (CMS), annually reports on the progress made in developing quality measures under this subsection. MACRA, Section 102 , provided for the transfer of $15 million, for each of FY2015 through FY2019, from the Medicare SMI Trust Fund. Appropriated funds to support the activities under this subsection have not been enacted for FY2020 or subsequent fiscal years. However, funds appropriated prior to FY2020 are available for obligation through the end of FY2022. Under SSA Section 1890, the HHS Secretary is required to have a contract with a consensus-based entity (e.g., National Quality Forum, or NQF) to carry out specified duties related to performance improvement and measurement. These duties include, among others, priority setting, measure endorsement, measure maintenance, and annual reporting to Congress. MIPPA, Section 183 , transferred, from the Medicare hospital insurance (HI) and SMI Trust Funds, a total of $10 million for each of FY2009 through FY2012 to carry out the activities under SSA Section 1890. ATRA, Section 609(a) , provides $10 million for FY2013 and modified the duties of the consensus-based entity. PSRA, Section 1109 , required that transferred funding remain available until expended. PAMA, Section 109 , transferred $5 million for the remainder of FY2014 (from April 1, 2014, to September 30, 2014) and $15 million for the first six months of FY2015 (from October 1, 2014, to March 31, 2015) to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d); funds were required to remain available until expended. MACRA, Section 207 , transferred $30 million for each of FY2015 through FY2017 to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d). The funding provided under MACRA for FY2015 effectively replaced the funding provided under PAMA for that year; therefore, the total funding for FY2015 was $30 million. Funds were required to remain available until expended. BBA 2018, Section 50206 , transferred $7.5 million from the Medicare HI and SMI Trust Funds for each of FY2018 and FY2019 to carry out both Section 1890 and SSA Section 1890A(a)-(d). The section also added new HHS reporting requirements and modified existing NQF reporting requirements to specify use of funding, among other things. Amounts transferred for each of FY2018 and FY2019 are in addition to any unobligated balances that remained from prior years' transfers. Appropriated funds to support the contract with the consensus-based entity from SSA Section 1890 have not been enacted for FY2020 or subsequent fiscal years. However, funds appropriated prior to FY2020 are available for obligation until expended. SSA Section 1890A requires the HHS Secretary to establish a pre-rulemaking process to select quality measures for use in the Medicare program. As part of this process, the Secretary makes available to the public measures under consideration for use in Medicare quality programs and broadly disseminates the quality measures that are selected to be used, while the consensus-based entity with a contract (NQF) gathers multi-stakeholder input and annually transmits that input to the Secretary. NQF fulfills this requirement through its Measure Applications Partnership (MAP), an entity that convenes multi-stakeholder groups to provide input into the selection of quality measures for use in Medicare and other federal programs. MAP publishes annual reports with recommendations for selection of quality measures in February of each year, with the first report published in February 2012. ACA, Section 3014(c) , transferred a total of $20 million from the Medicare HI and SMI Trust Funds for each of FY2010 through FY2014 to carry out SSA Section 1890A(a)-(d) (and the amendments made to SSA Section 1890(b) by ACA Section 3014(a)). PAMA, Section 109 , transferred $5 million for the remainder of FY2014 (from April 1, 2014, to September 30, 2014) and $15 million for the first six months of FY2015 (from October 1, 2014, to March 31, 2015) to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d); funds were required to remain available until expended. MACRA, Section 207 , transferred $30 million for each of FY2015 through FY2017 to carry out both SSA Section 1890 and SSA Section 1890A(a)-(d). The funding provided under MACRA for FY2015 replaced the funding provided under PAMA for that year; therefore, the total funding for FY2015 was $30 million. BBA 2018, Section 50206 , transferred $7.5 million for each of FY2018 and FY2019 to carry out both Section 1890 and SSA Section 1890A(a)-(d). The section also added new HHS reporting requirements and modified existing NQF reporting requirements to specify use of funding, among other things. Amounts transferred for each of FY2018 and FY2019 are in addition to any unobligated balances that remained from prior years' transfers. Appropriated funds to carry out the measure selection activities from SSA Section 1890A(a)-(d) have not been enacted for FY2020 or subsequent fiscal years. However, funds appropriated prior to FY2020 are available for obligation until expended. Payments under the Medicare physician fee schedule (MPFS) are adjusted geographically for three factors to reflect differences in the cost of resources needed to produce physician services: physician work, practice expense, and medical malpractice insurance. The geographic adjustments are indicesâknown as Geographic Practice Cost Indices (GPCIs)âthat reflect how each area compares to the national average in a \"market basket\" of goods. A value of 1.00 represents the average across all areas. These indices are used in the calculation of the payment rate under the MPFS. Several laws have established a minimum value of 1.00 (floor) for the physician work GPCI for localities where the work GPCI was less than 1.00. Medicare Prescription Drug, Improvement, and Modernization Act of 2003 ( M MA , P.L. 108-173 ), Section 412, provided for an increase in the work geographic index to 1.0 (floor) for any locality for which the work geographic index was less than 1.0 for services furnished from January 1, 2004, through December 31, 2006. TRHCA , Section 102 , extended the floor through December 31, 2007. MMSEA , Section 103, extended the floor through June 30, 2008. MIPPA , Section 134, extended the floor through December 31, 2009. In addition, beginning January 1, 2009, MIPAA set the work geographic index for Alaska to 1.5 if the index otherwise would be less than 1.5; no expiration was set for this modification. ACA , Section 3102, extended the floor through December 31, 2010. Medicare and Medicaid Extenders Act of 2010 ( MMEA , P.L. 111-309 ) , Section 103, extended the floor through December 31, 2011. Temporary Payroll Tax Cut Continuation Act of 2011 ( TPTCCA , P.L. 112-78 ) , Section 303, extended the floor through February 29, 2012. Middle Class Tax Relief and Job Creation Act of 2012 (MCTRJCA, P.L. 112-96 ) , Section 3004, extended the floor through December 31, 2012, and required the Medicare Payment Advisory Commission ( MedPAC) to report on whether any work geographic adjustment to the MPFS is appropriate, what that level of adjustment should be (if appropriate), and where the adjustment should be applied. The report also was required to assess the impact of such an adjustment, including how it would affect access to care. ATRA , Section 602, extended the floor through December 31, 2013. PAMA , Section 102, extended the floor through March 31, 2015. MACRA , Section 201, extended the floor through December 31, 2017. BBA 2018 , Section 50201, extended the floor through December 31, 2019. The authority for the MPFS GPCI floor will expire after December 31, 2019. Currently, Medicare payments for services of physicians and certain non-physician practitioners, including radiation therapy services, are made on the basis of a fee schedule. To set payment rates under the MPFS, relative values units (RVUs) are assigned to each of more than 7,000 service codes that reflect physician work (i.e., the time, skill, and intensity it takes to provide the service), practice expenses, and malpractice costs. The relative value for a service compares the relative work and other inputs involved in performing one service with the inputs involved in providing other physicians' services. The relative values are adjusted for geographic variation in input costs. The adjusted relative values are then converted into a dollar payment amount by a conversion factor. CMS, which is responsible for maintaining and updating the fee schedule, continually modifies and refines the methodology for estimating RVUs. CMS is required to review the RVUs no less than every five years; the ACA added the requirement that the HHS Secretary periodically identify physician services as being potentially misvalued, and make appropriate adjustments to the relative values of such services under the Medicare physician fee schedule. In determining adjustments to RVUs used as the basis for calculating Medicare physician reimbursement under the fee schedule, the HHS Secretary has authority, under previously existing law and as augmented by the ACA, to adjust the number of RVUs for any service code to take into account changes in medical practice, coding changes, new data on relative value components, or the addition of new procedures. Under the potentially misvalued codes authority, certain radiation therapy codes were identified as being potentially misvalued in 2015. However, because of concerns that the existing code set did not accurately reflect the radiation therapy treatments identified, CMS created several new codes during the transition toward an episodic alternative payment model. Patient Access and Medicare Protection Act (PAMPA ; P.L. 114-115 ) required CMS to apply the same code definitions, work RVUs, and direct inputs for the practice expense RVUs in CY2017 and CY2018 as applied in 2016 for these transition codes, effectively keeping the payments for these services unchanged, subject to the annual update factor. PAMPA exempted these radiation therapy and related imaging services from being considered as potentially misvalued services under CMS's misvalued codes initiative for CY2017 and CY2018. PAMPA also instructed the HHS Secretary to report to Congress on the development of an episodic alternative payment model under the Medicare program for radiation therapy services furnished in non-facility settings. BBA 2018 Section 51009, extended the restrictions through CY2019. The payment restrictions expire after December 31, 2019. The Administration for Community Living (ACL) administers federal grant programs that fund outreach and assistance to older adults, individuals with disabilities, and their caregivers in accessing various health and social services. Funding for these programs is provided through discretionary budget authority in annual appropriations to the following entities: State Health Insurance Assistance Programs (SHIPs): programs that provide outreach, counseling, and information assistance to Medicare beneficiaries and their families and caregivers on Medicare and other health insurance issues. Area Agencies on Aging (AAA): state-designated public or private nonprofit agencies that address the needs and concerns of older adults at the regional or local levels. AAAs plan, develop, coordinate, and deliver a wide range of home and community-based services. Most AAAs are direct providers of information and referral assistance programs. Aging and Disability Resource Centers (ADRCs): programs in local communities that assist older adults, individuals with disabilities, and caregivers in accessing the full range of long-term services and supports options, including available public programs and private payment options. The National Center for Benefits and Outreach Enrollment assists organizations to enroll older adults and individuals with disabilities into benefit programs that they may be eligible for, such as Medicare, Medicaid, the Supplemental Security Income (SSI) program, and the Supplemental Nutrition Assistance Program (SNAP), among others. In addition to discretionary funding for these programs, beginning in FY2009, MIPPA provided funding for specific outreach and assistance activities to Medicare beneficiaries. This mandatory funding was extended multiple times, most recently in BBA 2018 through FY2019, and provided for outreach and assistance to low-income Medicare beneficiaries including those who may be eligible for the Low-Income Subsidy program, Medicare Savings Program (MSP), and the Medicare Part D Prescription Drug Program. The HHS Secretary is required to transfer specified amounts for MIPPA program activities from the Medicare Trust Funds. BBA 2018 also requires ACL to electronically post on its website by April 1, 2019, and biennially thereafter, the following information with respect to SHIP state grants: (1) the amount of federal funding provided to each state and the amount of federal funding provided by each state to each entity and (2) other program information, as specified by the HHS Secretary. Publicly reported information must be presented by state as well as by entity receiving funds from the state. MIPPA , Section 119, authorized and provided a total of $25 million for FY2009 to fund low-income Medicare beneficiary outreach and education activities through SHIPs, AAAs, ADRCs, and coordination efforts to inform older Americans about benefits available under federal and state programs. ACA , Section 3306, extended authority for these programs and provided a total of $45 million for FY2010 through FY2012 in the following amounts: SHIPs, $15 million; AAAs, $15 million; ADRCs, $10 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. ATRA , Section 610, extended authority for these programs through FY2013 and provided a total of $25 million in the following amounts: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. PSRA , Section 1110, extended authority for these programs through the second quarter of FY2014 and provided funds at FY2013 levels ($25 million) for the first two quarters of FY2014 (through March 31, 2014). PAMA , Section 110, extended authority for these programs through the second quarter of FY2015 (through March 31, 2015). For FY2014, PAMA provided a total of $25 million at the following FY2013 funding levels: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5.0 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5.0 million. In addition, PAMA provided funds at FY2014 levels for the first two quarters of FY2015 (through March 31, 2015). MACRA , Section 208, extended authority for these programs through September 30, 2017. For FY2015, MACRA provided funding at the previous year's level of $25 million in the following amounts: SHIPs, $7.5 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $5 million. For FY2016 and FY2017, MACRA provided $37.5 million annually, a $12.5 million per year increase from FY2015 funding levels, in the following amounts: SHIPs, $13 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $12 million. BBA 2018, Section 50207, extended authority for these programs through September 30, 2019. For FY2018 and FY2019, BBA 2018 provides funding at the FY2017 funding level of $37.5 million annually in the following amounts: SHIPs, $13 million; AAAs, $7.5 million; ADRCs, $5 million; and the contract with the National Center for Benefits and Outreach Enrollment, $12 million. Funding authorized under BBA 2018 for low-income outreach and assistance programs will expire after September 30, 2019. However, funds appropriated will be available for obligation until expended. SSA Section 1181 establishes the Patient-Centered Outcomes Research Institute (PCORI), which is responsible for coordinating and supporting comparative clinical effectiveness research. PCORI has entered into contracts with federal agencies, as well as with academic and private sector research entities for both the management of funding and conduct of research. PHSA Section 937 requires the Agency for Healthcare Research and Quality (AHRQ) to broadly disseminate research findings that are published by PCORI and other government-funded comparative effectiveness research entities. IRC Section 9511 establishes the \"Patient-Centered Outcomes Research Trust Fund\" (PCORTF) to support the activities of PCORI and to fund activities under PHSA Section 937. It provides annual funding to the PCORTF over the period FY2010-FY2019 from the following three sources: (1) annual appropriations, (2) fees on health insurance and self-insured plans, and (3) transfers from the Medicare HI and SMI Trust Funds. SSA Section 1183 provides for the transfer of the required funds from the Medicare Trust Funds. Transfers to PCORTF from the Medicare HI and SMI Trust Funds are calculated based on the number of individuals entitled to benefits under Medicare Part A or enrolled in Medicare Part B. IRC Sections 4375-4377 impose the referenced fees on applicable health insurance policies and self-insured health plans and describe the method for their calculation. For each of FY2011 through FY2019, IRC Section 9511 requires 80% of the PCORTF funds to be made available to PCORI, and the remaining 20% of funds to be transferred to the HHS Secretary for carrying out PHSA Section 937. Of the total amount transferred to HHS, 80% is to be distributed to AHRQ, with the remainder going to the Office of the Secretary (OS)/HHS. ACA, Section 6301(e), provided the following amounts to the PCORTF: (1) $10 million for FY2010, (2) $50 million for FY2011, and (3) $150 million for each of FY2012 through FY2019. In addition, for each of FY2013 through FY2019, the section provided an amount equivalent to the net revenues from a new fee that the law imposed on health insurance policies and self-insured plans. For policy/plan years ending during FY2013, the fee equals $1 multiplied by the average number of covered lives. For policy/plan years ending during each subsequent fiscal year through FY2019, the fee equals $2 multiplied by the average number of covered lives. Finally, the section (in addition to ACA Section 6301(d)) provided for transfers to PCORTF from the Medicare Part A and Part B trust funds; these are generally calculated by multiplying the average number of individuals entitled to benefits under Medicare Part A, or enrolled in Medicare Part B, by $1 (for FY2013) or by $2 (for each of FY2014 through FY2019). Appropriated funds to PCORTF have not been enacted for FY2020 or subsequent fiscal years. Funds transferred to the HHS Secretary under IRC Section 9511 remain available until expended. No amounts shall be available for expenditure from the PCORTF after September 30, 2019, and any amounts in the Trust Fund after such date shall be transferred to the general fund of the Treasury. When determining financial eligibility for Medicaid-covered long-term services and supports (LTSS), there are specific rules under SSA Section 1924 for the treatment of a married couple's assets when one spouse needs long-term care provided in an institution, such as a nursing home. Commonly referred to as \"spousal impoverishment rules,\" these rules attempt to equitably allocate income and assets to each spouse when determining Medicaid financial eligibility and are intended to prevent the impoverishment of the non-Medicaid spouse. For example, spousal impoverishment rules require state Medicaid programs to exempt all of a non-Medicaid spouse's income in his or her name from being considered available to the Medicaid spouse. Joint income of the couple is divided in half between the spouses, and the Medicaid spouse can transfer income to bring the non-Medicaid spouse up to certain income thresholds. Assets of the couple, regardless whose name they are in, are combined and then split in half. The non-Medicaid spouse can retain assets up to an asset threshold determined by the state within certain statutory parameters. Prior to enactment of the ACA, spousal impoverishment rules applied only in situations where the Medicaid participant was receiving LTSS in an institution. States had the option to extend these protections to certain home and community-based services (HCBS) participants under a Section 1915(c) waiver program. Beginning January 1, 2014, ACA Section 2404 temporarily substituted the definition of \"institutionalized spouse\" under SSA Section 1924(h)(1) to include application of these spousal impoverishment protections to all married individuals who are eligible for HCBS authorized under certain specified authorities. Thus, beginning January 1, 2014, for a five-year time period, the ACA required states to apply the spousal impoverishment rules to all married individuals who are eligible for HCBS under these specified authorities, not just those receiving institutional care. This modified definition expired on December 31, 2018. The 116 th Congress extended the authority for these protections and included a provision regarding state flexibility in the application of income or asset disregards for married individuals receiving certain HCBS. ACA, Section 2404, required states to extend spousal impoverishment rules to certain beneficiaries receiving HCBS for a five-year period beginning on January 1, 2014. The Medicaid Extenders Act of 2019 ( P.L. 116-3 ) , Section 3 , extended this provision through March 31, 2019. The Medicaid Services Investment and Accountability Act of 2019 ( P.L. 116-16 ) , Section 2, further extends this provision through September 30, 2019. The authority for the extension of spousal impoverishment protections for certain Medicaid HCBS recipients will expire after September 30, 2019. Medicaid financing for the territories (i.e., America Samoa, Commonwealth of the Northern Mariana Islands, Guam, Puerto Rico, and the U.S. Virgin Islands) is different than the financing for the 50 states and the District of Columbia. Federal Medicaid funding to the states and the District of Columbia is open-ended, but the Medicaid programs in the territories are subject to annual federal capped funding. The federal Medicaid funding for the territories comes from a few different sources. The permanent source of federal Medicaid funding for the territories is the annual capped funding. Since July 1, 2011, Medicaid funding for the territories has been supplemented by a few additional funding sources available for a limited time provided through the ACA; the Consolidated Appropriations Act, 2017 ( P.L. 115-31 ) ; and BBA 2018. Prior to the availability of these additional Medicaid funding sources, all five territories typically exhausted their federal Medicaid funding prior to the end of the fiscal year. ACA, Section 2005, as modified by Section 10201, provided $6.3 billion in additional federal Medicaid funding to the territories available between July 1, 2011, and September 30, 2019. ACA, Section 1323, provided $1.0 billion in additional federal Medicaid funding to the territories that did not establish health insurance exchanges. This funding is available January 1, 2014, through December 31, 2019. The Consolidated Appropriations Act, 2017 Division M, Title II , provided an additional $295.9 million in federal Medicaid funding to Puerto Rico available through September 30, 2019. BBA 2018 , Division B, Subdivision 2, Title III , increased the federal Medicaid funding for Puerto Rico by $3.6 billion and the U.S. Virgin Islands by $106.9 million. This funding may be further increased by $1.2 billion for Puerto Rico and $35.6 million for U.S. Virgin Islands if certain conditions are met. This funding is available January 1, 2018, through September 30, 2019. The $6.3 billion in additional Medicaid federal funding under ACA Section 2005 as modified and the additional funding provided to Puerto Rico and the U.S. Virgin Islands under the Consolidated Appropriations Act, 2017 and the BBA 2018 expire after September 30, 2019, and the $1.0 billion in ACA Section 1323 funding expires after December 31, 2019. The Community Health Center Fund (CHCF) provided mandatory funding for federal health centers authorized in PHSA Section 330. These centers are located in medically underserved areas and provide primary care, dental care, and other health and supportive services to individuals regardless of their ability to pay. The mandatory CHCF appropriations are provided in addition to discretionary funding for the program; however, the CHCF comprised more than 70% of health center programs' appropriations in FY2019. ACA, Section 10503 , established the CHCF and provided a total of $9.5 billion to the fund annually from FY2011 through FY2015, as follows: $1 billion for FY2011, $1.2 billion for FY2012, $1.5 billion for FY2013, $2.2 billion for FY2014, and $3.6 billion for FY2015. The ACA also provided $1.5 billion for health center construction and renovation for the period FY2011 through FY2015. MACRA, Section 221 , provided $3.6 billion for each of FY2016 and FY2017 to the CHCF. An Act to amend the Homeland Security Act of 2002 to require the Secretary of Homeland Security to issue Department of Homeland Security-wide guidance and develop training programs as part of the Department of Homeland Security Blue Campaign, and for other purposes ( P.L. 115-96 ), Section 3101(a), provided $550 million for the first and second quarters of FY2018 to the CHCF. BBA 2018 , Section 50901 , made a number of changes to the health center program replaced language that had provided two quarters of funding and provided $3.8 billion to the CHCF in FY2018 and $4.0 billion in FY2019. Appropriated funds for CHCF have been enacted for FY2019, but under current law no new funding is provided for FY2020 or subsequent fiscal years. Any unused portion of grants awarded for a given fiscal year prior to October 1, 2019, remains available until expended. The Special Diabetes Program for Type I Diabetes (PHSA Section 330B) provides funding for the National Institutes of Health to award grants for research into the prevention and cure of Type I diabetes. The Special Diabetes Program for Indians (PHSA Section 330C) provides funding for the Indian Health Service (IHS) to award grants for services related to the prevention and treatment of diabetes for American Indians and Alaska Natives who receive services at IHS-funded facilities. The Balanced Budget Act of 1997 (BBA 97; P.L. 105-33 ), Sections 4921 and 4922 , established the two special diabetes programs and transferred $30 million annually from CHIP funds to each program from FY1998 through FY2002. The Medicare, Medicaid, and SCHIP Benefits Improvement and Protection Act of 2000 (BIPA 2000; P.L. 106-554 ), Section 931 , increased each program's annual appropriations to $70 million for FY2001 through FY2002 and provided $100 million for FY2003. P.L. 107-360 , Section 1 , increased each program's annual appropriations to $150 million and provided funds from FY2004 through FY2008. MMSEA, Section 302 , provided $150 million through FY2009. MIPPA, Section 303, provided $150 million through FY2011. MMEA, Section 112 , provided $150 million through FY2013. ATRA, Section 625 , provided $150 million through FY2014. PAMA, Section 204 , provided of $150 million through FY2015. MACRA, Section 213 , provided $150 million through FY2017. Disaster Tax Relief and Airport and Airway Extension Act of 2017 ( P.L. 115-63 ), Section 301(b) , provided $37.5 million for first quarter of FY2018 for the Special Diabetes Program for Indians (Note: it did not provide funding for the Special Diabetes Program for Type I Diabetes.) P.L. 115-96 , S ection 3102 , provided $37.5 million for the second quarter for the Special Diabetes Program for Indians and provided $37.5 million for the first and second quarters of FY2018 for the Special Diabetes Program for Type I Diabetes. BBA 2018, Section 50902 , replaced language that had provided funding for the first and second quarters of FY2018 to provide $150 million for each program in FY2018 and FY2019. Appropriated funds for the two special diabetes programs have been enacted for FY2019, but under current law no new funding is provided for FY2020 or subsequent fiscal years. Any unused portion of grants awarded for a given fiscal year prior to October 1, 2019, remains available until expended. The National Health Service Corps (NHSC) provides scholarships and loan repayments to certain health professionals in exchange for providing care in a health professional shortage area for a period of time that varies based on the length of the scholarship or the number of years of loan repayment received. The NHSC receives mandatory funding from the CHCF through PHSA Title III. The NHSC also received discretionary appropriations in FY2011. Between FY2012 and FY2017, the program did not receive discretionary appropriations. Beginning in FY2018 and continuing in FY2019, the program received discretionary appropriations, primarily to expand the number and type of substance abuse providers participating in the NHSC. The mandatory funding from the CHCF represents more nearly three-quarters of the program's funding in both FY2018 and FY2019. ACA, Section 10503 , funded $1.5 billion to support the NHSC annually from FY2011 through FY2015, as follows: $290 million for FY2011, $295 million for FY2012, $300 million for FY2013, $305 million for FY2014, and $310 million for FY2015. Funds are to remain available until expended. MACRA, Section 221 , funded $310 million for each of FY2016 and FY2017 for the NHSC. P.L. 115-96 , Section 3101(b) , funded $65 million for the first and second quarters of FY2018 for the NHSC. BBA 2018 , Section 50901(c) , replaced language that had provided two-quarters of funding and funded $310 million for each of FY2018 and FY2019 for the NHSC. Appropriated funds for CHCF funds have been enacted for FY2019, but under current law no new funding is provided for FY2020 or subsequent fiscal years. Any unused portion of grants awarded for a given fiscal year prior to October 1, 2019, remains available until expended. The Teaching Health Center program provides direct and indirect graduate medical education (GME) payments to support medical and dental residents training at qualified teaching health centers (i.e., outpatient health care facilities that provide care to underserved patients). ACA , Section 5508(a) , established the Teaching Health Center program and provided $230 million for direct and indirect GME payments for the period of FY2011 through FY2015. MACRA, Section 221 , provided $60 million for each of FY2016 and FY2017 for direct and indirect GME payments for teaching health centers. Disaster Tax Relief and Airport and Airway Extension Act of 2017 , Section 301(a) , provided $15 million for the first quarter of FY2018 for direct and indirect GME payments for teaching health centers. P.L. 115-96 , Section 3101(c) , struck the first quarter of funding and provided $30 million for the first and second quarters of FY2018 for direct and indirect GME payments for teaching health centers. It also limited the amount of funding that could be used for administrative purposes. BBA 2018 , Section 50901(d) , made a number of changes to the Teaching Health Center program and replaced language that had provided two-quarters of funding and provided $126.5 million for each of FY2018 and FY2019 for direct and indirect GME payments for teaching health centers. Appropriated funds for Teaching Health Center GME payments have been enacted for FY2019. Under current law no new funding is provided for FY2020 or subsequent fiscal years. The Pregnancy Assistance Fund (PAF) program seeks to improve the educational, health, and social outcomes of vulnerable individuals who are expectant or new parents and their children. PAF funding is awarded competitively to the 50 states, District of Columbia, the territories, and tribal entities that apply successfully. The grantees may use the funds for providing subgrants to community service providers and selected other entities that provide services during the prenatal and postnatal periods. Grantees may also provide, in partnership with the state attorney general's office, certain legal and other services for women who experience domestic violence, sexual assault, or stalking while they are pregnant or parenting an infant. Further, grant funds can be used to support public awareness efforts about PAF services for the expectant and parenting population. ACA, Section 10212 , established the PAF program and provided $25 million for each of FY2010 through FY2019. Appropriated funds for the PAF program funds have been enacted for FY2019, but under current law no new funding will be available for FY2020 or subsequent fiscal years. The Health Coverage Tax Credit (HCTC) subsidizes 72.5% of the cost of qualified health insurance for eligible taxpayers and their family members. Potential eligibility for the HCTC is limited to two groups of taxpayers. One group is composed of individuals eligible for Trade Adjustment Assistance (TAA) allowances because they experienced qualifying job losses. The other group consists of individuals whose defined-benefit pension plans were taken over by the Pension Benefit Guaranty Corporation because of financial difficulties. HCTC-eligible individuals are allowed to receive the tax credit only if they either cannot enroll in certain other health coverage (e.g., Medicaid) or are not eligible for other specified coverage (e.g., Medicare Part A). To claim the HCTC, eligible taxpayers must have qualified health insurance (specific categories of coverage, as specified in statute). The credit is financed through a permanent appropriation under 31 U.S.C. Â§1324(b)(2); therefore, the financing of the HCTC is not subject to the annual appropriations process. The T rade Act of 2002 ( P.L. 107-210 ), Section s 2 01-203, authorized the Health Coverage Tax Credit, specified the eligibility criteria for claiming the credit, and made conforming amendment to the U.S. Code for purposes of financing the credit. The American Recovery and Reinvestment Act of 2009 ( ARRA , P.L. 111-5 ), Part VI: TAA Health Coverage Improvement Act of 2009 expanded eligibility for and subsidy of the HCTC including retroactive amendments, and provided $80 million for FY2009 and FY2010 to implement the enacted changes to the HCTC. The Trade Adjustment Assistance Extension Act of 2011 ( P.L. 112-40 ), Section 241 , established a sunset date of before January 1, 2014. The T rade Preferences Extension Act of 2015 ( P.L. 114-27 ), Section 407 , retroactively reauthorized the HCTC and established a new sunset date of before January 1, 2020. Authorization for the HCTC is scheduled to expire after December 31, 2019. An annual fee is imposed on certain health insurance issuers. The aggregate fee is set at $8.0 billion in CY2014, $11.3 billion in CY2015 and CY2016, $13.9 billion in CY2017, and $14.3 billion in CY2018. After CY2018, the fee is indexed to the annual rate of U.S. premium growth. The fee is based on net health care premiums written by covered issuers during the year prior to the year in which payment is due. Each year, the Internal Revenue Service calculates the fee on covered issuers based on (1) their net premiums written in the previous calendar year as a share of total net premiums written by all covered issuers and (2) their dollar value of business. Covered issuers are not subject to the fee on their first $25 million of net premiums written. The fee is imposed on 50% of net premiums above $25 million and up to $50 million and on 100% of net premiums in excess of $50 million. ACA , Section 9010 , established the annual fee on certain health insurance issuers. The fee became effective for CY2014. The C onsolidated A ppropriations A ct , 20 16 ( P.L. 114-113 ), Division P, Title II, Section 201 , suspended collection of the fee for CY2017. Making further continuing appropriations for the fiscal year ending September 30, 2018, and for other purposes ( P.L. 115-120 ), Section 4003, suspended collection of the fee for CY2019. The moratorium on the collection of the fee is to end after CY2019, meaning covered entities are scheduled to be subject to the fee again beginning in CY2020. An excise tax is imposed on the sale of certain medical devices. For the purposes of the tax, a \"medical device\" is defined by the Federal Food, Drug, and Cosmetic Act (21 U.S.C. Â§321(h)) and pertains to devices \"intended for humans.\" Congress exempted eyeglasses, contact lenses, and hearing aids from the tax and any other medical device determined by the Secretary of the Treasury to be of the type that is \"generally purchased by the general public at retail for individual use.\" The tax is equal to 2.3% of the device's sales price and generally is imposed on the manufacturer or importer of the device. The Health Care and Education Reconciliation Act of 2010 (HCERA; P.L. 111-152 ), Section 1405 , created the excise tax on medical device manufacturers starting in CY2013. The C onsolidated A ppropriations A ct , 20 16 , Division Q, Title I, Subtitle C, Part 2, Section 174 , suspended imposition of the tax for CY2016 and CY2017. Making further continuing appropriations for the fiscal year ending September 30, 2018, and for other purposes ( P.L. 115-120 ), Section 4001, extended the suspension of the imposition of the tax for CY2018 and CY2019. The suspension of the tax is to end after CY2019, meaning the tax is to apply to sales of medical devices again beginning in CY2020. Medicare pays LTCHs for inpatient hospital care under the LTCH PPS, which is typically higher than payments for inpatient hospital care under the IPPS. Effective for cost-reporting periods beginning in FY2016, LTCHS are paid the LTCH PPS rate for patients that meet one of the following two criteria: (1) had a prior three-day intensive-care-unit stay at a hospital paid under the IPPS immediately preceding the LTCH stay or (2) is assigned to an LTCH PPS case-mix group that is based on the receipt of ventilator services for at least 96 hours and had a prior hospital stay at a hospital paid under the IPPS immediately preceding the LTCH stay. Discharges involving patients who have a principal diagnosis relating to a psychiatric diagnosis or rehabilitation do not qualify for the LTCH PPS rate. For LTCH discharges that did not qualify for the LTCH PPS based on these criteria, a site neutral payment rate is being phased-in for cost-reporting periods beginning FY2016 through FY2019. Subsequent legislation provided for other criteria to temporarily receive payment under the LTCH PPS. See section \" Temporary Extension of Long-Term Care Hospital (LTCH) Site Neutral Payment Policy Transition Period (SSAÂ Â§1886(m)(6)(B)(i); 42Â U.S.C.Â Â§1395ww(m)(6)(B)(i)) \" for details related to site neutral payment. The C onsolidated A ppropriations A ct , 20 16 , Division H, Title II, Section 231 , provided an additional temporary criterion for payment under the LTCH PPS for discharges before January 1, 2017. Specifically, the LTCH PPS rate would apply to an LTCH discharge if all three of the following are satisfied: (1) the LTCH is a grandfathered hospital-within-hospital; (2) the LTCH is located in a rural area; and (3) the patient discharged has a severe woundâdefined as a stage 3 or 4 wound, unstageable wound, nonhealing surgical wound, infected wound, fistula, osteomyelitis, or wound with morbid obesity. Cures Act, Division C, Section 15 0 10 , reinstated, after a lapse period and with some modifications, the temporary criterion for payment under the LTCH PPS related to certain spinal cord conditions for discharges occurring in cost-reporting period beginning during FY2018. The reinstated temporary criterion, similar to the Consolidated Appropriations Act of 2016 criterion, applies only to a grandfathered hospital-within-hospital. It eliminates the requirement from Consolidated Appropriations Act of 2016 that an LTCH be located in a rural area and narrows the definition of a severe wound that was used in Consolidated Appropriations Act of 2016. In addition, unlike the Consolidated Appropriations Act of 2016 criterion, only discharges associated with diagnosis-related groups relating to cellulitis or osteomyelitis are eligible for the reinstated temporary criterion. The temporary criterion for certain severe wound discharges for payment under the LTCH PPS expired for discharges in cost-reporting periods beginning during FY2019 and subsequent years. Congress has passed several bills to promote the widespread adoption of health information technology (HIT) and to support the electronic sharing of clinical data among hospitals, physicians, and other health care stakeholders. HIT encompasses interoperable electronic health records (EHRs)âincluding computerized systems to order tests and medications, and support systems to aid clinical decision makingâand the development of a national health information network to permit the secure exchange of electronic health information among providers. ARRA , Section 4101, which incorporated the Health Information Technology for Economic and Clinical Health Act (HITECH), authorized Medicare and Medicaid incentive payments to acute-care hospitals and physicians who attest to being meaningful users of certified EHR technology. The law instructed the HHS Secretary to make the measures of \"meaningful use\" more stringent over time, which CMS has done in stages. Beginning in CY2015, hospitals and physicians that were or are not meaningful EHR users are subject to a Medicare payment adjustment (i.e., penalty) unless they qualify for a hardship exception. Cures Act, Section 16003, exempted physicians who furnish \"substantially all\" of their services to patients in ambulatory surgery centers from a meaningful use payment penalty in CY2017 and CY2018 because physicians who provide services to beneficiaries in ASCs faced additional difficulties in meeting some of the meaningful use criteria. The exemption as specified in the Cures Act expired December 31, 2018. Current law states that this exemption is to sunset \"as of the first year that begins more than 3 years after the date on which the Secretary determines, through notice and comment rulemaking, that certified EHR technology applicable to the ambulatory surgical center setting is available.\" This has yet to occur. Under Medicare Advantage (Medicare Part C, or MA) CMS pays private health plans a per-enrollee amount to provide all Medicare-covered benefits (except hospice) to beneficiaries who enroll in their plan. SSA Section 1853(o)(4) requires the HHS Secretary to use a five-star quality rating system to adjust maximum possible payments to high-performing MA plans. High star quality also results in an increase in an MA organization's rebate if its contract bid is less than the maximum amount that Medicare will pay. In addition, the five-star quality ratings are publicly reported and can be used by beneficiaries when considering which MA, Part D, or Medicare Advantage-Prescription Drug (MA-PD) plan to enroll in. The Social Security Act authorizes the HHS Secretary to terminate a contract with an MA organization or a Perscription Drug Plan (PDP) if the HHS Secretary determines that the MA organization or PDP has failed substantially to carry out the contract, is carrying out the contract in a manner inconsistent with the efficient and effective administration of the Medicare program, or no longer meets the applicable Medicare program conditions. CMS amended its regulations in 2012 to include a ground for contract termination relating to an MA organization's or a PDP's rating under the five-star system. Specifically, under the regulation, CMS may terminate a contract with an MA organization or a PDP if the plan receives a \"summary plan rating of less than 3 stars for 3 consecutive contract years.\" The regulation applies to plan ratings issued by CMS after September 1, 2012. CMS has terminated some MA organizations' contracts on this basis. Cures Act, Division C, Section 17001: through the end of plan year 2018, the HHS Secretary is prohibited from terminating an MA organization's contract (or Part D contract) solely because the contract failed to achieve a minimum quality rating under the five-star rating system. The HHS Secretary has the authority to terminate an organization's MA or Part D contract based solely on the organization's receipt of a Part C or Part D summary rating of less than three stars for three consecutive contract years. The Secretary issued a memorandum to MA plans indicating that the first star rating released after December 2018 is the first that could count toward termination. Star ratings are released in the fall of one year, displayed for beneficiary use the next year, and then used for payment purposes the following year. As such, the CY2020 rates (released fall CY2019 and used for payment purposes in CY2021) are the first that could apply toward potential termination. The soonest possible effective date for a CMS termination of an MA contract under this policy would be December 31, 2022. LTCHs generally treat patients who have been discharged from acute-care hospitals but require prolonged inpatient hospital care due to their medical conditions. LTCH patients have an average length of inpatient stay longer than 25 days. LTCHs can be (1) freestandingâa hospital generally not integrated with any other hospital; (2) co-located with another hospital, either located in the same building as another hospital or in a separate building on the hospital's campus; or (3) a satellite facility of an LTCHâa separately located facility (which may be co-located with another hospital) that operates as part of the LTCH. Beginning in FY2005, CMS implemented a new Medicare payment regulation for LTCHs that are co-located with other hospitals and LTCH satellite facilities to limit inappropriate patient shifting driven by financial rather than clinical considerations. Under the new policy, if such an LTCH received more than 25% of its Medicare patients from any single referring hospital, the LTCH is paid the lower of the LTCH PPS or the IPPS payment for discharges that exceeded the threshold. Beginning in FY2008, CMS expanded the 25% patient threshold adjustment policy to include all LTCHs. MMSEA , Section 114(c)(1) , delayed the application of CMS's 25% patient threshold adjustment for freestanding LTCHs and \"grandfathered hospitals-within-hospitals\" LTCHs for three years from the enactment of MMSEA (December 29, 2007). MMSEA Section 114(c)(2) delayed the application of CMS's 25% patient threshold adjustment for LTCHs or satellite facilities co-located with another hospital if (1) LTCHs or satellite facilities located in a rural area or co-located with an urban single or Metropolitan Statistical Area (MSA) dominant hospital receive no more than 75% of their Medicare inpatients from such co-located hospitals or (2) other LTCHs or satellite facilities co-located with another hospital receive no more than 50% of their Medicare inpatients from such co-located hospitals. ARRA, Section 4302(a) , modified the beginning of the delays in MMSEA Sections 114(c)(1) and 114(c)(2) from the date of enactment of MMSEA (December 29, 2007) to July 1, 2007. This section also modified the end date for the delay under MMSEA Section 114(c)(2) (LTCHs co-located with another hospital) from three years from the date of enactment to three years from October 1, 2007 (or July 1, 2007, in the case of a satellite facility described in 42 C.F.R. Â§412.22(h)(3)(i)). In addition, ARRA Section 4302(a) modified the delay under MMSEA Section 114(c)(1) to include LTCHs or satellite facilities that, as of the date of enactment under MMSEA, were co-located with a provider-based off-campus location of an IPPS hospital that did not provide services payable under the IPPS at the off-campus location. ACA , Section 3106 , extended the delay of the 25% patient threshold adjustment two additional years. PSRA, Section 1206(b)(1) , extended the delay of the 25% patient threshold adjustment four additional years to expire after June 30, 2016 (or after September 30, 2016, for certain LTCHs co-located with another hospital). Cures Act, Division C, Section 15006 , delayed the 25% patient threshold adjustment for discharges occurring October 1, 2016, through September 30, 2017. This provision reinstated the PSRA delay that expired after June 30, 2016 (and extended the PSRA delay that expired after September 30, 2016, for certain LTCHs co-located with another hospital). The statutory delay in CMS applying the 25% patient threshold adjustment to LTCHs expired after September 30, 2017. However, the HHS Secretary extended the delay through FY2018 and eliminated it beginning FY2019 through rulemaking. Under Medicare, LTCHs were exempt from the IPPS when it was established in 1983. Instead, LTCHs were paid on a reasonable-cost basis subject to certain limits established by the Tax Equity and Fiscal Responsibility Act of 1982 (TEFRA; P.L. 97-248 ). Under the Balanced Budget Refinement Act of 1999 (BBRA 99; P.L. 106-113 ), the LTCH PPS was established, which provides a per-discharge payment based on the average costs and patient mix of LTCHs. The LTCH PPS typically provides higher Medicare payment rates for inpatient hospital care than the IPPS. The rapid increase in both the number of LTCHs and LTCH payments led to enactment of a temporary moratorium on the development of new LTCHs and a moratorium on new LTCH beds, with certain exceptions. MMSEA , Section 114(d) , established a three-year moratorium from the date of enactment (December 29, 2007) on the development of new LTCHs, with exceptions for (1) LTCHs that began their qualifying period for Medicare reimbursement before the enactment of MMSEA; (2) LTCHs that had a binding written agreement before the enactment of MMSEA for the actual construction, renovation, lease, or demolition of an LTCH, and had expended at least 10% of the estimated cost of the project (or $2.5 million, if less); and (3) LTCHs that had obtained an approved certificate of need in a state where one is required on or before the date of enactment of MMSEA. MMSEA Section 114(d) also established a three-year moratorium from the date of enactment (December 29, 2007) on the increase in beds in existing LTCHs, with exceptions for (1) LTCHs located in a state where there is only one other LTCH and (2) LTCHs that request an increase in beds following the closure or decrease in the number of beds of another LTCH in the state. ARRA, Section 4302 , amended the three-year moratorium on the increase in beds in existing LTCHs by providing an exception to LTCHs that had obtained a certificate of need for such an increase in LTCH beds on or after April 1, 2005, and before the enactment of MMSEA. ACA , Section 3106(b) , extended the moratoria established under MMSEA an additional two years (expiring after December 29, 2012). PSRA, Section 1206(b)(2) , reinstated the moratoria under MMSEA beginning January 1, 2015, and expiring after September 30, 2017; however, PSRA did not allow any exceptions to the reinstated moratoria. PAMA , Section 112(b) , amended the moratoria reinstated by PSRA to begin with enactment of PSRA (December 26, 2013) rather than January 1, 2015. Further, this section provided the same exceptions on the development of new LTCHs that had been provided under MMSEA but did not provide exceptions for the increase in LTCH beds. Cures Act, Division C, Section 15004 , reinstated the exception to the moratorium on the increase in LTCH beds effective as if it had been enacted by PAMA, April 1, 2014, to coincide with the previously reinstated exception for new LTCHs. The moratorium on the development of new LTCHs and on the increase of beds in existing LTCHs expired as of September 30, 2017. The 2009 Outpatient Prospective Payment System (OPPS) final rule required that therapeutic hospital outpatient services be furnished under the direct supervision of a physician. However, beginning in CY2010, CMS instructed its contractors not to evaluate or enforce the supervision requirements for therapeutic services provided to outpatients in critical access hospitals (CAHs). CMS extended this non-enforcement instruction for CY2011 and expanded it to include small rural hospitals with 100 or fewer beds. Subsequently, CMS extended the instruction for CY2012 and CY2013, The non-enforcement instruction has been extended several more times through legislation and rules. An Act to Provide for the Extension of the Enforcement Instruction on Supervision Requirements for Outpatient Therapeutic Services in Critical Access and Small Rural Hospitals Through 2014 ( P.L. 113-198 ), required the HHS Secretary to extend the non-enforcement instruction through CY2014. An Act to Provide for the Extension of the Enforcement Instruction on Supervision Requirements for Outpatient Therapeutic Services in Critical Access and Small Rural Hospitals Through 2015 ( P.L. 114-112 ) , required the HHS Secretary to extend the non-enforcement instruction through CY2015. Cures Act , Section 16004 , extended the non-enforcement instruction through CY2016. BBA 2018 , Section 51007, extended the non-enforcement instruction through CY2017 retroactively. Although the non-enforcement instruction has statutorily expired, the CY2018 OPPS/ Ambulatory Surgery Center (ASC) final rule with comment period re-established the non-enforcement policy beginning on January 1, 2018, and extended the instruction through December 31, 2019. Appendix A. Demonstration Projects and Pilot Programs This appendix lists selected health care-related demonstration projects and pilot programs that are scheduled to expire during the first session of the 116 th Congress (i.e., during calendar year [CY] 2019). The expiring demonstration projects and pilot programs listed below have portions of law that are time-limited and will lapse once a statutory deadline is reached, absent further legislative action. The expiring demonstration projects and pilot programs included here are those related to Medicare, Medicaid, the State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. This appendix also includes other health care-related demonstration projects and pilot programs that were enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or last extended under the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). In addition, this appendix lists health care-related demonstration projects and pilot programs within the same scope that expired during the 115 th Congress (i.e., during CY2017 or CY2018). Although CRS has attempted to be comprehensive, it cannot guarantee that every relevant demonstration project and pilot program is included here. Table A-1 , lists the relevant demonstration projects and pilot programs that are scheduled to expire in 2019. Table A-2 lists the relevant provisions that expired during 2018 or 2017. Appendix B. Laws That Created, Modified, or Extended Current Health Care-Related ExpiringÂ Provisions Appendix C. List of Abbreviations AAA: Area Agencies on Aging ACA: Patient Protection and Affordable Care Act ( P.L. 111-148 , as amended) ACF: Administration for Children and Families ACL: Administration for Community Living ADRC: Aging and Disability Resource Center AHRQ: Agency for Healthcare Research and Quality ARRA: American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ) ASC: Ambulatory Surgery Center ATRA: American Taxpayer Relief Act of 2012 ( P.L. 112-240 ) BBA 13: Bipartisan Budget Act of 2013 ( P.L. 113-67 , Division A) BBA 97: Balanced Budget Act of 1997 ( P.L. 105-33 ) BBA 2018 : Bipartisan Budget Act of 2018 BBRA 99: Balanced Budget Refinement Act of 1999 ( P.L. 106-113 ) BIPA 2000 : Medicare, Medicaid, and SCHIP Benefits Improvement and Protection Act of 2000 ( P.L. 106-554 ) CAH: Critical access hospital CHCF: Community Health Center Fund CHIP: State Children's Health Insurance Program CHIPRA: Children's Health Insurance Program Reauthorization Act ( P.L. 111-3 ) CMS: Centers for Medicare & Medicaid Services CPI-U: Consumer Price Index for All Urban Consumers CRS: Congressional Research Service CY: Calendar year DME: Durable medical equipment DRA: Deficit Reduction Act of 2005 ( P.L. 109-171 ) DSH: Disproportionate share hospital E-FMAP: Enhanced federal medical assistance percentage EHR: Electronic health record FMAP: Federal medical assistance percentage FY: Fiscal year GAO: Government Accountability Office GME: Graduate medical education GPCI: Geographic Practice Cost Index HCERA: Health Care and Education Reconciliation Act of 2010 ( P.L. 111-152 ) HCFAC: Health Care Fraud and Abuse Control HH: Home health HHS: Department of Health and Human Services HI: Hospital Insurance HIPAA: Health Insurance Portability and Protection Act of 1996 ( P.L. 104-191 ) HIT : Health information technology HITECH: Health Information Technology for Economic and Clinical Health Act HPOG: Health Profession Opportunity Grants HRSA: Health Resources and Services Administration IHS: Indian Health Service IPPS: Medicare Inpatient Prospective Payment System LTCH: Long-term care hospital LTCH PPS: Long-term care hospital prospective payment system LTSS: Long-term services and supports MA: Medicare Advantage MA-PD: Medicare Advantage-Prescription Drug MACRA: Medicare Access and CHIP Reauthorization Act of 2015 ( P.L. 114-10 ) MAP: Measure Applications Partnership MCTRJCA: Middle Class Tax Relief and Job Creation Act of 2012 ( P.L. 112-96 ) MEDH: Medicare-dependent hospital MedPAC: Medicare Payment Advisory Commission MIECHV: Maternal, Infant, and Early Childhood Home Visiting MIP: Medicare Integrity Program MIPPA: Medicare Improvements for Patients and Providers Act of 2008 ( P.L. 110-275 ) MMA: Medicare Prescription Drug, Improvement, and Modernization Act of 2003 ( P.L. 108-173 ) MMEA: Medicare and Medicaid Extenders Act of 2010 ( P.L. 111-309 ) MMSEA: Medicare, Medicaid and SCHIP Extension Act of 2007 ( P.L. 110-173 ) MPFS: Medicare physician fee schedule MSA : Metropolitan Statistical Area NHSC: National Health Service Corps NQF: National Quality Forum OBRA 90: Omnibus Budget Reconciliation Act of 1990 ( P.L. 101-508 ) OPPS: Outpatient Prospective Payment System PAMA: Protecting Access to Medicare Act of 2014 ( P.L. 113-93 ) PAMPA: Patient Access and Medicare Protection Act ( P.L. 114-115 ) PCORI: Patient-Centered Outcomes Research Institute P CORTF: Patient-Centered Outcomes Research Trust Fund PDP: Prescription Drug Plan PHSA: Public Health Service Act PPS: Prospective payment system PQMP: Pediatric Quality Measures Program PREP: Personal Responsibility Education Program PRWORA: Personal Responsibility and Work Opportunity Reconciliation Act of 1996 ( P.L. 104-193 ) PSRA: Pathway for SGR Reform Act of 2013 ( P.L. 113-67 , Division B) RVU: Relative value unit SGR: Sustainable Growth Rate SHIP: State Health Insurance Assistance Program SMI: Supplementary Medical Insurance SNAP: Supplemental Nutrition Assistance Program SSA: Social Security Act SRAE: Sexual Risk Avoidance Education SSI: Supplemental Security Income TAA: Trade Adjustment Assistance TANF: State Temporary Assistance for Needy Families TEFRA: Tax Equity and Fiscal Responsibility Act of 1982 ( P.L. 97-248 ) TPL: Third-party liability TPTCCA: Temporary Payroll Tax Cut Continuation Act of 2011( P.L. 112-78 ) TRHCA: Tax Relief and Health Care Act of 2006 ( P.L. 109-432 ) U.S.C.: U.S. Code WREA 2003: Welfare Reform Extension Act of 2003 ( P.L. 108-40 ) WREA 2004: Welfare Reform Extension Act of 2004 ( P.L. 108-210 ) WREA 2005: Welfare Reform Extension Act of 2005 ( P.L. 109-4 )", "summary": "This report describes selected health care-related provisions that are scheduled to expire during the first session of the116 th Congress (i.e., during calendar year [CY] 2019). For purposes of this report, expiring provisions are defined as portions of law that are time-limited and will lapse once a statutory deadline is reached absent further legislative action. The expiring provisions included in this report are those related to Medicare, Medicaid, State Children's Health Insurance Program (CHIP), and private health insurance programs and activities. The report also includes health care-related provisions that were enacted in the Patient Protection and Affordable Care Act (ACA; P.L. 111-148 ) or last extended under the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). In addition, this report describes health care-related provisions within the same scope that expired during the 115 th Congress (i.e., during CY2017 or CY2018). Although the Congressional Research Service (CRS) has attempted to be comprehensive, it cannot guarantee that every relevant provision is included here. This report generally focuses on two types of health care-related provisions within the scope discussed above. The first type of provision provides or controls mandatory spending, meaning that it provides temporary funding, temporary increases or decreases in funding (e.g., Medicare provider bonus payments), or temporary special protections that may result in changes in funding levels (e.g., Medicare funding provisions that establish a floor). The second type of provision defines the authority of government agencies or other entities to act, usually by authorizing a policy, project, or activity. Such provisions also may temporarily delay the implementation of a regulation, requirement, or deadline, or establish a moratorium on a particular activity. Expiring health care provisions that are predominantly associated with discretionary spending activitiesâsuch as discretionary authorizations of appropriations and authorities for discretionary user feesâare excluded from this report. Certain types of provisions with expiration dates that otherwise would meet the criteria set forth above are excluded from this report. Some of these provisions are excluded because they are transitional or routine in nature or have been superseded by congressional action that otherwise modifies the intent of the expiring provision. For example, statutorily required Medicare payment rate reductions and payment rate re-basings that are implemented over a specified time period are not considered to require legislative attention and are excluded. The report provides tables listing the relevant provisions that are scheduled to expire in 2019 and that expired in 2018 or 2017. The report then describes each listed provision, including a legislative history. An appendix lists relevant demonstration projects and pilot programs that are scheduled to expire in 2019 or that expired in 2018 or 2017.", "document_type": "crs"}
{"report": "Holding capital enables banks to absorb unexpected losses (up to a point) without failing. To improve individual bank safety and soundness and financial system stability, bank regulators have implemented a number of regulations requiring banks to hold minimum levels of capital. These minimums, expressed as ratios between various balance sheet items, are called capital ratio requirements . Although capital ratio requirements can generate the benefits of safety and stability, they impose certain costs, including potentially reducing credit availability and raising credit prices. Given these characteristics, how capital ratio requirements should be calibrated and applied is subject to debate. Capital ratios fall into one of two main typesâa leverage ratio or a risk-weighted ratio . A leverage ratio treats all assets the same, requiring banks to hold the same amount of capital against the asset regardless of how risky each asset is. A risk-weighted ratio assigns a risk weightâa number based on the asset's riskiness that the asset value is multiplied byâto account for the fact that some assets are more likely to lose value than others. Riskier assets receive a higher risk weight, which requires banks to hold more capital to meet the ratio requirement, thus better enabling them to absorb losses. One question within the broader debate over bank regulation is what capital ratio requirements relatively small, safe banks should face. In general, policymakers conceptually agree that small, safe banksâwhich have fewer resources to devote to compliance and individually pose less risk to the financial systemâshould face a simpler, less costly regulatory regime. Accordingly, bank regulators have imposed higher thresholds and more complex rules on the largest banks for a number of years. However, some industry observers have argued for further tailoring for smaller banks. In response to concerns that small banks faced unnecessarily burdensome capital requirements, Congress mandated further tailoring of capital rules in Section 201 of P.L. 115-174 , the Economic Growth, Regulatory Relief, and Consumer Protection Act of 2018 (EGRRCPA). Section 201 created the Community Bank Leverage Ratio (CBLR), a relatively simple ratio to calculate. Under this provision, a bank with less than $10 billion in assets that meets certain risk-profile criteria set by bank regulators will have the option to exceed a single CBLR threshold instead of being required to exceed several existing, more complex minimum ratios. The CBLR is set at a relatively high level compared to the existing minimum ratio requirements. Banks that exceed the CBLR are to be considered (1) in compliance with all risk-based capital ratios and (2) well capitalized for other regulatory considerations. Because small banks typically hold amounts of capital well above the required minimums, the CBLR option will allow many small banks to opt out of requirements to meet and report more complex ratios. Section 201 grants the federal bank regulatory agenciesâthe Federal Reserve (the Fed), the Office of the Comptroller of the Currency (OCC), and the Federal Deposit Insurance Corporation (FDIC) (hereinafter collectively referred to as \"the bank regulators\")âdiscretion over certain aspects of CBLR implementation, including setting the exact ratio, as the statute mandates a range between 8% and 10%. In November 2018, the regulators proposed 9%. The banking industry and certain policymakers criticized this decision, arguing that the threshold would be too high. Despite the criticism, the bank regulators issued a joint press release on October 29, 2019, announcing they had finalized the rule with a 9% threshold. On March 27, 2020, the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) was enacted in an effort to mitigate the adverse effects of the Coronavirus Disease 2019 (COVID-19) pandemic. Section 4012 of the law temporarily lowered the CBLR to 8% until the earlier of (1) the date the public health emergency ends, or (2) the end of 2020. In the rulemaking implementing this provision, the regulators lowered the ratio to 8% until the end of 2020, and chose to raise the ratio first to 8.5% in 2021, before returning it to 9% on January 1, 2022. This report examines capital ratios generally, as well as the capital ratio regime that was in place before EGRRCPA's enactment and will continue to be in place for banks that do not qualify for or do not elect to exercise the CBLR option. It then describes Section 201 of EGRRCPA, the regulation implemented pursuant to that provision, and the ensuing debate surrounding this implementation. The report then describes the temporary lowering of the threshold pursuant to the CARES Act. Lastly, this report presents estimates on the number and characteristics of banks that would have qualified under the rule given their pre-implementation balance sheets and estimates those banks' CBLRs in the pre-implementation time period. This provides context on the number of banks potentially affected by CBLR implementation. A bank's balance sheet is divided into assets, liabilities, and capital. Assets are largely the value of loans owed to the bank and securities owned by the bank. To make loans and buy securities, a bank secures funding by either incurring liabilities or raising capital. A bank's liabilities are largely the value of deposits and debt the bank owes depositors and creditors. Banks raise capital through various methods, including issuing equity to shareholders or issuing special types of bonds that can be converted into equity. Importantly, many types of capitalâunlike liabilitiesâmay not contractually require the bank to make payouts of specified amounts. Banks make profits in part because many of their assets are generally riskier, longer-term, and more illiquid than their liabilities, which allows them to earn more interest on their assets than they pay on their liabilities. The practice is usually profitable, but it exposes banks to risks that can lead to failure. When defaults on a bank's assets increase, the money coming into the bank decreases. However, the bank generally remains obligated to make payouts on its liabilities. Capital, though, enables the bank to absorb losses. When money coming in decreases, the bank's payouts on capital can be reduced, delayed, or cancelled. Thus, capital allows banks to continue to meet their rigid liability obligations and avoid failure even after experiencing unanticipated losses on assets. For this reason, regulators require banks to hold a minimum level of capital, expressed as ratios between items on bank balance sheets. Banks have been subject to capital ratio requirements for decades. U.S. bank regulators first established explicit numerical ratio requirements in 1981. In 1988, they adopted the Basel Capital Accords proposed by the Basel Committee on Banking Supervision (BCBS)âan international group of bank regulators that sets international standardsâwhich were the precursor to the ratio requirement regime used in the United States today. Those requirementsânow known as \"Basel I\"âwere revised in 2004, establishing the \"Basel II\" requirements that were in effect at the onset of the financial crisis in 2008. In 2010, the BCBS agreed to more stringent \"Basel III\" standards. Pursuant to this accord, U.S. regulators finalized new capital requirements in 2013. Banks are required to satisfy several different capital ratio requirements. A detailed examination of how these ratios are calculated is beyond the scope of this report. ( Figure 1 provides a highly simplified, hypothetical example.) The following sections examine the mix of leverage and risk-weighted ratio requirements in effect prior to CBLR's implementation to enable comparison between regulatory regimes. Most banks are required to meet a 4% minimum leverage ratio. In addition, to be considered well capitalized for other regulatory purposesâfor example, being exempt from interest-rate and brokered-deposit restrictionsâbanks must meet a 5% leverage ratio. Furthermore, 15 large and complex U.S. banks classified as advanced approaches banks must maintain a minimum 3% supplementary leverage ratio (SLR) that uses an exposure measure that includes both balance sheet assets and certain other exposures to losses that do not appear on the balance sheet. Finally, a subset of eight of the largest and most complex U.S. banks classified as globally systemically important banks (G-SIBs) must meet an enhanced SLR (eSLR) requirement of 5% at the holding-company level to avoid capital-distribution restrictions, and 6% at the depository level to be considered well capitalized. The required risk-weighted ratios depend on bank size and capital quality (some types of capital are considered less effective at absorbing losses than other types, and thus considered lower quality). Most banks are required to meet a 4.5% risk-weighted ratio for the highest-quality capital and ratios of 6% and 8% for lower-quality capital types. To be considered well capitalized for purposes of interest-rate and brokered-deposit restriction exemptions (among other regulatory considerations), a bank's ratios must be 2% above the minimums (i.e., 6.5%, 8%, and 10%, respectively). In addition, banks must have an additional 2.5% of high-quality capital on top of the minimum levels (7%, 8.5%, and 10.5%, respectively) as part of a capital conservation buffer in order to avoid restrictions on capital distributions, such as dividend payments. Advanced approaches banks are subject to a 0%-2.5% countercyclical buffer that the Fed can deploy if credit conditions warrant increasing capital (the buffer is currently 0% and has been so since its implementation). Finally, the G-SIBs are subject to an additional capital surcharge of between 1% and 4.5% based on the institution's systemic importance. Whether the generally applicable capital requirements' (i.e., the requirements facing all banks prior to the implementation of the CBLR) potential benefitsâsuch as increased bank safety and financial system stabilityâare appropriately balanced against the potential costs of reduced credit availability is a debated issue. Capital is typically a more expensive source of funding for banks than liabilities. In addition, calculating and reporting the ratios requires banks to devote resourcesâsuch as employee time and purchases of specialized softwareâto regulatory compliance. Thus, requiring banks to hold higher levels of capital and meet certain ratios imposes costs. This could lead banks to reduce the amount of credit available or raise credit prices. Leverage ratios and risk-based ratios each have potential strengths and weaknesses. Because the CBLR exempts certain banks from risk-weighted ratio requirements and allows them to use a single leverage ratio, bank regulators will likely consider those relative strengths and weaknesses in determining which banks should have the CBLR option. Riskier assets generally offer greater rates of return to compensate investors for bearing more risk. Thus, without risk weighting banks have an incentive to hold riskier assets because the same amount of capital must be held against risky and safe assets. In addition, a leverage ratio alone may not fully reflect a bank's riskiness because a bank with a high concentration of very risky assets could have a similar ratio to a bank with a high concentration of very safe assets. Risk weighting can address these issues, because the bank is required to hold more capital against risky assets than against safe ones (and no capital against the safest assets, such as cash and U.S. Treasuries). However, risk weighting presents its own challenges. Risk weights assigned to particular asset classes could inaccurately estimate some assets' true risks, especially because they cannot be adjusted as quickly as asset risk might change. Banks may have an incentive to overly invest in assets with risk weights that are set too low (because they would receive a riskier asset's high potential rate of return, but have to hold only enough capital to protect against a safer asset's losses), or inversely to underinvest in assets with risks weights that are set too high. Some observers believe that the risk weights in place prior to the 2007-2009 financial crisis were poorly calibrated and \"encouraged financial firms to crowd into\" risky assets, exacerbating the downturn. For example, banks held highly rated mortgage-backed securities (MBSs) before the crisis, in part because those assets offered a higher rate of return than other assets with the same risk weight. MBSs then suffered unexpectedly large losses during the crisis. Another criticism is that the risk-weighted system involves needless complexity and is an example of regulator micromanagement. The complexity could benefit the largest banks, which have the resources to absorb the added regulatory cost, compared with small banks that could find compliance costs more burdensome. Thus, critics argue, small banks should be subject to a simpler system to avoid giving large banks a competitive advantage. In response to concerns about the generally applicable capital ratio requirements' effects on small banks, Congress mandated in Section 201 of EGRRCPA that certain qualifying banks that exceed a non-risk-weighted Community Bank Leverage Ratio (CBLR) be considered in compliance with all risked-weighted capital ratios and well capitalized for other regulatory purposes. The provision defined qualifying banks as those with less than $10 billion in assets, but also authorized the federal bank regulators to disqualify banks based on \"risk profile, which shall be based on consideration ofâ(i) off-balance sheet exposures; (ii) trading assets and liabilities; (iii) total notional derivatives exposures; and (iv) such other factors as the appropriate Federal banking agencies determine appropriate.\" This report refers to banks that meet these criteria as CBLR - qualifying banks . Section 201 also directed federal bank regulators to set a threshold ratio of capital to unweighted assets at between 8% and 10% (as discussed in the \" Generally Applicable Requirements (Without CBLR Option) \" section, the current minimum leverage ratio is 4% and the threshold to be considered well capitalized is 5%). This report refers to qualifying banks that would exceed the threshold as CBLR - compliant banks. Although the act specified in statute one qualifying criterion (less than $10 billion in assets) and established a range within which the CBLR must be set (8% to 10%), it granted the regulators discretion in certain aspects, including setting other qualifying criteria and the exact level within the 8%-10% range. Under Section 201, qualifying banks that meet size and risk criteria would fall into one of two groups with respect to the CBLR threshold when the new regulation goes into effect. The CBLR-compliant banks (i.e., those above the threshold) would have the option to enter the CBLR regime, and be considered in compliance with all risk-based capital ratio minimums and well capitalized for other regulatory purposes. This would free those banks from costs associated with meeting risk-based minimums and reporting their ratios (a quarterly exercise requiring bank resources). Most small banks hold enough capital to exceed the threshold, and thus will be provided this regulatory relief without having to raise extra capital. Banks that meet the size and risk-profile criteria (i.e., CBLR-qualifying banks) but whose capital holdings are below the CBLR threshold can remain in the preexisting capital regime (no banks are required to meet the CBLR), or can choose to raise capital or otherwise change their balance sheet composition in order to become CBLR compliant. On November 21, 2018, the bank regulators announced they were inviting public comment on a proposed CBLR rulemaking. The proposal included the statutorily mandated qualifying criterion that only banks with less than $10 billion in assets would be eligible. In addition, the regulators used the authority granted by Section 201 to exclude banks based on risk-profile characteristics by including a number of additional qualifying criteria that limited banks' trading activity and off-balance-sheet exposures. On the question of where within the 8% to 10% range to set the CBLR threshold, the regulators chose 9%, arguing that this level supports the \"goals of reducing regulatory burden for community banking organizations and retaining safety and soundness in the banking system.\" The banking industry criticized aspects of the rule. For example, an industry group representing community banks indicated it was \"disappointed that regulators have proposed capital standards that are higher than necessary\" and \"supports an 8% community bank leverage ratio.\" In its comment letter, the group noted that an 8% threshold \"would calibrate the CBLR closer to the current risk-based capital requirements ... [and] put the ratio closer to the current 5% leverage requirement.\" Despite the criticism, the bank regulators issued a joint press release on October 29, 2019, announcing they had finalized the rule with a 9% threshold. The rule went into effect on January 1, 2020. When borrowers miss payments on loans at an unanticipated high rate, banks incur losses and potentially must write down the value of their capital, reducing their capital ratios. To halt or slow the decline and stay above regulatory thresholds, banks may respond by halting or slowing the growth of assets by making fewer loans. If the missed payments are the result of widespread economic distress, this reduction in credit availability may exacerbate the downturn. The COVID-19 pandemic caused widespread economic disruption as millions of businesses shut down and unemployment soared. To mitigate the pandemic's economic effects, among its other adverse effects, Congress passed the CARES Act ( P.L. 116-136 ). Section 4012 of the CARES Act temporarily lowers the CBLR to give qualifying banks using this capital measure more leeway to continue lending and stay above the threshold as the pandemic's economic effects unfold. The provision directs regulators to lower the CBLR to 8% and to give banks that fall below that level a reasonable grace period to come back into compliance with the CBLR. This mandate expires the earlier of (1) the date the public health emergency ends or (2) the end of 2020. In the rulemaking implementing this provision, the regulators lowered the ratio to 8% until the end of 2020, and chose to raise the ratio first to 8.5% in 2021, before returning it to 9% on January 1, 2022. Outside of bank policy circles and absent context, debating whether a threshold ratio of capital to unweighted assets is best set at 8% or 9% may seem inconsequential. However, hundreds of banks can be affected by just fractions of a percentage point. This section provides estimates of how many depositories would, as of June 30, 2019, likely fall above or below the CBLR threshold if set at 9% or 8%. Those estimates at the state level are provided in Appendix A . This section also includes statistics on certain characteristics of banks that meet or do not meet various CBLR criteria. The estimates presented here are based on Congressional Research Service (CRS) analysis of (1) data provided by FDIC-insured depository institutions (insured depository institutions can be either banks or savings associations, but will be referred to as \"banks\") on their Consolidated Statement on Condition and Income, known as the call report , for the second quarter of 2019; and (2) information found in the CBLR notice of proposed rulemaking published in the Federal Register . CRS could not find in the call report some data points necessary to provide a definitive list of and exact statistics on which banks would and would not qualify and be CBLR compliant. Thus, the CRS list of qualifying and compliant banks and the calculation of every bank's current CBLR may not exactly match the eventual actual numbers. A more detailed description of CRS methodology is provided in Appendix B . CRS began with all 5,352 banks that filed call reports for the second quarter of 2019, and first filtered out those with $10 billion or more in assets (see Figure 2 ). Based on that criterion, 141 banks would not have qualified and 5,211 would have if they met the risk-profile criteria. Those 5,211 were then checked against the risk profile-based criteria, and 5,078 were found to qualify. This high rate of qualification is not entirely surprising at the depository level, because small banks are generally unlikely to engage intensely enough in the activities and products included in the risk criteria to exceed the allowable threshold. Of the 5,078 qualifying banks, 4,440 had CBLRs above 9% and thus would have been CBLR compliant. Of the remainder (638 banks), 515 banks had CBLRs between 8% and 9%, and thus would have been compliant if the CBLR threshold level was 8%. Table 1 compares the averages of certain balance-sheet values and ratios at qualifying and nonqualifying banks. Total assets measures bank size. Loans as a percentage of total assets and deposits as a percentage of total liabilities measure how concentrated a bank is in traditional, core banking activities, while trading assets and liabilities as a percentage of total assets measure how active it is in noncore activities. Off-balance-sheet exposures as a percentage of total assets measures bank risk that is not reflected on the balance sheet. Recall from \" Risk-Weighted Ratio Requirements \" that banks must meet three different minimum risk-weighted requirements that differ in the types of capital used to calculate the ratio. The types of capital they use are categorized as common equity Tier 1 (CET1), Tier 1, and total capital. Tier 1 capital is what is used to calculate the generally applicable leverage ratio in place before the CBLR. CET1 is the most loss-absorbing category of capital and allows the fewest capital types of the three. Tier 1 includes additional items not allowable in CET1. Total capital is the most inclusive, allowing certain Tier 2 capital items not allowable in Tier 1. The average of these ratios is presented to give an indication of how well capitalized banks were, as measured by the existing capital regime. Banks that would not have qualified for the CBLR under the regulator-set risk-profile criteria were on average almost twice as large as qualifying banks ($1.05 billion vs. $542 million), but were still mostly relatively small banks. In addition, nonqualifying banks' concentrations in lending, deposit taking, and trading were not substantively different from qualifying banks'. However, their off-balance-sheet exposures and capital levels notably differed. Nonqualifying banks had significantly more off-balance-sheet exposures as a percentage of total assetsâ37% on average, compared to an average of 8.5% at qualifying banks. (A difference is expected, as this characteristic is a risk-profile criterion for qualification. However, the large disparity and the fact that both groups are quite far from the allowable 25% threshold are notable). Furthermore, nonqualifying banks' average risk-based capital ratios were lower than qualifying banks' levels by about a quarter. These latter two differences indicate that regulators set the risk-profile criteria in a way that would disqualify banks with large off-balance-sheet exposures that are relatively thinly capitalized when the risk of their assets is taken into account. Arguably, this would mean that giving those banks the ability to opt out of risk-based requirements could expose them and the banking system to unacceptably high failure risks. Table 2 compares banks that would have exceeded the 9% CBLR threshold, those that would have only met the threshold if it was set at 8%, and those that would not have met any threshold allowable given the Section 201 mandated range (i.e., 8%-10%). When banks compliant at a 9% threshold are compared to those compliant at the 8% threshold, there is a great deal of similarity in size, activities, and off-balance-sheet exposure. However, the 8% banks' risk-based capital ratios were lower by about half when compared to the 9% banks. In this way, banks compliant at 8% were quite similar to the banks that would not have qualified at the 8% level. These capital characteristics may have been a factor in regulators deciding not to allow these banks to opt out of risk-based capital requirements. It is also instructive to compare banks with CBLRs between 9% and 10% and those with CBLRs between 8% and 9%. In Table 2 , the average risk-based ratios of banks with CBLRs greater than 9% were boosted by banks that held very high levels of capital. Since the regulatory agencies cannot set the threshold above 10%, banks with such CBLRs are not at issue in the implementation. Rather, the agencies have determined that banks with CBLRs between 9% and 10% should be able to benefit from the CBLR regime, whereas 8%-9% banks should not. Table 3 shows that the risked-based differences between 9%-10% banks and 8%-9% banks were not as pronounced as when all CBLR compliant banks are the point of comparison. Instead, the increases in the various risked-based measures closely reflect the 1% increase in the CBLR. CRS estimates that of the 5,352 U.S. depositories, 5,078 (95% of all banks) would have been CBLR compliant provided their capital exceeds the 9% threshold set by regulators. Of those, about 4,440 (83% of all banks) currently exceed that threshold. Regulators are statutorily authorized to set the threshold as low as 8%. If they did so, about 515 additional qualifying banks (10% of all banks) would have exceeded the threshold, and thus been eligible for exemption from risk-based ratio compliance. Under the risk-profile criteria set by regulators, nonqualifying banks were on average larger (though still relatively small by industry standards), had significantly larger off-balance-sheet exposures, and held about a quarter less capital than qualifying banks, as measured by risk-based ratios. Banks that would have been CBLR compliant at a 9% threshold were similar in size, activities, and off-balance-sheet exposures to 8% threshold banks. However, the latter group held about half the risk-based capital that the former did. The difference in risk-based measures between 9%-10% CBLR banks and 8%-9% CBLR banks was not as pronounced. The 1 percentage point increase in the CBLR threshold is more or less reflected in the difference in the risk-based measures. Appendix A. Qualifying Banks by CBLR and State Appendix B. Methodology To produce the statistics and estimates presented in this report, CRS used (1) information from the bank regulator Notice of Proposed Rulemaking: Regulatory Capital Rule: Capital Simplification for Qualifying Community Banking Organizations , published in the Federal Register on February 8, 2019; and (2) data from Consolidated Reports on Condition and Income as of June 30, 2019, which was downloaded from the Federal Financial Institution Examination Council bulk data download website on September 14, 2019. In the proposed rule notice, bank regulators provided this proposed format for reporting the CBLR, which indicates which measures the regulators were intending to use for qualifying criteria and to calculate the CBLR: The estimates in this report may differ from the actual numbers due to two challenges with data availability. First, exactly how deferred tax assets are counted in the proposals and what deductions from those figures would be permitted differ from the deferred tax asset values banks entered at call report Schedule RC-R, Part I, line 8. However, CRS was unable to locate the exact data identified in the proposal, and so used the deferred tax asset value available in the call report as a proxy. CRS judged that using this proxy was unlikely to cause the estimated bank counts and statistics presented in this report to differ substantively from the actual figures, because the vast majority of qualifying banks reported little or no deferred tax assets. Nevertheless, the difference could cause a bank near the 25% DTA-to-assets qualifying threshold to be erroneously classified as qualifying or nonqualifying. In addition, using this proxy could cause the CBLRs estimated for this report to be slightly different from certain banks' actual CBLRs. Second, while CRS was able to locate values in the call report data for a number of off-balance-sheet exposures identified in the proposal, it was not able to locate others. The exposures included in the proposal are the unused portions of commitments (except for unconditionally cancellable commitments); self-liquidating, trade-related contingent items that arise from the movement of goods, transaction-related contingent items (i.e., performance bond, bid bonds and warranties); sold credit protection in the form of guarantees and credit derivatives; credit enhancing representations and guarantees; off-balance sheet securitization exposures; letters of credit; forward agreements that are not derivatives contracts; and securities lending and borrowing transactions. CRS used the following values banks entered in call reports: (1) Schedule RC-L, lines 1a, 1b, 1c(1)-(2), 1d, and 1e as \"unused portions of commitments\"; (2) Schedule RC-R, Part II, line 19, Column A as \"unconditionally cancellable commitments\"; (3) Schedule RC-L lines 7a(1)-(4) Column A as \"sold credit protection in the form of guarantees and credit derivatives\"; (4) Schedule RC-R, Part II, line 10, Column A as \"off balance sheet securitization exposures\"; (5) Schedule RC-L line 2, 3, and 4 as \"letters of credit\"; and (6) Schedule RC-L, line 6a and 6b as \"securities lending and borrowing transactions.\" CRS was unable to locate values for (1) \"trade self-liquidating, trade-related contingent items that arise from the movement of goods\"; (2) \"transaction-related contingent items\"; (3) \"credit enhancing representations and guarantees\"; and (4) \"forward agreements that are not derivatives contracts.\" Thus, the CRS-calculated off-balance-sheet exposures used for this report are underestimates for banks that had any of the latter set of exposures. CRS judges that the number of banks that have these exposures and for which the underestimation is the difference between falling above or below the 25% off-balance-sheet exposures to total assets threshold is likely relatively small. Nevertheless, by omitting the latter set of exposures, the CRS estimate of qualifying banks may be an overcount. To calculate the CBLRs, CRS used the following calculations and call report items (the item number is an identifying number assigned to each line item in the call report data set): ", "summary": "Capital allows banks to withstand losses (to a point) without failing, and regulators require banks to hold certain minimum amounts. These requirements are generally expressed as ratios between balance sheet items, and banks (particularly small banks) indicate that reporting those ratios can be difficult. Capital ratios fall into one of two main typesâsimpler leverage ratio s and more complex risk-weighted ratio s . A leverage ratio treats all assets the same, whereas a risk-weighted ratio assigns assets a risk weight to account for the likelihood of losses. In response to concerns that small banks faced unnecessarily burdensome capital requirements, Congress mandated further tailoring of capital rules in Section 201 of the Economic Growth, Regulatory Relief, and Consumer Protection Act of 2018 ( P.L. 115-174 ) and created the Community Bank Leverage Ratio (CBLR). Under the provision, a bank with less than $10 billion in assets that meets certain risk-profile criteria will have the option to meet a CBLR requirement instead of the existing, more complex risk-weighted requirements. Because most small banks currently hold enough capital to meet the CBLR option, Section 201 will allow many small banks to opt out of requirements to meet and report more complex ratios. Questions related to how much riskier bank portfolios will be if they are only subject to a leverage ratio (rather than a combination of leverage and risk-based ratios) and how high the threshold must be to mitigate those risks are matters of debate. Section 201 grants the federal bank regulatory agenciesâthe Federal Reserve (the Fed), the Office of the Comptroller of the Currency (OCC), and the Federal Deposit Insurance Corporation (FDIC)âdiscretion over certain aspects of CBLR implementation, including setting the exact ratio; the provision mandated a range between 8% and 10%. In November 2018, the regulators proposed 9%, arguing this threshold supports safety and stability while providing regulatory relief to small banks. Bank proponents criticized this decision and advocated an 8% threshold, arguing that 9% is too high and withholds the exemption's benefits from banks with appropriately small risks. Despite the criticism, the bank regulators announced in a joint press release on October 29, 2019, they had finalized the rule with a 9% threshold. Responding to the coronavirus pandemic, Congress mandated in the Coronavirus Aid, Relief, and Economic Security Act (CARES Act; P.L. 116-136 ) that the ratio be temporarily lowered to 8% until the earlier of (1) the date the public health emergency ends, or (2) the end of 2020, so that banks have more leeway to deal with the pandemic's impact. In rulemaking implementing that provision, the regulators set the ratio for 2021 at 8.5% before raising it back to 9% on January 1, 2022. Of the 5,352 FDIC-insured depository institutions in the United States at the end of the second quarter of 2019, the Congressional Research Service (CRS) estimates that 5,078 (about 95%) would have met the size and risk-profile criteria necessary to qualify for the CBLR option. Under the regulator-set risk-profile criteria, nonqualifying banks were on average larger, had larger off-balance-sheet exposures, and had risk-based capital ratios that are about a quarter lower than qualifying banks. Of the 5,078 banks that would have qualified based on size and risk criteria, CRS estimates 4,440 (or 83% of all U.S. banks) exceeded a 9% threshold and would have been eligible to enter the CBLR regime. An additional 515 banks (9.6%) exceeded an 8% threshold. Thus, the difference between setting the ratio at 8% or 9% could, depending on perspective, potentially have provided appropriate regulatory relief to, or removed important safeguards from, about 10% of the nation's banks, which collectively held about 2% of total U.S. banking industry assets. Banks that would have been CBLR compliant at a 9% threshold were similar in size, activities, and off-balance-sheet exposures to 8% threshold banks, but the latter group's risk-based ratios were about half the level of the former's. However, when banks with CBLRs between 9% and 10% are compared to banks with CBLRs between 8% and 9%, the difference in risk-based ratios becomes much less pronounced.", "document_type": "crs"}
{"report": "Each year, the House and Senate armed services committees take up national defense authorization bills. The House of Representatives passed its version of the National Defense Authorization Act for Fiscal Year 2020 (NDAA; H.R. 2500 ) on July 12, 2019. The Senate passed its version of the NDAA ( S. 1790 ) on June 27, 2019. These bills contain numerous provisions that affect military personnel, retirees, and their family members. Provisions in one version may not be included in the other, may be treated differently, or may be identical to those in the other versions. Following passage of each chamber's bill, a conference committee typically convenes to resolve the differences between the respective chambers' versions of the bill. The House passed the FY2020 NDAA conference report on December 11, 2019, and the Senate passed the report on December 17, 2019. On December 20, 2019, President Donald J. Trump signed the bill into law ( P.L. 116-92 ). This report highlights selected personnel-related issues that may generate high levels of congressional and constituent interest. Related CRS products are identified in each section to provide more detailed background information and analysis of the issues. For each issue, a CRS analyst is identified. Some issues discussed in this report were previously addressed in the FY2019 NDAA ( P.L. 115-232 ) and discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al., or other reports. Issues that were considered previously are designated with an asterisk in the relevant section titles of this report. Background: The authorized active duty end-strengths for FY2001, enacted in the year prior to the September 11 terrorist attacks, were as follows: Army (480,000), Navy (372,642), Marine Corps (172,600), and Air Force (357,000). Over the next decade, in response to the demands of wars in Afghanistan and Iraq, Congress substantially increased the authorized personnel strength of the Army and Marine Corps. Congress began reversing those increases in light of the withdrawal of most U.S. forces from Iraq in 2011, the drawdown of U.S. forces in Afghanistan beginning in 2012, and budgetary constraints. Congress halted further reductions in Army and Marine Corps end-strength in FY2017, providing slight end-strength increases for both Services that year. In FY2018 and FY2019, Congress again provided slight end-strength increases for the Marine Corps, while providing a more substantial increase for the Army. However, the Army did not reach its authorized end-strength of 483,500 in FY2018 or its authorized end-strength of 487,500 in FY2019, primarily due to missing enlisted recruiting goals. End-strength for the Air Force generally declined from 2004 to 2015, but increased from 2016 to 2019. End-strength for the Navy declined from 2002 to 2012, increased in 2013 and remained essentially stable through 2017; it increased again in 2018 and 2019. Authorized end-strengths for FY2019 and FY2020 are shown in Figure 1 . Discussion: In comparison to FY2019 authorized end-strengths, the Administration's FY2020 budget proposed a decrease for the Army (-7,500) and increases for the Navy (+5,100), Marine Corps (+100) and Air Force (+3,700). The administration's proposed decrease for the Army reflects the challenges the Army is facing in recruiting a sufficient number of new enlisted personnel to expand its force. As stated in the Army's military personnel budget justification document, \"Given the FY 2018 end strength outcome and a challenging labor market for military recruiting, the Army Active Component has decided to pursue a new end strength growth ramp. The Army has shifted to a more modest end strength growth ramp of 2,000 Soldiers per year, with end strength targets of 478,000 in FY 2019 and 480,000 in FY 2020. Beyond FY 2019, the steady 2,000 Solider per year growth increases Active Army end strength while maintaining existing high quality standards.\" Section 401 of the enacted bill approved end-strengths identical to the Administration request. References: Previously discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al. and similar reports from earlier years. Enacted figures found in P.L. 115-232 . CRS Point of Contact: Lawrence Kapp. Background: The authorized Selected Reserve end-strengths for FY2001, enacted the year prior to the September 11 terrorist attacks, were: Army National Guard (350,526), Army Reserve (205,300), Navy Reserve (88,900), Marine Corps Reserve (39,558), Air National Guard (108,022), Air Force Reserve (74,358), and Coast Guard Reserve (8,000). The overall authorized end-strength of the Selected Reserves has declined by about 6% over the past 18 years (874,664 in FY2001 versus 824,700 in FY2019). During this period, the overall decline is mostly attributed to reductions in Navy Reserve strength (-29,800). There were also smaller reductions in the authorized strength for the Army National Guard (-7,026), Army Reserve (-5,800), Marine Corps Reserve (-1,058), Air National Guard (-922), Air Force Reserve (-4,358), and Coast Guard Reserve (-1,000). Authorized end-strengths for FY2019 and FY2020 are shown in Figure 2 . Discussion: Relative to FY2019 authorized end-strengths, the Administration's FY2020 budget proposed decreases in the Army National Guard (-7,500), Army Reserve (-10,000), and Navy Reserve (-100), increases for the Air National Guard (+600) and Air Force Reserve (+100), and no change for the Marine Corps Reserve and Coast Guard Reserve. The Administration's proposed decrease for the Army National Guard and the Army Reserve reflected the challenges those reserve components have had in meeting their authorized strength. According to the Army National Guard (ARNG) FY2020 military personnel budget justification document: The ARNG fell short of the FY 2018 National Defense Authorization Act (NDAA) Congressionally authorized End Strength 343,500 by 8,296 Soldiers due to recruiting challenges, too few accessions, and to cover increased attrition losses in FY2018â¦The ARNG began addressing these issues and challenges in FY 2018 by ramping up the recruiting force, incentives programs, bonuses, and marketing efforts. While these efforts are expected to result in additional accessions in FY 2019, they will not be enough to meet the FY 2019 NDAA authorized End Strength of 343,500. The newly hired force will reach full production levels by end of the FY 2019 in order to meet the required accessions mission and a projected end strength of 336,000 in FY 2020 and continue the projected ramp to an end strength of 338,000 by the end of FY 2024. Similarly, the Army Reserve FY2020 Military Personnel budget justification document stated: In FY 2018, the Army Reserve fell short of its end strength objective by 10,689 Soldiers due to a challenging recruiting and retention environmentâ¦Prior to the FY 2020 President's Budget request, the Army Reserve recognized it would not meet its FY 2019 end strength goal of 199,500 and subsequently reduced its goal to a more achievable end strength of 189,250. The Army Reserve continues to set conditions for a successful and productive recruiting and retention environment in support of achieving an end strength of 189,250 by the end of FY 2019 and sustaining that level through FY 2020. Section 411 of the enacted bill approved end-strengths identical to the Administration request. References: Previously discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al. and similar reports from earlier years. For more on the Reserve Component see CRS Report RL30802, Reserve Component Personnel Issues: Questions and Answers , by Lawrence Kapp and Barbara Salazar Torreon, and CRS In Focus IF10540, Defense Primer: Reserve Forces , by Lawrence Kapp. CRS Point of Contact: Lawrence Kapp. Background: In general, the Department of Defense (DOD) offers certain reproductive health services in DOD-operated hospitals and clinicsâknown as military treatment facilities (MTFs)âor through civilian health care providers participating in TRICARE. Reproductive health services typically include counseling, therapy, or treatment for male or female conditions affecting \"fertility, overall health, and a person's ability to enjoy a sexual relationship.\" With regard to contraceptive services, DOD policy requires that all eligible beneficiaries have access to \"comprehensive contraceptive counseling and the full range of contraceptive methods.\" The policy also requires that DOD provide contraceptive services when \"feasible and medically appropriate,\" such as during: a health care visit before or during deployment; enlisted or officer training; annual well woman exams and reproductive health screenings; physical exams; or when referred after a periodic health assessment. With regard to fertility services, DOD offers: diagnostic services (e.g., hormone evaluation and semen analysis); diagnosis and treatment of illness or injury to the male or female reproductive system; care for physically caused erectile dysfunction; genetic testing; certain prescription fertility drugs; and certain assisted reproductive services for \"seriously or severely ill/injured\" active duty servicemembers. Active duty military personnel generally incur no out-of-pocket costs for DOD health care services. If a servicemember receives reproductive health services that are not directly provided, referred by a DOD or TRICARE provider, or otherwise covered by DOD, then they may be required to pay for those services. Other DOD beneficiaries may be subject to cost-sharing based on their TRICARE health plan, beneficiary category, and type of medical service received. Discussion: Currently, DOD offers comprehensive contraceptive counseling and a range of contraceptive methods. However, non-active duty beneficiaries may be subject to certain cost-sharing requirements depending on the type of contraceptive service rendered, the accompanying procedures or follow-up evaluations that may be clinically necessary, or health care provider nonparticipation in the TRICARE network. Other reproductive health services, such as cryopreservation of human gametes (i.e., sperm or eggs), are generally not offered or covered by TRICARE unless narrow criteria are met. While there are no provisions in the enacted bill relating to access to reproductive health services, the committee report ( S.Rept. 116-48 ) accompanying the Senate bill ( S. 1790 ) includes a similar reporting requirement as House Section 728. The committee report directs DOD to \"conduct a study on the incidence of infertility among members of the Armed Forces\" and provide a report to the House and Senate armed services committees by June 1, 2020. The study is to include the following elements: number of servicemembers diagnosed with a common cause of infertility; number of servicemembers whose infertility has no known cause; incidence of miscarriage among female servicemembers; infertility rates of female servicemembers, as compared to their civilian counterparts; demographic information on infertile servicemembers and potential hazardous environmental exposures during service; availability of infertility services for servicemembers who desire such treatment, including waitlist times at MTFs offering reproductive health services; criteria used by the military services to determine service-connection for infertility; and DOD policies for ensuring geographic stability for servicemembers receiving treatment for infertility. Not adopted were provisions to expand TRICARE coverage of specific reproductive health services to certain eligible beneficiaries. References: CRS In Focus IF11109, Defense Health Primer: Contraceptive Services , by Bryce H. P. Mendez. CRS Point of Contact: Bryce H.P. Mendez. Background: DOD operates a health care delivery system that serves approximately 9.5 million beneficiaries. The Military Health System (MHS) administers the TRICARE program, which offers health care services at military treatment facilities (MTFs) or through participating civilian health care providers. Historically, the military services have administered the MTFs, while the Defense Health Agency (DHA) administered the private sector care program of TRICARE. DHA is a combat support agency that enables the Army, Navy, and Air Force medical services to provide a medically ready force and ready medical force to combatant commands in both peacetime and wartime. In 2016, Congress found that the organizational structure of the MHS could be streamlined to sustain the \"medical readiness of the Armed Forces, improve beneficiaries' access to care and the experience of care, improve health outcomes, and lower the total management cost.\" Section 702 of the FY2017 NDAA ( P.L. 114-328 ) directed significant reform to the MHS and administration of MTFs by October 1, 2018. Reforms include: transfer of administration and management of MTFs from each respective service surgeon general to the DHA Director; reorganization of DHA's internal structure; and redesignation of the service surgeons general as principal advisors for their respective military service, and as service chief medical advisor to the DHA. In June 2018, DOD submitted its implementation plan to Congress. The implementation plan details how DOD is to reform the MHS to a \"streamlined organizational model that standardizes the delivery of care across the MHS with less overhead, more timely policymaking, and a transparent process for oversight and measurement of performance.\" Congress later revised the MHS reform mandate by further clarifying certain tasks relating to the transfer of MTFs, the roles and responsibilities of the DHA and the service surgeons general, and by extending the deadline for implementing reform efforts to September 30, 2021. DOD later revised its plan to accelerate certain tasks. On October 1, 2019, the military services transferred the administration and management of their U.S.-based MTFs to the DHA. The military services are to continue to administer their overseas MTFs until transfer to the DHA in 2020â2021. Discussion: The enacted bill includes a number of provisions clarifying certain responsibilities for DHA and other medical entities with service-specific responsibilities, such as administering and managing MTFs, providing health service support to combatant commanders, performing medical research, recruiting and retaining medical personnel, and establishing military-civilian partnerships. Organizational Management . Section 711 of the enacted bill amends 10 U.S.C. Â§1073c to clarify the qualifications of the DHA assistant director and the deputy assistant directors, and allow DOD to reassign certain civil service employees from a military department to a DOD component, or vice-versa. The provision also adds the following to DHA's existing roles and responsibilities: provision of health care; clinical privileging and quality of care programs; MTF capacities to support clinical currency and readiness standards; and coordination with the military services for joint staffing. Section 712 of the enacted bill clarifies the roles and responsibilities of the service surgeons general, to include: support to combatant commanders for operational and deployment requirements; support to DHA by assigning military medical personnel to MTFs; development of combat medical capabilities; and medical readiness of the Armed Forces. In 2018, Congress directed DOD to consolidate most of its medical research programs under the DHA. While the military services are to retain certain medical research responsibilities, the DHA is to be responsible for coordinating all research, development, test, and evaluation (RDT&E) funds appropriated to the defense health program (DHP), including the congressionally-directed medical research programs (CDMRP). The U.S. Army Medical Research and Materiel Command (USAMRMC) administers the CDMRP and executes a variety of RDT&E funds appropriated to the Department of the Army, DHP, and other DOD-wide operation and maintenance accounts. USAMRMC executes most of the annual DHP RDT&E. In FY2017, USAMRMC executed approximately 76% ($377.5 million) of the total DHP RDT&E funds. As of June 1, 2019, USAMRMC restructured and realigned its responsibilities under two separate DOD entities: the DHA and Army Futures Command. Depending on the research mission (DHP requirements vs. service-specific requirements), USAMRMC resources were also reallocated accordingly. Section 737 of the enacted bill directs the Secretary of Defense to retain certain manpower and funding resources with USAMRMC. The provision requires USAMRMC manpower and funding to be at a baseline of no less than \"the level of such resources as of the date of the enactment of this Act until September 30, 2022.\" On October 1, 2022, DOD is to: (1) transfer USAMRMC resources programmed to the Army's research, development, test, and evaluation account to the DHP; and (2) maintain USAMRMC as a \"Center of Excellence for Biomedical Research, Development and Acquisition Management.\" Military Medical Personnel . DOD's budget request for FY2020 includes a proposal to reduce its active duty medical force by 13% (14,707 personnel) in order to maintain a workforce that is \"appropriately sized and shaped to meet the National Defense Strategy requirements and allow the MHS to optimize operational training and beneficiary care delivery.\" Compared to FY2019 levels, the Army would have the largest reduction in medical forces (-16%), followed by the Air Force (-15%), and the Navy (-7%). DOD's initial plan to implement these reductions include: (1) transferring positions (also known as billets) from the MHS to new health service support positions in deployable or warfighting units, military service headquarters, or combatant commands; (2) transferring billets from the MHS to the military departments for repurposing as nonmedical assets; and (3) converting certain military billets to civilian billets. Section 719 of the enacted bill limits DOD actions to reduce or realign its active duty medical force until certain internal reviews, analyses, measurements, and outreach actions are conducted within 180 days of enactment and at least 90 days after a report to the House and Senate armed services committee on such actions have been provided. The report is to include also the department's plan to reduce or realign its military medical force. In addition, the provision contains certain exceptions that allow DOD to proceed with reducing or realigning certain positions. The exceptions are: administrative billets assigned to a service medical department that has been vacant since at least October 1, 2018; nonclinical billets that were identified in the President's FY2020 budget submission and not to exceed a total of 1,700; and service medical department billets solely assigned to a headquarters office and not dually assigned to support a deployable medical unit. Civilian Partnerships . The MHS states that its \"success depends on building strong partnerships with the civilian health care sector.\" As a high-priority initiative, the MHS maintains numerous partnerships with civilian health care organizations, academic institutions, and research entities to enhance or supplement military medical readiness and deliver the health entitlements authorized in chapter 55 of Title 10, U.S. Code. Section 740 of the enacted bill authorizes DOD to conduct a pilot program to improve medical surge capabilities of the National Disaster Medical System and interoperability with certain civilian health care organizations and other federal agencies. If exercised by the Secretary of Defense, pilot program sites are to be located \"in the vicinity of major aeromedical and other transport hubs and logistics centers of the Department of Defense.\" Section 751 of the enacted bill directs DOD to study existing military-civilian integrated health delivery systems and the activities conducted that promote value-based care, measurable health outcomes, patient safety, access to care, critical wartime readiness skills, and cost. The provision requires DOD to submit a report to the House and Senate armed services committees, within 180 days of enactment, on the study's findings and a plan for further development of military-civilian health partnerships. References: Previously discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al.; CRS In Focus IF11273, Military Health System Reform , by Bryce H. P. Mendez; CRS Report WPD00010, Military Health System Reform , by Bryce H. P. Mendez; CRS Insight IN11115, DOD's Proposal to Reduce Military Medical End Strength , by Bryce H. P. Mendez; and CRS Report R45399, Military Medical Care: Frequently Asked Questions , by Bryce H. P. Mendez. CRS Point of Contact: Bryce H.P. Mendez. Background: The characterization of service when a servicemember is discharged, as well as awards received and length of service, may affect eligibility for certain veterans' benefits, employment opportunities, and some government programs. If a servicemember believes a service record's information is incorrect or the servicemember alleges an injustice, two statutorily established entities exist for addressing these matters: a board of correction of military records (BCMR) and a discharge review board (DRB). Each armed service has a BCMR and DRB. A BCMR provides an administrative process for military personnel to request record corrections and payment of monetary claims associated with a record correction. An applicant to a BCMR must request a record correction within three years of discovering an alleged error or injustice. A DRB provides an administrative process for former servicemembers to request changes to the reason for discharge or the characterization of service when discharged, but any monetary claim associated with a change must be presented to a BCMR. An application for review must be made to A DRB within 15 years of the discharge. A subsequent change in service policy has no effect on a preceding discharge unless the new policy is retroactive or materially different in a way that would substantially enhance a servicemember's rights and likely invalidate the reason for discharge or characterization of service. Statute requires a DRB to give liberal consideration to an application in which post-traumatic stress syndrome (PTSD), traumatic brain injury (TBI), or mental health conditions typically associated with combat operations may have been a factor in the discharge decision. The liberal consideration requirement equally applies to discharge reviews in which sexual assault or harassment caused PTSD, TBI, or mental health conditions that may have been a factor in the basis for the discharge decision. Discussion: The enacted bill includes 6 out of 13 proposed provisions discussed above: three addressing the oversight and operations of a DRB and BCMR; two addressing PTSD, TBI, or other trauma mental health conditions; and one addressing separations for homosexual conduct. Oversight and Operations. Section 522 of the enacted bill reduces the number of required DRB members from five to three. If overall service review agency personnel requirements remain unchanged, reducing the number of DRB members and reallocating the previously required fourth and fifth members to new DRBs could presumably increase the number of DRBs available. Section 523 of the enacted bill creates a new entity, and capacity, for discharge review appeals and new reporting requirements for discharge review appeals data. The provision includes a Senate amendment that requires the Secretary of Defense to establish the appeals process based on certain parameters. Section 524 of the enacted bill amends 10 U.S.C. Â§1559 to extend previously authorized restrictions on reducing personnel levels at service review agencies until December 31, 2025. The provision also requires each Service Secretary to report to Congress his or her plan to reduce application backlogs and maintain personnel resources at a review agency. Post-Traumatic Stress Disorder (PTSD), Traumatic Brain Injury (TBI), or Other Trauma Mental Health Conditions. Section 521 of the enacted bill requires a DRB or BCMR to obtain a medical opinion from specified health care professionals on two types of cases. For cases based in whole or in part on PTSD or TBI related to combat, a BCMR or DRB is required to seek advice and counsel from a psychiatrist, psychologist, or social worker with training in PTSD, TBI, or other trauma treatment. For cases based in whole or in part on PTSD or TBI related to sexual trauma, intimate partner violence, or spousal abuse, a DRB or BCMR is required to seek advice and counsel from a psychiatrist, psychologist, or social worker with training PTSD, TBI, or other trauma treatment for these types of cases. Section 525 of the enacted bill amends statutorily mandated training for BCMR and DRB members to include curricula on sexual trauma, intimate partner violence, spousal abuse, and the various responses to these events. Separations for Homosexual Conduct. Section 527 of the enacted bill removes the presumption of administrative regularity that a previous discharge for homosexual conduct was correct and proper. Eliminating this presumption relieves the applicant of the burden to show by substantial evidence that a discharge was not correct or not proper. This provision allows a DRB to review and change, upon request and if found appropriate, the characterization of service for a servicemember originally discharged based on sexual orientation. If an application for review of a discharge based on sexual orientation is denied, the provision establishes a discretionary appeal process consistent with existing DRB procedures. References: CRS Report R43928, Veterans' Benefits: The Impact of Military Discharges on Basic Eligibility , by Sidath Viranga Panangala . CRS Point of Contact: Alan Ott. Background: Over the past several decades, Congress has been concerned with improving the Defense Commissary Agency (DeCA) system, mandating 12 reports or studies between 1989 and 2015 that considered the idea of consolidating the three military exchanges and the commissary agency. Recent reform proposals have sought to reduce DeCA's reliance on appropriated funds without compromising patrons' commissary benefits or reducing the revenue generated by DOD's military exchanges, which are nonappropriated fund (NAF) entities that fund morale, welfare, and recreation (MWR) facilities on military installations. However, 10 U.S.C. Â§2482 prohibits the Defense Department from undertaking consolidation without new legislation. Section 627 of the FY2019 NDAA ( P.L. 115-232 ) required the Secretary of Defense to conduct a study to determine the feasibility of consolidating commissaries and military exchange entities into a single defense resale system. The study, The Department of Defense Report on the Development of a Single Defense Resale System , April 29, 2019, concluded that the benefits of consolidating DeCA and the military exchanges into one defense resale entity far outweighed the costs. This DOD study \"projected net savings of approximately $700Mâ$1.3B of combined appropriated and nonappropriated funding over a five-year span, and recurring annual savings between $400M-$700M thereafter.\" Opponents of consolidation maintain that DOD is moving forward without considering the risk that consolidation could cost more than anticipated and fail to result in projected savings in operational costs. This could result in higher prices for patrons and curtail support for MWR programs. In the FY2019 NDAA, Congress authorized $1.3 billion for DeCA to operate 236 commissary stores on military installations worldwide, employing a workforce of over 12,500 civilian full-time equivalents (FTE). Discussion: Section 633 of the enacted bill adopts House Section 631. The enacted provision requires the Government Accountability Office (GAO) to review DOD's business case analysis (pricing, sales, measuring customer savings, timetable for consolidation, etc.) before merging the various resale entities into a single entity. Elements of the GAO report is to include data on the financial viability of a single defense resale entity and the ability of commissaries and exchanges to support MWR programs after consolidation. The enacted provision directs that GAO provide an interim report no later than March 1, 2020, and a final report no later than June 1, 2020. The Senate-passed bill had no similar provision. Section 632 of the House-passed bill would have required a report to Congress by the Defense Secretary regarding the management practices of military commissaries and exchanges no later than 180 days after enactment. This report would have included \"a cost-benefit analysis with the goals of reducing the costs of operating military commissaries and exchanges by $2,000,000,000 during fiscal years 2020 through 2024\" while not raising costs for patrons. The Senate-passed bill had no similar provision. Section 632 was not adopted in the enacted bill. Section 641 of the enacted bill adopts House Section 634. The enacted provision amends section 1065 of Title 10, U.S. Code, to extend MWR privileges to Foreign Service Officers on mandatory home leave by permitting the use of military lodging effective January 1, 2020. The Senate-passed bill had no similar provision. Section 631 of the enacted bill adopts Senate Section 641. The enacted provision requires the Under Secretary of Defense for Personnel and Readiness (USD[P&R]) to coordinate with the DOD Chief Management Officer to maintain oversight of the business transformation efforts. This provision also requires a DOD executive resale board to advise the USD(P&R) on the implementation of sustainable, complementary operations of the defense commissary system and the exchange stores system. The enacted provision also requires DOD to \"field new technologies and best business practices for information technology for the defense resale system\" and \"implement cutting-edge marketing and advertising opportunities.\" This provision also amends Section 2483(b) of Title 10, U.S. Code, to allow DOD to include advertising commissary sales on materials available within commissary stores and at other on-base locations in the operating expenses of defense commissaries. Section 642 of the Senate-passed bill would have amended section 2483(c) of Title 10, U.S. Code, to authorize fees collected by DeCA on services provided to secondary patron groups (like DOD contactors) to offset commissary operating costs. The enacted bill did not adopt this provision. Section 632 of the enacted bill adopts Senate Section 643. The enacted provision requires commissary stores to procure locally sourced products such as dairy products, fruits, and vegetables as available while maintaining mandated patron savings. The House-passed bill had no similar provision. References: CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , section on \"Defense Commissary System\" and similar reports from earlier years; and CRS In Focus IF11089, Defense Primer: Military Commissaries and Exchanges , by Kristy N. Kamarck and Barbara Salazar Torreon. CRS Point of Contact: Barbara Salazar Torreon. Background: Throughout the history of the Armed Forces, Congress has used its constitutional authority to establish criteria and standards for individuals to be recruited, advance through promotion, and be separated or retired from military service. DOD and Congress have established some of these criteria through policy and law based on demographic characteristics such as race, sex, and sexual orientation. In the past few decades there have been rapid changes to certain laws and policies regarding diversity, inclusion, and equal opportunity â in particular authorizing women to serve in combat arms occupational specialties and the inclusion of lesbian, gay, bisexual, and transgender (LGBT) individuals. Some of these changes remain contentious and face continuing legal challenges. Discussion: In the FY2009 NDAA ( P.L. 110-417 ), Congress authorized the creation of the Military Leadership Diversity Commission (MLDC). Following that effort, in 2012, DOD developed and issued a five-year Diversity and Inclusion Strategic Plan . In 2013, as part of the FY2013 NDAA ( P.L. 112-239 ), Congress required DOD to develop and implement a plan regarding diversity in military leadership. The House bill includes several provisions that would address diversity and inclusion, while the Senate bill has none. Section 526 of the House bill would require DOD to design and implement a five-year strategic plan that is consistent with the 2018 National Military Strategy beginning on January 1, 2020. Section 529 of the enacted bill adopts the House provision and requires DOD to implement the new strategic plan within one year of enactment. Existing law requires DOD to conduct surveys on racial and gender issues. Section 594 of the House bill would require that workplace and equal opportunity, command climate, and workplace and gender relations (WGR) surveys ask respondents whether they have ever experienced supremacist activity, extremist activity, racism, or anti-Semitism.Â A modified provision was adopted in the enacted bill, which requires questions be included in appropriate surveys on whether respondents experienced, witnessed, or reported extremist activity. The enacted provision does not define extremist activity or specify the frequency for such survey questions. DOD has recently initiated a number of shifts in policy with regard to individuals who identify as transgender. Current policy, which went into effect on April 12, 2019, disqualifies any individual from appointment, enlistment, or induction into the service if they have a history of cross-sex hormone therapy or sex reassignment or genital reconstruction surgery. The policy also disqualifies individuals with a history of gender dysphoria unless they were stable in their biological sexÂ for 36 consecutive months prior to applying for admission into the Armed Forces. However, the policy allows for transgender persons to \"seek waivers or exceptions to these or any other standards, requirements, or policies on the same terms as any other person.\" Those individuals in the service who initially seek military medical care after the effective date of the policy may receive counseling for gender dysphoria and may be retained without a waiver if (1) a military medical provider has determined that gender transitionÂ is not medically necessary to protect the health of the individual; and (2) the member is willing and able to adhere to all applicable standards associated with his or her biological sex. Section 597 of the House bill would have required DOD to submit an annual report on the number of servicemembers who sought a waiver prior to accession or while in service on the basis of a transgender-related condition. Section 596 of the enacted bill adopts the House provision and includes clarifying language as to how data elements should be reported. It also requires DOD to protect personally identifiable and health information of members. This reporting requirement expires in 2023. In addition, the conference report accompanying the enacted bill states, In determining whether an applicant with a disqualifying diagnosis of gender dysphoria or history of gender transition treatment or surgery merits a waiver to permit his or her service in the military, the conferees encourage Service-designated waiver authorities to consider such a waiver under the same circumstances as they would for an applicant who is not transgender, but has been diagnosed with analogous conditions or received analogous treatments, presuming the individual meets all other standards for accession. Entry into the Armed Forces by enlistment or appointment (officers) requires applicants to meet certain physical, medical, mental, and moral standards. While some of these standards are specified in law (e.g., 10 U.S.C. Â§504), DOD and the Services generally establish these standards through policy and regulation. The Services may require additional qualification standards for entry into certain military occupational specialties (e.g., pilots, special operations forces). By law, qualification standards for military career designators are required to be gender-neutral. Section 530B would require that service entry standards account only for the ability of an individual to meet gender-neutral occupational standards and could not include any criteria relating to the \"race, color, national origin, religion, or sex (including gender identity or sexual orientation) of an individual.\" This provision was not adopted. Women were historically prohibited from serving in certain combat roles by law and policy until December 3, 2015, when the Secretary of Defense opened all combat roles to women who can meet gender-neutral standards. Entry level and occupational-specific training has been gender integrated across the military services, with the exception of Marine Corps basic training (boot camp). In 2019, the Marines graduated the first gender-integrated boot camp class at Marine Recruit Depot Parris Island in South Carolina. In a statement to Congress, Lieutenant General David Berger noted that there were no significant variations in the performance of gender-integrated units relative to gender-segregated units. Section 561 of the House bill would prohibit gender segregated Marine Corps recruit training at Marine Corps Recruit Depot Parris Island no later than five years after the date of enactment, and at Marine Corps Recruit Depot San Diego no later than eight years after the date of enactment. Section 565 of the enacted bill adopts this provision. In addition, section 1099I would require the Armed Forces components to share lessons learned and best practices on the progress of their gender integration implementation plans as recommended by the Defense Advisory Committee on Women in the Services (DACOWITS). Finally, section 1099J would require the military departments to examine successful strategies for recruitment and retention of women in foreign militaries, as recommended by DACOWITS. The final bill did not adopt either of these provisions (sections 1099I and 1099J). References: CRS Report R44321, Diversity, Inclusion, and Equal Opportunity in the Armed Services: Background and Issues for Congress , by Kristy N. Kamarck , and CRS Insight IN11086, Military Personnel and Extremism: Law, Policy, and Considerations for Congress , by Kristy N. Kamarck. CRS In Focus IF11147, Defense Primer: Active Duty Enlisted Recruiting , by Lawrence Kapp. CRS Point s of Contact : Kristy N. Kamarck. Background : The Family Advocacy Program (FAP) is the congressionally-mandated program within DOD devoted to \"clinical assessment, supportive services, and treatment in response to domestic abuse and child abuse and neglect in military families.\" As required by law, the FAP provides an annual report to Congress on child abuse and neglect and domestic abuse in military families. Approximately half of military servicemembers are married and there are approximately 1.6 million dependent children across the active and reserve components. According to DOD statistics, in FY2018, the rate of reported child abuse or neglect in military homes was 13.9 per 1,000 children, an increase from the previous year's rate of 13.7 per 1,000 children. There were 26 child abuse-related fatalities, relative to 17 fatalities in FY2017. The rate of reported spousal abuse in FY2018 was 24.3 per 1,000 military couples, a decrease from the FY2017 rate of 24.5 per 1,000 couples â with 13 spouse abuse fatalities recorded. Since FY2006, DOD has been collecting data on unmarried intimate partner abuse. In FY2018, there were 1,024 incidents of intimate partner abuse that met criteria involving 822 victims and 2 fatalities. Discussion: A special victim counsel (SVC) is a judge advocate or civilian attorney who satisfies special training requirements and provides legal assistance to victims of sexual assault throughout the military justice process. Section 542 of the House bill and Section 541 of the Senate bill would expand SVC staffing and authorize SVC services for military-connected victims of domestic violence. The Administration has opposed this measure, stating that it would \"decrease access for sexual assault victims to Special Victims' Counsels (SVCs)/Victims' Legal Counsels (VLCs), exacerbate already high caseloads for SVC/VLCs, and impose an unfunded mandate.\" The enacted bill adopts the Senate provision with an amendment that would require counsel to receive specialized domestic violence legal training, serve for a minimum of two years, and be supported by sufficiently trained paralegals. DOD is required to provide a report on planned implementation no later than 120 days after enactment. Transitional compensation is a monetary benefit authorized under 10 U.S.C. Â§1059 for dependent family members of servicemembers or of former servicemembers who are separated from the military due to dependent-abuse offenses. One of the motivating arguments for establishing the transitional compensation benefit is that it provides a measure of financial security to spouses or former spouses. Eligible recipients receive monthly payments for no less than 12 months and no more than 36 months at the same rate as dependency and indemnity compensation (DIC). While in receipt of transitional compensation, dependents are also entitled to military commissary and exchange benefits, and may receive dental and medical care, including mental health services, through military facilities as TRICARE beneficiaries. Section 621 of the House bill and Section 601 of the Senate bill are similar provisions that would expand the authority of the Secretary concerned to grant exceptional transitional compensation in an expedited fashion. This would allow dependents who are victims of abuse to start receiving compensation while the offending servicemember is still on active duty and as early as the date that an administrative separation is initiated by a commander. In addition, the House Report directs DOD to provide a comprehensive review and assessment of the transitional compensation program. Section 621 of the enacted bill adopts this provision. When a servicemember has allegedly committed an act of domestic violence, a commander can issue a military protective order (MPO) to a servicemember that prohibits contact between the alleged offender and the domestic violence victim. A servicemember must obey an MPO at all times, whether inside or outside a military installation, or may be subject to court martial or other punitive measures. By law, a military installation commander is required to notify civilian authorities when an MPO is issued, changed, and terminated with respect to individuals who live outside of the installation. House Section 543 would amend 10 U.S.C. Â§1567a to require notification of civilian authorities no later than seven days after issuing an order, regardless of whether the member resides on the installation. The provision would also require commanders to notify the receiving command in the case of a transfer of an individual who has been issued an MPO. DOD would also be required to track and report the number of orders reported to civilian authorities annually. Section 543 of the enacted bill adopts the House provision and requires annual reports through 2025. While MPOs are typically not enforceable by civilian authorities, a civil protection order (CPO), by law, has full force and effect on military installations. House Section 544 and Senate Section 556 would require DOD to establish policies and procedures for registering CPOs with military installation authorities. Section 550A of the enacted bill adopts this provision. House Section 550F would codify an existing DOD policy to report to the National Instant Criminal Background Check System (NICS) servicemembers who are prohibited from purchasing firearms due to a domestic violence conviction in a military court. This section would also require DOD to study the feasibility of creating a database of military protective orders issued in response to domestic violence and the feasibility for reporting such MPOs to NICS. Section 550E of the enacted bill adopts the House provision, but removes the section that would amend the National Instant Criminal Background Check System Improvement Amendments Act of 2007 (34 U.S.C. Â§40911(b)) with respect to DOD reporting. It also expands the matters to be explored in the feasibility report. References: For information on Special Victims' Counsel and Military Protective Orders, see CRS Report R44944, Military Sexual Assault: A Framework for Congressional Oversight , by Kristy N. Kamarck and Barbara Salazar Torreon. CRS Point of Contact : Kristy N. Kamarck and Alan Ott. Background: The Medal of Honor (MoH) is the highest award for valor \"above and beyond the call of duty\" that may be bestowed on a U.S. servicemember. In recent years, the MoH review process has been criticized by some as being lengthy and bureaucratic, which may have led to some records being lost and conclusions drawn based on competing eyewitness and forensic evidence. Reluctance on the part of reviewing officials to award the MoH retroactively or to upgrade other awards is generally based on concern for maintaining the integrity of the award and the awards process. This reluctance has led many observers to believe that the system of awarding the MoH is overly restrictive and that certain individuals are denied earned medals. As a result, DOD periodically reviews inquiries by Members of Congress and reevaluates its historical records. Systematic reviews began in the 1990s for World War II records when African-American units remained segregated and whose valorous unit and individuals' actions, along with others, may have been overlooked. That effort resulted in more than 100 soldiers receiving the MoH, the majority of which were posthumously awarded. On January 6, 2016, DOD announced the results of its year-long review of military awards and decorations. This included review of the timeliness of the MoH process and review by all the military departments of the Distinguished Service Cross, Navy Cross, Air Force Cross, and Silver Star Medal recommendations since September 11, 2001, for actions in Iraq and Afghanistan. Subsequently, the MoH was awarded to the first living recipient from the Iraq War, Army Staff Sgt. David Bellavia, on June 25, 2019. Discussion: Section 583 of the House-passed bill would require DOD to review the service records of certain servicemembers who fought in World War I (WWI) to determine whether they should be posthumously awarded the MoH. Specifically, the provision would require record reviews of certain African-American, Asian-American, Hispanic-American, Jewish-American, and Native-American veterans who were recommended for the MoH or who were the recipients of the Distinguished Service Cross, Navy Cross, or French Croix de Guerre with Palm. Four soldiers, one Hispanic-American (Private David Barkley Cantu) and three Jewish-American veterans (First Sergeant Sydney Gumpertz, First Sergeant Benjamin Kaufman, and Sergeant William Sawelson), were awarded Medals of Honor at the conclusion of WWI. In 1991, President George H.W. Bush awarded the MoH posthumously to Corporal Freddie Stowers, who became the first African-American recipient from WWI after the Army's review of his military records. Later, the FY2015 NDAA ( P.L. 113-291 ) authorized posthumous award of the MoH to Private Henry Johnson, an African-American veteran, and Sgt. William Shemin, a Jewish-American veteran, for valor during WWI. Proponents of the Pentagon review in Section 583 point to similar reviews for minority groups who served in other conflicts from World War II to the present. Some were later awarded the MoH, the majority of which were posthumously awarded. According to the Congressional Budget Office (CBO), \"a remote possibility exists\" that one of the veterans honored under Section 583 could have a surviving widow who could potentially receive expanded health benefits or increased survivor benefits. Section 584 of the enacted bill adopts this section. If a Secretary concerned determines, based upon the review under that the award of the MoH to a certain World War I veteran is warranted, such Secretary shall submit to the President a recommendation that the President award the MoH to that veteran. This review shall terminate not later than five years after the date of the enactment of this Act. Section 584 of the House-passed bill would have waived the time limitation and authorize the posthumous award of the MoH to Army Sergeant First Class (SFC) Alwyn Cashe for acts of valor in Samarra, Iraq, during Operation Iraqi Freedom. SFC Cashe led recovery efforts and refused medical treatment until his men were evacuated to safety after an improvised explosive device struck their vehicle and caught fire. Cashe's actions saved the lives of six of his soldiers. He later succumbed to his wounds. This provision was not adopted in the enacted bill. Section 1099L of the House-passed bill would have allowed the nation to honor the last surviving MoH recipient of WWII by permitting the individual to lie in honor in the Capitol rotunda upon death. This provision was not adopted in the enacted bill. Section 585 of the Senate-passed bill would have waived the time limitation in section 7274 of title 10, United States Code, and authorize the award of the MoH to Army Major John J. Duffy for acts of valor in Vietnam on April 14 and 15, 1972, for which he was previously awarded the Distinguished Service Cross. Section 583 in the enacted bill adopts this section waiving the time limitation so that the President may award the Medal of Honor under section 7271 of title 10 U.S. Code to John J. Duffy for the acts of valor in Vietnam. References: Previously discussed in the \"Medal of Honor\" section of CRS Report R44577, FY2017 National Defense Authorization Act: Selected Military Personnel Issues , by Kristy N. Kamarck et al. and similar reports from earlier years; CRS Report 95-519, Medal of Honor: History and Issues , by Barbara Salazar Torreon; and the Congressional Budget Office, Cost Estimates for H.R. 2500 , National Defense Authorization Act for Fiscal Year 2020, June 19, 2019. CRS Point of Contact: Barbara Salazar Torreon. Background: Approximately 2.1 million members of the Armed Forces across the active and reserve components have an additional 2.7 million \"dependent\" family members (spouses and/or children). Slightly over 40% of servicemembers have children and approximately 50% are married. The military provides a number of quality of life programs and services for military families as part of a servicemember's total compensation and benefit package. These include family life, career, and financial counseling, childcare services and support, and other MWR activities. The general motivation for providing these benefits is to improve the recruitment, retention, and readiness of military servicemembers. Discussion: Spouse Employment and Education. Section 1784 of Title 10, U.S. Code , requires the President to order such measures as necessary to increase employment opportunities for military spouses. Active duty servicemembers conduct frequent moves to military installations across the globe. For working spouses, this sometimes requires them to establish employment in a new state that has different occupational licensing requirements than their previous state. The FY2018 NDAA ( P.L. 115-91 Â§556) authorized the reimbursement of certain relicensing costs up to $500 for military spouses following a permanent change of station from one state to another with an end date of December 31, 2022. Section 628 of the House bill would have raised the maximum reimbursement to $1,000 and would require the Secretary of Defense to perform an analysis of whether that amount is sufficient to cover average costs. Section 576 of the Senate bill would not have raised the maximum reimbursement amount; however, it would extend the authority to December 31, 2024. Section 577 of the enacted bill adopts the House provision and extends the authorization for this benefit to December 31, 2024. Both bills also had similar provisions (House Section 524 and Senate Section 577) that sought to improve interstate license portability through DOD funding support for the development of interstate compacts. Both bills would have capped funding support for each compact at $1 million, while the Senate bill would have capped the total program funding at $4 million. Section 575 of the enacted bill adopts the House provision with an amendment that would require the Secretary of Defense to enter into a cooperative agreement with the Council of State Governments to assist with the funding and development. DOD's My Career Advancement Account Scholarship Program (MyCAA), launched in 2007, currently provides eligible military spouses up to $4,000 in financial assistance to pursue a license, certification, or associate's degree in a portable career field. Eligible spouses are those married to military servicemembers on active duty in pay grades E-1 to E-5, W-1 to W-2 and O-1 to O-2. During the pilot phase of the program, the benefit was offered to all spouses and funds were also available for a broader range of degrees and certifications, including bachelor's and advanced degrees. However, due to concerns about rising costs and enrollment requests, DOD has since reduced the maximum benefit amount (from $6,000 to $4000), limited eligibility to spouses of junior servicemembers, and restricted the types of degrees and career fields that were eligible for funding. Section 623 of the House bill would have allowed continued eligibility for spouses when the member is promoted above those pay grades after the spouse has begun a course of instruction. Section 580B of the House bill would have expanded the qualifying degrees and certifications to include non-portable career fields and occupations. Finally, Section 580C would have expanded the eligible population to all enlisted spouses and would also have provided eligibility for Coast Guard spouses to participate in the DOD program. The enacted bill adopts all three of these House provisions, expanding eligibility for more military spouses and a broader range of certifications. Parents and Children. DOD operates the largest employer-sponsored childcare program in the United States, serving approximately 200,000 children of uniformed servicemembers and DOD civilians, and employing over 23,000 childcare workers. DOD offers subsidized programs on and off military installations for children from birth through 12 years, including care on a full-day, part-day, short-term, or intermittent basis. Title 10 U.S.C. Â§1798 authorizes fee assistance for civilian childcare services. Section 625 of the House bill would have specifically authorized fee assistance for survivors of members of the Armed Forces who die \"in line of duty while on active duty, active duty for training, or inactive duty for training.'' DOD policy currently authorizes childcare for \"surviving spouses of military members who died from a combat related incident.\" Section 624 of the enacted bill amends the House provision to only authorize fee assistance for survivors of those who die \"in combat-related incidents in the line of duty.\" Section 629 of the House bill and Section 578 of the Senate bill would have expanded and attempted to clarify hiring authorities for military childcare workers. The House provision would also have required an assessment and report from DOD on the adequacy of the maximum fee assistance subsidy, the accessibility of childcare and spouse employment websites, and the capacity needs of installation-based childcare facilities. Finally, the same section sought to improve portability of background checks for childcare workers. It is common for military spouses to be employed as childcare workers, and frequent moves may require them to reapply and resubmit background check material at a new facility. Section 580 of the enacted bill adopts the House provision and includes language clarifying the direct hire authority for DOD childcare development centers to include family childcare coordinator services and school age childcare coordinator services. References: CRS Report R45288, Military Child Development Program: Background and Issues , by Kristy N. Kamarck. CRS Points of Contact: Kristy N. Kamarck. Background: DOD employs physicians and other medical personnel to deliver health care services to servicemembers in military treatment facilities (MTFs). Occasionally, however, patient safety events do occur and providers commit medical malpractice by rendering health care in a negligent fashion, resulting in the servicemember's injury or death. In the civilian health care market, a victim of medical malpractice may potentially obtain recourse by pursuing litigation against the negligent provider and/or his employer. A servicemember injured as a result of malpractice committed by an MTF health care provider, however, may encounter significant obstacles if attempting to sue the United States. In general, the Federal Tort Claims Act (FTCA) permits private parties to pursue certain tort claims (e.g., medical malpractice) against the United States. However, in 1950, the U.S. Supreme Court in the case of Feres v. United States recognized an implicit exception to the FTCAâthat the federal government is immunized from liability \"for injuries to servicemen where the injuries arise out of or are in the course of activity incident to service.\" This exception to tort liability is known as the Feres doctrine. Many lower federal courts have concluded that Feres generally prohibits military servicemembers from asserting malpractice claims against the United States based on the negligent actions of health care providers employed by the military. Over the past decade, Congress has held multiple hearings to assess whether to modify the Feres doctrine to allow servicemembers to pursue medical malpractice litigation against the United States. Congress has also considered several proposals to amend the FTCA to allow these tort claims. Discussion: The enacted bill does not abrogate the Feres doctrine, nor does it amend the FTCA to provide servicemembers the ability to litigate certain medical malpractice claims against the United States. Instead, enacted provisions focus on establishing an administrative claims process to compensate injured servicemembers and on conducting oversight of the Defense Department's clinical quality assurance program. Section 731 of the enacted bill authorizes the Secretary of Defense to \"allow, settle, and pay a claim against the United States for personal injury or death incident to the service of a member of the uniformed services that was caused by the medical malpractice of the Department of Defense health care provider.\" Under the provision, the Defense Secretary may establish an administrative claims process for servicemembers who have been injured or died as a result of medical malpractice committed by an MTF provider. Only an injured servicemember, or an authorized representative of a deceased or incapacitated servicemember, may file a claim within two years after a malpractice incident (three years if filed in calendar year 2020). For a substantiated claim, DOD may issue financial compensation, up to $100,000. If referred by the Defense Secretary, the Secretary of the Treasury may issue additional compensation in excess of $100,000. Within 180 days after enactment, the Defense Secretary is required to brief the House and Senate armed services committees on the status of developing and implementing the regulations for this authority. Typically, DOD conducts prospective, ongoing, and retrospective monitoring and assessment of its health care services through its Medical Quality Assurance (MQA) programs and clinical quality management activities. The Defense Health Agency and the Service medical departments administer these programs and activities, which are intended to \"ensure quality in healthcare throughout the MHS.\" Section 747 of the enacted bill directs GAO to assess the effectiveness of DOD's quality assurance program, including the use and monitoring of the National Practitioner Data Bank when hiring, retaining, and documenting adverse actions taken against DOD health care providers. GAO is to report their findings to the House and Senate armed services committees no later than January 1, 2021. References: CRS In Focus IF11102, Military Medical Malpractice and the Feres Doctrine , by Bryce H. P. Mendez and Kevin M. Lewis; and CRS Legal Sidebar LSB10305, The Feres Doctrine: Congress, the Courts, and Military Servicemember Lawsuits Against the United States , by Kevin M. Lewis. CRS Point of Contact: Bryce H.P. Mendez. Background: Congress has a long-standing congressional interest in military pay raises, as they relate to the overall cost of military personnel and to recruitment and retention of high-quality personnel to serve in the all-volunteer military. Section 1009 of Title 37, U.S. Code, codifies the formula for an automatic annual increase in basic pay that is indexed to the annual increase in the Employment Cost Index (ECI). The statutory formula stipulates that the increase in basic pay for 2020 will be 3.1% unless either (1) Congress passes a law to provide otherwise; or (2) the President specifies an alternative pay adjustment under subsection (e) of 37 U.S.C. Â§1009. Increases in basic pay are typically effective at the start of the calendar year, rather than the fiscal year. The FY2020 President's Budget requested a 3.1% military pay raise, equal to the statutory formula. Discussion: The House bill would have included two provisions that would address the military pay raise. Section 606 would have directed a 3.1% increase in basic pay. Section 607 would have directed that the statutory formula of 37 U.S.C. Â§1009 go into effect, also resulting in a 3.1% increase in basic pay, even if the President were to specify an alternate adjustment. The Senate bill did not contain a provision specifying an increase in basic pay; it would have left the 3.1% automatic adjustment provided by 37 U.S.C. Â§1009 in place. Section 609 of P.L. 116-92 specified a 3.1% increase in basic pay. References: For an explanation of the pay raise process and historical increases, see CRS In Focus IF10260, Defense Primer: Military Pay Raise , by Lawrence Kapp. Previously discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al. and similar reports from earlier years. CRS Point of Contact: Lawrence Kapp. Background: The military retirement system is a funded, noncontributory system that provides a monthly annuity after 20 qualifying years of service, or upon qualifying for a disability retirement. As of January 1, 2018, those joining the military and those who opted into the Blended Retirement System also receive a defined contribution from the federal government into the Thrift Savings Plan (TSP). Military retirees and their dependents are also eligible for other DOD benefits, including commissary and exchange shopping privileges, medical benefits, and space-available travel on military aircraft. Surviving spouses and other eligible beneficiaries may be eligible to receive a portion of the servicemember's retired pay after the member's death in retirement (if enrolled) or while on active duty (automatic eligibility). This benefit is called the Survivor Benefit Plan (SBP). In addition, military retirees and their dependents may be eligible for benefits from the VA, including Dependency and Indemnity Compensation (DIC), a monthly payment to beneficiaries whose spouse's death was related to a service-connected injury or condition. Discussion: Military retirees are paid from the Military Retirement Fund (MRF). Under the accrual accounting system, the DOD budget for each fiscal year includes a contribution to the MRF as a percentage of basic pay in the amount needed to cover future retirement costs. This percentageâcalled the normal cost percentage (NCP) âis determined by an independent, presidentially appointed, DOD Retirement Board of Actuaries. Estimated future retirement costs are modeled based on the past rates at which active duty military personnel stayed in the service until retirement and on assumptions regarding the overall U.S. economy, including interest rates, inflation rates, and military pay levels. Currently, the DOD Actuary calculates separate NCPs for the active and reserve components; however, by law the Actuary applies a single NCP across all of the military services. The conference report ( H.Rept. 115-404 ) accompanying FY2018 NDAA ( P.L. 115-91 ) contained a provision asking the GAO to evaluate whether the current method used to calculate DOD retirement contributions reflects estimated service retirement costs, and what effects, if any may result from calculating a separate NCP for each of the Services. The GAO's December 2018 report found that, due to differing continuation rates among the Services, \"the mandated single, aggregate contribution rate does not reflect service specific retirement costs.\" In particular, the analysis found that the probability of reaching 20 years of service was more than 3 times higher for the Air Force than the Marine Corps. Section 631 of the Senate bill would have changed how military retirement contributions are calculated, by requiring separate NCPs for each of the Services and components. Some analysts who have studied the issue have argued that this change would improve resource allocation efficiency, manpower decision-making, and accuracy in budget estimates at the service level. On the other hand, the GAO report notes that military service officials stated that their \"workforce decision making processes would not change.\" Section 655 of the enacted bill does not change the funding process, but requires the Secretary of Defense to deliver an implementation plan to the House and Senate armed services committees by April 1, 2020. DOD's plan would assume that the change in funding process would commence in FY2025. Following the death of a servicemember, certain beneficiaries may be eligible for survivor benefits from both DOD (SBP) and the VA (DIC). However, by law, surviving spouses who receive both annuities must have their SBP payments reduced by the amount of DIC they receive. This offset has sometimes been referred to as aÂ  widows' tax . The FY2018 NDAA ( P.L. 115-91 ) permanently authorized a payment called the called the Special Survivor Indemnity Allowance (SSIA) to such surviving spouses, to offset that reduction. The SSIA payment is adjusted annually to account for cost-of-living increases. In the past, to avoid the offset, some survivors have used the authority under 10 U.S.C. Â§1448(d)(2) to transfer the SBP benefit to dependent children. Section 630A of the House bill would have repealed the offset as well as the authority to provide the annuity to dependent children. Surviving spouses who had transferred the benefit would not have been able to have their eligibility for the benefit restored. Retroactive payments would not be authorized under this provision. SBP is also paid from the MRF. CBO estimates that the repeal would increase federal spending by $5.7 billion over a period of 10 years. Approximately 65,000 surviving beneficiaries are eligible to receive both SBP and DIC. Section 622 of the enacted bill phases out the requirement for an SBP-DIC offset over a period of three years, and repeals the optional SBP annuity for dependent children. References: CRS Report RL34751, Military Retirement: Background and Recent Developments , by Kristy N. Kamarck . CRS Report R45325, Military Survivor Benefit Plan: Background and Issues for Congress , by Kristy N. Kamarck and Barbara Salazar Torreon , CRS Insight IN11112, The Kiddie Tax and Military Survivors' Benefits , by Sean Lowry and Kristy N. Kamarck , CRS Report R40757, Veterans' Benefits: Dependency and Indemnity Compensation (DIC) for Survivors , by Scott D. Szymendera. CRS Legal Sidebar LSB10316, FY2020 NDAA Analysis: Elimination of Benefits Offset for Surviving Spouses and Related Legal Issues , by Mainon A. Schwartz. CRS Point of Contact : Kristy N. Kamarck. Background: Over the past decade, the issues of sexual assault and sexual harassment in the military have generated sustained congressional and media attention. Congress has required additional study, data collection, and reporting to determine the scope of the issue, expand protections and support services for victims, make substantial changes to the military justice system, and take other actions to enhance sexual assault prevention and response. Sexual assault and related sex offenses are crimes under the Uniform Code of Military Justice (UCMJ) and are prosecutable by court-martial. DOD's Sexual Assault Prevention and Response Office (SAPRO) oversees sexual assault policy and produces an annual report on sexual assault estimated prevalence rates and actual reporting. In FY2018, estimated sexual assault prevalence rates across DOD's active duty population were 6.2% for women and 0.7% for men. These estimated prevalence rates were higher for active duty women than the FY2016 of 4.3% while the rate for men remained close to the FY2016 rate of 0.6%. Discussion: The following discussion is split into four topic areas: Reporting and Accountability; Prevention and Response; Victim Services and Support; and Military Justice and Investigations. In March 2019, following a Senate Armed Services Committee hearing, the Acting Secretary of Defense established the Sexual Assault Accountability and Investigation Task Force (SAAITF). This task force made several recommendations for legislative action, some of which are reflected in sections of the House and Senate bills. Reporting and Accountability . Several provisions in the House and Senate bills would have offered support to congressional oversight. In the FY2015 NDAA, Congress called for the establishment of a 20-member Defense Advisory Committee on Investigation, Prosecution, and Defense of Sexual Assault in the Armed Forces (DAC-IPAD). The committee was established in 2016 and has since produced several studies. Section 548 of the House bill and Section 533 of the Senate bill would have extended the term of the DAC-IPAD for an additional five years. The House provision would have also expanded the scope of the committee's research to include exploring the feasibility of incorporating restorative justice models into the UCMJ. Section 535 of the enacted bill adopts the Senate provision and expands the scope of research as proposed in the House bill. Section 535 of the Senate bill would have required the committee to review and assess the relationship between race and ethnicity and the investigation, prosecution, and defense of sexual assault. In May 2019, the GAO reported that \"Blacks, Hispanics, and male servicemembers were more likely than Whites and female servicemembers to be the subjects of recorded investigations in all of the military services, and were more likely to be tried in general and special courts-martial.\" GAO also reported that differences in how the Services record information on race and ethnicity make it difficult to identify disparities. Section 540A of the House bill would have required DOD to conduct a review of racial, ethnic, and gender disparities across the entire military justice system (see also the \" Diversity and Inclusion \" section of this report). Section 540I of the enacted bill adopts the House provision and requires the DAC-IPAD to conduct the review for each fiscal year in which the committee assesses completed court-martial cases. Both bills (House Section 549 and Senate Section 534) would have required the Secretary of Defense to establish a 20-member \"Defense Advisory Committee for the Prevention of Sexual Misconduct\" with expertise in areas such as organizational culture, suicide prevention, implementation science, and the continuum of harm. This provision was adopted in the enacted bill. Section 540M of the enacted bill adopts a Senate provision requiring a GAO report on Armed Forces implementation of statutory requirements for sexual assault for FY2004âFY2019. Prevention and Response. Section 521 of the Senate bill would have required the Secretary of Defense and Secretaries of the military departments to promulgate policies \"to reinvigorate the prevention of sexual assault involving members of the Armed Forces.\" Elements of the required policy would include, (1) education and training on the prevention of sexual assault; (2) promoting healthy relationships; (3) empowering and enhancing the role of noncommissioned officers in the prevention of sexual assault (4) fostering social courage to promote interventions to prevent sexual assault; (5) addressing behaviors across the continuum of harm; (6) countering alcohol abuse, including binge drinking; and (7) other matters as the Secretary of Defense deems appropriate. The enacted bill adopts this provision. Senate Section 530 and House Section 550O would have ensured that Catch a Serial Offender (CATCH) Program information is not subject to Freedom of Information Act (FOIA) requests. According to SAPRO, \"CATCH allows sexual assault victims (Service members and adult dependents) to discover if the suspect in their restricted report may have also assaulted another person (a \"match\" in the CATCH website), and, having that knowledge, decide whether to convert their restricted report to unrestricted to initiate an investigation of the serial offender suspect.\" A sexual assault victim may submit a confidential restricted report and receive counseling and other services without notifying his or her commander or military investigative authorities. The report may later be converted to an unrestricted report , which does initiate an investigation. Section 530 would ensure that restricted reports to, or by the CATCH program, would not affect the report's status as restricted and thus would maintain victim confidentiality. Section 530 of the enacted bill adopts the Senate provision. Victim Services and Support . Both bills included provisions that would have expanded or enhanced the Special Victim Counsel (SVC) program. An SVC is a judge advocate or civilian attorney who meets special training requirements and provides legal assistance to victims of sexual assault throughout the military justice process. Based on victim surveys, there is substantial confidence and satisfaction with SVC services and support. Sections 541 and 542 of the Senate bill would expand SVC services to include cases of retaliation and would authorize services for military-affiliated victims of domestic violence when resources are available. House Section 542 would also expand SVC services to victims of domestic violence, establish minimum staffing levels, and require the creation of SVC paralegal positions. Sections 541 and 548 of the enacted bill adopt the Senate provisions and includes an amendment requiring specialized training in domestic violence for specified legal counsel and a report to Congress on resources needed to carry out the program. Both House and Senate bills would have also ensured that an SVC would be made available to a requesting victim within a certain amount of timeâ48 hours in the House bill (Section 550A), and 72 hours in the Senate version (Section 543). Section 542 of the enacted bill adopts the Senate provision for a 72-hour window. Finally, similar provisions in both bills (House Section 550C and Senate Section 544) would have required SVC training on state-specific criminal justice matters. Section 550C of the enacted bill adopts the House provision and adds \"protective orders\" to the list of topics for training. Another aspect of victim protection and support that appeared in both bills is the requirement for development of a safe to report policy (House Section 550 and Senate Sections 527 and 528). This policy, which has been implemented in some form at the military service academies, is intended to remove disincentives for alleged victims to report sexual assault incidents by protecting cadets and midshipmen from punishment for minor collateral misconduct violations that might be uncovered during an investigation. In response to the House provision, the Administration stated that such a policy \"would provide blanket immunity [to the alleged victim] and might have the effect of undermining the validity of a victim's allegations. Specifically, under this provision, victims might be subjected to allegations that the report was made merely to escape disciplinary or punitive action.\" It is not clear from existing data how prevalent it is for misconduct investigations to lead to sexual assault allegations or vice versa. However, survey data suggests that collateral misconduct may reduce reporting of sexual assault. According to active duty survey data for 2018, 34% of women and 26% of men who experienced a sexual assault did not report the assault because they \"thought they might get in trouble for something they had done or would get labeled a troublemaker.\" The final bill did not adopt the safe to report provision. Section 558 of the House bill would have required the Secretary of Defense to draft regulations on the consideration of a transfer of a military service academy student who is the victim of a sexual assault or related offense to another service academy. Section 555 of the enacted bill adopts the House provision and includes an amendment expanding options available to include enrollment in a Senior Reserve Officer Training Corps (SROTC) program. Regular active duty members who are victims of sexual assault have the ability to request a permanent change of station, or a change of unit or duty assignment at the same installation; however, there are generally no regulations that provide for transfer to another service (e.g., from the Navy to the Army). Service academy cadets and midshipmen may be offered the opportunity to change units (i.e., companies or squadrons) within the same academy; however, cross-service transfers are rare. The military service academies all have similar entry requirements based on physical, mental and moral standards; however, there are certain curriculum and military education requirements that are specific to the individual academies for each academic year and summer training period. As such, considerations for transfer may include the ability of the individual to qualify under another academy's standards and complete all requirements for commissioning within the four-year program, or the necessity of waivers for certain requirements . Finally, Section 550P in the House bill and Section 531 in the Senate bill would have addressed continued confidentiality of restricted reports if a sexual assault allegation is inadvertently disclosed to a third party who would normally be a mandatory reporter (e.g., commanding officers, supervisors, and law enforcement). Mandatory reporters are individuals who, when they receive information that a sexual assault has occurred, must report that information to military criminal investigative services. The enacted bill adopts the Senate provision. Military Justice and Investigations . Several provisions in the House and Senate bills sought to make changes to how disposition decisions are made in sex-related cases for military service academies and the total force. Section 538 of the House bill would have established a four-year pilot program at the military service academies, This pilot would have required the Secretary of Defense to establish an Office of the Chief Prosecutor, at the grade of O-7 or above, for the independent review and disposition of certain sex-related ( special victim ) offenses. Those who argue for taking decision-making outside of the chain of command contend that independent prosecutors are better equipped to make disposition decisions and that such an endeavor could improve victim confidence in the investigative and judicial process. For the 2017â2018 academic program year at the service academies, there were 67 unrestricted reports alleging sexual assault by or against cadets, midshipmen, or prep school students, and 55 investigations initiated during the APY. The Administration opposed this pilot program contending that it would, \"outsource authority for discipline,\" and \"undermines commander accountability and the chain of command relationship.\" The provision was not adopted. Since 2012, DOD policy has required that all unrestricted reports of adult sexual assault offenses be reviewed by a special court-martial convening authority (SPCMCA) for the initial disposition decision. Section 522 of the Senate bill would codify the requirement that only a SPCMCA in the grade of O-6 or above may have disposition authority for certain sex-related offenses. In addition, it would require that only a SPCMCA or higher in the victim's chain of command may make disposition decisions with regard to any collateral misconduct by the victim. This provision was not adopted. House Section 540 and Senate Section 523 were similar provisions that would require training for those responsible for the disposition of sexual assault cases on the exercise of such authority. Section 540C of the House bill and Section 525 of the Senate bill would have required uniform training for commanders on their role in each stage of the military justice system with regard to sexual assault cases. The enacted bill adopted these provisions. Section 539 of the House bill would have required that commanders take timely disposition action on nonprosecutable sex-related offenses, following a determination that there is insufficient evidence to support prosecution for a sex-related offense in a general or special court-martial. Under this provision, a commanding officer would receive the investigative materials within seven days of the nonprosecutable determination and would be required to take other judicial, nonjudicial, or administrative action on the case within 90 days. The Administration objects to this provision on the basis that it could be inconsistent with statutory requirements for higher-level review of certain non-referral dispositions and that the 90-day deadline could potentially immunize misconduct if command action is not taken within that timeframe. Section 540C of the enacted bill adopts the House provision with an amendment requiring a policy to ensure the timely disposition of alleged sex-related offenses that a court-martial convening authority has declined to refer for trial by a general or special court-martial, due to a determination that there is insufficient evidence to support prosecution. Several provisions in the bills also addressed victim consultation and notifications during investigative and judicial processes. Section 550B of the House bill and Section 526 of the Senate bill were identical provisions that would have require commanders to notify victims on a monthly basis on any final determinations (i.e., administrative, nonjudicial punishment, or no further action) made with respect to a case that is not referred to court-martial. The enacted bill adopted this provision. The FY2015 NDAA ( P.L. 113-291 Â§524) required that DOD officials ask victims about their preference regarding the prosecution venueâwhether they prefer prosecution by court-martial or in a civilian court of jurisdiction. A March 2019 report by the DOD Inspector General found that in approximately 27% of the cases reviewed, victims were denied the opportunity to state their preference. In the remaining cases there was insufficient documentation to ascertain whether the victims were consulted as required by law. Sections 534 and 547 of the House bill and Section 524 of the Senate bill included provisions that would have required documentation of the consultation with the victim on the prosecution venue. Section 538 of the enacted bill adopts House provision 534 and requires implementation no later than 180 days after enactment. An April 2019 report by DOD's SAAITF recommended making sexual harassment a criminal offense for uniformed personnel by adding a specific punitive article to the UCMJ, to \"make a strong military-wide statement about the seriousness of these behaviors and the military's zero tolerance policy for them.\" Section 529 of the Senate bill would have require DOD to submit a report within 180 days of enactment on recommended legislative and administrative actions required to establish a separate punitive article for sexual harassment in the UCMJ. Section 540E of the enacted bill adopts the Senate provision. References: See also CRS Report R44944, Military Sexual Assault: A Framework for Congressional Oversight , by Kristy N. Kamarck and Barbara Salazar Torreon, Previously discussed in CRS Report R45343, FY2019 National Defense Authorization Act: Selected Military Personnel Issues , by Bryce H. P. Mendez et al. and similar reports from earlier years. CRS Point of Contact : Kristy N. Kamarck and Alan Ott. Background: In general, DOD policies require the protection of military and civilian personnel from accidental death, injury, or occupational illness. DOD's occupational and environmental health programs typically require military and civilian personnel to receive occupation- or mission-specific exposure or injury prevention education, operational risk management training, personal protective equipment, exposure assessments, and medical prophylactics or treatment, if necessary. DOD policies also require exposure assessments and screenings for certain hazardous substances or potentially harmful environments, such as lead, hexavalent chromium, cadmium, open air burn pits, radiation, blast pressure injuries, and noise. DOD primarily documents exposures in the Defense Occupational and Environmental Health Readiness System (DOEHRS), an electronic \"information management system for longitudinal exposure recordkeeping and reporting.\" DOD epidemiologists, public health practitioners, and occupational safety experts use DOEHRS data to conduct medical surveillance, inform future prevention measures, and develop improved personnel protective equipment. DOD medical personnel can use DOEHRS data when evaluating, diagnosing, or treating patients exposed to a hazardous substance or environment. In addition to DOEHRS, DOD can also document certain exposures in legacy electronic health record systems, paper medical records, or the individual longitudinal exposure record (ILER). The VA also utilizes DOD's exposure data when considering presumptive service connection for a veteran's claim for disability compensation, or providing ongoing medical care. While DOD's occupational and environmental health programs screen, document, and track servicemember or civilian employee exposure to certain substances, all potentially hazardous substances are not covered under these programs. Discussion: The enacted bill include provisions that address DOD's requirements and processes for documenting and conducting medical surveillance on certain at-risk individuals or those exposed to certain hazards. General Exposure Documentation and Tracking. Section 705 of the enacted bill amends 10 U.S.C. Â§1074f to include additional requirements for DOD to \"record any exposure to occupational and environmental health risks\" during the course of a servicemembers' deployment and make such information available to other DOD health care providers conducting post-deployment medical examinations or reassessments. The bill also requires DOD health care providers to: (1) use standardized questions when assessing for deployment-related exposures, (2) include detailed diagnosis codes in a servicemember's medical record, and (3) have access to information contained in the Airborne and Open Burn Pit Registry (i.e., Burn Pit Registry). Lead Exposure. Section 703 of the enacted bill adopts Senate Section 703, which requires DOD to offer lead level screening and testing to potentially exposed children. DOD is to implement this requirement by establishing clinical practice guidelines that take into account recommendations published by the U.S. Centers for Disease Control and Prevention (CDC) on lead level screening and testing in children. The provision directs the sharing of test results with the child's parent or guardian. Test results with \"abnormal\" or \"elevated\" blood lead levels are to be disclosed to the local health department, or the CDC and an \"appropriate authority\" of the host nation, if residing overseas. DOD is required to report to Congress, by January 1, 2021, the number of children screened, found to have elevated blood lead levels, and provided treatment for lead poisoning. The provision also tasks GAO to report to Congress on the effectiveness of DOD's lead screening, testing, and treatment program for children. Not adopted was House Section 710, which would have authorized $5 million in the Defense Health Program account to fund lead level screening and testing for children through an offset reduction to the Army procurement account for Wheeled and Tracked Combat Vehicles. Burn Pit & Airborne Hazards Exposure. Section 704 of the enacted bill directs DOD to assess servicemembers for exposure to open burn pits or other toxic airborne hazards. The provision requires exposure assessments during the annual periodic health assessment, separation history and physical examination, and deployment health assessments. DOD is also required to enroll exposed servicemembers in the Burn Pit Registry and share its assessment findings with the VA. PFAS Exposure. Section 707 of the enacted bill directs DOD to assess its firefighters, during their annual physical examination, for exposure to PFAS. The assessment requirement is to take effect on October 1, 2020. Blast Pressure Exposure. Section 717 of the enacted bill adopts House Section 716. The provision directs DOD to document in a servicemember's medical record, information on blast pressure exposure that results in a \"concussive event or injury that requires a military acute concussive evaluation.\" Section 742 of the enacted bill modifies the requirement for a longitudinal medical study on blast pressure exposure in servicemembers, as directed by Section 734 of the FY2018 NDAA ( P.L. 115-91 ). The modification requires DOD to assess the feasibility of uploading its blast pressure exposure data into DOEHRS or other tracking systems, as well as data interoperability with MHS Genesis. References: CRS Report R45986, Federal Role in Responding to Potential Risks of Per- and Polyfluoroalkyl Substances (PFAS) , coordinated by David M. Bearden, and CRS Report RS21688, Lead-Based Paint Poisoning Prevention: Summary of Federal Mandates and Financial Assistance for Reducing Hazards in Housing , by Jerry H. Yen. CRS Point of Contact: Bryce H.P. Mendez.", "summary": "Each year, the National Defense Authorization Act (NDAA) provides authorization of appropriations for a range of Department of Defense (DOD) and national security programs and related activities. New or clarified defense policies, organizational reform, and directed reports to Congress are often included. For FY2020, the NDAA ( P.L. 116-92 ) addresses or attempts to resolve high-profile military personnel issues. Some are required annual authorizations (e.g., end-strengths); some are updates or modifications to existing programs; and some are issues identified in certain military personnel programs. In the FY2020 NDAA, Congress authorized end-strengths identical to the Administration's FY2020 budget proposal. The authorized active duty end-strength increased by about 1% to 1,339,500. The authorized Selected Reserves end-strength decreased by about 2% to 807,800. A 3.1% increase in basic military pay took effect on January 1, 2020. This increase is identical to the Administration's FY2020 budget proposal and equal to the automatic annual adjustment amount directed by statutory formula (37 U.S.C. Â§1009). Congress also directed modifications to several existing personnel programs, including extension of DOD Morale, Welfare, and Recreation (MWR) privileges to Foreign Service Officers on mandatory home leave; repeal of the Survivor Benefit Plan (SBP) and Veterans Affairs' Dependency and Indemnity Compensation (DIC) offset requirement (i.e., the wi dows' tax ); modification of DOD workplace and command climate surveys to include questions relating to experiences with supremacist activity, extremist activity, or racism; expansion of Special Victim Counsel services for victims of domestic violence; prohibition of gender-segregated Marine Corps recruit training; expansion of spouse employment and education programs, including reimbursement for relicensing costs associated with military relocations; clarified roles and responsibilities for senior military medical leaders assigned to the Defense Health Agency or a service medical department; and medical documentation and tracking requirements for servicemembers or family members exposed to certain environmental or occupational hazards (e.g., lead, open air burn pits, blast pressure). As part of the oversight process, several provisions address selected congressional items of interest, including DOD review of service records of certain World War I veterans for potential eligibility for a posthumously awarded Medal of Honor; a process for former servicemembers to appeal decisions issued by a Board of Correction of Military Records or a Discharge Review Board; a feasibility study on the creation of a database to track domestic violence military protective orders and reporting to the National Instant Criminal Background Check System; transparency on military medical malpractice, including the ability for servicemembers to file administrative claims against the United States; and limitations on the reduction of military medical personnel.", "document_type": "crs"}
{"report": "The World Health Organization (WHO) first declared COVID-19 a world health emergency in January 2020. Since the virus was first diagnosed in Wuhan, China, it has been detected in over 190 countries and all U.S. states. In early March, the focal point of infections shifted from China to Europe, especially Italy, but by April 2020, the focus shifted to the United States, where the number of infections was accelerating. The infection has sickened more than 4.5 million people, about one-third in the United States, with thousands of fatalities. More than 80 countries have closed their borders to arrivals from countries with infections, ordered businesses to close, instructed their populations to self-quarantine, and closed schools to an estimated 1.5 billion children. Over the eight-week period from mid-March to mid-May 2020, more than 36.5 million Americans filed for unemployment insurance. On May 8, 2020, the Bureau of Labor Statistics (BLS) reported that 20 million Americans lost their jobs in April 2020, pushing the total number of unemployed Americans to 23 million, out of a total civilian labor force of 156 million. The increase pushed the national unemployment rate to 14.7%, the highest since the Great Depression of the 1930s. Preliminary data also indicate that U.S. GDP fell by 4.8% in the first quarter of 2020, the largest quarterly decline in GDP since the fourth quarter of 2008 during the global financial crisis. In Europe, over 30 million people in Germany, France, the UK, Spain, and Italy have applied for state support of their wages, while first quarter 2020 data indicate that the Eurozone economy contracted by 3.8% at an annual rate, the largest quarterly decline since the series started in 1995. The European Commission released its economic forecast on May 6, 2020, which projects that EU economic growth in 2020 will contract by 7.4% and only partially recover in 2021. Foreign investors have pulled an estimated $26 billion out of developing Asian economies and more than $16 billion out of India, increasing concerns of a major economic recession in Asia. Some estimates indicate that 29 million people in Latin America could fall into poverty, reversing a decade of efforts to narrow income inequality. The pandemic crisis is challenging governments to implement monetary and fiscal policies that support credit markets and sustain economic activity, while they are implementing policies to develop vaccines and safeguard their citizens. In doing so, however, differences in policy approaches are straining relations between countries that promote nationalism and those that argue for a coordinated international response. Differences in policies are also straining relations between developed and developing economies and between northern and southern members of the Eurozone, challenging alliances, and raising questions about the future of global leadership. After a delayed response, central banks and monetary authorities are engaging in an ongoing series of interventions in financial markets and national governments are announcing fiscal policy initiatives to stimulate their economies. International organizations are also taking steps to provide loans and other financial assistance to countries in need. These and other actions have been labeled \"unprecedented,\" a term that has been used frequently to describe the pandemic and the policy responses. As one measure of the global fiscal and monetary responses, the International Monetary Fund (IMF) estimated that government spending and revenue measures to sustain economic activity adopted through mid-April 2020 amounted to $3.3 trillion and that loans, equity injections and guarantees totaled an additional $4.5 trillion. The IMF also estimates that the increase in borrowing by governments globally will rise from 3.7% of global gross domestic product (GDP) in 2019 to 9.9% in 2020, as indicated in Figure 1 . Among developed economies, the fiscal balance to GDP ratio is projected to rise from 3.0% in 2019 to 10.7% in 2020; the ratio for the United States is projected to rise from 5.8% to 15.7%. According to the IMF, France, Germany, Italy, Japan, and the United Kingdom have each announced public sector support measures totaling more than 10% of their annual GDP. For developing economies, the fiscal balance to GDP ratio is projected to rise from 4.8% to 9.1%, significantly increasing their debt burden and raising prospects of defaults or debt rescheduling. According to some estimates, the most fiscally vulnerable countries are: Argentina, Venezuela, Lebanon, Jordan, Iran, Zambia, Zimbabwe, and South Africa. Among central banks, the Federal Reserve has taken extraordinary steps not experienced since the 2008-2009 global financial crisis to address the growing economic effects of COVID-19. The U.S. Congress also has approved historic fiscal spending packages. In other countries, central banks have lowered interest rates and reserve requirements, announced new financing facilities, relaxed capital buffers and, in some cases, countercyclical capital buffers, adopted after the 2008-2009 financial crisis, potentially freeing up an estimated $5 trillion in funds. Capital buffers were raised after the financial crisis to assist banks in absorbing losses and staying solvent during financial crises. In some cases, governments have directed banks to freeze dividend payments and halt pay bonuses. On March 11, the WHO announced that the outbreak was officially a pandemic, the highest level of health emergency. A growing list of economic indicators makes it clear that the outbreak is negatively affecting global economic growth on a scale that has not been experienced since at least the global financial crisis of 2008-2009. Global trade and GDP are forecast to decline sharply at least through the first half of 2020. The global pandemic is affecting a broad swath of international economic and trade activities, from services generally to tourism and hospitality, medical supplies and other global value chains, consumer electronics, and financial markets to energy, transportation, food, and a range of social activities, to name a few. The health and economic crises could have a particularly negative impact on the economies of developing countries that are constrained by limited financial resources and where health systems could quickly become overloaded. Without a clear understanding of when the global health and economic effects may peak and a greater understanding of the impact on economies, forecasts must necessarily be considered preliminary. Similarly, estimates of when any recovery might begin and the speed of the recovery are speculative. Efforts to reduce social interaction to contain the spread of the virus are disrupting the daily lives of most Americans and adding to the economic costs. Increasing rates of unemployment are raising the prospects of wide-spread social unrest and demonstrations in developed economies where lost incomes and health insurance are threatening living standards and in developing economies where populations reportedly are growing concerned over access to basic necessities and the prospects of rising levels of poverty. U.N. Secretary General Antonio Guterres argued in a video conference before the U.N. Security Council on April 10, 2020, that the pandemic also poses a significant threat to the maintenance of international peace and securityâpotentially leading to an increase in social unrest and violence that would greatly undermine our ability to fight the disease. The economic situation remains highly fluid. Uncertainty about the length and depth of the health crisis-related economic effects are fueling perceptions of risk and volatility in financial markets and corporate decision-making. In addition, uncertainties concerning the global pandemic and the effectiveness of public policies intended to curtail its spread are adding to market volatility. In a growing number of cases, corporations are postponing investment decisions, laying off workers who previously had been furloughed, and in some cases filing for bankruptcy. Compounding the economic situation is a historic drop in the price of crude oil that reflects the global decline in economic activity and prospects for disinflation, while also contributing to the decline of the global economy through various channels. On April 29, 2020, Federal Reserve Chairman Jay Powell stated that the Federal Reserve would use its \"full range of tools\" to support economic activity as the U.S. economic growth rate dropped 4.8% at an annual rate in the first quarter of 2020. In assessing the state of the U.S. economy, the Federal Open Market Committee released a statement indicating that, \"The ongoing public health crisis will weigh heavily on economic activity, employment, and inflation in the near term, and poses considerable risks to the economic outlook over the medium term.\" The Organization for Economic Cooperation and Development (OECD) on March 2, 2020, lowered its forecast of global economic growth by 0.5% for 2020 from 2.9% to 2.4%, based on the assumption that the economic effects of the virus would peak in the first quarter of 2020 (see Table 1 ). However, the OECD estimated that if the economic effects of the virus did not peak in the first quarter, which is now apparent that it did not, global economic growth would increase by 1.5% in 2020. That forecast now seems to have been highly optimistic. On March 23, 2020, OECD Secretary General Angel Gurria stated that The sheer magnitude of the current shock introduces an unprecedented complexity to economic forecasting. The OECD Interim Economic Outlook, released on March 2, 2020, made a first attempt to take stock of the likely impact of COVID-19 on global growth, but it now looks like we have already moved well beyond even the more severe scenario envisaged thenâ¦. [T]he pandemic has also set in motion a major economic crisis that will burden our societies for years to come. On March 26, 2020, the OECD revised its global economic forecast based on the mounting effects of the pandemic and measures governments have adopted to contain the spread of the virus. According to the updated estimate, the current containment measures could reduce global GDP by 2.0% per month, or an annualized rate of 24%, approaching the level of economic contraction not experienced since the Great Depression of the 1930s. The OECD estimates in Table 1 will be revised when the OECD releases updated country-specific data. Labeling the projected decline in global economic activity as the \"Great Lockdown,\" the IMF released an updated forecast on April 14, 2020. The IMF concluded that the global economy would experience its \"worst recession since the Great Depression, surpassing that seen during the global financial crisis a decade ago.\" In addition, the IMF estimated that the global economy could decline by 3.0% in 2020, before growing by 5.8% in 2021; global trade is projected to fall in 2020 by 11.0% and oil prices are projected to fall by 42%, also shown in Table 1 . This forecast assumes that the pandemic fades in the second half of 2020 and that the containment measures can be reversed quickly. The IMF also stated that many countries are facing a multi-layered crisis that includes a health crisis, a domestic economic crisis, falling external demand, capital outflows, and a collapse in commodity prices. In combination, these various effects are interacting in ways that make forecasting difficult. Advanced economies as a group are forecast to experience an economic contraction in 2020 of 7.8% of GDP, with the U.S. economy projected by the IMF to decline by 5.9%, about twice the rate of decline experienced in 2009 during the financial crisis, as indicated in Figure 2 . The rate of economic growth in the Euro area is projected to decline by 7.5% of GDP. Most developing and emerging economies are projected to experience a decline in the rate of economic growth of 2.0%, reflecting tightening global financial conditions and falling global trade and commodity prices. In contrast, China, India, and Indonesia are projected to experience small, but positive rates of economic growth in 2020. The IMF also argues that recovery of the global economy could be weaker than projected as a result of: lingering uncertainty about possible contagion, lack of confidence, and permanent closure of businesses and shifts in the behavior of firms and households. As a result of the various challenges, the IMF qualified its forecast by arguing that A partial recovery is projected for 2021, with above trend growth rates, but the level of GDP will remain below the pre-virus trend, with considerable uncertainty about the strength of the rebound. Much worse growth outcomes are possible and maybe even likely. This would follow if the pandemic and containment measures last longer, emerging and developing economies are even more severely hit, tight financial conditions persist, or if widespread scarring effects emerge due to firm closures and extended unemployment. Before the COVID-19 outbreak, the global economy was struggling to regain a broad-based recovery as a result of the lingering impact of growing trade protectionism, trade disputes among major trading partners, falling commodity and energy prices, and economic uncertainties in Europe over the impact of the UK withdrawal from the European Union. Individually, each of these issues presented a solvable challenge for the global economy. Collectively, however, the issues weakened the global economy and reduced the available policy flexibility of many national leaders, especially among the leading developed economies. In this environment, COVID-19 could have an outsized impact. While the level of economic effects will eventually become clearer, the response to the pandemic could have a significant and enduring impact on the way businesses organize their work forces, global supply chains, and how governments respond to a global health crisis. The OECD estimates that increased direct and indirect economic costs through global supply chains, reduced demand for goods and services, and declines in tourism and business travel mean that, \"the adverse consequences of these developments for other countries (non-OECD) are significant.\" Global trade, measured by trade volumes, slowed in the last quarter of 2019 and had been expected to decline further in 2020, as a result of weaker global economic activity associated with the pandemic, which is negatively affecting economic activity in various sectors, including airlines, hospitality, ports, and the shipping industry. According to the OECD's updated forecast The greatest impact of the containment restrictions will be on retail and wholesale trade, and in professional and real estate services, although there are notable differences between countries. Business closures could reduce economic output in advanced and major emerging economies by 15% or more; other emerging economies could experience a decline in output of 25%. Countries dependent on tourism could be affected more severely, while countries with large agricultural and mining sectors could experience less severe effects. Economic effects likely will vary across countries reflecting differences in the timing and degree of containment measures. In addition, the OECD argues that China's emergence as a global economic actor marks a significant departure from previous global health episodes. China's growth, in combination with globalization and the interconnected nature of economies through capital flows, supply chains, and foreign investment, magnify the cost of containing the spread of the virus through quarantines and restrictions on labor mobility and travel. China's global economic role and globalization mean that trade is playing a role in spreading the economic effects of COVID-19. More broadly, the economic effects of the pandemic are being spread through three trade channels: (1) directly through supply chains as reduced economic activity is spread from intermediate goods producers to finished goods producers; (2) as a result of a drop overall in economic activity, which reduces demand for goods in general, including imports; and (3) through reduced trade with commodity exporters that supply producers, which, in turn, reduces their imports and negatively affects trade and economic activity of exporters. According to an April 8, 2020, forecast by the World Trade Organization (WTO), global trade volumes are projected to decline between 13% and 32% in 2020 as a result of the economic impact of COVID-19, as indicated in Table 2 . The WTO argues that the wide range in the forecast represents the high degree of uncertainty concerning the length and economic impact of the pandemic and that the actual economic outcome could be outside this range, either higher or lower. The WTO's more optimistic scenario assumes that trade volumes recover quickly in the second half of 2020 to their pre-pandemic trend, or that the global economy experiences a V-shaped recovery. The more pessimistic scenario assumes a partial recovery that lasts into 2021, or that global economic activity experiences more of a U-shaped recovery. The WTO concludes, however, that the impact on global trade volumes could exceed the drop in global trade during the height of the 2008-2009 financial crisis. The estimates indicate that all geographic regions will experience a double-digit drop in trade volumes, except for \"other regions,\" which consists of Africa, the Middle East, and the Commonwealth of Independent States. North America and Asia could experience the steepest declines in export volumes. The forecast also projects that sectors with extensive value chains, such as automobile products and electronics, could experience the steepest declines. Although services are not included in the WTO forecast, this segment of the economy could experience the largest disruption as a consequence of restrictions on travel and transport and the closure of retail and hospitality establishments. Such services as information technology, however, are growing to satisfy the demand of employees who are working from home. The challenge for policymakers has been one of implementing targeted policies that address what had been expected to be short-term problems without creating distortions in economies that can outlast the impact of the virus itself. Policymakers, however, are being overwhelmed by the quickly changing nature of the global health crisis that appears to be turning into a global trade and economic crisis whose effects on the global economy are escalating. As the economic effects of the pandemic grow, policymakers are giving more weight to policies that address the immediate economic effects at the expense of longer-term considerations such as debt accumulation. Initially, many policymakers had felt constrained in their ability to respond to the crisis as a result of limited flexibility for monetary and fiscal support within conventional standards, given the broad-based synchronized slowdown in global economic growth, especially in manufacturing and trade that had developed prior to the viral outbreak. The pandemic is also affecting global politics as world leaders are cancelling international meetings, competing for medical supplies, and some nations reportedly are stoking conspiracy theories that shift blame to other countries. Initially, the economic effects of the virus were expected to be short-term supply issues as factory output fell because workers were quarantined to reduce the spread of the virus through social interaction. The drop in economic activity, initially in China, has had international repercussions as firms experienced delays in supplies of intermediate and finished goods through supply chains. Concerns are growing, however, that virus-related supply shocks are creating more prolonged and wide-ranging demand shocks as reduced activity by consumers and businesses leads to a lower rate of economic growth. As demand shocks unfold, businesses experience reduced activity and profits and potentially escalating and binding credit and liquidity constraints. While manufacturing firms are experiencing supply chain shocks, reduced consumer activity through social distancing is affecting the services sector of the economy, which accounts for two-thirds of annual U.S. economic output. In this environment, manufacturing and service firms have tended to hoard cash, which affects market liquidity. In response, central banks have lowered interest rates where possible and expanded lending facilities to provide liquidity to financial markets and to firms potentially facing insolvency. The longer the economic effects persist, the greater the economic impacts are likely to be as the effects are spread through trade and financial linkages to an ever-broadening group of countries, firms and households. These growing economic effects potentially increase liquidity constraints and credit market tightening in global financial markets as firms hoard cash, with negative fallout effects on economic growth. At the same time, financial markets are factoring in an increase in government bond issuance in the United States, Europe, and elsewhere as government debt levels are set to rise to meet spending obligations during an expected economic recession and increased fiscal spending to fight the effects of COVID-19. Unlike the 2008-2009 financial crisis, reduced demand by consumers, labor market issues, and a reduced level of activity among businesses, rather than risky trading by global banks, has led to corporate credit issues and potential insolvency. These market dynamics have led some observers to question if these events mark the beginning of a full-scale global financial crisis. Liquidity and credit market issues present policymakers with a different set of challenges than addressing supply-side constraints. As a result, the focus of government policy has expanded from a health crisis to macroeconomic and financial market issues that are being addressed through a combination of monetary, fiscal, and other policies, including border closures, quarantines, and restrictions on social interactions. Essentially, while businesses are attempting to address worker and output issues at the firm level, national leaders are attempting to implement fiscal policies to prevent economic growth from falling sharply by assisting workers and businesses that are facing financial strains, and central bankers are adjusting monetary policies to address mounting credit market issues. In the initial stages of the health crisis, households did not experience the same kind of wealth losses they saw during the 2008-2009 financial crisis when the value of their primary residence dropped sharply. However, with unemployment numbers rising rapidly, job losses could result in defaults on mortgages and delinquencies on rent payments, unless financial institutions provide loan forbearance or there is a mechanism to provide financial assistance. In turn, mortgage defaults could negatively affect the market for mortgage-backed securities, the availability of funds for mortgages, and negatively affect the overall rate of economic growth. Losses in the value of most equity markets in the U.S., Asia, and Europe could also affect household wealth, especially that of retirees living on a fixed income and others who own equities. Investors that trade in mortgage-backed securities reportedly have been reducing their holdings while the Federal Reserve has been attempting to support the market. In the current environment, even traditional policy tools, such as monetary accommodation, apparently have not been processed by markets in a traditional manner, with equity market indices displaying heightened, rather than lower, levels of uncertainty following the Federal Reserve's cut in interest rates. Such volatility is adding to uncertainties about what governments can do to address weaknesses in the global economy. Between late February and early May, 2020, financial markets from the United States to Asia and Europe have been whipsawed as investors have grown concerned that COVID-19 would create a global economic and financial crisis with few metrics to indicate how prolonged and extensive the economic effects may be. Investors have searched for safe-haven investments, such as the benchmark U.S. Treasury 10-year security, which experienced a historic drop in yield to below 1% on March 3, 2020. In response to concerns that the global economy was in a freefall, the Federal Reserve lowered key interest rates on March 3, 2020, to shore up economic activity, while the Bank of Japan engaged in asset purchases to provide short-term liquidity to Japanese banks; Japan's government indicated it would also assist workers with wage subsidies. The Bank of Canada also lowered its key interest rate. The International Monetary Fund (IMF) announced that it was making about $50 billion available through emergency financing facilities for low-income and emerging market countries and through funds available in its Catastrophe Containment and Relief Trust (CCRT). Reflecting investors' uncertainties, the Dow Jones Industrial Average (DJIA) lost about one-third of its value between February 14, 2020, and March 23, 2020, as indicated in Figure 3 . Expectations that the U.S. Congress would adopt a $2.0 trillion spending package moved the DJIA up by more than 11% on March 24, 2020. From March 23 to April 15, the DJIA moved higher by18%, paring its initial losses by half. Since then, the DJIA has moved erratically as investors have weighed news about the human cost and economic impact of the pandemic and the prospects of various medical treatments. For some policymakers, the drop in equity prices has raised concerns that foreign investors might attempt to exploit the situation by increasing their purchases of firms in sectors considered important to national security. For instance, Ursula von der Leyen, president of the European Commission, urged EU members to better screen foreign investments, especially in areas such as health, medical research, and critical infrastructure. Similar to the 2008-2009 global financial crisis, central banks have implemented a series of monetary operations to provide liquidity to their economies. These actions, however, initially were not viewed entirely positively by all financial market participants who questioned the use of policy tools by central banks that are similar to those employed during the 2008-2009 financial crisis, despite the fact that the current and previous crisis are fundamentally different in origin. During the previous financial crisis, central banks intervened to restart credit and spending by banks that had engaged in risky assets. In the current environment, central banks are attempting to address financial market volatility and prevent large-scale corporate insolvencies that reflect the underlying economic uncertainty caused by the pandemic. Similar to conditions during the 2008-2009 financial crisis, the dollar has emerged as the preferred currency by investors, reinforcing its role as the dominant global reserve currency. As indicated in Figure 4 , the dollar appreciated more than 3.0% during the period between March 3 and March 13, 2020, reflecting increased international demand for the dollar and dollar-denominated assets. Since the highs reached on March 23, the dollar has given up some of its value against other currencies, but has remained about 10% higher than it was at the beginning of the year. According to a recent survey by the Bank for International Settlements (BIS), the dollar accounts for 88% of global foreign exchange market turnover and is key in funding an array of financial transactions, including serving as an invoicing currency to facilitate international trade. It also accounts for two-thirds of central bank foreign exchange holdings, half of non-U.S. banks foreign currency deposits, and two-thirds of non-U.S. corporate borrowings from banks and the corporate bond market. As a result, disruptions in the smooth functioning of the global dollar market can have wide-ranging repercussions on international trade and financial transactions. The international role of the dollar also increases pressure on the Federal Reserve essentially to assume the lead role as the global lender of last resort. Reminiscent of the financial crisis, the global economy has experienced a period of dollar shortage, requiring the Federal Reserve to take numerous steps to ensure the supply of dollars to the U.S. and global economies, including activating existing currency swap arrangements, establishing such arrangements with additional central banks, and creating new financial facilities to provide liquidity to central banks and monetary authorities. Typically, banks lend long-term and borrow short-term and can only borrow from their home central bank. In turn, central banks can only provide liquidity in their own currency. Consequently, a bank can become illiquid in a panic, meaning it cannot borrow in private markets to meet short-term cash flow needs. Swap lines are designed to allow foreign central banks the funds necessary to provide needed liquidity to their country's banks in dollars. The yield on U.S. Treasury securities dropped to historic levels on March 6, 2020, and March 9, 2020, as investors continued to move out of stocks and into Treasury securities and other sovereign bonds, including UK and German bonds, due in part to concerns over the impact the pandemic would have on economic growth and expectations the Federal Reserve and other central banks would lower short-term interest rates. On March 5, the U.S. Congress passed a $8 billion spending bill to provide assistance for health care, sick leave, small business loans, and international assistance. At the same time, commodity prices dropped sharply as a result of reduced economic activity and disagreements among oil producers over production cuts in crude oil and lower global demand for commodities, including crude oil. The drop in some commodity prices raised concerns about corporate profits and led some investors to sell equities and buy sovereign bonds. In overnight trading in various sessions between March 8, and March 24, U.S. stock market indexes moved sharply (both higher and lower), triggering automatic circuit breakers designed to halt trading if the indexes rise or fall by more than 5% when markets are closed and 7% when markets are open. By early April, the global mining industry had reduced production by an estimated 20% in response to falling demand and labor quarantines and as a strategy for raising prices. Ahead of a March 12, 2020, scheduled meeting of the European Central Bank (ECB), the German central bank (Deutsche Bundesbank) announced a package of measures to provide liquidity support to German businesses and financial support for public infrastructure projects. At the same time, the Fed announced that it was expanding its repo market transactions (in the repurchase market, investors borrow cash for short periods in exchange for high-quality collateral like Treasury securities) after stock market indexes fell sharply, government bond yields fell to record lows (reflecting increased demand), and demand for corporate bonds fell. Together these developments raised concerns for some analysts that instability in stock markets could threaten global financial conditions. On March 11, as the WHO designated COVID-19 a pandemic, governments and central banks adopted additional monetary and fiscal policies to address the growing economic impact. European Central Bank (ECB) President-designate Christine Lagarde in a conference call to EU leaders warned that without coordinated action, Europe could face a recession similar to the 2008-2009 financial crisis. The Bank of England lowered its key interest rate, reduced capital buffers for UK banks, and provided a funding program for small and medium businesses. The UK Chancellor of the Exchequer also proposed a budget that would appropriate Â£30 billion (about $35 billion) for fiscal stimulus spending, including funds for sick pay for workers, guarantees for loans to small businesses, and cuts in business taxes. The European Commission announced a â¬25 billion (about $28 billion) investment fund to assist EU countries and the Federal Reserve announced that it would expand its repo market purchases to provide larger and longer-term funding to provide added liquidity to financial markets. President Trump imposed restrictions on travel from Europe to the United States on March 12, 2020, surprising European leaders and adding to financial market volatility. At its March 12 meeting, the ECB announced â¬27 billion (about $30 billion) in stimulus funding, combining measures to expand low-cost loans to Eurozone banks and small and medium-sized businesses and implement an asset purchase program to provide liquidity to firms. Germany indicated that it would provide tax breaks for businesses and \"unlimited\" loans to affected businesses. The ECB's Largarde roiled markets by stating that it was not the ECB's job to \"close the spread\" between Italian and German government bond yields (a key risk indicator for Italy), a comment reportedly interpreted as an indicator the ECB was preparing to abandon its support for Italy, a notion that was denied by the ECB. The Fed also announced that it would further increase its lending in the repo market and its purchases of Treasury securities to provide liquidity. As a result of tight market conditions for corporate bonds, firms turned to their revolving lines of credit with banks to build up their cash reserves. The price of bank shares fell, reflecting sales by investors who reportedly had grown concerned that banks would experience a rise in loan defaults. Despite the various actions, the DJIA fell by nearly 10% on March 12, recording the worst one-day drop since 1987. Between February 14 and March 12, the DJIA fell by more than 8,000 points, or 28% of its value. Credit rating agencies began reassessing corporate credit risk, including the risk of firms that had been considered stable. On March 13, President Trump declared a national emergency, potentially releasing $50 billion in disaster relief funds to state and local governments. The announcement moved financial markets sharply higher, with the DJIA rising 10%. Financial markets also reportedly moved higher on expectations the Fed would lower interest rates. House Democrats and President Trump agreed to a $2 trillion spending package to provide paid sick leave, unemployment insurance, food stamps, support for small businesses, and other measures. The EU indicated that it would relax budget rules that restrict deficit spending by EU members. In other actions, the People's Bank of China cut its reserve requirements for Chinese banks, potentially easing borrowing costs for firms and adding $79 billion in funds to stimulate the Chinese economy; Norway's central bank reduced its key interest rate; the Bank of Japan acquired billions of dollars of government securities (thereby increasing liquidity); and the Reserve Bank of Australia injected nearly $6 billion into its financial system. The Bank of Canada also lowered its overnight bank lending rate. The Federal Reserve lowered its key interest rate to near zero on March 15, 2020, arguing that the pandemic had \"harmed communities and disrupted economic activity in many countries, including the United States\" and that it was prepared to use its \"full range of tools.\" It also announced an additional $700 billion in asset purchases, including Treasury securities and mortgage-backed securities, expanded repurchase operations, activated dollar swap lines with Canada, Japan, Europe, the UK, and Switzerland, opened its discount window to commercial banks to ease household and business lending, and urged banks to use their capital and liquidity buffers to support lending. Despite the Fed's actions the previous day to lower interest rates, interest rates in the U.S. commercial paper market, where corporations raise cash by selling short-term debt, rose on March 16, 2020, to their highest levels since the 2008-2009 financial crisis, prompting investors to call on the Federal Reserve to intervene. The DJIA dropped nearly 3,000 points, or about 13%. Most automobile manufacturers announced major declines in sales and production; similarly, most airlines reported they faced major cutbacks in flights and employee layoffs due to diminished economic activity. Economic data from China indicated the economy would slow markedly in the first quarter of 2020, potentially greater than that experienced during the global financial crisis. The Bank of Japan announced that it would double its purchases of exchange traded funds and the G-7 countries issued a joint statement promising \"a strongly coordinated international approach,\" although no specific actions were mentioned. The IMF issued a statement indicating its support for additional fiscal and monetary actions by governments and that the IMF \"stands ready to mobilize its $1 trillion lending capacity to help its membership.\" The World Bank also promised an additional $14 billion to assist governments and companies address the pandemic. Following the drop in equity market indexes the previous day, the Federal Reserve unveiled a number of facilities on March 17, 2020, in some cases reviving actions it had not taken since the financial crisis. It announced that it would allow the 24 primary dealers in Treasury securities to borrow cash collateralized against some stocks, municipal debt, and higher-rated corporate bonds; revive a facility to buy commercial paper; and provide additional funding for the overnight repo market. The UK government proposed government-backed loans to support business; a three-month moratorium on mortgage payments for homeowners; a new lending facility with the Bank of England to provide low-cost commercial paper to support lending; and loans for businesses. In an emergency session on March 18, the ECB announced a temporary, non-standard asset purchase program, the Pandemic Emergency Purchase Program (PEPP), to acquire an additional â¬750 billion (over $820 billion) in public and private sector bonds to counter the risks posed by the pandemic crisis (as of May 5, the ECB had purchased about $180 billion in securities). The ECB also broadened the types of assets it would accept as collateral to include non-financial commercial paper, eased collateral standards for banks, and waived restrictions on acquiring Greek government debt. The program was expected to end no later than yearend 2020. The Federal Reserve broadened its central bank dollar swap lines to include Brazil, Mexico, Australia, Denmark, Norway, and Sweden. Automobile manufacturers announced they were suspending production at an estimated 100 plants across North America, following similar plant closures in Europe. Major U.S. banks announced a moratorium on share repurchases, or stock buy-backs, denying equity markets a major source of support and potentially amplifying market volatility. During the week, more than 22 central banks in emerging economies, including Brazil, Turkey, and Vietnam, lowered their key interest rates. By March 19, 2020, investors were selling sovereign and other bonds as firms and other financial institutions attempted to increase their cash holdings, although actions central banks took during the week appeared to calm financial markets. Compared to previous financial market dislocations in which stock market values declined while bond prices rose, stock and bond values fell at the same time in March 2020 as investors reportedly adopted a \"sell everything\" mentality to build up cash reserves. Senate Republicans introduced the Coronavirus Aid, Relief, and Economic Security Act to provide $2 trillion in spending to support the U.S. economy. By the close of trading on March 20, the DJIA index had fallen by 17% from March 13. At the same time, the dollar continued to gain in value against other major currencies and the price of Brent crude oil dropped close to $20 per barrel on March 20, as indicated in Figure 5 . The Federal Reserve announced that it would expand a facility to support the municipal bond market. Britain's Finance Minister announced an \"unprecedented\" fiscal package to pay up to 80% of an employee's wages and deferring value added taxes by businesses. The ECB's Largarde justified actions by the Bank during the week to provide liquidity by arguing that the \"coronavirus pandemic is a public health emergency unprecedented in recent history.\" Market indexes fell again on March 23 as the Senate debated the parameters of a new spending bill to support the economy. Oil prices also continued to fall as oil producers appeared to be in a standoff over cuts to production. Financial markets continued to fall on March 23, 2020, as market indexes reached their lowest point since the start of the pandemic crisis. The Federal Reserve announced a number of new facilities to provide an unlimited expansion in bond buying programs. The measures included additional purchases of Treasury and mortgage-backed securities; additional funding for employers, consumers, and businesses; establishing the Primary Market Corporate Credit Facility (PMCCF) to support issuing new bonds and loans and the Secondary Market Corporate Credit Facility (SMCCF) to provide liquidity for outstanding corporate bonds; establishing the Term Asset-Backed Securities Loan Facility (TALF), to support credit to consumers and businesses; expanding the Money Market Mutual Fund Liquidity Facility (MMLF) to provide credit to municipalities; and expanding the Commercial Paper Funding Facility (CPFF) to facilitate the flow of credit to municipalities. The OECD released a statement encouraging its members to support \"immediate, large-scale and coordinated actions.\" These actions included (1) more international cooperation to address the health crisis; (2) coordinated government actions to increase spending to support health care, individuals, and firms; (3) coordinated central bank action to supervise and regulate financial markets; and (4) policies directed at restoring confidence. Reacting to the Fed's announcement, the DJIA closed up 11% on March 24, marking one of the sharpest reversals in the market index since February 2020. European markets, however, did not follow U.S. market indexes as various indicators signaled a decline in business activity in the Eurozone that was greater than that during the financial crisis and indicated the growing potential for a severe economic recession. U.S. financial markets were buoyed on March 25 and 26 over passage in Congress of a $2.2 trillion economic stimulus package. On March 27, leaders of the G-20 countries announced through a video conference they had agreed to inject $5 trillion into the global economy and to do \"whatever it takes to overcome the pandemic.\" Also at the meeting, the OECD offered an updated forecast of the viral infection, which projected that the global economy could shrink by as much as 2% a month. Nine Eurozone countries, including France, Italy, and Spain called on the ECB to consider issuing \"coronabonds,\" a common European debt instrument to assist Eurozone countries in fighting COVID-19. The ECB announced that it was removing self-imposed limits that it had followed in previous asset purchase programs that restricted its purchases of any one country's bonds. Japan announced that it would adopt an emergency spending package worth $238 billion, or equivalent to 10% of the country's annual GDP. Despite the various actions, global financial markets turned down March 27 (the DJIA dropped by 900 points) reportedly over volatility in oil markets and concerns that the economic effects of the COVID-19 pandemic were worsening. By March 30, central banks in developing countries from Poland, Columbia, South Africa, the Philippines, Brazil, and the Czech Republic reportedly had begun adopting monetary policies similar to that of the Federal Reserve to stimulate their economies. In commodity markets, Brent crude oil prices continued to fall, reaching a low of $22.76. Strong global demand for dollars continued to put upward pressure on the international value of the dollar. In response, the Federal Reserve introduced a new temporary facility that would work with its swap lines to allow central banks and international monetary authorities to enter into repurchase agreements with the Fed. From mid-March to mid-April, U.S. workers' claims for unemployment benefits reached over 17 million as firms faced a collapse in demand and requirements for employees to self-quarantine caused them to begin furloughing or laying off employees. Financial markets began to recover somewhat in early April in response to the accumulated monetary and fiscal policy initiatives, but remained volatile as a result of uncertainty over efforts to reach an output agreement among oil producers and the continued impact of the viral health effects. The Federal Reserve announced on April 8 that it was establishing a facility to fund small businesses through the Paycheck Protection Program. Japan also announced that it was preparing to declare areas around Tokyo to be in a state of emergency and that it would adopt a $989 billion funding package. On April 9, OPEC and Russia reportedly agreed to cut oil production by 10 million barrels per day. On April 15, G-20 finance ministers and central bank governors announced their support for the proposed agreement by Saudi Arabia and Russia to reduce oil production. They also announced an agreement to freeze government loan payments until the end of the year to help low-income developing countries address the pandemic and asked international financial institutions to do likewise. G-7 finance ministers and central bank governors agreed to support the G-20 proposal to suspend debt payments by developing countries. Eurozone finance ministers announced a â¬500 billion (about $550 billion) emergency spending package to support governments, businesses, and workers. Reportedly, the measure will provide funds to the European Stability Mechanism, the European Investment Bank, and for unemployment insurance. In other policy areas, the IMF announced that it was doubling its emergency lending capability to $100 billion, in response to requests from more than 90 countries for assistance. The Bank of England announced that it would take the unprecedented move of temporarily directly financing UK government emergency spending needs through monetary measures rather than through the typical method of issuing securities to fight the effects of COVID-19. Secretary-General of the United Nations Guterres declared on April 9, 2020, before the United Nations Security Council that the pandemic poses a significant threat to the maintenance of international peace and security and outlined eight specific risks, including the erosion of trust in public institutions, increased risks from terrorism and bioterrorism, and worsening existing human rights abuses. Federal Reserve Chairman Jerome Powell, stating that the U.S. economy was deteriorating \"with alarming speed,\" announced on April 10 that the Fed would provide an additional $2.3 trillion in loans, including a new financial facility to assist firms by acquiring shares in exchange traded funds that own the debt of lower-rated, riskier firms that are among the most exposed to deteriorating economic conditions associated with COVID-19 and low oil prices. On April 16, the U.S. Labor Department reported that 5.2 million Americans filed for unemployment insurance during the previous week, raising the total claims since mid-March to over 22 million. According to Chinese official statistics, the Chinese economy shrank by 6.8% on an annual basis during the first quarter of 2020, reportedly the first such contraction in 40 years. Financial market indicators rose on April 17, reportedly on an upbeat sentiment that actions taken by the Federal Reserve and other central banks would stabilize conditions in the corporate credit market. The price of futures contracts for oil delivery in May 2020 for the U.S. West Texas Intermediate (WTI) fell to $18 per barrel, the lowest it had been since 2002, reportedly reflecting rising inventories and low global demand. Leaders of emerging economies in Latin America and Africa argued that the G-20 call for suspension of interest payments fell short of what is needed. National leaders from Columbia, Brazil, Mexico, and Chile encouraged the World Bank, the InterAmerican Development Bank and the IMF to double their net lending to Latin America, arguing that, \"The Covid-19 pandemic is a shock of unprecedented magnitude, uncertain duration and catastrophic consequences that, if not properly addressed, could lead to one of the most tragic episodes in the history of Latin America and the Caribbean.\" On April 19, 2020, the price of oil fell to its lowest level in two decades, reportedly reflecting a significant drop in global demand for energy and rising inventories. Some Eurozone members reportedly argued for the ECB to create a Eurozone \"bad bank\" to remove billions of euros in non-performing debts from banks' balance sheets to provide more capacity for Eurozone banks at a potentially critical time when banks could see an increase in non-performing loans. The World Bank confirmed that its \"pandemic bonds\" would pay out $133 billion to the poorest countries affected by the pandemic. On April 21, 2020, Agricultural Ministers of the G-20 countries released a joint statement that supported measures to \"ensure the health, safety, welfare, and mobility of workers in agriculture and throughout the food supply chain.\" The joint statement also indicated that the G-20 countries would adopt measures that are \"targeted, proportionate, transparent, and temporary, and that they do not create unnecessary barriers to trade or disruption to global food supply chains.\" The statement also indicated that the G-20 would, \"guard against any unjustified restrictive measures that could lead to excessive food price volatility in international markets and threaten the food security and nutrition of large proportions of the world population, especially the most vulnerable living in environments of low food security.\" On April 23, 2020, the House passed H.R. 266 ( P.L. 116-139 ), the Paycheck Protection Program and Health Care Enhancement Act, following similar actions by the Senate the previous day. The measure will provide $484 billion for small business loans, health care providers, and COVID-19 testing. The U.S. Labor Department reported that 4.4 million Americans filed for unemployment insurance in the previous week, raising the total that have applied to over 26 million. Indicators of manufacturing and services activity in Europe dropped to their lowest level since 1990, reflecting the impact of the pandemic on the European economy. The Bank of England indicated that it would quadruple its borrowing over the second quarter of 2020, reflecting a contraction in the UK economy, lower tax revenues, and increased financial demands to support fiscal policy measures to fight the pandemic. The Saudi Presidency of the G-20 called on international organizations on April 24, 2020, to fund an emergency response to the pandemic. The Bank of Japan announced on April 27, 2020, that it would purchase unlimited amounts of government bonds and quadruple its purchases of corporate debt to keep interest rates low and stimulate the Japanese economy. At its April 29, 2020, scheduled meeting, the U.S. Federal Open Market Committee left its main interest rates unchanged, but reiterated its commitment to use \"its full range of tools to support the U.S. economy.\" The policy statement concluded that, \"The ongoing public health crisis will weigh heavily on economic activity, employment, and inflation in the near term, and poses considerable risks to the economic outlook over the medium term.\" The Federal Reserve also announced a change in its eligibility requirements for a $500 billion lending program for municipalities. The statement followed the release of the preliminary estimate of U.S. first quarter GDP, which indicated that the economy had contracted by an annualized rate of 4.8%. On April 30, 2020, the Department of Labor released its weekly data on applications for unemployment insurance, which indicated that an additional 3.8 million people had filed for unemployment insurance during the week, raising the total number who have applied to 30 million. The Federal Reserve also announced an expansion in its medium-size business loan program by allowing firms with up to 15,000 employees or with revenues up to $5 billion to access a new $600 billion program. In addition, the Fed lowered the minimum loan amount for small businesses and announced a loan program to assist riskier businesses. At the same time, the ECB expanded a record low-interest rate loan program for Eurozone banks to support economic activity, while warning that the Eurozone economy could contract between 5% and 12% in 2020 as it faces, \"an economic contraction of a magnitude and speed that are unprecedented in peacetime.\" The ECB also announced a new non-targeted low-interest rate pandemic emergency longer-term refinancing operation (PELTROs) to complement its Pandemic Emergency Refinance Operations announced in March. House Speaker Pelosi stated that House Democrats were considering a $1 trillion spending bill to support state and local governments. In a development that seemed incongruous with the broader economic situation, between April 1, 2020, and April 30, 2020, the DJIA rose more than 3,400 points, or 16%, marking the strongest monthly increase since 1987. On May 5, 2020, Germany's Constitutional court issued a ruling that could prevent the German central bank, the Bundesbank, from making additional bond purchases under the Pandemic Emergency Purchase Program (PEPP). The ECB's program is intended to ease borrowing costs across the Eurozone to stimulate economic growth. The U.S. Census Bureau reported on May 5 that U.S. exports and import fell in March; exports fell by a greater amount than imports, thereby increasing the monthly U.S. goods and services trade deficit. The trade balance for March was -$44.5 billion, an increase of about $4.6 billion over the trade deficit in February. The decline in export and import values reflected lower imports and exports of both goods and services. On May 6, 2020, the European Commission released its economic forecast, which indicated that economic activity in the EU would decline by 7.4% in 2020 as a result of measures to contain the pandemic. The Commission forecast that economic growth would advance by 6.0% in 2021, assuming the containment measures can be lifted gradually, the viral effects remain contained, and that the fiscal and monetary measures implemented by the EU members are effective in blunting the negative effects on economies. On May 7, the Labor Department announced that 3.2 million Americans had filed for unemployment insurance during the week, raising the total that had filed over the previous seven weeks to 33 million. On May 8, the U.S. Department of Labor announced that 20.5 million Americans had lost their jobs in April, pushing the national unemployment rate to 14.5%. Despite the rise in the unemployment rate, the DJIA rose by 2.0%, reportedly based on optimism that the monetary policy actions the Federal Reserve, the ECB, and the Bank of Japan have taken to support financial markets and optimism that the health crisis is ebbing. On May 12, House Democrats proposed a $3 trillion supplemental spending bill to provide additional financial resources to state and local governments and for other purposes. On May 13, the UK Office of National Statistics reported that UK GDP contracted by 2.0% in the first quarter, the largest decline in the UK's GDP since 2008 with all major economic sector affected. On May 14, the U.S. Department of Labor announced that an additional 3.0 million Americans had filed for unemployment insurance during the previous week, increasing the total number filing for unemployment insurance over the previous eight weeks to 36 million. In response to growing concerns over the global economic impact of the pandemic, G-7 finance ministers and central bankers released a statement on March 3, 2020, indicating they will \"use all appropriate policy tools\" to sustain economic growth. The Finance Ministers also pledged fiscal support to ensure health systems can sustain efforts to fight the outbreak. In most cases, however, countries have pursued their own divergent strategies, in some cases including banning exports of medical equipment. Following the G-7 statement, the U.S. Federal Reserve (Fed) lowered its federal funds rate by 50 basis points, or 0.5%, to a range of 1.0% to 1.25% due to concerns about the \"evolving risks to economic activity of the COVID-19.\" At the time, the cut was the largest one-time reduction in the interest rate by the Fed since the global financial crisis. After a delayed response, other central banks have begun to follow the actions of the G-7 countries. Most central banks have lowered interest rates and acted to increase liquidity in their financial systems through a combination of measures, including lowering capital buffers and reserve requirements, creating temporary lending facilities for banks and businesses, and easing loan terms. In addition, national governments have adopted various fiscal measures to sustain economic activity. In general, these measures include making payments directly to households, temporarily deferring tax payments, extending unemployment insurance, and increasing guarantees and loans to businesses. See the Appendix to this report for detailed information about the policy actions by individual governments. Recognizing the growing impact the pandemic is having on financial markets and economic growth, the Federal Reserve (Fed) has taken a number of steps to promote economic and financial stability involving the Fed's monetary policy and \"lender of last resort\" roles. Some of these actions are intended to stimulate economic activity by reducing interest rates and others are intended to provide liquidity to financial markets so that firms have access to needed funding. In announcing its decisions, the Fed indicated that \"[t]he COVID-19 outbreak has harmed communities and disrupted economic activity in many countries, including the United States. Global financial conditions have also been significantly affected. \" On March 31, 2020, the Trump Administration announced that it was suspending for 90 days tariffs it had placed on imports of apparel and light trucks from China, but not on other consumer goods and metals. In a speech on May 13, Federal Reserve Chairman Jerome Powell stated that the Federal Reserve's analysis indicated that of individuals working in February, \"almost 40 percent of those in households making less than $40,000 a year had lost a job in March.\" Chairman Powell also indicated that given the extraordinary nature of the current economic downturn that the Fed would, \"continue to use our tools to their fullest until the crisis has passed and the economic recovery is well under way.\" In characterizing the current challenges, Powell stated The overall policy response to date has provided a measure of relief and stability, and will provide some support to the recovery when it comes. But the coronavirus crisis raises longer-term concerns as well. The record shows that deeper and longer recessions can leave behind lasting damage to the productive capacity of the economy. Avoidable household and business insolvencies can weigh on growth for years to come. Long stretches of unemployment can damage or end workers' careers as their skills lose value and professional networks dry up, and leave families in greater debt. The loss of thousands of small- and medium-sized businesses across the country would destroy the life's work and family legacy of many business and community leaders and limit the strength of the recovery when it comes. These businesses are a principal source of job creationâsomething we will sorely need as people seek to return to work. A prolonged recession and weak recovery could also discourage business investment and expansion, further limiting the resurgence of jobs as well as the growth of capital stock and the pace of technological advancement. The result could be an extended period of low productivity growth and stagnant incomes. On April 29, the Bureau of Economic Analysis released first quarter U.S. GDP data indicating that the U.S. economy had contracted by 4.8% at an annual rate, as indicated in Figure 6 . A decline in economic activity of 30% or more was recorded in motor vehicles and parts, recreation, food services and accommodation and transportation sectors, reflecting the quarantine measures adopted across the country. In contrast to the other sectors of the economy, food and beverage consumption increased by 25% as a result of the switch by individuals from eating at restaurants and other commercial food service establishments to preparing and eating food at home. On May 5, 2020, the U.S. Census Bureau reported an increase in the overall U.S. trade deficit on a month-to-month basis of $4.5 billion, reflecting lower amounts of exports and imports of both goods and services. Exports and imports of both goods and services fell from the previous month, although the deficit in goods trade imports increased from $61 billion in February to $65.6 billion in March; the surplus in services trade fell from $21.23 billion to $21.18 billion. On May 8, the Department of Labor reported that the U.S. non-farm unemployment rate in April increased by 20 million, raising the total number of unemployed Americans to 23 million, or an unemployment rate of 14% of a total civilian labor force of 156 million. The unemployment rate does not include approximately 10 million workers who are involuntarily working part-time and another 9 million individuals seeking employment. As indicated in Figure 7 , the number of unemployed individuals increased the most in the leisure and hospitality sector, reflecting national quarantining policies to reduce the spread of COVID-19 through social contact. The employment losses were widely spread across the economy, affecting every non-farm sector and all labor groups. Forward guidance refers to Fed public communications on its future plans for short-term interest rates, and it took many forms following the 2008 financial crisis. As monetary policy returned to normal in recent years, forward guidance was phased out. It is being used again today. For example, when the Fed reduced short-term rates to zero on March 15, it announced that it \"expects to maintain this target range until it is confident that the economy has weathered recent events and is on track to achieve its maximum employment and price stability goals.\" Large-scale asset purchases, popularly referred to as quantitative easing or QE , were also used during the financial crisis. Under QE, the Fed expanded its balance sheet by purchasing securities. Three rounds of QE from 2009 to 2014 increased the Fed's securities holdings by $3.7 trillion. On March 23, the Fed announced that it would increase its purchases of Treasury securities and mortgage-backed securities (MBS)âincluding commercial MBSâissued by government agencies or government-sponsored enterprises to \"the amounts needed to support smooth market functioning and effective transmission of monetary policy.... \" These would be undertaken at the unprecedented rate of up to $125 billion daily during the week of March 23. As a result, the value of the Fed's balance sheet is projected to exceed its post-financial crisis peak of $4.5 trillion. One notable difference from previous rounds of QE is that the Fed is purchasing securities of different maturities, so the effect likely will not be concentrated on long-term rates. On March 15, the Fed announced that it was reducing reserve requirementsâthe amount of vault cash or deposits at the Fed that banks must hold against depositsâto zero for the first time ever. As the Fed noted in its announcement, because bank reserves are currently so abundant, reserve requirements \"do not play a significant role\" in monetary policy. The Fed can temporarily provide liquidity to financial markets by lending cash through repurchase agreements (repos) with primary dealers (i.e., large government securities dealers who are market makers). Before the financial crisis, this was the Fed's routine method for targeting the federal funds rate. Following the financial crisis, the Fed's large balance sheet meant that repos were no longer needed, until they were revived in September 2019. On March 12, the Fed announced it would offer a three-month repo of $500 billion and a one-month repo of $500 billion on a weekly basis through the end of the month in addition to the shorter-term repos it had already been offering. These repos would be larger and longer than those offered since September. On March 31, the Fed announced the Foreign and International Monetary Authorities (FIMA) Repo Facility, which works like the foreign repo pool in reverse. This facility allows foreign central banks to convert their U.S. Treasury holdings into U.S. dollars on an overnight basis. The Fed will charge a (typically) above market interest rate of 0.25 percentage points above the interest rate paid on bank reserves. The facility is intended to work in tandem with currency swap lines to provide additional dollars to meet global demand and is available to a broader group of central banks than the swap lines. In its March 15 announcement, the Fed encouraged banks (insured depository institutions) to borrow from the Fed's discount window to meet their liquidity needs. This is the Fed's traditional tool in its \"lender of last resort\" function. The Fed also encouraged banks to use intraday credit available through the Fed's payment systems as a source of liquidity. Both domestic and foreign commercial banks rely on short-term borrowing markets to access U.S. dollars needed to fund their operations and meet their cash flow needs. But in an environment of strained liquidity, only banks operating in the United States can access the discount window. Therefore, the Fed has standing \"swap lines\" with major foreign central banks to provide central banks with U.S. dollar funding that they can in turn lend to private banks in their jurisdictions. On March 15, the Fed reduced the cost of using those swap lines and on March 19 it extended swap lines to nine more central banks. On March 31, 2020, the Fed set up a new temporary facility to work in tandem with the swap lines to provide additional dollars to meet global demand. The new facility allows central banks and international monetary authorities to exchange their U.S. Treasury securities held with the Federal Reserve for U.S. dollars, which can then be made available to institutions in their jurisdictions. In 2008, the Fed created a series of emergency credit facilities to support liquidity in the nonbank financial system. This extended the Fed's traditional role as lender of last resort from the banking system to the overall financial system for the first time since the Great Depression. To create these facilities, the Fed relied on its emergency lending authority (Section 13(3) of the Federal Reserve Act). To date, the Fed has created six facilitiesâsome new, and some reviving 2008 facilitiesâin response to COVID-19. On March 17, the Fed revived the commercial paper funding facility to purchase commercial paper, which is an important source of short-term funding for financial firms, nonfinancial firms, and asset-backed securities (ABS). Like banks, primary dealers are heavily reliant on short-term lending markets in their role as securities market makers. Unlike banks, they cannot access the discount window. On March 17, the Fed revived the primary dealer credit facility, which is akin to a discount window for primary dealers. Like the discount window, it provides short-term, fully collateralized loans to primary dealers. On March 19, the Fed created the Money Market Mutual Fund Liquidity Facility (MMLF), similar to a facility created during the 2008 financial crisis. The MMLF makes loans to financial institutions to purchase assets that money market funds are selling to meet redemptions. On March 23, the Fed created two facilities to support corporate bond marketsâthe Primary Market Corporate Credit Facility to purchase newly issued corporate debt and the Secondary Market Corporate Credit Facility to purchase existing corporate debt on secondary markets. On March 23, the Fed revived the Term Asset-Backed Securities Loan Facility to make nonrecourse loans to private investors to purchase ABS backed by various nonmortgage consumer loans. On April 6, the Fed announced the Payroll Protection Program Lending Facility (PPPLF) to provide credit to depository institutions (e.g., banks) making loans under the CARES Act ( H.R. 748 / P.L. 116-136 ) Payroll Protection Program . Because banks are not required to hold capital against these loans, this facility increases lending capacity for banks facing high demand to originate these loans. The PPP provides low-cost loans to small businesses to pay employees. These loans do not pose credit risk to the Fed because they are guaranteed by the Small Business Administration. On April 9, the Fed announced the Main Street Lending Program (MSLP), which purchases loans from depository institutions to businesses with up to 10,000 employees or up to $2.5 billion in revenues. The loans to businesses would defer principal and interest repayment for one year, and the businesses would have to make a \"reasonable effort\" to retain employees. On April 9, the Fed announced the Municipal Liquidity Facility (MLF) to purchase state and municipal debt in response to higher yields and reduced liquidity in that market. The facility will only purchase debt of larger counties and cities. Many of these facilities are structured as special purpose vehicles controlled by the Fed because of restrictions on the types of securities that the Fed can purchase. Although there were no losses from these facilities during the financial crisis, assets of the Treasury's Exchange Stabilization Fund have been pledged to backstop any losses on several of the facilities today. In terms of a fiscal stimulus, Congress adopted H.R. 6074 on March 5, 2020 ( P.L. 116-123 ), to appropriate $8.3 billion in emergency funding to support efforts to fight COVID-19; President Trump signed the measure on March 6, 2020. President Trump also signed on March 18, H.R. 6201 ( P.L. 116-127 ), the Families First COVID-19 Response Act, that provides paid sick leave and free COVID-19 testing, expands food assistance and unemployment benefits, and requires employers to provide additional protections for health care workers. Other countries have indicated they will also provide assistance to workers and to some businesses. Congress also is considering other possible measures, including contingency plans for agencies to implement offsite telework for employees, financial assistance to the shale oil industry, a reduction in the payroll tax, and extended of the tax filing deadline. President Trump has taken additional actions, including Announcing on March 11, 2020, restrictions on all travel from Europe to the United States for 30 days, directing the Small Business Administration (SBA) to offer low-interest loans to small businesses, and directing the Treasury Department to defer tax payments penalty-free for affected businesses. Declaring on March 13, a state of emergency that frees up disaster relief funding to assist state and local governments to address the effects of the pandemic. The President also announced additional testing for the virus, a website to help individuals identify symptoms, increased oil purchases for the Strategic Oil Reserve, and a waiver on interest payments on student loans. Invoking on March 18, 2020, the Defense Production Act (DPA) that gives him the authority to require some U.S. businesses to increase production of medical equipment and supplies that are in short supply. On March 25, 2020, the Senate adopted the COVID-19 Aid, Relief, and Economic Security Act ( S. 3548 ) to formally implement President Trump's proposal by providing direct payments to taxpayers, loans and guarantees to airlines and other industries, and assistance for small businesses, actions similar to those of various foreign governments. The House adopted the measure as H.R. 748 on March 27, and President Trump signed the measure ( P.L. 116-136 ) on March 27. The law Provides funding forÂ $1,200 tax rebates to individuals, with additional $500 payments per qualifying child. The rebate begins phasing out when incomes exceed $75,000 (or $150,000 for joint filers). Assists small businesses by providing funding for, forgivable bridge loans; and additional funding for grants and technical assistance; authorizes emergency loans to distressed businesses, including air carriers, and suspends certain aviation excise taxes. Creates a $367 billion loan program for small businesses, establishes a $500 billion lending fund for industries, cities and states, a $150 billion for state and local stimulus funds, and $130 billion for hospitals. Increases unemployment insurance benefits, expands eligibility and offer workers an additional $600 a week for four month, in addition to state unemployment programs. Establishes special rules for certain tax-favored withdrawals from retirement plans; delays due dates for employer payroll taxes and estimated tax payments for corporations; and revises other provisions, including those related to losses, charitable deductions, and business interest. Provides additional funding for the prevention, diagnosis, and treatment of COVID-19; limits liability for volunteer health care professionals; prioritizes Food and Drug Administration (FDA) review of certain drugs; allows emergency use of certain diagnostic tests thatÂ are not approved by the FDA; expands health-insurance coverage for diagnostic testing and requires coverage for preventative services and vaccines; and revises other provisions, including those regarding the medical supply chain, the national stockpile, the health care workforce, the Healthy Start program, telehealth services, nutrition services, Medicare, and Medicaid. Temporarily suspends payments for federal student loans and revises provisions related to campus-based aid, supplemental educational-opportunity grants, federal work-study, subsidized loans, Pell grants, and foreign institutions. Authorizes the Department of the TreasuryÂ temporarily to guarantee money-market funds. On April 23, 2020, the House passed H.R. 266 ( P.L. 116-139 ), the Paycheck Protection Program and Health Care Enhancement Act, following similar actions by the Senate the previous day. The measure provides $484 billion for small business loans, health care providers, and COVID-19 testing. In particular, the law Provides additional lending authority for certain Small Business Administration (SBA) programs in response to COVID-19 increases the authority for (1) the Paycheck Protection Program, under which the SBA may guarantee certain loans to small businesses during the COVID-19 pandemic; and (2) advances on emergency economic injury disaster loans made in response to COVID-19. The division also expands eligibility for such disaster loans and advances to include agricultural enterprises. Provides $100 billion in FY2020 supplemental appropriations to HHS for the Public Health and Social Services Emergency Fund, including $75 billion to reimburse health care providers for health care related expenses or lost revenues that are attributable to the coronavirus outbreak; and $25 billion for expenses to research, develop, validate, manufacture, purchase, administer, and expand capacity for COVID-19 tests to effectively monitor and suppress COVID-19. Allocates specified portions of the $25 billion for COVID-19 testing to states, localities, territories, and tribes; the Centers for Diseases Control and Prevention; the National Institutes of Health; the Biomedical Advanced Research and Development Authority; the Food and Drug Administration; community health centers; rural health clinics; and testing for the uninsured. On May 12, House Democrats proposed a $3 trillion supplemental spending bill to provide additional financial resources to state and local governments. The bill reportedly would also Appropriate $200 billion in hazard pay to essential workers. Extend additional payments to individuals, for nutrition and housing assistance, and provide funding for additional testing and contact tracing. Restore the tax deduction for state and local taxes. For additional information about the impact of COVID-19 on the U.S. economy see CRS Insight IN11235, COVID-19: Potential Economic Effects . To date, European countries have not displayed a synchronized policy response similar to the one they developed during the 2008-2009 global financial crisis. Instead, they have used a combination of national fiscal policies and bond buying by the ECB to address the economic impact of the pandemic. Individual countries have adopted quarantines and required business closures, travel and border restrictions, tax holidays for businesses, extensions of certain payments and loan guarantees, and subsidies for workers and businesses. The European Commission has advocated for greater coordination among the EU members in developing and implementing monetary and fiscal policies to address the economic fallout from the viral pandemic. In its May 2020 economic forecast, the European Commission forecasted that EU GDP in 2020 would fall by 7.4% and the unemployment rate would rise to 9.0%, as indicated in Table 3 . The Commission stated that, \"Given the severity of this unprecedented worldwide shock, it is now quite clear that the EU has entered the deepest economic recession in its history.\" In addition, the Commission forecasted that EU GDP would rise rapidly in 2021, although not fast enough to erase all the 2020 decline, but would exhibit a distinct \"V\" shaped recession and recovery. Greece, Spain, France, and Italy are forecasted to experience the largest declines in GDP in 2020 as a result of their dependence on tourism, which is expected to experience a slow economic recovery. Germany and other Northern European countries are projected to experience a more modest decline in economic activity. Some analysts argue that this disparity in economic effects may complicate efforts to coordinate economic policies. To address the crisis, the Commission argued that, \"[t]he riskâ¦.is that the crisis will lead to severe distortions within the Single Market and to entrenched economic, financial and social divergences between euro area Member States that could ultimately threaten the stability of the Economic and Monetary Union.\" Pandemic-related economic effects reportedly are having a significant impact on business activity in Europe, with some indexes falling farther then they had during the height of the financial crisis and others indicating that Europe may well experience a deep economic recession in 2020. France, Germany, Italy, Spain, and the UK reported steep drops in industrial activity in March 2020. EU countries have issued travel warnings, banning all but essential travel across borders, raising concerns that even much-needed medical supplies could stall at borders affected by traffic backups. The travel bans and border closures reportedly are causing shortages of farm laborers in Germany, the UK, and Spain, which has caused growers to attempt to recruit students and workers laid off because of the pandemic. In previous actions, the European Commission had announced that it was relaxing rules on government debt to allow countries more flexibility in using fiscal policies. Also, the European Central Bank (ECB) announced that it was ready to take \"appropriate and targeted measures,\" if needed. France, Italy, Spain and six other Eurozone countries have argued for creating a \"coronabond,\" a joint common European debt instrument. Similar attempts to create a common Eurozone-wide debt instrument have been opposed by Germany and the Netherland, among other Eurozone members. With interest rates already low, however, it indicated that it would expand its program of providing loans to EU banks, or buying debt from EU firms, and possibly lowering its deposit rate further into negative territory in an attempt to shore up the Euro's exchange rate. ECB President-designate Christine Lagarde called on EU leaders to take more urgent action to avoid the spread of COVID-19 from triggering a serious economic slowdown. The European Commission indicated that it was creating a $30 billion investment fund to address COVID-19 issues. In other actions On March 12, 2020, the ECB decided to (1) expand its longer-term refinance operations (LTRO) to provide low-cost loans to Eurozone banks to increase bank liquidity; (2) extend targeted longer-term refinance operations (TLTRO) to provide loans at below-market rates to businesses, especially small and medium-sized businesses, directly affected by COVID-19; (3) provide an additional â¬120 billion (about $130 billion) for the Bank's asset purchase program to provide liquidity to firms that was in addition to â¬20 billion a month it previously had committed to purchasing. On March 13, 2020, financial market regulators in the UK, Italy, and Spain intervened in stock and bond markets to stabilize prices after historic swings in indexes on March 12, 2020. In addition, the ECB announced that it would do more to assist financial markets in distress, including altering self-imposed rules on purchases of sovereign debt. Germany's Economic Minister announced on March 13, 2020, that Germany would provide unlimited loans to businesses experiencing negative economic activity (initially providing $555 billion), tax breaks for businesses, and export credits and guarantees. On March 18, the ECB indicated that it would: create a â¬750 billion (about $800 billion) Pandemic Emergency Purchase Program to purchase public and private securities; expand the securities it will purchase to include nonfinancial commercial paper; and ease some collateral standards. In announcing the program, President-designate Lagarde indicated that the ECB would, \"do everything necessary.\" In creating the program, the ECB removed or significantly loosened almost all constraints that applied to previous asset-purchase programs, including a self-imposed limit of buying no more than one-third of any one country's eligible bonds, a move that was expected to benefit Italy. The ECB also indicated that it would make available up to â¬3 trillion in liquidity through refinancing operations. Britain ($400 billion) and France ($50 billion) also announced plans to increase spending to blunt the economic effects of the virus. Recent forecasts indicate that the economic effect of COVID-19 could push the Eurozone into an economic recession in 2020. On March 23, 2020, Germany announced that it would adopt a â¬750 billion (over $800 billion) package in economic stimulus funding. On April 15, Eurozone finance ministers announced a â¬500 billion (about $550 billion) emergency spending package to support governments, businesses, and workers and will provide funds to the European Stability Mechanism, the European Investment Bank, and for unemployment insurance. On May 5, 2020, Germany's Constitutional Court issued a ruling challenging the legality of a bond-buying program conducted by the ECB since 2015, the Public Sector Purchase Program (PSPP). In its ruling, the court directed the German government to request clarification from the ECB about various aspects of the PSPP program that the court argued might exceed the ECB's legal mandate. The German government has not yet indicated how it will formally respond to the ruling, but many analysts contend that the rulingâand the challenge to the authority of the ECB and the European Court of Justiceâcould have far-reaching implications for future ECB activities. This could potentially include challenges to the ECB's Pandemic Emergency Purchase Program (PEPP) initiated in March. The PEPP is a temporary program that authorizes the ECB to acquire up to â¬750 billion (about $820 billion) in private and public sector securities to address the economic effects of the pandemic crisis. The German court's ruling has heightened tensions between the court and the European Court of Justice. Following the 2008-2009 financial crisis and the subsequent Eurozone financial crisis, the ECB launched four asset purchase programs in 2014 to provide assistance to financially strapped Eurozone governments and to sustain financial liquidity in Eurozone banks. Those programs included the Corporate Sector Purchase Program (CSPP), the Public Sector Purchase Program (PSPP), the Asset-Backed Securities Purchase Program (ABSPP), and the Third Covered Bond Purchase Program (CBPP3). The programs operated from 2014 to 2018; the PSPP was restarted in November 2019. As of May 8, the PSPP program held â¬2.2 trillion (about $2.5 trillion) with another â¬600 billion (about $700 billion) held under other asset purchase programs. Various groups in Germany challenged the legality of the ECB bond-buying programs before the German Constitutional Court arguing that the programs exceeded the ECB's legal mandate. In turn, the German court referred the case to the European Court of Justice, which ruled in December 2019 that the ECB's actions were fully within the ECB's authority. In the German Constitutional Court's May 5 ruling, the German judges characterized the ECJ's ruling as \"incomprehensible,\" and directly challenged the ECB and the European Court of Justice and the primacy of the European Court of Justice ruling over national law. The German justices argued that the ECB had exceeded its authority by not fully evaluating the economic costs and benefits of previous bond-buying activities, including the impact on national budgets, property values, stock markets, life insurance and other economic effects. The German court also argued that the ECB's lack of a strategy for reducing its holdings of sovereign debt of Eurozone members increased risks for national governments that back up the ECB, and it challenged the ECB's strategy for reducing its holdings of sovereign debt. The United Kingdom has taken a number of steps to support economic activity. These steps are expected to limit the damage to the UK economy. The Bank of England (BOE) forecasted in May 2020 that the UK economy would contract by 30% in the first half of 2020, but then rebound sharply in the second half of the year, exhibiting a \"V\" shaped recovery. The Bank of England has announced a number of policy initiatives including On March 11, the BOE adopted a package of four measures to deal with any economic disruptions associated with COVID-19. The measures included an unscheduled cut in the benchmark interest rate by 50 basis points (0.5%) to a historic low of 0.25%; the reintroduction of the Term Funding Scheme for Small and Medium-sized Enterprises (TFSME) that provides banks with over $110 billion for loans at low interest rates; a lowering of banks' countercyclical capital buffer from 1% to zero, which is estimated to support over $200 billion of bank lending to businesses; and a freeze in banks' dividend payments. On March 15, the BOE reinstituted U.S. dollar swap lines with the Federal Reserve. On March 17, the BOE and the UK Treasury introduced the COVID Corporate Financing Facility (CCFF) to provide assistance to UK firms to bridge through Covid-19-related disruptions to their cash flow. On March 19, during a Special Monetary Policy Meeting, the Bank of England reduced its main interest rate to 0.1%, increased the size of its TFSME fund, and increased the stock of asset purchases by Â£200 billion to a total of Â£645 billion financed by issuing UK government bonds and some additional non-financial investment-grade corporate bonds. On March 20, the BOE participated in an internationally coordinated central bank expansion of liquidity through U.S. standing dollar liquidity swap line arrangements. On March, the BOE activated the Contingent Term Repo Facility (CTRF). On April 6, announced the activation of the TFSME ahead of schedule. On April 23, the Bank of England indicated it would quadruple its borrowing over the second quarter of 2020, reflecting a contraction in the UK economy, lower tax revenues, and increased financial demands to support fiscal policy measures. In terms of fiscal policy, UK Chancellor of the Exchequer Rishi Sunak proposed a national budget on March 11, 2020, that included nearly $3.5 billion in fiscal spending to counter adverse economic effects of the pandemic and increased in statutory sick leave by about $2.5 billion in funds to small and medium businesses to provide up to 14 days of sick leave for affected employees. The plan provides affected workers up to 80% of their salary, or up to Â£2,500 a month (about $2,800) if they are laid off. Some estimates indicate that UK spending to support its economy could rise to about $60 billion in 2020. Identified as the Coronavirus Job Retention Scheme (CJRS), the program was backdated to start on March 1 and had been expected to run through May, but was extended to expire the end of June 2020. Prime Minister Johnson also announced that all pubs, cafÃ©s, restaurants, theatres, cinemas, nightclubs, gyms and leisure centers would be closed. Part of the fiscal spending package includes open-ended funding for the National Health Service (NHS), $6 billion in emergency funds to the NHS, $600 million hardship fund to assist vulnerable people, and tax cuts and tax holidays for small businesses in certain affected sectors. The Bank of Japan, with already-low interest rates, injected $4.6 billion in liquidity into Japanese banks to provide short-term loans for purchases of corporate bonds and commercial paper and twice that amount into exchange traded funds to aid Japanese businesses. The Japanese government also pledged to provide wage subsidies for parents forced to take time off due to school closures. On March 24, 2020, Japan announced that the Summer Olympics set to take place in Tokyo would be postponed by a year, delaying an expected boost to the Japanese economy that was expected from the event. Japan reportedly is considering an emergency fiscal package of about $515 billion, roughly equivalent to 10% of Japan's annual gross domestic product (GDP). On April 27, 2020, the Bank of Japan announced it would purchase unlimited amounts of government bonds and quadruple its purchases of corporate debt to keep interest rates low and stimulate the Japanese economy. According to a recent CRS In Focus, China's economic growth could go negative in the first quarter of 2020 and fall below 5% for the year, with more serious effects if the outbreak continues. In early February, China's central bank pumped $57 billion into the banking system, capped banks' interest rates on loans for major firms, and extended deadlines for banks to curb shadow lending. The central bank has been setting the reference rate for China's currency stronger than its official close rate to keep it stable. On March 13, 2020, The People's Bank of China announced that it would provide $78.8 billion in funding, primarily to small businesses, by reducing bank's reserve requirements. The International Monetary Fund (IMF) is providing funding to poor and emerging market economies that are short on financial resources. If the economic effects of the virus persist, countries may need to be proactive in coordinating fiscal and monetary policy responses, similar to actions taken by of the G-20 following the 2008-2009 global financial crisis. The IMF initially announced that it was making available about $50 billion for the global crisis response. Following a G20 ministerial call on March 23, IMF Managing Director Kristalina Georgieva announced that the Fund is ready to deploy all of its $1 trillion capacity. The Fund is also exploring options to quickly raise financing foremost of which is finalizing agreement on a 2019 agreement to renew and augment the IMF's New Arrangements to Borrow (NAB), a credit line that augments IMF quota resources. Other options to increase IMF resources include a new allocation of special drawing rights (SDRs), sale of IMF gold holdings, selling IMF bonds, developing an expanded network of central bank swap arrangements centered at the IMF. For low-income countries, the IMF is providing rapid-disbursing emergency financing of up to $10 billion (50% of quota of eligible members) that can be accessed without a full-fledged IMF program. Other IMF members can access emergency financing through the Fund's Rapid Financing Instrument (RFI). This facility could provide about $40 billion for emerging markets facing fiscal pressures from COVID-19. Separate from these resources, the IMF has a Catastrophe Containment and Relief Trust (CCRT), which provides eligible countries with up-front grants for relief on IMF debt service falling due. The CCRT was used during the 2014 Ebola outbreak, but is now underfunded, according to IMF Managing Director Georgieva with just over $200 million available against possible needs of over $1 billion. On March 11, 2020, the United Kingdom announced that it will contribute Â£150 million (about $170 million) to the CCRT. To date, the United States has not contributed to the CCRT. The World Bank announced on March 2 that it is making up to $12 billion in financing ($8 billion of which is new) immediately available to help impacted developing countries. This support comprises up to $2.7 billion in new financing from the International Bank for Reconstruction and Development (IBRD), the World Bank's market-rate lending facility for middle-income developing countries, and $1.3 billion from the International Development Association (IDA), the World Bank's concessional facility for low-income countries. In addition, the Bank is reprioritizing $2 billion of the Bank's existing portfolio. The International Finance Corporation (IFC), the Bank's private-sector lending arm is making available up to $6 billion. According to the Bank, support will cover a wide range of activities, including strengthening health services and primary health care, bolstering disease monitoring and reporting, training front line health workers, encouraging community engagement to maintain public trust, and improving access to treatment for the poorest patients. Several years ago, the World Bank introduced pandemic bonds, a novel form of catastrophe financing. The Bank sold two classes of bonds worth $320 million in a program designed to provide financing to developing countries facing an acute epidemic crisis if certain triggers are met. Once these conditions are met, bondholders no longer receive interest payments on their investments, the money is no longer repaid in full, and funds are used to support the particular crisis. In the case of COVID-19, for the bonds to be triggered, the epidemic must be continuing to grow 12 weeks after the first day of the outbreak. Critics have raised a range of concerns about the bonds, arguing that the terms are too restrictive and that the length of time needs to be shortened before triggering the bonds. Others stress that the proposal remains valid â shifting the cost of pandemic assistance from governments to the private sector, especially in light of the failure of past efforts to rally donor support to establish multilateral pandemic funds. The Asian Development Bank (ADB) has approved a total of $4 million to help developing countries in Asia and the Pacific. Of the total, $2 million is for improving the immediate response capacity in Cambodia, China, Laos, Myanmar, Thailand, and Vietnam; $2 million will be available to all ADB developing member countries in updating and implementing their pandemic response plans. The ADB also provided a private sector loan of up to $18.6 million to Wuhan-based Jointown Pharmaceutical Group Co. Ltd. to enhance the distribution and supply of essential medicines and protective equipment. On March 16, 2020, the leaders of the G-7 countries (Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States) held an emergency summit by teleconference to discuss and coordinate their policy responses to the economic fallout from the global spread of COVID-19. In the joint statement released by the G-7 leaders after the emergency teleconference summit, the leaders stressed they are committed to doing \"whatever is necessary to ensure a strong global response through closer cooperation and enhanced cooperation of efforts.\" The countries pledged to coordinate research efforts, increase the availability of medical equipment; mobilize \"the full range\" of policy instruments, including monetary and fiscal measures as well as targeted actions, to support workers, companies, and sectors most affected by the spread of COVID-19; task the finance ministers to coordinate on a weekly basis, and direct the IMF and the World Bank Group, as well as other international organizations, to support countries worldwide as part of a coordinated global response. Saudi Arabia, the 2020 chair of the G-20, called an emergency G-20 summit on March 25 to discuss a response to the pandemic. The G-20 is a broader group of economies, including the G-7 countries and several major emerging markets. During the global financial crisis, world leaders decided that henceforth the G-20 would be the premiere forum for international economic cooperation. Some analysts have been surprised that the G-7 has been in front of the G-20 in responding to COVID-19, while other analysts have questioned whether the larger size and diversity of economies in the G-20 can make coordination more difficult. Analysts are hopeful that the recent G-7 summit, and a G-20 summit, will mark a shift towards greater international cooperation at the highest (leader) levels in combatting the economic fallout from the spread of COVID-19. An emergency meeting of G-7 finance ministers on March 3, 2020, fell short of the aggressive and concrete coordinated action that investors and economists had been hoping for, and U.S. and European stock markets fell after the meeting. More generally, governments have been divided over the appropriate response and in some cases have acted unilaterally, particularly when closing borders and imposing export restrictions on medical equipment and medicine. Some experts argue that a large, early, and coordinated response is needed to address the economic fallout from COVID-19, but several concerns loom about the G-20's ability to deliver. Their concerns focus on the Trump Administration's prioritization of an \"America First\" foreign policy over one committed to multilateralism; the 2020 chair of the G-20, Saudi Arabia, is embroiled in its own domestic political issues and oil price war; and U.S.-China tensions make G-20 consensus more difficult. Meanwhile, international organizations including the IMF and multilateral development banks, have tried to forge ahead with economic support given their current resources. Additionally, the Financial Stability Board (FSB), an international body including the United States that monitors the global financial system and makes regulations to ensure stability, released a statement on March 20, 2020, that its members are actively cooperating to maintain financial stability during market stress related to COVID-19. The FSB is encouraging governments to use flexibility within existing international standards to provide continued access to funding for market participants and for businesses and households facing temporary difficulties from COVID-19, while noting that many FSB members have already taken action to release available capital and liquidity buffers. Among most developed and major developing economies, economic growth at the beginning of 2020 was tepid, but still was estimated to be positive. Countries highly dependent on tradeâCanada, Germany, Italy, Japan, Mexico, and South Koreaâand commodity exporters are now projected to be the most negatively affected by the slowdown in economic activity associated with the virus. In addition, travel bans and quarantines are taking a heavy economic toll on a broad range of countries. The OECD notes that production declines in China have spillover effects around the world given China's role in producing computers, electronics, pharmaceuticals and transport equipment, and as a primary source of demand for many commodities. Across Asia, some forecasters argue that recent data indicate that Japan, South Korea, Thailand, the Philippines, Indonesia, Malaysia, and Vietnam could experience an economic recession in 2020. In early January 2020, before the COVID-19 outbreak, economic growth in developing economies as a whole was projected by the International Monetary Fund (IMF) to be slightly more positive than in 2019. This outlook was based on progress being made in U.S.-China trade talks that were expected to roll back some tariffs and an increase in India's rate of growth. Growth rates in Latin America and the Middle East were also projected to be positive in 2020. These projections likely will be revised downward due to the slowdown in global trade associated with COVID-19, lower energy and commodity prices, an increase in the foreign exchange value of the dollar, and other secondary effects that could curtail growth. Commodity exporting countries, in particular, likely will experience a greater slowdown in growth than forecasted in earlier projections as a result of a slowdown on trade with China and lower commodity prices. The combined impact of COVID-19, an increase in the value of the dollar, and an oil price war between Saudi Arabia and Russia are hitting developing and emerging economies hard. Not all of these countries have the resources or policy flexibility to respond effectively. According to figures compiled by the Institute for International Finance (IIF), cumulative capital outflows from developing countries since January 2020 are double the level experienced during the 2008/2009 crisis and substantially higher than recent market events ( Figure 8 ). The impact of the price war and lower energy demand associated with a COVID-19-related economic slowdown is especially hard on oil and gas exporters, some of whose currencies are at record lows ( Figure 9 ). Oil importers, such as South Africa and Turkey, have also been hit hard; South Africa's rand has fallen 18% against the dollar since the beginning of 2020 and the Turkish lira has lost 8.5%. Some economists are concerned that the depreciation in currencies could lead to rising rates of inflation by pushing up the prices of imports and negatively economic growth rates in 2020. Depending on individual levels of foreign exchange reserves and the duration of the capital flow slowdown, some countries may have sufficient buffers to weather the slowdown, while others will likely need to make some form of current account adjustment (reduce spending, raise taxes, etc.). Several countries, such as Iran and Venezuela, have already asked the IMF for financial assistance and others are likely to follow. (Venezuela's request was quickly rebuffed due to disagreement among the IMF membership over who is recognized as Venezuela's legitimate leader: NicolÃ¡s Maduro or Juan GuaidÃ³. ) Initial efforts at coordinating the economic response to the COVID-19 pandemic across countries have been uneven. Governments are divided over the appropriate response and in some cases have acted unilaterally, particularly when closing borders and imposing export restrictions on medical equipment and medicine. An emergency meeting of G-7 (Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States) finance ministers on March 3, 2020, fell short of the aggressive and concrete coordinated action that investors and economists had been hoping for, and U.S. and European stock markets fell sharply after the meeting. However, on March 16, 2020, the leaders of the G-7 countries held an emergency summit by teleconference to discuss and coordinate their policy responses to the economic fallout from the global spread of COVID-19. In the joint statement released by the G-7 leaders after the emergency teleconference summit, the leaders stressed they are committed to doing \"whatever is necessary to ensure a strong global response through closer cooperation and enhanced cooperation of efforts.\" The countries pledged to coordinate research efforts, increase the availability of medical equipment; mobilize \"the full range\" of policy instruments, including monetary and fiscal measures, as well as targeted actions to support workers, companies, and sectors most affected by the spread of COVID-19; task the finance ministers to coordinate on a weekly basis, and direct the IMF and the World Bank Group, as well as other international organizations, to support countries worldwide as part of a coordinated global response. G-7 coordination has not been without problems, however, including disagreement among G-7 foreign affairs ministers about how to refer to the virus (coronavirus or the \"Wuhan virus\") and concerns about collaboration on vaccine research. The G-20, which has a broader membership of major advanced and emerging-market economies representing 85% of world GDP, was slower to respond to the pandemic. Even though G-20 coordination is widely viewed as critical in the response to the global financial crisis of 2008-2009, several factors may have complicated G-20 coordination in the current context: the Trump Administration's prioritization of an \"America First\" foreign policy over one committed to multilateralism; the 2020 chair of the G-20, Saudi Arabia, is embroiled in its own domestic political issues and oil price war; and U.S.-China tensions make G-20 consensus more difficult. The G-20 held a summit by teleconference on March 26, 2020, but the resulting communique was criticized for failing to include concrete action items beyond what national governments were already doing. However, G-20 coordination appears to be gaining momentum, most notably with the G-20 agreement on debt relief for low-income countries (see \" Looming Debt Crises and Debt Relief Efforts \"). Meanwhile, international organizations including the IMF and multilateral development banks, have tried to forge ahead with economic support given their current resources. Additionally, the Financial Stability Board (FSB), an international body including the United States that monitors the global financial system and makes regulations to ensure stability, released a statement on March 20, 2020, that its members are actively cooperating to maintain financial stability during market stress related to COVID-19. The FSB is encouraging governments to use flexibility within existing international standards to provide continued access to funding for market participants and for businesses and households facing temporary difficulties from COVID-19, while noting that many FSB members have already taken action to release available capital and liquidity buffers. COVID-19 could trigger a wave of defaults around the world. In Q3 2019âbefore the outbreak of COVID-19âglobal debt levels reached an all-time high of nearly $253 trillion, about 320% of global GDP. About 70% of global debt is held by advanced economies and about 30% is held by emerging markets. Globally, most debt is held by nonfinancial corporations (29%), governments (27%) and financial corporations (24%), followed by households (19%). Debt in emerging markets has nearly doubled since 2010, primarily driven by borrowing from state-owned enterprises. High debt levels make borrowers vulnerable to shocks that disrupt revenue and inflows of new financing. The disruption in economic activity associated with COVID-19 is a wide-scale exogenous shock that will make it significantly more difficult for many private borrowers (corporations and households) and public borrowers (governments) around the world to repay their debts. COVID-19 has hit the revenue of corporations in a range of industries: factories are ceasing production, brick-and-mortar retail stores and restaurants are closing, commodity prices have plunged (Bloomberg commodity price indexâa basket of oil, metals, and food pricesâhas dropped 27% since the start of the year and is now at its lowest level since 1986), and overseas and in some cases domestic travel is being curtailed. Households are facing a rapid increase in unemployment and, in many developing countries, a decline in remittances. With fewer resources, corporations and households may default on their debts, absent government intervention. These defaults will result in a decline in bank assets, making it difficult for banks to extend new loans during the crisis or, more severely, creating solvency problems for banks. Meanwhile, many governments are dramatically increasing spending to combat the pandemic, and are likely to face sharp reductions in revenue, putting pressure on public finances and raising the likelihood of sovereign (government) defaults. Debt dynamics are particularly problematic in emerging economies, where debt obligations denominated in foreign currencies (usually U.S. dollars). Many emerging market currencies have depreciated since the outbreak of the pandemic, raising the value of their debts in terms of local currency. Governments will face difficult choices if there is a widespread wave of defaults. Most governments have signaled a commitment to or already implemented policies to support those economically impacted by the pandemic. These governments face decisions about the type of assistance to provide (loans versus direct payments), the amount of assistance to provide, how to allocate rescue funds, and what conditions if any to attach to funds. Governments have undertaken extraordinary fiscal and monetary measures to combat the crisis. However, developing countries that are constrained by limited financial resources and where health systems could quickly become overloaded are particularly vulnerable. In terms of defaults by governments (sovereign defaults), emergency assistance is generally provided by the IMF, and sometimes paired with additional rescue funds from other governments on a bilateral basis. The IMF and other potential donor countries will need to consider whether the IMF has adequate resources to respond to the crisis, how to allocate funding if the demand for funding exceeds the amount available, what conditions should be attached to rescue funding, and whether IMF programs should be paired with a restructuring of the government's debt (\"burden sharing\" with private investors). International efforts are underway to help the most vulnerable developing countries grapple with debt pressures. In mid-April 2020, the IMF tapped its Catastrophe Containment and Relief Trust (CRRT), funded by donor countries, to provide grants to cover the debt payments of 25 poor and vulnerable countries to the IMF for six months. The IMF hopes that additional donor contributions will allow this debt service relief to be extended for two years. Additionally, the G-20 finance ministers agreed to suspend debt service payments for the world's poorest countries through the end of 2020. The Institute for International Economics, which represents 450 banks, hedge funds, and other global financial funds, also announced that private creditors will join the debt relief effort on a voluntary basis. This debt standstill will free up more than $20 billion for these countries to spend on improving their health systems and fighting the pandemic. Private sector commitments were critical for official creditors, so that developing countries could redirect funds to improving health systems rather than repaying private creditors. Public concerns over the spread of the virus have led to self-quarantines, reductions in airline and cruise liner travel, the closing of such institutions as the Louvre, and the rescheduling of theatrical releases of movies, including the sequel in the iconic James Bond series (titled, \"No Time to Die\"). School closures are affecting 1.5 billion children worldwide, challenging parental leave policies. Other countries are limiting the size of public gatherings. Some businesses are considering new approaches to managing their workforces and work methods. These techniques build on, or in some places replace, such standard techniques as self-quarantines and travel bans. Some firms are adopting an open-leave policy to ensure employees receive sick pay if they are, or suspect they are, infected. Other firms are adopting paid sick leave policies to encourage sick employees to stay home and are adopting remote working policies. Microsoft and Amazon have instructed all of their Seattle-based employees to work from home until the end of March 2020. The drop in business and tourist travel is causing a sharp drop in scheduled airline flights by as much as 10%; airlines are estimating they could lose $113 billion in 2020 (an estimate that could prove optimistic given the Trump Administration's announced restrictions on flights from Europe to the United States and the growing list of countries that are similarly restricting flights), while airports in Europe estimate they could lose $4.3 billion in revenue due to fewer flights. Industry experts estimate that many airlines will be in bankruptcy by May 2020 under current conditions as a result of travel restrictions imposed by a growing number of countries. The loss of Chinese tourists is another economic blow to countries in Asia and elsewhere that have benefitted from the growing market for Chinese tourists and the stimulus such tourism has provided. The decline in industrial activity has reduced demand for energy products such as crude oil, causing prices to drop sharply, which negatively affects energy producers, renewable energy producers, and electric vehicle manufacturers, but generally is positive for consumers and businesses. Saudi Arabia is pushing other OPEC (Organization of the Petroleum Exporting Countries) members collectively to reduce output by 1.5 million barrels a day to raise market prices. U.S. shale oil producers, who are not represented by OPEC, support the move to raise prices. An unwillingness by Russia to agree to output reductions added to other downward pressures on oil prices and caused Saudi Arabia to engage in a price war with Russia that has driven oil prices below $25 per barrel at times, half the estimated $50 per barrel break-even point for most oil producing countries. Rising oil supplies and falling demand are combining to create an estimated surplus of 25 million barrels a day and could soon overwhelm storage capacity and challenge the viability of U.S. shale oil production. In 2019, low energy prices combined with high debt levels reportedly caused U.S. energy producers to reduce their spending on capital equipment, reduced their profits and, in some cases, led to bankruptcies. Reportedly, in late 2019 and early 2020, bond and equity investors, as well as banks, reduced their lending to shale oil producers and other energy producers that typically use oil and gas reserves as collateral. Disruptions to industrial activity in China reportedly are causing delays in shipments of computers, cell phones, toys, and medical equipment. Factory output in China, the United States, Japan, and South Korea all declined in the first months of 2020. Reduced Chinese agricultural exports, including to Japan, are leading to shortages in some commodities. In addition, numerous auto producers are facing shortages in parts and other supplies that have been sourced in China. Reductions in international trade have also affected ocean freight prices. Some freight companies argue that they could be forced to shutter if prices do not rebound quickly. Disruptions in the movements of goods and people reportedly are causing some companies to reassess how international they want their supply chains to be. According to some estimates, nearly every member of the Fortune 1000 is being affected by disruptions in production in China. The quickly evolving nature of the COVID-19 crisis creates a number of issues that make it difficult to estimate the full cost to global economic activity. These issues include, but are not limited to How long will the crisis last? How many workers will be affected both temporarily and permanently? How many countries will be infected and how much economic activity will be reduced? When will the economic effects peak? How much economic activity will be lost as a result of the viral outbreak? What are the most effective monetary and fiscal policies at the national and global level to address the crisis? What temporary and permanent effects will the crisis have on how businesses organize their work forces? Many of the public health measures taken by countries such as Italy, Taiwan, South Korea, Hong Kong, and China have sharply impacted their economies (with plant closures, travel restrictions, and so forth). How are the tradeoffs between public health and the economic impact of policies to contain the spread of the virus being weighed? Initial efforts at coordinating the economic response to the COVID-19 pandemic across countries have been uneven. Governments are divided over the appropriate response and in some cases have acted unilaterally, particularly when closing borders and imposing export restrictions on medical equipment and medicine. An emergency meeting of G-7 (Canada, France, Germany, Italy, Japan, the United Kingdom, and the United States) finance ministers on March 3, 2020, fell short of the aggressive and concrete coordinated action that investors and economists had been hoping for, and U.S. and European stock markets fell sharply after the meeting. However, on March 16, 2020, the leaders of the G-7 countries held an emergency summit by teleconference to discuss and coordinate their policy responses to the economic fallout from the global spread of COVID-19. In the joint statement released by the G-7 leaders after the emergency teleconference summit, the leaders stressed they are committed to doing \"whatever is necessary to ensure a strong global response through closer cooperation and enhanced cooperation of efforts.\" The countries pledged to coordinate research efforts, increase the availability of medical equipment; mobilize \"the full range\" of policy instruments, including monetary and fiscal measures, as well as targeted actions to support workers, companies, and sectors most affected by the spread of COVID-19; task the finance ministers to coordinate on a weekly basis, and direct the IMF and the World Bank Group, as well as other international organizations, to support countries worldwide as part of a coordinated global response. G-7 coordination has not been without problems, however, including disagreement among G-7 foreign affairs ministers about how to refer to the virus (coronavirus or the \"Wuhan virus\") and concerns about collaboration on vaccine research. The G-20, which has a broader membership of major advanced and emerging-market economies representing 85% of world GDP, was slower to respond to the pandemic. Even though G-20 coordination is widely viewed as critical in the response to the global financial crisis of 2008-2009, several factors may have complicated G-20 coordination in the current context: the Trump Administration's prioritization of an \"America First\" foreign policy over one committed to multilateralism; the 2020 chair of the G-20, Saudi Arabia, is embroiled in its own domestic political issues and oil price war; and U.S.-China tensions make G-20 consensus more difficult. The G-20 held a summit by teleconference on March 26, 2020, but the resulting communique was criticized for failing to include concrete action items beyond what national governments were already doing. However, G-20 coordination appears to be gaining momentum, most notably with the G-20 agreement on debt relief for low-income countries (see \" Looming Debt Crises and Debt Relief Efforts \"). Meanwhile, international organizations including the IMF and multilateral development banks, have tried to forge ahead with economic support given their current resources. Additionally, the Financial Stability Board (FSB), an international body including the United States that monitors the global financial system and makes regulations to ensure stability, released a statement on March 20, 2020, that its members are actively cooperating to maintain financial stability during market stress related to COVID-19. The FSB is encouraging governments to use flexibility within existing international standards to provide continued access to funding for market participants and for businesses and households facing temporary difficulties from COVID-19, while noting that many FSB members have already taken action to release available capital and liquidity buffers. COVID-19 could trigger a wave of defaults around the world. In Q3 2019âbefore the outbreak of COVID-19âglobal debt levels reached an all-time high of nearly $253 trillion, about 320% of global GDP. About 70% of global debt is held by advanced economies and about 30% is held by emerging markets. Globally, most debt is held by nonfinancial corporations (29%), governments (27%) and financial corporations (24%), followed by households (19%). Debt in emerging markets has nearly doubled since 2010, primarily driven by borrowing from state-owned enterprises. High debt levels make borrowers vulnerable to shocks that disrupt revenue and inflows of new financing. The disruption in economic activity associated with COVID-19 is a wide-scale exogenous shock that will make it significantly more difficult for many private borrowers (corporations and households) and public borrowers (governments) around the world to repay their debts. COVID-19 has hit the revenue of corporations in a range of industries: factories are ceasing production, brick-and-mortar retail stores and restaurants are closing, commodity prices have plunged (Bloomberg commodity price indexâa basket of oil, metals, and food pricesâhas dropped 27% since the start of the year and is now at its lowest level since 1986), and overseas and in some cases domestic travel is being curtailed. Households are facing a rapid increase in unemployment and, in many developing countries, a decline in remittances. With fewer resources, corporations and households may default on their debts, absent government intervention. These defaults will result in a decline in bank assets, making it difficult for banks to extend new loans during the crisis or, more severely, creating solvency problems for banks. Meanwhile, many governments are dramatically increasing spending to combat the pandemic, and are likely to face sharp reductions in revenue, putting pressure on public finances and raising the likelihood of sovereign (government) defaults. Debt dynamics are particularly problematic in emerging economies, where debt obligations denominated in foreign currencies (usually U.S. dollars). Many emerging market currencies have depreciated since the outbreak of the pandemic, raising the value of their debts in terms of local currency. Governments will face difficult choices if there is a widespread wave of defaults. Most governments have signaled a commitment to or already implemented policies to support those economically impacted by the pandemic. These governments face decisions about the type of assistance to provide (loans versus direct payments), the amount of assistance to provide, how to allocate rescue funds, and what conditions if any to attach to funds. Governments have undertaken extraordinary fiscal and monetary measures to combat the crisis. However, developing countries that are constrained by limited financial resources and where health systems could quickly become overloaded are particularly vulnerable. In terms of defaults by governments (sovereign defaults), emergency assistance is generally provided by the IMF, and sometimes paired with additional rescue funds from other governments on a bilateral basis. The IMF and other potential donor countries will need to consider whether the IMF has adequate resources to respond to the crisis, how to allocate funding if the demand for funding exceeds the amount available, what conditions should be attached to rescue funding, and whether IMF programs should be paired with a restructuring of the government's debt (\"burden sharing\" with private investors). International efforts are underway to help the most vulnerable developing countries grapple with debt pressures. In mid-April 2020, the IMF tapped its Catastrophe Containment and Relief Trust (CRRT), funded by donor countries, to provide grants to cover the debt payments of 25 poor and vulnerable countries to the IMF for six months. The IMF hopes that additional donor contributions will allow this debt service relief to be extended for two years. Additionally, the G-20 finance ministers agreed to suspend debt service payments for the world's poorest countries through the end of 2020. The Institute for International Economics, which represents 450 banks, hedge funds, and other global financial funds, also announced that private creditors will join the debt relief effort on a voluntary basis. This debt standstill will free up more than $20 billion for these countries to spend on improving their health systems and fighting the pandemic. Private sector commitments were critical for official creditors, so that developing countries could redirect funds to improving health systems rather than repaying private creditors.", "summary": "Since the COVID-19 outbreak was first diagnosed, it has spread to over 190 countries and all U.S. states. The pandemic is having a noticeable impact on global economic growth. Estimates so far indicate the virus could trim global economic growth by as much as 2.0% per month if current conditions persist and raise the risks of a global economic recession similar in magnitude to that experienced during the Great Depression of the 1930s. Global trade could also fall by 13% to 32%, depending on the depth and extent of the global economic downturn. The full impact will not be known until the effects of the pandemic peak. This report provides an overview of the global economic costs to date and the response by governments and international institutions to address these effects.", "document_type": "crs"}
{"report": "This report focuses on FY2020 discretionary appropriations for Interior, Environment, and Related Agencies. At issue for Congress are determining the amount of funding for agencies and programs in the bill, and the terms and conditions of such funding. Currently, Interior, Environment, and Related Agencies generally are receiving appropriations at the FY2019 level (in Division E of P.L. 116-6 ). Continuing appropriations are being provided because no regular appropriations were provided before the start of the 2020 fiscal year (on October 1, 2019). Division A of P.L. 116-59 provided continuing appropriations through November 21, 2019. The House and Senate passed a measure ( H.R. 3055 ) extending continuing appropriations through December 20, 2019, unless full-year appropriations are enacted sooner. The President signed that measure on November 21, 2019. For FY2020, President Trump sought $32.47 billion for agencies in the Interior bill, including $2.25 billion for wildfire suppression under a discretionary cap adjustment. The House included FY2020 appropriations for Interior, Environment, and Related Agencies in Division C of H.R. 3055 , as passed on June 25, 2019. The measure contained a total of $39.59 billion, including $2.25 billion for wildfire suppression under the discretionary cap adjustment. In earlier action, on June 3, 2019, the House Appropriations Committee reported H.R. 3052 (accompanied by H.Rept. 116-100 ). Similar to H.R. 3055 as passed by the House, H.R. 3052 also contained a total of $39.59 billion, including $2.25 billion for wildfire suppression under the discretionary cap adjustment. The Senate included FY2020 appropriations for Interior, Environment, and Related Agencies in Division C of H.R. 3055 , as passed on October 31, 2019. The measure contained a total of $38.11 billion, including $2.25 billion for wildfire suppression under the cap adjustment. In earlier action, on September 26, 2019, the Senate Appropriations Committee reported S. 2580 (accompanied by S.Rept. 116-123 ). Similar to H.R. 3055 as passed by the Senate, S. 2580 also contained a total of $38.11 billion, including $2.25 billion for wildfire suppression under the discretionary cap adjustment. This report first presents a short overview of the agencies and other entities funded in the bill. It then describes the appropriations requested by President Trump for FY2020 for Interior, Environment, and Related Agencies. Next, it briefly compares the total appropriations enacted for FY2019, requested by the President for FY2020, passed by the House for FY2020, and passed by the Senate for FY2020. Finally, this report compares funding enacted for FY2019, requested by the Administration for FY2020, passed by the House for FY2020, and passed by the Senate for FY2020 for selected agencies and issues that have been among those of particular interest to Congress. They include the Bureau of Land Management, Environmental Protection Agency (EPA), U.S. Fish and Wildlife Service, Forest Service, Indian Affairs, Indian Health Service, Land and Water Conservation Fund, National Park Service, Payments in Lieu of Taxes Program, Reorganization of the Department of the Interior, Smithsonian Institution, U.S. Geological Survey, and Wildland Fire Management. This report will be revised to reflect further congressional action on FY2020 Interior appropriations. Appropriations are complex. Budget justifications for some agencies are large, often a few hundred pages long, and contain numerous funding, programmatic, and legislative changes for congressional consideration. Further, appropriations laws provide funds for numerous accounts, activities, and subactivities, and the accompanying explanatory statements provide additional directives and other important information. This report does not provide in-depth information at the account and subaccount levels, nor does it generally detail budgetary reorganizations or legislative changes enacted in law or proposed for FY2020. For information on a particular agency or on individual accounts, programs, or activities administered by a particular agency, contact the key policy staff listed at the end of this report. In addition, for selected reports related to appropriations for Interior, Environment, and Related Agencies, such as individual agencies (e.g., National Park Service) or cross-cutting programs (e.g., Wildland Fire Management), see the \"Interior & Environment Appropriations\" subissue under the \"Appropriations\" Issue Area page on the Congressional Research Service (CRS) website. The annual Interior, Environment, and Related Agencies appropriations bill includes funding and other provisions for agencies and programs in three federal departments and for numerous related agencies. The Interior bill typically contains three primary appropriations titles and a fourth title with general provisions. Title I provides funding for most Department of the Interior (DOI) agencies, many of which manage land and other natural resource or regulatory programs. Title I also typically includes general provisions related to DOI agencies. Title II contains appropriations and administrative provisions for EPA. Title III, Related Agencies, currently funds 23 agencies in other departments, such as the Forest Service in the Department of Agriculture and the Indian Health Service in the Department of Health and Human Services; arts and cultural agencies, including the Smithsonian Institution; and various other organizations and entities. Title III also contains administrative provisions for some agencies funded therein. A fourth title of the bill, General Provisions, typically contains additional guidance and direction for agencies in the bill. In addition, in the FY2019 appropriations law, Title IV also included appropriations for EPA. Selected major agencies in the Interior bill are briefly described below. DOI's mission is to conserve and manage the nation's natural resources and cultural heritage; provide scientific and other information about those resources and natural hazards; and exercise trust responsibilities and other commitments to American Indians, Alaska Natives, and affiliated island communities. There are eight DOI agencies and two other broad accounts funded in the Interior bill that carry out this mission. Hereinafter, these agencies and broad accounts are referred to collectively as the 10 DOI \"agencies.\" Not including the two broad accounts, the DOI agencies funded in the Interior bill include the following: The Bureau of Land Management administers about 246 million acres of public land, mostly in the West, for diverse uses such as energy and mineral development, livestock grazing, recreation, and preservation. The agency also is responsible for more than 700 million acres of federal onshore subsurface mineral estate throughout the nation and supervises the mineral operations on about 60 million acres of Indian trust lands. The U.S. F ish and Wildlife Service administers 89 million acres of federal land within the National Wildlife Refuge System and other areas, including 77 million acres in Alaska. It also manages several large marine refuges and marine national monuments, sometimes jointly with other federal agencies. In addition, the U.S. Fish and Wildlife Service, together with the National Marine Fisheries Service (Department of Commerce), is responsible for implementing the Endangered Species Act (16 U.S.C. Â§Â§1531 et seq.); promoting wildlife habitat; enforcing federal wildlife laws; supporting wildlife and ecosystem science; conserving migratory birds; administering grants to aid state fish and wildlife programs; and coordinating with state, international, and other federal agencies on fish and wildlife issues. The National Park Service administers 80 million acres of federal land within the National Park System, including 419 separate units in the 50 states, District of Columbia, and U.S. territories. Roughly two-thirds of the system's lands are in Alaska. The National Park Service has a dual missionâto preserve unique resources and to provide for their enjoyment by the public. The agency also supports and promotes some resource conservation activities outside the National Park System through grant and technical assistance programs and cooperation with partners. The U.S. Geological Survey is a science agency that provides physical and biological information related to geological resources; natural hazards; climate and land use change; and energy, mineral, water, and biological sciences and resources. In addition, it is the federal government's principal civilian mapping agency (e.g., topographical and geological mapping) and a primary source of data on the quality of the nation's water resources (e.g., streamgaging). The Bureau of Ocean Energy Management manages development of the nation's offshore conventional and renewable energy resources in the Atlantic, the Pacific, the Gulf of Mexico, and the Arctic. These resources are located in areas covering approximately 1.7 billion acres located beyond state waters, mostly in the Alaska region (more than 1 billion acres) but also off all coastal states. The Bureau of Safety and Environmental Enforcement provides regulatory and safety oversight for resource development in the outer continental shelf. Among its responsibilities are oil and gas permitting, facility inspections, environmental compliance, and oil spill response planning. The Office of Surface Mining Reclamation and Enforcement works with states and tribes to reclaim abandoned coal mining sites. The agency also regulates active coal mining sites to minimize environmental impacts during mining and to reclaim affected lands and waters after mining. Indian Affairs agencies provide and fund a variety of services to federally recognized American Indian and Alaska Native tribes and their members. Historically, these agencies have taken the lead in federal dealings with tribes. The Bureau of Indian Education funds an elementary and secondary school system, institutions of higher education, and other educational programs. The Bureau of Indian Affairs is responsible for programs that include government operations, courts, law enforcement, fire protection, social programs, roads, economic development, employment assistance, housing repair, irrigation, dams, Indian rights protection, implementation of land and water settlements, and management of trust assets (real estate and natural resources). EPA has no organic statute establishing an overall mission; rather, the agency administers various environmental statutes, which have an express or general objective to protect human health and the environment. Primary responsibilities include the implementation of federal statutes regulating air quality, water quality, drinking water safety, pesticides, toxic substances, management and disposal of solid and hazardous wastes, and cleanup of environmental contamination. EPA also awards grants to assist states and local governments in implementing federal law and complying with federal requirements to control pollution. The agency also administers programs that provide financial assistance for public wastewater and drinking water infrastructure projects. Title III of the Interior bill currently funds 23 agencies, organizations, and other entities, which are collectively referred to hereinafter as the \"Related Agencies.\" Among the Related Agencies funded in the Interior bill, roughly 95% of the funding is typically provided to the following: The Forest Service in the Department of Agriculture manages 193 million acres of federal land within the National Forest Systemâconsisting of national forests, national grasslands, and other areasâin 43 states, the Commonwealth of Puerto Rico, and the Virgin Islands. It also provides technical and financial assistance to states, tribes, and private forest landowners and conducts research on sustaining forest resources for future generations. The Indian Health Service in the Department of Health and Human Services provides medical and environmental health services for approximately 2.6 million American Indians and Alaska Natives. Health care is provided through a system of facilities and programs operated by the agency, tribes and tribal organizations, and urban Indian organizations. The agency operates 25 hospitals, 50 health centers, 26 health stations, and 2 school health centers. Tribes and tribal organizations, through Indian Health Service contracts and compacts, operate another 22 hospitals, 280 health centers, 62 health stations, 134 Alaska Native village clinics, and 6 school health centers. The Smithsonian Institution is a museum and research complex consisting of 19 museums and galleries, the National Zoological Park (\"National Zoo\"), and 9 research facilities throughout the United States and around the world. Established by federal legislation in 1846 with the acceptance of a trust donation by the institution's namesake benefactor, the Smithsonian is funded by both federal appropriations and a private trust. The National Endowment for the Arts and the National Endowment for the Humanities make up the National Foundation on the Arts and the Humanities. The National Endowment for the Arts is a major federal source of support for all arts disciplines. Since 1965, it has awarded more than 145,000 grants, which have been distributed to all states. The National Endowment for the Humanities generally supports grants for humanities education, research, preservation, and public humanities programs; creation of regional humanities centers; and development of humanities programs under the jurisdiction of state humanities councils. Since 1965, it has awarded approximately 63,000 grants. It also supports a Challenge Grant program to stimulate and match private donations in support of humanities institutions. For FY2020, President Trump requested $32.47 billion for the more than 30 agencies and entities in the Interior, Environment, and Related Agencies appropriations bill. This total included $2.25 billion for certain wildfire suppression activities under an adjustment to discretionary spending limits for FY2020. Budget authority designated for those activities would cause the spending limits to be adjusted, making it effectively not subject to the limits. For the 10 major DOI agencies in Title I of the bill, the request was $11.75 billion, or 36.2% of the $32.47 billion total requested. For EPA, funded in Title II of the bill, the request was $6.22 billion, or 19.2% of the total. For the 23 agencies and other entities currently funded in Title III of the bill, the request was $14.50 billion, or 44.7% of the total. Appropriations for agencies vary widely for reasons relating to the number, breadth, and complexity of agency responsibilities; alternative sources of funding (e.g., mandatory appropriations); and Administration and congressional priorities, among other factors. Thus, although the President's FY2020 request covered more than 30 agencies, funding for a small subset of these agencies accounted for most of the total. For example, the requested appropriations for three agenciesâEPA, Forest Service, and Indian Health Serviceâwere more than half (59.2%) of the total request. Further, more than three-quarters (76.2%) of the request was for these three agencies and two others, National Park Service and Indian Affairs. For DOI agencies, the FY2020 requests ranged from $121.7 million for the Office of Surface Mining Reclamation and Enforcement to $2.77 billion for Indian Affairs. The requests for 5 of the 10 agencies exceeded $1 billion. Nearly half (47.0%) of the $11.75 billion requested for DOI agencies was for two agenciesâIndian Affairs ($2.77 billion) and the National Park Service ($2.74 billion). For Related Agencies in Title III, the requested funding levels exhibited even more variation. The President sought amounts ranging from no funding for two entitiesâgrants under National Capital Arts and Cultural Affairs and the Women's Suffrage Centennial Commissionâto $7.09 billion for the Forest Service. The Indian Health Service, with a request of $5.91 billion, was the only other agency in Title III for which the President requested more than $1 billion. The next-largest request was for the Smithsonian Institution, at $978.3 million. By contrast, the other 20 Title III entities each had requests of $154.1 million or less, including 12 with requests of less than $11 million each. Figure 2 identifies the share of the President's FY2020 request for particular agencies in the Interior bill. For FY2019, the total enacted appropriation for Interior, Environment, and Related Agencies was $37.19 billion. This total included $35.61 billion in regular appropriations and $1.58 billion in emergency supplemental appropriations for disaster relief. The disaster relief monies were provided to several agencies for various purposes. The FY2019 appropriation did not include a discretionary cap adjustment for wildfire suppression. As noted, for FY2020, the President sought $32.47 billion for agencies in the Interior bill, including $2.25 billion for wildfire suppression under a discretionary cap adjustment. The President's FY2020 request would be $3.14 billion (8.8%) lower than the FY2019 regular enacted appropriation of $35.61 billion and $4.72 billion (12.7%) lower than the FY2019 total appropriation of $37.19 billion. On June 25, 2019, the House passed H.R. 3055 with $39.59 billion (in Division C) for agencies in the Interior bill. This total included $2.25 billion for wildfire suppression under the cap adjustment. The FY2020 House-passed total is higher than the FY2019 enacted total, the FY2020 requested amount, and the FY2020 Senate-passed level. Specifically, the House-passed amount is $2.40 billion (6.4%) higher than the FY2019 total of $37.19 billion in regular and emergency appropriations, $3.98 billion (11.2%) higher than the FY2019 total of $35.61 billion in regular appropriations, $7.12 billion (21.9%) higher than the FY2020 President's request of $32.47 billion, and $1.48 billion (3.9%) higher than the FY2020 Senate-passed amount of $38.11 billion. On October 31, 2019, the Senate passed H.R. 3055 with $38.11 billion (in Division C) for agencies in the Interior bill. This total included $2.25 billion for wildfire suppression under the cap adjustment. The FY2020 Senate-passed total is higher than the FY2019 enacted total and the FY2020 requested amount but lower than the House-passed level. Specifically, the Senate-passed amount is $918.8 million (2.5%) higher than the FY2019 total of $37.19 billion in regular and emergency appropriations, $2.50 billion (7.0%) higher than the FY2019 total of $35.61 billion in regular appropriations, $5.64 billion (17.4%) higher than the FY2020 President's request of $32.47 billion, and $1.48 billion (3.7%) lower than the FY2020 House-passed amount of $39.59 billion. Figure 3 depicts the FY2019 enacted regular and emergency supplemental appropriations, the FY2020 appropriations requested by the President, the FY2020 appropriations passed by the House in H.R. 3055 , and the FY2020 appropriations passed by the Senate in H.R. 3055 . It shows the appropriations contained in each of the three main appropriations titles of the Interior billâTitle I (DOI), Title II (EPA), and Title III (Related Agencies). For FY2019 enacted appropriations, it also depicts the appropriations for EPA in the general provisions in Title IV and the emergency supplemental appropriations for several agencies for disaster relief. Table 1 , at the end of this report, lists the appropriations for each agency that were enacted for FY2019, requested by the President for FY2020, passed by the House for FY2020 in H.R. 3055 , and passed by the Senate for FY2020 in H.R. 3055 . There are many differences among the FY2019 enacted appropriations and the FY2020 funding requested by the President, passed by the House, and passed by the Senate. Selected agencies and programs are highlighted below, among the many of interest to Members of Congress, stakeholders, and the public. For the selected agencies and programs, the discussions below briefly compare FY2019 total funding (regular and supplemental) with FY2020 levels requested by the Administration, approved by the House in H.R. 3055 , and approved by the Senate in H.R. 3055. Excluding FY2019 emergency supplemental appropriations would result in different comparisons for some of the agencies and programs covered below. The Administration sought $1.19 billion for the Bureau of Land Management (BLM) for FY2020, a decrease of 11.8% from the FY2019 appropriation ($1.35 billion). The request contained lower funding for the main BLM account, Management of Lands and Resources, and for many programs within the account, including rangeland management, wildlife and aquatic habitat management, resource management planning, and deferred maintenance. However, the Administration requested increases for some programs within the account, including management of coal and renewable energy. The Administration did not seek funding for new land acquisition by BLM (from the Land and Water Conservation Fund [LWCF]), and it proposed an overall rescission to the Land Acquisition account for an account total of -$10.0 million. Other accounts would receive level funding under the Administration's request, including management of Oregon and California Grant Lands. For this account, the President also proposed a budget restructuring. The House-passed bill contained $1.41 billion in BLM appropriations; this would be an increase of 4.9% over FY2019. It would increase funding for the Management of Lands and Resources account and for many programs within the account, such as wild horse and burro management and wildlife and aquatic habitat management. The measure also contained additional appropriations for other accounts relative to FY2019, such as Land Acquisition and Oregon and California Grant Lands. The House did not support the budget restructuring for the latter account as proposed in the President's FY2020 request. With $1.40 billion in FY2020 appropriations, the Senate-passed bill would increase BLM appropriations 4.0% over the FY2019 level. The Senate-passed measure included additional appropriations for the Management of Lands and Resources account and generally would provide level or increased funding for programs within the account. The largest increase within the account ($35.0 million, 43%) would be for wild horse and burro management. For other accounts, the Senate-passed bill generally contained funding level or nearly level to the FY2019 enacted appropriation. The Senate did not support the budget restructuring for the Oregon and California Grant Lands account, as proposed in the President's FY2020 request. For FY2019, EPA received $8.06 billion in Title II of the regular appropriations law and another $791.0 million in Title IV of that law, for an FY2019 regular appropriation of $8.85 billion. In addition, EPA received $414.0 million in emergency supplemental appropriations for FY2019, resulting in an FY2019 total appropriation of $9.26 billion. Relative to total FY2019 appropriations of $9.26 billion, EPA would receive a decrease (32.8%) for FY2020 under the Administration's request of $6.22 billion. The request contained lower funding for most accounts, among them Science and Technology; Environmental Programs and Management (including geographic programs); and State and Tribal Assistance Grants (STAG), including for categorical grants and capitalization grants to states for wastewater infrastructure projects through the Clean Water State Revolving Fund (SRF) and for drinking water infrastructure grants to states through the Drinking Water SRF. Only the Buildings and Facilities account would receive an increase under the President's request. EPA would receive $9.53 billion for FY2020 under the House-passed bill, an increase (2.9%) relative to total FY2019 appropriations. Most accounts would receive additional funds over FY2019 total appropriations. However, the STAG account and the Water Infrastructure Finance and Innovation Program would receive less funding under the House-passed bill. The Senate-passed bill contained $9.01 billion for EPA for FY2020, a decrease (2.7%) from the FY2019 total appropriation. Relative to FY2019 total appropriations, some accounts would remain level (e.g., Buildings and Facilities), others would increase (e.g., Environmental Programs and Management), and still others would decrease (e.g., State and Tribal Assistance Grants). For the U.S. Fish and Wildlife Service (FWS), the Administration proposed $1.33 billion for FY2020, a reduction of 20.0% from the FY2019 level ($1.66 billion). The Administration sought to reduce funding for all FWS accounts, for instance for Construction (by 88.5%) and Land Acquisition (by 93.0%, with no new acquisitions funded from LWCF). The Resource Management account would be reduced overall (by 2.7%), but the President proposed increases for some programs, including the National Wildlife Refuge System. Citing \"higher priorities,\" the Administration proposed eliminating discretionary appropriations for two FWS accountsâthe Cooperative Endangered Species Conservation Fund and the National Wildlife Refuge Fund. The House-passed bill would reduce FWS funding by 0.5% relative to the FY2019 enacted appropriation, with Construction reduced as under the President's proposal. However, the measure would increase funding for several accounts. They included Resource Management, with additional funds for ecological services and the National Wildlife Refuge System, among other programs; the Cooperative Endangered Species Conservation Fund; and Land Acquisition. The House-passed bill also would retain level funding for the National Wildlife Refuge Fund. The Senate-passed bill would reduce FWS funding by 1.8% from the FY2019 enacted level. Some accounts would decrease, including Construction, Land Acquisition, and the Cooperative Endangered Species Conservation Fund. Other accounts would increase, including Resource Management, with additional funds for fish and aquatic conservation and the National Wildlife Refuge System, among other programs. The bill would provide level funding for one accountâthe National Wildlife Refuge Fund. For FY2020, the Administration requested $7.09 billion (2.1% more) for the Forest Service (FS) than was enacted for FY2019 ($6.94 billion). Within the overall increase, the President proposed higher funding (15.4%) for Wildland Fire Management, including $1.95 billion under a discretionary cap adjustment for wildfire suppression, as noted. The President sought reduced funding for all other FS accounts, including 47.5% less for State and Private Forestry, 15.4% less for Forest and Rangeland Research, and 5.4% less for the National Forest System. The Administration also sought to eliminate funding for some accounts and programs, including Land Acquisition (from LWCF), the Collaborative Forest Landscape Restoration Fund, and certain cooperative forestry programs such as Forest Legacy. For FY2020, the House-passed bill would provide an increase for FS of 10.1% over FY2019. The measure contained $921.8 million in a new accountâForest Service Operationsâfor costs of administrative support functions, including salaries and expenses of employees, leases for buildings and sites where support functions occur, utilities and telecommunications, business services, and information technology. The House Appropriations Committee recommended this new account to eliminate the use of \"cost pools\" for these support functions. The six major FS accounts would be correspondingly reduced in FY2020 to exclude costs of support functions, as shown in the committee's report. In part because of the proposed new account, the House-passed bill reflects reductions for FY2020 for three of the major FS accounts (Forest and Rangeland Research, National Forest System, and Capital Improvement and Maintenance). However, the appropriation for each of these three accounts, together with funding for related administrative support purposes in the new account, would appear to total more than the FY2019 appropriation for each major account. The Senate-passed bill would provide FS with an increase of 7.6% over FY2019. The measure contained a new Forest Service Operations account, similar to the House-passed bill, but with $953.8 million. The Senate Appropriations Committee supported this new account for certain costs of salaries and expenses, including those funded by \"cost pools,\" to increase transparency and efficiency of agency spending by distinguishing salaries and expenses from other project costs. Other FS accounts would be reduced in FY2020 to exclude costs of support functions captured by the new account, as reflected in the committee's report. In part because of the proposed new account, the Senate-passed bill reflects reductions for several FS accounts from FY2019 levels. For several years, instructions accompanying annual appropriations acts had encouraged the Secretary of the Interior to consolidate Indian education functions within the Bureau of Indian Education (BIE) and present such reorganization in the subsequent fiscal year budget request. For FY2020, the Administration proposed funding the BIE independently from the Bureau of Indian Affairs (BIA), and submitted a separate budget justification for each bureau. In FY2019 (and earlier years), Indian education was funded in an account with other Indian programs. In proposing a separate budget structure for BIE, the Administration sought to \"strengthen BIE as an independent bureau with a separate budget structure to advance ongoing BIE reforms to improve learning and student outcomes\" and to reduce overlapping functions between BIA and BIE to \"better deliver services to schools, maximize efficiency, and build capacity within BIE.\" The Administration's proposed budget restructuring makes comparisons with FY2019 somewhat challenging. The combined FY2020 request of $2.77 billion for both bureaus was 9.9% less than the FY2019 enacted amount ($3.08 billion). Many Indian programs would be funded at lower levels, including human services and natural resources management, although some would be funded at higher levels, such as self-governance compacts. Construction (including construction of educational facilities) was the largest dollar decrease in the budget request ($231.4 million less); funding for education programs also would decline. The House-passed measure supported the Administration's request to establish and fund the BIE separately from the BIA. The House-passed measure contained an overall increase of 14.0% relative to FY2019 funding for Indian Affairs. Many programs and activities would be funded at higher levels as compared with FY2019 enacted amounts, including tribal government, natural resources management, and public safety and justice. Construction (including construction of educational facilities) was the largest dollar increase in the House-passed measure ($174.5 million more), and funding for education programs also would increase. The Senate-passed measure also supported the Administration's request to establish and fund the BIE separately from the BIA. The Senate Appropriations Committee expressed support for this separation \"in order to improve the quality of education offered to address the performance gap of student's education at BIE-funded schools.\" The bill would provide an overall increase of 1.6% over FY2019 funding for Indian Affairs. Many programs and activities would be funded at levels similar to FY2019 enacted amounts, including Indian education. However, some programs would receive additional funds, such as contract support costs (to pay tribes for services provided) and self-governance compacts. Other activities would receive lower funding, such as Indian land and water claim settlements and services under the Indian child welfare act. Under the Administration's FY2020 request, the Indian Health Service (IHS) would receive $5.91 billion, 1.8% more than the FY2019 appropriation ($5.80 billion). While various programs would receive additional funds, the largest dollar increase would be for hospital and health clinics ($215.9 million). The increase for hospital and health clinics included $25.0 million for an initiative seeking to end the Hepatitis C and HIV/AIDS \"epidemic in Indian Country\" and $25.0 million for adoption and implementation of a new electronic health record system to improve disease management, patient outcomes, opioid tracking, and other aspects of healthcare. Other programs would be reduced under the Administration's request. For example, the Administration proposed no funding for health education, citing other priorities; cutting funding for the construction of health care facilities (31.9%); and reducing appropriations for community health representatives (61.8%) to begin phasing out the program and replacing it with a National Community Health Aide Program. Funding for contract support costs, which helps tribes pay the costs of administering IHS-funded programs, would be nearly level, reflecting IHS's estimated need at the time of the FY2020 budget submission. The House-passed bill for FY2020 contained an increase of 9.3% over FY2019 appropriations for IHS. The measure included relatively stable or higher funding for most activities. Activities that would receive additional appropriations included clinical services, with the largest dollar increase for hospital and health clinics ($273.2 million, 12.7%), including $25.0 million for the Administration's initiative to end the Hepatitis C and HIV/AIDS epidemic. Other programs that would receive increases included alcohol and substance abuse, urban Indian health services, and Indian health professions. The Indian Health Facilities account would increase by 9.7%, with the largest increase for construction of health care facilities. The House bill retained essentially level funding for health education and community health representatives. As under the President's request, funding for contract support costs would be nearly level, and $25.0 million was included for an electronic health record system. The FY2020 Senate-passed measure contained an increase of 4.1% over FY2019 enacted appropriations. The measure included relatively stable or higher funding for most activities. Clinical services would receive additional funds, with the largest dollar increase for hospital and health clinics ($192.4 million, 9.0%). The Indian Health Facilities account also would be funded over the FY2019 level, with a 2.7% increase. As under the President's request, funding for contract support costs would be nearly level. The Senate bill also retained essentially level funding for health education and community health representatives and would provide $3.0 million for an electronic health record system. LWCF has funded land acquisition for the four main federal land management agencies, a matching grant program to states to support outdoor recreation, and other purposes. For FY2019, a total of $435.0 million was appropriated from the LWCF. For FY2020, the Administration did not seek discretionary appropriations for most programs that received appropriations from the LWCF in FY2019. Further, the Administration proposed an overall rescission to LWCF, for a program total of -$23.5 million due to cancelation of prior-year funds for some program components. In support of this reduction, the President cited higher priorities, a need to focus resources on maintaining existing federal lands rather than acquiring additional ones, and a desire to shift funding for the state grant program to mandatory appropriations, among other reasons. The House-passed bill contained a total of $524.0 million in appropriations from the LWCF, a 20.4% increase over FY2019 total LWCF appropriations. The measure included increases for each of the three main activities for which the LWCF has been usedâland acquisition, the state outdoor recreation grant program, and other purposes. The Senate-passed bill, including $29.0 million in rescissions of prior year funding, would provide total appropriations from the LWCF of about $436 million. The FY2020 Senate level would be roughly level with the FY2019 enacted appropriation. For FY2020, the Administration requested $2.74 billion, 18.2% less for the National Park Service (NPS) than the total enacted for FY2019 ($3.35 billion). Within the overall reduction, the President proposed cuts for each NPS account, including the Operation of the National Park System, Construction, and the Historic Preservation Fund, as well as many programs. The President proposed the elimination of discretionary funding for some programs, including grants for National Heritage Areas, grants to states for outdoor recreation, line item acquisitions by the NPS (through LWCF), and the Centennial Challenge Program (a matching grant program to encourage donations). The House and Senate approved relatively level funding for FY2020, with a 0.3% increase in the House-passed bill and a 0.1% increase in the Senate-passed bill over the FY2019 enacted appropriation. Both bills included increases for some accounts and programs but decreases for others. As examples, the bills contained increased funds for the Operation of the National Park System, for programs including resource stewardship, park protection, and facility operations and maintenance, though the House-passed measure had higher funding for the account overall and for each of these three programs. Both bills also contained additional funds for Land Acquisition, for activities including grants to states for outdoor recreation and line item acquisitions by the NPS. In contrast, the House- and Senate-passed measures contained lower than the FY2019 total appropriations for Construction and for the Historic Preservation Fund, for instance. Both bills also retained funding for grants for National Heritage Areas and partnerships under the Centennial Challenge Program. The President's FY2020 request of $465.0 million would reduce (9.7%) the Payments in Lieu of Taxes Program (PILT) from the FY2019 level ($515.1 million). In the FY2020 budget justification, the Administration asserted that the requested level supports \"this important program while balancing Departmental funding priorities in a constrained budget environment. For FY2020, the House- and Senate-passed bills would provide for the full statutory funding level, estimated to be $500.0 million, according to the House and Senate Appropriations Committees. PILT compensates counties and local governments for nontaxable lands within their jurisdictions. The authorized level for the program is calculated under a formula that considers various factors and varies from year to year. For FY2020, the Administration requested a total of $25.3 million for reorganization of four DOI agencies funded in the Interior bill, namely BLM, FWS, NPS, and the U.S. Geological Survey (USGS). The request would be a 79.4% increase over the FY2019 appropriation ($14.1 million) for reorganization of these agencies and Indian Affairs. Under the FY2020 request, the funds would be used for costs to agencies of transitioning to a new unified regional structure, relocating certain staff and functions, and integrating business operations. The House-passed bill did not specify funding for reorganization. In its report on FY2020 legislation, the House Appropriations Committee stated that its recommended funding did not \"provide funds requested within the Department's bureaus for the Department Wide Reorganization.\" The committee expressed an understanding that DOI had not obligated FY2019 funding or provided to the committee information that had been requested related to the reorganization plan and costs. The Senate-passed bill did not make explicit the extent to which funds were included for DOI reorganization. For FY2020, the Smithsonian Institution (SI) would receive $978.3 million under the Administration's request, a decrease of 6.2% relative to FY2019 enacted appropriations ($1.04 billion). However, the request contained funding at or near the FY2019 level for most SI museums and research institutes (with a 0.9% increase for these entities). It also included additional funds (3.5%) for facilities services, which encompasses maintenance, operation, security, and support. In contrast, the request would decrease (27.8%) the Facilities Capital account, which includes planning, design, and revitalization of facilities. Revitalization involves \"making major repairs or replacing declining or failed infrastructure to address the problems of advanced deterioration,\" according to the SI. Major revitalization projects that would be funded under the President's request involve the National Air and Space Museum (part of a multiyear, multiphase renovation), the National Zoo, and the Hirshhorn Museum and Sculpture Garden, among others. The House approved an increase (2.7%) for SI, with funding at or higher than the FY2019 level for most SI museums and research institutes (with a 3.4% increase for these entities). The House bill also included an additional 29.4% for facilities services, with most of the additional funding directed towards maintenance. The House approved a decrease of 27.8% for the Facilities Capital account, as requested by the Administration. The Senate-passed bill contained an increase (0.4%) for SI, with funding at or near the FY2019 level for most SI museums and research institutes (with a 0.5% increase for these entities). For facilities services, the measure included an increase of 2.6%. The Senate would decrease the Facilities Capital account (2.3%) from the FY2019 level. However, the Senate included more funding in the account for revitalization of the National Air and Space Museum than had been requested by the President or approved by the House for FY2020. The USGS would receive $983.5 million under the Administration's FY2020 request, a decrease of 21.9% relative to its total FY2019 appropriations of $1.26 billion. It is difficult to compare FY2019 enacted and FY2020 requested funding for the agency's eight major activities. This is in part because the Administration proposed a budget restructuring that would reduce USGS budget activities from eight to seven, by eliminating the land resources mission area. The proposed restructuring also would reorganize some programs under the remaining activities. Goals include consolidating similar programs, improving communication, and enhancing integration of information, among others. The House approved a reduction of 1.8% for USGS for FY2020. Within the overall reduction were decreases from the FY2019 level for four of the major activities, among them natural hazards and facilities. However, the House approved increases for the other four major activities, including land resources and core science systems. The House did not adopt the Administration's proposed budget restructuring. The House Committee on Appropriations contended that it \"reduces program and funding transparency.\" The FY2020 Senate-passed bill contained a 3.9% decrease for USGS relative to FY2019 enacted appropriations. The Senate adopted the Administration's proposed budget restructuring. This makes it difficult to compare the FY2020 Senate-passed appropriations and FY2019 enacted appropriations for major activities. For instance, the Senate's 88.0% increase for core science systems was largely due to the transfer in of funding for national land imaging, which includes the Landsat satellite program. In FY2019, national land imaging was funded under the land resources activity, which would be abolished under the restructuring proposed by the President and supported by the Senate. For FY2020, the Administration proposed $6.05 billion in appropriations for Wildland Fire Management (WFM) of DOI and FS, including $2.25 billion under a discretionary cap adjustment for wildfire suppression. Of the $2.25 billion, the cap adjustment would allow for $300.0 million for DOI and $1.95 billion for FS. No similar cap adjustment was in effect for FY2019. The President's request would be a 15.4% increase over the total FY2019 enacted level for DOI and FS ($5.24 billion). More specifically, the FY2020 request would increase appropriations by 29.6% for DOI and by 12.3% for FS, primarily for wildfire suppression. Both the House- and Senate-passed totals included $2.25 billion under a discretionary cap adjustment, as requested by the President. It is difficult to make comparisons between appropriations for Wildland Fire Management in FY2019 and appropriations for FY2020 in the House- and Senate-passed bills. This is because the FY2020 House- and Senate-passed amounts for Wildland Fire Management do not include FS appropriations for certain administrative support functions that were included in the FY2019 enacted level (and in the FY2020 President's request for Wildland Fire Management.) ", "summary": "The Interior, Environment, and Related Agencies appropriations bill contains funding for more than 30 agencies and entities. They include most of the Department of the Interior (DOI) as well as agencies within other departments, such as the Forest Service within the Department of Agriculture and the Indian Health Service within the Department of Health and Human Services. The bill also provides funding for the Environmental Protection Agency (EPA), arts and cultural agencies, and other organizations and entities. Issues for Congress include determining the amount, terms, and conditions of funding for agencies and programs. Currently, Interior, Environment, and Related Agencies generally are receiving appropriations at the FY2019 level (in Division E of P.L. 116-6 ). Continuing appropriations are being provided because no regular appropriations were provided before the start of the 2020 fiscal year (on October 1, 2019). Division A of P.L. 116-59 provided continuing appropriations through November 21, 2019. The House and Senate passed a measure extending continuing appropriations through December 20, 2019, unless full-year appropriations are enacted sooner. The President signed that measure on November 21, 2019. For FY2020, President Trump requested $32.47 billion for Interior, Environment, and Related Agencies, including $2.25 billion for DOI and Forest Service wildfire suppression under a discretionary cap adjustment. For the 10 major DOI agencies in Title I of the bill, the request was $11.75 billion, or 36.2% of the $32.47 billion total requested. For EPA, funded in Title II of the bill, the request was $6.22 billion, or 19.2% of the total. For the 23 agencies and other entities currently funded in Title III of the bill, the request was $14.50 billion, or 44.7% of the total. The President's FY2020 request would be $3.14 billion (8.8%) lower than the FY2019 regular enacted appropriation of $35.61 billion (in P.L. 116-6 , Division E), and $4.72 billion (12.7%) lower than the FY2019 total appropriation of $37.19 billion, which included $1.58 billion in emergency supplemental appropriations for disaster relief (in P.L. 116-20 , Title VII). (See the figure below.) On June 25, 2019, the House passed H.R. 3055 with $39.59 billion (in Division C) in FY2020 appropriations for agencies in the Interior bill. This total included $2.25 billion for wildfire suppression under the cap adjustment, as requested by the President. The FY2020 House-passed total would be $2.40 billion (6.4%) higher than the FY2019 total of $37.19 billion in regular and emergency appropriations, and $3.98 billion (11.2%) higher than the FY2019 total of $35.61 billion in regular appropriations. It would also be $7.12 billion (21.9%) higher than the President's FY2020 request of $32.47 billion and $1.48 billion (3.9%) higher than the FY2020 Senate-passed amount of $38.11 billion. On October 31, 2019, the Senate passed H.R. 3055 with $38.11 billion (in Division C) for agencies in the Interior bill. This total included $2.25 billion for wildfire suppression under the cap adjustment. The FY2020 Senate-passed total would be $918.8 million (2.5%) higher than the FY2019 total of $37.19 billion in regular and emergency appropriations, $2.50 billion (7.0%) higher than the FY2019 total of $35.61 billion in regular appropriations, and $5.64 billion (17.4%) higher than the FY2020 President's request of $32.47 billion. However, the Senate-passed amount would be $1.48 billion (3.7%) lower than the FY2020 House-passed amount of $39.59 billion. For individual agencies and programs in the bill, there are many differences among the funding levels enacted for FY2019 and those requested by the President for FY2020, approved by the House for FY2020, and approved by the Senate for FY2020. This report highlights funding for selected agencies and programs that have been among the many of interest to Congress, stakeholders, and the public. They include the Bureau of Land Management, EPA, U.S. Fish and Wildlife Service, Forest Service, Indian Affairs, Indian Health Service, Land and Water Conservation Fund, National Park Service, Payments in Lieu of Taxes Program, Reorganization of DOI, Smithsonian Institution, U.S. Geological Survey, and Wildland Fire Management.", "document_type": "crs"}
{"report": "Congress uses an annual appropriations process to fund discretionary spending, which supports the projects and activities of most federal government agencies. This process anticipates the enactment of 12 regular appropriations bills each fiscal year. If regular appropriations are not enacted prior to the start of the fiscal year (October 1), continuing appropriations may be used to provide temporary funding until the consideration of annual appropriations measures is completed. Continuing appropriations acts are often referred to as \"continuing resolutions\" (CRs), because historically they have been enacted in the form of a joint resolution. CRs also contain numerous provisions that may operate as limitations or restrictions to preserve Congress's prerogative to make funding decisions once final bills are agreed to. Numerous exceptions (or anomalies) are also often included in CRs to provide changes to funding rates, or for other purposes, to address special circumstances that may result with only temporary funding. Other rescissions or cancellations of discretionary budget authority may also be included in CRs. CRs may be enacted for a period of days, weeks, or months. If any of the 12 regular appropriations bills are still not enacted by the time that the first CR for a fiscal year expires, further extensions might be enacted until all regular appropriations bills have been completed or the fiscal year ends. None of the FY2020 regular appropriations bills was enacted prior to the start of the new fiscal year on October 1, 2019. On September 18, 2019, H.R. 4378 was introduced in the House to provide continuing appropriations for projects and activities covered by all 12 of the regular annual appropriations bills from the beginning of the fiscal year through November 21, 2019 (Division A). The legislation also included a separate Division B to extend authorization for multiple federal health care programs. The House passed the legislation on September 19, 2019, by a vote of 301-123. The Senate subsequently passed the legislation by a vote of 81-16 on September 26, 2019. On September 27, 2019, the President signed H.R. 4378 into law ( P.L. 116-59 ). This report provides an analysis of the continuing appropriations provisions included in the CR ( H.R. 4378 , Division A). The first two sections summarize the overall funding provided (\"Coverage, Duration, and Rate\") and budget enforcement issues associated with the statutory discretionary spending limits (\"The CR and the Statutory Discretionary Spending Limits\"). The third section of this report provides short summaries of the provisions that are agency-, account-, or program-specific. These summaries are organized by appropriations act title. In some instances, background information about the history of those appropriations, and how they operate under a CR, is provided. Three components of a CR generally establish the purpose, duration, and amount of funds provided by the act: 1. A CR's \"coverage\" relates to the purposes for which funds are provided. The projects and activities funded by a CR are typically specified with reference to regular (and, occasionally, supplemental) appropriations acts from the previous fiscal year. When a CR refers to one of those appropriations acts and provides funds for the projects and activities included in such an act, the CR is often referred to as \"covering\" that act. 2. The \"duration\" of a CR refers to the period of time for which budget authority is provided for covered activities. 3. CRs usually fund projects and activities using a \"rate for operations\" or \"funding rate\" to provide budget authority at a restricted level but do not prescribe a specified dollar amount. The funding rate for a project or activity is based on the total amount of budget authority that would be available annually for that project or activity under the referenced appropriations acts and is prorated based on the fraction of a year for which the CR is in effect, but it may also be affected by other factors that can have an effect on spending patterns over the course of a fiscal year. H.R. 4378 (Â§101) covers all 12 of the regular annual appropriations bills by generally providing continuing budget authority for FY2020 through November 21, 2019, for projects and activities funded in FY2019. Budget authority is provided by the CR under the same terms and conditions as the referenced FY2019 appropriations acts (Â§103). Effectively, this requirement extends many of the provisions in the FY2019 acts that stipulated or limited agency authorities during FY2019. In addition, in general, none of the funds are to be used to initiate or resume an activity for which budget authority was not available in FY2019 (Â§104). Such provisions, as well as many of the other provisions discussed in the sections below, may protect Congress's constitutional authority to provide annual funding in the manner it chooses in whatever final appropriations measures may be enacted. Statutory limits on discretionary spending are in effect for FY2020, as adjusted by the Bipartisan Budget Act of 2019 (BBA 2019; P.L. 116-37 ). The CR includes both budget authority that is subject to those limits and also budget authority that is effectively exempt from those limitsâincluding that designated or otherwise provided as \"Overseas Contingency Operations/Global War on Terrorism\" (OCO/GWOT) or \"emergency requirements,\" as well as limited amounts that may be designated as \"disaster relief or \"program integrity initiatives.\" Amounts previously receiving an OCO/GWOT, emergency, or disaster relief designation for FY2019 continue to receive this designation through the length of the CR (Â§114). Section 101 provides that funding in the CR is effective through November 21, 2019âroughly a seven-week period of funding. The CR provides that, in general, budget authority for some or all projects and activities could be superseded by the enactment of the applicable regular appropriations act or another CR prior to November 21. For projects and activities funded in the CR that a subsequent appropriations act does not fund, budget authority would immediately cease upon such enactment, even if enactment occurs prior to November 21. However, the CR provides some exceptions to this. For instance, the OCO/GWOT designations (Â§114) are specified to remain in effect through November 21. Similarly, an anomaly affecting the Ukraine Security Assistance Initiative is specified to remain in effect until September 30, 2020. In general, the CR provides budget authority at levels provided in FY2019 appropriations acts for the duration of the CR (through November 21). The rate is based on the actual amounts made available in FY2019. A few exceptions, however, to this continued rate of operations are specified in Section 101. These adjustments are in addition to any additional exceptions specified in the various anomalies also included in later sections of the CR. For instance, five agencies are affected by variations to this general rate, including the U.S. Department of Agriculture's (USDA) Rural Water and Waste Disposal Direct Loan Program, the Department of Justice's Assets Forfeiture Fund, the Bureau of Reclamation's Upper Colorado River Basin Fund, immigration authorizations affecting the Department of Homeland Security, and the Department of State's funding for Ebola. In addition, for entitlement and other mandatory spending provided in regular appropriations acts, funding is provided at the rate sufficient to maintain program levels under current law as provided in Section 111(a). Appropriations for FY2020 are subject to statutory discretionary spending limits on categories of spending designated as \"defense\" and \"nondefense\" spending pursuant to the Budget Control Act of 2011 (BCA), as modified by BBA 2019. The defense category includes all discretionary spending under budget function 050 (defense), and the nondefense category includes discretionary spending in the other budget functions. If discretionary spending is enacted in excess of a statutory limit in either category, the BCA requires the level of spending to be brought into conformance through \"sequestration,\" which involves primarily across-the-board cuts to non-exempt spending in the category of the limit that was breached (i.e., defense or nondefense). Once discretionary spending is enacted, the Office of Management and Budget (OMB) evaluates that spending relative to the spending limits and determines whether sequestration is necessary. For FY2020 discretionary spending, the first such evaluation (and any necessary enforcement) is to occur within 15 calendar days after the 2019 congressional session adjourns sine die . For any FY2020 discretionary spending that becomes law after the session ends, the OMB evaluation and any enforcement of the limits would occur 15 days after enactment. The Congressional Budget Office (CBO) estimates the budgetary effects of interim CRs on an \"annualized\" basis, meaning that those effects are measured as if the CR were providing budget authority for an entire fiscal year. According to CBO, the annualized amount for discretionary budget authority for regular appropriations subject to the BCA limits (including projects and activities funded at the rate for operations and anomalies) is $648.452 billion for defense, which is about $18 billion below the defense limit of $666.5 billion, and $604.669 for nondefense, which is about $17 billion below the nondefense limit of $621.5 billion for FY2020. H.R. 4378 specified that each amount incorporated in the legislation by reference, which was previously designated as OCO/GWOT or disaster relief and not subject to the discretionary spending caps, retains that same designation (Â§114). Thus when spending effectively not subject to those limitsâbecause it was designated or otherwise provided as OCO/GWOT, disaster relief, emergency requirement, or a program integrity adjustmentâis included, CBO estimates total annualized budget authority in the CR of $1.345 trillion, which is below the BBA 2019 agreement of $1.370 trillion. CRs lasting multiple weeks or longer usually include provisions that are specific to certain agencies, accounts, or programs. These provisions are generally of two types. First, certain provisions designate exceptions to the formula and purpose for which any referenced funding is extended. These are often referred to as \"anomalies.\" They often address specific issues or circumstances that may result from the extension of only current rates of funding. Second, certain provisions may have the effect of creating new law or changing existing law. Most often, these provisions are used to renew expiring provisions of law or extend the scope of certain existing statutory requirements. Substantive provisions that establish major new policies have also been included on occasion. Unless otherwise indicated, such provisions are temporary in nature and expire when the CR expires. These anomalies and provisions that change law may be included at the request of the President. Congress could accept, reject, or modify such proposals in the course of drafting and considering CRs. In addition, Congress may identify or initiate any other anomalies and provisions changing law that it seeks to include in the CR. This section of the report summarizes provisions in H.R. 4378 that are agency-, account-, or program-specific. They are alphabetically organized by appropriations act title for 11 of the 12 regular appropriations acts covered in Section 101. (There are no anomalies concerning items funded in the Legislative Branch Appropriations Act.) The summaries generally provide brief explanations of the provisions. In some cases they include additional information, such as whether a provision was requested by the President or included in prior year CRs. For additional information on specific provisions in the CR, congressional clients may contact the CRS appropriations experts, as noted in the accompanying footnote. This section authorizes USDA to spend appropriated funds in the Rural Water and Waste Disposal Program Account on the cost of direct loans, in addition to the costs of loan guarantees and grants that were authorized in FY2019. In FY2019, direct loans did not require budget authority because the program had a negative subsidy rate (i.e., the cost of providing loans was less than estimated repayments and fees). For FY2020, OMB estimates that the direct loan program will have a positive subsidy rate. This section amends the list of eligible losses that may be covered under the Additional Supplemental Appropriations for Disaster Relief Act of FY2019 ( P.L. 116-20 , Title I) to include payments to cooperative processors for reduced sugar beet quantity and quality. The FY2019 supplemental provided $3 billion to cover agricultural production losses in 2018 and 2019 from natural disasters. This section allows USDA to waive the non-federal matching funds requirement for grants made under the Specialty Crop Research Initiative (7 U.S.C. Â§7632(g)(3)). The matching funds provision was added in the 2018 farm bill ( P.L. 115-334 ). This section allocates funding for the USDA Food and Nutrition Service summer food for children demonstration projects at a rate that ensures that the projects can fully operate by May 2020 (prior to summer meal service, which typically starts in June). Similar provisions have been part of previous CRs. These projects, which include the Summer Electronic Benefit Transfer demonstration, have operated in selected states since FY2010. This section allows CCC to receive its appropriation to reimburse the Treasury for a line of credit about a month earlier than usual prior to a customary final report and audit. Many farm bill payments to farmers are due in October 2019, including to USDA's plan to make supplemental payments under a trade assistance program. Without the anomaly, CCC might have exhausted its $30 billion line of credit in October or November before the audit is completed, which could suspend payments. This provision was part of a CR in FY2019. In addition, the measure requires USDA to submit a report to Congress by October 31, 2019, with various disaggregated details about Market Facilitation Program payments, trade damages, and whether commodities were purchased from foreign-owned companies under the program. This section provides $16.5 million on an annualized basis to the USDA Agricultural Marketing Service to implement the Hemp Production Program ( P.L. 115-334 , Â§10113), which was created in the 2018 farm bill. In addition to allowing the agencies funded through the annual CJS appropriations act to continue operations at the FY2019-enacted level, Section 101 states that the $674.0 million rescission on the Assets Forfeiture Fund that was enacted as a part of the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ), will not be in effect for the duration of the CR. The Administration requested this anomaly because the rescission would limit the operations of the Department of Justice's Assets Forfeiture program, including equitable sharing payments made to state and local law enforcement for participating in operations that led to forfeited assets. This section allows the U.S. International Trade Commission to apportion funding at a rate necessary to meet the commission's responsibilities under the American Manufacturing Competitiveness Act of 2016 ( P.L. 114-159 ). This section allows the Census Bureau to draw on money from the Periodic Censuses and Programs accountâwhich includes the decennial census and other major programs such as the economic census, the census of governments, and intercensal demographic estimates, together with geographic and data-processing supportâat the rate necessary to maintain the schedule and deliver the required data according to the statutory deadlines in the 2020 Decennial Census Program. Section 102 is similar to provisions typically included in CRs in previous years. The provision prohibits the Department of Defense (DOD) from funding either so-called new startsâthat is, procurement or research and development of a major program for which funding was not provided in FY2019âor acceleration of rate of production for any major program for which FY2019 procurement funding was provided. Section 123 authorizes the DOD to exceed the $1 billion limit on advance billing \"for background investigation services and related services\" purchased from activities financed using working capital funds. A working capital fund is a type of revolving fund intended to operate as a self-supporting entity to fund business-like activities. The provision is intended to enable DOD to conduct background investigations with minimal interruptions. According to information OMB sent to lawmakers, the Defense Counterintelligence and Security Agency Working Capital Fund, which was scheduled to begin operations October 1, 2019, plans to bill customers prior to completing background investigations and \"is likely to exceed $1 billion in advanced billing in FY2020.\" Section 124 appropriates funding for the Ukraine Security Assistance Initiative. The initiative is intended to \"increase Ukraine's ability to defend against further aggression by theater adversaries or their proxies by providing support for ongoing training and advisory programs and equipment to enhance Ukraine's command and control; situational awareness systems; secure communications; military mobility; night vision; military medical treatment; maritime and border security operations; and defensive weapons systems,\" according to DOD. In August 2019, news organizations reported that the Trump Administration withheld funding for the initiative. The department expected to obligate all but approximately $30 million of the $250 million in FY2019 appropriations for the initiative by the end of the fiscal year. Section 124(a) rescinds unobligated FY2019 funds for the initiative. Section 124(b) appropriates an FY2020 amount equal to the unobligated FY2019 fundsâin addition to the amount otherwise provided for the initiative, at a rate for operations, by the continuing resolution. Section 125 provides that for the duration of the CR, no funding may be transferred from the Western Area Power Administration's (WAPA) Colorado River Basins Power Marketing Fund to the General Fund of the Treasury. Due to a scorekeeping adjustment by the Trump Administration, the historically common practice of transferring funds from WAPA's Colorado River Basins Power Marketing Fund (which receives revenues from hydropower sales in the Colorado River Basin) to the Bureau of Reclamation's Upper Colorado River Basin Fund (which funds environmental mitigation responsibilities associated with the Colorado River Storage Project, among other things) has not been executed in recent years. Instead, these WAPA funds have been transferred to the General Fund of the Treasury. Congress has opposed the change and attempted to counteract it in appropriations legislation through additional appropriations to the Upper Colorado River Basin Fund and restrictions on WAPA transfers to the General Fund. Section 126 extends the authority for the Bureau of Reclamation to conduct activities under the Calfed Bay-Delta Authorization Act ( P.L. 108-361 , 118 Stat. 1681) from the end of FY2019 to the date of the CR's expiration. This authority allows the Bureau of Reclamation to undertake activities related to formulating a long-term comprehensive plan to restore the ecological health and improve the water management of California's Bay-Delta system. Activities under this authority include long-term levee protection, water quality, ecosystem restoration, water use efficiency, and water-supply-related studies and projects. This section provides $15 million in appropriations for the Committee on Foreign Investment in the United States (CFIUS) Fund. This fund was created in P.L. 115-232 , which authorized $20 million for FY2019-FY2023. Prior to this, CFIUS was not provided a separate appropriation within the Department of the Treasury. This section grants congressional approval for DC officials to expend locally raised funds for purposes made available under P.L. 116-6 (Consolidated Appropriations Act, 2019) at a rate set forth in the Fiscal Year 2020 Local Budget Act of 2019 (D.C. Act 23-78). DC political leaders have consistently expressed concern that passage of the appropriations act for the District (in which Congress approves the city's budget) has too often been delayed until well after the start of the District's fiscal year, hindering their ability to manage the District's financial affairs and negatively affecting the delivery of public services. This section provides an additional $48 million to the Office of Personnel Management's (OPM) Salaries and Expenses account for administrative expenses for 2019. Of this amount, $29,760,000 is to be transferred from trust funds. Such amounts may be apportioned up to the rate for operations necessary to maintain OPM's operations. OPM previously reported to Congress that the agency would experience a budget shortfall exacerbated by the transfer of the National Background Investigations Bureau from OPM to DOD. This section provides an additional $99 million for the Small Business Administration (SBA) 7(a) loan guaranty program. The 7(a) loan guarantees are one of SBA's primary programs, providing loans to small businesses that might not otherwise find financing. The funding under the CR may be apportioned at the rate necessary to meet demand. This section provides additional funding for SBA disaster loans at a rate of $177 million, with $167 million of this for administrative expenses to carry out the direct loan program and $151 million of this directed to major disasters. This funding is to be considered designated for disaster relief under the Balanced Budget and Emergency Deficit Control Act of 1985 ( P.L. 99-177 ). The funding baseline for DHS in H.R. 4378 was the rate of allowable spending and authorities in two separate parts of P.L. 116-6 : Division A, which is the FY2019 DHS appropriations act, and Title I of Division H, which is a series of immigration authorization extensions. These immigration authorization extensions have been carried as anomalies in past CRs, extended by including them as general provisions in the DHS appropriations act (and thus carried forward automatically by the CR, which extends authorities provided in the act), or included in a separate \"Immigration Extensions\" title in consolidated appropriations legislation and extending that by direct reference in Section 101 of the CR. While the procedural form has varied, the immigration authorization extensions referenced in H.R. 4378 include four that have been extended since FY2016: Extension of authority for pilot programs for employment eligibility confirmation; Extension of religious worker visa program; Extension of rural medical worker immigration authority; and Extension of investor visa program. The reference also includes a fifth extensionâan increase in the annual cap on H-2B visas, which has been extended through CRs since FY2018. It is the only one of these provisions included in the House Committee-reported version of the FY2020 DHS appropriations act ( H.R. 3931 , Â§532). H.R. 4378 includes faster apportionment for the Secret Service \"to support hiring and operations required for protective activities associated with the 2020 presidential election campaign.\" The Administration requested a provision with broader authority. A similar provision in a FY2015 CR provided authority for faster apportionment for what was then the Secret Service's \"Salaries and Expenses\" appropriation to cover presidential candidate nominee protection. The Administration requested an accelerated rate of apportionment for the Disaster Relief Fund (DRF) to ensure that Stafford Act programs can be carried out. While the Administration stated, \"Without the anomaly, the amounts automatically apportioned would impede comprehensive [DRF] response and recovery activities during the period of the CR should a catastrophic event be declared,\" the side of the DRF that funds major disaster costs is historically flush. Similar provisions were included in both the FY2018 CR ( P.L. 115-56 , Division D, Â§129) and the first FY2019 CR ( P.L. 115-245 , Division C, Â§124). The Administration requested an extension of the National Flood Insurance Program (NFIP) as part of the CR. Authority to issue new policies for the NFIP would have expired on September 30, 2019, in the absence of an extension either as a part of this vehicle or on its own. H.R. 4378 extends the program's authorization for the length of the CR. CRs have been a vehicle for extending NFIP authorization as far back as FY1998 ( P.L. 105-46 , Â§118), although the legislative language has taken different forms. More recently, a short-term reauthorization of the NFIP was carried in the first FY2018 CR ( P.L. 115-56 , Division D, Â§130). The second CR for FY2019 ( P.L. 115-298 , which added a new Section 136 to P.L. 115-245 , Division C) also extended the authorization. In both cases, the extension was limited to the duration of the CR. CRs normally require funds to be apportioned and obligated in the same manner as was the case in the prior annual appropriation. In this case, DHS appropriations is to follow the terms and conditions of P.L. 116-6 , Division Aâthe FY2019 DHS appropriations act. The Administration, however, proposed a restructuring of some accounts in its FY2020 budget request and asked for authority to act as if those changes had been approved by Congress so that if they are approved, manual administrative adjustments to obligations and disbursements would not be required. Section 135 allows apportionment for these specified accounts to occur consistent with the FY2020 budget request. The first FY2018 CR ( P.L. 115-56 , Division D, Â§125) and FY2019 CR ( P.L. 115-245 , Division C, Â§128) each carried an almost identical provision requested by the Administration. This provision authorizes the apportionment of appropriations that are provided by the CR of up to $18.4 billion for the Indian Health Services (IHS) account and $631,000 for the Indian Health Facilities account to staff and operate IHS facilities that were or will be opened, renovated, or expanded during either FY2019 or FY2020. The provision allows for higher rates of funding than would otherwise be provided under the CR to operate and provide health services at these newly renovated or constructed health facilities, as new or expanded facilities may need additional resources for operations (e.g., to hire staff and obtain equipment). Section 137 states that amounts obligated for the Centers for Disease Control and Prevention (CDC) Public Health Preparedness and Response budget line and the Public Health and Social Services Emergency Fund (PHSSEF) budget line for the Department of Health and Human Services' (HHS) Office of the Secretary (OS) may be obligated in the account and budget structure and under authorities and conditions set forth in the House-passed Labor, Health and Human Services, and Education, Defense, State, Foreign Operations, and Energy and Water Development Appropriations Act, 2020 ( H.R. 2740 , Division A). This provision would account for the Trump Administration's intradepartmental transfer of the Strategic National Stockpile (SNS) from CDC to the Assistant Secretary of Preparedness and Response in HHS OS in FY2019. The SNS provides select medicines and medical supplies during public health emergencies that overwhelm local availability. H.R. 2740 would provide SNS funding to the HHS OS PHSSEF budget line rather than the CDC Public Health Preparedness and Response budget line (where funds were allocated in previous fiscal years). The report accompanying H.R. 2740 ( H.Rept. 116-62 ) provides the following explanation of congressional intent in the context of that legislative proposal with regard to the SNS and associated policy issues: \"The Committee expects that CDC will continue its significant role in providing scientific expertise in decision-making related to procurement of countermeasures, and maintaining strong relationships with State and local public health departments to facilitate efficient deployment of countermeasures in public health emergencies.\" Section 138 authorizes the transfer to the CDC of up to $20 million for Ebola preparedness and response activities from the Infectious Disease Rapid Response Reserve Fund. This fund was established by Section 231 of the Department of Defense and Labor, Health and Human Services, and Education Appropriations Act, 2019 and Continuing Appropriations Act, 2019 ( P.L. 115-245 ), which included $50 million to support activities \"to prevent, prepare for, or respond to an infectious disease emergency.\" The funds were to remain available until expended and are available to be used only for an infectious disease emergency that (1) is declared by the Secretary of Health and Human Services; or (2) as determined by the Secretary, has significant potential to occur imminently and, on occurrence, potential to affect national security or the health and security of United States citizens, domestically or internationally. This anomaly makes up to $20 million in unobligated reserve funds available without requiring the Secretary to declare the ongoing Ebola outbreak in the Democratic Republic of the Congo a threat to national security or to U.S. citizens. On July 17, 2019, the World Health Organization declared that the ongoing Ebola outbreak was a Public Health Emergency of International Concern (PHEIC). Section 139 extends the duration of the National Advisory Committee on Institutional Quality and Integrity (NACIQI) through November 21, 2019. NACIQI is a committee tasked with assessing the process of accreditation and the institutional eligibility and certification of institutions of higher education to participate in federal student aid programs authorized under Title IV of the Higher Education Act of 1965. Section 114(f) of the act provides that NACIQI shall terminate on September 30, 2019. Section 422 of the General Education Provisions Act (GEPA) generally provides an automatic one-year extension of the authorization of appropriations for, or the duration of, programs administered by the Department of Education. This automatic extension would occur only if Congress and the Presidentâin the regular session that ends prior to the beginning of the terminal fiscal year of authorization or duration of an applicable programâdo not enact legislation extending the program. GEPA Section 422 also explicitly states that the automatic one-year extension does not apply to the authorization of appropriations for, or the duration of, committees that are required by statute to terminate on a specific date. Thus, the automatic one-year extension does not apply to NACIQI, and NACIQI would have terminated on September 30, 2019, had it not been extended. Section 140 of the CR allows the Department of Veterans Affairs (VA) to use funds in both the Veterans Benefits Administration, General Operating Expenses account and the Departmental Administration, Information Technology Systems account at a higher apportionment rate. This higher rate is provided to allow the VA to begin implementing provisions of the Blue Water Navy Vietnam Veterans Act of 2019 ( P.L. 116-23 ). Section 101(11) of the CR extends the authorities of the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2019 (Division F of P.L. 116-6 ), to November 21, 2019, with the exception of Section 7058(d) of that law. That section authorized the repurposing of unobligated emergency funds appropriated in FY2015 to address the Ebola outbreak to instead build partner country capacity to prevent, detect, and respond to infectious disease outbreaks and to support an Emergency Reserve Fund. Removing the authorization to repurpose funds may be to ensure emergency funds remain available to respond to the ongoing Ebola outbreak in the Democratic Republic of the Congo (see Section 138). Section 141 extends the authority of the Export-Import Bank, which would otherwise have expired on September 30, 2019, to November 21, 2019. Section 142 extends the authority of the Commission on International Religious Freedom, which would otherwise have expired on September 30, 2019, to November 21, 2019. This provision is intended to ensure that applicants for the Federal Transit Administration's (FTA) FY2018 capital investment grantsâwhich have been allocated funding but have not yet been able to satisfy the requirements for FTA to obligate the funding to themâdo not have their allocated funding redistributed to other applicants if they cannot satisfy the requirements for FTA to obligate the money to them by December 31, 2019. These FTA grants typically have a three-year window of availability. The provision in P.L. 115-141 was added with the intent to ensure that the Trump Administration's FTA did not excessively delay providing the transit grants to applicants. This provision avoids a situation in which FTA capital investment grants to transit agencies would be reduced due to a reduction in the appropriated level resulting from the application of IRS provision: Section 9503(e)(4) . Similar language is in the House-passed Commerce, Justice, Science, Agriculture, Rural Development, Food and Drug Administration, Interior, Environment, Military Construction, Veterans Affairs, Transportation, and Housing and Urban Development Appropriations Act, 2020 ( H.R. 3055 , Â§164(1)). This section allows amounts made available in the Housing for the Elderly account to be apportioned at a rate necessary to allow the Department of Housing and Urban Development to maintain rental assistance contracts that are coming up for renewal or require additional funding in order to continue to subsidize the rents of low-income elderly residents of Section 202 properties. Section 108 provides daily spending rate flexibility to agencies by waiving time limitations. Section 112 allows that the apportionment rate may avoid furloughs, which is consistent with past appropriations acts. These provisions have been included in past CRs. Section 111(b) authorizes obligations for mandatory payments due \"on or about\" the first day of any month that begins between October 1, 2019, and 30 days after the CR is set to expire (i.e., through December 21, 2019, but effectively until December 1, 2019). Programs impacted include the funds for payments through the Supplemental Nutrition Assistance Program (SNAP). These payments, while mandatory spending, are appropriated each year to USDA through the regular appropriations process. This provision has been included in past CRs.", "summary": "This report provides an analysis of the continuing appropriations provisions for FY2020 included in Division A (Continuing Appropriations Act, 2020) of H.R. 4378 . The legislation also included a separate Division B (Health and Human Services Extenders and Other Matters), which extended multiple federal health care programs that were otherwise set to expire September 30, 2019, and provided for some adjustments to additional health programs. This report examines only Division A, the continuing resolution (CR) portion of the legislation. On September 27, 2019, the President signed H.R. 4378 into law ( P.L. 116-59 ). Division A of H.R. 4378 was termed a CR because it provided temporary authority for federal agencies and programs to continue spending in FY2020 in the same manner as a resolution enacted separately for that purpose. It provides temporary funding for the programs and activities covered by all 12 of the regular appropriations bills, since none of them had been enacted prior to the start of FY2020. These provisions provide continuing budget authority for projects and activities funded in FY2019 by that fiscal year's applicable appropriations acts, with some exceptions. It includes both budget authority that is subject to the statutory discretionary spending limits on defense and nondefense spending and also budget authority that is effectively exempt from those limits, such as that designated for \"Overseas Contingency Operations/Global War on Terrorism.\" Funding under the terms of the CR is effective October 1, 2019, through November 21, 2019âroughly the first seven weeks of the fiscal year. The CR generally provides budget authority for FY2020 for most projects and activities at the rate at which they were funded during FY2019. Although it is effective only through November 21, the cost estimate prepared by the Congressional Budget Office (CBO) provides an annualized projection of the discretionary budget authority provided in the measure. As provided in P.L. 116-59 , the amount subject to the statutory discretionary spending limits is approximately $1.253 trillion. When spending that is effectively not subject to those limits (Overseas Contingency Operations, disaster relief, emergency requirements, and program integrity adjustments) is also included, the CBO estimate is $1.345 trillion. CRs frequently include provisions that are specific to certain agencies, accounts, or programs. These include provisions that designate exceptions to the general funding rate formula or otherwise single out a program, activity, or purpose for which any referenced funding is extended (typically referred to as \"anomalies\"), as well as provisions that have the effect of creating new law or changing existing law (including the renewal of expiring provisions of law). The CR includes a number of such provisions, each of which is briefly summarized in this report. CRS appropriations experts for each of these provisions are indicated in the accompanying footnotes and Table 1 . Congressional clients may also access CRS Report R42638, Appropriations: CRS Experts . For general information on the content of CRs and historical data on CRs enacted between FY1977 and FY2019, see CRS Report R42647, Continuing Resolutions: Overview of Components and Practices .", "document_type": "crs"}
{"report": "On December 9, 2019, the Washington Post published a series of documents termed \"the Afghanistan Papers\" (herineafter \"the Papers\"). The Papers comprise two sets of documents: Notes and transcripts of interviews with more than 400 U.S. and other policymakers conducted between 2014 and 2018 by the Special Inspector General for Afghanistan Reconstruction (SIGAR), and Approximately 190 short memos (referred to as \"snowflakes\") from former Secretary of Defense Donald Rumsfeld, dating from 2001 to 2004. The Washington Post contends that \"the Lessons Learned interviews broadly resemble the Pentagon Papers, the Defense Department's top-secret history of the Vietnam War,\" although the SIGAR interviews and Pentagon Papers differ in several key ways. Perhaps most importantly, the Pentagon Papers were a contemporaneous recounting of the Vietnam War based mostly on classified material from the Office of the Secretary of Defense; the SIGAR Lessons Learned documents are unclassified records of interviews with a wide array of policymakers carried out as many as 15 years after the events described. The documents, and the Washington Post stories that accompany them, suggest that U.S. policies in Afghanistan often were poorly planned, resourced, and/or executed. These apparent shortcomings contributed to several outcomes that either were difficult to assess or did not fulfill stated U.S. objectives. The documents, released at a time when the United States is engaged in talks with the Taliban aimed at ending the 18-year U.S. military presence in the country, have attracted attention, and some Members of Congress have called for further investigation into U.S. policy in Afghanistan. However, there is debate over how revelatory the SIGAR interviews are, with some analysts contending that the information they contain was available at the time and remains so today (see \" Reactions to \"the Afghanistan Papers\" below). SIGAR, an independent investigative body created by Congress in 2008, conducted interviews with hundreds of U.S. and other policymakers as part of a lessons learned project, a self-assigned effort to \"identify and preserve lessons from the U.S. reconstruction experience in Afghanistan, and to make recommendations to Congress and executive agencies on ways to improve our efforts in current and future operations.\" Since 2015, SIGAR has published seven lessons learned reports on topics such as corruption, counternarcotics, and U.S. efforts to reintegrate ex-combatants. The Washington Post obtained the interview notes and transcripts after submitting a series of Freedom of Information Act (FOIA) requests beginning in August 2016. In response to an October 2017 lawsuit against SIGAR filed by the newspaper, SIGAR released the first document, a 10-page 2015 interview with Michael Flynn (who had served in several senior military capacities in Afghanistan). SIGAR subsequently released other requested documents to the Washington Post . After federal agencies reviewed the documents to determine whether they contained classified material, the final batch of interviews was delivered in August 2019. In total, SIGAR conducted 428 interviews with U.S., European, and Afghan officials. Sixty-two interviewees are identified while 366 are redacted; the Washington Post has sued SIGAR to disclose those names because, it argues, \"the public has a right to know which officials criticized the war.\" SIGAR contends that those individuals should be seen as whistleblowers and may face professional or other harm if their identities are made public. As of January 2020, a decision from the U.S. District Court in Washington, DC, remains pending. In reviewing the Papers, which total roughly 2,000 pages and evade simple characterization, several key themes emerge, as outlined below. Dates in parentheses or noted in the text indicate when the interview was conducted. Quotes in this report, unless noted in the text as direct quotes from transcripts, are from SIGAR notes of interviews; CRS cannot independently verify or otherwise characterize the documents and the interviews the documents purport to describe. At least four of the named interviewees have contested the views attributed to them by SIGAR. The most frequently discussed subject in the SIGAR interviews was (a) the large sum of U.S. money ($132 billion in development assistance since 2001) that poured into Afghanistan and (b) the extent to which much of it was reportedly wasted, stolen, exacerbated existing problems, or created new ones. Nearly every SIGAR interviewee who discussed the issue argued that Afghanistan, one of the world's poorest and least developed countries in 2001, was unable to make use of the amount of financial resources that the U.S. and its international partners channeled into the country. Variations of the phrase \"absorptive capacity\" were repeated throughout the SIGAR interviews. One unnamed national security official offered some specificity, saying that Ashraf Ghani, then the Afghan Finance Minister and now President, had said in 2002 that \"the Afghan capacity to absorb money was $2 billion a year, max. Everything else was wasted money\" (October 1, 2014). The United States alone has contributed over $7 billion a year on average since 2001. In answering why the United States delivered so much money into Afghanistan, many interviewees pointed to U.S. domestic politics. One U.S. Agency for International Development (USAID) official said, \"How much money was put into political, military, and development [aid] became a proxy for our commitment\" (December 9, 2015). This was largely driven by executive branch agencies, according to one unnamed official, who observed that the U.S. Office of Management and Budget (OMB) proposed reductions between 2005 and 2007 because money from previous years remained unspent (April 13, 2015). However, other policymakers rejected these reductions, arguing that \"the political signal by a budget reduction at [a] turning point in the war effort would adversely affect overall messaging and indirectly reconstruction efforts on the ground. The articulation of goals for the purpose of budgeting and programming was largely secondary to the political implications of budgeting.\" However, some of those interviewed by SIGAR faulted Congress, not executive branch agencies, for wasteful spending. The same USAID official quoted above (December 9, 2015) said, \"The Hill was complicit. They gave more money than was requested. Every year they asked why we weren't doing our jobs, but they gave the same amount of money or more.\" Douglas Lute, the Deputy National Security Advisor for Iraq and Afghanistan under President George W. Bush and President Obama, noted that Congress was subject to the same kinds of political pressures that drove executive branch officials to push for higher budgets in the absence of evidence that the funds would be effective: In terms of appropriations, Congress appropriated what the administration asked for.... The thought is that if we don't spend, [the Government Accountability Office] or committees on the Hill will stop us from getting more funding. This leads to spend, spend, spend. The reason this is happening: no one is paying attention in an interagency sense to resources.... We were also pouring money into huge infrastructure projects to obligate money that was appropriated to show we could spend it. And we were building infrastructure in ways that Afghanistan could never sustain or even use in some cases. This approach to resource allocation extended down the chain of command, according to some interview subjects. An unnamed U.S. Army civil affairs officer said that costs kept rising because \"We had no reason to negotiate or hold contractors' feet to the fire because the money kept coming no matter what.... We didn't get credit for saving money; in fact, we got credit for spending it\" (July 12, 2016). Another said (on June 27, 2016) that because he or she was not given guidance on how to measure the impact of certain projects, \"dollar figures were always the metric. No one said that money spent should be our metric, but without guidance, it was the only metric we could use.... We did not stop and look back at what happened and whether it was effective. The emphasis was on completing more projects.\" What was the impact of this flow of money on Afghanistan itself? Nearly all SIGAR interviewees contended that U.S. funding improved conditions in the country with regard to health, education, and other human development indicators, at least partly given the low level of the country's development in 2001 (see \" Other Voices: U.S. Efforts as Relatively Successful \" below). However, some positive assessments were qualified: one unnamed Afghan official said that \"Yes, we have made gains, and generally speaking, life is better for people.\" However, he or she goes on to ask, \"When we compare the gains to the resources, were the gains enough? No. ... Were the gains that were made sustainable? No. Most of the gains remain fragile\" (October 21, 2015). For some interviewees, this influx of money also created or exacerbated problems. One of the problems most often raised was the money's apparent role in helping drive corruption, which continues to undermine the very Afghan state that the funds were intended to support. Andrew Wilder, the Vice President of Asia Programs at the United States Institute of Peace, said in his SIGAR interview that, \"Giving Afghans so much money actually delegitimized the government, which was either perceived to become more corrupt or actually became more corrupt as a result, and favored specific communities at the expense of others\" (January 25, 2017). Beyond the possibility for Afghans to redirect U.S. aid flows for political purposes, several interviewees argued that U.S. assistance had a structural bias that created perverse incentives for Afghans. Former Afghan deputy cabinet minister Tariq Esmati said (on December 12, 2016) that \"all the attention was to the insecure districts. And the districts that were relatively secure also became insecure in order to get some programs.\" One USAID official put it more bluntly: development programs targeted \"worse case scenarios and [the] most insecure areas\" which \"rewarded bad behavior. Governors in [more secure areas] would come to Kabul and ask, \"what do I have to do to get love from [the] Americans, blow some shit up?\" (November 18, 2016). In many cases, interviewees pointed to the grant contracting system to explain why so much money was wasted and to argue that few of the benefits were actually reaped by Afghans themselves. A senior U.S. official said (on December 11, 2015) We would buy American products, American grain, American consultants, American security experts, and they would implement our aid programsâ¦. The Afghans used to tell me that somewhere between 10-20% actually shows up in Afghanistan, and less than 10% ever gets to a village. So you [the United States] tell us [the Afghans] that you just spent a billion dollars as we see $50 million worth of roads. You [the United States] hire a big contractor and inside the beltway consultant, who then hires 15 subcontractors. The first guy takes 20%, then next level takes 20% who would go hire a bunch of expensive American experts to do [for 10 times the price] what Afghan diaspora refugees or Indian experts could do.... [These Americans we hire] travel to Afghanistan first class or at least business class with five security guys each.... The money you spend doesn't get to the village, doesn't really help the Afghan government. Beyond the practical effect of enabling corruption, some interviewees argued that ready U.S. money warped Afghan political culture (from a July 31, 2015, interview with a U.N. official): Afghan perceptions of the US were shaped by the Emergency Loya Jirga and Constitutional Loya Jirga [consultative assemblies held in 2002-2003].... Religious leaders were approached [and they] received nice packages from the US in return for accepting certain measures on women, human rights. The perception that was started in that period: If you were going to vote for a position that the [U.S. government] favored, you'd be stupid to not get a package for doing it. So that even those in favor would ask for compensation.... So from the beginning, their experience with democracy was one in which money was deeply embedded. Many of the interviewees argued that, from the beginning, the U.S. engagement in Afghanistan, supported by the flow of money noted above, lacked a clear goal. One unnamed former National Security Council (NSC) staffer said, \"I don't think we had an end state in mind. We kept planning; conditions kept changing. We were solving problems but there was no end state vision that you could point to\" (January 5, 2015). According to many respondents, lack of clarity was a product of how many objectives the U.S. had in Afghanistan. One USAID official (May 18, 2015) described U.S. policy as having \"a present under the Christmas tree for everyone. By the time you were finished you had so many priorities and aspirations it was like no strategy at all. If you have 50 priorities then you don't have any priorities at all.\" This confusion reportedly extended even into specific areas of U.S. policy. An unnamed former United Nations official said in a June 1, 2015, interview that \"on reconstruction, there was not a clear understanding of what we were trying to achieve; [there were] no clear objectives.\" On counternarcotics (CN), a former State Department official said that it was \"unclear what the goal of CN was\" (June 29, 2015). The proliferation of U.S. goals in Afghanistan apparently led to another complication: U.S. actions to achieve some of these objectives undermined others. Interviewees repeatedly discussed this dynamic, particularly when referring to the U.S. project as being divided into military and nonmilitary lines of effort. According to interviewees, when U.S. security interests clashed with interests less directly tied to security, the former almost always prevailed. The two areas that the interviews identified as particularly compromised, given an emphasis on security or other issues, were counternarcotics and anti-corruption. A State Department counternarcotics contractor told SIGAR on September 16, 2016, that \"To the best of my knowledge chief of mission [in the U.S. embassy] never carried [the] message about CN to [the] Afghan government. Attitude was 'got so much else on my plate I have no time to deal with drugs.'\" A senior U.S. official put it simply: \"They [the United States] would payoff â¦ local leaders to not fight them and would turn away when local leaders grew poppy\" (March 29, 2016). On anti-corruption, the contrast may have been even clearer: a USAID official said that the view of senior U.S. officials was \"Be patient, we can get back to corruption. We have higher priorities on getting the bad guys\" (August 24, 2015). In July 2015, a Treasury Department official attributed the U.S. \"failure to be more aggressive\" on prosecuting those responsible for the 2010 collapse of Kabul Bank (KB) to the higher importance placed on security objectives: \"Petraeus made the point that yes KB is bad, but we're fighting a war here, there are bigger issues at stake.\" Sometimes even U.S. counternarcotics and anti-corruption goals, which appeared symbiotic according to some interviewees, were at odds: a former U.S. defense official said on May 17, 2016, that U.S. payments to governors to reduce poppy cultivation actually \"undermined good governance. People saw us as complicit working with corrupt governors to take out opposition\" when those governors targeted the opium cultivation of their political opponents but left alone opium cultivation of their allies. Some U.S. officials argued that these contradictions were unavoidable, and that the United States had no choice but to pursue security interests over other, and by definition secondary, objectives. A former U.S. official at the U.S. Embassy said (on May 31, 2015) of the U.S. decision to partner with warlords with records of corruption or human rights abuses, \"I'm not so sure we should have done it any differently. These 'warlords' equaled the ground force that just defeated the Taliban and al Qaedaâon the ground with US SOF [Special Operations Forces]. ... [T]hese weren't just random bandits running around.\" While U.S. efforts in Afghanistan were dominated by the Department of Defense, given the wide array of U.S. interests in Afghanistan, U.S. policy formulation and execution required input from many federal departments and agencies. The problems associated with trying to coordinate among all of these entities, and with the complex series of bureaucratic structures erected to facilitate that coordination, were another consistent theme of the SIGAR interviews. By most accounts, interagency coordination was a consistent problem that various structures failed to solve. The performance of the Washington, D.C.-based Afghanistan Interagency Operation Group (AOIG), which was created in 2003, was co-chaired by the Department of State and National Security Council, and met weekly, generally received favorable reviews from interviewees. The State Department's Coordinator for Reconstruction and Stabilization (SCRS), on the other hand, attracted particular criticism: various officials stated that it was \"expensive and time-consuming ... initially structured to fail and at the end it only made life horrible for everybody else\" (June 25, 2015) and \"failed at the operation level\" (July 10, 2015). The State Department's Special Representative for Afghanistan and Pakistan (SRAP), established in 2009 and closed in 2017, also generally was criticized. One typical critique, from an unnamed State Department official in a December 10, 2014, interview, said that \"the model is not sustainable. Desk officers are supposed to develop regional experience throughout their career so they have a couple of languages and they continually rotate back to their area or region of specialization.... The SRAP set up created parallel structures.\" Anti-corruption, counternarcotics, and other mission priorities rarely fit neatly under one agency or department's purview. The wide range of actors with equities in programs in these areas arguably bred not just confusion but competition. One former development contractor said about counternarcotics (interview on June 8, 2016) that there was \"nobody really in charge, no one on top of the heap and saying to everyone this is what you need to do. Competitive personalities [were] not concerned about what makes sense but could they build their career.\" That competition, in turn, also presented opportunities for Afghans to exploit. An unnamed former US ambassador described for SIGAR interviewers on December 14, 2015, that \"[former Afghan president Hamid] Karzai was trying to figure out how to manipulate the U.S., manipulating different U.S. agencies against one another for leverage. â¦ The mission starts to lose coherence; you have agencies snapping at each other' s ankles [italics original].\" Surveying the numerous problems of interagency coordination, Marin Strmecki, Secretary of Defense Rumsfeld's special advisor on Afghanistan, recommended (interview on October 19, 2015) a more unified command structure: When we operate in something like [Afghanistan], there needs to be unity of command, not unity of effort. So if it is a situation [where] there is a lot of lead flying in the air, it makes sense for the general of whatever task force that is deployed to be in charge of both the military and civilian elements. So the ambassador would essentially be his chief political officer. He should be able to give orders to that chief political officer just as he would another subordinate. Similarly, if it is more a stabilization operations and there is not as much lead flying in the air, the military should be put under the ambassadorâ¦. Our current system works if you are lucky and you get a Khalilzad and Barno or a Petraeus and Crocker, where for some reason they all agree on the priorities and work well together. They are in sync. That is basically luck. Multiple SIGAR interviewees criticized U.S. policies that they claimed either failed to generate relevant expertise within the U.S. government or even disincentivized the creation or application of that expertise in Afghanistan. For instance, regional subject matter expertise was a frequently cited problem. A number of interviewees criticized the United States for not training U.S. staff in local languages. Without knowledge of these languages, U.S. officials were reportedly less able to learn from, build trust with, or effectively partner with Afghan counterparts. Former director of intelligence for the NATO-led military effort Michael Flynn said that when we get to Afghanistan [in 2009], there is only one officer on the ISAF staff that could speak Dari â¦ but he was only there briefly. The Air Force pulled him out in like July and sent him to Japan.... [W]e laughed about it because this is how insane this [system] is.... Even today, we are still in Afghanistan and you go tell me how many actual U.S. members of the military or policy [community], or from State who speak Dari or Pashto. That is a shame and that is a policy decision. The most commonly cited problem, regardless of the interviewee's national origin, position in government, or time of service in Afghanistan, was the loss of expertise and trust brought about by short-term deployments. A commonly repeated theme, as one U.S. official put it (April 12, 2016), was that the U.S. did not have one \"14 year engagement, [but] had 14 1-year engagements.\" Numerous interviewees described the problems created by short tours as the greatest detriment to U.S. policy success: \"At the strategic level, the single most disabling factor was our failure to maintain long-term leadership at the Embassy and at our military commands. We should have someone in the job for 3 to 5 years for continuity\" (former U.S. official at the embassy in Kabul, May 31, 2015). \"If you take away one thing, the one year rotation for USAID, DOS [Department of States] and DOD [Department of Defense] personnel is the biggest obstacle to success and the biggest single factor in our failure\" (former USAID official David Marsden, December 3, 2015). \"Biggest problem was turnover of people â¦ the result is no institutional memory\" (June 27, 2016). The interview records suggest that there was no consensus on how to solve this problem. One proffered solution was higher pay for government employees deployed to Afghanistan: Strmecki said in his interview that talented staff leave \"the government for our contractors and NGOs and our other implementing partners because [they] pay them so much more.\" However, one unnamed legal advisor who worked in Kabul said (on October 30, 2017) higher pay for some U.S. positions meant that those who filled the jobs \"had very little understanding of the cultureâthey came in because the salary was lucrative.... [T]hey saw this as a couple of years of opportunity to get rid of their house mortgages.\" Lack of expertise arguably exacerbated many of the other problems facing U.S. policy. At times, Afghans reportedly exploited the lack of knowledge and institutional memory to shape U.S. policy to meet their own ends. In one extreme case, Afghanistan expert Thomas Johnson described how \"we were used by the tribes\" because suspects taken into custody by the United States as terrorists were actually \"traditional tribal enemies that [U.S. partners] claimed were Taliban\" (January 7, 2016). U.S. efforts in Afghanistan have been aided from the outset by a multinational coalition. From combat, to training Afghan forces, to providing development assistance, U.S. allies and partners have made significant contributions. However, this work has not been without complications, and many of the SIGAR interviewees who worked on coordinating U.S. and international efforts discussed what they saw as deficiencies. The system that emerged in Afghanistan became known as the \"lead nation\" system, whereby each policy area was overseen by a different country: for example, Italy focused on developing Afghanistan's justice sector, Germany worked with Afghan police, and the British initially were responsible for counternarcotics. However, according to former National Security Advisor Stephen Hadley, \"With this [multilateral] approach, everyone had small pieces of the sector and it then meant that [their respective policy areas] became everyone's second or third order priority so nothing got done.\" Generally, interviewees who observed or participated in the system described it as disorganized: John Wood, NSC director for Afghanistan 2007-2009, said, \"Everyone has a piece of the pie but [there's] no coherence.... Each lead nation left to determine how to approach thingsâeach changed frequently. Even if things lined up with the lead nation none of them moving at same pace\" (June 17, 2015). The difference in pacing and approach was explained by an unnamed NSC staffer, who argued \"tasks were conditioned by what countries were willing to do,\" which \"created some tensions between the coalition and the nation states\" (July 14, 2015). Those U.S. officials SIGAR interviewed who worked on Afghanistan in the first decade of the war held a near-universal judgment that the U.S. invasion of Iraq in March 2003 distracted U.S. attention and diverted U.S. financial and other resources, allowing the Taliban to regroup. Former U.S. Ambassador to NATO Nicholas Burns described Iraq as the \"higher priority\" and Afghanistan as \"the less acute theater.\" According to an unnamed NSC staffer (October 21, 2014) More specifically regarding why the U.S. and Department of Defense were anxious for someone else to take a robust leading role in Afghanistan, it was so we could have greater resources and capability to prioritize Iraq. ... From early spring 2002, during my time at the Secretary's office, until 2011, Afghanistan has to be looked at with one eye on what is happening in Iraq. Even in the early and tail end (2009-2011) days, either materially or politically, it all seemed to be about Iraq. It was hard to come to terms with the reality that your whole portfolio is a secondary effort or, at worst, an \"economy of force\" mission. Your job was not to win, it was to not lose â¦ We are bleeding resources away as things get worse in Iraq, and we were looking for more ways to make do in Afghanistanâ¦. In hindsight, there was a window between late 2002-2003 and early 2005 where there was relative peace in Afghanistan. The Taliban was on its heels and people were not that disillusioned. One official (interviewed on September 23, 2015) said that between 2005 and 2007, \"Iraq was all we could handle.\" Another said that a \"significant pressure in the 2003 to 2010 timeframe was the draw of resources toward Iraq and away from Afghanistan\" (April 13, 2015). By the time the United States began to draw down forces in Iraq and refocus on Afghanistan, many observers argued that the damage was already done: the Afghan state's military and governing capabilities (both effectively nonexistent in 2001) had not been adequately developed, allowing for the rise of a new Taliban insurgency that further undermined those abilities. One unnamed U.S. official said in a February 9, 2016, interview, \"In all honesty, Afghanistan got neglected when we went to Iraq and when we got back to Afghanistan, we didn't have enough capacity.\" The war in Iraq arguably distracted U.S. policymakers from dealing with Pakistan's role in facilitating the Taliban's comeback. Early on, Pakistan \"was not seen as bad guys,\" according to an international aid consultant in an October 9, 2015, interview. A number of interviewees, particularly senior U.S. officials, attributed the Taliban's resurgence, and the resulting failure of the U.S. to solidify gains in Afghanistan, to material support for the group from, and its safe havens in, Pakistan. A good deal of material related to the sensitive issue of Pakistani support for the Taliban appeared to be redacted, but the issue still emerged throughout the interviews. Most interviewees who addressed the subject argued that U.S. and Pakistani interests in Afghanistan were fundamentally incompatible. One unnamed DOD or NSC staffer told SIGAR in an October 1, 2014, interview, \"The belief that Pakistan's national interest aligned with the US because [then-Pakistani leader Pervez] Musharraf joins the [U.S.] effort after 9/11 is a false belief.\" According to this view, the positive role Pakistan played with regard to Al Qaeda blinded U.S. policymakers to the Pakistanis' support for the Taliban. As Strmecki said in his October 19, 2015, interview, Because of people's personal confidence in Musharraf and because of things he was continuing to do in helping police up a bunch of the al-Qaeda in Pakistan, there was a failure to perceive the double game that he starts to play by late 2002, early 2003. You are seeing the security incidents start to go up and it is out of the safe havens. I think that the Afghans and Karzai himself, are bringing this up constantly even in the earlier parts of 2002. They are meeting unsympathetic ears because of the belief that Pakistan was helping us so much on al-Qaeda. With U.S. attention to the issue reportedly low, Pakistan maintained support for the Taliban in order to maintain some of Pakistan's influence in Afghanistan. In at least one account, Pakistani leaders were forthright in private about this strategy. In the transcript of his January 11, 2016, interview with SIGAR, Ryan Crocker, who served as U.S. ambassador to both Pakistan (2004-2007) and Afghanistan (2011-2012), quoted then-head of Pakistan's intelligence agency (ISI, Inter-Services Intelligence) Ashfaq Kayani as telling him You know, I know you think we're hedging our bets, you're right, we are because one day you'll be gone again, it'll be like Afghanistan the first time [when the United States turned away from Afghanistan after the Soviet withdrawal in 1989], you'll be done with us, but we're still going to be here because we can't actually move the country. And the last thing we want with all of our other problems is to have turned the Taliban into a mortal enemy, so, yes, we're hedging our bets. Beyond the main themes discussed above, other issues impacting U.S. policymaking in Afghanistan surfaced throughout the SIGAR interviews: Positivity bias (e.g., Flynn interview on November 11, 2015: \"As intelligence makes it way up higher [within the bureaucracy], it gets consolidated and really watered down; it gets politicized â¦ because once policymakers get their hands on it, and frankly once operational commanders get their hands on it, they put their twist to itâ¦. Operational commanders, State Department policymakers, and Department of Defense policymakers are going to be inherently rosy in their assessments.\") Not considering greater inclusion of or interaction with the Taliban at the outset (e.g., U.N. official on August 27, 2015: \"Lesson learned: if you get a chance to talk to the Taliban, talk to themâ¦. At that moment [2001], most â¦ Taliban commanders were interested in joining the government.\") Powers granted to Afghanistan's central government (e.g., unnamed U.S. official, October 18, 2016: \"why did we create centralized gov't in a place that has never had one â¦ set us up for failure\") Some of the officials interviewed by SIGAR lauded arguable gains made and facilitated by the international community's work in Afghanistan since 2001, a perspective not generally included in the Washington Post stories. A number of interviewees argued, as one unnamed U.S. official did on June 2, 2015, \"There's not enough recognition of the scale of achievements in Afghanistanâ¦. Afghanistan has given a higher return on investment than almost any other reconstruction effort. From 2002-2012, [Afghanistan] made more progress in human development than any other country.\" Others contended (as referenced above) that one cannot assess the success or failure of U.S. efforts without considering the state of the country in 2002: \"We have to remember what we were starting with in Afghanistan. Afghans were starting with nothing. Social and economic development was at the lowest level possible. And that's why Taliban and al Qaeda found a home there, and why we went inâ¦. You must look at where we were, what we tried to do, and where we got to\" (unnamed senior State Department official April 26, 2016). Some officials outside the United States echoed these sentiments in their interviews. A Danish official said on June 30, 2015, despite corruption and all of the other problems, \"we'd be worse off without our [Afghanistan] intervention. The development side has had an impressive record.\" Abdul Jabar Naimee, who has served as governor of several eastern Afghan provinces, said in his March 6, 2017, interview I am seeing that in the [W]est a thinking is going that they helped the Afghans but it was useless. This is a completely a wrong assumption. In the three provinces where I have been working as governor, in all the three places when I have share[d] programs with the people, or I have participated in the projects['] events, I have seen people are happy with the help they have receivedâ¦. The assumption that people of Afghanistan are not happy with the help that was done for their improvement, this assumption is wrong, people are grateful for the help and they still benefit from the work that was done. Former Secretary of Defense Donald Rumsfeld's \"snowflakes\" (the last of which is dated December 22, 2004), unlike the SIGAR interviews, provide a contemporaneous view into one senior policymaker's thinking over the first several years of the U.S. effort in Afghanistan. Because they are brief and relatively informal, there are risks in taking them as representative of U.S. policy as a whole, but their on-the-ground perspective could still be useful in assessing U.S. policy in Afghanistan. They may also demonstrate that various perceptions noted in the SIGAR interviewsâsuch as that Afghanistan was less of a priority than Iraqâhad merit. Many of the approximately 200 snowflakes are minor; some notable excerpts are below. Rumsfeld apparently did not anticipate long-term U.S. financial support for Afghan security forces. In an April 8, 2002, memo to Secretary of State Colin Powell, Rumsfeld wrote, \"The U.S. spent billions freeing Afghanistan and providing security. We are spending a fortune every day. There is no reason on earth for the U.S. to commit to pay 20 percent for the Afghan army. I urge you to get DoS turned around on thisâthe U.S. position should be zero [underline original]. We are already doing more than anyone.\" Rumsfeld expressed continual concern about not having a plan (e.g., \"I am convinced we have to have a plan for Afghanistan and that nobody else in the government is going to do it unless we do. What do you propose?\" (October 17, 2002) Rumsfeld expressed an eagerness to reduce U.S. commitments in Afghanistan. In a September 25, 2003, memo to Under Secretary of Defense for Policy Doug Feith, he wrote, \"We need a good conceptual speech that describes where the responsibility is (and moves the blame if it fails away from the U.S.), namely on the Afghan people and on the international community.\" Rumsfeld sought greater input over non-Department of Defense equities. He wrote to White House Chief of Staff Andrew Card on August 19, 2002, requesting \"that I have an opportunity to interview any person who is proposed for Ambassador to Afghanistan, before the selection gets made and before the President is involved. The post is very important for the Department of Defense and I would like to have a good sense of who it might be and why.\" There is some evidence that Afghanistan, by 2003, may not have been a major focus for Rumsfeld. Rumsfeld received a November 7, 2003, letter from Afghan Uzbek leader Abdul Rashid Dostum, who painted a picture of widespread Taliban activity and said \"please do not forget the battle against terrorist and extremists in Afghanistan.\" Rumsfeld forwarded the letter in a memo to CENTCOM Commander General John Abizaid on November 18, 2003, describing the letter as \"worrisome\" and saying \"if he [Dostum] is correct that the Taliban are in control of that many areas within Afghanistan, that is news to me.\" The Washington Post 's \"Afghanistan Papers\" have attracted significant attention, though policymakers and outside analysts disagree about whether they contain new and relevant information and, if so, what effect this information should have on U.S. policy in Afghanistan going forward. In Congress, most of the Members who reacted publicly did so to reiterate previous calls to remove U.S. troops from Afghanistan. Senator Tom Udall spoke on the Senate floor about the Papers on December 12, voicing support for S.J.Res. 12 , introduced in March 2019 by Udall and Senator Rand Paul. The resolution would, among other provisions, mandate the removal of all U.S. forces from Afghanistan within a year of enactment. Senator Kirsten Gillibrand called for Senate hearings to investigate \"these deeply concerning revelations about the Afghan war,\" and Representative Max Rose said that the Papers demonstrated that \"the time to end this war and bring our troops home honorably is now.\" Top U.S. defense officials largely defended the U.S. conduct of the war, arguing that the Papers did not constitute evidence that former officials had lied to the American public, and that the Papers, as part of a Lessons Learned project, were structured to invite criticism, in hindsight, of the war effort. Pentagon Spokesman Jonathan Hoffman said on December 12, 2019, I would quibble with the idea that we weren't providing [accurate information] in the past. I think what we see from the report from the Washington Post is, looking at individuals giving retrospectives years later on what they may have believed at the time ... those statements appeared for the most part to be people looking back retrospectively on things that they had said previouslyâand using hindsight to speak to comments they had made. Secretary of Defense Mark Esper dismissed claims that officials had lied, saying, \"For 18 years now, the media has been over there [in Afghanistan]â¦. The Congress has been there multiple timesâ¦. We've had the SIGAR there. We've had IGs there. This has been a very transparentâit's not like this war was hiding somewhere and now all of a sudden there's been a revelationâ¦. So [the] insinuation that there's been this large-scale conspiracy is just, to me, ridiculous.\" Chairman of the Joint Chiefs of Staff General Mark Milley, appearing alongside Esper, said, \"I know that I and many, many others gave assessments at the time based on facts that we knew at the time. And those were honest assessments, and they were never intended to deceive neither the Congress nor the American people.\" SIGAR Special Inspector General John Sopko wrote a December 17, 2019, letter to the editor of the Washington Post disputing some of the Post 's characterizations and saying that \"the Afghanistan Papers is an important contribution to public discourse about the war in Afghanistan. But it is not a 'secret' history. SIGAR has written about these issues for years, including in seven Lessons Learned reports and more than 300 audits and other products.\" On January 15, 2020, Sopko testified in front of the House Foreign Affairs Committee that U.S. policy in Afghanistan has been characterized by \"institutional hubris and mendacity\" and that \"We have incentivized lying to Congress.... [T]he whole incentive is to show success and to ignore failure and when there's too much failure, classify it or don't report it.\" Outside observers have offered differing views of the Papers. One concurred with the Post 's assessment that in the Papers, \"officials' indictment of policies for which they themselves were responsible lays bare the massive institutional deceit that forms the heart of what the United States has done\" in Afghanistan. Other observers have taken a softer line. One wrote, \"it is apparent from the documents that many officials in power attempted to 'spin' a spiraling Afghanistan conflict for the public,\" though they did so because \"the U.S. government has every incentive to paint a better picture of progress than is the reality on the ground.\" Still others have argued that the Papers contain little that has not already been readily and publicly available for years: \"the only new information here is the identity of those making the criticisms.\" Those making this argument have pointed to reports from SIGAR (including their seven publicly released Lessons Learned reports for which the interviews in \"the Afghanistan Papers\" were conducted) and other inspectors general, as well as media, academic, and other public accounts. One summarizes, \"In short, if you're surprised by the Afghanistan Papers, you haven't been paying attention.\" Another observer criticizes the Post for \"putting sensationalist spin on information that was not classified, has already been described in publicly available reports, only covers a fraction of the 18 years of the war, and falls far short of convincingly demonstrating a campaign of deliberate lies and deceit.\" Given that there has been evidence of shortcomings in the U.S. war and development effort for years, one observer argues that \"Afghanistan is best seen, not as a morality play, but as a classic foreign policy dilemma in which all the options are bad ones\": Reasonable people can debate, with the benefit of hindsight, whether the United States should have accepted these risks as the price of avoiding another two decades of war. But the tragic dilemma of Afghanistan is that there have always been costs of withdrawal as well as costs of continued intervention. \"The Afghanistan Papers\" raise a number of potential questions for Congress to consider as Members evaluate the Trump Administration's Afghanistan policies. U.S. Strategy . What role, if any, has Congress played in compelling successive executive branch administrations to articulate U.S. strategy and/or policy goals in Afghanistan? What are the means by which Congress has attempted to shape or influence those goals? What have been the most and least effective of those means? Congressional Oversight . Members of Congress have conducted oversight of executive branch policy through various means, including appointing a special inspector general, public and closed hearings, Member and staff delegations to Afghanistan, letters to executive branch officials, and public statements. What have been the most and least effective methods of congressional oversight? U.S Aid: Budgeting. To what extent has Congress scrutinized executive branch funding requests? Have appropriated U.S. funding levels differed from those requests and if so, what changes have been made and why? To what extent have congressional budgeting decisions in Afghanistan been made due to political expediency? How, if at all, can Members of Congress insulate budgeting or other policymaking processes from political pressures? U.S. Aid: Conditionality. What conditions has Congress imposed on U.S. aid to Afghanistan and why? How, if at all, have those conditions impacted the delivery of U.S. aid, Afghan government actions, U.S.-Afghan relations, and congressional interactions with the executive branch? What kinds of changes, if any, to the Foreign Assistance Act or other relevant pieces of legislation might make U.S. development assistance more effective? Reporting . What has been the impact of congressionally mandated reporting on policy or outcomes? How, if at all, does Congress use these reports? What are the most and least useful reports that Congress receives on U.S. military and development efforts in Afghanistan? How, if at all, does Congress require agencies to evaluate their programs, and how does this inform reports to Congress? Has there been any evolution in specific monitoring and evaluation requirements? Bureaucracy. How has Congress shaped executive branch structure? Have these efforts been helpful? How direct a role should Congress play in mandating the establishment or nature of offices or other bureaucratic structures within the executive branch that work on Afghanistan? Personnel Issues . To what extent have U.S. efforts in Afghanistan been hampered by the frequent personnel turnover cited by many SIGAR interviewees? How, if at all, have congressional actions improved, undermined, or otherwise affected the ability of federal agencies to train and deploy capable workforces in Afghanistan? What congressional action, if any, is needed to help the executive branch, or individual departments, address this issue? Recommendations . What are the most important things that Congress could have been doing over the past 18 years to ensure U.S. success in Afghanistan? What can (and should) Congress do going forward?", "summary": "On December 9, 2019, the Washington Post published a series of documents termed \"the Afghanistan Papers.\" The Papers comprise two sets of documents: about 1,900 pages of notes and transcripts of interviews with more than 400 U.S. and other policymakers that were carried out between 2014 and 2018 by the Special Inspector General for Afghanistan Reconstruction (SIGAR), and approximately 190 short memos (referred to as \"snowflakes\") from former Secretary of Defense Donald Rumsfeld, dating from 2001 to 2004. The documents, and the Washington Post stories that accompany them, suggest that U.S. policies in Afghanistan often were poorly planned, resourced, and/or executed. These apparent shortcomings contributed to several outcomes that either were difficult to assess or did not fulfill stated U.S. objectives. Key themes of the SIGAR interviews include N egative effects of U.S. funding. The most frequently discussed subject in the SIGAR interviews was (a) the large sum of U.S. money ($132 billion in development assistance since 2001) that poured into Afghanistan and (b) the extent to which much of it was reportedly wasted, stolen, exacerbated existing problems, or created new ones, particularly corruption. Unclear U.S. g oals . Many of the interviewees argued that, from the beginning, the U.S. engagement in Afghanistan, supported by the money noted above, lacked a clear goal. Competing p riorities . The proliferation of U.S. goals in Afghanistan led to another complication: U.S. actions to achieve some of these objectives seemed to undermine others. Organizational confusion and competition. While U.S. efforts in Afghanistan were dominated by the Department of Defense, given the wide array of U.S. interests in Afghanistan, U.S. policy formulation and execution required input from many federal departments and agencies. The problems associated with trying to coordinate among all of these entities was a consistent theme. Lack of e xpertise . Multiple SIGAR interviewees criticized U.S. policies that they claimed failed to generate relevant expertise within the U.S. government or even disincentivized the creation or application of that expertise in Afghanistan. Disorganized m ulti national coalition . Many of the SIGAR interviewees who worked on coordinating U.S. and international efforts discussed what they saw as a disorganized system. Iraq as a distraction. U.S. officials who were working on Afghanistan in the first decade of the war held a nearly universal judgment, in SIGAR interviews, that the U.S. invasion of Iraq in March 2003 distracted U.S. attention and diverted U.S. financial and other resources. Pakistan 's support for the Taliban . A number of interviewees, particularly senior U.S. officials, attributed the Taliban's resurgence, and the failure of the U.S. to solidify gains in Afghanistan, to material support for the group from, and its safe havens in, Pakistan. Other voices: U.S. efforts as relatively successful. Some of the officials interviewed by SIGAR lauded arguable gains made and facilitated by the international community's work in Afghanistan since 2001, a perspective not generally included in the Washington Post stories. The documents, released at a time when the United States is engaged in talks with the Taliban aimed at ending the 18-year U.S. military presence in the country, have attracted significant attention. Some Members of Congress have called for further investigation into U.S. policy in Afghanistan. However, there is debate over how revelatory the SIGAR interviews are: policymakers and outside analysts disagree about whether they contain new and relevant information and, if so, how the information should affect U.S. policy in Afghanistan going forward.", "document_type": "crs"}
{"report": "When there is concern with deficit or debt levels, Congress will sometimes implement budget enforcement mechanisms to mandate specific budgetary policies or fiscal outcomes. The Budget Control Act of 2011 (BCA; P.L. 112-25 ) was the legislative result of extended budget policy negotiations between congressional leaders and President Barack Obama. These negotiations occurred in conjunction with the government's borrowing authority approaching the statutory debt limit. Budget deficits in FY2009 through FY2011 averaged 9.0% of gross domestic product (GDP) and were higher than any other year since World War II. Those deficits were due to a number of factors, including reduced revenues and increased spending demands attributable to the Great Recession and costs associated with the economic stimulus package passed through the American Recovery and Reinvestment Act of 2009 ( P.L. 111-5 ). The BCA includes several interconnected components related to the federal budget, some of which are no longer in effect. There are five primary components: 1. An authorization to the executive branch to increase the debt limit in three installments, subject to a disapproval process by Congress. (Those provisions were temporary and are no longer in effect.) 2. A one-time requirement for Congress to vote on an amendment to the Constitution to require a balanced budget . 3. The establishment of limits on defense discretionary spending and nondefense discretionary spending, enforced by sequestration (automatic, across-the-board reductions) in effect through FY2021. Under this mechanism, sequestration is intended to deter enactment of legislation violating the spending limits or, in the event that legislation is enacted violating these limits, to automatically reduce discretionary spending to the limits specified in law. 4. The establishment of the Joint Select Committee on Deficit Reduction (often referred to as \"the Joint Committee\" or \"the super committee\"), which was directed to develop a proposal that would reduce the deficit by at least $1.5 trillion over FY2012 to FY2021. 5. The establishment of an automatic process to reduce spending, beginning in 2013, in the event that Congress and the President did not enact a bill reported by the Joint Committee reducing the deficit by at least $1.2 trillion. (Such a bill was not enacted.) This automatic process requires annual downward adjustments of the discretionary spending limits, as well as a sequester (automatic, across-the-board reduction) of nonexempt mandatory spending programs. In this case, sequestration was included to encourage the Joint Committee to agree on deficit reduction legislation or, in the event that such agreement was not reached, to automatically reduce spending so that an equivalent budgetary goal would be achieved. The BCA as amended has three main components that currently affect the annual budget. One component imposes annual statutory discretionary spending limits for defense and nondefense spending. A second component requires annual reductions to the initial discretionary spending limits, triggered by the absence of a deficit reduction agreement from the Joint Committee. Third are annual automatic mandatory spending reductions triggered by the same absence of a deficit reduction agreement. Each of those components is described in further detail below. The BCA established statutory limits on discretionary spending for FY2012-FY2021. (Such discretionary spending limits were first in effect between FY1991 and FY2002. ) There are currently separate annual limits for defense discretionary and nondefense discretionary spending. The defense category consists of discretionary spending in budget function 050 (national defense) only. The nondefense category includes discretionary spending in all other budget functions. If discretionary appropriations are enacted that exceed a statutory limit for a fiscal year, across-the-board reductions (i.e., sequestration) of nonexempt budgetary resources within the applicable category are required to eliminate the excess spending. The BCA further stipulates that some spending is effectively exempt from the limits. Specifically, the BCA specifies that the enactment of certain discretionary spendingâsuch as appropriations designated as emergency requirements or for overseas contingency operationsâallows for an upward adjustment of the discretionary limits (meaning that such spending is effectively exempt from the limits). Another component of the BCA requires reductions to these discretionary spending limits annually. Due to the absence of the enactment of Joint Committee legislation to reduce the deficit by at least $1.2 trillion over the 10-year period (described above), the BCA requires these reductions to the statutory limits on both defense and nondefense discretionary spending for each year through FY2021. These reductions are often referred to as a sequester, but they are not a sequester per se because they do not make automatic, across-the-board cuts to programs. Instead, they lower the spending limits, allowing Congress the discretion to develop legislation within the reduced limits. For information on the spending limit amounts, see the section below titled \" 9. How is discretionary spending currently affected by the BCA? \" Because legislation from the Joint Committee to reduce the deficit by at least $1.2 trillion over the 10-year period (described above) was not enacted, the BCA requires the annual sequester (automatic, across-the-board reductions) of nonexempt mandatory spending programs. This sequester was originally intended to occur each year through FY2021 but has been extended to continue through FY2029. Many programs are exempt from sequestration, such as Social Security, Medicaid, the Children's Health Insurance Program (CHIP), Temporary Assistance for Needy Families (TANF), and Supplemental Nutrition Assistance Program (SNAP, formerly food stamps). In addition, special rules govern the sequestration of certain programs, such as Medicare, which is limited to a 2% reduction. To see a list of direct spending programs included in the most recent sequester report, see the annual Office of Management and Budget (OMB) report to Congress on the Joint Committee sequester for FY2020. For more information on the budgetary impact of the mandatory spending sequester, see the section below titled How is mandatory spending currently affected by the BCA? A sequester provides for the enforcement of budgetary limits established in law through the automatic cancellation of previously enacted spending. This cancellation of spending makes largely across-the-board reductions to nonexempt programs, activities, and accounts. A sequester is implemented through a sequestration order issued by the President as required by law. The purpose of a sequester is to enforce certain statutory budget requirementsâeither to discourage Congress from enacting legislation violating a specific budgetary goal or to encourage Congress to enact legislation that would fulfill a specific budgetary goal. One of the authors of the law that first employed the sequester recently stated, \"It was never the objective ... to trigger the sequester; the objective ... was to have the threat of the sequester force compromise and action.\" As mentioned above, sequestration is currently used as the enforcement mechanism for policies established in the BCA: For the discretionary spending limits, a sequester will occur only if appropriations are enacted that exceed either the defense or nondefense discretionary limits. In such a case, sequestration is generally enforced when OMB issues a final sequestration report within 15 calendar days after the end of a session of Congress. In addition, a separate sequester may be triggered if the enactment of appropriations causes a breach in the discretionary limits during the second and third quarter of the fiscal year. In such an event, sequestration would take place 15 days after the enactment of the appropriation. If the enactment of appropriations causes the discretionary spending limits to be breached in the last quarter of the fiscal year, the spending limit for the following fiscal year for that category must be reduced by the amount of the breach. As mentioned above, the BCA requires reductions to these discretionary spending limits annually. These reductions are to be calculated by OMB and included annually in the OMB Sequestration Preview Report to the President and Congress , which is to be issued with the President's annual budget submission. The reductions would then apply to the discretionary spending limits for the budget year corresponding to the President's submission. While these reductions are often referred to as a sequester, they are not a sequester per se because they do not make automatic, across-the-board cuts to programs. Instead, they lower the spending limits, allowing Congress the discretion to develop legislation within the reduced limits. A sequester of nonexempt mandatory spending programs will take place each year through FY2029. These levels are also calculated by OMB and are included in the annual OMB report to Congress on the Joint Committee reductions, which is also to be issued with the President's budget submission. The sequester does not occur, however, until the beginning of the upcoming fiscal year. Legislation has been enacted making changes to the spending limits or enforcement procedures included in the BCA for each year from FY2013 through FY2021. Some of the most significant of these changes are the following: The American Taxpayer Relief Act of 2012 (ATRA; P.L. 112-240 ) postponed the start of FY2013 sequester from January 2 to March 3 and reduced the amount of the spending reductions by $24 billion, among other things. The Bipartisan Budget Act of 2013 (BBA 2013; P.L. 113-67 , referred to as the Murray-Ryan agreement) increased discretionary spending limits for both defense and nondefense for FY2014, each by about $22 billion. In addition, it increased discretionary spending limits for both defense and nondefense for FY2015, each by about $9 billion. It also extended the mandatory spending sequester by two years through FY2023. Soon after the enactment of the Bipartisan Budget Act of 2013, a bill was enacted to \"ensure that the reduced annual cost-of-living adjustment to the retired pay of members and former members of the armed forces under the age of 62 required by the Bipartisan Budget Act of 2013 will not apply to members or former members who first became members prior to January 1, 2014, and for other purposes ( P.L. 113-82 ).\" This legislation extended the direct spending sequester by one year through FY2024. The Bipartisan Budget Act of 2015 (BBA 2015; P.L. 114-74 ) increased discretionary spending limits for both defense and nondefense for FY2016, each by $25 billion. In addition, it increased discretionary spending limits for both defense and nondefense for FY2017, each by $15 billion. It also extended the direct spending sequester by one year through FY2025. In addition, it established nonbinding spending targets for Overseas Contingency Operations/Global War on Terrorism (OCO/GWOT) levels for FY2016 and FY2017 and amended the limits of adjustments allowed under the discretionary spending limits for Program Integrity Initiatives. The Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ) increased nondefense and defense discretionary limits in FY2018 and FY2019. In FY2018 BBA 2018 increased the defense limit by $80 billion (to $629 billion) and increased the nondefense limit by $63 billion (to $579 billion); in FY2019 it increased the defense limit by $85 billion (to $647 billion) and increased the nondefense limit by $68 billion (to $597 billion). BBA 2018 also extended the mandatory spending sequester by two years through FY2027. The Bipartisan Budget Act of 2019 (BBA 2019; P.L. 116-37 ) increased discretionary spending limits for FY2020 and FY2021. In FY2020, it increased the discretionary defense cap by $90 billion, to $667 billion, and increased the nondefense cap by $78 billion, to $622 billion. In FY2021, it increased the discretionary defense cap by $81 billion, to $672 billion, and increased the nondefense cap by $72 billion, to $627 billion. BBA 2019 also extended the mandatory spending sequester by two years, through FY2029. Congress may modify or repeal any aspect of the BCA procedures at its discretion, but such changes require the enactment of legislation. Since enactment of the BCA, subsequent legislation has modified both the discretionary spending limits and the mandatory spending sequester (as described above). In considering the potential for Congress to reach agreement on future modifications to the BCA, particularly the discretionary spending limits, it may be worth noting the following: Legislation that would modify the discretionary spending limit would be subject to the regular legislative process. Such legislation would therefore require House and Senate passage, as well as signature by the President or congressional override of a presidential veto. In the House, such legislation would require the support of a simple majority of Members voting, but in the Senate, consideration of such legislation would likely require cloture to be invoked, which requires a vote of three-fifths of all Senators (normally 60 votes) to bring debate to a close. Previous legislative increases to the discretionary spending limits have been coupled with future spending reductions, such as extensions of the mandatory spending sequester. For example, BBA 2013 extended the mandatory spending sequester by two years (from FY2021 to FY2023). Previous legislative increases to the discretionary spending limits have adhered to what has been referred to as the \"parity principle.\" In essence, this means that some Members of Congress have insisted that any legislation changing the limits must increase each of the two limits (defense and nondefense) by equal amounts. For example, BBA 2015 increased discretionary spending limits for both defense and nondefense for FY2016, each by $25 billion. In addition, it increased discretionary spending limits for both defense and nondefense for FY2017, each by $15 billion. Although the budget resolution may act as a plan for the upcoming budget year, it does not provide budget authority and therefore cannot trigger a sequester for violation of the discretionary spending limits. Nevertheless, budget resolutions are often referred to in terms of complying with, or not complying with, the discretionary spending limits. Even if a budget resolution were agreed to that included planned levels of spending in excess of the discretionary spending limits, this would not supersede the discretionary spending limits stipulated by the BCA. While Congress may modify or cancel the discretionary spending limits at its discretion, such changes require the enactment of legislation. Authorizations of discretionary appropriations, such as the National Defense Authorization Act (NDAA), do not provide budget authority and therefore cannot trigger a sequester for violation of the discretionary spending limits. Although authorizations often include recommendations for funding levels, budget authority is subsequently provided in appropriations legislation. It is, therefore, appropriations legislation that could trigger a sequester. Nevertheless, authorizations (the NDAA in particular) are often discussed in terms of whether or not the authorized level of funding, if appropriated, would comply with the discretionary spending limits. Even if an authorization bill were enacted that authorized appropriations at levels in excess of the discretionary spending limits, this authorization would not supersede the statutory discretionary spending limits stipulated by the BCA. While Congress may modify or cancel the discretionary spending limits at its discretion, such changes require the enactment of legislation. Appropriations legislation that provides budget authority for discretionary spending programs in excess of the discretionary spending limits can trigger a sequester for violation of the discretionary spending limits. This includes regular appropriations legislation, supplemental appropriations legislation, and continuing resolutions (CRs). Any appropriations legislation enacted into law that provides budget authority in excess of the levels stipulated by the BCA would trigger a sequester, canceling previously enacted spending through automatic, largely across-the-board reductions of nonexempt budgetary resources within the category of the breach. The statutory limits established by the BCA as amended apply to budget authority and not outlays. Budget authority is what federal agencies are legally permitted to obligate, and it is controlled by Congress through appropriation acts in the case of discretionary spending or through other acts in the case of mandatory spending. Budget authority gives federal officials the ability to spend. Outlays are disbursed federal funds. Until the federal government disburses funds to make payments, no outlays occur. Therefore, there is generally a lag between when Congress grants budget authority and when outlays occur. Some spending is regarded as \"exempt\" from the BCA. A distinction should be noted between categories of spending that are \"excluded\" from the discretionary spending limits and spending programs that are \"exempt\" from sequestration. Some categories of spending are considered \"exempt\" or \"excluded\" from the discretionary spending limits, meaning that when an assessment is made as to whether the discretionary spending limits have been breached, they are not counted. (In precise terms, the BCA does not \"exempt\" such spending but allows for an upward adjustment of the discretionary limits to accommodate such spending.) For example, spending designated as emergency requirements or for OCO/GWOT is effectively excluded from the discretionary spending limits up to any amount (meaning that the designation of such spending allows for an upward adjustment of the discretionary limits to accommodate that spending). The BCA does not define what constitutes this type of funding, nor does it limit the level or amount of spending that may be designated as being for such purposes. Similarly, \"disaster funding\" and spending for \"continuing disability reviews and redeterminations\" and \"healthcare fraud and abuse control\" are effectively exempt up to a certain amount (again meaning that such spending allows for an upward adjustment of the discretionary limits to accommodate that spending), as are other programs. Some programs are exempt from a sequester, such as Social Security, Medicaid, CHIP, TANF, and SNAP. In addition, special rules govern the sequestration of certain programs, such as Medicare, which is limited to a 2% reduction. These exemptions and special rules are found in Sections 255 and 256 of the BBEDCA, as amended, respectively. It may also be helpful to review OMB sequester reports detailing programs that have been subject to sequester. To see a list of both discretionary and direct spending programs subject to the FY2013 sequester, see the OMB report to Congress on the Joint Committee sequestration for FY2013. To see a list of direct spending programs included in the most recent sequester report, see the annual OMB report to Congress on the Joint Committee sequester for FY2020. The \"parity principle\" refers to the equality between changes made to defense and nondefense budget authority through some deficit reduction measures established by the BCA. While there has never been a statutory requirement to uphold the parity principle, budget parity has followed from deficit reduction measures imposed by the BCA and some of the subsequent amendments to its deficit reduction measures. The specific type of parity in each law evolved over time. The BCA and ATRA reflected parity in the budgetary impact of changes to defense and nondefense budget authority across both discretionary and mandatory spending categories . Subsequent BCA amendments in BBA 2013 and BBA 2015 reflected parity between defense and nondefense budget authority for discretionary spending only , as those laws also extended automatic mandatory deficit reduction measures that had larger budget reductions for nondefense activities than for defense programs. BBA 2018 reflected yet another type of parity, as the amended discretionary cap levels in FY2018 and FY2019 were increased by an equivalent amount relative to the initial BCA levels as established in August 2011. As compared with the caps after the automatic reductions took effect, BBA 2018 included larger increases to the defense caps than to the nondefense caps. As with BBA 2013 and BBA 2015, BBA 2018 also included an extension to the automatic mandatory spending reductions with a larger set of reductions for nondefense programs than for defense programs. BBA 2019 did not include increases that reflected any definition of the parity principle: as with BBA 2018 it imposed larger increases to defense programs than nondefense programs for FY2020 and FY2021, but the difference between the nondefense and defense caps in each year was smaller than the gap initially established by the BCA. The BCA provides for upward adjustments to the discretionary caps, sometimes called spending \"outside the caps,\" for budget authority devoted to OCO, emergency requirements, and other purposes. Budget authority for BCA upward adjustments has not reflected parity between defense and nondefense activities in any effective year of the BCA to date, as upward adjustments have allowed for more defense spending than nondefense spending in each year from FY2012 through FY2017 and FY2019, while upward adjustments were larger for defense spending than nondefense spending in FY2018. The BCA includes annual statutory caps that limit how much discretionary budget authority can be provided for defense and nondefense activities. These limits are in effect through FY2021 and are enforced by sequestration, meaning that a breach of the discretionary spending limit for either category would trigger a sequester of resources within that category only to make up for the amount of the breach. A second component of the BCA makes automatic decreases to these caps annually. In the absence of the enactment of a Joint Committee bill to reduce the deficit by at least $1.2 trillion, the BCA required downward adjustments (or reductions) to the statutory limit on both defense and nondefense spending each year through FY2021. While these reductions are often referred to as sequesters, they are not technically sequesters because they do not make automatic, across-the-board cuts to programs. The reductions instead lower the spending limits, allowing Congress the discretion to develop legislation within the reduced limits. These reductions are to be calculated annually by O MB and are included in the OMB Sequestration Preview Report to the President and Congress , which is issued with the President's annual budget submission. The BCA stipulates that certain discretionary funding, such as appropriations designated as OCO or for emergency requirements, allows for an upward adjustment of the discretionary limits. OCO funding is therefore sometimes described as being \"exempt\" from the discretionary spending limits. The BCA does not define what constitutes this type of funding, nor does it limit the level of spending that may be designated as being for such purposes. The BCA as enacted was estimated to reduce budget deficits by a cumulative amount of roughly $2 trillion over the FY2012-FY2021 period. Subsequent modifications enacted through ATRA, BBA 2013, and BBA 2015 lessened the level of deficit reduction projected to be achieved by the BCA in selected years. ATRA postponed FY2013 spending reductions and made them smaller. In contrast, BBA 2013, BBA 2015, BBA 2018, and BBA 2019 limited the deficit-reducing impact through increases in the discretionary budget authority caps in FY2014-FY2021. Table 1 shows the evolution of discretionary spending limits established by the BCA from August 2011 through August 2019. The discretionary caps in FY2020 are currently scheduled to be $667 billion for defense activities and $622 billion for nondefense activities, higher than their totals of $647 billion and $597 billion, respectively, in FY2019. The combined discretionary limit in FY2020 ($1,288 billion) is $45 billion higher than its FY2019 value. The absence of an agreement by the Joint Committee triggered automatic spending reductions (as provided for in the BCA) for all mandatory programs that were not explicitly exempted from FY2013 through FY2021. Notably, Social Security payments were exempted from the automatic reductions, and the effect on Medicare spending was limited to 2% of annual payments made to certain Medicare programs. Extensions of the mandatory spending reductions were included in BBA 2013, BBA 2015, BBA 2018, and BBA 2019 and are currently scheduled to remain in place through FY2029. A recent OMB sequestration report estimated that such measures will reduce mandatory outlays by $20.7 billion in FY2020, with $19.86 billion of that total applied to nondefense programs and $0.84 billion applied to defense programs. The limits on discretionary spending established by the BCA apply to budget authority, which is the amount that federal agencies are legally permitted to obligate. Outlays, meanwhile, are disbursed federal funds: In other words, they represent amounts that are actually spent by the government. There is generally a lag between when Congress grants budget authority and when outlays occur, and that lag can vary depending on the agency and specific purpose of the obligation. Furthermore, the budget may classify certain types of spending in a certain way when measuring budget authority and another way when measuring outlays. For example, much of the spending attached to the Highway Trust Fund is classified as mandatory spending when measuring budget authority and as discretionary spending when measuring outlays. Budget deficits declined for much of the 1990s due to decreased spending, rising revenues, and an improved economy. The federal budget recorded surpluses from FY1998 through FY2001. Prior to that, the last budget surplus occurred in FY1969. Budget deficits returned starting in FY2002 and slowly increased over the next several years due to reduced revenues and increased spending. Net deficits peaked during the Great Recession from FY2009 to FY2011, as negative and low economic growth coupled with increased spending commitments provided for by the American Recovery and Reinvestment Act ( P.L. 111-5 ) contributed to real deficits averaging 9.0% of gross domestic product (GDP) in those years. Real deficits have declined since FY2011, due to the modifications made by the BCA, increased revenues, and the winding down of stimulus programs. However, the FY2019 deficit (4.3% of GDP, or $665 billion) remains higher than the average deficit since FY1969 (2.9% of GDP).The CBO baseline projects that real budget deficits will increase in future years. Modifications to the limits on discretionary spending, established by the BCA, change authorizations levels, which in turn affect outlays. CBO provides estimates of both discretionary spending effects and mandatory spending effects in its legislative cost estimates. Whether proposed legislation affects discretionary or mandatory spending may have ramifications for congressional budgetary enforcement procedures, however. CBO's baseline projections assume that the discretionary limits imposed by the BCA as amended will proceed as scheduled through FY2021 and that discretionary spending levels will grow with the economy in subsequent years. Such methodology uses the discretionary spending levels in FY2021 as the basis for discretionary spending projections for the remainder of the budget window. ", "summary": "When there is concern with deficit or debt levels, Congress will sometimes implement budget enforcement mechanisms to mandate specific budgetary policies or fiscal outcomes. The Budget Control Act of 2011 (BCA; P.L. 112-25 ), which was signed into law on August 2, 2011, includes several such mechanisms. The BCA as amended has three main components that currently affect the annual budget. One component imposes annual statutory discretionary spending limits for defense and nondefense spending. A second component requires annual reductions to the initial discretionary spending limits triggered by the absence of a deficit reduction agreement from a committee formed by the BCA. Third are annual automatic mandatory spending reductions triggered by the same absence of a deficit reduction agreement. Each of those components is described in further detail in this report. The discretionary spending limits (and annual reductions) are currently scheduled to remain in effect through FY2021, while the mandatory spending reductions are scheduled to remain in effect through FY2029. Congress may modify or repeal any aspect of the BCA procedures, but such changes require the enactment of legislation. Several pieces of legislation have changed the spending limits or enforcement procedures included in the BCA with respect to each year from FY2013 through FY2029. These include the American Taxpayer Relief Act of 2012 (ATRA; P.L. 112-240 ), the Bipartisan Budget Act of 2013 (BBA 2013; P.L. 113-67 , also referred to as the Murray-Ryan agreement), the Bipartisan Budget Act of 2015 (BBA 2015; P.L. 114-74 ), the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ), and the Bipartisan Budget Act of 2019 (BBA 2019; P.L. 116-37 ). Those laws included changes to the discretionary limits imposed by the BCA that increased deficits in each year from FY2013 to FY2021. Under current law there are no discretionary spending caps in place for FY2022 and beyond. Following enactment of BBA 2019, the discretionary caps in FY2020 are scheduled to be approximately $667 billion for defense activities and $622 billion for nondefense activities, and the FY2021 discretionary caps are scheduled to be $672 billion for defense activities and $627 billion for nondefense activities. This report addresses several frequently asked questions related to the BCA and the annual budget.", "document_type": "crs"}
{"report": "Pensions for civilian federal employees are provided through two programs, the Civil Service Retirement System (CSRS) and the Federal Employees' Retirement System (FERS). CSRS was authorized by the Civil Service Retirement Act of 1920 (P.L. 66-215) and FERS was established by the Federal Employees' Retirement System Act of 1986 ( P.L. 99-335 ). Under both CSRS and FERS, employees and their employing agencies make contributions to the Civil Service Retirement and Disability Fund (CSRDF), from which pension benefits are paid to retirees and their surviving dependents. Retirement and disability benefits under FERS are fully funded by employee and employer contributions and interest earned by the bonds in which the contributions are invested. The cost of the retirement and disability benefits earned by employees covered by CSRS, on the other hand, are not fully funded by agency and employee contributions and interest income. The federal government therefore makes supplemental payments each year into the civil service trust fund on behalf of employees covered by CSRS. Even with these additional payments into the trust fund, however, CSRS pensions are not fully pre-funded. Prior to 1984, federal employees did not pay Social Security payroll taxes and did not earn Social Security benefits. The Social Security Amendments of 1983 ( P.L. 98-21 ) mandated Social Security coverage for civilian federal employees hired on or after January 1, 1984. This change was made in part because the Social Security system needed additional cash contributions to remain solvent. Enrolling federal workers in both CSRS and Social Security, however, would have resulted in duplication of some benefits and would have required employee contributions equal to more than 13% of workers' salaries. Consequently, Congress directed the development of the FERS, with Social Security as the cornerstone. The FERS is composed of three elements: (1) Social Security, (2) the FERS basic retirement annuity and the FERS supplement, and (3) the Thrift Savings Plan (TSP). Most permanent federal employees initially hired on or after January 1, 1984, are enrolled in the FERS, as are employees who voluntarily switched from CSRS to FERS during \"open seasons\" held in 1987 and 1998. Retirement plans are classified as either defined benefit (DB) plans or defined contribution (DC) plans. In a DB plan, the retirement benefit typically is based on an employee's salary and years of service. Under federal law, a DB plan must offer participants the option to take their benefit as a life annuity. A DC planâfor example, a 401(k)âis much like a savings account maintained by the employer on behalf of each participating employee. The employer or the employee or both contribute to an account, which is invested in assets such as stocks and bonds. In some DC plans, the amount of the employer contribution depends on how much the employee contributes from his or her pay. When the worker retires, he or she receives the balance in the account, which is the sum of all the contributions that have been made plus interest, dividends, and capital gains (or losses). This is usually paid as a lump-sum, but the employee sometimes has the option to receive benefits as a series of fixed payments over a period of years or as an annuity. An important difference between DB plans and DC plans is that the employer bears the financial risk in a DB plan, whereas the employee bears the financial risk in a DC plan. In a DB plan, the employer promises to provide retirement benefits equal to a certain dollar amount or a specific percentage of the employee's pay. Under federal law, employers in the private sector are required to pre-fund these benefits by setting aside money in a trust fund, which is typically invested in stocks, bonds, and other assets. The employer is at risk for the full amount of retirement benefits its employees have earned. If the assets held in the pension fund are worth less than the present value of the benefits that have been accrued under the plan, the employer is required by law to make up this deficitâcalled an unfunded liabilityâthrough additional contributions over a period of years. In a DC plan, it is the employee who bears several types of risk, including the risk that markets will decline ( market risk ), the risk that specific investments he or she chooses will fall in value ( investment risk ), and the risk that the employee may outlive their retirement assets ( longevity risk ). If the contributions to the account are inadequate, or if the securities in which the account is invested lose value or increase in value too slowly, the employee risks having an income in retirement that is too small to maintain his or her desired standard of living. If this situation occurs, the worker might find it necessary to delay retirement. Private-sector employers are not required to provide retirement plans for their employees, but those that do must comply with the Employee Retirement Income Security Act of 1974 (ERISA; P.L. 93-406 ). ERISA sets standards that plans must meet with respect to reporting and disclosure, employee participation and vesting, plan funding, and fiduciary standards. Because employers cannot be certain that their revenues in future years will be sufficient to pay the pension benefits they owe to retired workers, ERISA requires companies to pre-fund DB pension obligations. Pre-funding of DB pensions protects employees who have earned the right to receive a pension, even if the firm goes out of business. Employers in the private sector pre-fund their DB pension liabilities by establishing pension trusts, which are invested in assets such as stocks and bonds. ERISA also established the Pension Benefit Guaranty Corporation (PBGC), which pays pension benefits (up to limits set in law) in the event that a company goes out of business with an underfunded pension plan. The PBGC is funded by premiums paid by employers that sponsor defined benefit pensions. It does not insure defined contribution plans. Pre-funding DB pension benefits is consistent with the principles of accrual accounting, in which a firm's assets and liabilities are recognized in its financial records as they accrue, as opposed to waiting until cash is received or paid out. By providing for future pension liabilities as they are incurred, the firm is recognizing that the pension benefits that it must pay in the future are part of the cost of doing business today. When an employer fails to set aside enough money each year to pay the retirement benefits accrued by its workers that year, it accumulates an \"unfunded liability.\" ERISA requires any employer that develops an unfunded liability in its defined benefit pension plan to make additional contributions over a period of years until the plan's assets equal the present value of its liabilities. When CSRS was established in 1920, it was not pre-funded. Benefits paid to federal retirees were paid from current contributions to the plan. Because the federal government is not likely to go out of business, it could have continued to pay the pensions earned by federal employees on a pay-as-you-go basis. Nevertheless, when Congress established FERS in 1986, it required all pension benefits earned under FERS to be fully pre-funded by the sum of employer and employee contributions and the interest earned by the U.S. Treasury bonds held by the Civil Service Retirement and Disability Fund. Congress required pre-funding of FERS retirement benefits so that federal agencies would have to recognize these costs in their budgets. Pre-funding promotes more efficient allocation of resources between personnel costs and other expenses because it forces federal agencies to recognize the full cost of employee compensation when they prepare their annual budget requests. The assets in private-sector pension funds represent a \"store of wealth\" that firms can use to meet pension obligations as they come due. The CSRDF, however, is not a store of wealth for the federal government. The fund is required by law to invest exclusively in U.S. Treasury bonds. These bonds represent budget authority , which is the legal basis for the Treasury to disburse funds. When the CSRDF redeems the Treasury bonds that it holds, the Treasury must raise an equivalent amount of cash by collecting taxes or borrowing from the public. If the CSRDF held assets that earned a higher average rate of return than U.S. Treasury bonds, some of the future cost of civil service retirement annuities could be paid from these higher investment returns. However, in the short run, allowing the CSRDF to invest in private-sector securities such as corporate stocks and bonds would result in higher federal expenditures, which would be required to purchase such private-sector securities. The trust fund's two main sources of income are employee contributions and contributions from federal agencies on behalf of their employees. Employee contributions are income both to the federal government and to the trust fund. Agency contributions, however, are income to the trust fund, but they are not income to the federal government. Agency contributions to the CSRDF are intragovernmental transfers that have no effect on the government's annual budget deficit or surplus. Currently, most outlays from the trust fund are benefit payments to annuitants. If the CSRDF were to purchase private-sector assets rather than U.S. Treasury bonds, an outlay from the trust fund would be required to purchase these assets. If employee contributions were used to purchase private-sector assets, they would no longer be income to the Treasury, and they would increase the federal budget deficit by the amount diverted to purchase private-sector assets. Agency contributionsâcurrently an intragovernmental transferâwould instead be used to purchase private-sector assets and would be a new outlay of funds from the Treasury. Over the long run, however, purchasing private-sector assets would not increase the budget deficit, and could reduce it. Outlays would be moved from the futureâwhere they would have occurred as benefit paymentsâto the present, where they would occur to purchase assets. If the net rate of return on private-sector securities exceeded the rate of return on Treasury bonds, the extra investment income earned by the trust fund would reduce the amount of tax revenue that would have to be raised from the public in the future to pay pension benefits under CSRS and FERS. Such a change in policy, however, would raise important questions about the federal government owning private-sector assets, and also could result in greater volatility in the value of the assets held by the trust funds. Under both CSRS and FERS, retirement annuities are based on (1) the employee's years of service, (2) the average of the employee's highest three consecutive years of salary, and (3) the benefit accrual rate. Workers covered by CSRS accrue benefits equal to 1.5% of pay for their first five years of service, 1.75% for the next five years, and 2.0% of pay for each year of service beyond the 10 th year. Under CSRS, an employee with 30 years of service will have earned an annuity equal to 56.25% of the average of his or her highest three consecutive years of pay. Employees enrolled in FERS accrue benefits equal to 1.0% of pay for each year of service. If they have worked for the federal government for 20 or more years and retire at age 62 or older, the accrual rate under FERS is 1.1% for each year of service. With 30 years of service, an employee enrolled in FERS will have earned a pension equal to 30% of the average of his or her highest three consecutive years of pay, or 33% if the individual is 62 or older at retirement. Federal agencies pre-fund employee pensions by deferring some of their budget authority until it is needed to pay pensions to retired workers. Federal agencies defer this budget authority by transferring it to the CSRDF. The Treasury credits the fund with the appropriate amount of budget authority in the form of special-issue bonds that earn interest equal to the average rate on the Treasury's outstanding long-term debt. The CSRDF can redeem these bonds to pay pensions to retirees and survivors. Federal employees have mandatory contributions to the CSRDF deducted from their paychecks. Employees who are under the CSRS contribute 7.0% of basic pay to the CSRDF. Employees under FERS first hired before 2013 contribute 0.8% of pay to the CSRDF and 6.2% of wages to the Social Security trust fund for Old-Age, Survivors, and Disability Insurance (OASDI) up to the Social Security taxable wage base. In 2019, wages up to $132,900 are subject to the OASDI tax. Employees under FERS first hired (or rehired with less than five years of FERS service) in calendar year 2013 contribute 3.1% of pay to the CSRDF and 6.2% of taxable wages to the Social Security trust fund. FERS employees first hired (or rehired with less than five years of FERS service) after December 31, 2013, contribute 4.4% of pay to the CSRDF and 6.2% of taxable wages to the Social Security trust fund. Whether a federal employee is enrolled in CSRS or FERS, his or her employing agency contributes money to the CSRDF. Agency contributions differ between CSRS and FERS. The Office of Personnel Management (OPM) estimates the cost of CSRS annuities to be equal to 36.6% of employee pay. This is the amount that would have to be contributed to the CSRDF each year to fully fund the benefits that employees earn under the CSRS. Under CSRS, employees and their employing agencies each contribute an amount equal to 7.0% of pay the CSRDF. Agency and employee contributions total 14.0% of pay. The Treasury makes an annual contribution to the CSRDF that covers most of the costs of the CSRS that are not covered by employee and agency contributions. On September 30, 2018, the Treasury made a payment $34.16 billion for CSRS to the CSRDF. However, the CSRS continues to have an unfunded liability, which is estimated to be $813.1 billion in FY2018. Effective as of October 1, 2019, OPM estimates the cost of FERS at an amount equal to 16.8% of pay for employees first hired before 2013, 17.3% for employees first hired in 2013, and 17.5% for employees first hired after 2013. The employee contribution of 0.8% of pay under FERS for employees first hired before 2013 is equal to the difference between the CSRS contribution rate (7.0%) and the Social Security payroll tax rate (6.2%). Federal agencies are required to contribute to the CSRDF the full cost of the FERS benefits that employees earn each year, minus the employee contribution. Thus, federal agencies contribute an amount equal to 16.0% of payroll to the CSRDF for FERS employees hired before 2013 (16.8 - 0.8 = 16.0). Under P.L. 112-96 , FERS employees first hired in 2013 contribute 3.1% of pay toward their FERS annuity. The cost for this category of FERS employees is equal to 14.2% of payroll (17.3 - 3.1 = 14.2). Under P.L. 113-67 , the normal cost of the basic annuity for FERS employees first hired after 2013 is 17.5%. These employees contribute 4.4%, while their employing agencies contribute 13.1% (17.5 - 4.4 = 13.1). (The additional amounts provided by the increased employee contributions [i.e., 4.4% vs. 3.1%] are applied toward reducing the CSRS unfunded liability until it is eliminated.) Therefore, FERS benefits are fully funded by employer and employee contributions and interest earnings with the exception of FERS benefits for employees first hired (or rehired with less than five years of FERS service) after December 31, 2013. On behalf of these employees, the employee and agency contributions amount to more than the full cost of the FERS benefit until the point at which OPM determines that there is no longer a CSRS unfunded liability. The CSRDF is a record of the budget authority available to pay retirement and disability benefits to federal employees. Each year, the trust fund is credited by the Treasury with contributions from current employees and their employing agencies, interest on the securities held by the fund, interest on previous service for which benefits have been accrued but for which budget authority has not yet been provided, and a transfer from the general revenues of the Treasury. Only a small part of the income to the fundâmainly contributions from employeesâis income to both the trust fund and to the government. The remainder of these transactions are intragovernmental transfers in which budget authority is transferred from federal agencies to the trust fund. Intragovernmental transfers have no effect on the size of the government's annual budget deficit or surplus. The CSRDF is similar to the Social Security trust fund in that, by law, 100% of its assets are invested in special-issue U.S. Treasury bonds or other bonds backed by the full faith and credit of the U.S. government. When the trust fund needs cash to pay retirement benefits, it redeems the bonds and the Treasury disburses an equivalent dollar value of payments to civil service annuitants. Because the bonds held by the trust fund are a claim on the U.S. Treasury, they ultimately are paid for by the taxpayers. According to the U.S. Office of Management and Budget (OMB), balances in the trust fund are available for future benefit payments and other trust fund expenditures, but only in a bookkeeping sense. The holdings of the trust funds are not assets of the Government as a whole that can be drawn down in the future to fund benefits. Instead, they are claims on the Treasury. From a cash perspective, when trust fund holdings are redeemed to authorize the payment of benefits, the Department of the Treasury finances the expenditure in the same way as any other Federal expenditureâby using current receipts or by borrowing from the public. The existence of large trust fund balances, therefore, does not, by itself, increase the Government's ability to pay benefits. Put differently, these trust fund balances are assets of the program agencies and corresponding liabilities of the Treasury, netting to zero for the Government as a whole. The CSRDF held a balance of $915.3 billion at the start of FY2019. (See Table 1 .) Obligations from the fund totaled $86.2 billion in FY2018, consisting mostly of annuity payments. Annuity payments totaled $85.6 billion in FY2018. Payments to the estates of decedents and refunds to separating employees accounted for another $421 million. The administrative expenses of the fund were $149 million, or about 0.17% of total obligations. In FY2018, an additional $2 million was transferred from the CSRDF to the Merit Systems Protection Board, which hears federal employee appeals (including federal retirement decisions). Each year, the CSRDF receives cash contributions and intragovernmental transfers. Cash contributions from required employee contributions, other employee deposits, and the District of Columbia amounted to $4.5 billion in FY2018. The largest payments into the CSRDF were contributions from federal agencies ($27.4 billion in FY2018) and the Postal Service ($3.5 billion in FY2018) on behalf of their employees, interest payments ($25.6 billion), and a payment from the general fund of the Treasury to make up for the insufficient funding of benefits accrued under CSRS ($42.9 billion in FY2018). In FY2018, there was also a $38 million payment into the CSRDF due to offsets from the re-employment of annuitants. These payments are intragovernmental transfers. The CSRDF receives Treasury bonds as a record of available budget authority. It redeems bonds periodically as annuity payments come due. Table 2 presents the annual income and expenditures of the CSRDF through FY2090, as estimated by OPM. Table 2 also shows the year-end balance of the trust fund and its estimated unfunded actuarial liability at the end of the year. The unfunded actuarial liability represents the difference between the present value of the fund's future benefit obligations and the present value of future credits to the fund plus the value of the securities it holds. The final two columns of the table show, respectively, the expenditures of the CSRDF relative to the government's total payroll expense for employee wages and salaries and CSRDF expenditures relative to the nation's annual gross domestic product (GDP). The estimates presented in Table 2 show the income to the CSRDF rising over the projection period from $103.5 billion in FY2017 to $151.0 billion in FY2025 and to $759.9 billion in FY2090. The total expenses of the fund are projected to rise more slowly, increasing from $85.8 billion in FY2018 to $104.9 billion in FY2025 and t o $506.6 billion in FY2090. Consequently, the assets held by the CSRDF also are projected to increase steadily from $947.8 billion in FY2018 to about $1.2 trillion in FY2025 and to $10.6 trillion in FY2090. According to actuarial projections, the unfunded liability of the CSRDF peaked in FY2017, when it was $968.1 billion. From that point onward, the unfunded liability has and is projected to steadily decline until it is projected to be eliminated by FY2085. In FY2018, expenditures from the CSRDF totaled $85.8 billion. The federal government's payroll expense for employees in FY2018 was approximately $213.0 billion (not presented in Table 2 ). Therefore, expenditures from the CSRDF were equal to about 40% of the amount paid as salaries and wages to federal employees. CSRDF expenditures are projected to decline relative to the government's wage and salary expenses, beginning around FY2025. By FY2090, the expenditures of the CSRDF are estimated to be equal to about 32% of the government's wage and salary payments to its employees. The decline in the ratio of CSRDF outlays to salary expense after FY2020 will occur mainly because future retirees will receive smaller pension benefits under FERS than they would have received under CSRS. The final column of Table 2 shows federal outlays for civil service pensions as a percentage of GDP. Relative to the total economic resources of the economy, the expenditures of the CSRDF are expected to remain roughly steady for the next 10 years before declining substantially from FY2020 to FY2090. Federal expenditures for civil service retirement annuities were estimated to equal 0.48% of GDP in FY2012, down from a high of 0.55% in FY1991 (not presented in Table 2 ). Between FY2013 and FY2020, the annual expenditures of the CSRDF are projected to remain in the range of 0.47% to 0.41% of GDP. From that point on, outlays from the CSRDF will fall steadily to about 0.13% of GDP by FY2090. CSRDF expenditures will fall relative to GDP mainly as a result of the decline in the proportion of civil service annuitants who are covered by CSRS and the increase in the number who are covered by FERS. The FERS basic annuity was designed to be smaller relative to high-three average pay than a CSRS annuity because FERS annuitants also receive benefits from Social Security and the Thrift Savings Plan. Because the transition from CSRS to FERS is mandated by law, the constant-dollar value of CSRDF outlays per annuitant will decline due to the different benefit formulas between CSRS and FERS. Consequently, outlays for civil service annuities are almost certain to decline relative to GDP, even if GDP grows more slowly than is assumed in the projections displayed in Table 2 . In FY2019, the total receipts of the CSRDF are estimated to be approximately $104.4 billion, and obligations from the fund are estimated to be about $88.4 billion. Only a small part of the revenues to the fund ($4.9 billion) in this year were cash receipts. The remainder will consist of budget authority transferred from other federal agencies. The cash receipts of the fund come primarily from the contributions of federal employees toward their future retirement benefits. Other cash income to the fund comes from payments made by the District of Columbia on behalf of its employees covered by CSRS or FERS. Cash payments into the CSRDF are income to both the U.S. government and to the trust fund. These cash receipts reduce the government's budget deficit. Benefit payments to retirees and survivors are cash outlays of the federal government. Most of the payments into the CSRDFâan estimated $124.8 billion in FY2018âare intragovernmental transfers. These transactions are income to the fund, but they are not income to the U.S. government. Intragovernmental transactions rarely involve cash. They do not affect the government's budget deficit or surplus because no money is received or spent by the government. Cash is rarely involved in intragovernmental transfers because individual government agencies, in general, have no cash to spend. What Congress appropriates to federal agencies each year is budget authority . Budget authority is legal permission for an agency to spend money from the accounts of the U.S. Treasury. The Treasury takes in money from the public by collecting taxes and by borrowing, and in most cases it is only the Treasury that disburses cash to the public. It has been suggested from time to time that the CSRDF should be taken \"off budget,\" as has already been done with the financing of Social Security benefits (but not Social Security administrative costs). Taking an account off budget means that its income and expenditures are not included in calculations of the government's annual budget surplus or deficit. Off-budget accounts are portrayed separately in the budget documents prepared by the Office of Management and Budget and the Congressional Budget Office (CBO). However, both OMB and CBO also publish unified budget accounts that include Social Security and other programs that are off budget. This is done because taking an account off budget does not end the activity or remove its effects from the U.S. economy. Whether Social Securityâor civil service retirementâis on-budget or off-budget, it still collects revenues from the public, pays benefits to the public, and affects the nation's financial markets by influencing the amount of private capital that is absorbed by government borrowing. Taking the CSRDF off-budget would not affect the government's revenues or outlays in the unified budget accounts, but it would affect the size of the budget deficit or surplus as portrayed in any budget documents that excluded the CSRDF. For example, employee contributions to CSRS and FERS that are now counted as revenue to the Treasury would not be treated as revenue if they were paid to an off-budget CSRDF. The money that federal agencies now send to the trust fund in the form of intragovernmental transfers would instead be recorded as outlays, and would therefore increase the government's reported budget deficit or reduce the budget surplus in the year that the transfer occurs rather than in the future when benefits are paid. The outlays made by the fund to pay civil service annuitants would not appear at all in the federal budget. The net effect of these changes if the CSRDF had been off-budget in FY2018 would have been an increase of about $17.6 billion in the government's reported budget deficit, even though the amount of money collected from the public and the amount of money paid to civil service annuitants would have been no different than under current law. One purpose of the federal budget is to show whether the government's revenues and outlays are in balance or out of balance. Therefore, taking any account off-budget distorts the picture of the government's fiscal condition. It is for this reason that financial analysts and economists focus almost exclusively on the unified budget totals when evaluating the effect of the federal budget on the nation's financial markets and the economy. If \"outlays\" were to include amounts not actually paid from the Treasury in the current year (as would be the case if the CSRDF were off-budget), then no revenue from the public would be needed in that year to pay for them. In years of budget deficits, some of the deficit would require borrowing from the public, and some of it would not. In years of modest budget surplus, there might appear to be a deficit because transfers to an off-budget account would be recorded as outlays, even though they do not involve payments from the Treasury to the public. For these reasons, taking the CSRDF off-budget might lead to greater confusion about the size of the real budget deficit or surplus, as has been the case with the off-budget status of Social Security. Actuaries use a concept called \"normal cost\" to estimate the amount of money that must be set aside each year from employer and employee contributions to pre-fund pension benefits. Normal cost is usually expressed as a percentage of payroll. There are two measures of normal cost: static and dynamic. Static normal cost is the amount, expressed as a percentage of payroll, that must be set aside each year to fund pension benefits based on current employee pay with no future pay raises, no future COLAs for retirees, and a fixed rate of interest. Dynamic normal cost is the amount, expressed as a percentage of payroll, that must be set aside each year to fully fund pension benefits for workers who will continue to accrue new benefits, including the effects of employee pay raises, post-retirement COLAs, and changes in the rate of interest. By law, the FERS basic retirement annuity and FERS supplement must be pre-funded according to its dynamic normal cost. Every year, OPM estimates the dynamic normal cost of FERS retirement annuities for employees entering the federal work force that year. For each group of new employees, OPM must estimate average job tenure, turnover, future salaries, age at retirement, rates of disability, death rates, the number of employees who will become annuitants, and how many will leave surviving dependents. OPM periodically re-estimates the dynamic normal cost of FERS to reflect anticipated changes in interest rates, inflation, and employee and retiree demographic characteristics. OPM has estimated the current normal cost of the FERS to be 16.8% of payroll for employees first hired before 2013, 17.3% for employees first hired in 2013, and 17.5% for employees first hired after 2013. Federal agencies are required to contribute to the CSRDF the full cost of the FERS benefits that employees earn each year, minus the employee contribution. Thus, federal agencies contribute an amount equal to 16.0% of payroll to the CSRDF for FERS employees hired before 2013 (16.8 - 0.8 = 16.0). UnderÂ  P.L. 112-96 , FERS employees first hired in 2013 contribute 3.1% of pay toward their FERS annuity. The cost for this category of FERS employees is equal to 14.2% of payroll (17.3 - 3.1 = 14.2). Under P.L. 113-67 , the normal cost of the basic annuity for FERS employees first hired after 2013 is 17.5%. These employees contribute 4.4%, while their employing agencies contribute 13.1% (17.5 - 4.4 = 13.1). If the assumptions underlying these cost estimates prove to be accurate, FERS will be \"fully funded.\" OPM has estimated the dynamic normal cost of CSRS, using the same economic assumptions used in FERS, at 29.3% of payroll. The financing of CSRS has at times been a topic of controversy, however, because it is not funded according to its dynamic normal cost. CSRS is funded through a combination of employee and agency contributions that together are equal to the static normal cost of CSRS, along with contributions from the general fund of the U.S. Treasury that make up some of the difference between the static normal cost of CSRS and its dynamic normal cost. At the time that Congress established the CSRS in 1920, it set up a trust fund from which benefits would be paid. From the beginning, however, CSRS was funded on a \"pay-as-you-go\" basis. The trust fund was used to pay benefits to already-retired workers, rather than to pre-fund the pension benefits of current workers. Initially, only employees made regular payroll contributions to the fund. Regularly scheduled agency contributions were not mandated until the 1950s. For many years, there were so few federal retirees that the fund was able to meet its financial obligations to beneficiaries from employee contributions alone. In 1956, Congress passed P.L. 84-854, which required federal agencies to make contributions to the Civil Service Retirement Trust Fund on behalf of their eligible employees. The contributions made by federal agencies were equal in amount to the money paid into the fund by their employees, and were made from appropriations that agencies received specifically for this purpose. Even with regular contributions from the employing agencies, however, the CSRS was still being funded on a pay-as-you-go basis. Contributions to the fund were sufficient to meet current benefit obligations but not to pre-fund the future retirement benefits of federal employees. As the federal civil service pension system matured (that is, as the ratio of annuitants to workers began to rise), it became necessary to establish a formal system of accounting for the pension obligations that had been incurred by the federal government but for which funds had not yet been set aside. In response to this need, Congress enacted P.L. 91-93 in 1969. This law set the employee contribution to CSRS at 7.0% of pay and required an equal amount to be contributed from funds appropriated to federal agencies. This amount (equal to 14.0% of payroll) represented the total contribution required to pay the costs of pension liabilities accrued by federal employees, using \"static\" assumptions: no future pay increases, no COLAs, and a 5.0% annual rate of return on the securities in the Civil Service Retirement and Disability Fund. Agency and employee contributions under CSRS have remained at the same percentage of payroll since 1969. P.L. 91-93 also requires three payments to be made annually from the general revenues of the U.S. Treasury into the CSRDF. These payments are the amount necessary to amortize (pay off with interest) over a 30-year period any increase in pension liability that results from pay increases (but not retiree COLAs) or from bringing newly covered groups of workers into the CSRS; the amount of the employer's share of the cost of benefits attributable to military service; and interest, fixed at a rate of 5%, on the estimated amount of the previously accrued liabilities of the CSRS for which contributions have not yet been made to the fund. Thus, while the static costs of the CSRS were shared equally between federal employees and their employing agencies, the Treasury was given responsibility for pension liabilities that are not part of the pension system's static normal costs. By including the 30-year amortized cost of pay raises in the annual transfer from the general fund, the Treasury assumed the additional pension expenses that result from pay raises. All costs of the CSRS that are not paid by employee and agency contributions or through the transfers to the CSRDF mandated by P.L. 91-93 ultimately will be paid from the general revenues of the Treasury. The costs of retiree COLAs, which also are not part of the static normal cost of the CSRS, are not included in the annual transfer from the Treasury to the CSRDF, and ultimately will be paid from the general fund of the Treasury. Because the full costs of CSRS are not met by the combined total of employee contributions, agency contributions, interest earnings, and the supplemental payments from the Treasury, some future CSRS benefits will of necessity be paid from contributions that were made to the CSRDF on behalf of employees who are enrolled in FERS. This will create an unfunded liability for FERS, which will be paid off through a new series of 30-year amortization payments from the general fund of the Treasury to the CSRDF. As stated by OPM: When the non-Postal CSRS account is depleted, projected to occur in 2022, the resulting transfers from the FERS account to the CSRS account create supplemental liabilities for the non-Postal FERS account. These supplement liabilities for non-Postal FERS must then be amortized by means of 30-year payments made by the Treasury. Current law specifies that funds that were paid into the CSRDF on behalf of employees covered by FERS will be used to pay the unfunded liability of CSRS. FERS will then be reimbursed by a series of payments with interest from the general fund of the Treasury to the CSRDF. Actuarial estimates indicate that the unfunded liability of the CSRS does not pose a threat to the solvency of the Civil Service Retirement and Disability Fund. In its current annual report, OPM has stated that \"total assets of the CSRDF ... including both CSRS and FERS are expected to continue to grow throughout the term of the projection under the existing statutory funding provisions.\" Nevertheless, the current method of funding the CSRS has in recent years been a source of debate for at least two reasons: (1) Because employee and government contributions do not account for the full actuarial cost of CSRS pension obligations as they accrue each year, the CSRS continues to accumulate additional unfunded liabilities. Consequently, some of the pension costs that are incurred each year will not be reflected in the government's budget until those benefits are paid at some time in the future. Some budget experts argue that these costs should be accounted for in each agency's budget as they accrue, just as is done in the FERS. (2) The supplemental payments to the trust fund that are required by the 1969 law come from the general revenues of the Treasury rather from the budgets of the various federal agencies where these costs are incurred. As a result, the amount of employee compensation for which agencies must account in their budgets each year understates the full costs of employment. Critics say that this contributes to an inefficient allocation of resources in the federal government by making labor costs appear lower than they really are. If agencies were required to fully fund the current and future costs of the CSRS through increased contributions, they could do so from their current-law appropriations or they could be granted additional budget authority for this purpose. The two approaches would have different effects on the federal budget. For agencies to be held harmless for the increased contributions, they would have to receive additional appropriations to their salary and expense accounts. Because agencies would transfer the appropriated funds to the CSRDF, which would in turn use them to purchase Treasury bonds, no additional outlays would occur as a result of these appropriations, and they would not affect the federal budget deficit or surplus. The outlays would occur in the future when retired employees collect their CSRS annuities, just as under current law. An alternative means of fully financing the normal cost of the CSRS would be to require agencies to increase their contributions to the CSRDF without receiving any additional appropriations to their salary and expense accounts. Pre-funding the full costs of the CSRS in this way would reduce the federal budget deficit, because the outlays of each agency would have to be cut by the amount of its additional transfers to the CSRDF. Outlays to CSRS annuitants would still occur in the future just as under current law. However, these future outlays would be offset by a reduction in current outlays so that the future payments to CSRS annuitants could be fully pre-funded. The reduction in resources available for current spending, however, would force federal agencies to cut spending elsewhere in their budgets. Paying the full normal cost of CSRS through employee and agency contributions would prevent the system from accruing additional unfunded liabilities, but it would not reduce the previously accumulated liability of the CSRS. Under current law, this liability will be paid off eventually through a series of 30-year amortization payments from the general fund of the Treasury to the CSRDF. Some observers favor starting these amortization payments sooner. They note that private-sector employers are required by ERISA to begin paying down accumulated liabilities when they occur. Others advocate paying down the liability now as a way to forestall proposals calling for reduced pension benefits or increased employee contributions in the future. Proposals to pre-fund CSRS in the same manner as required under FERS have grappled with the question of whether additional budget authority should be granted to federal agencies, or whether agencies should make higher contributions from their current budget authority. Many policymakers believe that greater pre-funding of CSRS retirement annuities would lead to improved accounting of personnel costs among federal agencies. However, CSRS has been closed to new enrollment since 1984, and the percentage of federal employees enrolled in CSRS is declining rapidly as these workers retire. At the beginning of FY2018, about 4% of federal employees, including Postal employees, were enrolled in CSRS. With the proportion of federal employees enrolled in CSRS declining each year, the budgetary treatment of government contributions toward their retirement annuities is becoming a less pressing issue. Some observers have suggested that investing the CSRDF entirely in U.S. Treasury bonds does not represent true \"pre-funding\" of CSRS and FERS annuities because these bonds are merely a claim held by the government against its own future revenues. They suggest that at least part of the trust fund's assets should be invested in private-sector stocks and bonds where they could earn a higher rate of return than is available from U.S. Treasury securities (albeit at greater risk). In addition to issues of investment risk, however, this proposal would raise questions about how purchases of private-sector assets would be scored under current budget rules, and also whether it would be appropriate for federal trust funds to own the stocks and bonds of private-sector companies.", "summary": "Most of the civilian federal workforce is covered by one of two retirement systems: (1) the Civil Service Retirement System (CSRS) for individuals hired before 1984 or (2) the Federal Employees' Retirement System (FERS) for individuals hired in 1984 or later. FERS annuities are fully funded by the sum of employee and employer contributions and interest earned by the Treasury bonds held by the Civil Service Retirement and Disability Fund (CSRDF). The federal government makes supplemental payments into the CSRDF on behalf of employees covered by the CSRS because employee and agency contributions and interest earnings do not meet the full cost of the benefits earned by employees covered by that system. The Office of Management and Budget (OMB), in its FY2020 Budget, estimated that in FY2019, obligations from the CSRDF would total $88.4 billion, of which $87.9 billion will represent annuity payments to retirees and survivors. Other outlays consist of refunds, payments to estates, and administrative expenses. Obligations from the fund are projected to increase by 3.7% to $91.7 billion in FY2020, of which $91.3 billion will represent annuity payments. OPM estimated that receipts to the CSRDF from all sources would be $104.4 billion in FY2019 and $108.8 billion in FY2020. The year-end balance of the CSRDF was projected to increase from $915.3 billion at the end of FY2018 to $931.4 billion at the end of FY2019. According to the most recent reporting from the Office of Personnel Management, the total annual income of the CSRDF will increase from $124.9 billion in FY2018 to an estimated $151.0 billion in FY2025 and to $759.9 billion in FY2090. The total expenses of the fund are projected to rise more slowly, increasing from $85.8 billion in FY2018 to an estimated $104.9 billion in FY2025 and to $506.6 billion in FY2090. Consequently, the assets held by the CSRDF also are projected to increase steadily, rising from $947.8 billion in FY2018 to an estimated $1.2 trillion in FY2025 and $10.6 trillion in FY2090. Expenditures from the CSRDF currently are about 40% as large as federal expenditures for the salaries and wages paid to federal employees. Pension expenditures are projected to decline relative to the government's wage and salary expenses, beginning around FY2020. By FY2090, the expenditures of the CSRDF are estimated to be only about 32% as large as the government's expenditures for wage and salary payments to employees. Because CSRS retirement benefits have never been fully funded by employer and employee contributions, the CSRDF has an unfunded liability. The total unfunded liability of the CSRDF was $968.1 billion in FY2017. According to actuarial estimates, the unfunded liability of the CSRDF has already peaked, will steadily decline, and is projected to be eliminated by FY2085. Actuarial estimates indicate that the unfunded liability of the CSRS does not pose a threat to the solvency of the trust fund. There is no point over the next 80 years at which the assets of the Civil Service Retirement and Disability Fund are projected to run out.", "document_type": "crs"}
{"report": "As the fifth-largest country and the ninth-largest economy in the world, Brazil plays an important role in global governance (see Figure 1 for a map of Brazil). Over the past 20 years, Brazil has forged coalitions with other large, developing countries to push for changes to multilateral institutions and to ensure that global agreements on issues ranging from trade to climate change adequately protect their interests. Brazil also has taken on a greater role in promoting peace and stability, contributing to U.N. peacekeeping missions and mediating conflicts in South America and further afield. Although recent domestic challenges have led Brazil to turn inward and weakened its appeal globally, the country continues to exert considerable influence on international policy issues that affect the United States. U.S. policymakers have often viewed Brazil as a natural partner in regional and global affairs, given its status as a fellow multicultural democracy. Repeated efforts to forge a close partnership have left both countries frustrated, however, as their occasionally divergent interests and policy approaches have inhibited cooperation. The Trump Administration has viewed the 2018 election of Brazilian President Jair Bolsonaro as a fresh opportunity to deepen the bilateral relationship. Bolsonaro has begun to shift Brazil's foreign policy to bring the country into closer alignment with the United States, and President Trump has designated Brazil a m ajor n on-NATO a lly . Nevertheless, ongoing differences over trade protections and relations with China threaten to leave both the United States and Brazil with unmet expectations once again. The 116 th Congress has expressed renewed interest in Brazil, recognizing Brazil's potential to affect U.S. initiatives and interests. Some Members view Brazil as a strategic partner for addressing regional and global challenges. They have urged the Trump Administration to forge stronger economic, security, and military ties with Brazil to bolster the bilateral relationship and counter the influence of extra-hemispheric powers, such as China and Russia. Other Members have expressed reservations about a close partnership with the Bolsonaro Administration. They are concerned that Bolsonaro is presiding over an erosion of democracy and human rights in Brazil and that his environmental policies threaten the Amazon and global efforts to mitigate climate change. Congress may continue to assess these differing approaches to U.S.-Brazilian relations as it carries out its oversight responsibilities and considers FY2021 appropriations and other legislative initiatives. Brazil declared independence from Portugal in 1822, initially establishing a constitutional monarchy and retaining a slave-based, plantation economy. Although the country abolished slavery in 1888 and became a republic in 1889, economic and political power remained concentrated in the hands of large rural landowners and the vast majority of Brazilians remained outside the political system. The authoritarian government of GetÃºlio Vargas (1930-1945) began the incorporation of the working classes but exerted strict control over labor as part of its broader push to centralize power in the federal government. Vargas also began to implement a state-led development model, which endured for much of the 20 th century as successive governments supported the expansion of Brazilian industry. Brazil experienced two decades of multiparty democracy from 1945 to 1964 but struggled with political and economic instability, which ultimately led the military to seize power. A 1964 military coup, encouraged and welcomed by the United States, ushered in two decades of authoritarian rule. Although repressive, the military government was not as brutal as the dictatorships established in several other South American nations. It nominally allowed the judiciary and congress to function during its tenure but stifled representative democracy and civic action, carefully preserving its influence during one of the most protracted transitions to democracy to occur in Latin America. Brazilian security forces killed more than 8,000 indigenous people and at least 434 political dissidents during the dictatorship, and they detained and tortured an estimated 30,000-50,000 others. Brazil restored civilian rule in 1985, and a national constituent assembly, elected in 1986, promulgated a new constitution in 1988. The constitution established a liberal democracy with a strong president, a bicameral congress consisting of the 513-member chamber of deputies and the 81-member senate, and an independent judiciary. Power is somewhat decentralized under the country's federal structure, which includes 26 states, a federal district, and some 5,570 municipalities. Brazil experienced economic recession and political uncertainty during the first decade after its political transition. Numerous efforts to control runaway inflation failed, and two elected presidents did not complete their terms; one died before taking office, and the other was impeached on corruption charges and resigned. The situation began to stabilize, however, under President Fernando Henrique Cardoso (1995-2002) of the center-right Brazilian Social Democracy Party ( Partido da Social Democracia Brasileira , or PSDB). Initially elected on the success of the anti-inflation Real Plan that he implemented as finance minister under President Itamar Franco (1992-1994), Cardoso ushered in a series of market-oriented economic reforms. His administration privatized some state-owned enterprises, gradually opened the economy to foreign trade and investment, and adopted the three main pillars of Brazil's macroeconomic policy: a floating exchange rate, a primary budget surplus, and an inflation-targeting monetary policy. Nevertheless, the Brazilian state maintained an influential role in the economy. The Cardoso Administration's economic reforms and a surge in international demand (particularly from China) for Brazilian commoditiesâsuch as oil, iron, and soybeansâfostered a period of strong economic growth in Brazil during the first decade of the 21 st century. The center-left Workers' Party ( Partido dos Trabalhadores , or PT) administration of President Luiz InÃ¡cio Lula da Silva (Lula, 2003-2010) used increased export revenues to improve social inclusion and reduce inequality. Among other measures, the PT-led government expanded social welfare programs and raised the minimum wage by 64% above inflation. Between 2003 and 2010, the Brazilian economy expanded by an average of 4.1% per year and the poverty rate fell from 28.2% to 13.6%. The growth of the middle class fueled a domestic consumption boom that reinforced Brazil's economic expansion. Although the poverty rate initially continued to decline under the PT-led administration of President Dilma Rousseff (2011-2016)âreaching a low of 8.4% in 2014âsocioeconomic conditions deteriorated during Rousseff's final two years in office. After nearly two decades of relative stability, Brazil has struggled with a series of crises since 2014. The country fell into a deep recession in late 2014, due to a decline in global commodity prices and the Rousseff Administration's economic mismanagement. Brazil's real gross domestic product (GDP) contracted by 8.2% over the course of 2015 and 2016. Although Brazil emerged from recession in mid-2017, recovery has been slow. The economy expanded by just over 1% in 2017 and 2018, and unemployment, which peaked at 13.7% in the first quarter of 2017, has remained above 10% for nearly four years. Largely due to the weak labor market, the real incomes of the bottom half of Brazilian workers have declined by 17% since the onset of the recession, pushing more than 6 million people into poverty. The downturn has disproportionately affected Afro-Brazilians, who comprise about half of the Brazilian population but 64% of the unemployed. Large fiscal deficits at all levels of government have exacerbated the situation, limiting the resources available to provide social services. The deep recession also has hindered federal, state, and local government efforts to address serious challenges such as crime and violence. A record-high 64,000 Brazilians were killed in 2017, and the country's homicide rate of 30.9 per 100,000 residents was more than five times the global average. Although homicides declined by nearly 11% in 2018, feminicide (gender-motivated murders of women) and reports of sexual violence increased. The deterioration in the security situation, like the economic crisis, has disproportionately affected Afro-Brazilians, who account for more than 75% of homicide victims, 75% of those killed by police, and 61% of feminicide victims. A series of corruption scandals have further discredited the country's political establishment. The so-called Car Wash ( Lava Jato ) investigation, launched in 2014, has implicated politicians from across the political spectrum and many prominent business executives. The initial investigation revealed that political appointees at the state-controlled oil company, PetrÃ³leo Bra s ileiro S.A. (Petrobras), colluded with construction firms to fix contract bidding processes. The firms then provided kickbacks to Petrobras officials and politicians in the ruling coalition. Parallel investigations have discovered similar practices throughout the public sector, with businesses providing bribes and illegal campaign donations in exchange for contracts or other favorable government treatment. The scandals sapped President Rousseff's political support, contributing to her controversial impeachment and removal from office in August 2016. Michael Temer, who presided over a center-right government for the remainder of Rousseff's term (2016-2018), was entangled in several corruption scandals but managed to hold on to power. Several other high-level politicians, including former President Lula, have been convicted and face potentially lengthy prison sentences (see the text box, below). The inability of Brazil's political leadership to overcome these crises has undermined Brazilians' confidence in their democratic institutions. As of mid-2018, 33% of Brazilians expressed trust in the judiciary, 26% expressed trust in the election system, 12% expressed trust in congress, 7% expressed trust in the federal government, and 6% expressed trust in political parties. Moreover, only 9% of Brazilians expressed satisfaction with the way democracy was working in their countryâthe lowest percentage in all of Latin America. Brazilian voters registered their intense dissatisfaction with the situation in the country in the 2018 elections. In addition to ousting 75% of incumbents running for reelection to the senate and 43% of incumbents running for reelection to the chamber of deputies, they elected as president, Jair Bolsonaro, a far-right congressman and retired army captain. Prior to the election, most observers considered Bolsonaro to be a fringe figure in the Brazilian congress. He exercised little influence over policy and was best known for his controversial remarks defending the country's military dictatorship (1964-1985) and expressing prejudice toward marginalized sectors of Brazilian society . Backed by the small Social Liberal Party (PSL), Bolsonaro also lacked the finances and party machinery of his principal competitors. Nevertheless, his social media-driven campaign and populist, law-and-order message attracted a strong base of support. He outflanked his opponents by exploiting anti-PT and antiestablishment sentiment and aligning himself with the few institutions that Brazilians still generally trust: the military and the churches. Bolsonaro largely remained off the campaign trail in the weeks leading up to the election after being stabbed in an assassination attempt, but he easily defeated the PT's Fernando Haddad 55%-45% in a second-round runoff. Bolsonaro's PSL also won the second-most seats in the lower house. Since Bolsonaro began his four-year term on January 1, 2019, he has struggled to advance portions of his agenda due to cabinet infighting and the lack of a working majority in Brazil's fragmented congress, which includes 24 political parties. Whereas previous Brazilian presidents stitched together governing coalitions by distributing control of government jobs and resources to parties in exchange for their support, Bolsonaro has refused to enter into such arrangements. Moreover, he generally has avoided negotiating the details of his proposed policies with legislators. Instead, Bolsonaro has sought to keep his political base mobilized by frequently taking socially conservative stands on cultural issues and verbally attacking perceived enemies, such as the press, nongovernmental organizations (NGOs), and other branches of government. Bolsonaro's confrontational approach to governance has alienated many of his potential allies within the conservative-leaning congress. In November 2019, for example, Bolsonaro abandoned the PSL after a series of disagreements with the party's leadership; he intends to create a new Alliance for Brazil party to contest future elections. During its first year in office, the Bolsonaro Administration began implementing key aspects of its market-oriented ec onomic agenda. As part of a far-reaching privatization program, the Brazilian government began selling off assets, including subsidiaries of state-owned enterprises, stakes in private companies, and infrastructure and energy concessions, yielding revenues of approximately $66 billion in 2019. The Brazilian congress also enacted a major pension reform expected to reduce government expenditures by at least $194 billion over the next decade. Those policies build on a 2016 constitutional amendment that froze inflation-adjusted government spending for 20 years. Although the Bolsonaro Administration has proposed additional measures to simplify the tax system, cut and decentralize government expenditures, and decrease compensation and job security for government employees, political parties may be reluctant to enact austerity measures in the lead-up to Brazil's October 2020 municipal elections. The International Monetary Fund estimates that the Brazilian economy expanded by 1.2% in 2019 and will expand by 2.2% in 2020, due to improved business sentiment following recent market-oriented policy changes. About 11% of Brazilians remain unemployed, however, and some economists argue that rather than reducing the size of the state, Brazil should reorient expenditures to programs that protect the most vulnerable and to productivity-enhancing investments, such as education, training, and infrastructure. Bolsonaro has had difficulty advancing the hard-line security platform that was the centerpiece of his campaign. The Brazilian congress has blocked Bolsonaro's proposal to shield from prosecution police who kill suspected criminals and has pushed back against Bolsonaro's decrees loosening gun controls. Other Bolsonaro Administration proposals, including measures to modernize police investigations and impose stricter criminal sentences, were enacted in December 2019. Preliminary data suggest that security conditions in Brazil improved in 2019, but the number of individuals killed by police in states such as Rio de Janeiro increased significantly. The Bolsonaro Administration has claimed credit for falling crime rates, but some security analysts argue the situation has been improving since late 2017 due to state and municipal initiatives and reduced conflict between the country's largest criminal groups. (See the \" Counternarcotics \" section for more information.) Anti-corruption efforts in Brazil have experienced a series of recent setbacks. Although President Bolsonaro campaigned on an anti-corruption platform, he has repeatedly interfered in law enforcement agencies, potentially hindering investigations and calling into question the political independence of Brazilian institutions. In August 2019, he dismissed the head of the Brazilian federal police office in Rio de Janeiro, which is investigating potential corruption and money laundering by Bolsonaro's son, FlÃ¡vio. In September 2019, Bolsonaro disregarded a norm in place since 2003 of selecting an attorney general from a shortlist approved by the public prosecutors' association. Observers also have questioned changes Bolsonaro has made to Brazil's tax collection agency, financial intelligence unit, and antitrust regulator. At the same time, the Brazilian congress has been reluctant to adopt anti-corruption reforms and the supreme court has issued a series of rulings that could jeopardize convictions obtained in the Car Wash investigation and make it more difficult to investigate and prosecute corruption cases. Many analysts argue there has been an erosion of democracy in Brazil under Bolsonaro. During his first year in office, the president continued to celebrate Brazil's military dictatorship and those installed in other South American countries, and his sons and members of his administration occasionally suggested they could impose authoritarian measures under certain circumstances. Bolsonaro also took steps to weaken the press, exert control over civil society, and roll back rights previously granted to marginalized groups. Civil-military relations have shifted as Bolsonaro has appointed retired and active-duty officers to lead more than a third of his cabinet ministries and to dozens of other positions throughout the government. The Brazilian military is now more involved in politics than it has been at any time since the end of the dictatorship. Some analysts maintain, however, that the military has had a moderating influence on the government. Brazil's civil society, congress, and judiciary also have served as checks on Bolsonaro. Nevertheless, human rights advocates argue the president's statements and actions have fueled attacks against journalists and activists. Polls conducted at the conclusion of his first year in office suggest Brazilian public opinion toward Bolsonaro remains divided. About 32% of Brazilians consider Bolsonaro's government \"good\" or \"great,\" 32% consider it \"average,\" and 35% consider it \"bad\" or \"terrible.\" A 30% increase in fires in the Brazilian Amazon in 2019 compared to the previous year led many Brazilians and international observers to express concern about the rainforest and the extent to which its destruction is contributing to regional and global climate change. Covering nearly 2.7 million square miles across seven countries, the Amazon Basin is home to the largest and most biodiverse tropical forest in the world. Scientific studies have found that the Amazon plays an important role in the global carbon cycle by absorbing and sequestering carbon. Although findings vary, one recent study estimated the forest absorbs 560 million tons of carbon dioxide per year and its biomass holds 76 billion tons of carbonâan amount equivalent to seven years of global carbon emissions. The Amazon also pumps water into the atmosphere, affecting regional rainfall patterns throughout South America. An estimated 17% of the Amazon basin has been deforested, however, and some scientists have warned that the forest may be nearing a tipping point at which it is no longer able to sustain itself and transitions to a drier, savanna-like ecosystem. Efforts to conserve the forest often focus on Brazil, since the country encompasses about 69% of the Amazon Basin. Within Brazil, the government has established an administrative zone known as the Legal Amazon, which includes nine states: Acre, AmapÃ¡, Amazonas, MaranhÃ£o, Mato Grosso, ParÃ¡, RondÃ´nia, Roraima, and Tocantins (see Figure 1 ). Although rainforest covers most of the Legal Amazon, savanna ( Cerrado ) and wetlands ( Pantanal ) are present in portions of the region. The Legal Amazon was largely undeveloped until the 1960s, when the military-led government began subsidizing the settlement and development of the region as a matter of national security. Partially due to those incentives, the human population in the Legal Amazon grew from 6 million in 1960 to 25 million in 2010. Forest cover in the Legal Amazon has declined by approximately 20% as settlements, roads, logging, ranching, farming, and other activities have proliferated in the region. In 2004, the Brazilian government adopted an action plan to prevent and control deforestation in the Legal Amazon. It increased surveillance in the Amazon region, began to enforce environmental laws and regulations more rigorously, and took steps to consolidate and expand protected lands. Nearly 20% of the Brazilian Amazon now has some sort of federal or state protected status, and the Brazilian government has recognized an additional 22% of the Brazilian Amazon as indigenous territories. Brazil's forest code also requires private landowners in the Legal Amazon to maintain native vegetation on 80% of their properties. Other Brazilian initiatives have sought to support sustainable development in the Amazon while limiting the extent to which the country's agricultural sector drives deforestation. In 2008, the Brazilian government began conditioning credit on farmers' compliance with environmental laws; in 2009, the government banned new sugarcane plantations in the Legal Amazon. The Brazilian government also supported private sector conservation initiatives. Those included a 2006 voluntary agreement among most major soybean traders not to purchase soybeans grown on lands deforested after 2006 (later revised to 2008) and a 2009 voluntary agreement among meatpackers not to purchase cattle raised on lands deforested in the Amazon after 2008. Brazil's public and private conservation efforts, combined with economic factors that made agricultural commodity exports less profitable, led to an 83% decline in deforestation in the Legal Amazon between 2004 and 2012. Deforestation has been trending upward in recent years, however, rising from a low of 1,765 square miles in 2012 to 3,769 square miles in the 12-month monitoring period that ended in July 2019 (see Figure 2 ). Analysts have linked the increase in deforestation to a series of policy reversals that have cut funding for environmental enforcement, reduced the size of protected areas, and relaxed conservation requirements. Market incentives, such as the growth in Chinese imports of Brazilian beef and soybeans, also have contributed to recent deforestation trends. For example, China purchased nearly 76% of its soybean imports from Brazil in 2018, up from roughly 50% in prior years, after imposing a retaliatory tariff on U.S. soybeans. Although changes that weakened Brazil's environmental policies began under President Rousseff and continued under President Temer, some analysts argue that the Bolsonaro Administration's approach to the Amazon has led to further increases in deforestation. Bolsonaro has fiercely defended Brazil's sovereignty over the Legal Amazon and its right to develop the region. Since taking office, his administration has lifted the ban on new sugarcane plantations in the Legal Amazon and called for an end to the soy moratorium. It also has proposed measures to allow commercial agriculture, mining, and hydroelectric projects in indigenous territories, arguing that such economic activities will benefit those living in the region and reduce incentives for illegal deforestation. At the same time, Bolsonaro has questioned the Brazilian government's deforestation data and repeatedly criticized the agencies responsible for enforcing environmental laws. Those statements and actions reportedly have emboldened some loggers, miners, and ranchers, contributing to the surge in fires in 2019 and a 30% increase in deforestation in the annual monitoring period that included the first seven months of Bolsonaro's term. Bolsonaro initially dismissed environmental concerns about the Amazon, asserting that deforestation and burning are cultural practices that will never end. In January 2020, however, he announced the creation of a new security force to protect the environment and a new Amazon Council, headed by Vice President Hamilton MourÃ£o, to coordinate conservation and sustainable development efforts. As of the close of 2019, a majority (54%) of Brazilians disapproved of Bolsonaro's environmental policies. The rising levels of Amazon deforestation call into question whether Brazil will meet its Paris Agreement commitment to reduce greenhouse gas emissions by 37% below 2005 levels (to 1.3 gigatonnes of carbon dioxide equivalent (GtCOâe) by 2025. According to a 2018 assessment by the U.N. Environment Program, Brazil's greenhouse gas emissions declined by 12% per year from 2006 to 2016, as significant declines in deforestation offset slight increases in emissions from other sources. Those reductions had put Brazil on track to meet its Paris Agreement commitment, but emissions have begun to rise again due to increased deforestation. In 2018, Brazil's greenhouse gas emissions increased by an estimated 0.3% (to 1.9 GtCOâe), even as emissions from the energy sector declined by nearly 5%. President Bolsonaro had pledged to withdraw from the Paris Agreement during his 2018 election campaign, but he reversed course following his inauguration, stating that Brazil would remain in the agreement \"for now.\" At the 25 th Conference of Parties to the U.N. Framework Convention on Climate Change (COP 25), Brazil pushed developed countries to meet their 2009 goal to mobilize $100 billion from public and private sources, annually, by 2020, to help developing countries mitigate and adapt to climate change. Brazil's environmental minister has asserted that Brazil should receive at least 10% of those funds. Brazil also insisted that carbon credits developed under the 1997 Kyoto Protocol should carry over into the Paris Agreement's new international carbon markets and that countries that host emissions-cutting projects should not have to report the transfers of those credits to other countries. Many other negotiators expressed concern that Brazil's proposals could allow poorly validated credits from the Kyoto mechanisms to undermine the new Paris Agreement markets, as well as risk double-counting the credits both internationally and toward the host countries' domestic mitigation goals. Those disagreements reportedly impeded efforts to finalize rules for new carbon markets under the Paris Agreement. Even as the Brazilian government has called for greater international financial support, it has deprioritized domestic efforts to combat climate change. During Bolsonaro's first year in office, his administration closed the climate change departments within the environment and foreign ministries and cut funding for the implementation of Brazil's National Plan on Climate Change by 95%. Moreover, the Bolsonaro Administration lost one of Brazil's primary sources of international assistance when it unilaterally restructured the governance of the Amazon Fundâa mechanism launched in 2008 to attract funding for conservation and sustainable development efforts. In response, the governments of Norway and Germany, which have donated nearly $1.3 billion to the fund since 2009, suspended their contributions in August 2019. State governments in the Legal Amazon have sought to negotiate directly with Norway and Germany to restore the funding. The United States and Brazil historically have enjoyed robust political and economic relations, but the countries' divergent perceptions of their national interests have inhibited the development of a close partnership. Those perceptions have changed somewhat under President Bolsonaro. Whereas the past several Brazilian administrations sought to maintain autonomy in foreign affairs, Bolsonaro has called for close alignment with the United States. Within Latin America, for example, the Bolsonaro Administration has adopted a more confrontational approach toward Cuba and has closely coordinated with the Trump Administration on measures to address the crisis in Venezuela. The Bolsonaro Administration also has expressed support for controversial U.S. actions outside the region, such as the killing of Iranian military commander Qaasem Soleimani. Bolsonaro's realignment of Brazilian foreign policy has been controversial domestically, with some analysts arguing it has not resulted in many concrete benefits for Brazil. They note, for example, that the Trump Administration maintainedâand threatened to imposeâtrade barriers on key Brazilian exports, such as beef and steel, despite having signed several bilateral commercial agreements during Bolsonaro's official visit to the White House in March 2019 (see \" Recent Trade Negotiations \"). Likewise, U.S. officials reportedly have warned Brazil that the closer defense ties implied by President Trump's designation of Brazil as a major non-NATO ally could be in jeopardy if Brazil allows Chinese telecommunications company Huawei to participate in Brazil's 5G cellular network (see the \" Defense Cooperation \" section). Some Brazilian analysts also argue that abandoning the country's commitment to autonomy in foreign affairs has weakened Brazil's international standing and caused tensions in its relations with other important partners, such as fellow members of the BRICS (Brazil, Russia, India, China, and South Africa) group. There does not appear to be public support for the Trump Administration's foreign policy within Brazil; in 2019, 60% of Brazilians expressed no confidence in President Trump to \"do the right thing regarding world affairs.\" In some cases, domestic opposition has prevented Bolsonaro from aligning Brazilian foreign policy more closely with the United States. For example, during his 2018 presidential campaign, Bolsonaro indicated he would follow President Trump's lead in withdrawing from the Paris Agreement on climate change and taking a more confrontational approach toward Chinese trade and investment. He has backed away from those positions since taking office, reportedly due to concerns about losing access to foreign markets, particularly within the powerful agribusiness sector, which accounts for 21% of Brazil's GDP and is a major component of Bolsonaro's political base. Although some Members of the 116 th Congress have urged the Trump Administration to seize on Bolsonaro's goodwill to develop a strategic partnership with Brazil, others have expressed reservations about the current Brazilian administration. They are concerned about Bolsonaro's commitment to democracy, human rights, and the rule of law, as well as about changes to Brazil's environmental policies that appear to have contributed to fires and deforestation in the Brazilian Amazon (see \" U.S. Support for Amazon Conservation \"). Trade policy often has been a contentious issue in U.S.-Brazilian relations. Since the early 1990s, Brazil's trade policy has prioritized integration with its South American neighbors through the Southern Common Market ( Mercosur ) and multilateral negotiations at the World Trade Organization (WTO). Brazil is the industrial hub of Mercosur, which it established in 1991 with Argentina, Paraguay, and Uruguay. Although the bloc was intended to advance incrementally toward full economic integration, only a limited customs union has been achieved thus far. Mercosur also has evolved into a somewhat protectionist arrangement, shielding its members from external competition rather than serving as a platform for insertion into the global economy, as originally envisioned. Within the WTO, Brazil traditionally has joined with other developing nations to push the United States and other developed countries to reduce their agricultural tariffs and subsidies while resisting developed countries' calls for increased access to developing countries' industrial and services sectors. Those differences blocked conclusion of the most recent round of multilateral trade negotiations (the WTO's Doha Round), as well as U.S. efforts in the 1990s and 2000s to establish a hemisphere-wide Free Trade Area of the Americas. The Bolsonaro and Trump Administrations have negotiated several agreements intended to strengthen the bilateral commercial relationship. During Bolsonaro's March 2019 official visit to Washington, the United States and Brazil agreed to take steps toward lowering trade barriers for certain agricultural products. Brazil agreed to adopt a tariff rate quotaâimplemented in November 2019âto allow the importation of 750,000 tons of U.S. wheat annually without tariffs. Brazil also agreed to adopt \"science-based conditions\" that could enable imports of U.S. pork. In exchange, the United States agreed to send a U.S. Department of Agriculture Food Safety and Inspection Service (FSIS) team to Brazil to audit the country's raw beef inspection system. The United States had suspended imports of raw beef from Brazil in June 2017, after Brazilian investigators discovered that some of the country's top meat processing companies, including JBS and BRF, had bribed food inspectors to approve the sale of tainted products. FSIS began inspecting all meat products arriving from Brazil and refused entry to 11% of Brazilian fresh beef products in the months leading up to the suspension. The Bolsonaro Administration had hoped an FSIS audit would quickly reopen the U.S. market to Brazilian beef and expressed frustration that U.S. import restrictions remained in place through the end of 2019. On February 21, 2020, however, the Trump Administration reportedly lifted the suspension after determining that \"Brazil's food safety inspection system governing raw intact beef is equivalent to that of the [United States].\" Some consumer advocates, industry groups, and Members of Congress remained concerned about Brazilian meat. A bill introduced in April 2019 ( S. 1124 , Tester) would suspend all beef and poultry imports from Brazil while a working group evaluates the extent to which those imports pose a threat to food safety. The United States and Brazil announced several other agreements during Bolsonaro's March 2019 official visit. A technology safeguards agreement, which the Brazilian congress ratified in November 2019, will enable the launch of U.S.-licensed satellites from AlcÃ¢ntara space center in Brazil's northeastern state of MaranhÃ£o. The United States also endorsed Brazil's accession to the Organisation for Economic Co-operation and Development in exchange for Brazil agreeing to gradually give up its \"special and differential treatment\" status, which grants special rights to developing nations at the WTO. Building on those measures, U.S. and Brazilian officials reportedly have begun discussing a more comprehensive trade agreement. Barring changes to Mercosur's rules, any agreement to reduce tariffs would need to be negotiated with the broader bloc. In 2019, Mercosur signed free trade agreements with the European Union and the European Free Trade Association. Those agreements have yet to be ratified, however, and the recent political shift in Argentina could make the negotiation of new agreements more difficult. It is not clear that the Bolsonaro and Trump Administrations would be willing to expose their domestic producers to increased foreign competition. Industry associations in Brazil reportedly have been lobbying the Bolsonaro Administration to focus on reducing costs for domestic business before pursuing trade liberalization. U.S. businesses also have sought protections, and President Trump has occasionally threatened to impose tariffs on Brazilian products (see the text box, below). U.S.-Brazilian trade has increased significantly over the past two decades but has suffered from economic volatility, such as the 2007-2008 global financial crisis and Brazil's 2014-2017 recession (see Figure 3 ). In 2019, total bilateral merchandise trade amounted to $73.9 billion. U.S. goods exports to Brazil totaled $43.1 billion, and U.S. goods imports from Brazil totaled $30.9 billion, giving the United States a $12.2 billion trade surplus. The top U.S. exports to Brazil were mineral fuels, aircraft, machinery, and organic chemicals. The top U.S. imports from Brazil included mineral fuels, iron and steel, aircraft, machinery, and wood and wood pulp. In 2019, Brazil was the 14 th -largest trading partner of the United States. The United States was Brazil's second-largest trading partner, accounting for 14.8% of Brazil's total merchandise trade, compared to 24.4% for China. Brazil benefits from the Generalized System of Preferences program, which provides nonreciprocal, duty-free tariff treatment to certain products imported from designated developing countries. Brazil was the fourth-largest beneficiary of the program in 2019, with duty-free imports to the United States valued at $2.3 billionâequivalent to 7.4% of all U.S. merchandise imports from Brazil. U.S.-Brazilian services trade is also significant. In 2018 (the most recent year for which data are available), total bilateral services trade amounted to $34.4 billion. U.S. services exports to Brazil totaled $28.2 billion, and U.S. services imports from Brazil totaled $6.1 billion, giving the United States a $22.1 billion surplus. Travel, transport, and telecommunications were the top categories of U.S. services exports to Brazil, and business services was the top category of U.S. imports from Brazil. In 2018, more than 2.2 million Brazilians visited the United States, spending $11.5 billion on travel and tourism. Brazil began exempting U.S. citizens from the country's tourist and business visa requirements in June 2019, which could increase U.S. travel to Brazil in the coming years. U.S. foreign direct investment (FDI) in Brazil has increased by more than 60% since 2008. As of 2018 (the most recent year for which data are available), the accumulated stock of U.S. FDI in Brazil was $70.9 billion, with significant investments in manufacturing, finance, and mining, among other sectors. Although U.S.-Brazilian cooperation on security issues traditionally has been limited, law enforcement and military ties have grown closer in recent years. In 2018, the countries launched a new Permanent Forum on Security that aims to foster \"strategic, intense, on-going bilateral cooperation\" on a range of security challenges, including arms and drug trafficking, cybercrime, financial crimes, and terrorism. The United States and Brazil also engage in high-level security discussions under the long-standing Political-Military Dialogue and a new Strategic Partnership Dialogue, which met for the first time in September 2019. Brazil is not a major drug-producing country, but it is the world's second-largest consumer of cocaine hydrochloride and likely the world's largest consumer of cocaine base. It is also a major transit country for cocaine bound for Europe. Organized crime in Brazil has increased in scope and scale over the past decade, as some of the country's large, well-organized, and heavily armed criminal groupsâsuch as the Red Command ( Comando Vermelho , or CV) and the First Capital Command ( Primeiro Comando da Capital , or PCC)âhave increased their transnational operations. Security analysts have attributed much of the recent violence in Brazil, particularly in the northern portion of the country, to clashes among the CV, PCC, and their local affiliates over control of strategic trafficking corridors. The Brazilian government has responded to the challenges posed by organized crime by bolstering security along the 9,767-mile border it shares with 10 nations, including the region's cocaine producersâBolivia, Colombia, and Peru. Under its Strategic Border Plan, introduced in 2011, the Brazilian government has deployed interagency resources, including unmanned aerial vehicles, to monitor illicit activity in high-risk locations along its borders and in the remote Amazon region. It also has carried out joint operations with neighboring countries. More recently, the Brazilian government has begun acquiring low-altitude mobile radars and other equipment to support its Integrated Border Monitoring System. That system was initially scheduled to be operational along the entire Brazilian border in 2022, but the Brazilian government now estimates that the system may not be completely in place until 2035 due to budget constraints. The United States supports counternarcotics capacity-building efforts in Brazil under a 2008 U.S.-Brazil Memorandum of Understanding on Narcotics Control and Law Enforcement. In 2018, the United States trained nearly 1,000 Brazilian police officers on combatting money laundering and community policing, among other topics. Despite having little history of terrorism, Brazil began working closely with the United States and other international partners to assess and mitigate potential terrorist threats in the lead-up to hosting the 2014 World Cup and the 2016 Summer Olympic Games. Among other support, U.S. authorities trained Brazilian law enforcement on topics such as countering international terrorism, preventing attacks on soft targets, and identifying fraudulent documents. The Brazilian government also enacted legislation that criminalized terrorism and terrorist financing in 2016, closing a long-standing legal gap that reportedly had hindered counterterrorism investigations and prosecutions. Brazil further strengthened its legal framework for identifying and freezing terrorist assets in 2019 to address deficiencies identified by the intergovernmental Financial Action Task Force. Brazilian officials have used the new legal framework several times in recent years. In the weeks leading up to the 2016 Olympics, they dismantled a loose, online network of Islamic State sympathizers; 12 individuals were detained, and 8 ultimately were convicted and sentenced to between 5 and 15 years in prison for promoting the Islamic State and terrorist attacks through social media. In 2018, Brazilian prosecutors charged 11 individuals with planning to establish an Islamic State cell in Brazil and attempting to recruit fighters to send to Syria. Although some observers have applauded such efforts, others argue that Brazilian authorities are improperly surveilling, and stoking prejudice toward, the country's small Muslim population. Brazil historically had been reluctant to adopt specific antiterrorism legislation due to concerns about criminalizing the activities of social movements and other groups that engage in actions of political dissent. President Bolsonaro has reinvigorated those concerns by comparing Brazil's Landless Workers' Movement ( Movimento dos Trabalhadores Sem Terra , or MST) and protesters in Chile to terrorists. The Brazilian congress recently restricted the ability of the country's financial intelligence unit to report on terrorist financing, reportedly to prevent Bolsonaro from targeting political and social activists. That restriction could jeopardize Brazil's compliance with global anti-money laundering and antiterrorism financing standards. In December 2019, the U.S. Department of State allocated $700,000 of FY2019 Nonproliferation, Anti-Terrorism, Demining and Related Programs aid to Brazil to improve Brazilian law enforcement's capability to deter, detect, and respond to terrorism-related activities. The assistance will fund border security training and other initiatives, with a particular focus on preventing suspected terrorists and terrorist facilitators from transiting the so-called Tri-Border Area (TBA) of Brazil, Argentina, and Paraguay. The TBA has long been a haven for smuggling, money laundering, and other illicit activities. In September 2018, for example, Brazilian police arrested an alleged Hezbollah financier in the TBA who the U.S. Department of the Treasury had previously sanctioned as a Specially Designated Global Terrorist pursuant to Executive Order 13224. Brazil does not consider Hezbollah a terrorist organization, but the Bolsonaro Administration reportedly is considering measures to designate it as such. U.S.-Brazilian military ties have grown considerably over the past decade but have faced occasional setbacks. In the aftermath of a massive January 2010 earthquake in Haiti, U.S. and Brazilian military forces providing humanitarian assistance engaged in their largest combined operations since World War II. Later in 2010, the countries signed a Defense Cooperation Agreement and a General Security of Military Information Agreement intended to facilitate the sharing of classified information. The Brazilian congress did not approve those agreements until 2015, however, due to a cooling of relations after press reports revealed that the U.S. National Security Agency had engaged in extensive espionage in Brazil. A Master Information Exchange Agreement, signed in 2017, implemented the two previous agreements and enabled the countries to pursue bilateral defense-related technology projects. In July 2019, President Trump designated Brazil as a major non-NATO ally for the purposes of the Arms Export Control Act (22 U.S.C. 2751 et seq.). Among other benefits, that designation offers Brazil privileged access to the U.S. defense industry and increased joint military exchanges, exercises, and training. In FY2019, the U.S. government provided an estimated $666,000 in International Military Education and Training (IMET) assistance to Brazil to strengthen military-to-military relationships, increase the professionalization of Brazilian forces, and enhance the Brazilian military's capabilities. The U.S. government also delivered to Brazil $11.2 million of equipment under the Excess Defense Articles program and $96.7 million of equipment and services under the Foreign Military Sales program. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), does not specifically allocate any military assistance for Brazil, but the Trump Administration requested $625,000 in IMET for Brazil in FY2020. The Trump Administration's FY2021 budget proposal also includes $625,000 in IMET for Brazil. Although recent bilateral agreements and the U.S. designation of Brazil as a major non-NATO ally have laid a foundation for closer military ties, the long-term trajectory of the defense relationship may depend on broader geopolitical considerations. For example, U.S. officials reportedly have warned that bilateral military and intelligence cooperation could be in jeopardy if Brazil allows the Chinese telecommunications company Huawei to participate in Brazil's5G cellular network. Brazil may be reluctant to exclude Huawei, however, since the financial and economic benefits of using the company's lower cost components to deploy Brazil's 5G network more quickly may outweigh the less tangible benefits of closer defense ties with the United States. Moreover, the Bolsonaro Administration generally has sought to avoid confrontations with ChinaâBrazil's top trade partner and an important source of foreign investment. During his first year in office, Bolsonaro shifted from expressing concern that China was exerting too much control over key sectors of the Brazilian economy to lauding the strategic partnership between Brazil and China and calling for closer bilateral cooperation in various areas, including science and technology. More broadly, influential sectors of Brazil's military and foreign policy establishments are wary of becoming embroiled in global power rivalries or becoming technologically dependent on any one country. Congress has expressed interest in ensuring that U.S. military engagement with Brazil does not contribute to human rights abuses. The National Defense Authorization Act for Fiscal Year 2020 ( P.L. 116-92 ) directs the Secretary of Defense, in coordination with the Secretary of State, to submit a report to Congress regarding U.S.-Brazilian security cooperation. The report is to assess the capabilities of Brazil's military forces and describe the U.S. security cooperation relationship with Brazil, including U.S. objectives, ongoing or planned activities, and the Brazilian military capabilities that U.S. cooperation could enhance. The report is also to assess the human rights climate in Brazil, including the Brazilian military's adherence to human rights and an identification of any Brazilian military or security forces credibly alleged to have engaged in human rights violations that have received or purchased U.S. equipment or training. Moreover, the report is to describe ongoing or planned U.S. cooperation activities with Brazil focused on human rights and the extent to which U.S. security cooperation with Brazil could encourage accountability and promote reform through training on human rights, rule of law, and rules of engagement. Some Members of Congress also have called for changes to U.S. security cooperation with Brazil. A resolution introduced in September 2019 expressing profound concerns about threats to human rights, the rule of law, democracy, and the environment in Brazil ( H.Res. 594 , Grijalva) would call for the United States to rescind Brazil's designation as a major non-NATO ally and suspend assistance to Brazilian security forces, among other actions. In contrast, other Members have called for closer U.S. security ties with Brazil, including its inclusion in NATO partnership programs. The U.S. government has supported conservation efforts in Brazil since the 1980s. Current U.S. Agency for International Development (USAID) activities are coordinated through the U.S.-Brazil Partnership for the Conservation of Amazon Biodiversity (PCAB). Launched in 2014, the PCAB brings together U.S. and Brazilian governments, private sector companies, and NGOs to strengthen protected area management and promote sustainable development in the Amazon. In addition to providing assistance for federally and state-managed protected areas, USAID works with indigenous and quilombola communities to strengthen their capacities to manage their resources and improve their livelihoods. USAID also supports the private sector-led Partnership Platform for the Amazon, which facilitates private investment in innovative conservation and sustainable development activities. In November 2019, USAID helped establish the Athelia Biodiversity Fund, a Brazilian equity fund that aims to raise $100 million of mostly private capital to invest in similar efforts. In addition to those long-term development programs, USAID's Office of Foreign Disaster Assistance deployed a team of wildfire experts to assist Brazilian fire investigators in 2019. Several other U.S. agencies are engaged in Brazil, often in collaboration with or with funding transferred from USAID. The U.S. Forest Service, for example, provides technical assistance to the Brazilian government, NGOs, and cooperatives intended to improve protected area management, reduce the threat of fire, conserve migratory bird habitat, and facilitate the establishment of sustainable value chains for forest products. NASA also has provided data and technical support to Brazil to help the country better monitor Amazon deforestation. President Trump has not requested funding for environmental programs in Brazil in any of his budget proposals. Nevertheless, Congress has continued to fund conservation activities in the country. In the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ), Congress appropriated $15 million for the Brazilian Amazon, including $5 million to address fires in the region. Some Members of Congress have called on the Brazilian and U.S. governments to do more to conserve the Amazon. For example, a resolution introduced in the Senate in September 2019 ( S.Res. 337 , Schatz) would express bipartisan concern about fires and illegal deforestation in the Amazon, call on the Brazilian government to strengthen environmental enforcement and reinstate protections for indigenous communities, and back continued U.S. assistance to the Brazilian government and NGOs. The Act for the Amazon Act ( H.R. 4263 , DeFazio), introduced in September 2019, would take a more punitive approach. It would ban the importation of certain fossil fuels and agricultural products from Brazil, prohibit certain types of military-to-military engagement and security assistance to Brazil, and forbid U.S. agencies from entering into free trade negotiations with Brazil. More than five years after the country fell into recession and more than three years after the controversial impeachment and removal from office of President Rousseff, Brazil remains mired in difficult domestic circumstances. There are some signs that economic growth may be accelerating slowly, but tens of millions of Brazilians continue to struggle with poverty and precarious employment conditions. Repeated budget cuts have reduced social services for the most vulnerable and have weakened the Brazilian government's capacity to address other challenges, such as high levels of crime and increasing deforestation. President Bolsonaro was elected, in part, on his pledge to clean up the political system, but his interference in justice sector agencies and frequent attacks on the press, civil society groups, and other branches of government have placed additional stress on the country's already-strained democratic institutions. Brazilian policymakers are likely to remain focused on these internal challenges for the next several years, limiting Brazil's ability to take on regional responsibilities or exert its influence internationally. U.S.-Brazilian relations have grown closer since 2019, as President Bolsonaro's foreign policy has prioritized alignment with the Trump Administration. In addition to coordinating on international affairs, the U.S. and Brazilian governments have taken steps to bolster commercial ties and enhance security cooperation. Nonetheless, policy differences have emerged over sensitive issues, such as bilateral trade barriers and relations with China, which affect the economic and geopolitical interests of both countries. Those disagreements suggest the Trump and Bolsonaro Administrations may need to engage in more extensive consultations and confidence-building measures if they intend to avoid the historic pattern of U.S.-Brazilian relations, in which heightened expectations give way to mutual disappointment and mistrust. The 116 th Congress may continue to shape U.S.-Brazilian relations using its legislative and oversight powers. Although there appears to be considerable support in Congress for forging a long-term strategic partnership with Brazil, many Members may be reluctant to advance major bilateral commercial or security cooperation initiatives in the near term, given their concerns about democracy, human rights, and the environment in Brazil. For the time being, Congress may continue appropriating funding for programs with broad support, such as Amazon conservation efforts, while Members continue to advocate for divergent policy approaches toward the Bolsonaro Administration.", "summary": "Occupying almost half of South America, Brazil is the fifth-largest and fifth-most-populous country in the world. Given its size and tremendous natural resources, Brazil has long had the potential to become a world power and periodically has been the focal point of U.S. policy in Latin America. Brazil's rise to prominence has been hindered, however, by uneven economic performance and political instability. After a period of strong economic growth and increased international influence during the first decade of the 21 st century, Brazil has struggled with a series of domestic crises in recent years. Since 2014, the country has experienced a deep recession, record-high homicide rate, and massive corruption scandal. Those combined crises contributed to the controversial impeachment and removal from office of President Dilma Rousseff (2011-2016). They also discredited much of Brazil's political class, paving the way for right-wing populist Jair Bolsonaro to win the presidency in October 2018. Since taking office in January 2019, President Bolsonaro has maintained the support of his political base by taking socially conservative stands on cultural issues and proposing hard-line security policies intended to reduce crime and violence. He also has begun implementing economic and regulatory reforms favored by international investors and Brazilian businesses. Bolsonaro's confrontational approach to governance has alienated many potential congressional allies, however, slowing the enactment of his policy agenda. Brazilian civil society groups also have pushed back against Bolsonaro and raised concerns about environmental destruction and the erosion of democratic institutions, human rights, and the rule of law in Brazil. In international affairs, the Bolsonaro Administration has moved away from Brazil's traditional commitment to autonomy and toward alignment with the United States. Bolsonaro has coordinated closely with the Trump Administration on challenges such as the crisis in Venezuela. On other matters, such as commercial ties with China, Bolsonaro has adopted a pragmatic approach intended to ensure continued access to Brazil's major export markets. The Trump Administration has welcomed Bolsonaro's rapprochement and sought to strengthen U.S.-Brazilian relations. In 2019, the Trump Administration took steps to bolster bilateral cooperation on counternarcotics and counterterrorism efforts and designated Brazil as a m ajor n on-NATO a lly . The United States and Brazil also agreed to several measures intended to facilitate trade and investment. Nevertheless, some Brazilians have questioned the benefits of partnership with the United States, as the Trump Administration has maintained certain import restrictions and threatened to impose tariffs on other key Brazilian products. The 116 th Congress has expressed renewed interest in Brazil and U.S.-Brazilian relations. Environmental conservation has been a major focus, with Congress appropriating $15 million for foreign assistance programs in the Brazilian Amazon, including $5 million to address fires in the region, in the Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ). Likewise, Members introduced legislative proposals that would express support for Amazon conservation efforts ( S.Res. 337 ) and restrict U.S. defense and trade relations with Brazil in response to deforestation ( H.R. 4263 ). Congress also has expressed concerns about the state of democracy and human rights in Brazil. A provision of the National Defense Authorization Act for FY2020 ( P.L. 116-92 ) directs the Secretary of Defense, in coordination with the Secretary of State, to submit a report to Congress regarding Brazil's human rights climate and U.S.-Brazilian security cooperation. Another resolution ( H.Res. 594 ) would express concerns about threats to human rights, the rule of law, democracy, and the environment in Brazil.", "document_type": "crs"}
{"report": "In FY2019, an estimated 20 million veterans were living in the United States, of which 9.3 million were enrolled in care through the Department of Veterans Affairs (VA). Chapter 17 of Title 38, U.S.C. , requires the VA to provide health care services to eligible veterans through the Veterans Health Administration (VHA) of the VA, which is one of the largest integrated health care systems in the United States. The VHA is composed of nearly 1,700 VA medical facilities. VA care is not a health insurance program; it is primarily a direct provider of care. Meeting veterans' demand for care has been challenging for the VA. Some veteran patients who seek health care services from the VHA experience barriers to receiving in-person care; for example, by being unable to schedule VA medical appointments in a timely manner or having to travel long distances to reach health care facilities. In conjunction with the Veterans Choice Program (VCP), the recently enacted VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (VA MISSION Act; P.L. 115-182 ), and other measures that aim to expand veterans' access to care, the VA has attempted to address barriers to in-person care using telehealth in VA health care facilities. According to the VHA, telehealth refers to the use of health informatics, disease management and [t]elehealth technologies to enhance and extend care and case management to facilitate access to care and improve the health of designated individuals and populations with the specific intent of providing the right care in the right place at the right time. VA telehealth is a mode of health care delivery that extends outside of the \"brick-and-mortar\" health care facilities of the VHA. Telehealth, in contrast to in-person care, functions using information and communication technology (ICT) to transpire an episode of care to a veteran patient, without requiring the patient to visit a service provider in person. Although telehealth generally supplements in-person care, it does not replace VA in-person care. In this context, the use of ICT to deliver telehealth services does not disrupt a veteran patient's daily life activities, such as working and going to school. Veterans do not need to meet their VA provider in-person to receive VA health care services. This type of nondisruptive access to health care services is likely more convenient than the traditional in-person care services used by veteran patients and their civilian counterparts. Telehealth encourages veteran patients to be actively involved in their health care decisions, because it requires veterans to perform telehealth-related tasks such as downloading mobile applications (apps) to connect with VA providers and staff. A mobile app refers to a software program that runs on certain operating systems of mobile devices (e.g., smartphones and tablets) and computers that transmit data over the internet. (See the \" VA Mobile Health (VA Mobile) \" section in this report). Legislation and regulations that aim to expand veterans' access to VA telehealth services generally focus on the U.S. population of rural veterans. Many of these veterans experience geographic barriers to accessing in-person VA care, such as having to travel long distances to reach their nearest health care facilities. Of the estimated 9.2 million veterans who were enrolled in the VA health care system in FY2019, approximately 33% of them were rural veterans. According to the VA, \"[the U.S. population of rural veterans] is older (56% are over 65), poorer (52% earn less than $35,000 per year), and sicker (a greater number of co-morbidities) than their urban counterparts.\" In addition to having to travel long distances to reach their nearest health care facilities, rural veterans may experience access barriers to VA telehealth services because they lack access to broadband internet in their communities. Similarly, veterans who live in urban areas also experience access barriers to VA care such as having to wait more than 30 days to receive care through the VA. According to former Under Secretary of the VHA, David J. Shulkin, MD, who later became the VA Secretary, \"[t]he fact is that demand for [v]eterans' health care is outpacing VA's ability to supply [the health care services] in-house.\" President Trump and the Congress have acknowledged the challenges the VA has faced in supplying VA care in-house by enacting measures such as the VA MISSION Act. The VA has since established new partnerships with private sector vendors, such as Philips Healthcare, T-Mobile USA, Inc. (T-Mobile), and Walmart Inc. (Walmart), under the VA's Advancing Telehealth through Local Access Stations program. The VA established these partnerships with the goal of reducing veterans' access barriers to VA in-person care by expanding their access to VA telehealth services. To assist Congress as it considers measures on VA telehealth, this report provides an overview of VA telehealth programs and requirements including veteran eligibility and enrollment criteria and VA telehealth copayment requirements; discusses VA providers' authority to provide telehealth services anywhere; discusses the components of VA telehealth; provides an overview of VA teleconsultations; discusses three issues that Congress could choose to consider: (1) access barriers to in-person VA care, (2) lack of access to the internet, and (3) conflicting guidelines for prescribing controlled substances via telehealth across state lines; provides, in Appendix A , a summary table with all abbreviations used in the report; provides, in Appendix B , the history of VA telehealth and a high-level overview of at least one legislative provision that was enacted into law and aims to address VA telehealth, beginning with the 109 th Congress; provides, in Appendix C , a discussion on the VA providers' authority to provide telehealth services anywhere; and provides, in Appendix D , the total number of veterans who received VA telehealth services and the total number of telehealth encounters that transpired during each of the fiscal years FY2009-FY2018. On July 12, 2016, the VA established the Office of Connected Care (OCC) within the VHA. The goal of OCC is to \"deliver [information technology (IT)] health solutions that increase a [v]eteran's access to care and supports a [v]eteran's participation in their health care.\" OCC administers the following four VA telehealth programs: 1. According to the VA, VA Telehealth Services \"[improve] convenience to [v]eterans by providing access to care from their homes or local communities when they need it.\" 2. My Health e VetÂ  is the web-based electronic health record (EHR) for veteran patients through which veterans can view, and download electronic protected health information (ePHI); 3. VHA Innovation Program is an annual competitive program that allows VA staff and key stakeholders in the private sector to submit innovative ideas on enhancing VA care; and 4. VA Mobile Health (VA Mobile) develops mobile apps. For its telehealth programs, the VA has requested an appropriation of $1.1 billion for FY2020 and an advanced appropriation of $1.7 billion for FY2021. Not all veterans are eligible to receive VA care, and not every veteran is automatically entitled to medical care from the VHA. Veterans' eligibility for enrollment in the VHA is based on veteran status (i.e., previous military service), service-connected disability, and income. Veterans enrolled in the VA health care system can receive a range of health care services, including primary care and specialty care via telehealth, as authorized under the VA's medical benefits package . The VA medical benefits package refers to a suite of health care services that are covered for eligible veterans, generally at no cost under certain circumstances. In a given year, however, not all enrolled veterans receive their care from the VAâeither because they do not need services or because they have other forms of health coverage, such as Medicare, Medicaid, or private health insurance. In FY2018, more than 9.3 million veterans were enrolled in VA care. A veteran generally must be enrolled in the VA health care system to access VA telehealth services, which are typically provided on an outpatient basis. A veteran who is not enrolled in VA care can access VA telehealth services under certain circumstances. For example, a veteran who is not enrolled in VA care but who is \"tentatively\" eligible for VA care could access VA telehealth services on an outpatient basis. Of the 9.3 million veterans who were enrolled in VA care in FY2018, the VA provided 2.29 million telehealth episodes of care to 782,000 veteran patients. An episode of care generally refers to all of the health care services that a VA provider provides to a veteran patient, to treat the veteran's health condition/disability. The Faster Care for Veterans Act of 2016 ( P.L. 114-286 ) required the VA, among other things, to ensure that veterans could schedule their own telehealth appointments. A recent U.S. Government Accountability Office (GAO) report found that neither the Veteran Appointment Request System nor the On-line Patient Self-Scheduling System (OPSS) had the capability to allow veterans to schedule their own telehealth appointments. According to the VHA, access to VA telehealth services is a joint decision between the veteran and his or her care team of VA providers and clinical staff. The care team tells the veteran which clinically appropriate VA care services he or she can access through the VHA. There may be instances when it is clinically appropriate for a veteran to receive in-person care rather than a telehealth service. When the care team decides that it is clinically appropriate for a veteran to receive telehealth services, the veteran would need to opt into accessing VA telehealth services. The veteran patient would then be able to schedule his or her telehealth appointment. A telehealth copayment refers to the out-of-pocket costs that a veteran patient pays for a telehealth encounter. A veteran patient generally pays $15 per primary care outpatient visit and $50 per specialty care visit at VA medical facilities. According to the VA, copay amounts for telehealth are usually less than for VA in-person care. The VHA does not require veterans to pay a copay for health care services to treat a service-connected disability/condition, nor is a copay required if a veteran meets at least one of the following four main criteria: 1. The veteran patient has a service-connected disability/condition that is rated at 50% percent or more. 2. The veteran patient is a former prisoner of war. 3. The veteran has an annual income that is below the income limit. 4. The veteran is a recipient of the Medal of Honor. Other veteran patients can receive free VA care when they receive care under certain circumstances, such as care for military sexual trauma, care that is part of a VA research project, and care that is provided for compensation and pension examinations. Veteran patients who are not exempt from paying VA copays incur the costs of their VA care. The VA determines a veteran patient's copay by evaluating the rendered telehealth encounter against two factors: (1) the location of the veteran patient when the telehealth encounter transpired and (2) the VA's internal business office protocols on copay amounts for VA care. The Honoring America's Veterans and Caring for Camp Lejeune Families Act of 2012 ( P.L. 112-154 ), among other things, allows the VA Secretary to waive veteran patients' copay requirements for telehealth. In March 2012, the VA Secretary began waiving copays for telehealth services provided to veteran patients in their homes. The Department of Veterans Affairs Codification Act ( P.L. 102-83 ) requires the VA Secretary, among other things, to establish interrelationships and coordinate the delivery of VA health care services with the public and private sectors. Therefore, a health care provider who is either seeking a government position within the VA (referred to as a VA-employed provider ) or seeking to remain as a private sector provider while working with the VA under a contract (referred to as a VA-contracted provider ) is eligible to provide VA care to veterans. A VA provider, either VA-employed or VA-contracted, must hold at least one full, active, current, and unrestricted state license to be eligible to work for or with the VA. The provider can use his or her license to deliver in-person care and telehealth services through the VHA. Each VA provider can decide whether he or she wants to provide VA telehealth services to veteran patients across state lines. The VA MISSION Act, among other things, allows a VA-employed health care provider to provide telehealth services to veteran patients across state lines using only one state license, even in states where the provider is not licensed to practice. ( Appendix C provides an overview of the VA-employed providers' authority to provide telehealth services across state lines using one state license.) A VA-employed provider who chooses to use a single license in this manner must meet the following four statutory requirements of a covered health care professional: 1. the VA provider must be an employee of the VA; 2. the VA Secretary must have authorized the VA provider to provide telehealth services across state lines; 3. the VA provider must agree to adhere to all standards for quality relating to the provision of medicine that is consistent with VA policies; and 4. the VA provider must hold an active, current, full, and unrestricted license, registration, or certification in at least one state to practice in his or her field of medicine. This authority does not extend to VA-contracted providers. Current law does not allow a VA-contracted provider to provide VA health care services, including telehealth, to veteran patients across states lines using a single license in states where the VA-contracted provider is not licensed to practice. A VA-contracted provider, in contrast to a VA-employed provider, must hold a license in each state where the provider chooses to practice. Neither type of provider is required to obtain a specialty license, registration, or certification to practice his or her field of medicine via telehealth through the VHA. The VA encourages its providers to complete the Telehealth Master Preceptor Certification Program. This program offers an educational curriculum on the delivery of VA telehealth, including the VA telehealth modalities used to deliver telehealth services (see the \" Telehealth Modalities \" section below). The VHA Telehealth Services National Training Center, which is a nationally accredited training center, oversees the program and other telehealth trainings. In FY2018, according to the VA, more than 56,000 VA providers and staff completed at least one training session on telehealth. In that same fiscal year, the VA had provided more than 100,720 telehealth trainings. VA telehealth encompasses four general components: (1) the internet and wireless data, (2) telehealth modalities, (3) VA Mobile Health, and (4) VA teleconsultations. Each of these components is discussed below. Health informatics and data visualizations are not discussed because they are beyond the scope of this report. A veteran patient who chooses to access VA telehealth services must be willing to perform telehealth related tasks, such as accessing a health care service and obtaining his or her ePHI (electronic protected health information), using the internetâthe vehicle for which a telehealth episode of care transpires. A veteran patient must have access to the internet to access VA telehealth services on mobile devices and computers. In 2017, according to a VA study of 43,600 veteran enrollees, 77% reported using the internet on an occasional or more frequent basis. Of those 77% of veteran enrollees who reported using the internet, the enrollees performed the following telehealth related tasks: 33% scheduled medical appointments, 45% accessed their EHRs (electronic health records), and 77% searched for information on health. The VA's findings reveal that veterans who are enrolled in the VA health care system are using the internet to perform telehealth-related tasks. However, veteran patients do not necessarily have to have their own internet service to perform telehealth related tasks and access VA telehealth services. For example, veteran patients can access the internet from a VA medical facility, a family member's home, or a local library (access to high-speed internet service typically yields the best internet performance). In addition, a veteran who chooses to access VA telehealth services via a mobile device (e.g., smartphones and tablets) must have adequate cellular data storage. The amount of wireless data storage on a mobile device determines whether the veteran will be able to download and use certain components of VA telehealth such as VA mobile apps. A veteran patient who chooses to perform telehealth-related tasks on a personal mobile device and computer must consider the potential cybersecurity and privacy risks associated with accessing VA telehealth services. During a telehealth encounter, for example, a veteran patient can view, download, and transmit their ePHI over the internet. According to the Federal Bureau of Investigation, mobile devices and internet connections can be compromised when accessed by an unauthorized party. The VHA cannot ensure that a veteran is accessing VA telehealth services on a trustworthy device via a trustworthy connectionâthat responsibility falls upon the user when the user is accessing the service on their personal device. According to the VA, it \"will coordinate restoration activities\" with internal and external key stakeholders when veteran patients experience cybersecurity and privacy threats. Certain veteran patients can access VA telehealth services on VA issued mobile devices. According to the Federal Communications Commission, the VA provided 6,000 tablets with 4G LTE connectivity to low-income and rural veterans with the goal of reducing the veterans' broadband infrastructure barriers to telehealth in their homes. These veterans are accessing telehealth services on trustworthy devices via trustworthy connections. The VA's Cybersecurity Program ensures that, among other things, ePHI and personally identifiable information that are transmitted via VA devices and systems are protected against cybersecurity and privacy threats. Of course, cybersecurity and privacy risks are not limited to the U.S. veteran patient population. A telehealth modality refers to the mode in which a telehealth episode of care transpires. VA providers offer telehealth services to veteran patients via one of the following three telehealth modalities: (1) home telehealth, (2) store-and-forward telehealth, and (3) clinical video telehealth. The three VA telehealth modalities are described in more detail below. Note that the VHA does not consider VA Mobile Health as a telehealth modality, even though veterans can use this technology to access telehealth services. The VA considers VA Mobile Health as an \"essential element of health care\" delivery rather than an ICT tool used to deliver telehealth services. In FY2019, the VA is to begin measuring the VHA's performance in addressing the health care needs of eligible veterans who receive telehealth services via these three VA telehealth modalities. For example, one new measurement would analyze the ratio of \"the number of unique [v]eterans served through telehealth services (numerator) and the number of unique [v]eterans that receive care through [the] VHA (denominator).\" Using this measurement, the VA anticipates that at least 15% of eligible veteran patients will access VA telehealth services in FY2019. The home telehealth (HT) modality allows a VA provider who is not located in the same location as a veteran patient to provide the patient with daily case management services for his or her chronic medical conditions, such as chronic heart disease or diabetes. The HT modality allows the VA provider to view medical data and information from a medical device, such as a heart monitor that the veteran patient wears. Telehealth episodes of care via the HT modality generally have no location restrictions unless the veteran patient is on bed rest. From FY2012 to FY2018, the VA provided 6.7 million telehealth encounters via the HT modality to 1.0 million veteran patients. In FY2018, the VA provided 872,705 telehealth episodes of care to 136,741 veteran patients through the HT modality. According to the VA, the case management service that VA providers most often provide to veteran patients via the HT modality is the management of hypertension (commonly known as high blood pressure). Figure 1 illustrates the distribution of services that transpired via the HT modality, for those veterans who received telehealth services for each of the fiscal years FY2012-FY2018. The number of veteran patients who have accessed telehealth services via the HT modality has increased, even though Figure 1 shows a downward trend for the percentage of veteran patients who accessed VA telehealth services via the HT modality. The total population of veteran patients accessing VA telehealth services via the HT modality increased by 142.1%, from 56,484 veteran patients in FY2009 to 136,741 veteran patients in FY2018. However, the number of telehealth encounters that transpired via the HT modality has fluctuated (see Figure 1 and Table D-2 ). The VA provided its financial obligations for the delivery of telehealth services via the HT modality in the agency's FY2020 funding and FY2021 advanced appropriations budget request to the Congress. In FY2019, the VA estimates that $270.6 million was obligated to the delivery of telehealth services via the HT modality. The VA has requested an appropriation of $279.8 million for FY2020 and an advance appropriation of $291 million for FY2021 to deliver telehealth services via the HT modality. The store-and-forward telehealth (SFT) modality facilitates the interpretation of patients' clinical information by allowing a VA provider who is not located in the same location as a veteran patient to assist another VA provider who is located in the same location and has provided in-person care to the veteran patient. Examples of the clinical information include data, images, sound, and video medical records from the veteran patient's radiology and dermatology examinations. The veteran patient does not have to be present during the electronic transfer of his or her clinical information. After receiving the clinical information, the VA provider interprets the clinical information for the other VA provider and provides follow-up care instructions for the veteran patient. From FY2009 to FY2018, the VA provided 2.7 million telehealth encounters via the SFT modality to 2.5 million veteran patients. In FY2018, the VA provided 344,853 telehealth episodes of care to 314,487 veteran patients through the SFT modality. According to the VA, it provides captures, stores, and forwards clinical information mostly for teleretinal i magining via the SFT modality to screen for diabetic eye disease in veteran patients. According to the VA, teleretinal imaging refers to a VA provider's use of a special camera to take a picture of a veteran patient's eye. The picture is electronically sent to an eye care specialist. After reviewing the picture, the specialist then reports his or her findings to the veteran patient's primary care provider. Figure 2 illustrates the distribution of services that transpired via the SFT modality, for those veterans who received telehealth services for each of the FY2009-FY2018. The increase in the number of telehealth encounters that have transpired via the SFT modality seems to indicate that VA providers are increasingly seeking the expertise of their peers. VA providers are presumably seeking additional expertise due to the lack of a given expertise in their respective geographic area and the VA's overall shortage of health care providers. The clinical video telehealth (CVT) modality allows a VA provider who is not located in the same location as a veteran patient to view, diagnose, monitor, and treat medical conditions of the veteran patient in real-time. The CVT modality functions by allowing the VA provider and the veteran patient to see each other via an interactive live video technology. Telehealth episodes of care via the CVT modality transpire between different VA sites of care, such as from a VA medical center (VAMC) to a veteran patient's home or from a veteran patient's home to a VA provider's home office. From FY2009 to FY2018, the VA has provided 5.7 million telehealth encounters via the CVT modality to 2.1 million veteran patients. In FY2018, the VA provided 1,074,422 telehealth episodes of care to 393,370 veteran patients through the CVT modality. According to the VA, the telehealth service that veteran patients accessed the most via the CVT modality is telemental health , which refers to the delivery of a mental health service via telehealth. Figure 3 illustrates the percentage of veterans who received telehealth services and the number of telehealth encounters that transpired via the CVT modality, for each of the fiscal years FY2009-FY2018. The upward trends in both the percentage of veterans who received telehealth services and the number of telehealth encounters that transpired via the CVT program seem to illustrate that veteran patients are increasingly interested in receiving VA telehealth services via this modality. Veteran patients' interest in the CVT program might stem from it being well established and publicized. The program is the VA's oldest method of telehealth delivery. Additionally, veterans have been able to access telemental health care services via the CVT modality since the VA started providing telehealth services. This report discusses the history of VA telehealth in Appendix B . VA Mobile allows veterans to access certain health services and ePHI via VA mobile apps on mobile devices (e.g. smartphones) and computers. According to the National Center for Veterans Analysis and Statistics (NCVAS), 97.9% of veterans who were enrolled in the VHA in 2016 owned a smartphone and 78.3% owned a computer (i.e., a laptop, desktop, or notebook computer). Veterans can access the VA mobile apps at any time, regardless of where the veteran is located. According to the VA, \"VA Mobile Health aims to improve the health of [v]eterans by providing technologies that expand clinical care beyond the traditional office visit [via mobile apps].\" VA Mobile has four overall functions: first, it allows veteran patients to connect and schedule medical appointments with VA providers; second, it provides veterans with access to health care information on topics such as mental health and weight management; third, it allows VA providers to provide case management of veteran patients' disabilities/illnesses from afar; and fourth, it allows VA providers to disseminate best practices among themselves, with the goal of improving the health outcomes of veteran patients. As a reminder, the VA does not consider VA Mobile to be one of the three modalities for the delivery of health diagnostics or health services. VA mobile apps, such as those illustrated in Figure 4 , are located in the virtual VA App Store. The VA App Store is a public-facing web-based store that offers 47 mobile apps available to veterans, their caregivers, and VA providers. About two-thirds of the mobile apps in the virtual VA App Store are for veterans and their caregivers. The remainder of the apps are for VA providers. Veterans who are not enrolled in the VHA may access some of the VA mobile apps. Not all of the mobile apps are specific to health care. VA mobile apps provide veterans with access to a range of VA benefit services and information, such as conferring with a VA pharmacist, reviewing current disability benefits, and obtaining information on depression. Veterans who are not enrolled in the VHA, for example, can also access social apps, such as the VA-Department of Defense (DOD) Veteran Link app, which is a secure social networking app for veterans and current servicemembers. The public can view the different VA mobile apps in the VA App Store; however, only veterans, their caregivers, and VA providers with certain access accounts can download and use the apps. To download VA mobile apps, a veteran must have login credentials for at least one of the following three accounts: (1) a DOD Self-Service Logon (DS Logon) account, (2) a My Health e Vet account, or (3) an ID. me account. A general overview of each of the three accounts, which are all free to veterans, is provided below. DOD Self-Service L ogon (DS Logon) Account is a federal account that authenticates a veteran's affiliation with the VA and DOD. This secure self-service account allows the veteran to access multiple VA and DOD websites and apps. The veteran can request either a Level 1 (Basic) or a Level 2 (Premium) account, both of which are free. Level 1(Basic) Account allows a veteran to view general information located on a VA and DOD website. Level 2 (Premium) Account allows a veteran to view personal information on VA and DOD websites. The veteran must prove his or her identity to get a Premium Account by answering a set of questions. MyHealth e Vet Premium Account is a federal account that authenticates a veterans' enrollment in VA care. It authorizes a veteran patient to complete health care-related tasks, such as viewing his or her electronic health record, reordering medications, and contacting his or her health care provider via a secure messaging technology. ID. me Account is a private sector account that, in this context, authenticates a veterans' affiliation to the VA and DOD. This account \"provides secure identity proofing, authentication, and group affiliation verification for government and businesses across sectors.\" It is also free to veterans. The veteran's electronic device must operate using either a w eb-based platform , an iOS platform , or an Android platform for a VA mobile app to work on the device. A web-based platform refers to an operating system that has a web-browser such as Internet Explorer and Google Chrome. A VA web-based app such as MyHealth e Vet, which is the electronic health record (EHR) for veterans, is accessible over the internet. An iOS platform refers to the operating system installed on Apple, Inc. (Apple) electronic devices such as the iPhone and iPad. A VA iOS-app is available to veterans who use Apple devices. A veteran who has an Apple device can download VA iOS apps from the VA App Store and from the Apple App Store. A veteran who does not have an Apple electronic device will not be able to access a VA iOS app on a non-Apple device. An Android platform refers to the operating system installed on non-Apple electronic devices (e.g., companies such as Samsung and LG). A VA Android app is available to veterans with devices that do not have the iOS operating platform installed on them. A veteran who has an electronic device with an Android operating system can download VA Android apps from the VA App Store and the Google Play Store, which is a mobile app on an Android device. A veteran who does not have an Android device will not be able to access a VA Android app on a non-Android electronic device. The VA Video Connect (VVC) is a mobile app that veteran patients can download from the virtual VA App Store. The VVC app functions by allowing a veteran patient to connect via live video with a VA provider regardless of where the veteran or provider is located, through the CVT modality. The veteran patient can use the VVC app on a mobile device. To access the VVC app, the veteran patient's mobile device must contain a web camera, speakers, and microphone. In addition, the device must be able to connect to and have access to the Internet. According to the VA, the VVC \"uses encryption to ensure privacy in each session.\" The VA launched the VVC app in August 2017 and has recorded 105,300 telehealth visits via the VVC app from October 2017 to September 2018. The VA has partnered with private sector vendors Philips Healthcare and T-Mobile to expand veterans' access to the VVC app. Philips Healthcare currently partners with the VA by providing veterans with a \"virtual connected care\" through the company's Virtual Medical Center. This new partnership with Philips Healthcare aims to place telehealth information and communication technology equipment in 10 posts at the facilities of two veteran service organizations (VSOs) recognized by the President, Congress, and the VA Secretary for the representation of veterans: Veterans of Foreign Wars and the American Legion. The placement of the equipment in the VSO posts would expand VA telehealth services to veterans who are likely to be members of and who frequently visit those two VSOs. However, the program would not exclude non-VSO members from accessing VA telehealth services at the VSO sites. A positive outcome from this pilot program could encourage veterans who are not members of VSOs to visit VSO sites to access VA telehealth services. The VA's partnership with T-Mobile would allow veterans with this wireless service to access the VVC app via their mobile device without incurring additional charges or reducing plan data allotments. According to a VA press release, \"veterans will be able to connect to appointments on their mobile devices for no extra charge, regardless of their current data plan.\" The VA did not provide in its press release the amount of the \"extra charge\" that veteran patients would have incurred from accessing the VVC app on their mobile devices. It is likely that other veterans who do not have T-Mobile as their wireless service provider would incur the unknown extra charge for accessing the VVC app. The VA has not yet announced any plans to partner with all wireless service providers to ensure that veteran patients who access the VVC app on their mobile devices will not incur additional charges. The telehealth services that the VA provides to veteran patients align with their respective VA in-patient care services. A VA health care service does not change when a VA provider delivers the service via telehealth. For example, a veteran patient who chooses to access telemental health services via the VVC app on a mobile device would receive the same type of mental health services he or she would have received in-person. According to the VA Secretary, the VHA is the largest U.S. provider of telehealth services, having provided 2.29 million telehealth episodes of care to 782,000 veteran patients in FY2018. Of those 782,000 veteran patients, 9% of them were female and 45% of them live in rural areas. Veteran patients can access a range of telehealth services through the VHA. These telehealth services can be grouped into the following seven categories, in alphabetical order: 1. consultative and evaluative telehealth services, 2. disease and illness-specific telehealth services, 3. gender-specific telehealth services, 4. preventative telehealth services, 5. rehabilitative telehealth services, 6. rural-specific telehealth services, and 7. wellness telehealth services. According to the VA, the agency will provide general VA health care services to veteran patients and refer them to private health care providers for health care services that those providers provide \"most effectively and efficiently.\" The VA's decision to refer such services to the private sector might stem from the agency's shortage of VA providers. A veteran can access VA telehealth services from various VA sites of care , such as VA medical facilities, mobile telehealth clinics, and non-VA sites of care such as the homes, work places, and schools of veterans. A veteran, who seeks VA care, including VA telehealth services at non-VA medical facilities and nonfederal facilities from non-VA providers, must receive prior authorization from the VA before accessing such services. The VA generally authorizes a veteran to seek VA care from a non-VA provider when [the existing] VA facilities or other government facilities are not capable of furnishing economical hospital care or medical services because of geographic inaccessibility or are not capable of furnishing care or services required. The VA continues to develop new telehealth services to meet the needs of veterans. According to the VA FY2019 funding and FY2020 advanced appropriations budget request to Congress, for example, the Comprehensive Opioid Management in Patient Aligned Care Teams (COMPACT) team is \"testing a telehealth-based self-management training system to promote improved care for [v]eterans receiving chronic opioid therapy.\" On December 6, 2018, the VA announced a new partnership with Walmart that aims to reduce access barriers to VA care that underserved veterans experience. Through this partnership, which is part of the VA's Advancing Telehealth through Local Access Stations program, the VA is establishing a pilot program whereby underserved veterans in certain locations would access VA telehealth services in donated spaces at Walmart retail stores. Walmart would provide the VA with operational support. According to Walmart, the prospective locations will be based on \"the number of veterans and the health resources offered.\" The VA has stated that its decision to partner with Walmart is based on the fact that more Americans live near a Walmart store than a VA medical center (VAMC). According to the VA, [90%] of Americans live within ten miles of a Walmart. Ninety percent of veterans [do not] live within ten miles of a [VAMC]. The VA reported to Congress that there were an estimated 172 VAMCs in 2019. For that same calendar year, the VA also reported to Congress that there were other VA medical facilities within the VA health care system, including 23 health care centers, 300 vet centers, and 728 community-based outpatient clinics. The VA has not yet stated how many veterans live near other VA medical facilities in relation to Walmart stores. This information would be helpful to Congress as it considers measures relating to the use of existing VA spaces. This prospective pilot program has raised some concerns, however, because according to the Veterans Rural Health Advisory Committee (VRHAC), Walmart is encountering some of the same challenges that the VHA has met when expanding telehealth services to rural veterans, such as keeping pace with technology for virtual care and the expansion of bandwidth. However, such challenges could be location-specific and not representative of all Walmart retail store locations. Current law (Chapter 17 of Title 38 of the U.S. Code ) refers to teleconsultation as \"the use by a health care specialist of telecommunications to assist another health care provider in rendering a diagnosis or treatment.\" The law defines teleconsultation in relation to VA's delivery of mental health and traumatic brain injury assessments. The VA extends its use of teleconsultations in the delivery of VA care with the goal of improving veteran patients' health care outcomes, particularly those of rural veterans. For example, the VA has adopted and modified the Project Extension for Community Healthcare Outcomes (Project ECHO) learning model, which the Expanding Capacity for Health Outcomes Act ( P.L. 114-270 ) required the HHS Secretary to examine and report on, to create a Specialty Care Access Network-Extension for Community Healthcare Outcomes (SCAN-ECHO) learning model. , Project ECHO is a global, technology-enabled collaborative learning model, whereby medical educators and specialty care health care providers disseminate best practices to primary care and rural health care providers, with the goal of improving the health outcomes of rural and underserved patients. The best practices are disseminated through different modalities such as teleECHO , which is the delivery of medical education such as patient case-based learning through a virtual network. TeleECHO is delivered through a hub-and - spoke model , which refers to a structure whereby a central point (the \"hub\") disseminates information to different connecting points (the \"spokes\"). The VA launched SCAN-ECHO in 2011, with the goal of expanding VA care to rural veterans and veterans that live in medically underserved areas. According to the VA, SCAN-ECHO refers to an approach to provide specialty care consultation, clinical training, and clinical support from specialty care teams to rural primary care providers (PCPs) using video teleconferencing equipment. VA teleconsultations generally transpire under SCAN-ECHO using the hub-and-spoke model. The \"hubs\" are the specialty care providers who are on specialty care teams, and the \"spokes\" are the PCPs who are on patient aligned care teams (PACTs). According to the VA, SCAN-ECHO transpires when [PCPs] present a patient's case using multi-site videoteleconferencing equipment. Providers then take information back to the patient for discussion and collaborative decision making. The specialty care team collaborates, culminating in a recommended treatment plan. In addition to case presentations, formal clinical education is provided. The Expanding Capacity for Health Outcomes Act (ECHO Act; P.L. 114-270 ) required the HHS Secretary to examine technology-enabled collaborative learning and capacity-building models and report the findings to Congress no later than two years after enactment. In February 2019, the Office of the Assistant Secretary for Planning and Evaluation (ASPE), within HHS, submitted the required report to Congress. ASPE retrieved information about SCAN-ECHO from the VA and found that the VA has evaluated the use of SCAN-ECHO for medical conditions and health care services such as chronic liver disease, diabetes, and women's and transgender health care services. For example, ASPE found that the VA studied the difference in health outcomes of 62,750 veterans with chronic liver disease between 2011 and 2015. Of those 62,750 veteran patients, 513 of them had received virtual teleconsultations with VA providers who were participating in SCAN-ECHO. According to ASPE, \"those receiving the intervention were much less likely to die than those who had no SCAN-ECHO consultation over the same time period.\" SCAN-ECHO is an example of the VA's efforts to expand the capability of VA telehealth to \"underproductive providers to assist access-challenged providers.\" The VA is leveraging the use of telehealth with the goal of expanding veterans' access to VA care. Based on its experience with telehealth to date, the VA has stated that increased access to telehealth could reduce the use of VA travel benefits by veterans and reduce hospital admissions. Telehealth is not a new form of health care delivery. It is a multibillion dollar industry in both the federal and private sectors, showing upward trends in telehealth access, utilization, innovation, and spending. Discussed below are three issues that Congress may choose to examine while considering additional topics related to veterans and telehealth services: (1) access barriers to in-person VA care continues to exist, (2) some veterans lack access to the internet, and (3) VA providers' guidelines for prescribing controlled substances via telehealth are different. According to the VA, the agency cannot meet veterans' demand for VA in-patient care. Congress and the VA have considered measures and initiatives to expand veterans' access to VA care using telehealth. The expansion of VA telehealth does not address the access barriers that veteran patients' face when seeking in-person VA care. Instead, telehealth provides veterans with an alternate way to access health care services through the VHA. The VA is predicting that the U.S. veteran population will decrease by 32%âfrom 20.0 million veterans in 2017 to 13.6 million veterans in 2037. This prediction does not equate to a lower number of veterans seeking, enrolling in, and accessing VA care in the future. For example, more than three-fourths of the 13.6 million veterans that the VA projects will be in the U.S. veteran population in 2037 might choose to enroll in and access care through the VA health care system. Congress may consider whether the VA should continue to expand veterans' access to VA in-person care in VA brick-and-mortar buildings and/or through VA telehealth services by assessing how such modes of delivery effect the cost and quality of care (in addition to timely access). The overarching goal of the MISSION Act and VA final rule on telemedicine is to expand veteran patients' access to care using telehealth. The use of telehealth services requires that veteran patients have access to the internet to connect to VA telehealth providers. Veteran patients who do not have readily accessible internet connections would likely have difficulty reaching their VA providers. According to the National Center for Veterans Analysis and Statistics (NCVAS), an estimated 20.1% of veterans did not have internet access in 2016. In April 2018, for example, the GAO found that some veterans who live on the U.S. Pacific Islands such as Guam and American Samoa, could not access the internet because of damaged cables and equipment failures that occurred during inclement weather. The VA is investigating ways to expand veteran patients' access to VA telehealth services to address veterans' lack of access to the i nternet . Specifically, t he agency is evaluating the feasibility of non-VA facilities (e.g., libraries, schools, and post offices) serving as i nternet /online hotspots, and retaining VA kiosks where veteran patients can access telehealth services. Congress and the President have responded to this divide by enacting measures such as the Repack Airwaves Yielding Better Access for Users of Modern Services Act of 2018 ( P.L. 115-141 ; RAY BAUM's Act of 2018). The RAY BAUM's Act of 2018 required, among other things, the Federal Communications Commission (FCC) to submit a report to Congress on promoting broadband internet access to veterans, particularly to rural veterans and veterans with low incomes. The FCC submitted the report to the Senate Committee on Commerce, Science, and Transportation and the House Committee on Energy and Commerce in May 2019. According to the FCC's report, the 2.2 million veteran households that do not have access to broadband internet experience barriers when adopting broadband such as the inability to pay for the service and the lack of broadband development in their geographic location. In future discussions regarding this issue, Congress may consider the costs associated with deploying broadband infrastructure in underserved geographic areas. According to the VA, some veteran patients are given tablets \"that operate over 4G LTE mobile broadband to support VA Video Connect,\" where infrastructure is lacking. Congress continues to address concerns regarding the prescribing of controlled substances such as opioids. The VA MISSION Act and the VA's final rule do not address the prescribing of controlled substances to veteran patients who are not receiving services from within VA medical facilities, or who are not in the same state as the prescribing physician, as permitted under the Ryan Haight Online Pharmacy Consumer Protection Act of 2008 (Ryan Haight Act; P.L. 110-425 ). Section 311(h)(1) of the Controlled Substance Act (CSA), which was added by Section 3 of the Ryan Haight Act, authorized the special registration for telemedicine with the goal of increasing patients' access to practitioners that can prescribe controlled substances via telemedicine in limited circumstances. Current law defines a practitioner as a physician, dentist, veterinarian, scientific investigator, pharmacy, hospital, or other person licensed, registered, or otherwise permitted, by the United States or the jurisdiction in which he practices or does research, to distribute, dispense, conduct research with respect to, administer, or use in teaching or chemical analysis, a controlled substance in the course of professional practice or research. The registration would enable a practitioner to deliver, distribute, dispense, or prescribe via telemedicine a controlled substance to a patient who has not been medically examined in person by the prescribing practitioner. While the CSA authorized the special registration for telemedicine, practitioners have not been able to apply for this special registration. The Drug Enforcement Administration (DEA) has yet to finalize a rule on the registration's application process and procedures and the limited circumstances that warrant it. The Ryan Haight Act expressly exempts VA providers and VA-contracted providers from needing to obtain a special registration in each state where the providers choose to practice, if they meet two conditions. First, the providers must prescribe the controlled substance within the scope of their employment at the VA. Second, the providers must either (1) hold at least one state registration to prescribe a controlled substance or (2) prescribe in a VA health care facility while using the registration of that facility. The special registration, though not implemented yet by the DEA, the MISSION Act, or the VA's final rule on telehealth, might confuse VA providers about whether they must hold a license in each state where they intend to prescribe controlled substances to veteran patients. The special registration would allow a VA provider to prescribe a controlled substance in a state where the provider is not licensed to practice. The MISSION Act and the VA's final rule on telehealth, in contrast to the special registration, do not preempt state laws regarding the prescribing of controlled substances. VA providers must be licensed in each state where the provider intends to prescribe a controlled substance. Congress could consider encouraging the VA to develop guidelines on how its providers would prescribe controlled substances to veteran patients who are not receiving telehealth services from within VA health care facilities. Appendix A. Abbreviations Used in This Report Appendix B. History of VA Telehealth For decades, the VA has provided telehealth services to veteran patients to improve health care access and to address delivery challenges, such as shortages of in-patient beds and health care providers skilled in the delivery of veteran-centric care. In the 1950s and 1960s, for example, the VA had difficulties in recruiting psychiatrists and neurologists. In FY1961, there were 18,722 eligible veterans on a waiting list to receive VA inpatient care for psychiatric and neurological health care conditions. That same year, the VA started testing the use of telehealth, with the goal of addressing the aforementioned challenges that veteran patients were experiencing when trying to access VA in-person care for psychiatry and neurology services. According to the VA's Annual Report for FY1961, the VA tested the use of telehealth by using the closed-circuit television ( CCTV) technology as a telehealth modality. The CCTV technology refers to a system that \"links a camera to a video monitor using a direct transmission system.\" VA physicians and therapists at a VA medical facility in Oklahoma City, OK, had used the CCTV technology to disseminate best practices and trainings on therapy and psychiatry with the goal of improving veteran patients' health care outcomes. According to the VA, its use of telehealth using the CCTV technology was a success because [t]he results indicate that this form of communication can be a valuable tool in the treatment of psychiatric patients and in the training of personnel in psychiatric service. In addition, it shows the potential in a number of other medical applications, such as, for example, an education technique in surgical training. Since then, the VA has aimed to address veterans' access barriers to VA in-person care using updated telehealth technologies and equipment, which are discussed under the \" VA Telehealth Components \" heading in this report. Legislative History of VA Telehealth The Congress has passed several laws that address VA telehealth. Provided below is a high-level legislative history of VA telehealth, to help inform any future congressional discussion on this issue. For each Congress, beginning with the 109 th (January 3, 2005 to January 3, 2007) there is a brief narrative summarizing at least one legislative provision that aims to address VA telehealth. This list may not be comprehensive. Veterans Benefits, Health Care, and Information Technology Act of 2006 (109 th Congress) The Veterans Benefits, Health Care, and Information Technology Act of 2006 ( P.L. 109-461 ), among other things, required the VA Secretary to increase the number of VA medical facilities that are capable of providing readjustment counseling services via telehealth. Veterans' Mental Health and Other Care Improvements Act of 2008 (110 th Congress ) The Veterans' Mental Health and Other Care Improvements Act of 2008 ( P.L. 110-387 ), among other things, required the VA Secretary to develop a pilot program to assess the feasibility and advisability of providing certain veterans with peer outreach, peer support, readjustment counseling and other mental health services, using telehealth to the extent practicable. Caregivers and Veterans Omnibus Health Services Act of 2010 (111 th Congress) The Caregivers and Veterans Omnibus Health Services Act of 2010 ( P.L. 111-163 ), among other things, allows the VA Secretary to contract with community mental health centers and other qualified health entities with the goal of expanding veterans' access to VA telehealth services. Honoring America's Veterans and Caring for Camp Lejeune Families Act of 2012 (112 th Â  Congress) The Honoring America's Veterans and Caring for Camp Lejeune Families Act of 2012 ( P.L. 112-154 ), among other things, allows the VA Secretary to waive veteran patients' copay requirements for telehealth. The Veterans Access, Choice, and Accountability Act of 2014 (113 th Congress ) The Veterans Access, Choice, and Accountability Act of 2014 ( P.L. 113-146 ), among other things, requires the VA Secretary to improve veterans' access to VA telehealth via mobile vet centers and mobile medical facilities. The Faster Care for Veterans Act of 2016 (114 th Congress) The Faster Care for Veterans Act of 2016 ( P.L. 114-286 ), among other things, requires the VA Secretary to ensure that veteran patients can schedule their own medical appointments for VA telehealth services. John S. McCain III, Daniel K. Akaka, and Samuel R. Johnson VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 (115 th Congress) The John S. McCain III, Daniel K. Akaka, and Samuel R. Johnson VA Maintaining Internal Systems and Strengthening Integrated Outside Networks Act of 2018 ( P.L. 115-182 ; VA MISSION Act of 2018), among other things, removes all geographic barriers to VA telehealth and therefore allows veterans to access VA telehealth services in their communities from any location in the United States, U.S. territories, District of Columbia, and Commonwealth of Puerto Rico. Appendix C. VA Provider Authority to Provide Telehealth Services Anywhere Veteran patients who cannot access telehealth because of provider shortage gaps may benefit from having access to out-of-state telehealth providers in non-VA health care facilities. Generally, states determine whether a health care provider can provide a health care service across state lines because states handle provider licensure. Each state has the authority to establish its own licensure requirements, and each state licensing board has its own eligibility requirements for health care providers. Due to state-specific licensing laws, a health care provider licensed and certified in one state may not be able to provide health care services to patients located in another state where the provider is not licensed. State licensing laws can cause some health care providers to experience geographical and licensing-related barriers to providing health care services across state lines to rural and underserved populations. On August 3, 2017, the White House and the VA announced the Anywhere to Anywhere initiative, which aims to remove the geographic barriers that veterans might experience when accessing VA care. Under this initiative, a veteran patient can access VA telehealth services anywhere from a VA provider located outside of a VA health care facility. The initiative is a joint effort between the VHA, the White House Office of American Innovation, and the Department of Justice. The VA's attempt to expand veterans' access to VA care via telehealth under this initiative was threatened by its providers' experiences of geographic and licensing barriers to delivering the services across state lines. On October 30, 2017, a House Committee on Veterans Affairs report found that the continued expansion of telemedicine across the VA health care system is constrained by restrictions on the ability of VA providers to practice telemedicine across state lines without jeopardizing their state licensure and facing potential penalties for the unauthorized practice of medicine. On May 11, 2018, the VA published a final rule in the Federal Register to exempt its providers who deliver care via telehealth from certain state licensing laws and regulations. Two major elements of the final rule changed the VHA's existing practice delivery: (1) VA providers may deliver telehealth services outside of VA health care facilities and (2) state licensing boards may no longer deny or revoke a VA provider's license if he or she provides a telehealth service in a state where the provider is not licensed to practice in non-VA health care facilities. According to the VA, the prohibition addresses the concerns of some VA providers that chose not to provide telehealth services across state lines in non-VA health care facilities because their state licensing boards might take action against their licenses for doing so. In March 2018, for example, the VA Pacific Island Health Care System reported to the GAO that it had concerns about delivering a telehealth service to a veteran patient in his or her home because a state could require VA providers to be licensed in the state where the patient resides. The final rule does not preempt state laws regarding the prescribing of controlled substances, nor does it extend beyond the telehealth provider's employment at the VA or extend to VA-contracted providers. A VA-contracted provider must continue to practice under the laws and regulations of his or her state of licensure. The rule became effective on June 11, 2018, five days after the enactment of the VA MISSION Act. The VA MISSION Act, among other things, removed all geographic barriers to VA telehealth and therefore, allowed veterans to access VA telehealth services in their communities from any location in the United States, U.S. territories, District of Columbia, and Commonwealth of Puerto Rico. According to Chapter 17 of Title 38 of the U.S. Code , (d) Relation to State Law. (1) The provisions of this section shall supersede any provisions of the law of any State to the extent that such provision of State law are inconsistent with this section. (2) No State shall deny or revoke the license, registration, or certification of a covered health care professional who otherwise meets the qualifications of the State for holding the license, registration, or certification on the basis that the covered health care professional has engaged or intends to engage in activity covered by subsection (a). The VA MISSION Act codified the core principles of the above-mentioned final rule with the goal of protecting VA providers against possible liability issues stemming from state licensure laws. This authority is given only to VA providers that meet the statutory requirement of a \"covered health care professional.\" According to the VA, nearly 10,000 VA providers gained the authority to provide out-of-state telehealth services to veteran patients in non-VA health care facilities in states where the provider is not licensed to practice. Appendix D. Total Number of Veteran Patients who Had Received VA Telehealth Services and Total Number of Telehealth Encounters that Transpired, FY2009-FY2018", "summary": "The Veterans Health Administration (VHA), of the Department of Veterans Affairs (VA), is leveraging the use of telehealth with the goal of expanding veterans' access to VA care. Telehealth generally refers to the use of information and communication technology to deliver a health care service. It is a mode of health care delivery that extends beyond the \"brick-and-mortar\" health care facilities of the VHA. VA telehealth services are generally provided on an outpatient basis and supplement in-person care. Such services do not replace VA in-person care. The VA copay requirements for telehealth are the same as for VA in-person care, but in some cases may be lower than the copays for VA in-person outpatient health care services delivered through the VHA. President Trump and Congress have recently enacted measures such as the VA Maintaining Internal Systems and Strengthening Integrated Outside Networks of 2018 (VA MISSION Act; P.L. 115-182 ) that aim to address the access barriers that veterans may experience when accessing VA telehealth services across states lines. The VA MISSION Act, among other things, removes all geographic and licensing barriers to VA telehealth, thereby allowing veterans to access VA telehealth services in their communities from any location in the United States, U.S. territories, District of Columbia, and Commonwealth of Puerto Rico. VA Telehealth Modalities In FY2018, more than 9.3 million veterans were enrolled in VA care. In that same fiscal year, the VA provided 2.29 million telehealth episodes of care to 782,000 veteran patients collectively using the following three VA telehealth modalities: (1) home telehealth, (2) store-and-forward telehealth, and (3) clinical video telehealth. The VA has developed VA mobile applications (apps), which refer to software programs that run on certain operating systems of mobile devices (e.g., smartphones and tablets) and computers that transmit data over the internet that veterans can access as telehealth applications. Veterans can access VA mobile apps on cellular and mobile devices that operate using either a web-based platform, an iOS platform, or an Android operating platform. VA Telehealth Partnerships and Access According to the VA, it cannot meet the health care demands of veteran patients in-house and therefore, it has established partnerships with private sector vendors to help address veterans' demand for VA care. For example, the VA's partnership with the wireless service provider T-Mobile would allow a veteran who has T-Mobile as a cellular wireless service provider to access the VA Video Connect app without incurring additional charges or reducing plan data allotments. VA Teleconsultations VA providers can use telehealth platforms and applications to consult with one another, which is referred to as a teleconsultation by section 1709A(b) of title 38 of the U.S. Code . The VA has adopted and modified the Project Extension for Community Healthcare Outcomes (Project ECHO) learning model, which the Expanding Capacity for Health Outcomes Act ( P.L. 114-270 ) required the Secretary of the Department of Health and Human Services to examine and report on, to create a Specialty Care Access Network-Extension for Community Healthcare Outcomes (SCAN-ECHO) learning model. The VA's SCAN-ECHO is a similar approach that aims to connect underproductive providers to assist access-challenged providers, using the hub-and- spoke model , which refers to a structure whereby a central point (referred to as the \"hub\") disseminates information to different connecting points (referred to as the \"spokes\"). Topics Covered in This Report This report provides background information on VA telehealth, including veteran eligibility and enrollment criteria, VA telehealth copayment requirements, and VA providers' authority to provide telehealth services anywhere. The report also discusses the components of VA telehealth. It also discusses three issues that Congress could choose to consider: (1) access barriers to in-person VA care, (2) lack of access to the internet, and (3) conflicting guidelines for prescribing controlled substances via telehealth across state lines.", "document_type": "crs"}
{"report": "On March 18, 2020, the American Civil Liberties Union (ACLU) sent a letter to Attorney General William Barr and Bureau of Prisons (BOP) Director Michael Carvajal asking them to release federal prisoners who might be at risk of serious illness due to coronavirus disease 2019 (COVID-19) infection and to reduce the intake of new prisoners to reduce overcrowding. The ACLU called on BOP to utilize authorities granted to it, such as compassionate release and home confinement for elderly offenders, to reduce the number of at-risk prisoners in the federal prison system. The ACLU also asked the Department of Justice (DOJ) to direct the U.S. Marshals Service (USMS) to release from custody any individuals who are at risk of serious illness related to COVID-19, such as those who are elderly and/or have chronic health conditions. Multiple Members of Congress have additionally urged DOJ and its BOP to take steps \"to reduce the incarcerated population and guard against potential exposure to coronavirus,\" and legislation has been introduced that would require the release of some prisoners during a national emergency relating to a communicable disease. BOP data indicate that COVID-19 has become widespread in the federal prison system. As of April 22, 2020, BOP reported that 566 federal prisoners and 342 BOP staff members in 47 prisons and 16 Residential Reentry Centers had tested positive for COVID-19 and 24 prisoners have died from the disease (no BOP staff have died). Prior to these positive tests, BOP released a COVID-19 action plan. The action plan, discussed below, largely focuses on restricting access to federal prisons and limiting the movement of prisoners. In addition, the Attorney General has issued three memoranda outlining how DOJ will use the legal authorities available to address the COVID-19 pandemic. Two of the memoranda direct BOP to use available authorities to place more prisoners on home confinement and the other memorandum provides directives for prosecutors when deciding whether to seek pretrial detention for federal defendants. This report provides information on DOJ's response to the threat of COVID-19 as it pertains to federal prisons and the authorities that may permit the release of some federal prisoners because of the pandemic. The report starts with a brief overview of why the prison environment is conducive to the spread of COVID-19 and the federal prisoners who might be at risk of serious complications if they contract the virus. Next, the report provides an overview of BOP's COVID-19 action plan. The report then turns to a discussion of current authorities that could allow for some federal prisoners to be released and directives from the Attorney General on how DOJ is to use those authorities to respond to the COVID-19 pandemic. The report concludes with a review of legislation introduced in the House and the Senate that would alter the operation of some of those authorities. USMS is responsible for initially confining people who have been arrested and charged for a federal offense and are not granted pre-trial release. USMS does not operate any of its own jails. Rather, prisoners in USMS custody are housed in a combination of BOP-operated facilities, as well as state, local, and private facilities. While most facilities operated by BOP are prisons that hold people who have been convicted of federal offenses and sentenced to a period of incarceration, BOP operates a series of facilities that largely function in a manner similar to local jails (i.e., they hold people who have not been convicted and are awaiting the resolution of their case or people who have been convicted but are awaiting transfer to a prison where they will serve their sentence). These facilitiesâreferred to as Metropolitan Detention Centers, Metropolitan Correctional Centers, or Federal Detention Centersâare generally located in metropolitan areas and can hold prisoners of any security designation (i.e., high, medium, low, or minimum). The majority of prisoners in USMS custody are housed in state and local facilities; data from USMS indicate that in FY2019, approximately 16% of USMS prisoners were housed in BOP-operated facilities. USMS says it \"relies on state and local jails as well as Bureau of Prisons detention facilities to provide medical care inside the facilities.\" Therefore, defendants in the custody of USMS would be subject to any plan that the facility they are housed in implements to prevent the spread of COVID-19. For example, a USMS prisoner held in BOP-operated facility would be subject to BOP's COVID-19 action plan, outlined below, while a prisoner held in a local jail would be subject to any steps that facility takes to prevent the spread of COVID-19 in its facility. If a defendant is convicted of or pleads guilty to a federal offense, USMS is to turn the prisoner over to the custody of BOP, which is responsible for confining the prisoner until completion of his or her sentence. BOP is to assign prisoners to one of its facilities based on a series of factors, including the level of security and supervision the prisoner requires, the level of security and staff supervision the facility is able to provide, and the prisoner's program needs (i.e., sex offender, substance abuse treatment, educational/vocational training, individual counseling, group counseling, or medical/mental health treatment). According to the Vera Institute of Justice, \"it is not a matter of if, but when, coronavirus shows up in courts, jails, detention centers, prisons, and other places where the work of the criminal and immigration systems occur.\" While prisons may appear to be closed environments, because prisoners cannot leave and return to the facility on their own volition, there are opportunities for the disease to be introduced into any prison. COVID-19 could be introduced by the prison's staff, who could be exposed when they are not at the prison and subsequently introduce it to the facility when they come to work. COVID-19 could also be transmitted to a prisoner though face-to-face visits with family, friends, or attorneys. Also, while prisoners cannot freely leave the facility, they do travel outside it for things such as court appearances or medical appointments. The introduction of COVID-19 into a prison raises the concern that the nature of the prison environment can facilitate its spread. Prisons typically hold hundreds of prisoners who live in close proximity to one another. In some facilities, prisoners might live in dormitory-style housing where many share the same space. Even if prisoners are housed in individual cells, they typically share the same ventilation system with prisoners in other cells. There are also concerns about hygiene. Prisoners might not have regular access to soap and water to wash their hands, and hand sanitizer can be considered contraband because it contains alcohol. These concerns are especially acute for prison systems that are operating over capacity. There are also concerns about whether prisoners will have access to adequate medical care if a prison's staff is hit hard by the disease. If COVID-19 were to spread among prison staff resulting in wide spread quarantines, there could be fewer medical staff to deliver care or fewer correctional staff available to transport critically ill prisoners to outside medical facilities. Also, prison infirmaries tend to have fewer medical resources, such as isolation beds, compared to hospitals. However, one expert at the National Commission on Correctional Health Care believes that the prisons are prepared to handle potential COVID-19 infections because prisons have experience with preventing the spread of communicable diseases. As of April 16, 2020, BOP has approximately 172,300 prisoners under its jurisdiction, who are held in a combination of BOP-operated facilities (122 in total), privately operated prisons, Residential Reentry Centers (RRCs; i.e., halfway houses), and state prisons. While the federal prison population decreased by approximately 42,000 prisoners (19%) from FY2013 to FY2019, the federal prison system operated at 12% over its rated capacity in FY2019. According to USMS, in FY2019 they received approximately 248,900 prisoners and their average daily detention population was approximately 61,500 prisoners. While BOP does not publish data on the number of prisoners that have health conditions that might make them more susceptible to serious complications if they were to contract COVID-19, as of April 18, 2020, approximately 10,200 prisoners (6% of all prisoners) under BOP's jurisdiction were age 61 or older. BOP also notes, \"the average age of offenders in BOP-managed facilities is 41 years and average length of sentence is 128 months. The average age of offenders in BOP facilities has increased by 8 percent over the past decade. Approximately 45 percent of offenders have multiple chronic conditions that, despite management with medications and other therapeutic interventions, will progress and may result in serious complications.\" USMS does not publish data on the age or health issues of prisoners in their custody. BOP's COVID-19 action plan was announced on March 13, 2020. BOP has modified its action plan as the situation in the federal prison system has dictated. On March 19, 2020, BOP clarified that while there are restrictions on the movement of prisoners between facilities, BOP will transfer prisoners if necessary to properly manage the prison population, subject to certain conditions. On March 31, 2020, BOP announced that effective April 1, 2020, all prisoners would be placed on lockdown, meaning that they may not leave their assigned cell unless it is to attend programs or services offered as a part of normal operating procedures, such as educational programs or mental health treatment. On April 14, 2020, BOP announced that its action plan, which was initially set to expire on April 12, 2020, would be extended until May 18, 2020. BOP's action plan includes the following measures: Sus pending social visits . BOP has suspended social visits for prisoners. To allow prisoners to maintain social ties while social visits are suspended, BOP is allowing prisoners to have 500 minutes per month (compared to the usual 300 minutes) of telephone time. Suspe nding attorney . Like social visits, BOP is suspending visits from attorneys, though BOP is to allow visits from attorneys on a case-by-case basis. Prisoners are to still be allowed to have confidential phone calls with their attorneys, which do not count against the 500 minutes per month limit. Limiting movement of prisoners . BOP is suspending transferring prisoners between facilities, with the exception of transfers for forensic studies, writs, Interstate Agreements on Detainers, medical or mental health treatment, and transfers to pre-release custody. BOP will continue to accept new prisoners, though BOP is working with USMS to limit the number of prisoners transferred from jail facilities to BOP's custody. Prisoners who are moved from one facility to another must have been in BOP's custody for at least 14 days. Prisoners are also to be screened for COVID-19 symptoms (e.g., fever, cough, shortness of breath) before being transferred, and those who present symptoms or have a temperature greater than 100.4 degrees are not to be transferred and instead are to be placed in isolation. Limiting official travel . BOP is suspending official staff travel, with the exception of relocation. Suspending tours . BOP is suspending prison tours, though it can grant exceptions on a case-by-case basis. Reducing staff training . BOP is suspending all staff training, with the exception of basic staff training for new employees at the Federal Law Enforcement Training Center. Limiting contractor access to prisons . BOP is only allowing access for contractors who are providing essential services or those who provide maintenance on essential systems. Essential services include medical or mental health care, religious services, and critical infrastructure repairs. Limiting volunteer access to prisons . BOP is suspending visits to prisons from volunteers, though it can grant some exceptions on a case-by-case basis. Alternative means of communication (e.g., telephone calls) will be provided to prisoners who want to speak privately with a religious volunteer. It is not clear if telephone calls with volunteers count against a prisoner's 500 minutes per month limit. Screening employees . BOP is instituting advanced health screenings of employees at prisons in areas with \"sustained community transmission\" as determined by the Centers for Disease Control and Prevention (CDC). Advanced health screening involves self-reporting of possible exposure to COVID-19 and temperature checks. Volunteers, contractors, attorneys, and tour participants who are granted access to a prison are subject to the same screening procedures. Screening prisoners . BOP maintains an infectious disease management program as a matter of course, but in response to the COVID-19 pandemic BOP has instituted practices specific to mitigating the spread of the disease in its facilities. All new arrivals to the prison are to be screened for COVID-19 exposure risk factors and symptoms, asymptomatic prisoners with noted exposure risk factors are quarantined, and symptomatic prisoners with noted exposure risk factors are to be isolated and tested for COVID-19. Modifications to operations . BOP is making modifications to its operations, if the facility's population and physical layout make modifications feasible, to allow for social distancing and to limit group gatherings. For example, prisons might stagger meal and recreation times. USMS has not released a COVID-19 prevention plan, but as discussed above, USMS does not operate its own jail system and prisoners are subject to any plans developed and implemented by the facility in which they are housed. However, if a prisoner develops complications from COVID-19 that could not be adequately treated in the facility in which he or she is housed, USMS would assume the cost of transporting the prisoner to a local medical facility and covering the cost of the medical care provided. DOJ lacks the authority to grant early release to prisoners for the specific purpose of mitigating the transmission of a communicable disease. However, there are authorities that may provide avenues for some federal prisoners to be released in response to the COVID-19 pandemic. These authorities include statutory provisions allowing (1) federal courts to reopen pretrial detention hearings or permit temporary release of prisoners under certain circumstances, (2) for federal prisoners to be released before completing their sentences, and (3) for federal prisoners to be placed in the community to serve the final portion of their sentences. Additionally, the President retains constitutional authority to grant clemency for federal offenses, which can include commuting a prisoner's sentence to time served. A person arrested for a federal offense must be brought before a judge \"without unnecessary delay,\" and the judge \"shall order that such person be released or detained, pending judicial proceedings.\" 18 U.S.C. Section 3142 governs the circumstances under which a person charged with a federal offense may be ordered released or incarcerated pending trial. The statute reflects a preference for release on personal recognizance or unsecured appearance bond, subject to limited conditions, \"unless the judicial officer determines that such release will not reasonably assure the appearance of the person as required or will endanger the safety of any other person or the community.\" However, if after a hearing the judge finds by clear and convincing evidence that no condition or combination of conditions will reasonably assure the defendant's appearance and the safety of others, the judge must order the detention of the person before trial. Though the statute purports to establish an order of preference favoring release for federal criminal defendants, it appears that the majority of defendants accused of federal crimes and presented to a judge are, in fact, incarcerated. Two provisions of Section 3142 provide means to seek court-ordered release from pretrial detention after a detention determination has been made. First, under Section 3142(f)(2) a detention hearing may be \"reopened\" at any time prior to trial if the judge \"finds that information exists that was not known to the movant at the time of the hearing and that has a material bearing on the issue\" of whether any conditions of release would reasonably assure the defendant's appearance and the safety of others. Second, under Section 3142(i) a judge who has entered a detention order may issue a subsequent order permitting the \"temporary release\" of the accused where \"necessary for preparation of the person's defense or for another compelling reason.\" Thus, release under either provision is necessarily dependent on judge-made determinations that may be highly case- and fact-specific. Multiple federal courts have addressed requests for release under these provisions of Section 3142 in light of COVID-19 concerns, considering factors including \"(1) the original grounds for the defendant's pretrial detention, (2) the specificity of the defendant's stated COVID-19 concerns, (3) the extent to which [a] proposed release plan is tailored to mitigate or exacerbate other COVID-19 risks to the defendant, and (4) the likelihood that the defendant's proposed release would increase COVID-19 risks to others.\" The courts' responses to the requests have been mixed. In one case, the U.S. District Court for the Southern District of New York ruled that both provisions of Section 3142 supported a defendant's release subject to conditions of home incarceration and electronic location monitoring. At the outset, the court viewed the \"unprecedented and extraordinarily dangerous nature of the COVID-19 pandemic,\" in conjunction with new information that had come to light about the defendant's dangerousness, as sufficiently changed circumstances bearing on risk to the community to necessitate reconsideration of the defendant's detention. And in light of those changed circumstances, the court determined that the weight of the evidence now clearly and convincingly tipped in favor of concluding that the defendant did not pose a danger to the community and should be conditionally released. The court also ruled that the impact of the COVID-19 outbreak on the defendant's ability to prepare his defense constituted a \"compelling reason\" justifying temporary release under Section 3142(i), noting that BOP's suspension of visits except on a case-by-case basis limited the defendant's access to his attorney. By contrast, other federal courts have rejected arguments that the COVID-19 pandemic justifies release under Section 3142. In one case, where the defendant argued that his \"advanced age\" and medical conditions (which included a history of stroke and heart attack) warranted temporary release under Section 3142(i) in response to the ongoing outbreak, the court recognized that that provision has been used only \"sparingly\" and noted that (1) the defendant's medical conditions appeared to be \"well managed,\" (2) there were no reported incidents of COVID-19 within the defendant's detention center, and (3) BOP was taking \"system-wide precautions to mitigate the possibility of infection within its facilities.\" Accordingly, the court concluded that the possibility of an outbreak in the facility was not a \"compelling\" reason under Section 3142(i). Likewise, a district court in Maryland, while acknowledging that the health risk from COVID-19 can constitute new information with a material bearing on release under Section 3142(f)(2) and may even implicate constitutional concerns under the Due Process Clauses if conditions of confinement expose a defendant to serious illness, ruled that a defendant charged with a serious crime and who has an extensive criminal history should be detained despite health conditions like high blood pressure and diabetes. The court in that case viewed defendant's health conditions as insufficient on their own to rebut the government's proffer that precautionary measures were being implemented at the defendant's detention center to protect detainees from exposure to COVID-19. In short, although a significant number of federal defendants have sought release under Section 3142 in light of the COVID-19 outbreak, the highly individualized and fact-specific nature of the inquiry makes Section 3142 a somewhat limited avenue for the release of federal prisoners in response to COVID-19. Once a person has been convicted of a federal offense and sentenced to a term of imprisonment, a federal court can reduce the sentence under 18 U.S.C. Section 3582(c)(1)(A) and impose a term of probation or supervised release, with or without conditions, equal to the amount of time remaining on the prisoner's sentence if the court finds that \"extraordinary and compelling reasons warrant such a reduction,\" or, for certain offenders, if the prisoner is at least 70 years of age, the prisoner has served at least 30 years of his or her sentence, and a determination has been made by BOP that the prisoner is not a danger to the safety of any other person or the community. A petition for compassionate release can be filed by BOP itself. In the alternative, a prisoner can file such a petition if he or she has fully exhausted all administrative rights to appeal BOP's refusal to bring a motion on the prisoner's behalf or upon a lapse of 30 days from the receipt of such a request by the warden of the prisoner's facility, whichever is earlier. Sentence reductions under Section 3582(c)(1)(A) must be consistent with any applicable policy statements issued by the U.S. Sentencing Commission. Under the current sentencing guidelines, \"extraordinary and compelling reasons\" for a sentence reduction include the following: The prisoner is suffering from a terminal illness (i.e., a serious and advanced illness with an end of life trajectory). A specific prognosis of life expectancy (i.e., a probability of death within a specific time period) is not required. The prisoner is suffering from a serious physical or medical condition, suffering from a serious functional or cognitive impairment, or experiencing deteriorating physical or mental health because of the aging process that substantially diminishes the ability of the prisoner to care for himself or herself while incarcerated and the prisoner is not expected to recover from the condition. The prisoner is at least 65 years old, is experiencing a serious deterioration in physical or mental health because of the aging process, and has served at least 10 years or 75% of his or her term of imprisonment, whichever is less. The caregiver of the prisoner's minor child or minor children dies or is incapacitated. The prisoner's spouse or registered partner is incapacitated, and the prisoner is the only available caregiver. BOP determines that there is an extraordinary and compelling reason other than, or in combination with, the reasons described above. There are limits on whether a prisoner can be released from BOP's custody using compassionate release. First, BOP cannot unilaterally release elderly or terminally ill offenders under this authority; a petition for compassionate release has to be approved by a federal court, based on consideration of multiple case-specific factors. Also, only certain prisoners 70 years of age or older can be released without a finding that there is a compelling and extraordinary circumstance for their release. While the compassionate release statute allows for prisoners who are under the age of 70 to be released from prison before completing their sentence, in cases where the prisoner would potentially be released for reasons related to the prisoner's health, the prisoner must be seriously ill. A prisoner's ability to seek release from a federal court is also limited by the requirement contained in Section 3582 that the prisoner exhaust all administrative rights of review or wait 30 days. Courts have split on whether that requirement may be waived in the context of the COVID-19 pandemic. The U.S. Court of Appeals for the Third Circuit has viewed the exhaustion requirement as unwaivable, characterizing a prisoner's failure to comply with the requirement as \"a glaring roadblock foreclosing compassionate release\" and observing that \"strict compliance\" with the statutory obligation is of \"critical ... importance\" even during the ongoing pandemic. However, other lower federal courts have concluded that they have the discretion to waive the exhaustion requirement, indicating (among other things) that Congress could not \"have intended the 30-day waiting period of 3582(c)(1)(A) to rigidly apply in the highly unusual\" circumstances of the COVID-19 pandemic. Assuming the exhaustion requirement is not an impediment to judicial relief, a court still might not consider people with underlying medical conditions such as hypertension, heart disease, lung disease, or diabetes, which might make them more likely to suffer from serious complications if they were to contract COVID-19 to meet any of the \"extraordinary and compelling reasons\" specified in the U.S. Sentencing Guidelines. Multiple federal courts have rejected requests for release under Section 3582 in light of COVID-19 transmission risk. For instance, a prisoner in one case argued that he should be released to home confinement in part because the conditions of his confinement in a federal prison facility created \"the ideal environment for the transmission\" of COVID-19 and he was \"at a heightened risk\" in light of health conditions such as high blood pressure, high cholesterol, asthma, and allergies. The government opposed the prisoner's request, pointing to BOP's \"extensive action plan\" to address the pandemic, and the court sided with the government. Specifically, the court determined that the prisoner's motion did not meet the requirements for modifying a sentence for extraordinary and compelling reasons because, among other things, the prisoner had \"not shown that the plan proposed by the Bureau of Prisons is inadequate to manage the pandemic within [the prisoner's] correctional facility, or that the facility is specifically unable to adequately treat\" him. As such, though the court noted that \"public health recommendations are rapidly changing,\" it concluded that at least as of the ruling date, it could not assume that BOP would \"be unable to manage the outbreak or adequately treat [the prisoner] should it emerge at his correctional facility while he is still incarcerated.\" Nevertheless, some other courts have authorized compassionate release because of the COVID-19 pandemic. One federal court, for example, concluded that a prisoner with a compromised immune system had shown an extraordinary and compelling reason justifying release to home incarceration under Section 3582 in light of \"the COVID-19 public health crisis,\" though the government in that case did not oppose the request. Aside from the question of whether COVID-19 transmission risk would be considered an \"extraordinary and compelling reason[]\" to grant release, which could vary depending on the circumstances before the court considering the request, if a prisoner is granted compassionate release it does not mean that the prisoner is no longer involved in the criminal justice system. The court can impose a term of probation or supervised release for the prisoner, and there might be a question about whether U.S. Probation and Pretrial Services Offices has the necessary resources to handle an unexpected influx of probationers. Under 34 U.S.C. Section 60541(g), BOP is authorized to conduct a program that places eligible elderly and terminally ill prisoners on home confinement. The Attorney General is authorized to designate the prisons at which the program will be conducted. Elderly prisoners who are eligible for home confinement under the program are those who are at least 60 years old; have never been convicted of a violent, sex-related, espionage, or terrorism offense; are sentenced to less than life; have served two-thirds of their sentence; have not been determined by BOP to have a history of violence, or of engaging in conduct constituting a sex, espionage, or terrorism offense; have not escaped or attempted to escape; received a determination that release to home detention would result in a substantial reduction in cost to the federal government; and received a determination that he or she is not a substantial risk of engaging in criminal conduct or of endangering any person or the public if released to home detention. Terminally ill prisoners who are eligible for early release under the program generally have to meet the same criteria as eligible elderly prisoners, except they can be of any age and have served any portion of their sentences, even life sentences. The ability of BOP to release prisoners under this authority has some limitations similar to those associated with compassionate release, except under this authority BOP can place prisoners on home confinement without the approval of a federal court. Under 18 U.S.C. Section 3624(c), BOP is authorized to place a prisoner in a Residential Reentry Center for up to 12 months at the end of his or her sentence. BOP is also ordinarily authorized to place a prisoner on home confinement for a period of time equal to 10% of his or her sentence or six months, whichever is shorter. Though BOP must make individualized determinations as to whether placement in an RRC or home confinement is appropriate, the statute \"grants considerable discretion to the BOP\" in making such determinations. The Coronavirus Aid, Relief, and Economic Security Act (the CARES Act; P.L. 116-136 ), permits the BOP Director to lengthen the maximum amount of time for which a prisoner may be placed on home confinement under Section 3624(c)(2) \"as the Director determines appropriate\" when the Attorney General \"finds that emergency conditions will materially affect the functioning\" of BOP. The authority is limited, however, to \"the covered emergency period,\" which is defined as the period spanning from the President's declaration of a national emergency with respect to COVID-19 to the date that is 30 days after the date on which the declaration terminates. As discussed below, the Attorney General issued a memorandum to the BOP Director making the requisite finding under the CARES Act and thereby authorizing the director to make expanded use of home confinement. Under Article II, Section 2 of the U.S. Constitution, the President has broad authority to grant relief from punishment for federal criminal offenses. One form of executive clemency is commutation of a sentence, whereby the sentence imposed by a federal court is replaced by a less severe punishment, such as reducing a prisoner's sentence to time served. While it is not required by the Constitution, there is a process for prisoners who want to have their sentences commuted to submit a petition for executive clemency through DOJ's Office of the Pardon Attorney. Regulations state that prisoners should not submit petitions for commutations if other forms of judicial or administrative relief are available, unless there is a showing of \"exceptional circumstances\" for submitting the petition. When a petition is received, the Pardon Attorney conducts an investigation to determine the merit of the petition, which can include collecting reports from or using the services of federal agencies, such as the Federal Bureau of Investigation. After the investigation is concluded, the Pardon Attorney submits a recommendation about the merits of the petition to the Attorney General through the Deputy Attorney General. The Attorney General makes a final recommendation to the President about whether the petition for clemency should be granted. Guidance issued by DOJ notes that commuting a sentence is an \"extraordinary remedy\" and that grounds for considering commutation include \"disparity or undue severity of sentence, critical illness or old age, and meritorious service rendered to the government by the petitioner\" (such as aiding the government in an investigation) and/or \"other equitable factors,\" such as demonstrating rehabilitation or \"exigent circumstances unforeseen by the court at the time of sentencing.\" The process for applying for executive clemency established by DOJ regulations and guidance does not \"restrict the authority granted to the President under Article II, Section 2 of the Constitution.\" Therefore, the President could grant commutations to federal prisoners who do not submit a petition to DOJ or to those who do not meet the standards outlined by DOJ. Some advocates and commentators have called for the President to exercise this authority to commute federal prison sentences for populations vulnerable to COVID-19. As of April 6, 2020, Attorney General William Barr has issued three memoranda that provide direction on DOJ's response to the COVID-19 pandemic. Two of the memoranda were to BOP, and they outlined how BOP should use its home confinement authorities to reduce the spread of COVID-19 in federal prisons. The other memorandum was to all components of DOJ, including all U.S. Attorney's Offices, and it provides guidance regarding when prosecutors should seek pretrial detention for federal defendants in light of the risks some people might face if they were jailed pending adjudication of their cases. On March 26, 2020, Attorney General William Barr issued a memorandum to BOP Director Michael Carvajal directing him to \"prioritize the use of [BOP's] various statutory authorities to grant home confinement for inmates seeking transfer in connection with the ongoing COVID-19 pandemic.\" In the memorandum, the Attorney General notes that there are some at-risk prisoners who are incarcerated for nonviolent crimes, pose a minimal risk of recidivism, and might be safer serving their sentences on home confinement rather than in a BOP facility. However, the Attorney General also states that many prisoners will be safer in BOP facilities where the population is controlled and there is ready access to doctors and medical care. The memorandum requires BOP when making a decision about which prisoners to place on home confinement to consider the \"totality of the circumstances\" for each prisoner, statutory requirements for home confinement, and the following discretionary factors: the age and vulnerability of the prisoner to COVID-19, in accordance with CDC guidelines; the security level of the facility where the prisoner is held, with priority given to prisoners held in low- and minimum-security facilities; the prisoner's conduct in prison, with those who have engaged in violent or gang-related activities while incarcerated or who have been found to have violated institutional rules not receiving priority consideration for home confinement; the prisoner's risk assessment score under BOP's risk and needs assessment system, with prisoners who have more than a minimum score not receiving priority consideration for home confinement; whether the prisoner has a re-entry plan, which includes verification that the conditions under which the prisoner would be confined after release would present a lower risk of contracting COVID-19 than if the prisoner remained incarcerated in a BOP facility; the prisoner's crime of conviction and an assessment of the risk to public safety posed by him or her (the memorandum notes that some offenses, such as sex offenses, will make a prisoner ineligible for home confinement, while convictions for other \"serious\" offenses should weigh more heavily against placing the prisoner on home confinement). In addition to these factors, prisoners considered for home confinement must be assessed, based on CDC guidance, for risk factors for \"severe COVID-19 illness,\" risks of COVID-19 illness at the prisoner's current facility, and risk of COVID-19 illness at the location where the prisoner would be placed on home confinement. BOP is not to place prisoners on home confinement if it would increase their risk of contracting COVID-19 or increase the risk of spreading COVID-19 in the community. The memorandum also directs BOP to place prisoners in a 14-day quarantine before they are transferred to home confinement. In a subsequent memorandum issued on April 3, 2020, the Attorney General invokes the authority granted under the CARES Act and directs BOP to review all prisoners with risk factors for serious complications related to COVID-19 for possible placement on home confinement. The memorandum directs BOP to focus on prisoners incarcerated at Federal Correctional Institution (FCI) Oakdale, FCI Danbury, and FCI Elkton, and any other \"similarly situated facilities where [BOP] determine[s] that COVID-19 is materially affecting operations.\" BOP is directed to immediately process all prisoners who are deemed to be suitable candidates for home confinement. Prisoners are to be placed on home confinement after a 14-day in-prison quarantine. BOP is also authorized on a case-by-case basis to place prisoners on home confinement without first quarantining them in prison. In these cases, a prisoner would be required to quarantine at home for a 14-day period. The Attorney General warns against potentially spreading COVID-19 by releasing prisoners to home confinement. Thus, BOP is directed to follow the criteria outlined in the March 26 memorandum when making decisions about which prisoners should be released, with the understanding that prisoners \"with a suitable confinement plan will generally be approved candidates for home confinement rather than continued detention at institutions in which COVID-19 is materially affecting their operations.\" In the memorandum, the Attorney General acknowledges that BOP has limited resources to monitor all prisoners on home confinement and the U.S. Probation Office is unable to monitor large numbers of prisoners in the community. Despite these limitations, the Attorney General authorizes BOP to place prisoners on home confinement even if electronic monitoring is not available, \"so long as BOP determines in every such instance that doing so is appropriate and consistent with [DOJ's] obligation to protect public safety.\" Regarding public safety, the Attorney General notes that while DOJ has an obligation to protect federal prisoners, DOJ also has an obligation to protect public safety and cannot \"simply release prison populations en masse onto the streets.\" The Attorney General notes that while he is directing BOP to expand the use of home confinement for prisoners at affected prisons, \"it is essential that [BOP] continue making careful, individualized determinations BOP makes in the typical case. Each inmate is unique and each requires the same individualized determinations [that] have always been made in this context.\" On April 6, 2020, the Attorney General issued a memorandum to the U.S. Attorney's Offices and the heads of components of DOJ that provides guidance on when DOJ should seek pretrial detention for defendants. The Attorney General notes that under the Bail Reform Act (BRA), defendants must be detained pending trial where \"no condition or combination of conditions will reasonably assure the appearance of the person as required and the safety of any other person and the community\" and that for certain crimes it is assumed that \"no condition or combination of conditions will reasonably assure the appearance of the person as required and the safety of the community.\" The Attorney General encourages prosecutors to continue to seek pretrial detention for defendants that pose a risk to public safety or a flight risk as outlined in the BRA. The Attorney General also notes that a defendant's physical and mental condition can be considered when making determinations about pretrial detention under the BRA and prosecutors should consider the \"medical risks associated with individuals being remanded into federal custody during the COVID-19 pandemic.\" The Attorney General directs prosecutors to consider not seeking pretrial detention to the extent that they would under normal circumstances, especially for defendants who have \"not committed serious crimes and who pose little risk of flight (but no threat to the public) and who are clearly vulnerable to COVID-19 under CDC Guidelines.\" The memorandum directs prosecutors to conduct the same analysis when litigating motions filed by defendants who want the court to reconsider its decision to order pretrial detention in light of the pandemic. When considering motions filed by defendants, prosecutors are also directed to consider the risk a defendant poses of spreading COVID-19 in the community if he or she were released. As described previously, Congress has passed legislation in response to the COVID-19 pandemic that modifies one of the authorities addressed in this reportârelease to home confinement under 18 U.S.C. Section 3624(c)(2). However, at least one bill has been introduced that would appear to further facilitate the release of some federal prisoners in the context of a national emergency related to a communicable disease. Introduced legislation would appear to further supplement some of the authorities discussed above. S. 3579 and H.R. 6400 would require that certain federal prisoners in the custody of BOP or USMSâthose who are pregnant, age 50 or older, have certain underlying medical conditions, or have 12 months or less to serveâimmediately be placed in community supervision when a \"national emergency relating to a communicable disease\" has been declared and for 60 days after it has expired. In making such placements, the directors of BOP and USMS would be obligated to \"take into account and prioritize\" placements enabling \"adequate social distancing,\" with home confinement given as one example. Individuals falling into qualifying categories would be excepted from placement in community supervision under the bills, however, if the Director of BOP or Director of USMS determines by clear and convincing evidence that they are \"likely to pose a specific and substantial risk of causing bodily injury or using violent force against the person of another.\" It thus appears that S. 3579 and H.R. 6400 would enhance current authorities that permit the release of federal prisoners in response to COVID-19. Specifically, under both bills some federal criminal defendants in pretrial detention would be eligible for immediate release to community supervision (assuming they meet the health or other criteria) without the need to file individual petitions seeking the reopening of their detention hearing based on new information or asserting a \"compelling reason\" for temporary release. And those detained solely because they were previously determined to be a flight risk would appear to qualify for relief under both bills, as the bills' only exception for those eligible for relief are detainees that are determined to pose a risk of causing bodily injury or using violent force against another. Additionally, for those currently serving federal sentences in BOP facilities, S. 3579 and H.R. 6400 would appear to establish another alternative for release to community confinement in the context of the COVID-19 pandemic beyond 18 U.S.C. Section 3624(c) and 34 U.S.C. Section 60541(g), as BOP would be required to release a prisoner over 50 years old, with a covered health condition, or who is within 12 months of release from incarceration unless the exception applied. ", "summary": "There is concern that coronavirus disease 2019 (COVID-19) could quickly spread among federal prisoners and prison staff because of the nature of the prison environment. Prisons are places where hundreds of prisoners and staff are living and working in close proximity to each other and where they are forced to have regular contact. Prisons are generally not conducive to social distancing. Also, prison infirmaries typically do not have the resources available to most hospitals, such as isolation beds, that would help prevent the spread of the disease. There are also concerns that if prison staff were hard hit by COVID-19, a significant number of staff would require quarantine; they would be unavailable to perform their duties, including providing care to sick prisoners; and the disease could spread. On March 13, 2020, the Bureau of Prisons (BOP) released a COVID-19 action plan. The action plan largely focuses on restricting access to federal prisons and limiting the movement of prisoners between prisons. On March 18, 2020, the American Civil Liberties Union (ACLU) sent a letter to the Department of Justice (DOJ) and its BOP seeking the release of prisoners in the custody of BOP and the U.S. Marshals Service (USMS) who might be at risk for serious illness because of COVID-19, and a reduction in the intake of new prisoners to avoid overcrowding. In addition, multiple Members of Congress have also urged DOJ and BOP to take steps \"to reduce the incarcerated population and guard against potential exposure to coronavirus,\" and legislation has been introduced that would require the release of some federal prisoners during a national emergency relating to a communicable disease. BOP updated its action plan on March 19, 2020, to clarify that while prisoner movement is limited under the plan, BOP will still move prisoners as needed to properly manage the prison population and to outline new conditions that must be met if a prisoner is transferred. On March 31, 2020, BOP announced that effective April 1, 2020, all prisoners will be placed on a 14-day lockdown in their assigned cells as a measure to prevent the spread of COVID-19. Prisoners will be allowed to leave their cells during this period for certain reasons, such as attending programming or to shower and use the phone. On April 14, 2020, BOP announced that its action plan, which was initially set to expire on April 12, 2020, would be extended until May 18, 2020. Regarding the release of federal criminal defendants in detention pending trial, 18 U.S.C. Section 3142 allows for federal courts to reopen pretrial detention hearings based on new information or permit temporary release of pretrial detainees for \"compelling\" reasons. With respect to the release of federal prisoners who are currently serving their court-imposed sentences, 18 U.S.C. Section 3582(c)(1)(A) permits a federal court to reduce a prisoner's sentence and impose a term of probation or supervised release if the court finds that \"extraordinary and compelling reasons warrant such a reduction,\" or the prisoner is at least 70 years of age, the prisoner has served at least 30 years of his or her sentence, and BOP has determined that the prisoner is not a danger to the safety of any other person or the community. Under 34 U.S.C. Section 60541(g), BOP is authorized to conduct a program whereby elderly and terminally ill prisoners who meet certain statutory requirements can be placed on home confinement. Under 18 U.S.C. Section 3624(c), BOP is authorized to place prisoners in a Residential Reentry Center (i.e., a halfway house) and/or on home confinement at the end of their sentences. The Coronavirus Aid, Relief, and Economic Security Act (the CARES Act; P.L. 116-136 ) permits the BOP Director to extend the maximum amount of time for which a prisoner may be placed on home confinement under Section 3624(c)(2) under certain circumstances. Under Article II, Section 2 of the U.S. Constitution, the President has broad authority to grant clemency for federal offenses, which can include commuting a prisoner's sentence to time served. The Attorney General has issued three memoranda outlining how DOJ will utilize the legal authorities available to it to respond to the COVID-19 pandemic. Two of the memoranda are to the BOP Director, and they direct BOP to increase the number of prisoners placed on home confinement and outline factors for BOP to consider when making decisions about which prisoners should be released from federal prison. The other memorandum is for all components of DOJ, including all United States Attorneys, and it provides a directive on how prosecutors should make decisions about the use of pretrial detention for federal defendants in light of possible exposure to COVID-19.", "document_type": "crs"}
{"report": "According to a 2014 study conducted by the National Center for Education Statistics (NCES) within the U.S. Department of Education (ED), 53% of public elementary and secondary schools need to spend money on repairs, renovations, and modernizations to put their onsite buildings in good overall condition. The study estimated that the nationwide spending necessary to reach this standard would be approximately $197 billion, or about $4.5 million per school that needs improvements. The 2014 study was the first by NCES to estimate such costs since a 2000 report and is the most recent available. As there is no ongoing federal data collection on the physical condition of schools, it is difficult to assess the current state of the nation's school facilities and the need for infrastructure investment. While the construction, renovation, repair, and maintenance of public school facilities have primarily and typically been the responsibility of state and local governments, the federal government has provided some funding for construction and renovation for specific purposes. This report provides a description of and background for selected provisions of the Rebuild America's Schools Act of 2019 ( H.R. 865 / S. 266 ), which was ordered to be reported by the House Committee on Education and Labor on February 26, 2019. H.R. 865 proposes to authorize $70 billion in grants and facilitate $30 billion in school infrastructure tax credit bonds to be used toward the construction and repair of public elementary and secondary school facilities. Grant funds and school infrastructure bond limits would be allocated to states proportionally based on their prior-year local educational agency (LEA) grant allocations under Title I-A of the Elementary and Secondary Education Act (ESEA). Additional funds would also be authorized for Impact Aid construction payments authorized under Section 7007 of the ESEA for FY2020 through FY2023. Funding public schools has traditionally been primarily the responsibility of state and local governments. In school year 2015-2016, for instance, public elementary and secondary schools in the United States collectively received about 47% of their revenue from state governments and about 45% from local governments. Of the local revenue, the majorityâapproximately 81%âwas derived from property taxes. While different states and LEAs have access to various other funding streams and mechanisms to finance school construction, a common practice to raise funds for this purpose is to issue a general obligation bond (backed by the credit of the state or local government) and repay the debt over time with revenue from sources such as property taxes. Nationwide, public schools spent approximately $48 billion on facilities acquisition and construction in the 2015-2016 school year. While state and local governments typically provide the majority of support for facilities-related expenditures in public K-12 schools, the federal government also provides some direct and indirect support for school infrastructure. Federal direct support is provided through loans and grants to K-12 schools with specific needs or serving certain populations of students. For example, there are school infrastructure grant programs respectively for schools with high populations of students with disabilities or students who are Alaska Natives, Native Hawaiians, American Indians, or children of military parents. Funding is also available to schools affected by natural disasters or located in rural areas. Additionally, there are facilities financing assistance programs to encourage the development of charter schools. Although ED administers several of the grant programs funding facilities at elementary and secondary schools, other agencies, such as the Department of the Interior and the Department of Defense, also administer programs. Aside from the targeted efforts, a one-time appropriation of $1.2 billion was made under the Consolidated Appropriations Act for FY2001 ( P.L. 106-554 ) for emergency school renovation and repair activities, as well as activities under Part B of the Individuals with Disabilities Education Act and technology activities. Most recently, Congress provided a one-time appropriation in 2009, as part of the response to the Great Recession, that could be used for renovation and construction, among other purposes. The American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ) authorized a $54 billion State Fiscal Stabilization Fund (SFSF). States were required to use at least 81.8% of their share of the SFSF to restore support of public elementary, secondary, and postsecondary schools, and, as applicable, early childhood education programs and services. Among the allowable uses of restoration funds were modernization, renovation, or repair of public school facilities. States were required to use the remaining 18.2% of their share of the SFSF for education, public safety, and other government services, which included modernization, renovation, or repair of public school and public or private college facilities, depending on the criteria that the state's governor used to allocate the funds. ED issued guidance specifically allowing a portion of the SFSF to be used for the construction of K-12 schools but not institutions of higher education. Another large source of federal contributions to school facilitiesâthe forgone revenue attributable to the exemption of interest on state and local governmental bonds used for school construction, modernization, renovation, and repairâis indirect. The Internal Revenue Code (IRC, or Chapter 26 of the U.S. Code) provides for the federal government to exempt interest income earned on bonds issued by state, local, and tribal governments for a \"public\" purpose from federal income tax (26 U.S.C. Â§103). Â Examples of public projects include elementary, secondary, and postsecondary schools; public buildings; and roads. The tax exemption lowers the cost of capital for state and local governments because investors are generally willing to accept a lower rate of return when it is not subject to federal taxation. There is no bond volume cap on tax exempt state and local government bonds. H.R. 865 would support public elementary and secondary school construction through several approaches. ED would administer federal grants, the Department of the Treasury would administer tax credit bonds, and regular reports on the condition and need for school facilities would fill a knowledge gap in order to inform future federal support. The following sections summarize the major provisions of the four titles included in H.R. 865 . Title I would authorize grants for the long-term improvement of public school facilities, Title II would authorize school infrastructure bonds, Title III would cover general provisions, and Title IV would authorize a temporary increase in funding for Impact Aid construction. H.R. 865 would authorize $7 billion in grants per fiscal year from FY2020 to FY2029 to support long-term improvements to public school facilities. Of the amounts appropriated, 0.5% would be reserved for the outlying areas, and 0.5% would be reserved for schools funded by the Bureau of Indian Education. The remainder would be allocated to the states in proportion to their share of all ESEA Title I-A state grants allocated during the prior fiscal year with no hold harmless provision applied. The states would then award competitive grants to qualified LEAs. To be eligible for an allocation, a state would have to submit a plan to ED that describes how it would use the funds to make long-term improvements to public school facilities and how it would maintain fiscal effort for the funded activities after it no longer receives the allocation. The plan would also need to explain how the state would determine the eligibility and priority of grant recipients and carry out its state-level responsibilities. States would be required to match 10% of the allocated amount from nonfederal sources to support the activities funded by the allocation. A maintenance of effort provision would also require that the fiscal effort per student or aggregate expenditure by the states on public school facilities could not be less than 90% of the level in the prior fiscal year. Further, states would be required to use their allocations to supplement not supplant federal, state, and local public funds that would otherwise be available for supported activities. The bill would allow states to reserve no more than 1% of their allocation for their state-level responsibilities, including providing technical assistance to LEAs and developing an online database that contains an inventory of the infrastructure of all public school facilities in the state. Such funds could also be used for issuing and reviewing health and safety regulations and creating a plan to reduce exposure to toxins and chemicals. To be eligible to receive a competitive grant from the state, an LEA would have to have received an ESEA Title I-A grant in the previous year. Further, an LEA would have to be among those with the highest number or percentage of children \"counted\" in the formulas used to allocate ESEA Title I-A state grants. LEAs meeting these criteria would also be required to prioritize improvement of facilities of public schools that serve the highest percentages of students who qualify for free or reduced price lunches. Additional consideration in the awarding of grants to LEAs may be given to those with school facilities that pose a severe health or safety threat. States would have to ensure that LEA grantees represent the geographic diversity of the state. In addition, states would have the option of including the need to improve facilities or having the most limited capacity to raise funds for that purpose in the LEA eligibility criteria. States would be required to prioritize applications from LEAs by comparing these eligibility criteria. Additionally, states would be able to prioritize applications for grants to improve access to broadband or grants for schools without access to broadband. To be considered for a competitive grant, qualifying LEAs would have to submit an application to the state. Application requirements could be determined by the individual states, but H.R. 865 would require all applications to include certain information: information necessary for the state to determine eligibility and priority; a description of the projects that the LEA plans to carry out with the grant; an explanation of how such projects will reduce risks to the health and safety of staff and students at schools served by the LEA; and for charter schools, whether the operator has control or ownership of the facility, and the extent to which the charter schools lack access to funding through financing methods available to public schools or LEAs in the state. After grants are awarded, the bill would require certain actions by LEAs, states, and ED. Within 180 days of receiving a grant, an LEA would be required to submit to the state a 10-year facilities master plan. Each LEA that receives a grant would also be required to annually compile, publish, and submit to the state certain information about the LEA, its student population, and projects funded by the grant. States would then be required to compile, publish, and distribute such information to the LEAs, the public, and tribal governments in the state. In addition, states would be required to submit the information to the Secretary of Education. By the end of each fiscal year, the Secretary of Education would be required to submit a report to the House Committee on Education and Labor and the Senate Committee on Health, Education, Labor, and Pensions (hereinafter, the \"appropriate congressional committees\") containing the information collected from the states. H.R. 865 would reauthorize certain repealed tax credit bonds (TCBs) and authorize a new TCB, School Infrastructure Bonds. TCBs are an alternative to tax-exempt bonds that offer investors a federal tax credit or the issuer a direct payment proportional to the bond's value in lieu of a federal tax exemption. Before the 2017 tax revision ( P.L. 115-97 ) repealed the authority to issue new TCBs after December 31, 2017, Qualified School Construction Bonds (QSCBs) and Qualified Zone Academy Bonds (QZABs) were TCBs used to fund school construction and renovation, among other purposes. The bill would also apply certain wage rate requirements to any school infrastructure bond, as have been required for QZABs issued since the date of the enactment of the ARRA. The remainder of this section provides more-detailed information about the various bond provisions included in H.R. 865 . H.R. 865 would amend the Internal Revenue Code to authorize QSCBs and QZABs for the first time since 2017. QSCBs made bond proceeds available for the construction, rehabilitation, or repair of, or the acquisition of land for, a public school facility, including charter schools but excluding postsecondary facilities. They were generally allocated to states based on a state's share of ESEA Title I-A grants. The bonds had a national limit of $11 billion in each of 2009 and 2010. The authority to issue QSCBs expired at the end of calendar year 2010. H.R. 865 would not authorize a new bond limitation for QSCBs, but it would restore a subparagraph in statute (formerly 26 U.S.C. 54A(d)(1)(E)) listing QSCBs as a qualified tax credit bond. H.R. 865 would also reauthorize QZABs, remove the former private business contribution requirement associated with them, and set the bond limitation at $1.4 billion for each calendar year into perpetuity. In addition to school renovation, the bill would authorize QZABs to be used to fund school construction as well. To be eligible to receive the proceeds from QZABs, a school must be public; be providing education or training below the postsecondary level in an empowerment zone or enterprise community, or have 35% or more of its students qualified for free or reduced price lunches; and cooperate with businesses to enhance the school's curriculum, increase graduation and employment rates, and prepare students for college and the workforce. Under H.R. 865 , School Infrastructure Bonds would function as a new type of tax credit bond to support long-term improvements to public school facilities. The bill would authorize a national volume cap of $10 billion in School Infrastructure Bonds per calendar year from 2020 to 2022. As with the grant appropriation, 0.5% of the annual bond limitation of $10 billion would be allocated to possessions of the United States, and 0.5% would be allocated to the Secretary of the Interior for schools funded by the Bureau of Indian Education. The remainder would be allocated to the states in proportion to their share of all prior-year Title I-A state grants, as authorized under the ESEA, with no hold harmless provision applied. State educational agencies and the U.S. possessions would then allocate their share of the bond limitation to issuers within their jurisdictions using the same required eligibility and priority criteria established for the competitive grant program in Title I of H.R. 865 . The new School Infrastructure Bond program would provide bond holders with a tax credit equal to 100% of the amount of interest payable by the issuer, and any unused credit could be carried over to the succeeding taxable year. The bill would require bond issuers to spend 100% of the available project proceeds within six years of the date of issuance. By the end of each fiscal year, the Secretary of the Treasury would be required to submit an annual report on the bond program to the appropriate congressional committees. H.R. 865 would place certain restrictions on how funds from grants or bonds may be used. Allowable uses would generally include new construction, renovation, major repairs, site acquisition, the reduction or elimination of toxins and pests, the expansion of access to broadband, and compliance with the Americans with Disabilities Act, among other uses for public school facilities. Funds could also be used to develop the facilities master plans required by the bill. LEAs would be prohibited from using funds for routine and predictable maintenance, minor repairs, facilities used primarily for athletic contests or other events that charge admission, vehicles, or facilities that are not primarily used to educate students. The bill also specifies, for each year, a certain percentage of funds used for new construction or renovation that would have to be used for such activities that are certified, verified, or consistent with \"green\" standards. The applicable percentage would be 60% in FY2020, 70% in FY2021, 80% in FY2022, 90% in FY2023, and 100% in FY2024 through FY2029. For FY2030 and thereafter, there would be no such requirement for QZABs. LEAs that receive covered funds from grants or bonds authorized by H.R. 865 would be required to ensure that any iron, steel, and manufactured products used in projects are produced in the United States. However, the Secretary of Education would have authority to waive this requirement if applying it would be inconsistent with the national interest, if materials produced in the United States are not sufficiently available or of satisfactory quality, or if using materials produced in the United States would increase the cost of the overall project by more than 25%. Within two years of enactment, H.R. 865 would require the Government Accountability Office (GAO) to submit a report on projects carried out by covered funds to the appropriate congressional committees. The report would include the types of projects carried out, their geographic distribution, and an assessment of their impacts on the health and safety of staff and students. The report would also address how the Secretary of Education or the states could make covered funds more accessible to schools with the highest numbers and percentages of students counted in ESEA Title I-A allocation formulas and schools with fiscal challenges in raising capital for school infrastructure projects. GAO would be required to prepare an updated version of the report between 5 and 6 years after enactment and again between 10 and 11 years after enactment. The bill would also require ED's Institute of Education Sciences to carry out and submit to the appropriate congressional committees a comprehensive study of the physical condition of all public schools in the United States at least once every five years. The report would include an assessment of the effect of school facilities on health, safety, and academic outcomes; the condition of facilities, categorized by geographic region, racial and ethnic groups, and economic status of students; the accessibility of school facilities for students and staff with disabilities; and any differences in these areas of disaggregation between LEAs that received covered funds and those that did not. H.R. 865 does not include an authorization of appropriations for this purpose. Additionally, H.R. 865 would require the Secretary of Education to establish a clearinghouse to disseminate information on federal programs and financing mechanisms that may be used to assist schools in initiating, developing, and financing energy efficient, energy retrofitting, and distributed generation projects. The bill does not include an authorization of appropriations for this purpose. The Impact Aid program, administered by ED and authorized by Title VII of the ESEA, compensates LEAs for a \"substantial and continuing financial burden\" resulting from federal activities, such as federal ownership of certain lands, as well as the enrollments in LEAs of children whose parents work or live on federal property and of children living on tribal lands. The Impact Aid program authorizes several types of payments, including a construction payment (ESEA, Section 7007). The construction payment provides funds for construction and facilities upgrades to certain LEAs, such as those serving high percentages of children living on tribal lands or children with parents on active duty in the uniformed services. These funds are used to make formula and competitive grants. For FY2019, Section 7007 was appropriated $17.4 million. Authorizations of appropriations for Section 7007 are provided through FY2020. H.R. 865 would extend the authorization of appropriations for Section 7007 through FY2023 at levels substantially higher than current authorization of appropriations levels. For FY2020, Section 7007 has an existing authorization of appropriations level of $18,756,765. H.R. 865 would increase that level to $50,406,000 for FY2021 and FY2022 and $52,756,765 for FY2023. The Congressional Budget Office (CBO) estimates that enactment of H.R. 865 would result in an increase of approximately $8.4 billion in direct spending, a decrease of approximately $1.2 billion in revenues, and an increase of approximately $55.6 billion in outlays subject to appropriation in the period from FY2019 to FY2029. In producing this estimate, CBO assumes that H.R. 865 would be enacted near the end of FY2019 and that authorized and estimated funds would be appropriated every year.", "summary": "A 2014 study conducted by the National Center for Education Statistics within the U.S. Department of Education (ED) found that 53% of public elementary and secondary schools need to spend money on repairs, renovations, and modernizations to put their onsite buildings in good overall condition. The study estimated that the nationwide spending necessary to reach this standard would be approximately $197 billion, or about $4.5 million per school that needs improvements. This report provides a description of and background for selected provisions in the Rebuild America's Schools Act of 2019 ( H.R. 865 / S. 266 ), which would provide federal funding for public school construction. H.R. 865 was ordered to be reported by the House Committee on Education and Labor on February 26, 2019. As no action has been taken on the identical companion bill S. 266 since it was introduced in the Senate, this report addresses H.R. 865 . While the construction, renovation, repair, and maintenance of public school facilities are typically the responsibility of state and local governments, the federal government has provided some funding for construction and renovation for specific purposes. H.R. 865 proposes to authorize $70 billion in grants and facilitate $30 billion in school infrastructure tax credit bonds to be used toward the construction and repair of public elementary and secondary school facilities. Funds would be allocated to states proportionally based on their prior-year share of grant allocations under Title I-A of the Elementary and Secondary Education Act (ESEA), a grant program designed to provide educational and related services to low-achieving and other students attending schools with relatively high concentrations of students from low-income families. States are directed to award grant funds provided through the bill to local educational agencies (LEAs) with the highest numbers or percentages of students who are \"counted\" in the formulas used to allocate ESEA Title I-A grantsâand among LEAs meeting this criterion, to those prioritizing improvement of facilities of public schools that serve the highest percentages of students who qualify for free or reduced price lunches. Additional consideration in the awarding of grants to LEAs may be given to those with school facilities that pose a severe health or safety threat. Funds would also be authorized under H.R. 865 for Impact Aid construction for FY2020 through FY2023 at levels substantially higher than current authorization of appropriations levels. H.R. 865 would place certain restrictions on how funds from grants or bonds may be used. For instance, it specifies for each fiscal year a certain percentage of covered funds that must be used for construction or renovation that is consistent with \"green\" standards. Additionally, LEAs that receive covered funds from grants or bonds authorized by the bill would be required to ensure that any iron, steel, and manufactured products used in projects are produced in the United States. However, the Secretary of Education would have authority to waive this requirement under certain circumstances. The bill would also require the Institute of Education Sciences to carry out and submit to the appropriate congressional committees a comprehensive study of the physical condition of all public schools in the United States at least once every five years. The Congressional Budget Office estimates that enactment of H.R. 865 would result in an increase of approximately $8.4 billion in direct spending, a decrease of approximately $1.2 billion in revenues, and an increase of approximately $55.6 billion in outlays subject to appropriation in the period from FY2019 to FY2029.", "document_type": "crs"}
{"report": "The 2017 tax revision, P.L. 115-97 , often referred to as the Tax Cuts and Jobs Act, and referred to subsequently as the Act, was estimated to reduce taxes by $1.5 trillion over 10 years. The Act permanently reduced the corporate tax rate to 21%, made a number of revisions in business tax deductions (including limits on interest deductions), and provided a major revision in the international tax rules. It also substantially revised individual income taxes, including an increase in the standard deduction and child credit largely offset by eliminating personal exemptions, along with rate cuts, limits on itemized deductions (primarily a dollar cap on the state and local tax deduction), and a 20% deduction for pass-through businesses (businesses taxed under the individual rather than the corporate tax, such as partnerships). These individual provisions are temporary and are scheduled to expire after 2025. The Act also adopted temporary provisions allowing the immediate deduction for equipment investment and an increase in the exemption for estate and gift taxes. The Congressional Budget Office (CBO) estimated in April of 2018 that the Act would result in a $65 billion reduction in individual income taxes, a $94 billion reduction in corporate taxes, and a $3 billion reduction in other taxes, for a total of $163 billion (after rounding) for FY2018. Numerous effects of the Act were projected during consideration of the law and shortly after, including an increase in output and investment; an increase in the debt to GDP ratio; possible benefits for workers from tax cuts for businesses; the repatriation of income held abroad by U.S. subsidiaries in the form of dividends; and a decreased likelihood of inversions (U.S. companies moving their headquarters abroad). Some claimed that business investment would increase because of (1) the flow of investment from abroad due to the lower corporate tax rate and (2) no longer imposing a tax penalty on paying dividends from foreign subsidiaries would free up resources. This analysis examines the preliminary effects of the Act during the first year, 2018. In some cases it is difficult to determine the effects of the tax cuts (e.g., on economic growth) given the other factors that affect outcomes. In other cases, such as the level of repatriation and use of repatriated funds, the evidence is more compelling. This report discusses these potential consequences in light of the data available after the first year. During consideration of the Act and subsequently, various claims were made about the growth effects of the tax change. A variety of organizations, including private and government forecasters, projected economic growth rates that tended to be modest. In its April 2018 report on the budget outlook, CBO projected the tax change to increase GDP by 0.3% in calendar year 2018. Prorating the FY2019 revenue loss estimate indicated that the tax cut in calendar year 2018 accounted for about 1.2% of GDP. Assuming a tax rate on marginal output of around 20%, this projection would imply a feedback effect of 5%. The Joint Committee on Taxation (JCT) also projected the economic effects of the proposal, and while it did not report year-by-year estimates, its revenue feedback effect for calendar year 2018 was larger than that suggested by the CBO numbers—around 20%, which in turn indicates a projected increase in GDP four times larger, 1.2%. Given the baseline prior to the Act, that effect would have suggested a growth rate of 4.2% in 2018. The CBO output estimate (i.e., the amount of GDP growth attributed to the tax change) was compared with projections by other forecasters and organizations. Of the seven other forecasts projecting the effects of the Act for 2018, five ranged from 0.3% to 0.5%, one was for 0.1%, and another for 0.8%. CBO also disaggregated its output effect into an increase in potential GDP of 0.2%, with the remaining 0.1% reducing the gap between output with and without full employment. The increase in potential output reflects increases in investment and in the labor supply. The 0.1% increase might be characterized as a demand-side effect and the remainder as a supply-side effect. Because the economy was at full employment and most of the tax cut went to businesses and higher-income individuals who are less likely to spend the increases, a small demand-side effect would be expected. Demand-side effects are transitory, whereas supply-side effects are permanent. CBO and other organizations also produced longer-term forecasts. CBO projected output effects rising to 0.6% in 2019, then rising slightly and peaking in 2022, and finally declining, with an estimated 0.5% effect in 2028, the last year reported. The decline in later years might be partially traced to the expiration of some provisions. Compared with other forecasts for the average over the 10-year period 2018-2027, CBO's 0.7% effect was similar to other forecasts. For the 10 th year, 2027, CBO projected an effect of 0.6%; there was considerably more divergence in the estimates for this year, with one organization projecting a negative effect by that time. This divergence presumably reflected competing views of the effects on capital formation due to lower tax rates on returns to investment and crowding out of private investment due to accumulating debt. During the debate, some argued for much larger growth effects, including arguments that the tax cuts would produce so much growth that they would largely or entirely pay for themselves, or even raise revenues. These statements, however, were not supported by most of the published analysis. In April 2018, CBO projected real GDP growth for the calendar year 2018 of 3.3% (indicating a projected 3% growth rate without the tax cut). According to the National Income and Product Accounts (NIPA), actual growth rate was 2.9%, which is consistent with a small effect of the tax revision, perhaps even smaller than projected by most analysts. Quarterly growth rates are shown in Figure 1 . The revenue loss from the tax cut without incorporated growth effects was estimated at about 1.2% of GBP in 2018. The 2.9% annual growth rate for 2018 was higher than the 2.2% growth rate in 2017 and the 1.6% growth rate in 2016. In previous years, output grew by 2.9% in 2015 and 2.5% in 2014, thus the increase in growth is in line with the trend in growth over the period examined in Figure 1 . Forecasters had already projected an increase in growth rates in most cases that was similar to CBO's. In addition to the effect from the tax cuts, there was also some stimulus due to the increase in spending enacted in the Consolidated Appropriations Act of 2018 ( P.L. 115-141 ) and the Bipartisan Budget Act of 2018 ( P.L. 115-123 ). Growth may have also been negatively affected by tariffs. The high rate of growth in the second quarter of 2018 shown in Figure 1 may have been due to the demand-side stimulus of the tax cuts, which began to be reflected in withholding beginning in the first quarter, as well as the possibly delayed receipt of tax refunds. On the whole, the growth effects tend to show a relatively small (if any) first-year effect on the economy. Although examining the growth rates cannot indicate the effects of the tax cut on GDP, it does tend to rule out very large effects in the near term. The data appear to indicate that not enough growth occurred in the first year to cause the tax cut to pay for itself. Assuming a tax rate of 18% (based on CBO estimates), and estimating the tax cut to reduce revenue in calendar year 2018 by about 1.2% of GDP, a 6.7% GDP increase due to the tax cuts alone would be required. Rather, the combination of projections and observed effects for 2018 suggests a feedback effect of 0.3% of GDP or less—5% or less of the growth needed to fully offset the revenue loss from the Act. Consumption grew at 2.6% in 2018 in real terms, as shown in Figure 2 , about the same as 2017 (which was 2.5%) and below 2014-2016 (although higher than 2013). As shown in Figure 2 , there was a drop in the first quarter followed by a rise in the second quarter that was unexpected by most forecasters and may have reflected a delay in tax refunds. The initial effect of a demand side is likely to be reflected in increased consumption and the data indicate little growth in consumption in 2018. Much of the tax cut was directed at businesses and higher-income individuals who are less likely to spend. Fiscal stimulus is limited in an economy that is at or near full employment. Although it is difficult to determine the Act's overall first-year impact on GDP, other than to confirm that the evidence is consistent with a small projected first-year effect, it is possible to discuss supply-side effects on investment in more detail. CBO estimated that the 0.3% increase in growth from the Act is the result of a 0.4% increase in GDP due to private consumption and a 0.2% increase due to nonresidential fixed investment (with a negligible effect on residential investment and government consumption and investment). This 0.6% increase was projected to be offset by a decrease in net exports of 0.3% of GDP (from both a decline in imports and an increase in exports). This decrease is expected as a consequence of net capital flowing in from abroad to finance the deficit or due to capital inflows used for investment in response to tax changes. Given the shares of GDP that went to consumption (70%) and investment in nonresidential fixed investment (14%) in 2017, these growth contributions indicated an additional growth in consumption of 0.7% and in fixed nonresidential investment of 1.5%. In 2018, consumption grew at 2.6% and nonresidential investment grew at 7%. Such numbers might suggest a supply-side effect. There are reasons, however, not to necessarily view that growth as a supply-side effect of the tax change. First, the growth rates of investment and its subcomponents are much more volatile than the growth rates of GDP, as shown in Figure 3 , making it hard to assign causation. Second, the largest effects occurred in the first and second quarters of 2018, which allowed very little time to be the result of investments that must be planned in advance (even if the tax cut was anticipated in late 2017). Furthermore, structures growth rates were negative in the last two quarters. Third, real growth in the subcategories of equipment, structures, and intellectual property products is inconsistent with the incentive effects of the tax change. Over the entire year, intellectual property products grew at the fastest rate (7.7%), equipment at a slightly lower rate (7.5%), and structures at 5.0%. To assess the incentive effects of the tax changes (which included a lower tax rate and faster depreciation for equipment), consider the change in the user cost of capital (or rental price of capital). It is the equivalent of the \"price\" of capital as an input (just as the wage is the price of labor input). It includes two costs of using capital: the opportunity cost of using funds (i.e., the required pretax rate of return on the asset) and depreciation (i.e., the cost of using up the asset). The user cost reflects the required rate of return at the margin (i.e., for an investment that earns just enough to be worth making). Estimates indicate that the user cost of capital for equipment declined by 2.7% and the user cost of structures declined by 11.7%, but the user cost of R&D (intellectual property products) increased by 3.4%. (See the Appendix for details on the derivation of these results.) The user cost of capital for equipment declined by less than that of structures primarily because more of the cost for equipment is for depreciation. The decline in the required rate of return was somewhat smaller for equipment as well because it was already favorably treated (eligible for expensing half of the cost). The benefits of lower rates are also moderated by the use of debt-financed capital, where a lower tax rate reduces the subsidy (or negative tax rate) that applies to debt-financed investment because of the deduction of nominal interest by businesses. Thus, while it is possible that the Act increased the investment due to supply-side effects, it would be premature to conclude that the higher rate of growth of nonresidential fixed investment was due to the tax changes. Looking at changes in the user cost of capital, effects of investments in structures would be expected to be largest, with small (or negative) effects on intellectual property. To date this pattern has not been observed. Overall revenue changes were close to projections, with revenues only $9 billion smaller than projected, due to a $45 billion increase in individual income tax revenues, but a $7 billion decrease in payroll taxes, along with a $40 billion decline in corporate revenues. As noted above, data on GDP are not consistent with a large growth effect in 2018, and thus the tax cut is unlikely to provide enough growth to significantly offset revenue losses in 2018. Data from FY2018 suggest that the tax cut for corporations may have been larger than the $94 billion CBO projected in its April 2018 baseline. That baseline projected corporate revenues of $243 billion, but actual corporate revenues were $38 billion lower at $205 billion, 16% lower than projected. CBO's January 2019 report on the budget and economic outlook indicated that these lower corporate tax revenues could not be explained by economic conditions and stated that the causes will not be apparent until information from tax returns becomes available over the next two years. CBO also expected this decline in revenues to dissipate over time. With little evidence of whether the decline will actually be temporary or permanent, CBO may have relied on the historical tendency of unexplained changes to dissipate over time. It is also possible that estimated revenue losses from the corporate tax changes were too low in their earlier estimates. The overall revenues were close to those projected as the lower corporate revenues were offset by gains from other taxes: a $45 billion increase in individual income tax revenues and a $7 billion decrease in payroll taxes. These differences, particularly for payroll taxes, are much smaller as a percentage of revenue, and CBO does not indicate any need for an explanation of these changes outside of economic forces. Effective tax rates fell, with corporate effective tax rates declining significantly and individual effective income tax rates by a small amount. Much of the tax revision was focused on corporations. Although the statutory corporate tax rate was reduced from 35% to 21%, the average effective tax rate decline (taxes divided by profits) would be smaller because of existing tax benefits (which lead to a smaller initial effective tax rate) and base-broadening effects. Such an effective tax rate can be calculated using aggregate data from the national income and products accounts, which attempt to measure economic income. The effective average tax rate for corporations was 17.2% in calendar year 2017, and fell to 8.8% in calendar year 2018. This estimate includes worldwide income, but not worldwide taxes. Although actual data on the division of domestic and worldwide income are not available for 2018, using the ratios projected by CBO to eliminate foreign-source income from the measure results in an average effective tax rate of 23.4% in 2017, falling to 12.1% in 2018. Either scenario suggests that the ratio of effective to statutory tax rate dropped following the tax revision. The statutory tax rate dropped by 40%, but the effective rate dropped by 48% (although the percentage point drop was smaller for the effective tax rate). Another measure of effective rate is the marginal effective tax rate on income, a tax rate that is a component of the user cost of capital. These tax rates are prospective and capture the main elements of the tax code: tax rates, depreciation, and research credits. They also apply to domestic investment. Using a weighted average of equipment, structures, and intangibles, the effective marginal tax rate on equity investment was estimated to fall from 15.6% to 3.2% from 2017 to 2018. If the effects of reducing subsidies for debt-financed investment are accounted for, marginal tax rates are lower (actually slightly negative) and change less, from a -0.3% rate in 2017 to a -6.6% rate in 2018. Marginal tax rates are likely to be below average tax rates because they capture timing benefits (e.g., accelerated depreciation). Marginal effective tax rates are relevant to economic growth effects because they measure the incentive effects for investment. The individual income tax changes for 2018 were smaller than the corporate tax changes in absolute size and substantially smaller as a percentage of income. The effective individual tax rate for federal income taxes as a percentage of personal income is estimated at 9.6% in 2017 and 9.2% in 2018, based on data in the National Income and Product Accounts. This change constitutes a reduction in effective tax rate of 4%. The Treasury Department's Office of Tax Analysis estimates a larger reduction in effective tax rate as a percentage of adjusted family cash income, with the rate falling from 10.1% in 2017 to 8.9% in 2019, although this estimate is based on projected rather than actual data. Both of these declines are smaller than the corporate tax rate decline. As noted earlier, the increase in the standard deduction and child and dependent credit was roughly offset by the elimination of the personal exemption. Statutory rate reductions for individuals were relatively small compared with the corporate rate reduction (the top rate of 39.6% was reduced by 2.6 percentage points, compared with 14 percentage points for the corporate rate), and the benefits of rate reductions were offset by restrictions on itemized deductions. Business income was in some cases eligible for a 20% reduction, which was more significant (an additional 20% deduction at the 37% rate is 7.4 percentage points), but not all business income qualified. There are also effective marginal tax rates, although these are generally divided into rates on labor income and capital income. The marginal tax rate for labor income is typically above the average tax rates because of graduated tax rates and lack of timing benefits. CBO estimates that marginal tax rates on labor income fell from 29.4% to 27.2%. CBO also estimates the marginal tax rate for all capital income (which would include unincorporated businesses, owner-occupied housing, and taxes on interest, dividends, and capital gains, as well as corporate taxes). This value is estimated to fall from 16.5% to 14.7%. Although different from the marginal rates reported above for corporations, both estimated measures find small changes in marginal tax rates, which is consistent with an expected small behavioral response. Distributional analyses of the tax change suggested that the tax revision favored higher-income taxpayers, in part because most of the tax cut benefited corporations and in part because the individual income tax cut largely went to higher-income individuals. During the debate about taxes, however, arguments were made that these corporate tax cuts would benefit workers due to growth in investment and the capital stock. After enactment, CBO projected these effects to be relatively small, with increases in labor productivity (which should affect the wage rate) negligible in 2018 and growing to 0.3% of GDP after 10 years. CBO projected that the total wage bill would grow because of the increase in employment and hours per worker of 0.2% in 2018. The labor supply response would rise through 2024, peaking at 0.8% and then decline as the individual tax cuts expired. A Council of Economic Advisors (CEA) October 2017 study suggested a corporate rate reduction from 35% to 20%, if enacted, would eventually increase the average household's income by a conservative $4,000 a year. This was a longer-run estimate, but the study also estimated that workers would immediately get a significant share (30%) of the profits repatriated from abroad due to tax changes. Another CEA October 2017 report suggested wages could increase by up to $9,000 with such a corporate rate change using more optimistic assumptions. While the CEA study with respect to the $4,000 to $9,000 amounts referred to a long-term effect, the study was portrayed by the Administration as indicating an immediate effect. The amounts associated with repatriation were short term. A $4,000 to $9,000 effect per household, given the 126 million households that were estimated at that time, would produce a total effect ranging from $504 billion to $1,134 billion, or between 2.5% and 5.7% of GDP in 2018. The corporate rate cut from 35% to 21% cost about $125 billion over a full year, and it would cost about $133 billion with the additional percentage point rate reduction (to 20%) considered at that time. Thus, in these scenarios, the effects of the tax cuts would be many times (3.8 to 8.5) larger than the costs. The projections for long-run growth in the CEA study relied on a range of empirical economics literature, including the effects of changes in user cost on investment cost and corporate tax incidence. The econometric estimates of corporate tax incidence are problematic for a number of reasons, and the effects on investment considering user cost did not appear to take into account the direct effect of the tax rate change on the interest. In the absence of the tax cuts, wages should grow with the economy and wage rates should grow as the capital stock grows. In addition, tight labor markets resulting from the approach to full employment should have put upward pressure on wage rates in any case. Evidence from 2018 indicated that labor compensation, adjusted to real values by the price indices for personal consumption expenditures, grew slower than output in general, at a 2.3% rate compared with a 2.9% growth rate overall. If adjusted by the GDP deflator, labor compensation grew by 2.0%. With labor representing 53% of GDP, that implies that the other components grew at 3.8%. Thus, pretax profits and economic depreciation (the price of capital) grew faster than wages. Figure 4 shows the growth rate of real wages compared with the growth rate of real GDP for 2013-2018, indicating that wage growth has sometimes been faster than GDP growth and sometimes slower. There is no indication of a surge in wages in 2018 either compared to history or relative to GDP growth. This finding is consistent with the CBO projection of a modest effect. The Department of Labor reports that average weekly wages of production and nonsupervisory workers were $742 in 2017 and $766 in 2018. Wages, assuming full-time work, increased by $1,248 annually. But this number must account for inflation and growth that would otherwise have occurred regardless of the tax change. The nominal growth rate in wages was 3.2%, but adjusting for the GDP price deflator, real wages increased by 1.2%. This growth is smaller than overall growth in labor compensation and indicates that ordinary workers had very little growth in wage rates. One of the major sources of anticipated increased investment through supply-side effects is international capital flows, particularly in the short and medium term. Savings rates tend to be relatively unresponsive to changes in the rate of return and savings accumulate slowly. Thus the increased investment in the United States (in the aggregate) would need to come from abroad. Some expected foreign investment to flow due to the reduction in the user cost of capital. Some also argued that eliminating the tax barrier to repatriating funds (as was done with the tax revision) would lead to reinvestment in the United States of unrepatriated earnings held abroad in U.S. subsidiaries. Under prior law, these earnings would have been taxed at 35%, adjusted for credits on foreign taxes paid, if paid as dividends to the parent company. The tax change exempted dividends from tax, imposed a transition tax on deemed repatriations of existing untaxed earnings at a rate lower than the new corporate rate of 21% (15.5% on liquid assets and 8% on illiquid assets), and imposed a global minimum tax on intangible income. These changes meant paying dividends resulted in no tax consequences. Although estimates varied, they indicated close to $3 trillion of unrepatriated earnings. There were a number of criticisms of the possibility that repatriation of these earnings would stimulate investment, considering the evidence that a repatriation holiday in 2004 had not affected investment. Not all of these amounts were held in cash, as some were earnings reinvested in physical assets (such as plant and equipment) and some might be invested in other assets that were not cash equivalents. A Federal Reserve study estimated that $1 trillion was held in cash. A significant amount of repatriations occurred in 2018, as compared both to history and 2017. Dividends in the previous three years ranged from $144 billion to $158 billion, as shown in Figure 5 , whereas $664 billion was repatriated in 2018. Simultaneously, reinvested earnings declined sharply before returning to more normal levels in the 4 th quarter of 2018. It is important, however, to measure international capital flows in true terms that reflect the inflow of resources for capital investment and not by financial transactions, such as repatriation of income earned abroad through dividend payments from foreign subsidiaries. Capital investment involves resources that reflect actual investment in the United States. It could involve imports of investment goods directly, or it could involve imports of consumption goods that free up other resources for investment. In either case, the true capital invested in the United States is largely measured by the excess of exports over imports, or more precisely by the current account, which can also include a small amount of net income payments. In more fundamental terms, investment from abroad occurs in a real sense only when the amount of imported goods exceeds the amount of U.S. exports. To measure this aggregate change in net capital inflows, examine the balance on the current account, which is generally negative, indicating a net capital inflow (imports exceed exports, or a trade deficit). Adjusting these amounts by the GDP deflator and looking at the change, there was a small increase that amounted to 0.8% of private investment. This change is relatively small and is not out of line with historical fluctuations; see Figure 6 . Again, many factors can affect net capital inflows, including domestic borrowing by the government and domestic saving, but the evidence does not suggest a surge in investment from abroad in 2018. Increased funds, whether accessed from abroad or through tax cuts, could be used in several ways: investment, paying down debt, increasing wages, paying wage bonuses, paying dividends, or repurchasing shares. During the passage of the tax revision and in the immediate aftermath, some argued that firms would use these funds to pay worker bonuses (as discussed in the previous section on wages). Subsequently, a number of firms announced bonuses, which in some cases they attributed to the tax cut. One organization that tracks these bonuses has reported a total of $4.4 billion. With US employment of 157 million, this amount is $28 per worker. This amount is 2% to 3% of the corporate tax cut, and a smaller share of repatriated funds. It is consistent with what most economists would expect that a small percentage of increased corporate profits or repatriated funds (if any) would be used to compensate workers, as economic theory indicates that firms would pay workers their marginal product, a result of fundamental supply and demand forces. The bonus announcements could have reflected a desire to pay bonuses when they would be deducted at 35% rather than 21% (in late 2017 for firms with calendar tax years but in 2018 for firms with different tax years). Worker bonuses could also be a result of a tight labor market and attributed to the tax cut as a public relations move. Much of these funds, the data indicate, has been used for a record-breaking amount of stock buybacks, with $1 trillion announced by the end of 2018. A similar share of repurchases happened in 2004, when a tax holiday allowed firms to voluntarily bring back earnings at a lower rate. During the discussion of corporate tax revision over a number of years, one important issue repeatedly raised was the effect of the current tax system on incentives for firms to relocate abroad, or \"invert.\" Inversions involved firms relocating their headquarters to low-tax jurisdictions that generally had territorial taxes, allowing firms to shift profits out of their U.S. operations (so-called earnings stripping) as well as providing potential paths to repatriate earnings without taxes. The earliest of these inversions, beginning in the early 1980s, were called \"naked inversions,\" where a company simply relocated its headquarters without otherwise changing its activities. A number of legislative and regulatory actions largely ended these types of inversions. In 2004, the American Jobs Creation Act ( P.L. 108-357 ) required that any firm in which the former U.S. owners owned 80% or more of the new firm would continue to be treated as a U.S. firm. Firms with 60% to 80% ownership by former shareholders of the U.S. firm were considered inverted firms and subject to certain penalty taxes. This legislation allowed naked inversions in cases where the firm had substantial business activity in the new headquarters country, but regulations issued in 2012 tightened these requirements after a series of inversions used this rule to relocate. In 2014, a new wave of inversions that involved mergers with smaller foreign firms began, with one of the most prominent being an announcement that Pfizer, the pharmaceutical company, would acquire Astra-Zeneca with a UK headquarters (although this merger never took place). These inversions gave rise to a number of legislative proposals, but also led to numerous regulatory proposals, which were released in 2014, 2015, and 2016. These regulations addressed a number of issues, including restricting the use of serial inversions to allow a firm to fall under the ownership limits, limiting the ability to access earnings of subsidiaries abroad, and limiting earnings stripping through locating debt in the United States. The 2017 Act contained several provisions that made inversions less attractive (aside from the lower corporate tax rate). One notable provision required firms that inverted in the next 10 years to pay a deemed repatriation tax at 35%, rather than at the lower rates of 8% for non-cash holdings and 15.5% for cash or cash equivalents. The Act introduced a new minimum tax to address international profit shifting, the base erosion and anti-abuse tax (BEAT), which adds back payments between related domestic and foreign companies to base income and then taxes that base at a lower rate. BEAT excludes payments which reduce gross receipts with the result that payment for the cost of goods sold is not included under BEAT. An exception applies for firms that invert after November 9, 2017, where payments to a foreign parent or any foreign firm in the affiliated group for cost of goods sold is included in BEAT. The legislation also contained some other provisions making inversions less attractive. The Act also modified asset attribution rules. The constructive ownership rules for purposes of determining 10% U.S. shareholders, whether a corporation is a Controlled Foreign Corporation (CFC), and whether parties satisfy certain relatedness tests, which can trigger certain tax provisions including restrictive ones, were expanded in the 2017 tax revision. Specifically, the new law treats stock owned by a foreign person as attributable to a U.S. entity owned by the foreign person (so-called \"downward attribution\"). As a result, stock owned by a foreign person may generally be attributed to (1) a U.S. corporation, 10% of the value of the stock of which is owned, directly or indirectly, by the foreign person; (2) a U.S. partnership in which the foreign person is a partner; and (3) certain U.S. trusts if the foreign person is a beneficiary or, in certain circumstances, a grantor or a substantial owner. The downward attribution rule was originally conceived to deal with inversions. In an inversion, without downward attribution, a subsidiary of the original U.S. parent could lose CFC status if it sold enough stock to the new foreign parent so the U.S. parent no longer had majority ownership. With downward attribution, the ownership of stock by the new foreign parent in the CFC is attributed to the U.S. parent, so that the subsidiary continues its CFC status, making it subject to any tax rules that apply to CFCs (such as Subpart F and repatriation taxes under the old law, and Subpart F and Global Low-Taxed Income (GILTI) under the new law). The Act also contained other provisions affecting stockholders and stock compensation. These provisions were intended to discourage inversions. Dividends (like capital gains) are taxed at lower rates than ordinary income. The rates are 0%, 15%, and 20% depending on the rate bracket that ordinary income falls into. Certain dividends received from foreign firms (those that do not have tax treaties and Passive Foreign Investment Companies (PFICs)) are not eligible for these lower rates. Dividends paid by firms that inverted after the date of enactment of P.L. 115-97 are added to the list of those not eligible for the lower rates. Also, in 2004, an excise tax of 15% was imposed on stock compensation received by insiders in an expatriated corporation; the 2017 Act increased it to 20%, effective on the date of enactment for corporations that first become expatriated after that date. These new laws did not change the definition of inverted firms but rather the consequences of inversions. Although the legislative changes in the 2017 Act contributed to making inversions less attractive, announced inversions had already slowed substantially following the regulatory changes implemented in 2014, 2015, and 2016. In addition, data released by the Bureau of Economic Analysis indicated that foreign acquisitions of US companies, which rose substantially in 2015, fell by 15% in 2016 and 32% in 2017 (data not available for 2018). Some of the largest declines were in inversion-associated countries, such as Ireland, where acquisitions fell from $176 billion in 2015, to $35 billion in 2016, and to $7 billion in 2017. The user cost of capital is the sum of the pretax required return for a marginal investment and the economic depreciation, or (1) C = R/(1-t)+d Where C is the user cost, R is the required after-tax return, t is the effective marginal rate, and d is the economic depreciation rate. Economic depreciation is the decline in the value of the asset in real terms, and belongs in the cost term because it compensates the investor for the wearing away, or using up, of the asset. The user cost calculations use a weighted pretax rate of return that reflects both debt and equity finance to simplify the analysis. The effective marginal tax rate, in turn, depends on the statutory tax rate, the present value of economic depreciation, the inflation rate, the return on equity, the share debt-financed, and the nominal interest rate. Table A-1 reports the effective tax rate for corporate and non-corporate investment before and after the 2017 changes for the basic types of nonresidential fixed capital. The overall user cost also depends on the economic depreciation rates and the relative sizes of each type of capital stock in the corporate and non-corporate sector. For equipment, the economic depreciation rate is 12.95% per year, and corporate equipment comprises 67% of all equipment. Structures are composed of two types: (1) public utility structures (accounting for 23% of the total) with a depreciation rate of 2.24% and (2) buildings with a depreciation rate of 2.8%. Within public utility structures, corporations account for 84%; within buildings, corporate structures account for 55%. Intangible assets have a depreciation rate of 17%, and corporations account for 86%. User costs and their percentage changes are shown in Table A-2 .", "summary": "The 2017 tax revision, P.L. 115-97, often referred to as the Tax Cuts and Jobs Act, and referred to subsequently as the Act, substantially revised the U.S. tax system. The Act permanently reduced the corporate tax rate to 21%, made a number of revisions in business tax deductions (including limits on interest deductions), and provided a major revision in the international tax rules. It also substantially revised individual income taxes, including an increase in the standard deduction and child credit largely offset by eliminating personal exemptions, along with rate cuts, limits on itemized deductions (primarily a dollar cap on the state and local tax deduction), and a 20% deduction for pass-through businesses (businesses taxed under the individual rather than the corporate tax, such as partnerships). These individual provisions are temporary and are scheduled to expire after 2025. The Act also adopted temporary provisions allowing the immediate deduction for equipment investment and an increase in the exemption for estate and gift taxes. The Joint Committee on Taxation (JCT) estimated that these changes would reduce tax revenue by $1.5 trillion over 10 years. In 2018, gross domestic product (GDP) grew at 2.9%, about the Congressional Budget Office's (CBO's) projected rate published in 2017 before the tax cut. On the whole, the growth effects tend to show a relatively small (if any) first-year effect on the economy. Although growth rates cannot indicate the tax cut's effects on GDP, they tend to rule out very large effects particularly in the short run. Although investment grew significantly, the growth patterns for different types of assets do not appear to be consistent with the direction and size of the supply-side incentive effects one would expect from the tax changes. This potential outcome may raise questions about how much longer-run growth will result from the tax revision. CBO, in its first baseline update post enactment, initially estimated that the Act would reduce individual income taxes by $65 billion, corporate income taxes by $94 billion, and other taxes by $3 billion, for a total reduction of $163 billion in FY2018. Corporate revenues were about $40 billion less than projected whereas individual revenues were higher, with an overall revenue reduction of about $9 billion. From 2017 to 2018, the estimated average corporate tax rate fell from 23.4% to 12.1% and individual income taxes as a percentage of personal income fell slightly from 9.6% to 9.2%. Real wages grew more slowly than GDP: at 2.0% (adjusted by the GDP deflator) compared with 2.9% for overall real GDP. Such slower growth has occurred in the past. The real wage rate for production and nonsupervisory workers grew by 1.2%. Although significant amounts of dividends were repatriated in 2018 compared with previous years, the data do not appear to show a significant increase in investment flows from abroad. While evidence does indicate significant repurchases of shares, either from tax cuts or repatriated revenues, relatively little was directed to paying worker bonuses, which had been announced by some firms. Although the legislation contained a number of provisions that discouraged inversions (shifting headquarters of U.S. firms abroad), these inversions had apparently already been significantly slowed by regulations adopted in 2014, 2015, and 2016.", "document_type": "crs"}
{"report": "The Payments in Lieu of Taxes (PILT) program provides compensation for certain entitlement lands that are exempt from state and local taxes. These lands include selected federal lands administered by the Bureau of Land Management, the National Park Service, and the U.S. Fish and Wildlife Service, all in the Department of the Interior (DOI); lands administered by the U.S. Forest Service in the Department of Agriculture; federal water projects; dredge disposal areas; and some military installations. Enacted in 1976, PILT is the broadestâin terms of federal land types coveredâof several federal programs enacted to provide compensation to state or local governments for the presence of tax-exempt federal lands within their jurisdictions. PILT was enacted in response to a shift in federal policy from one that prioritized disposal of federal landsâone in which federal ownership was considered to be temporaryâto one that prioritized retention of federal lands, in perpetuity, for public benefit. This shift began in the late 19 th century and continued into the 20 th century. Along with this shift came the understanding that, because these lands were exempt from state and local taxation and were no longer likely to return to the tax base in the foreseeable future, some compensation should be provided to the impacted local governments. Following several decades of commissions, studies, and proposed legislation, Congress passed PILT to at least partially ameliorate this hardship. PILT payments generally can be used for \"any governmental purpose,\" which could include assisting local governments with paying for local services, such as \"firefighting and police protection, construction of public schools and roads, and search-and-rescue operations.\" The Office of the Secretary in DOI is responsible for the calculation and disbursement of payments under PILT. Payments under PILT are made annually to units of general local governmentâtypically counties, though other types of governmental units also may be used (hereinafter, counties refers to units of general local government)âcontaining entitlement lands . PILT comprises three separate payment mechanisms: Section 6902, Section 6904, and Section 6905 payments, all named for the sections of law in which they are authorized. Section 6902 payments account for nearly all payments made through PILT. The Section 6902 authorized payment amount for each county is calculated according to a statutory formula that is subject to a maximum payment based on the county's population (see \" PILT Payments Under Section 6902 \"). The remaining payments are provided through Section 6904 and Section 6905 under selected circumstances and typically are limited in duration. Through FY2019, PILT payments have totaled approximately $9.2 billion (in current dollars). Members of Congress routinely consider amending PILT within both appropriations and authorizing legislation. For example, legislation in the 116 th Congress would amend how PILT appropriations are provided and would change how payments are calculated under Section 6902. In addition, Members of Congress may address issues related to which federal lands should be eligible for payments under PILT. This report provides an overview of the PILT payment program and includes sections on PILT's authorization and appropriations, which discusses the history of how Congress has provided funding for PILT; Section 6902 payments, which includes a breakdown of how Section 6902 payments are calculated; Section 6904 and Section 6905 payments, which outlines what situations result in payments under these mechanisms; and issues for Congress, which discusses several topics that have been or may be of interest to Members of Congress when considering the future of PILT. Congress has funded PILT through both discretionary and mandatory appropriations at various times since the program was first authorized. Some stakeholders and policymakers have routinely expressed concern about changes in the appropriations source, both the process of switching between mandatory and discretionary appropriations and the uncertainty that may accompany such changes. From 1982 to 2008, Section 6906 provided an \"Authorization of Appropriations\" for PILT, which stated, \"Necessary amounts may be appropriated to the Secretary of the Interior to carry out [PILT].\" Further, it clarified that \"amounts are available only as provided in appropriation laws.\" Congress amended this language in 2008 and changed the section title from \"Authorization of Appropriations\" to \"Funding.\" Further, Congress changed the text to read For each of fiscal years 2008 through 2012- (1) each county or other eligible unit of local government shall be entitled to payment under this chapter; and (2) sums shall be made available to the Secretary of the Interior for obligation or expenditure in accordance with this chapter. This amendment effectively changed PILT funding from being discretionary to being mandatory for the years specified (see Table 1 for PILT funding since FY2005). Since 2008, Congress has amended Section 6906 several times by changing the fiscal year in the first line through both annual discretionary appropriations laws and other legislative vehicles ( Table 1 ). PILT was funded through discretionary appropriations from its enactment through FY2007. Since FY2008, Congress has provided funding for PILT through both discretionary and mandatory appropriations ( Table 1 ). From FY2008 through FY2014, Congress authorized mandatory funding for PILT through several laws . Since FY2015, funding has been provided, at least partially, through the annual appropriations process. In FY2015, PILT received both discretionary and mandatory appropriations. For FY2016 through FY2020, Congress funded PILT through the annual appropriations process. In FY2016 and FY2017, the appropriations laws provided specific funding levels for PILT, which was treated as discretionary spending. In FY2018, FY2019, and FY2020, the appropriations laws provided funding for PILT by amending the authority provided in 31 U.S.C. Â§6906, which was treated as mandatory spending. In each of these three years, funding was provided for PILT at the full statutory calculation levels. Since FY2008, Congress has provided funding for PILT through both one-year and multiyear appropriations. Congress's actions have resulted in full funding and partial funding in different years ( Table 1 and Figure 1 ). These types of changes from year to year may have implications for counties that rely on PILT funding as part of their annual budgets. In addition to appropriating funding for the program, Congress routinely provides other guidance on PILT within the annual appropriations process, such as minimum payment thresholds, set-asides for program administration, and provisions for prorating payments. When appropriated funding is insufficient to cover the full amount for authorized payments under Sections 6902, 6904, and 6905, counties typically receive a proportional payment known as a prorated payment ( Figure 1 shows the disparity between the authorized amount and the appropriated amount in recent years). Even in years in which appropriations are set equal to 100% of the full statutory calculation, payments to counties may be prorated if funding is set aside for purposes other than payments, such as administration. Section 6902 payments are provided to units of local government jurisdictions (referred to as counties in this report) across the United States to compensate for the presence of entitlement lands within their boundaries. Section 6902 payments also are provided to the District of Columbia, Guam, Puerto Rico, and the Virgin Islands. Section 6902 payments account for nearly all of the payments made under PILT. In FY2019, 99.85% of all PILT payments were made through Section 6902. Further, more counties are eligible for Section 6902 payments than either Section 6904 or Section 6905 payments. In FY2019, of the 1,931 counties that received PILT payments, 1,927 received payments under Section 6902, and 134 received payments under Section 6904 and/or Section 6905 (130 counties received payments under both Section 6902 and Section 6904 and/or Section 6905). There are nine categories of federal lands identified as entitlement lands in the PILT statute. 1. Lands in the National Park System 2. Lands in the National Forest System 3. Lands administered by the Bureau of Land Management (BLM) 4. Lands in the National Wildlife Refuge System (NWRS) that are withdrawn from the public domain 5. Lands dedicated to the use of federal water resources development projects 6. Dredge disposal areas under the jurisdiction of the U.S. Army Corps of Engineers 7. Lands located in the vicinity of Purgatory River Canyon and PiÃ±on Canyon, CO, that were acquired after December 31, 1981, to expand the Fort Carson military reservation 8. Lands on which are located semi-active or inactive Army installations used for mobilization and for reserve component training 9. Certain lands acquired by DOI or the Department of Agriculture under the Southern Nevada Public Land Management Act ( P.L. 105-263 ) Of these categories, the first three (National Park System, National Forest System, and lands administered by BLM) largely account for all of the lands managed by the relevant agencies. The remaining categories are either lands tied to specific laws or actions (categories 7 and 9, above) or lands that represent a subset of the lands administered by a particular agency. For example, entitlement lands that are included within the NWRS (category 4) only account for lands within the system that have been withdrawn from the public domain, which excludes lands that have been purchased as additions to the NWRS. Further, lands administered by the U.S. Fish and Wildlife Service that are not included in the NWRS are not included within the definition of entitlement lands. Similarly, lands in the other categories (5, 6, and 8, above) may not include all, or even the majority of, lands administered by particular agencies or departments. Section 6902 payments are determined based on a multipart formula (see Figure 2 ). The DOI Office of the Secretary calculates PILT payments according to several factors, including the number of entitlement acres; a per-acre calculation determined by one of two alternatives (Alternative A, also called the standard rate , or Alternative B, also called the minimum provision ); a population-based maximum payment (ceiling); certain prior-year payments pursuant to other compensation programs; and the amount available to cover PILT payments. To calculate a particular county's PILT payment, the DOI Office of the Secretary first must collect data from several federal agencies and the county's state to answer the following questions: How many acres of eligible lands are in the county? What is the population of the county? What was the increase in the Consumer Price Index for the 12 months ending the preceding June 30? What were the prior year's payments, if any, for the county under the other payment programs of federal agencies? Does the state have any laws requiring the payments from other federal land payment laws to be passed through to other local government entities, such as school districts, rather than stay with the county government? The first step in calculating a county's Section 6902 payment is to determine the number of entitlement acres within the county ( Figure 2 , Box A). The next step is to calculate the population-based ceiling by multiplying the county's population by the population payment rate ( Figure 2 , Box B). County population data are provided by the U.S. Census Bureau. For this calculation, counties with different populations are treated differently ( Figure 3 ): For counties with populations smaller than 5,000, a county's actual population is used in the calculation . For counties with populations larger than 5,000, a county's population is rounded to the nearest 1,000, and this rounded population is used in the calculation. All counties with populations greater than 50,000, regardless of their actual populations, are considered to have a population equal to 50,000 for the purposes of calculating the ceiling. The population payment rate generally declines as population increases in 1,000 person increments (per statute), although the population-based ceiling generally increases ( Figure 4 ). However, this is not always the case. For example, in FY2019, payment rates for several populations are the same despite increasing populations, such as the rates for populations of 26,000; 27,000; and 28,000, which are all $94.98. Further, some payment ceilings do not increase with increasing populations. For example, counties with populations of 50,000 have a lower ceiling than those with populations of 49,000 (49,000 Ã $76.33 = $3,740,170; and 50,000 Ã $74.63 = $3,731,500, or $8,670 less for the more populous county). The population payment rate is adjusted annually for inflation based on the change in the Consumer Price Index for the 12 months ending on the preceding June 30. For FY2019, the population payment rates ranged from $186.56 per person for counties with populations of 5,000 or fewer to $74.63 per person for counties with populations of 50,000 or greater. The next step is to calculate the payment level under alternatives A and B ( Figure 2 , Box C). Alternative A has a higher per-acre payment rate than Alternative B, but Alternative A is subject to a deduction for prior-year payments. Prior-year payments are those payments from the federal payment programs listed in statute: the Act of June 20, 1910 (ch. 310, 36 Stat. 557); Section 33 of the Bankhead-Jones Farm Tenant Act (7 U.S.C. Â§1012); the Act of May 23, 1908 (16 U.S.C. Â§500), or the Secure Rural Schools and Community Self-Determination Act of 2000 (16 U.S.C. Â§Â§7101 et seq.); Section 5 of the Act of June 22, 1948 (16 U.S.C. Â§Â§577g-577gâ1); Section 401(c)(2) of the Act of June 15, 1935 (16 U.S.C. Â§715s(c)(2)); Section 17 of the Federal Power Act (16 U.S.C. Â§810); Section 35 of the Act of February 25, 1920 (30 U.S.C. Â§191); Section 6 of the Mineral Leasing Act for Acquired Lands (30 U.S.C. Â§355); Section 3 of the Act of July 31, 1947 (30 U.S.C. Â§603); and Section 10 of the Act of June 28, 1934 (known as the Taylor Grazing Act) (43 U.S.C. Â§315i). However, if a state has a pass - through law that requires some or all of these prior-year payments to be paid directly to a sub-county recipient (e.g., a school district), these payments are not deducted from subsequent PILT payments in the following year. Alternative B is calculated using a lower per-acre payment rate, but prior-year payments are not deducted. For FY2019, the per-acre payment rates were $2.77 per acre of entitlement land for Alternative A and $0.39 per acre of entitlement land for Alternative B. If the per-acre payment (number of acres multiplied by the per-acre payment rate) calculated under either alternative is greater than the population-based ceiling, then the population-based ceiling replaces the calculated amount. Once each alternative is calculated, the greater of the two is the Section 6902 authorized payment for the county ( Figure 2 , Box D). The Section 6902 authorized payments are calculated for every county, and this amount is added to the Section 6904 and Section 6905 authorized payments (for more information on Sections 6904 and 6905, see \" PILT Payments Under Sections 6904 and 6905 \"). This summed amount is the full statutory calculation for a given fiscal year ( Figure 2 , Box E). DOI compares the full statutory calculation with the amount appropriated and available for PILT payments to determine whether Congress has provided adequate funding to cover the full statutory calculation ( Figure 2 , Box F). If sufficient funding is available, each county receives its authorized amount; if funding is insufficient, each county receives a prorated payment that is proportional to its authorized payment ( Figure 2 , Box G). The full statutory calculation and the amount available for PILT payments determine proration. Although there are additional adjustments made in the PILT proration calculation resulting from small idiosyncrasies related to the requirements for PILT paymentsânamely, the requirement of a minimum threshold of $100 for PILT payments âthe proration is fundamentally the ratio of the appropriated funding available for PILT payments to the full statutory calculation: As a result, counties may receive less than their authorized PILT payment in years when appropriated funding is insufficient to cover the full statutory calculation. This scenario can occur even when total PILT appropriations match the full statutory calculation; this has been the case in years with mandatory appropriations, when part of the appropriated amount is set aside for a use other than county payments. For example, laws providing appropriations for PILT routinely have allowed DOI to retain a small portion of PILT appropriations for administrative expenses. Section 6904 and Section 6905 payments account for a small fraction of total PILT payments. In FY2019, these payments were made to 134 counties and accounted for 0.15% of PILT payments ($750,605 of $514.7 million in total payments made). Once a county receives Section 6904 and Section 6905 payments, it is to disburse payments to governmental units and school districts within the county in proportion to the amount of property taxes lost because of the federal ownership of the entitled lands, as enumerated under these sections. County units and school districts may use these payments for any governmental purpose. Section 6904 authorizes the Secretary of the Interior to make payments to counties that contain certain lands, or interests in lands, that are part of the National Park System and National Forest Wilderness Areas. However, Section 6904 specifies that these lands, or interests, are eligible only if (1) they have been acquired by the U.S. government for addition to these systems and (2) they were subject to local property taxes in the five-year period prior to this acquisition. Payment under Section 6904 is calculated as 1% of the fair market value of the land at the time it was acquired, not to exceed the amount of property taxes levied on the property during the fiscal year prior to its acquisition. Further, Section 6904 payments are made annually only for the five fiscal years after the land, or interest, is acquired by the U.S. government, unless otherwise mandated by law. Section 6905 authorizes the Secretary of the Interior to make payments to counties that contain lands, or interests, that are part of the Redwood National Park and are owned by the U.S. government or that are acquired by the U.S. government in the Lake Tahoe Basin under the Act of December 23, 1980. Section 6905 payments are paid at a rate of (1) 1% of the fair market value of the acquired land or interests or (2) the amount of taxes levied on the land in the year prior to acquisition, whichever is lesser. Payments on these lands continue for five years or until payments have totaled 5% of the fair market value of the land. PILT is of perennial interest to many in Congress and to stakeholders throughout the country. County governments are particularly interested in the certainty of PILT payments, as well as in how payments are calculated, because many consider PILT payments to be an integral part of their annual budgets. Congressional and stakeholder interests include questions of how PILT should be funded, what lands should be included as entitlement lands, and how authorized payment levels are calculated under PILT, among others. Congress annually addresses questions of how funding should be provided to PILT. Congress has funded PILT through both mandatory and discretionary appropriations (see \" PILT Authorizations and Appropriations \"). More often than not, PILT funding has been provided through the discretionary appropriations process for one fiscal year at a time. Although PILT has consistently received funding since its enactment, the appropriations process has created uncertainty among some stakeholders about the level of annual funding. Stakeholders also have asserted that greater certainty, in terms of both the guarantee of funding and the amount of funding (i.e., full statutory calculation) would be better. Members of Congress typically contemplate the implications and tradeoffs of discretionary versus mandatory spending and may have different views than the counties that receive PILT payments. Congress, for example, may weigh its discretion to review and fund PILT on an annual basis through the appropriations process against the certainty of funding for specific activities that accompany mandatory appropriations. Several bills have been introduced to amend how PILT is funded. For example, legislation has been introduced in the 116 th Congress that would require mandatory funding for PILT for either a set period of time (e.g., 10 additional years) or indefinitely. The question of which lands should be eligible for PILT payments is also of interest to many Members and stakeholders. In law, entitlement lands are restricted to the listed federal land types (see \" Entitlement Lands \"). However, this definition does not fully encompass the types of lands that are held by the federal government, nor does it account for the full suite of lands that are exempt from state and local taxes. Although some of these other lands may receive compensation through other federal programs, not all do, which may cause financial hardships for counties that otherwise might receive revenue through taxation. To address this concern, some Members of Congress have contemplated amending the definition of entitlement lands under PILT. For example, past Congresses have introduced legislation that would have amended PILT by expanding the definition of entitlement land to include land \"that is held in trust by the United States for the benefit of a federally recognized Indian tribe or an individual Indian\"; lands under the jurisdiction of the Department of the Defense, other than those already included in PILT; lands acquired by the federal government for addition to the National Wildlife Refuge System; and lands administered by the Department of Homeland Security, among others. Amending the definition of entitlement lands could have several implications. Adding additional acres of entitlement lands could increase the authorized amount of payments under PILT, which likely would benefit those states with the added lands but not states that lack additional lands. This, in turn, could influence how Congress elects to fund PILT. Additional entitled lands may be eligible for other compensation programs, which could further affect PILT payments. The authorized payment level under Section 6902, which accounts for nearly all payments under PILT, is calculated pursuant to the statutory requirements. This section has remained largely unchanged since it was amended in 1994 to add the requirement to adjust for inflation, among other changes. The inflation adjustment clause has resulted in increasing payment and ceiling rates since that time. Congress routinely considers whether the current formula is the best means of calculating payments under PILT or whether the formula should be amended. For example, in the 116 th Congress, bills have been introduced that would adjust the payment structure for counties with a population of less than 5,000. This adjustment would have implications for how population or area would be incorporated into calculating PILT payments and whether PILT payments were provided in an equitable manner. PILT is of interest to a large number of counties and other state and local entities across the country, and it may remain of interest to many Members of Congress. In addition to the above issues, Congress may consider other issues related to PILT and how the program fits into the landscape of federal programs that compensate for the presence of tax-exempt federal lands.", "summary": "The Payments in Lieu of Taxes (PILT; 31 U.S.C. Â§Â§6901-6907) program provides compensation for certain tax-exempt federal lands, known as entitlement lands . PILT payments are made annually to units of general local governmentâtypically countiesâthat contain entitlement lands. PILT was first enacted in 1976 () and later recodified in 1982 ( P.L. 97-258 ). PILT is administered by the Office of the Secretary in the Department of the Interior (DOI), which is responsible for the calculation and disbursement of payments. PILT has most commonly been funded through annual discretionary appropriations, though Congress has authorized mandatory funding for PILT in certain years, which has replaced or supplemented discretionary appropriations. Since the start of the program in the late 1970s, PILT payments have totaled approximately $9.2 billion (in current dollars). From FY2015 through FY2019, authorized PILT payments averaged $489 million each year and appropriations for PILT payments averaged $485 million each year. Although several federal programs exist to compensate counties and other local jurisdictions for the presence of federal lands within their boundaries, PILT applies to the broadest array of land types. Entitlement lands under PILT include lands administered by the Bureau of Land Management, the National Park Service, the U.S. Fish and Wildlife Service, all in the DOI; lands administered by the U.S. Forest Service in the Department of Agriculture; federal water projects; some military installations; and selected other lands. Nearly 2,000 counties and other local units of government received an annual PILT payment in FY2019. PILT comprises three separate payment mechanisms, which are named after the sections of law in which they are authorized: Section 6902 (31 U.S.C. Â§6902), Section 6904 (31 U.S.C. Â§6904), and Section 6905 (31 U.S.C. Â§6905). Section 6902 payments are the broadest of the three. They account for nearly all of the funding disbursed under the PILT program and are made to all but a few of the counties receiving PILT funding. In contrast, Section 6904 and Section 6905 payments are provided only under selected circumstances, account for a small fraction of PILT payments, and are made to a minority of counties (most of which also receive Section 6902 payments). In addition, whereas Section 6902 payments are provided each year based on the presence of entitlement lands, most payments under Section 6904 and Section 6905 are provided only for a short duration after certain land acquisitions. Section 6902 payments are determined based on a multipart formula (31 U.S.C. Â§6903). Payments are calculated according to several factors, including (1) the number of entitlement acres present within a local jurisdiction; (2) a per-acre calculation determined by one of two alternatives (Alternative A, also called the standard rate , or Alternative B, also called the minimum provision ); (3) a population-based maximum payment (ceiling); (4) selected prior-year payments made to the counties pursuant to certain other federal compensation programs; and (5) the amount appropriated to cover the payments. Section 6904 and Section 6905 payments are provided to counties after the federal acquisition of specific types of entitlement lands (Section 6904) or entitlement lands located in specific areas (Section 6905) and are based on the fair market value of the acquisitions. If the appropriated amount is insufficient to cover the total payment amounts authorized in Sections 6902, 6904, and 6905, payments are prorated in proportion to the authorized rate. Annual discretionary appropriations bills generally also have included additional provisions dictating the terms of payments. PILT is of perennial interest to many Members of Congress and stakeholders throughout the country, and many local governments consider PILT payments to be an integral part of their annual budgets. In contemplating the future of PILT, Congress may consider topics and legislation related to the eligibility of various federal lands for entitlement under PILT (such as Indian lands or other lands currently excluded from compensation), amendments to the formula for calculating payments (especially under Section 6902), and issues related to funding PILT, among other matters.", "document_type": "crs"}
{"report": "Congress is considering federal funding for infrastructure to revive an economy damaged by Coronavirus Disease 2019 (COVID-19). This is not the first occasion on which Congress has considered funding infrastructure for purposes of economic stimulus. This report discusses the economic impact of the trans portation infrastructure funding that was provided in the American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ). Enacted on February 17, 2009, ARRA was a response to the recession that officially ran from December 2007 through June 2009. This \"Great Recession\" proved to be the most severe economic downturn since the Great Depression of the 1930s. The recession was relatively deep and the recovery relatively slow. The unemployment rate, for example, rose from 4.4% in May 2007 to 10% in October 2009, and did not fall below 6% again until September 2014. ARRA was the largest fiscal stimulus measure passed by Congress in reaction to the Great Recession. When enacted, the Congressional Budget Office (CBO) estimated the law would cost the federal government $787 billion from FY2009 through FY2019. Of this amount, infrastructure accounted for approximately $100 billion to $150 billion (13% to 19%), depending on how the term is defined (see text box, 'What is Infrastructure?'). Of the original $787 billion cost estimate, programs administered by the U.S. Department of Transportation (DOT) received a total of $48.1 billion, about 6% of the total. Other public works infrastructure funding in ARRA included $4.6 billion for Army Corps of Engineers projects, some of which were related to waterborne transportation; $4 billion for state clean water revolving funds; $2 billion for state drinking water revolving funds; and $2.5 billion for four major federal land management agencies. Authority for state and local governments to issue tax credit bonds for capital spending represented an additional federal subsidy of about $36 billion. These figures do not include ARRA funding for federal government buildings and facilities, communications technologies, and energy systems. As is the case with most federal infrastructure investment, the infrastructure support authorized in ARRA was provided in four different ways: direct spending on infrastructure the federal government owns and operates, including roads and bridges on federal lands and the air traffic control system; grants to nonfederal entities, especially state and local agencies such as state departments of transportation and local public transportation authorities; tax preferences to provide incentives for nonfederal investment in infrastructure, such as the authority granted state and local governments to issue bonds to finance capital spending on infrastructure; and credit assistance to nonfederal entities, such as loans and loan guarantees to public and private project sponsors. ARRA funding represented a 72% supplement to DOT's regular FY2009 funding of $67.2 billion. More than half of the DOT spending authorized in ARRA was for highways. The highway funding was predominantly distributed by formula, and, like most of the other funding, had to be obligated by the end of FY2010â19 months after the date of enactmentâand expended by the end of FY2015. Most of the funding for public transportation was also distributed by formula; the major exception was $750 million for the Federal Transit Administration's existing Capital Investment Grant program. The $8 billion for high-speed and intercity rail projects was an entirely new discretionary program. ARRA also created an entirely new discretionary program whose explicit purpose was economic stimulus, Transportation Investment Generating Economic Recovery (TIGER) grants, which could be used for a wide range of transportation projects ( Table 1 ). For most of these programs, the ARRA grants did not require any local match. States were required to certify that they would use these grants to supplement their planned transportation spending, rather than substituting the additional funding for their planned spending. This was known as maintenance-of-effort certification. The timing of expenditures of ARRA transportation funding demonstrated that infrastructure funding is generally expended more slowly than other types of assistance, such as unemployment compensation, Medicaid payments, and Social Security payments. Of the funding allocated to DOT, about 9% was spent within the first six months or so of availability, compared with 44% of unemployment compensation ( Table 2 ). The majority of DOT's ARRA funding was spent in FY2010 (37%) and FY2011 (24%). Another 11% was spent in FY2012. As with regular federal funding provided though DOT programs, ARRA funding was provided on a reimbursable basis. State and local governments had to complete an eligible project, or a defined part of a project, before receiving federal payment, so at least some of the intended economic effects, such as wage payments and orders for construction materials, had occurred prior to each transfer of federal grant funds to a recipient. There was a good deal of criticism of infrastructure spending as an economic stimulus, asserting that the expenditures were too slow. The Obama Administration emphasized that the money could be used for \"shovel-ready\" projects, but critics complained that there is \"no such thing as shovel ready.\" CBO data show that almost half of DOT's ARRA funding was spent within about 18 months of enactment. The Obama Administration argued that the relatively slow expenditure of infrastructure funding could offer advantages in a deep and long economic downturn, such as the Great Recession, by noting that different types of stimulus affect the economy with different speeds. For instance, aid to individuals directly affected by the recession tends to be spent relatively quickly, while new investment projects require more time. Because of the need to provide broad support to the economy over an extended period, the Administration supported a stimulus plan that included a broad range of fiscal actions. Although the ARRA infrastructure funding was expended more slowly than most other types of support provided in the law, there were major differences in the rate of expenditures among infrastructure programs. Much of the highway and transit funding was distributed by DOT agencies to their usual grantees via existing formula programs, and was therefore available for use relatively quickly. Similarly, the Federal Aviation Administration distributed airport funds through the existing Airport Improvement Program, and the Maritime Administration awarded grants through its existing Assistance to Small Shipyards Program. More than 50% of funding for these programs was expended by grantees by January 2011, less than two years after the enactment of ARRA ( Table 3 ). Discretionary funds for programs established in the law, such as for the high-speed rail program and TIGER grants, took much longer to distribute and to use because DOT had to design the programs, issue rules, advertise the availability of funds, and wait for applications. Congress recognized that setting up new programs would take some time by including longer obligation deadlines in the law. High-speed rail funding was expended particularly slowly. DOT data showed that three years after ARRA enactment, 8% of high-speed rail funding had been expended. High-speed rail had been studied for decades, but there were almost no plans or projects that were ready for implementation. In addition, unlike other parts of DOT, the Federal Railroad Administration was inexperienced at administering large amounts of grant funds. A major exception to the general distinction between the timing of formula and discretionary program expenditures was the ARRA funding for the Federal Transit Administration's Capital Investment Grant (CIG) Program. The CIG Program, also known as New Starts, funds the construction of new fixed-guideway public transportation systems and the expansion of existing systems. Eligible projects include transit rail, such as subway/elevated rail (heavy rail), light rail, and commuter rail, as well as bus rapid transit and ferries. The agency has discretion in selecting projects to receive funds and in determining the federal contribution to each approved project. ARRA provided $750 million for the CIG Program. The Federal Transit Administration distributed these funds to 11 projects already under construction that \"demonstrated some contract capacity to absorb additional revenues.\" The money was given to local transit authorities as various construction activities were completed. According to DOT, 63% of these funds were spent within one year of the ARRA's enactment and 100% were spent within two years. In general, it was easier for state and local agencies to quickly spend funds on the types of small-scale projects that are typically made possible by formula funds. The Government Accountability Office (GAO) found that more than two-thirds of highway funds were committed for pavement improvement projects, such as resurfacing, reconstruction, and rehabilitation of existing roadways, and three-quarters of transit funds were committed to upgrading existing facilities and purchasing or rehabilitating buses. Funding for airports was used to rehabilitate and reconstruct runways and taxiways, as well as to upgrade or purchase air navigation infrastructure such as air traffic control towers and engine generators. Public spending on transportation, measured in inflation-adjusted 2017 dollars, has been on a downward trend since peaking in 2003 ( Figure 1 ). Infrastructure funding provided by ARRA interrupted that trend, buoying total spending in 2010 and 2011. Except for 2009, however, state and local expenditures, which make up around 75% of total infrastructure expenditures, continued to fall. State and local spending on transportation infrastructure, adjusted for inflation, was 8% lower in 2013 than in 2007, reflecting the long-term damage the Great Recession did to state and local budgets. As the stimulus from ARRA faded, 2013 saw the lowest spending on these major infrastructure systems since the late 1990s. In some infrastructure sectors, such as highways, the growth in federal spending due to ARRA did not outweigh the decline in state and local government spending. Consequently, highway infrastructure spending fell over the period 2009 through 2013 ( Figure 2 ). Of course, there is no way to know exactly how highway spending would have changed in the absence of ARRA. Federal spending would have been lower, but it is possible that state and local government spending would have been higher if federal funding had not been available. Because of the Great Recession, state and local governments experienced a dramatic reduction in tax revenue even as demand for government services increased. For this reason, many jurisdictions found it difficult to maintain pre-recession levels of spending for at least some types of transportation infrastructure, leaving the possibility that additional federal dollars would simply replace state and local dollars. The federal share of transportation projects using ARRA funds was generally 100%, but states were required to certify that they would spend amounts already planned. This maintenance-of-effort requirement was in force from ARRA's enactment in February 2009, by which time the recession had been under way for over a year, through September 30, 2010. In its analysis of ARRA, GAO found that the maintenance-of-effort requirements in transportation were challenging to comply with and to administer. For example, governors had to certify maintenance of effort in several transportation programs, some administered by the state and some administered by local governments and independent authorities. Within each state, these various programs typically had different and complex revenue sources. In many cases, states did not have a way to identify planned expenditures. Because of ambiguities in the law and practicalities that come to light with experience, DOT issued maintenance-of-effort guidance to the states seven times in the first year after ARRA enactment. Some research on the effects of highway funding in ARRA on state highway spending found that, despite the maintenance-of-effort requirement, there was substantial substitution of federal dollars for state dollars. One analysis found that for every dollar of federal aid in ARRA for highways, on average, overall spending increased by 19 cents, meaning states decreased their own spending by 81 cents. In many infrastructure sectors, the employment effects of ARRA funding were relatively modest. In highway construction, for example, employment dropped sharply from the end of 2007 through 2009. There was a slight increase through 2010, presumably related to the ARRA funding, but a sustained increase in employment did not begin again until 2015. The number of highway construction workers reached pre-recession levels in 2018 ( Figure 3 ). Although employment in highway construction was much higher before the recession began in late 2007, employment might have fallen further in the absence of ARRA funding. The transportation funding in ARRA, therefore, may have allowed state and local governments to maintain a certain level of employment in the transportation construction sector. Additionally, it likely permitted state and local governments to maintain employment in other, nontransportation, sectors by shifting state expenditures from transportation to other purposes. The slow recovery of highway construction jobs suggests the sector could have productively absorbed more funding after the ARRA funding had largely been expended, particularly during the 2013, 2014, and 2015 construction seasons. The financial crisis and the accompanying recession affected state and local credit markets. Among other things, declines in employment and business activity made it difficult for state and local governments to raise funds through the sale of tax-exempt municipal bonds whose repayment depended on tax revenue. Limited access to financing or to financing at much higher costs may have contributed to a decline in state and local government infrastructure investment. In more normal economic times, municipal bonds account for about 10% of the capital invested in highways and public transportation. In response to the problems in the municipal credit markets, ARRA included the Build America Bond (BAB) program, which permitted state and local governments to issue tax credit bonds from April 2009 through the end of 2010 to raise funds that could be used for any type of capital investment. Unlike traditional municipal bonds, which provide a subsidy to bondholders by exempting interest payments from federal income taxation and thereby allow issuers to sell bonds at low interest rates, BABs offered a higher taxable yield to investors; the federal government subsidized 35% of the issuer's interest costs. This subsidy rate was generally seen as generous, thereby reducing borrowing costs for state and local governments. Because the interest on BABs was taxable, the bonds were attractive to investors without federal tax liability, such as pension funds, enlarging the pool of possible investors. The taxable bond market is about 10 times the size of the traditional tax-exempt bond market. This larger market may have contributed to the reduction in borrowing costs. BABs were also considered more efficient than traditional municipal bonds because all of the federal subsidy went to the state or local government issuer. With traditional tax-exempt municipal bonds, some of the subsidy goes to investors. There were 2,275 BAB issuances over the 21 months of eligibility, for a total of $181 billion. About 30% of BAB funding went to educational facilities, followed by water and sewer projects (13.8%), highways (13.7%), and transit (8.7%). Without the BAB program, some of this capital would have been raised using traditional tax-exempt bonds, although likely at a higher cost to state and local government issuers. The Department of the Treasury stated that BAB issuance surged in the last quarter of 2010, suggesting that issuers were accelerating the timing of capital financings and, thus, capital investment. Although BABs had a generous subsidy rate relative to other municipal bonds, their structure ensured that issuers paid 65% of the interest costs, effectively requiring state and local governments to pay a larger share of infrastructure costs than under ARRA grant programs. Because the federal subsidy is paid to the issuer as the interest is due to the investor, the cost to the federal government of BABs was spread over the subsequent years ( Table 2 ). Because the purpose of ARRA was to stimulate the economy, the law included time limits on the obligation and expenditure of transportation funds. As noted earlier, about half of the transportation funds appropriated by ARRA were expended by the end of FY2010, within 20 months of the law's enactment. Much of this funding went to routine projects such as highway paving and bus purchases that were quick to implement. Larger projects that required more detailed environmental reviews and complex design work were not \"shovel-ready,\" leading to assertions that ARRA did not \"fund investments that would provide long-term economic returns.\" In its examination of ARRA transportation expenditures, GAO found that the focus on quick implementation did change the mix of highway projects chosen. Some state officials stated that the deadlines \"prohibited other, potentially higher-priority projects from being selected for funding.\" However, others noted that ARRA funding allowed them to complete so-called \"state-of-good-repair\" projects, presumably leaving greater financial capacity to undertake larger projects in the future. Furthermore, economic research shows that smaller state-of-good-repair projects often have higher benefit-cost ratios than new, large \"game changing\" projects whose benefits are often more speculative. In its biennial examination of the highway and public transportation systems, DOT typically finds that, for the United States as a whole, too little is spent on state-of good-repair projects versus building new capacity. In its latest report, DOT examined actual spending in 2014 and various investment scenarios for the period 2015 through 2034. DOT found that state-of-good-repair spending was 76% of total highway spending in 2014, whereas to maximize economic benefits about 79% should go to such projects. For public transportation, DOT found that 64% to 74% of total infrastructure spending should be devoted to state-of-good repair projects, whereas 60% was used for that purpose in 2014.", "summary": "Congress is considering federal funding for infrastructure to revive an economy damaged by Coronavirus Disease 2019 (COVID-19). Congress previously provided infrastructure funding for economic stimulus in the American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ). Enacted on February 17, 2009, ARRA was a response to the \"Great Recession\" that officially ran from December 2007 through June 2009. This report discusses the economic impact of the transportation infrastructure funding in ARRA. ARRA provided $48.1 billion for programs administered by the U.S. Department of Transportation (DOT), with more than half, $27.5 billion, authorized for highways. Other funding included $8.4 billion for public transportation, $8.0 billion for high-speed rail, $1.3 billion for Amtrak, $1.3 billion for aviation programs, and $1.5 billion for Transportation Investment Generating Economic Recovery (TIGER) grants, which could be used for a wide range of transportation projects. Most of the ARRA funding was distributed by DOT agencies to their usual grantees via existing formula programs. The high-speed rail funding and TIGER grants required the establishment of two new discretionary programs. Based on approximately a decade or more of program and other data, the following are among the observations that can be made with regard to the economic effects of ARRA funding for transportation infrastructure: Infra structure s pending wa s s lower than o ther t ypes of s timulus . ARRA transportation funding was expended more slowly than other types of assistance, such as unemployment compensation. About 9% of DOT funding was spent within the first six months of availability compared with 44% of unemployment compensation. The majority of DOT's ARRA funding was spent in FY2010 (37%) and FY2011 (24%). Characteristics of i nfrastructure f unding a ffect ed e xpenditure t iming. Funding that was distributed by DOT agencies to their usual grantees via existing formula programs was expended relatively quickly. This included most of the funding for highways, public transportation, aviation, and maritime transportation. Discretionary funds for programs established in the law, such as for the high-speed rail program and TIGER grants, took much longer to expend on construction because DOT had to design the programs, issue rules, advertise the availability of funds, and wait for applications from state and local agencies, which then had to complete their own contracting procedures to get work under way. The l evel of i nfrastructure i nvestment d epend ed on n onfederal e ntities. State and local expenditures make up around 75% of transportation infrastructure expenditures. In some sectors, such as highways, the growth in federal spending due to ARRA was accompanied by a decline in state and local government spending. Maintenance-of- e ffort r equirements we re d ifficult to e nforce. The federal share of transportation projects using ARRA funds was generally 100%, but states were required to certify that they would spend amounts already planned. These maintenance-of-effort requirements in transportation were challenging to comply with and to administer. Employment e ffects w ere m odest . Employment in highway construction, for example, rose slightly in the year following the passage of ARRA. A sustained increase in employment did not begin until 2015. Financing i nfrastructure did l everage s tate r esources . ARRA included the Build America Bond (BAB) program, which permitted state and local governments to issue tax credit bonds for any type of capital investment. The attractiveness of BABs may have accelerated the timing of capital financings and, thus, capital investment. BABs had a relatively generous subsidy rate, but compared with ARRA grants, the issuance of BABs for infrastructure ensured a state funding match of 65%. Stimulus- f unded p rojects c an p rovide t ransportation b enefits . Most ARRA transportation funding went to routine projects such as highway paving and bus purchases that were quick to implement. According to DOT estimates, such projects often have higher benefit-cost ratios than large \"game changing\" projects that build new capacity.", "document_type": "crs"}
{"report": "Numerous natural disastersâincluding the 2017 hurricane season and devastating wildfires in Californiaâserved as catalysts for significant recent changes in federal emergency management policy. Most of these policy changes were included in the Disaster Recovery Reform Act of 2018 (DRRA), which was included as Division D of the FAA Reauthorization Act of 2018 ( P.L. 115-254 ). DRRA is the most comprehensive reform of the Federal Emergency Management Agency's (FEMA's) disaster assistance programs since the passage of the Sandy Recovery Improvement Act of 2013 (SRIA, Division B of P.L. 113-2 ) and the Post-Katrina Emergency Management Reform Act of 2006 (PKEMRA, P.L. 109-295 ). As with past disaster legislation, lessons learned following recent disasters revealed areas that could be improved through legislative and programmatic changes, including the need for increased preparedness and pre-disaster mitigation. The legislative intent of DRRA includes improving disaster preparedness, response, recovery, and mitigation, including pre-disaster mitigation; clarifying assistance program eligibility, processes, and limitations, including on the recoupment of funding; and increasing FEMA's transparency and accountability. Thus, DRRA amends many sections of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act, P.L. 93-288 , as amended; 42 U.S.C. Â§Â§5121 et seq.), which provides the authority for the President to issue declarations of emergency and major disasters, and provides a range of federal assistance to local, state, territorial, and Indian tribal governments, as well as certain private nonprofit organizations, and individuals and families. In addition to numerous amendments to the Stafford Act, DRRA includes new standalone authorities, and requires reports to Congress, rulemaking, and other actions. This report is structured to first provide a tabular overview of the major changes that DDRA made to the Stafford Act (see Table 1 ). The report then provides detailed explanations of the programmatic and procedural modifications to various disaster assistance programs under DRRA. These DRRA modifications are grouped in the following sections: preparedness; mitigation; public assistance; individual assistance; flood plain management and flood insurance; and other provisions. In addition to a description of DRRA's changes to programs, each section includes potential policy considerations for Congress. Appendix A includes the following tables of deadlines associated with DRRA's reporting, rulemaking/regulatory, and other implementation actions and requirements: Table A-1 , DRRA Reporting Requirements (i.e., reports to Congress); Table A-2 , DRRA Rulemaking and Regulations Requirements; and Table A-3 , DRRA Guidance and Other Required Actions. A table of common acronyms used throughout this report is also included in Table B-1 of Appendix B . Finally, a brief legislative history of DRRA is included in Appendix C . DRRA Section 1208 requires the FEMA Administrator to provide guidance and annual training to state, local, and Indian tribal governments; first responders; and utility companies on the need to prioritize assistance to hospitals, nursing homes, and other long-term health facilities to ensure they remain functioning, or return to functioning as soon as possible, during power outages related to natural hazards and severe weather; how these medical facilities should prepare for power outages related to natural hazards and severe weather; and how local, state, territorial, and Indian tribal governments; first responders; utility companies; and these medical facilities should develop a strategy to coordinate and implement emergency response plans. Recent hurricanes have caused power outages affecting millions of individuals, including those in medical care facilities. For example, following Hurricane Harvey, 200,000 people lost power in south-east Texas. Additionally, in Florida, after Hurricane Irma made landfall, 4 million people lost power and failed air conditioning at a nursing home led to 11 deaths. DRRA Section 1208 may result in medical care facilities being better prepared for power outages and help mitigate the damage (and potential deaths) associated with power outages. DRRA Section 1209 requires the FEMA Administrator, in coordination with the Administrator of the Federal Highway Administration (FHWA), to develop and issue guidance for state, local, and Indian tribal governments in identifying evacuation routes. Specifically, the FEMA Administrator is to revise existing guidance, or issue new guidance, on these evacuation routes. The FEMA Administrator, in developing this guidance, is to consider whether these evacuation routes have resisted disaster impacts and recovered quickly from disasters; the need to evacuate special needs populations; information sharing and public communications with evacuees; sheltering evacuees, including the care, protection, and sheltering of their animals; the return of evacuees to their homes; other issues or items the Administrator considers appropriate; methods that assist evacuation route planning and implementation; the ability of the evacuation routes to manage contraflow operations; the input of federal land management agencies where evacuation routes may cross or go through public land; and such other issues or items the FHWA Administrator considers appropriate. Section 1209 also states that the FEMA Administrator may, in coordination with the FHWA Administrator and local, state, territorial, and Indian tribal governments, conduct a study of the adequacy of available evacuation routes, and submit recommendations on how to assist with anticipated evacuation flow. Currently, FHWA uses various tools and technology for hurricane modeling, information sharing, and transportation (evacuation) modeling and analysis. DRRA Section 1209 codifies practices that FEMA and FHWA currently employ to address evacuation route planning and implementation of evacuations. DRRA Section 1236 requires the FEMA Administrator, in coordination with other relevant agencies, to provide annual guidance and training on coordination of emergency response plans to local, state, territorial, and Indian tribal governments; first responders; and hazardous material storage facilities. Specifically, the annual guidance and training shall include: a list of required equipment for a release of hazardous substances and material; an outline of health risks associated with exposure to hazardous substances and materials; and published best practices for mitigating damage, and danger, to communities from hazardous materials. This required annual guidance and training is to be implemented not later than 180 days after DRRA's enactment (i.e., by April 3, 2019). Prior to DRRA and presently, the U.S. Department of Homeland Security (DHS) provides hazardous materials information from myriad sources, such as universities and other local and federal agencies. The available information includes procedures and resources for responding to different types of hazardous material releases, independent study training courses, and several resources related to medical management for chemical exposures, but the information is broadly distributed and may not be quickly accessible when responding to a hazardous materials incident. DRRA Section 1236 adds not only the plan coordination training requirement, but also requires the development of resources that may streamline information that can be incorporated into emergency response plans, such as the list of required equipment and health risks. DRRA Section 1234 authorizes the National Public Infrastructure Pre-Disaster Mitigation Fund (NPIPDM), which allows the President to set aside 6% from the Disaster Relief F und (DRF) with respect to each major disaster, establishes limitations on the receipt of pre-disaster hazard mitigation funding, and expands the criteria considered in awarding mitigation funds. Pre-Disaster Mitigation (PDM) funding is authorized by Stafford Act Section 203âPre-Disaster Hazard Mitigation, with the goal of reducing overall risk to the population and structures from future hazard events, while also reducing reliance on federal funding from future disasters. For FY2019, the PDM program is funded through the DRF . Pre-DRRA, the amount available for PDM was appropriated separately on an annual basis, and financial assistance was limited by the amount available in the National Pre-Disaster Mitigation Fund. FEMA awarded PDM grants competitively, and 56 states and jurisdictions, as well as federally-recognized Indian tribal governments, were eligible to apply. Local governments, including Indian tribes or authorized tribal organizations, were required to apply to their state/territory as subapplicants. In FY2018, each state, jurisdiction, and tribe was eligible for a baseline level of financial assistance in the amount of the lesser of 1% of appropriated funding, or $575,000, although additional funding could be awarded competitively. No applicant was eligible to receive more than 15% of the appropriated funding. In FY2018, FEMA set aside 10% of the appropriation for federally recognized tribes. FEMA sets priorities annually for the competitive PDM funding, with priority given to applicants that have little or no disaster funding available through the Hazard Mitigation Grant Program (HMGP). In FY2018, FEMA awarded $235.2 million in PDM funding . DRRA authorizes the NPIPDM, for which the President may set aside from the DRF, with respect to each major disaster, an amount equal to 6% of the estimated aggregate amount of the grants to be made pursuant to the following sections of the Stafford Act: Section 403âEssential Assistance; Section 406âRepair, Restoration, and Replacement of Damaged Facilities; Section 407âDebris Removal; Section 408âFederal Assistance to Individuals and Households; Section 410âUnemployment Assistance; Section 416âCrisis Counseling Assistance and Training; and Section 428âPublic Assistance Program Alternative Procedures. The amount set aside for PDM shall not reduce the amounts otherwise available under the sections above. Funding from the NPIPDM may be used to provide technical and financial mitigation assistance pursuant to each major disaster. An additional clause in DRRA provides that NPIPDM funds may be used \"to establish and carry out enforcement activities and implement the latest published editions of relevant consensus-based codes, specifications, and standards that incorporate the latest hazard-resistant designs and establish minimum acceptable criteria for the design, construction, and maintenance of residential structures and facilities that may be eligible for assistance under this Act.... \" The changes to PDM funding in DRRA may increase the focus on funding public infrastructure projects that improve community resilience before a disaster occurs, though FEMA has the discretion to shape the program in many ways. There is potential for significantly increased funding post-DRRA through the new transfer from the DRF, but it is not yet clear how FEMA will implement this new program. In the Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) , Congress made $250 million available for PDM for FY2019, which may be merged with funds for the NPIPDM once it is fully implemented. The FY2019 PDM program will be the last PDM cycle before the rollout of the new DRRA Building Resilient Infrastructure and Communities (BRIC) Program. FEMA has authority to operate the legacy PDM program for FY2019, after which BRIC will replace the current PDM program. Funding not used in FY2019 will remain for the first year of BRIC, which will likely begin in FY2020. PDM projects already in progress will continue through closeout under the current PDM guidance. Any unobligated PDM funds may be rolled into a \"carryover PDM\" funding account which could be used for obligations of PDM projects underway when BRIC is implemented. Once BRIC is fully implemented, legacy PDM funds may be merged with BRIC funds, which may then be used for both PDM and BRIC work. FEMA is in the process of determining how funds under the 6% set-aside will be allocated to local, state, territorial, and Indian tribal governments. FEMA expects that BRIC will be funded entirely by the 6% set-aside; however, nothing prohibits Congress from appropriating additional funds for the program. FEMA anticipates setting aside the full 6% estimate from each major disaster declaration within 180 days after declaration. Based on the recent funding trends of the DRF, FEMA assumes that it would be a rare circumstance in which there is no set-aside. Other provisions in DRRA Section 1234 establish that mitigation funds under Stafford Act Section 203 would only be provided to states which had received a major disaster declaration in the past seven years, or any Indian tribal governments located partially or entirely within the boundaries of such states. Other provisions would expand the criteria to be considered in awarding mitigation funds, including the extent to which the applicants have adopted hazard-resistant building codes and design standards, and the extent to which the funding would increase resiliency. DRRA Section 1235(a) amends Stafford Act Section 404(a)âHazard Mitigation to include a provision authorizing the President to contribute up to 75% of the cost of hazard mitigation measures which the President has determined are cost effective and which increase resilience to future damage, hardship, loss, or suffering in any area affected by a major disaster. The pre-DRRA language only authorized funding for hazard mitigation measures which substantially reduce risk. DRRA does not include definitions of reducing risk or increasing resilience. However, DRRA Section 1235(d) requires FEMA to issue a rulemaking defining the terms resilient and resiliency , and although these definitions relate to Stafford Act Section 406âRepair, Restoration, and Replacement of Damaged Facilities, FEMA may consider using these definitions for mitigation activities as well. DRRA Section 1205 amends Stafford Act Section 404âHazard Mitigation by adding a section to allow recipients of hazard mitigation assistance provided under this section and Section 203âPre-Disaster Hazard Mitigation to use the funding to conduct activities to help reduce the risk of future damage, hardship, loss, or suffering in any area affected by a wildfire or windstorm. The section includes a nonexclusive list of wildfire and windstorm mitigation activities that are eligible for funding. These activities were eligible for funding pre-DRRA, but this section is intended to clarify eligible uses of funding under FEMA's hazard mitigation grant programs. DRRA Section 1217 amends Section 209(c)(2) of the Public Works and Economic Development Act of 1965 such that, when assistance is given to communities whose economy has been injured by a major disaster or emergency and which have received a major disaster or emergency declaration under the Stafford Act, the Secretary of Commerce may encourage hazard mitigation if appropriate. The Public Works and Economic Development Act of 1965 did not have any previous mention of mitigation; however, this provision does not give the Secretary any additional tools by which to encourage hazard mitigation. Section 1204 of DRRA amends Stafford Act Sections 420âFire Management Assistance and 404(a)âHazard Mitigation to include HMGP for Fire Management Assistance Grant (FMAG) declarations. The Stafford Act authorizes three types of declarations that provide federal assistance to states and localities: (1) FMAG declarations, (2) emergency declarations, and (3) major disaster declarations. FMAGs provide federal assistance for fire suppression activities. Emergency declarations trigger aid that protects property, public health, and safety and lessens or averts the threat of an incident becoming a catastrophic event. A major disaster declaration constitutes the broadest authority for federal agencies to provide supplemental assistance to help state and local governments, families and individuals, and certain nonprofit organizations recover from the incident. Major disaster declarations also authorize statewide hazard mitigation grants to states and tribes through FEMA's HMGP. Authorized under Stafford Act Section 404âHazard Mitigation, HMGP can be used to fund mitigation projects to protect either private or public property, provided that the project fits within local, state, territorial, and Indian tribal government mitigation strategies to address risk and complies with HMGP guidelines. HMGP grant amounts are provided on a sliding scale based on the percentage of funds spent for Public and Individual Assistance for each presidentially-declared major disaster declaration. For states and federally-recognized tribes with a FEMA-approved Standard State or Tribal Mitigation Plan, the formula provides for up to 15% of the first $2 billion of estimated aggregate amounts of disaster assistance, up to 10% for amounts between $2 billion and $10 billion, and 7.5% for amounts between $10 billion and $35.333 billion. DRRA Section 1204 also requires the FEMA Administrator to submit a report one year after enactment and annually thereafter containing a summary of any mitigation projects carried out, and any funding provided to those projects, to the Senate Committee on Homeland Security and Governmental Affairs (HSGAC), the House Committee on Transportation and Infrastructure, and the House and Senate Committees on Appropriations. One potential issue of congressional concern is the cost implications of providing mitigation funding for FMAG declarations. All things being equal, making HMGP available for FMAGs will increase federal expenditures for HMGP because it expands the number of incidents eligible for HMGP. The additional costs, however, may not be significant compared to HMGP funding for major disaster declarations. As previously discussed, HMGP grants are based on the percentage of funds spent for Public and Individual Assistance. Though it is unclear how the HMGP formula will be applied to FMAG declarations, HMGP grant amounts would likely be less than what is typically provided for major disasters because funding for major disasters is significantly more than what is provided for FMAGs. For example, from FY2017 to FY2018, $12.3 million has been obligated for FMAG declarations. In contrast, $1.7 billion has been obligated for Hurricane Matthew. Furthermore, HMGP funding for FMAGs could be considered an investment because the projects they fund can help save recovery costs for future disasters. DRRA Section 1233 authorizes recipients of hazard mitigation assistance to use the assistance to reduce the risk of earthquake damage, hardship, loss, or suffering for areas in the United States affected by earthquake hazards. DRRA Section 1233 addresses three areas of earthquake mitigation, all related to improving the capability for an earthquake early-warning system: improvements to regional seismic networks; improvements to geodetic networks; and improvements to seismometers, global positioning system (GPS) receivers, and associated infrastructure. The earthquake hazards and mitigation community long ago shifted away from an early focus on predicting earthquakes to mitigating earthquake hazards and reducing risk, and more recently to a focus on activities that would enhance the effectiveness of an earthquake early-warning system. An earthquake early-warning system would send a warning after an earthquake occurred but before the damaging seismic waves reach a community that would be affected by the earthquake-induced shaking. In contrast, an earthquake prediction would provide a date, time, and location of a future earthquake. The National Earthquake Hazards Reduction Program Reauthorization Act of 2018 ( P.L. 115-307 ) removed statutory language referencing the goal of earthquake prediction, substituting instead the goal of issuing earthquake early warnings and alerts. Since 2006, the U.S. Geological Survey (USGS), together with several cooperating institutions, has been working to develop a U.S. earthquake early-warning system. According to the USGS, the goal is to create and operate such a system for the nation's highest-risk regions, beginning with California, Oregon, and Washington. Other seismically active western states, such as Alaska, also may eventually be incorporated into an early-warning system, and possibly a region in the Midwest known as the New Madrid Seismic Zone. The authority provided in DRRA Section 1233 could help improve the U.S. early-warning capability because it addresses many of the components for earthquake detection (e.g., seismometers, the instruments that detect shaking), location (e.g., GPS receivers and infrastructure for more precise mapping of where shaking will occur), and improvements to the connected regional networks of seismometers and geodetic instruments. Part of the challenge in implementing an effective earthquake early-warning system is communicating the timing and location of dangerous shaking once the earthquake occurs. The section does not appear to address that challenge directly; however, improvements to the components specified in the section would likely improve overall early-warning system performance. DRRA Section 1231 requires FEMA, not later than 180 days after enactment (April 3, 2019), to issue guidance regarding the acquisition of property for open space as a mitigation measure under Stafford Act Section 404âHazard Mitigation. This guidance shall include a process by which the State Hazard Mitigation Officer (SHMO) appointed for the acquisition shall provide written notification to the local government, not later than 60 days after the applicant for assistance enters into an agreement with FEMA regarding the acquisition, that includes (1) the location of the acquisition; (2) the state-local assistance agreement for the Hazard Mitigation Grant Program; (3) a description of the acquisition; and (4) a copy of the deed restrictions. The guidance shall also include recommendations for entering into and implementing a memorandum of understanding between units of local government and the grantee or subgrantee, the state, and the regional FEMA Administrator that includes provisions to (1) use and maintain the open space consistent with Section 404 and all associated regulations, standards and guidance, and consistent with all adjoining property, so long as the cost of the maintenance is borne by the local government; and (2) maintain the open space pursuant to standards exceeding any local government standards defined in the agreement with FEMA. DRRA Section 1215 amends Stafford Act Section 324(b)(2)(A)âManagement Costs by setting out specific management cost caps for hazard mitigation. A grantee under Stafford Act Section 404âHazard Mitigation may be reimbursed not more than 15% of the total award, of which not more than 10% may be used by the grantee and 5% by a subgrantee. DRRA Section 1207(c) amends Stafford Act Section 428(d)âPublic Assistance Program Alternative Procedures to prohibit the conditioning of federal assistance under the Stafford Act on the election of an eligible entity to participate in the alternative procedures set forth in Section 428 of the Stafford Act. Prior to enactment of this provision of DRRA, FEMA had the discretion to impose conditions on the use of Section 428 procedures. DRRA Section 1207(d) amends Section 428(e)(1) to add a provision that requires cost estimates submitted under Section 428 procedures that are certified by a professionally licensed engineer and accepted by the FEMA Administrator to be presumed to be reasonable and eligible costs unless there is evidence of fraud. Prior to enactment of this provision, FEMA had the discretion to make case-by-case determinations regarding whether costs were reasonable and eligible, and FEMA had the discretion to change the determinations even after an original cost estimate had been approved. DRRA Section 1206(b) amends Stafford Act Section 406âRepair, Restoration, and Replacement of Damaged Facilities to add base and overtime wages for extra hires to facilitate implementation and enforcement of adopted building codes as an allowable expense. Allowable base and overtime wages are authorized for not more than 180 days after a major disaster declaration is issued. DRRA Section 1235(b) amends Stafford Act Section 406âRepair, Restoration, and Replacement of Damaged Facilities to specify that eligible costs for assistance provided under Section 406 be based on estimates of repairing, restoring, reconstructing, or replacing a public facility or private nonprofit facility in conformity with \"the latest published editions of relevant consensus-based codes, specifications, and standards that incorporate the latest hazard-resistant designs and establish minimum acceptable criteria for the design, construction, and maintenance of residential structures and facilities.\" DRRA Section 1235 also requires that such eligible costs include estimates of replacing eligible projects under Stafford Act Section 406 \"in a manner that allows the facility to meet the definition of resilient\" developed pursuant to Section 406(e)(1)(A). Prior to DRRA's enactment, FEMA required that such project cost estimates be based on more general language of \"codes, specifications, and standards\" in place at the time the disaster occurred. DRRA Section 1235(c) amends Stafford Act Section 406 to authorize the contributions for eligible costs to be provided on an actual cost basis or based on cost-estimation procedures and DRRA Section 1235(d) directs the FEMA Administrator, in consultation with the heads of relevant federal agencies, to establish new rules regarding defining \"resilient\" and \"resiliency\" for the purposes of eligible costs under Section 406 of the Stafford Act. DRRA directs the President, acting through the FEMA Administrator, to issue a final rulemaking notice on the new rules not later than 18 months after DRRA's enactment (i.e., by April 5, 2020), and requires a final report summarizing the regulations and guidance issued defining \"resilient\" and \"resiliency\" to be submitted to Congress no later than two years after DRRA's enactment (i.e., by October 5, 2020). DRRA Section 1228 requires the FEMA Administrator, in coordination with the FHWA Administrator, to develop and issue guidance for local, state, territorial, and Indian tribal governments regarding repair, restoration, and replacement of inundated and submerged roads damaged or destroyed by a major disaster. The guidance must address associated expenses incurred by the government for roads eligible for assistance under Stafford Act Section 406âRepair, Restoration, and Replacement of Damaged Facilities. Prior to DRRA's enactment, FEMA did not issue guidance specifically addressing inundated and submerged roads and alternatives in the use of federal disaster assistance for the repair, restoration, and replacement of roads damaged by a major disaster. DRRA Section 1215 amends Stafford Act Section 324(b)(2)(B)âManagement Costs to place a cap on any direct administrative costs, and any other administrative associated expenses, of not more than 12% of the total award amount provided under Stafford Act Sections 403âEssential Assistance, 406âRepair, Restoration, and Replacement of Damaged Facilities, 407âDebris Removal, and 502âFederal Emergency Assistance. The 12% cap is to be divided between the primary grantee and subgrantees with the primary grantee receiving not more than 7%, and subgrantees receiving not more than 5% of the total award amount. DRRA Section 1213 amends Stafford Act Section 408(c)(1)(B)(ii)âFederal Assistance to Individuals and Households, Temporary Housing, Direct Assistance, Lease and Repair of Rental Units for Temporary Housing to expand the eligible areas for multifamily lease and repair properties, and remove the requirement that the value of the improvements or repairs not exceed the value of the lease agreement. FEMA's Multifamily Lease and Repair program is a form of direct temporary housing assistance under Stafford Act Section 408. When eligible individuals and households are unable to use Rental Assistance due to a lack of available housing resources and when it is determined to be a cost-effective alternative to other temporary housing options, FEMA may enter into lease agreements with the owners of multifamily rental property units and may make improvements or repairs, in order to provide temporary housing. FEMA guidance includes limitations on the conditions of eligibility required to authorize properties for multifamily lease and repair. Prior to DRRA's enactment, multifamily lease and repair properties had to be located in areas covered by an emergency or major disaster declaration. Following DRRA's enactment, however, eligible properties also include those \"impacted by a major disaster.\" According to the House Transportation and Infrastructure Committee's Disaster Recovery Reform Act Report ( DRRA Report ), in amending this section of the Stafford Act, Congress intended to \"allow greater flexibility and options for housing disaster victims.\" Thus, DRRA Section 1213 expands program eligibility for properties, which may increase the number of FEMA-leased multifamily rental properties. This may: increase available housing stock for eligible individuals and households; and reduce FEMA's reliance on other, less cost-effective forms of direct assistance (e.g., Transportable Temporary Housing Units (TTHUs)). Although it was released following DRRA's enactment, FEMA's most recent guidanceâthe Individual Assistance Program and Policy Guide ( IAPPG ) âstates that in order to be eligible for multifamily lease and repair, \"[t]he property must be located in an area designated for IA [Individual Assistance] included in a major disaster declaration,\" which is inconsistent with Stafford Act Section 408(c)(1)(B)(ii)(I)(aa), as amended by DRRA. The IAPPG does, however, add the ability for FEMA to add counties/jurisdictions to the major disaster declaration designed for IA \"specifically for the purpose of implementing MLR [Multifamily Lease and Repair].\" Thus, while FEMA's most recent guidance expands the agency's ability to implement MLR, it still states that properties must be in designated areas. In order to reflect the changes to the Multifamily Lease and Repair program post-DRRA, FEMA would need to update its guidance to be consistent with Stafford Act Section 408(c)(1)(B)(ii)(I)(aa), as amended, and may consider defining what it means for a property to be \"impacted by a major disaster,\" and any additional, related eligibility criteria. Prior to DRRA's enactment, the value of the improvements or repairs were not permitted to exceed the value of the lease agreement, which, per FEMA policy, could not be greater than the Fair Market Rent (FMR). Post-DRRA, the restriction that improvements or repairs not exceed the value of the lease agreement has been removed from Stafford Act Section 408(c)(1)(B)(ii)(II)âFederal Assistance to Individuals and Households, Temporary Housing, Direct Assistance, Lease and Repair of Rental Units for Temporary Housing, as amended. Additionally, and as was the case prior to DRRA, the cost-effectiveness of the potential multifamily lease and repair property must still be considered when FEMA determines whether or not to enter into a lease agreement with a property owner for the purpose of providing Multifamily Lease and Repair assistance. As stated above, when eligible individuals and households are unable to use Rental Assistance and when it is determined to be a cost-effective alternative to other temporary housing options, FEMA may use multifamily lease and repair to provide temporary housing. According to FEMA's guidance, the process by which the agency determines the cost-effectiveness of a potential multifamily lease and repair property is that \"FEMA will determine the value of the lease agreement by multiplying the approved monthly Rental Assistance rate by the number of units, and then multiplying the number of months remaining between the date the repairs are completed and the end of the 18-month period of assistance.\" FEMA guidance, however, currently states that there are three steps that FEMA must take to determine the cost-effectiveness of a potential multifamily lease and repair property. FEMA would need to update the IAPPG to clarify the process by which FEMA determines cost-effectiveness and to reflect the fact that the cost-effectiveness determination is not based on a three-step test. Additionally, it is unclear whether the removal of the restriction that improvements or repairs not exceed the value of the lease agreement will have a significant impact on program administration. There are several reasons the impact of this legislative change may not be significant including: the property must be found to be cost-effective even if a potential property requiring improvements or repairs in excess of the value of the lease agreement may be otherwise eligible; and prior to DRRA's enactment, it was possible for FEMA to enter into lease agreements when the value of the improvements or repairs exceeded the value of the lease agreement, provided the necessary written justification was submitted and approved. Finally, within two years (i.e., due by October 5, 2020), the Inspector General (IG) of DHS must assess the use of FEMA's direct assistance authority, including the adequacy of the benefit-cost analysis conducted, to justify this alternative to other temporary housing options, and submit a report to Congress. DRRA Section 1211(a) amends Stafford Act Section 408(f)âFederal Assistance to Individuals and Households, State Role to expand the types of FEMA Individuals and Households Program (IHP) assistance that a state, territorial, or Indian tribal government may request to administer under Stafford Act Section 408(f)(1)(A) to include Direct Temporary Housing Assistance under Section 408(c)(1)(B) and Permanent Housing Construction under Section 408(c)(4), in addition to Other Needs Assistance (ONA) under Section 408(e). Prior to DRRA's enactment, Stafford Act Section 408(f)(1) only allowed state, territorial, and Indian tribal governments to request financial assistance to manage ONA. According to Senate HSGAC's Disaster Recovery Reform Act of 2018 Report ( DRRA Report ), this section of DRRA \"emphasizes the need for and provides tools to execute an effective local response to disasters ... [in part by] empowering states to administer housing assistance efforts.\" FEMA has also stated that: [s]tate and tribal officials have the best understanding of the temporary housing needs for survivors in their communities. This provision incentivizes innovation, cost containment and prudent management by providing general eligibility requirements while allowing them the flexibility to design their own programs. These statements highlight a key aspect of this amendment to the Stafford Actâthat, because the federal share of eligible housing costs is 100%, in effect, FEMA may now provide state, territorial, and Indian tribal governments with a block grant for disaster housing assistance, provided certain requirements are met (see below). Allowing state, territorial, or Indian tribal governments to administer these housing programs, in addition to ONA, using a flexible, block-grant program that \"leverag[es] state autonomy\" \"to tailor a solution that specifically addresses the needs of disaster victims\" may expedite and enhance disaster recovery. Despite these benefits, the ability for state, territorial, or Indian tribal governments to design and administer customized versions of these programs has the potential to result in challenges. For example: individuals and households may face challenges to participating in these programs if application processes and program requirements are not clearly defined, or if their past participation in these programs differs from future program implementation; client advocates and case managers may have trouble supporting individuals and households seeking to and/or participating in these programs if application processes and program administration differ from jurisdiction to jurisdiction, or if a state/territorial/Indian tribal government implements the programs differently for different disasters; state, territorial, and Indian tribal governments seeking to administer these programs may also struggle to administer active programs with different application processes and program administration requirements, and may find it difficult to manage programs when future program implementation differs from past program implementation; and federal partners supporting state, territorial, and Indian tribal governments may find it difficult to keep track of application processes and program administration that differs from jurisdiction to jurisdiction, or when future program implementation differs from past program implementation. In addition to the programmatic flexibility accorded by this amendment to the Stafford Act, state, territorial, or Indian tribal governments that elect to administer housing assistance and/or ONA under Section 408(f) are eligible to expend up to 5% of the amount of the grant for administrative costs. This may increase their capacity to quickly and effectively administer these programs. With the addition of the ability of state, territorial, or Indian tribal governments to administer Direct Temporary Housing Assistance and Permanent Housing Construction, it is possible that the state, territorial, or Indian tribal government may be required to select an option for administration of assistance, as in the case with ONA. Within two years of DRRA's enactment (i.e., by October 5, 2020), FEMA is required to issue final regulations to establish how a state, territorial, or Indian tribal government is to administer Direct Temporary Housing Assistance and Permanent Housing Construction. In the intervening period, FEMA has the ability to administer this as a pilot program until the final regulations are promulgated (an example of such a regulation can be found in 44 C.F.R. Â§206.120âState Administration of Other Needs Assistance, which sets out the regulations for state administration of ONA). In addition to expanding the types of assistance state, territorial, and Indian tribal governments may administer, DRRA adds requirements for the receipt of approval to administer such assistance. Prior to DRRA's enactment, in order to administer ONA, a governor had to request a grant to provide financial assistance. Post-DRRA, if a state, territorial, or Indian tribal government would like to administer Direct Temporary Housing Assistance, Permanent Housing Construction, and/or ONA, then it must \"submit to the President an application for a grant to provide financial assistance under the program [emphasis added].\" DRRA also includes criteria for the approval of applications, as follows: (i) a requirement that the State or Indian tribal government submit a housing strategy under subparagraph (C) [Requirement of Housing Strategy]; (ii) the demonstrated ability of the State or Indian tribal government to manage the program under this section; (iii) there being in effect a plan approved by the President as to how the State or Indian tribal government will comply with applicable Federal laws and regulations and how the State or Indian tribal government will provide assistance under its plan; (iv) a requirement that the State or Indian tribal government comply with rules and regulations established pursuant to subsection (j); and (v) a requirement that the President, or the designee of the President, comply with subsection (i) [Verification Measures]. Three requirements intended to ensure the state, territorial, or Indian tribal government that seeks to administer these programs has the capacity to do so, include: the state, territorial, or Indian tribal government must have an approved housing strategy, which may encourage the development of disaster housing strategies to better enable effective local response to disasters; the state, territorial, or Indian tribal government must have the demonstrated ability to manage the programâalthough it is unclear what evidence may be used to demonstrate the capacity to manage the housing-related programs (note that FEMA is developing guidance for the administration of Direct Temporary Housing and Permanent Housing Construction). An approved State Administrative Plan is a requirement to administer ONA, and FEMA considers this sufficient to demonstrate the state, territorial, or Indian tribal government's capability to manage ONA; and the President or designee shall implement policies, procedures, and internal controls to prevent \"waste, fraud, abuse, and program mismanagement\"; it is possible for the President to withdraw the approval for the state, territorial, or Indian tribal government to administer Direct Temporary Housing Assistance, Permanent Housing Construction, or ONA. FEMA may need to clarify the application and approval requirements because it is unclear (1) how concepts such as \"waste\" and \"abuse\" are defined in this context; (2) how the determination that \"the State or Indian tribal government is not administering the program ... in a manner satisfactory to the President\" will be madeâalthough DRRA includes a requirement that the DHS IG periodically audit the programs administered by the state, territorial, or Indian tribal governments, and these audits may be used to assess program administration; and (3) how program administration will be managed following a withdrawal of approval and/or whether there will be an opportunity for the state, territorial, or Indian tribal government to remedy any issues identified with regard to program administration or appeal a decision withdrawing approval. Within two years of DRRA's enactment (i.e., by October 5, 2020), FEMA is required to issue final regulations on the administration of this program, in which FEMA may consider addressing the administration of the application and approval processes and requirements, including the requirements for demonstrating the capacity to manage the program, and the process for the withdrawal of approval and any remedies the state, territorial, or Indian tribal government may have. DRRA Section 1211(b) provides a mechanism for state and local units of government to be reimbursed in the event they do not request a grant to administer housing assistance, if the solution they implement satisfies several conditions. Specifically, DRRA Section 1211(b) notes that FEMA shall reimburse state and local \"units of government\" for locally-implemented housing solutions that meet three requirements, provided the request for reimbursement is received within a three-year period after a major disaster declaration under Stafford Act Section 401âProcedure for Declaration. The three requirements are that the solution: (1) costs 50 percent of comparable FEMA solution or whatever the locally implemented solution costs, whichever is lower; (2) complies with local housing regulations and ordinances; and (3) the housing solution was implemented within 90 days of the disaster. It is unclear how and when a reimbursement will be provided when a housing solution meets the proper eligibility conditions set forth above. FEMA may issue a new rulemaking and/or policy guidance to establish how the cost of the locally-implemented solution will be assessed and compared with the FEMA solution, as well as how reimbursement requests will be processed. DRRA Section 1212 amends Stafford Act Section 408(h)âFederal Assistance to Individuals and Households, Maximum Amount of Assistanceâto create separate caps for the maximum amount of financial assistance eligible individuals and households may receive for housing assistance and for ONA, and allow for accessibility-related costs. Under FEMA's IHP, financial assistance (e.g., assistance to rent alternate housing accommodations, conduct home repairs, and ONA) and/or direct assistance (e.g., Multifamily Lease and Repair and TTHUs) may be available to eligible individuals and households who, as a result of a disaster, have uninsured or under-insured necessary expenses and serious needs that cannot be met through other means or forms of assistance. Prior to DRRA, an individual or household could receive up to $33,300 (FY2017; adjusted annually) in financial assistance, which included both housing assistance and ONA. Post-DRRA, financial assistance for housing-related needs may not exceed $34,900 (FY2019; adjusted annually), and, separate from that , financial assistance for ONA may not exceed $34,900 (FY2019; adjusted annually). Thus, separate caps of equal amounts have been established for financial housing assistance and ONA. In addition, financial assistance to rent alternate housing accommodations is not subject to the cap . As of the date of this report's publication, FEMA's IAPPG has not been updated to reflect DRRA's changes to the maximum amount of financial assistance. It still notes that Rental Assistance is subject to the cap, which has the potential to create confusion for local, state, territorial, Indian tribal, and federal governments, nonprofit partners, and other entities that assist disaster survivors seeking to rely on the IAPPG as a resource for FEMA's IA policies and procedures. However, FEMA has posted a memorandum on the policy changes to its website, and has stated that the changes will be \"incorporated into a subsequent publication of the IAPPG.\" DRRA Section 1212 also amends Stafford Act Section 408(h) to create exclusions to the maximum amount of assistance for individuals with disabilities for expenses to repair or replace: accessibility-related property improvements under FEMA's Repair Assistance, Replacement Assistance, and Permanent Housing Construction; and accessibility-related personal property under Financial Assistance to Address Other NeedsâPersonal Property, Transportation, and Other Expenses Assistance. Thus, the addition of Stafford Act Section 408(h)(4) may expand the eligibility of individuals with disabilities for financial assistance. In response to the IHP changes post-DRRA, FEMA began processing retroactive payments to applicants who either reached or exceeded the financial cap for disasters declared on or after August 1, 2017, and stated that, in April 2019, it would begin evaluating applications to assess whether some survivors may be eligible for additional rental assistance, which may enable eligible applicants to receive additional funds. Administrative challenges may arise if eligible applicants who received the previous maximum amount of financial assistance now request additional financial assistance for programs to which they did not previously apply. For example, an eligible applicant may not have requested ONA if their request for Repair Assistance already equaled or exceeded the cap. In the past, the combinedâhousing assistance and ONAâcap on the maximum amount of financial assistance that an individual or household was eligible to receive may have resulted in applicants with significant home damage and/or other needs having insufficient funding to meet their disaster-caused needs, including little to no remaining funding available to pay for rental assistance. Thus, changes to Stafford Act Section 408(h) post-DRRA have the potential to result in increased assistance to eligible disaster survivors, and increased federal spending on temporary disaster housing assistance and ONA. This may help to better meet the recovery-related needs of individuals and households who experience significant damage to their primary residence and personal property as a result of a major disaster. However, there is also the potential that this change may disincentivize sufficient insurance coverage because of the new ability for eligible individuals and households to receive separate and increased housing assistance and ONA awards that more comprehensively cover disaster-related real and personal property losses. DRRA Section 1216(a) allows FEMA to waive debts owed to the United States related to assistance provided under Stafford Act Section 408âFederal Assistance to Individuals and Households. Federal laws require federal agencies, including FEMA, to identify and recover improper payments . Specifically, the Improper Payments Information Act of 2002 (IPIA, P.L. 107-300 ) and the Improper Payments Elimination and Recovery Act of 2010 (IPERA, P.L. 111-204 ) direct the head of each federal agency to review and identify all programs and activities administered by the agency that may be \"susceptible to significant improper payments.\" IPERA also includes the requirement that the agency take action to collect overpayments. Several federal programs account for a significant portion of improper payments, including FEMA's IHP. The dualâand sometimes conflictingâgoals of (1) expediting FEMA assistance to disaster survivors and (2) maintaining administrative controls to ensure program eligibility may contribute to improper payments. Nonetheless, FEMA reviews disaster assistance payments following every disaster and works to collect overpayments. FEMA does have some discretion not to pursue recoupment. Additionally, the need for FEMA to have discretion with regard to recoupment was previously identifiedâalbeit for a limited period of time. Congressional \"concerns about the fairness of FEMA collecting improper payments caused by FEMA error especially when a significant amount of time had elapsed before FEMA provided actual notice to the debtors\" led to the passage of the Disaster Assistance Recoupment Fairness Act of 2011 (DARFA, Division D, Section 565 of the Consolidated Appropriations Act, 2012, P.L. 112-74 ). DARFA provided FEMA with the discretionary authority to waive debts arising from improper payments for disasters declared between August 28, 2005, and December 31, 2010âwhich included Hurricanes Katrina and Rita, as well as other disasters. DRRA Section 1216(a) mirrors the factors included in DARFA. Following DRRA's enactment, FEMA may waive a debt related to covered assistance if: distributed in error by FEMA; there was no fault on behalf of the debtor; and collection would be \"against equity and good conscience.\" This section is retroactive, and applies to major disasters or emergencies declared on or after October 28, 2012. Thus, DRRA Section 1216(a) expands FEMA's discretionary ability with regard to debt collection by authorizing FEMA to waive the collection of a debt as long as the above-listed factors are also satisfiedâthe exception is if the debt involves fraud, a false claim, or misrepresentation by the debtor or party having an interest in the claim. However, if FEMA's distributions of covered assistance based on federal agency error exceed 4% of the total amount of covered assistance distributed in any 12-month period, then the DHS IG, charged with monitoring the distribution of covered assistance, shall remove FEMA's waiver authority based on an excessive error rate. That said, according to the House Transportation and Infrastructure Committee's DRRA Report , \"FEMA has implemented controls to avoid improper payments ... [and] FEMA's current error rate for improper payments to individuals is less than two percent.\" It is unclear how FEMA will review and process waivers of improper payments, although FEMA may use the DHS IG's recommendationsâput forth post-DARFAâfor reviewing and processing future debt recoupment cases as outlined in its FEMA's Efforts to Recoup Improper Payments in Accordance with the Disaster Assistance Recoupment Fairness Act of 2011 report. FEMA may also consider issuing a rulemaking and/or policy guidance to require that FEMA's comprehensive quality assurance review procedures apply to the review of recoupment cases, per the DHS IG's recommendation; establish an audit trail for FEMA waiver of recoupment decisions, per the DHS IG's recommendation; and clarify the considerations for approving a waiver (e.g., defining the circumstances under which collection of the debt would be \"against equity and good conscience\"), which may be especially important given that disaster survivors may face financial hardship if required to repay assistance that they have already spent on recovering from a disaster. DRRA Section 1216(b) restricts FEMA's ability to recoup assistance provided under Stafford Act Section 408âFederal Assistance to Individuals and Households. Specifically, Section 1216(b) states: unless there is evidence of civil or criminal fraud, [FEMA] may not take any action to recoup covered assistance ... if the receipt of such assistance occurred on a date that is more than 3 years before the date on which the Agency first provides to the recipient written notification of an intent to recoup [emphasis added]. This section is retroactive, and applies to major disasters or emergencies declared on or after January 1, 2012. According to the House Transportation and Infrastructure Committee's DRRA Report , this provision \"will help ensure that FEMA initiates any collection actions as quickly as possible, reduce administrative costs, and provide more certainty to individuals recovering from disasters.\" FEMA stated that the agency's understanding of this provision is that it establishes a three-year statute of limitations on the agency's ability to recoup debts provided under IHP. Despite apparent congressional and agency intent, FEMA's guidance states that: [w]hile there is no statute of limitations on initiating recoupment of IHP debt owed to the U.S. Government through administrative means, FEMA's goal is to notify applicants of any potential debt owed within three years after the date of the final IHP Assistance payment. FEMA's failure to meet this goal will not preclude it from initiating recoupment of potential debt when otherwise appropriate.... FEMA may notify applicants of any potential debt beyond three years after the date of the final IHP Assistance payment in cases where it considers recovery of funds to be in the best interest of the Federal government.... Congress may require FEMA to update its guidance to reflect DRRA Section 1216(b). Additionally, the legislative language in DRRA Section 1216(b) may result in confusion when interpreting whether the section is discretionary or mandatory. This is because the legislation states that FEMA \" may not take any action to recoup covered assistance ... \"âas opposed to FEMA \" shall not take any action to recoup covered assistance.... \" Thus, confusion may exist despite the apparent congressional intent that FEMA should not be able to take any action to recoup covered assistance three years after its receipt and the fact that FEMA has stated it interprets the provision as being mandatory. One action available to Congress is to clarify, through legislation, that this section is mandatory (if that is the intent of Congress) in order to avoid potential ambiguity when interpreting the law. An additional consideration with regard to this provision is that the three-year window to recoup IHP payments will be different for each award to an individual/household, and this will likely pose an administrative challenge for FEMA given the volume of awards provided under the IHP program. DRRA Section 1216(c) amends Stafford Act Section 705âDisaster Grant Closeout Procedures to change how the statute of limitations for Public Assistance (PA) is defined. Prior to DRRA's enactment, the statute of limitations on FEMA's ability to recover payments made to a state or local government was three years after the date of transmission of the final expenditure report for the disaster or emergency . DRRA amends the statute of limitations such that no administrative action to recover payments can be initiated \" after the date that is 3 years after the date of transmission of the final expenditure report for project completion as certified by the grantee [emphasis added] .\" Additionally, this provision applies retroactively to disaster or emergency assistance provided on or after January 1, 2004, and any pending administrative actions were terminated as of the date of DRRA's enactment, if prohibited under Stafford Act Section 705(a)(1), as amended by DRRA. It may take years to close all of the projects associated with a disaster, and, prior to DRRA, FEMA could recoup funding from projects that may have been completed and closed years prior to FEMA's pursuit of funding because the disaster was still open. This post-DRRA project-by-project statute of limitations is a significant change that has the potential to ease the administrative and financial burden that the management of disaster recovery programs places on state, territorial, and Indian tribal governments because it creates certainty as to the projects that may be subject to recoupment. It may also incentivize the timely closeout of PA projects by state and local governments, which may also ease FEMA's administrative and financial burdens. DRRA Section 1206(a) amends Stafford Act Section 402âGeneral Federal Assistance to allow state and local governments to use general federal assistance funds for the administration and enforcement of building codes and floodplain management ordinances, including inspections for substantial damage compliance. If a building in a Special Flood Hazard Area (SFHA) is determined to be substantially damaged, it must be brought into compliance with local floodplain management standards. Local communities can require the building to be rebuilt to current floodplain management requirements even if the property previously did not need to do so. For instance, the new compliance standard may require the demolition and elevation of the rebuilt building to above the Base Flood Elevation. FEMA does not make a determination of substantial damage; this is the responsibility of the local government, generally by a building department official or floodplain manager. Similarly, the enforcement of building codes and floodplain management ordinances are the responsibility of local government. Particularly following a major flood, communities may be required to assess a large number of properties at the same time, and, as a result, additional resources may be needed. This provision affords an additional source of funding to support communities in carrying out such activities. DRRA Section 1207(b) amends Stafford Act Section 406(d)(1)âRepair, Restoration, and Replacement of Damaged Facilities to provide relief from a reduction in disaster assistance for certain public facilities and private nonprofit facilities with multi-structure campuses which were damaged by disasters in 2016 to 2018. Applicants for Public Assistance (PA) for repair, restoration, reconstruction, and replacement are required to obtain flood insurance on damaged insurable facilities (buildings, equipment, contents, and vehicles) as a condition of receiving PA grant funding. Insurance coverage must be subtracted from all applicable PA grants in order to avoid duplication of financial assistance. In addition, the applicant must maintain flood insurance on these facilities in order to be eligible for PA funding in future disasters, whether or not a facility is in the SFHA. If an eligible insurable facility damaged by flooding is located in a SFHA that has been identified for more than one year and the facility is not covered by flood insurance or is underinsured, FEMA will reduce the amount of eligible PA funding for flood losses in the SFHA by the maximum amount of insurance proceeds that would have been received had the buildings and contents been fully covered by a standard National Flood Insurance Program (NFIP) policy. For nonresidential buildings, this is currently a maximum of $500,000 for contents and $500,000 for the building. The Stafford Act previously required that this reduction in disaster assistance should be applied to each individual building in the case of multi-unit campuses, which could result in a significant reduction in PA funding for entities with uninsured multi-structure campuses. The new provision in DRRA provides that the reduction in assistance shall not apply to more than one building of a multi-structure educational, law enforcement, correctional, fire, or medical campus. This amendment applies to disasters declared between January 1, 2016, and December 31, 2018. This means that organizations without flood insurance that had Public Assistance funding reduced under the pre-DRRA Stafford Act provisions will have funding restored for floods such as the 2016 Louisiana floods, and Hurricanes Matthew, Harvey, Irma, Maria, and Florence. DRRA Section 1240 requires FEMA to submit a report to Congress not later than two years after enactment, and each year after until 2023, on Public Assistance self-insurance shortfalls. As described in \" Section 1207(b): Program Improvements ,\" applicants for PA for repair, restoration, reconstruction, and replacement in an SFHA are required to obtain flood insurance on damaged insurable facilities as a condition of receiving PA grant funding, and maintain insurance on these facilities in order to be eligible for PA funding in future disasters. However, an applicant may apply in writing to FEMA to use a self-insurance plan to comply with the insurance requirement. The details required for the self-insurance plan are set out in FEMA guidance. The DHS IG has issued four reports on applicants' compliance with PA insurance requirements that have identified concerns with applicant compliance with these requirements and FEMA's tracking of applicants' compliance. However, these reports have not focused specifically on self-insurance. The new reports under DRRA Section 1240 will include information on the number of instances and the estimated amounts involved, by state, in which self-insurance amounts have been insufficient to address flood damages. DRRA Section 1224 amends Title IV of the Stafford Act to establish a new section, Section 430âAgency Accountability, addressing public assistance, mission assignments, disaster relief monthly reports, contracts, and the collection of public assistance recipient and subrecipient contracts. Subsection (a) of the new Stafford Act Section 430, established by DRRA Section 1224, requires the FEMA Administrator to publish on the FEMA website award information for grants awarded under Stafford Act Section 406âRepair, Restoration, and Replacement of Damaged Facilities in excess of $1,000,000. For each such grant, FEMA shall provide the following information: FEMA region; declaration number; whether the grantee is a private nonprofit organization; damage category code; amount of the federal share obligated; and the date of the award. Prior to DRRA's enactment, FEMA did not publish contract information on the FEMA website. Stafford Act Section 430(d) requires the FEMA Administrator to publish information about each contract executed by FEMA in excess of $1,000,000 on the FEMA website within the first 10 days of each month. For each such contract, FEMA shall provide the following information: contractor name; date of contract award; amount and scope of the contract; whether the contract was competitively bid; whether and why there was a no competitive bid; the authority used to bypass competitive bidding if applicable; declaration number; and the damage category code. Section 430(d) also requires the FEMA Administrator to provide a report to the appropriate congressional committees on the number of contracts awarded without competition, reasons why there was no competitive bidding process, total amount of the no-competition contracts, and the applicable damage category codes for such contracts. Section 430(e) requires the FEMA Administrator to initiate efforts to maintain and store information on contracts entered into by a Public Assistance recipient or subrecipient of funding through Stafford Act Sections 324âManagement Costs, 403âEssential Assistance, 404âHazard Mitigation, 406âRepair, Restoration, and Replacement of Damaged Facilities, 407âDebris Removal, 428âPublic Assistance Program Alternative Procedures, and 502âFederal Emergency Assistance for contracts with an estimated value of more than $1,000,000. Collected contract information shall include the following: disaster number; project worksheet number; category of work; name of contractor; date of the contract award; amount of the contract; scope of the contract; period of performance for the contract; and whether the contract was awarded through a competitive bid process. The FEMA Administrator is required to make such collected information available to the DHS IG, the Government Accountability Office (GAO), and appropriate congressional committees upon request. The FEMA Administrator is also required to submit a report to relevant committees within 365 days of DRRA's enactment on the efforts of FEMA to collect the required contract information (i.e., by October 5, 2019). Prior to DRRA's enactment, FEMA did not appear to have comprehensive contract information to make available upon request and did not submit annual reports to Congress regarding collection of such information. DRRA Section 1221 amends Stafford Act Section 705âDisaster Grant Closeout Procedures to authorize the FEMA Administrator to develop incentives and penalties relating to grant closeout activities to encourage grantees to close out disaster-related expenditures on a timely basis. DRRA Section 1221 also requires the FEMA Administrator to improve closeout practices and reduce the time between awarding a grant under Stafford Act provisions and closing out expenditures for the award. The FEMA Administrator is also directed to issue regulations relating to facilitating grant closeout. Prior to DRRA's enactment, FEMA had discretion to engage in activities that would incentivize or penalize grantees for delayed closeouts. This provision made such activities a requirement rather than at FEMA's discretion. Congress designed Section 1221 to improve the timeliness of closeout procedures by limiting or preventing delays in the process. DRRA Section 1225 prohibits the FEMA Administrator from reimbursing grantees for any activities made pursuant to a contract entered into after August 1, 2017, that prohibits the FEMA Administrator or the Comptroller General of the United States from auditing or reviewing all aspects relating to the contract. DRRA Section 1237 directs FEMA to \"deem any covered disaster assistance to have been properly procured, provided, and utilized, and shall restore any funding of covered disaster assistance previously provided but subsequently withdrawn or deobligated.\" \"Covered disaster assistance\" is defined as assistance provided to a local government under Stafford Act Sections 403âEssential Assistance, 406âRepair, Restoration, and Replacement of Damaged Facilities, or 407âDebris Removal in which the DHS IG has made a determination, through an audit, that the following conditions were present: (A) the Agency deployed to the local government a Technical Assistance Contractor to review field operations, provide eligibility advice, and assist with day-to-day decisions; (B) the Technical Assistance Contractor provided inaccurate information to the local government; and (C) the local government relied on the inaccurate information to determine that relevant contracts were eligible, reasonable, and reimbursable. DRRA Section 1210 amends Stafford Act Section 312(b) by providing the President the authority to waive the prohibition on duplication of benefits (upon a gubernatorial request) if the \"waiver is in the public interest and will not result in waste, fraud, or abuse.\" When making the waiver decision, the President may consider (1) recommendations from the Administrator of FEMA or other agencies administering the duplicative program; (2) if granted, whether the assistance is cost effective; (3) \"equity and good conscience\"; and (4) \"other matters of public policy considered appropriate by the President.\" Duplication of benefits has been an ongoing issue of congressional concern and DRRA Section 1210 is the most recent attempt to reduce hardships caused by duplication of benefits recoupment. Individuals and households often need to use multiple sources of assistance to fully recover from a major disaster. If the assistance exceeds their unmet disaster needs, then the assistance is considered a \"duplication of benefits.\" Stafford Act Section 312(a)âDuplication of Benefits prohibits the \"financial assistance to persons, business concerns, or other entities suffering losses as a result of a major disaster or emergency ... [for] which he has received financial assistance under any other program or from insurance or any other source.\" Stafford Act Section 312(c) states that the recipient of duplicative assistance is liable to the United States and that the agency that provided the duplicative assistance is responsible for debt collection. The federal duplication of benefits policy is intended to prevent waste, fraud, and abuse of program assistance. 44 C.F.R. Â§206.191 provides procedural guidance known as a \"delivery sequence\" to prevent the duplication of benefits between federal assistance programs such as FEMA's Individuals and Households Program and the Small Business Administration's (SBA's) Disaster Loan Program, state assistance programs, other assistance programs (e.g., volunteer programs), and insurance benefits (see Figure 1 ). An organization's position within the delivery sequence determines the order in which it should provide assistance and what other resources need to be considered before that assistance is provided. The regulation requires individuals to repay all duplicated assistance to the agency providing the assistance based on the delivery sequence hierarchy that outlines the order assistance should be provided. Critics have argued that the delivery sequence lacks specificity. For example, the U.S. Department of Housing and Urban Development's (HUD's) Community Development Block GrantâDisaster Recovery (CDBG-DR) Program, which is often duplicated with other assistance sources, is not listed in the delivery sequence. However, in addition to prohibiting duplication of benefits, Stafford Act Section 312 also stipulates that assistance cannot be withheld. Section 312(b)(1) states: this section shall not prohibit the provision of federal assistance to a person who is or may be entitled to receive benefits for the same purposes from another source if such person has not received such other benefits by the time of application for federal assistance and if such person agrees to repay all duplicative assistance to the agency providing the federal assistance. The delivery sequence, therefore, is not rigidâit can be broken in certain cases. The most common example is when adhering to the delivery sequence prevents the timely receipt of essential assistance. In some cases, assistance can be provided more quickly by an organization or agency that is lower in the sequence than an agency or organization that is at a higher level. For example, SBA disaster loans can generally be processed more quickly than FEMA grants; CDBG-DR grants take longer still because CDBG-DR disaster funding generally requires Congress to pass an appropriation. Once appropriated, the funding is usually released to the state in the form of a block grant, which is then disbursed by the state to disaster survivors. The underlying rationale for providing assistance when it becomes immediately available instead of rigidly adhering to the delivery sequence is to make sure disaster survivors receive aid as quickly as possible. Advocates of this view argue that preventing duplication of benefits is of secondary importanceâit can be rectified and recouped later. This practice, however, has led to problems, particularly for individuals and households. In some cases, the federal government may fail to identify the duplication. In others cases, it may take a prolonged period of time to identify the duplication and the recoupment notification that they owe money to the federal government may come as a surprise to disaster survivors who did not realize they exceeded their allowable assistance. In some cases they may have spent all of the assistance on recovery, and repaying duplicative assistance constitutes a financial burden to the disaster survivor. One of the most significant changes instituted by DRRA Section 1210 is that it prohibits the President from determining loans as duplicative assistance provided all federal assistance is used toward loss resulting from an emergency or major disaster under the Stafford Act. This arguably removes SBA disaster loans from the delivery sequence. However, the rulemaking on this policy has not been issued. Thus, it remains to be seen how this provision of DRRA will be implemented. Finally, DRRA Section 1210(a)(5) requires the FEMA Administrator, in coordination with relevant federal agencies, to provide a report with recommendations to improve \"the comprehensive delivery of disaster assistance to individuals following a major disaster or emergency declaration.\" The report must include (1) actions planned or taken by the agencies as well as legislative proposals to improve coordination between agencies with respect to delivering disaster assistance; (2) a clarification of the delivery sequence; (3) a clarification of federal-wide interpretation of Stafford Act Section 312 when providing assistance to individuals and households; and (4) recommendations to improve communication to disaster assistance applicants, including the breadth of programs available and the potential impacts of utilizing one program versus another. DRRA Section 1239âCost of Assistance Estimates and Section 1232âLocal Impact both require FEMA to review and initiate a rulemaking to update the factors considered when evaluating a governor's request for a major disaster declaration, including how FEMA estimates the cost of major disaster assistance. They also require FEMA to consider anything that may affect a local jurisdiction's capacity to respond to a disaster. Section 1232 in particular requires FEMA to give greater consideration to severe local impact or recent multiple disasters. Both sections address the way FEMA has made major disaster recommendations to Presidents. FEMA uses factors about the severity of the incident (including how the state was affected by the incident) to assess the state's need for federal assistance. The estimated cost of assistance (also known as the per capita threshold) has been a key factor used by FEMA to evaluate the disaster's severity and to determine if the state has the capacity to handle the disaster without federal assistance. Two thresholds are used for estimated cost of assistance: (1) $1 million in public infrastructure damages and (2) a formula based on the state's population (according to the most recent census data) and public infrastructure damages. Based on these thresholds, FEMA has generally recommended that a major disaster be declared if public infrastructure damages exceed $1 million and meet or exceed $1.50 per capita. The underlying rationale for using a per capita threshold is that state fiscal capacity should be sufficient to deal with the disaster if damages and costs fall under the per capita amount. However, concerns related to relying on the per capita threshold include that: the per capita threshold may be difficult to reach for some states. For example, a rural area in a highly populated state may be denied federal disaster assistance because damages and costs do not exceed the per capita threshold; these incidents still warrant federal assistance because they overwhelm local response and recovery capacity in spite of not exceeding the statewide threshold; and the application of the per capita threshold is inequitable because the same incident may affect multiple states but only result in a major disaster declaration for some states by virtue of differences in state population. Pursuant to DRRA Section 1239, within two years of DRRA's enactment (i.e., by October 5, 2020), FEMA is required to initiate a rulemaking to update the factors considered when evaluating a governor's request for a major disaster declaration, including how the cost of assistance is estimated, as well as other impacts on the jurisdiction's response capacity. As part of the review and rulemaking, FEMA may consider whether the per capita threshold is an appropriate mechanism for evaluating capacity, and additional information, such as the results of the 2020 U.S. Census, may factor into the final rule. DRRA Section 1232 also requires FEMA to adjust agency policy and regulations to grant greater consideration to severe local impact or recent multiple disasters, which may enable jurisdictions that struggle to reach the per capita threshold to provide evidence supporting the request for a major disaster declaration as no single factor is dispositive and the determination to grant a request for a major disaster is at the President's discretion. FEMA currently uses nine factors to evaluate a state or territory's request for a major disaster declaration (see Table 2 ). To some, these factors entail a more nuanced evaluation of major disaster requests by assessing both damages and state and local resources. However, it appears that the per capita threshold is still being applied to determine the \"amount and type of damages caused by the incident.\" If that is the case, per capita damages may still figure more prominently than other factorsâsuch as local impactsâwhen making major disaster declaration recommendations to the President. DRRA Section 1219 amends Stafford Act Section 423âAppeals of Assistance Decisions to add a right of arbitration. Per Stafford Act Section 423, applicants for assistance have the right to appeal decisions regarding \"eligibility for, from, or amount of assistance\" within 60 days after receiving notification of award or denial of award. FEMA then has to render a decision within 90 days of receiving a notice of appeal. Prior to DRRA, the appeal process outlined in the Stafford Act only provided a way for FEMA to review its own decisions, and did not include a way for applicants to bring claims before an independent arbiter. The need for arbitration, however, was recognized by Congress following Hurricanes Katrina and Rita, which made landfall in 2005, due to disputes that arose from public assistance payments under Stafford Act Sections 403âEssential Assistance, 406âRepair, Restoration, and Replacement of Damaged Facilities, and 407âDebris Removal. Post-Hurricanes Katrina and Rita, the arbitration process was established pursuant to the authority granted under Section 601 of the American Recovery and Reinvestment Act of 2009 (ARRA, P.L. 111-5 ). Notwithstanding any other provision of law, the President shall establish an arbitration panel under the Federal Emergency Management Agency public assistance program to expedite the recovery efforts from Hurricanes Katrina and Rita within the Gulf Coast Region. The arbitration panel shall have sufficient authority regarding the award or denial of disputed public assistance applications for covered hurricane damage under section 403, 406, or 407 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5170b, 5172, or 5173) for a project the total amount of which is more than $500,000. FEMA's public assistance appeal process remains in effect following DRRA's enactment. In addition, post-DRRA a right of arbitration has been added to Stafford Act Section 423 under the authority granted under ARRA Section 601. Applicants, which are states in the context of this section, may request arbitration in order to \"dispute the eligibility for assistance or repayment of assistance provided for a dispute of more than $500,000 for any disaster that occurred after January 1, 2016.\" (Applicants in rural areas are eligible to pursue arbitration if the amount of assistance is $100,000. ) FEMA's Public Assistance Appeals and Arbitration Under the Disaster Recovery Reform Act fact sheet notes that applicants may file a second appeal or request arbitration pursuant to Section 423(d) either (1) within 60 days after receipt of the first appeal decision (if the decision is not appealed or arbitration is not requested, then the first level appeal decision becomes the final agency determination and the applicant no longer has a right to appeal or arbitrate); or (2) at any time after 180 days of filing a first level appeal if the applicant has not received a decision from the agencyâin which case they may withdraw the first level appeal and request Section 423 arbitration. In the event an applicant requests arbitration, the Civilian Board of Contract Appeals (CBCA) will conduct the arbitration, and their decision shall be binding. FEMA has stated that the Agency intends to \"initiate rulemaking to implement Section 423 arbitration and revise 44 C.F.R. Â§206.206,\" including amending regulations that provide for only a first and second level appeal process. In the interim, FEMA has stated that it will rely on the Public Assistance Appeals and Arbitration Under the Disaster Recovery Reform Act fact sheet and the CBCA's Interim Fact Sheet . The CBCA published proposed rules of procedure to implement Section 423 arbitration in the Federal Register on March 5, 2019. Additionally, while new regulations are being promulgated, FEMA will provide information on how applicants may request either a second level appeal or arbitration when FEMA provides first level appeal denials for disputes arising from declarations for disasters occurring after January 1, 2016. There is disagreement regarding whether the arbitration process expedites dispute resolution. The House Transportation and Infrastructure Committee's DRRA Report states that the CBCA panel provides a faster resolution, citing that arbitration was used as a tool for resolving disputes following both Hurricanes Katrina and Sandy to facilitate recovery. FEMA, however, in an earlier version of its Public Assistance Arbitration fact sheet stated that the arbitration process often takes years to arrive at a resolution. This may be, in part, because of the process requiredâsome steps may take multiple weeks or months to completeâwhich includes: a first level appeal; the applicant opting into arbitration; submission of responses; the selection of the arbitration panel; the preliminary conference; the hearing and any follow-up; and the panel's rendering of the final decision. The length of the arbitration process may depend on the complexity of the disputed project and its associated costs for which the applicant is seeking an award of assistance. Additionally, the arbitration process may be costly as there are fees associated with the panel, experts, attorney's fees, and other fees, which are the responsibility of the parties, including both the applicant and FEMA. According to the Senate HSGAC's DRRA Report , the Congressional Budget Office (CBO) estimates that \"implementing this provision would cost $4 million over the 2019-2023 period\" based on information provided by FEMA on the expected number of arbitration requests. It is unclear, however, whether the evaluation of the cost of implementing this provision included considerations such as the individual cost of the project being arbitrated, the complexity of the project, and the nature of the dispute. Congress may consider tasking the Comptroller General of the United States with conducting a review of the arbitration process to evaluate its effectiveness, including whether arbitration expedites the disaster recovery process and if it is cost effective. Congress may also consider ways to improve the process's efficiency and effectiveness, if warranted based on the results of any such program evaluation. DRRA Section 1218 authorizes, but does not require, that the FEMA Administrator establish one or more national veterinary emergency teams at accredited colleges of veterinary medicine. Such a team(s) shall (1) deploy with Urban Search and Rescue (US&R) response teams to care for canine search teams, companion animals, service animals, livestock, and other animals; (2) recruit, train, and certify veterinary professionals, including veterinary students, regarding emergency response; (3) assist state governments, Indian tribal governments, local governments, and nonprofit organizations in emergency planning for animal rescue and care; and (4) coordinate with other federal, state, local, and Indian tribal governments, veterinary and health care professionals, and volunteers. Veterinary professionals serve in several emergency support capacitiesâaiding in agriculture emergencies by controlling diseases in domestic animals; protecting natural resources by addressing wildlife health impacts; assisting with various emergency public health efforts, such as assuring food safety; and furnishing care to working animals such as search and rescue canines and service animals. Several pre-existing authorities address veterinary support in emergencies in different contexts. The Stafford Act does not specifically mention veterinary services. However, among the work and services authorized for essential assistance is \"provision of rescue, care, shelter, and essential needsâ(i) to individuals with household pets and service animals; and (ii) to such pets and animals,\" which could include veterinary services. In addition, the Stafford Act requires state and local recipients of emergency preparedness planning grants to address the needs of individuals with household pets and service animals in their emergency preparedness plans. The federal department principally responsible for coordinating veterinary support in emergencies often depends upon the principal work performed, in particular whether it involves public health or animal health. Authority for the National Disaster Medical System (NDMS), an operational emergency response asset of the U.S. Department of Health and Human Services (HHS), does not expressly list which health professionals shall constitute NDMS teams. Rather, it states that the system is intended to \"provide health services, health-related social services, other appropriate human services, and appropriate auxiliary services to respond to the needs of victims of a public health emergencyâ¦.\" NDMS currently supports veterinary response teams. Another HHS asset, the Commissioned Corps of the U.S. Public Health Service (USPHS), supports a veterinary professional category. The U.S. Department of Agriculture (USDA) Animal and Plant Health Inspection Service (APHIS) maintains capacity to respond to animal health emergencies affecting domestic livestock and poultry. DRRA Section 1229 retroactively extended Disaster Unemployment Assistance (DUA). When the President declares a major disaster, individuals who would typically be ineligible for Unemployment Compensation (UC) may be eligible for DUA. After the disaster declaration, the DUA benefits are available to eligible individuals as long as the major disaster continues, for a period of up to 26 weeks. In some cases, UC beneficiaries who had an entitlement to UC benefits of fewer than 26 weeks and who became unemployed as a direct result of a disaster and exhausted their weeks of UC entitlement may be entitled to some DUA benefits. No more than a total of 26 weeks of total benefits (UC plus DUA) are allowable in this situation. The maximum number of available weeks of DUA has been temporarily extended three times, most recently by DRRA. DRRA Section 1229 retroactively extended DUA for an additional 26 weeks for persons who were unemployed in Puerto Rico and the U.S. Virgin Islands as a direct result of the 2017 Hurricane Irma or Hurricane Maria disasters. (This created a total potential entitlement to DUA of up to 52 weeks for some individuals.) Because the disasters had both been declared more than 52 weeks before DRRA's enactment, the remaining DUA weeks will be paid retroactively. Individuals who worked in these areas and exhausted entitlement to UC may be eligible for DUA benefits for any remaining uncompensated weeks, up to 52 weeks total (UC plus DUA). DRRA Section 1226 requires the DHS IG to audit the contracts that FEMA awarded for tarps and plastic sheeting for the Commonwealth of Puerto Rico and the U.S. Virgin Islands in response to Hurricanes Irma and Maria. Specifically, the DHS IG must review FEMA's contracting process for evaluating offerors and awarding contracts for tarps and plastic sheeting; FEMA's assessment of contractor past performance; FEMA's assessment of the contractors' capacity to carry out the contracts; how FEMA ensured contractors met the terms of the contracts; and whether the failure of contractors to meet the terms of the contracts, and FEMA's cancellation of the contracts affected the provision of tarps and plastic sheeting. In addition, the DHS IG must submit a report containing the audit's findings and recommendations to the House Transportation and Infrastructure Committee and Senate HSGAC no later than 270 days after the audit is initiated. According to the 2017 Hurricane Season FEMA After-Action Report , during Hurricanes Harvey and Irma response operations, FEMA exhausted its pre-negotiated contractsâincluding contracts to provide tarps. To meet the need for tarps in response to Hurricane Maria, FEMA awarded new contracts, reportedly awarding contracts to \"entities that were assessed as technically acceptable and committed to meeting the requirements, in accordance with the provisions of the Federal Acquisition Regulation.\" FEMA stated that, overall, it \"executed a successful acquisitions process, with the Agency canceling just three contracts.\" Included in the cancelled contracts were contracts for tarps and plastic sheeting. FEMA went on to state that, \"[t]hese cancellations did not hinder FEMA's ability to deliver on its mission.\" However, FEMA later acknowledged that the issues with the contracts delayed the delivery of plastic tarps to Puerto Rico. The DHS IG audit requirement included in DRRA may have arisen from congressional concerns regarding FEMA's management of contracts for tarps and plastic sheeting during its 2017 hurricane season response operations. For example, a 2018 report issued by the minority staff of Senate HSGAC concluded that FEMA's acquisition strategy and process, including the use of pre-negotiated, advance contracts during the 2017 hurricane season, was not successful. The Senate HSGAC minority staff report identified several deficiencies in FEMA's contracting process, including that: FEMA did not adequately use prepositioned contracts and awarded new contracts before using prepositioned contracts; FEMA awarded contracts without adequate vetting, including $73 million for tarps and plastic sheeting to two contractors with no relevant past performance, and these contracts were cancelled due to the companies' failure to deliver; and FEMA's bid process did not ensure adequate competition, in part due to limited notice provided to prospective vendors and short timeframes for proposal submission. According to the Senate HSGAC minority staff report, the two contracts for tarps and plastic sheeting that were cancelled were intended to provide a total of 1.1 million tarps and 60 thousand rolls of plastic sheeting. The report also identified additional issues that delayed the delivery of tarps and plastic sheeting, such as other companies that were awarded contracts for tarps and plastic sheeting struggling to meet delivery timeframes, and other logistical issues, such as FEMA's exhausted inventory of commodities following Hurricanes Harvey and Irma, commodity delivery challenges (e.g., delivery truck and driver shortages), and shortages of contractors to perform repairs. The Chairman of the Senate Budget Committee, Senator Mike Enzi, also questioned how FEMA identified, vetted, and awarded contracts following Hurricane Maria, stating \"[i]t appears that FEMA has not properly vetted some of the companies that receive contracts and therefore may have wasted millions of taxpayer dollars, while simultaneously denying services to citizens in need of them.\" Following Hurricane Katrina and the passage of the Post-Katrina Emergency Management Reform Act of 2006 ( P.L. 109-295 ), FEMA worked to maximize the use of advance contracts for goods and services; however, in a 2015 report, the GAO found deficiencies with FEMA's contracting guidance. This remains an issue; in the GAO's assessment of FEMA's 2017 advance contracting, it recommended that FEMA, among other things update its strategy for advance contracting, including defining objectives and how advance contracts should be prioritized in relation to new post-disaster contract awards; update the Disaster Contracting Desk Guide to include guidance for using advance contracts prior to making new post-disaster contract awards, and provide semi-annual training to contracting officers on said guidance; and update and implement existing guidance to identify acquisition planning timeframes and considerations. The GAO also stated that \"an outdated strategy and lack of guidance to contracting officers resulted in confusion about whether and how to prioritize and use advance contracts to quickly mobilize resources in response to the three 2017 hurricanes.... \" In May 2019, the DHS IG released a report concluding that FEMA should not have awarded two contracts to Bronze Star LLCâone for tarps and one for plastic sheeting. FEMA cancelled both contracts due to nondelivery. The findings of this audit, which are included in the DHS IG's report, FEMA Should Not Have Awarded Two Contracts to Bronze Star LLC , and accompanied by recommendations, may contribute to the audit and report requirements included in DRRA Section 1226. Depending on the DHS IG's findings, Congress may require FEMA to update its contracting strategy, as well as its policies and procedures related to prepositioning supplies and quickly ramping up procurement operations (i.e., using advance contracts and executing new contracts for commodities and services). FEMA's acquisition personnel may also benefit from additional guidance and training regarding advance contracting, including how to determine whether potential contractors have the capacity to successfully perform the requirements of the contract. DRRA amends many sections of the Stafford Act, and establishes numerous reporting and rulemaking requirements. The implementation of DRRA includes \"more than 50 provisions that require FEMA policy or regulation changes....\" Thus, it could be argued that much of DRRA's implementation is at FEMA's discretion. Although FEMA is working on DRRA implementation, it is unclear at this time how FEMA will address many of DRRA's requirements and recommendations. Congress may oversee the implementation of DRRA through hearings or other inquiries to ensure that the post-DRRA changes to disaster assistance programs and policies fulfill congressional intent and the interests of Congress. Congress may also review the effectiveness and impacts of FEMA's DRRA-related regulations and policy guidance, including assessing the effects of DRRA-related changes to federal assistance for past and future disasters. Appendix A. Tables of Deadlines Associated with the Implementation Actions and Requirements of the Disaster Recovery Reform Act of 2018 In addition to numerous amendments to the Stafford Act, DRRA includes standalone authorities. DRRA requires reports to Congress, rulemaking/regulatory actions, and other actions to support disaster preparedness, and increase transparency and accountability with regard to FEMA. The following three tables of deadlines are associated with DRRA's reporting, rulemaking/regulatory, and other implementation actions and requirements: Table A-1 . DRRA Reporting Requirements (i.e., reports to Congress); Table A-2 . DRRA Rulemaking and Regulations Requirements; and Table A-3 . DRRA Guidance and Other Required Actions. The tables are organized by deadline for implementation in chronological order, and include: the relevant DRRA Section; referenced Stafford Act Section(s), if applicable; a brief description of the requirement; the entity responsible for accomplishing the requirement; the recipient of the information/action; the due date described in DRRA; and the deadline expressed as a calendar date. Some sections of DRRA include multiple implementation actions and requirements and, as such, are included in multiple tables and may appear multiple times. Additionally, some sections of DRRA do not specify the date by which the implementation action or requirement must be completed. For these sections, the due date and calendar deadline are listed as \"N/A.\" Some sections of DRRA include requirements for ongoing actions (e.g., monthly reporting requirements). For these sections, the deadline is listed as \"ongoing.\" Acronyms used in the tables are defined in the associated notes sections. Note that information included in the three tables of deadlines associated with DRRA implementation may be subject to change, and the following tables may not be up-to-date following the publication of this report. Appendix B. Acronym Table The following acronyms for entities, programs, and legislation are used throughout this report: Appendix C. Brief Legislative History DRRA includes provisions taken from numerous bills aimed at reforming aspects of FEMA. Some of these bills and the provisions incorporated into DRRA include: Disaster Recovery Reform Act ( H.R. 4460 , introduced) included many provisions duplicated or incorporated into DRRA with modifications; Disaster Recovery Reform Act of 2018 ( S. 3041 , introduced) included many provisions duplicated or incorporated into DRRA with modifications; Disaster Assistance Fairness and Accountability Act of 2017 ( H.R. 3176 , introduced) included the provision prohibiting the recoupment of certain assistance (incorporated into DRRA as Section 1216(b)âFlexibility); To amend the Robert T. Stafford Disaster Relief and Emergency Assistance Act concerning the statute of limitations for actions to recover disaster or emergency assistance payments, and for other purposes ( H.R. 1678 , passed House) amended the Stafford Act such that no administrative action to recover payments may be initiated after the date that is three years after the date of transmission of the final expenditure report for project completion as certified by the grantee (incorporated into DRRA as Section 1216(c)âFlexibility); Disaster Assistance Support for Communities and Homeowners Act of 2017 ( H.R. 1684 , passed House) included the provision requiring FEMA to provide technical assistance to a common interest community that provides essential services of a governmental nature on actions they may take to be eligible for reimbursement (incorporated into DRRA as Section 1230âGuidance and Recommendations); Community Empowerment for Mitigated Properties Act of 2017 ( H.R. 1735 , introduced) included a provision for the acquisition of property for open space as a mitigation measure (incorporated into DRRA as Section 1231âGuidance on Hazard Mitigation Assistance); Disaster Declaration Improvement Act ( H.R. 1665 , passed House) included the provision that the FEMA Administrator shall give greater weight and consideration to severe local impact or recent multiple disasters when recommending a major disaster declaration (incorporated into DRRA as Section 1232âLocal Impact); Pacific Northwest Earthquake Preparedness Act of 2017 ( H.R. 654 , passed House) included a provision on the use of mitigation assistance to reduce the risk and impacts of earthquake hazards (incorporated into DRRA as Section 1233âAdditional Hazard Mitigation Activities); Supporting Mitigation Activities and Resiliency Targets for Rebuilding Act, or SMART Rebuilding Act ( H.R. 4455 , introduced) included a provision on the National Public Infrastructure Pre-Disaster Hazard Mitigation Fund; however, it differed from DRRA Section 1234âNational Public Infrastructure Pre-Disaster Hazard Mitigation in that the SMART Rebuilding Act established the fund as a separate account, but DRRA allows for a set-aside from the Disaster Relief Fund. It also includes a provision allowing the President to contribute up to 75% of the cost of hazard mitigation measures determined to be cost effective and which substantially reduce risk or increase resilience (incorporated into DRRA as Section 1235âAdditional Mitigation Activities).", "summary": "The Disaster Recovery Reform Act of 2018 (DRRA, Division D of P.L. 115-254 ) was enacted on October 5, 2018. DRRA is the most comprehensive reform of the Federal Emergency Management Agency's (FEMA's) disaster assistance programs since the passage of the Sandy Recovery Improvement Act of 2013 (SRIA, Division B of P.L. 113-2 ) and the Post-Katrina Emergency Management Reform Act of 2006 (PKEMRA, P.L. 109-295 ). DRRA focuses on improving pre-disaster planning and mitigation, response, and recovery, and increasing FEMA accountability. As such, it amends many sections of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (Stafford Act, P.L. 93-288 , as amended; 42 U.S.C. Â§Â§5121 et seq.) and also includes new standalone authorities. In addition, DRRA requires reports to Congress, rulemaking, and other actions. This report provides an overview of selected sections of DRRA that significantly change the provision of services or authorities under the Stafford Act, and includes: an overview of programs as they existed prior to DRRA's enactment, and how they were modified following DRRA; the context or rationale for program modifications or changes to disaster assistance policies following DRRA's enactment; potential considerations and issues for Congress; a table of amendments to the Stafford Act following DRRA's enactment; and tables of deadlines associated with DRRA's reporting, rulemaking and regulations, and other implementation actions and requirements. This report does not specifically address every section included in DRRA, nor does it address every subsection or paragraph of those DRRA sections which are addressed herein.", "document_type": "crs"}
{"report": "The Financial Services and General Government (FSGG) appropriations bill includes funding for more than two dozen independent agencies. These agencies perform a wide range of functions, including the management of federal real property, the regulation of financial institutions and markets, and mail delivery. This report focuses on funding for those independent agencies in Title V of the FSGG appropriations bill. It also addresses general provisions that apply government-wide, which appear in Title VII, and provisions on Cuba sanctions, which would typically appear in Title I. In addition, the FSGG bill funds agencies not covered in this report—the Department of the Treasury (Title I), the Executive Office of the President (EOP; Title II), the judiciary (Title III), and the District of Columbia (Title IV). The bill typically funds mandatory retirement accounts in Title VI, which also contains general provisions applying to the FSGG agencies. The FSGG bill occasionally addresses other issues, particularly those involving financial regulation, in additional titles. Although financial services are a major focus of the bill, the FSGG appropriations bill does not fund many financial regulatory agencies, which are instead funded outside of the appropriations process. The FSGG bill has existed in its current form since the 2007 reorganization of the House and Senate Committees on Appropriations. The House and Senate FSGG bills fund the same agencies, with one exception. Funding for the Commodity Futures Trading Commission (CFTC) is considered through the Agriculture appropriations bill in the House and the FSGG bill in the Senate. In this report, the CFTC funding is generally included in the combined funding totals for FSGG independent agencies. President Trump submitted his FY2019 budget request on February 12, 2018. The request included a total of $2.3 billion for independent agencies funded through the FSGG appropriations bill, including $282 million for the CFTC. The House Committee on Appropriations reported a Financial Services and General Government Appropriations Act, 2019 ( H.R. 6258 , H.Rept. 115-792 ) on June 15, 2018. Total FY2019 funding in the reported bill would have been approximately $1.2 billion for the FSGG independent agencies, with another $255 million for the CFTC included in the Agriculture appropriations bill ( H.R. 5961 , H.Rept. 115-706 ). The combined total of $1.4 billion would have been about $0.9 billion below the President's FY2019 request, with the largest difference in the funding for the General Services Administration (GSA). Title IX of H.R. 6258 contained a number of legislative provisions involving financial regulation. This included a provision bringing the Bureau of Consumer Financial Protection (CFPB) into the appropriations process after 2020. H.R. 6258 was included as Division B of H.R. 6147 , the Interior appropriations bill, when it was considered by the House of Representatives beginning on July 17, 2018. The bill was amended numerous times, shifting funding among FSGG agencies but not changing the FSGG totals. H.R. 6147 passed the House on July 19, 2018. The Senate Committee on Appropriations reported a Financial Services and General Government Appropriations Act, 2019 ( S. 3107 , S.Rept. 115-281 ) on June 28, 2018. Funding in S. 3107 totaled $2.3 billion for the FSGG independent agencies, approximately the same overall as the President's FY2019 request, but with differences in funding for the individual components, notably the GSA. The Senate began floor consideration of H.R. 6147 on July 24, 2018, including the text of S. 3107 as Division B of the amendment in the nature of a substitute ( S.Amdt. 3399 ). The amendment also included three other appropriations bills. The amended version of H.R. 6147 was passed by the Senate on August 1, 2018. Among the various funding differences, which are detailed in Table 3 below, the Senate version of the bill did not include the Title IX legislative provisions, such as the shift in CFPB funding. The conference committee on H.R. 6147 convened on September 13, 2018. No conference report was reported, however, prior to the end of the fiscal year. Instead, Division C of P.L. 115-245 , enacted on September 28, 2018, generally provided for continuing appropriations at FY2018 levels for the FSGG agencies through December 7, 2018. A further continuing resolution ( P.L. 115-298 ) was passed providing funding through December 21, 2018. No additional appropriations were passed in the 115 th Congress, leading to a funding lapse for the FSGG agencies as well as those funded in six other appropriations bills beginning on December 22, 2018. The House of Representatives passed two consolidated appropriations bills in January 2019. H.R. 21 , passed on January 3, 2019, contained six full FY2019 appropriations bills, including FSGG provisions nearly identical to those passed by the Senate in the 115 th Congress. H.R. 21 would have provided a total of $2.3 billion for the FSGG agencies, with the CFTC funding included in the FSGG division, following the Senate structure. On January 23, 2019, the House passed H.R. 648 , also containing the same six full FY2019 appropriations bills, which was reportedly based on a potential conference report from the 115 th Congress. H.R. 648 would have provided $2.5 billion for the FSGG agencies, with the FSGG portion, including CFTC funding, in Division C. Neither of these bills included the financial regulatory provisions in Title IX of the House-passed bill in the 115 th Congress. The Senate did not act on either of these bills. On February 14, 2019, both the House and the Senate agreed to a conference report ( H.Rept. 116-9 ) on H.J.Re s . 31 , the Consolidated Appropriations Act, 2019, containing seven appropriations bills. This act provides full FY2019 funding for the government's operations that had not been previously funded, including FSGG provisions nearly identical to H.R. 648 with notable exceptions in the Treasury's asset forfeiture fund and the GSA. The President signed the resolution on February 15, 2019, enacting it into law as P.L. 116-6 . P.L. 116-6 , Division D provided $1.9 billion for the FSGG independent agencies, including the funding for the CFTC. It did not include the Title IX financial regulatory provisions passed by the House in the 115 th Congress. The final total was approximately $0.6 billion less than the President's request, with most of the difference coming from funding for the GSA. The conference report provided that language from the previous appropriations committees reports ( H.Rept. 115-792 and S.Rept. 115-281 ) should be considered as indicating congressional intent unless specifically addressed to the contrary in H.Rept. 116-9 . Table 1 below reflects the status of FSGG appropriations measures at key points in the appropriations process across the 115 th and 116 th Congress. Table 2 lists the broad amounts requested by the President and included in the various FSGG bills, largely by title, and Table 3 details the amounts for the independent agencies. Specific columns in Table 2 and Table 3 are FSGG agencies' enacted amounts for FY2018, the President's FY2019 request, the FY2019 amounts from the 115 th Congress bills ( H.R. 6147 as passed by the House, and H.R. 6147 as passed by the Senate), the FY2019 amounts from the 116 th Congress House-passed bills ( H.R. 21 and H.R. 648 ), and the final FY2019 enacted amounts from P.L. 116-6 . The Commodity Futures Trading Commission is the independent regulatory agency charged with oversight of derivatives markets. The CFTC's functions include oversight of trading on the futures exchanges, oversight of the swaps markets, registration and supervision of futures industry personnel, self-regulatory organizations and major participants in the swaps markets, prevention of fraud and price manipulation, and investor protection. Although most futures trading is now related to financial variables, such as interest rates, currency prices, and stock indexes, congressional authorization jurisdiction remains vested in the House and Senate agriculture committees because of the market's historical origins as an adjunct to agricultural markets. Appropriations for the CFTC are under the jurisdiction of the Agriculture Appropriations Subcommittee in the House and the Financial Services and General Government Appropriations Subcommittee in the Senate. The location of the final enacted amounts for the CFTC typically switches from year to year between the Agriculture and FSGG bills. Following the financial crisis of 2008, concerns over the largely unregulated nature of the over-the-counter swaps markets led to various reforms passed in Title VII of the Dodd-Frank Wall Street and Consumer Protection Act. This act brought the bulk of the previously unregulated over-the-counter swaps markets under CFTC jurisdiction, as well as the previously regulated futures and options markets. Passage of the Dodd-Frank Act resulted in the CFTC's oversight of the economically significant swaps markets with an estimated notional value of roughly $240 trillion in the United States. This newly regulated market comes on top of the CFTC's prior jurisdiction over the futures and options markets, with an estimated $34 trillion notional value in the United States. The President requested $281.5 million for the CFTC in FY2019, an increase of $32.5 million from FY2018. In the 115 th Congress, H.R. 5961 as reported by the House Agriculture Committee, which was not considered by the full House, would have appropriated $255 million, whereas H.R. 6147 as passed by the Senate would have appropriated $281.5 million. In the 116 th Congress, H.R. 21 would have appropriated $281.5 million, while H.R. 648 would have appropriated $268 million. P.L. 116-6 appropriated $268 million. The Consumer Product Safety Commission (CPSC) is a federal regulatory agency whose mission is to reduce consumers' risk of harm from the use of a wide array of products. In carrying out its statutory responsibilities, the commission creates mandatory safety standards; works with industries to develop voluntary safety standards; bans products it deems unsafe when other options are not feasible; monitors the recall of defective products; informs and educates consumers about product hazards; conducts research on and develops testing methods for product safety; collects and publishes for public use a host of data on injuries and product hazards; and collaborates with state and local governments to establish uniform domestic product regulations. The Administration requested $123.5 million in appropriations for the commission in FY2019, or $2.5 million less than the enacted amount for FY2018. According to the CPSC's budget request for FY2019, $5.6 million of that amount would be channeled into workforce development, $72.6 million into preventing hazardous products from reaching consumers, $37.2 million into responding quickly to evidence that certain products can be harmful to consumers, and $8.1 million into communicating information about hazardous products to consumers and makers and sellers of such products. Employee compensation accounts for nearly two-thirds of the FY2019 budget request. H.R. 6147 as passed by the House would have provided $127 million in appropriations for the CPSC in FY2019, or $3.5 million more than the budget request. An administrative provision in the bill (Section 501) would have barred the commission from using any of the appropriated funds to \"finalize or implement\" a safety standard for off-road vehicles (ORVs) that was published in the Federal Register on November 19, 2014 (79 Fed. Reg. 68964) until two conditions were met. First, the National Academy of Sciences (in consultation with the Department of Defense and National Highway Traffic Safety Administration) completed a study that addresses (1) the feasibility of certain technical requirements proposed in the standard, (2) the number of rollovers that would be prevented if the requirements were adopted, and (3) the impact of the standard on ORVs used by the military. Second, the results were \"delivered\" to the House and Senate Appropriations Committees, the Senate Committee on Commerce, Science, and Transportation, and the House Committee on Energy and Commerce. In the 115 th Congress, H.R. 6147 as passed by the Senate would have appropriated $126 million, or $2.5 million more than the budget request. It included the same administrative provision (Section 501) dealing with ORVs as the House version of H.R. 6147 . In the 116 th Congress, H.R. 21 would have appropriated $126 million, whereas H.R. 648 would have appropriated $127 million. P.L. 116-6 appropriated $127 million for the CPSC and included the Section 501 administrative provision dealing with ORVs. In addition, $800,000 of the appropriated amount is to remain available until expended to carry out the grant program mandated by Section 1405 of the Virginia Graeme Baker Pool and Spa Safety Act. The Election Assistance Commission (EAC) is an independent agency that is charged with helping improve the administration of federal elections. Established by the Help America Vote Act of 2002 (HAVA), the EAC is responsible for managing election administration grants and payments; providing for federal voting system standards, testing, and certification; adopting voluntary guidance for national election administration requirements; conducting election administration research; and facilitating information exchanges among election administration stakeholders. The EAC was not given new regulatory authority under HAVA, but the law transferred certain responsibilities for the National Voter Registration Act of 1993 (NVRA), including certain rulemaking authority, from the Federal Election Commission (FEC) to the EAC. The Department of Justice has enforcement authority under HAVA. The President's budget request for FY2019 included $9.2 million for the EAC. In the 115 th Congress, H.R. 6147 as passed by the House would have appropriated $10.1 million, whereas H.R. 6147 as passed by the Senate would have appropriated $9.2 million. Each of those figures included $1.5 million to be transferred to the National Institute of Standards and Technology (NIST) for work NIST performs under HAVA. In the 116 th Congress, H.R. 21 and H.R. 648 would have appropriated $9.2 million for the EAC, the same figure as was enacted in P.L. 116-6 . The funding in H.R. 21 would have included $1.5 million for transfer to NIST, and the funding in H.R. 648 would have included $1.25 million. The enacted bill included $1.25 million for NIST. The Federal Communications Commission (FCC) is an independent federal agency established by the Communications Act of 1934 and charged with regulating interstate and international communications by radio, television, wire, satellite, and cable. Its five commissioners are appointed by the President, subject to confirmation by the Senate. Since 2009, the FCC's entire budget is derived from regulatory fees collected by the agency rather than through a direct appropriation. The fees, often referred to as \"Section (9) fees,\" are collected from license holders and certain other entities (e.g., cable television systems) and deposited into an FCC account. The law gives the FCC authority to review the regulatory fees and to adjust the fees to reflect changes in its appropriation from year to year. For FY2019, P.L. 116-6 provides the FCC with $339 million for salaries and expenses, all derived from offsetting collections, resulting in no net appropriation. The law also directs the FCC to take specific actions regarding its parental rating system and transmission of local television programming. Oversight Monitoring and Rating System: The FCC is directed to report to the Senate and House Committees on Appropriations within 90 days on the extent to which the rating system matches the video content that is being shown and the ability of the TV Parental Guidelines Oversight Monitoring Board to address concerns expressed by the public. Transmissions of Local Television Programming: With respect to the Satellite Television Extension and Localism Reauthorization (STELAR) Act of 2014, the FCC is directed to provide a full analysis to ensure decisions on market modification are comprehensively reviewed and STELAR's intent to promote localism is retained. The FCC is directed to adhere to statutory requirements and congressional intent when taking administrative action under STELAR. P.L. 116-6 also contains an administrative provision (Section 510) that prohibits the FCC from changing rules governing the Universal Service Fund regarding single connection or primary line restrictions. The Federal Deposit Insurance Corporation (FDIC) Office of the Inspector General's (OIG's) mission is to audit, investigate, and review the FDIC's operations and programs. The FDIC in general is funded through deposit insurance funds outside of the appropriations process. Its OIG is also funded from deposit insurance funds, but the amount is directly appropriated (through a transfer) to ensure the independence of the OIG. The President's request included $43.0 million for the FDIC OIG in FY2019. In the 115 th Congress, H.R. 6147 as passed by the House and H.R. 6147 as passed by the Senate would both have appropriated the requested $43.0 million. In the 116 th Congress, P.L. 116-6 appropriated $43.0 million, the same amount as provided for in H.R. 21 and H.R. 648 . The Federal Election Commission (FEC) is an independent agency that administers and enforces civil compliance with the Federal Election Campaign Act (FECA) and campaign finance regulations. The agency does so through educational outreach, rulemaking, enforcement and litigation, and advisory opinion issuances. The FEC also administers the presidential public financing system. For FY2019, the agency requested $71.3 million. In the 115 th Congress, H.R. 6147 as passed by the House and H.R. 6147 as passed by the Senate would have appropriated the requested $71.3 million. As in previous years, other sections of the FSGG legislation contained provisions related to campaign finance policy: Section 628 of the House-passed H.R. 6147 would have prohibited the Securities and Exchange Commission (SEC) from issuing rules \"regarding the disclosure of political contributions\" or payments for trade-association dues. The Senate-passed bill retains this language in Section 629. Section 630 of the House-passed H.R. 6147 would have prohibited spending appropriated funds to enforce a FECA provision known as the \"prior approval\" rule. This provision limits the number of trade associations that may solicit member-companies' employees. This language does not appear in the Senate-passed bill. Section 734 of the House-passed H.R. 6147 would have prohibited reporting certain political contributions or expenditures as a condition of the government-contracting process. The Senate-passed bill retains this language in Section 735. In the 116 th Congress, P.L. 116-6 appropriated $71.3 million, the same amount as included in H.R. 21 and H.R. 648 . General provisions in P.L. 116-6 prohibit spending appropriated funds on additional SEC disclosure (§629) or contractor disclosure (§735), as noted above, but do not include any prohibitions relating to the \"prior approval\" rule. In addition, report language accompanying P.L. 116-6 directs the FEC to update congressional appropriators on the agency's ongoing rulemaking on disclaimers for certain online political advertisements. The Federal Trade Commission (FTC) has two primary responsibilities: (1) to protect consumers from deceptive or illegal business practices, and (2) to maintain or enhance competition in a broad range of industries. The FTC enforces laws prohibiting anticompetitive, deceptive, or unfair business practices; issues new and revised regulations; and educates consumers and business owners to foster informed consumer choices, improved compliance with the law, and vigorous competition in free and open markets. Operating funds for the agency come from three sources, listed in descending order of importance: (1) direct appropriations, (2) premerger filing fees under the Hart-Scott-Rodino (HSR) Antitrust Improvements Act of 1976, and (3) Do-Not-Call (DNC) Registry fees. Under the President's FY2019 budget request, the FTC would have received $156.7 million in direct appropriations, and as much as $136 million in HSR filing fees and $17 million in DNC registry fees, for a total budget of $309.7 million. Enacted direct appropriations for the FTC in FY2018 totaled $164.3 million, and its total budget came to $306.3 million, or $3.4 million below the budget request. In FY2019, 55% of the requested appropriations were to go to activities intended to protect consumers, and the remaining 45% would have been used to promote competition in domestic markets. In the 115 th Congress, H.R. 6147 as passed by the House would have set the FTC's total budget in FY2019 at $311.7 million, or $2 million above the budget request. This assumed that the agency would collect no more than $136 million in HSR filing fees and $17 million in DNR fees, leaving a direct appropriation of $158.7 million. Under the bill, none of the funds available to the FTC in FY2019 could have been used to carry out its full responsibilities under Section 151 of the Federal Deposit Insurance Corporation Improvement Act of 1991 (FDICIA). (The budget request included the same restriction.) Like the budget request, the Senate-passed version of H.R. 6147 would have provided the FTC with a total budget of $309.7 million. This assumed, as in the House version of the bill, that the FTC would collect $136 million in HSR filing fees and $17 million in DNR fees, leaving a direct appropriation of $156.7 million. As with the House version of the bill, none of the funds could have been used to implement FTC's full responsibilities under Section 151 of the FDICIA. In the 116 th Congress, P.L. 116-6 provided the FTC with a total budget of $309.7 million. This assumes that the FTC will collect $136 million in HSR filing fees and $17 million in DNR fees, leaving a direct appropriation of $156.7 million. As with the 115 th Congress bills, none of the funds can be used to implement FTC's full responsibilities under Section 151 of the FDICIA. ( H.R. 21 and H.R. 641 contained identical provisions.) The General Services Administration (GSA) administers federal civilian procurement policies pertaining to the construction and management of federal buildings, disposal of real and personal property, and management of federal property and records. It is also responsible for managing the funding and facilities for former Presidents and presidential transitions. GSA's real property activities are funded through the Federal Buildings Fund (FBF). The FBF is a revolving fund into which rental payments are deposited from federal agencies that lease GSA space. The fund's revenue is then made available by Congress each year to pay for specific activities: construction or purchase of new space, repairs and alterations to existing space, rental payments for space that GSA leases, installment payments, and other building operations expenses. These amounts are referred to as limitations because GSA may not obligate FBF funds in excess of that permitted by Congress, regardless of how much revenue is available for obligation. Certain debts may also be paid for with FBF funds. A negative total for the FBF occurs when the amount of funds made available for expenditure in a fiscal year is less than the amount of new revenue expected to be deposited. A negative total does not mean that no funds are available from the FBF, but that there is a net gain to the fund under the proposed spending levels. GSA's operating accounts are funded through direct appropriations, separate from the FBF. GSA's total funding amount is calculated by adding the net FBF appropriations made available and appropriations provided to the operating accounts. Table 4 details GSA's enacted amounts for FY2018, the President's FY2019 request, and the FY2019 amounts from H.R. 6147 as passed by the House and the Senate. As shown in Table 4 , the President proposed a limit of $10.132 billion from the FBF's available revenue for GSA's real property activities for FY2019, an increase of $1.058 billion more than the amount provided in FY2018. In the 115 th Congress, the House-passed H.R. 6147 included a limit of $8.623 billion, a decrease of $451 million from FY2018-enacted appropriations and $1.509 billion less than the President's request for FY2019. The Senate-passed H.R. 6147 included a limit of $9.633 billion, $559 million more than the FY2018-enacted amount and $499 million less than the President requested. In the 116 th Congress, H.R. 21 would have provided a limit of $9.633 billion, whereas H.R. 648 would have provided a limit of $9.847 billion. P.L. 116-6 ultimately included a limit of $9.285 billion. The President also requested $551 million for GSA's operating accounts, an increase of $216 million more than the FY2018-enacted level. The President's request included $31 million for the Asset Proceeds and Space Management Fund (APSMF). Appropriations in the APSMF are to be used to carry out actions pursuant to the recommendations of the Public Buildings Reform Board, which was established by the Federal Assets Sale and Transfer Act of 2016 (FASTA). The President's request also included $6 million for the Environmental Review Improvement Fund, which would support activities related to reforming the environmental review process and the work of the Federal Permitting Improvement Steering Council. The council addresses issues surrounding modernization of federal permitting for major infrastructure projects and helps implement the FASTA. Finally, the President requested $210 million for the Technology Modernization Fund to support improvements in agency information technology systems. In the 115 th Congress, the House-passed H.R. 6147 included $432 million for GSA's operating accounts, $97 million more than the FY2018-enacted amounts and $119 million less than the President requested. The Senate-passed H.R. 6147 included $267 million for GSA's operating accounts, $68 million less than the FY2018-enacted amounts and $284 million less than the President requested. In the 116 th Congress, H.R. 21 would have provided $267 million for GSA's operating accounts, and H.R. 648 would have provided $299 million. P.L. 116-6 ultimately appropriated $299 million for GSA's operating accounts. The Financial Services and General Government (FSGG) Appropriations Act includes funding for four agencies with personnel management functions: the Federal Labor Relations Authority (FLRA), the Merit Systems Protection Board (MSPB), the Office of Personnel Management (OPM), and the Office of Special Counsel (OSC). Table 5 lists the FY2018 enacted appropriations, the FY2019 budget request, the FY2019 House-passed H.R. 6147 , and the FY2019 Senate-passed H.R. 6147 . The Federal Labor Relations Authority (FLRA) is an independent federal agency that administers and enforces Title VII of the Civil Service Reform Act of 1978. Title VII is called the Federal Service Labor-Management Relations Statute (FSLMRS). The FSLMRS gives federal employees the right to join or form a union and to bargain collectively over the terms and conditions of employment. Employees also have the right not to join a union that represents employees in their bargaining unit. The statute excludes specific agencies and gives the President the authority to exclude other agencies for reasons of national security. Agencies that are specifically excluded by law are the Federal Bureau of Investigation (FBI), Central Intelligence Agency (CIA), Government Accountability Office (GAO), National Security Agency (NSA), Tennessee Valley Authority (TVA), FLRA, Federal Service Impasses Panel (FSIP), and U.S. Secret Service. The FLRA is composed of a three-member authority, the Office of General Counsel, and the FSIP. The three members of the authority and the General Counsel are appointed to five-year terms by the President with the advice and consent of the Senate. The members of the FSIP are appointed by the President for five-year terms. The FLRA resolves disputes over the composition of bargaining units, charges of unfair labor practices, objections to representation elections, and other matters. The General Counsel's office conducts representation elections, investigates charges of unfair labor practices, and manages the FLRA's regional offices. The FSIP resolves labor negotiation impasses between federal agencies and labor organizations. For FY2019, the President requested appropriations of $26.2 million for the FLRA. This amount would fund 125 full-time equivalents (FTEs), 3 FTEs fewer than the FY2018 estimated level of 128 FTEs. In the 115 th Congress, H.R. 6147 as passed by the House and the Senate would have provided the same amount as the President requested. In the 116 th Congress, both H.R. 21 and H.R. 648 included the same $26.2 million, as did the enacted P.L. 116-6 . The Merit Systems Protection Board (MSPB) is an independent, quasi-judicial agency established to protect the civil service merit system. The MSPB adjudicates appeals primarily involving personnel actions, certain federal employee complaints, and retirement benefits issues. The President's budget requested FY2019 appropriations of $44.5 million (including $42.1 million for salaries and expenses) for the MSPB. This amount would fund 235 FTEs, the same as the FY2018 enacted level. The justification that accompanied the MSPB budget submission explained that the request \"reflects the FTE level at 235; however, MSPB's revised FTE level is 226 to coincide with the personnel compensation and benefits decrease in [the] Congressional Budget Justification submission.\" It stated that, with the requested funding level, the agency would \"continue [its] efforts to maintain MSPB resources dedicated primarily to our Title 5 statutory responsibilities of processing appeals from Federal employees involving, among others, adverse actions, whistleblower claims and veterans concerns, and issuing study reports related to the civil service.\" In the 115 th Congress, H.R. 6147 as passed by the House and the Senate would have provided funding of $46.8 million (including $44.5 million for salaries and expenses). This amount is $2.3 million more than the President requested. In the 116 th Congress, both H.R. 21 and H.R. 648 included $46.8 million for the MSPB, as did the enacted P.L. 116-6 . The Office of Personnel Management (OPM) is responsible for the personnel management of the federal government's civil service. The President's budget requested FY2019 appropriations of $132.2 million for OPM salaries and expenses. This amount included $14 million to remain available until expended for information technology (IT) infrastructure modernization and Trust Fund Federal Financial System migration or modernization. It also included $639,018 to strengthen the capacity and capabilities of the acquisition workforce, including the recruitment, hiring, training, and retention of the acquisition workforce, and to modernize IT in support of acquisition workforce effectiveness or management. The budget also requested appropriations of $133.5 million for trust fund transfers, $5 million for OPM OIG salaries and expenses, and $25.3 million for OIG trust fund transfers for FY2019. OPM requested an FTE employment level of 6,255 for FY2019, a decrease of 108 FTEs from the FY2018 enacted level of 6,363 FTEs. The agency's budget submission stated that the request \"will enable OPM to continue to address critical information technology (IT) infrastructure and investments necessary to maintain its security posture and respond to changing business needs and Federal mandates.\" In addition, the request is to allow the OPM OIG to conduct \"agency-wide audits, investigations, evaluations, and administrative sanctions which help to prevent and detect fraud, waste, abuse, and mismanagement\" and continue to provide oversight for \"OPM's agency-wide information technology (IT) infrastructure project, including data center consolidation and potential mainframe migrations.\" In the 115 th Congress, H.R. 6147 as passed by the House and the Senate would have provided funding for OPM salaries and expenses, trust fund transfers for salaries and expenses, OIG salaries and expenses, and OIG trust fund transfers in the same amounts as requested by the President. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 also included the requested amounts, which totaled $295.9 million. The 115 th Congress reports that accompanied H.R. 6258 and S. 3107 included several directives to OPM as follows: Federal Retirement Processing Modernization —The House committee expressed the expectation that OPM will \"continue to make retirement processing and disability processing a priority and move to a fully-automated electronic filing system.\" It directed OPM to continue to provide monthly reports to the House and Senate Appropriations Committees on progress in addressing backlogs. The Senate committee directed OPM to continue to provide information on progress made. OPM Organizational Changes —The House committee reminded OPM of the obligation to notify the House and Senate Appropriations Committees about \"any reorganizations, restructurings, new programs or elimination of programs,\" including \"changes that could impact the National Bureau of Investigations and the Human [Resources] Solutions program.\" The committee encouraged the OPM Inspector General (IG) \"to keep a pulse on\" and update the initiatives in reports to Congress. Critical Functions —The House committee reminded OPM \"to not lose sight of its mission\" related to \"directing human resources and employee management services, and administering retirement benefits, managing healthcare and insurance programs, overseeing merit-based and inclusive hiring in to the civil service, and providing a secure employment process\" as the agency \"responds to critical IT challenges.\" Recruitment —The House committee encouraged OPM \"to seek input from hiring managers on what challenges they face and what improvements could be made to make the federal hiring process more efficient and effective.\" It directed the agency to submit a report \"on a plan to reduce barriers to Federal employment, reduce delays in the hiring process, and how it intends to improve the overall federal recruitment and hiring process,\" to the House and Senate Appropriations Committees within 90 days after the act's enactment. In addition, the committee encouraged federal agencies \"to increase recruitment efforts within the United States and the territories and at Hispanic Serving Institutions and Historically Black Colleges and Universities.\" Federal Pay —The House committee directed the OPM Director and the Chief Human Capital Officers Council to \"track government-wide data to establish a baseline and analyze the extent to which\" special pay \"authorities are effective in improving employee recruitment and retention, and determine what potential changes may be needed to improve\" their \"effectiveness.\" Federal Telework Programs —Stating its support for \"cost savings and productivity improvements from well-managed telework programs,\" the House committee urged the federal sector to \"continue to track successes, compile best practices, and expand upon telework programs where appropriate.\" The Senate committee encouraged OPM to work with agencies to improve data collection methods, provide training on effective teleworking, set goals for telework results, and prepare progress assessments. National Background Investigations Bureau (NBIB) —The Senate committee directed OPM and the bureau to provide quarterly updates to the House and Senate Appropriations Committees on developments in transitioning responsibility for Department of Defense (DOD) background investigations to DOD, and OPM's assessment of the transition's impact and implications on the agency. Official Time —The Senate committee directed OPM to \"assist agencies in strengthening internal controls and increasing transparency and accountability for monitoring and reporting on\" official time. Information Technology ( IT Modernization ) —The Senate committee directed OPM to implement recommendations made in GAO and IG reports on information security and provide quarterly briefings to the House and Senate Appropriations Committees on its progress on the IT Transformation and Cybersecurity Strategy. Trust Fund Federal Financial System (FFS) —The Senate committee directed OPM to provide a spending plan to the House and Senate Appropriations Committees \"for the $18,400,000 dedicated to the FFS initiative; the options the agency is pursuing to modernize FFS; and a timeline for completion of the modernization of FFS,\" within 30 days of the act's enactment. Federal Security Clearances —The Senate committee referenced the Title VI general provision that prevents \"contractors from conducting quality reviews of their own work\" and directed OPM to \"ensure that internal controls are implemented to prevent investigations from being closed prematurely.\" OIG's Semiannual Report to Congress —The Senate committee encouraged the semiannual report to include \"OPM's efforts to improve and address cybersecurity challenges including steps taken to prevent, mitigate, and respond to data breaches involving sensitive personnel records and information; OPM's cybersecurity policies and procedures in place, including policies and procedures relating to IT best practices such as data encryption, multifactor authentication, and continuous monitoring; OPM's oversight of contractors providing IT services; and OPM's compliance with government-wide initiatives to improve cybersecurity.\" The 116 th Congress conference report ( H.Rept. 116-9 ) did not change any of these committee directives. The conference report included the following additional directive to OPM. Relocation of Human Resources Solutions (HRS) —The conference committee directed OPM to submit a report to the House and Senate Appropriations Committees within 30 days after the act's enactment on \"the budgetary implications of moving HRS to [the General Services Administration] (GSA) and the legal authority under which it proposes to transfer the HRS function within the OPM Revolving Fund established by 5 U.S.C. §1304(e)(1) to GSA.\" The conferees directed OPM \"to provide quarterly updates to the Committees on the status of the HRS program relocation and any other OPM program and office relocations.\" Section 619(a)(3), (4), and (5) of H.R. 6147 as passed by the House and the Senate in the 115 th Congress would have provided the mandatory appropriations for the health benefits, life insurance, and retirement accounts. According to the House Committee on Appropriations report that accompanied H.R. 6258 , \"these are accounts where authorizing language requires the payment of funds.\" The House report stated that the Congressional Budget Office (CBO) estimated $13.5 billion for the Government Payment for Annuitants, Employee Health Benefits; $49 million for the Government Payment for Annuitants, Employee Life Insurance; and $8 billion for Payment to the Civil Service Retirement and Disability Fund. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included identical sections, resulting in a total of $21.628 billion in outlays. The Office of Special Counsel (OSC) is an independent federal investigative and prosecutorial agency whose mission is to safeguard the merit system by protecting federal employees and applicants from prohibited personnel practices, especially reprisal for whistleblowing. The President's budget requested FY2019 appropriations of $26.3 million for the OSC. The agency's FTE employment level was estimated to be 144 for FY2019, an increase of 13 FTEs above the FY2018 enacted level of 131 FTEs. \"For 2018 and 2019,\" the agency projected \"intakes for whistleblower disclosure, Hatch Act, and prohibited personnel practice cases to follow recent trends and stabilize at around 6,000 total new cases received each year.\" The funding was requested to \"enable OSC to meet rising demand for [the agency's] services, protect the growing number of whistleblowers in the VA [Veterans Affairs] and other agencies, protect the employment rights of returning service members, manage continually rising case levels, and protect the federal merit system from prohibited personnel and political practices.\" In the 115 th Congress, H.R. 6147 as passed by the House would have provided the funding requested by the President. As passed by the Senate, H.R. 6147 would have provided funding of $26.5 million, $283,000 more than the President's request. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included $26.5 million in funding for the OSC. The 115 th Congress Senate committee report that accompanied S. 3107 included the following directive: Veterans Affairs (VA) C ases —Noting the significant increase in cases over the past several fiscal years and that \"three-fourths of OSC's whistleblower disclosures that are substantiated in full or in part are from the VA,\" the committee expressed the expectation that, as the agency \"continues to move toward a more cohesive internal structure through its 'One OSC' initiative,\" personnel resources could be allocated more effectively to address the caseload. The 116 th Congress conference report ( H.Rept. 116-9 ) did not change this directive. The National Archives and Records Administration (NARA) is an independent agency created to preserve the U.S. government's records, oversee recordkeeping in various government agencies, and make government records publicly available. The Administration requested $376.8 million for NARA for FY2019. In the 115 th Congress, H.R. 6147 as passed by the House would have appropriated $390.7 million, whereas H.R. 6147 as passed by the Senate would have appropriated $393.4 million. In the 116 th Congress, H.R. 21 would have appropriated $393.4 million, whereas H.R. 648 would have appropriated $391.3 million. P.L. 116-6 appropriated $391.3 million. Approximately $27.2 million of NARA's funding is dedicated to paying down debt due to the construction of the Archives II facility, resulting in lower net total figures appearing in the committee reports. The National Credit Union Administration (NCUA) is an independent federal agency funded largely by the credit unions it charters, insures, and regulates. The NCUA manages the Community Development Revolving Loan Fund (CDRLF), established in 1979, to assist officially designated low-income credit unions in providing basic financial services to low-income communities. Low-interest loans and grants are made available to assist these credit unions. Loans are normally repaid in five years, although shorter repayment periods may be considered. Grants have been provided for a variety of purposes including improving operations and technical assistance. In addition to funds provided for specifically in appropriations acts, earnings generated from the CDRLF may be available to fund loans or grants. In the 115 th Congress, the President requested no money be appropriated for the CDRLF in FY2019, whereas House-passed H.R. 6147 and Senate-passed H.R. 6147 would both have appropriated $2 million, the same amount as appropriated in FY2018. In the 116 th Congress, H.R. 21 and H.R. 648 both included $2 million, as did the enacted P.L. 116-6 . The Office of Government Ethics (OGE) is an independent federal agency, established by the Ethics in Government Act of 1978, charged with promulgating rules and regulations pertaining to financial disclosure, conflict of interest, and ethics in the executive branch. OGE is headed by a director who is appointed to a five-year term by the President with Senate confirmation. OGE provides education and training to executive branch ethics officials. According to OGE, it \"does not adjudicate complaints, investigate matters within the jurisdiction of Inspectors General and other authorities, or prosecute ethics violations.\" For FY2019, the President's request for OGE was $16.3 million, a $0.1 million decrease from the FY2018 enacted amount. In the 115 th Congress, the House-passed H.R. 6147 would have appropriated $17 million and the Senate-passed H.R. 6147 would have appropriated $16.4 million. In the 116 th Congress, H.R. 21 would have appropriated $16.4 million, whereas H.R. 648 would have appropriated $17 million. P.L. 116-6 ultimately appropriated $17 million for OGE. The Privacy and Civil Liberties Oversight Board (PCLOB) was originally established in 2004 by the Intelligence Reform and Terrorism Prevention Act as an agency within the Executive Office of the President. PCLOB was reconstituted as an independent agency within the executive branch by the Implementing Recommendations of the 9/11 Commission Act of 2007. The five-member board assumed its new status on January 30, 2008; its FY2009 appropriation was its first funding as an independent agency. The board is directed to (1) ensure that privacy and civil liberties concerns are appropriately considered in the development and implementation of laws, regulations, and executive branch policies related to protecting the nation against terrorism; (2) review the implementation of laws, regulations, and executive branch policies related to protecting the nation from terrorism, including information-sharing guidelines; and (3) analyze and review actions the executive branch takes to protect the nation from terrorism, ensuring that the need for such actions is balanced with the need to protect privacy and civil liberties. In addition, the board is directed to (1) advise the President and the heads of executive branch departments and agencies on issues concerning, and findings pertaining to, privacy and civil liberties; and (2) provide annual reports to Congress detailing the board's activities during the year. Upon request, board members appear and testify before congressional committees. For FY2019, the President requested $5 million for the PCLOB, compared with $8 million appropriated in FY2018. In the 116 th Congress, the House-passed H.R. 6147 and the Senate-passed H.R. 6147 both included the requested $5 million, as did H.R. 21 and H.R. 648 in the 116 th Congress. The enacted P.L. 116-6 appropriated the requested $5 million for the PCLOB. The Public Company Accounting Oversight Board (PCAOB) was created by the Sarbanes-Oxley Act of 2002 (Sarbanes-Oxley) as a nonprofit corporation to provide independent oversight of audits of companies listed on public exchanges. Amendments in the Dodd-Frank Act provided that the PCAOB is generally funded outside the appropriations process through the annual accounting support fees assessed on public companies and other issuers, as well as fees on brokers and dealers registered with the SEC. Sarbanes-Oxley created a merit scholarship for undergraduate and graduate students enrolled in accredited accounting degree programs that was to be funded by monetary penalties imposed by the PCAOB, notwithstanding other requirements of the act. The scholarship program is administered by an outside vendor under the rules established by the PCAOB. For FY2018, P.L. 115-141 , Division B, Section 620 specified that not more than $1 million should be spent on such scholarships. In the 115 th Congress, Section 620 of the Senate-passed version of H.R. 6147 would have provided for an \"amount not exceeding the amount of funds collected by the Board as of December 31, 2018, including accrued interest, as a result of the assessment of monetary penalties\" for these scholarships in FY2019. The committee report on this language estimated this amount at $1 million. The Administration did not submit any funding request for these scholarships in FY2019, nor was any included in H.R. 6147 as passed by the House. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 all include the same Section 620 language noted above, and H.Rept. 116-9 attributes the same $1 million in spending resulting from it in FY2019. The SEC administers and enforces federal securities laws to protect investors from fraud, to ensure that corporate securities' sellers disclose accurate financial information, and to maintain fair and orderly trading markets. The SEC's budget is set through the normal appropriations process, but, under the Dodd-Frank Act, the agency's appropriations are offset by fees it collects from securities exchanges on stock sales and certain other securities transactions on those exchanges. The collections go directly to the Treasury Department. To achieve the offset, the act requires the agency to adjust its fees, making the agency's budget deficit-neutral. The President's FY2019 request for the SEC totaled $1.699 billion, with $40.8 million of that intended for lease costs for the relocation of the SEC's New York Regional Office headquarters. In the 115 th Congress, H.R. 6147 as passed by the House would have appropriated a total of $1.696 billion, as would H.R. 6147 as passed by the Senate; both would have included $37.2 million for leasing the new headquarters. In the 116 th Congress, H.R. 21 would have appropriated $1.696 billion, whereas H.R. 648 would have appropriated $1.712 billion. P.L. 116-6 appropriated $1.712 billion, including $37.3 million for the New York Regional Office lease. In addition to amounts approved in the regular appropriations process, the Dodd-Frank Act also established an SEC reserve fund to enable the agency to plan for certain long-term expenses, potentially freeing up other funds for agency use in areas such as enforcement and regulation. The reserve fund is funded by the agency's traditional collections on registration fees. In any single fiscal year, the fund cannot exceed $100 million nor can the SEC collect more than $50 million in fees for the fund. Any excess collections go to the Treasury Department. For FY2019, the President requested $25 million be rescinded from the reserve fund. In the 115 th Congress, neither H.R. 6147 as passed by the House nor H.R. 6147 as passed by the Senate would have rescinded any monies from the reserve fund. In the 116 th Congress, the House-passed bills did not include such rescission language and neither did the enacted P.L. 116-6 . The Selective Service System (SSS) is an independent federal agency operating with permanent authorization under the Military Selective Service Act. It is not part of the Department of Defense, but its mission is to serve the military's emergency manpower needs by conscripting personnel when directed by Congress and the President. Most males aged 18 through 25 and living in the United States are required to register with the SSS. The induction of men into the military via Selective Service (i.e., the draft) terminated in 1973 and has not been renewed. In January 1980, President Carter asked Congress to authorize standby draft registration of both men and women. Congress approved funds for male-only registration in June 1980. Women are now allowed to serve in combat units and occupations, which may lead to the modification of registration to include women. SSS's funding has remained relatively stable over previous years in terms of absolute dollars, but it has decreased in terms of inflation-adjusted funding. For FY2019, the President requested $26.4 million in funding. The 115 th Congress House-passed and Senate-passed versions of H.R. 6147 would have appropriated $26 million, and the same amount was included in the 116 th Congress H.R. 21 and H.R. 648 . P.L. 116-6 appropriated $26 million for SSS. This represents a $3.1 million increase over the $22.9 million appropriated for SSS in FY2018. The Small Business Administration (SBA) administers a number of programs intended to assist small businesses. For example, the SBA (1) guarantees loans made by banks and other financial institutions to small businesses; (2) makes low-interest loans to small businesses, nonprofit organizations, and households that are victims of natural disasters and acts of terrorism; (3) finances training and technical assistance programs for small business owners and prospective owners; (4) oversees several small business federal contracting programs, and (5) serves as an advocate for small business within the federal government. The President requested an appropriation of $834.1 million for the SBA for FY2019 ($628.9 million if recommended increases in fees and a $50 million rescission is approved). The request included $265 million for salaries and expenses, $192.5 million for entrepreneurial development and noncredit programs, $155.2 million for business loan administration, $4 million for business loan subsidy costs, $21.9 million for the Office of the Inspector General, $9.1 million for the Office of Advocacy, and $186.5 million for disaster assistance. The Administration also requested authorization levels of $30 billion for the 7(a) loan guaranty program, $7.5 billion for the 504/CDC loan guaranty program, $4 billion for the Small Business Investment Company (SBIC) program, and $12 billion for SBA-guaranteed trust certificates for the SBIC program. In addition, the Administration requested a number of program revisions, including (1) authorization to increase SBA loan guarantee program levels that are established in the act and do not require budget authority by not more than 15% after notifying, in writing, the Committees on Appropriations and Small Business of both Houses of Congress at least 15 days in advance; (2) a permanent rescission of $50 million in prior year unobligated subsidy balances from the 504/CDC loan guarantee program; (3) an \"update\" of fee structures to offset $155 million in business loan administration expenses, including increases in the 7(a) loan guarantee program's upfront and annual servicing fees; and (4) an increase in the SBAExpress program's maximum loan amount from $350,000 to $1 million. The 115 th Congress House-passed H.R. 6147 would have appropriated $741.88 million for the SBA for FY2019, $92.2 million less than the Administration's request. Of the appropriated amount, $268.5 million was for salaries and expenses, $251.9 million was for entrepreneurial development and noncredit programs, and $31.308 million was for disaster assistance. The remaining budget account amounts, authorization levels, and rescission followed the request. The House-passed bill also would have repealed an expedited disaster assistance program authorized under the Food, Conservation, and Energy Act of 2008. It would not have authorized the SBA to increase loan guarantee program authorization levels beyond those established in the act, nor authorized changes to SBA fee structures, nor increased the SBAExpress program's maximum loan amount. The 115 th Congress Senate-passed H.R. 6147 would have appropriated $699.3 million for the SBA for FY2019, $134.8 million less than the Administration's request. Of the appropriated amount, $267.5 million was for salaries and expenses, $241.6 million was for entrepreneurial development and noncredit programs, and no funding was provided for disaster assistance. The remaining budget account amounts and authorization levels followed the request. It did not address the rescission, authorize the SBA to increase loan guarantee program authorization levels beyond those established in the act, increase SBA fee structures, or increase the SBAExpress program's maximum loan amount. The Senate-passed H.R. 6147 would have prohibited SBA assistance to businesses headquartered in the People's Republic of China or for which more than 25% of the company's voting stock is owned by affiliates that are citizens of the People's Republic of China; required the SBA to study whether the provision of matchmaking services with various outside entities would enhance existing SBA veterans entrepreneurship programs; and required the SBA to work with federal agencies to review each Office of Small and Disadvantaged Business Utilization's efforts to comply with the requirements under Section 15(k) of the Small Business Act (relating to assisting small businesses obtain federal contracts). In the 116 th Congress, P.L. 116-6 appropriated $715.37 million for the SBA, $134.8 million less than the Administration's request (with the difference primarily due to lower appropriations for disaster assistance). The act provided $267.5 million for salaries and expenses, $247.7 million for entrepreneurial development and noncredit programs, $155.15 million for business loan administration, $4 million for business loan credit subsidies (for the Microloan program), $21.9 million for Office of Inspector General, $9.12 million for the Office of Advocacy, and $10 million for disaster assistance. The act also set authorization levels of $30 billion for the 7(a) loan guaranty program, $7.5 billion for the 504/CDC loan guaranty program, $4 billion for the Small Business Investment Company (SBIC) program, and $12 billion for SBA-guaranteed trust certificates for the SBIC program, as requested by the Trump Administration. In addition, the act included a permanent rescission of $50 million in prior-year unobligated subsidy balances from the 504/CDC loan guarantee program, repealed the expedited disaster assistance loan program, and established a System Modernization and Working Capital Fund (IT WCF) to, among other goals, improve, retire, or replace existing information technology systems to enhance cybersecurity and transition to other innovative commercial platforms and technologies. The SBA was authorized to transfer, after receiving advance approval of the House and Senate Committees on Appropriations, not more than 3% of its funding under the salaries and expenses and business loans program accounts to the IT WCF. The amounts transferred to the IT WCF shall remain available for obligation through September 30, 2022. The U.S. Postal Service (USPS) generates almost all of its funding—nearly $70 billion annually—by charging mail users for the costs of the services it provides. Congress, however, does provide annual appropriations to compensate USPS for revenue it forgoes in providing free mailing privileges to the blind and overseas voters. Congress authorized appropriations for these purposes in the 1993 Revenue Forgone Reform Act (RFRA). This act also permitted Congress to provide USPS with a $29 million annual reimbursement until 2035 to compensate for lost revenue providing additional below-cost postal services during the RFRA's phase-in period. Funds appropriated to the USPS for the annual reimbursement and revenue forgone are deposited in the Postal Service Fund (PSF), which is an off-budget revolving fund comprised of revenue from the sale of postal products and services. The PSF is used to pay the operating expenses of USPS, the U.S. Postal Service Office of Inspector General (USPSOIG), and the Postal Regulatory Commission (PRC). The Postal Accountability and Enhancement Act (PAEA), which was enacted on December 20, 2006, first affected the postal appropriations process in FY2009. Under the PAEA, both the USPSOIG and the PRC must submit their budget requests directly to Congress and to OMB. The law requires that funding for these two agencies must be provided out of the Postal Service Fund. The law further requires that USPSOIG's budget be treated as a component of USPS's budget, whereas the PRC's budget, like the budgets of other independent regulators, is treated separately. Table 6 summarizes the different appropriations for the USPS. For FY2019, the President requested $55.2 million for the Postal Service Fund, which is about $2.9 million less than the USPS's FY2018 appropriation. In the 115 th Congress, H.R. 6147 as passed by the House would have appropriated 58.1 million, whereas H.R. 6147 as passed by the Senate would have appropriated $55.2 million. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included $55.2 million for the Postal Service Fund. For FY2019, the President requested $234.7 million for the USPSOIG, which is about $10.4 million less than the USPSOIG's FY2018 appropriation. In the 115 th Congress, H.R. 6147 as passed by the House and as passed by the Senate would both have appropriated $250 million. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included $250 million for the USPSOIG. For FY2019, the President requested $15.1 million for the PRC, which is about $0.1 million less than the PRC's FY2018 appropriation. In the 115 th Congress, both the House- and Senate-passed versions of H.R. 6147 would have appropriated $15.2 million, the same as the PRC's FY2018 appropriation. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included $15.2 million for the PRC. The President's FY2019 Budget contained several \"operational reforms to reduce costs and improve revenue,\" including discontinuing six-day mail delivery and reducing delivery frequency to five days where there is a business case to do so; allowing USPS to shift to centralized and curbside delivery where appropriate; authorizing a one-time postal rate increase; and ensuring flexibility of the rate-setting process. In the 115 th Congress, the House-passed and Senate-passed versions of H.R. 6147 included several long-standing postal policy provisions. For example, the bills both would have required USPS to continue six-day mail delivery; required USPS to continue providing mail for overseas voting and mail for the blind free of charge; prohibited appropriated funds from being used to charge a fee to a child support enforcement agency seeking the address of a postal customer; and prohibited funds from being used to consolidate or close small rural and other small post offices. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included the same long-standing postal policy provisions as the House- and Senate-passed versions of H.R. 6147 , but did not include the policy reforms requested in the President's FY2019 Budget. A court of record under Article I of the Constitution, the United States Tax Court (USTC) is an independent judicial body that has jurisdiction over various tax matters as set forth in Title 26 of the United States Code . The court is headquartered in Washington, DC, but its judges conduct trials in many cities across the country. The USTC was appropriated $50.7 million in FY2018. The President requested $55.6 million for FY2019. In the 115 th Congress, both the House- and Senate-passed versions of H.R. 6147 would have appropriated $51.5 million. In the 116 th Congress, H.R. 21 , H.R. 648 , and the enacted P.L. 116-6 included $51.5 million for the USTC. The FSGG Appropriations Act includes general provisions applying government-wide. Most of the provisions include language that has appeared under the General Provisions title for several years because Congress has decided to reiterate the language rather than make the provisions permanent. An Administration's proposed government-wide general provisions for a fiscal year are generally included in the Budget Appendix. Among the new provisions proposed for FY2019 were the following: If new budget authority provided in FY2019 appropriations acts exceeds the discretionary spending limit for any category set forth in Section 251(c) of the Balanced Budget and Emergency Deficit Control Act of 1985 because of estimating differences with CBO, the OMB Director will make an adjustment to the FY2019 discretionary spending limit in such category in the amount of the excess. The total of all such adjustments would not exceed 0.2% of the sum of the adjusted FY2019 discretionary spending limits for all categories. (Section 736, FY2019 budget proposal, Section 745 of H.R. 6147 as passed by the House, Section 748 of H.R. 6147 as passed by the Senate, Section 748 of H.R. 21 as passed by the House, Section 747 of H.R. 648 as passed by the House, and Section 747 of P.L. 116-6 .) The head of a covered agency that has established an Information Technology System Modernization and Working Capital Fund (IT Fund) may transfer funds appropriated in this or any other act that become available upon or after this act's enactment date to such agency's IT Fund for the purposes specified in Section 1077 of P.L. 115-91 . Requirements for notification about the transfer apply. Amounts transferred to an agency's IT Fund would remain available for three fiscal years. (Section 737 of the FY2019 budget proposal. Not included in H.R. 21 as passed by the House, H.R. 648 as passed by the House, and P.L. 116-6 .) None of the funds made available by this act could be used to implement, administer, or enforce a rule issued pursuant to Section 13(p) of the Securities Exchange Act of 1934, which requires the SEC to promulgate rules requiring issuers with conflict minerals that are necessary to the functionality or production of a product manufactured by such person to disclose annually whether any of those minerals originated in the Democratic Republic of the Congo or an adjoining country. (Section 747 of H.R. 6147 as passed by the House. Not included in H.R. 21 as passed by the House, H.R. 648 as passed by the House, and P.L. 116-6 .) A pay adjustment of 1.9% for 2019 was authorized for federal civilian employees paid under the General Schedule, allocated as 1.4% base pay adjustment and 0.5% locality pay adjustment. (Section 749 of H.R. 6147 as passed by the Senate, Section 749 of H.R. 21 as passed by the House, Section 748 of H.R. 648 as passed by the House, Section748 of P.L. 116-6 .) The Treasury Department's Office of Foreign Assets Control (OFAC) administers the main body of Cuba embargo regulations, the Cuban Assets Control Regulations, which were first issued in 1963, and have been amended many times over the years to reflect changes in U.S. policy toward Cuba. In the 115 th Congress, H.R. 6147 as passed by the House included two FSGG provisions in Division B that would have tightened U.S. economic sanctions on Cuba. Section 128 provided that no funds made available by the act could have been used to approve, license, facilitate, authorize, or otherwise allow the use, purchase, trafficking, or import of property confiscated by the Cuban government. The provision appears to have been aimed at prohibiting the importation of rum and tobacco products by authorized U.S. travelers as accompanied baggage. Section 129, which relates to trade sanctions on Cuba, provided that no funds made available by the act could have been used to authorize a general license or approve a specific license with respect to a mark, trade name, or commercial name that is substantially similar to one that was used in connection with a business or assets that were confiscated by the Cuban government unless the original owner expressly consented. The provision, which would have prohibited OFAC from licensing the payment of trademark registration fees, relates to a long-standing dispute between a Cuban company and the Bermuda-based Bacardi Limited over the Havana Club trademark. In January 2016, OFAC issued a specific license for the Cuban company to make payments related to the renewal of the Havana Club trademark, and the U.S. Patent and Trademark Office subsequently renewed the Havana Club trademark until 2026. Both Cuba provisions had been included in House Appropriations Committee version of the FY2018 FSGG appropriations bill, H.R. 3280 , but were not included in the Consolidated Appropriations Act, 2018 ( P.L. 115-141 ). H.R. 6147 as passed by the Senate did not include either Section 128 or Section 129. In the 116 th Congress, neither H.R. 21 nor H.R. 648 included either section and nor did the enacted P.L. 116-6 . ", "summary": "The Financial Services and General Government (FSGG) appropriations bill includes funding for more than two dozen independent agencies. Among them are the Consumer Product Safety Commission (CPSC), Election Assistance Commission (EAC), Federal Communications Commission (FCC), Federal Election Commission (FEC), Federal Labor Relations Authority (FLRA), Federal Trade Commission (FTC), General Services Administration (GSA), National Archives and Records Administration (NARA), Office of Personnel Management (OPM), Privacy and Civil Liberties Oversight Board (PCLOB), Securities and Exchange Commission (SEC), Selective Service System (SSS), Small Business Administration (SBA), and United States Postal Service (USPS). President Trump's FY2019 budget request included a total of $3 billion for the independent agencies funded through the FSGG appropriations bill, including $282 million for the Commodity Futures Trading Commission (CFTC) (which is considered through the Agriculture appropriations bill in the House and the FSGG bill in the Senate). In the 115th Congress, the House and Senate Committees on Appropriations reported FSGG appropriations bills (H.R. 6258, H.Rept. 115-792 and S. 3107, S.Rept. 115-281) and both houses passed different versions of a broader bill (H.R. 6147) that would have provided FY2019 appropriations. The House-passed H.R. 6147 would have provided a combined total of $1.4 billion for the FSGG agencies, while the Senate-passed H.R. 6147 would have provided $2.3 billion. In both cases, the largest differences compared to the President's request were in the funding for the General Services Administration (GSA). No full-year FY2019 FSGG bill was enacted prior to the end of FY2018. The FSGG agencies were provided continuing appropriations through December 7, 2018, in P.L. 115-245 and through December 21, 2018, in P.L. 115-298. No final bill, however, was enacted and funding for FSGG agencies along with much of the rest of the government lapsed on December 22, 2018. No further FY2019 appropriations occurred prior to the 116th Congress. In the 116th Congress, the House of Representatives passed H.R. 21 and H.R. 648, both containing six full FY2019 appropriations bills, including FSGG provisions. H.R. 21 was identical to the Senate-passed H.R. 6147, while H.R. 648 was based on a prospective conference report from the 115th Congress and contained $2.5 billion for the FSGG independent agencies. The Senate did not act on either of these bills. On February 14, 2019, both the House and the Senate agreed to a conference report (H.Rept. 116-9) for H.J.Res. 31, containing seven appropriations bills providing full FY2019 funding for the government's operations that had not been previously funded. This included FSGG provisions nearly identical to H.R. 648. The President signed the resolution on February 15, 2019, enacting it into law as P.L. 116-6. P.L. 116-6 provides a total of $1.9 billion in appropriations for FSGG independent agencies.", "document_type": "crs"}
{"report": "On April 23, 2020, Congress passed its fourth measure including supplemental appropriations to respond to the Coronavirus Disease 2019 (COVID-19) pandemic. The Paycheck Protection Program and Health Care Enhancement Act (the act; P.L. 116-139 ) includes enhancements for the Small Business Administration's Paycheck Protection Program (PPP), Economic Injury Disaster Loans (EIDL), and Emergency EIDL grants, and emergency supplemental appropriations for the Department of Health and Human Services (HHS) and Small Business Administration (SBA). The Congressional Budget Office estimates that the act will result in $321.3 billion in additional direct spending for the PPP, and $162.1 billion in additional discretionary spending, including $50 billion for EIDL and $10 billion for Emergency EIDL grants. H.R. 266 was first passed by the House on January 11, 2019, as an FY2020 annual appropriations measure unrelated to COVID-19. The bill was read twice and placed on the Senate Legislative Calendar on January 15, 2019, but the Senate did not act on the original legislation. The Senate agreed to take up the measure on April 21, 2020. The bill was laid before the Senate by unanimous consent and an amendment in the nature of a substitute replaced the original text with that of the \"Paycheck Protection Program and Health Care Enhancement Act.\" The Senate passed the bill the same day by voice vote. The House of Representatives took up the amended bill on April 23, 2020, suspending the rules and passing it by a vote of 388-5, with one Member voting present. The President signed the bill into law on April 24, 2020, as P.L. 116-139 . The Coronavirus Aid, Relief, and Economic Security Act ( P.L. 116-136 ; the CARES Act) established the Paycheck Protection Program (PPP), and provided it $349 billion. The PPP authorized loans with a two-year term at a 1% interest rate to small businesses and other organizations adversely affected by COVID-19. Loan payments are deferred for six months and feature loan forgiveness up to the amount borrowed under specified conditions related to the borrower's retention of employees and employee wages. The SBA started accepting PPP loan applications on April 3, 2020. Because the program neared its $349 billion authorization limit, the SBA stopped accepting new PPP loan applications on April 15, 2020. Over 1.66 million loans were approved by nearly 5,000 lenders. Most of the loans (74%) were for under $150,000. The CARES Act also enhanced SBA Economic Injury Disaster Loans (EIDL) from January 31, 2020, through December 31, 2020, expanding eligibility and taking other steps, such as establishing Emergency EIDL grants of up to $10,000, to make resources more broadly and quickly available to small businesses. The Coronavirus Preparedness and Response Supplemental Appropriations Act, 2020 ( P.L. 116-123 ) had provided the SBA an additional $20 million to support EIDL. The CARES Act appropriated $10 billion for Emergency EIDL grants. The SBA also stopped accepting new COVID-19-related EIDL loan applications on April 15, 2020, because that program neared its appropriations limit for credit subsidies. COVID-19-related EIDL applications which had already been received continue to be processed on a first-come first-served basis. The SBA approved nearly 30,000 COVID-19-related EIDLs totaling nearly $5.7 billion, and 755,476 Emergency EIDL grants totaling nearly $3.3 billion. Division A of P.L. 116-139 increases the PPP authorization limit from $349 billion to $659 billion, and increases the direct appropriation in the CARES Act for the program from $349 billion to more than $670 billion to support that authorization amount. Division A of the act also: requires that no less than $30 billion of the additional PPP authorization amount be set aside for loans issued by insured depository institutions and credit unions with consolidated assets of $10 billion to $50 billion; requires that no less than $30 billion of the additional PPP authorization amount be set aside for loans issued by community financial institutions (including community development financial institutions (CDFIs), minority depository institutions, community development corporations, and SBA microloan intermediaries), and insured depository institutions and credit unions with consolidated assets less than $10 billion; and makes agricultural enterprises with not more than 500 employees eligible for EIDL and Emergency EIDL grants during the covered period (January 31, 2020, through December 31, 2020). Division B of P.L. 116-139 is a supplemental appropriations measure providing $100 billion for the Department of Health and Human Services (HHS) through the Public Health and Social Services Emergency Fund (PHSSEF) and $62 billion for the Small Business Administration ($50 billion for EIDL, $10 billion for Emergency EIDL grants, and $2.1 billion for SBA salaries and expenses). All of the supplemental appropriations are designated as being emergency requirements under the Balanced Budget and Emergency Deficit Control Act of 1985 ( P.L. 99-177 , as amended), and thus do not count against the statutory limits on discretionary spending for FY2020. Each appropriation in P.L. 116-139 , Division B, explicitly provides its resources \"to prevent, prepare for, and respond to coronavirus, domestically or internationally.\" Table 1 details the supplemental appropriations included in Division B, as well as subdivision and transfers of those appropriations outlined in P.L. 116-139 . Title I provides $100 billion in emergency supplemental appropriations to the HHS Public Health and Social Services Emergency Fund (PHSSEF), an account used in appropriations acts to provide the HHS Secretary with one-time or emergency funding, as well as annual funding for the office of the HHS Assistance Secretary for Preparedness and Response (ASPR). Of the $100 billion, $75 billion is additional funding for the HHS \"Provider Relief Fund,\" established with an initial appropriation of $100 billion in the CARES Act. These funds remain available until expended, and are to be used \"to prevent, prepare for, and respond to coronavirus, domestically or internationally, for necessary expenses to reimburse, through grants or other mechanisms, eligible health care providers for health care related expenses or lost revenues that are attributable to coronavirusâ¦.\" Both P.L. 116-139 and the CARES Act define eligible providers broadly as any that provide \"diagnoses, testing, or care for individuals with possible or actual cases of COVID-19â¦.\" HHS has made initial distributions from the Provider Relief Fund. The remaining $25 billion, also available until expended, is provided to augment national capacity for COVID-19 containment, such as expanded testing capacityâincluding supplies such as personal protective equipment (PPE)âand workforce and technical capacity for disease surveillance and contact tracing. Among other allowable uses, these funds may be used to build, purchase, renovate, or rent non-federally owned facilities. Of the $25 billion, the act requires the HHS Secretary to transfer specified amounts to HHS agencies as follows: Not less than $11 billion for states, localities, territories, tribes, tribal organizations, urban Indian health organizations, or health service providers to tribes. Of this amount, not less than $2 billion is for states, localities, and territories according to the formula for the CDC Public Health Emergency Preparedness cooperative agreement in FY2019; and not less than $4.25 billion is for the same awardees according to a formula based on relative number of cases of COVID-19. Of that $4.25 billion, not less than $750 million is for tribes, tribal organizations, urban Indian health organizations, or health service providers to tribes. Not less than $1 billion for CDC for surveillance, epidemiology, and laboratory capacity expansion; contact tracing; data systems modernization; outreach; and workforce support to expand and improve COVID-19 testing. Not less than $1.806 billion for the National Institutes of Health (NIH) as follows: not less than $306 million for the National Cancer Institute to develop, validate, improve, and implement serological testing and associated technologies for COVID-19; not less than $500 million for the National Institute of Biomedical Imaging and Bioengineering for research, development, and implementation of point-of-care and other rapid testing for COVID-19; and not less than $1 billion for the NIH Office of the Director, broadly to support the agency's research and development efforts regarding COVID-19 testing. Not less than $1 billion for the Biomedical Advanced Research and Development Authority (BARDA) for advanced research, development, manufacturing, production, and purchase of diagnostic, serologic, or other COVID-19 tests or related supplies, and other activities related to COVID-19 testing. $22 million for the Food and Drug Administration (FDA), Salaries and Expenses, for activities associated with diagnostic, serological, antigen, and other COVID-19 tests, and related administrative activities. $600 million for the Health Resources and Services Administration (HRSA) for grants under the Health Centers program, covering a broader range of facilities than was previously eligible. $225 million for HRSA for rural health clinics, using the distribution procedures developed for the Provider Relief Fund established under the CARES Act. Not more than $1 billion to cover the cost of testing for the uninsured, using the National Disaster Medical System (NDMS) Definitive Care Reimbursement Program according to the Families First Coronavirus Response Act, P.L. 116-127 . Numerous reporting requirements apply to this $25 billion appropriation. General provisions in Title I allow the HHS Secretary to transfer PHSSEF funds to HHS agencies, as specified, with attendant reporting to the appropriations committees; and require the Secretary to transfer up to $6 million to the HHS Office of Inspector General for oversight of activities funded by this act through the PHSSEF. Because Division A provides significant additional authorization, resources, and direction for SBA's PPP and EIDL programs, the Title II provisions are for the most part straightforward. $50 billion is provided for the cost of EIDL, and $10 billion for Emergency EIDL grants, to fulfil the authorization in Division A. The $2.1 billion included for SBA's Salaries and Expenses appropriation remains available until the end of FY2021, to support the agency's increased rate of operations in providing COVID-19 pandemic relief. ", "summary": "On April 23, 2020, Congress passed its fourth measure including supplemental appropriations to respond to the COVID-19 pandemic. The Paycheck Protection Program and Health Care Enhancement Act (the act; P.L. 116-139 ) includes enhancements for the Small Business Administration's Paycheck Protection Program (PPP), Economic Injury Disaster Loans (EIDL), and Emergency EIDL grants, and emergency supplemental appropriations for the Department of Health and Human Services (HHS) and Small Business Administration (SBA). The President signed the bill into law on April 24, 2020. The Congressional Budget Office estimates that the act will result in $321.3 billion in additional direct spending for the PPP, and $162.1 billion in additional discretionary spending, including $50 billion for EIDL and $10 billion for Emergency EIDL grants. This report provides a brief overview of that measure.", "document_type": "crs"}
{"report": "Economic sanctions are one foreign policy tool that can be used to potentially influence the behavior and actions of political leadership in other countries. Oil-related sanctions are one option that could be used to apply economic pressure on certain countries in order to achieve broader geopolitical and foreign policy objectives. Currently, the United States has active economic sanctions imposed on three major oil-producing and exporting countries: Iran, Russia, and Venezuela. Combined, these countries produced approximately 17.7 million barrels per day (bpd) of oil in 2018âapproximately 18% of total world oil productionâaccording to one estimate. Only a portion of these supply volumes might be directly affected by U.S. economic sanctions in the near termâpotentially ranging from 3.3 million to 4.0 million bpd from both Iran (estimated to be 2.8 million bpd) and Venezuela (estimated to range from 0.5 million to as much as 1.2 million bpd). Estimated oil production volumes affected to date have been approximately 1.7 million bpd from Iran. Venezuela oil production has likely also been affected, although accurately quantifying volumes is challenging due to monthly oil production declines that had been occurring over a period of years prior to U.S. sanctions affecting oil trade in January 2019. A sustained global petroleum supply imbalance of 1% to 2% could contribute to market conditions that could result in volatile price movements (both upward and downward) for crude oil and related petroleum products (e.g., gasoline and diesel fuel). To date, oil supply impacts related to economic sanctions have not generally resulted in significant upward price pressure for benchmark oil prices. Generally, sanctions-related supply losses have been counterbalanced by increased production and exports from the United States, Russia, and other countries; petroleum trade flow adjustments; indications of slowing global oil demand growth rates; and design elements of oil-related sanctions. Oil sanctions frameworks can include wind-down periods, requirements to consider and certify that global oil supply is adequate to compensate for supply reductions, and engagement with other oil producers before applying certain sanctions. These design elements are intended to mitigate sanctions-related market and price impacts and to build into the sanctions regime multilateral coordination and cooperation. Oil-related economic sanctions for each respective country discussed in this report differ in terms of design and potential market impacts. As a result, each framework is likely to have a different effect on oil production, trade, and potentially price levels. Generally, each sanctions framework is structured to reduceâeither immediately or in the futureâoil sales revenue to the subject country. Since 2011, sanctions targeting Iran's oil sector have aimed to eliminate the country's oil export revenue. Sanctions applied to Russia's oil sector generally target long-term, high-risk oil production projects. Venezuela sanctions imposed to date prohibit petroleum trade with the United Statesâhistorically one of the primary destinations for Venezuela's oil exportsâand have the potential to affect Venezuela's petroleum trade with other countries. Table 1 provides a general overview of current oil-sector sanctions imposed on Iran, Russia, and Venezuela. The scope of this report is to assess the possible impact of current U.S. economic sanctions on oil production in and exports from Iran, Russia, and Venezuela. For each country, this report provides general background and historical information about the oil sector, followed by an overview of each oil-related sanctions framework and a discussion of oil production, supply, and trade impacts resulting from U.S. sanctions. European Union (EU) oil sector sanctions imposed on Iran and Russia are referenced but are not discussed in detail. Selected oil market impact observationsâspecifically price impacts and trade flow adjustmentsâand policy considerations are discussed. A detailed assessment of how oil-related sanctions might have affected each target country's overall economy and how these effects may have contributed to achieving U.S. foreign policy objectives is beyond the scope of this report. Iran holds the fourth largest proven oil reserves in the worldâbehind Venezuela, Saudi Arabia, and Canadaâwith an estimated 156 billion barrels as of the end of 2018. A founding member of the Organization of the Petroleum Exporting Countries (OPEC), commercial crude oil production in Iran started in 1913 and Iran has been both an oil producer and exporter for more than a century. Iran's oil industry was nationalized in 1951 by Prime Minister (PM) Mohammed Mossadeq, who expropriated the Anglo-Iranian oil companyâtoday known as BP. Foreign policy concerns about PM Mossadeq's potential pivot toward the Soviet Union resulted in a U.S.- and British-sponsored intelligence operation that removed Mossadeq from power in 1953. Following that operation, a consortium of U.S. and European oil companies effectively took control of Iran's oil production and exports. Crude oil production in Iran was at its highest historical rate in the 1970s when it ranged between 5 million and 6 million bpd for much of the decade. Diplomatic relations between the United States and Iran in the late 1960s and for most of the 1970s were generally positive, with oil production and trade being one element of the relationship. During this period, the Shah of Iran (Iran's political leader at the time)âin an effort to increase oil revenues for military and domestic policy purposesârequested then-President Nixon to eliminate the Mandatory Oil Import Quota (MOIQ) system that limited U.S. crude oil import volumes from foreign countries. In 1969, the Shah also reportedly offered to sell the United States 1 million bpd of crude oil for 10 years at a price of $1/barrel for the United States to create a strategic oil stockpile. President Nixon declined the Shah's request and offer. As domestic U.S. oil production levels were not keeping pace with increasing U.S. oil demand, President Nixon replaced MOIQ with an import licensing fee system in April 1973. Iran was not party to the October 1973 oil embargoâinstituted by members of the Organization of Arab Petroleum Exporting Countries (OAPEC)âan event that contributed to rapidly rising petroleum prices, perceived supply shortages, and the enactment of U.S. laws to ensure domestic availability of oil supply. The oil market situation in late 1973 created an opportunity for Iran to increase oil revenue. U.S. crude oil imports from Iran more than doubled from 1973 to 1978, when imports reached approximately 550,000 bpd. However, U.S.-Iran relations changed in 1979 when the Iranian revolution culminated with the Shah abdicating, Iran becoming an Islamic republic, and Ayatollah Khomeini rising to power as Iran's supreme leader. Oil production in Iran started declining in late 1978, due to a labor strike in opposition to the Shah's policies, and the situation led to one of the largest (5.6 million bpd) and longest (nearly six months) supply disruptions in history. This supply loss contributed to one of the highest inflation-adjusted annual oil price periods on record. Sanctions imposed on Iran have been a foreign policy tool used by the United States for nearly three decades with the goal of deterring state-supported terrorism, Iran's regional influence, and its nuclear program. Iran's oil sector has been the target of multiple U.S. sanctions initiatives. For example, imports of Iranian crude oil to the United States were prohibited in 1987. Prior to the prohibition, U.S. oil buyers imported as much as 550,000 bpd from Iran. Additional elements of Iran's oil sector are also subject to sanctions, including investments in Iran's oil production; insurance for Iranian oil entities and for shipping Iranian crude oil; the sale of goods and services that support Iran's oil production; oil transportation; and oil exports. Sanctions targeting Iran's oil sector are the product of enacted laws and issued executive orders (E.O.s) that span multiple Administrations. For a brief overview of relevant oil sanctions legislation, see the text box below titled Enacted Legislation that Affect s Iran's Oil Sector: Selected Examples . This section focuses on sanctions legislation enacted in December 2011âNational Defense Authorization Act for Fiscal Year 2012 ( P.L. 112-81 )âand subsequent E.O.s designed to reduce Iran's oil export revenue. Section 1245 of the National Defense Authorization Act for Fiscal Year 2012 (FY2012 NDAA; P.L. 112-81 ) created a sanctions framework designed to motivate Iran's oil buyers to reduce purchases, with the goal of limiting Iran's oil export revenue. The core element of this framework includes financial sanctionsâprohibition on opening and accessing U.S. bank accountsâthat are to be imposed on foreign financial institutions that conduct a \"significant financial transaction\" with Iran's Central Bank or with any sanctioned Iranian bank. However, these transactions can potentially continue should affected countries comply with other elements of the sanctions framework that incentivize oil buyers to reduce imports from Iran while mitigating potential oil supply and price impacts. Other design elements of this framework include the following: (1) a 180-day wind-down period for implementation; (2) a provision that allows for financial institutions to be excepted from sanctions based on reducing Iran oil purchases; (3) a requirement that the Administration consider impacts to global oil prices and supplies; and (4) outreach to other petroleum producing countries. Sanctions do not apply to financial institutions under the jurisdiction of countries that the President determines to have \"significantly reduced\" oil purchases volumes from Iranâ significantly is not statutorily defined. SREs are valid for 180 days, and countries must continue reducing Iranian oil purchases during this period to receive a subsequent exception. The SRE design element provides the Administration with some discretion to determine the level of economic pressure to apply while considering possible global oil supply and price effects. The President is required to determineâ90 days following enactment and every 180 days thereafterâthat the price and availability of petroleum from non-Iranian producers are adequate to enable Iran's crude oil buyers to significantly reduce purchase volumes. This determination must be based on petroleum price and availability reports submitted to Congress by the Energy Information Administration (EIA) every 60 days. Oil market conditions, should an undersupply situation result in escalated prices, could motivate some degree of sanctions relief even if such an action may not be consistent with sanctions-related policy objectives. However, the term adequate is not defined in enacted sanctions legislation. Therefore, the Administration could have flexibility in determining if oil markets are adequately supplied regardless of price levels. The sanctions framework also requires the President to encourage petroleum-producing countries to increase oil supplies and to minimize sanctions-related oil availability and price impacts. U.S. State Department officials reportedly have had discussions with oil-producing countries and have indicated that other countriesâspecifically Saudi Arabia and the United Arab Emirates (UAE)âwould provide additional oil supply to compensate for reduced volumes from Iran. On July 30, 2012, President Obama issued E.O. 13622 to authorize additional Iran sanctions. The President revoked the E.O. in the course of implementing the U.S. obligations under the Iran nuclear deal, known as the Joint Comprehensive Plan of Action (JCPOA); President Trump reinstated the E.O.'s tenets on August 6, 2018, with the issuance of E.O. 13846. With respect to Iran's oil exports, E.O. 13846 strengthens the NDAA sanctions framework in two primary ways: 1. Prohibits access to the U.S. financial system for any foreign financial institution that conducts or facilitates a significant financial transaction with the National Iranian Oil Company or for the purchase of petroleum, petroleum products, or petrochemical products, and 2. Authorizes the imposition of Iran Sanctions Act ( P.L. 104-172 ) sanctions on any entity that engages in significant transactions for the purchase of petroleum, petroleum products, or petrochemical products from Iran. Financial institutions and entities subject to sanctions contained in E.O. 13846 can continue petroleum and petrochemical transactions if their country of primary jurisdiction receives an SRE (see \" Significant Reduction Exception (SRE) \" section). International negotiations with respect to Iran's nuclear development program resulted in two multilateral agreements that first relieved then waived FY2012 NDAA sanctions and revoked E.O. 13622 sanctions that target Iran's oil exports. President Trump ended U.S. participation in the agreements and reimposed Iran oil export sanctions. Following is a brief description of the oil-related aspects of the two multilateral agreements and the termination of U.S. participation. Joint Plan of Action ( JPA ) : an interim agreement in effect between January 20, 2014, and January 16, 2016, that, among other provisions, removed the requirement on Iran's oil buyers to continue reducing oil purchases to receive an SRE. Iran's oil purchasers at that time (China, India, Japan, Republic of Korea, Taiwan, and Turkey) were allowed to continue purchasing oil at the then-current average. Sanctions on insurance, transportation services, and petrochemical exports were suspended. JCPOA : implemented on January 16, 2016, when the Administration waived FY2012 NDAA Section 1245 financial sanctions and revoked E.O. 13622. These actions effectively removed secondary sanctions targeting Iran's oil exports. Buyers could resume importing unrestricted oil volumes from Iran. United States ends JCPOA participation (sanctions re imposed ) : President Trump announced on May 8, 2018, that the United States would terminate its JCPOA participation and sanctions would be re-imposed following a wind-down period (180 days for sanctions targeting Iran's oil exports). On November 5, 2018, FY2012 NDAA Section 1245 financial sanctions and petroleum, petroleum product, and petrochemical purchase sanctions were reinstated. SREs were issued to eight countries in November 2018 (for additional information see Figure 1 notes). However, SREs are no longer allowed as of May 2019. Secondary sanctions that target Iran's oil exports have resulted in a direct and measurable effect on Iran's crude oil production and on observable export volumes of crude oil and condensate. As indicated in Figure 1 , crude oil and condensate exports declined by approximately 1.2 million bpdânearly 57%âbetween December 2011 (upon enactment of the FY2012 NDAA) and July 2012. Iran's oil production volumes followed a similar trajectory. During the JPA effective period (January 2014 to January 2016), Iran's crude oil production and export volumes stabilized, as countries were no longer required to continue reducing imports to receive SREs. With the implementation of the JCPOA, sanctions affecting oil exports were waived and Iran's production and exports returned to pre-FY2012 NDAA levels. Following the United States exiting the JCPOA in May 2018, production and exports declined and then stabilized once SREs were granted to eight countries in November 2018. As of May 2, 2019, it is the Trump Administration's intent to no longer grant SREs. According to Bloomberg L.P.'s oil tanker tracking service, observable exports from Iran have declined significantly (see Figure 1 notes for background about data challenges) based on October 2019 volumes. Iran's crude oil exports to certain independent refiners in China have carried on, and some analysts expect this trade relationship to continue. Russia is one of the largest oil producers and exporters in the world. In 2018, crude oil and condensate production in Russia was larger than in any other country, at approximately 11.2 million bpd. The United States (11 million bpd) and Saudi Arabia (10.5 million bpd) were ranked second and third respectively. As of the end of 2018, Russia held the sixth largest amount of proven oil reserves with approximately 106 billion barrels. Commercial oil production in Russia and the former Soviet Union dates back to the 1870s when the first wells were drilled in Baku (today the capital of Azerbaijan). Increasing oil production and exportsâalong with oil refining to make kerosene for artificial lightingâin the late 1800s resulted in the emergence of a major competitor to the global monopoly held by U.S.-based Standard Oil at that time. The oil industry continued to grow and expand in the Russian Empire and growth continued to develop in the Soviet Union after the 1917 Bolshevik Revolution. Soviet oil policy decisions in the 1920s and 1950s resulted in depressed global oil prices that are credited with motivating two historical oil industry developments. The first was an export campaign in the 1920s that contributed to low prices and the signing of the historic Achnacarry Agreement in 1928 by multiple oil companies with the intent to restrict oil production in order to support oil prices. The second was an oil market-share campaign in the 1950s that led to lower prices and was one factor credited with motivating creation of OPEC in 1960. By 1987, the Soviet Union was the largest oil producer in the world at nearly 12.5 million bpd, more than twice the production of Saudi Arabia that year. Soviet oil production had declined to 10.3 million bpd in 1991, the year the Soviet Union was formally dissolved and the Russian Federation (Russia) established. Oil production in the Russian Federation represented approximately 90% of Soviet oil production in 1991, at 9.3 million bpd. Russia's oil production declined to just over 6 million bpd in 1996 but recovered to 10.8 million bpd by 2013. Today, oil is a major element of Russia's economy; approximately 46% of federal revenue came from the oil and gas sector in 2018. Following Russia's invasion and occupation of Ukraine's Crimea region in March 2014, President Obama declared a national emergency (E.O. 13660) with respect to Russia's actions in Ukraine. Subsequent E.O.s, Department of the Treasury directives, and enacted legislation created a sanctions framework, elements of which target Russia's oil sector. Oil sector sanctions imposed on Russia originated in E.O. 13662, which identified Russia's energy sector as an element of Russia's economy that could potentially be sanctioned. Sanctions imposed on Russia's oil sector target two general activities by prohibiting certain transactions with U.S. entities: (1) access to debt finance (Directive 2, described below), and (2) access to technology, goods, and services to support complex oil exploration and production projects (Directive 4, described below). Subsequently, the Department of the Treasury publishedâand has periodically updatedâa list (Sectoral Sanctions Identification, or SSI, list) of Russian entities that are subject to these E.O. 13662 sectoral sanctions. Directives 2 and 4 issued by the Department of the Treasury, which apply to certain Russian oil companies, describe transactions and activities that are prohibited with entities included on the SSI list. Table 2 contains a list of Russian oil companies and indicates those that are subject to Directive 2 and Directive 4 sanctions. The Ukraine Freedom Support Act of 2014 ( P.L. 113-272 ) created a framework that would allow the President to impose secondary sanctions on foreign persons/entities that make significant investmentsâas determined by the Presidentâin special Russian crude oil p rojects (i.e., projects that would extract crude oil from deepwater, Arctic offshore, and shale projects located in Russia). Enactment of the Countering Russian Influence in Europe and Eurasia Act of 2017 (CRIEEA; Title II of P.L. 115-44 , the Countering America's Adversaries Through Sanctions Act) in August 2017 codified and strengthened Directives 2 and 4, as described below. CRIEEA also modified the Ukraine Freedom Support Act to require the President to impose sanctions on persons/entities determined to have made significant investments in special Russian crude o il p rojects . Directive 2 limits the ability of Russian oil companies on the SSI list to borrow from U.S. financial institutions and other lenders. The original version of Directive 2 (July 2014) prohibited access to U.S. debt with a maturity longer than 90 days for certain companies operating in Russia's energy sector. CRIEEA modified Directive 2 to prohibit entities on the SSI list from accessing U.S. debt with a maturity longer than 60 days. Some of Russia's largest oil companies, by production volume, are subject to this directive and now have reduced access to debt capital. Limited access to financial markets can potentially result in higher borrowing costs for the affected companies and could make it difficult for these companies to finance company activities. Directive 2 had the potential to affect Russia's near-term oil production. However, according to analyst reports, Russian oil companies on the Directive 2 SSI list were able to secure alternative sources of finance by accessing, through domestic borrowing, Russia's federal financial reserves. Directive 4 prohibits the sale and transfer of goods, services, and technology from U.S. entities to Russian companies on the SSI list that would support three types of Russian oil exploration and production projects: (1) deepwater, (2) Arctic offshore, and (3) shale. The original version of Directive 4 (September 2014) stipulated that these oil sector sanctions were applicable to projects located in Russian territory or claimed maritime waters. However, CRIEEA legislation enacted in 2017 expanded the applicability of Directive 4 to include deepwater, Arctic offshore, or shale projects in any locationâinside or outside Russiaâthat are 33% or more owned or are subject to voting control by a sanctioned Russian entity. Directive 4 sanctions target complex and challenging oil exploration and production projects that are likely part of Russia's long-term oil resource development plans. In conjunction with Directive 4 sanctions, the U.S. Department of Commerce's Bureau of Industry and Security (BIS) announced export restrictions on Russia in July 2014 to prohibit the export of certain items that may be used for deepwater, Arctic offshore, and shale projects. BIS's announcement of the implementation of these export restrictions indicated the long-term nature of the energy technology sanctions: \"While these sanctions do not target or interfere with the current supply of energy from Russia or prevent Russian companies from selling oil and gas to any country, they make it difficult for Russia to develop long-term, technically challenging future projects.\" Section 4(b) of the Ukraine Freedom Support Act of 2014 ( P.L. 113-272 ) created a framework for secondary sanctions that could be imposed on non-U.S. persons/entities that invest in deepwater, Arctic offshore, and shale projects that extract crude oilâspecial Russian crude oil projectsâlocated in Russia. The secondary sanctions framework includes a menu of nine sanctions. As amended by CRIEEA, should the President determine that foreign persons or entities have made a significant investment âa term not defined in enacted legislationâin certain Russian crude oil projects, the President is required to impose at least three of the nine sanctions on those foreign persons/entities. To date, secondary sanctions related to investments in these types of Russian crude oil projects have not been imposed. Oil production in Russia has increased since U.S. oil sector sanctions were first imposed in July 2014. Further, this increase occurred during a period of rapidly declining oil prices and Russia's participation in an oil production agreement with OPEC and other non-OPEC oil-producing countries (collectively referred to as OPEC+). Under the current sanctions framework, Russia could continue increasing oil production levels in the near term. However, future oil production in Russia is somewhat uncertain due in part to potential impacts that might result from Directive 2 and Directive 4 sanctions, as well as the potential for secondary sanctions that aim to limit foreign investment in certain Russian crude oil production projects. On a monthly basis, Russian oil production increased by approximately 1 million bpd between July 2014 (10.4 million bpd) and December 2018 (11.45 million bpd), as illustrated in Figure 2 . Annual oil production levels in Russia have been trending up from 2014 to 2018. Monthly oil production levels have declined since December 2018 to 11.1 million bpd as of May 2019. Two factors that likely contributed to this observed decline are (1) implementation of a voluntary OPEC+ oil production agreement and (2) oil contamination in Russia's Druzhba pipeline that temporarily disrupted oil shipments to Europe. Russian oil production increased during periods of low and declining oil prices (see Figure 2 ) following the imposition of oil sector sanctions. This upward oil production trend during challenging market and price conditions is a result of several factors, including Russian companies securing alternative sources of finance, currency devaluation, and Russia's oil tax and export duty policy. Directive 2 financial sanctionsâin combination with similar EU financial sanctions âimposed on certain Russian oil companies required those firms to secure alternative sources of capital to manage corporate finance activities. Directive 2 sanctions had the potential to result in financial stress for Russian oil companies on the SSI list and potentially affect short-term oil production levels. However, reports indicate that sanctioned Russian oil companies were able to use Russia's international currency reservesâaccumulated, in part, when oil prices were in the $100 per barrel range (2011-2014)âas an alternative source of finance. Russia's financial reserves enabled companies like Rosneft, a state-controlled Russian oil company, to borrow money from the domestic bond market to manage debt obligations and fund business operations. Additionally, Rosneft has sold minority ownership positions to Chinese and Indian companies as a means of funding oil production activities. Finally, Rosneft has raised cash through equity sales and sold a 19.5% ownership position to the Qatari Investment Authority and Glencore for $11.3 billion in 2016. Following the imposition of sanctions in mid-2014, and as oil prices were declining rapidly, the Russian ruble began to lose value relative to the U.S. dollar. In November 2014, Russia's Central Bank announced it would limit its exchange rate interventions and allow the ruble exchange rate to be determined by the market. Weakening of the ruble relative to the dollarâeach dollar being worth more rublesâcontinued. In June 2014, one U.S. dollar could be exchanged for approximately 34 rubles. This exchange rate reached 59 in December 2014 and was as high as 75 in January 2016. This currency devaluation, while arguably negative for the overall Russian economy, actually supported profitability and cash flow for Russian oil companies. Russian oil export sales are primarily denominated in dollars, and most Russian oil company expenses are denominated in rubles. At a given oil price, currency devaluation increases the amount of rubles received for dollar-denominated oil sales. However, the exchange rate does not directly affect ruble-denominated expenses. As a result, ruble-denominated profitability can be supported even when oil prices are relatively low. These factors, along with downward price pressure on oilfield equipment and service contractors following oil price declines in 2014 through early 2016, contributed to the general upward trend of Russia's oil production while oil prices steeply declined. Russia's oil tax policy motivates oil companies operating in the country to maintain and increase oil production, even when benchmark oil prices reach levels as low as $20 per barrel (/b). Russia's oil tax framework currently consists of two primary elements: (1) mineral extraction tax (MET), and (2) export duty (ED). MET and ED payments are linked to benchmark oil prices. Both are calculated using formulasâmodified periodically to incentivize oil production from certain locationsâthat adjust the tax and duty based on the price of Urals crude oil, Russia's oil price benchmark. The effect of this tax and duty structure is that the Russian government assumes most of the financial risk from low oil prices and receives most of the benefits from high oil prices. Based on analysis of MET and ED base formulas, government tax and duty receipts can be zero at a $10/b oil price and more than $45/b when oil prices reach $70/b. Oil company cash flows also fluctuate but to a much lesser extent and are insulated to some degree from oil price fluctuations. As a result, Russian oil companies are motivated to maintain and increase oil production with limited consideration of the market price for crude oil. Russia has also started implementation of its \"tax maneuver\" that will gradually eliminate the ED and increase the MET by 2024 for crude oil production. Russia's ability to maintain and possibly increase oil production beyond 2019, should the sector continue to be subject to U.S. and EU sanctions, is uncertain. The International Energy Agency projects that oil production in Russia is likely to continue increasing through 2021 (11.8 million bpd including crude oil, condensate, and natural gas liquids) and then decline slightly by 2024 (11.6 million bpd). Russian oil production post-2024 is less certain, with some forecasts indicating that Russian oil companies may need to develop new resources in order to maintain oil production levels in the 11 million bpd range. Exploration and production sanctions (Directive 4) imposed in 2014 were intended to affect future Russian oil production. Some specific projects have been affected by U.S. and EU oil sector sanctions. For example, Exxon has withdrawn from joint venture projects with Rosneft that would develop oil resources in deepwater, Arctic offshore, and shale locations. Additionally, certain European oil company joint venture projects have been affected by oil sector sanctions. French oil company Total sold its ownership stake in a shale joint venture project with Lukoil. According to the Energy Information Administration (EIA), large shale oil resources are present in Russia. Several U.S. and European oil companies had been participating in joint venture Russian shale oil projects prior to the 2014 sanctions. However, development of these projects has since slowed. Should Directive 4 and similar EU sanctions continue to be imposed, sustaining oil production growth in Russia will likely be a function, largely, of two factors: (1) the ability of Russian oil companies to develop or acquire oil production technology needed to produce resources in deepwater, Arctic offshore, and shale formations; and (2) the successful execution of exploration and development strategies that target oil production in areas outside the scope of sectoral sanctions (e.g., tight oil). Following the imposition of Directive 4 sanctions in 2014, Russia started developing plans to reduce its reliance on imports of oil production equipment. Furthermore, Russian oil companies reportedly have been increasing acquisition of oilfield equipment from Chinese suppliers. Venezuela holds the largest proven oil reserves in the world, estimated at 303 billion barrels as of the end of 2018. A founding member of OPEC, Venezuela has produced oil commercially since 1914. U.S. oil companies began seeking agreementsâalso referred to as concessionsâto explore for and produce oil in Venezuela as early as 1919. Venezuela was not a participant in the 1973 Organization of Arab Petroleum Exporting Countries embargo of oil shipments to the United States and other countries. However in 1976, consistent with developments in other oil-producing countries during the 1970s, Venezuela nationalized its oil industry and created Petroleos de Venezuela S.A. (PdVSA). U.S. oil companies, such as Exxon, reduced investments in the country leading up to nationalization but continued to be active in Venezuela in a limited service-based role following nationalization. Oil production in Venezuela was approximately 3.7 million bpd in 1970. Production declined 2.1 million bpd (54%) from 1971 to 1988 to reach 1.6 million bpd. In the 1990s, PdVSA embarked on a program referred to as the apertura petrolera âor oil opening. As part of this program, international oil companiesâincluding U.S.-firms Chevron, Exxon, and Conocoâwere allowed to either control certain oil field operations or establish majority-owned oil production joint ventures with PdVSA. Oil production in Venezuela increased to approximately 3.4 million bpd by 1998. During his campaign, former Venezuelan President Hugo ChÃ¡vezâelected in 1998âthreatened to reverse the apertura program. Subsequently, President ChÃ¡vez enacted the Hydrocarbons Law of 2001, which restructured Venezuela's petroleum sector by requiring PdVSA to have majority ownership of future oil developments and raising royalty payments on existing projects to the Venezuelan government. Throughout the ChÃ¡vez presidency, oil companies operating in Venezuela were subject to periodic increases in royalty rates and taxes. These additional payment requirements reduced the financial attractiveness of investing in Venezuela's oil sector. In 2007, the ChÃ¡vez government enacted a law that required existing oil joint ventures to convert into new entities that would be majority-owned by PdVSA. Some companies (e.g., Chevron) complied with the new requirement. Other companies (e.g., Exxon and Conoco) ceased operations and sued PdVSA for damages resulting from unilateral changes to contractual agreements. Oil production in Venezuela trended a bit lower but was relatively stable from 2007 through 2013, in the range of 2.5 million bpd. Following the death of ChÃ¡vez in 2013, NicolÃ¡s Maduro was elected president of Venezuela. A series of antidemocratic actions and human rights violations by the Maduro government resulted in sanctions legislation and executive actions by the United States. In 2017, President Trump declared a national emergency in E.O. 13808 and the Administration imposed financial sanctions on PdVSA, including limiting PdVSA's access to U.S. debt finance. PdVSA is also prohibited from receiving dividends and cash distributions from its U.S.-based Citgo refining subsidiary. These limitations made it more difficult for PdVSA to purchase oil-related services and oil production equipment. With the overall U.S. objective to pressure President Maduro to transfer government control, the United States recognized Juan GuaidÃ³ as interim president of Venezuela and imposed sanctions in January 2019 aimed at reducing Venezuela's oil revenues. These sanctions effectively terminate U.S.-Venezuela petroleum trade and potentially make it difficult for PdVSA to sell crude oil to and obtain petroleum products from non-U.S. entities. U.S. sanctions targeting Venezuela's oil trade are a function of PdVSA being designated to be subject to U.S. sanctions. This designation prohibits U.S. companies from engaging in transactions with PdVSA, including petroleum trade, oilfield service operations, and oil production operations in Venezuela. To date, Congress has not enacted legislation that specifies and requires oil sanctions be imposed on Venezuela. Rather, the sanctions framework is a result of E.O.s issued under national emergency authorities, and Treasury designations and general licenses (GLs) based on that emergency that allow for the wind down or continuation of certain activitiesâsee list of actions below. E.O. 13850 (November 1, 2018): authorized prohibiting U.S. persons from engaging in certain transactions with any person determined by the Secretary of the Treasury to have supported \"deceptive practices or corruption\" involving the Government of Venezuela. E.O. 13857 (January 25, 2019): amended the \"Government of Venezuela\" definition in E.O. 13850 to include PdVSA. Treasury designates PdVSA (January 28, 2019): the Secretary of the Treasury determined that persons operating in Venezuela's oil sector are subject to sanctions. PdVSA added to the Specifically Designated Nationals (SDN) list. GLs issued (January 28, 2019 and subsequent revisions): Office of Foreign Asset Control (OFAC) GLs authorize certain transactions and activities with PdVSA for certain periods, including oil purchases (wind down periods) and oil production operations (continuation). E.O. 13884 (August 5, 2019): blocks property and interests in property located in the United States for persons/entities determined to have assisted PdVSA and the Government of Venezuela. The Secretary of the Treasury's determination and designation affects several areas in which U.S. companies have business interests (e.g., debt and financial transactions, oil field services, and oil production activities) and effectively terminates U.S.-Venezuela petroleum (crude oil and petroleum products) trade. GL 12 allowed U.S. companies to continue purchasing and importing crude oil and petroleum products from PdVSA until April 28, 2019. However, any payment made for petroleum imported from PdVSA during the 90-day wind-down period must have been deposited in a U.S.-based blocked account. This requirement likely resulted in most of these transactions ending immediately, as PdVSA would have been motivated to seek alternative buyers. Some GLs explicitly stated that exporting diluentsâtypically light crude oil, condensate, or naphtha that is blended with Venezuelan heavy crude oil to facilitate transportation and processing âfrom the United States to Venezuela was prohibited immediately. Chevronâcurrently participating in oil production joint ventures with PdVSAâand four oil service companies (Halliburton, Schlumberger, Baker Hughes, and Weatherford International) have been granted a GL to continue operating in Venezuela. This GL has been extended multiple times since January 2019 and is currently set to expire on April 22, 2020. Treasury guidance issued in January 2019 and E.O. 13884 create the potential for imposing sanctions on non-U.S. entities that transact with PdVSA. Following E.O. 13857, OFAC-issued Frequently Asked Questions (FAQs, #657) indicated that petroleum purchases by non-U.S. entities involving \"any other U.S. nexus (e.g., transactions involving the U.S. financial system or U.S. commodity brokers)\" are prohibited following the 90-day wind-down period. Most oil transactions are denominated in U.S. dollars and this guidance may create some difficulties for PdVSA to secure alternative buyers for crude oil volumes that were previously destined for the United States. E.O. 13884 provides for the blocking of property and interests in property in the United States for persons and entities determined by the Secretary of the Treasury to have materially assisted âterm not defined in the E.O.âPdVSA. This potential for sanctions on entities that transact with PdVSA, and have interests in property within U.S. jurisdiction, may further complicate PdVSA's efforts to sell crude oil to non-U.S. buyers and acquire petroleum products from alternative suppliers. Following the 2017 imposition of PdVSA financial sanctions, Venezuela's monthly oil production declined by approximately 50%âbetween August 2017 and January 2019. Venezuelan oil production had been trending downward in prior years due to aging oil infrastructure and insufficient investment in, and maintenance of, oil production assets. As indicated in Figure 3 , crude oil production declined from approximately 2.8 million bpd in January of 2011 to approximately 1.9 million bpd in August 2017âwhen sanctions were imposed on PdVSA. U.S. imports of Venezuelan crude oil also declined by nearly 50%, on a monthly basis, during this period. Sanctions imposed on PdVSA in 2017 made it difficult for the company to access financial resources from debt markets and to receive cash distributions from PDV HoldingâPdVSA's U.S.-based subsidiary that owns Citgo, an oil refining and marketing company. This limitation likely created some operational difficulties for PdVSA with respect to short-term credit that might be needed to pay for oil-related services and acquire oil production and maintenance equipment from U.S. suppliers. Oil production data illustrated in Figure 3 indicate that the production decline accelerated following the 2017 financial sanctions. However, it is difficult to attribute specific production volume declines directly to these sanctions since production had been trending lower since 2014. Oil production continued declining and reached approximately 1 million bpd in January 2019, when Treasury's PdVSA determination, designation, and GLs took effect (see Figure 3 ). U.S. imports of Venezuelan crude oil declined 50% over a one-month period between January 2019 and February 2019, and consistent with the pressure applied under sanctions, have since been reduced to zero. Prohibiting petroleum trade between the two countries results in a constraint in the global oil logistics system that can potentially resolve itself as transportation modes, trade routes, and transactions adjust to the sanctions-related constraint. PdVSA has sought alternative buyers such as India and China, countries that historically have been two of the largest destinations for Venezuelan crude oil (see Figure 8 in the \" Trade Flow Adjustments \"). Ship-tracking information indicates that Venezuela's crude oil exports to India and China increased 49% and 34% respectively between January 2019 and February 2019. However, export volumes to these countries in February 2019 were in the range of export volumes that have been observed since 2017. Although PdVSA sanctions do not explicitly prohibit non-U.S. entities from purchasing crude oil and petroleum products from Venezuela, these sanctions prohibit transactions that occur on or after April 28, 2019, that involve the U.S. financial system. Furthermore, E.O. 13884 provides Treasury with discretion to take action against foreign persons/entities that assist PdVSA. These sanctions framework elements may make it difficult for PdVSA to locate alternative buyers for crude oil barrels previously destined for the United States. Sanctions-related oil supply losses and trade constraints have had an impact on oil markets. These impacts have been observed in the form of Iran and Venezuela supply reductions, as discussed above. Impacts have also been reflected in price relationships for specific crude oil types and adaptive changes to trade flow patterns. In terms of benchmark prices (i.e., West Texas Intermediate and Brent futures contracts that are often quoted in the media), potential price escalation that might be expected from Iran and Venezuela supply reductions appear to have been averted to date by an increase in oil production in other countries, trade flow adjustments, and indications of slowing oil demand growth rates. Higher oil production and export volumes from the United States, Russia, and other oil-producing and exporting countries have contributed toward mitigating potential upward price pressure. Potential effects on oil and petroleum product (e.g., gasoline, diesel fuel, and aviation fuel) prices have been an explicit and implied consideration for sanctions that impact global oil supply and trade. Enacted sanctions legislation targeting Iran's oil exports requires the Administration to consider and certify that the world oil market is adequately supplied when imposing sanctions and to coordinate with other oil-producing countries to minimize price impacts (see \" Sanctions Framework Targeting Iran's Oil Exports \" and subsequent discussion). Additional policy design elements, such as wind-down periods, provide some time for markets to adjust for sanction-related trade constraints. These design elements serve to minimize potential price increases to oil buyers and petroleum product consumers. At the same time, existing oil-related sanctions policy does not include considerations for possible oil market oversupplyâa circumstance that could contribute to market conditions that could result in sharply lower oil pricesâshould certain sanctions be relieved, waived, or terminated. While such an outcome may be a temporary benefit to U.S. petroleum consumers, a severe oil price decline over a sustained period could have a negative impact on U.S. oil exploration, production, and exports. This topic is discussed further in the \" Policy Considerations \" section. Oil prices that receive the most visibility are front month benchmark futures prices that are regularly reported in the news media. Benchmark prices represent the value of crude oil with certain quality characteristics at a specific location. Buyers and sellers use benchmark prices to establish a baseline oil price that is adjusted for various parameters such as quality differences and transportation costs (e.g., maritime, rail, and pipeline). Brent crude oil, a light/sweet crude oil that represents the price of North Sea (located between the United Kingdom, Norway, and Denmark) crude oil cargoes loaded on to shipping vessels, is one common benchmark price that is generally considered a proxy for global prices. As indicated in Figure 4 , Brent prices in August 2019 were more than 40% lower than in December 2011, when legislation targeting Iran oil exports was enacted. However, this macro-level pricing behavior does not suggest that oil sanctions imposed since 2011 have contributed to lower prices. Rather, benchmark prices generally reflect near-term expectations of global oil supplyâpotentially affected by oil-related sanctionsâand demand balances that quickly can change due to unplanned production outages, economic and oil demand growth forecasts, supply growth in certain countries, OPEC oil production decisions, and other physical and financial market variables. Due to the different factors contributing to benchmark price directional movements, it is difficult to attribute any actual price change to a sanctions event that either reduced supply or allowed curtailed oil volumes to return. However, there was at least one period when uncertainty about sanctions targeting Iran's oil exports arguably contributed to temporary market oversupply and an oil price decline. When the Trump Administration announced in May 2018 that the United States would exit the JCPOA, general market expectations were that the Administration would not grant SREs to countries that were importing crude oil from Iran. In response to this expectation, Saudi Arabia increased its oil production by approximately 1 million bpd between May 2018 and November 2018. Other producers, including Russia, also increased production over this period. However, the Administration granted SREs to eight countries in November 2018. A temporary oversupply resulted and arguably contributed to the Brent benchmark price declining by more than $20 per barrel between November 5, 2018, and December 24, 2018. Media reports indicate that the SREs created an oversupplied market condition that required Saudi Arabia, Russia, and other OPEC+ members to manage. Petroleum sanctions imposed on Venezuela prohibit petroleum trade with the United States. The largest element of the U.S.-Venezuela petroleum trade relationship consisted of U.S. imports of Venezuelan crude oil (approximately 500,000 bpd in January 2019). A significant portion of these imports was classified as heavy/sour, indicating the crude oil's gravity and sulfur content. When Venezuela petroleum trade sanctions were announced in January 2019, U.S. refiners began seeking alternative suppliers during the 90-day wind-down period. The resulting price impact was an increase in prices for medium and heavy crude oils relative to light/sweet crude and a narrowing of the price differential between these crude oil types (see Figure 5 ). As indicated in Figure 5 , the Louisiana Light Sweet (LLS) to Mars spot price differential has been negative on certain days in 2019 following the prohibition of U.S.-Venezuela petroleum trade in January. Lower quality Mars crude oil was temporarily more expensive than LLS crude oil. While this is not the first time this differential has been negativeâthe LLS/Mars price differential was also negative on certain days in 2009 and 2011âprice signals in 2019 are indicative of the oil logistics system adjusting to a sanctions-related trade constraint. U.S. refiners that previously purchased heavy crude oil from Venezuela were required to source substitute crude oil from other suppliers (e.g., Colombia, Canada, Iraq, and Saudi Arabia), modify refinery operations to process other crude oil types, or a combination of both. Operating margins for U.S. refiners that are optimally configured to process heavy/sour crude oil could be adversely affected by a persistently narrow or negative light/heavy price differential. Sanctions imposed on Iran and Venezuela have resulted in oil export and trade constraints for which the global oil logistics system has had to adjust. For example, Iran's oil buyers have sourced oil from alternative suppliers, and some U.S. refiners have located alternative supplies to replace crude oil previously imported from Venezuela. The United States, Russia, Saudi Arabia, and other countries have provided alternative oil supplies to compensate for sanctions-related oil supply constraints. Crude oil exports from the United States have contributed to \"adequate\" global oil supplyâa statutory requirement of the Iran oil export sanctions frameworkâthat has enabled the Administration to pursue an objective of reducing Iran's oil exports to zero. Growth in U.S. crude oil exports has been enabled by increasing U.S. oil production, the 2015 repeal of a 40-year crude oil export prohibition, and global oil benchmark price differentials that financially motivate crude oil exports. Monthly U.S. crude oil export volumes have been as high as 3 million bpd in 2019. South Korea, following a U.S. policy decision to exit the JCPOA, provides an example of how U.S. crude oil exports provided an alternative source of oil supply as the country reduced imports from Iran (see Figure 6 ). As indicated in Figure 6 , South Korea imports of Iranian crude oil declined to zero following the Trump Administration's May 2018 decision to exit the JCPOA in expectation that no SREs would be granted. At the same time, imports of U.S. crude oil to South Korea immediately increased and had more than quadrupled, month-over-month, by December 2018. China's oil imports provide another example of how oil trade flows have adjusted to sanctions-related constraints. As illustrated in Figure 7 , imports of Iranian crude oil to China began to decline following the U.S. JCPOA exitâat a relatively slower pace than South Korea. As imports from Iran began to decline, imports from Saudi Arabia and Russia increased as refineries in China sought alternative oil supplies. China imports of U.S. crude oil declined to as low as zero (March 2019)âlikely a result of U.S/China trade negotiationsâfollowing the JCPOA exit but have increased since. In September 2019, China imposed a 5% import tariff on U.S. crude oil, which couldâin addition to crude oil quality considerations (see Figure 7 notes)âreduce incentives for refineries in China to increase U.S. crude oil purchases as an alternative to Iranian supplies. Sanctions imposed on PdVSA have effectively eliminated petroleum trade between the United States and Venezuela. In response to this trade constraint, PdVSA has sought alternative buyers for crude oil that was previously destined for the United States and has sought alternative suppliers of light crude oil and other diluents previously supplied by U.S. exporters. As indicated in Figure 8 , Venezuela crude oil exports to the United States immediately stopped following the January 2019 designation of PdVSA as a sanctioned entity. To date, crude oil exports to China and India have remained at levels similar to those observed since 2017. However, oil exports to countries categorized as \"other\" have trended up since January 2019. Potential secondary sanctions on entities that transact with PdVSA using the U.S. financial system, as well as entities determined to have materially supported the government of Venezuela, could motivate non-U.S. entities to reduce or eliminate purchases of Venezuelan crude oil at some point in the future. PdVSA has also been sourcing diluent products from other suppliers. U.S. diluent exports to Venezuela were prohibited immediately in January 2019, with no wind-down period. According to trade reports, PdVSA has sourced diluents from Russia following the imposition of U.S. sanctions. However, total Venezuela diluent imports have reportedly been lower compared with import levels prior to January 2019. Lower diluent imports could be a leading indicator for lower crude oil production due to blending needs for certain Venezuelan crude oil types. Sanctions imposed on Iran, Russia, and Venezuela have affected global oil markets, prices, and trade flows. As U.S. foreign policy objectives toward these countries evolve, sanctions relief, increased sanctions pressure, or both may have additional impacts on supply, prices, and potentially the U.S. oil production sector. Regarding Iran, options for additional sanctions that might affect Iran's oil sector appear to be limited as the current framework aims to eliminate Iranian oil exports. Should sanctions relief be provided to Iran, such an action could contribute to a market condition that could result in lower oil pricesâactual price levels would depend on market conditions at such a timeâand could adversely affect U.S. oil production and exports. Regarding Russia, some Members of Congress have called for additional sanctions, and several bills have been introduced in the 116 th Congress with certain provisions that could affect Russia's oil sector. Finally, the Administration has continued to strengthen oil-related sanctions on Venezuela through the use of E.O.s and administrative actions. Legislation introduced in the 116 th Congress would codify some of these sanctions. Impacts to oil supply and the potential for high oil prices are explicit considerations for economic sanctions that affect Iran's oil trade. Iran oil trade sanctions are the most stringent of the three frameworks discussed in this report. This framework includes design elements that require a periodic assessment of global oil supply adequacy when sanctions are applied and maintained (see \" Sanctions Framework Targeting Iran's Oil Exports \" and subsequent discussion). However, the framework does not include provisions to assess the potential for global oil market oversupply should these sanctions be relieved, waived, or eliminated. Depending on oil market conditions (i.e., supply and demand balances) at the time of potential sanctions relief, the immediate reentry of 1 million to 2 million bpd of Iranian supply could contribute to a market condition that could result in downward oil price pressure that could range from moderate to severe. Iran's oil minister has indicated that, should U.S. oil export sanctions be removed, oil production and exports could return to pre-sanctions levels in as little as three days. Although gasoline and diesel fuel consumers might welcome this result, oil producers could encounter challenging business and financial conditions should oil prices decline to, and be sustained at, extremely low levels. In 2018, total petroleum production (crude oil, condensate, and natural gas liquids) in the United States was larger than in any other country (Saudi Arabia and Russia ranked second and third, respectively). Low oil prices, depending on the actual price level and its duration, could contribute to reductions in both U.S. oil production growth and actual production levels, and could contribute to challenging business conditions for this sector of the U.S. economy. Historically, oil producers have generally relied on OPEC to attempt to manage oil supply and demand imbalances. However, as recently as 2014, OPECâeffectively led by Saudi Arabiaâsometimes has elected not to adjust production levels when oil markets are oversupplied. Results from such decisions have included rapidly declining oil prices, financial strain on some U.S. oil producers, lower U.S. crude oil production, and proposed legislation to investigate OPEC anticompetitive practices because prices were too low. Subsequently, OPEC, along with Russia and other non-OPEC countries, entered into a voluntary production agreement in December 2016 to address market oversupply and low oil prices. As prices were rising, the No Oil Producing and Exporting Cartels (NOPEC) Act was introduced with the goal of reducing and moderating oil prices that were deemed too high. The United States' ongoing position as the world's largest petroleum consumer is now coupled with being one of the largest and fastest growing oil producers. As a result, economic sensitivity to oil price levels has been rebalanced to reflect the interests of both consumers and producers. Introduced legislation is indicative of this balance. Should oil export sanctions on Iran be relieved or eliminated, the current sanctions framework would require the market to adjust to additional Iranian barrels that quickly could reenter the market. Market adjustments could take the form of lower prices, OPEC+ production restraint, or both. Depending on market conditions at such a time and the volume of Iranian oil that reenters, global benchmark oil prices could experience downward pressure that could range from moderate to severe. Extremely low oil prices could possibly have a negative impact on all oil producers, including U.S. companies. Based on recent history, whether or not OPEC, along with other OPEC+ countries, might adjust production levels to accommodate additional Iranian barrels is uncertain. One possible option to address such an outcome, should this potential situation become a concern, may be to encourage, or perhaps require, consideration of oil market conditions and communication with other oil producers as a means to reduce downside price risk that might result from sanctions relief. Much of the congressional interest in additional economic sanctions directed toward Russia includes introduced legislation that would impose sanctions on various elements of Russia's energy sector, including oil production. The current Russia oil-sector sanctions framework has not affected near-term oil production but may affect future oil production. Comparing this near-term outcome with the measurable impacts of sanctions targeting Iran's oil exports, it might be of interest to explore the potential applicability of the Iran oil export sanctions framework to Russia. The size of Russia's and Iran's oil production (approximately 11 million bpd currently and 4 million bpd prior to oil export sanctions, respectively) is one consideration. Two additional considerations (discussed below) are Russia's pipeline integration with Europe and U.S. institutional investor ownership of certain Russian oil companies. Transneft, Russia's state-controlled oil pipeline company that is on the SSI list, transports approximately 83% of crude oil produced in Russia. One element of the Transneft pipeline system is the Druzhba (Friendship) pipeline network that supplies Russian crude oil to several European refineries, many of which are optimally configured to process Russian crude oil. A sanctions frameworkâsuch as the one currently structured for Iranâthat might require oil buyers to significantly reduce oil purchases from Russia could be difficult for some refiners due to pipeline logistics and access to alternative suppliers. Unlike Iran's crude oil buyers that can access alternative suppliers through easily-adaptable maritime trade, accessing and configuring pipeline infrastructure to source non-Russian supplies is a more complicated and potentially difficult endeavor. Such logistical constraints introduce complexities when considering the possibility of applying the Iran oil trade sanctions framework to Russia's oil sector. Russia's oil sector is different compared with Iran's in that U.S. institutional investors have ownership positions in some of Russia's major oil companies. Banks, U.S. states, pension funds, and insurance companies have minority investment positions in companies such as Rosneft and Lukoil, which are on the SSI list. Sanctions that affect these companies, and that aim to reduce Russia's oil production and exports, could negatively affect the value of Russian oil companies and investments held by U.S. investors and their clients. A number of congressional concerns about Russia's influence in Europe, interference in U.S. elections, and other activities have resulted in legislation introduced in the 116 th Congress that, among other things, would impose additional sanctions targeting Russia's energy sector. Some of the proposed bills that could affect Russia's oil sector are listed below. As originally introduced, the bill would have required mandatory sanctions on persons/entities that invest inâbased on certain investment level thresholdsâor support Russian energy export pipelines, including modernization and repair. Mandatory sanctions under this bill could include oil pipelines. Transneft, Russia's oil pipeline monopoly controlled by the Kremlin, transports 83% of oil produced in Russia. Transneft's pipeline system is used to transport crude oil to shipping ports and to export oil to refineries in European countries and in China. To the extent that the possibility of sanctions might reduce pipeline development and maintenance activities for Russia's oil pipeline network, this could affect oil flows and oil prices for certain European refineries that may not have easily accessible alternatives to Russian crude oil. Provisions related to export pipeline sanctions were removed from the bill when it was reported out of the Committee on Foreign Relations in December 2019. The bill would prohibit any \"new investment\"âto be defined by the President after enactmentâin a Russian energy company or in Russia's energy sector, including oil production. Investments made in the United States or by a U.S. person/entity would be prohibited. The bill would require the President to impose financial sanctions on certain property owned by any foreign firm that makes a new investment in Russia's energy sector or in a Russian energy company (i.e., secondary sanctions). As reported by the Committee on Foreign Relations, the bill would require sanctions to be imposed on individuals/entities that invest in energy projects outside of Russia that are supported by Russian-owned or parastatal entities. The bill would also require the imposition of sanctions on any person/entity that sells, leases, or provides goods, services, technology, financing, or support for any crude oil development in the Russian Federationânot just for deepwater, Arctic offshore, and shale developments currently included in the existing sanctions framework. Sanctions affecting Venezuela's oil sector prohibit U.S. entities from transacting with PdVSA and provide a potential pathway for the Administration to sanction non-U.S. entities that transact with PdVSA and support the government of Venezuela. Petroleum trade between the United States and Venezuela has been eliminated. To date, however, enforcement actions related to Venezuela oil sector sanctions that could be imposed on non-U.S. entities have largely targeted companies and shipping vessels that have transported oil to Cuba. Venezuela's crude oil exports have continued since U.S. sanctions were imposed in January 2019, with India and China being two of the largest destinations. Trade reports indicate that much of Venezuela's oil exports are being managed by a Rosneft trading office. Rosneft has also provided PdVSA with diluent cargos as an alternative supplier to U.S. exporters and the company participates in multiple joint venture oil production projects in Venezuela. Whether or not these activities violate the U.S. sanctions framework, and are potentially subject to an enforcement action, is subject to a determination made by the Administration. Rosneft has argued that oil-trading with PdVSA is not a sanctions violation. To date, no sanctions enforcement action related to Rosneft transactions with PdVSA has been taken. Legislation enacted in December 2019 ( P.L. 116-94 ) includes provisions that require the Administration to engage with other countries and to coordinate an international effort to impose sanctions on the Maduro government. P.L. 116-94 also includes sections that express concern about PdVSA transactions with Rosneftâprimarily related to a Rosneft loan to PdVSA collateralized by 49% ownership of PdVSA's U.S.-based Citgo refinery and marketing company. In some cases, U.S. economic sanctions that target oil sectors in Iran, Russia, and Venezuela have observably affected oil markets in several ways, including reductions in supply, changes in price relationships, and adjustments to trade flows. Oil-related sanctions frameworks include design elements that aim to minimize upward price pressure that might result from the imposition of sanctions. However, design elements that consider possible oil market impacts in the event of oil-related sanctions relief or terminationâthat could contribute to market oversupply and downward price pressureâare not included in current oil-related sanctions frameworks. Arguably, potential sanctions-related price escalation has been counterbalanced by increased global supplies, lower global demand growth rate expectations, and market adjustments in response to oil supply and trade constraints. Should oil market conditions change to a persistent undersupply condition and benchmark prices escalate to levels deemed too high for U.S. consumers, sanctions relief is one available policy option that could possibly be considered to increase oil supply with the goal of rebalancing markets and moderating price levels; however, such an action could potentially conflict with broader foreign policy objectives.", "summary": "Economic sanctions imposed by the United Statesâthrough enacted legislation and executive actionâon Iran, Russia, and Venezuela aim to pressure the ruling governments to change their behavior and policies. Currently, these sanctions aim to either eliminate (Iran) or restrict (Venezuela) crude oil trade of as much as 3.3 million to 4.0 million barrels per day (bpd), roughly 3%-4% of global petroleum supply. Estimated oil production volumes affected to date have been approximately 1.7 million bpd from Iran. Venezuela oil production has also likely been affected, although accurately quantifying volumes is difficult due to monthly oil production declines over a period of years prior to U.S. sanctions affecting oil trade in January 2019. Sanctions imposed on Russia's oil sector generally target longer-term oil production and to date have not reduced Russian oil supply or trade. Oil production in Russia has increased since oil-sector sanctions began in 2014, although the country has arguably incurred economic costs in order to incentivize and support oil output levels. Sanctions targeting Iran's oil sector date back to the 1980s and affect virtually every element of Iran's oil sector (e.g., investment, shipping, insurance, and exports). Legislation enacted in 2011 ( P.L. 112-81 ) and 2013 ( P.L. 112-239 ), along with subsequent executive orders (E.O.s), created a sanctions framework designed to discourage oil importersâby sanctioning banks that transact with Iran or facilitate oil transactions, as well as entities that buy Iranian oilâfrom purchasing crude oil and other petroleum and petrochemical products from Iran. Iran oil export sanctions include design elements (e.g., significant reduction exceptions, requirements to certify oil markets are adequately supplied, and coordination with oil-producing countries) intended to minimize oil price escalation that could result from sanctions-related oil supply reductions. Iran oil export sanctions have been applied, waived, and reapplied since 2011. As of November 2019, the Trump Administration's stated goal has been to reduce Iran's oil exports to zero. Trade data indicate that observed Iranian crude oil exports declined by approximately 80% between April 2018 and October 2019. Should sanctions affecting Iran's oil exports be relieved or terminated, the reentry of 1 million to 2 million bpd of crude oil could, depending on market conditions and oil-producing country decisions, contribute to oil market oversupply that could lower oil prices. While U.S. petroleum product consumers may welcome such an outcome, severe and persistently low prices could have adverse effects on U.S. oil producers. Oil sector sanctions imposed on Russia via E.O. since 2014, and codified ( P.L. 115-44 ) in 2017, apply to certain Russian oil companies and target two activities: (1) accessing debt finance, and (2) accessing oil exploration and production technology for deepwater, Arctic offshore, and shale projects. Near-term Russian oil supply does not appear to have been affected by these sanctions to date; oil production has increased since 2014. Alternative financing, currency devaluation, and Russia's oil tax and export duty policies have provided Russian companies with capital and incentives to increase oil production and exports. Over the long term, Russian oil output could be affected by oil production technology sanctions, as some European and U.S. companies have terminated participation in certain oil exploration and development projects. Economic sanctions affecting Venezuela's oil trade are the product of E.O.s and U.S. Department of the Treasury designations in 2019 prohibiting transactions with Petroleo s de Venezuela S.A. (PdVSA). Petroleum trade between the United States and Venezuela has been eliminated. As a result, Venezuela has sought alternative buyers of crude oil previously destined for the United States and alternative suppliers of petroleum products previously sourced from U.S. exporters. Although U.S. economic sanctions do not explicitly prohibit non-U.S. entities from trading oil and petroleum products with PdVSA, Treasury has discretion to take action against foreign entities that provide material support to PdVSA. This sanctions framework element could make it difficult for PdVSA to secure alternative buyers and suppliers. Rosneft, a Russian-controlled oil company, has reportedly facilitated Venezuelan crude oil trade with independent oil refiners in China and has provided Venezuela with petroleum products previously sourced from U.S. suppliers. Enacted legislation in the 116 th Congress ( P.L. 116-94 ) requires the Administration to coordinate Venezuela sanctions with international partners and expresses concerns about certain PdVSA transactions with Rosneft. Sanctions-related oil supply constraints have affected oil production and trade. Oil market characteristicsâgenerally inelastic supply and demand in the short termâcould contribute to market conditions that could result in volatile price movements (both up and down) when supply and demand are imbalanced by as little as 1% to 2% for a brief or sustained period. To date, persistently high crude oil prices have been moderated by several factors, including increasing U.S. oil production and exports, trade flow adjustments, expectations of slowing demand growth rates, and sanctions design elements. However, oil trade sanctions have affected price differentials for certain crude oil types (e.g., light vs. heavy).", "document_type": "crs"}
{"report": "Consumer finance encompasses the financial lives of individuals and households. Americans aspire for economic advancement and wealth building, a central part of the American dream. Safe and affordable financial services are an important tool for most American households to avoid financial hardship, build assets, and achieve financial security over the course of their lives. Households use three types of financial products regularly: credit, insurance, and financial investments. This report will focus on the first categoryâcredit and deposit-taking financial products for personal, family, or household purposes. Most households rely on credit to finance some expenses because they do not have enough assets saved to pay for them. Mortgage debt is by far the largest type of household debt. According to data from the Federal Reserve Bank of New York, as shown in Figure 1 , mortgages account for approximately 67% of household debt. Student loans are the second-largest type of household debt, followed by auto loans and credit cards. These and other major consumer finance markets are discussed in more detail in this report under \" Overview of Major Consumer Finance Markets ,\" which provides a brief overview of each financial product, recent market developments, and related policy issues. Major consumer finance markets examined in this report include mortgage lending, student loans, automobile loans, credit cards and payments, payday loans and other credit alternative financial products, and checking accounts and substitutes. In general, this report will focus on the consumer and household perspective, and consumer protection policy issues in each market. This report also discusses two important market structures that allow these consumer financial products to be offered: (1) the consumer credit reporting system and (2) the debt collection market. These aspects of the consumer credit system are important because they facilitate the pricing of credit offers and the resolution of delinquent consumer credit products for most consumer credit markets. The report begins with an overview of U.S. household finances, consumer finance markets, and common policy issues in these markets. Consumer finance refers to the saving, borrowing, and investment choices that households make over time. These financial decisions can be complex and can affect households' financial well-being both now and in the future. Understanding why and how consumers make financial decisions is important when considering policy issues in consumer financial markets. This section provides an introduction to U.S. households' finances, including a breakdown of a household balance sheet and its components. It then provides background on how consumer financial markets operate and general issues in these markets. The section also describes common policy interventions and considerations when using these policy tools. Lastly, this section provides an overview of the Bureau of Consumer Financial Protection (CFPB)âthe main regulator responsible for consumer compliance of financial products and services. A household's balance sheet is similar to a firm's in that it presents a full financial picture, including the following components of a household's financial position: Assets âA point-in-time value of what a household owns; can include liquid wealth , such as a savings account or other financial assets from which the household can easily access funds, and illiquid wealth , such as a car or home that the household owns. Debts âA point-in-time value of what a household owes; can include a home mortgage, a student loan, or other types of consumer loans. Net Worth âEqual to assets minus debts , measures the wealth of a household, including home equity. Income âWages earned from a job or financial investment returns over a period of time (e.g., a year). Consumption âHousehold spending over a period of time, such as rent, food, clothing, and entertainment. Savings âThe difference between income and consumption over a period of time. When a household's income is greater than its consumption, it can save or invest this unconsumed income, increasing the household's assets or paying off debt owed, reducing the household's total debts . Borrowing âNew debts taken out over a period of time. When a household's consumption is greater than its income , it can either spend assets it owns or borrow money, increasing the household's debts . In general, research on household finance suggests that all of the components of a household balance sheetâassets, debts, net worth, income, consumption, savings, and borrowingâare important to understanding a household's financial experience over time. For example, in the event of a financial shock âan unexpected expense such as a car or home repair, a medical expense, or a pay cutâhouseholds with a lower income or little liquid savings are much more likely to experience difficulty making ends meet. As this example suggests, all of the balance sheet's components need to be accounted for when considering consumer decisionmaking. As demonstrated in Figure s 2 and 3 , household income and net worth in the United States are both distributed unevenly. According to the Federal Reserve Board's (Fed's) Survey of Consumer Finances, the bottom 20% of U.S. households ranked by income have an income below $25,300, whereas the top 10% have an income above $177,100. Likewise, the bottom 25% of U.S. households ranked by net worth have a net worth below $10,300, whereas the top 10% have a net worth above $1,186,300. These distributions reflect the variation of household balance sheets within the United States and are due to many factors, such as age, size of household, and household decisions about jobs, homeownership, and other factors. This report examines household borrowing, with a particular focus on consumer financial products, such as mortgages, credit cards, and auto loans, which allow a household to borrow and make payments. As described in the previous section, consumer behavior in these markets may be driven by other parts of the balance sheet, such as the need to build assets or withstand a financial shock. Three common reasons households use credit are as follows: Asset Building âUsing credit to make investments can allow a household to build wealth over time. For example, a household can use a mortgage to pay for an asset, such as a house, that may appreciate over time. A household also can use student loans to fund education expenses to make a higher income in the future. In both cases, households are using credit to fund household investments that may lead to greater wealth in the future. Consumption Smoothing âUsing credit to move income across time periods allows a household to consume future income now. For example, recent college graduates might use credit cards to pay for expenses before their new jobs begin. This money is more valuable to graduates now, before they have wages, than in the future, when they have enough income to meet living expenses. Financial Shocks or Emergencies âUsing credit to pay for unexpected expenses allows a household to compensate for an emergency, such as a car or home repair, a medical expense, or a pay cut. For example, a consumer might take out a payday loan to repair a car and continue to go to work. This money is more valuable to the consumer during the financial emergency than in the future. Each consumer financial market is unique and governed by various distinct laws and regulations. However, consumer financial markets generally share similar market dynamics. In all of these markets, consumers often act in similar ways when making financial decisions, and firms tend to act in comparable ways across markets to attract consumers and make profits. Therefore, the government tends to consider similar policy interventions and factors when regulating these markets. Mainstream economic theory asserts that competitive free markets generally lead to efficient distributions of goods and services to maximize value for society. Under this theory, each market moves toward an efficient price, at which the supply of goods produced by firms and the amount of goods demanded by consumers equal one another. If consumers demand credit products, then banks or other lenders should want to provide these products to consumers if they can make a profit. Without major barriers for new lenders to enter the market, more lenders should start providing credit to consumers, until the price is no longer excessively profitable to lenders. At this point, the market is at equilibrium, its efficient outcome for society. If these conditions hold, policy interventions cannot improve on the financial decisions that consumers make based on their unique situations and preferences. For this reason, some policymakers are hesitant to disrupt free markets, on the theory that prices determined by market forces lead to efficient outcomes without intervention. The life-cycle model is a prevalent economic hypothesis that assumes households usually want to keep consumption levels and their lifestyles stable over time. For example, severely reducing a household's consumption one month may be more painful for a household than the pleasure of a much higher household consumption level in another month. Therefore, households save and invest during their careers in order to afford a stable income across their lives, including retirement. This model suggests that wealth increases as households age, which generally fits household data in the United States. However, income and wealth inequality continues to exist after controlling for household age, suggesting that age is not the only important factor. There are also circumstances where the life-cycle model fails to correspond to household behavior in the United States. A recent National Bureau of Economic Research (NBER) working paper on behavioral household finance identifies three facts about U.S. household balance sheets. First, income and consumption move together very closely, unlike the stable consumption that the life-cycle model would predict. Second, U.S. households on average tend to have low levels of liquid wealth, such as money in a savings account, and a high incidence of credit card borrowing. Third, most U.S. households have much of their wealth in illiquid assets, such as home equity. These patterns might fit the life-cycle model if borrowing money is inexpensive and illiquid assets have higher returns than liquid assets. However, these assumptions might not apply to all households and other explanations might fit these patterns better. Generally, these three facts are important background to better understand consumer behavior in financial markets. These facts suggest why many U.S. households depend on access to affordable credit and robust consumer financial markets, both for short-term needs and for building wealth over time. In these theoretical frameworks, m arket failures occur when a free market is inefficient due to departures from the standard economic framework, which includes assumptions about perfect information and perfect competition. Market failures can reduce economic efficiency and consumer welfare. In these cases, government policy can potentially correct market failures to bring the market to a more efficient outcome, maximizing social welfare. Yet, policymakers often find it challenging to determine whether a policy intervention will help or harm a particular market's efficiency. The following sections discuss two specific departures from the conditions associated with economic efficiencyâimperfect information and behavioral biases. These market failures are important to understanding consumer credit markets. Imperfect information, or information asymmetry, is when one party in a transaction (e.g., a firm) has more accurate or more detailed information than the other party (e.g., a consumer). This imbalance can result in inefficient outcomes. For example, ideally consumers in a mortgage market will shop around among lenders for the best interest rate, fees, and other terms for their own personal situations. Yet, acquiring information (e.g., contacting a variety of different lenders to compare loan terms) can be time consuming. Consumers might also be willing to spend more to save time or to have a better experience closing their mortgage. However, if information asymmetry existsâfor example, if interest and fee costs are hidden, confusing, or difficult to obtainâsome consumers might choose a mortgage loan that is not optimal based on the criteria they deem to be important. In this case, the mortgage market will not lead to efficient societal outcomes, possibly costing some consumers more for a loan than is necessary and dissuading some consumers who otherwise would from entering the market. Information asymmetries occur in the opposite way as well. Often, lenders might not have accurate or detailed information about a consumer, making it hard for them to estimate a consumer's likelihood of default on a loan. The credit reporting industry developed to give lenders more information about a consumer and make the markets for consumer credit more efficient. For more information on the credit reporting industry, see the section of this report titled \" Credit Reporting, Credit Bureaus, and Credit Scoring .\" Behavioral research suggests that humans tend to have biases in rather predictable patterns. This research suggests that the human brain has evolved to quickly make judgments in bounded, rational ways, using heuristicsâor mental shortcutsâto make decisions. These heuristics generally help people make appropriate decisions quickly and easily, but sometimes, they can result in choices that make the decisionmaker worse off financially. Within consumer finance markets, a few of these biases tend to be particularly important: Choice Architecture âResearch suggests that how financial decisions are framed can affect consumer decisionmaking in many ways. For example, people can be anchored by an initial number, even if it is different from their next choice. In one illustration of this concept, researchers had subjects spin a wheel of fortune with numbers between zero and 100, then asked them the percentage of African countries in the United Nations. The random number generated in the first stage subconsciously affected subjects' guesses in the second stage, even though they were not related. Another example of a decisionmaking bias is defaults . For example, employees are more likely to be enrolled in a 401(K) plan by employer defaults than if they actively need to make a choice. A third example of a framing bias is loss aversion , the idea that people tend to respond more strongly to potential losses than gains. Therefore, when choices are framed as a potential loss, such as \"an opportunity you don't want to miss,\" consumers respond more strongly than they do to potential benefits. Present Bias and Scarcity âWhen people tend to put more value on having something now, rather than in the future, even when there is a large benefit for waiting, this behavior is called present bias . In addition, even when people decide they should do something difficult, such as saving for the future or choosing a retirement plan, self-control and procrastination may prevent them from following through on their intentions. These human biases might lead consumers to make financial decisions that are not optimal. Furthermore, a scarcity mindset can make optimal decisionmaking more difficult. Difficult decisions, such as managing finances, require cognitive bandwidth. When under extreme stress, such as living in poverty, people may tunnel their vision, focusing on immediate needs (e.g., paying current bills), rather than prioritizing based on the big picture (e.g., increasing future income). Self-control might also be a limited resource for humans, where the more self-control a person needs to exert over a day, the harder it is to maintain. These limitations to human cognitive functioning can sometimes lead consumers to make flawed financial decisions. Budgeting Biases ( Mental accounting ) âOften, households use mental accounts, amounts of money mentally allocated in advance for different purposes, to make consumption decisions. For example, a household may have a monthly budget for food, clothing, and entertainment. Even though money is fungible, many households act as if spending in one category does not affect spending in another category. This categorization is an intuitive and simple way of thinking about a budget. Although this thinking reduces cognitive effort, it can also lead to predictable biases. For example, research suggests that people have trouble forecasting unusual or infrequent expenses. For this reason, these expenses are generally not fully accounted for in the mental budget, leading to overspending. Although consumers might not be aware of these biases when making financial decisions, they are important because firms can take advantage of them to attract consumers. For example, choice architecture biases might influence how marketing materials are developed, emphasizing certain terms to make a financial product seem more desirable to consumers. In addition, product features may be developed to take advantage of people's present bias, scarcity mindset, or mental accounting mistakes. In response to market failures, such as information asymmetry and behavioral biases, the government uses policy interventions intended to bring consumer markets to a more efficient market outcome. Three types of policy interventions are common in consumer finance: Standardized Consumer Disclosures âFinancial products can be complex and difficult for consumers to fully understand. Mandated consumer disclosures are a common policy intervention in consumer financial markets, generally intended to give consumers more information about the costs and terms before they take out a new financial product, thus reducing asymmetric information market failures. Standardized disclosures can also help consumers shop for the best terms, because all financial product terms are required to be disclosed in the same way. Furthermore, because disclosure structure and formatting are often standardized, mandated consumer disclosures can also account for choice architecture biases. Laws that mandate consumer disclosures in financial markets include the Truth in Lending Act (TILA), which requires standardized disclosures for certain consumer credit products, and the Truth in Savings Act, which requires standardized disclosures for certain bank accounts. Unfair, Deceptive, or Abusive Practices or Acts âConsumers seeking loans or financial services could be vulnerable because some consumers may lack financial knowledge or be susceptible to biases described in the above section. For this reason, certain consumer protection laws prohibit unfair, deceptive, or abusive acts or practices in consumer financial markets. These acts and practices can include both individual firm conduct and product features. Fair Lending âFair lending laws prohibit discrimination in credit transactions based upon certain borrower characteristics, such as sex, race, religion, and age. These laws historically have been interpreted to prohibit both intentional discrimination and disparate impact discrimination, in which a facially neutral business decision has a discriminatory effect on a protected class. Federal fair lending laws in consumer financial markets include the Equal Credit Opportunity Act (ECOA), the Fair Housing Act (FHA), and the Home Mortgage Disclosure Act (HMDA). The market effects of new laws or regulations are important considerations. Does the policy on average lead the market closer to or farther from its efficient outcome? In consumer financial markets, both households and firms may react to new policy. If all of a policy's potential impacts are not considered, it can have unintended effects and perhaps fail to reach policymakers' objectives. From a consumer perspective, new policy formulations should consider the policy's effect on consumer decisionmaking, the impact on household well-being over time, and whether these effects might vary across the population. For example, a new disclosure policy might improve consumer comprehension, but not consumer decisionmaking, thus failing to affect the market as intended. In other cases, a subset of consumers may be susceptible to a deceptive practice. If a new policy eliminates that deceptive practice in the market, the policy may only affect that subset of consumers who were susceptible, rather than the whole consumer population. From a firm's perspective, new policy formulation should consider both the cost for firms to implement the policy as well as its impact on the market's competitiveness, both within and outside of the regulated market. Another important consideration is the policy's impact on consumer prices and financial product availability. For example, complying with a new regulation might require a firm to bear costs. This might force lenders to raise prices, or lenders who cannot bear the additional costs may leave the market. Higher prices and less choice may result in consumers seeking other credit products outside of the market, or reduce consumers' ability to access credit. Most experts agree that an important factor in the 2008 financial crisis was a housing bubble that led lenders to relax their underwriting standards (or the process by which a lender determines whether a borrower is creditworthy), which in some cases led to consumer protection abuses. In response, the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank Act) established the CFPB to implement and enforce federal consumer financial law while ensuring consumers can access financial products and services. The CFPB's statutory purpose is to enable markets for consumer financial services and products to be fair, transparent, and competitive. Dodd-Frank consolidated certain consumer finance-related responsibilities previously held by other regulators in the CFPB and created new authorities unique to the CFPB. The act also directed the CFPB to develop and implement financial education initiatives, collect consumer complaints, and conduct consumer finance research. The CFPB generally has regulatory authority over providers of an array of consumer financial products and services, including deposit taking, mortgages, credit cards and other extensions of credit, loan servicing, consumer reporting data collection, and debt collection associated with consumer financial products. The CFPB's authorities and the breadth of products, services, and entities that fall within its jurisdiction are considerable, but Dodd-Frank imposes some important exceptions to and limitations on those powers. The CFPB's authorities fall into three broad categories: rulemaking , writing regulations to implement laws under its jurisdiction ; supervision , the power to examine and impose reporting requirements on financial institutions; and enforcement of various consumer protection laws and regulations. The CFPB is authorized to prescribe regulations to implement 19 federal consumer protection laws that largely predated Dodd-Frank. These enumerated consumer laws govern a broad and diverse set of consumer financial services and generally apply to any entity offering those services. Dodd-Frank also provided CFPB new power to issue rules declaring certain acts or practices associated with consumer financial products and services to be unlawful because they are unfair, deceptive, or abusive. Other aspects of the CFPB's regulatory powerâparticularly the scope of its supervisory and enforcement authorityâvary depending on a number of factors, including an institution's size and whether it holds a bank charter. The CFPB is headed by a director appointed by the President with the consent of the Senate for a five-year term. It is located within the Federal Reserve System (Fed), although the Fed does not influence the CFPB's budget or personnel decisions. The Fed also cannot veto a rule issued by the CFPB, but the Financial Stability Oversight Council can overturn a CFPB rule with the vote of two-thirds of its members. The CFPB is funded through the Fed's earnings, rather than through the typical appropriations process. The CFPB requests monetary transfers from the Fed, with a cap on the amount of these transfers based on a formula set in statute. For FY2018, the CFPB's funding cap was $663 million, and the agency's net operating costs were $553 million. The following sections examine specific issues within major consumer debt markets: mortgage lending, student loans, automobile loans, credit cards and payments, payday loans and other credit alternative financial products, and checking accounts and substitutes. The markets discussed are under the CFPB's jurisdiction, and sometimes that of other regulators as well. Each section briefly describes the financial product, recent market developments, and selected policy issues that may lead each market away from its efficient price or outcomes. These sections focus on the consumer and household perspective as well as consumer protection policy issues in each market. A mortgage loan is a loan collateralized by a house and its land. Generally, consumers use these loans to purchase a new home or refinance an existing one. These types of mortgages are often called first liens, because if a consumer defaults on the loan, the lender is typically the first in line to be compensated through the proceeds of a home foreclosure. First-lien mortgage loans are usually installment loans, in which the consumer pays off the loan in monthly installments over 15 years or 30 years. Most mortgage loans in the United States have a fixed interest rate and fixed installment amount over the course of the loan, affected by the consumer's credit score and market conditions. Households buying a new home and taking out a mortgage loan to purchase it generally cannot borrow for the house's full value. To limit the risk to the lender, borrowers are typically required to make a down payment, the difference between the house's value and the mortgage loan. If the down payment is less than 20% of the home's value, the borrower is often required to pay for additional insurance. In addition to first-lien purchase mortgages, a consumer may choose to take out a home equity line of credit (often referred to as HELOC) or a smaller installment mortgage loan, which often is a second lien. A second lien means that the lender is second in line, after the first lien holder, to be compensated if the consumer defaults and the home is foreclosed upon. These loans are underwritten using the home's value, but can be used for a variety of different purposes either related to the home or not. For example, second mortgages can be used to renovate the home, pay for college, or consolidate credit card debts. Mortgage loans are by far the largest consumer credit market in the United States, and homes are a large part of most households' wealth. According to the Fed, more than $9 trillion of mortgage debt is currently outstanding, and more than $15.5 trillion in real estate equity is owned by households. As of the first quarter of 2019, 64.2% of U.S. households owned their home. Many people view homeownership as an important way to build wealth over time, through both price appreciation and home equity gained by paying down their mortgages. Nevertheless, because home prices can fluctuate over time, this investment can be risky, especially if the homeowner only stays in the home for a short time. Although homeownership has certain benefits, such as tax benefits like the mortgage interest tax deduction, it also imposes costs on the household, such as mortgage loan closing costs and home maintenance. As noted above, most experts believe that a housing price bubble was a central cause of the 2008 financial crisis. In response, Dodd-Frank reformed the mortgage market by attempting to strengthen mortgage underwriting standards, to reduce the risk that consumers default on their mortgages even if house prices fluctuate in the future. Dodd-Frank also directed the CFPB to update federal mortgage disclosure forms (called the combined TILA/RESPA form) and improve standards for mortgage servicing (a company who manages mortgage loans after the loan is originated). During and after the financial crisis, mortgage lenders tightened underwriting standards, making it harder for consumers to qualify for a loan. Although most borrowers with good credit scores continued to qualify for mortgage credit, other borrowers in weaker financial positions found it more difficult to obtain a mortgage. As the economy has recovered, concerns exist about whether new consumer compliance regulation in the mortgage market has struck the right balance between prudent mortgage underwriting and access to credit for potential borrowers to build wealth. Certain features of mortgages during the mortgage boom that were considered to be particularly risky, such as teaser interest rates and loans with little or no income verification, are now uncommon in the mortgage market. However, research suggests that regulating underwriting standards may have caused lenders to prefer certain borrowers, such as those with lower debt-to-income ratios. Mortgage shopping is another policy issue in this market. Consumers do not tend to shop among lenders for more advantageous mortgage interest rates, even though large price differences exist in the market. According to the CFPB, nearly half of all borrowers only seriously consider one lender or broker before taking out a mortgage. Given the range of interest rates available to a consumer at any given time, the CFPB estimates that a consumer could save thousands of dollars on a mortgage by shopping for the best interest rates. House price affordability has been another policy issue in recent years. In high-cost, large metropolitan areas, house prices rose quickly in the past decade, making it harder for consumers to buy a home in these cities. Likewise, the national homeownership rate has declined by almost 5 percentage points since 2005, from 69.1% to 64.2%. Given that homeownership can help a family build wealth over time, this trend concerns some policymakers. Student loans allow students and their families to pay for postsecondary education expenses while they are enrolled in school. Education is an investment intended to allow students to earn higher incomes after they complete school and throughout the rest of their careers. In general, student loans are paid back in installmentsâfor example, a fixed payment every month for 10 years. Student loan debt has more than doubled in the past decade. Since 2010, student loan debt has been the second-largest category of consumer debt, after mortgage debt. In academic year 2016-2017, the average amount of student loan debt for a bachelor's degree recipient who borrowed funds to complete the degree was $28,500. Unlike other consumer financial markets, most student loans are originated and owned by the federal government. In general, these federal loans are accessible to large portions of the postsecondary student population and their families with limited underwriting of their creditworthiness, estimated future income, or other estimates of their ability to repay the loan. The Department of Education (ED) manages most of the federal student loan programs. Congress sets interest rates and other loan terms and conditions in statute each year. ED contracts out student loan servicing, sets servicing standards in these contracts, and enforces these servicing standards. The CFPB is the primary regulator for private student loan lending and servicing and has also asserted a role in ensuring compliance with consumer protection laws related to federal student loan servicing. From a regulatory perspective, policymakers continue to debate what role the CFPB should play in the federal student loan industry. Consumer groups advocate for more active CFPB enforcement of consumer protection standards in federal student loan servicing. However, because ED already assumes a significant role in how its contractors service federal student loansâand taxpayers are responsible for additional servicing costs and default risk for nonpaymentâsome have questioned the need for the CFPB to regulate in the same space. A major concern in the student loan market is whether students are able to manage their debt after graduation. Moreover, unlike other consumer debts, student loans are generally not dischargeable during a bankruptcy proceeding except in limited circumstances. These concerns have led to efforts to make loan repayment terms more flexible. For example, some federal student loan borrowers now have the option to choose income-driven repayment plans, under which a borrower's monthly loan payments are based on a percentage of the borrower's discretionary income. Loan forgiveness programs have also been developed and expanded in recent years, especially for borrowers in public service occupations. ED manages several of the student loan forgiveness and repayment loan programs. Reports from the CFPB student loan ombudsman have uncovered issues in these programs' implementationâsuch as with payment processing, billing, customer service, and borrower communicationâthat make it difficult for borrowers to know their options, understand the process, and qualify for forgiveness or repayment loan programs. Questions have also arisen regarding student loan availability and whether loans should be limited to certain types of educational programs that enable their students to gain quality employment and successfully pay back their loans. Many students make school choice and curriculum decisions at a young age, when they might not have much experience making financial decisions. In addition, information on program quality and student employment outcomes after graduation is limited. These information asymmetry problems can make it difficult for students to make good financial decisions for their future careers. Questions also exist about the extent to which student loan access causes tuition prices to rise. For example, if access to student loans makes it easier for schools to raise tuition, then it might lead to some students being worse off. Some question whether the availability of student loans might harm the larger economy. For example, researchers debate student loan debt's effects on future macroeconomic performance, including effects on career choice, family formation, home ownership, and retirement savings. An automobile (auto) loan allows a consumer to finance the cost of a new or used car. Auto loans are usually structured as installment loans, in which a consumer pays a fixed amount of money each month for a predetermined time period, frequently three to seven years. Lenders often require consumers to make a down payment to obtain the loan. Auto loans are secured by the automobile, so if a consumer cannot pay the loan, the lender can repossess the car to recoup the loan's cost. Auto loans are the third-largest consumer credit market. At the end of 2018, 113 million consumersâroughly 45% American adultsâhad an auto loan, and auto loan debt outstanding totaled almost $1.3 trillion. According to the CFPB, auto loan terms have increased recently. In 2009, 26% of auto loans originated were for six or more years, whereas in 2017, these loans constituted 42% of originations. This trend may be due in part to rising vehicle costs and consumers keeping their cars longer. Reportedly, most auto loans are arranged at the auto dealership where the car is purchased, referred to as the indirect auto financing market . Indirect auto financing involves the auto dealer forwarding information about the prospective borrower to one or more lenders to solicit potential financing offers. The dealer is often compensated for originating the loan through a discretionary markup, which is the difference between the lender's interest rate and the rate a consumer is charged. The lender may cap the possible size of the dealer markup (e.g., 2.5%) to limit the loan from becoming too susceptible to default. Auto dealers and consumers can negotiate the loan's interest rate within this range, and therefore indirectly determine how much to compensate the auto dealer for the convenience of arranging the loan. Alternatively, consumers can go directly to a bank, credit union, or other lender for an auto loan before making their purchases, avoiding the dealer markup cost. Consumers may prefer arranging auto financing through an auto dealer or directly through a lender, depending on their preferences regarding convenience, cost, and other factors. In either case, the lender usually owns the loan and can service it itself or through a third-party company. In the indirect auto financing market, the dealer markup arrangement can incentivize the auto dealer to negotiateâand profit fromâa higher interest rate with the consumer. The auto dealer may also choose the lender who compensates it the mostâfor example, the lender that allows the largest markup, rather than the lender offering the best terms for the consumer. Although other consumer credit markets include markups, it is less common for bank or credit union lenders to allow an outside broker in the transaction discretion as to the amount of the markup. For example, although the Real Estate Settlement Procedures Act restricts such practices in the mortgage market, after reports of mortgage brokers steering customers to more expensive loans due to \"kickbacks\"âunearned fees for a referralâin the lead-up to the financial crisis, Congress in 2010 took actions to further restrict these practices. The information asymmetry in the indirect auto finance market sometimes can lead to higher prices for consumers. Consumers are not always aware that they can negotiate on loan terms when obtaining dealer-arranged financing. For this reason, many consumers do not shop for auto loans. Consumers' lack of awarenessâcombined with auto dealers' discretion on markupsâmay leave them vulnerable to bad actors, making the auto loan market uncompetitive. The CFPB oversees consumer protection compliance for auto lenders, but not for auto dealers' typical activities. Dodd-Frank states that \"the Bureau may not exercise any [authority] over a motor vehicle dealer that is predominantly engaged in the sale and servicing of motor vehicles, the leasing and servicing of motor vehicles, or both.\" The scope of this exclusion continues to be debated, given the key role auto dealers play in the auto lending market. In 2013, the CFPB issued a controversial bulletin providing guidance to indirect auto lenders on how to comply with the Equal Credit Opportunity Act (ECOA). This guidance generally stated that indirect auto lenders should impose controls on or revise and monitor dealer markups to ensure they do not result in disparate impact based on race or other protected classes. From 2013 to 2016, the CFPB, in coordination with the Department of Justice, issued consent orders to settle enforcement actions against American Honda Finance Corporation, Toyota Motor Credit Corporation, Fifth Third Bank, and Ally Financial & Ally Bank for ECOA violations in indirect auto lending markets. The CFPB generally alleged that these institutions violated ECOA by permitting their dealers to charge markups that resulted in disparate impacts on the basis of race and ethnicity. Auto lenders generally do not collect information on the race or ethnicity of borrowers. In the absence of direct evidence, the CFPB used a new proxy methodology, a statistical method developed for estimating race and ethnicity using geography and surname-based information. Although this method may not be able to flawlessly identify race or ethnicity for an individual, aggregate, company-wide estimates of disparate impacts are much more precise. In general, these institutions did not admit or deny the allegations as part of the consent orders but, among other things, paid monetary penalties and agreed to limit their markups to reduce these alleged disparities. The CFPB's indirect auto lender guidance and the resulting enforcement actions were the subject of significant attention and debate. For example, some expressed the view that the guidance went beyond what ECOA and the Dodd-Frank Act require of auto lenders, while others considered it an important step toward addressing discrimination. In 2018, Congress rescinded the guidance pursuant to the Congressional Review Act. Nevertheless, some observers argue that discrimination in auto lending markups continues to be an area of concern. Retail payment services allow consumers to pay merchants for goods and services without cash, sometimes called a payment transaction . Consumers can use these services to pay bills, make person-to-person payments, or withdraw cash. These services can be found in many consumer financial products, including credit, debit, and prepaid cards and checking accounts. Given the rise of internet shopping, retail payment services have become especially critical for consumers to be able to make daily purchases. The most common methods of payment are debit cards, cash, and credit cards, respectively. Debit and prepaid cards generally are associated with a funded account from which the consumer draws money to pay for transactions. In contrast, credit cards allow a consumer to pay for transactions using credit. According to the CFPB, in 2017, just under 170 million consumers, roughly 70% of the U.S. adult population, had a credit card. Credit cards provide consumers with unsecured revolving credit, meaning the loan is not secured with any collateral if the consumer defaults (and thus, the lender has no recourse to seize any property connected to the loan in case of consumer default). In some cases, credit cards are used for payment transaction convenience and paid in full each month without incurring interest. These types of users are sometimes called transactors . In other cases, credit card users borrow money up to a credit limit and make only a m inimum payment (generally a small portion of the outstanding balance) on the debt each month, incurring interest on the unpaid balance. These types of credit card users are called revolvers . In 2016, average interest rates for general purpose credit cards were just over 17%. Although a consumer can move between transacting and revolving, consumers tend to show persistent payment behavior. According to a Fed survey, roughly half of consumers transact and half revolve. Credit cards are valuable to consumers in part because they are flexibleâboth the amount borrowed and the amount paid can vary each month according to the consumer's needs. For example, if a household experiences a financial shock, such as unemployment or a car or house repair, the household can use credit cards to borrow money quickly and easily, which the household can then pay back when it is able. Credit cards can also be used to smooth consumption over time, which may be particularly valuable to households with tight budgets. However, credit cards also are structured in a way that can take advantage of many consumer decisionmaking biases, which can result in households incurring debt. For example, mental accounting biases can lead to overspending, and credit cards allow households to overspend easily, perhaps without even realizing it until their monthly bill is due. Research suggests that the half of credit card holders who are persistently in credit card debt are likely to be present biased and have little liquid savings. The type of information disclosed in a typical credit card statement may play an important role in how revolving consumers repay credit card debt. Research suggests that many people are anchored by the minimum payment amounts included in each statement, which bias their decisions about how much to pay each month. Specifically, the research suggests these consumers are either paying the minimum payment or employing heuristics to pay near the minimum (e.g., twice the minimum or $20 above the minimum). This cue may unconsciously influence consumers to make a lower payment than they otherwise would. For these reasons, the Credit Card Accountability Responsibility and Disclosure Act of 2009 (CARD Act) established new disclosure requirements for credit cards. The CARD Act changed the periodic disclosure credit card companies are required to make to consumers to include information on how long it will take to pay off a consumer's debt if the consumer makes only the minimum payment. The disclosure also now includes the amount a consumer would have to pay to repay the debt in three years and how much interest the consumer would save by paying the debt off in three years compared with the minimum payment. These changes in the disclosure requirements were intended to nudge consumers to pay more on their credit cards each month, but research suggests that they did not have as big of an effect on consumer payment behavior as intended, in part because online portalsâwhich have become a popular method of credit card paymentâare not required to contain these disclosures. When consumers face financial shocks, such as unemployment or a car repair, sometimes they need credit to manage the unforeseen event. One option a consumer may access is a short-term, small-dollar loan, which tends to be outstanding for a short period of time and for a small amount of money, generally less than $1,000. Banks and credit unions sometimes provide these types of loans through cash advances or checking account overdraft programs. Many consumers, often those with a low credit score or no credit history, also turn to alternative financial products from a nonbank institution to provide credit when needed. Alternative financial products include payday loans, pawn shop loans, auto title loans, and other types of products from nonbank providers. According to the Federal Deposit Insurance Corporation (FDIC), in 2017, 19.7% of American households did not have access to mainstream credit and 6.9% used a credit alternative financial service. Households that rely on credit alternative financial services are more likely to be lower-income, younger, and a racial or ethnic minority compared to the general U.S. population. Perhaps the best known of these products are payday loans, which have been the subject of significant regulatory, congressional, and media attention. Payday loans are structured as short-term advances that allow consumers to access cash before they receive a paycheck. These loans are designed to be paid back on a consumer's next payday. Payday loans are offered through storefront locations or online for a set fee. The underwriting of these loans is minimal, with consumers required to provide little more than a paystub and checking account information to take out a loan. Rather than paying off the loan entirely when it is due, many consumers roll over or renew these loans. Sequences of continuous rollovers may result in consumers being in debt for an extended period. Because consumers generally pay a fee for each new loan, payday loans can become expensive. In 2010, the Dodd-Frank Act authorized the CFPB to oversee payday lenders for the first time at the federal level, but prohibited the CFPB from imposing an interest rate limit on any type of credit, including payday loans. As of February 2019, 17 states and the District of Columbia either ban or limit the interest rates on these loans. In the payday market, policy disagreements tend to center on balancing access to credit with consumer protection. The academic research is mixed in terms of payday loans' effect on consumer well-being. When consumers have emergencies, short-term, small-dollar credit can help them make ends meet. Payday loans' product features, such as the option to roll over, can allow consumers to pay back their loan flexibly, but also can play into cognitive biases, including present biases and scarcity tunnel vision. Some consumers pay off payday loans quickly, but a sizable minority are in debt for a long period of timeâa CFPB study found 36% of new payday loan sequences were repaid fully without rollovers, while 15% of sequences extended for 10 or more loans. In October 2017, during the leadership of then-Director Richard Cordray, the CFPB finalized a rule covering payday and other small-dollar, short-term loans that has not yet gone into effect . The 2017 rule asserts that it is \"an unfair and abusive practice\" for a lender to make certain types of short-term, small-dollar loans \"without reasonably determining that consumers have the ability to repay the loans.\" The rule would mandate underwriting provisions for short-term, small-dollar loans unless made with certain features. In February 2019, the CFPB under Trump-appointed Director Kathy Kraninger issued a proposed rule that would rescind the mandatory underwriting provisions before the 2017 final rule goes into effect. The 2019 proposed rule would leave unchanged other parts of the 2017 rule, such as other payment provisions relating to protections for consumers paying back these loans. Given the concerns about consumer harm from payday and other small-dollar, short-term loans , some financial institutions are interested in exploring other loan models that try to give consumers access to credit for short-term needs at a lower cost and with an easier re pay ment process . For this reason, prudential regulators, such as the Office of the Comptroller of the Currency (OCC) and the FDIC, are exploring ways to encourage banks to offer small-dollar credit products to consumers. However, i t is unclear whether these different types of products can improve outcomes for consumers compared to payday loans , given that the population of consumers these products would target and those consumers' biases concerning money management are likely similar. Checking accounts allow consumers to deposit money and make payments, for example, using bill pay and paper checks. Frequently, a checking account includes access to a debit card, to increase a consumer's ability to make payment transactions through the account. Checking accounts are generally provided by a bank or credit union, and consumers' deposits are government insured (up to a certain amount) against the institution's failure. In recent years, the availability of free or low-cost checking accounts has reportedly diminished, and fees associated with checking accounts have grown. The most common fees that checking account consumers incur are overdraft and nonsufficient fund fees. Consumers can incur an overdraft when they transact below their account balance, and the bank or credit union covers the negative balance for the consumer for a fee. In general, negative balance episodes are short in duration. According to the CFPB, half of all episodes last three or fewer days, and more than three-quarters last a week or less. Overdraft services can help consumers pay bills on time. However, overdraft fees can be costly, particularly for consumers who are inattentive or tend to overspend due to tight budgets and mental accounting biases. CFPB research suggests that a small number of checking account holders incur most overdraft fees, with 8.3% of consumers overdrafting more than 10 times per year and accounting for 73.7% of overdraft fees. According to the CFPB, these frequent overdrafters tend to be more credit constrained, have lower credit scores, and are less likely to have a general-purpose credit card than the general U.S. population. In 2009, a provision of the CARD Act required consumers to affirmatively opt in for overdraft coverage of ATM withdrawals and nonrecurring deb i t card transactions. Since this requirement was implemented, opt-in rates have tended to vary by bank , from single-digit percentages to more than 40% within particular institutions . Frequent overdrafters who opt in to overdraft services seem to have similar characteristics to those who do not opt in, but tend to pay more in fees. Given this research, consumer advocates have raised concerns about whether overdraft programs are sufficiently transparent and whether consumers receive sufficient disclosures regarding these programs. Advocates have also questioned how financial institution practices influence the opt-in decision. Overdrafts may be caused by the lapse of time between payment authorization, account settlement, and when funds are available to the consumer. Because of these time lapses in the payments system, some consumers may not realize no funds are available when they overdraft their account. For this reason, some argue that a faster payment system or other financial planning products may help consumers keep better track of their balances, preventing overdrafts. Overdraft fees may lead to involuntary checking account closures, leaving some households without access to a bank account. According to the FDIC, in 2017, 6.5% of households were unbanked , meaning that no one in the household had a checking or savings account from an insured institution. Unbanked households tend to be younger and are more likely to be racial or ethnic minorities than the general U.S. population. The main reasons households cite for not having a bank account include insufficient account funds, not trusting banks, and high account fees. Moreover, in 2017, an additional 18.7% of households were underbanked , meaning that the household obtained financial products or services outside of the banking system, products sometimes called alternative financial services. Certain observers contend that financial outcomes for the unbanked and underbanked would be improved if banksâwhich may be a more stable source of relatively inexpensive financial services relative to certain alternativesâwere more active in serving these customers. For this reason, policymakers and observers will likely continue to explore ways to make banking more accessible to a greater portion of the population. However, it may be expensive for banks to serve these customersâfor example, they might have low-balance accounts. At least some of these consumers may be served better by alternative financial providers if their products are less expensive or if they provide more customer service than banks. General-purpose prepaid cards may be considered an alternative to a traditional checking account, and they can be obtained through a bank, at retail stores, or online. These cards can be used in payment networks, such as Visa or MasterCard. It is also possible to direct deposit payroll checks onto these cards. But unlike checking accounts, funds on prepaid cards are not always federally insured against an institution's failure. According to the Federal Reserve Bank of Boston, almost half of all unbanked households use a general-purpose prepaid card. Although each consumer credit market is unique, certain common aspects of the consumer credit system facilitate the pricing of credit offers and the resolution of delinquencies and defaults for most consumer credit markets. This section discusses two of what this report will refer to as market support systems : the consumer credit reporting system (which helps lenders price consumer loans) and the debt collection market (which helps lenders to collect upon consumer default). Notably, in both these market support systems, consumers do not have the ability to choose the financial institution or entity with whom they engage, and therefore are unable to take their business elsewhere if issues arise. For this reason, when consumer abuses occur in these markets, consumer protection laws and regulations may be particularly important. According to the CFPB, credit reporting and debt collection are the consumer finance markets with by far the most complaints, together accounting for 63% of the total complaints the agency received in 2018 (38% and 25%, respectively). The consumer data industry collects information on consumers, such as financial payment history data, to predict their future financial product performance. This industry includes financial firms who report on consumers' payment behaviors, credit bureaus who collect and store this information, and credit scoring companies that use this data to develop algorithms to predict consumers' future payment behaviors. The three largest credit bureausâEquifax, Experian, and TransUnionâprovide credit reports nationwide. The consumer data industry is important because it significantly affects consumer access to financial products or opportunities. For example, negative or derogatory information on a credit report, such as information stating that a consumer has paid late or defaulted on a loan, may influence a lender to deny a consumer access to credit. The main statue regulating the credit reporting industry is the Fair Credit Reporting Act (FCRA), enacted in 1970. The FCRA requires \"that consumer reporting agencies adopt reasonable procedures for meeting the needs of commerce for consumer credit ... in a manner which is fair and equitable to the consumer, with regard to the confidentiality, accuracy, relevancy, and proper utilization of such information.\" Among other things, the FCRA establishes permissible uses of credit reports and imposes certain responsibilities on those who collect, furnish, and use the information contained in consumers' credit reports. The FCRA also includes consumer protection provisions. Under the FCRA, a lender must advise a consumer when the lender has used their information from a credit reporting agency (CRA) in taking an adverse action (generally a denial of credit) against the consumer. That information must be disclosed free of charge. Consumers have a right to one free credit report every year (from each of the three largest nationwide credit reporting providers) even in the absence of an adverse action (e.g., credit denial). Consumers also have the right to dispute inaccurate or incomplete information in their reports. After a consumer alerts a CRA of such a discrepancy, the CRA must investigate and correct errors, usually within 30 days. The FCRA also limits the length of time negative information may remain on credit reports. Negative debt collection information typically stays on credit reports for 7 years, even if the consumer pays in full for the item in collection; information about a personal bankruptcy stays on a credit report for a maximum of 10 years. The CFPB has rulemaking and enforcement authorities over all CRAs in connection with certain consumer protection laws, including the FCRA; it also has supervisory authority, or the authority to conduct examinations, over the larger CRAs. In July 2012, the CFPB announced that it would supervise CRAs with $7 million or more in annual receipts, which included 30 firms representing approximately 94% of the market. Inaccurate or disputed consumer data within the credit bureaus' reports is an ongoing concern in this market. Inaccurate information in a credit report may limit a consumer's access to credit in some cases or increase the costs to the consumer of obtaining credit in others. In response to this concern, the CFPB has recently encouraged credit bureaus and financial institutions to improve data accuracy in credit reporting. In 2017, the CFPB released a report of its supervisory work in the credit reporting system. The report discusses the CFPB's efforts to work with credit bureaus and financial institutions to improve credit reporting in three specific areas: data accuracy, dispute handling and resolution, and furnisher reporting. As the report describes, credit bureaus and financial firms have worked with the CFPB to develop data governance and quality control programs to monitor data accuracy. In addition, the CFPB has encouraged credit bureaus to improve their dispute and resolution processes, including making them easier and more informative for consumers. When credit reporting disputes arise, consumers sometimes find it difficult to advocate for themselves because they are not aware of their rights and how to exercise them. According to a CFPB report, some consumers are confused about what credit reports and scores are, find it challenging to obtain credit reports and scores, and struggle to understand the contents of their credit reports. The CFPB provides financial education resources on its website to help educate consumers about their rights regarding consumer reporting. The credit bureaus' websites also provide information about how to dispute inaccurate information, and consumers can contact the credit bureaus by phone or mail. However, debates continue regarding whether these efforts are enough to ensure that consumers can effectively advocate for themselves. Data protection and security are important issues in consumer data reporting, particularly following the announcement, on September 7, 2017, of the Equifax cybersecurity breach that potentially revealed sensitive consumer data information for 143 million U.S. consumers. CRAs are subject to the data protection requirements of Section 501(b) of the Gramm-Leach-Bliley Act (GLBA). Section 501(b) requires the federal financial institution regulators to establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguardâ(1) to insure the security and confidentiality of consumer records and information; (2) to protect against any anticipated threats or hazards to the security or integrity of such records; and (3) to protect against unauthorized access or use of such records or information which could result in substantial harm or inconvenience to any customer. The FTC has the authority to enforce Section 501(b) against CRAs, and it has promulgated rules implementing the GLBA requirement. However, because the FTC has little upfront supervisory or enforcement authority, the agency typically only exercises its enforcement authority after an incident has occurred. When a consumer defaults on a debt, her debt obligations are often collected not by the lender to whom she originally owed the debt, but rather by a third-party debt collector (here in after referred to as a debt collector ) that by contract receives a share of the amount collected on behalf of the original lender or buys the debt obligation in full. In general, a robust debt collection market allows lenders to recoup their losses to the maximum extent possible after a consumer defaults on a loan, leading to lower initial loan costs and more access to credit for consumers. Many America ns experience debt collection. According to a CFPB survey, about one-third of consumers with a credit bureau file reported being contacted in the last year by at least one creditor or collector trying to collect on one or more debt s . Consumers with lower incomes and nonprime credit scores were more likely to report experience with debt collection than consumers with higher incomes and prime credit scores. In 2018, debt from unpaid loans or other financial services account ed for approximately 40 % of debt collection revenue. The other 60% of debt collection revenue includes medical, telecom, and other retail debt . The Fair Debt Collection Practices Act (FDCPA), enacted in 1977, is the primary federal statue regulating the debt collection market and aims \"to eliminate abusive debt collection practices by debt collectors.\" Among other things, it prohibits debt collectors from engaging in certain types of conduct (such as misrepresentation or harassment) when seeking to collect debts from consumers, requires that debt collectors disclose certain information to consumers, and grants consumers the right to dispute an alleged debt. The Dodd-Frank Act granted the CFPB authority to write regulations to implement the FDCPA, both regarding debt collectors as defined in the FDCPA and those who collect debt related to a consumer financial product service as defined in the Dodd-Frank Act. The CFPB also has enforcement authorities over the debt collection market and supervisory authority, or the authority to conduct examinations, over nonbank firms with more than $10 million in annual receipts from consumer debt collection activities. The FDCPA requires that, after a debt collector initially contacts a consumer, the collector must send the consumer a validation notice (generally, a notice disclosing certain information about the debt to the consumer). Thereafter, a debt collector can call, send letters, and use other methods to contact the consumer to collect an alleged debt. In general, debt collectors expect that they will collect only a fraction of the face value of any particular debt, knowing that some consumers will never pay back their debt in full. Therefore, when a third-party debt collector contacts a consumer, both parties can negotiate the amount and payment schedule of the debt. Although debt collectors are not required to furnish information about the debt to credit bureaus, they may do so. According to the CFPB, debt collectors generally choose not to furnish data to credit bureaus due to the cost and potential legal liability, though most debt collectors furnish data occasionally. If a consumer does not settle a debt, the debt owner often has several options, such as seizing the collateral for secured loans (e.g., car, home) or garnishing a consumer's wages after obtaining a court order. According to CFPB research, \"the cost of filing a claim plays a large role in litigation decisions and varies significantly across jurisdictions based on differences in factors such as filing fees and what types of collections claims can be brought in small claims court.\" More than half of filed suits lead to default judgments in favor of the debt owner, often because consumers fail to appear in court. Consumers who cannot pay their debts may seek relief through the federal bankruptcy process, which is generally governed by the Bankruptcy Code. In general, the bankruptcy process allows a consumer to enter a court-administered proceeding by which the consumer can discharge certain debts and thus obtain a fresh start. However, consumers may face negative repercussions by choosing bankruptcy, for example, a lower credit score and reduced access to credit for several years afterward. In 2005, Congress enacted the Bankruptcy Abuse Prevention and Consumer Protection Act (BAPCPA), in response to what some perceived as a high number of consumer bankruptcy filings. While BAPCPA made a number of amendments to the Bankruptcy Code, for the purposes of this report, its most notable change was to impose a \"means test\" to determine whether consumers are eligible for certain relief under the Bankruptcy Code. In addition to the federal bankruptcy process, many states limit the length of time consumers are legally obligated to pay a debt. Ongoing concerns relating to debt collection include debts incorrectly attributed to consumers or for incorrect amounts; consumers' inability to advocate for themselves through the process; and consumers' inability to avoid abusive practices from debt collectors. According to a CFPB survey, more than half of consumers who had been contacted about a debt in collection reported that there was an error as to at least one such debt, and over a quarter disputed the debt with the debt collector. People with higher incomes and older people were more likely than lower-income and younger people to report disputing a debt, although reported errors did not vary significantly based on demographics. These verification issues may exist because debt collectors are not required to obtain a debt's full files from the original lender. Sometimes, the original lender conveys only basic information to the debt collector unless a consumer disputes the debt, reducing costs for debt collectors. In addition, the minimum amount of information that must be included in debt validation notices under FCRA might not be sufficient for some consumers to recognize their debts, according to the CFPB. Recent consumer complaints to the CFPB find similar verification issues. In 2018, the most common debt collection complaints to the CFPB asserted that debt collectors had attempted to collect a debt the consumer did not owe (44%); a consumer received insufficient written notification about a debt, such as not enough information to verify the debt or not learning about a debt until it was on a credit report (24%); and general complaints about a debt collector's communications tactics, such as frequent or repeated calls (12%). To address some of these concerns, the CFPB recently issued a proposed rule that would clarify what information debt collectors should disclose to consumers and how they should communicate with consumers under FCRA. For all of the consumer financial markets described in this report, the societal goal is that each market will create a transparent and competitive price that leads to an efficient market outcome. As described earlier in the report, government policy can potentially correct market failures, such as information asymmetries or behavioral biases, to bring the market to a more efficient outcome, maximizing social welfare. Yet, government policy can lead to unintended consequences as well. Policy changes will typically impose costs and benefits, but these effects can be difficult to calculate in advance of a new law or regulation. It is often challenging to determine whether a policy intervention will help or harm market efficiency. ", "summary": "Consumer finance refers to the saving, borrowing, and investment choices that households make over time. These financial decisions can be complex and can affect households' financial well-being both now and in the future. Safe and affordable financial services are an important tool for most American households to avoid financial hardship, build assets, and achieve financial security over the course of their lives. Understanding why and how consumers make financial decisions is important when considering policy issues in consumer financial markets. Households borrow money for the following common reasons: investmentsâsuch as a home or educationâto build future wealth, consumption smoothing (i.e., paying later to consume things now), and emergency expenses. Most households rely on credit to finance some of these expenses, because they do not have enough money saved to pay for them. According to the Federal Reserve Bank of New York, mortgage debt is by far the largest type of debt for households, accounting for approximately 67% of household debt. Student debt is the second-largest household debt, followed by auto loans and credit cards. Consumer financial markets generally share similar market dynamics. In all of these markets, consumers often act in similar ways when making financial decisions and firms tend to act in comparable ways to attract consumers. Therefore, the government tends to consider similar policy interventions when regulating in these markets. Competitive free markets generally lead to efficient distributions of goods and services to maximize value for society. Yet sometimes, free markets are inefficient when particular issues arise. Common issues in consumer financial markets include (1) information asymmetries between financial firms and consumers and (2) behavioral biases that predictably bias consumers when making financial decisions. In these cases, government policy can potentially correct market failures to bring the market to a more efficient outcome, maximizing social welfare. In consumer finance, three types of policy interventions are common: (1) standardized consumer disclosures; (2) regulation to prevent deceptive, unfair, or abusive financial institution practices; and (3) regulation to prevent discrimination in consumer-lending markets. Yet, policymakers need to be aware of unintended consequences of proposed policies, and often find it challenging to determine whether a policy intervention will help or harm a particular market's efficiency. In response to the 2007-2009 financial crisis, the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank; P.L. 111-203 ) established the Bureau of Consumer Financial Protection (CFPB) to implement and enforce federal consumer financial law while ensuring consumers can access financial products and services. The CFPB's authorities fall into three broad categories: rulemaking , writing regulations to implement laws under its jurisdiction ; supervision , the power to examine and impose reporting requirements on financial institutions; and enforcement of various consumer protection laws and regulations. The CFPB generally has regulatory authority over providers of an array of consumer financial products and services. The major consumer financial markets include mortgage lending, student loans, automobile loans, credit cards and payments, payday loans and other credit alternative financial products, and checking accounts and substitutes. In addition, two important market structures allow these consumer financial products to be offered: (1) the consumer credit reporting system and (2) the debt collection market. These aspects of the consumer credit system facilitate the pricing of credit offers and the resolution of delinquent consumer credit products for most consumer credit markets.", "document_type": "crs"}
{"report": "Article III, Section I of the Constitution provides that the \"judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish.\" Consequently, Congress determines through legislative action both the size and structure of the federal judiciary. For example, the size of the federal judiciary is determined, in part, by the number of U.S. circuit and district court judgeships authorized by Congress. Congress has, at numerous times over the years, authorized an increase in the number of such judgeships in order to meet the workload-based needs of the federal court system. The Judicial Conference of the United States, the national policymaking body of the federal courts, makes biennial recommendations to Congress to assist it in identifying any U.S. circuit and district courts that may be in need of additional judgeships. The most recent recommendations for new U.S. circuit and district court judgeships were released by the Judicial Conference in March 2019. U.S. courts of appeals, or circuit courts, take appeals from U.S. district court decisions and are also empowered to review the decisions of many administrative agencies. When hearing a challenge to a district court decision from a court located within its geographic circuit, the task of a court of appeals is to determine whether or not the law was applied correctly by the district court. Cases presented to U.S. circuit courts are generally considered by judges sitting in three-member panels (circuit courts do not use juries). The nation is divided into 12 geographic circuits, each with a U.S. court of appeals. There is also one nationwide circuit, the U.S. Court of Appeals for the Federal Circuit, which has specialized subject matter jurisdiction. Altogether, 179 judgeships for these 13 circuit courts are currently authorized by law (167 for the 12 regional circuits and 12 for the Federal Circuit). The First Circuit (comprising Maine, Massachusetts, New Hampshire, Rhode Island, and Puerto Rico) has the fewest number of authorized judgeships, 6, while the Ninth Circuit (comprising Alaska, Arizona, California, Hawaii, Idaho, Montana, Nevada, Oregon, and Washington) has the most, 29. U.S. district courts are the federal trial courts of general jurisdiction. These trial courts determine facts and apply legal principles to resolve disputes. Trials are conducted by a district court judge (although a U.S. magistrate judge may also conduct a trial involving a misdemeanor). Each state has at least one district court (there is also one district court in each of the District of Columbia and Puerto Rico). States with more than one district court are divided into judicial districts, with each district having one district court. For example, California is divided into four judicial districtsâeach with its own district court. Altogether there are 91 U.S. district courts. There are 673 Article III U.S. district court judgeships currently authorized by law. Congress has authorized between 1 and 28 judgeships for each U.S. district court. Specifically, the district court for the Eastern District of Oklahoma (Muskogee) has 1 authorized judgeship, the smallest number among U.S. district courts. The district courts located in the Southern District of New York (Manhattan) and the Central District of California (Los Angeles) each have 28 authorized judgeships, the most among U.S. district courts. Congress first exercised its constitutional power to determine the size and structure of the federal judiciary with passage of the Judiciary Act of 1789. The act authorized 19 judgeships, 13 for district courts and 6 for the Supreme Court. Congress, however, began expanding the size of the judiciary almost immediatelyâadding two additional district court judgeships in 1790 and another in 1791. As the population of the country increased, its geographic boundaries expanded, and federal case law became more complex, the number of judgeships authorized by Congress continued to increase during the 19 th and 20 th centuries. By the end of 1900 Congress had, under Article III, authorized a total of 28 U.S. circuit court judgeships and 67 district court judgeships. By the end of 1950, there were an additional 37 circuit court judgeships authorized (for a total of 65) and 145 additional district court judgeships (for a total of 212). By the end of 2000, there were a total of 179 circuit court judgeships and 661 district court judgeships. At present, there remain 179 circuit court judgeships, while the number of district court judgeships has increased to 673. Figure 1 shows the change, over time, in the number of U.S. circuit and district court judgeships authorized by Congress from 1891 through 2018. The largest increase in the number of circuit court judgeships occurred in 1978 during the 95 th Congress when the number of judgeships increased by 35, from 97 to 132. The second-largest increase occurred in 1984 during the 98 th Congress when the number of judgeships increased by 24, from 144 to 168. The next-largest increase in circuit court judgeships also occurred during the 97 th Congressâin 1982 the number of circuit court judgeships increased by 12, from 132 to 144. The 12 judgeships authorized by Congress in 1982 were for the newly established U.S. Court of Appeals for the Federal Circuit. The number of circuit court judgeships increased to 179 in 1990 during the 101 st Congress and has remained at that number to the present day. This represents the longest period of time since the creation of the U.S. courts of appeals in 1891 that Congress has not authorized any new circuit court judgeships. The largest increase in the number of district court judgeships occurred in 1978 during the 95 th Congress when the number of judgeships increased by 117, from 394 to 511. The next-largest increase in district court judgeships occurred in 1990 during the 101 st Congress when the number of judgeships increased by 74, from 571 to 645. The third-largest increase in the number of district court judgeships occurred in 1961 during the 87 th Congress when the number of judgeships increased by 62, from 241 to 303. The number of permanent district court judgeships increased to 663 in 2003 during the 108 th Congress and has remained at that number to the present day. This represents the longest period of time since district courts were established in 1789 that Congress has not authorized any new permanent district court judgeships. The ratio of the number of authorized district court judgeships to circuit court judgeships has also varied during this period. In 1899 there were 2.3 district court judgeships authorized for every circuit court judgeship (this was the lowest value in the ratio of district to circuit court judgeships). In contrast, in 1970 there were 4.1 district court judgeships authorized for every circuit court judgeship (this was the highest value in the ratio of district to circuit court judgeships). The median ratio of district court judgeships to circuit court judgeships during the entire period (from 1891 through 2018) was 3.5. Most recently, for each year from 2010 through 2018, there were 3.8 district court judgeships for every circuit court judgeship authorized by Congress. In some instances, Congress has authorized the creation of temporary judgeships rather than permanent judgeships. A permanent judgeship , as the term suggests, permanently increases the number of judgeships in a district or circuit, while a temporary judgeship increases the number of judgeships in a district or circuit for a limited period of time. Temporary judgeships are sometimes considered preferable by Congress if a court is dealing with an increased workload deemed to be temporary in nature (e.g., when workload increases as a result of new federal legislation or a recent Supreme Court ruling) or if Congress is uncertain about whether a recent workload increase is temporary or permanent in nature. Once a temporary judgeship is created, Congress may later choose to extend the existence of a temporary judgeship beyond the date it was initially set to lapse or expire. When extending a temporary judgeship, Congress specifies the number of years the judgeship will continue to exist. Congress can also convert a temporary judgeship to a permanent one. If Congress does not extend a temporary judgeship or change it to a permanent one, the temporary judgeship eventually lapses. If a judgeship lapses it means that, for the court with the temporary judgeship, the first vacancy on or after a specified date is not filled. By not filling the first vacancy that arises after a temporary judgeship lapses, the number of judgeships for a court returns to the number authorized by Congress prior to the authorization of the temporary judgeship. At present, there are 179 permanent U.S. circuit court judgeships and no temporary circuit court judgeships. Additionally, there are 663 permanent U.S. district court judgeships and 10 temporary district court judgeships. These temporary judgeships are listed alphabetically by state in Table 1 . Congress has a variety of legislative vehicles at its disposal to establish new U.S. circuit and district court judgeships. Legislation that authorizes new judgeships must pass both the House and Senate (and is also subject to a presidential veto). Such legislation does not always involve either or both of the House and Senate Judiciary Committees. As discussed further below, Congress has sometimes used the appropriations process to provide the judiciary with additional district court judgeships. If it desires to create a relatively large number of judgeships at one time, Congress may choose to use an \"omnibus judgeships bill.\" An omnibus judgeships bill, for the purposes of this report, is either a stand-alone bill or a title of a larger bill concerned exclusively or mostly with the creation of federal judgeships. Since 1977 Congress has enacted three omnibus judgeship bills, with the most recent omnibus bill enacted in 1990. Information related to these three pieces of legislation is presented in Table 2 . Each of the three omnibus bills was first introduced in the House and referred to the House Committee on the Judiciary. The Omnibus Judgeship Act of 1978 passed the House in its final form by a vote of 292-112 and the Senate by a vote of 67-15. The Bankruptcy Amendments and Federal Judgeship Act of 1984 passed the House in its final form by a vote of 394-0 and the Senate by voice vote. Most recently, the Federal Judgeship Act of 1990 passed both the House and Senate in its final form by voice vote. Each of the three bills was passed in a different political context (in terms of whether there was unified or divided party control of the presidency and Congress). In 1978, there was unified Democratic control of the presidency, the Senate, and the House. In 1984, there was divided party controlâwith Republicans controlling the presidency and Senate while Democrats were the majority party in the House. Finally, in 1990, there was also divided party controlâwith Republicans controlling the presidency and Democrats holding majorities in both the Senate and House. Since the last omnibus judgeships bill passed Congress in 1990, the overall workload of U.S. circuit and district courts has increased. From 1990 through the end of FY2018, filings in the U.S. courts of appeals increased by 15%, while filings in U.S. district courts increased by 39%. In terms of specific types of cases, civil cases increased by 34% during the same period, and cases involving criminal felony defendants increased by 60%. For civil cases, the greatest growth occurred in cases related to personal injury liability; many of these filings are part of multidistrict litigation actions involving pharmaceutical cases. In the past, Congress has at times created a relatively smaller number of judgeships through other legislative vehicles. In recent years this has been the most common method of creating new judgeships, with Congress authorizing a relatively small number of new judgeships using appropriations and authorization bills. This has occurred on three occasions in the past 19 years and has involved only the creation of new district court judgeships (not circuit court judgeships). Overall, 34 new district court judgeships were created between 1999 and 2003 using appropriations and authorization bills. Information related to these three pieces of legislation is presented in Table 3 . The Consolidated Appropriations Act of 2000 received final approval in the House by a vote of 296-135 and in the Senate by a vote of 74-24. The District of Columbia Appropriations Act of 2001 passed in its final form in the House by a vote of 206-198 and in the Senate by a vote of 48-43. The 21 st Century Department of Justice Appropriations Authorization Act passed in its final form in the House by a vote of 400-4 and in the Senate by a vote of 93-5. Each of the three bills was passed during periods of divided party control. In 1999 and 2000, Democrats held the presidency while Republicans held both the House and Senate. In 2002, Republicans held the presidency and were the majority party in the House while Democrats were the majority party in the Senate. Congress has also routinely used appropriations bills to extend temporary district court judgeships that were initially authorized in prior years. Additionally, Congress has used an authorization bill to convert several temporary district court judgeships to permanent ones. Finally, Congress may choose to establish new judgeships when passing an act that would, at least in part, restructure the federal judiciary. This occurred, for example, in 1982 when Congress created the U.S. Court of Appeals for the Federal Circuit. The creation of the Federal Circuit was a partial restructuring of the judiciary by Congress, as it led to merging the U.S. Court of Customs and Patent Appeals with the appellate jurisdiction of the U.S. Court of Claims to create the new Federal Circuit. In creating the new court, Congress authorized 12 permanent circuit court judgeships. While Congress is constitutionally responsible for determining the size and structure of the federal judiciary, the judiciary itself can recommend legislation that alters or affects the size and structure of the federal court system. This includes legislation to increase the number of U.S. circuit and district court judgeships (and to identify which judicial circuits and districts are most in need of new judgeships). The Judicial Conference of the United States, the national policymaking body for the federal courts, is the institutional entity within the judiciary that is responsible for making the judiciary's recommendations for new judgeships. The Judicial Conference may recommend to Congress that new judgeships be either permanent or temporary. Additionally, the Judicial Conference may recommend that a temporary judgeship be extended or converted into a permanent one, or that a judgeship serving multiple districts be assigned to a single judicial district or dual districts. The Judicial Conference makes its judgeship recommendations biennially, typically in March or April at the beginning of a new Congress. In long-standing practice, the Judicial Conference, through its committee structure, periodically reviews and evaluates the judgeship needs of all U.S. circuit and district courts. Specifically, the Conference uses a formal survey process to determine if any courts require additional judges in order to appropriately administer civil and criminal justice in the federal court system. The multistep survey process is conducted biennially by the Conference's Subcommittee on Judicial Statistics and takes into account current workload factors and the local circumstances of each court. The process is very similar for both the courts of appeals and the district courts. First, a court submits a detailed justification for additional judgeships to the Subcommittee on Judicial Statistics. The subcommittee then reviews and evaluates the court's request and prepares an initial recommendation that is given to both the court and the judicial council for the circuit where the requesting court is located. The circuit judicial council itself then reviews the new judgeship request and makes its recommendation to the subcommittee (which subsequently does a second analysis using the most recent caseload data). The subcommittee prepares its final judgeship recommendation for approval by the Committee on Judicial Resources. The committee's recommendation is then provided to the Judicial Conference for final approval (prior to being transmitted to Congress). This multistep evaluation and recommendation process is used for each court that submitted a new judgeship request to the subcommittee. In evaluating a court's judgeship request the Judicial Conference examines whether certain caseload levels have been met, as well as court-specific information that might uniquely affect the court making the request. The caseload levels of the courts determine the standards by which the Judicial Conference begins to consider any requests for additional judgeships. The caseload level of a court is expressed as filings per authorized judgeship, assuming all vacancies on the court are filled. The specific measure or statistic related to case filings that the Judicial Conference examines for U.S. circuit courts is called adjusted filings per panel . The standard used by the Judicial Conference as its starting point for evaluating any judgeship request by a circuit court is 500 adjusted filings per panel (based on authorized judgeships). The specific measure related to case filings that the Judicial Conference examines for U.S. district courts is called weighted filings per authorized judgeship . The standard used by the Judicial Conference as its starting point for evaluating any judgeship request by a district court is 430 weighted filings per authorized judgeship after accounting for any additional judgeships that would be recommended by the Conference. For smaller district courts, however, with fewer than 5 authorized judgeships, the standard used is current weighted filings above 500 per judgeship (since accounting for any new judgeships in the calculation would often reduce, for these smaller courts, the weighted filings per authorized judgeship below the 430 level). While caseload statistics are important in evaluating a court's request for additional judgeships, the Judicial Conference also considers court-specific information that might affect the judgeship needs of a particular court. According to the Administrative Office of U.S. Courts, \"other factors are also considered that would make a court's situation unique and provide support either for or against a recommendation for additional judgeships.\" These factors include the availability of senior, visiting, and magistrate judges to provide assistance; geographic factors; unusual caseload activity; temporary increases or decreases in a court's workload; and any other factors that an individual court highlights as important in the evaluation of its judgeship needs. The Judicial Conference's most recent recommendations to Congress for new circuit and district court judgeships were made in March 2019. The Conference recommended that Congress authorize 5 new circuit court judgeships and 65 new permanent district court judgeships (as well as convert 8 existing temporary district court judgeships to permanent status). The Judicial Conference recommended that Congress establish five new judgeships for the U.S. Court of Appeals for the Ninth Circuit given its \"consistently high level of adjusted filings [per three-judge panel]\" and the court's \"heavy pending caseload.\" In June 2018, the Ninth Circuit had 740 adjusted filings per panel (the third highest among the 11 regional circuits). Congressional authorization of 5 additional judgeships for the Ninth Circuit would increase the number of authorized judgeships for the circuit from 29 to 34 and increase the total number of circuit court judgeships, nationally, from 179 to 184. The Judicial Conference recommended that Congress establish 65 new judgeships for 27 judicial districts (with more than one judgeship recommended for some districts) and convert 8 temporary district court judgeships to permanent positions. Figure 2 shows the 27 judicial districts for which the Conference has recommended new judgeships. Of the 27 districts, the Conference recommended the creation of more than one new judgeship in 15 (or 56% of districts). The greatest number of new judgeships, 10, was recommended for the Central District of California (composed of Los Angeles County and six other counties). The Central District of California is the most populous judicial district in the country, with a population of nearly 19.5 million. Of the 73 new district court judgeships recommended by the Judicial Conference (which includes converting 8 temporary judgeships to permanent positions), 45 (or 62%) are recommended for district courts located in the country's three most populous statesâCalifornia, Texas, and Florida. Of the 45 judgeships, 23 are recommended for district courts in California, 11 for courts in Texas, and 11 for courts in Florida. Altogether, there are 10 new judgeships recommended for district courts located in four southwestern states (Arizona, Colorado, Nevada, and New Mexico). There are also nine new judgeships recommended for district courts located in three northeastern states (Delaware, New Jersey, and New York). The remaining nine judgeships are recommended for courts located in other states. Many of the U.S. district courts recommended to receive new judgeships hold court in some of the nation's most populous citiesâincluding, but not limited to, Dallas (Northern District of Texas); Houston (Southern District of Texas); Jacksonville (Middle District of Florida); Los Angeles (Central District of California); New York City (Southern District of New York); Phoenix (District of Arizona); San Antonio (Western District of Texas); San Diego (Southern District of California); San Francisco (Northern District of California); and San Jose (Northern District of California). During the Judicial Conference's March 2011 proceedings, the Conference authorized the Director of the Administrative Office of U.S. Courts to pursue separate congressional legislation for Conference-approved additional judgeships for certain district courts meeting a designated threshold of weighted filings. The purpose of such a policy change was to enable the Director \"to focus Congress' attention on those courts determined to have the greatest need based on specific parameters.\" The Conference's most recent recommendations identified six district courts with an urgent need for new judgeships, stating that these particular courts \"continue to struggle with extraordinarily high and sustained workloads.\" These district courts include the Western District of Texas, Eastern District of California, Southern District of Florida, Southern District of Indiana, and the Districts of New Jersey and Delaware. The \"severity of conditions\" in these districts, according to the Conference, \"require immediate action.\" Consequently, the Conference urged Congress \"to establish, as soon as possible, new judgeships in those districts.\" The Conference's final judgeship recommendations describe select caseload statistics for each of these six district courts. These descriptions, provided in part below, are based upon the biennial survey process conducted by the Conference's Subcommittee on Judicial Statistics. The Conference's recommendations, quoted at length below, note the change in different types of filings that occurred between September 2017 and June 2018. The September 2017 date was used as the \"cut-off date\" by the subcommittee to make its initial judgeship recommendations (it was the most recent date for which the subcommittee had caseload data prior to the start of the survey process). The June 2018 reporting date was used by the subcommittee to make its final judgeship recommendations (it was the most recent date for which the Conference had caseload data available prior to submitting its recommendations to Congress). Western District of Texas . From September 2017 to June 2018, overall filings in the court increased by 13% \"due to an increase in criminal felony filings. Criminal filings rose 28 percent due to a 48 percent increase in immigration filings. The increase was partially offset by moderate declines in drug and fraud prosecutions. Criminal filings are now the highest in the nation at 644 per judgeship. The number of civil cases filed fell three percent as declines in prisoner petitions and private contract litigation more than offset increases in tort actions, copyright litigation, and patent filings.\" The Conference also notes that the number of supervised release hearings declined 11% but is currently more than twice the national average at 109 per judgeship. Eastern District of California . The \"number of civil cases filed [excluding contract actions related to a multidistrict litigation action] rose four percent as cases related to the Fair Debt Collection Practices Act more than doubled and prisoner petitions rose substantially, more than offsetting a decline in real property litigation. Civil filings continue to exceed 700 per judgeship, among the highest in the nation [even if the multidistrict litigation action is excluded]. The number of criminal felony filings rose 12 percent as a result of increases in most types of offenses, the largest of which occurred in firearms prosecutions.\" The Conference also notes that criminal filings in the Eastern District of California, at 99 per judgeship, remain below the national average. Southern District of Florida . The overall filings in the district \"rose two percent due to moderate increases in both civil and criminal filings. The number of civil cases filed rose three percent as increases in insurance contract cases, torts filings, and civil rights litigations were partially offset by declines in Fair Labor Standards Act cases, prisoner petitions, cases related to the Fair Debt Collection Practices Act, and social security appeals....The number of criminal felony filings increased two percent as increases in most offense types, the largest of which occurred in fraud prosecutions, more than offset\" a decline in drug, burglary, larceny, and theft filings. The Conference also notes that the district court's pending caseload \"remains substantially below the national average.\" Southern District of Indiana . Since September 2017, \"the court experienced an influx of over 2,200 personal injury product liability filings related to a multidistrict litigation (MDL) action in which the district serves as the transferee court. Apart from these cases, overall filings fell two percent as a decline in civil filings was partially offset by an increase in criminal filings. The number of civil cases filed decreased four percent as declines in social security appeals, civil rights cases, and federal prisoner petitions were partially offset by an increase in state prisoner petitions. The number of criminal felony filings rose 16 percent due almost entirely to a 63 percent rise in firearms prosecutions.\" The Conference also notes, however, that criminal filings in the Southern District of Indiana, at 108 per judgeship, remain \"slightly below\" the national average. District of New Jersey . Excluding certain types of cases, \"overall filings rose 10 percent due to increases in both civil and criminal felony filings. The number of civil cases filed ... also rose 10 percent due primarily to increases in copyright litigation, civil rights actions, ERISA filings, land condemnation cases, and social security appeals. A 27 percent increase in criminal filings results from higher number of firearms, drug, fraud, and immigration prosecutions.\" Additionally, the pending caseload for the court \"nearly doubled as a result of the influx of personal injury product liability cases.\" The Judicial Conference also notes that \"despite the increase, criminal filings are among the lowest in the nation at 36 per judgeship.\" District of Delaware . From September 2017 to June 2018, \"overall filings rose seven percent due to an increase in civil filings. The number of civil cases filed rose eight percent due almost entirely to a 20 percent increase in patent litigation. The court has the highest number of patent filings in the nation, which have risen substantially since the Supreme Court's May 2017 decision in TC Heartland LLC v. Kraft Foods Group Brands LLC , which modified the venue standards for patent infringement lawsuits.... Civil filings are now well above the national average at 518 per judgeship.\" In contrast, the \"number of criminal felony filings declined ... as filings of all offense types remained relatively stable.\" Additionally, in its recommendation, the Judicial Conference states that criminal filings in the District of Delaware \"are the 2 nd lowest in the nation at 21 per judgeship.\" As discussed above, the specific statistic used by the Judicial Conference to compare caseloads across U.S. district courts is the number of weighted filings per authorized judgeship for each court. Figure 3 shows the number of weighted filings per judgeship for each of the 27 district courts included in the Conference's most recent recommendation to Congress. The national average of 521 weighted filings per authorized judgeship is shown by the reference line in the figure. For the 27 district courts where the Judicial Conference recommends additional judgeships (including conversion of existing temporary judgeships to permanent status), weighted filings averaged 646 per authorized judgeship. Of the 27 district courts recommended to receive additional judgeships, 5 courts have caseloads that fall below 500 weighted filings per authorized judgeship; 6 have 500 to 599 weighted filings; 8 courts have 600 to 699 weighted filings; 4 courts have 700 to 799 weighted filings; 1 court has 800 weighted filings; and 3 courts have more than 1,000 weighted filings. The five districts listed in Figure 3 with the greatest number of weighted filings are among the six U.S. district courts discussed above as having the most urgent need for additional judgeships (the remaining district, the Southern District of Florida, has the seventh-highest number of weighted filings). A plurality of the U.S. district courts listed in Figure 3 last had a permanent judgeship authorized in 1990 (10 of 27, or 37%). Another 8 district courts last had a permanent judgeship authorized prior to 1990 (2 in 1984, 5 in 1978, and 1 in 1954). And 9 district courts last had a permanent judgeship authorized after 1990 (1 in 1999, 5 in 2000, and 3 in 2002). Several of the courts listed in the figure have weighted filings that fall below the national average (521 weighted filings per judgeship), including the District of Nevada, Northern District of Iowa (Cedar Rapids), District of Puerto Rico, Western District of North Carolina (Charlotte), and the District of Kansas. As noted previously, a court's caseload is not the only factor the Judicial Conference considers in evaluating a court's judgeship needs. Consequently, the Conference's recommendations can be based, in part, on additional factors. For example, in its evaluation of the judgeship needs for districts where weighted filings are below the national average, the Conference identifies various reasons why it recommends additional judgeships. Some of the reasons include a substantial decline in senior judge assistance in handling cases, the geographic challenges associated with managing workload imbalances between different courthouses in the district, a high pending caseload relative to other district courts in the nation, and a number of criminal filings that is well above the national average. As discussed above, Congress determines through legislative action the size of the federal judiciary. Consequently, creating additional U.S. circuit and district court judgeships requires congressional authorization of such judgeships. Such authorization can be accomplished by passing legislation devoted solely to judgeships (i.e., \"omnibus judgeships bills\") or by including the authorization in an appropriations bill or other legislative vehicle. Congress may decide not to authorize additional circuit and district court judgeships. If Congress were to authorize such judgeships, it has several options available to it. These include (but are not limited to) the following: Adopting all of the most recent recommendations of the Judicial Conference by creating 5 additional permanent judgeships for the Ninth Circuit and 65 additional permanent judgeships for the district courts specified by the Conference (as well as converting 8 temporary district court judgeships to permanent status). Adopting, in part, the recommendations of the Judicial Conference by creating additional permanent circuit and/or district court judgeships for some of the courts identified by the Conference's biennial review process as needing additional judgeships. Adopting, in part, the Conference's recommendations by authorizing new judgeships only for the six U.S. district courts identified by the Conference as having the most urgent need for such judgeships. It might also include only adopting the Conference's recommendations for converting eight temporary judgeships to permanent status. As presented in Table 1 , each of the current temporary judgeships is set to lapse in 2020 if not further extended or made permanent by Congress. Authorizing new judgeships for circuit and/or district courts that were not recommended for additional judgeships by the Judicial Conference (such judgeships might be permanent or temporary). Congress might conclude on the basis of its own review that there is a need for such judgeships in other courts not included in the Conference's most recent recommendations. For example, the Judicial Conference only assesses a circuit court's need for additional judgeships if at least a majority of active judges serving on the court approve of a request for additional judgeships. Congress may nonetheless decide to authorize additional judgeships for circuit courts where this threshold has not been met. Authorizing new judgeships for some of the courts recommended by the Judicial Conference as needing new judgeships, as well as authorizing new judgeships for other courts not included in the Conference's most recent recommendations. ", "summary": "Congress determines through legislative action both the size and structure of the federal judiciary. Consequently, the creation of any new permanent or temporary U.S. circuit and district court judgeships must be authorized by Congress. A permanent judgeship , as the term suggests, permanently increases the number of judgeships in a district or circuit, while a temporary judgeship increases the number of judgeships for a limited period of time. Congress last enacted comprehensive judgeship legislation in 1990. Since then, there have been a relatively smaller number of district court judgeships created using appropriations or authorization bills. The Judicial Conference of the United States, the policymaking body of the federal courts, makes biennial recommendations to Congress that identify any circuit and district courts that, according to the Conference, require new permanent judgeships to appropriately administer civil and criminal justice in the federal court system. In evaluating whether a court might need additional judgeships, the Judicial Conference examines whether certain caseload levels have been met, as well as court-specific information that might uniquely affect a particular court. The caseload level of a court is expressed as filings per authorized judgeship, assuming all vacancies on the court are filled. The Judicial Conference's most recent recommendation, released in March 2019, calls for the creation of five permanent judgeships for the U.S. Court of Appeals for the Ninth Circuit (composed of California, eight other western states, and two U.S. territories). The Conference also recommends creating 65 permanent U.S. district court judgeships, as well as converting 8 temporary district court judgeships to permanent status. In making its recommendations to Congress, the Judicial Conference also identifies any courts that might have the most urgent need for new judgeships. These courts are considered, by the Conference, to have extraordinarily high and sustained workloads. In its most recent recommendations, the Conference identified six U.S. district courts it considers to have the most urgent need for new judgeships to be authorized by Congress.", "document_type": "crs"}
{"report": "P olicy discussions around issues such as border security, drug trafficking, and the opioid epidemic often involve questions about illicit drug flows into the United States. For instance, while U.S. border officials are charged with facilitating the lawful flow of people and goods, they are also responsible for stopping unauthorized entries and preventing illicit drugs and other contraband from being smuggled into the country. Border security policy debates include questions of how to balance sometimes competing priorities and allocate finite border enforcement resources to respond to various threats. For example, some have questioned where to place border enforcement and drug detection resources to best target the flow of illicit opioids such as heroin, fentanyl, and synthetic opioid analogues being smuggled into the United States. Available data that can help policymakers understand how illicit drugs are trafficked into the United States are often estimated, incomplete, imperfect, or lack nuance. And debates about drug flows and how best to counter drug trafficking into the country often rely on selected data on drug seizures by border officials. This report provides a brief discussion of what data are and are not available to help understand the universe of illicit drugs produced globally as well as what data are and are not available to indicate how much of the illicit drugs produced are destined for and trafficked into the United States. The report illuminates available data on illicit drug seizures by U.S. border officials and discusses potential implications of using these data to inform U.S. policy on drug trafficking into and within the country. One way of conceptualizing the flow of illicit drugs into the United States is as a funnel. At the top of this funnel is the universe of illicit drugs produced around the world. These drugs generally fall into two categories: plant-based (e.g., cocaine, heroin, and marijuana) and synthetic (e.g., methamphetamine and fentanyl). Although some illicit drugs are produced in the United States, many originate elsewhere and are smuggled into the country. See Figure 1 for a depiction of the illicit drug supply chain. The illicit supply chain for plant-based drugs ultimately destined for the United States begins in the agricultural fields of cash crop farmers. These farmers cultivate coca bush, opium poppy, and cannabis plants in locations that are often remote, politically unstable, or insecure. Potential cultivation and its measurement are affected by a variety of factors. For instance, illicit drug crop productivity varies with each harvest and in each location where the crops are grown; it can be dependent on a mix of factors that include weather, plant disease, soil fertility, field maturity, and farming techniques. There are also factors that limit officials' and analysts' abilities to detect, measure, and obtain comprehensive data on the universe of illicit drugs. For example, where ground-based measurements of the crop fields are impractical, analysts rely on satellite imagery of varying picture quality to estimate the amount of land used for illicit crop cultivation. These estimates can be hampered by cloud cover and techniques to obscure the true scale of cultivation (e.g., interspersing illicit crops between legitimate crops, cultivating smaller plots in new locations). While coca bush and opium poppy crop surveillance programs are ongoing in most major source countries, they do not capture all global cultivation. And, in the case of drug crops that can be cultivated indoors or grown in small amounts (such as cannabis), cultivation estimates are often unreliable or unavailable. Moreover, due to changes in survey methodologies and in the areas surveyed, cultivation estimates may not be directly comparable over time. Satellite imagery-based crop survey data are coupled with information derived from crop yield studies, drug processing efficiency tests, and government-reported eradication totals to arrive at estimates of illicit drug production. Where reported eradication cannot be independently verified, such data can be prone to errors. In addition, variations in the process of refining illicit crops into finished products introduce a host of variables that limit the accuracy of drug production estimates. The U.S. Department of State notes \"differences in the origin and quality of the raw material and chemicals used, the technical processing method employed, the size and sophistication of laboratories, the skill and experience of local workers and chemists, and decisions made in response to enforcement pressures all affect production.\" Ultimately, drug production estimates are calculated in terms of \"potential pure\" illicit drugs by volume, which assumes that all harvested illicit drug crops are converted into illicit drugs, though this assumption may not hold in all circumstances. In Asia, for example, where opium poppy is often consumed as opium rather than processed further into heroin, the State Department acknowledges that the proportion of opium ultimately processed into heroin is \"unknown.\" At each stage in the illicit drug development cycle, added variables further complicate the ability of analysts to accurately estimate the true amount of illicit drugs produced. Unlike plant-based drugs, whose cultivation footprint can provide a starting point for estimating potential drug production, the illicit supply chain for synthetic drugs ultimately destined for the United States begins in chemical manufacturing and pharmaceutical facilities. Although the import and export of some chemical inputs (precursors) used in illicit synthetic drug production are internationally regulated, others are notâand the trade data for such chemicals are not necessarily current, available for all countries, or indicative of diversion trends. For example, the Combat Methamphetamine Epidemic Act of 2005 (CMEA; Title VII of P.L. 109-177 ) requires the State Department to conduct annual economic analyses on global production of and demand for three precursor chemicals commonly used in the production of methamphetamine, but its efforts have been hampered by data limitations. The State Department has noted that \"[e]phedrine and pseudoephedrine pharmaceutical products are not specifically listed chemicals under the 1988 U.N. Drug Convention. Therefore, reporting licit market trade and demand for ephedrine and pseudoephedrine as well as pharmaceutical products derived from them is voluntaryâ¦. Thus far, the economic analysis required by the CMEA remains challenging because of outdated, insufficient, and unreliable data.\" Challenges in acquiring and analyzing relevant data on synthetic drug production and precursor chemicals used in illicit drug production are further compounded by the proliferation of new psychoactive substances (NPS)âmolecularly altered variants, or synthetic analogues, of known illicit substances that are not internationally controlled and thus designed to avoid detection by authorities. NPS also include fentanyl analogues destined for the United States. Law enforcement authorities around the world have reported to the United Nations more than 850 uncontrolled NPS as of the end of 2018. The next step in the supply chain of illicit drugs produced abroad and destined for the United States is the transit of these substances toward and into the country, as depicted in Figure 1 . The United States, while a major consumer of illicit drugs, is just one of many drug consumption markets. Of the illicit drugs that are produced around the world, some may be consumed in the country of production, some may be destined for the United States, and some may be intended for an alternate market. Of those drugs intended to be moved to the United States, some may become degraded or lost in transit, some may be seized by law enforcement or otherwise destroyed or jettisoned by traffickers pursued by enforcement officials, and some reach the U.S. border. The challenge of estimating drug flows in transit is a longstanding one. While there are estimates of certain types of illicit drugs produced in certain countries that are subsequently bound for the U.S. market, there is not a comprehensive publicly available dataset detailing the estimated amount of each type of illicit drug produced in each source country that is suspected to be destined for the United States. However, snapshots of these data exist. One of these datasets is the Consolidated Counterdrug Database (CCDB), managed by the Office of the U.S. Interdiction Coordinator. According to the U.S. Government Accountability Office (GAO), the CCDB \"records drug trafficking events, including detections, seizures, and disruptions. The database is vetted quarterly by members of the interagency counterdrug community to minimize duplicate or questionable reported drug movements.\" Specifically, it records drug trafficking events, which helps provide estimates on illicit drugs, particularly cocaine, destined for the United States via the transit zone from South America. Of the unknown total amount of drugs that reach the U.S. border by land, air, or sea, some portion is seized by border officials, and some portion makes its way into the country. While the pro portion of illicit drugs coming into the country that are seized at the border is unknowable, the amount of illicit drugs seized is. It is this snapshot of seizure data that has served as a point of reference for current policy debates surrounding border security and drug flows into the country. There are no exact data on the total quantity of foreign-produced illicit drugs flowing into the United States. Indeed, a fundamental element to understanding drug smuggling is the acknowledgement that the total flow of drugs crossing the borderâat and between ports of entry (POEs) âinto the United States is unknowable. As reflected in Figure 1 , as illicit drugs are brought to the border of the United States, they generally fall into two initial categories: drugs that are detected and seized by officials at the border, and drugs that, whether detected or not, are not seized by officials at the border. Illicit drugs that are detected and seized at the border during inbound inspections are quantifiable. Those drugs that are not seized at the border are generally not quantifiable at the time they enter the country. However, some portion of illicit drugs successfully smuggled across the border may later be seized by law enforcement officers. The largely unknown subset of foreign-produced drugs that enter the country but are not seized by officials during inbound inspections at the border is divided into two categories: drugs that are later detected and seized by federal, state, local, or tribal officials; and drugs that, whether detected or not, are not seized by officials. Illicit drugs not seized at the border enter the United States where there are also domestically produced drugs. As such, drugs that are later seized by federal, state, local, or tribal officials in the United States may be of foreign or domestic origin. These drugs may be seized in the interior of the country or by border officials conducting outbound inspections of people and goods leaving the country. In the absence of data on the flow of all illicit drugs entering the United Statesâboth those that are seized and those that successfully evade enforcement officialsâpolicymakers can use certain drug seizure data to better understand how and where drugs are crossing U.S. borders. While a number of agencies may be involved in seizing illicit drugs in the border regions, the primary agency charged with safeguarding the U.S. border (including seizing illicit drugs and other contraband) is U.S. Customs and Border Protection (CBP). Within CBP, the Office of Field Operations (OFO) is responsible for staffing POEs, and drugs seized by OFO are generally seized at POEs . In addition, the Border Patrol is responsible for patrolling the land borders with Mexico and Canada, and the coastal waters surrounding Florida and Puerto Rico; given its responsibilities, drugs seized by the Border Patrol are generally drugs seized between POEs . CBP publishes selected enforcement statistics, including a snapshot of illicit drug seizuresâof marijuana, cocaine, methamphetamine, heroin, and fentanylâby OFO and the Border Patrol. CBP data indicate that larger quantities by weight of cocaine, methamphetamine, heroin, and fentanyl are seized at POEs than between the ports. Figure 2 illustrates seizures of these four drugs by OFO and the Border Patrol for FY2012âFY2018. Cocaine. From FY2012 to FY2018, CBP reported seizing 388,970 pounds of cocaine at and between POEs. OFO seized 86.1% of this cocaine at POEs, and the Border Patrol seized the remaining 13.9% between POEs. Methamphetamine. From FY2012 to FY2018, CBP reported seizing 266,828 pounds of methamphetamine at and between POEs; 82.2% was seized at POEs and the remaining 17.8% between POEs. Of note, the amount of methamphetamine seized by CBP increased more than three-fold, from 17,846 pounds in FY2012 to 67,676 pounds in FY2018. The consistent increase in methamphetamine seizures during this period was seen both at and between POEs. Heroin. From FY2012 to FY2018, CBP reported seizing 35,193 pounds of heroin at and between POEs. OFO seized 88.0% of this heroin at POEs, and the Border Patrol seized the remaining 12.0% between POEs. Fentanyl. CPB started reporting fentanyl seizures by OFO in FY2015 and by the Border Patrol in FY2016. From FY2015 to FY2018, CBP seized 5,000 pounds of fentanyl at and between POEs; 85.5% was seized at POEs and the remaining 13.5% between POEs. Fentanyl seizures increased from the 70 pounds seized by OFO in FY2015 to 2,173 pounds seized across OFO and the Border Patrol in FY2018. Mar i juana. The landscape for CBP marijuana seizures is different than that for the four drugs discussed above. Whereas intelligence and seizure data indicate that most of these four drugs are moved through the legal POEs, a greater quantity of illicit foreign-produced marijuana is smuggled and seized between the ports (see Figure 3 ). From FY2012 to FY2018, CBP reported seizing 14,023,570 pounds of marijuana at and between POEs. The Border Patrol seized 77.1% of this marijuana between POEs, and OFO seized the remaining 22.9% at the ports. Marijuana seizures dropped from over 2.8 million pounds in FY2012 to 761,319 pounds in FY2018. The bulk of this decline can be seen in Border Patrol seizures, which fell from 2.3 million pounds in FY2012 to 461,030 pounds in FY2018. In current discussions of border security, policymakers and the media have relied on this snapshot of regularly published CBP data on seizures of certain illicit drugs (cocaine, methamphetamine, heroin, fentanyl, and marijuana) at and between POEs. While these data provide a summary view of certain CBP drug seizures and indicate generally where certain types of illicit drugs are most often seized by border officials, CBP's dataset that is the foundation for this regularly updated snapshot of seizure data provides a more nuanced view. For instance, the foundational seizure data provide additional information such as the type of POE (e.g., land, air, sea) where drugs were seized and whether the drugs were seized during inbound inspections, outbound inspections, or in operations away from the POEs. Specifically, CRS analysis of OFO drug seizure data from FY2014 to FY2018 indicate that across those five years, about 65% of seized illicit drugs by weight were confiscated at land POEs. In addition, about 28% of seized drugs were confiscated at air POEs, and about 5% were seized at sea POEs (see Figure 4 ). In addition, CRS analysis of OFO drug seizure data from FY2014 to FY2018 indicate that nearly 97% of seized drugs were confiscated during inbound inspections across those years. While nearly all OFO illicit drug seizures occur during inbound inspections, some are seized during outbound inspections of people and goods exiting the country, some may be seized at a POE but cannot be attributed to an inbound or outbound inspection, and some may be seized during enforcement activities occurring away from official POEs (see Figure 5 ). The enforcement statistics that CBP publishes on its website regarding seizures of cocaine, methamphetamine, heroin, fentanyl, and marijuana do not always distinguish between seizures at northern, southern, and coastal border areas. However, officials have noted that \"most illicit drug smuggling attempts occur at southwest [border] land POEs.\" Consistent with this testimony, CRS analysis of OFO drug seizure data indicates that, on average, over 65% of the illicit drugs seized by OFO from FY2014 to FY2018 were seized during inbound inspections at land POEs within the jurisdiction of the OFO field offices along the Southwest border. CBP is not the only agency that seizes illicit drugs in the United States or even in the border regions. Federal, state, local, and tribal law enforcement agencies are all involved in enforcement actions thatâeven if not focused on drug-related crimesâmay involve drug seizures. Notably, there is no central database housing information on illicit drug seizures from all law enforcement agencies. In addition, there is not a set of discrete, yet comprehensive, drug seizure datasets that, if combined, could tally illicit drug seizures for all of the United States. Rather, there are a number of datasets and systems that contain some information on drug seizures. For instance, law enforcement agencies have case management systems, and case files may have certain information on drug seizures. However, this information may or may not exist in electronic format, and may or may not consistently appear in dedicated data fields that allow agencies to sort and tally drug seizure data. In addition, law enforcement case information, including that on drug seizures, may change throughout the course of an investigation, and there is always a chance that case management systems may not be updated to reflect final information, including results of forensic lab tests, on the drugs seized. For instance, an initial report on a case may contain estimates of quantities of drugs seized as well as suspicions or results from preliminary field testing regarding drug types involved. This information could all change as a case progresses and any drugs seized are more thoroughly measured and chemically analyzed. In addition, the data that are available from law enforcement agencies throughout the United States provide imprecise insight into illicit drug smuggling into the country. Foreign-produced illicit drugs that cross the border into the United States without being seized enter the U.S. market along with domestically produced drugs; as such, seizure data from law enforcement agencies across the country may not in and of itself provide information as to the drug's source countryâand thus cannot always add to an understanding of drug trafficking into the United States. This may be particularly so for marijuana, which has seen increased domestic cultivation coupled with decreased Mexican production and trafficking into the United States. As border officials have noted, CBP seizure data include illicit drugs not just from inbound inspections of goods and people entering the country but from outbound inspections as well. In addition, there is a set of seizures for which it cannot be determined whether the intended flow of drugs seized was into, within, or out of the country. While most drugs flowing across U.S. borders may be coming into the country, some unknown portion of drugs crossing the borders are leaving the country. Drugs leaving the country include those produced in the United Statesânamely marijuanaâas well as drugs that pass through in transshipment. Despite an acknowledged imprecision in the completeness, accuracy, and nuance of seizure data, some systems can provide selected information on illicit drugs seized in the United States. National Seizure System (NSS). The DEA runs the NSS through the El Paso Intelligence Center (EPIC). This system allows law enforcement entities to submit data on illicit drug seizures around the country. Certain federal law enforcement agencies (DEA, FBI, CBP, ICE, and Coast Guard) are required to report drug seizures that surpass certain threshold levels, but reporting by other law enforcement agencies is voluntary. As such, while the NSS contains mandatory reported data on drug seizures of certain sizes made by specific federal agencies as well as other voluntarily reported drug seizure data, this reflects only a subsetâand unknown proportionâof total illicit drugs seized across the country. Nonetheless, these seizure data can provide officials with information on the location and magnitude of seizures to help build knowledge of the U.S. illicit drug market, drug trafficking activity in the country, and enforcement strategies. National Forensic Laboratory Information System (NFLIS). The DEA runs the NFLIS, which \"collects results of forensic analysis, and other related information, from local, regional, and national entities.\" One component of NFLIS is NFLIS-Drug, which collects drug chemistry analysis results from \"50 State systems and 104 local or municipal laboratories/laboratory systems, representing a total of 283 individual laboratories.\" Currently, the NFLIS reports on the number of drug cases submitted to laboratories for testing as well as the number of distinct drug reports made from those cases. It does not report on the total quantity of drugs seized that are associated with those samples submitted for chemical testing. Because the NFLIS records drug reports from specific labs around the country, it is possible for law enforcement and analysts to gain a better understanding of trends in drug reports involving certain drugs or substances in certain areas of the United States. As discussed above, the quantities of illicit drugs produced in various countries around the world that are destined for the United States and that are successfully smuggled into the country are unknown, and are likely unknowable. Instead, U.S. officials look at the set of illicit drugs seized in the United States and, in conjunction with drug intelligence, produce estimates of which countries are the major suppliers of certain types of illicit drugs found in the United States. In formulating these estimates, officials submit samples from selected seizures of illicit drugs for chemical testing and analysis. For certain illicit drugs seized in the United States, this chemical analysis helps determine, among other things, the primary source countries and/or methods of production. The chemical testing reveals different information about plant-based drugs than it does about synthetic drugs. Heroin. The DEA operates a heroin signature program (HSP) and a heroin domestic monitor program (HDMP) that helps identify the geographic source of heroin found in the United States. Chemical analysis of a given heroin sample can identify its \"signature,\" which indicates a particular heroin production process that has been linked to a specific geographic source region. The HSP analyzes wholesale-level samples of \"heroin seized at U.S. ports of entry (POEs), all non-POE heroin exhibits weighing more than one kilogram, randomly chosen samples, and special requests for analysis\" and the HDMP assesses the signature source of retail-level heroin samples seized in the United States. Of the heroin analyzed in the HSP, 86% was identified as originating from Mexico, 10% had inconclusive results, 4% was from South America, and less than 1% was from Southwest Asia in 2016. Cocaine. The DEA's Cocaine Signature Program (CSP) analyzes cocaine samples from bulk seizures for \"evidence of how and where the coca leaf was processed into cocaine base (geographical origin), and how cocaine base was converted into cocaine hydrochloride (processing method).\" Analyses of cocaine samples seized in 2017 indicate that 93% originated in Colombia, 4% originated in Peru, and 3% had an unknown origin. Methamphetamine. The DEA's methamphetamine profiling program (MPP) examines methamphetamine samples to help determine trends in production methods. The DEA notes, however, that because methamphetamine is synthetically produced, the MPP cannot determine the original source of the drug. Domestic production of methamphetamine commonly involves pseudoephedrine/ephedrine tablets along with household items like lithium batteries, camp fuel, starting fluid, and cold packs. In contrast, Mexican criminal networks \"produce methamphetamine using the reductive amination method, which uses the precursor, Phenyl-2-propanone (P2P) instead of pseudoephedrineâ¦. According to the DEA MPP, 97 percent of samples analyzed were produced using the reductive amination method, using P2P as the precursor chemical.\" This implies that most of the methamphetamine samples analyzed in the MPP were produced using techniques employed by Mexican criminal networks. Fentanyl. The DEA also has a Fentanyl Signature Profiling Program (FSPP), analyzing samples from fentanyl seizures to help \"identify the international and domestic trafficking networks responsible for many of the drugs fueling the opioid crisis.\" The DEA has indicated that fentanyl shipped directly from China often has purity levels above 90%, while fentanyl trafficked over the Southwest border from Mexico has purity levels below 10% on average. However, it is unclear how much of the fentanyl consumed in the United States is coming directly from China versus Mexico. In the absence of comprehensive and precise data on illicit drugs trafficked into the United States, seizure data can provide some insight into various elements of drug flows such as smuggling points into the United States and target markets within the country. For instance, some have relied on selected border seizure data to help understand the locations at which federal enforcement efforts are stopping a portion of the illicit drugs produced abroad from entering the country and joining the domestic drug market. In current policy discussions regarding border security, CBP drug seizure data can help inform policy decisions that involve the most effective placement of counterdrug resources. In addition, drug seizuresâboth at the border and in the interior of the countryâthat are chemically analyzed can provide information on the likely geographic sources of certain illicit drugs found throughout the United States. Policymakers may ask a variety of questions as they debate how to target finite resources to countering illicit drug flows, including which types of illicit drugs are of the highest concern, what are the means traffickers most often employ to smuggle illicit drugs into and throughout the United States, and where can enforcement officials interdict the greatest quantity of top-priority illicit drugs? Border seizure data can also help inform efforts to act on certain policy priorities. If, for example, lawmakers and enforcement officials are particularly concerned with specific categories of illicit drugs such as illicit opioids, they may examine the sufficiency of existing enforcement efforts in the areas where intelligence and seizure data indicate that the flow of these substances may be the highest. For instance, the most recent DEA National Drug Threat Assessment notes that illicit opioids such as heroin are more often smuggled through than between POEs; likewise, CBP seizures of these substances have also been higher at the ports than between them, as reflected in greater seizures of illicit opioids by OFO than by the Border Patrol. As such, in order to counter threats posed by illicit opioids, and in balancing other law enforcement and counterdrug priorities, Congress may consider whether CBP should maintain or change the amount and types of resources allocated to screening for and interdicting illicit drugs at and between POEs. Notably, as reflected in Figure 1 , a focus on border seizures largely excludes a discussion of drug seizures by law enforcement officials throughout the interior of the country. As such, border seizures cannot speak to drug transportation and distribution throughout the U.S. market or law enforcement priorities in the interior of the country. A focus on border seizures also largely excludes a discussion of illicit drugs that are produced domestically. This is, in part, because border seizures largely reflect drugs detected during inbound inspections (and thus are more likely to reflect foreign-produced drugs being moved into the United States). However, drugs detected and seized during outbound inspections may reflect both foreign-produced drugs that were not seized when they entered the country as well as domestically produced drugs being taken out of the country. If policymakers are interested in having a more comprehensive view of drug seizures throughout the United States, they could move to enhance and consolidate data collection. With respect to federal agencies, Congress could take a variety of steps to enhance data availability on drug seizures, both at the border and in the interior of the country. As noted, the NSS at EPIC contains data on drug seizures of certain sizes by specific federal agencies, as well as additional voluntary reports from additional law enforcement entities, but these data are not comprehensive. Lawmakers could ask GAO to conduct a study on agencies' collection and reporting of drug seizure data; this could provide a better understanding of the portion of drug seizures currently included in the NSS. Another option is that Congress could require that all federal law enforcement agencies report information on a greater portion ofâor allâdrug seizures to a central database like the NSS. Congress could also direct the NSS to enhance outreach to state and local law enforcement agencies to encourage them to submit drug seizure data. Yet another option would be for policymakers to incentivize statesâfor example, by providing or withholding grant fundingâto collect and report such data to help establish a more robust view of seizures in the United States. Enhanced data on drug seizures away from the border may not illuminate how these drugs entered the country; however, these data could help provide a more nuanced picture of the domestic drug market. To counter threats at U.S. borders, the Department of Homeland Security (DHS) uses a risk management approach, which the department defines as \"the process for identifying, analyzing, and communicating risk and accepting, avoiding, transferring, or controlling it to an acceptable level considering associated costs and benefits of any actions taken.\" Border threats are continually evolving and include those posed by a wide range of actors, from terrorists who may have weapons of mass destruction and transnational criminals smuggling drugs and other contraband to migrants entering the country without authorization. Risks associated with various threats can be seen as a function of the likelihood that the threat will be realized and its potential consequences. However, threats are complex, threat actors are strategic and adaptive in their behaviors, and assessing the likelihood and gauging potential consequences of the various threats can be challenging. For instance, in understanding the risks posed by threat actors smuggling drugs into the United States, one may consider the likelihood of drugs successfully flowing into the country. This likelihood may be complicated by a variety of factors including past and expected frequencies. As the true frequency of illicit drug smuggling is unknown, officials may rely on a combination of intelligence and known drug seizure levels to inform their expectations. Notably, seizure data reflect illicit drugs that were not successfully smuggled into the country; they reflect known, unsuccessful smuggling attempts. In addition, seizures vary across sectors of the border, differ on whether they were made at or between POEs, and are diverse in the associated modes of land, air, or sea transport; as such, they can help inform, along with intelligence, the likelihood of smuggling attempts at various locations and via a host of transport modes. However, seizure data do not speak to the portion of drugs successfully smuggled into the country. Moreover, expectations of future drug flows may combine knowledge about past flows with intelligence and analysis of additional information such as drug market forces in source and destination countries. Policymakers may question how border officials use intelligence about drug flows and data on drug seizures to assess the risks posed by drug trafficking and appropriately allocate resources to counter the threat. Because there is a need to balance resources for sometimes competing priorities, some may also question whether DHS's risk management approach to countering threats at the borders is able to effectively evaluate and reduce threats posed by drug traffickingâand whether the data to make this evaluation exist. The United States has a number of strategies aimed, at least in part, at reducing drug trafficking into and within the country, and data on drug flows can help evaluate progress toward achieving goals outlined in them. For instance, the 2019 National Drug Control Strategy outlines that one of three key elements in the overarching goal of building a stronger, healthier, drug-free society is reducing the availability of illicit drugs in the United States. The strategy notes that some measures of performance are to \"significantly reduce the availability of illicit drugs in the United States by preventing their production outside the United States, disrupt their sale on the internet, and stop their flow into the country through the mail and express courier environments, and across our borders.\" It also notes that some measures of effectiveness are that \"[t]he production of plant-based and synthetic drugs outside the United States has been significantly reduced, illicit drugs are less available in the United States as reflected in increased price and decreased purity, and drug seizures at all U.S. ports of entry increase each year over five years.\" A robust picture of drug production and movement toward and into the United States can help inform, for instance, whether changes in drug seizures at POEsâas outlined in the strategyâmay be attributable to the effectiveness of U.S. drug control efforts. Intelligence and data on drug flows and seizures could also inform whether changes in seizures may be influenced by other factors such as the amount of drugs arriving at U.S. borders, the means by which traffickers attempt to smuggle drugs into the country, or the staffing levels at and between POEs. For instance, policymakers and officials may question whether fluctuations in drug seizures at ports of entry by OFO, as shown in Figure 2 and Figure 3 , taken with intelligence about other drug supply and demand factors, reflect progress toward meeting goals outlined by the National Drug Control Strategy. Other strategies, such as the National Southwest Border Counternarcotics Strategy and the Strategy to Combat Transnational Organized Crime, also provide action items that involve reducing drug trafficking. While these strategies do not outline specific effectiveness measures, as does the National Drug Control Strategy, the action items and goals could potentially be better evaluated with more specific data such as that on illicit drug production (both domestic and foreign), flows, and seizures. ", "summary": "Policy discussions around issues such as border security, drug trafficking, and the opioid epidemic include questions about illicit drug flows into the United States. While there are numerous data points involved in understanding the trafficking of illicit drugs into the United States, these data are often estimated, incomplete, imperfect, or lack nuance. For example, debates about drug flows and how best to counter drug trafficking into the country often rely on selected drug seizure data from border officials, which do not reflect all drug flows into the United States. One way of conceptualizing the flow of illicit drugsâboth plant-based and syntheticâinto the United States is as a funnel. At the top of this funnel is the universe of illicit drugs produced around the world, both foreign and domestic. Factors affecting actual illicit cultivation and/or production are numerous and diverse, as are those affecting analysts' and officials' abilities to measure total worldwide production. Of all the illicit drugs that are produced around the world, some portion is destined for the United States. Of the total amount of illicit drugs that reach the U.S. border by land, air, or sea, some portion is known because it was seized by border officials, and an unknown portion is successfully smuggled into the country. While the proportion of illicit drugs coming into the country that are seized is unknowable, the amount of drugs seized is. And, data on drug seizures at the U.S. borders have sometimes served as a reference for policy debates on border security and drug trafficking into the country, in part because it is a knowable portion of drug trafficking problem. The primary agency charged with safeguarding the U.S. borders (including seizing illicit drugs and other contraband) is the U.S. Customs and Border Protection (CBP). Within CBP, the Office of Field Operations (OFO) is responsible for managing ports of entry and seizes drugs being smuggled into the United States at ports of entry; the Border Patrol is responsible for securing the border between ports of entry and seizes drugs being smuggled into the country between ports of entry. CBP data from OFO and Border Patrol indicate that for cocaine, methamphetamine, heroin, and fentanyl, larger quantities by weight are seized at legal ports of entry than are seized between the ports. Conversely, a larger quantity by weight of illicit marijuana is seized between the ports of entry. CRS analysis of OFO drug seizure data from FY2014 to FY2018 indicate that across those five years, about 65% of seized illicit drugs, by weight, were seized at land ports of entry at the border, about 28% of seized drugs were seized at air ports of entry, and about 5% were seized at sea ports of entry. CRS analysis of these data also indicate that nearly 97% of drugs were seized during inbound inspections across those years. CBP is not the only agency that seizes illicit drugs in the United States or even in the border regions. Federal, state, local, and tribal law enforcement agencies are all involved in enforcement actions thatâeven if not focused on drug-related crimesâmay involve drug seizures. Notably, though, there is no central database housing information on illicit drug seizures from all law enforcement agencies, federal or otherwise. Even though the quantity of total illicit drugs produced around the world that is destined for the United Statesâand successfully smuggled into the countryâis unknown, the likely source of the drugs seized may, in some instances, be knowable. U.S. officials chemically analyze a portion of illicit drugs seized to identify the source and, in conjunction with drug intelligence, assess which countries may be the major suppliers of certain illicit drug types found in the country. In the absence of precise data on illicit drugs moving toward and into the United States, seizure data can provide insight into various elements of drug flows such as smuggling points into the United States and target markets within the country. If policymakers are interested in having a more robust view of drug seizures throughout the country, they could move, through mandates or incentives, to enhance data collection and consolidation of drug seizure data by law enforcement officials. Policymakers may also question how border officials use intelligence about drug flows and data on drug seizures to assess the risks posed by drug trafficking and appropriately allocate resources to counter the threat. They may also evaluate how well available data on drug seizures can help measure progress toward achieving goals outlined in national strategies aimed, at least in part, at reducing drug trafficking into and within the country.", "document_type": "crs"}
{"report": "The Republic of Kosovo declared independence from Serbia in 2008, nearly a decade after the end of a brief but lethal conflict between Serbian forces and a Kosovo Albanian insurgency led by the Kosovo Liberation Army (KLA). Since 2008, Kosovo has been recognized by more than 100 countries. The United States and most European Union (EU) member states recognize Kosovo. Serbia, Russia, China, and various other countries (including some EU member states) do not. The United States has strongly supported Kosovo's state-building and development efforts, as well as its ongoing dialogue with Serbia to normalize their relations. Kosovo regards the United States as a security guarantor and key ally. Congress has maintained interest in Kosovo for many decadesâfrom concerns over Serbia's treatment of ethnic Albanians in the former Yugoslavia to the armed conflict in Kosovo in 1998-1999 after the Yugoslav federation disintegrated. Many Members were active in debates over the U.S.- and NATO-led military intervention in the conflict. After Serbian forces withdrew in 1999, many Members backed Kosovo's independence. Today, many in Congress continue to support Kosovo through country- or region-specific hearings, congressional visits, and foreign assistance funding levels averaging around $50 million per year since 2015. Looking ahead, Members may consider how the United States can support the Kosovo-Serbia dialogue, Kosovo's Euro-Atlantic ambitions, transitional justice processes, the ongoing political crisis arising from the March 2020 government collapse, and regional security. Current key issues in Kosovo's domestic situation include the March 2020 collapse of the government; responding to the Coronavirus Disease 2019 (COVID-19) pandemic; managing relations with the country's ethnic Serb minority, particularly in northern Kosovo; and economic growth. Kosovo is a parliamentary republic with a prime minister, who serves as head of government, and an indirectly elected president, who serves as head of state and has largely ceremonial powers. The unicameral National Assembly has 120 seats, of which 20 are reserved for ethnic minorities. Albin Kurti currently serves as acting Prime Minister. In 2016, the National Assembly elected Hashim ThaÃ§i to a five-year term as president. ThaÃ§i previously served as prime minister and has long been a major political figure in the country. Kosovo's domestic politics have been volatile for much of the past year, marked by government turnover, escalating tension between the president and prime minister, and divisions over various issuesâincluding a stalled dialogue to normalize relations with Serbia. More recently, the country entered a period of uncertainty when the Kurti government lost a vote of confidence on March 25, 2020, less than two months after it had formed (see textbox below, \"March 2020 Government Collapse and Aftermath\"). Many had viewed that government as a potentially pivotal shift in power from long-ruling parties to the opposition. The government breakdown coincided with the COVID-19 pandemic, and some have expressed concern that the ensuing political crisis could impede the public health response. Outgoing governing partners VetÃ«vendosje and the Democratic League of Kosovo (LDK) were the top-performing parties in early parliamentary elections in October 2019 (see Table 1 ). Their victory was considered to reflect deep voter dissatisfaction with corruption and economic conditions, as well as a desire to hold accountable the small number of parties that have largely rotated in government over the past several decades. Prior to 2020, the Democratic Party of Kosovo (PDK), led by ThaÃ§i until 2016, had participated in all governments since independence. The PDK and several other former ruling parties grew out of factions of the KLA resistance and, along with several other parties, sometimes are referred to as the war wing . Critics charge that these parties became entrenched in state institutions. By contrast, neither VetÃ«vendosje nor its leader, Albin Kurti, had been in national government prior to 2020. The party grew out of a 2000s-era protest movement that channeled popular frustration with government corruption. VetÃ«vendosje also railed against aspects of post-1999 administration of Kosovo, accusing international missions of failing to establish the rule of law despite their vast powers. The party has steadily built support across election cycles. In the past, VetÃ«vendosje was criticized for using obstructionist tactics (including releasing tear gas in parliament) and for seeking to subvert several agreements with Serbia and Montenegro that were seen as important to regional reconciliation. Kurti maintains that the party will govern responsibly and prioritize socioeconomic reforms and the rule of law. VetÃ«vendosje at times has floated the idea of eventual unification with Kosovo's neighbor and close ally, Albania; however, unification does not appear likely to become a serious proposal under current conditions, not least of all due to U.S. and EU objections. Analysts generally have been positive in their assessments of Kosovo's democratic development since 2008, particularly its active civil society, pluralistic media sector, and track record of competitive elections. At the same time, U.S. and EU officials, as well as watchdog groups such as the U.S.-based nongovernmental organization Freedom House, have urged Kosovo to more rigorously enforce anti-corruption rules and uphold judicial independence. Many regard corruption and weak rule of law to be serious problems. The so-called Pronto Affair, one of several scandals to emerge in recent years, raised allegations of nepotism on the part of the then-governing PDK. In 2018, 11 PDK officials, including a minister and a lawmaker, were indicted for allegedly offering public jobs to party backers. According to the U.S.-based nongovernmental organization Freedom House, the Pronto case showed \"a systemic abuse of power and informal control over state structures.\" In April 2020, 19 individuals (thought to include former ministers) were indicted for abuse of position relating to the 2013 privatization of four hydropower plants and a distribution network. About 100,000 to 120,000 Serbs live in Kosovo, primarily in semi-isolated rural communities. Kosovo Serbs are accorded various forms of representation and partial autonomy under the 2008 constitution and related legislation. This framework is partly the result of U.S. and other external pressure on Kosovo's leaders to incorporate power-sharing measures to bolster minority rights and protection. These provisions established a municipal level of governance with specific areas of responsibility (most Serbs live in municipalities where they form a majority). Power-sharing arrangements require Serb representation in parliament, the executive, and other institutions. Majority consent from minority members of parliament is mandatory on some votes, and Serbian has official language status. Nevertheless, some question the actual effectiveness of these measures in integrating Serbs. More than half of Kosovo Serbs live in minority-majority municipalities in central and southeastern Kosovo. These municipalities do not border Serbia and are largely integrated into Kosovo institutions, although wartime legacies of distrust and fear persist. By contrast, the situation in northern Kosovo is one of the most enduring challenges in Kosovo's state building since independence (see also \"Relations with Serbia,\" below). About 40% of the Serb population lives in four Serb-majority municipalities north of the Ibar River that are adjacent to Serbia (see map in Figure 1 ). Pristina has been unable to exert full authority in northern Kosovo, whereas Serbia has retained strong influence (albeit not full authority) in the region despite the withdrawal of its forces in 1999. Kosovo Serbs turned to Serbian-supported parallel structures for security, health care, education, and other services. Due to its grey-zone status, northern Kosovo is considered a regional hub for smuggling and other illicit activities. Serbian List ( Srpska Lista ), the party that has dominated recent elections in northern Kosovo, is considered to be close to the Serbian government. There have been reports of harassment and intimidation against opposition Serb politicians in the north, most recently in the October 2019 elections. The 2018 murder of opposition Serb politician Oliver IvanoviÄ raised questions about the power structures and vested interests that prevail in northern Kosovo. The 1998-1999 war with Serbia caused extensive damage to Kosovo's infrastructure and economy. Two decades later, economic recovery continues. Employment is an acute policy challenge; Kosovo's average 40% labor force participation rate is the lowest in the Western Balkans. The unemployment rate stood at about 26% in 2019, with disproportionately higher levels among working-age females and youth. The economy and perceived limits to upward socioeconomic mobility contribute to high rates of emigration. Kosovo's gross domestic product (GDP) grew by 3.8% in 2018 and 4.2% in 2019. The International Monetary Fund (IMF) estimates that Kosovo's economy could contract by 5% in 2020 due to the COVID-19 pandemic. Foreign direct investment (FDI) in Kosovo in 2018 was â¬214 million (about $232 million), the lowest in the Western Balkans. By contrast, remittances received from citizens abroad (primarily in European countries) amounted to â¬801 million (about $868.6 million) in 2018, equivalent to 12% of GDP. Kosovo's key trade partners are the EU and neighboring countries in the Western Balkans. Kosovo has largely liberalized trade with both blocs through its Stabilization and Association Agreement with the EU (a cooperation framework that includes steps to liberalize trade) and as a signatory to the Central European Free Trade Agreement (CEFTA) alongside other non-EU Balkan countries. Kosovo's 2019 exports totaled about â¬382 million ($414 million), of which the largest shares went to CEFTA countries and the EU. India, Switzerland, and Turkey were other significant export markets. Kosovo's top exports are metals; mineral products; plastics and rubber; and prepared foods, beverages, and tobacco. In lobbying for greater FDI, Kosovo officials tout the country's young workforce, natural resources, low corporate tax rate, use of the euro, and preferential access to the EU market. However, various impediments to investment remain, including corruption, weak rule of law, uncertainties over Kosovo's dispute with Serbia, and energy supply disruptions. Kosovo declared independence from Serbia in 2008 with U.S. support. Serbia does not recognize Kosovo and relies on Russia in particular for diplomatic support. Many believe that the lack of normalized relations between Kosovo and Serbia impedes both countries' prosperity and progress toward EU membership and imperils Western Balkan stability. After centuries of Ottoman rule, Kosovo became part of Serbia in the early 20 th century. After World War II, Kosovo eventually had the status of a province of Serbia, one of six republics of Yugoslavia. Some Serbian perspectives view Kosovo's incorporation as the rightful return of territory that was the center of a medieval Serbian kingdom and is prominent in national identity narratives. Kosovo Albanian perspectives, by contrast, largely view Kosovo's incorporation into Serbia as an annexation that resulted in the marginalization of the Albanian-majority population. During the 1980s, Kosovo Albanians grew increasingly mobilized and sought separation from Serbia. In 1989, Serbiaâthen led by autocrat Slobodan MiloÅ¡eviÄ, who leveraged Serbian nationalism to consolidate powerâimposed direct rule in Kosovo. Throughout the 1990s, amid Yugoslavia's violent breakup and MiloÅ¡eviÄ's continued grip on power in Serbia, human rights groups condemned Serbian repression of Albanians in Kosovo, including suppression of the Albanian language and culture, mass arrests, and purges of Albanians from the public sector and education institutions. In the late 1990s, the Albanian-led Kosovo Liberation Army (KLA) launched an insurgency against Serbian rule in Kosovo. Serbia responded with increasingly heavy force in 1998 and 1999 (see \"Transitional Justice,\" below). Following a NATO air campaign against Serbian targets in early 1999, Serbia agreed to end hostilities and withdraw its forces from Kosovo. U.N. Security Council (UNSC) Resolution 1244 authorized the U.N. Interim Administration Mission (UNMIK) to provide transitional civil administration and the NATO-led KFOR mission to provide security (both missions still operate on a smaller scale). MiloÅ¡eviÄ lost power in 2000 amid mass protests in Serbia. Kosovo's decision to declare independence in 2008 followed protracted and ultimately unsuccessful efforts on the part of the international community to broker a settlement with Serbia. Serbia challenged Kosovo's actions before the International Court of Justice (ICJ); however, the ICJ's 2010 advisory opinion found that Kosovo had not contravened international law. Following the ICJ ruling, the EU and the United States urged Kosovo and Serbia to participate in a dialogue aimed at eventual normalization of relations, but with an initial focus on technical measures to facilitate the movement of goods and people and otherwise improve the quality of life. In 2012, the talks advanced to a political level, bringing together leaders from the two countries for EU-brokered meetings. Leaders in both countries are constrained by public opinion and a political climate that tends to make major concessions costly. Kosovo and Serbia's goal to join the EU helps incentivize their participation in the dialogue; the EU maintains that neither country can join the union until they normalize relations. Kosovo's participation in the dialogue also is motivated by its desire to clear a path to U.N. membership and, eventually, NATO membership (Serbian approval is seen as a key step to unlocking Kosovo's U.N. membership). To date, the dialogue has produced 33 agreements, mostly of a technical nature. In 2013, Serbia and Kosovo reached the Brussels Agreement, which set out principles to normalize relations, including measures to dismantle Serbian-backed parallel structures in northern Kosovo and create an Association of Serb Municipalities (ASM) linking Kosovo's 10 Serb-majority municipalities. Implementation of the dialogue's agreements has progressed in some areas, such as Kosovo Serb electoral participation and the integration of law enforcement and the judiciary in the north into statewide institutions. It has lagged in other areas, such as in the energy sector and in the ASM. Although the dialogue format does not predetermine a specific outcome, the EU has urged a \"comprehensive, legally binding\" agreement between the parties. Two particularly thorny issues in any such agreement are the scope of Serbian recognition of Kosovo and the situation in northern Kosovo. It remains undetermined whether Serbia would fully recognize Kosovo or accept Kosovo's institutions and U.N. membership without formal recognition. It is also uncertain how northern Kosovo would be addressed in any final settlement. Prior to 2018 (see below), U.S. and EU officials rejected local (primarily Serbian) leaders' occasional hints at partition as a potential solution. The United States and the EU feared that transferring territory or changing borders along ethnic lines could set a dangerous precedent and destabilize the region. Alternatively, some consider the integration of the north into statewide institutions through autonomy measures, such as the ASM, to be a potential compromise that could preserve Kosovo's territorial integrity while offering concessions to Kosovo Serbs. However, the ASM has faced resistance from some in Kosovo due to concerns that it could undermine state integrity if it is endowed with significant executive functions and formalized links to Serbia. Since late 2015, there has been little progress in reaching new agreements or implementing existing ones. Further, a shift in focus absorbed some of the dialogue's energies: in 2018, President ThaÃ§i and Serbian President Aleksandar VuÄiÄ raised the prospect of redrawing borders as an approach to normalizing relations (sometimes described as a land swap , a partition, or a border adjustment ). Analysts believe such a measure could entail transferring Serb-majority municipalities in northern Kosovo to Serbia, possibly in exchange for Albanian-majority areas of Serbia's PreÅ¡evo Valley. To the surprise of some, Trump Administration officials broke with long-standing U.S. and EU opposition to redrawing borders/partition by signaling willingness to consider such a proposal if Kosovo and Serbia were to reach a mutually satisfactory agreement. However, some European allies, particularly Germany, remain opposed to any such proposal. Acting Prime Minister Kurti and much of Kosovo's political class and population also oppose ceding territory. The dialogue has been suspended since late 2018, when Kosovo imposed tariffs on Serbian goods in retaliation for Serbia's campaign to block Kosovo's Interpol membership bid and its efforts to lobby countries to \"de-recognize\" Kosovo. Serbian leaders say they will not return to negotiations until the tariffs are lifted. U.S. and European officials repeatedly called upon the two parties to return to talks. In March 2020, Prime Minister Kurti announced the repeal of tariffs on raw material imports from Serbia. The following month, amid continued U.S. pressure, he announced the decision to conditionally repeal tariffs against Serbian goods and replace them with gradual reciprocity measures to match existing Serbian measures impacting the movement of goods and people. EU officials welcomed the tariff removal; however, U.S. officials expressed dissatisfaction with the reciprocity measures. Kosovo's parties and leaders have become increasingly divided over several aspects of the dialogue, particularly the terms of lifting tariffs against Serbia. Furthermore, acting Prime Minister Kurti has challenged President ThaÃ§i's leadership of Kosovo's participation in the dialogue, arguing that the authority of the government (rather than the head of state) to lead efforts was confirmed in a prior Constitutional Court ruling. Separately, some observers caution that growing uncertainty over the Western Balkan countries' EU membership prospects could alter the incentive structure weaving together the dialogue and the accession process. Recently, the United States has played a more direct role in Kosovo-Serbia negotiations (see \"U.S.-Kosovo Relations\"). Transitional justice relating to the 1998-1999 war is a sensitive, emotionally charged issue in Kosovo and Serbia and a source of friction in efforts to normalize relations. Serbian police, soldiers, and paramilitary forces were accused of systematic, intentional human rights violations during the conflict. About 13,000 people were killed, and nearly half of the population was forcibly driven out of Kosovo. An estimated 20,000 people were victims of conflict-related sexual violence. The vast majority of all victims were ethnic Albanians. On a smaller scale, some KLA fightersâparticularly at the local levelâcarried out retributive acts of violence against Serb civilians, other minority civilians, and Albanian civilians whom they viewed as collaborators. Before closing in 2017, the International Criminal Tribunal for the former Yugoslavia tried several high-profile cases relating to the Kosovo conflict, including those of deposed Serbian leader MiloÅ¡eviÄ, who died before his trial finished, and former Kosovo Prime Minister Haradinaj, who was twice acquitted of charges relating to his role as a KLA commander. Domestic courts in Kosovo and Serbia now handle most war crimes cases. Weak law enforcement and judicial cooperation between Kosovo and Serbia is an impediment in the many cases in which evidence, witnesses, victims, and alleged perpetrators are no longer in Kosovo. Critics assert that low political will in Serbia in particular hampers transitional justice. Officials from successive post-MiloÅ¡eviÄ Serbian governments have been criticized for downplaying or failing to acknowledge Serbia's role in the wars in Bosnia, Croatia, and Kosovo in the 1990s and for fostering a climate that is hostile to transitional justice and societal reconciliation with the past. Transitional justice processes concerning the KLA are controversial in Kosovo. Under U.S. and EU pressure, in 2015 the National Assembly adopted a constitutional amendment and legislation to create the Kosovo Specialist Chambers and Specialist Prosecutor's Office. These institutions are part of Kosovo's judicial system but are primarily staffed by international jurists and located in The Hague, Netherlands, to allay concerns over witness intimidation and political pressure. They are to investigate the findings of a 2011 Council of Europe report concerning allegations of war crimes committed by some KLA units. The Specialist Chambers is controversial in Kosovo, because it is to try only alleged KLA crimes. In 2017, lawmakers from the then-governing coalition moved to abrogate the Specialist Chambers but backed down after the United States and allies warned that doing so would have \"severe negative consequences.\" More than 120 former KLA fighters are reported to have received summons for questioning during 2019, and analysts believe some Kosovo politicians could face indictment. The EU and NATO have played key roles in Kosovo; these institutional relationships continue to evolve alongside Kosovo's state-building processes. The EU has played a large role in Kosovo's postwar development. A European Union Rule of Law Mission (EULEX) was launched in 2008, assuming some tasks that UNMIK had carried out since 1999. The mission's scope has decreased over time as domestic institutions assume more responsibilities; today, EULEX's primary role is to monitor and advise on rule-of-law issues, with some executive functions. EULEX's current mandate runs through June 2020. Additionally, the EU provided over â¬1.48 billion (about $1.6 billion) in assistance from 2007 to 2020, as well as emergency support to address the COVID-19 pandemic (see \"Coronavirus Disease 2019 (COVID-19) Response\"). Kosovo is a potential candidate for EU membership and signed a Stabilization and Association agreement with the EU in 2014. The next steps in Kosovo's EU membership bid are obtaining candidate status and launching accession negotiations, which would commence the lengthy process of harmonizing domestic legislation with that of the EU. Kosovo's EU membership bid is complicated by the fact that five EU member states do not recognize it. Kosovo's more immediate goal in its relationship with the EU is to obtain for its citizens visa-free entry into the EU's Schengen area of free movement, which allows individuals to travel without passport checks between most European countries. Kosovo is the only Western Balkan country that does not have this status, despite EU officials' assessment that it fulfilled key requirements in 2018. Some observers contend that the EU's continued denial of visa liberalization to Kosovo has undercut the bloc's credibility and influence in the country. The NATO-led Kosovo Force (KFOR) was launched in 1999 with 50,000 troops as a peace-support operation with a mandate under UNSC Resolution 1244. KFOR's current role is to maintain safety and security, support free movement of citizens, and facilitate Kosovo's Euro-Atlantic integration. As the security situation in Kosovo improved, NATO defense ministers in 2009 resolved to shift KFOR's posture toward a deterrent presence. Some of KFOR's functions have been transferred to the Kosovo Police. The United States remains the largest contributor to KFOR, providing about 660 of the 3,500 troops deployed as of November 2019. Any changes to the size of the mission would require approval from the North Atlantic Council and be \"dictated by continued positive conditions on the ground.\" Many analysts assert that KFOR continues to play an important role in regional security. KFOR has played a key role in developing the lightly armed Kosovo Security Force (KSF) and bringing it to full operational capacity. KSF's current role is largely nonmilitary in nature and is focused instead on emergency response. A recurring issue is how KSF may transform into a regular army. In December 2018, Kosovo lawmakers amended existing legislation to gradually transform KSF, drawing sharp objections from Kosovo Serb leaders and Serbia. NATO Secretary-General Jens Stoltenberg called the measure \"ill timed\" given heightened tensions with Serbia, cautioned that the decision could jeopardize cooperation with NATO, and expressed concern that the decisionmaking process had not been inclusive. The United States, however, expressed support for the Kosovo government's decision and urged officials to ensure that the transformation is gradual and inclusive of all communities. The United States enjoys broad popularity in Kosovo due to its support during the MiloÅ¡eviÄ era, its leadership of NATO's 1999 intervention in the Kosovo war, its backing of Kosovo's independence in 2008, and its subsequent diplomatic support. The United States supports Kosovo's Euro-Atlantic ambitions. Kosovo regards the United States as a security guarantor and critical ally, and many believe the United States retains influence in domestic policymaking and politics. The Trump Administration has signaled growing interest in securing a deal to resolve the Kosovo-Serbia dispute and stepping up U.S. engagement in the Western Balkans more broadly. U.S. officials assert that the full normalization of Kosovo-Serbia relations is a \"strategic priority.\" In August 2019, U.S. Secretary of State Michael Pompeo appointed Deputy Assistant Secretary of State Matthew Palmer as his Special Representative for the Western Balkans. Shortly thereafter, President Donald Trump appointed U.S. Ambassador to Germany (now also Acting Director of National Intelligence) Richard Grenell as Special Presidential Envoy for Serbia and Kosovo Peace Negotiations. Many officials in Kosovo and Serbia have welcomed the prospect of a greater U.S. role in efforts to normalize relations. In January 2020, U.S. officials announced two new Kosovo-Serbia agreements on transportation links, pursuant to a strategy that focuses on economic growth and job creation as foundations for the normalization process. In March 2020, the White House hosted informal talks between President ThaÃ§i and President VuÄiÄ. U.S. efforts currently center on bringing the two parties back to negotiations. As mentioned, U.S. officials criticized the reciprocity principles that acting Prime Minister Kurti announced in April 2020 alongside the conditional lifting of tariffs. The direct U.S. role in brokering the recent transportation agreements and greater U.S. involvement in efforts to normalize Kosovo-Serbia relations is largely a departure from the approach taken under previous Administrations, which strongly supported EU-led efforts to normalize relations but did not play a formal, direct role. News of the January 2020 U.S.-brokered agreements reportedly came as a surprise to some European officials, who in turn have underscored the EU's long-standing role in the normalization process and appointed an EU special representative for the dialogue. Some analysts, while welcoming greater U.S. involvement, assert that the United States is more effective in engaging the Western Balkans when its actions and positions are aligned with those of its European allies; they contend that recent gaps between the United States and allies such as Germany on the Kosovo-Serbia dialogue, as well as on the March 2020 no-confidence session, have undercut overall engagement efforts. Some observers and several Members of Congress have expressed concern over recent U.S. policies toward Kosovo's government, such as pausing implementation of a $49 million Millennium Challenge Corporation (MCC) Threshold Program and delaying the development of its proposed Compact Program, until Kosovo rescinds the tariffs. Some Kosovo officials expressed dismay over what they describe as U.S. pressure on Kosovo to lift tariffs against Serbia without equivalent pressure on Serbia to cease its campaign to undercut Kosovo's international legitimacy. On April 13, 2020, the Chairman of the House Committee on Foreign Affairs and the Ranking Member of the Senate Committee on Foreign Relations released a joint letter to Secretary Pompeo that welcomed greater U.S. diplomatic engagement in efforts to normalize relations between Kosovo and Serbia but expressed concern over what they described as \"heavy-handed\" treatment of the weeks-old Kurti government. They urged greater cooperation with the EU and restarting implementation of Kosovo's MCC Threshold Program. Separately, acting Prime Minister Kurti alleged that U.S. officials had aided efforts to unseat his government in the March 2020 no-confidence session in hopes that a more pliable government in Pristina would quickly reach a deal with Serbia. U.S. officials have underscored that the United States is \"committed to working with any government formed through the constitutional process\" and rejected speculation that the United States was brokering a \"secret plan for land swaps.\" The United States is a significant source of foreign assistance to Kosovo (see Figure 2 ). U.S. assistance aims to support the implementation of agreements from the Kosovo-Serbia dialogue and to improve transparent and responsive governance, among other goals. Additional assistance is provided through a $49 million Millennium Challenge Corporation (MCC) Threshold Program that launched in 2017, with focus on governance and energy efficiency and reliability. Threshold programs are intended to help countries become eligible to participate in a larger Compact Program; in December 2018 and again in December 2019, the MCC board determined that Kosovo was eligible to participate in a compact. As discussed above, MCC assistance is currently on hold. The United States and Kosovo cooperate to combat transnational threats and bolster security. Like elsewhere in the Western Balkans, Kosovo is a transit country and in some cases a source country for trafficking in humans, contraband smuggling (including illicit drugs), and other criminal activities. Observers consider Kosovo to have a relatively strong legal framework to counter trafficking, smuggling, and other transborder crimes. At the same time, the United States and the EU have urged officials in Kosovo to better implement the country's domestic laws by more strenuously investigating, prosecuting, and convicting traffickers, as well as by improving victim support. Combatting terrorism and violent extremism is a core area of U.S.-Kosovo security cooperation. Kosovo is a secular state with a moderate Islamic tradition, but an estimated 400 Kosovo citizens traveled to Syria and Iraq in the 2010s to support the Islamic State amid the terrorist group's growing recruitment efforts. As this policy challenge emerged, the United States assisted Kosovo with tightening its legal framework to combat recruitment, foreign fighter travel, and terrorism financing, as well as strengthening its countering violent extremism strategy. The United States provides support to Kosovo law enforcement and judicial institutions to combat terrorism and extremism. The State Department's Antiterrorism Assistance program, for example, has provided training or capacity-building support for the Kosovo Police's Counterterrorism Directorate and for the Border Police. Kosovo and the United States agreed to an extradition treaty in March 2016. In April 2019, the United States provided diplomatic and logistical support for the repatriation of about 110 Kosovo citizens from Syriaâprimarily women and childrenâwho had supported the Islamic State or were born to parents who had. Some repatriated persons were indicted on terrorism-related charges. Kosovo has a sister-state relationship with Iowa that grew out of a 2011 State Partnership Program (SPP) between the Iowa National Guard and the Kosovo Security Force. That relationship has been hailed as a \"textbook example\" of the scope and aims of the SPP. Congressional interest in Kosovo predates Yugoslavia's disintegration. Through resolutions, hearings, and congressional delegations, many Members of Congress highlighted the status of ethnic Albanian minorities in Yugoslavia, engaged in heated debates over intervention during the Clinton Administration, urged the George W. Bush Administration to back Kosovo's independence, and supported continued financial assistance. Congressional interest and support continues. In the 116 th Congress, several hearings have addressed Kosovo in part or in whole, including an April 2019 House Foreign Affairs Committee hearing on Kosovo's wartime victims and recent hearings on Western Balkan issues held by the Senate Armed Services Committee and the Senate Foreign Relations Committee's Subcommittee on Europe and Regional Security Cooperation. Given Kosovo's geography, history, and current challenges, the country also factors into wider U.S. foreign policy issues in which Congress remains engaged. Such issues include transitional justice, corruption and the rule of law, combatting human trafficking and organized crime, U.S. foreign assistance, security in Europe, and EU and NATO enlargement. ", "summary": "Kosovo, a country in the Western Balkans with a predominantly Albanian-speaking population, declared independence from Serbia in 2008, less than a decade after a brief but lethal war. It has since been recognized by about 100 countries. The United States and most European Union (EU) member states recognize Kosovo. Serbia, Russia, China, and various other countries (including some EU member states) do not. Key issues for Kosovo include the following: Resuming talks with Serbia. An EU-facilitated dialogue between Kosovo and Serbia, aimed at normalization of relations, stalled in 2018 when Kosovo imposed tariffs on Serbian goods in response to Serbia's efforts to undermine Kosovo's international legitimacy. Despite U.S. and EU pressure, the parties have not resumed talks. On April 1, 2020, acting Prime Minister Albin Kurti conditionally lifted tariffs against Serbian imports; this step was praised by EU officials but drew U.S. criticism because of the government's simultaneous pledge to gradually introduce measures to match Serbian barriers to the movement of goods and people. Government collapse . The governing coalition led by Albin Kurti of the Self-Determination Party (VetÃ«vendosje) lost a vote of confidence in March 2020, less than two months after it had formed. The outgoing government comprises two parties formerly in opposition, both of which had campaigned on an anti-corruption platform. Among other factors, the collapse was attributed to divisions over managing relations with Serbia amid U.S. pressure on the government to immediately lift tariffs against Serbian imports, as well as to domestic political infighting. Kosovo's leaders disagree over how to proceed from the current political crisis. Strengthening the rule of law. The victory of Kurti's VetÃ«vendosje in the October 2019 election partly reflected widespread voter dissatisfaction with corruption. Weakness in the rule of law contributes to Kosovo's difficulties in attracting foreign investment and complicates the country's efforts to combat transnational threats. Relations with the United States. Kosovo regards the United States as a key ally and security guarantor. Kosovo receives the largest share of U.S. foreign assistance to the Balkans, and the two countries cooperate on numerous security issues. The United States is the largest contributor of troops to the NATO-led Kosovo Force (KFOR), which has contributed to security in Kosovo since 1999. In 2019, the Trump Administration appointed a Special Representative for the Western Balkans and a Special Presidential Envoy for Serbia and Kosovo Peace Negotiations. These appointments are considered to reflect the Administration's interest in securing a comprehensive settlement between Kosovo and Serbia and may signal a potentially greater U.S. role in a process that the EU has largely facilitated to date. Leaders in Kosovo generally have welcomed greater U.S. engagement, but some observers expressed concern over reported U.S. pressure on the Kurti government to lift tariffs on Serbian goodsâincluding pausing some U.S. assistance to Kosovoâand over perceived U.S. support for the no-confidence session that resulted in the March 2020 government collapse. U.S. officials maintain that the United States is committed to working with any government formed in compliance with constitutional processes. Transatlantic cooperation . Since the Kosovo war ended in 1999, the United States, the EU, and key EU member states have largely coordinated their efforts to promote regional stability in the Western Balkans, including efforts to normalize relations between Kosovo and Serbia. More recently, however, some observers have expressed concern that transatlantic coordination has weakened on some issues relating to the Kosovo-Serbia dialogue and to Kosovo's current political impasse. Congress was actively involved in debates over the U.S. response to a 1998-1999 conflict in Kosovo and subsequently supported Kosovo's declaration of independence. Today, many Members of Congress continue to support Kosovo through country- or region-specific hearings, congressional visits, and foreign assistance funding levels averaging around $50 million per year since 2015.", "document_type": "crs"}
{"report": "The asset management industry operates in a complex system with many components. Asset management companies have two major product categoriesâpublic funds and private funds. Additionally, a number of intermediaries, such as investment advisers and custodians, provide distribution channels, safeguards, and other essential services to investors and issuers. Nearly half, or 44.8%, of all U.S. households own some form of public funds. When operating as expected, the industry functions to pool assets, share risks, allocate resources, produce information, and protect investors. Asset management companiesâalso referred to as investment management companies, money managers, funds, or investment fundsâare collective investment vehicles that pool money from various individual or institutional investor clients and invest on their behalf for financial returns. The Securities and Exchange Commission (SEC) is the primary regulator of the asset management industry. The main statutes that govern the asset management industry at the federal level include the Investment Company Act of 1940 (P.L. 76-768), the Investment Advisers Act of 1940 (P.L. 76-768), the Securities Act of 1933 (P.L. 73-22), and the Securities Exchange Act of 1934 (P.L. 73-291). Public and private funds are distinguished by the types of investors who can access them and by the regulation applied to them. Public funds, such as mutual funds, exchange-traded funds (ETFs), closed-end funds, and unit investment trusts (UITs), are broadly accessible to investors of all types. Private funds are limited to more sophisticated institutional and retail (individual) investors, thus the name private fund . The main types of private funds are hedge funds, venture capital funds, and private equity. The first part of this report provides an overview of the asset management industry and its regulation. Although there is no single definition for the industry, the report generally covers public and private investment funds and the industry components that serve those funds. The report also illustrates some of the industry's key risk exposures and the regulations designed to disclose, monitor, and mitigate them. The second part of this report considers current trends and policy issues, including (1) whether the asset management industry affects the financial stability of the United States; (2) whether regulation of the asset management industry provides sufficient protection for the retail investors who invest money in the industry; and (3) the impact of financial technology, or \"fintech,\" on the industry, and whether the current regulatory framework is adequate to address these new technologies. The asset management industry is large and highly concentrated. Exact statistics differ somewhat depending on the source, but one industry report on the world's 500 largest asset managers indicates that the largest U.S. asset managers (i.e., those within the global top 500 ranking) managed around $50 trillion in assets in 2017. The top 10 U.S. asset managers alone held $26.2 trillion in assets under management as of year-end 2017 ( Table 1 ). The industry's assets are measured by assets under management (AUM) and net assets. AUM or gross assets refer to the sum of assets overseen by the asset manager. Net assets refer to the value of assets minus liabilities. U.S.-registered investment companies or \"public funds\" held $21.4 trillion in total net assets as of 2018. Private funds, which are not accessible by typical households, held $8.7 trillion in total net assets and $13.5 trillion in AUM as of December 2018. In addition, other market intermediaries, such as broker-dealers, held around $3.1 trillion AUM as of second quarter 2018. Many types of asset management companies exist. Further, the different types of asset management companies are subject to different regulatory requirements. This section highlights major types of asset management companies, including public funds, private funds, and other forms of asset management. Public funds are pooled investment vehicles that gather money from a wide variety of investors and invest the money in stocks, bonds, and other securities. They are SEC-registered investment companies that are open to all institutional and retail investors in the public, thus the name public funds. Asset holdings of public funds experienced significant growth in the past two decades ( Figure 1 ). At year-end 2018, public funds managed more than $21.4 trillion in assets, largely on behalf of more than 100 million U.S. retail investors. The four basic types of public funds are mutual funds, closed-end funds, exchange-traded funds, and unit investment trusts. Mutual funds are the most widely used pooled investment vehicle. They are also called open-ended funds, referring to their continuous offering of shares. Mutual funds do not have a limit on the number of shares they can issue. The shares are not traded on exchanges. When investors need to exit their investment positions, they \"redeem\" shares at net asset value (NAV). Redemption means selling shares back to the mutual fund. These technical features, including NAV and redemption, are revisited in the context of compliance and risk controls in \" Regulatory and Risk Mitigation Frameworks \" section of this report. A closed-end fund is a publicly traded investment company that sells a limited number of shares rather than continuously offering them. Closed-end fund shares are not redeemable, meaning they cannot be returned to the fund for NAV, but they are traded in the secondary market. Investors can exit closed-end funds by buying or selling shares on securities exchanges. ETFs are pooled investment vehicles that combine features of both mutual funds and closed-end funds. ETFs offer investors a way to pool their money into a fund with continuous share offerings that can also trade on exchanges like a stock. UITs invest money raised from many investors in a one-time public offering in a generally fixed portfolio of stocks, bonds, or other investments. It is an investment company organized under a trust or similar structure that issues redeemable securities, each of which represents an interest in a unit of specified securities. Private funds, in contrast, are investment companies that operate through exemptions from certain SEC regulation. Private funds are also called alternative investments. Relative to public funds, private funds tend to take on higher risk, and they are subject to more investor access restrictions. Private funds are available to only a limited number of qualified investors, thus the name private funds. As of December 2018, private funds held $8.7 trillion in total net assets and $13.5 trillion in gross assets under management ( Figure 2 ). From the SEC's first available private funds statistics in the first quarter of 2013 to the fourth quarter of 2018, the private fund industry grew more than 60%, primarily led by increases in private equity and hedge funds. The rules governing the funds were established as part of the Investment Company Act in the 1940s, but some argue the drafters never foresaw the rise of private funds at such a scale. The current private fund landscape thus raises questions regarding if or how the regulations ought to be updated. The main types of private funds include hedge funds, venture capital funds, private equity funds, and family offices, but these fund types are not mutually exclusive. Some use the term private equity interchangeably as a catch-all phrase to describe all types of private funds. This report uses the terminology set forth by the SEC in its private funds Form PF reporting system. Among all major types of private funds, only venture capital funds and family offices have legal definitions. In 2010, the Dodd-Frank Wall Street Reform and Consumer Protection Act (P.L. 111-203; Dodd-Frank Act) removed the historical exemption from SEC registration for investment advisers with fewer than 15 clients to \"fill a key gap in the regulatory landscape.\" The act also established legal definitions of venture capital funds and family offices, so that these selected private funds could be exempted from the new regulation requirement. In addition, private funds with less than $150 million in assets under management continue to be exempted. A private equity fund is a pooled investment vehicle that typically concentrates on investments not offered to the public, such as ownership stakes in privately held companies. Private equity fund investors include high-net-worth individuals and families, pension funds, endowments, banks and insurance companies. According to a 2017 survey, around 88% of institutional investors invested in private equity funds; nearly a third allocated more than 10% of their assets in private equity. Venture capital funds are sources of startup financing for early stage, high-potential firms, such as high-tech startups. Pursuant to the Dodd-Frank Act, the SEC established a definition for venture capital funds in 2011. To be considered for the venture capital exemption from certain investment company regulatory requirements, the fund should generally pursue a venture strategy, cannot borrow funding to incur leverage, and should hold no more than 20% of its capital in nonqualifying investments, among other conditions. The legal definition of \"venture capital fund\" needs to be met in order to qualify for regulatory exemptions. Hedge funds are pooled investment vehicles that often deploy more \"speculative\" investment practices than mutual funds, such as leverage and short-selling. Among investors, hedge funds are more controversial than other funds because of their high fee structure coupled with reported persistent underperformance. Hedge fund fee structures often include an annual asset management fee of 1% to 2% of assets under management as well as an additional 20% performance fee on any profits. This fee structure could motivate a hedge fund manager to take greater risks in the hope of generating a larger performance fee, yet only the investors, not the hedge funds, bear the downside risk. Prior to the Dodd-Frank Act, hedge funds were virtually unregulated, and regulators were largely unaware of the hedge fund market's size, investment strategies, and number of players. The Dodd-Frank Act mandated more detailed reporting of hedge funds and other private funds. Confidential filings from hedge funds are now reported to the SEC. Despite continuous discussions of whether hedge funds' fees are excessive and their closings, the hedge fund industry remains at peak net assets levels of around $4 trillion ( Figure 2 ). Family offices are investment firms that solely manage the wealth of family clients. They do not offer their services to the public and are generally exempt from SEC registration requirements. According to a 2018 report, around two-thirds of family offices were established after 2000. Owing to their exclusivity, family offices receive minimal regulation and oversight. They have grown rapidly in recent years and are reportedly increasingly becoming an option for some hedge fund managers, who solely manage their own money. Table 2 compares public and private funds' characteristics. The main differences between public and private funds include the following examples: Risk âprivate funds normally invest in higher-risk assets and deploy more volatile investment strategies. For example, certain private funds focus on funding for startups, which are inherently riskier with higher possibilities for business failure. Certain private funds also have a greater ability to borrow money to invest (leverage), which could multiply the funds' risks and returns. Regulation âprivate funds face less regulation relative to public funds. For example, whereas public funds generally have to calculate daily valuation and maintain periodic public reporting, private funds are not subject to such mandates. Investor access â private funds are limited as to the type and the number of investors they can reach, while public funds are available to all investors. These restrictions are meant to protect certain retail investors who are perceived as less sophisticated, given the generally higher risk and lower levels of regulation. Portfolio company involvement â a private equity or venture capital fund typically uses client funds to obtain a controlling interest in a nonpublicly traded company (called a portfolio company). This controlling interest normally allows the private fund to have a say in the portfolio company's operations. Public funds, in contrast, typically do not directly affect portfolio company management and operations, except through shareholder voting processes. Liquidity â liquidity refers to how easy it is to buy and sell securities without affecting the price. Public funds are considered liquid for investors because of their redemption or exchange trading features, whereas private funds are considered illiquid. H olding period Private funds often invest in private securities that are not publicly traded. This causes private funds to normally have to wait for three to seven years before a \"liquidity event\" can occur. The liquidity events are typically company buyouts or initial public offerings (IPOs). Private funds typically realize the gains or losses of their investments only when portfolio companies are sold or go public. Public funds mostly invest in publicly traded companies that are considered to offer immediate liquidity. Public funds are not restricted from investing in private securities, but certain public fund regulatory requirements, such as daily valuation, make private investment operations less practical for public funds. As such, public funds largely focus on publicly traded securities and have not significantly undertaken private securities investments. Publicly traded private funds Some of the world's largest private fund managers are publicly traded, and thus able to offer company stock level liquidity. This means that public investors can directly purchase these fund companies' stocks and gain exposure to the companies' private fund investment portfolios as a whole. Publicly listed asset management firms include Amundi Group, Man Group, Och-Ziff Capital Management Group, Blackstone Group, and KKR. In 2017, they managed $2.4 trillion combined. Publicly traded private funds must concurrently adhere to private fund compliance requirements and restrictions, as well as public security offering standards. These private funds separately answer to both their direct fund investors and public shareholders. Other forms of asset management do not fit tightly into the public or private fund categorization. Business development companies (BDCs) are closed-end funds that primarily invest in small and developing businesses, and that generally provide operational assistance to such businesses in addition to funding. Congress created BDCs in 1980 in amendments to the Investment Company Act of 1940 to \"make capital more readily available to small, developing, and financially troubled companies that are not able to access public markets or other forms of conventional financing.\" BDCs are not required to register with the SEC as investment companies, and thus face much less regulation than mutual funds. But they do offer their securities to the public, and their public offerings are subject to full SEC reporting requirements. A fund of funds is an investment fund that invests in other funds. The fund of funds design aims to achieve asset allocation, diversification, hedging, or other investment objectives. The SEC estimates that almost half of all registered funds invest in other funds. The asset management industry operates in a complex system with many components, including different types of funds and various intermediaries. This section explains the operation of a typical public fund as well as other prominent actors supporting the fund and the efficient operations of the industry. Funds typically operate through asset management companies (AMCs). The largest AMCs, as measured by assets under management, are shown in Table 1 . The AMCs can manage multiple funds of different types. Each fund has an Investment Management Agreement that designates the AMC to manage the fund's portfolio composition and trading. As Figure 3 illustrates, the end investors own the fund and contribute cash for its shares, custodians safeguard the fund assets, and the fund can also interact with certain counterparties for other transactions. The main players supporting the asset management industry include those who are more directly related to the flow of capital, such as financial advisers and others who serve back-office or administrative functions, such as data and research, asset safekeeping, and shareholder voting. Because funds are also financial products that are sold to investors, investment advisers and broker-dealers are the most commonly used retail sales and distribution channels. This section discusses several selected groups of players that frequently appear in asset management policy discussions. An investment adviser is \"any person or firm that for compensation is engaged in the business of providing advice to others or issuing reports or analysis regarding securities.\" Investment advisers generally include money managers, investment consultants, financial planners, and others who provide advice about securities. Investment advisers meeting the SEC legal definition must register with the SEC. As of 2018, the SEC oversaw around 13,200 registered investment advisers. Brokers and dealers are often discussed together, but they are two different types of entities. Brokers conduct securities transactions for others. They are generally paid a commission on securities sales. Dealers conduct securities transactions for their own accounts. Most brokers and dealers must register with the SEC and also comply with the guidance of self-regulatory organizations (SROs). The Financial Industry Regulatory Authority (FINRA) is the main SRO for the broker-dealer industry. FINRA writes and enforces broker-dealer rules, conducts examinations, and provides investor education. As of 2018, FINRA supervises around 3,596 member firms and 626,127 individual registered reps. Custodians provide safekeeping of financial assets. They are financial institutions that do not have legal ownership of assets but are tasked with holding and securing the assets, among other administrative functions. As mentioned in more detail in the \" Asset Management Risks and Regulation \" section of this report, client assets are not owned by an adviser or fund. As part of the regulatory requirements to protect investors, client assets are generally required to be safeguarded by a qualified custodian who maintains possession and control of the assets. In the past 90 years, financial custody has evolved from a system of self-custody to custodians playing key component of asset management operations. Today, four banks (BNY Mellon, J.P. Morgan, State Street, and Citigroup) service around $114 trillion of global assets under custody. The asset management industry in its essence is also an investment research industry that aggregates data and analysis for investment decision-making. Owing to the sophistication of the industry's technology and analysis, there are many data vendors and research providers, including national exchanges, data and technology aggregators, and sell-side researchers involved. A proxy vote is a vote cast by others on behalf of a shareholder who may not physically attend a shareholder meeting. This is how the vast majority of shareholder votes are cast. The SEC requires investment managers to vote as proxies in the best interest of their clients and disclose their voting policies and records to clients. During the 2018 shareholder meeting season, there were more than 4,000 shareholder meetings involving over 259 million proxy votes. Under the current system, shareholders cast their votes through a variety of intermediaries that assume the functions of forwarding proxy materials, collecting voting instructions, voting shares, soliciting proxies, tabulating proxies, and analyzing proxy issues. Different aspects of this complex system have attracted years-long policy debates regarding proxy reform. The asset management industry's legislative history is relatively long and complex. The current regulatory regime governing the asset management industry was not a comprehensive design from inception, but rather developed through many iterations of adjustments and expansions. Therefore, the asset management industry is overseen by a somewhat fragmented regulatory regime with areas of disconnect between business practices and the legal definitions describing them. Congress created the SEC during the Great Depression to restore public confidence in the U.S. capital markets. Early policymaking in the 1930s focused on full disclosure, with the specific intention that publicly traded companies tell the whole truth about any material issues pertaining to their securities and the risks associated with investing in them. However, Congress realized that the disclosure-based approach alone was not enough to deter fraudulent and abusive activities in the asset management industry, which flourished in the 1920s and 1930s. Congress thus directed the SEC to conduct a 1Â½-year study of the issue in the Public Utility Holding Company Act of 1935. The SEC took four years, resulting in a four-part study with six additional supplemental reports. Based on the SEC research and subsequent hearings, in 1940, Congress introduced two new laws to govern the asset management industryâthe Investment Company Act of 1940 and the Investment Advisers Act of 1940. These statutes and regulations required those who manage and distribute funds to treat investors fairly and honestly. The textbox below describes the individual laws, which generally apply to the asset management industry as follows: Asset management companies must comply with the Investment Company Act of 1940 or gain exemption from its requirements. Funds' portfolio managers or investment advisers generally must register with the SEC under the Investment Advisers Act of 1940. The funds themselves are securities, and thus subject to federal securities regulation in relation to securities offering and trading, including the Securities Act of 1933 and the Securities Exchange Act of 1934. After the 2007-2009 financial crisis, Congress directed more attention toward financial services sector risks and policy solutions. In some congressional discussions, risks in the banking and asset management industries were jointly debated. Although similarities exist between the two industries' financial risks, there are fundamental differences. These differences are derived from the industries' different business models, risk controls, and risk mitigation backstops. The asset management framework is an agent-based model that separates investment management functions from investment ownership. This is different from the principal-based model for banking, in which banks own and retain the assets and risks. In many ways, asset managers are viewed as agents that perform investment management services. They are compensated through service or performance fees, but otherwise they are insulated from the investment returns or their clients' account losses. Because their clients' assets are not owned by the funds, asset managers routinely exit the market without significant market impact. Even when under market stress, the risks associated with asset managers winding down differ greatly from those associated with bank liquidations. Whereas bank failures may lead to government financial intervention for either recovery or resolution, asset managers do not own or guarantee client assets. Their clients bear investment performance risks and can directly transfer assets out of failing asset management firms. With that said, macro-prudential tools for detecting and mitigating systemic risks in the banking sector have been considered for asset management firms. For example, the Dodd-Frank Act mandated the SEC implement annual stress testing for certain asset managers. Disclosure requirements are the cornerstone of securities regulation. The purposes of and requirements for disclosure differ for public and private funds. Public funds normally provide public disclosures to inform investors. Private funds normally provide SEC-only disclosures that allow the agency to monitor risks and inform policy, while maintaining confidentiality. Public disclosures allow the public to make informed judgments about whether to invest in specific funds by ensuring that investors receive significant information on the funds. The disclosure-based regulatory philosophy is consistent with Supreme Court Justice Louis Brandeis's famous dictum that \"sunlight is said to be the best of disinfectants; electric light the most efficient policeman.\" Public disclosures, including mutual fund and ETF prospectuses, are available for free from the SEC public disclosure portal. SEC-registered investment advisers, for example, are also required to publicly report their business operations and certain disciplinary events. A number of SEC-only reporting requirements apply to public and private funds and their advisers. The private disclosures are often for purposes of regulatory review, risk monitoring, and policymaking. The SEC normally does not make information that identifies any particular registrant publicly available, although it can release certain information in aggregate and use the information in enforcement actions. Examples of private disclosure include public fund liquidity position reporting and periodic reporting of private funds by SEC-registered investment advisers pursuant to Dodd-Frank Act requirements. Public funds are open to all investors, but private funds' investor access is restricted by several intersecting federal laws that govern different regulatory requirements for securities offerings, investment management companies, and investment advisers. Only those investors who meet certain definitions can invest in private funds without triggering related regulatory requirements. Funds can avoid additional regulatory requirements by adhering to restrictions on the types of investors permitted to invest in the fund; some examples follows: Accredited investorâif a fund's investors meet the definition, such a fund could qualify for private securities exemption. Qualified clientâif a fund's investors meet the definition, the fund manager could receive performance-based compensation. Qualified purchaserâif a fund's investors meet the definition, the fund could be exempted from registering as an investment company. Most private funds choose to comply with investor definitions to preserve their scaled-down regulatory requirements relative to public funds. The specifics of the investor access definitions, especially the accredited investor definition, have been a source of policy debate. The SEC's Office of Compliance Inspections and Examinations (OCIE) is responsible for conducting examinations and certain other risk oversight of the asset management industry. In addition, self-regulatory agencies, such as FINRA, also conduct examinations of their members under SEC oversight. OCIE examinations focus on compliance, fraud, risk monitoring, and informing policymaking. OCIE has 1,000 employees in 11 regional offices and headquarters. Approximately 10,000 mutual funds and ETFs, 13,200 investment advisers, and 3,800 broker-dealers, among other regulated entities are subject to potential examinations. The OCIE completed more than 3,000 examinations in fiscal year 2018. The federal government does not guarantee or insure the value and performance of investment management accounts. As the common investment disclaimerâ\"past performance is no guarantee of future results\"âsuggests, due to unpredictable market fluctuations, capital markets investors could experience underperformance or lose their principal. Investors should be prepared to absorb their own losses. When a capital markets firm fails, certain losses could possibly receive limited payouts for investors from the Securities Investor Protection Corporation (SIPC). However, the nature and the level of payouts are different than those associated with the banking insurer Federal Deposit Insurance Corporation (FDIC). SIPC is a nongovernment nonprofit corporation created by the Securities Investor Protection Act. It insures up to $500,000 of cash and securities (with a $250,000 limit for cash) in brokerage accounts to protect customers against cash and securities losses if their brokerage firm fails. SIPC only protects the custody function of the broker-dealers, which means it works to restore any assets missing from customers' accounts but it does not protect the principal against the decline in market value of investments. The FDIC, in contrast, is a government organization that insures up to $250,000 of deposits, including principal, in banks and thrift institutions when these institutions fail. The asset management industry faces a number of risks. Some of them are inherent in the industry's agent-based business model whereas others are more common to financial services institutions. This section lays out examples of the risk factors and attendant mitigation controls to help policymakers better comprehend the rationale behind the regulatory requirements. This section also contains a summary table ( Table 3 ) providing context on how certain existing regulations fit into risk mitigation policy goals. Context : Conflicts of interest may occur in any principal-agent paradigm within which one entity (agent) makes decisions on behalf of another entity (principal). In the context of asset management industry client relationships, the central concern is that asset managers (agents) may not act in the best interest of investors (principals). An example of a conflict of interest would be an investment adviser directing clients' investments toward products that generate higher sales commissions, rather than products that best fit the clients' financial needs. Example s of mitigation controls : SEC-registered investment advisers are fiduciaries, meaning they have a legal obligation to act in the best interest of their clients. FINRA also casts a similar, yet less rigorous suitability requirement for broker-dealers. The standard requires broker-dealers to make investment recommendations to suit client financial needs. In addition, the SEC adopted Regulation Best Interest in June 2019 to address certain conflict of interest concerns in financial advisory services. The proposal aims to further prevent financial advisers from placing their own financial or other interests ahead of the best interest of their clients. Context : Liquidity, as mentioned previously, is commonly defined as the ease of buying or selling assets without affecting their prices. The easier the assets are to sell, the higher their liquidity. The liquidity issue could be especially important during market distress, when factors like cash needs and exceptional volatility in asset valuations could drive panic reactions in the market. Different funds have different types of liquidity risk concerns. Mutual funds that allow investors to redeem their shares daily need to maintain sufficient liquid assets to meet shareholder redemptions and minimize the impact of the redemptions on the funds' remaining shareholders. Private funds present different concerns because, in most cases, their investors enter into illiquid investments knowing that they could experience several years of holding periods. Private funds generally do not promise daily redemption, and investors in private funds cannot easily sell their positions to meet urgent cash needs. Example s of mitigation controls : Funds that offer frequent redemption as a product feature must maintain liquid assets to meet potential redemptions. Under the SEC liquidity rule, such funds must categorize their investments into four different types and limit their illiquid investments to no more than 15% of the funds' net assets. Context : Leverage generally refers to the use of borrowed funding to invest, which may multiply risks and returns. High leverage could complicate funds' investment structures and increase risks to both individual investors and the financial system as a whole, due to its effects in multiplying both losses and returns. Examples of mitigation controls: Mutual funds and closed-end funds are subject to a 300% asset coverage requirement. This is a leverage ratio of 33%, meaning the fund cannot borrow an amount exceeding a third of its portfolio size. By contrast, most private funds do not have leverage restrictions. Context : Operational risks arise from operational challenges and business transaction issues. Operational risks are especially important for the asset management industry because the industry manages client accounts. Accurate client account recordkeeping and transfer, asset safeguards, information sharing, and cybersecurity are some areas of operational importance. Examples of mitigation controls: The SEC's custody rule requires registered investment advisers to engage qualified custodians to (1) have possession and control of assets, (2) undergo annual surprise examinations, (3) have a qualified custodian maintaining client assets, and (4) send account statements directly to the clients instead of to funds, among other requirements. Over the past several decades, the asset-management industry has undergone several changes that may have important implications for public policy. This section discusses a number of these changes, including (1) the industry's overall growth; (2) increased reliance on capital markets for financing rather than bank loans by American businesses; (3) a shift from active to passive investment style; and (4) the expansion of private securities markets. In the past two decades, the asset-management industry has grown significantly because of increased use of defined-contribution retirement plans, asset appreciation, and changes in investment styles and preferences, among other things (see Figure 1 and Figure 2 ). Over the past 70 years, investors have largely shifted from investing directly themselves to investing indirectly through asset managers. For example, in the 1940s, almost all corporate equities were held by households and nonprofits, whereas in 2017, direct holdings by individuals made up less than 40% of total holdings. Some argue that the percentage of equity directly held by individuals could be closer to 20%. As a result of these changes, asset managers now dominate the investment decisionmaking on behalf of retail investors and other institutions. Their influence on both investors and the companies they invest in has expanded. The importance of the asset-management industry has also increased because of changes in the relative importance of the capital markets and banks. Specifically, growth in capital markets financing (i.e., the issuance of bonds and other debt securities) significantly outpaced growth in bank loans ( Figure 4 ). This general trend has increased the relative importance of asset managers, who represent major holders of such bonds and debt securities. For example, mutual funds and ETFs held about 21% of all U.S. corporate bonds in 2018, more than double their percentage of such holdings in 2009. The International Monetary Fund (IMF) has observed that this shift may be attributable to tighter banking regulation, rising compliance costs, and bank deleveraging following the 2007-2009 financial crisis. As Figure 4 illustrates, U.S. capital markets play a much more dominant role in business financing relative to the Euro area. The asset-management industry has also witnessed a trend away from active and toward passive management, whereby asset managers do not actively select funds' portfolio assets, instead pegging investments to an index, such as the S&P 500. In recent years, passive investment through index mutual funds and ETFs has displaced active investment ( Figure 5 ). This trend has mostly been driven by passive funds' lower costs through management fee savings and superior performance. According to a 2016 S&P Global study, for example, active stock managers underperformed their passive-fund targets more than 80% of the time over 1-year, 5-year, and 10-year periods. The rise of passive investing has generated criticism from active asset managers. Some active managers are concerned that the growth of passive investing will undermine price discovery through reduced fundamental research by active asset managers. They argue this could create systemic risk concerns through correlations and volatility, affecting the efficient allocation of capital. Regarding financial stability, a recent Federal Reserve whitepaper concludes that the shift from active to passive investment has probably reduced liquidity transformation risks while amplifying market volatility and asset management industry concentration. Finally, some argued that actively managed funds perform better than passive strategies when markets are less efficient. If this argument is true, then actively managed funds may be able to capitalize on market inefficiencies caused by growth in passive investment, enabling continued growth in active management as well. The asset-management industry has also taken on increased importance because of a significant rise in the volume of private securities offerings. Because many asset managers purchase large volumes of private securities, this shift has led the asset-management industry to occupy an increasingly central role in U.S. financial markets. In 2018, American companies raised roughly $2.9 trillion through private offeringsâmore than double the size of public offerings that year. The increase in the volume of private securities offerings has also attracted the attention of policymakers, some of whom have proposed measures to increase investor access to private securities markets. For example, a type of closed-end fund, referred to as an interval fund, can conduct periodic repurchases generally every 3, 6, or 12 months. Because of the longer intervals, these funds are better able to involve less liquid assets such as private securities. In a 2017 report, the Treasury recommended the SEC review the rules governing interval funds. The SEC also explored the potential of interval funds in its 2019 concept release regarding private securities markets. The increased importance of the asset-management industry raises a variety of policy issues. This section discusses several of these issues, including financial stability, investor protection, and financial innovation. Financial stability typically refers to the ability of the financial system to withstand economic shocks and satisfy its basic functions: financial intermediation, risk management, and capital allocation. Policymakers attempting to safeguard financial stability generally focus on the minimization of s ystemic risk âthe risk that the entire financial system will cease to perform these functions. Former Federal Reserve Governor Daniel Tarullo has identified four possible sources of systemic risk: Domino or spillover effects â when one firm's failure imposes debilitating losses on its counterparties. Feedback loops â when fire sales of assets depress market prices, thereby imposing losses on all investors holding the same asset class. Contagion effects âa run in which investors suddenly withdraw their funds from a class of institutions or assets. Disruptions to critical functions â when a market can no longer operate because of a breakdown in market infrastructure. According to an international financial organization, the Financial Stability Board, asset-management companies did not display particularly large financial stability concerns during the 2007-2009 financial crisis, with the exception of money market mutual funds (MMFs). This is a result of the fact that asset managers are generally agents who provide investment services to clients rather than principals who invest for themselves. They manage large amounts of assets, but do not have direct ownership of them. As such, asset managers are largely insulated from client account losses. This does not mean that the industry is free of financial stability concerns. Actual market events show that even perceived-to-be-safe funds could trigger financial system instability. For example, the money market mutual fund industry triggered market disruptions in 2008 and accelerated the 2007-2009 financial crisis. Before that, hedge fund Long-Term Capital Management's failure in 1998 also demonstrated that the transmission of risks from one event can broadly affect the functioning of the financial system. The Financial Stability Board identified several asset management structural vulnerabilities that could present financial stability risks. These vulnerabilities include liquidity mismatch, leverage within investment funds, operational risk and challenges under stressed conditions, and certain lending activities of asset managers and funds. This section uses three examplesâmoney market mutual funds, ETFs, and leveraged lendingâto illustrate the context of selected asset management structural vulnerabilities and the extent to which these vulnerabilities could cause financial stability concerns. Money market mutual funds (MMFs) represent one corner of the asset-management industry that has generated systemic-risk issues. MMFs are mutual funds that invest in short-term debt securities, such as U.S. Treasury bills or commercial paper (a type of corporate debt). Because MMFs invest in high-quality, short-term debt securities, investors generally regard them as safe alternatives to bank deposits even though they are not federally insured like bank deposits. Like the shares of other mutual funds, MMF shares are generally redeemed at net asset value (NAV), meaning investors sell shares back to a fund at a per share value of the fund's assets minus its liabilities. Some MMFs, however, operate somewhat differently than most other mutual funds. Specifically, some MMFs aim to keep a stable NAV at $1.00 per share, paying dividends as their value rises and thereby even more closely mimicking the features of bank deposits. If its stable NAV drops below $1.00, which rarely occurs, it is said that the MMF \"broke the buck.\" On September 15, 2008, Lehman Brothers Holdings Inc. filed for bankruptcy . The next day, one MMF, the Reserve Primary Fund, broke the buck when its shares fell to 97 cents after writing off the debt issued by Lehman Brothers. This event triggered an array of market reactions and accelerated the 2007-2009 financial crisis. Ultimately the Treasury Department intervened with an emergency guarantee program for MMFs as one of the ways to address the crises. MMFs thus became a known financial stability concern, demonstrating clearly that they are susceptible to sudden large redemptions (runs) that can cause dislocation in short-term funding markets. MMFs are vulnerable to runs because shareholders have an incentive to redeem their shares before others do when there is a perception that the fund could suffer a loss. To address this concern, the SEC promulgated MMF rules in 2010 and 2014 mandating that institutional municipal and institutional prime MMFs float their NAV from stable value. The SEC also provided new tools to the MMFs' boards, allowing them to impose fees and redemption gates to discourage runs. Policy discussions continued after the 2014 revisions, especially about whether the MMFs' NAV should be floating or stable, generating controversy and attracting congressional interest. For example, the Consumer Financial Choice and Capital Markets Protection Act of 2019 (S. 733) would require the SEC to reverse the floating NAV back to a stable NAV for the affected MMFs. A floating NAV reflects more closely the actual market value of the fund. Proponents believe the floating NAV could (1) reduces investors' incentive in distressed markets to run because of the difference between stable value and the actual market value; (2) allows investors to understand price movements and market fluctuations, and (3) removes the implicit guarantee of zero investor losses through stable value that could lead to unrealistic expectations of safety. Opponents believe that floating NAV does not solve the issue of investors fleeing. For example, one academic research article concludes that European MMFs that offer similar structures to floating NAV did not experience significant reduction in run propensity during market distress. In addition, providing floating NAV requires calculation time and more tax, accounting, and disclosure related business model changes. Opponents also point to the volume decline of affected MMFs since the reform as an example of a shrinking MMF market that may create working capital shortages for business and municipal operations. Others argue that because the MMF reform has been fully implemented since October 2016, it makes sense to study the actual effectiveness and impact of the reform before considering changes. Some commentators have also argued that ETFs raise certain systemic-risk concerns. The vast majority of all ETF assets are passively managed or index-based; thus investors often view the high growth in ETFs as one of the driving forces behind the passive investment trend the report discusses in the previous section. With U.S. ETFs accounting for more than $3.4 trillion in assets under management and 30% of all U.S. equity trading volume in 2018, ETFs' scale and continued growth give rise to financial stability considerations. The key systemic-risk issue surrounding certain ETFs involves liquidity mismatch . Liquidity mismatch generally points to a relatively complex ETF operational structure that offers buying and selling activities at both the fund level and the portfolio asset level. If the amount of liquidity differs between the two levels, for example, if the ETF shares trade differently than the underlying portfolio ETF holdings of stocks or other assets, there could be a liquidity mismatch. Some argue this liquidity mismatch could amplify market distress and potentially trigger fire sales that further depress asset prices and worsen market conditions. In contrast, others have argued that liquidity provision through the ETF structure is additive, meaning an ETF's liquidity is at least as great as that of its underlying assets. Other commentators have argued that not all ETFs are created equal. The majority of ETFs are \"plain-vanilla\" index-tracking products that are considered lower risk. However, there is also a growing subset of complex, higher-risk ETFs that is a source of greater concern. To add to the confusion, the industry does not currently have a consistent naming convention to clearly differentiate between the types of products that are higher risk. On September 26, 2019, the SEC established a comprehensive listing standard for ETFs only. Prior to that, prospective ETF issuers typically must have been approved by the SEC under an exemption to the Investment Company Act. The new ETF approval process replaces individual exemptive orders with a single rule for plain-vanilla ETFs. The approach excludes certain higher-risk ETFs and mandates new disclosures and other conditions on index-based and actively managed ETFs. Leveraged lending, also referred to as leveraged loans, is financing made to below investment grade companies (i.e., companies with a credit rating below BBB-/Baa3), which tend to be highly indebted. Leveraged lending received its name because of the recipients' high-debt-to-earnings leverage. Most leveraged loans are syndicated, meaning that a group of bank or nonbank lenders, including asset managers, collectively funds a single borrower, in contrast to a traditional loan held by a single bank. Some regulators consider syndicated loans to be an emerging regulatory gray area that is not fully overseen by either banking or securities regulators. Leveraged loans generally present higher risks than other forms of lending because they involve riskier borrowers and often feature relatively weak investor safeguards (indicated by a weak \"covenant\") and relatively weak capabilities for loan repayment, indicated by high ratios of debt to earnings before interest, tax, depreciation and amortization (EBITDA). During the past decade, the U.S. leveraged loan market experienced rapid growth, deteriorating credit quality, and decreased repayment capabilities ( Table 4 ). However, the total amount of leveraged loans outstanding remained relatively low at around $1 trillion as of 2018. Nonbanks make up around 90% of the leveraged loan primary market investor base as of 2017. Mutual funds and hedge funds held 21% and 5% of leveraged loans in 2017 respectively, with mutual funds' share of the market more than doubling between 2006 and 2017. In addition, nearly 60% of U.S. leveraged loans are packaged into a type of structured credit called a collateralized loan obligation (CLO). CLOs are then sold to institutional investors, including asset managers, banks, and others, with the asset management industry holding the riskier CLO tranches and banks holding the higher-quality tranches. Mutual funds and other investment vehicles hold more than 20% of CLOs. Multiple financial regulators and Members of Congress have voiced concerns about leveraged loans' risks and implications for financial stability. However, other commentators have argued that leveraged loans are resilient and stable, claiming unwarranted fears. Leveraged lending raises a variety of policy issues, including the following: Market o pacity . Leveraged lending, particularly the increase of covenant-lite loans, couples high risk with relative lack of transparency, potentially leading to unexpectedly high losses and shocks to the financial system ( Table 4 ). It is unclear, as discussed below, the degree to which contagion across the financial system would result from this. Liquidity mismatch. Public funds expect easy entry and exit through daily redemption or intraday trading, whereas leveraged loans, which could serve as underlying assets to funds, trade infrequently and take longer to settle. These features of leveraged loans have prompted the Chairman of the SEC to caution that investors should be aware of their relative illiquidity. The loan syndication process and federal oversight. Leveraged loans are usually syndicated by groups of institutional investors, including asset managers. Some regulators and researchers worry that certain leveraged loans are less regulated than other financial products like bonds and bank loans. Contagion risk . Given the leveraged loan market's size and investor composition, some experts have argued that leveraged lending raises concerns about financial contagion. However, most investors in leveraged loans are nonbanks, with the asset management industry holding a significant portion of total outstanding exposure. As a result, some commentators have argued that direct financial losses from leveraged loans would largely stop at the investor level, instead of being multiplied throughout the interconnected financial system by banks. The Chairman of the Federal Reserve, for example, has indicated that while leveraged loans raise some concerns, they \"do[es] not appear to present notable risks to financial stability.\" Data gap. Some analysts have argued that the lack of available information through data collection and sharing on CLO holdings has prevented the industry and the regulators from monitoring risks in the leveraged lending market. Investor protections attempt to prevent investors from being harmed due to inappropriate risk exposure, conflicts of interest, or abusive conduct. This section discusses certain policy debates concerning investors' access to private funds, fund disclosures, and asset managers' voting of clients' stocks. Some private funds are limited to \"accredited investors\"âa limitation that has generated debate about which categories of investors should be eligible for this status. An individual can qualify as an accredited investor if he or she (1) earned more than $200,000 (or $300,000 together with a spouse) in annual gross income during each of the prior two years and can reasonably be expected to earn a gross income above that threshold in the current year, or (2) has a net worth of more than $1 million (either alone or together with a spouse), excluding the value of their primary residence. Institutions can also qualify as accredited investors if they own more than $5 million in assets. A number of regulated entities, such as banks, insurance companies, and registered investment companies, automatically qualify as accredited investors. Some commentators have criticized the SEC's existing rules for determining accredited investor status, arguing that income and net-worth criteria bear little relationship to investor sophistication. These critics contend that the current accredited investor definition is both over- and under-inclusive, capturing wealthy but unsophisticated investors while excluding those who are well-informed but less affluent. In addition, given the trend of private securities offerings outpacing public offerings, some observers are concerned about ensuring equal access to investment opportunities and the diversification benefits from allocating capital across the full spectrum of public and private securities and funds. Commentators have accordingly discussed expanding the accredited investor definition to (1) account for individuals with financial training or demonstrated financial experience, (2) allow investors to opt-in to private market investment opportunities, or (3) expand the eligible accredited investor base in other ways, subject to certain limitations. Proxy voting represents another issue involving investor protection that has taken on increased significance. Asset managers have fiduciary duties to vote the proxies of their public company voting shares on their clients' behalf. Some asset managers outsource proxy voting and research to proxy advisory firms, whereas others operate these functions in-house. Commentators have identified a number of policy issues involving the proxy system, including (1) stewardshipâwhether asset managers and proxy advisory firms are in fact voting in their clients' best interests; and (2) accuracyâwhether the actual votes are tabulated correctly. These topics are critically important because proxy voting can often decide the strategic directions of publicly traded companies. To address these issues, the SEC issued a concept release soliciting public feedback on the proxy system in 2010. The SEC has also held multiple roundtables to discuss the proxy process, most recently in November 2018. Ensuring full and fair disclosure of material information is a key objective of the federal securities laws. To promote these goals, the SEC has implemented a series of initiatives to improve the investor experience by updating the design, delivery, and content of fund disclosure. For example, after longstanding policy debate, the SEC adopted Rule 30e-3 in June 2018 to allow certain investment funds to transmit shareholder reports digitally as the default option. Supporters of this rule point to its environmental and economic benefits, including its estimated $2 billion savings over a 10-year period. In contrast, the rule's opponents have voiced concerns over the usefulness of electronic reports for elderly and rural investors who may lack access to or familiarity with the Internet. The SEC continues to seek public input on the fund disclosure and retail investor experience, including shareholder reports, prospectuses, advertising, and other types of disclosure. Financial innovation is an integral part of the asset management industry's development. Innovation raises policy and regulatory issues, including (1) whether new technologies and practices have outgrown or are sufficiently served by the existing regulatory system; (2) how the regulatory framework can achieve the goal of \"same business, same risk, same regulation\"; and (3) how to protect investors without hindering innovation. This section explains policy challenges involving these general issues. Digital-asset custody has recently attracted regulatory attention. Under the SEC's Custody Rule, custodians of client assets must abide by certain requirements designed to protect client funds from the possibility of being lost or misappropriated. This rule was developed for the traditional asset management industry that dealt in instruments with more tangible tracks of physical existence and recording, and thus could pose unique challenges for digital assets often without tangible representation. For example, the digital asset industry's common practice thus far focuses on the safeguarding of private keys. Private keys are unique numbers assigned mathematically to digital asset transactions to confirm ownership, raising questions about the nature of \"possession\" and \"control\" of a digital asset. A March 2019 letter from the SEC to the digital asset industry solicited public input regarding the custody of digital assets. In the letter, the SEC summarized a number of policy issues involving the custody of digital assets, including the use of distributed ledger technology (DLT) to record ownership, the use of public and private cryptographic key pairings to transfer digital assets, the ability to restore or recover lost digital assets, the generally anonymous nature of DLT transactions, and the challenges auditors face in examining DLT and digital assets. Congressional hearings have also addressed the issue of digital asset custody. A second recent development in financial technology that raises important policy questions involves the entry of nonfinancial technology platforms into the financial services industry. Large technology firms such as Amazon, Facebook, and Uber have all started financial-services operations as potential competitors and partners to the asset-management industry. Although the scale of this innovation has not been broadly felt, industry experts like the World Economic Forum predict that platforms offering the ability to engage with different financial institutions from a single channel will likely become the dominant model for the delivery of financial services. Technology firms have the potential to disrupt the asset-management industry through digital asset transactions, robo advisory services, and direct asset management product distribution to investors. Investment researchers argue that Amazon, for example, could use the trust of its brand and distribution channels to become \"an arms-length distributor of funds.\" The influence of technology platforms has already been realized in certain overseas markets. For example, Ant Financialâan affiliate of Alibaba Groupâmanages the world's largest MMF, with 588 million Alipay users, a third of the Chinese population, among its investors. This entry of technology companies into financial services raises a number of concerns related to these companies' power, their control over user data, and personal privacy. Facebook is among the technology companies that have expressed interest in entering financial services. In June 2019, the social media company announced its intention to develop a new cryptocurrency called Libraâa revelation that has attracted congressional interest. At a hearing addressing the issue, several Members of Congress questioned Facebook officials about how Libra should be regulated and whether it meets the existing regulatory definition of an ETF, among other issues. Some commentators have argued that because Libra will be backed by reserve assets that certain authorized sellers can exchange for units of the cryptocurrency, its operational structure is similar to that of ETFs, which rely on a roughly comparable creation and redemption process. Although Facebook officials acknowledged that Libra uses operational mechanisms that are similar to ETFs, the company maintained that the cryptocurrency should not be considered an ETF because it is intended to operate as a payment tool rather than an investment vehicle. If Libra did qualify as an ETF, it would fall under the SEC's oversight and require regulatory approval. The SEC is reportedly evaluating whether the cryptocurrency will fall within that category. Some Members of Congress have also expressed opposition to Facebook's Libra project. Members of the House Financial Services Committee have circulated a discussion draft, the Keep Big Tech Out of Finance Act , which would prevent certain large technology firms from creating digital assets intended to be used widely as a medium of exchange, unit of account, or store of value. The asset-management industry is large, complex, and governed by a host of intersecting federal regulations primarily overseen by the SEC. The industry has undergone a number of changes, including increases in its size, changes in the relative importance of capital markets and banks, shifts away from active and toward passive investment management, and increases in the volume of private securities offerings. Some of these trends raise important policy issues, including financial stability, investor protection, and the promotion of financial innovation. As a general matter, asset-management companies have generated fewer financial-stability concerns than some other financial institutions. This is largely because asset managers generally are agents who provide investment services rather than principals who invest for their own accounts. But it does not mean that the industry is free of financial stability risks. Specific structural vulnerabilities, for example, redemption risk and liquidity mismatch, among other vulnerabilities, could be observed in the context of certain MMFs, ETFs, and leveraged lending, but their implications are uncertain. The asset-management industry is governed by a range of investor-protection rules that raise various policy issues, including the appropriate level of investor access to certain types of funds, fund disclosure, and proxy voting. Finally, the need to balance financial innovation with investor protection has generated a number of important debates surrounding digital asset custody and the entry of technology firms into financial services. CRS Report R45221, Capital Markets, Securities Offerings, and Related Policy Issues , by Eva Su. CRS Report R45318, Exchange-Traded Funds (ETFs): Issues for Congress , by Eva Su. CRS Report R45308, JOBS and Investor Confidence Act (House-Amended S. 488): Capital Markets Provisions , coordinated by Eva Su. CRS Report R43413, Costs of Government Interventions in Response to the Financial Crisis: A Retrospective , by Baird Webel and Marc Labonte. CRS In Focus IF10700, Introduction to Financial Services: Systemic Risk , by Marc Labonte. CRS In Focus IF11062, Introduction to Financial Services: Capital Markets , by Eva Su. CRS In Focus IF11278, Accredited Investor Definition and Private Securities Markets , by Eva Su. CRS In Focus IF10747, Private Securities Offerings: Background and Legislation , by Eva Su. CRS In Focus IF11004, Financial Innovation: Digital Assets and Initial Coin Offerings , by Eva Su. CRS In Focus IF11256, SEC Securities Disclosure: Background and Policy Issues , by Eva Su. CRS In Focus IF11320, Money Market Mutual Funds: A Financial Stability Case Study , by Eva Su. ", "summary": "The asset management industry is large and complex. Asset management companiesâalso known as investment management companies, or asset managersâare companies that manage money for a fee with the goal of growing it for those who invest with them. The most well-known product these companies create are investment funds. Many types of investment funds exist, including mutual funds, exchange-traded funds (ETFs), hedge funds, private equity, and venture capital. Their business practices and the types of regulatory requirements to which they are subject are far from standardized. Investment funds differ by, among other things, asset risk profile, investor access, portfolio company operations, and the ease of buying or selling their shares. In addition to investment funds, the asset management industry also consists of entities that connect funds to investors and other services, such as investment advice providers and custodians. Asset managers collectively manage trillions in assets, including investment savings, of nearly half of all U.S. households. The industry has experienced periods of high growth largely attributable to retail investors' increased reliance on asset managers to invest their money for them rather than investing their own money themselves. The Securities and Exchange Commission (SEC) is the primary regulator overseeing the asset management industry. The industry is governed by a somewhat fragmented regulatory regime stemming from several different statutes. Most of the regulatory framework was created in the 1930s and 1940s, but the business practices and trends affecting the industry are evolving. Examples of this evolution include (1) the rapid growth of the industry; (2) the increasing dependency of American businesses on capital market financing; (3) the shift from active to passive investment style; and (4) the expansion of the private securities markets. Congress has shown interest in issues relating to the asset management industry. During the 116 th Congress, lawmakers have held related hearings on asset management, financial innovation, investor protection, financial stability, and leveraged lending. Three areas that have been of particular interest to many are as follows: Whether the asset management industry has any implications for financial stability in the United States. Some financial authorities state that asset management companies did not pose much concern to financial stability during the 2007-2009 financial crisis period, with the exception of money market mutual funds. This is because asset managers are generally agents who provide investment services to clients without taking direct risk of financial loss. But some argue that structural vulnerabilities do exist and could be observed in certain financial instruments. Their implications, however, are uncertain. Whether regulation of the asset management industry provides sufficient access and protection for retail investors. The investor protection concerns center on investor access restrictions, especially for private funds. Private funds are perceived to have a higher risk and return profile relative to public funds, thus leading to discussions of investor protection and equal access to investment opportunities. The impact of financial technology on the industry, and whether the current regulatory framework is adequate to address these new technologies. Financial innovation is an integral part of the asset management industry's development, and it creates policy and regulatory debates regarding the extent to which the new technologies are appropriately served by the existing regulatory regime. One of the common goals of policymaking in this area is to protect investors without hindering innovation.", "document_type": "crs"}
{"report": "Many U.S. officials and Members of Congress consider Poland to be a key ally of the United States and one of most pro-U.S. countries in Europe. According to the U.S. State Department, areas of close bilateral cooperation with Poland include \"NATO capabilities, counterterrorism, nonproliferation, missile defense, human rights, economic growth and innovation, energy security, and regional cooperation in Central and Eastern Europe.\" The Congressional Caucus on Poland is a bipartisan group of Members of Congress who seek to maintain and strengthen the U.S.-Poland relationship and engage in issues of mutual interest to both countries. Of the Central European and Baltic countries that have joined the North Atlantic Treaty Organization (NATO) and the European Union (EU), Poland is by far the most populous, has the largest economy, and is the most significant military actor. In 1999, with strong backing from the United States, Poland was among the first group of post-communist countries to join NATO. In 2004, again with strong support from the United States, it was among a group of eight post-communist countries to join the EU. Many analysts assert that Poland, more than many other European countries, continues to look to the United States for foreign policy leadership. Recently, developments related to Russia's resurgence and the attendant implications for U.S. policy and NATO are likely to have continuing relevance for Congress. A variety of factors make Poland a central interlocutor and partner for the United States in examining and responding to these challenges. Since Poland's 2015 parliamentary election, some Members of Congress also have expressed concerns about trends in the country's governance, discussed below. The government of Poland is led by Prime Minister Mateusz Morawiecki of the conservative-nationalist Law and Justice party (PiS). Law and Justice won the October 2015 parliamentary election with 37.6% of the vote, giving the party 235 of the 460 seats in the Sejm (lower house of parliament). This was the first time since the end of communist rule in 1989 that a single party secured an absolute majority in parliament. Law and Justice had spent the previous eight years in opposition after leading the government from 2005 to 2007. The center-right Civic Platform (PO) party, which led the government of Poland from 2007 to 2015, came in second place in the 2015 election with 24.1% of the vote, dropping from 207 to 138 seats in the Sejm . The next parliamentary election is due to take place in October or November 2019. Poland's president is Andrzej Duda, who was the Law and Justice-backed candidate in the May 2015 presidential election. Law and Justice gained momentum five months prior to the parliamentary election with Duda's unexpected victory over the Civic Platform-supported incumbent. The president, who serves a five-year term, is Poland's head of state and resigns party membership upon election. The president exercises functions including making formal appointments, overseeing the country's executive authority, influencing legislation, representing the state in international affairs, and acting as commander-in-chief of the armed forces. JarosÅaw KaczyÅski is head of Law and Justice and a member of the Sejm . Despite his holding no formal post in the government, many observers assert that KaczyÅski remains the most powerful politician in Poland who, as party chairman, exerts considerable influence behind the scenes. JarosÅaw KaczyÅski co-founded Law and Justice with his twin brother Lech in 2001. Lech KaczyÅski was the president of Poland from 2005 to 2010, when he died in an airplane crash in Russia that also killed 95 other people, including many high-ranking Polish officials. A number of factors contributed to the 2015 election outcome. Law and Justice tapped into public unease over surging non-European migration to Europe by criticizing Civic Platform's willingness to accept migrants under an EU relocation plan. Law and Justice also appeared to gain support by advocating increased public spending for social support programs benefitting families with children, lower-income citizens, and the elderly. During the campaign, the party argued that the benefits of Poland's economic development had fallen unevenly across society and failed to reach many ordinary citizens. At the same time, observers believe there was a sense of voter fatigue toward Civic Platform and, relatedly, public discontent with the country's political establishment. Civic Platform was damaged by a scandal in which secretly recorded conversations led to the resignation of several government officials in 2015. A changeover in leadership with the 2014 appointment of then-Prime Minister Donald Tusk, who co-founded Civic Platform, as President of the European Council in Brussels was also a factor in the party's decline. More broadly, the 2015 election and its aftermath appeared to confirm the observation that Polish politics have become characterized by an entrenched social divide between national-oriented social conservatives, represented by Law and Justice, and Western-oriented liberals, represented by Civic Platform. Since taking office, the Law and Justice-led government has implemented numerous reforms that have proved contentious and raised tensions with the EU as well as domestic opponents; these reforms also have elicited some concern from the United States. Many members of Law and Justice maintain that Poland's post-communist development has been based in part on flawed institutions and values, and Law and Justice leaders interpreted the 2015 election results as a mandate to enact substantial reforms to the country's political system and public institutions. Some argue, therefore, that the party seeks to reduce the influence on national institutions of so-called liberal and secular \"European\" values and to recast those institutions in ways that promote what the party and its supporters view as traditional national-patriotic values, including close ties with the Catholic Church. Law and Justice also fiercely condemns the communist era and those associated with it, and the party holds a nationalist-oriented worldview that includes enduring suspicion toward Russia and unresolved tensions with Germany. The results of regional elections in October 2018 and European Parliament (EP) elections in May 2019 indicate that support for the Law and Justice party has held relatively steady since Poland's 2015 election. In the 2018 regional elections, Law and Justice won 34% of the vote and the most seats in 9 out of the country's 16 regional assemblies (with an absolute majority in 6). Previously, Law and Justice controlled one regional government. Law and Justice did well among more rural and less affluent voters, while a coalition of opposition parties including Civic Platform did well among more liberal and urban voters. Law and Justice won 4 out of 107 municipal elections. The opposition won mayoral races in Poland's largest cities, including Warsaw, KrakÃ³w, WrocÅaw, and GdaÅsk. In the May 2019 EP elections, Law and Justice came in first place, winning 27 seats with approximately 45% of the Polish vote. A coalition of opposition parties including Civic Platform won 22 seats with approximately 38% of the vote. Despite numerous public protests over the past three years against the government's reforms, critics observe that opposition parties including Civic Platform have struggled to offer an effective alternate message. Support for Law and Justice, meanwhile, appears to have been mostly unaffected by controversy over its domestic reforms or by a series of corruption scandals reported in late 2018 and early 2019. Given its close association with the Catholic Church, the party came under pressure prior to the EP election with the release of a documentary film about the sexual abuse of children by Polish priests and subsequent efforts to cover up those crimes. After the film was released, the government adopted increased prison sentences for those convicted of sexual abuse of a child. The most prominent and controversial set of reforms undertaken by the Law and Justice-led government concerns the judicial system. Critics charge that several moves enacted since late 2015 subvert institutional checks and balances, undermine judicial independence and the rule of law, and place the country's courts under political control. The reforms have significantly increased executive and parliamentary powers to select and remove judges, decisions that previously were determined internally by professional bodies within Poland's judiciary. Law and Justice leaders, who blamed the courts for blocking many of the party's legislative priorities when it previously led the government (2005-2007), maintain that the judicial system needed extensive reform because it was slow and inefficient, judges were not properly re-vetted after the transition from communism to democracy, and procedures for selecting new judges lacked fairness and accountability. Beyond the judicial system, a law adopted in 2016 granted the government the power to hire and fire management of public broadcasting stations, a function previously performed by an independent media supervisory committee. The government maintained that the move was needed to correct political bias and restore balance in the public media. Critics argue that it compromises the independence of state media and relegates it to publicizing the government's official narrative. The government also has cut public funding to some civil society organizations, particularly those supporting migrants and refugees. Critics charged that this move was intended to stifle opponents of government policies. In 2018, Poland adopted reforms to the country's electoral system. The government asserted that these changes, expected to take effect after the 2019 parliamentary elections, would increase fairness and transparency. Opponents argued that they would politicize the administration of elections and were intended to advantage Law and Justice. The reforms replace seven of the nine members (currently all judges) of the National Electoral Commission (responsible for conducting and overseeing all elections in Poland) with new members chosen by the Sejm according to party proportion. The reforms also call for the National Electoral Commission to appoint new local election commissioners, who are no longer required to be independent of political parties. Overall, domestic political opponents and outside observers have expressed concern that the actions taken by the government amount to a rollback of Poland's democracy and a program to construct an \"illiberal\" state. Law and Justice leaders and supporters dispute this portrayal, alleging that their political opponents have crafted this narrative in an attempt to undo the results of the 2015 election and block the government's ability to implement its agenda. In 2016, the European Commission (the EU's executive institution) launched an inquiry into the effects of the judicial and public media reforms on the rule of law in Poland. The EU subsequently set a series of deadlines for Poland to respond to recommended amendments that would address EU concerns about the ability of the executive and legislature to interfere with the independence of the judiciary. In 2016 and 2017, the Polish government consistently rejected the EU's recommended measures, objecting that the EU was interfering with the country's sovereignty and did not fully understand the Polish legal system. In December 2017, the European Commission recommended the EU move toward imposing an \"Article 7\" sanction, under which Poland's voting rights in the Council of the EU could be suspended. The measure is unlikely to be enacted, however; Hungary, which has similar Article 7 issues with the EU, has said it would veto the imposition of such a sanction against Poland, which requires unanimity in the Council. The EU also has been developing plans to link the amount of regional funding allocated to Poland (and other countries, such as Hungary) to judicial independence and rule-of-law standards in the next EU budget framework. Poland is the largest beneficiary of funding from the EU budget. In the EU's 2014-2020 budget framework, â¬106 billion (approximately $120 billion) was allocated to Poland, with the majority of EU support funding regional and municipal infrastructure development. In October 2018, the Polish government complied with a ruling by the European Court of Justice (ECJ) ordering the suspension of a law that allowed the president to decide whether to retire Supreme Court judges over the age of 65. (The law affected 28 of 72 judges sitting on the appellate panels of the country's Supreme Court at the time it came into effect in July 2018.) The episode marked the first time Law and Justice backtracked on any major element of its controversial reform program. In April 2019, the European Commission launched a new complaint alleging that Poland's process for disciplinary proceedings against judges, enacted in 2017, infringes on EU requirements for judicial independence from political control. Migration policy has been another source of tension between Poland and the EU. Poland has been a leading opponent of EU policies attempting to relocate migrants and refugees throughout the member states. In 2015, the Civic Platform-led government voted to approve a mandatory EU relocation plan, agreeing to take in approximately 4,600 migrants from outside the EU. The agreement became a significant campaign issue in Poland's 2015 election, with debates about the migration crisis highlighting divisions in Polish society and politics. Law and Justice strongly criticized approval of the plan, and after the terrorist attacks in Paris in November 2015, the incoming Law and Justice-led government indicated that respecting the EU plan was not politically possible. Poland subsequently joined Hungary and the Czech Republic in defying the EU by refusing to the implement the plan, arguing that it infringed on their national sovereignty and that immigration policy was not a competence of the EU. In December 2017, the European Commission referred the three countries to the ECJ over their failure to implement the relocation plan. Despite these tensions, JarosÅaw KaczyÅski has stated that Law and Justice does not intend to take Poland out of the EU. Surveys show that a large majority of the Polish public views EU membership as beneficial. Poland's economy is among the most successful in Central Europe. Starting with post-communist reform programs in the 1990s and continuing beyond Poland's accession to the EU in 2004, pro-market policies and stable institutions have underpinned strong economic growth, an expanding private sector, and a steady increase in per capita gross domestic product (GDP). Poland's economy was hurt by the 2008 global financial crisis and the ensuing Eurozone crisis but was less affected than most other EU members. The Polish economy was the only European economy to sustain growth in 2008-2009, and Poland avoided a domestic banking crisis. Although Poland joined the EU in 2004, it is not a member of the Eurozone. Poland continues to use the zÅoty (PLN) as its national currency, and the Eurozone debt crisis that began in Greece in 2009 dampened Polish enthusiasm for adopting the euro. Under the terms of its EU accession treaty, Poland is bound to adopt the euro as its currency eventually, but there is no fixed target date for doing so. Economic growth in Poland remains high compared to most other EU members. According to the International Monetary Fund (IMF), growth averaged 3.75% per year over the period 2014-2017 and reached 5.1% in 2018. Unemployment is low, decreasing from 10.3% in 2013 to an expected 3.6% in 2019. Forecasts project growth of 3.8% in 2019 and an average of 2.9% annually over the period 2020-2023. The main drivers of the Polish economy recently have consisted of strong private consumption, investment derived from EU funding, and increased demand for exports. (Nearly 80% of Poland's exports are to other EU countries, with more than a quarter to Germany. ) Near-term risks to growth include a potential reduction in EU funding in the next EU budget framework (2021-2027) and a broader economic slowdown in the EU that could decrease demand for Polish exports. After the Civic Platform-led government of 2011-2015 sought to consolidate public finances through tax increases and entitlement cuts, the Law and Justice-led government has taken steps to loosen fiscal policy in order to benefit lower-income households and families, encourage higher birth rates, and appeal to older voters. Under the \"Family 500+\" program, families are eligible to receive a tax-free monthly subsidy of PLN 500 (approximately $132) per month for their second child and every subsequent child, with lower-income families eligible starting with their first child. Additionally, the government reversed its predecessor's reform raising the retirement age to 67, returning it to 65 for men and 60 for women. Similar to EU-wide averages, the median age in Poland was approximately 38 years old in 2012 and is expected to be 51 years old in 2050. Declining birth rates and net emigration have been the main factors in demographic change in Poland. The aging of the country's population is expected to have challenging implications for Poland's health care and retirement systems. Concerns that increased government spending on child support and pensions (as well as on planned increases to defense spending) could negatively affect Poland's public finances have largely been balanced by the country's strong economic growth. The budget deficit was 0.6% of GDP in 2018 and is expected to be 2.2% of GDP in 2019. Public debt was approximately 43.6% of GDP in 2018, according to the IMF. (EU rules stipulate that deficits remain below 3% of GDP and that debt remain below 60% of GDP). Poland has repeatedly been invaded by external powers throughout its history. These experiences continue to shape Poland's security perceptions. Territorial defense is the core mission of the Polish military, and Poland's current security strategy is focused primarily on deterring potential Russian aggression. Armed forces modernization, NATO membership, and close ties with the United States are the main components of this strategy. Poland has sought to build a multilayered security policy around this foundation, with participation in EU defense initiatives and cooperation with regional partners such as the Nordic and Baltic countries, the VisegrÃ¡d Group, and the Bucharest Nine. Poland has the ninth-largest army in NATO, with 61,200 active personnel. In all, Poland has 117,800 total active military personnel across all branches of the armed forces. Poland ended military conscription in 2009. Poland is one of seven NATO countries meeting the alliance's recommendation of allocating 2% of GDP for defense spending. According to NATO, Polish defense expenditures were 2.05% of GDP ($12.156 billion) in 2018. The Polish government plans to raise defense spending to 2.1% of GDP in 2020 and to gradually increase defense spending to 2.5% of GDP by 2030. In 2016, the Polish Defense Ministry announced a revised \"Technical Modernization Plan\" prioritizing air defense, navy, cybersecurity, tanks and armored vehicles, and territorial defense capabilities. From 2017 to 2022, the plan called for approximately $14.5 billion in spending on weapons and equipment acquisition, including new air defense systems, helicopters, UAVs, coastal defense vessels, minesweeper ships, and submarines. In February 2019, the defense ministry announced that it had revised and expanded the plan to include approximately $49 billion in spending on armed forces modernization over the period of 2017-2026. Priorities in the revised plan include short-range anti-aircraft missiles, attack helicopters, submarines, cybersecurity, and the acquisition of fifth-generation combat aircraft. While foreign purchases continue to play a large role, the Polish government has linked the defense modernization program with efforts to develop Poland's defense-industrial base, seeking contracts and partnerships that include local manufacturing and technology transfers. Another initiative of the Law and Justice-led government has been the establishment of a new territorial defense force, intended to eventually consist of 53,000 volunteers trained and equipped for tasks such as critical infrastructure protection and unconventional warfare. Since the end of the Cold War, Poland and the United States have had close relations. The United States strongly supported Poland's accession to NATO in 1999. Warsaw has been an ally in global counterterrorism efforts and contributed large deployments of troops to both the U.S.-led coalition in Iraq and the NATO-led mission in Afghanistan. Links between the United States and Poland are further anchored by extensive cultural ties; approximately 9.6 million Americans are of Polish heritage. The Law and Justice-led government has sought to cultivate ties with the Trump Administration. In a visit to the United States in September 2018, Polish President Duda suggested that a permanent U.S. military base in Poland might be named \"Fort Trump.\" On February 13-14, 2019, Poland and the United States co-hosted the \"Ministerial to Promote a Future of Peace and Security in the Middle East,\" a conference attended by Vice President Mike Pence and Secretary of State Michael Pompeo. President Trump earlier delivered a speech in Warsaw on July 6, 2017. The president's remarks on NATO, Russia, U.S.-Polish ties, and Poland's resilience throughout history were well received by many Polish observers, and especially by the Polish government and its supporters. At the same time, critics asserted that the tone of the President's visit, during which he apparently did not raise concerns about Poland's domestic policies, emboldened the government to move ahead with controversial new judicial bills shortly afterward. While relations between Poland and the United States remain largely positive, there have been points of tension over the past several years. Following President Trump's Warsaw speech, the U.S. State Department released a statement expressing concern about judicial independence and the rule of law in Poland. Some Members of Congress also have expressed concerns about the Polish government's judicial and media reforms. In February 2016, for example, Senators McCain, Durbin, and Cardin co-authored a letter urging Poland to \"recommit to the core principles of the [Organization for Security and Cooperation in Europe] and the EU, including the respect for democracy, human rights, and rule of law.\" U.S. officials (along with many of their European and Israeli counterparts) objected to controversial Holocaust-related legislation (amendment to the Act on the Institute of National Remembrance) passed by Poland's parliament and signed by President Duda in early 2018. The legislation initially criminalized attributing responsibility for Nazi crimes to the Polish state or nation, potentially punishable by a prison sentence of up to three years, with exemptions for art and academic research. Under continued international pressure, the Polish government amended the law in June 2018, making violations a civil (rather than criminal) offense. In recent years, Polish officials have objected to instances in which commentators and press articles have referred to Auschwitz and other Nazi concentration camps on Polish soil as \"Polish death camps,\" preferring such phrasing as \"Nazi concentration camp in German-occupied Poland\" (President Obama apologized after using the term \"Polish death camp\" in 2012). Scholars agree that the term \"Polish death camp\" is inaccurate and misleading and that the Polish state did not collaborate in the Nazi genocide against Jews. At the same time, historical research has documented instances in which some Poles committed atrocities against Jews during and after World War II. Critics fear the 2018 legislation may serve to stifle debate about such issues and whitewash the culpability of individual Poles in such cases. In November 2018, a leaked letter from U.S. Ambassador Georgette Mosbacher to Prime Minister Morawiecki reportedly angered some Polish officials by raising concerns about media freedom. The Polish government reportedly had contemplated prosecuting the Polish television station TVN, which is owned by U.S. company Discovery Communications, after it aired footage alleging to show a Polish neo-Nazi group celebrating Adolf Hitler's birthday. Following the murder of GdaÅsk Mayor PaweÅ Adamowicz in January 2019 by a mentally ill assailant, Representative Marcy Kaptur, a co-chair of the Congressional Caucus on Poland, expressed concern about whether Poland's divided political environment could have played a role in motivating the perpetrator. Adamowicz was a well-known liberal critic of the Law and Justice-led government. In February 2019, Representative Kaptur introduced the PaweÅ Adamowicz Democratic Leadership Exchange Act of 2019 ( H.R. 1270 ), a bill that would reauthorize the United States-Poland Parliamentary Exchange Program. Defense cooperation between Poland and the United States is especially close and extensive. Poland has been a focus of U.S. and NATO efforts to deter potential Russian aggression in the region. In the wake of Russia's aggression against Ukraine starting in 2014, Polish officials reemphasized their wish to permanently base U.S. forces on their territory, despite concerns by some U.S. and European officials that doing so could violate the 1997 NATO-Russia Founding Act. In May 2018, the Polish government released a proposal under which it would contribute $2 billion toward establishing such a base. In a House Armed Services Committee hearing on March 13, 2019, acting Assistant Secretary of Defense for International Security Affairs Kathryn Wheelbarger stated that the related negotiations with Poland were under way. Section 1280 of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 ( P.L. 115-232 ) required the Secretary of Defense to report to the congressional defense committees on the \"feasibility and advisability\" of permanently stationing U.S. forces in Poland by March 2019. (With discussions between Poland and the U.S. Administration still in progress, the report had not been received as of June 2019.) As part of the United States' missile defense for Europe, an \"Aegis-Ashore\" site with radar and 24 SM-3 missiles is to become operational in Poland in 2020. Russian officials have characterized the establishment of U.S. missile defense installations in Europe as a \"direct threat to global and regional security.\" Under the European Deterrence Initiative (EDI), launched in 2014 (originally called the European Reassurance Initiative), the United States has bolstered security in Central and Eastern Europe with an increased rotational military presence, additional exercises and training with allies and partners, improved infrastructure to allow greater responsiveness, enhanced prepositioning of U.S. equipment, and intensified efforts to build partner capacity for newer NATO members and other partners. Approximately 6,000 U.S. military personnel are involved in the associated Atlantic Resolve mission at any given time, with units typically operating in the region under a rotational nine-month deployment. The United States has not increased its permanent troop presence in Europe (currently about 67,000 troops, including two U.S. Army Brigade Combat Teams, or BCTs), but it has rotated additional forces into the region, including nine-month deployments of a third BCT based in the United States. The BCT is based largely in Poland, with units also conducting training and exercises in the Baltic states, Bulgaria, Hungary, and Romania. A combat aviation brigade supports the activities of the BCT. The 4 th Infantry Division Mission Command Element, based in PoznaÅ, Poland, acts as the headquarters overseeing rotational units. Following a meeting between President Trump and President Duda in Washington, DC, on June 12, 2019, President Trump announced that an additional 1,000 troops would be added to the rotational U.S. deployments in Poland. The additional troops are expected to come from units based in Germany. The two sides also announced plans for the U.S. military to expand its logistical, administrative, and training infrastructure in Poland, boost the presence of special operations forces, and establish a squadron of aerial reconnaissance drones. At the 2016 NATO Summit in Warsaw, the alliance agreed to deploy multinational battle groups (approximately 1,100 troops each) to Poland and the three Baltic countries. These \"enhanced forward presence\" units are intended to deter Russian aggression by acting as a \"tripwire\" that ensures a response from the entire alliance in the event of a Russian attack. The United States is leading the multinational battalion based in Orzysz, Poland. NATO continues to resist calls to deploy troops permanently in countries that joined after the collapse of the Soviet Union. Accordingly, the enhanced NATO presence has been referred to as \"continuous\" but rotational. In recent years, Poland has made a number of significant defense purchases from the United States, and numerous elements of Poland's military equipment modernization plans are of interest and relevance to U.S. defense planners and the U.S defense industry: At a February 2019 press conference unveiling the updated Technical Modernization Plan for the Polish armed forces, Polish Defense Minister Mariusz BÅaszczak indicated that the procurement of fifth-generation fighter aircraft was a top priority. In May 2019, Poland send a formal letter of request to the United States for the purchase of 32 F-35 Joint Strike Fighters, made by Lockheed Martin. In February 2019, Poland announced plans to sign a $414 million contract for the purchase of 20 High Mobility Artillery Rocket System (HIMARS) launchers, produced by Lockheed Martin. Delivery is expected by 2023. In March 2018, Poland signed a $4.75 billion deal for the purchase of two batteries (four total fire units) of the Patriot integrated air and missile defense system, made by Raytheon. Delivery is expected in 2022. In December 2017, the U.S. State Department approved the sale to Poland of F-16 support and sustainment services worth up to $200 million, potentially supplied by a number of U.S. contractors. In November 2017, the U.S. State Department approved the sale to Poland of up to 150 AIM-120C-7 Advanced Medium Range Air-to-Air Missiles (AMRAAM), made by Raytheon, for an estimated cost of $250 million. In November 2016, the U.S. State Department approved the sale to Poland of 70 AGM-158B extended range Joint Air-to Surface Standoff Missiles (JASSM-ER), an air-launched cruise made by Lockheed Martin with a range of approximately 900 kilometers. The deal was worth up to $200 million. In 2014, Poland purchased 40 AGM-158A JASSMs (also made by Lockheed Martin) and associated Mid-Life Update (MLU) packages for its F-16C/Ds, reportedly worth about $250 million in total. The A-variant JASSMs have a range of approximately 370 kilometers. Trade between the United States and Poland has increased significantly over the past 15 years. In 2004, for example, U.S. goods exports to Poland were valued at approximately $929 million and imports from Poland were about $1.8 billion. In 2018, U.S. goods exports to Poland were more than $5.4 billion and imports from Poland were more than $8 billion. Leading categories of U.S. exports to Poland include aircraft, machinery, electrical and medical equipment, and vehicles. U.S. imports from Poland represent a wide range of items, including heavy machinery, chemicals, and agricultural products. In 2017, U.S. services exports to Poland were valued at approximately $3.1 billion and services imports from Poland were approximately $2.25 billion. In 2017, U.S. foreign direct investment in Poland was approximately $12.6 billion. U.S. affiliates employ nearly 200,000 people in Poland. U.S. companies with significant investment in Poland include JP Morgan Chase, Citigroup, Hewlett Packard, UPS, 3M, IBM, United Technologies, General Electric, and Discovery Communications. Many Polish officials and citizens continue to express disappointment that the United States has not made Poland a Visa Waiver Program (VWP) country. Current U.S. visa policy requires Poles who wish to travel to the United States to apply for a visa by filling out an application, paying a $160 nonrefundable fee, and completing an interview at a U.S. embassy or consulate. These requirements are waived for citizens of most EU countries, since most of the countries qualify to be included in the VWP. The VWP allows for visa-free travel to the United States for up to 90 days. Under U.S. policy, Poland does not meet the VWP's qualifying criteria because its visitor visa refusal rate (the percentage of applications rejected by U.S. consular officers who cannot overcome the refusal) remains above the 3% limit. The refusal rate for Poland was 3.99% in FY2018 and 5.92% in FY2017. Nonimmigrant visas issued to Polish nationals increased nearly 60% from 2009 to 2018. Citing Poland's status as a close U.S. ally, some Members of Congress have attempted to change the law governing the VWP to allow Poland to qualify. In the 115 th Congress, Representative Mike Quigley introduced a bill ( H.R. 2388 , Poland Visa Waiver Act of 2017) that would have authorized the Secretary of Homeland Security to designate Poland a VWP country. Some opponents of extending the VWP to include Poland argue that such a step could allow a significant increase in the number of Poles who overstay their visas and remain illegally in the United States (i.e., become unauthorized aliens). Proponents of including Poland argue that such a move would increase U.S. tourism revenue, boost public diplomacy, and strengthen national security by extending the information-sharing elements of the VWP to Poland. Historically, Poland has had a difficult relationship with Russia. Poland's view of Russia remains affected by the experience of Soviet invasion during World War II and Soviet domination during the communist era. In more recent years, Polish leaders have consistently expressed warnings about the nature of Vladimir Putin's government in Russia, tending to view Russia as a potential threat to Poland and its neighbors. This perception predates Russia's invasion of Georgia in 2008, but events in Ukraine since 2014 have sharpened Polish concerns about Russia's intentions and have put security at the top of Poland's national agenda. The Law and Justice-led government has maintained a hard line in its approach to Russia and entrenched Poland's position as one of the EU's most hawkish countries on Russia policy. Poland has been one of the leading advocates for adopting and maintaining robust EU sanctions against Russia in response to its actions in Ukraine, although it has been one of the countries most affected by Russian retaliatory sanctions. One area of particular relevance to Poland's security is Kaliningrad, a 5,800-square-mile Russian exclave wedged between Poland and Lithuania (see Figure 1 ). Ceded to Russia by Germany following World War II, Kaliningrad is a key strategic territory for Russia, allowing it to project military power into NATO's northern flank. The territory has a heavy Russian military presence, including the Baltic Fleet and two airbases. Russia has repeatedly deployed Iskander short-range nuclear-capable missiles in Kaliningrad, and reports indicated that a 2018 deployment could be permanent. According to NATO officials, Russia is using Kaliningrad to pursue an anti-access/area denial (A2/AD) strategy that involves layering surface-to-air missiles to potentially block off access to the Baltic states and much of Poland. Kaliningrad's geographic isolation also allows for a scenario in which Russia tries to seize the SuwaÅki Gap, the 100-kilometer border between Poland and Lithuania that separates Kaliningrad from Russia's ally Belarus. Poland has been a leading opponent and critic of the Nord Stream 2 pipeline that would allow Germany to increase the amount of natural gas it imports directly from Russia via the Baltic Sea. Poland argues that the completion of Nord Stream 2 would allow Gazprom, Russia's state-owned gas company, to further consolidate its monopoly over the Central European gas market, as Gazprom would have full control of all gas transmission routes and Russian gas would dominate the European network hubs in Germany and Austria. Poland maintains that Russia would further gain geopolitical leverage because it could arbitrarily shift supply corridors in Europe, giving it the ability to continue supplying European markets through Germany while restricting or completely halting gas transit through Poland and/or Ukraine. Polish officials have expressed the view that U.S. involvement, including the adoption of sanctions, is crucial for efforts to oppose construction of the pipeline. While approximately two-thirds of the natural gas and most of the oil consumed in Poland comes from Russia, Poland continues to rely on domestically produced coal for much of its electricity generation. Russian gas accounts for less than 10% of Poland's primary energy supply. Successive Polish governments have prioritized efforts to diversify the country's energy sources. Poland has been taking steps to expand pipeline interconnectivity with its neighbors, including plans to develop the Baltic Pipe project, expected to be operational in 2022, which would connect Poland's gas infrastructure via Denmark to Norwegian supplies. Poland's supply contract with Gazprom expires in 2022, and Poland is unlikely to seek its renewal. Poland also has developed the ability to reverse the flow of gas in the Polish section of the Yamal pipeline, which runs from Russia to Germany via Belarus and Poland, in order to import natural gas from the west in the case of a crisis involving a cut-off of Russian gas from the east. A liquefied natural gas (LNG) terminal on the Baltic Sea coast near the German border (ÅwinoujÅcie) became operational in 2015, and in October 2018 the Polish state energy company signed a 20-year contract to purchase LNG from a U.S. supplier. The Polish government also has been a leading advocate for a stronger EU energy policy that reduces collective dependence on Russia. Poland has been active in projects that enhance regional energy security by interconnecting national gas networks through the construction of new pipelines. The construction of new connectors with Slovakia and the Czech Republic is underway, and the planned Gas Interconnection Poland-Lithuania (GIPL), expected to become operational by 2022, would link the natural gas grid of the Baltic countries to the rest of the EU. Many U.S. officials and Members of Congress have regarded European energy security as a U.S. interest. In particular, there has been concern in the United States over the influence that Russian energy dominance could have on the ability to present a united transatlantic position when it comes to other issues related to Russia. Successive U.S. administrations have encouraged EU member states to reduce energy dependence on Russia through diversification of supply and supported European steps to develop alternative sources and increase energy efficiency. In the 116 th Congress, related bills include the European Energy Security and Diversification Act 2019 (House-passed H.R. 1616 and S. 704 ) and the Protect European Energy Security Act ( H.R. 1081 ). Introduced by Representative Adam Kinzinger and Senator Christopher Murphy, the European Energy Security and Diversification Act 2019 aims to prioritize and enhance U.S. efforts to encourage European countries to diversify energy sources and supply routes and increase regional energy security. Introduced by Representative Denny Heck, the Protect European Energy Security Act would require reports to Congress by the Secretary of State, Secretary of the Treasury, and the Director of National Intelligence detailing U.S. diplomatic efforts to oppose the construction of Nord Stream 2 and to promote European energy security and decrease European dependence on Russian energy. Poland appears likely to remain a strong U.S. ally and an increasingly important U.S. security partner in Europe. Many analysts believe that close cooperation between the United States and Poland will continue for the foreseeable future in areas such as efforts to deter potential Russian aggression, the future of NATO, energy security, and economic issues. Statements by Polish leaders suggest that Poland is likely to continue looking to the United States for leadership on foreign policy and security issues. During the 116 th Congress, the issue of establishing a permanent U.S. military base in Poland or increasing the size of the U.S. military presence in Poland may remain of interest to Members of Congress. Contracted and prospective U.S. arms sales to Poland, including major items such as the F-35 and Patriot missile systems, also may be of congressional interest. Some Members may wish to consider Poland's status with regard to the U.S. Visa Waiver Program. Poland is likely to be of continuing importance in the area of European energy security. Members of Congress also may wish to remain informed about legislative, governance, and rule-of-law issues in Poland, including with regard to the numerous controversial domestic reforms enacted over the past several years. Members of Congress may have an interest in monitoring political developments in relation to the Polish parliamentary election due to occur in October or November 2019.", "summary": "Over the past 30 years, the relationship between the United States and Poland has been close and cooperative. The United States strongly supported Poland's accession to the North Atlantic Treaty Organization (NATO) in 1999 and backed its entry into the European Union (EU) in 2004. Poland has made significant contributions to U.S.- and NATO-led military operations in Iraq and Afghanistan, and Poland and the United States continue to work together closely on a range of foreign policy and international security issues. Domestic Political and Economic Issues The 2015 Polish parliamentary election resulted in a victory for the conservative-nationalist Law and Justice party (PiS), which won an absolute majority of seats in the lower house of parliament ( Sejm ). Mateusz Morawiecki (PiS) is Poland's prime minister and head of government. The center-right Civic Platform (PO) party led the government of Poland from 2007 to 2015. Since winning the election, Law and Justice has made changes to the country's judicial system and enacted other reforms that have generated concerns about backsliding on democracy and triggered an EU rule-of-law investigation. Poland's next parliamentary election is due to occur in October or November 2019. European Parliament and regional election results indicate that support for Law and Justice remains strong, and the party is favored to win the 2019 election. Law and Justice candidate Andrzej Duda won Poland's 2015 presidential election. The president is Poland's head of state and exercises a number of limited but important functions. The next presidential election is due to occur in May 2020. Poland was one of the few EU economies to come through the 2008-2009 global economic crisis without major damage. As an EU member Poland is obligated to adopt the euro as its currency, but it has not set a target date for adoption and continues to use the zÅoty as its national currency. Defense Modernization Poland has been implementing an armed forces modernization plan since 2013, and it intends to spend approximately $49Â billion on military equipment acquisitions and upgrades over the period 2017-2026. Completed and prospective purchases from U.S. suppliers, including advanced Patriot missiles and F-35 Joint Strike Fighters, have a large role in this initiative. Poland is one of seven NATO members to meet the alliance's benchmark of spending at least 2% of gross domestic product (GDP) on defense, and it plans to reach 2.5% of GDP by 2030. Defense Cooperation Under the United States' European Deterrence Initiative (EDI) and the U.S. military's Operation Atlantic Resolve, as well as NATO's Enhanced Forward Presence mission, U.S. forces have expanded their presence in Poland since 2014 and increased joint training and exercises with their Polish counterparts. While U.S. forces participate in these missions on a rotational basis, the Polish government has proposed the establishment of a permanent U.S. base on Polish territory. Visa Waiver Program Although relations between Poland and the United States are largely positive, Poland's exclusion from the U.S. Visa Waiver Program (VWP) has been a point of contention for many years. Some Members of Congress have advocated extending the VWP to include Poland. Relations with Russia Relations between Poland and Russia have long been tense, and Polish leaders have tended to view Russian intentions with wariness and suspicion. Poland remains a leading advocate for forceful EU sanctions against Russia over its 2014 annexation of Ukraine's Crimea region and fostering of separatist conflict in eastern Ukraine. Energy Security Poland has promoted European energy integration, including projects to expand pipeline and electric grid interconnectivity in order to decrease reliance on Russia. Poland is a leading critic of Nord Stream 2, a Russian-owned pipeline project that would allow Germany to increase the amount of natural gas it imports directly from Russia via the Baltic Sea. Outlook and Issues for Congress Given its role as a close U.S. ally and partner, Poland and its relations with the United States are of continuing congressional interest. The main areas of interest include defense cooperation, energy security, and concerns about rule-of-law and governance issues.", "document_type": "crs"}
{"report": "Between 1969 and 1999, almost 3,500 people died as a result of political violence in Northern Ireland, which is a part of the United Kingdom (UK). The conflict, often referred to as \"the Troubles,\" has its origins in the 1921 division of Ireland (see map in Figure 1 ). At its core, the conflict reflects a struggle between different national, cultural, and religious identities. Protestants in Northern Ireland (48% of the population) largely define themselves as British and support Northern Ireland's continued incorporation in the UK ( unionists ). Catholics in Northern Ireland (45% of the population) consider themselves Irish, and many Catholics desire a united Ireland ( nationalists ). In the past, more militant unionists ( loyalists ) and more militant nationalists ( republicans ) were willing to use force and resort to violence to achieve their goals. The Troubles were sparked in late 1968, when a civil rights movement was launched in Northern Ireland mostly by Catholics, who had long faced discrimination in areas such as electoral rights, housing, and employment. This civil rights movement was met with violence by some unionists, loyalists, and the police, which in turn prompted armed action by nationalists and republicans. Increasing chaos and escalating violence led the UK government to deploy the British Army on the streets of Northern Ireland in 1969 and to impose direct rule from London in 1972 (between 1920 and 1972, Northern Ireland had its own regional government at Stormont, outside Belfast). For years, the UK and Irish governments sought to facilitate a negotiated political settlement to the conflict in Northern Ireland. Multiparty talks began in June 1996, led by former Senate Majority Leader George Mitchell, who was serving as U.S. President Bill Clinton's special adviser on Ireland. After many ups and downs, the UK and Irish governments and the Northern Ireland political parties participating in the peace talks announced an agreement on April 10, 1998. This accord became known as the Good Friday Agreement (for the day on which it was concluded); it is also known as the Belfast Agreement. Despite the significant decrease in the levels of violence since the Good Friday Agreement, implementation of the peace accord has been challenging. Tensions persist among Northern Ireland's political parties and between the unionist and nationalist communities more broadly. Northern Ireland remains a largely divided society and continues to grapple with a number of issues in its search for peace and reconciliation. Sectarian differences flare periodically, and addressing Northern Ireland's legacy of violence (often termed dealing with the past ) is particularly controversial. Many analysts assess that peace and security in Northern Ireland is fragile. The UK's withdrawal from the European Union (EU) in January 2020âor Brexit âhas added to divisions within Northern Ireland. Brexit poses new challenges for Northern Ireland's peace process and economy and has renewed questions about Northern Ireland's constitutional status as part of the UK. Successive U.S. Administrations and many Members of Congress have actively supported the Northern Ireland peace process and encouraged the full implementation of the Good Friday Agreement, as well as subsequent accords and initiatives to further the peace process and promote long-term reconciliation. Some Members have been particularly interested in police reforms and human rights in Northern Ireland. Since 1986, the United States has provided development aid through the International Fund for Ireland (IFI) as a means to encourage economic development and foster reconciliation. Some Members of Congress also have demonstrated an interest in how Brexit might affect Northern Ireland in the years ahead. The Good Friday Agreement is a multilayered and interlocking document, consisting of a political settlement reached by Northern Ireland's political parties and an international treaty between the UK and Irish governments. At the core of the Good Friday Agreement is the consent principle âthat is, a change in Northern Ireland's status can come about only with the consent of the majority of Northern Ireland's people, as well as with the consent of a majority in Ireland. Although the agreement acknowledged that a substantial section of Northern Ireland's population and a majority on the island desired a united Ireland, it recognized that the majority of people in Northern Ireland wished to remain part of the UK. If the preference of this majority were to change, the agreement asserted that the UK and Irish governments would have a binding obligation to bring about the wish of the people; thus, the agreement included provisions for future polls to be held in Northern Ireland on its constitutional status, should events warrant. The Good Friday Agreement set out a framework for devolved governmentâthe transfer of specified powers over local governance from London to Belfastâand called for establishing a Northern Ireland Assembly and Executive in which unionist and nationalist parties would share power (known as Strand One ). The Good Friday Agreement also contained provisions on several issues viewed as central to the peace process: decommissioning (disarmament) of paramilitary weapons, policing, human rights, UK security normalization (demilitarization), and the status of prisoners. Negotiations on many of these areas had been extremely contentious. Experts assert that the final agreed text thus reflected some degree of \"constructive ambiguity\" on such issues. In addition, the Good Friday Agreement created new \"North-South\" and \"East-West\" institutions ( Strand Two and Strand Three , respectively). Among the key institutions called for in these two strands, a North-South Ministerial Council was established to allow leaders in the northern and southern parts of the island of Ireland to consult and cooperate on cross-border issues. A British-Irish Council also was formed to discuss matters of regional interest; the council comprises representatives of the two governments and the devolved administrations of Northern Ireland, Scotland, Wales, the Channel Islands, and the Isle of Man. Voters in Northern Ireland and the Republic of Ireland approved the Good Friday Agreement in separate referendums on May 22, 1998. Although considerable progress has been made in implementing the agreement, the process has been arduous. For years, decommissioning and police reforms were key sticking points that contributed to instability in Northern Ireland's devolved government. Sporadic violence from dissident republican and loyalist paramilitary groups that refused to accept the peace process and sectarian strife also helped to feed mistrust between the unionist and nationalist communities and their respective political parties. As noted above, the Good Friday Agreement called for establishing a new Northern Ireland Assembly and Executive. To ensure that neither unionists nor nationalists could dominate the Assembly, the agreement specified that \"key decisions\" must receive cross-community support. The Executive would be composed of a first minister, deputy first minister, and other ministers with departmental responsibilities (e.g., health, education, jobs); positions would be allocated to political parties according to party strength in the Assembly. The first elections to the new 108-member Northern Ireland Assembly took place on June 25, 1998. The devolution of power from London to Belfast, however, did not follow promptly because of unionist concerns about decommissioning, or the paramilitaries' surrender of their weapons. Following 18 months of further negotiations, authority over local affairs was transferred to the Northern Ireland Assembly and Executive in December 1999. Over the next few years, the issue of decommissioningâespecially by the Irish Republican Army (IRA)âcontributed to the suspension of the devolved government and the reinstatement of direct rule from London several times between 2000 and 2002. (See \" Decommissioning ,\" below.) In May 2007, after a nearly five-year suspension, Northern Ireland's devolved government was restored following a landmark deal between the Democratic Unionist Party (DUP)âwhich strongly supports Northern Ireland's continued integration as part of the UKâand Sinn Fein, the staunchly nationalist political party traditionally associated with the IRA. The DUP and Sinn Fein have been the largest unionist and nationalist parties, respectively, in Northern Ireland since 2003. The 2007 DUP-Sinn Fein deal paved the way for greater stability in Northern Ireland's devolved government over the next decade. Regularly scheduled Assembly elections in 2011 and 2016 produced successive power-sharing governments, also led by the DUP and Sinn Fein. At the same time, tensions persisted within the devolved government and between the unionist and nationalist communities. Various incidentsâincluding protests in 2012 and 2013 over the use of flags and emblems, a 2014 dispute over welfare reform, and the 2015 arrest of a Sinn Fein leader in connection with the murder of a former IRA memberâperiodically threatened the devolved government's stability. Following the collapse of the devolved government and snap Assembly elections in 2017, heightened tensions due to Brexit and other contentious issues largely stalled negotiations on forming a new devolved government for almost three years. This long impasse renewed concerns about political stability and highlighted divisions in Northern Ireland politics and society. (See \" 2017-2020 Crisis in the Devolved Government ,\" below.) For years, decommissioning of paramilitary weapons was a prominent challenge in the implementation of the Good Friday Agreement. The text of the agreement states, \"those who hold office should use only democratic, non-violent means, and those who do not should be excluded or removed from office.\" Unionists were adamant that the IRA must fully decommission its weapons. The IRA had been observing a cease-fire since 1997, but it viewed decommissioning as tantamount to surrender and had long resisted such calls. Progress toward full IRA decommissioning was slow and incremental. A key milestone came in July 2005, when the IRA declared an end to its armed campaign and instructed all members to pursue objectives through \"exclusively peaceful means.\" In September 2005, Northern Ireland's Independent International Commission on Decommissioning (IICD) announced that the IRA had put all of its arms \"beyond use,\" asserting that the IRA weaponry dismantled or made inoperable matched estimates provided by the security forces. The IICD also confirmed decommissioning by other republican groups and loyalist organizations. The IICD concluded its work in 2011. Although recognized as a central element in achieving a comprehensive peace in Northern Ireland, new policing structures and arrangements were a frequent point of contention between unionists and nationalists. In 2001, a new Police Service of Northern Ireland (PSNI) was established to replace the Royal Ulster Constabulary (RUC), Northern Ireland's former, 92% Protestant police force. Catholics viewed the RUC as an enforcer of Protestant domination, and human rights organizations accused the RUC of brutality and collusion with loyalist paramilitary groups. Defenders of the RUC pointed to its tradition of loyalty and discipline and its record in fighting terrorism. In accordance with policing recommendations made by an independent commission (known as the Patten Commission), increasing the proportion of Catholic officers (from 8% to 30% in 10 years) was a key goal for the new PSNI. To help fulfill this goal, the PSNI introduced a 50-50 Catholic/Protestant recruitment process. For several years, Sinn Fein refused to participate in the new Policing Board, a democratic oversight body. Many viewed Sinn Fein's stance as discouraging Catholics from joining the PSNI and preventing the nationalist community from fully accepting the new police force. In 2007, however, as part of the process to restore the devolved government, Sinn Fein members voted to support the police and join the Policing Board. Experts viewed Sinn Fein's decision as historic, given the IRA's traditional view of the police as a legitimate target. In 2010, the DUP and Sinn Fein reached an accord (the Hillsborough Agreement) to devolve policing and justice powers from London to Belfast (on which the parties had been unable to agree at the time of the Good Friday Agreement's signing). In 2011, the 50-50 recruitment process for Catholic and Protestant PSNI officers concluded. Officials asserted that the 50-50 process fulfilled the goals set out by the Patten Commission (including increasing the number of Catholic officers to 30%). In recent years, concerns resurfaced that not enough Catholics were seeking to join the PSNI; partly because of lingering suspicions about the police within the Catholic/nationalist community but also because of fears that Catholic police recruits were key targets of dissident republicans. In 2017, the PSNI introduced a number of procedural changes to help attract more Catholics (and more women). The Good Friday Agreement called for \"as early a return as possible to normal security arrangements in Northern Ireland,\" including the removal of security installations. In February 2007, the last of more than 100 armored watchtowers in Northern Ireland was dismantled. In July 2007, the British Army ended its 38-year-long military operation in Northern Ireland. Although a regular garrison of 5,000 British troops remains based in Northern Ireland, British forces no longer have a role in policing and may be deployed worldwide. In accordance with the Good Friday Agreement's provisions related to human rights and equality, the UK government incorporated the European Convention on Human Rights into Northern Ireland law and established a new Human Rights Commission and a new Equality Commission for Northern Ireland. Some nationalists, however, continue to press for more progress in the area of human rights and equality. They argue that Northern Ireland needs its own Bill of Rights (consideration of which is provided for in the Good Friday Agreement) and a stand-alone Irish Language Act to give the Irish language the same official status as English in Northern Ireland. The Good Friday Agreement calls for tolerance of linguistic diversity in Northern Ireland and support for the Irish language. The subsequent St. Andrews Agreement of 2006 provided for an Irish Language Act, but this issue remains controversial. Many analysts view implementation of the most important aspects of the Good Friday Agreement as complete. Since 2013, however, the Northern Ireland political parties and the UK and Irish governments have made several attempts to reduce sectarian tensions and promote reconciliation. Major endeavors include the following: The 2013 Haass Initiative. In 2013, the Northern Ireland Executive appointed former U.S. diplomat and special envoy for Northern Ireland Richard Haass as the independent chair of interparty talks aimed at tackling some of the most divisive issues in Northern Ireland society. In particular, Haass was tasked with making recommendations on dealing with the past and the sectarian issues of parading, protests, and the use of flags and emblems. In December 2013, Haass released a draft proposal outlining the way forward in these areas, but he was unable to broker a final agreement among the Northern Ireland political parties. The 2014 Stormont House Agreement. In 2014, financial pressures and budgetary disputes related to UK-wide welfare reforms and austerity measures tested Northern Ireland's devolved government. The UK and Irish governments convened interparty talks to address government finances and governing structures, as well as the issues previously tackled by the Haass initiative. In the resulting December 2014 Stormont House Agreement, the Northern Ireland political parties agreed to support welfare reform (with certain mitigating measures), balance the budget, address Northern Ireland's heavy reliance on the public sector, and reduce the size of the Assembly and the number of Executive departments to improve efficiency and cut costs. The agreement also included measures on parading, flags, and dealing with the past. Continued disagreements over welfare reform between the DUP and Sinn Fein, however, stalled implementation of all aspects of the Stormont House Agreement. The 2015 Fresh Start Agreement. In November 2015, the UK and Irish governments, the DUP, and Sinn Fein reached a new Fresh Start Agreement. Like the Stormont House Agreement, the accord focused on implementing welfare reform and improving the stability and sustainability of Northern Ireland's budget and governing institutions. It confirmed a reduction in the size of the Assembly from 108 to 90 members (effective from the first Assembly election after the May 2016 election), decreased the number of Executive departments, and made provision for an official opposition in the Assembly. The Fresh Start Agreement also included provisions on parading and the use of flags, but the parties were unable to reach final agreement on establishing new institutions to deal with the past. In addition, the Fresh Start Agreement addressed ongoing concerns about paramilitary activity, sparked by the arrest of a senior Sinn Fein official in connection to the August 2015 murder of an ex-IRA member. Despite a much-improved security situation since the 1998 Good Friday Agreement, concerns linger about the stability of the devolved government and the fragility of community relations. As noted previously, the devolved government led by the DUP and Sinn Fein collapsed in January 2017 amid heightened tensions related to Brexit and other issues. It took nearly three years following the March 2017 snap Assembly elections to reestablish the devolved government. The search for peace and reconciliation remains challenging. Difficult issues include bridging sectarian divisions and managing key sticking points (especially parading, protests, and the use of flags and emblems); dealing with the past; addressing remaining paramilitary concerns and curbing dissident activity; and furthering economic development. The 2013 Haass initiative, the 2014 Stormont House Agreement, and the 2015 Fresh Start Agreement attempted to tackle some aspects of these long-standing challenges. Some measures agreed in these successive accords were delayed amid the absence of a devolved government between 2017 and 2020. The immediate impetus for the devolved government's January 2017 collapse was a renewable energy scandal involving DUP leader and Northern Ireland First Minister Arlene Foster. Then-Deputy First Minister Martin McGuiness of Sinn Fein called for Foster to stand aside as First Minister temporarily while an investigation was conducted into the energy scheme; Foster refused, and McGuinness resigned his position as Deputy First Minister in protest. McGuinness's resignation essentially forced new elections to be called for March 2, 2017. Tensions between Sinn Fein and the DUP on several issues other than the energy scandal contributed to Sinn Fein's decision to force snap Assembly elections. The elections were called in the wake of the June 2016 UK referendum on EU membership and amid deep unease over Brexit's implications for Northern Ireland. Other points of contention included the introduction of a potential Irish Language Act and the legalization of same-sex marriage; Sinn Fein supported both measures, whereas the DUP opposed them. Arlene Foster led the DUP's election campaign, but Michelle O'Neill succeeded McGuinness as Sinn Fein's leader in Northern Ireland and led Sinn Fein's campaign (McGuinness was suffering from ill health and passed away a few weeks after the election). As seen in Table 1 , the number of Assembly seats contested in 2017 was 90 rather than 108 because of a previously agreed reduction in the size of the Assembly. The DUP retained the largest number of seats in the 2017 elections, but Sinn Fein was widely regarded as the biggest winner, given its success in reducing the previous gap between the two parties from 10 seats to 1. A high voter turnout of almost 65%âfueled by anger over the energy scandal and a perceived lack of concern from London about Brexit's impact on Northern Irelandâappears to have favored Sinn Fein and the cross-community Alliance Party. For the first time in the Assembly, unionist parties do not have an overall majority (a largely symbolic status because of the power-sharing rules but highly emblematic for the unionist community). Following the March 2017 snap Assembly elections, negotiations between the DUP, Sinn Fein, and the other main political parties (see text box ) on forming a new devolved government repeatedly stalled, primarily over a potential Irish Language Act. Divisions over Brexit exacerbated tensions. The DUP was the only major Northern Ireland political party to back Brexit, which Sinn Fein and the other main Northern Ireland parties strongly opposed. Some analysts suggest the DUP's support for the Conservative Party government in the UK Parliament following the UK's June 2017 snap general election further heightened distrust between Sinn Fein and the DUP and made reaching a new power-sharing agreement more difficult. In April 2019, journalist Lyra McKee was shot and killed while covering riots in Londonderry (also known as Derry). The New IRA, a dissident republican group opposed to the peace process, claimed responsibility (but also apologized, asserting that it had been aiming to shoot a police officer but hit McKee by accident). McKee's death sparked a significant public outcry and prompted the UK and Irish governments to intensify efforts to revive talks on forming a new devolved government. Negotiations remained largely deadlocked, however, throughout the summer and fall of 2019 amid ongoing uncertainty over Brexit. On December 16, 2019, the UK and Irish governments launched a new round of talks with the main political parties aimed at reestablishing the devolved government. These negotiations followed the UK's December 12, 2019, general election, in which Prime Minister Boris Johnson's Conservative Party won a convincing parliamentary majority, thereby negating the DUP's influence in the UK Parliament and improving the prospects for restoring Northern Ireland's devolved government. A functioning devolved government appeared to offer the DUP the best opportunity to ensure it has a voice in implementing the new post-Brexit border arrangements for Northern Ireland (discussed in \" Possible Implications of Brexit ,\" below) and in the upcoming negotiations on the UK-EU future political and trade relationship. On January 10, 2020, the DUP, Sinn Fein, and the other parties agreed to a deal put forward by the UK and Irish governments to reestablish the devolved government. The new Assembly convened the following day and elected a new Executive. The DUP's Arlene Foster and Sinn Fein's Michelle O'Neill were elected as First Minister and Deputy First Minister, respectively. The new power-sharing deal, known as New Decade, New Approach, is wide-ranging and addresses a number of key issues, including health and education concerns and measures to improve the sustainability and transparency of Northern Ireland's political institutions. The power-sharing deal does not include a stand-alone Irish Language Act, as initially demanded by Sinn Fein, but essentially seeks to strike a compromise that promotes the use of the Irish (Gaelic) language while protecting the Ulster-Scots language (a regional language similar to English) that many unionists consider important to their heritage. The deal provides for the official recognition in Northern Ireland of both the Irish and the Ulster-Scots languages, allows for their wider use in government settings, and establishes two new \"language commissioners\"âone for Irish and one for Ulster-Scotsâto enhance, protect, and develop each language and associated cultural traditions. Both the UK and Irish governments promised additional financial support for Northern Ireland as part of the deal to restore the devolved government. Observers suggest that Northern Ireland remains a largely divided society, with Protestant and Catholic communities existing largely in parallel. Peace walls that separate Protestant and Catholic neighborhoods are perhaps the most tangible sign of such divisions. Estimates of the number of peace walls vary depending on the definition. Northern Ireland's Department of Justice recognizes around 50 peace walls for which it has responsibility; when other types of \"interfaces\" are includedâsuch as fences, gates, and closed roadsâthe number of physical barriers separating Protestant and Catholic communities is over 100. Northern Ireland's Executive is working to remove the peace walls, but a 2015 survey of public attitudes found that 30% of those interviewed want the walls to remain in place; it also found that more than 4 in 10 people have never interacted with anyone from the community living on the other side of the nearest peace wall. Furthermore, experts note that schools and housing developments in Northern Ireland remain mostly single-identity communities. Some analysts contend that sectarian divisions are particularly evident during the annual summer marching season , when many unionist cultural and religious organizations hold parades commemorating Protestant history. Although the vast majority of these annual parades are not contentious, some are held through or close to areas populated mainly by Catholics (some of whom perceive such unionist parades as triumphalist and intimidating). During the Troubles, the marching season often provoked fierce violence. Many Protestant organizations view the existing Parades Commission, which arbitrates disputes over parade routes, as largely biased in favor of Catholics and have repeatedly argued for abolishing the commission. Efforts over the years to address the contentious issue of parading and related protests have stalled repeatedly. A series of protests in late 2012 and early 2013 highlighted frictions between the unionist and nationalist communities. Protests began following a decision to fly the union (UK) flag at Belfast City Hall only on designated days rather than year-round. The protests, mostly by unionists and loyalists, occurred in Belfast and elsewhere in Northern Ireland, and some turned violent. Northern Ireland leaders on both sides of the sectarian divide received death threats, and some political party offices were vandalized. In June 2016, a Commission on Flags, Identity, Culture, and Tradition was established to assess these contentious issuesâincluding the display of flags and emblemsâand to recommend policies and solutions to help address them. This commission consists of 15 members, with 7 appointed by Northern Ireland's political parties and 8 drawn from outside the government; it was originally proposed by the Haass initiative and subsequently endorsed in the Stormont House Agreement and the Fresh Start Agreement. Although this commission was supposed to produce a report with its recommendations within 18 months, it has so far failed to deliver its findings. Commission officials contend that the collapse of the devolved government in 2017 and the subsequent impasse in its reestablishment stymied the commission's work to some degree. Fully addressing the legacy of violence in Northern Ireland remains controversial. The Good Friday Agreement asserted that, \"it is essential to acknowledge and address the suffering of the victims of violence as a necessary element of reconciliation.\" In 2008, the Northern Ireland Assembly established a Commission for Victims and Survivors aimed at supporting victims and their families. Several legal processes for examining crimes stemming from the Troubles also exist. These include police investigations into deaths related to the conflict; investigations by the Police Ombudsman for Northern Ireland of historical cases involving allegations of police misconduct; and public inquiries, such as the Saville inquiry (concluded in 2010) into the 1972 Bloody Sunday incident. Critics argue that these various legal processes represent a piecemeal approach and give some deaths or incidents priority over others. Some observers point out that more than 3,000 conflict-related deaths remain unsolved. In 2005, a Historical Enquiries Team (HET) was established within the PSNI to review over 3,200 deaths relating to the conflict between 1968 and 1998. Despite the HET's efforts, progress was slow and it wound down at the end of 2014. Other critics note the expense and time involved with some of these processes; for example, the Bloody Sunday inquiry cost Â£195 million (more than $300 million) and took 12 years to complete. Some analysts and human rights advocates argue that Northern Ireland needs a comprehensive mechanism for dealing with its past, both to meet the needs of all victims and survivors and to contain costs. At the same time, many commentators assert there is no consensus in Northern Ireland on the best way to deal with the past. This is in large part because many unionists and nationalists continue to view the conflict differently and retain competing narratives. The 2014 Stormont House Agreement called for establishing four new bodies to address \"legacy issues\" (based largely on proposals made during the 2013 Haass initiative): Historical Investigations Unit (HIU) . This body would take forward outstanding cases from the HET process and the historical unit of the Police Ombudsman dealing with past police misconduct cases. The UK government pledged full disclosure to the HIU. Independent Commission for Information Retrieval (ICIR). The ICIR would enable victims and survivors to seek and privately receive information about conflict-related violence. It would be established by the UK and Irish governments but would be entirely separate from the justice systems in each jurisdiction. Any information provided to the ICIR would be inadmissible in criminal and civil proceedings, but individuals who provided information would not be immune to prosecution for any crime committed should evidentiary requirements be met by other means. Oral History Archive. This archive would provide a central place for people from all backgrounds to share experiences and narratives related to the Troubles. Implementation and Reconciliation Group. This body would oversee work on themes, archives, and information recovery in an effort to promote reconciliation and reduce sectarianism. Efforts to establish these four new institutions in UK law, however, largely stalled due to divisions between the UK government, on the one hand, and some nationalists and human rights advocates, on the other, over proposed \"national security caveats\" related to the disclosure of certain information. Victims groups and nationalists were concerned that \"national security\" could be used to cover up criminal wrongdoing by state agents. At the same time, unionists voiced concern that the proposed HIU could unfairly target former soldiers and police officers, and many argued that any measures to deal with the past in Northern Ireland should contain a statute of limitations or amnesty to prosecutions. Successive government crises and the stalemate in reestablishing the devolved government between 2017 and early 2020 also impeded work on implementing these mechanisms to address Northern Ireland's legacy of violence. In the January 2020 New Decade, New Approach deal to reestablish the devolved government, the UK government pledged to introduce legislation in the UK Parliament to set up the legacy bodies proposed in the 2014 Stormont House Agreement. Experts suggest, however, that the issue of national security caveats could still pose an obstacle. Others note that some in the UK Parliament could demand legislation to protect military veterans from prosecution for past actions in Northern Ireland in exchange for their support for establishing the new legacy institutions. Experts contend that the major paramilitary organizations active during the Troubles are now committed to the political process and remain on cease-fire. However, the apparent continued existence of some groups and their engagement in criminality worries many in both the unionist and nationalist communities. In response to heightened concerns about paramilitary activity in Northern Ireland in 2015, the UK government commissioned a study on the status of republican and loyalist paramilitary groups. This review found that all the main paramilitary groups operating during the Troubles still exist, but they are on cease-fire and the leadership of each group, \"to different degrees,\" is \"committed to peaceful means to achieve their political objectives.\" At the same time, the review concluded that individual members of paramilitary groups still represent a threat to national security, including through their involvement in organized crime, and \"there is regular unsanctioned activity including behavior in direct contravention of leadership instruction.\" The 2015 Fresh Start Agreement sought to address concerns about the main paramilitary groups in Northern Ireland. Among other measures, it enumerated a new set of principles that calls upon members of the Assembly and the Executive to work toward disbanding all paramilitary organizations and to take no instructions from such groups. The agreement also called for establishing a new, four-member international body to monitor paramilitary activity and to report annually on progress toward ending such activity. The resulting Independent Reporting Commission (IRC) began work in 2017; the UK and Irish governments each named one representative to the IRC, and the Northern Ireland Executive named two. In its second annual report, released in November 2019, the IRC asserted that paramilitarism remains a \"stark reality of life\" in Northern Ireland and is an obstacle to peace and reconciliation; the IRC also noted that the recent impasse in the devolved government and uncertainty regarding Brexit have made the task of ending paramilitary activity more difficult. Security assessments indicate that dissident republican and loyalist groups not on cease-fire and opposed to the 1998 peace accord continue to present serious threats. The aforementioned 2015 review of paramilitary groups maintained that the most significant terrorist threat in Northern Ireland was posed not by the groups evaluated in that report but rather by dissident republicans. The review described dissident loyalist groups as posing another, albeit \"smaller,\" threat. At the same time, experts note that dissident groups do not have the same capacity to mount a sustained terror campaign as the IRA did between the 1970s and the 1990s. Most of the dissident republican groups are small in comparison to the IRA during the height of the Troubles. According to UK security services, there are currently four main dissident republican groups: the Continuity IRA (CIRA); Ãglaigh na hÃireann (ÃNH); Arm na Poblachta (ANP), and the New IRA (which reportedly was formed in 2012 and brought together the Real IRA, the Republican Action Against Drugs, or RAAD, and a number of independent republicans). These groups have sought to target police officers, prison officers, and other members of the security services in particular. Between 2009 and 2017, dissident republicans were responsible for the deaths of two PSNI officers, two British soldiers, and two prison officers. In January 2018, ÃNH declared itself on cease-fire. However, the other groups remain active, and authorities warn that the threat posed by the New IRA in particular is severe. Police suspect the New IRA was responsible for a January 2019 car bomb that exploded in Londonderry (or Derry). As noted above, the New IRA claimed responsibility for killing journalist Lyra McKee in April 2019. Many observers note a slight uptick in dissident republican activity over the last year, especially in border regions, as the New IRA and the Continuity IRA sought to exploit the stalemates over both Northern Ireland's devolved government and Brexit. Many assert that one of the best ways to ensure a lasting peace in Northern Ireland and deny dissident groups new recruits is to promote continued economic development and equal opportunity for Catholics and Protestants. Northern Ireland's economy has made considerable advances since the 1990s. Between 1997 and 2007, Northern Ireland's economy grew an average of 5.6% annually (marginally above the UK average of 5.4%). Unemployment decreased from over 17% in the 1980s to 4.3% by 2007. The 2008-2009 global recession significantly affected the region, however, and economic recovery has been slow and uneven. In the four quarters ending in September 2019, Northern Ireland's economic activity grew by 0.3%, as compared to 1.1% growth for the UK overall. Unemployment in Northern Ireland is currently 2.4%, lower than the UK average (3.8%) and that of the Republic of Ireland (4.8%) and the EU (6.3%). Income earned and living standards in Northern Ireland remain below the UK average. Of the UK's 12 economic regions, Northern Ireland had the fifth-lowest gross value added per capita in 2018 (Â£25,981, or about $33,900), below the UK's average (Â£32,216, or about $42,032). Northern Ireland also has both a high rate of economic inactivity (26%) and a high proportion of working-age individuals with no formal qualifications. Studies indicate that the historically poorest areas in Northern Ireland (many of which bore the brunt of the Troubles) remain so and that many of the areas considered to be the most deprived are predominantly Catholic. At the same time, Northern Ireland has made strides in promoting equality in its workforce. The gap in economic activity rates between Protestants and Catholics has shrunk considerably since 1992 (when there was a 10 percentage point difference) and has largely converged in recent years (in 2017, the economic activity rate was 70% for Protestants and 67% for Catholics). In addition, the percentage point gap in unemployment rates between the two communities has decreased from 9% in 1992 to 0% in 2017. To improve Northern Ireland's long-term economic performance, Northern Ireland leaders have sought to promote export-led growth, decrease Northern Ireland's economic dependency on the public sector by growing the private sector, and attract more foreign direct investment. Reducing Northern Ireland's economic dependency on the public sector (which accounts for about 70% of the region's gross domestic product and employs roughly 30% of its workforce) and devolving power over corporation tax from London to Belfast to help increase foreign investment were key issues addressed in the cross-party negotiations in both 2014 and 2015. The Fresh Start Agreement set April 2018 as the target date for introducing a devolved corporation tax rate of 12.5% in Northern Ireland (the same rate as in the Republic of Ireland). In the absence of devolved government between 2017 and early 2020, however, reducing Northern Ireland's corporation tax rate has been on hold. The UK exited the EU on January 31, 2020. In the UK's June 2016 public referendum on EU membership, voters in Northern Ireland favored remaining in the EU, 56% to 44% (the UK overall voted in favor of leaving, 52% to 48%). Brexit has added to divisions within Northern Ireland and poses considerable challenges, with potential implications for Northern Ireland's peace process, economy, and, in the longer term, constitutional status. At the time of the 1998 Good Friday Agreement, the EU membership of both the UK and the Republic of Ireland was regarded as essential to underpinning the political settlement by providing a common European identity for unionists and nationalists in Northern Ireland. EU law also provided a supporting framework for guaranteeing the human rights, equality, and nondiscrimination provisions of the peace accord. Since 1998, as security checkpoints were dismantled in accordance with the peace agreement, and because both the UK and Ireland belonged to the EU's single market and customs union, the circuitous 300-mile land border between Northern Ireland and Ireland effectively disappeared. The open border served as an important political and psychological symbol on both sides of the sectarian divide and helped produce a dynamic cross-border economy. Preventing a hard border with customs checks and physical infrastructure on the island of Ireland was a key goal, and a major stumbling block, in negotiating the UK's withdrawal agreement with the EU. UK, Irish, and EU leaders asserted repeatedly that they did not desire a hard border post-Brexit. Security assessments suggested that if border or custom posts were reinstated, violent dissident groups opposed to the peace process would view such infrastructure as targets, endangering the lives of police and customs officers. Experts feared that such violence would threaten the region's security and stability and potentially put the entire peace process at risk. Many in Northern Ireland and Ireland also were eager to maintain an open border to ensure \"frictionless\" trade, safeguard the North-South economy, and protect community relations. People in border communities worried that any hardening of the border could affect daily travel across the border to work, shop, or visit family and friends. Estimates suggest there are upward of 300 public and private border crossing points along the border today; during the Troubles, only a fraction of crossing points were open, and hour-long delays due to security measures and bureaucratic hurdles were common. Devising a mechanism to maintain an open border, however, was complicated by the UK government's pursuit of a largely hard Brexit , which would keep the UK outside of the EU's single market and customs union. In early 2019, the UK Parliament rejected the initial UK-EU withdrawal agreement three times, in large part because of concerns about the backstop for the Irish border, which would have kept the UK inside the EU customs union until the UK and EU determined their future trade relationship. Some Brexit advocates contended that Ireland and the EU were exaggerating and exploiting the security concerns about the border to keep the UK close to the EU. Those of this view noted that although the Good Friday Agreement commits the UK to normalizing security arrangements, including the removal of security installations \"consistent with the level of threat,\" it does not explicitly require an open border. The Irish government and many in Northern Irelandâas well as most UK officialsâargued that an open border had become intrinsic to peace on the island of Ireland. In October 2019, EU and UK negotiators reached a revised withdrawal agreement with new provisions for Northern Ireland to ensure an open border on the island of Ireland post-Brexit while safeguarding the rules of the EU single market. Under the new withdrawal agreement, following the end of the 11-month transition period in December 2020, Northern Ireland is to remain legally in the UK customs territory but is to maintain regulatory alignment with the EU. In effect, this arrangement keeps Northern Ireland for all practical purposes in the EU customs union, thus eliminating the need for regulatory checks on trade in goods between Northern Ireland and the Republic of Ireland but essentially creating a customs border in the Irish Sea. Any physical checks necessary to ensure customs compliance are to be conducted at ports or points of entry away from the Northern Ireland-Ireland land border, with no checks or infrastructure at this border. At the end of the transition period, the entire UK, including Northern Ireland, will leave the EU customs union and conduct its own national trade policy. The DUP strongly opposed these \"Northern Ireland-only\" arrangements, contending the effective customs border in the Irish Sea will divide Northern Ireland from the rest of the UK and threaten the UK's constitutional integrity. In light of the large majority won by Prime Minister Johnson's Conservative Party in the December 2019 UK parliamentary elections, however, the DUP lost political influence and was unable to block approval of the renegotiated withdrawal agreement. Both the UK and the EU subsequently ratified the withdrawal agreement, thus enabling the UK to end its 47-year membership in the EU. With the UK-EU withdrawal agreement in place, concerns have largely receded about a hard border developing on the island of Ireland. At the same time, EU and UK negotiators still must flesh out many of the details related to how the post-Brexit regulatory and customs arrangements for Northern Ireland will work in practice, including where and how customs checks will take place. In accordance with the terms of the withdrawal agreement, a Joint Committee of UK and EU officials is to decide such issues during the transition period. Implementation is likely to remain a work in progress. Uncertainty also persists about what the overall UK-EU relationshipâincluding with respect to tradeâwill look like post-Brexit and whether the two sides can reach an agreement by the end of the transition period. However, the provisions related to the Northern Ireland land border are not expected to change pending the outcome of negotiations on the future UK-EU relationship. Prolongation of the post-Brexit arrangements to keep Northern Ireland aligned with EU regulatory and customs rules will be subject to the consent of the Northern Ireland Assembly in 2024. Should the Assembly fail to renew these arrangements (an unlikely scenario, given that pro-EU parties are expected to continue to hold a majority in the Assembly), the UK and the EU would need to agree on a new set of provisions to keep the border open. Many analysts assert that Brexit has further exacerbated political and societal divisions in Northern Ireland. As noted previously, the DUP was the only main political party in Northern Ireland to support Brexit, but it opposed the Northern Ireland provisions in the renegotiated withdrawal agreement because it viewed them as treating Northern Ireland differently from the rest of the UK and undermining the union. Amid ongoing demographic, societal, and economic changes in Northern Ireland that predate Brexit, some in the unionist community perceive a loss in unionist traditions and dominance in Northern Ireland. Some experts suggest the new post-Brexit border and customs arrangements for Northern Ireland could enhance this sense of unionist disenfranchisement, especially if Northern Ireland is drawn closer to the Republic of Ireland's economic orbit post-Brexit. Such unionist unease in turn could intensify frictions and political instability in Northern Ireland; observers also worry that heightened unionist frustration could prompt a resurgence in loyalist violence post-Brexit. Some experts contend that Brexit could have serious negative economic consequences for Northern Ireland. According to a UK parliamentary report, Northern Ireland depends more on the EU market (and especially that of Ireland) for its exports than does the rest of the UK. In 2017, approximately 57% of Northern Ireland's exports went to the EU, including 38% to Ireland, which was Northern Ireland's top single export and import partner. Many manufacturers in Northern Ireland and Ireland also depend on integrated supply chains north and south of the border; raw materials in products such as milk, cheese, butter, and alcoholic drinks often cross the border between Northern Ireland and Ireland several times for processing and packaging. Trade with Ireland is especially important for small- and medium-sized companies in Northern Ireland. Although sales in 2017 to other parts of the UK (Â£11.3 billion, or about $14.8 billion) surpassed the value of all Northern Ireland exports (Â£10.1 billion, or about $13.2 billion) and were nearly three times the value of exports to Ireland (Â£3.9 billion, or about $5.1 billion), small- and medium-sized companies in Northern Ireland were responsible for the vast majority of the region's exports to Ireland. Large- and medium-sized Northern Ireland firms dominated in sales to the rest of the UK. UK and DUP leaders maintain that given the value of exports, the rest of the UK is overall more important economically to Northern Ireland than the EU. The DUP and others in Northern Ireland suggest the renegotiated withdrawal agreement could be detrimental to the economy. A UK government risk assessment released in October 2019 acknowledged that the lack of clarity about how the customs arrangements for Northern Ireland will operate in practice and possible regulatory divergence between Northern Ireland and the rest of the UK could lead to reduced business investment, consumer spending, and trade in Northern Ireland. The DUP also highlights the potential negative profit implications for Northern Ireland businesses engaged in trade with the rest of the UK. Northern Ireland firms that export goods to elsewhere in the UK would be required under EU customs rules to make exit declarations, which likely would increase costs and administrative burdens. Brexit could have other economic ramifications for Northern Ireland, as well. Some experts argue that access to the EU single market was one reason for Northern Ireland's success in attracting foreign direct investment since the end of the Troubles, and they express concern that Brexit could deter future investment. Post-Brexit, Northern Ireland will lose EU regional funding (roughly $1.3 billion between 2014 and 2020) and agricultural aid (direct EU farm subsidies to Northern Ireland are nearly $375 million annually). UK officials maintain that the government is determined to safeguard Northern Ireland's interests and \"make a success of Brexit\" for Northern Ireland. They insist that Brexit offers new economic opportunities for Northern Ireland outside the EU. Supporters of the renegotiated withdrawal agreement argue that it will help improve Northern Ireland's economic prospects. Northern Ireland will remain part of the UK customs union and thus will be able to participate in future UK trade deals, but it also will retain privileged access to the EU single market, which may make it a more attractive destination for foreign direct investment. Brexit has revived questions about Northern Ireland's constitutional status. Sinn Fein argues that \"Brexit changes everything\" and could generate greater support for a united Ireland. Since the 2016 Brexit referendum, Sinn Fein has repeatedly called for a border poll (a referendum on whether Northern Ireland should remain part of the UK or join the Republic of Ireland) in the hopes of realizing its long-term goal of Irish unification. As noted previously, the Good Friday Agreement provides for the possibility of a border poll in Northern Ireland, in line with the consent principle. Any decision to hold a border poll in Northern Ireland on its constitutional status rests with the UK Secretary of State for Northern Ireland. In accordance with the Good Friday Agreement, the UK Secretary of State for Northern Ireland must call a border poll if it \"appears likely\" that \"a majority of those voting would express a wish that Northern Ireland should cease to be part of the United Kingdom and form part of a united Ireland.\" At present, experts believe the conditions required to hold a border poll in Northern Ireland do not exist. Most opinion polls indicate that a majority of people in Northern Ireland continue to support the region's position as part of the UK. At the same time, some surveys suggest that views on Northern Ireland's status may be shifting and that a \"damaging Brexit\" in particular could increase support for a united Ireland. A September 2019 survey found that 46% of those polled in Northern Ireland favored unification with Ireland, versus 45% who preferred remaining part of the UK. Analysts note that Northern Ireland's changing demographics (in which the Catholic, largely Irish-identifying population is growing while the Protestant, British-identifying population is declining)âcombined with the post-Brexit arrangements for Northern Ireland that could lead to enhanced economic ties with the Republic of Irelandâcould boost support for a united Ireland in the long term. Irish unification also would be subject to Ireland's consent and approval. Some question the current extent of public and political support in the Republic of Ireland for unification, given potential economic costs and concerns that unification could spark renewed loyalist violence in Northern Ireland. According to Irish Prime Minister Leo Varadkar, a border poll in Northern Ireland in the near future would be divisive amid an already contentious Brexit process. In Ireland's February 8, 2020, parliamentary election, however, Sinn Fein (which also has a political presence in the Republic of Ireland) secured the largest percentage of the vote for the first time in Ireland's history, surpassing both Varadkar's Fine Gael party and the main opposition party, Fianna Fail. Although Sinn Fein's election platform included a pledge to begin examining and preparing for Irish unification, the party appeared to benefit mostly from the Irish electorate's desire for domestic political change and concerns about housing, health care, and economic policy, rather than from its stance on a united Ireland. Nevertheless, some commentators suggest that Sinn Fein's electoral success could add momentum to calls for a united Ireland. Successive U.S. Administrations have viewed the Good Friday Agreement as the best framework for a lasting peace in Northern Ireland. The Clinton Administration was instrumental in helping the parties forge the agreement, and the George W. Bush Administration strongly backed its full implementation. U.S. officials welcomed the end to the IRA's armed campaign in 2005 and the restoration of the devolved government in 2007. The Obama Administration remained engaged in the peace process. In October 2009, then-U.S. Secretary of State Hillary Clinton visited Northern Ireland, addressed the Assembly, and urged Northern Ireland's leaders to reach an agreement on devolving policing and justice powers. In February 2010, President Obama welcomed the resulting Hillsborough Agreement. In June 2013, President Obama visited Northern Ireland and noted that the United States would always \"stand by\" Northern Ireland. The Obama Administration welcomed the conclusion of both the December 2014 Stormont House Agreement and the November 2015 Fresh Start Agreement. Like its predecessors, the Trump Administration has offered support and encouragement to Northern Ireland. In March 2017, Vice President Mike Pence noted that, \"the advance of peace and prosperity in Northern Ireland is one of the great success stories of the past 20 years.\" In November 2017, a U.S. State Department spokesperson expressed regret at the impasse in discussions to restore Northern Ireland's power-sharing institutions and asserted that the United States remained \"ready to support efforts that ensure full implementation of the Good Friday Agreement and subsequent follow-on cross-party agreements.\" On March 6, 2020, President Trump appointed his former acting Chief of Staff Mick Mulvaney as U.S. special envoy to Northern Ireland; leaders in Northern Ireland and Ireland welcomed Mulvaney's appointment. Many Members of Congress have actively supported the Northern Ireland peace process for decades. Over the last several years, congressional hearings have focused on the implementation of the Good Friday Agreement, policing reforms, and human rights in Northern Ireland. Some Members have been interested in the status of public inquiries into several past murders in Northern Ireland in which collusion between the security forces and paramilitary groups is suspectedâincluding the 1989 slaying of Belfast attorney Patrick Finucane and the 1997 killing of Raymond McCord, Jr. Some Members also urged the Trump Administration to name a special envoy for Northern Ireland to signal continued U.S. commitment to the region. On the economic front, the United States is a key trading partner and an important source of investment for Northern Ireland. According to statistics from the Northern Ireland Executive, in 2017, exports to the United States accounted for 17% of total Northern Ireland exports, and imports from the United States accounted for 10% of total Northern Ireland imports. Foreign direct investment by U.S.-based companies totaled Â£1.8 billion (about $2.5 billion) between 2008 and 2018. Between 2009 and 2011, a special U.S. economic envoy to Northern Ireland worked to further economic ties between the United States and Northern Ireland and to underpin the peace process by promoting economic prosperity. Since 2016, President Trump has repeatedly expressed his support for Brexit. The Trump Administration also backs a future U.S.-UK free trade agreement post-Brexit. In a September 2019 visit to Ireland, Vice President Pence reiterated the Administration's support for Brexit but asserted that the United States recognizes the \"unique challenges\" posed by the Irish border and \"will continue to encourage the United Kingdom and Ireland to ensure that any Brexit respects the Good Friday Agreement.\" At the same time, Vice President Pence urged Ireland and the EU to reach a Brexit withdrawal agreement that \"respects the United Kingdom's sovereignty,\" which many Irish commentators viewed as indicating a limited understanding of Brexit's potential implications for both Northern Ireland and Ireland. Some Members of Congress have demonstrated an interest in how Brexit might affect Northern Ireland and expressed continued support for the Good Friday Agreement. Although many Members back a future U.S.-UK free trade agreement post-Brexit, some Members also have tied their support to protecting the Northern Ireland peace process. In April 2019, House Speaker Nancy Pelosi said there would be \"no chance whatsoever\" for a U.S.-UK trade agreement if Brexit were to weaken the Northern Ireland peace process. On October 22, 2019, the House Foreign Affairs Committee's Subcommittee on Europe, Eurasia, Energy, and the Environment held a hearing titled \"Protecting the Good Friday Agreement from Brexit.\" On December 3, 2020, the House passed H.Res. 585 , reaffirming support for the Good Friday Agreement in light of Brexit and asserting that any future U.S.-UK trade agreement and other U.S.-UK bilateral agreements must include conditions to uphold the peace accord. Other Members of Congress have not directly tied their support for a bilateral U.S.-UK free trade agreement to protecting Northern Ireland post-Brexit. The United States has provided development aid to Northern Ireland primarily through the International Fund for Ireland (IFI), which was created in 1986. The UK and Irish governments established the IFI based on objectives in the Anglo-Irish Agreement of 1985, but the IFI is an independent entity. It supports economic regeneration and social development projects in areas most affected by the conflict in Northern Ireland and in the border areas of the Republic of Ireland; in doing so, the IFI has sought to foster dialogue and reconciliation. The United States has contributed more than $540 million since the IFI's establishment, roughly half of total IFI funding. The EU, Canada, Australia, and New Zealand have provided funding for the IFI as well. In the 1980s and 1990s, U.S. appropriations for the IFI averaged around $23 million annually; in the 2000s, U.S. appropriations averaged $18 million each year. According to the IFI, the vast majority of projects it has supported with seed funding have been located in disadvantaged areas that have suffered from high unemployment, a lack of facilities, and little private sector investment. In its first two decades, IFI projects in Northern Ireland and the southern border counties focused on economic and business development and sectors such as tourism, agriculture, and technology. In 2006, the IFI announced it would begin shifting its focus toward projects aimed at promoting community reconciliation and overcoming past divisions. Successive U.S. Administrations and many Members of Congress have backed the IFI as a means to promote economic development and encourage divided communities to work together. Support for paramilitary and dissident groups in Northern Ireland traditionally has been strongest in communities with high levels of unemployment and economic deprivation. Thus, many observers have long viewed the creation of jobs and economic opportunity as a key part of resolving the conflict in Northern Ireland and have supported the IFI as part of the peace process. Many U.S. officials and Members of Congress also encouraged the IFI to place greater focus on reconciliation activities and were pleased with the IFI's decision to do so in 2006. At the same time, some critics have questioned the IFI's effectiveness, viewing certain IFI projects as largely wasteful and unlikely to bridge community divides in any significant way. In FY2011, amid the U.S. economic and budget crisis, some Members of Congress began to call for an end to U.S. funding for the IFI as part of a raft of budget-cutting measures. Some Members asserted that U.S. contributions to the IFI were no longer necessary given Ireland and Northern Ireland's improved political and economic situation (relative to what it was in the 1980s). In the final FY2011 continuing budget resolution ( P.L. 112-10 ), Congress did not specify an allocation for the IFI (and has not done so in successive fiscal years). Since FY2011, however, the Obama and Trump Administrations have continued to allocate funds from Economic Support Fund (ESF) resources to the IFI in the form of a grant for specific IFI activities to support peace and reconciliation programs. The Obama Administration provided $2.5 million per year between FY2011 and FY2014 and $750,000 per year in FY2015 and FY2016 from ESF funding. The Trump Administration provided $750,000 per year from ESF funding to the IFI in FY2017 and FY2018.", "summary": "Between 1969 and 1999, almost 3,500 people died as a result of political violence in Northern Ireland, which is one of four component \"nations\" of the United Kingdom (UK). The conflict, often referred to as \"the Troubles,\" has its origins in the 1921 division of Ireland and has reflected a struggle between different national, cultural, and religious identities. Protestants in Northern Ireland (48% of the population) largely define themselves as British and support remaining part of the UK ( unionists ). Most Catholics in Northern Ireland (45% of the population) consider themselves Irish, and many desire a united Ireland ( nationalists ). Successive U.S. Administrations and many Members of Congress have actively supported the Northern Ireland peace process. For decades, the United States has provided development aid through the International Fund for Ireland (IFI). In recent years, congressional hearings have focused on the peace process, police reforms, human rights, and addressing Northern Ireland's legacy of violence (often termed dealing with the past ). Some Members also are concerned about how the UK's decision to withdraw from the European Union (EU)âknown as Brexit âmight affect Northern Ireland. The Peace Agreement: Progress to Date and Ongoing Challenges In 1998, the UK and Irish governments and key Northern Ireland political parties reached a negotiated political settlement. The resulting Good Friday Agreement, or Belfast Agreement, recognized that a change in Northern Ireland's constitutional status as part of the UK can come about only with the consent of a majority of the people in Northern Ireland (as well as with the consent of a majority in Ireland). The agreement called for devolved governmentâthe transfer of specified powers from London to Belfastâwith a Northern Ireland Assembly and Executive in which unionist and nationalist parties would share power. It also contained provisions on decommissioning (disarmament) of paramilitary weapons, policing, human rights, UK security normalization (demilitarization), and the status of prisoners. Despite a much-improved security situation since 1998, full implementation of the peace agreement has been difficult. For years, decommissioning and police reforms were key sticking points that generated instability in the devolved government. In 2007, the pro-British Democratic Unionist Party (DUP) and Sinn Fein, the nationalist political party traditionally associated with the Irish Republican Army (IRA), reached a landmark power-sharing deal. Tensions and distrust persisted, however, between the unionist and nationalist communities and their respective political parties. Ten years later, the devolved government led by the DUP and Sinn Fein collapsed, prompting snap Assembly elections in March 2017 amid several contentious regional issues and unease in Northern Ireland about Brexit. Negotiations to reestablish the devolved government repeatedly stalled. The DUP and Sinn Fein agreed to form a new devolved government in January 2020, but the long impasse renewed concerns about the stability of the power-sharing institutions and the fragility of community relations. Northern Ireland also faces a number of broad challenges in its search for peace and reconciliation, including reducing sectarian divisions, dealing with the past, addressing lingering concerns about paramilitary and dissident activity, and promoting further economic development. Brexit and Northern Ireland Brexit occurred on January 31, 2020, and may have significant political and economic repercussions for Northern Ireland. In the UK's 2016 public referendum on EU membership, voters in Northern Ireland favored remaining in the EU, 56% to 44% (the UK overall voted in favor of leaving, 52% to 48%). The future of the border between Northern Ireland and Ireland was a central issue in the UK's withdrawal negotiations with the EU. Since 1998, as security checkpoints were dismantled in accordance with the peace agreement and because both the UK and Ireland belonged to the EU single market and customs union, the circuitous 300-mile land border between Northern Ireland and Ireland effectively disappeared. Many on both sides of the sectarian divide viewed this open border as intrinsic to peace and crucial to fostering a dynamic cross-border economy. Preventing a hard border (with customs checks and physical infrastructure) post-Brexit was thus a key imperative and a major stumbling block in the UK-EU withdrawal negotiations. Although concerns about a hard border developing have receded in light of the solution found in the UK-EU withdrawal agreement, Brexit has added to divisions within Northern Ireland and revived questions about the region's constitutional status. Sinn Fein, for example, has called for a border poll , or referendum, on whether Northern Ireland should remain part of the UK. Also see CRS Report R45944, Brexit: Status and Outlook , coordinated by Derek E. Mix.", "document_type": "crs"}
{"report": "Motor vehicle electrification has emerged in the past decade as a potentially viable alternative to internal combustion engines. Although only a small proportion of the current motor vehicle fleet is electrified, interest in passenger vehicle electrification has accelerated in several major industrial countries, including the United States, parts of Europe, and China. Despite advances in technology, electric vehicles (EVs) continue to be significantly more expensive than similarly sized vehicles with internal combustion engines. For this reason, governments in many countries have adopted policies to promote development and sales of electric vehicles. This report discusses federal and state government policies in the United States to support electrification of light vehicles and transit buses, as well as proposals to reduce or eliminate such support. More than 92 million light vehiclesâpassenger cars, pickup trucks, and SUVsâwere sold worldwide in 2018. The three largest markets were China (27 million vehicles sold), Europe (20 million), and the United States (17 million). Most of these vehicles are powered by internal combustion engines. The global market for electrified vehicles is small but growing: In 2018, more than 2 million plug-in hybrid and battery electric vehicles were sold worldwide, a 64% increase over 2017. These account for about 2% of all passenger vehicle sales, both worldwide and in the United States. Demand for electric vehicles is expected to continue to grow, as some countries have called for a complete shift away from sales of new fossil-fuel vehicles by 2030. The market for urban transit buses is smaller than the passenger car and SUV markets, but electric vehicles make up a larger part of its footprint. China leads in this category, with 106,000 electric buses put in service in 2017, bringing its total electric bus fleet to 384,000. It has been forecast to remain the largest electric bus market going forward. In the European Union (EU) and the United States, the pace of electrification is slower: More than 200 electric buses were sold in the EU in 2017, bringing the total in service to 1,700; in the United States, approximately 100 electric buses were sold, bringing the total to 300. Two basic types of electric vehicles are now in use: Hybrid electric vehicles (HEVs) have both internal combustion engines and electric motors that store energy in batteries. They do not plug into external sources of electricity, but use regenerative braking and the internal combustion engine to recharge. Plug-in electric vehicles, of which there are two types: plug-in hybrid electric vehicles (PHEVs) use an electric motor and an internal combustion engine for power, and they use electricity from an external source to recharge the batteries. Battery electric vehicles (BEVs) use only batteries to power the motor and use electricity from an external source for recharging. In this report, electric vehicles refer to these two types of plug-in vehicles, unless otherwise noted. Electrification of vehicles has been limited by three factors: (1) the high cost of producing the lithium ion batteries (currently the preferred battery chemistry) that propel them; (2) their limited range; and (3) vehicle charging time and location. Not all motorists have easy access to charging stations at home or at work, and it can take several hours to fully charge the battery that powers the vehicle, depending on the type of charger used. In 2018, more than 361,000 plug-in electric passenger vehicles (including PHEVs and BEVs) were sold in the United States, as well as more than 341,000 hybrid electric vehicles. This was the first year in which total sales of plug-in vehicles exceeded sales of hybrids ( Figure 1 ). Nearly all automakers offer electric vehicles for sale: 42 different models were sold in 2018, with Tesla and Toyota recording the largest number of vehicle sales. Sales of plug-in hybrid and battery electric vehicles in 2018 rose by over 80% from the previous year, bringing the total sales of plug-in vehicles since 2010 to just over 1 million. The plug-in hybrid and battery electric share of the U.S. light vehicle market in 2018 was 2.1%. The price of new electric vehicles is one factor inhibiting faster adoption. For example, the Leaf, a battery electric vehicle produced by Nissan, has a manufacturer's suggested retail price (MSRP) of $29,990, whereas the Nissan Sentra, a conventional vehicle similar in size and specifications to the Leaf, has an MSRP of $17,990. A smaller, less powerful vehicle with an internal combustion engine, the Nissan Versa, has an MSRP of $12,360; no electric counterpart is available in this price range. Electric vehicles are generally more expensive because of the high cost of producing the lithium-ion batteries that power them. The federal government has supported vehicle electrification in several ways. There have been tax incentives for the purchase of vehicles as well as for construction of vehicle infrastructure, such as charging stations. Federal research and development investments have sought to reduce battery costs, increase vehicle range, and decrease charging times. The federal government has also made other investments to build out EV infrastructure. Two types of tax incentives have been used to promote electric vehicles: consumer incentives for the purchase of plug-in electric vehicles and individual and business incentives to install electric-vehicle charging stations to expand the charging network. The credit for plug-in electric vehicles (Internal Revenue Code [IRC] Â§30D) is the primary federal tax incentive for electric vehicles. The credit ranges from $2,500 to $7,500 per vehicle, depending on the vehicle's battery capacity. The tax credit is not a function of the vehicle's price. Therefore, the subsidy amount is larger (as a percentage of a vehicle's price) for less-expensive vehicles. Generally, taxpayers claim tax credits for vehicle purchases. If the purchaser or lessee is a tax-exempt organization, the seller of the vehicle may be able to claim the credit. The plug-in electric vehicle credit begins phasing out after a vehicle manufacturer has sold 200,000 qualifying vehicles for use in the United States. General Motors (GM) and Tesla have reached the 200,000-vehicle limit, and tax credits for their vehicles have begun to phase down. Empirical studies have found that tax incentives lead to increased EV purchases. However, particularly for higher-income taxpayers, the tax credit may be claimed for purchases that would have occurred absent a federal tax incentive. Some studies have also found that incentives given closer to the point of sale, such as a rebate given at the time of purchase, are more effective in stimulating vehicle sales than tax credits. The Joint Committee on Taxation (JCT) projects that the plug-in electric vehicle credit will reduce federal tax revenues by $7.5 billion between FY2018 and FY2022. Any extensions to or expansions of the credit could increase this amount. About half of the forgone revenue is from credits claimed on corporate tax returns. Additionally, the tax credits tend to be claimed by higher-income taxpayers. For 2016, 78% of the claimants filed returns with adjusted gross income (AGI) of $100,000 or more, and such returns accounted for 83% of the amount claimed. (By comparison, of all returns filed, about 17% have AGI above $100,000.) Legislation has been introduced in the 116 th Congress that would modify the plug-in electric vehicle tax credit. Some bills propose expanding the credit. For example, the Driving America Forward Act ( S. 1094 / H.R. 2256 ) would increase the per-manufacturer cap to 600,000 vehicles and modify the credit during the phase-out period. The Electric Credit Access Ready at Sale (Electric CARS) Act of 2019 ( S. 993 / H.R. 2042 ) would extend the credit through December 31, 2029, and would also allow the credit to be transferred to the financing entity. Other proposals would eliminate the credit. The Fairness for Every Driver Act ( S. 343 / H.R. 1027 ) would eliminate the credit and impose federal highway user fees on alternative fuel vehicles. The primary federal tax incentive for EV infrastructure has been the tax credit for alternative fuel vehicle refueling property (IRC Â§30C), which expired in 2017. The credit was generally 30% of the cost of qualified property, with the credit limited to $30,000 for businesses at each separate location and $1,000 for property installed at a taxpayer's primary residence. For property sold to a tax-exempt entity, such as a school or a hospital, the seller of the property may have been able to claim the credit. Qualifying property included electric charging infrastructure as well as other forms of clean-fuel refueling property. The credit for alternative fuel vehicle refueling property has been a temporary tax credit since first enacted in 2005. The credit has been extended six times, often retroactively. The credit most recently expired at the end of 2017, but could be extended again. The uncertainty surrounding temporary tax incentives that are often retroactively reinstated diminishes their effectiveness as an investment incentive. The Electric CARS Act of 2019 ( S. 993 / H.R. 2042 ) would extend the credit through 2029. Data are not available on how much of the revenue loss associated with this provision is for EV infrastructure. The most recent one-year extension of this incentive, for all types of alternative fuel refueling property, was estimated to reduce federal tax revenues by $67 million over the 10-year budget window. Making the credit permanent for all types of qualifying property would reduce federal revenue by an estimated $332 million between FY2018 and FY2027. The tax credits for EV charging infrastructure that expired at the end of 2017, if extended, could support additional investment in Level 2 charging infrastructure. Expanded access to Level 2 charging at homes and workplaces could be a cost-effective solution to building out EV infrastructure in the near term. However, if electric vehicles are to be widely used for long-distance trips, a network of direct-current fast charger (DCFC) infrastructure (Level 3) is likely necessary. The tax credit is relatively small compared to the cost of a DCFC charging station. The high cost of this infrastructure, even if tax credits are extended, may continue to pose a barrier, especially if utilization rates are low. Given the differences in the costs and benefits associated with Level 2 and DCFC chargers, tax incentives could be provided that reflect some of these differences. There are few DCFC public chargers, yet having access to such infrastructure may have strong network benefits. Broadly, access to charging infrastructure has been shown in some studies to be a driver of demand for EVs. If Congress wanted to encourage greater EV use, tax credits could be designed to provide a larger incentive for investments in public DCFC infrastructure, relative to Level 2 charging stations. Storage incentives are another policy option that could support investment in EV infrastructure. On-site battery storage systems can be installed to allow solar power to be used for EVs. Tax incentives for batteries that facilitate EV use could encourage more of this activity. The Energy Storage Tax Incentive and Deployment Act of 2019 ( S. 1142 / H.R. 2096 ) would provide an investment credit for business or home use of energy storage. Tax-preferred bond financing options could also be used to support EV infrastructure investment. State and local financing for infrastructure solely or partially dedicated to EV charging projects may use tax-exempt bonds so long as the project is classified as serving a \"public purpose\" as defined in the federal code (IRC Â§141). A federal infrastructure bank or \"green bank\" might also be used to support EV infrastructure investment. One option to capitalize this type of bank would be to issue tax-favored bonds. Since 1956, federal surface transportation programs have been funded largely by taxes on motor fuels that flow into the highway account of the Highway Trust Fund (HTF). A steady increase in the revenues flowing into the HTF due to increased motor vehicle use and occasional increases in fuel tax rates accommodated growth in surface transportation spending over several decades. In 2001, though, trust fund revenues stopped growing faster than spending. In 2008, Congress began providing Treasury general fund transfers to keep the highway account solvent. Electric vehicles do not burn motor fuels, and hence users do not pay motor fuels taxes. Several states have imposed some form of tax or fee on electric vehicles that is dedicated to transportation, such that EV drivers also contribute to paying for highway infrastructure. Legislation has been introduced in the 116 th Congressâthe Fairness for Every Driver Act ( S. 343 / H.R. 1027 )âthat would, in addition to repealing the existing tax credit for plug-in electric vehicles, impose an annual fee on alternative-technology vehicles that draw power from a source not subject to fuel excise taxes. This fee would be designed to compensate for plug-in electric vehicles not paying the gas tax (or other fuel excise tax). Imposing a fee on electric vehicles or other alternative vehicles would increase their cost of ownership, although as a share of the vehicle's total cost, the amount would likely be small. Exempting electric vehicles from taxes or fees imposed on other types of vehicles is one option for encouraging the purchase of electric vehicles. Investment in transportation electrification R&D is one approach to reducing the overall cost of electric vehicle technologies. The Obama Administration made vehicle electrification a national goalâincluding increased spending on battery R&D, stimulus funding for construction of battery manufacturing plants in the United States, and development of DOE electric vehicle research and demonstration programs such as the \"EV Everywhere Grand Challenge.\" The Trump Administration requested reductions in funding levels for vehicle technologies R&D for FY2018 and FY2019, but Congress instead increased the program's funding levels for those years. Federal R&D funding for electric vehicles and electric vehicle charging infrastructure is primarily administered through the DOE's Office of Energy Efficiency and Renewable Energy (EERE). Within EERE, the Office of Transportation oversees the sustainable transportation R&D portfolio, which includes R&D programs in vehicle technologies, bioenergy technologies, and hydrogen and fuel cell technologies. Activities related to electric vehicles and charging infrastructure are within the Vehicle Technologies Office. In the 116 th Congress, some legislative proposals would support R&D programs. The Vehicle Innovation Act of 2019 ( S. 1085 / H.R. 2170 ) would authorize R&D programs and other activities to develop innovative vehicle technologies (including electric vehicles and charging infrastructure). Congress provides funding for electric vehicle technologies R&D through annual appropriations to EERE in the Energy and Water Development appropriations bill. The Trump Administration's budget request for EERE was $343 million for FY2020, $2,036 million (86%) less than the FY2019 enacted level of $2,379 million ( Table 1 ). The budget request, which \"focuses DOE resources toward early-stage R&D and reflects an increased reliance on the private sector to fund later-stage research, development, and commercialization of energy technologies,\" would provide $73.4 million to vehicle technologies for FY2020, $279.6 million (79%) less than the $344 million that was directed to vehicle technologies within the Joint Explanatory Statement of the FY2019 appropriations conferees. The FY2019 joint explanatory statement included support for various vehicle technologies to advance transportation electrification research: $163.2 million for the battery and electrification technologies subprogram ($38.1 million for electric drive research and developmentâincluding $7 million to enable extreme fast charging and advanced battery analytics); $10 million for continued funding of Section 131 of the 2007 Energy Independence and Security Act ( P.L. 110-140 ) for transportation electrification; and $37.8 million for the Clean Cities program, which provides competitive grants to support alternative fuel, infrastructure, and vehicle deployment activities. According to the FY2020 DOE budget request, the vehicle technologies program has set goals that \"are necessary for new technology options to be more efficient and at least as affordable compared to [the] baseline while also accounting for consumer pay- back period expectations.\" To advance vehicle electrification, DOE established the following research priorities: identify new battery chemistry and cell technologies with the potential to reduce the cost of electric vehicle batteries by more than half, to less than $100 per kilowatt hour (kWh) (with an ultimate goal of $80/kWh); increase vehicle range to 300 miles; and decrease charge time to 15 minutes or less by 2028. The request for FY2020 would reduce funding and prioritize \"early-stage activities,\" including the development of critical materials-free battery technologies. The request would eliminate funding for battery safety testing, battery thermal performance testing, and Clean Cities coalition support, training and technical assistance, and partnership activities. The DOE Clean Cities program supports local actions to reduce petroleum use in transportation. The program funds transportation projects nationwide through a competitive application process, and leverages these funds with additional public- and private-sector matching funds and in-kind contributions. While the program supports a variety of alternative fuels and vehicles in an effort to reduce petroleum use, funding opportunities by Clean Cities that directly support EVs include the EV Everywhere PlugâIn Electric Vehicle Local Showcases. EV Everywhere PlugâIn Electric Vehicle Local Showcases were selected in 2016 and are in progress. The three projects were selected to promote and demonstrate plug-in electric vehicle (PEV) use by \"establishing local showcases that provide a hands-on consumer experience and in-depth education in a conveniently located, brand-neutral setting.\" The awardees plan to establish showcases in at least 14 states, including states in the Upper Midwest, California, the Pacific Northwest, and New England. In the FY2019 joint explanatory statement, Congress directed DOE \"to continue to support the Clean Cities program, including competitive grants to support alternative fuel, infrastructure, and vehicle deployment activities.\" In the FY2020 budget request, the Trump Administration proposed eliminating funding for the Clean Cities program. In the 116 th Congress, two bills that pertain to electric vehicles would establish competitive grant programs within the Department of Transportation for electric vehicle charging infrastructure ( H.R. 2616 and S. 674 ). Purchases of electric vehicles in the near future will depend to some extent on the steps state and local governments and private entities take to build a reliable network of charging stations. Section 1413 of the Fixing America's Surface Transportation Act (FAST Act; P.L. 114-94 ) seeks to address that goal; it requires the Department of Transportation (DOT) to designate by 2020 national alternative fuel corridors (AFCs) to promote vehicle use of electricity, hydrogen, propane, and natural gas. The Federal Highway Administration (FHWA) has been working with other federal, state, and local officials and industry groups to plan AFC designations on interstate corridors ( Figure 2 ). FHWA has assigned designations to highways as either \"corridor ready\"âthey have enough fueling stations to serve a corridorâor \"corridor pending,\" where alternative fueling is insufficient. In the case of electric vehicles, a corridor-ready designation would apply if there were EV charging stations at 50-mile intervals, with a goal of establishing Level 3 DC Fast Charge infrastructure. Under this program, FHWA has developed standardized AFC signage and other forms of public education, and encouraged regional cooperation in planning new fueling networks. FHWA has undertaken three rounds of AFC nominations, the latest announced in April 2019. FHWA has identified building out alternative corridors on the most traveled Interstates, such as I-95 and I-80, as priorities for third-round funding. An additional goal is to secure nominations for areas targeted for EV investments by Electrify America in its Zero Emission Vehicle (ZEV) investment plan. Signage and installation of alternative fueling infrastructure along these corridors have been determined to be eligible expenses under FHWA's Congestion Mitigation and Air Quality Improvement (CMAQ) Program. In addition, the Department of Energy's Clean Cities program provides funding for fueling infrastructure, and some states have similar programs. Until recently, the operation of battery electric buses in U.S. cities was seen as a long-term prospect because of their relatively high cost, range limits, and recharging infrastructure needs. But with technological improvements, public transportation agencies have begun to show interest in electric buses to replace vehicles powered by diesel and other fossil fuels. This interest is especially strong in metropolitan areas with air quality problems. The Federal Transit Administration (FTA) provides substantial support to transit agencies to purchase buses. Federal funds can be spent on most types of bus technology; the choice of technology is up to the transit agency concerned. Transit buses typically operate over short distances with fixed routes and frequent stops. In 1996, 95% of the buses in service were powered by diesel fuel ( Figure 3 ). More recently, transit agencies have integrated buses fueled by compressed natural gas (CNG), liquefied natural gas (LNG), and biodiesel into their fleets. Since the end of the last recession, the share of lower-emission hybrid busesâincluding diesel buses with electric motorsâhas also increased, rising from just under 5% of buses in use in 2009 to nearly 15% in 2016. Diesel-electric buses are powered by both an electric motor and a smaller-than-normal internal combustion engine; regenerative braking systems store energy from use of the bus's mechanical systems, giving the bus greater range. The purchase price of hybrids is less expensive than a fully electric bus, and hybrids reduce emissions compared to conventional diesel buses. There were 300 battery electric buses in operation domestically at the end of 2017, less than 0.5% of the 65,000 buses in public transit agencies' fleets. However, the two biggest transit bus systems in the United States, Los Angeles Metro and New York City Transit, have announced plans to move to zero-emission bus fleets, most likely using battery electric buses, by 2030 and 2040, respectively. Electric buses are typically expensive to purchase, costing as much as $300,000 more than conventional diesel buses, and require additional investment to build recharging infrastructure. On the other hand, electric buses are quieter than internal combustion engine vehicles, may have lower operating costs due to the absence of engines and transmissions requiring maintenance, and have low or zero direct emissions. The range an electric bus can travel on one charge has in the past been a limiting factor, but newer models can travel more than 200 miles, still short of the 600-mile or more range that conventional and other alternative fuel buses can travel. A study by Carnegie Mellon University found that when social costs, such as the health effects of diesel emissions, are taken into account, battery electric buses have lower total annualized costs than conventional diesel buses over the typical 12-year life cycle of a transit bus. Electric buses are generally eligible for FTA funding under several programs, including the Bus and Bus Facilities Program. One discretionary component of the FTA bus program is the Low or No Emission Vehicle (Low-No) program, which provides funding to state and local authorities for the purchase or lease of zero-emission and low-emission transit buses as well as acquisition, construction, and leasing of required supporting facilities. Electric buses are purchased through the Low-No bus program; mandatory spending of $55 million per year through FY2020 was authorized in the FAST Act. An additional $29.5 million was appropriated for FY2018. School buses generally have diesel engines, and they are primarily funded locally. FTA does not fund school buses, but the Environmental Protection Agency (EPA) administers the School Bus Rebate Program, which assists school districts in reducing diesel emissions. In 2017, nearly $9 million was provided to replace diesel buses with diesel-electric hybrids. In the 116 th Congress, some legislative proposals would support vehicle fleet electrification, including transit buses. The Green Bus Act of 2019 ( H.R. 2164 ) would require that any bus purchased or leased with funds provided by the Federal Transit Administration for public transportation purposes be a zero-emission bus. The Federal Leadership in Energy Efficient Transportation (FLEET) Act ( H.R. 2337 ) would authorize the U.S. Postal Service to enter into energy savings performance contracts to purchase or lease low-emission and fuel-efficient vehicles (including electric vehicles) and to construct or maintain infrastructure, including electric vehicle charging stations, among other provisions. Â  The following policies were generally established for purposes not directly related to vehicle electrification, but they have dimensions that may support that goal. In 2016, Volkswagen Group reached a number of legal settlements concerning violations of the Clean Air Act. As part of its settlement terms, Volkswagen pledged to invest $2 billion over a 10-year period in zero-emissions vehicle infrastructure and education in select U.S. cities through its Electrify America initiative. Of that amount, $800 million is to be spent in California. As an additional condition, Volkswagen was also required to fund a $2.7 billion national Environmental Mitigation Trust, funds from which are available to states and other beneficiaries for mitigating the negative impacts of the excess diesel emissions that were released by Volkswagen's noncompliant vehicles. States could choose to spend some of this special funding on bus electrification, including school buses. The first motor vehicle fuel economy standards were enacted in 1975 in response to the oil embargo of 1973-1974 (Energy Policy and Conservation Act of 1975; P.L. 94-163 , as amended). The National Highway Traffic Safety Administration (NHTSA) sets and enforces the Corporate Average Fuel Economy (CAFE) standards for passenger cars and light trucks, which were most recently legislatively set in the Energy Independence and Security Act of 2007 ( P.L. 110-140 ) at 35 miles per gallon (mpg) by 2020. Because EPA has authority to regulate greenhouse gas (GHG) emissions, it joined with NHTSA during the Obama Administration to promulgate new, stricter combined CAFE/GHG standards for motor vehicles. These new standards established targets for reduced GHG emissions and rising CAFE fuel economy of nearly 50 mpg by model year (MY) 2025. Electrification was seen as one means of reaching the new CAFE/GHG targets. The Trump Administration has proposed to leave the current CAFE/GHG standards in place through model year 2026, based on its analysis that economic and technological factors have changed since the standards were put in place in 2010. EPA asserted in April 2018 that the goals established for MY2026 could be achieved only with more extensive vehicle electrification than now anticipated, and rejected previous EPA determinations that EV sales in future years would grow rapidly enough to enable automakers to comply with the MY2022-MY2025 standards: \"Based on consideration of the information provided, the Administrator believes that it would not be practicable to meet the MY 2022â2025 emission standards without significant electrification and other advanced vehicle technologies that lack a requisite level of consumer acceptance.\" Fully autonomous passenger vehicles hold the potential for safer transportation and new mobility for the elderly, the disabled, and those who cannot afford to purchase a car. The projected timeline for emergence of fully autonomous vehicles varies from several years to several decades. It is often assumed that autonomous vehiclesâincluding those providing ride-sharing servicesâwill employ electric motors instead of internal combustion engines, but that assumption is based on the types of federal and state policies that are put in place. In the absence of policies favoring EVs, future autonomous vehicles could be powered by fossil fuels. There are several reasons why electrification may not be the ultimate choice for autonomous vehicles. Analyses by Ford and Volvo have for the following reasons led them to retain internal combustion engines for their ride-sharing ventures for the present: Expense and I nconvenience . Electric vehicles remain expensive compared to conventional vehicles, and many models have short driving ranges and long refueling times. Shared vehicles, which may be on the road for many hours a day, magnify these shortcomings. Battery L ife . Frequent use of battery fast charging is known to lead to faster degradation of the battery. Energy- I ntensity . Autonomous vehicles rely on energy-intensive technologies. It has been estimated that operation of an autonomous driving system for two hours in an electric vehicle could use as much as 10% of its stored energy before the vehicle moves, requiring even more frequent recharging. These drawbacks are countered by the following factors that could make electrification of autonomous vehicles the more attractive power source: Compatibility . The extensive use of computers and sensors in autonomous vehicles may be easier to embed in electric vehicles, which have fewer mechanicalâand more electronicâparts than a conventional vehicle. Operability . Electricity is generally less expensive than gasoline or diesel, and maintenance costs for electric vehicles, with many fewer parts, may be considerably lower. Emissions . The power demands of autonomous vehicle equipment and computers will reduce the fuel economy of gasoline and diesel vehicles and increase emissions. It has been estimated that increased power requirements will increase emissions from combustion vehicles by over 60 grams of CO 2 equivalent per mile, equal to reducing fuel economy of a 35 mpg vehicle to 29 mpg. Switching to electricity would diminish the direct emissions. Acceptance of electric vehicles and related infrastructure is affected by legislation, regulations, and policies adopted by state agencies and electric utilities. Incentives vary widely from state to state. The National Conference of State Legislatures tracks vehicle and charger incentives on a state-by-state basis. Forty-five states and the District of Columbia currently offer incentives for certain hybrid or electric vehicles, or both. Those incentives include permitting solo drivers of electric and hybrid vehicles to use high-occupancy (carpool) lanes, income tax credits and rebates for the purchase of an electric vehicle, reduced registration fees, parking fee exemptions, excise tax and emission test waivers, and income tax credits for installation of a home or business charger. These incentives have been found to vary in their effectiveness. Several analyses have shown that tax incentives for electric vehicles and infrastructure are the \"dominant factors in driving PEV adoption.\" Rebatesâwhich happen at the point of sale or within a short time after a vehicle purchaseâhave been identified as the most effective incentive because their value is clear to buyers at the time of a vehicle transaction. The California Air Resources Board (CARB) adopted low-emission vehicle regulations in 1990, requiring automakers to sell light vehicles in that state that meet progressively cleaner emissions standards. As part of these emission regulations, CARB also established the Zero-Emission Vehicle (ZEV) program, which requires automakers to offer for sale the lowest-emission vehicles available, with a focus on battery electric, plug-in hybrid electric, and hydrogen fuel cell vehicles. The number of ZEVs each automaker is required to sell is based upon its total light-vehicle sales in California. CARB has set ZEV sales percentages through a vehicle credit system, increasing annually to 2025. Nine other states have adopted the California ZEV regulations. The states affected by the regulations represent over one-third of all U.S. new light vehicle sales. Electric utilities, which are regulated by the state in which they are located, are in a unique position as the primary providers of electricity to aid in integrating EVs into the grid. Utilities can provide incentives to consumers to charge EVs during off-peak hours when there is excess generation. Utilities may also be in the position to install public electric charging infrastructure, assuming that there are no limits on their owning these assets. Many of the barriers utilities face with respect to electrification infrastructure are regulatory, and the role of tax policy in addressing such barriers may be limited. Sluggish growth in energy demand has posed a challenge for the electric utility sector. The industry has recognized EVs as an opportunity for growth. For this reason, electric utilities may have their own market-based incentives (absent federal intervention) to invest in EV infrastructure and take measures to support consumer EV adoption. Further, electric utilities may support extending current-law vehicle and infrastructure tax credits. At the same time, preparing the grid for a surge in electric car ownership could require substantial capital investments, if peak demand is increased. A number of challenges are associated with providing tax incentives to utilities that provide EV infrastructure. While 65% of electricity customers across the United States are customers of investor-owned utilities, most other users purchase electricity from cooperatives or municipal power providers. There are limited options for providing a direct federal tax benefit to cooperative or municipal utilities that do not pay federal income taxes. Further, in many states customers may purchase electricity from competing suppliers and pay the local electric utility for delivering it. A tax incentive to provide EV infrastructure might be made available only to utilities, to other electricity suppliers, or to both. Applicability of such an incentive would vary according to state policies or the type of utility. State regulatory commissions typically establish prices or rates that allow utilities to earn a rate of return that the regulator determines to be reasonable. This rate of return is fixed, such that additional tax incentives do not necessarily increase the return that a utility can realize. Federal taxes are an operating expense. In some states, tax incentives that reduce utilities' operating expenses result in lower rates for electricity customers (not higher returns for utilities). Hence, federal tax incentives may provide a limited near-term incentive for utilities to increase capital spending on EV infrastructure. In the United States, the sale of electricity is governed by many different federal, state, and local regulations. When it comes to the sale of electricity for the purpose of charging EVs, the states generally have regulatory jurisdiction over retail electricity transactions, though federal and municipal authorities may also play a role. State approaches to regulation vary considerably. Rules and regulations governing the retail sale of electricity generally originate with a state public utility commission. An electric utility is defined in federal law as any person, state, or federal agency \"which sells electric energy.\" This definition could potentially be interpreted to mean that electric vehicle charging station operators are electric utilities by virtue of the fact that they sell electricity, and are therefore subject to all laws, requirements, and regulations pertaining to electric utilities. Should charging station operators be subject to regulation as electric utilities, or is regulatory reform necessary to accommodate this new class of electricity transactions? Faced with the question of whether or how to regulate the operators, states have taken a variety of approaches: Some states have issued new guidelines or regulations that define the requirements for regulated utilities to operate charging stations. For example, some states (e.g., Oregon) allow existing regulated utilities to invest in and operate EV charging stations as separate, nonregulated ventures. Others (e.g., Texas) have effectively limited the operation of charging stations to electric distribution utilities by requiring operators to meet high technical and financial standards. Still others (e.g., Kansas) have prevented electric utilities from owning and operating charging stations altogether. Other states (e.g., New York) have exempted charging station operators from public utility regulations. This leaves questions as to which regulatory agency, if any, is responsible for regulating the charging station operators, as well as whether additional regulation is needed in order to ensure fair market practices. Finally, some states have refrained from taking action altogether. Without regulatory changes, private charging station operators in these states may be subject to regulation as a utility by the state's public commission. Lack of clarity about how operators will be regulated is seen by some as an impediment to the spread of the technology in these states. In some cases, EV service providers have avoided regulation as a utility by providing charging services for free, or by charging customers by the minute rather than by the amount of electricity used. Whether public utilities or private companies may operate electric vehicle charging stations and whether station operators are subject to regulation as a utility may affect deployment of EV charging infrastructure. State jurisdiction over retail electricity transactions may limit the potential role of the federal government in regulating the provision of EV charging services. An additional consideration is the potential for electric vehicle batteries to be used for storage, referred to as vehicle-to-grid (V2G) storage. V2G storage would allow idle vehicle batteries to be used for grid services, such as demand response. The batteries could reduce vehicle owners' electricity demand during peak periods or provide electricity to the grid during peak periods in response to time-based rates or other financial incentives. In the United States, utilities are beginning to test V2G performance in demonstration projects. In addition to technology, other identified challenges include regulation, market, and end-user acceptance.", "summary": "Most of the 270 million cars, trucks, and buses on U.S. highways are powered by internal combustion engines using gasoline or diesel fuel. However, improvements in technology have led to the emergence of vehicle electrification as a potentially viable alternative to internal combustion engines. Several bills pending in the 116 th Congress address issues and incentives related to electric vehicles and charging infrastructure. Experience with fully electric vehicles is relatively recent: While a few experimental vehicles were marketed in the United States in the 1990s, the first contemporary all-electric passenger vehicles were introduced in 2010. Since then, newer models have increased the range an electric vehicle can travel on a single charge, and charging stations have become more readily available. These developments have been spurred by a range of government incentives, both in the United States and abroad. Transit buses are the fastest-growing segment of vehicle electrification in China, while in the United States and the European Union, the pace of bus electrification is slower. In the United States, federal incentives for electric passenger vehicle purchases have remained largely unchanged for more than a decade and are based primarily on tax credits for electric vehicle purchases and recharging infrastructure investments, and spending on battery chemistry research to develop less-expensive technologies: The plug-in electric tax credit permits a taxpayer to take a credit of up to $7,500 for each vehicle that can be recharged from the electricity grid; it phases out after a manufacturer has sold 200,000 eligible vehicles, a threshold that has been met by Tesla and General Motors. A tax credit for installation of alternative fuel vehicle refueling property expired in 2017; it had allowed a tax credit of $1,000 for equipment installed at a residence and up to $30,000 for business installations. I nvestment in transportation electrification research and development (R&D) , which has led to the gradual reduction in the cost of producing lithium-ion batteries, is administered by the U.S. Department of Energy (DOE) in cooperation with private industry. Although the Trump Administration has recommended large reductions in these programs, Congress has maintained annual funding for sustainable transportation of nearly $700 million in the past two fiscal years. Other programs that directly influence the level of vehicle electrification include the DOE Clean Cities Program, which supports local efforts to reduce fossil fuel-powered transportation, and the Department of Transportation's Alternative Fuel Corridors, which are designated Interstate Highway corridors with a sufficient number of alternative fueling stations, including electric vehicle chargers, to allow alternative fuel vehicles to travel long distances. The federal government also funds municipal transit bus electrification through Federal Transit Administration grants, which may be used for the purchase of all-electric buses. The pace of electrification also may be affected by proposals for less stringent federal standards for Corporate Average Fuel Economy (CAFE) and greenhouse gas emissions from vehicles. Beyond these federal programs, states and electric utilities provide a range of incentives for electrification. The National Conference of State Legislatures reports that 45 states and the District of Columbia offer incentives such as income tax credits for electric vehicle and charger purchases, reduced registration fees, and permitting solo drivers of electric vehicles to use carpool lanes. The California Zero Emission Vehicle program is spurring sales of electric vehicles in 10 states. Utilities can provide incentives to charge during off-peak hours, install public electric charging infrastructure, and utilize vehicle-to-grid (V2G) storage. V2G storage would allow idle vehicle batteries to supply electricity to the grid rather than drawing power from it during peak demand periods.", "document_type": "crs"}
{"report": "The Strategic Petroleum Reserve (SPR), the world's largest supply of emergency crude oil, has played a role in U.S. energy policy for over 40 years. The SPR's focus has evolved as conditions in the U.S. and world oil markets have changed. As created, the SPR's purpose was to \"diminish the vulnerability of the United States to the effects of a severe energy supply interruption, and provide limited protection from the short-term consequences of interruptions in supplies of petroleum products.\" Additionally, as a signatory to the International Energy Program (IEP) agreement, the United States is obligated to maintain strategic petroleum stock holdings in preparation for a coordinated response during an emergency. Due to changes to the oil market over the past several years, the role of the SPR may be of congressional interest. From the mid-1970s through the present day, the United States has absorbed a number of significant spikes in the price of crude oil and petroleum products from supply disruptions. Whether driven by disruptions in the physical supply of petroleum, unexpected demand growth, or by uncertainties owing to international conflicts and instabilities, oil price volatility has had consequences for the U.S. economy. The price of crude oil historically rises or falls with the world economy. However, supply generally does not smoothly follow demand, and numerous factors can impact crude oil prices (e.g., supply, demand, available supply, value of the dollar, geopolitical risks). Thus, oil prices can be volatile. Volatility in crude oil prices can disrupt or enable oil industry investments and productionâfactors that can have a ripple effect on the global economy. The oil market also responds to geopolitical events. Crude oil and petroleum products are globally traded commodities and as such, global price fluctuations affect U.S. prices and the economy. Several signs suggest an oil market that may be better equipped to respond to supply disruptions: a trend in lower crude oil prices beginning in 2014, the role of Organization of the Petroleum Exporting Countries (OPEC), new U.S. capacity in the market, and evolving consumption patterns. Technological advancements employed in the United States have added significantly to U.S. crude oil production. In December 2015, Congress lifted restrictions on U.S. crude oil exports. The United States is exporting crude oil at record levels, causing U.S. crude oil and petroleum product net imports to decline. According to U.S. Energy Information Administration (EIA) data, the United States was a net exporter of crude oil and petroleum products from September 2019 through January 2020, the most recent data. However, oil markets remain volatile. An oversupplied oil market, as experienced in early 2020, can contribute to lower crude oil prices. While low crude oil prices can often mean lower gasoline prices for consumers, it also can create economic challenges for oil producers and others along the supply chain, some of which may lead to long-term impacts. During a time of oversupply and low prices, some policymakers have discussed the possibility of having the Department of Energy (DOE) purchase crude oil to increase oil stockpiles in the SPR. However, such a purchase would require appropriations from Congress. The creation of the SPR came about because of events during the 1973 Arab-Israeli War. The Organization of Arab Petroleum Exporting Countries (OAPEC) reduced crude oil production and imposed an embargo on the United States and other countries supporting Israel. While some Arab crude oil did reach the United States, the average actual nominal price of imported crude oil tripled from 1973 to 1974. Petroleum, a globally traded commodity, is subject to international demand and supply conditions; in the absence of additional regulations, a petroleum-consuming nation pays the market price for petroleum, even in a supply emergency. However, the availability of strategic stocks can help mitigate the magnitude of the market's reaction to a crisis or guarantee supply to certain consumers (e.g., the military, strategic industries). Congress's motivation in creating the SPR focused on a deliberate and dramatic physical supply disruption and on mitigating the economic effects of a shortage stemming from international events. In the event of a supply interruption, proponents reasoned that introducing petroleum into the U.S. market from the SPR could offset the lost supply and in doing so help calm markets, mitigate sharp price spikes, and reduce economic disruptions. Congress did not necessarily design the SPR to provide price support in the event of an oversupplied market. However, 42 U.S.C. Â§6240 does authorize the Secretary of Energy to acquire crude oil for the SPR with the objective of minimizing costs, so long as there are appropriated funds to do so. The OAPEC embargo fostered the establishment of the International Energy Agency (IEA). The IEA develops coordinated plans and measures among member countries for emergency responses to energy crises. Strategic reserves are one of the policies included in the agency's International Energy Program (IEP) agreement. Signatories to the agreement, including the United States, are committed to maintain petroleum stocks equivalent to 90 days of their prior year's net imports, developing programs for demand restraint in the event of emergencies, and agreeing to participate in allocation of oil deliveries to balance a shortage among IEA members. Net-exporting members do not have a stock-holding obligation. These measures of days of protection assume a total curtailment of oil supply to importing nations, a scenario that is highly unlikely. IEA member countries can meet the 90-day obligation through a combination of stock holdings by industry, a separate agency, and the government. Numerous oil industry firms hold commercial stocks of crude oil at refineries, bulk terminals, and in pipelines. The purpose of these stocks is to ensure the continuous operation of the refining industry, which transforms crude oil into petroleum products used by consumers. In the United States, commercial stocks do not necessarily provide a level of security proportional to that of the SPR, as they are inherently market driven, not government operated. Companies may have an economic rationale to lower commercial stocks in spite of a security context. In some other countries, this may not necessarily be the case, as the government may own or be the major shareholder in the oil companies (e.g., Equinor in Norway), also known as national oil companies (NOCs). NOCs operate under government ownership or are under the influence of national governments. In response to the embargo, and to fulfill IEP obligations, Congress authorized the creation of an SPR in 1975 under the Energy Policy and Conservation Act (EPCA, P.L. 94-163 ). In 1975, U.S. crude oil production averaged at 8.3 million barrels per day, while U.S. consumption of petroleum was nearly double, at 16.3 million barrels per day. The EPCA originally established the SPR to hold up to 1 billion barrels of \"petroleum products,\" defined in 42 U.S.C. Â§6202(3) as \"crude oil, residual fuel oil, or any refined petroleum product (including any natural liquid and any natural gas liquid product).\" Congress intended the SPR to help prevent or mitigate a repetition of the economic disruption that the 1973 Arab embargo had caused. The U.S. federal government, through the U.S. Department of Energy (DOE), manages the SPR. According to IEA data for January 2020, the SPR held emergency petroleum stocks equivalent to approximately 274 days of the previous year's net imports and U.S. industry had 423 days' worth of commercial stocks, for a total of around 697 days of net imports when combined, well above the IEA obligation. The SPR's current capacity is physically limited to 713.5 million barrels, with current inventory at about 635 million barrels. In 1975, EPCA required that the SPR provide enough storage for at least 150 million barrels of petroleum and up to 1 billion barrels. In 1978, Congress authorized an expansion of the SPR's physical capacity to 750 million barrels, and in 2005 directed further expansion to the authorized 1 billion barrels. Advocates for expansion argued that the SPR would need to be larger for the United States to be able to maintain stocks equivalent to 90 days of net imports. At this time the United States was viewed as a growing importer of crude oil. In 2005, DOE evaluated several sites in the Gulf Coast as a possible location for an additional 160 million barrels of new capacity. However, oil produced using hydraulic fracturing and horizontal drilling techniques started coming to market in significant amounts in 2010. In FY2011, the Obama Administration cancelled SPR expansion plans, citing a U.S. Energy Information Administration (EIA) projection that, \"U.S. petroleum consumption and dependence on imports will decline in the future and the current Reserve's projection will gradually increase to 90 days by 2025.\" EPCA authorizes use of the SPR to hold stocks of crude oil or any refined petroleum product. However, the SPR only holds crude oil. It does not hold refined petroleum products, as some other countries' reserves do. According to DOE, this decision was based on findings from an analysis conducted in preparation for the 1977 SPR Plan. The findings suggested that then, as now, the United States had sufficient domestic refining capacity to meet domestic demand. The SPR could also buy time for the crisis to resolve or for diplomacy to seek some resolution before a potentially severe oil shortage escalated the crisis. Additionally, according to DOE, petroleum products are less flexible and degrade more quickly as compared to crude oil. Further, U.S. import dependency recently has largely been on crude oil, not petroleum productsâthe United States has been a net exporter of petroleum products since late 2010. As a result, potential supply disruptions would most likely affect the United States through the disruption of crude oil, and not necessarily petroleum products. Generally, two key characteristics, density (i.e., specific gravity) and sulfur content, are the metrics used to classify crude oil types. The density is measured using API gravity, a scale developed by the American Petroleum Institute, that expresses the \"lightness\" or \"heaviness\" of crude oils on an inverted scale (i.e., the lower the API gravity, the heavier or denser the crude oil). The SPR does not contain heavy crude oil (i.e., crude oil with an API gravity below 22.3 degrees). Sulfur content of crude oil is generally rated on a scale of \"sweet\" to \"sour\"âsour crude oils have a higher sulfur content compared to sweet crude oils. The SPR contains both sweet and sour crude oils. Should the prospect of releasing SPR oil arise, the relevant question may be whether to release sweet or sour crude oil to the market. For example, in 2011, President Obama ordered a sale of 30 million barrels of light sweet crude oil to offset a curtailment in Libya's production of a similar crude during the First Libyan Civil War. In other situations, it may be more strategic to release heavier crude, as most U.S. Gulf Coast refineries are optimized to process heavy crude. The SPR physically comprises four sites, two in Texas and two in Louisiana. The sites offer access to both marine terminals and pipeline systems needed for moving crude oil to and from the SPR ( Figure 1 ). Crude oil at each site is stored in salt caverns created within naturally occurring geologic salt deposits along the coast. According to DOE, these sites provide a higher level of security and affordability, compared to other options such as above-ground tanks or rock mines. A life extension program (LEP I), initiated in 1993, cost $324 million and addressed essential improvements to ensure drawdown capability across the four sites. While LEP I did address its objective of assuring maximum rate for drawdown capability, it did not address significant equipment needs across the systems. In 2015, a second life extension program (LEP II) began upgrading equipment at the four SPR sites. The SPR has a maximum drawdown rate of roughly 4.4 million barrels per day for 90 days (396 million barrels over the 90-day period) due to capacity constraints in the pipelines and marine terminals servicing the reserve. After 90 days, the rate would begin to decline as the caverns deplete. According to DOE, the crude oil takes about 13 days from a presidential decision to enter the market, due to processing sales and preparation for distribution assets. The first major drawdown was in early 1991 (the Persian Gulf War). During the Persian Gulf War the peak lost production was around 4.3 million barrels per day of combined Iraqi and Kuwaiti crude oil. Refilling the SPR after an ordered drawdown remains at presidential discretion. This might be done at a time when the price of crude oil declines, or political and market conditions make it economically advantageous to do so. For example, to replace inventories sold in 2005 in response to Hurricane Katrina, DOE purchased crude oil on the open market in 2009. More recently, DOE purchased crude oil in 2015 to refill sold inventory during the 2014 test sale. The IEA obligates its members to hold a 90-day supply equivalent to net imports. The SPR infrastructure has a drawdown maximum of 396 million barrels over a 90-day period. If the U.S. obligation (previous year's net imports) were to exceed 396 million barrels, it could not draw it all down within 90 days. As long as the supply disruption remains below the maximum drawdown rate and others (countries or industry) are able to supply the market, there may not be cause for concern. Alternatively, Congress could authorize an expansion of SPR infrastructure to increase the maximum drawdown rate. Authority for drawdown and sale of petroleum from the SPR is codified into law under 42 U.S.C. Â§6241. There are several authorized reasons to release oil from the SPR. Presidential authority to authorize a drawdown depends on (1) making the determination that a severe energy supply interruption exists or (2) a finding that a drawdown would prevent an impact of a severe domestic supply disruption. Further, IEP obligates the United States to join in an IEA-coordinated response to a supply disruption. Other sales have been authorized for various reasons including to generate revenue to reduce the budget deficit, to test the functionality of the SPR, and to fund the modernization of the SPR. Additionally, authorities exist for the acquisition of crude oil to fill the SPR, and the option for exchanges in specific scenarios outlined below. Once a drawdown is authorized, DOE releases SPR oil by conducting a public sale to the highest bidder in a competitive auction. DOE publishes a \"notice of sale\" that includes the volume, characteristics, and location of the petroleum for sale; delivery dates and procedures for submitting offers; and measures for assuring performance and financial responsibility. Bids are reviewed by DOE and awards offered. DOE estimates that oil could enter the market roughly two weeks after the appearance of a notice of sale. Through 2019, the SPR released over 230 million barrels for various purposes ( Figure 2 ). Presidents have ordered releases on three occasions, some 58.9 million barrels in total, in response to severe energy supply interruptions in coordination with other IEA member countries. The SPR has also provided exchanges totaling around 75 million barrels through 2019 to mitigate temporary supply interruptions. The borrowers repay their loans by replacing the crude oil plus an additional smaller volume as a premium. The SPR has had three test sales. In 2014, DOE initiated a test sale to determine if recent infrastructure changes could impact the SPR's drawdown capabilities and to exercise sales procedures. The test ran successfully with some lessons learned, including some pipeline and storage capacity limitations. A number of other sales reached around 88 million barrels through 2019 were authorized for various reasons (e.g., to generate revenue to reduce the budget deficit as well as to modernize the SPR). The 1975 EPCA authorizes drawdown of the SPR by obligation under the IEP or upon a finding by the President that there is a \"severe energy supply interruption.\" Codified in law under 42 U.S.C. Â§6241(d)(2), such an interruption exists when the President determines that A. An emergency situation exists and there is a significant reduction in supply which is of significant scope and duration; B. A severe increase in the price of petroleum products has resulted from such emergency situation; and C. Such price increase is likely to cause a major adverse impact on the national economy. One recent example of a coordinated IEA release occurred in 2011 to offset a curtailment in Libya's supply of crude during the First Libyan Civil War. The IEA announced a total release from all member countries of 60 million barrels. In accordance with IEA obligations and as directed by the President under the authority of 42 U.S.C. Â§6241(d)(2), the U.S. Department of Energy Secretary Chu announced a sale of 30 million barrels from the SPR. In 1990, Congress amended EPCA via P.L. 101-383 to extend SPR drawdown and sales in the event of a domestic supply interruption. In 1989, the Exxon Valdez oil spill interrupted the shipment of Alaskan oil, triggering spot shortages and price increases. The amendment expanded authorities under EPCA by providing options for an SPR drawdown to prevent or reduce the impact of a severe domestic supply interruption if the President finds that A. a circumstance, other than those described in subsection (d), exists that constitutes, or is likely to become, a domestic or international energy supply shortage of significant scope or duration; B. action taken under this subsection would assist directly and significantly in preventing or reducing the adverse impact of such shortage; C. the Secretary has found that action taken under this subsection will not impair the ability of the United States to carry out obligations of the United States under the international energy program; and D. the Secretary of Defense has found that action taken under this subsection will not impair national security. This authority limits the Secretary of Energy to selling no more than 30 million barrels of SPR petroleum over a maximum 60-day period. Additionally, the authority permits a drawdown only when the SPR inventory is above 340 million barrels. Under 42 U.S.C. Â§6241(g), the Secretary of Energy is authorized to test a drawdown and sale or exchange from the SPR to conduct an evaluation of the procedures. Tests have a maximum limit of up to 5 million barrels. Under law, the Secretary of Energy determines the appropriate sale price and it may not be at a price less than 95% of comparable crude oil sold at the time. The statute requires the Secretary of Energy to notify Congress 14 days before a test. Since 1975, the Secretary of Energy has had several authorized methods to acquire petroleum for the SPR: direct purchases, royalty-in-kind transfers (RIK), deferrals and exchanges, or other means. The Secretary of Energy is authorized specific powers (including oil acquisition) outlined in 42 U.S.C. Â§6239 in order to maintain and operate the SPR. Initially, through an interagency agreement, the Department of Defense, on behalf of DOE, acquired crude oil for the SPR using appropriated funds to meet congressionally mandated target fill rates until those funds were exhausted. By December 1994, the SPR had been filled to 591.7 million barrels. Purchases for the SPR were then suspended to divert funds to SPR maintenance and life extension. Starting in 1999, filling of the SPR resumed via an RIK program. As an alternative to appropriated funds, DOE proposed accepting transfers of a portion of the royalty payments collected by the Department of the Interior (DOI) for Gulf of Mexico crude oil leases in the form of RIK crude oil rather than as revenues. While RIK avoided the necessity of making outlays for purchasing crude oil, it equivalently reduced royalty revenues by settling obligations in oil rather than in payments to the U.S. Treasury. In mid-November of 2001, President George W. Bush ordered the SPR filled to 700 million barrels, principally through crude oil acquired as RIK. Between fiscal year (FY) 2000 through FY2007, DOI estimates that RIK deliveries totaled roughly $4.6 billion. In 2009, Secretary of the Interior Ken Salazar announced the end of the RIK program. Additionally outlined in 42 U.S.C. Â§6240 are the various objectives and procedures for the Secretary of Energy to acquire crude oil for the SPR. Within the parameters codified into law, the Secretary may acquire petroleum products through purchase or exchange. For purchase, Congress must appropriate funds to the SPR. During an exchange (also sometimes referred to as a loan), an entity borrows SPR crude and later replaces it with a similar quality crude, \"plus payment of an in-kind premium determined according to the period negotiated for return.\" An entity can request an exchange if unexpected circumstances impede crude oil supplies and no other alternative is available. In 2015, Congress began mandating sales of SPR oil. Mandated sales direct the Secretary of Energy to sell a specified quantity of SPR oil. There are mandated quantities prescribed for specific fiscal years from 2017 through 2028. Proceeds from mandated sales are deposited into the general fund of the U.S. Treasury. Since 2015, Congress has enacted seven laws containing provisions mandating the sale of SPR oil. These mandated sales from the SPR have committed 271 million barrels of oil for sale through FY2028. Actual sales through FY2019 total 34.93 million barrels, nearly consistent with the mandated sales required by enacted legislation of 35 million barrels. In addition to mandated sales, modernization sales under various laws authorize the Secretary of Energy to draw down and sell SPR oil with sales restricted by a total dollar amount, rather than volume of oil, from FY2017 through FY2020. Proceeds from these sales are to be deposited in the Energy Security and Infrastructure Modernization Fund (ESIMF). Law requires the fund to be used for construction and maintenance of SPR facilities. Statutes that authorized SPR modernization crude oil sales, and appropriated money to the ESIMF, are for fiscal years 2017 through 2019. Congress originally created the SPR to provide security against severe petroleum supply interruptions and to adhere to IEP obligations. The SPR's role has expanded over the years as conditions in the U.S. and world oil market have changed. Today those market conditions continue to shift and as such, Congress may consider further modifications to SPR legislation. Some policy considerations include If the United States maintains net export status, should Congress reconsider the size of the SPR? Further, U.S. public and commercial oil stocks are well over the 90-day IEP obligation. However, some view the oil in the SPR as a national security asset that the United States should maintain at current levels. Releases from oil reserves tend to balance supply disruptions in the short term and provide psychological support to the market that may stabilize oil prices. Should Congress consider expanding the role of the SPR to provide economic security by alleviating extreme price volatility? Given the change in conditions, Congress may consider different options for utilizing the SPR. The section that follows discusses some of these developments and possible policy options. The role of the United States in the global oil market has shifted since the 1970s during a time of rapidly rising prices and perceived resource scarcity. In addition to creating the SPR, Congress, through the EPCA, restricted U.S.-produced crude oil exports. Trade policy with respect to oil has undergone significant changes in recent years to accommodate technological and market developments. As the U.S. oil market moved toward higher production levels, some policies have come into question. Consequently, in December 2015, Congress passed the Consolidated Appropriations Act, 2016 ( P.L. 114-113 ) which repealed Section 103 of EPCA ( P.L. 94-163 ), removing any restrictions to crude oil exports. Net-exporters of oil do not have a stockholding obligation under the IEP. Some have noted that with the reduction of net imports, the size of the SPR could be reconsidered. For similar reasons to lifting restriction on crude oil exports, and with the relatively recent increases in domestic crude oil production, some stakeholders see less need for an oil stockpile. They contend the change in oil markets warrants a reduction in the size of that stockpile. U.S. crude oil and petroleum product imports have been in decline. The EIA reports that in September 2019, the United States exported 89,000 million barrels per day more crude oil and petroleum products than it imported. The EIA further projected that, in most forecasts, the United States will be a net petroleum exporter on an annual basis around 2020. However, even if the United States reaches net export status, EIA and IEA projections indicate that the United States may return to a net importer between 2040 and 2050. Some contend maintaining the stockpile has value, regardless of net export status. For instance, Keisuke Sadamori, IEA's Director for Energy Markets and Security, testified during a Senate hearing in 2019, oil security is not only an issue for net-importers, and security concerns such as regional extreme weather events and terrorist attacks can affect all countries. In a global market, even in net exporting countries, oil consumers will be economically harmed by spiking oil prices, and if a disruption tips the world economy into recession, the pain will be felt by exporting and importing countries alike. Finally, the United States is not guaranteed to remain a net exporter indefinitely. In May 2018, the Government Accountability Office (GAO) released a report on the future of the SPR analyzing DOE's planning approach. GAO recommended that DOE should expand or amend their planning approach to include \"an additional analysis that takes into account private-sector response, oil market projections, and costs and benefits of a wide range of different SPR sizes.\" Additionally, market conditions may be changing. Since January 2020, oil prices have fallen due to of a number of factors including overproduction and constrained demand, largely due to a reduction in travel from the COVID-19 pandemic. Prolonged periods of depressed prices could affect U.S. oil production, exports, employment, and industry consolidation. If U.S. production and subsequently exports were to decline, the prospect of the United States becoming a net exporter may be delayed or eliminated. IEA members can use both public and commercial stocks to meet their 90-day obligation. In January 2020, the United States had 423 days of net imports of commercial crude oil stocks, equaling around 697 days when combined with SPR stocks, according to IEA methodology. Both public and privately held oil stocks have important roles to play in providing security in times of oil market disruptions. Similarly, both public and private oil stocks have some role in oil price determination and movements. As the world oil market and the U.S. market evolve, it is reasonable to reassess the role of each of these components of U.S. energy security. Management of commercial stocks can affect the price of oil in multiple ways. These effects are limited by the storage capacity of the system as a whole, but that capacity can be augmented or reduced. Numerous oil industry firms hold commercial stocks of crude oil at refineries, bulk terminals, and in pipelines. The purpose of these stocks is to ensure the continuous operation of the refining industry, which transforms crude oil into petroleum products used by consumers. Commercial oil companies are more likely to store oil for the short-term, rather than as a long-term security stock. Some experts contend that commercial stocks cannot provide a level of security proportional to that of the SPR. The role of sales from the SPR into the commercial market during a supply disruption is linked to the size of commercial stocks and the availability of additional production capacity. Generally, the level of private oil stocks closely follows the level of oil production and changes in the price of oil. If global supply is greater or less than current demand, commercial stocks of oil may rise or fall accordingly. In a market where there is no physical shortage, oil companies may have limited interest in purchasing SPR oil unless they want to build crude oil stocks or have spare refining capacity to turn the crude into useful products. Conversely, during a supply disruption, commercial stocks would likely move to market before the SPR, as DOE must solicit buyers through a Notice of Sale. Further, the SPR takes approximately 13 days from an initial decision to hold a sale to ultimate delivery of that oil. For instance, in response to the attack against Saudi Arabia's oil production in September 2019, President Trump authorized the release of oil from the SPR, as needed. In response to prior events, presidents have ordered a release in coordination with other IEA member countries. In this case, the IEA did not announce a coordinated release, but monitored the situation closely. Although the United States had the capacity to replace most of the Saudi oil taken off the market by the attack, no release from the SPR occurred as commercial stocks supplied the market and prices stabilized. Generally, according to GAO, most experts interviewed in the May 2018 report agreed that the private sector is in a better position to respond to supply disruptions than they were in the 1970s. Conversely, DOE noted in the same report that the United States does not have a requirement for the private sector to respond to a supply disruption. Further, according to GAO, DOE does not have analysis on how the private sector would respond to supply disruptions. Petroleum is a globally traded commodity and subject to international demand and supply conditions. Volatility in crude oil prices can disrupt or enable oil industry investments and productionâfactors that can have a ripple effect on the global economy. However, the storage of petroleum can provide some price relief or even alleviate a physical shortage of supply to certain consumers (e.g., the military, strategic industries). Congress's motivation in creating the SPR focused on a deliberate and dramatic physical supply disruption and on mitigating the economic effects of a shortage stemming from international events. As market conditions continue to change, Congress may consider options for utilizing the SPR in an oversupplied low oil price environment. Global oil prices declined nearly 60% between January and mid-April 2020, as a result of a number of factors. These factors included reduced demand and economic impacts related to the evolving COVID-19 pandemic, and the failure of OPEC and a group of non-OPEC countries (OPEC+), including Russia, to come to an agreement regarding oil production during their March 2020 meeting. While low oil prices are generally positive for consumers (translating into lower gasoline prices) and oil refiners (translating into lower costs), sustained low prices could result in financial stress for companies operating in the U.S. oil exploration and production (E&P) sector. Due to these recent developments, a plan to sell crude oilâas required in FY2020 by P.L. 116-94 âfrom the SPR was suspended. Discussions transitioned from selling oil from the SPR to purchasing oil to fill it to capacity. Acquiring crude oilâdirect purchases or royalty-in-kindâfor SPR storage could absorb a limited amount of market oversupply. Physical SPR capacity is approximately 713.5 million barrels, while actual inventories are 635 million barrels. At the direction of President Trump, DOE issued a solicitation to purchase an initial 30 million barrels of crude oil as part of a plan to acquire 77 million barrels. However, on March 25, 2020, DOE cancelled this solicitation, noting, \"Given the current uncertainty related to adequate Congressional Appropriations for crude oil purchases associated with the March 19, 2020 solicitation, the Department is withdrawing the solicitation. Should funding become secure for the planned purchases, the Department will reissue the solicitation.\" Whether increasing SPR inventories might contribute to oil market rebalancing is uncertain. Even if Congress appropriated funding to purchase crude oil, the SPR's available capacity is limited (currently around 77 million barrels) and the impact could be marginal depending on a number of factors (i.e., duration and volume of crude oil oversupply). However, Congress authorized the SPR to store up to 1 billion barrels. While not an immediate solution, Congress could consider appropriating funds to expand the SPR's physical capacity to the authorized 1 billion barrels. On April 2, 2020, DOE (under exchange authority 42 U.S.C. Â§6239(f)(5)) announced a solicitation for the storage of 30 million barrels in exchange for a fixed premium of barrels, returning the difference by March 31, 2021. This would allow crude oil to be temporarily stored in the SPR sites, potentially providing some financial relief to some U.S. producers. Several petroleum associations applauded the effort, stating, for example, \"The oil producers of Louisiana praise the President, his administration, and Louisiana's federal delegation for taking swift, decisive action to help support the nation's energy producers with the SPR's exchange for storage.\" However, challenges remain, as spare storage capacity at Cushing, OK (the designated delivery point for NYMEX crude oil futures contracts) is limited or unavailable. The futures price is a contract, usually monthly, for delivery of a certain amount of crude oil, on a specified date in the future, and at a particular location (Cushing, OK, for West Texas Intermediate (WTI) crude oil). As available storage becomes more limited, futures prices may continue to fall as owners of crude oil discount their price in order to entice buyers. This apparently was the case with WTI where some traders grew concerned over storage availability in Cushing, forcing some to sell their futures contracts. Despite federal efforts to make capacity available at the SPR and other measures, Cushing storage capacity is a key factor for WTI prices. When acquiring petroleum for the SPR, the Secretary is to consider, to the extent possible, four objectives under 42 U.S.C. Â§6240. Among these, the Secretary is to minimize market impacts from purchases. Acquiring SPR crude oil to reduce oversupply and increase prices could conflict with that objective. However, the degree of impact on the market may be hard to determine, and a threshold level is not explicitly defined. Furthermore, included in DOE's objectives is to minimize the cost and presumablyâdepending on prices in March 2021 when the above noted exchange expiresâDOE's exchange could result in a comparatively low-cost petroleum acquisition. Crude oil price increases generally result from actual or anticipated market tightening; that is, an increase in demand, a reduction in supply, or both. There is a general recognition that a release from the SPR would likely only provide temporary relief from rising prices; however, high prices alone are not an authorized circumstance to trigger a release from the SPR. High prices are generally a consequence of a severe supply interruption. For instance, in 2011, the price increases were thought to be largely attributable to the loss of Libyan production during the revolution in that country. The judgment that a release of crude oil from the SPR provides some temporary relief from rising prices seems well founded. The U.S. government bases its notice of sale on the previous five-day average of the price of the grade of crude oil it intends to sell, and accepts bids it considers responsive. If the notice itself does not prompt, or contribute to, a softening of prices, there may be limited interest on the part of the oil industry in bidding on SPR supply. Although the possibility exists that prices might decline if additional refined product is released into the market, it is impossible to predict what long-term quantitative effect an SPR crude drawdown would have. For example, in response to prolonged oil supply disruption from the Libyan Civil War, the IEA coordinated a petroleum release on June 23, 2011. Following the announcement of a 30 million barrel release of oil from the SPR, the price of crude oil declined by about 5% that day. About one week later, prices began to exceed pre-announcement levels. The announcement of the SPR release stated that the oil would be delivered to market by the end of August 2011. Oil prices began to decline in that month and generally declined through September 2011. However, several other factors may have contributed to the price of crude oil. For instance, the prices of crude oil declined in May 2011 following the death of Osama bin Laden and a rise in the U.S. dollar. Some observers do not support use of the SPR to mitigate high crude oil prices. These observers prefer allowing the market to resolve itself and for government not to intervene. Further, observers may contend that market conditions and current and anticipated geopolitical events are affecting prices more than short-term physical supply concerns or that speculative bidding in the oil commodity futures market has driven price volatility more than the current supply-demand balance. In this context, use of the SPR would have limited impact on market conditions. Congress could reduce the size of the SPR and sell off excess petroleum for the benefit of other programs while still maintaining the 90-day net import requirement. However, determining the optimal level of oil holdings in the SPR is likely to remain controversial. Analytical tools common in public policy analysis, such as cost-benefit analysis, dynamic programming, or other optimization techniques, depend on determining the value of variables that are highly uncertain in this case. The responsiveness of the adjustment of oil quantities on both the demand and the supply sides of the market, the price volatility of oil, and the probabilities of different degrees of political/military disruption in the oil market are all uncertain. In addition the 90-day net import requirement is a dynamic calculation based on a combination of market factors. Bayou Choctaw The Bayou Choctaw storage site is located in Iberville Parish, LA. The site has six storage caverns, with a storage capacity of 76 million barrels, and an inventory of 71.8 million barrels, as of April 2020. The Bayou Choctaw site began full operation in 1987 and has remained operational since then. In November 2011, DOE acquired a replacement cavern for Cavern 20, after it had experienced leaching, which posed an environmental risk. Bayou Choctaw has a design drawdown rate of 0.5 million barrels per day, and a design fill rate of 110 thousand barrels per day. (The other three SPR storage sites have a combined fill rate specified as 225 thousand barrels per day.) Big Hill The Big Hill storage site is located in Jefferson County, TX. The site has 14 storage caverns, a combined storage capacity of 170 million barrels, and a cavern inventory of 143.3 million barrels as of April 2020. The Big Hill site began full operation in 1991 and has remained operational since then. Big Hill has a design drawdown rate of 1.1 million barrels per day. Section 168 of the EPCA authorizes foreign oil to be stored in unused space to increase world oil stockpiling. In 1998, the U.S. Commerce Department designated Big Hill as a special purpose Foreign Trade Zone, which exempts foreign oil storage from customs or certain taxes. DOE noted in their SPR calendar year 2016 annual report to Congress that despite this designation, Big Hill has not stored foreign oil. Bryan Mound The Bryan Mound storage site is located in Brazoria County, TX. The site has 19 storage caverns with a total storage capacity of 247.1 million barrels, and a cavern inventory of 230.2 million barrels as of April 2020. The Bryan Mound site began operation in 1986 and has remained operational since then. In 2013, after failing a Mechanical Integrity Test (MIT), one of Bryan Mound's then-20 storage caverns was determined to be at risk. It was subsequently emptied, bringing the total to 19 caverns. Pumping to transfer the oil to other caverns began in March 2015 and completed in December 2016. Additionally, in 2018, two of the three aboveground storage tanks at Bryan Mound were unusable and required maintenance. This reduces the site's drawdown rate from 1.5 million barrels per day to 1.35 million barrels per day. According to DOE's Strategic Petroleum Reserve Annual Report for Calendar Year 2018 , these tanks are to be converted to external floating roof tanks during the SPR Modernization ProgramâLife Extension 2 Project. West Hackberry The West Hackberry storage site is located in Cameron Parish, LA. The site has 21 operable storage caverns with a combined storage capacity of 220.4 million barrels, and a cavern inventory of 189.7 million barrels as of April 2020. The West Hackberry site began full operation in 1988 and has remained operational since then. In 2012, Cavern 6 had a well stability issue and plans to remove oil from the cavern were instituted. In December 2017, all accessible oil was transferred out of Cavern 6 to the other 21 storage caverns. ", "summary": "Crude oil price volatility has consequences for the U.S. and global economy. The Strategic Petroleum Reserve (SPR), the U.S. stockpile of petroleum, has played a role in U.S. energy policy for over 40 years. The need for a stockpile of petroleum to help protect against supply disruptions became apparent after the 1973-1974 Arab oil embargo, during which time the average price of imported crude oil tripled. The oil embargo also fostered the establishment of the International Energy Agency (IEA), an intergovernmental organization, and the development of coordinated plans and measures among IEA members for emergency responses to energy crises. Strategic petroleum stock holdings are one policy included in the agency's International Energy Program (IEP) agreement. As an IEA member and IEP signatory, the United States must meet certain stock holding thresholds and be prepared for a coordinated response during an emergency. In 1975, Congress passed the Energy Policy and Conservation Act (EPCA, P.L. 94-163 ) authorizing the creation of the SPR for storage of petroleum products to reduce the impact of supply disruptions and to carry out IEP obligations. The United States uses the SPR to meet its IEP requirements. The U.S. federal government, through the U.S. Department of Energy (DOE), manages the SPR. EPCA authorizes the SPR to hold stocks of crude oil or any refined petroleum product. However, the SPR currently only holds crude oil. Since 1975, Congress has enacted several laws that have expanded the role of the SPR. Through 2019, the SPR has released over 230 million barrels of crude oil for various authorized purposes. Presidents have ordered releases on three occasions in response to severe energy supply interruptions in coordination with other IEA member countries. Other sales authorized for various reasons (e.g., to generate revenue to reduce the budget deficit as well as to modernize the SPR) have reached around 88 million barrels through 2019. Three test sales have confirmed SPR operability. The Secretary of Energy has several authorized methods to acquire petroleum for the SPR: direct purchases, royalty-in-kind transfers (RIK), deferrals and exchanges, or other means. Government analysis indicates that the United States has been a net exporter of crude oil and petroleum products from September 2019 through January 2020. The IEP does not require net exporters to maintain a petroleum stockpile. IEA members can use both public and commercial stocks to meet their obligation. Both public and privately held oil stocks have important roles to play in providing security in times of oil market disruptions. Similarly, both public and private oil stocks have some role in oil price determination and movements. However, there may be benefits to maintaining SPR oil stockpiles, as the oil market can often be unpredictable, as demonstrated by dramatic demand/supply shifts and subsequent low oil prices experienced in early 2020. Several signs have suggested oil markets may be more able to adjust to supply disruptions (though not necessarily an oversupply). The changing role of the United States in world petroleum markets has driven a debate on how best to utilize the SPR. Congress's motivation in creating the SPR focused on a deliberate and dramatic physical supply disruption and on mitigating the economic effects of a shortage stemming from international events. As market conditions continue to evolve, and the United States experiences new market conditions, Congress may consider options for utilizing the SPR in an oversupplied, low oil price environment.", "document_type": "crs"}
{"report": "Social Security provides insured workers and their eligible family members with a measure of protection against the loss of income due to the worker's retirement, disability, or death. The amount of the monthly benefit payable to workers and their family members is based on the worker's career-average earnings from jobs covered by Social Security (i.e., jobs in which the worker's earnings were subject to the Social Security payroll tax). Although participation in Social Security is compulsory for most workers, about 6% of all workers in paid employment or self-employment are not covered by Social Security. Most noncovered workers are state and local government employees who are covered by alternative staff-retirement systems or permanent civilian federal employees hired before January 1, 1984, most of whom are covered by the Civil Service Retirement System (CSRS) or other alternative retirement plans. Social Security benefits are designed to replace a certain percentage of a worker's career-average earnings (referred to as the replacement rate ) for those who remain in covered employment throughout their careers. The benefit formula is weighted to replace a greater share of career-average earnings (i.e., provide a higher replacement rate) for low-paid workers than for high-paid workers. However, providing an appropriate replacement rate for beneficiaries whose careers are split between covered and noncovered employment (referred to hereinafter as split-career beneficiaries ) is challenging because years of noncovered earnings are marked as zeros in Social Security earnings records, so split-career beneficiaries appear to have low career-average earnings. Therefore, without adjusting for noncovered earnings, split-career beneficiaries would receive a higher replacement rate than beneficiaries with the same earnings who spent their entire careers in Social Security-covered employment. The windfall elimination provision (WEP) is a modified benefit formula that reduces Social Security benefits for certain retired or disabled workers who have earnings not covered by Social Security and are entitled to pension benefits based on those noncovered earnings (including certain foreign pensions). Its purpose is to remove an unintended advantage or windfall that these workers would otherwise receive as a result of the interaction between the regular Social Security benefit formula and the workers' relatively short careers in Social Security-covered employment. In December 2018, nearly 1.9 million people (or about 3% of all Social Security beneficiaries) were affected by the WEP. Some argue that the current-law WEP formula generally fails to provide the correct benefit adjustment (reduction) to affected beneficiaries. It overadjusts the benefit for some affected workers by producing a relatively large benefit reduction that gives them a lower replacement rate than similar workers whose entire careers were covered by Social Security; in contrast, it underadjusts the benefit for some other affected beneficiaries by producing a relatively small benefit reduction, giving them a higher replacement rate than similar workers whose entire careers were covered by Social Security. Legislative proposals have been introduced to substitute the current WEP with a proportional formula that would provide the same replacement rate to split-career beneficiaries and beneficiaries whose entire careers are covered. This report explains how the proportional formula would work and how it differs from the current-law WEP formula. It also discusses how Social Security benefits would change under the proportional formula for workers with different levels of earnings, years of noncovered earnings, and timing of those noncovered earnings (i.e., early career, midcareer, or late career). Lastly, this report concludes with historical and recent legislative proposals that are based on the proportional formula. Among other requirements, a worker generally needs 40 earnings credits (10 years of Social Security-covered employment) to be eligible for a Social Security retired-worker benefit. The Social Security regular benefit formula applies three replacement factorsâ90%, 32%, and 15%âto three different brackets of a worker's average indexed monthly earnings (AIME), which is the monthly average of the 35 highest years of indexed covered earnings. The result is the primary insurance amount (PIA), which is the worker's basic benefit before any adjustments are made for factors such as cost-of-living adjustments (COLAs), early retirement, delayed retirement, or noncovered earnings. For workers who become eligible for benefits in 2020, the PIA is based on the formula in Table 1 . The dollar amounts in the table, known as bend points , are adjusted annually for average earnings growth. Under current law, the WEP reduction is based on years of coverage (YOCs)âthe larger the number of YOCs, the lower the WEP reduction. For people with 20 or fewer YOCs who become eligible for benefits in 2020, the WEP reduces the first replacement factor from 90% to 40% (referred to as the WEP replacement factor in this report), resulting in a maximum benefit reduction of $480 (90% of $960 minus 40% of $960). A worker with an AIME of $1,500 who becomes eligible for Social Security benefits in 2020 would receive an unadjusted monthly benefit of $1,036.80 if all earnings are covered by Social Security, compared to a WEP-reduced monthly benefit of $556.80 if he or she has 20 or fewer YOCs (see Table 1 ). For each YOC in excess of 20, the WEP replacement factor increases by 5%. For example, the WEP factor is 45% for those with 21 YOCs and 50% for those with 22 YOCs. The WEP factor reaches 90% for those with 30 or more YOCs, and at that point it is phased out (see Figure 1 ). The amount of substantial covered earnings needed for a YOC is $25,575 in 2020; the amount is adjusted annually by average wage growth. Workers with annual covered earnings below the level of substantial earnings do not receive a YOC. For example, a worker who earns $5,640 in 2020 (covered earnings) will receive four earnings credits for the purpose of Social Security eligibility, but will not qualify for a YOC for the WEP purpose. In December 2018, of the nearly 1.9 million beneficiaries affected by the WEP, nearly 1.6 million (84%) had 20 YOCs or fewer, and the remaining 0.3 million (16%) had 21-29 YOCs (see Figure 1 ). Two groups of beneficiaries with noncovered employment are exempt from the WEP: (1) those with 30 or more YOCs; and (2) those not receiving a pension based on those noncovered earnings. SSA's Office of the Chief Actuary estimated that roughly 18 million Social Security worker beneficiaries with some noncovered earnings were exempt from the current WEP in 2018. Among them, about 9.4 million (52%) had 30 or more YOCs. Additionally, a guarantee provision in the WEP ensures that the WEP reduction cannot exceed one-half of the pension based on the worker's noncovered employment. The regular Social Security benefit formula is progressive, replacing a greater share of career-average earnings for low-paid workers than for high-paid workers. For example, Table 2 displays five types of scaled workers with hypothetical lifetime earnings from low to high, whose earnings patterns are based on actual Social Security-insured workers' career earnings. The replacement rateâthe percentage of AIME replaced by the PIAâranges from 83.3% for a very low-earning worker whose entire career is covered to 60.5% for a low-earning worker, 44.8% for a medium-earning working, 37.2% for a high-earning worker, and 29.4% for a worker who earns the taxable maximum every year. If a person has earnings not covered by Social Security, those noncovered earnings are shown as zeros in their Social Security earnings records, thus resulting in relatively lower career-average earnings. The regular formula cannot distinguish between workers who have low career-average earnings because they worked for many years at low earnings in covered employment and workers who appear to have low career-average earnings because they worked for many years in jobs not covered by Social Security. Therefore, without a PIA reduction for noncovered earnings, a worker who split his or her career between covered and noncovered employment might receive a higher replacement rate than a worker with the same level of earnings who spent an entire career in covered employment. For example, a low-scaled worker is estimated to have annual career-average earnings of $22,588. If all career earnings were covered, the worker would receive a 60.5% replacement rate in Social Security benefits. However, if the second half of the low-scaled worker's career was in noncovered employment, the worker would receive a replacement rate of 90.0% based on the regular benefit formula before adjusting for noncovered earnings (see Table 2 ). The WEP PIA addresses this problem by reducing the replacement rate for certain workers who have noncovered earnings. For example, the replacement rate would be adjusted from 90.0% to 40.0% for a low-scaled worker if the second half of his career was not covered by Social Security. The WEP's original intent was to ensure that Social Security beneficiaries with some earnings from noncovered employment received the same replacement rate as workers who spent their entire careers in covered employment. However, the current-law WEP formula can only approximately achieve that goal. The current-law WEP formula over adjust s benefits for certain affected beneficiaries by producing a relatively large benefit reduction, resulting in a lower replacement rate than a similar worker whose entire career was covered by Social Security would receive. For example, a very low-scaled worker who spent the second half of his or her career in noncovered employment would receive a replacement rate of 40.0% using the WEP formula, which is substantially lower than the replacement rate a very low-scaled worker whose entire career was covered by Social Security (83.3%) would receive. The magnitude of such benefit overadjustment is smaller for affected beneficiaries with relatively higher lifetime earnings. For example, if the second half of a high-scaled worker's career was not covered by Social Security, the worker would receive a WEP benefit replacing 34.4% of covered AIME, which is slightly lower than the replacement rate for high-scaled workers whose entire careers are covered by Social Security (37.2%). In addition, the current-law WEP formula under adjust s Social Security benefits for some other beneficiaries by producing a relatively small benefit reduction, resulting in a higher replacement rate than a similar worker whose entire career is covered would receive. Such underadjustment usually applies to workers with significantly high lifetime earnings and some earnings not covered by Social Security. For example, a taxable-maximum worker who earned the taxable-maximum amount each year of work history is estimated to have career-average earnings of $123,232. If the second half of the taxable-maximum worker's career was not covered by Social Security, the worker would receive a 33.2% replacement rate in Social Security benefits under the WEP, compared to 29.4% if the entire career had been covered by Social Security (see Table 2 ). The proportional formula for the WEP would apply the regular Social Security benefit formula to all past earnings up to the taxable maximum from both covered and noncovered employment. The resulting benefit would then be multiplied by the ratio of career-average earnings (AIME) from covered employment only to career-average earnings (AIME) from both covered and noncovered employment. By concept, the PIA under the proportional formula (i.e., proportional PIA) would be as follows: Proportional PIA=PIA for all EarningsÃAIME for Covered EarningsAIME for all Earnings In other words, a Social Security benefit would be calculated based on a worker's combined covered and noncovered earnings, but only the portion based on covered earnings would be payable as a Social Security benefit. Under the proportional formula, Social Security beneficiaries with some earnings from noncovered employment would receive the same replacement rate (ratio of PIA to AIME) for covered earnings as similarly situated workers who spent their entire careers in covered employment, regardless of earnings levels, years of covered earnings, or the timing of those covered earnings. Figure 3 illustrates this, showing that a medium-scaled worker would receive a 44.8% replacement rate under the proportional formula whether the worker's entire career or only half of the worker's career was covered by Social Security. This 44.8% replacement rate for the split-career worker would be lower than the windfall replacement rate under the regular PIA without any adjustment for noncovered earnings (60.2%), but higher than the rate under the current WEP PIA (35.9%), which overadjusts the benefit reduction for noncovered earnings. The proportional formula would provide a higher benefit than the WEP for workers whose Social Security benefits are currently overadjusted, such as the very low-, low-, medium-, and high-scaled workers shown in Table 3 . Because scaled workers with relatively lower lifetime earnings receive a larger overadjustment under the current WEP, those workers would receive a larger monthly benefit increase under the proportional formula. For example, the monthly benefit increase under the proportional formula relative to the current WEP would be $213.90 for very low-scaled workers if their careers' second halves were not covered by Social Security, compared to $182.20 for low-scaled workers, $176.50 for medium-scaled workers, and $87.10 for high-scaled workers. In contrast, workers whose Social Security benefits are underadjusted by the current WEP, such as taxable-maximum workers, would receive a lower benefit under the proportional formula. The proportional formula discussed above would differ from the current-law WEP formula in terms of monthly benefit amounts, improper payments, and notification to beneficiaries. Given the current-law WEP formula's design, the proportional formula would increase Social Security benefits for some beneficiaries with noncovered employment and decrease benefits for others. Beneficiaries who would receive a lower benefit under the proportional formula than under current law include beneficiaries with noncovered earnings who are exempt from the current-law WEP, such as those with 30 or more YOCs or those not receiving a noncovered pension; and beneficiaries whose benefits are underadjusted using the current WEP PIA, such as those who have relatively high lifetime earnings, are close to 30 YOCs, or are affected by the current-law guarantee provision. If the proportional formula had applied to current beneficiaries in 2018, SSA's Office of the Chief Actuary (OCACT) estimates that about 1.1 million beneficiaries affected by the current WEP (or 69%) would have received a higher benefit and about 0.5 million beneficiaries affected by the current WEP (or 31%) would have received a lower benefit. In addition, 13.5 million beneficiaries with some noncovered earnings who were exempted from the current WEP in 2018 would have received a lower benefit under the proportional formula. Beneficiaries who are eligible for either of the two exemptions to the current-law WEP would receive a lower benefit under the proportional formula. Beneficiaries with 30 or more YOCs are exempted from the current WEP, but under the proportional formula, workers with 30 or more YOCs and very few years of noncovered employment (even less than a year) would probably receive proportional reductions in their Social Security benefits. For example, a medium scaled-worker who earned 30 YOCs in his earlier career would not be affected by the current WEP even if he took a noncovered position afterward and was entitled to a noncovered pension (see case [1] in Table 4 ). In this case, the worker would receive an unreduced Social Security benefit of $1,707.30, which would be higher than the proportional PIA ($1,612.00) based on earnings from noncovered employment. SSA's OCACT estimates that, in 2018, roughly 9.4 million Social Security retired-worker and disabled-worker beneficiaries with some noncovered earnings were exempt from the current WEP because they had 30 or more YOCs. Because those beneficiaries have relatively few years of noncovered earnings, their benefit reductions under the proportional formula would be relatively small. The other exemption applies to beneficiaries with noncovered earnings who do not receive a pension based on those noncovered earnings. Those beneficiaries could receive a lower benefit under the proportional formula because their earnings from noncovered employment could reduce the proportion of overall career-average earnings from covered jobs. For example, under current law, a medium-scaled worker who worked in a noncovered position from age 55 to age 61 but received no noncovered pension benefits would be exempt from the WEP and receive a Social Security benefit equal to $1,551.10 (see case [2] in Table 4 ). This amount would be higher than the benefit computed by the proportional formula ($1,432.80) because those seven years of noncovered employment would proportionally reduce the Social Security benefit. Estimates from OCACT find that about 8.6 million Social Security retired-worker and disabled-worker beneficiaries with some noncovered earnings and less than 30 YOCs were exempt from the current WEP in 2018 because they had no pension based on those noncovered earnings. In addition, the guarantee provision under current law limits benefit reductions by ensuring that the WEP reduction cannot exceed one-half of the noncovered pension benefit. This provision typically leads to small benefit reductions for beneficiaries who receive small pension benefits based on relatively short careers in noncovered employment. The proportional formula would not limit reductions in this way, so those workers' benefits would be lower under the proportional formula than under the WEP. For example, a low-scaled worker who worked in a noncovered position from age 52 to age 61 and received a monthly benefit from a noncovered pension equal to $100 would receive a WEP reduction of no more than $50 under current law (see case [3] in Table 4 ). Therefore, this worker would receive $896.10 under the current WEP, but $770.90 under the proportional formula with no guarantee provision. In addition to the exemptions and the guarantee provision, whether a worker with noncovered earnings would receive a lower Social Security benefit under the proportional formula relative to current law also depends on YOCs based on substantial earnings. The number of YOCs determines the WEP replacement factor under current law (see Figure 1 ). In general, the larger the number of YOCs, the higher the WEP replacement factor. Workers who have employment not covered by Social Security also need to earn the substantial covered amount ($25,575 in 2020) to receive one YOC, which is much higher than the earnings required for Social Security eligibility ($5,640 in 2020). Because of the WEP's higher YOC earnings threshold, workers with relatively lower covered earnings who are affected by the WEP may be entitled to Social Security benefits based on earnings credits but not qualify for a YOC for WEP purposes. Although YOCs are a critical factor for determining the PIA under the current-law WEP, they are not relevant for the proportional formula. To compare monthly benefits based on the two formulas by YOCs, Figure 4 shows a medium-scaled worker's monthly benefit amounts under the current WEP PIA and the proportional PIA. If the medium-scaled worker took a job covered by Social Security in the earlier part of her career and the number of YOCs was relatively small (less than 27 for a medium-scaled worker), the proportional formula would provide a higher benefit than the current WEP. However, if the number of YOCs were relatively large (more than 27 for a medium-scaled worker), the proportional formula would provide a lower benefit than the currentâlaw WEP. Two reasons may explain why the proportional formula would provide a lower benefit than the current-law WEP at the higher level of YOCs. First, current law exempts beneficiaries from the WEP if they have 30 or more YOCs, resulting in a higher benefit amount than under the proportional formula. Second, when YOCs are close to 30, the current-law WEP replacement factor is relatively large, such as 85% for 29 YOCs (see Figure 1 ), so the current-law WEP PIA underadjusts and produces a higher benefit than the proportional formula. The monthly benefit difference between the proportional formula and the current-law WEP formula also depends on earning levels. For example, the very low- and low-scaled workers in Figure 5 had fewer than 20 YOCs because their annual earnings were typically less than the substantial earnings required for a YOC. They would receive a current-law WEP PIA based on the lowest WEP replacement factor (40%). Therefore, the proportional PIA for these workers would generally be higher than the WEP PIA, because the 40% WEP replacement factor overreduces their Social Security benefits for noncovered earnings. The proportional PIA would also be higher than the WEP PIA for medium- and high-scaled workers with relatively fewer YOCs, such as Figure 5 's medium-scaled workers with fewer than 29 years of covered earnings and high-scaled workers with YOCs between 11 and 22. However, as YOCs increase, the WEP replacement factor goes up, so the WEP PIA is higher than the proportional PIA for medium- and high-scaled workers with more YOCs. For workers with substantially high earnings, such as taxable maximum workers, the proportional PIA would generally be lower than the WEP PIA. The size of the monthly benefit difference between the proportional PIA and the WEP PIA also depends on the timing of covered and noncovered employment. Figure 6 compares three medium-scaled workers with 20 years of covered employment in early career, midcareer, and late career, respectively. Because early-career earnings are relatively lower than earnings in later years, a medium-scaled worker whose early career is covered by Social Security would tend to have a lower WEP PIA, a lower proportional PIA, and a lower monthly benefit difference between the two formulas than a medium-scaled worker with covered earnings at midcareer or late career. This example indicates that the WEP PIA and proportional PIA amounts depend on the timing of noncovered employment, as well as earning levels from both covered and noncovered employment. The current-law WEP and the proportional formula differ not only in benefit calculation, but also in administration and associated costs. SSA's ability to administer the current WEP depends in large part on the type of noncovered employment on which a beneficiary's pension is based. For most federal retirees and survivors, SSA relies primarily on noncovered pension data matched from the Office of Personnel Management (OPM). However, for state or local retirees and certain retirees with foreign pensions, SSA relies primarily on beneficiaries to self-report noncovered pension amounts. Based on the information matched and provided, SSA determines whether and to what extent to apply the WEP. Unreported state and local government pensions lead to improper payments. According to SSA, WEP has been a leading cause of computational errors related to overpayments. For FY2013 through FY2017, WEP accounted for 63% of reported computation overpayment errors, and average overpayments related to WEP totaled approximately $520 million annually. In contrast, the proportional formula is applied based on covered and noncovered earnings records, which are reported to SSA on Internal Revenue Service (IRS) Form W-2. Without other provisions, benefits based solely on the proportional formula would likely have fewer errors compared to benefits computed with the current-law WEP formula. The annual Social Security statements that SSA makes available to all eligible workers provide benefit estimates based only on covered employment, with no estimates of the WEP adjustment because SSA is not provided with information on receipt of noncovered pensions until an individual self-reports this benefit when applying for Social Security. Because of this limitation, beneficiaries have argued that they were not given sufficient notice of how much their benefits would be reduced due to the WEP. To address this issue, the Social Security Protection Act of 2004 ( P.L. 108-203 ) requires state and local government employers to disclose the WEP's effect to affected employees hired on or after January 1, 2005. SSA also responded to those communication issues by inserting a description of the WEP into the statement beginning in 2007. However, communication challenges remain. The statement provides no estimates of the current WEP adjustment. The WEP adjustment is difficult to estimate without information on noncovered pensions, which is generally not available until the worker is entitled to such pension at a later date. Compared to the current WEP, the estimate of noncovered earnings used in the proportional formula and the corresponding proportional PIA would be relatively easier to include in the statement. The proportional PIA estimate would have to be based on certain assumptions regarding future employment type, but it would not require noncovered pension information. In 1981, proposals to address Social Security benefits for individuals receiving pensions from noncovered employment were discussed as part of broad reform efforts to address Social Security's financing issues, which were a major concern at the time. Some of the proposals called for worker PIA computations to use both covered and noncovered earnings, and for the PIA based on combined earnings to then be reduced by the ratio of noncovered earnings to combined earnings. This method is commonly referred to as the proportional formula , as discussed earlier in this report. This proposal was recommended by the National Commission on Social Security and included in Section 301 of H.R. 3207 , the Social Security Amendments of 1981 as introduced in the 97 th Congress. Other proposals called for a modified benefit formula that would change the first replacement factor in the regular benefit formula for workers with pensions based on noncovered work, which is similar to current law. For example, a May 1981 Reagan Administration proposal would have substituted the 90% replacement factor in the regular benefit formula with a 32% replacement factor for affected beneficiaries. The proposal would have guaranteed that the Social Security benefit reduction could not exceed one-half of the noncovered pension. In January 1983, the National Commission on Social Security Reform (NCSSR, better known as the Greenspan Commission) recommended eliminating the windfall portion of benefits for individuals who received a pension based on noncovered employment. The two methods discussed above were suggested: (1) the proportional formula based on covered and noncovered earnings, and (2) the modified benefit formula, substituting the 90% replacement factor with 32%. In the same year, SSA offered comments on the two methods. The agency indicated that the proportional formula would be the most conceptually appropriate, but would require SSA to maintain detailed records on workers' noncovered earnings in a manner comparable to the current covered earnings record operations, which would have required extensive data reporting, maintenance, and correction processes, and could likely not have been done with limited cost at that time. In contrast, SSA indicated the modified benefit formula based on the replacement factor would achieve the proportional formula's approximate results and be vastly easier to administer. SSA also recommended lowering the 90% replacement factor to 61% (the midpoint between the 90% factor and the 32% factor), as the 32% replacement factor would overadjust for the windfall. In March 1983, Congress incorporated the NCSSR's recommendations (with some modifications), along with additional provisions to resolve the remaining long-range deficit, into the Social Security Amendments of 1983 ( P.L. 98-21 ). The conference agreed that the 90% replacement factor in the regular benefit formula would be substituted with a 40% replacement factor (phased in over five years), as in current law. Since 2004, various bills have been introduced to replace the current WEP formula with the proportional formula based on both covered and noncovered earnings. Partly because all covered and noncovered earnings have been reported to SSA on Form W-2 since 1978, sufficient earnings records are now available to apply the proportional formula. Thus, a previous major area of concern for administering a proportional formula has been alleviated. Legislative proposals based on the proportional formula usually address two essential questions: (1) whether the proportional formula would be applied to beneficiaries affected by the current WEP; and (2) how to treat beneficiaries who would receive a lower benefit under the proportional formula compared to current law. For the first question, proposals either apply the proportional formula to all current and future affected beneficiaries, or apply the proportional formula only to certain future beneficiaries and provide an additional monthly benefit (usually referred to as a rebate ) to those affected by the current WEP. For the second question, some proposals include a no-benefit-cut provision such that the beneficiary would receive a benefit based on the higher of the current WEP formula and the proportional formula. For example, S. 113 and H.R. 2797 in the 112 th Congress would have applied the proportional formula to all beneficiaries (both current and future beneficiaries) after 1985 and provided a no-benefit-cut or hold harmless provision to beneficiaries who had worked in noncovered positions prior to one year after the bill's enactment. In a somewhat different approach, H.R. 3934 and H.R. 4540 in the 116 th Congress would apply the proportional formula to beneficiaries becoming eligible after a certain date, such as December 31, 2021; provide a rebate to beneficiaries affected by the current-law WEP; and mandate a no-benefit-cut provision for some or all future beneficiaries. The above two bills introduced in the 116 th Congress also include provisions to require SSA to show noncovered as well as covered earnings records on Social Security statements and to require studies on ways to facilitate data exchanges between SSA and state and local governments to improve current-law WEP administration.", "summary": "Social Security is a work-based federal insurance program that provides income support to workers and their eligible family members in the event of a worker's retirement, disability, or death. About 6% of workers in paid employment or self-employment in 2019 were not covered by Social Security. A quarter of state and local government employees and most permanent civilian federal employees hired before January 1, 1984, were not covered, and these groups constituted the majority of noncovered workers. For workers whose entire careers are covered by Social Security, the Social Security benefit formula is weighted to replace a greater share of career-average earnings (referred to as the replacement rate ) for low-paid workers than for high-paid workers. However, providing an appropriate replacement rate for beneficiaries whose careers are split between covered and noncovered employment (referred to hereinafter as split-career beneficiaries ) is challenging because years of noncovered earnings are marked as zeros in Social Security earnings records, so split-career beneficiaries appear to have low career-average earnings. Therefore, if there were no adjustment for noncovered earnings, split-career beneficiaries would receive a higher replacement rate than beneficiaries with the same earnings who spent their entire careers in covered employment. The windfall elimination provision (WEP) is a modified benefit formula that reduces certain retired or disabled workers' Social Security benefits if they also have earnings not covered by Social Security and are entitled to pension benefits based on those noncovered earnings. The WEP aims to provide split-career beneficiaries with approximately the same replacement rate as similar workers whose entire careers were covered by Social Security. Some have argued, however, that the current-law WEP formula generally fails to accurately adjust affected workers' benefits. They say it overadjusts some affected workers' benefits (i.e., it reduces them by too much), giving them a lower replacement rate than similar workers whose entire careers were covered by Social Security. In contrast, they argue it underadjusts some other affected workers' benefits, giving them a higher replacement rate than similar workers whose entire careers were covered. Estimates in 2018 showed the current-law WEP overadjusted 69% of affected beneficiaries' benefits and underadjusted for the remaining 31%. Legislative proposals have been introduced to substitute the WEP with a proportional formula that would calculate Social Security benefits based on earnings from both covered and noncovered employment. The proportional formula's supporters have argued it is a more accurate method to treat noncovered employment, because it would provide the same replacement rate for split-career beneficiaries and beneficiaries whose entire careers are covered by Social Security. Compared with current law, a proportional formula would increase Social Security benefits for beneficiaries whose current-law WEP benefits are overadjusted and decrease benefits for those whose benefits are underadjusted. It would also decrease benefits for many beneficiaries with earnings from noncovered employment who are exempt from the current WEP reduction because they (1) have 30 or more years of substantial covered earnings, or (2) do not receive a pension based on noncovered earnings. Proposals to establish a proportional formula have been discussed since the 1980s. However, applying the proportional formula requires a complete record of earnings from covered and noncovered employment, which were not readily available at that time. To obtain the complete earnings record, the Social Security Administration (SSA) would have needed a massive new operation system requiring extensive data reporting, maintenance, and correction processes, which could not have been accomplished quickly with limited costs. Therefore, the current-law WEP was enacted in 1983 as an approximate approach to adjust Social Security benefits for certain beneficiaries who had earnings in jobs not covered by Social Security. Today, SSA has 35 years of data on earnings from both covered and noncovered employment, implying that the proportional formula is now an option for Congress to consider. In 2019 (the 116 th Congress), H.R. 3934 and H.R. 4540 would replace the current-law WEP approach with a proportional formula for certain individuals who would become eligible for Social Security benefits in 2022 or later.", "document_type": "crs"}
{"report": "While periodic, omnibus farm bills focus on agricultural and food policy, they also contain provisions addressing rural community and economic development. The U.S. Department of Agriculture (USDA), through its Rural Development agency (RD), administers a broad portfolio of programs focused on rural housing, rural infrastructure, and rural business and employment. Congress considers reauthorizing and amending many of these programs in periodic farm bills. The most recent is the Agriculture Improvement Act of 2018 (2018 farm bill, P.L. 115-334 ). The 2018 farm bill generally authorizes programs and funding levels for the period FY2019-FY2023, though some provisions apply to different periods, such as FY2019-FY2025. Since 1973, farm bills have included a title dedicated to rural development. The Rural Development title (Title VI) of the 2018 farm bill generally addresses (1) rural infrastructure, including housing, electrical generation and transmission, water and wastewater, and more recently, broadband deployment; (2) rural economic development; and (3) rural business creation and expansion. The Miscellaneous title (Title XII) also includes certain rural development provisions related to RD personnel, federal task forces or working groups, and other federal rural development programs. Programs authorized in other titles of P.L. 115-334 may benefit rural areas, especially rural areas with economies reliant on agriculture. However, most rural development provisions in the Rural Development and Miscellaneous titles specifically target rural areas. A number of issues influenced the rural development provisions of the 2018 farm bill. Many rural communities have experienced decreasing populations over the last decade. In addition, some rural residents struggle to access employment opportunities, especially in high-wage jobs. The ongoing opioid crisis and an increasing number of rural hospital closures have raised concerns about the health of rural residents. Aging infrastructure, such as electric or drinking water infrastructure, also presents a challenge to some rural communities. The digital divide âlower rates of broadband access in rural areas compared to urban areasâhas raised concerns that rural residents may be less able to access opportunities and services such as distance learning, telemedicine, and e-commerce. In addition, policymakers and scholars have increasingly examined regional approaches to rural economic development rather than approaches focused on individual communities. The 2018 farm bill includes new provisions and programs related to rural broadband deployment, health care, and community development. The law also reauthorizes and amends existing programs related to broadband deployment, other rural infrastructure, and community development. P.L. 115-334 amends multiple definitions of rural used to determine eligibility for RD programs. The law also amends programs that address regional approaches to rural economic development. Further, P.L. 115-334 repeals some rural development programs and makes technical corrections to statutory language authorizing other programs. This report provides a brief overview of federal rural development programs. It then analyzes issues that influenced the development of rural development provisions in the 2018 farm bill. Next, the report details new rural development programs and entities created and changes made to existing rural development programs, in P.L. 115-334 . The Appendix provides a side-by-side comparison of each provision in the Rural Development title, as well as each rural development provision in the Miscellaneous title, of the 2018 farm bill with prior law. The Rural Development Policy Act of 1980 ( P.L. 96-355 ) named USDA as the lead federal agency for rural development. RD is the mission area within USDA responsible for rural infrastructure and economic development assistance. Three agencies comprise RD: the Rural Business-Cooperative Service, the Rural Housing Service, and the Rural Utilities Service (RUS). RD programs are largely loan and grant programs that assist communities with small populations to finance development projects. Many RD programs have statutory authority in the Consolidated Farm and Rural Development Act of 1972 (the ConAct, P.L. 87-128) or the Rural Electrification Act of 1936 (7 U.S.C. 901 et seq.). RD programs typically rely on annual appropriations for funding, but omnibus farm bills also authorize mandatory funding for some RD programs. The most recent of these, the 2018 farm bill, reauthorizes or amends existing RD programs and authorizes new RD programs by amending the ConAct, the Rural Electrification Act, or other authorizing legislation. The 2018 farm bill also authorizes some rural development programs or entities administered outside USDA. For example, the law authorizes the Federal Communications Commission (FCC) to establish a new task force on precision agriculture connectivity. It also reauthorizes federal regional commissions, such as the Appalachian Regional Commission. A number of economic and social issues in rural America influenced the rural development provisions of the 2018 farm bill. Rural policy issues that influenced the 2018 farm bill include: rural population decline; rural underemployment; rural health issues, including the ongoing opioid crisis and an increasing rate of hospital closures in rural areas; aging rural infrastructure and a lack of access to broadband internet in rural areas; and a shift among some scholars and policymakers towards supporting regional approaches to rural economic development. Between 2010 and 2017, the number of people living in nonmetropolitan counties declined by approximately 223,000. Additionally, over 1,300 nonmetropolitan counties experienced population loss ( Figure 2 ). While the overall U.S. rural population declined, rates of population change varied among rural areas. Populations declined in many rural counties dependent on agriculture and manufacturing, while populations increased in many rural counties dependent on recreation. Population decline results from a combination of out-migration, declining birth rates, and increased mortality. Research has attributed rural out-migration to many factors, including lack of employment opportunities and less access to education, health care, and cultural amenities. Congress sought to address rural population decline in the 2018 farm bill through rural infrastructure, business development, and community development. Historically, agriculture and rural policy were closely linked due to the high percentage of rural Americans employed in agriculture. This link has weakened due to the changing nature of rural employment. In 2017, the agriculture sector accounted for 5.6% of rural jobs, down from 6.8% in 2001. In addition, USDA estimates that approximately 80% of total farm household income in 2019 will come from off-farm activities. Manufacturing has also been an important source of employment in rural areas, being responsible for a larger share of jobs in rural counties than in urban counties. In 2017, manufacturing employed 10.8% of the rural workforce, declining from 14.1% in 2001. Congress sought to address rural employment in the 2018 farm bill through entrepreneurship, business development, broadband deployment, and access to credit. Rural health issues also influenced the 2018 farm bill's rural development provisions. Policymakers continue to look for solutions to address the opioid epidemic that began in the 1990s. Though this epidemic has affected urban, suburban, and rural areas, the drug overdose death rate in rural areas increased at a faster rate than in urban areas between 1990 and 2015. In addition, many scholars and interest groups have asserted that the federal government's approach to mitigating the opioid crisis in rural areas should differ from the strategy for urban areas. While federal, state, and local governments have addressed the epidemic, drug overdose rates remain high. In addition, a rise in the number of rural hospital closures has increased concerns about access to health care in rural areas. According to the U.S. Government Accountability Office (GAO), 64 rural hospitals closed between 2013 and 2017, more than twice as many as during the previous five-year period. These hospital closures will likely result in rural residents having to travel greater distances for emergency medical care. In the 2018 farm bill, Congress included provisions related to refinancing of rural hospital debt, funding for opioid abuse prevention and treatment, and coordination of federal rural health efforts. Aging infrastructure continues to be a concern for rural areas. According to GAO, \"many rural communities face significant challenges in financing the costs of replacing or upgrading aging and obsolete drinking water and wastewater infrastructure.\" Because communities typically pay for drinking water infrastructure through rates charged to users, more sparsely populated communities have difficulty financing major infrastructure construction or upgrades. Some rural communities also lack the resources to assess infrastructure needs. Similar challenges exist to upgrading and maintaining rural housing and electricity infrastructure. The 2018 farm bill includes provisions related to rural infrastructure loan and grant programs, technical assistance for infrastructure planning, and prioritizing water infrastructure funding to address a public health crisis. Additionally, scholars and policymakers have asserted that access to broadband internet is important for economic and community development in rural areas. According to the most recent FCC deployment data, as of December 2017, 26% of Americans in rural areas and 32% of Americans on tribal lands lack access to broadband at speeds of at least 25 megabits per second (Mbps) download and 3 Mbps upload. In comparison, 1.7% of Americans in urban areas lack access to broadband at 25/3 Mbps. The 2018 farm law includes provisions related to broadband deployment, federal program coordination, and the use of broadband for precision agriculture. Some scholars and policymakers increasingly support a regional approach to rural economic development. Rather than focus on individual towns or communities, which may compete for jobs and residents, a regional approach draws on the strengths and opportunities of different localities within a region and involves coordination across communities. The 2018 farm bill contained provisions related to federal regional commissions, technical assistance for regional planning, and prioritizing projects that support a strategic community development plan. This section summarizes the rural development provisions in the 2018 farm bill. It provides an overview of new rural development provisions. It also summarizes provisions that reauthorize or amend federal statutes related to existing rural development programs and requirements. In addition to amending programs, the farm bill authorizes programs to receive mandatory or discretionary funding. Congress controls the level of discretionary funding through the subsequent enactment of annual appropriations. Congress controls the level of mandatory funding outside of the appropriations process based on payments made as a direct consequence of statutory requirements. Most RD programs rely on discretionary funding. Section 6101 directs USDA to set aside at least 20% of annual funds appropriated for the Distance Learning and Telemedicine Program for FY2019-FY2025 for telemedicine projects that provide substance use disorder treatment services. It also directs USDA to prioritize funding for Community Facilities Direct Loans and Grants and Rural Health and Safety Education Grants for projects that provide substance use disorder treatment, education, and prevention. The provision also authorizes the Secretary of Agriculture to temporarily prioritize assistance under certain RD programs to help rural communities respond to a significant public health disruption . Section 6202 of the 2018 farm bill authorizes a new rural broadband deployment program to fund middle mile infrastructure . Middle mile infrastructure is infrastructure that does not connect directly to an end user (such as a business or household) but rather connects a local network to the larger internet backbone. The provision authorizes $10 million per year for loans and grants for FY2019-FY2023, subject to annual appropriations. Section 6208 adds a new section to the Rural Electrification Act that addresses environmental reviews for rural broadband programs. The new language authorizes USDA to obligate, but not disburse, loan or grant funds before the completion of an environmental, historical, or other review. The funds may be obligated if USDA determines that a subsequent review will be adequate and easily accomplished. Section 6213 authorizes USDA to use existing regulations for the Rural Broadband Access and Community Connect programs for up to one year until USDA issues a final rule implementing the 2018 farm bill changes. Section 6212 establishes procedures for federal broadband program coordination . It directs the National Telecommunications and Information Administration (NTIA) at the U.S. Department of Commerce to assist USDA with verifying applicant eligibility for USDA rural broadband programs. The provision also directs USDA and the FCC to coordinate before providing broadband assistance to prevent duplication. It requires USDA, NTIA, and the FCC to submit a report to Congress within one year of the farm bill's enactment on how to best coordinate federal broadband programs and activities. Section 6214 establishes a Broadband Integration Working Group to conduct a survey of all current federal assistance for broadband deployment. The provision also directs the working group to make recommendations to address regulatory barriers and incentivize investment in broadband deployment and adoption. The working group includes numerous federal agencies. The administrator of RUS, Assistant Secretary for Communications and Information at the Department of Commerce, director of the National Economic Council, and director of the Office of Science and Technology Policy at the White House co-chair the working group. Section 12511 directs the FCC to establish a task force on precision agriculture . Duties of the task force include identifying and measuring current gaps in broadband internet access on agricultural land and making policy recommendations to promote broadband deployment on unserved agricultural land. Section 6419 authorizes USDA to make grants to eligible entities to provide technical assistance and training to support applications for Rural Business-Cooperative Service programs . Eligible entities may use grants to assist communities in planning for business and economic development needs, identifying public and private financing options, and preparing applications and materials to request financial assistance. The law authorizes appropriations of $5 million per year for the program for FY2019-FY2023. Section 6302 directs USDA to provide technical assistance to t ribal entities to improve the entities' access to RD programs. The provision requires technical assistance to address the unique challenges faced by tribal governments, producers, businesses, and tribally designated housing entities in accessing RD programs. Section 12510 directs USDA to establish Tribal Promise Zones that are to receive priority consideration for federal grant programs and initiatives. Criteria for Tribal Promise Zones include unemployment rates, poverty rates, vacancy rates, household income, and the effectiveness of a competitiveness plan submitted by nominating entities. Prior to the 2018 farm bill's enactment, the federal government had designated certain tribal areas as Tribal Promise Zones under an existing Promise Zones initiative at the Department of Housing and Urban Development (HUD). Section 12510 directs the Secretary of Agriculture to re-designate any previously designated Tribal Promise Zone. Section 6424 establishes a new Rural Innovation Stronger Economy Grant Program to establish job accelerators in rural regions. Grant awards may be between $500,000 and $2 million, and applicants must provide at least 20% of project funds. Eligible applicants may use funds for a variety of purposes, including linking rural communities and entrepreneurs to markets, facilitating the repatriation of high-wage jobs to the United States, and identifying and building assets in rural communities. The provision authorizes annual appropriations of $10 million per year for FY2019-FY2023. Section 6306 creates a Council on Rural Community Innovation and Economic Development , comprised of various executive branch departments and agencies, to coordinate federal engagement with rural stakeholders and make recommendations to streamline and leverage federal investments in rural areas. The provision also establishes a Rural Smart Communities Working Group and a Jobs Accelerator Working Group within the council. Section 6103 authorizes USDA to use loans or loan guarantees under certain rural business or infrastructure programs to refinance rural hospital debt . Congress permits USDA to assist a rural hospital with refinancing debt if \"the assistance would help preserve access to a health service in a rural community, meaningfully improve the financial position of the hospital, and otherwise meet the financial feasibility and adequacy of security requirements of the Rural Development Agency.\" Section 12409 directs USDA to establish a Rural Health Liaison who would integrate rural health activities across USDA, coordinate with the Secretary of Health and Human Services, and provide technical assistance to USDA outreach, extension, and county offices. Section 6201 reauthorizes and makes a number of amendments to the Rural Broadband Access Program (also known as the Farm Bill Loan Program): Increases authorized funding for the program from $25 million to $350 million per year for the period FY2019-FY2023. Authorizes 3%-5% of annual program funding for technical assistance and training to applicants applying to provide broadband service to communities that lack broadband at speeds of at least 10/1 Mbps. Adds a grant component to the program to the existing direct and guaranteed loan components. To be eligible for a grant, at least 90% of households in the proposed service area âthe area in which an applicant proposes to deploy broadbandâmust lack access to broadband at minimum speeds. Applicants must provide matching funds of 25%-75% of the project cost, depending on the population density of the proposed service area. Amends the eligibility criteria for loans to require at least 50% of households in proposed service areas to lack access to broadband service at minimum speeds. Under prior law, this threshold was 15% of households. Increases the minimum acceptable broadband speeds for the program from 4/1 Mbps to 25/3 Mbps. These minimum speeds determine both eligibility criteria and buildout requirements. USDA uses the minimum speeds to determine whether areas lack sufficient broadband service and are therefore eligible for program funding (see above two bullet points). USDA also requires all loan or grant recipients to provide broadband service that meets the minimum speeds. Directs USDA to prioritize applications that serve communities with a population of fewer than 10,000 residents; serve communities experiencing out-migration; provide broadband to cropland and ranchland for use in precision agriculture; and were developed with, and received funding from, community stakeholders, among other prioritization criteria. Increases the maximum time to complete buildout of broadband infrastructure to five years. Under prior law, the maximum buildout time was three years from when USDA made assistance available. Directs USDA to establish broadband buildout requirements âthe level of internet service an applicant must provide for the duration of a project agreement. Section 6201 also directs USDA to project minimum acceptable service standards for projects with agreements of 5-10, 11-15, 16-20, and more than 20 years. Applicants must demonstrate the ability to furnish or improve service in order to meet the broadband buildout requirements. The conference report contains language further explaining congressional intent. Authorizes USDA to provide payment assistance for certain loan and grant recipients. This includes reduced interest rates or allowing borrowers to defer payments. Directs USDA to charge fees to lenders in amounts that reduce the cost of subsidies for guaranteed loans but are not a barrier to program participation. Moves certain provisions regarding notice requirements, default and deobligation, and service area assessment to other sections of the Rural Electrification Act and makes amendments to these relocated provisions. These provisions still apply to the Rural Broadband Access Program. Section 6201 also removes language regarding paperwork reduction, the preapplication process, and the number of application evaluation periods per year. Section 6102 reauthorizes the Distance Learning and Telemedicine Program through FY2023 and increases the authorization for annual appropriations from $75 million to $82 million per year. Section 6204 codifies the Community Connect Program and authorizes funding of $50 million per year for FY2019-FY2023. Previously, Congress had authorized the program in annual Agriculture appropriations bills. Section 6203 reauthorizes the Rural Gigabit Network Pilot Program and renames it the Innovative Broadband Advancement Program . Congress authorizes USDA to provide loans or grants to decrease the cost of broadband deployment and increase broadband speeds. Eligible applicants must agree to complete project buildout within five years and increase broadband speeds to at least the minimum broadband buildout requirements established for the Rural Broadband Access Program. Congress authorizes appropriations of $10 million per year for FY2019-FY2023. Section 6205 establishes criteria for outdated broadband systems . Beginning October 1, 2020, USDA must consider any portion of a service territory that is subject to an outstanding USDA grant agreement to be unserved if broadband speeds in that portion of a service territory are less than 10/1 Mbps. The provision includes an exception for broadband service providers that have constructed, or begun to construct, broadband facilities that meet the minimum speeds for the Rural Broadband Access Program. As mentioned earlier in this section, Section 6201 set minimum broadband speeds for the Rural Broadband Access Program at 25/3 Mbps. Section 6207 creates a new section of the Rural Electrification Act that addresses public notices, service area assessments, and reporting requirements under USDA rural broadband programs. The provision includes both new language and language moved from other sections of the Rural Electrification Act. It moves language related to public notice requirements, service area assessments, and reporting from the section of the Rural Electrification Act that authorizes the Rural Broadband Access Program to this newly created section. Moving this language makes it applicable to certain other programs authorized in the Rural Electrification Act in addition to the Rural Broadband Access Program. Section 6207 also makes the following amendments: Directs USDA to publish information on applications and funding awards for rural broadband programs in a searchable database on the RUS website. The database must be available to the public. Gives internet service providers at least 45 days to respond to a public notice of application, in contrast to at least 15 days under prior law. Providers may submit information on any broadband service the provider currently offers in the area identified in an application. This information helps USDA determine whether a proposed area meets program eligibility requirements. Exempts from certain Freedom of Information Act requirements information submitted by internet service providers in response to public notices. Includes language regarding assessing unserved communities for Rural Broadband Access Program eligibility. Under the program, USDA gives priority to unserved communities âcommunities that lack residential broadband service at speeds of at least 10/1 Mbps. Section 6207 directs USDA to coordinate with the FCC and NTIA, obtain data from any other relevant source, and perform site-specific testing to verify that communities given priority are eligible for program funding. Requires loan or grant recipients to report annually to USDA, rather than semiannually as under prior law. The provision also adds reporting requirements for middle mile projects. It directs USDA to submit a single report to Congress each year detailing assistance provided under all USDA rural broadband loan and grant programs. Authorizes not less than 3% and not more than 5% of funding appropriated for certain rural broadband programs be set aside for oversight, reporting, and accountability measures. Section 6210 authorizes recipients of certain RD loans, loan guarantees, or grants authorized by the Rural Electrification Act or the ConAct to use up to 10% of the award amount for rural broadband infrastructure projects . Recipients can use funding only for projects in areas that lack broadband service at speeds of at least 25/3 Mbps. The provision also directs USDA not to provide funding if it would result in competitive harm to another recipient of RD loans or grants. Section 6206 moves language regarding default and deobligation from the section authorizing the Rural Broadband Access Program to a new section of the Rural Electrification Act. It also authorizes USDA to establish a deferral period of not shorter than the project buildout period in order to support the financial feasibility of a project. Section 6209 moves existing language regarding refinancing telecommunications loans to a new section of the Rural Electrification Act and amends this language. Prior law allowed a loan recipient to use any USDA telecommunications loan to refinance another USDA telecommunications loan if refinancing would support broadband deployment in rural areas. The amended language allows a loan recipient to refinance any outstanding loan that would have been used for an eligible telecommunications purpose under the Rural Electrification Act. Sections 6211 and 6502 of P.L. 115-334 amend Section 922 of the Rural Electrification Act, which authorizes USDA to make loans for rural telephone service . Section 6211 authorizes telephone loans to be used to refinance other loans authorized by the Rural Electrification Act. It removes the limit that 40% or less of the telephone loan may be used to refinance other loans. Section 6502 removes the word rural from the section title of the Rural Electrification Act, amending it to read, \"Loans for telephone service.\" Section 6502 also removes the requirement for loan applicants to submit to USDA a certificate of convenience from a state regulatory body. Section 6403 amends the Water and Wastewater Revolving Loan Fund Program . It increases the maximum project award amount from $100,000 to $200,000 and decreases the authorization of annual appropriations from $30 million to $15 million per year for FY2019-FY2023. Section 6404 amends the Rural Water and Wastewater Technical Assistance Program . It increases the authorization of annual appropriations to between 3%-5% of annual appropriations for Water and Waste Disposal Grants, as opposed to 1%-3% under prior law. It also amends eligible projects to include addressing the long-term sustainability of water and wastewater systems and contamination of drinking and surface water. Section 6405 reauthorizes the Rural Water and Wastewater Circuit Rider Program. It also increases the authorization of annual appropriations from $20 million to $25 million per year for FY2019-FY2023. Section 6408 reauthorizes grants for water systems for rural and Native villages in Alaska . It amends the eligible grant recipients to include Native villages, as defined in the Alaska Native Claims Settlement Act, and consortiums formed pursuant to the Department of Interior and Related Agencies Appropriations Act, 1998 ( P.L. 105-83 ). Section 6408 authorizes USDA to set aside up to 2% of annual program funds for consortiums to provide training and technical assistance for water and waste disposal operation and management. Section 6409 reauthorizes and amends the Household Well Water Systems Grant Program . It also authorizes subgrants, as well as previously authorized subloans. It limits subloans and subgrants to a maximum of $15,000 for each water well system or decentralized wastewater system. Section 6409 amends the definition of eligible individual to include one whose household incomes does not exceed 60% of the median nonmetropolitan household income for the state or territory. It also increases the authorization of annual appropriations from $5 million to $20 million per year for FY2019-FY2023. Section 6407 reauthorizes the Emergency and Imminent Community Water Assistance Grant Program . The law funds this program through both a set-aside of Rural Water and Wastewater Grant funding and a standalone appropriation. Section 6407 increases the set-aside from 3%-5% to 5%-7% of annual Rural Water and Wastewater Grant funding. It also increases the authorization for the standalone appropriation from $35 million to $50 million per year for FY2019-FY2023. This provision also directs USDA to prioritize projects that address water contamination posing a threat to human health or the environment. It increases the maximum grant amount from $500,000 to $1 million for projects that respond to a significant decline in water quality or quantity. Section 6407 also establishes an Interagency Task Force on Rural Water Quality to examine drinking water and surface water contamination in rural communities, particularly those in close proximity to active or decommissioned military installations in the United States. The task force must be composed of representatives from certain federal agencies and state and community stakeholders. The task force is to submit a report to relevant committees and make recommendations to address water contamination issues. Section 6303 amends the Rural Energy Savings Program to authorize financing of off-grid and renewable energy storage systems. It also directs USDA to streamline borrower accounting requirements and to publish an annual report on the program. It increases the maximum interest rate for program loans from 3% to 5%. It also directs USDA to exclude any debt incurred under the program in the calculation of a borrower's eligibility for other loans made under the Rural Electrification Act. The provision also reauthorizes annual appropriations of $75 million per year for FY2019-FY2023. Section 6501 authorizes USDA to refinance electric and telephone loans made by RUS. It also directs USDA to enter into a memorandum of understanding with the Department of Energy, under which the Department of Energy will provide technical assistance to USDA on making electric and telephone loans. Section 6505 reauthorizes USDA's ability to guarantee payments on bonds and notes issued for electrification or telephone purposes . It amends the purpose of bond or note guarantees to be for financing utility infrastructure. It also adds terms for bond or note guarantees, including a 30-year maximum length. Section 6505 removes the prohibition on guarantees for bonds or notes that will finance electricity generation. It also directs USDA to continue carrying out specified sections of the Rural Electrification Act until the full implementation of any new regulations required by the 2018 farm bill. Section 6506 reauthorizes the use of certain telecommunications loans for expansion of 911 access . It also amends the eligible loan purposes to include multiuse emergency communications networks that provide critical transportation-related information services. Section 6507 authorizes USDA to make or guarantee electric loans for cybersecurity and grid security improvements . Section 6418 authorizes USDA to collect loan fees for certain loans authorized by the ConAct in such amounts as to bring down the costs of loan subsidies. It also specifies that loan fees shall be consistent with current practices in the marketplace and shall not act as a barrier to participation in the loan programs. The 2018 farm bill also reauthorizes additional programs through FY2023. Section 6406 reauthorizes Tribal College and University Essential Community Facilities Grants, Section 6410 reauthorizes Solid Waste Management Grants, and Section 6412 reauthorizes grants for National Oceanic and Atmospheric Administration Weather Radio Transmitters. Section 6422 reauthorizes the Rural Microentrepreneur Assistance Program through FY2023. It eliminates mandatory funding for the program (previously $3 million per year) and decreases the authorization of appropriations from $40 million to $20 million per year for FY2019-FY2023. It also adds a minimum grant amount of 20% of the total outstanding balance of microloans made by the intermediary, subject to availability of funding. Section 6412 reauthorizes the Rural Cooperative Development Grant Program through FY2023. It also directs academic institutions conducting research under the program to include economic census data in their research on the economic impacts of cooperatives. Section 6427 reauthorizes appropriations of $20 million per year for the Rural Business Investment Program through FY2023. Section 6426 amends the program by revising the definitions of development venture capital and equity capital . The provision also removes the $500 maximum amount for fees, replacing it with language authorizing USDA to charge \"such fees as the Secretary [of Agriculture] considers appropriate, so long as those fees are proportionally equal for each rural business investment company.\" It also prohibits rural business investment companies from investing in entities that are not otherwise eligible for Farm Credit System financing if a Farm Credit System institution holds more than 50% of the shares of the investment company. Under prior law, this threshold was 25%. Section 6426 also prohibits USDA from requiring that an entity applying to be a rural business investment company provide investment or capital beyond the requirements listed in statute. Section 6416 reauthorizes appropriations of $25 million per year through FY2023 for the Intermediary Relending Program . The provision also sets a maximum loan amount that an intermediary may make for a project at the lesser of $400,000 or 50% of the loan made by USDA to the intermediary. It adds criteria for evaluating applications, directs USDA to establish a schedule for the return of equity contributions, and directs USDA to reduce the administrative requirements on intermediaries. Section 6503 amends the Cushion of Credit Program to terminate all deposit authority into cushion of credit accounts effective December 20, 2018. It reduces the interest rate for borrowers from 5% per year to 4% per year for FY2021 and then to the applicable one-year Treasury rate thereafter. The provision allows a borrower to reduce the cushion of credit account balance in order to prepay loans made or guaranteed under the Rural Electrification Act. Borrowers may make these prepayments through September 2020. The provision prohibits collection of prepayment premiums from borrowers. Section 6503 also authorizes such sums as necessary from the U.S. Treasury to cover any loan modification costs. Section 6504 reauthorizes and amends the Rural Economic Development Loan and Grant Program . It moves language regarding the program from the section of the Rural Electrification Act authorizing the Cushion of Credit Program to a new section of the act. Section 6504 authorizes annual appropriations of $10 million per year for FY2019-FY2023. It also provides for mandatory funding, financed through the Commodity Credit Corporation, of $5 million per year for FY2022 and FY2023. Section 12608 reauthorizes the Rural Emergency Medical Service Training and Equipment Assistance Program and authorizes annual appropriations of such sums as necessary for FY2019-FY2023. It amends eligibility to include only emergency medical service agencies operated by a local or tribal government and tax-exempt emergency medical services agencies. It also amends eligible grant activities to include public education concerning first aid, illness prevention, and emergency preparedness. The provision amends prioritization criteria and decreases the matching requirement for grants from 25% to 10% of the grant amount. It also amends the definition of emergency medical services to include medical care delivered outside of a medical facility under emergency conditions resulting from a natural disaster. The 2018 farm bill also reauthorizes the following programs through FY2023. Section 6411 reauthorizes Rural Business Development Grants, Section 6413 reauthorizes Loans for Locally or Regionally Produced Agricultural Food Products, Section 6414 reauthorizes the Appropriate Technology Transfer for Rural Areas Program, and Section 6423 reauthorizes Delta Health Care Services Grants. The 2018 farm bill includes three provisions that amend the definition of rural for certain RD programs. USDA uses population thresholds to determine whether an area is rural for the purposes of RD programs. Rural population thresholds vary across RD programs. Section 6301 amends the ConAct to direct USDA to exclude individuals incarcerated on a long-term or regional basis and the first 1,500 individuals residing on a military base when determining whether an area is a rural area for certain RD programs . It also amends the Rural Electrification Act and the Food, Agriculture, Conservation, and Trade Act of 1990 to exclude the same populations when determining whether an area is a rural area for certain RD broadband programs . Section 6305 amends the definition s of rural and rural area in the Housing Act of 1949 . The amended definition allows any area classified as rural or a rural area prior to 1990 to remain so until the next decennial census, if the area has a population between 10,000 and 35,000 and has \"a serious lack of mortgage credit for lower and moderate-income families.\" Section 6402 amends the definition of rural for determining eligibility for guaranteed loans under the Water and Waste Disposal and the Community Facilities programs. It increases the population threshold for guaranteed loans to 50,000 or fewer. Under prior law, the population thresholds were 10,000 or fewer for Water and Waste Disposal Guaranteed Loans and 20,000 or fewer for Community Facilities Guaranteed Loans. Section 6402 also directs USDA to prioritize guaranteed loan applications for areas with a population of 10,000 or fewer for the Water and Waste Disposal Program and 20,000 or fewer for the Community Facilities Program. The population thresholds for grant and direct loan eligibility remain unchanged at 10,000 or fewer for the Water and Waste Disposal Program and 20,000 or fewer for the Community Facilities Program. Section 6401 amends the Strategic Economic and Community Development provision of the ConAct. This provision allows USDA to prioritize funding under certain RD programs for projects that support multijurisdictional strategic community development plans. Section 6401 expands the provision to apply to all RD programs as determined by the Secretary of Agriculture. It increases the portion of funding USDA may reserve for projects under this section from 10% to 15% of program funding made available for a fiscal year. Section 6401 also authorizes annual appropriations of $5 million for FY2019-FY2023 for technical assistance to rural communities in developing strategic community investment plans. Sections 6425 and 6304 reauthorize and amend federal regional commissions and authorities. Section 6425 reauthorizes the Delta Regional Authority through October 1, 2023. It also reauthorizes annual appropriations of $30 million per year for the authority for FY2019-FY2023. Section 6304 reauthorizes three federal regional commissions âthe Southeast Crescent Regional Commission, the Southwest Border Regional Commission, and the Northern Border Regional Commissionâand increases authorized appropriations for each commission from $30 million to $33 million per year through FY2023. Federal statute directs the commissions to set aside 40% of grant funding in a given fiscal year for certain eligible activities, including transportation, telecommunications, or other public infrastructure. Section 6304 adds promoting development of renewable and alternative energy sources as an eligible activity for set-aside funding. The 2018 farm bill did not reauthorize the Northern Great Plains Regional Authority . Section 6304 also authorizes a new State Capacity Building Grant Program for the Northern Border Regional Commission . Congress authorizes the commission to provide grants to Maine, New Hampshire, New York, or Vermont for economic development activities. An eligible state must submit to the commission an annual work plan that includes the purpose of the grant. Section 6304 authorizes appropriations of $5 million per year for FY2019-FY2023 for the grant program. Section 6415 reauthorizes the Rural Economic Area Partnership (REAP) Program through FY2023. USDA has established REAP Zones to address critical issues related to economic growth, employment, and isolation. REAP Zones typically consist of multiple counties within a state and receive technical assistance and funding from USDA for strategic planning and community development activities. Section 6420 reauthorizes the National Rural Development Partnership through FY2023. This partnership, coordinated by USDA, includes state rural development councils and a national coordinating committee. State rural development councils facilitate collaboration among local government, private sector, and nonprofit entities in planning and implementing programs related to rural development. The national coordinating committee oversees and provides support for state rural development council activities. Section 12407 amends the Federal Crop Insurance Reform and Department of Agriculture Reorganization Act of 1994 ( P.L. 103-354 ) to reestablish the Under Secretary of Agriculture for Rural Development as a permanent position within USDA. USDA eliminated the Under Secretary position in a 2017 reorganization, replacing it with an Assistant to the Secretary for Rural Development who reported directly to the Secretary of Agriculture and was not a Senate-confirmed position. The Under Secretary position reports to the Deputy Secretary of Agriculture and requires Senate confirmation. USDA asserted that the 2017 reorganization \"recognizes and promotes the importance of rural development by placing it under the direct oversight of the Secretary.\" However, some stakeholder organizations opposed eliminating the Under Secretary position. For example, a letter to the House and Senate Agriculture Appropriations subcommittees signed by 578 organizations stated that RD \"needs the time and attention of a management team led by an Under Secretary who is empowered to direct and administer rural development programs and field staff.\" Section 6417 grants the Secretary of Agriculture and the Secretary's designees access to certain information from the Department of Health and Human Services in order to verify income for individuals participating in certain Rural Housing Service programs . Prior law granted the HUD Secretary access to certain information to verify income of participants for certain HUD housing programs. Section 6417 allows the Secretary of Agriculture and the Secretary's designees access to the same information, subject to the same requirements, as the HUD Secretary. Sections 6601 through 6603 repeal certain rural development programs. Section 6602 repeals the Rural Telephone Bank. Section 6603 repeals all sections of the Launching our Communities' Access to Local Television Act of 2000 (Title X of H.R. 5548 , as enacted by Section 1(a)(2) of P.L. 106-553 ) except Section 1008 of the act. Section 6601 of the 2018 farm bill repeals the following programs, which were previously authorized in the ConAct or the Rural Electrification Act: Multijurisdictional regional planning organizations (Section 306(a)(23) of the ConAct), Grants to broadcasting systems (Section 310B(f) of the ConAct), Rural telework organizations (Section 379 of the ConAct), Historical barn preservation (Section 379A of the ConAct), Grants to train farm workers in new technologies and to train farm workers in specialized skills necessary for high-value crops (Section 379C of the ConAct), Grants to the Delta Regional Agricultural Economic Development Program (Section 379D of the ConAct), Grants for expansion of employment opportunities for individuals with disabilities in rural areas (Section 379F of the ConAct), Regional rural collaborative investment program (Subtitle I of the ConAct), Certain electric and telephone loans (Section 314 of the Rural Electrification Act), and The National Center for Rural Telecommunications Assessment (Section 602 of the Rural Electrification Act). Sections 6701 and 6702 make technical corrections to the ConAct and Rural Electrification Act. Section 6701 amends the ConAct to correct the reference to the definition of Indian tribe for the Community Facilities Loan and Grant Program. It also clarifies the eligible activities for Rural Business Development Grants. Further, Section 6701 amends the ConAct to include Alabama as a participating state in the Delta Regional Authority. Congress initially made this amendment in the Consolidated Appropriations Act, 2001 ( P.L. 106-554 , Â§1(a)(4)). However, the amendment did not take effect at the time because it referred to the incorrect authorizing legislation. Section 6701 of the 2018 farm bill directs the correction to take effect as if included in P.L. 106-554 . Section 6702 corrects misspellings in the Rural Electrification Act.", "summary": "The U.S. Department of Agriculture's (USDA) Rural Development agency (RD) administers programs to support rural infrastructure and economic development. This includes programs focused on rural housing, rural business development, rural water and energy infrastructure, and, more recently, rural broadband deployment. Congress considers reauthorizing these programs in periodic omnibus farm bills. In December 2018, President Trump signed the 2018 farm bill (Agriculture Improvement Act of 2018, P.L. 115-334 ) into law. This legislation reauthorizes and amends RD programs, establishes new rural development programs and initiatives, and repeals other programs. Economic trends and social issues prevalent in rural America during the drafting of a farm bill typically influence the law's rural development provisions. Issues that influenced the rural development provisions of the 2018 farm bill include: rural population decline; the changing nature of rural employment, especially the decline in agriculture and manufacturing employment; rural health challenges, including an increasing number of rural hospital closures and increasing rates of drug overdose deaths related to opioids; aging rural infrastructure and a lack of access to broadband internet in rural areas; and a shift among some scholars and policymakers toward regional approaches to rural economic development. The 2018 farm bill establishes new rural development programs and initiatives. Among the new provisions, the law directs USDA to temporarily prioritize funding under certain rural development programs for projects that address substance use disorder. It also authorizes USDA to make similar temporary prioritizations in the future, to respond to public health disruptions in rural areas. P.L. 115-334 also establishes a new rural broadband program to finance middle mile infrastructure âinfrastructure that connects a local network to the internet backbone. The law also authorizes a new grant program to support high-wage jobs and new businesses in rural areas. P.L. 115-334 directs USDA to establish Tribal Promise Zones, which are to receive priority consideration for certain federal grant programs. Other new rural development provisions relate to broadband deployment, precision agriculture, and rural community development. P.L. 115-334 reauthorizes and amends a number of existing rural development programs. It adds a grant component to the Rural Broadband Access Loan Program and increases the authorization of appropriations from $25 million to $350 million per year for FY2019-FY2023. To be eligible for newly authorized grants, at least 90% of households in a service area must lack access to sufficient broadband service. The law also amends eligibility criteria for program loans, raising the percentage of households in an eligible service area that must lack access to sufficient broadband service from 15% to 50% of households. P.L. 115-334 codifies the Community Connect Grant Program and authorizes appropriations of $50 million per year for FY2019-FY2023. It also increases the authorizations of appropriations for the Emergency and Imminent Community Water Assistance Program, the Rural Decentralized Water Systems Program (formerly the Household Well Water Systems Program), and water and wastewater technical assistance and training programs. The law also amends the Cushion of Credit Program to terminate deposit authority and incrementally reduce the interest rate that accrues to borrowers. P.L. 115-334 amends certain definitions of rural used to determine eligibility for RD programs. It amends the definition of rural for certain housing and broadband programs to exclude incarcerated populations and the first 1,500 people residing on a military base. It also increases to 50,000 the maximum population of communities eligible for guaranteed loans under the Community Facilities and Water and Waste Disposal programs. The law reestablishes the position of Under Secretary of Agriculture for Rural Development as a permanent position within USDA, subject to Senate confirmation. USDA had eliminated the position in 2017 and replaced it with the Assistant to the Secretary for Rural Development, a position that did not require Senate confirmation. The 2018 farm bill also repeals the Rural Telephone Bank and grants to rural broadcasting systems, among other programs.", "document_type": "crs"}
{"report": "The U.S. Constitution establishes a two-step process for the House and Senate to remove federal officialsâincluding the President, Vice President, judges, and other civil officersâfor \"Treason, Bribery, or other high Crimes and Misdemeanors.\" Under the Constitution, the House alone has the power to formally chargeâthat is, impeachâa federal official. A House majority can accomplish this by adopting articles of impeachment, which are effectively written accusations (similar to an indictment in ordinary criminal proceedings). The Senate alone has the power to try an impeachment and render a verdict regarding whether the individual should be removed from office and possibly barred from holding future office. Two-thirds of Senators voting must agree to convict and remove an official from office. The Senate could also separately decide to disqualify an officer from holding future federal office. Disqualification requires only a majority vote. The procedures the House has developed for accomplishing this constitutional responsibility are described below. The House has used this process mostly to impeach federal judges, although the House has also impeached two Presidents and one Cabinet official. The Senate has voted to remove eight of these officials, and all of them were federal judges. The summary of the rules and procedures the House might use to impeach a federal official presented here is drawn from published sources of congressional rules and precedents, as well as the public record of past impeachment proceedings. It relies as well upon in-depth research conducted by Betsy Palmer and Susan Navarro Smelcer, formerly of CRS, on the practice in both chambers with respect to the impeachment of federal judges. This report provides an overview of the procedures and should not be treated or cited as an authority on congressional proceedings. Consultation with the Parliamentarian of the House is always advised regarding the possible application of rules and precedents. For more information on impeachment, including a discussion of which federal officers are subject to impeachment and possible grounds for impeachment, see CRS Report R44260, Impeachment and Removal , by Jared P. Cole and Todd Garvey. The impeachment process may be initiated as the result of various actions and events, including the receipt and referral of information from an outside source, investigations by congressional committees under their general authority, or the introduction of articles of impeachment in the form of a House resolution. Regardless of what might instigate an inquiry into whether impeachment is warranted, there are normally three formal stages of congressional action. First, an impeachment inquiry is authorized, and this is most often accomplished through the adoption of a simple resolution (H.Res.___) directing the Judiciary Committee to investigate an official. Second, the committee conducts its investigation, prepares articles of impeachment, and reports them to the House. Third, the full House considers the articles of impeachment and, if they are adopted, appoints managers from the committee to present the articles in the Senate. As discussed in detail below, the House relies upon many of its usual procedures to consider the resolution explicitly initiating an investigation, conduct the investigation, and consider the articles of impeachment. A Member can initiate an impeachment process by drafting a simple resolution and placing it in the House hopper, the way all simple resolutions are submitted to the House. If the resolution directly calls for an impeachment, it will be referred to the Committee on the Judiciary. If it instead calls for an investigation of an official by a standing committee or proposes the creation of a special committee for that purpose, the resolution will be referred to the Committee on Rules, which has jurisdiction over the authorization of committee investigations. No special procedures restrict when such a resolution can be submitted, although historically they have been submitted relatively infrequently. A resolution calling for an impeachment can also be offered on the floor by any Member as a question of the privileges of the House instead of being submitted through the hopper. To do so, a Member gives notice of his or her intent to call up such a resolution. The Speaker must then schedule a time to consider the resolution within two legislative days. (The majority and the minority leader do not need to give notice; if either leader raises a qualifying question of privileges of the House on the floor, it is considered immediately.) The full House could dispose of an impeachment resolution raised in this fashion in any number of ways, including by referring it to the Judiciary Committee instead of by voting on the resolution directly. The House could also agree to a motion to table the resolution and thereby dispose of it permanently and adversely. Impeachment has been attempted using this method in recent years, but none of the attempts has resulted in approval of articles of impeachment. In cases in which an official has been impeached, the House has always chosen to conduct an investigation first. A resolution offered from the floor that proposed a committee investigation, instead of directly impeaching an officer, would not give rise to a proper question of the privileges of the House. Material related to the conduct of a federal official might reach the House and be referred to committee prior to the adoption of a resolution directing a committee to conduct an investigation. Historically, this has included petitions and materials from citizens. In addition, standing committees, under their general investigatory authority, can seek information and research charges against officers prior to the approval of a resolution to authorize an impeachment investigation. With respect to federal judges, the Judicial Conduct and Disability Act of 1980 established a process within the judicial branch for responding to complaints about judges. Findings from those investigations could result in the Judicial Conference of the United States informing the House that the impeachment of a judge may be warranted. A letter reporting that the Judicial Conference had reached such a determination would be referred to the Judiciary Committee. Recent impeachments of federal judges were initiated by resolutions submitted after (or near the time of) the receipt of such a determination from the Judicial Conference. In the last presidential impeachment, a communication from the independent counsel appointed to investigate President Bill Clinton was referred to the Committee on the Judiciary pursuant to an original resolution reported by the Rules Committee. The resolution also directed the Judiciary Committee to review the information from the independent counsel \"to determine whether sufficient grounds exist to recommend to the House that an impeachment inquiry be commenced.\" The House, in this case, later adopted a resolution reported by the Judiciary Committee to authorize an investigation by the committee. If a resolution authorizing an impeachment investigation was introduced through the hopper and referred to the Rules Committee, that committee would then choose whether to report the resolution to the full House for consideration. If reported, the resolution would be privileged, which means a Member could call it up on the floor, though only at the direction of the Rules Committee. The resolution would then be considered under the hour rule, a method of considering legislation in the House that permits Members to speak for up to an hourâbut also allows a numerical majority to vote to end debate and limit the opportunity for amendment. Specifically, the Member who called up the resolution would be recognized for one hour. Debate on the resolution would likely last for that hour or even less, because a majority in the House could agree to order the previous question on the resolution. When the House votes to order the previous question, it ends debate and any opportunity for amendment. A motion to recommit the resolution with or without instructions could be offered after the previous question was ordered, but it would not be debatable. The House could also, however, choose to consider the resolution under any of its other regular processes, including suspension of the rules (requiring a two-thirds vote for passage), a rule from the Rules Committee (requiring only a majority vote), or unanimous consent. The two most recent resolutions adopted by the House to authorize an impeachment investigation were taken up by unanimous consent at the request of the Rules Committee chair. Rather than convene a committee meeting to order the resolutions reported with a quorum present, the chair asked unanimous consent that the House discharge the Rules Committee and agree to the resolution. Both of these resolutions concerned federal judges, and they were agreed to without debate. In the three previous instances of judicial impeachments, however, the House did not approve a resolution explicitly authorizing an impeachment inquiry. The Rules of the House since 1975 have granted committees the power to subpoena witnesses and materials, administer oaths, and meet at any time within the United Statesâpowers that were previously granted through resolutions providing blanket investigatory authorities that were agreed to at the start of a Congress or through authorizing resolutions for each impeachment investigation. In two of the three recent cases, the House agreed to separate resolutions to allow committee counsel to take affidavits and depositions. If the House does approve an authorizing resolution, then in addition to the Rules Committee, the Judiciary Committee can report an original resolution authorizing an impeachment investigation if impeachment resolutions have been referred to the committee. In the case of the most recent authorization of a presidential impeachment inquiry, the Judiciary Committee reported such a resolution, and the full House debated it. As mentioned above, pursuant to a resolution agreed to by the House, the Judiciary Committee reviewed material submitted by an independent counsel appointed to investigate President Bill Clinton. The Judiciary Committee then reported a resolution ( H.Res. 581 , 105 th Congress) authorizing an investigation into whether sufficient grounds existed for the impeachment of the President. The resolution was privileged for immediate consideration. The chair of the Judiciary Committee called up the resolution and asked unanimous consent that instead of being recognized for the normal one hour, his time be extended to two hours, half of which he would yield to the ranking member of the Judiciary Committee for purposes of debate only. After debate under the terms of this unanimous consent agreement, the House ordered the previous question on the resolution by voice vote, ending further debate of the resolution. A minority-party Representative offered a motion to recommit, and, pursuant to a unanimous consent agreement, the motion was debated for 10 minutes before being defeated on a roll call vote. As noted, absent this unanimous consent agreement, the motion to recommit would not have been debatable. The resolution was then agreed to by a record vote, 258-176. In the 93 rd Congress (1973-1974), multiple resolutions to impeach President Richard M. Nixon were introduced and referred to the Judiciary Committee. The committee began an examination of the charges against the President under its general investigatory authority. The House also approved a resolution, reported by the House Rules Committee, providing additional investigation authority that did not specifically mention impeachment. In late 1973, the House agreed to another resolution that provided for additional expenses of the committee, and floor debate and the report from the Committee on House Administration indicate that the funds were intended in part for the impeachment inquiry. On February 1, 1974, the Judiciary Committee reported an original resolution ( H.Res. 803 ; H.Rept. 93-774) mandating an investigation to determine whether the House should impeach President Nixon and continuing the availability of funds. On February 6, 1974, the chairman of the Judiciary Committee called up the resolution as a question of privilege. It was debated under the hour rule, with the chairman yielding time to other Members for purposes of debate only. The Judiciary Committee chair moved the previous question before any other Member was recognized to control time under the hour rule, and the House ordered the previous question 342-70. The resolution authorizing the investigation was then agreed to, 410-4. The standing rules of the House that affect committee investigations apply as well to impeachment investigations by the Judiciary Committee. A resolution authorizing an impeachment investigation might place additional limitations, or grant additional authorities, to the committee. In addition, the committee itself might adopt rules specific to an impeachment inquiry. It has not been unusual for the Judiciary Committee to authorize subcommittees or to create task forces to conduct impeachment investigations, and in that case the full committee would establish the authority of the subcommittee or task force. Under House Rule XI, committees have the authority to subpoena persons or written records, conduct hearings, and incur expenses (including travel expenses) in connection with investigations. Rule XI, clause 2(h)(2), requires two committee members to take testimony or receive evidence. In past impeachment proceedings, the House has agreed to resolutions authorizing committee staff to take depositions without Members present, and the Judiciary Committee has agreed to internal guidelines for the mode and conduct of depositions. In the 116 th Congress, pursuant to H.Res. 6 , the chairs of all standing committees (except the Rules Committee) as well as the Permanent Select Committee on Intelligence may order the taking of depositions by committee counsel. In modern practice, the federal official under investigation is generally allowed certain rights, including the right to be represented by counsel. If a committee were to conduct hearings, these proceedings would generally be governed by House and committee rules (and any specific rules agreed to in the authorizing resolution). Under House Rule XI, notice of hearings must be provided one week in advance, and members of the committee are guaranteed the right to question witnesses under the five-minute rule. Hearings are generally public, but they could be closed pursuant to regular House rules that allow the committee to agree, by holding a vote in public session with a majority of the committee present, to close a hearing for three specific reasons: the evidence or testimony would endanger national security, compromise sensitive law enforcement information, or would tend to \"defame, degrade, or incriminate the witness.\" Again, the resolution authorizing an impeachment investigation could alter these procedures. The Judiciary Committee conducted multiple public hearings in connection with the impeachment of federal judges in 2009. The committee had created a task force to investigate whether two federal judges should be impeached. The task force conducted hearings during which they heard from a variety of witnesses, including law professors with expertise on impeachable offenses, individuals with information about the crimes the judges were accused of committing, and task force attorneys who reported on the status of the investigation. In 1998, the Judiciary Committee held four hearings in connection with the impeachment of President Clinton. The committee received testimony from 19 experts on the history of impeachment at one hearing and from the independent counsel at another. Various witnessed testified at a third hearing on the consequences of perjury and related crimes. Over two days of hearing in early December 1998, at the request of the Administration, the committee also heard testimony from White House counsel. In recent decades, it has been more common than not that a congressional committee used information provided from another outside investigation. In four of the five judicial impeachment investigations undertaken by the Judiciary Committee since 1980, \"the accused judge had either been subject to a federal criminal trial or pled guilty to a federal criminal charge prior to the initiation of impeachment proceedings in the House.\" In the case of the impeachment of President Bill Clinton, as mentioned above, the results of an independent counsel investigation alleging impeachable offenses were submitted to the House and referred to the Judiciary Committee. A committee charged with investigating impeachable offences might, after conducting its investigation and reviewing any evidence submitted from other investigations, meet to consider articles of impeachment, and such a meeting is referred to as a markup. The articles of impeachment are in the form of a simple resolution (H.Res.___). The procedures for considering and reporting out an impeachment resolution are the same as those used for other legislation. Notice must generally be given of the proposed meeting, and the text of the articles of impeachment must generally be available 24 hours in advance of the meeting, although House Rule XI, clause 2 (g)(3)(B), provides some exceptions to these requirements. Members of the committee could expect an opportunity to offer amendments to the articles of impeachment, which would be debated under the five-minute rule. Importantly, a majority of the committee must be physically present at the time of the vote to report. Alternatively, after an investigation, the committee might also choose to report a recommendation that impeachment was not warranted. In the case of the two most recent presidential impeachments, the Judiciary Committee held a public, televised markup of the impeachment articles for several days. A motion to recommend a resolution to impeach President Nixon was considered by the Judiciary Committee for six days at the end of July 1974. The committee agreed to special procedures for the markup, such as a 10-hour period for \"general debate,\" and each article of impeachment was considered separately for amendment. The resolution included two articles of impeachment, which were both agreed to, as amended. A third article of impeachment was proposed as an amendment and agreed to, and two additional articles offered as amendments were rejected. The President resigned before the committee reported an impeachment resolution to the full House. In 1998, the Judiciary Committee considered articles impeaching President Clinton for three days in December under procedures modelled after those used in 1974. A unanimous consent agreement provided that the four articles of impeachment included in the chairman's draft resolution would be debated, amended, and voted on separately. Each member of the committee was allotted 10 minutes for an opening statement. The committee considered and agreed to an amendment to Article I and an amendment to Article IV. All four articles were agreed to, and a resolution ( H.Res. 611 , 105 th Congress) was reported to the House. A written report was prepared and several Members submitted additional, minority, and dissenting views, a right protected under House Rule XI, clause 2(l), if notice of intent is given at the time a committee approves a matter. Under House Rule XI, clause 2(e), committee records are the property of the House, and all Members can have access to them. The committee may, however, place reasonable restrictions on where, when, and how Members might access the records. In addition, access to committee investigatory material might be limited, at least for a time, while the committee determines if it qualifies as a committee record under House Rule XI, and, if so, if release is prohibited pursuant to other House rules. A committee might also take actions to protect the confidentiality of investigative materials. The primary mechanism by which an investigating committee can and has chosen to limit access to inquiry information is through the use of executiveâor closedâsession. Under House Rule XI, clause 2(g)(1), a committee can operate in executive session by majority vote, a quorum being present, to restrict attendance at a business session to only committee members or others authorized by the committee. Similarly, a committee can receive evidence or testimony as if in executive session, which, under Rule XI, clause 2(k)(7), may only be released through authorization by the committee. Even when access to information received in executive session is granted to Members, the material may be subject by the committee to further conditions under which it may be viewed. In addition, the copying, releasing, or taking notes on materials received in executive session is strictly prohibited without permission of the committee. Executive sessions were periodically used during the inquiries into Presidents Nixon and Clinton. Further restrictions on access to information can be adopted by the House or the investigating committee. As previously mentioned, the Judiciary Committee adopted special procedures by unanimous consent in 1974 that, among other provisions, limited access to information to select individuals within the committee and laid out rules for staff. As a precursor to the formal impeachment inquiry of President Clinton, the House agreed to H.Res. 525 during the 105 th Congress directing the Judiciary Committee to review the independent counsel's report to Congress to determine if impeachment proceedings were warranted. Section 4 of the resolution limited access to executive session material to the Judiciary Committee and employees designated by the chairman and ranking memberâa more strict requirement than called for under House Rule XI. Notably, the resolution also made 445 pages of the independent counsel's report immediately available to the public and set a deadline by which the rest of the report would be released from its executive session status based on recommendations by the committee. Prior to the adoption of H.Res. 525 , House leadership reportedly discussed at length the issue of access to the independent counsel report by the public, the President, and Members of the House. Although floor consideration of an impeachment resolution largely resembles floor consideration of legislation, there is one difference regarding disorderly language: Under regular House procedures, it is not in order to use language that is personally offensive toward the President, which would include accusations that the President committed a crime or allusions to unethical behavior. During consideration of an impeachment resolution, however, remarks in debate can refer to the alleged misconduct of the President that is under consideration by the House. Members should still abstain from other language \"personally offensive\" to the President. Articles of impeachment reported by the Judiciary Committee are privileged for immediate consideration on the House floor. The chair of the committee (or a designee) could call up the resolution containing the articles at any time other business is not pending, and the resolution would be considered immediately under the hour rule. Under this procedure, a majority of the House controls the length of debate and can prevent amendment. After some debate, the majority could vote to order the previous question, which, as mentioned above, brings the House to an immediate vote on the main question: whether to agree to the impeachment resolution, in this case. Passage is by simple majority vote. A motion to recommit the impeachment resolution, with or without instructions, would be in order after the previous question was ordered but before the vote on the resolution. This motion, however, would not be subject to debate. As is always the case, any instructions in the motion to recommit must be germane to the resolution. In the two most recent instances in which the House considered an impeachment resolution of a federal judge, the resolution was called up as privileged and debated for an hour, and no Member offered a motion to recommit. In both cases, a Member demanded a division of the resolution, which allowed the House to vote separately on each article of impeachment. When the House considered a resolution ( H.Res. 611 , 105 th Congress) to impeach President Clinton, the reported resolution was called up as a question of privilege. A unanimous consent request propounded by the majority floor manager that provided for four hours of debate on the resolution, equally divided, and 10 minutes of debate on a motion to recommit was objected to. The House then considered the resolution for several hours, as no Member moved the previous question, until another unanimous consent agreement was propounded and agreed to. This agreement allowed debate to continue until 10 p.m. that night and provided for an additional hour of debate the next day, a Saturday. It further provided that if a motion to recommit with instructions was offered, it would be debatable for 10 minutes. On the second day of consideration, after the previous question was ordered, a Member moved to recommit the impeachment resolution with instructions. The instructions proposed an amendment to censure the President. The Speaker, however, ruled that the amendment in the instructions was not germane. The House sustained the ruling of the Speaker by voting to table an appeal. A Member demanded a division of the resolution, and the House agreed to two of the four articles of impeachment under consideration. In the case of the Nixon impeachment proceedings, the full House never acted on a resolution of impeachment. As noted, President Nixon resigned before the Judiciary Committee reported its recommendation that the President be impeached. The House approved a resolution using the suspension of the rules procedure acknowledging that the Judiciary Committee had approved articles of impeachment, commending the members of the Judiciary Committee for their work, and providing for the printing of its report. Rather than considering an impeachment resolution under the hour rule, the House could also choose to consider an impeachment resolution under the terms of a resolution reported by the Rules Committee (a special rule). This process would operate in the same two-step way it does for major legislation in the House. The House would first debate the Rules Committee-reported resolution setting the terms for consideration of the impeachment resolution. The rule from the Rules Committee could provide for a particular length of debate, structure any amendment process, and potentially structure voting to allow each article to be voted on separately. It could preclude motions that would otherwise be in order under the hour rule, such as a motion to table the resolution. After the House agreed to the rule, it would then consider the impeachment resolution under the terms established by that rule. Finally, consideration and debate of an impeachment resolution could be governed by a unanimous consent agreement. The House might take up the resolution by unanimous consent or call it up as a question of privilege and change the terms of its consideration by unanimous consent, such as was described above in the case of the Clinton impeachment resolution. A unanimous consent agreement can structure consideration just like a special rule, but it is agreed to without a vote and usually with little or no floor debate. The major difference is that, procedurally, it is necessary for all Representatives to support a unanimous consent agreement, while only a simple majority is necessary to agree to a special rule. The fact that the same terms for consideration could be established through a rule can influence unanimous consent agreements. As described in an earlier section of this report, any Member of the House could also offer on the floor a resolution containing articles of impeachment as a \"question of the privileges of the House.\" Taking this action will not necessarily result in a direct vote on the articles of impeachment or even debate of the articles, because the House could choose instead to take a different action on the resolution, such as to refer it to the Judiciary Committee. To raise a question of the privileges of the House, a Member would take the following steps: Draft a resolution containing articles of impeachment. Consult with the Office of the House Parliamentarian to ensure that the resolution qualifies as a question of the privileges of the House. On the House floor, rise to give notice of intent to offer a question of the privileges of the House. The Member giving notice reads the draft resolution in full on the floor. (The majority and minority leader do not need to give notice; a question of the privileges of the House raised by either leader would be considered immediately.) The Speaker is required to schedule consideration of the question of the privileges of the House within two legislative days. At a time scheduled by the Speaker, rise to offer the resolution as a question of the privileges of the House. The Speaker will rule as to whether the resolution constitutes a proper question of the privileges of the House. If it does, the resolution will be assigned a number and will be pending before the House for consideration. A question of the privileges of the House is considered under the hour rule. Often, the House votes to dispose of such resolutions by referring them to committee or by tabling them. The House could also order the previous question to end debate on the resolution and then vote directly on it. However, the House has never impeached an officer without a committee investigation. After the House has agreed to articles of impeachment, it then appoints Members to serve as managers in the Senate trial. In recent practice, the House has appointed managers by agreeing to a House resolution. The House also, by resolution, informs the Senate that it has adopted articles of impeachment and authorizes the managers to conduct the trial in the Senate. The House could agree to separate resolutions or, as has been the case with recent impeachments, to a single resolution accomplishing each of these purposes. Such resolutions are privileged, and sometimes they have been taken up and agreed to by unanimous consent. After the Senate receives the resolution(s) from the House, the Senate informs the House when the managers can present the articles of impeachment to the Senate. At the appointed time, the House managers read the resolution authorizing their appointment and the resolution containing the articles of impeachment on the Senate floor and then leave until the Senate invites them back for the trial. At the trial, the House managers, who might be assisted by outside counsel, present evidence against the accused and could be expected to respond to the defense presented by the accused (or his or her counsel) or to questions submitted in writing by Senators. A full description of Senate procedures in an impeachment trial is beyond the scope of this report. The Senate has a special set of rulesâagreed to in the 19 th centuryâthat provide some guidance for impeachment trial proceedings. However, in modern practice the Senate has agreed to alternative or supplemental procedures both for judicial impeachment trials and the impeachment trial of President Clinton. The 19 th -century impeachment trial rules seemingly require a series of actions by the Senate upon the receipt of articles of impeachment from the House. The Senate, however, just like the House, can set aside its rules by, for example, agreeing to a simple resolution. Under the regular rules of the Senate that govern consideration of legislation, such a resolution would not be subject to any debate restrictions. As a result, in that circumstance, a cloture process, requiring the support of three-fifths of the Senate, would be necessary to reach a vote on the resolution. Once the Senate has convened as a Court of Impeachment, however, the impeachment trial rules, not the regular rules of the Senate, will apply. The Senate impeachment trial rules and related precedents restrict debate on many resolutions and motions. The debate restrictions could allow a simple majority to determine some procedures for responding to articles of impeachment sent from the House.", "summary": "Under the U.S. Constitution, the House of Representatives has the power to formally charge a federal officer with wrongdoing, a process known as impeachment. The House impeaches an individual when a majority agrees to a House resolution containing explanations of the charges. The explanations in the resolution are referred to as \"articles of impeachment.\" After the House agrees to impeach an officer, the role of the Senate is to conduct a trial to determine whether the charged individual should be removed from office. Removal requires a two-thirds vote in the Senate. The House impeachment process generally proceeds in three phases: (1) initiation of the impeachment process; (2) Judiciary Committee investigation, hearings, and markup of articles of impeachment; and (3) full House consideration of the articles of impeachment. Impeachment proceedings are usually initiated in the House when a Member submits a resolution through the hopper (in the same way that all House resolutions are submitted). A resolution calling for the impeachment of an officer will be referred to the Judiciary Committee; a resolution simply authorizing an investigation of an officer will be referred to the Rules Committee. In either case, the committee could then report a privileged resolution authorizing the investigation. In the past, House committees, under their general investigatory authority, have sometimes sought information and researched charges against officers prior to the adoption of a resolution to authorize an impeachment investigation. Impeachment proceedings could also be initiated by a Member on the floor. A Member can offer an impeachment resolution as a \"Question of the Privileges of the House.\" The House, when it considers a resolution called up this way, might immediately vote to refer it to the Judiciary Committee, leaving the resolution in the same status as if it had been submitted through the hopper. Alternatively, the House might vote to table the impeachment resolution. The House could also vote directly on the resolution, but in modern practice, it has not chosen to approve articles of impeachment called up in this fashion. Instead, the House has relied on the Judiciary Committee to first conduct an investigation, hold hearings, and report recommendations to the full House. Committee consideration is therefore typically the second stage of the impeachment process. In recent decades, it has been more common than not that the Judiciary Committee used information provided from another outside investigation. The committee might create a task force or a subcommittee to review this material and collect any other information through subpoenas, depositions, and public hearings. Impeachment investigations are governed by the standing rules of the House that govern all committee investigations, the terms of the resolution authorizing the investigation, and perhaps additional rules adopted by the committee specifically for the inquiry. If the committee determines that impeachment is warranted, it will mark up articles of impeachment using the same procedures followed for the markup of other legislation. If the Judiciary Committee reports a resolution impeaching a federal officer, that resolution qualifies for privileged consideration on the House floor; its consideration is the third stage of the impeachment process. The resolution can be called up at the direction of the committee and considered immediately under the hour rule in the House. If called up this way, amendments could be precluded if a majority voted to order the previous question. A motion to recommit, with or without instructions, is in order but is not subject to debate. Alternatively, the House might alter these procedures by unanimous consent to, for example, set a longer time for debate or to allow brief debate on a motion to recommit. A resolution reported from the Rules Committee could also be used to structure floor debate. If the House approves the impeachment resolution, it will appoint managers to present and argue its case against the federal officer in front of the Senate.", "document_type": "crs"}
{"report": "The Transportation Investments Generating Economic Recovery (TIGER) grant program is a discretionary program providing grants to projects of national, regional, or metropolitan-area significance in various surface transportation modes on a competitive basis, with recipients selected by the federal Department of Transportation (DOT). It originated in the American Recovery and Reinvestment Act (ARRA; P.L. 111-5 ), where it was called \"national infrastructure investment\" (as it has been in subsequent appropriations acts). Beginning with the FY2018 round of grants, DOT renamed the program the Better Utilizing Investments to Leverage Development (BUILD) program. Unless otherwise noted, all dollar amounts in this report are expressed in 2019 dollars to adjust for inflation over the life of the program, and all percentages are calculated on that basis. These figures therefore do not correspond to DOT data, which in general are not adjusted for inflation. The TIGER program began in the depths of the 2007-2009 recession as a way to both improve transportation infrastructure and stimulate economic activity. For much of its existence it was virtually the only significant discretionary surface transportation grant program, and virtually the only program that allowed local communities to apply for and receive highway funding directly from the federal government rather than through their state's department of transportation, which might have different priorities than the community. One of President Obama's first acts after taking office in January 2009 was to propose an economic stimulus bill. Congress passed ARRA after roughly a month of intense debate. The bill provided over $700 billion to stimulate the economy, mostly through reductions in taxes. It authorized $43 billion for transportation infrastructure, including $1.5 billion for a discretionary grant program to make capital investments in surface transportation infrastructure, which Congress labeled \"national infrastructure investment.\" In implementing this new program, DOT retitled it Transportation Investments Generating Economic Recovery, although the annual DOT appropriations act continues to refer to it as national infrastructure investment. The program initially had two goals: to make investments that would improve the condition of the nation's surface transportation infrastructure, and to do so quickly to provide immediate stimulus to the economy. Thus ARRA required DOT to give priority to projects that were expected to be completed by February 17, 2012, three years after the legislation was enacted. Since it took nearly a year for DOT to set up an office to manage the program, solicit applications, review them, and select which projects to award, the process favored projects that could be completed within two years. The initial awards were announced on February 17, 2010. In that first round, DOT received 1,497 applications requesting $72.5 billion. It awarded 51 grants totaling $1.69 billion. See Table 3 for details about annual applications and awards. Unless otherwise noted, all dollar amounts in this report are expressed in 2019 dollars to adjust for inflation over the life of the program, and all percentages are calculated on that basis. These figures therefore do not correspond to DOT data, which in general are not adjusted for inflation. During the early 2000s, transportation authorization and appropriations bills included growing numbers of earmarks directing discretionary grants to specific projects. In response to criticism of this practice, in 2011 the Republican conferences in both the House and the Senate prohibited Members from requesting earmarks. In his State of the Union Address on January 25, 2011, President Obama vowed to veto any legislation containing earmarks. In the 2012 surface transportation reauthorization legislation, the Moving Ahead for Progress in the 21 st Century Act (MAP-21; P.L. 112-141 ), Congress reduced opportunities for earmarking by abolishing most of DOT's discretionary grant programs, providing virtually all federal surface transportation funding to recipients based on formulas. The TIGER grant program, which has been funded in the annual DOT appropriations acts and was not included in MAP-21, became one of the few remaining discretionary transportation grant programs. The Obama Administration did not support continuing the program in its FY2010 and FY2011 budgets, but requested funding in FY2012 and following years. A pattern emerged in which the Republican majority in the House of Representatives proposed cutting funding or eliminating it altogether, the Senate supported the program, and the program ultimately received funding in each year's appropriations legislation. Since the Democratic Party regained the House majority in the 2018 midterm election, the House has supported sizable increases in the program ( Table 1 ). Since Congress has continued the TIGER/BUILD program on an annual basis, the annual DOT appropriations act gives Congress the opportunity to adjust the criteria for the program each year. Some criteria, such as a requirement that DOT must ensure an equitable distribution of grant funds geographically and between urban and rural areas, have been the same since the first year. Other criteria, such as the minimum and maximum grant size, have changed frequently. In general, the trend has been toward distributing the funding to a larger number of grantees (through such measures as lowering the maximum grant size). Table A-1 summarizes the changes in many of the program's grant criteria over the past decade. Born in the anxious days of early 2009, when there was genuine concern about the state of the U.S. economy, the initial focus of the TIGER/BUILD grant program was twofold: to make grants to surface transportation projects that would improve the nation's transportation infrastructure and that would be able to spend the money quickly in order to stimulate the economy. Other considerations included the likelihood of on-time completion and the benefits of the project compared to the costs. In subsequent years, as the economy began to recover, DOT added additional merit criteria to its project selection, as shown in Table 2 .These criteria were determined administratively, and have not been specified in appropriations legislation providing funds for the program. Some of these criteria can conflict with each other in specific instances. For example, a project could reduce congestion-related emissions on a roadway by supporting alternatives (e.g., transit improvements) or by altering the roadway to reduce congestion (e.g., adding lanes, adjusting traffic signal timing, reshaping intersections). The first option might also reduce dependence on oil, whereas the second might increase dependence on oil while reducing emissions and improving the efficiency of the movement of goods and people. How DOT reconciles such conflicts has not been disclosed. Beginning with the first round of awards in FY2009, each annual grant announcement has noted that the amount of funding applied for has greatly exceeded the amount of funding available through the program (see Table 3 ). After the relatively large first-year appropriation, in succeeding years the amount provided was around one-third of the first year of funding. The total amount applied for also dropped significantly after the first year. The reasons for the decline in funding may include the opposition of the House of Representatives to funding the program (see Table 1 ), the general limitations on the amounts provided in appropriations bills, and the competition for that funding among the proponents and constituencies of different programs. One possible reason for the dramatic decline in the amount applied for from FY2016 to FY2017 was the reduction in the maximum grant size that Congress decreed for FY2017 (and succeeding years), from a maximum of $100 million in FY2016 to $25 million in FY2017. Of the $9.8 billion applied for in FY2016, $3.8 billion was represented by a total of 87 applications that exceeded $25 million (nominal) and thus exceeded the maximum limit for FY2017. The combination of that lowered cap on grant amounts, combined with the introduction of several new discretionary transportation grant programs beginning in FY2017, may explain part of the decline in the amount applied for in FY2017. The amount applied for rose in FY2018, when the amount of funding available tripled. One of the directives Congress gave DOT regarding the distribution of TIGER/BUILD grants was that DOT \"shall ensure an equitable geographic distribution.\" Beyond using the term \"equitable,\" the only other legislative guidance on this point is the limitation on the amount of the program funding that can be awarded to projects in a single state. That limit ranged from a high of 25% to a single state during the FY2010-FY2015 rounds to a low of 10% during the FY2017-FY2019 rounds. There have been a total of 553 grants awarded over the period FY2009-FY2018. Every state and most territories have received at least one grant; America Samoa and the Northern Marianas Islands have not received a grant. California has received the most funding, 6.9% of the total over that period; that is considerably less than California's share of the total U.S. population (12.1%). Of the top 10 states by share of grant funding received, Texas, New York, Pennsylvania, and Florida also received smaller shares of funding than their shares of the nation's population, while Illinois, Washington, Massachusetts, and Missouri received larger shares of funding than their shares of the population (see Table 4 ). It would be difficult for DOT to match the funding awarded to each state's share of the nation's population, since projects are not distributed proportionally among the states on the bases of cost, merit, and number. Another congressional directive, in place since the second year of the program, is that DOT \"shall ensure an appropriate balance in addressing the needs of urban and rural areas.\" DOT has responded to this directive in different ways over time. In the first year (FY2009) of the program, 7% of the funding went to projects in rural areas. Since then, Congress has directed that a specific minimum share of the grant funding go to projects located in rural areas. That share has typically been around 20% to 30% (see Table 5 and Figure 1 ). The definition of rural and urban areas used by the TIGER/BUILD Grant program has varied from that used by the U.S. Census Bureau. The Census Bureau defines urban areas as both Urbanized Areas of 50,000 or more people; Urban Clusters of at least 2,500 and less than 50,000 people. Rural areas are defined as those areas not included within an urban area. By this definition, 81% of the U.S. population lived in urban areas and 19% in rural areas over the 2011-2015 period. For most of its history, the TIGER/BUILD program has defined urban areas as areas located in an Urbanized Area, and rural areas as everything else. Urban Clusters as defined by the Census Bureau were thus considered rural areas for purposes of the program. By this definition, roughly 70% of the U.S. population lived in urban areas and 30% in rural areas in 2015. During the period FY2009-FY2016, the proportion of TIGER/BUILD grant funding awarded to projects in rural areas as defined by the program, measured in 2019 dollars, was around 21%. In the program's 2017 Notice of Funding Opportunity (NOFO), the new Trump Administration announced that it would give special consideration to projects in rural areas. No rationale for this special consideration has been given, but one is implied in the observation that \"While only 19 percent of the nation's population lives in rural areas, 51 percent of all traffic fatalities occurred on rural roads (2014).\" In announcing the FY2017 round of awards, the Secretary of Transportation noted that \"an effort was made to re-balance the under-investment in rural communitiesâto address overlooked needs.\" This assertion that there had been under-investment in the transportation needs of rural communities was reiterated in the FY2018 NOFO; that assertion is not included in the FY2019 NOFO, but that document reiterates that special consideration will be given to project applications from rural areas. Under this new policy, the proportion of program funding requested for rural areas rose from 35% in the FY2016 round to 44% in the FY2017 round, and the share of program funding awarded to rural areas rose from 21% to 65% (see Table 5 ). Another factor that may have influenced this shift is that although the amount of grant funding available in the FY2017 round ($500 million) was the same as in the previous couple of rounds, the number of applications and amount of funding applied for dropped significantly in FY2017, particularly from urban areas (see Table 6 ). Why that happened is not clear. The current surface transportation authorization act (MAP-21), which was enacted in December 2015, created several new discretionary grant programs for surface transportation; that, combined with the new lowered cap of $25 million on maximum TIGER/BUILD grant sizes that took effect in FY2017, may have led sponsors of more expensive projects, which are often located in urban areas, to seek funding from the new grant programs rather than from the TIGER/BUILD program. The Administration's stated rationales for prioritizing funding for projects in rural areas are open to question. While 71% of the nation's roads are in rural areas, they account for only 30% of total vehicle miles traveled, and over the period FY2009-FY2015, 37% of federal highway funding went to rural roads. Rural roads are on average in better condition than urban roads; in 2012 93% of the vehicle miles traveled on rural roads were on roads with pavement conditions rated as acceptable or good, compared with 78% of the vehicle miles traveled on urban roads. The Administration's claim that safety factors justify directing two-thirds of BUILD grants to rural areas is only partially supported by available data. While a disproportionate share of highway deaths occurs on rural roads, that proportion has been trending downward, declining from around 60% in the early 2000s to 46% in 2017. The number of traffic fatalities in rural areas declined by 18% from 2008-2017, while the number of fatalities in urban areas increased by 17% over the same period. Moreover, road conditions are only one factor among the reasons why the share of highway fatalities in rural areas exceeds the share of population in those areas. Other factors include driver behavior (e.g., higher typical speeds, lower rates of seat belt use, and higher driver fatigue rates), typically longer travel times for emergency medical care, and vehicle condition. In the FY2019 DOT appropriations act, Congress made two changes that may constrain the Administration's discretion to steer funding toward projects in rural areas: limiting the share of program funding that can go to rural areas to 50%, and changing the definitions of urban and rural areas used in the BUILD program. Urban areas would be defined as areas \"located within (or on the boundary of) a Census-designated urbanized area that had a population greater than 200,000 in the 2010 Census.\" Areas outside that are considered rural. By this definition, roughly 60% of the U.S. population lived in urban areas, and roughly 40% in rural areas, in 2015. Thus, some areas that in previous rounds of applications would have been considered urban areas would now be considered rural for the purposes of the BUILD program. How this change will affect the distribution of funds in FY2019 and subsequent years is unclear. Since the second year of the program, Congress has directed DOT to ensure that the program makes \"investment in a variety of transportation modes.\" A unique feature of the BUILD grant program is its flexibility: any surface transportation infrastructure is eligible for funding. Throughout most of the program's life, this flexibility has been reflected in the grants awarded; while road projects received more funding than projects in other modes, other modes collectively received two-thirds of the total program funding (see Table 7 ). This situation changed beginning with the FY2017 round of grants; for FY2017-FY2018, road projects received over two-thirds of the funding awarded, with the remainder divided among four other modes, one of whichâbicycle-pedestrian projectsâreceiving no funding at all. From the first round of funding through FY2017, Congress directed that grants be made for projects that will have a significant impact on the nation, a metropolitan area, or a region. Surface transportation projects that are likely to have a significant impact on the nation, or even a multistate region, are typically quite expensive; for example, Amtrak's Hudson River Tunnel Project, to replace the deteriorating tunnels that carry Amtrak and commuter trains under the Hudson River between New Jersey and New York, is estimated to cost over $11 billion. Given the relatively modest amounts of funding available for TIGER/BUILD grants each year and Congress's directive that grant funding be awarded equitably across the nation, between rural and urban areas, and among surface transportation modes, the amount of money any single project is likely to receive limits the ability of the TIGER/BUILD program to provide more than a small share of the funding needed to complete projects that could have a significant impact on the nation. The largest single grant awarded during the FY2009-FY2018 period was for $118.5 million, and that was for a project that spanned two states (see Table 8 ). Three grants have been awarded for more than $100 million; of the 553 grants awarded, few have been for more than $50 million. Of the 10 largest grants awarded, nine were awarded in the first year of the program, when available funding was far larger than in any subsequent year (see Table 8 ). Even though the maximum grant size permitted was $200 million from FY2010 to FY2015 and $100 million in FY2016, the largest grant awarded since FY2010 has been $25 million. The first year of grants also saw the largest average grant size, $33 million; in subsequent rounds of funding, the average size of grants in each round has fluctuated between $9 million and $17 million (see Table 9 ). In addition to the lower limit on the maximum grant amount, one factor that may have led to the decrease in the average size of grants after the first year was that the total amount of TIGER/BUILD grant funding available in each year until FY2018 was less than half the amount in FY2009, so DOT may have chosen to make smaller grants in order to distribute the available funding widely. In a 2014 review of the program, the U.S. Government Accountability Office (GAO) reported that while DOT had selection criteria for the TIGER grant program, it had sometimes awarded grants to lower-ranked projects while bypassing higher-ranked projects without explaining why it did so, raising questions about the integrity of the selection process. DOT responded that while its project rankings were based on transportation-related criteria, such as safety and economic impact, sometimes it had to select lower-ranking projects over higher-ranking ones to comply with other selection criteria established by Congress, such as geographic balance and a balance between rural and urban awards. In FY2018, the Notice of Funding Opportunity soliciting grant applications noted two changes to the program under the Trump Administration: the program was renamed the Better Utilizing Investments to Leverage Development (BUILD), and the practical reflection of that name change was a statement that DOT would give priority to grant applicants that provided new, nonfederal revenue for projects for which they were seeking BUILD funding. \"New revenue\" was defined as \"revenue that is not included in current and projected funding levels and results from specific actions taken to increase transportation infrastructure investment.\" Examples given in the notice included sales or gas tax increases, tolling, tax-increment financing, and asset recycling. Borrowing (issuing bonds) did not count as a new revenue source. DOT would not consider any source of revenue that had been authorized prior to January 1, 2015, as new revenue. The Administration presented this new stance as a way of increasing the leverage of federal funding to raise more revenue from other sources. Critics charged that the policy penalized states and localities that had already acted to raise more revenue for transportation projects. Critics also noted the irony of the Administration encouraging states and localities to provide additional revenue for transportation investment when Congress had been unable to increase the federal excise tax on motor fuel, the primary source of federal surface transportation revenues, since 1993. Critics also noted that favoring projects involving additional revenue from new sources posed a particular challenge for rural areas, as the number of residents who might pay a new sales tax or highway toll is by definition relatively low. Despite that concern, in the FY2018 round of awards, projects in rural areas received a higher proportion of the program's funding than ever before in the history of the program: 69% (see Table 5 ). The information about the projects receiving grants is not sufficiently detailed to show how much additional nonfederal revenue was raised in connection to the projects. In the FY2019 DOT Appropriations Act, Congress directed DOT not to use an applicant's ability to generate nonfederal revenue as a selection criterion in approving future BUILD grants. In 2016 and 2018 DOT published reports measuring the performance of projects that received TIGER grants. The reports state that, given the array of projects that can receive TIGER grants, measuring their performance is challenging and, for the same reason, valuable. DOT has required grantees to develop performance plans and measures for each project, beginning before the construction of the project and continuing for years after the project is completed. The sponsor of each project is responsible for setting up performance measures it considers relevant to its project. There is no requirement for comparability of the measures across projects. The DOT reports do not summarize the projects and their benefits. Rather, each presents a number of case studies of individual projects, including the performance measures chosen by each grantee.", "summary": "The Transportation Investments Generating Economic Recovery (TIGER) grant program is a discretionary program providing grants to surface transportation projects on a competitive basis, with recipients selected by the U.S. Department of Transportation (DOT). It originated in the American Recovery and Reinvestment Act of 2009 (ARRA; P.L. 111-5 ), where it was called \"national infrastructure investment\" (as it has been in subsequent appropriations acts); in FY2018 the program was renamed the Better Utilizing Investments to Leverage Development (BUILD) program. Although the program's stated purpose is to fund projects of national, regional, and metropolitan area significance, in practice its funding has gone more toward projects of regional and metropolitan-area significance. In large part this is a function of congressional intent, as Congress has directed that the funds be distributed equitably across geographic areas, between rural and urban areas, and among transportation modes, and has set relatively low minimum grant thresholds (currently $5 million for urban projects, $1 million for rural projects). The average grant size has been in the $10 million to $15 million range; such sums are only a small portion of the funding requirements for projects of national significance. The TIGER/BUILD program is not a statutory program. Congress has continued the program by providing funding for it each year in the annual DOT appropriations act. It is a popular program in part because for most of its existence it has been one of a few transportation grant programs that offer regional and local governments the opportunity to apply directly to the federal government for funding, and one of a few that offer states additional funding beyond their annual highway and public transportation formula funding. The program is heavily oversubscribed; over the 10-year period FY2009-F2018, the amount of funding applied for totaled around 24 times the amount of money available for grants. The U.S. Government Accountability Office (GAO) has reported that, while DOT has selection criteria for the TIGER grant program, it has sometimes awarded grants to lower-ranked projects while bypassing higher-ranked projects without explaining why it did so, raising questions about the integrity of the selection process. DOT has responded that while its project rankings are based on transportation-related criteria, such as safety and economic impact, it must sometimes select lower-ranking projects over higher-ranking ones to comply with other selection criteria established by Congress, such as geographic balance and a balance between rural and urban awards. Although Congress established the parameters of the program, since the grantees are selected by DOT the Administration controls the grant process. The Obama Administration distributed grants relatively evenly across modes and population areas. The Trump Administration has prioritized grants to road projects in rural areas; in the FY2018 round, 69% of the grant funds went to rural areas. DOT also announced that it would favor projects that provided new nonfederal sources of revenue (\"better utilizing investments to leverage development\"). Congress subsequently rejected that initiative, directing DOT not to favor projects that provided additional revenue or even projects that requested a low federal share. Congress also capped the share of funding that can go to rural areas in response to the Administration's tilt toward awarding grants to rural areas. DOT has published two reports on the topic of the performance of projects that received TIGER grants. The reports note that measuring the performance of the array of projects in several modes eligible for TIGER grants is challenging. DOT has required grantees to develop performance plans and measures for each project, beginning before the construction of the project and continuing for years. The reports themselves largely consist of case studies of several projects.", "document_type": "crs"}
{"report": "Technological convergence, in general, refers to the trend or phenomenon where two or more independent technologies integrate and form a new outcome. One example is the smartphone. A smartphone integrates several independent technologies—such as telephone, computer, camera, music player, television (TV), and geolocating and navigation tool—into a single device. The smartphone has become its own, identifiable category of technology. Currently, over 35% of the global population are smartphone users and over 3 billion active devices are in circulation. In the United States, about 80% of the U.S. population are smartphone users, and over 280 million active devices are in circulation. The technological convergence has resulted in establishing a new and prominent smartphone industry sector, worth over $350 billion globally, according to some estimates. Technological convergence may present a range of issues where Congress may take legislative and/or oversight actions. Three selected issue areas associated with technological convergence are regulatory jurisdiction, digital privacy, and data security. First, merging and integrating multiple technologies from distinct functional categories into one converged technology may pose challenges to defining regulatory policies, roles, and responsibilities. Determining oversight jurisdictions and regulatory authorities for converged technologies may become complicated as the boundaries that once separated single-function technologies are blended together. In other words, delineating which policy authorizes which government agency to apply which standards to regulate which industry is no longer simple and straightforward. How Congress chooses to oversee certain industries and government agencies may also become complicated due to converging technologies that blur and blend existing categorical boundaries. Second, digital privacy concerns stem from converged technologies' collection and usage of personal and machine data. Technological convergence facilitates increasing consumption and collection of data, which poses potential digital privacy concerns for consumers. Data collection and usage are tied to digital privacy issues because a piece or aggregation of information could identify an individual or reveal patterns in their activities. Converged technologies leverage large volumes of data to try to improve the user experience by generating more tailored and anticipatory results. This data can also potentially be used to identify, locate, track, and monitor an individual without the person's knowledge. The same data can potentially be sold to third-party entities without an individual's awareness. As the use of converged technologies continues to propagate, digital privacy issues will likely remain central to the policy debate. Third, data security concerns are often associated with smart devices. As devices are able to interconnect, the convenient ubiquitous features may create vulnerabilities that could be exploited by malicious actors. Data security, a component of cybersecurity, protects data from unauthorized access and use. Along with digital privacy, data security is a pertinent issue for converged technologies, which generate and consume large volumes of data. Technological convergence poses three potential data security concerns: increased number of access points susceptible to cyberattacks, linkage to physical security, and theft of data. The first section of this report describes technological convergence along with closely associated media convergence and network convergence. The report uses the Internet of Things (IoT) and smart home devices as primary examples. Of these three convergences, consumers most often directly engage with converged technologies. In contrast, general consumers may not have the same level of engagement or understanding of media and network convergences, as they often occur in the background. The second section of this report presents regulatory, digital privacy, and data security issues pertaining to technological convergence. The current state, challenges, and recent legislative activities are discussed. The third section of this report concludes with potential considerations for Congress. An overarching consideration for regulatory, digital privacy, and data security issues may be determining the role, if any, of the federal government in an environment where technological evolution changes quickly and continues to disrupt existing frameworks. Policies governing these three issues—regulations, digital privacy, and data security—may be of interest to Congress as well as other stakeholders, including U.S. government agencies, commercial entities, and the general public. \"Technological convergence\" is a concept whereby merging, blending, integration, and transformation of independent technologies leads to a completely new converged technology. This broad, complex concept encompasses a wide range of technologies, including IoT and smart home devices. When a converged technology emerges, it often replaces single-function technologies or renders them obsolete. In this sense, technological convergence can be viewed as a progression or evolution of technology. A discussion of technological convergence in isolation is difficult because technological convergence is closely associated with media convergence and network convergence. Technological, media, and network convergences are interdependent, but each possesses subtle distinctions. These three terms are often used interchangeably, further complicating the discussion of an already complex topic. Figure 1 illustrates relationships between technological, media, and network convergences. Technological convergence : This occurs when the functions of different technologies are merged and interoperate as a single unit. A converged unit can typically process multiple types of media that correspond to each technology that merged. Technological convergence includes devices and systems that interface with end users. For example, a user interacts with converged devices, such as a smart television (TV), to access the contents that are distributed over a network. A smart TV has combined the functions of a traditional TV, a computer, and several other devices that used to have one specific purpose. In addition to displaying over-the-air broadcast TV channels, smart TVs interface with users to surf the internet, view photos taken from smartphones and stored in the \"cloud,\" display feeds from home security cameras connected to a network, play music, notify users of incoming calls and messages, and allow video teleconferencing. Smart TVs can process a variety of formats of media to perform multiple functions. Media convergence : This refers to content that is made available through multiple forms, formats, and access points. Media convergence proliferated as analog mediums of communication became digitized. For example, the contents on a newspaper used to be available only in print. The same content is currently available in both print and digital forms, as text, visual, and/or audio formats, and through multiple devices and platforms including social media. Network convergence : This refers to a single network infrastructure that handles and distributes multiple types of media. Network convergence became prominent when telecommunications and information networks integrated; it became prevalent when mobile cellular communications incorporated access to the internet and made it widespread. For example, today's cable companies process information in forms of voice, video, and data on a single network and often offer their services as a bundle package (e.g., phone, television, and internet services). Similarly, cellular networks, which distribute information to and from mobile devices and fixed platforms, process voice, video, and data. Prior to network, media, and technological convergences, a separate, independent network was dedicated to handling and distributing one particular type of media that was processed by a single-function device. For example, a telephone network distributed audio information (i.e., voice) between telephone handsets. A broadcasting network delivered video to television sets. Convergence removes such pairing (i.e., \"decouples\") between media, network, and device. Decoupling gives convergence its versatility, flexibility, and complexity. Many technological convergence devices are called \"smart\" devices, which often include IoT devices. (Examples of IoT devices are discussed in following sections.) Despite a wide range of applications, smart converged technologies share key characteristics: Smart devices can execute multiple functions to serve blended purposes; Smart devices can collect and use data in various formats and employ machine learning algorithms to deliver optimized and enhanced user experience; and Smart devices are connected to a network directly and/or are interconnected with other smart devices, offering ubiquitous access to users from anywhere on any platform. These key characteristics may present potential policy questions for Congress, including the following: Who will provide oversight and how will regulatory authorities be applied to technologies that serve multiple functions or that do not belong to an established category? How should consumer data be collected and used to protect digital privacy without limiting technology innovation? How to shape data security practices to safeguard personal information and physical security from malicious actors? The IoT is a common example of technological convergence. The IoT is a system of devices that are connected to a network and each other, exchanging data without necessarily requiring human-to-human or human-to-computer interaction. In other words, IoT is a collection of electronic devices that can share information among themselves (e.g., smart home devices). The IoT possess all three characteristics of converged technologies: multiple functions, data collection and use, and ubiquitous access. Various categories of IoT include industrial Internet of Things, Internet of Medical Things, smart city infrastructures, and smart home devices. IoT industry is a growing market both globally and in the United States. According to some estimates, in 2018, the IoT retail market in the United States was almost $4 billion, and over 700 million consumer IoT devices were in use in 2017 in the United States. Figure 2 illustrates global revenue of the IoT from 2012 to 2018, according to Statista, a company that consolidates statistical data, based on information from IC Insights. In 2018, consumer IoT devices, such as wearable and connected smart home devices, generated over $14 billion globally. The connected cities category, or smart cities, was the largest (41%) of 2018 global IoT revenue. The industrial Internet of Things, such as smart factories, had the biggest growth in terms of global revenue between 2017 and 2018 among the different categories of the IoT. An estimate of various IoT markets by McKinsey also shows the industrial IoT as potentially increasing the most by 2025 compared to other IoT systems. The development, application, and usage of IoT will likely continue to grow with Fifth-Generation (5G) Technologies cellular service, which will allow a larger number of devices to be connected simultaneously to a network, supporting not only consumer but industrial use of IoT devices and systems. IoT devices are used in many different fields and serve a variety of functions. The IoT encompasses a broad range of applications. Selected categories of IoT devices are discussed below. Industrial Internet of Things (IIoT): Examples of commercial application of the IoT can be found in the manufacturing industry. Referred to as industrial Internet of Things (IIoT), networked machines in a production facility can communicate and share information to improve efficiency, productivity, and performance. The application of IIoT can vary significantly, from detecting corrosion inside a refinery pipe to providing real-time production data. Also, IIoTs can enable a variety of industries, such as manufacturing, chemicals, food and beverage, automotive, and steel, to transform their operations and potentially yield financial benefits. Currently in North America, there are more consumer IoT connections than IIoT connections, but this may change in the future. Incorporation of IIoT and analytics is considered by some as the Fourth Industrial Revolution (4IR). Internet of Medical Things (IoMT): Some experts project the use of Internet of Medical Things (IoMT) is increasing. IoMT devices, such as heart monitors and pace makers, collect and send a patient's health statistics over various networks to healthcare providers for monitoring, remote configuration, and preventions. In 2017, over 300 million IoT devices in the medical sector were connected worldwide, and, in 2018, over 400 million devices were connected. At a personal health level, wearable IoT devices, such as smart watches and fitness trackers, can track a user's physical activities, basic vitals, and sleeping patterns. In 2017, over 40 million fitness tracker IoT were in use in the United States. Smart Cities: IoT devices and systems in transportation, utilities, and infrastructure sectors may be grouped under the category of \"smart city.\" An example of utilities IoT in a smart city is \"smart\" grid and meters for electricity, water, and gas where sensors collect and share customer usage data to enable the central control system to optimize production and distribution to meet demand real-time. An example of transportation IoT in a smart city is fare readers and status trackers or locaters that interface across all public transportation platforms. Columbus, OH's winning proposal for the Department of Transportation's (DOT) Smart City Challenge of 2016, included connected infrastructure that interacts with vehicles, trip planning and common payment system across multiple transit system, and electric autonomous vehicles and shuttles. Other finalists of the DoT Smart City Challenge were Austin, TX; Denver, CO; Kansas City, MO; Pittsburgh, PA; Portland, OR; and San Francisco, CA. Smart cities is currently the largest segment of IoT in terms of revenue. Smart Home: Consumer product IoT devices used in homes and buildings are often grouped under the \"smart home\" category. Included in this categories are smart appliances, smart TV, smart entertainment systems, smart thermostats, and network-connected light bulbs, outlets, door locks, door bells, and home security systems. These smart home IoT devices are connected to a single network and can be controlled remotely over the internet. Eight of 11 categories of consumer IoT devices used in 2017 were related to smart home. In 2018, the size of the global smart home market was estimated to be over $30 billion. A smart home contains a collection of consumer IoT devices intended for personal use where user experience is improved by connecting various features of a house to a network. For example, smart home IoT devices may be interconnected to each other and to a central control system for a home with voice interface, often referred to as a virtual assistant. Commonly known examples of virtual assistants are Amazon's Alexa, Apple's Siri, Google Assistant, Microsoft's Cortana, and Samsung's Bixby. A virtual assistant is a platform that can manage and relay information to smart home devices based on user-established criteria. Moreover, a smart home may have a doorbell with a video camera and a speaker that allows a user to see who is at the door and to speak to the person at the door from anywhere over the internet. A smart home may have a smart door lock that can be locked and unlocked remotely. In addition, the thermostat, lights, electrical outlets, and appliances in a smart home may be remotely controlled by a user over the internet. A smart appliance, such as a smart refrigerator that is networked, can use its sensors to identify items and can notify a user based on set criteria, such as restocking alerts or suggested recipes. Some smart home devices resemble traditional devices, but with cross-over functions or networking abilities. Examples include smart lightbulbs, smart electrical outlet plugs, smart TV, and smart appliances. Some smart home devices are establishing a new category of industry segment that did not exist previously. An example is Amazon's Echo products with virtual assistant Alexa as voice user interface. Whether it is the former (evolutionary technologies) or the latter (new/revolutionary technologies), the smart home industry is fast emerging and growing. Smart home devices, which are a type of IoT, possess the three characteristics of converged technologies: multiple or blended functions, collection and use of data, and ubiquitous access through network connection. Thus, potential policy interests associated with technological convergence can be also observed in smart home devices. Potential smart home issues for Congress include the following. Congress may decide it is necessary to resolve oversight jurisdictions and regulatory authorities of smart home devices, especially for products like virtual assistants, which may not belong to an established category of technology. The mission of the Federal Trade Commission (FTC) includes both protecting consumers and promoting business competition. Congress may choose to review the FTC's current authorities to ensure that they are sufficient to oversee emerging smart home technologies. In addition, potentially deconflicting or harmonizing jurisdictions may be discussed if other federal government organizations and their mission are impacted by emerging smart home technologies. Congress may decide that new or expanded policies are necessary to protect consumer digital privacy, including personal data that are collected and used by smart home devices, such as a smart TV, in private spaces, such as a user's home. Although the FTC does promote a level of digital privacy through its consumer protection authorities, emerging digital privacy issues are linked to practices that are legal as opposed to fraud, theft, or other malicious activities. Congress may examine whether a federal law that comprehensively addresses personal digital privacy is necessary or an expansion of the FTC's consumer data protection authorities is required. Emerging smart home technologies may further necessitate safeguarding data from malicious actors. In addition to collecting and using personal data, smart home devices bridge physical security and cybersecurity. Malicious actors may have more means to exploit a user's information and home through smart home devices, which offer ubiquitous access as a key convenience feature. Whether current policies adequately addresses data, cyber, and physical security concerns may also be considered. Regulation, digital privacy, and data security are three selected issues associated with technological convergence that may be of interest to many stakeholders, including Congress. As identified in the smart home example in the previous section, each of these three issues is discussed further in subsequent subsections. The three selected issues are tied to the three characteristics of converged technologies discussed previously in the \" Characteristics of Smart Devices \" section. First, convergence of technologies blend and blur existing categorical distinctions for each technology because a converged technology can perform multiple functions. Second, technological convergence consumes, collects, and generates a large volume of both personal and machine data. Third, converged technologies allow ubiquitous access points to the end users. These characteristics are typically observed as a result of decoupling the devices from media and network. Congress may consider policies that address blending standards and boundaries as converged technologies and companies merge and replace traditionally independent and distinct categories. Policy issues may include oversight jurisdictions, regulatory authorities, and commercial competitiveness since a converged technology could fall within multiple domains. An example may be delineating the Federal Communications and Commission's (FCC) and the FTC's authorities on convergence technologies as more devices and services become mobile and wirelessly connected. Merging and integrating multiple technologies from distinct functional categories into one converged technology pose challenges to regulatory policies and responsibilities. Determining oversight jurisdictions and regulatory authorities for converged technologies becomes unclear as the boundaries that once separated single-function technologies blend and blur together. A challenge for policymakers may be in delineating which government agency and which policies and standards would best apply to certain technologies or certain industries. Where there were once clear lines of authority by industry or media type (e.g., voice, video, data), they are no longer simple and straightforward for technologies where these functionalities have converged. How Congress oversees which industries and government agencies may become complicated due to converging technologies that blend existing categorical boundaries. Congress may decide that it is necessary for specific legislative committees to effectively oversee a converged technology that serves multiple functions. As a result, the alignment of converged technologies to regulatory authorities may shift as technologies evolve. The complexities in setting regulatory jurisdiction can be further subdivided into regulating converging technologies and regulating evolving technology companies . They are discussed below. Regulating a converging technology, which is a result of blending or integrating multiple technologies, can be challenging. This is because (1) the one-to-one relationship between a converging technology and a regulatory entity is no longer clear, and (2) a converging technology may create a new sector where a regulatory entity has not been identified. Initially, the standards and oversight policies for a specific technology were established independently. They were not necessarily developed with merging or interoperability in mind. For example, telephony (when providing voice), cable TV (when providing video), and mobile cellular technologies each follow their respective standards, and these services were regulated by policies specific to each type. When a converged technology utilizes differing communications technologies, it may be required to adhere to multiple standards and regulations. In such cases, multiple agencies may need to regulate a single converged technology. This may require extended timelines for regulatory reviews. Industry may incur additional costs to meet standards and reporting requirements for converged technologies. In other situations, as technologies converge, the outcome may yield a completely new technology for which a regulatory category did not previously exist. Examples include social media, IoTs, and virtual assistants. Without a clear regulatory and oversight framework in place, new converged technologies may be left unregulated, partially regulated, or regulated under a newly developed framework. They could also be left to self-regulate by the industry; or they could be overlooked as governing bodies remain indeterminate on which jurisdictional boundaries need to be stretched to cover emerging technology fields. Regulating companies that offer converged technologies is challenging because the services and product lines evolve and expand such that they do not fall within a single category. Although diversification is considered normal business practice, technological convergence broadens the operational range for companies, spanning multiple industry sectors. Antitrust concerns could arise, or companies may not be subjected to the same level of oversight and regulation due to lack of classification. For example, companies such as Amazon, Apple, and Google each offer smart home devices and platforms. Some of these devices, such as a smart doorbell with a video camera, smart doors and locks, and networked contact sensors and video cameras, may function as home security devices. Many of these products are bundled as a starting kit for home security. However, these technology convergence companies may not be required to follow state and local regulations as traditional home security companies that provide monitored security service do. Another example discussed widely in Congress is social media—whether social media companies should be classified as information technology companies, as advertising and marketing firms, as communications platforms, or as the press. As converged technologies and associated companies straddle or fall between jurisdictional boundaries, regulatory roles and responsibilities become more complex. Congress may be interested in digital privacy concerns of converged technologies, which often collect and use personal information and machine data as they directly interface with end-users. Current federal laws protect certain types of data pertaining to privacy by specifying collection, storage, use, and dissemination practices. As converged technologies generate and innovatively leverage more types and volumes of data that can identify, locate, or track a person, consumer concerns for protecting digital privacy may intensify. Technological convergence facilitates increased consumption and collection of data, posing potential digital privacy concerns for consumers. Data collection and usage are tied to digital privacy issues because a piece or aggregation of information could identify an individual or reveal patterns in their activities. Converged technologies leverage large volumes of data to try to improve the user experience by generating more tailored and anticipatory results. However, such data can potentially identify, locate, track, and monitor an individual without the person's knowledge. As the use of converged technologies continues to propagate, digital privacy issues will likely remain central. While a federal law that comprehensively addresses digital privacy does not currently exist, many laws are in place to protect certain types of data and their impact on specific aspects of privacy. Current U.S. data protection laws include the following, as taken from CRS Report R45631, Data Protection Law: An Overview : Gramm-Leach-Bliley Act (GLBA): The GLBA imposes several data protection obligations on financial institutions. These obligations are centered on a category of data called \"consumer\" \"nonpublic personal information\" (NPI), and generally relate to: (1) sharing NPI with third parties, (2) providing privacy notices to consumers, and (3) security NPI from unauthorized access. Health Insurance Portability and Accountability Act (HIPAA): Under the HIPAA, the Department of Health and Human Services (HHS) has enacted regulations protecting a category of medical information called \"protected health information\" (PHI). These regulations apply to health care providers, health plans, and health care clearinghouses (covered entities), as well as certain \"business associates\" of such entities. The HIPAA regulations generally speak to covered entities': (1) using or sharing of PHI, (2) disclosure of information to consumers, (3) safeguards for securing PHI, and (4) notification of consumers following a breach of PHI. Fair Credit Reporting Act (FCRA): The FCRA covers the collection and use of information bearing on a consumer's creditworthiness. FCRA and its implementing regulations govern the activities of three categories of entities: (1) credit reporting agencies (CRAs), (2) entities furnishing information to CRAs (furnishers), and (3) individuals who use credit reports issued by CRAs (users). In contrast to HIPAA or GLBA, there are no privacy provisions in FCRA requiring entities to provide notice to a consumer or to obtain his opt-in or opt-out consent before collecting or disclosing the consumer's data to third parties. FCRA further has no data security provisions requiring entities to maintain safeguards to protect consumer information from unauthorized access. Rather, FCRA's requirements generally focus on ensuring that the consumer information reported by CRAs and furnishers is accurate and that it is used only for certain permissible purposes. The Communications Act : The Communications Act of 1934 (Communications Act or Act), as amended, established the Federal Communications Commission (FCC) and provides a \"comprehensive scheme\" for the regulations of interstate communication. [T]he Communications Act includes data protection provisions applicable to common carriers, cable operators, and satellite carriers. Video Privacy Protection Act (VPPA): The VPPA was enacted in 1988 in order to \"preserve personal privacy with respect to the rental, purchase, or delivery of video tapes or similar audio visual materials.\" The VPPA does not have any data security provisions requiring entities to maintain safeguards to protect consumer information from unauthorized access. However, it does have privacy provisions restricting when covered entities can share certain consumer information. Specifically, the VPPA prohibits \"video tape service providers\"—a term that includes both digital video streaming services and brick-and-mortar video rental stores—from knowingly disclosing [personally identifiable information] (PII) concerning any \"consumer\" without that consumer's opt-in consent. The VPPA does not empower any federal agency to enforce violations or the Act and there are no criminal penalties for violations, but it does provide for a private right of action for persons aggrieved by the Act. Family Educational Rights and Privacy Act (FERPA): The FERPA creates privacy protections for student education records. \"Education records\" are defined broadly to generally include any \"materials which contain information directly related to a student\" and are \"maintained by an educational agency or institution.\" FERPA defines an \"educational agency of institution\" to include \"any public or private agency or institution which is the recipient of funds under any applicable program.\" FERPA generally requires that any \"educational agency or institution\" (i.e., covered entities) give parents or, depending on their age, the student (1) control over the disclosure of the student's educational records, (2) an opportunity to review those records, and (3) an opportunity to challenge them as inaccurate. Federal Securities Laws : While federal securities statutes and regulations do not explicitly address data protection, two requirements under these laws have implications for how companies prevent and respond to data breaches. First, federal securities laws may require companies to adopt controls designed to protect against data breaches. Second, federal securities laws may require companies to discuss data breaches when making required disclosures under securities laws. Children's Online Privacy Protection Act (COPPA): The COPPA and the FTC's implementing regulations regulate the online collection and use of children's information. Specifically, COPPA's requirements apply to: (1) any \"operator\" of a website or online service that is \"directed to children,\" or (2) any operator that has any \"actual knowledge that it is collecting personal information from a child\" (i.e., covered operators). Covered operators must comply with various requirements regarding data collection and use, privacy policy notifications, and data security. Electronic Communications Privacy Act (ECPA): The ECPA was enacted in 1986, and is composed of three acts: the Wiretap Act, the Stored Communications Act (SCA), and the Pen Register Act. Much of ECPA is directed at law enforcement, providing \"Fourth Amendment like privacy protections\" to electronic communications. However, \"ECPA's three acts also contain privacy obligations relevant to non-governmental actors. ECPA is perhaps the most compressive federal law on electronic privacy, as it is not sector-specific, and many of its provisions apply to a wide range of private and public actors. Nevertheless, its impact on online privacy has been limited. As some commentators have observed, ECPA \"was designed to regulate wiretapping and electronic snooping rather than commercial data gathering,\" and litigants attempting to apply ECPA to online data collection have generally been unsuccessful. Computer Fraud and Abuse Act (CFAA): The CFAA was originally intended as a computer hacking statute and is centrally concerned with prohibiting unauthorized intrusions into computers, rather than addressing other data protection issues such as the collection or use of data. Specifically, the CFAA imposes liability when a person \"intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains… information from any protected computer.\" A \"protected computer\" is broadly defined as any computer used in or affecting interstate commerce or communications, functionally allowing the statute to apply to any computer that is connected to the internet. Federal Trade Commission Act (FTC Act): The FTC Act has emerged as a critical law relevant to data privacy and security. As some commentators have noted, the FTC has used its authority under the Act to become the \"go-to agency for privacy,\" effectively filling in gaps left by the aforementioned federal statutes. While the FTC Act was originally enacted in 1914 to strengthen competition law, the 1938 Wheeler-Lea amendment revised Section 5 of the Act to prohibit a broad range of unscrupulous or misleading practices harmful to consumers. The Act gives the FTC jurisdiction over most individuals and entities, although there are several exemptions. For instance, the FTC Act exempts common carriers, nonprofits, and financial institutions such as banks, savings and loan institutions, and federal credit unions. Consumer Financial Protection Act (CFPA): Similar to the FTC Act, the CFPA prohibits covered entities from engaging in certain unfair, deceptive, or abusive acts. Enacted in 2010 as Title X of the Dodd-Frank Wall Street Reform and Consumer Protection Act, the CFPA created the Consumer Financial Protection Bureau (CFPB) as an independent agency within the Federal Reserve System. The Act gives the CFPB certain \"organic\" authorities, including the authority to take any action to prevent any \"covered person\" from \"committing or engaging in an unfair, deceptive, or abusive act or practice\" (UDAAP) in connection with offering or providing a \"consumer financial product or service.\" State laws, such as California Consumer Privacy Act (CCPA), and international laws, such as European Union's General Data Protection Regulations (GDPR), aim to provide a comprehensive guidance on digital privacy. The FTC Act and the Clayton Act are the primary statutes that give the FTC investigative, law enforcement, and litigating authority to protect consumers and promote competition (i.e., antitrust). The FTC \"has enforcement or administrative responsibilities under more than 70 laws.\" The FTC's consumer protection mission currently focuses more on data security issues—such as identity theft, violation of Do Not Call or Do Not Track, and deceptive advertising—than digital privacy concerns associated with lawful activities. While consumer protection and digital privacy are increasingly becoming synonymous, consumer protection law alone may not provide sufficient jurisdiction and authority to encompass digital privacy and data security issues for all data on all devices. Digital privacy discussions often involve two closely associated topics: data privacy and data security. Data privacy is the governing of data collection, use, and sharing. Data security is protection of data from unauthorized or malicious actors. These two topics often differ in the lawfulness of activities, the intended use of data, and the effect on an individual. Data security is an aspect of cybersecurity more so than privacy. Data security defends against illicit activities such as theft of data. Data security practices include proactive measures against cyber-attacks and responsive measures such as sending notifications to affected individuals upon a data breach. Data security issues typically involve actors whose intents are malicious, who carry out unlawful activities, and use data in ways that harm an individual. Examples include breaking into a database or sending spear phishing emails to steal identity and financial information. Stolen identity and financial information are often exploited, causing financial damage to individuals and businesses. Privacy implications arise when personal information is compromised during a data security incident. D ata privacy practices determine how and to what extent data are collected, used, and with whom the data are shared. Data privacy sets the scope for control of personal information—this may include data ownership and responsibilities of involved entities. Data privacy issues typically arise from lawful activities, but personal information may have been collected, used, or shared beyond given permission or awareness of an individual. The process or results may reveal aspects of an individual that were unexpected. Examples of data privacy issues include mobile apps and websites collecting and using an individual's online activity and location data to suggest targeted ads. In general, such activities are a lawful commercial marketing strategy, from which the customers may benefit in forms of enhanced user experience and discounts. But, these activities become an issue when they lack transparency (i.e., when customers are not aware of what information is collected on them, who shares the information with whom, and how the information is used and for what purpose). Individuals may experience that their rights to privacy have been violated when aggregation of information reveals highly targeted information that an individual did not anticipate. Key aspects of data privacy—such as data collection, storage, sharing, access, and use—are not defined for digital data that are often leveraged by convergent technologies. These key aspects are defined only for certain types of information, such as medical and financial, where federal laws are in place. Similar guidance is limited or not available for other personal data, such as the following: Geolocation data collected by apps; Contact information and other user-generated content on social media; Video recordings made by smart home IoT devices; Voice recordings made by virtual assistants; and Vitals and health data collected by fitness tracking wearable IoT devices. Committees in both the House and the Senate of the 115 th Congress held several hearings where technology companies were present as witnesses. Over a dozen bills were introduced in the 115 th Congress to address various aspects of data privacy and security; but, none became a law. Committees in both the House and the Senate of the 116 th Congress have already held multiple hearings on privacy. Several bills were introduced by the 116 th Congress to address data privacy concerns as they relate to technological convergence. These bills include the following: H.R. 1282 (Representative Bobby Rush), introduced on February 14, 2019, as the Data Accountability and Trust Act, would \"require certain entities who collect and maintain personal information of individuals to secure such information and to provide notice to such individuals in the case of a breach of security involving such information….\" This bill would define the term personal information; outline special requirements for information brokers; and assign specific responsibilities to the FTC to regulate commercial entities' data security policies and procedures for using and protecting personal information. S. 142 (Senator Marco Rubio), introduced on January 16, 2019, as the American Data Dissemination (ADD) Act of 2019, would \"impose privacy requirements on providers of internet services similar to the requirement imposed on Federal agencies under the Privacy Act of 1974.\" This bill would require the FTC to submit recommendations for privacy requirements for internet service providers. S. 189 (Senator Amy Klobuchar), introduced on January 17, 2019, as the Social Media Privacy Protection and Consumer Rights Act of 2019, would \"protect the privacy of users of social media and other online platforms.\" This bill would require commercial entities with an online platform to clearly disclose their practices for personal data collection and use prior to obtaining user consents. This bill also outlines enforcement of privacy requirements by the FTC and the attorney general of each state. S. 583 (Senator Catherine Cortez Masto), introduced on February 27, 2019, as the Digital Accountability and Transparency to Advance (DATA) Privacy Act, would provide \"digital accountability and transparency.\" This bill would require commercial entities to clearly disclose its privacy practices for various collected data. This bill also would require the FTC to enforce privacy practices to ensure that the minimum requirements are satisfied. According to the FTC, data brokers are companies that collect consumers' personal information and resell or share that information with others. Data brokers collect personal information about consumers from a wide range of sources and provide it for a variety of purposes, including verifying an individual's identity, marking products, and detecting fraud. Because these companies generally never interact with consumers, consumers are often unaware of their existence, much less the variety of practices in which they engage. The FTC classifies data brokers into three categories: 1. Entities subject to the FCRA; 2. Entities that maintain data for marketing purposes; and 3. Non-FCRA covered entities that maintain data for non-marketing purposes that fall outside of the FCRA. The FCRA governs the activities of credit reporting agencies, such as Equifax, Experian, and TransUnion; entities furnishing information to credit reporting agencies; and individuals who use credit reports issued by credit reporting agencies. These entities subjected to the FCRA fall within the first of the three categories of data brokers listed above. However, the FCRA does not have privacy or data security provisions. Regarding the second and third categories of data brokers, the FTC report notes that \"while the FCRA addresses a number of critical transparency issues associated with companies that sell data for credit, employment, and insurance purposes, data brokers within the other two categories remain opaque.\" Data brokerage companies include Acxiom, Cambridge Analytica, Corelogic, Datalogix, Epsilon, Exactis, ID Analytics, Intelius, PeekYou, Rapleaf, and Recorded Future in addition to the \"big three\" credit reporting agencies (Equifax, Experian, and TransUnion). Many data brokers, which are conducting lawful activities, are self-regulated. As depicted in Figure 3 , data brokerage companies purchase and aggregate information from various sources, which are also self-regulated. These sources include app developers, websites, and social media. As technological convergence continues to proliferate, more data will likely be generated and consumed. Aggregations of seemingly simple and benign pieces of data when examined together could expose highly personal aspects in detail. Data brokers and entities that collect data could significantly impact digital privacy especially if individuals remain unaware of activities pertaining to their personal data. Congress may be interested in data and physical security aspects of converged technologies because ubiquitous access equates to more possible entry points for both authorized and unauthorized users. This is often referred to as increase in attack surface. As more converged devices become connected to each other and to the internet, the overall impact of a compromise increases, along with the possibility of a cascading effect of a cyberattack. In policies, the requirements and responsibilities of data protection may be addressed separately from privacy concerns associated with legal use of personal data. Data security, a component of cybersecurity, protects data from unauthorized access and use. Along with digital privacy, data security is a pertinent issue to technological convergence, which generates and consumes large volumes of data. Technological convergence poses a number of different types of potential data security concerns, including the following: potentially increased number of access points susceptible to cyberattacks, linkage to physical security, and theft of data. Increased connectivity generally translates to increased risk of cyberattack. Converged technologies, such as IoT devices, offer the users ubiquitous access: access from anywhere, at any time, using any device. While this is an extremely convenient characteristic, it also poses cybersecurity concerns. Multiple access points equate to increased points or opportunities for potential exploitation by malicious actors. This is often described as increased attack vectors, or broadening attack surface, which is a sum of attack vectors. The same entry points a user may use for remote access can be exploited by an adversary to steal personal information. From the data security perspective, this is a tradeoff to consider between convenience and vulnerability. Cybersecurity and physical security are directly linked through converged technologies. For example, when smart doors and smart locks are remotely controlled by a malicious actor through cyberattack, the physical security of that building also becomes compromised. The damage may not be limited to loss of digital content or information. Loss of personal data stored in the compromised location as well as personal security could be in jeopardy. Potential loss or theft of personal data may be a data security concern for converged technologies because IoT devices often do not employ strong encryption at the device or user interface level. Not implementing strong encryption may be intentional due to associated benefits—it usually keeps the cost low, increases battery life of devices, minimizes memory requirements, reduces device size, and is easier to use or implement. This means, not only is the attack vector increased, but a system is also easier to break into. IoT devices may be the most vulnerable points of a system targeted by malicious actors for exploitation. Some experts note that IoT security currently lacks critical elements such as end-to-end security solutions, common security standards across the IoT industry, and customers' willingness to pay additional cost for enhanced security. With relatively few policies in place for specifically overseeing technological convergence, Congress may consider potential policy options to address the issues discussed in this report. The fundamental policy considerations to identifying options may be determining the role, if any, of the federal government in overseeing technological convergence, digital privacy, and data security. Regulating technological convergence may entail policies for jurisdictional deconfliction, harmonization, and expansion to address blended or new categories of technology. Currently, aspects of converged technologies may be regulated by different agencies based on the individual technologies that compose the convergence, but not as a whole. Regulating a converged technology as a whole can also be challenging because the combinations of technologies may generate too many possible outcomes. When converged technologies establish a new domain and fall outside of existing regulatory jurisdictions, they are often left to self-regulate. Congress and the Administration could take a number of approaches in regulating technological convergence. Three potential approaches are discussed here. First, the federal government could continue to allow industry to self-regulate, especially where technology evolves quickly. This may promote innovative space, but relies on the industry to exercise responsible and accountable practices. Second, Congress and the Administration could maintain current regulatory jurisdiction but leverage a deconfliction or harmonization policy so that convergent technologies are regulated under one primary authority instead of potentially multiple authorities. Preserving existing regulatory jurisdiction may require minimal restructuring and allow relatively short timeline for implementation. While a deconfliction or harmonization policy could increase coordination, overlaying such policy on an existing regulatory framework may not present the most efficient process. Third, the Administration could consider expanding regulatory jurisdictions and authorities to include new and emerging convergent technologies that are self-regulated. This may require a complete overhaul of the technology regulatory framework, requiring congressional action and a relatively lengthy adaptation timeline for the affected industries. Some could also view such actions as extensive regulation that stifles innovation and commercial growth. On the other hand, this approach could present an opportunity to update policies on par with technology progressions and posture for emerging capabilities. Federal data protection laws currently in place apply to specific types of data and have varied privacy and data security provisions. A federal law that comprehensively addresses digital privacy for all types of data is not in place. While illegal use of personal information (such as identity theft and fraud) is defined and enforced by federal agencies, legal use of data generated by users or converged technologies (such as social media and IoT) is not regulated to the same extent. Transparency into the activities of legal data brokers and collectors is limited. Congress may choose to define the role of the federal government overseeing digital privacy by introducing new comprehensive federal law(s) and/or by determining minimal required standards of digital privacy. An alternative option could be expanding existing digital privacy authorities. This could include deciding whether federal entities, such as the FTC, should have their rulemaking abilities clarified or expanded. An expanded or new federal digital privacy policy may require a variety of decisions by Congress. Two of many potential decisions pertaining to federal digital privacy policy are determining how data privacy and data security could be addressed legislatively and determining whether various types, or categories, of personal data should be treated equally or differently under varied guidance. Data security, as it pertains to technological convergence, may impact both the cyber and physical fronts. Some of the federal data protection laws currently in place have data security provisions, though they vary and may be focused predominantly on the cyber-aspect. This also means that different data security protocols apply to different types of data. For instance, the guidance for notifying users when personal data gets compromised is different for health, financial, and location data. Similar to the digital privacy considerations, Congress could begin by determining whether overarching legislation for data security is necessary. Congress may consider new legislation explicitly addressing data security concerns pertaining to technological convergence. Or, Congress may consider new legislation to expand existing cybersecurity missions to address data security issues. Data security is often considered as a component of cybersecurity, but protection of the data is equally important as safeguarding a network or a system. As with any security challenge, finding the right balance between convenience and security measures is a key component of an effective security policy. A data security policy that predominantly focuses on security measures to address potential vulnerabilities created by converged technologies could negate convenient features and beneficial capabilities, such as ubiquitous access, offered by the converged technologies. On the other hand, allowing maximum accessibility without a security measure exposes both the data and the system to risks. Not having an updated data security policy relies on existing cybersecurity measures to address potential vulnerabilities introduced by technological convergence. Congress may determine whether data privacy and data security should be addressed in one policy. Data privacy and data security are linked and complementary, especially for digital information. While two coupled topics could be addressed in a single policy, data privacy and data security are two distinct issues. Having separate complementary policies could potentially focus more clearly on specific aspects of each issue.", "summary": "Technological convergence, in general, refers to the trend or phenomenon where two or more independent technologies integrate and form a new outcome. One example is the smartphone. A smartphone integrated several independent technologies—such as telephone, computer, camera, music player, television (TV), and geolocating and navigation tool—into a single device. The smartphone has become its own, identifiable category of technology, establishing a $350 billion industry. Of the three closely associated convergences—technological convergence, media convergence, and network convergence—consumers most often directly engage with technological convergence. Technological convergent devices share three key characteristics. First, converged devices can execute multiple functions to serve blended purpose. Second, converged devices can collect and use data in various formats and employ machine learning techniques to deliver enhanced user experience. Third, converged devices are connected to a network directly and/or are interconnected with other devices to offer ubiquitous access to users. Technological convergence may present a range of issues where Congress may take legislative and/or oversight actions. Three selected issue areas associated with technological convergence are regulatory jurisdiction, digital privacy, and data security. First, merging and integrating multiple technologies from distinct functional categories into one converged technology may pose challenges to defining regulatory policies and responsibilities. Determining oversight jurisdictions and regulatory authorities for converged technologies can become unclear as the boundaries that once separated single-function technologies blend together. A challenge for Congress may be in delineating which government agency has jurisdiction over various converged technologies. Defining policies that regulate technological convergence industry may not be simple or straightforward. This may further complicate how Congress oversees government agencies and converged industries due to blending boundaries of existing categories. Second, converged technologies collect and use personal and machine data which may raise digital privacy concerns for consumers. Data collection and usage are tied to digital privacy issues because a piece or aggregation of information could identify an individual or reveal patterns in one's activities. Converged or smart technologies leverage large volumes of data to try to improve the user experience by generating more tailored and anticipatory results. However, such data can potentially identify, locate, track, and monitor an individual without the person's knowledge. Such data can also potentially be sold to third-party entities without an individual's awareness. As the use of converged technologies continues to propagate, digital privacy issues will likely remain central. Third, data security concerns are often associated with smart devices' convenient ubiquitous features that may double as vulnerabilities exploited by malicious actors. Data security, a component of cybersecurity, protects data from unauthorized access and use. Along with digital privacy, data security is a pertinent issue to technological convergence. As converged devices generate and consume large volumes of data, multiple data security concerns have emerged: potentially increased number of access points susceptible to cyberattacks, linkage to physical security, and theft of data. Relatively few policies are in place for specifically overseeing technological convergence, and current federal data protection laws have varied privacy and data security provisions for different types of personal data. To address regulatory, digital privacy, and data security issues, Congress may consider the role of the federal government in an environment where technological evolution changes quickly and continues to disrupt existing regulatory frameworks. Regulating technological convergence may entail policies for jurisdictional deconfliction, harmonization, and expansion to address blended or new categories of technology. One approach could be for Congress to define the role of federal government oversight of digital privacy and data security by introducing new legislation that comprehensively addresses digital privacy and data security issues or by expanding the current authorities of federal agencies. When considering new legislation or expanding the authorities of federal agencies, three potential policy decisions are (1) whether data privacy and data security should be addressed together or separately, (2) whether various types of personal data should be treated equally or differently, and (3) which agencies should be responsible for implementing any new laws.", "document_type": "crs"}
{"report": "The rules of the House of Representatives have included provisions related to preserving order and decorum in the chamber since the 1 st Congress (1789-1790). Under current House rules, Members may violate decorum if they engage in certain behaviors, such as using disorderly language. Members may be called to order by colleagues for the use of allegedly disorderly, or unparliamentary, language, which may include a formal demand that their words be taken down. This demand initiates a series of procedures to determine whether the words are, in fact, unparliamentary and to decide whether a Member who uses such language should be allowed to proceed in debate. This report covers these procedures, which are provided for in the standing rules of the House as a mechanism to maintain decorum in debate. The sections below present details about how and when a Member might invoke the demand that words be taken down, the procedural steps that may follow the demand, and an overview of the rule's history in the House. The report concludes with information about the practice of invoking this rule in the House in recent decades. The standing rules of the House establish a parliamentary mechanismâreferred to as \"words taken down\"âwhereby a Member may call another Member to order for the use of disorderly language. Members may invoke this mechanism during debate on the House floor or in the Committee of the Whole. It may also be invoked in the standing and select committees of the House. A Member initiates the call to order by demanding that a colleague's \"words be taken down.\" The phrase taken down , as described in the rule, refers to the writing down of the words objected to so they may be read back to the House by the Clerk. In current practice, all deba te in the House and in standing and select committees is transcribed by the official reporters of debate. Therefore, when a Member demands that the words of a colleague be taken down, the Clerk will consult with the transcriber to identify the words objected to, which the Clerk will then read out loud. Following the reading of the allegedly unparliamentary remarks, the Speaker of the House (or, if the words are spoken in a committee, the chair of the committee) will determine whether the words are in order. The standing rules of the House do not state explicitly what language is considered to be disorderly, although clause 1(b) of Rule XVII prohibits Members from engaging in \"personalities\" in debate. House precedents catalog words and phrases previously deemed to be in order and those that were ruled out of order, or unparliamentary. When ruling on the words objected to, the presiding officer considers the words themselves, as well as the context in which they were used, and bases the ruling on these precedents. On the floor, the Parliamentarian advises the Speaker based on recorded precedents. The Office of the Parliamentarian is not responsible for providing procedural assistance during committee meetings, although the chair could attempt to consult with the Parliamentarian in advance of or during such meetings. Rule XVII, clause 4, details the procedure for demanding that words be taken down: (a) If a Member, Delegate, or Resident Commissioner, in speaking or otherwise, transgresses the Rules of the House, the Speaker shall, or a Member, Delegate, or Resident Commissioner may, call to order the offending Member, Delegate, or Resident Commissioner, who shall immediately sit down unless permitted on motion of another Member, Delegate, or the Resident Commissioner to explain. If a Member, Delegate, or Resident Commissioner is called to order, the Member, Delegate, or Resident Commissioner making the call to order shall indicate the words excepted to, which shall be taken down in writing at the Clerk's desk and read aloud to the House. (b) The Speaker shall decide the validity of a call to order. The House, if appealed to, shall decide the question without debate. If the decision is in favor of the Member, Delegate, or Resident Commissioner called to order, the Member, Delegate, or Resident Commissioner shall be at liberty to proceed, but not otherwise. If the case requires it, an offending Member, Delegate, or Resident Commissioner shall be liable to censure or such other punishment as the House may consider proper. A Member, Delegate, or Resident Commissioner may not be held to answer a call to order, and may not be subject to the censure of the House therefor, if further debate or other business has intervened. According to clause 4(b) of Rule XVII, the demand for words to be taken down must be timely: It must generally occur before intervening business or debate. Therefore, immediately after the allegedly offensive words are spoken, the Member would state: Mr./Madam Speaker (or Chair), I demand that the gentleman's/gentlewoman's words be taken down. Debate is not in order at this point, but the Member demanding that the words be taken down may briefly state the reason for objecting to the language (e.g., the words include an improper personal reference to the President). A Member will be allowed to explain the remarks only if prompted by the presiding officer or if another Member makes a motion to allow an explanation and the motion is agreed to by the House. Usually, the presiding officer orders the Member who spoke the allegedly disorderly words to suspend and asks the Clerk to report the words. (On the House floor, the Member whose words were objected to may be asked by the Speaker to sit down.) The gentleman/gentlewoman from [state] will suspend. The Clerk will report the words. It may take several minutes for the Clerk to review the transcript and read the words out loud. During this pause in proceedings, the Member who spoke the allegedly offensive words may ask unanimous consent to withdraw the words: Mr./Madam Speaker (or Chair), I ask unanimous consent to withdraw my words. Alternatively, the Member who demanded that the words be taken down may withdraw the request, which does not require unanimous consent: Mr./Madam Speaker (or Chair), I withdraw my demand that the gentleman's/gentlewoman's words be taken down. If neither occurs, then the Clerk will read the words to the House, and the presiding officer will make a ruling on the remarks: In the opinion of the Chair, the words in question [were/were not] in order. The presiding officer's ruling is subject to appeal, and that appeal is subject to a motion to table. If the presiding officer rules that the words are not unparliamentary (and if this ruling is sustained following any appeal), then the House continues with the business pending prior to the demand that words be taken down. If the presiding officer rules that the words are out of order (and if this ruling is sustained following any appeal), the words are usually stricken from the Congressional Record by unanimous consent. The presiding officer might initiate this by stating: Without objection, the words are stricken from the Record . Alternatively, a Member (although not the Member whose words were taken down) may make a motion to remove the disorderly language from the Record , on which the House will vote: I move that the words of the gentleman/gentlewoman from [state] be stricken from the Record . In the event that a Member's words are ruled out of order, that Member may not be recognized to speak for the rest of the day (even on yielded time) or insert undelivered remarks into the Record unless the Member is allowed to proceed in order by the House. The Member may be permitted to proceed in order by unanimous consent, which is often initiated by the presiding officer: Without objection, the gentleman/gentlewoman from [state] will proceed in order. A Member may also make a motion to allow the Member whose words were ruled out of order to proceed in order, and the House will vote on the motion. I move that the gentleman/gentlewoman from [state] be allowed to proceed in order. If a Member is not allowed to proceed in order, the Member may vote and demand the yeas and the nays. The concept of taking disorderly words down in writing is provided for in the principles of general parliamentary law. Although the rules of the House have, since its inception, included provisions related to preserving order and decorum in the chamber, the formal call for a Member's words to be taken down was not adopted as part of the standing rules of the House in the 1 st Congress (1789-1790). The rules of the House initially provided for the Speaker to call a Member to order for disorderly remarks or for a Member to make a point of order against a Member's language, on which the Speaker would rule. (These parliamentary mechanisms are still available today under clause 4 of Rule XVII.) The practice of taking down words began in 1808 when a Member called a colleague to order for disorderly language and the Speaker asked that Member to put the words objected to down in writing. This practice was formally adopted as part of the standing rules of the House in 1837. The original rule, which introduced the need for the demand to be timely, stated: If a member be called to order for words spoken in debate, the person calling him to order shall repeat the words excepted to, and they shall be taken down in writing at the Clerk's table; and no member shall be held to answer, or be subject to the censure of the House, for words spoken in debate, if any other member has spoken, or other business has intervened, after the words spoken, and before exception to them shall have been taken. An amendment to the rule in 1880 modified the procedure by which a Member demanded that words be taken down. The amended rule removed the provision that the Member calling another to order should repeat the objectionable words. This version, which is similar to the corresponding sentences of the rule in effect today, provided for the words to be taken down in writing and repeated by the Clerk. The 1880 version of the rule states: If a member is called to order for words spoken in debate, the member calling him to order shall indicate the words excepted to, and they shall be taken down in writing at the Clerk's desk and read aloud to the House; but he shall not be held to answer, nor be subject to the censure of the House therefor, if further debate or other business has intervened. The rule took its current form when the House comprehensively recodified its rules in the 106 th Congress, although the changes were largely technical. During the recodification, the previously separate clauses in the House rules for addressing unparliamentary languageâone providing for a Member to make a point of order against a colleague's remarks and the other providing for a demand that a Member's words be taken downâwere combined. The text of the rule was also amended to clarify that the rule applies to a \"Member, Delegate, or Resident Commissioner\" (both for calling someone to order and for being called to order). CRS conducted full-text searches of the Congressional Record to identify instances in which a Member demanded that another Member's words be taken down on the House floor (or in the Committee of the Whole) since January 1, 1971. Throughout this nearly 50-year period, the formal demand that words be taken down was invoked 170 times. These calls to order took place in the Committee of the Whole, as well as in the House proper, including during periods of time arranged for Members to speak on topics of their choice rather than on legislation, such as one-minute speeches and special order speeches. In contemporary practice, it is uncommon that the full procedure presented aboveâin which the Speaker rules whether or not the words are in orderâoccurs in the House. Of the 170 demands that words be taken down, 107, or more than half, were settled before the Speaker made a ruling, usually before the Clerk reported the words. In 75 of these instances, the Member whose words were taken down asked to withdraw or revise the words, and in another 32 cases, the Member who demanded that the words be taken down withdrew the request. There were an additional 13 occasions on which the Speaker ruled that a Member's call for words to be taken down was untimely. Throughout this time period the Speaker ruled on the words taken down 50 times. Twenty-seven, or more than half, of these rulings took place in the 1990s, with only nine rulings by the Speaker since 2000. In 25 of the 50 rulings following a demand that words be taken down, the Speaker ruled that the words were not disorderly. These occurrences are identified in Table 1 in reverse chronological order. When the Speaker provided a reason for the ruling, it was often that the Member's remarks did not constitute an improper personal reference toward another Member. For example, after words were taken down during debate on February 5, 1992, the Speaker, when ruling on the words, stated: \"The Chair will rule that since the gentleman from Louisiana is generically speaking and not specifically alleging improper conduct by any individual Member, the words are in order.\" The Speaker ruled that the words were out of order 25 times during this time period. These 25 occurrences are presented in Table 2 in reverse chronological order. As the fourth column of the table indicates, in nearly every instance in which a rationale was given for the ruling, the Speaker stated that the Member was engaging in personalities toward an identifiable individual, often another Member. Following the determination that the remarks were out of order, the words were usually stricken from the Record by unanimous consent at the initiative of the Speaker. This happened in all but five instances presented in Table 2 . The words were ultimately stricken, either by unanimous consent or motion, in 17 of the 25 cases. It is also common for the Member whose words were ruled out of order to be allowed to proceed in order, usually by unanimous consent initiated by the Speaker. Indeed, the Speaker initiated such a request in 14 of the cases presented in Table 2 . Members whose words were ruled out of order were given permission to proceed in 17 of the 25 instances, either by unanimous consent or motion. ", "summary": "Rule XVII, clause 4, of the standing rules of the House of Representatives describes a parliamentary mechanism whereby a Member may call another Member to order for the use of disorderly language. Disorderly, or unparliamentary, remarks are a violation of House rules of decorum. This mechanism, which is referred to as \"words taken down,\" may be invoked during debate on the House floor, in the Committee of the Whole, or in the standing and select committees of the House. To call a Member to order for allegedly disorderly remarks, a Member would state the following: \"I demand that the gentleman's/gentlewoman's words be taken down.\" This call to order is to occur immediately after the words are spoken. If the demand comes after additional debate or business, the presiding officer may rule that it is untimely. (The presiding officer's decision on timeliness, however, may be appealed.) The phrase taken down refers to the writing down of the words objected to so they may be read out loud by the House Clerk. Following the reading, the presiding officer will rule on whether the remarks are in order. In the moments between the formal demand that words be taken down and the Clerk's reading of the words, the Member who made the allegedly disorderly remarks may seek unanimous consent to have them stricken from the Congressional Record . If the unanimous consent request is granted, the House may resume its business without the reading of the words or a ruling thereon. Alternatively, the Member who demanded that the words be taken down can withdraw the request. If neither occurs, then the Clerk will read the words and the Speaker or committee chair will rule on whether the words are in order, which is subject to an appeal. (If the demand for words taken down occurs in the Committee of the Whole, the committee will rise and report the words back to the House, so the Speaker can rule on the words.) When determining whether the words are unparliamentary, the Speaker will consider the words themselves, as well as the context in which they were used, and base the ruling on House rules and precedents. Rule XVII, clause 1(b), of the standing rules of the House prohibits Members from engaging in \"personalities\" in debate, but the text of the rule does not state explicitly what language is unparliamentary. Rather, House precedents include examples of words and phrases that were previously determined to be in order and those that were ruled out of order. On the House floor, the Parliamentarian advises the Speaker based on these precedents. The Office of the Parliamentarian is not responsible for providing procedural assistance during committee meetings, although the chair could attempt to consult with the Parliamentarian in advance of or during such meetings. If the Member's words are ruled out of order, the words may be stricken from the Congressional Record by unanimous consent on the initiative of the presiding officer. The words may also be stricken by a motion, which means the House will vote on whether to strike the remarks. In addition, Members whose words are determined to be unparliamentary may not be recognized to speak for the rest of the day (even on yielded time) unless the Member is allowed to proceed in order by unanimous consent or a motion. They may, however, vote and demand the yeas and the nays. The demand for words to be taken down was invoked 170 times on the House floor or Committee of the Whole between January 1, 1971, and July 24, 2019. In practice, when this demand occurs, the Member being called to order is usually permitted to revise the words or to strike them from the Congressional Record before the Clerk reads the words back to the House. Therefore, the Speaker does not rule on whether the remarks violate the rules of decorum. When there is a ruling, the Speaker often states that the basis for the ruling is whether the words include a personal criticism of an identifiable person (usually a Member or the President).", "document_type": "crs"}
{"report": "T he Consolidated Appropriations Act, 2019 ( P.L. 116-6 ) was enacted on February 15, 2019.This omnibus bill included appropriations for the U.S. Department of Agriculture (USDA), of which USDA's domestic food assistance is a part. Prior to its enactment, the government had continued to operate for the first six months of the fiscal year under continuing resolutions (CRs). USDA experienced a 35-day lapse in FY2019 funding and partial government shutdown prior to the enactment of the Further Additional Continuing Appropriations Act, 2019 ( P.L. 116-5 ), a continuing resolution enacted prior to the Omnibus bill. (See the Appendix .) This report focuses on USDA's domestic food assistance programs; their funding; and, in some instances, policy changes provided by the enacted FY2018 appropriations law. USDA's domestic food assistance programs include the Supplemental Nutrition Assistance Program (SNAP, formerly the Food Stamp Program), Special Supplemental Nutrition Program for Women, Infants, and Children (WIC), and the child nutrition programs (such as the National School Lunch Program). The domestic food assistance funding is, for the most part, administered by USDA's Food and Nutrition Service (FNS). CRS Report R45230, Agriculture and Related Agencies: FY2019 Appropriations provides an overview of the entire FY2019 Agriculture and Related Agencies appropriations law as well as a review of the reported bills and CRs preceding its enactment. With its focus on appropriations, this report discusses programs' eligibility requirements and operations minimally. See CRS Report R42353, Domestic Food Assistance: Summary of Programs for more background. Domestic food assistance—SNAP and child nutrition programs in the mandatory spending accounts, and WIC and other programs in the discretionary spending accounts—represents over two-thirds of the FY2018 Agriculture appropriations act ( Figure 1 ). The federal budget process treats discretionary and mandatory spending differently. Discretionary spending is controlled by annual appropriations acts and receives most of the attention during the appropriations process. The annual budget resolution process sets spending limits for discretionary appropriations. Agency operations (salaries and expenses) and many grant programs are discretionary. Mandatory spending —though carried in the appropriation—is controlled by budget rules during the authorization process. Appropriations acts then provide funding to match the parameters required by the mandatory programs' authorizing laws. For the domestic food assistance programs, these laws are typically reauthorized in farm bill and child nutrition reauthorizations. Domestic food assistance funding ( Table 1 ) largely consists of open-ended, appropriated mandatory programs—that is, it varies with program participation (and in some cases inflation) under the terms of the underlying authorization law. The largest mandatory programs include SNAP and the child nutrition programs (including the National School Lunch Program and School Breakfast Program). Though their funding levels are dictated by the authorizing law, in most cases appropriations are needed to make funds available. The three largest discretionary budget items are WIC, the Commodity Supplemental Food Program (CSFP), and federal nutrition program administration. The enacted FY2019 appropriation would provide over $103 billion for domestic food assistance ( Table 1 ). This is a decrease of approximately $1.7 billion from FY2018. Declining participation in SNAP is responsible for most of the difference. Over 95% of the FY2019 appropriations are for mandatory spending. Table 1 summarizes funding for the domestic food assistance programs, comparing FY2019 levels to those of prior years. In addition to the accounts' appropriations language, the enacted appropriation's general provisions include additional funding, rescissions, and/or policy changes. These are summarized in this report. Table 1 compares the enacted funding to the House- and Senate-reported bills, prior years' enacted funding, and the President's FY2019 budget request. The President's budget request includes the Administration's forecast for programs with open-ended funding such as SNAP and the child nutrition programs; this assists the appropriations committees in providing funding levels expected to meet obligations. The budget also includes the Administration's requests for discretionary programs. Additionally, it is a place for the Administration to include legislative requests. The FY2019 request did include SNAP legislative proposals. Most significantly for the FNS programs, the President's FY2019 budget request did the following: It included 14 legislative proposals pertaining to SNAP. The majority of these would have restricted SNAP eligibility and made changes to the benefit calculation. This request also proposed to replace a portion of the SNAP benefit with a box of USDA-purchased foods and to limit federal funding for states' administrative costs, nutrition education, and performance bonuses. Together, these proposals were estimated by both the Administration and Congressional Budget Office (CBO) to reduce program spending in FY2019 and over the 10-year budget window. None of these policies were enacted as part of the FY2019 appropriation. Some of these policies were debated in the formulation of the 2018 farm bill (Agriculture Improvement Act of 2018, P.L. 115-334 ), but ultimately only the elimination of performance bonus funding was enacted in the December 2018 law. It requested no funding for a number of discretionary spending programs, including the following: school meals equipment grants, which have received discretionary funding since FY2009; the WIC Farmers' Market Nutrition Program (FMNP), which has received annual discretionary funding since 1992; and the Commodity Supplemental Food Program (CSFP), which has received annual discretionary funding since 1969. For the Under Secretary's office, the enacted FY2019 appropriation provides approximately $0.8 million. This office received approximately equal funding in FY2018. The enacted appropriation (§734) continues to require the coordination of FNS research efforts with USDA's Research, Education and Economics mission area. This is to include a research and evaluation plan submitted to Congress. Appropriations under the Food and Nutrition Act (formerly the Food Stamp Act) support (1) SNAP (and related grants); (2) a nutrition assistance block grant for Puerto Rico and nutrition assistance block grants to American Samoa and the Commonwealth of the Northern Mariana Islands (all in lieu of SNAP); (3) the cost of food commodities as well as administrative and distribution expenses under the Food Distribution Program on Indian Reservations (FDPIR); (4) the cost of commodities for TEFAP, but not administrative/distribution expenses, which are covered under the Commodity Assistance Program budget account; and (5) Community Food Projects. The enacted appropriation provides approximately $73.5 billion for programs under the Food and Nutrition Act. This FY2019 level is approximately $540 million less than FY2018 appropriations. This difference is largely due to a forecasted reduction in SNAP participation. The enacted appropriation provides $3 billion for the SNAP contingency reserve fund. The SNAP account also includes mandatory funding for TEFAP commodities. The enacted appropriation provides nearly $295 million, according to the terms of the Food and Nutrition Act. This is an increase ($5.0 million, 1.7%) over $289.5 million provided in FY2018. (TEFAP also receives discretionary funding for storage and distribution costs, as discussed later in \" Commodity Assistance Program .\") SNAP-Authorized Retailers. The FY2017 and FY2018 appropriations law limited USDA's implementation of December 2016 regulations regarding SNAP retailers' inventory requirements, and the enacted FY2019 appropriation (§727) continues those limits. Only SNAP-authorized retailers may accept SNAP benefits. On December 15, 2016, FNS published a final rule to change retailer requirements for SNAP authorization. The final rule would have implemented the 2014 farm bill's changes to inventory requirements for SNAP-authorized retailers ( P.L. 113-79 , §4002). Namely, the 2014 farm bill increased both the varieties of \"staple foods\" and the perishable items within those varieties that SNAP retailers must stock. In addition to codifying the farm bill's changes, the final rule would have changed how staple foods are defined, clarified limitations on retailers' sale of hot foods, and increased the minimum number of stocking units. Section 727 in the enacted appropriation continues to require that USDA amend its final rule to define \"variety\" more expansively and that USDA \"apply the requirements regarding acceptable varieties and breadth of stock\" that were in place prior to P.L. 113-79 until such regulatory amendments are made. In the meantime, USDA-FNS implemented other aspects of the 2016 final rule, such as increased stocking units. On April 5, 2019, USDA did publish a proposed rule, proposing amendments to the definition of \"variety\". Appropriations under the child nutrition account fund a number of programs and activities authorized by the Richard B. Russell National School Lunch Act and the Child Nutrition Act. These include the National School Lunch Program (NSLP), School Breakfast Program (SBP), Child and Adult Care Food Program (CACFP), Summer Food Service Program (SFSP), Special Milk Program (SMP), assistance for state administrative expenses, procurement of commodities (in addition to transfers from separate budget accounts within USDA), state-federal reviews of the integrity of school meal operations (\"Administrative Reviews\"), \"Team Nutrition\" and education initiatives to improve meal quality and food safety, and support activities such as technical assistance to providers and studies/evaluations. (Child nutrition efforts are also supported by permanent mandatory appropriations and other funding sources discussed in the section \" Other Nutrition Funding Support .\") The enacted FY2019 appropriation provides approximately $23.1 billion for child nutrition programs. This is approximately $1.1 billion less (-4.6%) than the amount provided in FY2018, and reflects a transfer of more than $9.1 billion from the Section 32 account. The enacted appropriation funds certain child nutrition discretionary grants. These include the following: School Meals Equipment Grants. The law provides $30 million, the same amount as FY2018. Summer EBT (Electronic Benefit Transfer) Demonstration Projects. These projects provide electronic food benefits over summer months to households with children in order to make up for school meals that children miss when school is out of session and as an alternative to Summer Food Service Program meals. The projects were originally authorized and funded in the FY2010 appropriations law ( P.L. 111-80 ). The enacted appropriation provides $28 million, the same amount as FY2018. The child nutrition programs and WIC were up for reauthorization in 2016, but it was not completed. Many provisions of the operating law nominally expired at the end of FY2015, but nearly all operations continued via funding provided in appropriations laws since that time, including the enacted FY2018 appropriation. The enacted appropriation also continued to extend, through September 30, 2019, two expiring provisions: mandatory funding for an Information Clearinghouse and food safety audits. (See the Appendix for information about the child nutrition programs during the partial government shutdown.) One general provision in the enacted FY2019 appropriation included additional funding for child nutrition programs: Farm to School Grants. Section 754 of the enacted appropriation provides $5 million for competitive grants to assist schools and nonprofit entities in establishing farm-to-school programs. The same amount was provided in FY2018. This is in addition to $5 million in permanent mandatory funding (provided annually by Section 18 of the Richard B. Russell National School Lunch Act), for a total of $10 million available in FY2019. FY2019 general provisions also included policy provisions : Processed Poultry from China. The enacted appropriation includes a policy provision (§749) to prevent any processed poultry imported from China from being included in the National School Lunch Program, School Breakfast Program, Child and Adult Care Food Program, and Summer Food Service Program. This policy has been included in enacted appropriations laws since FY2015. Paid Lunch Pricing . For school year 2019-2020, Section 760 of the enacted appropriation changes federal policy on the pricing of paid (full-price) meals. Included in the 2010 child nutrition reauthorization, and first implemented in the 2011-2012 school year, this policy required schools annually to review their revenue from paid lunches and to determine, using a calculation specified in law and regulation, whether paid prices had to be increased. The purpose of the calculation was to ensure that federal funding intended for F/RP meals was not instead subsidizing full-price meals. For school year 2019-2020, the enacted appropriation requires a smaller subset of schools—only those with a negative balance in their nonprofit school food service account as of December 31, 2018—to be subject to this calculation and potentially to be required to raise prices. The same provision was included in the FY2018 enacted appropriation for school year 2018-2019. Vegetables in School Breakfasts. Section 768 of the enacted appropriation increases the frequency with which starchy vegetables can be substituted for fruits in the School Breakfast Program. Under current regulations, schools are allowed to substitute vegetables for the required servings of fruits (at least one cup daily, and at least five cups weekly) in school breakfasts. The regulations also specify that, \"the first two cups per week of any such substitution must be from the dark green, red/orange, beans and peas (legumes) or 'Other vegetables' subgroups.\" This excludes the starchy vegetable subgroup, which includes corn, plantains, and white potatoes. The enacted appropriation specifies that FY2019 funds cannot be used to enforce this requirement, thereby allowing schools to substitute any type of vegetables for any or all of the required daily and weekly servings of fruits. Child Nutrition Program Commodities. Section 775 of the enacted appropriation changes the calculation of commodity assistance in child nutrition programs. Under current law, commodity assistance in child nutrition programs must comprise at least 12% of total funding provided under Sections 4 and 11 (reimbursements for school lunches) and Section 6 (commodity assistance) of the Richard B. Russell National School Lunch Act. Section 775 eliminates the inclusion of bonus commodities in this calculation as of September 30, 2018, thereby ensuring that only appropriated funds inform the required level of commodity assistance. Although WIC is a discretionary funded program, since the late 1990s the practice of the appropriations committees has been to provide enough funds for WIC to serve all projected participants. The enacted FY2019 appropriation provides $6.075 billion for WIC; however, the law also rescinds available carryover funds from past years. This funding level is $175 million less than the FY2018 appropriation. The enacted appropriation also includes set-asides for WIC breastfeeding peer counselors and related activities (\"not less than $60 million\") and infrastructure ($19.0 million). The peer counselor set-aside is equal to FY2018 levels. The infrastructure set-aside is an increase of $5 million from FY2018, and further sets aside $5 million for telehealth competitive grants to increase WIC access as specified in the law. The enacted law (§723) rescinds $500 million in prior-year (or carryover) WIC funds. The House-reported and Senate-passed bills also would have rescinded carryover funds: H.R. 5961 (§723) would have rescinded $300 million; H.R. 6147 (§724) would have rescinded $400 million. The Commodity Assistance Program budget account supports several discretionary programs and activities: (1) Commodity Supplemental Food Program (CSFP), (2) funding for TEFAP administrative and distribution costs, (3) the WIC Farmers' Market Nutrition Program (FMNP), and (4) special Pacific Island assistance for nuclear-test-affected zones in the Pacific (the Marshall Islands) and areas affected by natural disasters. The enacted appropriation provides over $322 million for this account, no change from FY2018. Within the account, CSFP receives just below $223 million (a decrease of approximately $15 million or 6.8%); TEFAP Administrative Costs receives nearly $110 million—this includes $79.6 million in FY2019 funding (+$15.2 million compared to FY2018) as well as a transfer of $30.0 million in prior-year (carryover) CSFP funds; in addition to this discretionary TEFAP funding, the law allows the conversion of up to 15% of TEFAP entitlement commodity funding (included in the SNAP account discussed above) to administrative and distribution costs; and WIC FMNP receives $18.5 million, the same level as FY2018. This budget account funds federal administration of all the USDA domestic food assistance program areas noted previously; special projects for improving the integrity and quality of these programs; and the Center for Nutrition Policy and Promotion, which provides nutrition education and information to consumers (including various dietary guides). The enacted appropriation provides nearly $165 million for this account, an increase of approximately $11 million from FY2018. As in FY2018 and prior years, the law sets aside $2 million for the fellowship programs administered by the Congressional Hunger Center. Domestic food assistance programs also receive funds from sources other than appropriations: In addition to appropriated funds from the child nutrition account for commodity foods (which provides over $1.4 billion), USDA purchases commodity foods for the child nutrition programs using \"Section 32\" funds—a permanent appropriation. For FY2019, the enacted appropriation specifies that up to $485 million from Section 32 is to be available for child nutrition entitlement commodities, compared to $465 million in FY2018. The Fresh Fruit and Vegetable Program (FFVP) for selected elementary schools nationwide is financed with permanent, mandatory funding from Section 32. The underlying law (Section 19 of the Richard B. Russell National School Lunch Act) provides funds at the beginning of every school year (July). For FY2019, there is $171.5 million available for FFVP, which is consistent with the FY2018 base amount adjusted for inflation. The Food Service Management Institute (technical assistance to child nutrition providers, also known as the Institute of Child Nutrition) is funded through a permanent annual appropriation of $5 million. The Senior Farmers' Market Nutrition program receives nearly $21 million of mandatory funding per year (FY2002-FY2023) outside of the regular appropriations process. USDA was one of the departments affected by a lapse in FY2019 funding and the resulting 35-day partial government shutdown (during parts of December 2018 and January 2019). Most of USDA's Food and Nutrition Service (FNS) programs, whether mandatory or discretionary, rely on funding provided in appropriations acts. As a result, the lapse in FY2019 appropriations required the execution of contingency plans, including staff furloughs, and at times the operating status of programs was in flux. FNS program operations during a government shutdown vary based on the different programs' available resources, determined by factors such as contingency or carryover funds and terms of the expired appropriations acts as well as USDA's decisionmaking. Beginning in late December 2018, FNS released program-specific memoranda to states and program operators describing the status of different nutrition assistance programs during the funding lapse. In addition to the impact on programs' funding discussed below, furloughs of FNS staff during this time period may have affected program operations (for example, the availability of technical assistance) on a case-by-case basis. This appendix summarizes some of the key issues and impacts on the SNAP, Child Nutrition, and WIC programs during this partial government shutdown. Further detail can be found in the FNS documents referenced above. It is important to note that because circumstances during a lapse in appropriations and executive-branch decisionmaking can vary, operations during this partial shutdown are not necessarily how a future shutdown would proceed. SNAP Benefits States issue SNAP benefits on a monthly basis. As in the FY2019 appropriations law, the FY2018 appropriations law ( P.L. 115-141 ) provided one year of SNAP funding as well as a contingency fund of $3 billion that can be spent in FY2018 or FY2019. The $3 billion is less than the cost of one month of SNAP benefits, so the contingency fund alone would not fund a month of SNAP benefits in the case of a lapse of funding. At the start of the partial shutdown, when a continuing resolution ( P.L. 115-298 ) expired after December 21, 2018, December 2018 benefits had already been provided. In addition, during the shutdown period, a provision of the continuing resolution allowed for payments to be made 30 days after the continuing resolution's expiration; this allowed states to issue January 2019 benefits. On January 8, 2019, USDA interpreted the provision to authorize issuance of February 2019 benefits as well, so long as states conducted early issuance—before January 20, 2019. By the end of the partial shutdown, recipients had received their December 2018, January 2019, and February 2019 benefits. However, at the beginning of the shutdown, it was not clear that benefits would be provided for these months. USDA-FNS provided a series of memoranda to states during the shutdown that included answers to frequently asked questions. Child Nutrition and WIC Unlike SNAP, the appropriations language for the child nutrition programs (National School Lunch Program and others) and WIC accounts provides funding that can be obligated over a two-year period. WIC also has a contingency fund. In addition, the child nutrition programs may have more flexibility to continue operating during a shutdown because federal funds are generally provided retroactively (on a reimbursement basis). During the FY2019 lapse in funding, the Administration had carryover and contingency funds to maintain program operations. This includes FY2018 appropriations that are available for spending through FY2019 and contingency funds (in the case of WIC). Programs with this source of funding potentially available are those with two-year funding from the Child Nutrition Programs account and the WIC account. How long these operations could continue would depend on (1) the funding lapse's duration and (2) the amount of carryover or contingency funding available. Ultimately, for child nutrition and WIC programs, USDA continued operating the child nutrition programs \"with funding provided under the terms and conditions of the prior continuing resolution [P.L. 115-245]\"; USDA stated that the programs had enough funding to continue operating at least through March 2019 if the shutdown were to continue; and USDA continued WIC and WIC FMNP operations using funding that had already been allocated to states and, for WIC, prior-year carryover funding. ", "summary": "The Consolidated Appropriations Act, 2019 (P.L. 116-6) was enacted on February 15, 2019. This omnibus bill included appropriations for the U.S. Department of Agriculture (USDA), of which USDA's domestic food assistance programs are a part. Prior to its enactment, the federal government had continued to operate for the first six months of the fiscal year under continuing resolutions (CRs). This report focuses on the enacted appropriations for USDA's domestic food assistance programs and, in some instances, policy changes provided by the omnibus law. CRS Report R45230, Agriculture and Related Agencies: FY2019 Appropriations provides an overview of the entire FY2019 Agriculture and Related Agencies portion of the law as well as a review of the reported bills and CRs preceding it. USDA experienced a 35-day lapse in FY2019 funding and partial government shutdown prior to the enactment of P.L. 116-6. Domestic food assistance funding is primarily mandatory but also includes discretionary funding. Most of the programs' funding is for open-ended, appropriated mandatory spending—that is, terms of the authorizing law require full funding and funding may vary with program participation (and in some cases inflation). The largest mandatory programs include the Supplemental Nutrition Assistance Program (SNAP, formerly the Food Stamp Program) and the child nutrition programs (including the National School Lunch Program and School Breakfast Program). Though their funding levels are dictated by the authorizing law, in most cases, appropriations are needed to make funds available for obligation and expenditure. The three largest discretionary budget items are the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC); the Commodity Supplemental Food Program (CSFP); and federal nutrition program administration. The domestic food assistance funding is, for the most part, administered by USDA's Food and Nutrition Service (FNS). The enacted FY2019 appropriation provides over $103 billion for domestic food assistance (Table 1). This is a decrease of approximately $1.7 billion from FY2018. Declining participation in SNAP is responsible for most of the difference. Approximately 94% of the FY2018 appropriations for domestic food assistance are for mandatory spending. Highlights of the associated appropriations accounts are summarized below. For SNAP and other programs authorized by the Food and Nutrition Act, such as The Emergency Food Assistance Program (TEFAP) commodities, the FY2019 appropriations law provides approximately $73.5 billion. Certain provisions of the law affect SNAP policies. For example, it continues a policy in the FY2017 and FY2018 appropriations laws that limited USDA's implementation of December 2016 regulations regarding SNAP retailers' inventory requirements. USDA must amend its final rule to define \"variety\" more expansively and must \"apply the requirements regarding acceptable varieties and breadth of stock.\" For the child nutrition programs (the National School Lunch Program and others), the enacted law provides approximately $23.1 billion. This includes discretionary funding for school meals equipment grants ($30 million) and Summer Electronic Benefit Transfer (EBT) demonstration projects ($28 million), and a general provision that provides an additional $5 million for farm-to-school grants. The law includes policy provisions related to processed poultry from China, requirements for schools' paid lunch pricing, vegetables in school breakfasts, and the use of commodities in child nutrition programs. For the WIC program, the law provides nearly $6.1 billion while also rescinding $500 million in prior-year carryover funding. The law includes new funding for telehealth grants. For the Commodity Assistance Program account, which includes funding for the Commodity Supplemental Food Program (CSFP), TEFAP administrative and distribution costs, and other programs, the law provides over $322 million. The law increases discretionary funding for TEFAP administrative and distribution costs through the annual appropriation and through a $30 million transfer of prior-year CSFP funds. For Nutrition Programs Administration, the law provides nearly $165 million.", "document_type": "crs"}
{"report": "Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned, in-house data centers. This shift is intended to achieve two goals: reduce the total investment by the federal government in information technology (IT), which currently stands at about $90 billion each year, and realize other stated advantages of cloud adoption , including efficiency, accessibility, collaboration, reliability, and security. However, challenges remain as agencies shift to cloud services. According to a survey conducted in September 2018, federal IT managers continue to express long-held concerns about security in certain cloud environments, the complexity of migrating existing (\"legacy\") applications to the cloud, a lack of skilled staff to manage certain cloud environments, and uncertain funding. This report explains what cloud computing is, including different models for cloud deployment and services, and describes the federal government's planning for IT reform. It also provides information on assessments that have been conducted on agency cloud adoption. Finally, the report provides a summary of recent congressional action and presents some possible mechanisms for Congress to monitor agencies as they implement cloud computing. Cloud computing is a new name for an old concept: the delivery of computing services from a remote location. Cloud computing services are delivered through a network, usually the internet. Some analysts see this approach as analogous to the networked delivery of electricity, water, and other utilities through the electric grid, water delivery systems, and other distribution infrastructure. In some ways, cloud computing is reminiscent of computing before the advent of the personal computer, when users shared the power of a central mainframe computer through video terminals or other devices. Cloud computing, however, is much more powerful and flexible, and information technology advances may permit the approach to become nearly ubiquitous. Cloud computing differs from local computing, in which local machines perform most tasks and store the relevant data. Some cloud services are adaptations of familiar applications, such as email and word processing. Others are new services that never existed as a local application, such as social networks. As cloud computing has developed, varied and sometimes nebulous descriptions of what it is and what it is not have been commonplace. Such ambiguity can create uncertainties that may impede innovation and adoption. The National Institute of Standards and Technology (NIST) has developed standardized language describing cloud computing to help clear up that ambiguity: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. The first sentence of the definition basically states that cloud computing is a way of providing convenient, flexible access to a broad range of computing resources over a network. The characteristics and models referred to in the second sentence provide the specificity necessary to clarify what cloud computing is and is not, described below. Cloud computing differs from local computing in many ways. NIST has identified five characteristics in particular: On-demand self-service: A user can directly access the needed computing capabilities from the source, no matter what specific resource is required. An analogy is that a television viewer or radio listener can change stations at will. Broad network access: A user is not tied to one location but can access resources from anywhere the network (typically the internet) is available. Resource pooling: Many users share the same overall set of resources from a provider, using what they need, without having to concern themselves with where those resources originate. An analogy is that homeowners and businesses do not need to know which specific power plants generated the electricity they are using [although some do care, and specifically buy power from \"green\" sources]. Rapid elasticity: Users can quickly increase or decrease their use of a computing resource in response to their immediate needs. An analogy is that electricity customers can use as little or as much power as they need, within the capacity of their connections to the grid. Measured service: The amount of usage by a customer is monitored by the provider and can be used for billing or other purposes. An analogy is the metered use of electricity, water, natural gas, and other utilities. NIST has identified four standard models, or types, of cloud computing that can be implemented to satisfy the varying needs of users or providers. Those modelsâpublic, private, community, and hybridâvary in where the hardware is located, what entity is responsible for maintaining the system, and who can use system resources. An extensive list of deployment model adoption by federal agencies is in the April 2019 report by the Government Accountability Office, Cloud Computing: Agencies Have Increased Usage and Realized Benefits, but Cost and Savings Data Need to Be Better Tracked . In public cloud (sometimes called external cloud ) computing, a provider supplies one or more cloud-computing services to a large group of independent customers, such as the general public. Customers use the service over the internet through web browsers or other software applications. Providers usually sell these services on a metered basis, an approach that is sometimes called \"utility computing.\" Some common examples of services using a public cloud model include internet backup and file synchronization and web-based media services. Public clouds may have price and flexibility advantages over other deployment models, but security and other concerns could restrict federal use. The public cloud deployment model is used predominantly by businesses with low privacy concerns. A private cloud (sometimes called an internal cloud ) works like public cloud computing, but on a private network controlled and used by a single organization. It is a cloud used by a company itselfârather than its customers. Private clouds may provide services that are similar to those provided by public cloud providers, but potentially with fewer risks. Potential disadvantages include cost and logistical challenges associated with purchasing and managing the required hardware and software. Private clouds can provide internal services such as data storage as well as external services to the public or other users. A community cloud allows a group of organizations with similar requirements to share infrastructure, thereby potentially realizing more of the benefits of public cloud computing than is possible with a purely private cloud. Because a community cloud has a much smaller user base than a public cloud, it may be more expensive to establish and operate, but it may also allow for more customization to meet the users' needs. It may also meet user-specific security and other requirements more effectively than a public cloud. Just like private cloud, community cloud is technically no different from public cloud. The only difference is who is allowed to use it. A hybrid cloud uses a combination of internal (private or community) and external (public) providers. For example, a user could employ a private or community cloud to provide applications and store current data, but use a public cloud for archiving data. The flexibility of this deployment model may make it particularly attractive to many organizations. By combining different deployment models, users can choose the right balance for their organization between legal compliance, security, and scalability. Cloud computing can provide various kinds of services, ranging from basic computing tasks to the provision of sophisticated applications. While these services can be categorized in different ways, the NIST definition uses three basic service models , described below. In the SaaS model, customers use applications that the provider supplies and makes available remotely on demand, rather than using applications installed on a local workstation or server. SaaS is the most readily visible and simplest service model to the end user. In many cases, SaaS applications are accessible through hardware or software \"thin clients.\" Examples include web-based services such as Google Apps and online storage such as DropBox. With PaaS, customers create applications on the provider's infrastructure using tools, such as programming languages, supplied by the provider. Facebook is one example of such an application. Such a platform could include hosting capability and development tools to facilitate building, testing, and launching a web application. The user controls the applications created via the platform, and the provider controls and maintains the underlying infrastructure, including networks, servers, and platform upgrades. IaaS providers supply fundamental computing resources that customers can use however they wish. Customers can install, use, and control whatever operating systems and applications they desire, as they might otherwise do on desktop computers or local servers. The provider maintains the underlying cloud infrastructure. Examples of IaaS are Amazon Web Services and Microsoft Azure. A simple local-computing analogy for these three kinds of services would be the purchase of a desktop computer, which serves as infrastructure on which the user installs a chosen operating system such as Windows or Linux and uses it as a platform to create custom applications and run whatever software is needed. By providing these infrastructure, platform, and software services remotely, a cloud provider frees its customers from having to provide local infrastructure and support. In the case of IaaS, the user need not have a local workstation, using instead a thin client with minimal need for computing power. Planning for cloud adoption by federal agencies began with the 2010 publication by the Federal Chief Information Officer (CIO) of \"A 25-Point Implementation Plan to Reform Federal IT Management.\" The reforms put forth in the plan were focused on eliminating barriers that were impeding effective management of IT programs throughout the federal government. In the plan, the Federal CIO recognized that too many past federal IT projects had run over budget, fallen behind schedule, or failed to deliver promised functionality. The plan stated that the federal government would shift to a \"Cloud First\" strategy, which it stated would be more economical, faster, and more flexible. Increased cloud adoption is also a stated goal of the Federal Information Technology Acquisition Reform Act (FITARA), enacted on December 19, 2014. Among other provisions, FITARA required the Federal CIO, in conjunction with federal agencies, to refocus the Federal Data Center Consolidation Initiative (FDCCI) to include adoption of cloud services. The FDCCI was superseded by the Data Center Optimization Initiative (DCOI) in August 2016. In the 2017 \"Report to the President on Federal IT Modernization,\" the Office of Management and Budget (OMB) pledged to update the federal government's legacy Federal Cloud Computing Strategy (\"Cloud First\"). Fulfilling this requirement, the Administration developed a new strategy, Cloud Smart, published as a draft on September 24, 2018. The DCOI was updated in June 2019. Among other requirements, the updated DCOI placed a freeze on funds or resources to build new agency-owned data centers or significantly expand existing agency-owned data centers without approval from OMB. It also requires agencies to evaluate options for the consolidation and closure of existing data centers, in alignment with the Cloud Smart Strategy. On June 24, 2019, the Federal CIO issued the Cloud Smart Strategy to provide agencies with practical implementation guidance to achieve the potential of cloud-based technologies. The new strategy is founded on three pillars: Security: Modernize security policies to focus on risk-based decisionmaking, automation, and moving protections closer to data. Procurement: Improve the ability of agencies to purchase cloud solutions through repeatable practices and sharing knowledge. Workforce: Upskill, retrain, and recruit key talent for cybersecurity, acquisition, and cloud engineering. Across these areas, the strategy identifies 22 \"action items\" to be completed not later than December 2020. As of November 2019, over half had been completed. (See Table 1 and Table 2 . ) In April 2019, the Government Accountability Office (GAO) published a report examining the status of cloud adoption at 16 agencies. GAO found that 10 of the agencies reported increasing their use of cloud services from FY2016 through FY2019. All 16 agencies had made progress in implementing cloud services, meaning they had established assessment guidance, performed assessments, and implemented services, but the extent of their progress varied. For example, not all had followed OMB guidance that directs agencies to review all IT investments for compatibility with cloud services. GAO also found that 16 agencies reported an increase in their cloud service spending since 2015. 13 of the 16 agencies saved a total of $291 million to date from using cloud services. 15 of the 16 agencies identified significant benefits from acquiring cloud services, including improved customer service and the acquisition of more cost-effective options for managing IT services. 15 of the 16 agencies identified nine cloud investments that enhanced the availability of weather-related information; facilitated collaboration and information sharing among federal, state, and local agencies related to homeland security; and provided benefits information to veterans. In collecting the information requested by GAO, agency CIOs identified the following challenges: Spending data were not consistently tracked. Different methods were used to calculate cloud spending costs. Interpreting changes in OMB and related guidance created confusion regarding what spending data should be tracked. As a result of these challenges, GAO concluded that agency-reported cloud spending and savings figures were likely underreported. GAO made one recommendation to OMB on cloud savings reporting, and 34 recommendations to the 16 agencies on cloud assessments and savings. To OMB, GAO recommended that agencies be required to explicitly report, at least on a quarterly basis, the savings and cost avoidance associated with cloud computing investments. The 34 recommendations to the agencies included directing CIOs to establish guidance to assess new and existing IT investments for suitability for cloud computing services; complete an assessment of existing IT investments for suitability for migration to a cloud computing service; and establish a consistent and repeatable mechanism to track savings and cost avoidances from the migration and deployment of cloud services. Congress has conducted ongoing oversight of IT acquisitions, including cloud computing activity, for many years. This section summarizes cloud-related legislation and hearings in the 116 th Congress. The Federal Risk and Authorization Management Program (FedRAMP) Authorization Act ( H.R. 3941 ), introduced on July 24, 2019, by Representative Gerald Connolly, would establish a risk management, authorization, and continuous monitoring process to \"leverage cloud computing services using a risk-based approach consistent with the Federal Information Security Modernization Act of 2014.\" On July 17, 2019, the House Committee on Oversight and Reform Subcommittee on Government Operations held a hearing titled \"To the Cloud! The Cloudy Role of FedRAMP in IT Modernization.\" The purpose of this hearing was to examine the extent to which FedRAMP has reduced duplicative efforts, inconsistencies, and cost inefficiencies associated with the cloud security authorization process. On October 18, 2019, the Committee on Financial Services Task Force on Artificial Intelligence (AI) held a hearing, \"AI and the Evolution of Cloud Computing: Evaluating How Financial Data Is Stored, Protected, and Maintained by Cloud Providers.\" Among other topics, the hearing explored how AI could be used to improve cloud management functions. Since November 2015, a year after FITARA became law, the House Committee on Oversight and Reform has held two FITARA oversight hearings per year. These hearings provide a \"scorecard\" on various aspects of FITARA implementation, including data center optimization, which is an indication of the extent of agency adoption of cloud computing. Thus far in the 116 th Congress, these hearings were held on June 26, 2019, and December 11, 2019. As Congress monitors the progress of federal departments and agencies in implementing cloud computing, its options for ongoing oversight include holding hearings; requesting review of an agency's status by either the agency itself or the GAO; and assessing the agency's progress and projected goals against the stated goals of the Cloud Smart Strategy. Committees might choose to focus hearings on OMB, which oversees the management of the Cloud Smart Strategy at the agency level. This role makes OMB the central point of information regarding the status of agency planning and implementation. If OMB management practices for cloud computing are lacking, the impact could potentially affect the performance of all agencies. Consistent congressional review of OMB's management practices with respect to the Cloud Smart Strategy could help to detect and correct problems in a timely manner. Alternatively, or in addition, committees might choose to hold hearings to receive status reports directly from the CIOs of particular agencies under their jurisdictions. As plans to migrate to cloud services within the federal government are created and implemented, policymakers may choose to monitor how agencies are following federal directives and responding to GAO assessments. Such monitoring could be achieved through assessments conducted internally by a department or agency itself, externally by GAO, or directly by a committee of jurisdiction. A model for internal assessments and reporting could be based on progress made on the uncompleted items of the Cloud Smart Strategy. GAO conducts status reports on cloud adoption across the federal agencies, such as the April 2019 report discussed above, but it has not issued separate reports focused on the status of individual departments or agencies. When examining shortcomings in individual agencies' implementation of the Cloud Smart Strategy, as identified by GAO, Congress might consider requesting follow-up reviews focused on particular challenges. ", "summary": "Cloud computing is a new name for an old concept: the delivery of computing services from a remote location, analogous to the way electricity, water, and other utilities are provided to most customers. Cloud computing services are delivered through a network, usually the internet. Utilities are also delivered through networks, whether the electric grid, water delivery systems, or other distribution infrastructure. In some ways, cloud computing is reminiscent of computing before the advent of the personal computer, where users shared the power of a central mainframe computer through video terminals or other devices. Cloud computing, however, is much more powerful and flexible, and information technology advances may permit the approach to become ubiquitous. As cloud computing has developed, varied and sometimes nebulous descriptions of what it is and what it is not have been commonplace. Such ambiguity can create uncertainties that may impede innovation and adoption. The National Institute of Standards and Technology has developed standardized language describing cloud computing to help clear up that ambiguity: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models. Since 2009, the federal government has been shifting its data storage needs to cloud-based services and away from agency-owned, in-house data centers. This shift is intended to achieve two goals: reduce the total investment by the federal government in information technology (IT), which currently stands at about $90 billion each year, and realize other stated advantages of cloud adoption: efficiency, accessibility, collaboration, rapidity of innovation, reliability, and security. However, challenges remain as agencies shift to cloud services. According to a survey conducted in September 2018, federal IT managers expressed concerns about security in certain cloud environments, the complexity of migrating existing (\"legacy\") applications to the cloud, a lack of skilled staff to manage certain cloud environments, and uncertain funding. Planning for cloud adoption by federal agencies began with the 2010 publication of \"A 25-Point Implementation Plan to Reform Federal IT Management.\" More recently, in the 2017 \"Report to the President on Federal IT Modernization,\" the Office of Management and Budget (OMB) pledged to update the government's legacy Federal Cloud Computing Strategy (\"Cloud First\"). Fulfilling this requirement, the Administration developed a new strategy, \"Cloud Smart,\" which was published on September 24, 2018. The new strategy is founded on what the Administration considers the three key pillars of successful cloud adoption: security, procurement, and workforce. In the 116 th Congress, there has been one cloud-related bill introduced and two hearings directly related to cloud computing: The Federal Risk and Authorization Management Program (FedRAMP) Authorization Act ( H.R. 3941 ) was introduced on July 24, 2019, by Representative Gerald Connolly. The bill would formally establish within the General Services Administration a risk management, authorization, and continuous monitoring process consistent with the Federal Information Security Modernization Act of 2014.\" On July 17, 2019, the House Committee on Government Reform Subcommittee on Government Operations held a hearing, \"To the Cloud! The Cloudy Role of FedRAMP in IT Modernization.\" The purpose of the hearing was to examine the extent to which FedRAMP has reduced duplicative efforts, inconsistencies, and cost inefficiencies associated with the cloud security authorization process. On October 18, 2019, the Committee on Financial Services Task Force on Artificial Intelligence (AI) held a hearing, \"AI and the Evolution of Cloud Computing: Evaluating How Financial Data Is Stored, Protected, and Maintained by Cloud Providers.\" Among other topics, the hearing explored how AI could be used to improve cloud management functions. Additionally, there have been two hearings on the implementation status of the Federal Information Technology Acquisition Reform Act. These hearings provide an update on data center optimization, which is an indication of the extent of agency adoption of cloud computing.", "document_type": "crs"}
{"report": "Throughout U.S. history, Congress has created advisory commissions to assist in the development of public policy. Among other contexts, commissions have been used following crisis situations, including the September 11, 2001, terrorist attacks and the 2008 financial crisis. In such situations, advisory commissions may potentially provide Congress with a high-visibility forum to assemble expertise that might not exist within the legislative environment; allow for the in-depth examination of complex, cross-cutting policy issues; and lend bipartisan credibility to a set of findings and recommendations. As Congress considers its range of responses to the coronavirus pandemic, the creation of one or more congressional advisory commissions is an option that could provide a platform for evaluating various pandemic-related policy issues over time. Past congressional advisory commissions have retrospectively evaluated policy responses, brought together diverse groups of experts, and supplemented existing congressional oversight mechanisms. Policymakers may determine that creating an advisory commission is unnecessary and instead prefer to utilize existing congressional oversight structures, such as standing or select committees, or already established oversight entities. This report provides a comparative analysis of five proposed congressional advisory commissions that would investigate various aspects of the COVID-19 pandemic. The five proposed commissions are found in H.R. 6429 (the National Commission on COVID-19 Act, sponsored by Representative Stephanie Murphy), H.R. 6431 (the Made in America Emergency Preparedness Act, sponsored by Representative Brian Fitzpatrick), H.R. 6440 (the Pandemic Rapid Response Act, sponsored by Representative Rodney Davis), H.R. 6455 (the COVID-19 Commission Act, sponsored by Representative Bennie Thompson), and H.R. 6548 (the National Commission on the COVID-19 Pandemic in the United States Act, sponsored by Representative Adam Schiff). The overall structures of each of the proposed commissions are similar in many respects, both to each other and to previous independent advisory entities established by Congress. Specifically, the proposed commissions would (1) exist temporarily; (2) serve in an advisory capacity; and (3) report a work product detailing the commission's findings, conclusions, and recommendations. That said, each particular proposed commission has distinctive elements, particularly concerning its membership structure, appointment structure, and time line for reporting its work product to Congress. This report compares the (1) membership structure, (2) appointment structure, (3) rules of procedure and operation, (4) duties and reporting requirements, (5) powers of the commission, (6) staffing issues, and (7) funding for each of the proposed COVID-19 commissions. Table 1 (at the end of this report) provides a side-by-side comparison of major provisions of the five proposals. Several matters related to a commission's membership structure might be considered. They include the size of a commission, member qualifications, compensation of commission members, and requirements for partisan balance. In general, there is significant variation in the size of congressional advisory commissions. Among 155 identified congressional commissions created between the 101 st Congress and the 115 th Congress, the median size was 12 members, with the smallest commission having 5 members and the largest 33 members. The membership structure of each of the five proposed commissions is similar to previous independent advisory entities created by Congress. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 would each create a 10-member entity. H.R. 6455 would create a 25-member entity. Past legislation creating congressional commissions has often required or suggested that commission members possess certain substantive qualifications. Such provisions arguably make it more likely that the commission is populated with genuine experts in the policy area, which may improve the commission's final work product. H.R. 6455 would provide that commissioners \"shall be a United States person with significant expertise\" in a variety of fields related to public health and public administration. H.R. 6440 , H.R. 6429 , H.R. 6431 , and H.R. 6548 would provide \"the sense of Congress\" that commission members should be \"prominent U.S. citizens\" who are nationally recognized experts in a variety of fields relevant to the pandemic and response efforts. In addition, H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 all prohibit the appointment of federal, state, and local government employees and officers. H.R. 6455 would prohibit federal employees from being commission members. Some congressional commissions have compensated their members. For example, the National Commission on Terrorist Attacks Upon the United States (9/11 Commission) and the Financial Crisis Inquiry Commission provided that commission members could be compensated at a daily rate of basic pay. Nearly all have reimbursed members for travel expenses. Those that have provided for commissioner compensation most frequently provided compensation at the daily equivalent of level IV of the Executive Schedule. Each of the five proposals would provide that commission members be compensated at a rate \"not to exceed the daily equivalent of the annual rate of basic pay\" for level IV of the Executive Schedule, \"for each day during which that member is engaged in the actual performance of duties of the Commission.\" Members of three proposed commissions would receive travel expenses, including a per diem. Each proposal provides a limit on the number of members appointed from the same political party. H.R. 6455 would provide that not more than 13 of its 25 members may be from the same party. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 would provide that not more than 5 (of 10) members are from the same party. Most previous advisory entities created by Congress do not impose formal partisan restrictions on the membership structure. It may also be difficult to assess the political affiliation of potential members, who may have no formal affiliation (voter registration, for example) with a political party. Instead, most past advisory commissions usually achieve partisan balance through the appointment structure; for instance, by providing equal (or near-equal) numbers of appointments to congressional leaders of each party. Past congressional commissions have used a wide variety of appointment structures. Considerations regarding appointment structures include partisan balance, filling vacancies, and the time line for making commission appointments. The statutory scheme may directly designate members of the commission, such as a specific cabinet official or a congressional leader. In other cases, selected congressional leaders, often with balance between the parties, appoint commission members. A third common statutory scheme is to have selected leaders, such as committee chairs and ranking members, recommend candidates for appointment to a commission. These selected leaders may act either in parallel or jointly, and the recommendation may be made either to other congressional leaders, such as the Speaker of the House and President pro tempore of the Senate, or to the President. Each of the five commission proposals would delegate most or all appointment authority to congressional leaders (including chamber, party, and committee leaders; see Table 1 for details). Additionally, H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 provide for one appointment to be made by the President. H.R. 6429 , H.R. 6431 , and H.R. 6548 would have the President appoint the commission's chair. H.R. 6455 has its membership appointed by the chairs and ranking members of designated House and Senate committees, and the Joint Economic Committee. H.R. 6455 does not provide any executive branch appointments. Attention to the proper balance between the number of members appointed by congressional leaders and by other individuals (such as the President), or to the number of Members of Congress required to be among the appointees, or to the qualifications of appointees, can be significant factors in enabling a commission to fulfill its congressional mandate. In general, a commission's appointment scheme can impact both the commission's ability to fulfill its statutory duties and its final work product. For instance, if the scheme provides only for the appointment of Members of Congress to the commission, it arguably might not have the technical expertise or diversity of knowledge to complete its duties within the time given by statute. Similarly, if the appointment scheme includes qualifying provisos so specific that only a small set of private citizens could serve on the panel, the commission's final work product may arguably only represent a narrow range of viewpoints. None of the proposed COVID-19 commissions specify whether Members of Congress may serve on the commission. Most previous congressional advisory commissions have been structured to be bipartisan, with an even (or near-even) split of appointments between leaders of the two major parties. By achieving a nonpartisan or bipartisan character, congressional commissions may make their findings and recommendations more politically acceptable to diverse viewpoints. The bipartisan or nonpartisan arrangement can give recommendations strong credibility, both in Congress and among the public, even when dealing with divisive public policy issues. Similarly, commission recommendations that are perceived as partisan may have difficulty gaining support in Congress. In some cases, however, bipartisanship also can arguably impede a commission's ability to complete its mandate. In situations where a commission is tasked with studying divisive or partisan issues, the appointment of an equal number of majority and minority commissioners may serve to promote partisanship within the commission rather than suppress it, raising the possibility of deadlock where neither side can muster a majority to act. Each of the five proposals employs a structure where leaders in both the majority and minority parties in Congress would make appointments. H.R. 6429 , H.R. 6431 , and H.R. 6548 would provide for five majority and five minority appointments, including one for the President. H.R. 6440 would include two each by the Senate majority leader, the Senate minority leader, and the Speaker of the House, with one appointment by the House minority leader and one by the President, and the chair appointed by the Speaker and vice chair appointed by the Senate majority leader. H.R. 6455 would have 12 majority and 12 minority appointments made by the 12 committee chairs and ranking members and one member jointly appointed by the chair and vice chair of the Joint Economic Committee. All five proposals provide that vacancies on the commission will not affect its powers and would be filled in the same manner as the original appointment. Three of the bills propose specific deadlines for the appointment of commissioners. H.R. 6429 and H.R. 6548 provide that appointments are made between specific dates in January or February 2021. Further, H.R. 6429 provides that commission members could be appointed in September 2020, if there is no longer a COVID-19 public health emergency in effectâas determined by the Secretary of Health and Human Servicesâas of August 31, 2020. H.R. 6440 would require all appointments be made by December 15, 2020. H.R. 6455 would require appointments to be made within 45 days after enactment. H.R. 6429 , H.R. 6440 , and H.R. 6548 would start the commission's work in early 2021, as the commission cannot operate without the appointment of members. H.R. 6429 , however would provide that the proposed commission's work would begin no later than October 31, 2020, if members are appointed in September 2020. H.R. 6431 does not specify a deadline for the appointment of members. Typically, deadlines for appointment can range from several weeks to several months. For example, the deadline for appointments to the Antitrust Modernization Commission was 60 days after the enactment of its establishing act. The deadline for appointment to the Commission on Wartime Contracting in Iraq and Afghanistan was 120 days from the date of enactment. The deadline for appointment to the 9/11 Commission was December 15, 2002, 18 days after enactment of the act. While most statutes that authorize congressional advisory commissions do not provide detailed procedures for how the commission should conduct its business, the statutory language may provide a general structure, including a mechanism for selecting a chair and procedures for creating rules. None of the five COVID-19 commission proposals contain language that directs the process for potentially adopting rules of procedure. For a comparison of each proposed commission's specified rules of procedures and operations, see Table 1 . Each bill provides for the selection of a chair and/or vice chair of the commission. H.R. 6429 , H.R. 6431 , and H.R. 6548 would have the chair appointed by the President and the vice chair appointed by congressional leaders of the political party opposite the President. H.R. 6440 would have the chair appointed by the Speaker of the House (in consultation with the Senate majority leader and the House minority leader) and the vice chair appointed by the Senate majority leader (in consultation with the Speaker of the House and the Senate minority leader). H.R. 6455 would have the chair and vice chair chosen from among commission members by a majority vote of the commission, and would require the chair and vice chair to have \"significant experience\" in areas to be studied by the commission. As with the timing of commission appointments, some authorizing statutes are prescriptive in when the commission's first meeting should take place. Three of the bills analyzed here provide specific time lines for the commission's first meeting. H.R. 6429 would require the first meeting to be no later than March 15, 2021, unless members are appointed in September 2020 (if no public health emergency exists). H.R. 6455 would require the first meeting within 45 days after the appointment of all commission members, which isâgiven the 45-day deadline for appointmentâeffectively a maximum of 90 days after enactment. H.R. 6548 would direct the commission to hold its initial meeting \"as soon as practicable,\" but not later than March 5, 2021. H.R. 6431 and H.R. 6440 do not provide for an initial meeting deadline. Instead, they direct the commission to meet \"as soon as practicable.\" Most commission statutes provide that a quorum will consist of a particular number of commissioners, usually a majority, but occasionally a supermajority. All five bills would provide for a quorum requirement. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 would define a quorum as 6 (of 10) members. H.R. 6455 would provide that a quorum is 18 of 25 members (72%). All five commission bills would require commission meetings to be open to the public. Each bill would also require that reports be made publicly available. Absent statutory guidance (eithe r in general statutes or in individual statutes authorizing commissions), advisory entities vary widely in how they adopt their rules of procedure. In general, three models exist: formal written rules, informal rules, and the reliance on norms. Any individual advisory entity might make use of all three of these models for different types of decisionmaking. The choice to adopt written rules or rely on informal norms to guide commission procedure may be based on a variety of factors, such as the entity's size, the frequency of meetings, member preferences regarding formality, the level of collegiality among members, and the amount of procedural guidance provided by the entity's authorizing statute. Regardless of how procedural issues are handled, protocol for decisionmaking regarding the following operational issues may be important for the commission to consider at the outset of its existence: eligibility to vote and proxy rules; staff hiring, compensation, and work assignments; hearings, meetings, and field visits; nonstaff expenditures and contracting; reports to Congress; budgeting; and procedures for future modification of rules. None of the five COVID-19 commission proposals specify that the proposed commission must adopt written rules. The Federal Advisory Committee Act (FACA) mandates certain structural and operational requirements, including formal reporting and oversight procedures, for certain federal advisory bodies that advise the executive branch. Three proposals ( H.R. 6429 , H.R. 6431 , and H.R. 6548 ) specifically exempt the proposed commission from FACA. Of the remaining two, FACA would also likely not apply to the commission proposed in H.R. 6455 because it would be appointed entirely by Members of Congress, although it only specifies that its final report is public, not whether it is specifically sent to Congress and/or the President. It is not clear that FACA would apply to the commission proposed in H.R. 6440 . Although it includes a presidential appointment and its report would be sent to both Congress and the President, its establishment clause specifies that the commission \"is established in the legislative branch,\" and a super-majority of its members would be appointed by Congress. Most congressional commissions are generally considered policy commissionsâtemporary bodies that study particular policy problems and report their findings to Congress or review a specific event. All five of the proposed commissions would be tasked with duties that are analogous to those of past policy commissions. While the specific mandates differ somewhat, all proposed commissions are tasked with investigating aspects of the COVID-19 pandemic and submitting one or more reports that include the commission's findings, conclusions, and recommendations for legislative action. H.R. 6440 would specifically require the commission to avoid unnecessary duplication of work being conducted by the Government Accountability Office (GAO), congressional committees, and executive branch agency and independent commission investigations. Each proposed commission would be tasked with issuing a final report detailing its findings, conclusions, and recommendations. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 would provide that the commission \"may submit\" interim reports to Congress and the President, but do not provide time lines on when those reports might be submitted. In each case, the interim report would need to be agreed to by a majority of commission members. H.R. 6431 would also require the commission to submit a report on actions taken by the states and a report on essential products, materials, ingredients, and equipment required to fight pandemics. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 also specify that final reports shall be agreed to by a majority of commission members. H.R. 6455 does not specify a vote threshold for approval of its report. None of the bills make specific provisions for the inclusion of minority viewpoints. Presumably this would leave each commission with discretion on whether to include or exclude minority viewpoints. Past advisory entities have been proposed or established with a variety of statutory reporting conditions, including the specification of majority or super-majority rules for report adoption and provisions requiring the inclusion of minority viewpoints. In practice, advisory bodies that are not given statutory direction on these matters have tended to work under simple-majority rules for report adoption. H.R. 6429 would require a final report one year after the commission's initial meeting. H.R. 6431 and H.R. 6440 would require a final report not later than 18 months after enactment. H.R. 6455 would require a final report to be published not later than 18 months after the commission's first meeting. H.R. 6548 would require a final report by October 15, 2021. This deadline could be extended by 90 days upon a vote of no fewer than 8 (out of 10) commission members. The commission could vote to extend its final report deadline up to three times, and would be required to notify Congress, the President, and the public of any such extension. While such a deadline would potentially give the commission a defined period of time to complete its work, setting a particular date for report completion could potentially create unintended time constraints. Any delay in the passage of the legislation or in the appointment process would reduce the amount of time the commission has to complete its work, even with the opportunity for the commission to extend its own deadline up to three times. The length of time a congressional commission has to complete its work is arguably one of the most consequential decisions when designing an advisory entity. If the entity has a short window of time, the quality of its work product may suffer or it may not be able to fulfill its statutory mandate on time. On the other hand, if the commission is given a long period of time to complete its work, it may undermine one of a commission's primary legislative advantages, the timely production of expert advice on a current matter. A short deadline may also affect the process of standing up a new commission. The selection of commissioners, recruitment of staff, arrangement of office space, and other logistical matters may require expedited action if short deadlines need to be met. Of the five proposed commissions, four ( H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6548 ) are directed to submit their reports to both Congress and the President. H.R. 6455 requires that the report is made public. Most congressional advisory commissions are required to submit their reports to Congress, and sometimes to the President or an executive department or agency head. For example, the National Commission on Severely Distressed Public Housing's final report was submitted to both Congress and the Secretary of Housing and Urban Development. Congressional commissions are usually statutorily mandated to terminate. Termination dates for most commissions are linked to either a fixed period of time after the establishment of the commission, the selection of members, or the date of submission of the commission's final report. Alternatively, some commissions are given fixed calendar termination dates. All five commission proposals would provide for the commission to terminate within a certain period of time following submission of its final report. H.R. 6429 , H.R. 6431 , H.R. 6440 , and H.R. 6455 would each direct the commission to terminate 60 days after the submission; H.R. 6548 specifies a time line of 90 days after submission. Each of the five proposals would provide the proposed commission with certain powers to carry out its mission (see Table 1 for specifics). One general issue for commissions is who is authorized to execute such powers. In some cases, the commission itself executes its powers, with the commission deciding whether to devise rules and procedures for the general use of such power. In other cases, the legislation specifically authorizes the commission to give discretionary power to subcommittees or individual commission members. Finally, the legislation itself might grant certain powers to individual members of the commission, such as the chair. All five bills would provide the proposed commission with the power to hold hearings, take testimony, and receive evidence. All five commissions would also be provided the power to administer oaths to witnesses. Four of the bills would provide the commission with subpoena power. H.R. 6440 would not provide subpoena power to the commission. H.R. 6429 , H.R. 6431 , and H.R. 6548 would provide that subpoenas could only be issued by either (1) agreement of the chair and vice chair, or (2) the affirmative vote of 6 (of 10) commission members. H.R. 6455 would require that a subpoena could only be issued by either agreement of the chair and vice chair or an affirmative vote of 18 (of 25) commission members. All four bills that would provide subpoena power contain substantially similar judicial methods of subpoena enforcement. All five of the bills would provide that the commission receive administrative support from the General Services Administration (GSA). The GSA provides administrative support to dozens of federal entities, including congressional advisory commissions. Each of the five bills would provide that GSA be reimbursed for its services by the commission. Each bill also provides that other departments or agencies may provide funds, facilities, staff, and other services to the commission. Without explicit language authorizing certain activities, commissions often cannot gather information, enter into contracts, use the U.S. mail like an executive branch entity, or accept donations or gifts. All five bills direct that federal agencies provide information to the commission upon request. H.R. 6429 , H.R. 6431 , and H.R. 6548 would also provide that the commission could use the U.S. mails in the same manner as any department or agency, enter into contracts, and accept gifts or donations of services or property. The proposed COVID-19 commissions contain staffing provisions commonly found in congressional advisory commission legislation. Congressional advisory commissions are usually authorized to hire staff. Most statutes specify that the commission may hire a lead staffer, often referred to as a \"staff director,\" \"executive director,\" or another similar title, in addition to additional staff as needed. Rather than mandate a specific staff size, many commissions are instead authorized to appoint a staff director and other personnel as necessary, subject to the limitations of available funds. Most congressional commissions are also authorized to hire consultants, procure intermittent services, and request that federal agencies detail personnel to aid the work of the commission. Four of the bills provide that the commission may hire staff without regard to certain laws regarding the competitive service; H.R. 6440 does not specifically exempt the commission from such laws. Four bills ( H.R. 6429 , H.R. 6431 , H.R. 6455 , and H.R. 6548 ) would authorize, but not require, the commission to hire a staff director and additional staff, as appropriate. Four proposals would limit staff salaries to level V of the executive schedule. Three of the bills would specifically designate staff as federal employees for the purposes of certain laws, such as workman's compensation, retirement, and other benefits. When authorized, some commissions can have federal agency staff detailed to the commission. All five bills would provide that federal employees could be detailed to the commission. Four bills would provide that the detailee would be without reimbursement to his or her home agency. H.R. 6440 would allow detailees on a reimbursable basis. All five bills would provide the commission with the authority to hire experts and consultants. Four of the bills limit the rate of pay for consultants to level IV of the Executive Schedule. H.R. 6440 does not specify a specific limit. Four bills would provide that federal agencies and departments shall cooperate with the commission to provide members and staff appropriate security clearances. H.R. 6440 does not contain a security clearance provision. Commissions generally require funding to help meet their statutory goals. When designing a commission, therefore, policymakers may consider both how the commission will be funded, and how much funding the commission will be authorized to receive. Four of the five proposals specify a funding mechanism for the commission. How commissions are funded and the amounts that they receive vary considerably. Several factors can contribute to overall commission costs. These factors might include the cost of hiring staff, contracting with outside consultants, and engaging administrative support, among others. Additionally, most commissions reimburse the travel expenditures of commissioners and staff, and some compensate their members. The duration of a commission can also significantly affect its cost; past congressional commissions have been designed to last anywhere from several months to several years. It is difficult to estimate or predict the potential overall cost of any commission. Annual budgets for congressional advisory entities range from several hundred thousand dollars to millions of dollars annually. Overall expenses for any individual advisory entity depend on a variety of factors, the most important of which are the number of paid staff and the commission's duration and scope. Some commissions have few full-time staff; others employ large numbers, such as the National Commission on Terrorist Attacks Upon the United States, which had a full-time paid staff of nearly 80. Secondary factors that can affect commission costs include the number of commissioners, how often the commission meets or holds hearings, whether or not the commission travels or holds field hearings, and the publications the commission produces. Three of the bills ( H.R. 6429 , H.R. 6440 , and H.R. 6548 ) would authorize the appropriation of \"such sums as may be necessary\" for the commission, to be derived in equal amounts from the contingent fund of the Senate and the applicable accounts of the House of Representatives. H.R. 6429 and H.R. 6548 would provide that funds are available until the commission terminates. H.R. 6455 would authorize the appropriation of $4 million for the commission, to remain available until the commission terminates. H.R. 6431 does not include an authorization of appropriations. Table 1 provides a side-by-side comparison of major provisions of the five proposals. For each bill, the membership structure, appointment structure, rules of procedure and operation, duties and reporting requirements, proposed commission powers, staffing provisions, and funding are compared.", "summary": "Throughout U.S. history, Congress has created advisory commissions to assist in the development of public policy. Among other contexts, commissions have been used following crisis situations, including the September 11, 2001, terrorist attacks and the 2008 financial crisis. In such situations, advisory commissions may potentially provide Congress with a high-visibility forum to assemble expertise that might not exist within the legislative environment; allow for the in-depth examination of complex, cross-cutting policy issues; and lend bipartisan credibility to a set of findings and recommendations. Others may determine that the creation of an advisory commission is unnecessary and instead prefer to utilize existing congressional oversight structures, such as standing or select committees. This report provides a comparative analysis of five congressional advisory commissions proposed to date that would investigate various aspects of the COVID-19 outbreak, governmental responses, governmental pandemic preparedness, and the virus's impact on the American economy and society. The overall structures of each of the proposed commissions are similar in many respects, both to each other and to previous independent advisory commissions established by Congress. Specifically, the proposed commissions would (1) exist temporarily; (2) serve in an advisory capacity; and (3) report a work product detailing the commission's findings, conclusions, and recommendations. That said, each proposed commission has unique elements, particularly concerning its membership structure, appointment structure, and time line for reporting to Congress. Specifically, this report compares and discusses the (1) membership structure, (2) appointment structure, (3) rules of procedure and operation, (4) duties and reporting requirements, (5) commission powers, (6) staffing, and (7) funding of the five proposed commission structures. The five proposals are found in H.R. 6429 (the National Commission on COVID-19 Act), H.R. 6431 (the Made in America Emergency Preparedness Act), H.R. 6440 (the Pandemic Rapid Response Act), H.R. 6455 (the COVID-19 Commission Act), and H.R. 6548 (the National Commission on the COVID-19 Pandemic in the United States Act).", "document_type": "crs"}
{"report": "On May 23, 2019, Secretary of Agriculture Sonny Perdue announced that USDA would undertake a second round of trade aid in 2019 to assist farmers in response to trade damage from continued tariff retaliation and trade disruptions. Partial details of the new initiative were announced on July 25, 2019. Final program detailsâsuch as calculation of the individual commodity-specific payment rates used in the formulation of the county-level payment rates for non-specialty cropsâwere released on August 23, 2019. The 2019 trade aid package builds on the 2018 trade aid package in that it is based on the same legislative authority: Section 5 of the Commodity Credit Corporation (CCC) Charter Act of 1948 (P.L. 80-806; 15 U.S.C. 714 et seq. ), as amended. Specifically, the President has authorized USDA to provide up to $16 billion in new funding for the 2019 initiative. This new funding authority is in addition to the $12 billion in funding authority that was announced for the previous 2018 trade aid package. The 2019 trade aid package is to be implemented using the same three trade assistance programs that were used under the 2018 trade aid packageâa Market Facilitation Program (MFP), a Food Purchase and Distribution Program (FPDP), and an Agricultural Trade Promotion (ATP) programâbut at generally higher funding levels ( Table 1 ), except for ATP. Also similar to the 2018 initiative, the 2019 trade aid package funding authority corresponds with USDA's estimate of the trade damage to the U.S. agricultural sector from retaliatory tariffsâimposed on U.S. agricultural goods in response to previous U.S. trade actionsâand other trade disruptions in 2019. The 2019 programs are intended to assist agricultural producers while the Administration works to resolve the ongoing trade disputes with certain foreign nations, most notably China. This report describes the new trade aid package authorized for 2019, including its constituent parts, and identifies distinguishing differences from the 2018 trade aid package. An appendix provides additional details on USDA's implementation of the FPDP and ATP programs and on the evolution of USDA's formulation of the MFP payment rates under the 2018 and 2019 MFP programs. Under the 2019 trade aid package, USDA is to use up to $16 billion to fund three programs to assist producers of affected commodities in 2019: 1. A Market Facilitation Program , administered by USDA's Farm Service Agency (FSA), to provide up to $14.5 billion in direct payments to producers of USDA-specified eligible commodities (described below). 2. A Food Purchase and Distribution Program , administered through USDA's Agricultural Marketing Service (AMS), to use $1.4 billion to purchase surplus commodities affected by trade retaliation, such as fruits, vegetables, some processed foods, beef, pork, lamb, poultry, and milk for distribution by the Food and Nutrition Service to food banks, schools, and other outlets serving low-income individuals. 3. An Agricultural Trade Promotion Program , administered by USDA's Foreign Agriculture Service (FAS), to use $100 million to assist in developing new export markets on behalf of U.S. agricultural producers. Some important differences between the 2018 and 2019 trade aid packages include the following: The 2019 package includes an expanded funding commitment of up to $16 billion versus $12 billion under the previous package. The 2019 package includes an expanded list of eligible commodities (41 eligible commodities in 2019 versus 9 in 2018). The MFP payment formula for 2019 is modified for non-specialty crops (field crops) to be a single county payment rate rather than commodity-specific rates. This is done to minimize influencing producer crop choices and avoid large payment-rate discrepancies across commodities. MFP payments for non-specialty crops in 2019 are to be based on planted acres, not harvested production as in 2018. This change would avoid having MFP payments reduced by the lower yields that are expected across major growing regions due to the widespread wet spring and delayed plantings. The 2019 package includes 1. expanded payment limits per individual per commodity group ($250,000 versus $125,000 for 2018 MFP payments); 2. an expanded maximum combined payment limit across commodity groups ($500,000 versus $375,000); and 3. adjusted gross income (AGI) eligibility criteria based on the average AGI for 2015, 2016, and 2017. AGI criteria used to assess eligibility for 2018 MFP payments were based on AGI for 2013, 2014, and 2015. Initially, 2018 MFP payment recipients were subject to an AGI limit of $900,000 for eligibility. However, the 2019 Supplemental Appropriations for Disaster Relief Act ( P.L. 116-20 ) included a provision that retroactively eliminated the AGI threshold if at least 75% of a farm's AGI came from farming operations. This expanded AGI interpretation is retained for 2019 MFP payments but based on the different three-year period described above. The MFP program is authorized to make direct payments to producers of eligible commodities. Eligible producers must submit application forms as part of the signup for the MFP program. Signup runs from Monday, July 29, through Friday, December 6, 2019. Program informationâincluding MFP application forms (CCC-913), program eligibility requirements, commodity coverage, and county-level payment ratesâis available at USDA's MFP program website. Key program details are summarized below. Producers of MFP-eligible commodities (listed below) may apply for MFP payments, provided that they also have an ownership interest in the commodity and are actively engaged in the farming operation; have an average AGI for tax years 2015, 2016, and 2017 of less than $900,000 per year or an AGI in excess of $900,000 with at least 75% of AGI derived from farming, ranching, or forestry-related activities; comply with the provisions of the \"Highly Erodible Land and Wetland Conservation\" regulations, often called the conservation compliance provisions; and have filed a 2019 acreage report with their county FSA offices. Producers are not required to have purchased crop insurance or coverage under the Noninsured Crop Disaster Assistance Program to be eligible for participation, nor are they required to participate in any other CCC programs. With respect to 2019 MFP payments, USDA has categorized the eligible commodities into three groups: 1. non-specialty crops (field crops including grains and oilseeds), 2. specialty crops (tree nuts and fruits), and 3. animal products (dairy and hogs). Each of these three commodity groupings has different payment structures. In particular, producers of non-specialty crops will be eligible for a single county payment rate multiplied by their farms' total acres of MFP-eligible non-specialty crops planted in a county in 2019. In contrast, dairy, hogs, and specialty crops will each have a single national payment rate to be multiplied by their production history, inventory, or acres under cultivation in 2019, respectively ( Table 2 ). Eligible non-specialty crops include alfalfa hay, barley, canola, corn, crambe, dried beans, dry peas, extra-long-staple cotton, flaxseed, lentils, long- and medium-grain rice, millet, mustard seed, oats, peanuts, rapeseed, rye, safflower, sesame seed, small and large chickpeas, sorghum, soybeans, sunflower seed, temperate japonica rice, triticale, upland cotton, and wheat. Unlike 2018, where MFP payment rates were specific for each eligible non-specialty crop, 2019 MFP payment rates are fixed at the county level and do not vary with a producer's mix of crops. This change in payment structure was done to minimize influencing producer crop choices (as the announcement was made before planting was finished) and avoid large payment-rate discrepancies across commodities. Thus, under the 2019 MFP payment format, producers of MFP-eligible non-specialty crops, within a particular county, are to receive MFP payments based on that county's MFP payment rate multiplied by the farms' total plantings to eligible crops in that county in 2019. USDA is requiring that a producer's total MFP-eligible plantings in 2019 may not exceed total 2018 plantings. The MFP payment rate for non-specialty crops is fixed within each county. However, MFP payment rates will vary across counties based on each county's historical average share of eligible crops planted, average planted acres per eligible crop, and average yields of eligible crops. Within this construct, USDA has set minimum and maximum county MFP payment rates of $15 and $150 per acre. Producers who were prevented from planting MFP-eligible crops due to adverse weather but filed prevented-planting claims under crop insurance and planted FSA-certified cover crops (with the potential to be harvested) on the unplanted acres are also eligible for the minimum $15 per acre payment rate. Acres that were never planted in 2019 are not eligible for MFP payments. Acreage of non-specialty crops and cover crops must have been planted by August 1, 2019, to be eligible for MFP payments. Dairy producers who were in business as of June 1, 2019, are to receive a $0.20 per hundredweight payment on their milk production history as reported for the Dairy Margin Coverage program. Hog producers are to receive a payment of $11 per head based on the number of live hogs owned on a date to be selected by the producer between April 1 and May 15, 2019. MFP payments are to also be made to producers of almonds, cranberries, cultivated ginseng, fresh grapes, fresh sweet cherries, hazelnuts, macadamia nuts, pecans, pistachios, and walnuts. Per-acre MFP payment rates will vary across specialty crops ( Table 2 ) based on their 2019 acres of fruit- or nut-bearing plants or, in the case of ginseng, harvested acres in 2019. Payments are to be made in up to three tranches. The first payment is to consist of the higher of either 50% of a producer's calculated payment or $15 per acre. On August 22, 2019, news media announced that USDA had begun to process the first tranche of MFP payments. USDA announced on November 15, 2019, that the second tranche of payments would go out on November 18, 2019. For producers with overall MFP payment rates equal to $15 per acre, there will be no second or third tranche payment. For producers with payment rates less than $30 per acre but greater than $15 per acre, the second tranche would equal the remaining unpaid balance. For producers with payment rates greater than $30 per acre, the second payment would be up to 75% of a producer's calculated payment (less the portion already received in the first tranche). As of November 25, 2019, USDA reported that $10.2 billion had been paid out under the first and second tranches. The third tranche would depend on USDA's evaluation of market and trade conditions. If deemed necessary, the third and final payment would be for the remainder of a producer's calculated payment and would begin in January 2020. MFP payments are limited to a combined $250,000 for each crop year for non-specialty crops per person or legal entity. MFP payments are also limited to a combined $250,000 for dairy and hog producers and a combined $250,000 for specialty crop producers. However, no applicant can receive more than $500,000 across the three commodity groups. MFP payments do not count against other 2018 farm bill payment limitations. There are no criteria in place to calculate whether MFP might duplicate losses covered under revenue support programs such as the Agricultural Risk Coverage (ARC) and Price Loss Coverage (PLC) programs of the 2018 farm bill. As a result, the same program acres that are eligible for ARC or PLC payments may be eligible for MFP payments. Under the 2018 MFP program, payments were skewed toward major soybean producing statesâparticularly states in the Corn Belt âas the payments were based on commodity-specific payment rates and soybeans were allocated the largest payment rate at $1.65 per bushel ( Figure 1 ). When combined with a record soybean crop of over 4.5 billion in 2018, U.S. soybean producers received total outlays estimated at about $7 billion (or 82%) of 2018 MFP payments. For the 2019 MFP program, USDA released the MFP county-level payment rates for nearly 3,000 counties in the United States on July 25, 2019. Unlike 2018, when MFP payments centered on soybean-producing regions, the areas with the highest payment rates in 2019 are regions with heavy cotton and sorghum production ( Figure 2 ). Nationally, MFP payment rates range between $15 and $150 per acre. Some 22 counties are to receive the maximum paymentâfive counties each in Alabama, Georgia, and Texas; three counties in Mississippi and Arizona; and one county in New Mexicoâwhile nearly 400 counties across the country are to receive the minimum $15 per acre payment. Some economists suggest that cotton acreage likely played a role in higher MFP payments rates in 2019 across southern states. In 2019, cotton acres averaged 52% of all MFP-eligible acres in counties with rates over $100 per acre. Peanut acreage could also play a role in higher payments. USDA is to use CCC Charter Act authority to implement a 2019 FPDP program, valued at up to $1.4 billion, through AMS. FPDP is to purchase surplus commodities affected by trade retaliation, such as fruits, vegetables, some processed foods, beef, pork, lamb, poultry, and milk, for distribution by USDA's Food and Nutrition Service to food banks, schools, and other outlets serving low-income individuals ( Table B-1 ). The premise is that removing products from normal marketing channels helps to reduce supply and thereby increase prices and farm income. FAS will administer the ATP under authorities of the CCC. The ATP is to provide cost-share assistance to eligible U.S. organizations for activitiesâsuch as consumer advertising, public relations, point-of-sale demonstrations, participation in trade fairs and exhibits, market research, and technical assistanceâto boost exports for U.S. agriculture, food, fish, and forestry products. On July 19, 2019, USDA awarded $100 million to 48 organizations through the ATP to help U.S. farmers and ranchers identify and access new export markets ( Table C-1 ). Many of the 2019 ATP award recipients are among the cooperator organizations that had been awarded funding from the $200 million in 2018 ATP funds. The broad discretionary authority granted to the Secretary under the CCC Charter Act to implement the trade aid package also allows the Secretary to determine how the aid is to be calculated and distributed. In 2018, when the first trade aid package was announced with funding of $12 billion, USDA officials declared that it would be a temporary, one-time response to foreign tariffs imposed on selected U.S. commodities. However, on May 23, 2019, Secretary Perdue announced a second round of trade aid package valued at $16 billion in 2019. USDA's use of CCC authority to initiate and fund agricultural support programs without congressional involvement is not without precedent, but the scope and scale of its use for the two trade aid packagesâat $28 billionâhas increased congressional and public interest. Some have suggested that the effects of tariffs and retaliatory tariffs could be long-lasting because they have created uncertainty about U.S. trade policy behavior and have called into question U.S. reliability as a trading partner. Furthermore, the use of CCC authority to mitigate tariff-related losses may establish a precedent for future situations. Some trade economists and market watchers have suggested that annual trade aid packages might continue as long as the trade disputes remain unresolved. Most farm commodity and advocacy groups have been supportive of the trade aid package even as they have called for solutions that restore export activity. However, some stakeholders have questioned the equity of the distribution of 2018 MFP payments and the rationale for determining payments based on \"trade damage\" rather than a broader \"market loss\" measure. Some economists have suggested that, even under the 2019 formulation, USDA is overpaying farmers for trade losses and that USDA's calculations failed to fully incorporate last year's record soybean harvest or new trade patterns that have emerged following China's reluctance to buy U.S. soybeans. Due to their price tag ($12 billion in 2018 and $16 billion in 2019) and the coupled nature of the MFP payments to planted acres, there is considerable interest from policymakers, market observers, and trading partners about whether these payments will be fully compliant with World Trade Organization (WTO) commitments. In particular, there is some interest in whether large MFP payments might cause the United States to breach its $19.1 billion annual WTO spending limit on trade-distorting farm subsidies. Appendix A. MFP Payment Formula On August 23, 2019, USDA published the details on the calculation of MFP payment rates for USDA-designated eligible commodities under the 2019 trade aid packageâincluding county-level MFP rates for non-specialty crops and national MFP rates for hogs, dairy, and specialty crops. For both the 2018 and the 2019 trade aid packages, USDA defined economic losses due to foreign retaliatory trade actions narrowly in terms of gross trade damages rather than broadly as lost market value. Gross trade damages is defined as the total amount of expected export sales lost to the retaliating trade partner due to the additional tariffs. Gross trade damages were estimated for each of the major farm commodities affected by the retaliatory tariffs. The estimated trade damages were then used to derive both commodity-specific MFP payment rates and FPDP purchase targets for pork (hogs) and milk (dairy). Both the 2018 and 2019 trade aid packages used the same methodology to estimate gross trade damages for USDA-designated commodities. However, the two estimates used different time frames to calculate the trade damages, thus producing different commodity-specific MFP payment rates ( Table A-1 ). The 2018 calculations of gross trade damages compared trade data from 2017 (pre-retaliatory tariffs) with 2018 data (post-retaliatory tariffs). The 2019 calculations used a longer historical time series, extending the \"look-back\" over a 10-year period from 2009 through 2018 compared with 2019 trade. In a further change from the 2018 methodology, the 2019 MFP payment rates for non-specialty crops combined commodity-specific MFP payments rates at the county level in a formula (weighted by historical county planted acres and yields) to derive a single county-level MFP payment rate rather than separate national commodity-specific rates. Hogs, dairy, and specialty crops retained their national MFP payment rates but at different values due to the longer \"look-back\" period used to estimate gross trade damages. This appendix section briefly reviews the methodology used to derive the 2018 MFP commodity-specific payment rates. Then it discusses the adaptations made by USDA for 2019 to derive both the county-level payments for non-specialty crops and the national-level payment rates for specialty crops, hogs, and dairy. 2018 MFP Payment-Rate and Payment Methodology USDA calculated a unique national MFP payment rate for each affected commodity (as determined by USDA). A producer's MFP payment calculation involved three steps: First, USDA estimated the level of direct trade-related damage caused by 2018 retaliatory tariffsâimposed by Canada, China, the European Union, Mexico, and Turkeyâto U.S. exports for each affected commodity. Direct trade loss is the difference in expected trade value for each affected commodity with and without the retaliatory tariffs. To measure this, USDA compared U.S. exports for 2017 (the year prior to the imposition of retaliatory tariffs) with 2018 export levels when trade was subject to the retaliatory tariffs. Much of the affected 2018 agricultural production had yet to be harvested and sold at the time the MFP payment rates were calculated. In addition, the final trade effect, with or without retaliatory tariffs, was not observable, and markets had yet to fully adjust to whatever new trade patterns would emerge from the trade dispute. As a result, USDA estimated both export values (with and without retaliatory tariffs) using a global trade model that accounted for the availability of both substitute supplies from export competitors and demand for U.S. agricultural exports from alternate importers. Indirect effectsâsuch as any decline in market prices due to record 2018 soybean production and the build-up of domestic stocks, or resultant economy-wide \"lost value\" for non-producer owners of the affected commoditiesâwere not included in the payment calculation. Second, the estimated trade damage for each affected commodity was divided by the crop's production in 2017 to calculate a national commodity-specific, per-unit damage rate. This per-unit damage rate is the commodity-specific MFP payment rate. In the case of both pork and milk, FPDP purchases were subtracted from the estimated trade damage before the per-unit MFP payment rates for hogs and milk were calculated. Finally, a producer's 2018 MFP payment was equal to the commodity-specific MFP payment rate multiplied by the producer's 2018 production for corn, cotton, sorghum, soybeans, wheat, fresh sweet cherries, and shelled almonds. For hog producers, the MFP payment rate was multiplied by a producer-selected hog inventory from July 15 to August 15, 2018. For milk producers, the MFP payment rate was multiplied by the farm's production history as reported for the Margin Protection Program of the 2014 farm bill. 2019 MFP Payment-Rate and Payment Methodology To calculate the 2019 MFP payment rates, USDA made several adaptations to the 2018 methodology. As a result, a producer's MFP payment calculation in 2019 involved an additional fourth step. First, USDA again calculated the level of direct trade-related damage caused by retaliatory tariffs to U.S. exports for each commodity. However, USDA used 2019 retaliatory tariffs (not 2018) that were being imposed by China, the European Union, and Turkey. Canada and Mexico were removed from the calculations, as they were no longer imposing retaliatory tariffs on U.S. agricultural exports. In addition, USDA adjusted the calculation of direct trade damage by using 10 years of historical U.S. export data (2009-2018) rather than a single year. This larger period captured trade losses for certain commodities that experienced fluctuating trade patterns in recent years and where trade levels during the 2017 data period were unrepresentative of historical trade volumes. Second, the estimated trade damage for each affected commodity was divided by the crop's average production during the three-year period 2015-2017 to calculate a national commodity-specific, per-unit damage rate. In the case of both pork and milk, FPDP purchases were subtracted from the estimated trade damage before the per-unit MFP payment rates for hogs and milk were calculated. Third, the commodity-specific damage rates were then used to establish county-level, per-acre payment rates based on historical county data for average planted area and yields of the affected commodities. For each county, USDA multiplied three terms together to estimate the county-level trade damage for each MFP-eligible crop: (1) the three-year (2015-2017) average yield for each cropâtaken from USDA's Risk Management Agency's (RMA) crop insurance data, (2) the four-year (2015-2018) average planted acres of each crop in the countyâtaken from FSA's database of crop acreage reportsâand (3) the commodity-specific, per-unit damage rate for each crop (from step two above). Then, for each county, the crop damage estimates were added across all MFP-eligible crops produced in the county to generate an estimate of the county's total trade damages. The county's total trade damage estimate was then divided by total planted acres of MFP-eligible crops within the county. The result is a unique county-level MFP payment rate. Under this formulation, MFP county-level rates will vary across counties based on the average crop mix, the average planted acres per crop, and average crop yields. Finally, a producer's 2019 MFP non-specialty-crop payment is equal to the county-level MFP non-specialty-crop payment rate (for the county where production occurs) multiplied by the total acreage of all non-specialty crops planted in that county by that producer. Thus, the 2019 MFP non-specialty-crop payment is independent of an individual farmer's crop mix (from among MFP-eligible non-specialty crops). In 2019, many producers were prevented from planting acreage due to wet, cool conditions. These acres were not eligible for MFP non-specialty crop payments. However, if a USDA-approved cover crop was planted on the \"prevent-plant\" acres with the potential to be harvested, then those producers qualified for a $15-per-acre payment on \"prevent-plant\" acres. USDA suggests that this independence from individual crop choices prevents the county-level MFP payment from distorting producer planting decisions that were ongoing at the time of the initial trade aid package announcement on May 23, 2019. However, planting of an MFP-eligible crop was a requirement for MFP eligibility. Thus, the 2019 MFP payments may be non-commodity-specific outlays, but they are coupled to the planting of an MFP-eligible crop. These distinctions, although subtle, are important considerations for how the resultant outlays may be notified under WTO domestic-support program disciplines. Appendix B. FPDP Implementation The Administration is allocating about $1.4 billion of its 2019 trade aid package to USDA's AMS for purchasing various agricultural commodities and distributing them through domestic nutrition assistance programs ( Table B-1 ). Under the 2019 FPDP program, AMS is to buy affected products in four phases, starting after October 1, 2019, with deliveries beginning in January 2020. The products purchased can be adjusted between phases to accommodate changes due to growing conditions, product availability, market conditions, trade negotiation status, and program capacity. AMS maintains purchase specifications for a variety of commodities based on recipient needs. The products discussed in this plan are to be distributed to states for use in the network of food banks and food pantries that participate in the Emergency Feeding Assistance Program, elderly feeding programs such as the Commodity Supplemental Foods Program, and tribes that operate the Food Distribution Program on Indian Reservations. These outlets are in addition to child nutrition programs such as the National School Lunch Program, which may also benefit from these purchases. Appendix C. ATP Program Implementation USDA announced funding allocations under the ATP program for both the 2018 and 2019 trade aid packages in 2019 ( Table C-1 ). A total of 59 organizations have received $300 million in awards under the two ATP programs, including 57 organization receiving $200 million under the 2018 ATP program and 48 organizations sharing $100 million under the 2019 program. ", "summary": "On May 23, 2019, Secretary of Agriculture Sonny Perdue announced that the U.S. Department of Agriculture (USDA) would undertake a second trade aid package in 2019 valued at up to $16 billionâsimilar to a trade aid package initiated in 2018 valued at $12 billionâto assist farmers in response to trade damage from continued tariff retaliation and trade disruptions. Under the 2019 trade aid package, USDA will use its authority under the Commodity Credit Corporation (CCC) Charter Act to fund three separate programs to assist agricultural producers in 2019 while the Administration works to resolve the ongoing trade disputes with certain foreign nations, most notably China. The three programs are similar to the 2018 trade aid package but are funded at different levels: 1. The Market Facilitation Program (MFP) for 2019, administered by USDA's Farm Service Agency, is to provide up to $14.5 billion in direct payments to producers of affected commodities (compared with up to $10 billion in 2018). 2. A Food Purchase and Distribution Program , administered through USDA's Agricultural Marketing Service, will use $1.4 billion (compared with $1.2 billion in 2018) to purchase surplus commodities affected by trade retaliation, such as fruits, vegetables, some processed foods, beef, pork, lamb, poultry, and milk, for distribution by USDA's Food and Nutrition Service to food banks, schools, and other outlets serving low-income individuals. 3. The Agricultural Trade Promotion Program , administered by USDA's Foreign Agriculture Service, will be provided $100 million ($200 million in 2018) to assist in developing new export markets on behalf of U.S. agricultural producers. The broad discretionary authority granted to the Secretary under the CCC Charter Act to implement the trade aid package also allows the Secretary to determine how the aid is to be calculated and distributed. Some important differences between the 2018 and 2019 trade aid packages include the following. The 2019 package includes an expanded funding commitment of $16 billion versus $12 billion under the 2018 package. The 2019 package focuses on the same three commodity groupsânon-specialty crops (grains and oilseeds), specialty crops (nuts and fruit), and animal products (hogs and dairy)âbut includes an expanded list of eligible commodities (41 eligible commodities in 2019 compared with nine in 2018). The MFP payment formula for 2019 is modified for non-specialty crops to be a single county payment rate rather than commodity-specific rates that were applied in 2018. This is done to minimize influencing producer crop choices and avoid large payment-rate discrepancies across commodities. MFP payments for non-specialty crops will be based on planted acres in 2019, not harvested production as in 2018. This change will avoid having MFP payments reduced by the lower yields that are expected across major growing regions due to the widespread wet spring and delayed plantings. The 2019 package includes expanded payment limits per individual per commodity group ($250,000 versus $125,000 under the 2018 initiative) and an expanded maximum combined payment limit across commodity groups ($500,000 versus $375,000). It continues the expanded adjusted gross income (AGI) criteria (no restriction if at least 75% of AGI is from farming operations) adopted under the 2019 Supplemental Appropriations for Disaster Relief Act ( P.L. 116-20 ) and applied to 2018 MFP payments retroactively. Payments may be made in up to three tranches, with the second and third tranches dependent on market developments. The first payment started in August and consisted of the higher of either 50% of a producer's calculated payment or $15 per acre. USDA announced on November 15, 2019, that the second tranche of payments would go out on November 18, 2019. The third tranche would depend on USDA's evaluation of market and trade conditions. If deemed necessary, they would occur in January 2020. As of November 25, 2019, USDA had made $10.2 billion in 2019 MFP payments. USDA's use of CCC authority to initiate and fund agricultural support programs without congressional involvement is not without precedent, but the scope and scale of its use for the two trade aid packagesâat $28 billionâhas increased congressional and public interest. Some have questioned whether MFP payments have established a precedent that might persist as long as trade disputes remain unresolved. Others have questioned the equity of their distribution across commodity sectors and regions. Finally, some economists worry that large MFP payments might contribute to a violation of U.S. trade commitments to the World Trade Organization.", "document_type": "crs"}
{"report": "According to a 2019 study, 2 million Americans lack access to running water, indoor plumbing, or wastewater services. Many of the communities with inadequate water supply infrastructure are in rural areas or on tribal lands. Over time, Congress has authorized projects and programs through various federal agencies to address rural water supply needs. Since 1980, Congress has authorized the Bureau of Reclamation (Reclamation), among other federal agencies, to develop municipal and industrial (M&I) water supply projects in rural areas and on tribal lands. Reclamation was established to implement the Reclamation Act of 1902, which authorized the construction of water works to provide water for irrigation in arid western states. Reclamation owns and manages 491 dams and 338 reservoirs, which are capable of storing a combined 140 million acre-feet of water. Reclamation has incorporated M&I water resource projects into larger projects that serve various other authorized purposes (e.g., irrigation, power). Reclamation-funded M&I water deliveries total approximately 10 trillion gallons of water per year. As part of Reclamation's M&I responsibilities, Congress has expressly authorized the agency to undertake the design and construction of rural water supply projects intended to deliver potable water supplies to defined rural communities. From 1980 through 2009, Congress authorized Reclamation to undertake the design and construction, and in some cases the operations and maintenance (O&M), of specific projects intended to deliver potable water supplies to rural communities in western Reclamation states. These projects were largely located in North Dakota, South Dakota, Montana, and New Mexico. The rural communities include tribal reservations and nontribal rural communities with nonexistent, substandard, or declining water supply or water quality. Many rural water projects are large in scopeâtaking water from one location and moving it long distances to tie to existing systems. M&I portions of Reclamation water supply facilities typically require 100% repayment of construction costs to the federal treasury with interest. Congress also has authorized rural water projects that receive funding from the federal government for some or all costs on a nonreimbursable basis (i.e., a de facto grant). For example, the federal government pays up to 100% of the cost of tribal rural water supply projects, including O&M. For nontribal rural water supply projects, the federal cost share for current projects ranges from 75% to 80%. The Rural Water Supply Act of 2006 (Title I of P.L. 109-451 ) created the Rural Water Supply Program, a structured program for developing and recommending rural water supply projects. This program was to replace the previous process of authorizing projects individuallyâoften without the level of analysis and review (e.g., feasibility studies) consistent with Reclamation's other projects. Under the Rural Water Supply Program, Congress authorized Reclamation to work with rural communities and tribes to identify M&I water needs and options to address such needs through appraisal investigations and feasibility studies. Congress would then consider feasibility studies recommended by the Administration before authorizing specific projects for construction in legislation. Ultimately, Congress did not authorize any projects for construction through this process, and the authority for the program expired in 2016. Reclamation continues to construct rural water projects (and to provide O&M assistance for some tribal components) that were authorized and initiated outside of the Rural Water Supply Program. In 2012, Reclamation developed prioritization criteria for budgeting these projects: inclusion of tribal components amount of financial resources committed urgency and severity of need financial need and potential economic impact regional and watershed approach water, energy, and other priority objectives According to Reclamation, the criteria aim to reflect both the priorities identified in the statutes that authorized individual projects and the goals of the Rural Water Supply Act of 2006. For FY2020, Congress appropriated $145.1 million for construction and O&M at seven authorized rural water projects, which was $117.4 million above the Administration's FY2020 budget request. As of early 2020, Reclamation reported that $1.2 billion was still needed to construct authorized, ongoing rural water projects. For FY2021, the Administration requested $30.3 million for Reclamation rural water activities, of which $8.1 million is for construction. This report provides an overview of Reclamation rural water projects, including completed and ongoing rural projects and efforts under Reclamation's Rural Water Supply Program. The report also discusses considerations for Congress (e.g., funding prioritization, potential nexus with other federal programs) and presents recent legislation relating to authorizing additional projects and reauthorizing the Rural Water Supply Program. Congress has funded water supply projects in rural areas for more than four decades. Reclamation first became involved in these efforts beginning with authorization of the WEB Rural Water Supply Project in 1980 ( P.L. 96-355 ). Since that time, Congress has authorized Reclamation to fund the construction of several other rural water supply projects (see Table 1 ). These projects have individual authorizations and generally aim to provide water exclusively for M&I water uses in rural areasâa departure from the historical mission of providing water for irrigation, with M&I water use as an incidental project purpose. According to a U.S. Government Accountability Office (GAO) report, Reclamation became involved in such projects because communities proposed projects directly to Congress and, in response, Congress created specific authorizations for these rural water supply projects, with Reclamation overseeing funding and construction. In addition to projects authorized only in Reclamation states, Congress specifically authorized Reclamation's involvement in the Lewis and Clark Rural Water Supply Project located in South Dakota, Iowa, and Minnesota. Reclamation reported that, prior to authorization, some rural water projects did not go through the level of analysis and review that is consistent with Reclamation's other projects and did not meet the economic, environmental, and design standards that are required to determine the feasibility of federal water resources development projects. In these instances, following authorization, Reclamation was to complete the analysis that was necessary to execute the project while adhering to the project configuration and designs specified by the authorizing statutes and in accordance with other laws (e.g., Clean Water Act [33 U.S.C. Â§Â§1251-1387], National Environmental Policy Act [42 U.S.C. Â§4321 et seq.]). Critics have sometimes expressed concerns over this approachâspecifically, whether the authorized project would have emerged as the most cost-effective preferred alternative had a feasibility study been performed prior to authorization. Each rural water project authorization required that the cost ceilings authorized in the legislation be indexed to adjust for inflation to include the rising cost of materials and labor, which was estimated to be 4% annually. The result of these indexing requirements is that the overall cost of authorized rural water projects has risen and continues to rise due in part to actual federal appropriations for projects falling short of the optimal funding scenarios that were assumed under planning projections. As of early 2020, Reclamation reported that $1.2 billion was needed to construct authorized, ongoing rural water projects. For FY2021, the Administration's budget proposal requested $30.3 million: $8.1 million for ongoing construction at four authorized rural water projects and $22.2 million for O&M of tribal systems (e.g., $14.5 million for the Mni Wiconi Project, $7.7 million for the Garrison Diversion Unit M&I, and $20,000 for the Mid-Dakota Rural Water System). The FY2021 request is $114.8 million less than FY2020 enacted funding of $145.1 million. The FY2021 request continues a trend since FY2014 in which the President's budget requested reduced funding for rural water projects from prior-year enacted levels. Reclamation also has emphasized its authority to accept nonfederal contributions in excess of cost-sharing requirements as one way to expedite projects in the absence of increased federal funding. In the FY2021 budget request, Reclamation noted that nonfederal parties have the ability to move forward with important investments in water resources infrastructure by contributing amounts in excess of minimum contributions. In FY2020, Reclamation funded $125.4 million in construction work at five projects ( Table 2 ). Reclamation's FY2020 budget request included $8.0 million in construction for four projects, but Congress provided $117.4 million in appropriations above the President's budget request. The Administration distributed the funds above the request among five authorized projects, as described in Reclamation's additional funding spend plan. The following briefly describes the projects under construction in FY2020 based on Reclamation budget documents. The Garrison Diversion Unit of the Pick-Sloan Missouri-Basin Program was authorized in 1965 (P.L. 89-108) and was amended in 1986 by the Garrison Diversion Unit Reformulation Act ( P.L. 99-294 ) to include rural water services. Garrison Diversion Unit water supply facilities are associated with Garrison Dam of the Pick-Sloan Missouri Basin Program. They are located in eight counties in the central and eastern part of North Dakota and serve four tribal reservations (Spirit Lake, Fort Berthold, Turtle Mountain, and Standing Rock Indian Reservations). The multipurpose project principally provides tribal and nontribal M&I water, along with fish and wildlife, recreation, and flood control benefits. The Fort Peck Reservation Rural Water System Act of 2000 ( P.L. 106-382 ), as amended, authorized rural water projects in northeastern Montana for the Fort Peck Reservation, serving the Assiniboine and Sioux Tribes, and for the Dry Prairie Rural Water Authority, serving towns outside of the reservation. The total service area population is around 25,000 people; rural water use is also available for commercial users and livestock. Currently, groundwater from shallow alluvial aquifers is the primary water source for the municipal systems, but groundwater quality is generally poor. The regional rural water project is to provide for a single water treatment plant located on the Missouri River, which is to distribute up to 13.6 million gallons of treated water per day through 3,200 miles of pipeline. The Lewis and Clark Rural Water System Act of 2000 (Division B, Title IV of P.L. 106-246 ) authorized the Lewis and Clark Rural Water System to serve over 300,000 people in southeast South Dakota, southwest Minnesota, and northwest Iowa. The project aims to address concerns regarding low water quality, contamination, and insufficient supplies of existing drinking water sources throughout the project area. The water source for the Lewis and Clark Rural Water System is the sand and gravel aquifers of the Missouri River near Vermillion, SD. The project is to collect, treat, and distribute water through a network of wells, pipelines, pump stations, and storage reservoirs to each of 15 municipalities (including the city of Sioux Falls) and five rural systems. As of February 2020, completed facilities delivered water to the first 14 of 20 members, serving more than 200,000 individuals in Iowa, Minnesota, and South Dakota. The Rocky Boy's/North Central Montana Regional Water System Act of 2002 (Title IX of P.L. 107-331 ) authorized a rural water system to serve the Rocky Boy's Indian Reservation (Chippewa Cree Tribe) and surrounding communities in northern Montana. The system is designed to serve a total projected population of 43,000 (14,000 on reservation and 29,000 off reservation) by providing infrastructure to ensure existing water systems within the project service area comply with federal Safe Drinking Water Act (42 U.S.C. Â§Â§300f-300j-26) regulations. A core pipeline is to provide potable water from Tiber Reservoir to the Rocky Boy's Reservation, and non-core pipelines are to serve 21 surrounding towns and rural water districts. A $20 million trust fund established with Bureau of Indian Affairs appropriations is to fund O&M and replacement for the core and on-reservation systems initially; eventually, water users are expected to entirely fund the project. Reclamation states that the current authorization is not adequate to cover the project. Section 9103 of the Omnibus Public Land Management Act of 2009 ( P.L. 111-11 ) authorized the Eastern New Mexico Water Supply project to deliver water from Ute Reservoir on the Canadian River to eight member communities. The use of Ute Reservoir water aims to provide long-term water supply and reduce the eight communities' dependence on groundwater in the Ogallala Aquifer. Current funding is for planning, design, and construction of interim projects to deliver groundwater to the communities before treated surface water is delivered from the Ute Reservoir Pipeline. The Rural Water Supply Act of 2006 (Title I of P.L. 109-451 ) authorized the Rural Water Supply Program and directed the Secretary of the Interior to undertake certain activities to implement the program. Specifically, the act directed Reclamation to conduct appraisal investigations and feasibility studies (or to ensure that nonfederal entities conducted such studies) and to recommend proposed projects to Congress for construction authorization and subsequent funding. In 2008, Reclamation published an interim final rule (43 C.F.R. Â§404) that established operating criteria for the program and defined the criteria for the prioritization, eligibility, and evaluation of appraisal investigations and feasibility studies, in accordance with the act. To be eligible under the rule, a rural community must have a population under 50,000. The rule prioritized domestic, residential, and municipal uses and prohibited the use of water for commercial irrigation purposes. Interested entities (e.g., Reclamation states and western tribes) may request that either (1) Reclamation complete an appraisal investigation or feasibility study or (2) Reclamation provide financial assistance so the entity can conduct an appraisal investigation or feasibility study. Reclamation began to implement the Rural Water Supply Program in FY2010 on a pilot basis, providing assistance to nonfederal entities to conduct appraisal investigations and feasibility studies. Between FY2009 and FY2012, Congress provided Reclamation a total of $7.9 million for the program. After FY2012, Reclamation no longer requested funding for the program and Congress did not appropriate funds for it. Overall, Reclamation reported using this authority to study approximately 22 projects to varying extents (see Appendix ). Twelve were located in the Reclamation's Great Plains region, five in the Upper Colorado region, four in the Lower Colorado region, and one in the Pacific Northwest region. Of these, Reclamation finalized and approved two feasibility reports: the Musselshell-Judith Rural Water System Feasibility Report (Montana) and the Payson-Cragin Reservoir Water Supply Project Feasibility Report (Arizona). Reclamation did not recommend these or any other projects for authorization, and Congress did not authorize any projects. In justifying its lack of construction recommendations, Reclamation pointed to existing rural water construction obligations, which it argued precluded recommendation of new projects with completed feasibility studies. The authority for the Rural Water Supply Program expired at the end of FY2016 and has not been renewed. Members of Congress have introduced legislation in the 116 th Congress that would reauthorize both the Rural Water Supply Program and particular projects and studies previously considered through the expired program (see \" Legislation in the 116th Congress \"). Congress continues to fund construction and O&M (only required for tribal components) of authorized rural water projects; however, since the FY2016 expiration of the Rural Water Supply Program, Reclamation has for the most part ceased activities relating to new project study and authorization. Congress may consider conducting oversight or legislating changes to Reclamation's rural water activities, including those related to existing or new program and project authorizations, funding prioritization criteria, and Reclamation's role in supporting rural water projects. The Rural Water Supply Act of 2006 required the Secretary of the Interior to assess the demand for new rural water supply projects in Reclamation states. In FY2009, Reclamation estimated that identified needs for potable water supply systems in rural areas ranged from $5 billion to $8 billion for nontribal needs; in the same year, it estimated approximately $1.2 billion for specific tribal water supply projects. However, the Administration has not recommended, and Congress has not authorized, any new Reclamation rural water projects since 2009. Additionally, because authorization of Reclamation's Rural Water Supply Program lapsed at the end of FY2016, Reclamation lacks a structured program for developing and recommending rural water supply projects. In the 116 th Congress, House and Senate companion bills H.R. 967 and S. 334 , both titled the Clean Water for Rural Communities Act, would authorize $5 million for a feasibility study for the Dry Redwater Rural Water System and $56.7 million (2014 price levels) for construction of the Musselshell-Judith Rural Water System. As noted, a feasibility report for the Musselshell-Judith Rural Water System was completed through Reclamation's Rural Water Supply Program, but the Administration did not recommend the project to Congress for authorization. Congress also is considering legislation to reauthorize the Rural Water Supply Program through FY2026. In the 116 th Congress, both the Water Justice Act ( H.R. 4033 ) and the Securing Access for the Central Valley and Enhancing (SAVE) Water Resources Act ( H.R. 2473 ) would reauthorize the existing program. Congress may consider other legislative proposals to address the demand for rural water assistance in the West. For example, the Disadvantaged Community Drinking Water Assistance Act ( H.R. 5347 ) would require the Secretary of the Interior to establish a grant program to provide financial assistance to disadvantaged communities of less than 60,000 residents that have experienced a significant decline in quantity or quality of drinking water. The grants could fund technical assistance, initial operating and capital costs for edible facilities, and up to 25% of such facilities' O&M. Other legislative proposals would address rural water needs by amending authorities to specific water technology and programs. For example, the Western Water Security Act of 2019 ( H.R. 4891 ) would amend the Water Desalination Act of 1996, as amended ( P.L. 104-298 ; 42 U.S.C. Â§10301 note), to add a classification for rural desalination projects with a higher federal cost share than desalination projects serving more than 40,000 individuals. In early 2020, Reclamation stated that $1.2 billion was needed to complete authorized rural water projects under construction by the agency. In addition, Reclamation has previously estimated nontribal rural water supply needs in excess of $5 billion, and some observers have reported that assistance for communities is needed to address these needs. Some stakeholders have requested continued and increased funding for Reclamation rural water projects. In the 115 th Congress, representatives of the National Water Resources Association and the Family Farm Alliance asked Congress to compel Reclamation and the Office of Management and Budget to implement the Rural Water Supply Program and investigate opportunities to develop loan and loan guarantee programs that can help fund new water infrastructure projects. Over the years, Reclamation has provided its views regarding funding for rural water projects. In general, Reclamation has testified that rural water projects must compete with a long list of other priorities, including aging infrastructure, environmental compliance and restoration actions, and dam safety. During the consideration of authorizing existing rural water projects, Reclamation stated that long-standing agency policy was that local sponsors, particularly those that are nontribal, should reimburse Reclamation for 100% of the costs incurred for rural water supply from multipurpose projects. Reclamation notes in its budget requests to Congress that constrained federal budgets do not preclude nonfederal sponsors' ability to move forward with rural water projects by funding in excess of the minimum nonfederal contributions. Reclamation has recommended that tribes, where possible, and other project beneficiaries be responsible for the O&M expenses of their rural water projects. Congress has appropriated funds for rural water projects on a nonreimbursable basis (i.e., as de facto grants). In some cases, local and tribal sponsors do not have funds or have not prioritized funds to increase their funding contributions. Should Congress continue to support rural water projects through Reclamation, Congress may consider various options. These might include Continue to provide Reclamation annual appropriations for the agency to allocate funds to individually authorized rural water projects based on established agency criteria. Establish mandatory funding for Reclamation to allocate funds to individually authorized rural water projects based on established agency criteria. For example, the Authorized Rural Water Projects Completion Act ( S. 1556 ) in the 115 th Congress would have created a Reclamation Rural Water Construction Account to receive $80 million annually that otherwise would be deposited into the Reclamation Fund. Funds in the Reclamation Rural Water Construction Account, in addition to amounts appropriated for rural water projects, would be available for the construction of authorized rural water projects. Provide grant funding through a competitive process for nonfederal sponsors to support local projects, such as the grant program the Disadvantaged Community Drinking Water Assistance Act ( H.R. 5347 ) would establish for communities with fewer than 60,000 residents. Direct appropriations to individually authorized rural water projects. As GAO noted in a 2007 report, numerous federal entities provide funding for water supply and wastewater projects. In addition to Reclamation (which funds only water supply projects), the U.S. Department of Agriculture (USDA), Environmental Protection Agency (EPA), Army Corps of Engineers (USACE), Department of Housing and Urban Development (HUD), and Department of Commerce (DOC) all provide funding for both water supply and wastewater projects. USDA, EPA, HUD, and DOC have formal, nationwide programs with standardized eligibility criteria and processes under which communities compete for funding. In contrast, Reclamation and USACE fund water projects in defined geographic locations under explicit congressional authorizations. According to GAO, Congress has chosen Reclamation to fill a void for projects that are larger and more complex than other rural water projects and that do not meet the criteria of other rural water programs. Some might argue that these projects would be better accomplished via other existing federal water quality or water supply programs. However, as GAO has observed, as designed, some of Reclamation's authorized rural water projects do not fit criteria of other agency's programs due to their cost and regional focus; thus, project proponents have looked to Reclamation for funding. For example, Reclamation may assist rural areas with populations in excess of 10,000 residents that may not be eligible for funding under other programs. Reclamation rural water projects also may serve more than one community (i.e., a regional area, as opposed to a single area). Reclamation developed its Rural Water Supply Program with the intent to complement, rather than duplicate, the efforts of the other agencies' programs and activities. In creating the program, Reclamation signed memoranda of understanding and related documents with other agencies to coordinate efforts. Reclamation has stated that it participates in a variety of broad coordination activities among agencies related to ongoing authorized projects. With the expiration of the Rural Water Supply Program, this formal coordination between Reclamation and other agencies' programs is no longer required. The Bureau of Reclamation (Reclamation) provided the Congressional Research Service with a list of appraisal investigations and feasibility studies conducted for potential projects under the Rural Water Supply Program. Before the program authorization expired in FY2016, 22 appraisal investigations were conducted, with nine recommendations for a feasibility study. Five feasibility studies were conducted. Reclamation did not recommend any projects for construction funding, although two studies found feasible alternatives for rural water supply. Reclamation issued concluding reports for appraisal investigations and feasibility studies of projects that were not recommended for construction funding. Reclamation provided a range of reasons for issuing concluding reports: studies being incomplete, no found feasible alternatives, lack of funding, and program expiration. According to Reclamation, some concluding reports were not issued due to a lack of time or resources. In these cases, Reclamation considered the appraisal reports as concluding reports for the purposes of the Rural Water Supply Program. A feasibility report for the Musselshell-Judith Rural Water System was completed through Reclamation's Rural Water Supply Program. Legislation introduced in the 116 th congress, the Clean Water for Rural Communities Act ( H.R. 967 and S. 334 ), would authorize the Central Montana Musselshell-Judith Rural Water System. ", "summary": "Congress has authorized projects and programs through various federal agencies to address water supply needs. Since 1980, Congress has authorized the Bureau of Reclamation (Reclamation), among other agencies, to develop municipal and industrial (M&I) water supply projects in rural areas and on tribal lands. Congress has authorized these projects, known as rural water supply projects, for several locations throughout the West. From 1980 through 2009, Congress authorized Reclamation to undertake the design and construction, and sometimes the operations and maintenance (O&M), of specific rural water supply projects intended to deliver potable water supplies to rural communities in western states. These projects are largely located in North Dakota, South Dakota, Montana, and New Mexico. The rural communities served by these projects included tribal reservations and nontribal rural communities with nonexistent, substandard, or declining water supply or water quality. Many rural water projects are large in scopeâtaking water from one location and moving it across long distances to tie to existing systems. Although M&I portions of most Reclamation water supply facilities require 100% repayment with interest, Congress has authorized rural water projects that receive some or all costs from the federal government on a nonreimbursable basis (i.e., a de facto grant). For example, the federal government pays up to 100% of costs for tribal rural water supply projects, including O&M. For nontribal rural water supply projects, the federal cost share for current projects ranges from 75% to 80%. The Rural Water Supply Act of 2006 (Title I of P.L. 109-451 ) created the Rural Water Supply Program, a structured program for developing and recommending future rural water supply projects. This program was to replace the previous process of authorizing projects individuallyâoften without the level of analysis and review (e.g., feasibility studies) required for Reclamation's other projects. Under the Rural Water Supply Program, Congress authorized Reclamation to work with rural communities and tribes to identify M&I water needs and options to address such needs through appraisal investigations and feasibility studies. Congress would then consider feasibility studies recommended by the Administration before authorizing specific project construction in legislation. Ultimately, Reclamation did not recommend and Congress did not authorize any projects through this process, and the authority for the program expired in 2016. Members have introduced legislation in the 116 th Congress to reauthorize the Rural Water Supply Program through FY2026: the Water Justice Act ( H.R. 4033 ) and the Securing Access for the Central Valley and Enhancing (SAVE) Water Resources Act ( H.R. 2473 ). Other bills would authorize individual activities (i.e., a feasibility study and a project) previously considered by the Rural Water Supply Program or would address rural water needs by creating authorities for rural water grants or water technology programs. Reclamation continues to construct rural water projects (and to provide O&M assistance for some tribal components) authorized and initiated outside of the Rural Water Supply Program. Enacted funding for rural water supply projects in FY2020 provided $145.1 million for construction and O&M at seven authorized rural water projects, which was $117.4 million above the Administration's FY2020 budget request. Five projects received construction funding in FY2020: Garrison Diversion Unit of the Pick-Sloan Missouri Basin Program, Fort Peck Reservation/Dry Prairie Rural Water System, Lewis and Clark Rural Water System, Rocky Boy's/North Central Montana Rural Water System, and Eastern New Mexico Water Supply. For FY2021, the Administration requested $30.3 million for rural water projects. As of early 2020, Reclamation reported that $1.2 billion was needed to construct authorized, ongoing rural water projects.", "document_type": "crs"}
{"report": "This report compiles the final congressional votes on free trade agreements (FTAs), trade promotion authority (TPA), and U.S membership to the World Trade Organization (WTO). In the past 30 years, the United States has pursued bilateral, regional, and multilateral trade agreements in an attempt to liberalize markets and reduce trade and investment barriers. Congress has played a central role in shaping this trade policy. Congressâthrough debate and legislationâdefines trade negotiation priorities, approves FTAs, and helps oversee agreements' implementation and enforcement. While the President has the authority to negotiate treaties with foreign countries, Congress has sole constitutional authority to regulate international trade. Since 1934, Congress has periodically delegated some authority to negotiate trade agreements to the President. In the Trade Act of 1974, Congress outlined many of the congressional and executive roles regarding trade agreements; Congress delegated negotiation authority to the President, but required congressional approval (through implementation legislation) of free trade agreements. Congress also created a process to allow for expedient consideration in Congress of FTAs, provided that the President observe certain statutory requirements. This expedient consideration is known as TPA or, formerly, \"fast-track\" consideration. The United States is currently party to 12 bilateral FTAs (with Australia, Bahrain, Chile, Colombia, Israel, Jordan, South Korea, Morocco, Oman, Panama, Peru, and Singapore) and to 2 regional free trade agreements (the North American Free Trade Agreement (NAFTA) and the Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR)). The United States has also signed an agreement with Canada and Mexico to replace NAFTA. The United States-Mexico-Canada Agreement (USMCA) has been ratified by all three parties, and the agreement will enter into force, after the necessary legal and regulatory measures are in place for each party to meet its commitments. For a list and timeline of trade agreements where negotiations were concluded, see Table 1 . For a compilation of final congressional votes on FTAs considered in Congress, see Table 2 . In addition to bilateral and regional FTAs, the United States is also party to multilateral agreements that outline membership in the WTO, a 164-member international organization. The WTO was created in 1995 to oversee and administer multilateral trade rules, serve as a forum for trade liberalization negotiations, and resolve trade disputes. When Congress approved the WTO Uruguay Round Agreement, it included a set of procedures to allow Congress to reconsider U.S. membership in the WTO by passing a joint resolution calling for withdrawal from the organization. Congress may vote every five years on withdrawal from the WTO. Resolutions were introduced in the 106 th and 109 th Congress; neither passed. See Table 3 for a compilation of major legislation and votes concerning U.S. membership to the WTO. All U.S. FTAs, except the agreement with Jordan, were considered in Congress under Trade Promotion Authority (TPA). TPA is the process by which Congress enables FTA legislation to be considered under expedited legislative procedures, provided the President observes certain statutory obligations. Because TPA is extended only for limited periods, Congress periodically reconsiders legislation to extend it and to outline future negotiation objectives. Since 1974, Congress has passed seven measures extending TPA. TPA, like many issues related to international trade, has been politically contentious in Congress over time, resulting in vigorous debate and two multi-year lapses in authority. For a list of major votes on TPA, see Table 4 . Congressional consideration of bills can be a complex process, sometimes requiring multiple votes. For clarity's sake, this report only provides the final vote for each measure. More complete bill information can be found on Congress.govâincluding roll call votes for all legislation back to 1993. The bill numbers listed in the following tables link to Congress.gov, and the vote tallies link to the House and Senate roll call votes, for all votes back to 1993. Table 1 provides a timeline of trade agreements including the date the agreement was signed, the date implementing legislation was enacted, and the date the agreement went into force. The table also notes the TPA legislation under which the trade agreement was considered in Congress. The table includes fully implemented trade agreements, as well as two recent agreements: the USMCA, which has not yet entered into force, and the Trans-Pacific Partnership, a trade agreement that the United States signed, but later announced that it would not ratify. Table 2 provides major votes on FTAs, including the final House and Senate votes on FTA implementing legislation. Table 3 provides major votes on U.S. membership to the WTO, including implementing legislation for multilateral agreements and resolutions calling for the United States to withdraw from the WTO. Table 4 provides major votes on TPA legislation. It includes the final House and Senate votes on TPA-related provisions. Votes are grouped by the trade agreement authority granted to the President. For a selected list of CRS products on FTAs and TPA, see the Appendix . CRS In Focus IF10297, TPP-Trade Promotion Authority (TPA) Timeline , by Ian F. Fergusson CRS Report R43491, Trade Promotion Authority (TPA): Frequently Asked Questions , by Ian F. Fergusson and Christopher M. Davis CRS Report RL33743, Trade Promotion Authority (TPA) and the Role of Congress in Trade Policy , by Ian F. Fergusson CRS Infographic IG10001, Trade Promotion Authority (TPA) and U.S. Trade Agreements , by Brock R. Williams CRS Report R45198, U.S. and Global Trade Agreements: Issues for Congress , by Brock R. Williams CRS Report R44981, NAFTA and the United States-Mexico-Canada Agreement (USMCA) , by M. Angeles Villarreal and Ian F. Fergusson. CRS In Focus IF10997, U.S.-Mexico-Canada (USMCA) Trade Agreement , by M. Angeles Villarreal and Ian F. Fergusson CRS Legal Sidebar LSB10399, USMCA: Implementation and Considerations for Congress , by Nina M. Hart CRS In Focus IF10733, U.S.-South Korea (KORUS) FTA , coordinated by Brock R. Williams CRS Report RL34470, The U.S.-Colombia Free Trade Agreement: Background and Issues , by M. Angeles Villarreal and Edward Y. Gracia CRS Report RS22164, DR-CAFTA: Regional Issues , by Clare Ribando Seelke CRS In Focus IF10394, Dominican Republic-Central America-United States Free Trade Agreement (CAFTA-DR) , by M. Angeles Villarreal CRS Insight IN10903, CRS Products on the North American Free Trade Agreement (NAFTA) , by M. Angeles Villarreal CRS In Focus IF10000, TPP: Overview and Current Status , by Brock R. Williams and Ian F. Fergusson CRS Report R45417, World Trade Organization: Overview and Future Direction , coordinated by Cathleen D. Cimino-Isaacs ", "summary": "Through Trade Promotion Authority (TPA), Congress has delegated authority to the President to negotiate free trade agreements (FTAs). This authority requires congressional approval (through implementation legislation) of comprehensive FTAs. Since 1979, Congress has passed 17 implementation measures for FTAs and multilateral trade agreements. The majority of these trade agreementsâincluding the recent United States-Mexico-Canada Agreement (USMCA) â were considered in Congress under TPA, which provides for expedited consideration of FTAs in Congress. Since 1979, Congress has passed six measures extending TPA for limited time periods. As with many international trade issues, TPA has been politically contentious over time, resulting in vigorous debate and two multi-year lapses in authority. USMCA is the most recent free trade agreement (FTA) to be approved by Congress under TPA.", "document_type": "crs"}
{"report": "Intercity passenger rail in America dates to the rail industry's origins in the 19 th century. As common carriers engaged in interstate commerce, railroad companies built hundreds of thousands of miles of track across the country offering both freight and passenger transportation, making the distinction between a freight railroad and a passenger railroad a relatively recent one. Federal regulation was important in the industry's development. The Hepburn Act of 1906 (34 Stat. 584) authorized the Interstate Commerce Commissi on (ICC) to regulate maximum interstate passenger fares to ensure that they were \"just and reasonable.\" The Transportation Act of 1958 (P.L. 85-625, 72 Stat. 571) gave the ICC authority to allow a railroad to discontinue passenger service on a line while continuing freight service. By the mid-20 th century, passenger services faced increased competition from jet airliners offering faster travel times and private automobiles offering convenient access to a network of new federally funded highways. The rail industry's worsening financial health meant that infrastructure conditions also worsened as maintenance was deferred, contributing to reduced speeds and reliability. With ridership declining, the ICC permitted railroads to discontinue many passenger services and focus on carrying freight. In an effort to shore up flagging passenger rail service, Congress passed the High Speed Ground Transportation Act of 1965 (P.L. 89-221), creating an office in the Department of Commerce to foster research and development of new transportation technologies (the Department of Transportation did not yet exist). This contributed to the establishment of the nation's fastest rail service, the Metroliner, on the Washington, DC, to New York City portion of the Northeast Corridor (NEC), when that line was still under private ownership. In the years since, Congress has taken an active role in preserving and improving passenger rail service. Although ridership is much lower than in the heyday of long-distance trains, the federal government continues to support passenger rail through a variety of grants, loans, and tax preferences. There continues to be debate over whether federal subsidies for passenger rail are justified, given competing alternatives by air or highway that dominate most intercity travel markets (though these alternatives may also receive subsidies). The Trump Administration has called for \"the end of the [federal] Government subsidizing operating losses\" on passenger trains, shifting decisionmaking and cost responsibility to states. As several freight railroads, including the Pennsylvania Central, the nation's largest, entered bankruptcy in 1970, Congress created Amtrakâofficially, the National Railroad Passenger Corporationâto preserve a basic level of intercity passenger rail service, while relieving private railroad companies of the obligation to run passenger trains that had lost money for decades. Amtrak is structured as a private company, but virtually all of its shares are held by the U.S. Department of Transportation (U.S. DOT). Amtrak owned no infrastructure at the time of its creation. It was originally structured as a contracting agency, and Amtrak trains were operated by private railroads over tracks they owned. Under the Railroad Revitalization and Regulatory Reform Act (4R Act) of 1976, ownership of the NEC was transferred from the bankrupt Penn Central Railroad to Amtrak. At the same time, Congress initiated the Northeast Corridor Improvement Program, which required travel times of 3 hours and 40 minutes between New York and Boston, and of 2 hours and 40 minutes between New York and Washington, by 1981. While the act funded many improvements along the corridor, these goals were not achieved. The law that created Amtrak also stipulated that Amtrak pay host railroads for the incremental costs specific to Amtrak's usage of tracksâfor instance, the additional track maintenance costs required for passenger trains. Amtrak is not required to contribute to a freight railroad's overhead costs. Then, in 1973, Congress granted Amtrak \"preference\" over freight trains in using a rail line, junction, or crossing ( P.L. 93-146 , Â§10(2), 87 Stat. 548), but Amtrak has been unable to enforce this preference to ensure that host railroads operate its trains on schedule. Several railroads continued to operate long-distance passenger services after 1970 rather than contracting with Amtrak. The last of these services was discontinued in 1983. Amtrak itself discontinued a number of the routes it originally operated, but has been required by Congress to maintain a \"national network\" of long-distance trains. Amtrak has received federal funds to cover operating losses and capital expenditures since its creation. In 1991, the Intermodal Surface Transportation Efficiency Act (ISTEA, P.L. 102-240 ) empowered the Secretary of Transportation to designate up to five high-speed rail corridors. These were required to be \"rail lines where railroad speeds of 90 miles per hour are occurring or can reasonably be expected to occur in the future\" (Â§1010). ISTEA created an annual set-aside of $5 million from a highway funding program to fund railway-highway crossing safety improvements on these corridors. As the presence of grade crossings can restrict how fast trains can travel, this provision funded projects that had the potential to boost maximum speeds. The Transportation Equity Act for the 21 st Century (TEA-21, P.L. 105-178 ) increased the number of high-speed rail corridors to 11 (see Table A-1 ). These have a total length of roughly 9,600 miles, less than half the length of the current Amtrak network. Several of the designated \"corridors\" are in fact networks of interlocking or diverging lines. For example, the Midwest high-speed rail corridor, as initially designated, consisted of lines radiating outward from Chicago to Milwaukee, St. Louis, and Detroit; further extensions to these lines have since been added to the corridor designation, which now goes by the name of the Chicago Hub Network. Most corridors were designated at the discretion of U.S. DOT, but threeâthe Gulf Coast, Keystone, and Empire State corridorsâwere designated by statute. Almost all corridors are between 100 and 500 miles in length, the distance range in which rail is expected to be competitive with other modes. Most federally designated corridors already receive some intercity passenger rail service, and roughly half of all federally designated corridors are served by Amtrak's NEC or state-supported routes. Approximately 1,500 miles of federally designated high-speed rail corridors currently receive no intercity passenger rail service of any kind. Some of these segments were regularly served by Amtrak trains as recently as 2005; others have not seen intercity passenger rail service since before Amtrak initiated operations in 1971. There is no longer a dedicated funding program for this network as there had been under ISTEA, but federal designation was incorporated into later efforts to improve passenger rail as discussed below. The Passenger Rail Investment and Improvement Act (PRIIA, P.L. 110-432 , Division B), enacted in 2008, created discretionary grant programs to expand or otherwise improve passenger rail service. Sections 301, 302, and 501 of PRIIA authorized up to $3.725 billion in grants to states to develop intercity passenger rail service. One of these new programs, which authorized $1.5 billion specifically for high-speed rail corridor improvements, explicitly defined \"corridor\" as a federally designated corridor established by ISTEA or TEA-21. With PRIIA in effect, the 111 th Congress appropriated a total of $10.6 billion to develop intercity passenger rail services in the American Recovery and Reinvestment Act of 2009 (ARRA, P.L. 111-5 ) and the FY2009 and FY2010 Department of Transportation Appropriations Acts (Division A, Title I, P.L. 111-117 ), well in excess of authorized levels. That same year, the Federal Railroad Administration (FRA) published its High-Speed Rail Strategic Plan, which outlined the Obama Administration's priorities to improve intercity passenger rail service using the programs created by PRIIA and the infusion of funds provided by ARRA. This document indicated that the federally designated high-speed rail corridors were to be prioritized in the coming solicitations for intercity passenger rail grant funds. FRA ultimately used this money to award 158 grants under the new High-Speed Intercity Passenger Rail (HSIPR) Grant Program. Some 80% of the funding went to a relatively small number of large-scale projects, each within a federally designated priority corridor. These included multi-billion-dollar grants to California and Florida for new high-speed rail lines; Florida subsequently turned down its grant. Most grants funded projects that made incremental improvements to existing services, rather than the establishment of new lines (with the notable exception of California's high-speed rail project, discussed later in this report). HSIPR also offered grants for passenger rail planning, which previously had not been addressed by departments of transportation in some states. The 112 th Congress rescinded $400 million of the $10.6 billion previously appropriated and did not adopt the Obama Administration's requests for additional funding. No subsequent HSIPR funding has been provided. Several states ultimately declined HSIPR grants to improve or expand intercity passenger rail service. That funding was reallocated to other states. Some of the remaining projects encountered delays in delivery, meaning their effects on passenger rail service have only recently begun to be felt. Other projects are still years away from completion, and still others funded planning and engineering work that requires additional funding for construction. Specific improvements in rail service brought about by these grants are discussed in later sections of this report. Authority for passenger rail programs lapsed when PRIIA expired at the end of 2013. After a gap of two years, passenger rail programs were reauthorized by the Passenger Rail Reform and Investment Act of 2015, enacted as Title XI of the Fixing America's Surface Transportation Act (FAST Act, P.L. 114-94 ). In the FAST Act, Congress did not continue the approach taken in PRIIA of authorizing large sums for capital grants to implement or improve passenger rail service over entire corridors. The FAST Act did, however, contain a number of measures intended to improve passenger rail in other ways. The collective effect of these programs has been to advance some passenger rail projects initiated under PRIIA, but on a comparatively smaller scale. Some intercity passenger rail projects have also been advanced using funds from U.S. DOT's TIGER/BUILD grant program, a discretionary program that supports infrastructure investments deemed to have significant local or regional impact. Section 11301 of the FAST Act created this grant program, which merged eligibility from several programs, including the Intercity Passenger Rail and Congestion Reduction programs created by Sections 301 and 302 of PRIIA. A total of $1.103 billion was authorized for this program from FY2016 through FY2020; to date, $916 million has been appropriated by Congress. The program has not yet resulted in any increases in speed or frequency within the intercity passenger rail system. However, it has been used to fund implementation of Positive Train Control (PTC) systems in many areas. PTC is primarily a crash-avoidance technology, but in certain cases it can allow trains to travel faster. In Section 11302 of the FAST Act, Congress created the Federal-State Partnership for State of Good Repair program to fund the rehabilitation or replacement of aging infrastructure used for passenger rail service. A total of $997 million was authorized for this program; to date, $675 million has been appropriated. By statute, preference is given to grant applications with at least a 50% nonfederal share of project costs, to applications submitted jointly by multiple applicants, and to projects sponsored by other entities than Amtrak alone. The Partnership program is more explicitly directed to intercity passenger rail projects by statute, but similarly to CRISI it is primarily designed to fund the replacement or rehabilitation of aging infrastructure rather than to implement new or dramatically improved passenger rail service. In Section 11303 of the FAST Act, Congress created the Restoration and Enhancements program to cover the operating costs of reinitiating passenger rail services that have been suspended. This sets it apart from other grant programs administered by FRA, which generally fund capital grants for infrastructure improvements. Many corridors are potentially eligible for these funds, as many passenger routes have been discontinued by Amtrak since its creation, but the program was primarily aimed at restoring service along the coast of the Gulf of Mexico. A section of Amtrak's long-distance Sunset Limited ran between New Orleans and Orlando from 1993 until it was suspended after sustaining damage during Hurricane Katrina in 2005. Funding was made available for the program in FY2017, which did not result in any successful applications. However, a $33 million CRISI grant was awarded to the Southern Rail Commission (a multi-state coalition formed to promote passenger rail in Southern states) in 2019 for capital improvements necessary to reinstate service between New Orleans and Mobile. Such a service would be eligible to receive Restoration and Enhancements grant funding to support its operating costs. The federal government has taken several steps to improve passenger rail by supporting the acquisition of new rail cars and locomotives. Rail equipment can have an effect on the speed and frequency of rail service. Older equipment may not be capable of running at high speeds or be compatible with modern train control systems or accessibility laws. Amtrak periodically rehabilitates and expands its own fleet of rail cars and locomotives, although some states have purchased specialized rail equipment to supplement Amtrak's existing fleet. Section 305 of PRIIA tasked Amtrak with creating a Next Generation Corridor Equipment Pool Committee to design, develop specifications for, and procure standardized rail equipment for use on state-supported short distance corridors. The committee developed specifications for diesel locomotives and bi-level passenger cars. Five statesâCalifornia, Illinois, Michigan, Missouri, and Washingtonâagreed to jointly procure a total of 130 passenger cars and 32 locomotives for use on their state-supported rail corridors. They did so using a mix of state funds, federal funds awarded for corridor improvements, and a $268 million HSIPR grant awarded specifically for equipment procurement. The locomotive procurement was awarded to Siemens, and Siemens-built \"Charger\" diesel locomotives are now in service on several Amtrak routes, with the potential for additional follow-up orders. The regional passenger car procurement was awarded to Sumitomo Corporation of America, and subcontractor Nippon Sharyo was to assemble the cars at a newly expanded factory in Rochelle, IL. However, a prototype car failed an important structural test, and the requisite design changes would have delayed the project beyond certain deadlines imposed by the federal funding agreement. Ultimately, Nippon Sharyo was replaced by Siemens, and the procurement was modified to substitute single-level rail cars for the bi-levels originally contracted. The delays resulted in a portion of the $268 million grant expiring and being returned to the Treasury. Procurement of new rail equipment can be constrained by certain federal regulations. Purchases of rail equipment using federal funds are subject to \"Buy America\" requirements for domestic content and final assembly. FRA safety standards require passenger rail cars that operate in mixed traffic with freight trains to be able to withstand certain crush forces. This makes most passenger rail equipment designed for use in Europe or Asia impossible to deploy in the United States without major modifications, increasing unit production costs. The safety standards also make passenger rail equipment heavier, which in turn makes it more difficult for trains to accelerate and decelerate quickly, increasing trip times. Regulations promulgated by FRA in 2018 attempt to address this, creating a category of Tier III passenger rail equipment permitted to operate at speeds up to 220 miles per hour (mph) on dedicated tracks or up to 125 mph on lines also used by freight trains. The regulation also modifies certain crashworthiness and occupant-protection requirements on Tier I equipment (designed for speeds below 125 mph) to permit a greater variety of train car designs to operate on the U.S. network. Passenger rail projects are eligible under two federal loan programs, the Railroad Rehabilitation and Improvement Financing (RRIF) program and the Transportation Infrastructure Finance and Innovation Act (TIFIA) program. Neither of these programs was designed with passenger rail specifically in mind; RRIF was intended for use primarily by freight railroads, and TIFIA has primarily been used for toll road and transit projects. Because loans require a revenue source to establish creditworthiness (the ability to repay a loan), and because passenger rail lines rarely generate an operating profit, these programs have seen limited application to intercity rail. However, Amtrak has used RRIF loans to purchase new locomotives for the Northeast Corridor, which does generate an operating profit. Amtrak's two active RRIF loans, totaling over $3 billion, now represent almost 60% of total nominal RRIF loan amounts. Only 73% of Amtrak trains arrived at all stations on time in 2018, and Amtrak routes often fall short of internal on-time performance goals. Among trains on long-distance routes, half arrived at their final destinations within 15 minutes of the scheduled time in 2018. The freight lines used by most Amtrak services may have little incentive to give priority to Amtrak trains at the expense of their own more profitable operations. However, trains on the Amtrak-owned NEC also reached their final destinations late on one trip out of five. Figure 1 below illustrates the fluctuations in endpoint on-time performance for Amtrak's three business lines over the last 15 years. In general, reliability on state-supported routes and on the NEC has been relatively stable compared to long-distance routes. Where state-supported routes used to lag behind the NEC, they are now more or less equal in terms of reliability, though both have dipped from their historic highs. Amtrak has made forceful statements blaming host railroads for poor on-time performance. In one recent example from February 2019, a Twitter account used by Amtrak to alert riders of service issues identified host railroad Norfolk Southern by name as the cause of a delay. In response, Norfolk Southern issued a letter disputing the cause of the delay, accusing Amtrak of damaging Norfolk Southern's reputation, and threatening further action. Amtrak's response continued to blame Norfolk Southern, listing additional delays it attributed to the company and suggesting that it take \"immediate action to improve the on-time performance of Amtrak trains on your railroad.\" The 110 th Congress attempted to address on-time performance in Section 207 of PRIIA. This section directed FRA, Amtrak, and the Surface Transportation Board (STB), which regulates competition in the rail industry, to develop minimum performance standards, incorporate those standards into rail service contracts, and resolve disputes arising from these standards in arbitration. Another section in PRIIA, Section 213, gave STB enforcement power over railroads that failed to meet their performance standards. Final metrics and standards went into effect in 2010. The Association of American Railroads, an industry group representing freight rail companies, sued to block the metrics and standards in 2011, asserting that Congress improperly gave Amtrak, defined in statute as a private entity, the power to regulate other private entities and that exercising such power deprived host railroads of their right to due process. A series of federal court decisions culminated in a unanimous Supreme Court ruling that Amtrak could be considered part of the government for the purposes of deciding the case. The 2010 standards were suspended during much of the legal proceedings, and Amtrak on-time performance has decreased since reaching a systemwide high of roughly 80% in 2012. On July 20, 2018, the U.S. Court of Appeals for the District of Columbia Circuit ruled that without an arbitrator to enforce the standards, Amtrak is not exercising undue coercive power over its competitors. The Supreme Court declined AAR's appeal of this decision on June 3, 2019, allowing the federal government's power to set performance standards to remain in place. The 2010 standards remain vacated, but FRA is free to establish new standards with Amtrak's input. Most recent attempts to improve intercity passenger rail have involved making improvements to infrastructure and equipment on existing routes, rather than the planning and implementation of new routes. However, the geography of existing lines can constrain efforts to increase speeds, and the freight railroads that control most of the lines Amtrak uses have little incentive to allow higher speeds or more frequent passenger service without concessions in return, such as capital improvements that also serve to improve freight flows. This section describes federally funded programs to improve Amtrak's route network in order to extend the life of existing infrastructure, improve reliability, increase service frequency, and/or reduce scheduled trip times. The Northeast Corridor (NEC), already the busiest intercity passenger rail line in the nation at the time of PRIIA's enactment, received nearly $1 billion in HSIPR funds divided among several projects. Some of these projects resulted in the construction of infrastructure intended to improve train service or prevent its deterioration, while others completed prerequisite environmental and engineering studies for large projects that remain unfunded. Apart from funding specific infrastructure projects, PRIIA also called for a corridor improvement plan for the NEC. The planning project, NEC Future, has identified goals for rail service along the corridor and recommended specific infrastructure investments necessary to bring about the desired level of service. A corridor-level Environmental Impact Statement evaluated several alternatives, from maintaining the corridor at what are essentially current service levels to building a brand new corridor adjacent to the existing one capable of much faster trips but at a considerably higher capital cost. The Selected Alternative, approved in a Record of Decision (ROD) issued in July 2017, fell in between these two options, improving speed and capacity on existing infrastructure without building an entirely new parallel route. One limitation of the existing Northeast Corridor is the path taken by trains along the coast of Long Island Sound in southeastern Connecticut. The tight curves along the shore reduce speeds and lengthen trip times. NEC Future planners initially recommended the construction of new tracks set farther inland along a straighter path, but this was met with opposition from local groups that objected to the construction of new rail lines in their towns. The Selected Alternative considered in the Final Environmental Impact Statement recommended further study of this segment of the corridor. Amtrak says that no further significant expansion of intercity service on the NEC is possible without increasing capacity into and through Manhattan. Also, the reliability of that service is threatened due to the aftereffects of the flooding of the rail tunnel under the Hudson River during Hurricane Sandy in 2012. The Gateway Program is a package of projects proposed to increase both reliability and capacity. The centerpiece is a new two-track tunnel under the Hudson River, supplementing the current tunnel, and conceived in the aftermath of the 2010 cancellation by the State of New Jersey of a similar tunnel project called Access to the Region's Core (ARC). The cost estimates for the entire program of work are in the range of $24 billion to $29 billion. One challenge facing the Gateway Program is that Amtrak, the infrastructure owner, and New Jersey Transit, the other primary beneficiary of the improvements, have limited ability to fund the improvements. New Jersey Transit does not earn a profit and needs several billion dollars for other projects. Amtrak earned an operating profit of $526 million on its NEC operations in FY2018, but at least a portion of its NEC operating profit is pledged starting in 2022 to repay a $2.45 billion federal loan Amtrak received in 2016 to purchase new train cars. Amtrak also has several billion dollars in other needs, including a backlog of projects to restore its infrastructure to a state of good repair. A second challenge facing the program is that while assistance may be sought from the federal government, current federal transportation grant programs are not structured to provide large amounts of funding to a particular project on a predictable basis over many years. Funding under discretionary programs depends on the amount that Congress appropriates each year. Since the Gateway Program would improve both intercity passenger rail service and commuter rail service, the individual projects that are part of the program could be eligible for assistance from federal programs that focus on either intercity passenger rail or public transit, but no program of either type currently provides multi-year funding in the amount sought by Gateway project sponsors. The two projects within the Gateway program that are farthest along in their planning and design phasesâthe Portal North Bridge and Hudson Tunnel Projectsâare in project development for Federal Transit Administration (FTA) Capital Investment Grant (CIG) funding, but FTA has cast doubt on the strength of their local financial commitments. Sponsors of both projects have planned to use federal RRIF and TIFIA loansâto be repaid with local fundsâas part of the nonfederal share of project costs, but FTA has not accepted this approach. Most federal grant funding to improve the existing passenger rail system has gone to routes on Amtrak's National Network, outside the Northeast Corridor. These routes do not routinely generate the operating surpluses found on the NEC and are generally operated over tracks owned by private freight railroads, so the HSIPR program involved spending public funds to improve privately owned rail infrastructure, or else to facilitate the purchase of that infrastructure by a public agency. One criticism of the HSIPR program has been that investments were spread out so thinly that they could fund only limited service improvements. Building a true high-speed rail line under HSIPR would have required FRA to concentrate considerable funding on a single project, something Congress did not direct FRA to do. Developing true high-speed passenger rail services with federal assistance will be challenging given the inevitable pressures to distribute federal funding widely. Half of all Amtrak trips are taken on state-supported routes, and state-supported routes have accounted for a large portion of the growth in Amtrak's ridership over the last two decades. To build on this growth, several states received infusions of federal funding to increase speeds, add additional frequencies, extend service to new stations, or generally improve reliability by replacing aging infrastructure. Table 2 below contains a list of selected improvements to state-supported routes to receive HSIPR grants. Some of these projects are already complete and have been successful; others, especially the larger and more complex corridor improvement projects, have encountered delays and have not yet delivered their intended benefits. Status updates for three of these projects appear beneath the table. The Chicago-St. Louis corridor improvement program, though it was dubbed Illinois HSR, did not have as its immediate objective the implementation of true high-speed rail along the corridor. Rather, a series of targeted investments was planned to create additional rail capacity, reducing interference from freight trains and allowing passenger trains to reach speeds of 110 mph. In 2012, 110-mph service was initiated on the 15-mile segment between Dwight and Pontiac, IL, but not on the remaining segments from Dwight to Joliet and Pontiac to Alton. Portions of the routeâfrom Chicago to Joliet, from St. Louis to Alton, and passing through Springfieldâare congested with freight and/or commuter traffic and impose lower speed limits, further hampering efforts to reduce trip time. A federally funded environmental study identified alternatives for double-tracking the entire corridor, including the segments not improved by the HSIPR corridor development grant. These alternatives would double existing service levels to eight round trips daily, and have the potential to reduce end-to-end travel times by nearly two hours. The corridor-level study estimated the costs of implementing these alternatives at between $4.9 billion and $5.2 billion, including building new tracks in the congested areas in Springfield and just outside Chicago and St. Louis. A project in Springfield that would reroute passenger and freight trains onto separate tracks is under construction with the support of TIGER grants, but the environmental reviews for the Chicago-Joliet and Granite City-St. Louis segments were suspended in November 2018. FRA indicated that the project sponsors did not want to pursue the environmental reviews at that time. Freight railroad Norfolk Southern no longer wished to maintain a 135-mile section of the corridor from Kalamazoo, MI, to Dearborn, MI, to the standards necessary to run passenger trains at 79 mph, meaning speeds would have decreased and trip times would have increased without outside intervention. The State of Michigan used HSIPR grant funds to purchase the section from Norfolk Southern, bringing it into public ownership and making improvements that would allow top speeds of 110 mph. In 2012, 110-mph service was initiated on a separate 97-mile segment from Porter, IN, to Kalamazoo, the result of upgrades paid for with ARRA funds awarded directly to Amtrak, which owns that segment. As of 2019, the cumulative effect of these improvements has been to reduce average trip times between Chicago and Detroit by approximately 25 minutes. Further reductions may be possible as additional segments are upgraded to 110 mph. A federally funded environmental study for the corridor resulted in a Draft Environmental Impact Statement that identified alternatives for further improvements on the route, increasing service to six or 10 daily round trips (from the existing three) and making further reductions to trip time. Key among these improvements would be the selection of a new route from Chicago to Michigan City, IN. On November 30, 2018, FRA announced it was rescinding the Notice of Intent issued as part of this environmental review, effectively halting the planning process before reaching the Final EIS or Record of Decision stage. However, FRA also noted that planning work completed to that point could be reused in future projects, given sufficient interest and funding. On December 18, 2017, a southbound Amtrak Cascades train derailed near DuPont, WA, killing three and injuring 62. The train was the first in regular service to use the Point Defiance Bypass, an inland rail route upgraded using some of Washington State's HSIPR funds. The Bypass was to reduce travel times between Seattle and Portland by 10 minutes without raising the maximum allowable speed on the track. In the aftermath of the derailment, Amtrak has been operating trains on its original route and schedule. On May 21, 2019, the National Transportation Safety Board (NTSB) published an abstract of its final report and recommendations following an investigation of the 2017 derailment. NTSB recommended that Amtrak no longer operate the route with a certain type of passenger car. Amtrak and the Washington State Department of Transportation (WSDOT) have announced they will comply with the recommendation, reducing the fleet of usable cars. Some efforts to put Amtrak on more stable financial footing have centered on reforming the long-distance routes that Amtrak operates as part of the National Network. These routes require the largest operating subsidies, have the lowest on-time performance of Amtrak's three business lines, and make many stops at small communities that are not major generators of passenger traffic. At the same time, those communities may see Amtrak service as an important link to other cities or as a point of local pride. This has led to the federal government pursuing policies, sometimes simultaneously, that preserve existing long-distance train service while pushing Amtrak to reduce or eliminate operating losses. Congress has supported long-distance routes primarily through annual appropriations to the National Network, which help cover operating subsidies and some capital projects necessary to maintain service. The FAST Act authorized gradual increases in grants to the National Network, from $1 billion in FY2016 rising to $1.2 billion in FY2020. Appropriators have generally met or exceeded these authorized levels. For FY2019, appropriations to the National Network included $50 million to support capital grants necessary to maintain long-distance service over tracks where \"Amtrak is the sole operator on a host railroad's line and a positive train control system is not required by law or regulation.\" These funds were allowed by statute to be used as nonfederal matching funds for competitive discretionary grants that would lead to such projects. This measure was instrumental in sustaining operations of the Southwest Chief route that runs from Chicago to Los Angeles. A segment of the route, between La Junta, CO, and Lamy, NM, receives no freight service; track owner BNSF Railway did not wish to pay to maintain the tracks for Amtrak's exclusive benefit, instead offering to reroute the train on different tracks between Kansas and New Mexico. Local communities along the route applied for and received federal TIGER grants, which required $3 million in matching funds from Amtrak. In 2018, Amtrak signaled it would not contribute these matching funds and would instead consider replacing trains with buses in certain areas. However, the $50 million set-aside from FY2019 appropriations funded the remaining share of project costs, allowing the project to proceed and train service to continue along the entirety of the route. Both the Administration and Amtrak itself have proposed changes to long-distance train service. These changes closely parallel Amtrak's plan, ultimately suspended, to replace a section of the Southwest Chief with bus service. In its FY2020 budget request, the Administration proposed eliminating operating support for long-distance trains and a corresponding reduction in National Network grants, but an increase in funding to the Restoration and Enhancements grant program. To replace federal operating support for a route, states would be eligible to apply for Restoration and Enhancements funding to bridge the funding gap until funds could be raised locally to support the service. Federal funding would be gradually phased down over the five-year duration of a grant agreement, with the states concerned assuming full responsibility for operating costs on the route by FY2024. States could potentially negotiate with Amtrak about changes to schedules or service levels, or about retaining certain segments while discontinuing others. Trains could be replaced with bus service or discontinued if a state did not wish to support rail service on the route. In its own FY2020 grant request, Amtrak has shown some willingness to alter how long-distance routes are funded and operated, stating that \"a modernization of the National Network, with the right level of dedicated and enhanced federal funding, would allow Amtrak to serve more passengers efficiently while preserving our ability to maintain appropriate Long Distance routes\" (emphasis added). In a recent letter to Senator Moran, Amtrak CEO Richard Anderson stated, While we strongly believe that there is a permanent place for high-quality long-distance trains in our network, the time to closely examine the size and nature of that role is upon us for numerous reasons. ...[Congress] will need to decide whether to continue to fund the operation of all existing long-distance trains with funding to buy new rolling stock and increased levels of financial support or consider changes to the network that could either enhance transportation value or reduce capital and operating expenses. Nevertheless, the FY2019 Consolidated Appropriations Act contained a Sense of Congress that \"long-distance passenger rail routes provide much-needed transportation access for 4,700,000 riders in 325 communities in 40 states and are particularly important in rural areas; and long-distance passenger rail routes and services should be sustained to ensure connectivity throughout the National network.\" While there were 4.7 million trips on long-distance routes in 2017, and 4.5 million in 2018, many stations that receive only long-distance train service have very few daily boardings and alightings. One way Congress has attempted to control or reduce operating subsidies for passenger rail is to open the network to a greater degree of competition. This has proven to be difficult given Amtrak's advantages over other operators, including a statutory requirement that freight railroads grant Amtrak trains preference in using their tracks, and another requiring Amtrak to be charged only the incremental cost of using another railroad's tracks. Section 214 of PRIIA required FRA to implement a program that would allow other operators to submit competing bids to take over certain routes operated by Amtrak. This program would be open to any of the railroad companies that serve as hosts to Amtrak long-distance routes, with Amtrak able to respond to any outside bid with one of its own. FRA would then select a winning bidder, which would be entitled to receive an annual operating subsidy of no more than the prior fiscal year's subsidy amount, adjusted for inflation. Up to two routes could be operated in this manner for up to five years, selected from among the worst-performing routes according to a classification system contained elsewhere within PRIIA. FRA promulgated its final rule establishing this program in 2011, but no bids were submitted. The program was revisited in the FAST Act, which increased the number of available routes from two to three, reduced the operation period from five years to four with the possibility of reapplication for a second four-year term, and capped operating subsidies at 10% below its level in the prior fiscal year. The list of eligible bidders was also expanded to include not just host railroads, but also to one or more states, and to partnerships between a state and a host railroad. FRA promulgated its final rule reestablishing this program in 2017, but again no bids have been submitted. Projects to retain or improve existing Amtrak services, as described in the previous section, routinely require investments amounting to tens or hundreds of millions of dollars. High-speed rail systems of the type in use in Europe and Asia, which can make only limited use of infrastructure designed for conventional rail, require significant investments in new infrastructure. Even when built for conventional rail equipment compatible with existing lines, establishing new rail service is a capital-intensive, time-consuming process. For example, a federally funded study of rail options in New York State estimated that instituting 125-mph service from New York City to Albany and Buffalo would require $14.7 billion in capital funding. A list of active or recently completed corridor plans and their cost estimate ranges can be found in Appendix B . The California High-Speed Rail (CAHSR) program is a project led by the State of California with the goal of implementing a true high-speed rail system, capable of speeds in excess of 200 mph, between Los Angeles and San Francisco via the Central Valley cities of Fresno and Bakersfield. Ground was broken on the Central Valley section on January 6, 2015. Since that time, the California High-Speed Rail Authority (CHSRA) has completed civil works such as construction of viaducts or grade separations along the route. Construction of the full \"Phase 1\" system connecting San Francisco to Los Angeles, originally anticipated to be completed in 2028, is now expected to take until 2033. Funding for CAHSR has never been committed in sufficient quantities to cover the entire projected cost of construction. In 2008, California voters approved ballot measure Proposition 1A, which authorized the state to issue $9 billion in bonds. At the time Proposition 1A was approved, California assumed a level of federal and private sector support that ultimately never materialized. The project did receive a total of $3.9 billion in federal HSIPR grants, some from ARRA and some from FY2010 appropriations. While estimates for the cost of the project have fluctuated, the 2018 business plan estimates the capital cost of the Central Valley segment alone at $10.6 billion, and the Phase 1 system at $77.3 billion. In February 2019, California Governor Gavin Newsom announced in his State of the State Address that there \"simply isn't a path\" to complete the full system without additional funding. He later clarified that his comments were not intended to convey that the project was canceled; the section under construction is expected to result in improved passenger rail service in the central valley, and may still result in improved connections to San Francisco once other infrastructure projects are complete. The federal government has taken steps to reclaim federal grant money awarded to the project, on the grounds that the scope of the project has changed too much to be an eligible recipient of federal funding under the terms of the grant agreement. California is challenging these efforts in court; of the two largest grants CHSRA received, a $2.6 billion grant has already been fully spent in accordance with a federal deadline, while a second $929 million grant that has no such deadline remains untouched. After the State of Florida turned down a federal HSIPR grant and canceled its Tampa-Orlando rail project, the private company All Aboard Florida (AAF) began making plans to initiate a new intercity passenger rail line between Miami and Orlando via West Palm Beach. That service, which would come to be called Brightline, does not use the same tracks used by Amtrak, instead using tracks owned by a regional freight railroad, Florida East Coast Industries (FECI; AAF and FECI were at the time both owned by asset management firm Fortress Investment Group). The diesel-powered trains are expected to provide faster service than Amtrak's route between Miami and Orlando, which currently provides two daily long-distance trains in each direction with poor on-time performance. All Aboard Florida initially sought a $1.6 billion federal RRIF loan to finance construction of the portion of the route between West Palm Beach and Orlando, but no loan was authorized. Instead, AAF applied to U.S. DOT for allocations to sell $600 million of qualified private activity bonds to finance work on the Miami-West Palm Beach segment and another $2.25 billion for the West Palm Beach-Orlando segment. The interest on these bonds is exempt from federal income tax; hence, the federal government is subsidizing the project by allowing it to borrow money at a lower interest rate than it would have to pay without the federal tax exemption. Brightline rail service between Fort Lauderdale and West Palm Beach began on January 13, 2018, with service expanding to Miami by May 19 of that year. Service to Orlando is expected to begin in 2022. In 2018, All Aboard Florida acquired XpressWest, a private company planning to build and operate a passenger rail service between Las Vegas, NV, and the Los Angeles area. XpressWest had been in the early stages of applying for a RRIF loan that was ultimately not issued. XpressWest was to be a true high-speed rail line with a connection to the California HSR system in Palmdale, and it is not clear whether California Governor Gavin Newsom's changes to the CAHSR plan will have repercussions for the project. In 2019, British based Virgin Group announced a partnership with All Aboard Florida, rebranding both Brightline and XpressWest as Virgin Trains USA. Other Virgin Group subsidiaries have operated intercity trains in the United Kingdom since the 1990s. Virgin Trains USA announced in January 2019 it would sell stock in an initial public offering, but in February the share offering was postponed. On May 30, Virgin Trains announced that construction of the Las Vegas-Southern California line would be delayed for two years. A private company, Texas Central Partners, is moving forward with plans to construct a true high-speed rail line between the cities of Dallas and Houston. The project, which has the backing of a Japanese rail operator and would use Japanese high-speed rail technology and equipment, would reach top speeds of 186 mph and take 90 minutes end-to-end. There is currently no direct rail service of any kind linking Dallas and Houston. Although the sponsors have stated, \"This project is not backed by public funds,\" news reports have indicated that the project is likely to depend on long-term loans from the federal government's RRIF and TIFIA programs. The project is not yet under construction. One obstacle has been the acquisition of land on which to build the new tracks. There have been conflicting county-level court rulings on whether Texas Central can take the land it needs using eminent domain. Despite these legal issues, the company has stated it could begin construction on the line in 2019 or 2020. Many HSIPR grants funded studies of new or improved passenger rail corridors. A few of these studies were ultimately canceled before reaching completion, but others have resulted in near-finished plans to enhance intercity passenger rail. These plans often feature capital cost projections in the billions of dollars, even for projects with comparatively conservative speed and frequency objectives. The federal government's current approach to funding passenger rail differs from its approach to funding highways and transit. Although PRIIA and the FAST Act set authorized spending levels over multi-year periods, Amtrak funding is subject to the annual appropriations process, while many highway and transit programs are funded automatically out of Highway Trust Fund balances. Likewise, the HSIPR program lacked predictable funding in part because there was no dedicated revenue source for the program. In the context of the federal appropriations process it is difficult to provide significant amounts of funding on a predictable basis to a grant program that depends on the Treasury general fund, as it must compete with many other programs for funding each year. This problem is exacerbated by the limits on overall discretionary spending that were imposed by the Budget Control Act of 2011. Supporters of passenger rail service have long called for a dedicated funding source for rail projects, and previous administrations have echoed such calls. To date, however, Congress has not taken such a step. Rail planning in the United States is not centralized, relying on project sponsors (usually states) to formulate their own plans. Congress and several presidents have, at times, identified corridors as investment priorities or set out trip time goals for certain routes, but these have usually not been backed by any financial commitment or implementation plan. The lack of reliable funding for passenger rail capital projects and operations is one obstacle to rail planning, as some states may not wish to invest time and resources into a plan that may not be achievable without additional federal support. PRIIA contained a requirement for FRA to develop a National Rail Plan (NRP), which has not taken the form of a standalone document. Instead, FRA has issued guidance for states to follow when drafting their own rail plans, as well as cost estimation and cost-benefit analysis guidance for project sponsors to follow when planning new or improved rail lines. FRA has also worked with groups of states to create regional rail plans, identifying service goals and rough cost estimates for passenger rail service between major cities. A rail study in the Southwest is complete, while rail studies in the Midwest and Southeast are ongoing. Regional rail plans are nonbinding and have no construction funding attached. Follow-on policies, including new dedicated funding for rail investment programs, were contained within U.S. DOT legislative proposals that were not enacted. The short-lived experiment contracting with an equipment provider for the Hoosier State and the failure of the long-distance competitive pilot program to generate any applications show that efforts to foster competition have not resulted in improvements to intercity passenger rail. Part of this may be attributed to the de facto monopoly status enjoyed by Amtrak since its private sector competitors ended their passenger businesses. Amtrak has statutory privileges that currently would not extend to startup passenger rail operating companies hoping to compete over existing routes. Under current laws and regulations, a new entrant to passenger rail not wishing to negotiate with Amtrak or freight railroads for track access must either have a prior affiliation with an existing freight railroad (as with All Aboard Florida) or must plan to construct its own tracks (as with Texas Central). Congress could re-impose some obligation to accommodate passenger service on freight railroads. The freight rail industry would likely be opposed to such a step. Appendix A. Federally Designated HSR Corridors Appendix B. New, Improved, and Planned Intercity Passenger Rail Lines", "summary": "The federal government has been involved in preserving and improving passenger rail service since 1970, when the bankruptcies of several major railroads threatened the continuance of passenger trains. Congress responded by creating Amtrakâofficially, the National Railroad Passenger Corporationâto preserve a basic level of intercity passenger rail service, while relieving private railroad companies of the obligation to maintain a business that had lost money for decades. In the years since, the federal government has funded Amtrak and, in recent years, has funded passenger-rail efforts of varying size and complexity through grants, loans, and tax subsidies. Efforts to improve intercity passenger rail can be broadly grouped into two categories: incremental improvement of existing services operated by Amtrak and implementation of new rail service where none currently exists. Efforts have been focused on identifying corridors where passenger rail travel times would be competitive with driving or flying (generally less than 500 miles long) and where population density and intercity travel demand create favorable conditions for rail service. Improving existing routes: On the busy Northeast Corridor line owned by Amtrak, several projects to modernize or extend the life of existing infrastructure have been completed using federal grants overseen by the Federal Railroad Administration (FRA). Amtrak has also received annual appropriations above authorized levels for use on the Northeast Corridor in recent years, but proposed projects to add capacity or reduce trip times require a level of investment that outstrips existing options for passenger rail funding. Federal grants have enabled state-supported routes off the Northeast Corridor to add additional trains per day and/or to reduce trip times (whether by increasing speeds or rerouting trains onto more direct alignments). Some grant funds have also preserved service on Amtrak's long-distance lines, which account for under 15% of ridership but incur the largest operating subsidies. State-supported and long-distance routes generally operate over tracks owned and maintained by freight railroads (called \"host\" railroads), which can interfere with existing service and complicate plans to add trains to already congested freight lines. Interference by freight trains has been cited by Amtrak as a major contributor to its trains' poor on-time performance, although freight railroads sometimes dispute this. A federal law passed in 2008 was designed to hold host railroads to new performance standards, but has been the subject of court challenges for nearly a decade. While legal issues surrounding on-time performance standards may be resolved in the short term, on-time performance has fallen from its system-wide high of 80% (four trains out of five arriving at all stops on time) achieved in 2012 and has been slow to rebound. New rail services: Amtrak has partnered with several states to extend existing routes beyond their former termini to serve new stations, sometimes using additional federal grant money. A high-profile project to build a truly high-speed rail system in California was awarded nearly $4 billion out of the roughly $10 billion appropriated for intercity rail projects in 2009-2010, but projected costs exceed earlier estimates and current funding is sufficient to build only an initial segment. The Trump Administration is now seeking the return of some federal grants. A smaller and less technically complex project to introduce new rail service connecting Chicago, IL, and Iowa City, IA, received federal funding but was delayed at the state level, and it is not clear when or if it will be completed. Meanwhile, several efforts are under way in the private sector to bring intercity passenger rail to major urban corridors. One of these, the Brightline service in Florida, has already begun serving Miami and West Palm Beach on a line that will eventually reach Orlando. While privately funded and operated, these projects do benefit from public assistance in other ways, as Brightline was allowed to issue tax-subsidized qualified private activity bonds to finance construction. Pilot programs to allow private railroads to compete for the right to serve existing Amtrak routes have been less successful. Rail programs were included in the most recent surface transportation authorization, which expires at the end of FY2020. Issues in reauthorization include whether and how to fund plans to build new infrastructure for improved rail services, especially on the federally owned Northeast Corridor; federal support for operating intercity rail services; the process by which rail lines are planned; the obligations of freight railroads to carry passenger trains; and whether other opportunities exist for the private sector to build or operate passenger rail services.", "document_type": "crs"}
{"report": "The National Security Space Launch (NSSL) program aims to acquire launch services and ensure continued access to space for critical national security missions. The U.S. Air Force implemented the original program in 1995âEvolved Expendable Launch Vehicle (EELV)âand awarded four companies contracts to design a cost-effective launch vehicle system. The DOD acquisition strategy was to select one company and ensure that NSS launches were affordable and reliable. The EELV effort was prompted by significant increases in launch costs, procurement concerns, and the lack of competition among U.S. companies. A major challenge and long-standing undercurrent of concern over U.S. reliance on a Russian rocket engine (RD-180), used on one of the primary national security rockets for critical national security space launches, was exacerbated by the Russian backlash over the 2014 U.S. sanctions against its actions in Ukraine. Moreover, significant overall NSSL program cost increases and unresolved questions over individual launch costs, along with legal challenges to the Air Force contract awards by space launch companies, prompted legislative action. In the John S. McCain National Defense Authorization Act (NDAA) for FY2019, Congress renamed the EELV to the NSSL program to reflect a wider mission that would consider both reusable and expendable launch vehicles. The origins of the NSSL program date back to 1995, after years of concerns within the Air Force and space launch community over increasing cost and decreasing confidence in the continued reliability of national access to space. The purpose of EELV was to provide the United States affordable, reliable, and assured access to space with two families of space launch vehicles. Initially only two companies were in competition: Boeing produced the Delta IV launch vehicle, and Lockheed Martin developed the Atlas V. Overall, the program provided critical space lift capability to support DOD and intelligence community satellites, together known as National Security Space (NSS) missions. The EELV program evolved modestly in response to changing circumstances, and the Air Force approved an EELV acquisition strategy in November 2011, further revising it in 2013. That strategy was designed to (1) sustain two major independent rocket-powered launch vehicle families to reduce the chance of launch interruptions and to ensure reliable access to space; (2) license and stockpile the Russian-made RD-180 heavy-lift rocket engine, a critical component of the Atlas V; (3) pursue a block-buy commitment to a number of launches through the end of the decade to reduce launch costs; and (4) increase competition to reduce overall launch costs. The Air Force and others viewed the overall EELV acquisition strategy as having successfully reduced launch costs while demonstrating highly reliable access to space for DOD and the intelligence community. Others in Congress and elsewhere, however, argued that the program remained far too costly and was not as competitive as it should be. The NSSL program is managed by the Launch Enterprise Systems Directorate of the Space and Missile Systems Center, Los Angeles Air Force Base (El Segundo, CA). The NSSL program consists of four launch vehicles: Atlas V and Delta IV Heavy (both provided by United Launch Alliance [ULA] of Denver, CO) and Falcon 9 and Falcon Heavy (both provided by Space Exploration Technologies Corporation [SpaceX] of Hawthorne, CA). NSS launches support the Air Force, Navy, and National Reconnaissance Office (NRO). More specifically, the Atlas V has launched commercial, civil, and NSS satellites into orbit, including commercial and military communications satellites, lunar and other planetary orbiters and probes, earth observation, military research, and weather satellites, missile warning and NRO reconnaissance satellites, a tracking and data relay satellite, and the X-37B space plane (a military orbital test vehicle). The Delta IV has launched commercial and military communications and weather satellites, and missile warning and NRO satellites. The Atlas V and Delta IV Heavy launch vehicles are produced by ULA, which was formed in 2006 as a joint venture of The Boeing Company (of Chicago, IL) and Lockheed Martin (of Bethesda, MD). In addition to the launch vehicles themselves, the NSSL program consists of an extensive array of support capabilities and infrastructure to permit safe operations of U.S. launch ranges. ULA operates five space launch complexes, two at Cape Canaveral Air Force Station, FL (Space Launch Complex-37 and Space Launch Complex-41), and three at Vandenberg Air Force Base, CA (Space Launch Complex-2, Space Launch Complex-3F, and Space Launch Complex-6). A large number of key suppliers for ULA are spread throughout 46 states. DOD certified SpaceX to compete for NSS launches in 2015. The Falcon 9 flew its first NSSL mission on December 23, 2018, which delivered the Global Positioning System (GPS) III to orbit. SpaceX developed a more capable launch capability in the Falcon Heavy, which DOD certified in June 2018 and later awarded NSS missions under Phase 1A of the NSSL program. SpaceX maintains three launch sites, one at Cape Canaveral Air Force Station, FL (Space Launch Complex 40); one at Kennedy Space Center (Launch Complex 39A); and one at Vandenberg Air Force Base, CA (Space Launch Complex 4E). On October 10, 2018, the Air Force awarded three Launch Service Agreement (LSA) Other Transaction Authority (OTA) agreements to space launch companies. The LSA OTA agreements are \"public-private partnerships [that] leverage industry's commercial launch solutions to ensure those systems meet NSS requirements.\" They also \"facilitate development of three NSSL launch system prototypes and maturing those launch systems prior to selecting two NSS launch service providers for launch service procurements beginning in FY2020.\" The Air Force released request for proposals (RFP) in May 2019 for Phase 2 of the NSSL program, with plans to award two separate Launch Service Procurement (LSP) contracts in the summer of 2020. The selected companies will be responsible for launching national security satellites through 2027. However, the Air Force acquisition strategy of down-selecting no more than two launch providers may mitigate short-term risk but could have second- and third-order effects for resiliency in the future. Congress may consider whether the strategy's cost-benefit analysis warrants further research. Should no more than two launch providers be chosen for LSP contracts in Phase 2, the companies not selected would lose the LSA funds received from the Air Force and could potentially be faced with (1) the choice of abandoning NSSL development to focus on competing in the commercial launch sector or (2) investing vast company reserves to continue development on its own. Furthermore, DOD investment in only two launch providers could mean fewer options for an increasingly diverse range of national space security missions and possibly limit competition, once again, in the launch market. By the early 1990s, the U.S. space industrial base supported the production of a number of launch vehicles (i.e., Titan II, Delta II, Atlas I/II/IIAS, and Titan IV) and their associated infrastructure. Although launch costs were increasing and operational and procurement deficiencies were noted by many decisionmakers, no clear consensus formed over how best to proceed. Congress took the initiative in the National Defense Authorization Act for Fiscal Year 1994 (NDAA; P.L. 103-160 , Â§213) by directing DOD to develop a Space Launch Modernization Plan (SLMP) that would \"establish and clearly define priorities, goals, and milestones regarding modernization of space launch capabilities for the Department of Defense or, if appropriate, for the Government as a whole.\" The recommendations of the SLMP led DOD to implement the EELV program as the preferred alternative. The primary objective of the EELV program was to reduce costs by 25%. The program also sought to ensure 98% launch vehicle design reliability and to standardize EELV system launch pads and the interface between satellites and their launch vehicles. Congress supported these recommendations through the FY1995 NDAA ( P.L. 103-337 , Â§211), directing DOD to develop an integrated space launch vehicle strategy to replace or consolidate the then-current fleet of medium and heavy launch vehicles and to devise a plan to develop new or upgraded expendable launch vehicles. Congress recommended spending $30 million for a competitive reusable rocket technology program and $60 million for expendable launch vehicle development and acquisition. The original EELV acquisition strategy, initiated in 1994, called for a competitive down-select to a single launch provider and development of a system that could handle the entire NSS launch manifest. In 1995, the Air Force selected four launch providers for the initial competition: Lockheed Martin, Boeing, McDonnell Douglas, and Alliant Techsystems. After the first round of competition, the Air Force selected Lockheed Martin and McDonnell Douglas to continue. When Boeing acquired McDonnell Douglas in 1997, Boeing took over the contract to develop an EELV. Soon thereafter, however, the Air Force revised the EELV acquisition strategy, concluding that there was now a sufficient space launch market to sustain two EELV providers. Throughout the acquisition process, DOD maintained that competition between Lockheed Martin and Boeing was essential. At the time, the Government Accountability Office (GAO) reported that sufficient growth in the commercial launch business would sustain both companies, a premise that, in turn, would lead to lower launch prices for the government. But \"the robust commercial market upon which DOD based its acquisition strategy of maintaining two launch companies [throughout the life-cycle of the program] never materialized, and estimated prices for future contracts, along with total program costs, increased.\" Retaining two launch providers, however, did provide DOD with some confidence in its ability to maintain \"assured access to space.\" This confidence soon collapsed, when in the late 1990s, the United States suffered six space launch failures in less than a year. These failures included the loss of three national security satellites in 1998-1999, at a cost of over $3 billion. One, a critical national security communications satellite (MILSTARâMilitary Strategic and Tactical Relay), was lost on a failed Titan IV launch in 1999. That satellite capability was not replaced until 2010 with an AEHF (Advanced Extremely High Frequency) satellite, which experienced substantial acquisition challenges and frequent changes in both design and requirements. The other two losses were an NRO reconnaissance satellite and a DSP (Defense Support Program) satellite. In addition to the cost, schedule, and operational impacts of these lost missions, including a classified national security loss in coverage with MILSTAR, these failures significantly influenced the transition to the EELV program, which had an initial goal to make national security space launches more affordable and reliable. President Clinton directed a review of these failures and sought recommendations for any necessary changes. The subsequent Broad Area Review (BAR) essentially concluded that the U.S. government should no longer rely on commercial launch suppliers alone to provide confidence and reliability in the EELV program. Instead, the BAR recommended more contractor and government oversight through increasing the number of independent reviews, pursuing performance guarantees from the launch providers, and greater government involvement in the mission assurance process. Although these additional oversight activities eventually proved to significantly increase EELV costs, they also eventually led to notable improvements in launch successes. The early 2000s saw considerable turmoil within the Air Force space community and among the EELV launch service providers due to competition in the shrinking space launch industrial base, cost increases, and the growing need for reliable access to space. During this time, the poor business prospects in the space launch market drove Lockheed and Boeing to consider leaving the market altogether. Therefore, to protect its objective of assured access to space, the U.S. government began to shoulder much of the EELV program's fixed costs. To further protect the United States' ability to deliver NSS satellites into orbit, the George W. Bush Administration conducted a number of internal reviews that culminated in the 2004 National Security Policy Directive (NSPD)-40. This directive established the requirement for \"assured access to space\" and obliged DOD to fund the annual fixed launch costs for both Lockheed and Boeing until such time as DOD could certify that assured access to space could be maintained without two launch providers. DOD thus revised its EELV acquisition strategy because of the collapse of the commercial launch market and the ongoing erosion of the space industrial base. GAO wrote that \"in acknowledging the government's role as the primary EELV customer, the new strategy maintained assured access to space by funding two product lines of launch vehicles.\" In 2006, The Boeing Company and Lockheed Martin announced plans to consolidate their launch operations into a joint ventureâULA. The companies argued that by combining their resources, infrastructure, expertise, and capabilities, they could assure access to space at lower cost. DOD believed that having two launch vehicle families (Atlas V and Delta IV) under one entity (i.e., ULA) provided significant benefits that outweighed the loss of competition. In October 2006, the Federal Trade Commission granted ULA antitrust clearance allowing the new company to form on December 1, 2006. As a result, \"unparalleled EELV mission success\" ensued, and the tradeoff over increased costs and reduced competition outside ULA was largely deemed acceptable. Since 2006, the Air Force has procured space launches from ULA on a sole-source basis. The former EELV program focused primarily on mission successânot cost control. GAO reported, however, that by 2010 \"DOD officials predicted EELV program costs would increase at an unsustainable rate\" due to possible instabilities in the launch industrial base and the inefficient buying practice of purchasing one launch vehicle at a time. In 2009, SpaceX, a new entrant to the space launch industrial base, became the first private company to successfully develop a liquid fuel rocket that delivered a commercial satellite to orbit. However, SpaceX was not certified to compete for national security missions until 2005. In response, DOD recognized a need to again reorganize the way it acquired launch services. Additional studies and internal reviews evaluated alternatives to the EELV business model, which in turn led to a new EELV acquisition strategy adopted in November 2011. The new acquisition strategy advocated a steady launch vehicle production rate. This production rate was designed to provide economic benefits to the government through larger buys, or block-buys, of launch vehicles, providing a predictable production schedule to stabilize the space launch industrial base. The new EELV acquisition strategy also announced the government's intent to renew competition in the program. In addition to revising its acquisition strategy, DOD undertook significant efforts to obtain greater insight into ULA program costs in advance of contract negotiations. In May 2011, DOD solicited a Request for Information to prospective launch providers. In March 2012, DOD issued a sole-source solicitation for the block-buy to ULA, and in April 2012, the EELV program incurred a critical Nunn-McCurdy cost breach. In December 2013, DOD followed through on its new EELV strategy, signing a contract modification with ULA committing the government to buy 35 launch vehicle booster cores over a five-year period, along with the associated infrastructure capability to launch them. DOD viewed this contract modification as a significant effort on its part to negotiate better launch prices through improved knowledge of ULA contractor costs. DOD officials expected the new contract to realize significant savings, primarily through stable unit pricing for all launch vehicles. However, some in Congress, and some analysts outside government, strongly disputed the DOD estimates of cost savings. DOD announced that it would add up to 14 additional NSS launches to broader competition. However, in the FY2015 budget request, the Air Force announced that the number of EELV launches open to broader competition through FY2017 would be reduced from 14 to 7. Some Members of Congress, and SpaceX officials, raised questions about how many launches would ultimately be openly competed. Perhaps resulting from turmoil associated with the Nunn-McCurdy cost breach, as well as the perceived instabilities mentioned above, the EELV acquisition strategy proceeded to a three-phased approach: Phase 1 (FY2013-FY2019) would consist of the sole-source block-buy awarded to ULA to procure up to 36 cores and to provide 7 years of NSS launch infrastructure capability. Phase 1A (FY2015-FY2017) emerged as a modification to Phase 1 that would consist of opening up competition for NSS launches to new space launch entrants (such as SpaceX). The Air Force said it could award up to 14 cores to a new entrant over 3 years, if a new entrant became certified. Phase 2 (FY2018-FY2022) envisioned full competition among all launch service providers. The operational requirements, budget, and potential for competition are currently being worked on. Phase 3 (FY2023-FY2030) envisioned full competition with the award of any or all required launch services to any certified provider. The Air Force's strategy appeared to fulfill the mandates to maintain assured access to space and introduce competition into the space launch market. To date, the NSSL program has launched more than 70 successful missions in support of the Air Force, the National Reconnaissance Office, and the U.S. Navy. ULA's Delta IV and Atlas V launch vehicles (which are older than the NNSL program) have performed over 90 consecutive successful missions, whereas SpaceX has performed five successful NSS launches. Several interrelated factors created uncertainty over the Air Force's ability to continue with the three-phased EELV acquisition strategy. These included ongoing concerns over program and launch costs, U.S. national security vulnerability from dependence on a Russian component in the EELV program (the RD-180 main engine), legal challenges to the acquisition strategy, and legislation that could change the EELV program. In March 2012, the EELV program reported two critical Nunn-McCurdy unit cost breaches, which resulted in a reassessment of the program. The cost of the newly restructured program was estimated by GAO in March 2013 at $69.6 billion. This amount represented an increase of $34.6 billion, or about 100%, over the program's estimated cost of $35 billion from a year earlier. GAO identified several causes for this cost growth, including an extension of the program's life cycle from 2020 to 2030, an increase of the planned number of launch vehicles to be procured from 91 to 150 (an increase of 59%), the inherently unstable nature of demand for launch services, and instability in the industrial base. These causes related to changes in the scope of the program and reflected the industrial-base conditions under which the program was being undertaken; they did not appear to imply poor performance by the Air Force or the industry in executing the program. Even so, the overall increase in estimated program costs complicated the Air Force's challenge in funding the program within available resources without reducing funding for other program priorities. It also contributed to focusing attention on modifying their EELV acquisition strategy. In addition, the costs of individual launches themselves came under renewed scrutiny. SpaceX and others asserted that the launch costs charged by ULA were significantly higher than what SpaceX would charge the U.S. government once it was certified by the Air Force to conduct NSS launches. Part of the challenge in verifying these claims, however, is that much of the detailed cost data are proprietary, not readily comparable, and some are speculative to the extent that there is little empirical data on which those costs are provided. Although the Air Force, GAO, ULA, and SpaceX have provided some launch cost data, it is not apparent the data are directly comparable or are calculated using the same cost model assumptions. In addition, because SpaceX has limited data directly related to NSS launches, its cost figures are not likely based on a long history of actual cost, performance, and reliability. Thus, the issue of reliable and consistent cost data for comparative purposes has been a source of frustration for many in Congress. The original impetus for licensing the Russian RD-180 as the main engine for the Atlas V launch vehicle grew out of concerns associated with the 1991 collapse of the Soviet Union. At the time, the CIA and others expressed serious concern about the potential export and proliferation of Russian scientific and missile expertise to countries hostile to U.S. interests. These concerns in turn spurred a U.S.-Russian partnership to acquire some of Russia's heavy lift rocket engine capabilities, thus expanding upon existing Cold War civil space cooperation. Initially, this took the form of a license agreement between Energomash NPO and RD Amross (of Palm Beach, FL) for the coproduction of the RD-180 engine as part of the EELV acquisition strategy. This later changed in an acquisition revision to simply purchase and stockpile roughly two years' worth of the engines for the Atlas V, an approach that was then viewed as highly cost-competitive. The existing license agreement for purchasing RD-180 engines extends to 2022. In subsequent years, some Members of Congress and policy experts occasionally expressed concern over the potential vulnerability of the EELV program based on reliance on a single critical Russian component. For instance, the FY2005 defense authorization act ( P.L. 108-375 , Â§912) directed DOD to examine future space launch requirements. The resulting 2006 RAND study concluded that \"the use of the Russian-manufactured RD-180 engines in the Atlas V common core is a major policy issue that must be addressed in the near term.\" Similar concern was noted by GAO in 2011: \"the EELV program is dependent on Russian RD-180 engines for its Atlas line of launch vehicles, which according to the Launch Enterprise Transformation Study, is a significant concern for policymakers.\" In the FY2013 defense authorization act ( P.L. 112-239 , Â§916), Congress directed DOD to undertake an \"independent assessment of the national security implications of continuing to use foreign component and propulsion systems for the launch vehicles under the evolved expendable launch vehicle program.\" None of these concerns, however, led the Air Force to change its EELV acquisition strategy or to seek a change in legislation governing that strategy. After Russian incursions in Ukraine triggered U.S. sanctions in 2014, Russian backlash against those sanctions heightened alarm over the potential vulnerability of the EELV program and catalyzed the desire for change. In March 2014, the United States imposed sanctions on various Russian entities and persons, including Deputy Prime Minister Dimitry Rogozin, the official overseeing export licenses for the RD-180 rocket engine. In retaliation, Rogozin announced that \"we can no longer deliver these engines to the United States unless we receive guarantees that our engines are used only for launching civilian payloads.\" Precise details of what Rogozin meant, and whether any changes would be implemented, were unclear. Many observers in the United States were increasingly concerned, however, that Russia could suddenly ban all exports of the engine to the United States, or ban exports for military use to some degree. To many outside of the Air Force and ULA, that uncertainty raised serious questions about the longer-term viability of the EELV program, and pointed to a need to completely shed U.S. reliance on the RD-180 as soon as practicable. Congress has since taken steps in each of the past several defense authorization bills (described below) to end this reliance and develop an alternative, domestic-produced U.S. main engine. Although the Air Force committed in principle to this ultimate outcome, some in Congress questioned if Air Force efforts were proceeding at an acceptable pace. As the Air Force pursues the congressional mandates to eliminate dependence on the RD-180 engine and continue to transition to a truly competitive launch market, it foresees major challenges. These include ULA's recent retirement of the Delta IV Medium in August 2019, the fact that SpaceX is currently the only other space launch provider awarded NSS mission requirements, and restrictions on acquisition of the RD-180 engine during this interim period that affect the Atlas V launch schedules. In spring 2014, DOD formed a commission to bring together various experts to examine the risks, costs, and options for dealing with the potential loss of the Russian RD-180 rocket engine in the EELV program. The 2014 Mitchell Commission recommended accelerating purchases of the RD-180 under the existing licensing agreement to preserve the EELV Phase 1 block-buy schedule and to facilitate competition in Phases 1A and Phase 2. The commission did not recommend coproducing the RD-180 in the United States, but instead recommended spending $141 million to begin development of a new U.S. liquid rocket engine to be available by 2022, to coincide with the end of Phase 2 in the EELV acquisition strategy. Congress has remained supportive of sustaining current space access capabilities while working toward developing a U.S.-made main rocket engine to replace the RD-180. The FY2015 NDAA permitted ULA to use RD-180 Russian engines purchased before Russia's intervention in Ukraine for continued national security space launch missions if the Secretary of Defense determined it was in the national security interest of the United States to do so. The FY2016 NDAA increased this number to nine RD-180s in order to help maintain competitors in the NSS launch market for a longer period, while the market transitions away from the RD-180 and toward a new domestic-produced rocket engine. The FY2017 NDAA increased the number of the Russian RD-180 rocket engines authorized to be used to a total of 18 rocket engines, beginning with the enactment of the FY2017 NDAA and ending on December 31, 2022. The defense bills since the FY2017 NDAA have not amended the total number of Russian RD-180 rocket engines authorized to be used. The Air Force identified four main priorities in NSSL: mission success, innovative mission assurance, transitioning to new launch vehicles, and assured access for future space architectures. DOD expects to achieve cost saving through acquisitions and operability improvements that consist of the use of common components and infrastructure, standard payload interfaces, standardized launch pads, and reducing on-pad processing. To improve acquisitions, the program offers block buys of launch vehicles and competition between certified providers. The competitions are accomplished through two contract vehicles: Launch Service Agreements (LSA) and Launch Service Procurement (LSP) awards: Launch Service Agreement (LSA) awards are a set of three Air Force RDT&E awards intended to facilitate the development of three domestic launch system prototypes. DOD awarded LSA's to ULA, Northrop Grumman, and Blue Origin in October 2018. Launch Service Procurement (LSP) is an ongoing procurement competition that is currently in Phase 2. The second phase is a 5-year procurement of approximately 34 launches starting in 2022. The Air Force plans to select two space launch providers in 2020. United Launch Alliance, Northrop Grumman, SpaceX, and Blue Origin have submitted bids for phase two, with each company proposing their rocket designs: Vulcan, OmegA, Falcon, and New Glenn, respectively. The two companies selected will share the NSSL notional manifest for the next five years. Phase 1 and Phase 1A awards were made to ULA and SpaceX. DOD has identified 18 active contracts for the NSSL program with obligations awarded to six companies (see Figure 1 ). ULA and SpaceX are currently the only space launch providers certified to launch NSS payloads into orbit. The main focus for ULA is on developing a next-generation launch vehicle called the Vulcan. In July 2014, ULA signed commercial contracts with multiple U.S. liquid rocket engine manufacturing companies to investigate next-generation engine concepts. ULA selected Blue Origin (Kent, WA) BE-4 engine to power its Vulcan launch vehicle. Although there are important differences in how to achieve it, widespread support appears to exist across the space community and within Congress for the NSS requirement for robust competition and assured access to space. The recurring challenge since the start of the NSSL program has been how best to pursue this requirement while driving down costs through competition and ensuring launch reliability and performance. The Air Force decision of down-selecting no more than two launch providers and award two separate Launch Service Procurement (LSP) contracts in the summer of 2020 is not without potential implications and could have second- and third-order effects. Congress may consider the following: Directing the Air Force to provide a report on the cost-benefit analysis of selecting more than two launch providers. Drafting legislative in the NDAA for FY2021 authorizing additional funds that allows the Air Force to diversify its launch provider options by continuing to provide development funds through LSA awards to launch companies not selected for LSP contracts in Phase 2. Directing the Air Force to provide a report on the cost saving and associated risk using both reusable and expendable launch vehicles for future solicitations. Lastly, efforts to transition away from the RD-180 to a domestic U.S. alternative engine or launch vehicle are not without technical, program, or schedule risks. Even with a smooth, on-schedule transition away from the RD-180 to an alternative engine or launch vehicle, the performance and reliability record achieved with the RD-180 to date would likely not be replicated until well beyond 2030 because the RD-180 has approximately 81 consecutive successful civil, commercial, and NSS launches since 2000.", "summary": "The United States is making significant efforts to pursue a strategy that ensures continued access to space for national security missions. The current strategy is embodied in the National Security Space Launch (NSSL) program. The NSSL supersedes the Evolved Expendable Launch Vehicle (EELV) program, which started in 1995 to ensure that National Security Space (NSS) launches were affordable and reliable. For the same reasons, policymakers provide oversight for the current NSSL program and encourage competition, as there was only one provider for launch services from 2006 to 2013. Moreover, Congress now requires DOD to consider both reusable and expendable launch vehicles for solicitations after March 1, 2019. To date, only expendable, or single-use, launch vehicles have been used for NSSL missions. The NSSL program is the primary provider for NSS launches. Factors that prompted the initial EELV effort in 1995 are still manifestâsignificant increases in launch costs and concerns over procurement and competition. In addition, the Russian backlash over the 2014 U.S. sanctions against Russian actions in Ukraine exacerbated a long-standing undercurrent of concern over U.S. reliance on a Russian rocket engine (RD-180) for critical national security space launches. Moreover, significant overall program cost increases and unresolved questions over individual launch costs, along with legal challenges to the Air Force rocket development and launch procurement contract awards, have resulted in legislative action. In 2015, the Air Force began taking steps to transition from reliance on the Russian made RD-180 engine used on the Atlas V rocket. Some in Congress pressed for a more flexible transition to replace the RD-180 that allowed for development of a new launch vehicle, while others in Congress sought legislation that would move the transition process forward more quickly with a focus on developing an alternative U.S. rocket engine. Transitioning away from the RD-180 to a domestic U.S. alternative provided opportunities for space launch companies that sought to compete for NSS space launches. Because of the technical, program, and schedule risk, as a worst-case scenario, the transition could leave the United States in a situation in which some of its national security space payloads lack an available certified launcher. The Space and Missile System Center (SMC), together with the National Reconnaissance Office (NRO), released a request for proposals in May 2019 to award two domestic launch service contracts. DOD plans to select two separate space launch companies in the summer of 2020 that will be responsible for launching U.S. military and intelligence satellites through 2027. NSS launch has been a leading legislative priority in the defense bills over the past few years and may continue to be so into the future.", "document_type": "crs"}
{"report": "Congress maintains an ongoing interest in the pace of U.S. innovation and technological advancement due to its influence on the economy, national security, public health, and other national goals. Historically, the federal government has played a significant role in supporting research and development (R&D)âespecially basic researchâthat has led to scientific breakthroughs and new technologies. The global landscape for innovation is rapidly evolvingâthe pace of innovation has increased and the composition of R&D funding has changed (i.e., private R&D investments are larger than public R&D investments and the U.S. share of global R&D has declined). These changes have led some to call for new approaches and the expansion of existing mechanisms to help the United States maintain its leadership role in innovation and technology. One mechanism that has received some attention is the possibility of establishing additional agency-related entities that would facilitate the use of private donations in federally generated research projects. In addition, such entities might play a role in the commercialization of new technologies. The potential establishment of such entities in statute raises several questions: What kinds of organizations has Congress established in the past to address similar needs in the federal government? What are the strengths and weaknesses of these potential models? What are the opportunities and risks of developing a new entity for federal R&D using one of these models? The varied organizational arrangements of the executive branch have resulted from more than two centuries of legislative and administrative actions. These arrangements reflect a diversity of viewpoints, policy preferences, and political goals among the thousands of elected and appointed officials who have played a role in creating and shaping them. During the middle of the 20 th century, hybrid organizational formsâincorporating both public and private characteristicsâbegan to grow in number. These organizational forms, sometimes collectively referred to as \"quasi-governmental entities,\" differ from one another in their specific features, relationship to the federal government, funding mechanisms, purposes, levels of accountability to elected officials, and use of private sector incentives and efficiencies, among other characteristics. Agency-related nonprofit research foundations and corporations fall into this category of organizations. Working with successive administrations, Congress has established, or provided for the establishment of, many quasi-governmental entities. Some of the considerations that contributed to their creation and development were linked to political and policymaking dynamics that were idiosyncratic to the specific time and issue at hand. Nonetheless, observers have identified some common purposes for, and expected benefits of, establishing such entities: providing for stable funding during federal budget tightening and uncertainty; freeing a program from general government management laws, particularly those pertaining to caps on personnel and compensation; harnessing business principles and mechanisms with the aim of providing government-driven solutions without the \"red tape\" associated with the federal bureaucracy; and providing authorities tailored to the desired mission and functions that allow flexible approaches not typically allowed under statutes or regulations, such as those in the area of financial management. In comparison to traditional government agencies, quasi-governmental entities of various kinds have been touted for their potential to harness business-like entrepreneurial incentives and drive, greater managerial flexibility, and increased employee input in decisionmaking to better carry out the entity's responsibilities. As quasi-governmental organizations have grown in number and variety, some observers have criticized the exemption from government management laws of many such entities. A complex legal framework has been established over time to guide government agencies so that their actions adhere to the values of democratic governance, such as accountability, transparency, and fairness. It might be difficult for stakeholders to verify on an ongoing basis that the activities of a quasi-governmental entity, established by statute and vested with the power to carry out some public purpose, are directed to the public good rather than private gain without the routine accountability and transparency provided by this legal framework. Many of these laws and regulations specify the processes by which action must be taken. Some have criticized such governmental processes as \"red tape,\" particularly in cases where they appear to have been applied overzealously, slowly, or seemingly without regard for an individual's or business's need for a service or flexibility. Arguably, quasi-governmental entities involve a tradeoff: What appears to some to be red tape during an administrative encounter may appear to others to be an essential accountability or transparency mechanism. Most federal agencies are funded through the annual appropriations process, and Congress has sometimes used the \"power of the purse\" to influence agency priorities and activities. Most federal agencies are headed by appointees of the President subject to Senate advice and consent, and the confirmation process provides Senators with an opportunity to discuss agency issues and concerns with these leaders. Congress establishes, or provides for the establishment of, quasi-governmental entities, but it might not have the same level of influence over them as it does over conventional federal agencies. Congressional committees have reviewed the actions and structure of some of these entities during oversight hearings, and Congress has sometimes enacted changes to their enabling statutes. At the same time, many quasi-governmental entities do not receive appropriated funds and are not led by advice and consent appointees, shielding them from two potential avenues of congressional influence. In addition to criticisms related to oversight, accountability, and transparency, some have questioned whether private sector management techniques are always appropriate for managing government functions. Most public administration scholars have agreed that public enterprises can benefit from some general management mechanisms developed in the private sector. Some scholars have argued, however, that the blanket application of private sector management assumptions to the public sector might miss important differences between the two. These differences include, for example, the role of constitutional law. As one public administration scholar stated, \"although politicians, reformers, and media pundits often call for running government like a business, constitutional law makes the public's business very different from others.\" Some observers also have noted differences in the \"bottom line\" of the two sectors, and the consequent complexity associated with measuring performance in accomplishing a public purpose. This report discusses a specific category of quasi-governmental entities: agency-related nonprofit organizations that have been established in statute for the express purpose of advancing or facilitating the R&D mission of a federal agency. It describes the characteristics of several illustrative organizations of this type. It examines the available record of these entities' performances and discusses related praise and criticism of these organizational arrangements. Finally, the report identifies potential issues for consideration related to oversight of existing quasi-governmental R&D support organizations as well as potential issues for consideration should Congress elect to establish similar organizations. Congress has created a number of agency-related nonprofit research foundations and corporations to advance the R&D needs of the federal government and to overcome perceived barriers associated with federal agencies' ability to partner or otherwise engage with industry, academia, and other entities. The stated goals and potential benefits of these quasi-governmental R&D support organizations are that they may: provide a flexible and efficient mechanism for establishing public-private R&D partnerships (see the box, \"What Are Public-Private Partnerships?\" for more information); enable the solicitation, acceptance, and use of private donations to supplement the work performed with federal R&D funds; increase technology transfer and the commercialization of federally funded R&D; improve the ability of federal agencies to attract and retain scientific talent, including through the use of fellowships, personnel exchanges, and endowed positions; and enhance public education and awareness regarding the role and value of federal R&D. The following sections provide a brief overview of the purpose and intent, governance structure, and federal funding of selected congressionally mandated, federal agency-related nonprofit research foundations and corporations. The foundations discussed include those connected with the work of the National Institutes of Health (NIH), the Centers for Disease Control and Prevention (CDC), the U.S. Food and Drug Administration (FDA), the U.S. Department of Agriculture (USDA), and the Uniformed Services University of the Health Sciences (USU). Nonprofit research and education corporations associated with the work of the Department of Veterans Affairs (VA) are also discussed. All the foundations discussed have been funded through a combination of public and private monies and foster public-private R&D partnerships. However, the level of public support received by the foundations differs, as do the composition and appointment of their governing boards. Federal agencies and Congress have also initiated the creation of other organizations and entities to advance the R&D needs of federal agencies. Federally initiated venture capital firms and strategic investment initiatives, including In-Q-Tel, are often mentioned as an effective model. See the Appendix , \"Federally Initiated and Funded Venture Capital Firms,\" for more information and illustrative examples of such organizations. In 1990, Congress directed the Secretary of Health and Human Services (HHS) to establish a nonprofit corporationâthe National Foundation for Biomedical Research, which is now known as the Foundation for the National Institutes of Health (FNIH). Initially, the foundation was tasked with attracting and retaining internationally known scientists to NIH \"by offering competitive support for salaries, equipment, and space\" through privately funded endowed positions. In 1993, Congress broadened the purpose of the foundation to include \"support [for] the National Institutes of Health in its mission, and to advance collaboration with biomedical researchers from universities, industry, and nonprofit organizations.\" According to FNIH, the foundation creates public-private partnerships and alliances to advance breakthrough biomedical discoveries that can change and improve the quality of people's lives. FNIH raises funds, provides scientific expertise, and administers research programs to address a wide range of health challenges in support of NIH's mission. FNIH also supports the training of new researchers, supports patient programs, and organizes health-related educational events and symposia. One example of an FNIH-initiated project is the Biomarkers Consortium. FNIH manages the consortiumâconsisting of 32 companies, 15 nonprofit organizations, NIH, and FDAâwith the goal of increasing the identification, development, and regulatory approval of biomarkers to support and improve drug development, preventative medicine, and medical diagnostics. In 2018, FDA approved the use of a new biomarkerâsupported by the consortiumâthat is expected to improve the detection of kidney injury in healthy volunteers participating in clinical drug trials. FNIH's governance structure and powers are specified in its organic act and bylaws. FNIH is governed by a board of directors composed of non-voting, ex officio members and voting, appointed members with day-to-day operations overseen by an executive director. Congress designated certain Members of Congress and federal officials as ex officio board members and tasked them with appointing the initial members of the board from a list of candidates provided by the National Academy of Sciences. According to FNIH's bylaws, the number of appointed board members must be at least 6 and no more than 32; the term of an appointed member is 3 to 5 years; there is no limit on the number of terms an appointed member may serve; and any vacancies in the membership of the board shall be filled through election by the board. Congress empowered the board to establish bylaws to govern the general operations of the foundation, including policies for the acceptance, solicitation, and disposition of donations and grants. It also required the board to ensure that the bylaws do not compromise, appear to compromise, or reflect unfavorably on NIH and the ability of NIH to fulfill its responsibilities to the public. Furthermore, Congress made the board of directors accountable for \"the integrity of the operations of the Foundation\" through the development and enforcement of standards of conduct, financial disclosure statements, and conflict of interest policies and procedures. FNIH operations and activities have been funded through a combination of private donations and a share of NIH appropriations. According to FNIH, since its initial incorporation in 1996, the foundation has raised more than $1 billion in support of NIH's mission. According to tax filings, FNIH provided NIH with $22.6 million in assistance in 2017 and $16.9 million in 2016. Congress authorized the Director of NIH to \"provide facilities, utilities and support services to the Foundation if it is determined by the Director to be advantageous to the research programs of the National Institutes of Health\" and to transfer no less than $500,000 and no more than $1.25 million of the agency's annual appropriations to FNIH. Between FY2015 and FY2019, NIH transferred between $1 million and $1.25 million annually to FNIH for administrative and operational expenses (less than 0.01% of NIH's annual budget). In the President's FY2020 budget, NIH requested $1.1 million for this purpose. Additionally, since FY2008, FNIH has received $602,803 in federal grants, contracts, and other financial assistance. In 1992, Congress authorized the establishment of the National Foundation for the Centers for Disease Control and Prevention (CDC Foundation) to \"support and carry out activities for the prevention and control of diseases, disorders, injuries, and disabilities, and for promotion of public health.\" A House committee report stated: In the midst of budget restraint and personnel limitations, CDC itself is often strained to meet the basic demands of its mission. Efforts to experiment (some of which will necessarily fail), to do long-term planning, and to recruit and retain temporary staff are usually luxuries that the agency cannot afford, however productive they may ultimately be. The Committee has, therefore, undertaken to create a mechanism for the establishment of a private non-profit foundation to provide these innovative and supplementary activities in public health in association with the CDC. Once established, such a foundation could seek private support for these efforts from both individuals and organizations, and could bring charitable funds and flexibility to these goals. The CDC Foundation is authorized to support a number of activities, including using private funds to establish endowed positions at CDC; creating programs for state, local, and international public health officials to work and study at CDC; conducting forums for the exchange of public health information; and funding research and other public health studies. The foundation guidelines state that it: helps CDC pursue innovative ideas that might not be possible without the support of external partners.... CDC Foundation partnerships help CDC launch new programs, expand existing programs that show promise, or establish a proof of concept through a pilot project before scaling it up. In each partnership, external support gives CDC the flexibility to quickly and effectively connect with other experts, information and technology needed to address a public health challenge. For example, in 2018, the CDC Foundation used funding from the United Nation Children's Fund (UNICEF) to create a partnership between researchers from CDC, the Georgia Institute of Technology, and Micron Biomedical to develop a dissolving measles and rubella microneedle vaccination patch. While the current measles and rubella vaccination is effective, challenges associated with delivery of the vaccine that have impeded eradication efforts. For example, the vaccine must be refrigerated until it is injected, and it must be administered by a trained medical professional. The dissolving microneedle patch has the potential to overcome such challenges and improve vaccination coverage. The CDC Foundation's governance structure and powers are specified in statute and through the foundation's bylaws. The CDC Foundation is governed by a board of directors composed of appointed members and overseen by an executive director. Congress created a committee composed of representatives from the public health and nonprofit sectors to incorporate the foundation, to establish its general policies and initial bylaws, and to appoint the initial members of the board of directors. The term of service of a board member is five years, and any vacancies in the membership of the board are filled through appointment by the board. Congress tasked the CDC Director with serving as a liaison between the agency and the CDC Foundation, but did not designate the CDC Director as an ex officio member of the board. According to the CDC Foundation, such an arrangement guarantees that the foundation remains independent from CDC, while ensuring that the CDC Foundation's \"programs and activities have the greatest possible impact for CDC and public health.\" Additionally, Congress required the board of directors to establish bylaws and general policies for the foundation, including policies for ethical standards, the acceptance and disposition of donations, and the general operation of the foundation. Congress required that the bylaws not reflect unfavorably upon the ability of the foundation or CDC to carry out its responsibilities or official duties in a fair and objective manner; or compromise, or appear to compromise, the integrity of any governmental program or any officer or employee involved in such program. CDC Foundation operations and activities have been funded through a combination of private donations and a share of CDC appropriations. Since 1995, the CDC Foundation has raised more than $800 million in support of CDC and its mission. In both 2015 and 2016, the CDC Foundation transferred $5.6 million to CDC. Additionally, the CDC Foundation provided the agency with $38.5 million in noncash donations (e.g., insecticides and contraceptives in response to the Zika virus) over that same period. Congress authorized the CDC to provide the CDC Foundation with $1.25 million annually (roughly 0.02% of CDC's annual budget). According to the CDC Foundation's audited financial statements, CDC has provided the foundation with a $1.25 million for operating expenses each year since 2012. Additionally, since FY2008, the CDC Foundation has received $55.4 million in federal grants, contracts, and other financial assistance. In 2007, Congress established the Reagan-Udall Foundation for the Food and Drug Administration (Reagan-Udall Foundation) with the purpose of advancing FDA's mission \"to modernize medical, veterinary, food, food ingredient, and cosmetic product development, accelerate innovation, and enhance product safety.\" The duties of the Reagan-Udall Foundation include identifying unmet needs and supporting regulatory science research and other programs to improve the development, manufacture, and evaluation (including post-market evaluation) of FDA-regulated products. According to the Reagan-Udall Foundation, it accomplishes its tasks by establishing public-private research collaborations, ensuring new knowledge is in the public domain, allowing broad-based participation, training the next generation of regulatory scientists, and leveraging outside resources for its activities. In 2017, the Reagan-Udall Foundation launched the Innovation in Medical Evidence Development and Surveillance (IMEDS) program which provides FDA regulated industries, universities, and nonprofits with access to distributed electronic healthcare data that can be used to evaluate medical product safety and assess drug effectiveness. Thus far, IMEDS is the largest program supported and managed by the foundation. The governing structure, purposes, and powers of the Reagan-Udall Foundation are specified in the statute establishing the foundation and further defined by the foundation's bylaws. The Reagan-Udall Foundation is governed by a board of directors composed of appointed and ex officio members, including the FDA Commissioner and the Director of NIH. A board-appointed executive director oversees the day-to-day operations of the foundation. Congress directed federal officialsâFDA Commissioner, NIH Director, CDC Director, and the Director of the Agency for Healthcare Research and Qualityâto appoint the initial board members from candidates provided by the National Academy of Sciences, patient and consumer advocacy groups, professional scientific and medical societies, and industry trade organizations. Subsequent to these initial appointments, board vacancies are to be filled through appointment by the board. According to the foundation's bylaws, the board of directors shall be composed of no more than 17 appointed members, including no more than 5 members from the general pharmaceutical, device, food, cosmetic and biotechnology industries and at least 3 members from academic research organizations, 2 members representing patient or consumer advocacy organizations, and 1 member representing health care providers. Furthermore, Congress directed the board of directors to craft bylaws for the foundation, including establishing policies for ethical standards, conflicts of interest, the acceptance, solicitation, and disposition of donations and grants, carrying out memoranda of understanding and cooperative agreements, and for review and awarding of grants and contracts. As detailed in financial reports, the Reagan-Udall Foundation has raised or received nearly $21 million in support of the foundation since 2009, including grants, contributions, and funds transferred from FDA. Congress authorized FDA to provide the Reagan-Udall Foundation with between $500,000 and $1.25 million annually. FDA transferred $1.25 million to the Reagan-Udall Foundation in 2017 and $1 million in 2016 (less than 0.03% of FDA's annual budget). Additionally, since FY2008, the Reagan-Udall Foundation has received $1 million in federal grants, contracts, and other financial assistance. In 2014, Congress created the Foundation for Food and Agriculture Research (FFAR) to advance the research mission of the U.S. Department of Agriculture (USDA) by focusing on agricultural issues of national and international significance, including food security and safety. In establishing FFAR, Congress expressed the importance of American leadership in meeting the needs of a growing population, cited the difficulty associated with overcoming declining federal investments in agriculture research, and highlighted the potential role of the foundation in \"supplementing USDA's basic and applied research activities.\" According to the conference report: The Managers do not intend for the Foundation to be duplicative of current funding or research efforts, but rather to foster public-private partnerships among the agricultural research community, including federal agencies, academia, non-profit organizations, corporations and individual donors to identify and prioritize the most pressing needs facing agriculture. It is the Managers view that the Foundation will complement the work of USDA basic and applied research activities and further advance USDA's research mission. Furthermore, the Managers do not intend in any way for the Foundation's funding to offset or allow for a reduction in the appropriated dollars that go to agricultural research. FFAR is authorized to award grants, or enter into contracts, memoranda of understanding, or cooperative agreements with universities, industry, non-profits, USDA, or consortia, to \"efficiently and effectively advance the goals and priorities of the Foundation.\" It is required to identify unmet and emerging needs, facilitate technology transfer, and to coordinate its activities with those of USDA to minimize duplication and avoid potential conflicts with the department. The foundation currently supports research in six challenge areasâsoil health, sustainable water management, next generation crops, advanced animal systems, urban food systems, and the health-agriculture nexusâin addition to supporting graduate fellowships and early and mid-career awards for agricultural researchers. FFAR also supports strategic initiatives with the potential to further the foundation's mission. For example, in 2017, FFAR awarded researchers at the University of Illinois $15 million to expand their work in improving photosynthesis efficiency and crop yields to soybeans and other crops critical to food security in developing countries. FFAR's investment was matched by $30 million from the Bill and Melinda Gates Foundation and the United Kingdom Department for International Development. According to FFAR, public-private partnerships are generally funded through a competitive grants process or through direct contract; however, the foundation also uses prize competitions to encourage the development of new technologies. The governance structure of FFAR is specified in the statute establishing the foundation and further defined by the foundation's bylaws. FFAR is governed by a board of directors composed of appointed and ex officio members. The day-to-day operations of FFAR are overseen by an executive director, who is appointed by the board. Congress required the ex officio members of the boardâthe Secretary of Agriculture, the Under Secretary of Agriculture for Research, Education and Economics, the Administrator of the Agriculture Research Service, the Director of the National Institute of Food and Agriculture, and the Director of the National Science Foundationâto select the initial appointed board members from lists of candidates provided by the National Academy of Sciences and by industry. According to FFAR's bylaws, the board must consist of no less than 15 and no more than 21 appointed members; any vacancies in the membership of the board shall be filled through appointment by the board; a board member's term of service is 5 years; and a board member may be reappointed, but may not serve for more than 10 years. Additionally, Congress tasked the board of directors with crafting bylaws for the general operation of the foundation and with establishing ethical standards for the acceptance, solicitation, and disposition of donations and grants. Congress also required that the bylaws and policies of FFAR preserve the integrity of the foundation and USDA, including the development and enforcement of a conflict of interest policy. In addition to the board of directors, FFAR has established advisory councils for each of the foundation's challenge areas. According to FFAR, advisory council members provide board members and foundation staff with advice and recommendations on \"program development and implementation, potential partnerships and other matters of significance\" and represent a diverse set of industries, professional backgrounds, and geographic areas. FFAR activities and operations have been funded through a combination of public and private funds. Through the Agricultural Act of 2014 (), Congress provided FFAR with $200 million to enter into public-private partnerships and advanced agricultural research. However, federal funds can only be expended if the foundation secures matching funds from a non-federal source. In testimony before the Senate, the executive director of FFAR, Dr. Sally Rockey, stated: What we have discovered over the past two years is that we have two distinct advantages over other government-established research foundations. First is our public funding, which gives FFAR the flexibility to seek out diverse partnerships, especially with the private sector. Rather than raising money for a government agency, which is the model for most government established research foundations, FFAR leverages public fundingâmore than doubling that fundingâfor the public good and, in the process, develops a new community of partners. Second is our independence, which allows us to focus almost exclusively on results. When partners are focused just on the science and equally invested in seeing measurable outcomes as soon as possible, new partnerships may develop. In 2017, FFAR awarded 39 grants and $45.8 million in funding ($110.6 million when matching funds are included). In 2018, FFAR awarded 55 grants and $32.2 million in funding (more than $60 million when matching funds are included). USDA's Agricultural Research Service (ARS) was the recipient of three grants and $1.7 million in funding from FFAR ($3.6 million when matching funds are included) in 2018. In the Agriculture Improvement Act of 2018 ( P.L. 115-334 ), Congress directed the Secretary of Agriculture to transfer an additional $185 million to FFAR \"to leverage private funding, matched with federal dollars to support public agricultural research\"; however, these federal funds were not to be transferred until FFAR provided Congress with a strategic plan detailing how the foundation will become self-sustaining. Congress required the strategic plan to describe agricultural research opportunities and objectives identified by FFAR's advisory councils and approved by the board, and to provide transparency into the foundation's grant review and awards process. FFAR released the required strategic plan in 2019; the plan outlines several actions that the foundation will pursue to diversify its funding base, but also indicates that federal funds are a \"critical component of FFAR's model.\" In 1983, Congress created the Foundation for the Advancement of Military Medicineânow known as the Henry M. Jackson Foundation for the Advancement of Military Medicine (HJF)âto carry out and participate in cooperative medical research and education projects with the Uniformed Services University of the Health Sciences (USU). In describing the purpose and role of HJF, Congress stated: The Foundation will be a nonprofit, charitable corporation which will receive gifts, grants and legacies on behalf of both itself and the Uniformed Services Universityâ¦. [By] channeling private resources to the Uniformed Services University, the Foundation will help the University and military medicine maintain advanced scientific teaching and research. In addition, the Foundation will support the growing international role of the University in its cooperative research in other countries and in its programs with medical schools training military officers both here and abroad. In general, HJF implements its mandate by offering research support and services to USU and other military research centers and facilities, including proposal development, research program administration and management, regulatory compliance, technical staffing, and technology transfer assistance. P.L. 98-132 authorized HJF to enter into contracts with USU \"for the purposes of carrying out cooperative enterprises in medical research, medical consultation, and medical education, including contracts for the provision of such personnel and services as may be necessary to carry out such cooperative enterprises.\" According to HJF, more than 1,100 of HJF's employees participated in or supported collaborative research and education projects at USU in FY2018. For example, HJF entered into a license agreement from the USU-HJF Joint Office of Technology Transfer with Profectus BioSciences to develop a human vaccine for the Nipah virusâan infection that can lead to inflammation of the brain and respiratory illnessâbased on a technology created more than 15 years ago by a USU scientist. Specifically, HJF, USU, and Profectus are collaborating on the development of a clinical assay to evaluate the Nipah virus vaccine response. The collaborative research is supported, in part, by NIH. HJF is governed by a council of directors composed of appointed and ex officio members, including the chair and ranking members of the Senate and House Committees on Armed Services and the Dean of USU. The ex officio members are responsible for appointing the other members of the council of directors. In 2018, Congress increased the number of appointed members from four to six. A council-appointed executive director oversees the day-to-day operations of HJF. In 1986, Congress appropriated $10 million to HJF \"to support the purposes of the Foundation, its on-going educational and public services programs and to serve as a memorial to the late Senator Henry M. Jackson.\" However, HJF's revenue is generally derived from the administration of grants and contractsâHJF manages or administers grants and contracts on behalf of USU or other military research centers and collects indirect costs or overhead associated with the provided services. According to HJF, in FY2018, the foundation received $483.9 million in grants and contracts and expended $468.7 million on program services associated with research grants and contracts. According to USAspending.gov, since FY2008, HJF has received $6.1 billion in federal grants, contracts, and other financial assistance, primarily from the Department of Defense. In 1988, Congress authorized the Secretary of Veterans Affairs (VA) to establish a nonprofit corporation (NPC) at any of the VA medical centers \"to provide a flexible funding mechanism\" and facilitate the conduct of approved research. Congress extended the authority of NPCs in 1999 to include approved education and training activities (e.g., educational courses for patients and families and training for VA employees associated with new technologies or specialties). Congress also authorized any NPC to facilitate the conduct of approved research and education activities at more than one VA medical center (such NPCs are known as multi-medical center research corporations). In general, NPCs implement their mandate by providing research and management services to VA medical researchers conducting projects using non-VA funds. In describing the need for NPCs, Congress indicated that support for research from non-VA funding sources, including NIH, DOD, private foundations, and companies, benefited veteran patients, where existing mechanisms for administering non-VA funds had disadvantages. A committee report on the authorizing legislation stated: Funds that are channeled through affiliated medical schools [to VA medical centers] are subject to the terms and conditions which the school applies to funds obtained by researchers employed by the school. In many cases, this means that a percentage, which varies from 15 to 40 percent or more, of the funds obtained is retained by the medical school for \"overhead\" and related expenses of the school. In contrast, by authorizing NPCs to accept, administer, retain, and spend non-VA research funding on behalf of VA investigators, indirect costs or overhead derived from such funds could be applied to the VA medical center. According to the U.S. Government Accountability Office (GAO): Nonprofit corporations support VA's research environment by funding a portion of the department's research needs, such as laboratory equipment and improvements to infrastructure, and by providing flexible personnel and contracting arrangements to respond to investigators' needs. The governance structure of NPCs is specified in the statute providing the authority for their establishment and further defined by VA procedures and instructions. Each NPC is governed by a board of directors with its day-to-day operations overseen by an executive director. The VA Secretary is responsible for appointing all members of an NPC's board of directors. Each board of directors must include the director of the VA medical center, the chief of staff, and associate chief(s) of staff of the medical centerâall acting within their official capacitiesâand two non-federal members. Additionally, the board of directors of a multi-medical research corporation must include the director of each of the VA medical centers served by the NPC. The executive director of an NPC is appointed by its board of directors with the concurrence of the VA Under Secretary of Health. Congress placed NPCs under the jurisdiction of VA's Inspector General; required each NPC to conduct regular audits and provide an annual statement of operations, activities, and accomplishments to VA; and made all NPC employees, including members of the board of directors, subject to conflict of interest policies adopted by the NPC. Additionally, VA conducts oversight of NPCs through the agency's Nonprofit Program Oversight Board (NPOB), the Nonprofit Program Office (NPPO), and the Veteran Health Administration's Chief Financial Officer (VHA CFO). Specifically: The NPOB is VA's senior management oversight body for NPCs. It reviews the activities of NPCs to ensure they are consistent with VA policies and makes recommendations to the VA Secretary (through the Under Secretary of Health) regarding any changes in NPC policy. The NPPO serves as a liaison between VHA and the NPCs. It provides oversight, guidance, and education to the NPCs to ensure compliance with VA policies and regulations, conducts triennial reviews of NPCs, compiles NPC data for an annual report to Congress, and ensures any corrective measures are implemented. The VHA CFO provides financial oversight of NPCs. There are currently 83 NPCs located in 42 states, Puerto Rico, and the District of Columbia. According to VA, in 2017, NPCs generated $261 million in revenueâspending 84% on research, 15% on administrative overhead, and 1% on education related activities. VA describes NPCs as \"self-sustainingâ¦. [F]unds are not received into a government account. No appropriation is required to support these activities.\" However, approximately 70% of the revenue generated by NPCs in 2017 ($183 million) was from federal sourcesâprimarily NIH and DOD grants and contracts. VA states that from 2008 to 2017 NPCs contributed $2.2 billion to VA research. In 2018, NPCs generated $236 million in revenues. In an April 2019 report, the National Institute of Standards and Technology described benefits that might be realized if Congress provided all federal R&D agencies with the authority to establish agency-related nonprofit research foundations. For example, they can actively seek \"gifts and other monetary donations from private donors and organizations,\" and they \"have facilitated technology commercialization and generated revenue to reinvest in R&D.\" In addition, while government agencies are, with certain exceptions, subject to management laws designed to ensure accountability, transparency, and fairness, agency-related foundations may be exempt from them. Such exemptions may facilitate flexibility, but they may also make it difficult for stakeholders to verify on an ongoing basis that the foundation's activities are directed to the public good rather than private gain. Prior to extending the authority to establish agency-related nonprofit research foundations and corporations to additional federal agencies and laboratories there are a number of issues that Congress might consider. The following sections examine some of these issues, including transparency, independence, and effectiveness. To date, most federal agencies with affiliated nonprofit research foundations or corporations work in the area of medicine and public healthâan area where public trust is considered essential. The conflict of interest policies of affiliated nonprofit research foundations and corporations vary. For example, all HJF employees are required to submit annual conflict disclosure and certification forms; under its cooperative agreement with the CDC, the CDC Foundation is required to conduct a conflict of interest review prior to accepting a gift for the CDC from a potential donor; and VA employees serving as NPC directors are subject to federal conflict of interest laws and regulations. Recent media reports and investigations have nevertheless raised concerns about conflicts of interest and the potential for undue industry influence in public-private R&D partnerships formed and managed by agency-related nonprofit foundations. According to some, industry involvement in R&D partnerships has the potential to erode public trust and confidence in federal agency decisionmaking, which may be based, in part, on the results of R&D supported by the public-private partnership. Others assert that issues associated with conflict of interest are overstated and rare, that other biasesâbeyond financial tiesâalso influence research, and that policy responses to such concerns have been overly burdensome and are impeding the translation of R&D into new products and technologies. Three recent examples illustrate these conflict of interest and undue influence concerns. In 2015 and 2016, reporting by ESPN and others alleged that the National Football League (NFL) attempted to influence the selection of a grant recipient by NIH for a study on aÂ degenerative brain disease known as CTE, or chronic traumatic encephalopathy. NIH had planned to fund the CTE study from a $30 million NFL donation to NIH through FNIH. Democratic committee staff of the House Committee on Energy and Commerce launched an investigation of the allegations and issued a report in May 2016. The report stated: Democratic Committee staff received evidence to support the allegations that the NFL inappropriately attempted to influence the selection of NIH research applicants funded by the NFL's $30 million donation to NIHâ¦. Despite the NFL's attempts to influence the selection of research applicants, the integrity of the peer review process was preserved and funding decisions were made solely based on the merit of the research applications. The report included findings and recommendations directed at FNIH and its role in the creation and management of R&D partnerships between NIH and the private sector. Specifically, the investigation found that \"FNIH did not adequately fulfill its role of serving as an intermediary between NIH and the NFL\" and recommended the following actions: FNIH must establish clearer guidelines regarding donor communications with NIH. FNIH must come to a mutual understanding with donors at the beginning of the process regarding their degree of influence over the research they are funding and remind donors that NIH policy prohibits them from exerting influence at any point in the grant decision-making process. FNIH should provide donors with the clear, unambiguous language from the NIH Policy Manual, which states that a donor may not dictate terms that include \"any delegation of NIH's inherently governmental responsibilities or decision-making,\" or \"participation in peer review or otherwise exert real or potential influence in grant or contract decision-making.\" NIH and FNIH should jointly develop a process to address concerns about donors acting improperly. FNIH issued the following statement in response to the report: The FNIH acted appropriately, with integrity and transparency, in fulfilling its mandate under SHRP [Sports and Health Research Program]. As acknowledged by the Democratic Staff report, the governing documents among the FNIH, NIH and NFL made clear that the NIH had exclusive control over the scientific and administrative aspects of the program. The report makes recommendations regarding communication issues that the FNIH has already identified and taken steps to address. The FNIH has strengthened protocols around communications among NIH, NIH researchers and FNIH donors that will prevent unauthorized contact among parties. The FNIH has had a long history of successful and productive public-private partnerships in support of the NIH mission. These adjustments to governing agreements will help ensure the success of future scientific partnerships in support of human health. On September 15, 2016, four Republican members of the House Committee on Energy and Commerce sent a letter to the Inspector General of the Department of Health and Human Services related to the allegations of undue influence by the NFL. The letter stated: There appear to be important questions and concerns related to these events that have not been adequately vetted or addressedâ¦. This grant award has become the source of tremendous public debate and, therefore, clear answers and lessons are necessary. For these the reasons, the Committee refers this matter to your attention and requests a thorough and objective review by the Office of the Inspector General to assess whether the policies and procedures concerning public-private partnerships under the authority of FNIH were followed, and if not, what revisions or reforms should be considered. This will help SHRP, and other public-private partnerships, avoid similar distractions in the future so all parties can focus on what matters mostâthe science. In 2018, NIH was engaged with FNIH and potential donors, including pharmaceutical companies, regarding the development of a public-private partnership that would seek to address the opioid crisis. Potential conflicts of interest and ethical concerns were raised by both NIH and FNIH. The Director of NIH asked a working group of the Advisory Committee to the NIH Director (ACD) and the FNIH Board to examine the appropriateness of establishing a partnership between NIH, FNIH, and various pharmaceutical companies. On March 16, 2018, the FNIH Board held a meeting to discuss the possibility of forming such a partnership. The FNIH Board decided that an approach that relies disproportionately on input and financing from pharmaceutical companies is not appropriate in this circumstance. The FNIH is uncomfortable seeking or receiving monetary donations from any pharmaceutical company or industry representative at this time to support implementation of the research plan as presented. Doing so poses unacceptably high risk of public skepticism concerning the eventual scientific outcomes given the responsibility some companies may bear in having created the crisis. Also, it would likely undermine public confidence in the many other valuable public-private partnerships that the NIH and FNIH have created and will create to improve human health. The principal recommendation of the A CD working g roup was that \"to mitigate the risk of real or perceived conflict of interest, it would be preferable if only Federal funds were used to support the research efforts included in this public-private partnership.\" The working group also offered a number of recommendations if a public-private partnership were to be established, including that any industry funding should be provided without preconditions and in full, that NIH should publicly disclose its research plan for the partnership, and that the agency should clarify and define the governance structure associated with the collaboration. In April 2018, NIH launched the Helping to End Addiction Long-term (HEAL) Initiativeâan agency-wide \"effort to speed scientific solutions to stem the national opioid public health crisis.\" In a press release on the use of public-private partnerships as part of HEAL, the Director of NIH stated: I fully embrace [the ACD Working Group's] recommendation that NIH should vigorously address the national opioid crisis with government funds and decline cash contributions through partnerships from the private sector. It is clear, however, that the opioid crisis is beyond the scope of any one organization or sector. NIH and biopharmaceutical companies bring unique skills and assets to bear on this crisis. NIH will use the ACD guidance as we continue our discussions with biopharmaceutical organizations to advance focused medication development for addiction and painâ¦We agree with and appreciate the ACD's guidance to verify donated assets and tailor the governance structures for each initiative that may be pursued through public-private partnerships to ensure appropriate oversight and guidance. Any partnerships that NIH does establish with biopharmaceutical organizations as part of the HEAL Initiative will be done with the utmost transparency. Some have raised concerns regarding the ability of industry to influence CDC and FDA decisionmaking by way of donations to the CDC Foundation and Reagan-Udall Foundation. For example, some have questioned donations made by the Coca-Cola Company to the CDC Foundation for research and other activities associated with obesity and diet issues. In February, two members of Congress sent a letter asking the Department of Health and Human Services' Inspector General to \"investigate the relationship between the CDC and Coca-Cola outlined in this report [a 2019 paper by Hessari et al.], determine whether there is a broader pattern of inappropriate industry influence at the agency, and make recommendations to address this issue.\" In addition to managing conflicts of interest that may result from public-private partnerships facilitated by an agency-related nonprofit foundation, a 2016 report by a working group of the Advisory Committee to the CDC Director noted the need for clarity in managing conflict of interest between the nonprofit foundation and the federal agency itself. The working group pointed out that the CDC Foundation \"benefits financially from the grants it accepts and manages on the CDC's behalf,\" and noted that \"ongoing oversight and management transparency are essential components of a conflict-of-interest policy, particularly where, as here, one of the partners is an agency whose greatest asset is the confidence of the public in its impartiality and integrity.\" In response to concerns regarding conflict of interest and the potential for industry influence, in addition to the need to maintain public confidence in related decisionmaking, some have called for additional transparency in the development and management of public-private partnerships. These calls extend to agency-related nonprofit research foundations. For example, the Advisory Committee to the Director of the CDC recommended that the CDC should expect the CDC Foundation to provide the agency with a \"complete record of evidence\" and a \"fully reasoned analysis\" as to why a proposed public-private partnership would meet the agency's standards for entering into a private financial relationship. The advisory committee recommended that CDC only enter into a private financial relationship if the proposed project aligns with a stated CDC priority, the projected benefits to public health outweigh any potential risks to public trust in CDC, and the proposed project does not primarily benefit the private funder or position the private funder to exercise undue influence over CDC. Some have also called for the harmonization of policies, procedures, and standards used by federal agencies and agency-related nonprofit research foundations in the evaluation of proposed public-private partnerships and in addressing conflict of interest and undue influence concerns associated with such partnerships. In 2018, House appropriations report language directed both the CDC Foundation and FNIH to abide by existing reporting requirements and include in their respective annual reports the source and amount of all monetary gifts to the Foundation, as well as the source and description of all gifts of real or personal property. Each annual report shall disclose a specification of any restrictions on the purposes for which gifts to the Foundation may be used. The annual report shall not list \"anonymous\" as a source for any gift that includes a specification of any restrictions on the purpose for which the gift may be used. According to media reports, officials from FNIH and the CDC Foundation assert they are in compliance with existing disclosure requirements as outlined in their governing statutes and their annual reporting is similar to other nonprofit organizations. By design, quasi-governmental entities, including agency-related nonprofit research foundations and corporations, are independent from the federal government. Congress explicitly states in the statutes creating each of the organizations described above that the entity is \"not an agency or instrumentality of the United States.\" In addition, these entities generally are not controlled by federal officials. However, Congress also structured these organizations so they would be associated with and in some instances largely reliant on the federal agencies they were created to support. The degree of independence an agency-related nonprofit research foundation or corporation hasâand by extension the degree of congressional oversight and influenceâvaries (i.e., the more independent, the less opportunity for oversight and vice versa). This variability can be ascribed, in large part, to the primary function of the organization and the governance structure established by Congress. For example, the primary function of HJF and the VA NPCs is to provide research and grant management services to USU and VA medical researchers, respectively. These researchers are full- or part-time federal employees who are, in general, conducting approved research using federal funds from other agencies (NIH and DOD). The financial strength of these entities is thus closely tied to the ability of USU and VA researchers to compete successfully for NIH, DOD, and other research grants. Additionally, the boards governing HJF and VA NPCs include Members of Congress and federal officials. Specifically, the board of a VA NPC must include the director, chief of staff, and associate chief(s) of staff of the VA medical centerâall acting in their official capacitiesâand the board of HJF includes the chair and ranking members of the Senate and House Committees on Armed Services. These factors likely make HJF and VA NPCs less independent than some of the other agency-related nonprofit foundations described in this report. However, given their dependencyâin particular on other federal fundsâseveral questions arise: Why are these entities needed? Are there alternative mechanisms for administering research funds from other federal agencies? Should these entities be soliciting more private funds? Comparatively, FNIH, the CDC Foundation, and the Reagan-Udall Foundation likely have more autonomy given their primary function of raising funds from the private sector to benefit and advance the mission of their affiliated federal agencies. Nonetheless, the success of these entities requires some level of interconnectedness to ensure their efforts are closely aligned with the priorities and needs of the federal agencies they support. Additionally, FNIH, the CDC Foundation, and the Reagan-Udall Foundation all receive administrative and operating costs from their affiliated federal agencies, in addition to having federal officials as ex officio members of their boards. These factors likely provide the federal agencies with the ability to influence and shape the relationship. The use of federal funds in supporting the operating expenses of these entities also provides a mechanism for congressional oversight. FFAR's purpose to advance the research mission of USDA is similar to that of FNIH, the CDC Foundation, and the Reagan-Udall Foundation. However, the way in which FFAR executes its missionâprimarily as a grant-making organizationâmay offer more independence. Congress tasked FFAR with developing and pursuing an agricultural R&D agenda that minimizes the duplication of existing USDA efforts and is focused on unmet needs and emerging areas of national and international significance. Currently, FFAR executes its R&D agenda by leveraging federal funds with non-federal sources. The use of federal funds provides Congress with an effective oversight mechanism. Congressional intent, however, is for FFAR to become self-sufficient. In the Agriculture Improvement Act of 2018 ( P.L. 115-334 ), Congress made the transfer of federal funds contingent upon the development of a strategic plan detailing how FFAR will become self-sustaining. Opportunities for congressional oversight or influence may diminish as FFAR becomes self-sustaining. That being said, FFAR's strategic plan states: This strategic planning and sustainability exploration demonstrates that FFAR requires Congressional funding to remain relevant, viable, to maintain velocity, and increase impact toward conquering the food and agriculture challenges of this timeâ¦. In the event that public funding for FFAR diminishes, the Foundation would be severely limited in its ability to deliver on the ambition and scale of impact that Congress originally envisioned. In this scenario, FFAR's capacity to fund ambitious, potentially transformative research projects would be restricted. Indeed, stakeholders indicate that FFAR will find it much more challenging to bring partners to the table and mobilize private funding as its credibility and matching power will be weakened without the \"halo effect\" of its Congressional funding and mandate. FFAR's strategic plan also indicates that the foundation will increase the non-federal matching requirement for some projects, diversify its co-funders, develop an annual fundraising program, pursue fees for services, and expand the size and number of consortia as part of its sustainability plan. To date, the effectiveness of agency-affiliated nonprofit research foundations or corporations has not been formally assessed. In a 2002 report on the VA NPCs, GAO noted, \"VA headquarters has not evaluated nonprofit corporations to measure their effectiveness or compare their operations. This type of high-level oversight and evaluation is a critical element of success.\" It is also unclear what might constitute an appropriate measure of success: number of partnerships formed? amount of private funds raised? number of technologies commercialized? Some have arguedâbased on the amount of private funds raisedâthat the Reagan-Udall Foundation is not meeting expectations and is less successful than the CDC Foundation and FNIH. The Reagan-Udall Foundation has raised approximately $21 million over the last decade for FDA. In comparison, FNIH provided NIH with that amount in a single year ($22 million in 2017). Lower than expected fundraising efforts have led some to question the purpose and need for the Reagan-Udall Foundation. It is difficult to determine the degree to which the partnerships developed and managed by some of the agency-affiliated nonprofit research foundations would have occurred in the absence of such foundations. Federal agencies engage in public-private partnerships through other mechanisms, including cooperative research and development agreements, and while federal agencies are not permitted to solicit gifts from the private sector, many are authorized to accept donations. Report language in the Senate energy and water appropriations bill for FY2020 directs the Department of Energy (DOE) to contract with the National Academy of Public Administration for a study that would assess existing agency-affiliated nonprofit research foundations to assist Congress in evaluating the merits of creating a DOE-related nonprofit research foundation. House appropriators included similar language in their version of the energy and water appropriations bill, but directed DOE to undertake the review on its own. Congress established each of the agency-related nonprofit research foundations and corporations described in this report with the aim of advancing the R&D mission of the associated federal agency. While the way each organization pursues its mandate varies, three broad categories of activity emerge: (1) soliciting private funds to support R&D performed by federal scientists; (2) soliciting private funds (leveraged against federal funds in the case of FFAR) to support R&D performed by non-federal researchers; and (3) administering and managing research funds from federal and non-federal sources. These activities are often carried out as part of public-private R&D partnerships formed and managed by an agency-related nonprofit research foundation or corporation. While public-private partnerships are generally viewed as an effective mechanism for advancing the state of science and facilitating the transfer and commercialization of technologies to the marketplace, some say it is less clear whether agency-related nonprofit research foundations and corporations represent an effective model for the formation and management of such partnerships. Federal science agencies already have the authority to create partnerships, and many have the authority to accept gifts from individuals, nonprofits, and private sector firms in support of federal R&D and other agency activities. Federal agencies, however, are not permitted to solicit private funds, and many argue that the \"red tape\" associated with the establishment of public-private partnerships by federal agencies is a deterrent. This situation may cause some observers to raise the questionâwould a federal agency have achieved similar results in the absence of its agency-related nonprofit research foundation or corporation? While this question cannot be answered with any certainty, it does offer an opportunity for consideration of potential policy options. Among the options that Congress might consider are: crafting a broad, general nonprofit research foundation authority that federal science agencies could draw on to create an entity that meets their specific needs; examining the existing authorities of individual federal science agencies and, as appropriate, supplementing those authorities to increase the flexibility of an agency to enter into public-private partnerships; creating additional agency-related nonprofit research foundations on a case-by-case basis, tailored to the specific needs of particular federal science agencies; and maintaining the status quo, i.e., allowing agency-related nonprofit research foundations and corporations that currently exist to continue, and requiring other federal agencies to use their existing authorities to enter into public-private R&D partnerships and transfer federal technologies to the marketplace. If Congress decides to create additional agency-related nonprofit research foundations, clear articulation of purpose, role, and governance structure may be needed to maintain an appropriate balance between the flexibility associated with being a nongovernmental entity and the need for accountability, transparency, and public confidence in the results of R&D partnerships and other supported activities. Over the last two decades, federal agencies and Congress have established several venture capital (VC) firms. The intent of these firms, including In-Q-Tel (IQT), the Army Venture Capital Initiative (AVCI), and Red Planet Capital (RPC), has been to help ensure agency access to leading-edge technologies and input into technology development to address mission needs. Several factors have contributed to the initiation of these organizations: a long-term shift in the composition of U.S. research and development funding from the federal government to the private sector; the substantial role of small start-ups in driving innovation, especially in information technology; and expanded U.S. and global commercial market opportunities that have diminished the relative attractiveness of serving the federal government market. In-Q-Tel. The Central Intelligence Agency (CIA), with congressional approval, established the first federal government-sponsored VC firm, In-Q-Tel, in 1999 . IQT is an independent, not-for-profit, non-stock company. It is a strategic investor that works closely with intelligence community (IC) entities and the Department of Defense (DOD). IQT's portfolio includes data analytics, cybersecurity, artificial intelligence, machine learning, ubiquitous computing, information technology solutions, communications, novel materials, electronics, commercial space, remote sensing, power and energy, and biotechnology. While the CIA has broad statutory authority in how it may expend its funds, according to a RAND Corporation report, the agency reportedly used an approach based on DOD's \"other transaction\" authority (10 U.S.C. 2371) for developing its contract with IQT. IQT has a management team and a board of trustees. The CIA is the executive agent for IQT. Federal agencies, primarily the CIA, provide funding to IQT, which in turn provides investments to selected firms based on needs articulated by the CIA. The In-Q-Tel Interface Center (QIC), a small group of CIA employees, serves as a liaison between the CIA and IQT. IQT investments generally range from $500,000 to $3 million. IQT asserts that for each dollar it has invested, private investors have provided $16. IQT pairs its investment with a development agreement in which IQT and the company work together to adapt the technology to meet IC needs. If successful, IC customers can buy the product directly from the company. IQT asserts that its model delivers rapid, cost-effective solutions: IQT identifies and adapts \"ready-soon\" technologiesâoff-the-shelf products that can be modified, tested, and delivered for use within 6 to 36 months depending on the difficulty of the problem. Approximately 75% of our deals involve multiple agencies from the [IC] and defense communities, which means a more cost efficient use of taxpayers' dollars. Profits from the liquidation of an IQT investment are allocated between additional IQT investing activity and other strategic information technology initiatives defined by the CIA, in accordance with a memorandum of understanding between the CIA and IQT. Army Venture Capital Initiative. In January 2002, Congress directed the Secretary of the Army to establish a venture capital investment corporation using $25 million previously appropriated to the Army for basic and applied research. The Army and Arsenal Venture Capital (formerly Military Commercial Technologies, Inc. (MILCOM)) jointly manage the AVCI through OnPoint Technologies, LLC (OPT), a not-for-profit corporation. In this relationship, the Army serves as strategic investor; provides guidance on technology priorities to OPT through its Communications Electronics Command (CECOM); and, through CECOM, provides administrative and contractual support to OPT. Army funds provided to OPT support investments and OPT expenses. Proceeds from the liquidation of investments are used in part to pay compensation to Arsenal Venture Capital with the balance used for new investments. In addition to providing $25 million in FY2002, Congress appropriated $12.6 million in FY2003 and $14.3 million in FY2005 for the AVCI. In addition, in FY2004, the Army reprogrammed $10 million for the AVCI. Since FY2005, Congress has not appropriated funds to the AVCI. AVCI invests alongside other VC firms at all stages of development, making investments of $500,000 to $2 million. AVCI asserts that for each dollar it has invested, private investors have provided $22. Focused initially on innovative power and energy technologies, AVCI's technology focus areas have expanded to include emerging technologies such as autonomy, cyber, health information systems, and advanced materials. AVCI seeks to foster the development of these technologies and their transfer to the soldier while attaining net returns for the investing organizations from commercial and defense markets. AVCI asserts that it is able to engage technology firms outside the traditional reach of DOD. Red Planet Capital. In September 2006, the National Aeronautics and Space Administration (NASA) announced a partnership with Red Planet Capital, Inc., a non-profit organization, to establish a venture capital fund, Red Planet Capital (RPC). The fund was \"to support innovative, dual-use technologies [to] help NASA achieve its mission, [and] better position these technologies for future commercial use.\" NASA was to provide strategic direction and technical input to RPC, while the organization's principals were to identify investment opportunities, perform due diligence, and manage its equity investments. NASA intended to invest approximately $75 million over five years. Congress provided $6 million for RPC in FY2007. In FY2008, President George W. Bush proposed termination of the program: Government-sponsored venture capital funds provide a mechanism for Government agencies to indirectly take equity stakes in private firms, which potentially creates significant conflicts of interest and market distortions. The Administration believes that this mechanism poses difficult challenges to Government oversight and should only be used in exceptional situationsâ¦. The Administration further evaluated the fund and determined that, for NASA, these funds are better directed towards current priorities that will produce cost-effective, ascertainable outcomes. Congress provided no further appropriations for RPC. According to NASA, the fund was eliminated before it took an equity stake in any company. A RAND Corporation study states that RPC made a single investment prior to its termination, though it did not specify the amount. Over the last two decades, federal agencies and Congress have established several venture capital (VC) firms. The intent of these firms, including In-Q-Tel (IQT), the Army Venture Capital Initiative (AVCI), and Red Planet Capital (RPC), has been to help ensure agency access to leading-edge technologies and input into technology development to address mission needs. Several factors have contributed to the initiation of these organizations: a long-term shift in the composition of U.S. research and development funding from the federal government to the private sector; the substantial role of small start-ups in driving innovation, especially in information technology; and expanded U.S. and global commercial market opportunities that have diminished the relative attractiveness of serving the federal government market. In-Q-Tel. The Central Intelligence Agency (CIA), with congressional approval, established the first federal government-sponsored VC firm, In-Q-Tel, in 1999 . IQT is an independent, not-for-profit, non-stock company. It is a strategic investor that works closely with intelligence community (IC) entities and the Department of Defense (DOD). IQT's portfolio includes data analytics, cybersecurity, artificial intelligence, machine learning, ubiquitous computing, information technology solutions, communications, novel materials, electronics, commercial space, remote sensing, power and energy, and biotechnology. While the CIA has broad statutory authority in how it may expend its funds, according to a RAND Corporation report, the agency reportedly used an approach based on DOD's \"other transaction\" authority (10 U.S.C. 2371) for developing its contract with IQT. IQT has a management team and a board of trustees. The CIA is the executive agent for IQT. Federal agencies, primarily the CIA, provide funding to IQT, which in turn provides investments to selected firms based on needs articulated by the CIA. The In-Q-Tel Interface Center (QIC), a small group of CIA employees, serves as a liaison between the CIA and IQT. IQT investments generally range from $500,000 to $3 million. IQT asserts that for each dollar it has invested, private investors have provided $16. IQT pairs its investment with a development agreement in which IQT and the company work together to adapt the technology to meet IC needs. If successful, IC customers can buy the product directly from the company. IQT asserts that its model delivers rapid, cost-effective solutions: IQT identifies and adapts \"ready-soon\" technologiesâoff-the-shelf products that can be modified, tested, and delivered for use within 6 to 36 months depending on the difficulty of the problem. Approximately 75% of our deals involve multiple agencies from the [IC] and defense communities, which means a more cost efficient use of taxpayers' dollars. Profits from the liquidation of an IQT investment are allocated between additional IQT investing activity and other strategic information technology initiatives defined by the CIA, in accordance with a memorandum of understanding between the CIA and IQT. Army Venture Capital Initiative. In January 2002, Congress directed the Secretary of the Army to establish a venture capital investment corporation using $25 million previously appropriated to the Army for basic and applied research. The Army and Arsenal Venture Capital (formerly Military Commercial Technologies, Inc. (MILCOM)) jointly manage the AVCI through OnPoint Technologies, LLC (OPT), a not-for-profit corporation. In this relationship, the Army serves as strategic investor; provides guidance on technology priorities to OPT through its Communications Electronics Command (CECOM); and, through CECOM, provides administrative and contractual support to OPT. Army funds provided to OPT support investments and OPT expenses. Proceeds from the liquidation of investments are used in part to pay compensation to Arsenal Venture Capital with the balance used for new investments. In addition to providing $25 million in FY2002, Congress appropriated $12.6 million in FY2003 and $14.3 million in FY2005 for the AVCI. In addition, in FY2004, the Army reprogrammed $10 million for the AVCI. Since FY2005, Congress has not appropriated funds to the AVCI. AVCI invests alongside other VC firms at all stages of development, making investments of $500,000 to $2 million. AVCI asserts that for each dollar it has invested, private investors have provided $22. Focused initially on innovative power and energy technologies, AVCI's technology focus areas have expanded to include emerging technologies such as autonomy, cyber, health information systems, and advanced materials. AVCI seeks to foster the development of these technologies and their transfer to the soldier while attaining net returns for the investing organizations from commercial and defense markets. AVCI asserts that it is able to engage technology firms outside the traditional reach of DOD. Red Planet Capital. In September 2006, the National Aeronautics and Space Administration (NASA) announced a partnership with Red Planet Capital, Inc., a non-profit organization, to establish a venture capital fund, Red Planet Capital (RPC). The fund was \"to support innovative, dual-use technologies [to] help NASA achieve its mission, [and] better position these technologies for future commercial use.\" NASA was to provide strategic direction and technical input to RPC, while the organization's principals were to identify investment opportunities, perform due diligence, and manage its equity investments. NASA intended to invest approximately $75 million over five years. Congress provided $6 million for RPC in FY2007. In FY2008, President George W. Bush proposed termination of the program: Government-sponsored venture capital funds provide a mechanism for Government agencies to indirectly take equity stakes in private firms, which potentially creates significant conflicts of interest and market distortions. The Administration believes that this mechanism poses difficult challenges to Government oversight and should only be used in exceptional situationsâ¦. The Administration further evaluated the fund and determined that, for NASA, these funds are better directed towards current priorities that will produce cost-effective, ascertainable outcomes. Congress provided no further appropriations for RPC. According to NASA, the fund was eliminated before it took an equity stake in any company. A RAND Corporation study states that RPC made a single investment prior to its termination, though it did not specify the amount.", "summary": "Federal research and development (R&D) has played a significant role in strengthening the innovative capacity of the United States to achieve goals such as economic competitiveness, national security, improved healthcare, and protection of the environment. The results of federal R&D have led to scientific breakthroughs and new technologies with broad social and economic impacts, including artificial intelligence, the internet, and magnetic resonance imaging. The global landscape for innovation is rapidly evolvingâthe pace of innovation has increased and the composition of R&D funding has changed (e.g., public versus private funding and the U.S. share of global R&D has declined ). These changes have led some to call for new approaches and the expansion of existing federal authorities to help the United States maintain its leadership in innovation, research, and technology. Over the years, Congress has created several agency-related nonprofit research foundations and corporations to advance the R&D needs of the federal government. The stated goals and potential benefits of these quasi-governmental entities include: (1) providing a flexible and efficient mechanism for establishing public-private R&D partnerships; (2) enabling the solicitation, acceptance, and use of private donations to supplement the work performed with federal R&D funds; (3) increasing technology transfer and the commercialization of federally funded R&D; (4) improving the ability of federal agencies to attract and retain scientific talent; and (5) enhancing public education and awareness regarding the role and value of federal R&D. This report provides an overview of the purpose and intent, governance structure, and federal funding associated with selected congressionally mandated, agency-related nonprofit research foundations and corporations: the Foundation for the National Institutes of Health, the National Foundation for the Centers for Disease Control and Prevention, the Reagan-Udall Foundation for the Food and Drug Administration, the Foundation for Food and Agriculture Research, the Henry M. Jackson Foundation for the Advancement of Military Medicine and the nonprofit research and education corporations associated with the Department of Veterans Affairs. The report also identifies potential issues for consideration related to oversight of existing agency-related nonprofit research foundations and corporations as well as potential issues for consideration should Congress elect to establish additional ones. Specifically, while government agencies are, with certain exceptions, subject to management laws and regulations designed to ensure accountability, transparency, and fairness, agency-related research foundations and corporations are generally exempt from them. This situation may raise questions about how Congress and federal agencies can protect the public interest and ensure confidence in the decisionmaking of such entities. Additionally, recent concerns that some have raised related to conflict of interest, the potential for industry influence, and questions about effectiveness may prompt further examination of these entities. Among the options that Congress might consider are: crafting a broad, general nonprofit research foundation authority that federal science agencies could draw on to create an entity that meets their specific needs; examining the existing authorities of individual federal science agencies and, as appropriate, supplementing those authorities to increase the flexibility of an agency to enter into public-private partnerships; creating additional agency-related nonprofit research foundations on a case-by-case basis, tailored to the specific needs of particular federal science agencies; and maintaining the status quo, i.e., allowing agency-related nonprofit research foundations and corporations that currently exist to continue, and requiring other federal agencies to use their existing authorities to enter into public-private R&D partnerships and transfer federal technologies to the marketplace.", "document_type": "crs"}
{"report": "Congress and the Donald J. Trump Administration are debating enhancing and expanding barriers on the southwest border. The extent of these barriers, and how construction of these barriers will be funded has become a central part of the interactions between Congress and the Trump Administration on border security and funding legislation for the broader federal government. The debate has revealed the lack of an authoritative compilation of data on the details of federal investment in border barriers. This is in part due to the evolving structure of the appropriations for agencies charged with protecting the borderâaccount structures have shifted, initiatives have come and gone, and appropriations prior to FY2017 typically did not specify a precise level of funding for barriers as opposed to other technologies that secure the border. The Trump Administration's continued advocacy for funding for a \"border wall system\" has led to a congressional interest in the historical context for border barrier funding. This report briefly contextualizes the history of U.S. enforcement of the U.S.-Mexico border, before turning to funding for border barriers within the contemporary period, accounting for changing appropriations structures. The Treaty of Guadalupe Hidalgo in 1848, with the cession of land to the United States, ended the Mexican-American War and set forth an agreed-upon boundary line between the United States and Mexico. The physical demarcation of the boundary was essentially set by the Gadsden Purchase, finalized in 1854, with some minor adjustments since then. Securing U.S. borders has primarily been the mission of the U.S. Border Patrol, which was established by Congress by an appropriations act in 1924. Initially, a relatively small force of 450 officers patrolled both the northern and southern borders between inspection stations, guarding against the smuggling of contraband and unauthorized migrants. The Immigration Act of 1924 established immigration quotas for most countries, with the exception of those in the Western Hemisphere, including Mexico. (While some specific limitations existed, per-country quotas for Western Hemisphere countries did not exist until 1976. ) Earlier policies had set categorical exclusions to entry (e.g., for Chinese and other Asian immigrants) that were exceptions to an otherwise open immigration policy. Between 1942 and 1964, the Bracero Program brought in nearly 5 million Mexican agricultural workers to fill the labor gap caused by World War II. Both employers and employees became used to the seasonal work, and when the program ended, many continued this employment arrangement without legal authorization. Debates about enhancing enforcement of immigration laws ensued in the late 1970s and 1980s, largely in concert with counter-drug smuggling efforts and interest in curbing the rise in unauthorized flows of migrant workers. A significant effort to construct barriers on the southern border as a deterrent to illegal entry by migrants or smugglers into the United States began in the early 1990s. In 1991, U.S. Navy engineers built a ten-foot-high corrugated steel barrier between San Diego and Tijuana made of surplus aircraft landing mats, an upgrade to the previous chain-link fencing. In 1994, the Border Patrol (then part of the Department of Justice under the Immigration and Naturalization Service, INS) released a strategic plan for enforcing immigration laws along the U.S. border, as a part of a series of immigration reform initiatives. The plan, developed by Chief Patrol Agents, Border Patrol headquarters staff, and planning experts from the Department of Defense Center for Low Intensity Conflict, described their approach to improving control of the border through a strategy of \"prevention through deterrence,\" under which resources were concentrated in major entry corridors to establish control of those areas and force traffic to more difficult crossing areas. The Border Patrol will increase the number of agents on the line and make effective use of technology, raising the risk of apprehension high enough to be an effective deterrent. Because the deterrent effect of apprehensions does not become effective in stopping the flow until apprehensions approach 100 percent of those attempting entry, the strategic objective is to maximize the apprehension rate. Although a 100 percent apprehension rate is an unrealistic goal, we believe we can achieve a rate of apprehensions sufficiently high to raise the risk of apprehension to the point that many will consider it futile to continue to attempt illegal entry. Prior to 1996, federal statute neither explicitly authorized nor required barrier construction along international borders. In 1996, the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA) was enacted, and Section 102(a) specifically directed the Attorney General to \"install additional physical barriers and roads ... in the vicinity of the United States border to deter illegal crossings in areas of high illegal entry into the United States.\" Following the terrorist attacks of September 11, 2001, the U.S. government changed its approach to homeland security issues, including control of the border. As a part of the establishment of the Department of Homeland Security (DHS) in 2003, INS was dismantled, and the Border Patrol and its responsibility for border security were moved from the Department of Justice to DHS as a part of U.S. Customs and Border Protection (CBP). DHS and CBP were stood up in 2003, and received their first annual appropriations in FY2004. During the 109 th and the first session of the 110 th Congresses (2005-2007), comprehensive immigration reform legislation and narrower border security measures were debated. One result was that Congress explicitly authorized and funded new construction of border barriers, significantly increasing their presence. In the 109 th Congress, two bills were enacted that amended Section 102 of IIRIRA, easing the construction of additional border barriers. Section 102 of the REAL ID Act of 2005 ( P.L. 109-13 , Div. B) included broad waiver authority that allowed for expedited construction of border barriers. The Secure Fence Act of 2006 ( P.L. 109-367 ) directed the Secretary of Homeland Security to \"achieve and maintain operational control over the entire international land and maritime borders of the United States,\" mandated the construction of certain border barriers and technology on the border with Mexico by the end of 2008, and required annual reports on progress on border control. This was a different approach in border barrier legislation. Past immigration policy bills had included border barriers as a part of a suite of remedies across government to the border security problem in the context of immigration policy. The Secure Fence Act instead provided authorization for DHS alone to achieve \"operational control\" of the border through barriers, tactical infrastructure, and surveillance while largely not addressing the broader set of immigration policies that could contribute to improved border security. In addition, the Secure Fence Act substantially revised IIRIRA Section 102(b) to include five specific border areas to be covered by the installation of fencing, additional barriers, and technology. The FY2006 DHS Appropriations Act ( P.L. 109-90 ) provided the first appropriations specifically designated for the Border Patrol (now under CBP and a part of DHS) to construct border barriers. The act specified $35 million for CBP's San Diego sector fencing. This funding was part of a surge in CBP construction spending from $91.7 million in FY2005âand $93.4 million in the FY2006 requestâto $270.0 million for FY2006 enacted appropriations. This direction also represented the first specific statutory direction provided to CBP on the use of its construction funds. Toward the end of 2007, Congress amended Section 102 of IIRIRA through Section 564 of the Consolidated Appropriations Act, 2008. Congress again required the construction of reinforced fencing along at least 700 miles of the U.S.-Mexico border, where it would be \"most practical and effective,\" but also included flexibility in implementing this requirement, stating that: nothing in this paragraph shall require the Secretary of Homeland Security to install fencing, physical barriers, roads, lighting, cameras, and sensors in a particular location along an international border of the United States, if the Secretary determines that the use or placement of such resources is not the most appropriate means to achieve and maintain operational control over the international border at such location. Starting in FY2007 and continuing through FY2016, border barrier funding in CBP's budget was included in the \"Border Security Fencing, Infrastructure, and Technology\" (BSFIT) appropriation. When BSFIT was established in the Department of Homeland Security Appropriations Act, 2007 ( P.L. 109-295 ), it consolidated border technology and tactical infrastructure funding from other accounts, including CBP's Construction appropriation and Salaries and Expenses appropriation. According to the FY2007 DHS appropriations conference report, Congress provided $1,512,565,000 for BSFIT activities for FY2007: $1,187,565,000 from annual appropriations in P.L. 109-295 , and $325,000,000 in prior enacted supplemental appropriations from P.L. 109-234 and other legislation. Congress directed portions of that initial appropriation to two specific border security projects, and withheld $950 million until a spending plan for a border barrier was provided. Starting in FY2008, a PPA for \"Development and Deployment\" of technology and tactical infrastructure was included at congressional direction under the BSFIT appropriation. The BSFIT Development and Deployment PPA is, over the tenure of CBP, the most consistently structured year-to-year direction from Congress to CBP regarding putting border security technology and infrastructure in the field, covering FY2008-FY2016. The BSFIT Development and Deployment structure remained unchanged until the implementation of the Common Appropriations Structure (CAS) for DHS in the FY2017 appropriations cycle, which redistributed BSFIT funding to the Operations and Support (OS) appropriation and the Procurement, Construction, and Improvements (PC&I) appropriation. Border barrier design and construction funding, other than ports of entry, is now included in the Border Security Assets and Infrastructure PPA along with several other activities. Figure 1 shows the requested and enacted levels for the Development and Deployment PPA from FY2008 through FY2016. Although it doesn't show an almost $1.2 billion FY2007 appropriation for border infrastructure before the Development and Deployment PPA was implemented, it does indicate the early high levels of investment in border infrastructure, which then tapered off. The dashed line shows the size of the budget request for these elements. While the new structure of appropriations made it clear that funding was being directed to border security enhancements, the level of detail was not always sufficient to identify the funding level for barrier construction. CRS was able to obtain this more granular information directly from CBP, which provided a breakdown to CRS of its spending on border barriers beginning with FY2007. The primary program that funded barrier construction in this period was the Tactical Infrastructure (TI) Program. Figure 2 and Table 1 present funding data provided by CBP for border barriers under the TI program. The funding provided in FY2007 to FY2009 resulted in increased border barrier construction (which extended for a few years into the early 2010s). As the funds for construction were expended, CBP transitioned its border barrier activities to primarily maintenance and minor repairs, until FY2017. CBP has indicated in follow-up communications that no further historical data are available, as barrier construction was conducted by several entities within CBP, and not centrally tracked. In addition, the definitions of tactical infrastructure may allow for inclusion of some elements only peripherally related to border barriers. Taking these factors into account, given the limited mileage constructed prior to FY2007 (see Appendix for details), the above data present the best available understanding of appropriations and spending on border barriers in the 2007-2016 period. On January 25, 2017, the Trump Administration issued Executive Order 13767, \"Border Security and Immigration Enforcement Improvements.\" Section 2(a) of the EO indicates that it is the policy of the executive branch to \"secure the southern border of the United States through the immediate construction of a physical wall on the southern border, monitored and supported by adequate personnel so as to prevent illegal immigration, drug and human trafficking, and acts of terrorism.\" The EO goes on to define \"wall\" as \"a contiguous, physical wall or other similarly secure, contiguous, and impassable physical barrier.\" For FY2017, changes were made both in the structure of how funds were appropriated, and how CBP organized those funds among its authorized activities. This complicates efforts to make detailed comparisons in funding levels between the present and time periods prior to FY2016. When DHS was established in 2003, components of other agencies were brought together over a matter of months, in the midst of ongoing budget cycles. Rather than developing a new structure of appropriations for the entire department, Congress and the Executive continued to provide resources through existing account structures when possible. CBP's budget structure evolved over the DHS's early years, including the institution of the Border Security Fencing, Infrastructure, and Technology (BSFIT) account in FY2007. At the direction of Congress, in 2014 DHS began to work on a new Common Appropriations Structure (CAS), which would standardize the format of DHS appropriations across components. After several years of negotiations with Congress, DHS made its first budget request in the CAS for FY2017, and implemented the new budget structure while operating under a continuing resolution in October 2016. This resulted in the BSFIT structure being eliminated. The funding that had been provided under its appropriation would now be provided under the CBP Operations and Support (OS) and Procurement, Construction, and Improvements (PC&I) appropriations. Aside from the appropriations structure, changes within CBP's internal account structure occurred during FY2017. The \"Wall Program\" was established at CBP during FY2017. The Wall Program is a lower-level PPA nested within the new Border Security Assets and Infrastructure activity, which in turn is a part of the CBP PC&I appropriation. According to CBP, the Wall Program oversees the execution of the FY2017 TI program funding and \"will be responsible for all future wall construction.\" CBP first directed appropriations to the Wall Program in FY2018 ($1.375 billion). CBP's TI Program continues to manage the funding for maintenance of new and replacement border barriers, as it has since FY2007. Table 2 shows appropriations for border barriers requested by the Administration and provided by Congress in the DHS appropriations acts. Each fiscal year is discussed in detail after Table 2 . The Trump Administration submitted a supplemental appropriations request in March 2017 for a variety of priorities, including CBP staffing and border wall construction. The request for additional CBP PC&I funding included $1.38 billion, of which $999 million was for \"planning, design, and construction of the first installment of the border wall.\" The FY2017 DHS Appropriations bill included a sixth title with the congressional response to the supplemental appropriations request. It included $341.2 million to replace approximately 40 miles of existing primary pedestrian and vehicle barriers along the southwest border \"using previously deployed and operationally effective designs, such as currently deployed steel bollard designs, that prioritize agent safety\" and to add gates to existing barriers. The Administration requested $1.72 billion for the Border Security Assets and Infrastructure PPA, including $1.57 million for construction of border barriers. In the FY2018 appropriations measure, Congress provided $1.74 billion, which, according to a House Appropriations Committee summary, included funding for \"over 90 miles of physical barrier construction along the southern borderâincluding replacement, bollards, and levee improvements.\" Section 230 of the bill specified the following $1.375 billion for the following activities under the CBP PC&I appropriation: $445 million for 25 miles of primary pedestrian levee fencing in Rio Grande Valley (RGV) sector; $196 million for primary pedestrian fencing in RGV sector; $251 million for secondary replacement fencing in San Diego sector; $445 million for replacement of existing primary pedestrian fencing; and $38 million for border barrier planning and design. The section went on to note that the funding for primary fencing \"shall only be available for operationally effective designs deployed as of [May 5, 2017], such as currently deployed steel bollard designs that prioritize agent safety.\" The Administration initially requested $1.647 billion for the Border Security Assets and Infrastructure PPA. Budget justification documents noted that $1.6 billion was requested for the border wall. The Administration reportedly requested $5.0 billion for the wall from Republican congressional leadership. However, no publicly available modification of its request was presented to Congress until January 6, 2019. At that time, in the midst of a lapse in annual appropriations due in part to conflict over border barrier funding, the acting head of the Office of Management and Budget (OMB) submitted a letter seeking $7 billion in additional border related funding. The $7 billion included $4.1 billion more for \"the wall\" than the Administration originally requested. The letter indicated that the total request of $5.7 billion would pay for \"approximately 234 miles of new physical barrier and fully fund the top 10 priorities in CBP's Border Security Improvement Plan.\" P.L. 116-6 , the Consolidated Appropriations Act, 2019, included $1.375 billion for CBP \"for the construction of primary pedestrian fencing, including levee pedestrian fencing, in the Rio Grande Valley Sector.\" Funding could only be used for \"operationally effective designs deployed as of [May 5, 2017], such as currently deployed steel bollard designs that prioritize agent safety.\" The same day that the President signed the FY2019 consolidated appropriations act into law, he declared a national emergency on the southern border of the United States. A fact sheet accompanying the declaration indicated the President's intent to make additional funding available for border barriers through three methods, sequentially. These methods and related actions are: 1. Drawing about $601 million from the Treasury Forfeiture Fund A letter from the Department of the Treasury on February 15, 2019, indicated that those funds would be made available to DHS for \"law enforcement border security efforts\" ($242 million available March 2, and $359 million after additional forfeitures were received). According to court documents, Treasury transferred the full $601 million to DHS on September 27, 2019. CBP will reportedly use the funds as follows: $261 million for future-year real estate planning and acquisition for border barrier construction along the southwest border. $340 million for border barrier projects in the Rio Grande Valley Sector, of which $124 million is for construction; and $216 million is for construction management costs, increased project costs, and real estate planning and acquisition. 2. Making up to $2.5 billion available through the Department of Defense's support for counterdrug activities (authorized under 10 U.S.C. Â§284) $1 billion has been reprogrammed within the Department of Defense to its Drug Interdiction and Counter Drug Activities account, and that funding, in turn, was transferred for the U.S. Army Corps of Engineers to do certain DHS-requested work on border barriers. On May 10, 2019, the Department of Defense announced an additional $1.5 billion reprogramming of funding that had been dedicated to a variety of initiatives, including training and equipping Afghan security forces, programs to dismantle chemical weapons, and other activity for which savings or program delays had been identified. The DOD indicated that the funding would construct an additional 80 miles of border barriers. Use of both of these tranches of reprogrammed funds to pay for border barrier projects had been blocked by a court injunction until July 26, 2019, when the Supreme Court ruled that the government could proceed with the use of the funds while a lower court determines the legality of the transfer that made the funds available. 3. Reallocating up to $3.6 billion from various military construction projects under the authority invoked by the emergency declaration On September 3, 2019, Secretary of Defense Mark Esper issued a memorandum with the determination that \"11 military construction projects â¦ along the international border with Mexico, with an estimated total cost of $3.6 billion, are necessary to support the use of the armed forces in connection with the national emergency [at the southern border].\" The memorandum indicates $1.8 billion in unobligated military construction funding for overseas projects would be made available immediately, while $1.8 billion in domestic military construction projects would be provided once it is needed. In February 2019, The Administration requested $5 billion in border barrier funding for FY2020, to support the construction of approximately 206 miles of border wall system. The House Appropriations Committee included no funding for border barriers when it reported its FY2020 DHS appropriations bill. In addition, the bill would have restricted the ability to transfer or reprogram funds for border barrier construction and proposed rescinding $601 million from funding appropriated for border barriers in FY2019. The Senate Appropriations Committee took the opposite approach when it reported S. 2582 , recommending $5 billion for border barrier construction. It also did not include any of the House bill's proposed restrictions or the rescission. Neither the House nor the Senate considered these appropriations bills on the floor. The FY2020 DHS Appropriations Act ( P.L. 116-93 , Div. D)âwhich was passed as part of the Consolidated Appropriations Act, 2020âincluded $1.375 billion for \"construction of barrier system along the southwest border.\" The barrier system design restrictions are similar to prior years, with a new exception for designs that help \"mitigate community or environmental impacts.\" There is an additional requirement that the barriers are to be built in the highest priority locations identified in CBP's Border Security Improvement Plan. Figure 3 presents a comparison of the total funding made available in the first and second eras of DHS efforts to support planning and construction of barriers on the U.S.-Mexico border. This comparison is made with two important caveats: the data sources and funding structures are different in the two eras. In the legislative era (FY2007-FY2016), detailed information was provided directly to CRS in a communication from CBP. It was tracked for \"tactical infrastructure,\" which included funding for border roads and other TI. In the executive era (FY2017 to the present), data from CBP and appropriations measures (which has been more detailed with respect to barrier planning and construction) are generally consistent, but the Administration uses the specifically defined \"border wall\" program to track most of the funding. A small amount of funding for barrier replacement and supporting infrastructure was provided through the tactical infrastructure PPA in FY2018. Section 4 of E.O. 13767, \"Physical Security of the Southern Border of the United States,\" focuses almost entirely on the construction of \"a physical wall\" on the U.S.-Mexico border as a means of obtaining operational control of the nearly 2,000-mile border. CBP has indicated that it cannot provide authoritative historical data prior to FY2007 on the level of funding invested in border barrier planning and construction. To briefly recap the funding that has been provided by Congress in response to the Trump Administration's initiative, the $4.47 billion in appropriations provided by Congress to CBP for border barrier planning and construction during the Trump Administration exceeds the amount provided for those purposes in the BSFIT account for the 10 years from FY2007 to FY2016 by $2 billion. Of the $4.47 billion: $1.04 billion was specifically directed to barrier replacement projects; $2.02 billion was specifically directed to construction needs in the Rio Grande Valley Sector; and $1.41 billion has been provided for planning and construction of border barriers without specific direction in regards to location or whether the funding was for barrier replacement or construction of additional miles of barriers. Despite the historically high volume of resources provided, the Administration has taken unprecedented stepsânoted aboveâin an attempt to more than double the funding level appropriated to CBP by Congress for barrier construction since the signing of E.O. 13767. $601 million was provided to DHS in FY2019 from the Treasury Forfeiture Fund. As noted in \" Border Barrier Funding Outside the Appropriations Process ,\" $124 million of that funding is being used for construction, while $477 million is for real estate planning and acquisition, increased project costs, and construction management costs. Generally, the Administration, in its discussion about border barriers, relies on the U.S. Border Patrol Impedance and Denial Prioritization Strategy , which includes a list of projects for barrier construction. There are no known authoritative cost estimates for the total construction or operation and maintenance costs of these projects if they are all completed, or publicly available assessments of how completion of various projects might affect CBP's operational costs. Furthermore, GAO reported in 2016 that the border barriers' contributions to CBP goals were not being adequately measured. GAO reported in 2018 that CBP's methodology for prioritizing border barrier deployments did not use cost estimates that included data on topography, land ownership, and other factors that could impact the costs of individual barrier projects. The Administration's stated intent is to expand the amount of border barriers on the southwest border, and this issue will likely be part of debates on the budgets for the current and future fiscal years. Congress may wish to obtain the following information and explore the following questions in assessing border barrier funding proposals: 1. What are the projected operation and maintenance costs for the existing southwest border barriers? How will those change with additional replacements, upgrades, or new construction of barriers? 2. What are the projected land acquisition and construction costs of CBP's remaining top priority border barrier projects, based on unique topography, land ownership, and strategic intent of the projects? What steps is CBP taking to control the growth of those costs? Who within the Administration is providing oversight of how these funds are used, and are they reporting their findings to Congress? 3. Are existing barriers and completed improvements having measurable impacts on attempted illegal entry into the U.S. and smuggling of contraband? How are CBP and other stakeholders making their assessments? Is CBP getting its desired tactical or strategic outcomes? 4. Are the operational benefits worth the financial and operational costs, or are there more efficient ways to achieve the desired tactical or strategic outcomes? 5. How should Congress respond to the Administration's exercise of reprogramming and transfer authorities to provide funding for border barrier work above the amount Congress provided to CBP for that purpose? The United States' southern border with Mexico runs for nearly 2,000 miles over diverse terrain, through varied population densities, and across discontinuous sections of public, private, and tribal land ownership. The Department of Homeland Security (DHS) Customs and Border Protection (CBP) is primarily responsible for border security, including the construction and maintenance of tactical infrastructure, but also the installation and monitoring of surveillance technology, and the deployment of border patrol agents to impede unlawful entries of people and contraband into the United States (e.g., unauthorized migrants, terrorists, firearms, and narcotics). Built barriers, such as fencing, are a relatively new feature on the southern border. These structures vary in age, purpose, form, and location. At the end of FY2015, approximately 653 milesâroughly one-third of the international boundaryâhad a primary layer of barriers. Approximately 300 miles of the \"primary fence\" was designed to prevent vehicles from entering, and approximately 350 additional miles was designed to block people on footâ\"pedestrian fencing.\" CBP has used various materials for pedestrian fencing, including bollard, steel mesh, and chain link, and employed bollard and Normandy-style fencing for vehicle barriers. Across 37 discontinuous miles, the primary layer is backed by a secondary layer of pedestrian fencing as well as an additional 14 miles of tertiary fencing (typically to delineate property lines). On January 10, 2020, the Administration announced the completion of the first 100 miles of the \"new border wall system\" under the Trump Administration. Based on CBP's information, the 100 miles of new border wall system largely replaces less formidable existing barriers with 18- to 30-foot bollard style fencing designed to obstruct both vehicles and pedestrians. It does not represent additional miles of the primary layer of border barriers. CBP has not announced the completion of any additional miles of primary fencing since 2015, but sections of legacy fencing and breached areas have been replaced or repaired and other improvements have been made. An interactive online project by inewsource (a nonprofit, nonpartisan investigative online newsroom in San Diego) and KPBS (a Public Broadcasting Service television and radio station in San Diego, California) used data obtained via a Freedom of Information Act (FOIA) request to Customs and Border Protection to account for every mile of existing border fencing by the year built. The data are used in this appendix to produce Figure A-1 showing the number of miles of primary border barrier constructed for the period 1960-2018 (annual data shown in Table A-1 ). Small areas of the border had fencing prior to 1990. By 1993, fencing in the San Diego area had been completed, covering the first 14 miles of the border east from the Pacific Ocean and a few other areas. Under the provisions of IIRIRA, the Secretary of Homeland Securityâand, prior to 2003, the Attorney Generalâhas the discretion to determine the appropriate amount of additional barriers to build, as well as their location. Approximately 40 additional miles of primary fence were constructed on the southern border through 2005. The vast majority of the existing primary barriersâmore than 525 milesâwere constructed between 2007 and 2009 (see Table A-1 and Figure A-1 ).", "summary": "The purpose of barriers on the U.S.-Mexico border has evolved over time. In the late 19 th and early 20 th centuries, fencing at the border was more for demarcation, or discouraging livestock from wandering over the border, rather than deterring smugglers or illegal migration. Physical barriers to deter migrants are a relatively new part of the border landscape, first being built in the 1990s in conjunction with counterdrug efforts. This phase of construction, extending into the 2000s, was largely driven by legislative initiatives. Specific authorization for border barriers was provided in 1996 in the Illegal Immigration Reform and Immigrant Responsibility Act (IIRIRA), and again in 2006 in the Secure Fence Act. These authorities were superseded by legislation included in the Consolidated Appropriations Act, 2008, which rewrote key provisions of IIRIRA and replaced most of the Secure Fence Act. The result of these initiatives was construction of more than 650 miles of barriers along the nearly 2,000-mile border. The Trump Administration has driven the second phase of construction of border barriers. On January 25, 2017, the Administration issued Executive Order 13767, \"Border Security and Immigration Enforcement Improvements.\" Section 2(a) of the E.O. indicates that it is the policy of the executive branch to \"secure the southern border of the United States through the immediate construction of a physical wall on the southern border, monitored and supported by adequate personnel so as to prevent illegal immigration, drug and human trafficking, and acts of terrorism.\" The debate over funding for and construction of a \"border wall system\" in this phase has created congressional interest in the historical context of border barrier funding. There has not been an authoritative compilation of data on the level of federal investment in border barriers over time. This is in part due to the evolving structure of the appropriations for agencies charged with protecting the borderâaccount structures have shifted, initiatives have come and gone, and appropriations typically have not specified a precise level of funding for barriers as opposed to other technologies that secure the border. Funding was not specifically designated for border barrier construction until FY2006. The nearly $4.5 billion in appropriations provided by Congress for border barrier planning and construction since the signing of the E.O. exceeds the amount provided for those purposes from FY2007 to FY2016 combined by almost $2 billion. Most of the contracts that have been awarded thus far are for improvements to, or replacements of, the existing barriers at the border. However, a significant portion of the funds appropriated to the Department of Homeland Security (DHS) is available for construction of barriers where they do not currently exist. The Administration took steps in FY2019 to secure funding beyond the levels approved by Congress for border barriers. These included: transferring roughly $601 million from the Treasury Forfeiture Fund to U.S. Customs and Border Protection (CBP); using $2.5 billion in Department of Defense funds transferred to the Department's counterdrug programs to construct border barriers; and reallocating up to $3.6 billion from other military construction projects using authorities under the declaration of a national emergency. This report provides an overview of the funding appropriated for border barriers, based on data from CBP and congressional documents, and a primer on the Trump Administration's efforts to enhance the funding for border barriers, with a brief discussion of the legislative and historical context of construction of barriers at the U.S-Mexico border. It concludes with a number of unanswered questions Congress may wish to explore as this debate continues. An appendix tracks reported barrier construction mileage on the U.S.-Mexico border by year.", "document_type": "crs"}
{"report": "The U.S. farm sector is vast and varied. It encompasses production activities related to traditional field crops (such as corn, soybeans, wheat, and cotton) and livestock and poultry products (including meat, dairy, and eggs), as well as fruits, tree nuts, and vegetables. In addition, U.S. agricultural output includes greenhouse and nursery products, forest products, custom work, machine hire, and other farm-related activities. The intensity and economic importance of each of these activities, as well as their underlying market structure and production processes, vary regionally based on the agro-climatic setting, market conditions, and other factors. As a result, farm income and rural economic conditions may vary substantially across the United States. Annual U.S. net farm income is the single most-watched indicator of farm sector well-being, as it captures and reflects the entirety of economic activity across the range of production processes, input expenses, and marketing conditions that have prevailed during a specific time period (see box \"Measuring Farm Profitability\" for a definition of net farm income ). When national net farm income is reported together with a measure of the national farm debt-to-asset ratio, the two summary statistics provide a quick and widely referenced indicator of the economic well-being of the national farm economy. In the first of three official U.S. farm income outlook releases scheduled for 2020 (see box \"ERS's Annual Farm Income Forecasts\" below), the U.S. Department of Agriculture's (USDA) Economic Research Service (ERS) projects that U.S. net farm income will rise 3.3% year-over-year in 2020 to $96.7 billion, up $3.1 billion from last year ( Figure 1 and Table A-1 ). The February forecast of $96.7 billion is 6.3% above the 10-year average of $89.9 billion (in nominal dollars) but is well below 2013's record high of $123.7 billion. In contrast, net cash income (calculated on a cash-flow basis) is projected lower in 2020 (down 10.8% from 2019) at $109.6 billionâ4.7% below the 10-year average of $115.0 billion. The divergence in year-to-year changes between the two measures of net income is due to their different treatment of harvested crops. Net farm income includes a crop's value after harvest even if it remains in on-farm storage. In contrast, net cash income includes a crop's value only when it is sold. Thus, crops placed in on-farm storage are included in net farm income but not net cash income. In 2018, U.S. farmers harvested a record soybean crop and the third-largest corn crop on record. That same year the U.S.-China trade dispute emerged as an impediment to trade and contributed to a widespread drop in soybean prices. However, the Administration assured producers that the trade dispute was temporary and would soon be resolved in their favor. As a result, many producers of soybeans and other crops held on to their crops in the hopes of capturing higher prices after the trade dispute was resolved. However, by mid-2019 there was no end in sight to the trade dispute, and farmer cash flows necessitated selling from on-farm inventories to meet household and farm operation needs. As a result, the net cash farm income forecast for 2019 included $14.7 billion in sales from on-farm crop inventories, whereas the 2020 forecast includes a much smaller amount ($0.5 billion) in sales from on-farm inventories. This difference accounts for much of the decline in the 2020 net cash farm income projection. When adjusted for inflation and represented in 2019 dollars ( Figure 2 ), both the net farm income and net cash income for 2019 are projected to be above their average values since 1940 of $88.2 billion and $101 billion, respectively. For historical perspective, both net cash income and net farm income achieved record nominal highs in 2013 but fell to recent lows in 2016 ( Figure 1 ) before trending higher during 2017-2019. Government farm subsidies are projected at $15 billion in 2020âdown nearly 37% from 2019 but still the second-highest since 2006 ( Figure 12 ). In 2019, support from traditional farm programs was bolstered by large direct government payments in response to trade retaliation under the trade dispute with China. Direct government payments of $23.6 billion in 2019 represented 25.2% of net farm incomeâthe largest share since a 27.6% share in 2006. The share of net farm income from government sources in 2020 is projected to decline to 15.5% ( Figure 11 ). Farm asset values and debt levels are projected to reach record levels in 2020âasset values at $3.1 trillion (+1.3% year-over-year) and farm debt at $425.3 billion (+2.3%)âpushing the projected debt-to-asset ratio up to 13.5%, the highest level since 2003 ( Figure 19 ). For the 2019-2020 marketing year for crops and the 2020 calendar year for livestock, USDA forecasts a mixed outlook for major commodity prices: Corn, soybeans, sorghum, oats, rice, hogs, and milk will be up slightly from 2019, while prices for barley, cotton, wheat, choice steers, broilers, and eggs are expected to be lower ( Table A-4 ). Abundant domestic and international supplies of grains and oilseeds contributed to a fifth-straight year of relatively weak commodity prices in 2019 ( Figure A-1 through Figure A-4 , and Table A-4 ). However, the commodity price projections for 2020 are subject to substantial uncertainty associated with as-yet-unknown domestic production and international commodity market developments. Three major factors dominated U.S. agricultural markets during 2019 and have contributed to uncertainty over the supply, demand, and price prospects for most major commodities heading into 2020: surplus stocks, wet weather, and international trade disputes. First, large corn and soybean stocks kept pressure on commodity prices throughout the grain and feed complex in 2019 ( Figure 3 ). Second, adverse weather conditions during the spring planting and fall harvesting periods contributed to market uncertainty regarding the size of the 2019 corn and soybean crops. Third, the U.S.-China trade dispute led to declines in U.S. exports to Chinaâa major market for U.S. agricultural productsâand added to market uncertainty. In particular, the United States was displaced by Brazil as the world's preeminent exporter of soybeans to China. Weather conditions and planting prospects for 2020 are unknown this early in the year. Also, despite the signing of a Phase I trade agreement with China on January 15, 2020, it is unclear how soonâif at allâthe United States may resume normal trade with China or how international demand may evolve heading in 2020. Corn and soybeans are the two largest U.S. commercial crops in terms of both value and acreage. For the past several years, U.S. corn and soybean crops have experienced strong growth in both productivity and output, thus helping to build stockpiles at the end of several successive marketing years through the 2018 season. In 2018, U.S. farmers produced a record U.S. soybean harvest of 4.4 billion bushels and record-ending stocks (909 million bushels or a 22.9% stocks-to-use ratio) that year ( Figure 3 ). The record soybean harvest in 2018, combined with the sudden loss of the Chinese soybean market, kept downward pressure on U.S. soybean prices. Despite a smaller crop and lower stocks in 2019, the reduction in volume of U.S. soybean exports to China has prevented a major price recovery. Similarly, several consecutive years of bumper U.S. corn crops have built domestic corn supplies. U.S. corn ending stocks in 2019 are projected down slightly to 1.8 billion bushels after three consecutive years of above 2-billion-bushel ending stock totals. U.S. wheat and cotton supplies are also expected to decline relative to use levels in 2019 but remain high relative to the historical average thus limiting price recovery. Because the livestock sectors (particularly dairy and cattle but hogs and poultry to a lesser degree) have longer biological lags and often require large capital investments up front, they are slower to adjust to changing market conditions than is the crop sector. As a result, USDA projects livestock and dairy production and prices an extra year into the future (compared with the crop sector) through 2020, and market participants consider this expanded outlook when deciding their market interactions (e.g., buy, sell, expand herd sizes). During the 2007-2014 period, high feed and forage prices plus widespread drought in the Southern Plainsâthe largest U.S. cattle production regionâresulted in an 8% contraction of the U.S. cattle inventory. Reduced beef supplies led to higher producer and consumer prices and record profitability among cow-calf producers in 2014. This was coupled with a subsequent improvement in forage conditions, all of which helped to trigger the slow rebuilding phase in the cattle cycle that started in 2014 ( Figure 4 ). The expansion continued through 2019 despite weakening profitability, primarily due to the lag in the biological response to the strong market price signals of late 2014. However, the cattle expansion appears to show the first signs of contraction in USDA's January 2020 U.S. cattle inventory report. The estimated cattle and calf population was down slightly from a year earlier at 94.4 million (compared with 94.8 million in January 2019). A factor working against continued expansion in cattle numbers is that producers are now producing more beef with fewer cattle as a result of heavier weights for marketed cattle. Similar to the cattle sector, U.S. hog and poultry flocks have been growing in recent years, but unlike cattle they are expected to continue to expand in 2020. USDA projects production of beef (+1.2%), pork (+4.5%), broilers (+4.3%), and eggs (+1.8%) to expand robustly through 2020. A key uncertainty for the meat-producing sector is whether demand will expand rapidly enough to absorb the continued growth in output or whether surplus production will begin to pressure prices lower. USDA projects that combined domestic and export demand for 2020 will flatten for red meat (+0.0%) but expand for poultry (+3.9%). The changing conditions for the U.S. livestock sector may be tracked by the evolution of the ratios of livestock output prices to feed costs ( Figure 5 ). A higher ratio suggests greater profitability for producers. The cattle-, hog-, and broiler-to-feed ratios have all exhibited significant volatility during the 2017-2019 period but in general have trended downward during 2018 and 2019, suggesting eroding profitability. The milk-to-feed price ratio has trended upward since mid-2018 into 2020. This result varies widely across the United States. Many marginally profitable cattle, hog, broiler, and milk producers face continued financial difficulties. Continued strong production growth of between 1% and 5% for red meat and poultry suggests that prices are vulnerable to weakness in demand. USDA projects that the price increase for hogs will slow in 2020, up 2.2% after 4.4% growth in 2019 ( Table A-4 ). Similarly, U.S. milk production is projected to continue growing in 2020 (+1.7%). Despite this production growth, USDA projects U.S. milk prices up slightly in 2020 (+1.3%). Projected farm-sector revenue sources in 2020 include crop revenues (46% of sector revenues), livestock receipts (43%), government payments (3%), and other farm-related income (7%), including crop insurance indemnities, machine hire, and custom work. Total farm sector gross cash income for 2020 is projected down (-0.3%) to $430.9 billion, driven by declines in both direct government payments (-36.6%) and other farm-related income (-8.0%). Cash receipts from crop receipts (+1.0%) and livestock product (+4.6%) are up a combined (+4.6%) ( Figure 6 ). Total crop sales peaked in 2012 at $231.6 billion when a nationwide drought pushed commodity prices to record or near-record levels. In 2020, crop sales are projected at $198.6 billion, up 1.0% from 2019 ( Figure 7 and Figure 8 ). Projections for 2020 and percentage changes from 2019 include Feed cropsâcorn, barley, oats, sorghum, and hay: $60.1 billion (+2.0%); Oil cropsâsoybeans, peanuts, and other oilseeds: $36.8 billion (-2.3%); Fruits and nuts: $31.0 billion (+6.3%); Vegetables and melons: $20.1 billion (-1.8%); Food grainsâwheat and rice: $11.3 billion (+1.4%); Cotton: $7.1 billion (+2.1%); and Other including tobacco, sugar, greenhouse, and nursery: $31.2 billion (-0.6%). The livestock sector includes cattle, hogs, sheep, poultry and eggs, dairy, and other minor activities. Cash receipts for the livestock sector grew steadily from 2009 to 2014, when it peaked at a record $212.3 billion. However, the sector turned downward in 2015 (-10.7%) and again in 2016 (-14.1%), driven largely by projected year-over-year price declines across major livestock categories ( Table A-4 , Figure 9 , and Figure 10 ). In 2017, livestock sector cash receipts recovered with year-to-year growth of 8.1% to $175.6 billion. Cash receipts increased slightly in 2018 (+0.5%) and 2019 (+0.6%). In 2020, cash receipts are projected up strongly (+4.6%) for the sector at $185.8 billion as increased cattle, hogs, and dairy sales offset declines in poultry. Projections for 2020 (and percentage changes from 2019) include Cattle and calf sales: $69.0 billion (+1.6%), Poultry and egg sales: $40.1 billion (+1.7%), Dairy sales: $42.5 billion (+5.2%), Hog sales: $27.1 billion (+18.4%), and Miscellaneous livestock: $7.1 billion (+2.0%). Historically, direct government farm program payments have included Direct payments (decoupled payments based on historical planted acres); Price-contingent payments (both coupled and decoupled program outlays linked to market conditions); Conservation payments (including the Conservation Reserve Program and other environmental-based outlays); Ad hoc and emergency disaster assistance payments (including emergency supplemental crop and livestock disaster payments and market loss assistance payments for relief of low commodity prices); and Other miscellaneous outlays, including payments under ad hoc programs initiated by the Administration such as the Market Facilitation Program (MFP) or the cotton ginning cost-share programs but also legislatively authorized programs such as the biomass crop assistance program, peanut quota buyout, milk income loss, tobacco transition, and other miscellaneous programs. Projected government payments of $15.0 billion in 2020, if realized, would represent a 36.6% decline from 2019 but would still be the second-largest since 2006. The $23.6 billion in federal payments in 2019 was the largest taxpayer transfer to the agriculture sector (in absolute dollars) since 2005 ( Figure 12 and Table A-1 ). The surge in federal subsidies in 2019 was driven by large \"trade-damage\" payments made under the MFP initiated by USDA in response to the U.S.-China trade dispute. MFP payments (reported to be $14.6 billion) in 2019 include outlays from the 2018 MFP program that were not received by producers until 2019, as well as payments under the first and second tranches of the 2019 MFP program. In 2020, MFP payments are projected to decline to $3.7 billion representing the third and final tranche of payments from the 2019 MFP program. No new MFP program has been announced for 2020 by the Administration. USDA permanent disaster assistance is projected higher year-over-year in 2020 at $2.5 billion (+14.2%). Most of the $2.5 billion comes from a new, temporary program, the Wildfire and Hurricane Indemnity Program Plus, enacted through the Disaster Relief Act of 2019 ( P.L. 116-20 ). Payments under the Price Loss Coverage program are projected at $3.9 billion in 2020, up from $1.9 billion in 2019. In contrast, Agricultural Risk Coverage outlays are projected to decline to $39 million, down from $641 million in 2019 (see \"Price Contingent\" in Figure 12 ). Conservation programs include all conservation programs operated by USDA's Farm Service Agency and the Natural Resources Conservation Service that provide direct payments to producers. Estimated conservation payments of $4.2 billion are forecast for 2020, up (+4.4%) from $4.0 billion in 2019. Total government payments of $15.0 billion represents a 3.5% share of projected gross cash income of $432.2 billion in 2020 ( Figure 6 ). In contrast, government payments are expected to represent 15.5% of the projected net cash income of $109.6 billion ( Figure 11 ). The government share of net farm income reached a peak of 65.2% in 1984 during the height of the farm crisis of the 1980s. The importance of government payments as a percentage of net farm income varies nationally by crop and livestock sector and by region. The 2018 farm bill ( P.L. 115-334 ) made several changes to the previous Margin Protection Program (MPP) for dairy, including a new nameâthe Dairy Margin Coverage (DMC) programâand expanded margin coverage choices from the original range of $4.00-$8.00 per hundredweight (cwt.). Under the 2018 farm bill, as a cushion against low milk prices, producers have the option of buying coverage to insure a margin between the national farm price of milk and the cost of feed up to a threshold of $9.50/cwt. on the first 5 million pounds of milk coverage. The DMC margin differs from the USDA-reported milk-to-feed ratio (shown in Figure 5 ) but reflects the same market forces. In August 2019, the formula-based milk-to-feed margin used to determine government payments rose to $9.85/cwt., thus exceeding the newly instituted $9.50/cwt. payment threshold ( Figure 13 ) and decreasing the likelihood of DMC payments in the near future. Since then, the DMC margin continued its rise to $12.21 in November 2019. These increases in the DMC margin decrease the likelihood that DMC payments will be available during the first half of 2020. Despite these price movements, USDA projects that the DMC program will make $637 million in payments in 2020, up from $279 million in 2019. Total production expenses for 2020 for the U.S. agricultural sector are projected to be up by $10.4 billion (+3.0%) from 2019 in nominal dollars at $354.7 billion ( Figure 14 ). Production expenses peaked in both nominal and inflation-adjusted dollars in 2014 then declined for five consecutive years in inflation-adjusted dollars but are projected to turn up again in 2020. Production expenses affect crop and livestock farms differently. The principal expenses for livestock farms are feed costs, purchases of feeder animals and poultry, and hired labor. In contrast, fuel, seed, pesticides, interest, and fertilizer costs are major crop production expenses. USDA projects that all expense categories with the exception of interest rates will be up in 2020 ( Figure 15 ). But how have production expenses moved relative to revenues? A comparison of the indexes of prices paid (an indicator of expenses) versus prices received (an indicator of revenues) reveals that the prices received index generally declined from 2014 through 2016, rebounded in 2017, then trended lower through 2019 ( Figure 16 ). Farm input prices (as reflected by the prices paid index) showed a similar pattern but with a smaller decline from their 2014 peak and have climbed steadily since mid-2016, suggesting that farm sector profit margins have been squeezed since 2016. A measure of the farm sector's financial well-being is net worth as measured by farm assets minus farm debt. A summary statistic that captures this relationship is the debt-to-asset ratio. The U.S. farm income and asset-value situation and outlook suggest a slowly eroding financial situation heading into 2020 for the agriculture sector as a whole. Considerable uncertainty clouds the economic outlook for the sector, reflecting the mixed outlook for prices and market conditions, an increasing dependency on international markets to absorb domestic surpluses, and an increasing dependency on federal support to offset lost trade opportunities due to ongoing trade disputes. Farm asset values (see box \"Measuring Farm Wealth: The Debt-to-Asset Ratio\" below for details)âwhich reflect farm investors' and lenders' expectations about long-term profitability of farm sector investmentsâare projected to be up 1.3% in 2020 to a nominal $3.1 trillion ( Table A-3 ). The projected rise in asset value is due to increases in both real estate values (+1.5%) and non-real-estate values (+0.6%). Real estate is projected to account for 83% of total farm sector asset value. Inflation-adjusted farm asset values (using 2019 dollars) are projected lower in 2020 (-0.6%). In inflation-adjusted terms, farm asset values peaked in 2014 ( Figure 17 ). Crop land values are closely linked to commodity prices. The leveling off of crop land values since 2015 reflects stagnant commodity prices ( Figure 18 ). Total farm debt is forecast to rise to a record $425.3 billion in 2020 (+2.3%) ( Table A-3 ). Farm equityâor net worth, defined as asset value minus debtâis projected to be up slightly (+1.1%) at $2.7 trillion in 2020 ( Table A-3 ). The farm debt-to-asset ratio is forecast up in 2020 at 13.6%, the highest level since 2003 but still relatively low by historical standards ( Figure 19 ). If realized, this would be the eighth consecutive year of increase in the debt-to-asset ratio. A farm can have both an on-farm and an off-farm component to its income statement and balance sheet of assets and debt. Thus, the well-being of farm operator households is not equivalent to the financial performance of the farm sector or of farm businesses because of the inclusion of nonfarm investments, jobs, and other links to the nonfarm economy. Average farm household income (sum of on- and off-farm income) is projected at $118,908 in 2020 ( Table A-2 ), down 1.5% from 2019 and 11.4% below the record of $134,165 in 2014. About 18% ($20,926) of total farm household income in 2020 is projected to be from farm production activities, while the overwhelming majority, at 82% ($97,982), is earned off the farm (including financial investments). The share of farm income derived from off-farm sources had increased steadily for decades but peaked at about 95% in 2000 ( Figure 20 ). Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. Since the late 1990s, farm household incomes have surged ahead of average U.S. household incomes ( Figure 21 ). In 2018 (the last year for which comparable data were available), the average farm household income of $112,211 was about 25% higher than the average U.S. household income of $90,021 ( Table A-2 ). Figure A-1 to Figure A-4 present USDA data on monthly farm prices received for several major farm commoditiesâcorn, soybeans, wheat, upland cotton, rice, milk, cattle, hogs, and chickens. The data are presented in an indexed format where monthly price data for year 2010 = 100 to facilitate comparisons. USDA Farm Income Data Tables Table A-1 to Table A-3 present aggregate farm income variables that summarize the financial situation of U.S. agriculture. In addition, Table A-4 presents the annual average farm price received for several major commodities, including the USDA forecast for the 2019-2020 marketing year for major program crops and 2020-2021 for livestock products.", "summary": "This report uses the U.S. Department of Agriculture's (USDA) farm income projections (as of February 5, 2020) to describe the U.S. farm economic outlook for 2020. Two major indicators of U.S. farm well-being are net farm income and net cash income. Net farm income represents an accrual of the value of all goods and serviced produced on the farm during the yearâsimilar in concept to gross domestic product. In contrast, net cash income uses a cash flow concept to measure farm well-being: Only cash transactions for the year are included. Thus, crop production is recorded as net farm income immediately after harvest, whereas net cash income records a crop's value only after it has been sold in the marketplace. According to USDA's Economic Research Service (ERS), national net farm income is forecast at $96.7 billion in 2020, up $3.1 billion (+3.3%) from 2019. The forecast rise in 2020 net farm income stands in contrast with a projected decline of over $10.8 billion in net cash income (-9.0%). Last year's (2019) net cash income forecast included $14.7 billion in sales of on-farm crop inventories, which helped to inflate the 2019 net cash income value to $120.4 billion. The 2020 net cash income forecast includes a much smaller amount ($0.5 billion) in sales from on-farm inventories, thus contributing to the decline from 2019. Government direct support payments to the agricultural sector are expected to continue to play an important role in farm income projections. USDA projects $15 billion in farm support outlays for 2020, including the $3.7 billion of 2019 Market Facilitation Program (MFP) paymentsâthe third and final tranche of payments under the $14.5 billion program. If realized, the 2020 government payments of $15 billion would represent a 36.6% decline from 2019 but would still be the second largest since 2006. The $23.6 billion in federal payments in 2019 was the largest taxpayer transfer to the agriculture sector (in absolute dollars) since 2005. The surge in federal subsidies in 2019 was driven by large payments (estimated at $14.3 billion) under the MFP initiated by USDA in response to the U.S.-China trade dispute. The Administration has not announced a new MFP for 2020. Weather conditions and planting prospects for 2020 are unknown this early in the year. Commodity prices are under pressure from abundant global supplies and uncertain export prospects. Despite the signing of a Phase I trade agreement with China on January 15, 2020, it is unclear how soonâif at allâthe United States may resume normal trade with China or how international demand may evolve in 2020. Farm asset value in 2020 is projected up year-to-year at $3.1 trillion (+1.3%). Farm asset values reflect farm investors' and lenders' expectations about long-term profitability of farm sector investments. Another critical measure of the farm sector's well-being is aggregate farm debt, which is projected to be at a record $425.3 billion in 2020âup 2.3% from 2019. Both the debt-to-asset and the debt-to-equity ratios have risen for eight consecutive years, potentially suggesting a continued slow erosion of the U.S. farm sector's financial situation. At the farm household level, average farm household incomes have been well above average U.S. household incomes since the late 1990s. However, this advantage derives primarily from off-farm income as a share of farm household total income. Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations. This report uses the U.S. Department of Agriculture's (USDA) farm income projections (as of February 5, 2020) to describe the U.S. farm economic outlook for 2020. Two major indicators of U.S. farm well-being are net farm income and net cash income. Net farm income represents an accrual of the value of all goods and serviced produced on the farm during the yearâsimilar in concept to gross domestic product. In contrast, net cash income uses a cash flow concept to measure farm well-being: Only cash transactions for the year are included. Thus, crop production is recorded as net farm income immediately after harvest, whereas net cash income records a crop's value only after it has been sold in the marketplace. According to USDA's Economic Research Service (ERS), national net farm income is forecast at $96.7 billion in 2020, up $3.1 billion (+3.3%) from 2019. The forecast rise in 2020 net farm income stands in contrast with a projected decline of over $10.8 billion in net cash income (-9.0%). Last year's (2019) net cash income forecast included $14.7 billion in sales of on-farm crop inventories, which helped to inflate the 2019 net cash income value to $120.4 billion. The 2020 net cash income forecast includes a much smaller amount ($0.5 billion) in sales from on-farm inventories, thus contributing to the decline from 2019. Government direct support payments to the agricultural sector are expected to continue to play an important role in farm income projections. USDA projects $15 billion in farm support outlays for 2020, including the $3.7 billion of 2019 Market Facilitation Program (MFP) paymentsâthe third and final tranche of payments under the $14.5 billion program. If realized, the 2020 government payments of $15 billion would represent a 36.6% decline from 2019 but would still be the second largest since 2006. The $23.6 billion in federal payments in 2019 was the largest taxpayer transfer to the agriculture sector (in absolute dollars) since 2005. The surge in federal subsidies in 2019 was driven by large payments (estimated at $14.3 billion) under the MFP initiated by USDA in response to the U.S.-China trade dispute. The Administration has not announced a new MFP for 2020. Weather conditions and planting prospects for 2020 are unknown this early in the year. Commodity prices are under pressure from abundant global supplies and uncertain export prospects. Despite the signing of a Phase I trade agreement with China on January 15, 2020, it is unclear how soonâif at allâthe United States may resume normal trade with China or how international demand may evolve in 2020. Farm asset value in 2020 is projected up year-to-year at $3.1 trillion (+1.3%). Farm asset values reflect farm investors' and lenders' expectations about long-term profitability of farm sector investments. Another critical measure of the farm sector's well-being is aggregate farm debt, which is projected to be at a record $425.3 billion in 2020âup 2.3% from 2019. Both the debt-to-asset and the debt-to-equity ratios have risen for eight consecutive years, potentially suggesting a continued slow erosion of the U.S. farm sector's financial situation. At the farm household level, average farm household incomes have been well above average U.S. household incomes since the late 1990s. However, this advantage derives primarily from off-farm income as a share of farm household total income. Since 2014, over half of U.S. farm operations have had negative income from their agricultural operations.", "document_type": "crs"}
{"report": "The 116 th Congress continues its interest in U.S. research and development (R&D) and in evaluating support for federal R&D activities. The federal government has played an important role in supporting R&D efforts that have led to scientific breakthroughs and new technologies, from jet aircraft and the internet to communications satellites, shale gas extraction, and defenses against disease. In recent years, federal budget caps have driven executive and legislative branch decisions about the prioritization of R&D, both in the context of the entire federal budget and among competing needs within the federal R&D portfolio. The Bipartisan Budget Act of 2019, among other things, increased the previously established FY2020 and FY2021 discretionary spending limits for defense and nondefense spending. This act reduced some of the budgetary constraints affecting R&D decisions. The U.S. government supports a broad range of scientific and engineering R&D. Its purposes include addressing national defense, health, safety, the environment, and energy security; advancing knowledge generally; developing the scientific and engineering workforce; and strengthening U.S. innovation and competitiveness in the global economy. Most of the R&D funded by the federal government is performed in support of the unique missions of individual funding agencies. The federal R&D budget is an aggregation of the R&D activities of these agencies. There is no single, centralized source of R&D funds. Agency R&D budgets are developed internally as part of each agency's overall budget development process. R&D funding may be included either in accounts that are entirely devoted to R&D or in accounts that also include funding for non-R&D activities. Agency budgets are subjected to review, revision, and approval by the Office of Management and Budget (OMB) and become part of the President's annual budget submission to Congress. The federal R&D budget is then calculated by aggregating the R&D activities of each federal agency. Congress plays a central role in defining the nation's R&D priorities as it makes decisions about the level and allocation of R&D fundingâoverall, within agencies, and for specific programs. In recent years, some Members of Congress have expressed concerns about the level of federal spending (for R&D and for other purposes) in light of the federal deficit and debt. Other Members of Congress have expressed support for increased federal spending for R&D as an investment in the nation's future competitiveness. As Congress acts to complete the FY2021 appropriations process, it faces two overarching issues: the amount of the federal budget to be spent on federal R&D and the prioritization and allocation of the available funding. This report begins with a discussion of the overall level of R&D in President Trump's FY2021 budget request, followed by analyses of R&D funding in the request from a variety of perspectives and for selected multiagency R&D initiatives. The remainder of the report discusses and analyzes the R&D budget requests of selected federal departments and agencies that, collectively, account for approximately 98% of total federal R&D funding. Selected terms associated with federal R&D funding are defined in the text box on the next page. Appendix A provides a list of acronyms and abbreviations. On February 10, 2020, President Trump released his proposed FY2021 budget. President Trump is proposing $142.2 billion for R&D for FY2021, a decrease of $13.8 billion (8.8%) below the FY2020 level of $156.0 billion. Adjusted for inflation to FY2021 dollars, the President's FY2021 R&D request represents a constant-dollar decrease of 10.6% from the FY2020 actual level. The President's request includes continued R&D funding for existing single-agency and multiagency programs and activities, as well as new initiatives. This report provides government-wide, multiagency, and individual agency analyses of the President's FY2021 request as it relates to R&D and related activities. Additional information and analysis will be included as the House and Senate act on the President's budget request through appropriations bills. It is not yet clear how the national response to the Coronavirus Disease 2019 (COVID-19) pandemic will affect Administration and congressional priorities for FY2021 R&D funding, or the congressional authorization and appropriations processes for enacting that funding. Federal R&D funding can be analyzed from a variety of perspectives that provide different insights. The following sections examine the data by agency, by the character of the work supported, and by a combination of these two perspectives. Congress makes decisions about R&D funding through the authorization and appropriations processes primarily from the perspective of individual agencies and programs. Table 1 provides data on R&D funding by agency for FY2019 (actual), FY2020 (enacted), and FY2021 (request). Under the request, eight federal agencies would receive nearly 98% of total federal R&D funding in FY2021: the Department of Defense (DOD), 42.1%; Department of Health and Human Services (HHS), primarily the National Institutes of Health (NIH), 26.6%; Department of Energy (DOE), 11.3%; National Aeronautics and Space Administration (NASA), 9.4%; National Science Foundation (NSF), 4.5%; Department of Agriculture (USDA), 1.9%; Department of Commerce (DOC), 1.1%; and Department of Veterans Affairs (VA), 1.0%. This report provides an analysis of the R&D budget requests for these agencies, as well as for the Department of Homeland Security (DHS), Department of the Interior (DOI), Department of Transportation (DOT), and Environmental Protection Agency (EPA). All but one federal agency would see their R&D funding decrease under the President's FY2021 request compared to their FY2020 enacted level. The only agency that would see an increase in R&D funding in FY2021 relative to the FY2020 level would be the VA (up $38 million, 2.9%). The agencies with the largest R&D funding declines (measured in dollars) in the FY2021 request compared to FY2020 enacted level are DOD (down $4.713 billion), DOE (down $3.168 billion), HHS (down $2.943 billion), NASA (down $723 million), and DOT (down $540 million). See Table 1 . The agencies with the largest percentage declines in R&D funding in the FY2021 request compared to FY2020 enacted level are DOT (down 47.6%), EPA (down 35.4%), DOI (down 25.5%), DOC (down 22.7%), and DOE (down 16.5%). See Table 1 . Federal R&D funding can also be examined by the character of work it supportsâbasic research, applied research, or developmentâand by funding provided for construction of R&D facilities and acquisition of major R&D equipment. (See Table 2 .) President Trump's FY2021 request includes $40.638 billion for basic research, down $2.822 billion (6.5%) from FY2020 enacted level; $38.805 billion for applied research, down $5.125 billion (11.7%); $59.112 billion for development, down $3.466 billion (5.5%); and $3.630 billion for facilities and equipment, down $2.375 billion (39.6%). A primary policy justification for public investments in basic research and for incentives (e.g., tax credits) for the private sector to conduct research is the view, widely held by economists, that the private sector will, left on its own, underinvest in basic research from a societal perspective. The usual argument for this view is that the social returns (i.e., the benefits to society at large) exceed the private returns (i.e., the benefits accruing to the private investor, such as increased revenues or higher stock value). Other factors that may inhibit corporate investment in basic research include long time horizons for achieving commercial applications (diminishing the potential returns due to the time value of money), high levels of technical risk and uncertainty, shareholder demands for shorter-term returns, and asymmetric and imperfect information. The federal government is the nation's largest supporter of basic research, funding 42% of U.S. basic research in 2018 (the most recent year for which comprehensive data are available). Business funded 29% of U.S. basic research in 2018, with state governments, universities, and other nonprofit organizations funding the remaining 30%. For U.S. applied research, business is the primary funder, accounting for an estimated 54% in 2018, while the federal government accounted for an estimated 34%. State governments, universities, and other nonprofit organizations funded the remaining 11%. Business also provides the vast majority of U.S. funding for development. Business accounted for 85% of development funding in 2018, while the federal government provided 13%. State governments, universities, and other nonprofit organizations funded the remaining 2% (see Figure 1 ). Federal R&D funding can also be viewed from the combined perspective of each agency's contribution to basic research, applied research, development, and facilities and equipment. Table 3 lists the three agencies with the most funding in each of these categories as proposed in the President's FY2021 budget. The overall federal R&D budget reflects a wide range of national priorities, including supporting advances in spaceflight, developing new and affordable sources of energy, and understanding and deterring terrorist groups. These priorities and the mission of each individual agency contribute to the composition of that agency's R&D spending (i.e., the allocation of R&D funding among basic research, applied research, development, and facilities and equipment). In the President's FY2021 budget request, the Department of Health and Human Services, primarily NIH, would account for nearly half (47.1%) of all federal funding for basic research. HHS would also be the largest federal funder of applied research, accounting for about 47.3% of all federally funded applied research in the President's FY2021 budget request. DOD would be the primary federal funder of development, accounting for 88.0% of total federal development funding in the President's FY2021 budget request. DOE would be the primary federal funder of facilities and equipment, accounting for 58.7% of total federal facilities and equipment funding in the President's FY2021 budget request. For many years, presidential budgets have reported on multiagency R&D initiatives. Often, they have also provided details of agency funding for these initiatives. Some of these efforts have a statutory basisâfor example, the Networking and Information Technology Research and Development (NITRD) program, the National Nanotechnology Initiative (NNI), and the U.S. Global Change Research Program (USGCRP). These programs generally produce annual budget supplements identifying objectives, activities, funding levels, and other information, usually published shortly after the presidential budget release. Other multiagency R&D initiatives have operated at the discretion of the President, without such a basis, and may be eliminated at the discretion of the President. President Trump's FY2021 budget is largely silent on funding levels for these efforts and whether any or all of the nonstatutory initiatives will continue. Some activities related to these initiatives are discussed in agency budget justifications and may be addressed in the agency analyses later in this report. This section provides available multiagency information on these initiatives and will be updated as additional information becomes available. Established by the High-Performance Computing Act of 1991 ( P.L. 102-194 ), the Networking and Information Technology Research and Development program is the primary mechanism by which the federal government coordinates its unclassified networking and information technology R&D investments in areas such as supercomputing, high-speed networking, cybersecurity, software engineering, and information management. According to NITRD, it coordinates the information technology R&D activities of 24 federal agency members and more than 45 other participating agencies with program interests and activities in IT R&D. NITRD efforts are coordinated by the National Science and Technology Council (NSTC) Subcommittee on Networking and Information Technology Research and Development. P.L. 102-194 , as reauthorized by the American Innovation and Competitiveness Act of 2017 ( P.L. 114-329 ), requires the director of NITRD to prepare an annual report to be delivered to Congress along with the President's budget request. This annual report, often referred to as a budget supplement, is to include, among other things, detailed information on the program's budget for the current and previous fiscal years and the proposed budget for the next fiscal year. The latest annual report was published in September 2019 and related to the FY2020 budget request. President Trump requested $5.506 billion for NITRD research in FY2020, a decrease of $195 million (3.4%) from the estimated FY2019 level (see Table 4 ). For additional information on the NITRD program, see CRS Report RL33586, The Federal Networking and Information Technology Research and Development Program: Background, Funding, and Activities , by Patricia Moloney Figliola. Additional NITRD information also can be obtained at https://www.nitrd.gov . The U.S. Global Change Research Program coordinates and integrates federal research and applications to understand, assess, predict, and respond to human-induced and natural processes of global change. The program seeks to advance global climate change science and to \"build a knowledge base that informs human responses to climate and global change through coordinated and integrated Federal programs of research, education, communication, and decision support.\" In FY2019, 10 departments and agencies received appropriations for their USGCRP participation. USGCRP efforts are coordinated by the NSTC Subcommittee on Global Change Research. Each agency develops and carries out its activities as its contribution to the USGCRP, and funds are appropriated to each agency for those activities; those activities may or may not be identified as associated with the USGCRP in agency budget justifications or other program materials available publicly. Complementing USGCRP activities are many federal climate change or global change-related activities with programmatic missions, not predominantly scientific. These are reported separately in budget justifications. The Global Change Research Act of 1990 (GCRA) ( P.L. 101-606 ) requires each federal agency or department involved in global change research to report annually to Congress on each element of its proposed global change research activities, as well as the portion of its budget request allocated to each element of the program. The President is also required to identify those activities and the annual global change research budget in the President's annual budget request. The President's budget requests for years later than FY2017 do not report these budget data required by the GCRA, although some agencies report their contributions in their budget justifications to Congress. In addition, in the 20 years prior to FY2018, language in appropriations laws required the President to submit a comprehensive report to the appropriations committees \"describing in detail all Federal agency funding, domestic and international, for climate change programs, projects, and activities â¦ including an accounting of funding by agencyâ¦.\" As these are no longer reported by the Office of Management and Budget, Table 5 presents data compiled by CRS from communications with departments and agencies that participated in the USGCRP in FY2018. For additional information on the USGCRP, see CRS Report R43227, Federal Climate Change Funding from FY2008 to FY2014 , by Jane A. Leggett, Richard K. Lattanzio, and Emily Bruner. Additional USGCRP information can be obtained at http://www.globalchange.gov . Launched in FY2001, the National Nanotechnology Initiative is a multiagency R&D initiative to advance understanding and control of matter at the nanoscale, where the physical, chemical, and biological properties of materials differ in fundamental and sometimes useful ways from the properties of individual atoms or bulk matter. In 2003, Congress enacted the 21 st Century Nanotechnology Research and Development Act ( P.L. 108-153 ), providing a legislative foundation for some of the activities of the NNI. NNI efforts are coordinated by the NSTC Subcommittee on Nanoscale Science, Engineering, and Technology (NSET). For FY2020, the President's request included NNI funding for 15 federal departments and independent agencies and commissions with budgets dedicated to nanotechnology R&D. The NSET includes other federal departments and independent agencies and commissions with responsibilities for health, safety, and environmental regulation; trade; education; intellectual property; international relations; and other areas that might affect or be affected by nanotechnology. P.L. 108-153 requires the NSTC to prepare an annual report to be delivered to Congress at the time the President's budget request is sent to Congress. This annual report, often referred to as a budget supplement, is to include detailed information on the program's budget for the current fiscal year and the program's proposed budget for the next fiscal year, as well as additional information and data related to the performance of the program. The latest annual report was published in August 2019 and related to the FY2020 budget request. President Trump requested $1.469 billion for NNI research in FY2020, a decrease of $103 million (6.6%) from the estimated FY2019 level. For additional information on the NNI, see CRS Report RL34401, The National Nanotechnology Initiative: Overview, Reauthorization, and Appropriations Issues , by John F. Sargent Jr. Additional NNI information can be obtained at http://www.nano.gov . The President's FY2021 budget highlights R&D spending in several areas discussed in the following sections. The President's FY2021 budget states the Administration's prioritization for areas of science and technology that it asserts will underpin the Industries of the Future (IotF), among other prioritizations and reallocations in lower priority areas. For 2021, the Administration is prioritizing the science and technology that underpin the Industries of the Future (IotF)âartificial intelligence (AI), quantum information science (QIS), 5G/advanced communications, biotechnology, and advanced manufacturing. Relative to the 2020 President's Budget, this includes major increases in QIS and non-defense AI R&D as part of a commitment to double Federal AI and QIS R&D investments by 2022. R&D investments in AI and QIS, in particular, act as innovation multipliers and employment drivers, not only by promoting S&T progress across many disciplines, but also by helping to build a highly-skilled American workforce. Other IotF areas, such as biotechnology and advanced manufacturing, are poised for potentially transformative advances. Together, IotF investments are vital to the Nation's global competitiveness and the health, prosperity, and security of the American people. On February 11, 2019, President Trump issued Executive Order 13859, \"Maintaining American Leadership in Artificial Intelligence,\" launching the American AI Initiative and later that year defined the effort's priority investment areas in The National Artificial Intelligence Research and Development Strategic Plan: 2019 Update . The FY2021 budget states that AI \"is transforming every segment of American life, with applications ranging from medical diagnostics and precision agriculture, to autonomous transportation, job reskilling and upskilling and national defense, and beyond.\" The FY2021 budget includes increases in the AI R&D budget as part of its efforts to double non-defense AI R&D funding by FY2022. The President's proposed AI R&D funding for FY2021 includes A 76% increase in the AI R&D budget of the National Science Foundation to $868 million over the FY2020 level, for AI-related research and the creation of several National AI Research Institutes, in collaboration with USDA, DHS, DOT, and VA. The institutes are to support multisector, multidisciplinary research and workforce efforts among academia, industry, federal agencies, and nonprofits. An additional $100 million for the USDA Agriculture and Food Research Initiative (AFRI) for AI and machine learning research to promote advanced manufacturing in the food and agricultural sciences, as well as to continue efforts in robotics and the application of big data to precision agriculture. $125 million for DOE's Office of Science, a $54 million increase over the FY2020 request. $50 million for NIH research on chronic diseases using AI and related approaches. $459 million for DARPA AI R&D, an increase of $50 million from the FY2020 request. $290 million for DOD's Joint AI Center, up from $242 million in FY2020. The FY2021 budget seeks an increase of more than 50% for federal quantum information science (QIS) funding over the FY2020 budget as part of the Administration's goal of doubling funding for QIS by FY2022. The President's proposed QIS R&D funding for FY2021 includes $230 million for NSF to support the National Quantum Initiative, $120 million above the FY2020 level. $237 million for the DOE Office of Science, an increase of approximately $75 million, for QIS work at the national laboratories and in academia and industry. $25 million for the DOE Office of Science to support early stage research for a quantum internet. Additionally, the budget provides funding for NIST work in QIS standards and engineering efforts in quantum systems; funding for the defense and intelligence community for QIS science and technology, new applications, and industrial engagement; and initial funding for NASA to explore the potential for a space-based quantum entanglement experiment. The President's budget also includes an additional $50 million for NSF, compared to the 2020 budget, for education and workforce development for AI and QIS, with focused outreach efforts to community colleges, Historically Black Colleges and Universities (HBCUs), and Minority Serving Institutions (MSIs). The President's FY2021 budget also highlights investments in national security-related R&D, including more than $59 billion in research, engineering, and prototyping activities in FY2021 to enable advanced military capabilities, including work in \"offensive and defensive hypersonic weapons capabilities, resilient national security space systems, and modernized and flexible strategic and nonstrategic nuclear deterrent capabilities.\" The FY2021 budget request for Department of Homeland Security R&D includes $83 million for detection and defense against radiological, nuclear, chemical, and biological threats; $44 million for improving resilience to natural disasters and physical threats, for first responder technologies and public safety, and for cross-border threat screening and supply chain defense; and $38 million for cybersecurity. The mission of the Department of Defense is to provide \"the military forces needed to deter war and ensure our nation's security.\" Congress supports research and development activities at DOD primarily through the department's Research, Development, Test, and Evaluation (RDT&E) funding. These funds support the development of the nation's future military hardware and software and the science and technology base upon which those products rely. Most of what DOD spends on RDT&E is appropriated in Title IV of the annual defense appropriations bill. (See Table 7 .) Title IV RDT&E funds support activities such as R&D performed by academic institutions, DOD laboratories, and companies, as well as test and evaluation activities at specialized DOD facilities, among other things. However, RDT&E funds are also appropriated in other parts of the bill. For example, RDT&E funds are appropriated as part of the Defense Health Program, the Chemical Agents and Munitions Destruction Program, and the National Defense Sealift Fund. The Defense Health Program (DHP) supports the delivery of health care to DOD personnel and their families. DHP funds (including the RDT&E funds) are requested through the Defense-wide Operations and Maintenance appropriations request. The program's RDT&E funds support congressionally directed research on breast, prostate, and ovarian cancer; traumatic brain injuries; orthotics and prosthetics; and other medical conditions. Congress appropriates funds for this program in Title VI (Other Department of Defense Programs) of the defense appropriations bill. The Chemical Agents and Munitions Destruction Program supports activities to destroy the U.S. inventory of lethal chemical agents and munitions to avoid future risks and costs associated with storage. Funds for this program are requested through the Defense-wide Procurement appropriations request. Congress appropriates funds for this program also in Title VI. The National Defense Sealift Fund supports the procurement, operation and maintenance, and research and development associated with the nation's naval reserve fleet and supports a U.S. flagged merchant fleet that can serve in time of need. In some fiscal years, RDT&E funding for this effort is requested in the Navy's Procurement request and appropriated in Title V (Revolving and Management Funds) of the appropriations bill. RDT&E funds also have been requested and appropriated as part of DOD's separate funding to support efforts in what the George W. Bush Administration termed the Global War on Terror (GWOT) and what the Obama and Trump Administrations have referred to as Overseas Contingency Operations (OCO). In appropriations bills, the term Overseas Contingency Operations/Global War on Terror (OCO/GWOT) has been used; President Trump's FY2021 budget uses the term Overseas Contingency Operations. Typically, the RDT&E funds appropriated for OCO activities go to specified Program Elements (PEs) in Title IV. According to the Comptroller of the Department of Defense, the FY2021 OCO request is divided into two requirement categoriesâdirect and enduring war, and OCO for base requirements. For purposes of this report, these categories of OCO funding requests are reported collectively. In addition, OCO/GWOT-related requests/appropriations have included money for a number of transfer funds. In the past, these have included the Iraqi Freedom Fund (IFF), the Iraqi Security Forces Fund, the Afghanistan Security Forces Fund, and the Pakistan Counterinsurgency Capability Fund. Congress typically has made a single appropriation into each such fund and authorized the Secretary of Defense to make transfers to other accounts, including RDT&E, at his discretion. These transfers are eventually reflected in Title IV prior-year funding figures. For FY2021, the Trump Administration is requesting $106.555 billion for DOD's Title IV RDT&E PEs (base plus OCO), $1.159 billion (1.1%) above the enacted FY2020 level. (See Table 7 .) In addition, the FY2021 request includes $562.5 million in RDT&E through the Defense Health Program (DHP; down $1.744 billion, 75.6% from FY2020), $782.2 million in RDT&E through the Chemical Agents and Munitions Destruction program (down $93.7 million, 10.7% from FY2020), and $1.1 million for the Inspector General for RDT&E-related activities (down $1.9 million, 63.0% from FY2020). The FY2021 budget includes no RDT&E funding via the National Defense Sealift Fund, the same as the FY2020 enacted level. RDT&E funding can be analyzed in different ways. RDT&E funding can be characterized organizationally. Each military department requests and receives its own RDT&E funding. So, too, do various DOD agencies (e.g., the Missile Defense Agency and the Defense Advanced Research Projects Agency), collectively aggregated within the Defense-Wide account. RDT&E funding also can be characterized by budget activity (i.e., the type of RDT&E supported). Those budget activities designated as 6.1, 6.2, and 6.3 (basic research, applied research, and advanced technology development, respectively) constitute what is called DOD's Science and Technology (S&T) program and represent the more research-oriented part of the RDT&E program. Budget activities 6.4 and 6.5 focus on the development of specific weapon systems or components for which an operational need has been determined and an acquisition program established. Budget activity 6.6 provides management support, including support for test and evaluation facilities. Budget activity 6.7 supports the development of system improvements in existing operational systems. Budget activity 6.8 was added in the FY2021 budget and supports software and digital technology pilot programs. Many congressional policymakers are particularly interested in DOD S&T program funding, since these funds support the development of new technologies and the science that underlies them. Some in the defense community see ensuring adequate support for S&T activities as imperative to maintaining U.S. military superiority into the future. The knowledge generated at this stage of development may also contribute to advances in commercial technologies. The FY2021 request for Title IV S&T funding (base plus OCO) is $14.070 billion, $1.991 billion (12.4%) below the FY2020 enacted level. Within the S&T program, basic research (6.1) receives special attention, particularly by the nation's universities, as over half of DOD's basic research budget is spent at universities. The Trump Administration is requesting $2.319 billion for DOD basic research for FY2021, $284.2 million (10.9%) below the FY2020 enacted level. While DOD is not the largest federal funder of basic research, it is a substantial source of federal funds for university R&D in certain fields, such as aerospace, aeronautical, and astronautical engineering (60%); electrical, electronic, and communications engineering (58%); industrial and manufacturing engineering (48%); mechanical engineering (46%); computer and information sciences (44%); metallurgical and materials engineering (39%); and materials science (33%). The mission of the Department of Health and Human Services (HHS) is \"to enhance and protect the health and well-being of all Americans ... by providing for effective health and human services and fostering advances in medicine, public health, and social services.\" This section focuses on HHS research and development funded through the National Institutes of Health (NIH), an HHS agency that accounts for nearly 97% of total HHS R&D funding. Other HHS agencies that support R&D include the Centers for Disease Control and Prevention (CDC), Centers for Medicare and Medicaid Services (CMS), Food and Drug Administration (FDA), Agency for Healthcare Research and Quality (AHRQ), Health Resources and Services Administration (HRSA), and Administration for Children and Families (ACF); additional R&D funding is attributed to departmental management. NIH is the primary agency of the federal government charged with performing and supporting biomedical and behavioral research. It also has major roles in training biomedical researchers and disseminating health information. The NIH mission is \"to seek fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability.\" The agency consists of the NIH Office of the Director (OD) and 27 institutes and centers (ICs). Each IC plans and manages its own research programs in coordination with OD. As shown in Table 8 , separate appropriations are provided to 24 of the 27 ICs, as well as to OD, the Innovation Account (established by the 21 st Century Cures Act in 2016, P.L. 114-255 ), and an intramural Buildings and Facilities account. The other three centers, which perform centralized support services, are funded through transfers from the other ICs. According to NIH, about 10% of the NIH budget supports intramural research projects conducted by the nearly 6,000 NIH federal scientists, most of whom are located on the NIH campus in Bethesda, MD. All research ICs have an intramural research program of varying sizes. More than 80% of NIH's budget goes to the extramural research community in the form of grants, contracts, and other awards. This funding supports research performed by more than 300,000 nonfederal scientists and technical personnel who work at more than 2,500 universities, hospitals, medical schools, and other research institutions. Funding for NIH comes primarily from the annual Labor, HHS, and Education (LHHS) appropriations act, with an additional amount for Superfund-related activities from the Interior/Environment appropriations act. Those two appropriations acts provide NIH's discretionary budget authority. In addition, NIH received mandatory funding of $150 million annually until FY2019 provided in the Public Health Service Act (PHSA), Section 330B, for a special program on type 1 diabetes research. A temporary funding extension has been enacted for FY2020, and under current law, no new funding will be available for this program after May 22, 2020. Some funding is also pursuant to the \"PHS Evaluation Tap\" transfer authority, under Section 241 of the PHS Act (42 U.S.C. Â§238j). This provision allows the Secretary of HHS, with the approval of appropriators, to redistribute a portion of eligible PHS agency appropriations across HHS for program evaluation purposes. Although the PHS Act limits the tap to no more than 1% of eligible appropriations, in recent years, annual LHHS appropriations acts have specified a higher amount (2.5% in FY2020, P.L. 116-94 ) and have typically directed specific amounts of funding from the tap for transfer to a number of HHS programs. The assessment has the effect of redistributing appropriated funds for specific purposes among PHS and other HHS agencies. NIH, with the largest budget among the PHS agencies, has historically been the largest \"donor\" of program evaluation funds; until recently, it had been a relatively minor recipient. Provisions in recent LHHS appropriations acts have directed specific tap transfers to NIH, making NIH a net recipient of tap funds. President Trump's FY2021 budget request would provide NIH with a total program level of $38.694 billion, a decrease of $2.992 billion (-7.2%) from FY2020 enacted levels. The proposed FY2020 program level would be made up of $37.630 billion in LHHS budget authority, $741 million pursuant to the PHS Evaluation Tap authority, $74 million for the Superfund Research Program in Interior/Environment appropriations, and $150 million in proposed annual funding for the mandatory type 1 diabetes program. Under the President's FY2021 request, all existing IC accounts would receive a decrease compared to FY2020 enacted levels (see Table 8 ). The Building and Facilities account would receive an increase in terms of LHHS budget authority, from $200 million in FY2020 to $300 million in FY2021. In addition, the full amount ($404 million) authorized by the 21 st Century Cures Act for FY2021 ( P.L. 114-255 ; see text box ) would be appropriated to the Innovation Account. Additionally, the FY2021 budget request proposes consolidating the Agency for Healthcare Research and Quality (AHRQ) into NIH, forming a 28 th ICâthe National Institute for Research on Safety and Quality (NIRSQ). The creation of a new NIH institute would require amendments to the PHSA, especially Section 401(d), which specifies that \"[i]n the National Institutes of Health, the number of national research institutes and national centers may not exceed a total of 27.\" Under the FY2021 request, NISRQ would receive a total appropriation of $355.1 million, including $256.7 million in discretionary LHHS budget authority and $98.5 million in mandatory appropriations from the Patient-Centered Outcomes Research Trust Fund (PCORTF) in Social Security Act Section 1181. Congress did not adopt the Administration's similar proposals to consolidate AHRQ into NIH as NIRSQ in FY2018, FY2019, or FY2020. Additionally, the budget request proposes select specified FY2021 funding levels for programs and activities within and across the NIH accounts based on the Administration's research priorities. For instance, for FY2021, the Administration's budget proposes specific funding levels for the opioid and methamphetamine epidemic ($1.4 billion across the NIH ICs), a childhood cancer data initiative ($50 million), influenza research ($423 million), and tick-borne diseases research ($115 million), among others. If adopted, these funding levels would likely be specified in report and/or explanatory statement language accompanying LHHS appropriations bills. For the most part, Congress does not specify NIH funding for particular diseases or areas of research, instead allowing the ICs to award funding on a competitive basis through various funding mechanisms intended to balance scientific opportunity with health priorities. The Department of Energy was established in 1977 by the Department of Energy Organization Act ( P.L. 95-91 ), which combined energy-related programs from a variety of agencies with defense-related nuclear programs that dated back to the Manhattan Project. Today, DOE conducts basic scientific research in fields ranging from nuclear physics to the biological and environmental sciences; basic and applied R&D relating to energy production and use; and R&D on nuclear weapons, nuclear nonproliferation, and defense nuclear reactors. The department has a system of 17 national laboratories around the country, mostly operated by contractors, that together account for about 40% of all DOE expenditures. The Administration's FY2021 budget request for DOE includes about $13.853 billion for R&D and related activities, including programs in three broad categories: science, national security, and energy. This request is about 19.1% less than the comparable enacted FY2020 amount of $17.124 billion. (See Table 9 for details.) The request for the DOE Office of Science is $5.838 billion, a decrease of 16.6% from the FY2020 appropriation of $7.000 billion. Funding would decrease for five of the office's six major research programs. In the largest program, Basic Energy Sciences, almost two-thirds of the proposed 16.6% decrease would result from spending less on facility construction. Most of the remainder would result from spending less on existing scientific user facilities, in some cases by reducing hours of operation. Funding for Biological and Environmental Research would decrease by 31.1%, with reductions concentrated in the Earth and Environmental Systems Sciences subprogram as proposed in other recent Administration budgets. Funding for Fusion Energy Sciences would decrease by 36.6%. Within Fusion Energy Sciences, the U.S. contribution to construction of the International Thermonuclear Experimental Reactor (ITER), a fusion energy demonstration and research facility in France, would be $107 million (down from $242 million in FY2020). The one major research program receiving an increase would be Advanced Scientific Computing Research (up 0.8%). Within Advanced Scientific Computing Research, an increase of $109 million for research would be partly offset by a decrease of $81 million for facilities; the Office of Science Exascale Computing Project would receive $169 million, down from $189 million in FY2020. The request for DOE national security R&D is $5.066 billion, an increase of 6.3% from $4.765 billion in FY2020. In Weapons Activities, the request for Stockpile Research, Technology, and Engineering would be an increase of 9.0% above the comparable FY2020 amount. The bulk of the increase would be for Assessment Science ($773 million, up from $595 million in FY2020) and Weapon Technology and Manufacturing Maturation ($298 million, up from $222 million in FY2020). A proposed increase of 7.2% for R&D in the Defense Nuclear Nonproliferation account reflects $40 million requested for a program in National Technical Nuclear Forensics R&D, formerly funded in DHS. The request for DOE energy R&D is $2.949 billion, a decrease of 45.0% from $5.360 billion in FY2020. Many of the proposed reductions in this category are similar to the Administration's FY2019 and FY2020 budget proposals. Funding for energy efficiency and renewable energy R&D would decrease by 70.1%, with reductions in all major research areas and a shift in emphasis toward early-stage R&D rather than later-stage development and deployment. In the Fossil Energy R&D account, an increase of $172 million for Advanced Energy Systems would be largely offset by decreases for carbon capture, utilization, and storage ($123 million, down from $218 million in FY2020), natural gas technologies ($15 million, down from $51 million), and oil technologies ($17 million, down from $46 million). The request for nuclear fuel cycle R&D is $187 million (down from $305 million), and nuclear energy as a whole would decrease by 20.1%, with no funding requested for the Integrated University Program ($5 million in FY2020) or the Supercritical Transformational Electric Power (STEP) R&D initiative ($5 million in FY2020). The Advanced Research Projects Agency-Energy (ARPA-E), which is intended to advance high-impact energy technologies that have too much technical and financial uncertainty to attract near-term private-sector investment, would be terminated. The National Aeronautics and Space Administration (NASA) was created in 1958 by the National Aeronautics and Space Act (P.L. 85-568) to conduct civilian space and aeronautics activities. NASA has research programs in planetary science, Earth science, heliophysics, astrophysics, and aeronautics, as well as development programs for future human spacecraft and for multipurpose space technology such as advanced propulsion systems. In addition, NASA operates the International Space Station (ISS) as a facility for R&D and other purposes. The Administration has requested about $22.243 billion for NASA R&D in FY2021. This would be 14.4% more than the FY2020 level of about $19.439 billion. For a breakdown of these amounts, see Table 10 . NASA R&D funding comes through five accounts: Science; Aeronautics; Space Technology (called Exploration Technology in the Administration's budget request); Exploration (Deep Space Exploration Systems in the request); and the ISS, Commercial Crew, and Commercial Low Earth Orbit (LEO) Development portions of Space Operations (called LEO and Spaceflight Operations in the request). The OMB figures presented in Table 1 indicate a substantially smaller amount for NASA R&D than the figures presented in this section, and a decrease in the FY2021 request relative to FY2020 rather than an increase. The main reason for this appears to be that OMB treats only about half of the Exploration account as R&D (somewhat more than half in FY2020, somewhat less than half in FY2021). As systems being developed under that account move from R&D to testing and ultimately operations, the share of the account spent on R&D may decrease. In order to allow consistent tracking as Congress acts on FY2021 appropriations legislation, this section treats the entirety of the Exploration account as R&D. The FY2021 request for Science is $6.307 billion, a decrease of 11.7% from FY2020. Within this total, funding for Earth Science would decrease by $204 million (10.4%) and funding for Astrophysics would decrease by $475 million (36.4%). In Earth Science, the Administration proposes to terminate the Pre-Aerosol, Clouds, and Ocean Ecosystem (PACE) and Climate Absolute Radiance and Refractivity Observatory (CLARREO) Pathfinder missions ($131 million and $26 million respectively in FY2020). In Astrophysics, it proposes to terminate the Wide Field Infrared Space Telescope (WFIRST) and Stratospheric Observatory for Infrared Astronomy (SOFIA) missions ($511 million and $85 million in FY2020). PACE and CLARREO Pathfinder were also proposed for termination in the FY2018 through FY2020 budgets, and WFIRST was also proposed for termination in the FY2019 and FY2020 budgets, but in each case they were funded by Congress. The Planetary Science request includes $404 million (down from $593 million in FY2020) for a mission to orbit Jupiter's moon Europa. Despite direction otherwise in the FY2020 explanatory statement, the Europa mission would be launched on a commercial rocket and would not include a lander. The FY2021 request for Aeronautics is $819 million, an increase of 4.5% from $784 million in FY2020. As projected in prior budgets, the request includes $79 million for the Low Boom Flight Demonstrator program, intended to demonstrate quiet supersonic flight. The FY2021 request for Exploration Technology (currently Space Technology) is $1.578 billion, an increase of 43.5% from FY2020. The combined RESTORE-L/SPIDER mission to demonstrate in-space satellite servicing and robotic manufacturing would receive $134 million (down from $227 million in FY2020). A newly integrated Space Nuclear Technologies portfolio would receive $100 million for development of space nuclear power and propulsion technologies. The budget justification emphasizes Exploration Technology's support of NASA's Artemis human exploration initiative and its plans for a human lunar landing in 2024. In contrast, FY2020 congressional report language emphasized \"broad technology development goals â¦ independent of mission-specific needs\" ( H.Rept. 116-101 ) and technologies that \"can serve all NASA mission directorates and are not solely focused on enabling human spaceflight\" ( S.Rept. 116-127 ). The FY2021 request for Deep Space Exploration Systems (currently Exploration) is $8.762 billion, an increase of 45.6% from FY2020. Within this account, the request for Exploration Systems Development includes $1.401 billion for the Orion crew capsule (down from $1.407 billion in FY2020) and $2.257 billion for the Space Launch System heavy-lift rocket (SLS, down from $2.586 billion in FY2020). The proposed 228.9% increase for Exploration R&D reflects a request for $3.370 billion for development of a human lunar landing system. Exploration R&D funding would also include $739 million (up from $450 million in FY2020) for development of the Gateway lunar-orbiting platform, intended to support human and robotic missions to the lunar surface. In the LEO and Spaceflight Operations account (currently Space Operations), the request includes $1.401 billion for the ISS; $100 million for the Commercial Crew program (down from $102 million in FY2020); and $150 million for Commercial LEO Development (up from $15 million in FY2020). Commercial crew activities are transitioning from development to operations (which is funded separately); following additional test flights to obtain safety certification from NASA, the first post-certification crewed commercial flight to the ISS is expected during 2020. The Commercial LEO Development program, intended to stimulate a commercial space economy in low Earth orbit, was initiated in the FY2019 budget. The Administration has requested $150 million for it each year since then; Congress has so far appropriated a total of $55 million. The National Science Foundation supports basic research and education in the nonmedical sciences and engineering. Congress established the foundation as an independent federal agency in 1950 and directed it to \"promote the progress of science; to advance the national health, prosperity, and welfare; to secure the national defense; and for other purposes.\" The NSF is a primary source of federal support for U.S. university research, especially in computer science, biology, mathematics and the social and psychological sciences. It is also responsible for significant shares of the federal science, technology, engineering, and mathematics (STEM) education program portfolio and federal STEM student aid and support. NSF has six appropriations accounts: Research and Related Activities (RRA, the main research account), Education and Human Resources (EHR, the main education account), Major Research Equipment and Facilities Construction (MREFC), Agency Operations and Award Management (AOAM), the National Science Board (NSB), and the Office of Inspector General (OIG). Appropriations are generally provided at the account level, while program-specific direction may be included in appropriations acts, or accompanying conference reports or explanatory statements. Funding for R&D is included in the RRA, EHR, and MREFC accounts. (The RRA and EHR accounts also include non-R&D funding.) Together, these three accounts comprise over 95% of the total requested funding for NSF. Actual R&D obligations for each account are known after NSF allocates funding appropriations to specific activities and reports those figures. The budget request specifies R&D funding for the conduct of research, including basic and applied research, and for physical assets, including R&D facilities and major equipment. Funding amounts for FY2019 actual and FY2021 requested levels are reported by account, including amounts for R&D conduct and physical assets where applicable, in Table 11 . Funding for NSF for FY2020 was enacted on December 20, 2019. Funding details below the account level were not available at the time the FY2021 budget request was prepared. Therefore, at the account level, the FY2021 request amounts are compared to the FY2020 enacted amounts, as well as to the FY2019 actual amounts in this analysis; below the account level and for R&D totals, the FY2021 request amounts are compared to FY2019 actual amounts. This section will be updated when FY2020 R&D breakouts and subaccount funding amounts are available for comparison. FY2019 actual, FY2020 enacted, and FY2021 requested amounts are reported by account in Table 11 ; funding for R&D conduct and facilities and equipment is included for FY2021 requested and FY2019 actual amounts. Overall . The Administration is requesting $7.741 billion for the NSF in FY2021, $537 million (6.5%) less than the FY2020 enacted amount, and $409 million (5.0%) less than the FY2019 actual amount. The request would decrease budget authority in all three of the R&D accounts relative to the FY2020 enacted level: RRA by $524 million (7.8%), EHR by $9.1 million (1.0%), and MREFC by $13.5 million (5.5%). Overall, NSF estimates that, under the FY2021 request, agency-wide funding rates (i.e., the percentage of submitted proposals that are successfully awarded funding) would decrease slightly from 27% to 25%, with 500 fewer new competitive awards, compared to FY2019. As a proportion of NSF's total funding, R&D activities account for approximately 80%. For FY2021, $6.33 billion is requested for R&D activities, a 4.8% decrease from FY2019 actual funding for R&D of $6.65 billion. The total request includes $5.80 billion (92%) for the conduct of R&D, and $523 million (8%) for R&D facilities and major equipment. Of funding requested for the conduct of R&D, 86% is requested for basic research, and 14% for applied research. Overall funding for R&D facilities and major equipment supports not only the construction and acquisition phases, funded through MREFC ($230 million requested), but also the planning, design, and postconstruction operations and maintenance, funded through RRA ($293 million requested). Research . The Administration seeks $6.21 billion for RRA in FY2021, a $524 million (7.8%) decrease compared to the FY2020 enacted funding, and a $365 million (5.6%) decrease compared to FY2019 actual funding. Compared to the FY2019 actual levels, the FY2021 request includes decreases for 8 of the 10 RRA subaccounts. The largest percentage decrease would go to the Office of Polar Programs (14.1%, down $69 million). The Computer and Information Science and Engineering (CISE) subaccount would receive the largest dollar increase (7.8%, up $77 million). The FY2021 request also includes $164 million for the RRA Established Program to Stimulate Competitive Research (EPSCoR) program, a $12 million (6.8%) decrease compared to FY2019 actual funding. Within the RRA account, the FY2021 request includes $5.61 billion for R&D, a decrease of $284 million (4.8%) compared to the FY2019 actual amount. Of this amount, the majority ($5.32 billion, 95%) is requested for the conduct of research, including $4.85 billion for basic research and $469 million for applied research. Education . The FY2021 request for the EHR account is $931 million, $9.1 million (1.0%) less than the FY2020 enacted amount and $3.6 million (0.4%) less than the FY2019 actual level. By program division, the Division of Graduate Education would receive an increase of $28.7 million (11.3%) over the FY2019 actual level. The Divisions of Research on Learning in Formal and Informal Settings, and Undergraduate Education would receive decreases of 2.1% ($224 million requested), and 10.7% ($237 million requested), respectively. The Division on Human Resource Development would receive approximately the same amount of funding ($189 million requested). EHR programs of particular interest to congressional policymakers include the Graduate Research Fellowship Program (GRFP) and National Research Traineeship (NRT) programs. The FY2021 request for GRFP is $275 million, a reduction of $9.27 million (3.3%) from the FY2019 actual level. The FY2021 request for NRT is $61.9 million, a $7.78 million increase (14.4%) from FY2019. Within EHR, requested funding for R&D is $485 million, which is $17.9 million (3.8%) more than the FY2019 actual funding amount and accounts for approximately 7.7% of the agency's total R&D request. All of the requested funding would support the conduct of R&D, including $167 million for basic research and $318 million for applied research. Construction . The MREFC account supports large construction projects and scientific instruments, with all of the funding supporting R&D facilities. The construction phases of such large-scale projects tend to span multiple years; therefore, NSF provides out-year estimates of funding for major facilities for the duration of the anticipated timeline, which are updated annually. This section of the analysis includes comparisons to FY2020 estimated funding, based on these projections. The Administration is seeking $230 million for MREFC in FY2021, $13.5 million (5.5%) less than the FY2020 enacted amount, and $55.5 million (19.5%) less than the FY2019 actual amount. Requested MREFC funding would support continued construction of the Vera C. Rubin Observatory ($40.8 million requested, down 12.1% from the FY2020 estimate)âpreviously called the Large Synoptic Survey Telescope (LSST)âand the Antarctic Infrastructure Modernization for Science project (AIMS, $90.0 million requested, down 8.1% from FY2020 estimate). The request includes $33.0 million for upgrades to the Large Hadron Collider in Switzerland, which would represent the second year of a five-year project. Additionally, $65.0 million is requested for Mid-scale Research Infrastructure projects (those projects with funding amounts in the $20 million to $70 million range); this was a new funding line-item in the MREFC account as of FY2020, meant to manage support for upgrades to major facilities and stand-alone projects in this range as a portfolio. Other initiatives . The FY2021 NSF budget request includes funding for multiple agency-wide investments, including the Big Ideas and Convergence Accelerator, as well as three multiagency initiatives. This funding is included in multiple NSF appropriations accounts, and R&D amounts are not separately provided. The Big Ideas, which include six Research and three Enabling Big Ideas, first proposed in 2016, \"endeavor to break down the silos of conventional scientific research â¦ to define and push the frontiers of global science and engineering leadership and to invest in fundamental research.\" Requested funding amounts for each of the Big Ideas compared to the FY2019 actual amounts include the following: Harnessing the Data Revolution for 21 st -Century Science and Engineering (HDR): $45 million requested, up $15 million (50%) from FY2019. The Future of Work at the Human Technology Frontier (FW-HTF): $45 million requested, up $15 million (50%) from FY2019. The Quantum Leap (QL): Leading the Next Quantum Revolution: $50 million requested, up $20 million (67%) from FY2019. Navigating the New Arctic (NNA): $30 million requested, equal to FY2019. Understanding the Rules of Life (URoL): Predicting Phenotype: $30 million requested, equal to FY2019. Windows on the Universe (WoU): The Era of Multi-Messenger Astrophysics: $30 million requested, equal to FY2019. Inclusion across the Nation of Communities of Learners of Underrepresented Discoverers in Engineering and Science (NSF INCLUDES): $18.9 million requested, down $1.3 million (6.3%) from FY2019. Growing Convergence Research at NSF (GCR): $15.2 million requested, down $0.6 million (3.8%) from FY2019. Mid-Scale Research Infrastructure: $97.7 million requested, up $37.6 million (62.7%) from FY2019. The Convergence Accelerator (CA) is an organizational framework that stands separately from the NSF research directorates, with its own budget, staff, and initiatives. Each CA research track will be a time-limited entity focused on specific research topics and themes. Therefore, CA research tracks will evolve over time and will be informed by external stakeholder input. The CA will reward high-risk, innovative thinking by multidisciplinary teams of researchers who want to accelerate discovery and innovation. The CA is a way of achieving rapid lab-to-market or research outcomes. The initial CA research tracks have focused on a subset of the Big Ideas, though the CA investments \"are distinguished from the corresponding Big Ideas by the nature of the research, the time scale of the activities supported, and the more hands-on, agile approach to project management and support that is envisioned [by the CA program].\" NSF has requested $70 million for the CA in FY2021, which is $28.6 million more than the FY2019 actual amount. The budget request states that NSF anticipates financial contributions from external partners to begin in FY2021 (amount unspecified). The budget request also includes three multi-agency initiatives. The National Nanotechnology Initiative would receive $454 million, $67.2 million (12.9%) less than in FY2019. The Networking and Information Technology Research and Development program would receive $1.57 billion, an increase of $151 million (10.7%). The U.S. Global Change Research Program would receive $217 million, $24 million (9.8%) less than in FY2019. The U.S. Department of Agriculture (USDA) was created in 1862 to support agricultural research in an expanding, agriculturally dependent country. Today, USDA conducts intramural research at federal facilities with federally employed scientists and supports extramural research at universities and other facilities through competitive grants and capacity (formula-based) funding. The breadth of contemporary USDA research spans traditional agricultural production practices, organic and sustainable agriculture, bioenergy, nutritional needs and food composition, food safety, animal and plant health, pest and disease management, economic decisionmaking, and other social sciences affecting consumers, farmers, and rural communities. The four agencies of USDA's Research, Education, and Economics (REE) mission area carry out the Department's research and education activities. These agencies are the Agricultural Research Service (ARS), the principal intramural research agency; the National Institute of Food and Agriculture (NIFA), the principal extramural research agency; the National Agricultural Statistics Service (NASS), which undertakes a variety of surveys to capture relevant data; and the Economic Research Service (ERS), which applies economic analysis to a wide range of topics related to food and agriculture. In addition to the four REE agencies, the Office of the Chief Scientist (OCS), a staff office within the Office of the Under Secretary of REE, coordinates science activities across the department. The FY2020 enacted appropriations ( P.L. 116-94 ) provide a total of $3,399.5 million in discretionary spending for the REE agencies. The Administration is requesting a total of $3,248.3 million for these agencies in FY2021, a 4.4% reduction ($151.2 million). The Administration request reflects a reduction of $189.2 million for ARS. The overall reduction also includes proposed decreases in certain activities at NIFA, NASS, and ERS. The Administration is requesting increases for NIFA competitive research grants ($175.0 million) and NASS's Census of Agriculture ($1.0 million). USDA's FY2020 enacted discretionary appropriations and the Administration's FY2021 request for the four research agencies and OCS are discussed below, with funding amounts presented in Table 12 . In addition to discretionary appropriations, agricultural research is funded by state matching contributions and private donations or grants, as well as certain mandatory funding authorized by the 2018 farm bill ( P.L. 115-334 ). The Agricultural Research Service is USDA's in-house basic and applied research agency, and it has major responsibilities for conducting and leading the national agricultural research effort. ARS operates approximately 90 laboratories in the United States and abroad, with about 5,000 permanent employees, including approximately 2,000 research scientists. ARS laboratories focus on efficient food and fiber production, development of new products and uses for agricultural commodities, development of effective controls for pest management, and support of USDA regulatory and technical assistance programs. ARS also operates the National Agricultural Library (NAL). NAL is the world's largest agricultural research library, and is a primary information repository for food, agriculture, and natural resource sciences. For FY2020, P.L. 116-94 provides $1,414.4 million for ARS salaries and expenses, and $192.7 million for buildings and facilities. For FY2021, the Administration is requesting $1,367.9 million for ARS salaries and expenses, a decrease of $46.5 million (3.3%) from the FY2020 appropriation. For FY2021, the request for the buildings and facilities account is $50.0 million, a reduction of $142.7 million (74.1%), from the FY2020 appropriation, largely due to eliminating funds for ARS co-located facilities (as opposed to those facilities owned and operated by ARS). The FY2020 explanatory statement accompanying the FY2020 appropriations bill ( H.R. 1865 ) does not support the Administration's request to terminate or redirect various ARS research programs, and it encourages ARS to fill numerous vacant positions. ARS has been coordinating with the Department of Homeland Security on the new National Bio and Agro-Defense Facility (NBAF), which DHS is constructing to replace the outdated Plum Island Animal Disease Center (PIADC). In January 2019, USDA and DHS signed a Memorandum of Agreement to govern the transition of NBAF from DHS to USDA, with ownership to transfer upon its completion and commissioning in December 2022 . The FY2020 appropriations for ARS provide $13.1 million to address one-time costs associated with the transfer of operations from PIADC to NBAF, in addition to $66.0 million for operations and maintenance, as reported by USDA. For FY2021, the Administration is requesting a total of $81.3 million within ARS Salaries and Expenses for NBAF operations, and maintenance, a $15.3 million increase from the FY2020 appropriation. The FY2021 budget request for ARS also includes an $8 million increase for NBAF research under ARS's livestock research program. The National Institute of Food and Agriculture is USDA's principal extramural research agency. It provides federal funding for research, education, and extension projects conducted in partnership with land-grant colleges and universities (LGUs), State Agricultural Experiment Stations, the Cooperative Extension System, other research and education institutions, private organizations, and individuals. NIFA partnerships include the three types of LGUsâ1862 (original) Institutions, 1890 (historically black) Institutions, and 1994 (tribal) Institutionsâas well as other higher education institutions. Federal funds awarded through NIFA capacity (formula-based) and competitive grants enhance research capacity at these institutions. NIFA headquarters are located in Washington, DC. In October 2019, USDA relocated the majority of NIFA staff positions to Kansas City, MO. For FY2020, P.L. 116-94 provides $1,527.4 million in discretionary funds for NIFA activities. For FY2021, the Administration requests $1,590.8 million, an increase of $63.4 million (4.2%). Research and Education. Hatch Act and Evans-Allen Act funds support capacity grants for research and education activities at 1862 and 1890 Institutions, respectively. For Hatch Act programs, the enacted FY2020 bill provides $259.0 million, and the Administration is requesting $243.2 million for FY2021, a 6.1% reduction. For Evans-Allen programs, the FY2020 appropriation provides $67.0 million, and for FY2021 the Administration is requesting $53.8 million, a 19.7% reduction. For competitive research grants at 1994 Institutions, the FY2020 appropriation provides $3.8 million, and the Administration requests the same funding level for FY2021. For education grant programs for the insular areas and for Alaska native and native Hawaiian-serving institutions, the FY2020 appropriation provides $2.0 million and $3.2 million, respectively. For FY2021, the Administration requests $0 for both programs, and in lieu of these it proposes to create a new, combined program with requested funding of $5.0 million. The McIntire-Stennis program provides capacity funds for forestry research. For FY2020, P.L. 116-94 provides $36.0 million, and for FY2021 the Administration is requesting $28.9 million, a 20% reduction. The Agriculture and Food Research Initiative (AFRI) is USDA's flagship competitive research grants program, and currently represents about 31% of the total of NIFA's discretionary budget. The FY2020 enacted bill provides $425.0 million for AFRI, and the Administration is requesting $600.0 million for FY2021, a 41.2% increase. NIFA also funds the Sustainable Agriculture Research and Education (SARE) program. For FY2020, P.L. 116-94 provides $37.0 million for SARE, and the Administration requests the same level of funding for FY2021. Extension. Smith-Lever Act 3(b) and 3(c) programs provide capacity grants to 1862 Institutions to support cooperative extension. The FY2020 enacted appropriation provides $315.0 million for these programs, and the Administration requests $299.4 million for them in FY2021, a reduction of 4.9%. Smith-Lever 3(d) programs provide competitive grants to 1862, 1890, and 1994 Institutions to support cooperative extension. These programs include grants for food and nutrition education; new technologies for agricultural extension; federally recognized tribes; children, youth, and families at risk; and farm safety education. For FY2020, P.L. 116-94 provides $87.8 million for Smith-Lever 3(d) programs. For FY2021, the Administration is requesting $83.6 million, a reduction of 4.8%. Of this total, $69.0 million would support the Expanded Food and Nutrition Education Program (EFNEP), and $3.0 million would support the Federally-Recognized Tribes Extension Program. The National Agricultural Statistics Service conducts the quinquennial Census of Agriculture and provides official statistics on agricultural production and indicators of the economic and environmental status of the farm sector. NASS is one of the 13 principal statistical agencies of the Federal Statistical System of the United States. For FY2020, P.L. 116-94 provides $180.3 million to NASS, of which up to $45.3 million is reserved to support the Census of Agriculture. The Administration is requesting $177.5 million for NASS in FY2021, of which up to $46.3 million is to support the Census of Agriculture. NASS has begun preparing for the 2022 Census of Agriculture. The explanatory statement accompanying FY2020 appropriations ( H.R. 1865 ) commented on the Administration's FY2020 budget request, rejecting its proposals to eliminate and reduce specific ongoing activities. The Administration's request for FY2021 proposes increases for some programs, as well as reductions for the Acreage, Crop Production, and Grain Stocks program (reduced by $13.2 million) as well as the Chemical Use Program (reduced by $3.5 million). The Economic Research Service supports economic and social science analysis about agriculture, rural development, food, commodity markets, and the environment. It also collects and disseminates data concerning USDA programs and policies. Like NASS, ERS is one of the 13 principal statistical agencies of the Federal Statistical System of the United States. ERS headquarters is located in Washington, DC. In October 2019, USDA relocated the majority of ERS staff positions to Kansas City, MO. For FY2020, P.L. 116-94 provides $84.8 million for ERS activities. The Administration is requesting $62.1 million for FY2021, a 26.7% decrease. The Administration's budget request attributes $11.3 million of this decrease to its proposal to \"discontinue research relative to farm, conservation and trade policy, and returns on investments in agricultural research and development.\" It proposes to eliminate research on special initiatives that include \"research innovations for policy effectiveness, new energy sources ..., local and regional food markets, beginning farmers and ranchers, invasive species, and markets for environmental services.\" The Administration's budget request attributes $8.4 million of this decrease (and 52 staff years) to elimination of some research on food assistance, nutrition, and diet quality. Congress created the Office of the Chief Scientist in 2008 when it established the dual role of the Under Secretary for REE as the USDA Chief Scientist (7 U.S.C. Â§6971). The OCS purpose is to coordinate research programs and activities across USDA. Administratively, because it is situated within the Office of the Under Secretary of REE, OCS is a component of the Office of the Secretary (OSEC). Since its establishment, OCS has not received an independent appropriation. Rather, it has been funded via interagency agreement among the four REE agencies. The FY2021 President's budget request for OSEC includes the first separate request for OCS, in the amount of $6 million and 29 staff years. Two agencies of the Department of Commerce have major R&D programs: the National Institute of Standards and Technology (NIST) and the National Oceanic and Atmospheric Administration (NOAA). The mission of the National Institute of Standards and Technology is \"to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.\" NIST research provides measurement, calibration, and quality assurance methods and techniques that support U.S. commerce, technological progress, product reliability, manufacturing processes, and public safety. NIST's responsibilities include the development, maintenance, and custodial retention of the national standards of measurement; providing the means and methods for making measurements consistent with those standards; and ensuring the compatibility of U.S. national measurement standards with those of other nations. The President is requesting $737.5 million for NIST in FY2021, a decrease of $296.5 million (28.7%) from the FY2020 enacted appropriation of $1,034.0 million. (See Table 13 .) NIST discretionary funding is provided through three accounts: Scientific and Technical Research and Services (STRS), Industrial Technology Services (ITS), and Construction of Research Facilities (CRF). The President's FY2021 request includes $652 million for R&D, standards coordination, and related services in the STRS account, a decrease of $102.0 million (13.5%) from the FY2020 enacted level. According to NIST, the reductions would be necessary to address the President's priorities: To meet the topline funding levels proposed in the FY 2021 President's Budget request and support the Administration's stated priorities for Industries of the Future (IoTF) in quantum information science, artificial intelligence, advanced communications, advanced manufacturing, and biotechnology â¦ NIST will have to make substantial reductions to its current R&D and program portfolio that impact work in advanced materials, physical infrastructure and resilience, and areas across NIST. The funding for the NIST laboratory programs will be reduced by $115.5 million and this reduction proposes the elimination of 391 employees. In particular, the budget proposes funding reductions in the following areas: Advanced Manufacturing and Material Measurements, down $37.5 million (31.3%) from FY2020, including a reduction of 178 positions. Fundamental Measurement, Quantum Science, and Measurement Dissemination, down $17.8 million (9.3%) from FY2020, including a reduction of 73 positions. According to NIST, \"to prioritize work focused on advancing quantum science (including efforts focused on quantum networking) and transforming how NIST disseminates measurements through the NIST-on-A-Chip program, NIST will discontinue several measurement service and dissemination activities that are currently provided to our stakeholders in industry, government and academia.\" Advanced Communications, Networks, and Scientific Data Systems, down $35.8 million (52%) from FY2020, including 83 positions. Health and Biological Systems Measurements, down $3 million (8.6%) from FY2020. Physical Infrastructure and Resilience, down $16.4 million (28%) from FY2020, including 42 positions. NIST User Facilities, down $5 million (9.2%) from FY2020, including 15 positions. NIST is requesting $27.4 million for its Measurement Tools and Testbeds to Power the Industries of the Future (IotF) efforts, to create measurement tools and testbeds to support deployment of IotF technologies at scale. Of these funds, $25 million would support acceleration of the development and adoption of artificial intelligence, $1.4 million would support 5G standards development for telecommunication, and $1 million would support acceleration of efforts to develop profiles for Position, Navigation, and Timing. The FY2021 request would provide $25.3 million for the ITS account, down $136.7 million (84.4%) from the FY2020 enacted level. Within the ITS account, the request would provide no funding for the Manufacturing Extension Partnership (MEP) program, a reduction of $146.0 million from the FY2020 enacted level; MEP centers in each state would be required to become entirely self-supporting. In his FY2019 and FY2020 requests, President Trump also proposed ending federal funding for MEP; in his FY2018 request, the President sought $6.0 million \"for an orderly shutdown of the program.\" The FY2021 request for ITS consists of $25.3 million for Manufacturing USA (also referred to as the National Network for Manufacturing Innovation or NNMI), $9.3 million (58.1%) higher than the FY2020 enacted level of $16.0 million. Of these funds, $11.2 million would be for continued support of NIST's first Manufacturing USA institute, the National Institute for Innovation in Manufacturing Biopharmaceuticals (NIIMBL); $9.1 million would be for the award of a second Manufacturing USA institute; and $5.0 million would be for coordination of the Manufacturing USA network. The President is requesting $60.2 million for the NIST CRF account for FY2021, down $57.8 million (49.0%) from the FY2020 enacted level. Part of the decrease ($36.5 million) in requested FY2021 funding is due to a proposed deferral of safety, capacity, maintenance, and major repairs projects from FY2021 to FY2022. The balance of the decrease would result from the effect of the Administration's proposed new funding approach on the renovation of NIST Building 1, in Boulder, CO. The National Oceanic and Atmospheric Administration conducts scientific research in areas such as ecosystems, atmosphere, global climate change, weather, and oceans; collects and provides data on the oceans and atmosphere; and manages coastal and marine organisms and environments. NOAA was created in 1970 by Reorganization Plan No. 4. The reorganization was intended to unify elements of the nation's environmental programs and to provide a systematic approach for monitoring, analyzing, and protecting the environment. NOAA's administrative structure is organized into six line offices: the National Ocean Service (NOS); National Marine Fisheries Service (NMFS); National Environmental Satellite, Data, and Information Service (NESDIS); National Weather Service (NWS); Office of Oceanic and Atmospheric Research (OAR); and the Office of Marine and Aviation Operations (OMAO). The line offices are supported by an additional office, Mission Support, which provides cross-cutting administrative functions related to education, planning, information technology, human resources, and infrastructure. Congress provides most of the discretionary funding for the line offices and Mission Support through two accounts: (1) Operations, Research, and Facilities, and (2) Procurement, Acquisition, and Construction. In 2010, NOAA published its Next Generation Strategic Plan . The strategic plan is organized into four categories of long-term goals: (1) climate adaptation and mitigation, (2) a weather-ready nation, (3) healthy oceans, and (4) resilient coastal communities and economies. The strategic plan also lists three groups of enterprise objectives related to (1) stakeholder engagement, (2) data and observations, and (3) integrated environmental modeling. The strategic plan serves as a guide for NOAA's R&D plan. The most recent R&D plan was published in 2013, and includes R&D objectives to reach strategic plan goals and objectives and targets to track progress toward R&D objectives over time. NOAA released a draft 2020-2026 R&D plan in June 2019. The draft plan identifies three vision areas: (1) reducing societal impacts from severe weather and other environmental phenomena, (2) sustainable use and stewardship of ocean and coastal resources, and (3) a robust and effective research, development, and transition enterprise. It is unclear when the draft plan will be finalized. For FY2021, President Trump requested $670.3 million in discretionary appropriations for NOAA R&D funding, a decrease of $301.6 million (31%) below the FY2020 enacted level of $972.0 million, and an increase of $19.2 million (3%) from the FY2020 request of $651.1 million. The President's FY2021 request for NOAA R&D was 14.5% of the total FY2021 NOAA requested amount of $4.634 billion. The FY2021 request includes $378.6 million for research (56.5% of the total requested for NOAA R&D), $94.9 million for development (14.1%), and $197.0 million (29.4%) for R&D equipment and facilities. Table 14 provides R&D amounts enacted in FY2020 and requested by the Administration for FY2021. OAR accounts for the majority of NOAA R&D in most years, including FY2021. The Administration requested $352.7 million for OAR R&D in FY2021, a decrease of $199.9 million (36.2%) below the FY2020 enacted funding level of $552.6 million and an increase of $17.6 million (5.3%) from the FY2020 request of $335.1 million. OAR conducts research in three major areas: (1) weather and air chemistry; (2) climate; and (3) oceans, coasts, and the Great Lakes. A significant portion of these efforts is implemented through OAR's laboratories and cooperative research institutes. The President requested $167.6 million for OAR labs and cooperative institutes in FY2021, $16.5 million (8.9%) less than the FY2020 enacted amount of $184.0 million and $2.1 million (1.2%) less than the FY2020 requested amount. Among other R&D activities, the Administration requested to terminate federal support of the National Sea Grant College Program and its related Marine Aquaculture Research program in FY2021, as it had in FY2020. The National Sea Grant College Program is composed of 33 university-based state programs and supports scientific research and stakeholder engagement to identify and solve problems faced by coastal communities. Congress provided $74 million to the National Sea Grant College Program and $13 million to the Marine Aquaculture Research program in FY2020. The Department of Veterans Affairs operates and maintains a national health care delivery system to provide eligible veterans with medical care, benefits, and social support. As part of the agency's mission, it seeks to advance medical R&D in areas most relevant to the diseases and conditions that affect the health care needs of veterans. The President is proposing $1.456 billion for VA R&D in FY2021, an increase of $58 million (4%) from FY2020 enacted levels. (See Table 15 .) According to the President's request, FY2021 strategic priorities for VA R&D include increasing the access of veterans to clinical trials; increasing the transfer and translation of VA R&D; and the effective use of VA data for veterans. Additionally, crosscutting priorities for VA R&D include efforts to treat veterans at risk of suicide and research to address chronic pain and opioid addiction, posttraumatic stress disorder, traumatic brain injury, precision oncology, and Gulf War illness and military exposures. VA R&D is funded through two accountsâthe Medical and Prosthetic Research account and the Medical Care Support account. The Medical Care Support account also includes non-R&D funding, and the amount of funding that will be allocated to support R&D through appropriations legislation is unclear unless funding is provided at the precise level of the request. In general, R&D funding levels from the Medical Care Support account are only known after the VA allocates its appropriations to specific activities and reports those figures. The FY2021 request includes $787 million for VA's Medical and Prosthetic Research account, a decrease of $37 million (5%) compared to FY2020 enacted levels. The request includes $669 million in funding for research supported by the agency's Medical Care Support account, an increase of $21 million (3%) compared to FY2020. The Medical Care Support account provides administrative and other support for VA researchers and R&D projects, including infrastructure maintenance. The Medical and Prosthetics R&D program is an intramural program managed by the Veteran Health Administration's Office of Research and Development (ORD) and conducted at VA Medical Centers and VA-approved sites nationwide. According to ORD, the mission of VA R&D is \"to improve Veterans' health and well-being via basic, translational, clinical, health services, and rehabilitative research and to apply scientific knowledge to develop effective individualized care solutions for Veterans.\" ORD consists of four main research services, each headed by a director: Biomedical Laboratory R&D conducts preclinical research to understand life processes at the molecular, genomic, and physiological levels. Clinical Science R&D supports clinical trials and other human subjects research to determine the feasibility and effectiveness of new treatments such as drugs, therapies, or devices; compare existing therapies; and improve clinical care and practice. Health Services R&D conducts studies to identify and promote effective and efficient strategies to improve the quality and accessibility of the VA health system and patient outcomes, and to minimize health care costs. Rehabilitation R&D conducts research and develops novel approaches to improving the quality of life of impaired and disabled veterans. In addition to intramural support, VA researchers are eligible to obtain funding for their research from extramural sources, including other federal agencies, private foundations and health organizations, and commercial entities. According to the President's FY2021 budget request, these additional R&D resources are estimated at $540 million in FY2021. However, unlike other federal agencies, such as the National Institutes of Health and the Department of Defense, VA does not have the authority to support extramural R&D by providing research grants to colleges, universities, or other non-VA entities. Table 15 summarizes R&D program funding for VA in the Medical and Prosthetic Research and the Medical Care Support accounts. Table 16 details amounts to be spent in Designated Research Areas (DRAs), which VA describes as \"areas of importance to our veteran patient population.\" Funding for research projects that span multiple areas may be included in several DRAs; thus, the amounts in Table 16 total to more than the appropriation or request for VA R&D. The Department of Transportation was established by the Department of Transportation Act (P.L. 89-670) on October 15, 1966. The primary purposes of DOT research and development activities as defined by Section 6019 of the Fixing America's Surface Transportation Act ( P.L. 11 4-94 ) are improving mobility of people and goods; reducing congestion; promoting safety; improving the durability and extending the life of transportation infrastructure; preserving the environment; and preserving the existing transportation system. Funding for DOT R&D is generally included in appropriations line items that also include non-R&D activities. The amount of funding provided by appropriations legislation that is allocated to R&D is unclear unless funding is provided at the precise level of the request. In general, R&D funding levels are known only after DOT agencies allocate their final appropriations to specific activities and report those figures. In FY2021, the Administration is requesting a total of $593.8 million for DOT R&D activities and facilities at the Federal Aviation Administration (FAA), the National Highway Traffic Safety Administration (NHTSA), the Federal Railroad Administration (FRA), the Pipeline and Hazardous Materials Safety Administration (PHMSA), and the Office of the Secretary (OST) (see Table 17 ). The Administration is not requesting funding for DOT R&D activities and facilities associated with the Federal Highway Administration (FHWA), the Federal Transit Administration (FTA), or the Federal Motor Carrier Safety Administration (FMCSA), citing the need for surface transportation reauthorization legislation. In FY2020, three DOT agenciesâFAA, NHTSA, and FHWAâaccounted for nearly 90% of DOT R&D funding. The President's FY2021 request of $446.9 million for R&D activities and facilities at FAA would be a decrease of $86 million (16.1%) from the FY2020 enacted amount. The request includes $170 million for the agency's Research, Engineering, and Development (RE&D) account, a reduction of $22.7 million (11.8%) from FY2020. Funding within the RE&D account seeks to improve aircraft safety through research in fields such as fire safety, advanced materials, propulsion systems, aircraft icing, and continued airworthiness, in addition to safety research related to unmanned aircraft systems and the integration of commercial space operations into the national airspace. The President is requesting $62.9 million in R&D and R&D facilities funding in FY2021 for NHTSA, $15.0 million (19.3%) below FY2020. NHTSA R&D focuses on automation and the study of human machine interfaces, advanced vehicle safety technology, ways of improving vehicle crashworthiness and crash avoidance, reducing unsafe driving behaviors, and alternative fuels vehicle safety. R&D activities are also supported by several other DOT components or agencies (see Table 17 ). The President's FY2021 request includes DOT R&D activities and facilities funding for: the Federal Railroad Administration, totaling $41.0 million, $0.4 million (1.0%) above the FY2020 enacted level of $40.6 million; the Pipeline and Hazardous Materials Safety Administration, totaling $24.5 million, the same amount as FY2020; and the Office of the Secretary, totaling $18.4 million, $8.5 million (31.7%) below the FY2020 level of $27.0 million. The Department of the Interior (DOI) was created to conserve and manage the nation's natural resources and cultural heritage, to provide scientific and other information about those resources, and to uphold \"the nation's trust responsibilities or special commitments to American Indians, Alaska Natives, and affiliated island communities to help them prosper.\" DOI has a wide range of responsibilities, including, among other things, mapping, geological, hydrological, and biological science; migratory bird, wildlife, and endangered species conservation; surface-mined lands protection and restoration; and historic preservation. The Administration is requesting $12.8 billion in net discretionary funding for DOI in FY2021. Of that amount, $725 million is proposed for R&D, $248 million (25%) below the FY2020 estimated level of $973 million. The U.S. Geological Survey (USGS) is the only DOI component that conducts basic research. Funding for DOI R&D is generally included in appropriations line items that also include non-R&D activities. How much of the funding provided in appropriations legislation is allocated to R&D specifically is unclear unless funding is provided at the precise level of the request. In general, R&D funding levels are known only after DOI components allocate their appropriations to specific activities and report those figures. The President's FY2021 request also includes R&D funding for the following DOI components, none of which would receive an increase: Bureau of Reclamation (BOR): $76 million for FY2021, down $39 million (34%) from the FY2020 estimate. Bureau of Ocean Energy Management (BOEM): $93 million for FY2021, down $7 million (7%) from the FY2020 estimate. Fish and Wildlife Service (FWS): $15 million for FY2021, equal to the FY2020 estimate. National Park Service (NPS): $26 million for FY2021, equal to the FY2020 estimate. Bureau of Safety and Environmental Enforcement (BSEE): $25 million for FY2021, down $2 million (7%) from the FY2020 estimate. Bureau of Land Management (BLM): $21 million for FY2021, equal to the FY2020 estimate. Bureau of Indian Affairs (BIA): $5 million for FY2021, equal to the FY2020 estimate. Wildland Fire Management (WFM): No funding requested for R&D for FY2021. Office of Surface Mining Reclamation and Enforcement (OSMRE): $1 million for FY2021, equal to the FY2020 estimate. Table 18 summarizes FY2020 estimated R&D funding and the President's FY2021 R&D funding request for DOI components. The Department of Homeland Security (DHS) has identified five core missions: to prevent terrorism and enhance security, to secure and manage the borders, to enforce and administer immigration laws, to safeguard and secure cyberspace, and to ensure resilience to disasters. New technology resulting from research and development can contribute to achieving all these goals. The Directorate of Science and Technology (S&T) has primary responsibility for establishing, administering, and coordinating DHS R&D activities. Other components, such as the Countering Weapons of Mass Destruction Office, the U.S. Coast Guard, and the Transportation Security Administration, conduct R&D relating to their specific missions. The President's FY2021 budget request for DHS includes $439 million for activities identified as R&D. This would be a reduction of 19.6% from $546 million in FY2020. The total includes $340Â million for the R&D account in the S&T Directorate and smaller amounts for four other DHS components. See Table 19 . The S&T Directorate performs R&D in several laboratories of its own and funds R&D performed by the DOE national laboratories, industry, universities, and others. It also conducts testing and other technology-related activities in support of acquisitions by other DHS components. The Administration's FY2021 request of $340 million for the S&T Directorate R&D account would be a decrease of 19.5% from $422 million in FY2020. Five of the six thrust areas in the S&T Directorate's Research, Development, and Innovation budget line would decrease, by amounts ranging from 18.3% (Cyber Security/Information Analysis) to 32.4% (Chemical, Biological, and Explosives Defense), while funding for the sixth thrust area, Innovative Research and Foundational Tools, would increase by 35.2%. Funding for university centers of excellence would decrease from $37 million in FY2020 to $18 million in FY2021 (Congress rejected a similar proposal in the FY2020 budget). In addition to its R&D account, the S&T Directorate receives funding for laboratory facilities and other R&D-related expenses through two other accounts (not shown in the table). The total request for the directorate is $644 million, a decrease of 12.7% from $737 million in FY2020. The directorate's Procurement, Construction, and Improvements account would receive $19 million in the Administration's request (versus zero in FY2020) for closure of the Plum Island Animal Disease Centerâwhich is being replaced by the National Bio and Agro-Defense Facility (NBAF)âand for preparation of Plum Island itself for sale. The request for R&D in the Countering Weapons of Mass Destruction Office is $58 million, down from $69 million in FY2019. No funding is requested for the National Technical Nuclear Forensics program ($7 million in FY2020), which the Administration is proposing to transfer to the DOE National Nuclear Security Administration. The U.S. Environmental Protection Agency (EPA), the federal regulatory agency responsible for administering a number of environmental pollution control laws, funds a broad range of R&D activities to provide scientific tools and knowledge that support decisions relating to preventing, regulating, and abating environmental pollution. Since FY2006, Congress has funded EPA through the Interior, Environment, and Related Agencies appropriations acts. Appropriations for EPA R&D are generally included in line-items that also include non-R&D activities. Annual appropriations bills and the accompanying committee reports do not identify precisely how much funding provided in appropriations bills is allocated to EPA R&D alone. EPA determines its R&D funding levels in operation through allocating its appropriations to specific activities and reporting those amounts. The agency's Science and Technology (S&T) appropriations account funds much of EPA's scientific research activities, which include R&D conducted by the agency at its own laboratories and facilities, and R&D and related scientific research conducted by universities, foundations, and other nonfederal entities that receive EPA grants. The S&T account receives a base appropriation and a transfer from the Hazardous Substance Superfund (Superfund) account for research on more effective methods for remediating contaminated sites. EPA's Office of Research and Development (ORD) is the primary manager of R&D at EPA headquarters and laboratories around the country, as well as external R&D. A large portion of the S&T account funds EPA R&D activities managed by ORD, including research grants. Programs implemented by other offices within EPA also may have a research component, but the research component is not necessarily the primary focus of the program. As with the President's FY2020 budget request, the FY2021 request proposes reductions and eliminations of funding for FY2021 across a number of EPA programs and activities. The President's FY2021 request includes a total of $6.66 billion for EPA (after rescissions ), $2.40 billion (26.5%) less than the total $9.06 billion FY2020 enacted appropriations (no rescissions ) for EPA provided in Title II of the Further Consolidated Appropriations Act, 2020 ( P.L. 116- 94 ), and $435.6 million (7.0%) more than the FY2020 request of $6.22 billion for EPA (after rescissions ). Reductions proposed in the President's FY2021 request are distributed across EPA operational functions and activities as well as grants for states, tribes, and local governments. With the exception of the Building and Facilities account, the President's FY2021 request proposes funding reductions below FY2020 enacted levels for the nine other EPA appropriations accounts, although funding for some program areas within the accounts would remain constant or increase. Some Members of Congress expressed concerns regarding proposed reductions of funding for EPA scientific research programs during hearings on the President's FY2021 budget request. Similar proposed reductions in the FY2020 budget request were generally not included in the FY2020 enacted appropriations. Including a $19.1 million transfer from the Superfund account, the President's FY2021 budget request proposes $503.8 million for EPA's S&T account, $243.4 million (32.6%) less than the FY2020 enacted $747.2 million for the S&T account provided in P.L. 116-94 , which included a $30.7 million transfer from the Superfund. The FY2021 request would provide an increase of 4.8% for the S&T account compared to the FY2020 request of $480.8 million, which included a $17.8 million transfer from the Superfund account. Table 20 at the end of this section includes the President's FY2021 request for program areas and activities within EPA's S&T account as presented in EPA's FY2021 Congressional Budget Justification compared to the FY2020 enacted appropriations as reported in the Explanatory Statement accompanying P.L. 116-94 that includes the Department of Interior, Environment, and Related Agencies appropriations. House and Senate Appropriations Committee reports and explanatory statements accompanying recent fiscal year EPA proposed and enacted appropriations have not specified funding for all subprogram areas reported in EPA's budget justifications. S&T subprogram areas not directly reported in House and Senate Appropriations Committee reports are noted in Table 20 as \"NR\" (not reported). Additionally, the President's FY2018 through FY2021 budget requests and EPA's associated congressional budget justifications have modified the titles for some of the program areas relative to previous Administrations' budget requests and congressional committee reports' presentations. The House and Senate Appropriations Committees have generally adopted the modified program area titles as presented in the recent budget requests. As shown in Table 20 , with few exceptions the requested FY2021 amount for individual EPA program area and activity line items within the S&T account would be less than the FY2020 enacted appropriations. The FY2021 request did not propose to completely eliminate funding for the broader program areas; however, eliminations (no funding is requested for FY2021) are proposed for line-item activities below the program areas as indicated in Table 20 . These program areas include Atmospheric Protection Program (formerly GHG [greenhouse gas] Reporting Program and Climate Protection Program), Indoor Air Radon Program, and Reduce Risks from Indoor Air. For other program areas, proposed reductions in funding included eliminations of certain activities within those program areas. For example, the proposed reduction in funding for Research: Air and Energy, Research: Safe and Sustainable Water Resources, Research: Sustainable and Healthy Communities, and Research: Chemical Safety and Sustainability program areas for FY2021 included the proposed elimination of funding for the Science to Achieve Results (STAR) program. The FY2020 enacted appropriations for the S&T account included $6.0 million for Research: National Priorities within the S&T account for FY2020, an increase compared to $5.0 million included for FY2019. As in the previous Administration's fiscal year requests, the President's FY2021 budget request did not include funding for Research: National Priorities. The size and structure of the EPA's workforce has been a topic of debate during congressional committee hearings, particularly in recent fiscal years. \"Workforce reshaping\" was introduced in the FY2018 request and described as agency-wide organizational restructuring, \"reprioritization of agency activities,\" and reallocation of resources. Workforce reshaping was most recently proposed in the FY2020 request. As with the FY2018 and FY2019 enacted appropriations, P.L. 116-94 did not fund the President's FY2020 request for EPA workforce reshaping for FY2020. The FY2021 request does not include similar funding for EPA workforce reshaping; however, according to the EPA's FY2021 Congressional budget justification, the number of full-time-equivalents (FTEs) would be reduced from 14,172.0 FTEs in FY2020 to 12,610.2 FTEs in FY2021. Appendix A. Acronyms and Abbreviations Appendix B. CRS Contacts for Agency R&D The following table lists the primary CRS experts on R&D funding for the agencies covered in this report.", "summary": "President Trump's budget request for FY2021 includes approximately $142.2 billion for research and development (R&D) for FY2021, $13.8 billion (8.8%) below the FY2020 enacted level of $156.0 billion. In constant FY2020 dollars, the President's FY2021 R&D request would result in a decrease of $16.6 billion (10.6%) from the FY2020 level. F ederal Research and Development Funding, FY2019-FY2021 In billions of dollars In 2017, the Office of Management and Budget (OMB) adopted a change to the definition of development, applying a more narrow treatment that it describes as \"experimental development.\" This change was intended to harmonize the reporting of U.S. R&D funding data with the approach used by other nations. The new definition is used in this report. Funding for R&D is concentrated in a few departments and agencies. In FY2020, five federal agencies received 93.2% of total federal R&D funding, with the Department of Defense (DOD, 41.4%) and the Department of Health and Human Services (HHS, 26.2%) combined accounting for more than two-thirds of all federal R&D funding. In the FY2021 request, the top five R&D agencies would account for 93.8%, with DOD accounting for 42.1% and HHS for 26.6%. Under the President's FY2021 budget request, nearly all federal agencies would see their R&D funding decline relative to FY2020. The only exception is the Department of Veterans Affairs, which would increase by $38 million (2.9%) in FY2021 to $1.351 billion. The largest dollar reductions in R&D funding would be made to the DOD (down $4.713 billion), the Department of Energy (down $3.168 billion), and HHS (down $2.843 billion). The largest percentage declines in R&D funding would be at the Department of Transportation (down 47.6%), the Environmental Protection Agency (down 35.4%), and Department of the Interior (down 25.5%) The President's FY2021 budget request would reduce funding for basic research by $2.822 billion (6.5%), applied research by $5.125 billion (11.7%), development by $3.466 billion (5.5%), and facilities and equipment by $2.375 billion (39.6%). Several multiagency R&D initiatives continue under the President's FY2021 budget. Some activities supporting these initiatives are discussed in agency budget justifications and are reported in the agency analyses in this report. However, comprehensive aggregate budget information on these initiatives will likely not be available until budget supplements for each are released later in the year. The request represents the President's R&D priorities. Congress may opt to agree with none, part, or all of the request, and it may express different priorities through the appropriations process. In recent years, Congress has completed the annual appropriations process after the start of the fiscal year. Completing the process after the start of the fiscal year and the accompanying use of continuing resolutions can affect agencies' execution of their R&D budgets, including the delay or cancellation of planned R&D activities and the acquisition of R&D-related equipment. It is not yet clear how the national response to the Coronavirus Disease 2019 (COVID-19) pandemic will affect Administration and congressional priorities for FY2021 R&D funding, or the congressional authorization and appropriations processes for enacting that funding.", "document_type": "crs"}
{"report": "This report is an overview of U.S. foreign assistance to the Middle East and North Africa (MENA). It includes a brief historical review of foreign aid levels, a description of specific country programs, and analysis of current foreign aid issues. It also provides analysis of the Administration's FY2021 budget request for State Department and U.S. Agency for International Development (USAID) Foreign Operations and Related Programs (SFOPS) appropriations in the MENA region. Congress authorizes and appropriates foreign assistance and conducts oversight of executive agencies' management of aid programs. As the largest regional recipient of U.S. economic and security assistance ( see Figure 1 below ), the Middle East is perennially a major focus of interest as Congress exercises these powers. The foreign aid data in this report is based on a combination of resources, including USAID's U.S. Overseas Loans and Grants Database (also known as the \"Greenbook\"), appropriations data collected by the Congressional Research Service from the State Department and USAID, data extrapolated from executive branch agencies' notifications to Congress, and information published annually in the State Department and USAID Congressional Budget Justifications. The release of this report has coincided with the global spread of the Coronavirus Disease 2019, or COVID-19 ( see text box below ). The COVID-19 pandemic is expected to affect all MENA countries, and may significantly affect poorer nations that benefit from U.S. and other international assistance. Much of the data presented in this report predates the COVID-19 pandemic. U.S. bilateral assistance to MENA countries is intended to support long-standing U.S. foreign policy goals for the region, such as containing Iranian influence, countering terrorism, preventing the proliferation of weapons of mass destruction, preserving the free-flow of maritime commerce and energy resources, promoting Israeli-Arab peace, and preserving the territorial integrity and stability of the region's states. U.S. foreign assistance (from global accounts/non-bilateral) also is devoted to ameliorating major humanitarian crises stemming from ongoing conflicts in Syria, Yemen, and elsewhere. As in previous years, the bulk of U.S. foreign aid to the MENA region continues to be focused on assistance (mostly military) to three countries: Israel, Egypt, and Jordan. Israel is the largest cumulative recipient of U.S. foreign assistance since World War II. Almost all current U.S. aid to Israel is in the form of military assistance, and U.S. military aid for Israel has been designed to maintain Israel's \"qualitative military edge\" (QME) over neighboring militaries. U.S. military aid to Egypt and Jordan (which have been at peace with Israel since 1979 and 1994, respectively) is designed to encourage continued Israeli-Arab cooperation on security issues while also ensuring interoperability between the United States and its Arab partners in the U.S. Central Command (CENTCOM) area of responsibility. The United States also has provided economic assistance to some MENA countries focusing on education, water, health, and economic growth initiatives. In part, U.S. bilateral economic assistance is premised on the idea that governments across the MENA region have had increasing difficulty meeting the expectations of their young citizens. Public dissatisfaction over quality of life issues and lack of economic opportunities persist in many MENA countries. According to the Arab Youth Survey , the rising cost of living and unemployment are the two main obstacles facing Middle East youth today. Arab Barometer , a U.S.-funded, nonpartisan research network that provides insight into Arab public attitudes, also notes that widespread youth discontent about their economic prospects translates into broad frustration with government efforts to create employment opportunities. In recent years, as popular protests have proliferated across the MENA region, governments have continued to grapple with systemic socioeconomic challenges, such as corruption, over-reliance on oil, inefficient public sectors, low rates of spending on health and education, and soaring public debt. Since 1946, the MENA region has received the most U.S. foreign assistance worldwide, reflecting significant support for U.S. partners in Israel, Egypt, Jordan, and Iraq ( see Figure 2 ). For FY2021, Israel, Egypt, and Jordan combined would account for nearly 13.5% of the total international affairs request. Reducing MENA Aid. For FY2021, the Administration proposes to spend an estimated $6.6 billion on bilateral assistance to the MENA region, a figure that would be nearly equal to the 2020 request but 12% less than what Congress appropriated for 2019 ( see Figure 3 ). In order to achieve this 12% proposed reduction, the Administration's FY2021 request would reduce total military and economic assistance to Iraq, Lebanon, and Tunisia by a combined $544 million. It also seeks to reduce total aid to Jordan by $250 million and, as it did the previous year, does not request Economic Support Fund/Economic Support and Development Fund (ESF/ESDF) for stabilization programs in Syria. In its FY2021 request to Congress, the Administration reiterated from the previous year that it seeks to \"share the burden\" of economically aiding MENA countries with the international community while aiming to build countries' \"capacities for self-reliance.\" Stabilization Support for Iraq, Syria, and Beyond. For FY2021, the Administration is again requesting that Congress provide it flexibility in allowing up to $160 million in funding appropriated to various bilateral aid accounts to be used for the Relief and Recovery Fund (RRF). The RRF is designed to assist areas liberated or at risk from the Islamic State (IS, also known as ISIL, ISIS, or the Arabic acronym Da'esh ) and other terrorist organizations (see \"Potential Foreign Aid Issues for Congress\" below). According to the Congressional Budget Justification (CBJ), \"ESDF funding in the RRF will allow the State Department and USAID to support efforts in places like Syria, Iraq, Libya, and Yemen, where the situation on the ground changes rapidly, and flexibility is required.\" Among other things, funds designated for RRF purposes have supported Iraqi communities through contributions to the United Nations Development Program's Funding Facility for Stabilization (UNDP-FFS). The Trump Administration had ended U.S. contributions to stabilization efforts in Syria, but notified Congress of an intended obligation in 2020 and indicates that it may use FY2021 funds for programs in Syria. No Funds for the Palestinians. For the first time in over a decade, an Administration has not requested any U.S. bilateral economic or security assistance aid for the Palestinians (see \"Potential Foreign Aid Issues for Congress\" section below). The Trump Administration, having clashed repeatedly with Palestinian Authority President Mahmoud Abbas, has significantly reduced bilateral funding to the West Bank and Gaza, and has discontinued contributions to U.N. Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) for Palestinian refugees. Moreover, as a result of provisions in the Anti-Terrorism Clarification Act of 2018 (ATCA, P.L. 115-253 ), no bilateral assistance has been delivered to the Palestinians since January 2019. The Administration did suggest that funds from its re-proposed \"Diplomatic Progress Fund\" ($225 million) could be used to \"resume security assistance in the West Bank\" or support critical diplomatic efforts, such as \"a plan for Middle East peace.\" In FY2020, the Administration requested $175 million in ESDF for the Diplomatic Progress Fund, though Congress did not fund it in the FY2020 Further Consolidated Appropriations Act, P.L. 116-94 (referred to herein as P.L. 116-94 ). Israel is the largest cumulative recipient of U.S. foreign assistance since World War II. To date, the United States has provided Israel $142.3 billion (current, or noninflation-adjusted, dollars) in bilateral assistance and missile defense funding. Almost all U.S. bilateral aid to Israel is in the form of military assistance. In 2016, the U.S. and Israeli governments signed a 10-year Memorandum of Understanding (MOU) on military aid, covering FY2019 to FY2028. Under the terms of the MOU, the United States pledges (pending congressional appropriation) to provide Israel $38 billion in military aid ($33 billion in Foreign Military Financing or FMF grants plus $5 billion in missile defense appropriations). This MOU replaced a previous $30 billion 10-year agreement, which ran through FY2018. Israel is the largest recipient of FMF. For FY2021, the President's request for Israel would encompass approximately 59% of total requested FMF funding worldwide. Israel uses most FMF to finance the procurement of advanced U.S. weapons systems. In March 2020, the Defense Security Cooperation Agency (DSCA) notified Congress of a planned sale to Israel of eight KC-46A Boeing \"Pegasus\" aircraft for an estimated $2.4 billion. According to Boeing, the KC-46A Pegasus is a multirole tanker (can carry passengers, fuel, and equipment) that can refuel all U.S. and allied military aircraft. The Israeli Air Force's current fleet of tankers was originally procured in the 1970s, and it is anticipated that Israel will be able to use the KC-46A to refuel its F-35 fighters. Israel is the first international operator of the F-35 Joint Strike Fighter, the Department of Defense's fifth-generation stealth aircraft considered to be the most technologically advanced fighter jet ever made. After Japan, Israel will become the second foreign user of the KC-46A. Since the 1979 Israeli-Egyptian Peace Treaty, the United States has provided Egypt with large amounts of foreign assistance. U.S. policymakers have routinely justified this aid to Egypt as an investment in regional stability, built primarily on long-running military cooperation and the perceived need to sustain the treaty. Egypt has used FMF to purchase major U.S. defense systems, such as the F-16 fighter aircraft, the M1A1 Abrams battle tank, and the AH-64 Apache attack helicopter. U.S. economic aid to Egypt (funded through ESF) is divided into two components: (1) USAID-managed programs (public health, education, economic development, democracy and governance); and (2) the U.S.-Egyptian Enterprise Fund (EAEF). Since its inception in FY2012, Congress has appropriated $300 million in ESF for the EAEF. Egypt's governance and human rights record has sparked regular criticism from U.S. officials and some Members of Congress (see \"Potential Foreign Aid Issues for Congress\" section below). Since FY2012, Congress has passed appropriations legislation that withholds the obligation of FMF to Egypt until the Secretary of State certifies that Egypt is taking various steps toward supporting democracy and human rights. With the exception of FY2014, lawmakers have included a national security waiver to allow the Administration to waive these congressionally mandated certification requirements under certain conditions. For FY2019, the Trump Administration has obligated $1 billion in FMF for Egypt, of which $300 million in FY2019 FMF remains withheld until the Secretary issues a determination pursuant to Section 7041(a)(3)(B) of P.L. 116-6 , the FY2019 Consolidated Appropriations Act. The Further Consolidated Appropriations Act, 2020 ( P.L. 116-94 ) also withholds $300 million in FMF until a certification or waiver is issued. For the past three fiscal years ( see Table 3 ), Congress has appropriated over $1.4 billion in total bilateral aid for Egypt and has added $30 million to $50 million in ESF above the president's request for USAID programs in Egypt. The Hashemite Kingdom of Jordan is also one of the largest recipients of U.S. foreign aid globally. Like Israel, the United States and Jordan have signed an MOU on foreign assistance, most recently in 2018. The MOU, the third such agreement between the United States and Jordan, commits the United States (pending congressional appropriation) to provide $1.275 billion per year in bilateral foreign assistance over a five-year period for a total of $6.375 billion (FY2018-FY2022). U.S. military assistance primarily enables the Jordanian military to procure and maintain U.S.-origin conventional weapons systems. FMF overseen by the State Department supports the Jordanian Armed Forces' multi-year (usually five-year) procurement plans, while DOD-administered security assistance supports ad hoc defense systems to respond to emerging threats. The United States provides economic aid to Jordan for (1) budgetary support (cash transfer), (2) USAID programs in Jordan, and (3) loan guarantees. The cash transfer portion of U.S. economic assistance to Jordan is the largest amount of budget support given to any U.S. foreign aid recipient worldwide. U.S. cash assistance is provided to help the kingdom with foreign debt payments, Syrian refugee support, and fuel import costs (Jordan is almost entirely reliant on imports for its domestic energy needs). ESF cash transfer funds are deposited in a single tranche into a U.S.-domiciled interest-bearing account and are not commingled with other funds. The U.S. State Department estimates that, since large-scale U.S. aid to Syrian refugees began in FY2012, it has allocated more than $1.3 billion in humanitarian assistance from global accounts for programs in Jordan. The United States funds military, economic, stabilization, and security programs in Iraq, with most assistance funding provided through the Defense Department Counter-ISIS Train and Equip Fund (CTEF). From FY2015 through FY2020, Congress authorized and appropriated more than $6.5 billion in Defense Department funding for train and equip assistance in Iraq. Iraq began purchasing U.S.-origin weapons systems using its own national funds through the Foreign Military Sales program in 2005, and the United States began providing FMF to Iraq in 2012 in order to help Iraq sustain U.S.-origin systems. Between 2014 and 2015, as Iraq and the United States battled the Islamic State throughout northern and western Iraq, FMF funds were \"redirected to urgent counterterrorism requirements\" including ammunition and equipment.\" A $250 million FY2016 FMF allocation subsidized the costs of a $2.7 billion FMF loan to support acquisition, training, and continued sustainment of U.S.-origin defense systems. U.S. economic assistance to Iraq has supported public financial management reform, United Nations-coordinated stabilization programs, and loan guarantees. The Obama Administration and Congress provided a U.S. loan guarantee in 2017 to encourage other lenders to purchase bonds issued by Iraq to cover budget shortfalls. The Trump Administration has directed U.S. stabilization support since 2017 to prioritize programs benefitting persecuted Iraqi religious minority groups. P.L. 116-94 directs stabilization assistance to Anbar province and appropriates bilateral economic assistance, international security assistance, and humanitarian assistance for the Kurdistan Region of Iraq. The act also directs funds to support transitional justice and accountability programs for genocide, crimes against humanity, and war crimes in Iraq. As of early 2020, Tunisia remained the sole MENA country to have made a durable transition to democracy since the 2011 wave of Arab uprisings. U.S. bilateral aid has increased significantly since then, supporting economic growth initiatives, good governance, and security assistance. U.S.-Tunisia security cooperation has expanded since 2011, as Tunisia has sought to maintain its U.S.-origin defense materiel, reform its security institutions, and respond to evolving terrorist threats. The United States has supported Tunisia's security sector reform efforts with $12 million to $13 million per year in State Department-administered funding for law enforcement strengthening and reform. Over the last five years, Congress has appropriated $65 million to $95 million per year in bilateral FMF for Tunisia ( see Table 6 ). DOD has provided substantial additional counterterrorism and border security assistance for Tunisia under its \"global train and equip\" authority (currently, 10 U.S.C. 333) and separate nonproliferation authorities. Since the Trump Administration issued its first aid budget request (for FY2018), Congress has appropriated, on average, $104 million more in bilateral aid to Tunisia each year than the President requested. As part of its justification for requesting global FMF loan authority in FY2021, the Administration cited a \"request from the Government of Tunisia for a $500 million FMF loan to procure U.S.-manufactured light attack aircraft for the Tunisian Armed Forces.\" Congress did not enact FMF loan authority in prior years in response to previous Trump Administration requests. The United States has sought to bolster forces that could help counter Syrian and Iranian influence in Lebanon through a variety of military and economic assistance programs. U.S. security assistance priorities reflect increased concern about the potential for Sunni jihadist groups such as the Islamic State to target Lebanon, as well as long-standing U.S. concerns about Hezbollah and preserving Israel's qualitative military edge (QME). U.S. economic aid to Lebanon seeks to promote democracy, stability, and economic growth, particularly in light of the challenges posed by the ongoing conflict in neighboring Syria. Congress places several certification requirements on U.S. assistance funds for Lebanon annually in an effort to prevent their misuse or the transfer of U.S. equipment to Hezbollah or other designated terrorists. Hezbollah's participation in the Syria conflict on behalf of the Asad government is presumed to have strengthened the group's military capabilities and has increased concern among some in Congress over the continuation of U.S. assistance to the Lebanese Armed Forces (LAF). FMF has been one of the primary sources of U.S. funding for the LAF, along with the Counter-ISIL Train and Equip Fund (CTEF). According to the State Department, between FY2015 and FY2019, security assistance has averaged $224 million annually in combined State Department and Department of Defense military grant assistance. These funds have been used to procure, among other things, light attack helicopters, unmanned aerial vehicles, and night vision devices. The United States has long provided relatively modest amounts of ESF to Lebanon for scholarships and USAID programs. Since the start of the Syrian civil war, U.S. programs have been aimed at increasing the capacity of the public sector to provide basic services to both refugees and Lebanese host communities, including reliable access to potable water, sanitation, and health services. U.S. programs have also aimed to increase the capacity of the public education system to cope with the refugee influx. For FY2021, the President is requesting $133 million in total bilateral aid to Lebanon, which is 46% less than what Congress provided for Lebanon in FY2020. For the past three fiscal years, Congress has appropriated, on average, $113.5 million per year above the President's request. In addition to assistance provided directly to certain countries, the United States provides aid to Middle Eastern countries through regional programs, including the following. Middle East Regional Partnership Initiative (MEPI) . MEPI is an office within the Bureau for Near Eastern Affairs at the State Department that specifically supports political reform, women's and youth empowerment, quality education, and promoting economic opportunity in the Arab world. Since MEPI's inception in 2002, Congress has allocated it an estimated $1.1 billion in ESF. One of MEPI's contributions to U.S. democracy promotion in the Arab world has been to directly fund indigenous nongovernmental organizations (NGOs). MEPI's Local Grants Program awards grants to NGOs throughout the Middle East in order to build capacity for small organizations. However, in countries with legal restrictions prohibiting foreign funding of local NGOs, U.S. officials and grant recipients may weigh the potential risks of cooperation. Between 2011 and 2013, Egypt arrested and convicted local and foreign NGO specialists on election monitoring, political party training, and government transparency in Egypt. Middle East Regional (MER) . A USAID-managed program funded by ESF, MER supports programs that work in multiple countries on issues such as women's rights, public health, water scarcity, and education. For FY2021, the Administration is requesting $50 million in ESF funding for MER. In recent years, USAID has allocated $10 million to $15 million annually for MER. Near East Regional Democracy (NERD) . A State Department-managed program funded through ESF, NERD promotes democracy and human rights in Iran (though there is no legal requirement to focus exclusively on Iran). NERD-funded training (e.g., internet freedom, legal aid) for Iranian activists takes place outside the country due to the clerical regime's resistance to opposition activities supported by foreign donors. For FY2021, the Administration has bundled its NERD request together with MEPI as part of an $84.5 million ESF request for what it calls \"State NEA Regional.\" For FY2020, Appropriators specified $70 million in ESF for NERD ($55 million base allocation plus $15 million to the State Department's Bureau of Democracy, Human Rights, and Labor or DRL) in Division G of the Joint Explanatory Statement accompanying P.L. 116-94 . Middle East Regional Cooperation (MERC). A USAID-managed program funded through ESF, MERC supports scientific cooperation between Israelis and Arabs. First established in an amendment to the Foreign Operations bill in 1979, MERC was designed to encourage cooperation between Egyptian and Israeli scientists. Today, MERC is an open-topic, peer-reviewed competitive grants program that funds joint Arab-Israeli research covering the water, agriculture, environment, and health sectors. For FY2021, the Administration is not requesting any ESF for MERC. Appropriators specified $5 million for MERC in FY2020 appropriations (Division G of the Joint Explanatory Statement accompanying P.L. 116-94 ). Middle East Multilaterals (MEM) . A small State Department-managed program funded through ESF, MEM supports initiatives aimed at promoting greater technical cooperation between Arab and Israeli parties, such as water scarcity, environmental protection, and renewable energy. For FY2021, the Administration is not requesting any ESF for MEM, and the last time the program was allocated funding was in FY2018 ($400,000). Trans-Sahara Counter-Terrorism Partnership (TSCTP) . A State Department-led, interagency initiative funded through multiple foreign assistance accounts (PKO, NADR, INCLE, DA, and ESF), TSCTP supports programs aimed at improving the capacity of countries in North and West Africa to counter terrorism and prevent Islamist radicalization. Three North African countries âTunisia, Algeria, and Moroccoâparticipate in TSCTP; Libya is also formally part of the partnership, but the majority of funding has been implemented in West Africa's Sahel region to date. For nearly a decade, the United States has continued to devote significant amounts of foreign assistance resources toward several major humanitarian crises stemming from ongoing conflicts in Syria, Yemen, and elsewhere ( see Figure 4 ). Since 2010, the United States has provided about $16.4 billion in humanitarian response funding to the Middle East. The United States is the largest donor of humanitarian assistance to the Syria crisis and since FY2012 has allocated more than $10.6 billion to meet humanitarian needs using existing funding from global humanitarian accounts and some reprogrammed funding. According to the United Nations, Yemen's humanitarian crisis is the worst in the world, with close to 80% of Yemen's population of nearly 30 million needing some form of assistance. The United States, Saudi Arabia, the United Arab Emirates, and Kuwait are the largest donors to annual U.N. appeals for aid. Since 2011, the United States has provided over $3 billion in emergency humanitarian aid for Yemen. Most of these funds are provided through USAID's Office of Food for Peace to support the World Food Programme in Yemen. During the government of Iraq's confrontation with the Islamic State , the United States was also one of the largest donors of humanitarian assistance. Since 2014, it has provided more than $2.6 billion in humanitarian assistance for food, improved sanitation and hygiene, and assistance for displaced and vulnerable communities to rebuild their livelihoods. The State Department and USAID provide this humanitarian assistance through implementing partners, including international aid organizations and nongovernmental organizations Humanitarian assistance is primarily managed by USAID's Office of Foreign Disaster Assistance (OFDA), USAID's Office of Food for Peace (FFP), and the U.S. Department of State's Bureau of Population, Refugees, and Migration (State/PRM) using \"global accounts\" (rather than bilateral), such as IDA, FFP, and MRA. Policy changes during the Trump Administration ( see Chronology below ), coupled with legislation passed by Congress, have halted various types of U.S. aid ( see \"U.S. Aid to the Palestinians Since 1950\" Text Box ) to the Palestinians. The Administration withheld FY2017 bilateral economic assistance, reprogramming it elsewhere, and ceased requesting bilateral economic assistance after Palestinian leadership broke off high-level political contacts to protest President Trump's December 2017 recognition of Jerusalem as Israel's capital. In January 2019, after Congress passed the Anti-Terrorism Clarification Act of 2018 (ATCA, P.L. 115-253 ), the Palestinian Authority (PA) ceased accepting any U.S. aid, including security assistance and legacy economic assistance from prior fiscal years. ATCA provided for a defendant's consent to U.S. federal court jurisdiction over the defendant for lawsuits related to international terrorism if the defendant accepted U.S. foreign aid from any of the three accounts from which U.S. bilateral aid to the Palestinians has traditionally flowed (ESF, INCLE, and NADR). The PA made the decision not to accept bilateral aid, most likely to avoid being subjected to U.S. jurisdiction in lawsuits filed by U.S. victims of Palestinian terrorism. Some sources suggested that the Administration and Congress belatedly realized ATCA's possible impact, and began considering how to resume security assistance to the PAâand perhaps other types of aid to the Palestinian peopleâafter the PA stopped accepting bilateral aid in 2019. In December 2019, Congress passed the Promoting Security and Justice for Victims of Terrorism Act of 2019, or PSJVTA as Â§ 903 of the Further Consolidated Appropriations Act, 2020, P.L. 116-94 . PSJVTA changes the legal framework applicable to terrorism-related offenses by replacing the provisions in ATCA that triggered Palestinian consent to personal jurisdiction for accepting U.S. aid. However, because PSJVTA did include other possible triggers of consent to personal jurisdictionâbased on actions that Palestinian entities might find difficult to stop for domestic political reasonsâit is unclear whether the Palestinians will accept this \"legislative fix\" and resume accepting U.S. bilateral aid. Congress also appropriated $75 million in PA security assistance for the West Bank and $75 million in economic assistance in FY2020 ( P.L. 116-94 ), with appropriators noting in the joint explanatory statement that \"such funds shall be made available if the Anti-Terrorism Clarification Act of 2018 is amended to allow for their obligation.\" It is unclear whether the executive branch will implement the aid provisions. The Trump Administration had previously suggested that restarting U.S. aid for Palestinians could depend on a resumption of PA/PLO diplomatic contacts with the Administration. Such a resumption of diplomacy may be unlikely in the current U.S.-Israel-Palestinian political climate, particularly following the January 2020 release of a U.S. peace plan that the PA/PLO strongly opposes and possible discussion of Israeli annexation of parts of the West Bank. The Administration's omission of any bilateral assistanceâsecurity or economicâfor the West Bank and Gaza in its FY2021 budget request, along with its proposal in the request for a $200 million \"Diplomatic Progress Fund\" ($25 million in security assistance and $175 million in economic) to support future diplomatic efforts, may potentially convey some intent by the Administration to condition aid to Palestinians on PA/PLO political engagement with the U.S. peace plan. The Administration also had requested funds for a Diplomatic Progress Fund in FY2020, but Congress instead provided the $150 million in bilateral aid in P.L. 116-94 . Amidst the COVID-19 outbreak, some Members of Congress are concerned that the uncertainty surrounding the status of U.S. aid to the Palestinians may prevent humanitarian aid to combat the disease from reaching the Palestinian population. In late March 2020, several Senators sent a letter to Secretary of State Pompeo urging the Administration \"to take every reasonable step to provide medicine, medical equipment and other necessary assistance to the West Bank and Gaza Strip (Palestinian territories) to prevent a humanitarian disaster.\" In April, the Administration announced that it would provide $5 million in International Disaster Assistance (IDA) to the West Bank as part of its global COVID-19 response. One media report stated that the $5 million in health assistance for hospitals in the West Bank does not \"represent a change of policy regarding aid to the Palestinians, but is rather part of a larger decision to fight the spread of the pandemic across the Middle East, according to sources within the administration.\" Since the United States began providing military assistance to the Lebanese Armed Forces (LAF) following the 2006 summer war between Israel and Hezbollah, policymakers and foreign policy experts have debated the efficacy of such aid. U.S. military commanders have repeatedly testified before Congress that assistance to the LAF helps foster U.S.-Lebanese cooperation and strengthens the Lebanese government's capacity to counter terrorism. On the other hand, critics of such support have charged that U.S. aid to the LAF risks U.S. equipment falling into the hands of Hezbollah or other designated terrorists. They also contend that the LAF, even with U.S. aid, is unable or unwilling to enforce United Nations Security Council Resolution 1701 (passed after the 2006 war), which calls for the \"disarmament of all armed groups in Lebanon.\" More recently, as Hezbollah has played a key role in supporting the Asad regime in Syria, opponents of U.S. aid to Lebanon assert that Hezbollah and the LAF have more closely coordinated militarily and politically along the Lebanese-Syrian border. In 2019, the Trump Administration withheld $105 million in FMF to the LAF as part of a policy review over the efficacy of its military assistance program to Lebanon. In 2019, lawmakers in the House and Senate also introduced the \"Countering Hezbollah in Lebanon's Military Act of 2019,\" ( S. 1886 and H.R. 3331 ) which would withhold 20% of U.S. military assistance to the LAF unless the President can certify that the LAF is taking measurable steps to limit Hezbollah's influence over the force. According to various reports, both the State and Defense Departments opposed the hold on FMF, calling the LAF a stabilizing institution in Lebanon that has served as a U.S. partner in countering Sunni Muslim extremist groups there. On November 8, 2019, Chairman of the House Foreign Affairs Committee Eliot Engel and Chairman of its Subcommittee on the Middle East, North Africa, and International Terrorism Ted Deutch wrote a letter to the Office of Management and Budget agreeing with previous expert testimony by former U.S. officials who praised the LAF's capabilities. In December 2019, the Administration lifted its hold on FMF to Lebanon (DOD aid to Lebanon had not been withheld). The policy debate coincided with mass protests throughout Lebanon, which forced the LAF to deploy in the streets to maintain order. In December 2019, the Government Accountability Office (GAO) issued its review on U.S. security assistance to Lebanon concluding that \"The Departments of State and Defense reported progress in meeting security objectives in Lebanon, but gaps in performance information limit their ability to fully assess the results of security-related activities.\" In January 2020, Lebanon formed a new government, which drew international scrutiny for being composed entirely of parties allied with the March 8 political bloc (headed by the Christian Free Patriotic Movement, Hezbollah, and the Amal Movement). Nevertheless, U.S. Secretary of Defense Mark Esper remarked in February 2020 that \"In terms of security assistance, we've committed a lot to the Lebanese Armed Forces and we will continue that commitment.\" Years of war, corruption, and economic mismanagement have strained Iraq's economy and state finances, leading to widespread popular frustration toward the political system, and culminating in popular protests across central and southern Iraq. The 2019 national budget ran its largest ever one-year deficit, and in 2020, the COVID-19 pandemic and steep declines in world oil prices delivered two additional shocks to Iraq's already stretched fiscal position. Iraqi authorities have expressed confidence in their ability to withstand low oil prices for the short term. However, with approximately 30% of all Iraqi workers employed by the government, some observers express concern that sustained pressure on state finances and economic activity could lead to more intense street violence and unrest, and/or contribute to an Islamic State resurgence. Iraq's draft 2020 budget assumed an oil export price of $56 per barrel. According to one projection from mid-March 2020âwhen prices were less than half that levelâIraq would have been \"likely to earn less than $3 billion per month, given its recent rate of exportsâleaving a monthly deficit of more than $2 billion just to pay current expenditures.\" As of May 2020, it appears that without outside assistance, Iraq will need to draw on reserves (around $65 billion as of early 2020), cut salaries, and/or limit social spending to meet budget needs. International financial institutions (IFIs), such as the International Monetary Fund (IMF), could be one source of external financing for Iraq, but Iraq has not met reform targets set under its last round of agreements with the IMF. From 2016 to 2019, the IMF provided over $5 billion in loans to Iraq to help the country cope with lower oil prices and ensure debt sustainability. Iraq would likely face higher borrowing costs for new sovereign debt offerings, and obtaining commitments from Iraqi authorities as preconditions on further U.S. or IFI support may be complicated by Iraq's contested domestic politics and uncertainty over the future of U.S.-Iraq ties. Secretary of State Michael Pompeo announced on April 7 that U.S. officials would engage Iraqi counterparts in a high-level strategic dialogue in June to address the future of the bilateral partnership, including U.S. assistance and the presence of U.S. forces. U.S. forces consolidated their presence to a reduced number of Iraqi facilities in March and April 2020, and the Administration has informed Congress of reductions in U.S. civilian personnel since 2019. As Congress considers the President's FY2021 budget request for MENA, Members have continued to discuss what the appropriate level of U.S. assistance should be to stabilize and reconstruct areas recaptured from the Islamic State group (IS, aka ISIS/ISIL). Recent U.S. intelligence estimates warn that an IS-fueled insurgent campaign has begun in Syria and Iraq, foresee billions of dollars in reconstruction costs in liberated areas, and suggest that a host of complex, interconnected political, social, and economic challenges may rise from the Islamic State's ashes. According to the International Crisis Group, In the two years since defeating ISIS, the Iraqi government has made only minimal progress rebuilding post-ISIS areas and reviving their local economiesâ¦. There is no reason to assume local resentment will lead residents directly back to ISIS, particularly given their bitter recent experience with the group's rule. Still, both Iraqis and Iraq's foreign partners worry about what might happen if these areas remain ruined and economically depressed. Since FY2017, Congress has appropriated over $1 billion in aid from various accounts (ESF, INCLE, NADR, PKO, and FMF ) as part of a \"Relief and Recovery Fund (RRF)\" to help areas liberated or at risk from the Islamic State and other terrorist organizations. Among several conditions on RRF spending, lawmakers have repeatedly mandated in appropriations language that funds designated for the RRF \"shall be made available to the maximum extent practicable on a cost-matching basis from sources other than the United States.\" Over time, lawmakers have adjusted the RRF's authorities to ensure that assistance be made available for \"vulnerable ethnic and religious minority communities affected by conflict.\" In addition, lawmakers have removed the geographic limitation (Iraq and Syria) on funds appropriated for RRF, and have specified either in bill text or accompanying explanatory statements that RRF funding be made available for Jordan, Tunisia, Yemen, Libya, Lebanon, for countries in East and West Africa, the Sahel, and the Lake Chad Basin region. Congress also has appropriated funding specifically to address war crimes, genocide, and crimes against humanity in Iraq and Syria in recent years, including through the designation of RRF-eligible funds. For stabilization efforts in Iraq, USAID has used ESF and ESF-OCO (Overseas Contingency Operations) funds to contribute to the United Nations Development Program's Funding Facility for Stabilization (FFS). To date, more than $396 million in U.S. stabilization aid has flowed to liberated areas of Iraq, largely through the FFSâwhich remains the main international conduit for post-IS stabilization assistance in liberated areas of Iraq. The Trump Administration also has directed U.S. contributions to the FFS to address the needs of vulnerable religious and ethnic minority communities in Ninewa Plain, western Ninewa, and communities displaced from those areas to other parts of northern Iraq. As U.S. officials continue to seek greater Iraqi and international contributions to stabilization efforts in Iraq, the scale of what is needed to rebuild Iraq has far exceeded international efforts to date. In 2018, experts from the World Bank and the Iraqi government concluded that the country would need $45 billion to repair civilian infrastructure that had been damaged or destroyed since 2014. At the 2018 Kuwait International Conference for Reconstruction of Iraq, the Iraqi government requested $88 billion from the international community for rebuilding efforts â it received pledges of $30 billion. According to one United Nations official, as of late 2019, just over $1 billion in reconstruction pledges have been delivered from donors. Stabilization needs in Syria also are extensiveâthe conflict has entered its tenth year and analysts have estimated that the cost of conflict damage and lost economic activity could exceed $388 billion. The Trump Administration generally has supported stabilization programming in areas of Syria controlled by U.S.-backed Kurdish forces and liberated from the Islamic State, while seeking to prevent such aid from flowing to areas of Syria controlled by the government of Syrian President Bashar al Asad. However, in 2018 and 2019, the Administration sought to shift responsibility for the funding of stabilization activities to other coalition partners. In contrast to prior years, the Administration's FY2020 and FY2021 foreign assistance budget requests have sought no Syria-specific funding, but as noted above, the FY2021 request states that \"ESDF funding in the RRF will allow the State Department and USAID to support efforts in places like Syria\" and other countries. In late 2019, USAID reported that donor funds for stabilization activities in Syria were nearly depleted. In October 2019, the Trump Administration announced that it was releasing $50 million in stabilization funding for Syria to support civil society groups, ethnic and religious minorities affected by the conflict, the removal of explosive remnants, and the documentation of human rights abuses. These funds were notified to Congress in early 2020, and consist primarily of FY2019 ESF-OCO funds, with $14 million in RRF-designated funds from various accounts. The Trump Administration has stated its intent not to contribute to the reconstruction of Asad-controlled areas of Syria absent a political settlement to the country's civil conflict, and to use U.S. diplomatic influence to discourage other international assistance to Asad-controlled Syria. Congress also has acted to restrict the availability of U.S. funds for assistance projects in Asad-held areas. In the absence of U.S. engagement, other actors such as Russia or China could conceivably provide additional assistance for reconstruction purposes, but may be unlikely to mobilize sufficient resources or adequately coordinate investments with other members of the international community to meet Syria's considerable needs. Predatory conditional assistance could also further indebt the Syrian government to these or other international actors and might strengthen strategic ties between Syria and third parties in ways inimical to U.S. interests. A lack of reconstruction, particularly of critical infrastructure, could delay the country's recovery and exacerbate the legacy effects of the conflict on the Syrian population, with negative implications for the country's security and stability. In conducting diplomacy in the Middle East and providing foreign aid to friendly states, it has been an ongoing challenge for the United States to balance short-term national security interests with the promotion of democratic principles. At times, executive branch officials and some Members of Congress have judged that cooperation necessary to ensure stability and facilitate counterterrorism cooperation requires partnerships with governments that do not meet basic standards of democracy, good governance, or respect for human rights. Nevertheless, successive Administrations and Congress also at times have used policy levers, such as conditional foreign aid, to demand changes in behavior from partner governments accused of either suppressing their own populations or committing human rights abuses in military operations. In some instances, policymakers have taken action intended to reinforce democratic principles in U.S.-MENA diplomacy and to comply with U.S. and international law, while preserving basic security cooperation. Examples of provisions of U.S. law that limit the provision of U.S. foreign assistance in instances when a possible gross violation of human rights has occurred include, among others: The Foreign Assistance Act (FAA) of 1961, as amended, contains general provisions on the use of U.S.-supplied military equipment (e.g., Section 502B, Human Rights - 22 U.S.C. 2304). Section 502B(a)(2) of the FAA stipulates that, absent the exercise of a presidential waiver, \"no security assistance may be provided to any country the government of which engages in a consistent pattern of gross violations of internationally recognized human rights.\" The Arms Export Control Act (AECA), as amended, contains several general provisions and conditions for the export of U.S.-origin defense articles that may indirectly address human rights concerns. For example, Section 4 of the AECA (22 U.S.C. 2754) states that defense articles may be sold or leased for specific purposes only, including internal security, legitimate self-defense, and participation in collective measures requested by the United Nations or comparable organizations. Section 3(c)(1)(B) of the AECA (22 U.S.C. 2753(c)(1)(B)) prohibits the sale or delivery of U.S.-origin defense articles when either the President or Congress find that a recipient country has used such articles in substantial violation of an agreement with the United States governing their provision or \"for a purpose not authorized\" by Section 4 of the AECA or Section 502 of the FAA. The \"Leahy Laws\" Section 620M of the FAA (22 U.S.C. 2378d) and 10 U.S.C. 362 prohibit U.S. security assistance to a foreign security force unit when there is credible information that such unit has committed a gross violation of human rights. In addition to the U.S. Code, annual appropriations legislation contains several general and MENA-specific provisions that restrict aid to human rights violators. Recent annual appropriations legislation conditioning U.S. aid to Egypt is one of the more prominent examples of how policymakers have attempted to leverage foreign aid as a tool to promote U.S. values abroad. Section 7041(a) of P.L. 116-94 contains the most recent legislative language conditioning aid to Egypt. The Act includes a provision that withholds $300 million of FMF funds until the Secretary of State certifies that the Government of Egypt is taking effective steps to advance, among other things, democracy and human rights in Egypt. The Secretary of State may waive this certification requirement, though any waiver must be accompanied by a justification to the appropriations committees. Members of Congress and the broader foreign policy community continue to debate the efficacy of using foreign aid as leverage to promote greater respect for human rights in the Middle East and elsewhere. After the January 2020 death of an American citizen incarcerated in Egypt, one report suggests that the State Department's Bureau of Near Eastern Affairs has raised the option of possibly cutting up to $300 million in foreign aid to Egypt. In 2017, the Trump Administration reduced FMF aid to Egypt by $65.7 million, citing \"Egyptian inaction on a number of critical requests by the United States, including Egypt's ongoing relationship with the Democratic People's Republic of Korea, lack of progress on the 2013 convictions of U.S. and Egyptian nongovernmental organization (NGO) workers, and the enactment of a restrictive NGO law that will likely complicate ongoing and future U.S. assistance to the country.\" Appendix A. Common Foreign Assistance Acronyms and Abbreviations", "summary": "Since 1946, the United States has provided an estimated total of $346 billion (obligations in current dollars) in foreign assistance to the Middle East and North Africa (MENA) region. For FY2021, overall bilateral aid requested for MENA countries amounts to $6.6 billion, or about 15% of the State Department's International Affairs budget request. The State Department estimates that the Middle East stands to receive 42% of the geographically specific assistance in the budget request, more than any other region. As in previous years, more than 90% would support assistance for Israel, Egypt, and Jordan. The region also receives a sizable portion of annual emergency humanitarian assistance appropriations, which are not included in the region-specific aid figures. Policy changes during the Trump Administration, coupled with legislation passed by Congress, have halted various types of U.S. aid to the Palestinians. The Administration withheld FY2017 bilateral economic assistance, reprogramming it elsewhere, and ceased requesting bilateral economic assistance after Palestinian leadership broke off high-level political contacts to protest President Trump's December 2017 recognition of Jerusalem as Israel's capital. After Congress passed the Anti-Terrorism Clarification Act of 2018 (ATCA, P.L. 115-253 ), the Palestinian Authority (PA) ceased accepting any U.S. aid in January 2019, including security assistance and legacy economic assistance from prior fiscal years. Amidst the COVID-19 outbreak, some Members of Congress are concerned that, due to the uncertainty surrounding the status of U.S. aid to the Palestinians, humanitarian aid to combat the disease may not reach the Palestinian population. In April, the Administration announced that it would provide $5 million in International Disaster Assistance (IDA) to the West Bank as part of its global COVID-19 response. The foreign aid data in this report is based on a combination of resources, including the U.S. Agency for International Development's (USAID) U.S. Overseas Loans and Grants (also known as the \"Greenbook\"), appropriations data collected by the Congressional Research Service from the State Department and USAID, data extrapolated from executive branch agencies' notifications to Congress, and information published annually in the State Department and USAID Congressional Budget Justifications. For foreign aid terminology and acronyms, see the glossary appended to the report. In order to more accurately compare the Administration's FY2021 foreign assistance request to previous years' appropriations, aid figures in this report (except where otherwise indicated) refer only to funding that is administered by the State Department or USAID and requested for individual countries or regional programs. While this represents the majority of U.S. assistance to the Middle East, it is important to note that there are several other sources of U.S. aid to the region, such as International Disaster Assistance (IDA), Migration and Refugee Assistance (MRA), and Transition Initiatives (TI). Likewise, other U.S. federal entitiesâsuch as the Departments of Defense, Commerce, and the Treasury, and the Millennium Challenge Corporationâadminister additional types of assistance. Funding for such activities is generally not requested for individual countries and regions, and it is largely excluded here. Much of the data presented in this report pre-dates the global spread of the Coronavirus Disease 2019, or COVID-19. All MENA countries, particularly poorer nations that receive foreign assistance, are expected to be affected by the outbreak; however, the extent and scale of the damage to public health and economies across the region is unknown, as is the pandemic's full impact on U.S. aid programs. As of mid-April 2020, the Administration had allocated some emergency humanitarian assistance to the region as a first response to the COVID-19 pandemic. On April 16, the State Department announced that it would provide an estimated $79 million in health assistance to various MENA countries to help prepare laboratory systems, implement a public-health emergency plan for points of entry, and activate case-finding and event-based surveillance for influenza-like illnesses. To date, Congress has appropriated almost $1.8 billion in emergency foreign assistance funds through two supplemental appropriations bills to address the impact of COVID-19. See CRS In Focus IF11496, COVID-19 and Foreign Assistance: Issues for Congress , by Nick M. Brown, Marian L. Lawson, and Emily M. Morgenstern.", "document_type": "crs"}
{"report": "Congress directs the U.S. Environmental Protection Agency (EPA) to implement the Renewable Fuel Standard (RFS)âa mandate that requires U.S. transportation fuel to contain a minimum volume of renewable fuel. Every year obligated parties (including small refiners) demonstrate to EPA their compliance with the mandate. The EPA may grant small refineries an exemption from the RFS for a compliance period, if they can prove compliance would subject them to disproportionate economic hardship. Over the last few years, this programmatic action, once routine, has come under increasing scrutiny from some Members of Congress and stakeholders. The debate regarding small refinery exemptions (SREs) for the RFS has intensified, as both the number of SREs granted and the total exempted volume of gasoline and diesel has increased in recent years. At the core of the SRE policy discussion are three factors: (1) the SRE statutory requirements, (2) the EPA's SRE issuance process, and (3) the impact of SREs on meeting the statutory RFS volume requirements. There are various perspectives about SREs. Some Members of Congress and stakeholders have expressed their dissatisfaction with the SREs granted under the Trump Administration. For example, some biofuel organizations argue that the method used to grant SREs, the number of SREs issued in recent years, and the accounting for the exempted fuel in recent annual rulemakings, have undercut demand for biofuel, created market uncertainty, and violated the statute, among other things. Other Members of Congress and stakeholders contend that SREs alleviate the economic burden of complying with the mandate for some refineries, that SREs do not directly impact biofuel demand, and that SREs are a symptom of a larger policy problem, among other things. This reportâin a question and answer formatâprovides information about SREs for the RFS and discusses related congressional and Executive Branch actions. More specifically, the report provides an overview of small refineries, the small refinery exemption process, challenges to EPA decisions on petitions and to its methodology for evaluating petitions, and gives a synopsis of recent RFS activity, including the new SRE projection methodology finalized by EPA. As discussed later in this report, much of the information about how EPA manages the SRE process is not publicly available because it involves confidential business information (CBI). The information provided in this report is based on a review of the statute and agency materials, as well as general knowledge about the program gleaned from various sources. The report also summarizes congressional bills that address small refinery exemptions and presents other items to consider when discussing small refinery exemptions. The report does not analyze the opportunities and challenges stakeholders may encounter from potential action taken by Congress or the Executive Branch. The following sections respond to 17 frequently asked questions about the RFS and small refinery exemptions. The RFS requires U.S. transportation fuel to contain a minimum volume of renewable fuel. The RFS statute specifies minimum annual volume targets (in billions of gallons)ârequiring 12.95 billion gallons of renewable fuel in 2010 and ascending to 36 billion gallons in 2022 ( Figure 1 ). The EPA Administrator has statutory authority to determine the volume amounts after 2022. The statute outlines the volume requirements in tables for four categories: total renewable fuel, total advanced biofuel, cellulosic biofuel, and biomass-based diesel. Both cellulosic biofuel and biomass-based diesel are a subset of advanced biofuel. Thus, the total renewable fuel statutory volume required for any given year equates to the sum of conventional biofuel (i.e., corn starch-based ethanol, which is unspecified in statute) and advanced biofuel (which is specified in statute). For each year, EPA converts the total volume requirement into a percentage standard that each obligated party must meet (based on projected gasoline and diesel consumption in that year). The statute requires that EPA regulate RFS compliance using a tradable credit system. Obligated parties (generally, refiners and importers) submit creditsâcalled renewable identification numbers (RINs)âto EPA for each gallon in their annual obligation. In short, this annual obligation, referred to as the renewable volume obligation (RVO), is the obligated party's total gasoline and diesel sales multiplied by the annual renewable fuel percentage standards announced by EPA for each category of renewable fuel. The statute gives the EPA Administrator the authority to waive the RFS requirements, in whole or in part, if certain conditions outlined in statute prevail. More specifically, the statute provides a general waiver authority for the overall RFS and waivers for two types of advanced biofuel: cellulosic biofuel and biomass-based diesel. Also, the statute requires that the EPA Administrator modify the applicable volumes of the RFS in 2016 and the years thereafter if certain conditions are met (this action is referred to by some as the RFS \"reset\"). A refinery is a facility that converts raw materials (e.g., crude oil) into finished products (e.g., gasoline). The statute defines a \"small\" refinery as \"a refinery for which the average aggregate daily crude oil throughput for a calendar year (as determined by dividing the aggregate throughput for the calendar year by the number of days in the calendar year) does not exceed 75,000 barrels.\" The statutory definition does not mention ownership. Based on the above definition, a small refinery for the RFS is any refinery that processes no more than about 3.2 million gallons of crude oil each day, or no more than about 1 billion gallons of crude oil per year. An analysis of U.S. Energy Information Administration (EIA) data for refineries based on calendar day operation appears to indicate that there were 53 small refineriesâas defined in the RFS statuteâoperating as of January 1, 2019 ( Figure 2 ). Further, EIA data appears to indicate there is a total of 132 operating refineries overall. Thus, small refineries consist of about 40% of the nation's total number of operating refineries. Additionally, the small refineries comprise about 12% of total crude oil distillation capacity in the United States. A small refinery exemption releases a small refinery from having to comply with the RFS mandate for a given compliance period. The exemption is only applicable to small refineries as defined in statute for the program. The statute mentions two instances whereby EPA may issue a small refinery exemption: (1) a temporary exemption and (2) an extension of the exemption based on disproportionate economic hardship. The latter instance is currently of concern to most stakeholders and is the exemption referred to in this report. The statute required a temporary exemption for all small refineries up until calendar year 2011. EPA then proceeded with an exemption for 21 small refineries for an additional two years, 2011 and 2012, based on the results of a DOE study that these small refineries would suffer a disproportionate hardship if required to participate in the program. For petitions based on disproportionate economic hardship, the small refinery itself must petition the EPA Administrator for an exemption. A small refinery may only petition for an exemption based on the reason of disproportionate economic hardship. The EPA Administrator is to consult with the Secretary of Energy when evaluating a petition. This consultation comes in the form of a DOE recommendation. EPA has the ultimate authority and may accept or reject the DOE recommendation. The statute does not define disproportionate economic hardship, but requires DOE to complete a study to determine if RFS compliance would impose a disproportionate economic hardship on small refineries. DOE reports that Disproportionate economic hardship must encompass two broad components: a high cost of compliance relative to the industry average, and an effect sufficient to cause a significant impairment of the refinery operations. DOE developed a scoring matrix \"to evaluate the full impact of disproportionate economic hardship on small refiners and used to assess the individual degree of potential impairment . \" The matrix consists of disproportionate structural impact metrics (e.g., access to capital) , disproportionate economic impact metrics (e.g., relative refining margin measure) , and viability metrics (e.g., compliance cost eliminates efficiency gains) . Congress addressed disproportionate economic hardship in the Joint Explanatory Statement accompanying the 2016 Consolidated Appropriations Act ( P.L. 114-113 ) by stating tha t \"If the Secretary finds that either of these two components [from the DOE March 2011 Small Refinery Exemption Study] exists, the Secretary is directed to recommend to the EPA Administrator a 50 percent waiver of RFS requirements for the petitioner.\" In report language for the 2017 appropriations bill for EPA , C ongress direct ed EPA to follow DOE's recommendation, and to notify both Congress and DOE if the Administrator disagrees with DOE's waiver recommendation and to deliver such notification 10 days prior to issuing a decision . There are three sections in the statute most relevant to small refinery exemptions: 42 U.S.C. 7545(o)(1)(K), 42 U.S.C. 7545(o)(3)(C), and 42 U.S.C. 7545(o)(9). EPA reports that a petition for a small refinery exemption must specify the factors that demonstrate a disproportionate economic hardship and must provide a detailed discussion regarding the hardship the refinery would face in producing transportation fuel meeting the requirements of Â§80.1405 and the date the refiner anticipates that compliance with the requirements can reasonably be achieved at the small refinery. EPA reports that to fulfill these requirements, companies would likely submit \"company business plans, financial statements, tax filings, communications with potential suppliers or lenders, and other records that demonstrate the petitioner satisfies the underlying substantive requirements to be accorded relief.\" To qualify for an exemption, a refinery must meet the definition of a small refinery for both the calendar year before and during the year for which an exemption is sought. Submissions are not publicly available. EPA addressed the financial and other information required for 2016 RFS small refinery exemption requests. In its memorandum, EPA reports it considers the findings of the DOE Small Refinery Study and a variety of economic factors when evaluating a petition. EPA reports the economic factors include, but are not limited to, profitability, net income, cash flow and cash balances, gross and net refining margins, ability to pay for small refinery improvement projects, corporate structure, debt and other financial obligations, RIN prices, and the cost of compliance through RIN purchases. No. A small refinery may submit a petition to the EPA Administrator for a small refinery exemption at any time. The EPA Administrator is required by statute to act on a petition for a small refinery exemption within 90 days of having received the petition. EPA reports it \"will issue a decision within 90 days of receiving complete supporting information for the request from the small refinery.\" It is unclear what information must be submitted to EPA before the agency considers a petition \"complete.\" There is no deadline as to when or whether EPA must publicly announce its decision. A small refiner must apply separately for an exemption for each compliance year. According to EPA, \"[b]eginning with the 2013 compliance year, small refineries may petition EPA annually for an exemption from their RFS obligations.\" The statute specifies annual renewable fuel volume amounts (in gallons) required for each category in the RFS through 2022. The EPA converts the statutory volumesâor the volumes EPA has finalized using its waiver authorityâinto annual percentage standards to ensure that obligated parties meet the volume amount. Obligated parties use this annual percentage to compute their RVOs. The RVO is the obligated party's total gasoline and diesel sales multiplied by the annual renewable fuel percentage standards announced by EPA plus any deficit of renewable fuel from the previous year. It is the RVO that informs an obligated party how many gallons of the particular renewable fuel type the party must account for in order to be in compliance. The obligated party is then responsible for submitting to EPA credits (i.e., renewable identification numbers or RINs) for each gallon in its RVO. Once all obligated parties have demonstrated compliance by meeting their RVOs, the volume of renewable fuel required to be blended into the nation's transportation fuel supply is met, minus any SREs. The statute contains volume amounts for four fuel categories: total renewable fuel, advanced biofuel, cellulosic biofuel, and biomass-based diesel. Thus, there are four annual percentage standards, one for each renewable fuel category. Accordingly, there are also four RVO calculations. There are six steps to understanding the relationship between an annual standard, an RVO, and RFS compliance: 1. The statute specifies a volume amount for a given year (e.g., 30 billion gallons for total renewable fuel for 2020); 2. EPA announces the final volume requirement which is either (a) the statutory volume amount or (b) a reduced volume requirement based on EPA's waiver authority (e.g., 20.09 billion gallons for total renewable fuel for 2020); 3. EPA issues an annual percentage standard (e.g., 11.56% for total renewable fuel for 2020); 4. The obligated party multiplies the annual percentage standard by its operational sales to compute its RVO for a particular fuel category; 5. The obligated party obtains the RINs needed to meet its RVO; and 6. The obligated party submits its RINs to EPA to demonstrate compliance. Obligated partiesâgenerally, refiners and importersâmust prove compliance with the RFS each year. Obligated parties include small refineries. However, if a small refinery receives a small refinery exemption, it is exempt from complying with the mandate for a given year. EPA reports \"[t]he exempted refinery is not subject to the requirements of an obligated party for fuel produced during the compliance year for which the exemption has been granted.\" The small refineries that receive a small refinery exemption continue their operations, which may include blending renewable fuel and possibly acquiring RINs (which they can bank for future use or trade with other parties). The impact of small refinery exemptions on annual RFS requirements, or RVOs, depends on how much fuel is exempted and when. In general, if a small refinery exemption is granted prior to a final rule setting the annual percentage standards being released, it may be accounted for in the annual percentage standard calculation for that year. If the exemption is granted after the final rule has been released, EPA reports that, under its prior approach, it did not revise its annual percentage standard calculation to account for the later-granted exemptions. The situation where the exemption is not included in the annual percentage calculation is of concern to some stakeholders (e.g., renewable fuel producers) as the renewable fuel volumes for which the small refineries were responsible for are not redistributed to the other obligated parties, and therefore those volumes are not accounted for by the RVOs. For example, in December 2017, EPA set the 2018 total renewable fuel percentage standard at 10.67%. EPA did not include any small refinery exemptions in its percentage standard calculations for 2018. Further, EPA stated that any exemptions granted after 2018 would not be reflected in the 2018 percentage standards. In August 2019, EPA announced 31 small refinery exemptions for 2018. EPA estimates that the 31 exemptions will account for nearly 13.4 billion gallons of gasoline and diesel being exempted for the 2018 compliance period. If EPA were to account for the exempted 13.4 billion gallons, it would lead to a different annual percentage standard than the standard contained in the final rule. The non-exempt obligated parties would be required to meet this different standard. Some refer to this as \"reallocating the waived gallons.\" However, as EPA has implemented the program for 2018, the remaining obligated parties will not have to meet this different standard. Since 2013, the number of small refinery exemptions issued based on disproportionate economic hardship has varied, ranging from 7 to 31 in a given year ( Figure 3 ). EPA reports it has not yet received any SRE petitions for 2020. The statute requires that EPA adjust the annual percentage standard to \"account for the use of renewable fuel during the previous calendar year by small refineries that are exempt under paragraph (9) [Small refineries].\" In 2010, EPA reported that it considers the amount of renewable fuel used in such instance would be negligible and assigns it a value of zero. CAA section 211(o) requires that the small refinery adjustment also account for renewable fuels used during the prior year by small refineries that are exempt and do not participate in the RFS2 program. Accounting for this volume of renewable fuel would reduce the total volume of renewable fuel use required of others, and thus directionally would reduce the percentage standards. However, as we discussed in RFS1, the amount of renewable fuel that would qualify, i.e., that was used by exempt small refineries and small refiners but not used as part of the RFS program, is expected to be very small. In fact, these volumes would not significantly change the resulting percentage standards. Whatever renewable fuels small refineries and small refiners blend will be reflected as RINs available in the market; thus there is no need for a separate accounting of their renewable fuel use in the equations used to determine the standards. We proposed and are finalizing this value as zero. In 2018, EPA stated that, regarding Clean Air Act direction that the agency account for renewable fuel used by exempt small refineries, EPA complies through the RIN trading program. In 2019, EPA further explained that the use of renewable fuel by exempt small refineries is accounted for by the RIN system. That is, since exempt small refineries have no obligation to comply with the applicable percentage standards, they can sell all the RINs associated with any renewable fuel they use. These RINs become part of the overall pool of RINs available to all obligated parties. Thus, no additional adjustment needs to be made to comply with this statutory provision. Some stakeholders argue that the amounts exempted in recent years are not negligible, and that reallocating these exempted volumes (as opposed to accounting for them through the RIN trading program) would lead to total renewable fuel consumption closer to the amount finalized by EPA for that year. Others contend that reallocating small refinery exemptions \"punishes complying parties and creates an unlevel playing field among competing refineries putting additional pressure on the blendwall and increasing the overall cost of the program.\" In recent years, the number of SREs granted and the total exempted volume of gasoline and diesel has changed, which could indicate the old methodology may no longer suffice. In December 2019, EPA issued a final rule that changes how it calculates the annual percentage standard to account for volumes of gasoline and diesel that will be exempted from the renewable volume obligations. In this final rule, EPA adopted the percentage standard calculation change it proposed in October 2019. In the final rule, EPA reports it is finalizing \"a projection methodology based on a 2016â18 annual average of exempted volumes had EPA strictly followed DOE recommendations in those years.â¦\" EPA is to do this by amending two factors in the annual percentage standard calculation from: 1. GE i = the amount of gasoline projected to be produced by exempt small refineries and small refiners, in year i and 2. DE i = the amount of diesel fuel projected to be produced by exempt small refineries and small refiners in year i. to 1. GE i = the total amount of gasoline projected to be exempt in year i, in gallons, per Â§Â§80.1441 and 80.1442 and 2. DE i = the total amount of diesel projected to be exempt in year i, in gallons, per Â§Â§80.1441 and 80.1442. EPA reports this calculation modification leads to higher percentage standards, which \"would have the effect of ensuring that the required volumes of renewable fuel are met when small refineries are granted exemptions from their 2020 obligations after the issuance of the final rule, provided EPA's projection of the exempted volume is accurate.\" Further, EPA reports that \"[b]y projecting exempted volumes in advance of issuing annual standards, we can issue a single set of standards for each year without the need for periodic revisions and the associated uncertainty for obligated parties.\" Lastly, EPA reports thatâfor petitions for 2019 and going forwardâit \"intends to grant relief consistent with DOE's recommendations where appropriate\" (e.g., grant 50% relief where DOE recommends 50% relief). In the past, EPA has granted full exemptions to small refinery petitions where DOE recommended 50% relief. Yes. The legal challenges have generally taken one of two forms: (1) refineries challenging the EPA's denial of an exemption petition or (2) parties challenging EPA's methodology for granting and accounting for small refinery exemptions. As discussed below, individual challenges to EPA's exemption denials have at times succeeded, but courts have generally dismissed methodological challenges on procedural grounds. Several individual refineries have challenged EPA's denials of their exemption petitions. For example, in December 2019 Suncor Energy petitioned for review of its denied exemption petition with the U.S. Court of Appeals for the Tenth Circuit. Refineries have specifically challenged EPA's adoption of DOE's scoring index (as noted in question 4), its reliance on DOE's refinery-specific assessments, and EPA's independent analysis. DOE's scoring matrix assesses whether a small refinery would incur a \"disproportionate economic hardship\" from complying with the RFS standard using two sets of components: disproportionate impacts metrics and viability metrics. Challenges to exemption denials have generally focused on the viability metrics. In general, courts have upheld as reasonable EPA's adoption of the DOE's scoring matrix, including its use of viability as a metric. The D.C. and the Eighth Circuits have each held that EPA reasonably interpreted the statutory phrase \"disproportionate economic hardship\" to require, as reflected in DOE's scoring matrix, that the refinery's viability be affected to demonstrate \"hardship.\" However, the Tenth Circuit subsequently held that EPA cannot give such weight to viability, and particularly to the long-term threat of closure, that it effectively reads \"disproportionate\" out of \"disproportionate economic hardship\" in the statute. Courts have allowed EPA to rely on DOE's assessments but invalidated exemption denials for errors in the refinery-specific analyses. For example, the D.C. Circuit vacated and remanded an exemption denial because EPA's independent analysis contained two miscalculations that could have affected its ultimate decision to deny the exemption petition. Similarly, the Fourth Circuit vacated and remanded an exemption denial after finding that EPA had relied on a DOE assessment that was facially deficient. The court held that while EPA could rely on DOE's assessment and need not conduct its own independent analysis of DOE's conclusions concerning a specific exemption request, EPA cannot \"blindly adopt [those] conclusions\" or rely on a report that is \"facially-flawed.\" Several biofuels associations challenged EPA's decision to grant three small refinery exemption petitions on a number of grounds. The Tenth Circuit vacated EPA's decisions for three reasons. First, the court interpreted the phrase \" extension of the exemption,\" found in the statutory language authorizing small refinery exemption petitions, to require that the small refinery have received the exemption each year to be eligible. Second, the court concluded that EPA erred in its analysis by considering sources of economic hardship other than those associated with RFS compliance. The court held that the statute only allowed the exemption to be granted on the basis of disproportionate economic hardship from RFS compliance, not other economic factors such as a downturn in industry profit margins. Finally, the court held that when evaluating whether a small refinery incurs disproportionate economic hardship from RFS complianceâspecifically from having to purchase RINsâEPA must take into account its position that refineries are able to pass the cost of RINs on to consumers in the fuel's price. The court acknowledged that EPA could either depart from this position, which it has previously taken, with an adequate explanation or could explain why the theory did not apply to the small refinery at issue in the petition. But the court held that failing to address the theory at all or how it affected EPA's analysis was arbitrary and capricious. Parties have raised multiple challenges to how EPA administers the small refinery exemptions. To date, each of these challenges has been dismissed or transferred to another court on procedural grounds without reaching the merits of the parties' arguments. First, in 2018 the Producers of Renewables United for Integrity Truth and Transparency (PRUITT) challenged in the D.C. Circuit how EPA remedied small refinery exemptions it granted on remand after the relevant compliance year had ended. Specifically, PRUITT challenged EPA's decision to issue 2018 RINs to two Wyoming refineries whose 2014 and 2015 exemption petitions were granted after a court vacated and remanded EPA's initial denials in 2017. EPA issued the 2018 RINs to compensate for the 2014 and 2015 RINs that the refineries had retired for compliance before the exemptions were granted. EPA issued 2018 RINs because the 2014 and 2015 RINs the refineries used for compliance had since expired. The D.C. Circuit transferred this portion of the petition to the Tenth Circuit because EPA's issuance of the 2018 replacement RINs to the Wyoming refineries was regionally rather than nationally applicable. Litigation is ongoing. PRUITT also challenged EPA's interpretation of the statutory provision that small refineries \"may at any time petition [EPA] for an extension of the exemption.\" The agency had interpreted that provision to allow it to grant exemptions after it sets the annual standards. The petitioner alleged that EPA violated its statutory duty to ensure the required volumes of renewable fuels are met by granting \"retroactive\" exemptions. The court dismissed this claim for lack of jurisdiction and, accordingly, did not reach the merits of this argument. Rather than challenging EPA's ability to grant exemptions after it sets the annual standards, the National Biodiesel Board (NBB) challenged how EPA accounts for these exemptions as part of the 2018 rulemaking setting the annual standards. EPA adjusts the annual standards for any exemptions granted before the standards are set, which by statute must occur by November 30 th the prior year. But EPA does not account for those exemptions granted later, either by adjusting the standards retroactively or by accounting for them prospectively using projections. NBB alleged that this approach violates the statute because it does not \"ensure\" that the volumes are met. The petitioner argued that EPA should project small refinery exemptions EPA was \"reasonably likely to grant\" after the standards are set, adjust the percentages accordingly, and then adjust for any deficiencies in EPA's projections by incorporating the shortfall into the following year's annual standards. The D.C. Circuit held that NBB had not preserved this challenge to the 2018 rule because it had failed to raise the argument with \"reasonable specificity\" during the public comment period, as the Clean Air Act requires. Although other parties had submitted comments regarding how EPA accounts for small refinery exemption volumes, the court determined that those comments either requested that EPA \"cease granting retroactive exemptions\" or \"adjust the applicable volumes for the same year in which the retroactive exemptions are later granted.\" The court concluded that these comments were sufficiently different from NBB's argument that EPA had not had an opportunity to address the argument in its final rule. Accordingly, the D.C. Circuit held that NBB had forfeited the issue. Finally, based on media reports that EPA was increasing the number of exemptions granted, the American Biofuels Association challenged EPA's \"decision to modify the criteria or lower the threshold by which [it] determines whether to grant small refineries an exemption.\" The number of filed and granted exemptions was not public when the lawsuit was filed. EPA subsequently created a small refinery exemption \"dashboard\" on its website and, in August 2019, issued a formal memorandum documenting its revised standards for granting small refinery exemptions. In the memorandum, EPA explains that it now only requires small refineries to experience either the disproportionate impacts or viability impairment to qualify for the exemption, whereas previously it required small refineries to demonstrate both criteria. In addition, EPA announced that it would grant full waivers when the Department of Energy recommended partial waivers, on the basis that this approach was more consistent with congressional intent. The D.C. Circuit dismissed American Biofuels Association's petition for lack of jurisdiction because the petition was based on a general pattern in agency decisionmaking rather than challenging a particular final agency action as required by the Administrative Procedure Act. The court noted, however, that EPA had acknowledged in oral argument that the August 2019 Memorandum is a final agency action that could be challenged if timely filed. Some members in the 116 th Congress have introduced bills that address small refinery exemptions. Table 1 provides a summary of each bill. The statute gives the EPA Administrator the authority to grant small refinery exemptions, if a small refinery can prove that compliance would subject it to disproportionate economic hardship. Some Members of Congress contend this authority is being applied improperly and could harm rural economies (e.g., biofuel producers). Others contend that the use of the authority protects small refineries and employment in the oil industry. Below are items Congress may consider as it debates EPA's authority to issue small refinery exemptions. Transparency. Information about certain parts of the small refinery exemption process is limited. For example, it is unclear who is applying for an exemption, what specific information is included in an SRE application, or how an application is evaluated. Further, it is not clear if the same criteria to evaluate an application are used consistently year-to-year. Lastly, EPA does not regularly announce when it has issued an SRE. The statute does not require EPA to share such information publicly. EPA considers an SRE application to contain confidential business information as it includes proprietary information which if disclosed could cause harm to the applicant. EPA states that it \"treats both the names of individual petitioners and EPA's decisions on those individual petitions as Confidential Business Information (CBI) under FOIA Exemption 4 (5 U.S.C. Â§Â 522(b)(4)) pending a final CBI determination by the Office of General Counsel.\" With such transparency issues, it could be difficult for Congress to conduct oversight of EPA's authority to grant small refinery exemptions. Application and decision timeline. Small refinery exemptions are not applied for or granted on a schedule. A small refinery may petition the EPA for an exemption at any time. In theory, once an exemption is issued for a certain year, the small refinery is no longer obligated to meet its RVO for that year. In actuality, the small refinery may not be able to receive the benefit of the exemption for the year it was granted (e.g., if an SRE is granted after the end of a compliance period and the small refinery has already complied with its obligation). Instead, in some cases the small refinery has been credited the RINs it retired to demonstrate compliance with the year that was exempted, and it may use those RINs in a future year. Also, it is not clear what information must be submitted to EPA for the agency to consider a petition \"complete\"âwhich would start the 90-day timeline for EPA to make a decision. The current application and decision timeline for small refinery exemptions may contribute to an ultimate annual volume requirement that may not match what was announced in a final rule. Inclusion of SREs in annual standards. The statute requires the EPA Administrator to adjust the percentage standards (i.e., annual volume amounts) for a given year by accounting for renewable fuel from the previous calendar year by small refineries that received an exemption. EPA accounts for volumes attributable to exempt small refineries in its formula for calculating the annual percentage standards. EPA complies with this provision through the RIN trading program. Because SRE petitions can be submitted at any time, EPA has two time periods during which it may address SREs in annual standard calculations: prior to a final rule being issued and after a final rule has been issued. EPA reports in its annual rulemaking if it has approved any SREs prior to issuing a final rule and adjusted its calculation accordingly. For instance, in the 2019 final rule, EPA states: at this time no exemptions have been approved for 2019, and therefore we have calculated the percentage standards for 2019 without any adjustment for exempted volumes. We are maintaining our approach that any exemptions for 2019 that are granted after the final rule is released will not be reflected in the percentage standards that apply to all gasoline and diesel produced or imported in 2019. Since 2011 it has been EPA's policy to not account for the SREs that it issues following the release of a final rule. EPA justifies its position based on the November 30 th statutory deadline for setting annual percentage standards and the need to provide the regulated community with certainty and advance notice of the standards. Based on a review of the RFS final rules from 2014 to the present, most or all SREs have been granted after the November 30 th deadline. In 2019, EPA changed how it calculates the annual percentage standard in order to account for volumes of gasoline and diesel that will be exempted from the renewable volume obligations (see question 14). This may be an issue for Congress if Congress intended small refinery exemptions to be accounted for prior to the release of a final rule. Agency discretion. The statute gives the EPA Administrator certain discretion to evaluate an SRE petition. Data provided by EPA in its small refinery exemption dashboard ( Figure 3 ) suggests the Trump Administration has received more SRE petitions and approved more SREs than the Obama Administration on an annual basis. The extent to which discretion should be a factor in the granting of small refinery exemptions may be an issue for Congress. RFS reset. The statute requires that the EPA Administrator modify the applicable volumes of the RFS in future years starting in 2016 if certain conditions are met (the aforementioned RFS \"reset\"). According to the Office of Management and Budget (OMB), this \"reset\" has been triggered for total renewable fuel, advanced biofuel, and cellulosic biofuel. It is unclear when or how EPA will carry out such a reset. Congress may consider the impact a reset would have on many parts of the RFS, including small refinery exemptions. U.S. gasoline consumption. The RFS is a volume mandate, not a percentage mandate. The statutory renewable fuel volumes required to be blended are not tied to U.S. gasoline consumption rates. A general guideline is that most passenger vehicles in the U.S. are equipped to handle E10 (a fuel mixture comprised of 10% ethanol and 90% gasoline). Some might interpret this passenger vehicle acceptance rate as indicating that renewable fuel production should be about 10% of the conventional fuel market. Others might interpret this as an opportunity to push for more renewable fuel use (e.g., E15 year-round, flex-fuel vehicles). In any case, this means the statutory volumes could call for renewable fuel volume amounts that are out of alignment with actual gasoline consumption. It also means that EPA has the authorityâwhich it has used multiple timesâto reduce the RFS statutory volume amounts to more closely match actual conditions. Gasoline consumption has trended downwards for years for a variety of reasons (e.g., fuel economy standards, behavioral choices, economic conditions) and is currently steady, while the statutory renewable fuel portion trends upwards. In short, if the RFS cannot in real-time respond to gasoline consumption changes, it could be argued that the RFS renewable fuel targets become more difficult for some to achieve. If the targets are more difficult to achieve, RFS compliance may become a concern for some (e.g., an increase in compliance costs). This compliance burden may lead to more small refineries requesting an exemption. This may be an issue for Congress, if Congress wants market conditions, not projections, to play a role in renewable fuel use. ", "summary": "In the Energy Policy Act of 2005 ( P.L. 109-58 ; EPAct05), Congress required the U.S. Environmental Protection Agency (EPA) to implement the Renewable Fuel Standard (RFS)âa mandate that requires U.S. transportation fuel to contain a minimum volume of renewable fuel. Since expansion of the RFS in 2007 under the Energy Independence and Security Act ( P.L. 110-140 ; EISA), Congress has had interest in the RFS for various reasons (e.g., limited cellulosic biofuel production, EPA's use of programmatic waiver authority, and RFS compliance costs). Over the last several months, Congress has expressed repeated interest in small refinery exemptions (SRE) from the RFS. The RFS allows small refineries to receive an exemption from the RFS, if they can prove compliance would subject them to disproportionate economic hardship. There is no statutory definition for disproportionate economic hardship, and a small refinery may apply for an exemption at any time. When deciding whether to grant an exemption, EPA is to consult with the Secretary of Energy. This consultation comes in the form of a recommendation from the Department of Energy (DOE) to EPA. The EPA Administrator has 90 days to act on (i.e., grant or deny) an exemption. A small refinery must apply each year for an exemption from compliance for that year. EPA categorizes the majority of small refinery exemption information as confidential business information (CBI). EPA does make publicly available some exemption information, but only in aggregate (e.g., total number of exemptions granted, total exempted volume of gasoline and diesel); there are no publicly available data on individual SREs. There have been legal challenges about small refinery exemptions. Small refineries can and have challenged EPA's denials of their petitions for SREs in court. Various stakeholders have also challenged EPA's methodology for evaluating small refinery exemption petitions. In 2020, the Tenth Circuit vacated EPA's decision to grant three small refinery exemption petitions. It is unclear how this court decision will affect how EPA evaluates SRE petitions in the future. Congress may be interested in small refinery exemptions for multiple reasons. Foremost, Congress may seek clarification on how EPA is currently evaluating SRE petitions, and whether that has changed over time. Some in Congress have raised concerns over transparency in EPA's decision process on SREs, as there is limited public information on the process. Congress may also value additional information about how SREs are being accounted for in annual rulemakings for the RFS. Each year, EPA issues a final rule for the RFS with the coming year's volume requirements (e.g., EPA is to issue the 2021 volume requirements by November 30, 2020). This final rule contains percentage standards thatâonce obligated parties (e.g., refiners and importers) apply them to their gasoline and diesel salesâare intended to ensure the volumes required are met. The formula for calculating the annual percentage standard includes a variable that accounts for small refinery exemptions granted by the time of the rulemaking. Depending on when the small refinery exemption is grantedâprior to the release of a final rule or afterâthat exemption may or may not be accounted for in the annual percentage standard (to date, most SREs have been granted afterward). In December 2019, EPA announced that it will change how it calculates the annual percentage standard in order to account for volumes of gasoline and diesel that will be exempted from the renewable volume obligations. The impact small refinery exemptions have on the RFS depends on the number of SREs granted, when they are granted, and the amount of gasoline and diesel exempted. Congress may consider several items as it seeks to understand the impact of SREs on the RFS, including transparency, agency discretion, a potential RFS reset, and U.S. gasoline consumption.", "document_type": "crs"}
{"report": "Coal mining and production in the United States during in the 20 th century contributed to the nation meeting its energy requirements and left a legacy of unreclaimed lands. Prior to the enactment of the Surface Mining Control and Reclamation Act in 1977 (SMCRA; P.L. 95-87 ), no federal law had authorized reclamation requirements for coal mining operators to restore lands and waters affected by mining practices. Title IV of SMCRA established the Abandoned Mine Lands (AML) program to address the public health, safety, and environmental hazards at these legacy abandoned coal mining sites. The objective of reclamation under Title IV of SMCRA is to restore lands or waters adversely affected by past coal mining to a condition that would mitigate potential hazards to public health, safety, and the environment. The actions necessary to attain these objectives may vary from site to site depending on the nature of the hazards and the technical or engineering feasibility of reclamation alternatives to mitigate the hazards. The severity of the hazard would also determine the prioritization of funding for reclamation. Examples of reclamation activities include removing or stabilizing coal mining waste piles, re-contouring and re-vegetating affected lands, mitigating the potential for subsidence, filling voids or sealing tunnels, and treating acid mine drainage. The costs to complete reclamation at a particular site would depend on the scope and nature of actions necessary to mitigate the potential hazards and any technical or engineering challenges to implement the selected actions. The Abandoned Mine Reclamation Fund, established under Section 401 of SMCRA, provides funding to eligible states and tribes for the reclamation of surface mining impacts associated with historical mining of coal. Title IV of SMCRA applies only to sites that were abandoned or left unreclaimed prior to the enactment of SMCRA on August 3, 1977, and for which there is no continuing reclamation responsibility under other federal or state law. SMCRA also established the Office of Surface Mining Reclamation and Enforcement (OSMRE) in the Department of the Interior. OSMRE is the federal office responsible for administering SMCRA in coordination with eligible states and tribes. The balance of the Abandoned Mine Reclamation Fund is provided by fees collected on coal mining operators in coal producing states. The fee rates in current law are based on a per-ton fee for the volume of coal produced at a mine annually or the percentage value of the coal produced at a mine, whichever is less each year as determined by the Secretary of the Interior. SMCRA authorizes annual grants to eligible states and tribes for the reclamation of abandoned coal mining sites. SMCRA also authorizes two sources of federal financial assistance to three United Mine Workers of America (UMWA) coal mineworker health benefits plans and the UMWA pension plan. These federal payments augment employer contributions to these plans. Interest transfers from the Abandoned Mine Reclamation Fund have supported the UMWA health benefit plans since FY1996, supplemented by payments from the General Fund of the U.S. Treasury since FY2008. As amended in the 116 th Congress, SMCRA authorizes additional General Fund payments to support the UMWA pension plan. The coal reclamation fee collection authorization is set to expire at the end of FY2021 absent the enactment of legislation extending the sunset date. If the authority to collect reclamation fees is not reauthorized, SMCRA directs the remaining balance of the fund to be distributed among states and tribes receiving grants from the Abandoned Mine Reclamation Fund based on the FY2022 grant amounts. The FY2022 grant amounts would depend on the fees collected in FY2021, and payments from the fund would begin in FY2023, continuing annually until the balance has been expended. Given that scenario, reclamation grants to eligible states would continue for some years. This report discusses funding for eligible states and tribes, reclamation priorities, annual receipts and appropriations, reauthorization issues, and other related bills that would authorize the use of the existing balance of the fund. This report does not discuss issues associated with Title V of SMCRA, which authorized the regulation of coal mining sites operating after the law's enactment. SMCRA requires coal mining operators regulated under Title V to be responsible for providing financial assurance for completing site reclamation. Coal mining sites regulated under SMCRA after August 3, 1977, are ineligible for grants from the Abandoned Mine Reclamation Fund. If financial assurances are inadequate to meet reclamation needs, the availability of federal funding to pay reclamation costs would be subject to the enactment of legislation. Section 401 of SMCRA established the Abandoned Mine Reclamation Fund as a trust fund within the U.S. Treasury. As enacted in 1977, SMCRA originally did not authorize the Abandoned Mine Reclamation Fund as an interest-bearing trust fund. The Abandoned Mine Reclamation Act of 1990 amended SMCRA for various purposes and authorized the investment of the unexpended balance of the Abandoned Mine Reclamation Fund in U.S. Treasury securities. The portion of the balance available for investment in U.S. Treasury securities is the amount that the Secretary of the Interior determines is not needed to meet current withdrawals. Interest began accruing on the invested balance in FY1992. Receipts credited to the Abandoned Mine Reclamation Fund are sourced from fees collected from coal mining operators based on coal production. The coal reclamation fee rates are authorized in Section 402 of SMCRA. The fees are specified in current law and based on a per-ton fee for the amount of coal produced at a mine annually or the percentage value of the coal produced annually at a mine, whichever is less each year as determined by the Secretary of the Interior. The fees are 28 cents per ton of coal produced by surface mining, 12 cents per ton of coal produced by underground mining, or 10% of the value of the coal, whichever is less. The fee for lignite coal is different from non-lignite coal and is 8 cents per ton or 2% of the value of the coal, whichever is less. Congress decreased the fee rates authorized in the original enactment of SMCRA to these fee rates in the 2006 amendments to SMCRA. Annual receipts credited to the Abandoned Mine Reclamation Fund from these fees therefore depend on the fee rates applied to the amount or value of coal production each year. SMCRA does not set or guarantee any particular amount of receipts on an annual basis. Regardless of the fee rates, this framework may result in receipts fluctuating annually with changes in the amount or value of coal production in the United States. Coal reclamation fees generally increased until FY2007, after which the trend in fee revenue decreased from FY2008 to FY2019. During these years, coal reclamation fees collected by OSMRE decreased by approximately 49% in nominal dollars (i.e., without adjusting for inflation) ( Figure 1 ). U.S. coal production declined during that same time period by approximately 34%. While the nominal coal reclamation fees collected peaked in FY2007, the inflation-adjusted value of the coal reclamation fees have generally decreased since FY1979. The extent to which the reduced fee rates in 2006 contributed to the decline in fee receipts during this time period would depend on whether the fee receipts were based on the tonnage or value of coal produced. Section 404 of SMCRA limits eligible lands and waters affected by coal mining to those left abandoned or unreclaimed prior to August 3, 1977, and for which there is no continuing reclamation responsibility under other federal or state laws. U.S. territories, states, and tribes without such lands and waters are excluded from eligibility for grants from the Abandoned Mine Reclamation Fund. The reclamation and regulatory programs authorized in SMCRA apply only to coal production states and tribal lands, and coal has not been mined in all states, U.S. territories, and tribal lands. States and tribes with lands on which coal was mined prior to the enactment of SMCRA on August 3, 1977, with an OSMRE-approved reclamation program are eligible for grants from the Abandoned Mine Reclamation Fund pursuant to Section 401 of SMCRA. SMCRA describes differing types and priorities of AML reclamation projects eligible for reclamation funding from the Abandoned Mine Reclamation Fund. Examples of eligible AML projects include the reclamation of land subsidence, vertical openings, hazardous equipment and facilities, dangerous highways, and acid mine drainage (AMD) that originated from historical coal mining operations. Section 403 of SMCRA directs the prioritization of AML reclamation projects under a tier of three categories: 1. Priority 1 projects involve the reclamation of lands and waters to protect public health, safety, and property from extreme danger. 2. Priority 2 projects involve the reclamation of lands and waters to protect public health and safety from adverse effects of coal mining practices. 3. Priority 3 projects involve the reclamation of lands and waters previously degraded by adverse effects of coal mining practices for the conservation and development of soil, water (excluding channelization), woodland, fish and wildlife, recreation resources, and agricultural productivity. The reclamation of Priority 2 projects may be similar in scope and nature as Priority 1 projects but generally present a lesser degree of danger. In some instances, the proximity of hazards and risks of AML lands to communities may elevate the risks to public health and safety in a way that similar circumstances would merit a lower priority if they occurred at a more isolated and remote location. However, proximity alone is not necessarily an indicator of risk if contamination may migrate from the mining site to an affected community. The geographic scope of the site may be larger than where the coal was mined, because it includes all the affected lands and waters. AMD causes persistent water quality impairment when minerals within coal are exposed to atmospheric oxygen and water, which causes a reaction generating sulfuric acid. The production of acid creates low-pH conditions in the water, enhancing the solubility of iron, sulfate, and other trace metals from the exposed ore. Those dissolved constituents may discharge to downgradient streams and water bodies and may generate secondary minerals within the stream and on the stream beds. Streams and other ecosystems impacted by AMD can become functionally impaired. States may consider reclamation projects to abate AMD water quality issues as a higher priority if that impaired water could pose a risk to public health. Section 402 allows states receiving grants from the Abandoned Mine Reclamation Fund to deposit up to 30% of their annual grants into an acid mine drainage abatement fund. The state may establish an acid mine drainage abatement fund in accordance with that state's law, and the monies in the fund are not subject to SMCRA's three-year limitation on expenditure and may accrue interest. SMCRA allows states to expend monies in their abatement fund without a time limit because water quality issues associated with AMD may persist for decades or longer. States and tribes with lands on which coal is mined may be eligible for annual grants from the Abandoned Mine Reclamation Fund to support the reclamation of abandoned coal mining sites within their respective jurisdictions. To be eligible for these federal funds, pursuant to Section 405 of SMCRA, states and tribes first must obtain OSMRE approval of their reclamation programs. OSMRE approval of a reclamation program depends upon the state or tribe demonstrating that it has developed its own requirements that do not conflict with the federal requirements but may be more stringent and that it has the ability to carry out these requirements in lieu of the federal government. OMSRE has approved mine reclamation programs for 25 states and three tribes. Pursuant to Section 411 of SMCRA, OSMRE may certify a state or tribe with an OSMRE-approved state reclamation program once it demonstrates that it has reclaimed all of its priority abandoned coal mining sites identified pursuant to Section 403. States and tribes may apply to OSMRE for certification, and the final determination is subject to notice in the Federal Register and public comment. Certified states and tribes may use annual grants for the reclamation of abandoned non-coal sites and other uses. Section 411 includes certain limitations. SMCRA prohibits certified states and tribes from spending annual payments on sites remediated under the Uranium Mill Tailings Radiation Control Act of 1978, as amended, and sites designated for remedial action pursuant to the Comprehensive Environmental Response, Compensation, and Liability Act, as amended (CERCLA). To date, OSMRE has certified five states and three tribes as having reclaimed all of their priority coal mining sites that were abandoned or unreclaimed prior to the enactment of SMCRA on August 3, 1977. A state with an OSMRE-approved state reclamation program that has not reclaimed all of its priority abandoned coal mining sites is an uncertified state . OSMRE provides annual grants to uncertified states from the Abandoned Mine Reclamation Fund for the reclamation of the priorities described under Section 403. For uncertified states, OSMRE administers grants from the Abandoned Mine Reclamation Fund. For certified states and tribes, OSMRE administers annual payments from the General Fund in lieu of the Abandoned Mine Reclamation Fund. OSMRE administers grants among eligible states and tribes based on a statutory formula to calculate their respective shares of annual coal reclamation fee receipts. OSMRE publishes grant distribution summaries on an annual basis. OSMRE administered grants to states and tribes for FY2019 are presented in Table 1 and Table 2 . The following sections describe the grants administered to eligible states and tribes. The Surface Mining Control and Reclamation Act Amendments of 2006 ( P.L. 109-432 , Division C, Title II, of the Tax Relief and Health Care Act of 2006) authorized General Fund payments to certified states and tribes beginning in FY2008 to focus the expenditure of coal reclamation fees on the reclamation of abandoned coal mining sites. The 2006 amendments also authorized permanent appropriations of coal reclamation fees for mine reclamation grants in FY2008 and subsequent fiscal years. Just over 80% of annual coal reclamation fee collections since FY2008 are authorized as permanent (mandatory) appropriations that are distributed to eligible uncertified states during the fiscal year following their collection. Section 402 of SMCRA authorizes the distribution of the fee collections credited to the Abandoned Mine Reclamation Fund based on a statutory formula that allocates to uncertified states: Uncertified State Share: shares of 50% of the coal reclamation fees collected within that state. Historic Coal Funds: shares of 30% of the fee collections based on historic coal production prior to the enactment of SMCRA on August 3, 1977. The historic coal payments are based on the total coal tonnage produced by each respective state prior to enactment. Coal reclamation fees collected in certified states and on tribal lands therefore affect the amount available in the Abandoned Mine Reclamation Fund for annual reclamation grants to uncertified states. Fees collected in certified states and on tribal lands are distributed to uncertified states as part of their historic coal payment. Minimum Program Make Up Funds: additional shares of the fee collections if necessary to guarantee that each uncertified state receives an annual grant of at least $3 million if its 50% state share payment and historic coal payment combined would not equal this threshold. The formula leaves 20% of the annual fee collections available for the minimum program make up funds and discretionary spending through annual appropriations to fund the activities of OSMRE to oversee and assist state mine reclamation programs and to administer the Abandoned Mine Reclamation Fund. Under Section 402, any amount of the 50% state share grant to an uncertified state not expended within three years of the date when the grant was awarded would become redistributed as historic coal payments, with the exception of the AMD abatement funds discussed earlier. The formula does not allocate any of the fee collections to support the UMWA health or pension benefit plans. The interest that accrues on the invested balance of the Abandoned Mine Reclamation Fund via an intergovernmental transfer from the General Fund is available to support UMWA health benefit plans. Direct payments from the General Fund supplement the interest for the UMWA health benefit plans. Additionally, the UMWA pension plan is eligible for General Fund payments, but it is not eligible to receive payments from the Abandoned Mine Reclamation Fund. See the discussion in \"Federal Financial Assistance for UMWA Health and Pension Benefit Plans\" later in this report. Section 401(f)(5)(B) of SMCRA authorized a four year \"phase-in\" period during FY2008-FY2011 for the newly established mandatory payments to uncertified states for their state share, historic coal, and minimum make up grants. During this period, grants to uncertified states were reduced by 50% for FY2008 and FY2009 and 25% for FY2010 and FY2011. Section 411(h)(2) of SMCRA authorized certified states and tribes to receive annual payments from the General Fund equivalent to 50% of annual coal reclamation fees collected within their jurisdictions. The fees collected from coal mining operations in certified states, and on lands of certified tribes, are credited to the Abandoned Mine Reclamation Fund. However, as authorized in Section 411 of SMCRA, certified states and tribes receive their payments from the General Fund of the U.S. Treasury in lieu of the Abandoned Mine Reclamation Fund and may use these funds for addressing the impacts of non-coal mineral development. Unlike uncertified states, certified states and tribes are not eligible to receive historic coal payments or minimum program make up funds. Section 411(h)(3)(B) of SMCRA authorized a three-year \"phase-in\" period between FY2009 and FY2011 for annual payments to certified states and tribes. During those fiscal years, annual state and tribal share payments were reduced to 25% in FY2009, 50% in FY2010, and 75% in FY2011. OSMRE paid the total amount reduced during the three-year phase-in period to certified states and tribes in two equal payments from the General Fund in FY2018 and FY2019. Certified states and tribes would no longer receive these payments in FY2020 and subsequent fiscal years because they have been fully paid out. In 2012, Congress amended Section 411(h) of SMCRA to place an annual $15 million cap on payments to each certified state or tribe. The cap applied to both in lieu payments and prior balance payments (described below) to certified states and tribes. Congress increased the cap to $28 million for FY2014 and $75 million for FY2015 by amending Section 411(h) of SMCRA again in 2013. Wyoming was the only state whose payments were reduced in FY2013 and FY2014 because of the caps. The higher cap in FY2015 did not affect Wyoming's payment. No other certified state or tribe exceeded caps for any of these fiscal years. In 2015, Congress removed these caps on payments to certified states and tribes by amending Section 411(h) of SMCRA. This amendment also authorized a retroactive payment for amounts that were reduced under the caps. Wyoming received a one-time retroactive payment of approximately $242 million in FY2016. This retroactive payment was included in the total payment to Wyoming in FY2016 as reported in the FY2018 Office of Management and Budget (OMB) budget in addition to the annual in lieu payments to certified states and tribes for FY2016. The majority of the unappropriated balance of the Abandoned Mine Reclamation Fund accumulated prior to the 2006 amendments. Prior to the enactment of the 2006 amendments to SMCRA, OSMRE distributed payments to both certified and uncertified states and tribes from the Abandoned Mine Reclamation Fund subject to annual appropriations. Annual appropriations were generally lower than annual coal reclamation fees collected by OSMRE prior to the 2006 amendments, resulting in an accumulation in the unappropriated balance of the Abandoned Mine Reclamation Fund. Section 411(h)(1) of SMCRA authorized \"Prior Balance\" payments equivalent to state and tribal share of the unappropriated balance of past coal reclamation fee receipts through annual federal payments to both uncertified and certified states and tribes from FY2008 through FY2014 from the General Fund of the U.S. Treasury. The Prior Balance payments were fully paid out by the end of FY2014, with the exception of the state of Wyoming (discussed above), which received a retroactive payment in FY2016 for amounts owed to the state because of statutory caps that were lifted. States and tribes no longer receive these prior balance payments. The accumulated balance of past coal reclamation fees collected prior to the 2006 amendments has remained credited to the Abandoned Mine Reclamation Fund and continues to accrue interest annually from investments in U.S. Treasury securities. States and tribes report site specific information to OSMRE about the reclamation of eligible AML projects. OSMRE hosts the Abandoned Mine Land Inventory System (AMLIS) database that presents information on total eligible mine reclamation costs by state and tribe, which may be categorized by unfunded, funded, and completed costs. The costs to complete reclamation at a particular site would depend on the scope and nature of actions necessary to mitigate the potential hazards and any technical or engineering challenges to implement the selected actions. OSMRE tracks AML reclamation project costs under three separate categories to identify the costs of completed projects and to estimate funding needs for future projects: 1. \"Unfunded Costs\" are based on estimates by states and tribes to implement projects for which funding is not available or has not been approved by OSMRE. 2. \"Funded Costs\" are based on estimates by states and tribes to implement projects for which funding is available and for which OSMRE has approved the funds. 3. \"Completed Costs\" are the actual costs of projects upon completion that states or tribes report to OSMRE. According to AMLIS, the total unfunded costs for uncertified and certified states and tribes was approximately $12.4 billion as of January 21, 2020. Of that total amount, the total unfunded cost estimates for uncertified states were approximately $12 billion, representing roughly 97% of the remaining unfunded reclamation needs. Unfunded reclamation cost estimates depend on the number of unreclaimed sites and on the severity of the reclamation problems as defined by the \"Priority\" level, per Section 403, for each unclaimed site in the state ( Table 1 ). Uncertified states reported Priority 2 costs as approximately $7.5 billion, or approximately 62% of the total uncertified unfunded reclamation costs. The remaining 38% of the unfunded costs for uncertified states are associated with Priority 1 and Priority 3 issues. Uncertified states reported Priority 1 issues as the smallest portion of unfunded cost estimates, but these sites generally represent the most severe hazards and most urgent priorities. Uncertified states reported the total unfunded reclamation cost for Priority 1 sites as roughly $1.8 billion. Two states, Pennsylvania and West Virginia, reported combined unfunded reclamation costs as $8.4 billion, representing approximately 66% of the total unfunded reclamation costs reported for all uncertified states. Pennsylvania reported the highest unfunded reclamation costs of any state, as reclamation cost estimates exceed $5 billion. OSMRE periodically updates funding estimates for sites in the AMLIS inventory. Thus, the number of priority sites in each funding category may change periodically. Future funding requirements may change as unforeseen contamination and remediation may be discovered or arise. Recent congressional hearing testimony by a Pennsylvania state official describes the challenges state programs face when attempting to catalog AML issues: Identifying and categorizing AML sites was among the first objectives for the AML program at its outset, and many of the cost estimates contained in the federal eAMLIS inventory were developed when the sites were initially inventoried in the early to mid-1980s. With time, the scale and depth of the AML problem has become better understood. However, it is in the nature of AML's that previously unknown sites will continue to manifest (particularly those associated with abandoned underground mines) and that known sites will continue to degrade, both of which increase the number of sites and the total cost to complete remaining AML reclamation work. With advancements in technology, the collection of more complete maps and mining records, and increased awareness and identification of these sites by local residents, many additional AML hazards have been and will continue to be identified and added to the AML inventory. Annual reclamation grants to states and tribes are based on the statutory formula described previously, and these grants are not based on reclamation needs. For example, several uncertified states reported similar unfunded reclamation costs: Indiana, Illinois, Oklahoma, and Missouri. The FY2020 grants received by those states, however, varied between $2.82 million and $11.7 million. Comparing FY2020 grants to the total unfunded reclamation costs suggests that some states or tribes may require annual grants for additional years or decades to completely fund reclamation needs. For example, Kansas reported $810 million in unfunded reclamation costs while receiving the minimum program make up fund amount of $2.82 million in FY2020. States and tribes may identify additional reclamation needs post-certification ( Table 2 ). A Wyoming state official described the ongoing reclamation challenges that the state continues to manage under their AML program. According to his written testimony, he described the state's awareness of AML issues as improved since the state achieved certification in 1984: Wyoming became a certified state under Title IV on May 25, 1984. Wyoming became certified on the basis of the best available information at the time. Early work to develop the inventory was essentially done through \"boots on the ground.\" As our understanding of historic mining in the state has improved our AML inventory has continued to grow. Eligible UMWA members (including family members) receive post-retirement health and pension benefits from one of three multiemployer health benefit plans and one multiemployer pension plan. These plans include the Combined Benefit Fund, the 1992 Benefit Plan, the 1993 Benefit Plan, and the 1974 UMWA pension plan. These plans are funded by premiums paid by employer contributions and two sources of federal financial assistance authorized under SMCRA. Section 402(h) authorizes transfers of interest from the Abandoned Mine Reclamation Fund to the UMWA health plans on an annual basis if the annual contributions from employers are not sufficient to cover liabilities for benefit coverage each year. Section 402(i) also authorizes supplemental payments from the General Fund of the U.S. Treasury on an annual basis if the interest that accrues on the balance of the Abandoned Mine Reclamation Fund is not sufficient to ensure benefit coverage each year. General Fund payments to the UMWA plans and to certified states and tribes combined are subject to a statutory cap of $750 million per year. Each of these sources is authorized in SMCRA as permanent appropriations that result in direct federal spending (i.e., mandatory spending not subject to discretionary spending controlled through annual appropriations acts). Figure 2 shows the transfers of monies from the Abandoned Mine Reclamation Fund and the General Fund to eligible states and tribes for AML reclamation projects and other uses and to the UMWA plans. In response to rising concern in the early 1990s about the potential insolvency of UMWA health benefit plans, the Coal Industry Retiree Health Benefit Act of 1992 ( P.L. 102-486 , Title XIX, Subtitle C of the Energy Policy Act of 1992) authorized the annual transfer of interest from the Abandoned Mine Reclamation Fund to three UMWA health benefit plans beginning in FY1996. Like other federal trust funds invested in U.S. Treasury securities, the interest that accrues on the invested balance of the Abandoned Mine Reclamation Fund is derived from the General Fund of the U.S. Treasury through an intergovernmental transfer. Receipts from coal reclamation fees invested in U.S. Treasury securities serve as the basis for calculating the interest that accrues to the Abandoned Mine Reclamation Fund. However, the fees do not function as \"principal\" in the same manner as private investments. Because the interest is sourced from existing receipts in the General Fund, the interest does not increase total receipts in the U.S. Treasury. The interest payments to the UMWA health plans are supplemented by payments from the General Fund if the interest is insufficient. The General Fund is therefore the source of receipts within the federal budget for both the interest and the supplemental payments to support the UMWA health and pension benefit plans. The General Fund consists of receipts from individual and corporate income taxes and other miscellaneous receipts not dedicated to other accounts of the U.S. Treasury. None of the coal reclamation fees credited to the Abandoned Mine Reclamation Fund are available to fund the UMWA benefit plans in current law. If employer contributions and the interest accrued to the Abandoned Mine Reclamation Fund are not sufficient to ensure UMWA health benefit coverage each year, the 2006 amendments to SMCRA authorized permanent appropriations for supplemental payments from the General Fund to pay the balance of benefits that would otherwise not be covered. The amendments authorized permanent appropriations for these General Fund supplemental payments beginning in FY2008 and \"each fiscal year thereafter\" without a termination date. The supplemental payments from the General Fund have become the larger source of federal funding to help ensure health benefit coverage under the UMWA plans (see Figure 3 and Figure 4 ), as the benefit obligations of the plans have exceeded the availability of interest that annually accrues on the invested balance of the Abandoned Mine Reclamation Fund. In the 116 th Congress, the Bipartisan American Miners Act of 2019 ( P.L. 116-94 ; Further Consolidated Appropriations Act, 2020, Division M) increased the availability of federal financial assistance to address the solvency of the UMWA health and pension benefit plans, subject to a new statutory funding cap to control federal direct spending for this purpose. The act amended Section 402(h) of SMCRA to expand the eligibility of the UMWA health benefit plans for interest transfers from the Abandoned Mine Reclamation Fund and General Fund supplemental payments. The act also amended Section 402(i) of SMCRA to authorize General Fund payments for the 1974 UMWA pension plan and increased the total spending cap on Title IV General Fund payments from $490 million to $750 million annually to help fund the UMWA pension plan. The 2006 amendments to SMCRA authorized General Fund supplemental payments for the UMWA health benefit plans beginning in FY2008 but no federal funding for the 1974 UMWA pension plan. The 2006 amendments limited the eligibility of the UMWA health benefit plans for federal funding based on beneficiaries enrolled to receive health benefits as December 31, 2006. Funding needs for the 1993 UMWA health benefit plan continued to increase after this cut-off date as additional beneficiaries enrolled in that plan in later years. Certain coal mining company bankruptcies after 2006 also affected health benefit coverage for other retirees. Subsequent amendments to SMCRA in the 114 th and 115 th Congresses expanded the populations of beneficiaries who could be eligible for federal payments to the UMWA health benefit plans. Prior to the Bipartisan American Miners Act, Section 402(h)(2)(C) of SMCRA limited General Fund supplemental payments for the 1993 UMWA health benefit plan based on funding needs to cover beneficiaries enrolled in that plan as of May 5, 2017 (with coverage retroactive to January 1, 2017) and retirees whose benefits were denied or reduced as a result of coal mining company bankruptcies commenced in 2012 and 2015. Since that time, funding needs to cover health benefits for additional populations of retirees have increased. The Bipartisan American Miners Act amended Section 402(h)(2)(C) of SMCRA again to expand the eligibility of the 1993 UMWA health benefit plan for General Fund supplemental payments to cover beneficiaries eligible as of January 1, 2019, and retirees whose benefits were denied or reduced as a result of coal mining company bankruptcies commenced in 2018 and 2019. This expansion of eligibility for federal funding to ensure health benefit coverage for these additional populations of beneficiaries may lead to increases in General Fund supplemental payments to the UMWA health benefit plans. The Bipartisan American Miners Act of 2019 also authorized annual General Fund payments to the 1974 UMWA pension plan to address the solvency of that plan. The act established a new cap of $750 million annually on the aggregate amount of General Fund payments to certified states and tribes, UMWA health benefit plans, and the UMWA pension plan combined. The cap serves as a mechanism to control federal direct spending from the U.S. Treasury. After in lieu payments to certified states and tribes and supplemental payments to the UMWA health benefit plans each fiscal year, the act authorizes any remaining amount within the $750 million annual cap to be transferred to the UMWA pension plan. If the aggregate annual certified state and tribal payments and the supplemental payment for the UMWA health plans would exceed $750 million in a fiscal year, the UMWA health plans would be reduced to the cap, and the UMWA pension plan would not receive a federal payment that fiscal year. SMCRA gives funding priority to certified state and tribal payments that would not be reduced by the $750 million annual cap unless the amount for this purpose alone otherwise would exceed the cap. Given that certified state and tribal payments are based on shares of coal reclamation fees, these payments would not reach the cap unless coal production in certified state and tribal lands were to rise several fold compared to recent fiscal years. Supplemental payments to UMWA health plans may vary depending on the availability of interest accrued on the unappropriated balance of the Abandoned Mine Reclamation Fund, the annual funding needs of the plans, and the amount available within the $750 million annual cap for supplemental payments. General Fund payments to the 1974 UMWA pension plan would also depend on how much funding is remaining each year within the $750 million annual cap after certified state and tribal payments and the supplemental payment to the UMWA health benefit plans. Appropriations from the Abandoned Mine Reclamation Fund include uncertified state shares, historic coal funds, minimum program make up funds, interest transfers to UMWA health benefit plans, and OSMRE administrative program funding ( Figure 3 and Figure A-1 ). Annual grants to uncertified states from the Abandoned Mine Reclamation Fund are permanent appropriations except for the OSMRE program funding, which Congress provides to OSMRE through annual appropriations. Total appropriations from the Abandoned Mine Reclamation Fund from FY2008 to FY2020 have totaled approximately $3.1 billion ( Table 3 ). Permanent appropriations from the General Fund of the U.S. Treasury include in lieu state share payments to certified states and tribes and UMWA supplemental payments. The General Fund also provided prior balance payments to certified states and tribes and uncertified states in several installments from FY2008 through FY2014, with a retroactive payment to the state of Wyoming in FY2016 (See the discussion of \"Prior Balance Payments\" earlier in this report). From FY2008 to FY2020, General Fund payments authorized in Title IV of SMCRA totaled approximately $6.0 billion ( Table 3 ). Appropriations vary from year to year based on statutory requirements (such as the phase-in reductions and payments), the amount of coal fees collected in a given year (which determine the amount available for state and tribal payments), and the amount of supplement payments required for UMWA health benefit plans ( Figure 4 ). The Bipartisan American Miners Act of 2019 authorized annual payments from the General Fund to the UMWA pension plan retroactively back to FY2017 and subsequent fiscal years, among other provisions. The FY2020 payment of $1.6 billion to the UMWA pension plan included cumulative payments from FY2017 through FY2020. The amount available for each of these fiscal years was subject to the $750 million annual cap and was based on the remainder within the cap after the certified state and tribal payments and the supplemental payments for the UMWA health benefit plans. The $1.6 billion payment to the UMWA pension plan in FY2020 was the largest annual General Fund payment authorized under Title IV of SMCRA ( Figure 4 ). For FY2021 and subsequent fiscal years, General Fund payments to certified states and tribes and the UMWA health and pension benefit plans will remain subject to the $750 million annual cap. Certified state and tribal payments would cease after FY2022 in current law absent the reauthorization of coal reclamation fees upon which these payments are based. Since FY2008, supplemental payments to UMWA health benefit plans from the General Fund have contributed a greater amount than have interest transfers from the Abandoned Mine Reclamation Fund ( Table 3 ). Absent reauthorization of the coal reclamation fees, as the balance from the Abandoned Mine Reclamation Fund is paid down after FY2023, the interest payments would continue to have a relatively smaller contribution to UMWA health plans. Thus, the supplemental payments from the General Fund for the UMWA health plans would continue to contribute a larger share of contributions to the plans as the amount of interest payments decrease. From FY2008 to FY2020, UMWA health and pension plans received approximately $3.91 billion of the total $6.04 billion in General Fund payments authorized in Title IV of SMCRA ( Table 3 ). That amount was nearly twice the total amount of grants paid to uncertified states from the Abandoned Mine Reclamation Fund (approximately $2.03 billion from the aggregate of the uncertified state shares, historic coal funds, and minimum program make up funds for FY2008 to FY2020) for the reclamation of abandoned coal mining sites during that same time period. Whereas funding for reclamation grants is dependent on coal reclamation fee collections, most of the UMWA plan funding is tied to the $750 million annual cap on General Fund payments, which are not financed with these fees. OMB estimates that coal reclamation fee receipts would continue to decline through FY2021, after which time the fee collection authority expires in current law. The Budget Control Act of 2011 provides a measure to control federal spending by placing a percent reduction on permanent appropriations to remain within prescribed caps. The percent reduction may vary each year depending on how much of a reduction is needed to remain within the cap. Sequestration reductions apply to permanent appropriations from General Fund and Abandoned Mine Reclamation Fund permanent appropriations as of FY2013. Congress has also appropriated monies from the General Fund for the Abandoned Mine Land Reclamation Economic Development Pilot Program. These appropriations have been authorized in annual appropriations and are not authorized in Title IV of SMCRA. Congress previously reauthorized the fee under the Surface Mining Control and Reclamation Act Amendments of 2006, and that authorization is set to expire at the end of FY2021. Some Members of Congress have introduced legislation in the 116 th Congress that would reauthorize the coal reclamation fee and authorize funds from the existing balance of the Abandoned Mine Reclamation Fund for economic and community development. Various issues are discussed in the following sections. Given that the balance of the Abandoned Mine Reclamation Fund is less than 20% of the estimated unfunded reclamation needs, Congress may consider whether and how to fund the remaining coal reclamation needs. Abandoned coal mining sites that remain unreclaimed are expected to continue to pose hazards to public health, safety, and the environment. If the coal reclamation fees are not reauthorized beyond FY2021, Section 401 of SMCRA directs the unappropriated balance of the Abandoned Mine Reclamation Fund to be distributed among eligible states over a series of fiscal years beginning in FY2023 based on what the state received in FY2022 as its share of fee collections from the prior year. Those payments would continue in that same amount each fiscal year thereafter until the balance of the fund is expended. In FY2020, OSMRE reported that the unappropriated balance of the Abandoned Mine Reclamation Fund was approximately $2.2 billion. Reclamation grants to eligible states therefore would likely continue for some years, even if coal reclamation fees were not reauthorized after FY2021. If the fee collection is not reauthorized, the fees collected in FY2022 will dictate the annual rate of grants to eligible states starting in FY2023 until the unappropriated balance is expended. Those amounts are based on coal production or the value of the coal produced in FY2022, whichever is less. If the coal reclamation fees are not reauthorized, one potential option for Congress would be to appropriate from the General Fund to meet remaining needs after the balance of the Abandoned Mine Reclamation Fund is expended. Congress was faced with a similar issue in the debate over the reauthorization of Superfund excise taxes for the Superfund Trust Fund under CERCLA ( P.L. 96-510 ). From the enactment of CERCLA in 1980 through FY1995, the balance of the Superfund Trust Fund was provided by revenues from the collection of a Superfund excise tax on petroleum, chemical feedstocks, corporate income, transfers from the General Fund, and other receipts. The authority to collect those Superfund excise taxes expired in FY1995, leaving revenues from the General Fund as the primary source of money to the Superfund Trust Fund. The Abandoned Mine Land Reclamation Fee Extension Act ( S. 1193 ), introduced in the 116 th Congress, would amend Section 402(b) of SMCRA, extending the fee collection authorization date until September 30, 2036. As introduced, S. 1193 would authorize OSMRE to collect coal reclamation fees under Section 402, and OSMRE would begin fixed payments from the unappropriated balance on the Abandoned Mine Reclamation Fund to uncertified states beginning in FY2023 based upon their FY2022 grants, according to Section 401(f)(2)(B). The Surface Mining Control and Reclamation Act Amendments of 2019 ( H.R. 4248 ) would amend Section 402(b) of SMCRA and Section 401(f) of SMCRA. This bill would extend the fee collection authorization date until September 30, 2036, and grants to eligible states and tribes would continue to be paid out annually according to the statutory formula until after FY2037. The bill would also increase the minimum payments to uncertified states from $3 million to $5 million and authorize compensation to uncertified states from the Abandoned Mine Reclamation Fund for the total amount reduced by sequestration between FY2013 and FY2018. In FY2020, 11 uncertified states together received approximately $21.9 million in minimum program make up funds, and 3 other uncertified states received less than $5 million. Raising the cap would increase payments to uncertified states receiving less than the current $3 million cap and may change the number of uncertified states eligible for minimum program make up funds. The extent to which more uncertified states become eligible would depend on future coal production in that state, coal production in certified states contributing to historic payments, and the value of coal generated. In the event the Congress enacts legislation reauthorizing the coal reclamation fee, the adequacy of those receipts to pay for the remaining unfunded reclamation costs would depend on domestic coal production, the duration of fee extension, and the emergence of additional reclamation needs. Given that the unfunded reclamation costs may be updated or subject to change based on the discovery or the occurrence of new health and safety or environmental issues, predicting the duration to reauthorize the fees to fund the remaining unfunded reclamation costs is challenging. Additionally, eligible states and tribes continuously update unfunded costs estimates as new problems are discovered or arise. Other legislation introduced in the 116 th Congress would use a portion of the unappropriated balance of the Abandoned Mine Reclamation Fund to provide funding for AML reclamation projects that promote economic and community development, as well as the purposes and priorities of reclamation described in Section 403 of SMCRA. However, some have argued expending funding for AML projects to prioritize economic and community development deviates from the original congressional intent of prioritizing the reclamation of lands and waters impacted by historic coal mining sites to address health and safety issues. Congress authorized the Abandoned Mine Land Reclamation Economic Development Pilot Program (AML Pilot Program) in the Consolidated Appropriations Act, 2016 to determine the feasibility of reclaiming abandoned coal mining sites to facilitate economic and community development. Congress provides funding for the AML pilot program through annual appropriations from the General Fund of the U.S. Treasury, not from the Abandoned Mine Reclamation Fund financed with coal reclamation fees. From FY2016 to FY2020, Congress has appropriated a total $540 million from the General Fund to the AML pilot program. For states and tribes that receive discretionary appropriations for the AML pilot program, those funds are in addition to the permanent appropriations as reclamation grants to eligible states and tribes from the Abandoned Mine Reclamation Fund. Annual appropriations have limited the use of AML pilot program grants to fund reclamation projects only in Appalachian counties of eligible states in areas where the project would have the potential to facilitate economic or community development. SMCRA authorizes the broader use of grants from the Abandoned Mine Reclamation Fund to fund reclamation projects in any counties within an eligible state. In the 116 th Congress, House and Senate versions of the Revitalizing the Economy of Coal Communities by Leveraging Local Activities and Investing More Act of 2019 (RECLAIM Act) have been introduced ( H.R. 2156 and S. 1232 ). Those bills would authorize $1 billion over five years from the existing unappropriated balance of the Abandoned Mine Reclamation Fund for the reclamation of abandoned coal mining sites as a means to facilitate economic and community development in states and tribes with eligible reclamation programs under Title IV of SMCRA. The RECLAIM Act would distribute $195 million annually to uncertified states based on historic payments and averaged state share grants. House and Senate versions of the RECLAIM Act differ by the allocation of these funds to uncertified states. For uncertified states to obligate RECLAIM monies on AML projects, the state would be required to demonstrate that those projects satisfy the reclamation priorities described in Section 403 and would contribute to future economic or community development. Both introduced versions of the RECLAIM Act would provide $5 million annually to certified states and tribes. Certified states and tribes would submit an application for funds, and OSMRE would determine the distribution of those funds based on the demonstration of needs. Neither introduced version of the RECLAIM Act would reauthorize the collection of the coal reclamation fees. RECLAIM grants to eligible states and tribes would be in addition to the annual grants paid to states and tribes. If the RECLAIM Act were enacted and the fee collection authority were not reauthorized, the unappropriated balance of the Abandoned Mine Reclamation Fund would be paid out sooner compared to a scenario where neither RECLAIM nor fee reauthorization legislation were enacted. Both House and Senate versions of the RECLAIM Act would increase the minimum program make up funds to uncertified states from the Abandoned Mine Reclamation Fund from $3 million to $5 million annually.", "summary": "Coal mining and production in the United States during the 20 th century contributed to the nation meeting its energy requirements and left a legacy of unreclaimed lands. Title IV of the Surface Mining Control and Reclamation Act of 1977 (SMCRA, P.L. 95-87 ) established the Abandoned Mine Reclamation Fund. The Office of Surface Mining Reclamation and Enforcement (OSMRE) administers grants from the Abandoned Mine Reclamation Fund to eligible states and tribes to reclaim affected lands and waters resulting from coal mining sites abandoned or otherwise left unreclaimed prior to the enactment of SMCRA. Title IV of SMCRA authorized the collection of fees on the production of coal, which are credited to the Abandoned Mine Reclamation Fund. The use of this funding is limited to the reclamation of coal mining sites abandoned or unreclaimed as of August 3, 1977 (the date of SMCRA enactment). Title V of SMCRA authorized the regulation of coal mining sites operating after the law's enactment. Coal mining sites regulated under Title V are ineligible for grants from the Abandoned Mine Reclamation Fund. The balance of the Abandoned Mine Reclamation Fund is provided by fees collected from coal mining operators based on the volume or value of coal produced, whichever is less. The coal reclamation fee collection authorization in Title IV expires at the end of FY2021. If Congress does not reauthorize the collection of reclamation fees, SMCRA directs the remaining balance of the Abandoned Mine Reclamation Fund to be distributed among states and tribes receiving grants from the fund based on the FY2022 grant amounts. The FY2022 grant amounts would depend on the fees collected in FY2021, and payments from the fund would begin in FY2023, continuing annually until the balance has been expended. As of November 11, 2018, OSMRE reported that the unappropriated balance of the Abandoned Mine Reclamation Fund was approximately $2.3 billion. Reclamation grants to eligible states and tribes receiving grants from the Abandoned Mine Reclamation Fund would continue for some years until the balance is expended if coal reclamation fees are not reauthorized. The balance of the Abandoned Mine Reclamation Fund is several times less than the estimated unfunded reclamation costs. OSMRE recently reported estimates of the unfunded reclamation costs as $12.4 billion. Congress may consider whether and how to fund the remaining unfunded coal reclamation needs. If the fees are reauthorized, the adequacy of those receipts to pay the remaining unfunded reclamation needs would depend in part on decisions made by Congress (e.g., source of funds, duration of the fee extension, and fee rate). Additional factors include the status of domestic coal production, upon which the fees are based, and the potential emergence of additional reclamation needs. As introduced, H.R. 4248 and S. 1193 would amend SMCRA to extend the fee collection authorization at the current fee rates until September 30, 2036. SMCRA also authorizes federal financial assistance to United Mine Workers of America (UMWA) health and pension benefit plans for retired coal miners and family members who are eligible to be covered under those plans. Two sources of federal financial assistance to UMWA plans include interest transfers from the Abandoned Mine Reclamation Fund and supplemental payments from the General Fund of the U.S. Treasury. Should Congress not reauthorize the coal reclamation fees, as the balance from the Abandoned Mine Reclamation Fund is paid down, the interest transfers from the Abandoned Mine Reclamation Fund would make a relatively smaller contribution to the UMWA plans, increasing the reliance on General Fund payments for these plans. In the 116 th Congress, House and Senate versions of the RECLAIM Act ( H.R. 2156 and S. 1232 ) would authorize $1 billion over five years from the unappropriated balance of the Abandoned Mine Reclamation Fund for the reclamation of abandoned coal mining sites as a means of facilitating economic and community development in coal production states. Either of these bills would accelerate the expenditure of the remaining balance of the fund but would not reauthorize the reclamation fee.", "document_type": "crs"}
{"report": "C ongressional employees are retained to perform public duties that include assisting Members in official responsibilities in personal, committee, leadership, or administrative office settings. The roles, duties, and activities of congressional staff are matters of ongoing interest to Members of Congress, congressional staff, groups, and individuals, including those who raise concerns about congressional operations. Most observers recognize that Congress does not function without staff, but there is little systematic attention to what staff do, or what Members expect of them. In congressional offices, there may be interest in identifying Member expectations of congressional staff duties by position from multiple perspectives, including assessment of staffing needs in Member offices; guidance in setting position expectations, qualifications, and experience when offices choose to hire staff; and informing current and potential congressional employees of position expectations. Members of the House and Senate generally establish their own employment policies and practices for their personal offices. It is arguably the case that within Member offices, a common group of activities is executed for which staff with relevant skillsets and other qualifications are necessary. A body of publicly available job advertisements for staff positions from a number of different offices can shed light on the expectations Members have for position duties, as well as staff skills, characteristics, experience, and other expectations. For 33 commonly used congressional staff position titles, this report describes the most frequently listed job duties, applicant skills, characteristics, prior experiences, and other expectations found in a sample of job advertisements placed by Members of Congress between approximately December 2014 and September 2019 seeking staff in their offices. Table 1 lists the position titles and the frequency with which advertisements for them appeared in the sample. Data used in developing sample position expectations were taken from several publicly available sources, including the following, over the periods specified: The House Employment Bulletin, published weekly by the House Vacancy Announcement and Placement Service (HVAPS) in the Human Resources Office of the House Chief Administrative Officer (CAO). Data were collected from ads published between approximately January 2015 and September 2019. The Employment Bulletin, published online by the Senate \"as a service to Senate offices choosing to advertise staff vacancies.\" Data were collected from ads, which were not dated, appearing from approximately July 2016 to July 2019. The House GOP Job and Resume Bank, which posts ads on behalf of the House Republican Conference on Facebook. Ads were collected between approximately January and June 2017. Other ads were collected from the period between approximately December 2014 and January 2017 from the House GOP Job Bank web page on the website of Representative Virginia Foxx during part of her tenure as the House Republican Conference Secretary. The Job Announcements Board hosted by Representative Steny Hoyer during part of his tenure as House Minority Whip. Data were collected from ads posted between approximately January 2016 and December 2017. More than 1,800 ads were collected from all sources. Duplicate ads resulting from posts to more than one source, and ads that appear to have been frequently reposted, were removed, as were ads for positions in congressional settings other than personal offices, yielding 880 ads for positions in Member personal offices. Substantially similar position titles (e.g., deputy scheduler and state deputy scheduler) for which there were five or more ads were identified and grouped together, as were related job titles (e.g., positions designated as district, field, or regional representative that had essentially similar job duties and expectations) for which there were five or more substantially similar ads, yielding a total of 704 ads. Ads for the 33 identified position titles were further categorized if there were five or more ads that specified the advertised position as \"not entry level\" or other signifier of presumptive advanced status. The 704 ads were coded against a variety of variables within eight categories, including ad tracking information; ad details; position responsibilities and responsibility areas; expected job skills, qualifications, and credentials; application materials; and office type. The distribution of ads by job title and level is provided in Table 1 . Solicitations of applicants for congressional staff appear to originate in a highly decentralized manner. Means of identifying appropriate candidates might potentially include reassigning staff within offices, placing ads in services that make them available by subscription, word of mouth, and other nonpublic means of identifying potential applicants for congressional staff positions. Consequently, it cannot be determined whether the dataset of ads analyzed in this report is representative of all congressional employment solicitations. In addition, the process by which candidates for some Member office senior staff positions are identified may not be public-facing. Based on information specified within the ads, most position titles were identified by one of the following four primary responsibility areas (some positions were identified by up to three responsibility areas): Legislative, Policy, and Oversight, Media, Messaging, and Speeches, Constituent Communications, Outreach, and Service, and Office Administration and Support. For each position, at least one sample position description was created based on the coded data. Information includes the most frequently occurring of the following: primary responsibility areas; widely expected duties, typically up to six of the most frequently occurring duties specified in all ads for that position; other potential duties, typically up to six other duties mentioned in more than one ad; applicant information, including characteristics, skills, and knowledge and prior experience; and other expectations. Categorizing congressional staff positions by position title relies on an assumption that similarly titled positions in House and Senate personal offices carry out the same tasks under essentially similar circumstances. While personal offices may carry out similar activities, the assumption might be questionable given the differences in staff resources in House and Senate offices, as well as potential differences within offices of each chamber. Generalizations about staff roles and duties may also be limited in some ways due to the broad discretion Members have with regard to running their office activities. Variations from office to office, which might include differences in job duties, work schedules, office emphases, and other factors, may limit the extent to which sample position expectations provided here match operational practices in all congressional offices.", "summary": "The roles, duties, and activities of congressional staff are matters of ongoing interest to Members of Congress, congressional staff, and observers of Congress. Members of the House and Senate establish their own employment policies and practices for their personal offices. It is arguably the case that within Member offices, a common group of activities is executed for which staff are necessary. Accordingly, a group of job advertisements for those positions from a number of different offices can shed light on the expectations Members have for position duties, as well as staff skills, characteristics, experience, and other expectations. This report provides a set of 39 widely expected job duties, applicant skills, characteristics, prior experiences, and other expectations based on a sample of ads placed by Members of Congress between approximately December 2014 and September 2019 seeking staff in their offices for 33 position titles: Sample position expectations might assist Congress from multiple perspectives, including assessment of staffing needs in Member offices; guidance in setting position expectations, qualifications, and experience when offices need to hire staff; and informing current and potential congressional employees of position expectations. At the same time, categorizing congressional staff positions by position title relies on an assumption that similarly titled positions in House and Senate personal offices carry out the same tasks under essentially similar circumstances. Although personal offices may carry out similar activities, the assumption might be questionable given the differences in staff resources in House and Senate offices, as well as potential differences among offices of each chamber, particularly the Senate. Genera lizations about staff roles and duties may also be limited in some ways due to the broad discretion Members have with regard to running their office activities. Variations from office to office, which might include differences in job duties, work schedules, office emphases, and other factors, may limit the extent to which sample position expectations might match operational practices in all congressional offices. This is one of several CRS products on congressional staff. To access those products, see CRS Report R44688, Congressional Staff: CRS Products on Size, Pay, and Job Tenure .", "document_type": "crs"}
{"report": "Congress annually considers 12 regular appropriations bills for the fiscal year that begins on October 1. These billsâtogether with other legislative measures providing appropriations known as supplemental and continuing appropriations (also referred to as continuing resolutions or CRs)âprovide annual appropriations for the agencies, projects, and activities funded therein. The annual appropriations cycle is often initiated after the President's budget submission. The House and Senate Appropriations Committees then hold hearings at which agencies provide further information and details about the President's budget. These hearings may be followed by congressional consideration of a budget resolution establishing a ceiling on overall spending within appropriations bills for the upcoming fiscal year. Committee and floor consideration of the annual appropriations bills occurs during the spring and summer months and may continue through the fall and winter until annual appropriations actions are completed. This report discusses FY2019 congressional appropriations actions and the impacts of the statutory budget enforcement framework established in the Budget Con trol Act of 2011 (BCA; P.L. 112-25 ) and the Bipartisan Budget Act of 2018 (BBA 2018; P.L. 115-123 ). It includes a chronological discussion and timeline ( Figure 1 ) of these actions. FY2019 appropriations actions were impacted by the BCA, which placed statutory limits on spending for FY2012-FY2021, divided between defense and nondefense. In addition, the law created procedures that would automatically lower those caps if specified deficit-reducing legislation were not enacted. Congress has adjusted these statutory caps, including through the Bipartisan Budget Acts (BBAs) of 2013 (for FY2014 and FY2015), 2015 (for FY2016 and FY2017), 2018 (for FY2018 and FY2019), and 2019 (for FY2020 and FY2021), which provided for spending cap increases in both defense and nondefense categories. BBA 2018 capped FY2019 discretionary spending for defense at $647 billion and for nondefense at $597 billion. It also provided that in the absence of agreement on a budget resolution for FY2019, the Budget Committees in the House and Senate could make committee allocations that could function as enforceable limits under Section 302 of the Congressional Budget Act. In May 2018, the House and Senate submitted these filings. With a \"top-line\" for FY2019 funding established, the Appropriations Committees could proceed with consideration of the 12 appropriations bills and provide enforceable 302(b) suballocations for each regular appropriations bill. The House and Senate Appropriations Committees completed their drafting and consideration of all 12 regular appropriations bills by the end of July 2018. In the 115 th Congress and prior to the start of FY2019 on October 1, 2018, the House passed half of the regular bills (6 out of 12), and the Senate passed 9 bills (see Table 2 and Table 3 ). In both chambers, separate regular appropriations bills were combined for floor consideration into consolidated appropriations bills, commonly referred to as \"minibuses\" (in contrast to an omnibus bill comprising most or all regular appropriations bills). These appropriations bill groupings were also used for resolving differences between the House and Senate through conference committees. Three appropriations bills were combined for initial consideration in the House: Energy and Water, Legislative Branch, and Military Construction and Veterans Affairs ( H.R. 5895 ). The House passed this combined measure on June 8, 2018. The Senate subsequently agreed to the combined measure with amendment on June 25. A final measure was negotiated in a conference committee. The Senate passed the final measure on September 12. The House passed it on September 13. It was enacted into law on September 21, 2018 ( P.L. 115-244 ). The House passed the Defense appropriations bill ( H.R. 6157 ) on June 28, 2018. The Senate added the text of the Labor, HHS, and Education appropriations bill and passed the combined measure on August 23, 2018. The combined measure was then sent to conference. The Senate passed the final measure on September 18. The House passed it on September 26. It was enacted into law on September 28, 2018 ( P.L. 115-245 ). In addition, the House passed a measure combining the Interior and Environment appropriations bill with the Financial Services appropriations bill ( H.R. 6147 ) on July 19, 2018. The Senate added the text of the Agriculture appropriations bill and the Transportation and HUD appropriations bill and passed the combined measure on August 1, 2018. Although a conference committee was appointed to negotiate on this measure, it did not report an agreement back to the House and Senate. FY2019 thus began on October 1, 2018, with five of the regular appropriations bills enacted. Funding for agencies, projects, and activities covered by the remaining seven regular appropriations bills was provided through December 7, 2018, in a CR (Division C of P.L. 115-245 , the same measure that provided funding for Defense and Labor, HHS, and Education). A second CR was enacted on December 7, extending funding for the remaining seven appropriations bills through December 21, 2018 ( P.L. 115-298 ). In the Senate, a third CR for FY2019 ( H.R. 695 ) was passed by voice vote on December 19, 2018. This CR would have extended funding through February 8, 2019. The House subsequently considered and amended it the following day, adding $5.7 billion to the U.S. Customs and Border Protection's \"Procurement, Construction, and Improvements\" account to remain available until FY2024, as well as $7.8 billion for disaster relief. The amended CR passed the House by a vote of 217-185 and was sent back to the Senate for further consideration. On December 21, the Senate agreed to a motion to proceed to the House amendment by a vote of 48-47, with Vice President Pence casting the tie-breaking vote. Following the vote, Senate Majority Leader Mitch McConnell stated the following: However, obviously, since any eventual solution requires 60 votes here in the Senate, it has been clear from the beginning that two things are necessary: support from enough Senate Democrats to pass the proposal at 60 and a Presidential signature. As a result, the Senate has voted to proceed to legislation before us in order to preserve maximum flexibility for a productive conversation to continue between the White House and our Democratic colleagues. I hope Senate Democrats will work with the White House on an agreement that can pass both Houses of Congress and receive the President's signature. Colleagues, when an agreement is reached, it will receive a vote here on the Senate floor. Without such an agreement, the Senate did not complete action on the House's proposal. The House and Senate adjourned later that day. When the second CRâwhich provided funding for the agencies, programs, and activities covered by the remaining seven FY2019 appropriations billsâexpired at midnight on December 21, funding lapsed and a partial government shutdown ensued. While the Senate continued consideration of the House amendment on December 22, December 27, and January 2, no further votes on appropriations occurred during the 115 th Congress. The 115 th Congress adjourned sine die on January 3, 2019, and the 116 th Congress took office the same day. Majority control of the House in the 116 th Congress changed from the Republican Party to the Democratic Party. In addition, any appropriations measures introduced and only reported or considered in the 115 th Congress were no longer pending. New measures needed to be introduced for the 116 th Congress to complete action on FY2019 appropriations. During January 2019, the House introduced and considered a number of measures concerning FY2019 appropriations. These measures are listed below, along with information on their content and corresponding floor votes. January 3, 2019, H.J.Res. 1 , a CR to provide FY2019 appropriations for Homeland Security, lasting through February 8, 2019. The resolution passed the House by a vote of 239-192. No further action was taken in the Senate. January 3, 2019, H.R. 21 , a measure to provide full-year FY2019 funding for six regular appropriations bills (Agriculture; CJS; Financial Services; Interior and Environment; State and Foreign Operations; and Transportation and HUD). The bill passed the House by a vote of 241-190. No further action was taken in the Senate. January 9, 2019, H.R. 264 , a measure to provide full-year FY2019 regular appropriations for Financial Services. The bill passed the House by a vote of 240-188. No further action was taken in the Senate. January 10, 2019, H.R. 267 , a measure to provide full-year FY2019 regular appropriations for Transportation and HUD. The bill passed the House by a vote of 244-180. No further action was taken in the Senate. January 10, 2019, H.R. 265 , a measure to provide full-year regular appropriations for Agriculture. The bill passed the House by a vote of 243-183. No further action was taken in the Senate. January 11, 2019, H.R. 266 , a measure to provide full-year regular appropriations for Interior and Environment. The bill passed the House by a vote of 240-179. No further action was taken in the Senate. January 15, 2019, H.J.Res. 27 , a CR to provide funding through February 1 for the seven remaining regular FY2019 appropriations bills. The resolution was brought up under suspension of the rules requiring a two-thirds majority for passage. The motion failed to achieve the necessary two-thirds on a vote of 237-187 . January 16, 2019, H.R. 268 , supplemental appropriations for disaster relief. The legislation included a CR providing FY2019 continuing appropriations through February 8. The bill passed the House by a vote of 237-187. On January 24, 2019, the Senate considered two separate amendments to the House-passed bill: a Republican amendment ( S.Amdt. 5 ) and a Democratic amendment ( S.Amdt. 6 ). The Senate failed to invoke cloture (requiring a vote of three-fifths of all Senators, or 60 votes) to end consideration of either amendment. No further action occurred. January 17, 2019, H.J.Res. 28 , a CR to provide FY2019 appropriations for the seven remaining regular appropriations measures through February 28. The resolution passed the House on a voice vote, but the House later, by unanimous consent, vacated the proceedings by which the CR had passed and allowed further proceedings to be postponed through the legislative day of January 23, 2019. The resolution subsequently passed the House by a vote of 229-184 on January 23. The measure was passed by the Senate on January 25 by voice vote, with an amendment providing for continuing appropriations through February 15. The House then passed the measure as amended, clearing it for the President. It was signed into law on the same day ( P.L. 116-5 ), ending the partial shutdown. January 23, 2019, H.R. 648 , a bill to provide full-year FY2019 funding for six of the remaining regular appropriations measures (Agriculture; CJS; Financial Services; Interior and Environment; State and Foreign Operations; and Transportation and HUD). The bill passed the House by a vote of 234-180. No further action was taken in the Senate. January 24, 2019, H.J.Res. 31 , a CR to provide FY2019 appropriations for Homeland Security through February 28. The resolution passed the House by a vote of 231-180. The measure was amended in the Senate to provide full-year funding for the seven remaining regular appropriations bills and agreed to by voice vote on January 25. The two chambers then agreed to convene a conference committee to negotiate a final version of these bills. A conference report to accompany H.J.Res . 31 was filed on February 13 and agreed to in the Senate, 83-16, on February 14 and in the House, 300-128, the same day. It was signed into law on February 15 ( P.L. 116-6 ). This ended action on regular appropriations bills for FY2019. For information about particular funding provisions in each of the 12 bills, congressional clients may access CRS's appropriations issue page at https://www.crs.gov/iap/appropriations .", "summary": "Congress annually considers 12 regular appropriations measures to provide discretionary funding for federal government activities and operations. For FY2019, appropriations actions spanned two Congresses, between which there was a change in the majority party in the House. The process of drafting, considering, and enacting FY2019 appropriations began in early 2018 and included the House and Senate Appropriations Committees each marking up and reporting all 12 annual appropriations bills by the end of July. Five appropriations bills in the 115 th Congress were enacted into law by the start of the fiscal year. An additional seven appropriations bills remained in various stages of consideration. Continuing resolutions (CRs) were enacted in order to extend funding of government operations covered in these seven bills. The first CR for FY2019 provided funding through December 7, 2018. A second CR provided funding through December 21, 2018. When the second CR expired, funding lapsed for the agencies and activities covered in the remaining seven appropriations bills, and a partial government shutdown ensued. The shutdown ended on January 25, 2019, when the 116 th Congress enacted a third CR to provide funding through February 15, 2019. Appropriations actions were subsequently completed when H.J.Res . 31 , an omnibus measure covering the seven remaining appropriations measures, was signed into law on February 15, 2019 ( P.L. 116-6 ). These and other actions are detailed in this report to provide overview information and a chronology of FY2019 appropriations measures. For information on tracking appropriations and related products, congressional clients may access the CRS FY2019 Appropriations Status Table at https://www.crs.gov/AppropriationsStatusTable .", "document_type": "crs"}
